Auto-Update: 2024-04-05T10:00:38.649160+00:00

This commit is contained in:
cad-safe-bot 2024-04-05 10:03:28 +00:00
parent 73ee117432
commit 1b6432e81f
25 changed files with 645 additions and 37 deletions

View File

@ -2,7 +2,7 @@
"id": "CVE-2022-34357",
"sourceIdentifier": "psirt@us.ibm.com",
"published": "2024-02-26T16:27:45.427",
"lastModified": "2024-02-26T16:32:25.577",
"lastModified": "2024-04-05T09:15:08.060",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
@ -55,6 +55,10 @@
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/230510",
"source": "psirt@us.ibm.com"
},
{
"url": "https://security.netapp.com/advisory/ntap-20240405-0001/",
"source": "psirt@us.ibm.com"
},
{
"url": "https://www.ibm.com/support/pages/node/7123154",
"source": "psirt@us.ibm.com"

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-22655",
"sourceIdentifier": "secure@intel.com",
"published": "2024-03-14T17:15:49.930",
"lastModified": "2024-03-14T18:11:35.910",
"lastModified": "2024-04-05T09:15:08.203",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
@ -51,6 +51,10 @@
}
],
"references": [
{
"url": "https://security.netapp.com/advisory/ntap-20240405-0006/",
"source": "secure@intel.com"
},
{
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00960.html",
"source": "secure@intel.com"

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-30996",
"sourceIdentifier": "psirt@us.ibm.com",
"published": "2024-02-26T16:27:46.017",
"lastModified": "2024-02-26T16:32:25.577",
"lastModified": "2024-04-05T09:15:08.317",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
@ -55,6 +55,10 @@
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/254290",
"source": "psirt@us.ibm.com"
},
{
"url": "https://security.netapp.com/advisory/ntap-20240405-0004/",
"source": "psirt@us.ibm.com"
},
{
"url": "https://www.ibm.com/support/pages/node/7123154",
"source": "psirt@us.ibm.com"

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-32344",
"sourceIdentifier": "psirt@us.ibm.com",
"published": "2024-02-26T16:27:46.313",
"lastModified": "2024-02-26T16:32:25.577",
"lastModified": "2024-04-05T09:15:08.407",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
@ -55,6 +55,10 @@
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/255898",
"source": "psirt@us.ibm.com"
},
{
"url": "https://security.netapp.com/advisory/ntap-20240405-0002/",
"source": "psirt@us.ibm.com"
},
{
"url": "https://www.ibm.com/support/pages/node/7123154",
"source": "psirt@us.ibm.com"

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-32666",
"sourceIdentifier": "secure@intel.com",
"published": "2024-03-14T17:15:51.140",
"lastModified": "2024-03-14T18:11:35.910",
"lastModified": "2024-04-05T09:15:08.497",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
@ -51,6 +51,10 @@
}
],
"references": [
{
"url": "https://security.netapp.com/advisory/ntap-20240405-0010/",
"source": "secure@intel.com"
},
{
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00986.html",
"source": "secure@intel.com"

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-35191",
"sourceIdentifier": "secure@intel.com",
"published": "2024-03-14T17:15:51.333",
"lastModified": "2024-03-14T18:11:35.910",
"lastModified": "2024-04-05T09:15:08.583",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
@ -51,6 +51,10 @@
}
],
"references": [
{
"url": "https://security.netapp.com/advisory/ntap-20240405-0005/",
"source": "secure@intel.com"
},
{
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00923.html",
"source": "secure@intel.com"

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-38359",
"sourceIdentifier": "psirt@us.ibm.com",
"published": "2024-02-26T16:27:46.633",
"lastModified": "2024-02-26T16:32:25.577",
"lastModified": "2024-04-05T09:15:08.677",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
@ -55,6 +55,10 @@
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/260744",
"source": "psirt@us.ibm.com"
},
{
"url": "https://security.netapp.com/advisory/ntap-20240405-0003/",
"source": "psirt@us.ibm.com"
},
{
"url": "https://www.ibm.com/support/pages/node/7123154",
"source": "psirt@us.ibm.com"

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-38575",
"sourceIdentifier": "secure@intel.com",
"published": "2024-03-14T17:15:51.527",
"lastModified": "2024-03-14T18:11:35.910",
"lastModified": "2024-04-05T09:15:08.763",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
@ -51,6 +51,10 @@
}
],
"references": [
{
"url": "https://security.netapp.com/advisory/ntap-20240405-0008/",
"source": "secure@intel.com"
},
{
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00982.html",
"source": "secure@intel.com"

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-39368",
"sourceIdentifier": "secure@intel.com",
"published": "2024-03-14T17:15:51.713",
"lastModified": "2024-03-14T18:11:35.910",
"lastModified": "2024-04-05T09:15:08.850",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
@ -51,6 +51,10 @@
}
],
"references": [
{
"url": "https://security.netapp.com/advisory/ntap-20240405-0007/",
"source": "secure@intel.com"
},
{
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00972.html",
"source": "secure@intel.com"

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-43490",
"sourceIdentifier": "secure@intel.com",
"published": "2024-03-14T17:15:51.910",
"lastModified": "2024-03-14T18:11:35.910",
"lastModified": "2024-04-05T09:15:08.930",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
@ -51,6 +51,10 @@
}
],
"references": [
{
"url": "https://security.netapp.com/advisory/ntap-20240405-0009/",
"source": "secure@intel.com"
},
{
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01045.html",
"source": "secure@intel.com"

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2024-21848",
"sourceIdentifier": "responsibledisclosure@mattermost.com",
"published": "2024-04-05T09:15:09.017",
"lastModified": "2024-04-05T09:15:09.017",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Improper Access Control in Mattermost Server versions 8.1.x before 8.1.11 allows an attacker that is in a channel with an active call to keep participating in the call even if they are removed from the channel\n\n"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "responsibledisclosure@mattermost.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 3.1,
"baseSeverity": "LOW"
},
"exploitabilityScore": 1.6,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "responsibledisclosure@mattermost.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-284"
}
]
}
],
"references": [
{
"url": "https://mattermost.com/security-updates",
"source": "responsibledisclosure@mattermost.com"
}
]
}

View File

@ -0,0 +1,47 @@
{
"id": "CVE-2024-2115",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-04-05T08:15:07.470",
"lastModified": "2024-04-05T08:15:07.470",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "The LearnPress \u2013 WordPress LMS Plugin plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 4.0.0. This is due to missing or incorrect nonce validation on the filter_users functions. This makes it possible for unauthenticated attackers to elevate their privileges to that of a teacher via a forged request granted they can trick a site administrator into performing an action such as clicking on a link."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security@wordfence.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
]
},
"references": [
{
"url": "https://plugins.trac.wordpress.org/changeset/3061953/learnpress/tags/4.0.1/inc/admin/class-lp-admin.php",
"source": "security@wordfence.com"
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/342a4482-f5d3-4cc9-a998-e3abac7142cf?source=cve",
"source": "security@wordfence.com"
}
]
}

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2024-2447",
"sourceIdentifier": "responsibledisclosure@mattermost.com",
"published": "2024-04-05T09:15:09.860",
"lastModified": "2024-04-05T09:15:09.860",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Mattermost versions 8.1.x before 8.1.11, 9.3.x before 9.3.3, 9.4.x before 9.4.4, and 9.5.x before 9.5.2 fail to authenticate the source of certain types of post actions, allowing an authenticated attacker to create posts as other users via a crafted post action.\n\n"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "responsibledisclosure@mattermost.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "responsibledisclosure@mattermost.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-284"
}
]
}
],
"references": [
{
"url": "https://mattermost.com/security-updates",
"source": "responsibledisclosure@mattermost.com"
}
]
}

