Auto-Update: 2024-04-17T02:00:30.816528+00:00

This commit is contained in:
cad-safe-bot 2024-04-17 02:03:20 +00:00
parent 246f950079
commit 133298ab9b
58 changed files with 439 additions and 338 deletions

View File

@ -0,0 +1,59 @@
{
"id": "CVE-2024-22354",
"sourceIdentifier": "psirt@us.ibm.com",
"published": "2024-04-17T01:15:06.747",
"lastModified": "2024-04-17T01:15:06.747",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "\nIBM WebSphere Application Server 8.5, 9.0 and IBM WebSphere Application Server Liberty 17.0.0.3 through 24.0.0.3 are vulnerable to an XML External Entity Injection (XXE) attack when processing XML data. A remote attacker could exploit this vulnerability to expose sensitive information, consume memory resources, or to conduct a server-side request forgery attack. IBM X-Force ID: 280401.\n\n"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "psirt@us.ibm.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:L/A:L",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "LOW",
"availabilityImpact": "LOW",
"baseScore": 7.0,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.2,
"impactScore": 4.7
}
]
},
"weaknesses": [
{
"source": "psirt@us.ibm.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-611"
}
]
}
],
"references": [
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/280401",
"source": "psirt@us.ibm.com"
},
{
"url": "https://www.ibm.com/support/pages/node/7148426",
"source": "psirt@us.ibm.com"
}
]
}

View File

@ -2,12 +2,12 @@
"id": "CVE-2024-29439", "id": "CVE-2024-29439",
"sourceIdentifier": "cve@mitre.org", "sourceIdentifier": "cve@mitre.org",
"published": "2024-04-10T23:15:06.753", "published": "2024-04-10T23:15:06.753",
"lastModified": "2024-04-11T12:47:44.137", "lastModified": "2024-04-17T01:15:06.960",
"vulnStatus": "Awaiting Analysis", "vulnStatus": "Awaiting Analysis",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
"value": "An unauthorized node injection vulnerability has been identified in ROS2 Humble Hawksbill in ROS_VERSION 2 and ROS_PYTHON_VERSION 3, allows remote attackers to escalate privileges and inject malicious ROS2 nodes into the system." "value": "An unauthorized node injection vulnerability has been identified in ROS2 Humble Hawksbill in ROS_VERSION 2 and ROS_PYTHON_VERSION 3, allows remote attackers to escalate privileges and inject malicious ROS2 nodes into the system. NOTE: this is disputed by multiple third parties who believe there was not reasonable evidence to determine the existence of a vulnerability."
}, },
{ {
"lang": "es", "lang": "es",

View File

@ -2,12 +2,12 @@
"id": "CVE-2024-29440", "id": "CVE-2024-29440",
"sourceIdentifier": "cve@mitre.org", "sourceIdentifier": "cve@mitre.org",
"published": "2024-03-25T21:15:47.217", "published": "2024-03-25T21:15:47.217",
"lastModified": "2024-03-26T12:55:05.010", "lastModified": "2024-04-17T01:15:07.027",
"vulnStatus": "Awaiting Analysis", "vulnStatus": "Awaiting Analysis",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
"value": "An unauthorized access vulnerability has been discovered in ROS2 Humble Hawksbill versions where ROS_VERSION is 2 and ROS_PYTHON_VERSION is 3. This vulnerability could potentially allow a malicious user to gain unauthorized access to multiple ROS2 nodes remotely. Unauthorized access to these nodes could result in compromised system integrity, the execution of arbitrary commands, and disclosure of sensitive information." "value": "An unauthorized access vulnerability has been discovered in ROS2 Humble Hawksbill versions where ROS_VERSION is 2 and ROS_PYTHON_VERSION is 3. This vulnerability could potentially allow a malicious user to gain unauthorized access to multiple ROS2 nodes remotely. Unauthorized access to these nodes could result in compromised system integrity, the execution of arbitrary commands, and disclosure of sensitive information. NOTE: this is disputed by multiple third parties who believe there was not reasonable evidence to determine the existence of a vulnerability."
}, },
{ {
"lang": "es", "lang": "es",

View File

@ -2,12 +2,12 @@
"id": "CVE-2024-29441", "id": "CVE-2024-29441",
"sourceIdentifier": "cve@mitre.org", "sourceIdentifier": "cve@mitre.org",
"published": "2024-04-11T00:15:07.223", "published": "2024-04-11T00:15:07.223",
"lastModified": "2024-04-11T12:47:44.137", "lastModified": "2024-04-17T01:15:07.100",
"vulnStatus": "Awaiting Analysis", "vulnStatus": "Awaiting Analysis",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
"value": "An issue was discovered in ROS2 (Robot Operating System 2) Humble Hawksbill in ROS_VERSION 2 and ROS_PYTHON_VERSION 3, allows remote attackers to cause a denial of service (DoS) via the ROS2 nodes." "value": "An issue was discovered in ROS2 (Robot Operating System 2) Humble Hawksbill in ROS_VERSION 2 and ROS_PYTHON_VERSION 3, allows remote attackers to cause a denial of service (DoS) via the ROS2 nodes. NOTE: this is disputed by multiple third parties who believe there was not reasonable evidence to determine the existence of a vulnerability."
}, },
{ {
"lang": "es", "lang": "es",

View File

@ -2,12 +2,12 @@
"id": "CVE-2024-29442", "id": "CVE-2024-29442",
"sourceIdentifier": "cve@mitre.org", "sourceIdentifier": "cve@mitre.org",
"published": "2024-03-25T22:37:19.797", "published": "2024-03-25T22:37:19.797",
"lastModified": "2024-03-26T12:55:05.010", "lastModified": "2024-04-17T01:15:07.160",
"vulnStatus": "Awaiting Analysis", "vulnStatus": "Awaiting Analysis",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
"value": "An unauthorized access vulnerability has been discovered in ROS2 Humble Hawksbill versions where ROS_VERSION is 2 and ROS_PYTHON_VERSION is 3. This vulnerability could potentially allow a malicious user to gain unauthorized access to multiple ROS2 nodes remotely. Unauthorized access to these nodes could result in compromised system integrity, the execution of arbitrary commands, and disclosure of sensitive information." "value": "An unauthorized access vulnerability has been discovered in ROS2 Humble Hawksbill versions where ROS_VERSION is 2 and ROS_PYTHON_VERSION is 3. This vulnerability could potentially allow a malicious user to gain unauthorized access to multiple ROS2 nodes remotely. Unauthorized access to these nodes could result in compromised system integrity, the execution of arbitrary commands, and disclosure of sensitive information. NOTE: this is disputed by multiple third parties who believe there was not reasonable evidence to determine the existence of a vulnerability."
}, },
{ {
"lang": "es", "lang": "es",

View File

@ -2,12 +2,12 @@
"id": "CVE-2024-29443", "id": "CVE-2024-29443",
"sourceIdentifier": "cve@mitre.org", "sourceIdentifier": "cve@mitre.org",
"published": "2024-04-10T23:15:06.810", "published": "2024-04-10T23:15:06.810",
"lastModified": "2024-04-11T12:47:44.137", "lastModified": "2024-04-17T01:15:07.220",
"vulnStatus": "Awaiting Analysis", "vulnStatus": "Awaiting Analysis",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
"value": "A shell injection vulnerability was discovered in ROS2 (Robot Operating System 2) Humble Hawksbill in ROS_VERSION 2 and ROS_PYTHON_VERSION 3, allows remote attackers to execute arbitrary code, escalate privileges, and obtain sensitive information due to the way ROS2 handles shell command execution in components like command interpreters or interfaces that process external inputs." "value": "A shell injection vulnerability was discovered in ROS2 (Robot Operating System 2) Humble Hawksbill in ROS_VERSION 2 and ROS_PYTHON_VERSION 3, allows remote attackers to execute arbitrary code, escalate privileges, and obtain sensitive information due to the way ROS2 handles shell command execution in components like command interpreters or interfaces that process external inputs. NOTE: this is disputed by multiple third parties who believe there was not reasonable evidence to determine the existence of a vulnerability."
}, },
{ {
"lang": "es", "lang": "es",

View File

@ -2,12 +2,12 @@
"id": "CVE-2024-29444", "id": "CVE-2024-29444",
"sourceIdentifier": "cve@mitre.org", "sourceIdentifier": "cve@mitre.org",
"published": "2024-04-11T00:15:07.283", "published": "2024-04-11T00:15:07.283",
"lastModified": "2024-04-11T12:47:44.137", "lastModified": "2024-04-17T01:15:07.273",
"vulnStatus": "Awaiting Analysis", "vulnStatus": "Awaiting Analysis",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
"value": "An OS command injection vulnerability has been discovered in ROS2 (Robot Operating System 2) Humble Hawksbill in ROS_VERSION 2 and ROS_PYTHON_VERSION 3, allows remote attackers to execute arbitrary code, escalate privileges, and obtain sensitive information via External Command Execution Modules, System Call Handlers, and Interface Scripts." "value": "An OS command injection vulnerability has been discovered in ROS2 (Robot Operating System 2) Humble Hawksbill in ROS_VERSION 2 and ROS_PYTHON_VERSION 3, allows remote attackers to execute arbitrary code, escalate privileges, and obtain sensitive information via External Command Execution Modules, System Call Handlers, and Interface Scripts. NOTE: this is disputed by multiple third parties who believe there was not reasonable evidence to determine the existence of a vulnerability."
}, },
{ {
"lang": "es", "lang": "es",

View File

@ -2,12 +2,12 @@
"id": "CVE-2024-29445", "id": "CVE-2024-29445",
"sourceIdentifier": "cve@mitre.org", "sourceIdentifier": "cve@mitre.org",
"published": "2024-04-10T23:15:06.857", "published": "2024-04-10T23:15:06.857",
"lastModified": "2024-04-11T12:47:44.137", "lastModified": "2024-04-17T01:15:07.333",
"vulnStatus": "Awaiting Analysis", "vulnStatus": "Awaiting Analysis",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
"value": "An issue was discovered in ROS2 (Robot Operating System 2) Humble Hawksbill in ROS_VERSION 2 and ROS_PYTHON_VERSION 3 where the system transmits messages in plaintext, allowing attackers to access sensitive information via a man-in-the-middle attack." "value": "An issue was discovered in ROS2 (Robot Operating System 2) Humble Hawksbill in ROS_VERSION 2 and ROS_PYTHON_VERSION 3 where the system transmits messages in plaintext, allowing attackers to access sensitive information via a man-in-the-middle attack. NOTE: this is disputed by multiple third parties who believe there was not reasonable evidence to determine the existence of a vulnerability."
}, },
{ {
"lang": "es", "lang": "es",

View File

@ -2,12 +2,12 @@
"id": "CVE-2024-29447", "id": "CVE-2024-29447",
"sourceIdentifier": "cve@mitre.org", "sourceIdentifier": "cve@mitre.org",
"published": "2024-04-11T00:15:07.337", "published": "2024-04-11T00:15:07.337",
"lastModified": "2024-04-11T12:47:44.137", "lastModified": "2024-04-17T01:15:07.387",
"vulnStatus": "Awaiting Analysis", "vulnStatus": "Awaiting Analysis",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
"value": "An issue was discovered in the default configurations of ROS2 Humble Hawksbill in ROS2 Humble Hawksbill in ROS_VERSION 2 and ROS_PYTHON_VERSION 3, allows unauthenticated attackers to gain access using default credentials." "value": "An issue was discovered in the default configurations of ROS2 Humble Hawksbill in ROS2 Humble Hawksbill in ROS_VERSION 2 and ROS_PYTHON_VERSION 3, allows unauthenticated attackers to gain access using default credentials. NOTE: this is disputed by multiple third parties who believe there was not reasonable evidence to determine the existence of a vulnerability."
}, },
{ {
"lang": "es", "lang": "es",

View File

@ -2,12 +2,12 @@
"id": "CVE-2024-29448", "id": "CVE-2024-29448",
"sourceIdentifier": "cve@mitre.org", "sourceIdentifier": "cve@mitre.org",
"published": "2024-04-11T04:15:08.510", "published": "2024-04-11T04:15:08.510",
"lastModified": "2024-04-11T12:47:44.137", "lastModified": "2024-04-17T01:15:07.443",
"vulnStatus": "Awaiting Analysis", "vulnStatus": "Awaiting Analysis",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
"value": "A buffer overflow vulnerability has been discovered in the C++ components of ROS2 Humble Hawksbill in ROS_VERSION 2 and ROS_PYTHON_VERSION 3, allows attackers to execute arbitrary code or cause a denial of service (DoS) via improper handling of arrays or strings." "value": "A buffer overflow vulnerability has been discovered in the C++ components of ROS2 Humble Hawksbill in ROS_VERSION 2 and ROS_PYTHON_VERSION 3, allows attackers to execute arbitrary code or cause a denial of service (DoS) via improper handling of arrays or strings. NOTE: this is disputed by multiple third parties who believe there was not reasonable evidence to determine the existence of a vulnerability."
}, },
{ {
"lang": "es", "lang": "es",

View File

@ -2,12 +2,12 @@
"id": "CVE-2024-29449", "id": "CVE-2024-29449",
"sourceIdentifier": "cve@mitre.org", "sourceIdentifier": "cve@mitre.org",
"published": "2024-04-11T04:15:08.630", "published": "2024-04-11T04:15:08.630",
"lastModified": "2024-04-11T12:47:44.137", "lastModified": "2024-04-17T01:15:07.510",
"vulnStatus": "Awaiting Analysis", "vulnStatus": "Awaiting Analysis",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
"value": "An issue was discovered in ROS2 Humble Hawksbill in ROS_VERSION 2 and ROS_PYTHON_VERSION 3, allows attackers to obtain sensitive information via man-in-the-middle attacks due to cleartext transmission of data across the ROS2 nodes' communication channels." "value": "An issue was discovered in ROS2 Humble Hawksbill in ROS_VERSION 2 and ROS_PYTHON_VERSION 3, allows attackers to obtain sensitive information via man-in-the-middle attacks due to cleartext transmission of data across the ROS2 nodes' communication channels. NOTE: this is disputed by multiple third parties who believe there was not reasonable evidence to determine the existence of a vulnerability."
}, },
{ {
"lang": "es", "lang": "es",

View File

@ -2,12 +2,12 @@
"id": "CVE-2024-29450", "id": "CVE-2024-29450",
"sourceIdentifier": "cve@mitre.org", "sourceIdentifier": "cve@mitre.org",
"published": "2024-04-11T04:15:08.687", "published": "2024-04-11T04:15:08.687",
"lastModified": "2024-04-11T12:47:44.137", "lastModified": "2024-04-17T01:15:07.560",
"vulnStatus": "Awaiting Analysis", "vulnStatus": "Awaiting Analysis",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
"value": "An issue has been discovered in the permission and access control components within ROS2 Humble Hawksbill, in ROS_VERSION 2 and ROS_PYTHON_VERSION 3, allows attackers to execute arbitrary code, cause a denial of service (DoS), escalate privileges, and obtain sensitive information via the authentication system, including protocols, processes, and checks designed to verify the identities of users or devices attempting to access the ROS2 system." "value": "An issue has been discovered in the permission and access control components within ROS2 Humble Hawksbill, in ROS_VERSION 2 and ROS_PYTHON_VERSION 3, allows attackers to execute arbitrary code, cause a denial of service (DoS), escalate privileges, and obtain sensitive information via the authentication system, including protocols, processes, and checks designed to verify the identities of users or devices attempting to access the ROS2 system. NOTE: this is disputed by multiple third parties who believe there was not reasonable evidence to determine the existence of a vulnerability."
}, },
{ {
"lang": "es", "lang": "es",

View File

@ -2,12 +2,12 @@
"id": "CVE-2024-29452", "id": "CVE-2024-29452",
"sourceIdentifier": "cve@mitre.org", "sourceIdentifier": "cve@mitre.org",
"published": "2024-04-11T02:15:46.917", "published": "2024-04-11T02:15:46.917",
"lastModified": "2024-04-11T12:47:44.137", "lastModified": "2024-04-17T01:15:07.617",
"vulnStatus": "Awaiting Analysis", "vulnStatus": "Awaiting Analysis",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
"value": "An insecure deserialization vulnerability has been identified in ROS2 Humble Hawksbill in ROS_VERSION 2 and ROS_PYTHON_VERSION 3, allows attackers to execute arbitrary code and obtain sensitive information via crafted input to the Data Serialization and Deserialization Components, Inter-Process Communication Mechanisms, and Network Communication Interfaces." "value": "An insecure deserialization vulnerability has been identified in ROS2 Humble Hawksbill in ROS_VERSION 2 and ROS_PYTHON_VERSION 3, allows attackers to execute arbitrary code and obtain sensitive information via crafted input to the Data Serialization and Deserialization Components, Inter-Process Communication Mechanisms, and Network Communication Interfaces. NOTE: this is disputed by multiple third parties who believe there was not reasonable evidence to determine the existence of a vulnerability."
}, },
{ {
"lang": "es", "lang": "es",

View File

@ -2,12 +2,12 @@
"id": "CVE-2024-29454", "id": "CVE-2024-29454",
"sourceIdentifier": "cve@mitre.org", "sourceIdentifier": "cve@mitre.org",
"published": "2024-04-11T20:15:35.767", "published": "2024-04-11T20:15:35.767",
"lastModified": "2024-04-12T12:43:57.400", "lastModified": "2024-04-17T01:15:07.677",
"vulnStatus": "Awaiting Analysis", "vulnStatus": "Awaiting Analysis",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
"value": "An issue discovered in packages or nodes in ROS2 Humble Hawksbill with ROS_VERSION=2 and ROS_PYTHON_VERSION=3 allows attackers to execute arbitrary commands potentially leading to unauthorized system control, data breaches, system and network compromise, and operational disruption." "value": "An issue discovered in packages or nodes in ROS2 Humble Hawksbill with ROS_VERSION=2 and ROS_PYTHON_VERSION=3 allows attackers to execute arbitrary commands potentially leading to unauthorized system control, data breaches, system and network compromise, and operational disruption. NOTE: this is disputed by multiple third parties who believe there was not reasonable evidence to determine the existence of a vulnerability."
}, },
{ {
"lang": "es", "lang": "es",

View File

@ -2,12 +2,12 @@
"id": "CVE-2024-29455", "id": "CVE-2024-29455",
"sourceIdentifier": "cve@mitre.org", "sourceIdentifier": "cve@mitre.org",
"published": "2024-04-11T05:15:47.477", "published": "2024-04-11T05:15:47.477",
"lastModified": "2024-04-11T12:47:44.137", "lastModified": "2024-04-17T01:15:07.730",
"vulnStatus": "Awaiting Analysis", "vulnStatus": "Awaiting Analysis",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
"value": "An arbitrary file upload vulnerability has been discovered in ROS2 Humble Hawksbill in ROS_VERSION 2 and ROS_PYTHON_VERSION 3, allows attackers to execute arbitrary code, cause a denial of service (DoS), and obtain sensitive information via crafted payload to the file upload mechanism of the ROS2 system, including the server\u2019s functionality for handling file uploads and the associated validation processes." "value": "An arbitrary file upload vulnerability has been discovered in ROS2 Humble Hawksbill in ROS_VERSION 2 and ROS_PYTHON_VERSION 3, allows attackers to execute arbitrary code, cause a denial of service (DoS), and obtain sensitive information via crafted payload to the file upload mechanism of the ROS2 system, including the server\u2019s functionality for handling file uploads and the associated validation processes. NOTE: this is disputed by multiple third parties who believe there was not reasonable evidence to determine the existence of a vulnerability."
}, },
{ {
"lang": "es", "lang": "es",

View File

@ -2,12 +2,12 @@
"id": "CVE-2024-30659", "id": "CVE-2024-30659",
"sourceIdentifier": "cve@mitre.org", "sourceIdentifier": "cve@mitre.org",
"published": "2024-04-08T07:15:09.143", "published": "2024-04-08T07:15:09.143",
"lastModified": "2024-04-08T18:48:40.217", "lastModified": "2024-04-17T01:15:07.787",
"vulnStatus": "Awaiting Analysis", "vulnStatus": "Awaiting Analysis",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
"value": "Shell Injection vulnerability in ROS (Robot Operating System) Melodic Morenia versions ROS_VERSION 1 and ROS_PYTHON_VERSION 3, allows attackers to execute arbitrary code, escalate privileges, and obtain sensitive information." "value": "Shell Injection vulnerability in ROS (Robot Operating System) Melodic Morenia versions ROS_VERSION 1 and ROS_PYTHON_VERSION 3, allows attackers to execute arbitrary code, escalate privileges, and obtain sensitive information. NOTE: this is disputed by multiple third parties who believe there was not reasonable evidence to determine the existence of a vulnerability."
}, },
{ {
"lang": "es", "lang": "es",

View File

@ -2,12 +2,12 @@
"id": "CVE-2024-30661", "id": "CVE-2024-30661",
"sourceIdentifier": "cve@mitre.org", "sourceIdentifier": "cve@mitre.org",
"published": "2024-04-08T07:15:09.370", "published": "2024-04-08T07:15:09.370",
"lastModified": "2024-04-08T18:48:40.217", "lastModified": "2024-04-17T01:15:07.847",
"vulnStatus": "Awaiting Analysis", "vulnStatus": "Awaiting Analysis",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
"value": "An unauthorized access vulnerability has been discovered in ROS Melodic Morenia versions where ROS_VERSION is 1 and ROS_PYTHON_VERSION is 3. This vulnerability could potentially allow a malicious user to gain unauthorized information access to multiple ROS nodes remotely. Unauthorized information access to these nodes could result in compromised system integrity, the execution of arbitrary commands, and disclosure of sensitive information." "value": "An unauthorized access vulnerability has been discovered in ROS Melodic Morenia versions where ROS_VERSION is 1 and ROS_PYTHON_VERSION is 3. This vulnerability could potentially allow a malicious user to gain unauthorized information access to multiple ROS nodes remotely. Unauthorized information access to these nodes could result in compromised system integrity, the execution of arbitrary commands, and disclosure of sensitive information. NOTE: this is disputed by multiple third parties who believe there was not reasonable evidence to determine the existence of a vulnerability."
}, },
{ {
"lang": "es", "lang": "es",

View File

@ -2,12 +2,12 @@
"id": "CVE-2024-30662", "id": "CVE-2024-30662",
"sourceIdentifier": "cve@mitre.org", "sourceIdentifier": "cve@mitre.org",
"published": "2024-04-08T07:15:09.493", "published": "2024-04-08T07:15:09.493",
"lastModified": "2024-04-08T18:48:40.217", "lastModified": "2024-04-17T01:15:07.907",
"vulnStatus": "Awaiting Analysis", "vulnStatus": "Awaiting Analysis",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
"value": "An issue was discovered in ROS (Robot Operating System) Melodic Morenia in ROS_VERSION 1 and ROS_PYTHON_VERSION 3, where the system transmits messages in plaintext. This flaw exposes sensitive information, making it vulnerable to man-in-the-middle (MitM) attacks, and allowing attackers to easily intercept and access this data." "value": "An issue was discovered in ROS (Robot Operating System) Melodic Morenia in ROS_VERSION 1 and ROS_PYTHON_VERSION 3, where the system transmits messages in plaintext. This flaw exposes sensitive information, making it vulnerable to man-in-the-middle (MitM) attacks, and allowing attackers to easily intercept and access this data. NOTE: this is disputed by multiple third parties who believe there was not reasonable evidence to determine the existence of a vulnerability."
}, },
{ {
"lang": "es", "lang": "es",

