Auto-Update: 2024-04-17T02:00:30.816528+00:00

This commit is contained in:
cad-safe-bot 2024-04-17 02:03:20 +00:00
parent 246f950079
commit 133298ab9b
58 changed files with 439 additions and 338 deletions

View File

@ -0,0 +1,59 @@
{
"id": "CVE-2024-22354",
"sourceIdentifier": "psirt@us.ibm.com",
"published": "2024-04-17T01:15:06.747",
"lastModified": "2024-04-17T01:15:06.747",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "\nIBM WebSphere Application Server 8.5, 9.0 and IBM WebSphere Application Server Liberty 17.0.0.3 through 24.0.0.3 are vulnerable to an XML External Entity Injection (XXE) attack when processing XML data. A remote attacker could exploit this vulnerability to expose sensitive information, consume memory resources, or to conduct a server-side request forgery attack. IBM X-Force ID: 280401.\n\n"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "psirt@us.ibm.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:L/A:L",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "LOW",
"availabilityImpact": "LOW",
"baseScore": 7.0,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.2,
"impactScore": 4.7
}
]
},
"weaknesses": [
{
"source": "psirt@us.ibm.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-611"
}
]
}
],
"references": [
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/280401",
"source": "psirt@us.ibm.com"
},
{
"url": "https://www.ibm.com/support/pages/node/7148426",
"source": "psirt@us.ibm.com"
}
]
}

View File

@ -2,12 +2,12 @@
"id": "CVE-2024-29439",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-04-10T23:15:06.753",
"lastModified": "2024-04-11T12:47:44.137",
"lastModified": "2024-04-17T01:15:06.960",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "An unauthorized node injection vulnerability has been identified in ROS2 Humble Hawksbill in ROS_VERSION 2 and ROS_PYTHON_VERSION 3, allows remote attackers to escalate privileges and inject malicious ROS2 nodes into the system."
"value": "An unauthorized node injection vulnerability has been identified in ROS2 Humble Hawksbill in ROS_VERSION 2 and ROS_PYTHON_VERSION 3, allows remote attackers to escalate privileges and inject malicious ROS2 nodes into the system. NOTE: this is disputed by multiple third parties who believe there was not reasonable evidence to determine the existence of a vulnerability."
},
{
"lang": "es",

View File

@ -2,12 +2,12 @@
"id": "CVE-2024-29440",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-03-25T21:15:47.217",
"lastModified": "2024-03-26T12:55:05.010",
"lastModified": "2024-04-17T01:15:07.027",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "An unauthorized access vulnerability has been discovered in ROS2 Humble Hawksbill versions where ROS_VERSION is 2 and ROS_PYTHON_VERSION is 3. This vulnerability could potentially allow a malicious user to gain unauthorized access to multiple ROS2 nodes remotely. Unauthorized access to these nodes could result in compromised system integrity, the execution of arbitrary commands, and disclosure of sensitive information."
"value": "An unauthorized access vulnerability has been discovered in ROS2 Humble Hawksbill versions where ROS_VERSION is 2 and ROS_PYTHON_VERSION is 3. This vulnerability could potentially allow a malicious user to gain unauthorized access to multiple ROS2 nodes remotely. Unauthorized access to these nodes could result in compromised system integrity, the execution of arbitrary commands, and disclosure of sensitive information. NOTE: this is disputed by multiple third parties who believe there was not reasonable evidence to determine the existence of a vulnerability."
},
{
"lang": "es",

View File

@ -2,12 +2,12 @@
"id": "CVE-2024-29441",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-04-11T00:15:07.223",
"lastModified": "2024-04-11T12:47:44.137",
"lastModified": "2024-04-17T01:15:07.100",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "An issue was discovered in ROS2 (Robot Operating System 2) Humble Hawksbill in ROS_VERSION 2 and ROS_PYTHON_VERSION 3, allows remote attackers to cause a denial of service (DoS) via the ROS2 nodes."
"value": "An issue was discovered in ROS2 (Robot Operating System 2) Humble Hawksbill in ROS_VERSION 2 and ROS_PYTHON_VERSION 3, allows remote attackers to cause a denial of service (DoS) via the ROS2 nodes. NOTE: this is disputed by multiple third parties who believe there was not reasonable evidence to determine the existence of a vulnerability."
},
{
"lang": "es",

View File

@ -2,12 +2,12 @@
"id": "CVE-2024-29442",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-03-25T22:37:19.797",
"lastModified": "2024-03-26T12:55:05.010",
"lastModified": "2024-04-17T01:15:07.160",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "An unauthorized access vulnerability has been discovered in ROS2 Humble Hawksbill versions where ROS_VERSION is 2 and ROS_PYTHON_VERSION is 3. This vulnerability could potentially allow a malicious user to gain unauthorized access to multiple ROS2 nodes remotely. Unauthorized access to these nodes could result in compromised system integrity, the execution of arbitrary commands, and disclosure of sensitive information."
"value": "An unauthorized access vulnerability has been discovered in ROS2 Humble Hawksbill versions where ROS_VERSION is 2 and ROS_PYTHON_VERSION is 3. This vulnerability could potentially allow a malicious user to gain unauthorized access to multiple ROS2 nodes remotely. Unauthorized access to these nodes could result in compromised system integrity, the execution of arbitrary commands, and disclosure of sensitive information. NOTE: this is disputed by multiple third parties who believe there was not reasonable evidence to determine the existence of a vulnerability."
},
{
"lang": "es",

View File

@ -2,12 +2,12 @@
"id": "CVE-2024-29443",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-04-10T23:15:06.810",
"lastModified": "2024-04-11T12:47:44.137",
"lastModified": "2024-04-17T01:15:07.220",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "A shell injection vulnerability was discovered in ROS2 (Robot Operating System 2) Humble Hawksbill in ROS_VERSION 2 and ROS_PYTHON_VERSION 3, allows remote attackers to execute arbitrary code, escalate privileges, and obtain sensitive information due to the way ROS2 handles shell command execution in components like command interpreters or interfaces that process external inputs."
"value": "A shell injection vulnerability was discovered in ROS2 (Robot Operating System 2) Humble Hawksbill in ROS_VERSION 2 and ROS_PYTHON_VERSION 3, allows remote attackers to execute arbitrary code, escalate privileges, and obtain sensitive information due to the way ROS2 handles shell command execution in components like command interpreters or interfaces that process external inputs. NOTE: this is disputed by multiple third parties who believe there was not reasonable evidence to determine the existence of a vulnerability."
},
{
"lang": "es",

View File

@ -2,12 +2,12 @@
"id": "CVE-2024-29444",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-04-11T00:15:07.283",
"lastModified": "2024-04-11T12:47:44.137",
"lastModified": "2024-04-17T01:15:07.273",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "An OS command injection vulnerability has been discovered in ROS2 (Robot Operating System 2) Humble Hawksbill in ROS_VERSION 2 and ROS_PYTHON_VERSION 3, allows remote attackers to execute arbitrary code, escalate privileges, and obtain sensitive information via External Command Execution Modules, System Call Handlers, and Interface Scripts."
"value": "An OS command injection vulnerability has been discovered in ROS2 (Robot Operating System 2) Humble Hawksbill in ROS_VERSION 2 and ROS_PYTHON_VERSION 3, allows remote attackers to execute arbitrary code, escalate privileges, and obtain sensitive information via External Command Execution Modules, System Call Handlers, and Interface Scripts. NOTE: this is disputed by multiple third parties who believe there was not reasonable evidence to determine the existence of a vulnerability."
},
{
"lang": "es",

View File

@ -2,12 +2,12 @@
"id": "CVE-2024-29445",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-04-10T23:15:06.857",
"lastModified": "2024-04-11T12:47:44.137",
"lastModified": "2024-04-17T01:15:07.333",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "An issue was discovered in ROS2 (Robot Operating System 2) Humble Hawksbill in ROS_VERSION 2 and ROS_PYTHON_VERSION 3 where the system transmits messages in plaintext, allowing attackers to access sensitive information via a man-in-the-middle attack."
"value": "An issue was discovered in ROS2 (Robot Operating System 2) Humble Hawksbill in ROS_VERSION 2 and ROS_PYTHON_VERSION 3 where the system transmits messages in plaintext, allowing attackers to access sensitive information via a man-in-the-middle attack. NOTE: this is disputed by multiple third parties who believe there was not reasonable evidence to determine the existence of a vulnerability."
},
{
"lang": "es",

View File

@ -2,12 +2,12 @@
"id": "CVE-2024-29447",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-04-11T00:15:07.337",
"lastModified": "2024-04-11T12:47:44.137",
"lastModified": "2024-04-17T01:15:07.387",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "An issue was discovered in the default configurations of ROS2 Humble Hawksbill in ROS2 Humble Hawksbill in ROS_VERSION 2 and ROS_PYTHON_VERSION 3, allows unauthenticated attackers to gain access using default credentials."
"value": "An issue was discovered in the default configurations of ROS2 Humble Hawksbill in ROS2 Humble Hawksbill in ROS_VERSION 2 and ROS_PYTHON_VERSION 3, allows unauthenticated attackers to gain access using default credentials. NOTE: this is disputed by multiple third parties who believe there was not reasonable evidence to determine the existence of a vulnerability."
},
{
"lang": "es",

View File

@ -2,12 +2,12 @@
"id": "CVE-2024-29448",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-04-11T04:15:08.510",
"lastModified": "2024-04-11T12:47:44.137",
"lastModified": "2024-04-17T01:15:07.443",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "A buffer overflow vulnerability has been discovered in the C++ components of ROS2 Humble Hawksbill in ROS_VERSION 2 and ROS_PYTHON_VERSION 3, allows attackers to execute arbitrary code or cause a denial of service (DoS) via improper handling of arrays or strings."
"value": "A buffer overflow vulnerability has been discovered in the C++ components of ROS2 Humble Hawksbill in ROS_VERSION 2 and ROS_PYTHON_VERSION 3, allows attackers to execute arbitrary code or cause a denial of service (DoS) via improper handling of arrays or strings. NOTE: this is disputed by multiple third parties who believe there was not reasonable evidence to determine the existence of a vulnerability."
},
{
"lang": "es",

View File

@ -2,12 +2,12 @@
"id": "CVE-2024-29449",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-04-11T04:15:08.630",
"lastModified": "2024-04-11T12:47:44.137",
"lastModified": "2024-04-17T01:15:07.510",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "An issue was discovered in ROS2 Humble Hawksbill in ROS_VERSION 2 and ROS_PYTHON_VERSION 3, allows attackers to obtain sensitive information via man-in-the-middle attacks due to cleartext transmission of data across the ROS2 nodes' communication channels."
"value": "An issue was discovered in ROS2 Humble Hawksbill in ROS_VERSION 2 and ROS_PYTHON_VERSION 3, allows attackers to obtain sensitive information via man-in-the-middle attacks due to cleartext transmission of data across the ROS2 nodes' communication channels. NOTE: this is disputed by multiple third parties who believe there was not reasonable evidence to determine the existence of a vulnerability."
},
{
"lang": "es",

View File

@ -2,12 +2,12 @@
"id": "CVE-2024-29450",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-04-11T04:15:08.687",
"lastModified": "2024-04-11T12:47:44.137",
"lastModified": "2024-04-17T01:15:07.560",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "An issue has been discovered in the permission and access control components within ROS2 Humble Hawksbill, in ROS_VERSION 2 and ROS_PYTHON_VERSION 3, allows attackers to execute arbitrary code, cause a denial of service (DoS), escalate privileges, and obtain sensitive information via the authentication system, including protocols, processes, and checks designed to verify the identities of users or devices attempting to access the ROS2 system."
"value": "An issue has been discovered in the permission and access control components within ROS2 Humble Hawksbill, in ROS_VERSION 2 and ROS_PYTHON_VERSION 3, allows attackers to execute arbitrary code, cause a denial of service (DoS), escalate privileges, and obtain sensitive information via the authentication system, including protocols, processes, and checks designed to verify the identities of users or devices attempting to access the ROS2 system. NOTE: this is disputed by multiple third parties who believe there was not reasonable evidence to determine the existence of a vulnerability."
},
{
"lang": "es",

View File

@ -2,12 +2,12 @@
"id": "CVE-2024-29452",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-04-11T02:15:46.917",
"lastModified": "2024-04-11T12:47:44.137",
"lastModified": "2024-04-17T01:15:07.617",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "An insecure deserialization vulnerability has been identified in ROS2 Humble Hawksbill in ROS_VERSION 2 and ROS_PYTHON_VERSION 3, allows attackers to execute arbitrary code and obtain sensitive information via crafted input to the Data Serialization and Deserialization Components, Inter-Process Communication Mechanisms, and Network Communication Interfaces."
"value": "An insecure deserialization vulnerability has been identified in ROS2 Humble Hawksbill in ROS_VERSION 2 and ROS_PYTHON_VERSION 3, allows attackers to execute arbitrary code and obtain sensitive information via crafted input to the Data Serialization and Deserialization Components, Inter-Process Communication Mechanisms, and Network Communication Interfaces. NOTE: this is disputed by multiple third parties who believe there was not reasonable evidence to determine the existence of a vulnerability."
},
{
"lang": "es",

View File

@ -2,12 +2,12 @@
"id": "CVE-2024-29454",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-04-11T20:15:35.767",
"lastModified": "2024-04-12T12:43:57.400",
"lastModified": "2024-04-17T01:15:07.677",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "An issue discovered in packages or nodes in ROS2 Humble Hawksbill with ROS_VERSION=2 and ROS_PYTHON_VERSION=3 allows attackers to execute arbitrary commands potentially leading to unauthorized system control, data breaches, system and network compromise, and operational disruption."
"value": "An issue discovered in packages or nodes in ROS2 Humble Hawksbill with ROS_VERSION=2 and ROS_PYTHON_VERSION=3 allows attackers to execute arbitrary commands potentially leading to unauthorized system control, data breaches, system and network compromise, and operational disruption. NOTE: this is disputed by multiple third parties who believe there was not reasonable evidence to determine the existence of a vulnerability."
},
{
"lang": "es",

View File

@ -2,12 +2,12 @@
"id": "CVE-2024-29455",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-04-11T05:15:47.477",
"lastModified": "2024-04-11T12:47:44.137",
"lastModified": "2024-04-17T01:15:07.730",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "An arbitrary file upload vulnerability has been discovered in ROS2 Humble Hawksbill in ROS_VERSION 2 and ROS_PYTHON_VERSION 3, allows attackers to execute arbitrary code, cause a denial of service (DoS), and obtain sensitive information via crafted payload to the file upload mechanism of the ROS2 system, including the server\u2019s functionality for handling file uploads and the associated validation processes."
"value": "An arbitrary file upload vulnerability has been discovered in ROS2 Humble Hawksbill in ROS_VERSION 2 and ROS_PYTHON_VERSION 3, allows attackers to execute arbitrary code, cause a denial of service (DoS), and obtain sensitive information via crafted payload to the file upload mechanism of the ROS2 system, including the server\u2019s functionality for handling file uploads and the associated validation processes. NOTE: this is disputed by multiple third parties who believe there was not reasonable evidence to determine the existence of a vulnerability."
},
{
"lang": "es",

View File

@ -2,12 +2,12 @@
"id": "CVE-2024-30659",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-04-08T07:15:09.143",
"lastModified": "2024-04-08T18:48:40.217",
"lastModified": "2024-04-17T01:15:07.787",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "Shell Injection vulnerability in ROS (Robot Operating System) Melodic Morenia versions ROS_VERSION 1 and ROS_PYTHON_VERSION 3, allows attackers to execute arbitrary code, escalate privileges, and obtain sensitive information."
"value": "Shell Injection vulnerability in ROS (Robot Operating System) Melodic Morenia versions ROS_VERSION 1 and ROS_PYTHON_VERSION 3, allows attackers to execute arbitrary code, escalate privileges, and obtain sensitive information. NOTE: this is disputed by multiple third parties who believe there was not reasonable evidence to determine the existence of a vulnerability."
},
{
"lang": "es",

View File

@ -2,12 +2,12 @@
"id": "CVE-2024-30661",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-04-08T07:15:09.370",
"lastModified": "2024-04-08T18:48:40.217",
"lastModified": "2024-04-17T01:15:07.847",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "An unauthorized access vulnerability has been discovered in ROS Melodic Morenia versions where ROS_VERSION is 1 and ROS_PYTHON_VERSION is 3. This vulnerability could potentially allow a malicious user to gain unauthorized information access to multiple ROS nodes remotely. Unauthorized information access to these nodes could result in compromised system integrity, the execution of arbitrary commands, and disclosure of sensitive information."
"value": "An unauthorized access vulnerability has been discovered in ROS Melodic Morenia versions where ROS_VERSION is 1 and ROS_PYTHON_VERSION is 3. This vulnerability could potentially allow a malicious user to gain unauthorized information access to multiple ROS nodes remotely. Unauthorized information access to these nodes could result in compromised system integrity, the execution of arbitrary commands, and disclosure of sensitive information. NOTE: this is disputed by multiple third parties who believe there was not reasonable evidence to determine the existence of a vulnerability."
},
{
"lang": "es",

View File

@ -2,12 +2,12 @@
"id": "CVE-2024-30662",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-04-08T07:15:09.493",
"lastModified": "2024-04-08T18:48:40.217",
"lastModified": "2024-04-17T01:15:07.907",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "An issue was discovered in ROS (Robot Operating System) Melodic Morenia in ROS_VERSION 1 and ROS_PYTHON_VERSION 3, where the system transmits messages in plaintext. This flaw exposes sensitive information, making it vulnerable to man-in-the-middle (MitM) attacks, and allowing attackers to easily intercept and access this data."
"value": "An issue was discovered in ROS (Robot Operating System) Melodic Morenia in ROS_VERSION 1 and ROS_PYTHON_VERSION 3, where the system transmits messages in plaintext. This flaw exposes sensitive information, making it vulnerable to man-in-the-middle (MitM) attacks, and allowing attackers to easily intercept and access this data. NOTE: this is disputed by multiple third parties who believe there was not reasonable evidence to determine the existence of a vulnerability."
},
{
"lang": "es",

View File

@ -2,12 +2,12 @@
"id": "CVE-2024-30663",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-04-08T07:15:09.570",
"lastModified": "2024-04-08T18:48:40.217",
"lastModified": "2024-04-17T01:15:07.960",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "An issue was discovered in the default configurations of ROS (Robot Operating System) Melodic Morenia in ROS_VERSION 1 and ROS_PYTHON_VERSION 3. This vulnerability allows unauthenticated attackers to gain access using default credentials, posing a serious threat to the integrity and security of the system."
"value": "An issue was discovered in the default configurations of ROS (Robot Operating System) Melodic Morenia in ROS_VERSION 1 and ROS_PYTHON_VERSION 3. This vulnerability allows unauthenticated attackers to gain access using default credentials, posing a serious threat to the integrity and security of the system. NOTE: this is disputed by multiple third parties who believe there was not reasonable evidence to determine the existence of a vulnerability."
},
{
"lang": "es",

