Auto-Update: 2024-03-16T00:55:29.895665+00:00

This commit is contained in:
cad-safe-bot 2024-03-16 00:58:18 +00:00
parent 53f93e6ffa
commit dfb3e1561d
6 changed files with 261 additions and 56 deletions

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2024-23298",
"sourceIdentifier": "product-security@apple.com",
"published": "2024-03-15T23:15:07.403",
"lastModified": "2024-03-15T23:15:07.403",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "A logic issue was addressed with improved state management."
}
],
"metrics": {},
"references": [
{
"url": "https://support.apple.com/en-us/HT214092",
"source": "product-security@apple.com"
}
]
}

View File

@ -0,0 +1,88 @@
{
"id": "CVE-2024-2514",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-03-15T23:15:08.423",
"lastModified": "2024-03-15T23:15:08.423",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability classified as critical was found in MAGESH-K21 Online-College-Event-Hall-Reservation-System 1.0. Affected by this vulnerability is an unknown functionality of the file /login.php. The manipulation of the argument email leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-256951. NOTE: The vendor was contacted early about this disclosure but did not respond in any way."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW",
"baseScore": 7.3,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.4
}
],
"cvssMetricV2": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5
},
"baseSeverity": "HIGH",
"exploitabilityScore": 10.0,
"impactScore": 6.4,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"references": [
{
"url": "https://github.com/skid-nochizplz/skid-nochizplz/blob/main/TrashBin/CVE/MAGESH-K21%20%20Online-College-Event-Hall-Reservation-System/SQL%20Injection%20Auth%20bypass%20-%20login.php.md",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?ctiid.256951",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?id.256951",
"source": "cna@vuldb.com"
}
]
}

View File

@ -0,0 +1,59 @@
{
"id": "CVE-2024-28859",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-03-15T23:15:08.117",
"lastModified": "2024-03-15T23:15:08.117",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Symfony1 is a community fork of symfony 1.4 with DIC, form enhancements, latest Swiftmailer, better performance, composer compatible and PHP 8 support. Symfony 1 has a gadget chain due to vulnerable Swift Mailer dependency that would enable an attacker to get remote code execution if a developer unserialize user input in his project. This vulnerability present no direct threat but is a vector that will enable remote code execution if a developper deserialize user untrusted data. Symfony 1 depends on Swift Mailer which is bundled by default in vendor directory in the default installation since 1.3.0. Swift Mailer classes implement some `__destruct()` methods. These methods are called when php destroys the object in memory. However, it is possible to include any object type in `$this->_keys` to make PHP access to another array/object properties than intended by the developer. In particular, it is possible to abuse the array access which is triggered on foreach($this->_keys ...) for any class implementing ArrayAccess interface. This may allow an attacker to execute any PHP command which leads to remote code execution. This issue has been addressed in version 1.5.18. Users are advised to upgrade. There are no known workarounds for this vulnerability."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW",
"baseScore": 5.0,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.6,
"impactScore": 3.4
}
]
},
"weaknesses": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-502"
}
]
}
],
"references": [
{
"url": "https://github.com/FriendsOfSymfony1/symfony1/commit/edb850f94fb4de18ca53d0d1824910d6e8130166",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/FriendsOfSymfony1/symfony1/security/advisories/GHSA-wjv8-pxr6-5f4r",
"source": "security-advisories@github.com"
}
]
}

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2024-28862",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-03-16T00:15:07.570",
"lastModified": "2024-03-16T00:15:07.570",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "The Ruby One Time Password library (ROTP) is an open source library for generating and validating one time passwords. Affected versions had overly permissive default permissions. Users should patch to version 6.3.0. Users unable to patch may correct file permissions after installation."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW",
"baseScore": 5.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.8,
"impactScore": 3.4
}
]
},
"weaknesses": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-276"
}
]
}
],
"references": [
{
"url": "https://github.com/mdp/rotp/security/advisories/GHSA-x2h8-qmj4-g62f",
"source": "security-advisories@github.com"
}
]
}

