mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-08 19:47:09 +00:00
Auto-Update: 2024-04-17T02:00:30.816528+00:00
This commit is contained in:
parent
246f950079
commit
133298ab9b
59
CVE-2024/CVE-2024-223xx/CVE-2024-22354.json
Normal file
59
CVE-2024/CVE-2024-223xx/CVE-2024-22354.json
Normal file
@ -0,0 +1,59 @@
|
||||
{
|
||||
"id": "CVE-2024-22354",
|
||||
"sourceIdentifier": "psirt@us.ibm.com",
|
||||
"published": "2024-04-17T01:15:06.747",
|
||||
"lastModified": "2024-04-17T01:15:06.747",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "\nIBM WebSphere Application Server 8.5, 9.0 and IBM WebSphere Application Server Liberty 17.0.0.3 through 24.0.0.3 are vulnerable to an XML External Entity Injection (XXE) attack when processing XML data. A remote attacker could exploit this vulnerability to expose sensitive information, consume memory resources, or to conduct a server-side request forgery attack. IBM X-Force ID: 280401.\n\n"
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "psirt@us.ibm.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:L/A:L",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "HIGH",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW",
|
||||
"baseScore": 7.0,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.2,
|
||||
"impactScore": 4.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "psirt@us.ibm.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-611"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/280401",
|
||||
"source": "psirt@us.ibm.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.ibm.com/support/pages/node/7148426",
|
||||
"source": "psirt@us.ibm.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,12 +2,12 @@
|
||||
"id": "CVE-2024-29439",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-04-10T23:15:06.753",
|
||||
"lastModified": "2024-04-11T12:47:44.137",
|
||||
"lastModified": "2024-04-17T01:15:06.960",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An unauthorized node injection vulnerability has been identified in ROS2 Humble Hawksbill in ROS_VERSION 2 and ROS_PYTHON_VERSION 3, allows remote attackers to escalate privileges and inject malicious ROS2 nodes into the system."
|
||||
"value": "An unauthorized node injection vulnerability has been identified in ROS2 Humble Hawksbill in ROS_VERSION 2 and ROS_PYTHON_VERSION 3, allows remote attackers to escalate privileges and inject malicious ROS2 nodes into the system. NOTE: this is disputed by multiple third parties who believe there was not reasonable evidence to determine the existence of a vulnerability."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
|
@ -2,12 +2,12 @@
|
||||
"id": "CVE-2024-29440",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-03-25T21:15:47.217",
|
||||
"lastModified": "2024-03-26T12:55:05.010",
|
||||
"lastModified": "2024-04-17T01:15:07.027",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An unauthorized access vulnerability has been discovered in ROS2 Humble Hawksbill versions where ROS_VERSION is 2 and ROS_PYTHON_VERSION is 3. This vulnerability could potentially allow a malicious user to gain unauthorized access to multiple ROS2 nodes remotely. Unauthorized access to these nodes could result in compromised system integrity, the execution of arbitrary commands, and disclosure of sensitive information."
|
||||
"value": "An unauthorized access vulnerability has been discovered in ROS2 Humble Hawksbill versions where ROS_VERSION is 2 and ROS_PYTHON_VERSION is 3. This vulnerability could potentially allow a malicious user to gain unauthorized access to multiple ROS2 nodes remotely. Unauthorized access to these nodes could result in compromised system integrity, the execution of arbitrary commands, and disclosure of sensitive information. NOTE: this is disputed by multiple third parties who believe there was not reasonable evidence to determine the existence of a vulnerability."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
|
@ -2,12 +2,12 @@
|
||||
"id": "CVE-2024-29441",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-04-11T00:15:07.223",
|
||||
"lastModified": "2024-04-11T12:47:44.137",
|
||||
"lastModified": "2024-04-17T01:15:07.100",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An issue was discovered in ROS2 (Robot Operating System 2) Humble Hawksbill in ROS_VERSION 2 and ROS_PYTHON_VERSION 3, allows remote attackers to cause a denial of service (DoS) via the ROS2 nodes."
|
||||
"value": "An issue was discovered in ROS2 (Robot Operating System 2) Humble Hawksbill in ROS_VERSION 2 and ROS_PYTHON_VERSION 3, allows remote attackers to cause a denial of service (DoS) via the ROS2 nodes. NOTE: this is disputed by multiple third parties who believe there was not reasonable evidence to determine the existence of a vulnerability."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
|
@ -2,12 +2,12 @@
|
||||
"id": "CVE-2024-29442",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-03-25T22:37:19.797",
|
||||
"lastModified": "2024-03-26T12:55:05.010",
|
||||
"lastModified": "2024-04-17T01:15:07.160",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An unauthorized access vulnerability has been discovered in ROS2 Humble Hawksbill versions where ROS_VERSION is 2 and ROS_PYTHON_VERSION is 3. This vulnerability could potentially allow a malicious user to gain unauthorized access to multiple ROS2 nodes remotely. Unauthorized access to these nodes could result in compromised system integrity, the execution of arbitrary commands, and disclosure of sensitive information."
|
||||
"value": "An unauthorized access vulnerability has been discovered in ROS2 Humble Hawksbill versions where ROS_VERSION is 2 and ROS_PYTHON_VERSION is 3. This vulnerability could potentially allow a malicious user to gain unauthorized access to multiple ROS2 nodes remotely. Unauthorized access to these nodes could result in compromised system integrity, the execution of arbitrary commands, and disclosure of sensitive information. NOTE: this is disputed by multiple third parties who believe there was not reasonable evidence to determine the existence of a vulnerability."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
|
@ -2,12 +2,12 @@
|
||||
"id": "CVE-2024-29443",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-04-10T23:15:06.810",
|
||||
"lastModified": "2024-04-11T12:47:44.137",
|
||||
"lastModified": "2024-04-17T01:15:07.220",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A shell injection vulnerability was discovered in ROS2 (Robot Operating System 2) Humble Hawksbill in ROS_VERSION 2 and ROS_PYTHON_VERSION 3, allows remote attackers to execute arbitrary code, escalate privileges, and obtain sensitive information due to the way ROS2 handles shell command execution in components like command interpreters or interfaces that process external inputs."
|
||||
"value": "A shell injection vulnerability was discovered in ROS2 (Robot Operating System 2) Humble Hawksbill in ROS_VERSION 2 and ROS_PYTHON_VERSION 3, allows remote attackers to execute arbitrary code, escalate privileges, and obtain sensitive information due to the way ROS2 handles shell command execution in components like command interpreters or interfaces that process external inputs. NOTE: this is disputed by multiple third parties who believe there was not reasonable evidence to determine the existence of a vulnerability."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
|
@ -2,12 +2,12 @@
|
||||
"id": "CVE-2024-29444",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-04-11T00:15:07.283",
|
||||
"lastModified": "2024-04-11T12:47:44.137",
|
||||
"lastModified": "2024-04-17T01:15:07.273",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An OS command injection vulnerability has been discovered in ROS2 (Robot Operating System 2) Humble Hawksbill in ROS_VERSION 2 and ROS_PYTHON_VERSION 3, allows remote attackers to execute arbitrary code, escalate privileges, and obtain sensitive information via External Command Execution Modules, System Call Handlers, and Interface Scripts."
|
||||
"value": "An OS command injection vulnerability has been discovered in ROS2 (Robot Operating System 2) Humble Hawksbill in ROS_VERSION 2 and ROS_PYTHON_VERSION 3, allows remote attackers to execute arbitrary code, escalate privileges, and obtain sensitive information via External Command Execution Modules, System Call Handlers, and Interface Scripts. NOTE: this is disputed by multiple third parties who believe there was not reasonable evidence to determine the existence of a vulnerability."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
|
@ -2,12 +2,12 @@
|
||||
"id": "CVE-2024-29445",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-04-10T23:15:06.857",
|
||||
"lastModified": "2024-04-11T12:47:44.137",
|
||||
"lastModified": "2024-04-17T01:15:07.333",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An issue was discovered in ROS2 (Robot Operating System 2) Humble Hawksbill in ROS_VERSION 2 and ROS_PYTHON_VERSION 3 where the system transmits messages in plaintext, allowing attackers to access sensitive information via a man-in-the-middle attack."
|
||||
"value": "An issue was discovered in ROS2 (Robot Operating System 2) Humble Hawksbill in ROS_VERSION 2 and ROS_PYTHON_VERSION 3 where the system transmits messages in plaintext, allowing attackers to access sensitive information via a man-in-the-middle attack. NOTE: this is disputed by multiple third parties who believe there was not reasonable evidence to determine the existence of a vulnerability."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
|
@ -2,12 +2,12 @@
|
||||
"id": "CVE-2024-29447",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-04-11T00:15:07.337",
|
||||
"lastModified": "2024-04-11T12:47:44.137",
|
||||
"lastModified": "2024-04-17T01:15:07.387",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An issue was discovered in the default configurations of ROS2 Humble Hawksbill in ROS2 Humble Hawksbill in ROS_VERSION 2 and ROS_PYTHON_VERSION 3, allows unauthenticated attackers to gain access using default credentials."
|
||||
"value": "An issue was discovered in the default configurations of ROS2 Humble Hawksbill in ROS2 Humble Hawksbill in ROS_VERSION 2 and ROS_PYTHON_VERSION 3, allows unauthenticated attackers to gain access using default credentials. NOTE: this is disputed by multiple third parties who believe there was not reasonable evidence to determine the existence of a vulnerability."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
|
@ -2,12 +2,12 @@
|
||||
"id": "CVE-2024-29448",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-04-11T04:15:08.510",
|
||||
"lastModified": "2024-04-11T12:47:44.137",
|
||||
"lastModified": "2024-04-17T01:15:07.443",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A buffer overflow vulnerability has been discovered in the C++ components of ROS2 Humble Hawksbill in ROS_VERSION 2 and ROS_PYTHON_VERSION 3, allows attackers to execute arbitrary code or cause a denial of service (DoS) via improper handling of arrays or strings."
|
||||
"value": "A buffer overflow vulnerability has been discovered in the C++ components of ROS2 Humble Hawksbill in ROS_VERSION 2 and ROS_PYTHON_VERSION 3, allows attackers to execute arbitrary code or cause a denial of service (DoS) via improper handling of arrays or strings. NOTE: this is disputed by multiple third parties who believe there was not reasonable evidence to determine the existence of a vulnerability."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
|
@ -2,12 +2,12 @@
|
||||
"id": "CVE-2024-29449",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-04-11T04:15:08.630",
|
||||
"lastModified": "2024-04-11T12:47:44.137",
|
||||
"lastModified": "2024-04-17T01:15:07.510",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An issue was discovered in ROS2 Humble Hawksbill in ROS_VERSION 2 and ROS_PYTHON_VERSION 3, allows attackers to obtain sensitive information via man-in-the-middle attacks due to cleartext transmission of data across the ROS2 nodes' communication channels."
|
||||
"value": "An issue was discovered in ROS2 Humble Hawksbill in ROS_VERSION 2 and ROS_PYTHON_VERSION 3, allows attackers to obtain sensitive information via man-in-the-middle attacks due to cleartext transmission of data across the ROS2 nodes' communication channels. NOTE: this is disputed by multiple third parties who believe there was not reasonable evidence to determine the existence of a vulnerability."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
|
@ -2,12 +2,12 @@
|
||||
"id": "CVE-2024-29450",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-04-11T04:15:08.687",
|
||||
"lastModified": "2024-04-11T12:47:44.137",
|
||||
"lastModified": "2024-04-17T01:15:07.560",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An issue has been discovered in the permission and access control components within ROS2 Humble Hawksbill, in ROS_VERSION 2 and ROS_PYTHON_VERSION 3, allows attackers to execute arbitrary code, cause a denial of service (DoS), escalate privileges, and obtain sensitive information via the authentication system, including protocols, processes, and checks designed to verify the identities of users or devices attempting to access the ROS2 system."
|
||||
"value": "An issue has been discovered in the permission and access control components within ROS2 Humble Hawksbill, in ROS_VERSION 2 and ROS_PYTHON_VERSION 3, allows attackers to execute arbitrary code, cause a denial of service (DoS), escalate privileges, and obtain sensitive information via the authentication system, including protocols, processes, and checks designed to verify the identities of users or devices attempting to access the ROS2 system. NOTE: this is disputed by multiple third parties who believe there was not reasonable evidence to determine the existence of a vulnerability."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
|
@ -2,12 +2,12 @@
|
||||
"id": "CVE-2024-29452",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-04-11T02:15:46.917",
|
||||
"lastModified": "2024-04-11T12:47:44.137",
|
||||
"lastModified": "2024-04-17T01:15:07.617",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An insecure deserialization vulnerability has been identified in ROS2 Humble Hawksbill in ROS_VERSION 2 and ROS_PYTHON_VERSION 3, allows attackers to execute arbitrary code and obtain sensitive information via crafted input to the Data Serialization and Deserialization Components, Inter-Process Communication Mechanisms, and Network Communication Interfaces."
|
||||
"value": "An insecure deserialization vulnerability has been identified in ROS2 Humble Hawksbill in ROS_VERSION 2 and ROS_PYTHON_VERSION 3, allows attackers to execute arbitrary code and obtain sensitive information via crafted input to the Data Serialization and Deserialization Components, Inter-Process Communication Mechanisms, and Network Communication Interfaces. NOTE: this is disputed by multiple third parties who believe there was not reasonable evidence to determine the existence of a vulnerability."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
|
@ -2,12 +2,12 @@
|
||||
"id": "CVE-2024-29454",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-04-11T20:15:35.767",
|
||||
"lastModified": "2024-04-12T12:43:57.400",
|
||||
"lastModified": "2024-04-17T01:15:07.677",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An issue discovered in packages or nodes in ROS2 Humble Hawksbill with ROS_VERSION=2 and ROS_PYTHON_VERSION=3 allows attackers to execute arbitrary commands potentially leading to unauthorized system control, data breaches, system and network compromise, and operational disruption."
|
||||
"value": "An issue discovered in packages or nodes in ROS2 Humble Hawksbill with ROS_VERSION=2 and ROS_PYTHON_VERSION=3 allows attackers to execute arbitrary commands potentially leading to unauthorized system control, data breaches, system and network compromise, and operational disruption. NOTE: this is disputed by multiple third parties who believe there was not reasonable evidence to determine the existence of a vulnerability."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
|
@ -2,12 +2,12 @@
|
||||
"id": "CVE-2024-29455",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-04-11T05:15:47.477",
|
||||
"lastModified": "2024-04-11T12:47:44.137",
|
||||
"lastModified": "2024-04-17T01:15:07.730",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An arbitrary file upload vulnerability has been discovered in ROS2 Humble Hawksbill in ROS_VERSION 2 and ROS_PYTHON_VERSION 3, allows attackers to execute arbitrary code, cause a denial of service (DoS), and obtain sensitive information via crafted payload to the file upload mechanism of the ROS2 system, including the server\u2019s functionality for handling file uploads and the associated validation processes."
|
||||
"value": "An arbitrary file upload vulnerability has been discovered in ROS2 Humble Hawksbill in ROS_VERSION 2 and ROS_PYTHON_VERSION 3, allows attackers to execute arbitrary code, cause a denial of service (DoS), and obtain sensitive information via crafted payload to the file upload mechanism of the ROS2 system, including the server\u2019s functionality for handling file uploads and the associated validation processes. NOTE: this is disputed by multiple third parties who believe there was not reasonable evidence to determine the existence of a vulnerability."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
|
@ -2,12 +2,12 @@
|
||||
"id": "CVE-2024-30659",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-04-08T07:15:09.143",
|
||||
"lastModified": "2024-04-08T18:48:40.217",
|
||||
"lastModified": "2024-04-17T01:15:07.787",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Shell Injection vulnerability in ROS (Robot Operating System) Melodic Morenia versions ROS_VERSION 1 and ROS_PYTHON_VERSION 3, allows attackers to execute arbitrary code, escalate privileges, and obtain sensitive information."
|
||||
"value": "Shell Injection vulnerability in ROS (Robot Operating System) Melodic Morenia versions ROS_VERSION 1 and ROS_PYTHON_VERSION 3, allows attackers to execute arbitrary code, escalate privileges, and obtain sensitive information. NOTE: this is disputed by multiple third parties who believe there was not reasonable evidence to determine the existence of a vulnerability."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
|
@ -2,12 +2,12 @@
|
||||
"id": "CVE-2024-30661",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-04-08T07:15:09.370",
|
||||
"lastModified": "2024-04-08T18:48:40.217",
|
||||
"lastModified": "2024-04-17T01:15:07.847",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An unauthorized access vulnerability has been discovered in ROS Melodic Morenia versions where ROS_VERSION is 1 and ROS_PYTHON_VERSION is 3. This vulnerability could potentially allow a malicious user to gain unauthorized information access to multiple ROS nodes remotely. Unauthorized information access to these nodes could result in compromised system integrity, the execution of arbitrary commands, and disclosure of sensitive information."
|
||||
"value": "An unauthorized access vulnerability has been discovered in ROS Melodic Morenia versions where ROS_VERSION is 1 and ROS_PYTHON_VERSION is 3. This vulnerability could potentially allow a malicious user to gain unauthorized information access to multiple ROS nodes remotely. Unauthorized information access to these nodes could result in compromised system integrity, the execution of arbitrary commands, and disclosure of sensitive information. NOTE: this is disputed by multiple third parties who believe there was not reasonable evidence to determine the existence of a vulnerability."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
|
@ -2,12 +2,12 @@
|
||||
"id": "CVE-2024-30662",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-04-08T07:15:09.493",
|
||||
"lastModified": "2024-04-08T18:48:40.217",
|
||||
"lastModified": "2024-04-17T01:15:07.907",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An issue was discovered in ROS (Robot Operating System) Melodic Morenia in ROS_VERSION 1 and ROS_PYTHON_VERSION 3, where the system transmits messages in plaintext. This flaw exposes sensitive information, making it vulnerable to man-in-the-middle (MitM) attacks, and allowing attackers to easily intercept and access this data."
|
||||
"value": "An issue was discovered in ROS (Robot Operating System) Melodic Morenia in ROS_VERSION 1 and ROS_PYTHON_VERSION 3, where the system transmits messages in plaintext. This flaw exposes sensitive information, making it vulnerable to man-in-the-middle (MitM) attacks, and allowing attackers to easily intercept and access this data. NOTE: this is disputed by multiple third parties who believe there was not reasonable evidence to determine the existence of a vulnerability."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
|
@ -2,12 +2,12 @@
|
||||
"id": "CVE-2024-30663",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-04-08T07:15:09.570",
|
||||
"lastModified": "2024-04-08T18:48:40.217",
|
||||
"lastModified": "2024-04-17T01:15:07.960",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An issue was discovered in the default configurations of ROS (Robot Operating System) Melodic Morenia in ROS_VERSION 1 and ROS_PYTHON_VERSION 3. This vulnerability allows unauthenticated attackers to gain access using default credentials, posing a serious threat to the integrity and security of the system."
|
||||
"value": "An issue was discovered in the default configurations of ROS (Robot Operating System) Melodic Morenia in ROS_VERSION 1 and ROS_PYTHON_VERSION 3. This vulnerability allows unauthenticated attackers to gain access using default credentials, posing a serious threat to the integrity and security of the system. NOTE: this is disputed by multiple third parties who believe there was not reasonable evidence to determine the existence of a vulnerability."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
|
@ -2,12 +2,12 @@
|
||||
"id": "CVE-2024-30665",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-04-08T07:15:09.643",
|
||||
"lastModified": "2024-04-08T18:48:40.217",
|
||||
"lastModified": "2024-04-17T01:15:08.010",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An OS command injection vulnerability has been discovered in ROS (Robot Operating System) Melodic Morenia in ROS_VERSION 1 and ROS_PYTHON_VERSION 3. This vulnerability primarily affects the command processing or system call components in ROS, making them susceptible to manipulation by malicious entities. Through this, unauthorized commands can be executed, leading to remote code execution (RCE), data theft, and malicious activities. The affected components include External Command Execution Modules, System Call Handlers, and Interface Scripts."