View File

@ -2,12 +2,12 @@
"id": "CVE-2024-30665",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-04-08T07:15:09.643",
"lastModified": "2024-04-08T18:48:40.217",
"lastModified": "2024-04-17T01:15:08.010",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "An OS command injection vulnerability has been discovered in ROS (Robot Operating System) Melodic Morenia in ROS_VERSION 1 and ROS_PYTHON_VERSION 3. This vulnerability primarily affects the command processing or system call components in ROS, making them susceptible to manipulation by malicious entities. Through this, unauthorized commands can be executed, leading to remote code execution (RCE), data theft, and malicious activities. The affected components include External Command Execution Modules, System Call Handlers, and Interface Scripts."
"value": "An OS command injection vulnerability has been discovered in ROS (Robot Operating System) Melodic Morenia in ROS_VERSION 1 and ROS_PYTHON_VERSION 3. This vulnerability primarily affects the command processing or system call components in ROS, making them susceptible to manipulation by malicious entities. Through this, unauthorized commands can be executed, leading to remote code execution (RCE), data theft, and malicious activities. The affected components include External Command Execution Modules, System Call Handlers, and Interface Scripts. NOTE: this is disputed by multiple third parties who believe there was not reasonable evidence to determine the existence of a vulnerability."
},
{
"lang": "es",

View File

@ -2,12 +2,12 @@
"id": "CVE-2024-30666",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-04-08T07:15:09.713",
"lastModified": "2024-04-08T18:48:40.217",
"lastModified": "2024-04-17T01:15:08.063",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "A buffer overflow vulnerability has been discovered in the C++ components of ROS (Robot Operating System) Melodic Morenia in ROS_VERSION 1 and ROS_PYTHON_VERSION 3, allows attackers to execute arbitrary code via improper handling of arrays or strings within these components."
"value": "A buffer overflow vulnerability has been discovered in the C++ components of ROS (Robot Operating System) Melodic Morenia in ROS_VERSION 1 and ROS_PYTHON_VERSION 3, allows attackers to execute arbitrary code via improper handling of arrays or strings within these components. NOTE: this is disputed by multiple third parties who believe there was not reasonable evidence to determine the existence of a vulnerability."
},
{
"lang": "es",

View File

@ -2,12 +2,12 @@
"id": "CVE-2024-30667",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-04-08T08:15:11.390",
"lastModified": "2024-04-08T18:48:40.217",
"lastModified": "2024-04-17T01:15:08.117",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "Insecure deserialization vulnerability in ROS (Robot Operating System) Melodic Morenia in ROS_VERSION 1 and ROS_PYTHON_VERSION 3, allows attackers to execute arbitrary code or obtain sensitive information via crafted input to the data handling components."
"value": "Insecure deserialization vulnerability in ROS (Robot Operating System) Melodic Morenia in ROS_VERSION 1 and ROS_PYTHON_VERSION 3, allows attackers to execute arbitrary code or obtain sensitive information via crafted input to the data handling components. NOTE: this is disputed by multiple third parties who believe there was not reasonable evidence to determine the existence of a vulnerability."
},
{
"lang": "es",

View File

@ -2,12 +2,12 @@
"id": "CVE-2024-30672",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-04-08T08:15:11.517",
"lastModified": "2024-04-08T18:48:40.217",
"lastModified": "2024-04-17T01:15:08.170",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "Arbitrary file upload vulnerability in ROS (Robot Operating System) Melodic Morenia in ROS_VERSION 1 and ROS_PYTHON_VERSION 3, allows attackers to execute arbitrary code, cause a denial of service (DoS), and obtain sensitive information via the file upload component."
"value": "Arbitrary file upload vulnerability in ROS (Robot Operating System) Melodic Morenia in ROS_VERSION 1 and ROS_PYTHON_VERSION 3, allows attackers to execute arbitrary code, cause a denial of service (DoS), and obtain sensitive information via the file upload component. NOTE: this is disputed by multiple third parties who believe there was not reasonable evidence to determine the existence of a vulnerability."
},
{
"lang": "es",

View File

@ -2,12 +2,12 @@
"id": "CVE-2024-30674",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-04-08T08:15:11.570",
"lastModified": "2024-04-08T18:48:40.217",
"lastModified": "2024-04-17T01:15:08.223",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "Unauthorized access vulnerability in ROS2 Iron Irwini in ROS_VERSION is 2 and ROS_PYTHON_VERSION is 3, allows remote attackers to gain control of multiple ROS2 nodes. Unauthorized information access to these nodes could result in compromised system integrity, the execution of arbitrary commands, and disclosure of sensitive information."
"value": "Unauthorized access vulnerability in ROS2 Iron Irwini in ROS_VERSION is 2 and ROS_PYTHON_VERSION is 3, allows remote attackers to gain control of multiple ROS2 nodes. Unauthorized information access to these nodes could result in compromised system integrity, the execution of arbitrary commands, and disclosure of sensitive information. NOTE: this is disputed by multiple third parties who believe there was not reasonable evidence to determine the existence of a vulnerability."
},
{
"lang": "es",

View File

@ -2,12 +2,12 @@
"id": "CVE-2024-30675",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-04-08T08:15:11.627",
"lastModified": "2024-04-08T18:48:40.217",
"lastModified": "2024-04-17T01:15:08.283",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "Unauthorized node injection vulnerability in ROS2 Iron Irwini in ROS_VERSION 2 and ROS_PYTHON_VERSION 3. This vulnerability could allow a malicious user to escalate privileges by injecting malicious ROS2 nodes into the system remotely."
"value": "Unauthorized node injection vulnerability in ROS2 Iron Irwini in ROS_VERSION 2 and ROS_PYTHON_VERSION 3. This vulnerability could allow a malicious user to escalate privileges by injecting malicious ROS2 nodes into the system remotely. NOTE: this is disputed by multiple third parties who believe there was not reasonable evidence to determine the existence of a vulnerability."
},
{
"lang": "es",

View File

@ -2,12 +2,12 @@
"id": "CVE-2024-30676",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-04-09T03:15:07.763",
"lastModified": "2024-04-09T12:48:04.090",
"lastModified": "2024-04-17T01:15:08.337",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "A Denial-of-Service (DoS) vulnerability exists in ROS2 Iron Irwini versions where ROS_VERSION is 2 and ROS_PYTHON_VERSION is 3. A malicious user could potentially exploit this vulnerability remotely to crash the ROS2 nodes, thereby causing a denial of service. The flaw allows an attacker to cause unexpected behavior in the operation of ROS2 nodes, which leads to their failure and interrupts the regular operation of the system, thus making it unavailable for its intended users."
"value": "A Denial-of-Service (DoS) vulnerability exists in ROS2 Iron Irwini versions where ROS_VERSION is 2 and ROS_PYTHON_VERSION is 3. A malicious user could potentially exploit this vulnerability remotely to crash the ROS2 nodes, thereby causing a denial of service. The flaw allows an attacker to cause unexpected behavior in the operation of ROS2 nodes, which leads to their failure and interrupts the regular operation of the system, thus making it unavailable for its intended users. NOTE: this is disputed by multiple third parties who believe there was not reasonable evidence to determine the existence of a vulnerability."
},
{
"lang": "es",

View File

@ -2,12 +2,12 @@
"id": "CVE-2024-30678",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-04-09T03:15:07.830",
"lastModified": "2024-04-09T12:48:04.090",
"lastModified": "2024-04-17T01:15:08.427",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "An issue has been discovered in ROS2 Iron Irwini ROS_VERSION 2 and ROS_PYTHON_VERSION 3, where the system transmits messages in plaintext. This flaw exposes sensitive information, making it vulnerable to man-in-the-middle (MitM) attacks, and allowing attackers to intercept and access this data."
"value": "An issue has been discovered in ROS2 Iron Irwini ROS_VERSION 2 and ROS_PYTHON_VERSION 3, where the system transmits messages in plaintext. This flaw exposes sensitive information, making it vulnerable to man-in-the-middle (MitM) attacks, and allowing attackers to intercept and access this data. NOTE: this is disputed by multiple third parties who believe there was not reasonable evidence to determine the existence of a vulnerability."
},
{
"lang": "es",

View File

@ -2,12 +2,12 @@
"id": "CVE-2024-30679",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-04-09T04:15:10.087",
"lastModified": "2024-04-09T12:48:04.090",
"lastModified": "2024-04-17T01:15:08.510",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "An issue was discovered in the default configurations of ROS2 Iron Irwini ROS_VERSION 2 and ROS_PYTHON_VERSION 3, allows unauthenticated attackers to authenticate using default credentials."
"value": "An issue was discovered in the default configurations of ROS2 Iron Irwini ROS_VERSION 2 and ROS_PYTHON_VERSION 3, allows unauthenticated attackers to authenticate using default credentials. NOTE: this is disputed by multiple third parties who believe there was not reasonable evidence to determine the existence of a vulnerability."
},
{
"lang": "es",

View File

@ -2,12 +2,12 @@
"id": "CVE-2024-30680",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-04-09T04:15:10.583",
"lastModified": "2024-04-09T12:48:04.090",
"lastModified": "2024-04-17T01:15:08.577",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "Shell injection vulnerability was discovered in ROS2 (Robot Operating System 2) Iron Irwini in versions ROS_VERSION 2 and ROS_PYTHON_VERSION 3, allows attackers to execute arbitrary code escalate privileges, and obtain sensitive information due to the way ROS2 handles shell command execution in components like command interpreters or interfaces that process external inputs."
"value": "Shell injection vulnerability was discovered in ROS2 (Robot Operating System 2) Iron Irwini in versions ROS_VERSION 2 and ROS_PYTHON_VERSION 3, allows attackers to execute arbitrary code escalate privileges, and obtain sensitive information due to the way ROS2 handles shell command execution in components like command interpreters or interfaces that process external inputs. NOTE: this is disputed by multiple third parties who believe there was not reasonable evidence to determine the existence of a vulnerability."
},
{
"lang": "es",

View File

@ -2,12 +2,12 @@
"id": "CVE-2024-30681",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-04-09T04:15:10.747",
"lastModified": "2024-04-09T12:48:04.090",
"lastModified": "2024-04-17T01:15:08.633",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "An OS command injection vulnerability has been discovered in ROS2 Iron Irwini version ROS_VERSION 2 and ROS_PYTHON_VERSION 3, allows attackers to execute arbitrary code, escalate privileges, and obtain sensitive information via the command processing or system call components in ROS2."
"value": "An OS command injection vulnerability has been discovered in ROS2 Iron Irwini version ROS_VERSION 2 and ROS_PYTHON_VERSION 3, allows attackers to execute arbitrary code, escalate privileges, and obtain sensitive information via the command processing or system call components in ROS2. NOTE: this is disputed by multiple third parties who believe there was not reasonable evidence to determine the existence of a vulnerability."
},
{
"lang": "es",

View File

@ -2,12 +2,12 @@
"id": "CVE-2024-30683",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-04-09T04:15:10.877",
"lastModified": "2024-04-09T12:48:04.090",
"lastModified": "2024-04-17T01:15:08.690",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "A buffer overflow vulnerability has been discovered in the C++ components of ROS2 Iron Irwini versions ROS_VERSION 2 and ROS_PYTHON_VERSION 3, allows attackers to execute arbitrary code or cause a Denial of Service (DoS) via improper handling of arrays or strings."
"value": "A buffer overflow vulnerability has been discovered in the C++ components of ROS2 Iron Irwini versions ROS_VERSION 2 and ROS_PYTHON_VERSION 3, allows attackers to execute arbitrary code or cause a Denial of Service (DoS) via improper handling of arrays or strings. NOTE: this is disputed by multiple third parties who believe there was not reasonable evidence to determine the existence of a vulnerability."
},
{
"lang": "es",

View File

@ -2,12 +2,12 @@
"id": "CVE-2024-30684",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-04-09T05:15:47.807",
"lastModified": "2024-04-09T12:48:04.090",
"lastModified": "2024-04-17T01:15:08.750",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "An insecure logging vulnerability has been identified within ROS2 Iron Irwini versions ROS_VERSION 2 and ROS_PYTHON_VERSION 3, allows attackers to access sensitive information via inadequate security measures implemented within the logging mechanisms of ROS2."
"value": "An insecure logging vulnerability has been identified within ROS2 Iron Irwini versions ROS_VERSION 2 and ROS_PYTHON_VERSION 3, allows attackers to access sensitive information via inadequate security measures implemented within the logging mechanisms of ROS2. NOTE: this is disputed by multiple third parties who believe there was not reasonable evidence to determine the existence of a vulnerability."
},
{
"lang": "es",

View File

@ -2,12 +2,12 @@
"id": "CVE-2024-30686",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-04-09T05:15:47.853",
"lastModified": "2024-04-09T12:48:04.090",
"lastModified": "2024-04-17T01:15:08.813",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "An issue was discovered in ROS2 Iron Irwini versions ROS_VERSION 2 and ROS_PYTHON_VERSION 3, allows remote attackers to execute arbitrary code via packages or nodes within the ROS2 system."
"value": "An issue was discovered in ROS2 Iron Irwini versions ROS_VERSION 2 and ROS_PYTHON_VERSION 3, allows remote attackers to execute arbitrary code via packages or nodes within the ROS2 system. NOTE: this is disputed by multiple third parties who believe there was not reasonable evidence to determine the existence of a vulnerability."
},
{
"lang": "es",

View File

@ -2,12 +2,12 @@
"id": "CVE-2024-30687",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-04-09T05:15:47.920",
"lastModified": "2024-04-09T12:48:04.090",
"lastModified": "2024-04-17T01:15:08.873",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "An insecure deserialization vulnerability has been identified in ROS2 Iron Irwini versions ROS_VERSION 2 and ROS_PYTHON_VERSION 3, allows attackers to execute arbitrary code via a crafted input to the Data Serialization and Deserialization Components, Inter-Process Communication Mechanisms, and Network Communication Interfaces."
"value": "An insecure deserialization vulnerability has been identified in ROS2 Iron Irwini versions ROS_VERSION 2 and ROS_PYTHON_VERSION 3, allows attackers to execute arbitrary code via a crafted input to the Data Serialization and Deserialization Components, Inter-Process Communication Mechanisms, and Network Communication Interfaces. NOTE: this is disputed by multiple third parties who believe there was not reasonable evidence to determine the existence of a vulnerability."
},
{
"lang": "es",

View File

@ -2,12 +2,12 @@
"id": "CVE-2024-30688",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-04-09T05:15:47.980",
"lastModified": "2024-04-09T12:48:04.090",
"lastModified": "2024-04-17T01:15:08.927",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "An arbitrary file upload vulnerability has been discovered in ROS2 Iron Irwini versions ROS_VERSION 2 and ROS_PYTHON_VERSION 3, allows attackers to execute arbitrary code via a crafted payload to the file upload mechanism of the ROS2 system, including the server\u2019s functionality for handling file uploads and the associated validation processes."
"value": "An arbitrary file upload vulnerability has been discovered in ROS2 Iron Irwini versions ROS_VERSION 2 and ROS_PYTHON_VERSION 3, allows attackers to execute arbitrary code via a crafted payload to the file upload mechanism of the ROS2 system, including the server\u2019s functionality for handling file uploads and the associated validation processes. NOTE: this is disputed by multiple third parties who believe there was not reasonable evidence to determine the existence of a vulnerability."
},
{
"lang": "es",

View File

@ -2,12 +2,12 @@
"id": "CVE-2024-30690",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-04-09T06:15:08.963",
"lastModified": "2024-04-09T12:48:04.090",
"lastModified": "2024-04-17T01:15:08.980",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "An unauthorized node injection vulnerability has been identified in ROS2 Galactic Geochelone versions where ROS_VERSION is 2 and ROS_PYTHON_VERSION is 3, allows remote attackers to escalate privileges."
"value": "An unauthorized node injection vulnerability has been identified in ROS2 Galactic Geochelone versions where ROS_VERSION is 2 and ROS_PYTHON_VERSION is 3, allows remote attackers to escalate privileges. NOTE: this is disputed by multiple third parties who believe there was not reasonable evidence to determine the existence of a vulnerability."
},
{
"lang": "es",

View File

@ -2,12 +2,12 @@
"id": "CVE-2024-30691",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-04-09T07:15:08.467",
"lastModified": "2024-04-09T12:48:04.090",
"lastModified": "2024-04-17T01:15:09.033",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "An issue was discovered in ROS2 Galactic Geochelone in version ROS_VERSION 2 and ROS_PYTHON_VERSION 3, allows remote attackers to execute arbitrary code, escalate privileges, obtain sensitive information, and gain unauthorized access to multiple ROS2 nodes."
"value": "An issue was discovered in ROS2 Galactic Geochelone in version ROS_VERSION 2 and ROS_PYTHON_VERSION 3, allows remote attackers to execute arbitrary code, escalate privileges, obtain sensitive information, and gain unauthorized access to multiple ROS2 nodes. NOTE: this is disputed by multiple third parties who believe there was not reasonable evidence to determine the existence of a vulnerability."
},
{
"lang": "es",

View File

@ -2,12 +2,12 @@
"id": "CVE-2024-30692",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-04-09T07:15:08.560",
"lastModified": "2024-04-09T12:48:04.090",
"lastModified": "2024-04-17T01:15:09.100",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "A issue was discovered in ROS2 Galactic Geochelone versions ROS_VERSION 2 and ROS_PYTHON_VERSION 3, allows remote attackers to cause a denial of service (DoS) in the ROS2 nodes."
"value": "A issue was discovered in ROS2 Galactic Geochelone versions ROS_VERSION 2 and ROS_PYTHON_VERSION 3, allows remote attackers to cause a denial of service (DoS) in the ROS2 nodes. NOTE: this is disputed by multiple third parties who believe there was not reasonable evidence to determine the existence of a vulnerability."
},
{
"lang": "es",

View File

@ -2,12 +2,12 @@
"id": "CVE-2024-30694",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-04-09T08:15:07.420",
"lastModified": "2024-04-09T12:48:04.090",
"lastModified": "2024-04-17T01:15:09.160",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "A shell injection vulnerability was discovered in ROS2 (Robot Operating System 2) Galactic Geochelone ROS_VERSION 2 and ROS_PYTHON_VERSION 3, allows attackers to execute arbitrary code, escalate privileges, and obtain sensitive information due to the way ROS2 handles shell command execution in components like command interpreters or interfaces that process external inputs."
"value": "A shell injection vulnerability was discovered in ROS2 (Robot Operating System 2) Galactic Geochelone ROS_VERSION 2 and ROS_PYTHON_VERSION 3, allows attackers to execute arbitrary code, escalate privileges, and obtain sensitive information due to the way ROS2 handles shell command execution in components like command interpreters or interfaces that process external inputs. NOTE: this is disputed by multiple third parties who believe there was not reasonable evidence to determine the existence of a vulnerability."
}
],
"metrics": {},

View File

@ -2,12 +2,12 @@
"id": "CVE-2024-30695",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-04-09T08:15:07.530",
"lastModified": "2024-04-09T12:48:04.090",
"lastModified": "2024-04-17T01:15:09.217",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "An issue was discovered in the default configurations of ROS2 Galactic Geochelone versions ROS_VERSION 2 and ROS_PYTHON_VERSION 3, allows unauthenticated attackers to gain access using default credentials."
"value": "An issue was discovered in the default configurations of ROS2 Galactic Geochelone versions ROS_VERSION 2 and ROS_PYTHON_VERSION 3, allows unauthenticated attackers to gain access using default credentials. NOTE: this is disputed by multiple third parties who believe there was not reasonable evidence to determine the existence of a vulnerability."
}
],
"metrics": {},

