Auto-Update: 2024-05-06T02:00:30.468329+00:00

This commit is contained in:
cad-safe-bot 2024-05-06 02:03:22 +00:00
parent ad2d9d4676
commit 72ca29ba16
12 changed files with 613 additions and 20 deletions

View File

@ -0,0 +1,24 @@
{
"id": "CVE-2024-34524",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-05-06T00:15:10.073",
"lastModified": "2024-05-06T00:15:10.073",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "In XLANG OpenAgents through fe73ac4, the allowed_file protection mechanism can be bypassed by using an incorrect file extension for the nature of the file content."
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/xlang-ai/OpenAgents/blob/880e26adfe380e999962fc645fc8fc80bd72f103/backend/utils/utils.py#L31",
"source": "cve@mitre.org"
},
{
"url": "https://github.com/xlang-ai/OpenAgents/issues/112",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2024-34525",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-05-06T00:15:10.143",
"lastModified": "2024-05-06T00:15:10.143",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "FileCodeBox 2.0 stores a OneDrive password and AWS key in a cleartext env file."
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/vastsa/FileCodeBox/issues/133",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,24 @@
{
"id": "CVE-2024-34527",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-05-06T00:15:10.207",
"lastModified": "2024-05-06T00:15:10.207",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "spaces_plugin/app.py in SolidUI 0.4.0 has an unnecessary print statement for an OpenAI key. The printed string might be logged."
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/CloudOrc/SolidUI/blob/00d96b53bd0acf082996cef45b0f292eaba22fb7/solidui/spaces_plugin/app.py#L77",
"source": "cve@mitre.org"
},
{
"url": "https://github.com/CloudOrc/SolidUI/issues/279",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,24 @@
{
"id": "CVE-2024-34528",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-05-06T00:15:10.263",
"lastModified": "2024-05-06T00:15:10.263",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "WordOps through 3.20.0 has a wo/cli/plugins/stack_pref.py TOCTOU race condition because the conf_path os.open does not use a mode parameter during file creation."
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/WordOps/WordOps/blob/ecf20192c7853925e2cb3f8c8378cd0d86ca0d62/wo/cli/plugins/stack_pref.py#L77",
"source": "cve@mitre.org"
},
{
"url": "https://github.com/WordOps/WordOps/issues/611",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,24 @@
{
"id": "CVE-2024-34529",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-05-06T00:15:10.320",
"lastModified": "2024-05-06T00:15:10.320",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Nebari through 2024.4.1 prints the temporary Keycloak root password."
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/nebari-dev/nebari/blob/5463e8df9e8d53a266a7b9d3d4e27353ec43c40b/src/_nebari/deploy.py#L71",
"source": "cve@mitre.org"
},
{
"url": "https://github.com/nebari-dev/nebari/issues/2282",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,92 @@
{
"id": "CVE-2024-4507",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-05-06T00:15:10.387",
"lastModified": "2024-05-06T00:15:10.387",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was found in Ruijie RG-UAC up to 20240428 and classified as critical. This issue affects some unknown processing of the file /view/IPV6/ipv6StaticRoute/static_route_add_ipv6.php. The manipulation of the argument text_prefixlen/text_gateway/devname leads to os command injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-263111. NOTE: The vendor was contacted early about this disclosure but did not respond in any way."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW",
"baseScore": 4.7,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.2,
"impactScore": 3.4
}
],
"cvssMetricV2": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:M/C:P/I:P/A:P",
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "MULTIPLE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL",
"baseScore": 5.8
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 6.4,
"impactScore": 6.4,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-78"
}
]
}
],
"references": [
{
"url": "https://github.com/h0e4a0r1t/-2x3J-1rPc-1-0-/blob/main/Ruijie%20RG-UAC%20Unified%20Internet%20Behavior%20Management%20Audit%20System%20Backend%20RCE%20Vulnerability-static_route_add_ipv6.php.pdf",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?ctiid.263111",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?id.263111",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?submit.323817",
"source": "cna@vuldb.com"
}
]
}

