Auto-Update: 2024-04-25T20:00:38.051859+00:00

This commit is contained in:
cad-safe-bot 2024-04-25 20:03:27 +00:00
parent 0a8e9fdbbf
commit 5f12c43026
26 changed files with 889 additions and 395 deletions

View File

@ -2,58 +2,14 @@
"id": "CVE-2024-25700",
"sourceIdentifier": "psirt@esri.com",
"published": "2024-04-04T18:15:11.837",
"lastModified": "2024-04-04T19:24:50.670",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-04-25T18:15:07.817",
"vulnStatus": "Rejected",
"descriptions": [
{
"lang": "en",
"value": "There is a stored Cross-site Scripting vulnerability in Esri Portal for ArcGIS Enterprise Web App Builder versions <= 11.1 that may allow a remote, authenticated attacker to create a crafted link that is stored in a web map link which when clicked could potentially execute arbitrary JavaScript code in the victim\u2019s browser. The privileges required to execute this attack are high.\u00a0"
},
{
"lang": "es",
"value": "Existe una vulnerabilidad de Cross-Site Scripting almacenada en Esri Portal for ArcGIS Enterprise Web App Builder versiones &lt;= 11.1 que puede permitir a un atacante remoto y autenticado crear un v\u00ednculo manipulado que se almacena en un v\u00ednculo de un mapa web y que, al hacer clic, podr\u00eda ejecutarse de forma arbitraria. C\u00f3digo JavaScript en el navegador de la v\u00edctima. Los privilegios necesarios para ejecutar este ataque son elevados."
"value": "Rejected reason: \nThis CVE ID has been rejected or withdrawn by its CVE Numbering Authority because this item is scheduled to be patched at a future time."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "psirt@esri.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 4.8,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.7,
"impactScore": 2.7
}
]
},
"weaknesses": [
{
"source": "psirt@esri.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://www.esri.com/arcgis-blog/products/arcgis-enterprise/administration/portal-for-arcgis-security-2024-update-2/",
"source": "psirt@esri.com"
}
]
"metrics": {},
"references": []
}

View File

@ -2,58 +2,14 @@
"id": "CVE-2024-25703",
"sourceIdentifier": "psirt@esri.com",
"published": "2024-04-04T18:15:12.090",
"lastModified": "2024-04-04T19:24:50.670",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-04-25T19:15:49.520",
"vulnStatus": "Rejected",
"descriptions": [
{
"lang": "en",
"value": "There is a reflected cross site scripting vulnerability in the home application in Esri Portal for ArcGIS 11.1 and below on Windows and Linux that allows a remote, unauthenticated attacker to create a crafted link which when clicked could potentially execute arbitrary JavaScript code in the victim\u2019s browser."
},
{
"lang": "es",
"value": "Hay una vulnerabilidad de Cross-Site Scripting reflejada en la aplicaci\u00f3n dom\u00e9stica en Esri Portal para ArcGIS 11.1 y versiones anteriores en Windows y Linux que permite a un atacante remoto y no autenticado crear un enlace manipulado que, al hacer clic, podr\u00eda ejecutar c\u00f3digo JavaScript arbitrario en el navegador de la v\u00edctima."
"value": "Rejected reason: \nThis CVE ID has been rejected or withdrawn by its CVE Numbering Authority because this item is scheduled to be patched at a future time.\n\n"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "psirt@esri.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7
}
]
},
"weaknesses": [
{
"source": "psirt@esri.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://www.esri.com/arcgis-blog/products/arcgis-enterprise/administration/portal-for-arcgis-security-2024-update-2/",
"source": "psirt@esri.com"
}
]
"metrics": {},
"references": []
}

View File

@ -2,58 +2,14 @@
"id": "CVE-2024-25704",
"sourceIdentifier": "psirt@esri.com",
"published": "2024-04-04T18:15:12.343",
"lastModified": "2024-04-04T19:24:50.670",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-04-25T19:15:49.597",
"vulnStatus": "Rejected",
"descriptions": [
{
"lang": "en",
"value": "There is a stored Cross-site Scripting vulnerability in Esri Portal for ArcGIS Enterprise Experience Builder versions <= 11.1 that may allow a remote, authenticated attacker to create a crafted link that is stored in the Experience Builder Embed widget which when loaded could potentially execute arbitrary JavaScript code in the victim\u2019s browser. The privileges required to execute this attack are high.\u00a0"
},
{
"lang": "es",
"value": "Existe una vulnerabilidad de Cross-Site Scripting almacenada en Esri Portal for ArcGIS Enterprise Experience Builder versiones &lt;= 11.1 que puede permitir que un atacante remoto y autenticado cree un enlace manipulado que se almacena en el widget de inserci\u00f3n de Experience Builder que, cuando se carga, podr\u00eda ejecutarse de forma arbitraria. C\u00f3digo JavaScript en el navegador de la v\u00edctima. Los privilegios necesarios para ejecutar este ataque son elevados."
"value": "Rejected reason: \nThis CVE ID has been rejected or withdrawn by its CVE Numbering Authority because this item is scheduled to be patched at a future time.\n\n"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "psirt@esri.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 4.8,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.7,
"impactScore": 2.7
}
]
},
"weaknesses": [
{
"source": "psirt@esri.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://www.esri.com/arcgis-blog/products/arcgis-enterprise/administration/portal-for-arcgis-security-2024-update-2/",
"source": "psirt@esri.com"
}
]
"metrics": {},
"references": []
}

View File

@ -2,58 +2,14 @@
"id": "CVE-2024-25705",
"sourceIdentifier": "psirt@esri.com",
"published": "2024-04-04T18:15:12.603",
"lastModified": "2024-04-04T19:24:50.670",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-04-25T19:15:49.660",
"vulnStatus": "Rejected",
"descriptions": [
{
"lang": "en",
"value": "There is a cross site scripting vulnerability in the Esri Portal for ArcGIS Experience Builder 11.1 and below on Windows and Linux that allows a remote, unauthenticated attacker to create a crafted link which when clicked could potentially execute arbitrary JavaScript code in the victim\u2019s browser. The privileges required to execute this attack are low.\u00a0"
},
{
"lang": "es",
"value": "Existe una vulnerabilidad de Cross-Site Scripting en Esri Portal para ArcGIS Experience Builder 11.1 y versiones anteriores en Windows y Linux que permite a un atacante remoto no autenticado crear un enlace manipulado que, al hacer clic, podr\u00eda ejecutar c\u00f3digo JavaScript arbitrario en el navegador de la v\u00edctima. Los privilegios necesarios para ejecutar este ataque son bajos."
"value": "Rejected reason: \nThis CVE ID has been rejected or withdrawn by its CVE Numbering Authority because this item is scheduled to be patched at a future time.\n\n"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "psirt@esri.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
}
]
},
"weaknesses": [
{
"source": "psirt@esri.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://www.esri.com/arcgis-blog/products/arcgis-enterprise/administration/portal-for-arcgis-security-2024-update-2/",
"source": "psirt@esri.com"
}
]
"metrics": {},
"references": []
}

View File

@ -2,58 +2,14 @@
"id": "CVE-2024-25706",
"sourceIdentifier": "psirt@esri.com",
"published": "2024-04-04T18:15:12.830",
"lastModified": "2024-04-04T19:24:50.670",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-04-25T19:15:49.720",
"vulnStatus": "Rejected",
"descriptions": [
{
"lang": "en",
"value": "There is an HTML injection vulnerability in Esri Portal for ArcGIS <=11.0 that may allow a remote, unauthenticated attacker to craft a URL which, when clicked, could potentially generate a message that may entice an unsuspecting victim to visit an arbitrary website. This could simplify phishing attacks. "
},
{
"lang": "es",
"value": "Existe una vulnerabilidad de inyecci\u00f3n de HTML en Esri Portal for ArcGIS &lt;=11.0 que puede permitir que un atacante remoto y no autenticado cree una URL que, al hacer clic, podr\u00eda generar un mensaje que podr\u00eda atraer a una v\u00edctima desprevenida a visitar un sitio web arbitrario. Esto podr\u00eda simplificar los ataques de phishing."
"value": "Rejected reason: \nThis CVE ID has been rejected or withdrawn by its CVE Numbering Authority because this item is scheduled to be patched at a future time.\n\n"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "psirt@esri.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7
}
]
},
"weaknesses": [
{
"source": "psirt@esri.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-94"
}
]
}
],
"references": [
{
"url": "https://www.esri.com/arcgis-blog/products/arcgis-enterprise/administration/portal-for-arcgis-security-2024-update-2/",
"source": "psirt@esri.com"
}
]
"metrics": {},
"references": []
}

View File

@ -2,58 +2,14 @@
"id": "CVE-2024-25709",
"sourceIdentifier": "psirt@esri.com",
"published": "2024-04-04T18:15:13.340",
"lastModified": "2024-04-19T23:15:10.307",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-04-25T19:15:49.777",
"vulnStatus": "Rejected",
"descriptions": [
{
"lang": "en",
"value": "There is a stored Cross-site Scripting vulnerability in Esri Portal for ArcGIS versions 10.8.1 \u2013 1121 that may allow a remote, authenticated attacker to create a crafted link that can be saved as a new location when moving an existing item which will potentially execute arbitrary JavaScript code in the victim\u2019s browser. The privileges required to execute this attack are high.\u00a0"
},
{
"lang": "es",
"value": "Existe una vulnerabilidad de Cross-Site Scripting almacenado en Esri Portal for ArcGIS versiones 10.8.1 \u2013 1121 que puede permitir que un atacante remoto y autenticado cree un enlace manipulado que se puede guardar como una nueva ubicaci\u00f3n al mover un elemento existente que potencialmente se ejecutar\u00e1. c\u00f3digo JavaScript arbitrario en el navegador de la v\u00edctima. Los privilegios necesarios para ejecutar este ataque son elevados."
"value": "Rejected reason: \nThis CVE ID has been rejected or withdrawn by its CVE Numbering Authority because this item is scheduled to be patched at a future time.\n\n"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "psirt@esri.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7
}
]
},
"weaknesses": [
{
"source": "psirt@esri.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://www.esri.com/arcgis-blog/products/arcgis-enterprise/administration/portal-for-arcgis-security-2024-update-1/",
"source": "psirt@esri.com"
}
]
"metrics": {},
"references": []
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-28734",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-03-19T14:15:07.687",
"lastModified": "2024-04-01T21:15:33.200",
"lastModified": "2024-04-25T19:15:49.850",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
@ -19,6 +19,14 @@
{
"url": "https://packetstormsecurity.com/files/177619/Financials-By-Coda-Cross-Site-Scripting.html",
"source": "cve@mitre.org"
},
{
"url": "https://www.unit4.com/",
"source": "cve@mitre.org"
},
{
"url": "https://www.unit4.com/products/financial-management-software",
"source": "cve@mitre.org"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-28735",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-03-20T15:15:07.920",
"lastModified": "2024-04-01T21:15:37.360",
"lastModified": "2024-04-25T19:15:49.910",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
@ -27,6 +27,14 @@
{
"url": "https://packetstormsecurity.com/files/177620/Financials-By-Coda-Authorization-Bypass.html",
"source": "cve@mitre.org"
},
{
"url": "https://www.unit4.com/",
"source": "cve@mitre.org"
},
{
"url": "https://www.unit4.com/products/financial-management-software",
"source": "cve@mitre.org"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-28834",
"sourceIdentifier": "secalert@redhat.com",
"published": "2024-03-21T14:15:07.547",
"lastModified": "2024-04-18T05:15:48.167",
"lastModified": "2024-04-25T18:15:07.903",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
@ -59,6 +59,14 @@
"url": "https://access.redhat.com/errata/RHSA-2024:1879",
"source": "secalert@redhat.com"
},
{
"url": "https://access.redhat.com/errata/RHSA-2024:1997",
"source": "secalert@redhat.com"
},
{
"url": "https://access.redhat.com/errata/RHSA-2024:2044",
"source": "secalert@redhat.com"
},
{
"url": "https://access.redhat.com/security/cve/CVE-2024-28834",
"source": "secalert@redhat.com"

View File

@ -0,0 +1,63 @@
{
"id": "CVE-2024-2905",
"sourceIdentifier": "secalert@redhat.com",
"published": "2024-04-25T18:15:08.037",
"lastModified": "2024-04-25T18:15:08.037",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "A security vulnerability has been discovered within rpm-ostree, pertaining to the /etc/shadow file in default builds having the world-readable bit enabled. This issue arises from the default permissions being set at a higher level than recommended, potentially exposing sensitive authentication data to unauthorized access."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "secalert@redhat.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 6.2,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.5,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "secalert@redhat.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-732"
}
]
}
],
"references": [
{
"url": "https://access.redhat.com/security/cve/CVE-2024-2905",
"source": "secalert@redhat.com"
},
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2271585",
"source": "secalert@redhat.com"
},
{
"url": "https://github.com/coreos/rpm-ostree/security/advisories/GHSA-2m76-cwhg-7wv6",
"source": "secalert@redhat.com"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2024-30939",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-04-25T19:15:49.970",
"lastModified": "2024-04-25T19:15:49.970",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "An issue discovered in Yealink VP59 Teams Editions with firmware version 91.15.0.118 allows a physically proximate attacker to gain control of an account via a flaw in the factory reset procedure."
}
],
"metrics": {},
"references": [
{
"url": "https://medium.com/%40deepsahu1/yealink-ip-phone-account-take-over-9bf9e7b847c0?source=friends_link&sk=b0d664dd5b3aad5b758e4934aca997ad",
"source": "cve@mitre.org"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-31080",
"sourceIdentifier": "secalert@redhat.com",
"published": "2024-04-04T14:15:10.330",
"lastModified": "2024-04-24T02:15:45.987",
"lastModified": "2024-04-25T18:15:08.253",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
@ -55,6 +55,34 @@
"url": "https://access.redhat.com/errata/RHSA-2024:1785",
"source": "secalert@redhat.com"
},
{
"url": "https://access.redhat.com/errata/RHSA-2024:2036",
"source": "secalert@redhat.com"
},
{
"url": "https://access.redhat.com/errata/RHSA-2024:2037",
"source": "secalert@redhat.com"
},
{
"url": "https://access.redhat.com/errata/RHSA-2024:2038",
"source": "secalert@redhat.com"
},
{
"url": "https://access.redhat.com/errata/RHSA-2024:2039",
"source": "secalert@redhat.com"
},
{
"url": "https://access.redhat.com/errata/RHSA-2024:2040",
"source": "secalert@redhat.com"
},
{
"url": "https://access.redhat.com/errata/RHSA-2024:2041",
"source": "secalert@redhat.com"
},
{
"url": "https://access.redhat.com/errata/RHSA-2024:2042",
"source": "secalert@redhat.com"
},
{
"url": "https://access.redhat.com/security/cve/CVE-2024-31080",
"source": "secalert@redhat.com"

