Auto-Update: 2024-03-22T15:00:40.815139+00:00

This commit is contained in:
cad-safe-bot 2024-03-22 15:03:29 +00:00
parent b70b707f09
commit fc216ddb56
47 changed files with 801 additions and 95 deletions

View File

@ -8,6 +8,10 @@
{
"lang": "en",
"value": "The WooCommerce PDF Invoices, Packing Slips, Delivery Notes and Shipping Labels plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the Customer Notes field in all versions up to, and including, 4.4.1 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected invoice for printing."
},
{
"lang": "es",
"value": "El complemento WooCommerce PDF Invoices, Packing Slips, Delivery Notes and Shipping Labels para WordPress es vulnerable a Cross-Site Scripting Almacenado a trav\u00e9s del campo Notas del cliente en todas las versiones hasta la 4.4.1 incluida, debido a una sanitizaci\u00f3n de entrada y un escape de salida insuficientes. Esto hace posible que atacantes no autenticados inyecten scripts web arbitrarios en p\u00e1ginas que se ejecutar\u00e1n cada vez que un usuario acceda a una factura inyectada para imprimir."
}
],
"metrics": {

View File

@ -8,6 +8,10 @@
{
"lang": "en",
"value": "The LiquidPoll \u2013 Polls, Surveys, NPS and Feedback Reviews plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 3.3.76 via the poller_list shortcode. This makes it possible for authenticated attackers, with contributor-level access and above, to extract information from polls that may be private."
},
{
"lang": "es",
"value": "El complemento LiquidPoll \u2013 Polls, Surveys, NPS and Feedback Reviews para WordPress es vulnerable a la exposici\u00f3n de informaci\u00f3n confidencial en todas las versiones hasta la 3.3.76 incluida a trav\u00e9s del c\u00f3digo corto poller_list. Esto hace posible que atacantes autenticados, con acceso de nivel de colaborador y superior, extraigan informaci\u00f3n de encuestas que pueden ser privadas."
}
],
"metrics": {

View File

@ -8,6 +8,10 @@
{
"lang": "en",
"value": "The Blocksy Companion plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's Newsletter widget in all versions up to, and including, 2.0.31 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers with contributor-level and above permissions to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page."
},
{
"lang": "es",
"value": "El complemento Blocksy Companion para WordPress es vulnerable a Cross-Site Scripting Almacenado a trav\u00e9s del widget de bolet\u00edn informativo del complemento en todas las versiones hasta la 2.0.31 incluida debido a una sanitizaci\u00f3n de entrada insuficiente y a un escape de salida en los atributos proporcionados por el usuario. Esto hace posible que atacantes autenticados con permisos de nivel de colaborador y superiores inyecten scripts web arbitrarios en p\u00e1ginas que se ejecutar\u00e1n cada vez que un usuario acceda a una p\u00e1gina inyectada."
}
],
"metrics": {

View File

@ -0,0 +1,59 @@
{
"id": "CVE-2024-2448",
"sourceIdentifier": "security@progress.com",
"published": "2024-03-22T14:15:08.683",
"lastModified": "2024-03-22T14:15:08.683",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "An OS command injection vulnerability has been identified in LoadMaster.\u00a0 An authenticated UI user with any permission settings may be able to inject commands into a UI component using a shell command resulting in OS command injection."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security@progress.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H",
"attackVector": "ADJACENT_NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.4,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.7,
"impactScore": 6.0
}
]
},
"weaknesses": [
{
"source": "security@progress.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-78"
}
]
}
],
"references": [
{
"url": "https://progress.com/loadmaster",
"source": "security@progress.com"
},
{
"url": "https://support.kemptechnologies.com/hc/en-us/articles/25119767150477-LoadMaster-Security-Vulnerabilities-CVE-2024-2448-and-CVE-2024-2449",
"source": "security@progress.com"
}
]
}

View File

@ -0,0 +1,59 @@
{
"id": "CVE-2024-2449",
"sourceIdentifier": "security@progress.com",
"published": "2024-03-22T14:15:09.210",
"lastModified": "2024-03-22T14:15:09.210",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "A cross-site request forgery vulnerability has been identified in LoadMaster.\u00a0 It is possible for a malicious actor, who has prior knowledge of the IP or hostname of a specific LoadMaster, to direct an authenticated LoadMaster administrator to a third-party site. In such a scenario, the CSRF payload hosted on the malicious site would execute HTTP transactions on behalf of the LoadMaster administrator."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security@progress.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.6,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "security@progress.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-352"
}
]
}
],
"references": [
{
"url": "https://progress.com/loadmaster",
"source": "security@progress.com"
},
{
"url": "https://support.kemptechnologies.com/hc/en-us/articles/25119767150477-LoadMaster-Security-Vulnerabilities-CVE-2024-2448-and-CVE-2024-2449",
"source": "security@progress.com"
}
]
}

View File

@ -8,6 +8,10 @@
{
"lang": "en",
"value": "\nThere is an SQL injection vulnerability in Advantech WebAccess/SCADA software that allows an authenticated attacker to remotely inject SQL code in the database. Successful exploitation of this vulnerability could allow an attacker to read or modify data on the remote database.\n\n"
},
{
"lang": "es",
"value": "Existe una vulnerabilidad de inyecci\u00f3n SQL en el software Advantech WebAccess/SCADA que permite a un atacante autenticado inyectar c\u00f3digo SQL de forma remota en la base de datos. La explotaci\u00f3n exitosa de esta vulnerabilidad podr\u00eda permitir a un atacante leer o modificar datos en la base de datos remota."
}
],
"metrics": {

View File

@ -8,6 +8,10 @@
{
"lang": "en",
"value": "Cross Site Scripting (XSS) vulnerability in Lychee 3.1.6, allows remote attackers to execute arbitrary code and obtain sensitive information via the title parameter when creating an album."
},
{
"lang": "es",
"value": "Una vulnerabilidad de Cross Site Scripting (XSS) en Lychee 3.1.6 permite a atacantes remotos ejecutar c\u00f3digo arbitrario y obtener informaci\u00f3n confidencial a trav\u00e9s del par\u00e1metro de t\u00edtulo al crear un \u00e1lbum."
}
],
"metrics": {},

View File

@ -8,6 +8,10 @@
{
"lang": "en",
"value": "Cross-site Request Forgery (CSRF) vulnerability in Lychee version 3.1.6, allows remote attackers to execute arbitrary code via the create new album function."
},
{
"lang": "es",
"value": "Vulnerabilidad de Cross-site Request Forgery (CSRF) en Lychee versi\u00f3n 3.1.6, permite a atacantes remotos ejecutar c\u00f3digo arbitrario a trav\u00e9s de la funci\u00f3n de creaci\u00f3n de nuevo \u00e1lbum."
}
],
"metrics": {},

View File

@ -8,6 +8,10 @@
{
"lang": "en",
"value": "The ColorMag theme for WordPress is vulnerable to Stored Cross-Site Scripting via a user's Display Name in all versions up to, and including, 3.1.6 due to insufficient input sanitization and output escaping. This makes it possible for authentciated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page."
},
{
"lang": "es",
"value": "El tema ColorMag para WordPress es vulnerable a Cross-Site Scripting Almacenado a trav\u00e9s del nombre para mostrar de un usuario en todas las versiones hasta la 3.1.6 incluida, debido a una sanitizaci\u00f3n de entrada y un escape de salida insuficientes. Esto hace posible que atacantes autenticados, con acceso de nivel de colaborador y superior, inyecten scripts web arbitrarios en p\u00e1ginas que se ejecutar\u00e1n cada vez que un usuario acceda a una p\u00e1gina inyectada."
}
],
"metrics": {

View File

@ -8,6 +8,10 @@
{
"lang": "en",
"value": "Codiad v2.8.4 allows reflected XSS via the components/market/dialog.php type parameter."
},
{
"lang": "es",
"value": "Codiad v2.8.4 permite reflejar XSS a trav\u00e9s del par\u00e1metro de tipo componentes/mercado/dialog.php."
}
],
"metrics": {},

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2024-2722",
"sourceIdentifier": "cve-coordination@incibe.es",
"published": "2024-03-22T14:15:09.403",
"lastModified": "2024-03-22T14:15:09.403",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "SQL injection vulnerability in the CIGESv2 system, through\u00a0/ajaxConfigTotem.php, in the 'id' parameter. The exploitation of this vulnerability could allow a remote user to retrieve all data stored in the database by sending a specially crafted SQL query."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "cve-coordination@incibe.es",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "cve-coordination@incibe.es",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"references": [
{
"url": "https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-cigesv2-system",
"source": "cve-coordination@incibe.es"
}
]
}

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2024-2723",
"sourceIdentifier": "cve-coordination@incibe.es",
"published": "2024-03-22T14:15:09.643",
"lastModified": "2024-03-22T14:15:09.643",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "SQL injection vulnerability in the CIGESv2 system, through\u00a0/ajaxSubServicios.php, in the 'idServicio' parameter. The exploitation of this vulnerability could allow a remote user to retrieve all data stored in the database by sending a specially crafted SQL query."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "cve-coordination@incibe.es",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "cve-coordination@incibe.es",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"references": [
{
"url": "https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-cigesv2-system",
"source": "cve-coordination@incibe.es"
}
]
}

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2024-2724",
"sourceIdentifier": "cve-coordination@incibe.es",
"published": "2024-03-22T14:15:09.857",
"lastModified": "2024-03-22T14:15:09.857",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "SQL injection vulnerability in the CIGESv2 system, through\u00a0/ajaxServiciosAtencion.php, in the 'idServicio' parameter. The exploitation of this vulnerability could allow a remote user to retrieve all data stored in the database by sending a specially crafted SQL query."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "cve-coordination@incibe.es",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "cve-coordination@incibe.es",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"references": [
{
"url": "https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-cigesv2-system",
"source": "cve-coordination@incibe.es"
}
]
}

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2024-2725",
"sourceIdentifier": "cve-coordination@incibe.es",
"published": "2024-03-22T14:15:10.143",
"lastModified": "2024-03-22T14:15:10.143",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Information exposure vulnerability in the CIGESv2 system. A remote attacker might be able to access /vendor/composer/installed.json and retrieve all installed packages used by the application."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "cve-coordination@incibe.es",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "cve-coordination@incibe.es",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-200"
}
]
}
],
"references": [
{
"url": "https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-cigesv2-system",
"source": "cve-coordination@incibe.es"
}
]
}

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2024-2726",
"sourceIdentifier": "cve-coordination@incibe.es",
"published": "2024-03-22T14:15:10.393",
"lastModified": "2024-03-22T14:15:10.393",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Stored Cross-Site Scripting (Stored-XSS) vulnerability affecting the CIGESv2 system, allowing an attacker to execute and store malicious javascript code in the application form without prior registration."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "cve-coordination@incibe.es",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7
}
]
},
"weaknesses": [
{
"source": "cve-coordination@incibe.es",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-cigesv2-system",
"source": "cve-coordination@incibe.es"
}
]
}

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2024-2727",
"sourceIdentifier": "cve-coordination@incibe.es",
"published": "2024-03-22T14:15:10.593",
"lastModified": "2024-03-22T14:15:10.593",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "HTML injection vulnerability affecting the CIGESv2 system, which allows an attacker to inject arbitrary code and modify elements of the website and email confirmation message."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "cve-coordination@incibe.es",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7
}
]
},
"weaknesses": [
{
"source": "cve-coordination@incibe.es",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-cigesv2-system",
"source": "cve-coordination@incibe.es"
}
]
}

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2024-2728",
"sourceIdentifier": "cve-coordination@incibe.es",
"published": "2024-03-22T14:15:10.807",
"lastModified": "2024-03-22T14:15:10.807",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Information exposure vulnerability in the CIGESv2 system. This vulnerability could allow a local attacker to intercept traffic due to the lack of proper implementation of the TLS protocol."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "cve-coordination@incibe.es",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:P/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N",
"attackVector": "PHYSICAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.1,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 0.5,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "cve-coordination@incibe.es",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-200"
}
]
}
],
"references": [
{
"url": "https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-cigesv2-system",
"source": "cve-coordination@incibe.es"
}
]
}

View File

@ -8,6 +8,10 @@
{
"lang": "en",
"value": "A vulnerability was found in Campcodes Complete Online Beauty Parlor Management System 1.0. It has been rated as critical. Affected by this issue is some unknown functionality of the file /admin/contact-us.php. The manipulation of the argument email leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB-257606 is the identifier assigned to this vulnerability."
},
{
"lang": "es",
"value": "Se encontr\u00f3 una vulnerabilidad en Campcodes Complete Online Beauty Parlor Management System 1.0. Ha sido calificada como cr\u00edtica. Una funci\u00f3n desconocida del archivo /admin/contact-us.php es afectada por esta vulnerabilidad. La manipulaci\u00f3n del argumento email conduce a la inyecci\u00f3n de SQL. El ataque puede lanzarse de forma remota. El exploit ha sido divulgado al p\u00fablico y puede utilizarse. VDB-257606 es el identificador asignado a esta vulnerabilidad."
}
],
"metrics": {

View File

@ -8,6 +8,10 @@
{
"lang": "en",
"value": "A vulnerability classified as problematic has been found in Campcodes Online Marriage Registration System 1.0. This affects an unknown part of the file /user/search.php. The manipulation of the argument searchdata leads to cross site scripting. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-257607."
},
{
"lang": "es",
"value": "Una vulnerabilidad ha sido encontrada en Campcodes Online Marriage Registration System 1.0 y clasificada como problem\u00e1tica. Esto afecta a una parte desconocida del archivo /user/search.php. La manipulaci\u00f3n del argumento searchdata conduce a cross-site scripting. Es posible iniciar el ataque de forma remota. El exploit ha sido divulgado al p\u00fablico y puede utilizarse. El identificador asociado de esta vulnerabilidad es VDB-257607."
}
],
"metrics": {

View File

@ -8,6 +8,10 @@
{
"lang": "en",
"value": "A vulnerability classified as critical was found in Campcodes Online Marriage Registration System 1.0. This vulnerability affects unknown code of the file /user/search.php. The manipulation of the argument searchdata leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-257608."
},
{
"lang": "es",
"value": "Una vulnerabilidad fue encontrada en Campcodes Online Marriage Registration System 1.0 y clasificada como cr\u00edtica. Esta vulnerabilidad afecta a un c\u00f3digo desconocido del archivo /user/search.php. La manipulaci\u00f3n del argumento searchdata conduce a la inyecci\u00f3n de SQL. El ataque se puede iniciar de forma remota. El exploit ha sido divulgado al p\u00fablico y puede utilizarse. El identificador de esta vulnerabilidad es VDB-257608."
}
],
"metrics": {

View File

@ -8,6 +8,10 @@
{
"lang": "en",
"value": "A vulnerability, which was classified as problematic, has been found in Campcodes Online Marriage Registration System 1.0. This issue affects some unknown processing of the file /user/user-profile.php. The manipulation of the argument lname leads to cross site scripting. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-257609 was assigned to this vulnerability."
},
{
"lang": "es",
"value": "Una vulnerabilidad fue encontrada en Campcodes Online Marriage Registration System 1.0 y clasificada como problem\u00e1tica. Este problema afecta un procesamiento desconocido del archivo /user/user-profile.php. La manipulaci\u00f3n del argumento lname conduce a cross-site scripting. El ataque puede iniciarse de forma remota. El exploit ha sido divulgado al p\u00fablico y puede utilizarse. A esta vulnerabilidad se le asign\u00f3 el identificador VDB-257609."
}
],
"metrics": {

View File

@ -8,6 +8,10 @@
{
"lang": "en",
"value": "A vulnerability, which was classified as critical, was found in Campcodes Online Marriage Registration System 1.0. Affected is an unknown function of the file /admin/search.php. The manipulation of the argument searchdata leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. VDB-257610 is the identifier assigned to this vulnerability."
},
{
"lang": "es",
"value": "Una vulnerabilidad fue encontrada en Campcodes Online Marriage Registration System 1.0 y clasificada como cr\u00edtica. Una funci\u00f3n desconocida del archivo /admin/search.php es afectada por esta vulnerabilidad. La manipulaci\u00f3n del argumento searchdata conduce a la inyecci\u00f3n de SQL. Es posible lanzar el ataque de forma remota. El exploit ha sido divulgado al p\u00fablico y puede utilizarse. VDB-257610 es el identificador asignado a esta vulnerabilidad."
}
],
"metrics": {

