id
stringlengths 13
16
| published
stringlengths 23
23
| url
stringlengths 12
500
| tags
listlengths 1
6
⌀ | domain
stringlengths 4
49
| __index_level_0__
int64 0
135k
|
---|---|---|---|---|---|
CVE-2023-52815
|
2024-05-21T16:15:19.620
|
https://git.kernel.org/stable/c/33fb1a555354bd593f785935ddcb5d9dd4d3847f
|
[
"Patch"
] |
git.kernel.org
| 134,124 |
CVE-2023-52815
|
2024-05-21T16:15:19.620
|
https://git.kernel.org/stable/c/70f831f21155c692bb336c434936fd6f24f3f81a
|
[
"Patch"
] |
git.kernel.org
| 134,124 |
CVE-2023-52815
|
2024-05-21T16:15:19.620
|
https://git.kernel.org/stable/c/8c6c85a073768df68c1a3fea143d013a38c66d34
|
[
"Patch"
] |
git.kernel.org
| 134,124 |
CVE-2023-52815
|
2024-05-21T16:15:19.620
|
https://git.kernel.org/stable/c/cd90511557fdfb394bb4ac4c3b539b007383914c
|
[
"Patch"
] |
git.kernel.org
| 134,124 |
CVE-2023-52815
|
2024-05-21T16:15:19.620
|
https://git.kernel.org/stable/c/eaa03ea366c85ae3cb69c8d4bbc67c8bc2167a27
|
[
"Patch"
] |
git.kernel.org
| 134,124 |
CVE-2023-52817
|
2024-05-21T16:15:19.763
|
https://git.kernel.org/stable/c/174f62a0aa15c211e60208b41ee9e7cdfb73d455
|
[
"Patch"
] |
git.kernel.org
| 134,126 |
CVE-2023-52817
|
2024-05-21T16:15:19.763
|
https://git.kernel.org/stable/c/437e0fa907ba39b4d7eda863c03ea9cf48bd93a9
|
[
"Patch"
] |
git.kernel.org
| 134,126 |
CVE-2023-52817
|
2024-05-21T16:15:19.763
|
https://git.kernel.org/stable/c/5104fdf50d326db2c1a994f8b35dcd46e63ae4ad
|
[
"Patch"
] |
git.kernel.org
| 134,126 |
CVE-2023-52817
|
2024-05-21T16:15:19.763
|
https://git.kernel.org/stable/c/6c1b3d89a2dda79881726bb6e37af19c0936d736
|
[
"Patch"
] |
git.kernel.org
| 134,126 |
CVE-2023-52817
|
2024-05-21T16:15:19.763
|
https://git.kernel.org/stable/c/820daf9ffe2b0afb804567b10983fb38bc5ae288
|
[
"Patch"
] |
git.kernel.org
| 134,126 |
CVE-2023-52817
|
2024-05-21T16:15:19.763
|
https://git.kernel.org/stable/c/ba3c0796d292de84f2932cc5bbb0f771fc720996
|
[
"Patch"
] |
git.kernel.org
| 134,126 |
CVE-2023-52817
|
2024-05-21T16:15:19.763
|
https://git.kernel.org/stable/c/bf2d51eedf03bd61e3556e35d74d49e2e6112398
|
[
"Patch"
] |
git.kernel.org
| 134,126 |
CVE-2023-52817
|
2024-05-21T16:15:19.763
|
https://git.kernel.org/stable/c/f475d5502f33a6c5b149b0afe96316ad1962a64a
|
[
"Patch"
] |
git.kernel.org
| 134,126 |
CVE-2023-52821
|
2024-05-21T16:15:20.047
|
https://git.kernel.org/stable/c/2381f6b628b3214f07375e0adf5ce17093c31190
|
[
"Patch"
] |
git.kernel.org
| 134,130 |
CVE-2023-52821
|
2024-05-21T16:15:20.047
|
https://git.kernel.org/stable/c/4fa930ba046d20fc1899770396ee11e905fa96e4
|
[
"Patch"
] |
git.kernel.org
| 134,130 |
CVE-2023-52821
