Auto-Update: 2024-04-06T08:00:38.637272+00:00

This commit is contained in:
cad-safe-bot 2024-04-06 08:03:27 +00:00
parent 83555fc2ff
commit 5196231c3e
8 changed files with 314 additions and 27 deletions

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-23672",
"sourceIdentifier": "security@apache.org",
"published": "2024-03-13T16:15:29.287",
"lastModified": "2024-04-02T23:15:54.273",
"lastModified": "2024-04-06T06:15:07.717",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
@ -32,6 +32,10 @@
"url": "https://lists.apache.org/thread/cmpswfx6tj4s7x0nxxosvfqs11lvdx2f",
"source": "security@apache.org"
},
{
"url": "https://lists.debian.org/debian-lts-announce/2024/04/msg00001.html",
"source": "security@apache.org"
},
{
"url": "https://security.netapp.com/advisory/ntap-20240402-0002/",
"source": "security@apache.org"

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-24549",
"sourceIdentifier": "security@apache.org",
"published": "2024-03-13T16:15:29.373",
"lastModified": "2024-04-02T23:15:54.360",
"lastModified": "2024-04-06T06:15:08.030",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
@ -32,6 +32,10 @@
"url": "https://lists.apache.org/thread/4c50rmomhbbsdgfjsgwlb51xdwfjdcvg",
"source": "security@apache.org"
},
{
"url": "https://lists.debian.org/debian-lts-announce/2024/04/msg00001.html",
"source": "security@apache.org"
},
{
"url": "https://security.netapp.com/advisory/ntap-20240402-0002/",
"source": "security@apache.org"

View File

@ -0,0 +1,47 @@
{
"id": "CVE-2024-2471",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-04-06T06:15:08.470",
"lastModified": "2024-04-06T06:15:08.470",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "The FooGallery plugin for WordPress is vulnerable to Stored Cross-Site Scripting via image attachment fields (such as 'Title', 'Alt Text', 'Custom URL', 'Custom Class', and 'Override Type') in all versions up to, and including, 2.4.14 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with author-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security@wordfence.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 6.4,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 3.1,
"impactScore": 2.7
}
]
},
"references": [
{
"url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&new=3061049%40foogallery&old=3039399%40foogallery&sfp_email=&sfph_mail=",
"source": "security@wordfence.com"
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/d5d4aeb1-0a4f-49f1-b5a9-b582e271eae1?source=cve",
"source": "security@wordfence.com"
}
]
}

View File

@ -0,0 +1,47 @@
{
"id": "CVE-2024-2949",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-04-06T07:15:06.973",
"lastModified": "2024-04-06T07:15:06.973",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "The Carousel, Slider, Gallery by WP Carousel \u2013 Image Carousel & Photo Gallery, Post Carousel & Post Grid, Product Carousel & Product Grid for WooCommerce plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the carousel widget in all versions up to, and including, 2.6.3 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security@wordfence.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 6.4,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 3.1,
"impactScore": 2.7
}
]
},
"references": [
{
"url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3065296%40wp-carousel-free&new=3065296%40wp-carousel-free&sfp_email=&sfph_mail=",
"source": "security@wordfence.com"
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/9349208c-3e86-4ec6-9e10-5ecaa4923922?source=cve",
"source": "security@wordfence.com"
}
]
}

View File

@ -0,0 +1,92 @@
{
"id": "CVE-2024-3361",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-04-06T06:15:08.757",
"lastModified": "2024-04-06T06:15:08.757",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability has been found in SourceCodester Online Library System 1.0 and classified as critical. Affected by this vulnerability is an unknown functionality of the file admin/books/deweydecimal.php. The manipulation of the argument category leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-259465 was assigned to this vulnerability."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW",
"baseScore": 7.3,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.4
}
],
"cvssMetricV2": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5
},
"baseSeverity": "HIGH",
"exploitabilityScore": 10.0,
"impactScore": 6.4,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"references": [
{
"url": "https://github.com/thisissuperann/Vul/blob/main/Online-Library-System-03",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?ctiid.259465",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?id.259465",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?submit.310425",
"source": "cna@vuldb.com"
}
]
}

