Auto-Update: 2024-04-30T20:00:37.911341+00:00

This commit is contained in:
cad-safe-bot 2024-04-30 20:03:28 +00:00
parent 2f8f225fab
commit 48aea1f21b
30 changed files with 1020 additions and 107 deletions

View File

@ -2,8 +2,8 @@
"id": "CVE-2019-19750",
"sourceIdentifier": "cve@mitre.org",
"published": "2019-12-12T18:15:13.930",
"lastModified": "2019-12-30T14:42:42.273",
"vulnStatus": "Analyzed",
"lastModified": "2024-04-30T18:15:19.217",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@ -101,6 +101,10 @@
"Patch",
"Third Party Advisory"
]
},
{
"url": "https://rsaxvc.net/blog/2020/4/10/Widespread_re-use_of_SSH_Host_Keys_in_Ethereum_Mining_Rig_Operating_Systems.html",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,24 @@
{
"id": "CVE-2019-19751",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-04-30T18:15:19.323",
"lastModified": "2024-04-30T19:35:36.960",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "easyMINE before 2019-12-05 ships with SSH host keys baked into the installation image, which allows man-in-the-middle attacks and makes identification of all public IPv4 nodes trivial with Shodan.io."
}
],
"metrics": {},
"references": [
{
"url": "https://blog.easymine.io",
"source": "cve@mitre.org"
},
{
"url": "https://rsaxvc.net/blog/2020/4/10/Widespread_re-use_of_SSH_Host_Keys_in_Ethereum_Mining_Rig_Operating_Systems.html",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,24 @@
{
"id": "CVE-2019-19752",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-04-30T18:15:19.380",
"lastModified": "2024-04-30T19:35:36.960",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "nvOC through 3.2 ships with SSH host keys baked into the installation image, which allows man-in-the-middle attacks and makes identification of all public IPv4 nodes trivial with Shodan.io. NOTE: as of 2019-12-01, the vendor indicated plans to fix this in the next image build."
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/papampi/nvOC_by_fullzero_Community_Release/commits/release",
"source": "cve@mitre.org"
},
{
"url": "https://rsaxvc.net/blog/2020/4/10/Widespread_re-use_of_SSH_Host_Keys_in_Ethereum_Mining_Rig_Operating_Systems.html",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,24 @@
{
"id": "CVE-2019-19753",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-04-30T18:15:19.437",
"lastModified": "2024-04-30T19:35:36.960",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "SimpleMiningOS through v1259 ships with SSH host keys baked into the installation image, which allows man-in-the-middle attacks and makes identification of all public IPv4 nodes trivial with Shodan.io. NOTE: the vendor indicated that they have no plans to fix this, and discourage deployment using public IPv4."
}
],
"metrics": {},
"references": [
{
"url": "https://rsaxvc.net/blog/2020/4/10/Widespread_re-use_of_SSH_Host_Keys_in_Ethereum_Mining_Rig_Operating_Systems.html",
"source": "cve@mitre.org"
},
{
"url": "https://simplemining.net/page/changelog",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,24 @@
{
"id": "CVE-2019-19754",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-04-30T18:15:19.507",
"lastModified": "2024-04-30T19:35:36.960",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "HiveOS through 0.6-102@191212 ships with SSH host keys baked into the installation image, which allows man-in-the-middle attacks and makes identification of all public IPv4 nodes trivial with Shodan.io. NOTE: as of 2019-09-26, the vendor indicated that they would consider fixing this."
}
],
"metrics": {},
"references": [
{
"url": "https://hiveos.farm/changelog/",
"source": "cve@mitre.org"
},
{
"url": "https://rsaxvc.net/blog/2020/4/10/Widespread_re-use_of_SSH_Host_Keys_in_Ethereum_Mining_Rig_Operating_Systems.html",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,24 @@
{
"id": "CVE-2019-19755",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-04-30T18:15:19.557",
"lastModified": "2024-04-30T19:35:36.960",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "ethOS through 1.3.3 ships with SSH host keys baked into the installation image, which allows man-in-the-middle attacks and makes identification of all public IPv4 nodes trivial with Shodan.io. NOTE: as of 2019-12-01, the vendor indicated that they plan to fix this."
}
],
"metrics": {},
"references": [
{
"url": "http://ethosdistro.com/changelog/",
"source": "cve@mitre.org"
},
{
"url": "https://rsaxvc.net/blog/2020/4/10/Widespread_re-use_of_SSH_Host_Keys_in_Ethereum_Mining_Rig_Operating_Systems.html",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2020-27478",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-04-30T19:15:22.773",
"lastModified": "2024-04-30T19:35:36.960",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "Cross Site Scripting vulnerability found in Simplcommerce v.40734964b0811f3cbaf64b6dac261683d256f961 thru 3103357200c70b4767986544e01b19dbf11505a7 allows a remote attacker to execute arbitrary code via a crafted script to the search bar feature."
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/simplcommerce/SimplCommerce/issues/943",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,24 @@
{
"id": "CVE-2020-5200",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-04-30T18:15:19.650",
"lastModified": "2024-04-30T19:35:36.960",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "Minerbabe through V4.16 ships with SSH host keys baked into the installation image, which allows man-in-the-middle attacks and makes identification of all public IPv4 nodes trivial with Shodan.io."
}
],
"metrics": {},
"references": [
{
"url": "https://en.minerbabe.com/pc.html/#/helps/updateLog",
"source": "cve@mitre.org"
},
{
"url": "https://rsaxvc.net/blog/2020/4/10/Widespread_re-use_of_SSH_Host_Keys_in_Ethereum_Mining_Rig_Operating_Systems.html",
"source": "cve@mitre.org"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-28863",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-04-18T14:15:07.383",
"lastModified": "2023-04-27T19:50:21.307",
"vulnStatus": "Analyzed",
"lastModified": "2024-04-30T19:15:22.867",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@ -82,6 +82,10 @@
"tags": [
"Product"
]
},
{
"url": "https://www.kb.cert.org/vuls/id/163057",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2023-36268",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-04-30T18:15:19.730",
"lastModified": "2024-04-30T19:35:36.960",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "An issue in The Document Foundation Libreoffice v.7.4.7 allows a remote attacker to cause a denial of service via a crafted .ppt file."
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/kfx-N/test1",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2023-49473",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-04-30T19:15:22.980",
"lastModified": "2024-04-30T19:35:36.960",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "Shenzhen JF6000 Cloud Media Collaboration Processing Platform firmware version V1.2.0 and software version V2.0.0 build 6245 is vulnerable to Incorrect Access Control."
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/Hack404-007/cves-info/blob/main/JF6000-exp",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2023-50053",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-04-30T19:15:23.037",
"lastModified": "2024-04-30T19:35:36.960",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "An issue in Foundation.app Foundation platform 1.0 allows a remote attacker to obtain sensitive information via the Web3 authentication process of Foundation, the signed message lacks a nonce (random number)"
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/d0scoo1/Web3AuthRA",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2023-50059",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-04-30T19:15:23.097",
"lastModified": "2024-04-30T19:35:36.960",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "An issue ingalxe.com Galxe platform 1.0 allows a remote attacker to obtain sensitive information via the Web3 authentication process of Galxe, the signed message lacks a nonce (random number)"
}
],
"metrics": {},
"references": [
{
"url": "https://galxe.com/",
"source": "cve@mitre.org"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-52455",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-02-23T15:15:08.193",
"lastModified": "2024-02-23T16:14:43.447",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-04-30T19:34:34.080",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -14,19 +14,89 @@
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: iommu: no reservar regi\u00f3n IOVA de longitud 0 Cuando el gestor de arranque/firmware no configura los framebuffers, su direcci\u00f3n y tama\u00f1o son 0 en la propiedad \"iommu-addresses\". Si la regi\u00f3n IOVA est\u00e1 reservada con una longitud de 0, termina corrompiendo el rbtree de IOVA con una entrada que tiene pfn_hi < pfn_lo. Si pretendemos utilizar el controlador de pantalla en el kernel sin framebuffer, entonces las asignaciones IOMMU de pantalla fallar\u00e1n ya que se reserva todo el espacio IOVA v\u00e1lido cuando la direcci\u00f3n y la longitud se pasan como 0. Una soluci\u00f3n ideal ser\u00eda que el firmware elimine la propiedad \"iommu-addresses\". y la \"regi\u00f3n de memoria\" correspondiente si la pantalla no est\u00e1 presente. Pero el kernel deber\u00eda poder manejar esto verificando el tama\u00f1o de la regi\u00f3n IOVA y omitiendo la reserva de IOVA si el tama\u00f1o es 0. Adem\u00e1s, agregue una advertencia si el firmware solicita una reserva de regi\u00f3n IOVA de longitud 0."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.3.0",
"versionEndExcluding": "6.6.14",
"matchCriteriaId": "723F5211-5C37-4F95-A4D3-FA6C2E6F914C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.7.0",
"versionEndExcluding": "6.7.2",
"matchCriteriaId": "0EA3778C-730B-464C-8023-18CA6AC0B807"
}
]
}
]
}
],
"references": [
{
"url": "https://git.kernel.org/stable/c/5e23e283910c9f30248732ae0770bcb0c9438abf",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/98b8a550da83cc392a14298c4b3eaaf0332ae6ad",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/bb57f6705960bebeb832142ce9abf43220c3eab1",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-52456",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-02-23T15:15:08.237",
"lastModified": "2024-02-23T16:14:43.447",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-04-30T19:34:11.347",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -14,31 +14,131 @@
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: serial: imx: corrige el punto muerto de la m\u00e1quina de estado tx Cuando se usa el puerto serie como puerto RS485, la m\u00e1quina de estado tx se usa para controlar el pin RTS para controlar el pin TX_EN del transceptor RS485. Cuando el puerto TTY se cierra en medio de una transmisi\u00f3n (por ejemplo, durante una falla de la aplicaci\u00f3n en el \u00e1rea de usuario), imx_uart_shutdown deshabilita la interfaz y deshabilita la interrupci\u00f3n de transmisi\u00f3n completa. Despu\u00e9s de eso, imx_uart_stop_tx abandona una transmisi\u00f3n incompleta, para ser reactivada por la interrupci\u00f3n de TC. Esta interrupci\u00f3n est\u00e1 deshabilitada y, por lo tanto, la m\u00e1quina de estados tx nunca sale de ENVIAR. La m\u00e1quina de estados ahora est\u00e1 en punto muerto y TX_EN permanece bajo, lo que hace que la interfaz sea in\u00fatil. imx_uart_stop_tx ahora verifica si hay transmisiones incompletas Y si las interrupciones TC est\u00e1n habilitadas antes de volver a activar el rescate. Esto garantiza que se alcance el estado de manejo de la m\u00e1quina y que est\u00e9 configurado correctamente en WAIT_AFTER_SEND."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-667"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.9.0",
"versionEndExcluding": "5.10.209",
"matchCriteriaId": "CDB2CF71-A47E-4390-B675-6597A78D6ADE"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.11.0",
"versionEndExcluding": "5.15.148",
"matchCriteriaId": "E25E1389-4B0F-407A-9C94-5908FF3EE88B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.16.0",
"versionEndExcluding": "6.1.75",
"matchCriteriaId": "2C4951FA-80C0-4B4C-9836-6E5035DEB0F9"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.2.0",
