Auto-Update: 2024-04-04T04:00:30.461382+00:00

This commit is contained in:
cad-safe-bot 2024-04-04 04:03:19 +00:00
parent 51fc28a6ad
commit 2d7343d508
13 changed files with 558 additions and 29 deletions

View File

@ -2,9 +2,8 @@
"id": "CVE-2023-7152",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-12-29T05:15:09.473",
"lastModified": "2024-03-21T02:50:56.913",
"lastModified": "2024-04-04T02:15:06.203",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
"lang": "en",
@ -134,6 +133,14 @@
"Issue Tracking"
]
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4E2HYWCZB5R4SHY4SZZZSFDMD64N4SOZ/",
"source": "cna@vuldb.com"
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TEK46QAJOXXDZOWOIE2YACUOCZFWOBCK/",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?ctiid.249158",
"source": "cna@vuldb.com",

View File

@ -2,9 +2,8 @@
"id": "CVE-2023-7158",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-12-29T07:15:11.060",
"lastModified": "2024-03-21T02:50:57.260",
"lastModified": "2024-04-04T02:15:06.400",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
"lang": "en",
@ -154,6 +153,14 @@
"Release Notes"
]
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4E2HYWCZB5R4SHY4SZZZSFDMD64N4SOZ/",
"source": "cna@vuldb.com"
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TEK46QAJOXXDZOWOIE2YACUOCZFWOBCK/",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?ctiid.249180",
"source": "cna@vuldb.com",

View File

@ -0,0 +1,51 @@
{
"id": "CVE-2024-2008",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-04-04T03:15:06.053",
"lastModified": "2024-04-04T03:15:06.053",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "The Modal Popup Box \u2013 Popup Builder, Show Offers And News in Popup plugin for WordPress is vulnerable to PHP Object Injection in all versions up to, and including, 1.5.2 via deserialization of untrusted input in the awl_modal_popup_box_shortcode function. This makes it possible for authenticated attackers, with contributor-level access and above, to inject a PHP Object. If a POP chain is present via an additional plugin or theme installed on the target system, it could allow the attacker to delete arbitrary files, retrieve sensitive data, or execute code."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security@wordfence.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
]
},
"references": [
{
"url": "https://plugins.trac.wordpress.org/browser/modal-popup-box/trunk/include/modal-popup-box-shortcode.php#L19",
"source": "security@wordfence.com"
},
{
"url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3062572%40modal-popup-box&new=3062572%40modal-popup-box&sfp_email=&sfph_mail=",
"source": "security@wordfence.com"
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/fca3d106-49df-49fc-a90d-e0cb26bd34b6?source=cve",
"source": "security@wordfence.com"
}
]
}

View File

@ -0,0 +1,59 @@
{
"id": "CVE-2024-2692",
"sourceIdentifier": "help@fluidattacks.com",
"published": "2024-04-04T02:15:06.527",
"lastModified": "2024-04-04T02:15:06.527",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "SiYuan version 3.0.3 allows executing arbitrary commands on the server. This is possible because the application is vulnerable to Server Side XSS.\n"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "help@fluidattacks.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.6,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 2.8,
"impactScore": 6.0
}
]
},
"weaknesses": [
{
"source": "help@fluidattacks.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://fluidattacks.com/advisories/dezco/",
"source": "help@fluidattacks.com"
},
{
"url": "https://github.com/siyuan-note/siyuan/",
"source": "help@fluidattacks.com"
}
]
}

View File

@ -0,0 +1,47 @@
{
"id": "CVE-2024-2803",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-04-04T02:15:06.800",
"lastModified": "2024-04-04T02:15:06.800",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "The ElementsKit Elementor addons plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the countdown widget in all versions up to, and including, 3.0.6 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security@wordfence.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 6.4,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 3.1,
"impactScore": 2.7
}
]
},
"references": [
{
"url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3062463%40elementskit-lite&new=3062463%40elementskit-lite&sfp_email=&sfph_mail=#file12",
"source": "security@wordfence.com"
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/b1c44ad9-e61e-4f29-9c0b-7c0a89b0c8da?source=cve",
"source": "security@wordfence.com"
}
]
}

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2024-2830",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-04-04T03:15:06.230",
"lastModified": "2024-04-04T03:15:06.230",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "The WordPress Tag and Category Manager \u2013 AI Autotagger plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'st_tag_cloud' shortcode in all versions up to, and including, 3.13.0 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security@wordfence.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 6.4,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 3.1,
"impactScore": 2.7
}
]
},
"references": [
{
"url": "https://plugins.trac.wordpress.org/browser/simple-tags/trunk/inc/class.client.php#L346",
"source": "security@wordfence.com"
},
{
"url": "https://plugins.trac.wordpress.org/browser/simple-tags/trunk/inc/class.client.php#L348",
"source": "security@wordfence.com"
},
{
"url": "https://plugins.trac.wordpress.org/changeset/3060746/simple-tags/trunk/inc/class.client.tagcloud.php",
"source": "security@wordfence.com"
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/0f537479-d5ec-46bb-a04e-2c33a2abc759?source=cve",
"source": "security@wordfence.com"
}
]
}

