Auto-Update: 2024-04-26T23:55:29.175773+00:00

This commit is contained in:
cad-safe-bot 2024-04-26 23:58:18 +00:00
parent 4a9a8d703b
commit 0b5f2d7ec8
14 changed files with 476 additions and 65 deletions

View File

@ -2,12 +2,12 @@
"id": "CVE-2022-29622",
"sourceIdentifier": "cve@mitre.org",
"published": "2022-05-16T14:15:08.027",
"lastModified": "2023-11-07T03:46:04.303",
"lastModified": "2024-04-26T22:15:07.627",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "An arbitrary file upload vulnerability in formidable v3.1.4 allows attackers to execute arbitrary code via a crafted filename. NOTE: some third parties dispute this issue because the product has common use cases in which uploading arbitrary files is the desired behavior. Also, there are configuration options in all versions that can change the default behavior of how files are handled."
"value": "An arbitrary file upload vulnerability in formidable v3.1.4 allows attackers to execute arbitrary code via a crafted filename. NOTE: some third parties dispute this issue because the product has common use cases in which uploading arbitrary files is the desired behavior. Also, there are configuration options in all versions that can change the default behavior of how files are handled. Strapi does not consider this to be a valid vulnerability."
},
{
"lang": "es",
@ -110,6 +110,10 @@
"Third Party Advisory"
]
},
{
"url": "https://github.com/strapi/strapi/issues/20189",
"source": "cve@mitre.org"
},
{
"url": "https://medium.com/%40zsolt.imre/is-cybersecurity-the-next-supply-chain-vulnerability-9a00de745022",
"source": "cve@mitre.org"

View File

@ -0,0 +1,24 @@
{
"id": "CVE-2024-28322",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-04-26T22:15:07.793",
"lastModified": "2024-04-26T22:15:07.793",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "SQL Injection vulnerability in /event-management-master/backend/register.php in PuneethReddyHC Event Management 1.0 allows attackers to run arbitrary SQL commands via the event_id parameter in a crafted POST request."
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/Sospiro014/zday1/blob/main/event-managment.md",
"source": "cve@mitre.org"
},
{
"url": "https://packetstormsecurity.com/files/177841/Event-Management-1.0-SQL-Injection.html",
"source": "cve@mitre.org"
}
]
}

View File

@ -2,12 +2,12 @@
"id": "CVE-2024-29960",
"sourceIdentifier": "sirt@brocade.com",
"published": "2024-04-19T04:15:10.270",
"lastModified": "2024-04-19T13:10:25.637",
"lastModified": "2024-04-26T22:15:07.850",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "In the Brocade SANnav server versions before v2.3.1 and v2.3.0a, the SSH keys inside the OVA image are hardcoded and identical in the VM every time SANnav is installed. Any Brocade SANnav VM based on the official OVA images is vulnerable to MITM over SSH. An attacker can decrypt and compromise the SSH traffic to the SANnav appliance.\n\n"
"value": "\nIn Brocade SANnav server before v2.3.1 and v2.3.0a, the SSH keys inside the OVA image are identical in the VM every time SANnav is installed. Any Brocade SAnnav VM based on the official OVA images is vulnerable to MITM over SSH. An attacker can decrypt and compromise the SSH traffic to the SANnav.\n\n"
},
{
"lang": "es",
@ -21,20 +21,20 @@
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"attackVector": "NETWORK",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "ADJACENT_NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH"
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 6.8,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
"exploitabilityScore": 0.9,
"impactScore": 5.9
}
]
},

View File

@ -2,12 +2,12 @@
"id": "CVE-2024-29963",
"sourceIdentifier": "sirt@brocade.com",
"published": "2024-04-19T04:15:10.793",
"lastModified": "2024-04-19T13:10:25.637",
"lastModified": "2024-04-26T23:15:05.857",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "Brocade SANnav OVA before v2.3.1, and v2.3.0a, contain hardcoded keys used by Docker to reach remote registries over TLS. TLS connections with an exposed key allow an attacker to MITM the traffic. \nNote: Brocade SANnav doesn't have access to remote Docker registries.\n"
"value": "\nBrocade SANnav OVA before v2.3.1, and v2.3.0a, contain hardcoded TLS keys used by Docker. Note: Brocade SANnav doesn't have access to remote Docker registries.\n\n"
},
{
"lang": "es",
@ -21,20 +21,20 @@
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:L/I:N/A:N",
"attackVector": "LOCAL",
"attackComplexity": "HIGH",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "HIGH",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 8.6,
"baseSeverity": "HIGH"
"baseScore": 1.9,
"baseSeverity": "LOW"
},
"exploitabilityScore": 3.9,
"impactScore": 4.0
"exploitabilityScore": 0.5,
"impactScore": 1.4
}
]
},

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2024-30804",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-04-26T22:15:08.017",
"lastModified": "2024-04-26T22:15:08.017",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "An issue discovered in the DeviceIoControl component in ASUS Fan_Xpert before v.10013 allows an attacker to execute arbitrary code via crafted IOCTL requests."
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/DriverHunter/Win-Driver-EXP/tree/main/CVE-2024-30804",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,59 @@
{
"id": "CVE-2024-3051",
"sourceIdentifier": "product-security@silabs.com",
"published": "2024-04-26T22:15:08.263",
"lastModified": "2024-04-26T22:15:08.263",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Malformed Device Reset Locally command classes can be sent to temporarily deny service to an end device. Any frames sent by the end device will not be acknowledged by the gateway during this time.\u00a0"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "product-security@silabs.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "product-security@silabs.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-345"
},
{
"lang": "en",
"value": "CWE-754"
}
]
}
],
"references": [
{
"url": "https://community.silabs.com/068Vm0000045w2j",
"source": "product-security@silabs.com"
}
]
}

