Auto-Update: 2024-03-26T23:00:38.368914+00:00

This commit is contained in:
cad-safe-bot 2024-03-26 23:03:27 +00:00
parent ee94619998
commit ea5e5d6b36
30 changed files with 1386 additions and 45 deletions

View File

@ -0,0 +1,67 @@
{
"id": "CVE-2023-28687",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-03-26T21:15:50.477",
"lastModified": "2024-03-26T21:15:50.477",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in perfectwpthemes Glaze Blog Lite, themebeez Fascinate, themebeez Cream Blog, themebeez Cream Magazine allows Reflected XSS.This issue affects Glaze Blog Lite: from n/a through <= 1.1.4; Fascinate: from n/a through 1.0.8; Cream Blog: from n/a through 2.1.3; Cream Magazine: from n/a through 2.1.4.\n\n"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW",
"baseScore": 7.1,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 3.7
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/cream-blog/wordpress-cream-blog-theme-2-1-3-cross-site-scripting-xss-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
},
{
"url": "https://patchstack.com/database/vulnerability/cream-magazine/wordpress-cream-magazine-theme-2-1-4-cross-site-scripting-xss-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
},
{
"url": "https://patchstack.com/database/vulnerability/fascinate/wordpress-fascinate-theme-1-0-8-cross-site-scripting-xss-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
},
{
"url": "https://patchstack.com/database/vulnerability/glaze-blog-lite/wordpress-glaze-blog-lite-theme-1-1-4-cross-site-scripting-xss-vulnerability",
"source": "audit@patchstack.com"
}
]
}

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2023-28787",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-03-26T21:15:50.693",
"lastModified": "2024-03-26T21:15:50.693",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in ExpressTech Quiz And Survey Master.This issue affects Quiz And Survey Master: from n/a through 8.1.4.\n\n"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "LOW",
"baseScore": 9.3,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 4.7
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/quiz-master-next/wordpress-quiz-and-survey-master-plugin-8-1-4-unauthenticated-sql-injection-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2023-29386",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-03-26T21:15:50.900",
"lastModified": "2024-03-26T21:15:50.900",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Unrestricted Upload of File with Dangerous Type vulnerability in Julien Crego Manager for Icomoon.This issue affects Manager for Icomoon: from n/a through 2.0.\n\n"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.1,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 2.3,
"impactScore": 6.0
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-434"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/manager-for-icomoon/wordpress-manager-for-icommon-plugin-2-0-arbitrary-file-upload-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2023-38388",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-03-26T21:15:51.113",
"lastModified": "2024-03-26T21:15:51.113",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Unrestricted Upload of File with Dangerous Type vulnerability in Artbees JupiterX Core.This issue affects JupiterX Core: from n/a through 3.3.5.\n\n"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.0,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 2.2,
"impactScore": 6.0
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-434"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/jupiterx-core/wordpress-jupiter-x-core-plugin-3-3-0-unauthenticated-arbitrary-file-upload-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2023-39307",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-03-26T21:15:51.330",
"lastModified": "2024-03-26T21:15:51.330",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Unrestricted Upload of File with Dangerous Type vulnerability in ThemeFusion Avada.This issue affects Avada: from n/a through 7.11.1.\n\n"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.5,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 6.0
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-434"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/avada/wordpress-avada-theme-7-11-1-authenticated-arbitrary-file-upload-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2023-47842",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-03-26T21:15:51.530",
"lastModified": "2024-03-26T21:15:51.530",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Unrestricted Upload of File with Dangerous Type vulnerability in Zachary Segal CataBlog.This issue affects CataBlog: from n/a through 1.7.0.\n\n"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.1,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 2.3,
"impactScore": 6.0
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-434"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/catablog/wordpress-catablog-plugin-1-7-0-arbitrary-file-upload-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2023-47846",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-03-26T21:15:51.737",
"lastModified": "2024-03-26T21:15:51.737",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Unrestricted Upload of File with Dangerous Type vulnerability in Terry Lin WP Githuber MD.This issue affects WP Githuber MD: from n/a through 1.16.2.\n\n"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.1,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 2.3,
"impactScore": 6.0
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-434"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/wp-githuber-md/wordpress-wp-githuber-md-plugin-1-16-2-arbitrary-file-upload-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2023-47873",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-03-26T21:15:51.933",
"lastModified": "2024-03-26T21:15:51.933",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Unrestricted Upload of File with Dangerous Type vulnerability in WEN Solutions WP Child Theme Generator.This issue affects WP Child Theme Generator: from n/a through 1.0.9.\n\n"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.1,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 2.3,
"impactScore": 6.0
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-434"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/wp-child-theme-generator/wordpress-wp-child-theme-generator-plugin-1-0-8-arbitrary-file-upload-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2023-48275",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-03-26T21:15:52.143",
"lastModified": "2024-03-26T21:15:52.143",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Unrestricted Upload of File with Dangerous Type vulnerability in Trustindex.Io Widgets for Google Reviews.This issue affects Widgets for Google Reviews: from n/a through 11.0.2.\n\n"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.0,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.3,
"impactScore": 6.0
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-434"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/wp-reviews-plugin-for-google/wordpress-widgets-for-google-reviews-plugin-11-0-2-arbitrary-file-upload-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2023-48777",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-03-26T21:15:52.350",
"lastModified": "2024-03-26T21:15:52.350",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Unrestricted Upload of File with Dangerous Type vulnerability in Elementor.Com Elementor Website Builder.This issue affects Elementor Website Builder: from 3.3.0 through 3.18.1.\n\n"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.9,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.1,
"impactScore": 6.0
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-434"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/elementor/wordpress-elementor-plugin-3-18-0-arbitrary-file-upload-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2023-51146",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-03-26T22:15:07.677",
"lastModified": "2024-03-26T22:15:07.677",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Buffer Overflow vulnerability in TRENDnet AC1200 TEW-821DAP with firmware version 3.00b06 allows an attacker to execute arbitrary code via the adm_add_user action."
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/SpikeReply/advisories/blob/main/cve/trendnet/cve-2023-51146.md",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2023-51147",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-03-26T22:15:07.747",
"lastModified": "2024-03-26T22:15:07.747",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Buffer Overflow vulnerability in TRENDnet Trendnet AC1200 TEW-821DAP with firmware version 3.00b06 allows an attacker to execute arbitrary code via the adm_mod_pwd action."
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/SpikeReply/advisories/blob/main/cve/trendnet/cve-2023-51147.md",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,24 @@
{
"id": "CVE-2023-51148",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-03-26T21:15:52.557",
"lastModified": "2024-03-26T21:15:52.557",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "An issue in TRENDnet Trendnet AC1200 Dual Band PoE Indoor Wireless Access Point TEW-821DAP v.3.00b06 allows an attacker to execute arbitrary code via the 'mycli' command-line interface component."
}
],
"metrics": {},
"references": [
{
"url": "http://trendnet.com",
"source": "cve@mitre.org"
},
{
"url": "https://github.com/SpikeReply/advisories/blob/main/cve/trendnet/cve-2023-51148.md",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,28 @@
{
"id": "CVE-2024-25420",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-03-26T21:15:52.710",
"lastModified": "2024-03-26T21:15:52.710",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "An issue in Ignite Realtime Openfire v.4.9.0 and before allows a remote attacker to escalate privileges via the admin.authorizedJIDs system property component."
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/igniterealtime/Openfire/blob/main/xmppserver/src/main/java/org/jivesoftware/openfire/admin/AdminManager.java",
"source": "cve@mitre.org"
},
{
"url": "https://www.hackthebox.com/blog/openfire-cves-explained-CVE-2024-25420-CVE-2024-25421",
"source": "cve@mitre.org"
},
{
"url": "https://www.igniterealtime.org/projects/openfire/",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,28 @@
{
"id": "CVE-2024-25421",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-03-26T21:15:52.773",
"lastModified": "2024-03-26T21:15:52.773",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "An issue in Ignite Realtime Openfire v.4.9.0 and before allows a remote attacker to escalate privileges via the ROOM_CACHE component."
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/igniterealtime/Openfire/blob/main/xmppserver/src/main/java/org/jivesoftware/openfire/muc/spi/LocalMUCRoomManager.java",
"source": "cve@mitre.org"
},
{
"url": "https://www.hackthebox.com/blog/openfire-cves-explained-CVE-2024-25420-CVE-2024-25421",
"source": "cve@mitre.org"
},
{
"url": "https://www.igniterealtime.org/projects/openfire/",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,43 @@
{
"id": "CVE-2024-26303",
"sourceIdentifier": "security-alert@hpe.com",
"published": "2024-03-26T21:15:52.827",
"lastModified": "2024-03-26T21:15:52.827",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Authenticated Denial of Service Vulnerability in ArubaOS-Switch SSH Daemon\n\n"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security-alert@hpe.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 4.9,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.2,
"impactScore": 3.6
}
]
},
"references": [
{
"url": "https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2024-003.txt",
"source": "security-alert@hpe.com"
}
]
}

View File

@ -0,0 +1,24 @@
{
"id": "CVE-2024-27521",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-03-26T21:15:53.013",
"lastModified": "2024-03-26T21:15:53.013",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "TOTOLINK A3300R V17.0.0cu.557_B20221024 was discovered to contain an unauthenticated remote command execution (RCE) vulnerability via multiple parameters in the \"setOpModeCfg\" function. This security issue allows an attacker to take complete control of the device. In detail, exploitation allows unauthenticated, remote attackers to execute arbitrary system commands with administrative privileges (i.e., as user \"root\")."
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/SpikeReply/advisories/blob/main/cve/totolink/cve-2024-27521.md",
"source": "cve@mitre.org"
},
{
"url": "https://m.totolink.net/portal/article/index/id/410.html",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2024-28545",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-03-26T21:15:53.070",
"lastModified": "2024-03-26T21:15:53.070",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Tenda AC18 V15.03.05.05 contains a command injection vulnerablility in the deviceName parameter of formsetUsbUnload function."
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC18/setUsbUnload.md",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2024-28551",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-03-26T21:15:53.123",
"lastModified": "2024-03-26T21:15:53.123",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Tenda AC18 V15.03.05.05 has a stack overflow vulnerability in the ssid parameter of form_fast_setting_wifi_set function."
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC18/form_fast_setting_wifi_set.md",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,24 @@
{
"id": "CVE-2024-2883",
"sourceIdentifier": "chrome-cve-admin@google.com",
"published": "2024-03-26T21:15:53.173",
"lastModified": "2024-03-26T21:15:53.173",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Use after free in ANGLE in Google Chrome prior to 123.0.6312.86 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: Critical)"
}
],
"metrics": {},
"references": [
{
"url": "https://chromereleases.googleblog.com/2024/03/stable-channel-update-for-desktop_26.html",
"source": "chrome-cve-admin@google.com"
},
{
"url": "https://issues.chromium.org/issues/327807820",
"source": "chrome-cve-admin@google.com"
}
]
}