View File

@ -0,0 +1,51 @@
{
"id": "CVE-2024-2868",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-04-04T02:15:07.010",
"lastModified": "2024-04-04T02:15:07.010",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "The ShopLentor \u2013 WooCommerce Builder for Elementor & Gutenberg +12 Modules \u2013 All in One Solution (formerly WooLentor) plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the slitems parameter in the WL Special Day Offer Widget in all versions up to, and including, 2.8.3 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with contributor access or above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security@wordfence.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 6.4,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 3.1,
"impactScore": 2.7
}
]
},
"references": [
{
"url": "https://plugins.trac.wordpress.org/browser/woolentor-addons/tags/2.8.2/includes/addons/universal_product.php#L2548",
"source": "security@wordfence.com"
},
{
"url": "https://plugins.trac.wordpress.org/changeset/3061864/woolentor-addons/tags/2.8.4/includes/addons/universal_product.php",
"source": "security@wordfence.com"
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/27b8e0c0-fb0b-4d36-abc4-3e66ec7b5195?source=cve",
"source": "security@wordfence.com"
}
]
}

View File

@ -0,0 +1,51 @@
{
"id": "CVE-2024-2919",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-04-04T03:15:06.413",
"lastModified": "2024-04-04T03:15:06.413",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "The Gutenberg Blocks by Kadence Blocks \u2013 Page Builder Features plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the Countdown and CountUp Widget in all versions up to, and including, 3.2.31 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security@wordfence.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 6.4,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 3.1,
"impactScore": 2.7
}
]
},
"references": [
{
"url": "https://plugins.trac.wordpress.org/changeset/3062911/kadence-blocks/trunk/includes/assets/js/kb-countdown.min.js",
"source": "security@wordfence.com"
},
{
"url": "https://plugins.trac.wordpress.org/changeset/3062911/kadence-blocks/trunk/includes/assets/js/kb-countup.min.js",
"source": "security@wordfence.com"
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/b38a69c7-91d4-43be-8650-eb1f0029bd44?source=cve",
"source": "security@wordfence.com"
}
]
}

View File

@ -0,0 +1,51 @@
{
"id": "CVE-2024-3022",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-04-04T02:15:07.230",
"lastModified": "2024-04-04T02:15:07.230",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "The BookingPress plugin for WordPress is vulnerable to arbitrary file uploads due to insufficient filename validation in the 'bookingpress_process_upload' function in all versions up to, and including 1.0.87. This allows an authenticated attacker with administrator-level capabilities or higher to upload arbitrary files on the affected site's server, enabling remote code execution."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security@wordfence.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.2,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.2,
"impactScore": 5.9
}
]
},
"references": [
{
"url": "https://plugins.trac.wordpress.org/changeset/3061435/bookingpress-appointment-booking/trunk/core/classes/class.bookingpress_fileupload_class.php",
"source": "security@wordfence.com"
},
{
"url": "https://r0ot.notion.site/BookingPress-1-0-84-Authenticated-Administrator-Arbitrary-File-Upload-lead-to-RCE-e2603371c0c14d828144e26f2fdc1d01?pvs=4",
"source": "security@wordfence.com"
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/049ec264-3ed1-4741-937d-8a633ef0a627?source=cve",
"source": "security@wordfence.com"
}
]
}

View File

@ -0,0 +1,47 @@
{
"id": "CVE-2024-3030",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-04-04T02:15:07.437",
"lastModified": "2024-04-04T02:15:07.437",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "The Announce from the Dashboard plugin for WordPress is vulnerable to Stored Cross-Site Scripting via admin settings in all versions up to, and including, 1.5.2 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with administrator-level permissions and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. This only affects multi-site installations and installations where unfiltered_html has been disabled."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security@wordfence.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 4.4,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.3,
"impactScore": 2.7
}
]
},
"references": [
{
"url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3061409%40announce-from-the-dashboard&new=3061409%40announce-from-the-dashboard&sfp_email=&sfph_mail=",
"source": "security@wordfence.com"
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/b0d1cf3b-5631-49bd-a7aa-86de2ee4b5b9?source=cve",
"source": "security@wordfence.com"
}
]
}

View File

@ -0,0 +1,92 @@
{
"id": "CVE-2024-3274",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-04-04T02:15:07.627",
"lastModified": "2024-04-04T02:15:07.627",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability has been found in D-Link DNS-320L, DNS-320LW and DNS-327L up to 20240403 and classified as problematic. Affected by this vulnerability is an unknown functionality of the file /cgi-bin/info.cgi of the component HTTP GET Request Handler. The manipulation leads to information disclosure. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-259285 was assigned to this vulnerability. NOTE: Vendor was contacted early and confirmed immediately that the product is end-of-life. It should be retired and replaced."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 3.9,
"impactScore": 1.4
}
],
"cvssMetricV2": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.0
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 10.0,
"impactScore": 2.9,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-200"
}
]
}
],
"references": [
{
"url": "https://github.com/netsecfish/info_cgi",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?ctiid.259285",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?id.259285",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?submit.304706",
"source": "cna@vuldb.com"
}
]
}

