Auto-Update: 2024-03-14T13:00:40.736016+00:00

This commit is contained in:
cad-safe-bot 2024-03-14 13:03:29 +00:00
parent 8402de0a4b
commit df66da7977
53 changed files with 297 additions and 168 deletions

View File

@ -2,12 +2,16 @@
"id": "CVE-2020-11862",
"sourceIdentifier": "security@opentext.com",
"published": "2024-03-13T22:15:07.517",
"lastModified": "2024-03-13T22:15:07.517",
"vulnStatus": "Received",
"lastModified": "2024-03-14T12:52:16.723",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "Allocation of Resources Without Limits or Throttling vulnerability in OpenText NetIQ Privileged Account Manager on Linux, Windows, 64 bit allows Flooding.This issue affects NetIQ Privileged Account Manager: before 3.7.0.2.\n\n"
},
{
"lang": "es",
"value": "Asignaci\u00f3n de recursos sin l\u00edmites o vulnerabilidad de limitaci\u00f3n en OpenText NetIQ Privileged Account Manager en Linux, Windows, 64 bits permite inundaciones. Este problema afecta a NetIQ Privileged Account Manager: versiones anteriores a 3.7.0.2."
}
],
"metrics": {

View File

@ -2,12 +2,16 @@
"id": "CVE-2023-36238",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-03-13T21:15:53.813",
"lastModified": "2024-03-13T21:15:53.813",
"vulnStatus": "Received",
"lastModified": "2024-03-14T12:52:21.763",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "Insecure Direct Object Reference (IDOR) in Bagisto v.1.5.1 allows an attacker to obtain sensitive information via the invoice ID parameter."
},
{
"lang": "es",
"value": "La referencia directa a objetos inseguros (IDOR) en Bagisto v.1.5.1 permite a un atacante obtener informaci\u00f3n confidencial a trav\u00e9s del par\u00e1metro ID de factura."
}
],
"metrics": {},

View File

@ -2,12 +2,16 @@
"id": "CVE-2023-38534",
"sourceIdentifier": "security@opentext.com",
"published": "2024-03-13T22:15:08.197",
"lastModified": "2024-03-13T22:15:08.197",
"vulnStatus": "Received",
"lastModified": "2024-03-14T12:52:16.723",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "Improper authentication vulnerability in\u00a0OpenText\u2122\u00a0Exceed Turbo X affecting versions 12.5.0 and 12.5.1. The vulnerability could allow disclosure of restricted information in unauthenticated RPC.\u00a0"
},
{
"lang": "es",
"value": "Vulnerabilidad de autenticaci\u00f3n incorrecta en OpenText\u2122 Exceed Turbo X que afecta a las versiones 12.5.0 y 12.5.1. La vulnerabilidad podr\u00eda permitir la divulgaci\u00f3n de informaci\u00f3n restringida en RPC no autenticado."
}
],
"metrics": {

View File

@ -2,12 +2,16 @@
"id": "CVE-2023-38535",
"sourceIdentifier": "security@opentext.com",
"published": "2024-03-13T22:15:08.463",
"lastModified": "2024-03-13T22:15:08.463",
"vulnStatus": "Received",
"lastModified": "2024-03-14T12:52:16.723",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "Use of Hard-coded Cryptographic Key vulnerability in\u00a0OpenText\u2122\u00a0Exceed Turbo X affecting versions 12.5.1 and 12.5.2. The vulnerability could compromise the cryptographic keys.\u00a0\u00a0"
},
{
"lang": "es",
"value": "Uso de vulnerabilidad de clave criptogr\u00e1fica codificada en OpenText\u2122 Exceed Turbo X que afecta a las versiones 12.5.1 y 12.5.2. La vulnerabilidad podr\u00eda comprometer las claves criptogr\u00e1ficas."
}
],
"metrics": {

View File

@ -2,12 +2,16 @@
"id": "CVE-2023-38536",
"sourceIdentifier": "security@opentext.com",
"published": "2024-03-13T22:15:08.710",
"lastModified": "2024-03-13T22:15:08.710",
"vulnStatus": "Received",
"lastModified": "2024-03-14T12:52:16.723",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "HTML injection in\u00a0OpenText\u2122\u00a0Exceed Turbo X affecting version 12.5.1. The vulnerability could result in Cross site scripting.\u00a0\u00a0"
},
{
"lang": "es",
"value": "Inyecci\u00f3n de HTML en OpenText\u2122 Exceed Turbo X que afecta a la versi\u00f3n 12.5.1. La vulnerabilidad podr\u00eda provocar Cross Site Scripting."
}
],
"metrics": {

View File

@ -2,12 +2,16 @@
"id": "CVE-2023-41504",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-03-13T21:15:53.863",
"lastModified": "2024-03-13T21:15:53.863",
"vulnStatus": "Received",
"lastModified": "2024-03-14T12:52:21.763",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "SQL Injection vulnerability in Student Enrollment In PHP 1.0 allows attackers to run arbitrary code via the Student Search function."
},
{
"lang": "es",
"value": "Vulnerabilidad de inyecci\u00f3n SQL en Student Enrollment en PHP 1.0 permite a los atacantes ejecutar c\u00f3digo arbitrario a trav\u00e9s de la funci\u00f3n de b\u00fasqueda de estudiantes."
}
],
"metrics": {},

View File

@ -2,12 +2,16 @@
"id": "CVE-2023-41505",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-03-13T21:15:53.910",
"lastModified": "2024-03-13T21:15:53.910",
"vulnStatus": "Received",
"lastModified": "2024-03-14T12:52:21.763",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "An arbitrary file upload vulnerability in the Add Student's Profile Picture function of Student Enrollment In PHP v1.0 allows attackers to execute arbitrary code via uploading a crafted PHP file."
},
{
"lang": "es",
"value": "Una vulnerabilidad de carga de archivos arbitrarios en la funci\u00f3n Agregar imagen de perfil del estudiante de Student Enrollment In PHP v1.0 permite a los atacantes ejecutar c\u00f3digo arbitrario cargando un archivo PHP manipulado."
}
],
"metrics": {},

View File

@ -2,12 +2,16 @@
"id": "CVE-2023-50726",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-03-13T21:15:54.797",
"lastModified": "2024-03-13T21:15:54.797",
"vulnStatus": "Received",
"lastModified": "2024-03-14T12:52:21.763",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "Argo CD is a declarative, GitOps continuous delivery tool for Kubernetes. \"Local sync\" is an Argo CD feature that allows developers to temporarily override an Application's manifests with locally-defined manifests. Use of the feature should generally be limited to highly-trusted users, since it allows the user to bypass any merge protections in git. An improper validation bug allows users who have `create` privileges but not `override` privileges to sync local manifests on app creation. All other restrictions, including AppProject restrictions are still enforced. The only restriction which is not enforced is that the manifests come from some approved git/Helm/OCI source. The bug was introduced in 1.2.0-rc1 when the local manifest sync feature was added. The bug has been patched in Argo CD versions 2.10.3, 2.9.8, and 2.8.12. Users are advised to upgrade. Users unable to upgrade may mitigate the risk of branch protection bypass by removing `applications, create` RBAC access. The only way to eliminate the issue without removing RBAC access is to upgrade to a patched version."
},
{
"lang": "es",
"value": "Argo CD es una herramienta declarativa de entrega continua de GitOps para Kubernetes. La \"sincronizaci\u00f3n local\" es una caracter\u00edstica de Argo CD que permite a los desarrolladores anular temporalmente los manifiestos de una aplicaci\u00f3n con manifiestos definidos localmente. El uso de la funci\u00f3n generalmente debe limitarse a usuarios de alta confianza, ya que permite al usuario evitar cualquier protecci\u00f3n de combinaci\u00f3n en git. Un error de validaci\u00f3n inadecuado permite a los usuarios que tienen privilegios de \"crear\" pero no privilegios de \"anular\" sincronizar manifiestos locales al crear la aplicaci\u00f3n. Todas las dem\u00e1s restricciones, incluidas las de AppProject, a\u00fan se aplican. La \u00fanica restricci\u00f3n que no se aplica es que los manifiestos provengan de alguna fuente aprobada de git/Helm/OCI. El error se introdujo en 1.2.0-rc1 cuando se agreg\u00f3 la funci\u00f3n de sincronizaci\u00f3n del manifiesto local. El error se ha solucionado en las versiones 2.10.3, 2.9.8 y 2.8.12 de Argo CD. Se recomienda a los usuarios que actualicen. Los usuarios que no puedan actualizar pueden mitigar el riesgo de eludir la protecci\u00f3n de sucursal eliminando el acceso RBAC \"aplicaciones, creaci\u00f3n\". La \u00fanica forma de eliminar el problema sin eliminar el acceso a RBAC es actualizar a una versi\u00f3n parcheada."
}
],
"metrics": {

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-0311",
"sourceIdentifier": "trellixpsirt@trellix.com",
"published": "2024-03-14T09:15:46.580",
"lastModified": "2024-03-14T09:15:46.580",
"vulnStatus": "Received",
"lastModified": "2024-03-14T12:52:09.877",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-0312",
"sourceIdentifier": "trellixpsirt@trellix.com",
"published": "2024-03-14T09:15:46.943",
"lastModified": "2024-03-14T09:15:46.943",
"vulnStatus": "Received",
"lastModified": "2024-03-14T12:52:09.877",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-0313",
"sourceIdentifier": "trellixpsirt@trellix.com",
"published": "2024-03-14T09:15:47.153",
"lastModified": "2024-03-14T09:15:47.153",
"vulnStatus": "Received",
"lastModified": "2024-03-14T12:52:09.877",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,12 +2,16 @@
"id": "CVE-2024-0799",
"sourceIdentifier": "vulnreport@tenable.com",
"published": "2024-03-13T19:15:46.510",
"lastModified": "2024-03-13T19:15:46.510",
"vulnStatus": "Received",
"lastModified": "2024-03-14T12:52:21.763",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "An authentication bypass vulnerability exists in Arcserve Unified Data Protection 9.2 and 8.1 in the edge-app-base-webui.jar!com.ca.arcserve.edge.app.base.ui.server.EdgeLoginServiceImpl.doLogin() function within wizardLogin."
},
{
"lang": "es",
"value": "Existe una vulnerabilidad de omisi\u00f3n de autenticaci\u00f3n en Arcserve Unified Data Protection 9.2 y 8.1 en la funci\u00f3n edge-app-base-webui.jar!com.ca.arcserve.edge.app.base.ui.server.EdgeLoginServiceImpl.doLogin() dentro de WizardLogin."
}
],
"metrics": {

View File

@ -2,12 +2,16 @@
"id": "CVE-2024-0800",
"sourceIdentifier": "vulnreport@tenable.com",
"published": "2024-03-13T19:15:46.757",
"lastModified": "2024-03-13T19:15:46.757",
"vulnStatus": "Received",
"lastModified": "2024-03-14T12:52:21.763",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "A path traversal vulnerability exists in Arcserve Unified Data Protection 9.2 and 8.1 in edge-app-base-webui.jar!com.ca.arcserve.edge.app.base.ui.server.servlet.ImportNodeServlet."
},
{
"lang": "es",
"value": "Existe una vulnerabilidad de path traversal en Arcserve Unified Data Protection 9.2 y 8.1 en edge-app-base-webui.jar!com.ca.arcserve.edge.app.base.ui.server.servlet.ImportNodeServlet."
}
],
"metrics": {

View File

@ -2,12 +2,16 @@
"id": "CVE-2024-0801",
"sourceIdentifier": "vulnreport@tenable.com",
"published": "2024-03-13T19:15:46.943",
"lastModified": "2024-03-13T19:15:46.943",
"vulnStatus": "Received",
"lastModified": "2024-03-14T12:52:21.763",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "A denial of service vulnerability exists in Arcserve Unified Data Protection 9.2 and 8.1 in ASNative.dll."
},
{
"lang": "es",
"value": "Existe una vulnerabilidad de denegaci\u00f3n de servicio en Arcserve Unified Data Protection 9.2 y 8.1 en ASNative.dll."
}
],
"metrics": {

