id
stringlengths 13
16
| published
stringlengths 23
23
| url
stringlengths 12
500
| tags
listlengths 1
6
⌀ | domain
stringlengths 4
49
| __index_level_0__
int64 0
135k
|
---|---|---|---|---|---|
CVE-2024-29057
|
2024-03-22T22:15:50.450
|
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-29057
|
[
"Patch",
"Vendor Advisory"
] |
msrc.microsoft.com
| 125,363 |
CVE-2024-2850
|
2024-03-24T02:15:07.517
|
https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC15/V15.03.05.18/saveParentControlInfo_urls.md
|
[
"Exploit",
"Third Party Advisory"
] |
github.com
| 125,387 |
CVE-2024-2850
|
2024-03-24T02:15:07.517
|
https://vuldb.com/?ctiid.257774
|
[
"Permissions Required"
] |
vuldb.com
| 125,387 |
CVE-2024-2850
|
2024-03-24T02:15:07.517
|
https://vuldb.com/?id.257774
|
[
"Third Party Advisory"
] |
vuldb.com
| 125,387 |
CVE-2024-2851
|
2024-03-24T03:15:09.177
|
https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC15/V15.03.05.18/formSetSambaConf.md
|
[
"Exploit",
"Third Party Advisory"
] |
github.com
| 125,388 |
CVE-2024-2851
|
2024-03-24T03:15:09.177
|
https://vuldb.com/?ctiid.257775
|
[
"Permissions Required"
] |
vuldb.com
| 125,388 |
CVE-2024-2851
|
2024-03-24T03:15:09.177
|
https://vuldb.com/?id.257775
|
[
"Third Party Advisory"
] |
vuldb.com
| 125,388 |
CVE-2024-2852
|
2024-03-24T05:15:09.160
|
https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC15/V1.0%20V15.03.20_multi/saveParentControlInfo_urls.md
|
[
"Exploit",
"Third Party Advisory"
] |
github.com
| 125,389 |
CVE-2024-2852
|
2024-03-24T05:15:09.160
|
https://vuldb.com/?ctiid.257776
|
[
"Permissions Required"
] |
vuldb.com
| 125,389 |
CVE-2024-2852
|
2024-03-24T05:15:09.160
|
https://vuldb.com/?id.257776
|
[
"Third Party Advisory"
] |
vuldb.com
| 125,389 |
CVE-2024-2853
|
2024-03-24T05:15:10.517
|
https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC10U/v1.V15.03.06.48/more/formSetSambaConf.md
|
[
"Exploit",
"Third Party Advisory"
] |
github.com
| 125,390 |
CVE-2024-2853
|
2024-03-24T05:15:10.517
|
https://vuldb.com/?ctiid.257777
|
[
"Permissions Required"
] |
vuldb.com
| 125,390 |
CVE-2024-2853
|
2024-03-24T05:15:10.517
|
https://vuldb.com/?id.257777
|
[
"Third Party Advisory"
] |
vuldb.com
| 125,390 |
CVE-2024-2854
|
2024-03-24T06:15:08.633
|
https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC18/formSetSambaConf.md
|
[
"Exploit",
"Third Party Advisory"
] |
github.com
| 125,391 |
CVE-2024-2854
|
2024-03-24T06:15:08.633
|
https://vuldb.com/?ctiid.257778
|
[
"Permissions Required"
] |
vuldb.com
| 125,391 |
CVE-2024-2854
|
2024-03-24T06:15:08.633
|
https://vuldb.com/?id.257778
|
[
"Third Party Advisory"
] |
vuldb.com
| 125,391 |
CVE-2024-2855
|
2024-03-24T06:15:11.860
|
https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC15/V1.0%20V15.03.20_multi/fromSetSysTime.md
|
[
"Exploit",
"Third Party Advisory"
] |
github.com
| 125,392 |
CVE-2024-2855
|
2024-03-24T06:15:11.860
|
https://vuldb.com/?ctiid.257779
|
[
"Permissions Required"
] |
vuldb.com
| 125,392 |
CVE-2024-2855
|
2024-03-24T06:15:11.860
|
https://vuldb.com/?id.257779
|
[
"Third Party Advisory"
] |
vuldb.com
| 125,392 |
CVE-2024-2856
|
2024-03-24T07:15:08.140