"versionEndExcluding": "6.6.14",
"matchCriteriaId": "BDBBEB0E-D13A-4567-8984-51C5375350B9"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.7.0",
"versionEndExcluding": "6.7.2",
"matchCriteriaId": "0EA3778C-730B-464C-8023-18CA6AC0B807"
}
]
}
]
}
],
"references": [
{
"url": "https://git.kernel.org/stable/c/63ee7be01a3f7d28b1ea8b8d7944f12bb7b0ed06",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/6e04a9d30509fb53ba6df5d655ed61d607a7cfda",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/763cd68746317b5d746dc2649a3295c1efb41181",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/78d60dae9a0c9f09aa3d6477c94047df2fe6f7b0",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/9a662d06c22ddfa371958c2071dc350436be802b",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/ff168d4fdb0e1ba35fb413a749b3d6cce918ec19",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-52457",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-02-23T15:15:08.290",
"lastModified": "2024-02-23T16:14:43.447",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-04-30T19:28:17.500",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -14,35 +14,144 @@
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: serial: 8250: omap: no omita la liberaci\u00f3n de recursos si pm_runtime_resume_and_get() falla. Devolver un c\u00f3digo de error desde .remove() hace que el n\u00facleo del controlador emita el peque\u00f1o y \u00fatil mensaje de error: eliminar la devoluci\u00f3n de llamada devolvi\u00f3 un valor distinto de cero. Esto ser\u00e1 ignorado. y luego retire el dispositivo de todos modos. Entonces, en este caso, todos los recursos que no fueron liberados se filtran. Omitir serial8250_unregister_port() tiene el potencial de mantener suficiente UART disponible para desencadenar un use-after-free. As\u00ed que reemplace el retorno de error (y con \u00e9l el peque\u00f1o mensaje de error \u00fatil) por un mensaje de error m\u00e1s \u00fatil y contin\u00fae con la limpieza."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-416"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionEndExcluding": "5.4.268",
"matchCriteriaId": "F13F5EED-121D-4AB6-BB34-59D3F9D7A2F7"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.5.0",
"versionEndExcluding": "5.10.209",
"matchCriteriaId": "5D2E4F24-2FBB-4434-8598-2B1499E566B5"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.11.0",
"versionEndExcluding": "5.15.148",
"matchCriteriaId": "E25E1389-4B0F-407A-9C94-5908FF3EE88B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.16",
"versionEndExcluding": "6.1.75",
"matchCriteriaId": "070D0ED3-90D0-4F95-B1FF-57D7F46F332D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.2.0",
"versionEndExcluding": "6.6.14",
"matchCriteriaId": "BDBBEB0E-D13A-4567-8984-51C5375350B9"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.7.0",
"versionEndExcluding": "6.7.2",
"matchCriteriaId": "0EA3778C-730B-464C-8023-18CA6AC0B807"
}
]
}
]
}
],
"references": [
{
"url": "https://git.kernel.org/stable/c/828cd829483f0cda920710997aed79130b0af690",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/887a558d0298d36297daea039954c39940228d9b",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/95e4e0031effad9837af557ecbfd4294a4d8aeee",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/ad90d0358bd3b4554f243a425168fc7cebe7d04e",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/b502fb43f7fb55aaf07f6092ab44657595214b93",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/bc57f3ef8a9eb0180606696f586a6dcfaa175ed0",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/d74173bda29aba58f822175d983d07c8ed335494",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-52460",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-02-23T15:15:08.440",
"lastModified": "2024-02-23T16:14:43.447",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-04-30T19:16:12.493",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -14,15 +14,75 @@
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: drm/amd/display: corrige la desreferencia del puntero NULL en hibernaci\u00f3n. Durante la secuencia de hibernaci\u00f3n, es posible que el contexto de origen no tenga clk_mgr. As\u00ed que no lo utilices para buscar compatibilidad con DML2."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-476"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.7.0",
"versionEndExcluding": "6.7.2",
"matchCriteriaId": "0EA3778C-730B-464C-8023-18CA6AC0B807"
}
]
}
]
}
],
"references": [
{
"url": "https://git.kernel.org/stable/c/6b80326efff093d037e0971831dca6ebddba9b45",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/b719a9c15d52d4f56bdea8241a5d90fd9197ce99",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
}
]
}

View File

@ -0,0 +1,24 @@
{
"id": "CVE-2024-22546",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-04-30T19:15:23.147",
"lastModified": "2024-04-30T19:35:36.960",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "TRENDnet TEW-815DAP 1.0.2.0 is vulnerable to Command Injection via the do_setNTP function. An authenticated attacker with administrator privileges can leverage this vulnerability over the network via a malicious POST request."
}
],
"metrics": {},
"references": [
{
"url": "https://warp-desk-89d.notion.site/TEW-815DAP-94a631c20dee4f399268dbcc880f1f4c",
"source": "cve@mitre.org"
},
{
"url": "https://www.trendnet.com/support/support-detail.asp?prod=105_TEW-815DAP",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,24 @@
{
"id": "CVE-2024-26331",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-04-30T19:15:23.200",
"lastModified": "2024-04-30T19:35:36.960",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "ReCrystallize Server 5.10.0.0 uses a authorization mechanism that relies on the value of a cookie, but it does not bind the cookie value to a session ID. Attackers can easily modify the cookie value, within a browser or by implementing client-side code outside of a browser. Attackers can bypass the authentication mechanism by modifying the cookie to contain an expected value."
}
],
"metrics": {},
"references": [
{
"url": "https://sensepost.com/blog/2024/from-discovery-to-disclosure-recrystallize-server-vulnerabilities/",
"source": "cve@mitre.org"
},
{
"url": "https://www.recrystallize.com/merchant/ReCrystallize-Server-for-Crystal-Reports.htm",
"source": "cve@mitre.org"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-26584",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-02-21T15:15:09.420",
"lastModified": "2024-04-03T14:15:15.613",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-04-30T19:35:07.273",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -14,23 +14,103 @@
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: net: tls: manejar el retraso de solicitudes criptogr\u00e1ficas Dado que estamos configurando el indicador CRYPTO_TFM_REQ_MAY_BACKLOG en nuestras solicitudes a la API criptogr\u00e1fica, crypto_aead_{encrypt,decrypt} puede devolver -EBUSY en lugar de - EINPROGRESS en situaciones v\u00e1lidas. Por ejemplo, cuando la cola cryptd para AESNI est\u00e1 llena (f\u00e1cil de activar con un cryptd.cryptd_max_cpu_qlen artificialmente bajo), las solicitudes se pondr\u00e1n en cola en el trabajo pendiente, pero a\u00fan as\u00ed se procesar\u00e1n. En ese caso, la devoluci\u00f3n de llamada as\u00edncrona tambi\u00e9n se llamar\u00e1 dos veces: primero con err == -EINPROGRESS, que parece que podemos ignorar, luego con err == 0. En comparaci\u00f3n con el parche original de Sabrina, esta versi\u00f3n usa el nuevo tls_*crypt_async_wait( ) ayuda y convierte EBUSY a EINPROGRESS para evitar tener que modificar todas las rutas de manejo de errores. El manejo es id\u00e9ntico."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-755"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "4.16.0",
"versionEndExcluding": "6.1.84",
"matchCriteriaId": "6F1F2625-29D5-4FED-B7F5-6087227ABCB3"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.2.0",
"versionEndExcluding": "6.6.18",
"matchCriteriaId": "A5CC150E-F35C-4CF7-ADF5-422D32C511C2"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.7.0",
"versionEndExcluding": "6.7.6",
"matchCriteriaId": "0C8D1FAD-4D5D-4A25-B058-2AD15082710E"
}
]
}
]
}
],
"references": [
{
"url": "https://git.kernel.org/stable/c/13eca403876bbea3716e82cdfe6f1e6febb38754",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/8590541473188741055d27b955db0777569438e3",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/ab6397f072e5097f267abf5cb08a8004e6b17694",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/cd1bbca03f3c1d845ce274c0d0a66de8e5929f72",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
}
]
}

View File

@ -0,0 +1,24 @@
{
"id": "CVE-2024-28269",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-04-30T19:15:23.257",
"lastModified": "2024-04-30T19:35:36.960",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "ReCrystallize Server 5.10.0.0 allows administrators to upload files to the server. The file upload is not restricted, leading to the ability to upload of malicious files. This could result in a Remote Code Execution."
}
],
"metrics": {},
"references": [
{
"url": "https://sensepost.com/blog/2024/from-discovery-to-disclosure-recrystallize-server-vulnerabilities/",
"source": "cve@mitre.org"
},
{
"url": "https://www.recrystallize.com/merchant/ReCrystallize-Server-for-Crysta",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2024-33101",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-04-30T18:15:19.797",
"lastModified": "2024-04-30T19:35:36.960",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "A stored cross-site scripting (XSS) vulnerability in the component /action/anti.php of ThinkSAAS v3.7.0 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the word parameter."
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/thinksaas/ThinkSAAS/issues/34",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2024-33102",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-04-30T18:15:19.853",
"lastModified": "2024-04-30T19:35:36.960",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "A stored cross-site scripting (XSS) vulnerability in the component /pubs/counter.php of ThinkSAAS v3.7.0 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the code parameter."
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/thinksaas/ThinkSAAS/issues/35",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2024-33103",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-04-30T18:15:19.923",
"lastModified": "2024-04-30T19:35:36.960",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "An arbitrary file upload vulnerability in the Media Manager component of DokuWiki 2024-02-06a allows attackers to execute arbitrary code via uploading a crafted SVG file."
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/dokuwiki/dokuwiki/issues/4267",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2024-33831",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-04-30T18:15:19.973",
"lastModified": "2024-04-30T19:35:36.960",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "A stored cross-site scripting (XSS) vulnerability in the Advanced Expectation - Response module of yapi v1.10.2 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the body field."
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/YMFE/yapi/issues/2745",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2024-33832",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-04-30T18:15:20.027",
"lastModified": "2024-04-30T19:35:36.960",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "OneNav v0.9.35-20240318 was discovered to contain a Server-Side Request Forgery (SSRF) via the component /index.php?c=api&method=get_link_info."
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/helloxz/onenav/issues/186",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2024-34088",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-04-30T19:15:23.307",
"lastModified": "2024-04-30T19:35:36.960",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "In FRRouting (FRR) through 9.1, it is possible for the get_edge() function in ospf_te.c in the OSPF daemon to return a NULL pointer. In cases where calling functions do not handle the returned NULL value, the OSPF daemon crashes, leading to denial of service."