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-1221",
"sourceIdentifier": "eb41dac7-0af8-4f84-9f6d-0272772514f4",
"published": "2024-03-14T03:15:06.607",
"lastModified": "2024-03-14T03:15:06.607",
"vulnStatus": "Received",
"lastModified": "2024-03-14T12:52:16.723",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-1222",
"sourceIdentifier": "eb41dac7-0af8-4f84-9f6d-0272772514f4",
"published": "2024-03-14T03:15:07.090",
"lastModified": "2024-03-14T03:15:07.090",
"vulnStatus": "Received",
"lastModified": "2024-03-14T12:52:16.723",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-1223",
"sourceIdentifier": "eb41dac7-0af8-4f84-9f6d-0272772514f4",
"published": "2024-03-14T03:15:07.580",
"lastModified": "2024-03-14T03:15:07.580",
"vulnStatus": "Received",
"lastModified": "2024-03-14T12:52:09.877",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-1654",
"sourceIdentifier": "eb41dac7-0af8-4f84-9f6d-0272772514f4",
"published": "2024-03-14T03:15:08.033",
"lastModified": "2024-03-14T03:15:08.033",
"vulnStatus": "Received",
"lastModified": "2024-03-14T12:52:09.877",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-1882",
"sourceIdentifier": "eb41dac7-0af8-4f84-9f6d-0272772514f4",
"published": "2024-03-14T04:15:08.003",
"lastModified": "2024-03-14T04:15:08.003",
"vulnStatus": "Received",
"lastModified": "2024-03-14T12:52:09.877",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-1883",
"sourceIdentifier": "eb41dac7-0af8-4f84-9f6d-0272772514f4",
"published": "2024-03-14T04:15:08.353",
"lastModified": "2024-03-14T04:15:08.353",
"vulnStatus": "Received",
"lastModified": "2024-03-14T12:52:09.877",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-1884",
"sourceIdentifier": "eb41dac7-0af8-4f84-9f6d-0272772514f4",
"published": "2024-03-14T04:15:08.697",
"lastModified": "2024-03-14T04:15:08.697",
"vulnStatus": "Received",
"lastModified": "2024-03-14T12:52:09.877",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,12 +2,16 @@
"id": "CVE-2024-2079",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-03-13T22:15:11.910",
"lastModified": "2024-03-13T22:15:11.910",
"vulnStatus": "Received",
"lastModified": "2024-03-14T12:52:16.723",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "The WPBakery Page Builder Addons by Livemesh plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'per_line_mobile' shortcode in all versions up to, and including, 3.8.1 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers with contributor-level and above permissions to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page."
},
{
"lang": "es",
"value": "El complemento WPBakery Page Builder Addons de Livemesh para WordPress es vulnerable a Cross-Site Scripting Almacenado a trav\u00e9s del c\u00f3digo corto 'per_line_mobile' del complemento en todas las versiones hasta la 3.8.1 incluida debido a una sanitizaci\u00f3n de entrada insuficiente y a un escape de salida en los atributos proporcionados por el usuario. Esto hace posible que atacantes autenticados con permisos de nivel de colaborador y superiores inyecten scripts web arbitrarios en p\u00e1ginas que se ejecutar\u00e1n cada vez que un usuario acceda a una p\u00e1gina inyectada."
}
],
"metrics": {

View File

@ -2,12 +2,16 @@
"id": "CVE-2024-22167",
"sourceIdentifier": "psirt@wdc.com",
"published": "2024-03-13T21:15:55.343",
"lastModified": "2024-03-13T21:15:55.343",
"vulnStatus": "Received",
"lastModified": "2024-03-14T12:52:21.763",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "A potential DLL hijacking vulnerability in the SanDisk PrivateAccess application for Windows that could lead to arbitrary code execution in the context of the system user. This vulnerability is only exploitable locally if an attacker has access to a copy of the user's vault or has already gained access into a user's system. This attack is limited to the system in context and cannot be propagated.\u00a0\n"
},
{
"lang": "es",
"value": "Una posible vulnerabilidad de secuestro de DLL en la aplicaci\u00f3n SanDisk PrivateAccess para Windows que podr\u00eda provocar la ejecuci\u00f3n de c\u00f3digo arbitrario en el contexto del usuario del sistema. Esta vulnerabilidad solo se puede explotar localmente si un atacante tiene acceso a una copia de la b\u00f3veda del usuario o ya ha obtenido acceso al sistema de un usuario. Este ataque se limita al sistema en contexto y no se puede propagar."
}
],
"metrics": {

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-22396",
"sourceIdentifier": "PSIRT@sonicwall.com",
"published": "2024-03-14T04:15:09.080",
"lastModified": "2024-03-14T04:15:09.080",
"vulnStatus": "Received",
"lastModified": "2024-03-14T12:52:09.877",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-22397",
"sourceIdentifier": "PSIRT@sonicwall.com",
"published": "2024-03-14T04:15:09.297",
"lastModified": "2024-03-14T04:15:09.297",
"vulnStatus": "Received",
"lastModified": "2024-03-14T12:52:09.877",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-22398",
"sourceIdentifier": "PSIRT@sonicwall.com",
"published": "2024-03-14T04:15:09.417",
"lastModified": "2024-03-14T04:15:09.417",
"vulnStatus": "Received",
"lastModified": "2024-03-14T12:52:09.877",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,12 +2,16 @@
"id": "CVE-2024-2242",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-03-13T22:15:12.173",
"lastModified": "2024-03-13T22:15:12.173",
"vulnStatus": "Received",
"lastModified": "2024-03-14T12:52:16.723",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "The Contact Form 7 plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the \u2018active-tab\u2019 parameter in all versions up to, and including, 5.9 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link."
},
{
"lang": "es",
"value": "El complemento Contact Form 7 para WordPress es vulnerable a Cross-Site Scripting Reflejado a trav\u00e9s del par\u00e1metro 'active-tab' en todas las versiones hasta la 5.9 incluida debido a una sanitizaci\u00f3n de entrada y un escape de salida insuficientes. Esto hace posible que atacantes no autenticados inyecten scripts web arbitrarios en p\u00e1ginas que se ejecutan si logran enga\u00f1ar a un usuario para que realice una acci\u00f3n como hacer clic en un enlace."
}
],
"metrics": {

View File

@ -2,12 +2,16 @@
"id": "CVE-2024-24105",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-03-13T21:15:58.870",
"lastModified": "2024-03-13T21:15:58.870",
"vulnStatus": "Received",
"lastModified": "2024-03-14T12:52:16.723",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "SQL Injection vulnerability in Code-projects Computer Science Time Table System 1.0 allows attackers to run arbitrary code via adminFormvalidation.php."
},
{
"lang": "es",
"value": "Vulnerabilidad de inyecci\u00f3n SQL en Code-projects Computer Science Time Table System 1.0 permite a atacantes ejecutar c\u00f3digo arbitrario a trav\u00e9s de adminFormvalidation.php."
}
],
"metrics": {},

View File

@ -2,12 +2,16 @@
"id": "CVE-2024-24692",
"sourceIdentifier": "security@zoom.us",
"published": "2024-03-13T20:15:07.273",
"lastModified": "2024-03-13T20:15:07.273",
"vulnStatus": "Received",
"lastModified": "2024-03-14T12:52:21.763",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "Race condition in the installer for Zoom Rooms Client for Windows before version 5.17.5 may allow an authenticated user to conduct a denial of service via local access."
},
{
"lang": "es",
"value": "La condici\u00f3n de ejecuci\u00f3n en el instalador de Zoom Rooms Client para Windows anterior a la versi\u00f3n 5.17.5 puede permitir que un usuario autenticado realice una denegaci\u00f3n de servicio a trav\u00e9s del acceso local."
}
],
"metrics": {

View File

@ -2,12 +2,16 @@
"id": "CVE-2024-24693",
"sourceIdentifier": "security@zoom.us",
"published": "2024-03-13T20:15:07.760",
"lastModified": "2024-03-13T20:15:07.760",
"vulnStatus": "Received",
"lastModified": "2024-03-14T12:52:21.763",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "Improper access control in the installer for Zoom Rooms Client for Windows before version 5.17.5 may allow an authenticated user to conduct a denial of service via local access.\n\n"
},
{
"lang": "es",
"value": "Un control de acceso inadecuado en el instalador de Zoom Rooms Client para Windows anterior a la versi\u00f3n 5.17.5 puede permitir que un usuario autenticado realice una denegaci\u00f3n de servicio a trav\u00e9s del acceso local."
}
],
"metrics": {

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-25228",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-03-14T02:15:50.613",
"lastModified": "2024-03-14T02:15:50.613",
"vulnStatus": "Received",
"lastModified": "2024-03-14T12:52:16.723",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,12 +2,16 @@
"id": "CVE-2024-25250",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-03-13T21:15:58.943",
"lastModified": "2024-03-13T21:15:58.943",
"vulnStatus": "Received",
"lastModified": "2024-03-14T12:52:16.723",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "SQL Injection vulnerability in code-projects Agro-School Management System 1.0 allows attackers to run arbitrary code via the Login page."
},
{
"lang": "es",
"value": "Vulnerabilidad de inyecci\u00f3n SQL en code-projects Agro-School Management System 1.0 permite a los atacantes ejecutar c\u00f3digo arbitrario a trav\u00e9s de la p\u00e1gina de inicio de sesi\u00f3n."
}
],
"metrics": {},

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-25649",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-03-14T03:15:08.540",
"lastModified": "2024-03-14T03:15:08.540",
"vulnStatus": "Received",
"lastModified": "2024-03-14T12:52:09.877",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-25650",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-03-14T02:15:50.690",
"lastModified": "2024-03-14T02:15:50.690",
"vulnStatus": "Received",
"lastModified": "2024-03-14T12:52:16.723",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-25651",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-03-14T03:15:08.727",
"lastModified": "2024-03-14T03:15:08.727",
"vulnStatus": "Received",
"lastModified": "2024-03-14T12:52:09.877",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-25652",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-03-14T03:15:08.877",
"lastModified": "2024-03-14T03:15:08.877",
"vulnStatus": "Received",
"lastModified": "2024-03-14T12:52:09.877",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-25653",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-03-14T03:15:09.017",
"lastModified": "2024-03-14T03:15:09.017",
"vulnStatus": "Received",
"lastModified": "2024-03-14T12:52:09.877",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,12 +2,16 @@
"id": "CVE-2024-27097",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-03-13T21:15:58.993",
"lastModified": "2024-03-13T21:15:58.993",
"vulnStatus": "Received",
"lastModified": "2024-03-14T12:52:16.723",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "A user endpoint didn't perform filtering on an incoming parameter, which was added directly to the application log. This could lead to an attacker injecting false log entries or corrupt the log file format. This has been fixed in the CKAN versions 2.9.11 and 2.10.4. Users are advised to upgrade. Users unable to upgrade should override the `/user/reset` endpoint to filter the `id` parameter in order to exclude newlines.\n\n"
},
{
"lang": "es",
"value": "Un endpoint de usuario no realiz\u00f3 el filtrado de un par\u00e1metro entrante, que se agreg\u00f3 directamente al registro de la aplicaci\u00f3n. Esto podr\u00eda provocar que un atacante inyecte entradas de registro falsas o corrompa el formato del archivo de registro. Esto se ha solucionado en las versiones 2.9.11 y 2.10.4 de CKAN. Se recomienda a los usuarios que actualicen. Los usuarios que no puedan actualizar deben anular el endpoint `/user/reset` para filtrar el par\u00e1metro `id` y excluir las nuevas l\u00edneas."
}
],
"metrics": {

View File

@ -2,12 +2,16 @@
"id": "CVE-2024-27102",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-03-13T21:15:59.590",
"lastModified": "2024-03-13T21:15:59.590",
"vulnStatus": "Received",
"lastModified": "2024-03-14T12:52:16.723",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "Wings is the server control plane for Pterodactyl Panel. This vulnerability impacts anyone running the affected versions of Wings. The vulnerability can potentially be used to access files and directories on the host system. The full scope of impact is exactly unknown, but reading files outside of a server's base directory (sandbox root) is possible. In order to use this exploit, an attacker must have an existing \"server\" allocated and controlled by Wings. Details on the exploitation of this vulnerability are embargoed until March 27th, 2024 at 18:00 UTC. In order to mitigate this vulnerability, a full rewrite of the entire server filesystem was necessary. Because of this, the size of the patch is massive, however effort was made to reduce the amount of breaking changes. Users are advised to update to version 1.11.9. There are no known workarounds for this vulnerability."
},
{
"lang": "es",
"value": "Wings es el plano de control del servidor de Pterodactyl Panel. Esta vulnerabilidad afecta a cualquiera que ejecute las versiones afectadas de Wings. La vulnerabilidad puede usarse potencialmente para acceder a archivos y directorios en el sistema host. Se desconoce exactamente el alcance total del impacto, pero es posible leer archivos fuera del directorio base de un servidor (ra\u00edz de la zona de pruebas). Para utilizar este exploit, un atacante debe tener un \"servidor\" existente asignado y controlado por Wings. Los detalles sobre la explotaci\u00f3n de esta vulnerabilidad est\u00e1n embargados hasta el 27 de marzo de 2024 a las 18:00 UTC. Para mitigar esta vulnerabilidad, fue necesaria una reescritura completa de todo el sistema de archivos del servidor. Debido a esto, el tama\u00f1o del parche es enorme, sin embargo, se hizo un esfuerzo para reducir la cantidad de cambios importantes. Se recomienda a los usuarios que actualicen a la versi\u00f3n 1.11.9. No se conocen workarounds para esta vulnerabilidad."
}
],
"metrics": {