View File

@ -8,6 +8,10 @@
{
"lang": "en",
"value": "A vulnerability has been found in Campcodes Online Marriage Registration System 1.0 and classified as critical. Affected by this vulnerability is an unknown functionality of the file /admin/application-bwdates-reports-details.php. The manipulation of the argument fromdate leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-257611."
},
{
"lang": "es",
"value": "Una vulnerabilidad ha sido encontrada en Campcodes Online Marriage Registration System 1.0 y clasificada como cr\u00edtica. Una funci\u00f3n desconocida del archivo /admin/application-bwdates-reports-details.php es afectada por esta vulnerabilidad. La manipulaci\u00f3n del argumento fromdate conduce a la inyecci\u00f3n de SQL. El ataque se puede lanzar de forma remota. El exploit ha sido divulgado al p\u00fablico y puede utilizarse. El identificador asociado de esta vulnerabilidad es VDB-257611."
}
],
"metrics": {

View File

@ -8,6 +8,10 @@
{
"lang": "en",
"value": "A vulnerability was found in Campcodes Online Marriage Registration System 1.0 and classified as problematic. Affected by this issue is some unknown functionality of the file /admin/search.php. The manipulation of the argument searchdata leads to cross site scripting. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-257612."
},
{
"lang": "es",
"value": "Una vulnerabilidad fue encontrada en Campcodes Online Marriage Registration System 1.0 y clasificada como problem\u00e1tica. Una funci\u00f3n desconocida del archivo /admin/search.php es afectada por esta vulnerabilidad. La manipulaci\u00f3n del argumento searchdata conduce a cross-site scripting. El ataque puede lanzarse de forma remota. El exploit ha sido divulgado al p\u00fablico y puede utilizarse. El identificador de esta vulnerabilidad es VDB-257612."
}
],
"metrics": {

View File

@ -8,6 +8,10 @@
{
"lang": "en",
"value": "A vulnerability was found in Campcodes Online Marriage Registration System 1.0. It has been classified as problematic. This affects an unknown part of the file /admin/application-bwdates-reports-details.php. The manipulation of the argument fromdate leads to cross site scripting. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-257613 was assigned to this vulnerability."
},
{
"lang": "es",
"value": "Se encontr\u00f3 una vulnerabilidad en Campcodes Online Marriage Registration System 1.0. Ha sido clasificada como problem\u00e1tica. Esto afecta a una parte desconocida del archivo /admin/application-bwdates-reports-details.php. La manipulaci\u00f3n del argumento fromdate conduce a cross-site scripting. Es posible iniciar el ataque de forma remota. El exploit ha sido divulgado al p\u00fablico y puede utilizarse. A esta vulnerabilidad se le asign\u00f3 el identificador VDB-257613."
}
],
"metrics": {

View File

@ -8,6 +8,10 @@
{
"lang": "en",
"value": "A vulnerability was found in Campcodes Online Marriage Registration System 1.0. It has been declared as problematic. This vulnerability affects unknown code of the file /admin/admin-profile.php. The manipulation of the argument adminname leads to cross site scripting. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. VDB-257614 is the identifier assigned to this vulnerability."
},
{
"lang": "es",
"value": "Se encontr\u00f3 una vulnerabilidad en Campcodes Online Marriage Registration System 1.0. Ha sido declarada problem\u00e1tica. Esta vulnerabilidad afecta al c\u00f3digo desconocido del archivo /admin/admin-profile.php. La manipulaci\u00f3n del argumento adminname conduce a cross-site scripting. El ataque se puede iniciar de forma remota. El exploit ha sido divulgado al p\u00fablico y puede utilizarse. VDB-257614 es el identificador asignado a esta vulnerabilidad."
}
],
"metrics": {

View File

@ -8,6 +8,10 @@
{
"lang": "en",
"value": "File Upload vulnerability in magicflue v.7.0 and before allows a remote attacker to execute arbitrary code via a crafted request to the messageid parameter of the mail/mailupdate.jsp endpoint."
},
{
"lang": "es",
"value": "Vulnerabilidad de carga de archivos en magicflue v.7.0 y anteriores permite a un atacante remoto ejecutar c\u00f3digo arbitrario a trav\u00e9s de una solicitud manipulada al par\u00e1metro messageid del endpoint mail/mailupdate.jsp."
}
],
"metrics": {},

View File

@ -8,6 +8,10 @@
{
"lang": "en",
"value": "node-tar is a Tar for Node.js. node-tar prior to version 6.2.1 has no limit on the number of sub-folders created in the folder creation process. An attacker who generates a large number of sub-folders can consume memory on the system running node-tar and even crash the Node.js client within few seconds of running it using a path with too many sub-folders inside. Version 6.2.1 fixes this issue by preventing extraction in excessively deep sub-folders."
},
{
"lang": "es",
"value": "node-tar es un Tar para Node.js. Node-tar anterior a la versi\u00f3n 6.2.1 no tiene l\u00edmite en la cantidad de subcarpetas creadas en el proceso de creaci\u00f3n de carpetas. Un atacante que genera una gran cantidad de subcarpetas puede consumir memoria en el sistema que ejecuta node-tar e incluso bloquear el cliente Node.js a los pocos segundos de ejecutarlo usando una ruta con demasiadas subcarpetas dentro. La versi\u00f3n 6.2.1 soluciona este problema impidiendo la extracci\u00f3n en subcarpetas excesivamente profundas."
}
],
"metrics": {

View File

@ -8,6 +8,10 @@
{
"lang": "en",
"value": "A vulnerability was found in Tenda AC15 15.03.05.18/15.03.20_multi. It has been rated as critical. Affected by this issue is the function formSetSpeedWan of the file /goform/SetSpeedWan. The manipulation of the argument speed_dir leads to stack-based buffer overflow. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-257660. NOTE: The vendor was contacted early about this disclosure but did not respond in any way."
},
{
"lang": "es",
"value": "Se encontr\u00f3 una vulnerabilidad en Tenda AC15 15.03.05.18/15.03.20_multi. Ha sido calificada como cr\u00edtica. La funci\u00f3n formSetSpeedWan del archivo /goform/SetSpeedWan es afectada por esta vulnerabilidad. La manipulaci\u00f3n del argumento speed_dir provoca un desbordamiento de b\u00fafer en la regi\u00f3n stack de la memoria. El ataque puede lanzarse de forma remota. El exploit ha sido divulgado al p\u00fablico y puede utilizarse. El identificador de esta vulnerabilidad es VDB-257660. NOTA: Se contact\u00f3 primeramente con el proveedor sobre esta divulgaci\u00f3n, pero no respondi\u00f3 de ninguna manera."
}
],
"metrics": {

View File

@ -8,6 +8,10 @@
{
"lang": "en",
"value": "A vulnerability classified as critical has been found in Tenda AC15 15.03.05.18/15.03.20_multi. This affects the function addWifiMacFilter of the file /goform/addWifiMacFilter. The manipulation of the argument deviceId/deviceMac leads to stack-based buffer overflow. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-257661 was assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way."
},
{
"lang": "es",
"value": "Una vulnerabilidad ha sido encontrada en Tenda AC15 15.03.05.18/15.03.20_multi y clasificada como cr\u00edtica. Esto afecta a la funci\u00f3n addWifiMacFilter del fichero /goform/addWifiMacFilter. La manipulaci\u00f3n del argumento deviceId/deviceMac conduce a un desbordamiento de b\u00fafer en la regi\u00f3n stack de la memoria. Es posible iniciar el ataque de forma remota. El exploit ha sido divulgado al p\u00fablico y puede utilizarse. A esta vulnerabilidad se le asign\u00f3 el identificador VDB-257661. NOTA: Se contact\u00f3 primeramente con el proveedor sobre esta divulgaci\u00f3n, pero no respondi\u00f3 de ninguna manera."
}
],
"metrics": {

View File

@ -8,6 +8,10 @@
{
"lang": "en",
"value": "A vulnerability classified as critical was found in Tenda AC15 15.03.05.18/15.03.20_multi. This vulnerability affects the function formExpandDlnaFile of the file /goform/expandDlnaFile. The manipulation of the argument filePath leads to stack-based buffer overflow. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. VDB-257662 is the identifier assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way."
},
{
"lang": "es",
"value": "Una vulnerabilidad fue encontrada en Tenda AC15 15.03.05.18/15.03.20_multi y clasificada como cr\u00edtica. Esta vulnerabilidad afecta a la funci\u00f3n formExpandDlnaFile del archivo /goform/expandDlnaFile. La manipulaci\u00f3n del argumento filePath conduce a un desbordamiento de b\u00fafer en la regi\u00f3n stack de la memoria. El ataque se puede iniciar de forma remota. El exploit ha sido divulgado al p\u00fablico y puede utilizarse. VDB-257662 es el identificador asignado a esta vulnerabilidad. NOTA: Se contact\u00f3 primeramente con el proveedor sobre esta divulgaci\u00f3n, pero no respondi\u00f3 de ninguna manera."
}
],
"metrics": {

View File

@ -8,6 +8,10 @@
{
"lang": "en",
"value": "A vulnerability, which was classified as critical, has been found in Tenda AC15 15.03.05.18/15.03.20_multi. This issue affects the function formQuickIndex of the file /goform/QuickIndex. The manipulation of the argument PPPOEPassword leads to stack-based buffer overflow. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-257663. NOTE: The vendor was contacted early about this disclosure but did not respond in any way."
},
{
"lang": "es",
"value": "Una vulnerabilidad fue encontrada en Tenda AC15 15.03.05.18/15.03.20_multi y clasificada como cr\u00edtica. Este problema afecta la funci\u00f3n formQuickIndex del archivo /goform/QuickIndex. La manipulaci\u00f3n del argumento PPPOEPassword provoca un desbordamiento de b\u00fafer en la regi\u00f3n stack de la memoria. El ataque puede iniciarse de forma remota. El exploit ha sido divulgado al p\u00fablico y puede utilizarse. El identificador asociado de esta vulnerabilidad es VDB-257663. NOTA: Se contact\u00f3 primeramente con el proveedor sobre esta divulgaci\u00f3n, pero no respondi\u00f3 de ninguna manera."
}
],
"metrics": {

View File

@ -8,6 +8,10 @@
{
"lang": "en",
"value": "A vulnerability, which was classified as critical, was found in Tenda AC15 15.03.05.18/15.03.20_multi. Affected is the function formSetFirewallCfg of the file /goform/SetFirewallCfg. The manipulation of the argument firewallEn leads to stack-based buffer overflow. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-257664. NOTE: The vendor was contacted early about this disclosure but did not respond in any way."
},
{
"lang": "es",
"value": "Una vulnerabilidad fue encontrada en Tenda AC15 15.03.05.18/15.03.20_multi y clasificada como cr\u00edtica. La funci\u00f3n formSetFirewallCfg del fichero /goform/SetFirewallCfg es afectada por la vulnerabilidad. La manipulaci\u00f3n del argumento firewallEn conduce a un desbordamiento de b\u00fafer en la regi\u00f3n stack de la memoria. Es posible lanzar el ataque de forma remota. El exploit ha sido divulgado al p\u00fablico y puede utilizarse. El identificador de esta vulnerabilidad es VDB-257664. NOTA: Se contact\u00f3 primeramente con el proveedor sobre esta divulgaci\u00f3n, pero no respondi\u00f3 de ninguna manera."
}
],
"metrics": {

View File

@ -8,6 +8,10 @@
{
"lang": "en",
"value": "A vulnerability has been found in Tenda AC15 15.03.05.18/15.03.20_multi and classified as critical. Affected by this vulnerability is the function formWifiWpsOOB of the file /goform/WifiWpsOOB. The manipulation of the argument index leads to stack-based buffer overflow. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-257665 was assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way."
},
{
"lang": "es",
"value": "Una vulnerabilidad ha sido encontrada en Tenda AC15 15.03.05.18/15.03.20_multi y clasificada como cr\u00edtica. La funci\u00f3n formWifiWpsOOB del archivo /goform/WifiWpsOOB es afectada por esta vulnerabilidad. La manipulaci\u00f3n del \u00edndice de argumentos conduce a un desbordamiento de b\u00fafer en la regi\u00f3n stack de la memoria. El ataque se puede lanzar de forma remota. El exploit ha sido divulgado al p\u00fablico y puede utilizarse. A esta vulnerabilidad se le asign\u00f3 el identificador VDB-257665. NOTA: Se contact\u00f3 primeramente con el proveedor sobre esta divulgaci\u00f3n, pero no respondi\u00f3 de ninguna manera."
}
],
"metrics": {

View File

@ -8,6 +8,10 @@
{
"lang": "en",
"value": "A vulnerability was found in Tenda AC15 15.03.20_multi and classified as critical. Affected by this issue is the function formWifiWpsStart of the file /goform/WifiWpsStart. The manipulation of the argument index leads to stack-based buffer overflow. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB-257666 is the identifier assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way."
},
{
"lang": "es",
"value": "Una vulnerabilidad fue encontrada en Tenda AC15 15.03.20_multi y clasificada como cr\u00edtica. La funci\u00f3n formWifiWpsStart del archivo /goform/WifiWpsStart es afectada por esta vulnerabilidad. La manipulaci\u00f3n del \u00edndice de argumentos conduce a un desbordamiento de b\u00fafer en la regi\u00f3n stack de la memoria. El ataque puede lanzarse de forma remota. El exploit ha sido divulgado al p\u00fablico y puede utilizarse. VDB-257666 es el identificador asignado a esta vulnerabilidad. NOTA: Se contact\u00f3 primeramente con el proveedor sobre esta divulgaci\u00f3n, pero no respondi\u00f3 de ninguna manera."
}
],
"metrics": {

View File

@ -8,6 +8,10 @@
{
"lang": "en",
"value": "A vulnerability was found in Tenda AC15 15.03.05.18/15.03.20_multi. It has been classified as critical. This affects the function formWriteFacMac of the file /goform/WriteFacMac. The manipulation of the argument mac leads to os command injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-257667. NOTE: The vendor was contacted early about this disclosure but did not respond in any way."
},
{
"lang": "es",
"value": "Se encontr\u00f3 una vulnerabilidad en Tenda AC15 15.03.05.18/15.03.20_multi. Ha sido clasificada como cr\u00edtica. Esto afecta a la funci\u00f3n formWriteFacMac del archivo /goform/WriteFacMac. La manipulaci\u00f3n del argumento mac conduce a la inyecci\u00f3n de comandos del sistema operativo. Es posible iniciar el ataque de forma remota. El exploit ha sido divulgado al p\u00fablico y puede utilizarse. El identificador asociado de esta vulnerabilidad es VDB-257667. NOTA: Se contact\u00f3 primeramente con el proveedor sobre esta divulgaci\u00f3n, pero no respondi\u00f3 de ninguna manera."
}
],
"metrics": {

View File

@ -8,6 +8,10 @@
{
"lang": "en",
"value": "A vulnerability was found in Tenda AC15 15.03.20_multi. It has been declared as critical. This vulnerability affects the function form_fast_setting_wifi_set of the file /goform/fast_setting_wifi_set. The manipulation of the argument ssid leads to stack-based buffer overflow. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-257668. NOTE: The vendor was contacted early about this disclosure but did not respond in any way."
},
{
"lang": "es",
"value": "Se encontr\u00f3 una vulnerabilidad en Tenda AC15 15.03.20_multi. Ha sido declarada cr\u00edtica. Esta vulnerabilidad afecta a la funci\u00f3n form_fast_setting_wifi_set del archivo /goform/fast_setting_wifi_set. La manipulaci\u00f3n del argumento ssid provoca un desbordamiento de b\u00fafer en la regi\u00f3n stack de la memoria. El ataque se puede iniciar de forma remota. El exploit ha sido divulgado al p\u00fablico y puede utilizarse. El identificador de esta vulnerabilidad es VDB-257668. NOTA: Se contact\u00f3 primeramente con el proveedor sobre esta divulgaci\u00f3n, pero no respondi\u00f3 de ninguna manera."
}
],
"metrics": {

View File

@ -8,6 +8,10 @@
{
"lang": "en",
"value": "A vulnerability was found in Tenda AC15 15.03.20_multi. It has been rated as critical. This issue affects the function fromDhcpListClient of the file /goform/DhcpListClient. The manipulation of the argument page leads to stack-based buffer overflow. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-257669 was assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way."
},
{
"lang": "es",
"value": "Se encontr\u00f3 una vulnerabilidad en Tenda AC15 15.03.20_multi. Ha sido calificada como cr\u00edtica. Este problema afecta la funci\u00f3n fromDhcpListClient del archivo /goform/DhcpListClient. La manipulaci\u00f3n de la p\u00e1gina de argumentos provoca un desbordamiento de b\u00fafer en la regi\u00f3n stack de la memoria. El ataque puede iniciarse de forma remota. El exploit ha sido divulgado al p\u00fablico y puede utilizarse. A esta vulnerabilidad se le asign\u00f3 el identificador VDB-257669. NOTA: Se contact\u00f3 primeramente con el proveedor sobre esta divulgaci\u00f3n, pero no respondi\u00f3 de ninguna manera."
}
],
"metrics": {