View File

@ -9,13 +9,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update
```plain
2024-03-15T23:00:38.529028+00:00
2024-03-16T00:55:29.895665+00:00
```
### Most recent CVE Modification Timestamp synchronized with NVD
```plain
2024-03-15T21:15:07.823000+00:00
2024-03-16T00:15:07.570000+00:00
```
### Last Data Feed Release
@ -29,38 +29,17 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
### Total Number of included CVEs
```plain
241662
241666
```
### CVEs added in the last Commit
Recently added CVEs: `27`
Recently added CVEs: `4`
* [CVE-2021-47111](CVE-2021/CVE-2021-471xx/CVE-2021-47111.json) (`2024-03-15T21:15:06.577`)
* [CVE-2021-47112](CVE-2021/CVE-2021-471xx/CVE-2021-47112.json) (`2024-03-15T21:15:06.627`)
* [CVE-2021-47113](CVE-2021/CVE-2021-471xx/CVE-2021-47113.json) (`2024-03-15T21:15:06.673`)
* [CVE-2021-47114](CVE-2021/CVE-2021-471xx/CVE-2021-47114.json) (`2024-03-15T21:15:06.723`)
* [CVE-2021-47115](CVE-2021/CVE-2021-471xx/CVE-2021-47115.json) (`2024-03-15T21:15:06.780`)
* [CVE-2021-47116](CVE-2021/CVE-2021-471xx/CVE-2021-47116.json) (`2024-03-15T21:15:06.837`)
* [CVE-2021-47117](CVE-2021/CVE-2021-471xx/CVE-2021-47117.json) (`2024-03-15T21:15:06.887`)
* [CVE-2021-47118](CVE-2021/CVE-2021-471xx/CVE-2021-47118.json) (`2024-03-15T21:15:06.943`)
* [CVE-2021-47119](CVE-2021/CVE-2021-471xx/CVE-2021-47119.json) (`2024-03-15T21:15:07.013`)
* [CVE-2021-47120](CVE-2021/CVE-2021-471xx/CVE-2021-47120.json) (`2024-03-15T21:15:07.060`)
* [CVE-2021-47121](CVE-2021/CVE-2021-471xx/CVE-2021-47121.json) (`2024-03-15T21:15:07.107`)
* [CVE-2021-47122](CVE-2021/CVE-2021-471xx/CVE-2021-47122.json) (`2024-03-15T21:15:07.157`)
* [CVE-2021-47123](CVE-2021/CVE-2021-471xx/CVE-2021-47123.json) (`2024-03-15T21:15:07.217`)
* [CVE-2021-47124](CVE-2021/CVE-2021-471xx/CVE-2021-47124.json) (`2024-03-15T21:15:07.260`)
* [CVE-2021-47125](CVE-2021/CVE-2021-471xx/CVE-2021-47125.json) (`2024-03-15T21:15:07.307`)
* [CVE-2021-47126](CVE-2021/CVE-2021-471xx/CVE-2021-47126.json) (`2024-03-15T21:15:07.357`)
* [CVE-2021-47127](CVE-2021/CVE-2021-471xx/CVE-2021-47127.json) (`2024-03-15T21:15:07.417`)
* [CVE-2021-47128](CVE-2021/CVE-2021-471xx/CVE-2021-47128.json) (`2024-03-15T21:15:07.470`)
* [CVE-2021-47129](CVE-2021/CVE-2021-471xx/CVE-2021-47129.json) (`2024-03-15T21:15:07.523`)
* [CVE-2021-47130](CVE-2021/CVE-2021-471xx/CVE-2021-47130.json) (`2024-03-15T21:15:07.577`)
* [CVE-2021-47131](CVE-2021/CVE-2021-471xx/CVE-2021-47131.json) (`2024-03-15T21:15:07.623`)
* [CVE-2021-47132](CVE-2021/CVE-2021-471xx/CVE-2021-47132.json) (`2024-03-15T21:15:07.690`)
* [CVE-2021-47133](CVE-2021/CVE-2021-471xx/CVE-2021-47133.json) (`2024-03-15T21:15:07.733`)
* [CVE-2021-47134](CVE-2021/CVE-2021-471xx/CVE-2021-47134.json) (`2024-03-15T21:15:07.780`)
* [CVE-2021-47135](CVE-2021/CVE-2021-471xx/CVE-2021-47135.json) (`2024-03-15T21:15:07.823`)
* [CVE-2024-23298](CVE-2024/CVE-2024-232xx/CVE-2024-23298.json) (`2024-03-15T23:15:07.403`)
* [CVE-2024-2514](CVE-2024/CVE-2024-25xx/CVE-2024-2514.json) (`2024-03-15T23:15:08.423`)
* [CVE-2024-28859](CVE-2024/CVE-2024-288xx/CVE-2024-28859.json) (`2024-03-15T23:15:08.117`)
* [CVE-2024-28862](CVE-2024/CVE-2024-288xx/CVE-2024-28862.json) (`2024-03-16T00:15:07.570`)
### CVEs modified in the last Commit