View File

@ -2,12 +2,12 @@
"id": "CVE-2024-30663", "id": "CVE-2024-30663",
"sourceIdentifier": "cve@mitre.org", "sourceIdentifier": "cve@mitre.org",
"published": "2024-04-08T07:15:09.570", "published": "2024-04-08T07:15:09.570",
"lastModified": "2024-04-08T18:48:40.217", "lastModified": "2024-04-17T01:15:07.960",
"vulnStatus": "Awaiting Analysis", "vulnStatus": "Awaiting Analysis",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
"value": "An issue was discovered in the default configurations of ROS (Robot Operating System) Melodic Morenia in ROS_VERSION 1 and ROS_PYTHON_VERSION 3. This vulnerability allows unauthenticated attackers to gain access using default credentials, posing a serious threat to the integrity and security of the system." "value": "An issue was discovered in the default configurations of ROS (Robot Operating System) Melodic Morenia in ROS_VERSION 1 and ROS_PYTHON_VERSION 3. This vulnerability allows unauthenticated attackers to gain access using default credentials, posing a serious threat to the integrity and security of the system. NOTE: this is disputed by multiple third parties who believe there was not reasonable evidence to determine the existence of a vulnerability."
}, },
{ {
"lang": "es", "lang": "es",

View File

@ -2,12 +2,12 @@
"id": "CVE-2024-30665", "id": "CVE-2024-30665",
"sourceIdentifier": "cve@mitre.org", "sourceIdentifier": "cve@mitre.org",
"published": "2024-04-08T07:15:09.643", "published": "2024-04-08T07:15:09.643",
"lastModified": "2024-04-08T18:48:40.217", "lastModified": "2024-04-17T01:15:08.010",
"vulnStatus": "Awaiting Analysis", "vulnStatus": "Awaiting Analysis",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
"value": "An OS command injection vulnerability has been discovered in ROS (Robot Operating System) Melodic Morenia in ROS_VERSION 1 and ROS_PYTHON_VERSION 3. This vulnerability primarily affects the command processing or system call components in ROS, making them susceptible to manipulation by malicious entities. Through this, unauthorized commands can be executed, leading to remote code execution (RCE), data theft, and malicious activities. The affected components include External Command Execution Modules, System Call Handlers, and Interface Scripts." "value": "An OS command injection vulnerability has been discovered in ROS (Robot Operating System) Melodic Morenia in ROS_VERSION 1 and ROS_PYTHON_VERSION 3. This vulnerability primarily affects the command processing or system call components in ROS, making them susceptible to manipulation by malicious entities. Through this, unauthorized commands can be executed, leading to remote code execution (RCE), data theft, and malicious activities. The affected components include External Command Execution Modules, System Call Handlers, and Interface Scripts. NOTE: this is disputed by multiple third parties who believe there was not reasonable evidence to determine the existence of a vulnerability."
}, },
{ {
"lang": "es", "lang": "es",

View File

@ -2,12 +2,12 @@
"id": "CVE-2024-30666", "id": "CVE-2024-30666",
"sourceIdentifier": "cve@mitre.org", "sourceIdentifier": "cve@mitre.org",
"published": "2024-04-08T07:15:09.713", "published": "2024-04-08T07:15:09.713",
"lastModified": "2024-04-08T18:48:40.217", "lastModified": "2024-04-17T01:15:08.063",
"vulnStatus": "Awaiting Analysis", "vulnStatus": "Awaiting Analysis",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
"value": "A buffer overflow vulnerability has been discovered in the C++ components of ROS (Robot Operating System) Melodic Morenia in ROS_VERSION 1 and ROS_PYTHON_VERSION 3, allows attackers to execute arbitrary code via improper handling of arrays or strings within these components." "value": "A buffer overflow vulnerability has been discovered in the C++ components of ROS (Robot Operating System) Melodic Morenia in ROS_VERSION 1 and ROS_PYTHON_VERSION 3, allows attackers to execute arbitrary code via improper handling of arrays or strings within these components. NOTE: this is disputed by multiple third parties who believe there was not reasonable evidence to determine the existence of a vulnerability."
}, },
{ {
"lang": "es", "lang": "es",

View File

@ -2,12 +2,12 @@
"id": "CVE-2024-30667", "id": "CVE-2024-30667",
"sourceIdentifier": "cve@mitre.org", "sourceIdentifier": "cve@mitre.org",
"published": "2024-04-08T08:15:11.390", "published": "2024-04-08T08:15:11.390",
"lastModified": "2024-04-08T18:48:40.217", "lastModified": "2024-04-17T01:15:08.117",
"vulnStatus": "Awaiting Analysis", "vulnStatus": "Awaiting Analysis",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
"value": "Insecure deserialization vulnerability in ROS (Robot Operating System) Melodic Morenia in ROS_VERSION 1 and ROS_PYTHON_VERSION 3, allows attackers to execute arbitrary code or obtain sensitive information via crafted input to the data handling components." "value": "Insecure deserialization vulnerability in ROS (Robot Operating System) Melodic Morenia in ROS_VERSION 1 and ROS_PYTHON_VERSION 3, allows attackers to execute arbitrary code or obtain sensitive information via crafted input to the data handling components. NOTE: this is disputed by multiple third parties who believe there was not reasonable evidence to determine the existence of a vulnerability."
}, },
{ {
"lang": "es", "lang": "es",

View File

@ -2,12 +2,12 @@
"id": "CVE-2024-30672", "id": "CVE-2024-30672",
"sourceIdentifier": "cve@mitre.org", "sourceIdentifier": "cve@mitre.org",
"published": "2024-04-08T08:15:11.517", "published": "2024-04-08T08:15:11.517",
"lastModified": "2024-04-08T18:48:40.217", "lastModified": "2024-04-17T01:15:08.170",
"vulnStatus": "Awaiting Analysis", "vulnStatus": "Awaiting Analysis",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
"value": "Arbitrary file upload vulnerability in ROS (Robot Operating System) Melodic Morenia in ROS_VERSION 1 and ROS_PYTHON_VERSION 3, allows attackers to execute arbitrary code, cause a denial of service (DoS), and obtain sensitive information via the file upload component." "value": "Arbitrary file upload vulnerability in ROS (Robot Operating System) Melodic Morenia in ROS_VERSION 1 and ROS_PYTHON_VERSION 3, allows attackers to execute arbitrary code, cause a denial of service (DoS), and obtain sensitive information via the file upload component. NOTE: this is disputed by multiple third parties who believe there was not reasonable evidence to determine the existence of a vulnerability."
}, },
{ {
"lang": "es", "lang": "es",

View File

@ -2,12 +2,12 @@
"id": "CVE-2024-30674", "id": "CVE-2024-30674",
"sourceIdentifier": "cve@mitre.org", "sourceIdentifier": "cve@mitre.org",
"published": "2024-04-08T08:15:11.570", "published": "2024-04-08T08:15:11.570",
"lastModified": "2024-04-08T18:48:40.217", "lastModified": "2024-04-17T01:15:08.223",
"vulnStatus": "Awaiting Analysis", "vulnStatus": "Awaiting Analysis",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
"value": "Unauthorized access vulnerability in ROS2 Iron Irwini in ROS_VERSION is 2 and ROS_PYTHON_VERSION is 3, allows remote attackers to gain control of multiple ROS2 nodes. Unauthorized information access to these nodes could result in compromised system integrity, the execution of arbitrary commands, and disclosure of sensitive information." "value": "Unauthorized access vulnerability in ROS2 Iron Irwini in ROS_VERSION is 2 and ROS_PYTHON_VERSION is 3, allows remote attackers to gain control of multiple ROS2 nodes. Unauthorized information access to these nodes could result in compromised system integrity, the execution of arbitrary commands, and disclosure of sensitive information. NOTE: this is disputed by multiple third parties who believe there was not reasonable evidence to determine the existence of a vulnerability."
}, },
{ {
"lang": "es", "lang": "es",

View File

@ -2,12 +2,12 @@
"id": "CVE-2024-30675", "id": "CVE-2024-30675",
"sourceIdentifier": "cve@mitre.org", "sourceIdentifier": "cve@mitre.org",
"published": "2024-04-08T08:15:11.627", "published": "2024-04-08T08:15:11.627",
"lastModified": "2024-04-08T18:48:40.217", "lastModified": "2024-04-17T01:15:08.283",
"vulnStatus": "Awaiting Analysis", "vulnStatus": "Awaiting Analysis",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
"value": "Unauthorized node injection vulnerability in ROS2 Iron Irwini in ROS_VERSION 2 and ROS_PYTHON_VERSION 3. This vulnerability could allow a malicious user to escalate privileges by injecting malicious ROS2 nodes into the system remotely." "value": "Unauthorized node injection vulnerability in ROS2 Iron Irwini in ROS_VERSION 2 and ROS_PYTHON_VERSION 3. This vulnerability could allow a malicious user to escalate privileges by injecting malicious ROS2 nodes into the system remotely. NOTE: this is disputed by multiple third parties who believe there was not reasonable evidence to determine the existence of a vulnerability."
}, },
{ {
"lang": "es", "lang": "es",

View File

@ -2,12 +2,12 @@
"id": "CVE-2024-30676", "id": "CVE-2024-30676",
"sourceIdentifier": "cve@mitre.org", "sourceIdentifier": "cve@mitre.org",
"published": "2024-04-09T03:15:07.763", "published": "2024-04-09T03:15:07.763",
"lastModified": "2024-04-09T12:48:04.090", "lastModified": "2024-04-17T01:15:08.337",
"vulnStatus": "Awaiting Analysis", "vulnStatus": "Awaiting Analysis",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
"value": "A Denial-of-Service (DoS) vulnerability exists in ROS2 Iron Irwini versions where ROS_VERSION is 2 and ROS_PYTHON_VERSION is 3. A malicious user could potentially exploit this vulnerability remotely to crash the ROS2 nodes, thereby causing a denial of service. The flaw allows an attacker to cause unexpected behavior in the operation of ROS2 nodes, which leads to their failure and interrupts the regular operation of the system, thus making it unavailable for its intended users." "value": "A Denial-of-Service (DoS) vulnerability exists in ROS2 Iron Irwini versions where ROS_VERSION is 2 and ROS_PYTHON_VERSION is 3. A malicious user could potentially exploit this vulnerability remotely to crash the ROS2 nodes, thereby causing a denial of service. The flaw allows an attacker to cause unexpected behavior in the operation of ROS2 nodes, which leads to their failure and interrupts the regular operation of the system, thus making it unavailable for its intended users. NOTE: this is disputed by multiple third parties who believe there was not reasonable evidence to determine the existence of a vulnerability."
}, },
{ {
"lang": "es", "lang": "es",

View File

@ -2,12 +2,12 @@
"id": "CVE-2024-30678", "id": "CVE-2024-30678",
"sourceIdentifier": "cve@mitre.org", "sourceIdentifier": "cve@mitre.org",
"published": "2024-04-09T03:15:07.830", "published": "2024-04-09T03:15:07.830",
"lastModified": "2024-04-09T12:48:04.090", "lastModified": "2024-04-17T01:15:08.427",
"vulnStatus": "Awaiting Analysis", "vulnStatus": "Awaiting Analysis",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
"value": "An issue has been discovered in ROS2 Iron Irwini ROS_VERSION 2 and ROS_PYTHON_VERSION 3, where the system transmits messages in plaintext. This flaw exposes sensitive information, making it vulnerable to man-in-the-middle (MitM) attacks, and allowing attackers to intercept and access this data." "value": "An issue has been discovered in ROS2 Iron Irwini ROS_VERSION 2 and ROS_PYTHON_VERSION 3, where the system transmits messages in plaintext. This flaw exposes sensitive information, making it vulnerable to man-in-the-middle (MitM) attacks, and allowing attackers to intercept and access this data. NOTE: this is disputed by multiple third parties who believe there was not reasonable evidence to determine the existence of a vulnerability."
}, },
{ {
"lang": "es", "lang": "es",

View File

@ -2,12 +2,12 @@
"id": "CVE-2024-30679", "id": "CVE-2024-30679",
"sourceIdentifier": "cve@mitre.org", "sourceIdentifier": "cve@mitre.org",
"published": "2024-04-09T04:15:10.087", "published": "2024-04-09T04:15:10.087",
"lastModified": "2024-04-09T12:48:04.090", "lastModified": "2024-04-17T01:15:08.510",
"vulnStatus": "Awaiting Analysis", "vulnStatus": "Awaiting Analysis",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
"value": "An issue was discovered in the default configurations of ROS2 Iron Irwini ROS_VERSION 2 and ROS_PYTHON_VERSION 3, allows unauthenticated attackers to authenticate using default credentials." "value": "An issue was discovered in the default configurations of ROS2 Iron Irwini ROS_VERSION 2 and ROS_PYTHON_VERSION 3, allows unauthenticated attackers to authenticate using default credentials. NOTE: this is disputed by multiple third parties who believe there was not reasonable evidence to determine the existence of a vulnerability."
}, },
{ {
"lang": "es", "lang": "es",

View File

@ -2,12 +2,12 @@
"id": "CVE-2024-30680", "id": "CVE-2024-30680",
"sourceIdentifier": "cve@mitre.org", "sourceIdentifier": "cve@mitre.org",
"published": "2024-04-09T04:15:10.583", "published": "2024-04-09T04:15:10.583",
"lastModified": "2024-04-09T12:48:04.090", "lastModified": "2024-04-17T01:15:08.577",
"vulnStatus": "Awaiting Analysis", "vulnStatus": "Awaiting Analysis",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
"value": "Shell injection vulnerability was discovered in ROS2 (Robot Operating System 2) Iron Irwini in versions ROS_VERSION 2 and ROS_PYTHON_VERSION 3, allows attackers to execute arbitrary code escalate privileges, and obtain sensitive information due to the way ROS2 handles shell command execution in components like command interpreters or interfaces that process external inputs." "value": "Shell injection vulnerability was discovered in ROS2 (Robot Operating System 2) Iron Irwini in versions ROS_VERSION 2 and ROS_PYTHON_VERSION 3, allows attackers to execute arbitrary code escalate privileges, and obtain sensitive information due to the way ROS2 handles shell command execution in components like command interpreters or interfaces that process external inputs. NOTE: this is disputed by multiple third parties who believe there was not reasonable evidence to determine the existence of a vulnerability."
}, },
{ {
"lang": "es", "lang": "es",

View File

@ -2,12 +2,12 @@
"id": "CVE-2024-30681", "id": "CVE-2024-30681",
"sourceIdentifier": "cve@mitre.org", "sourceIdentifier": "cve@mitre.org",
"published": "2024-04-09T04:15:10.747", "published": "2024-04-09T04:15:10.747",
"lastModified": "2024-04-09T12:48:04.090", "lastModified": "2024-04-17T01:15:08.633",
"vulnStatus": "Awaiting Analysis", "vulnStatus": "Awaiting Analysis",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
"value": "An OS command injection vulnerability has been discovered in ROS2 Iron Irwini version ROS_VERSION 2 and ROS_PYTHON_VERSION 3, allows attackers to execute arbitrary code, escalate privileges, and obtain sensitive information via the command processing or system call components in ROS2." "value": "An OS command injection vulnerability has been discovered in ROS2 Iron Irwini version ROS_VERSION 2 and ROS_PYTHON_VERSION 3, allows attackers to execute arbitrary code, escalate privileges, and obtain sensitive information via the command processing or system call components in ROS2. NOTE: this is disputed by multiple third parties who believe there was not reasonable evidence to determine the existence of a vulnerability."
}, },
{ {
"lang": "es", "lang": "es",

View File

@ -2,12 +2,12 @@
"id": "CVE-2024-30683", "id": "CVE-2024-30683",
"sourceIdentifier": "cve@mitre.org", "sourceIdentifier": "cve@mitre.org",
"published": "2024-04-09T04:15:10.877", "published": "2024-04-09T04:15:10.877",
"lastModified": "2024-04-09T12:48:04.090", "lastModified": "2024-04-17T01:15:08.690",
"vulnStatus": "Awaiting Analysis", "vulnStatus": "Awaiting Analysis",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
"value": "A buffer overflow vulnerability has been discovered in the C++ components of ROS2 Iron Irwini versions ROS_VERSION 2 and ROS_PYTHON_VERSION 3, allows attackers to execute arbitrary code or cause a Denial of Service (DoS) via improper handling of arrays or strings." "value": "A buffer overflow vulnerability has been discovered in the C++ components of ROS2 Iron Irwini versions ROS_VERSION 2 and ROS_PYTHON_VERSION 3, allows attackers to execute arbitrary code or cause a Denial of Service (DoS) via improper handling of arrays or strings. NOTE: this is disputed by multiple third parties who believe there was not reasonable evidence to determine the existence of a vulnerability."
}, },
{ {
"lang": "es", "lang": "es",

View File

@ -2,12 +2,12 @@
"id": "CVE-2024-30684", "id": "CVE-2024-30684",
"sourceIdentifier": "cve@mitre.org", "sourceIdentifier": "cve@mitre.org",
"published": "2024-04-09T05:15:47.807", "published": "2024-04-09T05:15:47.807",
"lastModified": "2024-04-09T12:48:04.090", "lastModified": "2024-04-17T01:15:08.750",
"vulnStatus": "Awaiting Analysis", "vulnStatus": "Awaiting Analysis",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
"value": "An insecure logging vulnerability has been identified within ROS2 Iron Irwini versions ROS_VERSION 2 and ROS_PYTHON_VERSION 3, allows attackers to access sensitive information via inadequate security measures implemented within the logging mechanisms of ROS2." "value": "An insecure logging vulnerability has been identified within ROS2 Iron Irwini versions ROS_VERSION 2 and ROS_PYTHON_VERSION 3, allows attackers to access sensitive information via inadequate security measures implemented within the logging mechanisms of ROS2. NOTE: this is disputed by multiple third parties who believe there was not reasonable evidence to determine the existence of a vulnerability."
}, },
{ {
"lang": "es", "lang": "es",

View File

@ -2,12 +2,12 @@
"id": "CVE-2024-30686", "id": "CVE-2024-30686",
"sourceIdentifier": "cve@mitre.org", "sourceIdentifier": "cve@mitre.org",
"published": "2024-04-09T05:15:47.853", "published": "2024-04-09T05:15:47.853",
"lastModified": "2024-04-09T12:48:04.090", "lastModified": "2024-04-17T01:15:08.813",
"vulnStatus": "Awaiting Analysis", "vulnStatus": "Awaiting Analysis",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
"value": "An issue was discovered in ROS2 Iron Irwini versions ROS_VERSION 2 and ROS_PYTHON_VERSION 3, allows remote attackers to execute arbitrary code via packages or nodes within the ROS2 system." "value": "An issue was discovered in ROS2 Iron Irwini versions ROS_VERSION 2 and ROS_PYTHON_VERSION 3, allows remote attackers to execute arbitrary code via packages or nodes within the ROS2 system. NOTE: this is disputed by multiple third parties who believe there was not reasonable evidence to determine the existence of a vulnerability."
}, },
{ {
"lang": "es", "lang": "es",

View File

@ -2,12 +2,12 @@
"id": "CVE-2024-30687", "id": "CVE-2024-30687",
"sourceIdentifier": "cve@mitre.org", "sourceIdentifier": "cve@mitre.org",
"published": "2024-04-09T05:15:47.920", "published": "2024-04-09T05:15:47.920",
"lastModified": "2024-04-09T12:48:04.090", "lastModified": "2024-04-17T01:15:08.873",
"vulnStatus": "Awaiting Analysis", "vulnStatus": "Awaiting Analysis",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
"value": "An insecure deserialization vulnerability has been identified in ROS2 Iron Irwini versions ROS_VERSION 2 and ROS_PYTHON_VERSION 3, allows attackers to execute arbitrary code via a crafted input to the Data Serialization and Deserialization Components, Inter-Process Communication Mechanisms, and Network Communication Interfaces." "value": "An insecure deserialization vulnerability has been identified in ROS2 Iron Irwini versions ROS_VERSION 2 and ROS_PYTHON_VERSION 3, allows attackers to execute arbitrary code via a crafted input to the Data Serialization and Deserialization Components, Inter-Process Communication Mechanisms, and Network Communication Interfaces. NOTE: this is disputed by multiple third parties who believe there was not reasonable evidence to determine the existence of a vulnerability."
}, },
{ {
"lang": "es", "lang": "es",

View File

@ -2,12 +2,12 @@
"id": "CVE-2024-30688", "id": "CVE-2024-30688",
"sourceIdentifier": "cve@mitre.org", "sourceIdentifier": "cve@mitre.org",
"published": "2024-04-09T05:15:47.980", "published": "2024-04-09T05:15:47.980",
"lastModified": "2024-04-09T12:48:04.090", "lastModified": "2024-04-17T01:15:08.927",
"vulnStatus": "Awaiting Analysis", "vulnStatus": "Awaiting Analysis",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
"value": "An arbitrary file upload vulnerability has been discovered in ROS2 Iron Irwini versions ROS_VERSION 2 and ROS_PYTHON_VERSION 3, allows attackers to execute arbitrary code via a crafted payload to the file upload mechanism of the ROS2 system, including the server\u2019s functionality for handling file uploads and the associated validation processes." "value": "An arbitrary file upload vulnerability has been discovered in ROS2 Iron Irwini versions ROS_VERSION 2 and ROS_PYTHON_VERSION 3, allows attackers to execute arbitrary code via a crafted payload to the file upload mechanism of the ROS2 system, including the server\u2019s functionality for handling file uploads and the associated validation processes. NOTE: this is disputed by multiple third parties who believe there was not reasonable evidence to determine the existence of a vulnerability."
}, },
{ {
"lang": "es", "lang": "es",

View File

@ -2,12 +2,12 @@
"id": "CVE-2024-30690", "id": "CVE-2024-30690",
"sourceIdentifier": "cve@mitre.org", "sourceIdentifier": "cve@mitre.org",
"published": "2024-04-09T06:15:08.963", "published": "2024-04-09T06:15:08.963",
"lastModified": "2024-04-09T12:48:04.090", "lastModified": "2024-04-17T01:15:08.980",
"vulnStatus": "Awaiting Analysis", "vulnStatus": "Awaiting Analysis",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
"value": "An unauthorized node injection vulnerability has been identified in ROS2 Galactic Geochelone versions where ROS_VERSION is 2 and ROS_PYTHON_VERSION is 3, allows remote attackers to escalate privileges." "value": "An unauthorized node injection vulnerability has been identified in ROS2 Galactic Geochelone versions where ROS_VERSION is 2 and ROS_PYTHON_VERSION is 3, allows remote attackers to escalate privileges. NOTE: this is disputed by multiple third parties who believe there was not reasonable evidence to determine the existence of a vulnerability."
}, },
{ {
"lang": "es", "lang": "es",

View File

@ -2,12 +2,12 @@
"id": "CVE-2024-30691", "id": "CVE-2024-30691",
"sourceIdentifier": "cve@mitre.org", "sourceIdentifier": "cve@mitre.org",
"published": "2024-04-09T07:15:08.467", "published": "2024-04-09T07:15:08.467",
"lastModified": "2024-04-09T12:48:04.090", "lastModified": "2024-04-17T01:15:09.033",
"vulnStatus": "Awaiting Analysis", "vulnStatus": "Awaiting Analysis",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
"value": "An issue was discovered in ROS2 Galactic Geochelone in version ROS_VERSION 2 and ROS_PYTHON_VERSION 3, allows remote attackers to execute arbitrary code, escalate privileges, obtain sensitive information, and gain unauthorized access to multiple ROS2 nodes." "value": "An issue was discovered in ROS2 Galactic Geochelone in version ROS_VERSION 2 and ROS_PYTHON_VERSION 3, allows remote attackers to execute arbitrary code, escalate privileges, obtain sensitive information, and gain unauthorized access to multiple ROS2 nodes. NOTE: this is disputed by multiple third parties who believe there was not reasonable evidence to determine the existence of a vulnerability."
}, },
{ {
"lang": "es", "lang": "es",

