id
stringlengths 13
16
| published
stringlengths 23
23
| url
stringlengths 12
500
| tags
sequencelengths 1
6
⌀ | domain
stringlengths 4
49
| __index_level_0__
int64 0
135k
|
---|---|---|---|---|---|
CVE-2023-52815 | 2024-05-21T16:15:19.620 | https://git.kernel.org/stable/c/33fb1a555354bd593f785935ddcb5d9dd4d3847f | [
"Patch"
] | git.kernel.org | 134,124 |
CVE-2023-52815 | 2024-05-21T16:15:19.620 | https://git.kernel.org/stable/c/70f831f21155c692bb336c434936fd6f24f3f81a | [
"Patch"
] | git.kernel.org | 134,124 |
CVE-2023-52815 | 2024-05-21T16:15:19.620 | https://git.kernel.org/stable/c/8c6c85a073768df68c1a3fea143d013a38c66d34 | [
"Patch"
] | git.kernel.org | 134,124 |
CVE-2023-52815 | 2024-05-21T16:15:19.620 | https://git.kernel.org/stable/c/cd90511557fdfb394bb4ac4c3b539b007383914c | [
"Patch"
] | git.kernel.org | 134,124 |
CVE-2023-52815 | 2024-05-21T16:15:19.620 | https://git.kernel.org/stable/c/eaa03ea366c85ae3cb69c8d4bbc67c8bc2167a27 | [
"Patch"
] | git.kernel.org | 134,124 |
CVE-2023-52817 | 2024-05-21T16:15:19.763 | https://git.kernel.org/stable/c/174f62a0aa15c211e60208b41ee9e7cdfb73d455 | [
"Patch"
] | git.kernel.org | 134,126 |
CVE-2023-52817 | 2024-05-21T16:15:19.763 | https://git.kernel.org/stable/c/437e0fa907ba39b4d7eda863c03ea9cf48bd93a9 | [
"Patch"
] | git.kernel.org | 134,126 |
CVE-2023-52817 | 2024-05-21T16:15:19.763 | https://git.kernel.org/stable/c/5104fdf50d326db2c1a994f8b35dcd46e63ae4ad | [
"Patch"
] | git.kernel.org | 134,126 |
CVE-2023-52817 | 2024-05-21T16:15:19.763 | https://git.kernel.org/stable/c/6c1b3d89a2dda79881726bb6e37af19c0936d736 | [
"Patch"
] | git.kernel.org | 134,126 |
CVE-2023-52817 | 2024-05-21T16:15:19.763 | https://git.kernel.org/stable/c/820daf9ffe2b0afb804567b10983fb38bc5ae288 | [
"Patch"
] | git.kernel.org | 134,126 |
CVE-2023-52817 | 2024-05-21T16:15:19.763 | https://git.kernel.org/stable/c/ba3c0796d292de84f2932cc5bbb0f771fc720996 | [
"Patch"
] | git.kernel.org | 134,126 |
CVE-2023-52817 | 2024-05-21T16:15:19.763 | https://git.kernel.org/stable/c/bf2d51eedf03bd61e3556e35d74d49e2e6112398 | [
"Patch"
] | git.kernel.org | 134,126 |
CVE-2023-52817 | 2024-05-21T16:15:19.763 | https://git.kernel.org/stable/c/f475d5502f33a6c5b149b0afe96316ad1962a64a | [
"Patch"
] | git.kernel.org | 134,126 |
CVE-2023-52821 | 2024-05-21T16:15:20.047 | https://git.kernel.org/stable/c/2381f6b628b3214f07375e0adf5ce17093c31190 | [
"Patch"
] | git.kernel.org | 134,130 |
CVE-2023-52821 | 2024-05-21T16:15:20.047 | https://git.kernel.org/stable/c/4fa930ba046d20fc1899770396ee11e905fa96e4 | [
"Patch"
] | git.kernel.org | 134,130 |
CVE-2023-52821 | 2024-05-21T16:15:20.047 | https://git.kernel.org/stable/c/79813cd59398015867d51e6d7dcc14d287d4c402 | [
"Patch"
] | git.kernel.org | 134,130 |
CVE-2023-52821 | 2024-05-21T16:15:20.047 | https://git.kernel.org/stable/c/8a9dd36fcb4f3906982b82593393578db4479992 | [
"Patch"
] | git.kernel.org | 134,130 |
CVE-2023-52821 | 2024-05-21T16:15:20.047 | https://git.kernel.org/stable/c/924e5814d1f84e6fa5cb19c6eceb69f066225229 | [
"Patch"
] | git.kernel.org | 134,130 |
CVE-2023-52821 | 2024-05-21T16:15:20.047 | https://git.kernel.org/stable/c/c7dc0aca5962fb37dbea9769dd26ec37813faae1 | [
"Patch"
] | git.kernel.org | 134,130 |
CVE-2023-52827 | 2024-05-21T16:15:20.463 | https://git.kernel.org/stable/c/1bc44a505a229bb1dd4957e11aa594edeea3690e | [
"Patch"
] | git.kernel.org | 134,136 |
CVE-2023-52827 | 2024-05-21T16:15:20.463 | https://git.kernel.org/stable/c/79527c21a3ce04cffc35ea54f74ee087e532be57 | [
"Patch"
] | git.kernel.org | 134,136 |
CVE-2023-52827 | 2024-05-21T16:15:20.463 | https://git.kernel.org/stable/c/c9e44111da221246efb2e623ae1be40a5cf6542c | [
"Patch"
] | git.kernel.org | 134,136 |
CVE-2024-20360 | 2024-05-22T18:15:09.493 | https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-sqli-WFFDnNOs | [
"Vendor Advisory"
] | sec.cloudapps.cisco.com | 134,379 |
CVE-2024-22026 | 2024-05-22T23:15:08.520 | https://forums.ivanti.com/s/article/Security-Advisory-EPMM-May-2024?language=en_US | [
"Vendor Advisory"
] | forums.ivanti.com | 134,398 |
CVE-2024-4978 | 2024-05-23T02:15:09.257 | https://twitter.com/2RunJack2/status/1775052981966377148 | [
"Press/Media Coverage",
"Third Party Advisory"
] | twitter.com | 134,411 |
CVE-2024-4978 | 2024-05-23T02:15:09.257 | https://www.javs.com/downloads/ | [
"Vendor Advisory"
] | www.javs.com | 134,411 |
CVE-2024-4978 | 2024-05-23T02:15:09.257 | https://www.rapid7.com/blog/post/2024/05/23/cve-2024-4978-backdoored-justice-av-solutions-viewer-software-used-in-apparent-supply-chain-attack/ | [
"Exploit",
"Third Party Advisory"
] | www.rapid7.com | 134,411 |
CVE-2024-5274 | 2024-05-28T15:15:10.443 | https://chromereleases.googleblog.com/2024/05/stable-channel-update-for-desktop_23.html | [
"Vendor Advisory"
] | chromereleases.googleblog.com | 134,819 |
CVE-2024-5274 | 2024-05-28T15:15:10.443 | https://issues.chromium.org/issues/341663589 | [
"Permissions Required"
] | issues.chromium.org | 134,819 |
CVE-2024-24919 | 2024-05-28T19:15:10.060 | https://support.checkpoint.com/results/sk/sk182336 | [
"Mitigation",
"Patch",
"Vendor Advisory"
] | support.checkpoint.com | 134,875 |