View File

@ -0,0 +1,92 @@
{
"id": "CVE-2024-3362",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-04-06T07:15:07.333",
"lastModified": "2024-04-06T07:15:07.333",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was found in SourceCodester Online Library System 1.0 and classified as critical. Affected by this issue is some unknown functionality of the file admin/books/controller.php. The manipulation of the argument IBSN leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB-259466 is the identifier assigned to this vulnerability."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW",
"baseScore": 7.3,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.4
}
],
"cvssMetricV2": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5
},
"baseSeverity": "HIGH",
"exploitabilityScore": 10.0,
"impactScore": 6.4,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"references": [
{
"url": "https://github.com/thisissuperann/Vul/blob/main/Online-Library-System-04",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?ctiid.259466",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?id.259466",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?submit.310426",
"source": "cna@vuldb.com"
}
]
}

View File

@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update
```plain
2024-04-06T06:00:37.742939+00:00
2024-04-06T08:00:38.637272+00:00
```
### Most recent CVE Modification Timestamp synchronized with NVD
```plain
2024-04-06T05:15:07.550000+00:00
2024-04-06T07:15:07.333000+00:00
```
### Last Data Feed Release
@ -33,28 +33,25 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
### Total Number of included CVEs
```plain
244269
244273
```
### CVEs added in the last Commit
Recently added CVEs: `9`
Recently added CVEs: `4`
- [CVE-2024-1385](CVE-2024/CVE-2024-13xx/CVE-2024-1385.json) (`2024-04-06T04:15:10.747`)
- [CVE-2024-21506](CVE-2024/CVE-2024-215xx/CVE-2024-21506.json) (`2024-04-06T05:15:07.210`)
- [CVE-2024-2444](CVE-2024/CVE-2024-24xx/CVE-2024-2444.json) (`2024-04-06T05:15:07.500`)
- [CVE-2024-2656](CVE-2024/CVE-2024-26xx/CVE-2024-2656.json) (`2024-04-06T04:15:11.030`)
- [CVE-2024-2950](CVE-2024/CVE-2024-29xx/CVE-2024-2950.json) (`2024-04-06T04:15:11.463`)
- [CVE-2024-3216](CVE-2024/CVE-2024-32xx/CVE-2024-3216.json) (`2024-04-06T04:15:11.813`)
- [CVE-2024-3358](CVE-2024/CVE-2024-33xx/CVE-2024-3358.json) (`2024-04-06T04:15:12.070`)
- [CVE-2024-3359](CVE-2024/CVE-2024-33xx/CVE-2024-3359.json) (`2024-04-06T04:15:12.503`)
- [CVE-2024-3360](CVE-2024/CVE-2024-33xx/CVE-2024-3360.json) (`2024-04-06T05:15:07.550`)
- [CVE-2024-2471](CVE-2024/CVE-2024-24xx/CVE-2024-2471.json) (`2024-04-06T06:15:08.470`)
- [CVE-2024-2949](CVE-2024/CVE-2024-29xx/CVE-2024-2949.json) (`2024-04-06T07:15:06.973`)
- [CVE-2024-3361](CVE-2024/CVE-2024-33xx/CVE-2024-3361.json) (`2024-04-06T06:15:08.757`)
- [CVE-2024-3362](CVE-2024/CVE-2024-33xx/CVE-2024-3362.json) (`2024-04-06T07:15:07.333`)
### CVEs modified in the last Commit
Recently modified CVEs: `0`
Recently modified CVEs: `2`
- [CVE-2024-23672](CVE-2024/CVE-2024-236xx/CVE-2024-23672.json) (`2024-04-06T06:15:07.717`)
- [CVE-2024-24549](CVE-2024/CVE-2024-245xx/CVE-2024-24549.json) (`2024-04-06T06:15:08.030`)
## Download and Usage