View File

@ -2,12 +2,12 @@
"id": "CVE-2024-30692", "id": "CVE-2024-30692",
"sourceIdentifier": "cve@mitre.org", "sourceIdentifier": "cve@mitre.org",
"published": "2024-04-09T07:15:08.560", "published": "2024-04-09T07:15:08.560",
"lastModified": "2024-04-09T12:48:04.090", "lastModified": "2024-04-17T01:15:09.100",
"vulnStatus": "Awaiting Analysis", "vulnStatus": "Awaiting Analysis",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
"value": "A issue was discovered in ROS2 Galactic Geochelone versions ROS_VERSION 2 and ROS_PYTHON_VERSION 3, allows remote attackers to cause a denial of service (DoS) in the ROS2 nodes." "value": "A issue was discovered in ROS2 Galactic Geochelone versions ROS_VERSION 2 and ROS_PYTHON_VERSION 3, allows remote attackers to cause a denial of service (DoS) in the ROS2 nodes. NOTE: this is disputed by multiple third parties who believe there was not reasonable evidence to determine the existence of a vulnerability."
}, },
{ {
"lang": "es", "lang": "es",

View File

@ -2,12 +2,12 @@
"id": "CVE-2024-30694", "id": "CVE-2024-30694",
"sourceIdentifier": "cve@mitre.org", "sourceIdentifier": "cve@mitre.org",
"published": "2024-04-09T08:15:07.420", "published": "2024-04-09T08:15:07.420",
"lastModified": "2024-04-09T12:48:04.090", "lastModified": "2024-04-17T01:15:09.160",
"vulnStatus": "Awaiting Analysis", "vulnStatus": "Awaiting Analysis",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
"value": "A shell injection vulnerability was discovered in ROS2 (Robot Operating System 2) Galactic Geochelone ROS_VERSION 2 and ROS_PYTHON_VERSION 3, allows attackers to execute arbitrary code, escalate privileges, and obtain sensitive information due to the way ROS2 handles shell command execution in components like command interpreters or interfaces that process external inputs." "value": "A shell injection vulnerability was discovered in ROS2 (Robot Operating System 2) Galactic Geochelone ROS_VERSION 2 and ROS_PYTHON_VERSION 3, allows attackers to execute arbitrary code, escalate privileges, and obtain sensitive information due to the way ROS2 handles shell command execution in components like command interpreters or interfaces that process external inputs. NOTE: this is disputed by multiple third parties who believe there was not reasonable evidence to determine the existence of a vulnerability."
} }
], ],
"metrics": {}, "metrics": {},

View File

@ -2,12 +2,12 @@
"id": "CVE-2024-30695", "id": "CVE-2024-30695",
"sourceIdentifier": "cve@mitre.org", "sourceIdentifier": "cve@mitre.org",
"published": "2024-04-09T08:15:07.530", "published": "2024-04-09T08:15:07.530",
"lastModified": "2024-04-09T12:48:04.090", "lastModified": "2024-04-17T01:15:09.217",
"vulnStatus": "Awaiting Analysis", "vulnStatus": "Awaiting Analysis",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
"value": "An issue was discovered in the default configurations of ROS2 Galactic Geochelone versions ROS_VERSION 2 and ROS_PYTHON_VERSION 3, allows unauthenticated attackers to gain access using default credentials." "value": "An issue was discovered in the default configurations of ROS2 Galactic Geochelone versions ROS_VERSION 2 and ROS_PYTHON_VERSION 3, allows unauthenticated attackers to gain access using default credentials. NOTE: this is disputed by multiple third parties who believe there was not reasonable evidence to determine the existence of a vulnerability."
} }
], ],
"metrics": {}, "metrics": {},

View File

@ -2,12 +2,12 @@
"id": "CVE-2024-30696", "id": "CVE-2024-30696",
"sourceIdentifier": "cve@mitre.org", "sourceIdentifier": "cve@mitre.org",
"published": "2024-04-09T08:15:07.587", "published": "2024-04-09T08:15:07.587",
"lastModified": "2024-04-09T12:48:04.090", "lastModified": "2024-04-17T01:15:09.273",
"vulnStatus": "Awaiting Analysis", "vulnStatus": "Awaiting Analysis",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
"value": "OS command injection vulnerability in ROS2 Galactic Geochelone in ROS_VERSION 2 and ROS_PYTHON_VERSION 3, allows remote attackers to execute arbitrary code, escalate privileges, and obtain sensitive information via the command processing or system call components in ROS2, including External Command Execution Modules, System Call Handlers, and Interface Scripts." "value": "OS command injection vulnerability in ROS2 Galactic Geochelone in ROS_VERSION 2 and ROS_PYTHON_VERSION 3, allows remote attackers to execute arbitrary code, escalate privileges, and obtain sensitive information via the command processing or system call components in ROS2, including External Command Execution Modules, System Call Handlers, and Interface Scripts. NOTE: this is disputed by multiple third parties who believe there was not reasonable evidence to determine the existence of a vulnerability."
} }
], ],
"metrics": {}, "metrics": {},

View File

@ -2,12 +2,12 @@
"id": "CVE-2024-30697", "id": "CVE-2024-30697",
"sourceIdentifier": "cve@mitre.org", "sourceIdentifier": "cve@mitre.org",
"published": "2024-04-09T08:15:07.663", "published": "2024-04-09T08:15:07.663",
"lastModified": "2024-04-09T12:48:04.090", "lastModified": "2024-04-17T01:15:09.330",
"vulnStatus": "Awaiting Analysis", "vulnStatus": "Awaiting Analysis",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
"value": "An issue was discovered in ROS2 Galactic Geochelone in ROS_VERSION 2 and ROS_PYTHON_VERSION 3, where the system transmits messages in plaintext, allowing attackers to access sensitive information via a man-in-the-middle attack." "value": "An issue was discovered in ROS2 Galactic Geochelone in ROS_VERSION 2 and ROS_PYTHON_VERSION 3, where the system transmits messages in plaintext, allowing attackers to access sensitive information via a man-in-the-middle attack. NOTE: this is disputed by multiple third parties who believe there was not reasonable evidence to determine the existence of a vulnerability."
} }
], ],
"metrics": {}, "metrics": {},

View File

@ -2,12 +2,12 @@
"id": "CVE-2024-30699", "id": "CVE-2024-30699",
"sourceIdentifier": "cve@mitre.org", "sourceIdentifier": "cve@mitre.org",
"published": "2024-04-09T08:15:07.717", "published": "2024-04-09T08:15:07.717",
"lastModified": "2024-04-09T12:48:04.090", "lastModified": "2024-04-17T01:15:09.387",
"vulnStatus": "Awaiting Analysis", "vulnStatus": "Awaiting Analysis",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
"value": "A buffer overflow vulnerability has been discovered in the C++ components of ROS2 Galactic Geochelone ROS_VERSION 2 and ROS_PYTHON_VERSION 3, allows attackers to execute arbitrary code or cause a denial of service (DoS) via improper handling of arrays or strings." "value": "A buffer overflow vulnerability has been discovered in the C++ components of ROS2 Galactic Geochelone ROS_VERSION 2 and ROS_PYTHON_VERSION 3, allows attackers to execute arbitrary code or cause a denial of service (DoS) via improper handling of arrays or strings. NOTE: this is disputed by multiple third parties who believe there was not reasonable evidence to determine the existence of a vulnerability."
} }
], ],
"metrics": {}, "metrics": {},

View File

@ -2,12 +2,12 @@
"id": "CVE-2024-30701", "id": "CVE-2024-30701",
"sourceIdentifier": "cve@mitre.org", "sourceIdentifier": "cve@mitre.org",
"published": "2024-04-09T08:15:07.770", "published": "2024-04-09T08:15:07.770",
"lastModified": "2024-04-09T12:48:04.090", "lastModified": "2024-04-17T01:15:09.447",
"vulnStatus": "Awaiting Analysis", "vulnStatus": "Awaiting Analysis",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
"value": "An insecure logging vulnerability in ROS2 Galactic Geochelone ROS_VERSION 2 and ROS_PYTHON_VERSION 3, allows attackers to obtain sensitive information via inadequate security measures implemented within the logging mechanisms of ROS2." "value": "An insecure logging vulnerability in ROS2 Galactic Geochelone ROS_VERSION 2 and ROS_PYTHON_VERSION 3, allows attackers to obtain sensitive information via inadequate security measures implemented within the logging mechanisms of ROS2. NOTE: this is disputed by multiple third parties who believe there was not reasonable evidence to determine the existence of a vulnerability."
} }
], ],
"metrics": {}, "metrics": {},

View File

@ -2,12 +2,12 @@
"id": "CVE-2024-30702", "id": "CVE-2024-30702",
"sourceIdentifier": "cve@mitre.org", "sourceIdentifier": "cve@mitre.org",
"published": "2024-04-09T18:15:09.680", "published": "2024-04-09T18:15:09.680",
"lastModified": "2024-04-10T13:24:00.070", "lastModified": "2024-04-17T01:15:09.503",
"vulnStatus": "Awaiting Analysis", "vulnStatus": "Awaiting Analysis",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
"value": "An issue was discovered in ROS2 Galactic Geochelone in ROS_VERSION 2 and ROS_PYTHON_VERSION 3, allows remote attackers to execute arbitrary code via packages or nodes within the ROS2 system." "value": "An issue was discovered in ROS2 Galactic Geochelone in ROS_VERSION 2 and ROS_PYTHON_VERSION 3, allows remote attackers to execute arbitrary code via packages or nodes within the ROS2 system. NOTE: this is disputed by multiple third parties who believe there was not reasonable evidence to determine the existence of a vulnerability."
}, },
{ {
"lang": "es", "lang": "es",

View File

@ -2,12 +2,12 @@
"id": "CVE-2024-30703", "id": "CVE-2024-30703",
"sourceIdentifier": "cve@mitre.org", "sourceIdentifier": "cve@mitre.org",
"published": "2024-04-09T18:15:09.743", "published": "2024-04-09T18:15:09.743",
"lastModified": "2024-04-10T13:24:00.070", "lastModified": "2024-04-17T01:15:09.570",
"vulnStatus": "Awaiting Analysis", "vulnStatus": "Awaiting Analysis",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
"value": "An arbitrary file upload vulnerability has been discovered in ROS2 (Robot Operating System 2) Galactic Geochelone ROS_VERSION 2 and ROS_PYTHON_VERSION 3, allows attackers to execute arbitrary code, cause a denial of service (DoS), and obtain sensitive information via a crafted payload to the file upload mechanism of the ROS2 system, including the server\u2019s functionality for handling file uploads and the associated validation processes." "value": "An arbitrary file upload vulnerability has been discovered in ROS2 (Robot Operating System 2) Galactic Geochelone ROS_VERSION 2 and ROS_PYTHON_VERSION 3, allows attackers to execute arbitrary code, cause a denial of service (DoS), and obtain sensitive information via a crafted payload to the file upload mechanism of the ROS2 system, including the server\u2019s functionality for handling file uploads and the associated validation processes. NOTE: this is disputed by multiple third parties who believe there was not reasonable evidence to determine the existence of a vulnerability."
}, },
{ {
"lang": "es", "lang": "es",

View File

@ -2,12 +2,12 @@
"id": "CVE-2024-30704", "id": "CVE-2024-30704",
"sourceIdentifier": "cve@mitre.org", "sourceIdentifier": "cve@mitre.org",
"published": "2024-04-09T18:15:09.800", "published": "2024-04-09T18:15:09.800",
"lastModified": "2024-04-10T13:24:00.070", "lastModified": "2024-04-17T01:15:09.627",
"vulnStatus": "Awaiting Analysis", "vulnStatus": "Awaiting Analysis",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
"value": "An insecure deserialization vulnerability has been identified in ROS2 Galactic Geochelone ROS_VERSION 2 and ROS_PYTHON_VERSION 3, allows attackers to execute arbitrary code and obtain sensitive information via crafted input to the Data Serialization and Deserialization Components, Inter-Process Communication Mechanisms, and Network Communication Interfaces." "value": "An insecure deserialization vulnerability has been identified in ROS2 Galactic Geochelone ROS_VERSION 2 and ROS_PYTHON_VERSION 3, allows attackers to execute arbitrary code and obtain sensitive information via crafted input to the Data Serialization and Deserialization Components, Inter-Process Communication Mechanisms, and Network Communication Interfaces. NOTE: this is disputed by multiple third parties who believe there was not reasonable evidence to determine the existence of a vulnerability."
}, },
{ {
"lang": "es", "lang": "es",

View File

@ -2,12 +2,12 @@
"id": "CVE-2024-30706", "id": "CVE-2024-30706",
"sourceIdentifier": "cve@mitre.org", "sourceIdentifier": "cve@mitre.org",
"published": "2024-04-09T19:15:38.980", "published": "2024-04-09T19:15:38.980",
"lastModified": "2024-04-10T13:23:38.787", "lastModified": "2024-04-17T01:15:09.687",
"vulnStatus": "Awaiting Analysis", "vulnStatus": "Awaiting Analysis",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
"value": "An issue was discovered in ROS2 Dashing Diademata versions ROS_VERSION is 2 and ROS_PYTHON_VERSION is 3, allows remote attackers to execute arbitrary code, escalate privileges, obtain sensitive information, and gain unauthorized access to multiple ROS2 nodes." "value": "An issue was discovered in ROS2 Dashing Diademata versions ROS_VERSION is 2 and ROS_PYTHON_VERSION is 3, allows remote attackers to execute arbitrary code, escalate privileges, obtain sensitive information, and gain unauthorized access to multiple ROS2 nodes. NOTE: this is disputed by multiple third parties who believe there was not reasonable evidence to determine the existence of a vulnerability."
}, },
{ {
"lang": "es", "lang": "es",

View File

@ -2,12 +2,12 @@
"id": "CVE-2024-30707", "id": "CVE-2024-30707",
"sourceIdentifier": "cve@mitre.org", "sourceIdentifier": "cve@mitre.org",
"published": "2024-04-10T01:15:19.053", "published": "2024-04-10T01:15:19.053",
"lastModified": "2024-04-10T13:23:38.787", "lastModified": "2024-04-17T01:15:09.747",
"vulnStatus": "Awaiting Analysis", "vulnStatus": "Awaiting Analysis",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
"value": "Unauthorized node injection vulnerability in ROS2 Dashing Diademata in ROS_VERSION 2 and ROS_PYTHON_VERSION 3, allows remote attackers to escalate privileges and inject malicious ROS2 nodes into the system." "value": "Unauthorized node injection vulnerability in ROS2 Dashing Diademata in ROS_VERSION 2 and ROS_PYTHON_VERSION 3, allows remote attackers to escalate privileges and inject malicious ROS2 nodes into the system. NOTE: this is disputed by multiple third parties who believe there was not reasonable evidence to determine the existence of a vulnerability."
}, },
{ {
"lang": "es", "lang": "es",

View File

@ -2,12 +2,12 @@
"id": "CVE-2024-30708", "id": "CVE-2024-30708",
"sourceIdentifier": "cve@mitre.org", "sourceIdentifier": "cve@mitre.org",
"published": "2024-04-10T01:15:19.110", "published": "2024-04-10T01:15:19.110",
"lastModified": "2024-04-10T13:23:38.787", "lastModified": "2024-04-17T01:15:09.810",
"vulnStatus": "Awaiting Analysis", "vulnStatus": "Awaiting Analysis",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
"value": "An issue was discovered in ROS2 Dashing Diademata in ROS_VERSION 2 and ROS_PYTHON_VERSION 3, allows remote attackers to cause a denial of service (DoS) via the ROS2 nodes." "value": "An issue was discovered in ROS2 Dashing Diademata in ROS_VERSION 2 and ROS_PYTHON_VERSION 3, allows remote attackers to cause a denial of service (DoS) via the ROS2 nodes. NOTE: this is disputed by multiple third parties who believe there was not reasonable evidence to determine the existence of a vulnerability."
}, },
{ {
"lang": "es", "lang": "es",

View File

@ -2,12 +2,12 @@
"id": "CVE-2024-30710", "id": "CVE-2024-30710",
"sourceIdentifier": "cve@mitre.org", "sourceIdentifier": "cve@mitre.org",
"published": "2024-04-10T01:15:19.160", "published": "2024-04-10T01:15:19.160",
"lastModified": "2024-04-10T13:23:38.787", "lastModified": "2024-04-17T01:15:09.867",
"vulnStatus": "Awaiting Analysis", "vulnStatus": "Awaiting Analysis",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
"value": "An issue was discovered in ROS2 Dashing Diademata in ROS_VERSION 2 and ROS_PYTHON_VERSION 3, where the system transmits messages in plaintext. This flaw exposes sensitive information, making it vulnerable to man-in-the-middle (MitM) attacks, and allowing attackers to easily intercept and access this data." "value": "An issue was discovered in ROS2 Dashing Diademata in ROS_VERSION 2 and ROS_PYTHON_VERSION 3, where the system transmits messages in plaintext. This flaw exposes sensitive information, making it vulnerable to man-in-the-middle (MitM) attacks, and allowing attackers to easily intercept and access this data. NOTE: this is disputed by multiple third parties who believe there was not reasonable evidence to determine the existence of a vulnerability."
}, },
{ {
"lang": "es", "lang": "es",

View File

@ -2,12 +2,12 @@
"id": "CVE-2024-30711", "id": "CVE-2024-30711",
"sourceIdentifier": "cve@mitre.org", "sourceIdentifier": "cve@mitre.org",
"published": "2024-04-10T02:15:10.300", "published": "2024-04-10T02:15:10.300",
"lastModified": "2024-04-10T13:23:38.787", "lastModified": "2024-04-17T01:15:09.923",
"vulnStatus": "Awaiting Analysis", "vulnStatus": "Awaiting Analysis",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
"value": "An issue was discovered in the default configurations of ROS2 Dashing Diademata in ROS_VERSION 2 and ROS_PYTHON_VERSION 3, allows unauthenticated attackers to gain access using default credentials." "value": "An issue was discovered in the default configurations of ROS2 Dashing Diademata in ROS_VERSION 2 and ROS_PYTHON_VERSION 3, allows unauthenticated attackers to gain access using default credentials. NOTE: this is disputed by multiple third parties who believe there was not reasonable evidence to determine the existence of a vulnerability."
}, },
{ {
"lang": "es", "lang": "es",

View File

@ -2,12 +2,12 @@
"id": "CVE-2024-30712", "id": "CVE-2024-30712",
"sourceIdentifier": "cve@mitre.org", "sourceIdentifier": "cve@mitre.org",
"published": "2024-04-10T02:15:10.400", "published": "2024-04-10T02:15:10.400",
"lastModified": "2024-04-10T13:23:38.787", "lastModified": "2024-04-17T01:15:09.990",
"vulnStatus": "Awaiting Analysis", "vulnStatus": "Awaiting Analysis",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
"value": "A shell injection vulnerability was discovered in ROS2 (Robot Operating System 2) Dashing Diademata in ROS_VERSION 2 and ROS_PYTHON_VERSION 3, allows remote attackers to execute arbitrary code, escalate privileges, and obtain sensitive information due to the way ROS2 handles shell command execution in components like command interpreters or interfaces that process external inputs." "value": "A shell injection vulnerability was discovered in ROS2 (Robot Operating System 2) Dashing Diademata in ROS_VERSION 2 and ROS_PYTHON_VERSION 3, allows remote attackers to execute arbitrary code, escalate privileges, and obtain sensitive information due to the way ROS2 handles shell command execution in components like command interpreters or interfaces that process external inputs. NOTE: this is disputed by multiple third parties who believe there was not reasonable evidence to determine the existence of a vulnerability."
}, },
{ {
"lang": "es", "lang": "es",

View File

@ -2,12 +2,12 @@
"id": "CVE-2024-30713", "id": "CVE-2024-30713",
"sourceIdentifier": "cve@mitre.org", "sourceIdentifier": "cve@mitre.org",
"published": "2024-04-10T02:15:10.473", "published": "2024-04-10T02:15:10.473",
"lastModified": "2024-04-10T13:23:38.787", "lastModified": "2024-04-17T01:15:10.050",
"vulnStatus": "Awaiting Analysis", "vulnStatus": "Awaiting Analysis",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
"value": "An OS command injection vulnerability has been discovered in ROS2 Dashing Diademata in ROS_VERSION 2 and ROS_PYTHON_VERSION 3, allows remote attackers to execute arbitrary code, escalate privileges, and obtain sensitive information via the External Command Execution Modules, System Call Handlers, and Interface Scripts." "value": "An OS command injection vulnerability has been discovered in ROS2 Dashing Diademata in ROS_VERSION 2 and ROS_PYTHON_VERSION 3, allows remote attackers to execute arbitrary code, escalate privileges, and obtain sensitive information via the External Command Execution Modules, System Call Handlers, and Interface Scripts. NOTE: this is disputed by multiple third parties who believe there was not reasonable evidence to determine the existence of a vulnerability."
}, },
{ {
"lang": "es", "lang": "es",

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2024-31503",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-04-17T00:15:07.220",
"lastModified": "2024-04-17T00:15:07.220",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Incorrect access control in Dolibarr ERP CRM versions 19.0.0 and before, allows authenticated attackers to steal victim users' session cookies and CSRF protection tokens via user interaction with a crafted web page, leading to account takeover."
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/alexbsec/CVEs/blob/master/2024/CVE-2024-31503.md",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2024-31680",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-04-17T00:15:07.293",
"lastModified": "2024-04-17T00:15:07.293",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "File Upload vulnerability in Shibang Communications Co., Ltd. IP network intercom broadcasting system v.1.0 allows a local attacker to execute arbitrary code via the my_parser.php component."
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/heidashuai5588/cve/blob/main/upload.md",
"source": "cve@mitre.org"
}
]
}