View File

@ -2,12 +2,16 @@
"id": "CVE-2024-27703",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-03-13T22:15:11.843",
"lastModified": "2024-03-13T22:15:11.843",
"vulnStatus": "Received",
"lastModified": "2024-03-14T12:52:16.723",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "Cross Site Scripting vulnerability in Leantime 3.0.6 allows a remote attacker to execute arbitrary code via the to-do title parameter."
},
{
"lang": "es",
"value": "Una vulnerabilidad de Cross Site Scripting en Leantime 3.0.6 permite a un atacante remoto ejecutar c\u00f3digo arbitrario a trav\u00e9s del par\u00e1metro de t\u00edtulo de tareas pendientes."
}
],
"metrics": {},

View File

@ -2,12 +2,16 @@
"id": "CVE-2024-27986",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-03-14T09:15:47.363",
"lastModified": "2024-03-14T09:15:47.363",
"vulnStatus": "Received",
"lastModified": "2024-03-14T12:52:09.877",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Livemesh Elementor Addons by Livemesh allows Stored XSS.This issue affects Elementor Addons by Livemesh: from n/a through 8.3.5.\n\n"
},
{
"lang": "es",
"value": "La vulnerabilidad de neutralizaci\u00f3n inadecuada de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en Livemesh Elementor Addons de Livemesh permite almacenar XSS. Este problema afecta a Elementor Addons de Livemesh: desde n/a hasta 8.3.5."
}
],
"metrics": {

View File

@ -2,12 +2,16 @@
"id": "CVE-2024-28175",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-03-13T21:16:00.570",
"lastModified": "2024-03-13T21:16:00.570",
"vulnStatus": "Received",
"lastModified": "2024-03-14T12:52:16.723",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "Argo CD is a declarative, GitOps continuous delivery tool for Kubernetes. Due to the improper URL protocols filtering of links specified in the `link.argocd.argoproj.io` annotations in the application summary component, an attacker can achieve cross-site scripting with elevated permissions. All unpatched versions of Argo CD starting with v1.0.0 are vulnerable to a cross-site scripting (XSS) bug allowing a malicious user to inject a javascript: link in the UI. When clicked by a victim user, the script will execute with the victim's permissions (up to and including admin). This vulnerability allows an attacker to perform arbitrary actions on behalf of the victim via the API, such as creating, modifying, and deleting Kubernetes resources. A patch for this vulnerability has been released in Argo CD versions v2.10.3 v2.9.8, and v2.8.12. There are no completely-safe workarounds besides upgrading. The safest alternative, if upgrading is not possible, would be to create a Kubernetes admission controller to reject any resources with an annotation starting with link.argocd.argoproj.io or reject the resource if the value use an improper URL protocol. This validation will need to be applied in all clusters managed by ArgoCD.\n\n"
},
{
"lang": "es",
"value": "Argo CD es una herramienta declarativa de entrega continua de GitOps para Kubernetes. Debido al filtrado inadecuado de los protocolos URL de los enlaces especificados en las anotaciones `link.argocd.argoproj.io` en el componente de resumen de la aplicaci\u00f3n, un atacante puede lograr Cross Site Scripting con permisos elevados. Todas las versiones sin parches de Argo CD que comienzan con v1.0.0 son vulnerables a un error de Cross Site Scripting (XSS) que permite a un usuario malintencionado inyectar un enlace javascript: en la interfaz de usuario. Cuando un usuario v\u00edctima hace clic en \u00e9l, el script se ejecutar\u00e1 con los permisos de la v\u00edctima (hasta administrador incluido). Esta vulnerabilidad permite a un atacante realizar acciones arbitrarias en nombre de la v\u00edctima a trav\u00e9s de la API, como crear, modificar y eliminar recursos de Kubernetes. Se lanz\u00f3 un parche para esta vulnerabilidad en las versiones de Argo CD v2.10.3 v2.9.8 y v2.8.12. No existen soluciones alternativas completamente seguras adem\u00e1s de actualizar. La alternativa m\u00e1s segura, si no es posible la actualizaci\u00f3n, ser\u00eda crear un controlador de admisi\u00f3n de Kubernetes para rechazar cualquier recurso con una anotaci\u00f3n que comience con link.argocd.argoproj.io o rechazar el recurso si el valor utiliza un protocolo URL inadecuado. Esta validaci\u00f3n deber\u00e1 aplicarse en todos los cl\u00fasteres gestionados por ArgoCD."
}
],
"metrics": {

View File

@ -2,12 +2,16 @@
"id": "CVE-2024-28192",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-03-13T21:16:00.823",
"lastModified": "2024-03-13T21:16:00.823",
"vulnStatus": "Received",
"lastModified": "2024-03-14T12:52:16.723",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "your_spotify is an open source, self hosted Spotify tracking dashboard. YourSpotify version <1.8.0 is vulnerable to NoSQL injection in the public access token processing logic. Attackers can fully bypass the public token authentication mechanism, regardless if a public token has been generated before or not, without any user interaction or prerequisite knowledge. This vulnerability allows an attacker to fully bypass the public token authentication mechanism, regardless if a public token has been generated before or not, without any user interaction or prerequisite knowledge. This issue has been addressed in version 1.8.0. Users are advised to upgrade. There are no known workarounds for this vulnerability."
},
{
"lang": "es",
"value": "your_spotify es un panel de seguimiento de Spotify autohospedado y de c\u00f3digo abierto. La versi\u00f3n de YourSpotify &lt;1.8.0 es vulnerable a la inyecci\u00f3n NoSQL en la l\u00f3gica de procesamiento del token de acceso p\u00fablico. Los atacantes pueden eludir por completo el mecanismo de autenticaci\u00f3n de token p\u00fablico, independientemente de si se ha generado un token p\u00fablico antes o no, sin ninguna interacci\u00f3n del usuario ni conocimiento previo. Esta vulnerabilidad permite a un atacante eludir por completo el mecanismo de autenticaci\u00f3n de token p\u00fablico, independientemente de si se ha generado un token p\u00fablico antes o no, sin ninguna interacci\u00f3n del usuario ni conocimiento previo. Este problema se solucion\u00f3 en la versi\u00f3n 1.8.0. Se recomienda a los usuarios que actualicen. No se conocen workarounds para esta vulnerabilidad."
}
],
"metrics": {

View File

@ -2,12 +2,16 @@
"id": "CVE-2024-28193",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-03-13T21:16:01.077",
"lastModified": "2024-03-13T21:16:01.077",
"vulnStatus": "Received",
"lastModified": "2024-03-14T12:52:16.723",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "your_spotify is an open source, self hosted Spotify tracking dashboard. YourSpotify version <1.8.0 allows users to create a public token in the settings, which can be used to provide guest-level access to the information of that specific user in YourSpotify. The /me API endpoint discloses Spotify API access and refresh tokens to guest users. Attackers with access to a public token for guest access to YourSpotify can therefore obtain access to Spotify API tokens of YourSpotify users. As a consequence, attackers may extract profile information, information about listening habits, playlists and other information from the corresponding Spotify profile. In addition, the attacker can pause and resume playback in the Spotify app at will. This issue has been resolved in version 1.8.0. Users are advised to upgrade. There are no known workarounds for this issue."
},
{
"lang": "es",
"value": "your_spotify es un panel de seguimiento de Spotify autohospedado y de c\u00f3digo abierto. La versi\u00f3n &lt;1.8.0 de YourSpotify permite a los usuarios crear un token p\u00fablico en la configuraci\u00f3n, que se puede utilizar para proporcionar acceso a nivel de invitado a la informaci\u00f3n de ese usuario espec\u00edfico en YourSpotify. El punto final de la API /me revela el acceso a la API de Spotify y los tokens de actualizaci\u00f3n a los usuarios invitados. Por lo tanto, los atacantes con acceso a un token p\u00fablico para el acceso de invitados a YourSpotify pueden obtener acceso a los tokens API de Spotify de los usuarios de YourSpotify. Como consecuencia, los atacantes pueden extraer informaci\u00f3n de perfil, informaci\u00f3n sobre h\u00e1bitos de escucha, listas de reproducci\u00f3n y otra informaci\u00f3n del perfil de Spotify correspondiente. Adem\u00e1s, el atacante puede pausar y reanudar la reproducci\u00f3n en la aplicaci\u00f3n Spotify a voluntad. Este problema se resolvi\u00f3 en la versi\u00f3n 1.8.0. Se recomienda a los usuarios que actualicen. No se conocen workarounds para este problema."
}
],
"metrics": {

View File

@ -2,12 +2,16 @@
"id": "CVE-2024-28194",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-03-13T19:15:47.110",
"lastModified": "2024-03-13T19:15:47.110",
"vulnStatus": "Received",
"lastModified": "2024-03-14T12:52:21.763",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "your_spotify is an open source, self hosted Spotify tracking dashboard. YourSpotify versions < 1.8.0 use a hardcoded JSON Web Token (JWT) secret to sign authentication tokens. Attackers can use this well-known value to forge valid authentication tokens for arbitrary users. This vulnerability allows attackers to bypass authentication and authenticate as arbitrary YourSpotify users, including admin users. This issue has been addressed in version 1.8.0. Users are advised to upgrade. There are no known workarounds for this vulnerability."
},
{
"lang": "es",
"value": "your_spotify es un panel de seguimiento de Spotify autohospedado y de c\u00f3digo abierto. Las versiones de YourSpotify &lt; 1.8.0 utilizan un secreto JSON Web Token (JWT) codificado para firmar tokens de autenticaci\u00f3n. Los atacantes pueden utilizar este valor conocido para falsificar tokens de autenticaci\u00f3n v\u00e1lidos para usuarios arbitrarios. Esta vulnerabilidad permite a los atacantes eludir la autenticaci\u00f3n y autenticarse como usuarios arbitrarios de YourSpotify, incluidos los usuarios administradores. Este problema se solucion\u00f3 en la versi\u00f3n 1.8.0. Se recomienda a los usuarios que actualicen. No se conocen workarounds para esta vulnerabilidad."
}
],
"metrics": {

View File

@ -2,12 +2,16 @@
"id": "CVE-2024-28251",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-03-14T00:15:33.630",
"lastModified": "2024-03-14T00:15:33.630",
"vulnStatus": "Received",
"lastModified": "2024-03-14T12:52:16.723",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "Querybook is a Big Data Querying UI, combining collocated table metadata and a simple notebook interface. Querybook's datadocs functionality works by using a Websocket Server. The client talks to this WSS whenever updating/deleting/reading any cells as well as for watching the live status of query executions. Currently the CORS setting allows all origins, which could result in cross-site websocket hijacking and allow attackers to read/edit/remove datadocs of the user. This issue has been addressed in version 3.32.0. Users are advised to upgrade. There are no known workarounds for this vulnerability."
},
{
"lang": "es",
"value": "Querybook es una interfaz de usuario de consulta de Big Data que combina metadatos de tablas colocadas y una interfaz de cuaderno simple. La funcionalidad de documentos de datos de Querybook funciona mediante un servidor Websocket. El cliente habla con este WSS cada vez que actualiza, elimina o lee cualquier celda, as\u00ed como para observar el estado en vivo de las ejecuciones de consultas. Actualmente, la configuraci\u00f3n CORS permite todos los or\u00edgenes, lo que podr\u00eda resultar en el secuestro de websocket entre sitios y permitir a los atacantes leer/editar/eliminar documentos de datos del usuario. Este problema se solucion\u00f3 en la versi\u00f3n 3.32.0. Se recomienda a los usuarios que actualicen. No se conocen workarounds para esta vulnerabilidad."
}
],
"metrics": {

