mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-07 03:02:20 +00:00
Auto-Update: 2024-04-04T16:00:33.410253+00:00
This commit is contained in:
parent
f4bf38e7cc
commit
eab964472f
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2021-46905",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2024-02-26T16:27:45.367",
|
||||
"lastModified": "2024-02-26T16:32:25.577",
|
||||
"lastModified": "2024-04-04T14:15:08.703",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -16,10 +16,18 @@
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/0c71d4c89559f72cec2592d078681a843bce570e",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/0f000005da31f6947f843ce6b3e3a960540c6e00",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/24b699bea7553fc0b98dad9d864befb6005ac7f1",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/2ad5692db72874f02b9ad551d26345437ea4f7f3",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
@ -28,6 +36,10 @@
|
||||
"url": "https://git.kernel.org/stable/c/41c44e1f3112d7265dae522c026399b2a42d19ef",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/5871761c5f0f20d6e98bf3b6bd7486d857589554",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/5c17cfe155d21954b4c7e2a78fa771cebcd86725",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2021-46922",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2024-02-27T10:15:07.053",
|
||||
"lastModified": "2024-02-27T14:20:06.637",
|
||||
"lastModified": "2024-04-04T14:15:08.793",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -20,6 +20,10 @@
|
||||
"url": "https://git.kernel.org/stable/c/39c8d760d44cb3fa0d67e8cd505df81cf4d80999",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/9d5171eab462a63e2fbebfccf6026e92be018f20",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/bf84ef2dd2ccdcd8f2658476d34b51455f970ce4",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2021-47178",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2024-03-25T10:15:09.267",
|
||||
"lastModified": "2024-03-25T13:47:14.087",
|
||||
"lastModified": "2024-04-04T14:15:08.850",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -23,6 +23,10 @@
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/a20b6eaf4f35046a429cde57bee7eb5f13d6857f",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/a222d2794c53f8165de20aa91b39e35e4b72bce9",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2021-47179",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2024-03-25T10:15:09.317",
|
||||
"lastModified": "2024-03-25T13:47:14.087",
|
||||
"lastModified": "2024-04-04T14:15:08.920",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -28,6 +28,10 @@
|
||||
"url": "https://git.kernel.org/stable/c/4e1ba532dbc1a0e19fc2458d74ab8d98680c4e42",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/a421d218603ffa822a0b8045055c03eae394a7eb",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/aba3c7795f51717ae316f3566442dee7cc3eeccb",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-52433",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2024-02-20T13:15:08.140",
|
||||
"lastModified": "2024-02-20T19:50:53.960",
|
||||
"lastModified": "2024-04-04T14:15:09.057",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -16,10 +16,26 @@
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/03caf75da1059f0460666c826e9f50e13dfd0017",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/2ee52ae94baabf7ee09cf2a8d854b990dac5d0e4",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/9a8c544158f68f656d1734eb5ba00c4f817b76b1",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/9af7dfb3c9d7985172a240f85e684c5cd33e29ce",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/c323ed65f66e5387ee0a73452118d49f1dae81b8",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/e3213ff99a355cda811b41e8dbb3472d13167a3a",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-52525",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2024-03-02T22:15:48.313",
|
||||
"lastModified": "2024-03-04T13:58:23.447",
|
||||
"lastModified": "2024-04-04T14:15:09.130",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -36,6 +36,10 @@
|
||||
"url": "https://git.kernel.org/stable/c/71b1d2b57f145c8469aa9346f0fd57bf59b2b89c",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/aef7a0300047e7b4707ea0411dc9597cba108fc8",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/b8e260654a29de872e7cb85387d8ab8974694e8e",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-52577",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2024-03-02T22:15:49.537",
|
||||
"lastModified": "2024-03-04T13:58:23.447",
|
||||
"lastModified": "2024-04-04T14:15:09.200",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -36,6 +36,10 @@
|
||||
"url": "https://git.kernel.org/stable/c/62c218124fe58372e0e1f60d5b634d21c264b337",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/6af289746a636f71f4c0535a9801774118486c7a",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/73be49248a04746096339a48a33fa2f03bd85969",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-52581",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2024-03-02T22:15:49.727",
|
||||
"lastModified": "2024-03-04T13:58:23.447",
|
||||
"lastModified": "2024-04-04T14:15:09.277",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -16,13 +16,29 @@
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/09c85f2d21ab6b5acba31a037985b13e8e6565b8",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/4aea243b6853d06c1d160a9955b759189aa02b14",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/7e5d732e6902eb6a37b35480796838a145ae5f07",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/a995a68e8a3b48533e47c856865d109a1f1a9d01",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/cf5000a7787cbc10341091d37245a42c119d26c5",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/ef99506eaf1dc31feff1adfcfd68bc5535a22171",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,12 +2,12 @@
|
||||
"id": "CVE-2024-1847",
|
||||
"sourceIdentifier": "3DS.Information-Security@3ds.com",
|
||||
"published": "2024-02-28T18:15:45.687",
|
||||
"lastModified": "2024-02-29T13:49:47.277",
|
||||
"lastModified": "2024-04-04T15:15:37.850",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Heap-based Buffer Overflow, Memory Corruption, Out-Of-Bounds Read, Out-Of-Bounds Write, Stack-based Buffer Overflow, Type Confusion, Uninitialized Variable, Use-After-Free vulnerabilities exist in the file reading procedure in eDrawings from Release SOLIDWORKS 2023 through Release SOLIDWORKS 2024. These vulnerabilities could allow an attacker to execute arbitrary code while opening a specially crafted CATPART, DWG, DXF, IPT, JT, SAT, SLDDRW, SLDPRT, STL, STP, X_B or X_T file."
|
||||
"value": "Heap-based Buffer Overflow, Memory Corruption, Out-Of-Bounds Read, Out-Of-Bounds Write, Stack-based Buffer Overflow, Type Confusion, Uninitialized Variable, Use-After-Free vulnerabilities exist in the file reading procedure in eDrawings from Release SOLIDWORKS 2023 through Release SOLIDWORKS 2024. These vulnerabilities could allow an attacker to execute arbitrary code while opening a specially crafted CATPART, IPT, JT, SAT, STL, STP, X_B or X_T file. NOTE: CVE-2024-3298 and CVE-2024-3299 were SPLIT from this ID."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
|
67
CVE-2024/CVE-2024-221xx/CVE-2024-22189.json
Normal file
67
CVE-2024/CVE-2024-221xx/CVE-2024-22189.json
Normal file
@ -0,0 +1,67 @@
|
||||
{
|
||||
"id": "CVE-2024-22189",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2024-04-04T15:15:37.990",
|
||||
"lastModified": "2024-04-04T15:15:37.990",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "quic-go is an implementation of the QUIC protocol in Go. Prior to version 0.42.0, an attacker can cause its peer to run out of memory sending a large number of `NEW_CONNECTION_ID` frames that retire old connection IDs. The receiver is supposed to respond to each retirement frame with a `RETIRE_CONNECTION_ID` frame. The attacker can prevent the receiver from sending out (the vast majority of) these `RETIRE_CONNECTION_ID` frames by collapsing the peers congestion window (by selectively acknowledging received packets) and by manipulating the peer's RTT estimate. Version 0.42.0 contains a patch for the issue. No known workarounds are available."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 7.5,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-770"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/quic-go/quic-go/commit/4a99b816ae3ab03ae5449d15aac45147c85ed47a",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/quic-go/quic-go/security/advisories/GHSA-c33x-xqrf-c478",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://seemann.io/posts/2024-03-19-exploiting-quics-connection-id-management",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.youtube.com/watch?v=JqXtYcZAtIA&t=3683s",
|
||||
"source": "security-advisories@github.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-26626",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2024-03-06T07:15:12.810",
|
||||
"lastModified": "2024-03-15T20:15:08.210",
|
||||
"lastModified": "2024-04-04T14:15:09.390",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -27,6 +27,10 @@
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/dcaafdba6c6162bb49f1192850bc3bbc3707738c",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/e622502c310f1069fd9f41cd38210553115f610a",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-26639",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2024-03-18T11:15:10.880",
|
||||
"lastModified": "2024-03-18T12:38:25.490",
|
||||
"lastModified": "2024-04-04T14:15:09.457",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -27,6 +27,10 @@
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/dc904345e3771aa01d0b8358b550802fdc6fe00b",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/f6564fce256a3944aa1bc76cb3c40e792d97c1eb",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-26678",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2024-04-02T07:15:44.307",
|
||||
"lastModified": "2024-04-02T12:50:42.233",
|
||||
"lastModified": "2024-04-04T14:15:09.513",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -16,6 +16,10 @@
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/0a962f2fbaa976af9eed21d0306370cded485787",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/1ad55cecf22f05f1c884adf63cc09d3c3e609ebf",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
|
@ -2,12 +2,16 @@
|
||||
"id": "CVE-2024-26710",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2024-04-03T15:15:53.487",
|
||||
"lastModified": "2024-04-03T17:24:18.150",
|
||||
"lastModified": "2024-04-04T14:15:09.567",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\npowerpc/kasan: Limit KASAN thread size increase to 32KB\n\nKASAN is seen to increase stack usage, to the point that it was reported\nto lead to stack overflow on some 32-bit machines (see link).\n\nTo avoid overflows the stack size was doubled for KASAN builds in\ncommit 3e8635fb2e07 (\"powerpc/kasan: Force thread size increase with\nKASAN\").\n\nHowever with a 32KB stack size to begin with, the doubling leads to a\n64KB stack, which causes build errors:\n arch/powerpc/kernel/switch.S:249: Error: operand out of range (0x000000000000fe50 is not between 0xffffffffffff8000 and 0x0000000000007fff)\n\nAlthough the asm could be reworked, in practice a 32KB stack seems\nsufficient even for KASAN builds - the additional usage seems to be in\nthe 2-3KB range for a 64-bit KASAN build.\n\nSo only increase the stack for KASAN if the stack size is < 32KB."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: powerpc/kasan: limitar el aumento del tama\u00f1o del subproceso KASAN a 32 KB. Se considera que KASAN aumenta el uso de la pila, hasta el punto de que se inform\u00f3 que provoca un desbordamiento de la pila en algunas m\u00e1quinas de 32 bits ( ver enlace). Para evitar desbordamientos, el tama\u00f1o de la pila se duplic\u00f3 para las compilaciones de KASAN en el commit 3e8635fb2e07 (\"powerpc/kasan: Forzar el aumento del tama\u00f1o del subproceso con KASAN\"). Sin embargo, con un tama\u00f1o de pila de 32 KB para empezar, la duplicaci\u00f3n conduce a una pila de 64 KB, lo que provoca errores de compilaci\u00f3n: arch/powerpc/kernel/switch.S:249: Error: operando fuera de rango (0x000000000000fe50 no est\u00e1 entre 0xffffffffffff8000 y 0x00000000000007fff) Aunque el conjunto podr\u00eda modificarse, en la pr\u00e1ctica una pila de 32 KB parece suficiente incluso para compilaciones KASAN; el uso adicional parece estar en el rango de 2 a 3 KB para una compilaci\u00f3n KASAN de 64 bits. Por lo tanto, solo aumente la pila para KASAN si el tama\u00f1o de la pila es <32 KB."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
@ -23,6 +27,10 @@
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/b29b16bd836a838b7690f80e37f8376414c74cbe",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/f1acb109505d983779bbb7e20a1ee6244d2b5736",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-26750",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2024-04-04T09:15:07.850",
|
||||
"lastModified": "2024-04-04T12:48:41.700",
|
||||
"lastModified": "2024-04-04T14:15:09.620",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -12,9 +12,25 @@
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/43ba9e331559a30000c862eea313248707afa787",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/6c480d0f131862645d172ca9e25dc152b1a5c3a6",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/aa82ac51d63328714645c827775d64dbfd9941f3",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/c4c795b21dd23d9514ae1c6646c3fb2c78b5be60",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/e9eac260369d0cf57ea53df95427125725507a0d",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-26780",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2024-04-04T09:15:07.903",
|
||||
"lastModified": "2024-04-04T12:48:41.700",
|
||||
"lastModified": "2024-04-04T14:15:09.667",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -12,10 +12,18 @@
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/25236c91b5ab4a26a56ba2e79b8060cf4e047839",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/2a3d40b4025fcfe51b04924979f1653993b17669",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/36f7371de977f805750748e80279be7e370df85c",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/69e0f04460f4037e01e29f0d9675544f62aafca3",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-26781",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2024-04-04T09:15:07.957",
|
||||
"lastModified": "2024-04-04T12:48:41.700",
|
||||
"lastModified": "2024-04-04T14:15:09.720",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -24,6 +24,10 @@
