Auto-Update: 2024-04-22T23:55:30.121853+00:00

This commit is contained in:
cad-safe-bot 2024-04-22 23:58:21 +00:00
parent d31b157c37
commit 7a24c956fb
12 changed files with 625 additions and 31 deletions

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2024-31036",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-04-22T22:15:07.400",
"lastModified": "2024-04-22T22:15:07.400",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "A heap-buffer-overflow vulnerability in the read_byte function in NanoMQ v.0.21.7 allows attackers to cause a denial of service via transmission of crafted hexstreams."
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/nanomq/nanomq/issues/1722",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,59 @@
{
"id": "CVE-2024-3177",
"sourceIdentifier": "jordan@liggitt.net",
"published": "2024-04-22T23:15:51.180",
"lastModified": "2024-04-22T23:15:51.180",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "A security issue was discovered in Kubernetes where users may be able to launch containers that bypass the mountable secrets policy enforced by the ServiceAccount admission plugin when using containers, init containers, and ephemeral containers with the envFrom field populated. The policy ensures pods running with a service account may only reference secrets specified in the service account\u2019s secrets field. Kubernetes clusters are only affected if the ServiceAccount admission plugin and the kubernetes.io/enforce-mountable-secrets annotation are used together with containers, init containers, and ephemeral containers with the envFrom field populated.\n\n"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "jordan@liggitt.net",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 2.7,
"baseSeverity": "LOW"
},
"exploitabilityScore": 1.2,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "jordan@liggitt.net",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-20"
}
]
}
],
"references": [
{
"url": "https://github.com/kubernetes/kubernetes/issues/124336",
"source": "jordan@liggitt.net"
},
{
"url": "https://groups.google.com/g/kubernetes-security-announce/c/JxjHf7fkVd8/m/oVCzypyOAQAJ",
"source": "jordan@liggitt.net"
}
]
}

View File

@ -0,0 +1,67 @@
{
"id": "CVE-2024-32459",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-04-22T22:15:07.463",
"lastModified": "2024-04-22T22:15:07.463",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "FreeRDP is a free implementation of the Remote Desktop Protocol. FreeRDP based clients and servers that use a version of FreeRDP prior to 3.5.0 or 2.11.6 are vulnerable to out-of-bounds read. Versions 3.5.0 and 2.11.6 patch the issue. No known workarounds are available."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-125"
}
]
}
],
"references": [
{
"url": "https://github.com/FreeRDP/FreeRDP/pull/10077",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/FreeRDP/FreeRDP/releases/tag/2.11.6",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/FreeRDP/FreeRDP/releases/tag/3.5.0",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-cp4q-p737-rmw9",
"source": "security-advisories@github.com"
}
]
}

View File

@ -0,0 +1,67 @@
{
"id": "CVE-2024-32460",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-04-22T22:15:07.647",
"lastModified": "2024-04-22T22:15:07.647",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "FreeRDP is a free implementation of the Remote Desktop Protocol. FreeRDP based based clients using `/bpp:32` legacy `GDI` drawing path with a version of FreeRDP prior to 3.5.0 or 2.11.6 are vulnerable to out-of-bounds read. Versions 3.5.0 and 2.11.6 patch the issue. As a workaround, use modern drawing paths (e.g. `/rfx` or `/gfx` options). The workaround requires server side support."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.1,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.2,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-125"
}
]
}
],
"references": [
{
"url": "https://github.com/FreeRDP/FreeRDP/pull/10077",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/FreeRDP/FreeRDP/releases/tag/2.11.6",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/FreeRDP/FreeRDP/releases/tag/3.5.0",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-4rr8-gr65-vqrr",
"source": "security-advisories@github.com"
}
]
}

View File

@ -0,0 +1,63 @@
{
"id": "CVE-2024-32461",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-04-22T22:15:07.840",
"lastModified": "2024-04-22T22:15:07.840",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "LibreNMS is an open-source, PHP/MySQL/SNMP-based network monitoring system. A SQL injection vulnerability in POST /search/search=packages in LibreNMS prior to version 24.4.0 allows a user with global read privileges to execute SQL commands via the package parameter. With this vulnerability, an attacker can exploit a SQL injection time based vulnerability to extract all data from the database, such as administrator credentials. Version 24.4.0 contains a patch for the vulnerability.\n"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 7.1,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 4.2
}
]
},
"weaknesses": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"references": [
{
"url": "https://doc.clickup.com/9013166444/p/h/8ckm0bc-53/16811991bb5fff6",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/librenms/librenms/commit/d29201fce134347f891102699fbde7070debee33",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/librenms/librenms/security/advisories/GHSA-cwx6-cx7x-4q34",
"source": "security-advisories@github.com"
}
]
}

View File

@ -0,0 +1,63 @@
{
"id": "CVE-2024-32479",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-04-22T22:15:08.027",
"lastModified": "2024-04-22T22:15:08.027",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "LibreNMS is an open-source, PHP/MySQL/SNMP-based network monitoring system. Prior to version 24.4.0, there is improper sanitization on the `Service` template name, which can lead to stored Cross-site Scripting. Version 24.4.0 fixes this vulnerability."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.1,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.2,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://github.com/librenms/librenms/blob/a61c11db7e8ef6a437ab55741658be2be7d14d34/app/Http/Controllers/ServiceTemplateController.php#L67C23-L67C23",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/librenms/librenms/commit/19344f0584d4d6d4526fdf331adc60530e3f685b",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/librenms/librenms/security/advisories/GHSA-72m9-7c8x-pmmw",
"source": "security-advisories@github.com"
}
]
}

View File

@ -0,0 +1,59 @@
{
"id": "CVE-2024-32480",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-04-22T23:15:50.440",
"lastModified": "2024-04-22T23:15:50.440",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "LibreNMS is an open-source, PHP/MySQL/SNMP-based network monitoring system. Versions prior to 24.4.0 are vulnerable to SQL injection. The `order` parameter is obtained from `$request`. After performing a string check, the value is directly incorporated into an SQL statement and concatenated, resulting in a SQL injection vulnerability. An attacker may extract a whole database this way. Version 24.4.0 fixes the issue."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.2,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.2,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"references": [
{
"url": "https://github.com/librenms/librenms/commit/83fe4b10c440d69a47fe2f8616e290ba2bd3a27c",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/librenms/librenms/security/advisories/GHSA-jh57-j3vq-h438",
"source": "security-advisories@github.com"
}
]
}