View File

@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update ### Last Repository Update
```plain ```plain
2024-04-16T23:55:32.287910+00:00 2024-04-17T02:00:30.816528+00:00
``` ```
### Most recent CVE Modification Timestamp synchronized with NVD ### Most recent CVE Modification Timestamp synchronized with NVD
```plain ```plain
2024-04-16T23:15:09.173000+00:00 2024-04-17T01:15:10.050000+00:00
``` ```
### Last Data Feed Release ### Last Data Feed Release
@ -27,54 +27,53 @@ Repository synchronizes with the NVD every 2 hours.
Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/releases/latest) Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/releases/latest)
```plain ```plain
2024-04-16T00:00:20.260499+00:00 2024-04-17T00:00:20.264953+00:00
``` ```
### Total Number of included CVEs ### Total Number of included CVEs
```plain ```plain
245887 245890
``` ```
### CVEs added in the last Commit ### CVEs added in the last Commit
Recently added CVEs: `140` Recently added CVEs: `3`
- [CVE-2024-21104](CVE-2024/CVE-2024-211xx/CVE-2024-21104.json) (`2024-04-16T22:15:31.600`) - [CVE-2024-22354](CVE-2024/CVE-2024-223xx/CVE-2024-22354.json) (`2024-04-17T01:15:06.747`)
- [CVE-2024-21105](CVE-2024/CVE-2024-211xx/CVE-2024-21105.json) (`2024-04-16T22:15:31.770`) - [CVE-2024-31503](CVE-2024/CVE-2024-315xx/CVE-2024-31503.json) (`2024-04-17T00:15:07.220`)
- [CVE-2024-21106](CVE-2024/CVE-2024-211xx/CVE-2024-21106.json) (`2024-04-16T22:15:31.940`) - [CVE-2024-31680](CVE-2024/CVE-2024-316xx/CVE-2024-31680.json) (`2024-04-17T00:15:07.293`)
- [CVE-2024-21107](CVE-2024/CVE-2024-211xx/CVE-2024-21107.json) (`2024-04-16T22:15:32.110`)
- [CVE-2024-21108](CVE-2024/CVE-2024-211xx/CVE-2024-21108.json) (`2024-04-16T22:15:32.277`)
- [CVE-2024-21109](CVE-2024/CVE-2024-211xx/CVE-2024-21109.json) (`2024-04-16T22:15:32.440`)
- [CVE-2024-21110](CVE-2024/CVE-2024-211xx/CVE-2024-21110.json) (`2024-04-16T22:15:32.617`)
- [CVE-2024-21111](CVE-2024/CVE-2024-211xx/CVE-2024-21111.json) (`2024-04-16T22:15:32.780`)
- [CVE-2024-21112](CVE-2024/CVE-2024-211xx/CVE-2024-21112.json) (`2024-04-16T22:15:32.957`)
- [CVE-2024-21113](CVE-2024/CVE-2024-211xx/CVE-2024-21113.json) (`2024-04-16T22:15:33.127`)
- [CVE-2024-21114](CVE-2024/CVE-2024-211xx/CVE-2024-21114.json) (`2024-04-16T22:15:33.300`)
- [CVE-2024-21115](CVE-2024/CVE-2024-211xx/CVE-2024-21115.json) (`2024-04-16T22:15:33.467`)
- [CVE-2024-21116](CVE-2024/CVE-2024-211xx/CVE-2024-21116.json) (`2024-04-16T22:15:33.653`)
- [CVE-2024-21117](CVE-2024/CVE-2024-211xx/CVE-2024-21117.json) (`2024-04-16T22:15:33.860`)
- [CVE-2024-21118](CVE-2024/CVE-2024-211xx/CVE-2024-21118.json) (`2024-04-16T22:15:34.027`)
- [CVE-2024-21119](CVE-2024/CVE-2024-211xx/CVE-2024-21119.json) (`2024-04-16T22:15:34.197`)
- [CVE-2024-21120](CVE-2024/CVE-2024-211xx/CVE-2024-21120.json) (`2024-04-16T22:15:34.427`)
- [CVE-2024-21121](CVE-2024/CVE-2024-211xx/CVE-2024-21121.json) (`2024-04-16T22:15:34.600`)
- [CVE-2024-27086](CVE-2024/CVE-2024-270xx/CVE-2024-27086.json) (`2024-04-16T22:15:34.783`)
- [CVE-2024-29291](CVE-2024/CVE-2024-292xx/CVE-2024-29291.json) (`2024-04-16T23:15:08.767`)
- [CVE-2024-29402](CVE-2024/CVE-2024-294xx/CVE-2024-29402.json) (`2024-04-16T23:15:08.827`)
- [CVE-2024-31452](CVE-2024/CVE-2024-314xx/CVE-2024-31452.json) (`2024-04-16T22:15:35.003`)
- [CVE-2024-31759](CVE-2024/CVE-2024-317xx/CVE-2024-31759.json) (`2024-04-16T23:15:09.047`)
- [CVE-2024-31760](CVE-2024/CVE-2024-317xx/CVE-2024-31760.json) (`2024-04-16T23:15:09.107`)
- [CVE-2024-31887](CVE-2024/CVE-2024-318xx/CVE-2024-31887.json) (`2024-04-16T22:15:35.240`)
### CVEs modified in the last Commit ### CVEs modified in the last Commit
Recently modified CVEs: `4` Recently modified CVEs: `53`
- [CVE-2024-0914](CVE-2024/CVE-2024-09xx/CVE-2024-0914.json) (`2024-04-16T22:15:11.330`) - [CVE-2024-30681](CVE-2024/CVE-2024-306xx/CVE-2024-30681.json) (`2024-04-17T01:15:08.633`)
- [CVE-2024-27592](CVE-2024/CVE-2024-275xx/CVE-2024-27592.json) (`2024-04-16T23:15:08.690`) - [CVE-2024-30683](CVE-2024/CVE-2024-306xx/CVE-2024-30683.json) (`2024-04-17T01:15:08.690`)
- [CVE-2024-31497](CVE-2024/CVE-2024-314xx/CVE-2024-31497.json) (`2024-04-16T23:15:08.903`) - [CVE-2024-30684](CVE-2024/CVE-2024-306xx/CVE-2024-30684.json) (`2024-04-17T01:15:08.750`)
- [CVE-2024-32036](CVE-2024/CVE-2024-320xx/CVE-2024-32036.json) (`2024-04-16T23:15:09.173`) - [CVE-2024-30686](CVE-2024/CVE-2024-306xx/CVE-2024-30686.json) (`2024-04-17T01:15:08.813`)
- [CVE-2024-30687](CVE-2024/CVE-2024-306xx/CVE-2024-30687.json) (`2024-04-17T01:15:08.873`)
- [CVE-2024-30688](CVE-2024/CVE-2024-306xx/CVE-2024-30688.json) (`2024-04-17T01:15:08.927`)
- [CVE-2024-30690](CVE-2024/CVE-2024-306xx/CVE-2024-30690.json) (`2024-04-17T01:15:08.980`)
- [CVE-2024-30691](CVE-2024/CVE-2024-306xx/CVE-2024-30691.json) (`2024-04-17T01:15:09.033`)
- [CVE-2024-30692](CVE-2024/CVE-2024-306xx/CVE-2024-30692.json) (`2024-04-17T01:15:09.100`)
- [CVE-2024-30694](CVE-2024/CVE-2024-306xx/CVE-2024-30694.json) (`2024-04-17T01:15:09.160`)
- [CVE-2024-30695](CVE-2024/CVE-2024-306xx/CVE-2024-30695.json) (`2024-04-17T01:15:09.217`)
- [CVE-2024-30696](CVE-2024/CVE-2024-306xx/CVE-2024-30696.json) (`2024-04-17T01:15:09.273`)
- [CVE-2024-30697](CVE-2024/CVE-2024-306xx/CVE-2024-30697.json) (`2024-04-17T01:15:09.330`)
- [CVE-2024-30699](CVE-2024/CVE-2024-306xx/CVE-2024-30699.json) (`2024-04-17T01:15:09.387`)
- [CVE-2024-30701](CVE-2024/CVE-2024-307xx/CVE-2024-30701.json) (`2024-04-17T01:15:09.447`)
- [CVE-2024-30702](CVE-2024/CVE-2024-307xx/CVE-2024-30702.json) (`2024-04-17T01:15:09.503`)
- [CVE-2024-30703](CVE-2024/CVE-2024-307xx/CVE-2024-30703.json) (`2024-04-17T01:15:09.570`)
- [CVE-2024-30704](CVE-2024/CVE-2024-307xx/CVE-2024-30704.json) (`2024-04-17T01:15:09.627`)
- [CVE-2024-30706](CVE-2024/CVE-2024-307xx/CVE-2024-30706.json) (`2024-04-17T01:15:09.687`)
- [CVE-2024-30707](CVE-2024/CVE-2024-307xx/CVE-2024-30707.json) (`2024-04-17T01:15:09.747`)
- [CVE-2024-30708](CVE-2024/CVE-2024-307xx/CVE-2024-30708.json) (`2024-04-17T01:15:09.810`)
- [CVE-2024-30710](CVE-2024/CVE-2024-307xx/CVE-2024-30710.json) (`2024-04-17T01:15:09.867`)
- [CVE-2024-30711](CVE-2024/CVE-2024-307xx/CVE-2024-30711.json) (`2024-04-17T01:15:09.923`)
- [CVE-2024-30712](CVE-2024/CVE-2024-307xx/CVE-2024-30712.json) (`2024-04-17T01:15:09.990`)
- [CVE-2024-30713](CVE-2024/CVE-2024-307xx/CVE-2024-30713.json) (`2024-04-17T01:15:10.050`)
## Download and Usage ## Download and Usage