View File

@ -2,12 +2,12 @@
"id": "CVE-2024-30696",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-04-09T08:15:07.587",
"lastModified": "2024-04-09T12:48:04.090",
"lastModified": "2024-04-17T01:15:09.273",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "OS command injection vulnerability in ROS2 Galactic Geochelone in ROS_VERSION 2 and ROS_PYTHON_VERSION 3, allows remote attackers to execute arbitrary code, escalate privileges, and obtain sensitive information via the command processing or system call components in ROS2, including External Command Execution Modules, System Call Handlers, and Interface Scripts."
"value": "OS command injection vulnerability in ROS2 Galactic Geochelone in ROS_VERSION 2 and ROS_PYTHON_VERSION 3, allows remote attackers to execute arbitrary code, escalate privileges, and obtain sensitive information via the command processing or system call components in ROS2, including External Command Execution Modules, System Call Handlers, and Interface Scripts. NOTE: this is disputed by multiple third parties who believe there was not reasonable evidence to determine the existence of a vulnerability."
}
],
"metrics": {},

View File

@ -2,12 +2,12 @@
"id": "CVE-2024-30697",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-04-09T08:15:07.663",
"lastModified": "2024-04-09T12:48:04.090",
"lastModified": "2024-04-17T01:15:09.330",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "An issue was discovered in ROS2 Galactic Geochelone in ROS_VERSION 2 and ROS_PYTHON_VERSION 3, where the system transmits messages in plaintext, allowing attackers to access sensitive information via a man-in-the-middle attack."
"value": "An issue was discovered in ROS2 Galactic Geochelone in ROS_VERSION 2 and ROS_PYTHON_VERSION 3, where the system transmits messages in plaintext, allowing attackers to access sensitive information via a man-in-the-middle attack. NOTE: this is disputed by multiple third parties who believe there was not reasonable evidence to determine the existence of a vulnerability."
}
],
"metrics": {},

View File

@ -2,12 +2,12 @@
"id": "CVE-2024-30699",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-04-09T08:15:07.717",
"lastModified": "2024-04-09T12:48:04.090",
"lastModified": "2024-04-17T01:15:09.387",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "A buffer overflow vulnerability has been discovered in the C++ components of ROS2 Galactic Geochelone ROS_VERSION 2 and ROS_PYTHON_VERSION 3, allows attackers to execute arbitrary code or cause a denial of service (DoS) via improper handling of arrays or strings."
"value": "A buffer overflow vulnerability has been discovered in the C++ components of ROS2 Galactic Geochelone ROS_VERSION 2 and ROS_PYTHON_VERSION 3, allows attackers to execute arbitrary code or cause a denial of service (DoS) via improper handling of arrays or strings. NOTE: this is disputed by multiple third parties who believe there was not reasonable evidence to determine the existence of a vulnerability."
}
],
"metrics": {},

View File

@ -2,12 +2,12 @@
"id": "CVE-2024-30701",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-04-09T08:15:07.770",
"lastModified": "2024-04-09T12:48:04.090",
"lastModified": "2024-04-17T01:15:09.447",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "An insecure logging vulnerability in ROS2 Galactic Geochelone ROS_VERSION 2 and ROS_PYTHON_VERSION 3, allows attackers to obtain sensitive information via inadequate security measures implemented within the logging mechanisms of ROS2."
"value": "An insecure logging vulnerability in ROS2 Galactic Geochelone ROS_VERSION 2 and ROS_PYTHON_VERSION 3, allows attackers to obtain sensitive information via inadequate security measures implemented within the logging mechanisms of ROS2. NOTE: this is disputed by multiple third parties who believe there was not reasonable evidence to determine the existence of a vulnerability."
}
],
"metrics": {},

View File

@ -2,12 +2,12 @@
"id": "CVE-2024-30702",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-04-09T18:15:09.680",
"lastModified": "2024-04-10T13:24:00.070",
"lastModified": "2024-04-17T01:15:09.503",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "An issue was discovered in ROS2 Galactic Geochelone in ROS_VERSION 2 and ROS_PYTHON_VERSION 3, allows remote attackers to execute arbitrary code via packages or nodes within the ROS2 system."
"value": "An issue was discovered in ROS2 Galactic Geochelone in ROS_VERSION 2 and ROS_PYTHON_VERSION 3, allows remote attackers to execute arbitrary code via packages or nodes within the ROS2 system. NOTE: this is disputed by multiple third parties who believe there was not reasonable evidence to determine the existence of a vulnerability."
},
{
"lang": "es",

View File

@ -2,12 +2,12 @@
"id": "CVE-2024-30703",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-04-09T18:15:09.743",
"lastModified": "2024-04-10T13:24:00.070",
"lastModified": "2024-04-17T01:15:09.570",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "An arbitrary file upload vulnerability has been discovered in ROS2 (Robot Operating System 2) Galactic Geochelone ROS_VERSION 2 and ROS_PYTHON_VERSION 3, allows attackers to execute arbitrary code, cause a denial of service (DoS), and obtain sensitive information via a crafted payload to the file upload mechanism of the ROS2 system, including the server\u2019s functionality for handling file uploads and the associated validation processes."
"value": "An arbitrary file upload vulnerability has been discovered in ROS2 (Robot Operating System 2) Galactic Geochelone ROS_VERSION 2 and ROS_PYTHON_VERSION 3, allows attackers to execute arbitrary code, cause a denial of service (DoS), and obtain sensitive information via a crafted payload to the file upload mechanism of the ROS2 system, including the server\u2019s functionality for handling file uploads and the associated validation processes. NOTE: this is disputed by multiple third parties who believe there was not reasonable evidence to determine the existence of a vulnerability."
},
{
"lang": "es",

View File

@ -2,12 +2,12 @@
"id": "CVE-2024-30704",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-04-09T18:15:09.800",
"lastModified": "2024-04-10T13:24:00.070",
"lastModified": "2024-04-17T01:15:09.627",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "An insecure deserialization vulnerability has been identified in ROS2 Galactic Geochelone ROS_VERSION 2 and ROS_PYTHON_VERSION 3, allows attackers to execute arbitrary code and obtain sensitive information via crafted input to the Data Serialization and Deserialization Components, Inter-Process Communication Mechanisms, and Network Communication Interfaces."
"value": "An insecure deserialization vulnerability has been identified in ROS2 Galactic Geochelone ROS_VERSION 2 and ROS_PYTHON_VERSION 3, allows attackers to execute arbitrary code and obtain sensitive information via crafted input to the Data Serialization and Deserialization Components, Inter-Process Communication Mechanisms, and Network Communication Interfaces. NOTE: this is disputed by multiple third parties who believe there was not reasonable evidence to determine the existence of a vulnerability."
},
{
"lang": "es",

View File

@ -2,12 +2,12 @@
"id": "CVE-2024-30706",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-04-09T19:15:38.980",
"lastModified": "2024-04-10T13:23:38.787",
"lastModified": "2024-04-17T01:15:09.687",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "An issue was discovered in ROS2 Dashing Diademata versions ROS_VERSION is 2 and ROS_PYTHON_VERSION is 3, allows remote attackers to execute arbitrary code, escalate privileges, obtain sensitive information, and gain unauthorized access to multiple ROS2 nodes."
"value": "An issue was discovered in ROS2 Dashing Diademata versions ROS_VERSION is 2 and ROS_PYTHON_VERSION is 3, allows remote attackers to execute arbitrary code, escalate privileges, obtain sensitive information, and gain unauthorized access to multiple ROS2 nodes. NOTE: this is disputed by multiple third parties who believe there was not reasonable evidence to determine the existence of a vulnerability."
},
{
"lang": "es",

View File

@ -2,12 +2,12 @@
"id": "CVE-2024-30707",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-04-10T01:15:19.053",
"lastModified": "2024-04-10T13:23:38.787",
"lastModified": "2024-04-17T01:15:09.747",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "Unauthorized node injection vulnerability in ROS2 Dashing Diademata in ROS_VERSION 2 and ROS_PYTHON_VERSION 3, allows remote attackers to escalate privileges and inject malicious ROS2 nodes into the system."
"value": "Unauthorized node injection vulnerability in ROS2 Dashing Diademata in ROS_VERSION 2 and ROS_PYTHON_VERSION 3, allows remote attackers to escalate privileges and inject malicious ROS2 nodes into the system. NOTE: this is disputed by multiple third parties who believe there was not reasonable evidence to determine the existence of a vulnerability."
},
{
"lang": "es",

View File

@ -2,12 +2,12 @@
"id": "CVE-2024-30708",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-04-10T01:15:19.110",
"lastModified": "2024-04-10T13:23:38.787",
"lastModified": "2024-04-17T01:15:09.810",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "An issue was discovered in ROS2 Dashing Diademata in ROS_VERSION 2 and ROS_PYTHON_VERSION 3, allows remote attackers to cause a denial of service (DoS) via the ROS2 nodes."
"value": "An issue was discovered in ROS2 Dashing Diademata in ROS_VERSION 2 and ROS_PYTHON_VERSION 3, allows remote attackers to cause a denial of service (DoS) via the ROS2 nodes. NOTE: this is disputed by multiple third parties who believe there was not reasonable evidence to determine the existence of a vulnerability."
},
{
"lang": "es",

View File

@ -2,12 +2,12 @@
"id": "CVE-2024-30710",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-04-10T01:15:19.160",
"lastModified": "2024-04-10T13:23:38.787",
"lastModified": "2024-04-17T01:15:09.867",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "An issue was discovered in ROS2 Dashing Diademata in ROS_VERSION 2 and ROS_PYTHON_VERSION 3, where the system transmits messages in plaintext. This flaw exposes sensitive information, making it vulnerable to man-in-the-middle (MitM) attacks, and allowing attackers to easily intercept and access this data."
"value": "An issue was discovered in ROS2 Dashing Diademata in ROS_VERSION 2 and ROS_PYTHON_VERSION 3, where the system transmits messages in plaintext. This flaw exposes sensitive information, making it vulnerable to man-in-the-middle (MitM) attacks, and allowing attackers to easily intercept and access this data. NOTE: this is disputed by multiple third parties who believe there was not reasonable evidence to determine the existence of a vulnerability."
},
{
"lang": "es",

View File

@ -2,12 +2,12 @@
"id": "CVE-2024-30711",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-04-10T02:15:10.300",
"lastModified": "2024-04-10T13:23:38.787",
"lastModified": "2024-04-17T01:15:09.923",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "An issue was discovered in the default configurations of ROS2 Dashing Diademata in ROS_VERSION 2 and ROS_PYTHON_VERSION 3, allows unauthenticated attackers to gain access using default credentials."
"value": "An issue was discovered in the default configurations of ROS2 Dashing Diademata in ROS_VERSION 2 and ROS_PYTHON_VERSION 3, allows unauthenticated attackers to gain access using default credentials. NOTE: this is disputed by multiple third parties who believe there was not reasonable evidence to determine the existence of a vulnerability."
},
{
"lang": "es",

View File

@ -2,12 +2,12 @@
"id": "CVE-2024-30712",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-04-10T02:15:10.400",
"lastModified": "2024-04-10T13:23:38.787",
"lastModified": "2024-04-17T01:15:09.990",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "A shell injection vulnerability was discovered in ROS2 (Robot Operating System 2) Dashing Diademata in ROS_VERSION 2 and ROS_PYTHON_VERSION 3, allows remote attackers to execute arbitrary code, escalate privileges, and obtain sensitive information due to the way ROS2 handles shell command execution in components like command interpreters or interfaces that process external inputs."
"value": "A shell injection vulnerability was discovered in ROS2 (Robot Operating System 2) Dashing Diademata in ROS_VERSION 2 and ROS_PYTHON_VERSION 3, allows remote attackers to execute arbitrary code, escalate privileges, and obtain sensitive information due to the way ROS2 handles shell command execution in components like command interpreters or interfaces that process external inputs. NOTE: this is disputed by multiple third parties who believe there was not reasonable evidence to determine the existence of a vulnerability."
},
{
"lang": "es",

View File

@ -2,12 +2,12 @@
"id": "CVE-2024-30713",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-04-10T02:15:10.473",
"lastModified": "2024-04-10T13:23:38.787",
"lastModified": "2024-04-17T01:15:10.050",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "An OS command injection vulnerability has been discovered in ROS2 Dashing Diademata in ROS_VERSION 2 and ROS_PYTHON_VERSION 3, allows remote attackers to execute arbitrary code, escalate privileges, and obtain sensitive information via the External Command Execution Modules, System Call Handlers, and Interface Scripts."
"value": "An OS command injection vulnerability has been discovered in ROS2 Dashing Diademata in ROS_VERSION 2 and ROS_PYTHON_VERSION 3, allows remote attackers to execute arbitrary code, escalate privileges, and obtain sensitive information via the External Command Execution Modules, System Call Handlers, and Interface Scripts. NOTE: this is disputed by multiple third parties who believe there was not reasonable evidence to determine the existence of a vulnerability."
},
{
"lang": "es",

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2024-31503",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-04-17T00:15:07.220",
"lastModified": "2024-04-17T00:15:07.220",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Incorrect access control in Dolibarr ERP CRM versions 19.0.0 and before, allows authenticated attackers to steal victim users' session cookies and CSRF protection tokens via user interaction with a crafted web page, leading to account takeover."
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/alexbsec/CVEs/blob/master/2024/CVE-2024-31503.md",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2024-31680",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-04-17T00:15:07.293",
"lastModified": "2024-04-17T00:15:07.293",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "File Upload vulnerability in Shibang Communications Co., Ltd. IP network intercom broadcasting system v.1.0 allows a local attacker to execute arbitrary code via the my_parser.php component."
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/heidashuai5588/cve/blob/main/upload.md",
"source": "cve@mitre.org"
}
]
}

View File

@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update
```plain
2024-04-16T23:55:32.287910+00:00
2024-04-17T02:00:30.816528+00:00
```
### Most recent CVE Modification Timestamp synchronized with NVD
```plain
2024-04-16T23:15:09.173000+00:00
2024-04-17T01:15:10.050000+00:00
```
### Last Data Feed Release
@ -27,54 +27,53 @@ Repository synchronizes with the NVD every 2 hours.
Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/releases/latest)
```plain
2024-04-16T00:00:20.260499+00:00
2024-04-17T00:00:20.264953+00:00
```
### Total Number of included CVEs
```plain
245887
245890
```
### CVEs added in the last Commit
Recently added CVEs: `140`
Recently added CVEs: `3`
- [CVE-2024-21104](CVE-2024/CVE-2024-211xx/CVE-2024-21104.json) (`2024-04-16T22:15:31.600`)
- [CVE-2024-21105](CVE-2024/CVE-2024-211xx/CVE-2024-21105.json) (`2024-04-16T22:15:31.770`)
- [CVE-2024-21106](CVE-2024/CVE-2024-211xx/CVE-2024-21106.json) (`2024-04-16T22:15:31.940`)
- [CVE-2024-21107](CVE-2024/CVE-2024-211xx/CVE-2024-21107.json) (`2024-04-16T22:15:32.110`)
- [CVE-2024-21108](CVE-2024/CVE-2024-211xx/CVE-2024-21108.json) (`2024-04-16T22:15:32.277`)
- [CVE-2024-21109](CVE-2024/CVE-2024-211xx/CVE-2024-21109.json) (`2024-04-16T22:15:32.440`)
- [CVE-2024-21110](CVE-2024/CVE-2024-211xx/CVE-2024-21110.json) (`2024-04-16T22:15:32.617`)
- [CVE-2024-21111](CVE-2024/CVE-2024-211xx/CVE-2024-21111.json) (`2024-04-16T22:15:32.780`)
- [CVE-2024-21112](CVE-2024/CVE-2024-211xx/CVE-2024-21112.json) (`2024-04-16T22:15:32.957`)
- [CVE-2024-21113](CVE-2024/CVE-2024-211xx/CVE-2024-21113.json) (`2024-04-16T22:15:33.127`)
- [CVE-2024-21114](CVE-2024/CVE-2024-211xx/CVE-2024-21114.json) (`2024-04-16T22:15:33.300`)
- [CVE-2024-21115](CVE-2024/CVE-2024-211xx/CVE-2024-21115.json) (`2024-04-16T22:15:33.467`)
- [CVE-2024-21116](CVE-2024/CVE-2024-211xx/CVE-2024-21116.json) (`2024-04-16T22:15:33.653`)
- [CVE-2024-21117](CVE-2024/CVE-2024-211xx/CVE-2024-21117.json) (`2024-04-16T22:15:33.860`)
- [CVE-2024-21118](CVE-2024/CVE-2024-211xx/CVE-2024-21118.json) (`2024-04-16T22:15:34.027`)
- [CVE-2024-21119](CVE-2024/CVE-2024-211xx/CVE-2024-21119.json) (`2024-04-16T22:15:34.197`)
- [CVE-2024-21120](CVE-2024/CVE-2024-211xx/CVE-2024-21120.json) (`2024-04-16T22:15:34.427`)
- [CVE-2024-21121](CVE-2024/CVE-2024-211xx/CVE-2024-21121.json) (`2024-04-16T22:15:34.600`)
- [CVE-2024-27086](CVE-2024/CVE-2024-270xx/CVE-2024-27086.json) (`2024-04-16T22:15:34.783`)
- [CVE-2024-29291](CVE-2024/CVE-2024-292xx/CVE-2024-29291.json) (`2024-04-16T23:15:08.767`)
- [CVE-2024-29402](CVE-2024/CVE-2024-294xx/CVE-2024-29402.json) (`2024-04-16T23:15:08.827`)
- [CVE-2024-31452](CVE-2024/CVE-2024-314xx/CVE-2024-31452.json) (`2024-04-16T22:15:35.003`)
- [CVE-2024-31759](CVE-2024/CVE-2024-317xx/CVE-2024-31759.json) (`2024-04-16T23:15:09.047`)
- [CVE-2024-31760](CVE-2024/CVE-2024-317xx/CVE-2024-31760.json) (`2024-04-16T23:15:09.107`)
- [CVE-2024-31887](CVE-2024/CVE-2024-318xx/CVE-2024-31887.json) (`2024-04-16T22:15:35.240`)
- [CVE-2024-22354](CVE-2024/CVE-2024-223xx/CVE-2024-22354.json) (`2024-04-17T01:15:06.747`)
- [CVE-2024-31503](CVE-2024/CVE-2024-315xx/CVE-2024-31503.json) (`2024-04-17T00:15:07.220`)
- [CVE-2024-31680](CVE-2024/CVE-2024-316xx/CVE-2024-31680.json) (`2024-04-17T00:15:07.293`)
### CVEs modified in the last Commit
Recently modified CVEs: `4`
Recently modified CVEs: `53`
- [CVE-2024-0914](CVE-2024/CVE-2024-09xx/CVE-2024-0914.json) (`2024-04-16T22:15:11.330`)
- [CVE-2024-27592](CVE-2024/CVE-2024-275xx/CVE-2024-27592.json) (`2024-04-16T23:15:08.690`)
- [CVE-2024-31497](CVE-2024/CVE-2024-314xx/CVE-2024-31497.json) (`2024-04-16T23:15:08.903`)
- [CVE-2024-32036](CVE-2024/CVE-2024-320xx/CVE-2024-32036.json) (`2024-04-16T23:15:09.173`)
- [CVE-2024-30681](CVE-2024/CVE-2024-306xx/CVE-2024-30681.json) (`2024-04-17T01:15:08.633`)
- [CVE-2024-30683](CVE-2024/CVE-2024-306xx/CVE-2024-30683.json) (`2024-04-17T01:15:08.690`)
- [CVE-2024-30684](CVE-2024/CVE-2024-306xx/CVE-2024-30684.json) (`2024-04-17T01:15:08.750`)
- [CVE-2024-30686](CVE-2024/CVE-2024-306xx/CVE-2024-30686.json) (`2024-04-17T01:15:08.813`)
- [CVE-2024-30687](CVE-2024/CVE-2024-306xx/CVE-2024-30687.json) (`2024-04-17T01:15:08.873`)
- [CVE-2024-30688](CVE-2024/CVE-2024-306xx/CVE-2024-30688.json) (`2024-04-17T01:15:08.927`)
- [CVE-2024-30690](CVE-2024/CVE-2024-306xx/CVE-2024-30690.json) (`2024-04-17T01:15:08.980`)
- [CVE-2024-30691](CVE-2024/CVE-2024-306xx/CVE-2024-30691.json) (`2024-04-17T01:15:09.033`)
- [CVE-2024-30692](CVE-2024/CVE-2024-306xx/CVE-2024-30692.json) (`2024-04-17T01:15:09.100`)
- [CVE-2024-30694](CVE-2024/CVE-2024-306xx/CVE-2024-30694.json) (`2024-04-17T01:15:09.160`)
- [CVE-2024-30695](CVE-2024/CVE-2024-306xx/CVE-2024-30695.json) (`2024-04-17T01:15:09.217`)
- [CVE-2024-30696](CVE-2024/CVE-2024-306xx/CVE-2024-30696.json) (`2024-04-17T01:15:09.273`)
- [CVE-2024-30697](CVE-2024/CVE-2024-306xx/CVE-2024-30697.json) (`2024-04-17T01:15:09.330`)
- [CVE-2024-30699](CVE-2024/CVE-2024-306xx/CVE-2024-30699.json) (`2024-04-17T01:15:09.387`)
- [CVE-2024-30701](CVE-2024/CVE-2024-307xx/CVE-2024-30701.json) (`2024-04-17T01:15:09.447`)
- [CVE-2024-30702](CVE-2024/CVE-2024-307xx/CVE-2024-30702.json) (`2024-04-17T01:15:09.503`)
- [CVE-2024-30703](CVE-2024/CVE-2024-307xx/CVE-2024-30703.json) (`2024-04-17T01:15:09.570`)
- [CVE-2024-30704](CVE-2024/CVE-2024-307xx/CVE-2024-30704.json) (`2024-04-17T01:15:09.627`)
- [CVE-2024-30706](CVE-2024/CVE-2024-307xx/CVE-2024-30706.json) (`2024-04-17T01:15:09.687`)
- [CVE-2024-30707](CVE-2024/CVE-2024-307xx/CVE-2024-30707.json) (`2024-04-17T01:15:09.747`)
- [CVE-2024-30708](CVE-2024/CVE-2024-307xx/CVE-2024-30708.json) (`2024-04-17T01:15:09.810`)
- [CVE-2024-30710](CVE-2024/CVE-2024-307xx/CVE-2024-30710.json) (`2024-04-17T01:15:09.867`)
- [CVE-2024-30711](CVE-2024/CVE-2024-307xx/CVE-2024-30711.json) (`2024-04-17T01:15:09.923`)
- [CVE-2024-30712](CVE-2024/CVE-2024-307xx/CVE-2024-30712.json) (`2024-04-17T01:15:09.990`)
- [CVE-2024-30713](CVE-2024/CVE-2024-307xx/CVE-2024-30713.json) (`2024-04-17T01:15:10.050`)
## Download and Usage