View File

@ -0,0 +1,63 @@
{
"id": "CVE-2024-32653",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-04-22T23:15:50.630",
"lastModified": "2024-04-22T23:15:50.630",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "jadx is a Dex to Java decompiler. Prior to version 1.5.0, the package name is not filtered before concatenation. This can be exploited to inject arbitrary code into the package name. The vulnerability allows an attacker to execute commands with shell privileges. Version 1.5.0 contains a patch for the vulnerability."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "HIGH",
"baseScore": 6.1,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.3,
"impactScore": 4.7
}
]
},
"weaknesses": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-20"
}
]
}
],
"references": [
{
"url": "https://github.com/skylot/jadx/blob/9114821fb12558874e01421bf38b0d34fb39df72/jadx-gui/src/main/java/jadx/gui/device/protocol/ADBDevice.java#L108-L109",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/skylot/jadx/releases/tag/v1.5.0",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/skylot/jadx/security/advisories/GHSA-3pp3-hg2q-9gpm",
"source": "security-advisories@github.com"
}
]
}

View File

@ -0,0 +1,59 @@
{
"id": "CVE-2024-32656",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-04-22T23:15:50.817",
"lastModified": "2024-04-22T23:15:50.817",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Ant Media Server is live streaming engine software. A local privilege escalation vulnerability in present in versions 2.6.0 through 2.8.2 allows any unprivileged operating system user account to escalate privileges to the root user account on the system. This vulnerability arises from Ant Media Server running with Java Management Extensions (JMX) enabled and authentication disabled on localhost on port 5599/TCP. This vulnerability is nearly identical to the local privilege escalation vulnerability CVE-2023-26269 identified in Apache James. Any unprivileged operating system user can connect to the JMX service running on port 5599/TCP on localhost and leverage the MLet Bean within JMX to load a remote MBean from an attacker-controlled server. This allows an attacker to execute arbitrary code within the Java process run by Ant Media Server and execute code within the context of the `antmedia` service account on the system. Version 2.9.0 contains a patch for the issue. As a workaround, one may remove certain parameters from the `antmedia.service` file."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-862"
}
]
}
],
"references": [
{
"url": "https://github.com/ant-media/Ant-Media-Server/commit/9cb38500729e0ff302da0290b9cfe1ec4dd6c764",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/ant-media/Ant-Media-Server/security/advisories/GHSA-qwhw-hh9j-54f5",
"source": "security-advisories@github.com"
}
]
}

View File

@ -0,0 +1,67 @@
{
"id": "CVE-2024-32657",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-04-22T23:15:50.997",
"lastModified": "2024-04-22T23:15:50.997",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Hydra is a Continuous Integration service for Nix based projects. Attackers can execute arbitrary code in the browser context of Hydra and execute authenticated HTTP requests. The abused feature allows Nix builds to specify files that Hydra serves to clients. One use of this functionality is serving NixOS `.iso` files. The issue is only with html files served by Hydra. The issue has been patched on https://hydra.nixos.org around 2024-04-21 14:30 UTC. The nixpkgs package were fixed in unstable and 23.11. Users with custom Hydra packages can apply the fix commit to their local installations. The vulnerability is only triggered when opening HTML build artifacts, so not opening them until the vulnerability is fixed works around the issue."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 4.6,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.1,
"impactScore": 2.5
}
]
},
"weaknesses": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://github.com/NixOS/hydra/commit/b72528be5074f3e62e9ae2c2ae8ef9c07a0b4dd3",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/NixOS/hydra/security/advisories/GHSA-2p75-6g9f-pqgx",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/NixOS/nixpkgs/pull/306017",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/NixOS/nixpkgs/pull/306018",
"source": "security-advisories@github.com"
}
]
}

View File

@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update ### Last Repository Update
```plain ```plain
2024-04-22T22:00:38.169474+00:00 2024-04-22T23:55:30.121853+00:00
``` ```
### Most recent CVE Modification Timestamp synchronized with NVD ### Most recent CVE Modification Timestamp synchronized with NVD
```plain ```plain
2024-04-22T21:15:49.890000+00:00 2024-04-22T23:15:51.180000+00:00
``` ```
### Last Data Feed Release ### Last Data Feed Release
@ -33,32 +33,29 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
### Total Number of included CVEs ### Total Number of included CVEs
```plain ```plain
246509 246519
``` ```
### CVEs added in the last Commit ### CVEs added in the last Commit
Recently added CVEs: `12` Recently added CVEs: `10`
- [CVE-2024-27574](CVE-2024/CVE-2024-275xx/CVE-2024-27574.json) (`2024-04-22T21:15:48.987`) - [CVE-2024-31036](CVE-2024/CVE-2024-310xx/CVE-2024-31036.json) (`2024-04-22T22:15:07.400`)
- [CVE-2024-29368](CVE-2024/CVE-2024-293xx/CVE-2024-29368.json) (`2024-04-22T21:15:49.043`) - [CVE-2024-3177](CVE-2024/CVE-2024-31xx/CVE-2024-3177.json) (`2024-04-22T23:15:51.180`)
- [CVE-2024-32039](CVE-2024/CVE-2024-320xx/CVE-2024-32039.json) (`2024-04-22T21:15:49.090`) - [CVE-2024-32459](CVE-2024/CVE-2024-324xx/CVE-2024-32459.json) (`2024-04-22T22:15:07.463`)
- [CVE-2024-32040](CVE-2024/CVE-2024-320xx/CVE-2024-32040.json) (`2024-04-22T21:15:49.290`) - [CVE-2024-32460](CVE-2024/CVE-2024-324xx/CVE-2024-32460.json) (`2024-04-22T22:15:07.647`)
- [CVE-2024-32041](CVE-2024/CVE-2024-320xx/CVE-2024-32041.json) (`2024-04-22T21:15:49.477`) - [CVE-2024-32461](CVE-2024/CVE-2024-324xx/CVE-2024-32461.json) (`2024-04-22T22:15:07.840`)
- [CVE-2024-32205](CVE-2024/CVE-2024-322xx/CVE-2024-32205.json) (`2024-04-22T20:15:07.210`) - [CVE-2024-32479](CVE-2024/CVE-2024-324xx/CVE-2024-32479.json) (`2024-04-22T22:15:08.027`)
- [CVE-2024-32238](CVE-2024/CVE-2024-322xx/CVE-2024-32238.json) (`2024-04-22T20:15:07.630`) - [CVE-2024-32480](CVE-2024/CVE-2024-324xx/CVE-2024-32480.json) (`2024-04-22T23:15:50.440`)
- [CVE-2024-32394](CVE-2024/CVE-2024-323xx/CVE-2024-32394.json) (`2024-04-22T21:15:49.657`) - [CVE-2024-32653](CVE-2024/CVE-2024-326xx/CVE-2024-32653.json) (`2024-04-22T23:15:50.630`)
- [CVE-2024-32399](CVE-2024/CVE-2024-323xx/CVE-2024-32399.json) (`2024-04-22T20:15:07.683`) - [CVE-2024-32656](CVE-2024/CVE-2024-326xx/CVE-2024-32656.json) (`2024-04-22T23:15:50.817`)
- [CVE-2024-32405](CVE-2024/CVE-2024-324xx/CVE-2024-32405.json) (`2024-04-22T20:15:07.737`) - [CVE-2024-32657](CVE-2024/CVE-2024-326xx/CVE-2024-32657.json) (`2024-04-22T23:15:50.997`)
- [CVE-2024-32458](CVE-2024/CVE-2024-324xx/CVE-2024-32458.json) (`2024-04-22T21:15:49.707`)
- [CVE-2024-4040](CVE-2024/CVE-2024-40xx/CVE-2024-4040.json) (`2024-04-22T20:15:07.803`)
### CVEs modified in the last Commit ### CVEs modified in the last Commit
Recently modified CVEs: `1` Recently modified CVEs: `0`
- [CVE-2023-33584](CVE-2023/CVE-2023-335xx/CVE-2023-33584.json) (`2024-04-22T21:15:48.840`)
## Download and Usage ## Download and Usage