View File

@ -0,0 +1,36 @@
{
"id": "CVE-2024-26810",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-04-05T09:15:09.230",
"lastModified": "2024-04-05T09:15:09.230",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nvfio/pci: Lock external INTx masking ops\n\nMask operations through config space changes to DisINTx may race INTx\nconfiguration changes via ioctl. Create wrappers that add locking for\npaths outside of the core interrupt code.\n\nIn particular, irq_type is updated holding igate, therefore testing\nis_intx() requires holding igate. For example clearing DisINTx from\nconfig space can otherwise race changes of the interrupt configuration.\n\nThis aligns interfaces which may trigger the INTx eventfd into two\ncamps, one side serialized by igate and the other only enabled while\nINTx is configured. A subsequent patch introduces synchronization for\nthe latter flows."
}
],
"metrics": {},
"references": [
{
"url": "https://git.kernel.org/stable/c/03505e3344b0576fd619416793a31eae9c5b73bf",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/04a4a017b9ffd7b0f427b8c376688d14cb614651",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/3fe0ac10bd117df847c93408a9d428a453cd60e5",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/6fe478d855b20ac1eb5da724afe16af5a2aaaa40",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/810cd4bb53456d0503cc4e7934e063835152c1b7",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
}
]
}

View File

@ -0,0 +1,36 @@
{
"id": "CVE-2024-26812",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-04-05T09:15:09.283",
"lastModified": "2024-04-05T09:15:09.283",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nvfio/pci: Create persistent INTx handler\n\nA vulnerability exists where the eventfd for INTx signaling can be\ndeconfigured, which unregisters the IRQ handler but still allows\neventfds to be signaled with a NULL context through the SET_IRQS ioctl\nor through unmask irqfd if the device interrupt is pending.\n\nIdeally this could be solved with some additional locking; the igate\nmutex serializes the ioctl and config space accesses, and the interrupt\nhandler is unregistered relative to the trigger, but the irqfd path\nruns asynchronous to those. The igate mutex cannot be acquired from the\natomic context of the eventfd wake function. Disabling the irqfd\nrelative to the eventfd registration is potentially incompatible with\nexisting userspace.\n\nAs a result, the solution implemented here moves configuration of the\nINTx interrupt handler to track the lifetime of the INTx context object\nand irq_type configuration, rather than registration of a particular\ntrigger eventfd. Synchronization is added between the ioctl path and\neventfd_signal() wrapper such that the eventfd trigger can be\ndynamically updated relative to in-flight interrupts or irqfd callbacks."
}
],
"metrics": {},
"references": [
{
"url": "https://git.kernel.org/stable/c/0e09cf81959d9f12b75ad5c6dd53d237432ed034",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/18c198c96a815c962adc2b9b77909eec0be7df4d",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/4c089cefe30924fbe20dd1ee92774ea1f5eca834",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/69276a555c740acfbff13fb5769ee9c92e1c828e",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/7d29d4c72c1e196cce6969c98072a272d1a703b3",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
}
]
}

View File

@ -0,0 +1,36 @@
{
"id": "CVE-2024-26813",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-04-05T09:15:09.340",
"lastModified": "2024-04-05T09:15:09.340",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nvfio/platform: Create persistent IRQ handlers\n\nThe vfio-platform SET_IRQS ioctl currently allows loopback triggering of\nan interrupt before a signaling eventfd has been configured by the user,\nwhich thereby allows a NULL pointer dereference.\n\nRather than register the IRQ relative to a valid trigger, register all\nIRQs in a disabled state in the device open path. This allows mask\noperations on the IRQ to nest within the overall enable state governed\nby a valid eventfd signal. This decouples @masked, protected by the\n@locked spinlock from @trigger, protected via the @igate mutex.\n\nIn doing so, it's guaranteed that changes to @trigger cannot race the\nIRQ handlers because the IRQ handler is synchronously disabled before\nmodifying the trigger, and loopback triggering of the IRQ via ioctl is\nsafe due to serialization with trigger changes via igate.\n\nFor compatibility, request_irq() failures are maintained to be local to\nthe SET_IRQS ioctl rather than a fatal error in the open device path.\nThis allows, for example, a userspace driver with polling mode support\nto continue to work regardless of moving the request_irq() call site.\nThis necessarily blocks all SET_IRQS access to the failed index."
}
],
"metrics": {},
"references": [
{
"url": "https://git.kernel.org/stable/c/0f8d8f9c2173a541812dd750529f4a415117eb29",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/62d4e43a569b67929eb3319780be5359694c8086",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/675daf435e9f8e5a5eab140a9864dfad6668b375",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/7932db06c82c5b2f42a4d1a849d97dba9ce4a362",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/d6bedd6acc0bcb1e7e010bc046032e47f08d379f",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
}
]
}

View File

@ -0,0 +1,36 @@
{
"id": "CVE-2024-26814",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-04-05T09:15:09.393",
"lastModified": "2024-04-05T09:15:09.393",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nvfio/fsl-mc: Block calling interrupt handler without trigger\n\nThe eventfd_ctx trigger pointer of the vfio_fsl_mc_irq object is\ninitially NULL and may become NULL if the user sets the trigger\neventfd to -1. The interrupt handler itself is guaranteed that\ntrigger is always valid between request_irq() and free_irq(), but\nthe loopback testing mechanisms to invoke the handler function\nneed to test the trigger. The triggering and setting ioctl paths\nboth make use of igate and are therefore mutually exclusive.\n\nThe vfio-fsl-mc driver does not make use of irqfds, nor does it\nsupport any sort of masking operations, therefore unlike vfio-pci\nand vfio-platform, the flow can remain essentially unchanged."
}
],
"metrics": {},
"references": [
{
"url": "https://git.kernel.org/stable/c/083e750c9f5f4c3bf61161330fb84d7c8e8bb417",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/6ec0d88166dac43f29e96801c0927d514f17add9",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/7447d911af699a15f8d050dfcb7c680a86f87012",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/de87511fb0404d23b6da5f4660383b6ed095e28d",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/ee0bd4ad780dfbb60355b99f25063357ab488267",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
}
]
}

View File

@ -0,0 +1,36 @@
{
"id": "CVE-2024-27437",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-04-05T09:15:09.443",
"lastModified": "2024-04-05T09:15:09.443",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nvfio/pci: Disable auto-enable of exclusive INTx IRQ\n\nCurrently for devices requiring masking at the irqchip for INTx, ie.\ndevices without DisINTx support, the IRQ is enabled in request_irq()\nand subsequently disabled as necessary to align with the masked status\nflag. This presents a window where the interrupt could fire between\nthese events, resulting in the IRQ incrementing the disable depth twice.\nThis would be unrecoverable for a user since the masked flag prevents\nnested enables through vfio.\n\nInstead, invert the logic using IRQF_NO_AUTOEN such that exclusive INTx\nis never auto-enabled, then unmask as required."
}
],
"metrics": {},
"references": [
{
"url": "https://git.kernel.org/stable/c/139dfcc4d723ab13469881200c7d80f49d776060",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/2a4a666c45107206605b7b5bc20545f8aabc4fa2",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/3b3491ad0f80d913e7d255941d4470f4a4d9bfda",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/bf0bc84a20e6109ab07d5dc072067bd01eb931ec",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/fe9a7082684eb059b925c535682e68c34d487d43",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
}
]
}

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2024-28949",
"sourceIdentifier": "responsibledisclosure@mattermost.com",
"published": "2024-04-05T09:15:09.497",
"lastModified": "2024-04-05T09:15:09.497",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Mattermost Server versions 9.5.x before 9.5.2, 9.4.x before 9.4.4, 9.3.x before 9.3.3, 8.1.x before 8.1.11 don't limit the number of user preferences which allows an attacker to send a large number of user preferences potentially causing denial of service.\n\n"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "responsibledisclosure@mattermost.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "LOW",
"baseScore": 4.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "responsibledisclosure@mattermost.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-400"
}
]
}
],
"references": [
{
"url": "https://mattermost.com/security-updates",
"source": "responsibledisclosure@mattermost.com"
}
]
}

