Auto-Update: 2024-04-17T22:00:37.604106+00:00

This commit is contained in:
cad-safe-bot 2024-04-17 22:03:27 +00:00
parent 627a5ec667
commit 0a70a56806
65 changed files with 1098 additions and 228 deletions

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-52462",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-02-23T15:15:08.540",
"lastModified": "2024-02-23T16:14:43.447",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-04-17T20:06:29.470",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -14,31 +14,130 @@
"value": "En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: bpf: revisi\u00f3n de correcci\u00f3n para intentar da\u00f1ar el puntero derramado Cuando el registro se derrama en una pila como un registro de 1/2/4 bytes, configuramos slot_type[BPF_REG_SIZE - 1] (m\u00e1s potencialmente algunos m\u00e1s debajo de \u00e9l, dependiendo del tama\u00f1o real del derrame). Entonces, para verificar si alguna ranura de la pila se ha desbordado, debemos consultar slot_type[7], no slot_type[0]. Para evitar la necesidad de recordar y volver a verificar esto en el futuro, simplemente use el asistente is_spilled_reg()."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"availabilityImpact": "NONE",
"baseScore": 5.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionEndExcluding": "5.10.209",
"matchCriteriaId": "384EB2A9-356B-40A1-968F-BCBB50C38134"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.11.0",
"versionEndExcluding": "5.15.148",
"matchCriteriaId": "E25E1389-4B0F-407A-9C94-5908FF3EE88B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.16.0",
"versionEndExcluding": "6.1.75",
"matchCriteriaId": "2C4951FA-80C0-4B4C-9836-6E5035DEB0F9"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.2.0",
"versionEndExcluding": "6.6.14",
"matchCriteriaId": "BDBBEB0E-D13A-4567-8984-51C5375350B9"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.7.0",
"versionEndExcluding": "6.7.2",
"matchCriteriaId": "0EA3778C-730B-464C-8023-18CA6AC0B807"
}
]
}
]
}
],
"references": [
{
"url": "https://git.kernel.org/stable/c/2757f17972d87773b3677777f5682510f13c66ef",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/40617d45ea05535105e202a8a819e388a2b1f036",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/67e6707f07354ed1acb4e65552e97c60cf9d69cf",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/8dc15b0670594543c356567a1a45b0182ec63174",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/ab125ed3ec1c10ccc36bc98c7a4256ad114a3dae",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/fc3e3c50a0a4cac1463967c110686189e4a59104",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-52463",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-02-23T15:15:08.590",
"lastModified": "2024-02-23T16:14:43.447",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-04-17T20:05:08.550",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -14,31 +14,131 @@
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: efivarfs: fuerza RO al volver a montar si SetVariable no es compatible. Si SetVariable en tiempo de ejecuci\u00f3n no es compatible con el firmware, nunca asignamos una devoluci\u00f3n de llamada para esa funci\u00f3n. Al mismo tiempo, monte los efivarfs como RO para que nadie pueda llamarlo. Sin embargo, nunca verificamos los indicadores de permiso cuando alguien vuelve a montar el sistema de archivos como RW. Como resultado, esto provoca un bloqueo similar al siguiente: $ mount -o remount,rw /sys/firmware/efi/efivars $ efi-updatevar -f PK.auth PK [303.279166] No se puede manejar la desreferencia del puntero NULL del kernel en la direcci\u00f3n virtual 0000000000000000 [ 303.280482] Informaci\u00f3n de cancelaci\u00f3n de memoria: [ 303.280854] ESR = 0x0000000086000004 [ 303.281338] EC = 0x21: IABT (EL actual), IL = 32 bits [ 303.282016] SET = 0, F nV = 0 [ 303.282414] EA = 0, S1PTW = 0 [ 303.282821] FSC = 0x04: error de traducci\u00f3n de nivel 0 [ 303.283771] tabla de p\u00e1ginas de usuario: p\u00e1ginas 4k, VA de 48 bits, pgdp=000000004258c000 [ 303.284913] [0000000000000000] pgd=00000000 00000000, p4d=00000000000000000 [303.286076] Error interno: Ups: 0000000086000004 [#1] PREEMPT SMP [ 303.286936] M\u00f3dulos vinculados en: qrtr tpm_tis tpm_tis_core crct10dif_ce arm_smccc_trng rng_core drm fuse ip_tables x_tables ipv6 [ 303.288586] CPU: 1 PID: 755 Comm: efi- updatevar No contaminado 6.3.0-rc1-00108-gc7d0c4695c68 #1 [303.289748] Nombre de hardware: Desconocido Producto desconocido/Producto desconocido, BIOS 2023.04-00627-g88336918701d 01/04/2023 [303.291150] pstate: 60400005 (nZCv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--) [303.292123] pc: 0x0 [303.292443] lr: efivar_set_variable_locked+0x74/0xec [303.293156] sp: ffff800008673c10 [303.293619] x29: ffff800008673c10 x28: ffff 0000037e8000 x27: 0000000000000000 [ 303.294592] x26: 0000000000000800 x25: ffff000002467400 x24: 0000000000000027 [ 303.295572] x23 : ffffd49ea9832000 x22: ffff0000020c9800 x21: ffff000002467000 [ 303.296566] x20: 00000000000000001 x19: 000000000000007fc x18: 00000000000 00000 [ 303.297531] x17: 0000000000000000 x16: 0000000000000000 x15: 0000aaaac807ab54 [ 303.298495] x14: ed37489f673633c0 x13: 71c45c60 6de13f80 x12: 47464259e219acf4 [ 303.299453] x11: ffff000002af7b01 x10: 0000000000000003 x9: 0000000000000002 [303.300431] x8: 0000000000000010 x7: ffffd49ea8973230 x6: 0000000000a85201 [303.301412] x5: 0000000000000000 x4: ffff0000020c9800 x3: 00000000000007fc [303.302370] x2: 00000000000000027 x1: ffff000002467400 x0: ffff0000024670 00 [ 303.303341] Rastreo de llamadas: [ 303.303679 ] 0x0 [ 303.303938] efivar_entry_set_get_size+0x98/0x16c [ 303.304585] efivarfs_file_write+0xd0/0x1a4 [ 303.305148] vfs_write+0xc4/0x2e4 [ 303.305601] ksys_write+ 0x70/0x104 [ 303.306073] __arm64_sys_write+0x1c/0x28 [ 303.306622] invoke_syscall+0x48/0x114 [ 303.307156] el0_svc_common.constprop.0+0x44/0xec [ 303.307803] do_el0_svc+0x38/0x98 [ 303.308268] el0_svc+0x2c/0x84 [ 303.308702] el0t_64_sync_handler+0x f4/0x120 [303.309293] el0t_64_sync+0x190/0x194 [303.309794] C\u00f3digo:? ??????? ??????? ??????? ??????? (??????????) [ 303.310612] ---[ end trace 0000000000000000 ]--- Solucione este problema agregando una funci\u00f3n .reconfigure() a las operaciones fs que podemos usar para verificar los indicadores solicitados y negar cualquier cosa eso no es RO si el firmware no implementa SetVariable en tiempo de ejecuci\u00f3n."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-476"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.8.0",
"versionEndExcluding": "5.10.209",
"matchCriteriaId": "7A15A248-31E4-43F5-BBA0-FC90B42A1823"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.11.0",
"versionEndExcluding": "5.15.148",
"matchCriteriaId": "E25E1389-4B0F-407A-9C94-5908FF3EE88B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.16.0",
"versionEndExcluding": "6.1.75",
"matchCriteriaId": "2C4951FA-80C0-4B4C-9836-6E5035DEB0F9"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.2.0",
"versionEndExcluding": "6.6.14",
"matchCriteriaId": "BDBBEB0E-D13A-4567-8984-51C5375350B9"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.7.0",
"versionEndExcluding": "6.7.2",
"matchCriteriaId": "0EA3778C-730B-464C-8023-18CA6AC0B807"
}
]
}
]
}
],
"references": [
{
"url": "https://git.kernel.org/stable/c/0049fe7e4a85849bdd778cdb72e51a791ff3d737",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/0e8d2444168dd519fea501599d150e62718ed2fe",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/2aa141f8bc580f8f9811dfe4e0e6009812b73826",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/94c742324ed7e42c5bd6a9ed22e4ec6d764db4d8",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/d4a714873db0866cc471521114eeac4a5072d548",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/d4a9aa7db574a0da64307729cc031fb68597aa8b",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-52464",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-02-23T15:15:08.647",
"lastModified": "2024-02-23T16:14:43.447",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-04-17T20:03:39.197",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -14,39 +14,159 @@
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: EDAC/thunderx: corrige un posible acceso a cadenas fuera de los l\u00edmites Al habilitar -Wstringop-overflow globalmente se expone una advertencia para un error com\u00fan en el uso de strncat(): drivers/edac/ thunderx_edac.c: En la funci\u00f3n 'thunderx_ocx_com_threaded_isr': drivers/edac/thunderx_edac.c:1136:17: error: 'strncat' el l\u00edmite especificado 1024 es igual al tama\u00f1o de destino [-Werror=stringop-overflow=] 1136 | strncat(msj, otro, OCX_MESSAGE_SIZE); | ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ ... 1145 | strncat(msj, otro, OCX_MESSAGE_SIZE); ... 1150 | strncat(msj, otro, OCX_MESSAGE_SIZE); ... Aparentemente, el autor de este controlador esperaba que strncat() se comportara de la manera que lo hace strlcat(), que utiliza el tama\u00f1o del b\u00fafer de destino como tercer argumento en lugar de la longitud del b\u00fafer de origen. El resultado es que no se comprueba el tama\u00f1o del b\u00fafer asignado. C\u00e1mbielo a strlcat(). [bp: recortar la salida del compilador, mensaje de confirmaci\u00f3n de reparaci\u00f3n. ]"
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-119"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "4.12.0",
"versionEndExcluding": "4.19.306",
"matchCriteriaId": "9505037C-AC94-4E5C-BF56-B3EAE3BEE109"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "4.20.0",
"versionEndExcluding": "5.4.268",
"matchCriteriaId": "35ADF607-EDCA-45AB-8FB6-9F2D40D47C0C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.5.0",
"versionEndExcluding": "5.10.209",
"matchCriteriaId": "5D2E4F24-2FBB-4434-8598-2B1499E566B5"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.11.0",
"versionEndExcluding": "5.15.148",
"matchCriteriaId": "E25E1389-4B0F-407A-9C94-5908FF3EE88B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.16.0",
"versionEndExcluding": "6.1.75",
"matchCriteriaId": "2C4951FA-80C0-4B4C-9836-6E5035DEB0F9"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.2.0",
"versionEndExcluding": "6.6.14",
"matchCriteriaId": "BDBBEB0E-D13A-4567-8984-51C5375350B9"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.7.0",
"versionEndExcluding": "6.7.2",
"matchCriteriaId": "0EA3778C-730B-464C-8023-18CA6AC0B807"
}
]
}
]
}
],
"references": [
{
"url": "https://git.kernel.org/stable/c/426fae93c01dffa379225eb2bd4d3cdc42c6eec5",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/475c58e1a471e9b873e3e39958c64a2d278275c8",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/5da3b6e7196f0b4f3728e4e25eb20233a9ddfaf6",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/6aa7865ba7ff7f0ede0035180fb3b9400ceb405a",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/700cf4bead80fac994dcc43ae1ca5d86d8959b21",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/71c17ee02538802ceafc830f0736aa35b564e601",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/9dbac9fdae6e3b411fc4c3fca3bf48f70609c398",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/e1c86511241588efffaa49556196f09a498d5057",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-5395",
"sourceIdentifier": "psirt@honeywell.com",
"published": "2024-04-17T17:15:12.850",
"lastModified": "2024-04-17T17:15:12.850",
"vulnStatus": "Received",
"lastModified": "2024-04-17T20:08:21.887",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-5396",
"sourceIdentifier": "psirt@honeywell.com",
"published": "2024-04-17T17:15:13.060",
"lastModified": "2024-04-17T17:15:13.060",
"vulnStatus": "Received",
"lastModified": "2024-04-17T20:08:21.887",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-5397",
"sourceIdentifier": "psirt@honeywell.com",
"published": "2024-04-17T17:15:13.240",
"lastModified": "2024-04-17T17:15:13.240",
"vulnStatus": "Received",
"lastModified": "2024-04-17T20:08:21.887",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-5398",
"sourceIdentifier": "psirt@honeywell.com",
"published": "2024-04-17T17:15:13.430",
"lastModified": "2024-04-17T17:15:13.430",
"vulnStatus": "Received",
"lastModified": "2024-04-17T20:08:21.887",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-5400",
"sourceIdentifier": "psirt@honeywell.com",
"published": "2024-04-17T17:15:13.610",
"lastModified": "2024-04-17T17:15:13.610",
"vulnStatus": "Received",
"lastModified": "2024-04-17T20:08:21.887",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-5401",
"sourceIdentifier": "psirt@honeywell.com",
"published": "2024-04-17T17:15:13.790",
"lastModified": "2024-04-17T17:15:13.790",
"vulnStatus": "Received",
"lastModified": "2024-04-17T20:08:21.887",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-5403",
"sourceIdentifier": "psirt@honeywell.com",
"published": "2024-04-17T17:15:13.960",
"lastModified": "2024-04-17T17:15:13.960",
"vulnStatus": "Received",
"lastModified": "2024-04-17T20:08:21.887",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-5404",
"sourceIdentifier": "psirt@honeywell.com",
"published": "2024-04-17T17:15:14.130",
"lastModified": "2024-04-17T17:15:14.130",
"vulnStatus": "Received",
"lastModified": "2024-04-17T20:08:21.887",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-5405",
"sourceIdentifier": "psirt@honeywell.com",
"published": "2024-04-17T17:15:14.300",
"lastModified": "2024-04-17T17:15:14.300",
"vulnStatus": "Received",
"lastModified": "2024-04-17T20:08:21.887",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-5406",
"sourceIdentifier": "psirt@honeywell.com",
"published": "2024-04-17T17:15:14.480",