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2024-3052",
"sourceIdentifier": "product-security@silabs.com",
"published": "2024-04-26T22:15:08.460",
"lastModified": "2024-04-26T22:15:08.460",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "\nMalformed S2 Nonce Get command classes can be sent to crash the gateway. A hard reset is required to recover the gateway."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "product-security@silabs.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "product-security@silabs.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-754"
}
]
}
],
"references": [
{
"url": "https://community.silabs.com/068Vm0000045w2j",
"source": "product-security@silabs.com"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2024-31551",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-04-26T22:15:08.080",
"lastModified": "2024-04-26T22:15:08.080",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Directory Traversal vulnerability in lib/admin/image.admin.php in cmseasy v7.7.7.9 20240105 allows attackers to delete arbitrary files via crafted GET request."
}
],
"metrics": {},
"references": [
{
"url": "https://www.yuque.com/sickle-ffnce/awixr8/qu8i0p9y0h277m6u",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2024-31741",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-04-26T22:15:08.137",
"lastModified": "2024-04-26T22:15:08.137",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Cross Site Scripting vulnerability in MiniCMS v.1.11 allows a remote attacker to run arbitrary code via crafted string in the URL after login."
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/bg5sbk/MiniCMS/issues/49",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2024-31828",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-04-26T22:15:08.200",
"lastModified": "2024-04-26T22:15:08.200",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Cross Site Scripting vulnerability in Lavalite CMS v.10.1.0 allows attackers to execute arbitrary code and obtain sensitive information via a crafted payload to the URL."
}
],
"metrics": {},
"references": [
{
"url": "https://jinmu1108.github.io/uncategorized/CVE-2024-31828/",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,92 @@
{
"id": "CVE-2024-4243",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-04-26T22:15:08.640",
"lastModified": "2024-04-26T22:15:08.640",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability classified as critical has been found in Tenda W9 1.0.0.7(4456). Affected is the function formwrlSSIDset of the file /goform/wifiSSIDset. The manipulation of the argument ssidIndex leads to stack-based buffer overflow. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. VDB-262134 is the identifier assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
],
"cvssMetricV2": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C",
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "SINGLE",
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"availabilityImpact": "COMPLETE",
"baseScore": 9.0
},
"baseSeverity": "HIGH",
"exploitabilityScore": 8.0,
"impactScore": 10.0,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-121"
}
]
}
],
"references": [
{
"url": "https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/W9/formwrlSSIDset.md",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?ctiid.262134",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?id.262134",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?submit.319825",
"source": "cna@vuldb.com"
}
]
}

View File

@ -0,0 +1,92 @@
{
"id": "CVE-2024-4244",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-04-26T22:15:08.867",
"lastModified": "2024-04-26T22:15:08.867",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability classified as critical was found in Tenda W9 1.0.0.7(4456). Affected by this vulnerability is the function fromDhcpSetSer of the file /goform/DhcpSetSer. The manipulation of the argument dhcpStartIp/dhcpEndIp/dhcpGw/dhcpMask/dhcpLeaseTime/dhcpDns1/dhcpDns2 leads to stack-based buffer overflow. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-262135. NOTE: The vendor was contacted early about this disclosure but did not respond in any way."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
],
"cvssMetricV2": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C",
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "SINGLE",
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"availabilityImpact": "COMPLETE",
"baseScore": 9.0
},
"baseSeverity": "HIGH",
"exploitabilityScore": 8.0,
"impactScore": 10.0,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-121"
}
]
}
],
"references": [
{
"url": "https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/W9/fromDhcpSetSer.md",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?ctiid.262135",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?id.262135",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?submit.319826",
"source": "cna@vuldb.com"
}
]
}