|
||||
"value": "An OS command injection vulnerability has been discovered in ROS (Robot Operating System) Melodic Morenia in ROS_VERSION 1 and ROS_PYTHON_VERSION 3. This vulnerability primarily affects the command processing or system call components in ROS, making them susceptible to manipulation by malicious entities. Through this, unauthorized commands can be executed, leading to remote code execution (RCE), data theft, and malicious activities. The affected components include External Command Execution Modules, System Call Handlers, and Interface Scripts. NOTE: this is disputed by multiple third parties who believe there was not reasonable evidence to determine the existence of a vulnerability."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
|
@ -2,12 +2,12 @@
|
||||
"id": "CVE-2024-30666",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-04-08T07:15:09.713",
|
||||
"lastModified": "2024-04-08T18:48:40.217",
|
||||
"lastModified": "2024-04-17T01:15:08.063",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A buffer overflow vulnerability has been discovered in the C++ components of ROS (Robot Operating System) Melodic Morenia in ROS_VERSION 1 and ROS_PYTHON_VERSION 3, allows attackers to execute arbitrary code via improper handling of arrays or strings within these components."
|
||||
"value": "A buffer overflow vulnerability has been discovered in the C++ components of ROS (Robot Operating System) Melodic Morenia in ROS_VERSION 1 and ROS_PYTHON_VERSION 3, allows attackers to execute arbitrary code via improper handling of arrays or strings within these components. NOTE: this is disputed by multiple third parties who believe there was not reasonable evidence to determine the existence of a vulnerability."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
|
@ -2,12 +2,12 @@
|
||||
"id": "CVE-2024-30667",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-04-08T08:15:11.390",
|
||||
"lastModified": "2024-04-08T18:48:40.217",
|
||||
"lastModified": "2024-04-17T01:15:08.117",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Insecure deserialization vulnerability in ROS (Robot Operating System) Melodic Morenia in ROS_VERSION 1 and ROS_PYTHON_VERSION 3, allows attackers to execute arbitrary code or obtain sensitive information via crafted input to the data handling components."
|
||||
"value": "Insecure deserialization vulnerability in ROS (Robot Operating System) Melodic Morenia in ROS_VERSION 1 and ROS_PYTHON_VERSION 3, allows attackers to execute arbitrary code or obtain sensitive information via crafted input to the data handling components. NOTE: this is disputed by multiple third parties who believe there was not reasonable evidence to determine the existence of a vulnerability."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
|
@ -2,12 +2,12 @@
|
||||
"id": "CVE-2024-30672",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-04-08T08:15:11.517",
|
||||
"lastModified": "2024-04-08T18:48:40.217",
|
||||
"lastModified": "2024-04-17T01:15:08.170",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Arbitrary file upload vulnerability in ROS (Robot Operating System) Melodic Morenia in ROS_VERSION 1 and ROS_PYTHON_VERSION 3, allows attackers to execute arbitrary code, cause a denial of service (DoS), and obtain sensitive information via the file upload component."
|
||||
"value": "Arbitrary file upload vulnerability in ROS (Robot Operating System) Melodic Morenia in ROS_VERSION 1 and ROS_PYTHON_VERSION 3, allows attackers to execute arbitrary code, cause a denial of service (DoS), and obtain sensitive information via the file upload component. NOTE: this is disputed by multiple third parties who believe there was not reasonable evidence to determine the existence of a vulnerability."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
|
@ -2,12 +2,12 @@
|
||||
"id": "CVE-2024-30674",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-04-08T08:15:11.570",
|
||||
"lastModified": "2024-04-08T18:48:40.217",
|
||||
"lastModified": "2024-04-17T01:15:08.223",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Unauthorized access vulnerability in ROS2 Iron Irwini in ROS_VERSION is 2 and ROS_PYTHON_VERSION is 3, allows remote attackers to gain control of multiple ROS2 nodes. Unauthorized information access to these nodes could result in compromised system integrity, the execution of arbitrary commands, and disclosure of sensitive information."
|
||||
"value": "Unauthorized access vulnerability in ROS2 Iron Irwini in ROS_VERSION is 2 and ROS_PYTHON_VERSION is 3, allows remote attackers to gain control of multiple ROS2 nodes. Unauthorized information access to these nodes could result in compromised system integrity, the execution of arbitrary commands, and disclosure of sensitive information. NOTE: this is disputed by multiple third parties who believe there was not reasonable evidence to determine the existence of a vulnerability."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
|
@ -2,12 +2,12 @@
|
||||
"id": "CVE-2024-30675",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-04-08T08:15:11.627",
|
||||
"lastModified": "2024-04-08T18:48:40.217",
|
||||
"lastModified": "2024-04-17T01:15:08.283",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Unauthorized node injection vulnerability in ROS2 Iron Irwini in ROS_VERSION 2 and ROS_PYTHON_VERSION 3. This vulnerability could allow a malicious user to escalate privileges by injecting malicious ROS2 nodes into the system remotely."
|
||||
"value": "Unauthorized node injection vulnerability in ROS2 Iron Irwini in ROS_VERSION 2 and ROS_PYTHON_VERSION 3. This vulnerability could allow a malicious user to escalate privileges by injecting malicious ROS2 nodes into the system remotely. NOTE: this is disputed by multiple third parties who believe there was not reasonable evidence to determine the existence of a vulnerability."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
|
@ -2,12 +2,12 @@
|
||||
"id": "CVE-2024-30676",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-04-09T03:15:07.763",
|
||||
"lastModified": "2024-04-09T12:48:04.090",
|
||||
"lastModified": "2024-04-17T01:15:08.337",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A Denial-of-Service (DoS) vulnerability exists in ROS2 Iron Irwini versions where ROS_VERSION is 2 and ROS_PYTHON_VERSION is 3. A malicious user could potentially exploit this vulnerability remotely to crash the ROS2 nodes, thereby causing a denial of service. The flaw allows an attacker to cause unexpected behavior in the operation of ROS2 nodes, which leads to their failure and interrupts the regular operation of the system, thus making it unavailable for its intended users."
|
||||
"value": "A Denial-of-Service (DoS) vulnerability exists in ROS2 Iron Irwini versions where ROS_VERSION is 2 and ROS_PYTHON_VERSION is 3. A malicious user could potentially exploit this vulnerability remotely to crash the ROS2 nodes, thereby causing a denial of service. The flaw allows an attacker to cause unexpected behavior in the operation of ROS2 nodes, which leads to their failure and interrupts the regular operation of the system, thus making it unavailable for its intended users. NOTE: this is disputed by multiple third parties who believe there was not reasonable evidence to determine the existence of a vulnerability."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
|
@ -2,12 +2,12 @@
|
||||
"id": "CVE-2024-30678",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-04-09T03:15:07.830",
|
||||
"lastModified": "2024-04-09T12:48:04.090",
|
||||
"lastModified": "2024-04-17T01:15:08.427",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An issue has been discovered in ROS2 Iron Irwini ROS_VERSION 2 and ROS_PYTHON_VERSION 3, where the system transmits messages in plaintext. This flaw exposes sensitive information, making it vulnerable to man-in-the-middle (MitM) attacks, and allowing attackers to intercept and access this data."
|
||||
"value": "An issue has been discovered in ROS2 Iron Irwini ROS_VERSION 2 and ROS_PYTHON_VERSION 3, where the system transmits messages in plaintext. This flaw exposes sensitive information, making it vulnerable to man-in-the-middle (MitM) attacks, and allowing attackers to intercept and access this data. NOTE: this is disputed by multiple third parties who believe there was not reasonable evidence to determine the existence of a vulnerability."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
|
@ -2,12 +2,12 @@
|
||||
"id": "CVE-2024-30679",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-04-09T04:15:10.087",
|
||||
"lastModified": "2024-04-09T12:48:04.090",
|
||||
"lastModified": "2024-04-17T01:15:08.510",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An issue was discovered in the default configurations of ROS2 Iron Irwini ROS_VERSION 2 and ROS_PYTHON_VERSION 3, allows unauthenticated attackers to authenticate using default credentials."
|
||||
"value": "An issue was discovered in the default configurations of ROS2 Iron Irwini ROS_VERSION 2 and ROS_PYTHON_VERSION 3, allows unauthenticated attackers to authenticate using default credentials. NOTE: this is disputed by multiple third parties who believe there was not reasonable evidence to determine the existence of a vulnerability."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
|
@ -2,12 +2,12 @@
|
||||
"id": "CVE-2024-30680",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-04-09T04:15:10.583",
|
||||
"lastModified": "2024-04-09T12:48:04.090",
|
||||
"lastModified": "2024-04-17T01:15:08.577",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Shell injection vulnerability was discovered in ROS2 (Robot Operating System 2) Iron Irwini in versions ROS_VERSION 2 and ROS_PYTHON_VERSION 3, allows attackers to execute arbitrary code escalate privileges, and obtain sensitive information due to the way ROS2 handles shell command execution in components like command interpreters or interfaces that process external inputs."
|
||||
"value": "Shell injection vulnerability was discovered in ROS2 (Robot Operating System 2) Iron Irwini in versions ROS_VERSION 2 and ROS_PYTHON_VERSION 3, allows attackers to execute arbitrary code escalate privileges, and obtain sensitive information due to the way ROS2 handles shell command execution in components like command interpreters or interfaces that process external inputs. NOTE: this is disputed by multiple third parties who believe there was not reasonable evidence to determine the existence of a vulnerability."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
|
@ -2,12 +2,12 @@
|
||||
"id": "CVE-2024-30681",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-04-09T04:15:10.747",
|
||||
"lastModified": "2024-04-09T12:48:04.090",
|
||||
"lastModified": "2024-04-17T01:15:08.633",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An OS command injection vulnerability has been discovered in ROS2 Iron Irwini version ROS_VERSION 2 and ROS_PYTHON_VERSION 3, allows attackers to execute arbitrary code, escalate privileges, and obtain sensitive information via the command processing or system call components in ROS2."
|
||||
"value": "An OS command injection vulnerability has been discovered in ROS2 Iron Irwini version ROS_VERSION 2 and ROS_PYTHON_VERSION 3, allows attackers to execute arbitrary code, escalate privileges, and obtain sensitive information via the command processing or system call components in ROS2. NOTE: this is disputed by multiple third parties who believe there was not reasonable evidence to determine the existence of a vulnerability."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
|
@ -2,12 +2,12 @@
|
||||
"id": "CVE-2024-30683",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-04-09T04:15:10.877",
|
||||
"lastModified": "2024-04-09T12:48:04.090",
|
||||
"lastModified": "2024-04-17T01:15:08.690",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A buffer overflow vulnerability has been discovered in the C++ components of ROS2 Iron Irwini versions ROS_VERSION 2 and ROS_PYTHON_VERSION 3, allows attackers to execute arbitrary code or cause a Denial of Service (DoS) via improper handling of arrays or strings."
|
||||
"value": "A buffer overflow vulnerability has been discovered in the C++ components of ROS2 Iron Irwini versions ROS_VERSION 2 and ROS_PYTHON_VERSION 3, allows attackers to execute arbitrary code or cause a Denial of Service (DoS) via improper handling of arrays or strings. NOTE: this is disputed by multiple third parties who believe there was not reasonable evidence to determine the existence of a vulnerability."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
|
@ -2,12 +2,12 @@
|
||||
"id": "CVE-2024-30684",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-04-09T05:15:47.807",
|
||||
"lastModified": "2024-04-09T12:48:04.090",
|
||||
"lastModified": "2024-04-17T01:15:08.750",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An insecure logging vulnerability has been identified within ROS2 Iron Irwini versions ROS_VERSION 2 and ROS_PYTHON_VERSION 3, allows attackers to access sensitive information via inadequate security measures implemented within the logging mechanisms of ROS2."
|
||||
"value": "An insecure logging vulnerability has been identified within ROS2 Iron Irwini versions ROS_VERSION 2 and ROS_PYTHON_VERSION 3, allows attackers to access sensitive information via inadequate security measures implemented within the logging mechanisms of ROS2. NOTE: this is disputed by multiple third parties who believe there was not reasonable evidence to determine the existence of a vulnerability."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
|
@ -2,12 +2,12 @@
|
||||
"id": "CVE-2024-30686",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-04-09T05:15:47.853",
|
||||
"lastModified": "2024-04-09T12:48:04.090",
|
||||
"lastModified": "2024-04-17T01:15:08.813",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An issue was discovered in ROS2 Iron Irwini versions ROS_VERSION 2 and ROS_PYTHON_VERSION 3, allows remote attackers to execute arbitrary code via packages or nodes within the ROS2 system."
|
||||
"value": "An issue was discovered in ROS2 Iron Irwini versions ROS_VERSION 2 and ROS_PYTHON_VERSION 3, allows remote attackers to execute arbitrary code via packages or nodes within the ROS2 system. NOTE: this is disputed by multiple third parties who believe there was not reasonable evidence to determine the existence of a vulnerability."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
|
@ -2,12 +2,12 @@
|
||||
"id": "CVE-2024-30687",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-04-09T05:15:47.920",
|
||||
"lastModified": "2024-04-09T12:48:04.090",
|
||||
"lastModified": "2024-04-17T01:15:08.873",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An insecure deserialization vulnerability has been identified in ROS2 Iron Irwini versions ROS_VERSION 2 and ROS_PYTHON_VERSION 3, allows attackers to execute arbitrary code via a crafted input to the Data Serialization and Deserialization Components, Inter-Process Communication Mechanisms, and Network Communication Interfaces."
|
||||
"value": "An insecure deserialization vulnerability has been identified in ROS2 Iron Irwini versions ROS_VERSION 2 and ROS_PYTHON_VERSION 3, allows attackers to execute arbitrary code via a crafted input to the Data Serialization and Deserialization Components, Inter-Process Communication Mechanisms, and Network Communication Interfaces. NOTE: this is disputed by multiple third parties who believe there was not reasonable evidence to determine the existence of a vulnerability."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
|
@ -2,12 +2,12 @@
|
||||
"id": "CVE-2024-30688",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-04-09T05:15:47.980",
|
||||
"lastModified": "2024-04-09T12:48:04.090",
|
||||
"lastModified": "2024-04-17T01:15:08.927",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An arbitrary file upload vulnerability has been discovered in ROS2 Iron Irwini versions ROS_VERSION 2 and ROS_PYTHON_VERSION 3, allows attackers to execute arbitrary code via a crafted payload to the file upload mechanism of the ROS2 system, including the server\u2019s functionality for handling file uploads and the associated validation processes."
|
||||
"value": "An arbitrary file upload vulnerability has been discovered in ROS2 Iron Irwini versions ROS_VERSION 2 and ROS_PYTHON_VERSION 3, allows attackers to execute arbitrary code via a crafted payload to the file upload mechanism of the ROS2 system, including the server\u2019s functionality for handling file uploads and the associated validation processes. NOTE: this is disputed by multiple third parties who believe there was not reasonable evidence to determine the existence of a vulnerability."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
|
@ -2,12 +2,12 @@
|
||||
"id": "CVE-2024-30690",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-04-09T06:15:08.963",
|
||||
"lastModified": "2024-04-09T12:48:04.090",
|
||||
"lastModified": "2024-04-17T01:15:08.980",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An unauthorized node injection vulnerability has been identified in ROS2 Galactic Geochelone versions where ROS_VERSION is 2 and ROS_PYTHON_VERSION is 3, allows remote attackers to escalate privileges."
|
||||
"value": "An unauthorized node injection vulnerability has been identified in ROS2 Galactic Geochelone versions where ROS_VERSION is 2 and ROS_PYTHON_VERSION is 3, allows remote attackers to escalate privileges. NOTE: this is disputed by multiple third parties who believe there was not reasonable evidence to determine the existence of a vulnerability."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
|
@ -2,12 +2,12 @@
|
||||
"id": "CVE-2024-30691",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-04-09T07:15:08.467",
|
||||
"lastModified": "2024-04-09T12:48:04.090",
|
||||
"lastModified": "2024-04-17T01:15:09.033",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An issue was discovered in ROS2 Galactic Geochelone in version ROS_VERSION 2 and ROS_PYTHON_VERSION 3, allows remote attackers to execute arbitrary code, escalate privileges, obtain sensitive information, and gain unauthorized access to multiple ROS2 nodes."
|
||||
"value": "An issue was discovered in ROS2 Galactic Geochelone in version ROS_VERSION 2 and ROS_PYTHON_VERSION 3, allows remote attackers to execute arbitrary code, escalate privileges, obtain sensitive information, and gain unauthorized access to multiple ROS2 nodes. NOTE: this is disputed by multiple third parties who believe there was not reasonable evidence to determine the existence of a vulnerability."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
|
@ -2,12 +2,12 @@
|
||||
"id": "CVE-2024-30692",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-04-09T07:15:08.560",
|
||||
"lastModified": "2024-04-09T12:48:04.090",
|
||||
"lastModified": "2024-04-17T01:15:09.100",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A issue was discovered in ROS2 Galactic Geochelone versions ROS_VERSION 2 and ROS_PYTHON_VERSION 3, allows remote attackers to cause a denial of service (DoS) in the ROS2 nodes."
|
||||
"value": "A issue was discovered in ROS2 Galactic Geochelone versions ROS_VERSION 2 and ROS_PYTHON_VERSION 3, allows remote attackers to cause a denial of service (DoS) in the ROS2 nodes. NOTE: this is disputed by multiple third parties who believe there was not reasonable evidence to determine the existence of a vulnerability."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
|
@ -2,12 +2,12 @@
|
||||
"id": "CVE-2024-30694",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-04-09T08:15:07.420",
|
||||
"lastModified": "2024-04-09T12:48:04.090",
|
||||
"lastModified": "2024-04-17T01:15:09.160",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A shell injection vulnerability was discovered in ROS2 (Robot Operating System 2) Galactic Geochelone ROS_VERSION 2 and ROS_PYTHON_VERSION 3, allows attackers to execute arbitrary code, escalate privileges, and obtain sensitive information due to the way ROS2 handles shell command execution in components like command interpreters or interfaces that process external inputs."
|
||||
"value": "A shell injection vulnerability was discovered in ROS2 (Robot Operating System 2) Galactic Geochelone ROS_VERSION 2 and ROS_PYTHON_VERSION 3, allows attackers to execute arbitrary code, escalate privileges, and obtain sensitive information due to the way ROS2 handles shell command execution in components like command interpreters or interfaces that process external inputs. NOTE: this is disputed by multiple third parties who believe there was not reasonable evidence to determine the existence of a vulnerability."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
|
@ -2,12 +2,12 @@
|
||||
"id": "CVE-2024-30695",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-04-09T08:15:07.530",
|
||||
"lastModified": "2024-04-09T12:48:04.090",
|
||||
"lastModified": "2024-04-17T01:15:09.217",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An issue was discovered in the default configurations of ROS2 Galactic Geochelone versions ROS_VERSION 2 and ROS_PYTHON_VERSION 3, allows unauthenticated attackers to gain access using default credentials."
|
||||
"value": "An issue was discovered in the default configurations of ROS2 Galactic Geochelone versions ROS_VERSION 2 and ROS_PYTHON_VERSION 3, allows unauthenticated attackers to gain access using default credentials. NOTE: this is disputed by multiple third parties who believe there was not reasonable evidence to determine the existence of a vulnerability."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
|
@ -2,12 +2,12 @@
|
||||
"id": "CVE-2024-30696",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-04-09T08:15:07.587",
|
||||
"lastModified": "2024-04-09T12:48:04.090",
|
||||
"lastModified": "2024-04-17T01:15:09.273",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "OS command injection vulnerability in ROS2 Galactic Geochelone in ROS_VERSION 2 and ROS_PYTHON_VERSION 3, allows remote attackers to execute arbitrary code, escalate privileges, and obtain sensitive information via the command processing or system call components in ROS2, including External Command Execution Modules, System Call Handlers, and Interface Scripts."
|
||||
"value": "OS command injection vulnerability in ROS2 Galactic Geochelone in ROS_VERSION 2 and ROS_PYTHON_VERSION 3, allows remote attackers to execute arbitrary code, escalate privileges, and obtain sensitive information via the command processing or system call components in ROS2, including External Command Execution Modules, System Call Handlers, and Interface Scripts. NOTE: this is disputed by multiple third parties who believe there was not reasonable evidence to determine the existence of a vulnerability."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
|
@ -2,12 +2,12 @@
|
||||
"id": "CVE-2024-30697",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-04-09T08:15:07.663",
|
||||
"lastModified": "2024-04-09T12:48:04.090",
|
||||
"lastModified": "2024-04-17T01:15:09.330",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An issue was discovered in ROS2 Galactic Geochelone in ROS_VERSION 2 and ROS_PYTHON_VERSION 3, where the system transmits messages in plaintext, allowing attackers to access sensitive information via a man-in-the-middle attack."