View File

@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update
```plain
2024-04-04T02:00:32.397316+00:00
2024-04-04T04:00:30.461382+00:00
```
### Most recent CVE Modification Timestamp synchronized with NVD
```plain
2024-04-04T01:15:50.387000+00:00
2024-04-04T03:15:06.413000+00:00
```
### Last Data Feed Release
@ -33,28 +33,30 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
### Total Number of included CVEs
```plain
244028
244037
```
### CVEs added in the last Commit
Recently added CVEs: `6`
Recently added CVEs: `9`
- [CVE-2024-25568](CVE-2024/CVE-2024-255xx/CVE-2024-25568.json) (`2024-04-04T00:15:06.990`)
- [CVE-2024-26258](CVE-2024/CVE-2024-262xx/CVE-2024-26258.json) (`2024-04-04T00:15:07.047`)
- [CVE-2024-29167](CVE-2024/CVE-2024-291xx/CVE-2024-29167.json) (`2024-04-04T00:15:07.103`)
- [CVE-2024-29225](CVE-2024/CVE-2024-292xx/CVE-2024-29225.json) (`2024-04-04T00:15:07.200`)
- [CVE-2024-3272](CVE-2024/CVE-2024-32xx/CVE-2024-3272.json) (`2024-04-04T01:15:50.123`)
- [CVE-2024-3273](CVE-2024/CVE-2024-32xx/CVE-2024-3273.json) (`2024-04-04T01:15:50.387`)
- [CVE-2024-2008](CVE-2024/CVE-2024-20xx/CVE-2024-2008.json) (`2024-04-04T03:15:06.053`)
- [CVE-2024-2692](CVE-2024/CVE-2024-26xx/CVE-2024-2692.json) (`2024-04-04T02:15:06.527`)
- [CVE-2024-2803](CVE-2024/CVE-2024-28xx/CVE-2024-2803.json) (`2024-04-04T02:15:06.800`)
- [CVE-2024-2830](CVE-2024/CVE-2024-28xx/CVE-2024-2830.json) (`2024-04-04T03:15:06.230`)
- [CVE-2024-2868](CVE-2024/CVE-2024-28xx/CVE-2024-2868.json) (`2024-04-04T02:15:07.010`)
- [CVE-2024-2919](CVE-2024/CVE-2024-29xx/CVE-2024-2919.json) (`2024-04-04T03:15:06.413`)
- [CVE-2024-3022](CVE-2024/CVE-2024-30xx/CVE-2024-3022.json) (`2024-04-04T02:15:07.230`)
- [CVE-2024-3030](CVE-2024/CVE-2024-30xx/CVE-2024-3030.json) (`2024-04-04T02:15:07.437`)
- [CVE-2024-3274](CVE-2024/CVE-2024-32xx/CVE-2024-3274.json) (`2024-04-04T02:15:07.627`)
### CVEs modified in the last Commit
Recently modified CVEs: `3`
Recently modified CVEs: `2`
- [CVE-2024-21798](CVE-2024/CVE-2024-217xx/CVE-2024-21798.json) (`2024-04-04T01:15:49.953`)
- [CVE-2024-23910](CVE-2024/CVE-2024-239xx/CVE-2024-23910.json) (`2024-04-04T01:15:50.027`)
- [CVE-2024-25579](CVE-2024/CVE-2024-255xx/CVE-2024-25579.json) (`2024-04-04T01:15:50.083`)
- [CVE-2023-7152](CVE-2023/CVE-2023-71xx/CVE-2023-7152.json) (`2024-04-04T02:15:06.203`)
- [CVE-2023-7158](CVE-2023/CVE-2023-71xx/CVE-2023-7158.json) (`2024-04-04T02:15:06.400`)
## Download and Usage