View File

@ -0,0 +1,92 @@
{
"id": "CVE-2024-4508",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-05-06T01:15:48.057",
"lastModified": "2024-05-06T01:15:48.057",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was found in Ruijie RG-UAC up to 20240428. It has been classified as critical. Affected is an unknown function of the file /view/IPV6/ipv6StaticRoute/static_route_edit_ipv6.php. The manipulation of the argument oldipmask/oldgateway/olddevname leads to os command injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-263112. NOTE: The vendor was contacted early about this disclosure but did not respond in any way."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW",
"baseScore": 4.7,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.2,
"impactScore": 3.4
}
],
"cvssMetricV2": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:M/C:P/I:P/A:P",
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "MULTIPLE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL",
"baseScore": 5.8
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 6.4,
"impactScore": 6.4,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-78"
}
]
}
],
"references": [
{
"url": "https://github.com/h0e4a0r1t/-2x3J-1rPc-1-0-/blob/main/Ruijie%20RG-UAC%20Unified%20Internet%20Behavior%20Management%20Audit%20System%20Backend%20RCE%20Vulnerability-static_route_edit_ipv6.php.pdf",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?ctiid.263112",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?id.263112",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?submit.323818",
"source": "cna@vuldb.com"
}
]
}

View File

@ -0,0 +1,92 @@
{
"id": "CVE-2024-4509",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-05-06T01:15:48.353",
"lastModified": "2024-05-06T01:15:48.353",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was found in Ruijie RG-UAC up to 20240428. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file /view/IPV6/naborTable/add_commit.php. The manipulation of the argument ip_addr/mac_addr leads to os command injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-263113 was assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW",
"baseScore": 4.7,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.2,
"impactScore": 3.4
}
],
"cvssMetricV2": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:M/C:P/I:P/A:P",
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "MULTIPLE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL",
"baseScore": 5.8
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 6.4,
"impactScore": 6.4,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-78"
}
]
}
],
"references": [
{
"url": "https://github.com/h0e4a0r1t/-2x3J-1rPc-1-0-/blob/main/Ruijie%20RG-UAC%20Unified%20Internet%20Behavior%20Management%20Audit%20System%20Backend%20RCE%20Vulnerability-add_commit.php.pdf",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?ctiid.263113",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?id.263113",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?submit.323819",
"source": "cna@vuldb.com"
}
]
}

View File

@ -0,0 +1,92 @@
{
"id": "CVE-2024-4510",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-05-06T01:15:48.643",
"lastModified": "2024-05-06T01:15:48.643",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was found in Ruijie RG-UAC up to 20240428. It has been rated as critical. Affected by this issue is some unknown functionality of the file /view/networkConfig/ArpTable/arp_add_commit.php. The manipulation of the argument text_ip_addr/text_mac_addr leads to os command injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB-263114 is the identifier assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW",
"baseScore": 4.7,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.2,
"impactScore": 3.4
}
],
"cvssMetricV2": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:M/C:P/I:P/A:P",
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "MULTIPLE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL",
"baseScore": 5.8
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 6.4,
"impactScore": 6.4,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-78"
}
]
}
],
"references": [
{
"url": "https://github.com/h0e4a0r1t/-2x3J-1rPc-1-0-/blob/main/Ruijie%20RG-UAC%20Unified%20Internet%20Behavior%20Management%20Audit%20System%20Backend%20RCE%20Vulnerability-arp_add_commit.php.pdf",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?ctiid.263114",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?id.263114",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?submit.323820",
"source": "cna@vuldb.com"
}
]
}

View File

@ -0,0 +1,96 @@
{
"id": "CVE-2024-4511",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-05-06T01:15:48.940",
"lastModified": "2024-05-06T01:15:48.940",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability classified as critical has been found in Shanghai Sunfull Automation BACnet Server HMI1002-ARM 2.0.4. This affects an unknown part of the component Message Handler. The manipulation leads to buffer overflow. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-263115. NOTE: The vendor was contacted early about this disclosure but did not respond in any way."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
"attackVector": "ADJACENT_NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW",
"baseScore": 6.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 3.4
}
],
"cvssMetricV2": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:A/AC:L/Au:N/C:P/I:P/A:P",
"accessVector": "ADJACENT_NETWORK",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL",
"baseScore": 5.8
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 6.5,
"impactScore": 6.4,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-120"
}
]
}
],
"references": [
{
"url": "https://github.com/isZzzz/HMI1002-ARM-Gateway-Document/blob/main/HMI1002-ARM%20apply.pdf",
"source": "cna@vuldb.com"
},
{
"url": "https://github.com/isZzzz/HMI1002-ARM-Gateway-Document/blob/main/sunfull_bug.pcapng",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?ctiid.263115",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?id.263115",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?submit.323832",
"source": "cna@vuldb.com"
}
]
}