"lastModified": "2024-04-17T17:15:14.480",
"vulnStatus": "Received",
"lastModified": "2024-04-17T20:08:21.887",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-5407",
"sourceIdentifier": "psirt@honeywell.com",
"published": "2024-04-17T17:15:14.650",
"lastModified": "2024-04-17T17:15:14.650",
"vulnStatus": "Received",
"lastModified": "2024-04-17T20:08:21.887",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2024-0257",
"sourceIdentifier": "ics-cert@hq.dhs.gov",
"published": "2024-04-17T20:15:07.407",
"lastModified": "2024-04-17T20:15:07.407",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "\nRoboDK v5.5.4\n\n is vulnerable to heap-based buffer overflow while processing a specific project file. The resulting memory corruption may crash the application.\n\n"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "ics-cert@hq.dhs.gov",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "LOW",
"baseScore": 3.3,
"baseSeverity": "LOW"
},
"exploitabilityScore": 1.8,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "ics-cert@hq.dhs.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-122"
}
]
}
],
"references": [
{
"url": "https://www.cisa.gov/news-events/ics-advisories/icsa-24-107-04",
"source": "ics-cert@hq.dhs.gov"
}
]
}

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2024-21989",
"sourceIdentifier": "security-alert@netapp.com",
"published": "2024-04-17T20:15:07.663",
"lastModified": "2024-04-17T20:15:07.663",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "ONTAP Select Deploy administration utility versions 9.12.1.x, \n9.13.1.x and 9.14.1.x are susceptible to a vulnerability which when \nsuccessfully exploited could allow a read-only user to escalate their \nprivileges.\n\n"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security-alert@netapp.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.1,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.2
}
]
},
"weaknesses": [
{
"source": "security-alert@netapp.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-269"
}
]
}
],
"references": [
{
"url": "https://security.netapp.com/advisory/ntap-20240411-0001/",
"source": "security-alert@netapp.com"
}
]
}

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2024-21990",
"sourceIdentifier": "security-alert@netapp.com",
"published": "2024-04-17T20:15:07.863",
"lastModified": "2024-04-17T20:15:07.863",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "ONTAP Select Deploy administration utility versions 9.12.1.x, \n9.13.1.x and 9.14.1.x contain hard-coded credentials that could allow an\n attacker to view Deploy configuration information and modify the \naccount credentials.\n\n\n\n\n"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security-alert@netapp.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 2.5
}
]
},
"weaknesses": [
{
"source": "security-alert@netapp.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-259"
}
]
}
],
"references": [
{
"url": "https://security.netapp.com/advisory/ntap-20240411-0002/",
"source": "security-alert@netapp.com"
}
]
}

View File

@ -2,12 +2,12 @@
"id": "CVE-2024-2700",
"sourceIdentifier": "secalert@redhat.com",
"published": "2024-04-04T14:15:09.950",
"lastModified": "2024-04-04T16:33:06.610",
"lastModified": "2024-04-17T20:15:08.240",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was found in the quarkus-core component. Quarkus captures the local environment variables from the Quarkus namespace during the application's build. Thus, running the resulting application inherits the values captured at build time. \r\n\r\nHowever, some local environment variables may have been set by the developer / CI environment for testing purposes, such as dropping the database during the application startup or trusting all TLS certificates to accept self-signed certificates. If these properties are configured using environment variables or the .env facility, they are captured into the built application. It leads to dangerous behavior if the application does not override these values.\r\n\r\nThis behavior only happens for configuration properties from the `quarkus.*` namespace. So, application-specific properties are not captured."
"value": "A vulnerability was found in the quarkus-core component. Quarkus captures local environment variables from the Quarkus namespace during the application's build, therefore, running the resulting application inherits the values captured at build time. Some local environment variables may have been set by the developer or CI environment for testing purposes, such as dropping the database during application startup or trusting all TLS certificates to accept self-signed certificates. If these properties are configured using environment variables or the .env facility, they are captured into the built application, which can lead to dangerous behavior if the application does not override these values. This behavior only happens for configuration properties from the `quarkus.*` namespace. Application-specific properties are not captured."
},
{
"lang": "es",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-28073",
"sourceIdentifier": "psirt@solarwinds.com",
"published": "2024-04-17T17:15:14.900",
"lastModified": "2024-04-17T17:15:14.900",
"vulnStatus": "Received",
"lastModified": "2024-04-17T20:08:21.887",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-29950",
"sourceIdentifier": "sirt@brocade.com",
"published": "2024-04-17T19:15:07.213",
"lastModified": "2024-04-17T19:15:07.213",
"vulnStatus": "Received",
"lastModified": "2024-04-17T20:08:21.887",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2024-29951",
"sourceIdentifier": "sirt@brocade.com",
"published": "2024-04-17T20:15:08.060",
"lastModified": "2024-04-17T20:15:08.060",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Brocade SANnav before v2.3.1 and v2.3.0a uses the SHA-1 hash in internal SSH ports that are not open to remote connection.\n\n"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "sirt@brocade.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"attackVector": "ADJACENT_NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.7,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.1,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "sirt@brocade.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-326"
}
]
}
],
"references": [
{
"url": "https://support.broadcom.com/external/content/SecurityAdvisories/0/23237",
"source": "sirt@brocade.com"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-2961",
"sourceIdentifier": "3ff69d7a-14f2-4f67-a097-88dee7810d18",
"published": "2024-04-17T18:15:15.833",
"lastModified": "2024-04-17T18:15:15.833",
"vulnStatus": "Received",
"lastModified": "2024-04-17T20:08:21.887",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-30950",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-04-17T19:15:07.420",
"lastModified": "2024-04-17T19:15:07.420",
"vulnStatus": "Received",
"lastModified": "2024-04-17T20:08:21.887",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-30951",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-04-17T18:15:15.947",
"lastModified": "2024-04-17T18:15:15.947",
"vulnStatus": "Received",
"lastModified": "2024-04-17T20:08:21.887",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-30953",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-04-17T19:15:07.470",
"lastModified": "2024-04-17T19:15:07.470",
"vulnStatus": "Received",
"lastModified": "2024-04-17T20:08:21.887",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-30980",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-04-17T17:15:15.117",
"lastModified": "2024-04-17T17:15:15.117",
"vulnStatus": "Received",
"lastModified": "2024-04-17T20:08:21.887",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-30981",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-04-17T17:15:15.193",
"lastModified": "2024-04-17T17:15:15.193",
"vulnStatus": "Received",
"lastModified": "2024-04-17T20:08:21.887",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-30982",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-04-17T18:15:16.037",
"lastModified": "2024-04-17T18:15:16.037",
"vulnStatus": "Received",
"lastModified": "2024-04-17T20:08:21.887",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-30983",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-04-17T17:15:15.257",
"lastModified": "2024-04-17T17:15:15.257",
"vulnStatus": "Received",
"lastModified": "2024-04-17T20:08:21.887",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-30985",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-04-17T18:15:16.097",
"lastModified": "2024-04-17T18:15:16.097",
"vulnStatus": "Received",
"lastModified": "2024-04-17T20:08:21.887",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-30986",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-04-17T18:15:16.157",
"lastModified": "2024-04-17T18:15:16.157",
"vulnStatus": "Received",
"lastModified": "2024-04-17T20:08:21.887",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-30987",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-04-17T18:15:16.210",
"lastModified": "2024-04-17T18:15:16.210",
"vulnStatus": "Received",
"lastModified": "2024-04-17T20:08:21.887",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-30988",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-04-17T18:15:16.273",
"lastModified": "2024-04-17T18:15:16.273",
"vulnStatus": "Received",
"lastModified": "2024-04-17T20:08:21.887",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-30989",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-04-17T19:15:07.520",
"lastModified": "2024-04-17T19:15:07.520",
"vulnStatus": "Received",
"lastModified": "2024-04-17T20:08:21.887",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-30990",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-04-17T19:15:07.570",
"lastModified": "2024-04-17T19:15:07.570",
"vulnStatus": "Received",
"lastModified": "2024-04-17T20:08:21.887",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-31031",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-04-17T19:15:07.623",
"lastModified": "2024-04-17T19:15:07.623",
"vulnStatus": "Received",
"lastModified": "2024-04-17T20:08:21.887",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-31040",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-04-17T19:15:07.680",
"lastModified": "2024-04-17T19:15:07.680",
"vulnStatus": "Received",
"lastModified": "2024-04-17T20:08:21.887",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-31041",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-04-17T19:15:07.733",
"lastModified": "2024-04-17T19:15:07.733",
"vulnStatus": "Received",
"lastModified": "2024-04-17T20:08:21.887",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-31580",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-04-17T19:15:07.783",
"lastModified": "2024-04-17T19:15:07.783",
"vulnStatus": "Received",
"lastModified": "2024-04-17T20:08:21.887",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-31581",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-04-17T19:15:07.840",
"lastModified": "2024-04-17T19:15:07.840",
"vulnStatus": "Received",
"lastModified": "2024-04-17T20:08:21.887",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-31582",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-04-17T19:15:07.893",
"lastModified": "2024-04-17T19:15:07.893",
"vulnStatus": "Received",
"lastModified": "2024-04-17T20:08:21.887",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-31583",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-04-17T19:15:07.950",
"lastModified": "2024-04-17T19:15:07.950",
"vulnStatus": "Received",
"lastModified": "2024-04-17T20:08:21.887",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-31585",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-04-17T19:15:08.007",
"lastModified": "2024-04-17T19:15:08.007",
"vulnStatus": "Received",
"lastModified": "2024-04-17T20:08:21.887",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-32161",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-04-17T18:15:16.337",
"lastModified": "2024-04-17T18:15:16.337",
"vulnStatus": "Received",
"lastModified": "2024-04-17T20:08:21.887",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-32162",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-04-17T19:15:08.060",
"lastModified": "2024-04-17T19:15:08.060",
"vulnStatus": "Received",
"lastModified": "2024-04-17T20:08:21.887",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-32163",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-04-17T19:15:08.117",
"lastModified": "2024-04-17T19:15:08.117",
"vulnStatus": "Received",
"lastModified": "2024-04-17T20:08:21.887",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2024-32337",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-04-17T21:15:09.267",
"lastModified": "2024-04-17T21:15:09.267",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "A cross-site scripting (XSS) vulnerability in the Settings section of WonderCMS v3.4.3 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the ADMIN LOGIN URL parameter under the Security module."
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/adiapera/xss_security_wondercms_3.4.3",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2024-32338",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-04-17T21:15:09.343",
"lastModified": "2024-04-17T21:15:09.343",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "A cross-site scripting (XSS) vulnerability in the Settings section of WonderCMS v3.4.3 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the PAGE TITLE parameter under the Current Page module."
