From 879f6795298f0ed980238be88db76173e6a64ccd Mon Sep 17 00:00:00 2001 From: cad-safe-bot Date: Tue, 23 Apr 2024 22:03:28 +0000 Subject: [PATCH] Auto-Update: 2024-04-23T22:00:37.926836+00:00 --- CVE-2022/CVE-2022-300xx/CVE-2022-30007.json | 8 +- CVE-2024/CVE-2024-226xx/CVE-2024-22638.json | 10 ++- CVE-2024/CVE-2024-29xx/CVE-2024-2919.json | 8 +- CVE-2024/CVE-2024-326xx/CVE-2024-32659.json | 63 ++++++++++++++ CVE-2024/CVE-2024-326xx/CVE-2024-32660.json | 63 ++++++++++++++ CVE-2024/CVE-2024-326xx/CVE-2024-32661.json | 59 +++++++++++++ CVE-2024/CVE-2024-326xx/CVE-2024-32662.json | 63 ++++++++++++++ CVE-2024/CVE-2024-328xx/CVE-2024-32866.json | 63 ++++++++++++++ CVE-2024/CVE-2024-328xx/CVE-2024-32869.json | 59 +++++++++++++ CVE-2024/CVE-2024-328xx/CVE-2024-32875.json | 67 +++++++++++++++ CVE-2024/CVE-2024-40xx/CVE-2024-4064.json | 92 +++++++++++++++++++++ CVE-2024/CVE-2024-40xx/CVE-2024-4065.json | 92 +++++++++++++++++++++ CVE-2024/CVE-2024-40xx/CVE-2024-4066.json | 92 +++++++++++++++++++++ README.md | 52 ++++-------- _state.csv | 74 ++++++++++------- 15 files changed, 788 insertions(+), 77 deletions(-) create mode 100644 CVE-2024/CVE-2024-326xx/CVE-2024-32659.json create mode 100644 CVE-2024/CVE-2024-326xx/CVE-2024-32660.json create mode 100644 CVE-2024/CVE-2024-326xx/CVE-2024-32661.json create mode 100644 CVE-2024/CVE-2024-326xx/CVE-2024-32662.json create mode 100644 CVE-2024/CVE-2024-328xx/CVE-2024-32866.json create mode 100644 CVE-2024/CVE-2024-328xx/CVE-2024-32869.json create mode 100644 CVE-2024/CVE-2024-328xx/CVE-2024-32875.json create mode 100644 CVE-2024/CVE-2024-40xx/CVE-2024-4064.json create mode 100644 CVE-2024/CVE-2024-40xx/CVE-2024-4065.json create mode 100644 CVE-2024/CVE-2024-40xx/CVE-2024-4066.json diff --git a/CVE-2022/CVE-2022-300xx/CVE-2022-30007.json b/CVE-2022/CVE-2022-300xx/CVE-2022-30007.json index 950af431829..58d1368aa7b 100644 --- a/CVE-2022/CVE-2022-300xx/CVE-2022-30007.json +++ b/CVE-2022/CVE-2022-300xx/CVE-2022-30007.json @@ -2,8 +2,8 @@ "id": "CVE-2022-30007", "sourceIdentifier": "cve@mitre.org", "published": "2022-05-17T16:15:09.217", - "lastModified": "2022-05-26T00:39:25.050", - "vulnStatus": "Analyzed", + "lastModified": "2024-04-23T20:15:07.160", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -93,6 +93,10 @@ } ], "references": [ + { + "url": "https://github.com/ZackSecurity/VulnerReport/blob/cve/gxcms/1.md", + "source": "cve@mitre.org" + }, { "url": "https://github.com/breezety/gxcms15/issues/1", "source": "cve@mitre.org", diff --git a/CVE-2024/CVE-2024-226xx/CVE-2024-22638.json b/CVE-2024/CVE-2024-226xx/CVE-2024-22638.json index d0399429515..f4bc9e2fbce 100644 --- a/CVE-2024/CVE-2024-226xx/CVE-2024-22638.json +++ b/CVE-2024/CVE-2024-226xx/CVE-2024-22638.json @@ -2,12 +2,12 @@ "id": "CVE-2024-22638", "sourceIdentifier": "cve@mitre.org", "published": "2024-01-25T21:15:09.470", - "lastModified": "2024-01-29T15:57:43.763", - "vulnStatus": "Analyzed", + "lastModified": "2024-04-23T20:15:07.290", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", - "value": "liveSite v2019.1 was discovered to contain a remote code execution (RCE) vulenrabiity via the component /livesite/edit_designer_region.php." + "value": "liveSite v2019.1 was discovered to contain a remote code execution (RCE) vulenrabiity via the component /livesite/edit_designer_region.php or /livesite/add_email_campaign.php." }, { "lang": "es", @@ -76,6 +76,10 @@ "Third Party Advisory", "VDB Entry" ] + }, + { + "url": "https://www.exploit-db.com/exploits/51936", + "source": "cve@mitre.org" } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-29xx/CVE-2024-2919.json b/CVE-2024/CVE-2024-29xx/CVE-2024-2919.json index d0c3264b98f..d54f0cb41d8 100644 --- a/CVE-2024/CVE-2024-29xx/CVE-2024-2919.json +++ b/CVE-2024/CVE-2024-29xx/CVE-2024-2919.json @@ -2,12 +2,12 @@ "id": "CVE-2024-2919", "sourceIdentifier": "security@wordfence.com", "published": "2024-04-04T03:15:06.413", - "lastModified": "2024-04-04T12:48:41.700", + "lastModified": "2024-04-23T21:15:48.110", "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", - "value": "The Gutenberg Blocks by Kadence Blocks \u2013 Page Builder Features plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the Countdown and CountUp Widget in all versions up to, and including, 3.2.31 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page." + "value": "The Gutenberg Blocks by Kadence Blocks \u2013 Page Builder Features plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the CountUp Widget in all versions up to, and including, 3.2.31 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page." }, { "lang": "es", @@ -39,10 +39,6 @@ ] }, "references": [ - { - "url": "https://plugins.trac.wordpress.org/changeset/3062911/kadence-blocks/trunk/includes/assets/js/kb-countdown.min.js", - "source": "security@wordfence.com" - }, { "url": "https://plugins.trac.wordpress.org/changeset/3062911/kadence-blocks/trunk/includes/assets/js/kb-countup.min.js", "source": "security@wordfence.com" diff --git a/CVE-2024/CVE-2024-326xx/CVE-2024-32659.json b/CVE-2024/CVE-2024-326xx/CVE-2024-32659.json new file mode 100644 index 00000000000..e8c4cf39cf9 --- /dev/null +++ b/CVE-2024/CVE-2024-326xx/CVE-2024-32659.json @@ -0,0 +1,63 @@ +{ + "id": "CVE-2024-32659", + "sourceIdentifier": "security-advisories@github.com", + "published": "2024-04-23T20:15:07.407", + "lastModified": "2024-04-23T20:15:07.407", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "FreeRDP is a free implementation of the Remote Desktop Protocol. FreeRDP based clients prior to version 3.5.1 are vulnerable to out-of-bounds read if `((nWidth == 0) and (nHeight == 0))`. Version 3.5.1 contains a patch for the issue. No known workarounds are available." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-125" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/FreeRDP/FreeRDP/commit/6430945ce003a5e24d454d8566f54aae1b6b617b", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-8jgr-7r33-x87w", + "source": "security-advisories@github.com" + }, + { + "url": "https://oss-fuzz.com/testcase-detail/6156779722440704", + "source": "security-advisories@github.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-326xx/CVE-2024-32660.json b/CVE-2024/CVE-2024-326xx/CVE-2024-32660.json new file mode 100644 index 00000000000..db17ba5c19f --- /dev/null +++ b/CVE-2024/CVE-2024-326xx/CVE-2024-32660.json @@ -0,0 +1,63 @@ +{ + "id": "CVE-2024-32660", + "sourceIdentifier": "security-advisories@github.com", + "published": "2024-04-23T20:15:07.617", + "lastModified": "2024-04-23T20:15:07.617", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "FreeRDP is a free implementation of the Remote Desktop Protocol. Prior to version 3.5.1, a malicious server can crash the FreeRDP client by sending invalid huge allocation size. Version 3.5.1 contains a patch for the issue. No known workarounds are available." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-770" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/FreeRDP/FreeRDP/commit/5e5d27cf310e4c10b854be7667bfb7a5d774eb47", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-mxv6-2cw6-m3mx", + "source": "security-advisories@github.com" + }, + { + "url": "https://oss-fuzz.com/testcase-detail/5559242514825216", + "source": "security-advisories@github.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-326xx/CVE-2024-32661.json b/CVE-2024/CVE-2024-326xx/CVE-2024-32661.json new file mode 100644 index 00000000000..424a2fc34b1 --- /dev/null +++ b/CVE-2024/CVE-2024-326xx/CVE-2024-32661.json @@ -0,0 +1,59 @@ +{ + "id": "CVE-2024-32661", + "sourceIdentifier": "security-advisories@github.com", + "published": "2024-04-23T20:15:07.800", + "lastModified": "2024-04-23T20:15:07.800", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "FreeRDP is a free implementation of the Remote Desktop Protocol. FreeRDP based clients prior to version 3.5.1 are vulnerable to a possible `NULL` access and crash. Version 3.5.1 contains a patch for the issue. No known workarounds are available." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-476" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/FreeRDP/FreeRDP/commit/71e463e31b4d69f4022d36bfc814592f56600793", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-p5m5-342g-pv9m", + "source": "security-advisories@github.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-326xx/CVE-2024-32662.json b/CVE-2024/CVE-2024-326xx/CVE-2024-32662.json new file mode 100644 index 00000000000..fcbfee73b05 --- /dev/null +++ b/CVE-2024/CVE-2024-326xx/CVE-2024-32662.json @@ -0,0 +1,63 @@ +{ + "id": "CVE-2024-32662", + "sourceIdentifier": "security-advisories@github.com", + "published": "2024-04-23T21:15:48.200", + "lastModified": "2024-04-23T21:15:48.200", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "FreeRDP is a free implementation of the Remote Desktop Protocol. FreeRDP based clients prior to version 3.5.1 are vulnerable to out-of-bounds read. This occurs when `WCHAR` string is read with twice the size it has and converted to `UTF-8`, `base64` decoded. The string is only used to compare against the redirection server certificate. Version 3.5.1 contains a patch for the issue. No known workarounds are available." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-125" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/FreeRDP/FreeRDP/commit/626d10a94a88565d957ddc30768ed08b320049a7", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-vffh-j6hh-95f4", + "source": "security-advisories@github.com" + }, + { + "url": "https://oss-fuzz.com/testcase-detail/4985227207311360", + "source": "security-advisories@github.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-328xx/CVE-2024-32866.json b/CVE-2024/CVE-2024-328xx/CVE-2024-32866.json new file mode 100644 index 00000000000..5c328502a6d --- /dev/null +++ b/CVE-2024/CVE-2024-328xx/CVE-2024-32866.json @@ -0,0 +1,63 @@ +{ + "id": "CVE-2024-32866", + "sourceIdentifier": "security-advisories@github.com", + "published": "2024-04-23T21:15:48.407", + "lastModified": "2024-04-23T21:15:48.407", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Conform, a type-safe form validation library, allows the parsing of nested objects in the form of `object.property`. Due to an improper implementation of this feature in versions prior to 1.1.1, an attacker can exploit the feature to trigger prototype pollution by passing a crafted input to `parseWith...` functions. Applications that use conform for server-side validation of form data or URL parameters are affected by this vulnerability. Version 1.1.1 contains a patch for the issue.\n" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "HIGH", + "baseScore": 8.6, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 4.7 + } + ] + }, + "weaknesses": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-1321" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/edmundhung/conform/blob/59156d7115a7207fa3b6f8a70a4342a9b24c2501/packages/conform-dom/formdata.ts#L117", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/edmundhung/conform/commit/4819d51b5a53fd5486fc85c17cdc148eb160e3de", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/edmundhung/conform/security/advisories/GHSA-624g-8qjg-8qxf", + "source": "security-advisories@github.