View File

@ -238939,7 +238939,7 @@ CVE-2024-0907,0,0,736d9a373e93547114922fac343df53c487c280e59648bef9a3cecc6379f90
CVE-2024-0909,0,0,7864e9d833556eb295eb67e87cebb39c8d9b11d41ed1f5327a80b30fe013438c,2024-02-08T20:07:51.410000
CVE-2024-0911,0,0,5f8186e1a077698fb2fa1e99d28cc6e32ac8b7b7afb205a3a02bc10c8ca698f0,2024-02-14T18:15:48.077000
CVE-2024-0913,0,0,cc9dbbd0e1eb40baf69d2dc96719798ae1dcba5ab6fc531754d7fd6a8c7e7f1d,2024-03-29T12:45:02.937000
CVE-2024-0914,0,1,0e30b945bb509fa0d2bc0b307e8920a9ca89d326b7b4c1c386bc1b08db5275e0,2024-04-16T22:15:11.330000
CVE-2024-0914,0,0,0e30b945bb509fa0d2bc0b307e8920a9ca89d326b7b4c1c386bc1b08db5275e0,2024-04-16T22:15:11.330000
CVE-2024-0917,0,0,1096c18fb8e959955c123559a721fd9eb8bfd390fb54eac5e8167e50a31dc158,2024-03-07T15:15:08.257000
CVE-2024-0918,0,0,665fb2ab3d0de8862f8c0f360fe055729484bae6812ecb9bc73647194d5411aa,2024-04-11T01:24:12.193000
CVE-2024-0919,0,0,589179645f375446af0d6856749f5d8581b8fa706e54f9dca7ffc4f53fa26164,2024-04-11T01:24:12.283000
@ -240193,7 +240193,7 @@ CVE-2024-20950,0,0,32c0f5cb59e7c130a00739028db90d5b34109b274bf0b583559e0ef0dda25
CVE-2024-20951,0,0,b17c14c257c2e51309f12c914a15b8f22d172a66204fd5740f2d7618130689e5,2024-02-20T19:51:05.510000
CVE-2024-20952,0,0,7957ba932035deb7b04bf9fd56a6980467fb3f16d0b62e00bf598071fcd8479f,2024-02-15T03:18:31.140000
CVE-2024-20953,0,0,79439b14c378308eaeb3d77fa260d91a67ac61cdabeddcb908ef73ad775fa897,2024-02-20T19:51:05.510000
CVE-2024-20954,1,1,1b3cff32868f8ef9fa8cab26659ccded6cdd335671f7807e559eeb06f28b071d,2024-04-16T22:15:11.570000
CVE-2024-20954,0,0,1b3cff32868f8ef9fa8cab26659ccded6cdd335671f7807e559eeb06f28b071d,2024-04-16T22:15:11.570000
CVE-2024-20955,0,0,05c43eead42002e8bf1c331a3e1f9e86bd97fbf64642fb46b8c945f04d3570a4,2024-02-09T02:26:25.517000
CVE-2024-20956,0,0,4a89a3bb6eaf3756d6410a6795c8b17d6ca727f95abdba61f342d6ebe0a23c6d,2024-02-20T19:51:05.510000
CVE-2024-20957,0,0,d1288734ff34c61b4455c5d61dc20cc713104f20309fe93a5491a293ace0102b,2024-01-20T18:31:43.287000
@ -240228,145 +240228,145 @@ CVE-2024-20984,0,0,585d056539d5b2a7ec102aa133531262bc58f31d6c087eb30a1c927656ef9
CVE-2024-20985,0,0,1887d4efcd4074083ed6001311349bddeba13ac350578caa9144fb2633e7d1e2,2024-02-02T17:27:12.127000
CVE-2024-20986,0,0,55fd916bbc66a048aba24029df1cdbff6d17cbdc5963bc85efdc3f349c48d99c,2024-02-20T19:50:53.960000
CVE-2024-20987,0,0,e6a4199f934ca8909c51db00ae903048e2b51791ebdf6565c06b10750c7af3ef,2024-01-20T18:30:16.877000
CVE-2024-20989,1,1,24bd66160dcd01603ef9a4851c4e5500f60b712eab8cde5d6558188934f30cdc,2024-04-16T22:15:11.777000
CVE-2024-20990,1,1,1f2b6c78c36b21b35c4cab89a838c9a38f38088c4a36c08aa77f1f65658e2112,2024-04-16T22:15:11.950000
CVE-2024-20991,1,1,f7941a97e294f105dcd20a6671868dc0049be6e06eb929430f1c839415c2749b,2024-04-16T22:15:12.110000
CVE-2024-20992,1,1,bb84e3a34b7d7232702fad67c49d8138a12244badca117134b7274064ac77153,2024-04-16T22:15:12.280000
CVE-2024-20993,1,1,da89184bf9556231d8ffb00987f4a32f464b19ae4e05e44e8feb1fe98c3aebf1,2024-04-16T22:15:12.453000
CVE-2024-20994,1,1,8bb0c6f9e9c9e2900660c0a56d574e56c5270083be86c93d88330070f8338576,2024-04-16T22:15:12.623000
CVE-2024-20995,1,1,98b0651bae746f006582628d0a65c2eaaf6ce3de2c23eadbde7e9029acc0a35b,2024-04-16T22:15:12.793000
CVE-2024-20997,1,1,b01de6bd0f3b1ccd4a1739b4ba353f58264a04c937a098746ad386fd9fd6e030,2024-04-16T22:15:12.970000
CVE-2024-20998,1,1,dcaaa0d5cec4adbb2b67dee3b42c4cf6aa6c0406d43865be7ef359b1b61fe7fe,2024-04-16T22:15:13.140000
CVE-2024-20999,1,1,5da01f1cdb292e263ab68d383757ae155303fc6a09aba69275d7eb6bb9513f3a,2024-04-16T22:15:13.350000
CVE-2024-21000,1,1,b1e376ae55bf616084d4afc76bd91c2aeb3f1a482f42d2aa132d547fda429856,2024-04-16T22:15:13.520000
CVE-2024-21001,1,1,2b4f89fa6de8475a4000712b6079e0b52b44ea7e7696fe0294ac7344afce2602,2024-04-16T22:15:13.687000
CVE-2024-21002,1,1,ffbd432b8311304ca8ec20919b7812a33af6c33f7d61c53f1da75adb9e56a247,2024-04-16T22:15:13.870000
CVE-2024-21003,1,1,00dd51a70fe0612321559d480def2ab7ce04633a9f1842b200ffeae1dba6cc44,2024-04-16T22:15:14.040000
CVE-2024-21004,1,1,61ad4f441881a3344e339e3a481dd630541c6bcfe7d8765dc285e640d99166d3,2024-04-16T22:15:14.210000
CVE-2024-21005,1,1,c2f9d72bf49b7451dd0149f8cf3c266ece3db56df05490ab87519b17dbab58eb,2024-04-16T22:15:14.373000
CVE-2024-21006,1,1,5eec6ec005650cd1dbf142caefdbc17f2bedd7c06d8499db20672b0f536c4631,2024-04-16T22:15:14.580000
CVE-2024-21007,1,1,2563c4d9da347d2a38b89329ea4e910efcfdb9494ef6408f0cc298fcbe8fd3c3,2024-04-16T22:15:14.750000
CVE-2024-21008,1,1,e95becd4e783498ca54c433b1842c818ff2f7c3fd6420f710879bf3a514777fb,2024-04-16T22:15:14.920000
CVE-2024-21009,1,1,9ddc1504b8228a31863180fe7fe1fa2f317c04b18cfdcdfe45e45611d7d9540d,2024-04-16T22:15:15.090000
CVE-2024-21010,1,1,55c3a7d9f03e27fb74e2bc734e6bb2202aac2b7c31fe23512468ce93a5d8cfcd,2024-04-16T22:15:15.260000
CVE-2024-21011,1,1,baa595ade65223b04108911c488632f6e636cd204ddbb3de01b96a559e2ec2b7,2024-04-16T22:15:15.437000
CVE-2024-21012,1,1,1e371a0544b8df7e7282a19c4a4ba29026fb2118b4f7f0e52810b94d3fe65e5e,2024-04-16T22:15:15.617000
CVE-2024-21013,1,1,e2e97914744a61b187d473751d0bf550616b97331057f1618c93fe66e5658f37,2024-04-16T22:15:15.793000
CVE-2024-21014,1,1,96e5bc7a4bf50754d27227b9e23d97bae5459af5c4b4da7eebd614eec1522af8,2024-04-16T22:15:15.967000
CVE-2024-21015,1,1,918463f0f050d0c7192efe1d2e4d2873c8f36172a550d9fd537585c771992484,2024-04-16T22:15:16.140000
CVE-2024-21016,1,1,8b7bc3eb1bee49cdeabf4139f268ad0a541636915b570c6a67b2f4b706bad608,2024-04-16T22:15:16.310000
CVE-2024-21017,1,1,5435ef4d7111abb27e9fef847b3abed74d61012b8af907690f7a72cf81d1aee3,2024-04-16T22:15:16.480000
CVE-2024-21018,1,1,78de31f919dcc65a4219d6547ec52ce01c30507860361f753dea40cfc17b8a0d,2024-04-16T22:15:16.657000
CVE-2024-21019,1,1,f0715b65c60bf947385aa8d018513125c7b48036a0336443cc8665884c0fec1a,2024-04-16T22:15:16.820000
CVE-2024-21020,1,1,4aaf81679ff1c2c4fd145b00a9453cb7bab62b5e02f3631293c53cad03e2b962,2024-04-16T22:15:16.990000
CVE-2024-21021,1,1,6b332607f787e62c7b0abda7b49fbedb9c0789c078796ec62ae6cbbd3dfd5201,2024-04-16T22:15:17.153000
CVE-2024-21022,1,1,083f86f4f8106af6fa9f026c2d8ac4ecc2a0f155e977c01b8b5f1e99a0b09eaa,2024-04-16T22:15:17.323000
CVE-2024-21023,1,1,1bf558977a9ac806d1b5707b479369cfec8ec96f8f7d9da8c979f5eebe4cd37a,2024-04-16T22:15:17.490000
CVE-2024-21024,1,1,f63e04db3cd79d18d5d0ecbe868c78eedd4c4e709c16f6e6ebbf974eed6765e9,2024-04-16T22:15:17.663000
CVE-2024-21025,1,1,1f485c124b14e70f2369d7154d807b46e0d751540ecffd50879fbb0e0a5833fd,2024-04-16T22:15:17.837000
CVE-2024-21026,1,1,d4b80277d1390010d34c451606fdffeb4200521fcd228a8babeb84318cd3dead,2024-04-16T22:15:18.020000
CVE-2024-21027,1,1,22d31dd80df37759e955cfde910e4176d29d728b2f495495cec60a082b2ed598,2024-04-16T22:15:18.183000
CVE-2024-21028,1,1,301b880241f9e9057e79dc58e33941db3709e174a9b569f580d833c972d9fcbc,2024-04-16T22:15:18.350000
CVE-2024-21029,1,1,0d090e2bc38ab4004c6c5deb491a06c754995b12bd1e8d5adb04366bb73e2b5f,2024-04-16T22:15:18.527000
CVE-2024-20989,0,0,24bd66160dcd01603ef9a4851c4e5500f60b712eab8cde5d6558188934f30cdc,2024-04-16T22:15:11.777000
CVE-2024-20990,0,0,1f2b6c78c36b21b35c4cab89a838c9a38f38088c4a36c08aa77f1f65658e2112,2024-04-16T22:15:11.950000
CVE-2024-20991,0,0,f7941a97e294f105dcd20a6671868dc0049be6e06eb929430f1c839415c2749b,2024-04-16T22:15:12.110000
CVE-2024-20992,0,0,bb84e3a34b7d7232702fad67c49d8138a12244badca117134b7274064ac77153,2024-04-16T22:15:12.280000
CVE-2024-20993,0,0,da89184bf9556231d8ffb00987f4a32f464b19ae4e05e44e8feb1fe98c3aebf1,2024-04-16T22:15:12.453000
CVE-2024-20994,0,0,8bb0c6f9e9c9e2900660c0a56d574e56c5270083be86c93d88330070f8338576,2024-04-16T22:15:12.623000
CVE-2024-20995,0,0,98b0651bae746f006582628d0a65c2eaaf6ce3de2c23eadbde7e9029acc0a35b,2024-04-16T22:15:12.793000
CVE-2024-20997,0,0,b01de6bd0f3b1ccd4a1739b4ba353f58264a04c937a098746ad386fd9fd6e030,2024-04-16T22:15:12.970000
CVE-2024-20998,0,0,dcaaa0d5cec4adbb2b67dee3b42c4cf6aa6c0406d43865be7ef359b1b61fe7fe,2024-04-16T22:15:13.140000
CVE-2024-20999,0,0,5da01f1cdb292e263ab68d383757ae155303fc6a09aba69275d7eb6bb9513f3a,2024-04-16T22:15:13.350000
CVE-2024-21000,0,0,b1e376ae55bf616084d4afc76bd91c2aeb3f1a482f42d2aa132d547fda429856,2024-04-16T22:15:13.520000
CVE-2024-21001,0,0,2b4f89fa6de8475a4000712b6079e0b52b44ea7e7696fe0294ac7344afce2602,2024-04-16T22:15:13.687000
CVE-2024-21002,0,0,ffbd432b8311304ca8ec20919b7812a33af6c33f7d61c53f1da75adb9e56a247,2024-04-16T22:15:13.870000
CVE-2024-21003,0,0,00dd51a70fe0612321559d480def2ab7ce04633a9f1842b200ffeae1dba6cc44,2024-04-16T22:15:14.040000
CVE-2024-21004,0,0,61ad4f441881a3344e339e3a481dd630541c6bcfe7d8765dc285e640d99166d3,2024-04-16T22:15:14.210000
CVE-2024-21005,0,0,c2f9d72bf49b7451dd0149f8cf3c266ece3db56df05490ab87519b17dbab58eb,2024-04-16T22:15:14.373000
CVE-2024-21006,0,0,5eec6ec005650cd1dbf142caefdbc17f2bedd7c06d8499db20672b0f536c4631,2024-04-16T22:15:14.580000
CVE-2024-21007,0,0,2563c4d9da347d2a38b89329ea4e910efcfdb9494ef6408f0cc298fcbe8fd3c3,2024-04-16T22:15:14.750000
CVE-2024-21008,0,0,e95becd4e783498ca54c433b1842c818ff2f7c3fd6420f710879bf3a514777fb,2024-04-16T22:15:14.920000
CVE-2024-21009,0,0,9ddc1504b8228a31863180fe7fe1fa2f317c04b18cfdcdfe45e45611d7d9540d,2024-04-16T22:15:15.090000
CVE-2024-21010,0,0,55c3a7d9f03e27fb74e2bc734e6bb2202aac2b7c31fe23512468ce93a5d8cfcd,2024-04-16T22:15:15.260000
CVE-2024-21011,0,0,baa595ade65223b04108911c488632f6e636cd204ddbb3de01b96a559e2ec2b7,2024-04-16T22:15:15.437000
CVE-2024-21012,0,0,1e371a0544b8df7e7282a19c4a4ba29026fb2118b4f7f0e52810b94d3fe65e5e,2024-04-16T22:15:15.617000
CVE-2024-21013,0,0,e2e97914744a61b187d473751d0bf550616b97331057f1618c93fe66e5658f37,2024-04-16T22:15:15.793000
CVE-2024-21014,0,0,96e5bc7a4bf50754d27227b9e23d97bae5459af5c4b4da7eebd614eec1522af8,2024-04-16T22:15:15.967000
CVE-2024-21015,0,0,918463f0f050d0c7192efe1d2e4d2873c8f36172a550d9fd537585c771992484,2024-04-16T22:15:16.140000
CVE-2024-21016,0,0,8b7bc3eb1bee49cdeabf4139f268ad0a541636915b570c6a67b2f4b706bad608,2024-04-16T22:15:16.310000
CVE-2024-21017,0,0,5435ef4d7111abb27e9fef847b3abed74d61012b8af907690f7a72cf81d1aee3,2024-04-16T22:15:16.480000
CVE-2024-21018,0,0,78de31f919dcc65a4219d6547ec52ce01c30507860361f753dea40cfc17b8a0d,2024-04-16T22:15:16.657000
CVE-2024-21019,0,0,f0715b65c60bf947385aa8d018513125c7b48036a0336443cc8665884c0fec1a,2024-04-16T22:15:16.820000
CVE-2024-21020,0,0,4aaf81679ff1c2c4fd145b00a9453cb7bab62b5e02f3631293c53cad03e2b962,2024-04-16T22:15:16.990000
CVE-2024-21021,0,0,6b332607f787e62c7b0abda7b49fbedb9c0789c078796ec62ae6cbbd3dfd5201,2024-04-16T22:15:17.153000
CVE-2024-21022,0,0,083f86f4f8106af6fa9f026c2d8ac4ecc2a0f155e977c01b8b5f1e99a0b09eaa,2024-04-16T22:15:17.323000
CVE-2024-21023,0,0,1bf558977a9ac806d1b5707b479369cfec8ec96f8f7d9da8c979f5eebe4cd37a,2024-04-16T22:15:17.490000
CVE-2024-21024,0,0,f63e04db3cd79d18d5d0ecbe868c78eedd4c4e709c16f6e6ebbf974eed6765e9,2024-04-16T22:15:17.663000
CVE-2024-21025,0,0,1f485c124b14e70f2369d7154d807b46e0d751540ecffd50879fbb0e0a5833fd,2024-04-16T22:15:17.837000
CVE-2024-21026,0,0,d4b80277d1390010d34c451606fdffeb4200521fcd228a8babeb84318cd3dead,2024-04-16T22:15:18.020000
CVE-2024-21027,0,0,22d31dd80df37759e955cfde910e4176d29d728b2f495495cec60a082b2ed598,2024-04-16T22:15:18.183000
CVE-2024-21028,0,0,301b880241f9e9057e79dc58e33941db3709e174a9b569f580d833c972d9fcbc,2024-04-16T22:15:18.350000
CVE-2024-21029,0,0,0d090e2bc38ab4004c6c5deb491a06c754995b12bd1e8d5adb04366bb73e2b5f,2024-04-16T22:15:18.527000
CVE-2024-2103,0,0,4357f6f4848f7c5880c727dbfe8b97df3dcf5303e95d5a7ff4fdf7062d775ac8,2024-04-04T16:33:06.610000