|
https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC10/V16.03.10.13/fromSetSysTime.md
|
[
"Third Party Advisory"
] |
github.com
| 125,393 |
CVE-2024-2856
|
2024-03-24T07:15:08.140
|
https://vuldb.com/?ctiid.257780
|
[
"Permissions Required"
] |
vuldb.com
| 125,393 |
CVE-2024-2856
|
2024-03-24T07:15:08.140
|
https://vuldb.com/?id.257780
|
[
"Third Party Advisory"
] |
vuldb.com
| 125,393 |
CVE-2024-2856
|
2024-03-24T07:15:08.140
|
https://vuldb.com/?submit.299741
|
[
"Permissions Required"
] |
vuldb.com
| 125,393 |
CVE-2021-47164
|
2024-03-25T10:15:08.577
|
https://git.kernel.org/stable/c/2e4b0b95a489259f9d35a3db17023061f8f3d587
|
[
"Patch"
] |
git.kernel.org
| 125,448 |
CVE-2021-47164
|
2024-03-25T10:15:08.577
|
https://git.kernel.org/stable/c/83026d83186bc48bb41ee4872f339b83f31dfc55
|
[
"Patch"
] |
git.kernel.org
| 125,448 |
CVE-2021-47164
|
2024-03-25T10:15:08.577
|
https://git.kernel.org/stable/c/bdfd3593a8248eea6ecfcbf7b47b56b86515672d
|
[
"Patch"
] |
git.kernel.org
| 125,448 |
CVE-2021-47171
|
2024-03-25T10:15:08.917
|
https://git.kernel.org/stable/c/200dbfcad8011e50c3cec269ed7b980836eeb1fa
|
[
"Patch"
] |
git.kernel.org
| 125,455 |
CVE-2021-47171
|
2024-03-25T10:15:08.917
|
https://git.kernel.org/stable/c/22c840596af0c09068b6cf948616e6496e59e07f
|
[
"Patch"
] |
git.kernel.org
| 125,455 |
CVE-2021-47171
|
2024-03-25T10:15:08.917
|
https://git.kernel.org/stable/c/46a8b29c6306d8bbfd92b614ef65a47c900d8e70
|
[
"Patch"
] |
git.kernel.org
| 125,455 |
CVE-2021-47171
|
2024-03-25T10:15:08.917
|
https://git.kernel.org/stable/c/635ac38b36255d3cfb8312cf7c471334f4d537e0
|
[
"Patch"
] |
git.kernel.org
| 125,455 |
CVE-2021-47171
|
2024-03-25T10:15:08.917
|
https://git.kernel.org/stable/c/70c886ac93f87ae7214a0c69151a28a8075dd95b
|
[
"Patch"
] |
git.kernel.org
| 125,455 |
CVE-2021-47171
|
2024-03-25T10:15:08.917
|
https://git.kernel.org/stable/c/9e6a3eccb28779710cbbafc4f4258d92509c6d07
|
[
"Patch"
] |
git.kernel.org
| 125,455 |
CVE-2021-47171
|
2024-03-25T10:15:08.917
|
https://git.kernel.org/stable/c/9e6b8c1ff9d997e1fa16cbd2d60739adf6dc1bbc
|
[
"Patch"
] |
git.kernel.org
| 125,455 |
CVE-2021-47171
|
2024-03-25T10:15:08.917
|
https://git.kernel.org/stable/c/b95fb96e6339e34694dd578fb6bde3575b01af17
|
[
"Patch"
] |
git.kernel.org
| 125,455 |
CVE-2021-47173
|
2024-03-25T10:15:09.010
|
https://git.kernel.org/stable/c/36b5ff1db1a4ef4fdbc2bae364344279f033ad88
|
[
"Patch"
] |
git.kernel.org
| 125,457 |
CVE-2021-47173
|
2024-03-25T10:15:09.010
|
https://git.kernel.org/stable/c/386918878ce4cd676e4607233866e03c9399a46a
|
[
"Patch"
] |
git.kernel.org
| 125,457 |
CVE-2021-47173
|
2024-03-25T10:15:09.010
|
https://git.kernel.org/stable/c/5394ae9d8c7961dd93807fdf1b12a1dde96b0a55
|
[
"Patch"
] |
git.kernel.org
| 125,457 |
CVE-2021-47173
|
2024-03-25T10:15:09.010
|
https://git.kernel.org/stable/c/5f46b2410db2c8f26b8bb91b40deebf4ec184391
|
[
"Patch"
] |
git.kernel.org
| 125,457 |
CVE-2021-47173
|
2024-03-25T10:15:09.010
|
https://git.kernel.org/stable/c/7889c70e6173ef358f3cd7578db127a489035a42
|
[
"Patch"
] |
git.kernel.org
| 125,457 |
CVE-2021-47173
|
2024-03-25T10:15:09.010
|
