id
stringlengths 13
16
| published
stringlengths 23
23
| url
stringlengths 12
500
| tags
sequencelengths 1
6
⌀ | domain
stringlengths 4
49
| __index_level_0__
int64 0
135k
|
---|---|---|---|---|---|
CVE-2023-52645 | 2024-04-17T16:15:07.437 | https://git.kernel.org/stable/c/3cd1d92ee1dbf3e8f988767eb75f26207397792b | [
"Patch"
] | git.kernel.org | 128,990 |
CVE-2023-52645 | 2024-04-17T16:15:07.437 | https://git.kernel.org/stable/c/475426ad1ae0bfdfd8f160ed9750903799392438 | [
"Patch"
] | git.kernel.org | 128,990 |
CVE-2023-52645 | 2024-04-17T16:15:07.437 | https://git.kernel.org/stable/c/c41336f4d69057cbf88fed47951379b384540df5 | [
"Patch"
] | git.kernel.org | 128,990 |
CVE-2023-52645 | 2024-04-17T16:15:07.437 | https://git.kernel.org/stable/c/f83b9abee9faa4868a6fac4669b86f4c215dae25 | [
"Patch"
] | git.kernel.org | 128,990 |
CVE-2024-26910 | 2024-04-17T16:15:07.860 | https://git.kernel.org/stable/c/653bc5e6d9995d7d5f497c665b321875a626161c | [
"Patch"
] | git.kernel.org | 128,991 |
CVE-2024-26910 | 2024-04-17T16:15:07.860 | https://git.kernel.org/stable/c/970709a67696b100a57b33af1a3d75fc34b747eb | [
"Patch"
] | git.kernel.org | 128,991 |
CVE-2024-26910 | 2024-04-17T16:15:07.860 | https://git.kernel.org/stable/c/97f7cf1cd80eeed3b7c808b7c12463295c751001 | [
"Patch"
] | git.kernel.org | 128,991 |
CVE-2024-26910 | 2024-04-17T16:15:07.860 | https://git.kernel.org/stable/c/a24d5f2ac8ef702a58e55ec276aad29b4bd97e05 | [
"Patch"
] | git.kernel.org | 128,991 |
CVE-2024-26910 | 2024-04-17T16:15:07.860 | https://git.kernel.org/stable/c/b93a6756a01f4fd2f329a39216f9824c56a66397 | [
"Patch"
] | git.kernel.org | 128,991 |
CVE-2024-26910 | 2024-04-17T16:15:07.860 | https://git.kernel.org/stable/c/c2dc077d8f722a1c73a24e674f925602ee5ece49 | [
"Patch"
] | git.kernel.org | 128,991 |
CVE-2024-26910 | 2024-04-17T16:15:07.860 | https://git.kernel.org/stable/c/c7f2733e5011bfd136f1ca93497394d43aa76225 | [
"Patch"
] | git.kernel.org | 128,991 |
CVE-2024-26911 | 2024-04-17T16:15:07.920 | https://git.kernel.org/stable/c/4b59c3fada06e5e8010ef7700689c71986e667a2 | [
"Patch"
] | git.kernel.org | 128,992 |
CVE-2024-26911 | 2024-04-17T16:15:07.920 | https://git.kernel.org/stable/c/8746c6c9dfa31d269c65dd52ab42fde0720b7d91 | [
"Patch"
] | git.kernel.org | 128,992 |
CVE-2024-26912 | 2024-04-17T16:15:07.990 | https://git.kernel.org/stable/c/042b5f83841fbf7ce39474412db3b5e4765a7ea7 | [
"Patch"
] | git.kernel.org | 128,993 |
CVE-2024-26912 | 2024-04-17T16:15:07.990 | https://git.kernel.org/stable/c/6190d4c08897d748dd25f0b78267a90aa1694e15 | [
"Patch"
] | git.kernel.org | 128,993 |
CVE-2024-26913 | 2024-04-17T16:15:08.040 | https://git.kernel.org/stable/c/cdbe0be8874c63bca85b8c38e5b1eecbdd18df31 | [
"Patch"
] | git.kernel.org | 128,994 |