View File

@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update
```plain
2024-04-26T22:00:30.793385+00:00
2024-04-26T23:55:29.175773+00:00
```
### Most recent CVE Modification Timestamp synchronized with NVD
```plain
2024-04-26T21:15:50.727000+00:00
2024-04-26T23:15:05.857000+00:00
```
### Last Data Feed Release
@ -33,35 +33,31 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
### Total Number of included CVEs
```plain
246935
246944
```
### CVEs added in the last Commit
Recently added CVEs: `15`
Recently added CVEs: `9`
- [CVE-2022-48611](CVE-2022/CVE-2022-486xx/CVE-2022-48611.json) (`2024-04-26T20:15:07.150`)
- [CVE-2023-26603](CVE-2023/CVE-2023-266xx/CVE-2023-26603.json) (`2024-04-26T20:15:07.230`)
- [CVE-2024-25343](CVE-2024/CVE-2024-253xx/CVE-2024-25343.json) (`2024-04-26T20:15:07.427`)
- [CVE-2024-28326](CVE-2024/CVE-2024-283xx/CVE-2024-28326.json) (`2024-04-26T20:15:07.480`)
- [CVE-2024-31502](CVE-2024/CVE-2024-315xx/CVE-2024-31502.json) (`2024-04-26T21:15:49.140`)
- [CVE-2024-31601](CVE-2024/CVE-2024-316xx/CVE-2024-31601.json) (`2024-04-26T21:15:49.207`)
- [CVE-2024-32878](CVE-2024/CVE-2024-328xx/CVE-2024-32878.json) (`2024-04-26T21:15:49.260`)
- [CVE-2024-32881](CVE-2024/CVE-2024-328xx/CVE-2024-32881.json) (`2024-04-26T21:15:49.450`)
- [CVE-2024-32883](CVE-2024/CVE-2024-328xx/CVE-2024-32883.json) (`2024-04-26T21:15:49.630`)
- [CVE-2024-32887](CVE-2024/CVE-2024-328xx/CVE-2024-32887.json) (`2024-04-26T21:15:49.820`)
- [CVE-2024-4238](CVE-2024/CVE-2024-42xx/CVE-2024-4238.json) (`2024-04-26T20:15:07.537`)
- [CVE-2024-4239](CVE-2024/CVE-2024-42xx/CVE-2024-4239.json) (`2024-04-26T21:15:50.003`)
- [CVE-2024-4240](CVE-2024/CVE-2024-42xx/CVE-2024-4240.json) (`2024-04-26T21:15:50.280`)
- [CVE-2024-4241](CVE-2024/CVE-2024-42xx/CVE-2024-4241.json) (`2024-04-26T21:15:50.507`)
- [CVE-2024-4242](CVE-2024/CVE-2024-42xx/CVE-2024-4242.json) (`2024-04-26T21:15:50.727`)
- [CVE-2024-28322](CVE-2024/CVE-2024-283xx/CVE-2024-28322.json) (`2024-04-26T22:15:07.793`)
- [CVE-2024-3051](CVE-2024/CVE-2024-30xx/CVE-2024-3051.json) (`2024-04-26T22:15:08.263`)
- [CVE-2024-3052](CVE-2024/CVE-2024-30xx/CVE-2024-3052.json) (`2024-04-26T22:15:08.460`)
- [CVE-2024-30804](CVE-2024/CVE-2024-308xx/CVE-2024-30804.json) (`2024-04-26T22:15:08.017`)
- [CVE-2024-31551](CVE-2024/CVE-2024-315xx/CVE-2024-31551.json) (`2024-04-26T22:15:08.080`)
- [CVE-2024-31741](CVE-2024/CVE-2024-317xx/CVE-2024-31741.json) (`2024-04-26T22:15:08.137`)
- [CVE-2024-31828](CVE-2024/CVE-2024-318xx/CVE-2024-31828.json) (`2024-04-26T22:15:08.200`)
- [CVE-2024-4243](CVE-2024/CVE-2024-42xx/CVE-2024-4243.json) (`2024-04-26T22:15:08.640`)
- [CVE-2024-4244](CVE-2024/CVE-2024-42xx/CVE-2024-4244.json) (`2024-04-26T22:15:08.867`)
### CVEs modified in the last Commit
Recently modified CVEs: `1`
Recently modified CVEs: `3`
- [CVE-2024-1725](CVE-2024/CVE-2024-17xx/CVE-2024-1725.json) (`2024-04-26T20:15:07.310`)
- [CVE-2022-29622](CVE-2022/CVE-2022-296xx/CVE-2022-29622.json) (`2024-04-26T22:15:07.627`)
- [CVE-2024-29960](CVE-2024/CVE-2024-299xx/CVE-2024-29960.json) (`2024-04-26T22:15:07.850`)
- [CVE-2024-29963](CVE-2024/CVE-2024-299xx/CVE-2024-29963.json) (`2024-04-26T23:15:05.857`)
## Download and Usage