View File

@ -238939,7 +238939,7 @@ CVE-2024-0907,0,0,736d9a373e93547114922fac343df53c487c280e59648bef9a3cecc6379f90
CVE-2024-0909,0,0,7864e9d833556eb295eb67e87cebb39c8d9b11d41ed1f5327a80b30fe013438c,2024-02-08T20:07:51.410000 CVE-2024-0909,0,0,7864e9d833556eb295eb67e87cebb39c8d9b11d41ed1f5327a80b30fe013438c,2024-02-08T20:07:51.410000
CVE-2024-0911,0,0,5f8186e1a077698fb2fa1e99d28cc6e32ac8b7b7afb205a3a02bc10c8ca698f0,2024-02-14T18:15:48.077000 CVE-2024-0911,0,0,5f8186e1a077698fb2fa1e99d28cc6e32ac8b7b7afb205a3a02bc10c8ca698f0,2024-02-14T18:15:48.077000
CVE-2024-0913,0,0,cc9dbbd0e1eb40baf69d2dc96719798ae1dcba5ab6fc531754d7fd6a8c7e7f1d,2024-03-29T12:45:02.937000 CVE-2024-0913,0,0,cc9dbbd0e1eb40baf69d2dc96719798ae1dcba5ab6fc531754d7fd6a8c7e7f1d,2024-03-29T12:45:02.937000
CVE-2024-0914,0,1,0e30b945bb509fa0d2bc0b307e8920a9ca89d326b7b4c1c386bc1b08db5275e0,2024-04-16T22:15:11.330000 CVE-2024-0914,0,0,0e30b945bb509fa0d2bc0b307e8920a9ca89d326b7b4c1c386bc1b08db5275e0,2024-04-16T22:15:11.330000
CVE-2024-0917,0,0,1096c18fb8e959955c123559a721fd9eb8bfd390fb54eac5e8167e50a31dc158,2024-03-07T15:15:08.257000 CVE-2024-0917,0,0,1096c18fb8e959955c123559a721fd9eb8bfd390fb54eac5e8167e50a31dc158,2024-03-07T15:15:08.257000
CVE-2024-0918,0,0,665fb2ab3d0de8862f8c0f360fe055729484bae6812ecb9bc73647194d5411aa,2024-04-11T01:24:12.193000 CVE-2024-0918,0,0,665fb2ab3d0de8862f8c0f360fe055729484bae6812ecb9bc73647194d5411aa,2024-04-11T01:24:12.193000
CVE-2024-0919,0,0,589179645f375446af0d6856749f5d8581b8fa706e54f9dca7ffc4f53fa26164,2024-04-11T01:24:12.283000 CVE-2024-0919,0,0,589179645f375446af0d6856749f5d8581b8fa706e54f9dca7ffc4f53fa26164,2024-04-11T01:24:12.283000
@ -240193,7 +240193,7 @@ CVE-2024-20950,0,0,32c0f5cb59e7c130a00739028db90d5b34109b274bf0b583559e0ef0dda25
CVE-2024-20951,0,0,b17c14c257c2e51309f12c914a15b8f22d172a66204fd5740f2d7618130689e5,2024-02-20T19:51:05.510000 CVE-2024-20951,0,0,b17c14c257c2e51309f12c914a15b8f22d172a66204fd5740f2d7618130689e5,2024-02-20T19:51:05.510000
CVE-2024-20952,0,0,7957ba932035deb7b04bf9fd56a6980467fb3f16d0b62e00bf598071fcd8479f,2024-02-15T03:18:31.140000 CVE-2024-20952,0,0,7957ba932035deb7b04bf9fd56a6980467fb3f16d0b62e00bf598071fcd8479f,2024-02-15T03:18:31.140000
CVE-2024-20953,0,0,79439b14c378308eaeb3d77fa260d91a67ac61cdabeddcb908ef73ad775fa897,2024-02-20T19:51:05.510000 CVE-2024-20953,0,0,79439b14c378308eaeb3d77fa260d91a67ac61cdabeddcb908ef73ad775fa897,2024-02-20T19:51:05.510000
CVE-2024-20954,1,1,1b3cff32868f8ef9fa8cab26659ccded6cdd335671f7807e559eeb06f28b071d,2024-04-16T22:15:11.570000 CVE-2024-20954,0,0,1b3cff32868f8ef9fa8cab26659ccded6cdd335671f7807e559eeb06f28b071d,2024-04-16T22:15:11.570000
CVE-2024-20955,0,0,05c43eead42002e8bf1c331a3e1f9e86bd97fbf64642fb46b8c945f04d3570a4,2024-02-09T02:26:25.517000 CVE-2024-20955,0,0,05c43eead42002e8bf1c331a3e1f9e86bd97fbf64642fb46b8c945f04d3570a4,2024-02-09T02:26:25.517000
CVE-2024-20956,0,0,4a89a3bb6eaf3756d6410a6795c8b17d6ca727f95abdba61f342d6ebe0a23c6d,2024-02-20T19:51:05.510000 CVE-2024-20956,0,0,4a89a3bb6eaf3756d6410a6795c8b17d6ca727f95abdba61f342d6ebe0a23c6d,2024-02-20T19:51:05.510000
CVE-2024-20957,0,0,d1288734ff34c61b4455c5d61dc20cc713104f20309fe93a5491a293ace0102b,2024-01-20T18:31:43.287000 CVE-2024-20957,0,0,d1288734ff34c61b4455c5d61dc20cc713104f20309fe93a5491a293ace0102b,2024-01-20T18:31:43.287000
@ -240228,145 +240228,145 @@ CVE-2024-20984,0,0,585d056539d5b2a7ec102aa133531262bc58f31d6c087eb30a1c927656ef9
CVE-2024-20985,0,0,1887d4efcd4074083ed6001311349bddeba13ac350578caa9144fb2633e7d1e2,2024-02-02T17:27:12.127000 CVE-2024-20985,0,0,1887d4efcd4074083ed6001311349bddeba13ac350578caa9144fb2633e7d1e2,2024-02-02T17:27:12.127000
CVE-2024-20986,0,0,55fd916bbc66a048aba24029df1cdbff6d17cbdc5963bc85efdc3f349c48d99c,2024-02-20T19:50:53.960000 CVE-2024-20986,0,0,55fd916bbc66a048aba24029df1cdbff6d17cbdc5963bc85efdc3f349c48d99c,2024-02-20T19:50:53.960000
CVE-2024-20987,0,0,e6a4199f934ca8909c51db00ae903048e2b51791ebdf6565c06b10750c7af3ef,2024-01-20T18:30:16.877000 CVE-2024-20987,0,0,e6a4199f934ca8909c51db00ae903048e2b51791ebdf6565c06b10750c7af3ef,2024-01-20T18:30:16.877000
CVE-2024-20989,1,1,24bd66160dcd01603ef9a4851c4e5500f60b712eab8cde5d6558188934f30cdc,2024-04-16T22:15:11.777000 CVE-2024-20989,0,0,24bd66160dcd01603ef9a4851c4e5500f60b712eab8cde5d6558188934f30cdc,2024-04-16T22:15:11.777000
CVE-2024-20990,1,1,1f2b6c78c36b21b35c4cab89a838c9a38f38088c4a36c08aa77f1f65658e2112,2024-04-16T22:15:11.950000 CVE-2024-20990,0,0,1f2b6c78c36b21b35c4cab89a838c9a38f38088c4a36c08aa77f1f65658e2112,2024-04-16T22:15:11.950000
CVE-2024-20991,1,1,f7941a97e294f105dcd20a6671868dc0049be6e06eb929430f1c839415c2749b,2024-04-16T22:15:12.110000 CVE-2024-20991,0,0,f7941a97e294f105dcd20a6671868dc0049be6e06eb929430f1c839415c2749b,2024-04-16T22:15:12.110000
CVE-2024-20992,1,1,bb84e3a34b7d7232702fad67c49d8138a12244badca117134b7274064ac77153,2024-04-16T22:15:12.280000 CVE-2024-20992,0,0,bb84e3a34b7d7232702fad67c49d8138a12244badca117134b7274064ac77153,2024-04-16T22:15:12.280000
CVE-2024-20993,1,1,da89184bf9556231d8ffb00987f4a32f464b19ae4e05e44e8feb1fe98c3aebf1,2024-04-16T22:15:12.453000 CVE-2024-20993,0,0,da89184bf9556231d8ffb00987f4a32f464b19ae4e05e44e8feb1fe98c3aebf1,2024-04-16T22:15:12.453000
CVE-2024-20994,1,1,8bb0c6f9e9c9e2900660c0a56d574e56c5270083be86c93d88330070f8338576,2024-04-16T22:15:12.623000 CVE-2024-20994,0,0,8bb0c6f9e9c9e2900660c0a56d574e56c5270083be86c93d88330070f8338576,2024-04-16T22:15:12.623000
CVE-2024-20995,1,1,98b0651bae746f006582628d0a65c2eaaf6ce3de2c23eadbde7e9029acc0a35b,2024-04-16T22:15:12.793000 CVE-2024-20995,0,0,98b0651bae746f006582628d0a65c2eaaf6ce3de2c23eadbde7e9029acc0a35b,2024-04-16T22:15:12.793000
CVE-2024-20997,1,1,b01de6bd0f3b1ccd4a1739b4ba353f58264a04c937a098746ad386fd9fd6e030,2024-04-16T22:15:12.970000 CVE-2024-20997,0,0,b01de6bd0f3b1ccd4a1739b4ba353f58264a04c937a098746ad386fd9fd6e030,2024-04-16T22:15:12.970000
CVE-2024-20998,1,1,dcaaa0d5cec4adbb2b67dee3b42c4cf6aa6c0406d43865be7ef359b1b61fe7fe,2024-04-16T22:15:13.140000 CVE-2024-20998,0,0,dcaaa0d5cec4adbb2b67dee3b42c4cf6aa6c0406d43865be7ef359b1b61fe7fe,2024-04-16T22:15:13.140000
CVE-2024-20999,1,1,5da01f1cdb292e263ab68d383757ae155303fc6a09aba69275d7eb6bb9513f3a,2024-04-16T22:15:13.350000 CVE-2024-20999,0,0,5da01f1cdb292e263ab68d383757ae155303fc6a09aba69275d7eb6bb9513f3a,2024-04-16T22:15:13.350000
CVE-2024-21000,1,1,b1e376ae55bf616084d4afc76bd91c2aeb3f1a482f42d2aa132d547fda429856,2024-04-16T22:15:13.520000 CVE-2024-21000,0,0,b1e376ae55bf616084d4afc76bd91c2aeb3f1a482f42d2aa132d547fda429856,2024-04-16T22:15:13.520000
CVE-2024-21001,1,1,2b4f89fa6de8475a4000712b6079e0b52b44ea7e7696fe0294ac7344afce2602,2024-04-16T22:15:13.687000 CVE-2024-21001,0,0,2b4f89fa6de8475a4000712b6079e0b52b44ea7e7696fe0294ac7344afce2602,2024-04-16T22:15:13.687000
CVE-2024-21002,1,1,ffbd432b8311304ca8ec20919b7812a33af6c33f7d61c53f1da75adb9e56a247,2024-04-16T22:15:13.870000 CVE-2024-21002,0,0,ffbd432b8311304ca8ec20919b7812a33af6c33f7d61c53f1da75adb9e56a247,2024-04-16T22:15:13.870000
CVE-2024-21003,1,1,00dd51a70fe0612321559d480def2ab7ce04633a9f1842b200ffeae1dba6cc44,2024-04-16T22:15:14.040000 CVE-2024-21003,0,0,00dd51a70fe0612321559d480def2ab7ce04633a9f1842b200ffeae1dba6cc44,2024-04-16T22:15:14.040000
CVE-2024-21004,1,1,61ad4f441881a3344e339e3a481dd630541c6bcfe7d8765dc285e640d99166d3,2024-04-16T22:15:14.210000 CVE-2024-21004,0,0,61ad4f441881a3344e339e3a481dd630541c6bcfe7d8765dc285e640d99166d3,2024-04-16T22:15:14.210000
CVE-2024-21005,1,1,c2f9d72bf49b7451dd0149f8cf3c266ece3db56df05490ab87519b17dbab58eb,2024-04-16T22:15:14.373000 CVE-2024-21005,0,0,c2f9d72bf49b7451dd0149f8cf3c266ece3db56df05490ab87519b17dbab58eb,2024-04-16T22:15:14.373000
CVE-2024-21006,1,1,5eec6ec005650cd1dbf142caefdbc17f2bedd7c06d8499db20672b0f536c4631,2024-04-16T22:15:14.580000 CVE-2024-21006,0,0,5eec6ec005650cd1dbf142caefdbc17f2bedd7c06d8499db20672b0f536c4631,2024-04-16T22:15:14.580000
CVE-2024-21007,1,1,2563c4d9da347d2a38b89329ea4e910efcfdb9494ef6408f0cc298fcbe8fd3c3,2024-04-16T22:15:14.750000 CVE-2024-21007,0,0,2563c4d9da347d2a38b89329ea4e910efcfdb9494ef6408f0cc298fcbe8fd3c3,2024-04-16T22:15:14.750000
CVE-2024-21008,1,1,e95becd4e783498ca54c433b1842c818ff2f7c3fd6420f710879bf3a514777fb,2024-04-16T22:15:14.920000 CVE-2024-21008,0,0,e95becd4e783498ca54c433b1842c818ff2f7c3fd6420f710879bf3a514777fb,2024-04-16T22:15:14.920000
CVE-2024-21009,1,1,9ddc1504b8228a31863180fe7fe1fa2f317c04b18cfdcdfe45e45611d7d9540d,2024-04-16T22:15:15.090000 CVE-2024-21009,0,0,9ddc1504b8228a31863180fe7fe1fa2f317c04b18cfdcdfe45e45611d7d9540d,2024-04-16T22:15:15.090000
CVE-2024-21010,1,1,55c3a7d9f03e27fb74e2bc734e6bb2202aac2b7c31fe23512468ce93a5d8cfcd,2024-04-16T22:15:15.260000 CVE-2024-21010,0,0,55c3a7d9f03e27fb74e2bc734e6bb2202aac2b7c31fe23512468ce93a5d8cfcd,2024-04-16T22:15:15.260000
CVE-2024-21011,1,1,baa595ade65223b04108911c488632f6e636cd204ddbb3de01b96a559e2ec2b7,2024-04-16T22:15:15.437000 CVE-2024-21011,0,0,baa595ade65223b04108911c488632f6e636cd204ddbb3de01b96a559e2ec2b7,2024-04-16T22:15:15.437000
CVE-2024-21012,1,1,1e371a0544b8df7e7282a19c4a4ba29026fb2118b4f7f0e52810b94d3fe65e5e,2024-04-16T22:15:15.617000 CVE-2024-21012,0,0,1e371a0544b8df7e7282a19c4a4ba29026fb2118b4f7f0e52810b94d3fe65e5e,2024-04-16T22:15:15.617000
CVE-2024-21013,1,1,e2e97914744a61b187d473751d0bf550616b97331057f1618c93fe66e5658f37,2024-04-16T22:15:15.793000 CVE-2024-21013,0,0,e2e97914744a61b187d473751d0bf550616b97331057f1618c93fe66e5658f37,2024-04-16T22:15:15.793000
CVE-2024-21014,1,1,96e5bc7a4bf50754d27227b9e23d97bae5459af5c4b4da7eebd614eec1522af8,2024-04-16T22:15:15.967000 CVE-2024-21014,0,0,96e5bc7a4bf50754d27227b9e23d97bae5459af5c4b4da7eebd614eec1522af8,2024-04-16T22:15:15.967000
CVE-2024-21015,1,1,918463f0f050d0c7192efe1d2e4d2873c8f36172a550d9fd537585c771992484,2024-04-16T22:15:16.140000 CVE-2024-21015,0,0,918463f0f050d0c7192efe1d2e4d2873c8f36172a550d9fd537585c771992484,2024-04-16T22:15:16.140000
CVE-2024-21016,1,1,8b7bc3eb1bee49cdeabf4139f268ad0a541636915b570c6a67b2f4b706bad608,2024-04-16T22:15:16.310000 CVE-2024-21016,0,0,8b7bc3eb1bee49cdeabf4139f268ad0a541636915b570c6a67b2f4b706bad608,2024-04-16T22:15:16.310000
CVE-2024-21017,1,1,5435ef4d7111abb27e9fef847b3abed74d61012b8af907690f7a72cf81d1aee3,2024-04-16T22:15:16.480000 CVE-2024-21017,0,0,5435ef4d7111abb27e9fef847b3abed74d61012b8af907690f7a72cf81d1aee3,2024-04-16T22:15:16.480000
CVE-2024-21018,1,1,78de31f919dcc65a4219d6547ec52ce01c30507860361f753dea40cfc17b8a0d,2024-04-16T22:15:16.657000 CVE-2024-21018,0,0,78de31f919dcc65a4219d6547ec52ce01c30507860361f753dea40cfc17b8a0d,2024-04-16T22:15:16.657000
CVE-2024-21019,1,1,f0715b65c60bf947385aa8d018513125c7b48036a0336443cc8665884c0fec1a,2024-04-16T22:15:16.820000 CVE-2024-21019,0,0,f0715b65c60bf947385aa8d018513125c7b48036a0336443cc8665884c0fec1a,2024-04-16T22:15:16.820000
CVE-2024-21020,1,1,4aaf81679ff1c2c4fd145b00a9453cb7bab62b5e02f3631293c53cad03e2b962,2024-04-16T22:15:16.990000 CVE-2024-21020,0,0,4aaf81679ff1c2c4fd145b00a9453cb7bab62b5e02f3631293c53cad03e2b962,2024-04-16T22:15:16.990000
CVE-2024-21021,1,1,6b332607f787e62c7b0abda7b49fbedb9c0789c078796ec62ae6cbbd3dfd5201,2024-04-16T22:15:17.153000 CVE-2024-21021,0,0,6b332607f787e62c7b0abda7b49fbedb9c0789c078796ec62ae6cbbd3dfd5201,2024-04-16T22:15:17.153000
CVE-2024-21022,1,1,083f86f4f8106af6fa9f026c2d8ac4ecc2a0f155e977c01b8b5f1e99a0b09eaa,2024-04-16T22:15:17.323000 CVE-2024-21022,0,0,083f86f4f8106af6fa9f026c2d8ac4ecc2a0f155e977c01b8b5f1e99a0b09eaa,2024-04-16T22:15:17.323000
CVE-2024-21023,1,1,1bf558977a9ac806d1b5707b479369cfec8ec96f8f7d9da8c979f5eebe4cd37a,2024-04-16T22:15:17.490000 CVE-2024-21023,0,0,1bf558977a9ac806d1b5707b479369cfec8ec96f8f7d9da8c979f5eebe4cd37a,2024-04-16T22:15:17.490000
CVE-2024-21024,1,1,f63e04db3cd79d18d5d0ecbe868c78eedd4c4e709c16f6e6ebbf974eed6765e9,2024-04-16T22:15:17.663000 CVE-2024-21024,0,0,f63e04db3cd79d18d5d0ecbe868c78eedd4c4e709c16f6e6ebbf974eed6765e9,2024-04-16T22:15:17.663000
CVE-2024-21025,1,1,1f485c124b14e70f2369d7154d807b46e0d751540ecffd50879fbb0e0a5833fd,2024-04-16T22:15:17.837000 CVE-2024-21025,0,0,1f485c124b14e70f2369d7154d807b46e0d751540ecffd50879fbb0e0a5833fd,2024-04-16T22:15:17.837000
CVE-2024-21026,1,1,d4b80277d1390010d34c451606fdffeb4200521fcd228a8babeb84318cd3dead,2024-04-16T22:15:18.020000 CVE-2024-21026,0,0,d4b80277d1390010d34c451606fdffeb4200521fcd228a8babeb84318cd3dead,2024-04-16T22:15:18.020000
CVE-2024-21027,1,1,22d31dd80df37759e955cfde910e4176d29d728b2f495495cec60a082b2ed598,2024-04-16T22:15:18.183000 CVE-2024-21027,0,0,22d31dd80df37759e955cfde910e4176d29d728b2f495495cec60a082b2ed598,2024-04-16T22:15:18.183000
CVE-2024-21028,1,1,301b880241f9e9057e79dc58e33941db3709e174a9b569f580d833c972d9fcbc,2024-04-16T22:15:18.350000 CVE-2024-21028,0,0,301b880241f9e9057e79dc58e33941db3709e174a9b569f580d833c972d9fcbc,2024-04-16T22:15:18.350000
CVE-2024-21029,1,1,0d090e2bc38ab4004c6c5deb491a06c754995b12bd1e8d5adb04366bb73e2b5f,2024-04-16T22:15:18.527000 CVE-2024-21029,0,0,0d090e2bc38ab4004c6c5deb491a06c754995b12bd1e8d5adb04366bb73e2b5f,2024-04-16T22:15:18.527000
CVE-2024-2103,0,0,4357f6f4848f7c5880c727dbfe8b97df3dcf5303e95d5a7ff4fdf7062d775ac8,2024-04-04T16:33:06.610000 CVE-2024-2103,0,0,4357f6f4848f7c5880c727dbfe8b97df3dcf5303e95d5a7ff4fdf7062d775ac8,2024-04-04T16:33:06.610000
CVE-2024-21030,1,1,8c75cd82a8f7d8f0b15936cf6d46098c24517c837abffed713e5bd945e38d83b,2024-04-16T22:15:18.693000 CVE-2024-21030,0,0,8c75cd82a8f7d8f0b15936cf6d46098c24517c837abffed713e5bd945e38d83b,2024-04-16T22:15:18.693000
CVE-2024-21031,1,1,c3e812d2f8e98cd59e9540c74d0e9cb553f5ece98d75925a1b56d3bbce361cd2,2024-04-16T22:15:18.863000 CVE-2024-21031,0,0,c3e812d2f8e98cd59e9540c74d0e9cb553f5ece98d75925a1b56d3bbce361cd2,2024-04-16T22:15:18.863000
CVE-2024-21032,1,1,499cb3f8741ca1f408c1dcd3c8d692ae1425cdc63f5559df15066477b0dc19ba,2024-04-16T22:15:19.037000 CVE-2024-21032,0,0,499cb3f8741ca1f408c1dcd3c8d692ae1425cdc63f5559df15066477b0dc19ba,2024-04-16T22:15:19.037000
CVE-2024-21033,1,1,36a7a29b617aa82862f772ac68dfac89363af58e6785de33e573f8e9de5a8eef,2024-04-16T22:15:19.210000 CVE-2024-21033,0,0,36a7a29b617aa82862f772ac68dfac89363af58e6785de33e573f8e9de5a8eef,2024-04-16T22:15:19.210000
CVE-2024-21034,1,1,96b1b958abb28057efb16bf53f9081378e1a8597a26e68bf2ff74d6e74ffd1d1,2024-04-16T22:15:19.390000 CVE-2024-21034,0,0,96b1b958abb28057efb16bf53f9081378e1a8597a26e68bf2ff74d6e74ffd1d1,2024-04-16T22:15:19.390000
CVE-2024-21035,1,1,8ac65dec34215388d64935bd78bb407e666777cfaa56822d31f5d358af6e1703,2024-04-16T22:15:19.597000 CVE-2024-21035,0,0,8ac65dec34215388d64935bd78bb407e666777cfaa56822d31f5d358af6e1703,2024-04-16T22:15:19.597000
CVE-2024-21036,1,1,dfb62af68cf8f5531d93994ea82cf061a87328cfbee66223e1ad40c35760ee84,2024-04-16T22:15:19.760000 CVE-2024-21036,0,0,dfb62af68cf8f5531d93994ea82cf061a87328cfbee66223e1ad40c35760ee84,2024-04-16T22:15:19.760000
CVE-2024-21037,1,1,afa37d25738d1d39f16f2d11e420320b2c4db922bfbda666d8a23aee4e319893,2024-04-16T22:15:19.927000 CVE-2024-21037,0,0,afa37d25738d1d39f16f2d11e420320b2c4db922bfbda666d8a23aee4e319893,2024-04-16T22:15:19.927000
CVE-2024-21038,1,1,dac915e59cabfb89e49d571f6a56814b47a31584a817f2ba1defb6ea2b194cd0,2024-04-16T22:15:20.093000 CVE-2024-21038,0,0,dac915e59cabfb89e49d571f6a56814b47a31584a817f2ba1defb6ea2b194cd0,2024-04-16T22:15:20.093000
CVE-2024-21039,1,1,10c002d202bcb8f75d80fbc44d870be2bd541f746a3e99df7badd5aec0381758,2024-04-16T22:15:20.260000 CVE-2024-21039,0,0,10c002d202bcb8f75d80fbc44d870be2bd541f746a3e99df7badd5aec0381758,2024-04-16T22:15:20.260000
CVE-2024-21040,1,1,8015f1922e39d2758e23274ad121b8562da082d2d16784253be3d7334eae36bb,2024-04-16T22:15:20.427000 CVE-2024-21040,0,0,8015f1922e39d2758e23274ad121b8562da082d2d16784253be3d7334eae36bb,2024-04-16T22:15:20.427000
CVE-2024-21041,1,1,9873619ff3ccc808457024a3e299af127d4cd31d336f9b4bf19b0afc66c97716,2024-04-16T22:15:20.597000 CVE-2024-21041,0,0,9873619ff3ccc808457024a3e299af127d4cd31d336f9b4bf19b0afc66c97716,2024-04-16T22:15:20.597000
CVE-2024-21042,1,1,4fc812d7abc6f1a7d636889bf11cf3936cf019b65645c751c48e7fa624409187,2024-04-16T22:15:20.773000 CVE-2024-21042,0,0,4fc812d7abc6f1a7d636889bf11cf3936cf019b65645c751c48e7fa624409187,2024-04-16T22:15:20.773000
CVE-2024-21043,1,1,dcfbc27b4e7222c1224ffa3288921051b06130e94ff55574e264140a91e90396,2024-04-16T22:15:20.943000 CVE-2024-21043,0,0,dcfbc27b4e7222c1224ffa3288921051b06130e94ff55574e264140a91e90396,2024-04-16T22:15:20.943000
CVE-2024-21044,1,1,790353004fa605e951782be705be4dcba3252301003564ca908360f3680aaf3b,2024-04-16T22:15:21.110000 CVE-2024-21044,0,0,790353004fa605e951782be705be4dcba3252301003564ca908360f3680aaf3b,2024-04-16T22:15:21.110000
CVE-2024-21045,1,1,0970dedfc25c26e9989960e5bf6a924f819d62e089aa4d68300d517eee99c858,2024-04-16T22:15:21.287000 CVE-2024-21045,0,0,0970dedfc25c26e9989960e5bf6a924f819d62e089aa4d68300d517eee99c858,2024-04-16T22:15:21.287000
CVE-2024-21046,1,1,0e9cbe2c07294db14dab6bbcef2dcdb15b4af36a0279e290c37493804747890c,2024-04-16T22:15:21.460000 CVE-2024-21046,0,0,0e9cbe2c07294db14dab6bbcef2dcdb15b4af36a0279e290c37493804747890c,2024-04-16T22:15:21.460000
