Auto-Update: 2024-03-18T03:00:37.420547+00:00

This commit is contained in:
cad-safe-bot 2024-03-18 03:03:25 +00:00
parent 8a02cf4753
commit ec091a1802
19 changed files with 726 additions and 50 deletions

View File

@ -0,0 +1,24 @@
{
"id": "CVE-2023-39223",
"sourceIdentifier": "vultures@jpcert.or.jp",
"published": "2024-03-18T01:15:48.280",
"lastModified": "2024-03-18T01:53:02.353",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "Stored cross-site scripting vulnerability exists in CGIs included in A.K.I Software's PMailServer/PMailServer2 products. If this vulnerability is exploited, an arbitrary script may be executed on a logged-in user's web browser."
}
],
"metrics": {},
"references": [
{
"url": "https://akisoftware.com/Vulnerability202301.html",
"source": "vultures@jpcert.or.jp"
},
{
"url": "https://jvn.jp/en/jp/JVN92720882/",
"source": "vultures@jpcert.or.jp"
}
]
}

View File

@ -0,0 +1,24 @@
{
"id": "CVE-2023-39933",
"sourceIdentifier": "vultures@jpcert.or.jp",
"published": "2024-03-18T01:15:48.347",
"lastModified": "2024-03-18T01:53:02.353",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "Insufficient verification vulnerability exists in Broadcast Mail CGI (pmc.exe) included in A.K.I Software's PMailServer/PMailServer2 products. If this vulnerability is exploited, a user who can upload files through the product may execute an arbitrary executable file with the web server's execution privilege."
}
],
"metrics": {},
"references": [
{
"url": "https://akisoftware.com/Vulnerability202301.html",
"source": "vultures@jpcert.or.jp"
},
{
"url": "https://jvn.jp/en/jp/JVN92720882/",
"source": "vultures@jpcert.or.jp"
}
]
}

View File

@ -0,0 +1,24 @@
{
"id": "CVE-2023-40160",
"sourceIdentifier": "vultures@jpcert.or.jp",
"published": "2024-03-18T01:15:48.393",
"lastModified": "2024-03-18T01:53:02.353",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "Directory traversal vulnerability exists in Mailing List Search CGI (pmmls.exe) included in A.K.I Software's PMailServer/PMailServer2 products. If this vulnerability is exploited, a remote attacker may obtain arbitrary files on the server."
}
],
"metrics": {},
"references": [
{
"url": "https://akisoftware.com/Vulnerability202301.html",
"source": "vultures@jpcert.or.jp"
},
{
"url": "https://jvn.jp/en/jp/JVN92720882/",
"source": "vultures@jpcert.or.jp"
}
]
}

View File

@ -0,0 +1,24 @@
{
"id": "CVE-2023-40747",
"sourceIdentifier": "vultures@jpcert.or.jp",
"published": "2024-03-18T01:15:48.440",
"lastModified": "2024-03-18T01:53:02.353",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "Directory traversal vulnerability exists in A.K.I Software's PMailServer/PMailServer2 products' CGIs included in Internal Simple Webserver. If this vulnerability is exploited, a remote attacker may access arbitrary files outside DocumentRoot."
}
],
"metrics": {},
"references": [
{
"url": "https://akisoftware.com/Vulnerability202301.html",
"source": "vultures@jpcert.or.jp"
},
{
"url": "https://jvn.jp/en/jp/JVN92720882/",
"source": "vultures@jpcert.or.jp"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2023-52159",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-03-18T02:15:06.053",
"lastModified": "2024-03-18T02:15:06.053",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "A stack-based buffer overflow vulnerability in gross 0.9.3 through 1.x before 1.0.4 allows remote attackers to trigger a denial of service (grossd daemon crash) or potentially execute arbitrary code in grossd via crafted SMTP transaction parameters that cause an incorrect strncat for a log entry."
}
],
"metrics": {},
"references": [
{
"url": "https://codeberg.org/bizdelnick/gross/wiki/Known-vulnerabilities#cve-2023-52159",
"source": "cve@mitre.org"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-23138",
"sourceIdentifier": "psirt@autodesk.com",
"published": "2024-03-18T00:15:07.587",
"lastModified": "2024-03-18T00:15:07.587",
"vulnStatus": "Received",
"lastModified": "2024-03-18T01:13:31.203",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-23139",
"sourceIdentifier": "psirt@autodesk.com",
"published": "2024-03-18T00:15:07.663",
"lastModified": "2024-03-18T00:15:07.663",
"vulnStatus": "Received",
"lastModified": "2024-03-18T01:13:31.203",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2024-24230",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-03-18T02:15:06.123",
"lastModified": "2024-03-18T02:15:06.123",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Komm.One CMS 10.4.2.14 has a Server-Side Template Injection (SSTI) vulnerability via the Velocity template engine. It allows remote attackers to execute arbitrary code via a URL that specifies java.lang.Runtime in conjunction with getRuntime().exec followed by an OS command."
}
],
"metrics": {},
"references": [
{
"url": "https://blog.munz4u.de/posts/2023/11/cve-2023-xxxxx-rce-via-ssti-in-komm.one-cms-10.4.2.14/",
"source": "cve@mitre.org"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-2568",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-03-17T23:15:05.900",
"lastModified": "2024-03-17T23:15:05.900",
"vulnStatus": "Received",
"lastModified": "2024-03-18T01:13:31.203",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-2569",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-03-18T00:15:07.753",
"lastModified": "2024-03-18T00:15:07.753",
"vulnStatus": "Received",
"lastModified": "2024-03-18T01:13:31.203",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-2570",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-03-18T00:15:08.073",
"lastModified": "2024-03-18T00:15:08.073",
"vulnStatus": "Received",
"lastModified": "2024-03-18T01:13:31.203",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -0,0 +1,88 @@
{
"id": "CVE-2024-2571",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-03-18T01:15:48.493",
"lastModified": "2024-03-18T01:53:02.353",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was found in SourceCodester Employee Task Management System 1.0. It has been declared as critical. This vulnerability affects unknown code of the file /manage-admin.php. The manipulation leads to execution after redirect. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. VDB-257074 is the identifier assigned to this vulnerability."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW",
"baseScore": 7.3,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.4
}
],
"cvssMetricV2": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5
},
"baseSeverity": "HIGH",
"exploitabilityScore": 10.0,
"impactScore": 6.4,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-698"
}
]
}
],
"references": [
{
"url": "https://github.com/skid-nochizplz/skid-nochizplz/blob/main/TrashBin/CVE/SOURCECODESTER%20Employee%20Task%20Management%20System/Execution%20After%20Redirect%20-%20manage-admin.php.md",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?ctiid.257074",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?id.257074",
"source": "cna@vuldb.com"
}
]
}