View File

@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update ### Last Repository Update
```plain ```plain
2024-05-05T23:55:30.245075+00:00 2024-05-06T02:00:30.468329+00:00
``` ```
### Most recent CVE Modification Timestamp synchronized with NVD ### Most recent CVE Modification Timestamp synchronized with NVD
```plain ```plain
2024-05-05T23:15:30.673000+00:00 2024-05-06T01:15:48.940000+00:00
``` ```
### Last Data Feed Release ### Last Data Feed Release
@ -27,32 +27,35 @@ Repository synchronizes with the NVD every 2 hours.
Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/releases/latest) Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/releases/latest)
```plain ```plain
2024-05-05T00:00:20.255542+00:00 2024-05-06T00:00:20.275707+00:00
``` ```
### Total Number of included CVEs ### Total Number of included CVEs
```plain ```plain
248635 248645
``` ```
### CVEs added in the last Commit ### CVEs added in the last Commit
Recently added CVEs: `6` Recently added CVEs: `10`
- [CVE-2024-34519](CVE-2024/CVE-2024-345xx/CVE-2024-34519.json) (`2024-05-05T22:15:07.563`) - [CVE-2024-34524](CVE-2024/CVE-2024-345xx/CVE-2024-34524.json) (`2024-05-06T00:15:10.073`)
- [CVE-2024-4502](CVE-2024/CVE-2024-45xx/CVE-2024-4502.json) (`2024-05-05T22:15:07.623`) - [CVE-2024-34525](CVE-2024/CVE-2024-345xx/CVE-2024-34525.json) (`2024-05-06T00:15:10.143`)
- [CVE-2024-4503](CVE-2024/CVE-2024-45xx/CVE-2024-4503.json) (`2024-05-05T22:15:07.927`) - [CVE-2024-34527](CVE-2024/CVE-2024-345xx/CVE-2024-34527.json) (`2024-05-06T00:15:10.207`)
- [CVE-2024-4504](CVE-2024/CVE-2024-45xx/CVE-2024-4504.json) (`2024-05-05T23:15:30.083`) - [CVE-2024-34528](CVE-2024/CVE-2024-345xx/CVE-2024-34528.json) (`2024-05-06T00:15:10.263`)
- [CVE-2024-4505](CVE-2024/CVE-2024-45xx/CVE-2024-4505.json) (`2024-05-05T23:15:30.377`) - [CVE-2024-34529](CVE-2024/CVE-2024-345xx/CVE-2024-34529.json) (`2024-05-06T00:15:10.320`)
- [CVE-2024-4506](CVE-2024/CVE-2024-45xx/CVE-2024-4506.json) (`2024-05-05T23:15:30.673`) - [CVE-2024-4507](CVE-2024/CVE-2024-45xx/CVE-2024-4507.json) (`2024-05-06T00:15:10.387`)
- [CVE-2024-4508](CVE-2024/CVE-2024-45xx/CVE-2024-4508.json) (`2024-05-06T01:15:48.057`)
- [CVE-2024-4509](CVE-2024/CVE-2024-45xx/CVE-2024-4509.json) (`2024-05-06T01:15:48.353`)
- [CVE-2024-4510](CVE-2024/CVE-2024-45xx/CVE-2024-4510.json) (`2024-05-06T01:15:48.643`)
- [CVE-2024-4511](CVE-2024/CVE-2024-45xx/CVE-2024-4511.json) (`2024-05-06T01:15:48.940`)
### CVEs modified in the last Commit ### CVEs modified in the last Commit
Recently modified CVEs: `1` Recently modified CVEs: `0`
- [CVE-2023-52723](CVE-2023/CVE-2023-527xx/CVE-2023-52723.json) (`2024-05-05T22:15:07.487`)
## Download and Usage ## Download and Usage