CVE-2024-21047,1,1,825793c807831c0337a4fdabe2fc398ca366be96d6b0fcd2e453207aee55e1d4,2024-04-16T22:15:21.643000 CVE-2024-21047,0,0,825793c807831c0337a4fdabe2fc398ca366be96d6b0fcd2e453207aee55e1d4,2024-04-16T22:15:21.643000
CVE-2024-21048,1,1,6fc80fd63f07c5f81a654ccaf350b061a6d70adad335bd2b377644e3cb63173f,2024-04-16T22:15:21.810000 CVE-2024-21048,0,0,6fc80fd63f07c5f81a654ccaf350b061a6d70adad335bd2b377644e3cb63173f,2024-04-16T22:15:21.810000
CVE-2024-21049,1,1,062a98d80f686aa654f81f8f28b989eacb62bf1b30a7d30cddc300418d7e2855,2024-04-16T22:15:21.990000 CVE-2024-21049,0,0,062a98d80f686aa654f81f8f28b989eacb62bf1b30a7d30cddc300418d7e2855,2024-04-16T22:15:21.990000
CVE-2024-21050,1,1,c7967f475ab5b694532d707ab2561ebfd794b9cf6a29ab2bcdbce77a989a5b83,2024-04-16T22:15:22.157000 CVE-2024-21050,0,0,c7967f475ab5b694532d707ab2561ebfd794b9cf6a29ab2bcdbce77a989a5b83,2024-04-16T22:15:22.157000
CVE-2024-21051,1,1,bfcbbd2f3e85d7953d1436f3cf7c2c6f02b0f2977632fca40758580128f7112d,2024-04-16T22:15:22.330000 CVE-2024-21051,0,0,bfcbbd2f3e85d7953d1436f3cf7c2c6f02b0f2977632fca40758580128f7112d,2024-04-16T22:15:22.330000
CVE-2024-21052,1,1,ae16c308947c086073bb6d5e0f4ac12dd9329b0ca8c55fdb909fdd75ea492e19,2024-04-16T22:15:22.500000 CVE-2024-21052,0,0,ae16c308947c086073bb6d5e0f4ac12dd9329b0ca8c55fdb909fdd75ea492e19,2024-04-16T22:15:22.500000
CVE-2024-21053,1,1,755e699b39ad98f6e83a02ac9f41f5c69bd3030c128249a1025cd68e2dd962dc,2024-04-16T22:15:22.673000 CVE-2024-21053,0,0,755e699b39ad98f6e83a02ac9f41f5c69bd3030c128249a1025cd68e2dd962dc,2024-04-16T22:15:22.673000
CVE-2024-21054,1,1,5392b2f1a92dfa22b4167767b909f7c0c1a3e0addbaac0cd74f99df10664013c,2024-04-16T22:15:22.840000 CVE-2024-21054,0,0,5392b2f1a92dfa22b4167767b909f7c0c1a3e0addbaac0cd74f99df10664013c,2024-04-16T22:15:22.840000
CVE-2024-21055,1,1,d87b01faf34859398519021f0c35bc98385c0588792b07e6a4dc7f20508bec9a,2024-04-16T22:15:23.010000 CVE-2024-21055,0,0,d87b01faf34859398519021f0c35bc98385c0588792b07e6a4dc7f20508bec9a,2024-04-16T22:15:23.010000
CVE-2024-21056,1,1,a31cbb0adfdf342a78b978d6813898086c6ecd42d5a8cb9c6dd380f29845de8e,2024-04-16T22:15:23.183000 CVE-2024-21056,0,0,a31cbb0adfdf342a78b978d6813898086c6ecd42d5a8cb9c6dd380f29845de8e,2024-04-16T22:15:23.183000
CVE-2024-21057,1,1,f7d92b4b5c779319636a820a9209f8646e774bf5819a744395f1b5b2ad706229,2024-04-16T22:15:23.350000 CVE-2024-21057,0,0,f7d92b4b5c779319636a820a9209f8646e774bf5819a744395f1b5b2ad706229,2024-04-16T22:15:23.350000
CVE-2024-21058,1,1,5905a9d121afbaf74301e0c7ae0502ddc1e6e69dde9f71547f594e81858a270a,2024-04-16T22:15:23.570000 CVE-2024-21058,0,0,5905a9d121afbaf74301e0c7ae0502ddc1e6e69dde9f71547f594e81858a270a,2024-04-16T22:15:23.570000
CVE-2024-21059,1,1,649b4a7d796567ae5bbc4dd91d5af813f6b4d96443dd524c48e374c518e7f97c,2024-04-16T22:15:23.740000 CVE-2024-21059,0,0,649b4a7d796567ae5bbc4dd91d5af813f6b4d96443dd524c48e374c518e7f97c,2024-04-16T22:15:23.740000
CVE-2024-2106,0,0,15de6b929ace188c18cf26b3c461a92f15449ebc8c35903dbddfc1b7b27db756,2024-03-13T18:15:58.530000 CVE-2024-2106,0,0,15de6b929ace188c18cf26b3c461a92f15449ebc8c35903dbddfc1b7b27db756,2024-03-13T18:15:58.530000
CVE-2024-21060,1,1,9df78d1ff9b465d287a4dd45147bcaccecd135238082a5b8af90c54a70f4cf11,2024-04-16T22:15:23.910000 CVE-2024-21060,0,0,9df78d1ff9b465d287a4dd45147bcaccecd135238082a5b8af90c54a70f4cf11,2024-04-16T22:15:23.910000
CVE-2024-21061,1,1,1e0b82d131b021430ce55c8a53a9f066559ac19abb645545241777d555c24bf7,2024-04-16T22:15:24.080000 CVE-2024-21061,0,0,1e0b82d131b021430ce55c8a53a9f066559ac19abb645545241777d555c24bf7,2024-04-16T22:15:24.080000
CVE-2024-21062,1,1,9790253ba053a45bbf42752fe93f570398dfb5936bd5c386018a7eac7055ce31,2024-04-16T22:15:24.247000 CVE-2024-21062,0,0,9790253ba053a45bbf42752fe93f570398dfb5936bd5c386018a7eac7055ce31,2024-04-16T22:15:24.247000
CVE-2024-21063,1,1,3fc41f5e5c2dafb9b60cdd2e3f7c5d5c79c15ee9c491854dbc50b0a819c01b2d,2024-04-16T22:15:24.417000 CVE-2024-21063,0,0,3fc41f5e5c2dafb9b60cdd2e3f7c5d5c79c15ee9c491854dbc50b0a819c01b2d,2024-04-16T22:15:24.417000
CVE-2024-21064,1,1,a7cdbf2d59c586eea5f775e8c2b39cd9f279eebbf0087251f078c5d617b4281e,2024-04-16T22:15:24.607000 CVE-2024-21064,0,0,a7cdbf2d59c586eea5f775e8c2b39cd9f279eebbf0087251f078c5d617b4281e,2024-04-16T22:15:24.607000
CVE-2024-21065,1,1,66abc7dfaa92be88296241fef613906ee3919bbf7d1def9a1cb3fec2d7653199,2024-04-16T22:15:24.780000 CVE-2024-21065,0,0,66abc7dfaa92be88296241fef613906ee3919bbf7d1def9a1cb3fec2d7653199,2024-04-16T22:15:24.780000
CVE-2024-21066,1,1,142a6c2265900556cceab9d34617e3718b7776013c65658bcfb46ccbfb3459e4,2024-04-16T22:15:24.957000 CVE-2024-21066,0,0,142a6c2265900556cceab9d34617e3718b7776013c65658bcfb46ccbfb3459e4,2024-04-16T22:15:24.957000
CVE-2024-21067,1,1,5cc627357fc8705043284fe3ac0733a2da14d61428d3e0f80bd2f6b5eb1f63c6,2024-04-16T22:15:25.123000 CVE-2024-21067,0,0,5cc627357fc8705043284fe3ac0733a2da14d61428d3e0f80bd2f6b5eb1f63c6,2024-04-16T22:15:25.123000
CVE-2024-21068,1,1,4a7ac2cd2111973cd960c934dfef9cae24d6fd76bd51bc6550d90c4eb95bf2da,2024-04-16T22:15:25.307000 CVE-2024-21068,0,0,4a7ac2cd2111973cd960c934dfef9cae24d6fd76bd51bc6550d90c4eb95bf2da,2024-04-16T22:15:25.307000
CVE-2024-21069,1,1,0f3be47ebd42a12c253d947c093ea23553811150722322db34df1f26b0ec38e9,2024-04-16T22:15:25.473000 CVE-2024-21069,0,0,0f3be47ebd42a12c253d947c093ea23553811150722322db34df1f26b0ec38e9,2024-04-16T22:15:25.473000
CVE-2024-2107,0,0,b116f601239eee1477d732dcdf4bd402d2ca5c711c20a89df0a8e9dd54cd4cd1,2024-03-13T12:33:51.697000 CVE-2024-2107,0,0,b116f601239eee1477d732dcdf4bd402d2ca5c711c20a89df0a8e9dd54cd4cd1,2024-03-13T12:33:51.697000
CVE-2024-21070,1,1,efd8cac87e4b6da969debbe0a140a4b8cf90336f73c54d3bfbed050f9e18fbcd,2024-04-16T22:15:25.650000 CVE-2024-21070,0,0,efd8cac87e4b6da969debbe0a140a4b8cf90336f73c54d3bfbed050f9e18fbcd,2024-04-16T22:15:25.650000
CVE-2024-21071,1,1,46ceee7198115f41553c9a4513d77ca9512e88fadb7ce8a9bb7560ea54d257e2,2024-04-16T22:15:25.837000 CVE-2024-21071,0,0,46ceee7198115f41553c9a4513d77ca9512e88fadb7ce8a9bb7560ea54d257e2,2024-04-16T22:15:25.837000
CVE-2024-21072,1,1,a5a23651b65a242cbdbea488e766975d61a50d5b8428cb49079af082fa564b85,2024-04-16T22:15:26.020000 CVE-2024-21072,0,0,a5a23651b65a242cbdbea488e766975d61a50d5b8428cb49079af082fa564b85,2024-04-16T22:15:26.020000
CVE-2024-21073,1,1,a33d6d3f5ed3702aac4f54ec2fbb4350eca86125bc5e729be5e7fd2c02049648,2024-04-16T22:15:26.190000 CVE-2024-21073,0,0,a33d6d3f5ed3702aac4f54ec2fbb4350eca86125bc5e729be5e7fd2c02049648,2024-04-16T22:15:26.190000
CVE-2024-21074,1,1,33402acef89bc334aaa9262a840014354db29f887e67f0a4b3df7d08c1c8904d,2024-04-16T22:15:26.370000 CVE-2024-21074,0,0,33402acef89bc334aaa9262a840014354db29f887e67f0a4b3df7d08c1c8904d,2024-04-16T22:15:26.370000
CVE-2024-21075,1,1,0154f56151613c02ebab5ba51ece2900aa4b64e839725850bf78d1e03a203244,2024-04-16T22:15:26.543000 CVE-2024-21075,0,0,0154f56151613c02ebab5ba51ece2900aa4b64e839725850bf78d1e03a203244,2024-04-16T22:15:26.543000
CVE-2024-21076,1,1,8178fc4edd062f46988f1f4a8fc5aa3a3dcd627f8acccbcaaf2995f47a7427be,2024-04-16T22:15:26.720000 CVE-2024-21076,0,0,8178fc4edd062f46988f1f4a8fc5aa3a3dcd627f8acccbcaaf2995f47a7427be,2024-04-16T22:15:26.720000
CVE-2024-21077,1,1,9f8288887c7e0f6f240f2c7e84265acd75eb9222bd2398ddc131e30468a18b00,2024-04-16T22:15:26.887000 CVE-2024-21077,0,0,9f8288887c7e0f6f240f2c7e84265acd75eb9222bd2398ddc131e30468a18b00,2024-04-16T22:15:26.887000
CVE-2024-21078,1,1,3c7874e58f4fadbde5ecadf75319f5edf7b070595241da7671d167425b08e65d,2024-04-16T22:15:27.060000 CVE-2024-21078,0,0,3c7874e58f4fadbde5ecadf75319f5edf7b070595241da7671d167425b08e65d,2024-04-16T22:15:27.060000
CVE-2024-21079,1,1,bcaa3d01504f3aed2cbc5f2ca4da14aef825373b3a007dd2cc7b568241cb8430,2024-04-16T22:15:27.240000 CVE-2024-21079,0,0,bcaa3d01504f3aed2cbc5f2ca4da14aef825373b3a007dd2cc7b568241cb8430,2024-04-16T22:15:27.240000
CVE-2024-2108,0,0,c2fa70d90e7c92604d37599b63a68c51b88c7a208a94e63da1f79da8e05cb6df,2024-03-29T12:45:02.937000 CVE-2024-2108,0,0,c2fa70d90e7c92604d37599b63a68c51b88c7a208a94e63da1f79da8e05cb6df,2024-03-29T12:45:02.937000
CVE-2024-21080,1,1,506419e11331ff72984bd09d104ddfe8685395520d5ac80e14ff8ac5c84f146a,2024-04-16T22:15:27.423000 CVE-2024-21080,0,0,506419e11331ff72984bd09d104ddfe8685395520d5ac80e14ff8ac5c84f146a,2024-04-16T22:15:27.423000
CVE-2024-21081,1,1,c78792c3f39afcafd60c219866fcb36a956c9832eb232c1c9572078f4a08591f,2024-04-16T22:15:27.603000 CVE-2024-21081,0,0,c78792c3f39afcafd60c219866fcb36a956c9832eb232c1c9572078f4a08591f,2024-04-16T22:15:27.603000
CVE-2024-21082,1,1,f77a83ec86ff9b5f2d6e391b9cb694374233861e4c5c3fa975801495ab6d0945,2024-04-16T22:15:27.780000 CVE-2024-21082,0,0,f77a83ec86ff9b5f2d6e391b9cb694374233861e4c5c3fa975801495ab6d0945,2024-04-16T22:15:27.780000
CVE-2024-21083,1,1,d6b534689283c95fe2b039fcd8320a8b62a66467491e84d71e1a15629f01ad6e,2024-04-16T22:15:27.953000 CVE-2024-21083,0,0,d6b534689283c95fe2b039fcd8320a8b62a66467491e84d71e1a15629f01ad6e,2024-04-16T22:15:27.953000
CVE-2024-21084,1,1,ee870ceef89faae38b5dbb3a6fa9b59b95fe76200d0900e5677448159984ef74,2024-04-16T22:15:28.120000 CVE-2024-21084,0,0,ee870ceef89faae38b5dbb3a6fa9b59b95fe76200d0900e5677448159984ef74,2024-04-16T22:15:28.120000
CVE-2024-21085,1,1,9d0b2d426030a9f3752e6427374ef5c9f91de6303cceae89f8ac1d22cf81328b,2024-04-16T22:15:28.293000 CVE-2024-21085,0,0,9d0b2d426030a9f3752e6427374ef5c9f91de6303cceae89f8ac1d22cf81328b,2024-04-16T22:15:28.293000
CVE-2024-21086,1,1,6853eabdf6278c42c8c09baa0d58fb8d7f1fdc7db51716ad01dd11f4af81b5b8,2024-04-16T22:15:28.463000 CVE-2024-21086,0,0,6853eabdf6278c42c8c09baa0d58fb8d7f1fdc7db51716ad01dd11f4af81b5b8,2024-04-16T22:15:28.463000
CVE-2024-21087,1,1,d57791a54bf642931823a35d535e7d3861ad9e5954f4c08104a213f7d0727123,2024-04-16T22:15:28.640000 CVE-2024-21087,0,0,d57791a54bf642931823a35d535e7d3861ad9e5954f4c08104a213f7d0727123,2024-04-16T22:15:28.640000
CVE-2024-21088,1,1,a17f0514cf39facf253ab84a17038520bcda32765ac857f2e9ca82a2d3747707,2024-04-16T22:15:28.810000 CVE-2024-21088,0,0,a17f0514cf39facf253ab84a17038520bcda32765ac857f2e9ca82a2d3747707,2024-04-16T22:15:28.810000
CVE-2024-21089,1,1,11b7c05221b35bd34f660a7b0e940ed9dc2f1b267cbaa4da4c10375f3092eeb3,2024-04-16T22:15:28.987000 CVE-2024-21089,0,0,11b7c05221b35bd34f660a7b0e940ed9dc2f1b267cbaa4da4c10375f3092eeb3,2024-04-16T22:15:28.987000
CVE-2024-21090,1,1,17abdd47766ba0094990fee4939ca5978b7b4533e55387f5f4311b4ab060b463,2024-04-16T22:15:29.153000 CVE-2024-21090,0,0,17abdd47766ba0094990fee4939ca5978b7b4533e55387f5f4311b4ab060b463,2024-04-16T22:15:29.153000
CVE-2024-21091,1,1,d6dbb8737d85b2225cd3f1b3f4c9826ce57f22a6b3a1e3b614145c320433aeaa,2024-04-16T22:15:29.330000 CVE-2024-21091,0,0,d6dbb8737d85b2225cd3f1b3f4c9826ce57f22a6b3a1e3b614145c320433aeaa,2024-04-16T22:15:29.330000
CVE-2024-21092,1,1,13085862dff2d0d70db5aa721df742e4e34ce1681e25ec40439b4c18d8d3bcaa,2024-04-16T22:15:29.493000 CVE-2024-21092,0,0,13085862dff2d0d70db5aa721df742e4e34ce1681e25ec40439b4c18d8d3bcaa,2024-04-16T22:15:29.493000
CVE-2024-21093,1,1,83caaf46648b865a9b93f059bba012ab6371fb67867e0257bd7db50f6b1ecb45,2024-04-16T22:15:29.680000 CVE-2024-21093,0,0,83caaf46648b865a9b93f059bba012ab6371fb67867e0257bd7db50f6b1ecb45,2024-04-16T22:15:29.680000
CVE-2024-21094,1,1,d45c5c7fdff8ceb77f69fed7be619e733c1f374b12a101801bcb3d8a0fa5a058,2024-04-16T22:15:29.857000 CVE-2024-21094,0,0,d45c5c7fdff8ceb77f69fed7be619e733c1f374b12a101801bcb3d8a0fa5a058,2024-04-16T22:15:29.857000
CVE-2024-21095,1,1,4a1307ede28bcbfae60740f652030296311b8a6695d957880f6afbd5763e3484,2024-04-16T22:15:30.040000 CVE-2024-21095,0,0,4a1307ede28bcbfae60740f652030296311b8a6695d957880f6afbd5763e3484,2024-04-16T22:15:30.040000
CVE-2024-21096,1,1,b459d73844b617138fd2760b366425e31127d445372fe6288f31c0f80920c608,2024-04-16T22:15:30.207000 CVE-2024-21096,0,0,b459d73844b617138fd2760b366425e31127d445372fe6288f31c0f80920c608,2024-04-16T22:15:30.207000
CVE-2024-21097,1,1,72f738b57505568a478ea2c60de7646fb54315315e48f1ba93269cb0c7504343,2024-04-16T22:15:30.380000 CVE-2024-21097,0,0,72f738b57505568a478ea2c60de7646fb54315315e48f1ba93269cb0c7504343,2024-04-16T22:15:30.380000
CVE-2024-21098,1,1,df96563fb2f29cc30f31fc03506f044869b8557678039a960dc67e5c8597b05b,2024-04-16T22:15:30.550000 CVE-2024-21098,0,0,df96563fb2f29cc30f31fc03506f044869b8557678039a960dc67e5c8597b05b,2024-04-16T22:15:30.550000
CVE-2024-21099,1,1,015efa8e047defa6fcb6c22808377bb6c664ae72f397170368741fec56beaab9,2024-04-16T22:15:30.723000 CVE-2024-21099,0,0,015efa8e047defa6fcb6c22808377bb6c664ae72f397170368741fec56beaab9,2024-04-16T22:15:30.723000
CVE-2024-2110,0,0,1d85de629a97570a97242f5d089550bba2e60a5923838c39c1151e294a5fdcf3,2024-03-28T12:42:56.150000 CVE-2024-2110,0,0,1d85de629a97570a97242f5d089550bba2e60a5923838c39c1151e294a5fdcf3,2024-03-28T12:42:56.150000
CVE-2024-21100,1,1,65f4b990e5c1177693d8150b3620f028429badd2cbf28cb68593cd12826b98c8,2024-04-16T22:15:30.903000 CVE-2024-21100,0,0,65f4b990e5c1177693d8150b3620f028429badd2cbf28cb68593cd12826b98c8,2024-04-16T22:15:30.903000
CVE-2024-21101,1,1,205a96dc7470fb351180145d3cdce7c7c9eb3c6592002c301b60500c4d3862a4,2024-04-16T22:15:31.087000 CVE-2024-21101,0,0,205a96dc7470fb351180145d3cdce7c7c9eb3c6592002c301b60500c4d3862a4,2024-04-16T22:15:31.087000
CVE-2024-21102,1,1,fd6ecddf13e9f1b717eb08fc04a6df95beee401cfbf15a3bb4c954281f0def93,2024-04-16T22:15:31.270000 CVE-2024-21102,0,0,fd6ecddf13e9f1b717eb08fc04a6df95beee401cfbf15a3bb4c954281f0def93,2024-04-16T22:15:31.270000
CVE-2024-21103,1,1,7fe0cd3d775f2d4929321cd1e91952fb9e796e3cca582eab936d6b1a6bc8789f,2024-04-16T22:15:31.437000 CVE-2024-21103,0,0,7fe0cd3d775f2d4929321cd1e91952fb9e796e3cca582eab936d6b1a6bc8789f,2024-04-16T22:15:31.437000
CVE-2024-21104,1,1,7d3bbe7d5e67d3f3081b177bd6ce24fab8642fcd0e18503217960854db600f14,2024-04-16T22:15:31.600000 CVE-2024-21104,0,0,7d3bbe7d5e67d3f3081b177bd6ce24fab8642fcd0e18503217960854db600f14,2024-04-16T22:15:31.600000
CVE-2024-21105,1,1,c6c82ed533391705d921d7d663fca26f8cb5fbba647f7940984870fc92462394,2024-04-16T22:15:31.770000 CVE-2024-21105,0,0,c6c82ed533391705d921d7d663fca26f8cb5fbba647f7940984870fc92462394,2024-04-16T22:15:31.770000
CVE-2024-21106,1,1,a440deb88e8e20db2e6987326709f7d80f875be1c5f69a5e384aafd6b3bd9b01,2024-04-16T22:15:31.940000 CVE-2024-21106,0,0,a440deb88e8e20db2e6987326709f7d80f875be1c5f69a5e384aafd6b3bd9b01,2024-04-16T22:15:31.940000
CVE-2024-21107,1,1,5029111cee5505494873cf54cd9e5b9798870fea04c2fff6706de938aa0f7517,2024-04-16T22:15:32.110000 CVE-2024-21107,0,0,5029111cee5505494873cf54cd9e5b9798870fea04c2fff6706de938aa0f7517,2024-04-16T22:15:32.110000
CVE-2024-21108,1,1,8d7be3c709eccfbe101ee5cef1d3ec2931ee83675df371b94534759b34b70231,2024-04-16T22:15:32.277000 CVE-2024-21108,0,0,8d7be3c709eccfbe101ee5cef1d3ec2931ee83675df371b94534759b34b70231,2024-04-16T22:15:32.277000
CVE-2024-21109,1,1,d12751e34dcd097928859e398465186aa36e619a9859e286514cf6db13790c6e,2024-04-16T22:15:32.440000 CVE-2024-21109,0,0,d12751e34dcd097928859e398465186aa36e619a9859e286514cf6db13790c6e,2024-04-16T22:15:32.440000
CVE-2024-2111,0,0,bb223011165a425455ec8ad438d31acdc69716e592665db5e015c6e3c7a0ad9a,2024-03-28T12:42:56.150000 CVE-2024-2111,0,0,bb223011165a425455ec8ad438d31acdc69716e592665db5e015c6e3c7a0ad9a,2024-03-28T12:42:56.150000
CVE-2024-21110,1,1,26761757b8923b87fdad8881bb30129155b2254e03fc28e73cda4bfba8255bac,2024-04-16T22:15:32.617000 CVE-2024-21110,0,0,26761757b8923b87fdad8881bb30129155b2254e03fc28e73cda4bfba8255bac,2024-04-16T22:15:32.617000
CVE-2024-21111,1,1,df095bee2d0d9df82bab22d20b026708706025acd52e98e513beac77f52827f5,2024-04-16T22:15:32.780000 CVE-2024-21111,0,0,df095bee2d0d9df82bab22d20b026708706025acd52e98e513beac77f52827f5,2024-04-16T22:15:32.780000
CVE-2024-21112,1,1,069d3a8123248348b644bad2d78930a8c9ea5c4bb845cf44eeacd7c641d788b1,2024-04-16T22:15:32.957000 CVE-2024-21112,0,0,069d3a8123248348b644bad2d78930a8c9ea5c4bb845cf44eeacd7c641d788b1,2024-04-16T22:15:32.957000
CVE-2024-21113,1,1,76803a64f611335a6e0551a6c82d1a2639a5818f9f3522b5884b99b79d32c2d2,2024-04-16T22:15:33.127000 CVE-2024-21113,0,0,76803a64f611335a6e0551a6c82d1a2639a5818f9f3522b5884b99b79d32c2d2,2024-04-16T22:15:33.127000
CVE-2024-21114,1,1,d2792a216e32ffefda5d2f48c39458ebe07af8dcda2f07132c2a52a241cb73f5,2024-04-16T22:15:33.300000 CVE-2024-21114,0,0,d2792a216e32ffefda5d2f48c39458ebe07af8dcda2f07132c2a52a241cb73f5,2024-04-16T22:15:33.300000
CVE-2024-21115,1,1,6a46662c9b5efc5c1f2e808f40b64677e03aedeb61719d31d7b0c5007c622ec3,2024-04-16T22:15:33.467000 CVE-2024-21115,0,0,6a46662c9b5efc5c1f2e808f40b64677e03aedeb61719d31d7b0c5007c622ec3,2024-04-16T22:15:33.467000
CVE-2024-21116,1,1,14834822ae39f45be6e1818d460aca7d476d347ecd1b3cab8fc89440f6cdc08a,2024-04-16T22:15:33.653000 CVE-2024-21116,0,0,14834822ae39f45be6e1818d460aca7d476d347ecd1b3cab8fc89440f6cdc08a,2024-04-16T22:15:33.653000
CVE-2024-21117,1,1,8eed13b90291acecf3dc23f5b6f163cc82d0767ebaa6728f52bcaba32e3d4862,2024-04-16T22:15:33.860000 CVE-2024-21117,0,0,8eed13b90291acecf3dc23f5b6f163cc82d0767ebaa6728f52bcaba32e3d4862,2024-04-16T22:15:33.860000
CVE-2024-21118,1,1,e2d82afcceb4e6a924cca4e7dbbaa7758c4966011a84f5c5e7db46c9739a7c5f,2024-04-16T22:15:34.027000 CVE-2024-21118,0,0,e2d82afcceb4e6a924cca4e7dbbaa7758c4966011a84f5c5e7db46c9739a7c5f,2024-04-16T22:15:34.027000