|
||||
"url": "https://git.kernel.org/stable/c/d487e7ba1bc7444d5f062c4930ef8436c47c7e63",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/d6a9608af9a75d13243d217f6ce1e30e57d56ffe",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/f27d319df055629480b84b9288a502337b6f2a2e",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-26792",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2024-04-04T09:15:08.563",
|
||||
"lastModified": "2024-04-04T12:48:22.650",
|
||||
"lastModified": "2024-04-04T14:15:09.783",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -20,6 +20,10 @@
|
||||
"url": "https://git.kernel.org/stable/c/c8ab7521665bd0f8bc4a900244d1d5a7095cc3b9",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/e2b54eaf28df0c978626c9736b94f003b523b451",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/eb3441093aad251418921246fc3b224fd1575701",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-26794",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2024-04-04T09:15:08.683",
|
||||
"lastModified": "2024-04-04T12:48:22.650",
|
||||
"lastModified": "2024-04-04T14:15:09.843",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -16,6 +16,10 @@
|
||||
"url": "https://git.kernel.org/stable/c/31d07a757c6d3430e03cc22799921569999b9a12",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/a1a4a9ca77f143c00fce69c1239887ff8b813bec",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/d43f8e58f10a44df8c08e7f7076f3288352cd168",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-26800",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2024-04-04T09:15:09.003",
|
||||
"lastModified": "2024-04-04T12:48:22.650",
|
||||
"lastModified": "2024-04-04T14:15:09.897",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -12,6 +12,10 @@
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/13114dc5543069f7b97991e3b79937b6da05f5b0",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/1ac9fb84bc7ecd4bc6428118301d9d864d2a58d1",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
@ -19,6 +23,10 @@
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/81be85353b0f5a7b660635634b655329b429eefe",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/f2b85a4cc763841843de693bbd7308fe9a2c4c89",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
}
|
||||
]
|
||||
}
|
59
CVE-2024/CVE-2024-279xx/CVE-2024-27919.json
Normal file
59
CVE-2024/CVE-2024-279xx/CVE-2024-27919.json
Normal file
@ -0,0 +1,59 @@
|
||||
{
|
||||
"id": "CVE-2024-27919",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2024-04-04T15:15:38.207",
|
||||
"lastModified": "2024-04-04T15:15:38.207",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Envoy is a cloud-native, open-source edge and service proxy. In versions 1.29.0 and 1.29.1, theEnvoy HTTP/2 protocol stack is vulnerable to the flood of CONTINUATION frames. Envoy's HTTP/2 codec does not reset a request when header map limits have been exceeded. This allows an attacker to send an sequence of CONTINUATION frames without the END_HEADERS bit set causing unlimited memory consumption. This can lead to denial of service through memory exhaustion. Users should upgrade to versions 1.29.2 to mitigate the effects of the CONTINUATION flood. Note that this vulnerability is a regression in Envoy version 1.29.0 and 1.29.1 only. As a workaround, downgrade to version 1.28.1 or earlier or disable HTTP/2 protocol for downstream connections."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 7.5,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-390"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/envoyproxy/envoy/commit/57a02565532c18eb9df972a3e8974be3ae59f2d5",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/envoyproxy/envoy/security/advisories/GHSA-gghf-vfxp-799r",
|
||||
"source": "security-advisories@github.com"
|
||||
}
|
||||
]
|
||||
}
|
59
CVE-2024/CVE-2024-27xx/CVE-2024-2700.json
Normal file
59
CVE-2024/CVE-2024-27xx/CVE-2024-2700.json
Normal file
@ -0,0 +1,59 @@
|
||||
{
|
||||
"id": "CVE-2024-2700",
|
||||
"sourceIdentifier": "secalert@redhat.com",
|
||||
"published": "2024-04-04T14:15:09.950",
|
||||
"lastModified": "2024-04-04T14:15:09.950",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability was found in the quarkus-core component. Quarkus captures the local environment variables from the Quarkus namespace during the application's build. Thus, running the resulting application inherits the values captured at build time. \r\n\r\nHowever, some local environment variables may have been set by the developer / CI environment for testing purposes, such as dropping the database during the application startup or trusting all TLS certificates to accept self-signed certificates. If these properties are configured using environment variables or the .env facility, they are captured into the built application. It leads to dangerous behavior if the application does not override these values.\r\n\r\nThis behavior only happens for configuration properties from the `quarkus.*` namespace. So, application-specific properties are not captured."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "secalert@redhat.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "HIGH",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 7.0,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.0,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "secalert@redhat.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-526"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://access.redhat.com/security/cve/CVE-2024-2700",
|
||||
"source": "secalert@redhat.com"
|
||||
},
|
||||
{
|
||||
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2273281",
|
||||
"source": "secalert@redhat.com"
|
||||
}
|
||||
]
|
||||
}
|
36
CVE-2024/CVE-2024-27xx/CVE-2024-2759.json
Normal file
36
CVE-2024/CVE-2024-27xx/CVE-2024-2759.json
Normal file
@ -0,0 +1,36 @@
|
||||
{
|
||||
"id": "CVE-2024-2759",
|
||||
"sourceIdentifier": "cvd@cert.pl",
|
||||
"published": "2024-04-04T14:15:10.220",
|
||||
"lastModified": "2024-04-04T14:15:10.220",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Improper access control vulnerability in Apaczka plugin for PrestaShop allows information gathering from saved templates without authentication.This issue affects Apaczka plugin for PrestaShop from v1 through v4.\n\n"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cvd@cert.pl",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-284"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://cert.pl/en/posts/2024/04/CVE-2024-2759/",
|
||||
"source": "cvd@cert.pl"
|
||||
},
|
||||
{
|
||||
"url": "https://cert.pl/posts/2024/04/CVE-2024-2759/",
|
||||
"source": "cvd@cert.pl"
|
||||
}
|
||||
]
|
||||
}
|
63
CVE-2024/CVE-2024-281xx/CVE-2024-28182.json
Normal file
63
CVE-2024/CVE-2024-281xx/CVE-2024-28182.json
Normal file
@ -0,0 +1,63 @@
|
||||
{
|
||||
"id": "CVE-2024-28182",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2024-04-04T15:15:38.427",
|
||||
"lastModified": "2024-04-04T15:15:38.427",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "nghttp2 is an implementation of the Hypertext Transfer Protocol version 2 in C. The nghttp2 library prior to version 1.61.0 keeps reading the unbounded number of HTTP/2 CONTINUATION frames even after a stream is reset to keep HPACK context in sync. This causes excessive CPU usage to decode HPACK stream. nghttp2 v1.61.0 mitigates this vulnerability by limiting the number of CONTINUATION frames it accepts per stream. There is no workaround for this vulnerability."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "LOW",
|
||||
"baseScore": 5.3,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-770"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/nghttp2/nghttp2/commit/00201ecd8f982da3b67d4f6868af72a1b03b14e0",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/nghttp2/nghttp2/commit/d71a4668c6bead55805d18810d633fbb98315af9",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/nghttp2/nghttp2/security/advisories/GHSA-x6x3-gv8h-m57q",
|
||||
"source": "security-advisories@github.com"
|
||||
}
|
||||
]
|
||||
}
|
67
CVE-2024/CVE-2024-288xx/CVE-2024-28871.json
Normal file
67
CVE-2024/CVE-2024-288xx/CVE-2024-28871.json
Normal file
@ -0,0 +1,67 @@
|
||||
{
|
||||
"id": "CVE-2024-28871",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2024-04-04T15:15:38.647",
|
||||
"lastModified": "2024-04-04T15:15:38.647",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "LibHTP is a security-aware parser for the HTTP protocol and the related bits and pieces. Version 0.5.46 may parse malformed request traffic, leading to excessive CPU usage. Version 0.5.47 contains a patch for the issue. No known workarounds are available."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 7.5,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-770"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/OISF/libhtp/commit/79e713f3e527593a45f545e854cd9e6fbb3cd3ed",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/OISF/libhtp/commit/bf618ec7f243cebfb0f7e84c3cb158955cb32b4d",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/OISF/libhtp/security/advisories/GHSA-ffr2-45w9-7wmg",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://redmine.openinfosecfoundation.org/issues/6757",
|
||||
"source": "security-advisories@github.com"
|
||||
}
|
||||
]
|
||||
}
|
55
CVE-2024/CVE-2024-291xx/CVE-2024-29182.json
Normal file
55
CVE-2024/CVE-2024-291xx/CVE-2024-29182.json
Normal file
@ -0,0 +1,55 @@
|
||||
{
|
||||
"id": "CVE-2024-29182",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2024-04-04T15:15:38.847",
|
||||
"lastModified": "2024-04-04T15:15:38.847",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Collabora Online is a collaborative online office suite based on LibreOffice. A stored cross-site scripting vulnerability was found in Collabora Online. An attacker could create a document with an XSS payload in document text referenced by field which, if hovered over to produce a tooltip, could be executed by the user's browser. Users should upgrade to Collabora Online 23.05.10.1 or higher. Earlier series of Collabora Online, 22.04, 21.11, etc. are unaffected."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 6.1,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/CollaboraOnline/online/security/advisories/GHSA-9gmw-5q2c-4398",
|
||||
"source": "security-advisories@github.com"
|
||||
}
|
||||
]
|
||||
}
|
59
CVE-2024/CVE-2024-291xx/CVE-2024-29191.json
Normal file
59
CVE-2024/CVE-2024-291xx/CVE-2024-29191.json
Normal file
@ -0,0 +1,59 @@
|
||||
{
|
||||
"id": "CVE-2024-29191",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2024-04-04T15:15:39.043",
|
||||
"lastModified": "2024-04-04T15:15:39.043",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "gotortc is a camera streaming application. Versions 1.8.5 and prior are vulnerable to DOM-based cross-site scripting. The links page (`links.html`) appends the `src` GET parameter (`[0]`) in all of its links for 1-click previews. The context in which `src` is being appended is `innerHTML` (`[1]`), which will insert the text as HTML. Commit 3b3d5b033aac3a019af64f83dec84f70ed2c8aba contains a patch for the issue."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 6.1,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/AlexxIT/go2rtc/commit/3b3d5b033aac3a019af64f83dec84f70ed2c8aba",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://securitylab.github.com/advisories/GHSL-2023-205_GHSL-2023-207_go2rtc/",
|
||||
"source": "security-advisories@github.com"
|
||||
}
|
||||
]
|
||||
}
|
67
CVE-2024/CVE-2024-302xx/CVE-2024-30250.json
Normal file
67
CVE-2024/CVE-2024-302xx/CVE-2024-30250.json
Normal file
@ -0,0 +1,67 @@
|
||||
{
|
||||
"id": "CVE-2024-30250",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2024-04-04T15:15:39.240",
|
||||
"lastModified": "2024-04-04T15:15:39.240",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Astro-Shield is an integration to enhance website security with SubResource Integrity hashes, Content-Security-Policy headers, and other techniques. Versions from 1.2.0 to 1.3.1 of Astro-Shield allow bypass to the allow-lists for cross-origin resources by introducing valid `integrity` attributes to the injected code. This implies that the injected SRI hash would be added to the generated CSP header, which would lead the browser to believe that the injected resource is legit. This vulnerability is patched in version 1.3.2."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 7.5,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-345"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/kindspells/astro-shield/commit/1221019306f501bf5fa9bcfb5a23a2321d34ba0a",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/kindspells/astro-shield/commit/5ae8b8ef4f681d3a81431ee7e79d5dec545c6e1f",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/kindspells/astro-shield/releases/tag/1.3.2",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/kindspells/astro-shield/security/advisories/GHSA-c4gr-q97g-ppwc",
|
||||
"source": "security-advisories@github.com"
|
||||
}
|
||||
]
|
||||
}
|
67
CVE-2024/CVE-2024-302xx/CVE-2024-30261.json
Normal file
67
CVE-2024/CVE-2024-302xx/CVE-2024-30261.json
Normal file
@ -0,0 +1,67 @@
|
||||
{
|
||||
"id": "CVE-2024-30261",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2024-04-04T15:15:39.460",
|
||||
"lastModified": "2024-04-04T15:15:39.460",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Undici is an HTTP/1.1 client, written from scratch for Node.js. An attacker can alter the `integrity` option passed to `fetch()`, allowing `fetch()` to accept requests as valid even if they have been tampered. This vulnerability was patched in version(s) 5.28.4 and 6.11.1."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:N/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "HIGH",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 2.6,
|
||||
"baseSeverity": "LOW"
|
||||
},
|
||||
"exploitabilityScore": 1.2,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-284"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/nodejs/undici/commit/2b39440bd9ded841c93dd72138f3b1763ae26055",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/nodejs/undici/commit/d542b8cd39ec1ba303f038ea26098c3f355974f3",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/nodejs/undici/security/advisories/GHSA-9qxr-qj54-h672",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://hackerone.com/reports/2377760",
|
||||
"source": "security-advisories@github.com"
|
||||
}
|
||||
]
|
||||
}
|
59
CVE-2024/CVE-2024-310xx/CVE-2024-31080.json
Normal file
59
CVE-2024/CVE-2024-310xx/CVE-2024-31080.json
Normal file
@ -0,0 +1,59 @@
|
||||
{
|
||||