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2024-29221",
"sourceIdentifier": "responsibledisclosure@mattermost.com",
"published": "2024-04-05T09:15:09.680",
"lastModified": "2024-04-05T09:15:09.680",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Improper Access Control in Mattermost Server versions 9.5.x before 9.5.2, 9.4.x before 9.4.4, 9.3.x before 9.3.3, 8.1.x before 8.1.11 lacked proper access control in the `/api/v4/users/me/teams` endpoint\u00a0allowing\u00a0a team admin to get the invite ID of their team, thus allowing them to invite users, even if the \"Add Members\" permission was explicitly removed from team admins. \n\n"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "responsibledisclosure@mattermost.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW",
"baseScore": 4.7,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.2,
"impactScore": 3.4
}
]
},
"weaknesses": [
{
"source": "responsibledisclosure@mattermost.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-284"
}
]
}
],
"references": [
{
"url": "https://mattermost.com/security-updates",
"source": "responsibledisclosure@mattermost.com"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2024-30849",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-04-05T08:15:07.733",
"lastModified": "2024-04-05T08:15:07.733",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Arbitrary file upload vulnerability in Sourcecodester Complete E-Commerce Site v1.0, allows remote attackers to execute arbitrary code via filename parameter in admin/products_photo.php."
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/wkeyi0x1/vul-report/issues/3",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2024-30891",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-04-05T08:15:07.800",
"lastModified": "2024-04-05T08:15:07.800",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "A command injection vulnerability exists in /goform/exeCommand in Tenda AC18 v15.03.05.05, which allows attackers to construct cmdinput parameters for arbitrary command execution."
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/Lantern-r/IoT-vuln/blob/main/Tenda/AC18/formexeCommand.md",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,51 @@
{
"id": "CVE-2024-3217",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-04-05T08:15:07.853",
"lastModified": "2024-04-05T08:15:07.853",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "The WP Directory Kit plugin for WordPress is vulnerable to SQL Injection via the 'attribute_value' and 'attribute_id' parameters in all versions up to, and including, 1.3.0 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for authenticated attackers, with subscriber-level access and above, to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security@wordfence.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
]
},
"references": [
{
"url": "https://plugins.trac.wordpress.org/browser/wpdirectorykit/trunk/application/controllers/Wdk_frontendajax.php#L72",
"source": "security@wordfence.com"
},
{
"url": "https://plugins.trac.wordpress.org/changeset/3064842/wpdirectorykit/trunk/application/controllers/Wdk_frontendajax.php",
"source": "security@wordfence.com"
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/09b315e6-d973-467d-8b8d-4b7b4a7ca3f8?source=cve",
"source": "security@wordfence.com"
}
]
}

View File

@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update
```plain
2024-04-05T08:00:42.996477+00:00
2024-04-05T10:00:38.649160+00:00
```
### Most recent CVE Modification Timestamp synchronized with NVD
```plain
2024-04-05T07:15:11.110000+00:00
2024-04-05T09:15:09.860000+00:00
```
### Last Data Feed Release
@ -33,25 +33,42 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
### Total Number of included CVEs
```plain
244174
244187
```
### CVEs added in the last Commit
Recently added CVEs: `6`
Recently added CVEs: `13`
- [CVE-2023-52235](CVE-2023/CVE-2023-522xx/CVE-2023-52235.json) (`2024-04-05T06:15:10.060`)
- [CVE-2024-22363](CVE-2024/CVE-2024-223xx/CVE-2024-22363.json) (`2024-04-05T06:15:10.200`)
- [CVE-2024-26329](CVE-2024/CVE-2024-263xx/CVE-2024-26329.json) (`2024-04-05T07:15:10.970`)
- [CVE-2024-27448](CVE-2024/CVE-2024-274xx/CVE-2024-27448.json) (`2024-04-05T06:15:10.263`)
- [CVE-2024-29672](CVE-2024/CVE-2024-296xx/CVE-2024-29672.json) (`2024-04-05T06:15:10.323`)
- [CVE-2024-29863](CVE-2024/CVE-2024-298xx/CVE-2024-29863.json) (`2024-04-05T07:15:11.110`)
- [CVE-2024-2115](CVE-2024/CVE-2024-21xx/CVE-2024-2115.json) (`2024-04-05T08:15:07.470`)
- [CVE-2024-21848](CVE-2024/CVE-2024-218xx/CVE-2024-21848.json) (`2024-04-05T09:15:09.017`)
- [CVE-2024-2447](CVE-2024/CVE-2024-24xx/CVE-2024-2447.json) (`2024-04-05T09:15:09.860`)
- [CVE-2024-26810](CVE-2024/CVE-2024-268xx/CVE-2024-26810.json) (`2024-04-05T09:15:09.230`)
- [CVE-2024-26812](CVE-2024/CVE-2024-268xx/CVE-2024-26812.json) (`2024-04-05T09:15:09.283`)
- [CVE-2024-26813](CVE-2024/CVE-2024-268xx/CVE-2024-26813.json) (`2024-04-05T09:15:09.340`)
- [CVE-2024-26814](CVE-2024/CVE-2024-268xx/CVE-2024-26814.json) (`2024-04-05T09:15:09.393`)
- [CVE-2024-27437](CVE-2024/CVE-2024-274xx/CVE-2024-27437.json) (`2024-04-05T09:15:09.443`)
- [CVE-2024-28949](CVE-2024/CVE-2024-289xx/CVE-2024-28949.json) (`2024-04-05T09:15:09.497`)
- [CVE-2024-29221](CVE-2024/CVE-2024-292xx/CVE-2024-29221.json) (`2024-04-05T09:15:09.680`)
- [CVE-2024-30849](CVE-2024/CVE-2024-308xx/CVE-2024-30849.json) (`2024-04-05T08:15:07.733`)
- [CVE-2024-30891](CVE-2024/CVE-2024-308xx/CVE-2024-30891.json) (`2024-04-05T08:15:07.800`)
- [CVE-2024-3217](CVE-2024/CVE-2024-32xx/CVE-2024-3217.json) (`2024-04-05T08:15:07.853`)
### CVEs modified in the last Commit
Recently modified CVEs: `0`
Recently modified CVEs: `10`
- [CVE-2022-34357](CVE-2022/CVE-2022-343xx/CVE-2022-34357.json) (`2024-04-05T09:15:08.060`)
- [CVE-2023-22655](CVE-2023/CVE-2023-226xx/CVE-2023-22655.json) (`2024-04-05T09:15:08.203`)
- [CVE-2023-30996](CVE-2023/CVE-2023-309xx/CVE-2023-30996.json) (`2024-04-05T09:15:08.317`)
- [CVE-2023-32344](CVE-2023/CVE-2023-323xx/CVE-2023-32344.json) (`2024-04-05T09:15:08.407`)
- [CVE-2023-32666](CVE-2023/CVE-2023-326xx/CVE-2023-32666.json) (`2024-04-05T09:15:08.497`)
- [CVE-2023-35191](CVE-2023/CVE-2023-351xx/CVE-2023-35191.json) (`2024-04-05T09:15:08.583`)
- [CVE-2023-38359](CVE-2023/CVE-2023-383xx/CVE-2023-38359.json) (`2024-04-05T09:15:08.677`)
- [CVE-2023-38575](CVE-2023/CVE-2023-385xx/CVE-2023-38575.json) (`2024-04-05T09:15:08.763`)
- [CVE-2023-39368](CVE-2023/CVE-2023-393xx/CVE-2023-39368.json) (`2024-04-05T09:15:08.850`)
- [CVE-2023-43490](CVE-2023/CVE-2023-434xx/CVE-2023-43490.json) (`2024-04-05T09:15:08.930`)
## Download and Usage