View File

@ -237539,7 +237539,7 @@ CVE-2023-52716,0,0,fac095701883d01d5f92e56c70701dc066b3ae8f92d0c5921c5cf0aa2fbb0
CVE-2023-52717,0,0,e713315d9fcc50e6cbb98e0dd380e2c86ba52b63a35d352b23f2645ee0f83a24,2024-04-08T18:48:40.217000 CVE-2023-52717,0,0,e713315d9fcc50e6cbb98e0dd380e2c86ba52b63a35d352b23f2645ee0f83a24,2024-04-08T18:48:40.217000
CVE-2023-5272,0,0,e188ff056a72e73c412c109b97d5eb37c41b2dbce71d285e9dfeb205fc3a7064,2024-04-11T01:22:56.733000 CVE-2023-5272,0,0,e188ff056a72e73c412c109b97d5eb37c41b2dbce71d285e9dfeb205fc3a7064,2024-04-11T01:22:56.733000
CVE-2023-52722,0,0,98127abf72f40ccdfd330396916afd82fb054ba100d5c84d9a9427744af0fae8,2024-04-29T12:42:03.667000 CVE-2023-52722,0,0,98127abf72f40ccdfd330396916afd82fb054ba100d5c84d9a9427744af0fae8,2024-04-29T12:42:03.667000
CVE-2023-52723,0,1,583a4c96a7b28499ddb7ff561365e6e19aba033c74ad8d268661d6153971a1dd,2024-05-05T22:15:07.487000 CVE-2023-52723,0,0,583a4c96a7b28499ddb7ff561365e6e19aba033c74ad8d268661d6153971a1dd,2024-05-05T22:15:07.487000
CVE-2023-52724,0,0,e4f95bcab1195f846dc270610c1bdc3ac2e4854ca9278c47b39a202d9f9600b6,2024-04-30T13:11:16.690000 CVE-2023-52724,0,0,e4f95bcab1195f846dc270610c1bdc3ac2e4854ca9278c47b39a202d9f9600b6,2024-04-30T13:11:16.690000
CVE-2023-52725,0,0,88d4f88411bb4be959efdeb51d80e463c208ec56315d110e44fcff8343b01a06,2024-04-30T13:11:16.690000 CVE-2023-52725,0,0,88d4f88411bb4be959efdeb51d80e463c208ec56315d110e44fcff8343b01a06,2024-04-30T13:11:16.690000
CVE-2023-52726,0,0,5e306dbe5f156c9416e227d0fff184c45bfebf2f1e4b91c9c4b65ae3bc844b98,2024-04-30T13:11:16.690000 CVE-2023-52726,0,0,5e306dbe5f156c9416e227d0fff184c45bfebf2f1e4b91c9c4b65ae3bc844b98,2024-04-30T13:11:16.690000
@ -248201,7 +248201,12 @@ CVE-2024-34509,0,0,6bf2150b2596626c514845d30540487bb1d950ccdf706219c76a6afbc5cfd
CVE-2024-34510,0,0,70c105ba345d0fa8609a9db9459099b788908b71b0b900afc0747ce8d55f49a3,2024-05-05T20:15:07.417000 CVE-2024-34510,0,0,70c105ba345d0fa8609a9db9459099b788908b71b0b900afc0747ce8d55f49a3,2024-05-05T20:15:07.417000
CVE-2024-34511,0,0,4e86e2a278a7abc19602c23a8e6582af1482bd970eb4f4e0c89a29dca169ee47,2024-05-05T20:15:07.627000 CVE-2024-34511,0,0,4e86e2a278a7abc19602c23a8e6582af1482bd970eb4f4e0c89a29dca169ee47,2024-05-05T20:15:07.627000
CVE-2024-34515,0,0,3c778723bf571e048a4b56610d5bfcf3e49a1dece61fe69668baa7b58396004a,2024-05-05T21:15:55.650000 CVE-2024-34515,0,0,3c778723bf571e048a4b56610d5bfcf3e49a1dece61fe69668baa7b58396004a,2024-05-05T21:15:55.650000
CVE-2024-34519,1,1,ff08f781b18880538cd447086482a9c2019e6851e3e318f99fcac49c6db575d1,2024-05-05T22:15:07.563000 CVE-2024-34519,0,0,ff08f781b18880538cd447086482a9c2019e6851e3e318f99fcac49c6db575d1,2024-05-05T22:15:07.563000
CVE-2024-34524,1,1,4380f7e0f0bd9f9b63e2f71e6794da210447c38caf2cee08a0e9818cdecb284a,2024-05-06T00:15:10.073000
CVE-2024-34525,1,1,7a2a3960e7fb056dc4ee24385f8da723ad5f4722b55d5d503e20c5e721f029b4,2024-05-06T00:15:10.143000
CVE-2024-34527,1,1,233ce244623e758c8a2a41d86e12ad7b7917f1e61355124595316fba0fb2dff9,2024-05-06T00:15:10.207000
CVE-2024-34528,1,1,85844f4e301aa48e36dac7455ba8ffb633e75b91da27d6c61177d3ddd34fc81a,2024-05-06T00:15:10.263000
CVE-2024-34529,1,1,24813c101f8f4e4784573065570db3ab64ef3a50b95e6e4568340ad437f5f38c,2024-05-06T00:15:10.320000