"id": "CVE-2024-31080",
|
||||
"sourceIdentifier": "secalert@redhat.com",
|
||||
"published": "2024-04-04T14:15:10.330",
|
||||
"lastModified": "2024-04-04T14:15:10.330",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A heap-based buffer over-read vulnerability was found in the X.org server's ProcXIGetSelectedEvents() function. This issue occurs when byte-swapped length values are used in replies, potentially leading to memory leakage and segmentation faults, particularly when triggered by a client with a different endianness. This vulnerability could be exploited by an attacker to cause the X server to read heap memory values and then transmit them back to the client until encountering an unmapped page, resulting in a crash. Despite the attacker's inability to control the specific memory copied into the replies, the small length values typically stored in a 32-bit integer can result in significant attempted out-of-bounds reads."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "secalert@redhat.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 7.3,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 5.5
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "secalert@redhat.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-126"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://access.redhat.com/security/cve/CVE-2024-31080",
|
||||
"source": "secalert@redhat.com"
|
||||
},
|
||||
{
|
||||
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2271997",
|
||||
"source": "secalert@redhat.com"
|
||||
}
|
||||
]
|
||||
}
|
59
CVE-2024/CVE-2024-310xx/CVE-2024-31081.json
Normal file
59
CVE-2024/CVE-2024-310xx/CVE-2024-31081.json
Normal file
@ -0,0 +1,59 @@
|
||||
{
|
||||
"id": "CVE-2024-31081",
|
||||
"sourceIdentifier": "secalert@redhat.com",
|
||||
"published": "2024-04-04T14:15:10.593",
|
||||
"lastModified": "2024-04-04T14:15:10.593",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A heap-based buffer over-read vulnerability was found in the X.org server's ProcXIPassiveGrabDevice() function. This issue occurs when byte-swapped length values are used in replies, potentially leading to memory leakage and segmentation faults, particularly when triggered by a client with a different endianness. This vulnerability could be exploited by an attacker to cause the X server to read heap memory values and then transmit them back to the client until encountering an unmapped page, resulting in a crash. Despite the attacker's inability to control the specific memory copied into the replies, the small length values typically stored in a 32-bit integer can result in significant attempted out-of-bounds reads."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "secalert@redhat.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 7.3,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 5.5
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "secalert@redhat.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-126"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://access.redhat.com/security/cve/CVE-2024-31081",
|
||||
"source": "secalert@redhat.com"
|
||||
},
|
||||
{
|
||||
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2271998",
|
||||
"source": "secalert@redhat.com"
|
||||
}
|
||||
]
|
||||
}
|
59
CVE-2024/CVE-2024-310xx/CVE-2024-31082.json
Normal file
59
CVE-2024/CVE-2024-310xx/CVE-2024-31082.json
Normal file
@ -0,0 +1,59 @@
|
||||
{
|
||||
"id": "CVE-2024-31082",
|
||||
"sourceIdentifier": "secalert@redhat.com",
|
||||
"published": "2024-04-04T14:15:10.833",
|
||||
"lastModified": "2024-04-04T14:15:10.833",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A heap-based buffer over-read vulnerability was found in the X.org server's ProcAppleDRICreatePixmap() function. This issue occurs when byte-swapped length values are used in replies, potentially leading to memory leakage and segmentation faults, particularly when triggered by a client with a different endianness. This vulnerability could be exploited by an attacker to cause the X server to read heap memory values and then transmit them back to the client until encountering an unmapped page, resulting in a crash. Despite the attacker's inability to control the specific memory copied into the replies, the small length values typically stored in a 32-bit integer can result in significant attempted out-of-bounds reads."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "secalert@redhat.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 7.3,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 5.5
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "secalert@redhat.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-126"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://access.redhat.com/security/cve/CVE-2024-31082",
|
||||
"source": "secalert@redhat.com"
|
||||
},
|
||||
{
|
||||
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2271999",
|
||||
"source": "secalert@redhat.com"
|
||||
}
|
||||
]
|
||||
}
|
47
CVE-2024/CVE-2024-31xx/CVE-2024-3116.json
Normal file
47
CVE-2024/CVE-2024-31xx/CVE-2024-3116.json
Normal file
@ -0,0 +1,47 @@
|
||||
{
|
||||
"id": "CVE-2024-3116",
|
||||
"sourceIdentifier": "f86ef6dc-4d3a-42ad-8f28-e6d5547a5007",
|
||||
"published": "2024-04-04T15:15:39.667",
|
||||
"lastModified": "2024-04-04T15:15:39.667",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "pgAdmin <= 8.4 is affected by a Remote Code Execution (RCE) vulnerability through the validate binary path API. This vulnerability allows attackers to execute arbitrary code on the server hosting PGAdmin, posing a severe risk to the database management system's integrity and the security of the underlying data.\n"
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "f86ef6dc-4d3a-42ad-8f28-e6d5547a5007",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:L",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW",
|
||||
"baseScore": 7.4,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.1,
|
||||
"impactScore": 3.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://gist.github.com/aelmokhtar/689a8be7e3bd535ec01992d8ec7b2b98",
|
||||
"source": "f86ef6dc-4d3a-42ad-8f28-e6d5547a5007"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/pgadmin-org/pgadmin4/issues/7326",
|
||||
"source": "f86ef6dc-4d3a-42ad-8f28-e6d5547a5007"
|
||||
}
|
||||
]
|
||||
}
|
47
CVE-2024/CVE-2024-32xx/CVE-2024-3250.json
Normal file
47
CVE-2024/CVE-2024-32xx/CVE-2024-3250.json
Normal file
@ -0,0 +1,47 @@
|
||||
{
|
||||
"id": "CVE-2024-3250",
|
||||
"sourceIdentifier": "security@ubuntu.com",
|
||||
"published": "2024-04-04T15:15:39.837",
|
||||
"lastModified": "2024-04-04T15:15:39.837",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "It was discovered that Pebble's read-file API and the associated pebble pull command, before v1.10.2, allowed unprivileged local users to read files with root-equivalent permissions when Pebble was running as root. Fixes are also available as backports to v1.1.1, v1.4.2, and v1.7.4."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security@ubuntu.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 6.5,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.0,
|
||||
"impactScore": 4.0
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/canonical/pebble/security/advisories/GHSA-4685-2x5r-65pj",
|
||||
"source": "security@ubuntu.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.cve.org/CVERecord?id=CVE-2024-3250",
|
||||
"source": "security@ubuntu.com"
|
||||
}
|
||||
]
|
||||
}
|
59
CVE-2024/CVE-2024-32xx/CVE-2024-3296.json
Normal file
59
CVE-2024/CVE-2024-32xx/CVE-2024-3296.json
Normal file
@ -0,0 +1,59 @@
|
||||
{
|
||||
"id": "CVE-2024-3296",
|
||||
"sourceIdentifier": "secalert@redhat.com",
|
||||
"published": "2024-04-04T14:15:11.080",
|
||||
"lastModified": "2024-04-04T14:15:11.080",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A timing-based side-channel exists in the rust-openssl package, which could be sufficient to recover a plaintext across a network in a Bleichenbacher-style attack. To achieve successful decryption, an attacker would have to be able to send a large number of trial messages for decryption. The vulnerability affects the legacy PKCS#1v1.5 RSA encryption padding mode."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "secalert@redhat.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "HIGH",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 5.9,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.2,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "secalert@redhat.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-203"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://access.redhat.com/security/cve/CVE-2024-3296",
|
||||
"source": "secalert@redhat.com"
|
||||
},
|
||||
{
|
||||
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2269723",
|
||||
"source": "secalert@redhat.com"
|
||||
}
|
||||
]
|
||||
}
|
59
CVE-2024/CVE-2024-32xx/CVE-2024-3298.json
Normal file
59
CVE-2024/CVE-2024-32xx/CVE-2024-3298.json
Normal file
@ -0,0 +1,59 @@
|
||||
{
|
||||
"id": "CVE-2024-3298",
|
||||
"sourceIdentifier": "3DS.Information-Security@3ds.com",
|
||||
"published": "2024-04-04T15:15:40.017",
|
||||
"lastModified": "2024-04-04T15:15:40.017",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Out-Of-Bounds Write and Type Confusion vulnerabilities exist in the file reading procedure in eDrawings from Release SOLIDWORKS 2023 through Release SOLIDWORKS 2024. These vulnerabilities could allow an attacker to execute arbitrary code while opening a specially crafted DWG or DXF. NOTE: this vulnerability was SPLIT from CVE-2024-1847."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "3DS.Information-Security@3ds.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 7.8,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "3DS.Information-Security@3ds.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-787"
|
||||
},
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-843"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.3ds.com/vulnerability/advisories",
|
||||
"source": "3DS.Information-Security@3ds.com"
|
||||
}
|
||||
]
|
||||
}
|
63
CVE-2024/CVE-2024-32xx/CVE-2024-3299.json
Normal file
63
CVE-2024/CVE-2024-32xx/CVE-2024-3299.json
Normal file
@ -0,0 +1,63 @@
|
||||
{
|
||||
"id": "CVE-2024-3299",
|
||||
"sourceIdentifier": "3DS.Information-Security@3ds.com",
|
||||
"published": "2024-04-04T15:15:40.197",
|
||||
"lastModified": "2024-04-04T15:15:40.197",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Out-Of-Bounds Write, Use of Uninitialized Resource and Use-After-Free vulnerabilities exist in the file reading procedure in eDrawings from Release SOLIDWORKS 2023 through Release SOLIDWORKS 2024. These vulnerabilities could allow an attacker to execute arbitrary code while opening a specially crafted SLDDRW or SLDPRT file. NOTE: this vulnerability was SPLIT from CVE-2024-1847."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "3DS.Information-Security@3ds.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 7.8,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "3DS.Information-Security@3ds.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-416"
|
||||
},
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-787"
|
||||
},
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-908"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.3ds.com/vulnerability/advisories",
|
||||
"source": "3DS.Information-Security@3ds.com"
|
||||
}
|
||||
]
|
||||
}
|
73
README.md
73
README.md
@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
|
||||
### Last Repository Update
|
||||
|
||||
```plain
|
||||
2024-04-04T14:00:41.061851+00:00
|
||||
2024-04-04T16:00:33.410253+00:00
|
||||
```
|
||||
|
||||
### Most recent CVE Modification Timestamp synchronized with NVD
|
||||
|
||||
```plain
|
||||
2024-04-04T13:15:44.937000+00:00
|
||||
2024-04-04T15:15:40.197000+00:00
|
||||
```
|
||||
|
||||
### Last Data Feed Release
|
||||
@ -33,45 +33,56 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
|
||||
### Total Number of included CVEs
|
||||
|
||||
```plain
|
||||
244088
|
||||
244106
|
||||
```
|
||||
|
||||
### CVEs added in the last Commit
|
||||
|
||||
Recently added CVEs: `1`
|
||||
Recently added CVEs: `18`
|
||||
|
||||
- [CVE-2024-27575](CVE-2024/CVE-2024-275xx/CVE-2024-27575.json) (`2024-04-04T13:15:44.620`)
|
||||
- [CVE-2024-22189](CVE-2024/CVE-2024-221xx/CVE-2024-22189.json) (`2024-04-04T15:15:37.990`)
|
||||
- [CVE-2024-2700](CVE-2024/CVE-2024-27xx/CVE-2024-2700.json) (`2024-04-04T14:15:09.950`)
|
||||
- [CVE-2024-2759](CVE-2024/CVE-2024-27xx/CVE-2024-2759.json) (`2024-04-04T14:15:10.220`)
|
||||
- [CVE-2024-27919](CVE-2024/CVE-2024-279xx/CVE-2024-27919.json) (`2024-04-04T15:15:38.207`)
|
||||
- [CVE-2024-28182](CVE-2024/CVE-2024-281xx/CVE-2024-28182.json) (`2024-04-04T15:15:38.427`)
|
||||
- [CVE-2024-28871](CVE-2024/CVE-2024-288xx/CVE-2024-28871.json) (`2024-04-04T15:15:38.647`)
|
||||
- [CVE-2024-29182](CVE-2024/CVE-2024-291xx/CVE-2024-29182.json) (`2024-04-04T15:15:38.847`)
|
||||
- [CVE-2024-29191](CVE-2024/CVE-2024-291xx/CVE-2024-29191.json) (`2024-04-04T15:15:39.043`)
|
||||
- [CVE-2024-30250](CVE-2024/CVE-2024-302xx/CVE-2024-30250.json) (`2024-04-04T15:15:39.240`)
|
||||
- [CVE-2024-30261](CVE-2024/CVE-2024-302xx/CVE-2024-30261.json) (`2024-04-04T15:15:39.460`)
|
||||
- [CVE-2024-31080](CVE-2024/CVE-2024-310xx/CVE-2024-31080.json) (`2024-04-04T14:15:10.330`)
|
||||
- [CVE-2024-31081](CVE-2024/CVE-2024-310xx/CVE-2024-31081.json) (`2024-04-04T14:15:10.593`)
|
||||
- [CVE-2024-31082](CVE-2024/CVE-2024-310xx/CVE-2024-31082.json) (`2024-04-04T14:15:10.833`)
|
||||
- [CVE-2024-3116](CVE-2024/CVE-2024-31xx/CVE-2024-3116.json) (`2024-04-04T15:15:39.667`)
|
||||
- [CVE-2024-3250](CVE-2024/CVE-2024-32xx/CVE-2024-3250.json) (`2024-04-04T15:15:39.837`)
|
||||
- [CVE-2024-3296](CVE-2024/CVE-2024-32xx/CVE-2024-3296.json) (`2024-04-04T14:15:11.080`)
|
||||
- [CVE-2024-3298](CVE-2024/CVE-2024-32xx/CVE-2024-3298.json) (`2024-04-04T15:15:40.017`)
|
||||
- [CVE-2024-3299](CVE-2024/CVE-2024-32xx/CVE-2024-3299.json) (`2024-04-04T15:15:40.197`)
|
||||
|
||||
|
||||
### CVEs modified in the last Commit
|
||||
|
||||
Recently modified CVEs: `83`
|
||||
Recently modified CVEs: `19`
|
||||
|
||||
- [CVE-2024-28870](CVE-2024/CVE-2024-288xx/CVE-2024-28870.json) (`2024-04-04T12:48:41.700`)
|
||||
- [CVE-2024-29006](CVE-2024/CVE-2024-290xx/CVE-2024-29006.json) (`2024-04-04T12:48:41.700`)
|
||||
- [CVE-2024-29007](CVE-2024/CVE-2024-290xx/CVE-2024-29007.json) (`2024-04-04T12:48:41.700`)
|
||||
- [CVE-2024-29008](CVE-2024/CVE-2024-290xx/CVE-2024-29008.json) (`2024-04-04T12:48:41.700`)
|
||||
- [CVE-2024-29167](CVE-2024/CVE-2024-291xx/CVE-2024-29167.json) (`2024-04-04T12:48:41.700`)