View File

@ -197200,7 +197200,7 @@ CVE-2022-29618,0,0,85bffd581df774a112669f14df0da784f907f0d8fc33949d0c933465cb570
CVE-2022-29619,0,0,04616838172ccb6373be77762d8edb1438492c280de84e75a450a31e0392055d,2023-07-21T16:55:28.250000
CVE-2022-2962,0,0,4bda1dc88413f0ce73dd3eed5ecc11ffeb5485f1edef4bdb55c675f17727b4b3,2023-06-28T20:40:49.643000
CVE-2022-29620,0,0,c97f8c07c574a81e91ca2117a1b727d1f59fac5f7febacdd9b9b8e34fd7cf64f,2024-04-11T01:15:18.737000
CVE-2022-29622,0,0,c2f7b0cd4e70b9d71a72a4802edc1d24ef42ecfffd808304b4a27b15b06cbc4d,2023-11-07T03:46:04.303000
CVE-2022-29622,0,1,abf8568df8f5122b8c5e9b44cf50faededd0b55da7c6508a9d09abbb1f845470,2024-04-26T22:15:07.627000
CVE-2022-29623,0,0,f0f61383da3ef16de1f798f3a42e8485b6f0f77293ab82345f867acd3120c559,2022-05-24T20:14:43.230000
CVE-2022-29624,0,0,63022d472eefe17122d555ac15c6ed08f13e85324e3dd023fb705b3fcea0bc9a,2022-06-11T02:26:12.640000
CVE-2022-29627,0,0,abbdad8a7497f46959f3de961ed1f67cc3075f02885458d7de87213e93cbc0f3,2022-06-12T02:12:18.457000
@ -211471,7 +211471,7 @@ CVE-2022-48604,0,0,c234e7576786d55fbfc97efb5dea78adb8f87525c4117c439dc05aac6f4a7
CVE-2022-48605,0,0,edade8e24b7350903e180fa6d2d0f85cc0f0e9e7f86f0cde7204d0325848ec12,2023-09-26T18:53:26.107000
CVE-2022-48606,0,0,91696018ee1b6cf3d6d536659479fbc305fec14b8c9dcb14d4e0cb406a661ee2,2023-09-28T17:40:49.480000
CVE-2022-4861,0,0,ee598ad572b11ac5629816a68e6c59b0263127db350474e730bad7a72a6256a3,2023-01-06T18:58:17.253000
CVE-2022-48611,1,1,64d8801396e0ef967077024684d6e858c35ff131a9b8b688fbfdad94bf9ff555,2024-04-26T20:15:07.150000
CVE-2022-48611,0,0,64d8801396e0ef967077024684d6e858c35ff131a9b8b688fbfdad94bf9ff555,2024-04-26T20:15:07.150000
CVE-2022-48612,0,0,7514b5524ca8dc12858b37e461d556470c1304a5f7ce0502eff60e1cedff76ea,2023-10-19T16:22:05.877000
CVE-2022-48613,0,0,933d1b28adc9d144ccefdf3525b003f1aeb5987ce03546278c3e696c33dcbee5,2023-11-14T20:05:24.217000
CVE-2022-48614,0,0,75c1e3ea7eaa5931eb17de8ec4a37f67747321aa68e7ad765a36e74d4c0b196b,2023-12-13T15:59:51.227000
@ -218971,7 +218971,7 @@ CVE-2023-2660,0,0,4aef7924c399745b3d84f28d5636b72a951cd4369c6e34293edf4643f06dfe
CVE-2023-26600,0,0,082a5a40003457cdcb9bc982343b3a43f4debaf37f4262b90b97fef94c96e25d,2023-03-13T17:47:33.683000
CVE-2023-26601,0,0,7b674f2a8e2bec159e58ffb9e220bc037e134be1a5263b6a67b4cdd33b3e5bbf,2023-03-13T17:44:45.677000
CVE-2023-26602,0,0,6c6999eaefa6818056578b112ce02b6e82b18dba81dc757925a9d9664e372103,2023-03-07T19:07:11.717000
CVE-2023-26603,1,1,4ff083684076234b86170d54f1e958c3be75d681c203f04617d000f8b8d41e8a,2024-04-26T20:15:07.230000
CVE-2023-26603,0,0,4ff083684076234b86170d54f1e958c3be75d681c203f04617d000f8b8d41e8a,2024-04-26T20:15:07.230000
CVE-2023-26604,0,0,2d88cec2d1d9a7d4a604fb7583adb4176010b0268b5fda597e93dfff8baa2e94,2023-11-07T04:09:41.293000
CVE-2023-26605,0,0,f1d913142ac1d44bc49e2d7d4cb638ad0dbe7ae96775e3b7bd85f589841ca0ce,2024-03-25T01:15:53.723000
CVE-2023-26606,0,0,a1bb89d315dd684fae3bae228622f2bc2356ffe1fa611816e008ca9f62fab2a2,2024-03-25T01:15:53.793000
@ -239755,7 +239755,7 @@ CVE-2024-1719,0,0,bd92ffe7c3f4bf124004e532d326d3643bc62f549595f2a7817efea0dc7c18
CVE-2024-1720,0,0,5a5ae92be6fac7e3fb5aac9fbad05927fd3add77d067fc4c0b5a11a75c8da7c7,2024-03-07T13:52:27.110000
CVE-2024-1722,0,0,44f76876458eb58496685e90ceedacd781a70fa58f68fffc91c47d3fb5ef0258,2024-02-29T13:49:29.390000
CVE-2024-1723,0,0,6ede5956ec1f8bc932d476f2c9a22da838daca98409da5821be1a9704022149c,2024-03-13T18:15:58.530000
CVE-2024-1725,0,1,2b831655c37805b5d11b8fccbdef32ca54003b5ea78039a012ddccaea3f2f5c4,2024-04-26T20:15:07.310000
CVE-2024-1725,0,0,2b831655c37805b5d11b8fccbdef32ca54003b5ea78039a012ddccaea3f2f5c4,2024-04-26T20:15:07.310000
CVE-2024-1726,0,0,89dad850dcc0e1a88340678c957b303bc297c72f3495f60c2d2a69bcbd7f390b,2024-04-25T17:24:59.967000