CVE-2024-26913 | 2024-04-17T16:15:08.040 | https://git.kernel.org/stable/c/faf51b201bc42adf500945732abb6220c707d6f3 | [
"Patch"
] | git.kernel.org | 128,994 |
CVE-2022-40745 | 2024-04-19T17:15:51.193 | https://exchange.xforce.ibmcloud.com/vulnerabilities/236452 | [
"VDB Entry",
"Vendor Advisory"
] | exchange.xforce.ibmcloud.com | 129,280 |
CVE-2022-40745 | 2024-04-19T17:15:51.193 | https://www.ibm.com/support/pages/node/7148632 | [
"Vendor Advisory"
] | www.ibm.com | 129,280 |
CVE-2023-27279 | 2024-04-19T17:15:51.400 | https://exchange.xforce.ibmcloud.com/vulnerabilities/248533 | [
"VDB Entry",
"Vendor Advisory"
] | exchange.xforce.ibmcloud.com | 129,281 |
CVE-2023-37397 | 2024-04-19T17:15:51.590 | https://exchange.xforce.ibmcloud.com/vulnerabilities/259672 | [
"VDB Entry",
"Vendor Advisory"
] | exchange.xforce.ibmcloud.com | 129,282 |
CVE-2024-4040 | 2024-04-22T20:15:07.803 | https://github.com/airbus-cert/CVE-2024-4040 | [
"Exploit",
"Third Party Advisory"
] | github.com | 129,390 |
CVE-2024-4040 | 2024-04-22T20:15:07.803 | https://www.bleepingcomputer.com/news/security/crushftp-warns-users-to-patch-exploited-zero-day-immediately/ | [
"Press/Media Coverage",
"Third Party Advisory"
] | www.bleepingcomputer.com | 129,390 |
CVE-2024-4040 | 2024-04-22T20:15:07.803 | https://www.crushftp.com/crush11wiki/Wiki.jsp?page=Update | [
"Patch",
"Vendor Advisory"
] | www.crushftp.com | 129,390 |
CVE-2024-4040 | 2024-04-22T20:15:07.803 | https://www.rapid7.com/blog/post/2024/04/23/etr-unauthenticated-crushftp-zero-day-enables-complete-server-compromise/ | [
"Third Party Advisory"
] | www.rapid7.com | 129,390 |
CVE-2024-4040 | 2024-04-22T20:15:07.803 | https://www.reddit.com/r/crowdstrike/comments/1c88788/situational_awareness_20240419_crushftp_virtual/ | [
"Press/Media Coverage",
"Third Party Advisory"
] | www.reddit.com | 129,390 |
CVE-2024-4040 | 2024-04-22T20:15:07.803 | https://www.reddit.com/r/cybersecurity/comments/1c850i2/all_versions_of_crush_ftp_are_vulnerable/ | [
"Patch",
"Press/Media Coverage",
"Third Party Advisory"
] | www.reddit.com | 129,390 |
CVE-2024-4071 | 2024-04-23T22:15:07.703 | https://github.com/E1CHO/cve_hub/blob/main/Online%20Furniture%20Shopping%20Ecommerce%20Website/Online%20Furniture%20Shopping%20Ecommerce%20Website%20Project%20-%20vuln%203.pdf | [
"Exploit",
"Third Party Advisory"
] | github.com | 129,471 |
CVE-2024-4071 | 2024-04-23T22:15:07.703 | https://vuldb.com/?ctiid.261797 | [
"Third Party Advisory"
] | vuldb.com | 129,471 |
CVE-2024-4071 | 2024-04-23T22:15:07.703 | https://vuldb.com/?id.261797 | [
"Third Party Advisory"
] | vuldb.com | 129,471 |
CVE-2024-4071 | 2024-04-23T22:15:07.703 | https://vuldb.com/?submit.321445 | [
"Exploit",
"Third Party Advisory"
] | vuldb.com | 129,471 |