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-28388",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-03-14T03:15:09.173",
"lastModified": "2024-03-14T03:15:09.173",
"vulnStatus": "Received",
"lastModified": "2024-03-14T12:52:09.877",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-28390",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-03-14T04:15:09.640",
"lastModified": "2024-03-14T04:15:09.640",
"vulnStatus": "Received",
"lastModified": "2024-03-14T12:52:09.877",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-28391",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-03-14T04:15:09.697",
"lastModified": "2024-03-14T04:15:09.697",
"vulnStatus": "Received",
"lastModified": "2024-03-14T12:52:09.877",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,12 +2,16 @@
"id": "CVE-2024-28662",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-03-13T21:16:01.357",
"lastModified": "2024-03-13T21:16:01.357",
"vulnStatus": "Received",
"lastModified": "2024-03-14T12:52:16.723",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "A Cross Site Scripting vulnerability exists in Piwigo before 14.3.0 script because of missing sanitization in create_tag in admin/include/functions.php."
},
{
"lang": "es",
"value": "Existe una vulnerabilidad de Cross Site Scripting en Piwigo anterior a la versi\u00f3n 14.3.0 debido a la falta de sanitizaci\u00f3n en create_tag en admin/include/functions.php."
}
],
"metrics": {},

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-28746",
"sourceIdentifier": "security@apache.org",
"published": "2024-03-14T09:15:47.577",
"lastModified": "2024-03-14T09:15:47.577",
"vulnStatus": "Received",
"lastModified": "2024-03-14T12:52:09.877",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -9,13 +9,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update
```plain
2024-03-14T11:00:43.303062+00:00
2024-03-14T13:00:40.736016+00:00
```
### Most recent CVE Modification Timestamp synchronized with NVD
```plain
2024-03-14T10:15:07.027000+00:00
2024-03-14T12:52:21.763000+00:00
```
### Last Data Feed Release
@ -34,22 +34,39 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
### CVEs added in the last Commit
Recently added CVEs: `7`
Recently added CVEs: `0`
* [CVE-2024-0311](CVE-2024/CVE-2024-03xx/CVE-2024-0311.json) (`2024-03-14T09:15:46.580`)
* [CVE-2024-0312](CVE-2024/CVE-2024-03xx/CVE-2024-0312.json) (`2024-03-14T09:15:46.943`)
* [CVE-2024-0313](CVE-2024/CVE-2024-03xx/CVE-2024-0313.json) (`2024-03-14T09:15:47.153`)
* [CVE-2024-2437](CVE-2024/CVE-2024-24xx/CVE-2024-2437.json) (`2024-03-14T09:15:47.690`)
* [CVE-2024-2438](CVE-2024/CVE-2024-24xx/CVE-2024-2438.json) (`2024-03-14T09:15:47.820`)
* [CVE-2024-27986](CVE-2024/CVE-2024-279xx/CVE-2024-27986.json) (`2024-03-14T09:15:47.363`)
* [CVE-2024-28746](CVE-2024/CVE-2024-287xx/CVE-2024-28746.json) (`2024-03-14T09:15:47.577`)
### CVEs modified in the last Commit
Recently modified CVEs: `1`
Recently modified CVEs: `51`
* [CVE-2024-2247](CVE-2024/CVE-2024-22xx/CVE-2024-2247.json) (`2024-03-14T10:15:07.027`)
* [CVE-2024-2242](CVE-2024/CVE-2024-22xx/CVE-2024-2242.json) (`2024-03-14T12:52:16.723`)
* [CVE-2024-24105](CVE-2024/CVE-2024-241xx/CVE-2024-24105.json) (`2024-03-14T12:52:16.723`)
* [CVE-2024-24692](CVE-2024/CVE-2024-246xx/CVE-2024-24692.json) (`2024-03-14T12:52:21.763`)
* [CVE-2024-24693](CVE-2024/CVE-2024-246xx/CVE-2024-24693.json) (`2024-03-14T12:52:21.763`)
* [CVE-2024-25228](CVE-2024/CVE-2024-252xx/CVE-2024-25228.json) (`2024-03-14T12:52:16.723`)
* [CVE-2024-25250](CVE-2024/CVE-2024-252xx/CVE-2024-25250.json) (`2024-03-14T12:52:16.723`)
* [CVE-2024-25649](CVE-2024/CVE-2024-256xx/CVE-2024-25649.json) (`2024-03-14T12:52:09.877`)
* [CVE-2024-25650](CVE-2024/CVE-2024-256xx/CVE-2024-25650.json) (`2024-03-14T12:52:16.723`)
* [CVE-2024-25651](CVE-2024/CVE-2024-256xx/CVE-2024-25651.json) (`2024-03-14T12:52:09.877`)
* [CVE-2024-25652](CVE-2024/CVE-2024-256xx/CVE-2024-25652.json) (`2024-03-14T12:52:09.877`)
* [CVE-2024-25653](CVE-2024/CVE-2024-256xx/CVE-2024-25653.json) (`2024-03-14T12:52:09.877`)
* [CVE-2024-27097](CVE-2024/CVE-2024-270xx/CVE-2024-27097.json) (`2024-03-14T12:52:16.723`)
* [CVE-2024-27102](CVE-2024/CVE-2024-271xx/CVE-2024-27102.json) (`2024-03-14T12:52:16.723`)
* [CVE-2024-27703](CVE-2024/CVE-2024-277xx/CVE-2024-27703.json) (`2024-03-14T12:52:16.723`)
* [CVE-2024-27986](CVE-2024/CVE-2024-279xx/CVE-2024-27986.json) (`2024-03-14T12:52:09.877`)
* [CVE-2024-28175](CVE-2024/CVE-2024-281xx/CVE-2024-28175.json) (`2024-03-14T12:52:16.723`)
* [CVE-2024-28192](CVE-2024/CVE-2024-281xx/CVE-2024-28192.json) (`2024-03-14T12:52:16.723`)
* [CVE-2024-28193](CVE-2024/CVE-2024-281xx/CVE-2024-28193.json) (`2024-03-14T12:52:16.723`)
* [CVE-2024-28194](CVE-2024/CVE-2024-281xx/CVE-2024-28194.json) (`2024-03-14T12:52:21.763`)
* [CVE-2024-28251](CVE-2024/CVE-2024-282xx/CVE-2024-28251.json) (`2024-03-14T12:52:16.723`)
* [CVE-2024-28388](CVE-2024/CVE-2024-283xx/CVE-2024-28388.json) (`2024-03-14T12:52:09.877`)
* [CVE-2024-28390](CVE-2024/CVE-2024-283xx/CVE-2024-28390.json) (`2024-03-14T12:52:09.877`)
* [CVE-2024-28391](CVE-2024/CVE-2024-283xx/CVE-2024-28391.json) (`2024-03-14T12:52:09.877`)
* [CVE-2024-28662](CVE-2024/CVE-2024-286xx/CVE-2024-28662.json) (`2024-03-14T12:52:16.723`)
* [CVE-2024-28746](CVE-2024/CVE-2024-287xx/CVE-2024-28746.json) (`2024-03-14T12:52:09.877`)
## Download and Usage