View File

@ -200854,7 +200854,7 @@ CVE-2022-34352,0,0,1e1d4fbb5a377507f21a2bed94d2ebc5281a09581aee987536370e13d6395
CVE-2022-34354,0,0,02584ee6b8cb0bff7f27c7009429134f0b39fd1a6b1116c23548e4adeee7b542,2023-11-07T03:48:33.893000
CVE-2022-34355,0,0,c113b0077901660ecb6420de68116b847470d756b400e1b61d0de5945949d9a8,2023-10-10T20:41:30.020000
CVE-2022-34356,0,0,2ae14f15be104cb235faa8a6ab8ed3afc398f20d7225fc326f5247476834ae64,2022-09-16T02:56:48.280000
CVE-2022-34357,0,0,e6eea0bc8e960f902bc180c6933bded4926e63ccf044b18451b8c0995f3fe9f8,2024-02-26T16:32:25.577000
CVE-2022-34357,0,1,af87a974bbeca9e2d6e7bafe81283ee0f5421ac9d7cafc5f56a460dca06db348,2024-04-05T09:15:08.060000
CVE-2022-34358,0,0,c81aeda061a6e1c39a5ea95bf08044fe1aed3523aa70c0f131fd41eb0542b8c2,2022-07-27T23:07:58.250000
CVE-2022-3436,0,0,628499c3069d5d4d40a6545fab742a3d0bedd629a4e56c085297ef7620ea4d2d,2023-11-30T14:15:08.173000
CVE-2022-34361,0,0,62e052216474f4951eeb4a3cb3acba62f053ad7d01461ecc470cfb339c52d99a,2023-11-07T03:48:34.060000
@ -215730,7 +215730,7 @@ CVE-2023-22651,0,0,71c4ad22d720a14f556cbdbb0dfeae4cea5ba5bc7c522362e29fd79de49a8
CVE-2023-22652,0,0,22b310772038f08a4e58450ff2cc11ade814694d9e643598182c60a0305bcac8,2023-09-13T03:15:07.693000
CVE-2023-22653,0,0,a51dcac8d7628283af317fae95110ee2fc893a6c8b2b6ebf1624613b419371fc,2023-08-02T15:34:59.683000
CVE-2023-22654,0,0,5b1a8feee98010e65bed848785e61db9d7b8c5ab9fbbb79f8736b9741ba8db64,2023-05-30T22:22:43.403000
CVE-2023-22655,0,0,c5ae50c4ec0e53175b67f12928703a05d68084546570470362665fd64b66f04f,2024-03-14T18:11:35.910000
CVE-2023-22655,0,1,4014795b5db8a78148a9a1e089cc32279c6823fb131fc7bb94f4872889f6e033,2024-04-05T09:15:08.203000
CVE-2023-22657,0,0,50aba77e7826f44f75fd8eca9cdefd06087e1b24472024d8ed2ae2967b0f87b1,2023-11-07T04:07:12.750000
CVE-2023-22659,0,0,71d1f10cbb6b53df610f190613167a6c75fa7f817c0f72a1094380595ddd5133,2023-07-13T17:17:26.230000
CVE-2023-2266,0,0,21c36958639008dc9b075634492f4955ca2430a255612c0db16c56bae462bdf1,2023-12-06T00:35:24.197000
@ -222139,7 +222139,7 @@ CVE-2023-30991,0,0,d2cd3864d4d0c1e0346308db047da023695d9d74eb35ca6206a98aedc11f1
CVE-2023-30993,0,0,03bf4ae9dfc255a68d7e0f8c0d83b167e401827066b7281a4017436cb44acd16,2023-07-05T18:47:03.063000
CVE-2023-30994,0,0,50f2536b42ff1c52ec44103505245abc9de1d3604cb0eec34abbe616f409e899,2023-10-18T20:48:41.863000
CVE-2023-30995,0,0,52e1bdffb80c2cd6a5585042ac96f61096b1fdd1a66207a01a6edf115e2cc942,2023-10-10T20:15:09.650000
CVE-2023-30996,0,0,e23629ef1de07170db706882aae827991fcc7aa9f928a227ee877bff74158354,2024-02-26T16:32:25.577000
CVE-2023-30996,0,1,0cbc5199ab8703e9e1e8f5db93dac42c6c5c4fbde7a4c589a63ada853499569d,2024-04-05T09:15:08.317000
CVE-2023-30999,0,0,1ddc78f54cf0c47e9336bc540c859356a71014614a888d063a16c4ae23a656c0,2024-02-06T21:31:55.033000
CVE-2023-3100,0,0,178f8cfb72823422aea10e7ffea4194c7bfad6260e8286d491b815750e8a8864,2024-03-21T02:48:24.370000
CVE-2023-31001,0,0,c53512fa1496d57027073df272050bde089a391b1726720adc054c5082b0bad7,2024-01-18T17:06:28.277000
@ -223041,7 +223041,7 @@ CVE-2023-32339,0,0,cb517b5b344e935e47f6fa2b5d4d177564da71d9c5673af6029fc8ae03edb
CVE-2023-3234,0,0,a73a9cbedb7f5d4c8e9c6e64bd0603a581ffe38a404e785fa8e0687b891ef8df,2024-03-21T02:48:28.063000
CVE-2023-32341,0,0,1ddf31eafe868585a40c30471b117fdf8bc01f015bb58b603e688577fc61bd21,2024-02-15T04:40:13.650000
CVE-2023-32342,0,0,718b739606ceddf8e116cda5b49dc56f9002b527775d566e068e3f50abde9e5c,2023-06-06T18:18:41.097000
CVE-2023-32344,0,0,50c886312fd589bac5b16cd18d547770e144a41ace1d65686371d5709ce97205,2024-02-26T16:32:25.577000
CVE-2023-32344,0,1,a97deba342fd58800328e47f88083826c0a2753dea8ce966e07e7c270b69e45e,2024-04-05T09:15:08.407000
CVE-2023-32346,0,0,1720a4f1887d300a5a8abe90d8a81fa98e2566da8b280c128fac5c7393e4f6c4,2023-05-31T20:17:36.940000
CVE-2023-32347,0,0,8e4f4f9285f7dd35eb61db76d54965657bbc3f0a44cb8d351372ee30c4f36a96,2023-05-31T20:18:22.233000
CVE-2023-32348,0,0,8c439649256e002f4389c48d462357d3b5521993f6f3fda6e5a636fc0d57887a,2023-06-01T14:26:59.373000
@ -223361,7 +223361,7 @@ CVE-2023-32662,0,0,e6ecfd432d8093b5086df379db0b57cdf40d1685dba2c7fabe307bec0ed72
CVE-2023-32663,0,0,3e7ef52ee8898923e5c75493bfae74a9e09e3258bba72eb62046ef7118b9edb7,2023-08-21T17:15:47.183000
CVE-2023-32664,0,0,eb42d87345b4b74142e9d98b628cc63fc43d215142fe85e83066ebee2586bda4,2023-09-15T19:15:07.340000
CVE-2023-32665,0,0,31f6fbb04d38e24ef8a8bd7c7b632bd8e055665c900cbecbc4c539e406f2b02a,2023-11-27T14:15:07.820000
CVE-2023-32666,0,0,334f13ee79a481802971684a0dba755bfe92bac8542d6f23b179cba5f308384e,2024-03-14T18:11:35.910000
CVE-2023-32666,0,1,9e4cb6a8ebc3b9a62bc711210afb6752a4df60b12745e2e1ba1c7436db1cb9d9,2024-04-05T09:15:08.497000
CVE-2023-32668,0,0,6870504f63fd451347fe0c331096f1e45ff8f6811229f296b8ba61f0b4142f10,2023-05-23T17:31:45.217000
CVE-2023-32669,0,0,0f9d4ef16e2f26deb90011f7c395852feb44144b8263c413043ff4187727c7dd,2023-10-04T21:07:05.703000
CVE-2023-3267,0,0,2d4c8daf423de31384ed6303e8fbed7365844c7d43ecaa98d82b4375b3aba328,2023-08-22T16:15:46.067000