View File

@ -237934,13 +237934,13 @@ CVE-2023-7148,0,0,ad3d7bb45f68a25f28d4a014a05c7f0c0f5eb59b2332f2a36529e951c01cf7
CVE-2023-7149,0,0,5274abe94fd7c0ae8d01100c182a0608460162f3b4c0a04ca7ef11eeebe117a1,2024-03-21T02:50:56.743000
CVE-2023-7150,0,0,0c87a4b3ec2aaf12c4d9e1fdfb4eb06c5a9800465da5abf8eb5f908f0af74c73,2024-03-21T02:50:56.820000
CVE-2023-7151,0,0,bb32bdd519a1a50b8c5ab4a323d30cc39a75571831ac8e58df336f69b7cfff53,2024-01-23T15:40:52.973000
CVE-2023-7152,0,0,d63315d5b620520be64208de0c636c036bcf933560aed0687debc92391adb734,2024-03-21T02:50:56.913000
CVE-2023-7152,0,1,4204b249f3a43ad13331bc58a5c2cd30cfaf340276ca2426d50c796310e7d72d,2024-04-04T02:15:06.203000
CVE-2023-7153,0,0,e011618db3076d02be0d1ef8dfe51744f3234f2e36498aa2346c160b31a75578,2024-01-24T21:43:31.700000
CVE-2023-7154,0,0,076d7cbaa09541993347ce9e0a30d4438c72b1ebd3caf4aa248135ca6dfc7806,2024-01-23T15:45:39.513000
CVE-2023-7155,0,0,7e7529ab676d8ddb6b782bd27f8d741a82d11bbbbeda4e53a6c0960a51bfc8c0,2024-03-21T02:50:57.017000
CVE-2023-7156,0,0,7b5a4efd1b3be53f0ffd429f40f9e3f3f28a760427bbfbde808e2a385728dc30,2024-03-21T02:50:57.100000
CVE-2023-7157,0,0,e14f25db01f67df37b8eeb853c155d5497d7d420da1cf903e90c685c473ef4b0,2024-03-21T02:50:57.180000
CVE-2023-7158,0,0,1084264640b5cfab07218d254e307ca73441eb13a3347a6cbb1e62a4d9b5cfd7,2024-03-21T02:50:57.260000
CVE-2023-7158,0,1,bf88ece70b3ebdb9d0ed2829f62cd053cff19d2bc94e9f3dcc397e04ebfc456c,2024-04-04T02:15:06.400000
CVE-2023-7159,0,0,7602619793679c82fd6e4078fefba013d97098ffd01706a034b417ac5762a63e,2024-03-21T02:50:57.347000
CVE-2023-7160,0,0,0068dd63e1ae41a9eeb4dd1afabef9df497b4968c8d56ef188f9ba12bb4adcbb,2024-03-21T02:50:57.423000
CVE-2023-7161,0,0,081d75b436b1110fb1f86020897a7d713350804dbf28510a4511fb651652e216,2024-03-21T02:50:57.503000
@ -239507,6 +239507,7 @@ CVE-2024-20054,0,0,8d3193313cee82666cc7a9a9fc4d8e0bcc3af481a0ce555748460cf02c097
CVE-2024-20055,0,0,109d1d9940c1dca8530dc03191274127f8901d271f37fd1cdce803ed70deff34,2024-04-01T12:49:00.877000
CVE-2024-2006,0,0,52d776ed20a145230028cfc4b5ce5b374d35ec688b7308ce8a79b923b7ac4a29,2024-03-13T18:15:58.530000
CVE-2024-2007,0,0,f47e32ba52cda7faacb8492f7684b94da5833a1e1d397bb70c366c91108ebbd0,2024-03-21T12:58:51.093000
CVE-2024-2008,1,1,b9e72dd151c3b6dc237474f44ba3e9dbcc4f38757a56d2566149be6176d2d10f,2024-04-04T03:15:06.053000
CVE-2024-2009,0,0,e2a4086afb53fd84b50e105846813eee57282aed3cce0568cc523b8132740b52,2024-03-21T02:52:26.207000
CVE-2024-2014,0,0,8d7628b414bbcdd7a6ef27a23ad1e3ec91eb3e6ee0b62ef9489eb400579feaac,2024-03-21T12:58:51.093000
CVE-2024-2015,0,0,1c17f5977ed6cdad57e2e0374ea748a50939f7f3d42f37be55afd7aacf9e1e0c,2024-03-21T12:58:51.093000
@ -240166,7 +240167,7 @@ CVE-2024-2179,0,0,ae7ec0d777d4f092532ca994d6b0860fc5ecc6f92bb84e39b0499b0a5cdf3b
CVE-2024-21794,0,0,5140601c591fc7e01c922f6b4426d49907b4278c42a623419c59c4c96fa7afa6,2024-02-07T17:15:44.653000
CVE-2024-21795,0,0,3f97d15b4fad76f44a86834312294b67e000044b0ba6ac0faa07d011642d4d38,2024-04-02T15:15:52.517000
CVE-2024-21796,0,0,ad6ea83e4ba68ed8909637d1ef7b65d12f04c56232c1b05d9173891b89591836,2024-01-30T22:14:16.247000
CVE-2024-21798,0,1,227cee2b08d95673cdf00007b2e5f0a1a8d34bbf3b115cc9a3e417f90fdb9db1,2024-04-04T01:15:49.953000
CVE-2024-21798,0,0,227cee2b08d95673cdf00007b2e5f0a1a8d34bbf3b115cc9a3e417f90fdb9db1,2024-04-04T01:15:49.953000