View File

@ -224152,7 +224152,7 @@ CVE-2023-3357,0,0,1795badf23992d8257da46aa6b4ec132f0faaa631a40ad67acb153f32fe5ca
CVE-2023-33570,0,0,5a655025878152989d89e7771b68efea923e0d3eca9c90a19bb9fdc08bd526d5,2023-07-10T15:53:05.990000 CVE-2023-33570,0,0,5a655025878152989d89e7771b68efea923e0d3eca9c90a19bb9fdc08bd526d5,2023-07-10T15:53:05.990000
CVE-2023-3358,0,0,093e146a7884d354b9d04cd43dba68f208f197108b7b60132eae24a4d2e990b8,2023-07-06T16:54:55.357000 CVE-2023-3358,0,0,093e146a7884d354b9d04cd43dba68f208f197108b7b60132eae24a4d2e990b8,2023-07-06T16:54:55.357000
CVE-2023-33580,0,0,aac5173e711c5ded624aefba67c8cc86c5aa0ef6f247bc09d960627fa3791074,2024-04-10T15:16:03.813000 CVE-2023-33580,0,0,aac5173e711c5ded624aefba67c8cc86c5aa0ef6f247bc09d960627fa3791074,2024-04-10T15:16:03.813000
CVE-2023-33584,0,1,24f51329ef11580201006296cacbc329505b4a0223919af3f13f93257cc18209,2024-04-22T21:15:48.840000 CVE-2023-33584,0,0,24f51329ef11580201006296cacbc329505b4a0223919af3f13f93257cc18209,2024-04-22T21:15:48.840000
CVE-2023-3359,0,0,2cd549ba11ae617185e8de20761c8b96b06be0c910e70528783fb5d477433fd0,2023-07-06T16:56:35.407000 CVE-2023-3359,0,0,2cd549ba11ae617185e8de20761c8b96b06be0c910e70528783fb5d477433fd0,2023-07-06T16:56:35.407000
CVE-2023-33591,0,0,8ef510bd4b46492f800a4fd2dd0839dc6960fd9dafb4be5e2b45b5aa463fa7ca,2023-06-28T15:47:35.893000 CVE-2023-33591,0,0,8ef510bd4b46492f800a4fd2dd0839dc6960fd9dafb4be5e2b45b5aa463fa7ca,2023-06-28T15:47:35.893000
CVE-2023-33592,0,0,e6f6dffc3bf9dee8a9fcae159522b0cdc35bc154e68c5baea705bdddccb63e44,2023-09-25T16:46:20.430000 CVE-2023-33592,0,0,e6f6dffc3bf9dee8a9fcae159522b0cdc35bc154e68c5baea705bdddccb63e44,2023-09-25T16:46:20.430000
@ -243890,7 +243890,7 @@ CVE-2024-27569,0,0,000ff88e8ff4678a3790d0ee96674581a9a53afd1b5f0d49033b717c5dd65
CVE-2024-27570,0,0,30e1bdadd931878127199d0565523cd94923921178695ba62d569ae38e48386b,2024-03-01T15:23:36.177000 CVE-2024-27570,0,0,30e1bdadd931878127199d0565523cd94923921178695ba62d569ae38e48386b,2024-03-01T15:23:36.177000
CVE-2024-27571,0,0,2fcce61cb867ec2a650e4bd74e7018e990625a473882c12953648f5c8c2545b3,2024-03-01T15:23:36.177000 CVE-2024-27571,0,0,2fcce61cb867ec2a650e4bd74e7018e990625a473882c12953648f5c8c2545b3,2024-03-01T15:23:36.177000
CVE-2024-27572,0,0,6169a6a6221da5c6dbb1556f7b45e6b45c4deebae5e21607b1e3cfa478f1fe5b,2024-03-01T15:23:36.177000 CVE-2024-27572,0,0,6169a6a6221da5c6dbb1556f7b45e6b45c4deebae5e21607b1e3cfa478f1fe5b,2024-03-01T15:23:36.177000
CVE-2024-27574,1,1,bcc5eeca8a1b5f671cf3af5d812b47b420b66573be9babdf35ec56e12529b804,2024-04-22T21:15:48.987000 CVE-2024-27574,0,0,bcc5eeca8a1b5f671cf3af5d812b47b420b66573be9babdf35ec56e12529b804,2024-04-22T21:15:48.987000
CVE-2024-27575,0,0,fe78cdbfc48ba2557faf61957a122c11738e27bfad3d91860b0cc50d57150a36,2024-04-07T04:15:07.723000 CVE-2024-27575,0,0,fe78cdbfc48ba2557faf61957a122c11738e27bfad3d91860b0cc50d57150a36,2024-04-07T04:15:07.723000
CVE-2024-2758,0,0,a3cb437eedb439caebfac4666310f05bccf69de779d818f9f315740c92bee7d8,2024-04-04T12:48:41.700000 CVE-2024-2758,0,0,a3cb437eedb439caebfac4666310f05bccf69de779d818f9f315740c92bee7d8,2024-04-04T12:48:41.700000
CVE-2024-2759,0,0,cb410b99122b16bbafd55e196fc83701c95bae09fba9353767401f5fe587c56c,2024-04-04T16:33:06.610000 CVE-2024-2759,0,0,cb410b99122b16bbafd55e196fc83701c95bae09fba9353767401f5fe587c56c,2024-04-04T16:33:06.610000
@ -244714,7 +244714,7 @@ CVE-2024-2934,0,0,0a91524619de13afaff0e82d7a21ecc81f28b80f897e74dbcf5f2c4795f84a
CVE-2024-2935,0,0,03b2e13118238c25a371886663ff5ca99f3babe087c5e23aed7873fb02fb806f,2024-04-11T01:25:41.850000 CVE-2024-2935,0,0,03b2e13118238c25a371886663ff5ca99f3babe087c5e23aed7873fb02fb806f,2024-04-11T01:25:41.850000