View File

@ -239099,7 +239099,7 @@ CVE-2024-1380,0,0,a6643d22691040d519e55989c30cc282c581b968e343a9ffa704d3b3b4093b
CVE-2024-1381,0,0,d91e8a30b8be52d3f20fae315772163054b248740b5446a92a5d7400055357f3,2024-03-05T13:41:01.900000
CVE-2024-1382,0,0,2a91cda82e6eccbb12479004f1cab52cf9c7a68d5341c41e9ea2a1161aafd11d,2024-03-07T13:52:27.110000
CVE-2024-1383,0,0,9b7f3b63a5060d2ec2114b4c1750cf327ef7ed2270b46ed8e25ed7e6ce34b642,2024-03-13T18:15:58.530000
CVE-2024-1385,1,1,d24637b7ae6ec561f36894345a5c912abcd74360897163ee3f5c43f5b644ee21,2024-04-06T04:15:10.747000
CVE-2024-1385,0,0,d24637b7ae6ec561f36894345a5c912abcd74360897163ee3f5c43f5b644ee21,2024-04-06T04:15:10.747000
CVE-2024-1388,0,0,a64ad787329a1a90b9d619f8ebf265bcdd5478117890b0948e19434b66711749,2024-02-28T14:06:45.783000
CVE-2024-1389,0,0,226d878edb33aaeccb843dfb02fa51c12df5fa099ed0c545a3e0cbe9644a211e,2024-02-29T13:49:29.390000
CVE-2024-1390,0,0,71eb0c49e1915160a890c9df4d2040fa529dd6e699ca4bdcf3f6829a9c0e60ea,2024-02-29T13:49:29.390000
@ -240070,7 +240070,7 @@ CVE-2024-21502,0,0,4303e1ae1b6dcbd72e1c376c19ab8a2359e92d842fa95b6d253e62be71a35
CVE-2024-21503,0,0,dbde89ae4e130de7b3da2486efecec01760e430d7d72c91a7a50092dd8618341,2024-03-19T13:26:46
CVE-2024-21504,0,0,49e3dd2437933564763de1c9017a71fc9b864133b3b4959dcdb8b06a9a352074,2024-03-19T13:26:46
CVE-2024-21505,0,0,790ab171c9e46ac93718d1bb5680fe990f4ed1edc4d489f5e4dab09077e05267,2024-03-25T13:47:14.087000
CVE-2024-21506,1,1,49464276e60fcd34c863a66da1cf82d37758d497d1e222e815718c162a2f958d,2024-04-06T05:15:07.210000
CVE-2024-21506,0,0,49464276e60fcd34c863a66da1cf82d37758d497d1e222e815718c162a2f958d,2024-04-06T05:15:07.210000
CVE-2024-2151,0,0,18a6fcad8683189bc1efb506f6c521736ba6197d27ab556e14dde08640970095,2024-03-21T02:52:29.870000
CVE-2024-2152,0,0,310025f5ea8ce44d7a0a0b2b3eebc18ed40ff16bb94c0d195ab98727b21e2e8b,2024-03-21T02:52:29.957000
CVE-2024-2153,0,0,4fc2c1bd0729a4b4b5924182d6367224ebd43d77d2c89d30aad10d987c6cdb2a,2024-03-21T02:52:30.037000
@ -241029,7 +241029,7 @@ CVE-2024-23655,0,0,b4fe4299d47f9606e4fc07c80e04bb15761ba2650f126678feb918b4172cc
CVE-2024-23656,0,0,695cb145f7353545c42b021c49ddb6b311a4d25b9fa1e7632b8b33e1235c65fb,2024-01-31T23:26:14.650000
CVE-2024-23659,0,0,236290b059375e8b7040b3505591889202adcca1fe58c9cff8e0844cbcf32583,2024-01-25T14:58:22.470000
CVE-2024-23660,0,0,1b2c29c1f9877409e81cc31263cb621728177876460bb697b8348507998614a6,2024-02-15T16:01:29.370000
CVE-2024-23672,0,0,3e30b4071c9b6300f3445a2a8e5bf6ce2d8151000c12401ed1c0dc6184734b52,2024-04-02T23:15:54.273000
CVE-2024-23672,0,1,54bf1407d160f0bf02a84f88f834a69410f295a08745f6fc791198a038b82c2c,2024-04-06T06:15:07.717000