View File

@ -0,0 +1,24 @@
{
"id": "CVE-2024-2885",
"sourceIdentifier": "chrome-cve-admin@google.com",
"published": "2024-03-26T21:15:53.220",
"lastModified": "2024-03-26T21:15:53.220",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Use after free in Dawn in Google Chrome prior to 123.0.6312.86 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)"
}
],
"metrics": {},
"references": [
{
"url": "https://chromereleases.googleblog.com/2024/03/stable-channel-update-for-desktop_26.html",
"source": "chrome-cve-admin@google.com"
},
{
"url": "https://issues.chromium.org/issues/328958020",
"source": "chrome-cve-admin@google.com"
}
]
}

View File

@ -0,0 +1,24 @@
{
"id": "CVE-2024-2886",
"sourceIdentifier": "chrome-cve-admin@google.com",
"published": "2024-03-26T21:15:53.260",
"lastModified": "2024-03-26T21:15:53.260",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Use after free in WebCodecs in Google Chrome prior to 123.0.6312.86 allowed a remote attacker to perform arbitrary read/write via a crafted HTML page. (Chromium security severity: High)"
}
],
"metrics": {},
"references": [
{
"url": "https://chromereleases.googleblog.com/2024/03/stable-channel-update-for-desktop_26.html",
"source": "chrome-cve-admin@google.com"
},
{
"url": "https://issues.chromium.org/issues/330575496",
"source": "chrome-cve-admin@google.com"
}
]
}

View File

@ -0,0 +1,24 @@
{
"id": "CVE-2024-2887",
"sourceIdentifier": "chrome-cve-admin@google.com",
"published": "2024-03-26T21:15:53.300",
"lastModified": "2024-03-26T21:15:53.300",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Type Confusion in WebAssembly in Google Chrome prior to 123.0.6312.86 allowed a remote attacker to execute arbitrary code via a crafted HTML page. (Chromium security severity: High)"
}
],
"metrics": {},
"references": [
{
"url": "https://chromereleases.googleblog.com/2024/03/stable-channel-update-for-desktop_26.html",
"source": "chrome-cve-admin@google.com"
},
{
"url": "https://issues.chromium.org/issues/330588502",
"source": "chrome-cve-admin@google.com"
}
]
}

View File

@ -0,0 +1,92 @@
{
"id": "CVE-2024-2903",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-03-26T21:15:53.343",
"lastModified": "2024-03-26T21:15:53.343",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was found in Tenda AC7 15.03.06.44. It has been classified as critical. Affected is the function GetParentControlInfo of the file /goform/GetParentControlInfo. The manipulation of the argument mac leads to stack-based buffer overflow. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. VDB-257946 is the identifier assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
],
"cvssMetricV2": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C",
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "SINGLE",
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"availabilityImpact": "COMPLETE",
"baseScore": 9.0
},
"baseSeverity": "HIGH",
"exploitabilityScore": 8.0,
"impactScore": 10.0,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-121"
}
]
}
],
"references": [
{
"url": "https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC7/v1/GetParentControlInfo.md",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?ctiid.257946",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?id.257946",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?submit.300452",
"source": "cna@vuldb.com"
}
]
}

View File

@ -0,0 +1,92 @@
{
"id": "CVE-2024-2909",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-03-26T21:15:53.613",
"lastModified": "2024-03-26T21:15:53.613",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability classified as critical was found in Ruijie RG-EG350 up to 20240318. Affected by this vulnerability is the function setAction of the file /itbox_pi/networksafe.php?a=set of the component HTTP POST Request Handler. The manipulation of the argument bandwidth leads to os command injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-257977 was assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
],
"cvssMetricV2": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C",
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "SINGLE",
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"availabilityImpact": "COMPLETE",
"baseScore": 9.0
},
"baseSeverity": "HIGH",
"exploitabilityScore": 8.0,
"impactScore": 10.0,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-78"
}
]
}
],
"references": [
{
"url": "https://h0e4a0r1t.github.io/2024/vulns/Ruijie%20EG350%20Easy%20Gateway%20Management%20System%20Exists%20Remote%20Code%20Execution%20Vulnerability%20networksafe.php.pdf",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?ctiid.257977",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?id.257977",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?submit.300368",
"source": "cna@vuldb.com"
}
]
}

View File

@ -0,0 +1,92 @@
{
"id": "CVE-2024-2910",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-03-26T21:15:53.880",
"lastModified": "2024-03-26T21:15:53.880",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability, which was classified as critical, has been found in Ruijie RG-EG350 up to 20240318. Affected by this issue is the function vpnAction of the file /itbox_pi/vpn_quickset_service.php?a=set_vpn of the component HTTP POST Request Handler. The manipulation of the argument ip/port/user/pass/dns/startIp leads to os command injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB-257978 is the identifier assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW",
"baseScore": 6.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 3.4
}
],
"cvssMetricV2": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "SINGLE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL",
"baseScore": 6.5
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 8.0,
"impactScore": 6.4,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-78"
}
]
}
],
"references": [
{
"url": "https://h0e4a0r1t.github.io/2024/vulns/Ruijie%20EG350%20Easy%20Gateway%20Management%20System%20Exists%20Remote%20Code%20Execution%20Vulnerability_vpn_quickset_service.php.pdf",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?ctiid.257978",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?id.257978",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?submit.300372",
"source": "cna@vuldb.com"
}
]
}

View File

@ -0,0 +1,92 @@
{
"id": "CVE-2024-2911",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-03-26T22:15:07.823",
"lastModified": "2024-03-26T22:15:07.823",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability, which was classified as problematic, was found in Tianjin PubliCMS 4.0.202302.e. This affects an unknown part. The manipulation leads to cross-site request forgery. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-257979. NOTE: The vendor was contacted early about this disclosure but did not respond in any way."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 1.4
}
],
"cvssMetricV2": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N",
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"availabilityImpact": "NONE",
"baseScore": 5.0
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 10.0,
"impactScore": 2.9,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-352"
}
]
}
],
"references": [
{
"url": "https://github.com/sweatxi/BugHub/blob/main/publiccms_csrf.pdf",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?ctiid.257979",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?id.257979",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?submit.300339",
"source": "cna@vuldb.com"
}
]
}

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2024-2971",
"sourceIdentifier": "xpdf@xpdfreader.com",
"published": "2024-03-26T22:15:08.190",
"lastModified": "2024-03-26T22:15:08.190",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Out-of-bounds array write in Xpdf 4.05 and earlier, triggered by negative object number in indirect reference in the input PDF file.\n\n"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "xpdf@xpdfreader.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L",
"attackVector": "LOCAL",
"attackComplexity": "HIGH",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "LOW",
"baseScore": 2.9,
"baseSeverity": "LOW"
},
"exploitabilityScore": 1.4,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "xpdf@xpdfreader.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-787"
}
]
}
],
"references": [
{
"url": "https://www.xpdfreader.com/security-bug/CVE-2024-2971.html",
"source": "xpdf@xpdfreader.com"
}
]
}