View File

@ -0,0 +1,88 @@
{
"id": "CVE-2024-2572",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-03-18T01:15:48.707",
"lastModified": "2024-03-18T01:53:02.353",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was found in SourceCodester Employee Task Management System 1.0. It has been rated as critical. This issue affects some unknown processing of the file /task-details.php. The manipulation leads to execution after redirect. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-257075."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW",
"baseScore": 7.3,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.4
}
],
"cvssMetricV2": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5
},
"baseSeverity": "HIGH",
"exploitabilityScore": 10.0,
"impactScore": 6.4,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-698"
}
]
}
],
"references": [
{
"url": "https://github.com/skid-nochizplz/skid-nochizplz/blob/main/TrashBin/CVE/SOURCECODESTER%20Employee%20Task%20Management%20System/Execution%20After%20Redirect%20-%20task-details.php.md",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?ctiid.257075",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?id.257075",
"source": "cna@vuldb.com"
}
]
}

View File

@ -0,0 +1,88 @@
{
"id": "CVE-2024-2573",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-03-18T01:15:48.923",
"lastModified": "2024-03-18T01:53:02.353",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability classified as critical has been found in SourceCodester Employee Task Management System 1.0. Affected is an unknown function of the file /task-info.php. The manipulation leads to execution after redirect. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-257076."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW",
"baseScore": 7.3,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.4
}
],
"cvssMetricV2": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5
},
"baseSeverity": "HIGH",
"exploitabilityScore": 10.0,
"impactScore": 6.4,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-698"
}
]
}
],
"references": [
{
"url": "https://github.com/skid-nochizplz/skid-nochizplz/blob/main/TrashBin/CVE/SOURCECODESTER%20Employee%20Task%20Management%20System/Execution%20After%20Redirect%20-%20task-info.php.md",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?ctiid.257076",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?id.257076",
"source": "cna@vuldb.com"
}
]
}

View File

@ -0,0 +1,88 @@
{
"id": "CVE-2024-2574",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-03-18T02:15:06.177",
"lastModified": "2024-03-18T02:15:06.177",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability classified as critical was found in SourceCodester Employee Task Management System 1.0. Affected by this vulnerability is an unknown functionality of the file /edit-task.php. The manipulation of the argument task_id leads to authorization bypass. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-257077 was assigned to this vulnerability."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW",
"baseScore": 7.3,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.4
}
],
"cvssMetricV2": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5
},
"baseSeverity": "HIGH",
"exploitabilityScore": 10.0,
"impactScore": 6.4,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-639"
}
]
}
],
"references": [
{
"url": "https://github.com/skid-nochizplz/skid-nochizplz/blob/main/TrashBin/CVE/SOURCECODESTER%20Employee%20Task%20Management%20System/IDOR%20-%20edit-task.php.md",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?ctiid.257077",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?id.257077",
"source": "cna@vuldb.com"
}
]
}