|
||||
"value": "An issue was discovered in ROS2 Galactic Geochelone in ROS_VERSION 2 and ROS_PYTHON_VERSION 3, where the system transmits messages in plaintext, allowing attackers to access sensitive information via a man-in-the-middle attack. NOTE: this is disputed by multiple third parties who believe there was not reasonable evidence to determine the existence of a vulnerability."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
|
@ -2,12 +2,12 @@
|
||||
"id": "CVE-2024-30699",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-04-09T08:15:07.717",
|
||||
"lastModified": "2024-04-09T12:48:04.090",
|
||||
"lastModified": "2024-04-17T01:15:09.387",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A buffer overflow vulnerability has been discovered in the C++ components of ROS2 Galactic Geochelone ROS_VERSION 2 and ROS_PYTHON_VERSION 3, allows attackers to execute arbitrary code or cause a denial of service (DoS) via improper handling of arrays or strings."
|
||||
"value": "A buffer overflow vulnerability has been discovered in the C++ components of ROS2 Galactic Geochelone ROS_VERSION 2 and ROS_PYTHON_VERSION 3, allows attackers to execute arbitrary code or cause a denial of service (DoS) via improper handling of arrays or strings. NOTE: this is disputed by multiple third parties who believe there was not reasonable evidence to determine the existence of a vulnerability."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
|
@ -2,12 +2,12 @@
|
||||
"id": "CVE-2024-30701",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-04-09T08:15:07.770",
|
||||
"lastModified": "2024-04-09T12:48:04.090",
|
||||
"lastModified": "2024-04-17T01:15:09.447",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An insecure logging vulnerability in ROS2 Galactic Geochelone ROS_VERSION 2 and ROS_PYTHON_VERSION 3, allows attackers to obtain sensitive information via inadequate security measures implemented within the logging mechanisms of ROS2."
|
||||
"value": "An insecure logging vulnerability in ROS2 Galactic Geochelone ROS_VERSION 2 and ROS_PYTHON_VERSION 3, allows attackers to obtain sensitive information via inadequate security measures implemented within the logging mechanisms of ROS2. NOTE: this is disputed by multiple third parties who believe there was not reasonable evidence to determine the existence of a vulnerability."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
|
@ -2,12 +2,12 @@
|
||||
"id": "CVE-2024-30702",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-04-09T18:15:09.680",
|
||||
"lastModified": "2024-04-10T13:24:00.070",
|
||||
"lastModified": "2024-04-17T01:15:09.503",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An issue was discovered in ROS2 Galactic Geochelone in ROS_VERSION 2 and ROS_PYTHON_VERSION 3, allows remote attackers to execute arbitrary code via packages or nodes within the ROS2 system."
|
||||
"value": "An issue was discovered in ROS2 Galactic Geochelone in ROS_VERSION 2 and ROS_PYTHON_VERSION 3, allows remote attackers to execute arbitrary code via packages or nodes within the ROS2 system. NOTE: this is disputed by multiple third parties who believe there was not reasonable evidence to determine the existence of a vulnerability."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
|
@ -2,12 +2,12 @@
|
||||
"id": "CVE-2024-30703",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-04-09T18:15:09.743",
|
||||
"lastModified": "2024-04-10T13:24:00.070",
|
||||
"lastModified": "2024-04-17T01:15:09.570",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An arbitrary file upload vulnerability has been discovered in ROS2 (Robot Operating System 2) Galactic Geochelone ROS_VERSION 2 and ROS_PYTHON_VERSION 3, allows attackers to execute arbitrary code, cause a denial of service (DoS), and obtain sensitive information via a crafted payload to the file upload mechanism of the ROS2 system, including the server\u2019s functionality for handling file uploads and the associated validation processes."
|
||||
"value": "An arbitrary file upload vulnerability has been discovered in ROS2 (Robot Operating System 2) Galactic Geochelone ROS_VERSION 2 and ROS_PYTHON_VERSION 3, allows attackers to execute arbitrary code, cause a denial of service (DoS), and obtain sensitive information via a crafted payload to the file upload mechanism of the ROS2 system, including the server\u2019s functionality for handling file uploads and the associated validation processes. NOTE: this is disputed by multiple third parties who believe there was not reasonable evidence to determine the existence of a vulnerability."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
|
@ -2,12 +2,12 @@
|
||||
"id": "CVE-2024-30704",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-04-09T18:15:09.800",
|
||||
"lastModified": "2024-04-10T13:24:00.070",
|
||||
"lastModified": "2024-04-17T01:15:09.627",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An insecure deserialization vulnerability has been identified in ROS2 Galactic Geochelone ROS_VERSION 2 and ROS_PYTHON_VERSION 3, allows attackers to execute arbitrary code and obtain sensitive information via crafted input to the Data Serialization and Deserialization Components, Inter-Process Communication Mechanisms, and Network Communication Interfaces."
|
||||
"value": "An insecure deserialization vulnerability has been identified in ROS2 Galactic Geochelone ROS_VERSION 2 and ROS_PYTHON_VERSION 3, allows attackers to execute arbitrary code and obtain sensitive information via crafted input to the Data Serialization and Deserialization Components, Inter-Process Communication Mechanisms, and Network Communication Interfaces. NOTE: this is disputed by multiple third parties who believe there was not reasonable evidence to determine the existence of a vulnerability."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
|
@ -2,12 +2,12 @@
|
||||
"id": "CVE-2024-30706",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-04-09T19:15:38.980",
|
||||
"lastModified": "2024-04-10T13:23:38.787",
|
||||
"lastModified": "2024-04-17T01:15:09.687",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An issue was discovered in ROS2 Dashing Diademata versions ROS_VERSION is 2 and ROS_PYTHON_VERSION is 3, allows remote attackers to execute arbitrary code, escalate privileges, obtain sensitive information, and gain unauthorized access to multiple ROS2 nodes."
|
||||
"value": "An issue was discovered in ROS2 Dashing Diademata versions ROS_VERSION is 2 and ROS_PYTHON_VERSION is 3, allows remote attackers to execute arbitrary code, escalate privileges, obtain sensitive information, and gain unauthorized access to multiple ROS2 nodes. NOTE: this is disputed by multiple third parties who believe there was not reasonable evidence to determine the existence of a vulnerability."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
|
@ -2,12 +2,12 @@
|
||||
"id": "CVE-2024-30707",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-04-10T01:15:19.053",
|
||||
"lastModified": "2024-04-10T13:23:38.787",
|
||||
"lastModified": "2024-04-17T01:15:09.747",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Unauthorized node injection vulnerability in ROS2 Dashing Diademata in ROS_VERSION 2 and ROS_PYTHON_VERSION 3, allows remote attackers to escalate privileges and inject malicious ROS2 nodes into the system."
|
||||
"value": "Unauthorized node injection vulnerability in ROS2 Dashing Diademata in ROS_VERSION 2 and ROS_PYTHON_VERSION 3, allows remote attackers to escalate privileges and inject malicious ROS2 nodes into the system. NOTE: this is disputed by multiple third parties who believe there was not reasonable evidence to determine the existence of a vulnerability."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
|
@ -2,12 +2,12 @@
|
||||
"id": "CVE-2024-30708",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-04-10T01:15:19.110",
|
||||
"lastModified": "2024-04-10T13:23:38.787",
|
||||
"lastModified": "2024-04-17T01:15:09.810",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An issue was discovered in ROS2 Dashing Diademata in ROS_VERSION 2 and ROS_PYTHON_VERSION 3, allows remote attackers to cause a denial of service (DoS) via the ROS2 nodes."
|
||||
"value": "An issue was discovered in ROS2 Dashing Diademata in ROS_VERSION 2 and ROS_PYTHON_VERSION 3, allows remote attackers to cause a denial of service (DoS) via the ROS2 nodes. NOTE: this is disputed by multiple third parties who believe there was not reasonable evidence to determine the existence of a vulnerability."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
|
@ -2,12 +2,12 @@
|
||||
"id": "CVE-2024-30710",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-04-10T01:15:19.160",
|
||||
"lastModified": "2024-04-10T13:23:38.787",
|
||||
"lastModified": "2024-04-17T01:15:09.867",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An issue was discovered in ROS2 Dashing Diademata in ROS_VERSION 2 and ROS_PYTHON_VERSION 3, where the system transmits messages in plaintext. This flaw exposes sensitive information, making it vulnerable to man-in-the-middle (MitM) attacks, and allowing attackers to easily intercept and access this data."
|
||||
"value": "An issue was discovered in ROS2 Dashing Diademata in ROS_VERSION 2 and ROS_PYTHON_VERSION 3, where the system transmits messages in plaintext. This flaw exposes sensitive information, making it vulnerable to man-in-the-middle (MitM) attacks, and allowing attackers to easily intercept and access this data. NOTE: this is disputed by multiple third parties who believe there was not reasonable evidence to determine the existence of a vulnerability."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
|
@ -2,12 +2,12 @@
|
||||
"id": "CVE-2024-30711",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-04-10T02:15:10.300",
|
||||
"lastModified": "2024-04-10T13:23:38.787",
|
||||
"lastModified": "2024-04-17T01:15:09.923",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An issue was discovered in the default configurations of ROS2 Dashing Diademata in ROS_VERSION 2 and ROS_PYTHON_VERSION 3, allows unauthenticated attackers to gain access using default credentials."
|
||||
"value": "An issue was discovered in the default configurations of ROS2 Dashing Diademata in ROS_VERSION 2 and ROS_PYTHON_VERSION 3, allows unauthenticated attackers to gain access using default credentials. NOTE: this is disputed by multiple third parties who believe there was not reasonable evidence to determine the existence of a vulnerability."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
|
@ -2,12 +2,12 @@
|
||||
"id": "CVE-2024-30712",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-04-10T02:15:10.400",
|
||||
"lastModified": "2024-04-10T13:23:38.787",
|
||||
"lastModified": "2024-04-17T01:15:09.990",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A shell injection vulnerability was discovered in ROS2 (Robot Operating System 2) Dashing Diademata in ROS_VERSION 2 and ROS_PYTHON_VERSION 3, allows remote attackers to execute arbitrary code, escalate privileges, and obtain sensitive information due to the way ROS2 handles shell command execution in components like command interpreters or interfaces that process external inputs."
|
||||
"value": "A shell injection vulnerability was discovered in ROS2 (Robot Operating System 2) Dashing Diademata in ROS_VERSION 2 and ROS_PYTHON_VERSION 3, allows remote attackers to execute arbitrary code, escalate privileges, and obtain sensitive information due to the way ROS2 handles shell command execution in components like command interpreters or interfaces that process external inputs. NOTE: this is disputed by multiple third parties who believe there was not reasonable evidence to determine the existence of a vulnerability."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
|
@ -2,12 +2,12 @@
|
||||
"id": "CVE-2024-30713",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-04-10T02:15:10.473",
|
||||
"lastModified": "2024-04-10T13:23:38.787",
|
||||
"lastModified": "2024-04-17T01:15:10.050",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An OS command injection vulnerability has been discovered in ROS2 Dashing Diademata in ROS_VERSION 2 and ROS_PYTHON_VERSION 3, allows remote attackers to execute arbitrary code, escalate privileges, and obtain sensitive information via the External Command Execution Modules, System Call Handlers, and Interface Scripts."
|
||||
"value": "An OS command injection vulnerability has been discovered in ROS2 Dashing Diademata in ROS_VERSION 2 and ROS_PYTHON_VERSION 3, allows remote attackers to execute arbitrary code, escalate privileges, and obtain sensitive information via the External Command Execution Modules, System Call Handlers, and Interface Scripts. NOTE: this is disputed by multiple third parties who believe there was not reasonable evidence to determine the existence of a vulnerability."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
|
20
CVE-2024/CVE-2024-315xx/CVE-2024-31503.json
Normal file
20
CVE-2024/CVE-2024-315xx/CVE-2024-31503.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2024-31503",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-04-17T00:15:07.220",
|
||||
"lastModified": "2024-04-17T00:15:07.220",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Incorrect access control in Dolibarr ERP CRM versions 19.0.0 and before, allows authenticated attackers to steal victim users' session cookies and CSRF protection tokens via user interaction with a crafted web page, leading to account takeover."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/alexbsec/CVEs/blob/master/2024/CVE-2024-31503.md",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2024/CVE-2024-316xx/CVE-2024-31680.json
