Auto-Update: 2024-05-16T06:00:30.058589+00:00

This commit is contained in:
cad-safe-bot 2024-05-16 06:03:21 +00:00
parent 6d437c1d9e
commit 031dc4bbd1
8 changed files with 575 additions and 18 deletions

View File

@ -0,0 +1,92 @@
{
"id": "CVE-2024-4929",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-05-16T04:15:09.997",
"lastModified": "2024-05-16T04:15:09.997",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability classified as problematic has been found in SourceCodester Simple Online Bidding System 1.0. This affects an unknown part of the file /simple-online-bidding-system/admin/ajax.php?action=save_user. The manipulation leads to cross-site request forgery. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-264465 was assigned to this vulnerability."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 1.4
}
],
"cvssMetricV2": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N",
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"availabilityImpact": "NONE",
"baseScore": 5.0
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 10.0,
"impactScore": 2.9,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-352"
}
]
}
],
"references": [
{
"url": "https://github.com/Hefei-Coffee/cve/blob/main/csrf.md",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?ctiid.264465",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?id.264465",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?submit.333894",
"source": "cna@vuldb.com"
}
]
}

View File

@ -0,0 +1,92 @@
{
"id": "CVE-2024-4930",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-05-16T04:15:14.873",
"lastModified": "2024-05-16T04:15:14.873",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability classified as critical was found in SourceCodester Simple Online Bidding System 1.0. This vulnerability affects unknown code of the file /simple-online-bidding-system/index.php?page=view_prod. The manipulation of the argument id leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. VDB-264466 is the identifier assigned to this vulnerability."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW",
"baseScore": 6.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 3.4
}
],
"cvssMetricV2": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "SINGLE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL",
"baseScore": 6.5
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 8.0,
"impactScore": 6.4,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"references": [
{
"url": "https://github.com/rockersiyuan/CVE/blob/main/SourceCodester%20Simple%20Online%20Bidding%20System%20Sql%20Inject-1.md",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?ctiid.264466",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?id.264466",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?submit.335343",
"source": "cna@vuldb.com"
}
]
}

View File

@ -0,0 +1,92 @@
{
"id": "CVE-2024-4931",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-05-16T05:15:51.297",
"lastModified": "2024-05-16T05:15:51.297",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability, which was classified as critical, has been found in SourceCodester Simple Online Bidding System 1.0. This issue affects some unknown processing of the file /simple-online-bidding-system/admin/index.php?page=view_udet. The manipulation of the argument id leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-264467."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW",
"baseScore": 6.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 3.4
}
],
"cvssMetricV2": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "SINGLE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL",
"baseScore": 6.5
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 8.0,
"impactScore": 6.4,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"references": [
{
"url": "https://github.com/rockersiyuan/CVE/blob/main/SourceCodester%20Simple%20Online%20Bidding%20System%20Sql%20Inject-2.md",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?ctiid.264467",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?id.264467",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?submit.335365",
"source": "cna@vuldb.com"
}
]
}

View File

@ -0,0 +1,92 @@
{
"id": "CVE-2024-4932",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-05-16T05:15:51.653",
"lastModified": "2024-05-16T05:15:51.653",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability, which was classified as critical, was found in SourceCodester Simple Online Bidding System 1.0. Affected is an unknown function of the file /simple-online-bidding-system/admin/index.php?page=manage_user. The manipulation of the argument id leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-264468."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW",
"baseScore": 6.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 3.4
}
],
"cvssMetricV2": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "SINGLE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL",
"baseScore": 6.5
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 8.0,
"impactScore": 6.4,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"references": [
{
"url": "https://github.com/rockersiyuan/CVE/blob/main/SourceCodester%20Simple%20Online%20Bidding%20System%20Sql%20Inject-3.md",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?ctiid.264468",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?id.264468",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?submit.335366",
"source": "cna@vuldb.com"
}
]
}

View File

@ -0,0 +1,92 @@
{
"id": "CVE-2024-4933",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-05-16T05:15:51.923",
"lastModified": "2024-05-16T05:15:51.923",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability has been found in SourceCodester Simple Online Bidding System 1.0 and classified as critical. Affected by this vulnerability is an unknown functionality of the file /simple-online-bidding-system/admin/index.php?page=manage_product. The manipulation of the argument id leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-264469 was assigned to this vulnerability."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW",
"baseScore": 6.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 3.4
}
],
"cvssMetricV2": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "SINGLE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL",
"baseScore": 6.5
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 8.0,
"impactScore": 6.4,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"references": [
{
"url": "https://github.com/rockersiyuan/CVE/blob/main/SourceCodester%20Simple%20Online%20Bidding%20System%20Sql%20Inject-4.md",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?ctiid.264469",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?id.264469",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?submit.335367",
"source": "cna@vuldb.com"
}
]
}