@ -225157,7 +225157,7 @@ CVE-2023-35187,0,0,726f3d269c3fc4ab0e4f8bf02f0782a65d9f79c8f65fbe320311a563e2133
CVE-2023-35188,0,0,dc2d51582b0c40a1a991431e82dc96ea83b69d4b6cd75cf2797291ed1d48e8fe,2024-02-13T20:36:01.653000
CVE-2023-35189,0,0,727918a3b8004e51f12292fde6090cd74f994ad6d97365addee6dbdc84715391,2023-07-27T17:43:17.170000
CVE-2023-3519,0,0,7329bec3703bdc39aea3e59a1cc85b2341feb74f79ed91f9be508e94879784da,2023-08-04T18:15:17.077000
CVE-2023-35191,0,0,647a4cf9ed112e0b5dfd3a6d9b3cda4c92afed64190c1baacb9fc0d972964833,2024-03-14T18:11:35.910000
CVE-2023-35191,0,1,c31c71c496abdb7f6b10202e2976b8f837d4c71b7eaa2c4113c2b95cf33357cf,2024-04-05T09:15:08.583000
CVE-2023-35193,0,0,35d999215ee0714de627ba46454d683b144c8672ad7068fc25e9877364a0d4d5,2023-10-18T14:59:29.847000
CVE-2023-35194,0,0,f1422d8c09e7347a9549c0a032c4e17cf30f4016d4503b676ff325c6bb8df1e1,2023-10-18T14:59:10.533000
CVE-2023-3520,0,0,03168a3d34c4551d3f89d5576703d3fa9269c779a40ea50d5fa229233446f0fa,2023-07-12T15:34:13.653000
@ -227261,7 +227261,7 @@ CVE-2023-38354,0,0,d1e8aae350b3efaa7d933d306935881b296a663e5e0dd367535a6a3341ed7
CVE-2023-38355,0,0,249d62dea42b65c43f485337cf2b025ca84978994be22a87ed6e3b2716c3280d,2023-10-13T01:14:34.023000
CVE-2023-38356,0,0,c55e6df572a7ad6a09d93d8bf024b6549d086d1593f311c0dcd9f5f419a32e73,2023-09-22T16:45:59.370000
CVE-2023-38357,0,0,f899c24b9076099671d7a5c797705766cb7feaa772c69dc54fed2a6af7ab8b59,2023-08-04T18:43:48.817000
CVE-2023-38359,0,0,6d37e1d7592cad48f05824582199416e60c4ae2241989a8d6c26dd8e6cea5139,2024-02-26T16:32:25.577000
CVE-2023-38359,0,1,8e809a2260654b54c4b5a8d307cfb00bbc63342d56d8255c4f45147077ddfa79,2024-04-05T09:15:08.677000
CVE-2023-3836,0,0,8354a50233ed3d7b2f0f73c2e8a8f66f78bb8f5bae55abc92ae927e41b4b7142,2024-03-21T02:48:47.537000
CVE-2023-38360,0,0,79486c66229a0fa5a2154e2865bfba1395d11138731e5917b327ce675040bb76,2024-03-05T13:41:01.900000
CVE-2023-38361,0,0,c6e79c96c692623eff2910c3872ad8af4e3692fed7acdbdf474970bee66927f0,2023-11-29T20:52:28.337000
@ -227458,7 +227458,7 @@ CVE-2023-38571,0,0,59422f4a140d130cd11989d6215360f540ea5ce2d1940f49a1884661bcc08
CVE-2023-38572,0,0,d548f53924cef1c9fed50ca54f02dd79c795d64a5950d4afb21f0974051e6ecc,2024-01-05T14:15:47.123000
CVE-2023-38573,0,0,473858576dcb468ddb455cbd057d8489cb45e9be3d5a82dde3da1329775f6312,2023-12-01T20:52:57.627000
CVE-2023-38574,0,0,b5446bdb7033f5711e00ad3535ee9383e878f8f0159bc3255c479d6656c1d4a4,2023-09-11T12:50:00.413000
CVE-2023-38575,0,0,d79b549e6be36be999d6405aacf44a0d2d852798b1af57712030c2b4eed5a656,2024-03-14T18:11:35.910000
CVE-2023-38575,0,1,4e79fe8d2ce008298825516df254661a63b525dae6fedee20e49c3138e848b6a,2024-04-05T09:15:08.763000
CVE-2023-38576,0,0,af8fe57eb812ce53861c61345d0fee8b81c4f54d4d6d4bf17791b20b4197fa51,2023-08-24T18:26:00.547000
CVE-2023-38579,0,0,d675649c63083678f4f6251f8e7bc0f6b675249c8aaa3432eda8a193ed725f0c,2024-02-13T21:56:17.013000
CVE-2023-3858,0,0,b0181383daef6c4e2640c077649efa29542f55d1afd5014233b3c6c43dd98b7b,2024-03-21T02:48:49.360000
@ -228048,7 +228048,7 @@ CVE-2023-39363,0,0,3b5e03600cf70b560e94452186ae68035e14537be8e3ab0775f4768bbd4e3
CVE-2023-39364,0,0,c3c94f3ad4cb220374e3d08f341ea50d15ec66dff6a2b9cc99e74f26a2402284,2024-03-18T20:15:07.727000
CVE-2023-39365,0,0,e973380538b25f82f11649a42c0b64ff80692ed5ec34a2c9828c426b7e157e90,2024-03-18T20:15:07.827000
CVE-2023-39366,0,0,ec1d63cbca61e10ab8a85d0a3e36a9a8f98189047df6aef06ced93f8760dd051,2023-11-09T05:15:10.317000
CVE-2023-39368,0,0,a6bbe32de750fa366848dbea046a634c140a10db4f89a62a011e509da7d270ba,2024-03-14T18:11:35.910000
CVE-2023-39368,0,1,80c88d98cccc8fda18cc4ce42c7e61c86543eb9a5fed9f7febed87a045c89328,2024-04-05T09:15:08.850000
CVE-2023-39369,0,0,e8aa62682a22aacbf757723c98e0bd960e9af84f36a645dc487bf02ca20fc2a4,2023-09-07T17:44:36.470000
CVE-2023-3937,0,0,1b9c2edef5222aa8070478842961fb82be451273a242472108ff086c86dfad93,2023-08-18T14:30:09.183000
CVE-2023-39370,0,0,c3e1bdce95fcb360380a5bb3623ace17d0c7e5b2b109774631c738473e281f23,2023-09-08T06:42:31.750000
@ -230679,7 +230679,7 @@ CVE-2023-43484,0,0,0e3fd100d8cdabff15f5388cc7ad52bc20ee89b047f07e3d1be0d5fe0a15a
CVE-2023-43485,0,0,56e06eecce10771793782bda7486bdc0abaf33406a8b34746335ac307311004e,2023-10-17T20:31:53.560000
CVE-2023-43488,0,0,73963ff8fac3febe7fcf1226608d7faad6241fb5160a15c4381098ef0daabd52,2023-11-06T14:41:18.393000
CVE-2023-4349,0,0,7bcfa9d15cfc992ac2e945aa6e7aec95ce86c568d8f15fb3ba2380084473c42f,2024-01-31T17:15:14.370000
CVE-2023-43490,0,0,e303399ece1b4efa44819e1302eca502b519f9d69f3ea92111976fb33fb34ff8,2024-03-14T18:11:35.910000
CVE-2023-43490,0,1,9855c56390f04a7d3184cf28686e801bde9b11bfcd2582fd5bccb6e92bdd6f36,2024-04-05T09:15:08.930000
CVE-2023-43492,0,0,42b5f695dc2a37dd6c1424d01d87bfa34fecc8146eed1f8b9a6b38bb9493ae43,2023-10-30T14:33:25.570000
CVE-2023-43493,0,0,c9ba762920ceac7459278a5fd1ff76127d128352a3279e28d59d1b8b275a2639,2023-09-27T20:51:26.677000
CVE-2023-43494,0,0,a5e1abcb0e0cbdd68150bd25ed5f4171fce3829cb775e04ccec60c9f09070438,2023-09-25T13:43:35.503000