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/FRRouting/frr/pull/15674/commits/34d704fb0ea60dc5063af477a2c11d4884984d4f",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,28 @@
{
"id": "CVE-2024-3411",
"sourceIdentifier": "cret@cert.org",
"published": "2024-04-30T19:15:23.353",
"lastModified": "2024-04-30T19:35:36.960",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "Implementations of IPMI Authenticated sessions does not provide enough randomness to protect from session hijacking, allowing an attacker to use either predictable IPMI Session ID or weak BMC Random Number to bypass security controls using spoofed IPMI packets to manage BMC device."
}
],
"metrics": {},
"references": [
{
"url": "https://kb.cert.org/vuls/id/163057",
"source": "cret@cert.org"
},
{
"url": "https://www.intel.la/content/dam/www/public/us/en/documents/specification-updates/ipmi-intelligent-platform-mgt-interface-spec-2nd-gen-v2-0-spec-update.pdf",
"source": "cret@cert.org"
},
{
"url": "https://www.kb.cert.org/vuls/id/163057",
"source": "cret@cert.org"
}
]
}

View File

@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update
```plain
2024-04-30T18:00:40.323139+00:00
2024-04-30T20:00:37.911341+00:00
```
### Most recent CVE Modification Timestamp synchronized with NVD
```plain
2024-04-30T17:52:35.057000+00:00
2024-04-30T19:35:36.960000+00:00
```
### Last Data Feed Release
@ -33,46 +33,47 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
### Total Number of included CVEs
```plain
247207
247228
```
### CVEs added in the last Commit
Recently added CVEs: `2`
Recently added CVEs: `21`
- [CVE-2024-23463](CVE-2024/CVE-2024-234xx/CVE-2024-23463.json) (`2024-04-30T17:15:46.383`)
- [CVE-2024-29320](CVE-2024/CVE-2024-293xx/CVE-2024-29320.json) (`2024-04-30T16:15:07.290`)
- [CVE-2019-19751](CVE-2019/CVE-2019-197xx/CVE-2019-19751.json) (`2024-04-30T18:15:19.323`)
- [CVE-2019-19752](CVE-2019/CVE-2019-197xx/CVE-2019-19752.json) (`2024-04-30T18:15:19.380`)
- [CVE-2019-19753](CVE-2019/CVE-2019-197xx/CVE-2019-19753.json) (`2024-04-30T18:15:19.437`)
- [CVE-2019-19754](CVE-2019/CVE-2019-197xx/CVE-2019-19754.json) (`2024-04-30T18:15:19.507`)
- [CVE-2019-19755](CVE-2019/CVE-2019-197xx/CVE-2019-19755.json) (`2024-04-30T18:15:19.557`)
- [CVE-2020-27478](CVE-2020/CVE-2020-274xx/CVE-2020-27478.json) (`2024-04-30T19:15:22.773`)
- [CVE-2020-5200](CVE-2020/CVE-2020-52xx/CVE-2020-5200.json) (`2024-04-30T18:15:19.650`)
- [CVE-2023-36268](CVE-2023/CVE-2023-362xx/CVE-2023-36268.json) (`2024-04-30T18:15:19.730`)
- [CVE-2023-49473](CVE-2023/CVE-2023-494xx/CVE-2023-49473.json) (`2024-04-30T19:15:22.980`)
- [CVE-2023-50053](CVE-2023/CVE-2023-500xx/CVE-2023-50053.json) (`2024-04-30T19:15:23.037`)
- [CVE-2023-50059](CVE-2023/CVE-2023-500xx/CVE-2023-50059.json) (`2024-04-30T19:15:23.097`)
- [CVE-2024-22546](CVE-2024/CVE-2024-225xx/CVE-2024-22546.json) (`2024-04-30T19:15:23.147`)
- [CVE-2024-26331](CVE-2024/CVE-2024-263xx/CVE-2024-26331.json) (`2024-04-30T19:15:23.200`)
- [CVE-2024-28269](CVE-2024/CVE-2024-282xx/CVE-2024-28269.json) (`2024-04-30T19:15:23.257`)
- [CVE-2024-33101](CVE-2024/CVE-2024-331xx/CVE-2024-33101.json) (`2024-04-30T18:15:19.797`)
- [CVE-2024-33102](CVE-2024/CVE-2024-331xx/CVE-2024-33102.json) (`2024-04-30T18:15:19.853`)
- [CVE-2024-33103](CVE-2024/CVE-2024-331xx/CVE-2024-33103.json) (`2024-04-30T18:15:19.923`)
- [CVE-2024-33831](CVE-2024/CVE-2024-338xx/CVE-2024-33831.json) (`2024-04-30T18:15:19.973`)
- [CVE-2024-33832](CVE-2024/CVE-2024-338xx/CVE-2024-33832.json) (`2024-04-30T18:15:20.027`)
- [CVE-2024-34088](CVE-2024/CVE-2024-340xx/CVE-2024-34088.json) (`2024-04-30T19:15:23.307`)
- [CVE-2024-3411](CVE-2024/CVE-2024-34xx/CVE-2024-3411.json) (`2024-04-30T19:15:23.353`)
### CVEs modified in the last Commit
Recently modified CVEs: `25`
Recently modified CVEs: `7`
- [CVE-2023-38002](CVE-2023/CVE-2023-380xx/CVE-2023-38002.json) (`2024-04-30T17:52:35.057`)
- [CVE-2023-45385](CVE-2023/CVE-2023-453xx/CVE-2023-45385.json) (`2024-04-30T17:52:35.057`)
- [CVE-2023-46304](CVE-2023/CVE-2023-463xx/CVE-2023-46304.json) (`2024-04-30T17:52:35.057`)
- [CVE-2023-50914](CVE-2023/CVE-2023-509xx/CVE-2023-50914.json) (`2024-04-30T17:52:35.057`)
- [CVE-2023-50915](CVE-2023/CVE-2023-509xx/CVE-2023-50915.json) (`2024-04-30T17:52:35.057`)
- [CVE-2024-2377](CVE-2024/CVE-2024-23xx/CVE-2024-2377.json) (`2024-04-30T17:52:35.057`)
- [CVE-2024-23772](CVE-2024/CVE-2024-237xx/CVE-2024-23772.json) (`2024-04-30T17:52:35.057`)
- [CVE-2024-23773](CVE-2024/CVE-2024-237xx/CVE-2024-23773.json) (`2024-04-30T17:52:35.057`)
- [CVE-2024-23774](CVE-2024/CVE-2024-237xx/CVE-2024-23774.json) (`2024-04-30T17:52:35.057`)
- [CVE-2024-2378](CVE-2024/CVE-2024-23xx/CVE-2024-2378.json) (`2024-04-30T17:52:35.057`)
- [CVE-2024-25575](CVE-2024/CVE-2024-255xx/CVE-2024-25575.json) (`2024-04-30T17:52:35.057`)
- [CVE-2024-25648](CVE-2024/CVE-2024-256xx/CVE-2024-25648.json) (`2024-04-30T17:52:35.057`)
- [CVE-2024-25938](CVE-2024/CVE-2024-259xx/CVE-2024-25938.json) (`2024-04-30T17:52:35.057`)
- [CVE-2024-2617](CVE-2024/CVE-2024-26xx/CVE-2024-2617.json) (`2024-04-30T17:52:35.057`)
- [CVE-2024-28716](CVE-2024/CVE-2024-287xx/CVE-2024-28716.json) (`2024-04-30T17:52:35.057`)
- [CVE-2024-2877](CVE-2024/CVE-2024-28xx/CVE-2024-2877.json) (`2024-04-30T17:52:35.057`)
- [CVE-2024-33267](CVE-2024/CVE-2024-332xx/CVE-2024-33267.json) (`2024-04-30T17:52:35.057`)
- [CVE-2024-33270](CVE-2024/CVE-2024-332xx/CVE-2024-33270.json) (`2024-04-30T17:52:35.057`)
- [CVE-2024-33273](CVE-2024/CVE-2024-332xx/CVE-2024-33273.json) (`2024-04-30T17:52:35.057`)
- [CVE-2024-33274](CVE-2024/CVE-2024-332xx/CVE-2024-33274.json) (`2024-04-30T17:52:35.057`)
- [CVE-2024-33275](CVE-2024/CVE-2024-332xx/CVE-2024-33275.json) (`2024-04-30T17:52:35.057`)
- [CVE-2024-33308](CVE-2024/CVE-2024-333xx/CVE-2024-33308.json) (`2024-04-30T17:52:35.057`)
- [CVE-2024-33309](CVE-2024/CVE-2024-333xx/CVE-2024-33309.json) (`2024-04-30T17:52:35.057`)
- [CVE-2024-33465](CVE-2024/CVE-2024-334xx/CVE-2024-33465.json) (`2024-04-30T17:52:35.057`)
- [CVE-2024-4340](CVE-2024/CVE-2024-43xx/CVE-2024-4340.json) (`2024-04-30T17:52:35.057`)
- [CVE-2019-19750](CVE-2019/CVE-2019-197xx/CVE-2019-19750.json) (`2024-04-30T18:15:19.217`)
- [CVE-2023-28863](CVE-2023/CVE-2023-288xx/CVE-2023-28863.json) (`2024-04-30T19:15:22.867`)
- [CVE-2023-52455](CVE-2023/CVE-2023-524xx/CVE-2023-52455.json) (`2024-04-30T19:34:34.080`)
- [CVE-2023-52456](CVE-2023/CVE-2023-524xx/CVE-2023-52456.json) (`2024-04-30T19:34:11.347`)
- [CVE-2023-52457](CVE-2023/CVE-2023-524xx/CVE-2023-52457.json) (`2024-04-30T19:28:17.500`)
- [CVE-2023-52460](CVE-2023/CVE-2023-524xx/CVE-2023-52460.json) (`2024-04-30T19:16:12.493`)
- [CVE-2024-26584](CVE-2024/CVE-2024-265xx/CVE-2024-26584.json) (`2024-04-30T19:35:07.273`)
## Download and Usage

View File

@ -136705,7 +136705,12 @@ CVE-2019-19746,0,0,7496dbb7701f079fb861542a8268868f4ce34c0bcaa82c3f8ce824c47836b
