id
stringlengths
13
16
published
stringlengths
23
23
url
stringlengths
12
500
tags
sequencelengths
1
6
domain
stringlengths
4
49
__index_level_0__
int64
0
135k
CVE-2023-52645
2024-04-17T16:15:07.437
https://git.kernel.org/stable/c/3cd1d92ee1dbf3e8f988767eb75f26207397792b
[ "Patch" ]
git.kernel.org
128,990
CVE-2023-52645
2024-04-17T16:15:07.437
https://git.kernel.org/stable/c/475426ad1ae0bfdfd8f160ed9750903799392438
[ "Patch" ]
git.kernel.org
128,990
CVE-2023-52645
2024-04-17T16:15:07.437
https://git.kernel.org/stable/c/c41336f4d69057cbf88fed47951379b384540df5
[ "Patch" ]
git.kernel.org
128,990
CVE-2023-52645
2024-04-17T16:15:07.437
https://git.kernel.org/stable/c/f83b9abee9faa4868a6fac4669b86f4c215dae25
[ "Patch" ]
git.kernel.org
128,990
CVE-2024-26910
2024-04-17T16:15:07.860
https://git.kernel.org/stable/c/653bc5e6d9995d7d5f497c665b321875a626161c
[ "Patch" ]
git.kernel.org
128,991
CVE-2024-26910
2024-04-17T16:15:07.860
https://git.kernel.org/stable/c/970709a67696b100a57b33af1a3d75fc34b747eb
[ "Patch" ]
git.kernel.org
128,991
CVE-2024-26910
2024-04-17T16:15:07.860
https://git.kernel.org/stable/c/97f7cf1cd80eeed3b7c808b7c12463295c751001
[ "Patch" ]
git.kernel.org
128,991
CVE-2024-26910
2024-04-17T16:15:07.860
https://git.kernel.org/stable/c/a24d5f2ac8ef702a58e55ec276aad29b4bd97e05
[ "Patch" ]
git.kernel.org
128,991
CVE-2024-26910
2024-04-17T16:15:07.860
https://git.kernel.org/stable/c/b93a6756a01f4fd2f329a39216f9824c56a66397
[ "Patch" ]
git.kernel.org
128,991
CVE-2024-26910
2024-04-17T16:15:07.860
https://git.kernel.org/stable/c/c2dc077d8f722a1c73a24e674f925602ee5ece49
[ "Patch" ]
git.kernel.org
128,991
CVE-2024-26910
2024-04-17T16:15:07.860
https://git.kernel.org/stable/c/c7f2733e5011bfd136f1ca93497394d43aa76225
[ "Patch" ]
git.kernel.org
128,991
CVE-2024-26911
2024-04-17T16:15:07.920
https://git.kernel.org/stable/c/4b59c3fada06e5e8010ef7700689c71986e667a2
[ "Patch" ]
git.kernel.org
128,992
CVE-2024-26911
2024-04-17T16:15:07.920
https://git.kernel.org/stable/c/8746c6c9dfa31d269c65dd52ab42fde0720b7d91
[ "Patch" ]
git.kernel.org
128,992
CVE-2024-26912
2024-04-17T16:15:07.990
https://git.kernel.org/stable/c/042b5f83841fbf7ce39474412db3b5e4765a7ea7
[ "Patch" ]
git.kernel.org
128,993
CVE-2024-26912
2024-04-17T16:15:07.990
https://git.kernel.org/stable/c/6190d4c08897d748dd25f0b78267a90aa1694e15
[ "Patch" ]
git.kernel.org
128,993
CVE-2024-26913
2024-04-17T16:15:08.040
https://git.kernel.org/stable/c/cdbe0be8874c63bca85b8c38e5b1eecbdd18df31
[ "Patch" ]
git.kernel.org
128,994
CVE-2024-26913
2024-04-17T16:15:08.040
https://git.kernel.org/stable/c/faf51b201bc42adf500945732abb6220c707d6f3
[ "Patch" ]
git.kernel.org
128,994
CVE-2022-40745
2024-04-19T17:15:51.193
https://exchange.xforce.ibmcloud.com/vulnerabilities/236452
[ "VDB Entry", "Vendor Advisory" ]
exchange.xforce.ibmcloud.com
129,280
CVE-2022-40745
2024-04-19T17:15:51.193
https://www.ibm.com/support/pages/node/7148632
[ "Vendor Advisory" ]
www.ibm.com
129,280
CVE-2023-27279
2024-04-19T17:15:51.400
https://exchange.xforce.ibmcloud.com/vulnerabilities/248533
[ "VDB Entry", "Vendor Advisory" ]