CVE-2024-2180,0,0,f29f310f994bdc1547d14907db3ea5b567d0e701ee0c912abfad5bc40b39a210,2024-03-15T12:53:06.423000
CVE-2024-21802,0,0,2a0324ca9760c4b3be107883f84a1ed806e6bad72b3badb393d00982ae57c159,2024-02-26T18:15:07.290000
CVE-2024-21803,0,0,412e1fe487e1aa8e1b208c7f0baf850a3bb5b2cd1ac7cabb6ce669e7a4281bbb,2024-02-08T01:57:53.770000
@ -241163,7 +241164,7 @@ CVE-2024-23903,0,0,ecb97aacb6f19585aea8671a201e2d7c3813e0b8271429153f27911a6bbb0
CVE-2024-23904,0,0,678d9b9e94528dc2befb7afc9e4f3790d1499e848c388388aaa93c118b2a19d3,2024-01-29T19:26:29.770000
CVE-2024-23905,0,0,2d8ebad5c05b335845d8a0c6b27832798a9c27087f41f1dd4daf5a7e2afef75a,2024-01-29T19:26:11.517000
CVE-2024-2391,0,0,5eb10c991275accc4f0c04c536ff0ab64c132e711d4ba9c8aec48c31334f05e4,2024-03-21T02:52:33.807000
CVE-2024-23910,0,1,e6adc416dd7b19484faa305c4e8491b3ff3f8809d94d53eb510d517290865995,2024-04-04T01:15:50.027000
CVE-2024-23910,0,0,e6adc416dd7b19484faa305c4e8491b3ff3f8809d94d53eb510d517290865995,2024-04-04T01:15:50.027000
CVE-2024-23917,0,0,43acd2786eef775b4e5af3da03e8f628e79a58b917087bea0e9c91638665592f,2024-02-09T01:05:22.180000
CVE-2024-2392,0,0,42336a48d6bafcd50dc6522fe24a4d56dee45c4fa6295037e9d4d2226834e64c,2024-03-22T12:45:36.130000
CVE-2024-2393,0,0,8cedba0180a7b00def73b6261f8c72d770c30f1bb7624197b9fba956f17cd30c,2024-03-21T02:52:33.897000
@ -241864,11 +241865,11 @@ CVE-2024-25554,0,0,a87c08d7479e0670c1de7ac680e974b7c966b7f12d7b309312798a5acd199
CVE-2024-25559,0,0,621d2089e4066088e4f2e7151d4c52b797349073e2e5f4d074059dc172fb61d6,2024-02-15T06:23:39.303000
CVE-2024-2556,0,0,7dda608d4c973332c242425a23922df86f3028261d216807853df92150e28261,2024-03-21T02:52:37.803000
CVE-2024-25567,0,0,bbb8c64eb3dcee3e8e89951734f837d0c3bea66c11459a30529f4c9133593805,2024-03-22T12:45:36.130000
CVE-2024-25568,1,1,65656181592ea9bc19c9c46396613fc484931712e79b712d3a779df06bba53fe,2024-04-04T00:15:06.990000
CVE-2024-25568,0,0,65656181592ea9bc19c9c46396613fc484931712e79b712d3a779df06bba53fe,2024-04-04T00:15:06.990000
CVE-2024-2557,0,0,bd3cbcd6fdd2bc53d05ad0a21dcf76dc9100645c8cd39cc3bfd0cd796821c2ef,2024-03-21T02:52:37.887000
CVE-2024-25574,0,0,4bc8d3cd97ad31d3dfd232c462a09dc1924d30756dc7bfcb27690950ff1edfb2,2024-04-02T12:50:42.233000
CVE-2024-25578,0,0,ff68f9ee0e3394b3fa83fe8766f2e044325a5fd043b437de063c0cd80654c610,2024-03-01T14:04:26.010000
CVE-2024-25579,0,1,838cd17118b030eacfba49a0ada30a1ba4831f0bedbfd768ff2707f55789078e,2024-04-04T01:15:50.083000
CVE-2024-25579,0,0,838cd17118b030eacfba49a0ada30a1ba4831f0bedbfd768ff2707f55789078e,2024-04-04T01:15:50.083000
CVE-2024-2558,0,0,9b2e64cc1dfa18aa6ab6ed26c2435de053f445557e20541392c5e86001c65488,2024-03-21T02:52:37.973000
CVE-2024-25580,0,0,aa78600da8abcfd02ed93a87510a3e3684060f93f36da496d331a2464d925d23,2024-03-27T12:29:30.307000
CVE-2024-2559,0,0,e913f295acbf3f21c20619071c5c76f626d7ca39e71d862a4c6e578c87ef0b76,2024-03-21T02:52:38.050000
@ -242236,7 +242237,7 @@ CVE-2024-2622,0,0,2faba3761f6560c88eea9c3b0fa6fc4529a548f032a256e1b05f67335e6c11
CVE-2024-26246,0,0,6c174a39b8e16966075834fa377a33ef3e5c5829eb1a43647414103e1222a0e5,2024-03-19T17:05:45.193000
CVE-2024-26247,0,0,ed304d3168190e2757b85fd85fc0b38856926e8e4ca6b0df56c71d50554fa5bc,2024-03-26T03:18:26.197000