CVE-2024-2936,0,0,939d0b63a99773a9af28992aa96fda3d6af92afdee01445b26fbf5b1e7eb245c,2024-03-29T12:45:02.937000 CVE-2024-2936,0,0,939d0b63a99773a9af28992aa96fda3d6af92afdee01445b26fbf5b1e7eb245c,2024-03-29T12:45:02.937000
CVE-2024-29366,0,0,7401048215b84763b7b2374bbab17e21709c21accf205850b7210511d30d6293,2024-03-22T19:02:10.300000 CVE-2024-29366,0,0,7401048215b84763b7b2374bbab17e21709c21accf205850b7210511d30d6293,2024-03-22T19:02:10.300000
CVE-2024-29368,1,1,b2fb1a5d45a101f827338a5ca2925b1e6be000e87c6951b2c0bef7990fa345fc,2024-04-22T21:15:49.043000 CVE-2024-29368,0,0,b2fb1a5d45a101f827338a5ca2925b1e6be000e87c6951b2c0bef7990fa345fc,2024-04-22T21:15:49.043000
CVE-2024-29374,0,0,dd275404ab360479a756d96aca2b6517b11bd3239b0ee4b1b68a18e9bbec3822,2024-03-21T19:47:03.943000 CVE-2024-29374,0,0,dd275404ab360479a756d96aca2b6517b11bd3239b0ee4b1b68a18e9bbec3822,2024-03-21T19:47:03.943000
CVE-2024-29375,0,0,61c42a83ac8fdf63093e9fa8c57bcfe142ca6a7e368bf61cc8c311f84268ba4d,2024-04-04T12:48:41.700000 CVE-2024-29375,0,0,61c42a83ac8fdf63093e9fa8c57bcfe142ca6a7e368bf61cc8c311f84268ba4d,2024-04-04T12:48:41.700000
CVE-2024-29376,0,0,396d2086661367bf2f120a5a23cedf0a6063f8b47eb6959047bd018cf7f6b2b3,2024-04-22T19:24:06.727000 CVE-2024-29376,0,0,396d2086661367bf2f120a5a23cedf0a6063f8b47eb6959047bd018cf7f6b2b3,2024-04-22T19:24:06.727000
@ -245534,6 +245534,7 @@ CVE-2024-31025,0,0,049c3aee715c9c75f255eea2ba7d71aee620ad97e93ef3b0e0a948ae51dd0
CVE-2024-31031,0,0,29fa87d48aad0a0bc20057b1b9ecb42c0a06bf12b16eb69819fa3b6a4f2669e1,2024-04-17T20:08:21.887000 CVE-2024-31031,0,0,29fa87d48aad0a0bc20057b1b9ecb42c0a06bf12b16eb69819fa3b6a4f2669e1,2024-04-17T20:08:21.887000
CVE-2024-31032,0,0,71dbb2a787f73b1914bf5d51e1b83b5365eb112b3ab9ed4df5d1066682b5223b,2024-04-01T01:12:59.077000 CVE-2024-31032,0,0,71dbb2a787f73b1914bf5d51e1b83b5365eb112b3ab9ed4df5d1066682b5223b,2024-04-01T01:12:59.077000
CVE-2024-31033,0,0,200340e7b08fbb0d6701818d4b83bef89c21119b7d9fe7f5be450bb2b1edb614,2024-04-11T01:25:48.953000 CVE-2024-31033,0,0,200340e7b08fbb0d6701818d4b83bef89c21119b7d9fe7f5be450bb2b1edb614,2024-04-11T01:25:48.953000
CVE-2024-31036,1,1,59affa21405d25f7d7f4aaa77f6b92475c58d92809aadc797bc272693561d4c1,2024-04-22T22:15:07.400000
CVE-2024-31040,0,0,58d694e98ef6e322b940345b4415e080b141132f654a38c35a41dac24f1e6dc0,2024-04-17T20:08:21.887000 CVE-2024-31040,0,0,58d694e98ef6e322b940345b4415e080b141132f654a38c35a41dac24f1e6dc0,2024-04-17T20:08:21.887000
CVE-2024-31041,0,0,55cb17ccb9a4ccc47749a0a1f025025c536447c530ceaeb2d7f75919ad09c350,2024-04-17T20:08:21.887000 CVE-2024-31041,0,0,55cb17ccb9a4ccc47749a0a1f025025c536447c530ceaeb2d7f75919ad09c350,2024-04-17T20:08:21.887000
CVE-2024-31047,0,0,ed6b998d2efbbc258ad744f538162378aa1b702ac5e17462e2e5f42d9945fb08,2024-04-09T12:48:04.090000 CVE-2024-31047,0,0,ed6b998d2efbbc258ad744f538162378aa1b702ac5e17462e2e5f42d9945fb08,2024-04-09T12:48:04.090000
@ -245806,6 +245807,7 @@ CVE-2024-31745,0,0,ca5ec1c092fce054af70d410aee2649145d7a18036901e509dca6c0e74718
CVE-2024-31750,0,0,ef2fe441e5dcedf0cb2da823df8fe57e9b7ada67d4a5ac9a3c649524c0ed2fa2,2024-04-19T13:10:25.637000 CVE-2024-31750,0,0,ef2fe441e5dcedf0cb2da823df8fe57e9b7ada67d4a5ac9a3c649524c0ed2fa2,2024-04-19T13:10:25.637000
CVE-2024-31759,0,0,7081cd22df5b9e4148ecc914176fc1f6cc04366073f8b1e4eccd8dfe4f2b7d73,2024-04-17T12:48:07.510000 CVE-2024-31759,0,0,7081cd22df5b9e4148ecc914176fc1f6cc04366073f8b1e4eccd8dfe4f2b7d73,2024-04-17T12:48:07.510000
CVE-2024-31760,0,0,7b1e0b53a94a63e7f108110799c5f85524efc23136fc5608e680b8482e690959,2024-04-17T12:48:07.510000 CVE-2024-31760,0,0,7b1e0b53a94a63e7f108110799c5f85524efc23136fc5608e680b8482e690959,2024-04-17T12:48:07.510000