View File

@ -8,6 +8,10 @@
{
"lang": "en",
"value": "Meshery is an open source, cloud native manager that enables the design and management of Kubernetes-based infrastructure and applications. A SQL injection vulnerability in Meshery prior to version 0.7.17 allows a remote attacker to obtain sensitive information via the `order` parameter of `GetMeshSyncResources`. Version 0.7.17 contains a patch for this issue."
},
{
"lang": "es",
"value": "Meshery es un administrador nativo de la nube de c\u00f3digo abierto que permite el dise\u00f1o y la administraci\u00f3n de infraestructura y aplicaciones basadas en Kubernetes. Una vulnerabilidad de inyecci\u00f3n SQL en Meshery anterior a la versi\u00f3n 0.7.17 permite a un atacante remoto obtener informaci\u00f3n confidencial a trav\u00e9s del par\u00e1metro `order` de `GetMeshSyncResources`. La versi\u00f3n 0.7.17 contiene un parche para este problema."
}
],
"metrics": {

View File

@ -8,6 +8,10 @@
{
"lang": "en",
"value": "Reflected Cross-Site Scripting (XSS) vulnerability in VvvebJs before version 1.7.7, allows remote attackers to execute arbitrary code and obtain sensitive information via the action parameter in save.php."
},
{
"lang": "es",
"value": "Vulnerabilidad reflejada de cross-site scripting (XSS) en VvvebJs anteriores a la versi\u00f3n 1.7.7, permite a atacantes remotos ejecutar c\u00f3digo arbitrario y obtener informaci\u00f3n confidencial a trav\u00e9s del par\u00e1metro de acci\u00f3n en save.php."
}
],
"metrics": {},

View File

@ -8,6 +8,10 @@
{
"lang": "en",
"value": "Arbitrary File Upload vulnerability in VvvebJs before version 1.7.5, allows unauthenticated remote attackers to execute arbitrary code and obtain sensitive information via the sanitizeFileName parameter in save.php."
},
{
"lang": "es",
"value": "Vulnerabilidad de carga arbitraria de archivos en VvvebJs anterior a la versi\u00f3n 1.7.5, permite a atacantes remotos no autenticados ejecutar c\u00f3digo arbitrario y obtener informaci\u00f3n confidencial a trav\u00e9s del par\u00e1metro sanitizeFileName en save.php."
}
],
"metrics": {},

View File

@ -8,6 +8,10 @@
{
"lang": "en",
"value": "There is Stored Cross-Site Scripting (XSS) in dzzoffice 2.02.1 SC UTF8 in uploadfile to index.php, with the XSS payload in an SVG document."
},
{
"lang": "es",
"value": "Hay cross-site scripting almacenadas (XSS) en dzzoffice 2.02.1 SC UTF8 en el archivo de carga en index.php, con el payload XSS en un documento SVG."
}
],
"metrics": {},

View File

@ -8,6 +8,10 @@
{
"lang": "en",
"value": "SQL injection vulnerability in SeaCMS version 12.9, allows remote unauthenticated attackers to execute arbitrary code and obtain sensitive information via the id parameter in class.php."
},
{
"lang": "es",
"value": "Vulnerabilidad de inyecci\u00f3n SQL en SeaCMS versi\u00f3n 12.9, permite a atacantes remotos no autenticados ejecutar c\u00f3digo arbitrario y obtener informaci\u00f3n confidencial a trav\u00e9s del par\u00e1metro id en class.php."
}
],
"metrics": {},

View File

@ -0,0 +1,24 @@
{
"id": "CVE-2024-29943",
"sourceIdentifier": "security@mozilla.org",
"published": "2024-03-22T13:15:07.440",
"lastModified": "2024-03-22T13:15:07.440",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "An attacker was able to perform an out-of-bounds read or write on a JavaScript object by fooling range-based bounds check elimination. This vulnerability affects Firefox < 124.0.1."
}
],
"metrics": {},
"references": [
{
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1886849",
"source": "security@mozilla.org"
},
{
"url": "https://www.mozilla.org/security/advisories/mfsa2024-15/",
"source": "security@mozilla.org"
}
]
}

View File

@ -0,0 +1,28 @@
{
"id": "CVE-2024-29944",
"sourceIdentifier": "security@mozilla.org",
"published": "2024-03-22T13:15:07.503",
"lastModified": "2024-03-22T13:15:07.503",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "An attacker was able to inject an event handler into a privileged object that would allow arbitrary JavaScript execution in the parent process. This vulnerability affects Firefox < 124.0.1 and Firefox ESR < 115.9.1."
}
],
"metrics": {},
"references": [
{
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1886852",
"source": "security@mozilla.org"
},
{
"url": "https://www.mozilla.org/security/advisories/mfsa2024-15/",
"source": "security@mozilla.org"
},
{
"url": "https://www.mozilla.org/security/advisories/mfsa2024-16/",
"source": "security@mozilla.org"
}
]
}

View File

@ -9,13 +9,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update
```plain
2024-03-22T13:00:38.389982+00:00
2024-03-22T15:00:40.815139+00:00
```
### Most recent CVE Modification Timestamp synchronized with NVD
```plain
2024-03-22T12:45:36.130000+00:00
2024-03-22T14:15:10.807000+00:00
```
### Last Data Feed Release
@ -29,46 +29,50 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
### Total Number of included CVEs
```plain
242432
242443
```
### CVEs added in the last Commit
Recently added CVEs: `7`
Recently added CVEs: `11`
* [CVE-2024-0638](CVE-2024/CVE-2024-06xx/CVE-2024-0638.json) (`2024-03-22T11:15:46.183`)
* [CVE-2024-1742](CVE-2024/CVE-2024-17xx/CVE-2024-1742.json) (`2024-03-22T11:15:46.457`)
* [CVE-2024-1848](CVE-2024/CVE-2024-18xx/CVE-2024-1848.json) (`2024-03-22T11:15:46.633`)
* [CVE-2024-25168](CVE-2024/CVE-2024-251xx/CVE-2024-25168.json) (`2024-03-22T12:15:07.717`)
* [CVE-2024-28559](CVE-2024/CVE-2024-285xx/CVE-2024-28559.json) (`2024-03-22T12:15:07.790`)
* [CVE-2024-28560](CVE-2024/CVE-2024-285xx/CVE-2024-28560.json) (`2024-03-22T12:15:07.860`)
* [CVE-2024-28824](CVE-2024/CVE-2024-288xx/CVE-2024-28824.json) (`2024-03-22T11:15:46.830`)
* [CVE-2024-2448](CVE-2024/CVE-2024-24xx/CVE-2024-2448.json) (`2024-03-22T14:15:08.683`)
* [CVE-2024-2449](CVE-2024/CVE-2024-24xx/CVE-2024-2449.json) (`2024-03-22T14:15:09.210`)
* [CVE-2024-2722](CVE-2024/CVE-2024-27xx/CVE-2024-2722.json) (`2024-03-22T14:15:09.403`)
* [CVE-2024-2723](CVE-2024/CVE-2024-27xx/CVE-2024-2723.json) (`2024-03-22T14:15:09.643`)
* [CVE-2024-2724](CVE-2024/CVE-2024-27xx/CVE-2024-2724.json) (`2024-03-22T14:15:09.857`)
* [CVE-2024-2725](CVE-2024/CVE-2024-27xx/CVE-2024-2725.json) (`2024-03-22T14:15:10.143`)
* [CVE-2024-2726](CVE-2024/CVE-2024-27xx/CVE-2024-2726.json) (`2024-03-22T14:15:10.393`)
* [CVE-2024-2727](CVE-2024/CVE-2024-27xx/CVE-2024-2727.json) (`2024-03-22T14:15:10.593`)
* [CVE-2024-2728](CVE-2024/CVE-2024-27xx/CVE-2024-2728.json) (`2024-03-22T14:15:10.807`)
* [CVE-2024-29943](CVE-2024/CVE-2024-299xx/CVE-2024-29943.json) (`2024-03-22T13:15:07.440`)
* [CVE-2024-29944](CVE-2024/CVE-2024-299xx/CVE-2024-29944.json) (`2024-03-22T13:15:07.503`)
### CVEs modified in the last Commit
Recently modified CVEs: `65`
Recently modified CVEs: `34`
* [CVE-2024-2773](CVE-2024/CVE-2024-27xx/CVE-2024-2773.json) (`2024-03-22T12:45:36.130`)
* [CVE-2024-2774](CVE-2024/CVE-2024-27xx/CVE-2024-2774.json) (`2024-03-22T12:45:36.130`)
* [CVE-2024-2775](CVE-2024/CVE-2024-27xx/CVE-2024-2775.json) (`2024-03-22T12:45:36.130`)
* [CVE-2024-2776](CVE-2024/CVE-2024-27xx/CVE-2024-2776.json) (`2024-03-22T12:45:36.130`)
* [CVE-2024-2777](CVE-2024/CVE-2024-27xx/CVE-2024-2777.json) (`2024-03-22T12:45:36.130`)
* [CVE-2024-2778](CVE-2024/CVE-2024-27xx/CVE-2024-2778.json) (`2024-03-22T12:45:36.130`)
* [CVE-2024-2779](CVE-2024/CVE-2024-27xx/CVE-2024-2779.json) (`2024-03-22T12:45:36.130`)
* [CVE-2024-2780](CVE-2024/CVE-2024-27xx/CVE-2024-2780.json) (`2024-03-22T12:45:36.130`)
* [CVE-2024-2805](CVE-2024/CVE-2024-28xx/CVE-2024-2805.json) (`2024-03-22T12:45:36.130`)
* [CVE-2024-2806](CVE-2024/CVE-2024-28xx/CVE-2024-2806.json) (`2024-03-22T12:45:36.130`)
* [CVE-2024-2807](CVE-2024/CVE-2024-28xx/CVE-2024-2807.json) (`2024-03-22T12:45:36.130`)
* [CVE-2024-2808](CVE-2024/CVE-2024-28xx/CVE-2024-2808.json) (`2024-03-22T12:45:36.130`)
* [CVE-2024-2809](CVE-2024/CVE-2024-28xx/CVE-2024-2809.json) (`2024-03-22T12:45:36.130`)
* [CVE-2024-2810](CVE-2024/CVE-2024-28xx/CVE-2024-2810.json) (`2024-03-22T12:45:36.130`)
* [CVE-2024-2811](CVE-2024/CVE-2024-28xx/CVE-2024-2811.json) (`2024-03-22T12:45:36.130`)
* [CVE-2024-28116](CVE-2024/CVE-2024-281xx/CVE-2024-28116.json) (`2024-03-22T12:45:36.130`)
* [CVE-2024-28117](CVE-2024/CVE-2024-281xx/CVE-2024-28117.json) (`2024-03-22T12:45:36.130`)
* [CVE-2024-28118](CVE-2024/CVE-2024-281xx/CVE-2024-28118.json) (`2024-03-22T12:45:36.130`)
* [CVE-2024-28119](CVE-2024/CVE-2024-281xx/CVE-2024-28119.json) (`2024-03-22T12:45:36.130`)
* [CVE-2024-2812](CVE-2024/CVE-2024-28xx/CVE-2024-2812.json) (`2024-03-22T12:45:36.130`)
* [CVE-2024-2813](CVE-2024/CVE-2024-28xx/CVE-2024-2813.json) (`2024-03-22T12:45:36.130`)
* [CVE-2024-2814](CVE-2024/CVE-2024-28xx/CVE-2024-2814.json) (`2024-03-22T12:45:36.130`)
* [CVE-2024-2815](CVE-2024/CVE-2024-28xx/CVE-2024-2815.json) (`2024-03-22T12:45:36.130`)
* [CVE-2024-2816](CVE-2024/CVE-2024-28xx/CVE-2024-2816.json) (`2024-03-22T12:45:36.130`)
* [CVE-2024-2817](CVE-2024/CVE-2024-28xx/CVE-2024-2817.json) (`2024-03-22T12:45:36.130`)
* [CVE-2024-28171](CVE-2024/CVE-2024-281xx/CVE-2024-28171.json) (`2024-03-22T12:45:36.130`)
* [CVE-2024-28441](CVE-2024/CVE-2024-284xx/CVE-2024-28441.json) (`2024-03-22T12:45:36.130`)
* [CVE-2024-28521](CVE-2024/CVE-2024-285xx/CVE-2024-28521.json) (`2024-03-22T12:45:36.130`)
* [CVE-2024-28756](CVE-2024/CVE-2024-287xx/CVE-2024-28756.json) (`2024-03-22T12:45:36.130`)
* [CVE-2024-28863](CVE-2024/CVE-2024-288xx/CVE-2024-28863.json) (`2024-03-22T12:45:36.130`)
* [CVE-2024-28891](CVE-2024/CVE-2024-288xx/CVE-2024-28891.json) (`2024-03-22T12:45:36.130`)
* [CVE-2024-29031](CVE-2024/CVE-2024-290xx/CVE-2024-29031.json) (`2024-03-22T12:45:36.130`)
* [CVE-2024-29271](CVE-2024/CVE-2024-292xx/CVE-2024-29271.json) (`2024-03-22T12:45:36.130`)
* [CVE-2024-29272](CVE-2024/CVE-2024-292xx/CVE-2024-29272.json) (`2024-03-22T12:45:36.130`)