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-328xx/CVE-2024-32869.json b/CVE-2024/CVE-2024-328xx/CVE-2024-32869.json new file mode 100644 index 00000000000..ebb693e6004 --- /dev/null +++ b/CVE-2024/CVE-2024-328xx/CVE-2024-32869.json @@ -0,0 +1,59 @@ +{ + "id": "CVE-2024-32869", + "sourceIdentifier": "security-advisories@github.com", + "published": "2024-04-23T21:15:48.623", + "lastModified": "2024-04-23T21:15:48.623", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Hono is a Web application framework that provides support for any JavaScript runtime. Prior to version 4.2.7, when using serveStatic with deno, it is possible to traverse the directory where `main.ts` is located. This can result in retrieval of unexpected files. Version 4.2.7 contains a patch for the issue." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 5.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-22" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/honojs/hono/commit/92e65fbb6e5e7372650e7690dbd84938432d9e65", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/honojs/hono/security/advisories/GHSA-3mpf-rcc7-5347", + "source": "security-advisories@github.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-328xx/CVE-2024-32875.json b/CVE-2024/CVE-2024-328xx/CVE-2024-32875.json new file mode 100644 index 00000000000..261ce559695 --- /dev/null +++ b/CVE-2024/CVE-2024-328xx/CVE-2024-32875.json @@ -0,0 +1,67 @@ +{ + "id": "CVE-2024-32875", + "sourceIdentifier": "security-advisories@github.com", + "published": "2024-04-23T21:15:48.837", + "lastModified": "2024-04-23T21:15:48.837", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Hugo is a static site generator. Starting in version 0.123.0 and prior to version 0.125.3, title arguments in Markdown for links and images not escaped in internal render hooks. Hugo users who are impacted are those who have these hooks enabled and do not trust their Markdown content files. The issue is patched in v0.125.3. As a workaround, replace the templates with user defined templates or disable the internal templates." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 6.1, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + }, + { + "lang": "en", + "value": "CWE-80" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/gohugoio/hugo/releases/tag/v0.125.3", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/gohugoio/hugo/security/advisories/GHSA-ppf8-hhpp-f5hj", + "source": "security-advisories@github.com" + }, + { + "url": "https://gohugo.io/getting-started/configuration-markup/#renderhooksimageenabledefault", + "source": "security-advisories@github.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-40xx/CVE-2024-4064.json b/CVE-2024/CVE-2024-40xx/CVE-2024-4064.json new file mode 100644 index 00000000000..2efcc53acb2 --- /dev/null +++ b/CVE-2024/CVE-2024-40xx/CVE-2024-4064.json @@ -0,0 +1,92 @@ +{ + "id": "CVE-2024-4064", + "sourceIdentifier": "cna@vuldb.com", + "published": "2024-04-23T20:15:07.997", + "lastModified": "2024-04-23T20:15:07.997", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability was found in Tenda AC8 16.03.34.09. It has been declared as critical. This vulnerability affects the function R7WebsSecurityHandler of the file /goform/execCommand. The manipulation of the argument password leads to stack-based buffer overflow. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. VDB-261790 is the identifier assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C", + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "SINGLE", + "confidentialityImpact": "COMPLETE", + "integrityImpact": "COMPLETE", + "availabilityImpact": "COMPLETE", + "baseScore": 9.0 + }, + "baseSeverity": "HIGH", + "exploitabilityScore": 8.0, + "impactScore": 10.0, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-121" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC8/R7WebsSecurityHandler.md", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.261790", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.261790", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.316493", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-40xx/CVE-2024-4065.json b/CVE-2024/CVE-2024-40xx/CVE-2024-4065.json new file mode 100644 index 00000000000..9a5e1418f96 --- /dev/null +++ b/CVE-2024/CVE-2024-40xx/CVE-2024-4065.json @@ -0,0 +1,92 @@ +{ + "id": "CVE-2024-4065", + "sourceIdentifier": "cna@vuldb.com", + "published": "2024-04-23T20:15:08.223", + "lastModified": "2024-04-23T20:15:08.223", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability was found in Tenda AC8 16.03.34.09. It has been rated as critical. This issue affects the function formSetRebootTimer of the file /goform/SetRebootTimer. The manipulation of the argument rebootTime leads to stack-based buffer overflow. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-261791. NOTE: The vendor was contacted early about this disclosure but did not respond in any way." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C", + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "SINGLE", + "confidentialityImpact": "COMPLETE", + "integrityImpact": "COMPLETE", + "availabilityImpact": "COMPLETE", + "baseScore": 9.0 + }, + "baseSeverity": "HIGH", + "exploitabilityScore": 8.0, + "impactScore": 10.0, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-121" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC8/formSetRebootTimer.md", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.261791", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.261791", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.316494", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-40xx/CVE-2024-4066.json b/CVE-2024/CVE-2024-40xx/CVE-2024-4066.json new file mode 100644 index 00000000000..c9fd7250d83 --- /dev/null +++ b/CVE-2024/CVE-2024-40xx/CVE-2024-4066.json @@ -0,0 +1,92 @@ +{ + "id": "CVE-2024-4066", + "sourceIdentifier": "cna@vuldb.com", + "published": "2024-04-23T21:15:49.040", + "lastModified": "2024-04-23T21:15:49.040", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability classified as critical has been found in Tenda AC8 16.03.34.09. Affected is the function fromAdvSetMacMtuWan of the file /goform/AdvSetMacMtuWan. The manipulation of the argument wanMTU/wanSpeed/cloneType/mac/serviceName/serverName leads to stack-based buffer overflow. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-261792. NOTE: The vendor was contacted early about this disclosure but did not respond in any way." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C", + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "SINGLE", + "confidentialityImpact": "COMPLETE", + "integrityImpact": "COMPLETE", + "availabilityImpact": "COMPLETE", + "baseScore": 9.0 + }, + "baseSeverity": "HIGH", + "exploitabilityScore": 8.0, + "impactScore": 10.0, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-121" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC8/fromAdvSetMacMtuWan.md", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.261792", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.261792", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.316495", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/README.md b/README.md index 84d7b98d43e..df9c5113050 100644 --- a/README.md +++ b/README.md @@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2024-04-23T20:00:32.054630+00:00 +2024-04-23T22:00:37.926836+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2024-04-23T19:57:33.843000+00:00 +2024-04-23T21:15:49.040000+00:00 ``` ### Last Data Feed Release @@ -33,48 +33,32 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### Total Number of included CVEs ```plain -246563 +246573 ``` ### CVEs added in the last Commit -Recently added CVEs: `5` +Recently added CVEs: `10` -- [CVE-2024-31208](CVE-2024/CVE-2024-312xx/CVE-2024-31208.json) (`2024-04-23T18:15:14.457`) -- [CVE-2024-32482](CVE-2024/CVE-2024-324xx/CVE-2024-32482.json) (`2024-04-23T18:15:14.810`) -- [CVE-2024-32658](CVE-2024/CVE-2024-326xx/CVE-2024-32658.json) (`2024-04-23T18:15:15.000`) -- [CVE-2024-4062](CVE-2024/CVE-2024-40xx/CVE-2024-4062.json) (`2024-04-23T19:15:46.553`) -- [CVE-2024-4063](CVE-2024/CVE-2024-40xx/CVE-2024-4063.json) (`2024-04-23T19:15:46.870`) +- [CVE-2024-32659](CVE-2024/CVE-2024-326xx/CVE-2024-32659.json) (`2024-04-23T20:15:07.407`) +- [CVE-2024-32660](CVE-2024/CVE-2024-326xx/CVE-2024-32660.json) (`2024-04-23T20:15:07.617`) +- [CVE-2024-32661](CVE-2024/CVE-2024-326xx/CVE-2024-32661.json) (`2024-04-23T20:15:07.800`) +- [CVE-2024-32662](CVE-2024/CVE-2024-326xx/CVE-2024-32662.json) (`2024-04-23T21:15:48.200`) +- [CVE-2024-32866](CVE-2024/CVE-2024-328xx/CVE-2024-32866.json) (`2024-04-23T21:15:48.407`) +- [CVE-2024-32869](CVE-2024/CVE-2024-328xx/CVE-2024-32869.json) (`2024-04-23T21:15:48.623`) +- [CVE-2024-32875](CVE-2024/CVE-2024-328xx/CVE-2024-32875.json) (`2024-04-23T21:15:48.837`) +- [CVE-2024-4064](CVE-2024/CVE-2024-40xx/CVE-2024-4064.json) (`2024-04-23T20:15:07.997`) +- [CVE-2024-4065](CVE-2024/CVE-2024-40xx/CVE-2024-4065.json) (`2024-04-23T20:15:08.223`) +- [CVE-2024-4066](CVE-2024/CVE-2024-40xx/CVE-2024-4066.json) (`2024-04-23T21:15:49.040`) ### CVEs modified in the last Commit -Recently modified CVEs: `24` +Recently modified CVEs: `3` -- [CVE-2004-0285](CVE-2004/CVE-2004-02xx/CVE-2004-0285.json) (`2024-04-23T19:52:22.567`) -- [CVE-2006-4993](CVE-2006/CVE-2006-49xx/CVE-2006-4993.json) (`2024-04-23T19:52:10.963`) -- [CVE-2007-0171](CVE-2007/CVE-2007-01xx/CVE-2007-0171.json) (`2024-04-23T19:52:32.443`) -- [CVE-2007-0172](CVE-2007/CVE-2007-01xx/CVE-2007-0172.json) (`2024-04-23T19:52:27.450`) -- [CVE-2011-2483](CVE-2011/CVE-2011-24xx/CVE-2011-2483.json) (`2024-04-23T19:57:33.843`) -- [CVE-2021-38201](CVE-2021/CVE-2021-382xx/CVE-2021-38201.json) (`2024-04-23T18:57:47.143`) -- [CVE-2024-24558](CVE-2024/CVE-2024-245xx/CVE-2024-24558.json) (`2024-04-23T19:52:49.107`) -- [CVE-2024-26592](CVE-2024/CVE-2024-265xx/CVE-2024-26592.json) (`2024-04-23T19:46:27.683`) -- [CVE-2024-31497](CVE-2024/CVE-2024-314xx/CVE-2024-31497.json) (`2024-04-23T18:15:14.660`) -- [CVE-2024-3400](CVE-2024/CVE-2024-34xx/CVE-2024-3400.json) (`2024-04-23T19:57:25.207`) -- [CVE-2024-3832](CVE-2024/CVE-2024-38xx/CVE-2024-3832.json) (`2024-04-23T18:15:15.187`) -- [CVE-2024-3833](CVE-2024/CVE-2024-38xx/CVE-2024-3833.json) (`2024-04-23T18:15:15.247`) -- [CVE-2024-3834](CVE-2024/CVE-2024-38xx/CVE-2024-3834.json) (`2024-04-23T18:15:15.290`) -- [CVE-2024-3837](CVE-2024/CVE-2024-38xx/CVE-2024-3837.json) (`2024-04-23T18:15:15.350`) -- [CVE-2024-3838](CVE-2024/CVE-2024-38xx/CVE-2024-3838.json) (`2024-04-23T18:15:15.410`) -- [CVE-2024-3839](CVE-2024/CVE-2024-38xx/CVE-2024-3839.json) (`2024-04-23T18:15:15.467`) -- [CVE-2024-3840](CVE-2024/CVE-2024-38xx/CVE-2024-3840.json) (`2024-04-23T18:15:15.520`) -- [CVE-2024-3841](CVE-2024/CVE-2024-38xx/CVE-2024-3841.json) (`2024-04-23T18:15:15.570`) -- [CVE-2024-3843](CVE-2024/CVE-2024-38xx/CVE-2024-3843.json) (`2024-04-23T18:15:15.610`) -- [CVE-2024-3844](CVE-2024/CVE-2024-38xx/CVE-2024-3844.json) (`2024-04-23T18:15:15.650`) -- [CVE-2024-3845](CVE-2024/CVE-2024-38xx/CVE-2024-3845.json) (`2024-04-23T18:15:15.690`) -- [CVE-2024-3846](CVE-2024/CVE-2024-38xx/CVE-2024-3846.json) (`2024-04-23T18:15:15.733`) -- [CVE-2024-3847](CVE-2024/CVE-2024-38xx/CVE-2024-3847.json) (`2024-04-23T18:15:15.783`) -- [CVE-2024-3914](CVE-2024/CVE-2024-39xx/CVE-2024-3914.json) (`2024-04-23T18:15:15.823`) +- [CVE-2022-30007](CVE-2022/CVE-2022-300xx/CVE-2022-30007.json) (`2024-04-23T20:15:07.160`) +- [CVE-2024-22638](CVE-2024/CVE-2024-226xx/CVE-2024-22638.json) (`2024-04-23T20:15:07.290`) +- [CVE-2024-2919](CVE-2024/CVE-2024-29xx/CVE-2024-2919.json) (`2024-04-23T21:15:48.110`) ## Download