Normal file
20
CVE-2024/CVE-2024-316xx/CVE-2024-31680.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2024-31680",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-04-17T00:15:07.293",
|
||||
"lastModified": "2024-04-17T00:15:07.293",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "File Upload vulnerability in Shibang Communications Co., Ltd. IP network intercom broadcasting system v.1.0 allows a local attacker to execute arbitrary code via the my_parser.php component."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/heidashuai5588/cve/blob/main/upload.md",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
69
README.md
69
README.md
@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
|
||||
### Last Repository Update
|
||||
|
||||
```plain
|
||||
2024-04-16T23:55:32.287910+00:00
|
||||
2024-04-17T02:00:30.816528+00:00
|
||||
```
|
||||
|
||||
### Most recent CVE Modification Timestamp synchronized with NVD
|
||||
|
||||
```plain
|
||||
2024-04-16T23:15:09.173000+00:00
|
||||
2024-04-17T01:15:10.050000+00:00
|
||||
```
|
||||
|
||||
### Last Data Feed Release
|
||||
@ -27,54 +27,53 @@ Repository synchronizes with the NVD every 2 hours.
|
||||
Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/releases/latest)
|
||||
|
||||
```plain
|
||||
2024-04-16T00:00:20.260499+00:00
|
||||
2024-04-17T00:00:20.264953+00:00
|
||||
```
|
||||
|
||||
### Total Number of included CVEs
|
||||
|
||||
```plain
|
||||
245887
|
||||
245890
|
||||
```
|
||||
|
||||
### CVEs added in the last Commit
|
||||
|
||||
Recently added CVEs: `140`
|
||||
Recently added CVEs: `3`
|
||||
|
||||
- [CVE-2024-21104](CVE-2024/CVE-2024-211xx/CVE-2024-21104.json) (`2024-04-16T22:15:31.600`)
|
||||
- [CVE-2024-21105](CVE-2024/CVE-2024-211xx/CVE-2024-21105.json) (`2024-04-16T22:15:31.770`)
|
||||
- [CVE-2024-21106](CVE-2024/CVE-2024-211xx/CVE-2024-21106.json) (`2024-04-16T22:15:31.940`)
|
||||
- [CVE-2024-21107](CVE-2024/CVE-2024-211xx/CVE-2024-21107.json) (`2024-04-16T22:15:32.110`)
|
||||
- [CVE-2024-21108](CVE-2024/CVE-2024-211xx/CVE-2024-21108.json) (`2024-04-16T22:15:32.277`)
|
||||
- [CVE-2024-21109](CVE-2024/CVE-2024-211xx/CVE-2024-21109.json) (`2024-04-16T22:15:32.440`)
|
||||
- [CVE-2024-21110](CVE-2024/CVE-2024-211xx/CVE-2024-21110.json) (`2024-04-16T22:15:32.617`)
|
||||
- [CVE-2024-21111](CVE-2024/CVE-2024-211xx/CVE-2024-21111.json) (`2024-04-16T22:15:32.780`)
|
||||
- [CVE-2024-21112](CVE-2024/CVE-2024-211xx/CVE-2024-21112.json) (`2024-04-16T22:15:32.957`)
|
||||
- [CVE-2024-21113](CVE-2024/CVE-2024-211xx/CVE-2024-21113.json) (`2024-04-16T22:15:33.127`)
|
||||
- [CVE-2024-21114](CVE-2024/CVE-2024-211xx/CVE-2024-21114.json) (`2024-04-16T22:15:33.300`)
|
||||
- [CVE-2024-21115](CVE-2024/CVE-2024-211xx/CVE-2024-21115.json) (`2024-04-16T22:15:33.467`)
|
||||
- [CVE-2024-21116](CVE-2024/CVE-2024-211xx/CVE-2024-21116.json) (`2024-04-16T22:15:33.653`)
|
||||
- [CVE-2024-21117](CVE-2024/CVE-2024-211xx/CVE-2024-21117.json) (`2024-04-16T22:15:33.860`)
|
||||
- [CVE-2024-21118](CVE-2024/CVE-2024-211xx/CVE-2024-21118.json) (`2024-04-16T22:15:34.027`)
|
||||
- [CVE-2024-21119](CVE-2024/CVE-2024-211xx/CVE-2024-21119.json) (`2024-04-16T22:15:34.197`)
|
||||
- [CVE-2024-21120](CVE-2024/CVE-2024-211xx/CVE-2024-21120.json) (`2024-04-16T22:15:34.427`)
|
||||
- [CVE-2024-21121](CVE-2024/CVE-2024-211xx/CVE-2024-21121.json) (`2024-04-16T22:15:34.600`)
|
||||
- [CVE-2024-27086](CVE-2024/CVE-2024-270xx/CVE-2024-27086.json) (`2024-04-16T22:15:34.783`)
|
||||
- [CVE-2024-29291](CVE-2024/CVE-2024-292xx/CVE-2024-29291.json) (`2024-04-16T23:15:08.767`)
|
||||
- [CVE-2024-29402](CVE-2024/CVE-2024-294xx/CVE-2024-29402.json) (`2024-04-16T23:15:08.827`)
|
||||
- [CVE-2024-31452](CVE-2024/CVE-2024-314xx/CVE-2024-31452.json) (`2024-04-16T22:15:35.003`)
|
||||
- [CVE-2024-31759](CVE-2024/CVE-2024-317xx/CVE-2024-31759.json) (`2024-04-16T23:15:09.047`)
|
||||
- [CVE-2024-31760](CVE-2024/CVE-2024-317xx/CVE-2024-31760.json) (`2024-04-16T23:15:09.107`)
|
||||
- [CVE-2024-31887](CVE-2024/CVE-2024-318xx/CVE-2024-31887.json) (`2024-04-16T22:15:35.240`)
|
||||
- [CVE-2024-22354](CVE-2024/CVE-2024-223xx/CVE-2024-22354.json) (`2024-04-17T01:15:06.747`)
|
||||
- [CVE-2024-31503](CVE-2024/CVE-2024-315xx/CVE-2024-31503.json) (`2024-04-17T00:15:07.220`)
|
||||
- [CVE-2024-31680](CVE-2024/CVE-2024-316xx/CVE-2024-31680.json) (`2024-04-17T00:15:07.293`)
|
||||
|
||||
|
||||
### CVEs modified in the last Commit
|
||||
|
||||
Recently modified CVEs: `4`
|
||||
Recently modified CVEs: `53`
|
||||
|
||||
- [CVE-2024-0914](CVE-2024/CVE-2024-09xx/CVE-2024-0914.json) (`2024-04-16T22:15:11.330`)
|
||||
- [CVE-2024-27592](CVE-2024/CVE-2024-275xx/CVE-2024-27592.json) (`2024-04-16T23:15:08.690`)
|
||||
- [CVE-2024-31497](CVE-2024/CVE-2024-314xx/CVE-2024-31497.json) (`2024-04-16T23:15:08.903`)
|
||||
- [CVE-2024-32036](CVE-2024/CVE-2024-320xx/CVE-2024-32036.json) (`2024-04-16T23:15:09.173`)
|
||||
- [CVE-2024-30681](CVE-2024/CVE-2024-306xx/CVE-2024-30681.json) (`2024-04-17T01:15:08.633`)
|
||||
- [CVE-2024-30683](CVE-2024/CVE-2024-306xx/CVE-2024-30683.json) (`2024-04-17T01:15:08.690`)
|
||||
- [CVE-2024-30684](CVE-2024/CVE-2024-306xx/CVE-2024-30684.json) (`2024-04-17T01:15:08.750`)
|
||||
- [CVE-2024-30686](CVE-2024/CVE-2024-306xx/CVE-2024-30686.json) (`2024-04-17T01:15:08.813`)
|
||||
- [CVE-2024-30687](CVE-2024/CVE-2024-306xx/CVE-2024-30687.json) (`2024-04-17T01:15:08.873`)
|
||||
- [CVE-2024-30688](CVE-2024/CVE-2024-306xx/CVE-2024-30688.json) (`2024-04-17T01:15:08.927`)
|
||||
- [CVE-2024-30690](CVE-2024/CVE-2024-306xx/CVE-2024-30690.json) (`2024-04-17T01:15:08.980`)
|
||||
- [CVE-2024-30691](CVE-2024/CVE-2024-306xx/CVE-2024-30691.json) (`2024-04-17T01:15:09.033`)
|
||||
- [CVE-2024-30692](CVE-2024/CVE-2024-306xx/CVE-2024-30692.json) (`2024-04-17T01:15:09.100`)
|
||||
- [CVE-2024-30694](CVE-2024/CVE-2024-306xx/CVE-2024-30694.json) (`2024-04-17T01:15:09.160`)
|
||||
- [CVE-2024-30695](CVE-2024/CVE-2024-306xx/CVE-2024-30695.json) (`2024-04-17T01:15:09.217`)
|
||||
- [CVE-2024-30696](CVE-2024/CVE-2024-306xx/CVE-2024-30696.json) (`2024-04-17T01:15:09.273`)
|
||||
- [CVE-2024-30697](CVE-2024/CVE-2024-306xx/CVE-2024-30697.json) (`2024-04-17T01:15:09.330`)
|
||||
- [CVE-2024-30699](CVE-2024/CVE-2024-306xx/CVE-2024-30699.json) (`2024-04-17T01:15:09.387`)
|
||||
- [CVE-2024-30701](CVE-2024/CVE-2024-307xx/CVE-2024-30701.json) (`2024-04-17T01:15:09.447`)
|
||||
- [CVE-2024-30702](CVE-2024/CVE-2024-307xx/CVE-2024-30702.json) (`2024-04-17T01:15:09.503`)
|
||||
- [CVE-2024-30703](CVE-2024/CVE-2024-307xx/CVE-2024-30703.json) (`2024-04-17T01:15:09.570`)
|
||||
- [CVE-2024-30704](CVE-2024/CVE-2024-307xx/CVE-2024-30704.json) (`2024-04-17T01:15:09.627`)
|
||||
- [CVE-2024-30706](CVE-2024/CVE-2024-307xx/CVE-2024-30706.json) (`2024-04-17T01:15:09.687`)
|
||||
- [CVE-2024-30707](CVE-2024/CVE-2024-307xx/CVE-2024-30707.json) (`2024-04-17T01:15:09.747`)
|
||||
- [CVE-2024-30708](CVE-2024/CVE-2024-307xx/CVE-2024-30708.json) (`2024-04-17T01:15:09.810`)
|
||||
- [CVE-2024-30710](CVE-2024/CVE-2024-307xx/CVE-2024-30710.json) (`2024-04-17T01:15:09.867`)
|
||||
- [CVE-2024-30711](CVE-2024/CVE-2024-307xx/CVE-2024-30711.json) (`2024-04-17T01:15:09.923`)
|
||||
- [CVE-2024-30712](CVE-2024/CVE-2024-307xx/CVE-2024-30712.json) (`2024-04-17T01:15:09.990`)
|
||||
- [CVE-2024-30713](CVE-2024/CVE-2024-307xx/CVE-2024-30713.json) (`2024-04-17T01:15:10.050`)
|
||||
|
||||
|
||||
## Download and Usage
|
||||
|
397
_state.csv
397
_state.csv
@ -238939,7 +238939,7 @@ CVE-2024-0907,0,0,736d9a373e93547114922fac343df53c487c280e59648bef9a3cecc6379f90
|
||||
CVE-2024-0909,0,0,7864e9d833556eb295eb67e87cebb39c8d9b11d41ed1f5327a80b30fe013438c,2024-02-08T20:07:51.410000
|
||||
CVE-2024-0911,0,0,5f8186e1a077698fb2fa1e99d28cc6e32ac8b7b7afb205a3a02bc10c8ca698f0,2024-02-14T18:15:48.077000
|
||||
CVE-2024-0913,0,0,cc9dbbd0e1eb40baf69d2dc96719798ae1dcba5ab6fc531754d7fd6a8c7e7f1d,2024-03-29T12:45:02.937000
|
||||
CVE-2024-0914,0,1,0e30b945bb509fa0d2bc0b307e8920a9ca89d326b7b4c1c386bc1b08db5275e0,2024-04-16T22:15:11.330000
|
||||
CVE-2024-0914,0,0,0e30b945bb509fa0d2bc0b307e8920a9ca89d326b7b4c1c386bc1b08db5275e0,2024-04-16T22:15:11.330000
|
||||
CVE-2024-0917,0,0,1096c18fb8e959955c123559a721fd9eb8bfd390fb54eac5e8167e50a31dc158,2024-03-07T15:15:08.257000
|
||||
CVE-2024-0918,0,0,665fb2ab3d0de8862f8c0f360fe055729484bae6812ecb9bc73647194d5411aa,2024-04-11T01:24:12.193000
|
||||
CVE-2024-0919,0,0,589179645f375446af0d6856749f5d8581b8fa706e54f9dca7ffc4f53fa26164,2024-04-11T01:24:12.283000
|
||||
@ -240193,7 +240193,7 @@ CVE-2024-20950,0,0,32c0f5cb59e7c130a00739028db90d5b34109b274bf0b583559e0ef0dda25
|
||||
CVE-2024-20951,0,0,b17c14c257c2e51309f12c914a15b8f22d172a66204fd5740f2d7618130689e5,2024-02-20T19:51:05.510000
|
||||
CVE-2024-20952,0,0,7957ba932035deb7b04bf9fd56a6980467fb3f16d0b62e00bf598071fcd8479f,2024-02-15T03:18:31.140000
|
||||
CVE-2024-20953,0,0,79439b14c378308eaeb3d77fa260d91a67ac61cdabeddcb908ef73ad775fa897,2024-02-20T19:51:05.510000
|
||||
CVE-2024-20954,1,1,1b3cff32868f8ef9fa8cab26659ccded6cdd335671f7807e559eeb06f28b071d,2024-04-16T22:15:11.570000
|
||||
CVE-2024-20954,0,0,1b3cff32868f8ef9fa8cab26659ccded6cdd335671f7807e559eeb06f28b071d,2024-04-16T22:15:11.570000
|
||||
CVE-2024-20955,0,0,05c43eead42002e8bf1c331a3e1f9e86bd97fbf64642fb46b8c945f04d3570a4,2024-02-09T02:26:25.517000
|
||||
CVE-2024-20956,0,0,4a89a3bb6eaf3756d6410a6795c8b17d6ca727f95abdba61f342d6ebe0a23c6d,2024-02-20T19:51:05.510000
|
||||
CVE-2024-20957,0,0,d1288734ff34c61b4455c5d61dc20cc713104f20309fe93a5491a293ace0102b,2024-01-20T18:31:43.287000
|
||||
@ -240228,145 +240228,145 @@ CVE-2024-20984,0,0,585d056539d5b2a7ec102aa133531262bc58f31d6c087eb30a1c927656ef9
|
||||
CVE-2024-20985,0,0,1887d4efcd4074083ed6001311349bddeba13ac350578caa9144fb2633e7d1e2,2024-02-02T17:27:12.127000
|
||||
CVE-2024-20986,0,0,55fd916bbc66a048aba24029df1cdbff6d17cbdc5963bc85efdc3f349c48d99c,2024-02-20T19:50:53.960000
|
||||
CVE-2024-20987,0,0,e6a4199f934ca8909c51db00ae903048e2b51791ebdf6565c06b10750c7af3ef,2024-01-20T18:30:16.877000
|
||||
CVE-2024-20989,1,1,24bd66160dcd01603ef9a4851c4e5500f60b712eab8cde5d6558188934f30cdc,2024-04-16T22:15:11.777000
|
||||
CVE-2024-20990,1,1,1f2b6c78c36b21b35c4cab89a838c9a38f38088c4a36c08aa77f1f65658e2112,2024-04-16T22:15:11.950000
|
||||
CVE-2024-20991,1,1,f7941a97e294f105dcd20a6671868dc0049be6e06eb929430f1c839415c2749b,2024-04-16T22:15:12.110000
|
||||
CVE-2024-20992,1,1,bb84e3a34b7d7232702fad67c49d8138a12244badca117134b7274064ac77153,2024-04-16T22:15:12.280000
|
||||
CVE-2024-20993,1,1,da89184bf9556231d8ffb00987f4a32f464b19ae4e05e44e8feb1fe98c3aebf1,2024-04-16T22:15:12.453000
|
||||
CVE-2024-20994,1,1,8bb0c6f9e9c9e2900660c0a56d574e56c5270083be86c93d88330070f8338576,2024-04-16T22:15:12.623000
|
||||
CVE-2024-20995,1,1,98b0651bae746f006582628d0a65c2eaaf6ce3de2c23eadbde7e9029acc0a35b,2024-04-16T22:15:12.793000
|
||||
CVE-2024-20997,1,1,b01de6bd0f3b1ccd4a1739b4ba353f58264a04c937a098746ad386fd9fd6e030,2024-04-16T22:15:12.970000
|
||||
CVE-2024-20998,1,1,dcaaa0d5cec4adbb2b67dee3b42c4cf6aa6c0406d43865be7ef359b1b61fe7fe,2024-04-16T22:15:13.140000
|
||||
CVE-2024-20999,1,1,5da01f1cdb292e263ab68d383757ae155303fc6a09aba69275d7eb6bb9513f3a,2024-04-16T22:15:13.350000
|
||||
CVE-2024-21000,1,1,b1e376ae55bf616084d4afc76bd91c2aeb3f1a482f42d2aa132d547fda429856,2024-04-16T22:15:13.520000
|
||||
CVE-2024-21001,1,1,2b4f89fa6de8475a4000712b6079e0b52b44ea7e7696fe0294ac7344afce2602,2024-04-16T22:15:13.687000
|
||||
CVE-2024-21002,1,1,ffbd432b8311304ca8ec20919b7812a33af6c33f7d61c53f1da75adb9e56a247,2024-04-16T22:15:13.870000
|
||||
CVE-2024-21003,1,1,00dd51a70fe0612321559d480def2ab7ce04633a9f1842b200ffeae1dba6cc44,2024-04-16T22:15:14.040000
|
||||
CVE-2024-21004,1,1,61ad4f441881a3344e339e3a481dd630541c6bcfe7d8765dc285e640d99166d3,2024-04-16T22:15:14.210000
|
||||
CVE-2024-21005,1,1,c2f9d72bf49b7451dd0149f8cf3c266ece3db56df05490ab87519b17dbab58eb,2024-04-16T22:15:14.373000
|
||||
CVE-2024-21006,1,1,5eec6ec005650cd1dbf142caefdbc17f2bedd7c06d8499db20672b0f536c4631,2024-04-16T22:15:14.580000
|
||||
CVE-2024-21007,1,1,2563c4d9da347d2a38b89329ea4e910efcfdb9494ef6408f0cc298fcbe8fd3c3,2024-04-16T22:15:14.750000
|
||||
CVE-2024-21008,1,1,e95becd4e783498ca54c433b1842c818ff2f7c3fd6420f710879bf3a514777fb,2024-04-16T22:15:14.920000
|
||||
CVE-2024-21009,1,1,9ddc1504b8228a31863180fe7fe1fa2f317c04b18cfdcdfe45e45611d7d9540d,2024-04-16T22:15:15.090000
|
||||
CVE-2024-21010,1,1,55c3a7d9f03e27fb74e2bc734e6bb2202aac2b7c31fe23512468ce93a5d8cfcd,2024-04-16T22:15:15.260000
|
||||
CVE-2024-21011,1,1,baa595ade65223b04108911c488632f6e636cd204ddbb3de01b96a559e2ec2b7,2024-04-16T22:15:15.437000
|
||||
CVE-2024-21012,1,1,1e371a0544b8df7e7282a19c4a4ba29026fb2118b4f7f0e52810b94d3fe65e5e,2024-04-16T22:15:15.617000
|
||||
CVE-2024-21013,1,1,e2e97914744a61b187d473751d0bf550616b97331057f1618c93fe66e5658f37,2024-04-16T22:15:15.793000
|
||||
CVE-2024-21014,1,1,96e5bc7a4bf50754d27227b9e23d97bae5459af5c4b4da7eebd614eec1522af8,2024-04-16T22:15:15.967000
|
||||
CVE-2024-21015,1,1,918463f0f050d0c7192efe1d2e4d2873c8f36172a550d9fd537585c771992484,2024-04-16T22:15:16.140000
|
||||
CVE-2024-21016,1,1,8b7bc3eb1bee49cdeabf4139f268ad0a541636915b570c6a67b2f4b706bad608,2024-04-16T22:15:16.310000
|
||||
CVE-2024-21017,1,1,5435ef4d7111abb27e9fef847b3abed74d61012b8af907690f7a72cf81d1aee3,2024-04-16T22:15:16.480000
|
||||
CVE-2024-21018,1,1,78de31f919dcc65a4219d6547ec52ce01c30507860361f753dea40cfc17b8a0d,2024-04-16T22:15:16.657000
|