View File

@ -146788,7 +146788,7 @@ CVE-2020-11858,0,0,e3751d93c39dc561e0bc014198f20f581fa176040cbe2ea7da77c24143260
CVE-2020-1186,0,0,0bc344b7a1e570a78333d69ceac2d0e453b6f57ae3a2cd74454233da741990bb,2021-07-21T11:39:23.747000
CVE-2020-11860,0,0,75322e26c7491537aebd8a29e900e9c7093fe15733010eee9c9bb3e4be14f63c,2023-11-07T03:15:13.847000
CVE-2020-11861,0,0,6fe965776441227f6a4587f66e1c2005727acd5006d43c90cf9c94883158ac29,2023-11-07T03:15:14.130000
CVE-2020-11862,0,0,1f3cddb225446d39cd27a51f1958cc66e80677058ac55835d58ffe3d43bff11d,2024-03-13T22:15:07.517000
CVE-2020-11862,0,1,c62137152cdb9ff06f3922dab06b4cc639191abf194594e48039b10ffadc9fe5,2024-03-14T12:52:16.723000
CVE-2020-11863,0,0,71da40a557b18027054a68368cb3351ac18462c9781299077036f23bc721afe6,2023-11-07T03:15:14.393000
CVE-2020-11864,0,0,193466154f3750bc68a987368ac71b7ab3853cb0095d413aacf07fec9914b853,2023-11-07T03:15:14.453000
CVE-2020-11865,0,0,1324746ebce0e369b7b9c89137e732152abdf01264749d369f2083e99700e5f5,2023-11-07T03:15:14.523000
@ -225564,7 +225564,7 @@ CVE-2023-36234,0,0,973b7234bf394d41440796898f5347122468df9850574084c231db2df301e
CVE-2023-36235,0,0,5540886c332c02c9f9daa7ee2d25e6b259f3a1d56e1899fba23de10080f667ab,2024-01-24T18:17:24.737000
CVE-2023-36236,0,0,68a4110dbc6185eaae8ba23285e9202d2867e74ac1d26edb597597898cff0d0a,2024-01-20T18:46:09.557000
CVE-2023-36237,0,0,6af9cb38c947543e7f1e44734eae902360e21435f871f5b61e9845d77f1324b1,2024-02-27T14:20:06.637000
CVE-2023-36238,0,0,b39c394ad332b2bb954dfec51378c9f7ded276f271a857567ea0021a0ef9f6fe,2024-03-13T21:15:53.813000
CVE-2023-36238,0,1,6e1da8dbdfd9138aa72b8c59c4ec0940fa128ec282eae77e954f0f22ffc73304,2024-03-14T12:52:21.763000
CVE-2023-36239,0,0,fc89aa2439f680352e63beab2cf34bdec6b034d4732f59c386f4aef3fe1c4d69,2023-06-29T20:58:32.827000
CVE-2023-3624,0,0,6a652e107ad82aabfc202398a7fad51559957fe592a3bbc8e886e1dde4232ef2,2024-02-29T01:40:37.163000
CVE-2023-36243,0,0,79214c4423a5bdbb534e2cceebb1996c4a0cb127d02b7df848796e5e3e60eca4,2023-06-29T21:02:42.490000
@ -227246,9 +227246,9 @@ CVE-2023-3853,0,0,2e2f95d4d18ecd974c9e9668bd9aad5d3272d8b384c563a307e610826b1c64
CVE-2023-38530,0,0,f3d85729456a1be906aa691bb39e4fab14e628b80eac64a0d841010ee9fadf74,2024-01-21T03:02:12.170000
CVE-2023-38531,0,0,1eaf3ff39bdf83e578d5519ad4678d67a1b669b605f325e9b473a722aadc02ff,2023-12-27T19:09:56.817000
CVE-2023-38532,0,0,8d2765379d0a48190c4a0355f977b5f3c3481b6f3c0e372c2189aec2fff3111c,2023-12-22T15:16:50.043000
CVE-2023-38534,0,0,a5e99d032bb1525454c20d4c36d3314a7740b22a90a6f6091162e83604dc56e5,2024-03-13T22:15:08.197000
CVE-2023-38535,0,0,d15c0f1b6265b83f42c200be93fa57f558961c4555b71051139aa623f52cedef,2024-03-13T22:15:08.463000
CVE-2023-38536,0,0,7b2c891a25ad4a2546daca003ec0bb2fe59e97c78f95472b28fd6084fb3ab0df,2024-03-13T22:15:08.710000
CVE-2023-38534,0,1,bdcb44fedb3e74680416becd9b75e16d6a1d2f82387d8415e85ece49170184a6,2024-03-14T12:52:16.723000
CVE-2023-38535,0,1,de8f978974df2f2ee4719e5c40ebb0188b6419d640395c585cb1a75b0e6b8a78,2024-03-14T12:52:16.723000
CVE-2023-38536,0,1,2f791f2772663f383e0571d4fe237e98726462cbd43b2f90613d9684caf738ed,2024-03-14T12:52:16.723000
CVE-2023-38537,0,0,058af9a745864bcd589467c7b4d6902729400b28c16b75c86c3d3ec1b1935a56,2023-11-07T04:17:20.823000
CVE-2023-38538,0,0,aa5068e5cb5f7f9514149a9c201f88ab13f21f5373f3332bad9247612a115f87,2023-11-07T04:17:20.903000
CVE-2023-3854,0,0,a22124eaeda0afe0c7f815ef48ca157fa6c9e2271214c276e9926d6b3d1d1123,2024-02-29T01:40:47.670000
@ -229295,8 +229295,8 @@ CVE-2023-41484,0,0,2021d5253fe16579ccf445b51d808cfc47dfe42287dae5d3335d5a80034f6
CVE-2023-4149,0,0,d79a219615c62d1aa33587a0a183788c3846b9f93f1519a47c404003cfe7ade4,2023-11-29T17:09:20.563000
CVE-2023-4150,0,0,7cbcb166ff389d32932e7e5aef6351f41a08c447edc0d75faa72b6226be84764,2023-11-07T04:22:11.360000
CVE-2023-41503,0,0,8a03f2b23621815253996faeef4dedff8337be56b914569062e8fc959e5a4fa0,2024-03-07T13:52:27.110000
CVE-2023-41504,0,0,54b2159f0554f7743a765d2cec880aec06b95e436420a6d7ff3b58081fbadffc,2024-03-13T21:15:53.863000
CVE-2023-41505,0,0,de7abadf617bc0392a95429c4574053c93e90adff6427fc61e67508e70308310,2024-03-13T21:15:53.910000
CVE-2023-41504,0,1,34741b4f7dba9baeb5198f6b35a56d79bf4f50336b665d18b061906ee69d6b68,2024-03-14T12:52:21.763000
CVE-2023-41505,0,1,6ba46d255a238ffeabec9750e39fdc186100d3795ff4307cea4f9e84aae87ed8,2024-03-14T12:52:21.763000
CVE-2023-41506,0,0,8ea3b02ada1155accd3add0c28958c6e0a97fd9c34e102f201e62b41077dfb62,2024-02-27T14:20:06.637000
CVE-2023-41507,0,0,2f5df285845ec35d22e06c44e84f6a93efee8f6951ed77da531971db01c7dcfb,2023-09-08T16:51:07.547000
CVE-2023-41508,0,0,8a35ce4a62b9631a655302fdf3166d2699322e97463890228046721e6f29a14f,2023-09-11T18:53:12.833000
@ -234895,7 +234895,7 @@ CVE-2023-50722,0,0,fbd1cced3be8f08f72fd640e7299d2239764c6a12913a16fc9db72aecedbe
CVE-2023-50723,0,0,5f758664f83d029b94878ae2f70dfed031014274ec993637af2df376c33c4c37,2023-12-19T20:33:39.183000
CVE-2023-50724,0,0,4912ff5166b1fd07e6e136d001fee1e9eb1d851472eb38638577d23853b5103d,2024-01-02T18:40:50.497000
CVE-2023-50725,0,0,0fc438df98d96b10da1a8c0dc83ac1e83157e0edf5fb21735adea9bb7acb9c12,2024-01-03T03:20:02.863000
CVE-2023-50726,0,0,7e87bae830b24cd107e7eb1c2f0862d27fe65f2f09ebd0057e5b6dc04bd7b7c8,2024-03-13T21:15:54.797000
CVE-2023-50726,0,1,c773e75851083afa4d8135e740d956fc9588d8b1a86bbf3bf172ff777acce7d7,2024-03-14T12:52:21.763000
CVE-2023-50727,0,0,3c7cb702f8185b19b43358a1154f05cdf87449c6807deb38307fed4330add83e,2024-01-03T03:25:51.337000
CVE-2023-50728,0,0,d5a2db73d5e1c297536c48081b3f95fefbd8844770b9bb75e3b4e060b538caad,2023-12-19T20:43:55.837000
CVE-2023-50729,0,0,dca406d2463a99487bc2f647850c1e6acc924ae37882d23abaea265fc5cbc987,2024-01-19T18:03:25.383000
@ -237769,9 +237769,9 @@ CVE-2024-0306,0,0,b16f92c4a57a78580a52f72a84126778ebdaa3c536bd7e40b62367d789d467
CVE-2024-0307,0,0,966cba6a906cf8576b3e22074f9068ff5de1957049fe57d9d5cbc37ee44349fd,2024-02-29T01:43:07.687000
CVE-2024-0308,0,0,9b374c4831c1d7e4a01993ec95f413541808b94d3287b12ae8901324a0a5069f,2024-02-29T01:43:07.777000
CVE-2024-0310,0,0,0c2885511923199ef6e03dac11102e56161395771a2afd9522cbb1c995a0879b,2024-01-17T20:33:20.540000
CVE-2024-0311,1,1,3d442843b5e7608c6bb2d77d9dcb114de76282fb17e1ce6c84f71c9f13b56353,2024-03-14T09:15:46.580000
CVE-2024-0312,1,1,69d12d721f795cc0d22cd17188a5b39718b4865bc47a526252bc99e0123e85cd,2024-03-14T09:15:46.943000
CVE-2024-0313,1,1,a469c3f2b32bec348f652dac84f522f30364e2e85c51d95d77fb481340e1f3de,2024-03-14T09:15:47.153000
CVE-2024-0311,0,1,5db40c4bfc5c09ae2debaff4128c7a78d58419561313ee8a104fb6848ce89c41,2024-03-14T12:52:09.877000
CVE-2024-0312,0,1,5ec0d1d30fe5c772c361d16941ba1aaba9383fd412be8a8cac420e99f9c5b90f,2024-03-14T12:52:09.877000
CVE-2024-0313,0,1,059c0df495eb4715b3d0741f3cc647dfc993e8e7529bac0523f689831427c68b,2024-03-14T12:52:09.877000
CVE-2024-0314,0,0,cb39f430188fa2205e666e0316f77a35baf49f032cd18aa7e33289fa487d3fcc,2024-01-19T18:49:31.097000
CVE-2024-0315,0,0,a788da88ec4ebc0bdd26d80fefc9882fdad32f8f7dd4b621291efc32f023b296,2024-01-19T18:16:37.743000
CVE-2024-0316,0,0,00ac14550b7d60d3281c01b35600da830ada0f25e388579ccb4be08b0f546755,2024-01-19T18:16:51.523000
@ -238169,9 +238169,9 @@ CVE-2024-0795,0,0,9387b7114acb61252d200ea553a236502abf8b7b27e1d3c3681a13f5f3022c
CVE-2024-0796,0,0,117654d8458e901616b5dcc51586c0e623b4d624a6f0f01cf88de01da401d097,2024-02-13T19:40:50.223000
CVE-2024-0797,0,0,009aa845f9ae5bde1b4c5995aa015349e7f6ec6f8f0f63bfb450e718f9300e52,2024-02-13T19:40:35.397000
CVE-2024-0798,0,0,2f1b0b827ba8873a7b25770613534b3f8d6a0f026296e59c448002f514407704,2024-02-26T16:32:25.577000
CVE-2024-0799,0,0,ef16ef0273fd8c1ec75c42c368b11d7f2c68564b13b362dc9617462a82ec82c6,2024-03-13T19:15:46.510000
CVE-2024-0800,0,0,d04df57780e77fe713036b62c2ed37ea9f9600cc051743a8354a61549e035ca4,2024-03-13T19:15:46.757000
CVE-2024-0801,0,0,473fec6aee21dae8f195e1c6b4892dba7567bc4612a820b1485748dc9fb87ada,2024-03-13T19:15:46.943000
CVE-2024-0799,0,1,565bc32cefccc7b54c8a2a9ae87b575853af295d8bcf02c26770d29b4f9124c3,2024-03-14T12:52:21.763000
CVE-2024-0800,0,1,d01951efcbc246e656d94cfc618f67e25f655df800a6a24c24ab44bafa9ef9ed,2024-03-14T12:52:21.763000
CVE-2024-0801,0,1,a89dd8886cf81b019461340c433bdec2c4bcb02d2b385117b1316445faec54f0,2024-03-14T12:52:21.763000
CVE-2024-0804,0,0,70935988ae140dfc2a5adfcb943faf94a39f18e0935f58c282d47a399ed09108,2024-01-29T14:29:25.953000
CVE-2024-0805,0,0,479c25c464f6a328d6731c12cfc75b50b35f0f2dec0194359c3aeae6dde0d30d,2024-01-29T14:24:19.087000
CVE-2024-0806,0,0,9c93ca7b1341b35e16a22cdbbee1fe7fe1f2eaf26781f684014c115afdc39972,2024-01-29T14:24:48.090000
@ -238470,9 +238470,9 @@ CVE-2024-1216,0,0,cf8cbc681fab31a82a726030cd7e5b2697f90ed7fc6fe37a66dad5c3cedfca