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-31081",
"sourceIdentifier": "secalert@redhat.com",
"published": "2024-04-04T14:15:10.593",
"lastModified": "2024-04-24T02:15:46.110",
"lastModified": "2024-04-25T18:15:08.367",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
@ -55,6 +55,34 @@
"url": "https://access.redhat.com/errata/RHSA-2024:1785",
"source": "secalert@redhat.com"
},
{
"url": "https://access.redhat.com/errata/RHSA-2024:2036",
"source": "secalert@redhat.com"
},
{
"url": "https://access.redhat.com/errata/RHSA-2024:2037",
"source": "secalert@redhat.com"
},
{
"url": "https://access.redhat.com/errata/RHSA-2024:2038",
"source": "secalert@redhat.com"
},
{
"url": "https://access.redhat.com/errata/RHSA-2024:2039",
"source": "secalert@redhat.com"
},
{
"url": "https://access.redhat.com/errata/RHSA-2024:2040",
"source": "secalert@redhat.com"
},
{
"url": "https://access.redhat.com/errata/RHSA-2024:2041",
"source": "secalert@redhat.com"
},
{
"url": "https://access.redhat.com/errata/RHSA-2024:2042",
"source": "secalert@redhat.com"
},
{
"url": "https://access.redhat.com/security/cve/CVE-2024-31081",
"source": "secalert@redhat.com"

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-31083",
"sourceIdentifier": "secalert@redhat.com",
"published": "2024-04-05T12:15:37.577",
"lastModified": "2024-04-24T02:15:46.203",
"lastModified": "2024-04-25T18:15:08.470",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
@ -55,6 +55,34 @@
"url": "https://access.redhat.com/errata/RHSA-2024:1785",
"source": "secalert@redhat.com"
},
{
"url": "https://access.redhat.com/errata/RHSA-2024:2036",
"source": "secalert@redhat.com"
},
{
"url": "https://access.redhat.com/errata/RHSA-2024:2037",
"source": "secalert@redhat.com"
},
{
"url": "https://access.redhat.com/errata/RHSA-2024:2038",
"source": "secalert@redhat.com"
},
{
"url": "https://access.redhat.com/errata/RHSA-2024:2039",
"source": "secalert@redhat.com"
},
{
"url": "https://access.redhat.com/errata/RHSA-2024:2040",
"source": "secalert@redhat.com"
},
{
"url": "https://access.redhat.com/errata/RHSA-2024:2041",
"source": "secalert@redhat.com"
},
{
"url": "https://access.redhat.com/errata/RHSA-2024:2042",
"source": "secalert@redhat.com"
},
{
"url": "https://access.redhat.com/security/cve/CVE-2024-31083",
"source": "secalert@redhat.com"

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2024-32645",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-04-25T18:15:08.593",
"lastModified": "2024-04-25T18:15:08.593",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Vyper is a pythonic Smart Contract Language for the Ethereum virtual machine. In versions 0.3.10 and prior, incorrect values can be logged when `raw_log` builtin is called with memory or storage arguments to be used as topics. A contract search was performed and no vulnerable contracts were found in production. The `build_IR` function of the `RawLog` class fails to properly unwrap the variables provided as topics. Consequently, incorrect values are logged as topics. As of time of publication, no fixed version is available."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 5.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 3.9,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-20"
}
]
}
],
"references": [
{
"url": "https://github.com/vyperlang/vyper/security/advisories/GHSA-xchq-w5r3-4wg3",
"source": "security-advisories@github.com"
}
]
}

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2024-32646",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-04-25T18:15:08.780",
"lastModified": "2024-04-25T18:15:08.780",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Vyper is a pythonic Smart Contract Language for the Ethereum virtual machine. In versions 0.3.10 and prior, using the `slice` builtin can result in a double eval vulnerability when the buffer argument is either `msg.data`, `self.code` or `<address>.code` and either the `start` or `length` arguments have side-effects. It can be easily triggered only with the versions `<0.3.4` as `0.3.4` introduced the unique symbol fence. No vulnerable production contracts were found. Additionally, double evaluation of side-effects should be easily discoverable in client tests. As such, the impact is low. As of time of publication, no fixed versions are available.\n\n"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 5.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 3.9,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-20"
}
]
}
],
"references": [
{
"url": "https://github.com/vyperlang/vyper/security/advisories/GHSA-r56x-j438-vw5m",
"source": "security-advisories@github.com"
}
]
}

View File

@ -0,0 +1,59 @@
{
"id": "CVE-2024-32647",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-04-25T18:15:08.963",
"lastModified": "2024-04-25T18:15:08.963",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Vyper is a pythonic Smart Contract Language for the Ethereum virtual machine. In versions 0.3.10 and prior, using the `create_from_blueprint` builtin can result in a double eval vulnerability when `raw_args=True` and the `args` argument has side-effects. It can be seen that the `_build_create_IR` function of the `create_from_blueprint` builtin doesn't cache the mentioned `args` argument to the stack. As such, it can be evaluated multiple times (instead of retrieving the value from the stack). No vulnerable production contracts were found. Additionally, double evaluation of side-effects should be easily discoverable in client tests. As such, the impact is low. As of time of publication, no fixed versions exist.\n"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 5.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 3.9,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-95"
}
]
}
],
"references": [
{
"url": "https://github.com/vyperlang/vyper/blob/cedf7087e68e67c7bfbd47ae95dcb16b81ad2e02/vyper/builtins/functions.py#L1847",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/vyperlang/vyper/security/advisories/GHSA-3whq-64q2-qfj6",
"source": "security-advisories@github.com"
}
]
}

View File

@ -0,0 +1,63 @@
{
"id": "CVE-2024-32648",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-04-25T18:15:09.157",
"lastModified": "2024-04-25T18:15:09.157",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Vyper is a pythonic Smart Contract Language for the Ethereum virtual machine. Prior to version 0.3.0, default functions don't respect nonreentrancy keys and the lock isn't emitted. No vulnerable production contracts were found. Additionally, using a lock on a `default` function is a very sparsely used pattern. As such, the impact is low. Version 0.3.0 contains a patch for the issue.\n"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 5.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 3.9,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-667"
}
]
}
],
"references": [
{
"url": "https://github.com/vyperlang/vyper/commit/93287e5ac184b53b395c907d40701f721daf8177",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/vyperlang/vyper/issues/2455",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/vyperlang/vyper/security/advisories/GHSA-m2v9-w374-5hj9",
"source": "security-advisories@github.com"
}
]
}

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2024-32649",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-04-25T18:15:09.350",
"lastModified": "2024-04-25T18:15:09.350",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Vyper is a pythonic Smart Contract Language for the Ethereum virtual machine. In versions 0.3.10 and prior, using the `sqrt` builtin can result in double eval vulnerability when the argument has side-effects. It can be seen that the `build_IR` function of the `sqrt` builtin doesn't cache the argument to the stack. As such, it can be evaluated multiple times (instead of retrieving the value from the stack). No vulnerable production contracts were found. Additionally, double evaluation of side-effects should be easily discoverable in client tests. As such, the impact is low. As of time of publication, no fixed versions are available.\n"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 5.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 3.9,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-95"
}
]
}
],
"references": [
{
"url": "https://github.com/vyperlang/vyper/security/advisories/GHSA-5jrj-52x8-m64h",
"source": "security-advisories@github.com"
}
]
}

View File

@ -0,0 +1,47 @@
{
"id": "CVE-2024-3508",
"sourceIdentifier": "secalert@redhat.com",
"published": "2024-04-25T18:15:09.567",
"lastModified": "2024-04-25T18:15:09.567",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "A flaw was found in Bombastic, which allows authenticated users to upload compressed (bzip2 or zstd) SBOMs. The API endpoint verifies the presence of some fields and values in the JSON. To perform this verification, the uploaded file must first be decompressed."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "secalert@redhat.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "LOW",
"baseScore": 4.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 1.4
}
]
},
"references": [
{
"url": "https://access.redhat.com/security/cve/CVE-2024-3508",
"source": "secalert@redhat.com"
},
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2274109",
"source": "secalert@redhat.com"
}
]
}

View File

@ -0,0 +1,59 @@
{
"id": "CVE-2024-3622",
"sourceIdentifier": "secalert@redhat.com",
"published": "2024-04-25T18:15:09.747",
"lastModified": "2024-04-25T18:15:09.747",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "A flaw was found when using mirror-registry to install Quay. It uses a default secret, which is stored in plain-text format in one of the configuration template files. This issue may lead to all instances of Quay deployed using mirror-registry to have the same secret key. This flaw allows a malicious actor to craft session cookies and as a consequence, it may lead to gaining access to the affected Quay instance."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "secalert@redhat.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "secalert@redhat.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-256"
}
]
}
],
"references": [
{
"url": "https://access.redhat.com/security/cve/CVE-2024-3622",
"source": "secalert@redhat.com"
},
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2274400",
"source": "secalert@redhat.com"
}
]
}

View File

@ -0,0 +1,59 @@
{
"id": "CVE-2024-3623",
"sourceIdentifier": "secalert@redhat.com",
"published": "2024-04-25T18:15:09.980",
"lastModified": "2024-04-25T18:15:09.980",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "A flaw was found when using mirror-registry to install Quay. It uses a default database secret key, which is stored in plain-text format in one of the configuration template files. This issue may lead to all instances of Quay deployed using mirror-registry to have the same database secret key. This flaw allows a malicious actor to access sensitive information from Quay's database."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "secalert@redhat.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "NONE",
"baseScore": 8.1,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.2
}
]
},
"weaknesses": [
{
"source": "secalert@redhat.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-256"
}
]
}
],
"references": [
{
"url": "https://access.redhat.com/security/cve/CVE-2024-3623",
"source": "secalert@redhat.com"
},
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2274404",
"source": "secalert@redhat.com"
}
]
}

View File

@ -0,0 +1,59 @@
{
"id": "CVE-2024-3624",
"sourceIdentifier": "secalert@redhat.com",
"published": "2024-04-25T18:15:10.170",
"lastModified": "2024-04-25T18:15:10.170",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "A flaw was found in how Quay's database is stored in plain-text in mirror-registry on the jinja's config.yaml file. This flaw allows a malicious actor with access to this file to gain access to Quay's database."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "secalert@redhat.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N",
"attackVector": "ADJACENT_NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "NONE",
"baseScore": 7.3,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.1,
"impactScore": 5.2
}
]
},
"weaknesses": [
{
"source": "secalert@redhat.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-256"
}
]
}
],
"references": [
{
"url": "https://access.redhat.com/security/cve/CVE-2024-3624",
"source": "secalert@redhat.com"
},
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2274407",
"source": "secalert@redhat.com"
}
]
}

View File

@ -0,0 +1,59 @@
{
"id": "CVE-2024-3625",
"sourceIdentifier": "secalert@redhat.com",
"published": "2024-04-25T18:15:10.360",
"lastModified": "2024-04-25T18:15:10.360",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "A flaw was found in Quay, where Quay's database is stored in plain text in mirror-registry on Jinja's config.yaml file. This issue leaves the possibility of a malicious actor with access to this file to gain access to Quay's Redis instance."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "secalert@redhat.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N",
"attackVector": "ADJACENT_NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "NONE",
"baseScore": 7.3,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.1,
"impactScore": 5.2
}
]
},
"weaknesses": [
{
"source": "secalert@redhat.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-256"
}
]
}
],
"references": [
{
"url": "https://access.redhat.com/security/cve/CVE-2024-3625",
"source": "secalert@redhat.com"
},
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2274408",
"source": "secalert@redhat.com"
}
]
}

