mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-07-09 16:05:11 +00:00
Auto-Update: 2024-03-06T23:00:24.910954+00:00
This commit is contained in:
parent
23ced37ffd
commit
c6d3700ef2
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2023-48703",
|
"id": "CVE-2023-48703",
|
||||||
"sourceIdentifier": "security-advisories@github.com",
|
"sourceIdentifier": "security-advisories@github.com",
|
||||||
"published": "2024-03-06T20:15:47.343",
|
"published": "2024-03-06T20:15:47.343",
|
||||||
"lastModified": "2024-03-06T20:15:47.343",
|
"lastModified": "2024-03-06T21:42:48.053",
|
||||||
"vulnStatus": "Received",
|
"vulnStatus": "Awaiting Analysis",
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2023-50167",
|
"id": "CVE-2023-50167",
|
||||||
"sourceIdentifier": "security@pega.com",
|
"sourceIdentifier": "security@pega.com",
|
||||||
"published": "2024-03-06T18:15:46.133",
|
"published": "2024-03-06T18:15:46.133",
|
||||||
"lastModified": "2024-03-06T18:15:46.133",
|
"lastModified": "2024-03-06T21:42:54.697",
|
||||||
"vulnStatus": "Received",
|
"vulnStatus": "Awaiting Analysis",
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2023-50716",
|
"id": "CVE-2023-50716",
|
||||||
"sourceIdentifier": "security-advisories@github.com",
|
"sourceIdentifier": "security-advisories@github.com",
|
||||||
"published": "2024-03-06T18:15:46.360",
|
"published": "2024-03-06T18:15:46.360",
|
||||||
"lastModified": "2024-03-06T18:15:46.360",
|
"lastModified": "2024-03-06T21:42:48.053",
|
||||||
"vulnStatus": "Received",
|
"vulnStatus": "Awaiting Analysis",
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2024-20346",
|
"id": "CVE-2024-20346",
|
||||||
"sourceIdentifier": "ykramarz@cisco.com",
|
"sourceIdentifier": "ykramarz@cisco.com",
|
||||||
"published": "2024-03-06T17:15:10.173",
|
"published": "2024-03-06T17:15:10.173",
|
||||||
"lastModified": "2024-03-06T17:15:10.173",
|
"lastModified": "2024-03-06T21:42:54.697",
|
||||||
"vulnStatus": "Received",
|
"vulnStatus": "Awaiting Analysis",
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2024-2173",
|
"id": "CVE-2024-2173",
|
||||||
"sourceIdentifier": "chrome-cve-admin@google.com",
|
"sourceIdentifier": "chrome-cve-admin@google.com",
|
||||||
"published": "2024-03-06T19:15:08.973",
|
"published": "2024-03-06T19:15:08.973",
|
||||||
"lastModified": "2024-03-06T19:15:08.973",
|
"lastModified": "2024-03-06T21:42:48.053",
|
||||||
"vulnStatus": "Received",
|
"vulnStatus": "Awaiting Analysis",
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2024-2174",
|
"id": "CVE-2024-2174",
|
||||||
"sourceIdentifier": "chrome-cve-admin@google.com",
|
"sourceIdentifier": "chrome-cve-admin@google.com",
|
||||||
"published": "2024-03-06T19:15:09.037",
|
"published": "2024-03-06T19:15:09.037",
|
||||||
"lastModified": "2024-03-06T19:15:09.037",
|
"lastModified": "2024-03-06T21:42:48.053",
|
||||||
"vulnStatus": "Received",
|
"vulnStatus": "Awaiting Analysis",
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2024-2176",
|
"id": "CVE-2024-2176",
|
||||||
"sourceIdentifier": "chrome-cve-admin@google.com",
|
"sourceIdentifier": "chrome-cve-admin@google.com",
|
||||||
"published": "2024-03-06T19:15:09.090",
|
"published": "2024-03-06T19:15:09.090",
|
||||||
"lastModified": "2024-03-06T19:15:09.090",
|
"lastModified": "2024-03-06T21:42:48.053",
|
||||||
"vulnStatus": "Received",
|
"vulnStatus": "Awaiting Analysis",
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2024-2215",
|
"id": "CVE-2024-2215",
|
||||||
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
|
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
|
||||||
"published": "2024-03-06T17:15:11.593",
|
"published": "2024-03-06T17:15:11.593",
|
||||||
"lastModified": "2024-03-06T17:15:11.593",
|
"lastModified": "2024-03-06T21:42:54.697",
|
||||||
"vulnStatus": "Received",
|
"vulnStatus": "Awaiting Analysis",
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2024-2216",
|
"id": "CVE-2024-2216",
|
||||||
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
|
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
|
||||||
"published": "2024-03-06T17:15:11.640",
|
"published": "2024-03-06T17:15:11.640",
|
||||||
"lastModified": "2024-03-06T17:15:11.640",
|
"lastModified": "2024-03-06T21:42:54.697",
|
||||||
"vulnStatus": "Received",
|
"vulnStatus": "Awaiting Analysis",
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