CVE-2024-1727,0,0,a7ba950431c841d63e5eda97447121909cf0b94a0e0f2a68d97b3e6ce11f4afe,2024-04-16T12:15:09.843000
CVE-2024-1728,0,0,cc77f96c808327822a9f33d38543fe59887a1a70be257d5713ef1082e9fb55b5,2024-04-10T19:49:51.183000
@ -242723,7 +242723,7 @@ CVE-2024-25327,0,0,ed53fcf930246e366b75ca3dbc41603185b262291cf82ff3e550f2ed4e97b
CVE-2024-2533,0,0,ae9342ba1479059b47493c7a685c849e75edc6d07d3006801469cf62cb6542e2,2024-04-11T01:25:27.040000
CVE-2024-25331,0,0,60a22b9e40d224a5f3b5e272a457dd70292f6aef15fb2558c273ff847702ea0c,2024-03-12T12:40:13.500000
CVE-2024-2534,0,0,7208594308b68fb6319c69a5ca4d316b95689a2de727bb79e1c50ee053eb0607,2024-04-11T01:25:27.120000
CVE-2024-25343,1,1,9812c2138ed26a486c0f50f26db327586c2b0be33c627c7a652779aa05d0036f,2024-04-26T20:15:07.427000
CVE-2024-25343,0,0,9812c2138ed26a486c0f50f26db327586c2b0be33c627c7a652779aa05d0036f,2024-04-26T20:15:07.427000
CVE-2024-25344,0,0,af08989cf380f6e278fd692845297ea5605f46af513902cda38a18d17b6f3747,2024-02-26T16:32:25.577000
CVE-2024-2535,0,0,332571c5f565827ccf76a6bd5bc40568c1d0db043dbac561c7b64a0729db2bd3,2024-04-11T01:25:27.203000
CVE-2024-25350,0,0,4025b81199a224e7878ebb894cfce4cd4a7613ab77d81e491781294f349534f6,2024-02-29T13:49:47.277000
@ -244383,9 +244383,10 @@ CVE-2024-28303,0,0,32d4865094af329a688db1798283b86ca81a4a5fae30846af22292284fa8c
CVE-2024-28318,0,0,ede034690df957e6783d45bfb66a16f12d36f93dac03aab57e77aeedfffbbc90,2024-03-15T16:26:49.320000
CVE-2024-28319,0,0,26fe071877c361c1420da78d668cd8bd73e607c2889fe07f596425c3f0efcaf7,2024-03-15T16:26:49.320000
CVE-2024-2832,0,0,c24a89a98158bb4e496d6c9324979be50b5d8206e1a887bc4c92d3f4efe6d296,2024-04-11T01:25:38.597000
CVE-2024-28322,1,1,b2fa35d24bebaba4372f6adf9b85a0fd0622718c9290e025720c8d178489baf0,2024-04-26T22:15:07.793000
CVE-2024-28323,0,0,16dacab4d536bc79350286123596ce0c92a8e24f546fb8e6e6ccdaf1dc4caa64,2024-04-24T02:15:45.820000
CVE-2024-28325,0,0,f9d721e932f6d264bc137371c8b0906505973d152c3e0bd4b5e1aa389af73389,2024-04-26T19:59:19.793000
CVE-2024-28326,1,1,dbde51442da791ef702d39de9102c355af1752a8791a1a24700bae6168ab23c8,2024-04-26T20:15:07.480000
CVE-2024-28326,0,0,dbde51442da791ef702d39de9102c355af1752a8791a1a24700bae6168ab23c8,2024-04-26T20:15:07.480000
CVE-2024-28327,0,0,55f0b6af593774ee591595f8fb41fe205ad2244e60ceea6d4eaa32e2cd88c42f,2024-04-26T19:59:19.793000
CVE-2024-28328,0,0,13ef121020655e50ae4d25ba0161adfa41a8368139ae76b0ca53543e95ae92f4,2024-04-26T15:32:22.523000
CVE-2024-2833,0,0,9e113ce28ea85bd7fbbe01a048a1b11092324a333ff2f6e807d8733739209b19,2024-04-18T13:04:28.900000
@ -245140,10 +245141,10 @@ CVE-2024-29957,0,0,fecc998428c3db04062cf2ac371ef979be5cd87fa510b5833cc1b2291494a
CVE-2024-29958,0,0,47096cf1a01ed2839ec8c4ff3cea643fc3bc8acea460882f29c91da3a82994de,2024-04-19T13:10:25.637000
CVE-2024-29959,0,0,b7bdcba7d408b6308c19e4f4122d62cd78eb6bcbedb6c41bea62f72b940b1707,2024-04-19T13:10:25.637000
CVE-2024-2996,0,0,ce0ff76245864ce5ac90a5463bb82f1b7ea8cb5b36b1788a5a81e2b6f1ea29d1,2024-04-11T01:25:44.817000
CVE-2024-29960,0,0,a0f5b1872d2b131e479b0d5e60895169eb3d25ee33e2d13952250fc604e76726,2024-04-19T13:10:25.637000
CVE-2024-29960,0,1,427535e80f596d42f5c33667c31a088d2ff2b7410336d7310e5e6022470b138a,2024-04-26T22:15:07.850000
CVE-2024-29961,0,0,b1f9b8b77f2ab0b212a5b2cb2c84169125bbdbff81d33950af18f3d03c77fe3b,2024-04-19T13:10:25.637000
CVE-2024-29962,0,0,19e3e65705ea94612dcd76b867bc64a7d5edd1af95864c7d99ac748d3bb6ed65,2024-04-19T13:10:25.637000
CVE-2024-29963,0,0,7aa71b4b33bfcf322b5aea5fec0a61877ae1a46fa2ccb5df6e503f54cd3cd678,2024-04-19T13:10:25.637000
CVE-2024-29963,0,1,fb8bdd7313ae3b285e1ea777366d795d5a2990f9a1e1a54483c389e01b7e0e39,2024-04-26T23:15:05.857000
CVE-2024-29964,0,0,9d91658d97bae4a495bbfdbc631e5d0dad8c2dd3e2c7866023074e11cdd416c6,2024-04-26T00:15:08.383000