View File

@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update
```plain
2024-04-25T18:00:39.836334+00:00
2024-04-25T20:00:38.051859+00:00
```
### Most recent CVE Modification Timestamp synchronized with NVD
```plain
2024-04-25T17:25:05.903000+00:00
2024-04-25T19:15:49.970000+00:00
```
### Last Data Feed Release
@ -33,58 +33,43 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
### Total Number of included CVEs
```plain
246786
246798
```
### CVEs added in the last Commit
Recently added CVEs: `22`
Recently added CVEs: `12`
- [CVE-2023-5675](CVE-2023/CVE-2023-56xx/CVE-2023-5675.json) (`2024-04-25T16:15:08.570`)
- [CVE-2023-6484](CVE-2023/CVE-2023-64xx/CVE-2023-6484.json) (`2024-04-25T16:15:09.743`)
- [CVE-2023-6544](CVE-2023/CVE-2023-65xx/CVE-2023-6544.json) (`2024-04-25T16:15:10.097`)
- [CVE-2023-6596](CVE-2023/CVE-2023-65xx/CVE-2023-6596.json) (`2024-04-25T16:15:10.353`)
- [CVE-2023-6717](CVE-2023/CVE-2023-67xx/CVE-2023-6717.json) (`2024-04-25T16:15:10.653`)
- [CVE-2023-6787](CVE-2023/CVE-2023-67xx/CVE-2023-6787.json) (`2024-04-25T16:15:10.867`)
- [CVE-2024-0874](CVE-2024/CVE-2024-08xx/CVE-2024-0874.json) (`2024-04-25T17:15:47.083`)
- [CVE-2024-1102](CVE-2024/CVE-2024-11xx/CVE-2024-1102.json) (`2024-04-25T17:15:47.457`)
- [CVE-2024-1139](CVE-2024/CVE-2024-11xx/CVE-2024-1139.json) (`2024-04-25T17:15:47.650`)
- [CVE-2024-1657](CVE-2024/CVE-2024-16xx/CVE-2024-1657.json) (`2024-04-25T17:15:48.013`)
- [CVE-2024-1726](CVE-2024/CVE-2024-17xx/CVE-2024-1726.json) (`2024-04-25T17:15:48.257`)
- [CVE-2024-2467](CVE-2024/CVE-2024-24xx/CVE-2024-2467.json) (`2024-04-25T17:15:49.580`)
- [CVE-2024-25624](CVE-2024/CVE-2024-256xx/CVE-2024-25624.json) (`2024-04-25T17:15:48.813`)
- [CVE-2024-28240](CVE-2024/CVE-2024-282xx/CVE-2024-28240.json) (`2024-04-25T17:15:49.010`)
- [CVE-2024-28241](CVE-2024/CVE-2024-282xx/CVE-2024-28241.json) (`2024-04-25T17:15:49.200`)
- [CVE-2024-29660](CVE-2024/CVE-2024-296xx/CVE-2024-29660.json) (`2024-04-25T17:15:49.377`)
- [CVE-2024-30890](CVE-2024/CVE-2024-308xx/CVE-2024-30890.json) (`2024-04-25T17:15:49.797`)
- [CVE-2024-31574](CVE-2024/CVE-2024-315xx/CVE-2024-31574.json) (`2024-04-25T17:15:49.853`)
- [CVE-2024-32236](CVE-2024/CVE-2024-322xx/CVE-2024-32236.json) (`2024-04-25T17:15:49.957`)
- [CVE-2024-32358](CVE-2024/CVE-2024-323xx/CVE-2024-32358.json) (`2024-04-25T17:15:50.020`)
- [CVE-2024-32467](CVE-2024/CVE-2024-324xx/CVE-2024-32467.json) (`2024-04-25T17:15:50.080`)
- [CVE-2024-32481](CVE-2024/CVE-2024-324xx/CVE-2024-32481.json) (`2024-04-25T17:15:50.273`)
- [CVE-2024-2905](CVE-2024/CVE-2024-29xx/CVE-2024-2905.json) (`2024-04-25T18:15:08.037`)
- [CVE-2024-30939](CVE-2024/CVE-2024-309xx/CVE-2024-30939.json) (`2024-04-25T19:15:49.970`)
- [CVE-2024-32645](CVE-2024/CVE-2024-326xx/CVE-2024-32645.json) (`2024-04-25T18:15:08.593`)
- [CVE-2024-32646](CVE-2024/CVE-2024-326xx/CVE-2024-32646.json) (`2024-04-25T18:15:08.780`)
- [CVE-2024-32647](CVE-2024/CVE-2024-326xx/CVE-2024-32647.json) (`2024-04-25T18:15:08.963`)
- [CVE-2024-32648](CVE-2024/CVE-2024-326xx/CVE-2024-32648.json) (`2024-04-25T18:15:09.157`)
- [CVE-2024-32649](CVE-2024/CVE-2024-326xx/CVE-2024-32649.json) (`2024-04-25T18:15:09.350`)
- [CVE-2024-3508](CVE-2024/CVE-2024-35xx/CVE-2024-3508.json) (`2024-04-25T18:15:09.567`)
- [CVE-2024-3622](CVE-2024/CVE-2024-36xx/CVE-2024-3622.json) (`2024-04-25T18:15:09.747`)
- [CVE-2024-3623](CVE-2024/CVE-2024-36xx/CVE-2024-3623.json) (`2024-04-25T18:15:09.980`)
- [CVE-2024-3624](CVE-2024/CVE-2024-36xx/CVE-2024-3624.json) (`2024-04-25T18:15:10.170`)
- [CVE-2024-3625](CVE-2024/CVE-2024-36xx/CVE-2024-3625.json) (`2024-04-25T18:15:10.360`)
### CVEs modified in the last Commit
Recently modified CVEs: `17`
Recently modified CVEs: `12`
- [CVE-2023-5685](CVE-2023/CVE-2023-56xx/CVE-2023-5685.json) (`2024-04-25T16:15:08.777`)
- [CVE-2023-5764](CVE-2023/CVE-2023-57xx/CVE-2023-5764.json) (`2024-04-25T16:15:08.903`)
- [CVE-2023-5824](CVE-2023/CVE-2023-58xx/CVE-2023-5824.json) (`2024-04-25T16:15:09.027`)
- [CVE-2023-6356](CVE-2023/CVE-2023-63xx/CVE-2023-6356.json) (`2024-04-25T16:15:09.513`)
- [CVE-2023-6535](CVE-2023/CVE-2023-65xx/CVE-2023-6535.json) (`2024-04-25T16:15:09.970`)
- [CVE-2023-7192](CVE-2023/CVE-2023-71xx/CVE-2023-7192.json) (`2024-04-25T17:15:46.553`)
- [CVE-2024-0914](CVE-2024/CVE-2024-09xx/CVE-2024-0914.json) (`2024-04-25T17:15:47.280`)
- [CVE-2024-2236](CVE-2024/CVE-2024-22xx/CVE-2024-2236.json) (`2024-04-25T17:15:49.467`)
- [CVE-2024-22373](CVE-2024/CVE-2024-223xx/CVE-2024-22373.json) (`2024-04-25T17:25:05.903`)
- [CVE-2024-22391](CVE-2024/CVE-2024-223xx/CVE-2024-22391.json) (`2024-04-25T17:25:05.903`)
- [CVE-2024-25569](CVE-2024/CVE-2024-255xx/CVE-2024-25569.json) (`2024-04-25T17:25:05.903`)
- [CVE-2024-31745](CVE-2024/CVE-2024-317xx/CVE-2024-31745.json) (`2024-04-25T16:15:11.227`)
- [CVE-2024-33592](CVE-2024/CVE-2024-335xx/CVE-2024-33592.json) (`2024-04-25T17:25:05.903`)
- [CVE-2024-4006](CVE-2024/CVE-2024-40xx/CVE-2024-4006.json) (`2024-04-25T17:25:05.903`)
- [CVE-2024-4024](CVE-2024/CVE-2024-40xx/CVE-2024-4024.json) (`2024-04-25T17:25:05.903`)
- [CVE-2024-4171](CVE-2024/CVE-2024-41xx/CVE-2024-4171.json) (`2024-04-25T17:25:05.903`)
- [CVE-2024-4172](CVE-2024/CVE-2024-41xx/CVE-2024-4172.json) (`2024-04-25T17:25:05.903`)
- [CVE-2024-25700](CVE-2024/CVE-2024-257xx/CVE-2024-25700.json) (`2024-04-25T18:15:07.817`)
- [CVE-2024-25703](CVE-2024/CVE-2024-257xx/CVE-2024-25703.json) (`2024-04-25T19:15:49.520`)
- [CVE-2024-25704](CVE-2024/CVE-2024-257xx/CVE-2024-25704.json) (`2024-04-25T19:15:49.597`)
- [CVE-2024-25705](CVE-2024/CVE-2024-257xx/CVE-2024-25705.json) (`2024-04-25T19:15:49.660`)
- [CVE-2024-25706](CVE-2024/CVE-2024-257xx/CVE-2024-25706.json) (`2024-04-25T19:15:49.720`)
- [CVE-2024-25709](CVE-2024/CVE-2024-257xx/CVE-2024-25709.json) (`2024-04-25T19:15:49.777`)
- [CVE-2024-28734](CVE-2024/CVE-2024-287xx/CVE-2024-28734.json) (`2024-04-25T19:15:49.850`)
- [CVE-2024-28735](CVE-2024/CVE-2024-287xx/CVE-2024-28735.json) (`2024-04-25T19:15:49.910`)
- [CVE-2024-28834](CVE-2024/CVE-2024-288xx/CVE-2024-28834.json) (`2024-04-25T18:15:07.903`)
- [CVE-2024-31080](CVE-2024/CVE-2024-310xx/CVE-2024-31080.json) (`2024-04-25T18:15:08.253`)
- [CVE-2024-31081](CVE-2024/CVE-2024-310xx/CVE-2024-31081.json) (`2024-04-25T18:15:08.367`)
- [CVE-2024-31083](CVE-2024/CVE-2024-310xx/CVE-2024-31083.json) (`2024-04-25T18:15:08.470`)
## Download and Usage