|
59
CVE-2024/CVE-2024-22xx/CVE-2024-2236.json
Normal file
59
CVE-2024/CVE-2024-22xx/CVE-2024-2236.json
Normal file
@ -0,0 +1,59 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2024-2236",
|
||||||
|
"sourceIdentifier": "secalert@redhat.com",
|
||||||
|
"published": "2024-03-06T22:15:57.977",
|
||||||
|
"lastModified": "2024-03-06T22:15:57.977",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "A timing-based side-channel flaw was found in libgcrypt's RSA implementation. This issue may allow a remote attacker to initiate a Bleichenbacher-style attack, which can lead to the decryption of RSA ciphertexts."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "secalert@redhat.com",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "HIGH",
|
||||||
|
"privilegesRequired": "NONE",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "HIGH",
|
||||||
|
"integrityImpact": "NONE",
|
||||||
|
"availabilityImpact": "NONE",
|
||||||
|
"baseScore": 5.9,
|
||||||
|
"baseSeverity": "MEDIUM"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 2.2,
|
||||||
|
"impactScore": 3.6
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "secalert@redhat.com",
|
||||||
|
"type": "Primary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-208"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://access.redhat.com/security/cve/CVE-2024-2236",
|
||||||
|
"source": "secalert@redhat.com"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2268268",
|
||||||
|
"source": "secalert@redhat.com"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2024-24761",
|
"id": "CVE-2024-24761",
|
||||||
"sourceIdentifier": "security-advisories@github.com",
|
"sourceIdentifier": "security-advisories@github.com",
|
||||||
"published": "2024-03-06T18:15:46.620",
|
"published": "2024-03-06T18:15:46.620",
|
||||||
"lastModified": "2024-03-06T18:15:46.620",
|
"lastModified": "2024-03-06T21:42:48.053",
|
||||||
"vulnStatus": "Received",
|
"vulnStatus": "Awaiting Analysis",
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2024-24765",
|
"id": "CVE-2024-24765",
|
||||||
"sourceIdentifier": "security-advisories@github.com",
|
"sourceIdentifier": "security-advisories@github.com",
|
||||||
"published": "2024-03-06T18:15:46.807",
|
"published": "2024-03-06T18:15:46.807",
|
||||||
"lastModified": "2024-03-06T18:15:46.807",
|
"lastModified": "2024-03-06T21:42:48.053",
|
||||||
"vulnStatus": "Received",
|
"vulnStatus": "Awaiting Analysis",
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2024-24766",
|
"id": "CVE-2024-24766",
|
||||||
"sourceIdentifier": "security-advisories@github.com",
|
"sourceIdentifier": "security-advisories@github.com",
|
||||||
"published": "2024-03-06T19:15:07.290",
|
"published": "2024-03-06T19:15:07.290",
|
||||||
"lastModified": "2024-03-06T19:15:07.290",
|
"lastModified": "2024-03-06T21:42:48.053",
|
||||||
"vulnStatus": "Received",
|
"vulnStatus": "Awaiting Analysis",
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2024-24767",
|
"id": "CVE-2024-24767",
|
||||||
"sourceIdentifier": "security-advisories@github.com",
|
"sourceIdentifier": "security-advisories@github.com",
|
||||||
"published": "2024-03-06T18:15:46.983",
|
"published": "2024-03-06T18:15:46.983",
|
||||||
"lastModified": "2024-03-06T18:15:46.983",
|
"lastModified": "2024-03-06T21:42:48.053",
|
||||||
"vulnStatus": "Received",
|
"vulnStatus": "Awaiting Analysis",
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2024-25111",
|
"id": "CVE-2024-25111",
|
||||||
"sourceIdentifier": "security-advisories@github.com",
|
"sourceIdentifier": "security-advisories@github.com",
|
||||||
"published": "2024-03-06T19:15:07.510",
|
"published": "2024-03-06T19:15:07.510",
|
||||||
"lastModified": "2024-03-06T19:15:07.510",
|
"lastModified": "2024-03-06T21:42:48.053",
|
||||||
"vulnStatus": "Received",
|
"vulnStatus": "Awaiting Analysis",
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2024-27287",
|
"id": "CVE-2024-27287",
|
||||||
"sourceIdentifier": "security-advisories@github.com",
|
"sourceIdentifier": "security-advisories@github.com",
|
||||||
"published": "2024-03-06T19:15:07.723",
|
"published": "2024-03-06T19:15:07.723",
|
||||||
"lastModified": "2024-03-06T19:15:07.723",
|
"lastModified": "2024-03-06T21:42:48.053",
|
||||||
"vulnStatus": "Received",
|
"vulnStatus": "Awaiting Analysis",
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2024-27288",