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/adiapera/xss_current_page_wondercms_3.4.3",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2024-32339",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-04-17T21:15:09.400",
"lastModified": "2024-04-17T21:15:09.400",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Multiple cross-site scripting (XSS) vulnerabilities in the HOW TO page of WonderCMS v3.4.3 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into any of the parameters."
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/adiapera/xss_how_to_page_wondercms_3.4.3",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2024-32340",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-04-17T21:15:09.453",
"lastModified": "2024-04-17T21:15:09.453",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "A cross-site scripting (XSS) vulnerability in the Settings section of WonderCMS v3.4.3 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the WEBSITE TITLE parameter under the Menu module."
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/adiapera/xss_menu_page_wondercms_3.4.3",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2024-32341",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-04-17T21:15:09.507",
"lastModified": "2024-04-17T21:15:09.507",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Multiple cross-site scripting (XSS) vulnerabilities in the Home page of WonderCMS v3.4.3 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into any of the parameters."
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/adiapera/xss_home_page_wondercms_3.4.3",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2024-32342",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-04-17T21:15:09.560",
"lastModified": "2024-04-17T21:15:09.560",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "A cross-site scripting (XSS) vulnerability in the Create Page of Boid CMS v2.1.0 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Permalink parameter."
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/adiapera/xss_create_boidcms_2.1.0",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2024-32343",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-04-17T21:15:09.623",
"lastModified": "2024-04-17T21:15:09.623",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "A cross-site scripting (XSS) vulnerability in the Create Page of Boid CMS v2.1.0 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Content parameter."
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/adiapera/xss_create2_boidcms_2.1.0",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2024-32344",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-04-17T21:15:09.677",
"lastModified": "2024-04-17T21:15:09.677",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "A cross-site scripting (XSS) vulnerability in the Settings menu of CMSimple v5.15 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Edit parameter under the Language section."
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/adiapera/xss_language_cmsimple_5.15/blob/main/README.md",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2024-32345",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-04-17T21:15:09.727",
"lastModified": "2024-04-17T21:15:09.727",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "A cross-site scripting (XSS) vulnerability in the Settings menu of CMSimple v5.15 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Configuration parameter under the Language section."
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/adiapera/xss_language_cmsimple_5.15",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2024-32743",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-04-17T21:15:09.783",
"lastModified": "2024-04-17T21:15:09.783",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "A cross-site scripting (XSS) vulnerability in the Settings section of WonderCMS v3.4.3 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the SITE LANGUAGE CONFIG parameter under the Security module."
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/adiapera/xss_security_wondercms_3.4.3",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2024-32744",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-04-17T21:15:09.843",
"lastModified": "2024-04-17T21:15:09.843",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "A cross-site scripting (XSS) vulnerability in the Settings section of WonderCMS v3.4.3 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the PAGE KEYWORDS parameter under the CURRENT PAGE module."
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/adiapera/xss_current_page_wondercms_3.4.3",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2024-32745",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-04-17T21:15:09.897",
"lastModified": "2024-04-17T21:15:09.897",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "A cross-site scripting (XSS) vulnerability in the Settings section of WonderCMS v3.4.3 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the PAGE DESCRIPTION parameter under the CURRENT PAGE module."
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/adiapera/xss_current_page_wondercms_3.4.3",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2024-32746",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-04-17T21:15:09.943",
"lastModified": "2024-04-17T21:15:09.943",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "A cross-site scripting (XSS) vulnerability in the Settings section of WonderCMS v3.4.3 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the MENU parameter under the Menu module."
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/adiapera/xss_menu_page_wondercms_3.4.3",
"source": "cve@mitre.org"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-3323",
"sourceIdentifier": "security@tibco.com",
"published": "2024-04-17T19:15:08.177",
"lastModified": "2024-04-17T19:15:08.177",
"vulnStatus": "Received",
"lastModified": "2024-04-17T20:08:21.887",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2024-3817",
"sourceIdentifier": "security@hashicorp.com",
"published": "2024-04-17T20:15:08.383",
"lastModified": "2024-04-17T20:15:08.383",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "HashiCorp\u2019s go-getter library is vulnerable to argument injection when executing Git to discover remote branches. \n\nThis vulnerability does not affect the go-getter/v2 branch and package."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security@hashicorp.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "security@hashicorp.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-88"
}
]
}
],
"references": [
{
"url": "https://discuss.hashicorp.com/t/hcsec-2024-09-hashicorp-go-getter-vulnerable-to-argument-injection-when-fetching-remote-default-git-branches/66040",
"source": "security@hashicorp.com"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-3900",
"sourceIdentifier": "xpdf@xpdfreader.com",
"published": "2024-04-17T19:15:08.347",
"lastModified": "2024-04-17T19:15:08.347",
"vulnStatus": "Received",
"lastModified": "2024-04-17T20:08:21.887",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-3914",
"sourceIdentifier": "chrome-cve-admin@google.com",
"published": "2024-04-17T18:15:16.400",
"lastModified": "2024-04-17T18:15:16.400",
"vulnStatus": "Received",
"lastModified": "2024-04-17T20:08:21.887",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update
```plain
2024-04-17T20:00:41.848415+00:00
2024-04-17T22:00:37.604106+00:00
```
### Most recent CVE Modification Timestamp synchronized with NVD
```plain
2024-04-17T19:55:31.323000+00:00
2024-04-17T21:15:09.943000+00:00
```
### Last Data Feed Release
@ -33,64 +33,62 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
### Total Number of included CVEs
```plain
246164
246182
```
### CVEs added in the last Commit
Recently added CVEs: `26`
Recently added CVEs: `18`
- [CVE-2024-29950](CVE-2024/CVE-2024-299xx/CVE-2024-29950.json) (`2024-04-17T19:15:07.213`)
- [CVE-2024-30950](CVE-2024/CVE-2024-309xx/CVE-2024-30950.json) (`2024-04-17T19:15:07.420`)
- [CVE-2024-30951](CVE-2024/CVE-2024-309xx/CVE-2024-30951.json) (`2024-04-17T18:15:15.947`)
- [CVE-2024-30953](CVE-2024/CVE-2024-309xx/CVE-2024-30953.json) (`2024-04-17T19:15:07.470`)
- [CVE-2024-30982](CVE-2024/CVE-2024-309xx/CVE-2024-30982.json) (`2024-04-17T18:15:16.037`)