|
2024-05-21T16:15:20.047
|
https://git.kernel.org/stable/c/79813cd59398015867d51e6d7dcc14d287d4c402
|
[
"Patch"
] |
git.kernel.org
| 134,130 |
CVE-2023-52821
|
2024-05-21T16:15:20.047
|
https://git.kernel.org/stable/c/8a9dd36fcb4f3906982b82593393578db4479992
|
[
"Patch"
] |
git.kernel.org
| 134,130 |
CVE-2023-52821
|
2024-05-21T16:15:20.047
|
https://git.kernel.org/stable/c/924e5814d1f84e6fa5cb19c6eceb69f066225229
|
[
"Patch"
] |
git.kernel.org
| 134,130 |
CVE-2023-52821
|
2024-05-21T16:15:20.047
|
https://git.kernel.org/stable/c/c7dc0aca5962fb37dbea9769dd26ec37813faae1
|
[
"Patch"
] |
git.kernel.org
| 134,130 |
CVE-2023-52827
|
2024-05-21T16:15:20.463
|
https://git.kernel.org/stable/c/1bc44a505a229bb1dd4957e11aa594edeea3690e
|
[
"Patch"
] |
git.kernel.org
| 134,136 |
CVE-2023-52827
|
2024-05-21T16:15:20.463
|
https://git.kernel.org/stable/c/79527c21a3ce04cffc35ea54f74ee087e532be57
|
[
"Patch"
] |
git.kernel.org
| 134,136 |
CVE-2023-52827
|
2024-05-21T16:15:20.463
|
https://git.kernel.org/stable/c/c9e44111da221246efb2e623ae1be40a5cf6542c
|
[
"Patch"
] |
git.kernel.org
| 134,136 |
CVE-2024-20360
|
2024-05-22T18:15:09.493
|
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-sqli-WFFDnNOs
|
[
"Vendor Advisory"
] |
sec.cloudapps.cisco.com
| 134,379 |
CVE-2024-22026
|
2024-05-22T23:15:08.520
|
https://forums.ivanti.com/s/article/Security-Advisory-EPMM-May-2024?language=en_US
|
[
"Vendor Advisory"
] |
forums.ivanti.com
| 134,398 |
CVE-2024-4978
|
2024-05-23T02:15:09.257
|
https://twitter.com/2RunJack2/status/1775052981966377148
|
[
"Press/Media Coverage",
"Third Party Advisory"
] |
twitter.com
| 134,411 |
CVE-2024-4978
|
2024-05-23T02:15:09.257
|
https://www.javs.com/downloads/
|
[
"Vendor Advisory"
] |
www.javs.com
| 134,411 |
CVE-2024-4978
|
2024-05-23T02:15:09.257
|
https://www.rapid7.com/blog/post/2024/05/23/cve-2024-4978-backdoored-justice-av-solutions-viewer-software-used-in-apparent-supply-chain-attack/
|
[
"Exploit",
"Third Party Advisory"
] |
www.rapid7.com
| 134,411 |
CVE-2024-5274
|
2024-05-28T15:15:10.443
|
https://chromereleases.googleblog.com/2024/05/stable-channel-update-for-desktop_23.html
|
[
"Vendor Advisory"
] |
chromereleases.googleblog.com
| 134,819 |
CVE-2024-5274
|
2024-05-28T15:15:10.443
|
https://issues.chromium.org/issues/341663589
|
[
"Permissions Required"
] |
issues.chromium.org
| 134,819 |
CVE-2024-24919
|
2024-05-28T19:15:10.060
|
https://support.checkpoint.com/results/sk/sk182336
|
[
"Mitigation",
"Patch",
"Vendor Advisory"
] |
support.checkpoint.com
| 134,875 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.