CVE-2024-1217,0,0,2f3a9888a6fbf53051bf3e1d713109419f2670877e27546924b2618e93987f41,2024-02-29T13:49:29.390000
CVE-2024-1218,0,0,f7a43c3097a98a76412fe9c1af1feb423b6a534d59f1a1be753dd55ce0e5155c,2024-02-29T13:49:29.390000
CVE-2024-1220,0,0,7fc61962f6d2075b07bb030435da96def1b153ddab02d3c5264f2409e74faa58,2024-03-06T15:18:08.093000
CVE-2024-1221,0,0,72683792ce9c283255541d5ac660fa78f64a38a1637cf2ed82ea089144c05781,2024-03-14T03:15:06.607000
CVE-2024-1222,0,0,5b097491b98908ff7e6db3da1f90d0bc5e62019a19484337138401f19c65b843,2024-03-14T03:15:07.090000
CVE-2024-1223,0,0,bcce03f069a230840b65a318aed8fc83e8f3977b6a931636a215c3e057bb8175,2024-03-14T03:15:07.580000
CVE-2024-1221,0,1,2772ab118d345973bb70102156f0a9ba23f65bc7e69fb6c97b531ae7aa018395,2024-03-14T12:52:16.723000
CVE-2024-1222,0,1,c69564e36b074aff06c51d10d4b5b8189a6729bdb1e1b9c14b8e40846e06e2f0,2024-03-14T12:52:16.723000
CVE-2024-1223,0,1,a7a9e1c05adae7a81659ba2ff7caa10eb2d1a06107f9b31e93f51bb9dd1a9e91,2024-03-14T12:52:09.877000
CVE-2024-1224,0,0,f5377a59802b4c28898eed36128680d24ab17fb508c502610abb50cb4d44c2e5,2024-03-06T15:18:08.093000
CVE-2024-1225,0,0,48e8aaacf87c1f1ce817a462226bd45c66b45e1434a262109b41e4c91072a987,2024-02-29T01:43:44.277000
CVE-2024-1226,0,0,866d071ad8625704064a7fde58b7b8a2a90c5873a4eb7f372776142f1a28cf32,2024-03-12T16:02:33.900000
@ -238719,7 +238719,7 @@ CVE-2024-1650,0,0,3020ece11ffdddeeec0030da948830348e1867089b2578f18d2a470b71bf8a
CVE-2024-1651,0,0,b5a1bc561b4d7ae4d1ca2ccf7f79068fb2afa7b09c9ad49805a75edae57e0400,2024-02-20T19:50:53.960000
CVE-2024-1652,0,0,713b08425ff0d91e3a1f6c5fcc742628e562c3c90970b08c1ec718d504f2db3c,2024-02-27T14:19:41.650000
CVE-2024-1653,0,0,875a0ad46333e774de4f895ea6a9ead74cdbdb6ae6c4ddb02a960bfb85513ae4,2024-02-27T14:19:41.650000
CVE-2024-1654,0,0,b67f7c776b64097c757a87a6d7d22a8df21e2be37384f31188a789970302a42e,2024-03-14T03:15:08.033000
CVE-2024-1654,0,1,eb9626fce310149d4ccf57ea81b4c034dcaf62686ee2c7ca822dc0fc8ca870d9,2024-03-14T12:52:09.877000
CVE-2024-1661,0,0,24db83c92b829dc6c3c4aa1496bd15ce44d311aaea85d91d099cbad064ada2b4,2024-02-29T01:43:53.173000
CVE-2024-1668,0,0,9fe479fb08a9c3e6acaa42b32d642c1a77a4b3afa3c06ca8b35741f02d9dd1bf,2024-03-13T18:15:58.530000
CVE-2024-1669,0,0,3362eeabf5b6399fda046d3f728ab967509d79cc74a91c5ce260a94031135ec7,2024-02-26T16:27:52.577000
@ -238826,9 +238826,9 @@ CVE-2024-1875,0,0,6b658f389b536cea98293568c7ee6644587a9b1bef069f774207e95c99ee51
CVE-2024-1876,0,0,82560fab1f4fbe2b28673412a54026b5c1806e6e970cf396594ce5608059f917,2024-02-29T09:15:06.320000
CVE-2024-1877,0,0,dc0df84bf200c26187720f27a43e69dca821743a88d60bdf70024e88eda285b4,2024-02-29T09:15:06.407000
CVE-2024-1878,0,0,c55652da9052ae10c0f5815143b64799f9a5b82eb1a20210e8e29c385eb1c149,2024-02-29T09:15:06.490000
CVE-2024-1882,0,0,10c6e74771347b67fa3c838c9d71cc234ab54d67925ce262fed28d8f9bb44513,2024-03-14T04:15:08.003000
CVE-2024-1883,0,0,e5e91ae0abed696d1abc51c06539334ac29fcc9a9edcb560d2084b7e2dc68356,2024-03-14T04:15:08.353000
CVE-2024-1884,0,0,0cbc4b22c13954feaf9f0861216bee59fd3068f748b376e760b0221e0a5f2091,2024-03-14T04:15:08.697000
CVE-2024-1882,0,1,65b682ecafe7582e463d65be737c66a5d812d02dc7c05e20f6941ab4cabca590,2024-03-14T12:52:09.877000
CVE-2024-1883,0,1,f33d1f2bdfe0bff5bee1086cef77aed78bc7ffb15d776f93d56481c80868277c,2024-03-14T12:52:09.877000
CVE-2024-1884,0,1,d5ca467ddd2d583a9a4003273c17763dc88a755dd4a6a44afd561a754155e761,2024-03-14T12:52:09.877000
CVE-2024-1885,0,0,502b33ef4dbb909774fc1ef1eb02e9b9fbffdbeee1e2971953e7a0c92a37628d,2024-02-29T07:15:06.293000
CVE-2024-1886,0,0,092cf7a21972f581040984f11ef7d5c93e369371178904eaee065bef71ec984b,2024-02-29T07:15:06.520000
CVE-2024-1887,0,0,c4ea1f30b4ee64401ec471c46007c0919b3d087c3cc77ec486ec75f252891a28,2024-02-29T13:49:29.390000
@ -239074,7 +239074,7 @@ CVE-2024-2076,0,0,e7f4f1eb9d4801b159e19e6958b03336e4a3f4c5f2daffd2429350dcc008ce
CVE-2024-20765,0,0,0bc0d6bebc7d0e3e5238fdf4ab0750cdcca06992066d14fdc4f2a56816d15cff,2024-02-29T18:06:42.010000
CVE-2024-2077,0,0,9a4b96c976de73d6d8f579a225f4ba6e55c8a8791cc5d9d9f141b958b0074a4a,2024-03-01T22:22:25.913000
CVE-2024-2078,0,0,c5cf1f8224dc1437cc5c72b4c20f193ca60f923ea1195c1e3b8d6f13446a32c9,2024-03-01T14:04:04.827000
CVE-2024-2079,0,0,43a14cd4db7b214a5c8f3e3fb2bda119325b028ae522653b0bd01ff60a3a3c34,2024-03-13T22:15:11.910000
CVE-2024-2079,0,1,d19df912ca8f24c4783570207f7ead00a2f333eee11795e142007ff6a5180cfc,2024-03-14T12:52:16.723000
CVE-2024-20802,0,0,09b0e538ab7892d37fab32a8e5c61289f6ef8af3dfbdfbb048a6512fa7396094,2024-01-10T16:14:57.787000
CVE-2024-20803,0,0,6c415e68c0cc04850639517c5e65b145b62c937ecdd266efbaf3b8a7e936e490,2024-01-10T16:11:26.313000
CVE-2024-20804,0,0,f961cce5ac55cac12f82f1b9af1706ecad8b5889d74e0d2cb7f3ec9a86f51549,2024-01-10T16:10:45.437000
@ -239606,7 +239606,7 @@ CVE-2024-22162,0,0,3c2cb36f32a60ca693f81b961c287d758c19ce669967ae728e78b13e00efd
CVE-2024-22163,0,0,c83e1ba1846b1fce21c84865fbae3a4da5f3738a4cbae342d708ebb4390dbfc8,2024-02-06T14:57:33.760000
CVE-2024-22164,0,0,477ce475db07f491f945e658dfba7270a678f1c9f9986653d1cf70ab7be3b709,2024-01-16T17:40:17.057000
CVE-2024-22165,0,0,e5745c0914c304a6a883c5cbbe12f7d3b628ffd9c8f1f4447610dc31781824ee,2024-01-16T18:30:58.893000
CVE-2024-22167,0,0,4efa3f0953388985e35aa0fc7cde3e5468f1d8536829035d4e70933f25b2971a,2024-03-13T21:15:55.343000
CVE-2024-22167,0,1,66eeaa7802a03d7220e8e4d342cc2b136735ca1b12a8df28a329ae7f7fc30d01,2024-03-14T12:52:21.763000
CVE-2024-22182,0,0,907bb5baf28273d3fccc2bf9f187fdb84f5fc8c1f9e9a557acec183fdb8a4a41,2024-03-01T22:22:25.913000
CVE-2024-22188,0,0,c925f824384b59eea62dc4af4666ddb75fd12e09a6bf8db8c7f8ccf3dffad485,2024-03-05T13:41:01.900000
CVE-2024-22190,0,0,b6052bec184e44f4bdb37913f09378ade6ba357d503aeeeace40339b578d1a46,2024-01-18T13:48:07.553000
@ -239718,9 +239718,9 @@ CVE-2024-2239,0,0,8a25d7fd7eaacb8ebf85fc00694a049e7ce7420bfb6cf416c5b42d50c5d1d4
CVE-2024-22393,0,0,baae8029e1587725a02d8ccb1fb298e540bb69b478da7728d31a9731926e8718,2024-02-22T19:07:27.197000
CVE-2024-22394,0,0,fdf2846817bf0321d479c4aa67f29d797db24255733cd4d946cc68e44bfccdc7,2024-02-14T21:46:40.537000
CVE-2024-22395,0,0,b21f811c39a8757d126ad039f30ef550a4161900f4b964d1876a739d59a87644,2024-02-26T13:42:22.567000
CVE-2024-22396,0,0,f31a8478611f246e75e3189d21bf9ef362e314a74863dafebff2c53a0d093433,2024-03-14T04:15:09.080000
CVE-2024-22397,0,0,dd628a66d8f0ca8bd03cdfa506d1cfa64763356d779eb356796a3ef2aa6831cb,2024-03-14T04:15:09.297000
CVE-2024-22398,0,0,c77e5448cb612df458a655c23f75acac1504b30f42bbfcca524271c814d3eb63,2024-03-14T04:15:09.417000
CVE-2024-22396,0,1,3abb46e50ad636b49fa1626720ec980896bc78f9c45d1bcf1eda8e9ee80c033c,2024-03-14T12:52:09.877000
CVE-2024-22397,0,1,a9450283301e1e49819d3862b657193585bbce3c8f221b0f8c811f63f9e45af0,2024-03-14T12:52:09.877000
CVE-2024-22398,0,1,6274168717eaf1c1ad5c0ba9993d9a14d19f9de051ef1a9ae7c30d936f0a8aff,2024-03-14T12:52:09.877000
CVE-2024-22400,0,0,75e98c1f1edd6beccc5653abbccb406114df98ae36ae20c7db97671271c6d967,2024-01-26T20:55:37.543000
CVE-2024-22401,0,0,66adbef511b1833a5b0f5721c3bf92cfe438dfd63a9ac9655aa7c9dea6d9ded0,2024-01-26T14:42:35.147000
CVE-2024-22402,0,0,6c66fef7245df59e63379f6d488e03f20fc7beed00d8afe188d68ca1b49ff0b2,2024-01-26T14:11:30.677000
@ -239739,7 +239739,7 @@ CVE-2024-22416,0,0,4743c834e9f721c7d271903d375817b56210d75d85a6318060ff428a321c4
CVE-2024-22417,0,0,cbffb89ddefa4461a2c9ab3f4209af97f2fbed0e034b82012b430c49f1cc363d,2024-02-15T03:17:08.090000
CVE-2024-22418,0,0,0253a6086c2436c05752e6e58a0d383294b9f59fbd83ecf7515ed514c42aca8d,2024-01-25T22:20:11.087000
CVE-2024-22419,0,0,c565baa116d24bde7e5de7a0d128d511dc0e0f3e4161069cbe6da43b0f53182f,2024-01-26T18:10:24.747000
CVE-2024-2242,0,0,b2e12ba2d852f23d46dc99a1c46baefdd04f84d51d9c86db5512a78bff567268,2024-03-13T22:15:12.173000
CVE-2024-2242,0,1,39d308e366a51cd5a7be9e3c4a03c92cd8109861f94356873beae64a70ef5519,2024-03-14T12:52:16.723000
CVE-2024-22420,0,0,dcbfe647d1443cce2b795eae483259c958c0472084bb1bb4ee3374c4670666da,2024-02-10T02:51:45.717000
CVE-2024-22421,0,0,58c7848effa15c2f45cae3a355504d85dac425537d9bac99b99330760ff84e0c,2024-02-10T02:51:03.987000
CVE-2024-22422,0,0,cafc60081059c38b5fbf7c4dc43db8e59eaafdb89fe8cc5c7225f1844e49fce8,2024-01-25T22:19:52.030000
@ -239761,7 +239761,7 @@ CVE-2024-22458,0,0,fab0847e92bbf727c5b27aa7c362cf6e8ac33445a67dace1537122f2ef005
CVE-2024-22459,0,0,0f6e55dd5e86a1ba38a08c9c7a4fb2896872d396522db79869b212894fff2ef6,2024-02-28T14:06:45.783000
CVE-2024-22463,0,0,5b884681f5c1cb31ebf38842df7c3075a8e9d98da101d1e4ec4faa1ef09b6ce2,2024-03-04T15:35:25.673000
CVE-2024-22464,0,0,890f63b91e1207e51dc2d0fc686f763deb067d6410c523bfc64d52071d75be15,2024-02-15T05:03:27.617000
CVE-2024-2247,0,1,b52dba6f68142dbeca56f2f1bf8b23a5401066ec4f0585445fe0cb42ba284eff,2024-03-14T10:15:07.027000