@ -236058,7 +236058,7 @@ CVE-2023-52229,0,0,ea00ad4e0597affd30c31fe4f98a420e37e7ad7335b14877a8e6dc8a42c24
CVE-2023-5223,0,0,89e8c184d21745a264c9fc9e444990021f80eaf45de773e9b410a22e5226ce45,2024-03-21T02:50:11.113000
CVE-2023-52231,0,0,b5d4f82f731fe2c9cd0c678c3b61a598c79c626b8e6400879ca4a307d29966f3,2024-03-28T12:42:56.150000
CVE-2023-52234,0,0,1fff4c9561934a3ed1e9215004c9ee935ccd38ea2e79cd4cda085a56cc775bc1,2024-03-28T12:42:56.150000
CVE-2023-52235,1,1,f4252331265cbed47d565e61c2d6af947ae9657df278785c08221b7895baa311,2024-04-05T06:15:10.060000
CVE-2023-52235,0,0,f4252331265cbed47d565e61c2d6af947ae9657df278785c08221b7895baa311,2024-04-05T06:15:10.060000
CVE-2023-52239,0,0,53232ab6cc2fc288fa443c530cf5456f2ca2ee6e47506bdc07862ff96f4b1242,2024-02-13T22:50:50.313000
CVE-2023-52240,0,0,e12239f2302ca733fadb51e07b144a2ef6f5c195fb579e55287a44a10e77cb78,2024-01-08T14:32:47.203000
CVE-2023-52251,0,0,37b652e51a7c39e57b6fb6d1511e1d015580821275c80dc97e7e00b5102f4597,2024-02-29T01:42:07.630000
@ -239873,6 +239873,7 @@ CVE-2024-2108,0,0,c2fa70d90e7c92604d37599b63a68c51b88c7a208a94e63da1f79da8e05cb6
CVE-2024-2110,0,0,1d85de629a97570a97242f5d089550bba2e60a5923838c39c1151e294a5fdcf3,2024-03-28T12:42:56.150000
CVE-2024-2111,0,0,bb223011165a425455ec8ad438d31acdc69716e592665db5e015c6e3c7a0ad9a,2024-03-28T12:42:56.150000
CVE-2024-2113,0,0,1af2e189d0f766a4a77361c625e87ddcd239476cacd0eaf00d619a2d2d68e8de,2024-03-29T12:45:02.937000
CVE-2024-2115,1,1,958070a5428d52f8ec76429e64306fbbf091a0766862fcf468e218b71279864a,2024-04-05T08:15:07.470000
CVE-2024-2116,0,0,0a8927d2c3af56415377e26a49eef636f1c80d9f9b3374c561d3bce1d3a48066,2024-03-29T12:45:02.937000
CVE-2024-2120,0,0,d869e2d6a05f40fd099ef5d11b57f9e00d7f0b266e38148b71c8a447ce60ab1d,2024-03-27T12:29:30.307000
CVE-2024-2121,0,0,4e86b6ec3433d288b50b9e9c9587d6707962f4c2d7ff92215a6366c5fd16dc6b,2024-03-27T12:29:30.307000
@ -240201,6 +240202,7 @@ CVE-2024-21838,0,0,2e87184ffbd37f09fc02bbbce38359315ed0c01cd7f2541a39d089530736b
CVE-2024-2184,0,0,b7ea4f5ba4c2bd608dff608bfe2a87def706e3fb064d33fdd3c3733ae6e79e4b,2024-03-11T01:32:29.610000
CVE-2024-21840,0,0,ba783d6125c59c9321abeb19e4ad3c65376e311d48c8d637117e60a3ad69607f,2024-02-06T18:32:20.340000
CVE-2024-21845,0,0,c3c19550dac060de10c39d04cca7b66f65b34853e3fc2412b58fd540397606b8,2024-02-07T18:23:06.690000
CVE-2024-21848,1,1,4034ab55412051bd5498ab10b360fcb8e191d5ee68b1a2843a65c4f1c9ab4ae1,2024-04-05T09:15:09.017000
CVE-2024-21849,0,0,777d92a1c4bb7f79ad58de292d7b92c84e7bc7c1bbc5ad80d97c5d175c6259e9,2024-02-14T18:04:45.380000
CVE-2024-21851,0,0,854dd5d2aabc832591989b715d43ec08aeafe79b0e7fb2b7b8e58485d72989a1,2024-02-07T18:15:48.700000
CVE-2024-21852,0,0,3082fd3c592fa6da1ceb030e60633f5be1a3b7d2adb2434a27465175a4927608,2024-02-07T17:15:05.653000
@ -240468,7 +240470,7 @@ CVE-2024-2236,0,0,1caa0e5cdfb424662cbf6124414533e4ab1dd9ca210ea89ecd59ad25abc68f
CVE-2024-22360,0,0,dde3d7768ad1c8bc414b134384042470a384d3453ec0b0a0aa751c2a96e1b961,2024-04-03T17:24:18.150000
CVE-2024-22361,0,0,2cb34447b61b8680c66e6f142987700b31f9f16d4e9b8d748c59e5b8ad5a9a29,2024-02-16T21:35:31.953000
CVE-2024-22362,0,0,194d4da61fd0e172838ae5e875415deb5a10e6ec31fc18ececc7e4c5ad8228c4,2024-03-21T02:52:03.063000
CVE-2024-22363,1,1,a2fd052c0c680128839144798c1421a18aa4438b9681bf79d0004d695dacd4dd,2024-04-05T06:15:10.200000
CVE-2024-22363,0,0,a2fd052c0c680128839144798c1421a18aa4438b9681bf79d0004d695dacd4dd,2024-04-05T06:15:10.200000
CVE-2024-22365,0,0,b09f0e3dd0fc2bf60706805e33c1f78b209416e9ed2aa43cb1cfb00b1fe90d17,2024-02-14T00:27:40.143000
CVE-2024-22366,0,0,430ca6193adfaa0b9afcb94c1ccbb70fbf418a97a177252da5823216c0a609df,2024-01-30T22:15:32.033000
CVE-2024-22368,0,0,6b22b40b8e4884565fa5c7d8677cdf0e0ae6419db0baf589179542cd6fadbd26,2024-02-27T04:15:06.767000
@ -241357,6 +241359,7 @@ CVE-2024-2445,0,0,2f855bbcb84a342093922fd73320bfe19138d60313d23c629da4de19e559d7
CVE-2024-2446,0,0,42e5c66ebcf58bc3242675333cd3d5679a04b8d2c648c26027e5a47b9ff8b42a,2024-03-15T12:53:06.423000
CVE-2024-24468,0,0,2ffe0e787add87754da9d28139dd49fe0df5af62f9576796ac86e102fb215c8b,2024-02-07T22:03:09.897000
CVE-2024-24469,0,0,4f6c0d02ab780395cc2795972f5ccd070037d1f155bb48f88977ff7315e7ceab,2024-02-07T22:02:57.743000
CVE-2024-2447,1,1,a48cc78008d5334dfa13937b2dfd060f6e97d4807995da04c53d98553bc8065e,2024-04-05T09:15:09.860000
CVE-2024-24470,0,0,0ed64df001bff16a393bf92778dffdaa6681f7af33a9a33c77cdaa83290d7947,2024-02-06T21:07:34.547000
CVE-2024-24474,0,0,7ff84388b8a92907ef716e1ca2c29ef338e5f699b29d362e7b2c54bbc2735acd,2024-02-21T01:15:07.857000
CVE-2024-24475,0,0,da128c239114738663c22cbcb468c90723f598d143228b589356daf6901317f8,2024-02-21T01:15:07.890000
@ -242321,7 +242324,7 @@ CVE-2024-26318,0,0,5a8434e81e693bc0f90a66d9a6d8655df17a4e5f3f1f4a63075d970f5e64f
CVE-2024-2632,0,0,ea393f116b0cce8559537657b6b48805c98531cb8a651d292d9e39cc33b1c1ca,2024-03-19T13:26:46
CVE-2024-26327,0,0,ed8d19077e03f59789fd57e15d79ebd6fa2e85738782585f472f97265da3d970,2024-02-20T19:50:53.960000
CVE-2024-26328,0,0,483204e568c37ddd385ae6419587f3cba8922820a5f3e4626565041a8ff87314,2024-02-20T19:50:53.960000