and Usage diff --git a/_state.csv b/_state.csv index f6d772a8e6e..523911f0701 100644 --- a/_state.csv +++ b/_state.csv @@ -8585,7 +8585,7 @@ CVE-2004-0281,0,0,a5b551c3f5758977d1a6a77a80db29af6ba522c65dd4e0c3867b0a52503659 CVE-2004-0282,0,0,744b019872557a60425c8e9f327b7c6a01217d34347d47b80eb0036a99d39825,2017-07-11T01:30:02.197000 CVE-2004-0283,0,0,7f67424bd500d69fa23e7313f40bb2460b5f89ec23d8f1bf69bfb0ab9d9426fa,2017-07-11T01:30:02.290000 CVE-2004-0284,0,0,30dc472b0514ba857b844047d928c73bbc88561ec49c91b8c77d7528c40bcd71,2021-07-23T12:55:03.667000 -CVE-2004-0285,0,1,a8725954addf3a9df00374974b23d7f1f3f5ca556c3dbd4fe55c4e89f43b70bd,2024-04-23T19:52:22.567000 +CVE-2004-0285,0,0,a8725954addf3a9df00374974b23d7f1f3f5ca556c3dbd4fe55c4e89f43b70bd,2024-04-23T19:52:22.567000 CVE-2004-0286,0,0,8dafc033e9db42a284c051c97601275bb38f27107642786473faae250f95994f,2017-07-11T01:30:02.447000 CVE-2004-0287,0,0,d16fbbe99dfa71ae0f58dae25f7eb40378a65b2fc6b062d93cc7fbca7fed5ad3,2017-07-11T01:30:02.497000 CVE-2004-0288,0,0,e7d35c35b4d43cd12bd27c6400ef38cb508599ceb7f9bcebfb7adf3341b3d7c3,2017-07-11T01:30:02.540000 @@ -20699,7 +20699,7 @@ CVE-2006-4989,0,0,c8f8336fb475c8b77442c832ff06b116e53ec3d6b8312b23f5e9acd82755c1 CVE-2006-4990,0,0,68e78265ed8a4059465d637668eeecd3177adb6612a6fa7cbeffd4e499dbf6b1,2018-10-17T21:40:46.843000 CVE-2006-4991,0,0,bed8d0e9764ff007e05ddffb5cf9d7b9cd584e0ba0e0ca4daa02142535927112,2018-10-17T21:40:49.280000 CVE-2006-4992,0,0,b8d0accf8f637a19df0e29fdf2230f06557325eddf4888299b929243d4ac85e9,2023-11-07T01:59:25.357000 -CVE-2006-4993,0,1,f6a35a486a060a4f4e33c50a6533794931439da174aa90e85e5f1a11cfdcbad1,2024-04-23T19:52:10.963000 +CVE-2006-4993,0,0,f6a35a486a060a4f4e33c50a6533794931439da174aa90e85e5f1a11cfdcbad1,2024-04-23T19:52:10.963000 CVE-2006-4994,0,0,c5ef94894f67872840e7af1237a13b217e874e8632eebd993ea8f0817545e4c7,2023-11-07T01:59:25.447000 CVE-2006-4995,0,0,9f54345c01b423490629d9b822ffec72c053418110b019deeaf9acc3385d1d62,2023-11-07T01:59:25.503000 CVE-2006-4996,0,0,737f972222c16b53ed01a9a4f964ea8ad5e7ddf27c68d4ea7a159bddd1a2bd06,2023-11-07T01:59:25.550000 @@ -23104,8 +23104,8 @@ CVE-2007-0167,0,0,6cd4c9ade160e632ceeeab387f2f2499f6f93a50a2b3169f74e363bd349f67 CVE-2007-0168,0,0,a0050464d8845d796c6f8ae4fc2a20e31ae37eb9cac07b6e2e52426630a8cabe,2021-04-07T18:53:50.540000 CVE-2007-0169,0,0,0a1d2970ccb0b23439136925bf805227c4ecaae40815eb2e9c2798fa0d08171c,2021-04-07T18:53:50.540000 CVE-2007-0170,0,0,2fdb53bbda6bb874a40a8eb5eadbc199a05dc61bcf29939ad238e05c27505b48,2017-10-19T01:29:56.877000 -CVE-2007-0171,0,1,d2226e45244da55f46fad664b1ca3ad0854391cdf8200cf071b7589aa51832c2,2024-04-23T19:52:32.443000 -CVE-2007-0172,0,1,0779ae5792a8552bc8272c20b39947f4059221cafa60623d9cf374e4ee689fc5,2024-04-23T19:52:27.450000 +CVE-2007-0171,0,0,d2226e45244da55f46fad664b1ca3ad0854391cdf8200cf071b7589aa51832c2,2024-04-23T19:52:32.443000 +CVE-2007-0172,0,0,0779ae5792a8552bc8272c20b39947f4059221cafa60623d9cf374e4ee689fc5,2024-04-23T19:52:27.450000 CVE-2007-0173,0,0,9e35c7150e9ede27174f0fa51be519750b2029054723f72f1a52aec76e911e72,2017-10-19T01:29:57.050000 CVE-2007-0174,0,0,7f7a52e6fa84076c43a3e8684f4e8ee641fa71f4d8f0d5cd36efb4a612dcd9bc,2018-10-16T16:31:33.853000 CVE-2007-0175,0,0,2803595c41c760cdd09df1de3fc2cc755b9a180ee6a03df5e6e915141c86ad4d,2017-07-29T01:30:01.923000 @@ -49193,7 +49193,7 @@ CVE-2011-2479,0,0,ea96e6a2bbba76561fd23117e5cc9c01f320acee594086228a9fc77f86cd54 CVE-2011-2480,0,0,2caa3c3f9928f2b9f769985d2d097dc928f38961695a36bf6dedb962a1063587,2019-12-10T18:31:42.187000 CVE-2011-2481,0,0,af086350743452129d38c65a28de9682e79eb88ec762814e94b29746bb28e87b,2023-11-07T02:07:41.860000 CVE-2011-2482,0,0,ae377ae7f1d01ad14ddea1a083686fae6fa1adc88f4460adb43143c5994fe0c4,2023-02-13T01:19:46.610000 -CVE-2011-2483,0,1,4fe49fd68a2f287a11f3923a628ae22b51586f171bb5a219b86e8150478f02d0,2024-04-23T19:57:33.843000 +CVE-2011-2483,0,0,4fe49fd68a2f287a11f3923a628ae22b51586f171bb5a219b86e8150478f02d0,2024-04-23T19:57:33.843000 CVE-2011-2484,0,0,f091721d23b1b471ad871d9bd7dbd20e81ab9a82115b4c1158d186b17d0759e2,2020-07-27T22:41:19.207000 CVE-2011-2485,0,0,371567b94b5e4c39bb9f5037074d0c7ac039a56289c29e3e453d852d9d896c01,2012-07-03T16:40:29.677000 CVE-2011-2486,0,0,675ec82931bf7cb75fe920931492eb49b152c633d41804eb65e783ba3a791fbf,2013-09-01T06:24:51.890000 @@ -180281,7 +180281,7 @@ CVE-2021-38198,0,0,7696d1781d4a6e6dd38679d773a122377b4c0939ef0b498dfcd5880d84d5c CVE-2021-38199,0,0,616df992225670ac31780c0efcc159084ba6f2ebff7eed7dceae196e7d72efd9,2021-12-21T12:54:21.507000 CVE-2021-3820,0,0,48f02685b471f1f43f375e9e04a0c37a8807abd18d490dcc1b054bae4526feb9,2022-07-29T16:57:55.093000 CVE-2021-38200,0,0,8a24f015ba3b51ed5cef349654270e9c3f1a6fb891297563cadaab34c54ac165,2021-08-12T14:24:53.037000 -CVE-2021-38201,0,1,f1843512ad29412c0a68086e86dc10ff3e41e09c77b3dfd8448188f697e73d3d,2024-04-23T18:57:47.143000 +CVE-2021-38201,0,0,f1843512ad29412c0a68086e86dc10ff3e41e09c77b3dfd8448188f697e73d3d,2024-04-23T18:57:47.143000 CVE-2021-38202,0,0,14faf085d2c84be5c44f9685f49354984c54aa73ea3dca07ce2e5825643630f5,2021-10-07T20:39:27.070000 CVE-2021-38203,0,0,8e7c322c1f9ec5ee808d54305c7b5dbc54e11ae76f98cbb9da1dd43756dec8cb,2022-05-03T16:04:40.443000 CVE-2021-38204,0,0,7dff5129b1cf28be9d17a961d6715a859b2471390672f824080ba793687c1cc2,2022-01-04T16:37:18.183000 @@ -197519,7 +197519,7 @@ CVE-2022-30001,0,0,9ea7556402d779647820b483c0e1325aaf1ae4ee6ec5c8343e4f2be222d1c CVE-2022-30002,0,0,a1ec15dce750f399632a47395f14eba75124d3844f1fe520b5aa5606d2a2855f,2022-05-21T03:07:18.990000 CVE-2022-30003,0,0,31e1d67aa0a2ecaec299f8af016c40ed494849a65c43f62f3e2e46bad29f1b30,2022-09-28T17:04:10.997000 