CVE-2024-2247,0,0,b52dba6f68142dbeca56f2f1bf8b23a5401066ec4f0585445fe0cb42ba284eff,2024-03-14T10:15:07.027000
CVE-2024-22473,0,0,ba695bcad0bbe2cba422f3053697429916506f0f0ce55f150fe9af4a818e1f6b,2024-02-22T19:07:27.197000
CVE-2024-22490,0,0,36caaa8caefc70cd3fb65a62a9488b2446e68d14844d0a61d7baf757d2000caa,2024-01-29T22:48:35.493000
CVE-2024-22491,0,0,99c25b0ff8de89fe3ebd04368e499e7fe9b3820707560bd21fed90048934c0ad,2024-01-23T14:28:45.890000
@ -240400,7 +240400,7 @@ CVE-2024-24098,0,0,278909d70f7cff296783b4b8a548916c6d64b22508219b62d702151781ea2
CVE-2024-24099,0,0,e75badf6651a6d84e33aa0d6378d82bf7383b7d186bb27d0ab0f05af5c87836c,2024-02-27T14:20:06.637000
CVE-2024-24100,0,0,a27c32dc14c8987b127be9cd991f37144e95622920d0f3983f740c9f65a1ed81,2024-02-27T14:20:06.637000
CVE-2024-24101,0,0,465610d11fbea3a63202ee4b992dde1745c78e4f43267fcf6791260a204c8347,2024-03-13T12:33:51.697000
CVE-2024-24105,0,0,c756102406536d18d5b7587cc76c52c0b7d345ddea22d625cd43256cc77708da,2024-03-13T21:15:58.870000
CVE-2024-24105,0,1,f380e262c8dd655f8c2a2aaab705945e3e53d934f43a99a8988c2679e64d26e6,2024-03-14T12:52:16.723000
CVE-2024-24112,0,0,85e73cacfedc53adcf11f5f918fd045bef98237a7befd9901dcc9210924d64d7,2024-02-12T17:36:55.950000
CVE-2024-24113,0,0,9eef336ce15946e031a73b26b3e239a7b6b89883c338eb5418a2161e5a5d4cfc,2024-02-15T03:07:46.013000
CVE-2024-24115,0,0,14551eae0714aa949f3a2722e897b385606f2d79896bdde4df5b423d4061d078,2024-02-15T16:01:23.457000
@ -240478,10 +240478,10 @@ CVE-2024-24332,0,0,e8ff48d8d559b64b9ab6ad7cafcefb37d4d80401868f386c665115c6aeb40
CVE-2024-24333,0,0,01fbda1675f098d1cc7c6d19f4f3e61befb0126ec79fb324ab3d3ab060b94378,2024-02-01T04:50:09.707000
CVE-2024-24337,0,0,aea724cce42152cfbca31af56ebea4b4144a07dac6916cd215f4a89a5f259b76,2024-02-13T14:01:49.147000
CVE-2024-24350,0,0,9134767962641c17d78d439bf5ad6b0040b309c747242ef118ff001480ea18e9,2024-02-14T21:53:21.057000
CVE-2024-2437,1,1,e2a2bd9bd0dcdea0cc630f9078b3e3fd0d505d341534c09f27e2d7feb3fe79ac,2024-03-14T09:15:47.690000
CVE-2024-2437,0,0,e2a2bd9bd0dcdea0cc630f9078b3e3fd0d505d341534c09f27e2d7feb3fe79ac,2024-03-14T09:15:47.690000
CVE-2024-24375,0,0,6d93bed7b91eebe0279780e7942da5d713b2770f2037688e2705f8e5250bec6b,2024-03-07T13:52:27.110000
CVE-2024-24377,0,0,4fd82afd92a47ec9c215e71594b94e69e50289be89a362cbe08c09e263cd1ed7,2024-02-16T13:37:51.433000
CVE-2024-2438,1,1,c00f0172cf7ab8467da2d5d83a23b794d6f6a7817b3440d3b686b7132bf26b21,2024-03-14T09:15:47.820000
CVE-2024-2438,0,0,c00f0172cf7ab8467da2d5d83a23b794d6f6a7817b3440d3b686b7132bf26b21,2024-03-14T09:15:47.820000
CVE-2024-24386,0,0,b3790fe661cff8a8634891f10d13cf244a8c2db222c1d3928967cefd661b68bf,2024-02-15T14:28:31.380000
CVE-2024-24388,0,0,3f3d5731a0be4e881fd82d2a190d75a64cc3a7cfd8c995358dcecccf32a929bb,2024-02-08T20:04:04.027000
CVE-2024-24389,0,0,2c9b678e90ca811a5e4fb1d9cfec1c17129f5ec175674cc0051b26f5da267c13,2024-03-07T13:52:27.110000
@ -240547,8 +240547,8 @@ CVE-2024-24680,0,0,00c6b06cbd399fac9a1cb69a45fdeee991ea9572aae73c195704c3555b436
CVE-2024-24681,0,0,705110c1a0575ef95794934b23101ccc4a6f384f7c61c4db9f4dbf9a8c528dd4,2024-02-26T13:42:22.567000
CVE-2024-24690,0,0,4249963fcab3f64839ca35be1a62d20e5da7a24ba0a47ce2bf9c0d2ae28ac410,2024-02-14T13:59:35.580000
CVE-2024-24691,0,0,87a55408e5efa0a4e3ce695995ae48834f0ce6baa0932acdc26c28bc7459ff4b,2024-02-14T13:59:35.580000
CVE-2024-24692,0,0,8f35977ecb1fc63a3e79e626900b547600a6f147bb5e4fe2307611edc881f8eb,2024-03-13T20:15:07.273000
CVE-2024-24693,0,0,384ba36041e0e5352c63befbbfbd1143d3360cb9d0a88f62cf73f43813fae147,2024-03-13T20:15:07.760000
CVE-2024-24692,0,1,96b263e11e7ffd264e5e6330a524d4e167d94ed5d670d61f6bb2c4bb8b02f370,2024-03-14T12:52:21.763000
CVE-2024-24693,0,1,5948992e2aa56bf9230af7bcdfd2c9a8d3e9ce95b4c0f6ada002a4f7d2439c11,2024-03-14T12:52:21.763000
CVE-2024-24695,0,0,f7b489372675997f3018702f3166f9e3d390c6d5bf9cde9b8e59b33dbe31e943,2024-02-14T13:59:35.580000
CVE-2024-24696,0,0,340219d088caaa9660211943b96c2739fe7ed93b849c938b38d29441b9ee779b,2024-02-14T13:59:35.580000
CVE-2024-24697,0,0,61551c1d57df2d326f3c36bc68e06a9320623a0f54e789a8374a92406f147d56,2024-02-14T13:59:35.580000
@ -240803,11 +240803,11 @@ CVE-2024-25223,0,0,fed0ee1c93d4da13aa94c11be23fd7ce47331585823cc1398816a42e972c6
CVE-2024-25224,0,0,60a033d8e8f6de71de20eba59193ebdd929b6bf393aa49baa96edb59007a6ae2,2024-02-14T16:13:16.563000
CVE-2024-25225,0,0,b00e13f44ac0134f1fc7e8ea7aab2c5dcadd2e02f8582f1036d69738d9332b6f,2024-02-14T16:13:16.563000
CVE-2024-25226,0,0,97ea8fb758b8c513c8e72ae3403e9f8a56bb02ec88e94afe18fc9fb3fc39daf2,2024-02-14T16:13:16.563000
CVE-2024-25228,0,0,874aa05e1a272a25a83a650ac8d7cced0f21348e2881b87b6589a4012112af12,2024-03-14T02:15:50.613000
CVE-2024-25228,0,1,0239fa4a0a2fc4eb6bb0a1d2903e89a077f9c73228502ccb53d8cf7f226021ad,2024-03-14T12:52:16.723000
CVE-2024-25247,0,0,1833ae291fb426e6ea03731a73288e6521c4f877eb6214fb79e6117118a15f59,2024-02-27T14:20:06.637000
CVE-2024-25248,0,0,ab3d2a3b38abc9eda04104b8736bee6722a7b783d7f7311f9358790a48b160f2,2024-02-27T14:20:06.637000
CVE-2024-25249,0,0,e626f7804fc8e3e2331820b9aeb548c245c405719ff0d76dcfa04a8ec8a29acb,2024-02-22T19:07:27.197000
CVE-2024-25250,0,0,3cc334e2050b6a9eaa97416427fbea02322921755fe268fbb09b55a56f03777a,2024-03-13T21:15:58.943000
CVE-2024-25250,0,1,50921ad09828430a91a170dee03070c033f5594e850effa2946a4512e5f222cf,2024-03-14T12:52:16.723000
CVE-2024-25251,0,0,1d2a5a9a4b66e0916ca3d01dc7a497fd6f413128e5f9cf23b916246f32337d74,2024-02-22T19:07:27.197000
CVE-2024-25260,0,0,a963ef502694ae6000774c93857ccef97ccb95aa054d7c962bcf481c9eca61da,2024-02-20T19:50:53.960000
CVE-2024-25262,0,0,e9e8a281108082e2fe38cf1f84c8b0462ae4f78a51833715d231a5f9854a6582,2024-02-29T13:49:29.390000
@ -240928,11 +240928,11 @@ CVE-2024-25642,0,0,bf91eeb1502dedca60fe6c035b93d7dfc5a440bc6932322c6ae4d128b4c7c
CVE-2024-25643,0,0,08f3e6c0d454841d4e4dc84aae81812246ffbd96bb71cc2e9e4566cd4077e910,2024-02-13T14:01:07.747000
CVE-2024-25644,0,0,cad748db94c87605f745ac8efbb54ef36e9bf866e1bcdbdf96bff9a05dfcf738,2024-03-12T12:40:13.500000
CVE-2024-25645,0,0,611af6391fb4617a6b65e5d2ff91bac5a4003873b65f133d0cd2495d911bd094,2024-03-12T12:40:13.500000
CVE-2024-25649,0,0,218331cab7c62b05eb4d39dac1a79ad7ac8b83af2eb750388e434f7637a774f7,2024-03-14T03:15:08.540000
CVE-2024-25650,0,0,642f2a97fcbb295131b088a5341f3b030499ec647a2ae701e0541ed64c8cf428,2024-03-14T02:15:50.690000
CVE-2024-25651,0,0,2248b9010081da7da6b627ee680afeedcd3d4b945ee538337f832cfc007fb085,2024-03-14T03:15:08.727000
CVE-2024-25652,0,0,295dd2978154c1bf9b2c6a87719cce6733bb755cf3cd8c6462372fddfcabd618,2024-03-14T03:15:08.877000
CVE-2024-25653,0,0,288666ab37b8b1bd826f20b5520fe1bf046ca6dbd75973955552561e56a31a42,2024-03-14T03:15:09.017000
CVE-2024-25649,0,1,ff4005c5bc448d78f7be592b75e982f7bf99b3c972c3f93072e448020f36c7cd,2024-03-14T12:52:09.877000
CVE-2024-25650,0,1,86db7f9cd2961887ed39c6b63b2949a71fabae22076ac99000118f6e3ecf601e,2024-03-14T12:52:16.723000
CVE-2024-25651,0,1,4935c44deda83694ae7a33c550d78c8ec02d262dfb7e7f44dbd503c93d5109ae,2024-03-14T12:52:09.877000
CVE-2024-25652,0,1,1684edbbe6a032e904cd3d9da8c2e3b5d162c7d94708a30170c5b1a8fdc4de06,2024-03-14T12:52:09.877000
CVE-2024-25653,0,1,cf0ab93d3f68bfc65ae7a6e2836e0f599b295638c5107d23ca26fba04d235e4d,2024-03-14T12:52:09.877000
CVE-2024-25674,0,0,880844ace2ad9fa6a214f1eff7f46e3beaded8f86ef202dfc09585e1e07ca21c,2024-02-12T14:30:40.343000
CVE-2024-25675,0,0,7eb120f8543ce89181641a0a8c791e82666c8e07d23577075c360f9dbf73d233,2024-02-12T14:30:28.640000
CVE-2024-25677,0,0,1d7f4f51208daa48b27418602ba1484337c537523201080701287445cfed0006,2024-02-15T19:43:24.983000
@ -241241,10 +241241,10 @@ CVE-2024-27088,0,0,51e0e40780267d1754ef6fc0476358b31f9f3458dd54a6b66fef5c03c4a96
CVE-2024-27089,0,0,80888df8a8beb579eb58ecd8e5017bb9d7c0dad21161e687af8e50a608c5d017,2024-02-26T20:19:06.073000
CVE-2024-27092,0,0,46c8a65175e30ca99bc1ca448e9739f5a9fd09a26b86761b076001350720e53c,2024-02-29T13:49:29.390000
CVE-2024-27093,0,0,2adc536c19af535e2a03a5b98ba4818457cc5a617ec41b1d012943c718349d43,2024-02-27T14:20:06.637000
CVE-2024-27097,0,0,50f3cf107f797e136114db4659f36aab4dcc1ed2c483d15d9f0c1870a1b504ca,2024-03-13T21:15:58.993000
CVE-2024-27097,0,1,119cd9ece0e90261671b57d6900026bac78dfbf4d2981ae69a65322120d02a50,2024-03-14T12:52:16.723000
CVE-2024-27099,0,0,175d10b027dcaefa30f4f3d08f108961158696c2e68858dfb01ba6e05070217d,2024-02-28T14:06:45.783000
CVE-2024-27101,0,0,5e1cdb7fd021f767632e89261ae8cd71ddf2db43a5c2430745ab100b28a7d944,2024-03-01T22:22:25.913000
CVE-2024-27102,0,0,cdefde17ac223bb0751d25dccaf6c69d2607e40a6e858e378aacf4409db4940a,2024-03-13T21:15:59.590000
CVE-2024-27102,0,1,efafee84c11a7d42b73e32ffc69d4688f19605eb4ecc6d6cf419aaba4f0fed2f,2024-03-14T12:52:16.723000