CVE-2024-4072 | 2024-04-23T23:15:49.050 | https://github.com/E1CHO/cve_hub/blob/main/Online%20Furniture%20Shopping%20Ecommerce%20Website/Online%20Furniture%20Shopping%20Ecommerce%20Website%20Project%20-%20vuln%204.pdf | [
"Exploit",
"Third Party Advisory"
] | github.com | 129,472 |
CVE-2024-4072 | 2024-04-23T23:15:49.050 | https://vuldb.com/?ctiid.261798 | [
"Third Party Advisory"
] | vuldb.com | 129,472 |
CVE-2024-4072 | 2024-04-23T23:15:49.050 | https://vuldb.com/?id.261798 | [
"Third Party Advisory"
] | vuldb.com | 129,472 |
CVE-2024-4072 | 2024-04-23T23:15:49.050 | https://vuldb.com/?submit.321446 | [
"Exploit",
"Third Party Advisory"
] | vuldb.com | 129,472 |
CVE-2024-4073 | 2024-04-23T23:15:49.267 | https://github.com/E1CHO/cve_hub/blob/main/Online%20Furniture%20Shopping%20Ecommerce%20Website/Online%20Furniture%20Shopping%20Ecommerce%20Website%20Project%20-%20vuln%205.pdf | [
"Exploit",
"Third Party Advisory"
] | github.com | 129,473 |
CVE-2024-4073 | 2024-04-23T23:15:49.267 | https://vuldb.com/?ctiid.261799 | [
"Third Party Advisory"
] | vuldb.com | 129,473 |
CVE-2024-4073 | 2024-04-23T23:15:49.267 | https://vuldb.com/?id.261799 | [
"Third Party Advisory"
] | vuldb.com | 129,473 |
CVE-2024-4073 | 2024-04-23T23:15:49.267 | https://vuldb.com/?submit.321447 | [
"Exploit",
"Third Party Advisory"
] | vuldb.com | 129,473 |
CVE-2024-2404 | 2024-04-24T05:15:47.113 | https://wpscan.com/vulnerability/a2cb7167-9edc-4640-87eb-4c511639e5b7/ | [
"Exploit",
"Third Party Advisory"
] | wpscan.com | 129,482 |
CVE-2024-20353 | 2024-04-24T19:15:46.723 | https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asaftd-websrvs-dos-X8gNucD2 | [
"Vendor Advisory"
] | sec.cloudapps.cisco.com | 129,584 |
CVE-2024-20359 | 2024-04-24T19:15:46.943 | https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asaftd-persist-rce-FLsNXF4h | [
"Vendor Advisory"
] | sec.cloudapps.cisco.com | 129,585 |
CVE-2024-20358 | 2024-04-24T20:15:07.670 | https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asaftd-cmd-inj-ZJV8Wysm | [
"Vendor Advisory"
] | sec.cloudapps.cisco.com | 129,593 |
CVE-2024-20313 | 2024-04-24T21:15:46.797 | https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-iosxe-ospf-dos-dR9Sfrxp | [
"Vendor Advisory"
] | sec.cloudapps.cisco.com | 129,599 |
CVE-2022-48654 | 2024-04-28T13:15:07.580 | https://git.kernel.org/stable/c/559c36c5a8d730c49ef805a72b213d3bba155cc8 | [
"Patch"
] | git.kernel.org | 129,885 |
CVE-2022-48654 | 2024-04-28T13:15:07.580 | https://git.kernel.org/stable/c/5d75fef3e61e797fab5c3fbba88caa74ab92ad47 | [
"Patch"
] | git.kernel.org | 129,885 |
CVE-2022-48654 | 2024-04-28T13:15:07.580 | https://git.kernel.org/stable/c/633c81c0449663f57d4138326d036dc6cfad674e | [
"Patch"
] | git.kernel.org | 129,885 |
CVE-2022-48654 | 2024-04-28T13:15:07.580 | https://git.kernel.org/stable/c/721ea8ac063d70c2078c4e762212705de6151764 | [
"Patch"