||||
CVE-2024-21019,1,1,f0715b65c60bf947385aa8d018513125c7b48036a0336443cc8665884c0fec1a,2024-04-16T22:15:16.820000
|
||||
CVE-2024-21020,1,1,4aaf81679ff1c2c4fd145b00a9453cb7bab62b5e02f3631293c53cad03e2b962,2024-04-16T22:15:16.990000
|
||||
CVE-2024-21021,1,1,6b332607f787e62c7b0abda7b49fbedb9c0789c078796ec62ae6cbbd3dfd5201,2024-04-16T22:15:17.153000
|
||||
CVE-2024-21022,1,1,083f86f4f8106af6fa9f026c2d8ac4ecc2a0f155e977c01b8b5f1e99a0b09eaa,2024-04-16T22:15:17.323000
|
||||
CVE-2024-21023,1,1,1bf558977a9ac806d1b5707b479369cfec8ec96f8f7d9da8c979f5eebe4cd37a,2024-04-16T22:15:17.490000
|
||||
CVE-2024-21024,1,1,f63e04db3cd79d18d5d0ecbe868c78eedd4c4e709c16f6e6ebbf974eed6765e9,2024-04-16T22:15:17.663000
|
||||
CVE-2024-21025,1,1,1f485c124b14e70f2369d7154d807b46e0d751540ecffd50879fbb0e0a5833fd,2024-04-16T22:15:17.837000
|
||||
CVE-2024-21026,1,1,d4b80277d1390010d34c451606fdffeb4200521fcd228a8babeb84318cd3dead,2024-04-16T22:15:18.020000
|
||||
CVE-2024-21027,1,1,22d31dd80df37759e955cfde910e4176d29d728b2f495495cec60a082b2ed598,2024-04-16T22:15:18.183000
|
||||
CVE-2024-21028,1,1,301b880241f9e9057e79dc58e33941db3709e174a9b569f580d833c972d9fcbc,2024-04-16T22:15:18.350000
|
||||
CVE-2024-21029,1,1,0d090e2bc38ab4004c6c5deb491a06c754995b12bd1e8d5adb04366bb73e2b5f,2024-04-16T22:15:18.527000
|
||||
CVE-2024-20989,0,0,24bd66160dcd01603ef9a4851c4e5500f60b712eab8cde5d6558188934f30cdc,2024-04-16T22:15:11.777000
|
||||
CVE-2024-20990,0,0,1f2b6c78c36b21b35c4cab89a838c9a38f38088c4a36c08aa77f1f65658e2112,2024-04-16T22:15:11.950000
|
||||
CVE-2024-20991,0,0,f7941a97e294f105dcd20a6671868dc0049be6e06eb929430f1c839415c2749b,2024-04-16T22:15:12.110000
|
||||
CVE-2024-20992,0,0,bb84e3a34b7d7232702fad67c49d8138a12244badca117134b7274064ac77153,2024-04-16T22:15:12.280000
|
||||
CVE-2024-20993,0,0,da89184bf9556231d8ffb00987f4a32f464b19ae4e05e44e8feb1fe98c3aebf1,2024-04-16T22:15:12.453000
|
||||
CVE-2024-20994,0,0,8bb0c6f9e9c9e2900660c0a56d574e56c5270083be86c93d88330070f8338576,2024-04-16T22:15:12.623000
|
||||
CVE-2024-20995,0,0,98b0651bae746f006582628d0a65c2eaaf6ce3de2c23eadbde7e9029acc0a35b,2024-04-16T22:15:12.793000
|
||||
CVE-2024-20997,0,0,b01de6bd0f3b1ccd4a1739b4ba353f58264a04c937a098746ad386fd9fd6e030,2024-04-16T22:15:12.970000
|
||||
CVE-2024-20998,0,0,dcaaa0d5cec4adbb2b67dee3b42c4cf6aa6c0406d43865be7ef359b1b61fe7fe,2024-04-16T22:15:13.140000
|
||||
CVE-2024-20999,0,0,5da01f1cdb292e263ab68d383757ae155303fc6a09aba69275d7eb6bb9513f3a,2024-04-16T22:15:13.350000
|
||||
CVE-2024-21000,0,0,b1e376ae55bf616084d4afc76bd91c2aeb3f1a482f42d2aa132d547fda429856,2024-04-16T22:15:13.520000
|
||||
CVE-2024-21001,0,0,2b4f89fa6de8475a4000712b6079e0b52b44ea7e7696fe0294ac7344afce2602,2024-04-16T22:15:13.687000
|
||||
CVE-2024-21002,0,0,ffbd432b8311304ca8ec20919b7812a33af6c33f7d61c53f1da75adb9e56a247,2024-04-16T22:15:13.870000
|
||||
CVE-2024-21003,0,0,00dd51a70fe0612321559d480def2ab7ce04633a9f1842b200ffeae1dba6cc44,2024-04-16T22:15:14.040000
|
||||
CVE-2024-21004,0,0,61ad4f441881a3344e339e3a481dd630541c6bcfe7d8765dc285e640d99166d3,2024-04-16T22:15:14.210000
|
||||
CVE-2024-21005,0,0,c2f9d72bf49b7451dd0149f8cf3c266ece3db56df05490ab87519b17dbab58eb,2024-04-16T22:15:14.373000
|
||||
CVE-2024-21006,0,0,5eec6ec005650cd1dbf142caefdbc17f2bedd7c06d8499db20672b0f536c4631,2024-04-16T22:15:14.580000
|
||||
CVE-2024-21007,0,0,2563c4d9da347d2a38b89329ea4e910efcfdb9494ef6408f0cc298fcbe8fd3c3,2024-04-16T22:15:14.750000
|
||||
CVE-2024-21008,0,0,e95becd4e783498ca54c433b1842c818ff2f7c3fd6420f710879bf3a514777fb,2024-04-16T22:15:14.920000
|
||||
CVE-2024-21009,0,0,9ddc1504b8228a31863180fe7fe1fa2f317c04b18cfdcdfe45e45611d7d9540d,2024-04-16T22:15:15.090000
|
||||
CVE-2024-21010,0,0,55c3a7d9f03e27fb74e2bc734e6bb2202aac2b7c31fe23512468ce93a5d8cfcd,2024-04-16T22:15:15.260000
|
||||
CVE-2024-21011,0,0,baa595ade65223b04108911c488632f6e636cd204ddbb3de01b96a559e2ec2b7,2024-04-16T22:15:15.437000
|
||||
CVE-2024-21012,0,0,1e371a0544b8df7e7282a19c4a4ba29026fb2118b4f7f0e52810b94d3fe65e5e,2024-04-16T22:15:15.617000
|
||||
CVE-2024-21013,0,0,e2e97914744a61b187d473751d0bf550616b97331057f1618c93fe66e5658f37,2024-04-16T22:15:15.793000
|
||||
CVE-2024-21014,0,0,96e5bc7a4bf50754d27227b9e23d97bae5459af5c4b4da7eebd614eec1522af8,2024-04-16T22:15:15.967000
|
||||
CVE-2024-21015,0,0,918463f0f050d0c7192efe1d2e4d2873c8f36172a550d9fd537585c771992484,2024-04-16T22:15:16.140000
|
||||
CVE-2024-21016,0,0,8b7bc3eb1bee49cdeabf4139f268ad0a541636915b570c6a67b2f4b706bad608,2024-04-16T22:15:16.310000
|
||||
CVE-2024-21017,0,0,5435ef4d7111abb27e9fef847b3abed74d61012b8af907690f7a72cf81d1aee3,2024-04-16T22:15:16.480000
|
||||
CVE-2024-21018,0,0,78de31f919dcc65a4219d6547ec52ce01c30507860361f753dea40cfc17b8a0d,2024-04-16T22:15:16.657000
|
||||
CVE-2024-21019,0,0,f0715b65c60bf947385aa8d018513125c7b48036a0336443cc8665884c0fec1a,2024-04-16T22:15:16.820000
|
||||
CVE-2024-21020,0,0,4aaf81679ff1c2c4fd145b00a9453cb7bab62b5e02f3631293c53cad03e2b962,2024-04-16T22:15:16.990000
|
||||
CVE-2024-21021,0,0,6b332607f787e62c7b0abda7b49fbedb9c0789c078796ec62ae6cbbd3dfd5201,2024-04-16T22:15:17.153000
|
||||
CVE-2024-21022,0,0,083f86f4f8106af6fa9f026c2d8ac4ecc2a0f155e977c01b8b5f1e99a0b09eaa,2024-04-16T22:15:17.323000
|
||||
CVE-2024-21023,0,0,1bf558977a9ac806d1b5707b479369cfec8ec96f8f7d9da8c979f5eebe4cd37a,2024-04-16T22:15:17.490000
|
||||
CVE-2024-21024,0,0,f63e04db3cd79d18d5d0ecbe868c78eedd4c4e709c16f6e6ebbf974eed6765e9,2024-04-16T22:15:17.663000
|
||||
CVE-2024-21025,0,0,1f485c124b14e70f2369d7154d807b46e0d751540ecffd50879fbb0e0a5833fd,2024-04-16T22:15:17.837000
|
||||
CVE-2024-21026,0,0,d4b80277d1390010d34c451606fdffeb4200521fcd228a8babeb84318cd3dead,2024-04-16T22:15:18.020000
|
||||
CVE-2024-21027,0,0,22d31dd80df37759e955cfde910e4176d29d728b2f495495cec60a082b2ed598,2024-04-16T22:15:18.183000
|
||||
CVE-2024-21028,0,0,301b880241f9e9057e79dc58e33941db3709e174a9b569f580d833c972d9fcbc,2024-04-16T22:15:18.350000
|
||||
CVE-2024-21029,0,0,0d090e2bc38ab4004c6c5deb491a06c754995b12bd1e8d5adb04366bb73e2b5f,2024-04-16T22:15:18.527000
|
||||
CVE-2024-2103,0,0,4357f6f4848f7c5880c727dbfe8b97df3dcf5303e95d5a7ff4fdf7062d775ac8,2024-04-04T16:33:06.610000
|
||||
CVE-2024-21030,1,1,8c75cd82a8f7d8f0b15936cf6d46098c24517c837abffed713e5bd945e38d83b,2024-04-16T22:15:18.693000
|
||||
CVE-2024-21031,1,1,c3e812d2f8e98cd59e9540c74d0e9cb553f5ece98d75925a1b56d3bbce361cd2,2024-04-16T22:15:18.863000
|
||||
CVE-2024-21032,1,1,499cb3f8741ca1f408c1dcd3c8d692ae1425cdc63f5559df15066477b0dc19ba,2024-04-16T22:15:19.037000
|
||||
CVE-2024-21033,1,1,36a7a29b617aa82862f772ac68dfac89363af58e6785de33e573f8e9de5a8eef,2024-04-16T22:15:19.210000
|
||||
CVE-2024-21034,1,1,96b1b958abb28057efb16bf53f9081378e1a8597a26e68bf2ff74d6e74ffd1d1,2024-04-16T22:15:19.390000
|
||||
CVE-2024-21035,1,1,8ac65dec34215388d64935bd78bb407e666777cfaa56822d31f5d358af6e1703,2024-04-16T22:15:19.597000
|
||||
CVE-2024-21036,1,1,dfb62af68cf8f5531d93994ea82cf061a87328cfbee66223e1ad40c35760ee84,2024-04-16T22:15:19.760000
|
||||
CVE-2024-21037,1,1,afa37d25738d1d39f16f2d11e420320b2c4db922bfbda666d8a23aee4e319893,2024-04-16T22:15:19.927000
|
||||
CVE-2024-21038,1,1,dac915e59cabfb89e49d571f6a56814b47a31584a817f2ba1defb6ea2b194cd0,2024-04-16T22:15:20.093000
|
||||
CVE-2024-21039,1,1,10c002d202bcb8f75d80fbc44d870be2bd541f746a3e99df7badd5aec0381758,2024-04-16T22:15:20.260000
|
||||
CVE-2024-21040,1,1,8015f1922e39d2758e23274ad121b8562da082d2d16784253be3d7334eae36bb,2024-04-16T22:15:20.427000
|
||||
CVE-2024-21041,1,1,9873619ff3ccc808457024a3e299af127d4cd31d336f9b4bf19b0afc66c97716,2024-04-16T22:15:20.597000
|
||||
CVE-2024-21042,1,1,4fc812d7abc6f1a7d636889bf11cf3936cf019b65645c751c48e7fa624409187,2024-04-16T22:15:20.773000
|
||||
CVE-2024-21043,1,1,dcfbc27b4e7222c1224ffa3288921051b06130e94ff55574e264140a91e90396,2024-04-16T22:15:20.943000
|
||||
CVE-2024-21044,1,1,790353004fa605e951782be705be4dcba3252301003564ca908360f3680aaf3b,2024-04-16T22:15:21.110000
|
||||
CVE-2024-21045,1,1,0970dedfc25c26e9989960e5bf6a924f819d62e089aa4d68300d517eee99c858,2024-04-16T22:15:21.287000
|
||||
CVE-2024-21046,1,1,0e9cbe2c07294db14dab6bbcef2dcdb15b4af36a0279e290c37493804747890c,2024-04-16T22:15:21.460000
|
||||
CVE-2024-21047,1,1,825793c807831c0337a4fdabe2fc398ca366be96d6b0fcd2e453207aee55e1d4,2024-04-16T22:15:21.643000
|
||||
CVE-2024-21048,1,1,6fc80fd63f07c5f81a654ccaf350b061a6d70adad335bd2b377644e3cb63173f,2024-04-16T22:15:21.810000
|
||||
CVE-2024-21049,1,1,062a98d80f686aa654f81f8f28b989eacb62bf1b30a7d30cddc300418d7e2855,2024-04-16T22:15:21.990000
|
||||
CVE-2024-21050,1,1,c7967f475ab5b694532d707ab2561ebfd794b9cf6a29ab2bcdbce77a989a5b83,2024-04-16T22:15:22.157000
|
||||
CVE-2024-21051,1,1,bfcbbd2f3e85d7953d1436f3cf7c2c6f02b0f2977632fca40758580128f7112d,2024-04-16T22:15:22.330000
|
||||
CVE-2024-21052,1,1,ae16c308947c086073bb6d5e0f4ac12dd9329b0ca8c55fdb909fdd75ea492e19,2024-04-16T22:15:22.500000
|
||||
CVE-2024-21053,1,1,755e699b39ad98f6e83a02ac9f41f5c69bd3030c128249a1025cd68e2dd962dc,2024-04-16T22:15:22.673000
|
||||
CVE-2024-21054,1,1,5392b2f1a92dfa22b4167767b909f7c0c1a3e0addbaac0cd74f99df10664013c,2024-04-16T22:15:22.840000
|
||||
CVE-2024-21055,1,1,d87b01faf34859398519021f0c35bc98385c0588792b07e6a4dc7f20508bec9a,2024-04-16T22:15:23.010000
|
||||
CVE-2024-21056,1,1,a31cbb0adfdf342a78b978d6813898086c6ecd42d5a8cb9c6dd380f29845de8e,2024-04-16T22:15:23.183000
|
||||
CVE-2024-21057,1,1,f7d92b4b5c779319636a820a9209f8646e774bf5819a744395f1b5b2ad706229,2024-04-16T22:15:23.350000
|
||||
CVE-2024-21058,1,1,5905a9d121afbaf74301e0c7ae0502ddc1e6e69dde9f71547f594e81858a270a,2024-04-16T22:15:23.570000
|
||||
CVE-2024-21059,1,1,649b4a7d796567ae5bbc4dd91d5af813f6b4d96443dd524c48e374c518e7f97c,2024-04-16T22:15:23.740000
|
||||
CVE-2024-21030,0,0,8c75cd82a8f7d8f0b15936cf6d46098c24517c837abffed713e5bd945e38d83b,2024-04-16T22:15:18.693000
|
||||
CVE-2024-21031,0,0,c3e812d2f8e98cd59e9540c74d0e9cb553f5ece98d75925a1b56d3bbce361cd2,2024-04-16T22:15:18.863000
|
||||
CVE-2024-21032,0,0,499cb3f8741ca1f408c1dcd3c8d692ae1425cdc63f5559df15066477b0dc19ba,2024-04-16T22:15:19.037000
|
||||
CVE-2024-21033,0,0,36a7a29b617aa82862f772ac68dfac89363af58e6785de33e573f8e9de5a8eef,2024-04-16T22:15:19.210000
|
||||
CVE-2024-21034,0,0,96b1b958abb28057efb16bf53f9081378e1a8597a26e68bf2ff74d6e74ffd1d1,2024-04-16T22:15:19.390000
|
||||
CVE-2024-21035,0,0,8ac65dec34215388d64935bd78bb407e666777cfaa56822d31f5d358af6e1703,2024-04-16T22:15:19.597000
|
||||
CVE-2024-21036,0,0,dfb62af68cf8f5531d93994ea82cf061a87328cfbee66223e1ad40c35760ee84,2024-04-16T22:15:19.760000
|
||||
CVE-2024-21037,0,0,afa37d25738d1d39f16f2d11e420320b2c4db922bfbda666d8a23aee4e319893,2024-04-16T22:15:19.927000
|
||||
CVE-2024-21038,0,0,dac915e59cabfb89e49d571f6a56814b47a31584a817f2ba1defb6ea2b194cd0,2024-04-16T22:15:20.093000
|
||||
CVE-2024-21039,0,0,10c002d202bcb8f75d80fbc44d870be2bd541f746a3e99df7badd5aec0381758,2024-04-16T22:15:20.260000
|
||||
CVE-2024-21040,0,0,8015f1922e39d2758e23274ad121b8562da082d2d16784253be3d7334eae36bb,2024-04-16T22:15:20.427000
|
||||
CVE-2024-21041,0,0,9873619ff3ccc808457024a3e299af127d4cd31d336f9b4bf19b0afc66c97716,2024-04-16T22:15:20.597000
|
||||
CVE-2024-21042,0,0,4fc812d7abc6f1a7d636889bf11cf3936cf019b65645c751c48e7fa624409187,2024-04-16T22:15:20.773000
|
||||
CVE-2024-21043,0,0,dcfbc27b4e7222c1224ffa3288921051b06130e94ff55574e264140a91e90396,2024-04-16T22:15:20.943000
|
||||
CVE-2024-21044,0,0,790353004fa605e951782be705be4dcba3252301003564ca908360f3680aaf3b,2024-04-16T22:15:21.110000
|
||||
CVE-2024-21045,0,0,0970dedfc25c26e9989960e5bf6a924f819d62e089aa4d68300d517eee99c858,2024-04-16T22:15:21.287000
|
||||
CVE-2024-21046,0,0,0e9cbe2c07294db14dab6bbcef2dcdb15b4af36a0279e290c37493804747890c,2024-04-16T22:15:21.460000
|
||||
CVE-2024-21047,0,0,825793c807831c0337a4fdabe2fc398ca366be96d6b0fcd2e453207aee55e1d4,2024-04-16T22:15:21.643000
|
||||
CVE-2024-21048,0,0,6fc80fd63f07c5f81a654ccaf350b061a6d70adad335bd2b377644e3cb63173f,2024-04-16T22:15:21.810000
|
||||
CVE-2024-21049,0,0,062a98d80f686aa654f81f8f28b989eacb62bf1b30a7d30cddc300418d7e2855,2024-04-16T22:15:21.990000
|
||||
CVE-2024-21050,0,0,c7967f475ab5b694532d707ab2561ebfd794b9cf6a29ab2bcdbce77a989a5b83,2024-04-16T22:15:22.157000
|
||||
CVE-2024-21051,0,0,bfcbbd2f3e85d7953d1436f3cf7c2c6f02b0f2977632fca40758580128f7112d,2024-04-16T22:15:22.330000
|
||||
CVE-2024-21052,0,0,ae16c308947c086073bb6d5e0f4ac12dd9329b0ca8c55fdb909fdd75ea492e19,2024-04-16T22:15:22.500000
|
||||
CVE-2024-21053,0,0,755e699b39ad98f6e83a02ac9f41f5c69bd3030c128249a1025cd68e2dd962dc,2024-04-16T22:15:22.673000
|
||||
CVE-2024-21054,0,0,5392b2f1a92dfa22b4167767b909f7c0c1a3e0addbaac0cd74f99df10664013c,2024-04-16T22:15:22.840000
|
||||
CVE-2024-21055,0,0,d87b01faf34859398519021f0c35bc98385c0588792b07e6a4dc7f20508bec9a,2024-04-16T22:15:23.010000
|
||||
CVE-2024-21056,0,0,a31cbb0adfdf342a78b978d6813898086c6ecd42d5a8cb9c6dd380f29845de8e,2024-04-16T22:15:23.183000
|
||||
CVE-2024-21057,0,0,f7d92b4b5c779319636a820a9209f8646e774bf5819a744395f1b5b2ad706229,2024-04-16T22:15:23.350000
|
||||
CVE-2024-21058,0,0,5905a9d121afbaf74301e0c7ae0502ddc1e6e69dde9f71547f594e81858a270a,2024-04-16T22:15:23.570000
|
||||
CVE-2024-21059,0,0,649b4a7d796567ae5bbc4dd91d5af813f6b4d96443dd524c48e374c518e7f97c,2024-04-16T22:15:23.740000
|
||||
CVE-2024-2106,0,0,15de6b929ace188c18cf26b3c461a92f15449ebc8c35903dbddfc1b7b27db756,2024-03-13T18:15:58.530000
|
||||
CVE-2024-21060,1,1,9df78d1ff9b465d287a4dd45147bcaccecd135238082a5b8af90c54a70f4cf11,2024-04-16T22:15:23.910000
|
||||
CVE-2024-21061,1,1,1e0b82d131b021430ce55c8a53a9f066559ac19abb645545241777d555c24bf7,2024-04-16T22:15:24.080000
|
||||
CVE-2024-21062,1,1,9790253ba053a45bbf42752fe93f570398dfb5936bd5c386018a7eac7055ce31,2024-04-16T22:15:24.247000