CVE-2019-19747,0,0,e4d055d4e13a340b85243a2e1ebc118c37ba99de09a620117e3d033feedaa2ac,2020-01-03T16:21:05.267000
CVE-2019-19748,0,0,e70c2bdc7244c49603d02a6d1b7d6c46ceed54dd81a456dfefd903920efd3dfd,2019-12-13T13:34:04.483000
CVE-2019-1975,0,0,ea0e899879d31806bbdb3166a7414a9da89b9aa9e03c2b687de391ff714bf638,2021-11-02T20:03:38.680000
CVE-2019-19750,0,0,406a5ed41e4b50755cddf94ea41299e229531502d9b94d79ab191ea871f0446f,2019-12-30T14:42:42.273000
CVE-2019-19750,0,1,12fd2e34791119d45f95f74a18cc718a7a4e78ccb40a7cde11381cadb33be9a7,2024-04-30T18:15:19.217000
CVE-2019-19751,1,1,8d43ef7e096c60b432eaa7564d52e55f063adef1fa154963e0b1505d7f5515db,2024-04-30T19:35:36.960000
CVE-2019-19752,1,1,4cc5a0a21ab3acca3b272e06d871009a94fe6e341ca5415340341bc5959583fa,2024-04-30T19:35:36.960000
CVE-2019-19753,1,1,eb58cb231d84a291b0313400e353e765a8cd7728ca7ab8e565992a9f09957b78,2024-04-30T19:35:36.960000
CVE-2019-19754,1,1,b5b8086a2fdd14089a0741dc05e04e743abdef124bf65b766d2ef41deed908cf,2024-04-30T19:35:36.960000
CVE-2019-19755,1,1,a17ab579c46d226ef91fd2d5115127d0f23e0949f004a519a460a813ef738ea1,2024-04-30T19:35:36.960000
CVE-2019-19756,0,0,7f008bf0df7cd341019a0ca12092f2bebc077861b764b1f2e41153e961e981ef,2021-11-02T19:16:30.403000
CVE-2019-19757,0,0,3fb6636c3c4c4520c83d7d95a0bd50df6cb961a31e5298a5b5c721d326e59bde,2020-02-24T17:53:03.400000
CVE-2019-19758,0,0,7eb6b8fd35fa809ac23ac5414793e86d916dbc670894a774622f48dd799a0e53,2020-02-27T14:16:50.720000
@ -156091,6 +156096,7 @@ CVE-2020-27464,0,0,8b2bb0d206e434d4811c2e8c936c7484383ac89dd06800266f95b5de15f37
CVE-2020-27466,0,0,edd2ac918edafd47da415784f371c23807a996288aa6985e18beac4ac217ea90,2021-08-24T15:15:33.280000
CVE-2020-27467,0,0,8e07e2e6383ea7e09c0756773bc61b160602a6d54c787d2ddaffc982e7f8bc52,2022-03-02T18:58:07.053000
CVE-2020-2747,0,0,eca1ddd275f522ec5c0e70890130ef875952fa88caca16a24be79a60df8ceb60,2020-04-15T18:35:17.767000
CVE-2020-27478,1,1,be14ea0959e1fcc5919298d8a8a892f788e54090c6b5953bd63bdc937613939b,2024-04-30T19:35:36.960000
CVE-2020-2748,0,0,5673bc859ef75bae1fe6fba4561fd6216493c23982af60fb5a08f4ee0daa6e35,2021-02-25T15:06:43.823000
CVE-2020-27481,0,0,22568596131fc0a0e33251fe7de24b942afc0c7eecf1aaefcc2eaf45db2664e0,2020-11-23T17:14:49.733000
CVE-2020-27483,0,0,c4ae42e63f1241eaa6d87453728fcc9ec4806488c853f0f86f7113e44f08840c,2020-12-02T14:55:09.437000
@ -160415,6 +160421,7 @@ CVE-2020-5194,0,0,eaa255428020fe2b2bb366b6b3281c7e897ca5e27592365d1dbf3620c64771
CVE-2020-5195,0,0,c07f25e6186c5a1ea8ff9344e4f034f86d567a617c39186402e5b269f54f396e,2020-01-22T16:05:31.283000
CVE-2020-5196,0,0,d2f6a58632b5906a64894b9ecbdb0953b99588def9098840655847f25f819009,2020-01-17T03:02:04.857000
CVE-2020-5197,0,0,262d53a029b0570f7acb0add91eb0db48d29d83c92ec3b3a8daa5568981bb134,2021-07-21T11:39:23.747000
CVE-2020-5200,1,1,46d44bc67a5526e7518260ca51b604181e4e0ee98fa2e742d1cd27ffcb257d64,2024-04-30T19:35:36.960000
CVE-2020-5202,0,0,3047269005db8e703d21c45da0dbbcb10acc8d6e296b6ab16056b4e8115791de,2022-01-01T20:03:08.133000
CVE-2020-5203,0,0,2ce775a660ddf6436bc940de3e67c50cc20fb44ebb1024f653c73bfefb893f06,2021-07-21T11:39:23.747000
CVE-2020-5204,0,0,64f55ca455226a18e04afdae2cd5dc2617b62f45ad3aad4f63d2a3a58b099606,2020-01-18T19:15:10.947000
@ -220765,7 +220772,7 @@ CVE-2023-28858,0,0,011df0bac04bc87df95994c1b3e55ca3cc5b885a4113b222fc3b46e56f821
CVE-2023-28859,0,0,dd925f6241e4a2be83ea00a786ba6fc5299cfcc8d994f716e443cf718cd5da8b,2023-05-17T17:08:20.883000
CVE-2023-2886,0,0,3aaac5483bfb19901fa58891c6e5a468993f3db4f1bf125792f15c949845c790,2023-11-02T01:46:01.450000
CVE-2023-28862,0,0,170dd9ccbe35ded0e1ff5303e569e23ec7bc3359084c857e1571367bc52605fb,2023-07-14T13:15:09.167000
CVE-2023-28863,0,0,b14c07b169a373dafaeb51fb3c2d9e65d262bce80c92647ef4ad0d40dbd9706b,2023-04-27T19:50:21.307000
CVE-2023-28863,0,1,5b9f6fbc49f2f72646c4fcd6c4f998c30afe581009e0a2d13f18b190180ee464,2024-04-30T19:15:22.867000
CVE-2023-28864,0,0,b53b9a31e04a18ab26a92d23614ce8825a553be82d95a49cad787677dc09aa8b,2023-07-27T03:47:50.647000
CVE-2023-28866,0,0,7b5ab9a9fd3d718e917316e0046a608e2f5cdf5b502da99441c79802e834fd00,2023-11-07T04:10:55.740000
CVE-2023-28867,0,0,11ed3f93d6faa0d51c3a1b27a8fdcb70e828388dc5f52ca5e989f587124ec7bf,2023-04-03T14:01:07.433000
@ -225887,6 +225894,7 @@ CVE-2023-36260,0,0,05806f809cb2e5349700fe208a79faefe81f3635eb8f9d36d12ddd1ef8584
CVE-2023-36262,0,0,0329ac7656644a7553d710ca8782f80b6527e8ade23f535dbdfe1383401c9bcd,2023-11-07T04:16:25.310000
CVE-2023-36263,0,0,4649624e62df1f3c72417442caed269512009de2869b36a656dd3f389025818b,2023-11-08T16:48:00.990000
CVE-2023-36266,0,0,dc3ccae4b9de23b341ed49cc1177dd605d64731ca6efae7d69742fec754b7ed1,2024-04-11T01:20:38.540000
CVE-2023-36268,1,1,01b149515d8f33a640fd0e780806ac25e9e4c9cb9defd84e5ace4ded59fe3eff,2024-04-30T19:35:36.960000
CVE-2023-3627,0,0,34eb25ece400e692d01118e91cdb54357e138708553e491dd2e85d00353848ee,2023-07-18T19:58:32.613000
CVE-2023-36271,0,0,ed782faec3fc64ed9c5c1d539673fb2cac501e252bddbf55d0751af403a70480,2023-06-27T12:18:30.333000
CVE-2023-36272,0,0,0a127fb20debfd02d6d9a91e4212d106baf67f3f214966d88f98ab750ccd33ca,2023-06-27T12:18:19.927000
@ -227146,7 +227154,7 @@ CVE-2023-37997,0,0,634a8f00a3a7cefaea8286574903fd4dd9cef7262779039b9494ebb47f14c
CVE-2023-37998,0,0,1747e4f0f6ddf4d50fd6cbdf2ef7e31b2a7283ba267cf7dde73ae9cd8c8e621a,2024-04-29T09:15:07.163000
CVE-2023-3800,0,0,774d32c7b5fb881d1d40e6872ba5eec3309f4fee64d58b63dc188b5cb5069530,2024-04-11T01:21:23.090000
CVE-2023-38000,0,0,0e0c6bbc8458c85090972cb27733399c7be344be574c892a61848bb47624d50a,2023-10-16T17:04:06.637000
CVE-2023-38002,0,1,7029b9fea2ebd1520d174727082186c38ee4da26a3d2a7d7dc41f80bfaaddfa0,2024-04-30T17:52:35.057000
CVE-2023-38002,0,0,7029b9fea2ebd1520d174727082186c38ee4da26a3d2a7d7dc41f80bfaaddfa0,2024-04-30T17:52:35.057000
CVE-2023-38003,0,0,1818608b52e574766674a96fd387dab05b406afb5af9478c08cafc61d6b9b561,2024-01-19T16:15:09.013000
CVE-2023-3801,0,0,268e8456e25e2ec7ee29641981d97416c6644edb4f95f9df3d23b6d38ef865ae,2024-04-11T01:21:23.180000
CVE-2023-38019,0,0,7375f0cde564228d4a502ec0225fd8e16818e040bded4f61f291e77bd96d4623,2024-02-09T19:13:52.923000
@ -232019,7 +232027,7 @@ CVE-2023-45381,0,0,636ca78eac443cb4f637348d8ee4fee7573f821206a15e9b4f252bf045e55
CVE-2023-45382,0,0,e749ad67c4426048984c6f05c233a1830e3b02d47768e2a2990488263070e4a2,2023-11-25T02:16:09.063000
CVE-2023-45383,0,0,6c000ddfd6441a1c3da2c29134b230f4ee0b5b99ea849d6a70757063a564d1cb,2023-10-25T01:24:51.267000
CVE-2023-45384,0,0,68ffd294aedd1a768c3567558e16eccd5913adcff18912fc360412fcfa9f0f6a,2023-10-25T15:26:34.353000
CVE-2023-45385,0,1,f8250516ad00fda94849ae4cafb5d1682b4f4d2e29acac35153e60699e8e7389,2024-04-30T17:52:35.057000
CVE-2023-45385,0,0,f8250516ad00fda94849ae4cafb5d1682b4f4d2e29acac35153e60699e8e7389,2024-04-30T17:52:35.057000
CVE-2023-45386,0,0,374130a71b25dc67a6870f15ed35a03693b486ed6a765768cf670f637ae4325c,2023-10-23T14:15:43.003000
CVE-2023-45387,0,0,45194877e2f2c310ab8a3e47aa92255ab544f487fbe86f4f4335fc4ee36c6e08,2023-11-25T02:15:57.857000