] | git.kernel.org | 129,885 |
CVE-2022-48654 | 2024-04-28T13:15:07.580 | https://git.kernel.org/stable/c/816eab147e5c6f6621922b8515ad9010ceb1735e | [
"Patch"
] | git.kernel.org | 129,885 |
CVE-2022-48655 | 2024-04-28T13:15:07.623 | https://git.kernel.org/stable/c/1f08a1b26cfc53b7715abc46857c6023bb1b87de | [
"Patch"
] | git.kernel.org | 129,886 |
CVE-2022-48655 | 2024-04-28T13:15:07.623 | https://git.kernel.org/stable/c/7184491fc515f391afba23d0e9b690caaea72daf | null | git.kernel.org | 129,886 |
CVE-2022-48655 | 2024-04-28T13:15:07.623 | https://git.kernel.org/stable/c/8e65edf0d37698f7a6cb174608d3ec7976baf49e | [
"Patch"
] | git.kernel.org | 129,886 |
CVE-2022-48655 | 2024-04-28T13:15:07.623 | https://git.kernel.org/stable/c/e9076ffbcaed5da6c182b144ef9f6e24554af268 | [
"Patch"
] | git.kernel.org | 129,886 |
CVE-2022-48655 | 2024-04-28T13:15:07.623 | https://git.kernel.org/stable/c/f2277d9e2a0d092c13bae7ee82d75432bb8b5108 | null | git.kernel.org | 129,886 |
CVE-2022-48656 | 2024-04-28T13:15:07.663 | https://git.kernel.org/stable/c/a17df55bf6d536712da6902a83db82b82e67d5a2 | [
"Patch"
] | git.kernel.org | 129,887 |
CVE-2022-48656 | 2024-04-28T13:15:07.663 | https://git.kernel.org/stable/c/aa11dae059a439af82bae541b134f8f53ac177b5 | [
"Patch"
] | git.kernel.org | 129,887 |
CVE-2022-48656 | 2024-04-28T13:15:07.663 | https://git.kernel.org/stable/c/dd5a6c5a08752b613e83ad2cb5133e72a64b876d | [
"Patch"
] | git.kernel.org | 129,887 |
CVE-2022-48656 | 2024-04-28T13:15:07.663 | https://git.kernel.org/stable/c/f9fdb0b86f087c2b7f6c6168dd0985a3c1eda87e | [
"Patch"
] | git.kernel.org | 129,887 |
CVE-2022-48657 | 2024-04-28T13:15:07.717 | https://git.kernel.org/stable/c/3c3edb82d67b2be9231174ac2af4af60d4af7549 | [
"Patch"
] | git.kernel.org | 129,888 |
CVE-2022-48657 | 2024-04-28T13:15:07.717 | https://git.kernel.org/stable/c/904f881b57360cf85de962d84d8614d94431f60e | [
"Patch"
] | git.kernel.org | 129,888 |
CVE-2022-48657 | 2024-04-28T13:15:07.717 | https://git.kernel.org/stable/c/bb6d99e27cbe6b30e4e3bbd32927fd3b0bdec6eb | [
"Patch"
] | git.kernel.org | 129,888 |
CVE-2022-48657 | 2024-04-28T13:15:07.717 | https://git.kernel.org/stable/c/d4955c0ad77dbc684fc716387070ac24801b8bca | [
"Patch"
] | git.kernel.org | 129,888 |
CVE-2022-48658 | 2024-04-28T13:15:07.760 | https://git.kernel.org/stable/c/61703b248be993eb4997b00ae5d3318e6d8f3c5b | [
"Patch"
] | git.kernel.org | 129,889 |
CVE-2022-48658 | 2024-04-28T13:15:07.760 | https://git.kernel.org/stable/c/df6cb39335cf5a1b918e8dbd8ba7cd9f1d00e45a | [
"Patch"
] | git.kernel.org | 129,889 |
CVE-2022-48658 | 2024-04-28T13:15:07.760 | https://git.kernel.org/stable/c/e45cc288724f0cfd497bb5920bcfa60caa335729 | [
"Patch"
] | git.kernel.org | 129,889 |
CVE-2022-48659 | 2024-04-28T13:15:07.800 | https://git.kernel.org/stable/c/016b150992eebc32c4a18f783cf2bb6e2545a3d9 | [