|
||||
CVE-2024-21063,1,1,3fc41f5e5c2dafb9b60cdd2e3f7c5d5c79c15ee9c491854dbc50b0a819c01b2d,2024-04-16T22:15:24.417000
|
||||
CVE-2024-21064,1,1,a7cdbf2d59c586eea5f775e8c2b39cd9f279eebbf0087251f078c5d617b4281e,2024-04-16T22:15:24.607000
|
||||
CVE-2024-21065,1,1,66abc7dfaa92be88296241fef613906ee3919bbf7d1def9a1cb3fec2d7653199,2024-04-16T22:15:24.780000
|
||||
CVE-2024-21066,1,1,142a6c2265900556cceab9d34617e3718b7776013c65658bcfb46ccbfb3459e4,2024-04-16T22:15:24.957000
|
||||
CVE-2024-21067,1,1,5cc627357fc8705043284fe3ac0733a2da14d61428d3e0f80bd2f6b5eb1f63c6,2024-04-16T22:15:25.123000
|
||||
CVE-2024-21068,1,1,4a7ac2cd2111973cd960c934dfef9cae24d6fd76bd51bc6550d90c4eb95bf2da,2024-04-16T22:15:25.307000
|
||||
CVE-2024-21069,1,1,0f3be47ebd42a12c253d947c093ea23553811150722322db34df1f26b0ec38e9,2024-04-16T22:15:25.473000
|
||||
CVE-2024-21060,0,0,9df78d1ff9b465d287a4dd45147bcaccecd135238082a5b8af90c54a70f4cf11,2024-04-16T22:15:23.910000
|
||||
CVE-2024-21061,0,0,1e0b82d131b021430ce55c8a53a9f066559ac19abb645545241777d555c24bf7,2024-04-16T22:15:24.080000
|
||||
CVE-2024-21062,0,0,9790253ba053a45bbf42752fe93f570398dfb5936bd5c386018a7eac7055ce31,2024-04-16T22:15:24.247000
|
||||
CVE-2024-21063,0,0,3fc41f5e5c2dafb9b60cdd2e3f7c5d5c79c15ee9c491854dbc50b0a819c01b2d,2024-04-16T22:15:24.417000
|
||||
CVE-2024-21064,0,0,a7cdbf2d59c586eea5f775e8c2b39cd9f279eebbf0087251f078c5d617b4281e,2024-04-16T22:15:24.607000
|
||||
CVE-2024-21065,0,0,66abc7dfaa92be88296241fef613906ee3919bbf7d1def9a1cb3fec2d7653199,2024-04-16T22:15:24.780000
|
||||
CVE-2024-21066,0,0,142a6c2265900556cceab9d34617e3718b7776013c65658bcfb46ccbfb3459e4,2024-04-16T22:15:24.957000
|
||||
CVE-2024-21067,0,0,5cc627357fc8705043284fe3ac0733a2da14d61428d3e0f80bd2f6b5eb1f63c6,2024-04-16T22:15:25.123000
|
||||
CVE-2024-21068,0,0,4a7ac2cd2111973cd960c934dfef9cae24d6fd76bd51bc6550d90c4eb95bf2da,2024-04-16T22:15:25.307000
|
||||
CVE-2024-21069,0,0,0f3be47ebd42a12c253d947c093ea23553811150722322db34df1f26b0ec38e9,2024-04-16T22:15:25.473000
|
||||
CVE-2024-2107,0,0,b116f601239eee1477d732dcdf4bd402d2ca5c711c20a89df0a8e9dd54cd4cd1,2024-03-13T12:33:51.697000
|
||||
CVE-2024-21070,1,1,efd8cac87e4b6da969debbe0a140a4b8cf90336f73c54d3bfbed050f9e18fbcd,2024-04-16T22:15:25.650000
|
||||
CVE-2024-21071,1,1,46ceee7198115f41553c9a4513d77ca9512e88fadb7ce8a9bb7560ea54d257e2,2024-04-16T22:15:25.837000
|
||||
CVE-2024-21072,1,1,a5a23651b65a242cbdbea488e766975d61a50d5b8428cb49079af082fa564b85,2024-04-16T22:15:26.020000
|
||||
CVE-2024-21073,1,1,a33d6d3f5ed3702aac4f54ec2fbb4350eca86125bc5e729be5e7fd2c02049648,2024-04-16T22:15:26.190000
|
||||
CVE-2024-21074,1,1,33402acef89bc334aaa9262a840014354db29f887e67f0a4b3df7d08c1c8904d,2024-04-16T22:15:26.370000
|
||||
CVE-2024-21075,1,1,0154f56151613c02ebab5ba51ece2900aa4b64e839725850bf78d1e03a203244,2024-04-16T22:15:26.543000
|
||||
CVE-2024-21076,1,1,8178fc4edd062f46988f1f4a8fc5aa3a3dcd627f8acccbcaaf2995f47a7427be,2024-04-16T22:15:26.720000
|
||||
CVE-2024-21077,1,1,9f8288887c7e0f6f240f2c7e84265acd75eb9222bd2398ddc131e30468a18b00,2024-04-16T22:15:26.887000
|
||||
CVE-2024-21078,1,1,3c7874e58f4fadbde5ecadf75319f5edf7b070595241da7671d167425b08e65d,2024-04-16T22:15:27.060000
|
||||
CVE-2024-21079,1,1,bcaa3d01504f3aed2cbc5f2ca4da14aef825373b3a007dd2cc7b568241cb8430,2024-04-16T22:15:27.240000
|
||||
CVE-2024-21070,0,0,efd8cac87e4b6da969debbe0a140a4b8cf90336f73c54d3bfbed050f9e18fbcd,2024-04-16T22:15:25.650000
|
||||
CVE-2024-21071,0,0,46ceee7198115f41553c9a4513d77ca9512e88fadb7ce8a9bb7560ea54d257e2,2024-04-16T22:15:25.837000
|
||||
CVE-2024-21072,0,0,a5a23651b65a242cbdbea488e766975d61a50d5b8428cb49079af082fa564b85,2024-04-16T22:15:26.020000
|
||||
CVE-2024-21073,0,0,a33d6d3f5ed3702aac4f54ec2fbb4350eca86125bc5e729be5e7fd2c02049648,2024-04-16T22:15:26.190000
|
||||
CVE-2024-21074,0,0,33402acef89bc334aaa9262a840014354db29f887e67f0a4b3df7d08c1c8904d,2024-04-16T22:15:26.370000
|
||||
CVE-2024-21075,0,0,0154f56151613c02ebab5ba51ece2900aa4b64e839725850bf78d1e03a203244,2024-04-16T22:15:26.543000
|
||||
CVE-2024-21076,0,0,8178fc4edd062f46988f1f4a8fc5aa3a3dcd627f8acccbcaaf2995f47a7427be,2024-04-16T22:15:26.720000
|
||||
CVE-2024-21077,0,0,9f8288887c7e0f6f240f2c7e84265acd75eb9222bd2398ddc131e30468a18b00,2024-04-16T22:15:26.887000
|
||||
CVE-2024-21078,0,0,3c7874e58f4fadbde5ecadf75319f5edf7b070595241da7671d167425b08e65d,2024-04-16T22:15:27.060000
|
||||
CVE-2024-21079,0,0,bcaa3d01504f3aed2cbc5f2ca4da14aef825373b3a007dd2cc7b568241cb8430,2024-04-16T22:15:27.240000
|
||||
CVE-2024-2108,0,0,c2fa70d90e7c92604d37599b63a68c51b88c7a208a94e63da1f79da8e05cb6df,2024-03-29T12:45:02.937000
|
||||
CVE-2024-21080,1,1,506419e11331ff72984bd09d104ddfe8685395520d5ac80e14ff8ac5c84f146a,2024-04-16T22:15:27.423000
|
||||
CVE-2024-21081,1,1,c78792c3f39afcafd60c219866fcb36a956c9832eb232c1c9572078f4a08591f,2024-04-16T22:15:27.603000
|
||||
CVE-2024-21082,1,1,f77a83ec86ff9b5f2d6e391b9cb694374233861e4c5c3fa975801495ab6d0945,2024-04-16T22:15:27.780000
|
||||
CVE-2024-21083,1,1,d6b534689283c95fe2b039fcd8320a8b62a66467491e84d71e1a15629f01ad6e,2024-04-16T22:15:27.953000
|
||||
CVE-2024-21084,1,1,ee870ceef89faae38b5dbb3a6fa9b59b95fe76200d0900e5677448159984ef74,2024-04-16T22:15:28.120000
|
||||
CVE-2024-21085,1,1,9d0b2d426030a9f3752e6427374ef5c9f91de6303cceae89f8ac1d22cf81328b,2024-04-16T22:15:28.293000
|
||||
CVE-2024-21086,1,1,6853eabdf6278c42c8c09baa0d58fb8d7f1fdc7db51716ad01dd11f4af81b5b8,2024-04-16T22:15:28.463000
|
||||
CVE-2024-21087,1,1,d57791a54bf642931823a35d535e7d3861ad9e5954f4c08104a213f7d0727123,2024-04-16T22:15:28.640000
|
||||
CVE-2024-21088,1,1,a17f0514cf39facf253ab84a17038520bcda32765ac857f2e9ca82a2d3747707,2024-04-16T22:15:28.810000
|
||||
CVE-2024-21089,1,1,11b7c05221b35bd34f660a7b0e940ed9dc2f1b267cbaa4da4c10375f3092eeb3,2024-04-16T22:15:28.987000
|
||||
CVE-2024-21090,1,1,17abdd47766ba0094990fee4939ca5978b7b4533e55387f5f4311b4ab060b463,2024-04-16T22:15:29.153000
|
||||
CVE-2024-21091,1,1,d6dbb8737d85b2225cd3f1b3f4c9826ce57f22a6b3a1e3b614145c320433aeaa,2024-04-16T22:15:29.330000
|
||||
CVE-2024-21092,1,1,13085862dff2d0d70db5aa721df742e4e34ce1681e25ec40439b4c18d8d3bcaa,2024-04-16T22:15:29.493000
|
||||
CVE-2024-21093,1,1,83caaf46648b865a9b93f059bba012ab6371fb67867e0257bd7db50f6b1ecb45,2024-04-16T22:15:29.680000
|
||||
CVE-2024-21094,1,1,d45c5c7fdff8ceb77f69fed7be619e733c1f374b12a101801bcb3d8a0fa5a058,2024-04-16T22:15:29.857000
|
||||
CVE-2024-21095,1,1,4a1307ede28bcbfae60740f652030296311b8a6695d957880f6afbd5763e3484,2024-04-16T22:15:30.040000
|
||||
CVE-2024-21096,1,1,b459d73844b617138fd2760b366425e31127d445372fe6288f31c0f80920c608,2024-04-16T22:15:30.207000
|
||||
CVE-2024-21097,1,1,72f738b57505568a478ea2c60de7646fb54315315e48f1ba93269cb0c7504343,2024-04-16T22:15:30.380000
|
||||
CVE-2024-21098,1,1,df96563fb2f29cc30f31fc03506f044869b8557678039a960dc67e5c8597b05b,2024-04-16T22:15:30.550000
|
||||
CVE-2024-21099,1,1,015efa8e047defa6fcb6c22808377bb6c664ae72f397170368741fec56beaab9,2024-04-16T22:15:30.723000
|
||||
CVE-2024-21080,0,0,506419e11331ff72984bd09d104ddfe8685395520d5ac80e14ff8ac5c84f146a,2024-04-16T22:15:27.423000
|
||||
CVE-2024-21081,0,0,c78792c3f39afcafd60c219866fcb36a956c9832eb232c1c9572078f4a08591f,2024-04-16T22:15:27.603000
|
||||
CVE-2024-21082,0,0,f77a83ec86ff9b5f2d6e391b9cb694374233861e4c5c3fa975801495ab6d0945,2024-04-16T22:15:27.780000
|
||||
CVE-2024-21083,0,0,d6b534689283c95fe2b039fcd8320a8b62a66467491e84d71e1a15629f01ad6e,2024-04-16T22:15:27.953000
|
||||
CVE-2024-21084,0,0,ee870ceef89faae38b5dbb3a6fa9b59b95fe76200d0900e5677448159984ef74,2024-04-16T22:15:28.120000
|
||||
CVE-2024-21085,0,0,9d0b2d426030a9f3752e6427374ef5c9f91de6303cceae89f8ac1d22cf81328b,2024-04-16T22:15:28.293000
|
||||
CVE-2024-21086,0,0,6853eabdf6278c42c8c09baa0d58fb8d7f1fdc7db51716ad01dd11f4af81b5b8,2024-04-16T22:15:28.463000
|
||||
CVE-2024-21087,0,0,d57791a54bf642931823a35d535e7d3861ad9e5954f4c08104a213f7d0727123,2024-04-16T22:15:28.640000
|
||||
CVE-2024-21088,0,0,a17f0514cf39facf253ab84a17038520bcda32765ac857f2e9ca82a2d3747707,2024-04-16T22:15:28.810000
|
||||
CVE-2024-21089,0,0,11b7c05221b35bd34f660a7b0e940ed9dc2f1b267cbaa4da4c10375f3092eeb3,2024-04-16T22:15:28.987000
|
||||
CVE-2024-21090,0,0,17abdd47766ba0094990fee4939ca5978b7b4533e55387f5f4311b4ab060b463,2024-04-16T22:15:29.153000
|
||||
CVE-2024-21091,0,0,d6dbb8737d85b2225cd3f1b3f4c9826ce57f22a6b3a1e3b614145c320433aeaa,2024-04-16T22:15:29.330000
|
||||
CVE-2024-21092,0,0,13085862dff2d0d70db5aa721df742e4e34ce1681e25ec40439b4c18d8d3bcaa,2024-04-16T22:15:29.493000
|
||||
CVE-2024-21093,0,0,83caaf46648b865a9b93f059bba012ab6371fb67867e0257bd7db50f6b1ecb45,2024-04-16T22:15:29.680000
|
||||
CVE-2024-21094,0,0,d45c5c7fdff8ceb77f69fed7be619e733c1f374b12a101801bcb3d8a0fa5a058,2024-04-16T22:15:29.857000
|
||||
CVE-2024-21095,0,0,4a1307ede28bcbfae60740f652030296311b8a6695d957880f6afbd5763e3484,2024-04-16T22:15:30.040000
|
||||
CVE-2024-21096,0,0,b459d73844b617138fd2760b366425e31127d445372fe6288f31c0f80920c608,2024-04-16T22:15:30.207000
|
||||
CVE-2024-21097,0,0,72f738b57505568a478ea2c60de7646fb54315315e48f1ba93269cb0c7504343,2024-04-16T22:15:30.380000
|
||||
CVE-2024-21098,0,0,df96563fb2f29cc30f31fc03506f044869b8557678039a960dc67e5c8597b05b,2024-04-16T22:15:30.550000
|
||||
CVE-2024-21099,0,0,015efa8e047defa6fcb6c22808377bb6c664ae72f397170368741fec56beaab9,2024-04-16T22:15:30.723000
|
||||
CVE-2024-2110,0,0,1d85de629a97570a97242f5d089550bba2e60a5923838c39c1151e294a5fdcf3,2024-03-28T12:42:56.150000
|
||||
CVE-2024-21100,1,1,65f4b990e5c1177693d8150b3620f028429badd2cbf28cb68593cd12826b98c8,2024-04-16T22:15:30.903000
|
||||
CVE-2024-21101,1,1,205a96dc7470fb351180145d3cdce7c7c9eb3c6592002c301b60500c4d3862a4,2024-04-16T22:15:31.087000
|
||||
CVE-2024-21102,1,1,fd6ecddf13e9f1b717eb08fc04a6df95beee401cfbf15a3bb4c954281f0def93,2024-04-16T22:15:31.270000
|
||||
CVE-2024-21103,1,1,7fe0cd3d775f2d4929321cd1e91952fb9e796e3cca582eab936d6b1a6bc8789f,2024-04-16T22:15:31.437000
|
||||
CVE-2024-21104,1,1,7d3bbe7d5e67d3f3081b177bd6ce24fab8642fcd0e18503217960854db600f14,2024-04-16T22:15:31.600000
|
||||
CVE-2024-21105,1,1,c6c82ed533391705d921d7d663fca26f8cb5fbba647f7940984870fc92462394,2024-04-16T22:15:31.770000
|
||||
CVE-2024-21106,1,1,a440deb88e8e20db2e6987326709f7d80f875be1c5f69a5e384aafd6b3bd9b01,2024-04-16T22:15:31.940000
|
||||
CVE-2024-21107,1,1,5029111cee5505494873cf54cd9e5b9798870fea04c2fff6706de938aa0f7517,2024-04-16T22:15:32.110000
|
||||
CVE-2024-21108,1,1,8d7be3c709eccfbe101ee5cef1d3ec2931ee83675df371b94534759b34b70231,2024-04-16T22:15:32.277000
|
||||
CVE-2024-21109,1,1,d12751e34dcd097928859e398465186aa36e619a9859e286514cf6db13790c6e,2024-04-16T22:15:32.440000
|
||||
CVE-2024-21100,0,0,65f4b990e5c1177693d8150b3620f028429badd2cbf28cb68593cd12826b98c8,2024-04-16T22:15:30.903000
|
||||
CVE-2024-21101,0,0,205a96dc7470fb351180145d3cdce7c7c9eb3c6592002c301b60500c4d3862a4,2024-04-16T22:15:31.087000
|
||||
CVE-2024-21102,0,0,fd6ecddf13e9f1b717eb08fc04a6df95beee401cfbf15a3bb4c954281f0def93,2024-04-16T22:15:31.270000
|
||||
CVE-2024-21103,0,0,7fe0cd3d775f2d4929321cd1e91952fb9e796e3cca582eab936d6b1a6bc8789f,2024-04-16T22:15:31.437000
|
||||
CVE-2024-21104,0,0,7d3bbe7d5e67d3f3081b177bd6ce24fab8642fcd0e18503217960854db600f14,2024-04-16T22:15:31.600000
|
||||
CVE-2024-21105,0,0,c6c82ed533391705d921d7d663fca26f8cb5fbba647f7940984870fc92462394,2024-04-16T22:15:31.770000
|
||||
CVE-2024-21106,0,0,a440deb88e8e20db2e6987326709f7d80f875be1c5f69a5e384aafd6b3bd9b01,2024-04-16T22:15:31.940000
|
||||
CVE-2024-21107,0,0,5029111cee5505494873cf54cd9e5b9798870fea04c2fff6706de938aa0f7517,2024-04-16T22:15:32.110000
|
||||
CVE-2024-21108,0,0,8d7be3c709eccfbe101ee5cef1d3ec2931ee83675df371b94534759b34b70231,2024-04-16T22:15:32.277000
|
||||
CVE-2024-21109,0,0,d12751e34dcd097928859e398465186aa36e619a9859e286514cf6db13790c6e,2024-04-16T22:15:32.440000
|
||||
CVE-2024-2111,0,0,bb223011165a425455ec8ad438d31acdc69716e592665db5e015c6e3c7a0ad9a,2024-03-28T12:42:56.150000
|
||||
CVE-2024-21110,1,1,26761757b8923b87fdad8881bb30129155b2254e03fc28e73cda4bfba8255bac,2024-04-16T22:15:32.617000
|
||||
CVE-2024-21111,1,1,df095bee2d0d9df82bab22d20b026708706025acd52e98e513beac77f52827f5,2024-04-16T22:15:32.780000
|
||||
CVE-2024-21112,1,1,069d3a8123248348b644bad2d78930a8c9ea5c4bb845cf44eeacd7c641d788b1,2024-04-16T22:15:32.957000
|
||||
CVE-2024-21113,1,1,76803a64f611335a6e0551a6c82d1a2639a5818f9f3522b5884b99b79d32c2d2,2024-04-16T22:15:33.127000
|
||||
CVE-2024-21114,1,1,d2792a216e32ffefda5d2f48c39458ebe07af8dcda2f07132c2a52a241cb73f5,2024-04-16T22:15:33.300000
|
||||
CVE-2024-21115,1,1,6a46662c9b5efc5c1f2e808f40b64677e03aedeb61719d31d7b0c5007c622ec3,2024-04-16T22:15:33.467000
|
||||
CVE-2024-21116,1,1,14834822ae39f45be6e1818d460aca7d476d347ecd1b3cab8fc89440f6cdc08a,2024-04-16T22:15:33.653000
|
||||
CVE-2024-21117,1,1,8eed13b90291acecf3dc23f5b6f163cc82d0767ebaa6728f52bcaba32e3d4862,2024-04-16T22:15:33.860000
|
||||
CVE-2024-21118,1,1,e2d82afcceb4e6a924cca4e7dbbaa7758c4966011a84f5c5e7db46c9739a7c5f,2024-04-16T22:15:34.027000
|
||||
CVE-2024-21119,1,1,96739194ecaf0753cb19bd4344c025f8b10ba9249c560f1afb8436afb10772be,2024-04-16T22:15:34.197000
|
||||
CVE-2024-21110,0,0,26761757b8923b87fdad8881bb30129155b2254e03fc28e73cda4bfba8255bac,2024-04-16T22:15:32.617000
|
||||
CVE-2024-21111,0,0,df095bee2d0d9df82bab22d20b026708706025acd52e98e513beac77f52827f5,2024-04-16T22:15:32.780000
|
||||
CVE-2024-21112,0,0,069d3a8123248348b644bad2d78930a8c9ea5c4bb845cf44eeacd7c641d788b1,2024-04-16T22:15:32.957000
|
||||
CVE-2024-21113,0,0,76803a64f611335a6e0551a6c82d1a2639a5818f9f3522b5884b99b79d32c2d2,2024-04-16T22:15:33.127000
|
||||