CVE-2022-30004,0,0,b4989293c4645d9294ac11654eec236433c850b421daaeead194cd4e0dd5067c,2022-09-28T17:03:19.440000 -CVE-2022-30007,0,0,d865819d5fa65c9b32418636715f54735ae56387e319a2c4a14fe4f9497a0b14,2022-05-26T00:39:25.050000 +CVE-2022-30007,0,1,aa7c77313fa22c1f036fbd74aaf6589e3efbe2f34aa8c05f8f55278498ca2445,2024-04-23T20:15:07.160000 CVE-2022-3001,0,0,241186fa240affe9cf81bda98be3340e7b209585b3d42e5f160beb90ad55b3f8,2022-09-19T19:08:04.817000 CVE-2022-30011,0,0,a5dd8bf2e83f88b528c8ca5668042d8231268b9062d3c91b93eb2b8fd5941f57,2023-11-02T01:12:30.027000 CVE-2022-30012,0,0,0929777da5ceac88984634610aa273b30287d4672915d7d193c4b510ea42192e,2022-05-24T17:04:39.297000 @@ -241273,7 +241273,7 @@ CVE-2024-2263,0,0,df8d6f616c06d7efbf230a22645526f71cba2b5d98ac7477968fae54aee385 CVE-2024-22635,0,0,4862506d4e37fbac04654e9c145033c5c19772547553e0905cdb496418310552,2024-01-29T15:57:23.770000 CVE-2024-22636,0,0,d2329967243db7b2d90664e4db5aafab2eefb2c63c9125405da2b73ddd46c40f,2024-01-29T15:57:32.540000 CVE-2024-22637,0,0,26b297452537f73426f9b1e1c51d8375cdf08e35ab6ae3bee9824c37bc50f94b,2024-02-15T15:19:44.187000 -CVE-2024-22638,0,0,3af9b550c5e91fc5f9396d71fc0f20f86d7c6a12d36aa6b3628acd4047f5d092,2024-01-29T15:57:43.763000 +CVE-2024-22638,0,1,60058d6cb515c8aa3a8ab899f954be18d8e911ef19644ca8cbcf96f8a8fef453,2024-04-23T20:15:07.290000 CVE-2024-22639,0,0,d147d90780a694ff1383e30f52d6dbe1e7da032a2cc352a3c7766915866417f2,2024-01-29T15:57:50.477000 CVE-2024-2264,0,0,974a3209feed4d6057f1020f41685c0d8e8695fcbf79c0fbc4c6d1a61e8e6de4,2024-04-11T01:25:20.247000 CVE-2024-22640,0,0,1cf939be90392a4e496db73ac9b310c70c3d191887c946934cc9645d6269f346,2024-04-19T16:19:49.043000 @@ -242167,7 +242167,7 @@ CVE-2024-24548,0,0,9dbe1af5af4a9b865bf88b2a305b739ac231a7ce95c9c8ed04344b3144708 CVE-2024-24549,0,0,41f01a6ce0acab1e663a33240960755cce5d7348c8154f4ae0884170d1f21b3b,2024-04-06T06:15:08.030000 CVE-2024-24556,0,0,5eadc80f5e2b4d40f2247a29eb7c2aa8b2d9f2f191f8cfe4f491f2d184a6cbe7,2024-02-06T19:24:46.810000 CVE-2024-24557,0,0,803986686a1d77830cb33582e01547bf1b4ed013f71e8dbf2a84322efe6db933,2024-02-09T20:21:32.970000 -CVE-2024-24558,0,1,26ffac7b2f9dc8041f02bc6fb374f1f9b0b06e69d8b3e191802aa68af28d0bbc,2024-04-23T19:52:49.107000 +CVE-2024-24558,0,0,26ffac7b2f9dc8041f02bc6fb374f1f9b0b06e69d8b3e191802aa68af28d0bbc,2024-04-23T19:52:49.107000 CVE-2024-24559,0,0,a0cb86b836a7e79e3e1b100a5872aae73fa30cbfc276547c01a7202600c7c117,2024-02-12T21:40:56.547000 CVE-2024-2456,0,0,50cc90bc41b3799405fb23cbe82f5c15d252305910bd20a549ad8554a4e042cd,2024-04-10T13:23:38.787000 CVE-2024-24560,0,0,d3bc441b7f7323645f1a247e96e6668e58a3a1d0f8c643e79ccfcc74a44eb295,2024-02-12T15:23:42.867000 @@ -243312,7 +243312,7 @@ CVE-2024-26589,0,0,528da0ad6ce01bf77db8eec7de0776ce7a2f821b4949af8b66c0af55f0b75 CVE-2024-2659,0,0,f70d39261e85fb28ecf8b90e66824a1515a67332ae1cb9fb94b78b0878034f3f,2024-04-15T19:12:25.887000 CVE-2024-26590,0,0,abd86201bd23efc7d86afd5c0d7b0d654a2577ad84615d2348f851e6a7a9eae0,2024-03-18T17:54:20.197000 CVE-2024-26591,0,0,5929783d5428bb2c14c53508060d365bc2cc03643c73a5c691e380ff07f76710,2024-03-18T17:54:44.267000 -CVE-2024-26592,0,1,f757e026c76c6fd4946732bc503cc5d664f7a9fcf3e2d940e8aa27b4fa0ddffd,2024-04-23T19:46:27.683000 +CVE-2024-26592,0,0,f757e026c76c6fd4946732bc503cc5d664f7a9fcf3e2d940e8aa27b4fa0ddffd,2024-04-23T19:46:27.683000 CVE-2024-26593,0,0,98e4a4e90fea8bbd21c17da9b47a219607d5ce75195bf465a61fda95e4390501,2024-04-19T17:58:44.667000 CVE-2024-26594,0,0,07543a5cd1955430bfc49a61bb08638317c690c5df69e623c4efd4c3bc80964a,2024-04-19T18:42:49.670000 CVE-2024-26595,0,0,4aab14a348ba85d767a05d71533f3a3f5d4b6347adf8eb4cca8cbcf592f0a830,2024-04-17T19:55:31.323000 @@ -244667,7 +244667,7 @@ CVE-2024-29186,0,0,9eae16b82ad0960a39bab28b7331d7fbcb06214ff5e685dffe5ebccb6351d CVE-2024-29187,0,0,e759748c9eddb6fb94f310b6fbfd0a60978fe40972c402d0d57e603137386e75,2024-03-25T01:51:01.223000 CVE-2024-29188,0,0,936a9c226ba5e7f9ce4bf09d536924cb3ac611efe865e82a6596de0401a89ca0,2024-03-25T01:51:01.223000 CVE-2024-29189,0,0,6878e9b35a058677d2a3fa4fc5bfa3461c367e63050b0e9c52331e170e2ec716,2024-03-26T12:55:05.010000 -CVE-2024-2919,0,0,32a8e7a536908ee366830f3669988141427f95b22fc2af5934c8ce4e4bcd3650,2024-04-04T12:48:41.700000 +CVE-2024-2919,0,1,cab14862d675b468b7e5387271dae4d6b312c3201b5a28cf77935ce461c632ba,2024-04-23T21:15:48.110000 CVE-2024-29190,0,0,dd993808aabbfadd07f226263f194d2c29a65f1d0e197a65068c6fa33a34d2ff,2024-03-25T01:51:01.223000 CVE-2024-29191,0,0,b520f6c0ae464ba6b8ed6e55ee8e36c1dbac951b2168f7a78b0ab9cc09ee27cc,2024-04-04T16:33:06.610000 CVE-2024-29192,0,0,668f235aea1f149843465a9bb5e6c8d16a1e3bb6d67526ade216b3935ba2a245,2024-04-04T19:24:50.670000 @@ -245618,7 +245618,7 @@ CVE-2024-31204,0,0,d77d8a78ba72f2a1144250dcbd3aeb2b57d00c9418a1c9337730d8bd71684 CVE-2024-31205,0,0,b253fd2658a692223bc8e40aabe86fdefb374b65b71659aad1a1d9f39a934ec9,2024-04-08T18:48:40.217000 CVE-2024-31206,0,0,bd1cbc8a5901cc2b410cb59c86ef8c814546918b6efc52403de5ae308d36d9dc,2024-04-05T12:40:52.763000 CVE-2024-31207,0,0,af1a3137415a749d0a1549c9f6fa25303b24e194f3861bc2095545bb707985a2,2024-04-04T16:33:06.610000 -CVE-2024-31208,1,1,f64a273d7331256197537aa26a480aa4e0dfc51f9056697d51c22575b6ba6ddf,2024-04-23T18:15:14.457000 +CVE-2024-31208,0,0,f64a273d7331256197537aa26a480aa4e0dfc51f9056697d51c22575b6ba6ddf,2024-04-23T18:15:14.457000 CVE-2024-31209,0,0,dc7f150a1f8931f337c3d30121f71937562fb9b370a799204e5d75b796fcdc02,2024-04-04T16:33:06.610000 CVE-2024-31210,0,0,0c3a74f1634842d277fcf52471d61be8d27ebe967ace4d479af8f65fffdace19,2024-04-05T12:40:52.763000 CVE-2024-31211,0,0,37f6ef15b9def8ff0d686fae9ad61ad1a082be15bc6a18f70a40cbfe15e962e2,2024-04-05T12:40:52.763000 @@ -245785,7 +245785,7 @@ CVE-2024-3147,0,0,f05061e9d718b866336ceef3f83885c168403f8d387cf11dbe00ac736df358 CVE-2024-3148,0,0,12b6e15e00d964ce79c059c99a6c4df70691a740ad2056657f2d4843c78fc654,2024-04-11T01:25:55.337000 CVE-2024-31487,0,0,ffef7fcdc05bb476a1f2c02c71de4a76075ea7f0301d6a8889db629ce9b194c6,2024-04-10T13:24:22.187000 CVE-2024-31492,0,0,a251126d380ad734bdcae40155276c0c8cd0f78c057d6c232814179759c90bf9,2024-04-10T19:49:51.183000 -CVE-2024-31497,0,1,d6b4bcfa71e3a1696f4ae8c4f0f836abdfcd8a872f251758c7124dbc72616b69,2024-04-23T18:15:14.660000 +CVE-2024-31497,0,0,d6b4bcfa71e3a1696f4ae8c4f0f836abdfcd8a872f251758c7124dbc72616b69,2024-04-23T18:15:14.660000 CVE-2024-31498,0,0,db3c4e2337e3fccc66e084ef6016d8532925f451bef4124b0c2782f0c54d90b6,2024-04-08T00:15:08 CVE-2024-31503,0,0,a2a7c8d9eaf4775895950c76302a02326a8d6e67bb7d5ec85d9e8a8516e17053,2024-04-17T12:48:07.510000 CVE-2024-31506,0,0,8be7ef5b3e9d65e4bba9dd63e2b7475f0658a4b183369094a98038d4eee40099,2024-04-10T13:24:00.070000 @@ -246124,7 +246124,7 @@ CVE-2024-32478,0,0,767d0906439929f5e4e53d4d2396aabddb8a0de51e7967f13464fca079c70 CVE-2024-32479,0,0,9f233b992ed22cd02276821942e34be3b1cd724f5562f573e840e7a10cf66aba,2024-04-23T12:52:26.253000 CVE-2024-3248,0,0,65f6d4ddfc43ae235edf2e59fc9daa1f1d020439a4fa197a41a6ddd58e106004,2024-04-03T12:38:04.840000 CVE-2024-32480,0,0,f740881091f1f05e0445ba97b5de61d4d063547c57ff7478943e1cd018db3728,2024-04-23T12:52:26.253000 -CVE-2024-32482,1,1,d968a70aa898a4f3f97bc16df8c7125cc3072d2ec01d0f51343071622157545c,2024-04-23T18:15:14.810000 +CVE-2024-32482,0,0,d968a70aa898a4f3f97bc16df8c7125cc3072d2ec01d0f51343071622157545c,2024-04-23T18:15:14.810000 CVE-2024-32487,0,0,746d95a6c3889a9e0164763739aef81432a5222f159aa33a064a3132dbd4a7ad,2024-04-15T13:15:31.997000 CVE-2024-32488,0,0,6ce6bcee8af0a677e98d2bf7a3efd66cf8a3e580423515387116f39d710ba974,2024-04-15T13:15:31.997000 CVE-2024-32489,0,0,cbc8895e7f5e99c09f7bd505220fcc5514b4573939580e3f381a933acf3c9ef0,2024-04-15T13:15:31.997000 @@ -246242,8 +246242,12 @@ CVE-2024-32652,0,0,507899e8cc0ef719a4df6a408b43b1aeaf42e8d25b41dcf9a35617406adcc CVE-2024-32653,0,0,96a4de58183f8a4c5475803e77d708dc553ab0aba5c22712929dba4355cb603d,2024-04-23T12:52:26.253000 CVE-2024-32656,0,0,507ca72541b43d2bb1e3f8cba739ba39a5095ac212b37ee6cfc977f3944f903a,2024-04-23T12:52:26.253000 CVE-2024-32657,0,0,45665c321c855eccec4d820153233a5ab3c0184c9eb39067bd012d7165ff1a87,2024-04-23T12:52:26.253000 -CVE-2024-32658,1,1,7069993bd5ea0f3424896d58f9e2d6edcb0d553ec3f3fcbae32b44ca4bca3d06,2024-04-23T18:15:15 +CVE-2024-32658,0,0,7069993bd5ea0f3424896d58f9e2d6edcb0d553ec3f3fcbae32b44ca4bca3d06,2024-04-23T18:15:15 +CVE-2024-32659,1,1,3863493766e8b92f6e935a4c624689c9791585ec089717c13ff45c96f4bafeec,2024-04-23T20:15:07.407000 CVE-2024-3266,0,0,254a5ba127b10ac48f062b62dbe4c90ef51eaba1ed741161e5a22416cbb32240,2024-04-10T13:23:38.787000 +CVE-2024-32660,1,1,d62fd7f207ea2a95737f95de3789bba0f5e2e8c6d3dba892168735cafbe777f5,2024-04-23T20:15:07.617000 +CVE-2024-32661,1,1,b3ea525969a9e5c2dcb91781acfcb1f5f215822dc7619cb2b5af90a890d7189f,2024-04-23T20:15:07.800000 +CVE-2024-32662,1,1,0badc9bcc789e6aa6c2864071ddc14c3ca8e18de773ff401805be71e226c3d0e,2024-04-23T21:15:48.200000 CVE-2024-3267,0,0,00a210ede7a73ca33b64d3b8a0e382509d5bafa34ae84022125b180763aee2bd,2024-04-10T13:23:38.787000 CVE-2024-32679,0,0,ef89c247f793ab0c364d15f1c12e10a818494992e9afdd2f8a5235049bafdc91,2024-04-23T15:15:49.823000 CVE-2024-32681,0,0,30385cf8415af0417b19f52d5eb22ace0b875cd333ead985847624dbf28043cd,2024-04-22T13:28:34.007000 @@ -246274,6 +246278,9 @@ CVE-2024-32746,0,0,15529f833c25b7b5b5022877593c49d5afec10018bbf65b56334a694e0bc4 CVE-2024-3281,0,0,b3c51db3aca3b371ad4faa3c1c4537d2c54d8323123f7ae9b26414cd9ee432a6,2024-04-10T13:24:22.187000 CVE-2024-3283,0,0,8b1939d21df3d4399a3bf874e70470053c1a0ae20421841ad51c79aca5727c56,2024-04-10T19:49:51.183000 CVE-2024-3285,0,0,ea17e16acaa3172cbcc052cf9bfb1b3e7ee2b004434b062b8e67c1c1ed8bff14,2024-04-11T12:47:44.137000 +CVE-2024-32866,1,1,05678f43fde377094870958f3884da0ddab39ebb03caf1126589a6adb2aeb008,2024-04-23T21:15:48.407000 +CVE-2024-32869,1,1,ab50b9f75b25c61594accda9ae6ab253572d5f8b04d2fd0a7c7a99be62faabe2,2024-04-23T21:15:48.623000 +CVE-2024-32875,1,1,d07c3544404bdf6b8e4f3a41c660a40665138d4b2b82393b554fde4845ce31d9,2024-04-23T21:15:48.837000 CVE-2024-3293,0,0,3552485a27a6b6c8b2cadd17fbdb3e630238722099a3e2d8d97b0f239cd2dc1a,2024-04-23T12:52:26.253000 CVE-2024-3296,0,0,bcc39314c1e9f6d53aa0ccc8e7e7cac7c279f7f6ee5a27f19287b128ea2ed6c7,2024-04-05T12:15:37.777000 CVE-2024-3298,0,0,35145d829af4d19541380a93e6723503e514b69e11aa4b007b05099610c37f21,2024-04-04T16:33:06.610000 @@ -246329,7 +246336,7 @@ CVE-2024-3385,0,0,dafd55987e5738b5d6ec37d523526a7e0269d60d96cd780933abafbc800645 CVE-2024-3386,0,0,d08d523d066834a85bfe06023f05a033d8631a6197479f66bfb86438af143c6d,2024-04-10T19:49:51.183000 CVE-2024-3387,0,0,59a783d7f5a632f1312dc02ccd745e7c758f93e478c4554a0dbc9aba27d256c0,2024-04-10T19:49:51.183000 CVE-2024-3388,0,0,9a13547aa29d2171bfe252870fb3dde44261a463a11a31d9062dc130e0f3c4f3,2024-04-10T19:49:51.183000 -CVE-2024-3400,0,1,5bb68c1f741d7492d6e3e08b6f1711eb6e28a4a827bd2f3f354ccd1b7a47a1fe,2024-04-23T19:57:25.207000 +CVE-2024-3400,0,0,5bb68c1f741d7492d6e3e08b6f1711eb6e28a4a827bd2f3f354ccd1b7a47a1fe,2024-04-23T19:57:25.207000 CVE-2024-3413,0,0,7c0263f5aa26015f580f259b17ac76e3fb232807ce6eb6b3e0fa4a42d34def58,2024-04-11T01:26:00.727000 CVE-2024-3414,0,0,fcf8b2012e3dcab7048965e9d40e8c26f25a86217cc70e6c24a2ae712b119943,2024-04-11T01:26:00.803000 CVE-2024-3415,0,0,80d83d8ba89e3620cb20eb7a8b2b10e1c5fbd8b76c068e7c00b4af6deadd81dd,2024-04-11T01:26:00.900000 @@ -246494,19 +246501,19 @@ CVE-2024-3804,0,0,d2c04bcba3b9dcee33d8ad0e898646d48639f7e3e6aed11c413cf03cea6afb