View File

@ -169462,7 +169462,7 @@ CVE-2021-23433,0,0,b2776fd93a740aec110e19aa61149b3d7fb8ff56c797a923029c3929e2a72
CVE-2021-23434,0,0,ceac5d27ebb108299f54485d441ee80e58c3fc576e68182971e6755ffa745eb1,2023-01-30T18:24:02.727000
CVE-2021-23435,0,0,a93ccb0e71ca4cf74b74b602169866d6d253c2624dfe5b7d1536ef28140796aa,2021-09-23T17:33:28.967000
CVE-2021-23436,0,0,d43e750b60c6d58e450b6a09c83c8b51c21faaa3df37449937c2fd2c44358384,2021-09-10T13:33:17.097000
CVE-2021-23437,0,1,594f8d8574d2535253d24dfb7acfed07aba4e5f32ce03adc22f66570c3b1e985,2024-03-22T11:15:45.353000
CVE-2021-23437,0,0,594f8d8574d2535253d24dfb7acfed07aba4e5f32ce03adc22f66570c3b1e985,2024-03-22T11:15:45.353000
CVE-2021-23438,0,0,a2ba5ddca006c7fb9f995ef32cc1418fd5b76584e1d92ca3d4f11ddb7f0cef46,2021-09-10T15:23:21.947000
CVE-2021-23439,0,0,b93dc0c2aeafbd9e2161bbc111810808ab6b87a725da968c82776f53028a38d6,2021-09-10T19:46:37.847000
CVE-2021-2344,0,0,d1959cac8c46e2b5c2412baeace0d0eec49e23f539e87736dab15004e4c436ac,2021-07-22T22:33:58.470000
@ -191436,7 +191436,7 @@ CVE-2022-22813,0,0,14e619740a9a4770a045635f86e3b2761c5468c2d2be634cc8de3d94aa65a
CVE-2022-22814,0,0,e3eaede5c26fd69dcc699a8b528801d82b3cb928e5ded9594a01199c1dd8e32e,2022-03-15T19:45:27.253000
CVE-2022-22815,0,0,d57ef4407062512fc8feb27b52847428e1f4bc2ea27f2cfa9701949f9b377684,2023-01-31T17:27:36.360000
CVE-2022-22816,0,0,d5952ede1ae505cbae419495ba93a78d823118186eef6fb4b49e894312957deb,2023-01-31T17:41:46.750000
CVE-2022-22817,0,1,c58ba3807735e1898722875705ddbea951451c8b58a32c72807bb32362db4487,2024-03-22T11:15:45.900000
CVE-2022-22817,0,0,c58ba3807735e1898722875705ddbea951451c8b58a32c72807bb32362db4487,2024-03-22T11:15:45.900000
CVE-2022-22818,0,0,4fd33db9036533015bf6c29a2f8f0f4cc47c46a3e640a7c9f42df7aef83e0f52,2023-11-07T03:43:59.953000
CVE-2022-22819,0,0,7e40f131dace9443ee95d247a581f9521ecae37150b490560ba8cffb27685b43,2022-04-15T18:16:34.460000
CVE-2022-2282,0,0,e9697ca1b224a9a3b896349240d60f06f43eac4492774943e345e0ccd051731f,2023-11-07T03:46:24.137000
@ -230285,7 +230285,7 @@ CVE-2023-4295,0,0,ec56fb9406b5889c47288aaf0ca0b50df9da68e8409e0f183bd2d96adf912d
CVE-2023-42951,0,0,f47d9d53b96327a99c3cf9d9b6178395ac7e4f6ffb9fc1067e40ded2ecc60fdb,2024-02-22T19:07:27.197000
CVE-2023-42952,0,0,f7dadd56b6a68a714e4e042690efb1e01d718cc903255fad9804058d56088666,2024-02-22T19:07:27.197000
CVE-2023-42953,0,0,0ea855ba33bbd4297f25ae9925400ebda739241895a723a394f07f9bd3e18595,2024-02-22T19:07:27.197000
CVE-2023-42954,0,1,4ff84847c56efbc3f637425a9807eb7b381f4c2cedb6bf16f12c3ca640d4fba3,2024-03-22T12:45:36.130000
CVE-2023-42954,0,0,4ff84847c56efbc3f637425a9807eb7b381f4c2cedb6bf16f12c3ca640d4fba3,2024-03-22T12:45:36.130000
CVE-2023-4296,0,0,d2ae4b9dc4bd1f62bf026bddbb5b57fabef675b1476686b487fb198d6eb084a6,2023-11-07T04:22:26.050000
CVE-2023-4297,0,0,2c1c4e8e16b8093dbd67367ad04a33c7dee7987a75a3f105a73f15afb0fc121e,2023-11-30T05:15:24.520000
CVE-2023-4298,0,0,8d44cb3045014d8716e0dbcd1489dfd2b845690c0f9918da8a0ecf5aeaadb4f7,2023-11-07T04:22:26.147000
@ -231088,7 +231088,7 @@ CVE-2023-44267,0,0,f716114bc1138d91aaa3aef3879ca1159b5aef8bf9a2ab35b1b476fe4255c
CVE-2023-44268,0,0,0ba2834ae84d2099198b0c2e5a8633114e4ea817e540586788a14e1fff0ff6ea,2024-01-02T19:15:10.403000
CVE-2023-4427,0,0,d877e9fa4ef165a222c97fa3e4f26b62e8234dff613f0155f4530528ed0e28da,2024-01-31T17:15:16.043000
CVE-2023-44270,0,0,5afd2325a69f7ec28483dc127bab6685eed7a7ff12b34b63fa160150c8844ce7,2023-10-10T17:19:55.690000
CVE-2023-44271,0,1,f193f0342a06850015aae273b8901e3f9941649a0fe51ffaf4d332bdffad8f4c,2024-03-22T11:15:46.063000
CVE-2023-44271,0,0,f193f0342a06850015aae273b8901e3f9941649a0fe51ffaf4d332bdffad8f4c,2024-03-22T11:15:46.063000
CVE-2023-44272,0,0,83c2ce194c7d88319574e0a015dc9e0b02900f1ee3d06d815bfe66cd7de4baf8,2023-10-10T13:31:11.370000
CVE-2023-44273,0,0,70fd1482516ce85c19730c580bd0595b26f55bc9cc52f3a7e0c599b6c1f7aeac,2023-10-02T21:06:10.147000
CVE-2023-44275,0,0,311c9a72d382e36b26d1888b7b4c0262b5afa5f6165a6243e6e9644a9ade9670,2023-10-02T18:42:50.667000
@ -238197,7 +238197,7 @@ CVE-2024-0625,0,0,e6db3236f3f3d4946f9c7470ea75c8f4fd101b44f963c82c90bc3a0f21b31d
CVE-2024-0628,0,0,6929f2a7a44b9bc6b3b457ec8d478ddb1d9368f01ad7383ad0399a751f886828,2024-02-13T19:18:46.020000
CVE-2024-0630,0,0,49e9d42e1e8004a90a8d62b54ea8a5d5f6ebecab9fac26e6e82dc914d2e02636,2024-02-13T15:42:35.563000
CVE-2024-0631,0,0,2f5c2ea731c38b842212d56f60f3b6dadcbef37badf95ddbebb4424c79d6cc97,2024-03-13T18:16:18.563000
CVE-2024-0638,1,1,670847b0d970db122b3c23c1c351801a3e9da2204e4d04822c0f94a07c61f9c7,2024-03-22T12:45:36.130000
CVE-2024-0638,0,0,670847b0d970db122b3c23c1c351801a3e9da2204e4d04822c0f94a07c61f9c7,2024-03-22T12:45:36.130000
CVE-2024-0639,0,0,70e6108a4833d98566f9bceea8a86b5fbfb00264d1679279f76ea7c5de48b4aa,2024-02-14T13:15:08.107000
CVE-2024-0641,0,0,a011c2128d997633c3943566b2966020fb742742c755347ad42b0febd95e3094,2024-02-14T13:15:08.363000
CVE-2024-0642,0,0,a90bcf6571ee802087327f525ede816b704f8421563c66e3216693601bbf1072,2024-01-24T19:29:41.893000
@ -238443,7 +238443,7 @@ CVE-2024-0951,0,0,70f9d7a0b27e7f387a1ff2598314019880c5177c538c6128833bb679ac3ee6
CVE-2024-0953,0,0,56fda260ffe976a7ef0af83f343a5276bf8287ea78e25bf62da55b0bd2fa66b4,2024-02-09T16:38:45.380000
CVE-2024-0954,0,0,92d487f8352d875ad7c9643d44b7db6d2cc982c57e78aa26aa47eabfd56c0e18,2024-02-13T19:44:56.887000
CVE-2024-0955,0,0,cfbac7d3febc68cf4fd877d8d46446e6f6653d1e6237b8fd255083aebefa3781,2024-02-14T18:15:04.450000
CVE-2024-0957,0,1,7922b3769391ec8b458fd713641215b05316a324b89aa400aeea2cde81e28aff,2024-03-22T12:45:36.130000
CVE-2024-0957,0,1,b8f649b77bd6304910e8212cad80c7c052ff9790be5337b573c49cdc67104203,2024-03-22T12:45:36.130000
CVE-2024-0958,0,0,bb1de1520fff55b820215353b073f7beca1ac95c14382b0305a1d3b87252c969,2024-03-21T02:51:29.353000
CVE-2024-0959,0,0,b37da110a344aaef12dcd11555873ccf199e6c06da5c5f0b4d2f858f2707809c,2024-03-21T02:51:29.457000
CVE-2024-0960,0,0,90f2c16328a9579861cfb524e15dc7586206117534086ffb1373ad4853812daf,2024-03-21T02:51:29.553000
@ -238968,11 +238968,11 @@ CVE-2024-1720,0,0,3f534b1db2e7b75966562da6fb1d468afac7b86b23a312961b1d896997e21d
CVE-2024-1722,0,0,bbfa2fe804b85c8f73b8225a9811c290a6a29ddc6e06b05c51fd071f985f9060,2024-02-29T13:49:29.390000
CVE-2024-1723,0,0,7e337e59dda9fcfb03cb2d0ee4f7926bbc1a4aeb3afb375b3ac4508c9e5d97e9,2024-03-13T18:15:58.530000
CVE-2024-1725,0,0,ee1fb8cd83e91b3cc554ef61ba8506273bf384217121fa2160f3c7c69e57a993,2024-03-08T14:02:57.420000
CVE-2024-1727,0,1,f4e653a98477d638f895ffe05e108bd41757e63f270b3b4944ff32c3013cd3b1,2024-03-22T12:45:36.130000
CVE-2024-1727,0,0,f4e653a98477d638f895ffe05e108bd41757e63f270b3b4944ff32c3013cd3b1,2024-03-22T12:45:36.130000
CVE-2024-1731,0,0,a54dfdadfcd6666506c62883f073482e904182fadeecad8ff7a349f271e0661b,2024-03-05T13:41:01.900000
CVE-2024-1733,0,0,d9cf8004467e67497b484a605a620c0a0db32312b35f534ec3be854a6ce160fc,2024-03-17T22:38:29.433000
CVE-2024-1735,0,0,fef99247045161df3b08e17c74949b5db371420b96202703c89efa90d1969060,2024-02-26T16:32:25.577000
CVE-2024-1742,1,1,49a014e71feeebf0985e26bc6d9858143440f2617b6f3a9f2dea0afb22280114,2024-03-22T12:45:36.130000
CVE-2024-1742,0,0,49a014e71feeebf0985e26bc6d9858143440f2617b6f3a9f2dea0afb22280114,2024-03-22T12:45:36.130000
CVE-2024-1748,0,0,a1dc98a9081cf73f47d608f84388fd9e1d6663e40c50dbfb283535778827ec26,2024-03-21T02:51:45.040000
CVE-2024-1749,0,0,4b591dad7740802113c665ceda12f8a50246d60996cd4895b30a69f97068386e,2024-03-21T02:51:45.117000
CVE-2024-1750,0,0,2c5d0228a637c37f3f121f1e7fcc9f9b6be5eacb2ceb4e3205185263509a639c,2024-03-21T02:51:45.190000
@ -239035,7 +239035,7 @@ CVE-2024-1834,0,0,34efbd36d642aefb77d373bb68d86d8c401bbf1dbf4148f42d1403ddb4b77b
CVE-2024-1843,0,0,979d0dff9637d9cab00bf6a14f591ee68b79b4ec3300ebdf02b15cf0e8a60188,2024-03-13T18:15:58.530000
CVE-2024-1844,0,0,8eafa490137dd0762fdf2a9173e258dc01143942e9be70a3263d7ca4a0a3afc7,2024-03-20T13:00:16.367000
CVE-2024-1847,0,0,152f4d845ce8c23980172297d934e8efa3d32af4a304d4db000f4175545dd48b,2024-02-29T13:49:47.277000
CVE-2024-1848,1,1,49bc95b83fdcb1de57fb16649e6cabd4575c1a454c9061d01fd7a6bea1c0c44e,2024-03-22T12:45:36.130000
CVE-2024-1848,0,0,49bc95b83fdcb1de57fb16649e6cabd4575c1a454c9061d01fd7a6bea1c0c44e,2024-03-22T12:45:36.130000
CVE-2024-1851,0,0,ac07ab34f3e596527407cf2fcb93e785fa1a213045982c8aadd05f9e543a11a5,2024-03-08T14:02:57.420000
CVE-2024-1853,0,0,d8883604ae63cf7a1fbe4fa65bd3207340a5327b7afe017b25b83cfed4793944,2024-03-15T12:53:06.423000
CVE-2024-1854,0,0,67720ca675e573934fd73c30069aead563244277f4e5c6d2e86973e2c6bd9b5b,2024-03-13T18:15:58.530000
@ -239337,7 +239337,7 @@ CVE-2024-20768,0,0,7801fe19f37e045dfaa63591debdec338bb248ebe98979bd1417c8db12646
CVE-2024-2077,0,0,5ca3f9022129534f614f35499858c838a2901ea9cdb4aa8c5469f82f0ebb4ea1,2024-03-21T02:52:29
CVE-2024-2078,0,0,c5cf1f8224dc1437cc5c72b4c20f193ca60f923ea1195c1e3b8d6f13446a32c9,2024-03-01T14:04:04.827000
CVE-2024-2079,0,0,d19df912ca8f24c4783570207f7ead00a2f333eee11795e142007ff6a5180cfc,2024-03-14T12:52:16.723000
CVE-2024-2080,0,1,9678e6b2bd19e458e9afd4afe23013b56dd990bdf344fb6cc8cb0cebe808ca2d,2024-03-22T12:45:36.130000
CVE-2024-2080,0,1,32a4465f2fc45199bcb0563622cd911532e367b79194bc4a312258059486223d,2024-03-22T12:45:36.130000
CVE-2024-20802,0,0,09b0e538ab7892d37fab32a8e5c61289f6ef8af3dfbdfbb048a6512fa7396094,2024-01-10T16:14:57.787000
CVE-2024-20803,0,0,6c415e68c0cc04850639517c5e65b145b62c937ecdd266efbaf3b8a7e936e490,2024-01-10T16:11:26.313000
CVE-2024-20804,0,0,f961cce5ac55cac12f82f1b9af1706ecad8b5889d74e0d2cb7f3ec9a86f51549,2024-01-10T16:10:45.437000
@ -240425,7 +240425,7 @@ CVE-2024-23479,0,0,347fa1fab90846375f3cbda9f21578cf079b96a3697a975655102d71cb94c
CVE-2024-23488,0,0,57450458303c48f58f7accf28de637666e8c4b38b2ec58f4dc15eb09b92be21a,2024-02-29T13:49:29.390000
CVE-2024-23492,0,0,7ac211a2a1c5c083cd2cd2691020edf3a51548a70085e44c956a49351fc4de8b,2024-03-21T02:52:07.353000
CVE-2024-23493,0,0,91cbf193a715aa0c526237151c4d36164df1ccaf1f366a7cf8bdf551267e12ba,2024-02-29T13:49:29.390000
CVE-2024-23494,0,1,b0caf2085e392cc3bc68ca55116da91c21555e60e2c1de42e26200119e65e7a6,2024-03-22T12:45:36.130000
CVE-2024-23494,0,0,b0caf2085e392cc3bc68ca55116da91c21555e60e2c1de42e26200119e65e7a6,2024-03-22T12:45:36.130000
CVE-2024-23496,0,0,54460b511136d506c1739ae0305dae6652e35c7827e88f55ee2e0b0ef3ab3902,2024-02-26T18:15:07.580000
CVE-2024-23501,0,0,b3e85809586c989dd0a69f1f88e280acf334973e6408d57bc052ae66513752bd,2024-02-29T13:49:29.390000
CVE-2024-23502,0,0,8f894ed7c8e8f8359294a01d255055a873ed16e9a79e2948ed3ac6f5d8f8da9f,2024-02-09T14:46:17.743000
@ -240679,7 +240679,7 @@ CVE-2024-23905,0,0,2d8ebad5c05b335845d8a0c6b27832798a9c27087f41f1dd4daf5a7e2afef