|
||||
- [CVE-2024-2919](CVE-2024/CVE-2024-29xx/CVE-2024-2919.json) (`2024-04-04T12:48:41.700`)
|
||||
- [CVE-2024-29225](CVE-2024/CVE-2024-292xx/CVE-2024-29225.json) (`2024-04-04T12:48:41.700`)
|
||||
- [CVE-2024-29375](CVE-2024/CVE-2024-293xx/CVE-2024-29375.json) (`2024-04-04T12:48:41.700`)
|
||||
- [CVE-2024-29413](CVE-2024/CVE-2024-294xx/CVE-2024-29413.json) (`2024-04-04T12:48:41.700`)
|
||||
- [CVE-2024-3022](CVE-2024/CVE-2024-30xx/CVE-2024-3022.json) (`2024-04-04T12:48:41.700`)
|
||||
- [CVE-2024-30265](CVE-2024/CVE-2024-302xx/CVE-2024-30265.json) (`2024-04-04T12:48:41.700`)
|
||||
- [CVE-2024-3030](CVE-2024/CVE-2024-30xx/CVE-2024-3030.json) (`2024-04-04T12:48:41.700`)
|
||||
- [CVE-2024-30565](CVE-2024/CVE-2024-305xx/CVE-2024-30565.json) (`2024-04-04T12:48:41.700`)
|
||||
- [CVE-2024-31025](CVE-2024/CVE-2024-310xx/CVE-2024-31025.json) (`2024-04-04T12:48:41.700`)
|
||||
- [CVE-2024-3141](CVE-2024/CVE-2024-31xx/CVE-2024-3141.json) (`2024-04-04T13:15:44.713`)
|
||||
- [CVE-2024-3142](CVE-2024/CVE-2024-31xx/CVE-2024-3142.json) (`2024-04-04T13:15:44.937`)
|
||||
- [CVE-2024-3178](CVE-2024/CVE-2024-31xx/CVE-2024-3178.json) (`2024-04-04T12:48:41.700`)
|
||||
- [CVE-2024-3179](CVE-2024/CVE-2024-31xx/CVE-2024-3179.json) (`2024-04-04T12:48:41.700`)
|
||||
- [CVE-2024-3180](CVE-2024/CVE-2024-31xx/CVE-2024-3180.json) (`2024-04-04T12:48:41.700`)
|
||||
- [CVE-2024-3181](CVE-2024/CVE-2024-31xx/CVE-2024-3181.json) (`2024-04-04T12:48:41.700`)
|
||||
- [CVE-2024-3262](CVE-2024/CVE-2024-32xx/CVE-2024-3262.json) (`2024-04-04T12:48:22.650`)
|
||||
- [CVE-2024-3270](CVE-2024/CVE-2024-32xx/CVE-2024-3270.json) (`2024-04-04T12:48:41.700`)
|
||||
- [CVE-2024-3272](CVE-2024/CVE-2024-32xx/CVE-2024-3272.json) (`2024-04-04T12:48:41.700`)
|
||||
- [CVE-2024-3273](CVE-2024/CVE-2024-32xx/CVE-2024-3273.json) (`2024-04-04T12:48:41.700`)
|
||||
- [CVE-2024-3274](CVE-2024/CVE-2024-32xx/CVE-2024-3274.json) (`2024-04-04T12:48:41.700`)
|
||||
- [CVE-2021-46905](CVE-2021/CVE-2021-469xx/CVE-2021-46905.json) (`2024-04-04T14:15:08.703`)
|
||||
- [CVE-2021-46922](CVE-2021/CVE-2021-469xx/CVE-2021-46922.json) (`2024-04-04T14:15:08.793`)
|
||||
- [CVE-2021-47178](CVE-2021/CVE-2021-471xx/CVE-2021-47178.json) (`2024-04-04T14:15:08.850`)
|
||||
- [CVE-2021-47179](CVE-2021/CVE-2021-471xx/CVE-2021-47179.json) (`2024-04-04T14:15:08.920`)
|
||||
- [CVE-2023-52433](CVE-2023/CVE-2023-524xx/CVE-2023-52433.json) (`2024-04-04T14:15:09.057`)
|
||||
- [CVE-2023-52525](CVE-2023/CVE-2023-525xx/CVE-2023-52525.json) (`2024-04-04T14:15:09.130`)
|
||||
- [CVE-2023-52577](CVE-2023/CVE-2023-525xx/CVE-2023-52577.json) (`2024-04-04T14:15:09.200`)
|
||||
- [CVE-2023-52581](CVE-2023/CVE-2023-525xx/CVE-2023-52581.json) (`2024-04-04T14:15:09.277`)
|
||||
- [CVE-2024-1847](CVE-2024/CVE-2024-18xx/CVE-2024-1847.json) (`2024-04-04T15:15:37.850`)
|
||||
- [CVE-2024-26626](CVE-2024/CVE-2024-266xx/CVE-2024-26626.json) (`2024-04-04T14:15:09.390`)
|
||||
- [CVE-2024-26639](CVE-2024/CVE-2024-266xx/CVE-2024-26639.json) (`2024-04-04T14:15:09.457`)
|
||||
- [CVE-2024-26678](CVE-2024/CVE-2024-266xx/CVE-2024-26678.json) (`2024-04-04T14:15:09.513`)
|
||||
- [CVE-2024-26710](CVE-2024/CVE-2024-267xx/CVE-2024-26710.json) (`2024-04-04T14:15:09.567`)
|
||||
- [CVE-2024-26750](CVE-2024/CVE-2024-267xx/CVE-2024-26750.json) (`2024-04-04T14:15:09.620`)
|
||||
- [CVE-2024-26780](CVE-2024/CVE-2024-267xx/CVE-2024-26780.json) (`2024-04-04T14:15:09.667`)
|
||||
- [CVE-2024-26781](CVE-2024/CVE-2024-267xx/CVE-2024-26781.json) (`2024-04-04T14:15:09.720`)
|
||||
- [CVE-2024-26792](CVE-2024/CVE-2024-267xx/CVE-2024-26792.json) (`2024-04-04T14:15:09.783`)
|
||||
- [CVE-2024-26794](CVE-2024/CVE-2024-267xx/CVE-2024-26794.json) (`2024-04-04T14:15:09.843`)
|
||||
- [CVE-2024-26800](CVE-2024/CVE-2024-268xx/CVE-2024-26800.json) (`2024-04-04T14:15:09.897`)
|
||||
|
||||
|
||||
## Download and Usage
|
||||
|
212
_state.csv
212
_state.csv
@ -154878,7 +154878,7 @@ CVE-2020-25727,0,0,443624198b8cdd7714c523c65af5737fc2a74e9a546e86a1ee9f0ed3c43ba
|
||||
CVE-2020-25728,0,0,96fc5ba27ce27f73590c46f3a97102912d5dd530bafdfac00e4987725dbe8b74,2020-09-25T17:40:51.173000
|
||||
CVE-2020-25729,0,0,67353bd6c40f4c9bb200a4436a727451ea35e4225081e40b53aa35f5cc978f0a,2020-09-24T14:42:09.080000
|
||||
CVE-2020-2573,0,0,7c4bd8739d362e2674c8895a5b2c7517159f2648b53268c0e8c4918eaa185b39,2022-01-04T16:43:12.697000
|
||||
CVE-2020-25730,0,1,a9e18625370764bdf926b5a2e4cf92a3ecf9bb71b89a717b60d09e8a290f14e5,2024-04-04T12:48:41.700000
|
||||
CVE-2020-25730,0,0,a9e18625370764bdf926b5a2e4cf92a3ecf9bb71b89a717b60d09e8a290f14e5,2024-04-04T12:48:41.700000
|
||||
CVE-2020-25733,0,0,8ef35bccca3538257024f309434a3682f5dfc912a3408344965a99277c7faeb1,2023-11-07T03:20:24.463000
|
||||
CVE-2020-25734,0,0,e555550c2e3d9bcf8135c035f53064e73eecc92879c96efd63c9b83c7d6f0cc5,2023-11-07T03:20:24.520000
|
||||
CVE-2020-25735,0,0,533068724d2487baf9445c1a6170429533f0eb8468e364f0b9d2829acc173bf9,2023-11-07T03:20:24.577000
|
||||
@ -186626,7 +186626,7 @@ CVE-2021-46901,0,0,1665cb5ca539440295d8a959d2760d12b56c4be1868c712c96ca3dcd4d3dd
|
||||
CVE-2021-46902,0,0,15d8c1cefd0a39c70036d20031a514b6fb8f249aa94f97dfa235932c5c479f7f,2024-02-13T00:38:32.413000
|
||||
CVE-2021-46903,0,0,59ca1d694c639409297840c930e3dd8d372cadedd1376cf64770674d9911e3bf,2024-02-13T00:38:22.293000
|
||||
CVE-2021-46904,0,0,befbbb2047b1023912633fb0dec4a9ed1f9ea6d83caa6e00b69c52d6f0335aea,2024-02-26T16:32:25.577000
|
||||
CVE-2021-46905,0,0,fe18ea0bfee5e210b360ac65b505a29722b190861f6d6750676e3b988e5ba3e3,2024-02-26T16:32:25.577000
|
||||
CVE-2021-46905,0,1,dfdde76de6a6bad5eece535a98b4c74f83e9a4dacf0f80a1281998a4e463dbd4,2024-04-04T14:15:08.703000
|
||||
CVE-2021-46906,0,0,eb434dc1991c48ce4eb56cb2b3806509966c30ba9016ad3586891a1dc47eb175,2024-02-26T22:10:40.463000
|
||||
CVE-2021-46907,0,0,1f9b2c2375fa009b016f94aa5d024afa767a5a81d6bdb7bf20e32e33a05d91c6,2024-03-19T13:15:06.713000
|
||||
CVE-2021-46908,0,0,67f912657f123d50c1881b9d265bd000af86b0195a2b177aad9980da36a2a329,2024-02-27T14:20:06.637000
|
||||
@ -186643,7 +186643,7 @@ CVE-2021-46918,0,0,11b82adf0198d91a32f46057e0932667e72c273876f74b7bddf5336323b42
|
||||
CVE-2021-46919,0,0,037c67396e59109c43bb24c51b88263b26fdcecb227474d6e8e12aef2c83ac97,2024-02-27T14:20:06.637000
|
||||
CVE-2021-46920,0,0,f0661c917954ccb424071a99b35768afbd6d3de92015f36edb35aad9f042138f,2024-02-27T14:20:06.637000
|
||||
CVE-2021-46921,0,0,48270966729a8d712ef99ecabd670bd912ccbb0870487d94b2bcdf9cac9dafec,2024-02-27T14:20:06.637000
|
||||
CVE-2021-46922,0,0,704c5a044782f66497480cb6332e9f48642c25c8574be54527915c88657e1782,2024-02-27T14:20:06.637000
|
||||
CVE-2021-46922,0,1,974d6dea519d9027b6f6c8103137df152956984289bfe875b9d4219901b6e12f,2024-04-04T14:15:08.793000
|
||||
CVE-2021-46923,0,0,0a2c7ad8b55f7b45ed166785342169e296e592934bbe04d6c03a8ecee4c82906,2024-02-27T14:20:06.637000
|
||||
CVE-2021-46924,0,0,7af6122a06f4394f0508a14e3ac01420aee317ea6f91c6db77a0216f36cfcdbf,2024-02-27T14:20:06.637000
|
||||
CVE-2021-46925,0,0,9c47f517d305a07c1425a708d9cb3143e55c122e16bbff9e614fc90ec4267ed5,2024-02-27T14:20:06.637000
|
||||
@ -186899,8 +186899,8 @@ CVE-2021-47174,0,0,b6bbca5c8c41517c60ae5ee69ba3fcb0b1d1c2d2c76661d8503df1766707b
|
||||
CVE-2021-47175,0,0,7eb3c54a8b836edde2ed84e79a028f3c81aff125c948214c00c6f6a9cb149f2e,2024-03-25T13:47:14.087000
|
||||
CVE-2021-47176,0,0,9977e7d45537eef0d8951af67f9d79e3cb9bd9471cc4929fa50f67ab7bcd79fb,2024-03-25T13:47:14.087000
|
||||
CVE-2021-47177,0,0,17b9c85fef923a6278fd6497872c22e2b4ea493f8584902c2660ab96e360141e,2024-03-25T13:47:14.087000
|
||||
CVE-2021-47178,0,0,c25cd96a0a2553c8f47ae9e038b33fa780a313e4781ce8929f4a02b1baa933d2,2024-03-25T13:47:14.087000
|
||||
CVE-2021-47179,0,0,ff3384460faa93ef6cdd6cb49f18a46e46bbf25648ffd41213cf7002097a4a24,2024-03-25T13:47:14.087000
|
||||
CVE-2021-47178,0,1,d62a0b0430d909fcce88ca031870efdb985e58c953eb3149d1b68d4f1ab3f7b7,2024-04-04T14:15:08.850000
|
||||
CVE-2021-47179,0,1,b000bf7d856337be976af2349b8f73420ab8bf8fd491053a6643b7a7d226e562,2024-04-04T14:15:08.920000
|
||||
CVE-2021-47180,0,0,afc9fd20c69c989d18f2e23ff0432fb8cf966ef1d2dccd25cb3768f2bf56673b,2024-03-25T13:47:14.087000
|
||||
CVE-2022-0001,0,0,eef83f8ee034200b042b5eda26b679b982266672cf1407daf8d9fbe1ba7937b5,2022-08-19T12:28:32.903000
|
||||
CVE-2022-0002,0,0,4ba989879ca817729e7cddc36d35dc20834fb13fd71d0cce189890fe2defbd53,2022-08-19T12:28:50.667000
|
||||
@ -217727,9 +217727,9 @@ CVE-2023-25194,0,0,5439c758fa3fb561e024e651988dec569f66d723a27e32e4c5e7149b3ab42
|
||||
CVE-2023-25195,0,0,ea386ee31b6aad8b8f425f35f2d3cf3403aa0eac6eed00d3c1d60853ca6e1859,2023-11-07T04:08:56.857000
|
||||
CVE-2023-25196,0,0,77faabafcfe503f72dd45da68811f25036ba68994bdb6af1e541b7e871c50e93,2023-11-07T04:08:56.920000
|
||||
CVE-2023-25197,0,0,e4f42b6300657ea529e80dde3a8e29e1d24d59ba6afd87af3b5fc40b7ce71848,2023-11-07T04:08:56.980000
|
||||
CVE-2023-25199,0,1,01c5c7d37bfdf651bcb675188562c8d59441a01afe58bfdafb0eb5ba3ca3075d,2024-04-04T12:48:41.700000
|
||||
CVE-2023-25199,0,0,01c5c7d37bfdf651bcb675188562c8d59441a01afe58bfdafb0eb5ba3ca3075d,2024-04-04T12:48:41.700000
|
||||
CVE-2023-2520,0,0,f9812eaa8cf93d1e4c4ecaa8eecb1ec56a516b844845f1732e70e6baf84055c7,2024-03-21T02:47:14.407000
|
||||
CVE-2023-25200,0,1,14df2989630e80159bedb55f92cda7cdb241c62fe8814fb05d7f834d04a2e9e8,2024-04-04T12:48:41.700000
|
||||
CVE-2023-25200,0,0,14df2989630e80159bedb55f92cda7cdb241c62fe8814fb05d7f834d04a2e9e8,2024-04-04T12:48:41.700000
|
||||
CVE-2023-25201,0,0,b2956da7b7ecace4001c8e78fcd43c4f8a0aaa09eee4e6f70a0decf1ce045592,2023-07-17T18:42:15.550000
|
||||
CVE-2023-25206,0,0,daa679a2f273c41c808fe00ddd18d8984c18d7cb2378f1f968de9a1e814f620f,2023-03-17T17:32:19.313000
|
||||
CVE-2023-25207,0,0,8afa427842b31194eab2890fb0b1dd71a67e9ad76d0303b5b31456a95cf81e58,2023-03-15T18:52:24.190000
|
||||
@ -226041,9 +226041,9 @@ CVE-2023-36639,0,0,6fdd11eea4a98277c97f4888c49d699a68d6d370b78d7d85ad9e5ac9fa763
|
||||
CVE-2023-3664,0,0,ef51e6923199f396685dbaa0767c203536e314e4a8d5e60a049d3f5911c5ddcb,2023-11-07T04:19:17.493000
|
||||
CVE-2023-36641,0,0,14eed1895e1dd459b3f8a6375e0c4bbaa4b9943f00f080f76bb14a4e12712504,2023-11-20T19:59:59.920000
|
||||
CVE-2023-36642,0,0,b5817bb3ab405e31d7bbc953f484d8198bb18a03572502df584a98977f70bb84,2023-11-07T04:16:39.923000
|
||||
CVE-2023-36643,0,1,8f2a32c788f98b83543bf20a031a985f6b4187f9bae364fd4b7e893cc5e4f397,2024-04-04T12:48:41.700000
|
||||
CVE-2023-36644,0,1,e1e91d16a610660d298d3432645764fbc3176cf384ee159279902e52b0ccf2de,2024-04-04T12:48:41.700000
|
||||
CVE-2023-36645,0,1,2bf228d5109da5f03e39985dcf5927af5101e8a9dc06f91ddacde82ba4df7332,2024-04-04T12:48:41.700000
|
||||
CVE-2023-36643,0,0,8f2a32c788f98b83543bf20a031a985f6b4187f9bae364fd4b7e893cc5e4f397,2024-04-04T12:48:41.700000
|
||||
CVE-2023-36644,0,0,e1e91d16a610660d298d3432645764fbc3176cf384ee159279902e52b0ccf2de,2024-04-04T12:48:41.700000
|
||||
CVE-2023-36645,0,0,2bf228d5109da5f03e39985dcf5927af5101e8a9dc06f91ddacde82ba4df7332,2024-04-04T12:48:41.700000
|
||||
CVE-2023-36646,0,0,09465147362018b1f22b83c0790934c2bad889bb2ecb076b27e21d0dea470fbc,2023-12-13T20:38:27.083000
|
||||
CVE-2023-36647,0,0,91843db808fb2579e856461091be45438709999a18f636aaf53daec7a8d17f3c,2023-12-14T00:03:46.357000
|
||||
CVE-2023-36648,0,0,46668c0d3faa97c751bc4ec9117ce82217c9051232a0ab2e41ece7db52cb8d2f,2023-12-13T23:38:17.737000
|
||||
@ -235909,7 +235909,7 @@ CVE-2023-5204,0,0,89237c7af92839d913f6eb1aa09ca3f0194a955c0baf4f9705dbdf51651ee7
|
||||
CVE-2023-52040,0,0,0379c4087102b94362705fbd0da5bca403c163ed6adc575bbc54efbb9115a7c0,2024-01-30T20:55:36.447000
|
||||
CVE-2023-52041,0,0,ffc72853fe198ae6936b1a7b639d73a8cf8eaefbfe2621d594cd8a562507dd76,2024-01-19T20:39:37.587000
|
||||
CVE-2023-52042,0,0,8aa024dbef37c0d4aaa7945d16a09d1ce805dbd5be9ebdfbd70e84670d848d80,2024-01-19T20:41:35.410000
|
||||
CVE-2023-52043,0,1,e8666454cc71422568dc7f5297864b6e62e0948c2d990c271649ae11c726b8eb,2024-04-04T12:48:41.700000
|
||||
CVE-2023-52043,0,0,e8666454cc71422568dc7f5297864b6e62e0948c2d990c271649ae11c726b8eb,2024-04-04T12:48:41.700000
|
||||
CVE-2023-52046,0,0,63e09e99ad1b69570a0f8d32af8197ec570971bd83cc4724a905d55e80d649da,2024-02-13T16:05:49.580000
|
||||
CVE-2023-52047,0,0,6a917a0033efd8e780f8cd630d16744fab555fa921dd1a0329fbf7a3ed0bf327,2024-02-29T13:49:47.277000
|
||||
CVE-2023-52048,0,0,26e139229aec50850d4c6d5071b7ceccf830a27c5f05750f7d1e766e7c6be5ff,2024-02-29T13:49:47.277000
|
||||
@ -236162,7 +236162,7 @@ CVE-2023-5243,0,0,c84c98bc662840372bb3f6eda1ad149cb2f2941942ba96750d72e9684f09cf
|
||||
CVE-2023-52430,0,0,d42ac76eff7e870ccd425430baec924966d37450b40a663564ae4a320330fe89,2024-02-13T14:01:49.147000
|
||||
CVE-2023-52431,0,0,c693cbe76127faa54716f414936fa58bc8929839973e4bd5352d442ea2d0fbba,2024-02-13T14:01:07.747000
|
||||
CVE-2023-52432,0,0,d9e628cd1ba368f63ce7d4aa2f3fa1ad3ace9f6cbad32032b51f0e38a1c9e333,2024-03-05T13:41:01.900000
|
||||
CVE-2023-52433,0,0,7ca8ce1951fc4968a87158cb28dc14cfd8293c05d1e378e760fb6f9032cf2c78,2024-02-20T19:50:53.960000
|
||||
CVE-2023-52433,0,1,1ff15e0b84ada10d9fe85644e2eeee231a8e039de83865a18bc59793995bf899,2024-04-04T14:15:09.057000
|
||||
CVE-2023-52434,0,0,5d52612c26fee7b14653aeb9fd0e234de51ea4d52e7c788aef26856ca04a039a,2024-03-15T14:21:29.950000
|
||||
CVE-2023-52435,0,0,93ff57cc29918e833611e81b89e4ae0482ae349c7e83a8ab64e2ebbd978f4b55,2024-03-15T14:06:17.587000
|
||||
CVE-2023-52436,0,0,8f17bb726b2823c780a3b9583f0f935844b4d54710b449490ca6c5a93a233290,2024-02-20T21:52:55.187000
|
||||
@ -236262,7 +236262,7 @@ CVE-2023-52521,0,0,1e7e8187a71112abd692af8a173f2fea0cededfab9345bb70de02bb57007d
|
||||
CVE-2023-52522,0,0,0cad1dcc690a6b6ed01005505258d6e88d087e53bdc0f1aa6ad7244372bda364,2024-03-04T13:58:23.447000
|
||||
CVE-2023-52523,0,0,c8911e5f8bfc27f056e695b9221f03187187905539c6cf24a31b361a725530bf,2024-03-04T13:58:23.447000
|
||||
CVE-2023-52524,0,0,f0eba1d5b10befebbcad0fea878fba0444c53017a86a8dae972f7a4c556a1eed,2024-03-04T13:58:23.447000
|
||||
CVE-2023-52525,0,0,83df7e0d5899e7522a97b4609d11bcf60937d82ea9f6304bca5d0c2022b8623c,2024-03-04T13:58:23.447000
|
||||
CVE-2023-52525,0,1,61d6b518a6cccad1beed171c8e5f138d38476eaa34131f9dfb85aee6cd810e7d,2024-04-04T14:15:09.130000
|
||||
CVE-2023-52526,0,0,c8bc3966661b0764c53a3ffcc1cfb50187176ad410a346058c740e180104464e,2024-03-04T13:58:23.447000
|
||||
CVE-2023-52527,0,0,222244e7b045a078760821345bf62011d72c6efbbef63569a520b4e32bb41710,2024-03-04T13:58:23.447000
|
||||
CVE-2023-52528,0,0,4b3afc81720e3a613efcc91008f8da46a797b94c3b91056234e8671deefe2052,2024-03-04T13:58:23.447000
|
||||
@ -236297,12 +236297,12 @@ CVE-2023-52573,0,0,86b3c8dfed5fbd27f1aed875d2cce315bbf595ce10fe7fb7daa681006df27
|
||||
CVE-2023-52574,0,0,f0679357774d7f85109d4a03b2d5f958bccf9db9e04390fd2145b547520b0862,2024-03-04T13:58:23.447000
|
||||