View File

@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update
```plain
2024-03-26T21:00:38.651774+00:00
2024-03-26T23:00:38.368914+00:00
```
### Most recent CVE Modification Timestamp synchronized with NVD
```plain
2024-03-26T20:15:11.710000+00:00
2024-03-26T22:15:08.190000+00:00
```
### Last Data Feed Release
@ -33,39 +33,44 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
### Total Number of included CVEs
```plain
242756
242784
```
### CVEs added in the last Commit
Recently added CVEs: `15`
Recently added CVEs: `28`
\* [CVE-2023-23656](CVE-2023/CVE-2023-236xx/CVE-2023-23656.json) (`2024-03-26T20:15:08.067`)
\* [CVE-2023-25965](CVE-2023/CVE-2023-259xx/CVE-2023-25965.json) (`2024-03-26T20:15:08.280`)
\* [CVE-2023-27440](CVE-2023/CVE-2023-274xx/CVE-2023-27440.json) (`2024-03-26T20:15:08.483`)
\* [CVE-2023-27459](CVE-2023/CVE-2023-274xx/CVE-2023-27459.json) (`2024-03-26T20:15:08.737`)
\* [CVE-2023-27630](CVE-2023/CVE-2023-276xx/CVE-2023-27630.json) (`2024-03-26T20:15:08.953`)
\* [CVE-2023-6091](CVE-2023/CVE-2023-60xx/CVE-2023-6091.json) (`2024-03-26T20:15:09.167`)
\* [CVE-2024-22436](CVE-2024/CVE-2024-224xx/CVE-2024-22436.json) (`2024-03-26T19:15:48.550`)
\* [CVE-2024-28442](CVE-2024/CVE-2024-284xx/CVE-2024-28442.json) (`2024-03-26T20:15:09.670`)
\* [CVE-2024-2897](CVE-2024/CVE-2024-28xx/CVE-2024-2897.json) (`2024-03-26T19:15:48.857`)
\* [CVE-2024-2898](CVE-2024/CVE-2024-28xx/CVE-2024-2898.json) (`2024-03-26T19:15:49.130`)
\* [CVE-2024-2899](CVE-2024/CVE-2024-28xx/CVE-2024-2899.json) (`2024-03-26T19:15:49.410`)
\* [CVE-2024-2900](CVE-2024/CVE-2024-29xx/CVE-2024-2900.json) (`2024-03-26T20:15:10.500`)
\* [CVE-2024-2901](CVE-2024/CVE-2024-29xx/CVE-2024-2901.json) (`2024-03-26T20:15:10.933`)
\* [CVE-2024-2902](CVE-2024/CVE-2024-29xx/CVE-2024-2902.json) (`2024-03-26T20:15:11.203`)
\* [CVE-2024-2955](CVE-2024/CVE-2024-29xx/CVE-2024-2955.json) (`2024-03-26T20:15:11.710`)
\* [CVE-2023-38388](CVE-2023/CVE-2023-383xx/CVE-2023-38388.json) (`2024-03-26T21:15:51.113`)
\* [CVE-2023-39307](CVE-2023/CVE-2023-393xx/CVE-2023-39307.json) (`2024-03-26T21:15:51.330`)
\* [CVE-2023-47842](CVE-2023/CVE-2023-478xx/CVE-2023-47842.json) (`2024-03-26T21:15:51.530`)
\* [CVE-2023-47846](CVE-2023/CVE-2023-478xx/CVE-2023-47846.json) (`2024-03-26T21:15:51.737`)
\* [CVE-2023-47873](CVE-2023/CVE-2023-478xx/CVE-2023-47873.json) (`2024-03-26T21:15:51.933`)
\* [CVE-2023-48275](CVE-2023/CVE-2023-482xx/CVE-2023-48275.json) (`2024-03-26T21:15:52.143`)
\* [CVE-2023-48777](CVE-2023/CVE-2023-487xx/CVE-2023-48777.json) (`2024-03-26T21:15:52.350`)
\* [CVE-2023-51146](CVE-2023/CVE-2023-511xx/CVE-2023-51146.json) (`2024-03-26T22:15:07.677`)
\* [CVE-2023-51147](CVE-2023/CVE-2023-511xx/CVE-2023-51147.json) (`2024-03-26T22:15:07.747`)
\* [CVE-2023-51148](CVE-2023/CVE-2023-511xx/CVE-2023-51148.json) (`2024-03-26T21:15:52.557`)
\* [CVE-2024-25420](CVE-2024/CVE-2024-254xx/CVE-2024-25420.json) (`2024-03-26T21:15:52.710`)
\* [CVE-2024-25421](CVE-2024/CVE-2024-254xx/CVE-2024-25421.json) (`2024-03-26T21:15:52.773`)
\* [CVE-2024-26303](CVE-2024/CVE-2024-263xx/CVE-2024-26303.json) (`2024-03-26T21:15:52.827`)
\* [CVE-2024-27521](CVE-2024/CVE-2024-275xx/CVE-2024-27521.json) (`2024-03-26T21:15:53.013`)
\* [CVE-2024-28545](CVE-2024/CVE-2024-285xx/CVE-2024-28545.json) (`2024-03-26T21:15:53.070`)
\* [CVE-2024-28551](CVE-2024/CVE-2024-285xx/CVE-2024-28551.json) (`2024-03-26T21:15:53.123`)
\* [CVE-2024-2883](CVE-2024/CVE-2024-28xx/CVE-2024-2883.json) (`2024-03-26T21:15:53.173`)
\* [CVE-2024-2885](CVE-2024/CVE-2024-28xx/CVE-2024-2885.json) (`2024-03-26T21:15:53.220`)
\* [CVE-2024-2886](CVE-2024/CVE-2024-28xx/CVE-2024-2886.json) (`2024-03-26T21:15:53.260`)
\* [CVE-2024-2887](CVE-2024/CVE-2024-28xx/CVE-2024-2887.json) (`2024-03-26T21:15:53.300`)
\* [CVE-2024-2903](CVE-2024/CVE-2024-29xx/CVE-2024-2903.json) (`2024-03-26T21:15:53.343`)
\* [CVE-2024-2909](CVE-2024/CVE-2024-29xx/CVE-2024-2909.json) (`2024-03-26T21:15:53.613`)
\* [CVE-2024-2910](CVE-2024/CVE-2024-29xx/CVE-2024-2910.json) (`2024-03-26T21:15:53.880`)
\* [CVE-2024-2911](CVE-2024/CVE-2024-29xx/CVE-2024-2911.json) (`2024-03-26T22:15:07.823`)
\* [CVE-2024-2971](CVE-2024/CVE-2024-29xx/CVE-2024-2971.json) (`2024-03-26T22:15:08.190`)
### CVEs modified in the last Commit
Recently modified CVEs: `5`
Recently modified CVEs: `0`
\* [CVE-2023-39340](CVE-2023/CVE-2023-393xx/CVE-2023-39340.json) (`2024-03-26T19:18:28.943`)
\* [CVE-2023-41719](CVE-2023/CVE-2023-417xx/CVE-2023-41719.json) (`2024-03-26T19:26:49.713`)
\* [CVE-2023-41720](CVE-2023/CVE-2023-417xx/CVE-2023-41720.json) (`2024-03-26T19:27:41.727`)
\* [CVE-2024-23252](CVE-2024/CVE-2024-232xx/CVE-2024-23252.json) (`2024-03-26T19:15:48.757`)
\* [CVE-2024-2485](CVE-2024/CVE-2024-24xx/CVE-2024-2485.json) (`2024-03-26T20:15:09.860`)
## Download and Usage