View File

@ -0,0 +1,88 @@
{
"id": "CVE-2024-2575",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-03-18T02:15:06.397",
"lastModified": "2024-03-18T02:15:06.397",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability, which was classified as critical, has been found in SourceCodester Employee Task Management System 1.0. Affected by this issue is some unknown functionality of the file /task-details.php. The manipulation of the argument task_id leads to authorization bypass. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB-257078 is the identifier assigned to this vulnerability."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW",
"baseScore": 7.3,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.4
}
],
"cvssMetricV2": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5
},
"baseSeverity": "HIGH",
"exploitabilityScore": 10.0,
"impactScore": 6.4,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-639"
}
]
}
],
"references": [
{
"url": "https://github.com/skid-nochizplz/skid-nochizplz/blob/main/TrashBin/CVE/SOURCECODESTER%20Employee%20Task%20Management%20System/IDOR%20-%20task-details.php.md",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?ctiid.257078",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?id.257078",
"source": "cna@vuldb.com"
}
]
}

View File

@ -0,0 +1,88 @@
{
"id": "CVE-2024-2576",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-03-18T02:15:06.620",
"lastModified": "2024-03-18T02:15:06.620",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability, which was classified as critical, was found in SourceCodester Employee Task Management System 1.0. This affects an unknown part of the file /update-admin.php. The manipulation of the argument admin_id leads to authorization bypass. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-257079."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW",
"baseScore": 7.3,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.4
}
],
"cvssMetricV2": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5
},
"baseSeverity": "HIGH",
"exploitabilityScore": 10.0,
"impactScore": 6.4,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-639"
}
]
}
],
"references": [
{
"url": "https://github.com/skid-nochizplz/skid-nochizplz/blob/main/TrashBin/CVE/SOURCECODESTER%20Employee%20Task%20Management%20System/IDOR%20-%20update-admin.php.md",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?ctiid.257079",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?id.257079",
"source": "cna@vuldb.com"
}
]
}

View File

@ -9,13 +9,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update
```plain
2024-03-18T00:55:31.123239+00:00
2024-03-18T03:00:37.420547+00:00
```
### Most recent CVE Modification Timestamp synchronized with NVD
```plain
2024-03-18T00:15:08.073000+00:00
2024-03-18T02:15:06.620000+00:00
```
### Last Data Feed Release
@ -23,42 +23,42 @@ Repository synchronizes with the NVD every 2 hours.
Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/releases/latest)
```plain
2024-03-17T01:00:20.248869+00:00
2024-03-18T01:00:20.273351+00:00
```
### Total Number of included CVEs
```plain
241748
241760
```
### CVEs added in the last Commit
Recently added CVEs: `5`
Recently added CVEs: `12`