CVE-2024-21119,1,1,96739194ecaf0753cb19bd4344c025f8b10ba9249c560f1afb8436afb10772be,2024-04-16T22:15:34.197000 CVE-2024-21119,0,0,96739194ecaf0753cb19bd4344c025f8b10ba9249c560f1afb8436afb10772be,2024-04-16T22:15:34.197000
CVE-2024-2112,0,0,a1cb4c4251bcffa2c05884275a870a25f5932616e05316e143e17d4e95c29cc7,2024-04-10T13:23:38.787000 CVE-2024-2112,0,0,a1cb4c4251bcffa2c05884275a870a25f5932616e05316e143e17d4e95c29cc7,2024-04-10T13:23:38.787000
CVE-2024-21120,1,1,2c10a4c4f0bf27a5cf89a1e352cf2cfb7d106ca8d02a564280e581432c5d7b2e,2024-04-16T22:15:34.427000 CVE-2024-21120,0,0,2c10a4c4f0bf27a5cf89a1e352cf2cfb7d106ca8d02a564280e581432c5d7b2e,2024-04-16T22:15:34.427000
CVE-2024-21121,1,1,7695af2159b0e1e40ba9ab362dfc500e7e8a5d7d0bee2db18be3f405cff4b285,2024-04-16T22:15:34.600000 CVE-2024-21121,0,0,7695af2159b0e1e40ba9ab362dfc500e7e8a5d7d0bee2db18be3f405cff4b285,2024-04-16T22:15:34.600000
CVE-2024-2113,0,0,1af2e189d0f766a4a77361c625e87ddcd239476cacd0eaf00d619a2d2d68e8de,2024-03-29T12:45:02.937000 CVE-2024-2113,0,0,1af2e189d0f766a4a77361c625e87ddcd239476cacd0eaf00d619a2d2d68e8de,2024-03-29T12:45:02.937000
CVE-2024-2115,0,0,d143f7e37acad4fe03aa4c56d721ecbb114e211aea88a809faac9f70095e9492,2024-04-05T12:40:52.763000 CVE-2024-2115,0,0,d143f7e37acad4fe03aa4c56d721ecbb114e211aea88a809faac9f70095e9492,2024-04-05T12:40:52.763000
CVE-2024-2116,0,0,0a8927d2c3af56415377e26a49eef636f1c80d9f9b3374c561d3bce1d3a48066,2024-03-29T12:45:02.937000 CVE-2024-2116,0,0,0a8927d2c3af56415377e26a49eef636f1c80d9f9b3374c561d3bce1d3a48066,2024-03-29T12:45:02.937000
@ -241008,6 +241008,7 @@ CVE-2024-22339,0,0,141d87c0954232284d5d12d393f2f8e1e8696b0a8047869855deb4538b3a4
CVE-2024-22346,0,0,638ee4e9687c7c28032b432c317662713c057110b08b4b27024e81eb8453bf9e,2024-03-19T16:50:10.570000 CVE-2024-22346,0,0,638ee4e9687c7c28032b432c317662713c057110b08b4b27024e81eb8453bf9e,2024-03-19T16:50:10.570000
CVE-2024-22352,0,0,8ad74f9c108b142191e10d9f1af5800c7055fc5b8e79f7a9a2cf40171c06b8cd,2024-04-01T15:23:54.530000 CVE-2024-22352,0,0,8ad74f9c108b142191e10d9f1af5800c7055fc5b8e79f7a9a2cf40171c06b8cd,2024-04-01T15:23:54.530000
CVE-2024-22353,0,0,dcde4e1942667b685d2979f87ac00f95d42a8fc5d16f7dbd8bc9f66a2b78dfbb,2024-04-02T17:56:57.187000 CVE-2024-22353,0,0,dcde4e1942667b685d2979f87ac00f95d42a8fc5d16f7dbd8bc9f66a2b78dfbb,2024-04-02T17:56:57.187000
CVE-2024-22354,1,1,bdfa300bb19567b9b647b45bfb1936cce7cbfd7755aa9bda72c5f262de719e77,2024-04-17T01:15:06.747000
CVE-2024-22355,0,0,d5e1a0b55aa53f554235616979c7aa7e85f01ce7f183bc4e8573dd18cbbe1419,2024-03-04T13:58:23.447000 CVE-2024-22355,0,0,d5e1a0b55aa53f554235616979c7aa7e85f01ce7f183bc4e8573dd18cbbe1419,2024-03-04T13:58:23.447000
CVE-2024-22356,0,0,d81d64e63fe9b642cced3e4c94acc5e30f0113b5fdf3bed9ebc6028d04aab3ff,2024-03-26T17:09:53.043000 CVE-2024-22356,0,0,d81d64e63fe9b642cced3e4c94acc5e30f0113b5fdf3bed9ebc6028d04aab3ff,2024-03-26T17:09:53.043000
CVE-2024-22357,0,0,7cc996f78175ddc6bc31990b99ad084fcec784716961a600ab611825166f830e,2024-04-12T12:43:57.400000 CVE-2024-22357,0,0,7cc996f78175ddc6bc31990b99ad084fcec784716961a600ab611825166f830e,2024-04-12T12:43:57.400000
@ -243418,7 +243419,7 @@ CVE-2024-27081,0,0,6ed48c106db6d65065e952974db0889dd604820642a515b665b4199918a2e
CVE-2024-27083,0,0,439f4c8be88c938a8485e647a1e9fd875d817bf6451ed77ccc44b8a92bcaf08b,2024-02-29T13:49:29.390000 CVE-2024-27083,0,0,439f4c8be88c938a8485e647a1e9fd875d817bf6451ed77ccc44b8a92bcaf08b,2024-02-29T13:49:29.390000
CVE-2024-27084,0,0,9d9dc56eb44342ebdf65f8df5857c4a42b535ee96f2998cb21e8400366ec79c8,2024-02-26T18:15:07.920000 CVE-2024-27084,0,0,9d9dc56eb44342ebdf65f8df5857c4a42b535ee96f2998cb21e8400366ec79c8,2024-02-26T18:15:07.920000
CVE-2024-27085,0,0,a2ba4a60d7fbf0824177f894b599cd2c1a40310aac61dbfaf7a03654f9a829eb,2024-03-17T22:38:29.433000 CVE-2024-27085,0,0,a2ba4a60d7fbf0824177f894b599cd2c1a40310aac61dbfaf7a03654f9a829eb,2024-03-17T22:38:29.433000
CVE-2024-27086,1,1,1d67aa5e8147b2b6d83154a177e9b24bdd25f87a85155a3f615e098de40e80cf,2024-04-16T22:15:34.783000 CVE-2024-27086,0,0,1d67aa5e8147b2b6d83154a177e9b24bdd25f87a85155a3f615e098de40e80cf,2024-04-16T22:15:34.783000
CVE-2024-27087,0,0,5b9b7040107e78bc917a74369bf7f558be05fd7da0faff9d2dcfc4d25d50686f,2024-02-26T22:10:40.463000 CVE-2024-27087,0,0,5b9b7040107e78bc917a74369bf7f558be05fd7da0faff9d2dcfc4d25d50686f,2024-02-26T22:10:40.463000
CVE-2024-27088,0,0,3fb76382074583fb576fbdf0cb4fa8d92b0b1baa24e2319c4835f05f8f5cd3a0,2024-02-26T22:10:40.463000 CVE-2024-27088,0,0,3fb76382074583fb576fbdf0cb4fa8d92b0b1baa24e2319c4835f05f8f5cd3a0,2024-02-26T22:10:40.463000
CVE-2024-27089,0,0,80888df8a8beb579eb58ecd8e5017bb9d7c0dad21161e687af8e50a608c5d017,2024-02-26T20:19:06.073000 CVE-2024-27089,0,0,80888df8a8beb579eb58ecd8e5017bb9d7c0dad21161e687af8e50a608c5d017,2024-02-26T20:19:06.073000
@ -243634,7 +243635,7 @@ CVE-2024-27572,0,0,6169a6a6221da5c6dbb1556f7b45e6b45c4deebae5e21607b1e3cfa478f1f
CVE-2024-27575,0,0,fe78cdbfc48ba2557faf61957a122c11738e27bfad3d91860b0cc50d57150a36,2024-04-07T04:15:07.723000 CVE-2024-27575,0,0,fe78cdbfc48ba2557faf61957a122c11738e27bfad3d91860b0cc50d57150a36,2024-04-07T04:15:07.723000
CVE-2024-2758,0,0,a3cb437eedb439caebfac4666310f05bccf69de779d818f9f315740c92bee7d8,2024-04-04T12:48:41.700000 CVE-2024-2758,0,0,a3cb437eedb439caebfac4666310f05bccf69de779d818f9f315740c92bee7d8,2024-04-04T12:48:41.700000
CVE-2024-2759,0,0,cb410b99122b16bbafd55e196fc83701c95bae09fba9353767401f5fe587c56c,2024-04-04T16:33:06.610000 CVE-2024-2759,0,0,cb410b99122b16bbafd55e196fc83701c95bae09fba9353767401f5fe587c56c,2024-04-04T16:33:06.610000
CVE-2024-27592,0,1,1ee880de3a9d61f4b25b2b3ac56dc03f1e8964452682bc0959dc8a13f2b2c67c,2024-04-16T23:15:08.690000 CVE-2024-27592,0,0,1ee880de3a9d61f4b25b2b3ac56dc03f1e8964452682bc0959dc8a13f2b2c67c,2024-04-16T23:15:08.690000
CVE-2024-27602,0,0,641d004f193cbc187bf560868353a5607871444565457a2a1f222c57bafe0082,2024-04-03T12:38:04.840000 CVE-2024-27602,0,0,641d004f193cbc187bf560868353a5607871444565457a2a1f222c57bafe0082,2024-04-03T12:38:04.840000
CVE-2024-27604,0,0,5dd90a20288c95f7805059ddcbf501c6de9e3b933a16f752b43bf101ed5f2058,2024-04-03T12:38:04.840000 CVE-2024-27604,0,0,5dd90a20288c95f7805059ddcbf501c6de9e3b933a16f752b43bf101ed5f2058,2024-04-03T12:38:04.840000
CVE-2024-27605,0,0,4f744199930e3e7e9b7f220c4e73a81bb4fe207bf4ecc2f618ea8f6d8437d165,2024-04-03T12:38:04.840000 CVE-2024-27605,0,0,4f744199930e3e7e9b7f220c4e73a81bb4fe207bf4ecc2f618ea8f6d8437d165,2024-04-03T12:38:04.840000
@ -244413,7 +244414,7 @@ CVE-2024-29275,0,0,402f5150501d1ad43199a2c93810407cb4bc9ca968149bb7f55410637d084
CVE-2024-29276,0,0,aca23a437429c144243dafb6e7ab7580683c55fe67f055697aafa1a11e9b270d,2024-04-02T12:50:42.233000 CVE-2024-29276,0,0,aca23a437429c144243dafb6e7ab7580683c55fe67f055697aafa1a11e9b270d,2024-04-02T12:50:42.233000
CVE-2024-29278,0,0,68d9b61e6ce874f8948705ce3cdb92754b448114cb863479c2e17e0909039bb0,2024-04-01T01:12:59.077000 CVE-2024-29278,0,0,68d9b61e6ce874f8948705ce3cdb92754b448114cb863479c2e17e0909039bb0,2024-04-01T01:12:59.077000
CVE-2024-2929,0,0,259a475f54199dd846f57ff088582fd42af9991bb7e5a0933d4c675cb91ec78a,2024-03-26T17:09:53.043000 CVE-2024-2929,0,0,259a475f54199dd846f57ff088582fd42af9991bb7e5a0933d4c675cb91ec78a,2024-03-26T17:09:53.043000
CVE-2024-29291,1,1,6a2d8654eba16cf8f9274638a5d2740bfaacd712a6909c05fea6da7b75867ef5,2024-04-16T23:15:08.767000 CVE-2024-29291,0,0,6a2d8654eba16cf8f9274638a5d2740bfaacd712a6909c05fea6da7b75867ef5,2024-04-16T23:15:08.767000
CVE-2024-29296,0,0,9df6519fa8f3cc846555f57a851c9ca9c85b64bc0579ecca8b9610940400afaa,2024-04-10T19:49:51.183000 CVE-2024-29296,0,0,9df6519fa8f3cc846555f57a851c9ca9c85b64bc0579ecca8b9610940400afaa,2024-04-10T19:49:51.183000
CVE-2024-2930,0,0,337492b179fbec8f39a448e0d835a264515add1a9cb1abd7b1714333878c14e4,2024-04-11T01:25:41.570000 CVE-2024-2930,0,0,337492b179fbec8f39a448e0d835a264515add1a9cb1abd7b1714333878c14e4,2024-04-11T01:25:41.570000
CVE-2024-29301,0,0,154c6ea8f36ae553114269a1e880d159b7e9b09b869cc177af921f11e043c79a,2024-03-26T12:55:05.010000 CVE-2024-29301,0,0,154c6ea8f36ae553114269a1e880d159b7e9b09b869cc177af921f11e043c79a,2024-03-26T12:55:05.010000
@ -244438,7 +244439,7 @@ CVE-2024-29399,0,0,1f0a560642c5bcb6053c3eb35cf9c158aa499897c937eeb4d73efac983ff0
CVE-2024-2940,0,0,dc7b546b238f5f17f29f90e2f8349ff92580baece4e80a8faa65880503340f4e,2024-04-11T01:25:42.140000 CVE-2024-2940,0,0,dc7b546b238f5f17f29f90e2f8349ff92580baece4e80a8faa65880503340f4e,2024-04-11T01:25:42.140000
CVE-2024-29400,0,0,7c7ba10951f85314b8517e4af19bc97a8e02a4fb9c2ebd30adadcdfaed825d5b,2024-04-12T12:43:46.210000 CVE-2024-29400,0,0,7c7ba10951f85314b8517e4af19bc97a8e02a4fb9c2ebd30adadcdfaed825d5b,2024-04-12T12:43:46.210000
CVE-2024-29401,0,0,679ee7eb07f94632974ee3a3d5e9f1f36658f780199e198816f5b2401b4eaa19,2024-03-26T17:09:53.043000 CVE-2024-29401,0,0,679ee7eb07f94632974ee3a3d5e9f1f36658f780199e198816f5b2401b4eaa19,2024-03-26T17:09:53.043000
CVE-2024-29402,1,1,341d0062e1e3703ec61d2d15457610f3a27ce85eb3ec1e564e0cae4943f7f4ff,2024-04-16T23:15:08.827000 CVE-2024-29402,0,0,341d0062e1e3703ec61d2d15457610f3a27ce85eb3ec1e564e0cae4943f7f4ff,2024-04-16T23:15:08.827000
CVE-2024-2941,0,0,74f5dafb13773046a00a2499c333058547dc5cb76d6e56fb667d3547eaae40b7,2024-04-11T01:25:42.230000 CVE-2024-2941,0,0,74f5dafb13773046a00a2499c333058547dc5cb76d6e56fb667d3547eaae40b7,2024-04-11T01:25:42.230000
CVE-2024-29413,0,0,a58c13bdf67afd8b98d238166eefb90262a9870531d3d5f182e9810c30b452cd,2024-04-04T12:48:41.700000 CVE-2024-29413,0,0,a58c13bdf67afd8b98d238166eefb90262a9870531d3d5f182e9810c30b452cd,2024-04-04T12:48:41.700000
CVE-2024-29419,0,0,2f1c2a30167616ce2f7264d13a2e39c4e307caf2a0fab8a1d39f77c0f2b7d31b,2024-03-20T17:18:21.343000 CVE-2024-29419,0,0,2f1c2a30167616ce2f7264d13a2e39c4e307caf2a0fab8a1d39f77c0f2b7d31b,2024-03-20T17:18:21.343000
@ -244448,22 +244449,22 @@ CVE-2024-29432,0,0,935ce59b23319f15478ff1d005b1786853efcea9f20ed5b78b83dcf1879a3
CVE-2024-29433,0,0,b10a666a979afbf6ffc25b1ef458e1d0fb9c766493f3b32e8a3cbc2c3e4a9e2b,2024-04-02T12:50:42.233000 CVE-2024-29433,0,0,b10a666a979afbf6ffc25b1ef458e1d0fb9c766493f3b32e8a3cbc2c3e4a9e2b,2024-04-02T12:50:42.233000
CVE-2024-29434,0,0,e2dd739e4fe1b524f01d6355aa24f60868a619e4b33fdd429c31c5ef2f0acc1e,2024-04-03T12:38:04.840000 CVE-2024-29434,0,0,e2dd739e4fe1b524f01d6355aa24f60868a619e4b33fdd429c31c5ef2f0acc1e,2024-04-03T12:38:04.840000
CVE-2024-29435,0,0,4d03d83d8cb615246ed4e783c1ea07f9aee9ed7e6aa6133cefbb15bfb0a5c168,2024-04-02T12:50:42.233000 CVE-2024-29435,0,0,4d03d83d8cb615246ed4e783c1ea07f9aee9ed7e6aa6133cefbb15bfb0a5c168,2024-04-02T12:50:42.233000
CVE-2024-29439,0,0,7cf0a70cfb4668256337458d91ed2c0209386440e59360f7cd569e5c066d3d8d,2024-04-11T12:47:44.137000 CVE-2024-29439,0,1,0205a66ac068a0fed8b4662d4023b68fa4adb9fa7499a4326f16862215fea4b8,2024-04-17T01:15:06.960000
CVE-2024-2944,0,0,bf30485559894333f745f8eef196b6be024a5609ef9407e8d76f3c04dece3bb3,2024-04-11T01:25:42.527000 CVE-2024-2944,0,0,bf30485559894333f745f8eef196b6be024a5609ef9407e8d76f3c04dece3bb3,2024-04-11T01:25:42.527000
CVE-2024-29440,0,0,b41dbba691936eb263a6e48ee2f4c3b0c65bf928cbb922caedd1e0f5f03baacf,2024-03-26T12:55:05.010000 CVE-2024-29440,0,1,af28a7195ddd19f2e67b02ed43c4f4341cb5c6ec19029799938ddd4abf8d0399,2024-04-17T01:15:07.027000
CVE-2024-29441,0,0,7d177bd767a6ee2302e79b98db9366f551a06c46417701848d75068973be5d72,2024-04-11T12:47:44.137000 CVE-2024-29441,0,1,35a8862c80edd55d8f6f1f7f96310445af4e66d2a40a9a30fe2890e069ec42af,2024-04-17T01:15:07.100000
CVE-2024-29442,0,0,7905121fe561461f75c739d09685b7ffc46a6e6f08464603a503f7d567bf4eab,2024-03-26T12:55:05.010000 CVE-2024-29442,0,1,7ff49f29e2f39247b7a7da6b71ca7cefc102718291b2dcc233bbed2e5c3c9ec4,2024-04-17T01:15:07.160000
CVE-2024-29443,0,0,56c4a998b5da875c2f7671831ef2b48002f3c56461a59b8a1dbbd2d293ca92b5,2024-04-11T12:47:44.137000 CVE-2024-29443,0,1,d929f321c3d21e8622db40f1944b5510ec4816666c9ced5fe335f499a545092e,2024-04-17T01:15:07.220000
CVE-2024-29444,0,0,0268c5b80999b51afe8710a3826f9f5f0fd5248ec4523b9a74cbe1ada6ad287b,2024-04-11T12:47:44.137000 CVE-2024-29444,0,1,e5aa07e55753f8a4ec71925e02be0a52213dfefefea4e302a21efb8c1d3ee699,2024-04-17T01:15:07.273000
CVE-2024-29445,0,0,cc3751764af52423ac5b7dc05636571bd50b99f4e8200f72021ee84ebbcf377e,2024-04-11T12:47:44.137000 CVE-2024-29445,0,1,0b8a34c13cad5d63754cf7a09d2edd2bb80ad06c0db1b2c5a0a31cd1fa908c27,2024-04-17T01:15:07.333000
CVE-2024-29447,0,0,e1180cdede2080c441e7d0c7f49606d27c37531b26d1a8fd47e476e26ff10081,2024-04-11T12:47:44.137000 CVE-2024-29447,0,1,ba502ee99bcb8d923b6cb66caf4882a6855d51c812a2438755133264b6013996,2024-04-17T01:15:07.387000
CVE-2024-29448,0,0,4ba65fdbb0ca30d9cdfb72c06aca70585e95b847cd3e3e977305949fbe0c68bd,2024-04-11T12:47:44.137000 CVE-2024-29448,0,1,df2f9f29b404c769dd042d17aab40afdd52210be1a2f7c50bfc77c14d786385e,2024-04-17T01:15:07.443000
CVE-2024-29449,0,0,47dcba52f80d694fddef2a5c37e5d232752be79c6d29facb1f20baa4976bd45a,2024-04-11T12:47:44.137000 CVE-2024-29449,0,1,e2b92f652bb0da8723e25badd33aafae15d9403e758d915af68c443e1e5ad823,2024-04-17T01:15:07.510000
CVE-2024-2945,0,0,9a8b20f2d1f78244c8700886f61029534f24a9a5de87a4254b75a2868f9e961c,2024-04-11T01:25:42.617000 CVE-2024-2945,0,0,9a8b20f2d1f78244c8700886f61029534f24a9a5de87a4254b75a2868f9e961c,2024-04-11T01:25:42.617000
CVE-2024-29450,0,0,005fd00ff20c3a890af8b95157cd66876d6e8274cc9a8e97d7d9e2739fb8ba9d,2024-04-11T12:47:44.137000 CVE-2024-29450,0,1,9d33052158da9c8d287ef6f5672d7ae110c170c0ab4f2f6915e11584aad0766f,2024-04-17T01:15:07.560000
CVE-2024-29452,0,0,390452f7e03ee0abed26b2bb426d4b14b3ea2b82601f2db2f6e611b242e9dfeb,2024-04-11T12:47:44.137000 CVE-2024-29452,0,1,8d0b729784b4da60050ef65dc7953fe0bc8db84f2c38755d33415257a17e18a6,2024-04-17T01:15:07.617000
CVE-2024-29454,0,0,c5e740cd1abf29bb706f61bdcb9cac715190bdeda241ee5e4735d3e49da21397,2024-04-12T12:43:57.400000 CVE-2024-29454,0,1,368d46eea8baef98385d731c443c2f86a1fadef42a9f12cedec450801d7f564e,2024-04-17T01:15:07.677000
CVE-2024-29455,0,0,6e1789780e5aa8031c75de8caec34ad04dbe0084b961cab46e445dc7c45cfc0e,2024-04-11T12:47:44.137000 CVE-2024-29455,0,1,407cf55ddf9b5933109bc2c849de83fa36f35bf4ad5d595bc3c9616a07500c9f,2024-04-17T01:15:07.730000
CVE-2024-2946,0,0,b86288fa77fb47b4b83be2e46631f0944d38df3dbc98c9ee65a2d9324fa3b190,2024-04-10T13:23:38.787000 CVE-2024-2946,0,0,b86288fa77fb47b4b83be2e46631f0944d38df3dbc98c9ee65a2d9324fa3b190,2024-04-10T13:23:38.787000
CVE-2024-29460,0,0,b846dd78dc5e35e9b0ddcbf6b64c6fe8dd169ef35be60b3c712c2dd2787cb070,2024-04-11T12:47:44.137000 CVE-2024-29460,0,0,b846dd78dc5e35e9b0ddcbf6b64c6fe8dd169ef35be60b3c712c2dd2787cb070,2024-04-11T12:47:44.137000
CVE-2024-29461,0,0,0ea3979c495137b90acde4ca36a0a99c570c5e7619fef41ff59b36c98cf5a199,2024-04-15T13:15:51.577000 CVE-2024-29461,0,0,0ea3979c495137b90acde4ca36a0a99c570c5e7619fef41ff59b36c98cf5a199,2024-04-15T13:15:51.577000
@ -245064,46 +245065,46 @@ CVE-2024-30639,0,0,46b7c5471e103449855c9fbd2240c66d12c0c2b4b2c2dd58c9da71634c442
CVE-2024-3064,0,0,150d2695d7eeb315cec549f12d6c6ef3f6e02daaf223b84571983b190cdbdba2,2024-04-10T13:23:38.787000 CVE-2024-3064,0,0,150d2695d7eeb315cec549f12d6c6ef3f6e02daaf223b84571983b190cdbdba2,2024-04-10T13:23:38.787000
CVE-2024-30645,0,0,00b9821a66dbca80d2d2c9c63858e19e8817ea8f49dc6578caf9fd20dddfbebc,2024-04-01T01:12:59.077000 CVE-2024-30645,0,0,00b9821a66dbca80d2d2c9c63858e19e8817ea8f49dc6578caf9fd20dddfbebc,2024-04-01T01:12:59.077000
CVE-2024-30656,0,0,c800b352c15d86c6b7538edefbe50a56ea126bd7af414b5024084888358a8802,2024-04-16T13:24:07.103000 CVE-2024-30656,0,0,c800b352c15d86c6b7538edefbe50a56ea126bd7af414b5024084888358a8802,2024-04-16T13:24:07.103000
CVE-2024-30659,0,0,6b674dcc6172a28fd382455a39837aee02d1048828b479da4de736260a001915,2024-04-08T18:48:40.217000 CVE-2024-30659,0,1,61f850e3b46d205f26b3e244c5b08f3a3d93128b54ccec717c46733663eba23a,2024-04-17T01:15:07.787000
CVE-2024-30661,0,0,ca3a009dda716fdf3c3b4141a47c3533be46c4c31a5c8c5b65ef3f7e55a4c4a0,2024-04-08T18:48:40.217000 CVE-2024-30661,0,1,bcc8604f273e93c8e588ce1bdd1a9ece350083ce7e93f26c7dbf2e962081965b,2024-04-17T01:15:07.847000
CVE-2024-30662,0,0,71b80d6dafbe22437f2510bb021f4c17a7a897b19e7d2dd354177ad2cac3e4f3,2024-04-08T18:48:40.217000 CVE-2024-30662,0,1,27c70236e307dcf19582d3516b8d64f734a73d107753e425090972ed2be6a8c3,2024-04-17T01:15:07.907000
CVE-2024-30663,0,0,6e08db3f744a4228125df40199a08b9ee2a90f00728b6fca5a3d973b18d4de49,2024-04-08T18:48:40.217000 CVE-2024-30663,0,1,389a4d6fbcedf1650843d47373664a20a831bf84258e54b129c5846e59aba382,2024-04-17T01:15:07.960000
CVE-2024-30665,0,0,b0872b924bec224f9269c5d12f3e3e09bd037687bdf2355c6dca31778a639300,2024-04-08T18:48:40.217000 CVE-2024-30665,0,1,3f695edd1e72eb443a740aef3fbad69f618e99350100ab838b4c73d06b2cd9fa,2024-04-17T01:15:08.010000
CVE-2024-30666,0,0,c963b049325fad48121e774e7f87aeeb4db59eaee7ce9b24b135f03225a8605b,2024-04-08T18:48:40.217000 CVE-2024-30666,0,1,0d3ef8cfc85e5ff24ffc04b9608f814ebf69d0fee6728f8e86fd1a5651c999bc,2024-04-17T01:15:08.063000
CVE-2024-30667,0,0,ff284e163d8506ead82a88e1e0195d7345f11e18d3b36d2dad51ac5fe6f1c4e9,2024-04-08T18:48:40.217000 CVE-2024-30667,0,1,b34af94390a480d37fac45c6f18085a47b08b076475bdfd12c5edf2b7032fbf6,2024-04-17T01:15:08.117000