https://git.kernel.org/stable/c/a3c3face38cb49932c62adcc1289914f1c742096
|
[
"Patch"
] |
git.kernel.org
| 125,457 |
CVE-2021-47173
|
2024-03-25T10:15:09.010
|
https://git.kernel.org/stable/c/bcb30cc8f8befcbdbcf7a016e4dfd4747c54a364
|
[
"Patch"
] |
git.kernel.org
| 125,457 |
CVE-2021-47173
|
2024-03-25T10:15:09.010
|
https://git.kernel.org/stable/c/dcb4b8ad6a448532d8b681b5d1a7036210b622de
|
[
"Patch"
] |
git.kernel.org
| 125,457 |
CVE-2021-47179
|
2024-03-25T10:15:09.317
|
https://git.kernel.org/stable/c/39785761feadf261bc5101372b0b0bbaf6a94494
|
[
"Patch"
] |
git.kernel.org
| 125,463 |
CVE-2021-47179
|
2024-03-25T10:15:09.317
|
https://git.kernel.org/stable/c/42637ca25c7d7b5a92804a679af5192e8c1a9f48
|
[
"Patch"
] |
git.kernel.org
| 125,463 |
CVE-2021-47179
|
2024-03-25T10:15:09.317
|
https://git.kernel.org/stable/c/4e1ba532dbc1a0e19fc2458d74ab8d98680c4e42
|
[
"Patch"
] |
git.kernel.org
| 125,463 |
CVE-2021-47179
|
2024-03-25T10:15:09.317
|
https://git.kernel.org/stable/c/a421d218603ffa822a0b8045055c03eae394a7eb
|
[
"Patch"
] |
git.kernel.org
| 125,463 |
CVE-2021-47179
|
2024-03-25T10:15:09.317
|
https://git.kernel.org/stable/c/aba3c7795f51717ae316f3566442dee7cc3eeccb
|
[
"Patch"
] |
git.kernel.org
| 125,463 |
CVE-2021-47179
|
2024-03-25T10:15:09.317
|
https://git.kernel.org/stable/c/b090d110e66636bca473fd8b98d5c97b555a965a
|
[
"Patch"
] |
git.kernel.org
| 125,463 |
CVE-2021-47179
|
2024-03-25T10:15:09.317
|
https://git.kernel.org/stable/c/f9890652185b72b8de9ebeb4406037640b6e1b53
|
[
"Patch"
] |
git.kernel.org
| 125,463 |
CVE-2024-29945
|
2024-03-27T17:15:54.087
|
https://advisory.splunk.com/advisories/SVD-2024-0301
|
[
"Mitigation",
"Vendor Advisory"
] |
advisory.splunk.com
| 125,920 |
CVE-2024-29945
|
2024-03-27T17:15:54.087
|
https://research.splunk.com/application/9a67e749-d291-40dd-8376-d422e7ecf8b5
|
[
"Technical Description",
"Vendor Advisory"
] |
research.splunk.com
| 125,920 |
CVE-2024-29946
|
2024-03-27T17:15:54.273
|
https://advisory.splunk.com/advisories/SVD-2024-0302
|
[
"Vendor Advisory"
] |
advisory.splunk.com
| 125,921 |
CVE-2024-29946
|
2024-03-27T17:15:54.273
|
https://research.splunk.com/application/1cf58ae1-9177-40b8-a26c-8966040f11ae/
|
[
"Vendor Advisory"
] |
research.splunk.com
| 125,921 |
CVE-2023-42950
|
2024-03-28T16:15:08.313
|
http://www.openwall.com/lists/oss-security/2024/03/26/1
| null |
www.openwall.com
| 126,114 |
CVE-2023-42950
|
2024-03-28T16:15:08.313
|
https://lists.fedoraproject.org/archives/list/[email protected]/message/IXLXIOAH5S7J22LJTCIAVFVVJ4TESAX4/
| null |
lists.fedoraproject.org
| 126,114 |
CVE-2024-3094
|
2024-03-29T17:15:21.150
|
http://www.openwall.com/lists/oss-security/2024/03/29/10
| null |
www.openwall.com
| 126,291 |
CVE-2024-3094
|
2024-03-29T17:15:21.150
|
http://www.openwall.com/lists/oss-security/2024/03/29/12
| null |
www.openwall.com
| 126,291 |
CVE-2024-3094
|
2024-03-29T17:15:21.150
|
http://www.openwall.com/lists/oss-security/2024/03/29/4
| null |
www.openwall.com
| 126,291 |
CVE-2024-3094
|
2024-03-29T17:15:21.150
|
http://www.openwall.com/lists/oss-security/2024/03/29/5
| null |
www.openwall.com
| 126,291 |
CVE-2024-3094
|
2024-03-29T17:15:21.150
|