* [CVE-2024-23138](CVE-2024/CVE-2024-231xx/CVE-2024-23138.json) (`2024-03-18T00:15:07.587`)
* [CVE-2024-23139](CVE-2024/CVE-2024-231xx/CVE-2024-23139.json) (`2024-03-18T00:15:07.663`)
* [CVE-2024-2568](CVE-2024/CVE-2024-25xx/CVE-2024-2568.json) (`2024-03-17T23:15:05.900`)
* [CVE-2024-2569](CVE-2024/CVE-2024-25xx/CVE-2024-2569.json) (`2024-03-18T00:15:07.753`)
* [CVE-2024-2570](CVE-2024/CVE-2024-25xx/CVE-2024-2570.json) (`2024-03-18T00:15:08.073`)
* [CVE-2023-39223](CVE-2023/CVE-2023-392xx/CVE-2023-39223.json) (`2024-03-18T01:15:48.280`)
* [CVE-2023-39933](CVE-2023/CVE-2023-399xx/CVE-2023-39933.json) (`2024-03-18T01:15:48.347`)
* [CVE-2023-40160](CVE-2023/CVE-2023-401xx/CVE-2023-40160.json) (`2024-03-18T01:15:48.393`)
* [CVE-2023-40747](CVE-2023/CVE-2023-407xx/CVE-2023-40747.json) (`2024-03-18T01:15:48.440`)
* [CVE-2023-52159](CVE-2023/CVE-2023-521xx/CVE-2023-52159.json) (`2024-03-18T02:15:06.053`)
* [CVE-2024-24230](CVE-2024/CVE-2024-242xx/CVE-2024-24230.json) (`2024-03-18T02:15:06.123`)
* [CVE-2024-2571](CVE-2024/CVE-2024-25xx/CVE-2024-2571.json) (`2024-03-18T01:15:48.493`)
* [CVE-2024-2572](CVE-2024/CVE-2024-25xx/CVE-2024-2572.json) (`2024-03-18T01:15:48.707`)
* [CVE-2024-2573](CVE-2024/CVE-2024-25xx/CVE-2024-2573.json) (`2024-03-18T01:15:48.923`)
* [CVE-2024-2574](CVE-2024/CVE-2024-25xx/CVE-2024-2574.json) (`2024-03-18T02:15:06.177`)
* [CVE-2024-2575](CVE-2024/CVE-2024-25xx/CVE-2024-2575.json) (`2024-03-18T02:15:06.397`)
* [CVE-2024-2576](CVE-2024/CVE-2024-25xx/CVE-2024-2576.json) (`2024-03-18T02:15:06.620`)
### CVEs modified in the last Commit
Recently modified CVEs: `12`
Recently modified CVEs: `5`
* [CVE-2024-23126](CVE-2024/CVE-2024-231xx/CVE-2024-23126.json) (`2024-03-18T00:15:06.947`)
* [CVE-2024-23127](CVE-2024/CVE-2024-231xx/CVE-2024-23127.json) (`2024-03-18T00:15:07.040`)
* [CVE-2024-23128](CVE-2024/CVE-2024-231xx/CVE-2024-23128.json) (`2024-03-18T00:15:07.093`)
* [CVE-2024-23129](CVE-2024/CVE-2024-231xx/CVE-2024-23129.json) (`2024-03-18T00:15:07.147`)
* [CVE-2024-23130](CVE-2024/CVE-2024-231xx/CVE-2024-23130.json) (`2024-03-18T00:15:07.200`)
* [CVE-2024-23131](CVE-2024/CVE-2024-231xx/CVE-2024-23131.json) (`2024-03-18T00:15:07.247`)
* [CVE-2024-23132](CVE-2024/CVE-2024-231xx/CVE-2024-23132.json) (`2024-03-18T00:15:07.297`)
* [CVE-2024-23133](CVE-2024/CVE-2024-231xx/CVE-2024-23133.json) (`2024-03-18T00:15:07.340`)
* [CVE-2024-23134](CVE-2024/CVE-2024-231xx/CVE-2024-23134.json) (`2024-03-18T00:15:07.390`)
* [CVE-2024-23135](CVE-2024/CVE-2024-231xx/CVE-2024-23135.json) (`2024-03-18T00:15:07.437`)
* [CVE-2024-23136](CVE-2024/CVE-2024-231xx/CVE-2024-23136.json) (`2024-03-18T00:15:07.490`)
* [CVE-2024-23137](CVE-2024/CVE-2024-231xx/CVE-2024-23137.json) (`2024-03-18T00:15:07.537`)
* [CVE-2024-23138](CVE-2024/CVE-2024-231xx/CVE-2024-23138.json) (`2024-03-18T01:13:31.203`)
* [CVE-2024-23139](CVE-2024/CVE-2024-231xx/CVE-2024-23139.json) (`2024-03-18T01:13:31.203`)
* [CVE-2024-2568](CVE-2024/CVE-2024-25xx/CVE-2024-2568.json) (`2024-03-18T01:13:31.203`)
* [CVE-2024-2569](CVE-2024/CVE-2024-25xx/CVE-2024-2569.json) (`2024-03-18T01:13:31.203`)
* [CVE-2024-2570](CVE-2024/CVE-2024-25xx/CVE-2024-2570.json) (`2024-03-18T01:13:31.203`)
## Download and Usage

