Auto-Update: 2024-04-18T02:00:30.406137+00:00

This commit is contained in:
cad-safe-bot 2024-04-18 02:03:20 +00:00
parent cbf849b8dd
commit a32a8285a0
7 changed files with 332 additions and 23 deletions

View File

@ -0,0 +1,43 @@
{
"id": "CVE-2023-4509",
"sourceIdentifier": "security@octopus.com",
"published": "2024-04-18T00:15:07.340",
"lastModified": "2024-04-18T00:15:07.340",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "It is possible for an API key to be logged in clear text in the audit log file after an invalid login attempt."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security@octopus.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 1.4
}
]
},
"references": [
{
"url": "https://advisories.octopus.com/post/2024/sa2024-02/",
"source": "security@octopus.com"
}
]
}

View File

@ -2,11 +2,11 @@
"id": "CVE-2024-3400",
"sourceIdentifier": "psirt@paloaltonetworks.com",
"published": "2024-04-12T08:15:06.230",
"lastModified": "2024-04-16T01:00:01.463",
"lastModified": "2024-04-18T01:00:01.527",
"vulnStatus": "Undergoing Analysis",
"cisaExploitAdd": "2024-04-12",
"cisaActionDue": "2024-04-19",
"cisaRequiredAction": "Apply mitigations per vendor instructions as they become available. Otherwise, users with vulnerable versions of affected devices should enable Threat Prevention Threat ID 95187 if that is available, or disable device telemetry until patches are available from the vendor. See the vendor bulletin for more details and a patch release schedule.",
"cisaRequiredAction": "Apply mitigations per vendor instructions as they become available. Otherwise, users with vulnerable versions of affected devices should enable Threat Prevention IDs available from the vendor. See the vendor bulletin for more details and a patch release schedule.",
"cisaVulnerabilityName": "Palo Alto Networks PAN-OS Command Injection Vulnerability",
"descriptions": [
{

View File

@ -0,0 +1,92 @@
{
"id": "CVE-2024-3928",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-04-18T00:15:07.523",
"lastModified": "2024-04-18T00:15:07.523",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was found in Dromara open-capacity-platform 2.0.1. It has been declared as problematic. Affected by this vulnerability is an unknown functionality of the file /actuator/heapdump of the component auth-server. The manipulation leads to information disclosure. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-261367."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 1.4
}
],
"cvssMetricV2": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:S/C:P/I:N/A:N",
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "SINGLE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.0
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 8.0,
"impactScore": 2.9,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-200"
}
]
}
],
"references": [
{
"url": "https://github.com/ggfzx/OCP-Security-Misconfiguration/tree/main",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?ctiid.261367",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?id.261367",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?submit.313847",
"source": "cna@vuldb.com"
}
]
}

View File

@ -0,0 +1,84 @@
{
"id": "CVE-2024-3931",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-04-18T00:15:07.810",
"lastModified": "2024-04-18T00:15:07.810",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was found in Totara LMS 18.0.1 Build 20231128.01. It has been rated as problematic. Affected by this issue is some unknown functionality of the file admin/roles/check.php of the component Profile Handler. The manipulation of the argument ID Number leads to cross site scripting. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-261368. NOTE: The vendor was contacted early about this disclosure but did not respond in any way."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 3.5,
"baseSeverity": "LOW"
},
"exploitabilityScore": 2.1,
"impactScore": 1.4
}
],
"cvssMetricV2": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:S/C:N/I:P/A:N",
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "SINGLE",
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"availabilityImpact": "NONE",
"baseScore": 4.0
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 8.0,
"impactScore": 2.9,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://vuldb.com/?ctiid.261368",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?id.261368",
"source": "cna@vuldb.com"
}
]
}

View File

@ -0,0 +1,88 @@
{
"id": "CVE-2024-3932",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-04-18T00:15:08.033",
"lastModified": "2024-04-18T00:15:08.033",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability classified as problematic has been found in Totara LMS 18.0.1 Build 20231128.01. This affects an unknown part. The manipulation leads to cross-site request forgery. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-261369 was assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 1.4
}
],
"cvssMetricV2": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N",
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"availabilityImpact": "NONE",
"baseScore": 5.0
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 10.0,
"impactScore": 2.9,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-352"
}
]
}
],
"references": [
{
"url": "https://vuldb.com/?ctiid.261369",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?id.261369",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?submit.314381",
"source": "cna@vuldb.com"
}
]
}