View File

@ -216438,7 +216438,7 @@ CVE-2023-2365,0,0,2b641966f73da1c03bac76f197cc25cdb025794330e95137c224f9ed081938
CVE-2023-23650,0,0,bdb43282ea7d888f54eeb4c029ba9e5c1a406d2afa563b42e6a7548e68ecb093,2023-11-07T04:07:51.107000
CVE-2023-23651,0,0,67236451a80b9f55a14752d0a0b34135a6cd3e5bc4be1a75484ace6a6c1a0cd3,2023-10-14T02:21:03.983000
CVE-2023-23654,0,0,6d31dd903ef9ef9379174f7a720524fd14097fdb73f792d32eb91eccd0b45b6c,2023-05-22T17:08:57.177000
CVE-2023-23656,1,1,a75dffc16686b4ea09f1d724c758ef992b2e0514e587812eb9d757ab758e97ff,2024-03-26T20:15:08.067000
CVE-2023-23656,0,0,a75dffc16686b4ea09f1d724c758ef992b2e0514e587812eb9d757ab758e97ff,2024-03-26T20:15:08.067000
CVE-2023-23657,0,0,f9c995611939bee80b60fce69760b00f7d14fc21835d54b0d99400a290e44b44,2023-05-23T18:54:10.007000
CVE-2023-23659,0,0,cdef213e979c790c823e596ef73ecdade9b047293b4aa108b66a27bc2cad5371,2023-11-07T04:07:51.230000
CVE-2023-2366,0,0,ed15702be74cf809ce5d75fa41ed676adc877c6d79d7c35130d7ba1ed1c651d5,2024-03-21T02:47:07.970000
@ -218308,7 +218308,7 @@ CVE-2023-25961,0,0,31e0a6732f540f6917a1b6b5d3508a68522e67ae0de03ce13bbd138d765f8
CVE-2023-25962,0,0,4b86764ac537e69027b956317cbcf9c9fc22f8f441c355a28f72aebfd340b8b0,2023-05-10T02:29:05.977000
CVE-2023-25963,0,0,9327aafe21090ee3e0080b9c6ae99110509f70c0997007468a111a8ed1dde950,2023-06-22T19:48:48.483000
CVE-2023-25964,0,0,7b22724b55e21a391c842995faf0e67fccd6411b05e064deea6e494a18b5d976,2023-06-20T14:45:48.997000
CVE-2023-25965,1,1,8a98b7afd07e87af087c49e75154db0cf3bec9684dcadbbb2fa42a8a5051eacd,2024-03-26T20:15:08.280000
CVE-2023-25965,0,0,8a98b7afd07e87af087c49e75154db0cf3bec9684dcadbbb2fa42a8a5051eacd,2024-03-26T20:15:08.280000
CVE-2023-25967,0,0,9c3dc755573ab57072330583684d5a0ccfafd1682f61498b0546de78bdaef7bd,2023-05-08T13:44:41.297000
CVE-2023-25968,0,0,fea5f7ad1565ee9cbedd5c1ceb3cfee62c0a455aa81f74dc9b60952c3c0aae39,2023-11-07T04:09:16.290000
CVE-2023-2597,0,0,6cc8e290e260e4840e41efc9aaeddabe788a6e7ccac7fda76a06f95efa4bdb4c,2023-05-30T21:32:32.543000
@ -219326,7 +219326,7 @@ CVE-2023-27436,0,0,b0caec624f07aa2674ca9cf73465606bd64f5388b6c821e66d91e5649c784
CVE-2023-27438,0,0,5be0f579772e68b81f545a98e4ef90f61e8a2d38cccc27e3ec3103a8d20b96e0,2023-11-15T19:12:13.987000
CVE-2023-27439,0,0,e78320b1d1cd6cd11ce4f0b7074e10ed4bb0a9d26bddd73278d8796f5cb702c5,2023-06-27T20:54:24.717000
CVE-2023-2744,0,0,52d31477da03b6d03cb7cbec9b1fb880499c8f8304e18c6a878c67a90a6d440a,2023-11-07T04:13:15.560000
CVE-2023-27440,1,1,f7b148d3b7aed705a7bcc4ec8cd78d0dcd052ec5a116e3310c04812a3d277560,2024-03-26T20:15:08.483000
CVE-2023-27440,0,0,f7b148d3b7aed705a7bcc4ec8cd78d0dcd052ec5a116e3310c04812a3d277560,2024-03-26T20:15:08.483000
CVE-2023-27441,0,0,ebfa08ad136b1620df5e502d2f427908beb2416e3e07d1bcf8c575dbe0f1d40c,2023-11-15T19:15:28.277000
CVE-2023-27442,0,0,65446bf943eed43ba92190c90858cfd42d8caed68c959a6123994e47e8202f09,2023-11-27T22:08:45.050000
CVE-2023-27443,0,0,e70a6b1c796ac11415e202ca17f07dcc6233dc38e7b06100261f3e321ddddcbb,2023-06-28T16:01:26.587000
@ -219343,7 +219343,7 @@ CVE-2023-27453,0,0,ee071e586fd895bda9aadad5e737702076d121a85b852525dba6f456b0e0f
CVE-2023-27455,0,0,7e32e8ad48a7824fd11c180849e8ede25b549547ecace669f4090b4f566ed004,2023-05-16T21:43:52.443000
CVE-2023-27457,0,0,6a6b95f6e1965667d65b9ab16b546fc7c64c0640a898b8db40aaceb9a901aff5,2023-11-30T19:44:39.023000
CVE-2023-27458,0,0,8f4bf85bfa600ead504bb2798ec3dc271ef7cc4efe1718deebe7ef63f402ef8d,2023-11-30T19:41:51.770000
CVE-2023-27459,1,1,c28b3e932c1aec22594bc80dd4a57b72c28d826de344bf5086b48bab6c6e24ce,2024-03-26T20:15:08.737000
CVE-2023-27459,0,0,c28b3e932c1aec22594bc80dd4a57b72c28d826de344bf5086b48bab6c6e24ce,2024-03-26T20:15:08.737000
CVE-2023-2746,0,0,189d0393932e2d9dc55b6f912ad82e4a97a7e551c0597cdf074171620345d1e2,2023-07-18T19:26:41.327000
CVE-2023-27461,0,0,820e9f8cdace996b5a4700f4726e6326898ef3adb42497085b1aae66b21c3ae3,2023-11-30T15:26:18.103000
CVE-2023-27462,0,0,61fd4f9772445cd7d5c02748d8dadac37d825a79bed367257ae702b32ea75e04,2023-03-17T17:08:26.373000
@ -219498,7 +219498,7 @@ CVE-2023-27627,0,0,9a15daa7472d5aaf33aca757cd7d1a633dc6cb30118d7b7951fbbab74ec99
CVE-2023-27628,0,0,6821355c8ee1dd2c2bac02a7bd738a2a4ca0c2ac34c6a239588410041d688ab4,2023-09-29T18:38:01.643000
CVE-2023-27629,0,0,c7bdbf7f70e7ff884f174fbcaf472262dd344c8876ffc6bcbd454b2e4d8c35cb,2023-06-28T03:28:24.817000
CVE-2023-2763,0,0,902c2a829b97eeb5cdb5ef73f11e8cac31787b838427aeff2459e6cf73fb5649,2023-07-20T01:56:00.570000
CVE-2023-27630,1,1,a461f215e620df29e38ad686c7d2f5a2aebe4286c233d2fc877e60edf20c53e1,2024-03-26T20:15:08.953000
CVE-2023-27630,0,0,a461f215e620df29e38ad686c7d2f5a2aebe4286c233d2fc877e60edf20c53e1,2024-03-26T20:15:08.953000
CVE-2023-27631,0,0,243c34486db3b62aaccae00faaedfdf15aca3fc5e1c8f960ee009b611a3ba79c,2023-06-28T03:27:49.077000
CVE-2023-27632,0,0,c0f75ba197626880fad4e5bd26d8ec95adffab87af57cc725356c0d01e9a9e0e,2023-11-17T19:29:14.953000
CVE-2023-27633,0,0,46dbf1daeb8d87e6e0cea8b6b6068c1b297802da2f2d7b505dbc71c6acb74609,2023-11-30T19:19:27.577000
@ -220440,6 +220440,7 @@ CVE-2023-28683,0,0,1733b26d2cdf5a7bd82da3f30166803dd12e37b31dad64f72c0c417886c46
CVE-2023-28684,0,0,52e458c0997ebfa4b20c4438f3ae0ee693ec6734f07e98e9c3601f11e52a37fa,2023-04-09T01:39:27.213000
CVE-2023-28685,0,0,e0c53e4d57fbbe9363125daac9bbea48b9f569285b626c82aa9179387e96130c,2023-03-24T20:29:16.710000
CVE-2023-28686,0,0,ff0f81c3808b267f1168e84a1b7f6568ae99144e544141691c65bb9332d832c4,2023-11-07T04:10:48.177000
CVE-2023-28687,1,1,c4917f4a91e2dba4646f41ec34881b6ea2b095284f549e68b1b411f721d5f039,2024-03-26T21:15:50.477000
CVE-2023-2869,0,0,83553b82bf3815b48b9963a130e6249e5c327eac582c2d1bb40f5c08c7922d57,2023-11-07T04:13:27.033000
CVE-2023-28690,0,0,d6f4066692a313db06779ad080208a8a77b53b35431f2a3194e0e3a9774a7efe,2023-08-23T14:37:43.853000
CVE-2023-28692,0,0,2eac38bd971b0deca5fb5c3ca9afabc90e5401629f9dd7513fa908109af5ddee,2023-09-01T12:06:48.337000
@ -220537,6 +220538,7 @@ CVE-2023-28783,0,0,e4c28333c63d896a6dc1ea6c8187784dc3c3ca1e3bc214dc379b95f415b17
CVE-2023-28784,0,0,29cdcdd3bc5507bc4d53dd65d7f1e38f826588b263e9e74689bd5af44bd699a8,2023-06-28T07:16:11.527000
CVE-2023-28785,0,0,17b3419351958dcb6281c0c7b61ce71cd15d14e0831bf2f0d915b7adc8ec13cc,2023-06-01T03:53:04.007000
CVE-2023-28786,0,0,f9e06605c0fd16a90753e36a648b3b280d8079e30c1ac0bf77a72f5c69889c25,2024-01-10T19:27:54.720000
CVE-2023-28787,1,1,4c615d7e636962e317801ff25b0344a479a208a233a2df7998a91d47db5055ae,2024-03-26T21:15:50.693000
CVE-2023-28788,0,0,17e2028e1fc2374a1fa9f52d26e1ad3fd4714947a2df331bdaf2d8d947a993af,2023-12-27T15:04:40.417000
CVE-2023-28789,0,0,1f2c73f47a1cbc214f389d7f5befcba08b4db6006e669fddc19a4562c69da497,2023-11-07T04:10:54.090000
CVE-2023-2879,0,0,5bc69743d5fb9a107ed6b1d66b72862cd1695c7112d0d395c95f138b25f17969,2023-10-20T17:52:45.083000
@ -221039,6 +221041,7 @@ CVE-2023-29382,0,0,85e4295ac4892fd7ccf01715e0068bf61079e02658153ad107806b168baff
CVE-2023-29383,0,0,8013620007555caf82fb95e58995ea6168ae836387103f7e8a04f762ed02d6e3,2023-04-24T18:05:30.313000
CVE-2023-29384,0,0,9a489d28cc6ab1408ae57d3cf7990767e7bb1769ecbc71eccb1fc726d788c4e2,2023-12-28T13:34:45.667000