CVE-2024-3177,1,1,4188435cf2eb3b06c526aa46bc19d8a49354941ecbdc9288f83e4d38423ff0a7,2024-04-22T23:15:51.180000
CVE-2024-3178,0,0,e1b2edc538f836ffb506a17d476e0f961db2588242ddd1b2358ad3487cd818bf,2024-04-04T12:48:41.700000 CVE-2024-3178,0,0,e1b2edc538f836ffb506a17d476e0f961db2588242ddd1b2358ad3487cd818bf,2024-04-04T12:48:41.700000
CVE-2024-31783,0,0,39c4df7f07fa9e66dc5d42dd16bc0981c0d6511a0c96852796a6de0ccb03c2ac,2024-04-16T13:24:07.103000 CVE-2024-31783,0,0,39c4df7f07fa9e66dc5d42dd16bc0981c0d6511a0c96852796a6de0ccb03c2ac,2024-04-16T13:24:07.103000
CVE-2024-31784,0,0,0055eda0e2e2e3cebbac3d895c086f3674073feab99e847bee4ca99f9495a801,2024-04-16T13:24:07.103000 CVE-2024-31784,0,0,0055eda0e2e2e3cebbac3d895c086f3674073feab99e847bee4ca99f9495a801,2024-04-16T13:24:07.103000
@ -245913,10 +245915,10 @@ CVE-2024-3203,0,0,d460cfbc8661b4424cc0984f526a676bb0961256fc9d04a7d500e891870298
CVE-2024-32035,0,0,9f9419e7b7ca688ca6c807b99c4196d3fdd26d305c290e1d723cf412a79167b9,2024-04-16T13:24:07.103000 CVE-2024-32035,0,0,9f9419e7b7ca688ca6c807b99c4196d3fdd26d305c290e1d723cf412a79167b9,2024-04-16T13:24:07.103000
CVE-2024-32036,0,0,4358f457ff05e2fb3005eccdac6fca8cb869be3ffa209c190e441f2c4aed7dbe,2024-04-16T23:15:09.173000 CVE-2024-32036,0,0,4358f457ff05e2fb3005eccdac6fca8cb869be3ffa209c190e441f2c4aed7dbe,2024-04-16T23:15:09.173000
CVE-2024-32038,0,0,0c62c1bb60ae59f0486be34fe779022cf62ebed910094f07560f60e059fb8333,2024-04-19T16:19:49.043000 CVE-2024-32038,0,0,0c62c1bb60ae59f0486be34fe779022cf62ebed910094f07560f60e059fb8333,2024-04-19T16:19:49.043000
CVE-2024-32039,1,1,903d6f1b801ce3cb1cf30fb63096cefc285997d688eb683fcfe664b5835eba84,2024-04-22T21:15:49.090000 CVE-2024-32039,0,0,903d6f1b801ce3cb1cf30fb63096cefc285997d688eb683fcfe664b5835eba84,2024-04-22T21:15:49.090000
CVE-2024-3204,0,0,2a2a133d829052d72380a6f7a45e32f6ecd96ec6da65fdbadcbe92a1f79d774f,2024-04-11T01:25:55.933000 CVE-2024-3204,0,0,2a2a133d829052d72380a6f7a45e32f6ecd96ec6da65fdbadcbe92a1f79d774f,2024-04-11T01:25:55.933000
CVE-2024-32040,1,1,3766545a4f13c59ba4d4b4d068bd390255fef99cd14416b0ba9f81ad55a8bd93,2024-04-22T21:15:49.290000 CVE-2024-32040,0,0,3766545a4f13c59ba4d4b4d068bd390255fef99cd14416b0ba9f81ad55a8bd93,2024-04-22T21:15:49.290000
CVE-2024-32041,1,1,04b89046e3d0ca3229dfcf282ef96cdae99675e6240ef182516afb2b8e764edc,2024-04-22T21:15:49.477000 CVE-2024-32041,0,0,04b89046e3d0ca3229dfcf282ef96cdae99675e6240ef182516afb2b8e764edc,2024-04-22T21:15:49.477000
CVE-2024-3205,0,0,befb48df2bb5e20af3b4383c1ef82865b9f9fb3145e096ffb7e0098ff096b4f8,2024-04-11T01:25:56.010000 CVE-2024-3205,0,0,befb48df2bb5e20af3b4383c1ef82865b9f9fb3145e096ffb7e0098ff096b4f8,2024-04-11T01:25:56.010000
CVE-2024-3207,0,0,a57734da301192d6a9381ac71eef9bc84e6acf70886d5628a9c0939255320fc2,2024-04-11T01:25:56.090000 CVE-2024-3207,0,0,a57734da301192d6a9381ac71eef9bc84e6acf70886d5628a9c0939255320fc2,2024-04-11T01:25:56.090000
CVE-2024-32079,0,0,da7c5fc89984eb26823f30faeb9a07fc0733d153f127ad026564ff0d33e59be6,2024-04-15T13:15:31.997000 CVE-2024-32079,0,0,da7c5fc89984eb26823f30faeb9a07fc0733d153f127ad026564ff0d33e59be6,2024-04-15T13:15:31.997000
@ -245982,12 +245984,12 @@ CVE-2024-32163,0,0,2a0e3e31a356cd8bdaedc62aa40103c9838a070e53ea091fe0aa567b9d093
CVE-2024-32166,0,0,af772ceecc3fc2866fca4167f4349d8cebe27f4d82d6a64ba5e2abe771141833,2024-04-19T16:19:49.043000 CVE-2024-32166,0,0,af772ceecc3fc2866fca4167f4349d8cebe27f4d82d6a64ba5e2abe771141833,2024-04-19T16:19:49.043000
CVE-2024-3217,0,0,3ac42247ba2d685c0a6f4de738ef771d2778cce367312f144d0326551965dbb5,2024-04-05T12:40:52.763000 CVE-2024-3217,0,0,3ac42247ba2d685c0a6f4de738ef771d2778cce367312f144d0326551965dbb5,2024-04-05T12:40:52.763000