exchange.xforce.ibmcloud.com
129,281
CVE-2023-37397
2024-04-19T17:15:51.590
https://exchange.xforce.ibmcloud.com/vulnerabilities/259672
[ "VDB Entry", "Vendor Advisory" ]
exchange.xforce.ibmcloud.com
129,282
CVE-2024-4040
2024-04-22T20:15:07.803
https://github.com/airbus-cert/CVE-2024-4040
[ "Exploit", "Third Party Advisory" ]
github.com
129,390
CVE-2024-4040
2024-04-22T20:15:07.803
https://www.bleepingcomputer.com/news/security/crushftp-warns-users-to-patch-exploited-zero-day-immediately/
[ "Press/Media Coverage", "Third Party Advisory" ]
www.bleepingcomputer.com
129,390
CVE-2024-4040
2024-04-22T20:15:07.803
https://www.crushftp.com/crush11wiki/Wiki.jsp?page=Update
[ "Patch", "Vendor Advisory" ]
www.crushftp.com
129,390
CVE-2024-4040
2024-04-22T20:15:07.803
https://www.rapid7.com/blog/post/2024/04/23/etr-unauthenticated-crushftp-zero-day-enables-complete-server-compromise/
[ "Third Party Advisory" ]
www.rapid7.com
129,390
CVE-2024-4040
2024-04-22T20:15:07.803
https://www.reddit.com/r/crowdstrike/comments/1c88788/situational_awareness_20240419_crushftp_virtual/
[ "Press/Media Coverage", "Third Party Advisory" ]
www.reddit.com
129,390
CVE-2024-4040
2024-04-22T20:15:07.803
https://www.reddit.com/r/cybersecurity/comments/1c850i2/all_versions_of_crush_ftp_are_vulnerable/
[ "Patch", "Press/Media Coverage", "Third Party Advisory" ]
www.reddit.com
129,390
CVE-2024-4071
2024-04-23T22:15:07.703
https://github.com/E1CHO/cve_hub/blob/main/Online%20Furniture%20Shopping%20Ecommerce%20Website/Online%20Furniture%20Shopping%20Ecommerce%20Website%20Project%20-%20vuln%203.pdf
[ "Exploit", "Third Party Advisory" ]
github.com
129,471
CVE-2024-4071
2024-04-23T22:15:07.703
https://vuldb.com/?ctiid.261797
[ "Third Party Advisory" ]
vuldb.com
129,471
CVE-2024-4071
2024-04-23T22:15:07.703
https://vuldb.com/?id.261797
[ "Third Party Advisory" ]
vuldb.com
129,471
CVE-2024-4071
2024-04-23T22:15:07.703
https://vuldb.com/?submit.321445
[ "Exploit", "Third Party Advisory" ]
vuldb.com
129,471
CVE-2024-4072
2024-04-23T23:15:49.050
https://github.com/E1CHO/cve_hub/blob/main/Online%20Furniture%20Shopping%20Ecommerce%20Website/Online%20Furniture%20Shopping%20Ecommerce%20Website%20Project%20-%20vuln%204.pdf
[ "Exploit", "Third Party Advisory" ]
github.com
129,472
CVE-2024-4072
2024-04-23T23:15:49.050
https://vuldb.com/?ctiid.261798
[ "Third Party Advisory" ]
vuldb.com
129,472
CVE-2024-4072
2024-04-23T23:15:49.050
https://vuldb.com/?id.261798
[ "Third Party Advisory" ]
vuldb.com
129,472
CVE-2024-4072
2024-04-23T23:15:49.050
https://vuldb.com/?submit.321446
[ "Exploit", "Third Party Advisory" ]
vuldb.com
129,472
CVE-2024-4073
2024-04-23T23:15:49.267
https://github.com/E1CHO/cve_hub/blob/main/Online%20Furniture%20Shopping%20Ecommerce%20Website/Online%20Furniture%20Shopping%20Ecommerce%20Website%20Project%20-%20vuln%205.pdf
[ "Exploit", "Third Party Advisory" ]
github.com
129,473
CVE-2024-4073
2024-04-23T23:15:49.267
https://vuldb.com/?ctiid.261799
[ "Third Party Advisory" ]
vuldb.com
129,473
CVE-2024-4073
2024-04-23T23:15:49.267
https://vuldb.com/?id.261799
[ "Third Party Advisory" ]
vuldb.com
129,473