CVE-2024-26329,1,1,abe0338d3180af0be53532b1668c2fb2a7dc77c306bc74aac5adb05a928048ec,2024-04-05T07:15:10.970000
CVE-2024-26329,0,0,abe0338d3180af0be53532b1668c2fb2a7dc77c306bc74aac5adb05a928048ec,2024-04-05T07:15:10.970000
CVE-2024-2633,0,0,d6d619ede14eb7136c8ee12cb2cd0efea8cc18b4fa44aa46ef5af23251d75954,2024-03-19T13:26:46
CVE-2024-26333,0,0,72ddcf1e5079d4095fb63f71d350456e693bb97135c81208eeffa24430bb0b2f,2024-03-05T13:41:01.900000
CVE-2024-26334,0,0,561e27fe6d2eae55228bd8cfd4e061bf762c84a8f4fc571dc41629b9250a54d4,2024-03-05T13:41:01.900000
@ -242631,6 +242634,10 @@ CVE-2024-26807,0,0,dd58971be5b2b7ae4d4d293dc140016766895ff28462656c96a25f4364a4b
CVE-2024-26808,0,0,811c6dcfe9e097a1e05a422eed27dc92a175aa2bf6a558020423935445f2e0d3,2024-04-04T12:48:22.650000
CVE-2024-26809,0,0,d8b70b9ed098155a50a0b82965aa5ef8be6d2e172d92379b17e564e5b8017a02,2024-04-04T12:48:22.650000
CVE-2024-2681,0,0,211b9a75c4368c46da39324b5885baab82086ddd4b191379e2bc3298587cc094,2024-03-21T02:52:42.143000
CVE-2024-26810,1,1,619461e7c161084dbce3405d57c92829428e68e5077dd6f12f741fa63c1ba5fe,2024-04-05T09:15:09.230000
CVE-2024-26812,1,1,a16f4ec13ccedd393f7841277e07984befb70b54a45d192608d189ddc454eaa9,2024-04-05T09:15:09.283000
CVE-2024-26813,1,1,be7dd918da8f885ffa1fdfa97ab2c9a28b6c6fe4e40508eea87dc59bb9ef1fb4,2024-04-05T09:15:09.340000
CVE-2024-26814,1,1,2ae796bc8d6711c6ab5953ca1946cf5304e495f4f0de3b5061a3b39de7ac3e14,2024-04-05T09:15:09.393000
CVE-2024-2682,0,0,a085f90f84cb4770a2a70d67fe3862306cc151ef177a765e07fccc3d6343039b,2024-03-21T02:52:42.233000
CVE-2024-2683,0,0,788c441aaf8a379a9ab516c0ce7daee2808d93b02ac7acef8c96a67609395231,2024-03-21T02:52:42.310000
CVE-2024-2684,0,0,5b5a341f7bbb8bdeccb5899b1d3a7c9eda23994ff0a4743b71e098a891662295,2024-03-21T02:52:42.383000
@ -242808,13 +242815,14 @@ CVE-2024-27354,0,0,3ace96f0cae30cfccef0c08e69f46a230792c5572ff398d91aa2a719b3624
CVE-2024-27355,0,0,f69927749d318ce3d471850deb21bc77767a9c94b5f501be3a1713c1109a5c66,2024-03-21T02:52:19.970000
CVE-2024-27356,0,0,2464f4bdc7cd759969915038df7055199f0bd02c6d9b1a8ceb85c7588507e9ba,2024-02-27T14:20:06.637000
CVE-2024-27359,0,0,d9efe9852d793e4ebe4144d07c8562893d90ae6614ba783353ad624a692629dc,2024-02-26T16:32:25.577000
CVE-2024-27437,1,1,bda9c439214cca7315752c7e4c1d89e20a7e8bdbee0a1e19cad2d8dde55dbb93,2024-04-05T09:15:09.443000
CVE-2024-27438,0,0,2aea60b4a1b2c2b9fbe16a013c293c52cf237fb88e8c577aa1b3bbbfc664d4e7,2024-03-21T12:58:51.093000
CVE-2024-27439,0,0,124ffecc940e3b1aff5b6c15ba45628af60d45a457d4c32687f284efa16b3296,2024-03-19T13:26:46
CVE-2024-27440,0,0,f656cf3f867b554b4acbc17eee670f16835e4e41b3c8da203b1b487ef7d6f2b3,2024-03-13T12:33:51.697000
CVE-2024-27441,0,0,e840685b8600bbca2bd5265ffc2375dd0e1834727afca845fa72402578217a21,2024-03-13T15:15:52.083000
CVE-2024-27444,0,0,e4b72098e3b1a45c8b94b724b5aa67a3c5d7a627e3b85b33a53ae8fca137be64,2024-02-26T16:32:25.577000
CVE-2024-27447,0,0,0ad05b799b801710378617c3e979150b26491a5a3c175938d5888d52afd14aa3,2024-02-26T16:32:25.577000
CVE-2024-27448,1,1,be24d2577b4483025f569d831033ddf830d10a5290591dcc6bd6ba289f63fd5b,2024-04-05T06:15:10.263000
CVE-2024-27448,0,0,be24d2577b4483025f569d831033ddf830d10a5290591dcc6bd6ba289f63fd5b,2024-04-05T06:15:10.263000
CVE-2024-2745,0,0,21dd83e50808577458b12385abb6a5e6bc2a585cd70ef551295012e31869f5dd,2024-04-02T12:50:42.233000
CVE-2024-27454,0,0,6d3a09532b89ef204254e66da503964dcbafd450b5bdda0990f449d144c8e54b,2024-02-26T16:32:25.577000
CVE-2024-27455,0,0,2d941179924c9f77cb732b35f1b7b9f5792b70ca51de1e84f09167eb77852176,2024-03-26T16:15:12.263000
@ -243326,6 +243334,7 @@ CVE-2024-28916,0,0,84c072546ea410ea13293f0749492a9c6fc43f88cd890d2ffd9bf253bd04a
CVE-2024-2892,0,0,68731cecf8a220eab24c534e33692124a7488fde840638ea320037b01630a7ff,2024-03-26T17:09:53.043000
CVE-2024-2893,0,0,63faf4ffcc4fb1d866004561f401a900492be39dd72829ee9d2ea13386dae33b,2024-03-27T12:29:41.530000
CVE-2024-2894,0,0,fe5793bc2f37c037f66adaaa9d347995617de1caef61563c1e61d5c7a1ea58be,2024-03-27T12:29:41.530000
CVE-2024-28949,1,1,e1b2e05a7bdf7038f29dd0d6b29a3c6d8008bcaa0e8b3bc61536543928ab0363,2024-04-05T09:15:09.497000
CVE-2024-2895,0,0,4e78767633bce48ab1dc77c80a270eff03b05a18553fcf7f775b3399e9d28d88,2024-03-27T12:29:41.530000
CVE-2024-28951,0,0,c59d22693a6783914cb02db5be2e1a6f5b0c6277d54a6ec5614d046ef86ffa02,2024-04-02T12:50:42.233000
CVE-2024-2896,0,0,4ba95787c6889a3eb868a106c99e2b979e5226eabc78640ebaa42c934eab2ab2,2024-03-27T12:29:41.530000
@ -243450,6 +243459,7 @@ CVE-2024-29202,0,0,2407457fd23b926dc515687b0bc64391303eb3a1899c8635138115822d248
CVE-2024-29203,0,0,132c3d83e906b655066bee1fc4d3f90e18def73beb9178e8cc6662be34f71a9c,2024-03-26T17:09:53.043000
CVE-2024-2921,0,0,c022f783cf261e367ca963516715cb4a81bead64a9c47249d0bf651e034f5912,2024-03-26T17:09:53.043000
CVE-2024-29216,0,0,59c06798795d05e391cdd301154441d31362295e800c3b46a2b7bd83a3e2dbc0,2024-03-25T13:47:14.087000
CVE-2024-29221,1,1,2f586d9fe2b7f2c29ef1c4cbe3cf77d28a6fba9f7916246ff73247bae23f244d,2024-04-05T09:15:09.680000