CVE-2024-3067,0,0,e9b1bebe389d4e514e7a9a61bf198949c5e392a49f5a0c35c052cf2a541b472e,2024-04-16T13:24:07.103000 CVE-2024-3067,0,0,e9b1bebe389d4e514e7a9a61bf198949c5e392a49f5a0c35c052cf2a541b472e,2024-04-16T13:24:07.103000
CVE-2024-30672,0,0,5f03fe7211bd8d45b5928b91a5ac0350abcfb5c5194aa5b0296fc94c9e863bc2,2024-04-08T18:48:40.217000 CVE-2024-30672,0,1,21a7acac87d2910f58d956dd2a9e74d0ae726019f37c821a2970b628587b3d1f,2024-04-17T01:15:08.170000
CVE-2024-30674,0,0,6ed6c67e9f9314eaeb2be25e85ad7999c533cc1beb21c8cb467ab7a893f16710,2024-04-08T18:48:40.217000 CVE-2024-30674,0,1,a1449c2fcf0ba16ad3e356fcb957a27686d489e53286578459faa6029c16eed6,2024-04-17T01:15:08.223000
CVE-2024-30675,0,0,8b91a2fb611ecb3c19dd6a14ce9d54a86e8a20f268f642c9f4e164c260b50edd,2024-04-08T18:48:40.217000 CVE-2024-30675,0,1,57aa3f2485756b52840d41b9ee07c4bdd5176287cdb2b12e4ff1d9b9e22a91bc,2024-04-17T01:15:08.283000
CVE-2024-30676,0,0,af724672b3075823cc7ac023ff0bd01b6766fd74313e164540f52e1f670069a5,2024-04-09T12:48:04.090000 CVE-2024-30676,0,1,39459d500da83bf48c4e52e965f9401b3e6d27a861b4a9bdfb0427cf44c6e8f6,2024-04-17T01:15:08.337000
CVE-2024-30678,0,0,28c2c42c15a87c8576562744982b7e6592c723e041b1251a726dc2914f0f31c2,2024-04-09T12:48:04.090000 CVE-2024-30678,0,1,760a12d68bfeaf49ed657df7eba66701a952b976c57457ed1c5bac7ccc1e8ace,2024-04-17T01:15:08.427000
CVE-2024-30679,0,0,1652ad2d7f751aa883b92dadc3db45d6131582879ab3f0ce2ce9b68ca301473c,2024-04-09T12:48:04.090000 CVE-2024-30679,0,1,3bc42854c1a1b42a98cb9b10bea930710bd7b156fc9f323745b5d962ad90145b,2024-04-17T01:15:08.510000
CVE-2024-30680,0,0,07cf4672c6cb5c0d37b128ff6292cf9dcf1d064a6b724bb71fb28d8b540ff210,2024-04-09T12:48:04.090000 CVE-2024-30680,0,1,225bff0e04855f6ba43ce3dc77ffa65b48b69bf375ccbb3f6145bd975882eac8,2024-04-17T01:15:08.577000
CVE-2024-30681,0,0,ddbe0c69f9ab035c7a353186f3b3cfb547957dc7577d22a08e0cab4ca1d951a2,2024-04-09T12:48:04.090000 CVE-2024-30681,0,1,10f3d4332220d3d49244a0c6fc169d3b7ce1a04f2f4ea8f3a3d1bd7df2f01529,2024-04-17T01:15:08.633000
CVE-2024-30683,0,0,95978317b9ff4fe100aa7b5187ca91600381e6090aadd857a6554499fc4fc767,2024-04-09T12:48:04.090000 CVE-2024-30683,0,1,3884021987e5d4e422886e5f27c1c7d6b1ef85f46375c2ad8005095bd832ff7c,2024-04-17T01:15:08.690000
CVE-2024-30684,0,0,93873bb3f77c6d6c1129e83df71a0c5dab8044941f95a0a1a2446d06a1a663f9,2024-04-09T12:48:04.090000 CVE-2024-30684,0,1,1fd31d9a4b0023b07c3d817589c127fb00824f9dae6fdf331662b52631f1f66a,2024-04-17T01:15:08.750000
CVE-2024-30686,0,0,cecb3b359a2c306a651201a597cd44f73ed8fc5e2479bc1e16493cf1b000f3d9,2024-04-09T12:48:04.090000 CVE-2024-30686,0,1,372e2063d26b39ed76584767891e58ea9974a9738b5f6375cd08231d98371c18,2024-04-17T01:15:08.813000
CVE-2024-30687,0,0,627c6f49d0e8696456211f5aadec2afbfb7309884605ed881f3f310eff8a28e0,2024-04-09T12:48:04.090000 CVE-2024-30687,0,1,a5e6380da51987e65e71b2a3b2fef33eb738ba9a88846b7bb72509a2c954f96f,2024-04-17T01:15:08.873000
CVE-2024-30688,0,0,be62ee228899213efd589c12a1c4722b462ed6c7cea897018d539f4060eeaef6,2024-04-09T12:48:04.090000 CVE-2024-30688,0,1,79739bd9f2d4df545ff015f26d898959a5b0ecb38d4d6666e06fd38c6975033f,2024-04-17T01:15:08.927000
CVE-2024-30690,0,0,758c0e580a22afa6415e22d45eb180157d5e27c3f7c136b941a2ccea1a631afb,2024-04-09T12:48:04.090000 CVE-2024-30690,0,1,140a6aa982a7c8e97b8b62a6a53e1b1d7f6388d33dda3e6ff0e96dea7677fcd1,2024-04-17T01:15:08.980000
CVE-2024-30691,0,0,23334283bdbb80ece84004a07a2d4f2fb30a9114f4de8009b41ca287700f7f5c,2024-04-09T12:48:04.090000 CVE-2024-30691,0,1,8c05019cb96b7089b3bebcb3edcc019e24a46548532893ddc2c0e397f82635fc,2024-04-17T01:15:09.033000
CVE-2024-30692,0,0,ff1ce2f91a7b26c24b130e2b00e06d5a248a15e5d50cd434ef04e50387645828,2024-04-09T12:48:04.090000 CVE-2024-30692,0,1,06ca4d2ab37709f6ab9bf0d85e3573d1ca79815c7ecaae46be13ac66b56a3ddd,2024-04-17T01:15:09.100000
CVE-2024-30694,0,0,7755c230805c1909d0e94175233f36be70321ff270a75af58c50d43db7f1ff2d,2024-04-09T12:48:04.090000 CVE-2024-30694,0,1,3099e365af6a2c20fcdaa1beed13525701c0a4995b3ba87662b83651d5c7b416,2024-04-17T01:15:09.160000
CVE-2024-30695,0,0,520c313ebed8e7aa062ef70d824f022571c815c409401bb881ea7203f9352df6,2024-04-09T12:48:04.090000 CVE-2024-30695,0,1,7775c65b9bf7cfc01e45de81af98531676ecde1914330362c254d870e6aeb882,2024-04-17T01:15:09.217000
CVE-2024-30696,0,0,f669e76cecff581f311ed5900046ffb74094191bccea9325de2ff009a7b30889,2024-04-09T12:48:04.090000 CVE-2024-30696,0,1,5cfb0bebfff5be81b08a66ffdb308cc0d717f7bc78842763dbd36b60ae1cf853,2024-04-17T01:15:09.273000
CVE-2024-30697,0,0,2bd165ee3b3f68656e20994b8433b623199f76c40a9ca0dc0dfa3acfa9da7f64,2024-04-09T12:48:04.090000 CVE-2024-30697,0,1,a33b26a0decfcbab9179239f13c3a84734fd06638ab06af16b814f4f2a89c8b2,2024-04-17T01:15:09.330000
CVE-2024-30699,0,0,9d56c28cee5445b90e131fb18f6cf806afce6628a108cb0836bb98a2b8089d77,2024-04-09T12:48:04.090000 CVE-2024-30699,0,1,33f0494142c66f999e1fc060019cb3357e23cf0f0f9cd0178e36e3656b4b0b3e,2024-04-17T01:15:09.387000
CVE-2024-30701,0,0,8e03ccf6659f5a4e378ff7d93a21c845259f9ec9ec9403dcafcfbc3a4ce924ba,2024-04-09T12:48:04.090000 CVE-2024-30701,0,1,d9e2f0824d5dd83e892e3ce43966cf2bdfbd3fef00786abfd3aa6448290c070d,2024-04-17T01:15:09.447000
CVE-2024-30702,0,0,3202ab3b96337818fa5697e074c56de6b3f80d2a2d54b4e19bbd152344839f49,2024-04-10T13:24:00.070000 CVE-2024-30702,0,1,a7485ca3f518262adefc8c57fc92be69ee8ce36b582283f4b90f1003ece220ac,2024-04-17T01:15:09.503000
CVE-2024-30703,0,0,d65523fa26837f143aa861c4b1ec22513e9119e27da48ccd66026c68d769da4b,2024-04-10T13:24:00.070000 CVE-2024-30703,0,1,54442d23a613c11d76912c327eec4b82d83de8b6e43e8f7687abaf2d44476e1a,2024-04-17T01:15:09.570000
CVE-2024-30704,0,0,4be6f74b234ab487793dbcc167bc99fcc85408b78dae088a65348367022464d8,2024-04-10T13:24:00.070000 CVE-2024-30704,0,1,d94ba684a619f657bfb5a4d11fa161cc621abbe0cb023edb9d4d35c3d8b92897,2024-04-17T01:15:09.627000
CVE-2024-30706,0,0,03893f8ba2617a63c8f0f690a761c749ad6c0a21548a544156d648c98f4fab3e,2024-04-10T13:23:38.787000 CVE-2024-30706,0,1,259fe5fd57667c60e8ecd49f3a41f82c05a7696135541ea18c275f1148086a25,2024-04-17T01:15:09.687000
CVE-2024-30707,0,0,b3787314c5b41663f817d28039ba162cb3c9b1be3feb9468dcb0c11582ff962f,2024-04-10T13:23:38.787000 CVE-2024-30707,0,1,75fbbcd765b686443df2ab41d6298e4f541e0e27b686cd4c3f6eca7fe2686679,2024-04-17T01:15:09.747000
CVE-2024-30708,0,0,10ddd37221e5a1c0cf70f11b4f20a4eb46a946eba4360a4f83ad136c08b7e804,2024-04-10T13:23:38.787000 CVE-2024-30708,0,1,50d3cc96fee682adc13619592ba9fff8db734f8bcbfa2240598f53f24dec4d3f,2024-04-17T01:15:09.810000
CVE-2024-30710,0,0,ad0b2fc27c744492bd638ad1270e2eb0cf591817d25e6033c0ebbfd623f99942,2024-04-10T13:23:38.787000 CVE-2024-30710,0,1,aa9587f53dd7dd520275ce6ccdb7f704ef700788ec68d53464f6a11fe9f3150a,2024-04-17T01:15:09.867000
CVE-2024-30711,0,0,1cca53fbf3011ffff61c60b94d4155920621fd56a5bd85710f9dff6c1e97a66c,2024-04-10T13:23:38.787000 CVE-2024-30711,0,1,19e7a31f2ede8ce10e1a843e1f235f9dd50314c74c6772cebbedced843e3ae9a,2024-04-17T01:15:09.923000
CVE-2024-30712,0,0,2c1a525e9cea1ecfad7022378dd4f3aa58224217a74c01672a3ebf64824c4f06,2024-04-10T13:23:38.787000 CVE-2024-30712,0,1,d203d5b108c4959ccd7826756f2bcdc1f5744cc6bc3ee08280dd09f5c3a0f5f1,2024-04-17T01:15:09.990000
CVE-2024-30713,0,0,1ea15ed5eb999cac822ad0963612cbe3e0ac75b03e995938d276ab7dceb0b420,2024-04-10T13:23:38.787000 CVE-2024-30713,0,1,3be2f8112058fd6aca88254eddb652d5fc76394b8fa76f80a823c68c59ab637a,2024-04-17T01:15:10.050000
CVE-2024-30715,0,0,c6d6a66c34447a93ef4e3806c199a13ce413008b74664924d9f13ad17ec1bad5,2024-04-10T13:23:38.787000 CVE-2024-30715,0,0,c6d6a66c34447a93ef4e3806c199a13ce413008b74664924d9f13ad17ec1bad5,2024-04-10T13:23:38.787000
CVE-2024-30716,0,0,c8d02ea62b2a81fadb2c085275572631890a964a411aa3e38b7d9807a9c89406,2024-04-10T13:23:38.787000 CVE-2024-30716,0,0,c8d02ea62b2a81fadb2c085275572631890a964a411aa3e38b7d9807a9c89406,2024-04-10T13:23:38.787000
CVE-2024-30718,0,0,c3c8f848e7ce91e0db0795469c5673815e2dc3f2aef9ffc4f4c5cfe3789bf72e,2024-04-10T13:23:38.787000 CVE-2024-30718,0,0,c3c8f848e7ce91e0db0795469c5673815e2dc3f2aef9ffc4f4c5cfe3789bf72e,2024-04-10T13:23:38.787000
@ -245398,7 +245399,7 @@ CVE-2024-31446,0,0,401b62f3afdfc4cc781dfe99d4a5c6abfe1f46e7322870afe10073c6356a7
CVE-2024-31447,0,0,1686ea065902cff688a9e0e72258f816c60304799af9644c7db6f9ae37572786,2024-04-08T18:48:40.217000 CVE-2024-31447,0,0,1686ea065902cff688a9e0e72258f816c60304799af9644c7db6f9ae37572786,2024-04-08T18:48:40.217000
CVE-2024-3145,0,0,30d7039ca4630abed1ac79b5e5068d170488eb4a6c9740ed0209e585b5eb2f84,2024-04-11T01:25:55.100000 CVE-2024-3145,0,0,30d7039ca4630abed1ac79b5e5068d170488eb4a6c9740ed0209e585b5eb2f84,2024-04-11T01:25:55.100000
CVE-2024-31451,0,0,10ad8ce607c3f80bebbdd47fed59e0fb48d83a52aa634e8a43b74ccc86bdeada,2024-04-16T15:15:36.687000 CVE-2024-31451,0,0,10ad8ce607c3f80bebbdd47fed59e0fb48d83a52aa634e8a43b74ccc86bdeada,2024-04-16T15:15:36.687000
CVE-2024-31452,1,1,0fefc3d1c5fa4caec6925c6b39b8cf95a91d230c6284b73215cdfa93397d3361,2024-04-16T22:15:35.003000 CVE-2024-31452,0,0,0fefc3d1c5fa4caec6925c6b39b8cf95a91d230c6284b73215cdfa93397d3361,2024-04-16T22:15:35.003000
CVE-2024-31453,0,0,1b1ead27c6870d2affe09236bc3123473d08b6ddf2bca0a49b08400d4b48a120,2024-04-10T13:24:00.070000 CVE-2024-31453,0,0,1b1ead27c6870d2affe09236bc3123473d08b6ddf2bca0a49b08400d4b48a120,2024-04-10T13:24:00.070000
CVE-2024-31454,0,0,facd63c9b966def9fa208ea7acce2b97e831e91313ffa612db120032d2a37c2c,2024-04-10T13:24:00.070000 CVE-2024-31454,0,0,facd63c9b966def9fa208ea7acce2b97e831e91313ffa612db120032d2a37c2c,2024-04-10T13:24:00.070000
CVE-2024-31455,0,0,58d58168822fd35b9c530d967e86c80a8aef11f5f1477a56943eec05e6715b25,2024-04-10T13:24:00.070000 CVE-2024-31455,0,0,58d58168822fd35b9c530d967e86c80a8aef11f5f1477a56943eec05e6715b25,2024-04-10T13:24:00.070000
@ -245412,8 +245413,9 @@ CVE-2024-3147,0,0,f05061e9d718b866336ceef3f83885c168403f8d387cf11dbe00ac736df358
CVE-2024-3148,0,0,12b6e15e00d964ce79c059c99a6c4df70691a740ad2056657f2d4843c78fc654,2024-04-11T01:25:55.337000 CVE-2024-3148,0,0,12b6e15e00d964ce79c059c99a6c4df70691a740ad2056657f2d4843c78fc654,2024-04-11T01:25:55.337000
CVE-2024-31487,0,0,ffef7fcdc05bb476a1f2c02c71de4a76075ea7f0301d6a8889db629ce9b194c6,2024-04-10T13:24:22.187000 CVE-2024-31487,0,0,ffef7fcdc05bb476a1f2c02c71de4a76075ea7f0301d6a8889db629ce9b194c6,2024-04-10T13:24:22.187000
CVE-2024-31492,0,0,a251126d380ad734bdcae40155276c0c8cd0f78c057d6c232814179759c90bf9,2024-04-10T19:49:51.183000 CVE-2024-31492,0,0,a251126d380ad734bdcae40155276c0c8cd0f78c057d6c232814179759c90bf9,2024-04-10T19:49:51.183000
CVE-2024-31497,0,1,92d3946f715279db269d1f9ac34c9dfc89e5dc1e10b2248a9304d809932b0d4b,2024-04-16T23:15:08.903000 CVE-2024-31497,0,0,92d3946f715279db269d1f9ac34c9dfc89e5dc1e10b2248a9304d809932b0d4b,2024-04-16T23:15:08.903000
CVE-2024-31498,0,0,db3c4e2337e3fccc66e084ef6016d8532925f451bef4124b0c2782f0c54d90b6,2024-04-08T00:15:08 CVE-2024-31498,0,0,db3c4e2337e3fccc66e084ef6016d8532925f451bef4124b0c2782f0c54d90b6,2024-04-08T00:15:08
CVE-2024-31503,1,1,6732ad15c4a40e957bb3d152a5a45a842a9476ad49235e6a47c63246ef12081f,2024-04-17T00:15:07.220000
CVE-2024-31506,0,0,8be7ef5b3e9d65e4bba9dd63e2b7475f0658a4b183369094a98038d4eee40099,2024-04-10T13:24:00.070000 CVE-2024-31506,0,0,8be7ef5b3e9d65e4bba9dd63e2b7475f0658a4b183369094a98038d4eee40099,2024-04-10T13:24:00.070000
CVE-2024-31507,0,0,8a4d05957463fb55563022c4622a2463374ff774a0631f4c63214875a7c78bee,2024-04-10T13:24:00.070000 CVE-2024-31507,0,0,8a4d05957463fb55563022c4622a2463374ff774a0631f4c63214875a7c78bee,2024-04-10T13:24:00.070000
CVE-2024-3151,0,0,2dd1cf236cf7e4dbb7d9720cf950d856f9b652cd7c08d701ecc784bea1322bb1,2024-04-11T01:25:55.410000 CVE-2024-3151,0,0,2dd1cf236cf7e4dbb7d9720cf950d856f9b652cd7c08d701ecc784bea1322bb1,2024-04-11T01:25:55.410000
@ -245435,8 +245437,9 @@ CVE-2024-31651,0,0,449580f383ba06b10b890173ddf2d62af7a188eb69db82466ee9152e4b087
CVE-2024-31652,0,0,208b4f263a9a44614b423f2ea1b775ae64777df67f6e60b98c2159dddb5c4a0b,2024-04-16T13:24:07.103000 CVE-2024-31652,0,0,208b4f263a9a44614b423f2ea1b775ae64777df67f6e60b98c2159dddb5c4a0b,2024-04-16T13:24:07.103000
CVE-2024-3167,0,0,f4a160a1382e038713f603968880deb87a3b362a15bab9fc55aa42721dc9dd6e,2024-04-10T13:23:38.787000 CVE-2024-3167,0,0,f4a160a1382e038713f603968880deb87a3b362a15bab9fc55aa42721dc9dd6e,2024-04-10T13:23:38.787000
CVE-2024-31678,0,0,6d17d4ce9eaa15ebb6367a838566d027b53ddba56e09f333fd8cadacfd1d2447,2024-04-12T12:44:04.930000 CVE-2024-31678,0,0,6d17d4ce9eaa15ebb6367a838566d027b53ddba56e09f333fd8cadacfd1d2447,2024-04-12T12:44:04.930000
CVE-2024-31759,1,1,c6aaf263d8cac477abe21ca43dad0802ddd036edc2b440e2698a5e9834c14b52,2024-04-16T23:15:09.047000 CVE-2024-31680,1,1,919dab49ae68abbaa13231e8eecbea48a6d9fca067eef112002bd5ac041cce3b,2024-04-17T00:15:07.293000
CVE-2024-31760,1,1,83c2ca70e34af03377fc0a0219cb672ad960b263ff17cdbd5820fe03fc170075,2024-04-16T23:15:09.107000 CVE-2024-31759,0,0,c6aaf263d8cac477abe21ca43dad0802ddd036edc2b440e2698a5e9834c14b52,2024-04-16T23:15:09.047000
CVE-2024-31760,0,0,83c2ca70e34af03377fc0a0219cb672ad960b263ff17cdbd5820fe03fc170075,2024-04-16T23:15:09.107000
CVE-2024-3178,0,0,e1b2edc538f836ffb506a17d476e0f961db2588242ddd1b2358ad3487cd818bf,2024-04-04T12:48:41.700000 CVE-2024-3178,0,0,e1b2edc538f836ffb506a17d476e0f961db2588242ddd1b2358ad3487cd818bf,2024-04-04T12:48:41.700000
CVE-2024-31783,0,0,a7054e74fa1a557567cd0f4452494e62f528f37b2972c2343d20292f99336f13,2024-04-16T13:24:07.103000 CVE-2024-31783,0,0,a7054e74fa1a557567cd0f4452494e62f528f37b2972c2343d20292f99336f13,2024-04-16T13:24:07.103000
CVE-2024-31784,0,0,0055eda0e2e2e3cebbac3d895c086f3674073feab99e847bee4ca99f9495a801,2024-04-16T13:24:07.103000 CVE-2024-31784,0,0,0055eda0e2e2e3cebbac3d895c086f3674073feab99e847bee4ca99f9495a801,2024-04-16T13:24:07.103000
@ -245476,7 +245479,7 @@ CVE-2024-31871,0,0,2e9cb20a8839296f42d6bc6aa4eee6ec286fed065eef42e4971f116c0f81a
CVE-2024-31872,0,0,7d09da772d85c1598253bebf81c543077ef995af0f84d1cf088132605a2400f9,2024-04-10T19:49:51.183000 CVE-2024-31872,0,0,7d09da772d85c1598253bebf81c543077ef995af0f84d1cf088132605a2400f9,2024-04-10T19:49:51.183000
CVE-2024-31873,0,0,30397559953deb34a9ae192149473632dc6b2334245e920787a4c5e14fc76375,2024-04-10T19:49:51.183000 CVE-2024-31873,0,0,30397559953deb34a9ae192149473632dc6b2334245e920787a4c5e14fc76375,2024-04-10T19:49:51.183000
CVE-2024-31874,0,0,1770e58d0ae5591eb931a8cdfdb054fb4d854f81849d14af250c71db6caf553c,2024-04-10T19:49:51.183000 CVE-2024-31874,0,0,1770e58d0ae5591eb931a8cdfdb054fb4d854f81849d14af250c71db6caf553c,2024-04-10T19:49:51.183000
CVE-2024-31887,1,1,fc8d9e19ae4d266bf0e07275be6dc695fb1e244ff60ad6d3372609e811f9591d,2024-04-16T22:15:35.240000 CVE-2024-31887,0,0,fc8d9e19ae4d266bf0e07275be6dc695fb1e244ff60ad6d3372609e811f9591d,2024-04-16T22:15:35.240000
CVE-2024-31920,0,0,1a6309492e6d112b6d5c74c55b809c13a9ffaf43e5c668b35b54f9c1433bee12,2024-04-15T13:15:31.997000 CVE-2024-31920,0,0,1a6309492e6d112b6d5c74c55b809c13a9ffaf43e5c668b35b54f9c1433bee12,2024-04-15T13:15:31.997000
CVE-2024-31921,0,0,4b6ce9a933b430a9597eec1c95a19c016c2c3b069930a8064c6136dce4df86da,2024-04-15T13:15:31.997000 CVE-2024-31921,0,0,4b6ce9a933b430a9597eec1c95a19c016c2c3b069930a8064c6136dce4df86da,2024-04-15T13:15:31.997000
CVE-2024-31922,0,0,ddc17d5b651ce3b8e89be96b4d055079549d44bfd30b2393d2326cd870478923,2024-04-15T13:15:31.997000 CVE-2024-31922,0,0,ddc17d5b651ce3b8e89be96b4d055079549d44bfd30b2393d2326cd870478923,2024-04-15T13:15:31.997000
@ -245535,7 +245538,7 @@ CVE-2024-32027,0,0,5d8710672ae4a50766a192faeab61c22e45c9ea1fe8601d8fa6309c61ece5
CVE-2024-32028,0,0,a16d36bcfaa5cccbb6282aecd03e18b80c66f8151e3c2f08a8edd43b521f9227,2024-04-15T13:15:31.997000 CVE-2024-32028,0,0,a16d36bcfaa5cccbb6282aecd03e18b80c66f8151e3c2f08a8edd43b521f9227,2024-04-15T13:15:31.997000
CVE-2024-3203,0,0,d460cfbc8661b4424cc0984f526a676bb0961256fc9d04a7d500e89187029830,2024-04-11T01:25:55.810000 CVE-2024-3203,0,0,d460cfbc8661b4424cc0984f526a676bb0961256fc9d04a7d500e89187029830,2024-04-11T01:25:55.810000
CVE-2024-32035,0,0,9f9419e7b7ca688ca6c807b99c4196d3fdd26d305c290e1d723cf412a79167b9,2024-04-16T13:24:07.103000 CVE-2024-32035,0,0,9f9419e7b7ca688ca6c807b99c4196d3fdd26d305c290e1d723cf412a79167b9,2024-04-16T13:24:07.103000
CVE-2024-32036,0,1,4358f457ff05e2fb3005eccdac6fca8cb869be3ffa209c190e441f2c4aed7dbe,2024-04-16T23:15:09.173000 CVE-2024-32036,0,0,4358f457ff05e2fb3005eccdac6fca8cb869be3ffa209c190e441f2c4aed7dbe,2024-04-16T23:15:09.173000
CVE-2024-3204,0,0,2a2a133d829052d72380a6f7a45e32f6ecd96ec6da65fdbadcbe92a1f79d774f,2024-04-11T01:25:55.933000 CVE-2024-3204,0,0,2a2a133d829052d72380a6f7a45e32f6ecd96ec6da65fdbadcbe92a1f79d774f,2024-04-11T01:25:55.933000
CVE-2024-3205,0,0,befb48df2bb5e20af3b4383c1ef82865b9f9fb3145e096ffb7e0098ff096b4f8,2024-04-11T01:25:56.010000 CVE-2024-3205,0,0,befb48df2bb5e20af3b4383c1ef82865b9f9fb3145e096ffb7e0098ff096b4f8,2024-04-11T01:25:56.010000
CVE-2024-3207,0,0,a57734da301192d6a9381ac71eef9bc84e6acf70886d5628a9c0939255320fc2,2024-04-11T01:25:56.090000 CVE-2024-3207,0,0,a57734da301192d6a9381ac71eef9bc84e6acf70886d5628a9c0939255320fc2,2024-04-11T01:25:56.090000

Can't render this file because it is too large.