View File

@ -186812,33 +186812,33 @@ CVE-2021-47105,0,0,d4a5cdbdc9d16b8bd07aacf8b2e5af6c0d7f770f7cc60272932a76f8735c1
CVE-2021-47106,0,0,86ebd1fa61494e895c69513cedb71c684b607737a48f7970c5f1f8bffaa887cd,2024-03-05T13:41:01.900000
CVE-2021-47107,0,0,64c4342c4ecd2457fb78be1cc4dc86937da947b29ab872298b4b912db10a0f03,2024-03-05T13:41:01.900000
CVE-2021-47108,0,0,c2a5ea47da5e115902ec6c49dc3afa3870f3f12bcdf41a2b2c8201ac60673354,2024-03-05T13:41:01.900000
CVE-2021-47109,1,1,ce6b03d903d9f6be905f959476e894779d96ba2770f731c6ea11b7f10720918b,2024-03-15T21:15:06.457000
CVE-2021-47110,1,1,7bbc492794564c9effb63e3254fc2b5d6b556a4d2539e032cc65a1891264ee91,2024-03-15T21:15:06.530000
CVE-2021-47111,1,1,6ab3e7a1217cc00e79c65fdfbc3e8f13b8d878f84be3361ac5858fae049de6e7,2024-03-15T21:15:06.577000
CVE-2021-47112,1,1,767cd084cb517662ef2bba66625f80fac272a5b19f5e27f60a4171b520be56c6,2024-03-15T21:15:06.627000
CVE-2021-47113,1,1,7b41c8a87e2677ff476366d8b59bf106d6ca989b8ee0c2d8dec660108eeb074b,2024-03-15T21:15:06.673000
CVE-2021-47114,1,1,4b5c00db2d7ab0fc95bc2412d35e867687adc9a9a046c5713f5b035175561ab8,2024-03-15T21:15:06.723000
CVE-2021-47115,1,1,5525ab6b437031ede92ff7ffbfd60d2fafd6756bc37c9fc008fca95d7b96f12c,2024-03-15T21:15:06.780000
CVE-2021-47116,1,1,d51875e5ee6abca1387442ad957afc1ce7f94fc39b81095b835c0332fcd25100,2024-03-15T21:15:06.837000
CVE-2021-47117,1,1,fd1d9523b3e848f7b8845132f0d077386a88b52ee3fbb75bdc5c94f24c38cfbe,2024-03-15T21:15:06.887000
CVE-2021-47118,1,1,a56d6167fa410a08c1fa5c11d1c134708bbe4b3df8acd9b0b4348706d93b127a,2024-03-15T21:15:06.943000
CVE-2021-47119,1,1,83a589d5e83b72447c0cce40239d3afb7adb2b5cabc1a1a303f5ae18978e8624,2024-03-15T21:15:07.013000
CVE-2021-47120,1,1,9a362fa6d870b275c887882815a6a41a28f83f82b50b386aece6bd32f699b2bf,2024-03-15T21:15:07.060000
CVE-2021-47121,1,1,b483724bc119a462e3b19e7819141909ddaa00d9a3c4a6ee33ea94d07f1195f9,2024-03-15T21:15:07.107000
CVE-2021-47122,1,1,d9cf8e88d58e45f922daf3013c5a33c4460b98effcfa60faaac55c09b00f9cea,2024-03-15T21:15:07.157000
CVE-2021-47123,1,1,cc2000197fe279f9e35a024b11f909d25d47e5b6ab43a7c49a9f22df006baab5,2024-03-15T21:15:07.217000
CVE-2021-47124,1,1,6b1757ace4aa336f8da8130dcc69a5946028df691f072ac206b16fcc8f62a457,2024-03-15T21:15:07.260000
CVE-2021-47125,1,1,952076a43f9a2ec0cb3f1bb66e29ba8a3b0d6d3f6ae7cdf8c8506ed586a0f7e9,2024-03-15T21:15:07.307000