CVE-2023-4539,0,0,3f1ef5a4dce974f3bd7b99806bac78a9be3898dc33b90833d649bc46cca7bd92,2024-02-15T14:28:31.380000
@ -232642,7 +232650,7 @@ CVE-2023-46300,0,0,0717e33737bc41686c733bf7e7fb3f4e87670f94456a3f5f908d9ad680b0f
CVE-2023-46301,0,0,4bc065fc0550d760de641e0a5426cb26061bacffa84b2c5d6c474914f7b6e8be,2023-10-31T17:08:30.707000
CVE-2023-46302,0,0,4657366a67d8e79775047138127619bb65dfc4001addca3f3c68fdbe69d1172b,2023-11-30T15:15:48.393000
CVE-2023-46303,0,0,f588576f0391c22f76c1458b98d4818f3afd8a52b7c57a797fbd89390f6e96fd,2023-10-28T03:29:56.570000
CVE-2023-46304,0,1,3ee4732682a58d4602ab6d83178ccdeba84aa1746321cd78037247da0bab57fd,2024-04-30T17:52:35.057000
CVE-2023-46304,0,0,3ee4732682a58d4602ab6d83178ccdeba84aa1746321cd78037247da0bab57fd,2024-04-30T17:52:35.057000
CVE-2023-46306,0,0,29a3abc2a63328c5f4956660bb22b4ad7805ec90ecab1b1719f891f2e6d03b29,2023-11-02T15:47:02.097000
CVE-2023-46307,0,0,70b1e7b39477592163424a81cdcac5736b174b2b3ef677dc9db177c5b5ec12cc,2023-12-12T17:06:02.260000
CVE-2023-46308,0,0,93fc954f3a128690a25cd4b8d8fc47afecd3303f2e318c0a2f0696550f2b4f76,2024-01-09T17:47:09.937000
@ -234841,6 +234849,7 @@ CVE-2023-49468,0,0,57d5ec3ccc918036b475b9f54b2e396366451915366ece25a89704668e428
CVE-2023-49469,0,0,cf895a2dc3add24e416ac7bcb0530a971aa2975c73743a17956ace666f5a97e4,2024-01-04T17:14:07.600000
CVE-2023-4947,0,0,22b6b14e8c839e20c9429d0ba7697cdb9ac98a0cca963ad631bd6ecd6354934f,2023-11-07T04:23:12.703000
CVE-2023-49471,0,0,9786a9b85e2a2cfc8ac5810f9b5329581bf752664798422bca39fbc4f46bebdd,2024-01-17T13:41:42.813000
CVE-2023-49473,1,1,e36dc3b21d9303d828702fc30e38ffb08613649ca147a78c643fe0767d7a1eb8,2024-04-30T19:35:36.960000
CVE-2023-4948,0,0,fe74618322894acd9d5c196407c8ee7a7b8a3cfef58094beba352735ceb5a1e6,2023-11-07T04:23:12.883000
CVE-2023-49484,0,0,b3bb47b9d3bebe9b919a712e385039470f90ec9024bd9f7aa1a5d970a61e5cfd,2023-12-11T19:11:05.637000
CVE-2023-49485,0,0,48aa9077d57b1d2e7ae05300b0cb802f30139b627a9d2c23d0e1071b24d3a4ae,2023-12-12T17:19:56.587000
@ -235190,6 +235199,8 @@ CVE-2023-50038,0,0,b5f7008e5b6120c4657d3dc4caf357a7ddaa4144addc80a0698468521481b
CVE-2023-5004,0,0,4a11256e6c8dcae389b383382be0121998d78e06c2c9c366ae2d3b27a55cd347,2023-10-02T18:08:26.417000
CVE-2023-50044,0,0,b6e61defbfae8849a3dd13f3498094b76d439a921dfdbb6b251036018fca43cd,2023-12-29T00:15:50.170000
CVE-2023-5005,0,0,fb87b32624390f20ce301a5fab4cd65a92d25105a5f353624ad9dc063528e764,2023-12-21T19:25:31.277000
CVE-2023-50053,1,1,03610634c0ed45dee80e0d60a8349b8bc7011a5cf5dc1b70970b334c5dfcbaac,2024-04-30T19:35:36.960000
CVE-2023-50059,1,1,d63110550e63265e27d37f837ce3e69a794fdebc01bff65df69e6bba25b40b06,2024-04-30T19:35:36.960000
CVE-2023-5006,0,0,67cf9fc28c9ec32cb6e344356ef2d73cd893146bd66fe581f7eb4b165d8287d2,2024-01-24T17:16:48.267000
CVE-2023-50061,0,0,1db52c2d46546815d1a2adba68eb1fc7946c8a816ad26f8c8cfef122215bc52d,2024-02-15T05:02:52.427000
CVE-2023-50069,0,0,02cd4a1f95882e422d635d7af46ad8c134be9260b44cdbfed17df992a492e802,2024-01-05T23:08:29.450000
@ -235599,8 +235610,8 @@ CVE-2023-50901,0,0,fa1245dfad58609576f971f16b5ea532f1ca81c051130c99f667ea1205d37
CVE-2023-50902,0,0,1513c647ffec3bccc364b057fe7be8ad3f21264b604f6b5475cb44c0c9074864,2024-01-05T16:21:34.563000
CVE-2023-50905,0,0,c0b30a24d3473e2350b628f1856fc1c117d2f8592d3dde08d565e83b22838670,2024-02-29T13:49:29.390000
CVE-2023-5091,0,0,742357f5a217cf462519eaf750c88817634b0babb2a1ac8228f117003e40bd4b,2024-01-12T13:39:11.443000
CVE-2023-50914,0,1,91eac3b5a93312d1499b6e8f44c96c8eba6b2e8098c0c0dd5b83885d0d15ce8f,2024-04-30T17:52:35.057000
CVE-2023-50915,0,1,9750cd619c9e3b297ae2c02f3e59803ef4b49d5ae574da3d68f17216252adcb7,2024-04-30T17:52:35.057000
CVE-2023-50914,0,0,91eac3b5a93312d1499b6e8f44c96c8eba6b2e8098c0c0dd5b83885d0d15ce8f,2024-04-30T17:52:35.057000
CVE-2023-50915,0,0,9750cd619c9e3b297ae2c02f3e59803ef4b49d5ae574da3d68f17216252adcb7,2024-04-30T17:52:35.057000
CVE-2023-50916,0,0,8389bab58e732355670227e157a42be931a6ad30ed375a5de2bdca2e8f73b50f,2024-01-19T17:49:52.770000
CVE-2023-50917,0,0,ae02854392d1c9add428acaf26494bf33c678553d73518cd872ace972206aa21,2024-01-22T17:15:09.207000
CVE-2023-50918,0,0,84c5eb6df0deb5d7c5d3c51cf99a8f6fdd461afc97576ca67536170b8d368e90,2023-12-19T17:18:38.713000
@ -236513,13 +236524,13 @@ CVE-2023-52451,0,0,65a739f6d581805ce2cf2b36d79848a56d63f5f7e896bfc143f00d66a3183
CVE-2023-52452,0,0,7baace8ccf50e6e949146023fb757b323cf12c7750b0fc5df8cd239e671f9bac,2024-03-18T18:24:33.550000
CVE-2023-52453,0,0,69ba07cbae189e1e3a60d3872d700f556de0e7e337d505dd8820b63e89f74b76,2024-02-23T16:14:43.447000
CVE-2023-52454,0,0,f7725c56a2046001ea42b0a4b162beaa146052738b58f85b4d39839a05325aef,2024-04-19T18:40:14.427000
CVE-2023-52455,0,0,76a6bcb530205d4971a4b440b50dd84bc697337c3fb3171373045411403058f1,2024-02-23T16:14:43.447000
CVE-2023-52456,0,0,10a5abe34cd481166ef5bd0c8f2721aa67c0c3b426198c8f94ac38f160f96c83,2024-02-23T16:14:43.447000
CVE-2023-52457,0,0,6f0cb6a137d10bff51f7fd0ceb008040ac18c4c0c65b0db7128924c45f02580c,2024-02-23T16:14:43.447000
CVE-2023-52455,0,1,dc2463f08418783db51235c700e54b8444f1205e94daedf8420d4f83a06ab523,2024-04-30T19:34:34.080000
CVE-2023-52456,0,1,80f1f1335e214943f5f94143e9b6d594096fda76d77405c756d2450bd6844582,2024-04-30T19:34:11.347000
CVE-2023-52457,0,1,e329ea9b49070c15cbde1327096f3b3f54c3f5dbfe9170483ef4bd1c30c15a3c,2024-04-30T19:28:17.500000
CVE-2023-52458,0,0,00390989bdedc445e1b514729f22c211b3746b0ba7246d2e9aa982604355b206,2024-04-19T18:49:28.773000
CVE-2023-52459,0,0,e9cf232377caf1f202d67d723d7e16b271506d66f49335fc63418b030a3f09a4,2024-04-19T18:49:47.087000
CVE-2023-5246,0,0,efc93f05f4d6576c2fefda617ffc50a2cd42a25ecc2a7e9c2794376627e129e7,2023-10-31T11:58:05.363000
CVE-2023-52460,0,0,7b5ce003348e2b0c98c11a11dd79b88b3d4e9f665c8574fd29056aa818d9e331,2024-02-23T16:14:43.447000
CVE-2023-52460,0,1,9a9871abd62065b1bc8617900676e231f93474bdcf509de618a4f0a8c85c33e9,2024-04-30T19:16:12.493000
CVE-2023-52461,0,0,719a65925f951c681f50c05e9ce85d8b5d8fa1d42253944e773762e89d82d323,2024-02-23T16:14:43.447000
CVE-2023-52462,0,0,a6858cfa3be5f63a7738068f3ab5f364e25a3cd7a6d64375ec3da8239879f2ce,2024-04-17T20:06:29.470000
CVE-2023-52463,0,0,fd8c09fdc6750081e23478ebe940972345e6f17003751e11523c5f3c82cfd70e,2024-04-17T20:05:08.550000
@ -241398,6 +241409,7 @@ CVE-2024-22533,0,0,84ada03ee37935d281b6ef02f8758f6d805bf66c7cac8fad1d52934fdf1b6
CVE-2024-22543,0,0,4bbc43f5b3e2685d1c9696fcc6499264d266d040456549b4c4eb8710fde430af,2024-02-27T14:20:06.637000
CVE-2024-22544,0,0,d4860d160590ae20dbc5d6de1bfe49fdfc11d59a0cfbde30c670036465a08e6a,2024-02-27T14:20:06.637000
CVE-2024-22545,0,0,21a44afa77ff3bc1528d0f92d9dbe45aaebe8c2d773e6d661e586abe7a9ac385,2024-03-05T18:15:48.443000
CVE-2024-22546,1,1,a52487dc831d552725dae6fdd972311cb7ff2abe8345f4107cd1a76861ab3911,2024-04-30T19:35:36.960000
CVE-2024-22547,0,0,435aee4ac29e540430ed8124a6d3ce7be57829e1b8ca6167335ef3bc4b085e52,2024-02-23T02:42:58.253000