CVE-2024-23673,0,0,11a42dc617628e4138314e2a3d8d0f02b60cec9315a80bc3284ec5f1547fd09f,2024-02-14T00:26:41.517000
CVE-2024-23674,0,0,6ff4eec4bc6bf37404ee9cc16207f5af57bda7bc987c56668d0793a7a9ea14ad,2024-02-16T13:37:55.033000
CVE-2024-23675,0,0,9efb5b028640b8fde323c67b79c038267e86921347cc160dc2b8176c1daa7239,2024-01-29T18:04:13.527000
@ -241376,7 +241376,7 @@ CVE-2024-24402,0,0,05bde6c2c908d6bd00d03e2f32a00232b16c7e0716c59c44c87ccc77dc0ed
CVE-2024-24407,0,0,4193bde31373fba07b9911bdf83cf058d1a88c50f8e538ed6dc5165a28a70be3,2024-03-29T12:45:02.937000
CVE-2024-2442,0,0,4a0108630272c9d1ae8cbd16d021c5a020f9f82cadb01d3a92c49cf60c8b3b5a,2024-03-20T13:00:16.367000
CVE-2024-2443,0,0,72183cadd70f38595a21379efb2f0e00cd3d95dbe7e44da788d1807f622cd6cc,2024-03-21T12:58:51.093000
CVE-2024-2444,1,1,90108671d071ce282a97c310520d66b331b06b9d9989a34b8d673b57fe7fca97,2024-04-06T05:15:07.500000
CVE-2024-2444,0,0,90108671d071ce282a97c310520d66b331b06b9d9989a34b8d673b57fe7fca97,2024-04-06T05:15:07.500000
CVE-2024-2445,0,0,2f855bbcb84a342093922fd73320bfe19138d60313d23c629da4de19e559d727,2024-03-15T12:53:06.423000
CVE-2024-2446,0,0,42e5c66ebcf58bc3242675333cd3d5679a04b8d2c648c26027e5a47b9ff8b42a,2024-03-15T12:53:06.423000
CVE-2024-24468,0,0,2ffe0e787add87754da9d28139dd49fe0df5af62f9576796ac86e102fb215c8b,2024-02-07T22:03:09.897000
@ -241411,7 +241411,7 @@ CVE-2024-2453,0,0,3516619c9d1ad877533ff47d2854d77f923dcb6e13d6b386a451fa313ccb4d
CVE-2024-24539,0,0,f93dd0b0f28d93142ebc045d2b13c802b69814cdafc34403acf2ae3cd69400ec,2024-03-18T12:38:25.490000
CVE-2024-24543,0,0,f516e88d85199344e1e2c4ae69468b4de7248951f71da4710fc97171a286ff1a,2024-02-14T17:13:32.827000
CVE-2024-24548,0,0,9dbe1af5af4a9b865bf88b2a305b739ac231a7ce95c9c8ed04344b3144708c91,2024-02-08T18:53:14.107000
CVE-2024-24549,0,0,9eb3db00525102907084123b420abdc439f9548dffe26caec4bda7c4c40545a5,2024-04-02T23:15:54.360000
CVE-2024-24549,0,1,41f01a6ce0acab1e663a33240960755cce5d7348c8154f4ae0884170d1f21b3b,2024-04-06T06:15:08.030000
CVE-2024-24556,0,0,5eadc80f5e2b4d40f2247a29eb7c2aa8b2d9f2f191f8cfe4f491f2d184a6cbe7,2024-02-06T19:24:46.810000
CVE-2024-24557,0,0,803986686a1d77830cb33582e01547bf1b4ed013f71e8dbf2a84322efe6db933,2024-02-09T20:21:32.970000
CVE-2024-24558,0,0,e1e4d32f901535a55c2f6412106d8d6d972ab259b4d2d031ab0a6368463e0518,2024-02-06T19:35:24.230000
@ -241469,6 +241469,7 @@ CVE-2024-24705,0,0,fa7603570485ff5e2532a1aa05b32e5c0f5434f5146edb6c736525118ca76
CVE-2024-24706,0,0,4d433b03a4c26ebc6bd4b9712c01509648b3f2cecc7341b14e252b0e38dfa793,2024-02-15T02:09:50.480000