|
"id": "CVE-2024-27288",
|
||||||
"sourceIdentifier": "security-advisories@github.com",
|
"sourceIdentifier": "security-advisories@github.com",
|
||||||
"published": "2024-03-06T19:15:07.933",
|
"published": "2024-03-06T19:15:07.933",
|
||||||
"lastModified": "2024-03-06T19:15:07.933",
|
"lastModified": "2024-03-06T21:42:48.053",
|
||||||
"vulnStatus": "Received",
|
"vulnStatus": "Awaiting Analysis",
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2024-27289",
|
"id": "CVE-2024-27289",
|
||||||
"sourceIdentifier": "security-advisories@github.com",
|
"sourceIdentifier": "security-advisories@github.com",
|
||||||
"published": "2024-03-06T19:15:08.140",
|
"published": "2024-03-06T19:15:08.140",
|
||||||
"lastModified": "2024-03-06T19:15:08.140",
|
"lastModified": "2024-03-06T21:42:48.053",
|
||||||
"vulnStatus": "Received",
|
"vulnStatus": "Awaiting Analysis",
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2024-27302",
|
"id": "CVE-2024-27302",
|
||||||
"sourceIdentifier": "security-advisories@github.com",
|
"sourceIdentifier": "security-advisories@github.com",
|
||||||
"published": "2024-03-06T19:15:08.330",
|
"published": "2024-03-06T19:15:08.330",
|
||||||
"lastModified": "2024-03-06T19:15:08.330",
|
"lastModified": "2024-03-06T21:42:48.053",
|
||||||
"vulnStatus": "Received",
|
"vulnStatus": "Awaiting Analysis",
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2024-27303",
|
"id": "CVE-2024-27303",
|
||||||
"sourceIdentifier": "security-advisories@github.com",
|
"sourceIdentifier": "security-advisories@github.com",
|
||||||
"published": "2024-03-06T19:15:08.553",
|
"published": "2024-03-06T19:15:08.553",
|
||||||
"lastModified": "2024-03-06T19:15:08.553",
|
"lastModified": "2024-03-06T21:42:48.053",
|
||||||
"vulnStatus": "Received",
|
"vulnStatus": "Awaiting Analysis",
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2024-27304",
|
"id": "CVE-2024-27304",
|
||||||
"sourceIdentifier": "security-advisories@github.com",
|
"sourceIdentifier": "security-advisories@github.com",
|
||||||
"published": "2024-03-06T19:15:08.767",
|
"published": "2024-03-06T19:15:08.767",
|
||||||
"lastModified": "2024-03-06T19:15:08.767",
|
"lastModified": "2024-03-06T21:42:48.053",
|
||||||
"vulnStatus": "Received",
|
"vulnStatus": "Awaiting Analysis",
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2024-27307",
|
"id": "CVE-2024-27307",
|
||||||
"sourceIdentifier": "security-advisories@github.com",
|
"sourceIdentifier": "security-advisories@github.com",
|
||||||
"published": "2024-03-06T20:15:47.537",
|
"published": "2024-03-06T20:15:47.537",
|
||||||
"lastModified": "2024-03-06T20:15:47.537",
|
"lastModified": "2024-03-06T21:42:48.053",
|
||||||
"vulnStatus": "Received",
|
"vulnStatus": "Awaiting Analysis",
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2024-27308",
|
"id": "CVE-2024-27308",
|
||||||
"sourceIdentifier": "security-advisories@github.com",
|
"sourceIdentifier": "security-advisories@github.com",
|
||||||
"published": "2024-03-06T20:15:47.730",
|
"published": "2024-03-06T20:15:47.730",
|
||||||
"lastModified": "2024-03-06T20:15:47.730",
|
"lastModified": "2024-03-06T21:42:48.053",
|
||||||
"vulnStatus": "Received",
|
"vulnStatus": "Awaiting Analysis",
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2024-27915",
|
"id": "CVE-2024-27915",
|
||||||
"sourceIdentifier": "security-advisories@github.com",
|
"sourceIdentifier": "security-advisories@github.com",
|
||||||
"published": "2024-03-06T20:15:47.930",
|
"published": "2024-03-06T20:15:47.930",
|
||||||
"lastModified": "2024-03-06T20:15:47.930",
|
"lastModified": "2024-03-06T21:42:48.053",
|
||||||
"vulnStatus": "Received",
|
"vulnStatus": "Awaiting Analysis",
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2024-27917",
|
"id": "CVE-2024-27917",
|
||||||
"sourceIdentifier": "security-advisories@github.com",
|
"sourceIdentifier": "security-advisories@github.com",
|
||||||
"published": "2024-03-06T20:15:48.120",
|
"published": "2024-03-06T20:15:48.120",
|
||||||
"lastModified": "2024-03-06T20:15:48.120",
|
"lastModified": "2024-03-06T21:42:48.053",
|
||||||
"vulnStatus": "Received",
|
"vulnStatus": "Awaiting Analysis",
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
|
@ -2,12 +2,12 @@
|
|||||||
"id": "CVE-2024-27929",
|
"id": "CVE-2024-27929",
|
||||||
"sourceIdentifier": "security-advisories@github.com",
|