CVE-2023-52575,0,0,e499b4844abff2964e63eaf0a301f6da9bfa30448fc7f8b09656fcdd8607fb57,2024-03-04T13:58:23.447000
|
||||
CVE-2023-52576,0,0,0b4c1bba09bfc68a1aff8c4e61a45bb987173b59b3ebf1d30c2f3124e00c39fe,2024-03-04T13:58:23.447000
|
||||
CVE-2023-52577,0,0,6614f4e3cc083e1f1c18171c23d3109f918a85521258c31f0e3679cd88300a6d,2024-03-04T13:58:23.447000
|
||||
CVE-2023-52577,0,1,d347543ecb98a15cfae2d3117c8d2e88873fbf710fd58d4986eaa1ac0f204ea3,2024-04-04T14:15:09.200000
|
||||
CVE-2023-52578,0,0,8a45e2debe9cd054247eae536813d2bb1415e8d2f39df4f7c678fa7c94c2e5f4,2024-03-04T13:58:23.447000
|
||||
CVE-2023-52579,0,0,8d0e3470d4c3c95f9b681e1d42e7f16f99b1e4ac9ba12576c74fac796502887b,2024-03-04T16:15:49.340000
|
||||
CVE-2023-5258,0,0,0fe66e0fbadac4b6f871a9942f967722e8b3a7f4874d4763fdc0e39e93b28bca,2024-03-21T02:50:11.527000
|
||||
CVE-2023-52580,0,0,38e39d54b289b1d49bc482c0da82d43253808df5c467ad8b75029fb59c58f447,2024-03-04T13:58:23.447000
|
||||
CVE-2023-52581,0,0,3f1fd8665c63738bd517bafef4b1e97314a821e81957b1b0b952b7544a9047ec,2024-03-04T13:58:23.447000
|
||||
CVE-2023-52581,0,1,fdddc64857d5bf65ab9bfb96aee4514d9d51008719a9a6bda751a9c4e1ddd6a2,2024-04-04T14:15:09.277000
|
||||
CVE-2023-52582,0,0,af72e59c52b97139ded26cd2d75f3c2f4c5f30802b950ea3345cee3766393993,2024-03-04T13:58:23.447000
|
||||
CVE-2023-52583,0,0,707bfceaab0b7f8849b42babcb612e0b81d64266f51c8cf81d5b3b70a8510929,2024-03-06T15:18:08.093000
|
||||
CVE-2023-52584,0,0,294fd6cdb995cc1ce891fb09ba4fe5675061ff59f0b22f574ca6870ee520db80,2024-03-06T15:18:08.093000
|
||||
@ -238222,7 +238222,7 @@ CVE-2024-0324,0,0,e2fadca67c7baa89b005ec266da519e463257e78c6e5f4f4c456a560ae3dc7
|
||||
CVE-2024-0325,0,0,f8c2cba1f1f0c331a488b75f13dbe50ab43d383eb139fa13e3114624f20a0b62,2024-02-09T19:48:49.967000
|
||||
CVE-2024-0326,0,0,157ca9564d0d5e51bf84f9a59702eacc7ff46c9422565312c687993904649658,2024-03-13T18:16:18.563000
|
||||
CVE-2024-0333,0,0,78afbb7eeda64eef1807e49052b7da2d0a6435f70b81c6cbf5d31bb9f61e73da,2024-01-18T19:39:16.620000
|
||||
CVE-2024-0335,0,1,e01d60ef0e5a8a1ca9ff9e08ad549de1079ec643489c6df6d371055ae978e10d,2024-04-04T12:48:41.700000
|
||||
CVE-2024-0335,0,0,e01d60ef0e5a8a1ca9ff9e08ad549de1079ec643489c6df6d371055ae978e10d,2024-04-04T12:48:41.700000
|
||||
CVE-2024-0337,0,0,669347fc2574064a01ba98d7b6e13ae994791356ab8f183f3ab4aeb768c02d3a,2024-03-20T13:00:16.367000
|
||||
CVE-2024-0338,0,0,92ebcd39fdf784ffd65dac214cbee1488e55baa90d10e33cf90090e1ac97448b,2024-02-09T19:28:45.703000
|
||||
CVE-2024-0340,0,0,9a8ba654f67676e86e1f05467157251dcb3a161f2f141df45cb7a58fee558581,2024-01-16T18:49:46.600000
|
||||
@ -239102,7 +239102,7 @@ CVE-2024-1410,0,0,535308bfcb5b14b9cf6546577fa611ecf7473e04ab146e149a1b5e72425241
|
||||
CVE-2024-1411,0,0,155d980c645848a0fa2746dd2fa4140b3d2b5b8cd5e82a2761118e461d98b145,2024-02-29T13:49:29.390000
|
||||
CVE-2024-1413,0,0,af2cf6651f1cdd9ff20e27e884b529ceac85b387ba67abac2a26a08e26cf3f68,2024-03-13T18:15:58.530000
|
||||
CVE-2024-1414,0,0,8f138da96eafd299d81e9063e920ea7e6e3c79c8674ee2d0cf04b624b232e13b,2024-03-13T18:15:58.530000
|
||||
CVE-2024-1418,0,1,f0fdbd06812bc7346eae082363d2f233639a3b4948841227effcbe9cdf330534,2024-04-04T12:48:41.700000
|
||||
CVE-2024-1418,0,0,f0fdbd06812bc7346eae082363d2f233639a3b4948841227effcbe9cdf330534,2024-04-04T12:48:41.700000
|
||||
CVE-2024-1419,0,0,bf80d14fec94f18ae2c05ed1388e7f4d3c50315425b98f8f3d1658ee134e8f1c,2024-03-07T13:52:27.110000
|
||||
CVE-2024-1420,0,0,63be6135cf11500708980f0eb6e023d1c00fd2eeb1aa055b1a9dd099f6d1d32a,2024-02-12T15:15:07.733000
|
||||
CVE-2024-1421,0,0,f03d7f3ef1765f0f145e59552c7f2e0551f5780bf62fafd3ac0b92ab1fea1897,2024-03-13T12:33:51.697000
|
||||
@ -239358,7 +239358,7 @@ CVE-2024-1833,0,0,4f5597270bd12000055e640da80ea8fbdb3e247f47872a2179c1ecd5651d81
|
||||
CVE-2024-1834,0,0,b51a6f3f2e7b2b50ab5ab93f96601a23b5ba6b538703fcd929b1199f2fbb963f,2024-03-21T02:51:46.983000
|
||||
CVE-2024-1843,0,0,381f1dba7504e2dd4844c9284f47a0574c276b6a0dafd5dcab8a395be3a46549,2024-03-13T18:15:58.530000
|
||||
CVE-2024-1844,0,0,2054eb4498d263a5b76e50b83840fddade66cc253e40e49eba0a175cbd7b5116,2024-03-20T13:00:16.367000
|
||||
CVE-2024-1847,0,0,b55263af4389332b889e5bd8f9f4954a5c0b9ab1d7b62081b881baa85be08d0f,2024-02-29T13:49:47.277000
|
||||
CVE-2024-1847,0,1,ddf021c560c9a355a4027f45ca2e43bbcfa55803fd85d605289c4213c23658d7,2024-04-04T15:15:37.850000
|
||||
CVE-2024-1848,0,0,8e701b6e1325c7234b61586f907ad90369eb320c9306dd5c4c2226a189893dd1,2024-03-22T12:45:36.130000
|
||||
CVE-2024-1851,0,0,ac07ab34f3e596527407cf2fcb93e785fa1a213045982c8aadd05f9e543a11a5,2024-03-08T14:02:57.420000
|
||||
CVE-2024-1853,0,0,88e46cdee904df65be156cae6d046ba1f9b383351c4ae2ffb721120e1de469e2,2024-03-15T12:53:06.423000
|
||||
@ -239514,7 +239514,7 @@ CVE-2024-20054,0,0,196ffd82a2bc4114c93d285cf3c39cab5b18744f37d8ff374529d50119278
|
||||
CVE-2024-20055,0,0,4dd704c095e53d7cf4a2fe7965dfdb1d6d64132f42f0670efc379daf78b59d78,2024-04-01T12:49:00.877000
|
||||
CVE-2024-2006,0,0,df4bc94ba9e1d1c638a16eca7ef98c4896fe8b4e7cd4dfad87563fdb108addf7,2024-03-13T18:15:58.530000
|
||||
CVE-2024-2007,0,0,cefa311621096179bb914bf12210561f25cfe8738eb5d70af1c46c4888d5c56c,2024-03-21T12:58:51.093000
|
||||
CVE-2024-2008,0,1,24b72a14e5ee01a2db2023756423973672456f8e561191c883f3c55699e23018,2024-04-04T12:48:41.700000
|
||||
CVE-2024-2008,0,0,24b72a14e5ee01a2db2023756423973672456f8e561191c883f3c55699e23018,2024-04-04T12:48:41.700000
|
||||
CVE-2024-2009,0,0,06de9242298eb9d20e9fc16ea88a9ae37f34a8de2022495fac7d5f3c736f2944,2024-03-21T02:52:26.207000
|
||||
CVE-2024-2014,0,0,29ab15fb0456085b5ff9fd84bd5d3860187771a515b74bb5489f608b1b6e0da8,2024-03-21T12:58:51.093000
|
||||
CVE-2024-2015,0,0,2dc64b70559fba169a1a772697a7f6d2f0af432e35aee281bcbbbab0cd3a60ef,2024-03-21T12:58:51.093000
|
||||
@ -239721,7 +239721,7 @@ CVE-2024-2078,0,0,1f3625edc40ce981dfa798326c49d364352417c97edbdeb08f2797c1a0a609
|
||||
CVE-2024-2079,0,0,d19df912ca8f24c4783570207f7ead00a2f333eee11795e142007ff6a5180cfc,2024-03-14T12:52:16.723000
|
||||
CVE-2024-20799,0,0,5332d5e7b13388161eae410a6b53d5afb13895598cbbc29823f7f536c0dd7d70,2024-04-02T12:50:42.233000
|
||||
CVE-2024-2080,0,0,32a4465f2fc45199bcb0563622cd911532e367b79194bc4a312258059486223d,2024-03-22T12:45:36.130000
|
||||
CVE-2024-20800,0,1,450021d7173d2f525fbf26b115cbf52049350537abd18764667c043f2ba46b59,2024-04-04T12:48:41.700000
|
||||
CVE-2024-20800,0,0,450021d7173d2f525fbf26b115cbf52049350537abd18764667c043f2ba46b59,2024-04-04T12:48:41.700000
|
||||
CVE-2024-20802,0,0,09b0e538ab7892d37fab32a8e5c61289f6ef8af3dfbdfbb048a6512fa7396094,2024-01-10T16:14:57.787000
|
||||
CVE-2024-20803,0,0,6c415e68c0cc04850639517c5e65b145b62c937ecdd266efbaf3b8a7e936e490,2024-01-10T16:11:26.313000
|
||||
CVE-2024-20804,0,0,a1b322c5729ef25c8a996395d8c8bd4c0bea37f2ea619378cfb5db02be42c461,2024-04-02T01:15:50.777000
|
||||
@ -240348,6 +240348,7 @@ CVE-2024-22178,0,0,0704e65ab7c5164ebd76a87fea885127f6bd30204a3abe8ca923967590841
|
||||
CVE-2024-22180,0,0,19e9318ece70bb0e88968bad696b07798db0b84c54153f426e33acb6b2d89f93,2024-04-02T12:50:42.233000
|
||||
CVE-2024-22182,0,0,8fb954f2fbefb93ce09c3ae1b2da1867c7de47107fb744c3b547b750263f6217,2024-03-21T02:52:00.913000
|
||||
CVE-2024-22188,0,0,454846b26f0209c1a43fdf159574f9578934720b1b56e74466fc620d8647279d,2024-03-05T13:41:01.900000
|
||||
CVE-2024-22189,1,1,11d02a0405105a7024e06732150373e4bfd4e12371ef0d69703434cc4a698211,2024-04-04T15:15:37.990000
|
||||
CVE-2024-22190,0,0,b6052bec184e44f4bdb37913f09378ade6ba357d503aeeeace40339b578d1a46,2024-01-18T13:48:07.553000
|
||||
CVE-2024-22191,0,0,be01210972ad533e56be565fccc94079f011ea86ba8cff7f641dea0bfb25ce97,2024-01-24T18:13:53.947000
|
||||
CVE-2024-22192,0,0,0a45578662a753528ffcf359d04d978d5ce5bc4a1429fd84d91a14073d480521,2024-01-24T18:13:38.807000
|
||||
@ -241862,7 +241863,7 @@ CVE-2024-25469,0,0,b1c7de3d868ef20a4a3903a52b0516b30bcc5e77374670c74cfca0a07f772
|
||||
CVE-2024-2547,0,0,17976fb77ba3f68004237d1775edececf0454dd0b03a4bbfddeaac48f3d03cd4,2024-03-21T02:52:37.487000
|
||||
CVE-2024-25501,0,0,bf285c0d0f063e749fd3088de6d5fd4b5fa405fe4b880c9267b8673a654574f4,2024-03-11T01:32:29.610000
|
||||
CVE-2024-25502,0,0,50331b6b298e51ff1fb5155b43730c3887534f74eacaa5eabfebdbefa930be85,2024-02-16T13:38:00.047000
|
||||
CVE-2024-25503,0,1,f9c2bf79e5317f301a6c7dd18ea5c4220304b08d7037f2d7952ab161046bb860,2024-04-04T12:48:41.700000
|
||||
CVE-2024-25503,0,0,f9c2bf79e5317f301a6c7dd18ea5c4220304b08d7037f2d7952ab161046bb860,2024-04-04T12:48:41.700000
|
||||
CVE-2024-25506,0,0,2f20dc186d5013a60c5a0662addaebb91bb2fda284189b786801332d38fe3fb9,2024-03-28T20:53:20.813000
|
||||
CVE-2024-2553,0,0,51096ed0b78dd956151349bc7a00fa14b68c357d7181cd6178d0a156f537f6e1,2024-03-26T17:15:47.490000
|
||||
CVE-2024-2554,0,0,ef5033868b91adf8feef47009e6b37c3be474b94af09c16e660d3e4a8567d801,2024-03-21T02:52:37.647000
|
||||
@ -241874,7 +241875,7 @@ CVE-2024-25554,0,0,a87c08d7479e0670c1de7ac680e974b7c966b7f12d7b309312798a5acd199
|
||||
CVE-2024-25559,0,0,b710ef2f87d2510e81b25ebbc4243b848284fc64bfa4b8a44d47d25b0e965b42,2024-02-15T06:23:39.303000
|
||||
CVE-2024-2556,0,0,223a39aa0e4fff7fe144c3b29f789baf40366aecb28df67671780de2ce9eb906,2024-03-21T02:52:37.803000
|
||||
CVE-2024-25567,0,0,bbb8c64eb3dcee3e8e89951734f837d0c3bea66c11459a30529f4c9133593805,2024-03-22T12:45:36.130000
|
||||
CVE-2024-25568,0,1,2e129d59cd85b3a3a4c6965bf47221245f823e92c51f855b2e2a1afe240ed183,2024-04-04T12:48:41.700000
|
||||
CVE-2024-25568,0,0,2e129d59cd85b3a3a4c6965bf47221245f823e92c51f855b2e2a1afe240ed183,2024-04-04T12:48:41.700000
|
||||
CVE-2024-2557,0,0,3eda0a7c8d6603fb296c89f9d2da3a1265fcfdf6dce4e5301364677a6d8d524e,2024-03-21T02:52:37.887000
|
||||
CVE-2024-25574,0,0,4bc8d3cd97ad31d3dfd232c462a09dc1924d30756dc7bfcb27690950ff1edfb2,2024-04-02T12:50:42.233000
|
||||
CVE-2024-25578,0,0,ff68f9ee0e3394b3fa83fe8766f2e044325a5fd043b437de063c0cd80654c610,2024-03-01T14:04:26.010000
|
||||
@ -242246,7 +242247,7 @@ CVE-2024-2622,0,0,b8b72dd0b1f3f22924084c8488bdbc35aeda4db541c733fc482710ee315976
|
||||
CVE-2024-26246,0,0,6c174a39b8e16966075834fa377a33ef3e5c5829eb1a43647414103e1222a0e5,2024-03-19T17:05:45.193000
|
||||
CVE-2024-26247,0,0,ed304d3168190e2757b85fd85fc0b38856926e8e4ca6b0df56c71d50554fa5bc,2024-03-26T03:18:26.197000
|
||||
CVE-2024-2625,0,0,176202763572967bdd2403d6220b5ef3a0eeae1c4e7f0e46612d30bfb12e4570,2024-04-01T15:32:17.010000
|
||||
CVE-2024-26258,0,1,9ef2d1e30897bdab54b09ec2dd99cdda5b833eb19284fc2005cdbcec28493737,2024-04-04T12:48:41.700000
|
||||
CVE-2024-26258,0,0,9ef2d1e30897bdab54b09ec2dd99cdda5b833eb19284fc2005cdbcec28493737,2024-04-04T12:48:41.700000
|
||||
CVE-2024-2626,0,0,0f82bfcd678adfe2206a7b49362dbece30aa00242a9c52e3ba26851c15f6dba3,2024-04-01T15:22:37.883000
|
||||
CVE-2024-26260,0,0,41c48505050cd0603f041cb40494690b052971f86cff83dd85a1f53d94faeb17,2024-02-15T06:23:39.303000
|
||||
CVE-2024-26261,0,0,a92f53c19fcf77a7e91b427c5773deeaf43265aee70f7079a798b91a424064e7,2024-02-15T06:23:39.303000
|
||||
@ -242346,7 +242347,7 @@ CVE-2024-26495,0,0,bbb6b231bf109fc8acfd5241f02faec1361b46bca779b6926f0190dbd5a53
|
||||
CVE-2024-26503,0,0,67af53e4079744ca59c487303c5ff1417327cd875b9be966624dba59813771c0,2024-03-15T12:53:06.423000
|
||||
CVE-2024-26521,0,0,cd304afd2135ea7b8ef2211742c7b93ec84446277e098ef9dbbecd48d38b35d0,2024-03-12T12:40:13.500000
|
||||
CVE-2024-26529,0,0,947c282389b2399c937e39be9afb47cae33d04cd0c4d375c710a3d8a93a18338,2024-03-13T12:33:51.697000
|
||||
CVE-2024-2653,0,1,1b90dd54d7cdd8c3f7a671a7b17e805395dcf75d86254158436fed2a545bcd1d,2024-04-04T12:48:41.700000
|
||||
CVE-2024-2653,0,0,1b90dd54d7cdd8c3f7a671a7b17e805395dcf75d86254158436fed2a545bcd1d,2024-04-04T12:48:41.700000
|
||||
CVE-2024-26540,0,0,b5235e29de9ae6dda085cae04785695bbdb6918510d970ab98c90b5258eae60c,2024-03-15T12:53:06.423000
|
||||
CVE-2024-26542,0,0,84bcc676050237f7706e936cd8d9d490aa0a127cdccddbe7afe739c073267e25,2024-02-28T14:06:45.783000
|
||||
CVE-2024-26548,0,0,7b31129407d10e539a4174451b23a0f83a48cdb246d6dd13af61036fdc95df1c,2024-03-01T14:04:26.010000
|
||||
@ -242401,7 +242402,7 @@ CVE-2024-26622,0,0,901f3ae633851f792482b9484f4afc2e593aa3b68d7dbc44df496f7a3b796
|
||||
CVE-2024-26623,0,0,5692b1c30d07fd10d73a2d8d099143935e519ebf33db10f9328fbf12228012a8,2024-03-06T15:18:08.093000
|
||||
CVE-2024-26624,0,0,9575e38401ed951dd513d0e1852942215c7c9e9bc3c5371fd0da3ac3a0eac967,2024-03-27T14:15:10.163000
|
||||
CVE-2024-26625,0,0,546958066aac924bfdcd0f2de2dea97f607ed5075b04c8674342940f6016b457,2024-03-06T15:18:08.093000
|
||||
CVE-2024-26626,0,0,d16b5c6c8db92baa2dd6d4d6246555a607725b66cb72a9dfbaf2d1e6806287b5,2024-03-15T20:15:08.210000
|
||||
CVE-2024-26626,0,1,144b70a967c255a0ac33e20cfa403c3f12d2b0b80c4b891f29c37c572ce370a3,2024-04-04T14:15:09.390000
|
||||
CVE-2024-26627,0,0,9c09d4f73dbc04e8bf693f2b91f36043cf32b88ec1b0ffef850696b2f5157e34,2024-03-06T15:18:08.093000
|
||||
CVE-2024-26628,0,0,c81fd3a5ad105931eb915543b147e48cdc3d2e1a2a90d930b948d12a8b8ed86c,2024-03-20T17:15:07.367000
|
||||
CVE-2024-26629,0,0,697c9b21732245ebb984f1adedcac9d21f3da8ace05a08225de2aae8cdccb697,2024-03-13T14:28:45.217000
|
||||
@ -242414,7 +242415,7 @@ CVE-2024-26635,0,0,ef0ef4329a3775ea6d25838c212942f9e933ce2108a8101d274cfb6887156
|
||||
CVE-2024-26636,0,0,760d91a296e0acf8ba41ea5db2ecf406899fc0855e4062b2617f6fe9e15d498d,2024-03-18T12:38:25.490000
|
||||
CVE-2024-26637,0,0,fc892e24bd1b7e8206ffae07359f5a6f79726dc219d9822d731828992a4ead1a,2024-03-18T12:38:25.490000
|
||||
CVE-2024-26638,0,0,810693405d991f7ccd7a2a1a0260a34b1a9402f77c9d945d74efd33b7925ef28,2024-03-18T12:38:25.490000
|
||||
CVE-2024-26639,0,0,5ecaa163a6c77c6111bb006a53c43194195b6cfbe8535ad567a79569fc77c2b9,2024-03-18T12:38:25.490000
|
||||
CVE-2024-26639,0,1,8a473c1426f4ebb022f445f83a8e03ee2f46b4cc924d5c9a8fc1fa54d3a5296a,2024-04-04T14:15:09.457000
|
||||
CVE-2024-26640,0,0,5cc6b5e042a5b441f74784080591c7d359381cd13aba12bdf63d6c89fc714c33,2024-03-18T12:38:25.490000
|
||||
CVE-2024-26641,0,0,d0ed2cdfb0ff7417cb869a8d4b0f844e96cb33626fa12ef7a8d145f64e7e59f2,2024-03-18T12:38:25.490000
|
||||
CVE-2024-26642,0,0,71e4095a03007036b330826bde9436c408f23f15e0193634b741c378a8da394c,2024-04-03T14:15:16.193000
|
||||
@ -242453,7 +242454,7 @@ CVE-2024-26674,0,0,f1d8576ca0aa47350de64417aeef31f1b238573e2983d0df225d9682a3d84
|
||||
CVE-2024-26675,0,0,18ad8d54c05969c4deea09aefa255ac7a86e9958e19c92f65fea4e21f81e5a90,2024-04-02T12:50:42.233000
|
||||
CVE-2024-26676,0,0,1d6462abc387a07745aa4cbe7883c8d5a9e7ba60d572c150c39ead906ad157a1,2024-04-02T12:50:42.233000
|
||||
CVE-2024-26677,0,0,6b321906db4a8761a068972f50c35aaee56cfe9a508eaeb0f87a01adffdeee4c,2024-04-02T12:50:42.233000
|
||||
CVE-2024-26678,0,0,abdc97cb73233f3d49313776841d2e196db31d1b7a473c5a8bcc2d45f0b5cde9,2024-04-02T12:50:42.233000
|
||||
CVE-2024-26678,0,1,9e85aecf537bdeaa0ac7cd8b6cd4c2c9592e9799efc1a2290261b5b48890a1ad,2024-04-04T14:15:09.513000
|
||||