CVE-2024-4073
2024-04-23T23:15:49.267
https://vuldb.com/?submit.321447
[ "Exploit", "Third Party Advisory" ]
vuldb.com
129,473
CVE-2024-2404
2024-04-24T05:15:47.113
https://wpscan.com/vulnerability/a2cb7167-9edc-4640-87eb-4c511639e5b7/
[ "Exploit", "Third Party Advisory" ]
wpscan.com
129,482
CVE-2024-20353
2024-04-24T19:15:46.723
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asaftd-websrvs-dos-X8gNucD2
[ "Vendor Advisory" ]
sec.cloudapps.cisco.com
129,584
CVE-2024-20359
2024-04-24T19:15:46.943
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asaftd-persist-rce-FLsNXF4h
[ "Vendor Advisory" ]
sec.cloudapps.cisco.com
129,585
CVE-2024-20358
2024-04-24T20:15:07.670
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asaftd-cmd-inj-ZJV8Wysm
[ "Vendor Advisory" ]
sec.cloudapps.cisco.com
129,593
CVE-2024-20313
2024-04-24T21:15:46.797
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-iosxe-ospf-dos-dR9Sfrxp
[ "Vendor Advisory" ]
sec.cloudapps.cisco.com
129,599
CVE-2022-48654
2024-04-28T13:15:07.580
https://git.kernel.org/stable/c/559c36c5a8d730c49ef805a72b213d3bba155cc8
[ "Patch" ]
git.kernel.org
129,885
CVE-2022-48654
2024-04-28T13:15:07.580
https://git.kernel.org/stable/c/5d75fef3e61e797fab5c3fbba88caa74ab92ad47
[ "Patch" ]
git.kernel.org
129,885
CVE-2022-48654
2024-04-28T13:15:07.580
https://git.kernel.org/stable/c/633c81c0449663f57d4138326d036dc6cfad674e
[ "Patch" ]
git.kernel.org
129,885
CVE-2022-48654
2024-04-28T13:15:07.580
https://git.kernel.org/stable/c/721ea8ac063d70c2078c4e762212705de6151764
[ "Patch" ]
git.kernel.org
129,885
CVE-2022-48654
2024-04-28T13:15:07.580
https://git.kernel.org/stable/c/816eab147e5c6f6621922b8515ad9010ceb1735e
[ "Patch" ]
git.kernel.org
129,885
CVE-2022-48655
2024-04-28T13:15:07.623
https://git.kernel.org/stable/c/1f08a1b26cfc53b7715abc46857c6023bb1b87de
[ "Patch" ]
git.kernel.org
129,886
CVE-2022-48655
2024-04-28T13:15:07.623
https://git.kernel.org/stable/c/7184491fc515f391afba23d0e9b690caaea72daf
null
git.kernel.org
129,886
CVE-2022-48655
2024-04-28T13:15:07.623
https://git.kernel.org/stable/c/8e65edf0d37698f7a6cb174608d3ec7976baf49e
[ "Patch" ]
git.kernel.org
129,886
CVE-2022-48655
2024-04-28T13:15:07.623
https://git.kernel.org/stable/c/e9076ffbcaed5da6c182b144ef9f6e24554af268
[ "Patch" ]
git.kernel.org
129,886
CVE-2022-48655
2024-04-28T13:15:07.623
https://git.kernel.org/stable/c/f2277d9e2a0d092c13bae7ee82d75432bb8b5108
null
git.kernel.org
129,886
CVE-2022-48656
2024-04-28T13:15:07.663
https://git.kernel.org/stable/c/a17df55bf6d536712da6902a83db82b82e67d5a2
[ "Patch" ]
git.kernel.org
129,887
CVE-2022-48656
2024-04-28T13:15:07.663
https://git.kernel.org/stable/c/aa11dae059a439af82bae541b134f8f53ac177b5
[ "Patch" ]
git.kernel.org
129,887
CVE-2022-48656
2024-04-28T13:15:07.663
https://git.kernel.org/stable/c/dd5a6c5a08752b613e83ad2cb5133e72a64b876d
[ "Patch" ]
git.kernel.org
129,887
CVE-2022-48656
2024-04-28T13:15:07.663
https://git.kernel.org/stable/c/f9fdb0b86f087c2b7f6c6168dd0985a3c1eda87e
[ "Patch" ]
git.kernel.org
129,887
CVE-2022-48657
2024-04-28T13:15:07.717
https://git.kernel.org/stable/c/3c3edb82d67b2be9231174ac2af4af60d4af7549