- [CVE-2024-30985](CVE-2024/CVE-2024-309xx/CVE-2024-30985.json) (`2024-04-17T18:15:16.097`)
- [CVE-2024-30986](CVE-2024/CVE-2024-309xx/CVE-2024-30986.json) (`2024-04-17T18:15:16.157`)
- [CVE-2024-30987](CVE-2024/CVE-2024-309xx/CVE-2024-30987.json) (`2024-04-17T18:15:16.210`)
- [CVE-2024-30988](CVE-2024/CVE-2024-309xx/CVE-2024-30988.json) (`2024-04-17T18:15:16.273`)
- [CVE-2024-30989](CVE-2024/CVE-2024-309xx/CVE-2024-30989.json) (`2024-04-17T19:15:07.520`)
- [CVE-2024-30990](CVE-2024/CVE-2024-309xx/CVE-2024-30990.json) (`2024-04-17T19:15:07.570`)
- [CVE-2024-31031](CVE-2024/CVE-2024-310xx/CVE-2024-31031.json) (`2024-04-17T19:15:07.623`)
- [CVE-2024-31040](CVE-2024/CVE-2024-310xx/CVE-2024-31040.json) (`2024-04-17T19:15:07.680`)
- [CVE-2024-31041](CVE-2024/CVE-2024-310xx/CVE-2024-31041.json) (`2024-04-17T19:15:07.733`)
- [CVE-2024-31580](CVE-2024/CVE-2024-315xx/CVE-2024-31580.json) (`2024-04-17T19:15:07.783`)
- [CVE-2024-31581](CVE-2024/CVE-2024-315xx/CVE-2024-31581.json) (`2024-04-17T19:15:07.840`)
- [CVE-2024-31582](CVE-2024/CVE-2024-315xx/CVE-2024-31582.json) (`2024-04-17T19:15:07.893`)
- [CVE-2024-31583](CVE-2024/CVE-2024-315xx/CVE-2024-31583.json) (`2024-04-17T19:15:07.950`)
- [CVE-2024-31585](CVE-2024/CVE-2024-315xx/CVE-2024-31585.json) (`2024-04-17T19:15:08.007`)
- [CVE-2024-32161](CVE-2024/CVE-2024-321xx/CVE-2024-32161.json) (`2024-04-17T18:15:16.337`)
- [CVE-2024-32162](CVE-2024/CVE-2024-321xx/CVE-2024-32162.json) (`2024-04-17T19:15:08.060`)
- [CVE-2024-32163](CVE-2024/CVE-2024-321xx/CVE-2024-32163.json) (`2024-04-17T19:15:08.117`)
- [CVE-2024-3323](CVE-2024/CVE-2024-33xx/CVE-2024-3323.json) (`2024-04-17T19:15:08.177`)
- [CVE-2024-3900](CVE-2024/CVE-2024-39xx/CVE-2024-3900.json) (`2024-04-17T19:15:08.347`)
- [CVE-2024-3914](CVE-2024/CVE-2024-39xx/CVE-2024-3914.json) (`2024-04-17T18:15:16.400`)
- [CVE-2024-0257](CVE-2024/CVE-2024-02xx/CVE-2024-0257.json) (`2024-04-17T20:15:07.407`)
- [CVE-2024-21989](CVE-2024/CVE-2024-219xx/CVE-2024-21989.json) (`2024-04-17T20:15:07.663`)
- [CVE-2024-21990](CVE-2024/CVE-2024-219xx/CVE-2024-21990.json) (`2024-04-17T20:15:07.863`)
- [CVE-2024-29951](CVE-2024/CVE-2024-299xx/CVE-2024-29951.json) (`2024-04-17T20:15:08.060`)
- [CVE-2024-32337](CVE-2024/CVE-2024-323xx/CVE-2024-32337.json) (`2024-04-17T21:15:09.267`)
- [CVE-2024-32338](CVE-2024/CVE-2024-323xx/CVE-2024-32338.json) (`2024-04-17T21:15:09.343`)
- [CVE-2024-32339](CVE-2024/CVE-2024-323xx/CVE-2024-32339.json) (`2024-04-17T21:15:09.400`)
- [CVE-2024-32340](CVE-2024/CVE-2024-323xx/CVE-2024-32340.json) (`2024-04-17T21:15:09.453`)
- [CVE-2024-32341](CVE-2024/CVE-2024-323xx/CVE-2024-32341.json) (`2024-04-17T21:15:09.507`)
- [CVE-2024-32342](CVE-2024/CVE-2024-323xx/CVE-2024-32342.json) (`2024-04-17T21:15:09.560`)
- [CVE-2024-32343](CVE-2024/CVE-2024-323xx/CVE-2024-32343.json) (`2024-04-17T21:15:09.623`)
- [CVE-2024-32344](CVE-2024/CVE-2024-323xx/CVE-2024-32344.json) (`2024-04-17T21:15:09.677`)
- [CVE-2024-32345](CVE-2024/CVE-2024-323xx/CVE-2024-32345.json) (`2024-04-17T21:15:09.727`)
- [CVE-2024-32743](CVE-2024/CVE-2024-327xx/CVE-2024-32743.json) (`2024-04-17T21:15:09.783`)
- [CVE-2024-32744](CVE-2024/CVE-2024-327xx/CVE-2024-32744.json) (`2024-04-17T21:15:09.843`)
- [CVE-2024-32745](CVE-2024/CVE-2024-327xx/CVE-2024-32745.json) (`2024-04-17T21:15:09.897`)
- [CVE-2024-32746](CVE-2024/CVE-2024-327xx/CVE-2024-32746.json) (`2024-04-17T21:15:09.943`)
- [CVE-2024-3817](CVE-2024/CVE-2024-38xx/CVE-2024-3817.json) (`2024-04-17T20:15:08.383`)
### CVEs modified in the last Commit
Recently modified CVEs: `20`
Recently modified CVEs: `45`
- [CVE-2021-46904](CVE-2021/CVE-2021-469xx/CVE-2021-46904.json) (`2024-04-17T19:33:10.603`)
- [CVE-2021-46905](CVE-2021/CVE-2021-469xx/CVE-2021-46905.json) (`2024-04-17T19:30:05.020`)
- [CVE-2022-48626](CVE-2022/CVE-2022-486xx/CVE-2022-48626.json) (`2024-04-17T19:28:53.540`)
- [CVE-2023-1386](CVE-2023/CVE-2023-13xx/CVE-2023-1386.json) (`2024-04-17T18:15:15.650`)
- [CVE-2023-52465](CVE-2023/CVE-2023-524xx/CVE-2023-52465.json) (`2024-04-17T19:16:10.137`)
- [CVE-2023-52467](CVE-2023/CVE-2023-524xx/CVE-2023-52467.json) (`2024-04-17T19:14:26.123`)
- [CVE-2023-52468](CVE-2023/CVE-2023-524xx/CVE-2023-52468.json) (`2024-04-17T19:00:42.287`)
- [CVE-2023-52469](CVE-2023/CVE-2023-524xx/CVE-2023-52469.json) (`2024-04-17T19:00:15.850`)
- [CVE-2023-52470](CVE-2023/CVE-2023-524xx/CVE-2023-52470.json) (`2024-04-17T18:46:07.810`)
- [CVE-2023-52471](CVE-2023/CVE-2023-524xx/CVE-2023-52471.json) (`2024-04-17T18:59:17.447`)
- [CVE-2023-52472](CVE-2023/CVE-2023-524xx/CVE-2023-52472.json) (`2024-04-17T18:47:08.097`)
- [CVE-2023-52473](CVE-2023/CVE-2023-524xx/CVE-2023-52473.json) (`2024-04-17T18:30:15.123`)
- [CVE-2024-26595](CVE-2024/CVE-2024-265xx/CVE-2024-26595.json) (`2024-04-17T19:55:31.323`)
- [CVE-2024-26596](CVE-2024/CVE-2024-265xx/CVE-2024-26596.json) (`2024-04-17T19:54:59.240`)
- [CVE-2024-26597](CVE-2024/CVE-2024-265xx/CVE-2024-26597.json) (`2024-04-17T19:46:28.827`)
- [CVE-2024-26598](CVE-2024/CVE-2024-265xx/CVE-2024-26598.json) (`2024-04-17T19:40:31.310`)
- [CVE-2024-26599](CVE-2024/CVE-2024-265xx/CVE-2024-26599.json) (`2024-04-17T19:34:01.837`)
- [CVE-2024-26600](CVE-2024/CVE-2024-266xx/CVE-2024-26600.json) (`2024-04-17T18:29:25.140`)
- [CVE-2024-26601](CVE-2024/CVE-2024-266xx/CVE-2024-26601.json) (`2024-04-17T18:03:41.003`)
- [CVE-2024-26602](CVE-2024/CVE-2024-266xx/CVE-2024-26602.json) (`2024-04-17T18:01:43.820`)
- [CVE-2024-30953](CVE-2024/CVE-2024-309xx/CVE-2024-30953.json) (`2024-04-17T20:08:21.887`)
- [CVE-2024-30980](CVE-2024/CVE-2024-309xx/CVE-2024-30980.json) (`2024-04-17T20:08:21.887`)
- [CVE-2024-30981](CVE-2024/CVE-2024-309xx/CVE-2024-30981.json) (`2024-04-17T20:08:21.887`)
- [CVE-2024-30982](CVE-2024/CVE-2024-309xx/CVE-2024-30982.json) (`2024-04-17T20:08:21.887`)
- [CVE-2024-30983](CVE-2024/CVE-2024-309xx/CVE-2024-30983.json) (`2024-04-17T20:08:21.887`)
- [CVE-2024-30985](CVE-2024/CVE-2024-309xx/CVE-2024-30985.json) (`2024-04-17T20:08:21.887`)
- [CVE-2024-30986](CVE-2024/CVE-2024-309xx/CVE-2024-30986.json) (`2024-04-17T20:08:21.887`)
- [CVE-2024-30987](CVE-2024/CVE-2024-309xx/CVE-2024-30987.json) (`2024-04-17T20:08:21.887`)
- [CVE-2024-30988](CVE-2024/CVE-2024-309xx/CVE-2024-30988.json) (`2024-04-17T20:08:21.887`)
- [CVE-2024-30989](CVE-2024/CVE-2024-309xx/CVE-2024-30989.json) (`2024-04-17T20:08:21.887`)
- [CVE-2024-30990](CVE-2024/CVE-2024-309xx/CVE-2024-30990.json) (`2024-04-17T20:08:21.887`)
- [CVE-2024-31031](CVE-2024/CVE-2024-310xx/CVE-2024-31031.json) (`2024-04-17T20:08:21.887`)
- [CVE-2024-31040](CVE-2024/CVE-2024-310xx/CVE-2024-31040.json) (`2024-04-17T20:08:21.887`)
- [CVE-2024-31041](CVE-2024/CVE-2024-310xx/CVE-2024-31041.json) (`2024-04-17T20:08:21.887`)
- [CVE-2024-31580](CVE-2024/CVE-2024-315xx/CVE-2024-31580.json) (`2024-04-17T20:08:21.887`)
- [CVE-2024-31581](CVE-2024/CVE-2024-315xx/CVE-2024-31581.json) (`2024-04-17T20:08:21.887`)
- [CVE-2024-31582](CVE-2024/CVE-2024-315xx/CVE-2024-31582.json) (`2024-04-17T20:08:21.887`)
- [CVE-2024-31583](CVE-2024/CVE-2024-315xx/CVE-2024-31583.json) (`2024-04-17T20:08:21.887`)
- [CVE-2024-31585](CVE-2024/CVE-2024-315xx/CVE-2024-31585.json) (`2024-04-17T20:08:21.887`)
- [CVE-2024-32161](CVE-2024/CVE-2024-321xx/CVE-2024-32161.json) (`2024-04-17T20:08:21.887`)
- [CVE-2024-32162](CVE-2024/CVE-2024-321xx/CVE-2024-32162.json) (`2024-04-17T20:08:21.887`)
- [CVE-2024-32163](CVE-2024/CVE-2024-321xx/CVE-2024-32163.json) (`2024-04-17T20:08:21.887`)
- [CVE-2024-3323](CVE-2024/CVE-2024-33xx/CVE-2024-3323.json) (`2024-04-17T20:08:21.887`)
- [CVE-2024-3900](CVE-2024/CVE-2024-39xx/CVE-2024-3900.json) (`2024-04-17T20:08:21.887`)
- [CVE-2024-3914](CVE-2024/CVE-2024-39xx/CVE-2024-3914.json) (`2024-04-17T20:08:21.887`)
## Download and Usage

View File

@ -186633,8 +186633,8 @@ CVE-2021-46900,0,0,e195cd7cb24b95e31a6122d6f3d56cdcb4ddfc8ff41351544f7397822bc57
CVE-2021-46901,0,0,1665cb5ca539440295d8a959d2760d12b56c4be1868c712c96ca3dcd4d3dde1d,2024-01-08T19:09:08.890000
CVE-2021-46902,0,0,15d8c1cefd0a39c70036d20031a514b6fb8f249aa94f97dfa235932c5c479f7f,2024-02-13T00:38:32.413000
CVE-2021-46903,0,0,59ca1d694c639409297840c930e3dd8d372cadedd1376cf64770674d9911e3bf,2024-02-13T00:38:22.293000
CVE-2021-46904,0,1,1e5cdb8111ac3ebc9ff67e07a9414ffe41bea2d21af2ac7f05b215aeaaf55f3c,2024-04-17T19:33:10.603000
CVE-2021-46905,0,1,648ee6d7f976c16402e014347f49c2cfe4f4f6402f6e950832beef480b0d8048,2024-04-17T19:30:05.020000