CVE-2024-3218,0,0,75e1c84ee83eb1d158244a2182789a8e99b92d3a400a75a7854fff9872030968,2024-04-11T01:25:56.290000 CVE-2024-3218,0,0,75e1c84ee83eb1d158244a2182789a8e99b92d3a400a75a7854fff9872030968,2024-04-11T01:25:56.290000
CVE-2024-32205,1,1,3b6122f4454c6189a285ee435770c5e0b5d0cb175cbe04dd262a3757da1f87c2,2024-04-22T20:15:07.210000 CVE-2024-32205,0,0,3b6122f4454c6189a285ee435770c5e0b5d0cb175cbe04dd262a3757da1f87c2,2024-04-22T20:15:07.210000
CVE-2024-32206,0,0,75e2f6344ef11995a7b224164fb98cef520a3da698959b3897e594f3d6e35fe2,2024-04-19T16:19:49.043000 CVE-2024-32206,0,0,75e2f6344ef11995a7b224164fb98cef520a3da698959b3897e594f3d6e35fe2,2024-04-19T16:19:49.043000
CVE-2024-3221,0,0,feefc929b27a3432f5d1352d15fe99f1f6ccd294cecb07c343d15630058ba883,2024-04-11T01:25:56.367000 CVE-2024-3221,0,0,feefc929b27a3432f5d1352d15fe99f1f6ccd294cecb07c343d15630058ba883,2024-04-11T01:25:56.367000
CVE-2024-3222,0,0,66f6b4b9196c6c0a91ef8acd4cd0373a609da64e89b651a11374a40389e0fbce,2024-04-11T01:25:56.443000 CVE-2024-3222,0,0,66f6b4b9196c6c0a91ef8acd4cd0373a609da64e89b651a11374a40389e0fbce,2024-04-11T01:25:56.443000
CVE-2024-3223,0,0,9ffc982a7efad24c324809c3c91bef1f04ff8280442a22bc3b8b997888a9a5ba,2024-04-11T01:25:56.520000 CVE-2024-3223,0,0,9ffc982a7efad24c324809c3c91bef1f04ff8280442a22bc3b8b997888a9a5ba,2024-04-11T01:25:56.520000
CVE-2024-32238,1,1,94ecef49732194650c203704488bc0b79a53c465c93001f6f8f1542de7946f78,2024-04-22T20:15:07.630000 CVE-2024-32238,0,0,94ecef49732194650c203704488bc0b79a53c465c93001f6f8f1542de7946f78,2024-04-22T20:15:07.630000
CVE-2024-3224,0,0,c02e228ce7415d482e2413c615262ec703d9597aa6708474ae81bc765129424f,2024-04-11T01:25:56.600000 CVE-2024-3224,0,0,c02e228ce7415d482e2413c615262ec703d9597aa6708474ae81bc765129424f,2024-04-11T01:25:56.600000
CVE-2024-3225,0,0,756f5e08f46ab3796e26d62cd11cd06a14dd07d1ee049ee62586436225e04f96,2024-04-11T01:25:56.680000 CVE-2024-3225,0,0,756f5e08f46ab3796e26d62cd11cd06a14dd07d1ee049ee62586436225e04f96,2024-04-11T01:25:56.680000
CVE-2024-32254,0,0,0a822eba06a834cf336156a0938a7461bb1c4b55ddb75ffba99f3f6b4a1c1462,2024-04-17T12:48:31.863000 CVE-2024-32254,0,0,0a822eba06a834cf336156a0938a7461bb1c4b55ddb75ffba99f3f6b4a1c1462,2024-04-17T12:48:31.863000
@ -246042,9 +246044,9 @@ CVE-2024-3235,0,0,87b194ac57d76e3164f790cf262b7f15e5577bfab72d12fd067ebb5070eb75
CVE-2024-32368,0,0,9c8576a3d1f1b62a70cacd6450f34a9ed8bf7b0c58e8707835f5fedae490db3f,2024-04-22T19:24:12.920000 CVE-2024-32368,0,0,9c8576a3d1f1b62a70cacd6450f34a9ed8bf7b0c58e8707835f5fedae490db3f,2024-04-22T19:24:12.920000
CVE-2024-32391,0,0,b9d2ada2509e9e002fcf7fc50c30e5fa24f6bd077b7f0fab83dbe519d76755ce,2024-04-22T13:28:50.310000 CVE-2024-32391,0,0,b9d2ada2509e9e002fcf7fc50c30e5fa24f6bd077b7f0fab83dbe519d76755ce,2024-04-22T13:28:50.310000
CVE-2024-32392,0,0,e9dc77721f231608117a79f151c9f1e6be5cd7530989658bd3dd67ce41889ce5,2024-04-22T13:28:50.310000 CVE-2024-32392,0,0,e9dc77721f231608117a79f151c9f1e6be5cd7530989658bd3dd67ce41889ce5,2024-04-22T13:28:50.310000
CVE-2024-32394,1,1,7cc3b3f3c56a0cd88d7f07ffeeee92eac04f5586caffaf5b812f8c10697a9b00,2024-04-22T21:15:49.657000 CVE-2024-32394,0,0,7cc3b3f3c56a0cd88d7f07ffeeee92eac04f5586caffaf5b812f8c10697a9b00,2024-04-22T21:15:49.657000
CVE-2024-32399,1,1,40453e37a9d27fb351270e340117d3028138554e32350bcb25c71c2e15cf0ec2,2024-04-22T20:15:07.683000 CVE-2024-32399,0,0,40453e37a9d27fb351270e340117d3028138554e32350bcb25c71c2e15cf0ec2,2024-04-22T20:15:07.683000
CVE-2024-32405,1,1,cd4abce15bd5cb1377317eccf2c7ee074ab0be4cd112d0ba830261b578da6355,2024-04-22T20:15:07.737000 CVE-2024-32405,0,0,cd4abce15bd5cb1377317eccf2c7ee074ab0be4cd112d0ba830261b578da6355,2024-04-22T20:15:07.737000