CVE-2024-3817,0,0,46e4b3903939ad7f28eeb8afee28fc4c5b18be71847d60ae426ede3b66e11122,2024-04-18T13:04:28.900000 CVE-2024-3818,0,0,3b93c96d931c7712dba585285a5a0f954163c40c8ab2b4d2e42e74b7a416a166,2024-04-19T13:10:25.637000 CVE-2024-3825,0,0,f398f78dcc905612b8b1fff020bcc62d405b80ffdf3a9053d9f90f163c40baa7,2024-04-17T15:31:50.160000 -CVE-2024-3832,0,1,1075b96952121645fbb81b228e0c3813e39db7e21c4c9aa1fc24c30b61618c13,2024-04-23T18:15:15.187000 -CVE-2024-3833,0,1,a457fea2be3570f92e174a05ad3ebccc260fba3d80fa99b9571951cefff83bf8,2024-04-23T18:15:15.247000 -CVE-2024-3834,0,1,d74323c3b1f82373afa6afa9a2099c919ed3327f614f52d5ae9ffbb2921db60f,2024-04-23T18:15:15.290000 -CVE-2024-3837,0,1,1a7543d4c4d038a08e38b9f40b6dd120ea1a46620fdb71cd83a132c5f4434d75,2024-04-23T18:15:15.350000 -CVE-2024-3838,0,1,bd55ca068ebe4472845bce1f3d037932d27279da54b129864c942318cbf6c399,2024-04-23T18:15:15.410000 -CVE-2024-3839,0,1,c6f5f4ba36659bbdf95cdeb0e47e41641932dccad8eaf764f80b72ad0dd47f13,2024-04-23T18:15:15.467000 -CVE-2024-3840,0,1,c5e7f6b1ea42f8b045423d9acc57d84648dca4d80ba872d4df6831e3c4cf4908,2024-04-23T18:15:15.520000 -CVE-2024-3841,0,1,85253b65c449a8cc578a7de0959057d75700f84aa10824187b3b99abb67adde7,2024-04-23T18:15:15.570000 -CVE-2024-3843,0,1,832cfd8f4407c61d4a78edbbcbe24a6a38c56c364aead34f5b47a06d711bf3df,2024-04-23T18:15:15.610000 -CVE-2024-3844,0,1,c12354244043fbfc51820f35c8a63b4dfe16d1459a37300b3a4231a1ddd9e60f,2024-04-23T18:15:15.650000 -CVE-2024-3845,0,1,e7fa4e6524d058fce6ed4d80d8501b11a06f3e2ff47789c744cfd8da13426ec7,2024-04-23T18:15:15.690000 -CVE-2024-3846,0,1,b465ce0b0fca30612f30027655057056e96c1e5f955b7bd495917b047afcd41a,2024-04-23T18:15:15.733000 -CVE-2024-3847,0,1,92826ca89ff64563c0ca9b0b7e1566037f47624d36b52031222c1c623aa66584,2024-04-23T18:15:15.783000 +CVE-2024-3832,0,0,1075b96952121645fbb81b228e0c3813e39db7e21c4c9aa1fc24c30b61618c13,2024-04-23T18:15:15.187000 +CVE-2024-3833,0,0,a457fea2be3570f92e174a05ad3ebccc260fba3d80fa99b9571951cefff83bf8,2024-04-23T18:15:15.247000 +CVE-2024-3834,0,0,d74323c3b1f82373afa6afa9a2099c919ed3327f614f52d5ae9ffbb2921db60f,2024-04-23T18:15:15.290000 +CVE-2024-3837,0,0,1a7543d4c4d038a08e38b9f40b6dd120ea1a46620fdb71cd83a132c5f4434d75,2024-04-23T18:15:15.350000 +CVE-2024-3838,0,0,bd55ca068ebe4472845bce1f3d037932d27279da54b129864c942318cbf6c399,2024-04-23T18:15:15.410000 +CVE-2024-3839,0,0,c6f5f4ba36659bbdf95cdeb0e47e41641932dccad8eaf764f80b72ad0dd47f13,2024-04-23T18:15:15.467000 +CVE-2024-3840,0,0,c5e7f6b1ea42f8b045423d9acc57d84648dca4d80ba872d4df6831e3c4cf4908,2024-04-23T18:15:15.520000 +CVE-2024-3841,0,0,85253b65c449a8cc578a7de0959057d75700f84aa10824187b3b99abb67adde7,2024-04-23T18:15:15.570000 +CVE-2024-3843,0,0,832cfd8f4407c61d4a78edbbcbe24a6a38c56c364aead34f5b47a06d711bf3df,2024-04-23T18:15:15.610000 +CVE-2024-3844,0,0,c12354244043fbfc51820f35c8a63b4dfe16d1459a37300b3a4231a1ddd9e60f,2024-04-23T18:15:15.650000 +CVE-2024-3845,0,0,e7fa4e6524d058fce6ed4d80d8501b11a06f3e2ff47789c744cfd8da13426ec7,2024-04-23T18:15:15.690000 +CVE-2024-3846,0,0,b465ce0b0fca30612f30027655057056e96c1e5f955b7bd495917b047afcd41a,2024-04-23T18:15:15.733000 +CVE-2024-3847,0,0,92826ca89ff64563c0ca9b0b7e1566037f47624d36b52031222c1c623aa66584,2024-04-23T18:15:15.783000 CVE-2024-3852,0,0,3038e46972183e994310b2b410f139aaace8bd74e7e7e979d336a57b5feba459,2024-04-22T10:15:07.430000 CVE-2024-3853,0,0,da9bcb4a065926b49732a0dd79b2f07a12fd9777c9341906bc363e07df8725cf,2024-04-17T12:48:31.863000 CVE-2024-3854,0,0,1fc25728bc86cd277ba270d144040c69a89e438f315d3ebf85291cac5fb28ebb,2024-04-22T10:15:07.470000 @@ -246544,7 +246551,7 @@ CVE-2024-3908,0,0,26db16f32c52be83b374f19657727a3a2a3db16f8ab3cda20dc3ad146f877b CVE-2024-3909,0,0,c5efb647be20bf9f2ba452fa9666b153466b94d0e5f3c713649def6568acf5a0,2024-04-17T12:48:07.510000 CVE-2024-3910,0,0,7d8aafa4b35964a72cdc3d08dd6c7b1615ef522d553c6c78d413b0e25fdc718e,2024-04-17T12:48:07.510000 CVE-2024-3911,0,0,11f3bec5f1587eb22151392a8d155bb89d10f83f95efada567bdaf5751a2af93,2024-04-23T13:15:46.770000 -CVE-2024-3914,0,1,97e3c2a1ceda5baa1eed65646997d7cab2203eabae8e05a9bf7340c2163a5004,2024-04-23T18:15:15.823000 +CVE-2024-3914,0,0,97e3c2a1ceda5baa1eed65646997d7cab2203eabae8e05a9bf7340c2163a5004,2024-04-23T18:15:15.823000 CVE-2024-3928,0,0,114c97f372c53f33fe3b26cd091686f1eb78a3749714814b77901a77b62a0107,2024-04-18T13:04:28.900000 CVE-2024-3931,0,0,adc8a79b07f48b35a9681a97a568e852ba1ef2cbd3b7271f585750c2d2c4216b,2024-04-18T13:04:28.900000 CVE-2024-3932,0,0,bce0f8b09e2fc4acc0cfce5940d57ce5f1e0384ac19f6c68ed218175688d8f12,2024-04-18T13:04:28.900000 @@ -246560,5 +246567,8 @@ CVE-2024-4022,0,0,ebd323c8f90bdf29bd6ff35ea1eff449874a3d962dc85b687039f47f7b416e CVE-2024-4026,0,0,65bff2dba626fde0f88488c1e6df610a37e761e2e041855587a3bbcb3e849c23,2024-04-22T13:28:34.007000 CVE-2024-4031,0,0,4baeaad68cf3411bf45d41e53c64aca0aa19dc8cf620cd2c5028b0d61a50ba2c,2024-04-23T12:52:09.397000 CVE-2024-4040,0,0,1c076b2ab70ecb1e80edff07a45eda641d4fa881fea89ccf32a60b6e73154ae3,2024-04-23T12:52:26.253000 -CVE-2024-4062,1,1,fd0989c37011fb6cb5794fb7df968df0263f3f31c3aef5d67b3f6a349ba1e358,2024-04-23T19:15:46.553000 -CVE-2024-4063,1,1,2008c390464bacff63172644a55a59e96a94988eb99fab2491b3e8e538a775f3,2024-04-23T19:15:46.870000 +CVE-2024-4062,0,0,fd0989c37011fb6cb5794fb7df968df0263f3f31c3aef5d67b3f6a349ba1e358,2024-04-23T19:15:46.553000 +CVE-2024-4063,0,0,2008c390464bacff63172644a55a59e96a94988eb99fab2491b3e8e538a775f3,2024-04-23T19:15:46.870000 +CVE-2024-4064,1,1,09ee7a85b82de580b2a486361eb0eaa08998727fa590a9268296692079168787,2024-04-23T20:15:07.997000 +CVE-2024-4065,1,1,a5da92576f462db4d931c9ed36d295da893b4e991ec9663049a58cac021ab267,2024-04-23T20:15:08.223000 +CVE-2024-4066,1,1,56a8ad546d4df99104a2f9d47e1c66543e4a309385ab664f82bdeb489fbff99f,2024-04-23T21:15:49.040000