CVE-2024-27103,0,0,ba41469ea697f39b66b49d222d300153b0a74c2fb1fbae161829f573b3ab98cc,2024-02-29T13:49:47.277000
CVE-2024-27121,0,0,9ff77f57a33b5e7894f52bbf3c39c57fbfb06ac4fc9de183cada29d2e4e25cb4,2024-03-12T12:40:13.500000
CVE-2024-27132,0,0,3211e33e39363e184b8550fc16d833a0f590c8e4cd3ef270e1d091501b93f80e,2024-02-26T13:42:22.567000
@ -241360,7 +241360,7 @@ CVE-2024-27689,0,0,f4ebc1e59160fdab518bfa3aa9af1f1ba832ce6045359e8a975bb23df8ccd
CVE-2024-27692,0,0,96cf609944e6476718d8d1c519869d6f251f131a1b19ff614e15f00c454cdd33,2024-03-01T17:15:07.617000
CVE-2024-27694,0,0,f3214413fbbba6e4989cb23c7682c51f2973a0b48d2e319f7c34a38e30c11001,2024-03-05T13:41:01.900000
CVE-2024-27698,0,0,ac54888b0a03034871f07f7d36cab166990ef3007932a85c3ddd7d9b6a6ab747,2024-03-09T23:15:49.403000
CVE-2024-27703,0,0,3d640aed93e1dabbc4abed834a7b198ee41005d217fc00b5cf782d6d45969a06,2024-03-13T22:15:11.843000
CVE-2024-27703,0,1,2b79380c63baf4bc3c9abfadfdc13a8325f8dae30b340951dc89a1b9f1e8f730,2024-03-14T12:52:16.723000
CVE-2024-27707,0,0,bd4780ccfe95d75b10e00a8c73b93480b3348a16006d364b38b5efca7ebc67cb,2024-03-08T14:02:57.420000
CVE-2024-27718,0,0,1278a2a8cee5a68342beae95f220d454fcd35e5e3853b311cb50bcc440948ebc,2024-03-05T13:41:01.900000
CVE-2024-27733,0,0,8d363cf969790e7f98247f28db2e0a162d296bdeea0f77bb77693ca2f7a6137e,2024-03-08T14:02:57.420000
@ -241390,7 +241390,7 @@ CVE-2024-27949,0,0,12ee9b935394b527d1677a59b517c94d0df067a0b32bfff31d7cb2be5b4b5
CVE-2024-27950,0,0,56d632dad56c45d949d3327de16e5b70b08683cea8ce7876ca8c59cc37ee8062,2024-03-01T14:04:04.827000
CVE-2024-27952,0,0,184c933cd3d4f7d9f291de87daadba6c6d2dcb57a0cab449b4798a27658d2d98,2024-03-13T18:15:58.530000
CVE-2024-27953,0,0,9606a5ea342585cc8ea605f674c63e8d870327e37e1ba285dba38be6126632a2,2024-03-13T18:15:58.530000
CVE-2024-27986,1,1,01528b706c9f06c52d7790b2237645f819afb573bee6a27e89a4eeb7a8b9eee6,2024-03-14T09:15:47.363000
CVE-2024-27986,0,1,221ac31a72264e8303bc0dc716d0bcad27f92aa2e3b64824247f9d02601983b8,2024-03-14T12:52:09.877000
CVE-2024-28084,0,0,2ea238298cc724e9290d5587502d4eedb8db15dd1861547724435b977511956c,2024-03-04T13:58:23.447000
CVE-2024-28088,0,0,d2f20b1069b24ba10d21e8bf3b61c2c6a1c6b345ff59786676752b80abbde7a4,2024-03-13T21:16:00.380000
CVE-2024-28089,0,0,830991c1dd5898b6a817a3f8bb8784922af3636f20b8b62ba1c918d5d83f6f10,2024-03-11T01:32:29.610000
@ -241425,15 +241425,15 @@ CVE-2024-28162,0,0,9f95dea899a301f3d7e776202ce6567032bc57cf37ea2c387cd5d210ccf05
CVE-2024-28163,0,0,e6f158d88c83d394762ccab484b2ad85c85d5028e78ed16fd0744829e8f59484,2024-03-12T12:40:13.500000
CVE-2024-28173,0,0,e0fed71b03fa1080cdfc47a71a0b80da5e87b19e624557c11c0e172f4b2c098a,2024-03-06T21:42:54.697000
CVE-2024-28174,0,0,fa1674b985861bddf4d0ff5ab075ec0e4328a9665c668bfe339f9f0de580d6b1,2024-03-06T21:42:54.697000
CVE-2024-28175,0,0,ca58d29ef32983b33c62a2fd7b345268439a050ce23af1d5c40aa6dd749ccdb8,2024-03-13T21:16:00.570000
CVE-2024-28175,0,1,c8f25bff8e97476e2963865ef2e9cf777aae8f2ef724b2ba6f372c990cea8179,2024-03-14T12:52:16.723000
CVE-2024-28176,0,0,5bb6d329167995170bd276a45554624691bdda8cbb6c83c2d08f42eba9f617aa,2024-03-11T01:32:39.697000
CVE-2024-28180,0,0,1e73ce45496cde15ab7710e8895a9f7d4caf4d2dcdb0d6de4d94afa753e9a64b,2024-03-11T01:32:39.697000
CVE-2024-28184,0,0,043b0bc7533d0fc96bb6df4be7b21b8477ffe807b0ac6ed0c4b06cf7d8241c3c,2024-03-11T01:32:39.697000
CVE-2024-28186,0,0,bd19020fb98c7e49f4ae9534406a8116ce29f7f2cd9253fb5db74e8880c2331b,2024-03-13T12:33:51.697000
CVE-2024-28187,0,0,ac9aee9b90f5e80eaf35f8c7ff9228de1d46fc7e7981b3ae0d130073676ebc09,2024-03-12T12:40:13.500000
CVE-2024-28192,0,0,d78776cf653c920d1bae9feaacfd4e597f46ef67fbab546c6df435d4a69b5aa0,2024-03-13T21:16:00.823000
CVE-2024-28193,0,0,1de78db701b48770c7b9ad6a4c3de8efe483bea9ec41e293cd7a32a5e150762c,2024-03-13T21:16:01.077000
CVE-2024-28194,0,0,2994e8524191af9bad4e70397807a2f8e6e4543df62f104fe5234d833150c067,2024-03-13T19:15:47.110000
CVE-2024-28192,0,1,b174fe16c8c5d79ad271f4d2c9a4367f27378fbad36778038489438c03ab1c5e,2024-03-14T12:52:16.723000
CVE-2024-28193,0,1,8c1ca4c11484246f93cc5d645c632e9426b6a7357ef642cc72cfc1bf4fa0ff90,2024-03-14T12:52:16.723000
CVE-2024-28194,0,1,bbf543bd49e731dd9f0390cae255c29b8ec19d1f801fcc500577e5449dd9092a,2024-03-14T12:52:21.763000
CVE-2024-28195,0,0,1b19b29658de96e47ddbe7fe6d42c1a696986a3c5eec359089bbbbbc5a058164,2024-03-13T18:15:58.530000
CVE-2024-28196,0,0,7046367e0acd02e985287d11a90605d3f19a7e35578ad5f9a01507573328c7a9,2024-03-13T18:15:58.530000
CVE-2024-28197,0,0,e70c7d0bb2a78854377299eb50fe7994eaf82f7d86398ed826c936d249a753e2,2024-03-12T12:40:13.500000
@ -241452,13 +241452,13 @@ CVE-2024-28230,0,0,3036aa70102b53b9cc695265dc4a11e5a4f5b8d26f6120835dbd1a9c3d93e
CVE-2024-28236,0,0,ea7d34bffb060eb0191757ceb4c446ee8bfa4166cb7d1e0d8e67e75c651ba966,2024-03-13T12:33:51.697000
CVE-2024-28238,0,0,38219e010007b7fe5426826144cd2eabd2e22d36d31c50aa8471901674b524b3,2024-03-13T12:33:51.697000
CVE-2024-28239,0,0,faccbe471f1ae24e1ff85c8426d7d0f8447bb8e496567a24af19b5962ca5e940,2024-03-13T12:33:51.697000
CVE-2024-28251,0,0,fb8bb85433bd3b41ad1d143c946985fc64b58ab7659a617713f0e321c9f0e8ae,2024-03-14T00:15:33.630000
CVE-2024-28251,0,1,19fc23d56f5d00fa3c69d993b0deb280b2d4a1df9b73eb3d828c9ec8b6104ec4,2024-03-14T12:52:16.723000
CVE-2024-28338,0,0,9985a0b99abb928b9c829cb29ecce6039c07964aad6d9841c1477c6680f4f9b5,2024-03-12T17:46:17.273000
CVE-2024-28339,0,0,06a7f15d55f22a965683bef17c82587bc073ddf9fa5edb33c38c4cd82d5f37f7,2024-03-12T17:46:17.273000
CVE-2024-28340,0,0,89775fa07d73d115a7392603111ecb04f65799be74b8d41063e67ed0eb97d0cf,2024-03-12T17:46:17.273000
CVE-2024-28388,0,0,f17eaaccd231d77546d7899d1df3085348280bec8337c1a366c3d44c86452404,2024-03-14T03:15:09.173000
CVE-2024-28390,0,0,1da0808737c64cfb1966175097fd2c66620ce27fb357d642515e15877a4acd6d,2024-03-14T04:15:09.640000
CVE-2024-28391,0,0,2cf4d2f98732c7b04ac1c5926873543ea38367c981d16dbe8f52fbe309920f7c,2024-03-14T04:15:09.697000
CVE-2024-28388,0,1,f20800f07aee245fbf5408ead00cec9bf5c1f6fde0c58ac0833a4f3740a134d7,2024-03-14T12:52:09.877000
CVE-2024-28390,0,1,c59fe44ce5898e034e8253a1c3bd017a5eae7c1708d584b45d3cdcaf6b6ab3d0,2024-03-14T12:52:09.877000
CVE-2024-28391,0,1,b1444c24f7ecf1ab52e2ae0fbb735e6665eab4acbe77c214aa4859db21cb1963,2024-03-14T12:52:09.877000
CVE-2024-28429,0,0,caaa64487b84149266e9e941a72e13f93e6070c94b1fe7355fb56db4eb5b2161,2024-03-13T14:28:45.217000
CVE-2024-28430,0,0,bf34fb49e742ebf9176808c1e05b7467ed1662a29a5c18afe29f976454928e37,2024-03-13T14:28:45.217000
CVE-2024-28431,0,0,148c6be422e12f315897bdd57f5208c74e8137e452c7019eafe29f97f527c418,2024-03-13T14:28:45.217000
@ -241466,7 +241466,7 @@ CVE-2024-28432,0,0,4bc8c3df18623e8712ef966fb24c80f6754436b2eb6a0c14d5d3c56f5a161
CVE-2024-28535,0,0,05b59fc574e3ec1a67ffae1023c5999e94849ce19d6ee2f539dda71a994d8b6c,2024-03-12T16:02:33.900000
CVE-2024-28553,0,0,805b633f3af1b0b015d2f8e90520174ed99391ad33f4ee744bfc3e783d7c9257,2024-03-12T16:02:33.900000
CVE-2024-28623,0,0,81bda7f177219bd08e3dc69b11f4157e89434624cca7692be3ee54e609ec67e1,2024-03-13T12:33:51.697000
CVE-2024-28662,0,0,e05f096e93e919099c24f0e445269f4c69c3d2dbb3c321cfc964ec75534bdaff,2024-03-13T21:16:01.357000
CVE-2024-28662,0,1,69ece6d6842931df6f24b49f57aa09e3d2ee5159729500803e8b5fa3837da086,2024-03-14T12:52:16.723000
CVE-2024-28665,0,0,15ff1802f077648abfb71685745562ccf344af547e52cbd5425e81cbe36cae7e,2024-03-13T14:28:45.217000
CVE-2024-28666,0,0,5e800cca159186be28f29e1824df7439f0dc92c267c794010b9aa154f3d0c123,2024-03-13T14:28:45.217000
CVE-2024-28667,0,0,8609dc77a902b440c3c0b00b00f201e51c1c73cdced91bd71fb67881bef0f7c4,2024-03-13T14:28:45.217000
@ -241486,7 +241486,7 @@ CVE-2024-28681,0,0,ed8a4fd064b6b3346412990e6226cbe04bee8a6bd2aaad4671fdcd0478ce5
CVE-2024-28682,0,0,2c53ed716809a76ded005fd10ac6d93891dbf2dd9f02238c66f1445af60cb8e7,2024-03-13T18:15:58.530000
CVE-2024-28683,0,0,14fce1fb8fe5dd3fb68153125dd387047f48de59cd587ce41acfe8b0e8fa04c2,2024-03-13T18:15:58.530000
CVE-2024-28684,0,0,df89c702874c46527da5dc5bf33ec252c05a69f53466623f5ca04f0566a6cd25,2024-03-13T14:28:45.217000
CVE-2024-28746,1,1,68b127d8baa050906fc806d29eb629eac7d2be78c059e66496ad730631b35b73,2024-03-14T09:15:47.577000
CVE-2024-28746,0,1,4e08f19b517756fb15fbaf966494c1aeec3b9803b4e2b615b4d5a557eb48c84a,2024-03-14T12:52:09.877000
CVE-2024-28753,0,0,73ca850c1b6879daba607bc61d7d16457b56173a47004b8bff799b514a526c36,2024-03-11T01:32:39.697000
CVE-2024-28754,0,0,9281349f951cf3fa92b3f484f1e5f3e3b9f20229dcabe6872ba34e9bebaf3b2c,2024-03-11T01:32:39.697000
CVE-2024-28757,0,0,2ea8a9bd701b62a4c7d927e860f5361b09b4376e3bc3bbb014ff5d4ca725cec6,2024-03-11T01:32:29.610000

Can't render this file because it is too large.