CVE-2024-21030,1,1,8c75cd82a8f7d8f0b15936cf6d46098c24517c837abffed713e5bd945e38d83b,2024-04-16T22:15:18.693000
CVE-2024-21031,1,1,c3e812d2f8e98cd59e9540c74d0e9cb553f5ece98d75925a1b56d3bbce361cd2,2024-04-16T22:15:18.863000
CVE-2024-21032,1,1,499cb3f8741ca1f408c1dcd3c8d692ae1425cdc63f5559df15066477b0dc19ba,2024-04-16T22:15:19.037000
CVE-2024-21033,1,1,36a7a29b617aa82862f772ac68dfac89363af58e6785de33e573f8e9de5a8eef,2024-04-16T22:15:19.210000
CVE-2024-21034,1,1,96b1b958abb28057efb16bf53f9081378e1a8597a26e68bf2ff74d6e74ffd1d1,2024-04-16T22:15:19.390000
CVE-2024-21035,1,1,8ac65dec34215388d64935bd78bb407e666777cfaa56822d31f5d358af6e1703,2024-04-16T22:15:19.597000
CVE-2024-21036,1,1,dfb62af68cf8f5531d93994ea82cf061a87328cfbee66223e1ad40c35760ee84,2024-04-16T22:15:19.760000
CVE-2024-21037,1,1,afa37d25738d1d39f16f2d11e420320b2c4db922bfbda666d8a23aee4e319893,2024-04-16T22:15:19.927000
CVE-2024-21038,1,1,dac915e59cabfb89e49d571f6a56814b47a31584a817f2ba1defb6ea2b194cd0,2024-04-16T22:15:20.093000
CVE-2024-21039,1,1,10c002d202bcb8f75d80fbc44d870be2bd541f746a3e99df7badd5aec0381758,2024-04-16T22:15:20.260000
CVE-2024-21040,1,1,8015f1922e39d2758e23274ad121b8562da082d2d16784253be3d7334eae36bb,2024-04-16T22:15:20.427000
CVE-2024-21041,1,1,9873619ff3ccc808457024a3e299af127d4cd31d336f9b4bf19b0afc66c97716,2024-04-16T22:15:20.597000
CVE-2024-21042,1,1,4fc812d7abc6f1a7d636889bf11cf3936cf019b65645c751c48e7fa624409187,2024-04-16T22:15:20.773000
CVE-2024-21043,1,1,dcfbc27b4e7222c1224ffa3288921051b06130e94ff55574e264140a91e90396,2024-04-16T22:15:20.943000
CVE-2024-21044,1,1,790353004fa605e951782be705be4dcba3252301003564ca908360f3680aaf3b,2024-04-16T22:15:21.110000
CVE-2024-21045,1,1,0970dedfc25c26e9989960e5bf6a924f819d62e089aa4d68300d517eee99c858,2024-04-16T22:15:21.287000
CVE-2024-21046,1,1,0e9cbe2c07294db14dab6bbcef2dcdb15b4af36a0279e290c37493804747890c,2024-04-16T22:15:21.460000
CVE-2024-21047,1,1,825793c807831c0337a4fdabe2fc398ca366be96d6b0fcd2e453207aee55e1d4,2024-04-16T22:15:21.643000
CVE-2024-21048,1,1,6fc80fd63f07c5f81a654ccaf350b061a6d70adad335bd2b377644e3cb63173f,2024-04-16T22:15:21.810000
CVE-2024-21049,1,1,062a98d80f686aa654f81f8f28b989eacb62bf1b30a7d30cddc300418d7e2855,2024-04-16T22:15:21.990000
CVE-2024-21050,1,1,c7967f475ab5b694532d707ab2561ebfd794b9cf6a29ab2bcdbce77a989a5b83,2024-04-16T22:15:22.157000
CVE-2024-21051,1,1,bfcbbd2f3e85d7953d1436f3cf7c2c6f02b0f2977632fca40758580128f7112d,2024-04-16T22:15:22.330000
CVE-2024-21052,1,1,ae16c308947c086073bb6d5e0f4ac12dd9329b0ca8c55fdb909fdd75ea492e19,2024-04-16T22:15:22.500000
CVE-2024-21053,1,1,755e699b39ad98f6e83a02ac9f41f5c69bd3030c128249a1025cd68e2dd962dc,2024-04-16T22:15:22.673000
CVE-2024-21054,1,1,5392b2f1a92dfa22b4167767b909f7c0c1a3e0addbaac0cd74f99df10664013c,2024-04-16T22:15:22.840000
CVE-2024-21055,1,1,d87b01faf34859398519021f0c35bc98385c0588792b07e6a4dc7f20508bec9a,2024-04-16T22:15:23.010000
CVE-2024-21056,1,1,a31cbb0adfdf342a78b978d6813898086c6ecd42d5a8cb9c6dd380f29845de8e,2024-04-16T22:15:23.183000
CVE-2024-21057,1,1,f7d92b4b5c779319636a820a9209f8646e774bf5819a744395f1b5b2ad706229,2024-04-16T22:15:23.350000
CVE-2024-21058,1,1,5905a9d121afbaf74301e0c7ae0502ddc1e6e69dde9f71547f594e81858a270a,2024-04-16T22:15:23.570000
CVE-2024-21059,1,1,649b4a7d796567ae5bbc4dd91d5af813f6b4d96443dd524c48e374c518e7f97c,2024-04-16T22:15:23.740000
CVE-2024-21030,0,0,8c75cd82a8f7d8f0b15936cf6d46098c24517c837abffed713e5bd945e38d83b,2024-04-16T22:15:18.693000
CVE-2024-21031,0,0,c3e812d2f8e98cd59e9540c74d0e9cb553f5ece98d75925a1b56d3bbce361cd2,2024-04-16T22:15:18.863000
CVE-2024-21032,0,0,499cb3f8741ca1f408c1dcd3c8d692ae1425cdc63f5559df15066477b0dc19ba,2024-04-16T22:15:19.037000
CVE-2024-21033,0,0,36a7a29b617aa82862f772ac68dfac89363af58e6785de33e573f8e9de5a8eef,2024-04-16T22:15:19.210000
CVE-2024-21034,0,0,96b1b958abb28057efb16bf53f9081378e1a8597a26e68bf2ff74d6e74ffd1d1,2024-04-16T22:15:19.390000
CVE-2024-21035,0,0,8ac65dec34215388d64935bd78bb407e666777cfaa56822d31f5d358af6e1703,2024-04-16T22:15:19.597000
CVE-2024-21036,0,0,dfb62af68cf8f5531d93994ea82cf061a87328cfbee66223e1ad40c35760ee84,2024-04-16T22:15:19.760000
CVE-2024-21037,0,0,afa37d25738d1d39f16f2d11e420320b2c4db922bfbda666d8a23aee4e319893,2024-04-16T22:15:19.927000
CVE-2024-21038,0,0,dac915e59cabfb89e49d571f6a56814b47a31584a817f2ba1defb6ea2b194cd0,2024-04-16T22:15:20.093000
CVE-2024-21039,0,0,10c002d202bcb8f75d80fbc44d870be2bd541f746a3e99df7badd5aec0381758,2024-04-16T22:15:20.260000
CVE-2024-21040,0,0,8015f1922e39d2758e23274ad121b8562da082d2d16784253be3d7334eae36bb,2024-04-16T22:15:20.427000
CVE-2024-21041,0,0,9873619ff3ccc808457024a3e299af127d4cd31d336f9b4bf19b0afc66c97716,2024-04-16T22:15:20.597000
CVE-2024-21042,0,0,4fc812d7abc6f1a7d636889bf11cf3936cf019b65645c751c48e7fa624409187,2024-04-16T22:15:20.773000
CVE-2024-21043,0,0,dcfbc27b4e7222c1224ffa3288921051b06130e94ff55574e264140a91e90396,2024-04-16T22:15:20.943000
CVE-2024-21044,0,0,790353004fa605e951782be705be4dcba3252301003564ca908360f3680aaf3b,2024-04-16T22:15:21.110000
CVE-2024-21045,0,0,0970dedfc25c26e9989960e5bf6a924f819d62e089aa4d68300d517eee99c858,2024-04-16T22:15:21.287000
CVE-2024-21046,0,0,0e9cbe2c07294db14dab6bbcef2dcdb15b4af36a0279e290c37493804747890c,2024-04-16T22:15:21.460000
CVE-2024-21047,0,0,825793c807831c0337a4fdabe2fc398ca366be96d6b0fcd2e453207aee55e1d4,2024-04-16T22:15:21.643000
CVE-2024-21048,0,0,6fc80fd63f07c5f81a654ccaf350b061a6d70adad335bd2b377644e3cb63173f,2024-04-16T22:15:21.810000
CVE-2024-21049,0,0,062a98d80f686aa654f81f8f28b989eacb62bf1b30a7d30cddc300418d7e2855,2024-04-16T22:15:21.990000
CVE-2024-21050,0,0,c7967f475ab5b694532d707ab2561ebfd794b9cf6a29ab2bcdbce77a989a5b83,2024-04-16T22:15:22.157000
CVE-2024-21051,0,0,bfcbbd2f3e85d7953d1436f3cf7c2c6f02b0f2977632fca40758580128f7112d,2024-04-16T22:15:22.330000
CVE-2024-21052,0,0,ae16c308947c086073bb6d5e0f4ac12dd9329b0ca8c55fdb909fdd75ea492e19,2024-04-16T22:15:22.500000
CVE-2024-21053,0,0,755e699b39ad98f6e83a02ac9f41f5c69bd3030c128249a1025cd68e2dd962dc,2024-04-16T22:15:22.673000
CVE-2024-21054,0,0,5392b2f1a92dfa22b4167767b909f7c0c1a3e0addbaac0cd74f99df10664013c,2024-04-16T22:15:22.840000
CVE-2024-21055,0,0,d87b01faf34859398519021f0c35bc98385c0588792b07e6a4dc7f20508bec9a,2024-04-16T22:15:23.010000
CVE-2024-21056,0,0,a31cbb0adfdf342a78b978d6813898086c6ecd42d5a8cb9c6dd380f29845de8e,2024-04-16T22:15:23.183000
CVE-2024-21057,0,0,f7d92b4b5c779319636a820a9209f8646e774bf5819a744395f1b5b2ad706229,2024-04-16T22:15:23.350000
CVE-2024-21058,0,0,5905a9d121afbaf74301e0c7ae0502ddc1e6e69dde9f71547f594e81858a270a,2024-04-16T22:15:23.570000
CVE-2024-21059,0,0,649b4a7d796567ae5bbc4dd91d5af813f6b4d96443dd524c48e374c518e7f97c,2024-04-16T22:15:23.740000
CVE-2024-2106,0,0,15de6b929ace188c18cf26b3c461a92f15449ebc8c35903dbddfc1b7b27db756,2024-03-13T18:15:58.530000
CVE-2024-21060,1,1,9df78d1ff9b465d287a4dd45147bcaccecd135238082a5b8af90c54a70f4cf11,2024-04-16T22:15:23.910000
CVE-2024-21061,1,1,1e0b82d131b021430ce55c8a53a9f066559ac19abb645545241777d555c24bf7,2024-04-16T22:15:24.080000
CVE-2024-21062,1,1,9790253ba053a45bbf42752fe93f570398dfb5936bd5c386018a7eac7055ce31,2024-04-16T22:15:24.247000
CVE-2024-21063,1,1,3fc41f5e5c2dafb9b60cdd2e3f7c5d5c79c15ee9c491854dbc50b0a819c01b2d,2024-04-16T22:15:24.417000
CVE-2024-21064,1,1,a7cdbf2d59c586eea5f775e8c2b39cd9f279eebbf0087251f078c5d617b4281e,2024-04-16T22:15:24.607000
CVE-2024-21065,1,1,66abc7dfaa92be88296241fef613906ee3919bbf7d1def9a1cb3fec2d7653199,2024-04-16T22:15:24.780000
CVE-2024-21066,1,1,142a6c2265900556cceab9d34617e3718b7776013c65658bcfb46ccbfb3459e4,2024-04-16T22:15:24.957000
CVE-2024-21067,1,1,5cc627357fc8705043284fe3ac0733a2da14d61428d3e0f80bd2f6b5eb1f63c6,2024-04-16T22:15:25.123000
CVE-2024-21068,1,1,4a7ac2cd2111973cd960c934dfef9cae24d6fd76bd51bc6550d90c4eb95bf2da,2024-04-16T22:15:25.307000
CVE-2024-21069,1,1,0f3be47ebd42a12c253d947c093ea23553811150722322db34df1f26b0ec38e9,2024-04-16T22:15:25.473000
CVE-2024-21060,0,0,9df78d1ff9b465d287a4dd45147bcaccecd135238082a5b8af90c54a70f4cf11,2024-04-16T22:15:23.910000
CVE-2024-21061,0,0,1e0b82d131b021430ce55c8a53a9f066559ac19abb645545241777d555c24bf7,2024-04-16T22:15:24.080000
CVE-2024-21062,0,0,9790253ba053a45bbf42752fe93f570398dfb5936bd5c386018a7eac7055ce31,2024-04-16T22:15:24.247000
CVE-2024-21063,0,0,3fc41f5e5c2dafb9b60cdd2e3f7c5d5c79c15ee9c491854dbc50b0a819c01b2d,2024-04-16T22:15:24.417000
CVE-2024-21064,0,0,a7cdbf2d59c586eea5f775e8c2b39cd9f279eebbf0087251f078c5d617b4281e,2024-04-16T22:15:24.607000
CVE-2024-21065,0,0,66abc7dfaa92be88296241fef613906ee3919bbf7d1def9a1cb3fec2d7653199,2024-04-16T22:15:24.780000
CVE-2024-21066,0,0,142a6c2265900556cceab9d34617e3718b7776013c65658bcfb46ccbfb3459e4,2024-04-16T22:15:24.957000
CVE-2024-21067,0,0,5cc627357fc8705043284fe3ac0733a2da14d61428d3e0f80bd2f6b5eb1f63c6,2024-04-16T22:15:25.123000
CVE-2024-21068,0,0,4a7ac2cd2111973cd960c934dfef9cae24d6fd76bd51bc6550d90c4eb95bf2da,2024-04-16T22:15:25.307000
CVE-2024-21069,0,0,0f3be47ebd42a12c253d947c093ea23553811150722322db34df1f26b0ec38e9,2024-04-16T22:15:25.473000
CVE-2024-2107,0,0,b116f601239eee1477d732dcdf4bd402d2ca5c711c20a89df0a8e9dd54cd4cd1,2024-03-13T12:33:51.697000
CVE-2024-21070,1,1,efd8cac87e4b6da969debbe0a140a4b8cf90336f73c54d3bfbed050f9e18fbcd,2024-04-16T22:15:25.650000
CVE-2024-21071,1,1,46ceee7198115f41553c9a4513d77ca9512e88fadb7ce8a9bb7560ea54d257e2,2024-04-16T22:15:25.837000
CVE-2024-21072,1,1,a5a23651b65a242cbdbea488e766975d61a50d5b8428cb49079af082fa564b85,2024-04-16T22:15:26.020000
CVE-2024-21073,1,1,a33d6d3f5ed3702aac4f54ec2fbb4350eca86125bc5e729be5e7fd2c02049648,2024-04-16T22:15:26.190000
CVE-2024-21074,1,1,33402acef89bc334aaa9262a840014354db29f887e67f0a4b3df7d08c1c8904d,2024-04-16T22:15:26.370000
CVE-2024-21075,1,1,0154f56151613c02ebab5ba51ece2900aa4b64e839725850bf78d1e03a203244,2024-04-16T22:15:26.543000
CVE-2024-21076,1,1,8178fc4edd062f46988f1f4a8fc5aa3a3dcd627f8acccbcaaf2995f47a7427be,2024-04-16T22:15:26.720000
CVE-2024-21077,1,1,9f8288887c7e0f6f240f2c7e84265acd75eb9222bd2398ddc131e30468a18b00,2024-04-16T22:15:26.887000
CVE-2024-21078,1,1,3c7874e58f4fadbde5ecadf75319f5edf7b070595241da7671d167425b08e65d,2024-04-16T22:15:27.060000
CVE-2024-21079,1,1,bcaa3d01504f3aed2cbc5f2ca4da14aef825373b3a007dd2cc7b568241cb8430,2024-04-16T22:15:27.240000
CVE-2024-21070,0,0,efd8cac87e4b6da969debbe0a140a4b8cf90336f73c54d3bfbed050f9e18fbcd,2024-04-16T22:15:25.650000
CVE-2024-21071,0,0,46ceee7198115f41553c9a4513d77ca9512e88fadb7ce8a9bb7560ea54d257e2,2024-04-16T22:15:25.837000
CVE-2024-21072,0,0,a5a23651b65a242cbdbea488e766975d61a50d5b8428cb49079af082fa564b85,2024-04-16T22:15:26.020000
CVE-2024-21073,0,0,a33d6d3f5ed3702aac4f54ec2fbb4350eca86125bc5e729be5e7fd2c02049648,2024-04-16T22:15:26.190000
CVE-2024-21074,0,0,33402acef89bc334aaa9262a840014354db29f887e67f0a4b3df7d08c1c8904d,2024-04-16T22:15:26.370000
CVE-2024-21075,0,0,0154f56151613c02ebab5ba51ece2900aa4b64e839725850bf78d1e03a203244,2024-04-16T22:15:26.543000
CVE-2024-21076,0,0,8178fc4edd062f46988f1f4a8fc5aa3a3dcd627f8acccbcaaf2995f47a7427be,2024-04-16T22:15:26.720000
CVE-2024-21077,0,0,9f8288887c7e0f6f240f2c7e84265acd75eb9222bd2398ddc131e30468a18b00,2024-04-16T22:15:26.887000
CVE-2024-21078,0,0,3c7874e58f4fadbde5ecadf75319f5edf7b070595241da7671d167425b08e65d,2024-04-16T22:15:27.060000
CVE-2024-21079,0,0,bcaa3d01504f3aed2cbc5f2ca4da14aef825373b3a007dd2cc7b568241cb8430,2024-04-16T22:15:27.240000