[ "Patch" ]
git.kernel.org
129,888
CVE-2022-48657
2024-04-28T13:15:07.717
https://git.kernel.org/stable/c/904f881b57360cf85de962d84d8614d94431f60e
[ "Patch" ]
git.kernel.org
129,888
CVE-2022-48657
2024-04-28T13:15:07.717
https://git.kernel.org/stable/c/bb6d99e27cbe6b30e4e3bbd32927fd3b0bdec6eb
[ "Patch" ]
git.kernel.org
129,888
CVE-2022-48657
2024-04-28T13:15:07.717
https://git.kernel.org/stable/c/d4955c0ad77dbc684fc716387070ac24801b8bca
[ "Patch" ]
git.kernel.org
129,888
CVE-2022-48658
2024-04-28T13:15:07.760
https://git.kernel.org/stable/c/61703b248be993eb4997b00ae5d3318e6d8f3c5b
[ "Patch" ]
git.kernel.org
129,889
CVE-2022-48658
2024-04-28T13:15:07.760
https://git.kernel.org/stable/c/df6cb39335cf5a1b918e8dbd8ba7cd9f1d00e45a
[ "Patch" ]
git.kernel.org
129,889
CVE-2022-48658
2024-04-28T13:15:07.760
https://git.kernel.org/stable/c/e45cc288724f0cfd497bb5920bcfa60caa335729
[ "Patch" ]
git.kernel.org
129,889
CVE-2022-48659
2024-04-28T13:15:07.800
https://git.kernel.org/stable/c/016b150992eebc32c4a18f783cf2bb6e2545a3d9
[ "Patch" ]
git.kernel.org
129,890
CVE-2022-48659
2024-04-28T13:15:07.800
https://git.kernel.org/stable/c/02bcd951aa3c2cea95fb241c20802e9501940296
[ "Patch" ]
git.kernel.org
129,890
CVE-2022-48659
2024-04-28T13:15:07.800
https://git.kernel.org/stable/c/2d6e55e0c03804e1e227b80a5746e086d6c6696c
[ "Patch" ]
git.kernel.org
129,890
CVE-2022-48659
2024-04-28T13:15:07.800
https://git.kernel.org/stable/c/379ac7905ff3f0a6a4e507d3e9f710ec4fab9124
[ "Patch" ]
git.kernel.org
129,890
CVE-2022-48659
2024-04-28T13:15:07.800
https://git.kernel.org/stable/c/7e9c323c52b379d261a72dc7bd38120a761a93cd
[ "Patch" ]
git.kernel.org
129,890
CVE-2022-48659
2024-04-28T13:15:07.800
https://git.kernel.org/stable/c/a1d83a19cec3bfeb2b3547a1f7631e432a766d1c
[ "Patch" ]
git.kernel.org
129,890
CVE-2022-48659
2024-04-28T13:15:07.800
https://git.kernel.org/stable/c/e9219fa63c5c25804af82c7aa54d1ec770ebe457
[ "Patch" ]
git.kernel.org
129,890
CVE-2022-48659
2024-04-28T13:15:07.800
https://git.kernel.org/stable/c/e996821717c5cf8aa1e1abdb6b3d900a231e3755
[ "Patch" ]
git.kernel.org
129,890
CVE-2022-48660
2024-04-28T13:15:07.853
https://git.kernel.org/stable/c/657803b918e097e47d99d1489da83a603c36bcdd
[ "Patch" ]
git.kernel.org
129,891
CVE-2022-48660
2024-04-28T13:15:07.853
https://git.kernel.org/stable/c/69bef19d6b9700e96285f4b4e28691cda3dcd0d1
[ "Patch" ]
git.kernel.org
129,891
CVE-2022-48660
2024-04-28T13:15:07.853
https://git.kernel.org/stable/c/97da736cd11ae73bdf2f5e21e24446b8349e0168
[ "Patch" ]
git.kernel.org
129,891
CVE-2022-48660
2024-04-28T13:15:07.853
https://git.kernel.org/stable/c/b1489043d3b9004dd8d5a0357b08b5f0e6691c43
[ "Patch" ]
git.kernel.org
129,891
CVE-2022-48661
2024-04-28T13:15:07.897
https://git.kernel.org/stable/c/02743c4091ccfb246f5cdbbe3f44b152d5d12933
[ "Patch" ]
git.kernel.org
129,892
CVE-2022-48661
2024-04-28T13:15:07.897
https://git.kernel.org/stable/c/41f857033c44442a27f591fda8d986e7c9e42872
[ "Patch" ]
git.kernel.org
129,892
CVE-2022-48661
2024-04-28T13:15:07.897
https://git.kernel.org/stable/c/9b26723e058faaf11b532fb4aa16d6849d581790