View File

@ -237025,7 +237025,7 @@ CVE-2023-5671,0,0,3cc2b9c1deb62dceb8ed00c2d8762fe59a768998f615d5585f03bd3dd8ce13
CVE-2023-5672,0,0,b606b655dc2985c3ef150964e49693e9c24950f987c8d71991ac4c23768844b2,2024-01-04T17:08:45.617000
CVE-2023-5673,0,0,70e5322ee14dd36a1fef1c30959d5e0c92016645b510b75cfd68b74728b861b6,2024-01-04T17:09:37.303000
CVE-2023-5674,0,0,d18ab2900ed7e529311b11ab81d26d18c239ed8c3d95a148f12ff9fdb604f6d6,2024-01-04T18:49:34.613000
CVE-2023-5675,1,1,2afc649da9f718a03c8832aa97b201cab4db6707ad961f549c65ca40d5f0491b,2024-04-25T17:25:05.903000
CVE-2023-5675,0,0,2afc649da9f718a03c8832aa97b201cab4db6707ad961f549c65ca40d5f0491b,2024-04-25T17:25:05.903000
CVE-2023-5676,0,0,c192e1317c9dd9e6e795afdc87fde3c831c86613079a468411f986e2046923eb,2023-11-22T22:39:25.137000
CVE-2023-5677,0,0,bf0403fa11a7a963d15423f4bb38a7680c1d99fd326f3defc8c62611e429b9f6,2024-02-13T00:38:00.893000
CVE-2023-5678,0,0,10ee8f19cb0834ae8a34613205f620c83611435a6974173b992451221b4bf83e,2023-11-30T22:15:09.723000
@ -237035,7 +237035,7 @@ CVE-2023-5681,0,0,c8515c91e7de329908b78ff5da5c4b7570295fc0bfb78f4f5768b1289e9cf5
CVE-2023-5682,0,0,f6333687ab0645a1fd8953eb4ecc238bde4805dd1880c1dd8846d7fce2a7def8,2024-04-11T01:23:04.923000
CVE-2023-5683,0,0,cb0f33b1d08b1ce9cc57c71e5c40d5b9f1d2607c9aa1a5ffa32c5fd0a2a17ee1,2024-04-11T01:23:05.010000
CVE-2023-5684,0,0,880c97a624c250bf87e546dfac2388f6a5459910d66d603bc0971081b810b8e1,2024-04-11T01:23:05.100000
CVE-2023-5685,0,1,c003834f963e781af89ebdad00b9567c0a77e3aa6f42eea0e12da658f72c250c,2024-04-25T16:15:08.777000
CVE-2023-5685,0,0,c003834f963e781af89ebdad00b9567c0a77e3aa6f42eea0e12da658f72c250c,2024-04-25T16:15:08.777000
CVE-2023-5686,0,0,14e9a4f551dedb4d867ff16706440a6a3cb2d418db4a34eccb414d1c48955525,2024-01-21T03:20:51.297000
CVE-2023-5687,0,0,163c067ad4e8b872c5abffc6eb0e33e3ec476cd671e69e540f448f37eb4f9636,2023-10-27T18:51:42.730000
CVE-2023-5688,0,0,06a783b4a174a26699fc289ad2f278ef95fec4ff44eb7fd150fc30bbf083b5a6,2023-10-27T18:51:36
@ -237109,7 +237109,7 @@ CVE-2023-5760,0,0,b26c322f998e6825a09e7c5127ec0e45a89874e1999d9532ece8cb05bf015c
CVE-2023-5761,0,0,2da90484712dc730b83c569fce9e74f344e1096a8227445e34e8b1b3bda148f4,2023-12-12T15:50:05.353000
CVE-2023-5762,0,0,995fc5f6a706edf8dbe1791dcc11a016a4bb9d17014abdfb2902d3f921ab2baa,2023-12-08T15:02:37.390000
CVE-2023-5763,0,0,4ff2accd99d449a0742854b854d08d639fb4972bda32ba25f042cd82d146e614,2023-11-13T19:55:13.637000
CVE-2023-5764,0,1,5f85602bb7701613217a37a59d74c36afc9670c24213af655bc54e0c8dc2d5b4,2024-04-25T16:15:08.903000
CVE-2023-5764,0,0,5f85602bb7701613217a37a59d74c36afc9670c24213af655bc54e0c8dc2d5b4,2024-04-25T16:15:08.903000
CVE-2023-5765,0,0,e9be9ac85c17528e84195bedf3d2830fc278ff555389e845d31a431003373392,2023-11-09T01:26:48.773000
CVE-2023-5766,0,0,78f2d9d8ac7b95b8a4e5dc0e8997029ac798051d62cff83a1d9b45e59b35751f,2023-11-09T01:24:32.057000
CVE-2023-5767,0,0,ad794c53a0f217448e62fe696cd061911833f672e0cea2f495554452a7466841,2023-12-07T17:54:21.037000
@ -237166,7 +237166,7 @@ CVE-2023-5820,0,0,58b1f50113fd55505ed149f5b7bb49dbfd0a0f6f9f535a05335349c658343b
CVE-2023-5821,0,0,cd4303955b9a7b3fe4b37581e654f24a81586d7580cc2ef9208ebb1641da3356,2023-11-07T04:24:27.417000
CVE-2023-5822,0,0,b67ceab18bbb1fb0f9fb81217782253fb2873c03b0c31906a9c6b3b9849c939f,2023-11-29T19:15:14.147000
CVE-2023-5823,0,0,d7f788774a2604af95c673fde3d28e3d353cbc4a5a4bfbe3d382e943ed035843,2023-11-14T16:18:57.250000
CVE-2023-5824,0,1,cdab4b76ac240ba49e3863e4d4f68cbb853364f4a1b487ece0111a5626020c5d,2024-04-25T16:15:09.027000
CVE-2023-5824,0,0,cdab4b76ac240ba49e3863e4d4f68cbb853364f4a1b487ece0111a5626020c5d,2024-04-25T16:15:09.027000
CVE-2023-5825,0,0,0399606a6ebebea85a4c7dc21bd0805603b974624a6b245cb9ef9839d4896e32,2023-11-14T17:00:25.433000
CVE-2023-5826,0,0,dfa886a374966eb99bebb692d38b2d2da634c5e6ea16dec23011361fe53252dc,2024-04-11T01:23:08.860000
CVE-2023-5827,0,0,91233a7921eea4d64db8679e624be8b385b9e9cdbdd67eba5d3fa15262c38b1b,2024-04-11T01:23:08.953000
@ -237628,7 +237628,7 @@ CVE-2023-6352,0,0,a7c9f6deee309d44509b6c9208a201145230316f41723e551e729328a3c70e
CVE-2023-6353,0,0,24c2382fdf0767add5b7141089ec0613fc1eb47c1182ffa2cb7b84f6aeb0444b,2023-12-06T18:18:09.320000
CVE-2023-6354,0,0,2bf459d55b21a066ff498992abe18be99d182acea7ca336905eeed3616a89b88,2023-12-06T18:18:01.950000
CVE-2023-6355,0,0,6fdeecd4f0ee699805371cfc1ea0606b87b44ad25b2626176d3ef32b51ed450e,2024-01-02T15:26:45.317000
CVE-2023-6356,0,1,bde87d9abed8a4bf595c9622ff2deeecfc04a9b4d596b6d93211e8c79cb3a6b5,2024-04-25T16:15:09.513000
CVE-2023-6356,0,0,bde87d9abed8a4bf595c9622ff2deeecfc04a9b4d596b6d93211e8c79cb3a6b5,2024-04-25T16:15:09.513000
CVE-2023-6357,0,0,bbd74398a0b444bacefe820e1535d1409864c58ab45fa3a132d88d21bbd97f01,2023-12-11T20:49:14.117000
CVE-2023-6359,0,0,eec65d1d46b6f4ae76547d3688eca6bb28b35f6576162bb0891e35895c51f4af,2023-11-30T20:36:00.537000
CVE-2023-6360,0,0,9012dbc9de46bbd36921c61a8fd2b617642d26aa0bcbe12d97c341719ee01d79,2023-12-06T00:38:20.297000
@ -237730,7 +237730,7 @@ CVE-2023-6478,0,0,a2204e2f69cdc6c882d51d5123b56b5f88413c8782871b6a0414da718fbf03
CVE-2023-6481,0,0,7bf3f957b787a6827701226e0ca3372c64cd44f2ab0cfcaeb6091c2fdc472edd,2023-12-07T19:57:46.020000
CVE-2023-6482,0,0,4d9c5a1788fe7dfbaf4eca53c69fe7a1ffbc45cd5b295a4cce9c5f95cb7c7755,2024-02-01T04:14:20.480000
CVE-2023-6483,0,0,4d97a6b64ab24b94d49daa44a79554fbeead9ae7d46cd7c731ffa4efefc4885f,2023-12-22T20:23:00.340000
CVE-2023-6484,1,1,70fda0457d3cf00f2d12882d228af9219459c18b0be3209649da6bf3bb62a852,2024-04-25T17:25:05.903000
CVE-2023-6484,0,0,70fda0457d3cf00f2d12882d228af9219459c18b0be3209649da6bf3bb62a852,2024-04-25T17:25:05.903000
CVE-2023-6485,0,0,d84b1f2fa339ee3fbe00211d49269bf9012e27d7ef753ce7f80b70bff072340c,2024-01-08T19:31:52.377000
CVE-2023-6486,0,0,c81210cab8dc9e396502360bc8e7405406f09e8235326da2aa05788514a5507a,2024-04-10T13:24:00.070000
CVE-2023-6488,0,0,a2d2155218f4cd12cbd7cf86a1d373ca9d8739c736f0c67e222296ebea42699d,2023-12-22T19:30:36.993000
@ -237773,12 +237773,12 @@ CVE-2023-6531,0,0,72b65d47f2191f5c2b848fd880cd1cdca9d89e892c5d11530a6913981eda25
CVE-2023-6532,0,0,f738506a21aaa4b97e1d01a3f1b1b963270b7eece9c06e5ade2e7f91cd03ea0f,2024-01-11T20:04:00.773000
CVE-2023-6533,0,0,dcd64452143eb3dc7b1d81d028067d07f5ed73ffb53920de9ac74711589702ac,2024-02-22T19:07:27.197000
CVE-2023-6534,0,0,d1014e93c47cb4df91754765b442aa44e330a073857ff83c407b8638b2e2b237,2024-01-12T14:15:49
CVE-2023-6535,0,1,5da9b8bdeaf50d3c67aabb006b5b9591fa308aa13793c7c151f558b8df852c3a,2024-04-25T16:15:09.970000
CVE-2023-6535,0,0,5da9b8bdeaf50d3c67aabb006b5b9591fa308aa13793c7c151f558b8df852c3a,2024-04-25T16:15:09.970000
CVE-2023-6536,0,0,306d35a4d2e64b27f32ba44d255c645fda283c56655a4025154895afc9a4229d,2024-04-15T14:15:07.447000
CVE-2023-6538,0,0,3a39b4ad035054d825d9bc8e0c8cc78afbd8a886d818da82d3bd686b80edb3a0,2023-12-14T17:02:15.203000
CVE-2023-6540,0,0,e8a4000d3c1c7c36a8e07e1b70f09f28354d68ee96913653b539560cbc6666cf,2024-01-10T20:23:28.493000
CVE-2023-6542,0,0,3003b22c56226936503fcbd3e01db5b83c31e11bacc81c5b330ec2a4d5df4705,2023-12-18T20:00:10.587000
CVE-2023-6544,1,1,0eadf8b680848dcd7ff77536b2c7cd18c9612c5693540daf3e9c0fe2b58589bb,2024-04-25T17:24:59.967000
CVE-2023-6544,0,0,0eadf8b680848dcd7ff77536b2c7cd18c9612c5693540daf3e9c0fe2b58589bb,2024-04-25T17:24:59.967000
CVE-2023-6545,0,0,e8fad407643f309508d7beca42d5ec4316241428ccdf0ffe16ab6d5de81adac9,2024-02-15T11:15:10.127000
CVE-2023-6546,0,0,8a0376636dd2953004c2fc1d2f0124a770d41464e2479ea6b9c7bf8e32b774cc,2024-04-03T00:15:07.823000
CVE-2023-6547,0,0,2916ee27da61a814e8994bd469cb1aad4b6a948d5260e9e94d921cc96ef53cf1,2023-12-14T19:31:10.497000
@ -237825,7 +237825,7 @@ CVE-2023-6592,0,0,64cc414903b2337cb0bd8a5539f823df2fd800285d9deb31df562c295ab75b
CVE-2023-6593,0,0,e3b3e08c9100a5e7cf14c217c401234f02853669dddb630e64650e50aa403cb9,2023-12-15T14:38:03.057000
CVE-2023-6594,0,0,d3868296aafc64b6514f2cb5804c13a0687b79a1bf9d5ede2da8f4a451319021,2024-01-11T23:32:17.207000
CVE-2023-6595,0,0,36c4a8ec5f87bb2afaaafb9bf8ff027d48fb76423d85051bd988412db95a161f,2023-12-19T17:51:54.827000
CVE-2023-6596,1,1,34525b234858a21b8458c73368b56e0305ab54584c7c4568eb20ecffa728db59,2024-04-25T17:24:59.967000
CVE-2023-6596,0,0,34525b234858a21b8458c73368b56e0305ab54584c7c4568eb20ecffa728db59,2024-04-25T17:24:59.967000
CVE-2023-6597,0,0,0ad4260f4e12f5442e67ca98f3e26ae0d54d4cd318021b60e0b78bb11088338f,2024-04-03T15:15:51.783000
CVE-2023-6598,0,0,8b8f7f87f85d85987c85ed76cf906c53121cfbe34e11294d4d2ee1e26a9f8779,2024-01-17T21:24:33.233000
CVE-2023-6599,0,0,a782437846e35b14cfc1bab743463edcd34abeb3c74717f8ec091163e3cb6d86,2023-12-12T17:22:17.503000
@ -237912,7 +237912,7 @@ CVE-2023-6709,0,0,91ad521595673e9f900cc67b519ceef81e072d2cde6bd61134ff43d941e150
CVE-2023-6710,0,0,17eeccecd49bbe640dfb13fe6d0fb81b3a464ea4613067e730e03201a3ec6b86,2024-03-18T22:15:07.537000
CVE-2023-6711,0,0,1272050003612eeabf483df167c872619b5a7a718f82d7efc2ef0df52bffe676,2023-12-28T19:03:00.580000
CVE-2023-6716,0,0,c5de23f942df1b587dad5bba434231319fdb9bc5ad23f5fda3137bdc12dd0a5f,2024-02-09T09:15:07.733000
CVE-2023-6717,1,1,10759856e7a5b7e196b87fe491b866dea0353174d2a321e579a5e4361a4df30e,2024-04-25T17:24:59.967000
CVE-2023-6717,0,0,10759856e7a5b7e196b87fe491b866dea0353174d2a321e579a5e4361a4df30e,2024-04-25T17:24:59.967000
CVE-2023-6718,0,0,800326da020c67b5d16628e725304c35ffe57eb2871b679e54fec620b82938a2,2023-12-18T17:39:26.267000
CVE-2023-6719,0,0,9d5dfad7b583b5ed71fda0877cd09b5d62ce26e2849f2a049357d7ee8d8ecdd4,2023-12-18T17:47:32.683000
CVE-2023-6720,0,0,f92ecd0810e967fb2e290113359252cc0605767095d771035373bf698cc8ef63,2023-12-18T17:45:01.760000