CVE-2024-32407,0,0,04bdb1c21d2d45016e5f7565a6490533ba649bcc5c4dc99b7e34c030532cab3a,2024-04-22T19:24:06.727000 CVE-2024-32407,0,0,04bdb1c21d2d45016e5f7565a6490533ba649bcc5c4dc99b7e34c030532cab3a,2024-04-22T19:24:06.727000
CVE-2024-32409,0,0,2cc0bf26ecd8938fd89992a98bae2541af2d19072f0bc8cdc919759b6ea980aa,2024-04-19T16:19:49.043000 CVE-2024-32409,0,0,2cc0bf26ecd8938fd89992a98bae2541af2d19072f0bc8cdc919759b6ea980aa,2024-04-19T16:19:49.043000
CVE-2024-32418,0,0,95e561b293359ffe96c6d53d8bd7aa5dba172944f2d114b653ec1a760700c5d9,2024-04-22T13:28:43.747000 CVE-2024-32418,0,0,95e561b293359ffe96c6d53d8bd7aa5dba172944f2d114b653ec1a760700c5d9,2024-04-22T13:28:43.747000
@ -246079,7 +246081,10 @@ CVE-2024-32454,0,0,82612665e825c6121646d06374d65bca8862992c0c337ca5fb468894f9c7a
CVE-2024-32455,0,0,e310d9ab26897191bedf34ef484874a672ce976e6db5d528b2061e5197a0cfa7,2024-04-17T12:48:31.863000 CVE-2024-32455,0,0,e310d9ab26897191bedf34ef484874a672ce976e6db5d528b2061e5197a0cfa7,2024-04-17T12:48:31.863000
CVE-2024-32456,0,0,c0a0240c7bede6707c2eded61ccd88c169f1ed302e5ff3046ec6dac746537832,2024-04-17T12:48:07.510000 CVE-2024-32456,0,0,c0a0240c7bede6707c2eded61ccd88c169f1ed302e5ff3046ec6dac746537832,2024-04-17T12:48:07.510000
CVE-2024-32457,0,0,7fd7ce0ef138de93b6c3b9f686be4ed7bf60ffc47479de2dc6e171832d6a4fe7,2024-04-17T12:48:07.510000 CVE-2024-32457,0,0,7fd7ce0ef138de93b6c3b9f686be4ed7bf60ffc47479de2dc6e171832d6a4fe7,2024-04-17T12:48:07.510000
CVE-2024-32458,1,1,989b13b43b54d8f9cae040df7c674dd8954010e1c670a628aa0cd71bc829f1f5,2024-04-22T21:15:49.707000 CVE-2024-32458,0,0,989b13b43b54d8f9cae040df7c674dd8954010e1c670a628aa0cd71bc829f1f5,2024-04-22T21:15:49.707000
CVE-2024-32459,1,1,b6a2b85c474d6d273e8772c0703d0fd9ae9420c57a4e08e0484ab20fd240e8bb,2024-04-22T22:15:07.463000
CVE-2024-32460,1,1,b845923fc459d84695a94a20e151c8f5df593861653d803b32fbe677bc895e1e,2024-04-22T22:15:07.647000
CVE-2024-32461,1,1,83d22b222d6b085342ae6ac86da8ce1f6b9f8b689b2e3ba283ede0f14ce6e3f6,2024-04-22T22:15:07.840000
CVE-2024-32462,0,0,a3aed35daade2ee454524a5ebc934210d89481f944e09c871e8061833830b63d,2024-04-21T03:15:45.827000 CVE-2024-32462,0,0,a3aed35daade2ee454524a5ebc934210d89481f944e09c871e8061833830b63d,2024-04-21T03:15:45.827000
CVE-2024-32463,0,0,1671e195c4973ac11a31a2856358d6fb78fc6f39ffe0d1d851cfbba7a397b723,2024-04-17T16:51:07.347000 CVE-2024-32463,0,0,1671e195c4973ac11a31a2856358d6fb78fc6f39ffe0d1d851cfbba7a397b723,2024-04-17T16:51:07.347000
CVE-2024-32466,0,0,0986c266c64cc5e4b364446dfb796a6c4980d483c5a2beb3f21f15de4cb49c0b,2024-04-18T18:25:55.267000 CVE-2024-32466,0,0,0986c266c64cc5e4b364446dfb796a6c4980d483c5a2beb3f21f15de4cb49c0b,2024-04-18T18:25:55.267000
@ -246091,7 +246096,9 @@ CVE-2024-32474,0,0,adf2e54d1f50eac76d6eed4deebd0da24270aeb71946944c9f131a9545119
CVE-2024-32475,0,0,0fc7232a86aa0c1544df06e871c45b3dd3b0f61d5e2b0b45727dd45ce07af33f,2024-04-18T18:25:55.267000 CVE-2024-32475,0,0,0fc7232a86aa0c1544df06e871c45b3dd3b0f61d5e2b0b45727dd45ce07af33f,2024-04-18T18:25:55.267000
CVE-2024-32477,0,0,edf9feceec657c5323b0a5bdd9c7c512982639e1cf50dad09f7080d975a64ba8,2024-04-19T13:10:25.637000 CVE-2024-32477,0,0,edf9feceec657c5323b0a5bdd9c7c512982639e1cf50dad09f7080d975a64ba8,2024-04-19T13:10:25.637000
CVE-2024-32478,0,0,767d0906439929f5e4e53d4d2396aabddb8a0de51e7967f13464fca079c7076f,2024-04-19T16:19:49.043000 CVE-2024-32478,0,0,767d0906439929f5e4e53d4d2396aabddb8a0de51e7967f13464fca079c7076f,2024-04-19T16:19:49.043000
CVE-2024-32479,1,1,4cf43690c9d0407b6643c2c4c1ff406d9dc16127b06823a7a9d52f9aa8cac76e,2024-04-22T22:15:08.027000
CVE-2024-3248,0,0,65f6d4ddfc43ae235edf2e59fc9daa1f1d020439a4fa197a41a6ddd58e106004,2024-04-03T12:38:04.840000 CVE-2024-3248,0,0,65f6d4ddfc43ae235edf2e59fc9daa1f1d020439a4fa197a41a6ddd58e106004,2024-04-03T12:38:04.840000