http://www.openwall.com/lists/oss-security/2024/03/29/8
| null |
www.openwall.com
| 126,291 |
CVE-2024-3094
|
2024-03-29T17:15:21.150
|
http://www.openwall.com/lists/oss-security/2024/03/30/12
| null |
www.openwall.com
| 126,291 |
CVE-2024-3094
|
2024-03-29T17:15:21.150
|
http://www.openwall.com/lists/oss-security/2024/03/30/27
| null |
www.openwall.com
| 126,291 |
CVE-2024-3094
|
2024-03-29T17:15:21.150
|
http://www.openwall.com/lists/oss-security/2024/03/30/36
| null |
www.openwall.com
| 126,291 |
CVE-2024-3094
|
2024-03-29T17:15:21.150
|
http://www.openwall.com/lists/oss-security/2024/03/30/5
| null |
www.openwall.com
| 126,291 |
CVE-2024-3094
|
2024-03-29T17:15:21.150
|
http://www.openwall.com/lists/oss-security/2024/04/16/5
| null |
www.openwall.com
| 126,291 |
CVE-2024-3094
|
2024-03-29T17:15:21.150
|
https://access.redhat.com/security/cve/CVE-2024-3094
|
[
"Vendor Advisory"
] |
access.redhat.com
| 126,291 |
CVE-2024-3094
|
2024-03-29T17:15:21.150
|
https://ariadne.space/2024/04/02/the-xz-utils-backdoor-is-a-symptom-of-a-larger-problem/
| null |
ariadne.space
| 126,291 |
CVE-2024-3094
|
2024-03-29T17:15:21.150
|
https://arstechnica.com/security/2024/03/backdoor-found-in-widely-used-linux-utility-breaks-encrypted-ssh-connections/
|
[
"Third Party Advisory"
] |
arstechnica.com
| 126,291 |
CVE-2024-3094
|
2024-03-29T17:15:21.150
|
https://aws.amazon.com/security/security-bulletins/AWS-2024-002/
|
[
"Third Party Advisory"
] |
aws.amazon.com
| 126,291 |
CVE-2024-3094
|
2024-03-29T17:15:21.150
|
https://blog.netbsd.org/tnf/entry/statement_on_backdoor_in_xz
| null |
blog.netbsd.org
| 126,291 |
CVE-2024-3094
|
2024-03-29T17:15:21.150
|
https://boehs.org/node/everything-i-know-about-the-xz-backdoor
|
[
"Third Party Advisory"
] |
boehs.org
| 126,291 |
CVE-2024-3094
|
2024-03-29T17:15:21.150
|
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1068024
|
[
"Mailing List",
"Vendor Advisory"
] |
bugs.debian.org
| 126,291 |
CVE-2024-3094
|
2024-03-29T17:15:21.150
|
https://bugs.gentoo.org/928134
|
[
"Issue Tracking",
"Third Party Advisory"
] |
bugs.gentoo.org
| 126,291 |
CVE-2024-3094
|
2024-03-29T17:15:21.150
|
https://bugzilla.redhat.com/show_bug.cgi?id=2272210
|
[
"Issue Tracking",
"Vendor Advisory"
] |
bugzilla.redhat.com
| 126,291 |
CVE-2024-3094
|
2024-03-29T17:15:21.150
|
https://bugzilla.suse.com/show_bug.cgi?id=1222124
|
[
"Issue Tracking",
"Third Party Advisory"
] |
bugzilla.suse.com
| 126,291 |
CVE-2024-3094
|
2024-03-29T17:15:21.150
|
https://discourse.nixos.org/t/cve-2024-3094-malicious-code-in-xz-5-6-0-and-5-6-1-tarballs/42405
|
[
"Third Party Advisory"
] |
discourse.nixos.org
| 126,291 |
CVE-2024-3094
|
2024-03-29T17:15:21.150
|
https://gist.github.com/thesamesam/223949d5a074ebc3dce9ee78baad9e27
|
[
"Third Party Advisory"
] |
gist.github.com
| 126,291 |
CVE-2024-3094
|
2024-03-29T17:15:21.150
|
https://github.com/advisories/GHSA-rxwq-x6h5-x525
|
[
"Third Party Advisory"
] |
github.com
| 126,291 |
CVE-2024-3094
|
2024-03-29T17:15:21.150
|
https://github.com/amlweems/xzbot
| null |
github.com
| 126,291 |
CVE-2024-3094
|
2024-03-29T17:15:21.150
|
https://github.com/karcherm/xz-malware
|
[