CVE-2024-2108,0,0,c2fa70d90e7c92604d37599b63a68c51b88c7a208a94e63da1f79da8e05cb6df,2024-03-29T12:45:02.937000
CVE-2024-21080,1,1,506419e11331ff72984bd09d104ddfe8685395520d5ac80e14ff8ac5c84f146a,2024-04-16T22:15:27.423000
CVE-2024-21081,1,1,c78792c3f39afcafd60c219866fcb36a956c9832eb232c1c9572078f4a08591f,2024-04-16T22:15:27.603000
CVE-2024-21082,1,1,f77a83ec86ff9b5f2d6e391b9cb694374233861e4c5c3fa975801495ab6d0945,2024-04-16T22:15:27.780000
CVE-2024-21083,1,1,d6b534689283c95fe2b039fcd8320a8b62a66467491e84d71e1a15629f01ad6e,2024-04-16T22:15:27.953000
CVE-2024-21084,1,1,ee870ceef89faae38b5dbb3a6fa9b59b95fe76200d0900e5677448159984ef74,2024-04-16T22:15:28.120000
CVE-2024-21085,1,1,9d0b2d426030a9f3752e6427374ef5c9f91de6303cceae89f8ac1d22cf81328b,2024-04-16T22:15:28.293000
CVE-2024-21086,1,1,6853eabdf6278c42c8c09baa0d58fb8d7f1fdc7db51716ad01dd11f4af81b5b8,2024-04-16T22:15:28.463000
CVE-2024-21087,1,1,d57791a54bf642931823a35d535e7d3861ad9e5954f4c08104a213f7d0727123,2024-04-16T22:15:28.640000
CVE-2024-21088,1,1,a17f0514cf39facf253ab84a17038520bcda32765ac857f2e9ca82a2d3747707,2024-04-16T22:15:28.810000
CVE-2024-21089,1,1,11b7c05221b35bd34f660a7b0e940ed9dc2f1b267cbaa4da4c10375f3092eeb3,2024-04-16T22:15:28.987000
CVE-2024-21090,1,1,17abdd47766ba0094990fee4939ca5978b7b4533e55387f5f4311b4ab060b463,2024-04-16T22:15:29.153000
CVE-2024-21091,1,1,d6dbb8737d85b2225cd3f1b3f4c9826ce57f22a6b3a1e3b614145c320433aeaa,2024-04-16T22:15:29.330000
CVE-2024-21092,1,1,13085862dff2d0d70db5aa721df742e4e34ce1681e25ec40439b4c18d8d3bcaa,2024-04-16T22:15:29.493000
CVE-2024-21093,1,1,83caaf46648b865a9b93f059bba012ab6371fb67867e0257bd7db50f6b1ecb45,2024-04-16T22:15:29.680000
CVE-2024-21094,1,1,d45c5c7fdff8ceb77f69fed7be619e733c1f374b12a101801bcb3d8a0fa5a058,2024-04-16T22:15:29.857000
CVE-2024-21095,1,1,4a1307ede28bcbfae60740f652030296311b8a6695d957880f6afbd5763e3484,2024-04-16T22:15:30.040000
CVE-2024-21096,1,1,b459d73844b617138fd2760b366425e31127d445372fe6288f31c0f80920c608,2024-04-16T22:15:30.207000
CVE-2024-21097,1,1,72f738b57505568a478ea2c60de7646fb54315315e48f1ba93269cb0c7504343,2024-04-16T22:15:30.380000
CVE-2024-21098,1,1,df96563fb2f29cc30f31fc03506f044869b8557678039a960dc67e5c8597b05b,2024-04-16T22:15:30.550000
CVE-2024-21099,1,1,015efa8e047defa6fcb6c22808377bb6c664ae72f397170368741fec56beaab9,2024-04-16T22:15:30.723000
CVE-2024-21080,0,0,506419e11331ff72984bd09d104ddfe8685395520d5ac80e14ff8ac5c84f146a,2024-04-16T22:15:27.423000
CVE-2024-21081,0,0,c78792c3f39afcafd60c219866fcb36a956c9832eb232c1c9572078f4a08591f,2024-04-16T22:15:27.603000
CVE-2024-21082,0,0,f77a83ec86ff9b5f2d6e391b9cb694374233861e4c5c3fa975801495ab6d0945,2024-04-16T22:15:27.780000
CVE-2024-21083,0,0,d6b534689283c95fe2b039fcd8320a8b62a66467491e84d71e1a15629f01ad6e,2024-04-16T22:15:27.953000
CVE-2024-21084,0,0,ee870ceef89faae38b5dbb3a6fa9b59b95fe76200d0900e5677448159984ef74,2024-04-16T22:15:28.120000
CVE-2024-21085,0,0,9d0b2d426030a9f3752e6427374ef5c9f91de6303cceae89f8ac1d22cf81328b,2024-04-16T22:15:28.293000
CVE-2024-21086,0,0,6853eabdf6278c42c8c09baa0d58fb8d7f1fdc7db51716ad01dd11f4af81b5b8,2024-04-16T22:15:28.463000
CVE-2024-21087,0,0,d57791a54bf642931823a35d535e7d3861ad9e5954f4c08104a213f7d0727123,2024-04-16T22:15:28.640000
CVE-2024-21088,0,0,a17f0514cf39facf253ab84a17038520bcda32765ac857f2e9ca82a2d3747707,2024-04-16T22:15:28.810000
CVE-2024-21089,0,0,11b7c05221b35bd34f660a7b0e940ed9dc2f1b267cbaa4da4c10375f3092eeb3,2024-04-16T22:15:28.987000
CVE-2024-21090,0,0,17abdd47766ba0094990fee4939ca5978b7b4533e55387f5f4311b4ab060b463,2024-04-16T22:15:29.153000
CVE-2024-21091,0,0,d6dbb8737d85b2225cd3f1b3f4c9826ce57f22a6b3a1e3b614145c320433aeaa,2024-04-16T22:15:29.330000
CVE-2024-21092,0,0,13085862dff2d0d70db5aa721df742e4e34ce1681e25ec40439b4c18d8d3bcaa,2024-04-16T22:15:29.493000
CVE-2024-21093,0,0,83caaf46648b865a9b93f059bba012ab6371fb67867e0257bd7db50f6b1ecb45,2024-04-16T22:15:29.680000
CVE-2024-21094,0,0,d45c5c7fdff8ceb77f69fed7be619e733c1f374b12a101801bcb3d8a0fa5a058,2024-04-16T22:15:29.857000
CVE-2024-21095,0,0,4a1307ede28bcbfae60740f652030296311b8a6695d957880f6afbd5763e3484,2024-04-16T22:15:30.040000
CVE-2024-21096,0,0,b459d73844b617138fd2760b366425e31127d445372fe6288f31c0f80920c608,2024-04-16T22:15:30.207000
CVE-2024-21097,0,0,72f738b57505568a478ea2c60de7646fb54315315e48f1ba93269cb0c7504343,2024-04-16T22:15:30.380000
CVE-2024-21098,0,0,df96563fb2f29cc30f31fc03506f044869b8557678039a960dc67e5c8597b05b,2024-04-16T22:15:30.550000
CVE-2024-21099,0,0,015efa8e047defa6fcb6c22808377bb6c664ae72f397170368741fec56beaab9,2024-04-16T22:15:30.723000
CVE-2024-2110,0,0,1d85de629a97570a97242f5d089550bba2e60a5923838c39c1151e294a5fdcf3,2024-03-28T12:42:56.150000
CVE-2024-21100,1,1,65f4b990e5c1177693d8150b3620f028429badd2cbf28cb68593cd12826b98c8,2024-04-16T22:15:30.903000
CVE-2024-21101,1,1,205a96dc7470fb351180145d3cdce7c7c9eb3c6592002c301b60500c4d3862a4,2024-04-16T22:15:31.087000
CVE-2024-21102,1,1,fd6ecddf13e9f1b717eb08fc04a6df95beee401cfbf15a3bb4c954281f0def93,2024-04-16T22:15:31.270000
CVE-2024-21103,1,1,7fe0cd3d775f2d4929321cd1e91952fb9e796e3cca582eab936d6b1a6bc8789f,2024-04-16T22:15:31.437000
CVE-2024-21104,1,1,7d3bbe7d5e67d3f3081b177bd6ce24fab8642fcd0e18503217960854db600f14,2024-04-16T22:15:31.600000
CVE-2024-21105,1,1,c6c82ed533391705d921d7d663fca26f8cb5fbba647f7940984870fc92462394,2024-04-16T22:15:31.770000
CVE-2024-21106,1,1,a440deb88e8e20db2e6987326709f7d80f875be1c5f69a5e384aafd6b3bd9b01,2024-04-16T22:15:31.940000
CVE-2024-21107,1,1,5029111cee5505494873cf54cd9e5b9798870fea04c2fff6706de938aa0f7517,2024-04-16T22:15:32.110000
CVE-2024-21108,1,1,8d7be3c709eccfbe101ee5cef1d3ec2931ee83675df371b94534759b34b70231,2024-04-16T22:15:32.277000
CVE-2024-21109,1,1,d12751e34dcd097928859e398465186aa36e619a9859e286514cf6db13790c6e,2024-04-16T22:15:32.440000
CVE-2024-21100,0,0,65f4b990e5c1177693d8150b3620f028429badd2cbf28cb68593cd12826b98c8,2024-04-16T22:15:30.903000
CVE-2024-21101,0,0,205a96dc7470fb351180145d3cdce7c7c9eb3c6592002c301b60500c4d3862a4,2024-04-16T22:15:31.087000
CVE-2024-21102,0,0,fd6ecddf13e9f1b717eb08fc04a6df95beee401cfbf15a3bb4c954281f0def93,2024-04-16T22:15:31.270000
CVE-2024-21103,0,0,7fe0cd3d775f2d4929321cd1e91952fb9e796e3cca582eab936d6b1a6bc8789f,2024-04-16T22:15:31.437000
CVE-2024-21104,0,0,7d3bbe7d5e67d3f3081b177bd6ce24fab8642fcd0e18503217960854db600f14,2024-04-16T22:15:31.600000
CVE-2024-21105,0,0,c6c82ed533391705d921d7d663fca26f8cb5fbba647f7940984870fc92462394,2024-04-16T22:15:31.770000
CVE-2024-21106,0,0,a440deb88e8e20db2e6987326709f7d80f875be1c5f69a5e384aafd6b3bd9b01,2024-04-16T22:15:31.940000
CVE-2024-21107,0,0,5029111cee5505494873cf54cd9e5b9798870fea04c2fff6706de938aa0f7517,2024-04-16T22:15:32.110000
CVE-2024-21108,0,0,8d7be3c709eccfbe101ee5cef1d3ec2931ee83675df371b94534759b34b70231,2024-04-16T22:15:32.277000
CVE-2024-21109,0,0,d12751e34dcd097928859e398465186aa36e619a9859e286514cf6db13790c6e,2024-04-16T22:15:32.440000
CVE-2024-2111,0,0,bb223011165a425455ec8ad438d31acdc69716e592665db5e015c6e3c7a0ad9a,2024-03-28T12:42:56.150000
CVE-2024-21110,1,1,26761757b8923b87fdad8881bb30129155b2254e03fc28e73cda4bfba8255bac,2024-04-16T22:15:32.617000
CVE-2024-21111,1,1,df095bee2d0d9df82bab22d20b026708706025acd52e98e513beac77f52827f5,2024-04-16T22:15:32.780000
CVE-2024-21112,1,1,069d3a8123248348b644bad2d78930a8c9ea5c4bb845cf44eeacd7c641d788b1,2024-04-16T22:15:32.957000
CVE-2024-21113,1,1,76803a64f611335a6e0551a6c82d1a2639a5818f9f3522b5884b99b79d32c2d2,2024-04-16T22:15:33.127000
CVE-2024-21114,1,1,d2792a216e32ffefda5d2f48c39458ebe07af8dcda2f07132c2a52a241cb73f5,2024-04-16T22:15:33.300000
CVE-2024-21115,1,1,6a46662c9b5efc5c1f2e808f40b64677e03aedeb61719d31d7b0c5007c622ec3,2024-04-16T22:15:33.467000
CVE-2024-21116,1,1,14834822ae39f45be6e1818d460aca7d476d347ecd1b3cab8fc89440f6cdc08a,2024-04-16T22:15:33.653000
CVE-2024-21117,1,1,8eed13b90291acecf3dc23f5b6f163cc82d0767ebaa6728f52bcaba32e3d4862,2024-04-16T22:15:33.860000
CVE-2024-21118,1,1,e2d82afcceb4e6a924cca4e7dbbaa7758c4966011a84f5c5e7db46c9739a7c5f,2024-04-16T22:15:34.027000
CVE-2024-21119,1,1,96739194ecaf0753cb19bd4344c025f8b10ba9249c560f1afb8436afb10772be,2024-04-16T22:15:34.197000
CVE-2024-21110,0,0,26761757b8923b87fdad8881bb30129155b2254e03fc28e73cda4bfba8255bac,2024-04-16T22:15:32.617000
CVE-2024-21111,0,0,df095bee2d0d9df82bab22d20b026708706025acd52e98e513beac77f52827f5,2024-04-16T22:15:32.780000
CVE-2024-21112,0,0,069d3a8123248348b644bad2d78930a8c9ea5c4bb845cf44eeacd7c641d788b1,2024-04-16T22:15:32.957000
CVE-2024-21113,0,0,76803a64f611335a6e0551a6c82d1a2639a5818f9f3522b5884b99b79d32c2d2,2024-04-16T22:15:33.127000
CVE-2024-21114,0,0,d2792a216e32ffefda5d2f48c39458ebe07af8dcda2f07132c2a52a241cb73f5,2024-04-16T22:15:33.300000
CVE-2024-21115,0,0,6a46662c9b5efc5c1f2e808f40b64677e03aedeb61719d31d7b0c5007c622ec3,2024-04-16T22:15:33.467000
CVE-2024-21116,0,0,14834822ae39f45be6e1818d460aca7d476d347ecd1b3cab8fc89440f6cdc08a,2024-04-16T22:15:33.653000
CVE-2024-21117,0,0,8eed13b90291acecf3dc23f5b6f163cc82d0767ebaa6728f52bcaba32e3d4862,2024-04-16T22:15:33.860000
CVE-2024-21118,0,0,e2d82afcceb4e6a924cca4e7dbbaa7758c4966011a84f5c5e7db46c9739a7c5f,2024-04-16T22:15:34.027000
CVE-2024-21119,0,0,96739194ecaf0753cb19bd4344c025f8b10ba9249c560f1afb8436afb10772be,2024-04-16T22:15:34.197000
CVE-2024-2112,0,0,a1cb4c4251bcffa2c05884275a870a25f5932616e05316e143e17d4e95c29cc7,2024-04-10T13:23:38.787000
CVE-2024-21120,1,1,2c10a4c4f0bf27a5cf89a1e352cf2cfb7d106ca8d02a564280e581432c5d7b2e,2024-04-16T22:15:34.427000
CVE-2024-21121,1,1,7695af2159b0e1e40ba9ab362dfc500e7e8a5d7d0bee2db18be3f405cff4b285,2024-04-16T22:15:34.600000
CVE-2024-21120,0,0,2c10a4c4f0bf27a5cf89a1e352cf2cfb7d106ca8d02a564280e581432c5d7b2e,2024-04-16T22:15:34.427000
CVE-2024-21121,0,0,7695af2159b0e1e40ba9ab362dfc500e7e8a5d7d0bee2db18be3f405cff4b285,2024-04-16T22:15:34.600000
CVE-2024-2113,0,0,1af2e189d0f766a4a77361c625e87ddcd239476cacd0eaf00d619a2d2d68e8de,2024-03-29T12:45:02.937000
CVE-2024-2115,0,0,d143f7e37acad4fe03aa4c56d721ecbb114e211aea88a809faac9f70095e9492,2024-04-05T12:40:52.763000
CVE-2024-2116,0,0,0a8927d2c3af56415377e26a49eef636f1c80d9f9b3374c561d3bce1d3a48066,2024-03-29T12:45:02.937000
@ -241008,6 +241008,7 @@ CVE-2024-22339,0,0,141d87c0954232284d5d12d393f2f8e1e8696b0a8047869855deb4538b3a4
CVE-2024-22346,0,0,638ee4e9687c7c28032b432c317662713c057110b08b4b27024e81eb8453bf9e,2024-03-19T16:50:10.570000
CVE-2024-22352,0,0,8ad74f9c108b142191e10d9f1af5800c7055fc5b8e79f7a9a2cf40171c06b8cd,2024-04-01T15:23:54.530000
CVE-2024-22353,0,0,dcde4e1942667b685d2979f87ac00f95d42a8fc5d16f7dbd8bc9f66a2b78dfbb,2024-04-02T17:56:57.187000
CVE-2024-22354,1,1,bdfa300bb19567b9b647b45bfb1936cce7cbfd7755aa9bda72c5f262de719e77,2024-04-17T01:15:06.747000
CVE-2024-22355,0,0,d5e1a0b55aa53f554235616979c7aa7e85f01ce7f183bc4e8573dd18cbbe1419,2024-03-04T13:58:23.447000
CVE-2024-22356,0,0,d81d64e63fe9b642cced3e4c94acc5e30f0113b5fdf3bed9ebc6028d04aab3ff,2024-03-26T17:09:53.043000
CVE-2024-22357,0,0,7cc996f78175ddc6bc31990b99ad084fcec784716961a600ab611825166f830e,2024-04-12T12:43:57.400000
@ -243418,7 +243419,7 @@ CVE-2024-27081,0,0,6ed48c106db6d65065e952974db0889dd604820642a515b665b4199918a2e
CVE-2024-27083,0,0,439f4c8be88c938a8485e647a1e9fd875d817bf6451ed77ccc44b8a92bcaf08b,2024-02-29T13:49:29.390000
CVE-2024-27084,0,0,9d9dc56eb44342ebdf65f8df5857c4a42b535ee96f2998cb21e8400366ec79c8,2024-02-26T18:15:07.920000
CVE-2024-27085,0,0,a2ba4a60d7fbf0824177f894b599cd2c1a40310aac61dbfaf7a03654f9a829eb,2024-03-17T22:38:29.433000