CVE-2024-24707,0,0,e9eaf11ec6d77d6d63fe4c4f7a4c514f1071c80be95f64729ea7f3c4592d1bf8,2024-04-03T17:24:18.150000
CVE-2024-24708,0,0,f693d4f4acd95516c93eac11f2cab76ea0d55ea86fcf1b386fdcecddbfc9bf86,2024-02-29T13:49:29.390000
CVE-2024-2471,1,1,6a63e74687f1ff94982182ddafcafe063937f5e52bc8847795dd092ded316a04,2024-04-06T06:15:08.470000
CVE-2024-24711,0,0,0d048c3822039d008612960507a20bcb0af4972abb0e8757f981885d0a5986fc,2024-03-26T12:55:05.010000
CVE-2024-24712,0,0,3eb883409ceb5cd8ab7cfb2c23165937e7138a0fdba93206148a8d8c39991d81,2024-02-16T14:48:04.207000
CVE-2024-24713,0,0,016796105eec4ced1aaab79578ed2b6dc8b6c4a64b21f9341804bb78b76a15f2,2024-02-16T15:48:04.237000
@ -242409,7 +242410,7 @@ CVE-2024-26542,0,0,84bcc676050237f7706e936cd8d9d490aa0a127cdccddbe7afe739c073267
CVE-2024-26548,0,0,7b31129407d10e539a4174451b23a0f83a48cdb246d6dd13af61036fdc95df1c,2024-03-01T14:04:26.010000
CVE-2024-26557,0,0,413b34482d1eed582f272b955524fa71f7b68414d25ad46ae764ef2e2b3412f9,2024-03-22T12:45:36.130000
CVE-2024-26559,0,0,32dd037e107446e11601c6ddb83598fc34f3ebdb48b667f29294eba708b9e4c1,2024-02-29T13:49:47.277000
CVE-2024-2656,1,1,6b1e617671c5db4410a66b02a7ae4562c59aef6d1d72bcdc3b2418b06c13ceed,2024-04-06T04:15:11.030000
CVE-2024-2656,0,0,6b1e617671c5db4410a66b02a7ae4562c59aef6d1d72bcdc3b2418b06c13ceed,2024-04-06T04:15:11.030000
CVE-2024-26566,0,0,e082212a38f258b5c22bdd7daa5a29191a5e851b4c959cb2f66848d27d20d8bb,2024-03-07T13:52:27.110000
CVE-2024-26577,0,0,eb994672bf510d158b4978f43b0d7e0594f22405d228a7c909ba4da4498cc451,2024-03-27T12:29:30.307000
CVE-2024-26578,0,0,631d617cd0985d9923eed32b0cb4b9e9025809830b6a3ca2ef1a468d4f2a7124,2024-02-22T19:07:27.197000
@ -243564,8 +243565,9 @@ CVE-2024-29474,0,0,2aadcb81ffb1d351041d20929f964ee8063ff37b32acc5a730656efc04de5
CVE-2024-29477,0,0,5231aab2983543fdf491ab629db6bbcb71a18478e7074594e3d1100549f6a211,2024-04-03T12:38:04.840000
CVE-2024-2948,0,0,3594bbd430dd5444695ca044dc4efc4195ce92c17c43c967ca88fadf4c9f5e69,2024-04-01T01:12:59.077000
CVE-2024-29489,0,0,281c97da696e2014734e05639dd64d47354e5c2b4bcf9f1b7827a4a4899ee03d,2024-03-29T12:45:02.937000
CVE-2024-2949,1,1,5ad125022bc8aed0ddd1ffad23bdf8604b82f4097130ea250fd3f1347f2dc708,2024-04-06T07:15:06.973000
CVE-2024-29499,0,0,6d5bcd6ddf0ffffbb229032818f99219d3a96f2f060fbc36a33564f3ae345d5e,2024-03-22T19:02:10.300000
CVE-2024-2950,1,1,4490b094193c27c7b50356493c173985060b11fe58eb1177815e1eb668a30b5f,2024-04-06T04:15:11.463000
CVE-2024-2950,0,0,4490b094193c27c7b50356493c173985060b11fe58eb1177815e1eb668a30b5f,2024-04-06T04:15:11.463000
CVE-2024-2951,0,0,7025f71f619ebfb5f00b29e3d72fe62bb5f0ea0dbfe92a58b33e63352aa0779c,2024-03-27T12:29:41.530000