CVE-2021-46904,0,0,1e5cdb8111ac3ebc9ff67e07a9414ffe41bea2d21af2ac7f05b215aeaaf55f3c,2024-04-17T19:33:10.603000
CVE-2021-46905,0,0,648ee6d7f976c16402e014347f49c2cfe4f4f6402f6e950832beef480b0d8048,2024-04-17T19:30:05.020000
CVE-2021-46906,0,0,bf734f670ee9140d82682c788c01f012ad63303e92d0e667406fbbec776fa010,2024-04-17T17:28:34.403000
CVE-2021-46907,0,0,1f9b2c2375fa009b016f94aa5d024afa767a5a81d6bdb7bf20e32e33a05d91c6,2024-03-19T13:15:06.713000
CVE-2021-46908,0,0,c907e4fb4d3fa9a6ffcaae744e9f1d5229b787cdf737a500f4fe0a442a5992d3,2024-04-17T17:15:29.787000
@ -211473,7 +211473,7 @@ CVE-2022-48622,0,0,ec3892c719560f573e15b7aeaf0ff6e1061faa317127aa4fe22d07724deb3
CVE-2022-48623,0,0,35796016b2974df38876f788a8262118276143c1be8b81a53a3c19ad985851f1,2024-02-13T14:01:07.747000
CVE-2022-48624,0,0,3443005982091900e80529213830120f211c919372f2b4459da27a12e635ec55,2024-02-20T19:50:53.960000
CVE-2022-48625,0,0,7bc403b36bf8fdca3e98a9856c6ae990f3da4d13f0f27b5e9dd4164789f34420,2024-02-20T19:50:53.960000
CVE-2022-48626,0,1,fe9ecc659da3a3680a7b1ff34d0eba00cc9cf4e4a95ca902684bc881fe5e286f,2024-04-17T19:28:53.540000
CVE-2022-48626,0,0,fe9ecc659da3a3680a7b1ff34d0eba00cc9cf4e4a95ca902684bc881fe5e286f,2024-04-17T19:28:53.540000
CVE-2022-48627,0,0,22229bbcfc221c1a66d57361893659703193a672850e59d004737cb18434f698,2024-04-13T12:15:10.870000
CVE-2022-48628,0,0,53833f4c493a0dc2eadce20e074749d0beda4aee81d045b4d048c848f17d5c49,2024-03-04T13:58:23.447000
CVE-2022-48629,0,0,fa048196d2bfc6b10ff3d7f516159c362398b51507f15ab4e218ad5e1ec3c673,2024-03-21T02:44:43.813000
@ -212898,7 +212898,7 @@ CVE-2023-1382,0,0,2ff04136b97a82ef95cb0a63637cf8c6e647c72610871a27a03c821c2fdd8b
CVE-2023-1383,0,0,16fe9490866699d274f01d207b9e9b0d88278792dd331fd3adc396454ea7b371,2023-05-12T15:23:11.763000
CVE-2023-1384,0,0,5fbdf26c58db19c8f849842425cb98174883125efa7455027dff2c16110f7e91,2023-05-12T16:06:10.987000
CVE-2023-1385,0,0,57c934c76339b7770ffae52ce954668384f98181f7930dd97526c7381fbe3f53,2023-05-12T16:07:46.433000
CVE-2023-1386,0,1,73def10b341d1ede3eebca18d1974201a64612e53db37ee84c79569ce427b21f,2024-04-17T18:15:15.650000
CVE-2023-1386,0,0,73def10b341d1ede3eebca18d1974201a64612e53db37ee84c79569ce427b21f,2024-04-17T18:15:15.650000
CVE-2023-1387,0,0,22c9008dd886760fbeb8686b275fd7e94e067c4821d7b8a777e75c46a54273c0,2023-06-09T08:15:09.287000
CVE-2023-1388,0,0,9b4908cb19e31a63ecffd8f71bb09f3ad5a3d0c27f8352f8a1c355071a42aac5,2023-06-13T18:58:22.700000
CVE-2023-1389,0,0,4ca619e9e1f096cded69e25f27e399129a3e22433ce8768f84ff9eca3f6c7bf3,2023-08-11T15:15:09.760000
@ -236361,19 +236361,19 @@ CVE-2023-52459,0,0,c11aebe2be21999c43ab80746556120222524712be70c9c8bb4eb5ed37d63
CVE-2023-5246,0,0,efc93f05f4d6576c2fefda617ffc50a2cd42a25ecc2a7e9c2794376627e129e7,2023-10-31T11:58:05.363000
CVE-2023-52460,0,0,7b5ce003348e2b0c98c11a11dd79b88b3d4e9f665c8574fd29056aa818d9e331,2024-02-23T16:14:43.447000
CVE-2023-52461,0,0,0e4def3da0077977c0198465fc1be0f30b9f34acfdf83f12cf0b89000b004b24,2024-02-23T16:14:43.447000
CVE-2023-52462,0,0,20ba12f9b584ea9029478bee5d96be5eff52d04472ac0a5dc42253960d917772,2024-02-23T16:14:43.447000
CVE-2023-52463,0,0,d2f59f8423a5a06cfc6fffd134596a3946afed945a229e47ce85482973c45abd,2024-02-23T16:14:43.447000
CVE-2023-52464,0,0,42a3908c37b4dc5e025800440c043a58b21bbf0e27c9316a1a4fe7451f45d14e,2024-02-23T16:14:43.447000
CVE-2023-52465,0,1,6a5dcf0470f7260e5fd224572c4161bebbfa4c6574c6970c9035eff59a929169,2024-04-17T19:16:10.137000
CVE-2023-52462,0,1,a6858cfa3be5f63a7738068f3ab5f364e25a3cd7a6d64375ec3da8239879f2ce,2024-04-17T20:06:29.470000
CVE-2023-52463,0,1,fd8c09fdc6750081e23478ebe940972345e6f17003751e11523c5f3c82cfd70e,2024-04-17T20:05:08.550000
CVE-2023-52464,0,1,408f9e82ceb39cb0693e873fd1b68d757ba0b997a8bd1004cfc7ca65795a29a8,2024-04-17T20:03:39.197000
CVE-2023-52465,0,0,6a5dcf0470f7260e5fd224572c4161bebbfa4c6574c6970c9035eff59a929169,2024-04-17T19:16:10.137000
CVE-2023-52466,0,0,56f8cc53f82884aedbecde370c65172b4b8e71564d7391aaf8319e40e8aedfea,2024-03-03T08:15:07.860000
CVE-2023-52467,0,1,2586e47be7451ec0eb9012c78cafa4c383b571576b9d9ac380cf0041f4e7df56,2024-04-17T19:14:26.123000
CVE-2023-52468,0,1,fe3f595a9e32527f64ad43de3bd7face21975d6f52b454b14553492f7129b561,2024-04-17T19:00:42.287000
CVE-2023-52469,0,1,d09c48e81938c893cd90e7b645c0b7b2ed2ec8ed534826e863fbe38e70c7064e,2024-04-17T19:00:15.850000
CVE-2023-52467,0,0,2586e47be7451ec0eb9012c78cafa4c383b571576b9d9ac380cf0041f4e7df56,2024-04-17T19:14:26.123000
CVE-2023-52468,0,0,fe3f595a9e32527f64ad43de3bd7face21975d6f52b454b14553492f7129b561,2024-04-17T19:00:42.287000
CVE-2023-52469,0,0,d09c48e81938c893cd90e7b645c0b7b2ed2ec8ed534826e863fbe38e70c7064e,2024-04-17T19:00:15.850000
CVE-2023-5247,0,0,1476fd60cd067d05ec1c6bec9fda463c4aea196d092298e87bdb01efe1f6d4ee,2023-12-05T18:28:03.620000
CVE-2023-52470,0,1,2563d20c3c7015384c93b958f5879eabf79d5f2d8997fe7964d3964e089afcac,2024-04-17T18:46:07.810000
CVE-2023-52471,0,1,e6a09c3263f5ee25f272c7210d9c40fff45789f95839246ac1f5db8c7fdf7f3d,2024-04-17T18:59:17.447000
CVE-2023-52472,0,1,edc4f7e5d10bf4a89ae0187405990e8427761603a834ab938210e497cc202d0d,2024-04-17T18:47:08.097000
CVE-2023-52473,0,1,d09aff827319bc04f5ef644dc78ee7877cac2a37a8095f47a84a2bc16cbbedcc,2024-04-17T18:30:15.123000
CVE-2023-52470,0,0,2563d20c3c7015384c93b958f5879eabf79d5f2d8997fe7964d3964e089afcac,2024-04-17T18:46:07.810000
CVE-2023-52471,0,0,e6a09c3263f5ee25f272c7210d9c40fff45789f95839246ac1f5db8c7fdf7f3d,2024-04-17T18:59:17.447000
CVE-2023-52472,0,0,edc4f7e5d10bf4a89ae0187405990e8427761603a834ab938210e497cc202d0d,2024-04-17T18:47:08.097000
CVE-2023-52473,0,0,d09aff827319bc04f5ef644dc78ee7877cac2a37a8095f47a84a2bc16cbbedcc,2024-04-17T18:30:15.123000
CVE-2023-52474,0,0,fa04b769255650c27d39cf302de235016c10d86e6615091a97baeebfcb3f3f19,2024-04-17T17:15:54.283000
CVE-2023-52475,0,0,aea1f61605749b823b9030eaa04c6190ad328a4a027c1710dde7c15d17b7e88d,2024-02-29T13:49:29.390000
CVE-2023-52476,0,0,9cb1bc3168cdade3d6916d674b6fa120b5a505e7a4001b9aab86132cf27a69a5,2024-02-29T13:49:29.390000
@ -236691,19 +236691,19 @@ CVE-2023-5391,0,0,e65a9210280128a68a8a49095d5446b17a62134416876921dbd7f459dcc8b6
CVE-2023-5392,0,0,b42034625f9c3fabfc8867568db949560e09d3aacfbd4028ff9bc13a93a69335,2024-04-12T12:44:04.930000
CVE-2023-5393,0,0,ae225fdb3ef98523f87759a2241acbc1653c225f05c425367012260bb5f418b1,2024-04-12T12:44:04.930000
CVE-2023-5394,0,0,f13455681dc15f525d1bc3145edc9cd38f2f868bb7ce4f99746af5bcf05da4b0,2024-04-12T12:43:57.400000
CVE-2023-5395,0,0,e348963069a61f367336cf5dcb975ae7652976bbe983c5e1ad3bd549093c6624,2024-04-17T17:15:12.850000
CVE-2023-5396,0,0,7675ae8c98684077b8e5fbe3f54acbb1f9ecb5045046c985e5bd2b7c8a399c25,2024-04-17T17:15:13.060000
CVE-2023-5397,0,0,9186e556ff6b1915c5afeecd6305b91af18c937c9dd6526333b4158b75b09bdd,2024-04-17T17:15:13.240000
CVE-2023-5398,0,0,a653a75e1fe1e623868332127e56e3b4d2b81b6033720d9e99a549ae08629dca,2024-04-17T17:15:13.430000
CVE-2023-5395,0,1,a2da77fb4dcf161c60c1a5bc092bec4f8463d699c76d6d8a836d336771c62e40,2024-04-17T20:08:21.887000
CVE-2023-5396,0,1,4979b04e66bf3e42d10ca69f5aecdc2478cb6aa7fabfe250366220d8a4dcc5dd,2024-04-17T20:08:21.887000
CVE-2023-5397,0,1,358e75c59ccf48ac869ac2aada2c194b7ba121f4f8593e90a4867a69bd6f1af6,2024-04-17T20:08:21.887000
CVE-2023-5398,0,1,b5e2c0e908c21e5a2452ffca3549856019138410bb200d8c394f40b4a6aa7468,2024-04-17T20:08:21.887000
CVE-2023-5399,0,0,2d6fd5d7032d3fde2b56bbe17324f865d32db5a9ef5d31298ecfc99142786140,2023-10-29T02:33:20.933000
CVE-2023-5400,0,0,f5535fba5368557ef10d1061f0570458543da8e9ab0455a8527957d0a92e59e4,2024-04-17T17:15:13.610000
CVE-2023-5401,0,0,2c03ac2be4270bcaeda95260af11230041858de11d8edcb93c0ecbdc91312e8c,2024-04-17T17:15:13.790000
CVE-2023-5400,0,1,dadbfb3e8ca277c660ee903ae4fc754e46f36a2c46a5b8f021ff31fe8382f48f,2024-04-17T20:08:21.887000
CVE-2023-5401,0,1,b6852b97c80de00906e79bad3b2554401757c8b44e2ded17395ded0afb7bdfbd,2024-04-17T20:08:21.887000
CVE-2023-5402,0,0,d6ca0e0d138e7f0e18108bc80eb991912358210793d36b8686051b13c8765059,2023-10-11T19:19:54.037000
CVE-2023-5403,0,0,7179ea13d2d47fc05834a0767b58dd0a45e07b295f724f155bf1a9a62f894893,2024-04-17T17:15:13.960000
CVE-2023-5404,0,0,3fce55ebbdb5acd5e340d7323a414827e6294a25093c3449c6963c1b93782bba,2024-04-17T17:15:14.130000
CVE-2023-5405,0,0,3b8984381979da0f9dc435b6f64a6e2a47332e3cf9ded085c64ba64be78cbbd5,2024-04-17T17:15:14.300000
CVE-2023-5406,0,0,02e9f6ee45397dd428bab971a92c1af2308eb7aa9ed6c6445740cac0637a0f9d,2024-04-17T17:15:14.480000
CVE-2023-5407,0,0,795cb89e33e6854558d1fda8a1594034a6b4bfa1946b6539823e4b4354b84273,2024-04-17T17:15:14.650000