CVE-2024-2391,0,0,5eb10c991275accc4f0c04c536ff0ab64c132e711d4ba9c8aec48c31334f05e4,2024-03-21T02:52:33.807000
CVE-2024-23910,0,0,ee793d9b54a2b016ed958b8f34e12c76d98107f9ab2799f3866e1d534fa290cd,2024-02-29T13:49:47.277000
CVE-2024-23917,0,0,43acd2786eef775b4e5af3da03e8f628e79a58b917087bea0e9c91638665592f,2024-02-09T01:05:22.180000
CVE-2024-2392,0,1,d6265410c66b5a26bb5d104e30cecbc8e0b6530c6a08e2c3c74df1ed21670318,2024-03-22T12:45:36.130000
CVE-2024-2392,0,1,42336a48d6bafcd50dc6522fe24a4d56dee45c4fa6295037e9d4d2226834e64c,2024-03-22T12:45:36.130000
CVE-2024-2393,0,0,8cedba0180a7b00def73b6261f8c72d770c30f1bb7624197b9fba956f17cd30c,2024-03-21T02:52:33.897000
CVE-2024-2394,0,0,51ed08a9d2d11c04bf80b3b8c464e981a2e910ed0b3ed1a99202d774fc30b086,2024-03-21T02:52:33.977000
CVE-2024-23940,0,0,88f3246b7d729e9740dbc7accb734f511d890171cb976d7dde750494e61216dd,2024-02-06T19:19:33.920000
@ -240688,7 +240688,7 @@ CVE-2024-23944,0,0,d7189cd17bc8529e11b77c38b3cbb5d227e8a7f862bb2fe75d66b288543ad
CVE-2024-23946,0,0,32194d05d3f7a3a80cd0b416a872a66ff74b3120ea9e0897100b1fe32331e71d,2024-03-12T17:29:17.243000
CVE-2024-2395,0,0,1fdafc69366cd072c6108b6d86410a63c85cce9eeaa62bcac076c3a2bc3a1766,2024-03-13T12:33:51.697000
CVE-2024-23952,0,0,89289c4c1b03193a134cbe14ed609452617a970c4d8ae9dfbad6f91cd36db610,2024-02-14T14:16:07.460000
CVE-2024-23975,0,1,baeca8d4c06e1a18eea86da121d0a833b4b39a471498d57fc82722b025e37962,2024-03-22T12:45:36.130000
CVE-2024-23975,0,0,baeca8d4c06e1a18eea86da121d0a833b4b39a471498d57fc82722b025e37962,2024-03-22T12:45:36.130000
CVE-2024-23976,0,0,c6327f87e3c19d6c46c6a7ff9e0644c74688322bbd7d7b77f1f15872b56e20b5,2024-02-14T18:04:45.380000
CVE-2024-23978,0,0,50b9b56dcf99994468c287c3928875335c0c7eb104dcf6bd6ec21318911061dd,2024-03-21T02:52:09.667000
CVE-2024-23979,0,0,5e1dc647eec92472a586c7319077fa782b48d632d4a171a926ee19c9f0ee9a24,2024-02-14T18:04:45.380000
@ -240787,7 +240787,7 @@ CVE-2024-24263,0,0,a7faff23323264f34f9c62262fa3f03aa668fa6eb0738632fbcd67b53dcba
CVE-2024-24265,0,0,af394545ccd1a804e78a325f17868ed02a0d7133b6c62faa71b15705be7c579e,2024-02-07T23:06:25.303000
CVE-2024-24266,0,0,af2222be5080c2bad50dea6cff249c7d07d0b0a9a7e6f3a785220071b883839d,2024-02-07T23:28:17.213000
CVE-2024-24267,0,0,95558cbe9d72e85c3d366ac9b6c161da57c7f083ab6736f7e86204c7be33f1c7,2024-02-07T23:28:24.530000
CVE-2024-24272,0,1,8f6883745a139dd4938d495410234eff50fc737ee779757f8e18a902dca99341,2024-03-22T12:45:36.130000
CVE-2024-24272,0,0,8f6883745a139dd4938d495410234eff50fc737ee779757f8e18a902dca99341,2024-03-22T12:45:36.130000
CVE-2024-24275,0,0,5ee5552d1ccdff1349c63c1ee819e4122e7275d9cd64505362d94567de774ca6,2024-03-06T15:18:08.093000
CVE-2024-24276,0,0,c0b996f05c041cdec9f97004ccc67bd94d1c66cbf22b8df3dba73751978abd1f,2024-03-06T15:18:08.093000
CVE-2024-24278,0,0,3f7eb60b847e1971c5f65cb683e6174dee6547147c3195ceb2f7499f12bdbd36,2024-03-06T15:18:08.093000
@ -240846,8 +240846,10 @@ CVE-2024-24475,0,0,da128c239114738663c22cbcb468c90723f598d143228b589356daf690131
CVE-2024-24476,0,0,c6a79e6b679134d6e56eb6290a1a74b009876304d1bc61a6bd2473a9a7f51827,2024-03-21T02:52:10.613000
CVE-2024-24478,0,0,ae4578688dc9e3461c0fdedac5d3a771e3cdb8c7bfd00151650d654178548c13,2024-03-21T02:52:10.653000
CVE-2024-24479,0,0,6fa4dced88a956e3946a50eb9b98a8741313ace42fb10780fb0018f1512f325f,2024-03-21T02:52:10.690000
CVE-2024-2448,1,1,f3220267333f680ed63839d4f9aaa0b4db07d5c9c6e3700855cad8112a4df3a2,2024-03-22T14:15:08.683000
CVE-2024-24482,0,0,d0c5de64fed42524f00b63fd5c9fd6582210b6f756383f7c85fd22e6463f36a5,2024-02-12T17:46:35.760000
CVE-2024-24488,0,0,1834d834c06b744231a786a072c029583b1651fcc4f266317ba3be41edb13e03,2024-02-15T02:23:45.887000
CVE-2024-2449,1,1,6afe6088c073070f165f3f7d3ceaa6053a6561238ffea9b0db222b2a9a305c4b,2024-03-22T14:15:09.210000
CVE-2024-24494,0,0,942a90800617c3456df5cee3b91fb8289ef00c4e11442995fdf45eb40ccdbcd2,2024-02-09T01:37:59.330000
CVE-2024-24495,0,0,85b476ee903b981e44768f930a7e6f08423d0eeff2df2b9bb45af20131c5e4c5,2024-02-22T03:38:09.717000
CVE-2024-24496,0,0,d3af8fed4f9dc5ab516231a6a765383283bf96cc93c20c6077308e5e48b88c15,2024-02-22T03:38:14.123000
@ -240861,7 +240863,7 @@ CVE-2024-24520,0,0,1c17a865e2018472844eee3eeb32382c844b7628a24e3ba8ccf07a6f4355d
CVE-2024-24524,0,0,40ecb02cd326bdc34833c61cf5eb3e9f45f526d45502f51591361c36d1938c63,2024-02-09T16:30:43.830000
CVE-2024-24525,0,0,13b50b322b70c1ba78c523473a9882b44cc13b59455e3e47dd336806a91a1148,2024-02-29T13:49:29.390000
CVE-2024-24528,0,0,184f3e16e059f6b990b79bbe85c13104f1b7059f71d8a1713060531c24aa2c42,2024-02-26T19:15:07.247000
CVE-2024-2453,0,1,1a1e30ab1ddfd877b3c40a8485954e71abb846433897a6c65447e66a0da04466,2024-03-22T12:45:36.130000
CVE-2024-2453,0,1,3516619c9d1ad877533ff47d2854d77f923dcb6e13d6b386a451fa313ccb4d47,2024-03-22T12:45:36.130000
CVE-2024-24539,0,0,f93dd0b0f28d93142ebc045d2b13c802b69814cdafc34403acf2ae3cd69400ec,2024-03-18T12:38:25.490000
CVE-2024-24543,0,0,f516e88d85199344e1e2c4ae69468b4de7248951f71da4710fc97171a286ff1a,2024-02-14T17:13:32.827000
CVE-2024-24548,0,0,9dbe1af5af4a9b865bf88b2a305b739ac231a7ce95c9c8ed04344b3144708c91,2024-02-08T18:53:14.107000
@ -241090,7 +241092,7 @@ CVE-2024-24975,0,0,c403197a52452c60ee17afdfbf9edd4a6993ed059ba65add25a9b2620ac53
CVE-2024-24988,0,0,5be9c22e9d6c42885be25053a8e3f832fee202eb91ce1cb05a36918eae761d1a,2024-02-29T13:49:29.390000
CVE-2024-24989,0,0,39be90963d0952b8475635420a2f64ca0893f9b2941aa846029d2a39bd57b9e9,2024-02-14T18:04:45.380000
CVE-2024-24990,0,0,f549c5a0bfcab6df0ca6e0a5d66e4c65b77814eac3b9adbe63217da37b030524,2024-02-14T18:04:45.380000
CVE-2024-2500,0,1,eeca690a82fee58ccb89521313e0d372bedaedad32c8a23ee2edf63168d49334,2024-03-22T12:45:36.130000
CVE-2024-2500,0,1,f5c841f144cdfe7169c1d4e3da08b5dd9b9f87140741671656f61d60bd0ec54e,2024-03-22T12:45:36.130000
CVE-2024-25001,0,0,c1f11a8c76d43265d10cf34f1d6db6525f3220be11629d1b39a2f52375286f02,2024-02-02T09:15:37.527000
CVE-2024-25003,0,0,81fc44567692de3ff8c7fc733c0c0e2d235894df02bbd6e47e58282e052331c4,2024-02-14T20:15:45.910000
CVE-2024-25004,0,0,7a3e97355ce2dbcf95cced55d21b2139e157cf3c2ca72e6e2fce6c561e1f0059,2024-02-14T20:15:45.980000
@ -241161,7 +241163,7 @@ CVE-2024-25164,0,0,cb09965552a1f390f4064031a22c4e145a720dca523f49b901fb7b90f192d
CVE-2024-25165,0,0,416a8b518b9c4a5742bbec94408d835314b2b53d43ae0a8909f15e16fbbd1a92,2024-02-15T06:23:39.303000
CVE-2024-25166,0,0,129a95ebe90cc2b383c4fe37f7a5c2e5cdcb882bd64dbe64af9759fbd5ff754c,2024-02-27T14:20:06.637000
CVE-2024-25167,0,0,314d29be8aff0effafef809690355662eec6786582244dd076bbe65fcc11776b,2024-03-21T12:58:51.093000
CVE-2024-25168,1,1,4c60c5970e5a6dc00889c796b84dfd134e4159d26b6ab895ebebfb3b8b49de65,2024-03-22T12:45:36.130000
CVE-2024-25168,0,0,4c60c5970e5a6dc00889c796b84dfd134e4159d26b6ab895ebebfb3b8b49de65,2024-03-22T12:45:36.130000
CVE-2024-25169,0,0,085f93c697cbc9b87909098278959f0cd92cdefab08c3f134d9cf1b867f4821c,2024-02-29T13:49:47.277000
CVE-2024-2517,0,0,0441abadbeedd264efa656d79b5db1b209dff164938452b2b5564307f14e6df7,2024-03-21T02:52:35.810000
CVE-2024-25170,0,0,8c10b04ca5b0dc9d98ec03819b8af4a2061c2ed0e688a9769189e27171052682,2024-02-29T13:49:47.277000
@ -241313,7 +241315,7 @@ CVE-2024-25553,0,0,7897cd9b8668fce1d605300c650e28167f9921d03a4fde26bc34f4ebe4511
CVE-2024-25554,0,0,a87c08d7479e0670c1de7ac680e974b7c966b7f12d7b309312798a5acd199088,2024-03-01T08:15:38.107000
CVE-2024-25559,0,0,621d2089e4066088e4f2e7151d4c52b797349073e2e5f4d074059dc172fb61d6,2024-02-15T06:23:39.303000
CVE-2024-2556,0,0,7dda608d4c973332c242425a23922df86f3028261d216807853df92150e28261,2024-03-21T02:52:37.803000
CVE-2024-25567,0,1,bbb8c64eb3dcee3e8e89951734f837d0c3bea66c11459a30529f4c9133593805,2024-03-22T12:45:36.130000
CVE-2024-25567,0,0,bbb8c64eb3dcee3e8e89951734f837d0c3bea66c11459a30529f4c9133593805,2024-03-22T12:45:36.130000
CVE-2024-2557,0,0,bd3cbcd6fdd2bc53d05ad0a21dcf76dc9100645c8cd39cc3bfd0cd796821c2ef,2024-03-21T02:52:37.887000
CVE-2024-25578,0,0,ff68f9ee0e3394b3fa83fe8766f2e044325a5fd043b437de063c0cd80654c610,2024-03-01T14:04:26.010000
CVE-2024-25579,0,0,91953a88eab65ef3b6eb3b0fbea08ce09211ffa83ae8783d4b439f2092b924fc,2024-02-29T13:49:47.277000
@ -241426,8 +241428,8 @@ CVE-2024-2579,0,0,82ab7736c7cd2bae37cca14333922f5ac036820dddbd265831a9ea551e48aa
CVE-2024-2580,0,0,17c770530b9c88c0a0bc27203561d8211df9836f86fe3343fde81a78a162c0d5,2024-03-21T19:47:03.943000
CVE-2024-25801,0,0,86d0a2f88d637a38d728e68507deae5ad1ee66b74383784e4b403b33b5149a86,2024-02-22T19:07:27.197000
CVE-2024-25802,0,0,cb029cdbf03ee0051152f36415381bb55ee304fcb50819490e22f017c52403c6,2024-02-22T19:07:27.197000
CVE-2024-25807,0,1,c1d489498752464908d00a69b000ccd460d21a563d21c07e19126031176b1c9d,2024-03-22T12:45:36.130000
CVE-2024-25808,0,1,ddcb104e0376c8efdf3e08360567a1acc93a07401be091355dfd344d9568dfd0,2024-03-22T12:45:36.130000
CVE-2024-25807,0,1,85b77c366cf2c1b2fb4937292fdfeb60a9ca99d654220e8140288f7d8bd4e1f3,2024-03-22T12:45:36.130000
CVE-2024-25808,0,1,ca13d6f7a3f0ddba59e23086161ff278d84f97c260daa4e5edc64c08473aaaeb,2024-03-22T12:45:36.130000
CVE-2024-2581,0,0,6eca5564f5891085eb56e7f4cce8a941d50b5c5d945724a4654e0a645ab887e7,2024-03-21T02:52:39.600000
CVE-2024-25811,0,0,17589bbc78cc5e463e6c2e2c6ba06158f5e6effb7ffe3523769d8c6653c9997a,2024-03-21T12:58:51.093000
CVE-2024-25817,0,0,8244c17ffec667dd25976664571f96aed86930fb569e330976ea19223cb10648,2024-03-06T15:18:08.093000
@ -241500,7 +241502,7 @@ CVE-2024-25932,0,0,b47ba5ecf2a19427a2d0c7404d84cf9b82c7d738bc913534568255e831392
CVE-2024-25933,0,0,093a19179e6e045a94069a9cabb14922ac900e3b53f12387034c6f0b19d4fd7f,2024-03-17T22:38:29.433000
CVE-2024-25934,0,0,abf29b2c8bd2941b97b5a50ee19174b7389e9c0ccc1df25f4fdb8e591190b306,2024-03-15T16:26:49.320000
CVE-2024-25936,0,0,8effd82663b8db2d960ef33e023d14a22fda9a759a9ee34ebfd84341bfced171,2024-03-15T16:26:49.320000
CVE-2024-25937,0,1,1f88a2f538501c9a5e7330b6711634f15b5e71a777b351782ce36d2d18999cc6,2024-03-22T12:45:36.130000
CVE-2024-25937,0,0,1f88a2f538501c9a5e7330b6711634f15b5e71a777b351782ce36d2d18999cc6,2024-03-22T12:45:36.130000
CVE-2024-2594,0,0,62f22797cf1e847607c0f48ec8428fa7570128cbcbde2cadf780cc6697bdf9c5,2024-03-18T19:40:00.173000
CVE-2024-25940,0,0,81faf8084be28ad3443bfad1349de788b40c215e318cb61e901b3079aac1c24e,2024-02-15T06:23:39.303000
CVE-2024-25941,0,0,ca1cef65d30f17057b47421c2700ecf50e418e7bf4da35eb3fcc2989f17ef1eb,2024-02-15T06:23:39.303000
@ -241755,7 +241757,7 @@ CVE-2024-26529,0,0,ceb7dffe95e5cd49d7bba0e418c1f06e328c8386f0796095312ed90a87d2d
CVE-2024-26540,0,0,617635ef0e8a400c648ca8f83ffa7f30619dec90da8a875f959e523aa0d1f776,2024-03-15T12:53:06.423000
CVE-2024-26542,0,0,84bcc676050237f7706e936cd8d9d490aa0a127cdccddbe7afe739c073267e25,2024-02-28T14:06:45.783000
CVE-2024-26548,0,0,7b31129407d10e539a4174451b23a0f83a48cdb246d6dd13af61036fdc95df1c,2024-03-01T14:04:26.010000