CVE-2021-47126,1,1,d359df394da746253881a70f893e24c56c093854e9d9106f5211e8c5e7124226,2024-03-15T21:15:07.357000
CVE-2021-47127,1,1,e35d1a3cae6fe375ee038e748244bc119a34cc453d012e7f0c7586f9257a1c86,2024-03-15T21:15:07.417000
CVE-2021-47128,1,1,cf75f7dcb165795f2873d67df106fe194809e2588f9012d0bbadfd044cfaacda,2024-03-15T21:15:07.470000
CVE-2021-47129,1,1,87bc02b1cd48c4ae58ba0c319bbc88f378de667cd5c35a3fddf3a969973109ee,2024-03-15T21:15:07.523000
CVE-2021-47130,1,1,632d583aa98b93ba6e9e06432f8d210a3df385d310eba483e00b8df9a4709a31,2024-03-15T21:15:07.577000
CVE-2021-47131,1,1,a7a7ddb390af376acda371af1e62e35462037a5f613402da868852bf017886ab,2024-03-15T21:15:07.623000
CVE-2021-47132,1,1,904aad6376cd18b2f4696ca3bca50b2414d8a33696f346cffde3fc2fdbe7d268,2024-03-15T21:15:07.690000
CVE-2021-47133,1,1,51ffaaec5b45f2a09158e14ec014d8485896f93192861198cd37de8e1a3cf8f6,2024-03-15T21:15:07.733000
CVE-2021-47134,1,1,a5fcc48063e18e29e77f9d09561221e9417032a6392add5d6ab2f933c1f041d5,2024-03-15T21:15:07.780000
CVE-2021-47135,1,1,4878fee0f7716b7b386d5d5bc0358217f2eb6ab74fe1c6f8fc3eaabdf207e4b6,2024-03-15T21:15:07.823000
CVE-2021-47109,0,0,ce6b03d903d9f6be905f959476e894779d96ba2770f731c6ea11b7f10720918b,2024-03-15T21:15:06.457000
CVE-2021-47110,0,0,7bbc492794564c9effb63e3254fc2b5d6b556a4d2539e032cc65a1891264ee91,2024-03-15T21:15:06.530000
CVE-2021-47111,0,0,6ab3e7a1217cc00e79c65fdfbc3e8f13b8d878f84be3361ac5858fae049de6e7,2024-03-15T21:15:06.577000
CVE-2021-47112,0,0,767cd084cb517662ef2bba66625f80fac272a5b19f5e27f60a4171b520be56c6,2024-03-15T21:15:06.627000
CVE-2021-47113,0,0,7b41c8a87e2677ff476366d8b59bf106d6ca989b8ee0c2d8dec660108eeb074b,2024-03-15T21:15:06.673000
CVE-2021-47114,0,0,4b5c00db2d7ab0fc95bc2412d35e867687adc9a9a046c5713f5b035175561ab8,2024-03-15T21:15:06.723000
CVE-2021-47115,0,0,5525ab6b437031ede92ff7ffbfd60d2fafd6756bc37c9fc008fca95d7b96f12c,2024-03-15T21:15:06.780000
CVE-2021-47116,0,0,d51875e5ee6abca1387442ad957afc1ce7f94fc39b81095b835c0332fcd25100,2024-03-15T21:15:06.837000
CVE-2021-47117,0,0,fd1d9523b3e848f7b8845132f0d077386a88b52ee3fbb75bdc5c94f24c38cfbe,2024-03-15T21:15:06.887000
CVE-2021-47118,0,0,a56d6167fa410a08c1fa5c11d1c134708bbe4b3df8acd9b0b4348706d93b127a,2024-03-15T21:15:06.943000
CVE-2021-47119,0,0,83a589d5e83b72447c0cce40239d3afb7adb2b5cabc1a1a303f5ae18978e8624,2024-03-15T21:15:07.013000