[ "Patch" ]
git.kernel.org
129,892
CVE-2022-48662
2024-04-28T13:15:07.937
https://git.kernel.org/stable/c/713fa3e4591f65f804bdc88e8648e219fabc9ee1
[ "Patch" ]
git.kernel.org
129,893
CVE-2022-48662
2024-04-28T13:15:07.937
https://git.kernel.org/stable/c/d119888b09bd567e07c6b93a07f175df88857e02
[ "Patch" ]
git.kernel.org
129,893
CVE-2022-48662
2024-04-28T13:15:07.937
https://git.kernel.org/stable/c/f799e0568d6c153368b177e0bbbde7dcc4ce7f1d
[ "Patch" ]
git.kernel.org
129,893
CVE-2024-28978
2024-05-01T04:15:10.153
https://www.dell.com/support/kbdoc/en-us/000224641/dsa-2024-201-security-update-for-dell-openmanage-enterprise-vulnerability
[ "Vendor Advisory" ]
www.dell.com
130,136
CVE-2024-28979
2024-05-01T04:15:10.387
https://www.dell.com/support/kbdoc/en-us/000224642/dsa-2024-202-security-update-for-dell-openmanage-enterprise-vulnerability
[ "Vendor Advisory" ]
www.dell.com
130,137
CVE-2024-26929
2024-05-01T06:15:07.380
https://git.kernel.org/stable/c/282877633b25d67021a34169c5b5519b1d4ef65e
[ "Patch" ]
git.kernel.org
130,140
CVE-2024-26929
2024-05-01T06:15:07.380
https://git.kernel.org/stable/c/82f522ae0d97119a43da53e0f729275691b9c525
[ "Patch" ]
git.kernel.org
130,140
CVE-2024-26929
2024-05-01T06:15:07.380
https://git.kernel.org/stable/c/846fb9f112f618ec6ae181d8dae7961652574774
[ "Patch" ]
git.kernel.org
130,140
CVE-2024-26929
2024-05-01T06:15:07.380
https://git.kernel.org/stable/c/9b43d2884b54d415caab48878b526dfe2ae9921b
[ "Patch" ]
git.kernel.org
130,140
CVE-2024-26929
2024-05-01T06:15:07.380
https://git.kernel.org/stable/c/b03e626bd6d3f0684f56ee1890d70fc9ca991c04
[ "Patch" ]
git.kernel.org
130,140
CVE-2024-26929
2024-05-01T06:15:07.380
https://git.kernel.org/stable/c/f85af9f1aa5e2f53694a6cbe72010f754b5ff862
[ "Patch" ]
git.kernel.org
130,140
CVE-2024-26930
2024-05-01T06:15:07.540
https://git.kernel.org/stable/c/825d63164a2e6bacb059a9afb5605425b485413f
[ "Patch" ]
git.kernel.org
130,141
CVE-2024-26930
2024-05-01T06:15:07.540
https://git.kernel.org/stable/c/b7deb675d674f44e0ddbab87fee8f9f098925e73
[ "Patch" ]
git.kernel.org
130,141
CVE-2024-26930
2024-05-01T06:15:07.540
https://git.kernel.org/stable/c/e288285d47784fdcf7c81be56df7d65c6f10c58b
[ "Patch" ]
git.kernel.org
130,141
CVE-2024-26930
2024-05-01T06:15:07.540
https://git.kernel.org/stable/c/f14cee7a882cb79528f17a2335f53e9fd1848467
[ "Patch" ]
git.kernel.org
130,141
CVE-2024-26932
2024-05-01T06:15:07.810
https://git.kernel.org/stable/c/242e425ed580b2f4dbcb86c8fc03a410a4084a69
[ "Patch" ]
git.kernel.org
130,143
CVE-2024-26932
2024-05-01T06:15:07.810
https://git.kernel.org/stable/c/b63f90487bdf93a4223ce7853d14717e9d452856
[ "Patch" ]
git.kernel.org
130,143
CVE-2024-26933
2024-05-01T06:15:07.930
https://git.kernel.org/stable/c/4facc9421117ba9d8148c73771b213887fec77f7
[ "Patch" ]
git.kernel.org
130,144
CVE-2024-26933
2024-05-01T06:15:07.930
https://git.kernel.org/stable/c/73d1589b91f2099e5f6534a8497b7c6b527e064e
[ "Patch" ]
git.kernel.org
130,144
CVE-2024-26933
2024-05-01T06:15:07.930
https://git.kernel.org/stable/c/9dac54f08198147f5ec0ec52fcf1bc8ac899ac05
[ "Patch" ]
git.kernel.org
130,144