"sourceIdentifier": "security-advisories@github.com",
|
||||||
"published": "2024-03-05T17:15:07.097",
|
"published": "2024-03-05T17:15:07.097",
|
||||||
"lastModified": "2024-03-05T18:50:18.333",
|
"lastModified": "2024-03-06T22:15:57.473",
|
||||||
"vulnStatus": "Awaiting Analysis",
|
"vulnStatus": "Awaiting Analysis",
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
"value": "ImageSharp is a managed, cross-platform, 2D graphics library. A heap-use-after-free flaw was found in ImageSharp's InitializeImage() function of PngDecoderCore.cs file. This vulnerability is triggered when an attacker passes a specially crafted PNG image file to ImageSharp for conversion, potentially leading to information disclosure. This issue has been patched in version 3.1.3."
|
"value": "ImageSharp is a managed, cross-platform, 2D graphics library. A heap-use-after-free flaw was found in ImageSharp's InitializeImage() function of PngDecoderCore.cs file. This vulnerability is triggered when an attacker passes a specially crafted PNG image file to ImageSharp for conversion, potentially leading to information disclosure. This issue has been patched in versions 3.1.3 and 2.1.7."
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"metrics": {
|
"metrics": {
|
||||||
|
63
CVE-2024/CVE-2024-281xx/CVE-2024-28110.json
Normal file
63
CVE-2024/CVE-2024-281xx/CVE-2024-28110.json
Normal file
@ -0,0 +1,63 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2024-28110",
|
||||||
|
"sourceIdentifier": "security-advisories@github.com",
|
||||||
|
"published": "2024-03-06T22:15:57.550",
|
||||||
|
"lastModified": "2024-03-06T22:15:57.550",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "Go SDK for CloudEvents is the official CloudEvents SDK to integrate applications with CloudEvents. Prior to version 2.15.2, using cloudevents.WithRoundTripper to create a cloudevents.Client with an authenticated http.RoundTripper causes the go-sdk to leak credentials to arbitrary endpoints. When the transport is populated with an authenticated transport, then http.DefaultClient is modified with the authenticated transport and will start to send Authorization tokens to any endpoint it is used to contact. Version 2.15.2 patches this issue."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "security-advisories@github.com",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "NONE",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "HIGH",
|
||||||
|
"integrityImpact": "NONE",
|
||||||
|
"availabilityImpact": "NONE",
|
||||||
|
"baseScore": 7.5,
|
||||||
|
"baseSeverity": "HIGH"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 3.9,
|
||||||
|
"impactScore": 3.6
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "security-advisories@github.com",
|
||||||
|
"type": "Secondary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-522"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://github.com/cloudevents/sdk-go/blob/67e389964131d55d65cd14b4eb32d57a47312695/v2/protocol/http/protocol.go#L104-L110",
|
||||||
|
"source": "security-advisories@github.com"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://github.com/cloudevents/sdk-go/commit/de2f28370b0d2a0f64f92c0c6139fa4b8a7c3851",
|
||||||
|
"source": "security-advisories@github.com"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://github.com/cloudevents/sdk-go/security/advisories/GHSA-5pf6-2qwx-pxm2",
|
||||||
|
"source": "security-advisories@github.com"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
59
CVE-2024/CVE-2024-281xx/CVE-2024-28111.json
Normal file
59
CVE-2024/CVE-2024-281xx/CVE-2024-28111.json
Normal file
@ -0,0 +1,59 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2024-28111",
|
||||||
|
"sourceIdentifier": "security-advisories@github.com",
|
||||||
|
"published": "2024-03-06T22:15:57.780",
|
||||||
|
"lastModified": "2024-03-06T22:15:57.780",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "Canarytokens helps track activity and actions on a network. Canarytokens.org supports exporting the history of a Canarytoken's incidents in CSV format. The generation of these CSV files is vulnerable to a CSV Injection vulnerability. This flaw can be used by an attacker who discovers an HTTP-based Canarytoken to target the Canarytoken's owner, if the owner exports the incident history to CSV and opens in a reader application such as Microsoft Excel. The impact is that this issue could lead to code execution on the machine on which the CSV file is opened. Version sha-c595a1f8 contains a fix for this issue."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "security-advisories@github.com",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "NONE",