CVE-2024-26679,0,0,6e5fcbfaaf09c0a754213ce2a73da4984a33e97ebf7103133863657d55ddb43a,2024-04-02T12:50:42.233000
|
||||
CVE-2024-2668,0,0,065c493b517e59849ed2486f7ad1101bb3635ec4ad63b4f971d9a8dd90681e75,2024-03-21T02:52:41.070000
|
||||
CVE-2024-26680,0,0,7cba00bff493eedad4949f635084d20f9b62c12fbba2060341caa87d798b6aa5,2024-04-02T12:50:42.233000
|
||||
@ -242489,7 +242490,7 @@ CVE-2024-26707,0,0,9650b72c12943ac9dda5b50b9465d848bed585b011864ef2d8088b24f0050
|
||||
CVE-2024-26708,0,0,e6af69e1905ef01174c9581974cf02e5b05260f374d30a7cbe6ad215c2d7c91d,2024-04-03T17:24:18.150000
|
||||
CVE-2024-26709,0,0,b7dc83267bc8120cae8e4018ae343f60acbb11003406a1af4ffe0a8120d3d5cf,2024-04-03T17:24:18.150000
|
||||
CVE-2024-2671,0,0,12681b3894e8a7ac67e2c46b5e4b5df4fe862a18c722ae3d2ad76a940bbe2e7e,2024-03-21T02:52:41.343000
|
||||
CVE-2024-26710,0,0,3e2ded4bb14136cde43f5ecb49656a8616e56f5bd0ddc34d7f05187d40fb5cbc,2024-04-03T17:24:18.150000
|
||||
CVE-2024-26710,0,1,624ad7622964afd92bf9b51288e15a955e72d8e157bb4a5ec8f8db8d9c842096,2024-04-04T14:15:09.567000
|
||||
CVE-2024-26711,0,0,fadef7be038b9d563927b4e17bd37038282607e2849ad59e9913848c82c6ae8c,2024-04-03T17:24:18.150000
|
||||
CVE-2024-26712,0,0,8416d6b85e454333a83f67f48afa2cc7b24b43f3de985520b66855ac67de80ac,2024-04-03T17:24:18.150000
|
||||
CVE-2024-26713,0,0,7135ed0b40058e7c07508aa855b1707b07d272a776a7213b6fd32d8f8a5a4e9e,2024-04-03T17:24:18.150000
|
||||
@ -242527,13 +242528,13 @@ CVE-2024-26741,0,0,b6846f2eb8e4ec61bc17162372d64c40658f76fe363d22840388a609ac7c2
|
||||
CVE-2024-26742,0,0,bb3c058ea4a330b7fd69229d328ad1d98b34cbfa137b51bde4d3d453e12ec68e,2024-04-03T17:24:18.150000
|
||||
CVE-2024-26743,0,0,6f9cd5ad76824694c268fc1ca50244aa1527177a938fd2925a9d9e64c07b8784,2024-04-03T17:24:18.150000
|
||||
CVE-2024-26744,0,0,973aff0596bde5edb769d9e03a3a3ba6f46c64909ba6a4b793ada4048fe2270a,2024-04-03T17:24:18.150000
|
||||
CVE-2024-26745,0,1,bde06c239b643c12009724fbedba489f3d067d6852908bc8bbf3a93e03405609,2024-04-04T12:48:41.700000
|
||||
CVE-2024-26746,0,1,0f812b115afde65d866688336e2685c564509503516491f4d93d2665b0ff0ccb,2024-04-04T12:48:41.700000
|
||||
CVE-2024-26745,0,0,bde06c239b643c12009724fbedba489f3d067d6852908bc8bbf3a93e03405609,2024-04-04T12:48:41.700000
|
||||
CVE-2024-26746,0,0,0f812b115afde65d866688336e2685c564509503516491f4d93d2665b0ff0ccb,2024-04-04T12:48:41.700000
|
||||
CVE-2024-26747,0,0,40cc0e87cff6d495aa444ab53805bdbecbdd44cbdcc49d92d54952f70cb8cce8,2024-04-03T17:24:18.150000
|
||||
CVE-2024-26748,0,0,2a11bbd005fa54586741565a1111d48a767d5de2bf0590723c01b6fff9b96a58,2024-04-03T17:24:18.150000
|
||||
CVE-2024-26749,0,0,a203e804e05bc7f795d30252eb7f94ea77c74ec5e8cf9604e0dd5c1e752c9305,2024-04-03T17:24:18.150000
|
||||
CVE-2024-2675,0,0,be24980f515f35692cef5ce9d8c8ed2c062b6e04a1ed19142e8d279d4035e8ec,2024-03-21T02:52:41.660000
|
||||
CVE-2024-26750,0,1,f7feb384f63691f674ccf24131c2b233f957cfc6d3d8d5a54f57b2aaea2aa3fb,2024-04-04T12:48:41.700000
|
||||
CVE-2024-26750,0,1,3ad9032a8dcc2c12bae07c66906c536cec1f6fe3c2f26f5b3f8e1ff3b7b673e6,2024-04-04T14:15:09.620000
|
||||
CVE-2024-26751,0,0,f4724937a1dd0ad7aae35b0de8bae0430f7e02378589604bad058934b22c5d1f,2024-04-03T17:24:18.150000
|
||||
CVE-2024-26752,0,0,db382e8ebf737bd07ce7b04ee460325d3120ac157e4a3bc0fa25db5d02042eee,2024-04-03T17:24:18.150000
|
||||
CVE-2024-26753,0,0,5ea269de011ddc747beeb3cc9a66f9e855ce5949843f88698449aa371d418923,2024-04-03T17:24:18.150000
|
||||
@ -242566,38 +242567,38 @@ CVE-2024-26777,0,0,d8cddd0630d712ce0b46dc322f1b63ff24c526bd61a9b25369efd1f0ff4fd
|
||||
CVE-2024-26778,0,0,d8db76ee4317a56d21afdb1ee67f1fba21509257b6d8bfce6746c3448ec1343e,2024-04-03T17:24:18.150000
|
||||
CVE-2024-26779,0,0,fae79b8e42a9dcd83ce47196c8171aa9f1d4d510f29b7fae8d481beef0c0b918,2024-04-03T17:24:18.150000
|
||||
CVE-2024-2678,0,0,afac28a70bd504f6525871485550b234c74e408671e55dc60be8b6505a3b4609,2024-03-21T02:52:41.900000
|
||||
CVE-2024-26780,0,1,c46b18ee2344da006fc7119118721a3b0849addc216e307e39fb0b50de0966ba,2024-04-04T12:48:41.700000
|
||||
CVE-2024-26781,0,1,feb2f650300f2292e51bae5a35d4bd88040aac93e193b1747efbde3fa2db2d3d,2024-04-04T12:48:41.700000
|
||||
CVE-2024-26782,0,1,1c1c0b0512809c94c8cfaa3dbdfa4e9cc050d6d725fff66bd58fd74cb6481aad,2024-04-04T12:48:41.700000
|
||||
CVE-2024-26783,0,1,c3368f83e609e2b1fa110d13e26498c71c3ad7173478512e05684cf8f883bc44,2024-04-04T12:48:41.700000
|
||||
CVE-2024-26784,0,1,4b9484f39e61843c63c93b31fca144d80929c0c8157339a482a73cd53047d5ad,2024-04-04T12:48:41.700000
|
||||
CVE-2024-26785,0,1,2988edbbd83cff12b70ef23725c33c9b5e58527892e800a1e3c1594d87a88675,2024-04-04T12:48:41.700000
|
||||
CVE-2024-26786,0,1,c260e2f9eabee140fd0591f9364544c76861353de2f5cde23a4ff914f5d4fc99,2024-04-04T12:48:41.700000
|
||||
CVE-2024-26787,0,1,798c4be9b72a16ce7d881a86b55209e4ce09a67a67422d11ce91dba977d39db0,2024-04-04T12:48:41.700000
|
||||
CVE-2024-26788,0,1,b9012816341c6229dc244df04c450c23b73757d6b8cf24246356325fe873a348,2024-04-04T12:48:41.700000
|
||||
CVE-2024-26789,0,1,e85db3c70ad29af3eea436c1d93128ee9ccf7c1800190868eebe9933317add14,2024-04-04T12:48:41.700000
|
||||
CVE-2024-26780,0,1,26469b52386a75cdc087db2c7bf5035d8ce0e34d93239bbadf0edba8abbe0539,2024-04-04T14:15:09.667000
|
||||
CVE-2024-26781,0,1,fd043565ef59721812537b4493b8ec886704ea130b32590aba5239e221bc8f04,2024-04-04T14:15:09.720000
|
||||
CVE-2024-26782,0,0,1c1c0b0512809c94c8cfaa3dbdfa4e9cc050d6d725fff66bd58fd74cb6481aad,2024-04-04T12:48:41.700000
|
||||
CVE-2024-26783,0,0,c3368f83e609e2b1fa110d13e26498c71c3ad7173478512e05684cf8f883bc44,2024-04-04T12:48:41.700000
|
||||
CVE-2024-26784,0,0,4b9484f39e61843c63c93b31fca144d80929c0c8157339a482a73cd53047d5ad,2024-04-04T12:48:41.700000
|
||||
CVE-2024-26785,0,0,2988edbbd83cff12b70ef23725c33c9b5e58527892e800a1e3c1594d87a88675,2024-04-04T12:48:41.700000
|
||||
CVE-2024-26786,0,0,c260e2f9eabee140fd0591f9364544c76861353de2f5cde23a4ff914f5d4fc99,2024-04-04T12:48:41.700000
|
||||
CVE-2024-26787,0,0,798c4be9b72a16ce7d881a86b55209e4ce09a67a67422d11ce91dba977d39db0,2024-04-04T12:48:41.700000
|
||||
CVE-2024-26788,0,0,b9012816341c6229dc244df04c450c23b73757d6b8cf24246356325fe873a348,2024-04-04T12:48:41.700000
|
||||
CVE-2024-26789,0,0,e85db3c70ad29af3eea436c1d93128ee9ccf7c1800190868eebe9933317add14,2024-04-04T12:48:41.700000
|
||||
CVE-2024-2679,0,0,644dd5af5230402a5979aba6bd37a9ee47d3d34df6a09c968327bbbf0b5ea588,2024-03-21T02:52:41.977000
|
||||
CVE-2024-26790,0,1,b455d5e5eb5fb045cb308e71920a866b5155e5032ad54342e9a3aeb04ac3871e,2024-04-04T12:48:41.700000
|
||||
CVE-2024-26791,0,1,6d90180f785f210b4fb847c9a4a88e76341666e57a40242be95e2ff5031ffc7f,2024-04-04T12:48:22.650000
|
||||
CVE-2024-26792,0,1,6979e29c5fa48bb6ba07ef74f9d7285d2e2064e5b16e1979771dff8ef0df2b41,2024-04-04T12:48:22.650000
|
||||
CVE-2024-26793,0,1,85c39ddf46daaeeb8cb7a8d85e13a2d1d680b812faad871bcbaf8953342cec80,2024-04-04T12:48:22.650000
|
||||
CVE-2024-26794,0,1,91092fe690b7303d3df01192615ca12ba69b741ee02d168f7ccfe8104e80ef76,2024-04-04T12:48:22.650000
|
||||
CVE-2024-26795,0,1,f23b2ce612c2b4f00bbeb37e57d38efd213964a823b5c9cbf54e9be718fd18a4,2024-04-04T12:48:22.650000
|
||||
CVE-2024-26796,0,1,a14495e11978a4a05ca7f5eadaf02a3c1e45646ef86ab369c4ab391551eb52df,2024-04-04T12:48:22.650000
|
||||
CVE-2024-26797,0,1,13cdc2b758328b5c5d42914541fe8abbd3d0b6042409e247576c9122bc667c68,2024-04-04T12:48:22.650000
|
||||
CVE-2024-26798,0,1,e0e4e5ca171e4137d98573298cd671be5437948ab06b6bdd8be7d8cbe5c70164,2024-04-04T12:48:22.650000
|
||||
CVE-2024-26799,0,1,7357b58c038ef8ada990c3f42b4ab996433379626bad09687367945d94d00c3a,2024-04-04T12:48:22.650000
|
||||
CVE-2024-26790,0,0,b455d5e5eb5fb045cb308e71920a866b5155e5032ad54342e9a3aeb04ac3871e,2024-04-04T12:48:41.700000
|
||||
CVE-2024-26791,0,0,6d90180f785f210b4fb847c9a4a88e76341666e57a40242be95e2ff5031ffc7f,2024-04-04T12:48:22.650000
|
||||
CVE-2024-26792,0,1,0f05abaffd747f89f31d05b432cdf0002465740345b0afc75274fe8a4e48dca9,2024-04-04T14:15:09.783000
|
||||
CVE-2024-26793,0,0,85c39ddf46daaeeb8cb7a8d85e13a2d1d680b812faad871bcbaf8953342cec80,2024-04-04T12:48:22.650000
|
||||
CVE-2024-26794,0,1,e5fe887cb45a5d9611983249bcf8c52d82cf748ccdda4afc7c1f81d124fa7b0d,2024-04-04T14:15:09.843000
|
||||
CVE-2024-26795,0,0,f23b2ce612c2b4f00bbeb37e57d38efd213964a823b5c9cbf54e9be718fd18a4,2024-04-04T12:48:22.650000
|
||||
CVE-2024-26796,0,0,a14495e11978a4a05ca7f5eadaf02a3c1e45646ef86ab369c4ab391551eb52df,2024-04-04T12:48:22.650000
|
||||
CVE-2024-26797,0,0,13cdc2b758328b5c5d42914541fe8abbd3d0b6042409e247576c9122bc667c68,2024-04-04T12:48:22.650000
|
||||
CVE-2024-26798,0,0,e0e4e5ca171e4137d98573298cd671be5437948ab06b6bdd8be7d8cbe5c70164,2024-04-04T12:48:22.650000
|
||||
CVE-2024-26799,0,0,7357b58c038ef8ada990c3f42b4ab996433379626bad09687367945d94d00c3a,2024-04-04T12:48:22.650000
|
||||
CVE-2024-2680,0,0,3bda94b4e4796d2b19241b15dc106e95b5f50bb0302bb6a03385a692cd78110d,2024-03-21T02:52:42.053000
|
||||
CVE-2024-26800,0,1,4b00f57f5a3b31eb29ad164156004b972377cd63bf01fa10ae7b79e1ac56f325,2024-04-04T12:48:22.650000
|
||||
CVE-2024-26801,0,1,2bfe81b79bf857ade95670b0a60cad9ac0dea28b7246998c21f6ec0f71f78c65,2024-04-04T12:48:22.650000
|
||||
CVE-2024-26802,0,1,d413a19fdc6e5c278a723eb4710d7df4a4a5faede85462986cb7886814a0729b,2024-04-04T12:48:22.650000
|
||||
CVE-2024-26803,0,1,43221037bc6d39fb61b4fb81b9e722d8423f51222d7c4b4c331667f10a058466,2024-04-04T12:48:22.650000
|
||||
CVE-2024-26804,0,1,b7b14115b43377930bf402a73591bfb05ae479788bc7c04015d23e985f3a787f,2024-04-04T12:48:22.650000
|
||||
CVE-2024-26805,0,1,2f0286260eb5a0a69d5354fbf5c37977504e38542da5cbcf93a3d8e6555cf0f1,2024-04-04T12:48:22.650000
|
||||
CVE-2024-26806,0,1,015091e390b260dd882093bed966879e94cc206771d1bfbc34aebfbaafa6ae89,2024-04-04T12:48:22.650000
|
||||
CVE-2024-26807,0,1,dd58971be5b2b7ae4d4d293dc140016766895ff28462656c96a25f4364a4b8be,2024-04-04T12:48:22.650000
|
||||
CVE-2024-26808,0,1,811c6dcfe9e097a1e05a422eed27dc92a175aa2bf6a558020423935445f2e0d3,2024-04-04T12:48:22.650000
|
||||
CVE-2024-26809,0,1,d8b70b9ed098155a50a0b82965aa5ef8be6d2e172d92379b17e564e5b8017a02,2024-04-04T12:48:22.650000
|
||||
CVE-2024-26800,0,1,54e02d6f6b7d571cfe9665127c265f10846193ee31defac81bb68c0ffeb905a9,2024-04-04T14:15:09.897000
|
||||
CVE-2024-26801,0,0,2bfe81b79bf857ade95670b0a60cad9ac0dea28b7246998c21f6ec0f71f78c65,2024-04-04T12:48:22.650000
|
||||
CVE-2024-26802,0,0,d413a19fdc6e5c278a723eb4710d7df4a4a5faede85462986cb7886814a0729b,2024-04-04T12:48:22.650000
|
||||
CVE-2024-26803,0,0,43221037bc6d39fb61b4fb81b9e722d8423f51222d7c4b4c331667f10a058466,2024-04-04T12:48:22.650000
|
||||
CVE-2024-26804,0,0,b7b14115b43377930bf402a73591bfb05ae479788bc7c04015d23e985f3a787f,2024-04-04T12:48:22.650000
|
||||
CVE-2024-26805,0,0,2f0286260eb5a0a69d5354fbf5c37977504e38542da5cbcf93a3d8e6555cf0f1,2024-04-04T12:48:22.650000
|
||||
CVE-2024-26806,0,0,015091e390b260dd882093bed966879e94cc206771d1bfbc34aebfbaafa6ae89,2024-04-04T12:48:22.650000
|
||||
CVE-2024-26807,0,0,dd58971be5b2b7ae4d4d293dc140016766895ff28462656c96a25f4364a4b8be,2024-04-04T12:48:22.650000
|
||||
CVE-2024-26808,0,0,811c6dcfe9e097a1e05a422eed27dc92a175aa2bf6a558020423935445f2e0d3,2024-04-04T12:48:22.650000
|
||||
CVE-2024-26809,0,0,d8b70b9ed098155a50a0b82965aa5ef8be6d2e172d92379b17e564e5b8017a02,2024-04-04T12:48:22.650000
|
||||
CVE-2024-2681,0,0,211b9a75c4368c46da39324b5885baab82086ddd4b191379e2bc3298587cc094,2024-03-21T02:52:42.143000
|
||||
CVE-2024-2682,0,0,a085f90f84cb4770a2a70d67fe3862306cc151ef177a765e07fccc3d6343039b,2024-03-21T02:52:42.233000
|
||||
CVE-2024-2683,0,0,788c441aaf8a379a9ab516c0ce7daee2808d93b02ac7acef8c96a67609395231,2024-03-21T02:52:42.310000
|
||||
@ -242606,9 +242607,10 @@ CVE-2024-2685,0,0,a3dab6ab025df3e9c728cf5d374d782ef5be108dbae89ce6618f43a3c410e3
|
||||
CVE-2024-2686,0,0,c1fa883b96be9cb570cb0ee9d7301fe6ec5d659cae2d916ad2d9229c4578917a,2024-03-21T02:52:42.573000
|
||||
CVE-2024-2687,0,0,4b25e5b6e72bb600e5ca56962e068f43d8fdded0651975a52d3d834c7eda69db,2024-03-21T02:52:42.640000
|
||||
CVE-2024-2688,0,0,4d2ee00fbdc8f698cfa2b48095538092c3008625057bbba0ed83fe0f8586af11,2024-03-25T01:51:01.223000
|
||||
CVE-2024-2689,0,1,d68b7b531c01d5a09731b87208da9eaed121f0d7bd207947a3e9e0d6d073f7a7,2024-04-04T12:48:41.700000
|
||||
CVE-2024-2689,0,0,d68b7b531c01d5a09731b87208da9eaed121f0d7bd207947a3e9e0d6d073f7a7,2024-04-04T12:48:41.700000
|
||||
CVE-2024-2690,0,0,f6a4a686af3b1a0dbb43401fa520f310f97d65bad6a1a622e4cf5a92050e1908,2024-03-21T02:52:42.713000
|
||||
CVE-2024-2692,0,1,660d169004889e7c431a6c456c160dc20b422f7884af25c1cfc8f41c46614653,2024-04-04T12:48:41.700000
|
||||
CVE-2024-2692,0,0,660d169004889e7c431a6c456c160dc20b422f7884af25c1cfc8f41c46614653,2024-04-04T12:48:41.700000
|
||||
CVE-2024-2700,1,1,ca3ec2e00ef25b9e063b22d8a0e90976660b3ac82176b2ae8aa9b3dce0e46b8b,2024-04-04T14:15:09.950000
|
||||
CVE-2024-2702,0,0,d714950951d2438da53d97b453b8470335efdb106b4a3aaafe4c816e98d263df,2024-03-20T13:00:16.367000
|
||||
CVE-2024-2703,0,0,fd6779f190b7c18473d13c554bb5288a6054f6758f3d10ae2c808243fc33b267,2024-03-21T02:52:42.793000
|
||||
CVE-2024-2704,0,0,38bb2a044cf63b67539a331392299607bb3a2b2771fa1af46bd272846fa4ca05,2024-03-21T02:52:42.870000
|
||||
@ -242792,7 +242794,7 @@ CVE-2024-27515,0,0,f99f7250526320b1e7250419a5b3dff4ee674d7e75fbaa06a1a665327078f
|
||||
CVE-2024-27516,0,0,bc77d943dca3237cfc969969b912fe04cfc9a7bb141bbb351e6e03a84319d787,2024-03-22T03:15:07.923000
|
||||
CVE-2024-27517,0,0,eaf81e12deb64dd8d1b2d24380f4196dfb242fbf2c45d957e1074397f4677a35,2024-02-29T13:49:29.390000
|
||||
CVE-2024-27521,0,0,f5039108c28b59bf0b0a7fe798c8a809f06b9887222e13bb1b219a0b778b31fd,2024-03-27T12:29:30.307000
|
||||
CVE-2024-2753,0,1,c94343bc26ecedb8097ab8d0a8a522720991033015dc323edc77ac571718fc09,2024-04-04T12:48:41.700000
|
||||
CVE-2024-2753,0,0,c94343bc26ecedb8097ab8d0a8a522720991033015dc323edc77ac571718fc09,2024-04-04T12:48:41.700000
|
||||
CVE-2024-2754,0,0,e0efe29ab80af1481d57a051cff98e59e0aa196f8f253f3968470bd489f9c9ed,2024-03-21T12:58:51.093000
|
||||
CVE-2024-27558,0,0,7153680518d63c7932305620ccfbd7ee5fef9d259b5e0f563f6375bef36d085e,2024-03-01T22:22:25.913000
|
||||
CVE-2024-27559,0,0,df9ea8940256beed3a439c54dc14f3a2ff3269b9257ecf55b0d7cb1c085a0238,2024-03-01T22:22:25.913000
|
||||
@ -242806,8 +242808,9 @@ CVE-2024-27569,0,0,000ff88e8ff4678a3790d0ee96674581a9a53afd1b5f0d49033b717c5dd65
|
||||
CVE-2024-27570,0,0,30e1bdadd931878127199d0565523cd94923921178695ba62d569ae38e48386b,2024-03-01T15:23:36.177000
|
||||
CVE-2024-27571,0,0,2fcce61cb867ec2a650e4bd74e7018e990625a473882c12953648f5c8c2545b3,2024-03-01T15:23:36.177000
|
||||
CVE-2024-27572,0,0,6169a6a6221da5c6dbb1556f7b45e6b45c4deebae5e21607b1e3cfa478f1fe5b,2024-03-01T15:23:36.177000
|
||||
CVE-2024-27575,1,1,4e70e381ffb7a463244d0a69a4c0c98fb9daddf60d5feff2bdc7396105ee923b,2024-04-04T13:15:44.620000
|
||||
CVE-2024-2758,0,1,a3cb437eedb439caebfac4666310f05bccf69de779d818f9f315740c92bee7d8,2024-04-04T12:48:41.700000
|
||||