"Patch"
] | git.kernel.org | 129,890 |
CVE-2022-48659 | 2024-04-28T13:15:07.800 | https://git.kernel.org/stable/c/02bcd951aa3c2cea95fb241c20802e9501940296 | [
"Patch"
] | git.kernel.org | 129,890 |
CVE-2022-48659 | 2024-04-28T13:15:07.800 | https://git.kernel.org/stable/c/2d6e55e0c03804e1e227b80a5746e086d6c6696c | [
"Patch"
] | git.kernel.org | 129,890 |
CVE-2022-48659 | 2024-04-28T13:15:07.800 | https://git.kernel.org/stable/c/379ac7905ff3f0a6a4e507d3e9f710ec4fab9124 | [
"Patch"
] | git.kernel.org | 129,890 |
CVE-2022-48659 | 2024-04-28T13:15:07.800 | https://git.kernel.org/stable/c/7e9c323c52b379d261a72dc7bd38120a761a93cd | [
"Patch"
] | git.kernel.org | 129,890 |
CVE-2022-48659 | 2024-04-28T13:15:07.800 | https://git.kernel.org/stable/c/a1d83a19cec3bfeb2b3547a1f7631e432a766d1c | [
"Patch"
] | git.kernel.org | 129,890 |
CVE-2022-48659 | 2024-04-28T13:15:07.800 | https://git.kernel.org/stable/c/e9219fa63c5c25804af82c7aa54d1ec770ebe457 | [
"Patch"
] | git.kernel.org | 129,890 |
CVE-2022-48659 | 2024-04-28T13:15:07.800 | https://git.kernel.org/stable/c/e996821717c5cf8aa1e1abdb6b3d900a231e3755 | [
"Patch"
] | git.kernel.org | 129,890 |
CVE-2022-48660 | 2024-04-28T13:15:07.853 | https://git.kernel.org/stable/c/657803b918e097e47d99d1489da83a603c36bcdd | [
"Patch"
] | git.kernel.org | 129,891 |
CVE-2022-48660 | 2024-04-28T13:15:07.853 | https://git.kernel.org/stable/c/69bef19d6b9700e96285f4b4e28691cda3dcd0d1 | [
"Patch"
] | git.kernel.org | 129,891 |
CVE-2022-48660 | 2024-04-28T13:15:07.853 | https://git.kernel.org/stable/c/97da736cd11ae73bdf2f5e21e24446b8349e0168 | [
"Patch"
] | git.kernel.org | 129,891 |
CVE-2022-48660 | 2024-04-28T13:15:07.853 | https://git.kernel.org/stable/c/b1489043d3b9004dd8d5a0357b08b5f0e6691c43 | [
"Patch"
] | git.kernel.org | 129,891 |
CVE-2022-48661 | 2024-04-28T13:15:07.897 | https://git.kernel.org/stable/c/02743c4091ccfb246f5cdbbe3f44b152d5d12933 | [
"Patch"
] | git.kernel.org | 129,892 |
CVE-2022-48661 | 2024-04-28T13:15:07.897 | https://git.kernel.org/stable/c/41f857033c44442a27f591fda8d986e7c9e42872 | [
"Patch"
] | git.kernel.org | 129,892 |
CVE-2022-48661 | 2024-04-28T13:15:07.897 | https://git.kernel.org/stable/c/9b26723e058faaf11b532fb4aa16d6849d581790 | [
"Patch"
] | git.kernel.org | 129,892 |
CVE-2022-48662 | 2024-04-28T13:15:07.937 | https://git.kernel.org/stable/c/713fa3e4591f65f804bdc88e8648e219fabc9ee1 | [
"Patch"
] | git.kernel.org | 129,893 |
CVE-2022-48662 | 2024-04-28T13:15:07.937 | https://git.kernel.org/stable/c/d119888b09bd567e07c6b93a07f175df88857e02 | [
"Patch"
] | git.kernel.org | 129,893 |
CVE-2022-48662 | 2024-04-28T13:15:07.937 | https://git.kernel.org/stable/c/f799e0568d6c153368b177e0bbbde7dcc4ce7f1d | [
"Patch"
] | git.kernel.org | 129,893 |