View File

@ -0,0 +1,92 @@
{
"id": "CVE-2024-4945",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-05-16T05:15:52.187",
"lastModified": "2024-05-16T05:15:52.187",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was found in SourceCodester Best Courier Management System 1.0. It has been classified as problematic. Affected is an unknown function of the file view_parcel.php. The manipulation of the argument id leads to unrestricted upload. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-264480."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 1.4
}
],
"cvssMetricV2": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:S/C:P/I:N/A:N",
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "SINGLE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.0
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 8.0,
"impactScore": 2.9,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-434"
}
]
}
],
"references": [
{
"url": "https://github.com/CveSecLook/cve/issues/28",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?ctiid.264480",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?id.264480",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?submit.333960",
"source": "cna@vuldb.com"
}
]
}

View File

@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update
```plain
2024-05-16T04:00:31.132713+00:00
2024-05-16T06:00:30.058589+00:00
```
### Most recent CVE Modification Timestamp synchronized with NVD
```plain
2024-05-16T03:15:08.387000+00:00
2024-05-16T05:15:52.187000+00:00
```
### Last Data Feed Release
@ -33,20 +33,19 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
### Total Number of included CVEs
```plain
250069
250075
```
### CVEs added in the last Commit
Recently added CVEs: `7`
Recently added CVEs: `6`
- [CVE-2024-3750](CVE-2024/CVE-2024-37xx/CVE-2024-3750.json) (`2024-05-16T03:15:07.913`)
- [CVE-2024-4923](CVE-2024/CVE-2024-49xx/CVE-2024-4923.json) (`2024-05-16T02:15:07.900`)
- [CVE-2024-4925](CVE-2024/CVE-2024-49xx/CVE-2024-4925.json) (`2024-05-16T02:15:08.390`)
- [CVE-2024-4926](CVE-2024/CVE-2024-49xx/CVE-2024-4926.json) (`2024-05-16T02:15:08.693`)
- [CVE-2024-4927](CVE-2024/CVE-2024-49xx/CVE-2024-4927.json) (`2024-05-16T03:15:08.123`)
- [CVE-2024-4928](CVE-2024/CVE-2024-49xx/CVE-2024-4928.json) (`2024-05-16T03:15:08.387`)
- [CVE-2024-4984](CVE-2024/CVE-2024-49xx/CVE-2024-4984.json) (`2024-05-16T02:15:09.003`)
- [CVE-2024-4929](CVE-2024/CVE-2024-49xx/CVE-2024-4929.json) (`2024-05-16T04:15:09.997`)
- [CVE-2024-4930](CVE-2024/CVE-2024-49xx/CVE-2024-4930.json) (`2024-05-16T04:15:14.873`)
- [CVE-2024-4931](CVE-2024/CVE-2024-49xx/CVE-2024-4931.json) (`2024-05-16T05:15:51.297`)
- [CVE-2024-4932](CVE-2024/CVE-2024-49xx/CVE-2024-4932.json) (`2024-05-16T05:15:51.653`)
- [CVE-2024-4933](CVE-2024/CVE-2024-49xx/CVE-2024-4933.json) (`2024-05-16T05:15:51.923`)
- [CVE-2024-4945](CVE-2024/CVE-2024-49xx/CVE-2024-4945.json) (`2024-05-16T05:15:52.187`)
### CVEs modified in the last Commit