CVE-2024-32480,1,1,48d5eafc84d47aa80e4ad469390e78c3add13778656b7bdca54179d867e858ee,2024-04-22T23:15:50.440000
CVE-2024-32487,0,0,746d95a6c3889a9e0164763739aef81432a5222f159aa33a064a3132dbd4a7ad,2024-04-15T13:15:31.997000 CVE-2024-32487,0,0,746d95a6c3889a9e0164763739aef81432a5222f159aa33a064a3132dbd4a7ad,2024-04-15T13:15:31.997000
CVE-2024-32488,0,0,6ce6bcee8af0a677e98d2bf7a3efd66cf8a3e580423515387116f39d710ba974,2024-04-15T13:15:31.997000 CVE-2024-32488,0,0,6ce6bcee8af0a677e98d2bf7a3efd66cf8a3e580423515387116f39d710ba974,2024-04-15T13:15:31.997000
CVE-2024-32489,0,0,cbc8895e7f5e99c09f7bd505220fcc5514b4573939580e3f381a933acf3c9ef0,2024-04-15T13:15:31.997000 CVE-2024-32489,0,0,cbc8895e7f5e99c09f7bd505220fcc5514b4573939580e3f381a933acf3c9ef0,2024-04-15T13:15:31.997000
@ -246206,6 +246213,9 @@ CVE-2024-32634,0,0,399e2bba8e548c1c98770d2f478e96e69a60afbc020788dd69a365e3ae504
CVE-2024-32644,0,0,1c6536d9b118a22e007df0508c4274faf4a9f6bb52ca2e5c9b157aa559740e67,2024-04-19T16:19:49.043000 CVE-2024-32644,0,0,1c6536d9b118a22e007df0508c4274faf4a9f6bb52ca2e5c9b157aa559740e67,2024-04-19T16:19:49.043000
CVE-2024-32650,0,0,3ec938fa621d2b09851dc7c9c4a0bab9e06500eb12a687bac8f1323156efc6df,2024-04-19T16:19:49.043000 CVE-2024-32650,0,0,3ec938fa621d2b09851dc7c9c4a0bab9e06500eb12a687bac8f1323156efc6df,2024-04-19T16:19:49.043000
CVE-2024-32652,0,0,507899e8cc0ef719a4df6a408b43b1aeaf42e8d25b41dcf9a35617406adccb9d,2024-04-22T13:28:50.310000 CVE-2024-32652,0,0,507899e8cc0ef719a4df6a408b43b1aeaf42e8d25b41dcf9a35617406adccb9d,2024-04-22T13:28:50.310000
CVE-2024-32653,1,1,15746b291b5be192848135c0c6fd678673b4bcbf809efc95adb9fcdbf0746ddd,2024-04-22T23:15:50.630000
CVE-2024-32656,1,1,e07ca629d22e469dec44e49bf609e2394a8cdf2f0a281225759204e05756045e,2024-04-22T23:15:50.817000
CVE-2024-32657,1,1,d75a2dbf2d53b439d4955d8a51cd17809b320c82c440e545c3087705382adb9e,2024-04-22T23:15:50.997000
CVE-2024-3266,0,0,254a5ba127b10ac48f062b62dbe4c90ef51eaba1ed741161e5a22416cbb32240,2024-04-10T13:23:38.787000 CVE-2024-3266,0,0,254a5ba127b10ac48f062b62dbe4c90ef51eaba1ed741161e5a22416cbb32240,2024-04-10T13:23:38.787000
CVE-2024-3267,0,0,00a210ede7a73ca33b64d3b8a0e382509d5bafa34ae84022125b180763aee2bd,2024-04-10T13:23:38.787000 CVE-2024-3267,0,0,00a210ede7a73ca33b64d3b8a0e382509d5bafa34ae84022125b180763aee2bd,2024-04-10T13:23:38.787000
CVE-2024-32681,0,0,30385cf8415af0417b19f52d5eb22ace0b875cd333ead985847624dbf28043cd,2024-04-22T13:28:34.007000 CVE-2024-32681,0,0,30385cf8415af0417b19f52d5eb22ace0b875cd333ead985847624dbf28043cd,2024-04-22T13:28:34.007000
@ -246507,4 +246517,4 @@ CVE-2024-4020,0,0,fd9bedf3f2e4b41e8bc994bd6387cb7e34a5d92d9443a0588f231180a5be89
CVE-2024-4021,0,0,21ca31bf18d88881f7a6cc1002b89ea9bbd51b89715a0adf7c08b2eb5ac210a6,2024-04-22T15:15:47.813000 CVE-2024-4021,0,0,21ca31bf18d88881f7a6cc1002b89ea9bbd51b89715a0adf7c08b2eb5ac210a6,2024-04-22T15:15:47.813000
CVE-2024-4022,0,0,ebd323c8f90bdf29bd6ff35ea1eff449874a3d962dc85b687039f47f7b416e73,2024-04-22T13:28:43.747000 CVE-2024-4022,0,0,ebd323c8f90bdf29bd6ff35ea1eff449874a3d962dc85b687039f47f7b416e73,2024-04-22T13:28:43.747000
CVE-2024-4026,0,0,65bff2dba626fde0f88488c1e6df610a37e761e2e041855587a3bbcb3e849c23,2024-04-22T13:28:34.007000 CVE-2024-4026,0,0,65bff2dba626fde0f88488c1e6df610a37e761e2e041855587a3bbcb3e849c23,2024-04-22T13:28:34.007000
CVE-2024-4040,1,1,973a0d3e869c71c707f4ed9e103d14c0135314b263cd796fdd1f54f7ba104b13,2024-04-22T21:15:49.890000 CVE-2024-4040,0,0,973a0d3e869c71c707f4ed9e103d14c0135314b263cd796fdd1f54f7ba104b13,2024-04-22T21:15:49.890000

Can't render this file because it is too large.