CVE-2024-27575,0,0,4e70e381ffb7a463244d0a69a4c0c98fb9daddf60d5feff2bdc7396105ee923b,2024-04-04T13:15:44.620000
|
||||
CVE-2024-2758,0,0,a3cb437eedb439caebfac4666310f05bccf69de779d818f9f315740c92bee7d8,2024-04-04T12:48:41.700000
|
||||
CVE-2024-2759,1,1,90fbe716f299f4fbd5759a9bc1644155ced8afbac3ce65b2bfac56674677197d,2024-04-04T14:15:10.220000
|
||||
CVE-2024-27602,0,0,641d004f193cbc187bf560868353a5607871444565457a2a1f222c57bafe0082,2024-04-03T12:38:04.840000
|
||||
CVE-2024-27604,0,0,5dd90a20288c95f7805059ddcbf501c6de9e3b933a16f752b43bf101ed5f2058,2024-04-03T12:38:04.840000
|
||||
CVE-2024-27605,0,0,4f744199930e3e7e9b7f220c4e73a81bb4fe207bf4ecc2f618ea8f6d8437d165,2024-04-03T12:38:04.840000
|
||||
@ -242845,8 +242848,8 @@ CVE-2024-27694,0,0,337bba4e5d554106e2b9900a8719d5c2934a510e55461e4603b4a11bd3f65
|
||||
CVE-2024-27698,0,0,ac54888b0a03034871f07f7d36cab166990ef3007932a85c3ddd7d9b6a6ab747,2024-03-09T23:15:49.403000
|
||||
CVE-2024-2770,0,0,91ce0539e2b4c2c9bcbf359ca33c6a5a73fe7b14a0f0e721ae6fc81b19b90cfb,2024-03-22T12:45:36.130000
|
||||
CVE-2024-27703,0,0,2b79380c63baf4bc3c9abfadfdc13a8325f8dae30b340951dc89a1b9f1e8f730,2024-03-14T12:52:16.723000
|
||||
CVE-2024-27705,0,1,dd560c2581e4a035c24a9470808e6fbb1535f745a23ceaeef860c1754350477b,2024-04-04T12:48:41.700000
|
||||
CVE-2024-27706,0,1,c91aee23aaa0ed501da15123d608c9d5855bcbcff43faab8a1a227af822acd84,2024-04-04T12:48:41.700000
|
||||
CVE-2024-27705,0,0,dd560c2581e4a035c24a9470808e6fbb1535f745a23ceaeef860c1754350477b,2024-04-04T12:48:41.700000
|
||||
CVE-2024-27706,0,0,c91aee23aaa0ed501da15123d608c9d5855bcbcff43faab8a1a227af822acd84,2024-04-04T12:48:41.700000
|
||||
CVE-2024-27707,0,0,bd4780ccfe95d75b10e00a8c73b93480b3348a16006d364b38b5efca7ebc67cb,2024-03-08T14:02:57.420000
|
||||
CVE-2024-27718,0,0,55b4fe5eceb765847e8b5fde530c7383b01c4bd9d6322c23b03086464d536a04,2024-03-05T13:41:01.900000
|
||||
CVE-2024-27719,0,0,af4ad9f7aa618fdf95594199c2170305427044874004c69062178d9da2af7882,2024-03-28T20:53:20.813000
|
||||
@ -242893,6 +242896,7 @@ CVE-2024-27915,0,0,d4924e50464aaf41d040242348770ffaf78a24dc54a27fd2fcc5b39d7ef4b
|
||||
CVE-2024-27916,0,0,30309d15585040a1c780d50028da0fe5d532a005ec1e4063d6e9bd12c08015c3,2024-03-21T12:58:51.093000
|
||||
CVE-2024-27917,0,0,349e8713d3d51447d52ce46614a2423fd24b4f2ec4e67177c8153367d08f6965,2024-03-06T21:42:48.053000
|
||||
CVE-2024-27918,0,0,868a3b37587ecdd76b3199c3c20731cf2122d7105cc897cc5b148ffb34fda1e3,2024-03-21T12:58:51.093000
|
||||
CVE-2024-27919,1,1,1ce37af32dd8825d8a120ac916ec5bddf8d4368db95b3fb53fcba94eade54203,2024-04-04T15:15:38.207000
|
||||
CVE-2024-27920,0,0,6ec71d20fda95aa314ebea84a76f86288fcc504f03e06de62bc6de74b1a250f7,2024-03-17T22:38:29.433000
|
||||
CVE-2024-27921,0,0,1c81355f605d7298cbc75753b2712a3de8e2ce04eb2251f7609b0efa7c732356,2024-03-22T12:45:36.130000
|
||||
CVE-2024-27922,0,0,d4151c4624aa3c19b5b11148e00e8a5f65dabdc6cd9b3e028f1e466040d02b72,2024-03-21T12:58:51.093000
|
||||
@ -242956,7 +242960,7 @@ CVE-2024-28015,0,0,c36a569e47a8cc25a559aa19a480d47088d8456072eb6e8c9e0575d3988b3
|
||||
CVE-2024-28016,0,0,fe85c1f239b1cebe9726ce271c3f5722bfdbb4bcff9b0aba329f58c6fcbf12b8,2024-04-02T06:15:15.603000
|
||||
CVE-2024-2802,0,0,3b7ed9aefbc68681b0633b6ab16c0b3db6db844ee4c655f6c7e6863ac6e1f543,2024-03-26T15:15:49.677000
|
||||
CVE-2024-28029,0,0,ccc7402fca90b7f3950f1059a1d69e89046b1f9e52fa792eb9ddd9a398189f20,2024-03-25T16:06:44.403000
|
||||
CVE-2024-2803,0,1,d984a6fa3b3b9da3550e61a858770d2b2ce33ddc2cd45feb1aca4e387a664757,2024-04-04T12:48:41.700000
|
||||
CVE-2024-2803,0,0,d984a6fa3b3b9da3550e61a858770d2b2ce33ddc2cd45feb1aca4e387a664757,2024-04-04T12:48:41.700000
|
||||
CVE-2024-28033,0,0,d380f707343e80ca8a48383d7130e8455ae81fc182e0d67c36374f1eb571652f,2024-03-26T12:55:05.010000
|
||||
CVE-2024-28034,0,0,59f37b2f71aecfc048b35bdfeca5cf2bf5792e3fd57d1b0f3eaa95911ebef442,2024-03-26T12:55:05.010000
|
||||
CVE-2024-28039,0,0,9ef35c96ff38e007b2fd4f37c3f1f5b6d35461c4eaa69f2b36faccd438b26411,2024-03-18T12:38:25.490000
|
||||
@ -243043,6 +243047,7 @@ CVE-2024-28179,0,0,ef6ae2036e6544bf5151cf60e7ee1d4ce9fa0e57ac3f9b1135a092fce4db6
|
||||
CVE-2024-2818,0,0,aea687083c16896170a5552b37f956b1670d4afc51a0429ca79d8567da16c99d,2024-03-28T12:42:56.150000
|
||||
CVE-2024-28180,0,0,70b7e15bae54b0026dbd7121b8d49cac4933c8976161f82f27967c15e8313bd2,2024-03-31T03:15:07.680000
|
||||
CVE-2024-28181,0,0,6fe6fc40aea923ab45a31104eec21bd5517ea3b5ecb606b759ae10c9ef55df1d,2024-03-14T20:11:36.180000
|
||||
CVE-2024-28182,1,1,773763954187ebd85e3bc7cde0e2f9cd46c740576689569a36cced05b0b3cccc,2024-04-04T15:15:38.427000
|
||||
CVE-2024-28183,0,0,643292dec7e2c62a314435936df2f6b3b26afeacc823e8335f2b17ff913aa8e1,2024-03-25T16:43:06.137000
|
||||
CVE-2024-28184,0,0,477afbf0dc7ee8d9429045c75878ff2a88abaa5598b6ce7fba2a5f1850b6b613,2024-03-23T03:15:11.827000
|
||||
CVE-2024-28186,0,0,bd19020fb98c7e49f4ae9534406a8116ce29f7f2cd9253fb5db74e8880c2331b,2024-03-13T12:33:51.697000
|
||||
@ -243102,7 +243107,7 @@ CVE-2024-28283,0,0,268ce493b20c7a589a5e50c22f5ba70e4448bc55aa5cacedfa25c50cee9c0
|
||||
CVE-2024-28286,0,0,7b760a4769f45c40990c61b4c6dca958dc26708f19d30b01bb3a34dbec61c15d,2024-03-21T12:58:51.093000
|
||||
CVE-2024-28287,0,0,f3e972680aaba746036e0c18fb52d806a7d00f059e355ec696b64bf775ceea80,2024-04-02T18:12:16.283000
|
||||
CVE-2024-28288,0,0,a02e3d9826d4212dd14a4181934d81e2a653b8135d5e48cc021c9f921b853477,2024-04-01T01:12:59.077000
|
||||
CVE-2024-2830,0,1,9f70ab9fe017dd5a3d4af5ab7aabfab89e0dbf7fdb0f077e24be797060df0b8d,2024-04-04T12:48:41.700000
|
||||
CVE-2024-2830,0,0,9f70ab9fe017dd5a3d4af5ab7aabfab89e0dbf7fdb0f077e24be797060df0b8d,2024-04-04T12:48:41.700000
|
||||
CVE-2024-28303,0,0,32d4865094af329a688db1798283b86ca81a4a5fae30846af22292284fa8cb98,2024-03-20T13:00:16.367000
|
||||
CVE-2024-28318,0,0,ede034690df957e6783d45bfb66a16f12d36f93dac03aab57e77aeedfffbbc90,2024-03-15T16:26:49.320000
|
||||
CVE-2024-28319,0,0,26fe071877c361c1420da78d668cd8bd73e607c2889fe07f596425c3f0efcaf7,2024-03-15T16:26:49.320000
|
||||
@ -243157,7 +243162,7 @@ CVE-2024-2850,0,0,18a7df7924646d54c8018dc44d3ceaaa7b16c75f99276cbe6ac98b765122f7
|
||||
CVE-2024-2851,0,0,9a668cf4331e419a65111b1e6f8abf3e27bc0fce212b623cd8a47fdd549e170b,2024-03-26T03:15:36.833000
|
||||
CVE-2024-28515,0,0,a2f38351769a80f01f300fd8c83038fe9060fc0b0320f8b6c711930dd11ec84b,2024-04-03T12:38:04.840000
|
||||
CVE-2024-2852,0,0,d7c0051b0398ed6771fdd69c5942366e1b233545fdf7340abf88db5b663c134a,2024-03-26T03:15:47.310000
|
||||
CVE-2024-28520,0,1,b69e5fdca426c11674cfd907b7f56ab49d9fb5da6f91b25afeed2561042d05b7,2024-04-04T12:48:41.700000
|
||||
CVE-2024-28520,0,0,b69e5fdca426c11674cfd907b7f56ab49d9fb5da6f91b25afeed2561042d05b7,2024-04-04T12:48:41.700000
|
||||
CVE-2024-28521,0,0,8ab5b6bd1cc025dda03cab07eeddd7e1f81756c34e55025f1870bf6a0feb8a5b,2024-03-22T12:45:36.130000
|
||||
CVE-2024-2853,0,0,e510059736f729514b8634c28eabbedda89b99502b90c04b4a57c0f56252c1ab,2024-03-26T03:15:50.793000
|
||||
CVE-2024-28535,0,0,174c70ce71a26af929a40c7b6a103a5242ac3321f34f35a982d598e918b67152,2024-03-21T20:58:46.217000
|
||||
@ -243221,7 +243226,7 @@ CVE-2024-28676,0,0,bc0fecbb769931e5e2275fcf2d85845284a073e1ecc611ddf2de03a2f711d
|
||||
CVE-2024-28677,0,0,10f6024cd4b0a6d1867fe18b27bd0773774e89b4fcacb26e5515ed012d8e55db,2024-03-13T18:15:58.530000
|
||||
CVE-2024-28678,0,0,adf9d290233aa8fea0215cac4f018014b89be6568113a9d74efe211f7585b77a,2024-03-13T18:15:58.530000
|
||||
CVE-2024-28679,0,0,6337091145d29302c08a6a916805301d19f9c559d1d5606dbb2c61b32d59a73f,2024-03-13T18:15:58.530000
|
||||
CVE-2024-2868,0,1,12e61ec71d931d5a93151a0212f436f18b0dcca7ac64a8b5064856e38266439f,2024-04-04T12:48:41.700000
|
||||
CVE-2024-2868,0,0,12e61ec71d931d5a93151a0212f436f18b0dcca7ac64a8b5064856e38266439f,2024-04-04T12:48:41.700000
|
||||
CVE-2024-28680,0,0,0cab973662fcf30b5ba162a99137012514e3d62337fd89302e2f4447fa630c85,2024-03-13T18:15:58.530000
|
||||
CVE-2024-28681,0,0,ab17b4fa17ebf8eb3957de6dd91fe40414f05e3821f3c9e15b7d517b0542f62d,2024-03-13T18:15:58.530000
|
||||
CVE-2024-28682,0,0,5152c6a3d71ef9256a4c100c1d46f03254aeda535ba4c982fc323d50132c0ded,2024-03-13T18:15:58.530000
|
||||
@ -243273,7 +243278,8 @@ CVE-2024-28865,0,0,346bb195552b29118071ab302fbe331daaaa3a5da7b31ab976886613f922d
|
||||
CVE-2024-28867,0,0,a2663eb7659e9fb153cbffc3c6774d69ca0c4039f52756d8a5671465d9404705,2024-04-01T01:12:59.077000
|
||||
CVE-2024-28868,0,0,148f39496eb50fd19cf01404a0af3408bd44ce8d437a837fa99cdad3557f99f1,2024-03-21T12:58:51.093000
|
||||
CVE-2024-2887,0,0,2797f3580910b2ccb8b3f25b6a77410f5acecf7fa931702ac72d99637f4042cf,2024-03-29T04:15:09.423000
|
||||
CVE-2024-28870,0,1,0218e17e953f8b975dc3f30c4adbdf5a9fc1b6f636c9abfde4e0fccef897ce50,2024-04-04T12:48:41.700000
|
||||
CVE-2024-28870,0,0,0218e17e953f8b975dc3f30c4adbdf5a9fc1b6f636c9abfde4e0fccef897ce50,2024-04-04T12:48:41.700000
|
||||
CVE-2024-28871,1,1,3f3fac5b348ed433dec2f3cc49be98d7b7023588bd0e894fc7eefa3a97371f53,2024-04-04T15:15:38.647000
|
||||
CVE-2024-2888,0,0,e48cc71bf8d96ab718c88bf59dd81f25047204b13c0446dd48014e6c60fc42d9,2024-03-26T12:55:05.010000
|
||||
CVE-2024-2889,0,0,047900621574a9797901d8767443e859750a2765d7b4c1f50c805ec45928b2d3,2024-03-26T12:55:05.010000
|
||||
CVE-2024-28891,0,0,d3e45bd47b45b967827b685dc5aca79c502a599b4c4b2ae06f1259844016862c,2024-03-22T12:45:36.130000
|
||||
@ -243292,9 +243298,9 @@ CVE-2024-2897,0,0,cdab62bf1b04e238f5f36f7ed6c1e4a138154f6ba6a88d08f481df6c3fda5e
|
||||
CVE-2024-2898,0,0,78ebf2e2a100321b81c41ea07896970cf0c2c7ab7889400799c57d9fa953de0d,2024-03-27T12:29:41.530000
|
||||
CVE-2024-2899,0,0,8b024ec6199228c1072694eb16cd6765a238b8ffb99c8ec5655ed42f459ad5c4,2024-03-27T12:29:41.530000
|
||||
CVE-2024-2900,0,0,926e6d11e23a1e49611c31d714944f81498142898a655a617a9c4bad982f83e1,2024-03-27T12:29:30.307000
|
||||
CVE-2024-29006,0,1,e7e0770afca1c90b5f322599cd3bf65d9f1f7429dacfaee9550bae14554fba9c,2024-04-04T12:48:41.700000
|
||||
CVE-2024-29007,0,1,2977ba40a330e0e1bf36e50b94a559d31ddee6db61809ea9595362be8fcad9f1,2024-04-04T12:48:41.700000
|
||||
CVE-2024-29008,0,1,f4b4988abaf32ec10430489b71410de93bdf0e8668cd0e716582e7cbecc12365,2024-04-04T12:48:41.700000
|
||||
CVE-2024-29006,0,0,e7e0770afca1c90b5f322599cd3bf65d9f1f7429dacfaee9550bae14554fba9c,2024-04-04T12:48:41.700000
|
||||
CVE-2024-29007,0,0,2977ba40a330e0e1bf36e50b94a559d31ddee6db61809ea9595362be8fcad9f1,2024-04-04T12:48:41.700000
|
||||
CVE-2024-29008,0,0,f4b4988abaf32ec10430489b71410de93bdf0e8668cd0e716582e7cbecc12365,2024-04-04T12:48:41.700000
|
||||
CVE-2024-29009,0,0,e428945e790b35d2116d11f320908f919961bf6f75e41d300d21cf55f5bcc19c,2024-03-25T13:47:14.087000
|
||||
CVE-2024-2901,0,0,4ce42ad35d246055c851fa184fc3a05d14ba14d13c0a04c62c836ec7f0a01b29,2024-03-27T12:29:30.307000
|
||||
CVE-2024-29018,0,0,a31ea156ee4a30b6d7535cfe30928ed9f90e655143b9cf9c902aa0e59ea88865,2024-03-21T12:58:51.093000
|
||||
@ -243380,18 +243386,20 @@ CVE-2024-29151,0,0,ef852a662e1eaee7e15d971ee7451f2c3e954b3d808a30cb9a36bbe68bb24
|
||||
CVE-2024-29154,0,0,dab131c9ff393e828252009730d8617a5e1a4fb5cfb7f2db054056bc6f27c2ba,2024-03-18T12:38:25.490000
|
||||
CVE-2024-29156,0,0,98cbc37d07cb77607ab83580cc50ba5a01141613b7a3bb770966a3d6831e2326,2024-03-18T12:38:25.490000
|
||||
CVE-2024-2916,0,0,6871ce1ac12c0adda9a1495db174447a7645b0f8622337f63e4d979317d65207,2024-03-27T12:29:30.307000
|
||||
CVE-2024-29167,0,1,8910806bdade45cef2fce699101812e1f9a03ed00dfae9222ae416da2484dad3,2024-04-04T12:48:41.700000
|
||||
CVE-2024-29167,0,0,8910806bdade45cef2fce699101812e1f9a03ed00dfae9222ae416da2484dad3,2024-04-04T12:48:41.700000
|
||||
CVE-2024-2917,0,0,cc7c53d7d6aa23ee02922950dbfd98ec950f87014b4781a546614dff66bfbad3,2024-03-27T12:29:30.307000
|
||||
CVE-2024-29179,0,0,f19d4d0a9f8b6dc85e6e021ab22950c73dd30b1b16e940f3cfc8d8b6deab42d4,2024-03-26T12:55:05.010000
|
||||
CVE-2024-29180,0,0,41debf5c02b25447b090e1fe17310ae2918a3e33749dbf7033ce058b1311f912,2024-03-21T19:47:03.943000
|
||||
CVE-2024-29182,1,1,cf1cc30756644bedd0752df2b4b9ffecec585af1832ea463b0ae2f788dfff9b8,2024-04-04T15:15:38.847000
|
||||
CVE-2024-29184,0,0,5d28e98e710e6ef5aa032fbd7c50016a2d314d8a7140355939fc7fee0918ef2b,2024-03-22T19:02:10.300000
|
||||
CVE-2024-29185,0,0,af76e58a10ef101eddf2c72b8d4ca18e1b3c4eb9c909bcbbf88ec5dc39d99611,2024-03-22T19:02:10.300000
|
||||
CVE-2024-29186,0,0,9eae16b82ad0960a39bab28b7331d7fbcb06214ff5e685dffe5ebccb6351d6ff,2024-03-22T19:02:10.300000
|
||||
CVE-2024-29187,0,0,e759748c9eddb6fb94f310b6fbfd0a60978fe40972c402d0d57e603137386e75,2024-03-25T01:51:01.223000
|
||||
CVE-2024-29188,0,0,936a9c226ba5e7f9ce4bf09d536924cb3ac611efe865e82a6596de0401a89ca0,2024-03-25T01:51:01.223000
|
||||
CVE-2024-29189,0,0,6878e9b35a058677d2a3fa4fc5bfa3461c367e63050b0e9c52331e170e2ec716,2024-03-26T12:55:05.010000
|
||||
CVE-2024-2919,0,1,ad29039fe5d98450d154c2c80fbb9aad5b98a74f540bc7db235562b88e4d3a67,2024-04-04T12:48:41.700000
|
||||
CVE-2024-2919,0,0,ad29039fe5d98450d154c2c80fbb9aad5b98a74f540bc7db235562b88e4d3a67,2024-04-04T12:48:41.700000
|
||||
CVE-2024-29190,0,0,dd993808aabbfadd07f226263f194d2c29a65f1d0e197a65068c6fa33a34d2ff,2024-03-25T01:51:01.223000
|
||||
CVE-2024-29191,1,1,ffb331cb5cf69edd88f09bf0c673564b6bc3d57f3344c4dc16b2b89413cc682a,2024-04-04T15:15:39.043000
|
||||
CVE-2024-29194,0,0,36d512805bdd559b5aed44ab66b4d59462ade6a55a42ec032a28e1189fcb28c5,2024-03-25T01:51:01.223000
|
||||
CVE-2024-29195,0,0,12b6fcead703f320c2faaa3dbf933701901e834c51cbd479cd70a3447afc3114,2024-03-26T12:55:05.010000
|
||||
CVE-2024-29196,0,0,e02aa4919ed0d6b8af5e1fbc5257465a64fdae2f23d9b9aaabfbc3da2c0d39fa,2024-03-26T12:55:05.010000
|
||||
@ -243403,7 +243411,7 @@ CVE-2024-29202,0,0,2407457fd23b926dc515687b0bc64391303eb3a1899c8635138115822d248
|
||||
CVE-2024-29203,0,0,132c3d83e906b655066bee1fc4d3f90e18def73beb9178e8cc6662be34f71a9c,2024-03-26T17:09:53.043000
|
||||
CVE-2024-2921,0,0,c022f783cf261e367ca963516715cb4a81bead64a9c47249d0bf651e034f5912,2024-03-26T17:09:53.043000
|
||||
CVE-2024-29216,0,0,59c06798795d05e391cdd301154441d31362295e800c3b46a2b7bd83a3e2dbc0,2024-03-25T13:47:14.087000
|
||||
CVE-2024-29225,0,1,ebfd9b0992193d61aef178f6206711ffe8f1fc7ffd12fdaca779e58e62421cb3,2024-04-04T12:48:41.700000
|
||||
CVE-2024-29225,0,0,ebfd9b0992193d61aef178f6206711ffe8f1fc7ffd12fdaca779e58e62421cb3,2024-04-04T12:48:41.700000
|
||||
CVE-2024-29227,0,0,f6ae69390655a5f3b8c2022246ade0c8e664001b7471a757ba66feb751afa8e1,2024-03-28T12:42:56.150000
|
||||
CVE-2024-29228,0,0,c25efa24257cb2397a0d93759c26652d6dbbd7283b577526be7a83acca6ea890,2024-03-28T12:42:56.150000
|
||||
CVE-2024-29229,0,0,8be3f2c96b4dbb47da984816b72e6966c3ed648527b3386432bf980d6df5455a,2024-03-28T12:42:56.150000
|
||||
@ -243444,14 +243452,14 @@ CVE-2024-2935,0,0,9598fcd68e01ecba7444a707189fa4b4b4ef241167bfeef7a3068949307f2a
|
||||
CVE-2024-2936,0,0,939d0b63a99773a9af28992aa96fda3d6af92afdee01445b26fbf5b1e7eb245c,2024-03-29T12:45:02.937000