CVE-2023-29385,0,0,0caec3d51cd9fb8894e51725a4068abeec6d5436e3ab36ed98317f64012693e5,2023-06-16T03:57:35.310000
CVE-2023-29386,1,1,287eb706c77a59567a3f21b059a2930a0358e405edd355fe510a48ce63958456,2024-03-26T21:15:50.900000
CVE-2023-29387,0,0,ed00151bb5609ce481cb305b72e41d715ca3d8145030d4ad83d11188ebf72faf,2023-08-22T23:22:36.473000
CVE-2023-29388,0,0,cedb7e8cd22d8e7c03665a218d69ad6009d176cbbb758b47f852d52b220862fc,2023-11-07T04:11:10.300000
CVE-2023-29389,0,0,e2e59fa269c64b0c4c3c8a6a07a365712c3d14cfeda8282033c47134e3fce270,2023-04-14T16:03:43.527000
@ -227237,6 +227240,7 @@ CVE-2023-38381,0,0,580e87b333e058d175503c85ff5b2c721d6b8ea39eca9d994a48ef8de7325
CVE-2023-38382,0,0,95233def5985e85c0df5206014d24c06949c4b4bc39503e9f9d91f0c02293126,2023-11-10T04:19:37.937000
CVE-2023-38384,0,0,a2ec4d64fe4cdf3d4501234addd0ab1c03265aad8ceda5fd8d3665c9c7fc3ef9,2023-08-10T03:49:13.217000
CVE-2023-38387,0,0,c4c528bf05b8cb8ec536fe16db68e8c5b50c07d822a650a8e987dee0e2444378,2023-09-08T14:39:10.543000
CVE-2023-38388,1,1,00ca38b0449e6b3650b86cf2c68a7a4db34c9eafe89c8d9b062dda396eca11b6,2024-03-26T21:15:51.113000
CVE-2023-3839,0,0,c17e4be0a7daa4d01e33f457772e1f4edb268cb14ad6c2f748878e8a404781bd,2024-03-21T02:48:47.827000
CVE-2023-38390,0,0,a8ddb08e6640474b7c20c14af215057166b935398c10611e08cf7ad2b1521ce6,2023-10-04T19:58:33.723000
CVE-2023-38391,0,0,344147f660134030bcbbaa890dae6516b557e6ede35f44154d334296e9591473,2023-11-09T20:07:33.613000
@ -227947,6 +227951,7 @@ CVE-2023-39299,0,0,4a4fe470a2bcfff30902e0b9d0b07fed9c3238f5a3ae755d2d216adf6ed07
CVE-2023-39301,0,0,f99ca5c14f2281e592a0eb5c38c92820cdd533a72f6c4acb102a1e81f6e4c87e,2023-11-14T15:29:43.047000
CVE-2023-39302,0,0,db9cae95c32f91811eb0f0ecdd3b63c519262646f87f4bc925e27b437fe46983,2024-02-06T19:54:10.380000
CVE-2023-39303,0,0,d81a0865c899018b1bf357d592ab28d95ab5876f93fb600c5e62942433b060c9,2024-02-06T19:57:03.963000
CVE-2023-39307,1,1,9c5bb6bcaa0e4070eaada5953d292b439b97b8adf03b545b0ad50aa15f9f843a,2024-03-26T21:15:51.330000
CVE-2023-39308,0,0,0a6368135905c51e4bfc8658e86115693ae2beb292d59faa84b5dcfe3424348f,2023-10-02T19:36:52.837000
CVE-2023-39314,0,0,ea740e75552d6dc1c0cf1f6c4b3f96de5bf219ab1a6cac778aaf3dfb58fa2dc3,2023-08-15T00:14:54.643000
CVE-2023-39316,0,0,bd233c030a147eb3f789ee38efc103e8bf004636997da3293bc77e895bbfe866,2024-01-11T18:05:52.470000
@ -227967,7 +227972,7 @@ CVE-2023-39335,0,0,de59ab60bb008cb37e35574265db4c70c7230619b6903b4fa71f9b7575236
CVE-2023-39336,0,0,b977d6f2b7c9b0fd92c0a178a796d6d1f323429aaee5398b0e65e7fe7b72e509,2024-01-12T18:56:43.137000
CVE-2023-39337,0,0,7360ad9ae1e4772f326d77e9e9c1e47262f5e3a444a43e8bfca2327242053227,2023-11-22T15:06:22.787000
CVE-2023-3934,0,0,6345841b35fbbcfefb4a859ac4c6d40f27ac65e6bcc5a003199d21257c6bfebf,2024-01-31T06:15:45.870000
CVE-2023-39340,0,1,3368dfefc612854e047c3fc5ef638ab44c0909626506bac01853af02cbaf8d7c,2024-03-26T19:18:28.943000
CVE-2023-39340,0,0,3368dfefc612854e047c3fc5ef638ab44c0909626506bac01853af02cbaf8d7c,2024-03-26T19:18:28.943000
CVE-2023-39341,0,0,42681de016b238b4476c42354bb83127e65376d05d62332b44e95e6a83861c6d,2023-11-07T04:17:30.083000
CVE-2023-39342,0,0,962ce35ed3734feb09c3ddb7acfe108cdc33245badc292e940d62e0398cd2c0d,2023-08-16T15:35:33.843000
CVE-2023-39343,0,0,fe019f2f6fc1ba334aef3b124ee735ef2454159d53a9821fbdd909e44d21861b,2023-08-08T18:55:13.367000
@ -229572,9 +229577,9 @@ CVE-2023-41713,0,0,8de855d49c465f8aca52c2c0d301e3860de25752ca68f69195e8b754f1aec
CVE-2023-41715,0,0,5d0463fe232efdccd6d5a3222f2209f2b7e7333636d080892cfe530119500012,2023-10-19T16:43:38.577000
CVE-2023-41717,0,0,01ab6cc0acc3f6331aa80f1a1cfcf962a04bcc42f841936e5d005f2b62f9e241,2023-09-07T19:11:38.933000
CVE-2023-41718,0,0,740b343c56aaea285c5d63967d3064cda8f011d6fe6a98f69d68bdab33bfac12,2023-11-22T15:06:11.117000
CVE-2023-41719,0,1,08dc2fbc37647af52cf5c58a206c6f44f65b6fd78dd6ef69aecc648638392ed7,2024-03-26T19:26:49.713000
CVE-2023-41719,0,0,08dc2fbc37647af52cf5c58a206c6f44f65b6fd78dd6ef69aecc648638392ed7,2024-03-26T19:26:49.713000
CVE-2023-4172,0,0,7d864af5899760e5fd916de8d5b7cb4c836384b557d17d8798fea9491ff22d5a,2024-03-21T02:49:41.560000
CVE-2023-41720,0,1,8e9fc1420effd6ecd9db2851fddc14d3419717893d5acef5b2ea72a58b50524c,2024-03-26T19:27:41.727000
CVE-2023-41720,0,0,8e9fc1420effd6ecd9db2851fddc14d3419717893d5acef5b2ea72a58b50524c,2024-03-26T19:27:41.727000
CVE-2023-41721,0,0,b8fe1a9595e9621301ef0bca4addee7da64b2a00520a510a37f29d2e79188e54,2023-10-31T20:02:00.777000
CVE-2023-41723,0,0,2c6f443b87b008a8a9e627848e133dd59ab18ee4f518502f55e24551d97a1e0a,2023-11-14T20:30:54.470000
CVE-2023-41725,0,0,ef65a845340b2e5995978b7ff227127be0d8e07ed7a8d62bd421fd7106110973,2023-11-09T20:48:01.590000
@ -233378,7 +233383,9 @@ CVE-2023-47834,0,0,920967a055b2bc21ff0798aa9e7d238eed9616b66b2486f71c8817a961673
CVE-2023-47835,0,0,7a712355ce5c48eadcb9e26f4f27778335f03b4bfa9861aa3fd9d0cda8b8d8fa,2023-11-28T20:21:32.220000
CVE-2023-47839,0,0,7480547339b9b3ac3798f9c06e00c706f49ca35ebe73ec8189117729e422f769,2023-11-28T21:07:29.180000
CVE-2023-47840,0,0,7e24f7bfe5242765e69f6a2a237de2196af9eb411219ff1fe89053605cf27eb0,2024-01-04T21:27:45.337000
CVE-2023-47842,1,1,d3507476c0f89b7eb81a25b2c1827d0dfa222b33d68c90cf76009153bb746256,2024-03-26T21:15:51.530000
CVE-2023-47844,0,0,741d209d5f9025e6891615bc08c4470c63d9aa75d230c481c60846b322e1cd21,2023-12-05T22:05:16.770000
CVE-2023-47846,1,1,b940e213e4172039d976637ec7d4871f520eae9864fec94d82c58a2bceb09d1b,2024-03-26T21:15:51.737000
CVE-2023-47848,0,0,21fbbbf4e86fa9dec45730eda9a909888845fbee735e966e936dc57fecf04f7d,2023-12-05T22:04:43.287000
CVE-2023-4785,0,0,f96e6528e6daa35443c5249dce1ce895d9db73477dc922f40615878f59aeec17,2023-09-19T16:02:53.477000
CVE-2023-47850,0,0,4e30d6342a01ec31cf4caaa45a8bc6148a7b39f98e1d311620e4bf661def1ca7,2023-12-05T18:43:19.487000
@ -233394,6 +233401,7 @@ CVE-2023-47865,0,0,32fa35a5f49e53820f0f3e7e18baa49e7d1a42f1ea968b0971bedfa95dd76
CVE-2023-47867,0,0,f0daeea1876f3aa3ee56ae4ce7d7661f589dadc3080e71dc64c8d64873856975,2024-03-21T02:49:28.240000
CVE-2023-47870,0,0,3ef3a3cb3a2fda83b71ba119ab1f1059e42a472e888c4548e4b65f20b1078ab2,2023-12-06T15:21:19.540000
CVE-2023-47872,0,0,550c4b6c5a7977fe1c0956c9594b5fd895299230fa3f6c497e2343527689fbfb,2023-12-06T02:44:27.170000
CVE-2023-47873,1,1,a02bcbad7c96f462b94d211431945c7b5d743c5335348d8246159f6e196fbee6,2024-03-26T21:15:51.933000
CVE-2023-47874,0,0,d3d8a772c5fdbc6315a3e7634808399ae50d5a644d3ff497877112fdbb85c10b,2024-02-29T13:49:29.390000
CVE-2023-47875,0,0,75c1548edb875fa8f906ef110d5c91faf3a0d0d074f683de789b85b1a121a6c5,2023-12-06T02:48:34.940000
CVE-2023-47876,0,0,7c97d9a50607cd23bf47f8ee7a04359ad4dbf465ccc017db28473d0e6347533a,2023-12-06T02:55:08.670000
@ -233576,6 +233584,7 @@ CVE-2023-48266,0,0,d6f171231beb0ee1180aa8d7b71e94eefc1322fbdfbaea0d5770850886438
CVE-2023-48268,0,0,7fbc38e1f3021e6f57ddbb59802c5c032dea61c9b04627258986c5e024d76a9e,2023-12-01T21:30:14.497000
CVE-2023-4827,0,0,660cb613242cf8fb9cab965004afed839f4beeb124259e7181eab5017ac3219d,2023-11-07T04:23:00.800000
CVE-2023-48272,0,0,6b4df1e347c87fa206b94499a385869f076cd0e708e56b463683f8e1d53c3c9b,2023-12-06T03:01:23.517000
CVE-2023-48275,1,1,0454ac7ec5ed5768dd0b9a53097121220b63beb9c68852b412f948f7b39211b0,2024-03-26T21:15:52.143000