CVE-2023-5403,0,1,fcb688f0813aed33e039e333a34e02b1391a7070d4a9b82502290b5f7c5bd6a4,2024-04-17T20:08:21.887000
CVE-2023-5404,0,1,5fff080adff748193bb058c6e01a87713d985f0aef08133fbf79a91dfa7db6c5,2024-04-17T20:08:21.887000
CVE-2023-5405,0,1,57e90ffdedad9aaa43afed8417c5ae15d1efbc8ac784816d2bfaa03a0f7d61a2,2024-04-17T20:08:21.887000
CVE-2023-5406,0,1,b41292380c53714f5301351ed91bb8695c34d59328354b61886b296a5c138518,2024-04-17T20:08:21.887000
CVE-2023-5407,0,1,bb88b7b188333db36e8ea21e5fc56d7748420685c37b807be6241e72d624fac9,2024-04-17T20:08:21.887000
CVE-2023-5408,0,0,443628942e473656420f67d7b7b9b3fa498d5d13f709544aa261b0e4696090c6,2024-01-21T01:48:09.767000
CVE-2023-5409,0,0,fbd015e1d6485109c973409b573d46ee4742f3527e9f86b450178ea53a356496,2023-10-20T15:42:22.057000
CVE-2023-5410,0,0,3afa624573d7dfa13f8b27aa43095672b709f7063dade6dd92133c498fc07d7e,2024-03-13T12:33:51.697000
@ -238405,6 +238405,7 @@ CVE-2024-0253,0,0,3129a8e2d9a5828700b1ccdea9c9e089dce30930205a51c85db6174b2d6e02
CVE-2024-0254,0,0,e5eae8b11bfbdda0720ecba88e72e29efdd7b42117ba1a4582cfd62b02acbde8,2024-02-12T20:53:02.440000
CVE-2024-0255,0,0,541867be2e415931a41832092b931a9f6ed85b86ce138a5f77d6aa8f5909e5ad,2024-02-07T23:31:10.567000
CVE-2024-0256,0,0,49de163342e5ba45f12c2cbfe0a11fce418d24b9f8f242901a15605875a38ffa,2024-02-14T19:17:28.387000
CVE-2024-0257,1,1,686a99e5c25822bb255f0e0c9e1a7985ddfc1815472d758a1c25dc17463a35f7,2024-04-17T20:15:07.407000
CVE-2024-0258,0,0,da926b444685fcbac9be2b2403a8d6738d09992d6c11f2b5b1d93a114519bfef,2024-03-13T22:15:08.970000
CVE-2024-0259,0,0,7a566acb922b4256312ecd6b2aa6df420842221f10e688a5524aec4c1e837222,2024-03-28T16:07:30.893000
CVE-2024-0260,0,0,18219d01805ad22a192d40452bb63dc2d586054337ab9927c409f05db0cd5b7d,2024-04-11T01:23:45.600000
@ -240816,6 +240817,8 @@ CVE-2024-21983,0,0,ded146d4808fc5f83424e373b65cdad37794b676d9611f5162836ce6d86d8
CVE-2024-21984,0,0,c4d05388605f2fb7e341aa0197be1de56d0ddb669904fcfa6f2ad451633ba0ba,2024-02-20T19:51:05.510000
CVE-2024-21985,0,0,853a82d200092c0582c4290723b53256d943e3aa0955024d181a6e0dc05dbcae,2024-02-05T18:32:52.040000
CVE-2024-21987,0,0,a312d19cf1876839a82cf4ab8a29efb39c100512ae446943b26071c9bd69f220,2024-02-16T21:39:50.223000
CVE-2024-21989,1,1,a7ad1cf42b6bbd5d309f39c92d044ec1d2fbc193800e8b0d16e692d7b1eacd7f,2024-04-17T20:15:07.663000
CVE-2024-21990,1,1,89cc9378f4d2495b8d48ff5432dd9a1c2f8271df3a54c40113747fb154175f09,2024-04-17T20:15:07.863000
CVE-2024-2200,0,0,c95251fe62e0a963b7f86da5338bcf7f5fe53157d94fd1e09dd2c48a41fbdf10,2024-04-10T13:23:38.787000
CVE-2024-22004,0,0,722cf9801f459066afdd85850c725b2e967fa83ca93b6dee72900667c46a5b4a,2024-04-08T18:49:25.863000
CVE-2024-22005,0,0,313b9bc6d7138eced2900a2388d6d58fcc17e9d91231c0517d2cb0e3e82b9d0d,2024-03-15T20:15:07.527000
@ -243197,15 +243200,15 @@ CVE-2024-26591,0,0,5929783d5428bb2c14c53508060d365bc2cc03643c73a5c691e380ff07f76
CVE-2024-26592,0,0,5ff5d392da394512ac4c5d4bc3e700039f943a7b57abe9c25e65c9574333338f,2024-02-23T09:15:22.877000
CVE-2024-26593,0,0,14e89098c4374dceb139b8720f315d2d4d167aa05c7c8c3a8d22cb5f072b2887,2024-03-11T18:15:18.673000
CVE-2024-26594,0,0,50c57f8d072c06fc1d758c298fd45e612682bb463c5ced52358cf263ead62b05,2024-02-23T16:14:43.447000
CVE-2024-26595,0,1,4aab14a348ba85d767a05d71533f3a3f5d4b6347adf8eb4cca8cbcf592f0a830,2024-04-17T19:55:31.323000
CVE-2024-26596,0,1,ec7de6cfd89ff8a670c626a8cfceb80cf8d6a85a0db935f1a22cdd71fbe71243,2024-04-17T19:54:59.240000
CVE-2024-26597,0,1,c485f672f2d5b1fb393f658111b877d60c67f5a38eb6ee86a5344b881a0760a2,2024-04-17T19:46:28.827000
CVE-2024-26598,0,1,dacf909cf6b348800ffc19d98ca0a28d9d2230d6a0c1647e96b5a8f5428b2a7e,2024-04-17T19:40:31.310000
CVE-2024-26599,0,1,dda6c0811ddef448093e42d12d857e594768c4ec8a914fb75b8d540daf2fa62a,2024-04-17T19:34:01.837000
CVE-2024-26595,0,0,4aab14a348ba85d767a05d71533f3a3f5d4b6347adf8eb4cca8cbcf592f0a830,2024-04-17T19:55:31.323000
CVE-2024-26596,0,0,ec7de6cfd89ff8a670c626a8cfceb80cf8d6a85a0db935f1a22cdd71fbe71243,2024-04-17T19:54:59.240000
CVE-2024-26597,0,0,c485f672f2d5b1fb393f658111b877d60c67f5a38eb6ee86a5344b881a0760a2,2024-04-17T19:46:28.827000
CVE-2024-26598,0,0,dacf909cf6b348800ffc19d98ca0a28d9d2230d6a0c1647e96b5a8f5428b2a7e,2024-04-17T19:40:31.310000
CVE-2024-26599,0,0,dda6c0811ddef448093e42d12d857e594768c4ec8a914fb75b8d540daf2fa62a,2024-04-17T19:34:01.837000
CVE-2024-2660,0,0,4c72efaeff53ee65e5810791290c8031a58671a377a7f696900b9cf4cce27193,2024-04-04T19:24:50.670000
CVE-2024-26600,0,1,3a2050916bdfa0d08b64662508abb5cee0cdc4a8b81c3b9a4c1199d2d8ee43a0,2024-04-17T18:29:25.140000
CVE-2024-26601,0,1,30ccc6d67db0573a68b804997cf6e9843de67fe7ac91aac1c32f4e8d41a6efce,2024-04-17T18:03:41.003000
CVE-2024-26602,0,1,74a07df687505b0074c6bd2fd2ef070cc30b5b21b7d32767a6a2de77b8e2bf18,2024-04-17T18:01:43.820000
CVE-2024-26600,0,0,3a2050916bdfa0d08b64662508abb5cee0cdc4a8b81c3b9a4c1199d2d8ee43a0,2024-04-17T18:29:25.140000
CVE-2024-26601,0,0,30ccc6d67db0573a68b804997cf6e9843de67fe7ac91aac1c32f4e8d41a6efce,2024-04-17T18:03:41.003000
CVE-2024-26602,0,0,74a07df687505b0074c6bd2fd2ef070cc30b5b21b7d32767a6a2de77b8e2bf18,2024-04-17T18:01:43.820000
CVE-2024-26603,0,0,ea875115abb5a013b43aabc1c8e80523fdf49c8e0a84f2554de163f8ad2e5b2f,2024-04-17T18:00:07.600000
CVE-2024-26604,0,0,3af54300b651d19d656a5097d70c7e0dbb5923d92e6dfc43928a15db003f16f1,2024-04-17T17:55:23.003000
CVE-2024-26605,0,0,9f5d4199e87471cbde5b1d897189efd0d3f6dda9d44375cbc6d4860e73662dc7,2024-04-17T17:47:46.583000
@ -243552,7 +243555,7 @@ CVE-2024-26919,0,0,8ce229e6f304423499a3d2dbc331713eb1fbfa99e3cc0b71da0db8b8b65f0
CVE-2024-2692,0,0,aefc05ddca23ffc90de039367cc7fed9a06f50bd32c460cfe2bbf1c8645c8f06,2024-04-04T12:48:41.700000
CVE-2024-26920,0,0,8ad9dc4497d0ab325621ba9253d9bafe6f0648f6e0dcc53db528add7b30825c1,2024-04-17T16:51:07.347000
CVE-2024-2693,0,0,0523f248585c70810eb494560526f8a16efe419cf7f3014aa23838648b0d3e89,2024-04-10T13:23:38.787000
CVE-2024-2700,0,0,2ca42770cf7c7cf86ee4d8d6265dda94df5f872b89d2aa713fb4c7e7054c6177,2024-04-04T16:33:06.610000
CVE-2024-2700,0,1,ec51b942504a96d4888f64f81c70906fd44973b0d1ace8e2f862241f82ce29e0,2024-04-17T20:15:08.240000
CVE-2024-2702,0,0,d714950951d2438da53d97b453b8470335efdb106b4a3aaafe4c816e98d263df,2024-03-20T13:00:16.367000
CVE-2024-2703,0,0,acd3d7979e587f06a1f1c7c632685dcda516645b7d07e09f38809885e199d09c,2024-04-11T01:25:32.890000
CVE-2024-2704,0,0,43d93bf8a377455ff126be5e869a3bdde1d4dc3bc3f3ee5e0d19691064669630,2024-04-11T01:25:32.970000
@ -243986,7 +243989,7 @@ CVE-2024-28066,0,0,8d264de635ae9c8dc6d41b6ed16f7f85828f585eea298ce9fb065b16c3368
CVE-2024-28069,0,0,99a57a9955c5ed5463e7c560b95e0a17dfa2789ec3c024f2825003d476d4b80d,2024-03-17T22:38:29.433000
CVE-2024-2807,0,0,389dec77d863d88d0729c3b21a13c4f638dbaad2d7ffdf5a3bec6019fd1a7b1b,2024-04-11T01:25:36.783000
CVE-2024-28070,0,0,c8eeec88fa6e3b91036a4eadc63dd921f090ad52309176e7af22a570b911aeac,2024-03-17T22:38:29.433000
CVE-2024-28073,0,0,d3470e392b2a981cfa8de7e2c19ca61ffafe1d49309a8294053281b3549cfa7b,2024-04-17T17:15:14.900000
CVE-2024-28073,0,1,11595a1e096ea791c7b3c722c3e27da07919e96619a7c3a0a6fbf6f73647b227,2024-04-17T20:08:21.887000
CVE-2024-2808,0,0,c3ed3b9e68948cd880b53f1e926f321cf4b47941f31cc49bbad2cbe5e609284b,2024-04-11T01:25:36.883000
CVE-2024-28084,0,0,e855eaf3201adbee7f29bca688e63324787cf32844050753a9cd1965f8c4b542,2024-03-23T03:15:11.583000
CVE-2024-28085,0,0,50b7c8ccc5599b7ab0a3fb9fa52479a655595623006a86c4fef2d0664fd54633,2024-04-07T12:15:08.903000
@ -244639,7 +244642,7 @@ CVE-2024-2954,0,0,297c9bf8798d95f9e2afa5ec16629f7d540183d0c516c52354e99c26b91889
CVE-2024-2955,0,0,f5c634c6848e63b860083a99079428b98700f415e99f60bb3f05a1ae3960426b,2024-04-17T03:15:07.030000
CVE-2024-2956,0,0,1f998613263914bb93c36fc6850584cdfe450d6dc26811c07d743b16483d0fc7,2024-03-27T12:29:30.307000
CVE-2024-2957,0,0,ac8390067e308aa1d0182fc1e6566dfc49293a4efcfdac5c5a2e83565eda21fe,2024-04-10T13:23:38.787000
CVE-2024-2961,1,1,210a8df2807ec3196e508036db07434ec0d54d78f1e6963718af4fae835a48d3,2024-04-17T18:15:15.833000
CVE-2024-2961,0,1,610b24fd6115411d25cf791a8bcf1b458d114de28e9f0278881625af779bdf35,2024-04-17T20:08:21.887000
CVE-2024-2962,0,0,66e1dbbf6553695d3f3b80872691537dfe2ee799c385611e870cc04c150d3a60,2024-03-27T12:29:30.307000
CVE-2024-2963,0,0,fd3dfe2484fa8fbcf32b1e1713c092eebd2b546a8fe9a7f583270172bb703a7d,2024-03-29T12:45:02.937000
CVE-2024-2964,0,0,491ec5f2811a24301edaa3e4cd378090bf610cd2f1b9a50cd7e0dcb254704174,2024-03-29T12:45:02.937000