CVE-2024-27086,1,1,1d67aa5e8147b2b6d83154a177e9b24bdd25f87a85155a3f615e098de40e80cf,2024-04-16T22:15:34.783000
CVE-2024-27086,0,0,1d67aa5e8147b2b6d83154a177e9b24bdd25f87a85155a3f615e098de40e80cf,2024-04-16T22:15:34.783000
CVE-2024-27087,0,0,5b9b7040107e78bc917a74369bf7f558be05fd7da0faff9d2dcfc4d25d50686f,2024-02-26T22:10:40.463000
CVE-2024-27088,0,0,3fb76382074583fb576fbdf0cb4fa8d92b0b1baa24e2319c4835f05f8f5cd3a0,2024-02-26T22:10:40.463000
CVE-2024-27089,0,0,80888df8a8beb579eb58ecd8e5017bb9d7c0dad21161e687af8e50a608c5d017,2024-02-26T20:19:06.073000
@ -243634,7 +243635,7 @@ CVE-2024-27572,0,0,6169a6a6221da5c6dbb1556f7b45e6b45c4deebae5e21607b1e3cfa478f1f
CVE-2024-27575,0,0,fe78cdbfc48ba2557faf61957a122c11738e27bfad3d91860b0cc50d57150a36,2024-04-07T04:15:07.723000
CVE-2024-2758,0,0,a3cb437eedb439caebfac4666310f05bccf69de779d818f9f315740c92bee7d8,2024-04-04T12:48:41.700000
CVE-2024-2759,0,0,cb410b99122b16bbafd55e196fc83701c95bae09fba9353767401f5fe587c56c,2024-04-04T16:33:06.610000
CVE-2024-27592,0,1,1ee880de3a9d61f4b25b2b3ac56dc03f1e8964452682bc0959dc8a13f2b2c67c,2024-04-16T23:15:08.690000
CVE-2024-27592,0,0,1ee880de3a9d61f4b25b2b3ac56dc03f1e8964452682bc0959dc8a13f2b2c67c,2024-04-16T23:15:08.690000
CVE-2024-27602,0,0,641d004f193cbc187bf560868353a5607871444565457a2a1f222c57bafe0082,2024-04-03T12:38:04.840000
CVE-2024-27604,0,0,5dd90a20288c95f7805059ddcbf501c6de9e3b933a16f752b43bf101ed5f2058,2024-04-03T12:38:04.840000
CVE-2024-27605,0,0,4f744199930e3e7e9b7f220c4e73a81bb4fe207bf4ecc2f618ea8f6d8437d165,2024-04-03T12:38:04.840000
@ -244413,7 +244414,7 @@ CVE-2024-29275,0,0,402f5150501d1ad43199a2c93810407cb4bc9ca968149bb7f55410637d084
CVE-2024-29276,0,0,aca23a437429c144243dafb6e7ab7580683c55fe67f055697aafa1a11e9b270d,2024-04-02T12:50:42.233000
CVE-2024-29278,0,0,68d9b61e6ce874f8948705ce3cdb92754b448114cb863479c2e17e0909039bb0,2024-04-01T01:12:59.077000
CVE-2024-2929,0,0,259a475f54199dd846f57ff088582fd42af9991bb7e5a0933d4c675cb91ec78a,2024-03-26T17:09:53.043000
CVE-2024-29291,1,1,6a2d8654eba16cf8f9274638a5d2740bfaacd712a6909c05fea6da7b75867ef5,2024-04-16T23:15:08.767000
CVE-2024-29291,0,0,6a2d8654eba16cf8f9274638a5d2740bfaacd712a6909c05fea6da7b75867ef5,2024-04-16T23:15:08.767000
CVE-2024-29296,0,0,9df6519fa8f3cc846555f57a851c9ca9c85b64bc0579ecca8b9610940400afaa,2024-04-10T19:49:51.183000
CVE-2024-2930,0,0,337492b179fbec8f39a448e0d835a264515add1a9cb1abd7b1714333878c14e4,2024-04-11T01:25:41.570000
CVE-2024-29301,0,0,154c6ea8f36ae553114269a1e880d159b7e9b09b869cc177af921f11e043c79a,2024-03-26T12:55:05.010000
@ -244438,7 +244439,7 @@ CVE-2024-29399,0,0,1f0a560642c5bcb6053c3eb35cf9c158aa499897c937eeb4d73efac983ff0
CVE-2024-2940,0,0,dc7b546b238f5f17f29f90e2f8349ff92580baece4e80a8faa65880503340f4e,2024-04-11T01:25:42.140000
CVE-2024-29400,0,0,7c7ba10951f85314b8517e4af19bc97a8e02a4fb9c2ebd30adadcdfaed825d5b,2024-04-12T12:43:46.210000
CVE-2024-29401,0,0,679ee7eb07f94632974ee3a3d5e9f1f36658f780199e198816f5b2401b4eaa19,2024-03-26T17:09:53.043000
CVE-2024-29402,1,1,341d0062e1e3703ec61d2d15457610f3a27ce85eb3ec1e564e0cae4943f7f4ff,2024-04-16T23:15:08.827000
CVE-2024-29402,0,0,341d0062e1e3703ec61d2d15457610f3a27ce85eb3ec1e564e0cae4943f7f4ff,2024-04-16T23:15:08.827000
CVE-2024-2941,0,0,74f5dafb13773046a00a2499c333058547dc5cb76d6e56fb667d3547eaae40b7,2024-04-11T01:25:42.230000
CVE-2024-29413,0,0,a58c13bdf67afd8b98d238166eefb90262a9870531d3d5f182e9810c30b452cd,2024-04-04T12:48:41.700000
CVE-2024-29419,0,0,2f1c2a30167616ce2f7264d13a2e39c4e307caf2a0fab8a1d39f77c0f2b7d31b,2024-03-20T17:18:21.343000
@ -244448,22 +244449,22 @@ CVE-2024-29432,0,0,935ce59b23319f15478ff1d005b1786853efcea9f20ed5b78b83dcf1879a3
CVE-2024-29433,0,0,b10a666a979afbf6ffc25b1ef458e1d0fb9c766493f3b32e8a3cbc2c3e4a9e2b,2024-04-02T12:50:42.233000
CVE-2024-29434,0,0,e2dd739e4fe1b524f01d6355aa24f60868a619e4b33fdd429c31c5ef2f0acc1e,2024-04-03T12:38:04.840000
CVE-2024-29435,0,0,4d03d83d8cb615246ed4e783c1ea07f9aee9ed7e6aa6133cefbb15bfb0a5c168,2024-04-02T12:50:42.233000
CVE-2024-29439,0,0,7cf0a70cfb4668256337458d91ed2c0209386440e59360f7cd569e5c066d3d8d,2024-04-11T12:47:44.137000
CVE-2024-29439,0,1,0205a66ac068a0fed8b4662d4023b68fa4adb9fa7499a4326f16862215fea4b8,2024-04-17T01:15:06.960000
CVE-2024-2944,0,0,bf30485559894333f745f8eef196b6be024a5609ef9407e8d76f3c04dece3bb3,2024-04-11T01:25:42.527000
CVE-2024-29440,0,0,b41dbba691936eb263a6e48ee2f4c3b0c65bf928cbb922caedd1e0f5f03baacf,2024-03-26T12:55:05.010000
CVE-2024-29441,0,0,7d177bd767a6ee2302e79b98db9366f551a06c46417701848d75068973be5d72,2024-04-11T12:47:44.137000
CVE-2024-29442,0,0,7905121fe561461f75c739d09685b7ffc46a6e6f08464603a503f7d567bf4eab,2024-03-26T12:55:05.010000
CVE-2024-29443,0,0,56c4a998b5da875c2f7671831ef2b48002f3c56461a59b8a1dbbd2d293ca92b5,2024-04-11T12:47:44.137000
CVE-2024-29444,0,0,0268c5b80999b51afe8710a3826f9f5f0fd5248ec4523b9a74cbe1ada6ad287b,2024-04-11T12:47:44.137000
CVE-2024-29445,0,0,cc3751764af52423ac5b7dc05636571bd50b99f4e8200f72021ee84ebbcf377e,2024-04-11T12:47:44.137000
CVE-2024-29447,0,0,e1180cdede2080c441e7d0c7f49606d27c37531b26d1a8fd47e476e26ff10081,2024-04-11T12:47:44.137000
CVE-2024-29448,0,0,4ba65fdbb0ca30d9cdfb72c06aca70585e95b847cd3e3e977305949fbe0c68bd,2024-04-11T12:47:44.137000
CVE-2024-29449,0,0,47dcba52f80d694fddef2a5c37e5d232752be79c6d29facb1f20baa4976bd45a,2024-04-11T12:47:44.137000
CVE-2024-29440,0,1,af28a7195ddd19f2e67b02ed43c4f4341cb5c6ec19029799938ddd4abf8d0399,2024-04-17T01:15:07.027000
CVE-2024-29441,0,1,35a8862c80edd55d8f6f1f7f96310445af4e66d2a40a9a30fe2890e069ec42af,2024-04-17T01:15:07.100000
CVE-2024-29442,0,1,7ff49f29e2f39247b7a7da6b71ca7cefc102718291b2dcc233bbed2e5c3c9ec4,2024-04-17T01:15:07.160000
CVE-2024-29443,0,1,d929f321c3d21e8622db40f1944b5510ec4816666c9ced5fe335f499a545092e,2024-04-17T01:15:07.220000
CVE-2024-29444,0,1,e5aa07e55753f8a4ec71925e02be0a52213dfefefea4e302a21efb8c1d3ee699,2024-04-17T01:15:07.273000
CVE-2024-29445,0,1,0b8a34c13cad5d63754cf7a09d2edd2bb80ad06c0db1b2c5a0a31cd1fa908c27,2024-04-17T01:15:07.333000
CVE-2024-29447,0,1,ba502ee99bcb8d923b6cb66caf4882a6855d51c812a2438755133264b6013996,2024-04-17T01:15:07.387000
CVE-2024-29448,0,1,df2f9f29b404c769dd042d17aab40afdd52210be1a2f7c50bfc77c14d786385e,2024-04-17T01:15:07.443000
CVE-2024-29449,0,1,e2b92f652bb0da8723e25badd33aafae15d9403e758d915af68c443e1e5ad823,2024-04-17T01:15:07.510000
CVE-2024-2945,0,0,9a8b20f2d1f78244c8700886f61029534f24a9a5de87a4254b75a2868f9e961c,2024-04-11T01:25:42.617000
CVE-2024-29450,0,0,005fd00ff20c3a890af8b95157cd66876d6e8274cc9a8e97d7d9e2739fb8ba9d,2024-04-11T12:47:44.137000
CVE-2024-29452,0,0,390452f7e03ee0abed26b2bb426d4b14b3ea2b82601f2db2f6e611b242e9dfeb,2024-04-11T12:47:44.137000
CVE-2024-29454,0,0,c5e740cd1abf29bb706f61bdcb9cac715190bdeda241ee5e4735d3e49da21397,2024-04-12T12:43:57.400000
CVE-2024-29455,0,0,6e1789780e5aa8031c75de8caec34ad04dbe0084b961cab46e445dc7c45cfc0e,2024-04-11T12:47:44.137000
CVE-2024-29450,0,1,9d33052158da9c8d287ef6f5672d7ae110c170c0ab4f2f6915e11584aad0766f,2024-04-17T01:15:07.560000
CVE-2024-29452,0,1,8d0b729784b4da60050ef65dc7953fe0bc8db84f2c38755d33415257a17e18a6,2024-04-17T01:15:07.617000
CVE-2024-29454,0,1,368d46eea8baef98385d731c443c2f86a1fadef42a9f12cedec450801d7f564e,2024-04-17T01:15:07.677000
CVE-2024-29455,0,1,407cf55ddf9b5933109bc2c849de83fa36f35bf4ad5d595bc3c9616a07500c9f,2024-04-17T01:15:07.730000
CVE-2024-2946,0,0,b86288fa77fb47b4b83be2e46631f0944d38df3dbc98c9ee65a2d9324fa3b190,2024-04-10T13:23:38.787000
CVE-2024-29460,0,0,b846dd78dc5e35e9b0ddcbf6b64c6fe8dd169ef35be60b3c712c2dd2787cb070,2024-04-11T12:47:44.137000
CVE-2024-29461,0,0,0ea3979c495137b90acde4ca36a0a99c570c5e7619fef41ff59b36c98cf5a199,2024-04-15T13:15:51.577000
@ -245064,46 +245065,46 @@ CVE-2024-30639,0,0,46b7c5471e103449855c9fbd2240c66d12c0c2b4b2c2dd58c9da71634c442
CVE-2024-3064,0,0,150d2695d7eeb315cec549f12d6c6ef3f6e02daaf223b84571983b190cdbdba2,2024-04-10T13:23:38.787000
CVE-2024-30645,0,0,00b9821a66dbca80d2d2c9c63858e19e8817ea8f49dc6578caf9fd20dddfbebc,2024-04-01T01:12:59.077000
CVE-2024-30656,0,0,c800b352c15d86c6b7538edefbe50a56ea126bd7af414b5024084888358a8802,2024-04-16T13:24:07.103000
CVE-2024-30659,0,0,6b674dcc6172a28fd382455a39837aee02d1048828b479da4de736260a001915,2024-04-08T18:48:40.217000
CVE-2024-30661,0,0,ca3a009dda716fdf3c3b4141a47c3533be46c4c31a5c8c5b65ef3f7e55a4c4a0,2024-04-08T18:48:40.217000
CVE-2024-30662,0,0,71b80d6dafbe22437f2510bb021f4c17a7a897b19e7d2dd354177ad2cac3e4f3,2024-04-08T18:48:40.217000
CVE-2024-30663,0,0,6e08db3f744a4228125df40199a08b9ee2a90f00728b6fca5a3d973b18d4de49,2024-04-08T18:48:40.217000
CVE-2024-30665,0,0,b0872b924bec224f9269c5d12f3e3e09bd037687bdf2355c6dca31778a639300,2024-04-08T18:48:40.217000
CVE-2024-30666,0,0,c963b049325fad48121e774e7f87aeeb4db59eaee7ce9b24b135f03225a8605b,2024-04-08T18:48:40.217000
CVE-2024-30667,0,0,ff284e163d8506ead82a88e1e0195d7345f11e18d3b36d2dad51ac5fe6f1c4e9,2024-04-08T18:48:40.217000
CVE-2024-30659,0,1,61f850e3b46d205f26b3e244c5b08f3a3d93128b54ccec717c46733663eba23a,2024-04-17T01:15:07.787000
CVE-2024-30661,0,1,bcc8604f273e93c8e588ce1bdd1a9ece350083ce7e93f26c7dbf2e962081965b,2024-04-17T01:15:07.847000
CVE-2024-30662,0,1,27c70236e307dcf19582d3516b8d64f734a73d107753e425090972ed2be6a8c3,2024-04-17T01:15:07.907000
CVE-2024-30663,0,1,389a4d6fbcedf1650843d47373664a20a831bf84258e54b129c5846e59aba382,2024-04-17T01:15:07.960000
CVE-2024-30665,0,1,3f695edd1e72eb443a740aef3fbad69f618e99350100ab838b4c73d06b2cd9fa,2024-04-17T01:15:08.010000
CVE-2024-30666,0,1,0d3ef8cfc85e5ff24ffc04b9608f814ebf69d0fee6728f8e86fd1a5651c999bc,2024-04-17T01:15:08.063000
CVE-2024-30667,0,1,b34af94390a480d37fac45c6f18085a47b08b076475bdfd12c5edf2b7032fbf6,2024-04-17T01:15:08.117000
CVE-2024-3067,0,0,e9b1bebe389d4e514e7a9a61bf198949c5e392a49f5a0c35c052cf2a541b472e,2024-04-16T13:24:07.103000
CVE-2024-30672,0,0,5f03fe7211bd8d45b5928b91a5ac0350abcfb5c5194aa5b0296fc94c9e863bc2,2024-04-08T18:48:40.217000
CVE-2024-30674,0,0,6ed6c67e9f9314eaeb2be25e85ad7999c533cc1beb21c8cb467ab7a893f16710,2024-04-08T18:48:40.217000
CVE-2024-30675,0,0,8b91a2fb611ecb3c19dd6a14ce9d54a86e8a20f268f642c9f4e164c260b50edd,2024-04-08T18:48:40.217000
CVE-2024-30676,0,0,af724672b3075823cc7ac023ff0bd01b6766fd74313e164540f52e1f670069a5,2024-04-09T12:48:04.090000
CVE-2024-30678,0,0,28c2c42c15a87c8576562744982b7e6592c723e041b1251a726dc2914f0f31c2,2024-04-09T12:48:04.090000
CVE-2024-30679,0,0,1652ad2d7f751aa883b92dadc3db45d6131582879ab3f0ce2ce9b68ca301473c,2024-04-09T12:48:04.090000
CVE-2024-30680,0,0,07cf4672c6cb5c0d37b128ff6292cf9dcf1d064a6b724bb71fb28d8b540ff210,2024-04-09T12:48:04.090000
CVE-2024-30681,0,0,ddbe0c69f9ab035c7a353186f3b3cfb547957dc7577d22a08e0cab4ca1d951a2,2024-04-09T12:48:04.090000
CVE-2024-30683,0,0,95978317b9ff4fe100aa7b5187ca91600381e6090aadd857a6554499fc4fc767,2024-04-09T12:48:04.090000
CVE-2024-30684,0,0,93873bb3f77c6d6c1129e83df71a0c5dab8044941f95a0a1a2446d06a1a663f9,2024-04-09T12:48:04.090000
CVE-2024-30686,0,0,cecb3b359a2c306a651201a597cd44f73ed8fc5e2479bc1e16493cf1b000f3d9,2024-04-09T12:48:04.090000
CVE-2024-30687,0,0,627c6f49d0e8696456211f5aadec2afbfb7309884605ed881f3f310eff8a28e0,2024-04-09T12:48:04.090000
CVE-2024-30688,0,0,be62ee228899213efd589c12a1c4722b462ed6c7cea897018d539f4060eeaef6,2024-04-09T12:48:04.090000
CVE-2024-30690,0,0,758c0e580a22afa6415e22d45eb180157d5e27c3f7c136b941a2ccea1a631afb,2024-04-09T12:48:04.090000
CVE-2024-30691,0,0,23334283bdbb80ece84004a07a2d4f2fb30a9114f4de8009b41ca287700f7f5c,2024-04-09T12:48:04.090000