View File

@ -227789,6 +227789,7 @@ CVE-2023-39219,0,0,ffe6b023f1495f8b57e31afdc9ec50cc41f32c5d1afac3e9b8861a6abe054
CVE-2023-3922,0,0,3de47228c0be4b62aa874fb22f37cf8218d9eefc4b921c0dfb3486c438d769c8,2023-10-03T19:46:15.090000
CVE-2023-39221,0,0,ca6a5b5354b867e7327556d8af3123b89624102ae3e1a8e25cbc0a7528342cb9,2023-11-17T04:12:34.787000
CVE-2023-39222,0,0,e7abb1a2f5466318983a7b8055a889978c5817cc1c5987d145caa7c816d59afe,2023-10-04T17:09:09.587000
CVE-2023-39223,1,1,802a1454ccdc9de33a3a3be86c4cb992c8cb18946a0207c298ddd9954c3c2445,2024-03-18T01:53:02.353000
CVE-2023-39224,0,0,9f0ee82474a8478de6c49bba28737168904febf7a3e15d5640ac19e530da72fd,2023-09-11T13:40:42.273000
CVE-2023-39226,0,0,0994c384ac49a648ee701ec35c36b76fc8bd819025df02410d603c80de105f24,2023-12-06T16:45:39.013000
CVE-2023-39227,0,0,0e290f8c310c6b274080812ba59d133bfd27668cfab77f39578626e11a4e6ad9,2023-11-07T04:17:28.807000
@ -228222,6 +228223,7 @@ CVE-2023-39928,0,0,d301c6955cd28f0cc13eb9981eeb018d9b7e292cf0fe8eaafb8b0a6168dfe
CVE-2023-3993,0,0,415109a54bb0afa7423e50ac47f91a3cbed708a964388ed50ca794cae59e0af4,2023-08-04T19:23:32.567000
CVE-2023-39930,0,0,750f5008eb55b1f1e46c1eb986d9ad43d1ed448f82290670a259fdd83fac0b8f,2023-10-31T18:10:51.270000
CVE-2023-39932,0,0,d9d3f7b04352b7c05b4eb7fa451e5043d5a404dba71748b7e8f2a6109a86be9a,2024-02-14T15:01:46.050000
CVE-2023-39933,1,1,77c724c7f2acc5d94f3a61198c14dec6314b2c998057d20c1d243a1335307b8f,2024-03-18T01:53:02.353000
CVE-2023-39935,0,0,1cd83d1926cb1a19c89828f1eb18e710457037b47b95985b3210a7e91af4ce8d,2023-09-11T13:41:11.193000
CVE-2023-39936,0,0,12b19daf1fb334be427f0ef71eb7f95b49abfc813223945cef373c80ca3e53c2,2023-11-06T18:13:06.433000
CVE-2023-39938,0,0,d25173bc50a0f129330e7f3d331dd9367c48919dfca25cafbcd45946225d7ce9,2023-09-08T18:45:56.717000
@ -228427,6 +228429,7 @@ CVE-2023-40154,0,0,566a030971d0544d4e7fa7b76269309df296031c1b06d66b3bdab3f9bc154
CVE-2023-40156,0,0,33a2ad550abb77c03162fc1eff3a119daf1b2224ea89b3ba2316784b502c0374,2024-02-14T15:01:46.050000
CVE-2023-40158,0,0,01c68e5522e834fc982e25999e9571716b4c8bd6b6eaded0a57c181f615cd893,2023-08-29T14:35:53.187000
CVE-2023-4016,0,0,834245ffee21f8672464f07d5bd634fb6138dc12258b29f7f1677098eebfeffd,2023-12-15T18:19:03.787000
CVE-2023-40160,1,1,5f3c0c06d102e7f86218f5797363657793247be9dcef999359c754e6aef73a6f,2024-03-18T01:53:02.353000
CVE-2023-40161,0,0,1e3bc1e478edf26154691c00adf6718041b30e48b030dc34fc04f624091278bd,2024-02-14T15:01:46.050000
CVE-2023-40163,0,0,a19022a361e191abf4ffa112c0deb1db998b5155430ad0554cdee5e5604fb590,2023-09-25T18:46:35.360000
CVE-2023-40164,0,0,2965c9551ac09e06e28dcfdc7970a4a9d8c1b724789acdee6d6ec307aa73eda1,2023-08-31T17:33:09.500000
@ -228861,6 +228864,7 @@ CVE-2023-4074,0,0,3ca4b1c90c431193569f2ae38e9284f1f9e585f6c22f5ea1d6f2edee922901
CVE-2023-40743,0,0,ba898ada4875f0d7581eee75a73aeef9d9f6f481022a82e3b4424af116fafd97,2023-11-07T04:20:21.547000
CVE-2023-40744,0,0,f30a85c2bae1fe5fb85ea03c61726d5655f515fede66334ddf92face6e85ae1e,2023-11-07T04:20:21.733000
CVE-2023-40745,0,0,4969edc9bc74fd51ea732c3cdf8f5e50cfbf39a0e9076b01c55a15d109cf1c15,2024-01-21T01:56:24.340000
CVE-2023-40747,1,1,8ca34d488f93266070cc398a295498bcbb00e1fa2919f464632985f8dea2a51a,2024-03-18T01:53:02.353000
CVE-2023-40748,0,0,1cc4ce738408204804a6659274e5bb8d18c0d139d2bb6554966800ef9576e300,2023-11-07T04:20:22.133000
CVE-2023-40749,0,0,657dff3758a106cda04613289677f66f653ad71d0dfa2e696d0f7282514a5ab3,2023-11-07T04:20:23.247000