CVE-2024-29225,0,0,ebfd9b0992193d61aef178f6206711ffe8f1fc7ffd12fdaca779e58e62421cb3,2024-04-04T12:48:41.700000
CVE-2024-29227,0,0,f6ae69390655a5f3b8c2022246ade0c8e664001b7471a757ba66feb751afa8e1,2024-03-28T12:42:56.150000
CVE-2024-29228,0,0,c25efa24257cb2397a0d93759c26652d6dbbd7283b577526be7a83acca6ea890,2024-03-28T12:42:56.150000
@ -243537,7 +243547,7 @@ CVE-2024-29644,0,0,39829980cc0c3cec42e83f1a7d1e74f651bed504f90005be4e46042a91527
CVE-2024-29650,0,0,8ad374bfabee755625e57dff59b85656db535734df280985070b11f8f0b8c3b6,2024-03-25T16:43:06.137000
CVE-2024-29666,0,0,a8926fce030310567330d9b7c126003f732556a2ce979a6a3fd232707f8bbd99,2024-03-26T12:55:05.010000
CVE-2024-29667,0,0,1425649af0fe5303ac647a61948436bd641374e6a3c12789edb4485c777699d5,2024-04-01T01:12:59.077000
CVE-2024-29672,1,1,6d7c3144a7c4f0335a7d56a16d1b970f3c8dfd1e397b4170b5f91cc4aa856463,2024-04-05T06:15:10.323000
CVE-2024-29672,0,0,6d7c3144a7c4f0335a7d56a16d1b970f3c8dfd1e397b4170b5f91cc4aa856463,2024-04-05T06:15:10.323000
CVE-2024-2968,0,0,bb1433aeb37408aced09cd0721b3e3c51d5f43d4ee9668f91f68b12504b22dc7,2024-03-29T12:45:02.937000
CVE-2024-29684,0,0,cda7b88ce861488cce375da0c97c96f4e8ca98f9272907d42a882870472a7fa4,2024-03-26T17:09:53.043000
CVE-2024-29686,0,0,3fe58549e83b02ecfa4305dc0559466a6aba26f966980b7f6cfaa89fef3c5836,2024-04-01T02:15:07.663000
@ -243616,7 +243626,7 @@ CVE-2024-29858,0,0,ec21ad079a83cd076ada45f6eaa6cdca3318bb07ab260d892702dff1f9c09
CVE-2024-29859,0,0,1a3bc8759fdc8c10e013f96dddd14f2ff64d6c749aade8e9054f9e130df1726e,2024-03-21T12:58:51.093000
CVE-2024-2986,0,0,2e8b76dcc13c2c0ef53bfba5513dd96506aae0980f1810e28f63c6a33c67f33f,2024-03-27T17:48:21.140000
CVE-2024-29862,0,0,a716ba813aa67ee5575393b9d0a0602e3eeaba0f3c15482bf8b9bf774b2f14bb,2024-03-21T12:58:51.093000
CVE-2024-29863,1,1,464d1b384d2a13b48267b12cb30c1c0bb3380f5fff95f7b0465f3639fc2cc0f1,2024-04-05T07:15:11.110000
CVE-2024-29863,0,0,464d1b384d2a13b48267b12cb30c1c0bb3380f5fff95f7b0465f3639fc2cc0f1,2024-04-05T07:15:11.110000
CVE-2024-29864,0,0,a6ff60d6eca0eec860cad03d4ebcf6ddb2a8ce1d06f7fbda3179547925ea7c1b,2024-03-21T12:58:51.093000
CVE-2024-29865,0,0,c71ea820e322882cfd10f1c29db59e00803f8a609d75b87f5e2466dff384d5b6,2024-03-22T15:34:43.663000
CVE-2024-29866,0,0,2169c0f3fed16be1069cbb5502128dfabe18fe6fbc7db4f274cc3c93caea8ddd,2024-03-21T15:24:35.093000
@ -244002,6 +244012,7 @@ CVE-2024-30808,0,0,3edb296009dfb16a5061a2505986b3903e36250320b7a7a1ea6af0d775f58
CVE-2024-30809,0,0,40751d191f9ee13ea0defe4c96fc4834cb0c82544cd8de5e25d1d000018428a9,2024-04-02T20:31:58.463000
CVE-2024-3081,0,0,866ce1fc3c293e10fe34bf8200fad33ced51ccecfb774a7b3540f6fe2adb2cfa,2024-04-01T01:12:59.077000
CVE-2024-3084,0,0,c1c38fe5a209c672b804078473ede419a8e761fb44d3cb82a215c5c8a2e1ea16,2024-04-01T01:12:59.077000
CVE-2024-30849,1,1,4aabb9bd1031c9de63789df6a4eecf7c5eb5cf5b1d28121f46f8cb27e6112f78,2024-04-05T08:15:07.733000
CVE-2024-3085,0,0,fded51d53dc12d3d7ee965d316f419f95e091e314414485b8200db89663fd527,2024-04-01T01:12:59.077000
CVE-2024-30858,0,0,16878632bf0dd21efb8a79fb907fb3fd610dae344e4207e4821dadfd05b70fba,2024-04-02T12:50:42.233000
CVE-2024-30859,0,0,07863108200ea1214b143e037da0e726261ba3163514cc96b0c60d438d3489a3,2024-04-02T12:50:42.233000
@ -244021,6 +244032,7 @@ CVE-2024-30871,0,0,d803e8a22e3cb0ffc63ce535e7477c16423f4c13198cbe4b49e5311fcca22
CVE-2024-30872,0,0,f945e56669ed547eb36a2b5a674eaf51c6f019a23fe630e2694f76da90849356,2024-04-01T15:53:18.060000
CVE-2024-3088,0,0,8e3ac933024cbca067c1e71fbcd05cd16f007cceadb9e395d1a7912e6d4c4a98,2024-04-01T01:12:59.077000
CVE-2024-3089,0,0,ecb913d4389f70cc5019c633a263616e8c2eb0cbfbc9caeb5e20ebcc84dd91c1,2024-04-01T01:12:59.077000
CVE-2024-30891,1,1,e12281cb1191ffa9096f2fd71c8ce450f0aa6b4ad8005e3588610e44c1c03829,2024-04-05T08:15:07.800000
CVE-2024-3090,0,0,6efcf7101cc09e49c5b79d9f2d4752051b90babce57580f4f3b9d28367ffa945,2024-04-01T01:12:59.077000
CVE-2024-3091,0,0,4af5b5d1eaeb5dcee2b11f765f7e4e07712d76dbe9222ddb5cfc716c8e60d042,2024-04-01T01:12:59.077000
CVE-2024-3094,0,0,502febf68b0d02803300ecc80fd5edf81a987966a53e4a71d6dd7ef4cc670f65,2024-04-03T06:15:07.873000
@ -244139,6 +244151,7 @@ CVE-2024-3204,0,0,a9dea1ca01b499632a34af3ee57c461ecd8a21787537da790c2ae8f833a611
CVE-2024-3205,0,0,b2f3ceb1bf38a09a954460b526a18eba5a5a22a0c7181b9f1de158755c6153d4,2024-04-03T12:38:04.840000
CVE-2024-3207,0,0,5c9ae7819818cf69391317769652edafe7eb5058db1623e7c6299d6d13471791,2024-04-03T12:38:04.840000
CVE-2024-3209,0,0,30868cdb47dd928f589dfe2abcfe897db3e1f5f5372f4956ca12525c6828bcc3,2024-04-03T12:38:04.840000
CVE-2024-3217,1,1,679d1c28c7be3c33a25056dfbdb8aa41d98bff972405e02ba4eb33f3cb0dab3b,2024-04-05T08:15:07.853000
CVE-2024-3218,0,0,2efa792f2f422ae3d499fd8bd729cdb1e057c75ae9cfbaccf7a66bc466210399,2024-04-03T12:38:04.840000
CVE-2024-3221,0,0,265e838721fb682684198a7086d104f84e57519a8c4d6ef772db38592eb6bf44,2024-04-03T12:38:04.840000
CVE-2024-3222,0,0,b37821a3e0768163f96b2bee06bee09f327b52e150bd3dc09c830a3634a1e6b2,2024-04-03T12:38:04.840000

Can't render this file because it is too large.