CVE-2024-22548,0,0,7d281051e3f1672a0e8c6ae82119054f50e0c0cf80064dc21e880381f007b189,2024-01-20T18:51:21.163000
CVE-2024-22549,0,0,9d125f13584b8e9a98c7ba04ebcdd0c32883b8ff51ce2ca12c4e35cf1c2f09cf,2024-01-20T18:51:14.307000
@ -241807,7 +241819,7 @@ CVE-2024-23450,0,0,6fbd14dba7c079ef13d798ab57ec4ea5a51f9ba377b47e78eb5f421772561
CVE-2024-23451,0,0,1527b911dea291b0766ddb3062c19eeaba982e875c4189924798b47289a058fe,2024-03-28T02:01:21.693000
CVE-2024-23452,0,0,aaa529ca6e03eefd16006bb57cfd95647fc8b44bb3a3176fd8a83e06021cb7e9,2024-02-29T01:44:08.877000
CVE-2024-23453,0,0,ab3a22284e10fea1933712f86026a2e7792304e1f83321557a4d02140679b266,2024-01-29T22:58:07.777000
CVE-2024-23463,1,1,3070d116c7eebce5ad718e81d73788ac1f4a2d237e9b828c393b0270c134b332,2024-04-30T17:52:35.057000
CVE-2024-23463,0,0,3070d116c7eebce5ad718e81d73788ac1f4a2d237e9b828c393b0270c134b332,2024-04-30T17:52:35.057000
CVE-2024-2347,0,0,72273356ef668e46bc249f1161d9e793d562ab02a3d6eaa18d7e41a99c45f641,2024-04-10T13:23:38.787000
CVE-2024-23476,0,0,e3d84cdb88c20fc5ad4183c7e154fd4eb94d6574a64f56328103056889f0fc9e,2024-02-20T20:39:10.033000
CVE-2024-23477,0,0,87ea55eb7f1d47398644b7f37685a8d0eb8352c36d1b14165a017d7f9ea764c8,2024-02-20T20:38:43.587000
@ -241988,14 +242000,14 @@ CVE-2024-23763,0,0,94cc309a27a6f19d801354e2361325aae58be01ed476b8fc22a2371a8d35f
CVE-2024-23764,0,0,b3135c7b86d92abe0ba829866971e25bead6def6664dd24257c259d94b7c1186,2024-02-15T17:57:25.633000
CVE-2024-23768,0,0,926e611d1088d9f1f309e3cf68eaddf916ef7d0caac52f28b5ab1d1ea7b5269d,2024-01-26T19:15:05.400000
CVE-2024-23769,0,0,8006533b03738d14f12e88159dd00f6815ea0cfbfbe8531d0a76387b0244675f,2024-02-15T15:40:20.690000
CVE-2024-2377,0,1,367d7e9780393c935b14a4cfba4ca77c567a3b83e113912613f9f036cad9926e,2024-04-30T17:52:35.057000
CVE-2024-2377,0,0,367d7e9780393c935b14a4cfba4ca77c567a3b83e113912613f9f036cad9926e,2024-04-30T17:52:35.057000
CVE-2024-23770,0,0,d308ea235638520048aecb2f126af743a6f79f00cf88059a602cfd74145feab5,2024-01-26T19:18:29.190000
CVE-2024-23771,0,0,ffb1ffb392a719f610312001c323ebc0b81b01439264d54a4e46f4afbb11b184,2024-01-26T19:24:40.873000
CVE-2024-23772,0,1,812660de7849b027dd3ad9da31ecbe7ad7d0da895a32633f61e1b92b7baaeb88,2024-04-30T17:52:35.057000
CVE-2024-23773,0,1,a166d7951819032e7afcc54a699b5335ec4d3f439b7fd4538a593004b7906727,2024-04-30T17:52:35.057000
CVE-2024-23774,0,1,bd6f06737704b97e622450c0c0ba6d7cab2853fc0a16fafb0b59bbf30efa2a37,2024-04-30T17:52:35.057000
CVE-2024-23772,0,0,812660de7849b027dd3ad9da31ecbe7ad7d0da895a32633f61e1b92b7baaeb88,2024-04-30T17:52:35.057000
CVE-2024-23773,0,0,a166d7951819032e7afcc54a699b5335ec4d3f439b7fd4538a593004b7906727,2024-04-30T17:52:35.057000
CVE-2024-23774,0,0,bd6f06737704b97e622450c0c0ba6d7cab2853fc0a16fafb0b59bbf30efa2a37,2024-04-30T17:52:35.057000
CVE-2024-23775,0,0,3f14e612f21bf3a005c618e710dfc25be4ed3fed6dcd32f828b01526aab3cc14,2024-02-22T03:15:08.370000
CVE-2024-2378,0,1,f03f8f4eb0585a7f2763dfb490c2e6b12f22793f2992bb4f3f1022c53ae20c4c,2024-04-30T17:52:35.057000
CVE-2024-2378,0,0,f03f8f4eb0585a7f2763dfb490c2e6b12f22793f2992bb4f3f1022c53ae20c4c,2024-04-30T17:52:35.057000
CVE-2024-23782,0,0,6f45eb4b7ce48f87446d0358843a09e5a8ec20837c83d13c1a3b26ddd36a0376,2024-02-02T15:38:55.017000
CVE-2024-23783,0,0,9143d28a07faac7544ed4041d27f04fd4e69b2b3f6f29ec06f4ffa36598bac71,2024-02-14T13:59:35.580000
CVE-2024-23784,0,0,b4aa02d723c734167dec1b51d1ed7965cf85ac8613e083ddc624ccae18846888,2024-02-14T13:59:35.580000
@ -242895,7 +242907,7 @@ CVE-2024-25569,0,0,620e614f397f546a0e71f397e76d4367fc8df127ac09f0555445ed8798df7
CVE-2024-2557,0,0,a617119e7aec654c68da3fc71fccd99356ed7ca0eba1b1243e2bc71d72e1c32e,2024-04-11T01:25:27.817000
CVE-2024-25572,0,0,6916ce68d4646365d0578802b2b08ffd76a62b8c07df1314570c90fc1d876f93,2024-04-11T12:47:44.137000
CVE-2024-25574,0,0,4bc8d3cd97ad31d3dfd232c462a09dc1924d30756dc7bfcb27690950ff1edfb2,2024-04-02T12:50:42.233000
CVE-2024-25575,0,1,e644f553b991600030313ff6e6532d72da253b2db4703dd8cab48da6b8093f41,2024-04-30T17:52:35.057000
CVE-2024-25575,0,0,e644f553b991600030313ff6e6532d72da253b2db4703dd8cab48da6b8093f41,2024-04-30T17:52:35.057000
CVE-2024-25578,0,0,ff68f9ee0e3394b3fa83fe8766f2e044325a5fd043b437de063c0cd80654c610,2024-03-01T14:04:26.010000
CVE-2024-25579,0,0,838cd17118b030eacfba49a0ada30a1ba4831f0bedbfd768ff2707f55789078e,2024-04-04T01:15:50.083000
CVE-2024-2558,0,0,05ecdd587f34cceb1493c24040a39ce304ec6f718c555097cfbd0b512bd51f16,2024-04-11T01:25:27.900000
@ -242953,7 +242965,7 @@ CVE-2024-25643,0,0,08f3e6c0d454841d4e4dc84aae81812246ffbd96bb71cc2e9e4566cd4077e
CVE-2024-25644,0,0,cad748db94c87605f745ac8efbb54ef36e9bf866e1bcdbdf96bff9a05dfcf738,2024-03-12T12:40:13.500000
CVE-2024-25645,0,0,611af6391fb4617a6b65e5d2ff91bac5a4003873b65f133d0cd2495d911bd094,2024-03-12T12:40:13.500000
CVE-2024-25646,0,0,4c3fff51352b6a263ea60efd6f0f793331eb0c3a48316710a84a88b50103400a,2024-04-09T12:48:04.090000
CVE-2024-25648,0,1,e0ca444e7bd12a947a07bc008a0f9053edbd7dc7d74d3b14d152a982e1911288,2024-04-30T17:52:35.057000
CVE-2024-25648,0,0,e0ca444e7bd12a947a07bc008a0f9053edbd7dc7d74d3b14d152a982e1911288,2024-04-30T17:52:35.057000
CVE-2024-25649,0,0,3e37b8e86c2aaae32174cb72f32869171ec886cd62bb95537557a32583b80d63,2024-03-14T12:52:09.877000
CVE-2024-2565,0,0,2b60c90f757e5c1a7488bee021fd0a1be74409cf621deaa98f8eb1cc5b574a77,2024-04-11T01:25:28.423000
CVE-2024-25650,0,0,dc8b4afe4a9ab50c0ebaf06dbcbf0134b9648b4ff2232925762633c6b3fe0179,2024-03-14T12:52:16.723000
@ -243121,7 +243133,7 @@ CVE-2024-25934,0,0,f6b4a559198ff9a023c244c882aa2a4b2d94891158d20ce325478b009b608
CVE-2024-25935,0,0,e7d71dc1e3ab78ef328cc65c85ed6474997812a912ee072e84e40976c1f22c38,2024-04-11T12:47:44.137000
CVE-2024-25936,0,0,03df91d96e11ecd94def6ed7ba45d62f75e77270ce10b697dca0561dee5d16de,2024-03-15T16:26:49.320000
CVE-2024-25937,0,0,861391f909e6331477f1822a01b1052fd19aa1c31ce333bc472971a7392abbdb,2024-03-22T12:45:36.130000
CVE-2024-25938,0,1,724cf82588dcd69d201735c44cfdbce13b24754694fef4988747d0487cd1a7dd,2024-04-30T17:52:35.057000
CVE-2024-25938,0,0,724cf82588dcd69d201735c44cfdbce13b24754694fef4988747d0487cd1a7dd,2024-04-30T17:52:35.057000
CVE-2024-2594,0,0,bde31fdaab09a079b8da0d26da3ff2fd7469b156a031f2e67457f19c614e87f5,2024-03-18T19:40:00.173000
CVE-2024-25940,0,0,0f284eb6797ffd015c122aeeb19f68755aac0aac9d9f404601b2b09d1a1b9b82,2024-04-19T07:15:09.657000
CVE-2024-25941,0,0,086c1e2f95d3358b026edde826ecdc3aba251e5db88ce3b75a6d9fa4fcc246f1,2024-02-15T06:23:39.303000
@ -243283,7 +243295,7 @@ CVE-2024-26166,0,0,f391c4b0db733d40148db48047d4241707d804226a4057e01c2cdc7ed3c4a
CVE-2024-26167,0,0,c7ef30deac9cc168daf190a6134ba584248b8a1ef0f1584bf395b9e88fcd8841,2024-03-08T14:02:57.420000
CVE-2024-26168,0,0,949af59ee3b8c1baa60afaabce6faf5f018a8b72d7b8397412fa4ad69b2f274a,2024-04-10T13:24:00.070000
CVE-2024-26169,0,0,2d1119475d439c4b121ffec0de24c31b9e211863770703474be28295dbeee3e3,2024-04-11T20:15:34.100000
CVE-2024-2617,0,1,1d9d9de541960834c20c821a56536b46afd6bd019f4c1d7fd86c4660c44d70c3,2024-04-30T17:52:35.057000