CVE-2024-3455,0,0,18e948f1ff2182718852b2ba697f0fa9a8598811bb1c2e87509c3bd543b90a57,2024-04-11T01:26:03.233000 CVE-2024-3455,0,0,18e948f1ff2182718852b2ba697f0fa9a8598811bb1c2e87509c3bd543b90a57,2024-04-11T01:26:03.233000
CVE-2024-3456,0,0,944b33373fddc7621692e3fce6708723c7abc962139d88da65ad0c4ce610f104,2024-04-11T01:26:03.310000 CVE-2024-3456,0,0,944b33373fddc7621692e3fce6708723c7abc962139d88da65ad0c4ce610f104,2024-04-11T01:26:03.310000
CVE-2024-3457,0,0,eda30bdfb17395ab91987b75a43f4990cc086dc3cfa77a90fc0cb388efd5e793,2024-04-11T01:26:03.387000 CVE-2024-3457,0,0,eda30bdfb17395ab91987b75a43f4990cc086dc3cfa77a90fc0cb388efd5e793,2024-04-11T01:26:03.387000
@ -248629,8 +248634,13 @@ CVE-2024-4496,0,0,e1fcc45b1034f985f4823efe20fe933874806e2d2221fef290013797f50d09
CVE-2024-4497,0,0,ccd8c07caa7e538c008422f1f8d5b32bba85ed00504a43d05b15927b41ba1488,2024-05-05T07:15:06.463000 CVE-2024-4497,0,0,ccd8c07caa7e538c008422f1f8d5b32bba85ed00504a43d05b15927b41ba1488,2024-05-05T07:15:06.463000
CVE-2024-4500,0,0,ff5efd9f33021e890cd375fe167f7344647ce437a4cb036a2626992a1c802eda,2024-05-05T18:15:27.753000 CVE-2024-4500,0,0,ff5efd9f33021e890cd375fe167f7344647ce437a4cb036a2626992a1c802eda,2024-05-05T18:15:27.753000
CVE-2024-4501,0,0,7d84c8624ffa9e467ffa6080915f7901ab1d1e830d9f877fb7181460457121f5,2024-05-05T20:15:07.923000 CVE-2024-4501,0,0,7d84c8624ffa9e467ffa6080915f7901ab1d1e830d9f877fb7181460457121f5,2024-05-05T20:15:07.923000
CVE-2024-4502,1,1,ce4ff076eb826a8aa73ad98b8d4795ac10b199c57e413ecdab0d4827e4b779f1,2024-05-05T22:15:07.623000 CVE-2024-4502,0,0,ce4ff076eb826a8aa73ad98b8d4795ac10b199c57e413ecdab0d4827e4b779f1,2024-05-05T22:15:07.623000
CVE-2024-4503,1,1,ea57e2e9f66eb184b782d41149d1f80f1c84bb5e1ae57a71494c64f4e742f47e,2024-05-05T22:15:07.927000 CVE-2024-4503,0,0,ea57e2e9f66eb184b782d41149d1f80f1c84bb5e1ae57a71494c64f4e742f47e,2024-05-05T22:15:07.927000
CVE-2024-4504,1,1,24932f91fc45aefa51c7342937d4549ac6f96aee8afc0012b20f7eaec2bd5660,2024-05-05T23:15:30.083000 CVE-2024-4504,0,0,24932f91fc45aefa51c7342937d4549ac6f96aee8afc0012b20f7eaec2bd5660,2024-05-05T23:15:30.083000
CVE-2024-4505,1,1,8fd7784498ae958779a4f7bbbffa4f2fba67e7c4d2b175ce3313d0d38efef96a,2024-05-05T23:15:30.377000 CVE-2024-4505,0,0,8fd7784498ae958779a4f7bbbffa4f2fba67e7c4d2b175ce3313d0d38efef96a,2024-05-05T23:15:30.377000
CVE-2024-4506,1,1,08b373214d4a28df4e063caeee7262d68425f0368b4960fe913f6afb094bc0a8,2024-05-05T23:15:30.673000 CVE-2024-4506,0,0,08b373214d4a28df4e063caeee7262d68425f0368b4960fe913f6afb094bc0a8,2024-05-05T23:15:30.673000
CVE-2024-4507,1,1,234e48b623e7067e4a226d34964b814cf978b5e4b1bbaff4af6974b0e6002fb9,2024-05-06T00:15:10.387000
CVE-2024-4508,1,1,a16352f43bb1c05613e650d355256adce31de71ad69bfdde52fb2f51f53b6702,2024-05-06T01:15:48.057000
CVE-2024-4509,1,1,ac078b9c4d73a8fac444f70d9872c5ac45fcd501a78cc0e4b13317d6a0341cae,2024-05-06T01:15:48.353000
CVE-2024-4510,1,1,181227f06a102aa0a19b4f3de8426a191fa4d65b15ad5d5e90ba15cdbab92f1e,2024-05-06T01:15:48.643000
CVE-2024-4511,1,1,1f4b35a0d5ce5c5f15b32a51c1d626c5577abf1a3c35a116f1a7ba7cc5725841,2024-05-06T01:15:48.940000

Can't render this file because it is too large.