CVE-2023-48278,0,0,b8b615ff398a78f2adcd1913a459812b30de22df732a4689ed336a4365900549,2023-12-06T03:09:04.530000
CVE-2023-48279,0,0,677bb12e80f04b87e5ac81a35a4d9bd35cc895da5798b0a5048d841cd32d97ee,2023-12-05T20:02:01.297000
CVE-2023-4828,0,0,de71ddef24d1de419c259578328ce0906fdc3b49b667c2f893d38ed7e21b3702,2023-10-13T22:15:10.717000
@ -234057,6 +234066,7 @@ CVE-2023-48770,0,0,6c816255ef32856561403ee946964a1334c6ea4b20c017dd01ad793fa1d5d
CVE-2023-48771,0,0,c3aa1b504f72498da7a69fcf6a31e6ac6c25e045f2b6b038ed9880c9730ae16f,2023-12-19T02:39:37.777000
CVE-2023-48772,0,0,51bd166fc46eaec2256d292949fc7c1fffbe58afcdeee9dafb9515859c364e06,2023-12-22T09:49:18.993000
CVE-2023-48773,0,0,d9b8ea1beb8af0a39107f0247c63f63cd08c23650a0d149c69ac4052bd7174a3,2023-12-22T09:48:23.130000
CVE-2023-48777,1,1,5b92f5fc5ddfe4b34aca867ee8c0d866fbeb9668c615a115633e3c47cac77890,2024-03-26T21:15:52.350000
CVE-2023-48778,0,0,f85ca09064426197f94634dc326db73c0a5834f3817de960e68c36d9f8a7afd9,2023-12-22T09:48:10.170000
CVE-2023-4878,0,0,1fe826e0162bbd8607eac5c8754ffeeacc160bcce353137db7175d21b5c9afcb,2023-09-19T01:16:52.127000
CVE-2023-48780,0,0,81a46aadc83bef693702f0587720fb307d57733c38a40b0e9a0adbf977d5c943,2023-12-19T17:54:07.470000
@ -235358,6 +235368,9 @@ CVE-2023-51133,0,0,d4cbab034ce8105e49fc17df3288ec6653237538f125fb29562b759ab1355
CVE-2023-51135,0,0,d5dfa726f5577ba7508ce233e276424bad2252ba782866f323d5eaf18aca14e7,2024-01-05T18:31:15.977000
CVE-2023-51136,0,0,2ca511da0623e4727922981a3a33dc85c47c0550d43a47bc34e3bca00a268bc6,2024-01-05T18:30:58.837000
CVE-2023-5114,0,0,4dc648ab97c5eb644a86e5f721a5758a4aff62f3c04184e8d35bd31381edc6f3,2023-11-13T17:48:55.993000
CVE-2023-51146,1,1,71895b9bd64dfaa01eef4516d118aab0edfeaa522f9a575a21302192a8cd2112,2024-03-26T22:15:07.677000
CVE-2023-51147,1,1,beb2c86fbbce6339d956bc36da6f24d399db592b55de8d5bc92c6c9ebe77dad9,2024-03-26T22:15:07.747000
CVE-2023-51148,1,1,d719546cb851478f4718f8cd8cc41bdeb643e81b4b58768466274f8fc577b0ce,2024-03-26T21:15:52.557000
CVE-2023-5115,0,0,cfd83bdfc62ea6a4db87d1b30a892254d6139791be4cc4c9f6b956be56be0deb,2023-12-29T17:57:50.077000
CVE-2023-51154,0,0,c0c1d5a118a8aca4530efcd110e61e63479b767365ec9d0e207af20fa04dc96f,2024-01-10T15:58:18.733000
CVE-2023-5116,0,0,8c93aca719da557b19846fd94520f46b1652d53677bb8ae463252688e7b2bb43,2023-11-07T04:23:28.397000
@ -236956,7 +236969,7 @@ CVE-2023-6087,0,0,e865af7ea935fc22144ce6a037d1e9eedb83e9943260f825273789b70edc8f
CVE-2023-6088,0,0,844257b81940c854c48827db2cfdd5ff63d458427ad4781ef82ad295558ee290,2023-11-14T00:15:09.027000
CVE-2023-6089,0,0,73d6dfb1d97c3ceb536cf08d930057b79a5ca0369be397c478f41bcf571d0256,2023-11-14T00:15:09.073000
CVE-2023-6090,0,0,a9eb342d355ca2f60d72c77ce67482d1115896f2d9c4ca3a7c9993e7419f4bc1,2024-02-29T13:49:29.390000
CVE-2023-6091,1,1,e4583415d0de8e3eeacb935758369a1cf2e141875316b2af617b7897d781cc6d,2024-03-26T20:15:09.167000
CVE-2023-6091,0,0,e4583415d0de8e3eeacb935758369a1cf2e141875316b2af617b7897d781cc6d,2024-03-26T20:15:09.167000
CVE-2023-6092,0,0,29d6c12d74742133215ae81895362e8792ffaeaedc68872f3a97584c78958e27,2023-11-14T00:15:09.117000
CVE-2023-6093,0,0,cdcbd1e1997de9b83295e1322a460ec7a9df4b733c53160638c79ab78836ce70,2024-01-08T19:09:29.700000
CVE-2023-6094,0,0,fe64a29ca809dd77087aaa4828738c31a5bbe16b56c0195785a6e8bedba08bc7,2024-01-09T14:55:23.847000
@ -240187,7 +240200,7 @@ CVE-2024-22428,0,0,d92a5a80e616f72d015e3df366132cde5205daf6f1415ae7d5800097348c1
CVE-2024-22430,0,0,2e5779ce610960aa54065a985f7d7b4d5fc66005f09960beaac23d15bb28ba31,2024-02-03T00:30:48.593000
CVE-2024-22432,0,0,a5ce1013533b36d94c95ad06d489dc2a6480ecc8fe7741cd230ce585b643d9e0,2024-02-01T17:00:46.647000
CVE-2024-22433,0,0,15060e68251742f26417bd26381576269dfd06519ddd1ac4517720d4b647a719,2024-02-13T22:51:37.293000
CVE-2024-22436,1,1,1a6ca03e82f15ba09d256dc4d1cfbe8c473cd6ccbc09b8293ead87668477e67b,2024-03-26T19:15:48.550000
CVE-2024-22436,0,0,1a6ca03e82f15ba09d256dc4d1cfbe8c473cd6ccbc09b8293ead87668477e67b,2024-03-26T19:15:48.550000
CVE-2024-22445,0,0,874153d1fc6b93fe9f1bc951c0a860f76df46d0b4a1da0ccdd296d9b31c66c08,2024-02-27T16:51:44.013000
CVE-2024-22449,0,0,bbda7843d9766542fd731dac4991558c835fbecfc00731f79a512d8c0e63a23d,2024-02-03T00:30:30.737000
CVE-2024-2245,0,0,691730e073363309cbbedda1561ea8c86cfdfccb1b6917a0eaaacd61f92e651b,2024-03-07T13:52:27.110000
@ -240463,7 +240476,7 @@ CVE-2024-23247,0,0,8cedc356a5f40bb739283e8e4d0d6f8d8deae5a1378794e92c4d7ce373c0a
CVE-2024-23248,0,0,3b100f3348e9ddca065d4f3fd478aec1907931fa96a4ed3377d05be33d175a96,2024-03-13T21:15:56.690000
CVE-2024-23249,0,0,e0d7f2aee237d26c7b0c8ad64668a6a03d87d4b0174d6e350f019a0b7d59e493,2024-03-13T21:15:56.730000
CVE-2024-23250,0,0,23972341b564827ce5b9505c9a1f83d7e8d72dc9e37716cac001382a6c566edd,2024-03-13T22:15:10.157000
CVE-2024-23252,0,1,0664eeb2c9608aca7ada566c98a3c55b1e928a3feb65097958db8fb31b3c0f73,2024-03-26T19:15:48.757000
CVE-2024-23252,0,0,0664eeb2c9608aca7ada566c98a3c55b1e928a3feb65097958db8fb31b3c0f73,2024-03-26T19:15:48.757000
CVE-2024-23253,0,0,236890f266aeb2a0ef621837a0a5e82d7bb89a3a03220dfe0920fc94f8f6fd50,2024-03-13T21:15:56.870000
CVE-2024-23254,0,0,31cb2ca8b372067663ff19288cb5bb0509a8c85018595f64afd9fcbbb0601b82,2024-03-13T23:15:46.657000
CVE-2024-23255,0,0,50d24cf515724bff8276e52606e9845d547a501552c168c6d0b36213b6b0f202,2024-03-13T21:15:56.963000
@ -241179,7 +241192,7 @@ CVE-2024-24846,0,0,6890a12a2a75edd735a365e4f936d5236ba568d73a773641099ac2fe0c58d
CVE-2024-24847,0,0,b4fa9a61260da316bc833192464fabd12095e29ea013df2a2fb0faf16c78be6a,2024-02-07T23:30:27.567000
CVE-2024-24848,0,0,40caff22a3243fb89666855618bfb8dcbc9fcd477abdaa3c19527de1aee97a51,2024-02-07T23:30:36.817000
CVE-2024-24849,0,0,7310ea40ba14819a766bfed2718d0ae7c9bf655c4a04b330968acbdb73d5a918,2024-02-22T19:07:27.197000
CVE-2024-2485,0,1,91d591c098e21e60f32736bf3e0fbe05d2390dc55eb3613eaaabf8a0a461a1ee,2024-03-26T20:15:09.860000
CVE-2024-2485,0,0,91d591c098e21e60f32736bf3e0fbe05d2390dc55eb3613eaaabf8a0a461a1ee,2024-03-26T20:15:09.860000
CVE-2024-24855,0,0,53926eea6176e5ec7dac755182b92f74698401115acbca0c88724948db080e51,2024-02-10T04:06:40.840000
CVE-2024-24857,0,0,bd0a671ef627655a534b97d40879c56dc0a8ee5f900294aaa10a2d6428455f4e,2024-02-10T04:06:50.263000
CVE-2024-24858,0,0,249d6bf347d8c64c978bec670161d1545cd8d4294041793438e8d2c55804ba1b,2024-02-10T04:06:20.077000
@ -241445,6 +241458,8 @@ CVE-2024-25415,0,0,bbea7e03f98d3ff090986796c578947b874b9a857b6b9b0efb421dfb81e37
CVE-2024-25417,0,0,ce0d2fee8c5d9d7e51d76e43f6a312ae4efb9da0c42980a6b1e85c18318f17f3,2024-02-12T21:39:48.423000
CVE-2024-25418,0,0,35d59f7ff89650ff446db0ea3767d5b73417e01c12581b05b798d1e230ed55f5,2024-02-12T21:39:57.963000
CVE-2024-25419,0,0,401cee772789e651c957846e5c67785cb38697dc7bb6f05ffb07d4d6143c7033,2024-02-12T21:40:04.610000
CVE-2024-25420,1,1,e91990fd238309df03a12a63b362ace404adf96b87ac3e0559e09894783aadff,2024-03-26T21:15:52.710000
CVE-2024-25421,1,1,df25e1245f8afad7f6b93f3480e4caf70a63ca9c65773203adbb70af83aeb3ee,2024-03-26T21:15:52.773000
CVE-2024-25422,0,0,cb343876745657927a9a3aa4eefb40458b43d13348692326da3da2bb97c73701,2024-02-29T13:49:47.277000