CVE-2024-2617,0,0,1d9d9de541960834c20c821a56536b46afd6bd019f4c1d7fd86c4660c44d70c3,2024-04-30T17:52:35.057000
CVE-2024-26170,0,0,b923c0fa6e4f0b77c0dadd8ee680132ca97043b58671f05f987b51d479a0edc4,2024-04-11T20:15:34.203000
CVE-2024-26171,0,0,9585df40c5f7289258f98464992d6f7b36d924236a4b679b88371a3376d72c9d,2024-04-10T13:24:00.070000
CVE-2024-26172,0,0,c6f278d7e7fafad9e920f5166d13c7edaac3efa6dc535e1f3334920cb3dd37e9,2024-04-10T13:24:00.070000
@ -243419,6 +243431,7 @@ CVE-2024-26327,0,0,cdb018804c204ef80ecdc8daa637463eea9f06e211b3135332b7863d1171c
CVE-2024-26328,0,0,70bb62dee22bd65978afbda4aa44a7dcc2acba975045b0300cec412005d5eda5,2024-04-19T07:15:09.770000
CVE-2024-26329,0,0,6eec7b644c4867f186846a122998b4350a4dc0459882c3ea663ee6d77c6e1117,2024-04-05T12:40:52.763000
CVE-2024-2633,0,0,d6d619ede14eb7136c8ee12cb2cd0efea8cc18b4fa44aa46ef5af23251d75954,2024-03-19T13:26:46
CVE-2024-26331,1,1,b79d5a5166e7aa24461d9430a5f2c842933062e771e66485a56ad11dc471f28d,2024-04-30T19:35:36.960000
CVE-2024-26333,0,0,72ddcf1e5079d4095fb63f71d350456e693bb97135c81208eeffa24430bb0b2f,2024-03-05T13:41:01.900000
CVE-2024-26334,0,0,561e27fe6d2eae55228bd8cfd4e061bf762c84a8f4fc571dc41629b9250a54d4,2024-03-05T13:41:01.900000
CVE-2024-26335,0,0,bfb3ee132d2b0c91b2c24322170ba225610a210d30f34e6f9e49b6acdf8c1001,2024-03-05T13:41:01.900000
@ -243492,7 +243505,7 @@ CVE-2024-26580,0,0,495279035de581ec6008f44dc7438add36c8c374f59c2ede086a388e56fdb
CVE-2024-26581,0,0,6313645f513de26967acd9d6721419082a344ce45ec1a0cf923d928a6491861a,2024-04-19T17:41:29.470000
CVE-2024-26582,0,0,3ff5c496d753899c1fc1e8062e53c8f61453498de38167daf1346ce24125ba81,2024-03-15T13:56:41.843000
CVE-2024-26583,0,0,469df0658e18197ed0356dd7a5240250603137d767287de06ec0167d1ae18c2a,2024-03-15T13:05:03.220000
CVE-2024-26584,0,0,b2b48302c00eaeeb768b321c147a1b7d666d3960cce1d3c0055da0c0aaefe43b,2024-04-03T14:15:15.613000
CVE-2024-26584,0,1,66b388a0a910522be9a0047ed118af49c4e847fe6cb3d187782320bcf2a1a2fe,2024-04-30T19:35:07.273000
CVE-2024-26585,0,0,f63f838d2bcdd8ae6d99da2fdbc37c9df617bc6a41e88fe22fa920d7915c1497,2024-04-03T14:15:15.853000
CVE-2024-26586,0,0,d050b6a287d721bbbe29b94ce0748dfe771bab6092597ff9abd41f70e3acfd0b,2024-04-26T16:10:22.843000
CVE-2024-26587,0,0,9404613a5d22d59f7b9830950f6da0789d954efb37d6d668289d4948436f8def,2024-03-18T18:09:54.027000
@ -244466,6 +244479,7 @@ CVE-2024-28253,0,0,f5326dd97701553671f20b198d6b4e3bbd7507e645cfcbbef2e0eb0bd68e4
CVE-2024-28254,0,0,a9752b9597156f82582ee0901564a914d350dbef56a1d3e2cb37d87202697963,2024-03-21T02:52:24.507000
CVE-2024-28255,0,0,2223e20b88f20882b18c8e2daca66ddc78cf448142396bd3d6e2271daa5feb4a,2024-03-17T22:38:29.433000
CVE-2024-2826,0,0,ebd6a4ed863f0132bd5514410d250deb1ecb7037f5a1a019ef2b07cd9ad2cc71,2024-04-11T01:25:38.343000
CVE-2024-28269,1,1,5c74156db2589a6a6bb4803bc7b40b2e3f5cb3b5ffc16456d31307ff26f28596,2024-04-30T19:35:36.960000
CVE-2024-2827,0,0,534d657d8a445a02b8e7db493cf1c67da13b12f5fd2ba445315dc3931709a0ad,2024-04-11T01:25:38.423000
CVE-2024-28270,0,0,f654e93a55aad09ebe8372d915898812c2a1306adefa6bb8aebb87b68cea994c,2024-04-09T12:48:04.090000
CVE-2024-28275,0,0,20e2d2e3bfbe8540c4a348bc0e556a1aaebdf48e340e211a9afb11edded84f28,2024-04-03T17:24:18.150000
@ -244633,7 +244647,7 @@ CVE-2024-2871,0,0,e9558decb3cc4c54584df3eb06fe6d1bb0c12954fd3dc0d6fb0a6933455338
CVE-2024-28713,0,0,beab16cae2dae6cd08028a095390b29624a6437ed474d84784c32091c71ece60,2024-03-28T20:53:20.813000
CVE-2024-28714,0,0,05d12d8ac80645ded00d1ead25c51baa98cf4af4d5a078fc724fffec6f7925ec,2024-03-29T12:45:02.937000
CVE-2024-28715,0,0,054dc6dc725c244acb835446cab8d82270f7d8ffd8311eb9aca1ba238d62a38d,2024-03-20T13:00:16.367000
CVE-2024-28716,0,1,60672beee00d45f0b5bebfb352efd083815ff4d3f0bbecc40b770a59d679e3b5,2024-04-30T17:52:35.057000
CVE-2024-28716,0,0,60672beee00d45f0b5bebfb352efd083815ff4d3f0bbecc40b770a59d679e3b5,2024-04-30T17:52:35.057000
CVE-2024-28717,0,0,f3e85174e10e6b2a875251d258bba0061735240c3fbf9f5c26ab3fb13ae8132b,2024-04-22T13:28:34.007000
CVE-2024-28718,0,0,5f0a839ac4250fecd45af64be191fc810afd4c63b89d4fc0f63a8d6841ad970e,2024-04-15T13:15:51.577000
CVE-2024-28722,0,0,9f3d9610dcb3a88962a775c4bceb1adf34898d2ad0bcbbf8f024b9f550b378b8,2024-04-22T13:28:43.747000
@ -244651,7 +244665,7 @@ CVE-2024-28754,0,0,5dbc765f1d498ac39b0aa2a583d691b531f5eca3e556d44de526ef3d46786
CVE-2024-28755,0,0,1b8336cb8aec54928e95e2838923ef63de390c1d6a172c9e230fb0e16707e4c5,2024-04-03T12:38:04.840000
CVE-2024-28756,0,0,25c89ab9b64cbd69060fc1b1f68e4f1c76ee574185097dbf9146fc8b2b315bf5,2024-03-22T12:45:36.130000
CVE-2024-28757,0,0,6f674e74da8b1d303f1997061736a8f7699c424c20f0aba68e441f140f441071,2024-03-23T03:15:11.920000
CVE-2024-2877,0,1,ed73bf6343f6fce95fe4bdf359b10e578e032bb0abc52341af5e7f61557c21d4,2024-04-30T17:52:35.057000
CVE-2024-2877,0,0,ed73bf6343f6fce95fe4bdf359b10e578e032bb0abc52341af5e7f61557c21d4,2024-04-30T17:52:35.057000
CVE-2024-28782,0,0,2c346a16649d57b4cd6688055d888a86d12f94177200ab9afb6a4e0c69d4e875,2024-04-03T12:38:04.840000
CVE-2024-28784,0,0,c979b0334a0081e1847a4bc955e67dbbc0397aed136c4d3aa1b489c4f3f267b2,2024-03-27T15:49:51.300000
CVE-2024-28787,0,0,466884053e2fb97771b0b18e87658d91d7f6894823937327962bdc9b1ecfdc33,2024-04-04T19:24:50.670000
@ -244957,7 +244971,7 @@ CVE-2024-29303,0,0,9fc5b63681179dd34090ab25180fdf1128a0a8fe7fe2b044acdbb780ed809
CVE-2024-2931,0,0,a6d520754016bbdab2d7efa74efc39e3254a7b8cd183192dc94878921c91c9ca,2024-04-02T12:50:42.233000
CVE-2024-29316,0,0,a77a66080b82cffb666cc5dc96a72ca9eacad7eb3c1a78f29a15ae578e7a1db4,2024-03-29T12:45:02.937000
CVE-2024-2932,0,0,e61d82b0d87208ef5f42a7f411603262acef25f1192163d01f7ff401e886dc69,2024-04-11T01:25:41.673000
CVE-2024-29320,1,1,034c3b91b44dab152de78dc39969c7bfc1ca46c2ebce1cddc44df5b1f49cf2ce,2024-04-30T17:52:35.057000
CVE-2024-29320,0,0,034c3b91b44dab152de78dc39969c7bfc1ca46c2ebce1cddc44df5b1f49cf2ce,2024-04-30T17:52:35.057000
CVE-2024-29338,0,0,e2411b46399ccf809f7042628f5dc80681cab752a4fc33bfa69d55d7b188c619,2024-03-22T19:02:10.300000
CVE-2024-2934,0,0,0a91524619de13afaff0e82d7a21ecc81f28b80f897e74dbcf5f2c4795f84a8f,2024-04-11T01:25:41.763000
CVE-2024-2935,0,0,03b2e13118238c25a371886663ff5ca99f3babe087c5e23aed7873fb02fb806f,2024-04-11T01:25:41.850000
@ -246665,6 +246679,9 @@ CVE-2024-3298,0,0,35145d829af4d19541380a93e6723503e514b69e11aa4b007b05099610c37f
CVE-2024-3299,0,0,f60f2a80accdd6f345a6a9cd66637eda180121596f90c2e7d75707c9fce20eb6,2024-04-04T16:33:06.610000
CVE-2024-3302,0,0,125cce6ead91da0349b4d4d5e52af6eb4c2a0511fb870ab9451e4f4746c28bb4,2024-04-24T10:15:07.417000
CVE-2024-3309,0,0,f40a3a05e06b21c233f218489e35a926b19106a35690c55b3fda3a1c3bcc0e8a,2024-04-29T12:42:03.667000
CVE-2024-33101,1,1,e62348321dd4b337f52aa54b7a6ef70cc135f3be90368c0925accfca837e8ab2,2024-04-30T19:35:36.960000
CVE-2024-33102,1,1,f81ed0f2d31fae54b63ab1458a4be713e16646016777c1450c134000425506d1,2024-04-30T19:35:36.960000
CVE-2024-33103,1,1,088319517330be56b7d5c86f918e193baa9839f4e357e6ebefe92beb8796ad5f,2024-04-30T19:35:36.960000