CVE-2024-29965,0,0,9a020821eeb9ea2c223277d7cbe31a1c1727e982e39d507d8c6e0c887ea1ef0b,2024-04-19T13:10:25.637000
CVE-2024-29966,0,0,aaea55df242a87f8ebd34fa291eefe5c7c433327c42e58eb4454f6a33bc99372,2024-04-19T13:10:25.637000
@ -245432,12 +245433,14 @@ CVE-2024-30505,0,0,e3a1623c70480645d7435d235c55cbfe6315e866cb0d6b0f4746946349a6a
CVE-2024-30506,0,0,c05e76d2257717876a74bdef23833433be5442543f2708d7016e5393bc439246,2024-04-01T01:12:59.077000
CVE-2024-30507,0,0,0be298b6c722996f3c9bca1b274ff1f6b87feb3b0e0c481ae73ee51466f24be1,2024-04-01T01:12:59.077000
CVE-2024-30508,0,0,3060ef2ae86660ef47372d56d58005971c1e5f17b0f99fb0115ce3dcce5bb03b,2024-04-01T01:12:59.077000
CVE-2024-3051,1,1,18f79e6092a8993313405cbce712a515cb9b3a885db6985ac55da1283e4b2e27,2024-04-26T22:15:08.263000
CVE-2024-30510,0,0,5a644950940e50ac60667456ae9d7008d354df976d23b70ea88670750248c7fb,2024-04-01T01:12:59.077000
CVE-2024-30511,0,0,d0cc98a9fcd4b29c047f03054ac8aade5a24634c83857c79161193efdb1adfcd,2024-04-01T01:12:59.077000
CVE-2024-30513,0,0,b4f3b427b5b9eb55223e544136e76b030c119a2fc3a4b518e0d0f0c48a100c09,2024-04-01T01:12:59.077000
CVE-2024-30514,0,0,5b77fe0998b7e11bf79e1b721812a139c6849d1513a8aeeecc1782432ea3302a,2024-04-01T01:12:59.077000
CVE-2024-30518,0,0,e8d4dc9d0a7f93d48badb1cbdec9f19934ca7a332fece613ee9749bc07919401,2024-04-01T01:12:59.077000
CVE-2024-30519,0,0,3b4b984b21c18b55e830dd1af8315299dc669c0add51934a0cf87347bc021e68,2024-03-29T13:28:22.880000
CVE-2024-3052,1,1,cc0727fb8e43a240bff2ca349b40e96a67bc90a49f1b6b07a4d8b3caeab11e10,2024-04-26T22:15:08.460000
CVE-2024-30520,0,0,40fe415caf2a4bab823960caa71aef7f92917db961b860a15eda04176938dd5f,2024-03-29T13:28:22.880000
CVE-2024-30521,0,0,831f25d28a4eccbee0c9a477ea2d8542d4b6a09da45b2ed1bac270363725b502,2024-04-01T01:12:59.077000
CVE-2024-30523,0,0,0cef256089f66b1e0cf2f5994c8e2a08b4afb817483e2b78f98835367339d575,2024-04-01T01:12:59.077000
@ -245594,6 +245597,7 @@ CVE-2024-3077,0,0,df42d4a62ceb1c6a6275b9b1d36ac8da42c0ae3505d0e07beac8238605b550
CVE-2024-3078,0,0,de9e294582cbb558bf2417239a323549d99f034f1b581828b43e34b1ad1f5683,2024-04-11T01:25:52.940000
CVE-2024-30799,0,0,eae5bca102ad0c1fe3f236f7e51af89eca892740403953a6086f43b81ad7d92b,2024-04-22T13:28:43.747000
CVE-2024-30800,0,0,f3aa3f6f154cac6ad1c0d84e6831cbd6fca8728e681fceff9d529e8d2a6eec09,2024-04-24T13:39:42.883000
CVE-2024-30804,1,1,90c792c9b225d6c30056555d25108c5adffbf56b4f6d6509a8ca0f4221a00d20,2024-04-26T22:15:08.017000
CVE-2024-30806,0,0,3c4bbd71defb52c4de24f9ad1626459edef6b60997b976e6d74aead4ee0b3b0f,2024-04-02T20:31:58.463000
CVE-2024-30807,0,0,8463e04fd42dedab289dad3fe1621f8f66d69fb63942da8a4e7f4baade23226e,2024-04-02T20:31:58.463000
CVE-2024-30808,0,0,3edb296009dfb16a5061a2505986b3903e36250320b7a7a1ea6af0d775f588e5,2024-04-02T20:31:58.463000
@ -245926,7 +245930,7 @@ CVE-2024-31487,0,0,ffef7fcdc05bb476a1f2c02c71de4a76075ea7f0301d6a8889db629ce9b19
CVE-2024-31492,0,0,a251126d380ad734bdcae40155276c0c8cd0f78c057d6c232814179759c90bf9,2024-04-10T19:49:51.183000
CVE-2024-31497,0,0,d90ff9b470753606034a89c278aa6cbdbffa031df39311cca8f7c7aaa4f69cec,2024-04-26T02:15:06.197000
CVE-2024-31498,0,0,db3c4e2337e3fccc66e084ef6016d8532925f451bef4124b0c2782f0c54d90b6,2024-04-08T00:15:08
CVE-2024-31502,1,1,03896f05d8861b1f9b4ed5010e9d288b37f7173ac1019a68f73740cd343624ad,2024-04-26T21:15:49.140000
CVE-2024-31502,0,0,03896f05d8861b1f9b4ed5010e9d288b37f7173ac1019a68f73740cd343624ad,2024-04-26T21:15:49.140000
CVE-2024-31503,0,0,a2a7c8d9eaf4775895950c76302a02326a8d6e67bb7d5ec85d9e8a8516e17053,2024-04-17T12:48:07.510000
CVE-2024-31506,0,0,8be7ef5b3e9d65e4bba9dd63e2b7475f0658a4b183369094a98038d4eee40099,2024-04-10T13:24:00.070000
CVE-2024-31507,0,0,8a4d05957463fb55563022c4622a2463374ff774a0631f4c63214875a7c78bee,2024-04-10T13:24:00.070000