CVE-2024-25423,0,0,33cd9c56ae4cfa1d6cc2435a00a829df789b80150b430b34308e45329f20c67c,2024-02-22T19:07:27.197000
CVE-2024-25428,0,0,c9a4a68822ce56f9f70c0633568698e7786e1f54738d13d0ca759099f302c24e,2024-02-22T19:07:37.840000
@ -241861,6 +241876,7 @@ CVE-2024-2630,0,0,4ae7a7f3ab879de5be47b2ccdb73f467c2c129b3bdab1f916d00784469083d
CVE-2024-26300,0,0,957ff2fceea083c23710802994700a4cf17bc21a9f298857e1101271f2e4ee8e,2024-02-28T14:06:45.783000
CVE-2024-26301,0,0,ca5ba4fc82d74473f58bbb8ab53e52870805c492ae0704dcd3113ae9fe8a11a4,2024-02-28T14:06:45.783000
CVE-2024-26302,0,0,af4ef1bb4da1c0ac0e7b0a0b03804bb031d31d0e464ca3573002ab0828a12d88,2024-02-28T14:06:45.783000
CVE-2024-26303,1,1,3ed42bba35456c98692a2027d790eeedffd8e917aeec7efbcf133ea6941c281e,2024-03-26T21:15:52.827000
CVE-2024-26307,0,0,9bdd86f1164e19b9b7e171833e6f17ecff380db1e609df57649c593081a62eb2,2024-03-21T12:58:51.093000
CVE-2024-26308,0,0,2ba9e28d3969717f6516b4803ddc13ceecd3ad2f69b64fd95ab4756f662bdfa5,2024-03-21T19:54:03.230000
CVE-2024-26309,0,0,f36b82bfd58135529029d2dbb3557eae73d94f3c7d43b34f799072bc28e25580,2024-03-08T14:02:57.420000
@ -242177,6 +242193,7 @@ CVE-2024-27508,0,0,040c763fe5f3ce1aa685f7456be4b1599a5d1d348a6a3ea3969c861bb92ef
CVE-2024-27515,0,0,f99f7250526320b1e7250419a5b3dff4ee674d7e75fbaa06a1a665327078fcdc,2024-02-28T14:06:45.783000
CVE-2024-27516,0,0,bc77d943dca3237cfc969969b912fe04cfc9a7bb141bbb351e6e03a84319d787,2024-03-22T03:15:07.923000
CVE-2024-27517,0,0,97c5c6df0e60dd69b6d0aac6af969ac4b47e672031be447025dad2dd6eb96394,2024-02-29T13:49:29.390000
CVE-2024-27521,1,1,5f6f1563f42c1644e0814ed1590cd75d5c4166565946e2848454985e9240a0a6,2024-03-26T21:15:53.013000
CVE-2024-2754,0,0,085e82c1a95661c61fef6d127ca8d427c59ef0abe344921cba5cdafc9ab6e1f3,2024-03-21T12:58:51.093000
CVE-2024-27558,0,0,9eb3609e180b0082ba997e86c85d07a5ab4b31705e8b33d9a86b38769d49fa33,2024-03-01T22:22:25.913000
CVE-2024-27559,0,0,197a94c92d57823a11d32d7ab09a8d3a649d2150b43720db8b2e13739dd842b7,2024-03-01T22:22:25.913000
@ -242475,7 +242492,7 @@ CVE-2024-28432,0,0,4bc8c3df18623e8712ef966fb24c80f6754436b2eb6a0c14d5d3c56f5a161
CVE-2024-28434,0,0,9ce149b3f63fd248825bfe2b0448af1d6b935cc8ea03a3087e8dd17d0b451340,2024-03-25T16:43:06.137000
CVE-2024-28435,0,0,528401926238753caeca6996705f7f059321761f7aa1e186f9618f4c79a626b5,2024-03-25T16:43:06.137000
CVE-2024-28441,0,0,5f38f329aa34d3551b4435a62b00ae0d72806d981cac257e26fcd8895c19c6be,2024-03-22T12:45:36.130000
CVE-2024-28442,1,1,e6da2a2c25c8561aa3f7d720b8d50ce6f798b21adf3c0f255188b1236bf2d476,2024-03-26T20:15:09.670000
CVE-2024-28442,0,0,e6da2a2c25c8561aa3f7d720b8d50ce6f798b21adf3c0f255188b1236bf2d476,2024-03-26T20:15:09.670000
CVE-2024-28446,0,0,e3b0d814ee24ce9a2740eda808696f714c3071d6722fa7bd76f62923d12a194d,2024-03-19T13:26:46
CVE-2024-28447,0,0,729795bf39bd106c71b5b798b10fa8f526cc5d6a6eb2785b0edfa8459a535a4c,2024-03-19T13:26:46
CVE-2024-2849,0,0,689f01009061efff1ee0cd29db14c96053c4b561f68402f2590b4aaf791eded8,2024-03-26T09:15:11.360000
@ -242487,9 +242504,11 @@ CVE-2024-2853,0,0,e510059736f729514b8634c28eabbedda89b99502b90c04b4a57c0f56252c1
CVE-2024-28535,0,0,174c70ce71a26af929a40c7b6a103a5242ac3321f34f35a982d598e918b67152,2024-03-21T20:58:46.217000
CVE-2024-28537,0,0,ff6bf2a37289dca28bccb57e311acb6479e1a577841d298af6b3b484403dfc2c,2024-03-18T19:40:00.173000
CVE-2024-2854,0,0,4d9650c5f6f9a8e97a81ecdc5d981ff248ee9a6c0a655eb847d3bd000f194314,2024-03-26T03:15:56.933000
CVE-2024-28545,1,1,2b629ff94069f81548093cb36371ebc63186c415c2c9e7006893b419dfee7eef,2024-03-26T21:15:53.070000
CVE-2024-28547,0,0,a2de8a258b087cbf7c5442c921d96afce5895db417e9c628fe7656334d2bb7cc,2024-03-18T19:40:00.173000
CVE-2024-2855,0,0,e69353ff45d51e90ba00dbf38253e3bd4d6755a4bd9fc7e219558fd74c8029a5,2024-03-26T03:15:59.320000
CVE-2024-28550,0,0,55b413fc03c0e6dbaa5c4b6ccf0c8e244ea995bce860e043c8086ce78f470aae,2024-03-18T19:40:00.173000
CVE-2024-28551,1,1,ea74e28ea826c7c3cffa423b78f72a17850e9734674f6b0184e1546a76f685ed,2024-03-26T21:15:53.123000
CVE-2024-28553,0,0,f74a5d2edd657e610cfc2b884ed1530d128afd106cc0a285c1f4868830f65cd2,2024-03-21T20:58:52.357000
CVE-2024-28559,0,0,0614f972b1018fef175a5be020062e1808da1307fa27e18c6ccd6df48da36c98,2024-03-22T12:45:36.130000
CVE-2024-2856,0,0,15fc8ee8643f2d738e004abc8e00d4040db42ff6c4333ea56bb7e74735fedf8b,2024-03-26T03:16:09.907000
@ -242561,22 +242580,26 @@ CVE-2024-28757,0,0,6f674e74da8b1d303f1997061736a8f7699c424c20f0aba68e441f140f441
CVE-2024-28816,0,0,4b9f923b99f4095b32672af0003c81bae1f3b3136774827600fae7accfedcfe3,2024-03-11T12:47:42.653000
CVE-2024-28823,0,0,d5aa89b5cdac6c3847ac374cba2a65b191e57c43dc618aabb1da571ab5b5e9dc,2024-03-11T12:47:42.653000
CVE-2024-28824,0,0,29abf61aa992ee5bcede73dcd8363195f5ccb0f240073ed24aaff3a2acefaab4,2024-03-22T12:45:36.130000
CVE-2024-2883,1,1,df7e0047c4d867af976c2e6c4f6b5534e142ec8c85e89c002da04adf61ef9f55,2024-03-26T21:15:53.173000
CVE-2024-28834,0,0,841718fd8fddff124f231102263dad7d394e02b19e9697b20d411d85f567df2c,2024-03-21T15:24:35.093000
CVE-2024-28835,0,0,807354fa6b4609be92d801df299988ca81259642594a0e94cba8cafe4de90346,2024-03-21T12:58:51.093000
CVE-2024-28847,0,0,77ca7298b6799783b77992e414cebfaaf69a1bd2c05124cbdf6b914d3e0bb310,2024-03-17T22:38:29.433000
CVE-2024-28848,0,0,f738fe56a5bc4cdb728fabdb4b9cb52618afbf9827db3dbc12ec3f1fb91169bf,2024-03-21T02:52:25.197000
CVE-2024-28849,0,0,5e73d26630408070b9f2d0554aca63f533ce0044a2d97ed66eab06494ab2be18,2024-03-23T03:15:11.970000
CVE-2024-2885,1,1,3a2c72f79961f6885820c2d07909d3c34e1314254b05fccc7d5bfa0f002492ad,2024-03-26T21:15:53.220000
CVE-2024-28850,0,0,3f010e48b33d8f74ceb957fab8d6defaf56ad7dc42ab2eb1e3bf15c4cfbd82b3,2024-03-26T12:55:05.010000
CVE-2024-28851,0,0,f15187ac52243f1288d6dabed456ab5bd2287b2db60c97a538d0582f4f0ba12d,2024-03-17T22:38:29.433000
CVE-2024-28854,0,0,8cb03aded6b194ffbf5e93b6a999bfbf01ac8f736343c4fc752b0e38a8bc9f90,2024-03-17T22:38:29.433000
CVE-2024-28855,0,0,2384a3330fde47f752f152bfa13a6226cb6b236bb18ff2466f5e886c7d3e893c,2024-03-19T13:26:46
CVE-2024-28859,0,0,2d0407c7b83f2786a493b842ae3fe3ce3f906494adee8b0e0f61c75557fcb17c,2024-03-17T22:38:29.433000
CVE-2024-2886,1,1,6f6de4d41e33ef78cdf3b87c6b292fa0e20948e924ded5bb329feafe8d50fa23,2024-03-26T21:15:53.260000
CVE-2024-28861,0,0,614b056391803730ffc563205182a9ac310eb6811e0e407400ba2dc4b494f050,2024-03-22T19:02:10.300000
CVE-2024-28862,0,0,b0dc40150b0e5f15633ecb26c2614b37fe6eefbb423911349887989b36d78640,2024-03-17T22:38:29.433000
CVE-2024-28863,0,0,ad7818a88579939a8a2c9b467548624411262308646c7865759640aa6d437826,2024-03-22T12:45:36.130000
CVE-2024-28864,0,0,6556868d08f3b43cf56ee8c0e31629a1275e8137bc2387bf2430488f9854bd36,2024-03-19T13:26:46
CVE-2024-28865,0,0,346bb195552b29118071ab302fbe331daaaa3a5da7b31ab976886613f922d084,2024-03-19T13:26:46
CVE-2024-28868,0,0,4e3489f3c96f97bc271ff7282115c7f5d25e2aa392efe0c1c5842c72ee9986bf,2024-03-21T12:58:51.093000
CVE-2024-2887,1,1,8301c59ddd2e5b007e4a2882dc311ef700088a092929c47e0ed332b00192ddb6,2024-03-26T21:15:53.300000
CVE-2024-2888,0,0,e48cc71bf8d96ab718c88bf59dd81f25047204b13c0446dd48014e6c60fc42d9,2024-03-26T12:55:05.010000
CVE-2024-2889,0,0,047900621574a9797901d8767443e859750a2765d7b4c1f50c805ec45928b2d3,2024-03-26T12:55:05.010000