CVE-2024-21114,0,0,d2792a216e32ffefda5d2f48c39458ebe07af8dcda2f07132c2a52a241cb73f5,2024-04-16T22:15:33.300000
|
||||
CVE-2024-21115,0,0,6a46662c9b5efc5c1f2e808f40b64677e03aedeb61719d31d7b0c5007c622ec3,2024-04-16T22:15:33.467000
|
||||
CVE-2024-21116,0,0,14834822ae39f45be6e1818d460aca7d476d347ecd1b3cab8fc89440f6cdc08a,2024-04-16T22:15:33.653000
|
||||
CVE-2024-21117,0,0,8eed13b90291acecf3dc23f5b6f163cc82d0767ebaa6728f52bcaba32e3d4862,2024-04-16T22:15:33.860000
|
||||
CVE-2024-21118,0,0,e2d82afcceb4e6a924cca4e7dbbaa7758c4966011a84f5c5e7db46c9739a7c5f,2024-04-16T22:15:34.027000
|
||||
CVE-2024-21119,0,0,96739194ecaf0753cb19bd4344c025f8b10ba9249c560f1afb8436afb10772be,2024-04-16T22:15:34.197000
|
||||
CVE-2024-2112,0,0,a1cb4c4251bcffa2c05884275a870a25f5932616e05316e143e17d4e95c29cc7,2024-04-10T13:23:38.787000
|
||||
CVE-2024-21120,1,1,2c10a4c4f0bf27a5cf89a1e352cf2cfb7d106ca8d02a564280e581432c5d7b2e,2024-04-16T22:15:34.427000
|
||||
CVE-2024-21121,1,1,7695af2159b0e1e40ba9ab362dfc500e7e8a5d7d0bee2db18be3f405cff4b285,2024-04-16T22:15:34.600000
|
||||
CVE-2024-21120,0,0,2c10a4c4f0bf27a5cf89a1e352cf2cfb7d106ca8d02a564280e581432c5d7b2e,2024-04-16T22:15:34.427000
|
||||
CVE-2024-21121,0,0,7695af2159b0e1e40ba9ab362dfc500e7e8a5d7d0bee2db18be3f405cff4b285,2024-04-16T22:15:34.600000
|
||||
CVE-2024-2113,0,0,1af2e189d0f766a4a77361c625e87ddcd239476cacd0eaf00d619a2d2d68e8de,2024-03-29T12:45:02.937000
|
||||
CVE-2024-2115,0,0,d143f7e37acad4fe03aa4c56d721ecbb114e211aea88a809faac9f70095e9492,2024-04-05T12:40:52.763000
|
||||
CVE-2024-2116,0,0,0a8927d2c3af56415377e26a49eef636f1c80d9f9b3374c561d3bce1d3a48066,2024-03-29T12:45:02.937000
|
||||
@ -241008,6 +241008,7 @@ CVE-2024-22339,0,0,141d87c0954232284d5d12d393f2f8e1e8696b0a8047869855deb4538b3a4
|
||||
CVE-2024-22346,0,0,638ee4e9687c7c28032b432c317662713c057110b08b4b27024e81eb8453bf9e,2024-03-19T16:50:10.570000
|
||||
CVE-2024-22352,0,0,8ad74f9c108b142191e10d9f1af5800c7055fc5b8e79f7a9a2cf40171c06b8cd,2024-04-01T15:23:54.530000
|
||||
CVE-2024-22353,0,0,dcde4e1942667b685d2979f87ac00f95d42a8fc5d16f7dbd8bc9f66a2b78dfbb,2024-04-02T17:56:57.187000
|
||||
CVE-2024-22354,1,1,bdfa300bb19567b9b647b45bfb1936cce7cbfd7755aa9bda72c5f262de719e77,2024-04-17T01:15:06.747000
|
||||
CVE-2024-22355,0,0,d5e1a0b55aa53f554235616979c7aa7e85f01ce7f183bc4e8573dd18cbbe1419,2024-03-04T13:58:23.447000
|
||||
CVE-2024-22356,0,0,d81d64e63fe9b642cced3e4c94acc5e30f0113b5fdf3bed9ebc6028d04aab3ff,2024-03-26T17:09:53.043000
|
||||
CVE-2024-22357,0,0,7cc996f78175ddc6bc31990b99ad084fcec784716961a600ab611825166f830e,2024-04-12T12:43:57.400000
|
||||
@ -243418,7 +243419,7 @@ CVE-2024-27081,0,0,6ed48c106db6d65065e952974db0889dd604820642a515b665b4199918a2e
|
||||
CVE-2024-27083,0,0,439f4c8be88c938a8485e647a1e9fd875d817bf6451ed77ccc44b8a92bcaf08b,2024-02-29T13:49:29.390000
|
||||
CVE-2024-27084,0,0,9d9dc56eb44342ebdf65f8df5857c4a42b535ee96f2998cb21e8400366ec79c8,2024-02-26T18:15:07.920000
|
||||
CVE-2024-27085,0,0,a2ba4a60d7fbf0824177f894b599cd2c1a40310aac61dbfaf7a03654f9a829eb,2024-03-17T22:38:29.433000
|
||||
CVE-2024-27086,1,1,1d67aa5e8147b2b6d83154a177e9b24bdd25f87a85155a3f615e098de40e80cf,2024-04-16T22:15:34.783000
|
||||
CVE-2024-27086,0,0,1d67aa5e8147b2b6d83154a177e9b24bdd25f87a85155a3f615e098de40e80cf,2024-04-16T22:15:34.783000
|
||||
CVE-2024-27087,0,0,5b9b7040107e78bc917a74369bf7f558be05fd7da0faff9d2dcfc4d25d50686f,2024-02-26T22:10:40.463000
|
||||
CVE-2024-27088,0,0,3fb76382074583fb576fbdf0cb4fa8d92b0b1baa24e2319c4835f05f8f5cd3a0,2024-02-26T22:10:40.463000
|
||||
CVE-2024-27089,0,0,80888df8a8beb579eb58ecd8e5017bb9d7c0dad21161e687af8e50a608c5d017,2024-02-26T20:19:06.073000
|
||||
@ -243634,7 +243635,7 @@ CVE-2024-27572,0,0,6169a6a6221da5c6dbb1556f7b45e6b45c4deebae5e21607b1e3cfa478f1f
|
||||
CVE-2024-27575,0,0,fe78cdbfc48ba2557faf61957a122c11738e27bfad3d91860b0cc50d57150a36,2024-04-07T04:15:07.723000
|
||||
CVE-2024-2758,0,0,a3cb437eedb439caebfac4666310f05bccf69de779d818f9f315740c92bee7d8,2024-04-04T12:48:41.700000
|
||||
CVE-2024-2759,0,0,cb410b99122b16bbafd55e196fc83701c95bae09fba9353767401f5fe587c56c,2024-04-04T16:33:06.610000
|
||||
CVE-2024-27592,0,1,1ee880de3a9d61f4b25b2b3ac56dc03f1e8964452682bc0959dc8a13f2b2c67c,2024-04-16T23:15:08.690000
|
||||
CVE-2024-27592,0,0,1ee880de3a9d61f4b25b2b3ac56dc03f1e8964452682bc0959dc8a13f2b2c67c,2024-04-16T23:15:08.690000
|
||||
CVE-2024-27602,0,0,641d004f193cbc187bf560868353a5607871444565457a2a1f222c57bafe0082,2024-04-03T12:38:04.840000
|
||||
CVE-2024-27604,0,0,5dd90a20288c95f7805059ddcbf501c6de9e3b933a16f752b43bf101ed5f2058,2024-04-03T12:38:04.840000
|
||||
CVE-2024-27605,0,0,4f744199930e3e7e9b7f220c4e73a81bb4fe207bf4ecc2f618ea8f6d8437d165,2024-04-03T12:38:04.840000
|
||||
@ -244413,7 +244414,7 @@ CVE-2024-29275,0,0,402f5150501d1ad43199a2c93810407cb4bc9ca968149bb7f55410637d084
|
||||
CVE-2024-29276,0,0,aca23a437429c144243dafb6e7ab7580683c55fe67f055697aafa1a11e9b270d,2024-04-02T12:50:42.233000
|
||||
CVE-2024-29278,0,0,68d9b61e6ce874f8948705ce3cdb92754b448114cb863479c2e17e0909039bb0,2024-04-01T01:12:59.077000
|
||||
CVE-2024-2929,0,0,259a475f54199dd846f57ff088582fd42af9991bb7e5a0933d4c675cb91ec78a,2024-03-26T17:09:53.043000
|
||||
CVE-2024-29291,1,1,6a2d8654eba16cf8f9274638a5d2740bfaacd712a6909c05fea6da7b75867ef5,2024-04-16T23:15:08.767000
|
||||
CVE-2024-29291,0,0,6a2d8654eba16cf8f9274638a5d2740bfaacd712a6909c05fea6da7b75867ef5,2024-04-16T23:15:08.767000
|
||||
CVE-2024-29296,0,0,9df6519fa8f3cc846555f57a851c9ca9c85b64bc0579ecca8b9610940400afaa,2024-04-10T19:49:51.183000
|
||||
CVE-2024-2930,0,0,337492b179fbec8f39a448e0d835a264515add1a9cb1abd7b1714333878c14e4,2024-04-11T01:25:41.570000
|
||||
CVE-2024-29301,0,0,154c6ea8f36ae553114269a1e880d159b7e9b09b869cc177af921f11e043c79a,2024-03-26T12:55:05.010000
|
||||
@ -244438,7 +244439,7 @@ CVE-2024-29399,0,0,1f0a560642c5bcb6053c3eb35cf9c158aa499897c937eeb4d73efac983ff0
|
||||
CVE-2024-2940,0,0,dc7b546b238f5f17f29f90e2f8349ff92580baece4e80a8faa65880503340f4e,2024-04-11T01:25:42.140000
|
||||
CVE-2024-29400,0,0,7c7ba10951f85314b8517e4af19bc97a8e02a4fb9c2ebd30adadcdfaed825d5b,2024-04-12T12:43:46.210000
|
||||
CVE-2024-29401,0,0,679ee7eb07f94632974ee3a3d5e9f1f36658f780199e198816f5b2401b4eaa19,2024-03-26T17:09:53.043000
|
||||
CVE-2024-29402,1,1,341d0062e1e3703ec61d2d15457610f3a27ce85eb3ec1e564e0cae4943f7f4ff,2024-04-16T23:15:08.827000
|
||||
CVE-2024-29402,0,0,341d0062e1e3703ec61d2d15457610f3a27ce85eb3ec1e564e0cae4943f7f4ff,2024-04-16T23:15:08.827000
|
||||
CVE-2024-2941,0,0,74f5dafb13773046a00a2499c333058547dc5cb76d6e56fb667d3547eaae40b7,2024-04-11T01:25:42.230000
|
||||
CVE-2024-29413,0,0,a58c13bdf67afd8b98d238166eefb90262a9870531d3d5f182e9810c30b452cd,2024-04-04T12:48:41.700000
|
||||
CVE-2024-29419,0,0,2f1c2a30167616ce2f7264d13a2e39c4e307caf2a0fab8a1d39f77c0f2b7d31b,2024-03-20T17:18:21.343000
|
||||
@ -244448,22 +244449,22 @@ CVE-2024-29432,0,0,935ce59b23319f15478ff1d005b1786853efcea9f20ed5b78b83dcf1879a3
|
||||
CVE-2024-29433,0,0,b10a666a979afbf6ffc25b1ef458e1d0fb9c766493f3b32e8a3cbc2c3e4a9e2b,2024-04-02T12:50:42.233000
|
||||
CVE-2024-29434,0,0,e2dd739e4fe1b524f01d6355aa24f60868a619e4b33fdd429c31c5ef2f0acc1e,2024-04-03T12:38:04.840000
|
||||
CVE-2024-29435,0,0,4d03d83d8cb615246ed4e783c1ea07f9aee9ed7e6aa6133cefbb15bfb0a5c168,2024-04-02T12:50:42.233000
|
||||
CVE-2024-29439,0,0,7cf0a70cfb4668256337458d91ed2c0209386440e59360f7cd569e5c066d3d8d,2024-04-11T12:47:44.137000
|
||||
CVE-2024-29439,0,1,0205a66ac068a0fed8b4662d4023b68fa4adb9fa7499a4326f16862215fea4b8,2024-04-17T01:15:06.960000
|
||||
CVE-2024-2944,0,0,bf30485559894333f745f8eef196b6be024a5609ef9407e8d76f3c04dece3bb3,2024-04-11T01:25:42.527000
|
||||
CVE-2024-29440,0,0,b41dbba691936eb263a6e48ee2f4c3b0c65bf928cbb922caedd1e0f5f03baacf,2024-03-26T12:55:05.010000
|
||||
CVE-2024-29441,0,0,7d177bd767a6ee2302e79b98db9366f551a06c46417701848d75068973be5d72,2024-04-11T12:47:44.137000
|
||||
CVE-2024-29442,0,0,7905121fe561461f75c739d09685b7ffc46a6e6f08464603a503f7d567bf4eab,2024-03-26T12:55:05.010000
|
||||
CVE-2024-29443,0,0,56c4a998b5da875c2f7671831ef2b48002f3c56461a59b8a1dbbd2d293ca92b5,2024-04-11T12:47:44.137000
|
||||
CVE-2024-29444,0,0,0268c5b80999b51afe8710a3826f9f5f0fd5248ec4523b9a74cbe1ada6ad287b,2024-04-11T12:47:44.137000
|
||||
CVE-2024-29445,0,0,cc3751764af52423ac5b7dc05636571bd50b99f4e8200f72021ee84ebbcf377e,2024-04-11T12:47:44.137000
|
||||
CVE-2024-29447,0,0,e1180cdede2080c441e7d0c7f49606d27c37531b26d1a8fd47e476e26ff10081,2024-04-11T12:47:44.137000
|
||||
CVE-2024-29448,0,0,4ba65fdbb0ca30d9cdfb72c06aca70585e95b847cd3e3e977305949fbe0c68bd,2024-04-11T12:47:44.137000
|
||||
CVE-2024-29449,0,0,47dcba52f80d694fddef2a5c37e5d232752be79c6d29facb1f20baa4976bd45a,2024-04-11T12:47:44.137000
|
||||
CVE-2024-29440,0,1,af28a7195ddd19f2e67b02ed43c4f4341cb5c6ec19029799938ddd4abf8d0399,2024-04-17T01:15:07.027000
|
||||
CVE-2024-29441,0,1,35a8862c80edd55d8f6f1f7f96310445af4e66d2a40a9a30fe2890e069ec42af,2024-04-17T01:15:07.100000
|
||||
CVE-2024-29442,0,1,7ff49f29e2f39247b7a7da6b71ca7cefc102718291b2dcc233bbed2e5c3c9ec4,2024-04-17T01:15:07.160000
|
||||
CVE-2024-29443,0,1,d929f321c3d21e8622db40f1944b5510ec4816666c9ced5fe335f499a545092e,2024-04-17T01:15:07.220000
|
||||
CVE-2024-29444,0,1,e5aa07e55753f8a4ec71925e02be0a52213dfefefea4e302a21efb8c1d3ee699,2024-04-17T01:15:07.273000
|
||||
CVE-2024-29445,0,1,0b8a34c13cad5d63754cf7a09d2edd2bb80ad06c0db1b2c5a0a31cd1fa908c27,2024-04-17T01:15:07.333000
|
||||
CVE-2024-29447,0,1,ba502ee99bcb8d923b6cb66caf4882a6855d51c812a2438755133264b6013996,2024-04-17T01:15:07.387000
|
||||
CVE-2024-29448,0,1,df2f9f29b404c769dd042d17aab40afdd52210be1a2f7c50bfc77c14d786385e,2024-04-17T01:15:07.443000
|
||||
CVE-2024-29449,0,1,e2b92f652bb0da8723e25badd33aafae15d9403e758d915af68c443e1e5ad823,2024-04-17T01:15:07.510000
|
||||
CVE-2024-2945,0,0,9a8b20f2d1f78244c8700886f61029534f24a9a5de87a4254b75a2868f9e961c,2024-04-11T01:25:42.617000
|
||||
CVE-2024-29450,0,0,005fd00ff20c3a890af8b95157cd66876d6e8274cc9a8e97d7d9e2739fb8ba9d,2024-04-11T12:47:44.137000
|
||||
CVE-2024-29452,0,0,390452f7e03ee0abed26b2bb426d4b14b3ea2b82601f2db2f6e611b242e9dfeb,2024-04-11T12:47:44.137000
|
||||
CVE-2024-29454,0,0,c5e740cd1abf29bb706f61bdcb9cac715190bdeda241ee5e4735d3e49da21397,2024-04-12T12:43:57.400000
|
||||
CVE-2024-29455,0,0,6e1789780e5aa8031c75de8caec34ad04dbe0084b961cab46e445dc7c45cfc0e,2024-04-11T12:47:44.137000
|
||||
CVE-2024-29450,0,1,9d33052158da9c8d287ef6f5672d7ae110c170c0ab4f2f6915e11584aad0766f,2024-04-17T01:15:07.560000
|
||||
CVE-2024-29452,0,1,8d0b729784b4da60050ef65dc7953fe0bc8db84f2c38755d33415257a17e18a6,2024-04-17T01:15:07.617000
|
||||
CVE-2024-29454,0,1,368d46eea8baef98385d731c443c2f86a1fadef42a9f12cedec450801d7f564e,2024-04-17T01:15:07.677000
|
||||
CVE-2024-29455,0,1,407cf55ddf9b5933109bc2c849de83fa36f35bf4ad5d595bc3c9616a07500c9f,2024-04-17T01:15:07.730000
|
||||
CVE-2024-2946,0,0,b86288fa77fb47b4b83be2e46631f0944d38df3dbc98c9ee65a2d9324fa3b190,2024-04-10T13:23:38.787000
|
||||
CVE-2024-29460,0,0,b846dd78dc5e35e9b0ddcbf6b64c6fe8dd169ef35be60b3c712c2dd2787cb070,2024-04-11T12:47:44.137000
|
||||
CVE-2024-29461,0,0,0ea3979c495137b90acde4ca36a0a99c570c5e7619fef41ff59b36c98cf5a199,2024-04-15T13:15:51.577000
|
||||
@ -245064,46 +245065,46 @@ CVE-2024-30639,0,0,46b7c5471e103449855c9fbd2240c66d12c0c2b4b2c2dd58c9da71634c442
|
||||
CVE-2024-3064,0,0,150d2695d7eeb315cec549f12d6c6ef3f6e02daaf223b84571983b190cdbdba2,2024-04-10T13:23:38.787000
|
||||
CVE-2024-30645,0,0,00b9821a66dbca80d2d2c9c63858e19e8817ea8f49dc6578caf9fd20dddfbebc,2024-04-01T01:12:59.077000
|
||||
CVE-2024-30656,0,0,c800b352c15d86c6b7538edefbe50a56ea126bd7af414b5024084888358a8802,2024-04-16T13:24:07.103000
|
||||
CVE-2024-30659,0,0,6b674dcc6172a28fd382455a39837aee02d1048828b479da4de736260a001915,2024-04-08T18:48:40.217000
|
||||
CVE-2024-30661,0,0,ca3a009dda716fdf3c3b4141a47c3533be46c4c31a5c8c5b65ef3f7e55a4c4a0,2024-04-08T18:48:40.217000
|
||||
CVE-2024-30662,0,0,71b80d6dafbe22437f2510bb021f4c17a7a897b19e7d2dd354177ad2cac3e4f3,2024-04-08T18:48:40.217000
|
||||
CVE-2024-30663,0,0,6e08db3f744a4228125df40199a08b9ee2a90f00728b6fca5a3d973b18d4de49,2024-04-08T18:48:40.217000
|
||||
CVE-2024-30665,0,0,b0872b924bec224f9269c5d12f3e3e09bd037687bdf2355c6dca31778a639300,2024-04-08T18:48:40.217000
|
||||
CVE-2024-30666,0,0,c963b049325fad48121e774e7f87aeeb4db59eaee7ce9b24b135f03225a8605b,2024-04-08T18:48:40.217000
|
||||
CVE-2024-30667,0,0,ff284e163d8506ead82a88e1e0195d7345f11e18d3b36d2dad51ac5fe6f1c4e9,2024-04-08T18:48:40.217000
|
||||
CVE-2024-30659,0,1,61f850e3b46d205f26b3e244c5b08f3a3d93128b54ccec717c46733663eba23a,2024-04-17T01:15:07.787000
|
||||
CVE-2024-30661,0,1,bcc8604f273e93c8e588ce1bdd1a9ece350083ce7e93f26c7dbf2e962081965b,2024-04-17T01:15:07.847000
|
||||
CVE-2024-30662,0,1,27c70236e307dcf19582d3516b8d64f734a73d107753e425090972ed2be6a8c3,2024-04-17T01:15:07.907000
|
||||
CVE-2024-30663,0,1,389a4d6fbcedf1650843d47373664a20a831bf84258e54b129c5846e59aba382,2024-04-17T01:15:07.960000
|
||||
CVE-2024-30665,0,1,3f695edd1e72eb443a740aef3fbad69f618e99350100ab838b4c73d06b2cd9fa,2024-04-17T01:15:08.010000
|
||||
CVE-2024-30666,0,1,0d3ef8cfc85e5ff24ffc04b9608f814ebf69d0fee6728f8e86fd1a5651c999bc,2024-04-17T01:15:08.063000
|
||||
CVE-2024-30667,0,1,b34af94390a480d37fac45c6f18085a47b08b076475bdfd12c5edf2b7032fbf6,2024-04-17T01:15:08.117000
|
||||
CVE-2024-3067,0,0,e9b1bebe389d4e514e7a9a61bf198949c5e392a49f5a0c35c052cf2a541b472e,2024-04-16T13:24:07.103000
|
||||
CVE-2024-30672,0,0,5f03fe7211bd8d45b5928b91a5ac0350abcfb5c5194aa5b0296fc94c9e863bc2,2024-04-08T18:48:40.217000
|
||||
CVE-2024-30674,0,0,6ed6c67e9f9314eaeb2be25e85ad7999c533cc1beb21c8cb467ab7a893f16710,2024-04-08T18:48:40.217000
|