@ -237968,7 +237968,7 @@ CVE-2023-6781,0,0,606133b53d71d301d434687c95e9541c45256035c97457e3cef427e3e2fa86
CVE-2023-6782,0,0,9d49a53aeef1daeb1b880b1c10125bd540373eabc0b6ef10f8f3d1b558ba4034,2024-01-18T16:11:09.587000
CVE-2023-6784,0,0,8a2dc120c2f7c09cd65b30de205a120bba14591ed7954e6b475e7a765c9d6768,2023-12-28T20:16:01.087000
CVE-2023-6785,0,0,6032c6c6494d8ab6426166c8858fe7b4f5d0ea17027dec5e421fd5772b1b9f25,2024-03-13T18:16:18.563000
CVE-2023-6787,1,1,c65105665eaaa00b82a29fe351c93a5103802f058c32e8e730ca7368fbab3721,2024-04-25T17:24:59.967000
CVE-2023-6787,0,0,c65105665eaaa00b82a29fe351c93a5103802f058c32e8e730ca7368fbab3721,2024-04-25T17:24:59.967000
CVE-2023-6788,0,0,50e116b22f39b4eda80be0e0174e50805515a5317ae162b416827d632334043b,2024-01-11T23:33:05.333000
CVE-2023-6789,0,0,58210ee945774473d3672ef0a5317f3e9fd1821a6536ceabc670f03a82b8c1b1,2023-12-18T18:54:39.670000
CVE-2023-6790,0,0,59d4d6839301f4b4ea57b622791c925b2ceacc81b1978d57ea06e29921fd8384,2023-12-18T18:53:56.697000
@ -238311,7 +238311,7 @@ CVE-2023-7188,0,0,fe4d9025095df26d959f210a69a2760922fc73505e5cf1d109482aea8caca3
CVE-2023-7189,0,0,394104872b51d52e5ce0bb342811c2b39833af1574be7a8d59e381bebf6567bd,2024-04-11T01:23:40.690000
CVE-2023-7190,0,0,5c76dd156689a2e2d27938b6355694f91152f571e94286587d1916ae6b86bff9,2024-04-11T01:23:40.777000
CVE-2023-7191,0,0,3e2b5f18b7a3605368089faf4ff0a655a5b20299e41a1b56587fcd587f16bd8e,2024-04-11T01:23:40.893000
CVE-2023-7192,0,1,9048ecb6f580e5c8408fa2e3bdb1db47d0d0e6013dcf9892b4743ddb1e8561ab,2024-04-25T17:15:46.553000
CVE-2023-7192,0,0,9048ecb6f580e5c8408fa2e3bdb1db47d0d0e6013dcf9892b4743ddb1e8561ab,2024-04-25T17:15:46.553000
CVE-2023-7193,0,0,03ba6fbb5e1a4552fc2b6b0fc14931ff65c633a2370d29bddfddb1c21ee90140,2024-04-11T01:23:41.023000
CVE-2023-7194,0,0,c12012004827cd0bc34ce11f51f4d80b4388d10ba3ae2687522e188646b70ac8,2024-01-25T02:02:01.610000
CVE-2023-7198,0,0,5606627204fd1346b6fe26c836439a1783648ce0b7fc4e92446c427eb2e96f6a,2024-02-27T14:20:06.637000
@ -239042,7 +239042,7 @@ CVE-2024-0869,0,0,39eb12d4def5ace38cccd71318a17cc1945f05a59b2d0897303b6745b871b8
CVE-2024-0871,0,0,9f662ac78f6b1a329c54044768cbd47d14bc8d8fd129fd78afaf32634a3ad01c,2024-03-13T18:16:18.563000
CVE-2024-0872,0,0,0924bc55b3c6385ba217ce4e13ea2506dd75654857395c8dd6e4d9ff36d14ecf,2024-04-10T13:24:00.070000
CVE-2024-0873,0,0,ae04380d23748d0f0a688c94a994d5ec2180cdc927be703e44a79b3aa33c7fb2,2024-04-10T13:24:00.070000
CVE-2024-0874,1,1,f02ef6c1d4bafcba7b95ff91c5736ee3f1719d5d1b6b3f6eba65645f7e5d39ca,2024-04-25T17:24:59.967000
CVE-2024-0874,0,0,f02ef6c1d4bafcba7b95ff91c5736ee3f1719d5d1b6b3f6eba65645f7e5d39ca,2024-04-25T17:24:59.967000
CVE-2024-0879,0,0,71dbf86688bbf3d39fdd16f3840204e31946256b985438bb8d263e8d387364ad,2024-01-31T19:16:07.630000
CVE-2024-0880,0,0,12dd80add99b4278efc505ba644272f57307bd9169ca281bf7019fd00c56c698,2024-04-11T01:24:11.007000
CVE-2024-0881,0,0,f5a1e6e9b750ec678efb854ce078d7ad08217191215f6280dc39f8ef88d758b6,2024-04-12T12:44:04.930000
@ -239070,7 +239070,7 @@ CVE-2024-0907,0,0,736d9a373e93547114922fac343df53c487c280e59648bef9a3cecc6379f90
CVE-2024-0909,0,0,7864e9d833556eb295eb67e87cebb39c8d9b11d41ed1f5327a80b30fe013438c,2024-02-08T20:07:51.410000
CVE-2024-0911,0,0,5f8186e1a077698fb2fa1e99d28cc6e32ac8b7b7afb205a3a02bc10c8ca698f0,2024-02-14T18:15:48.077000
CVE-2024-0913,0,0,cc9dbbd0e1eb40baf69d2dc96719798ae1dcba5ab6fc531754d7fd6a8c7e7f1d,2024-03-29T12:45:02.937000
CVE-2024-0914,0,1,7f22c9d9b9fd7b20f24efa4809ae53ac72b9c07a501ffa9df44287c5ae5e04b9,2024-04-25T17:15:47.280000
CVE-2024-0914,0,0,7f22c9d9b9fd7b20f24efa4809ae53ac72b9c07a501ffa9df44287c5ae5e04b9,2024-04-25T17:15:47.280000
CVE-2024-0917,0,0,1096c18fb8e959955c123559a721fd9eb8bfd390fb54eac5e8167e50a31dc158,2024-03-07T15:15:08.257000
CVE-2024-0918,0,0,665fb2ab3d0de8862f8c0f360fe055729484bae6812ecb9bc73647194d5411aa,2024-04-11T01:24:12.193000
CVE-2024-0919,0,0,589179645f375446af0d6856749f5d8581b8fa706e54f9dca7ffc4f53fa26164,2024-04-11T01:24:12.283000
@ -239235,7 +239235,7 @@ CVE-2024-1095,0,0,df3c9b754a366dd4bae7a412155dd92109950a1d3409f2396655e3fd5c46a9
CVE-2024-1096,0,0,0511628751a4d3c33dfebd06790b048648e8a66a1c69f04faa3a9a5040d5bc55,2024-03-21T02:51:34.720000
CVE-2024-1098,0,0,415ccc1f81ef8bc8a03b5ae28bbcf6873771bb680fbb58097e107325c51cced7,2024-04-11T01:24:20.073000
CVE-2024-1099,0,0,b9d17eb989efcb9f86624a5ec60bed0af4b6dc448bf02db321a08bc2b96355af,2024-04-11T01:24:20.157000
CVE-2024-1102,1,1,50296c9908c91c2b4d0df0fdc5a6a983204e3c309c572a536009f9bc8b8f7a0e,2024-04-25T17:24:59.967000
CVE-2024-1102,0,0,50296c9908c91c2b4d0df0fdc5a6a983204e3c309c572a536009f9bc8b8f7a0e,2024-04-25T17:24:59.967000
CVE-2024-1103,0,0,9ae95595599b6db591a9274da0d5a85146610521126dbe5776496052566f38a4,2024-04-11T01:24:20.247000
CVE-2024-1104,0,0,4986f7d9d93ce17dfdb3c18d1dbdea210136d53ee2c0a156b2b261fba310efd6,2024-02-22T19:07:27.197000
CVE-2024-1106,0,0,704e011d119ecc0a0a6c94048139401779c5b0cce30a694f65f63b54706d619d,2024-02-27T14:20:06.637000
@ -239268,7 +239268,7 @@ CVE-2024-1135,0,0,2f6bc90f330f2812b6ceb34e2fa1ad9c1c5eca9415bce0719ca3f92f74cd24
CVE-2024-1136,0,0,609070256c4defa988e1113275bf8273fe15f50574e00ed3dcfde13143e471cc,2024-02-28T14:06:45.783000
CVE-2024-1137,0,0,9f8c1cf74ca4778ab709faeea998997368a7f042480977a7d6535f2dd892d7f7,2024-03-13T12:33:51.697000
CVE-2024-1138,0,0,0bb26866b03e9dd351d8284004467140fe2cfdfbd72af071fda864e5a2dc9e58,2024-03-13T12:33:51.697000
CVE-2024-1139,1,1,fcb53b016a89db0029717168444fac33ac9c8268f043f5b1ef53bbb358230373,2024-04-25T17:24:59.967000
CVE-2024-1139,0,0,fcb53b016a89db0029717168444fac33ac9c8268f043f5b1ef53bbb358230373,2024-04-25T17:24:59.967000
CVE-2024-1140,0,0,113ab98fbbd3f38fc36026b5aef44eb4b38cd7d347ba07fcabb6b9d9a69118a5,2024-02-27T19:17:32.253000
CVE-2024-1141,0,0,2d32c65ed599159df83e8a47a1f55987e8e9877658103a494dc3a1f00162db73,2024-04-01T15:52:06.640000
CVE-2024-1142,0,0,00d2baa79f6b61708bb1dbc0a1a3ef8f1bea10f64fa60e391934eddcb51481c3,2024-03-21T12:58:51.093000
@ -239683,7 +239683,7 @@ CVE-2024-1652,0,0,713b08425ff0d91e3a1f6c5fcc742628e562c3c90970b08c1ec718d504f2db
CVE-2024-1653,0,0,875a0ad46333e774de4f895ea6a9ead74cdbdb6ae6c4ddb02a960bfb85513ae4,2024-02-27T14:19:41.650000
CVE-2024-1654,0,0,ac0509f6deb6f3ed4a3e95d25ed4dd3bdd67f0f87914e461aded05c6f6644ae7,2024-03-14T12:52:09.877000
CVE-2024-1655,0,0,4b77006431ba07ecbc46dae3c8a08b9d1a8f7126e8ade7abcd81e5f88d783104,2024-04-15T13:15:31.997000
CVE-2024-1657,1,1,d79f2f0b3f60eb4c02b99df35a253ec114d3722d77bf73e0ecf5a2388e076951,2024-04-25T17:24:59.967000
CVE-2024-1657,0,0,d79f2f0b3f60eb4c02b99df35a253ec114d3722d77bf73e0ecf5a2388e076951,2024-04-25T17:24:59.967000
CVE-2024-1658,0,0,bd2757c2314dc2f8bd52ce15b18a6ca41069d2e3f9ff401d7a725ad82b1db09d,2024-03-18T19:40:00.173000
CVE-2024-1660,0,0,068c83f9afc694d855bcbb99610bd3ca5f918af7baf81b6ceb2a3be3520f6bf7,2024-04-15T13:15:31.997000
CVE-2024-1661,0,0,45603ab3f5ace946374d33296115c15ac156a13c133622c70b4b519036cfa292,2024-04-11T01:24:28.913000
@ -239732,7 +239732,7 @@ CVE-2024-1720,0,0,5a5ae92be6fac7e3fb5aac9fbad05927fd3add77d067fc4c0b5a11a75c8da7
CVE-2024-1722,0,0,44f76876458eb58496685e90ceedacd781a70fa58f68fffc91c47d3fb5ef0258,2024-02-29T13:49:29.390000
CVE-2024-1723,0,0,6ede5956ec1f8bc932d476f2c9a22da838daca98409da5821be1a9704022149c,2024-03-13T18:15:58.530000
CVE-2024-1725,0,0,d50733b72e0a7510fad89b9c9b7bf0d2638e14767cb02af892440874a7d9300e,2024-04-03T00:15:08.563000
CVE-2024-1726,1,1,89dad850dcc0e1a88340678c957b303bc297c72f3495f60c2d2a69bcbd7f390b,2024-04-25T17:24:59.967000
CVE-2024-1726,0,0,89dad850dcc0e1a88340678c957b303bc297c72f3495f60c2d2a69bcbd7f390b,2024-04-25T17:24:59.967000
CVE-2024-1727,0,0,a7ba950431c841d63e5eda97447121909cf0b94a0e0f2a68d97b3e6ce11f4afe,2024-04-16T12:15:09.843000
CVE-2024-1728,0,0,cc77f96c808327822a9f33d38543fe59887a1a70be257d5713ef1082e9fb55b5,2024-04-10T19:49:51.183000
CVE-2024-1729,0,0,e89faa43e2aac352951c59ebd22691fbb83ea1dce43d3c94d1423497ec4f419a,2024-04-16T12:15:09.930000
@ -241187,7 +241187,7 @@ CVE-2024-22356,0,0,d81d64e63fe9b642cced3e4c94acc5e30f0113b5fdf3bed9ebc6028d04aab
CVE-2024-22357,0,0,7cc996f78175ddc6bc31990b99ad084fcec784716961a600ab611825166f830e,2024-04-12T12:43:57.400000
CVE-2024-22358,0,0,bedc70eb5204faddc4ac58f3a3f1fe91ad78c0a0e3e3e71d749223ef4e09fea5,2024-04-15T13:15:31.997000
CVE-2024-22359,0,0,a78ef4de6d794c3736fa556f8e489df7f77fbc569555c9098f3af17456ad2680,2024-04-15T13:15:31.997000
CVE-2024-2236,0,1,80952342d7ffef3a7dc379705ae844588b9eba4a6660760e9c15f1d1ea642b37,2024-04-25T17:15:49.467000
CVE-2024-2236,0,0,80952342d7ffef3a7dc379705ae844588b9eba4a6660760e9c15f1d1ea642b37,2024-04-25T17:15:49.467000
CVE-2024-22360,0,0,b51802432bc04c6d8daeffb43226824cdd8f27647664bb8d35541e7d6a53f5a2,2024-04-03T17:24:18.150000
CVE-2024-22361,0,0,2cb34447b61b8680c66e6f142987700b31f9f16d4e9b8d748c59e5b8ad5a9a29,2024-02-16T21:35:31.953000
CVE-2024-22362,0,0,4494985f455ed96204ebe979f8c6258ea6c0e638d2824040e5afe72aebdf02d6,2024-04-11T01:24:44.947000
@ -241200,7 +241200,7 @@ CVE-2024-2237,0,0,95217e309830b6a01494ecd2c39d8ef034463910771c1bc92cd3bee697f61f
CVE-2024-22370,0,0,13df6251176042b21f4cc7eccb2248918a53b76e3179e3ca6bd1e1e82fbd0a45,2024-01-12T19:29:18.790000
CVE-2024-22371,0,0,4bde0f360e03417565b1053dc8e4d6f3c0a609d9b4bebdd79ac08f66edab383f,2024-02-26T16:32:25.577000
CVE-2024-22372,0,0,b1b41923d4d5e3a62f9aafb5eb6f291d0486263d2806b04c051fd8c8c54bfad1,2024-01-30T22:17:49.987000
CVE-2024-22373,0,1,d1f4f666dc187ae0b555d619241ab2f3d3391d848ae198bb44bf62de2ef7063b,2024-04-25T17:25:05.903000
CVE-2024-22373,0,0,d1f4f666dc187ae0b555d619241ab2f3d3391d848ae198bb44bf62de2ef7063b,2024-04-25T17:25:05.903000
CVE-2024-2238,0,0,afd0d461b63ffbf0cdec79f63894ae69a7d59a0b22846a34ff25432e2a9728b9,2024-03-13T18:15:58.530000