|
||||
CVE-2024-29366,0,0,7401048215b84763b7b2374bbab17e21709c21accf205850b7210511d30d6293,2024-03-22T19:02:10.300000
|
||||
CVE-2024-29374,0,0,dd275404ab360479a756d96aca2b6517b11bd3239b0ee4b1b68a18e9bbec3822,2024-03-21T19:47:03.943000
|
||||
CVE-2024-29375,0,1,38d62c5a230a5d1d6e302dab1df6776e74059ff78e9ec6d309012755deaa55f1,2024-04-04T12:48:41.700000
|
||||
CVE-2024-29375,0,0,38d62c5a230a5d1d6e302dab1df6776e74059ff78e9ec6d309012755deaa55f1,2024-04-04T12:48:41.700000
|
||||
CVE-2024-2938,0,0,74cee8ddd44bab6f9e56f6f66215742d85b488aeba84c862b69365829e2e81e5,2024-03-27T12:29:30.307000
|
||||
CVE-2024-29385,0,0,8759a5732499ce248301d7321fb10ac2a0ff45ccfb82ec638dc2ec07b266090d,2024-03-22T19:02:10.300000
|
||||
CVE-2024-2939,0,0,da1b78713b2ffab9e788aedae3466ad09fc771d3ff8f225a843c9a7dc25c77cd,2024-03-27T12:29:30.307000
|
||||
CVE-2024-2940,0,0,1b204d3a7a2103faf20c302c00f4324f89ed0d30301919cb0f9e11008a4cbcf9,2024-03-27T12:29:30.307000
|
||||
CVE-2024-29401,0,0,679ee7eb07f94632974ee3a3d5e9f1f36658f780199e198816f5b2401b4eaa19,2024-03-26T17:09:53.043000
|
||||
CVE-2024-2941,0,0,ce11630a400956dcbfeeac55ad32861fc5176b2eeccb4990e4aaf30900f5cbe5,2024-03-27T12:29:30.307000
|
||||
CVE-2024-29413,0,1,bff398cccc164d2dec499fba83a7baf90c736a8e316bc8056353a7334e8d8d60,2024-04-04T12:48:41.700000
|
||||
CVE-2024-29413,0,0,bff398cccc164d2dec499fba83a7baf90c736a8e316bc8056353a7334e8d8d60,2024-04-04T12:48:41.700000
|
||||
CVE-2024-29419,0,0,2f1c2a30167616ce2f7264d13a2e39c4e307caf2a0fab8a1d39f77c0f2b7d31b,2024-03-20T17:18:21.343000
|
||||
CVE-2024-2942,0,0,3fa2fdee1f7a471c21b1ac1386874f056fa7e82fdcd541072fb7ea8f5bfccb08,2024-03-27T12:29:30.307000
|
||||
CVE-2024-2943,0,0,b5b95bbcb0b53766ee2bd76974e535abb9029181348d10726e03c7804fb75e95,2024-03-27T12:29:30.307000
|
||||
@ -243692,7 +243700,7 @@ CVE-2024-30202,0,0,31db9c331e53ee7e35e14a4f4da9c9118966173e7dfd1773c267c14439e4d
|
||||
CVE-2024-30203,0,0,444aebb38c12835907cb7a31abaa6167c0351378679f511812ede323236ede80,2024-03-25T16:43:06.137000
|
||||
CVE-2024-30204,0,0,036541cdb0b2547c6a0b159ebcde955e789df823270814d2ecf5a2ea473b3058,2024-03-25T16:43:06.137000
|
||||
CVE-2024-30205,0,0,49c6abb5e041dbd344a1c2878ff4314f11b475ed55487542fa5ade5e7cd812b8,2024-03-25T16:43:06.137000
|
||||
CVE-2024-3022,0,1,2352b4f4801963d3d464b6a17433eca21b1c1ea72b383a127027e6bb6150e062,2024-04-04T12:48:41.700000
|
||||
CVE-2024-3022,0,0,2352b4f4801963d3d464b6a17433eca21b1c1ea72b383a127027e6bb6150e062,2024-04-04T12:48:41.700000
|
||||
CVE-2024-30221,0,0,8c33faec8eecbd1bc4775ea7d226df03d8dec1186991b9fb17295c2b460f3a49,2024-03-28T12:42:56.150000
|
||||
CVE-2024-30222,0,0,16d5c6200c88be9ed99126042f393681469af79a0a1fab7e0ddf18cd42a248eb,2024-03-28T12:42:56.150000
|
||||
CVE-2024-30223,0,0,49223d6bf313bfaa9ef84d3620f1e228ce685b884b7a52aeb03dd202e977c8f9,2024-03-28T12:42:56.150000
|
||||
@ -243722,8 +243730,10 @@ CVE-2024-30245,0,0,c550f2e08ca2abae6d23c532bde1ac0d011bfebcc7e2006a730d4259ffc3b
|
||||
CVE-2024-30246,0,0,ef2f9cbdf2157375c2b490b3135678cebbe062ec07ef752831bba7a8dadb10ff,2024-04-01T01:12:59.077000
|
||||
CVE-2024-30247,0,0,b8cd33ca93898e7e11bf9981fcd02901000e5a3bab8027b365fc72e086e8c4a6,2024-04-01T01:12:59.077000
|
||||
CVE-2024-30248,0,0,4c43963152883a6062a19090720aa1a677dd64ed7e60fa60f75d3204b7ed0a55,2024-04-02T18:12:16.283000
|
||||
CVE-2024-30265,0,1,f6c1bebbf0f1dd21a5d850b0d285e56edc6e352a64c24f325fdadabccdfb42c9,2024-04-04T12:48:41.700000
|
||||
CVE-2024-3030,0,1,ed3d394560fc992f2a931197efacab6ed2b55fb06d9f3928dd0d9fc577ffe7d4,2024-04-04T12:48:41.700000
|
||||
CVE-2024-30250,1,1,25f548db6c37608ce6f285f82ad1b754fa9e12142cec6c9ab9b6b84c0d7af1af,2024-04-04T15:15:39.240000
|
||||
CVE-2024-30261,1,1,65efb5a817eebfa0e30685558b216b92d2f5a23efe2e2ccea85419e008023226,2024-04-04T15:15:39.460000
|
||||
CVE-2024-30265,0,0,f6c1bebbf0f1dd21a5d850b0d285e56edc6e352a64c24f325fdadabccdfb42c9,2024-04-04T12:48:41.700000
|
||||
CVE-2024-3030,0,0,ed3d394560fc992f2a931197efacab6ed2b55fb06d9f3928dd0d9fc577ffe7d4,2024-04-04T12:48:41.700000
|
||||
CVE-2024-30322,0,0,64e521cd60b942f55f264dd1b34a0063ca35d4db4eef121c1f7bc208aac4f7ab,2024-04-03T17:24:18.150000
|
||||
CVE-2024-30323,0,0,e32fdd05c5f30f68cf1412b7e36fda0cb57a7690cef1889aa844a8506beb3ac4,2024-04-03T17:24:18.150000
|
||||
CVE-2024-30324,0,0,527c6e011dbcb72aeaa94e91760184a03f584736345d9e33e4037380190847ac,2024-04-03T17:24:18.150000
|
||||
@ -243877,7 +243887,7 @@ CVE-2024-30557,0,0,7e51550c5d84adae681c592a59742ffb76e054dc707c58b718a0779baf95a
|
||||
CVE-2024-30558,0,0,c487b7e520828364fad2b07b74e7c881d68876bac73b13b5c83e0dfd99fede24,2024-04-01T01:12:59.077000
|
||||
CVE-2024-30559,0,0,30881b502a00e1f0b4af436d9e17ecd66ddff7c4f60889245892c374e2f0a5b2,2024-04-01T01:12:59.077000
|
||||
CVE-2024-30561,0,0,03bc43de8aff9caae9f72d908884b596acdfb45cf5a607bf3a61d00b78d408af,2024-04-01T01:12:59.077000
|
||||
CVE-2024-30565,0,1,3f0ae87a5d397da84e45601784aee2096e1faf40ea374ef4d70739ed0183ede8,2024-04-04T12:48:41.700000
|
||||
CVE-2024-30565,0,0,3f0ae87a5d397da84e45601784aee2096e1faf40ea374ef4d70739ed0183ede8,2024-04-04T12:48:41.700000
|
||||
CVE-2024-30568,0,0,f6f1134376f6a833dac65c1f0ffd0c185817f9baecb73cbacf75c77c107df9b4,2024-04-03T17:24:18.150000
|
||||
CVE-2024-30569,0,0,965cc263f467ee2477a900a599911bb53bef840a7217e032defc2f4ddec1bc60,2024-04-03T17:24:18.150000
|
||||
CVE-2024-30570,0,0,0d3c4f838aefc300e89464d6f5f2b76674f6fb8964d8502ff739be2a3072a1fd,2024-04-03T17:24:18.150000
|
||||
@ -243974,7 +243984,7 @@ CVE-2024-31010,0,0,22d3a5a8802df0899a91f29c1da59c9756b041e238b139f6c5446937f944e
|
||||
CVE-2024-31011,0,0,e280dc2325f8c749d256893287e9934a0b438d76a624897891275e16b92e2305,2024-04-03T12:38:04.840000
|
||||
CVE-2024-31012,0,0,59265fe10316d43a2acb459ea9de60f6a264c8b6d13bc4dae0d363d3b5d71397,2024-04-03T12:38:04.840000
|
||||
CVE-2024-31013,0,0,137ba39b03bbaab20823954557195167ac08df3fa32a6782dd4080f1d723f338,2024-04-03T12:38:04.840000
|
||||
CVE-2024-31025,0,1,ddbb426d13337eb3c05694bd996d8023e914a7cf1b9e43c29da0806926d32d23,2024-04-04T12:48:41.700000
|
||||
CVE-2024-31025,0,0,ddbb426d13337eb3c05694bd996d8023e914a7cf1b9e43c29da0806926d32d23,2024-04-04T12:48:41.700000
|
||||
CVE-2024-31032,0,0,71dbb2a787f73b1914bf5d51e1b83b5365eb112b3ab9ed4df5d1066682b5223b,2024-04-01T01:12:59.077000
|
||||
CVE-2024-31033,0,0,897cdecff344b121550f3f8e1b3cb821fdde5689eabf8f2834a81266f3e9da87,2024-04-03T03:15:10.670000
|
||||
CVE-2024-31061,0,0,020e38014038ba97f692790c06c98735ee7323fcc8614755f16c9c5708fe33f5,2024-03-28T20:53:20.813000
|
||||
@ -243982,6 +243992,9 @@ CVE-2024-31062,0,0,9a85b45f2ef9be7ff3563a8d396c3a8dd45f237219d28fbf343c7fa8953f9
|
||||
CVE-2024-31063,0,0,8c5e031664c3b218697e91183f663111a47f52e7fd5496cafc4f238d7a0c4ce8,2024-03-28T20:53:20.813000
|
||||
CVE-2024-31064,0,0,f87fea954d6623f92ad98dc571744769b0a41ba2a8ecac509cf34a5bc1aaafc6,2024-03-28T20:53:20.813000
|
||||
CVE-2024-31065,0,0,36c2c4ddfef551b3df9316a574430562ba7ec0ea51f9e5ecbfa0af993c7946d3,2024-03-28T20:53:20.813000
|
||||
CVE-2024-31080,1,1,facba91b1ac4e47406df1baed3fa74aba587f69f5e6b38383a3fdceb8773c095,2024-04-04T14:15:10.330000
|
||||
CVE-2024-31081,1,1,67300d215b5fdfdc1c8359bdf8f8d22e6dcc6972f72fa49ff91b2546b9315d5a,2024-04-04T14:15:10.593000
|
||||
CVE-2024-31082,1,1,40be7ff917085276548d3c6baf89c10cef55f69c38b700d6f2442b4403648fce,2024-04-04T14:15:10.833000
|
||||
CVE-2024-31084,0,0,7e7f6ad60462c421140a8806edcef098f25e94de0014c2ff06256ca8e21d3894,2024-04-01T01:12:59.077000
|
||||
CVE-2024-31085,0,0,159d63f28600902a854d5dada2c0b5fba89225c71015785af44f46e211303b47,2024-04-01T01:12:59.077000
|
||||
CVE-2024-31087,0,0,add2066c1d5f1a4308c5f84501c183a9350a71ec462e958963303b4527a9777f,2024-04-01T01:12:59.077000
|
||||
@ -244021,6 +244034,7 @@ CVE-2024-31137,0,0,93ea23ee4690796d32c315978d003f41d7ce02519dd10c8757d1747031b17
|
||||
CVE-2024-31138,0,0,ec113b29df9e8a0e0a04cdfcd522ad6e6cb96982fa47c7b0f359bd13de60b29b,2024-03-28T16:07:30.893000
|
||||
CVE-2024-31139,0,0,6254efb24474a93bf19fb224a952376f20b94666e671b313ffb9fb5d6ba4e123,2024-03-28T16:07:30.893000
|
||||
CVE-2024-31140,0,0,8ac72cdd6b5f7f56e71e87459ff46ad8714fcc8b963def523c845a786f9f62ca,2024-03-28T16:07:30.893000
|
||||
CVE-2024-3116,1,1,16fe5ed883bb551801cf581fd6726afa8992dd578783c5f503ffec97242a055e,2024-04-04T15:15:39.667000
|
||||
CVE-2024-3117,0,0,136fb5551ef6dfa1bf4e08424db43ed91a6bb8dd83f3d6ce39a5378e07bb201b,2024-04-01T01:12:59.077000
|
||||
CVE-2024-3118,0,0,f6c34b2c6946d5fdb10aa55aa3b524d7a78d6b6fed9a90242c451ed5ef8e29f1,2024-04-01T01:12:59.077000
|
||||
CVE-2024-3124,0,0,0636ee928c0356d73e2effbc159ce59d850c83e7a22c6ba92b3f50b98c28bb80,2024-04-01T15:53:18.060000
|
||||
@ -244038,9 +244052,9 @@ CVE-2024-31390,0,0,b4e9fc961de919e72175f3311bf8b0d63373bf3d5ee822252b4b654a4846d
|
||||
CVE-2024-31392,0,0,a1d99cde3f3dea50100e554c8ed3690db7a14123d76699db8f99e17733bd37aa,2024-04-03T17:24:18.150000
|
||||
CVE-2024-31393,0,0,9eb7ea902e8d5fc847f3a9447567950b200d6dcb5c89c6f5a916e1957bc7a512,2024-04-03T17:24:18.150000
|
||||
CVE-2024-3140,0,0,4a4571ebf0c853d6a035886d12ee1aa0de7c52d00b7e897dcd0cf868acaf4ead,2024-04-02T12:50:42.233000
|
||||
CVE-2024-3141,0,1,42a952666fd8025ed7d98df5ecb700ca3d8e0c94ea3a0b3bc3cda3e163003406,2024-04-04T13:15:44.713000
|
||||
CVE-2024-3141,0,0,42a952666fd8025ed7d98df5ecb700ca3d8e0c94ea3a0b3bc3cda3e163003406,2024-04-04T13:15:44.713000
|
||||
CVE-2024-31419,0,0,413da81bf7a7a5ebe2e617454f4042d9ba19ad8329104b2870478c02ff00df2d,2024-04-03T17:24:18.150000
|
||||
CVE-2024-3142,0,1,9dd81c211bf76d67e1c43a667eb2bd313a4a58232363655578ff94c12b7d19a5,2024-04-04T13:15:44.937000
|
||||
CVE-2024-3142,0,0,9dd81c211bf76d67e1c43a667eb2bd313a4a58232363655578ff94c12b7d19a5,2024-04-04T13:15:44.937000
|
||||
CVE-2024-31420,0,0,a9813c76c1646ba01e834a08e54918c852c142483315ef6c532422c0c88f7916,2024-04-03T17:24:18.150000
|
||||
CVE-2024-3143,0,0,adef6ddf8aed4b85f5b9ec5c41837e0ea05c8056f77fa6600789550fcc865a57,2024-04-02T12:50:42.233000
|
||||
CVE-2024-3144,0,0,0d76c2330ba298defd0f1b4b8583f5577295a22c7482e9267c8cbbe09aa0eb3a,2024-04-02T12:50:42.233000
|
||||
@ -244053,10 +244067,10 @@ CVE-2024-3160,0,0,f3860e2f9070e5e070adb0fe8ff153c3f84611a0ac253de8db1847a3b69906
|
||||
CVE-2024-3162,0,0,7209bf9b1b4a4f41543ae01bfd19e9aec1dd355164cd1434a8cb5548ea161c65,2024-04-03T12:38:04.840000
|
||||
CVE-2024-3164,0,0,3f14d5740dc99012cea5d98ccad2d9781e84892caf086f43791d3f9483c41c33,2024-04-02T12:50:42.233000
|
||||
CVE-2024-3165,0,0,de9c55d425cf1712b174cf5953c3fab2e18950a6202399f31519128938dc300f,2024-04-02T12:50:42.233000
|
||||
CVE-2024-3178,0,1,e1b2edc538f836ffb506a17d476e0f961db2588242ddd1b2358ad3487cd818bf,2024-04-04T12:48:41.700000
|
||||
CVE-2024-3179,0,1,5abb24f6a5051585dee8d043e9230e5c2a9202caf7e3c5044373b856d11a8a98,2024-04-04T12:48:41.700000
|
||||
CVE-2024-3180,0,1,9228ee57f9267d6ec4565f77da6e32f8aedba868cc578e14d8f50b94e65bca34,2024-04-04T12:48:41.700000
|
||||
CVE-2024-3181,0,1,19462f0bae052150ee3deea6a2833d73153169ade51a21a9a0ee903c88e94c7c,2024-04-04T12:48:41.700000
|
||||
CVE-2024-3178,0,0,e1b2edc538f836ffb506a17d476e0f961db2588242ddd1b2358ad3487cd818bf,2024-04-04T12:48:41.700000
|
||||
CVE-2024-3179,0,0,5abb24f6a5051585dee8d043e9230e5c2a9202caf7e3c5044373b856d11a8a98,2024-04-04T12:48:41.700000
|
||||
CVE-2024-3180,0,0,9228ee57f9267d6ec4565f77da6e32f8aedba868cc578e14d8f50b94e65bca34,2024-04-04T12:48:41.700000
|
||||
CVE-2024-3181,0,0,19462f0bae052150ee3deea6a2833d73153169ade51a21a9a0ee903c88e94c7c,2024-04-04T12:48:41.700000
|
||||
CVE-2024-3202,0,0,c740eb561a7c1440cb5a8dd5eb2f94f0cce226529c05056c2f841e5a9fe9ca73,2024-04-03T12:38:04.840000
|
||||
CVE-2024-3203,0,0,697bde31fba6d3c5a0e2d11da403a2e3b16828faac086b66cd78b0527d17b9c5,2024-04-03T12:38:04.840000
|
||||
CVE-2024-3204,0,0,a9dea1ca01b499632a34af3ee57c461ecd8a21787537da790c2ae8f833a61142,2024-04-03T12:38:04.840000
|
||||
@ -244073,6 +244087,7 @@ CVE-2024-3226,0,0,0d9ebebedadf244922f8385228c3d640f57a5f4e2e40a7b8124aa06fa756c4
|
||||
CVE-2024-3227,0,0,5e86de506c0356caace938eb3ddc76daf74ee07964bebbed2f3824e6fdb4ef31,2024-04-03T12:38:04.840000
|
||||
CVE-2024-3247,0,0,095afc187e8f976bc1a2eaa79a4c0328aa3c3e2487a10203585d8616775f8a4d,2024-04-03T12:38:04.840000
|
||||
CVE-2024-3248,0,0,65f6d4ddfc43ae235edf2e59fc9daa1f1d020439a4fa197a41a6ddd58e106004,2024-04-03T12:38:04.840000
|
||||
CVE-2024-3250,1,1,b2b468dbcc6924ca22394e15d05fb5d76c043f09320dbfc0c2654d488e4a15e1,2024-04-04T15:15:39.837000
|
||||
CVE-2024-3251,0,0,612fa2cbd1b7aa381067b911d8824859d86a26753bd39d3ebfa059bfd1d20eac,2024-04-03T12:38:04.840000
|
||||
CVE-2024-3252,0,0,aa2e5a3beeb53d70ad7f51b4bbc1915ec41533b4a644198bc020755253bede7e,2024-04-03T12:38:04.840000
|
||||
CVE-2024-3253,0,0,0972236c1835b9f5b2c1ab54b3987e593351bdd4ff986c80c53132587f0059fc,2024-04-03T12:38:04.840000
|
||||
@ -244082,8 +244097,11 @@ CVE-2024-3256,0,0,cdbc8da89f88fff280ac996c84840ad1bfb46f09c88b5b4dd62301b05f0c41
|
||||
CVE-2024-3257,0,0,b08a6413edbe423942780a6fe023bc538f97dad558ddbc91a724f215cfc85e18,2024-04-03T17:24:18.150000
|
||||
CVE-2024-3258,0,0,16d450bc3554c2a319117adc94d8a7dcb1f68b8821fc173e15562a1ba48b306c,2024-04-03T17:24:18.150000
|
||||
CVE-2024-3259,0,0,59128ca045cd2f7fbe88d58e11ffcce19ef1d2f5d6abea61087e98d65d4fd821,2024-04-03T17:24:18.150000
|
||||
CVE-2024-3262,0,1,cf821e2b5e43ebb35bf150d05529241937c1e196ce499175549668020b0990b1,2024-04-04T12:48:22.650000
|
||||
CVE-2024-3270,0,1,06803f1697053009ed748b01b78c6c9cfb2903b8272aa543347ffd9d7a62c641,2024-04-04T12:48:41.700000
|
||||
CVE-2024-3272,0,1,f5835433047c6a0c2284c0da39d8664773c7fc640a51a26f69a0df8df0141ed9,2024-04-04T12:48:41.700000
|
||||
CVE-2024-3273,0,1,6c4361eb020cbc89b8e3680431d3975940d415eea637023ddf0a1fa43ba10972,2024-04-04T12:48:41.700000
|
||||
CVE-2024-3274,0,1,b6fe16ea3476ba5bfff59d78cd515051a8d17caf21476f4663ff5fcf2d000465,2024-04-04T12:48:41.700000
|
||||
CVE-2024-3262,0,0,cf821e2b5e43ebb35bf150d05529241937c1e196ce499175549668020b0990b1,2024-04-04T12:48:22.650000
|
||||
CVE-2024-3270,0,0,06803f1697053009ed748b01b78c6c9cfb2903b8272aa543347ffd9d7a62c641,2024-04-04T12:48:41.700000
|
||||
CVE-2024-3272,0,0,f5835433047c6a0c2284c0da39d8664773c7fc640a51a26f69a0df8df0141ed9,2024-04-04T12:48:41.700000
|
||||
CVE-2024-3273,0,0,6c4361eb020cbc89b8e3680431d3975940d415eea637023ddf0a1fa43ba10972,2024-04-04T12:48:41.700000
|
||||
CVE-2024-3274,0,0,b6fe16ea3476ba5bfff59d78cd515051a8d17caf21476f4663ff5fcf2d000465,2024-04-04T12:48:41.700000
|
||||
CVE-2024-3296,1,1,a4cf40c27a775c840c732bf3716970bd24b03a050620946e3e295e7e3effb45a,2024-04-04T14:15:11.080000
|
||||
CVE-2024-3298,1,1,d61f96a7a6b05d8f3abff0fa905eb31c63aee65b1d348213b55f832bb8480303,2024-04-04T15:15:40.017000
|
||||
CVE-2024-3299,1,1,d098cf3dc2e52581df69f59c73ef193a6a9af80e843884dea645f6d54bc6ab79,2024-04-04T15:15:40.197000
|
||||
|
Can't render this file because it is too large.
|
Loading…
x
Reference in New Issue
Block a user