||||
CVE-2024-30675,0,0,8b91a2fb611ecb3c19dd6a14ce9d54a86e8a20f268f642c9f4e164c260b50edd,2024-04-08T18:48:40.217000
|
||||
CVE-2024-30676,0,0,af724672b3075823cc7ac023ff0bd01b6766fd74313e164540f52e1f670069a5,2024-04-09T12:48:04.090000
|
||||
CVE-2024-30678,0,0,28c2c42c15a87c8576562744982b7e6592c723e041b1251a726dc2914f0f31c2,2024-04-09T12:48:04.090000
|
||||
CVE-2024-30679,0,0,1652ad2d7f751aa883b92dadc3db45d6131582879ab3f0ce2ce9b68ca301473c,2024-04-09T12:48:04.090000
|
||||
CVE-2024-30680,0,0,07cf4672c6cb5c0d37b128ff6292cf9dcf1d064a6b724bb71fb28d8b540ff210,2024-04-09T12:48:04.090000
|
||||
CVE-2024-30681,0,0,ddbe0c69f9ab035c7a353186f3b3cfb547957dc7577d22a08e0cab4ca1d951a2,2024-04-09T12:48:04.090000
|
||||
CVE-2024-30683,0,0,95978317b9ff4fe100aa7b5187ca91600381e6090aadd857a6554499fc4fc767,2024-04-09T12:48:04.090000
|
||||
CVE-2024-30684,0,0,93873bb3f77c6d6c1129e83df71a0c5dab8044941f95a0a1a2446d06a1a663f9,2024-04-09T12:48:04.090000
|
||||
CVE-2024-30686,0,0,cecb3b359a2c306a651201a597cd44f73ed8fc5e2479bc1e16493cf1b000f3d9,2024-04-09T12:48:04.090000
|
||||
CVE-2024-30687,0,0,627c6f49d0e8696456211f5aadec2afbfb7309884605ed881f3f310eff8a28e0,2024-04-09T12:48:04.090000
|
||||
CVE-2024-30688,0,0,be62ee228899213efd589c12a1c4722b462ed6c7cea897018d539f4060eeaef6,2024-04-09T12:48:04.090000
|
||||
CVE-2024-30690,0,0,758c0e580a22afa6415e22d45eb180157d5e27c3f7c136b941a2ccea1a631afb,2024-04-09T12:48:04.090000
|
||||
CVE-2024-30691,0,0,23334283bdbb80ece84004a07a2d4f2fb30a9114f4de8009b41ca287700f7f5c,2024-04-09T12:48:04.090000
|
||||
CVE-2024-30692,0,0,ff1ce2f91a7b26c24b130e2b00e06d5a248a15e5d50cd434ef04e50387645828,2024-04-09T12:48:04.090000
|
||||
CVE-2024-30694,0,0,7755c230805c1909d0e94175233f36be70321ff270a75af58c50d43db7f1ff2d,2024-04-09T12:48:04.090000
|
||||
CVE-2024-30695,0,0,520c313ebed8e7aa062ef70d824f022571c815c409401bb881ea7203f9352df6,2024-04-09T12:48:04.090000
|
||||
CVE-2024-30696,0,0,f669e76cecff581f311ed5900046ffb74094191bccea9325de2ff009a7b30889,2024-04-09T12:48:04.090000
|
||||
CVE-2024-30697,0,0,2bd165ee3b3f68656e20994b8433b623199f76c40a9ca0dc0dfa3acfa9da7f64,2024-04-09T12:48:04.090000
|
||||
CVE-2024-30699,0,0,9d56c28cee5445b90e131fb18f6cf806afce6628a108cb0836bb98a2b8089d77,2024-04-09T12:48:04.090000
|
||||
CVE-2024-30701,0,0,8e03ccf6659f5a4e378ff7d93a21c845259f9ec9ec9403dcafcfbc3a4ce924ba,2024-04-09T12:48:04.090000
|
||||
CVE-2024-30702,0,0,3202ab3b96337818fa5697e074c56de6b3f80d2a2d54b4e19bbd152344839f49,2024-04-10T13:24:00.070000
|
||||
CVE-2024-30703,0,0,d65523fa26837f143aa861c4b1ec22513e9119e27da48ccd66026c68d769da4b,2024-04-10T13:24:00.070000
|
||||
CVE-2024-30704,0,0,4be6f74b234ab487793dbcc167bc99fcc85408b78dae088a65348367022464d8,2024-04-10T13:24:00.070000
|
||||
CVE-2024-30706,0,0,03893f8ba2617a63c8f0f690a761c749ad6c0a21548a544156d648c98f4fab3e,2024-04-10T13:23:38.787000
|
||||
CVE-2024-30707,0,0,b3787314c5b41663f817d28039ba162cb3c9b1be3feb9468dcb0c11582ff962f,2024-04-10T13:23:38.787000
|
||||
CVE-2024-30708,0,0,10ddd37221e5a1c0cf70f11b4f20a4eb46a946eba4360a4f83ad136c08b7e804,2024-04-10T13:23:38.787000
|
||||
CVE-2024-30710,0,0,ad0b2fc27c744492bd638ad1270e2eb0cf591817d25e6033c0ebbfd623f99942,2024-04-10T13:23:38.787000
|
||||
CVE-2024-30711,0,0,1cca53fbf3011ffff61c60b94d4155920621fd56a5bd85710f9dff6c1e97a66c,2024-04-10T13:23:38.787000
|
||||
CVE-2024-30712,0,0,2c1a525e9cea1ecfad7022378dd4f3aa58224217a74c01672a3ebf64824c4f06,2024-04-10T13:23:38.787000
|
||||
CVE-2024-30713,0,0,1ea15ed5eb999cac822ad0963612cbe3e0ac75b03e995938d276ab7dceb0b420,2024-04-10T13:23:38.787000
|
||||
CVE-2024-30672,0,1,21a7acac87d2910f58d956dd2a9e74d0ae726019f37c821a2970b628587b3d1f,2024-04-17T01:15:08.170000
|
||||
CVE-2024-30674,0,1,a1449c2fcf0ba16ad3e356fcb957a27686d489e53286578459faa6029c16eed6,2024-04-17T01:15:08.223000
|
||||
CVE-2024-30675,0,1,57aa3f2485756b52840d41b9ee07c4bdd5176287cdb2b12e4ff1d9b9e22a91bc,2024-04-17T01:15:08.283000
|
||||
CVE-2024-30676,0,1,39459d500da83bf48c4e52e965f9401b3e6d27a861b4a9bdfb0427cf44c6e8f6,2024-04-17T01:15:08.337000
|
||||
CVE-2024-30678,0,1,760a12d68bfeaf49ed657df7eba66701a952b976c57457ed1c5bac7ccc1e8ace,2024-04-17T01:15:08.427000
|
||||
CVE-2024-30679,0,1,3bc42854c1a1b42a98cb9b10bea930710bd7b156fc9f323745b5d962ad90145b,2024-04-17T01:15:08.510000
|
||||
CVE-2024-30680,0,1,225bff0e04855f6ba43ce3dc77ffa65b48b69bf375ccbb3f6145bd975882eac8,2024-04-17T01:15:08.577000
|
||||
CVE-2024-30681,0,1,10f3d4332220d3d49244a0c6fc169d3b7ce1a04f2f4ea8f3a3d1bd7df2f01529,2024-04-17T01:15:08.633000
|
||||
CVE-2024-30683,0,1,3884021987e5d4e422886e5f27c1c7d6b1ef85f46375c2ad8005095bd832ff7c,2024-04-17T01:15:08.690000
|
||||
CVE-2024-30684,0,1,1fd31d9a4b0023b07c3d817589c127fb00824f9dae6fdf331662b52631f1f66a,2024-04-17T01:15:08.750000
|
||||
CVE-2024-30686,0,1,372e2063d26b39ed76584767891e58ea9974a9738b5f6375cd08231d98371c18,2024-04-17T01:15:08.813000
|
||||
CVE-2024-30687,0,1,a5e6380da51987e65e71b2a3b2fef33eb738ba9a88846b7bb72509a2c954f96f,2024-04-17T01:15:08.873000
|
||||
CVE-2024-30688,0,1,79739bd9f2d4df545ff015f26d898959a5b0ecb38d4d6666e06fd38c6975033f,2024-04-17T01:15:08.927000
|
||||
CVE-2024-30690,0,1,140a6aa982a7c8e97b8b62a6a53e1b1d7f6388d33dda3e6ff0e96dea7677fcd1,2024-04-17T01:15:08.980000
|
||||
CVE-2024-30691,0,1,8c05019cb96b7089b3bebcb3edcc019e24a46548532893ddc2c0e397f82635fc,2024-04-17T01:15:09.033000
|
||||
CVE-2024-30692,0,1,06ca4d2ab37709f6ab9bf0d85e3573d1ca79815c7ecaae46be13ac66b56a3ddd,2024-04-17T01:15:09.100000
|
||||
CVE-2024-30694,0,1,3099e365af6a2c20fcdaa1beed13525701c0a4995b3ba87662b83651d5c7b416,2024-04-17T01:15:09.160000
|
||||
CVE-2024-30695,0,1,7775c65b9bf7cfc01e45de81af98531676ecde1914330362c254d870e6aeb882,2024-04-17T01:15:09.217000
|
||||
CVE-2024-30696,0,1,5cfb0bebfff5be81b08a66ffdb308cc0d717f7bc78842763dbd36b60ae1cf853,2024-04-17T01:15:09.273000
|
||||
CVE-2024-30697,0,1,a33b26a0decfcbab9179239f13c3a84734fd06638ab06af16b814f4f2a89c8b2,2024-04-17T01:15:09.330000
|
||||
CVE-2024-30699,0,1,33f0494142c66f999e1fc060019cb3357e23cf0f0f9cd0178e36e3656b4b0b3e,2024-04-17T01:15:09.387000
|
||||
CVE-2024-30701,0,1,d9e2f0824d5dd83e892e3ce43966cf2bdfbd3fef00786abfd3aa6448290c070d,2024-04-17T01:15:09.447000
|
||||
CVE-2024-30702,0,1,a7485ca3f518262adefc8c57fc92be69ee8ce36b582283f4b90f1003ece220ac,2024-04-17T01:15:09.503000
|
||||
CVE-2024-30703,0,1,54442d23a613c11d76912c327eec4b82d83de8b6e43e8f7687abaf2d44476e1a,2024-04-17T01:15:09.570000
|
||||
CVE-2024-30704,0,1,d94ba684a619f657bfb5a4d11fa161cc621abbe0cb023edb9d4d35c3d8b92897,2024-04-17T01:15:09.627000
|
||||
CVE-2024-30706,0,1,259fe5fd57667c60e8ecd49f3a41f82c05a7696135541ea18c275f1148086a25,2024-04-17T01:15:09.687000
|
||||
CVE-2024-30707,0,1,75fbbcd765b686443df2ab41d6298e4f541e0e27b686cd4c3f6eca7fe2686679,2024-04-17T01:15:09.747000
|
||||
CVE-2024-30708,0,1,50d3cc96fee682adc13619592ba9fff8db734f8bcbfa2240598f53f24dec4d3f,2024-04-17T01:15:09.810000
|
||||
CVE-2024-30710,0,1,aa9587f53dd7dd520275ce6ccdb7f704ef700788ec68d53464f6a11fe9f3150a,2024-04-17T01:15:09.867000
|
||||
CVE-2024-30711,0,1,19e7a31f2ede8ce10e1a843e1f235f9dd50314c74c6772cebbedced843e3ae9a,2024-04-17T01:15:09.923000
|
||||
CVE-2024-30712,0,1,d203d5b108c4959ccd7826756f2bcdc1f5744cc6bc3ee08280dd09f5c3a0f5f1,2024-04-17T01:15:09.990000
|
||||
CVE-2024-30713,0,1,3be2f8112058fd6aca88254eddb652d5fc76394b8fa76f80a823c68c59ab637a,2024-04-17T01:15:10.050000
|
||||
CVE-2024-30715,0,0,c6d6a66c34447a93ef4e3806c199a13ce413008b74664924d9f13ad17ec1bad5,2024-04-10T13:23:38.787000
|
||||
CVE-2024-30716,0,0,c8d02ea62b2a81fadb2c085275572631890a964a411aa3e38b7d9807a9c89406,2024-04-10T13:23:38.787000
|
||||
CVE-2024-30718,0,0,c3c8f848e7ce91e0db0795469c5673815e2dc3f2aef9ffc4f4c5cfe3789bf72e,2024-04-10T13:23:38.787000
|
||||
@ -245398,7 +245399,7 @@ CVE-2024-31446,0,0,401b62f3afdfc4cc781dfe99d4a5c6abfe1f46e7322870afe10073c6356a7
|
||||
CVE-2024-31447,0,0,1686ea065902cff688a9e0e72258f816c60304799af9644c7db6f9ae37572786,2024-04-08T18:48:40.217000
|
||||
CVE-2024-3145,0,0,30d7039ca4630abed1ac79b5e5068d170488eb4a6c9740ed0209e585b5eb2f84,2024-04-11T01:25:55.100000
|
||||
CVE-2024-31451,0,0,10ad8ce607c3f80bebbdd47fed59e0fb48d83a52aa634e8a43b74ccc86bdeada,2024-04-16T15:15:36.687000
|
||||
CVE-2024-31452,1,1,0fefc3d1c5fa4caec6925c6b39b8cf95a91d230c6284b73215cdfa93397d3361,2024-04-16T22:15:35.003000
|
||||
CVE-2024-31452,0,0,0fefc3d1c5fa4caec6925c6b39b8cf95a91d230c6284b73215cdfa93397d3361,2024-04-16T22:15:35.003000
|
||||
CVE-2024-31453,0,0,1b1ead27c6870d2affe09236bc3123473d08b6ddf2bca0a49b08400d4b48a120,2024-04-10T13:24:00.070000
|
||||
CVE-2024-31454,0,0,facd63c9b966def9fa208ea7acce2b97e831e91313ffa612db120032d2a37c2c,2024-04-10T13:24:00.070000
|
||||
CVE-2024-31455,0,0,58d58168822fd35b9c530d967e86c80a8aef11f5f1477a56943eec05e6715b25,2024-04-10T13:24:00.070000
|
||||
@ -245412,8 +245413,9 @@ CVE-2024-3147,0,0,f05061e9d718b866336ceef3f83885c168403f8d387cf11dbe00ac736df358
|
||||
CVE-2024-3148,0,0,12b6e15e00d964ce79c059c99a6c4df70691a740ad2056657f2d4843c78fc654,2024-04-11T01:25:55.337000
|
||||
CVE-2024-31487,0,0,ffef7fcdc05bb476a1f2c02c71de4a76075ea7f0301d6a8889db629ce9b194c6,2024-04-10T13:24:22.187000
|
||||
CVE-2024-31492,0,0,a251126d380ad734bdcae40155276c0c8cd0f78c057d6c232814179759c90bf9,2024-04-10T19:49:51.183000
|
||||
CVE-2024-31497,0,1,92d3946f715279db269d1f9ac34c9dfc89e5dc1e10b2248a9304d809932b0d4b,2024-04-16T23:15:08.903000
|
||||
CVE-2024-31497,0,0,92d3946f715279db269d1f9ac34c9dfc89e5dc1e10b2248a9304d809932b0d4b,2024-04-16T23:15:08.903000
|
||||
CVE-2024-31498,0,0,db3c4e2337e3fccc66e084ef6016d8532925f451bef4124b0c2782f0c54d90b6,2024-04-08T00:15:08
|
||||
CVE-2024-31503,1,1,6732ad15c4a40e957bb3d152a5a45a842a9476ad49235e6a47c63246ef12081f,2024-04-17T00:15:07.220000
|
||||
CVE-2024-31506,0,0,8be7ef5b3e9d65e4bba9dd63e2b7475f0658a4b183369094a98038d4eee40099,2024-04-10T13:24:00.070000
|
||||
CVE-2024-31507,0,0,8a4d05957463fb55563022c4622a2463374ff774a0631f4c63214875a7c78bee,2024-04-10T13:24:00.070000
|
||||
CVE-2024-3151,0,0,2dd1cf236cf7e4dbb7d9720cf950d856f9b652cd7c08d701ecc784bea1322bb1,2024-04-11T01:25:55.410000
|
||||
@ -245435,8 +245437,9 @@ CVE-2024-31651,0,0,449580f383ba06b10b890173ddf2d62af7a188eb69db82466ee9152e4b087
|
||||
CVE-2024-31652,0,0,208b4f263a9a44614b423f2ea1b775ae64777df67f6e60b98c2159dddb5c4a0b,2024-04-16T13:24:07.103000
|
||||
CVE-2024-3167,0,0,f4a160a1382e038713f603968880deb87a3b362a15bab9fc55aa42721dc9dd6e,2024-04-10T13:23:38.787000
|
||||
CVE-2024-31678,0,0,6d17d4ce9eaa15ebb6367a838566d027b53ddba56e09f333fd8cadacfd1d2447,2024-04-12T12:44:04.930000
|
||||
CVE-2024-31759,1,1,c6aaf263d8cac477abe21ca43dad0802ddd036edc2b440e2698a5e9834c14b52,2024-04-16T23:15:09.047000
|
||||
CVE-2024-31760,1,1,83c2ca70e34af03377fc0a0219cb672ad960b263ff17cdbd5820fe03fc170075,2024-04-16T23:15:09.107000
|
||||
CVE-2024-31680,1,1,919dab49ae68abbaa13231e8eecbea48a6d9fca067eef112002bd5ac041cce3b,2024-04-17T00:15:07.293000
|
||||
CVE-2024-31759,0,0,c6aaf263d8cac477abe21ca43dad0802ddd036edc2b440e2698a5e9834c14b52,2024-04-16T23:15:09.047000
|
||||
CVE-2024-31760,0,0,83c2ca70e34af03377fc0a0219cb672ad960b263ff17cdbd5820fe03fc170075,2024-04-16T23:15:09.107000
|
||||
CVE-2024-3178,0,0,e1b2edc538f836ffb506a17d476e0f961db2588242ddd1b2358ad3487cd818bf,2024-04-04T12:48:41.700000
|
||||
CVE-2024-31783,0,0,a7054e74fa1a557567cd0f4452494e62f528f37b2972c2343d20292f99336f13,2024-04-16T13:24:07.103000
|
||||
CVE-2024-31784,0,0,0055eda0e2e2e3cebbac3d895c086f3674073feab99e847bee4ca99f9495a801,2024-04-16T13:24:07.103000
|
||||
@ -245476,7 +245479,7 @@ CVE-2024-31871,0,0,2e9cb20a8839296f42d6bc6aa4eee6ec286fed065eef42e4971f116c0f81a
|
||||
CVE-2024-31872,0,0,7d09da772d85c1598253bebf81c543077ef995af0f84d1cf088132605a2400f9,2024-04-10T19:49:51.183000
|
||||
CVE-2024-31873,0,0,30397559953deb34a9ae192149473632dc6b2334245e920787a4c5e14fc76375,2024-04-10T19:49:51.183000
|
||||
CVE-2024-31874,0,0,1770e58d0ae5591eb931a8cdfdb054fb4d854f81849d14af250c71db6caf553c,2024-04-10T19:49:51.183000
|
||||
CVE-2024-31887,1,1,fc8d9e19ae4d266bf0e07275be6dc695fb1e244ff60ad6d3372609e811f9591d,2024-04-16T22:15:35.240000
|
||||
CVE-2024-31887,0,0,fc8d9e19ae4d266bf0e07275be6dc695fb1e244ff60ad6d3372609e811f9591d,2024-04-16T22:15:35.240000
|
||||
CVE-2024-31920,0,0,1a6309492e6d112b6d5c74c55b809c13a9ffaf43e5c668b35b54f9c1433bee12,2024-04-15T13:15:31.997000
|
||||
CVE-2024-31921,0,0,4b6ce9a933b430a9597eec1c95a19c016c2c3b069930a8064c6136dce4df86da,2024-04-15T13:15:31.997000
|
||||
CVE-2024-31922,0,0,ddc17d5b651ce3b8e89be96b4d055079549d44bfd30b2393d2326cd870478923,2024-04-15T13:15:31.997000
|
||||
@ -245535,7 +245538,7 @@ CVE-2024-32027,0,0,5d8710672ae4a50766a192faeab61c22e45c9ea1fe8601d8fa6309c61ece5
|
||||
CVE-2024-32028,0,0,a16d36bcfaa5cccbb6282aecd03e18b80c66f8151e3c2f08a8edd43b521f9227,2024-04-15T13:15:31.997000
|
||||
CVE-2024-3203,0,0,d460cfbc8661b4424cc0984f526a676bb0961256fc9d04a7d500e89187029830,2024-04-11T01:25:55.810000
|
||||
CVE-2024-32035,0,0,9f9419e7b7ca688ca6c807b99c4196d3fdd26d305c290e1d723cf412a79167b9,2024-04-16T13:24:07.103000
|
||||
CVE-2024-32036,0,1,4358f457ff05e2fb3005eccdac6fca8cb869be3ffa209c190e441f2c4aed7dbe,2024-04-16T23:15:09.173000
|
||||
CVE-2024-32036,0,0,4358f457ff05e2fb3005eccdac6fca8cb869be3ffa209c190e441f2c4aed7dbe,2024-04-16T23:15:09.173000
|
||||
CVE-2024-3204,0,0,2a2a133d829052d72380a6f7a45e32f6ecd96ec6da65fdbadcbe92a1f79d774f,2024-04-11T01:25:55.933000
|
||||
CVE-2024-3205,0,0,befb48df2bb5e20af3b4383c1ef82865b9f9fb3145e096ffb7e0098ff096b4f8,2024-04-11T01:25:56.010000
|
||||
CVE-2024-3207,0,0,a57734da301192d6a9381ac71eef9bc84e6acf70886d5628a9c0939255320fc2,2024-04-11T01:25:56.090000
|
||||
|
Can't render this file because it is too large.
|
Loading…
x
Reference in New Issue
Block a user