|
||||||
|
"userInteraction": "REQUIRED",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "HIGH",
|
||||||
|
"integrityImpact": "NONE",
|
||||||
|
"availabilityImpact": "NONE",
|
||||||
|
"baseScore": 6.5,
|
||||||
|
"baseSeverity": "MEDIUM"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 2.8,
|
||||||
|
"impactScore": 3.6
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "security-advisories@github.com",
|
||||||
|
"type": "Secondary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-1236"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://github.com/thinkst/canarytokens/commit/c595a1f884b986da2ca05aa5bff9ae5f93c6a4aa",
|
||||||
|
"source": "security-advisories@github.com"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://github.com/thinkst/canarytokens/security/advisories/GHSA-fqh6-v4qp-65fv",
|
||||||
|
"source": "security-advisories@github.com"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2024-28149",
|
"id": "CVE-2024-28149",
|
||||||
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
|
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
|
||||||
"published": "2024-03-06T17:15:10.450",
|
"published": "2024-03-06T17:15:10.450",
|
||||||
"lastModified": "2024-03-06T17:15:10.450",
|
"lastModified": "2024-03-06T21:42:54.697",
|
||||||
"vulnStatus": "Received",
|
"vulnStatus": "Awaiting Analysis",
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2024-28150",
|
"id": "CVE-2024-28150",
|
||||||
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
|
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
|
||||||
"published": "2024-03-06T17:15:10.510",
|
"published": "2024-03-06T17:15:10.510",
|
||||||
"lastModified": "2024-03-06T17:15:10.510",
|
"lastModified": "2024-03-06T21:42:54.697",
|
||||||
"vulnStatus": "Received",
|
"vulnStatus": "Awaiting Analysis",
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2024-28151",
|
"id": "CVE-2024-28151",
|
||||||
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
|
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
|
||||||
"published": "2024-03-06T17:15:10.570",
|
"published": "2024-03-06T17:15:10.570",
|
||||||
"lastModified": "2024-03-06T17:15:10.570",
|
"lastModified": "2024-03-06T21:42:54.697",
|
||||||
"vulnStatus": "Received",
|
"vulnStatus": "Awaiting Analysis",
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2024-28152",
|
"id": "CVE-2024-28152",
|
||||||
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
|
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
|
||||||
"published": "2024-03-06T17:15:10.637",
|
"published": "2024-03-06T17:15:10.637",
|
||||||
"lastModified": "2024-03-06T17:15:10.637",
|
"lastModified": "2024-03-06T21:42:54.697",
|
||||||
"vulnStatus": "Received",
|
"vulnStatus": "Awaiting Analysis",
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2024-28153",
|
"id": "CVE-2024-28153",
|
||||||
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
|
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
|
||||||
"published": "2024-03-06T17:15:10.687",
|
"published": "2024-03-06T17:15:10.687",
|
||||||
"lastModified": "2024-03-06T17:15:10.687",
|
"lastModified": "2024-03-06T21:42:54.697",
|
||||||
"vulnStatus": "Received",
|
"vulnStatus": "Awaiting Analysis",
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2024-28154",
|
"id": "CVE-2024-28154",
|
||||||
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
|
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
|
||||||
"published": "2024-03-06T17:15:10.733",
|
"published": "2024-03-06T17:15:10.733",
|
||||||
"lastModified": "2024-03-06T17:15:10.733",
|
"lastModified": "2024-03-06T21:42:54.697",
|
||||||
"vulnStatus": "Received",
|
"vulnStatus": "Awaiting Analysis",
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2024-28155",
|
"id": "CVE-2024-28155",
|
||||||
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
|
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
|
||||||
"published": "2024-03-06T17:15:10.787",
|
"published": "2024-03-06T17:15:10.787",
|
||||||
"lastModified": "2024-03-06T17:15:10.787",
|
"lastModified": "2024-03-06T21:42:54.697",
|
||||||