CVE-2023-4075,0,0,8315f0089803590d370982429382abfb8cd6ea46f93f3922499f9566a857237a,2024-01-31T17:15:14.137000
@ -235720,6 +235724,7 @@ CVE-2023-52152,0,0,e56fa2d2c1e141f8041fc8c88a612bb4ba95742ec4640f573ab4ba7b04743
CVE-2023-52153,0,0,0c2ecbcd7f13f6c7a2e779421c57cd39c3bb12a281b05ae9cded4398a2a9234b,2024-02-22T19:07:27.197000
CVE-2023-52154,0,0,4fcc7827557b88433f869eead3b4c25d57fe62a3f5aad2c73cc5b9f30781be75,2024-02-22T19:07:27.197000
CVE-2023-52155,0,0,2d124c7a3937e95fe09338bcde4297ee381aa5672d319a6218dc245e972781e4,2024-02-22T19:07:27.197000
CVE-2023-52159,1,1,24affa4d9ce082b4c50b11f3bef4ca5d64d23ec2aaf939bcbbdfbf1e18a07e7f,2024-03-18T02:15:06.053000
CVE-2023-52160,0,0,26d003b98163e2d30bad3b1985c8060a1ba805b634cf011a494792cd39c5f541,2024-03-10T04:15:06.897000
CVE-2023-52161,0,0,b966a3a69a610f6ff3a56147c89455f884597e29aebe81d8c5dff7de80fd83ac,2024-03-16T02:15:08.023000
CVE-2023-5217,0,0,eb72b7bf45cf830e8dfea06ca9df4012d36de44c17fe08c39232c1c398d1ba15,2024-02-15T02:00:01.650000
@ -240039,21 +240044,21 @@ CVE-2024-23122,0,0,53a6a7f808f40f9f8ccc6c9426a05387fb59e2867d6b512f9c97f02c17acd
CVE-2024-23123,0,0,80a373f3449c95eb380a5a70c0b7efa82991d89500c1ac1323995b54768d154d,2024-03-13T03:15:06.443000
CVE-2024-23124,0,0,310e8c4cd574e0a0147b3ffefdbfe36a36709549adc5926c84549e0d2e3d6fc7,2024-03-13T15:15:50.783000
CVE-2024-23125,0,0,f0886c546f6144b586ec7d77c24ce27baa331af9d054edd3d089f488c8104eca,2024-02-22T19:07:27.197000
CVE-2024-23126,0,1,e927ab071d122c627451a22694d4cf2dac082404401648a3f86014242e68a50a,2024-03-18T00:15:06.947000
CVE-2024-23127,0,1,3ea88bcafabd465bc37fad9704e953c411abb0a641445593533f8ba0613e8791,2024-03-18T00:15:07.040000
CVE-2024-23128,0,1,ca0d5b73755672b409a96dbe9aeb23485b0c9534c7c5de37783c4c3570c58d9f,2024-03-18T00:15:07.093000
CVE-2024-23129,0,1,499dfc567281c72c2a7b30e15cbf850093f159f42544506c65a2e542ebe260ec,2024-03-18T00:15:07.147000
CVE-2024-23126,0,0,e927ab071d122c627451a22694d4cf2dac082404401648a3f86014242e68a50a,2024-03-18T00:15:06.947000
CVE-2024-23127,0,0,3ea88bcafabd465bc37fad9704e953c411abb0a641445593533f8ba0613e8791,2024-03-18T00:15:07.040000
CVE-2024-23128,0,0,ca0d5b73755672b409a96dbe9aeb23485b0c9534c7c5de37783c4c3570c58d9f,2024-03-18T00:15:07.093000
CVE-2024-23129,0,0,499dfc567281c72c2a7b30e15cbf850093f159f42544506c65a2e542ebe260ec,2024-03-18T00:15:07.147000
CVE-2024-2313,0,0,16bbfaec204d1e2888ad5edb0d47bbc1606f500184f3441dd447b0ffcab97265,2024-03-11T01:32:29.610000
CVE-2024-23130,0,1,1e3e1092d31e482531a23d074c00b2201eef463d384cdf1e1935233d4885d379,2024-03-18T00:15:07.200000
CVE-2024-23131,0,1,c427ee94f7c61adaf0716529d63f7a538f863e445e4db249885a3e64e551be88,2024-03-18T00:15:07.247000
CVE-2024-23132,0,1,f22a2bdc1f997a36d13f6c22afab4983451c9373205a8ec6621cdd27061b8266,2024-03-18T00:15:07.297000
CVE-2024-23133,0,1,e86482bc439e59c6d3cf72bc6bb19d1a229eba94c9abdd88aed6d4ca00d35e18,2024-03-18T00:15:07.340000
CVE-2024-23134,0,1,38a55137e7187c71b98734712c44e07ff764f4206d4c642f28b0ab8952092a66,2024-03-18T00:15:07.390000
CVE-2024-23135,0,1,4ba3ef7d8b86192f3be9f608d250b59255f9c0272b793b5a67accf11746a7c49,2024-03-18T00:15:07.437000
CVE-2024-23136,0,1,2b90dcbe6397ed8c7559581d051fafe64c4814ea200ea96c2ab2b35870ef1cba,2024-03-18T00:15:07.490000
CVE-2024-23137,0,1,b73ac1a3962b6dd849e09860e5fbdd306ad601f2f1d6396ea6c594ab1cd8349c,2024-03-18T00:15:07.537000
CVE-2024-23138,1,1,83234e9c1d9da06295893378680fdf2ae8c4ab6f6c31c42c6e95bbedc253ce4a,2024-03-18T00:15:07.587000
CVE-2024-23139,1,1,650ec157373c0f44c1221c604d2fd2eecf6a256b0c32fa9e5cd411f5ee163528,2024-03-18T00:15:07.663000