CVE-2024-3311,0,0,cc24f0e110212be66e02c71f4e3192ea09f47ae5e9090cac74e341e472a33c23,2024-04-11T01:25:58.140000
CVE-2024-3313,0,0,a1f61d968ea3c59507e97f1859e014460ea34c753cfc0814a5308608cf321984,2024-04-10T13:23:38.787000
CVE-2024-3314,0,0,78c785cb5b32bdf0baed853861c5d6771b22fff72a031a5ec21a411cf5a4d670,2024-04-11T01:25:58.237000
@ -246685,18 +246702,18 @@ CVE-2024-33258,0,0,9cba5ba4b2b25419975f62d52ca9fe6af0f0a8e9f9f0361b732bbec6fa910
CVE-2024-33259,0,0,7baedb8a8dc783fa88b887fd5c3c1eaf3e0afda0857f326c9372530e2281ba12,2024-04-26T15:32:22.523000
CVE-2024-33260,0,0,e8aa0d878f3a05d87e2a04d2b95090816ce2a8144679e05279a245ccba53bc96,2024-04-26T15:32:22.523000
CVE-2024-33266,0,0,927dd095a2b6a54b614bf8c1e0e750cdc0ca58b614e43dfc8d5d13b46fba9a18,2024-04-30T13:11:16.690000
CVE-2024-33267,0,1,a78b2286b24749ed225e7efc5173502f33f6b811c6dcc615e641f99756488ea6,2024-04-30T17:52:35.057000
CVE-2024-33267,0,0,a78b2286b24749ed225e7efc5173502f33f6b811c6dcc615e641f99756488ea6,2024-04-30T17:52:35.057000
CVE-2024-33268,0,0,d51848430596b86828cdea1b1456bd72b9ab7100480eebe45ecde8059fcf4d8a,2024-04-30T13:11:16.690000
CVE-2024-33269,0,0,f057cb5f62254a0c9fa57f4b96ff09dcdb5873d667380646331ed433e10fb406,2024-04-30T13:11:16.690000
CVE-2024-33270,0,1,63e674f11b71ba838ed51e5d6ad0058830d561193b64efcb9087b0946c1fa257,2024-04-30T17:52:35.057000
CVE-2024-33270,0,0,63e674f11b71ba838ed51e5d6ad0058830d561193b64efcb9087b0946c1fa257,2024-04-30T17:52:35.057000
CVE-2024-33271,0,0,f480c1ee12c1c41835a7ef2fb81ce75423b8e169b16bec7ba1f8c5fe0d709508,2024-04-30T13:11:16.690000
CVE-2024-33272,0,0,cca4c1224a3ae4ab7422dde204301c34209cfdb4cb65d6f9826094911d62dbb6,2024-04-30T13:11:16.690000
CVE-2024-33273,0,1,c7f7a2494259846b0d82fb5695d816ec3395f3b7f6d5f31aee78e17799f30ac5,2024-04-30T17:52:35.057000
CVE-2024-33274,0,1,7b8416b9d04d4e5af53a2f4dc30ff3cf4a6a03c51a9f990a2d738e2a0c3eae7d,2024-04-30T17:52:35.057000
CVE-2024-33275,0,1,aaae7f9a6f386bc209393974e7a83bf83e06e19d58231b1af18c8544bd959fc6,2024-04-30T17:52:35.057000
CVE-2024-33273,0,0,c7f7a2494259846b0d82fb5695d816ec3395f3b7f6d5f31aee78e17799f30ac5,2024-04-30T17:52:35.057000
CVE-2024-33274,0,0,7b8416b9d04d4e5af53a2f4dc30ff3cf4a6a03c51a9f990a2d738e2a0c3eae7d,2024-04-30T17:52:35.057000
CVE-2024-33275,0,0,aaae7f9a6f386bc209393974e7a83bf83e06e19d58231b1af18c8544bd959fc6,2024-04-30T17:52:35.057000
CVE-2024-33276,0,0,e40c3e22a282bef2a772b0e5f45a645b1fd132b128d015830c0d51073e57266e,2024-04-30T13:11:16.690000
CVE-2024-33308,0,1,c7a96f814c2d5cc70229a8e21ec556c626542afdc137f20682b753e0d11d5580,2024-04-30T17:52:35.057000
CVE-2024-33309,0,1,bc213cb8c1d9aef27edd281310b54c36cbe3c640e12ed51efcef8f301e533289,2024-04-30T17:52:35.057000
CVE-2024-33308,0,0,c7a96f814c2d5cc70229a8e21ec556c626542afdc137f20682b753e0d11d5580,2024-04-30T17:52:35.057000
CVE-2024-33309,0,0,bc213cb8c1d9aef27edd281310b54c36cbe3c640e12ed51efcef8f301e533289,2024-04-30T17:52:35.057000
CVE-2024-3333,0,0,8caee5b26018a8a7a4f06ec5d64d35dd731cf8d2f43a25885f4e67db044a1bff,2024-04-17T12:48:07.510000
CVE-2024-33331,0,0,d376453cc8c649ab7a3cb33fa711c6bde798d37e4f57b1f2e9caeddda1eec751,2024-04-28T23:15:07.120000
CVE-2024-33338,0,0,bc2e0086bf2c48a9038877027b241659108a96f5574842a86f97d96236d8f8f9,2024-04-30T13:11:16.690000
@ -246717,7 +246734,7 @@ CVE-2024-33444,0,0,51dd7aab7b3ddadce09df801fad02678beaad514ea2f8f210656bf37b88f7
CVE-2024-33445,0,0,f9ae9a9bde21aa65a6cac50dfbb815b11cc09544c6481f56832d02aaa7ca7aee,2024-04-30T13:11:16.690000
CVE-2024-33449,0,0,4c7579121060686858d52c789b41b99c382088df7d0f73a51efc5b9f6b878606,2024-04-30T13:11:16.690000
CVE-2024-3346,0,0,e1501efbca46250b1b984725e11942bb9306686e2cffb2edd3d8dd5b4c4ccc5c,2024-04-11T01:25:58.637000
CVE-2024-33465,0,1,c60e1fa46c4ea2b265000aa415652f8ac29efeb77e15e71db3aa6f12b1709ce5,2024-04-30T17:52:35.057000
CVE-2024-33465,0,0,c60e1fa46c4ea2b265000aa415652f8ac29efeb77e15e71db3aa6f12b1709ce5,2024-04-30T17:52:35.057000
CVE-2024-3347,0,0,f531aca6ac2c0d8c742afa906f1c675ed72b73f770b0dc5b59ea1d37af1ecdde,2024-04-11T01:25:58.723000
CVE-2024-3348,0,0,25c5a153d1148795607a2b1c3bff5dd76b89c464d7f7630dde394d2c2f4d4efd,2024-04-11T01:25:58.807000
CVE-2024-3349,0,0,4ef37a58debeef63689165f4817dd2829d7f93c9c3bb30f1eaf20c7d8fa448ab,2024-04-11T01:25:58.880000
@ -246835,6 +246852,8 @@ CVE-2024-3377,0,0,4f5c5a9a0c925d4c25c7e7a8167aad399bf59289271bce69d10c801ec2848e
CVE-2024-3378,0,0,4f86c276b9b6898b0be7d5e038b0b93861aa9bc2234c5fb397df84486317a3f0,2024-04-14T04:15:56.560000
CVE-2024-3382,0,0,359ee56c09e0a2a64315ebc823efc4b55ab60390ccbf48a0550f896cf550e0d4,2024-04-10T19:49:51.183000
CVE-2024-3383,0,0,23294a2c02d282067f57807e610d19ad62151e7737eff1a2dbce91b2ce33a939,2024-04-10T19:49:51.183000
CVE-2024-33831,1,1,cd22fc61525a4ea4ae630bd724d0ad611164241cd067b1ecaf211be0b3b1b119,2024-04-30T19:35:36.960000
CVE-2024-33832,1,1,8824ca786af7c603b8838adaee846ea449880374cc0d764fd0d15fe5558158f3,2024-04-30T19:35:36.960000
CVE-2024-3384,0,0,f1db02aa38b819888be52a421a922174001b5f3c9e0abe3ab9082a168503f129,2024-04-10T19:49:51.183000
CVE-2024-3385,0,0,dafd55987e5738b5d6ec37d523526a7e0269d60d96cd780933abafbc800645a8,2024-04-10T19:49:51.183000
CVE-2024-33851,0,0,68bc6675018b087590ad7bf933ee95fc6f4d8eccffe763d3a294dadfd8285383,2024-04-29T12:42:03.667000
@ -246859,6 +246878,8 @@ CVE-2024-34047,0,0,19d2ca9cf9de141961e3e23c7a49cbd763974d82ea83289d560310b1c202c
CVE-2024-34048,0,0,e6d9ff471f531552b989ab0670c8eba7287d8741cecbce9b0cbb9a4d53fb0c2e,2024-04-30T13:11:16.690000
CVE-2024-34049,0,0,9aa3f131f75fc45cd4bc8429cac44eaca2da5b2edc029e7ac3fe3439cdf03695,2024-04-30T13:11:16.690000
CVE-2024-34050,0,0,9a2c282d83ab4ad91eb1f6c4ddeacad349b06e44af38b78f3e2f6ef4239dbf10,2024-04-30T13:11:16.690000
CVE-2024-34088,1,1,636fbe5b1a1e19e1af9ede6b8164c4740f450d66b2d6624f11a2b266568f819e,2024-04-30T19:35:36.960000
CVE-2024-3411,1,1,96154d16b686810c762f6aaf3528d3da5f7f3979059b90a737e06407f7a9307a,2024-04-30T19:35:36.960000
CVE-2024-3413,0,0,7c0263f5aa26015f580f259b17ac76e3fb232807ce6eb6b3e0fa4a42d34def58,2024-04-11T01:26:00.727000
CVE-2024-3414,0,0,fcf8b2012e3dcab7048965e9d40e8c26f25a86217cc70e6c24a2ae712b119943,2024-04-11T01:26:00.803000
CVE-2024-3415,0,0,80d83d8ba89e3620cb20eb7a8b2b10e1c5fbd8b76c068e7c00b4af6deadd81dd,2024-04-11T01:26:00.900000
@ -247205,4 +247226,4 @@ CVE-2024-4310,0,0,d7fbac27755c7133d1c2e0a6447c2fce3b245992298460e093f57ea997a724
CVE-2024-4327,0,0,3d14955fd25b48e70347bc21b9cf8e4172732a4fac4f624dc37f9e58a61e1bb9,2024-04-30T13:11:16.690000
CVE-2024-4336,0,0,3217d54bd306c3320285772343c381eeb916064434adbe6d8dee38e0f49c378f,2024-04-30T13:11:16.690000
CVE-2024-4337,0,0,8a1cfd2947a23a6e06428062fb85a86a0de43435d27cebf7533e44b2da7feda3,2024-04-30T13:11:16.690000
CVE-2024-4340,0,1,0fa7c6bfc883a29aea545d51036f6541f96be5c069cd1c4a978687e541eb6f36,2024-04-30T17:52:35.057000
CVE-2024-4340,0,0,0fa7c6bfc883a29aea545d51036f6541f96be5c069cd1c4a978687e541eb6f36,2024-04-30T17:52:35.057000

Can't render this file because it is too large.