CVE-2024-28978 | 2024-05-01T04:15:10.153 | https://www.dell.com/support/kbdoc/en-us/000224641/dsa-2024-201-security-update-for-dell-openmanage-enterprise-vulnerability | [
"Vendor Advisory"
] | www.dell.com | 130,136 |
CVE-2024-28979 | 2024-05-01T04:15:10.387 | https://www.dell.com/support/kbdoc/en-us/000224642/dsa-2024-202-security-update-for-dell-openmanage-enterprise-vulnerability | [
"Vendor Advisory"
] | www.dell.com | 130,137 |
CVE-2024-26929 | 2024-05-01T06:15:07.380 | https://git.kernel.org/stable/c/282877633b25d67021a34169c5b5519b1d4ef65e | [
"Patch"
] | git.kernel.org | 130,140 |
CVE-2024-26929 | 2024-05-01T06:15:07.380 | https://git.kernel.org/stable/c/82f522ae0d97119a43da53e0f729275691b9c525 | [
"Patch"
] | git.kernel.org | 130,140 |
CVE-2024-26929 | 2024-05-01T06:15:07.380 | https://git.kernel.org/stable/c/846fb9f112f618ec6ae181d8dae7961652574774 | [
"Patch"
] | git.kernel.org | 130,140 |
CVE-2024-26929 | 2024-05-01T06:15:07.380 | https://git.kernel.org/stable/c/9b43d2884b54d415caab48878b526dfe2ae9921b | [
"Patch"
] | git.kernel.org | 130,140 |
CVE-2024-26929 | 2024-05-01T06:15:07.380 | https://git.kernel.org/stable/c/b03e626bd6d3f0684f56ee1890d70fc9ca991c04 | [
"Patch"
] | git.kernel.org | 130,140 |
CVE-2024-26929 | 2024-05-01T06:15:07.380 | https://git.kernel.org/stable/c/f85af9f1aa5e2f53694a6cbe72010f754b5ff862 | [
"Patch"
] | git.kernel.org | 130,140 |
CVE-2024-26930 | 2024-05-01T06:15:07.540 | https://git.kernel.org/stable/c/825d63164a2e6bacb059a9afb5605425b485413f | [
"Patch"
] | git.kernel.org | 130,141 |
CVE-2024-26930 | 2024-05-01T06:15:07.540 | https://git.kernel.org/stable/c/b7deb675d674f44e0ddbab87fee8f9f098925e73 | [
"Patch"
] | git.kernel.org | 130,141 |
CVE-2024-26930 | 2024-05-01T06:15:07.540 | https://git.kernel.org/stable/c/e288285d47784fdcf7c81be56df7d65c6f10c58b | [
"Patch"
] | git.kernel.org | 130,141 |
CVE-2024-26930 | 2024-05-01T06:15:07.540 | https://git.kernel.org/stable/c/f14cee7a882cb79528f17a2335f53e9fd1848467 | [
"Patch"
] | git.kernel.org | 130,141 |
CVE-2024-26932 | 2024-05-01T06:15:07.810 | https://git.kernel.org/stable/c/242e425ed580b2f4dbcb86c8fc03a410a4084a69 | [
"Patch"
] | git.kernel.org | 130,143 |
CVE-2024-26932 | 2024-05-01T06:15:07.810 | https://git.kernel.org/stable/c/b63f90487bdf93a4223ce7853d14717e9d452856 | [
"Patch"
] | git.kernel.org | 130,143 |
CVE-2024-26933 | 2024-05-01T06:15:07.930 | https://git.kernel.org/stable/c/4facc9421117ba9d8148c73771b213887fec77f7 | [
"Patch"
] | git.kernel.org | 130,144 |
CVE-2024-26933 | 2024-05-01T06:15:07.930 | https://git.kernel.org/stable/c/73d1589b91f2099e5f6534a8497b7c6b527e064e | [
"Patch"
] | git.kernel.org | 130,144 |
CVE-2024-26933 | 2024-05-01T06:15:07.930 | https://git.kernel.org/stable/c/9dac54f08198147f5ec0ec52fcf1bc8ac899ac05 | [
"Patch"
] | git.kernel.org | 130,144 |