CVE-2024-2625,0,0,176202763572967bdd2403d6220b5ef3a0eeae1c4e7f0e46612d30bfb12e4570,2024-04-01T15:32:17.010000
CVE-2024-26258,1,1,766e8ee3881910a81a928091bc16ea7cd82e7c62393de16666cf602140b8ed16,2024-04-04T00:15:07.047000
CVE-2024-26258,0,0,766e8ee3881910a81a928091bc16ea7cd82e7c62393de16666cf602140b8ed16,2024-04-04T00:15:07.047000
CVE-2024-2626,0,0,0f82bfcd678adfe2206a7b49362dbece30aa00242a9c52e3ba26851c15f6dba3,2024-04-01T15:22:37.883000
CVE-2024-26260,0,0,e265a50d624e832bed578eaaf671225475ee52a0a641253d8d3fa4cc960d0968,2024-02-15T06:23:39.303000
CVE-2024-26261,0,0,0e54368aae0104b528b2c2b10aa27bd070162dbc45df6e809e95785e5efd10d2,2024-02-15T06:23:39.303000
@ -242565,6 +242566,7 @@ CVE-2024-2687,0,0,8743e8c4178f9b4c342f85388b698da988fcd5df7a9f830356accbc2c7d603
CVE-2024-2688,0,0,2813e3d77c2b2d83f751b34ba79d9b337f290aff8a39ca0bf2b5affbb2644102,2024-03-25T01:51:01.223000
CVE-2024-2689,0,0,658993c0403fad94345d3cb8155974fc89f004b988ac6221fcb671e6effc6535,2024-04-03T22:15:07.290000
CVE-2024-2690,0,0,b9f1b9556b2658a97b0aa5fed823e2a3f219863f8b3c3eeec7a6e11e4b693950,2024-03-21T02:52:42.713000
CVE-2024-2692,1,1,4dff168fae971f35ea778b7b59e72228b39afed9926b88e181ded3a6fd213068,2024-04-04T02:15:06.527000
CVE-2024-2702,0,0,865ffb7613b5d4b81a5327fb07c7988ee6b4cd29868791960db416ef49370f10,2024-03-20T13:00:16.367000
CVE-2024-2703,0,0,07081de6587d09870ff55039e594f5ce8e9c97e5814ee473417e88613bb5eb37,2024-03-21T02:52:42.793000
CVE-2024-2704,0,0,e286b904999417c65c8b69a6059186f449beb8789fde8f7550b2c51d635749f0,2024-03-21T02:52:42.870000
@ -242911,6 +242913,7 @@ CVE-2024-28015,0,0,c36a569e47a8cc25a559aa19a480d47088d8456072eb6e8c9e0575d3988b3
CVE-2024-28016,0,0,fe85c1f239b1cebe9726ce271c3f5722bfdbb4bcff9b0aba329f58c6fcbf12b8,2024-04-02T06:15:15.603000
CVE-2024-2802,0,0,3b7ed9aefbc68681b0633b6ab16c0b3db6db844ee4c655f6c7e6863ac6e1f543,2024-03-26T15:15:49.677000
CVE-2024-28029,0,0,9e465d515603ce2b4056e1d4099525822960990d4afbdcda109cb1a09fe772c2,2024-03-25T16:06:44.403000
CVE-2024-2803,1,1,ecd366c5a12c458fcf323ff3df753bc025edf8ad4c718558932b72f23ea65c91,2024-04-04T02:15:06.800000
CVE-2024-28033,0,0,d380f707343e80ca8a48383d7130e8455ae81fc182e0d67c36374f1eb571652f,2024-03-26T12:55:05.010000
CVE-2024-28034,0,0,59f37b2f71aecfc048b35bdfeca5cf2bf5792e3fd57d1b0f3eaa95911ebef442,2024-03-26T12:55:05.010000
CVE-2024-28039,0,0,9ef35c96ff38e007b2fd4f37c3f1f5b6d35461c4eaa69f2b36faccd438b26411,2024-03-18T12:38:25.490000
@ -243056,6 +243059,7 @@ CVE-2024-28283,0,0,39f85b2f17c0fe895d0bdb32702da6d7a9c62274d2c91228b15f8ef37a4f9
CVE-2024-28286,0,0,0c649cd6694a1837fe5561b872f74550eafab1ff52e9c04655d5ad406a1d7e85,2024-03-21T12:58:51.093000
CVE-2024-28287,0,0,8355e78e2bcacfd30beedd02a16b8cbb7fa125f666660317b865986783b6c2d0,2024-04-02T18:12:16.283000
CVE-2024-28288,0,0,bbf61567f9663b711efc4f198529fd360d88d5a87ddc912234861f379f96afdd,2024-04-01T01:12:59.077000
CVE-2024-2830,1,1,96e6c0abaf03aac88aa8c316493da97b9ccd76a5da8769ff2fa398d63b5238f7,2024-04-04T03:15:06.230000
CVE-2024-28303,0,0,1e1fe6d5ea3f2a6f114bc62ec7183db4733d3d529e4e5786c421b928ce2f2bf1,2024-03-20T13:00:16.367000
CVE-2024-28318,0,0,4464c0d64b943a4f9205011ad1109527e8aa088cb5ff5456cd49e911c2d1f722,2024-03-15T16:26:49.320000
CVE-2024-28319,0,0,e376890f5ff8761a0926623e9576a5238806c37f36258b3aec951592cbe60412,2024-03-15T16:26:49.320000