@ -244843,7 +244846,8 @@ CVE-2024-29947,0,0,404b741ad74b72a5c64b5b398cf3854dad20f87fcc6b108acac73a5b50a2f
CVE-2024-29948,0,0,6b1d30acb0dbd07b9c2736b474e04bb8c45091d15b65405d56f353e5b8df50cb,2024-04-02T12:50:42.233000
CVE-2024-29949,0,0,2c66313a6c0e08be78f3175b6236e7b43ba69f970bb136fedf0178adbd27c000,2024-04-02T12:50:42.233000
CVE-2024-2995,0,0,c87d76122714da8733dd7ff61010b11be1c71aaeaf58b39102c125532e66911b,2024-04-11T01:25:44.730000
CVE-2024-29950,1,1,3fa0e14a508f0e2f46c950ed35cb29e55f4b135c71a64a1ac8197980d69b0776,2024-04-17T19:15:07.213000
CVE-2024-29950,0,1,4f55f4765dc732e5e5a2daa4589744a2dced20d7b31c8e7e2379aabe94d7be56,2024-04-17T20:08:21.887000
CVE-2024-29951,1,1,77ce0884f5270dcd8a3d9ca69626d640acd087f2571ecfb080c37be74cd27b9e,2024-04-17T20:15:08.060000
CVE-2024-2996,0,0,ce0ff76245864ce5ac90a5463bb82f1b7ea8cb5b36b1788a5a81e2b6f1ea29d1,2024-04-11T01:25:44.817000
CVE-2024-2997,0,0,9898fb7013ec19b0561eed8c77e485f2157863b27165155c8b5ee1597a437181,2024-04-11T01:25:44.910000
CVE-2024-2998,0,0,d70ba68eced6e12f3efc70fcd8b1293409b727b749095518ed0181052dee5fce,2024-04-11T01:25:44.997000
@ -245319,25 +245323,25 @@ CVE-2024-3092,0,0,cb7f2178928a426a0265657834f9aeb630ccb1ca35a9c66bd22fe30bfcb426
CVE-2024-3093,0,0,32bf1c70eab5da7d509a40d74982ac8945909f57d49846c0cf619694e2add382,2024-04-10T13:23:38.787000
CVE-2024-3094,0,0,cba466c06d21b74e1043491724188f63d6d0b9ba1993a884907c833ea9999b43,2024-04-12T07:15:08.740000
CVE-2024-30946,0,0,0dff329aaece035fc82f00595012379643bd5a0edb89ee3a7369d6609e13a4d1,2024-04-02T18:12:16.283000
CVE-2024-30950,1,1,7a29fad884af75ba4c28adf0d41eeb5d17e89c1d30d606e65420188ec66cb6d5,2024-04-17T19:15:07.420000
CVE-2024-30951,1,1,b54394060189d82600550be494527c6bdee56d2280244f005abde5b8380a2e64,2024-04-17T18:15:15.947000
CVE-2024-30950,0,1,30e94ba74b1c9e764e05183270b9cbf984b1fc3b08e88dd08137339dc8cca5d1,2024-04-17T20:08:21.887000
CVE-2024-30951,0,1,89531764b9c26fe5797ccda707596767b920928a0eb4f7604d09dbadeeec1668,2024-04-17T20:08:21.887000
CVE-2024-30952,0,0,08d945856bbc49cc361c7cb3912a56d878635492481059b2fd432003c0a2fb40,2024-04-17T15:31:50.160000
CVE-2024-30953,1,1,5054bda8e69e751d948845f5d7fbfbdb7f417193788be61bd38113d3953cd92e,2024-04-17T19:15:07.470000
CVE-2024-30953,0,1,852cae3382b857c19cb395f48f623871adfde604b2fbdfac3bf020f961e4b985,2024-04-17T20:08:21.887000
CVE-2024-30965,0,0,0e44dd5d951a25ac3e8873a32678a3145da47d1060cb5312576a9c0471b643ad,2024-04-02T18:12:16.283000
CVE-2024-3097,0,0,d36ff609a9c55f871c6ce5cee1ea4c5f261f1965e5780dc5607289e6057964d8,2024-04-10T13:23:38.787000
CVE-2024-30977,0,0,0a99023cc49f8723c27525ea3fd6d09c0a18e0536fb7ad1e37e70ef0654b9714,2024-04-08T18:49:25.863000
CVE-2024-30979,0,0,80ab36bca498e33975593d086ceeeedf107c2c6f87bef059b959bbe8c3731bf4,2024-04-17T16:51:07.347000
CVE-2024-3098,0,0,6c9612ddcc0eabe1134a3c49c1d4f4b4a8fb99e39689761d9db9b207a4883fdf,2024-04-10T19:49:51.183000
CVE-2024-30980,0,0,053956a796f5b9da3667cbae2abc1c1cdd79005ae463967ecd171606fbdae681,2024-04-17T17:15:15.117000
CVE-2024-30981,0,0,53525c0ae3949cd315151ca88c3e6b1efae1b92482b51368a1cba05aa91a5863,2024-04-17T17:15:15.193000
CVE-2024-30982,1,1,cfa8111cf652f0d39640e1dc33345cb2faba3c4028ca39ccb7d15bdb18841e1c,2024-04-17T18:15:16.037000
CVE-2024-30983,0,0,a7bceef96b5bce11c2523c6a87d312ec510c67c08abc42e7d34ac206667bf66d,2024-04-17T17:15:15.257000
CVE-2024-30985,1,1,f8bec284d82fd898aa1e8edf611ac99ad1abddfea8135dd73fdf5766f3975fe3,2024-04-17T18:15:16.097000
CVE-2024-30986,1,1,691502e7ec1f9ce09c8c59bf32e74468ba01df63039547e93fba72b17906e0f6,2024-04-17T18:15:16.157000
CVE-2024-30987,1,1,2c210a9e4e3d2a93d3aa1ecae4f0737b6a021b6d8d6510887cadbef01f26e74b,2024-04-17T18:15:16.210000
CVE-2024-30988,1,1,691a0f38feca682cbab8db5678310380f2da574b75233fb151f2f4d726d6e559,2024-04-17T18:15:16.273000
CVE-2024-30989,1,1,078d1ff84218313ea7e74a0b5fbb50e83194eadc33a3debd0521ec22e6579bff,2024-04-17T19:15:07.520000
CVE-2024-30990,1,1,41277abf90d488850da8bf9c0ef492ae6e8789ecec9d7d3d81510283d1bf25e6,2024-04-17T19:15:07.570000
CVE-2024-30980,0,1,b6cf6ccedccdc30aac9bd045f33afef7720a0fb31643362b1bc77595e9e55e09,2024-04-17T20:08:21.887000
CVE-2024-30981,0,1,13ac7883f890039d011d9de352e748ae0884ece9e35f8213668b3d57d8e8ee92,2024-04-17T20:08:21.887000
CVE-2024-30982,0,1,5e9b20db70b246c8c7bd1811fd8db772245b009a68cec446ceaf47d9829082f0,2024-04-17T20:08:21.887000
CVE-2024-30983,0,1,ce4d06089af3124251611d23fb812617e40d2835454fe1bac380d5952da81a98,2024-04-17T20:08:21.887000
CVE-2024-30985,0,1,00052514ff118cf10ea4e67d48dbef0a5515163b77f516e138dac418bac000aa,2024-04-17T20:08:21.887000
CVE-2024-30986,0,1,f7416693205f3f95a7ba048bd1a70386f3a0dc003f10b48bf4669cf98338f65c,2024-04-17T20:08:21.887000
CVE-2024-30987,0,1,df9e40e5f711b54d5de56510ffb9a33ffabf77ceafa889b363d20f1a3adfc264,2024-04-17T20:08:21.887000
CVE-2024-30988,0,1,1026220b0084f0c36d417192bc1bbaa670523ffb84a262e35398566ffbcdb884,2024-04-17T20:08:21.887000
CVE-2024-30989,0,1,7c642c418d5d3f2ee7de7d143c0abbeac9741519e893e116bc9b1e6b43c2fcd0,2024-04-17T20:08:21.887000
CVE-2024-30990,0,1,4ff171a216e49b8a1b98a7610555a00dfe09e3bc3ec80b46c45fbd6f4f83badc,2024-04-17T20:08:21.887000
CVE-2024-30998,0,0,179abd0db8095df44a7d1fc224d4f504797395ef6ca242b590dce2e234dbd0de,2024-04-03T12:38:04.840000
CVE-2024-31002,0,0,96e076f675a43d72347dc0c980a987d7f8bd37cac2f635917b77c618d7fb5159,2024-04-02T12:50:42.233000
CVE-2024-31003,0,0,3f0adfc7393f75768ba5f0ff119d336a00244f196f86b1dcc7f91a86901fc5be,2024-04-02T12:50:42.233000
@ -245352,11 +245356,11 @@ CVE-2024-31012,0,0,59265fe10316d43a2acb459ea9de60f6a264c8b6d13bc4dae0d363d3b5d71
CVE-2024-31013,0,0,137ba39b03bbaab20823954557195167ac08df3fa32a6782dd4080f1d723f338,2024-04-03T12:38:04.840000
CVE-2024-31022,0,0,a14e43455f8667f5b08643f4accc0ded65ef08c98d3d4f6b069b1542bbf69336,2024-04-08T18:48:40.217000
CVE-2024-31025,0,0,049c3aee715c9c75f255eea2ba7d71aee620ad97e93ef3b0e0a948ae51dd0b57,2024-04-04T12:48:41.700000
CVE-2024-31031,1,1,c96f610fa8ae496083aabf8cbda75eea462f91d4b532048c242be6c0bcd4821d,2024-04-17T19:15:07.623000
CVE-2024-31031,0,1,b7880b3be7db11683e3f2fef6956445531209cffc8b410d3b64c7ca81fd90409,2024-04-17T20:08:21.887000
CVE-2024-31032,0,0,71dbb2a787f73b1914bf5d51e1b83b5365eb112b3ab9ed4df5d1066682b5223b,2024-04-01T01:12:59.077000
CVE-2024-31033,0,0,200340e7b08fbb0d6701818d4b83bef89c21119b7d9fe7f5be450bb2b1edb614,2024-04-11T01:25:48.953000
CVE-2024-31040,1,1,b191158d35d332c7eb45e96b1a880757ed0c855d7faebb19d0d3eeeceea8b0de,2024-04-17T19:15:07.680000
CVE-2024-31041,1,1,9f282ca3baaf004191f2d8e082f19dff47e0ff2b795ffa40e7b20378f72efaf0,2024-04-17T19:15:07.733000
CVE-2024-31040,0,1,ad0c36cbf6fe4e7fa7e88f6d75c08768ff866ab7dc21103ca5bdb483c62304d1,2024-04-17T20:08:21.887000
CVE-2024-31041,0,1,65c63dc9d06ac95efa246e784659052f9342d1132b5acec915cbf1071ea1326b,2024-04-17T20:08:21.887000
CVE-2024-31047,0,0,ed6b998d2efbbc258ad744f538162378aa1b702ac5e17462e2e5f42d9945fb08,2024-04-09T12:48:04.090000
CVE-2024-31061,0,0,020e38014038ba97f692790c06c98735ee7323fcc8614755f16c9c5708fe33f5,2024-03-28T20:53:20.813000
CVE-2024-31062,0,0,9a85b45f2ef9be7ff3563a8d396c3a8dd45f237219d28fbf343c7fa8953f9bf5,2024-03-28T20:53:20.813000
@ -245594,11 +245598,11 @@ CVE-2024-3157,0,0,5a423f43ed9e43d0f3e67864a2f920e32c6b616d23d4a97009e6a50d354545
CVE-2024-31576,0,0,741c8998460302eafaf2dd6cd838e7890c169c726e59c5f45ee51622793abfa6,2024-04-15T16:15:07.270000
CVE-2024-31578,0,0,77ddec4d5b6b37ac0f61734499aeff3bda9cb160ccd770fe33ca29c585fd57bc,2024-04-17T15:31:50.160000
CVE-2024-3158,0,0,d2414412e299d1c6c6fd5c25934ca9d016ec38ac6210ea884f5d6eabc2220b22,2024-04-08T18:48:40.217000
CVE-2024-31580,1,1,4ad8b40968ba9885bebd8c17032b4ca951b28b2224d7e371f0272debafd03e5b,2024-04-17T19:15:07.783000
CVE-2024-31581,1,1,3f1e8f542f05a00ff70098cb18ee6eb70b71dd3ef7c2890cef8bace638e8dbe0,2024-04-17T19:15:07.840000
CVE-2024-31582,1,1,297745caa1a86774b7b1a2deb15bda53399ac8f338d76f260e624710b4ccdf11,2024-04-17T19:15:07.893000
CVE-2024-31583,1,1,3a07a0fcfe9fc4c6dfe2879ef92ea55757cc8c139da4aaf59dde84ec89986ec2,2024-04-17T19:15:07.950000
CVE-2024-31585,1,1,9f6b9a5d956e35cc990e779dd53a2a839ec813cadae46458921997ae5ab97e21,2024-04-17T19:15:08.007000
CVE-2024-31580,0,1,d7c84c101d780f8652160bab948da8fb0c4dce3c9c7741f9218de70831e9c34e,2024-04-17T20:08:21.887000
CVE-2024-31581,0,1,865deff14bc7ef9b36e2bb8e65225902059d208782571d2a360a898684ed0e64,2024-04-17T20:08:21.887000
CVE-2024-31582,0,1,86c2a5b1679f83ece114829a0186057f140c91c46b8529b9e5c7a12763d2e25e,2024-04-17T20:08:21.887000