CVE-2024-26557,0,1,ad7f99c48fc96762a0d3e7f15f8b2f76b6c9e61a3219eb9865098d24b51325cc,2024-03-22T12:45:36.130000
CVE-2024-26557,0,1,413b34482d1eed582f272b955524fa71f7b68414d25ad46ae764ef2e2b3412f9,2024-03-22T12:45:36.130000
CVE-2024-26559,0,0,3b7b5127dd0e422a83fadfb79310bdd57e4fb71532d47a597a5aa1449637c0ce,2024-02-29T13:49:47.277000
CVE-2024-26566,0,0,c84607e263dfbb2bafdffa5f1605a228a50fe6eb3d5c21b9f493cf56aab5c61a,2024-03-07T13:52:27.110000
CVE-2024-26578,0,0,631d617cd0985d9923eed32b0cb4b9e9025809830b6a3ca2ef1a468d4f2a7124,2024-02-22T19:07:27.197000
@ -241914,6 +241916,7 @@ CVE-2024-27213,0,0,33892e4d94d0b54e6d4249626fe053cc0b69e36c215b31fa7aad394b03921
CVE-2024-27215,0,0,651ced2c4948681508a9ad090546fd018840608eea0c7482bdd7848315ac417f,2024-02-21T18:15:52.060000
CVE-2024-27218,0,0,c7e909155330ee918ef1bfc60d0a60842268f5244100d74ebd3f7830cb6dafd2,2024-03-15T20:15:08.960000
CVE-2024-27219,0,0,7a0a76842ad14d87eee010cdcc49f2a5889b1688d4e2b22f53088926c2436c2a,2024-03-12T12:40:13.500000
CVE-2024-2722,1,1,82a65376bf568784c58599423375594094c1a6dd82d1367ee1d534d57ecd40bb,2024-03-22T14:15:09.403000
CVE-2024-27220,0,0,05f7f92e2760eddc99f200918af1193f6066d555fdf8748b8c79cea0c03d1787,2024-03-15T20:15:09.010000
CVE-2024-27221,0,0,30d226cc1b28f53b3043707465681fd56b18d560784ced431797bdb9a5a89396,2024-03-15T20:15:09.050000
CVE-2024-27222,0,0,4d7014f731a9b273fc3bdf911c925709a4272fe6575a06a86054132ac7e23a36,2024-03-12T12:40:13.500000
@ -241924,18 +241927,24 @@ CVE-2024-27226,0,0,e9bb2a833fa0468fc09ed7c25714fcd1effc75d684941bfd1b213432ccd67
CVE-2024-27227,0,0,25b75979d509c434d8a1ec02afab54ebb41e39081e3ebb295aeff86f8a83ac15,2024-03-15T20:15:09.153000
CVE-2024-27228,0,0,ac326317e51dc7851c1f82ec4a32af90f437c21efaddc59cfa9f583daaf12379,2024-03-15T20:15:09.193000
CVE-2024-27229,0,0,a723b1ad8491c1fc93802f8fecc343d9d1e4f0951b98a1a99f181cf2ba1aa848,2024-03-12T12:40:13.500000
CVE-2024-2723,1,1,71c589d54710635c25a306da17a45f4fc7bdd7d6e69b30328f7f0254094d35f3,2024-03-22T14:15:09.643000
CVE-2024-27230,0,0,c7763bc0ef3ba362ff27028ad0a4ee6dc51f834ec1d74bc7b4e735a7089dbf69,2024-03-12T12:40:13.500000
CVE-2024-27233,0,0,7b8043ee4b07bedf143f62926829193f3e94b62f5f4f2482d3d5d7a8d5b8b166,2024-03-12T12:40:13.500000
CVE-2024-27234,0,0,3c37943874f6fa961c0722ff27eeaaa90af5bf119e771a7f4501c93ac13ff648,2024-03-12T12:40:13.500000
CVE-2024-27235,0,0,286299f74e536cbf38771d33b6488ac94632f33ebda885a5c2222182d4672636,2024-03-15T20:15:09.253000
CVE-2024-27236,0,0,050a1052e26047f2e5d0b58d8351e3e856ec1c52f1b2daf95f02084addfb027c,2024-03-12T12:40:13.500000
CVE-2024-27237,0,0,952387726c7567ea2371af0e500cab297b027867a108431eaa82a39745a31338,2024-03-12T12:40:13.500000
CVE-2024-2724,1,1,cba43ce3e0f6dc996b6453e111dbad08d6dc09d02bd64a7dd722baaac44e4cb1,2024-03-22T14:15:09.857000
CVE-2024-2725,1,1,ee73384c36e65cc7f1d1b47d02db77c7c5020cab6f136fc5e95f9af9ee6fa73b,2024-03-22T14:15:10.143000
CVE-2024-27255,0,0,07d4523d50b3b6ceec1ed85c31e8859376bfd63a9732f2f4d2cf6e5b4c34b76b,2024-03-04T13:58:23.447000
CVE-2024-2726,1,1,7cd0c91d46f5583dd6bad6f8aa4d86360946360d37fa76ae57f5f6693a3c787c,2024-03-22T14:15:10.393000
CVE-2024-27265,0,0,caf2cbef481f9d0206d06f75a38ca052c5291ba0582e91875cea8f52e6d86a34,2024-03-19T16:52:02.767000
CVE-2024-27266,0,0,f3ab0f27c5fbbc81843b4329fa53134d5b91174cad9bacbbc5dbf01cfacc3864,2024-03-19T16:52:35.400000
CVE-2024-2727,1,1,745dd27a7dca7ee981aab79d40ffecfb69a7ae9786417b50e671247ae87fecd2,2024-03-22T14:15:10.593000
CVE-2024-27277,0,0,eb365bab444835328458e82045190ce3a564e0755801fc1f65f8b5d9bbf59bcb,2024-03-21T19:47:03.943000
CVE-2024-27278,0,0,2ef9546b6eb3a76ad70be700186038d995dd630654759ed72b9b3d10968f6d39,2024-03-06T15:18:08.093000
CVE-2024-27279,0,0,a0a465925dfcee0f633443a4d3db070f2bf023c10d4135b020d1a0fbe76c5a4b,2024-03-12T12:40:13.500000
CVE-2024-2728,1,1,9e3bd97b972921f181bf15e291c906c1c225a7f13fd2f4c0fdd3d1157d3b781a,2024-03-22T14:15:10.807000
CVE-2024-27283,0,0,d0d6cc69e38ce7977029c4d3a011dff4f743808fa73bec6f0327124024522ffa,2024-02-22T19:07:27.197000
CVE-2024-27284,0,0,175f1326a6788bb22369d3d45f083399d573a3449ac45961b1b25c8fedd102cb,2024-02-29T13:49:29.390000
CVE-2024-27285,0,0,0fe4482c13c2e3db37265fee5caab7ccfcdd141d862d09da03f598c92197dec9,2024-03-21T03:15:48.103000
@ -242005,58 +242014,58 @@ CVE-2024-27623,0,0,335934f06c4afd03c24d8ea0f13e9520a06db4e45dc99de31e76f91b777e3
CVE-2024-27625,0,0,e1c123c7cbb72c1152f10bec7c5db687cd4b211c6f1247bce688ef0105bc5f48,2024-03-05T14:27:46.090000
CVE-2024-27626,0,0,06fb1dce28f844815c1d8334673afd42b5ad67647a67d11a7a830eb63a50770e,2024-03-21T12:58:51.093000
CVE-2024-27627,0,0,2adc4718290b7f1d1d408d1d5d79989d398cde78693706b86dff52f1322eb9c4,2024-03-05T14:27:46.090000
CVE-2024-2763,0,1,8e9d345d7389664f80611635b46c2cef2ec874e0b9963bec2a0f291297e78b38,2024-03-22T12:45:36.130000
CVE-2024-2764,0,1,3ec67dc4c0d54764b942178e18d5d6721bd9017d0e5926b52df0eec1f7386756,2024-03-22T12:45:36.130000
CVE-2024-2763,0,0,8e9d345d7389664f80611635b46c2cef2ec874e0b9963bec2a0f291297e78b38,2024-03-22T12:45:36.130000
CVE-2024-2764,0,0,3ec67dc4c0d54764b942178e18d5d6721bd9017d0e5926b52df0eec1f7386756,2024-03-22T12:45:36.130000
CVE-2024-27655,0,0,65a637f75a188da438b32cc13f4600329f3f424dcd0f437c9989c4c9314e002f,2024-03-01T14:04:26.010000
CVE-2024-27656,0,0,2f731c51e226b6152416f771e826d74f69590b91bf713c56222b4fac3d8f2331,2024-03-01T14:04:26.010000
CVE-2024-27657,0,0,6c517d302d2c56a9786119bf2465fe9b50134a18e449436c88637119f49f73a6,2024-03-01T14:04:26.010000
CVE-2024-27658,0,0,de292d8f17e3b6a4b54092716a03244494548bb536dcb3cbcaab392d9ac50e07,2024-03-01T14:04:26.010000
CVE-2024-27659,0,0,490ce783956f55fbb1652cd0208e0f99fff65361983f109fc8e1a66b3e797355,2024-03-01T14:04:26.010000
CVE-2024-2766,0,1,4e487dce8706c2f2c58dd838f16b1ab1ed0d307b3817f352862cd66b8ce76780,2024-03-22T12:45:36.130000
CVE-2024-2766,0,0,4e487dce8706c2f2c58dd838f16b1ab1ed0d307b3817f352862cd66b8ce76780,2024-03-22T12:45:36.130000
CVE-2024-27660,0,0,ebc867d9e8ab77866712caf2c77523ce69fe475473038494b2e093ce6c793b8c,2024-03-01T14:04:26.010000
CVE-2024-27661,0,0,86da8e187830fd36888e5a846b7303cd63252f868f903b0bf7eaad6fbe1ac85e,2024-03-01T14:04:26.010000
CVE-2024-27662,0,0,3251284bf234434361d463758a344d1bc61b65e736c70ed013176b4fc1a3abef,2024-03-01T14:04:26.010000
CVE-2024-27668,0,0,255f8ec9db75a1b2656a5d8885c3aab9aaa34449ee65d35c3a707a7e7b8d15ff,2024-03-04T15:35:25.673000
CVE-2024-2767,0,1,c4f3ef33c6b0b7a202adc2b08ccea44fddb6b9f4eb3379b56c5325411f48ac13,2024-03-22T12:45:36.130000
CVE-2024-2768,0,1,a0d8649edade3cea62cd589aa7d89c8b541c4231222b07201942aa597a0c6f25,2024-03-22T12:45:36.130000
CVE-2024-2767,0,0,c4f3ef33c6b0b7a202adc2b08ccea44fddb6b9f4eb3379b56c5325411f48ac13,2024-03-22T12:45:36.130000
CVE-2024-2768,0,0,a0d8649edade3cea62cd589aa7d89c8b541c4231222b07201942aa597a0c6f25,2024-03-22T12:45:36.130000
CVE-2024-27680,0,0,96c9e2b516bb3c42b6c5a857a748e4b2bf1f8d01976f5c4ab9824d25b192009b,2024-03-04T15:35:25.673000
CVE-2024-27684,0,0,265733b871b65fcd052263479536d66d42340f95cd723628ecb5857c3bcfe5a9,2024-03-04T15:35:25.673000
CVE-2024-27689,0,0,f4ebc1e59160fdab518bfa3aa9af1f1ba832ce6045359e8a975bb23df8ccddfc,2024-03-01T22:22:25.913000
CVE-2024-2769,0,1,7fe73dfd69d5289395228851a3bd91c6545f77090b1bd49bb5f0db9ba01a5abc,2024-03-22T12:45:36.130000
CVE-2024-2769,0,0,7fe73dfd69d5289395228851a3bd91c6545f77090b1bd49bb5f0db9ba01a5abc,2024-03-22T12:45:36.130000
CVE-2024-27692,0,0,96cf609944e6476718d8d1c519869d6f251f131a1b19ff614e15f00c454cdd33,2024-03-01T17:15:07.617000
CVE-2024-27694,0,0,f3214413fbbba6e4989cb23c7682c51f2973a0b48d2e319f7c34a38e30c11001,2024-03-05T13:41:01.900000
CVE-2024-27698,0,0,ac54888b0a03034871f07f7d36cab166990ef3007932a85c3ddd7d9b6a6ab747,2024-03-09T23:15:49.403000
CVE-2024-2770,0,1,7e7140d9f25890806cf91449a03d0e20f31a9461f53f3f18cc97765eb2d421da,2024-03-22T12:45:36.130000
CVE-2024-2770,0,1,91ce0539e2b4c2c9bcbf359ca33c6a5a73fe7b14a0f0e721ae6fc81b19b90cfb,2024-03-22T12:45:36.130000
CVE-2024-27703,0,0,2b79380c63baf4bc3c9abfadfdc13a8325f8dae30b340951dc89a1b9f1e8f730,2024-03-14T12:52:16.723000
CVE-2024-27707,0,0,bd4780ccfe95d75b10e00a8c73b93480b3348a16006d364b38b5efca7ebc67cb,2024-03-08T14:02:57.420000
CVE-2024-27718,0,0,1278a2a8cee5a68342beae95f220d454fcd35e5e3853b311cb50bcc440948ebc,2024-03-05T13:41:01.900000
CVE-2024-2773,0,1,6ba7db1f055b1d4a090709c65b33a53d57dc5daccce5c393bf02d37aeed24901,2024-03-22T12:45:36.130000
CVE-2024-2773,0,1,a496f0cb5087b43beee53b92abbecafaebd5c845457d928b71195576f2802c0c,2024-03-22T12:45:36.130000
CVE-2024-27733,0,0,8d363cf969790e7f98247f28db2e0a162d296bdeea0f77bb77693ca2f7a6137e,2024-03-08T14:02:57.420000
CVE-2024-27734,0,0,3c0f551c79bd519411a50f44170878bc190cec512cea2012a65cd2d3219a1ee2,2024-03-01T22:22:25.913000
CVE-2024-2774,0,1,045088c6fcc4ce8ce2e2f52857710fdd9f6883f68d8d4f06063f93e1f183285b,2024-03-22T12:45:36.130000
CVE-2024-2774,0,1,e75a892829a5218282c8c6828129381997129cc86df474a2b203212e3b5dd76d,2024-03-22T12:45:36.130000
CVE-2024-27743,0,0,69a5e2d8c49bcfbf0b9f2f2f3b35b9cf6afe8c9f20e8371fcf519a2d380509ef,2024-03-13T07:15:36.253000
CVE-2024-27744,0,0,c100d4ba8f49a307e8f166c43dcf72396c641c27bc5c30f424e004f4b4c33d3f,2024-03-13T07:15:36.410000
CVE-2024-27746,0,0,6f3ddced2e2b26bef51987507b4e7466957a803a9da415c8c1c8b245cafe1423,2024-03-13T07:15:36.470000
CVE-2024-27747,0,0,eff635f872515818dfe20352d610bb047327d7f6971e953c63bc92feb6bf3ebe,2024-03-13T07:15:36.523000
CVE-2024-2775,0,1,facfb92b9a28ab475faa0750425cd3c62a1fece721cf804add9539674b8271e9,2024-03-22T12:45:36.130000
CVE-2024-2775,0,1,324304d3daf3f8232d8549c8aac7991bd17ad8e74cddabbe779660d692eff015,2024-03-22T12:45:36.130000
CVE-2024-27756,0,0,aebfc12c95eee1aa3d95acbf6fc8b0650b6e3d2e490fe1817d1c49f0782fe0c7,2024-03-15T12:53:06.423000
CVE-2024-27757,0,0,758da8d428041fb55cda5e8ed49e42184e30c0310dfccc74e01819218179190e,2024-03-18T12:38:25.490000
CVE-2024-27758,0,0,6abe87e0a8905ac150ade2fec85250ff5e7fbf580c101c16b193b98f7d58141f,2024-03-12T17:46:17.273000
CVE-2024-2776,0,1,33aa8f6c65c8e0d5208ad07a463d520a4acd128c6ca52e7c39416f29e2489b08,2024-03-22T12:45:36.130000
CVE-2024-2776,0,1,a2dca86eeda4163cb75b40ad2e671bae21e52f796052ecc38e114bfa3f2fcc33,2024-03-22T12:45:36.130000
CVE-2024-27764,0,0,a6da085213081f41482d74001d5b27250ddae1567bc465fa0f4b1023f8322f06,2024-03-06T15:18:08.093000
CVE-2024-27765,0,0,c9283b485df441e5cf44e98a2bcaa6921e6b7ae7825314dc1fd3bb862197fb6e,2024-03-06T15:18:08.093000
CVE-2024-27767,0,0,23a8031034bde0b5ceee28d38d7f7c79bc1873c7bee50ed7c60a4fb3b3b3ea4b,2024-03-18T19:40:00.173000
CVE-2024-27768,0,0,f75a9e4f3ec0657a1204e738acd041a45f6c9912c901fa6ef316f735a18eab7b,2024-03-18T19:40:00.173000