CVE-2024-22380,0,0,fbb17e03b7392116b029e62cf5fc227ae3083f2acc9171774ca51468933ea1b7,2024-01-30T22:14:24.967000
CVE-2024-22383,0,0,810a6e86f28ef493260b232f9a886a5828bc2cb5687e22ad7a4e8bfc9a3765be,2024-03-05T13:41:01.900000
@ -241208,7 +241208,7 @@ CVE-2024-22386,0,0,9bb868760c88683007f1f54485a980666afe5aeeb8bc008d8d811fea3dbfe
CVE-2024-22388,0,0,da7359316abb172866812a3012c9f9fa4c74a86ab41d23e55880cf90ab42d985,2024-02-14T20:59:09.660000
CVE-2024-22389,0,0,96781b551653662b24bed6c6167841567f0e5e4776b3fb44064036280367773a,2024-02-14T18:04:45.380000
CVE-2024-2239,0,0,39e7f275af33a75dc9ccc5324d6f8398d75467c16638ade753370c3004c45df2,2024-03-13T18:15:58.530000
CVE-2024-22391,0,1,5b72b38a377d92d077458f0f85cda136688026b001632237d550d93caba42343,2024-04-25T17:25:05.903000
CVE-2024-22391,0,0,5b72b38a377d92d077458f0f85cda136688026b001632237d550d93caba42343,2024-04-25T17:25:05.903000
CVE-2024-22393,0,0,baae8029e1587725a02d8ccb1fb298e540bb69b478da7728d31a9731926e8718,2024-02-22T19:07:27.197000
CVE-2024-22394,0,0,fdf2846817bf0321d479c4aa67f29d797db24255733cd4d946cc68e44bfccdc7,2024-02-14T21:46:40.537000
CVE-2024-22395,0,0,6711e106c8c4c38c682ec5a4d729c0e15c9677b5ef0302671313a8f4838fafc1,2024-02-26T13:42:22.567000
@ -242263,7 +242263,7 @@ CVE-2024-2463,0,0,1000d1bb0e067b3946ef610a261a2a460c1b4a25dacc3b01af2944abb9dde9
CVE-2024-2464,0,0,258119b056e9fce5dd31506f1eb25477966980981d44726c57b4011817bcc3d6,2024-03-21T15:24:35.093000
CVE-2024-2465,0,0,8a7263ec4d3d7ab7fb04bd888fa4508d9ece49d5518f3ba48a9225f207c19c22,2024-03-21T15:24:35.093000
CVE-2024-2466,0,0,9b693c57905d5c9df2784625e99d8311f4169bf72ecd0a55d11b3cf49c2f3f64,2024-03-27T12:29:30.307000
CVE-2024-2467,1,1,ac29470c2382b30093397872ff618ca67c4cc38c0d78ff75347f91bb673bc37f,2024-04-25T17:24:59.967000
CVE-2024-2467,0,0,ac29470c2382b30093397872ff618ca67c4cc38c0d78ff75347f91bb673bc37f,2024-04-25T17:24:59.967000
CVE-2024-2468,0,0,acae2326336f2322a6baa0f217a4c4dd168ec20ba1dcea9f5e39d94f312a5562,2024-03-25T01:51:01.223000
CVE-2024-24680,0,0,b7924ab65b210d54927b5f43c8c8edcd2081b2a565260632ae3116c1f0f333c4,2024-04-20T03:15:06.820000
CVE-2024-24681,0,0,09faa6afb97dca8c5a40342ef46ed8da48a59db97ae4367588d4084f35b12a3b,2024-03-28T08:15:26.453000
@ -242771,7 +242771,7 @@ CVE-2024-25559,0,0,b710ef2f87d2510e81b25ebbc4243b848284fc64bfa4b8a44d47d25b0e965
CVE-2024-2556,0,0,5a3397ecc5fdef519ab75d3f33842b25dc006ffb41e1f908e35adb09560e9ffb,2024-04-11T01:25:27.740000
CVE-2024-25567,0,0,bbb8c64eb3dcee3e8e89951734f837d0c3bea66c11459a30529f4c9133593805,2024-03-22T12:45:36.130000
CVE-2024-25568,0,0,64eb53482937f270c14cf377745a1f7d8d5cbc3555eb58e76e7de7c26a9505c7,2024-04-04T12:48:41.700000
CVE-2024-25569,0,1,7e329346c74743fe06c117f53b8fdb008c631202523e222e8c2da738974e94d3,2024-04-25T17:25:05.903000
CVE-2024-25569,0,0,7e329346c74743fe06c117f53b8fdb008c631202523e222e8c2da738974e94d3,2024-04-25T17:25:05.903000
CVE-2024-2557,0,0,a617119e7aec654c68da3fc71fccd99356ed7ca0eba1b1243e2bc71d72e1c32e,2024-04-11T01:25:27.817000
CVE-2024-25572,0,0,6916ce68d4646365d0578802b2b08ffd76a62b8c07df1314570c90fc1d876f93,2024-04-11T12:47:44.137000
CVE-2024-25574,0,0,4bc8d3cd97ad31d3dfd232c462a09dc1924d30756dc7bfcb27690950ff1edfb2,2024-04-02T12:50:42.233000
@ -242813,7 +242813,7 @@ CVE-2024-25619,0,0,4148d7c6b7f88f108c739f8691091e275d5db2676638c192202b001773f23
CVE-2024-2562,0,0,76cb38836dd4db9040793dbc75c2065bb0d9939dc57a1d6dae1f176138006dc6,2024-04-11T01:25:28.190000
CVE-2024-25620,0,0,4dc0e7d0481efa671a76b60244b96320a6f1d8c82285e89393bb5facdd3f14f5,2024-02-15T06:23:39.303000
CVE-2024-25623,0,0,d7097ca06a605433eb8efcfef9343f15725de6d8ed69964da29f4e86bee1b907,2024-02-20T19:50:53.960000
CVE-2024-25624,1,1,27af2648f04e67f34aacbfd50ce5c5d1a651701dae1fed6d021a684275a028dd,2024-04-25T17:24:59.967000
CVE-2024-25624,0,0,27af2648f04e67f34aacbfd50ce5c5d1a651701dae1fed6d021a684275a028dd,2024-04-25T17:24:59.967000
CVE-2024-25625,0,0,aa9fbe54dd7bd2282f80b78321777ab8fac3f81631cae43246d091ee25cf0360,2024-02-20T19:50:53.960000
CVE-2024-25626,0,0,d9f83485f5fb6b4cc55a1d4f971342f8155aa2e72270d86c4d53f59fca85dc97,2024-02-20T19:50:53.960000
CVE-2024-25627,0,0,2bcab79d49f96281ac7197c55bb9f9a5171d7b9aac31488886e6d6a908f6c3e8,2024-02-16T21:39:50.223000
@ -242860,13 +242860,13 @@ CVE-2024-25697,0,0,87f097c1f7ed0e82757d82e95e600dd576ef9cb40b319980c27885e1d41ee
CVE-2024-25698,0,0,687369323a3676b43d9872f13157867194abcaff3ec0cdf77866c10431d641b4,2024-04-19T23:15:10.093000
CVE-2024-25699,0,0,0b51cd5f7cb608299fc6784b7d5d83ebe087ecc52f001d7940916b47a92ea6fe,2024-04-19T23:15:10.163000
CVE-2024-2570,0,0,199a0810957750fcfbf310e1d0f94d86c1b191cc17207657e7505077f649570c,2024-04-11T01:25:28.850000
CVE-2024-25700,0,0,3d94db70fa164c751f6e2475defd42da6dbfc547c79e4c6f5696896567164462,2024-04-04T19:24:50.670000
CVE-2024-25703,0,0,da3733614cb1834b853799f98d1a3c92723ef1c7e2a35fde52a7b8d068d8b937,2024-04-04T19:24:50.670000
CVE-2024-25704,0,0,114594fcf216f4ad1cb9e193c395eaaff638bd00d0aaf049b84a152844cb7be5,2024-04-04T19:24:50.670000
CVE-2024-25705,0,0,34227715cb43f6e3640da9309be016863749bf56287f9ea1ec6440cc52ef53bb,2024-04-04T19:24:50.670000
CVE-2024-25706,0,0,e5e0a0b76629b916f2eea4da7873e240433ae0abb1182c5974860d658c6ec205,2024-04-04T19:24:50.670000
CVE-2024-25700,0,1,7af0107778f703960327721c61c9f88d292d8c7d8136f4aa2adf68e6ecb154dc,2024-04-25T18:15:07.817000
CVE-2024-25703,0,1,c9ba42c9165d3ed0d256a2ca2c76dc0d53caec9ed526f17ff441553f5ef875e5,2024-04-25T19:15:49.520000
CVE-2024-25704,0,1,b31f59b3da36cd1ad4c21679bf4d5448c9ac6d042a5537c086e62b3446556f78,2024-04-25T19:15:49.597000
CVE-2024-25705,0,1,da77fbd71e9cb9b93d31c57182ddbf8287305337f132cbcb286327b5364a7fe3,2024-04-25T19:15:49.660000
CVE-2024-25706,0,1,943a20bd0f8efbd2cfe7b5bcd9e8b908c23b72c243de966b9fdb32cea68fe18b,2024-04-25T19:15:49.720000
CVE-2024-25708,0,0,0bfa26cc48edbaebdb07961ffdc2f6a8ef4ae650648bc898f6a9eb710ca124d4,2024-04-19T23:15:10.237000
CVE-2024-25709,0,0,dba8b4e7b06d8c4e90faaec4cb5d580f8f93a1f5afdcb145881f17c7773cd824,2024-04-19T23:15:10.307000
CVE-2024-25709,0,1,c32a39188765515d0d644e2bbacedfa742d420e65c2db16f3996d6038ac83402,2024-04-25T19:15:49.777000
CVE-2024-2571,0,0,3d67d6a1c9f99bb6624a38a13eb1d666f1012c18415504b92f8b3ceaa94bd45b,2024-04-11T01:25:28.927000
CVE-2024-25710,0,0,ab520189ef240d987a199d6e814c3161f9be705f75e79c9ab42865a168e0f18f,2024-03-07T17:15:12.940000
CVE-2024-25711,0,0,d3f8257017dbfc5bdd6c4e4b8e295b2d28e0327c4086b62797abd4226251f28d,2024-02-27T14:20:06.637000
@ -244315,8 +244315,8 @@ CVE-2024-28237,0,0,e54564ebce9f53fbf47a1a617d4c2539d1d06a16522000543afac14f934cf
CVE-2024-28238,0,0,38219e010007b7fe5426826144cd2eabd2e22d36d31c50aa8471901674b524b3,2024-03-13T12:33:51.697000
CVE-2024-28239,0,0,faccbe471f1ae24e1ff85c8426d7d0f8447bb8e496567a24af19b5962ca5e940,2024-03-13T12:33:51.697000
CVE-2024-2824,0,0,328fa7a1e6a80e6ca42082af4cfcb421fc04b2d053b7da9ed9a17fe14e601656,2024-04-11T01:25:38.183000
CVE-2024-28240,1,1,5389312313d44ebc811e803d5f7e8514a59b26f72ab652d5adae6ff990991df1,2024-04-25T17:24:59.967000
CVE-2024-28241,1,1,020eccadcd5f1029a3f6ba6e9de74874d125183be5078ee4150066646db9c4fe,2024-04-25T17:24:59.967000
CVE-2024-28240,0,0,5389312313d44ebc811e803d5f7e8514a59b26f72ab652d5adae6ff990991df1,2024-04-25T17:24:59.967000
CVE-2024-28241,0,0,020eccadcd5f1029a3f6ba6e9de74874d125183be5078ee4150066646db9c4fe,2024-04-25T17:24:59.967000
CVE-2024-28242,0,0,8ab07e1269ba6fcb3729d56ebd38e0bb27a072562eae3d4f40fee250d49e0664,2024-03-17T22:38:29.433000
CVE-2024-28243,0,0,b62121443f467a21df9a72e6de805a7094f659c79fc9b69ca113c6cd74783b8e,2024-03-26T12:55:05.010000
CVE-2024-28244,0,0,8a0b0822374c9608b1ee3be4ddc31140538b510b0fd28061fd05bdbdf794fae2,2024-03-26T12:55:05.010000
@ -244495,8 +244495,8 @@ CVE-2024-28718,0,0,5f0a839ac4250fecd45af64be191fc810afd4c63b89d4fc0f63a8d6841ad9
CVE-2024-28722,0,0,9f3d9610dcb3a88962a775c4bceb1adf34898d2ad0bcbbf8f024b9f550b378b8,2024-04-22T13:28:43.747000
CVE-2024-2873,0,0,38b44d61d3230fcaba1c551f8073fe8dda4eadd0cd50d8705b668e3c4529f628,2024-03-26T12:55:05.010000
CVE-2024-28732,0,0,ec5e6c9882e97cf45b4c95c1c5ffa7b0d32a1a92ed89d346b2a432d5adcd9a14,2024-04-08T18:48:40.217000
CVE-2024-28734,0,0,f4687488b267ac163f3e0d4b9d3eb38f6f5a041c19b985a560624c627a7f4e16,2024-04-01T21:15:33.200000
CVE-2024-28735,0,0,27a3fb731c930af76bd97477e46fd57873e1d90373135fa3e190a08c95c9db47,2024-04-01T21:15:37.360000
CVE-2024-28734,0,1,ab89139fe8499f37581a857758b5dd911586d271cde02f4e4d8e7c034753a72e,2024-04-25T19:15:49.850000
CVE-2024-28735,0,1,96e109e8715188f76ee57d058460375db0bc7cb9155343dbdf53039c574fd622,2024-04-25T19:15:49.910000
CVE-2024-28741,0,0,ba024af92e852f8cb07287ef01e36bda32f00b417065062fcdaec7d68cbce596,2024-04-08T18:48:40.217000
CVE-2024-28744,0,0,9056a307a9a71984eefaac6c50b454d137864982a45296e74420e75a1c59bcd1,2024-04-08T18:48:40.217000
CVE-2024-28745,0,0,15394cfaddabd1c5537f1c3a0b8bc4d088d58358d421e9d9475a38fad6a5e44f,2024-03-18T12:38:25.490000
@ -244517,7 +244517,7 @@ CVE-2024-28823,0,0,d5aa89b5cdac6c3847ac374cba2a65b191e57c43dc618aabb1da571ab5b5e
CVE-2024-28824,0,0,5a9476ae0fdb0520e3a986c832f5f9e27a50da5cb3aa11e06910544296f0e530,2024-03-22T12:45:36.130000
CVE-2024-28825,0,0,55c040424ce53f1f08bb6f64aa855e81724a1114bed9afdcdd061680c74c099b,2024-04-24T13:39:42.883000
CVE-2024-2883,0,0,e66be81816608580e2e81ffcb02cca4ae9a2aa5cbea60907cc2e1d80cffbaf4a,2024-03-29T04:15:08.743000
CVE-2024-28834,0,0,91386e6fe68de98132419bae7f584fb89f08a35334fda5f1baf244927114cd0b,2024-04-18T05:15:48.167000
CVE-2024-28834,0,1,43f00cbc6e1d7c004d417f596d771ec499a1f9391765678308f80bf7021bddc2,2024-04-25T18:15:07.903000