CVE-2021-47120,0,0,9a362fa6d870b275c887882815a6a41a28f83f82b50b386aece6bd32f699b2bf,2024-03-15T21:15:07.060000
CVE-2021-47121,0,0,b483724bc119a462e3b19e7819141909ddaa00d9a3c4a6ee33ea94d07f1195f9,2024-03-15T21:15:07.107000
CVE-2021-47122,0,0,d9cf8e88d58e45f922daf3013c5a33c4460b98effcfa60faaac55c09b00f9cea,2024-03-15T21:15:07.157000
CVE-2021-47123,0,0,cc2000197fe279f9e35a024b11f909d25d47e5b6ab43a7c49a9f22df006baab5,2024-03-15T21:15:07.217000
CVE-2021-47124,0,0,6b1757ace4aa336f8da8130dcc69a5946028df691f072ac206b16fcc8f62a457,2024-03-15T21:15:07.260000
CVE-2021-47125,0,0,952076a43f9a2ec0cb3f1bb66e29ba8a3b0d6d3f6ae7cdf8c8506ed586a0f7e9,2024-03-15T21:15:07.307000
CVE-2021-47126,0,0,d359df394da746253881a70f893e24c56c093854e9d9106f5211e8c5e7124226,2024-03-15T21:15:07.357000
CVE-2021-47127,0,0,e35d1a3cae6fe375ee038e748244bc119a34cc453d012e7f0c7586f9257a1c86,2024-03-15T21:15:07.417000
CVE-2021-47128,0,0,cf75f7dcb165795f2873d67df106fe194809e2588f9012d0bbadfd044cfaacda,2024-03-15T21:15:07.470000
CVE-2021-47129,0,0,87bc02b1cd48c4ae58ba0c319bbc88f378de667cd5c35a3fddf3a969973109ee,2024-03-15T21:15:07.523000
CVE-2021-47130,0,0,632d583aa98b93ba6e9e06432f8d210a3df385d310eba483e00b8df9a4709a31,2024-03-15T21:15:07.577000
CVE-2021-47131,0,0,a7a7ddb390af376acda371af1e62e35462037a5f613402da868852bf017886ab,2024-03-15T21:15:07.623000
CVE-2021-47132,0,0,904aad6376cd18b2f4696ca3bca50b2414d8a33696f346cffde3fc2fdbe7d268,2024-03-15T21:15:07.690000
CVE-2021-47133,0,0,51ffaaec5b45f2a09158e14ec014d8485896f93192861198cd37de8e1a3cf8f6,2024-03-15T21:15:07.733000
CVE-2021-47134,0,0,a5fcc48063e18e29e77f9d09561221e9417032a6392add5d6ab2f933c1f041d5,2024-03-15T21:15:07.780000
CVE-2021-47135,0,0,4878fee0f7716b7b386d5d5bc0358217f2eb6ab74fe1c6f8fc3eaabdf207e4b6,2024-03-15T21:15:07.823000
CVE-2022-0001,0,0,eef83f8ee034200b042b5eda26b679b982266672cf1407daf8d9fbe1ba7937b5,2022-08-19T12:28:32.903000
CVE-2022-0002,0,0,4ba989879ca817729e7cddc36d35dc20834fb13fd71d0cce189890fe2defbd53,2022-08-19T12:28:50.667000
CVE-2022-0004,0,0,4891f62a2edc2f307dec62ec3f2089232f3fddba4652b7ef635786ed0f8a2286,2022-06-10T20:52:37.810000
@ -240138,6 +240138,7 @@ CVE-2024-23294,0,0,c0cdcedc3bcfe664ab02fca520276a0c72a6eafb77125bfc3a4566d618829