CVE-2024-27769,0,0,52f20a87bb41ccb822e8aa51a4742f59620ead216e7613c70ab86a27dc4f13e3,2024-03-18T19:40:00.173000
CVE-2024-2777,0,1,c96715e630adf472fe4af7d78ce29db0fa51298e712ef1ab56726ee5c84e34a7,2024-03-22T12:45:36.130000
CVE-2024-2777,0,1,998b4b7c13188d37e17c14a3cf1ac9b7a8c0db094ff8da5f8b7539110d7ac036,2024-03-22T12:45:36.130000
CVE-2024-27770,0,0,190564f325054d14fda5e252d56c9924f1728ab2a93003418609ae86f45cd007,2024-03-18T19:40:00.173000
CVE-2024-27771,0,0,0aee7dce542e3846fc61fcb0b334acd3d3866184b33df64f8377358b3bfecce5,2024-03-18T19:40:00.173000
CVE-2024-27772,0,0,a17826d9a0874c3f3ffc19dd6a14e32a35c360a62820ef43132537b66b4def32,2024-03-18T19:40:00.173000
CVE-2024-27773,0,0,2024b60af24687a3b3ee666dada367802136074a0282a48cfcb9d5e3649d7c7f,2024-03-18T19:40:00.173000
CVE-2024-27774,0,0,faaf7adce2033b4161afd1d606bbef075c5b779f6cc928fc6a617e115b9369f0,2024-03-18T19:40:00.173000
CVE-2024-2778,0,1,a974a1ca9f167f3a4565cac1d7d7e76abf23178a4ff8459eb0b4e4614831d27d,2024-03-22T12:45:36.130000
CVE-2024-2779,0,1,ebc0e0c2e1b62408e5fe8b8e1ce8d77ecd8054b45914a3a73215796bdf90ceb0,2024-03-22T12:45:36.130000
CVE-2024-2780,0,1,57252a332f3fa451052783c032872e6e6ab5737b88f5b417954cd656cc711692,2024-03-22T12:45:36.130000
CVE-2024-2778,0,1,606da7002eecf8b4a69d2bd07186555e4fbaaa2eba41bedbde660e768d517807,2024-03-22T12:45:36.130000
CVE-2024-2779,0,1,a46cbcced54f990ec3ab00dcc310828877345eeeff0a3332adcf6734f8a63516,2024-03-22T12:45:36.130000
CVE-2024-2780,0,1,bdcceeee0c00953c03148d72ca9c4da28e2649db6e5c4d572065a841b8ee9aa9,2024-03-22T12:45:36.130000
CVE-2024-27889,0,0,a24eb09c70fc8e243900497cf84a2002dc9fb9fdcf0cc7381ab2bee2e01200d8,2024-03-05T13:41:01.900000
CVE-2024-27894,0,0,249999fc9487c1b63574e09bae3fbcbcdf7b20ef335df69d9151a0f5ea4d74a1,2024-03-13T12:33:51.697000
CVE-2024-27900,0,0,00f9885d5a06fec36b56a14fdc3be21ddc255c1561a408e91e09aee1b7ac8b37,2024-03-12T12:40:13.500000
@ -242071,7 +242080,7 @@ CVE-2024-27916,0,0,57603b4ae0cd7b53b3d4b7465c5e0da26ce7f8961f1ab6e4b1173461736f1
CVE-2024-27917,0,0,af242c2d21e7486c1314f58994d4b13c43efcfe28649da8aeb5e5a5a818348df,2024-03-06T21:42:48.053000
CVE-2024-27918,0,0,3664ec04f7d9a719220c7fe5f6ddc241af99de6538768ed6a6d6b43526064a3c,2024-03-21T12:58:51.093000
CVE-2024-27920,0,0,f0490af99419d039a483091f0cc2cfbd25508df9b9a1d7fb05a10eecef5acab6,2024-03-17T22:38:29.433000
CVE-2024-27921,0,1,1c81355f605d7298cbc75753b2712a3de8e2ce04eb2251f7609b0efa7c732356,2024-03-22T12:45:36.130000
CVE-2024-27921,0,0,1c81355f605d7298cbc75753b2712a3de8e2ce04eb2251f7609b0efa7c732356,2024-03-22T12:45:36.130000
CVE-2024-27922,0,0,d5b1b9b28631478cfaa086e0b605c7345d21c041c30a4843fe35c87fffd7f1e1,2024-03-21T12:58:51.093000
CVE-2024-27923,0,0,e143436c1fef289cd65d521e6631dc8531653f791ec9727bdb454c80c71c0113,2024-03-21T12:58:51.093000
CVE-2024-27926,0,0,437c3e91ee05045eaf3d785b863914fe91cf5cded7548ad0feea1f658c0072c4,2024-03-21T12:58:51.093000
@ -242111,53 +242120,53 @@ CVE-2024-27995,0,0,31db9c3046ef3b6826fd04aab15586376d26e0b529bdf84ce7eba17bac569
CVE-2024-27996,0,0,79cff30308b011c07df476cb18acc5ff1830e7bf17b14d1ca5a0d9446fa716b8,2024-03-20T13:00:16.367000
CVE-2024-27997,0,0,b42c7cf4751e4a11a6e5eeb90c0df264fce89958ee556b8b06894cd2e68b11ce,2024-03-20T13:00:16.367000
CVE-2024-27998,0,0,325b1a8419d02931fcb08c1286afe5c33e53c5bf8527e201a365155e360914cf,2024-03-20T13:00:16.367000
CVE-2024-28029,0,1,781afd937b61df54fd314f4ba8460c1b1f1017ea2f6e7c3cf626f19494a3effc,2024-03-22T12:45:36.130000
CVE-2024-28029,0,0,781afd937b61df54fd314f4ba8460c1b1f1017ea2f6e7c3cf626f19494a3effc,2024-03-22T12:45:36.130000
CVE-2024-28039,0,0,9ef35c96ff38e007b2fd4f37c3f1f5b6d35461c4eaa69f2b36faccd438b26411,2024-03-18T12:38:25.490000
CVE-2024-28040,0,1,92dbc878ad6b57fc9235f8005b7929f517428204d8ea6a98b01d4757cc97218d,2024-03-22T12:45:36.130000
CVE-2024-28045,0,1,f398328ae0e32872e31247004b322ba0fa2d2bf6f860a8ec81e7f59b3326d256,2024-03-22T12:45:36.130000
CVE-2024-2805,0,1,fc63f22995409f2bc7ff14d7f844a811dc346d07877d7d88c8afd5f48c0db065,2024-03-22T12:45:36.130000
CVE-2024-28040,0,0,92dbc878ad6b57fc9235f8005b7929f517428204d8ea6a98b01d4757cc97218d,2024-03-22T12:45:36.130000
CVE-2024-28045,0,0,f398328ae0e32872e31247004b322ba0fa2d2bf6f860a8ec81e7f59b3326d256,2024-03-22T12:45:36.130000
CVE-2024-2805,0,1,fa896267355e8bee60ef45369bdd61a50def95efdfa5e824724b711a08ae74dc,2024-03-22T12:45:36.130000
CVE-2024-28053,0,0,e281ed045d826247c32c0ccef204d2c431b80f755e75c928bfd444d7e8497772,2024-03-15T12:53:06.423000
CVE-2024-28054,0,0,fd5e34ddafff629285a62ddb2d3b6251633211261857e076506fc9aaf016b6b2,2024-03-18T19:40:00.173000
CVE-2024-2806,0,1,4a4707e466551637d1bcdfdd6f8851e1097209b178419424f546f6f15bf62eaa,2024-03-22T12:45:36.130000
CVE-2024-2806,0,1,ee2a3df13c9881f0ddb0b5f20a752896870d80612aaf1a24443be94364044cd4,2024-03-22T12:45:36.130000
CVE-2024-28069,0,0,bc55065fc354d40d7b16dc028d30e9ac9c120daebe64d1e74cc55e5aec96ab01,2024-03-17T22:38:29.433000
CVE-2024-2807,0,1,87f036302b6385803dec6e4011d23218a734cc9b85abf9333798ea7b16795149,2024-03-22T12:45:36.130000
CVE-2024-2807,0,1,f2c323deb85ff9f1ab7a51c5efe803041bccdbfb1d2adaa456d10815ef5c4850,2024-03-22T12:45:36.130000
CVE-2024-28070,0,0,d9b3309fdc4db05937449ae85d6df93a299898f40c2c79f5bb7988f4ebb25838,2024-03-17T22:38:29.433000
CVE-2024-2808,0,1,6d47c64f951b7b39758a32a5b85985c11519478c48276ec3f58102bb32bc7ec0,2024-03-22T12:45:36.130000
CVE-2024-2808,0,1,6027ecfddc15b059d6d866792d8d76c33953c7b9cc4ae1182ffc1c468a0cb669,2024-03-22T12:45:36.130000
CVE-2024-28084,0,0,82d4f9747e3f13eb0c41724a23d451f171722689bff23fc05fa8397eb3709338,2024-03-16T02:15:09.157000
CVE-2024-28088,0,0,d2f20b1069b24ba10d21e8bf3b61c2c6a1c6b345ff59786676752b80abbde7a4,2024-03-13T21:16:00.380000
CVE-2024-28089,0,0,830991c1dd5898b6a817a3f8bb8784922af3636f20b8b62ba1c918d5d83f6f10,2024-03-11T01:32:29.610000
CVE-2024-2809,0,1,789bba78355f835a7289f03885fc55843211d87c54e3ead3d9fa776d189eb52a,2024-03-22T12:45:36.130000
CVE-2024-2809,0,1,c444e537b8319cff2a830f39e2e15a89baa73a39187ef19ae5ca728af647f25a,2024-03-22T12:45:36.130000
CVE-2024-28092,0,0,67823fb0fbf08abafb7c7a38f47eac7c626c2d2412f357d855f86b0f67fb9779,2024-03-20T13:00:16.367000
CVE-2024-28094,0,0,45821c38270b8552e50f50b73436d99164a20d22d9b4b8876276d92b2a0a88d9,2024-03-07T13:52:27.110000
CVE-2024-28095,0,0,cc359d20cf58cf4c4e6a4bc345ac1d1135a557dfb7920f405bfe639456bcfe46,2024-03-07T13:52:27.110000
CVE-2024-28096,0,0,bd233bb77c2105c8f9ae41f3196895f407f421cf037a91cc0eb753e3f00e4372,2024-03-07T13:52:27.110000
CVE-2024-28097,0,0,ad0a3d7a6b96970687d28d32c41921c3200422c4265f25f269de512c4cb8079e,2024-03-07T13:52:27.110000
CVE-2024-28098,0,0,e6bafc5c1852b134e115137ad3427dd38b064af4ce40b8aa45bfc1cdd7573337,2024-03-13T12:33:51.697000
CVE-2024-2810,0,1,db012505533f7dcd60ec7732e9c8ea929f9ba15890ac92080ebfb32e00a788c1,2024-03-22T12:45:36.130000
CVE-2024-2810,0,1,b92d6e3c897f758ac7040d83811d4a7f895aec8457cffb8c1afb1549e2cbf96d,2024-03-22T12:45:36.130000
CVE-2024-28101,0,0,e11a50d18e90b930590d2818b294820a502a44e40046d3b082407cc261fb1fa1,2024-03-21T12:58:51.093000
CVE-2024-28102,0,0,5173038e442300ac4f9841553f79acc51f599800474c7e2979929429acf935f8,2024-03-21T12:58:51.093000
CVE-2024-2811,0,1,570e251ebab794f8489a1cbca814d0c65eb8dddddde71288631f31f5eebd7bd8,2024-03-22T12:45:36.130000
CVE-2024-2811,0,1,f7057bb7f00ea7a6844ea17aaf27f5b41bb400a788aa8b2ef4be0037da4fe7f5,2024-03-22T12:45:36.130000
CVE-2024-28110,0,0,0aa63c709bee34101fee09332c67840fa8b7d5aea01ed58b7f238cd7f26f2f87,2024-03-07T13:52:27.110000
CVE-2024-28111,0,0,ef109000cb681b8950a504435d888106cd334990070bd9ca1f33bba165c1974a,2024-03-07T13:52:27.110000
CVE-2024-28112,0,0,13394bf321439a7b80b31ae63012fb69faf271f01573bdf4d69e6f1d90267eaa,2024-03-13T12:33:51.697000
CVE-2024-28113,0,0,4285de229101312bf59190b9237f9b0ffa56ca0930f139097955359a41ebcab5,2024-03-13T12:33:51.697000
CVE-2024-28114,0,0,7da8b099613e387d1a8ac16fa6023879524d5796fc9bbb4a91069a4438dcd4dc,2024-03-13T12:33:51.697000
CVE-2024-28115,0,0,3e0e705412ec4ecfb9fabefcb95634cd838a6bf7c9c03087d677ba199986f693,2024-03-08T14:02:57.420000
CVE-2024-28116,0,1,d2ac398591c4a66db85750af35916cc58b0a261e6ff894693072c47916895ffd,2024-03-22T12:45:36.130000
CVE-2024-28117,0,1,4aafb05dd8917575e853c7560b44eacf554ccd0bc88b839cfe2fe2962d5fe2ed,2024-03-22T12:45:36.130000
CVE-2024-28118,0,1,c9ecc84dbe9d9ad42051bededf9f72daf1695609dd82764a5c0b508ec68da240,2024-03-22T12:45:36.130000
CVE-2024-28119,0,1,9e20f1c76dd208cea9dee85f1085497184d5efb0680399f9869e2c210cfcdef6,2024-03-22T12:45:36.130000
CVE-2024-2812,0,1,5e3baf2dc6ea20372caf670c7e2fa292fd1c6cd5fa001c3eb3d67e1c5f43415f,2024-03-22T12:45:36.130000
CVE-2024-28116,0,0,d2ac398591c4a66db85750af35916cc58b0a261e6ff894693072c47916895ffd,2024-03-22T12:45:36.130000
CVE-2024-28117,0,0,4aafb05dd8917575e853c7560b44eacf554ccd0bc88b839cfe2fe2962d5fe2ed,2024-03-22T12:45:36.130000
CVE-2024-28118,0,0,c9ecc84dbe9d9ad42051bededf9f72daf1695609dd82764a5c0b508ec68da240,2024-03-22T12:45:36.130000
CVE-2024-28119,0,0,9e20f1c76dd208cea9dee85f1085497184d5efb0680399f9869e2c210cfcdef6,2024-03-22T12:45:36.130000
CVE-2024-2812,0,1,725668bb1af5965a2ff682c3f561041410c4fda1c53d7867a7827ddf8d1232e8,2024-03-22T12:45:36.130000
CVE-2024-28120,0,0,1945ab744b479cd2a55b16e82913f94d84bcc236918a39e22cfe06aca7010c4c,2024-03-12T12:40:13.500000
CVE-2024-28121,0,0,6ad3b99e4c8dd1459c44e51d2edc62f08f0aa4d5ffd25ea4a2fe7aa5af2916e8,2024-03-13T21:16:00.460000
CVE-2024-28122,0,0,3209f9a611aea4804720e8e5b4eeb3a02772982f302e787ac8040299af464092,2024-03-11T01:32:39.697000
CVE-2024-28123,0,0,dfd9df3abc549b63a4493e5b0d3ca5d363816f355d7deaee3d34da1ecc59baf6,2024-03-21T12:58:51.093000
CVE-2024-28125,0,0,48170c214569f7f7bd3fe8e6fc82db281b481f061afde6074b351e6aca43c615,2024-03-18T12:38:25.490000
CVE-2024-28128,0,0,ef4664596358b3dc6747b9cba3aab3612190b1b010cfc8ac1373f0312ebe3b50,2024-03-18T12:38:25.490000
CVE-2024-2813,0,1,65a366e67db852bf8b526f40aaa357784e53cd9d136e8d35f0954ede68bdf198,2024-03-22T12:45:36.130000
CVE-2024-2814,0,1,b4d64b56998f48b6ea81b2b2c425aab430d1092461ede1375b23080b666a31df,2024-03-22T12:45:36.130000
CVE-2024-2813,0,1,41f622d3818c235aeeb8b453b0941529950bc244d596eaa13ec62faea5fa8533,2024-03-22T12:45:36.130000
CVE-2024-2814,0,1,455d042c3aaebfc459d831c1e9bb12785314655c18988496f7491ce911b2b4bd,2024-03-22T12:45:36.130000
CVE-2024-28149,0,0,bb1327eb2ceb44ae2cc8e952fde2f54b109f1740591e1ece1b912c644025402b,2024-03-06T21:42:54.697000
CVE-2024-2815,0,1,897f2753d365111b0c9fa024605c8f418838ccaa86fe8d43e737fb0463edb5ec,2024-03-22T12:45:36.130000
CVE-2024-2815,0,0,897f2753d365111b0c9fa024605c8f418838ccaa86fe8d43e737fb0463edb5ec,2024-03-22T12:45:36.130000
CVE-2024-28150,0,0,bd9c785686979f74fc956d3a9d80b65ba208ec849a10e17a7f0c9226761980a2,2024-03-06T21:42:54.697000