CVE-2024-28835,0,0,ed179ff9c8ac6c0a49a4fa6aca5aabe007945dc4c4ad20ab7dd2491ca4f02b05,2024-04-18T05:15:48.263000
CVE-2024-28836,0,0,ef9665bb9a0895616f82c07b3b8f93ecbb9dcd318a88906096e3fd29af01d6df,2024-04-03T12:38:04.840000
CVE-2024-28847,0,0,91e84a48bf06058e30212c2ac01ab493cb3959d3b6bfc21c8760687b856baf08,2024-03-17T22:38:29.433000
@ -244655,6 +244655,7 @@ CVE-2024-29046,0,0,934c54a354b7983248c1038ad849bfccbb8c13c9b2573a8e1ac4e386edc36
CVE-2024-29047,0,0,caa5c4d2d0f1bf304a4ee6216a36e2941161e0820c7a8b8276d73d490e44c6f2,2024-04-10T13:24:00.070000
CVE-2024-29048,0,0,95c20ac7de8bc227c17638fc56daca89aa86872041643304379a7c60cc8dac12,2024-04-10T13:24:00.070000
CVE-2024-29049,0,0,98b5dd33fb953ac1a2154bc311144d3dc2c9909067218ab4461517f82cf5b6e3,2024-04-09T17:15:58.440000
CVE-2024-2905,1,1,9435a5b5df71b7d5734b0be3755611f5be0fda4fc626759f28e89823bb5ce3c3,2024-04-25T18:15:08.037000
CVE-2024-29050,0,0,b81f6cf3efac23ad29fb0ec76c4ddabcbf2924e0345ac83e98aface32c2a7152,2024-04-10T13:24:00.070000
CVE-2024-29052,0,0,9420b1ae7e90dd1acfc7cdaac9046557a2de2a3786dd73ca82d15f399613dda9,2024-04-10T13:24:00.070000
CVE-2024-29053,0,0,697fbabaf9facdb0a00abec112c7dd524df1d041a7d2e72ce266e3893d05d84e,2024-04-10T13:24:00.070000
@ -244887,7 +244888,7 @@ CVE-2024-29640,0,0,87923c5f8022466da2d8ef6f4760770a9b5d77108f7ca786dd890e142c1a6
CVE-2024-29644,0,0,39829980cc0c3cec42e83f1a7d1e74f651bed504f90005be4e46042a91527a65,2024-03-26T12:55:05.010000
CVE-2024-29650,0,0,8ad374bfabee755625e57dff59b85656db535734df280985070b11f8f0b8c3b6,2024-03-25T16:43:06.137000
CVE-2024-2966,0,0,474ae2e5b1d6c6447ca9bee38c5e4dafcb7b2c2503070dea1f4351179cfe9798,2024-04-11T12:47:44.137000
CVE-2024-29660,1,1,5cadce48d0d5ee00a49b61fd1e0081663846d39310fbd0877926aeae99bb4e7f,2024-04-25T17:24:59.967000
CVE-2024-29660,0,0,5cadce48d0d5ee00a49b61fd1e0081663846d39310fbd0877926aeae99bb4e7f,2024-04-25T17:24:59.967000
CVE-2024-29661,0,0,0af56c9e6c3f4789c6952b6fc2267b505cb820e8c95b985131711686eeb372e4,2024-04-22T13:28:34.007000
CVE-2024-29666,0,0,a8926fce030310567330d9b7c126003f732556a2ce979a6a3fd232707f8bbd99,2024-03-26T12:55:05.010000
CVE-2024-29667,0,0,1425649af0fe5303ac647a61948436bd641374e6a3c12789edb4485c777699d5,2024-04-01T01:12:59.077000
@ -245580,7 +245581,7 @@ CVE-2024-30884,0,0,f3a012fdbee7dcdfbc54fb994726741009310b51eecb5e393a9f37c21fbc6
CVE-2024-30885,0,0,053b43f723add848d769270cc9eabce98f2bef07551ec399121d9cd8c29459b9,2024-04-11T12:47:44.137000
CVE-2024-30886,0,0,78e1ecd0ca2250189e977131b68a166fe34cee6c425475aee62ecd362250a877,2024-04-24T13:39:42.883000
CVE-2024-3089,0,0,3fabfa41353ef448324a78880efdc147758ef8ec187a9149e265df8463410caf,2024-04-11T01:25:53.493000
CVE-2024-30890,1,1,501d5887b268b52d808df81626bc53713f4cadec32b76ecd6d2f5d22282fde8d,2024-04-25T17:24:59.967000
CVE-2024-30890,0,0,501d5887b268b52d808df81626bc53713f4cadec32b76ecd6d2f5d22282fde8d,2024-04-25T17:24:59.967000
CVE-2024-30891,0,0,eaa8b86280359f3d73f2f1d8a4256591b68799e019aa5c9624f2214d6f01088e,2024-04-05T12:40:52.763000
CVE-2024-3090,0,0,1ed40e7cb1e30a4ce92e2079672b0e468d7f34e176dec853f1d60bd19ebc8837,2024-04-11T01:25:53.580000
CVE-2024-3091,0,0,2ae7c1b43ade453e63e12426e1c2a8ce72ad964ac1b86e004dbb22f9a3bc2a75,2024-04-11T01:25:53.663000
@ -245600,6 +245601,7 @@ CVE-2024-30928,0,0,caf910b47d65799a57161146e34602829f47360642a8c8fe911c2d8ad140d
CVE-2024-30929,0,0,3a4b987ba39620a2fa553421d0680484415e43d1909ca51832f180e76c2d2d0f,2024-04-19T13:10:25.637000
CVE-2024-3093,0,0,32bf1c70eab5da7d509a40d74982ac8945909f57d49846c0cf619694e2add382,2024-04-10T13:23:38.787000
CVE-2024-30938,0,0,bb3c87898373ca38f4e6504fd7f34baf274fe16334abf7626317b091c9072986,2024-04-19T13:10:25.637000
CVE-2024-30939,1,1,3896cec5bfcf879f2ba87214556d281d12e0dcb87609b837870acc446a8df3d4,2024-04-25T19:15:49.970000
CVE-2024-3094,0,0,cba466c06d21b74e1043491724188f63d6d0b9ba1993a884907c833ea9999b43,2024-04-12T07:15:08.740000
CVE-2024-30946,0,0,0dff329aaece035fc82f00595012379643bd5a0edb89ee3a7369d6609e13a4d1,2024-04-02T18:12:16.283000
CVE-2024-30950,0,0,992550aa16b7b69040c27b7eadb42b4babd9ce9c185610db0008bbada9865896,2024-04-17T20:08:21.887000
@ -245650,10 +245652,10 @@ CVE-2024-31064,0,0,f87fea954d6623f92ad98dc571744769b0a41ba2a8ecac509cf34a5bc1aaa
CVE-2024-31065,0,0,36c2c4ddfef551b3df9316a574430562ba7ec0ea51f9e5ecbfa0af993c7946d3,2024-03-28T20:53:20.813000
CVE-2024-31069,0,0,d29f1e01bd410bc9e289e23142033a3c4695bcaf7cee5af8670edc7046e0bf75,2024-04-15T13:15:51.577000
CVE-2024-31077,0,0,cf1dae6bdc673263e7fd88f3fafa76996295a3cc4f001c878e21a09e0714f3a7,2024-04-23T12:52:09.397000
CVE-2024-31080,0,0,629b02d1f8559238cad068acffb68f622aa7e385525cc57d4a06cac698d1aae0,2024-04-24T02:15:45.987000
CVE-2024-31081,0,0,aaae90b3640767676e5e4ba074b3b6ae7552e9f1f8de74b5351b5d6ebc5aa288,2024-04-24T02:15:46.110000
CVE-2024-31080,0,1,5513024a0b3f248fb69c15af5a5e265c6ed8b37e103e0163404d53665b0e4bde,2024-04-25T18:15:08.253000
CVE-2024-31081,0,1,7bd29e5a7580bbe901288959c9a09eca84e7bfa9965dec91b5dd5a43032127ca,2024-04-25T18:15:08.367000
CVE-2024-31082,0,0,5bd47d789b65017aa198a3c2ac34b0aa429ab490a4fcd5200779dbcd7d5b3ef9,2024-04-04T16:33:06.610000
CVE-2024-31083,0,0,6b8fa0ee3f2b9492b7e03ecb2c6e7897f08eca8287d3790467ca98011cdd0b0a,2024-04-24T02:15:46.203000
CVE-2024-31083,0,1,01c531cf6a8b2d6580f2b3a1f4d74508b0cde7e769c1aac3d86ccf7e3a0382b7,2024-04-25T18:15:08.470000
CVE-2024-31084,0,0,7e7f6ad60462c421140a8806edcef098f25e94de0014c2ff06256ca8e21d3894,2024-04-01T01:12:59.077000
CVE-2024-31085,0,0,159d63f28600902a854d5dada2c0b5fba89225c71015785af44f46e211303b47,2024-04-01T01:12:59.077000
CVE-2024-31086,0,0,3a59132be6de96612b5e7dbc7323f59f175814cf3bfa0c8c82639a22898b6c14,2024-04-15T13:15:31.997000
@ -245886,7 +245888,7 @@ CVE-2024-31547,0,0,79c088d9519e1ba5d4decbbdb950409a1ff93781e519e023ecbe916ef398d
CVE-2024-31552,0,0,5a9db2be00e7b7077a4a60e9105689c87f7a53feda5b2567edda13b704df8f81,2024-04-19T18:29:53.040000
CVE-2024-3156,0,0,4f0be00c0207aeed7fb186de5775d865483597f176357d0ad848ff41024a288c,2024-04-19T23:15:11.537000
CVE-2024-3157,0,0,efbf5e20eaa98706deef52c26be2e1cba3d67ed28d54a5b0520df90b69e7c692,2024-04-19T23:15:11.593000
CVE-2024-31574,1,1,9557f9d440c15cad853b3b201ad71c9482a5a0d678031f67eb8305f497f6b516,2024-04-25T17:24:59.967000
CVE-2024-31574,0,0,9557f9d440c15cad853b3b201ad71c9482a5a0d678031f67eb8305f497f6b516,2024-04-25T17:24:59.967000
CVE-2024-31576,0,0,741c8998460302eafaf2dd6cd838e7890c169c726e59c5f45ee51622793abfa6,2024-04-15T16:15:07.270000
CVE-2024-31578,0,0,4c90aef50a02aec622bb8c70d230352c3d3dbfba07e0b0b93d71a37f5c581d6d,2024-04-17T15:31:50.160000
CVE-2024-3158,0,0,10f7ffa67053f9b78f0dc7e48028626f5209dcb47c62106618b35565e7e9d9f6,2024-04-19T23:15:11.643000
@ -245914,7 +245916,7 @@ CVE-2024-3167,0,0,c19ad392a8875e6cb3d8eb9a976aa540fa751cbd03136dde207326521a2375
CVE-2024-31678,0,0,6d17d4ce9eaa15ebb6367a838566d027b53ddba56e09f333fd8cadacfd1d2447,2024-04-12T12:44:04.930000
CVE-2024-31680,0,0,9cd3893ac983fae5e4213584fc439ab2d2b21e3e6bebab8790c0104ed80c76e1,2024-04-17T12:48:07.510000
CVE-2024-31744,0,0,7de9e0ac4d1881e8e6a1c9cabea807c4b59ffea44a7ce9a28f0f69a4b5f1eba8,2024-04-19T16:19:49.043000
CVE-2024-31745,0,1,a3bdd0cf6c191f4f752a70ac6769fb5b2d5c89636eeffe60e00827ad5ab48d32,2024-04-25T16:15:11.227000
CVE-2024-31745,0,0,a3bdd0cf6c191f4f752a70ac6769fb5b2d5c89636eeffe60e00827ad5ab48d32,2024-04-25T16:15:11.227000
CVE-2024-31750,0,0,ef2fe441e5dcedf0cb2da823df8fe57e9b7ada67d4a5ac9a3c649524c0ed2fa2,2024-04-19T13:10:25.637000
CVE-2024-31759,0,0,7081cd22df5b9e4148ecc914176fc1f6cc04366073f8b1e4eccd8dfe4f2b7d73,2024-04-17T12:48:07.510000
CVE-2024-31760,0,0,7b1e0b53a94a63e7f108110799c5f85524efc23136fc5608e680b8482e690959,2024-04-17T12:48:07.510000
@ -246105,7 +246107,7 @@ CVE-2024-32206,0,0,75e2f6344ef11995a7b224164fb98cef520a3da698959b3897e594f3d6e35
CVE-2024-3221,0,0,feefc929b27a3432f5d1352d15fe99f1f6ccd294cecb07c343d15630058ba883,2024-04-11T01:25:56.367000
CVE-2024-3222,0,0,66f6b4b9196c6c0a91ef8acd4cd0373a609da64e89b651a11374a40389e0fbce,2024-04-11T01:25:56.443000
CVE-2024-3223,0,0,9ffc982a7efad24c324809c3c91bef1f04ff8280442a22bc3b8b997888a9a5ba,2024-04-11T01:25:56.520000
CVE-2024-32236,1,1,ba25489404910901f00e1fe403cd34c61ee6685a689103bb387cc7f62005501b,2024-04-25T17:24:59.967000
CVE-2024-32236,0,0,ba25489404910901f00e1fe403cd34c61ee6685a689103bb387cc7f62005501b,2024-04-25T17:24:59.967000
CVE-2024-32238,0,0,0e920ec9ded0c0837401c703af1964a27843eb631a1c2ab20523a0b29f896ad3,2024-04-23T12:52:30.940000
CVE-2024-3224,0,0,c02e228ce7415d482e2413c615262ec703d9597aa6708474ae81bc765129424f,2024-04-11T01:25:56.600000
CVE-2024-3225,0,0,756f5e08f46ab3796e26d62cd11cd06a14dd07d1ee049ee62586436225e04f96,2024-04-11T01:25:56.680000
@ -246159,7 +246161,7 @@ CVE-2024-32343,0,0,862e8e3fbd92547c244c5be90d83e1339d7a18685f98ec207b76da84ef301
CVE-2024-32344,0,0,47eb1a8da70bc975fdd4934340a6940373147153bf19749b3895ed5e2ae65a6e,2024-04-18T13:04:28.900000
CVE-2024-32345,0,0,3c4abcf95580a888529432fa6af7f966006546429f30889ca33584d7f7f45c9a,2024-04-18T13:04:28.900000
CVE-2024-3235,0,0,87b194ac57d76e3164f790cf262b7f15e5577bfab72d12fd067ebb5070eb75e0,2024-04-10T13:23:38.787000
CVE-2024-32358,1,1,cdb61032371c79946b8c7d981792c16ed538eb5f566d174bf95696130a8a1c73,2024-04-25T17:24:59.967000
CVE-2024-32358,0,0,cdb61032371c79946b8c7d981792c16ed538eb5f566d174bf95696130a8a1c73,2024-04-25T17:24:59.967000
CVE-2024-32368,0,0,9c8576a3d1f1b62a70cacd6450f34a9ed8bf7b0c58e8707835f5fedae490db3f,2024-04-22T19:24:12.920000
CVE-2024-32391,0,0,b9d2ada2509e9e002fcf7fc50c30e5fa24f6bd077b7f0fab83dbe519d76755ce,2024-04-22T13:28:50.310000
CVE-2024-32392,0,0,e9dc77721f231608117a79f151c9f1e6be5cd7530989658bd3dd67ce41889ce5,2024-04-22T13:28:50.310000