@ -245936,6 +245940,7 @@ CVE-2024-31544,0,0,bc835e0f71240df22cec22617fbfab2cab4d97b1f555eabe4ef7c23231d63
CVE-2024-31545,0,0,8e5326bf13231003bc10db7b31c44d418956837c538cbd6727e4f72cee368bee,2024-04-22T19:24:06.727000
CVE-2024-31546,0,0,a44eabd912524c4138628ddf21812907bc4989788589b1a0788ce24b3eac282c,2024-04-19T18:29:53.040000
CVE-2024-31547,0,0,79c088d9519e1ba5d4decbbdb950409a1ff93781e519e023ecbe916ef398d06d,2024-04-19T18:29:53.040000
CVE-2024-31551,1,1,62380112ba3c281751c47ed97529268310ffd535492a462ce526bc4c79f4cf71,2024-04-26T22:15:08.080000
CVE-2024-31552,0,0,5a9db2be00e7b7077a4a60e9105689c87f7a53feda5b2567edda13b704df8f81,2024-04-19T18:29:53.040000
CVE-2024-3156,0,0,f01ef771ed03a9288d0ee4324d1f6cf3e47c9af6d908a880824436519abea0a6,2024-04-26T16:00:34.653000
CVE-2024-3157,0,0,efbf5e20eaa98706deef52c26be2e1cba3d67ed28d54a5b0520df90b69e7c692,2024-04-19T23:15:11.593000
@ -245952,7 +245957,7 @@ CVE-2024-31585,0,0,ca870b59b85ac9b6cfa4a8fee4976da074575d82dd3c02566198bbf835617
CVE-2024-31587,0,0,6aaa189139b27b06a683c1dac5c91d5124a2971d077e3d9157f284239b68e61a,2024-04-19T16:19:49.043000
CVE-2024-3159,0,0,90c5caca0cc5537160e74a2b26ddbcf22bba005cb0a42d8727caf893986c2f2f,2024-04-26T15:59:59.020000
CVE-2024-3160,0,0,f58561faca7869291dbd40f98b5207b12f048bddf4323b50e2fa0b0605fe77f4,2024-04-11T01:25:55.513000
CVE-2024-31601,1,1,35104970989e767beee4d94e5225aad3a3eb393b1cbd7127247688979055f857,2024-04-26T21:15:49.207000
CVE-2024-31601,0,0,35104970989e767beee4d94e5225aad3a3eb393b1cbd7127247688979055f857,2024-04-26T21:15:49.207000
CVE-2024-31609,0,0,220c67e8d489cb3fe9b4bc543f7647ddfeb5c25b9b19ca8439b4928d10c6d5aa,2024-04-26T12:58:17.720000
CVE-2024-31610,0,0,bad125137564ff82d81c08c69745e1e9123b14f73eadb435f64d4af6d83d6827,2024-04-26T12:58:17.720000
CVE-2024-31615,0,0,d0e9cb7307b12540caa27ec15d72bbb39fd07c4f4f188a6a635af2cdd881915c,2024-04-26T12:58:17.720000
@ -245970,6 +245975,7 @@ CVE-2024-31666,0,0,31d90f856345851f66dd503f92b4c8e0d00f556ce99028b034c4027dd7c27
CVE-2024-3167,0,0,d4d0cf5c76ec6cdbb273213113ea664bf90661030b60b58ff4c0d4ae3475608a,2024-04-26T15:55:58.810000
CVE-2024-31678,0,0,6d17d4ce9eaa15ebb6367a838566d027b53ddba56e09f333fd8cadacfd1d2447,2024-04-12T12:44:04.930000
CVE-2024-31680,0,0,9cd3893ac983fae5e4213584fc439ab2d2b21e3e6bebab8790c0104ed80c76e1,2024-04-17T12:48:07.510000
CVE-2024-31741,1,1,f8fe63a3c107b59eff6f6e9a2ea1b30f144350f1ffa560fa60941355e012f14b,2024-04-26T22:15:08.137000
CVE-2024-31744,0,0,7de9e0ac4d1881e8e6a1c9cabea807c4b59ffea44a7ce9a28f0f69a4b5f1eba8,2024-04-19T16:19:49.043000
CVE-2024-31745,0,0,a3bdd0cf6c191f4f752a70ac6769fb5b2d5c89636eeffe60e00827ad5ab48d32,2024-04-25T16:15:11.227000
CVE-2024-31750,0,0,ef2fe441e5dcedf0cb2da823df8fe57e9b7ada67d4a5ac9a3c649524c0ed2fa2,2024-04-19T13:10:25.637000
@ -245998,6 +246004,7 @@ CVE-2024-31816,0,0,8b0edd8a38c33b33b513f099b5e67906c887d32cd0308b5fdfadcac29bc21
CVE-2024-31817,0,0,440a95dbf8589f9a9953a43f37d15f507abb02f786409b55238dedab4fef773a,2024-04-08T18:48:40.217000
CVE-2024-31818,0,0,72cb9554b67c0af94ffbc580efc3a62e49e452a23305845c2a6157eaa69b0f7f,2024-04-15T13:15:51.577000
CVE-2024-31819,0,0,1f8122b9110b9c9e379686153d36743829cf8787fef8a8a1bf73fc202035f197,2024-04-11T12:47:44.137000
CVE-2024-31828,1,1,4c24edf0458d635a5666829872ee7629c7e269190f0b7a1c03fdda2a6fc6e27e,2024-04-26T22:15:08.200000
CVE-2024-31839,0,0,25a7daa33bac03a27a09e1621adb92d9361c02bf4ef6c11d27831735c896c138,2024-04-15T13:15:51.577000
CVE-2024-31841,0,0,de5efd40e0d92babbab87030506b1a212fb4afe9f3f9b49fa0c7d8acedda7118,2024-04-19T16:19:49.043000
CVE-2024-31846,0,0,4aa9b2c36e227ec317e3797135e2468ef28cbbea439839bcc511c8ec99315bbc,2024-04-19T16:19:49.043000
@ -246505,13 +246512,13 @@ CVE-2024-32869,0,0,0e473f01ce255dcdc5f11b871766f1c1758b18f6cf26ba19adbc6c7e41a0e