CVE-2024-28891,0,0,0aa614d18123b6bc2c76e9c8b5d356a2e7d71bba766bbf9db36fdc818df4c91d,2024-03-22T12:45:36.130000
@ -242587,17 +242610,18 @@ CVE-2024-2893,0,0,03454b4172a384fcf754d0a79af98f544b770efe10848787fa0a66006ffb73
CVE-2024-2894,0,0,e073a098f20ecf49044bd1b363f575a8cb2f6afd9229aa92873c84f5fd988e53,2024-03-26T17:15:48.080000
CVE-2024-2895,0,0,3be1a99c99a4512208e842577cd86ecfd7359e00911a74bb22c4751a2f381f34,2024-03-26T18:15:10.893000
CVE-2024-2896,0,0,cfbae6b125dd4e36298bfaaddfd49990d3493209156cf15c0e63037d046146fd,2024-03-26T18:15:11.543000
CVE-2024-2897,1,1,ad01d017a25110de8970822d9921238dcd790b222bbb80d82ac43c0dc53c025f,2024-03-26T19:15:48.857000
CVE-2024-2898,1,1,87df37fcfe48f1aa9b590a0f55927986b314c2d86ef25f89b8f5c428581cecd3,2024-03-26T19:15:49.130000
CVE-2024-2899,1,1,8122b6e975e018f925621598511eec50c3812b50d5007cda33a4d177dfbb51c0,2024-03-26T19:15:49.410000
CVE-2024-2900,1,1,d115b7c840fbf40f81e7406139e772f1410c77a036e7285e8293f5b757832ed7,2024-03-26T20:15:10.500000
CVE-2024-2897,0,0,ad01d017a25110de8970822d9921238dcd790b222bbb80d82ac43c0dc53c025f,2024-03-26T19:15:48.857000
CVE-2024-2898,0,0,87df37fcfe48f1aa9b590a0f55927986b314c2d86ef25f89b8f5c428581cecd3,2024-03-26T19:15:49.130000
CVE-2024-2899,0,0,8122b6e975e018f925621598511eec50c3812b50d5007cda33a4d177dfbb51c0,2024-03-26T19:15:49.410000
CVE-2024-2900,0,0,d115b7c840fbf40f81e7406139e772f1410c77a036e7285e8293f5b757832ed7,2024-03-26T20:15:10.500000
CVE-2024-29009,0,0,e428945e790b35d2116d11f320908f919961bf6f75e41d300d21cf55f5bcc19c,2024-03-25T13:47:14.087000
CVE-2024-2901,1,1,f29845d6342234dfa356914b26f6a628832a5a3d04e20111376a6c8f9d708a18,2024-03-26T20:15:10.933000
CVE-2024-2901,0,0,f29845d6342234dfa356914b26f6a628832a5a3d04e20111376a6c8f9d708a18,2024-03-26T20:15:10.933000
CVE-2024-29018,0,0,996b521b7d9365d8d41596984cc4ea0a166d70f0fc41d183b4857a8a3632cdd4,2024-03-21T12:58:51.093000
CVE-2024-2902,1,1,01b35f4082170cd7419a16a45739130bbbca7c354bb59bfd011375069556ec32,2024-03-26T20:15:11.203000
CVE-2024-2902,0,0,01b35f4082170cd7419a16a45739130bbbca7c354bb59bfd011375069556ec32,2024-03-26T20:15:11.203000
CVE-2024-29025,0,0,2135a02640a8fe43b6f6ca4c5bc68a475f73ee669a9a1a5af697f30fa738d887,2024-03-26T12:55:05.010000
CVE-2024-29026,0,0,ae12b0436e3ecdf28001034b69d1ac66de23f0f8b6b646a25aa4e89d5c652db8,2024-03-21T12:58:51.093000
CVE-2024-29027,0,0,0443c0a5c3d136c6828a405e5e82a90c05a4f9edd7fbc1d30ba3bd5c5a4c0f72,2024-03-20T13:00:16.367000
CVE-2024-2903,1,1,3ab5553087fed81f734dfb07aaad6dd258ac68a362d67025b789a476fcc6002f,2024-03-26T21:15:53.343000
CVE-2024-29031,0,0,7f58d37a0fe973dfcea39547446f82cfc81d56a030b41fe804de053f1e911236,2024-03-22T12:45:36.130000
CVE-2024-29032,0,0,fb02d2202c95545e773ec7caf494a1bc4414b85dfda56ba00a602bc4c558e262,2024-03-21T12:58:51.093000
CVE-2024-29033,0,0,3da47380cd3a71a38fcec215b864d4658478d80ec3a2925a5a05224fec9ea170,2024-03-21T12:58:51.093000
@ -242612,6 +242636,7 @@ CVE-2024-29059,0,0,18e37be1e0df9e20dcfce0ba40125ed6c1baf91c43e1478b2c45015a44378
CVE-2024-2906,0,0,d03107f75ca563c85caee3d034c6f17690ce56543ec4f09885b1b99f97ccb0d6,2024-03-26T17:09:53.043000
CVE-2024-29071,0,0,5ff903755374c23b025a98d3cc2b0f06ea188aa4151e3658c02fd385bc8b4fa8,2024-03-25T13:47:14.087000
CVE-2024-29089,0,0,e5fbae925c9da8d587d9573cbc1c34db123c4510c1c1616d472538493a08c59e,2024-03-20T13:00:16.367000
CVE-2024-2909,1,1,d774f0eba6a82e24841b3622fb0e5b97c218f955536b9b122fba2480dd38d2b8,2024-03-26T21:15:53.613000
CVE-2024-29091,0,0,b1cb764a2082d02939e32c22f722543dd831cf608e6c39b51eb933f990788962,2024-03-20T13:00:16.367000
CVE-2024-29092,0,0,beafae19b6703c9fc1f01dec7ad304174a985adb5a44a4613a96bd5d1cef6a8d,2024-03-20T13:00:16.367000
CVE-2024-29093,0,0,79ec9f256e974df7e73dc7cee3806e2485cdbcd390ebff34178dc3162a3ed589,2024-03-20T13:00:16.367000
@ -242621,6 +242646,7 @@ CVE-2024-29096,0,0,116dfe6880c4f9de1507cd397cd58f062c158d0a94a613f54efd8ba1f5f87
CVE-2024-29097,0,0,19e0d13440c8d4b80f3bdee731a0c184e36f3f74135496da4c924c8079480570,2024-03-19T16:33:58.680000
CVE-2024-29098,0,0,6298ff15ef67a327cc7f09a990f243f97487c434df63b2f34caf6bd6d79a29d9,2024-03-19T16:33:58.680000
CVE-2024-29099,0,0,fb7d05ccd29d430018c79f33648232d07e2e28e598c3b96b6e110a9f5c781c4c,2024-03-19T16:33:58.680000
CVE-2024-2910,1,1,da0e0d1a3036195e9576a35b88b5b216adc8a407bb7bd2e1e83c06c926d5af4f,2024-03-26T21:15:53.880000
CVE-2024-29101,0,0,aae744ac7158d50069829e5caf84d067c3dd8ecd9940ca7cc779be2b3f5e5cc2,2024-03-19T16:33:58.680000
CVE-2024-29102,0,0,c51ef308d73116b171941fde12ca2b3f8fde36f60fd9119976adb1e11a03868f,2024-03-19T16:33:58.680000
CVE-2024-29103,0,0,671b864013cb97ebbea3122f0d47ea141dd69487a47a821fe9a7e85dba7e47df,2024-03-19T16:33:58.680000
@ -242630,6 +242656,7 @@ CVE-2024-29106,0,0,83a576d463cccd6deacc066448ac54071af2bfaaf1076d70000d82cc7cb72
CVE-2024-29107,0,0,a187741135a88848718c34f6dccc8248e03658bddfdc49d370bc1b2de775f48c,2024-03-19T16:33:58.680000
CVE-2024-29108,0,0,8eb459781eb5f89e2b382dd14b29ac49aac4b50fff525b97f95d5c7b388766ea,2024-03-19T16:33:58.680000
CVE-2024-29109,0,0,61deeebcc74310db0c65cb3af24b8cf99717898306ca7ff466d1330d2d71a7fe,2024-03-19T16:33:58.680000
CVE-2024-2911,1,1,04e3fcc11d51580683b537e7f00bac46be78fb934eb21a6a572da06cfbf0dc30,2024-03-26T22:15:07.823000
CVE-2024-29110,0,0,9fac9429f62fbdd2684f1ecf29789b4257a7ad8d88c0d9ecb165d126b89b6b45,2024-03-19T16:33:58.680000
CVE-2024-29111,0,0,50597b6873634ca7f4144bc214b5ecf041752d2993e614727c346db8869f6277,2024-03-19T16:33:58.680000
CVE-2024-29112,0,0,adcd7a79fc3a5910eb52664004103335276eb2ab35a0c50663e93130b0b2a493,2024-03-19T16:33:58.680000
@ -242709,11 +242736,12 @@ CVE-2024-29474,0,0,cd74b93fedbacc13ab911c0f2a2b89e07d9e578953f3b262ce40503b72930
CVE-2024-29499,0,0,bc8db29a97bf5517e5213278d0d5f5ecdec4b51f00adea3262848d25f6e735bc,2024-03-22T19:02:10.300000
CVE-2024-2951,0,0,196d384afa50e4915b3f7f1abd72164195ad83bb49221af960f012f0ea91cf3f,2024-03-26T18:15:12.160000
CVE-2024-29515,0,0,79c9f65757e49bdb19c4dcff88d6ba2d524b1951e790ac90d5ffb4f302abcf45,2024-03-26T12:55:05.010000
CVE-2024-2955,1,1,434af8129d851694dcadd562a7be8c132241e357c2c6c3abcd25089475e2299a,2024-03-26T20:15:11.710000
CVE-2024-2955,0,0,434af8129d851694dcadd562a7be8c132241e357c2c6c3abcd25089475e2299a,2024-03-26T20:15:11.710000
CVE-2024-29644,0,0,386d9404cd9a66783fab4191d99526a9e5bea1176409bc071a51d532c36af3ad,2024-03-26T12:55:05.010000
CVE-2024-29650,0,0,3de71c7e130cece9a4956a25a7008efc5004a21e047c073aea3bd083423d5a0e,2024-03-25T16:43:06.137000
CVE-2024-29666,0,0,a8926fce030310567330d9b7c126003f732556a2ce979a6a3fd232707f8bbd99,2024-03-26T12:55:05.010000
CVE-2024-29684,0,0,bf20e1eee3419c30e31b5c1e15077ebe4738914779e007adc0a6cf94ae84179f,2024-03-26T17:09:53.043000
CVE-2024-2971,1,1,9ebf0b5524df5787e891001d0b2d7ed41fec1467c00a445a7f37172414b586af,2024-03-26T22:15:08.190000
CVE-2024-29732,0,0,3aff958eec55f5cf06538251c792be6423021bd21573f6f2f920d098c9ad37bd,2024-03-21T12:58:51.093000
CVE-2024-29735,0,0,1640123dfaaf4d3d57b29169fabd73ad7d0d319282e875da918e047f8134410f,2024-03-26T17:15:47.380000
CVE-2024-29808,0,0,1a083356e9d0f501470cdfed0d1c85987d8c8667e4684d7b2ae73ab2fb9e2d44,2024-03-26T17:09:53.043000

Can't render this file because it is too large.