CVE-2024-30692,0,0,ff1ce2f91a7b26c24b130e2b00e06d5a248a15e5d50cd434ef04e50387645828,2024-04-09T12:48:04.090000
CVE-2024-30694,0,0,7755c230805c1909d0e94175233f36be70321ff270a75af58c50d43db7f1ff2d,2024-04-09T12:48:04.090000
CVE-2024-30695,0,0,520c313ebed8e7aa062ef70d824f022571c815c409401bb881ea7203f9352df6,2024-04-09T12:48:04.090000
CVE-2024-30696,0,0,f669e76cecff581f311ed5900046ffb74094191bccea9325de2ff009a7b30889,2024-04-09T12:48:04.090000
CVE-2024-30697,0,0,2bd165ee3b3f68656e20994b8433b623199f76c40a9ca0dc0dfa3acfa9da7f64,2024-04-09T12:48:04.090000
CVE-2024-30699,0,0,9d56c28cee5445b90e131fb18f6cf806afce6628a108cb0836bb98a2b8089d77,2024-04-09T12:48:04.090000
CVE-2024-30701,0,0,8e03ccf6659f5a4e378ff7d93a21c845259f9ec9ec9403dcafcfbc3a4ce924ba,2024-04-09T12:48:04.090000
CVE-2024-30702,0,0,3202ab3b96337818fa5697e074c56de6b3f80d2a2d54b4e19bbd152344839f49,2024-04-10T13:24:00.070000
CVE-2024-30703,0,0,d65523fa26837f143aa861c4b1ec22513e9119e27da48ccd66026c68d769da4b,2024-04-10T13:24:00.070000
CVE-2024-30704,0,0,4be6f74b234ab487793dbcc167bc99fcc85408b78dae088a65348367022464d8,2024-04-10T13:24:00.070000
CVE-2024-30706,0,0,03893f8ba2617a63c8f0f690a761c749ad6c0a21548a544156d648c98f4fab3e,2024-04-10T13:23:38.787000
CVE-2024-30707,0,0,b3787314c5b41663f817d28039ba162cb3c9b1be3feb9468dcb0c11582ff962f,2024-04-10T13:23:38.787000
CVE-2024-30708,0,0,10ddd37221e5a1c0cf70f11b4f20a4eb46a946eba4360a4f83ad136c08b7e804,2024-04-10T13:23:38.787000
CVE-2024-30710,0,0,ad0b2fc27c744492bd638ad1270e2eb0cf591817d25e6033c0ebbfd623f99942,2024-04-10T13:23:38.787000
CVE-2024-30711,0,0,1cca53fbf3011ffff61c60b94d4155920621fd56a5bd85710f9dff6c1e97a66c,2024-04-10T13:23:38.787000
CVE-2024-30712,0,0,2c1a525e9cea1ecfad7022378dd4f3aa58224217a74c01672a3ebf64824c4f06,2024-04-10T13:23:38.787000
CVE-2024-30713,0,0,1ea15ed5eb999cac822ad0963612cbe3e0ac75b03e995938d276ab7dceb0b420,2024-04-10T13:23:38.787000
CVE-2024-30672,0,1,21a7acac87d2910f58d956dd2a9e74d0ae726019f37c821a2970b628587b3d1f,2024-04-17T01:15:08.170000
CVE-2024-30674,0,1,a1449c2fcf0ba16ad3e356fcb957a27686d489e53286578459faa6029c16eed6,2024-04-17T01:15:08.223000
CVE-2024-30675,0,1,57aa3f2485756b52840d41b9ee07c4bdd5176287cdb2b12e4ff1d9b9e22a91bc,2024-04-17T01:15:08.283000
CVE-2024-30676,0,1,39459d500da83bf48c4e52e965f9401b3e6d27a861b4a9bdfb0427cf44c6e8f6,2024-04-17T01:15:08.337000
CVE-2024-30678,0,1,760a12d68bfeaf49ed657df7eba66701a952b976c57457ed1c5bac7ccc1e8ace,2024-04-17T01:15:08.427000
CVE-2024-30679,0,1,3bc42854c1a1b42a98cb9b10bea930710bd7b156fc9f323745b5d962ad90145b,2024-04-17T01:15:08.510000
CVE-2024-30680,0,1,225bff0e04855f6ba43ce3dc77ffa65b48b69bf375ccbb3f6145bd975882eac8,2024-04-17T01:15:08.577000
CVE-2024-30681,0,1,10f3d4332220d3d49244a0c6fc169d3b7ce1a04f2f4ea8f3a3d1bd7df2f01529,2024-04-17T01:15:08.633000
CVE-2024-30683,0,1,3884021987e5d4e422886e5f27c1c7d6b1ef85f46375c2ad8005095bd832ff7c,2024-04-17T01:15:08.690000
CVE-2024-30684,0,1,1fd31d9a4b0023b07c3d817589c127fb00824f9dae6fdf331662b52631f1f66a,2024-04-17T01:15:08.750000
CVE-2024-30686,0,1,372e2063d26b39ed76584767891e58ea9974a9738b5f6375cd08231d98371c18,2024-04-17T01:15:08.813000
CVE-2024-30687,0,1,a5e6380da51987e65e71b2a3b2fef33eb738ba9a88846b7bb72509a2c954f96f,2024-04-17T01:15:08.873000
CVE-2024-30688,0,1,79739bd9f2d4df545ff015f26d898959a5b0ecb38d4d6666e06fd38c6975033f,2024-04-17T01:15:08.927000
CVE-2024-30690,0,1,140a6aa982a7c8e97b8b62a6a53e1b1d7f6388d33dda3e6ff0e96dea7677fcd1,2024-04-17T01:15:08.980000
CVE-2024-30691,0,1,8c05019cb96b7089b3bebcb3edcc019e24a46548532893ddc2c0e397f82635fc,2024-04-17T01:15:09.033000
CVE-2024-30692,0,1,06ca4d2ab37709f6ab9bf0d85e3573d1ca79815c7ecaae46be13ac66b56a3ddd,2024-04-17T01:15:09.100000
CVE-2024-30694,0,1,3099e365af6a2c20fcdaa1beed13525701c0a4995b3ba87662b83651d5c7b416,2024-04-17T01:15:09.160000
CVE-2024-30695,0,1,7775c65b9bf7cfc01e45de81af98531676ecde1914330362c254d870e6aeb882,2024-04-17T01:15:09.217000
CVE-2024-30696,0,1,5cfb0bebfff5be81b08a66ffdb308cc0d717f7bc78842763dbd36b60ae1cf853,2024-04-17T01:15:09.273000
CVE-2024-30697,0,1,a33b26a0decfcbab9179239f13c3a84734fd06638ab06af16b814f4f2a89c8b2,2024-04-17T01:15:09.330000
CVE-2024-30699,0,1,33f0494142c66f999e1fc060019cb3357e23cf0f0f9cd0178e36e3656b4b0b3e,2024-04-17T01:15:09.387000
CVE-2024-30701,0,1,d9e2f0824d5dd83e892e3ce43966cf2bdfbd3fef00786abfd3aa6448290c070d,2024-04-17T01:15:09.447000
CVE-2024-30702,0,1,a7485ca3f518262adefc8c57fc92be69ee8ce36b582283f4b90f1003ece220ac,2024-04-17T01:15:09.503000
CVE-2024-30703,0,1,54442d23a613c11d76912c327eec4b82d83de8b6e43e8f7687abaf2d44476e1a,2024-04-17T01:15:09.570000
CVE-2024-30704,0,1,d94ba684a619f657bfb5a4d11fa161cc621abbe0cb023edb9d4d35c3d8b92897,2024-04-17T01:15:09.627000
CVE-2024-30706,0,1,259fe5fd57667c60e8ecd49f3a41f82c05a7696135541ea18c275f1148086a25,2024-04-17T01:15:09.687000
CVE-2024-30707,0,1,75fbbcd765b686443df2ab41d6298e4f541e0e27b686cd4c3f6eca7fe2686679,2024-04-17T01:15:09.747000
CVE-2024-30708,0,1,50d3cc96fee682adc13619592ba9fff8db734f8bcbfa2240598f53f24dec4d3f,2024-04-17T01:15:09.810000
CVE-2024-30710,0,1,aa9587f53dd7dd520275ce6ccdb7f704ef700788ec68d53464f6a11fe9f3150a,2024-04-17T01:15:09.867000
CVE-2024-30711,0,1,19e7a31f2ede8ce10e1a843e1f235f9dd50314c74c6772cebbedced843e3ae9a,2024-04-17T01:15:09.923000
CVE-2024-30712,0,1,d203d5b108c4959ccd7826756f2bcdc1f5744cc6bc3ee08280dd09f5c3a0f5f1,2024-04-17T01:15:09.990000
CVE-2024-30713,0,1,3be2f8112058fd6aca88254eddb652d5fc76394b8fa76f80a823c68c59ab637a,2024-04-17T01:15:10.050000
CVE-2024-30715,0,0,c6d6a66c34447a93ef4e3806c199a13ce413008b74664924d9f13ad17ec1bad5,2024-04-10T13:23:38.787000
CVE-2024-30716,0,0,c8d02ea62b2a81fadb2c085275572631890a964a411aa3e38b7d9807a9c89406,2024-04-10T13:23:38.787000
CVE-2024-30718,0,0,c3c8f848e7ce91e0db0795469c5673815e2dc3f2aef9ffc4f4c5cfe3789bf72e,2024-04-10T13:23:38.787000
@ -245398,7 +245399,7 @@ CVE-2024-31446,0,0,401b62f3afdfc4cc781dfe99d4a5c6abfe1f46e7322870afe10073c6356a7
CVE-2024-31447,0,0,1686ea065902cff688a9e0e72258f816c60304799af9644c7db6f9ae37572786,2024-04-08T18:48:40.217000
CVE-2024-3145,0,0,30d7039ca4630abed1ac79b5e5068d170488eb4a6c9740ed0209e585b5eb2f84,2024-04-11T01:25:55.100000
CVE-2024-31451,0,0,10ad8ce607c3f80bebbdd47fed59e0fb48d83a52aa634e8a43b74ccc86bdeada,2024-04-16T15:15:36.687000
CVE-2024-31452,1,1,0fefc3d1c5fa4caec6925c6b39b8cf95a91d230c6284b73215cdfa93397d3361,2024-04-16T22:15:35.003000
CVE-2024-31452,0,0,0fefc3d1c5fa4caec6925c6b39b8cf95a91d230c6284b73215cdfa93397d3361,2024-04-16T22:15:35.003000
CVE-2024-31453,0,0,1b1ead27c6870d2affe09236bc3123473d08b6ddf2bca0a49b08400d4b48a120,2024-04-10T13:24:00.070000
CVE-2024-31454,0,0,facd63c9b966def9fa208ea7acce2b97e831e91313ffa612db120032d2a37c2c,2024-04-10T13:24:00.070000
CVE-2024-31455,0,0,58d58168822fd35b9c530d967e86c80a8aef11f5f1477a56943eec05e6715b25,2024-04-10T13:24:00.070000
@ -245412,8 +245413,9 @@ CVE-2024-3147,0,0,f05061e9d718b866336ceef3f83885c168403f8d387cf11dbe00ac736df358
CVE-2024-3148,0,0,12b6e15e00d964ce79c059c99a6c4df70691a740ad2056657f2d4843c78fc654,2024-04-11T01:25:55.337000
CVE-2024-31487,0,0,ffef7fcdc05bb476a1f2c02c71de4a76075ea7f0301d6a8889db629ce9b194c6,2024-04-10T13:24:22.187000
CVE-2024-31492,0,0,a251126d380ad734bdcae40155276c0c8cd0f78c057d6c232814179759c90bf9,2024-04-10T19:49:51.183000
CVE-2024-31497,0,1,92d3946f715279db269d1f9ac34c9dfc89e5dc1e10b2248a9304d809932b0d4b,2024-04-16T23:15:08.903000
CVE-2024-31497,0,0,92d3946f715279db269d1f9ac34c9dfc89e5dc1e10b2248a9304d809932b0d4b,2024-04-16T23:15:08.903000
CVE-2024-31498,0,0,db3c4e2337e3fccc66e084ef6016d8532925f451bef4124b0c2782f0c54d90b6,2024-04-08T00:15:08
CVE-2024-31503,1,1,6732ad15c4a40e957bb3d152a5a45a842a9476ad49235e6a47c63246ef12081f,2024-04-17T00:15:07.220000
CVE-2024-31506,0,0,8be7ef5b3e9d65e4bba9dd63e2b7475f0658a4b183369094a98038d4eee40099,2024-04-10T13:24:00.070000
CVE-2024-31507,0,0,8a4d05957463fb55563022c4622a2463374ff774a0631f4c63214875a7c78bee,2024-04-10T13:24:00.070000
CVE-2024-3151,0,0,2dd1cf236cf7e4dbb7d9720cf950d856f9b652cd7c08d701ecc784bea1322bb1,2024-04-11T01:25:55.410000
@ -245435,8 +245437,9 @@ CVE-2024-31651,0,0,449580f383ba06b10b890173ddf2d62af7a188eb69db82466ee9152e4b087
CVE-2024-31652,0,0,208b4f263a9a44614b423f2ea1b775ae64777df67f6e60b98c2159dddb5c4a0b,2024-04-16T13:24:07.103000
CVE-2024-3167,0,0,f4a160a1382e038713f603968880deb87a3b362a15bab9fc55aa42721dc9dd6e,2024-04-10T13:23:38.787000
CVE-2024-31678,0,0,6d17d4ce9eaa15ebb6367a838566d027b53ddba56e09f333fd8cadacfd1d2447,2024-04-12T12:44:04.930000
CVE-2024-31759,1,1,c6aaf263d8cac477abe21ca43dad0802ddd036edc2b440e2698a5e9834c14b52,2024-04-16T23:15:09.047000
CVE-2024-31760,1,1,83c2ca70e34af03377fc0a0219cb672ad960b263ff17cdbd5820fe03fc170075,2024-04-16T23:15:09.107000
CVE-2024-31680,1,1,919dab49ae68abbaa13231e8eecbea48a6d9fca067eef112002bd5ac041cce3b,2024-04-17T00:15:07.293000
CVE-2024-31759,0,0,c6aaf263d8cac477abe21ca43dad0802ddd036edc2b440e2698a5e9834c14b52,2024-04-16T23:15:09.047000
CVE-2024-31760,0,0,83c2ca70e34af03377fc0a0219cb672ad960b263ff17cdbd5820fe03fc170075,2024-04-16T23:15:09.107000
CVE-2024-3178,0,0,e1b2edc538f836ffb506a17d476e0f961db2588242ddd1b2358ad3487cd818bf,2024-04-04T12:48:41.700000
CVE-2024-31783,0,0,a7054e74fa1a557567cd0f4452494e62f528f37b2972c2343d20292f99336f13,2024-04-16T13:24:07.103000
CVE-2024-31784,0,0,0055eda0e2e2e3cebbac3d895c086f3674073feab99e847bee4ca99f9495a801,2024-04-16T13:24:07.103000
@ -245476,7 +245479,7 @@ CVE-2024-31871,0,0,2e9cb20a8839296f42d6bc6aa4eee6ec286fed065eef42e4971f116c0f81a
CVE-2024-31872,0,0,7d09da772d85c1598253bebf81c543077ef995af0f84d1cf088132605a2400f9,2024-04-10T19:49:51.183000
CVE-2024-31873,0,0,30397559953deb34a9ae192149473632dc6b2334245e920787a4c5e14fc76375,2024-04-10T19:49:51.183000
CVE-2024-31874,0,0,1770e58d0ae5591eb931a8cdfdb054fb4d854f81849d14af250c71db6caf553c,2024-04-10T19:49:51.183000
CVE-2024-31887,1,1,fc8d9e19ae4d266bf0e07275be6dc695fb1e244ff60ad6d3372609e811f9591d,2024-04-16T22:15:35.240000
CVE-2024-31887,0,0,fc8d9e19ae4d266bf0e07275be6dc695fb1e244ff60ad6d3372609e811f9591d,2024-04-16T22:15:35.240000
CVE-2024-31920,0,0,1a6309492e6d112b6d5c74c55b809c13a9ffaf43e5c668b35b54f9c1433bee12,2024-04-15T13:15:31.997000
CVE-2024-31921,0,0,4b6ce9a933b430a9597eec1c95a19c016c2c3b069930a8064c6136dce4df86da,2024-04-15T13:15:31.997000
CVE-2024-31922,0,0,ddc17d5b651ce3b8e89be96b4d055079549d44bfd30b2393d2326cd870478923,2024-04-15T13:15:31.997000
@ -245535,7 +245538,7 @@ CVE-2024-32027,0,0,5d8710672ae4a50766a192faeab61c22e45c9ea1fe8601d8fa6309c61ece5
CVE-2024-32028,0,0,a16d36bcfaa5cccbb6282aecd03e18b80c66f8151e3c2f08a8edd43b521f9227,2024-04-15T13:15:31.997000
CVE-2024-3203,0,0,d460cfbc8661b4424cc0984f526a676bb0961256fc9d04a7d500e89187029830,2024-04-11T01:25:55.810000
CVE-2024-32035,0,0,9f9419e7b7ca688ca6c807b99c4196d3fdd26d305c290e1d723cf412a79167b9,2024-04-16T13:24:07.103000
CVE-2024-32036,0,1,4358f457ff05e2fb3005eccdac6fca8cb869be3ffa209c190e441f2c4aed7dbe,2024-04-16T23:15:09.173000
CVE-2024-32036,0,0,4358f457ff05e2fb3005eccdac6fca8cb869be3ffa209c190e441f2c4aed7dbe,2024-04-16T23:15:09.173000
CVE-2024-3204,0,0,2a2a133d829052d72380a6f7a45e32f6ecd96ec6da65fdbadcbe92a1f79d774f,2024-04-11T01:25:55.933000
CVE-2024-3205,0,0,befb48df2bb5e20af3b4383c1ef82865b9f9fb3145e096ffb7e0098ff096b4f8,2024-04-11T01:25:56.010000
CVE-2024-3207,0,0,a57734da301192d6a9381ac71eef9bc84e6acf70886d5628a9c0939255320fc2,2024-04-11T01:25:56.090000

Can't render this file because it is too large.