"vulnStatus": "Received",
|
"vulnStatus": "Awaiting Analysis",
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2024-28156",
|
"id": "CVE-2024-28156",
|
||||||
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
|
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
|
||||||
"published": "2024-03-06T17:15:10.837",
|
"published": "2024-03-06T17:15:10.837",
|
||||||
"lastModified": "2024-03-06T17:15:10.837",
|
"lastModified": "2024-03-06T21:42:54.697",
|
||||||
"vulnStatus": "Received",
|
"vulnStatus": "Awaiting Analysis",
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2024-28157",
|
"id": "CVE-2024-28157",
|
||||||
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
|
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
|
||||||
"published": "2024-03-06T17:15:10.890",
|
"published": "2024-03-06T17:15:10.890",
|
||||||
"lastModified": "2024-03-06T17:15:10.890",
|
"lastModified": "2024-03-06T21:42:54.697",
|
||||||
"vulnStatus": "Received",
|
"vulnStatus": "Awaiting Analysis",
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2024-28158",
|
"id": "CVE-2024-28158",
|
||||||
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
|
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
|
||||||
"published": "2024-03-06T17:15:10.940",
|
"published": "2024-03-06T17:15:10.940",
|
||||||
"lastModified": "2024-03-06T17:15:10.940",
|
"lastModified": "2024-03-06T21:42:54.697",
|
||||||
"vulnStatus": "Received",
|
"vulnStatus": "Awaiting Analysis",
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2024-28159",
|
"id": "CVE-2024-28159",
|
||||||
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
|
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
|
||||||
"published": "2024-03-06T17:15:10.987",
|
"published": "2024-03-06T17:15:10.987",
|
||||||
"lastModified": "2024-03-06T17:15:10.987",
|
"lastModified": "2024-03-06T21:42:54.697",
|
||||||
"vulnStatus": "Received",
|
"vulnStatus": "Awaiting Analysis",
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2024-28160",
|
"id": "CVE-2024-28160",
|
||||||
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
|
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
|
||||||
"published": "2024-03-06T17:15:11.040",
|
"published": "2024-03-06T17:15:11.040",
|
||||||
"lastModified": "2024-03-06T17:15:11.040",
|
"lastModified": "2024-03-06T21:42:54.697",
|
||||||
"vulnStatus": "Received",
|
"vulnStatus": "Awaiting Analysis",
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2024-28161",
|
"id": "CVE-2024-28161",
|
||||||
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
|
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
|
||||||
"published": "2024-03-06T17:15:11.090",
|
"published": "2024-03-06T17:15:11.090",
|
||||||
"lastModified": "2024-03-06T17:15:11.090",
|
"lastModified": "2024-03-06T21:42:54.697",
|
||||||
"vulnStatus": "Received",
|
"vulnStatus": "Awaiting Analysis",
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2024-28162",
|
"id": "CVE-2024-28162",
|
||||||
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
|
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
|
||||||
"published": "2024-03-06T17:15:11.140",
|
"published": "2024-03-06T17:15:11.140",
|
||||||
"lastModified": "2024-03-06T17:15:11.140",
|
"lastModified": "2024-03-06T21:42:54.697",
|
||||||
"vulnStatus": "Received",
|
"vulnStatus": "Awaiting Analysis",
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2024-28173",
|
"id": "CVE-2024-28173",
|
||||||
"sourceIdentifier": "cve@jetbrains.com",
|
"sourceIdentifier": "cve@jetbrains.com",
|
||||||
"published": "2024-03-06T17:15:11.190",
|
"published": "2024-03-06T17:15:11.190",
|
||||||
"lastModified": "2024-03-06T17:15:11.190",
|
"lastModified": "2024-03-06T21:42:54.697",
|
||||||
"vulnStatus": "Received",
|
"vulnStatus": "Awaiting Analysis",
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2024-28174",
|
"id": "CVE-2024-28174",
|
||||||
"sourceIdentifier": "cve@jetbrains.com",
|
"sourceIdentifier": "cve@jetbrains.com",
|
||||||
"published": "2024-03-06T17:15:11.397",
|
"published": "2024-03-06T17:15:11.397",
|
||||||
"lastModified": "2024-03-06T17:15:11.397",
|
"lastModified": "2024-03-06T21:42:54.697",
|
||||||
"vulnStatus": "Received",
|
"vulnStatus": "Awaiting Analysis",
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
|
54
README.md
54
README.md
@ -9,13 +9,13 @@ Repository synchronizes with the NVD every 2 hours.