CVE-2024-23130,0,0,1e3e1092d31e482531a23d074c00b2201eef463d384cdf1e1935233d4885d379,2024-03-18T00:15:07.200000
CVE-2024-23131,0,0,c427ee94f7c61adaf0716529d63f7a538f863e445e4db249885a3e64e551be88,2024-03-18T00:15:07.247000
CVE-2024-23132,0,0,f22a2bdc1f997a36d13f6c22afab4983451c9373205a8ec6621cdd27061b8266,2024-03-18T00:15:07.297000
CVE-2024-23133,0,0,e86482bc439e59c6d3cf72bc6bb19d1a229eba94c9abdd88aed6d4ca00d35e18,2024-03-18T00:15:07.340000
CVE-2024-23134,0,0,38a55137e7187c71b98734712c44e07ff764f4206d4c642f28b0ab8952092a66,2024-03-18T00:15:07.390000
CVE-2024-23135,0,0,4ba3ef7d8b86192f3be9f608d250b59255f9c0272b793b5a67accf11746a7c49,2024-03-18T00:15:07.437000
CVE-2024-23136,0,0,2b90dcbe6397ed8c7559581d051fafe64c4814ea200ea96c2ab2b35870ef1cba,2024-03-18T00:15:07.490000
CVE-2024-23137,0,0,b73ac1a3962b6dd849e09860e5fbdd306ad601f2f1d6396ea6c594ab1cd8349c,2024-03-18T00:15:07.537000
CVE-2024-23138,0,1,6d6691665c0e92905d7de2526cc81efaabdb083f9f82111f51d80ffb8024c84a,2024-03-18T01:13:31.203000
CVE-2024-23139,0,1,8141291de6c56c73234ed7328d195d71be8058dad6e752c716ddcb50d60a0a42,2024-03-18T01:13:31.203000
CVE-2024-2314,0,0,2a7c8d3b31efafdff54b990ee96f6000143b44cef1eaa21dbc0efffb9f0a2175,2024-03-11T01:32:29.610000
CVE-2024-2316,0,0,a097a9212752a2f2e046c705bed0d8905070b6ea0ca74b78d956c3e2d6972e90,2024-03-08T14:02:57.420000
CVE-2024-2317,0,0,0a17eeb4da181fa6b3b32ff6c5a81486898cbedeb9ced1809eec64590d49d52b,2024-03-08T14:02:57.420000
@ -240547,6 +240552,7 @@ CVE-2024-24202,0,0,1d105bed1b9a63d735bee37efd6d6c425165a2cc4b28137df80d69159f445
CVE-2024-24213,0,0,2bfc81b7a3f58a2bff005a4738a275e99e1d9966d545c209bcf9c96774c75b4f,2024-03-05T02:15:27.493000
CVE-2024-24215,0,0,d3883dc710155bd950a18903f8aa5eb2eda59d1e9725a4303b203ea7778b78f1,2024-02-15T18:08:47.813000
CVE-2024-24216,0,0,3c3e699d8ba3256f67c55852e9ef2e3011cfbebba9e6c02139e656f08115b8a1,2024-02-08T13:44:21.670000
CVE-2024-24230,1,1,ebdb4190370da69de050192a1be867f0889c450b3a5eb58717a347df2f1f90f9,2024-03-18T02:15:06.123000
CVE-2024-24246,0,0,bc598f9753d5ea601268c824c614eb035554042dcf5c8d2ed6a002f1d526ccfa,2024-03-10T04:15:06.997000
CVE-2024-24254,0,0,9339820ae71b7b870d84000911554e2e5f93e1c4ab945fdf5145aa252036f9c2,2024-02-15T18:46:57.737000
CVE-2024-24255,0,0,2085b0cb468b304c9118b3c0b0e3b0cf89bfb225076d95ede49b5c87a27416c9,2024-02-15T18:46:41.247000
@ -241123,9 +241129,10 @@ CVE-2024-25675,0,0,7eb120f8543ce89181641a0a8c791e82666c8e07d23577075c360f9dbf73d
CVE-2024-25677,0,0,1d7f4f51208daa48b27418602ba1484337c537523201080701287445cfed0006,2024-02-15T19:43:24.983000
CVE-2024-25678,0,0,9470e3115b8c3f5b60b6b175aa8ef46b05e07e3f194ab4ff036467dbe264bd9e,2024-02-15T18:45:09.663000
CVE-2024-25679,0,0,224a0956154aafe3a65144732719712897f981c578a083f4eecb3f79135bc5a3,2024-02-15T18:44:40.547000
CVE-2024-2568,1,1,56021bc7fb4235496e31fe35fdfacc27cfb6f86edd11d6169d9bb3251820c755,2024-03-17T23:15:05.900000
CVE-2024-2569,1,1,29e83dd0102398f86f99c44209dd2e16a8f2559d48f1cd3e395e37a5febf328e,2024-03-18T00:15:07.753000
CVE-2024-2570,1,1,57dbca3c324e95a3ab1cd492fa97ca4ed3996b70e370e6e3c5b2ddb8a9ce5cdd,2024-03-18T00:15:08.073000
CVE-2024-2568,0,1,dc69eb7ae72178e713ee4962f0dbefbc21d73a5510672ba13ce0076a2711f58c,2024-03-18T01:13:31.203000
CVE-2024-2569,0,1,e68525db016be205e5e772d864a945bc043d0c8a543d54feaa647e837f5226cd,2024-03-18T01:13:31.203000
CVE-2024-2570,0,1,c30238c193a4a8681324c9c248609fdbcacbb23dffee64a86ca89656eb8eb757,2024-03-18T01:13:31.203000