CVE-2024-31583,0,1,23d0ff984e0072ed917a552139ff5dba08b151a993349e70e9b8d91d85217832,2024-04-17T20:08:21.887000
CVE-2024-31585,0,1,6c0cc5d202694755c3e5e588c7e5525f9c4ad64feb6107844dd228e8ae9483be,2024-04-17T20:08:21.887000
CVE-2024-3159,0,0,ab3d3fc3f58ff99c2f10e23574a75e665f3343c344ecfe71138e927973febb6e,2024-04-08T18:48:40.217000
CVE-2024-3160,0,0,f58561faca7869291dbd40f98b5207b12f048bddf4323b50e2fa0b0605fe77f4,2024-04-11T01:25:55.513000
CVE-2024-3162,0,0,7209bf9b1b4a4f41543ae01bfd19e9aec1dd355164cd1434a8cb5548ea161c65,2024-04-03T12:38:04.840000
@ -245772,9 +245776,9 @@ CVE-2024-32145,0,0,46f82be3b79b18ba25f2a9e0fa1663c301fc655d81936963a35db2da93921
CVE-2024-32147,0,0,221f8d37c746fb10439627f9391d23954c77e6687fd4a296059e2d8c0758881a,2024-04-15T13:15:31.997000
CVE-2024-32149,0,0,12d107e3c0999cbcd27b2d933b885433c81cf0faba3d46ab08b4e66fab365309,2024-04-15T13:15:31.997000
CVE-2024-3216,0,0,aac88e798ffbdaddd62ae90ecbece12fc58351de061defd8cac2a138eea1c35f,2024-04-08T18:49:25.863000
CVE-2024-32161,1,1,3c0b16e8eabfed5ee02e0d33a40c5490045a318af5cf56a6f3be8585f44740df,2024-04-17T18:15:16.337000
CVE-2024-32162,1,1,af6a36fcaebc4e8e6f9b37ba8b5ed922042775cf8d4859a3b999ab33e91b64dd,2024-04-17T19:15:08.060000
CVE-2024-32163,1,1,c5a82f9ae4dce2854e4be822254aed5239197ae59638321a2045fa9d4865cb4f,2024-04-17T19:15:08.117000
CVE-2024-32161,0,1,baff3d70ce2747d9e5f346cd66bce32126ea12f61c828e5711138e595e3e8ba1,2024-04-17T20:08:21.887000
CVE-2024-32162,0,1,18cb543f3bd362f8058d75d170f82ceb4e8cc54fbc6764dbd879a636823e0837,2024-04-17T20:08:21.887000
CVE-2024-32163,0,1,d9c67886d51c8540ec61857ff9e9d5e0bf0f61d06ed2ba271473bf6d7d327f9d,2024-04-17T20:08:21.887000
CVE-2024-3217,0,0,3ac42247ba2d685c0a6f4de738ef771d2778cce367312f144d0326551965dbb5,2024-04-05T12:40:52.763000
CVE-2024-3218,0,0,75e1c84ee83eb1d158244a2182789a8e99b92d3a400a75a7854fff9872030968,2024-04-11T01:25:56.290000
CVE-2024-3221,0,0,feefc929b27a3432f5d1352d15fe99f1f6ccd294cecb07c343d15630058ba883,2024-04-11T01:25:56.367000
@ -245814,6 +245818,15 @@ CVE-2024-32316,0,0,a58c15fa4fd96274056ab104ca6fc1340e053661d8932d745c0fc4b1c09dc
CVE-2024-32317,0,0,3b211721c2918106b1f1e7546bda616d889285c7b9549429ce029a2ae9fa7832,2024-04-17T16:51:07.347000
CVE-2024-32318,0,0,af0147cc0b951b6320a20f40cec58c15f3c7ae517895de35f7ff02b93007344c,2024-04-17T16:51:07.347000
CVE-2024-32320,0,0,37a3616f028696b5fd899f236869a82a73cb2f39b08a79d3a8c229c093bfc5dd,2024-04-17T16:51:07.347000
CVE-2024-32337,1,1,e36432fd5de04e0350998fc3798195076620aeb57d01ade0ec37a80f3dfb5730,2024-04-17T21:15:09.267000
CVE-2024-32338,1,1,d2c4c10cda47f9c06c2634cf0d3bf3e42a60b27d927b40e5ea45611430fae30c,2024-04-17T21:15:09.343000
CVE-2024-32339,1,1,87acf3e540d587198c3b97149a891614d27b7bf26500099de4c1f6d5608c36ac,2024-04-17T21:15:09.400000
CVE-2024-32340,1,1,eed9cbb9f213e0cedfaccc63cf4dc29ebd92af7ff81a0880890506bbc4201ccb,2024-04-17T21:15:09.453000
CVE-2024-32341,1,1,427f4e01293da73e4302a1f4142428ba541f31cf82ae1bf7d94f605c5ae33172,2024-04-17T21:15:09.507000
CVE-2024-32342,1,1,ffc7e457ae2c85dbc46737fc6b82641c3fbd4690610f5addd204723048ee5af8,2024-04-17T21:15:09.560000
CVE-2024-32343,1,1,ea322845e96559469562df80ef6b50fb0faec6b262b3a95796e0a84c49221cba,2024-04-17T21:15:09.623000
CVE-2024-32344,1,1,2a3599e8826b0c3b6f84c18b5f11f29ca4237136d96485f16750aabaa3d4dd30,2024-04-17T21:15:09.677000
CVE-2024-32345,1,1,f6c8062b536bda6bcda7d638ecd1a4b25c77290867405481db8afab437d6734b,2024-04-17T21:15:09.727000
CVE-2024-3235,0,0,87b194ac57d76e3164f790cf262b7f15e5577bfab72d12fd067ebb5070eb75e0,2024-04-10T13:23:38.787000
CVE-2024-32428,0,0,87a3edde2c4b0ace5bed90e6337013a3436ae0c663c6eeed3dbaf59e4e702dff,2024-04-15T13:15:31.997000
CVE-2024-32429,0,0,eb5275541e0171326bf869e836661a3d04172e6e7d4adfaa9657297147332796,2024-04-15T13:15:31.997000
@ -245916,6 +245929,10 @@ CVE-2024-3271,0,0,427448d66ebe59002a93ad233a5fbd2b2253db3687d924fc6f5652a183f66e
CVE-2024-3272,0,0,ef44e7e2e0d0ab3ec436a6ccc174b0a90f543a9a2cfa65f7a6d262da6c5446ee,2024-04-15T20:14:55.570000
CVE-2024-3273,0,0,2c9bd6b2b67818472adec2002fc02ad46426a066a40e52d2a8dbeb776c880650,2024-04-15T20:13:57.290000
CVE-2024-3274,0,0,21270603d98a8b3e4eb735d32ed5791b575a3fe053daf1cd79027e90bad6bb12,2024-04-11T01:25:57.997000
CVE-2024-32743,1,1,838f09225aed11028ba3ea4d8c7736044e9c9550d65df700af11ea6c9f02340a,2024-04-17T21:15:09.783000
CVE-2024-32744,1,1,574167acf44420644737c18879b005cab586b2203c9327bed0f4f00c3a807406,2024-04-17T21:15:09.843000
CVE-2024-32745,1,1,814ba3f3fab851ff0162fc8f6c044affc072d00e16362b5903112583bf1e7575,2024-04-17T21:15:09.897000
CVE-2024-32746,1,1,41cf2e76ddbd601b0981094a550ba5636bc6b1d8c4a34e6d189247a02ffa1a9b,2024-04-17T21:15:09.943000
CVE-2024-3281,0,0,b3c51db3aca3b371ad4faa3c1c4537d2c54d8323123f7ae9b26414cd9ee432a6,2024-04-10T13:24:22.187000
CVE-2024-3283,0,0,8b1939d21df3d4399a3bf874e70470053c1a0ae20421841ad51c79aca5727c56,2024-04-10T19:49:51.183000
CVE-2024-3285,0,0,ea17e16acaa3172cbcc052cf9bfb1b3e7ee2b004434b062b8e67c1c1ed8bff14,2024-04-11T12:47:44.137000
@ -245930,7 +245947,7 @@ CVE-2024-3315,0,0,b04b498365bf550d192eb8f6355a94ceb3682fd952e63a5ca20359721d079b
CVE-2024-3316,0,0,4e6c62f7daa2acc1b09b99a91d6183a3304f5f15a5196b646e7dca95270cc88c,2024-04-11T01:25:58.400000
CVE-2024-3320,0,0,ab85871ad052e5f4fcf422dcfe569e228d877013c1827b81abff88790a089460,2024-04-11T01:25:58.477000
CVE-2024-3321,0,0,d8a6bcfaefe4af3ab04feeb555f2bafb55cef6e6487d8794d3441d1d17abf104,2024-04-11T01:25:58.560000
CVE-2024-3323,1,1,58f0ef328166e16f44be810afeaf7913118e3089582868d3086e780776cd5ddd,2024-04-17T19:15:08.177000
CVE-2024-3323,0,1,ee5c28e64b3534ad62b7156293b962f8a026f4befb9ceb443f6f7b4109723fa3,2024-04-17T20:08:21.887000
CVE-2024-3333,0,0,41236fb41e8bfaf4e86270572f6bea1f95470a53ec0d897942e32018eedb9937,2024-04-17T12:48:07.510000
CVE-2024-3343,0,0,c7ada54a8973c3f80fc415b1484b0c0d7aeb75e458012c05cd3c69dcc6f0e33f,2024-04-11T12:47:44.137000
CVE-2024-3344,0,0,9f0d30bf7471aa86a4cb4a703805df84e7338e4a65408c3f6ac2fd777c6250e1,2024-04-11T12:47:44.137000
@ -246113,6 +246130,7 @@ CVE-2024-3797,0,0,a49e1c5a734d1a2c1373957f16247491a1198771bf616ee0ff20957d954e73
CVE-2024-3802,0,0,5395fe7b87f4e5ca6c4397aa1001686137daab009656e2126daa68d47ebdf7e9,2024-04-15T13:15:31.997000
CVE-2024-3803,0,0,5839bf1f5fc97242d8c9adb88b40fa5013a07555baee205c3d9bec592a883085,2024-04-16T13:24:07.103000
CVE-2024-3804,0,0,d2c04bcba3b9dcee33d8ad0e898646d48639f7e3e6aed11c413cf03cea6afbe3,2024-04-16T13:24:07.103000
CVE-2024-3817,1,1,e146a0f24ef6649d7d907ae65e79927a18f79291f1828287679a049df6a38cf7,2024-04-17T20:15:08.383000
CVE-2024-3825,0,0,cf5f4f310b2c59b261c07d67ee6e69189162f7e44f9cdead90080a906b42b533,2024-04-17T15:31:50.160000
CVE-2024-3832,0,0,9dd56fad5460e31af71408aef448c2395575e6dee46d55026c2ec166be133ff0,2024-04-17T12:48:07.510000
CVE-2024-3833,0,0,dff090d851a013a09ba1359f006f48badc9604823081b1a17b5c5719cae664d1,2024-04-17T12:48:07.510000
@ -246155,11 +246173,11 @@ CVE-2024-3879,0,0,9c5ce4d1a3fc01133b3321115c4ccd096980cfe5baa042c4c9bf7b273029d2
CVE-2024-3880,0,0,237e3bb93a0b113a1c50538806f68b5377561349bd4f47a9139ec72cd356417d,2024-04-17T12:48:31.863000
CVE-2024-3881,0,0,9055ecf63e1aedc7e2787afc56e67bc831564d5ee15f418ef1b408c81c24bb16,2024-04-17T12:48:31.863000
CVE-2024-3882,0,0,846c922d5cf92347db05da515dc041ccc83bdcd548fefc386c188946857d0db7,2024-04-17T12:48:31.863000
CVE-2024-3900,1,1,4c7b21e1cb69699bffcdf893116b1c1c14804a5942e3d38e2be9e9cc4e95c537,2024-04-17T19:15:08.347000
CVE-2024-3900,0,1,4754e29edc405b56435ad106711f084e7622ef91b353d31f88826e0bd93a47ca,2024-04-17T20:08:21.887000
CVE-2024-3905,0,0,7be32ce1cebe831dd18c83e9cee35ffcf3ef4d95b177b36857101bc880e13458,2024-04-17T12:48:07.510000
CVE-2024-3906,0,0,3d774d0d8e879a2e547ece6581f966b0621f926e176ba86f810130848d808882,2024-04-17T12:48:07.510000
CVE-2024-3907,0,0,e9d4f83d03470ade2cadeb4be1ea2503424ca77e73533dcedd08ebc2ecd1caff,2024-04-17T12:48:07.510000
CVE-2024-3908,0,0,14819196bd06b3f47df9a72a4748d3af3ea51b51fecc6fc14f6bb0ea5ac20eab,2024-04-17T12:48:07.510000
CVE-2024-3909,0,0,88409e12ed6fe478dbedde42ee0b29fb69f3bd755cbe1c9aee9c2d33e78a2db7,2024-04-17T12:48:07.510000
CVE-2024-3910,0,0,86d1a96ddd3463e152d9d08dee2f0faab8142fd78de3719a4a22f0df5c358cdf,2024-04-17T12:48:07.510000
CVE-2024-3914,1,1,01822c949cfa3d96edee4f8b6d0fa4affe37c999421316935018f1a4e2b2a0f9,2024-04-17T18:15:16.400000
CVE-2024-3914,0,1,f93977105202dbc9d06c0cd96ce45891e87c322bf8bb225cb96c3dd248984c2c,2024-04-17T20:08:21.887000

Can't render this file because it is too large.