@ -246208,7 +246210,7 @@ CVE-2024-32461,0,0,3941d8bd271b020582637450c6381a991de4b9ffa39f4db030841834b9e2a
CVE-2024-32462,0,0,f73d0de6041f829663fddce09f88dca46cdcc3d89024cfa5abf2ed880863f550,2024-04-25T06:15:59.887000
CVE-2024-32463,0,0,1671e195c4973ac11a31a2856358d6fb78fc6f39ffe0d1d851cfbba7a397b723,2024-04-17T16:51:07.347000
CVE-2024-32466,0,0,0986c266c64cc5e4b364446dfb796a6c4980d483c5a2beb3f21f15de4cb49c0b,2024-04-18T18:25:55.267000
CVE-2024-32467,1,1,8b7115676ad5530fb305796e715605248ddf0a20f4006b35bdfb1dc5f8a8fb59,2024-04-25T17:24:59.967000
CVE-2024-32467,0,0,8b7115676ad5530fb305796e715605248ddf0a20f4006b35bdfb1dc5f8a8fb59,2024-04-25T17:24:59.967000
CVE-2024-3247,0,0,095afc187e8f976bc1a2eaa79a4c0328aa3c3e2487a10203585d8616775f8a4d,2024-04-03T12:38:04.840000
CVE-2024-32470,0,0,d7909429b510db3e426dc3bd0d7cd9294d139aa1133b013525c796626cb985fe,2024-04-18T18:25:55.267000
CVE-2024-32472,0,0,975c522c6d17c4f52e07ac47d9093d86335976bcc8a63a5556dc578cb868f760,2024-04-18T13:04:28.900000
@ -246220,7 +246222,7 @@ CVE-2024-32478,0,0,767d0906439929f5e4e53d4d2396aabddb8a0de51e7967f13464fca079c70
CVE-2024-32479,0,0,9f233b992ed22cd02276821942e34be3b1cd724f5562f573e840e7a10cf66aba,2024-04-23T12:52:26.253000
CVE-2024-3248,0,0,65f6d4ddfc43ae235edf2e59fc9daa1f1d020439a4fa197a41a6ddd58e106004,2024-04-03T12:38:04.840000
CVE-2024-32480,0,0,f740881091f1f05e0445ba97b5de61d4d063547c57ff7478943e1cd018db3728,2024-04-23T12:52:26.253000
CVE-2024-32481,1,1,a8bfb7bc0fb550f9e44cc492c9444b0f2c5fa44b7b42d1ca20e707b9e15aa980,2024-04-25T17:24:59.967000
CVE-2024-32481,0,0,a8bfb7bc0fb550f9e44cc492c9444b0f2c5fa44b7b42d1ca20e707b9e15aa980,2024-04-25T17:24:59.967000
CVE-2024-32482,0,0,e0309808bf3b2543b39750b9d9b0b794ac723e1476b62ac8f4870801d35fc928,2024-04-24T13:39:42.883000
CVE-2024-32487,0,0,746d95a6c3889a9e0164763739aef81432a5222f159aa33a064a3132dbd4a7ad,2024-04-15T13:15:31.997000
CVE-2024-32488,0,0,6ce6bcee8af0a677e98d2bf7a3efd66cf8a3e580423515387116f39d710ba974,2024-04-15T13:15:31.997000
@ -246335,6 +246337,11 @@ CVE-2024-32632,0,0,363f256990a9e0bbc1d5ebda216d881268683761016a5132b054fbdb44080
CVE-2024-32633,0,0,8ac8ce6a1ac201ef8dc36e7fab192ecb8b1b583d781df940a83a5707e31555c1,2024-04-16T13:24:07.103000
CVE-2024-32634,0,0,399e2bba8e548c1c98770d2f478e96e69a60afbc020788dd69a365e3ae504be6,2024-04-16T13:24:07.103000
CVE-2024-32644,0,0,1c6536d9b118a22e007df0508c4274faf4a9f6bb52ca2e5c9b157aa559740e67,2024-04-19T16:19:49.043000
CVE-2024-32645,1,1,c10fc1828cd41b8d3541bbbed3fa7f79d0dd503cc5f310bceb9a6abc62b53dcb,2024-04-25T18:15:08.593000
CVE-2024-32646,1,1,7465592dd1e44548f173546753838831d7c653e35a72256d503a4bb716beb5b6,2024-04-25T18:15:08.780000
CVE-2024-32647,1,1,b02ccf5e7bf15789453f412d1dff8cd4c4a66a7f81e32b46c9bd1b07e6feb7e4,2024-04-25T18:15:08.963000
CVE-2024-32648,1,1,bf8ff4e762d18423d4730e9a303273e17ff4b747027b7f8295db3609a349f2c5,2024-04-25T18:15:09.157000
CVE-2024-32649,1,1,ef8bb57e43e862c70f928ae64587bffc598ad5cfc8b0e17d0d423dd29700903d,2024-04-25T18:15:09.350000
CVE-2024-32650,0,0,3ec938fa621d2b09851dc7c9c4a0bab9e06500eb12a687bac8f1323156efc6df,2024-04-19T16:19:49.043000
CVE-2024-32652,0,0,507899e8cc0ef719a4df6a408b43b1aeaf42e8d25b41dcf9a35617406adccb9d,2024-04-22T13:28:50.310000
CVE-2024-32653,0,0,96a4de58183f8a4c5475803e77d708dc553ab0aba5c22712929dba4355cb603d,2024-04-23T12:52:26.253000
@ -246478,7 +246485,7 @@ CVE-2024-3356,0,0,087254ad27ba51e796f585bd19b7860bdf92d5d8812be46839c2000c6ff7ec
CVE-2024-3357,0,0,4504c33b3bb653378795a255a83c05295c4cb93d37914e6c8a1edf8397686b85,2024-04-11T01:25:59.530000
CVE-2024-3358,0,0,694a0960c89fb254bc37c7c2f594e5cb197e9c3b955cd9433f44c414aff75d2b,2024-04-11T01:25:59.610000
CVE-2024-3359,0,0,a779b2e33399e3789113d39f065b1425ad824801b217abc54417c2cce7e7d2db,2024-04-11T01:25:59.687000
CVE-2024-33592,0,1,dc3e0d94cd47d0ea73220517b5aaa098a37fe316a3d5e3b0ef33e4a8423b62af,2024-04-25T17:25:05.903000
CVE-2024-33592,0,0,dc3e0d94cd47d0ea73220517b5aaa098a37fe316a3d5e3b0ef33e4a8423b62af,2024-04-25T17:25:05.903000
CVE-2024-3360,0,0,2ffbaa301c04a2d62013f221bb69a21a0f4034a97959f93c6ac130d96a9162d3,2024-04-11T01:25:59.770000
CVE-2024-3361,0,0,c120caf4947180a69c26140d9354a0af916b072bcc15573944dc923bbf223f7d,2024-04-11T01:25:59.847000
CVE-2024-3362,0,0,4f698660b915c64322658e8738d0fb3f09460cf98fd487b3189e8f9d96e2b2c1,2024-04-11T01:25:59.930000
@ -246545,6 +246552,7 @@ CVE-2024-3470,0,0,630f5f35df37b6b978ca7687ce76aaec305cc639bf4ca3fb3b6aed08fe283b
CVE-2024-3491,0,0,22475c1a2c147b599aec5499497f20fc9fa37c1dc206a0659b8807ac37f4f324,2024-04-23T12:52:09.397000
CVE-2024-3493,0,0,63ead7e160b6b2cbd834dd6075f87d345af3361e8d55520f11e81a53e2086aaa,2024-04-16T13:24:07.103000
CVE-2024-3505,0,0,d46d6b7d35449c168e9ff66f3c93f973f2e1e579109b94b88c63ad7baac2b7b8,2024-04-15T13:15:31.997000
CVE-2024-3508,1,1,51729891088a42816c8521723aba1a8231ccab1d41c4122824706cfbeb0b2cec,2024-04-25T18:15:09.567000
CVE-2024-3512,0,0,7186c9ec3829c2082fd68b5fc8e23caed587fdf0f4e68c2974db5f41b90fb514,2024-04-25T13:15:51.663000
CVE-2024-3514,0,0,fd39bbcd0f0890f4d85c4ccfb46694b71dc6efa7f8c56852e1f4fd99d58e20d2,2024-04-24T17:15:47.423000
CVE-2024-3515,0,0,5591c01553945d08e143bb397e7b7011721b53594a14b5bacff6fedc69b36f26,2024-04-19T23:15:11.963000
@ -246595,6 +246603,10 @@ CVE-2024-3618,0,0,4930954b63fbf1867ea6023e0e85abb5ce3c463a36dea55dc99465af5aaf25
CVE-2024-3619,0,0,e46a3b263395cb61cb97e22d10d38e54d57de91c1d7f1832b85e56c338bf09fb,2024-04-11T12:47:44.137000
CVE-2024-3620,0,0,a7eeb1bc049879e174341aab349252fb94be8452f8b1f4ee171cd19f6ef0b10d,2024-04-11T12:47:44.137000
CVE-2024-3621,0,0,84afe5bfc8ac11b311e81571bedd8fcb4ae60929cf687215eae135d692582687,2024-04-11T12:47:44.137000
CVE-2024-3622,1,1,310e8e96b4e0377294ed8424658ec62e1f85161e08d1a4c8176be74bc881671e,2024-04-25T18:15:09.747000
CVE-2024-3623,1,1,defe19a1c1930a83b1939e4122cf12d7e4f9c322e33d040be201f24c6ea908ae,2024-04-25T18:15:09.980000
CVE-2024-3624,1,1,39cf6595062d3109a327ec6291be8c704a5a6313cda6518882b37654a8530d50,2024-04-25T18:15:10.170000
CVE-2024-3625,1,1,a944ebc7bdeed144a0e375f3f32445033c69e44dc0d01adb954342ab95755610,2024-04-25T18:15:10.360000
CVE-2024-3645,0,0,67d98e2e4153ee647deaff1e3df569df07b34dacff73ef5068937bbd33f489da,2024-04-22T19:24:12.920000
CVE-2024-3646,0,0,acb9cfc5d5c2523df1f5225ae5c2cd01f196734634fe01108d948b04f61908e2,2024-04-19T16:19:49.043000
CVE-2024-3652,0,0,a467de8b64f8147acdef48edc35752a89afb7d5856e17302ea9c57335ed0f61c,2024-04-11T12:47:44.137000
@ -246726,7 +246738,7 @@ CVE-2024-3948,0,0,427154a0226db385c08a1dc567a28e238ab290a5825189b73e5e958b25b296
CVE-2024-3979,0,0,9ef752ac5397ef4280bc4d9888fb417cb985331164bf90affafa759f391a2bfe,2024-04-19T18:29:53.040000
CVE-2024-3988,0,0,ed49ad0e503298ba2fe40c90a665a86dcb918b5087ac61c1edfd746c2ca95d24,2024-04-25T13:18:13.537000
CVE-2024-3994,0,0,b2b5b0b0c4c4fea2326dd93e55a0fe437a44bb4fcb47799868e54f8400b49891,2024-04-25T13:18:02.660000
CVE-2024-4006,0,1,c01f76a94a613b3c1164a343531010831608cdd75a6ec28b08e74210a0c91542,2024-04-25T17:25:05.903000
CVE-2024-4006,0,0,c01f76a94a613b3c1164a343531010831608cdd75a6ec28b08e74210a0c91542,2024-04-25T17:25:05.903000
CVE-2024-4014,0,0,321273114f78ac117c4f7a805b62a62926b23a5461c74b2705504b7b2e21d158,2024-04-22T13:28:43.747000
CVE-2024-4017,0,0,9cc899b07e49c20d1d42511c9c41a533c695fd74b1701843b26490566c6e33e3,2024-04-22T13:28:50.310000
CVE-2024-4018,0,0,b534838241485b84911a40a305fab0f06a9a1281f09d3d1140d27d7f52b1a84d,2024-04-22T13:28:50.310000
@ -246734,7 +246746,7 @@ CVE-2024-4019,0,0,4ced7c6540a74633018fd49c35c9e41874265303e22396ab90391c2405ff63
CVE-2024-4020,0,0,fd9bedf3f2e4b41e8bc994bd6387cb7e34a5d92d9443a0588f231180a5be8980,2024-04-22T13:28:43.747000
CVE-2024-4021,0,0,21ca31bf18d88881f7a6cc1002b89ea9bbd51b89715a0adf7c08b2eb5ac210a6,2024-04-22T15:15:47.813000
CVE-2024-4022,0,0,ebd323c8f90bdf29bd6ff35ea1eff449874a3d962dc85b687039f47f7b416e73,2024-04-22T13:28:43.747000
CVE-2024-4024,0,1,2513e42c9761fa628df45a7f36c826de0321b5337fc977a42e2a9577e9688fa4,2024-04-25T17:25:05.903000
CVE-2024-4024,0,0,2513e42c9761fa628df45a7f36c826de0321b5337fc977a42e2a9577e9688fa4,2024-04-25T17:25:05.903000
CVE-2024-4026,0,0,65bff2dba626fde0f88488c1e6df610a37e761e2e041855587a3bbcb3e849c23,2024-04-22T13:28:34.007000
CVE-2024-4031,0,0,4baeaad68cf3411bf45d41e53c64aca0aa19dc8cf620cd2c5028b0d61a50ba2c,2024-04-23T12:52:09.397000
CVE-2024-4035,0,0,c5a100809c68e4eb6a9b717e4eec2ebc0eca46983cf9d752b9f7c4bddb880732,2024-04-25T13:18:02.660000
@ -246780,8 +246792,8 @@ CVE-2024-4167,0,0,5a577704bd944bc61eff52aeb8d2a212dc6f2b5e7c88adbb94b253b080df76
CVE-2024-4168,0,0,219de4336a115a8b080bb6cb3987b54d7220d2e425aebf18b44d58d7069a2e48,2024-04-25T13:18:02.660000
CVE-2024-4169,0,0,e1fee76b748617e9b2c46e38252cc9379fc1a8eaf99f9c6736f3828fad6bc8be,2024-04-25T13:18:02.660000
CVE-2024-4170,0,0,3446fdb4e7ac2944c9d659703371f2768dd383cf2bfb07485f0ab35862c01353,2024-04-25T13:18:02.660000
CVE-2024-4171,0,1,305ee5ec7049b42df7b6e8ac3dd5a88d1ca0546d3129a040355605d5c84f694d,2024-04-25T17:25:05.903000
CVE-2024-4172,0,1,74935923348139a33a5ec86dfba1caf328eac5abe35bcbc7775440df01ee8417,2024-04-25T17:25:05.903000
CVE-2024-4171,0,0,305ee5ec7049b42df7b6e8ac3dd5a88d1ca0546d3129a040355605d5c84f694d,2024-04-25T17:25:05.903000
CVE-2024-4172,0,0,74935923348139a33a5ec86dfba1caf328eac5abe35bcbc7775440df01ee8417,2024-04-25T17:25:05.903000
CVE-2024-4173,0,0,1106ad2058e1f16ad44d21713021236fb96bd635ad795642c968f7eaea81a585,2024-04-25T13:18:13.537000
CVE-2024-4174,0,0,8165b92f84043201b67993ccc68eb94f9c51d9c6b32fc95aff490860d26962cf,2024-04-25T13:18:02.660000
CVE-2024-4175,0,0,17322bbbd4155ded1e9cb395a3c60d3f922650a6043102cb41ba3b81f581a395,2024-04-25T13:18:02.660000

Can't render this file because it is too large.