CVE-2024-29514,0,0,2d6d3d0a4ae4b5ae40dadfbf4537d707f35bed7e85002b6d4e3d8180d6408f0b,2024-04-02T18:12:16.283000
CVE-2024-29515,0,0,79c9f65757e49bdb19c4dcff88d6ba2d524b1951e790ac90d5ffb4f302abcf45,2024-03-26T12:55:05.010000
@ -244216,7 +244218,7 @@ CVE-2024-3204,0,0,a9dea1ca01b499632a34af3ee57c461ecd8a21787537da790c2ae8f833a611
CVE-2024-3205,0,0,b2f3ceb1bf38a09a954460b526a18eba5a5a22a0c7181b9f1de158755c6153d4,2024-04-03T12:38:04.840000
CVE-2024-3207,0,0,5c9ae7819818cf69391317769652edafe7eb5058db1623e7c6299d6d13471791,2024-04-03T12:38:04.840000
CVE-2024-3209,0,0,cbfab2641f7deaa26fa0bc09801c52aa5b55dcac193d132dc1556c423a22c65d,2024-04-06T03:15:07.983000
CVE-2024-3216,1,1,2dc4fb4b2bb02dfb9b4c69bd5e9febd5fa358539ce9d22b80adb6f50c85f1961,2024-04-06T04:15:11.813000
CVE-2024-3216,0,0,2dc4fb4b2bb02dfb9b4c69bd5e9febd5fa358539ce9d22b80adb6f50c85f1961,2024-04-06T04:15:11.813000
CVE-2024-3217,0,0,4de075781ed27d9af99ed393e165df2d285dc08a6ed9934e378886c989fa51ff,2024-04-05T12:40:52.763000
CVE-2024-3218,0,0,2efa792f2f422ae3d499fd8bd729cdb1e057c75ae9cfbaccf7a66bc466210399,2024-04-03T12:38:04.840000
CVE-2024-3221,0,0,265e838721fb682684198a7086d104f84e57519a8c4d6ef772db38592eb6bf44,2024-04-03T12:38:04.840000
@ -244265,6 +244267,8 @@ CVE-2024-3354,0,0,d035bebbbe4ba20bd3a170fae23b0047b357c9ccbebf4d91c0e7d2d35e44b1
CVE-2024-3355,0,0,ca68600fd0628cb5ae79a1a70be90a2c45f3bd0e143e4bf60e7a607aceefa438,2024-04-05T21:15:09.800000
CVE-2024-3356,0,0,ba2a4323d3ef545405bc3e57d4d8fd5b2db7ed6b3db10c68e5aaa772d5c08f2c,2024-04-05T21:15:10.033000
CVE-2024-3357,0,0,b2df18286a35ae9917365c7ebbd57657afc4476a2e1c86e29f32309e79b4d063,2024-04-05T22:15:07.563000
CVE-2024-3358,1,1,ab01dabc23656440b3622c5007937546b313923d6095d4c2551b2566ba26e9b1,2024-04-06T04:15:12.070000
CVE-2024-3359,1,1,5a660a9bb906bcbec699f4b9a6978728fbbe08a520c355f924362a3191722f40,2024-04-06T04:15:12.503000
CVE-2024-3360,1,1,d06c422a19de6ea1e839ee38dfed0f550d0d98475308f312095f1fd62a5b8dfb,2024-04-06T05:15:07.550000
CVE-2024-3358,0,0,ab01dabc23656440b3622c5007937546b313923d6095d4c2551b2566ba26e9b1,2024-04-06T04:15:12.070000
CVE-2024-3359,0,0,5a660a9bb906bcbec699f4b9a6978728fbbe08a520c355f924362a3191722f40,2024-04-06T04:15:12.503000
CVE-2024-3360,0,0,d06c422a19de6ea1e839ee38dfed0f550d0d98475308f312095f1fd62a5b8dfb,2024-04-06T05:15:07.550000
CVE-2024-3361,1,1,0b4a20ae0c264f2121167d14163e860ded5203ec438c30cd4b1059530ab37978,2024-04-06T06:15:08.757000
CVE-2024-3362,1,1,4a6e972c869341c43eef145b0dd1f1f353b666f15ed4ebfc07d25dd5954a8a23,2024-04-06T07:15:07.333000

Can't render this file because it is too large.