|
|||||||
### Last Repository Update
|
### Last Repository Update
|
||||||
|
|
||||||
```plain
|
```plain
|
||||||
2024-03-06T21:00:24.297999+00:00
|
2024-03-06T23:00:24.910954+00:00
|
||||||
```
|
```
|
||||||
|
|
||||||
### Most recent CVE Modification Timestamp synchronized with NVD
|
### Most recent CVE Modification Timestamp synchronized with NVD
|
||||||
|
|
||||||
```plain
|
```plain
|
||||||
2024-03-06T20:15:48.120000+00:00
|
2024-03-06T22:15:57.977000+00:00
|
||||||
```
|
```
|
||||||
|
|
||||||
### Last Data Feed Release
|
### Last Data Feed Release
|
||||||
@ -29,35 +29,47 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
|
|||||||
### Total Number of included CVEs
|
### Total Number of included CVEs
|
||||||
|
|
||||||
```plain
|
```plain
|
||||||
240712
|
240715
|
||||||
```
|
```
|
||||||
|
|
||||||
### CVEs added in the last Commit
|
### CVEs added in the last Commit
|
||||||
|
|
||||||
Recently added CVEs: `16`
|
Recently added CVEs: `3`
|
||||||
|
|
||||||
* [CVE-2023-48703](CVE-2023/CVE-2023-487xx/CVE-2023-48703.json) (`2024-03-06T20:15:47.343`)
|
* [CVE-2024-28110](CVE-2024/CVE-2024-281xx/CVE-2024-28110.json) (`2024-03-06T22:15:57.550`)
|
||||||
* [CVE-2024-24766](CVE-2024/CVE-2024-247xx/CVE-2024-24766.json) (`2024-03-06T19:15:07.290`)
|
* [CVE-2024-28111](CVE-2024/CVE-2024-281xx/CVE-2024-28111.json) (`2024-03-06T22:15:57.780`)
|
||||||
* [CVE-2024-25111](CVE-2024/CVE-2024-251xx/CVE-2024-25111.json) (`2024-03-06T19:15:07.510`)
|
* [CVE-2024-2236](CVE-2024/CVE-2024-22xx/CVE-2024-2236.json) (`2024-03-06T22:15:57.977`)
|
||||||
* [CVE-2024-27287](CVE-2024/CVE-2024-272xx/CVE-2024-27287.json) (`2024-03-06T19:15:07.723`)
|
|
||||||
* [CVE-2024-27288](CVE-2024/CVE-2024-272xx/CVE-2024-27288.json) (`2024-03-06T19:15:07.933`)
|
|
||||||
* [CVE-2024-27289](CVE-2024/CVE-2024-272xx/CVE-2024-27289.json) (`2024-03-06T19:15:08.140`)
|
|
||||||
* [CVE-2024-27302](CVE-2024/CVE-2024-273xx/CVE-2024-27302.json) (`2024-03-06T19:15:08.330`)
|
|
||||||
* [CVE-2024-27303](CVE-2024/CVE-2024-273xx/CVE-2024-27303.json) (`2024-03-06T19:15:08.553`)
|
|
||||||
* [CVE-2024-27304](CVE-2024/CVE-2024-273xx/CVE-2024-27304.json) (`2024-03-06T19:15:08.767`)
|
|
||||||
* [CVE-2024-2173](CVE-2024/CVE-2024-21xx/CVE-2024-2173.json) (`2024-03-06T19:15:08.973`)
|
|
||||||
* [CVE-2024-2174](CVE-2024/CVE-2024-21xx/CVE-2024-2174.json) (`2024-03-06T19:15:09.037`)
|
|
||||||
* [CVE-2024-2176](CVE-2024/CVE-2024-21xx/CVE-2024-2176.json) (`2024-03-06T19:15:09.090`)
|
|
||||||
* [CVE-2024-27307](CVE-2024/CVE-2024-273xx/CVE-2024-27307.json) (`2024-03-06T20:15:47.537`)
|
|
||||||
* [CVE-2024-27308](CVE-2024/CVE-2024-273xx/CVE-2024-27308.json) (`2024-03-06T20:15:47.730`)
|
|
||||||
* [CVE-2024-27915](CVE-2024/CVE-2024-279xx/CVE-2024-27915.json) (`2024-03-06T20:15:47.930`)
|
|
||||||
* [CVE-2024-27917](CVE-2024/CVE-2024-279xx/CVE-2024-27917.json) (`2024-03-06T20:15:48.120`)
|