View File

@ -249451,7 +249451,7 @@ CVE-2024-3746,0,0,ab6567509a82c4f0182861199dbafd1145e3e92d047a264ff58554ba2ee7e5
CVE-2024-3747,0,0,6871870ddb764bd7e2884ba1607d3a8e3ec9c4bf7e3490a3d61f8ca42b77a2e1,2024-05-02T18:00:37.360000
CVE-2024-3748,0,0,8dc8a611bd9f5bde0a6bec19ad153dd24957816690b71b2453b98a3801431ad7,2024-05-15T16:40:19.330000
CVE-2024-3749,0,0,c726dfa1c35319d7b5d35900d21f1a9428dd6574780a76dc1de2b442602e3b93,2024-05-15T16:40:19.330000
CVE-2024-3750,1,1,4931eb415a569aa05d07a07fa0b78c822c497b564387d5c8543b969e21ac189c,2024-05-16T03:15:07.913000
CVE-2024-3750,0,0,4931eb415a569aa05d07a07fa0b78c822c497b564387d5c8543b969e21ac189c,2024-05-16T03:15:07.913000
CVE-2024-3752,0,0,06a3522f543993aef42f352f0c011207c560c2e5a1d63c9d8ccc34a87adab0ce,2024-05-06T12:44:56.377000
CVE-2024-3755,0,0,255cc63bdc34aca663119fb8f6757a7da5a9acef7ecda034d88dc05babf4b05b,2024-05-06T12:44:56.377000
CVE-2024-3756,0,0,978b8204ea279199334a4c8c549150dc6420f24480b5effb717e8509749d66aa,2024-05-06T12:44:56.377000
@ -250057,14 +250057,20 @@ CVE-2024-4919,0,0,9395e269c4d639503899daba02f8f8ef3e889bf0a909530d3bcbde59080f90
CVE-2024-4920,0,0,7d4fbcd3c2333b8cd5d13050df57570cc73655912e9f0607ef2981105e7b4eff,2024-05-16T00:15:08.563000
CVE-2024-4921,0,0,74bf965278d37dd3b4a08b96a0a79c85e131f73322be52ee99eaef8e8fd7e138,2024-05-16T01:15:07.540000
CVE-2024-4922,0,0,107d8830fcd4c6b9ffa0f0768c22eb2d976c5b1746e34d23ce3bb57a1b3c122b,2024-05-16T01:15:07.813000
CVE-2024-4923,1,1,bb2c35fdebd5fffc304fad5e8db801119694d20cf2b08b991d3ba0f96fe32724,2024-05-16T02:15:07.900000
CVE-2024-4925,1,1,f27597173421d84a6aac0b72a1bbddc32a9683af76ff6d49d4515a214314382f,2024-05-16T02:15:08.390000
CVE-2024-4926,1,1,4f98e2141ed005b65ace4243520c4a74cf195b626ffbd2348d2371f0030a111c,2024-05-16T02:15:08.693000
CVE-2024-4927,1,1,75241ddb08f272d96e505368d4085d15e400ffeb74f400a01614a704de643552,2024-05-16T03:15:08.123000
CVE-2024-4928,1,1,323f47d5f31773ee017d1eb20a2af002adaec5ddcf60bb89f3fe599cd45a64e6,2024-05-16T03:15:08.387000
CVE-2024-4923,0,0,bb2c35fdebd5fffc304fad5e8db801119694d20cf2b08b991d3ba0f96fe32724,2024-05-16T02:15:07.900000
CVE-2024-4925,0,0,f27597173421d84a6aac0b72a1bbddc32a9683af76ff6d49d4515a214314382f,2024-05-16T02:15:08.390000
CVE-2024-4926,0,0,4f98e2141ed005b65ace4243520c4a74cf195b626ffbd2348d2371f0030a111c,2024-05-16T02:15:08.693000
CVE-2024-4927,0,0,75241ddb08f272d96e505368d4085d15e400ffeb74f400a01614a704de643552,2024-05-16T03:15:08.123000
CVE-2024-4928,0,0,323f47d5f31773ee017d1eb20a2af002adaec5ddcf60bb89f3fe599cd45a64e6,2024-05-16T03:15:08.387000
CVE-2024-4929,1,1,edfd15fc5d94d8ac95e936a84c0de715965d27f6e5272229617201c4208e15f1,2024-05-16T04:15:09.997000
CVE-2024-4930,1,1,3d4b0e3126e39683b6520266d82fa17aa1b61b155692c5e1fd3ac967e9b971ec,2024-05-16T04:15:14.873000
CVE-2024-4931,1,1,e8aef8669aecd123bcf043fff54871e4465e2968f0b1250d2d302a5f8fecabe4,2024-05-16T05:15:51.297000
CVE-2024-4932,1,1,058543e447fe0a6c6e3ca8a3b483a4b014e7d28d3f060e226c444a4c1c5a9a03,2024-05-16T05:15:51.653000
CVE-2024-4933,1,1,ab99dc1911a1d20350ea3b7f0ab187ed2ed291967036718a5441324a0985fe0a,2024-05-16T05:15:51.923000
CVE-2024-4945,1,1,f7ff43915bb3447a49348ea8439196c37097175d385373eb27c5110d3bca27db,2024-05-16T05:15:52.187000
CVE-2024-4947,0,0,f706014ab5e494173f189b6b147bc73eaca2bb6d431298f9b49d098b14ff5782,2024-05-15T21:15:09.273000
CVE-2024-4948,0,0,bdd7cd38392862513bf6cf6f69f8c528e08e359340031d01daba548f07be3f14,2024-05-15T21:15:09.347000
CVE-2024-4949,0,0,7a7f679654eca12ebf0c1d1d6ac210b4148b3d26ab259c26b5f77d48b40c4cf5,2024-05-15T21:15:09.430000
CVE-2024-4950,0,0,efed32b4f23b877a04e85fe2ab12f10b9d3c39ad2529470125a1a9db3cdcfb9e,2024-05-15T21:15:09.493000
CVE-2024-4976,0,0,7bb4e20b87953c4b97f492da11cca71d462ce6af7b37913524811fb56920cd3a,2024-05-15T21:15:09.560000
CVE-2024-4984,1,1,ae1bf2c0289bb389f179eb37322fc8de1d2045b7a529e537ac0945a8c2d06fe0,2024-05-16T02:15:09.003000
CVE-2024-4984,0,0,ae1bf2c0289bb389f179eb37322fc8de1d2045b7a529e537ac0945a8c2d06fe0,2024-05-16T02:15:09.003000

Can't render this file because it is too large.