CVE-2024-28151,0,0,473d59d35d2166d8f0877541c6be6e5f16e5683e6e89c2ed65e060f312f6c9a8,2024-03-06T21:42:54.697000
CVE-2024-28152,0,0,a7b9fa0093cb4672504036fe1d6553f752def5272f8858d8d1fc301b9a327c4d,2024-03-06T21:42:54.697000
@ -242168,13 +242177,13 @@ CVE-2024-28156,0,0,1a4b3b2ef5e0daf541e96843c1c989bc4abe70122fe584c4af87150c4b6d1
CVE-2024-28157,0,0,ed8ebbe5fee0f55a8a4fde9d919001d31436455287216eb740cac4690bdc29f2,2024-03-06T21:42:54.697000
CVE-2024-28158,0,0,26b253f18727ee3caf630e107a7a89e61a580a0db3fe2a0ced2ad90bc360e7a9,2024-03-06T21:42:54.697000
CVE-2024-28159,0,0,03ab5419913406dda33ba2555a6f6cb8daff27a74103bcc7559c9bf5674b1cce,2024-03-06T21:42:54.697000
CVE-2024-2816,0,1,2f254252d972979909dc24db0485913750de905e9e843a635b66c83756605a0d,2024-03-22T12:45:36.130000
CVE-2024-2816,0,0,2f254252d972979909dc24db0485913750de905e9e843a635b66c83756605a0d,2024-03-22T12:45:36.130000
CVE-2024-28160,0,0,56d3ee6a5af0d0e09e6c9aa1c04c5e7191044a0b97474702c1a3af2bea0d6256,2024-03-06T21:42:54.697000
CVE-2024-28161,0,0,a8b5439e973c7cdb8f91b0ae68db3c77b6c3c773d21694d3bca0cd7aa286762f,2024-03-06T21:42:54.697000
CVE-2024-28162,0,0,9f95dea899a301f3d7e776202ce6567032bc57cf37ea2c387cd5d210ccf05a4b,2024-03-06T21:42:54.697000
CVE-2024-28163,0,0,e6f158d88c83d394762ccab484b2ad85c85d5028e78ed16fd0744829e8f59484,2024-03-12T12:40:13.500000
CVE-2024-2817,0,1,0a0027830647612beb9b287e8d4ab5d722da0a12174e7f01d50026442ee3b289,2024-03-22T12:45:36.130000
CVE-2024-28171,0,1,c1f19d20247dc1e3f04cbf911cc73142848c14a173b812d8f71f312ba63d2b48,2024-03-22T12:45:36.130000
CVE-2024-2817,0,0,0a0027830647612beb9b287e8d4ab5d722da0a12174e7f01d50026442ee3b289,2024-03-22T12:45:36.130000
CVE-2024-28171,0,0,c1f19d20247dc1e3f04cbf911cc73142848c14a173b812d8f71f312ba63d2b48,2024-03-22T12:45:36.130000
CVE-2024-28173,0,0,e0fed71b03fa1080cdfc47a71a0b80da5e87b19e624557c11c0e172f4b2c098a,2024-03-06T21:42:54.697000
CVE-2024-28174,0,0,fa1674b985861bddf4d0ff5ab075ec0e4328a9665c668bfe339f9f0de580d6b1,2024-03-06T21:42:54.697000
CVE-2024-28175,0,0,c8f25bff8e97476e2963865ef2e9cf777aae8f2ef724b2ba6f372c990cea8179,2024-03-14T12:52:16.723000
@ -242249,17 +242258,17 @@ CVE-2024-28429,0,0,caaa64487b84149266e9e941a72e13f93e6070c94b1fe7355fb56db4eb5b2
CVE-2024-28430,0,0,bf34fb49e742ebf9176808c1e05b7467ed1662a29a5c18afe29f976454928e37,2024-03-13T14:28:45.217000
CVE-2024-28431,0,0,148c6be422e12f315897bdd57f5208c74e8137e452c7019eafe29f97f527c418,2024-03-13T14:28:45.217000
CVE-2024-28432,0,0,4bc8c3df18623e8712ef966fb24c80f6754436b2eb6a0c14d5d3c56f5a161090,2024-03-13T14:28:45.217000
CVE-2024-28441,0,1,976e68ff1b522e8dc25f7777b3923699bbfd5550546f2a6e75c4323f9b8406be,2024-03-22T12:45:36.130000
CVE-2024-28441,0,1,5f38f329aa34d3551b4435a62b00ae0d72806d981cac257e26fcd8895c19c6be,2024-03-22T12:45:36.130000
CVE-2024-28446,0,0,e3b0d814ee24ce9a2740eda808696f714c3071d6722fa7bd76f62923d12a194d,2024-03-19T13:26:46
CVE-2024-28447,0,0,729795bf39bd106c71b5b798b10fa8f526cc5d6a6eb2785b0edfa8459a535a4c,2024-03-19T13:26:46
CVE-2024-28521,0,1,8ab5b6bd1cc025dda03cab07eeddd7e1f81756c34e55025f1870bf6a0feb8a5b,2024-03-22T12:45:36.130000
CVE-2024-28521,0,0,8ab5b6bd1cc025dda03cab07eeddd7e1f81756c34e55025f1870bf6a0feb8a5b,2024-03-22T12:45:36.130000
CVE-2024-28535,0,0,174c70ce71a26af929a40c7b6a103a5242ac3321f34f35a982d598e918b67152,2024-03-21T20:58:46.217000
CVE-2024-28537,0,0,ff6bf2a37289dca28bccb57e311acb6479e1a577841d298af6b3b484403dfc2c,2024-03-18T19:40:00.173000
CVE-2024-28547,0,0,a2de8a258b087cbf7c5442c921d96afce5895db417e9c628fe7656334d2bb7cc,2024-03-18T19:40:00.173000
CVE-2024-28550,0,0,55b413fc03c0e6dbaa5c4b6ccf0c8e244ea995bce860e043c8086ce78f470aae,2024-03-18T19:40:00.173000
CVE-2024-28553,0,0,f74a5d2edd657e610cfc2b884ed1530d128afd106cc0a285c1f4868830f65cd2,2024-03-21T20:58:52.357000
CVE-2024-28559,1,1,0614f972b1018fef175a5be020062e1808da1307fa27e18c6ccd6df48da36c98,2024-03-22T12:45:36.130000
CVE-2024-28560,1,1,71f09d4b510ed852efc3bf9ad75f579a4bfcb9f31e97c96f2bbf400031737ddc,2024-03-22T12:45:36.130000
CVE-2024-28559,0,0,0614f972b1018fef175a5be020062e1808da1307fa27e18c6ccd6df48da36c98,2024-03-22T12:45:36.130000
CVE-2024-28560,0,0,71f09d4b510ed852efc3bf9ad75f579a4bfcb9f31e97c96f2bbf400031737ddc,2024-03-22T12:45:36.130000
CVE-2024-28562,0,0,91433a4c4f462713402770533ad7f25e56b67cc00fab70587df3692124b0273d,2024-03-20T13:00:16.367000
CVE-2024-28563,0,0,a656ef0aa8710291541ea7c711ec135274e970f2c247f821eefbeaee78f8b4d1,2024-03-20T13:00:16.367000
CVE-2024-28564,0,0,2abccbe60536fbfc04ad1cc3dd03bdffb43e6097953ebe8e099f5edfe9491595,2024-03-20T13:00:16.367000
@ -242316,11 +242325,11 @@ CVE-2024-28746,0,0,4e08f19b517756fb15fbaf966494c1aeec3b9803b4e2b615b4d5a557eb48c
CVE-2024-28752,0,0,b6856abb589c0fed02798f341901c4f3025e287fced11706e9fa0c89b392cd6a,2024-03-15T12:53:06.423000
CVE-2024-28753,0,0,73ca850c1b6879daba607bc61d7d16457b56173a47004b8bff799b514a526c36,2024-03-11T01:32:39.697000
CVE-2024-28754,0,0,9281349f951cf3fa92b3f484f1e5f3e3b9f20229dcabe6872ba34e9bebaf3b2c,2024-03-11T01:32:39.697000
CVE-2024-28756,0,1,25c89ab9b64cbd69060fc1b1f68e4f1c76ee574185097dbf9146fc8b2b315bf5,2024-03-22T12:45:36.130000
CVE-2024-28756,0,0,25c89ab9b64cbd69060fc1b1f68e4f1c76ee574185097dbf9146fc8b2b315bf5,2024-03-22T12:45:36.130000
CVE-2024-28757,0,0,83cb6aefc1d6f4ccc5441198cdfc19ec27b4e109d2bc2864c936baa137f8e197,2024-03-19T03:15:06.893000
CVE-2024-28816,0,0,4b9f923b99f4095b32672af0003c81bae1f3b3136774827600fae7accfedcfe3,2024-03-11T12:47:42.653000
CVE-2024-28823,0,0,d5aa89b5cdac6c3847ac374cba2a65b191e57c43dc618aabb1da571ab5b5e9dc,2024-03-11T12:47:42.653000
CVE-2024-28824,1,1,29abf61aa992ee5bcede73dcd8363195f5ccb0f240073ed24aaff3a2acefaab4,2024-03-22T12:45:36.130000
CVE-2024-28824,0,0,29abf61aa992ee5bcede73dcd8363195f5ccb0f240073ed24aaff3a2acefaab4,2024-03-22T12:45:36.130000
CVE-2024-28834,0,0,841718fd8fddff124f231102263dad7d394e02b19e9697b20d411d85f567df2c,2024-03-21T15:24:35.093000
CVE-2024-28835,0,0,807354fa6b4609be92d801df299988ca81259642594a0e94cba8cafe4de90346,2024-03-21T12:58:51.093000
CVE-2024-28847,0,0,77ca7298b6799783b77992e414cebfaaf69a1bd2c05124cbdf6b914d3e0bb310,2024-03-17T22:38:29.433000
@ -242331,16 +242340,16 @@ CVE-2024-28854,0,0,8cb03aded6b194ffbf5e93b6a999bfbf01ac8f736343c4fc752b0e38a8bc9
CVE-2024-28855,0,0,2384a3330fde47f752f152bfa13a6226cb6b236bb18ff2466f5e886c7d3e893c,2024-03-19T13:26:46
CVE-2024-28859,0,0,2d0407c7b83f2786a493b842ae3fe3ce3f906494adee8b0e0f61c75557fcb17c,2024-03-17T22:38:29.433000
CVE-2024-28862,0,0,b0dc40150b0e5f15633ecb26c2614b37fe6eefbb423911349887989b36d78640,2024-03-17T22:38:29.433000
CVE-2024-28863,0,1,33cbbf67a6b437203d309628d3d537a6b47c1cb683d591c7900be213668d8e76,2024-03-22T12:45:36.130000
CVE-2024-28863,0,1,ad7818a88579939a8a2c9b467548624411262308646c7865759640aa6d437826,2024-03-22T12:45:36.130000
CVE-2024-28864,0,0,6556868d08f3b43cf56ee8c0e31629a1275e8137bc2387bf2430488f9854bd36,2024-03-19T13:26:46
CVE-2024-28865,0,0,346bb195552b29118071ab302fbe331daaaa3a5da7b31ab976886613f922d084,2024-03-19T13:26:46
CVE-2024-28868,0,0,4e3489f3c96f97bc271ff7282115c7f5d25e2aa392efe0c1c5842c72ee9986bf,2024-03-21T12:58:51.093000
CVE-2024-28891,0,1,0aa614d18123b6bc2c76e9c8b5d356a2e7d71bba766bbf9db36fdc818df4c91d,2024-03-22T12:45:36.130000
CVE-2024-28891,0,0,0aa614d18123b6bc2c76e9c8b5d356a2e7d71bba766bbf9db36fdc818df4c91d,2024-03-22T12:45:36.130000
CVE-2024-28916,0,0,3588de3801d3f24953276fa6b57f2d684fb38fc8b3ed3ad7d8613e127e6022b7,2024-03-21T12:58:51.093000
CVE-2024-29018,0,0,996b521b7d9365d8d41596984cc4ea0a166d70f0fc41d183b4857a8a3632cdd4,2024-03-21T12:58:51.093000
CVE-2024-29026,0,0,ae12b0436e3ecdf28001034b69d1ac66de23f0f8b6b646a25aa4e89d5c652db8,2024-03-21T12:58:51.093000
CVE-2024-29027,0,0,0443c0a5c3d136c6828a405e5e82a90c05a4f9edd7fbc1d30ba3bd5c5a4c0f72,2024-03-20T13:00:16.367000
CVE-2024-29031,0,1,9302b2ee09da537335f863dd7585d2a39e8c57343a4b7674706de55ef03c5756,2024-03-22T12:45:36.130000
CVE-2024-29031,0,1,7f58d37a0fe973dfcea39547446f82cfc81d56a030b41fe804de053f1e911236,2024-03-22T12:45:36.130000
CVE-2024-29032,0,0,fb02d2202c95545e773ec7caf494a1bc4414b85dfda56ba00a602bc4c558e262,2024-03-21T12:58:51.093000
CVE-2024-29033,0,0,3da47380cd3a71a38fcec215b864d4658478d80ec3a2925a5a05224fec9ea170,2024-03-21T12:58:51.093000
CVE-2024-29036,0,0,9e006ee4d248b12879916fd5a38e3fbf7a89f45ed6265666710ccd15d4bd0aa4,2024-03-21T12:58:51.093000
@ -242401,10 +242410,10 @@ CVE-2024-29156,0,0,98cbc37d07cb77607ab83580cc50ba5a01141613b7a3bb770966a3d6831e2
CVE-2024-29180,0,0,e32bebc90fbd05fe3a3edfae9506df906c8ca56e295fcb3cc3f3f384d12528c8,2024-03-21T19:47:03.943000
CVE-2024-29243,0,0,80b3eab65af2d9fbeb7b6048e074697688a19de63e1138c377d0b826523dd7db,2024-03-21T15:24:35.093000
CVE-2024-29244,0,0,ab4dadc4ff7b45a2c285edb922de956bae0828f007627c62339f15145e95a7b7,2024-03-21T15:24:35.093000
CVE-2024-29271,0,1,6f2450ad40da134880ee25cc3905c90e5aca742e98271b4936d34e81b7571ba5,2024-03-22T12:45:36.130000
CVE-2024-29272,0,1,cc2132c68a21d2c864bd46d162e26f16bcbc3c4f3450d911f3e7e7abf1272743,2024-03-22T12:45:36.130000
CVE-2024-29273,0,1,efd93b25e3a199ba372faf3ed5bc7bb194eb27d8a5a462039a805935551533fb,2024-03-22T12:45:36.130000
CVE-2024-29275,0,1,0d6abe0c929754cf7b3c9410c26c7278906e57851d3ac4bbf99eb4c136fd6c4d,2024-03-22T12:45:36.130000
CVE-2024-29271,0,1,86d82853285296d2653b2954b1f865b89755729787a00c9a08bf8b4da2a10347,2024-03-22T12:45:36.130000
CVE-2024-29272,0,1,bb3421cdf283ecf2f8722dd79d31aa3f3d26bad518191ad6f8ea2a70c28d47bf,2024-03-22T12:45:36.130000
CVE-2024-29273,0,1,5734858efc895a99d71a292d9b9fd87dc375f872fc9b4f17b1a24399e248cfbf,2024-03-22T12:45:36.130000
CVE-2024-29275,0,1,402f5150501d1ad43199a2c93810407cb4bc9ca968149bb7f55410637d08465b,2024-03-22T12:45:36.130000
CVE-2024-29374,0,0,f8a146770d52182e0c10b15b21ebc5da7e22091690385e976078b28de6736be7,2024-03-21T19:47:03.943000
CVE-2024-29419,0,0,1f113c646466febbefbd1317ecc5036f9bdf6e219db156971cfdda70e05f32f0,2024-03-20T17:18:21.343000
CVE-2024-29469,0,0,acf93e04574e9669a29498319a75720c9b5a03ff4de2c06070b1f52ac9f365b7,2024-03-21T12:58:51.093000
@ -242431,3 +242440,5 @@ CVE-2024-29878,0,0,59bd69937e12e8238cdc5eae96014d85a453bedc37861446ca2ffcb7373dd
CVE-2024-29879,0,0,f281e5565c18f62981e30c243c39ad05583d9bbab1631a620c93b3c78846e1db,2024-03-21T15:24:35.093000
CVE-2024-29880,0,0,e4ba47a3336aba44b26bc2b767c682c9997cfe6f0e16a9457e7fe50a3abeaa1c,2024-03-21T15:24:35.093000
CVE-2024-29916,0,0,dd300e18b662f862d3dd0881eace85d81be3f3aaeb79c908bcef100a80a89dd1,2024-03-21T19:47:03.943000
CVE-2024-29943,1,1,f1a3f9a1a8cb25eef7944b2e7d8c3b117c9e9d782b9389c7f010905bdf8e0c5e,2024-03-22T13:15:07.440000
CVE-2024-29944,1,1,70f186332bf1dd550ce01104b7836ab76d9f3f38057d50541514d05fb298d9f8,2024-03-22T13:15:07.503000

Can't render this file because it is too large.