|
||||||
|
|
||||||
|
|
||||||
### CVEs modified in the last Commit
|
### CVEs modified in the last Commit
|
||||||
|
|
||||||
Recently modified CVEs: `0`
|
Recently modified CVEs: `41`
|
||||||
|
|
||||||
|
* [CVE-2024-2176](CVE-2024/CVE-2024-21xx/CVE-2024-2176.json) (`2024-03-06T21:42:48.053`)
|
||||||
|
* [CVE-2024-27307](CVE-2024/CVE-2024-273xx/CVE-2024-27307.json) (`2024-03-06T21:42:48.053`)
|
||||||
|
* [CVE-2024-27308](CVE-2024/CVE-2024-273xx/CVE-2024-27308.json) (`2024-03-06T21:42:48.053`)
|
||||||
|
* [CVE-2024-27915](CVE-2024/CVE-2024-279xx/CVE-2024-27915.json) (`2024-03-06T21:42:48.053`)
|
||||||
|
* [CVE-2024-27917](CVE-2024/CVE-2024-279xx/CVE-2024-27917.json) (`2024-03-06T21:42:48.053`)
|
||||||
|
* [CVE-2024-20346](CVE-2024/CVE-2024-203xx/CVE-2024-20346.json) (`2024-03-06T21:42:54.697`)
|
||||||
|
* [CVE-2024-28149](CVE-2024/CVE-2024-281xx/CVE-2024-28149.json) (`2024-03-06T21:42:54.697`)
|
||||||
|
* [CVE-2024-28150](CVE-2024/CVE-2024-281xx/CVE-2024-28150.json) (`2024-03-06T21:42:54.697`)
|
||||||
|
* [CVE-2024-28151](CVE-2024/CVE-2024-281xx/CVE-2024-28151.json) (`2024-03-06T21:42:54.697`)
|
||||||
|
* [CVE-2024-28152](CVE-2024/CVE-2024-281xx/CVE-2024-28152.json) (`2024-03-06T21:42:54.697`)
|
||||||
|
* [CVE-2024-28153](CVE-2024/CVE-2024-281xx/CVE-2024-28153.json) (`2024-03-06T21:42:54.697`)
|
||||||
|
* [CVE-2024-28154](CVE-2024/CVE-2024-281xx/CVE-2024-28154.json) (`2024-03-06T21:42:54.697`)
|
||||||
|
* [CVE-2024-28155](CVE-2024/CVE-2024-281xx/CVE-2024-28155.json) (`2024-03-06T21:42:54.697`)
|
||||||
|
* [CVE-2024-28156](CVE-2024/CVE-2024-281xx/CVE-2024-28156.json) (`2024-03-06T21:42:54.697`)
|
||||||
|
* [CVE-2024-28157](CVE-2024/CVE-2024-281xx/CVE-2024-28157.json) (`2024-03-06T21:42:54.697`)
|
||||||
|
* [CVE-2024-28158](CVE-2024/CVE-2024-281xx/CVE-2024-28158.json) (`2024-03-06T21:42:54.697`)
|
||||||
|
* [CVE-2024-28159](CVE-2024/CVE-2024-281xx/CVE-2024-28159.json) (`2024-03-06T21:42:54.697`)
|
||||||
|
* [CVE-2024-28160](CVE-2024/CVE-2024-281xx/CVE-2024-28160.json) (`2024-03-06T21:42:54.697`)
|
||||||
|
* [CVE-2024-28161](CVE-2024/CVE-2024-281xx/CVE-2024-28161.json) (`2024-03-06T21:42:54.697`)
|
||||||
|
* [CVE-2024-28162](CVE-2024/CVE-2024-281xx/CVE-2024-28162.json) (`2024-03-06T21:42:54.697`)
|
||||||
|
* [CVE-2024-28173](CVE-2024/CVE-2024-281xx/CVE-2024-28173.json) (`2024-03-06T21:42:54.697`)
|
||||||
|
* [CVE-2024-28174](CVE-2024/CVE-2024-281xx/CVE-2024-28174.json) (`2024-03-06T21:42:54.697`)
|
||||||
|
* [CVE-2024-2215](CVE-2024/CVE-2024-22xx/CVE-2024-2215.json) (`2024-03-06T21:42:54.697`)
|
||||||
|
* [CVE-2024-2216](CVE-2024/CVE-2024-22xx/CVE-2024-2216.json) (`2024-03-06T21:42:54.697`)
|
||||||
|
* [CVE-2024-27929](CVE-2024/CVE-2024-279xx/CVE-2024-27929.json) (`2024-03-06T22:15:57.473`)
|
||||||
|
|
||||||
|
|
||||||
## Download and Usage
|
## Download and Usage
|
||||||
|
Loading…
x
Reference in New Issue
Block a user