@ -243173,6 +243177,7 @@ CVE-2024-28676,0,0,801d735d88a2c38558c90696937a503a364bdc5ac079aab35f708a8cac6bb
CVE-2024-28677,0,0,beda9fb5e19c8e32c2bb233bf7e04303e98e61bb2557b7038cbec5829242cafe,2024-03-13T18:15:58.530000
CVE-2024-28678,0,0,e9f2e307c9c14d85cdf0d7276dece168215df066834aac177e5e011a7af00ff3,2024-03-13T18:15:58.530000
CVE-2024-28679,0,0,0c6e84e914fdaa4e663110efa631e88c6cae34e7955c7cdafa51b2651294cb69,2024-03-13T18:15:58.530000
CVE-2024-2868,1,1,a0aac9acdb0ba19371b4cc3ab0db1f3d8b7c6da9590f62af8a8d7e745b381fb3,2024-04-04T02:15:07.010000
CVE-2024-28680,0,0,f0cb3475dd2248a613f045cb0e92e770aee1d1d2137270856a92a44b18528f47,2024-03-13T18:15:58.530000
CVE-2024-28681,0,0,ed8a4fd064b6b3346412990e6226cbe04bee8a6bd2aaad4671fdcd0478ce5ec1,2024-03-13T18:15:58.530000
CVE-2024-28682,0,0,2c53ed716809a76ded005fd10ac6d93891dbf2dd9f02238c66f1445af60cb8e7,2024-03-13T18:15:58.530000
@ -243328,7 +243333,7 @@ CVE-2024-29151,0,0,ef852a662e1eaee7e15d971ee7451f2c3e954b3d808a30cb9a36bbe68bb24
CVE-2024-29154,0,0,dab131c9ff393e828252009730d8617a5e1a4fb5cfb7f2db054056bc6f27c2ba,2024-03-18T12:38:25.490000
CVE-2024-29156,0,0,98cbc37d07cb77607ab83580cc50ba5a01141613b7a3bb770966a3d6831e2326,2024-03-18T12:38:25.490000
CVE-2024-2916,0,0,6871ce1ac12c0adda9a1495db174447a7645b0f8622337f63e4d979317d65207,2024-03-27T12:29:30.307000
CVE-2024-29167,1,1,9137b4e6c505da150c1135337d6649a6081f1aeb2e87f468a9c85674ffbc5bde,2024-04-04T00:15:07.103000
CVE-2024-29167,0,0,9137b4e6c505da150c1135337d6649a6081f1aeb2e87f468a9c85674ffbc5bde,2024-04-04T00:15:07.103000
CVE-2024-2917,0,0,cc7c53d7d6aa23ee02922950dbfd98ec950f87014b4781a546614dff66bfbad3,2024-03-27T12:29:30.307000
CVE-2024-29179,0,0,f19d4d0a9f8b6dc85e6e021ab22950c73dd30b1b16e940f3cfc8d8b6deab42d4,2024-03-26T12:55:05.010000
CVE-2024-29180,0,0,e32bebc90fbd05fe3a3edfae9506df906c8ca56e295fcb3cc3f3f384d12528c8,2024-03-21T19:47:03.943000
@ -243338,6 +243343,7 @@ CVE-2024-29186,0,0,4d22f13bcc9a989b4457971fb422d0f63596eb5c598cc015a08c44b1e3975
CVE-2024-29187,0,0,b20c442660011aa9a00d748e283e3cff30d410ce48e3d079b901e0f36dcc61f4,2024-03-25T01:51:01.223000
CVE-2024-29188,0,0,a88946c34860ffe9844c033cf176d3b0a07d4a26b7808112b8bd0f05131d96e8,2024-03-25T01:51:01.223000
CVE-2024-29189,0,0,6878e9b35a058677d2a3fa4fc5bfa3461c367e63050b0e9c52331e170e2ec716,2024-03-26T12:55:05.010000
CVE-2024-2919,1,1,6b30411f4300618aef7f8a07053fa275b657e104a3d0434bb2d54c9d4bca3417,2024-04-04T03:15:06.413000
CVE-2024-29190,0,0,06fd81282a65c29bad2a807438b949724256368bd8f788b06f116f9ca54b17a0,2024-03-25T01:51:01.223000
CVE-2024-29194,0,0,61bcf80dc8c33623e289063809985cd69cc66b52cb236ef7d952a2c24a0c4127,2024-03-25T01:51:01.223000
CVE-2024-29195,0,0,12b6fcead703f320c2faaa3dbf933701901e834c51cbd479cd70a3447afc3114,2024-03-26T12:55:05.010000
@ -243350,7 +243356,7 @@ CVE-2024-29202,0,0,710d7ee4855d6fe6e591666dc35bf54bd7c26416e7ed34ce9d7c18b13c56e
CVE-2024-29203,0,0,85853d1d6c0b7cff8ded9ca779662219e1e7d461c7c9aed96ad32295a032c6f6,2024-03-26T17:09:53.043000
CVE-2024-2921,0,0,a7048ceb487f73059844764517da213b04f370019c5cc0c6fe2153431d1dd6cb,2024-03-26T17:09:53.043000
CVE-2024-29216,0,0,59c06798795d05e391cdd301154441d31362295e800c3b46a2b7bd83a3e2dbc0,2024-03-25T13:47:14.087000
CVE-2024-29225,1,1,4fb529425e69e4b0cbfa2f9f09303ddc74d023065b1b17522e775f73a75a9e71,2024-04-04T00:15:07.200000