CVE-2024-32872,0,0,59ac24f6acf63d3b4ddeb437211a7661d520fb02f021fd6a951644796eb80a41,2024-04-24T17:16:50.397000
CVE-2024-32875,0,0,1d3ae071c5976cb38c56d9063a1b2dc7d3c3dd7317932ef76fe9cbd393a3f40f,2024-04-24T13:39:42.883000
CVE-2024-32876,0,0,56fabbd4be6ea210f5198e54b57dc9c995f989bdeb0f4e519fbeff871267be54,2024-04-24T19:58:40.710000
CVE-2024-32878,1,1,4539a658b08348df7616e6f2cfd15e234a42ec98787f43793319e964705cddce,2024-04-26T21:15:49.260000
CVE-2024-32878,0,0,4539a658b08348df7616e6f2cfd15e234a42ec98787f43793319e964705cddce,2024-04-26T21:15:49.260000
CVE-2024-32879,0,0,0b0046e51a12ad5b1f4492d6cff2d6482480cc94626283d2a6f79bd97479ab0a,2024-04-25T13:18:20.370000
CVE-2024-32880,0,0,5c7d6aa44fda3ee69a48104785812fedaa6d3ea7fbc26c71102dbf3b2182bded,2024-04-26T19:59:19.793000
CVE-2024-32881,1,1,c1aa04cdf4c21001afb18cd817d4683610efbfbe5815d7594939b83ba1944d9a,2024-04-26T21:15:49.450000
CVE-2024-32883,1,1,0e7b1a8483eff1f62788fd77dec858a469ab9c80a1e3c4b58f0f601259a7e9f0,2024-04-26T21:15:49.630000
CVE-2024-32881,0,0,c1aa04cdf4c21001afb18cd817d4683610efbfbe5815d7594939b83ba1944d9a,2024-04-26T21:15:49.450000
CVE-2024-32883,0,0,0e7b1a8483eff1f62788fd77dec858a469ab9c80a1e3c4b58f0f601259a7e9f0,2024-04-26T21:15:49.630000
CVE-2024-32884,0,0,feb09aaeaf00882860d9891266c7a76bef3350941384b117a7f5be081c117262,2024-04-26T19:59:19.793000
CVE-2024-32887,1,1,50d5ce55880759d1c934f694c22c7f3e332d7c773a13815daa202a325029dce8,2024-04-26T21:15:49.820000
CVE-2024-32887,0,0,50d5ce55880759d1c934f694c22c7f3e332d7c773a13815daa202a325029dce8,2024-04-26T21:15:49.820000
CVE-2024-3293,0,0,3552485a27a6b6c8b2cadd17fbdb3e630238722099a3e2d8d97b0f239cd2dc1a,2024-04-23T12:52:26.253000
CVE-2024-32947,0,0,66b8169f5ed00566ee332733dff77f7ef577706d5c33e7a379a261befe2945f1,2024-04-24T17:16:50.397000
CVE-2024-32948,0,0,b7a98470b717d7f23ae7cba102d8685641e5b820f696ab6effba04fa32abb77f,2024-04-24T13:39:42.883000
@ -246929,8 +246936,10 @@ CVE-2024-4234,0,0,0a64019690b8e660b74462a78d6464b10b7f38338c77c87e06c656a7f08215
CVE-2024-4235,0,0,99093520f9467f6bc9df1e67ba828ed8d5a52b47abe017780b1bbfac822d38bb,2024-04-26T19:59:19.793000
CVE-2024-4236,0,0,0ea63c80ef5a1e0a1b7de7daa05065980f1ac12c4af4da3f2aa1c276e47c5740,2024-04-26T19:59:19.793000
CVE-2024-4237,0,0,9f54c377f05529360f2b7be6375c6730ba5e0cecefd13112edd7d9b9b3c96447,2024-04-26T19:59:19.793000
CVE-2024-4238,1,1,db559af0179e5e361800f0a06c980d8109c8c965c0ec2fc6e58e7161ba58a8c3,2024-04-26T20:15:07.537000
CVE-2024-4239,1,1,044e14e8102f28e3f3c48e3c7cdc0f05bc09da93422e58d89ce0ceb1c22daeff,2024-04-26T21:15:50.003000
CVE-2024-4240,1,1,b6bd63709c0ba1f923b1df4e0d6c5efd649c0519ed6b8b0ea4aaf88658572963,2024-04-26T21:15:50.280000
CVE-2024-4241,1,1,264f84de7f82f667ea602f912ab0c91f08c69cd3bac4488fa7a0558ca22ce9ae,2024-04-26T21:15:50.507000
CVE-2024-4242,1,1,7c2c0351cc2274639c0aac327cc3b8d379b23f811f63689c6939401bba640a19,2024-04-26T21:15:50.727000
CVE-2024-4238,0,0,db559af0179e5e361800f0a06c980d8109c8c965c0ec2fc6e58e7161ba58a8c3,2024-04-26T20:15:07.537000
CVE-2024-4239,0,0,044e14e8102f28e3f3c48e3c7cdc0f05bc09da93422e58d89ce0ceb1c22daeff,2024-04-26T21:15:50.003000
CVE-2024-4240,0,0,b6bd63709c0ba1f923b1df4e0d6c5efd649c0519ed6b8b0ea4aaf88658572963,2024-04-26T21:15:50.280000
CVE-2024-4241,0,0,264f84de7f82f667ea602f912ab0c91f08c69cd3bac4488fa7a0558ca22ce9ae,2024-04-26T21:15:50.507000
CVE-2024-4242,0,0,7c2c0351cc2274639c0aac327cc3b8d379b23f811f63689c6939401bba640a19,2024-04-26T21:15:50.727000
CVE-2024-4243,1,1,06f57d13c6577e082919baf02007629a412b6f97f628566ad77e1dce9d52b4b9,2024-04-26T22:15:08.640000
CVE-2024-4244,1,1,f8fdbf36befd6856b8ec4b41749ee8c0ad841b9c473492c05800c93e3ac814d8,2024-04-26T22:15:08.867000

Can't render this file because it is too large.