CVE-2024-2571,1,1,39b1b311f4b1aeb853b0c73bdbe26c0039d9bcd148bdf4c0d884cba1ffbdb222,2024-03-18T01:53:02.353000
CVE-2024-25710,0,0,ab520189ef240d987a199d6e814c3161f9be705f75e79c9ab42865a168e0f18f,2024-03-07T17:15:12.940000
CVE-2024-25711,0,0,d3f8257017dbfc5bdd6c4e4b8e295b2d28e0327c4086b62797abd4226251f28d,2024-02-27T14:20:06.637000
CVE-2024-25712,0,0,51de0f8ba1579ed685b4e63152564f2da5ea830e3b6201a5b430e6e0f9d5912b,2024-02-29T13:49:29.390000
@ -241133,21 +241140,26 @@ CVE-2024-25713,0,0,82886cecbf7fc1474a5475d864f3cf6580d0ba42b5cd7356d033fc3fe3f82
CVE-2024-25714,0,0,9412e4abe974714537d46263b1aceeb3da73b377eadb8c6d547f518f3dd76d57,2024-02-11T22:29:15.837000
CVE-2024-25715,0,0,afc47e2f135c0d393e0f1675e9f3505afc2edeecfe91e6e7ebf765579d639205,2024-02-16T21:35:54.270000
CVE-2024-25718,0,0,da106636da61d535fc0727a49c3ad3e5baa74bfdc612249ef59ecd0bcee4ac78,2024-02-11T22:29:15.837000
CVE-2024-2572,1,1,b9de74a1af1b60b018348c02ca891209d7e80b9f5d5c72683ccf4f3770a6cef0,2024-03-18T01:53:02.353000
CVE-2024-25722,0,0,e339e4c240cdf5b626e631a49466d2a4c8c61d57868b42aa565c4e497c14e192,2024-02-11T22:29:15.837000
CVE-2024-25723,0,0,f5e48ae195e8428328f05db62baab9ea4ea7e3efac70245f05a45f8f26aeeb9e,2024-02-28T14:07:00.563000
CVE-2024-25728,0,0,37b53e45ddfdecbb578e06258b8945af283fa8e4ce2d348c25122f893d78fc20,2024-02-11T22:29:15.837000
CVE-2024-25729,0,0,184930f04b43901bc1f4566a359e2a59bf4139503b85debe12ca335f06305c1a,2024-03-08T14:02:57.420000
CVE-2024-2573,1,1,de1a2a1cf4e8ef16f87ebea5a561eac940ddfce289df7fd5f1459fc536f37091,2024-03-18T01:53:02.353000
CVE-2024-25730,0,0,70855abe305d0dfeeb202d7d3e0222d8c78a13e99e14d9706026a5f359efacd5,2024-02-26T13:42:22.567000
CVE-2024-25731,0,0,12f10a210f08c80cc0b13af611399517c9199c1982133ea9d0862af74a2a1634,2024-03-05T13:41:01.900000
CVE-2024-25739,0,0,950aa9620985a2c8df1dee08ed10faa0394d7dbb50bfb07f9f6b4659211920e9,2024-02-26T21:13:34.897000
CVE-2024-2574,1,1,f3d27f0fdca6e865f12579e85f88d30568bd92fab237bca2c6afe554a6fe3580,2024-03-18T02:15:06.177000
CVE-2024-25740,0,0,e49082457da2ca822066645fd01741e2b46dee6a85b6e915fd169e8229594e99,2024-02-26T21:11:27.837000
CVE-2024-25741,0,0,f1234f859d02ff2a7aa2753dc2a1e43b929acf864167d8c3c5522f3098d24837,2024-02-12T14:20:03.287000
CVE-2024-25744,0,0,4b0b476da30d39c3d73f2f74d7d6a3fe7e372d371ce439923d15b6b4e22ccfeb,2024-02-12T14:20:03.287000
CVE-2024-25746,0,0,5d39c9cb27e2bd00967bd4ec89fe88bf22de477dd4c75b89dc38553966ec146d,2024-02-23T02:42:54.547000
CVE-2024-25748,0,0,538a825e9b3c762e7399aa6e8e3620bb14adc4b7f457092ae0e7d0bdba4a75e0,2024-02-23T02:42:54.547000
CVE-2024-2575,1,1,ffb9e775702933bebd6c7fa9022f5303592fa482ab50b0e426b04311d7db4dcd,2024-03-18T02:15:06.397000
CVE-2024-25751,0,0,395becc114c34ed66ca0b69212e22c009bdd05d997290a2e353e3ceaba1432fb,2024-02-27T14:20:06.637000
CVE-2024-25753,0,0,485cccebfe5fb0bc8a16c4251d09565dde29abb5cf6084c6575e818887f703b2,2024-02-23T02:42:54.547000
CVE-2024-25756,0,0,4f12516b1becc36f368c255854438cb309da839dc9385f2dc823c401d0d48621,2024-02-23T02:42:54.547000
CVE-2024-2576,1,1,c673212c24afb50a628f2ffccbb8d254cb2639b2007abe680125ceb33545d6f7,2024-03-18T02:15:06.620000
CVE-2024-25760,0,0,255ca6230bb354f98509c01959da5b0923f549858d798f3db2290377395c8140,2024-02-27T15:15:07.820000
CVE-2024-25763,0,0,449253544ddeb38e4327642a9711026d85e9fd1e23016db2d903615337918cb9,2024-02-26T16:32:25.577000
CVE-2024-25767,0,0,5e5d85efb5a949e2d407dc5470a1026f931741e6d3d19a638a7a6f425b54dab9,2024-02-26T22:10:40.463000

Can't render this file because it is too large.