CVE-2024-23295,0,0,743f5eabb2b6d4f98b7103afe617defce53a2964c31cc5fb435d1e716a86d3b5,2024-03-13T23:15:47.630000
CVE-2024-23296,0,0,322a9bff1dffd6e7a438ed16a632e25fb3ad5498f5ba7a6fb585162df6fe0874,2024-03-13T23:15:47.673000
CVE-2024-23297,0,0,11090791f72ea9d35b8fb354b91b4b823c54cb3e7511d3c9883ee2b46d74ae89,2024-03-13T22:15:11.520000
CVE-2024-23298,1,1,b3c2e2fa55a339e4c681fa4c9e5fdbe16092538bc0074ad8da26c63a64af4332,2024-03-15T23:15:07.403000
CVE-2024-2330,0,0,0a9f9e37587f34158a3bf6f7d53eb1a5e641504fa11cf02eb4524614459dfa8a,2024-03-11T01:32:29.610000
CVE-2024-23300,0,0,9e732c262847100dbcf579b4c37b4c875c53e2f23045a19a85b558ff38956aa4,2024-03-13T22:15:11.643000
CVE-2024-23301,0,0,95f1c4c0d3c3f56beb5ca2f43c481bd416943d89ac106cdf8ea6bddea7fc220a,2024-02-21T03:15:08.950000
@ -240862,6 +240863,7 @@ CVE-2024-25128,0,0,172c5f0d62603832e5d7859a4a8be0b3217ee5b1e8ffd030ff8a010d7f347
CVE-2024-25129,0,0,94b297a9d28866e9e3344e76c82b40cabac4f54bd9e83f1602ef019da71f96a9,2024-02-23T02:42:54.547000
CVE-2024-25130,0,0,9ed6bdd2e0b9e9a9c6f507d6c013b142ff6c3cd551628d5ce4a7cec9082ee81a,2024-02-23T02:42:54.547000
CVE-2024-25139,0,0,434a1a8570432b07a345e2d4d94e9a66656e3c23943681acca2835cd987627db,2024-03-14T18:11:35.910000
CVE-2024-2514,1,1,ec9cf6ee58ec4a80f29edf0b88868776b3008a09ebf18ec17753b7b2ab7476f3,2024-03-15T23:15:08.423000
CVE-2024-25140,0,0,910924059f66fa65d93f5323847e59d03704b67134867a3ac9eb665a02a38fa2,2024-02-14T00:26:27.847000
CVE-2024-25141,0,0,29fa0c24f25cecd1df32a87cb8d97e893df4f50e0ef569f7fd7f97de363aa71b,2024-02-20T22:15:08.670000
CVE-2024-25143,0,0,ed1d5e0e430dd07199fade8c66d12e89ec5dc7886fca4f2d677be809afcc5ced,2024-02-07T17:04:54.407000
@ -241661,3 +241663,5 @@ CVE-2024-28848,0,0,9f8c7225595322059d38724bed1ba04ddee2b018a02cfd745103d16e54c30
CVE-2024-28849,0,0,3fd4e14c66f66b904cf6ec0b520762c4afbd3156d6cd6b7fed8cfe38b4a83639,2024-03-14T18:11:35.910000
CVE-2024-28851,0,0,798126238be42ab31bcc9bf0f8d435b66bd783f1ed035f2a602c408bbf00f729,2024-03-15T19:15:07.410000
CVE-2024-28854,0,0,080f89fa07a13dfa79a052e6e6ea26c27be4f160b372d6bc4c0a2de6bf56ca0c,2024-03-15T19:15:07.627000
CVE-2024-28859,1,1,52855aad5be716ba80b4cf84fcf4f2529faafd01cd3f966c6a96eb3a25e30594,2024-03-15T23:15:08.117000
CVE-2024-28862,1,1,adf5798b6f3addbb5241f837f203e9f0eed6e8c1190dc5019d8454d4cc34f010,2024-03-16T00:15:07.570000

Can't render this file because it is too large.