CVE-2024-29225,0,0,4fb529425e69e4b0cbfa2f9f09303ddc74d023065b1b17522e775f73a75a9e71,2024-04-04T00:15:07.200000
CVE-2024-29227,0,0,eecaff6ef866c6c9ce7329c8719d8151618914bed20188bbeb2cfe204e821322,2024-03-28T12:42:56.150000
CVE-2024-29228,0,0,0396b2f19bb32ec6c2e65f58d8f3992a3d27b02bc4a6c851b5d5b4cfa0460540,2024-03-28T12:42:56.150000
CVE-2024-29229,0,0,6dd1964f03a465c5b1d78ea2599ed81e5df193b0ca5daa792343c5fca8270ef3,2024-03-28T12:42:56.150000
@ -243638,6 +243644,7 @@ CVE-2024-30202,0,0,8f653afa9be834d6068a82d15d250296f87495118f4f1c30c90cbc157fddc
CVE-2024-30203,0,0,a1d664e0e9a71620a1b21449b8bc268488489a282580bac90b40062a439c83a7,2024-03-25T16:43:06.137000
CVE-2024-30204,0,0,bf1cbd8aaa2b36eb1f7808443cd1dc94c2d123df04230a458090af1180122865,2024-03-25T16:43:06.137000
CVE-2024-30205,0,0,d8d475f93d08b2037de38fb56b8f07beb7b6f1c5b446fee65bfc13f5246e2c4e,2024-03-25T16:43:06.137000
CVE-2024-3022,1,1,a37d5d560b38f78b564bad8226b6553a4f0987dbeb8270e279a97f23bbbe3d67,2024-04-04T02:15:07.230000
CVE-2024-30221,0,0,23f871339b04b26b03b1ae0b592c573034cab277a7f5f76554e69b2658f3686d,2024-03-28T12:42:56.150000
CVE-2024-30222,0,0,3f187efc44dcd846c225c38744c60f6e219f2e75a834b7bcc385a175d490ff30,2024-03-28T12:42:56.150000
CVE-2024-30223,0,0,f5cdd58c36ca3d81f7cad6e0467c6024652dcf4e8a185fac81b8d0d0618da80d,2024-03-28T12:42:56.150000
@ -243668,6 +243675,7 @@ CVE-2024-30246,0,0,491c8e2c4543911d193547ad3a12e1f3a35c8b83c234dd293b662e1fad025
CVE-2024-30247,0,0,17cc965a0b029d9272a0f5015c16eff346ab6d0b38ece20a3e3095775d548462,2024-04-01T01:12:59.077000
CVE-2024-30248,0,0,25c63ea78319bc00f7f00382fd630bb3eaff4535f4e416eeeceadc0cb646cca2,2024-04-02T18:12:16.283000
CVE-2024-30265,0,0,54782d17edd9c907dd6f078e703eac63fd4cdc0b69fbaa76d7a645277b98f464,2024-04-03T23:15:13.423000
CVE-2024-3030,1,1,e54b15ec9f6821950f57943cadaa258b3c87135be2e9982368f75c2ce52126fd,2024-04-04T02:15:07.437000
CVE-2024-30322,0,0,64e521cd60b942f55f264dd1b34a0063ca35d4db4eef121c1f7bc208aac4f7ab,2024-04-03T17:24:18.150000
CVE-2024-30323,0,0,e32fdd05c5f30f68cf1412b7e36fda0cb57a7690cef1889aa844a8506beb3ac4,2024-04-03T17:24:18.150000
CVE-2024-30324,0,0,527c6e011dbcb72aeaa94e91760184a03f584736345d9e33e4037380190847ac,2024-04-03T17:24:18.150000
@ -244025,5 +244033,6 @@ CVE-2024-3257,0,0,b08a6413edbe423942780a6fe023bc538f97dad558ddbc91a724f215cfc85e
CVE-2024-3258,0,0,16d450bc3554c2a319117adc94d8a7dcb1f68b8821fc173e15562a1ba48b306c,2024-04-03T17:24:18.150000
CVE-2024-3259,0,0,59128ca045cd2f7fbe88d58e11ffcce19ef1d2f5d6abea61087e98d65d4fd821,2024-04-03T17:24:18.150000
CVE-2024-3270,0,0,ee7ab86f7bf43358544c245654b91101b254fc6f7c652d1821c4b3bc289b1731,2024-04-03T23:15:13.650000
CVE-2024-3272,1,1,ec957dadeec43e12f55685313ce87fc6f1845369f9e4bed1d35809970a1013da,2024-04-04T01:15:50.123000
CVE-2024-3273,1,1,08118f9907decf7bfcc2bfa04d870d8a923a71212110e86a411bc35b45b8e9b9,2024-04-04T01:15:50.387000
CVE-2024-3272,0,0,ec957dadeec43e12f55685313ce87fc6f1845369f9e4bed1d35809970a1013da,2024-04-04T01:15:50.123000
CVE-2024-3273,0,0,08118f9907decf7bfcc2bfa04d870d8a923a71212110e86a411bc35b45b8e9b9,2024-04-04T01:15:50.387000
CVE-2024-3274,1,1,58afdb0d09379d55aa4fd9c97b270d39b7e879773b86e2e5f85b0563bcd1125f,2024-04-04T02:15:07.627000

Can't render this file because it is too large.