"Third Party Advisory"
] |
github.com
| 126,291 |
CVE-2024-3094
|
2024-03-29T17:15:21.150
|
https://gynvael.coldwind.pl/?lang=en&id=782
|
[
"Technical Description",
"Third Party Advisory"
] |
gynvael.coldwind.pl
| 126,291 |
CVE-2024-3094
|
2024-03-29T17:15:21.150
|
https://lists.debian.org/debian-security-announce/2024/msg00057.html
|
[
"Mailing List",
"Third Party Advisory"
] |
lists.debian.org
| 126,291 |
CVE-2024-3094
|
2024-03-29T17:15:21.150
|
https://lists.freebsd.org/archives/freebsd-security/2024-March/000248.html
|
[
"Third Party Advisory"
] |
lists.freebsd.org
| 126,291 |
CVE-2024-3094
|
2024-03-29T17:15:21.150
|
https://lwn.net/Articles/967180/
|
[
"Issue Tracking",
"Third Party Advisory"
] |
lwn.net
| 126,291 |
CVE-2024-3094
|
2024-03-29T17:15:21.150
|
https://news.ycombinator.com/item?id=39865810
|
[
"Issue Tracking",
"Third Party Advisory"
] |
news.ycombinator.com
| 126,291 |
CVE-2024-3094
|
2024-03-29T17:15:21.150
|
https://news.ycombinator.com/item?id=39877267
|
[
"Issue Tracking"
] |
news.ycombinator.com
| 126,291 |
CVE-2024-3094
|
2024-03-29T17:15:21.150
|
https://news.ycombinator.com/item?id=39895344
| null |
news.ycombinator.com
| 126,291 |
CVE-2024-3094
|
2024-03-29T17:15:21.150
|
https://openssf.org/blog/2024/03/30/xz-backdoor-cve-2024-3094/
|
[
"Third Party Advisory"
] |
openssf.org
| 126,291 |
CVE-2024-3094
|
2024-03-29T17:15:21.150
|
https://research.swtch.com/xz-script
| null |
research.swtch.com
| 126,291 |
CVE-2024-3094
|
2024-03-29T17:15:21.150
|
https://research.swtch.com/xz-timeline
| null |
research.swtch.com
| 126,291 |
CVE-2024-3094
|
2024-03-29T17:15:21.150
|
https://security-tracker.debian.org/tracker/CVE-2024-3094
|
[
"Third Party Advisory"
] |
security-tracker.debian.org
| 126,291 |
CVE-2024-3094
|
2024-03-29T17:15:21.150
|
https://security.alpinelinux.org/vuln/CVE-2024-3094
|
[
"Third Party Advisory"
] |
security.alpinelinux.org
| 126,291 |
CVE-2024-3094
|
2024-03-29T17:15:21.150
|
https://security.archlinux.org/CVE-2024-3094
|
[
"Third Party Advisory"
] |
security.archlinux.org
| 126,291 |
CVE-2024-3094
|
2024-03-29T17:15:21.150
|
https://security.netapp.com/advisory/ntap-20240402-0001/
| null |
security.netapp.com
| 126,291 |
CVE-2024-3094
|
2024-03-29T17:15:21.150
|
https://tukaani.org/xz-backdoor/
|
[
"Issue Tracking",
"Vendor Advisory"
] |
tukaani.org
| 126,291 |
CVE-2024-3094
|
2024-03-29T17:15:21.150
|
https://twitter.com/LetsDefendIO/status/1774804387417751958
|
[
"Third Party Advisory"
] |
twitter.com
| 126,291 |
CVE-2024-3094
|
2024-03-29T17:15:21.150
|
https://twitter.com/debian/status/1774219194638409898
|
[
"Press/Media Coverage"
] |
twitter.com
| 126,291 |
CVE-2024-3094
|
2024-03-29T17:15:21.150
|
https://twitter.com/infosecb/status/1774595540233167206
|
[
"Press/Media Coverage"
] |
twitter.com
| 126,291 |
CVE-2024-3094
|
2024-03-29T17:15:21.150
|
https://twitter.com/infosecb/status/1774597228864139400
|
[
"Press/Media Coverage"
] |
twitter.com
| 126,291 |
CVE-2024-3094
|
2024-03-29T17:15:21.150
|
https://ubuntu.com/security/CVE-2024-3094
|
[
"Third Party Advisory"
] |
ubuntu.com
| 126,291 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.