View File

@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update
```plain
2024-04-17T23:55:29.811495+00:00
2024-04-18T02:00:30.406137+00:00
```
### Most recent CVE Modification Timestamp synchronized with NVD
```plain
2024-04-17T23:15:07.517000+00:00
2024-04-18T01:00:01.527000+00:00
```
### Last Data Feed Release
@ -27,32 +27,30 @@ Repository synchronizes with the NVD every 2 hours.
Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/releases/latest)
```plain
2024-04-17T00:00:20.264953+00:00
2024-04-18T00:00:20.277253+00:00
```
### Total Number of included CVEs
```plain
246189
246193
```
### CVEs added in the last Commit
Recently added CVEs: `7`
Recently added CVEs: `4`
- [CVE-2023-4232](CVE-2023/CVE-2023-42xx/CVE-2023-4232.json) (`2024-04-17T23:15:06.970`)
- [CVE-2023-4233](CVE-2023/CVE-2023-42xx/CVE-2023-4233.json) (`2024-04-17T23:15:07.163`)
- [CVE-2023-4234](CVE-2023/CVE-2023-42xx/CVE-2023-4234.json) (`2024-04-17T23:15:07.330`)
- [CVE-2023-4235](CVE-2023/CVE-2023-42xx/CVE-2023-4235.json) (`2024-04-17T23:15:07.517`)
- [CVE-2024-29952](CVE-2024/CVE-2024-299xx/CVE-2024-29952.json) (`2024-04-17T22:15:08.080`)
- [CVE-2024-29955](CVE-2024/CVE-2024-299xx/CVE-2024-29955.json) (`2024-04-17T22:15:08.370`)
- [CVE-2024-32472](CVE-2024/CVE-2024-324xx/CVE-2024-32472.json) (`2024-04-17T22:15:08.557`)
- [CVE-2023-4509](CVE-2023/CVE-2023-45xx/CVE-2023-4509.json) (`2024-04-18T00:15:07.340`)
- [CVE-2024-3928](CVE-2024/CVE-2024-39xx/CVE-2024-3928.json) (`2024-04-18T00:15:07.523`)
- [CVE-2024-3931](CVE-2024/CVE-2024-39xx/CVE-2024-3931.json) (`2024-04-18T00:15:07.810`)
- [CVE-2024-3932](CVE-2024/CVE-2024-39xx/CVE-2024-3932.json) (`2024-04-18T00:15:08.033`)
### CVEs modified in the last Commit
Recently modified CVEs: `0`
Recently modified CVEs: `1`
- [CVE-2024-3400](CVE-2024/CVE-2024-34xx/CVE-2024-3400.json) (`2024-04-18T01:00:01.527`)
## Download and Usage

View File

@ -230017,7 +230017,7 @@ CVE-2023-42307,0,0,ce382c187fb7a4dc1beb875d9d0cc216e45f2fc80e1bb73f16f8b6f543bfb
CVE-2023-42308,0,0,cb65467d45f4c68f0a1c71a970a325eb4ae4d780de531cbeadeee9e224398dfb,2024-03-13T12:33:51.697000
CVE-2023-4231,0,0,8f640e44e1ac72a836fc1505a4e35fd5e284976970137749896ab1acfd50454e,2023-09-20T15:34:03.560000
CVE-2023-42319,0,0,87c7f208f7b7fa9dd6600e58b74858fba05deaefd76c0c4895dbb2329a41e4f1,2023-10-25T17:39:00.483000
CVE-2023-4232,1,1,22f9f3003baa971ecc442208593e336b5538d8d2ff696fe205678fe06de83037,2024-04-17T23:15:06.970000
CVE-2023-4232,0,0,22f9f3003baa971ecc442208593e336b5538d8d2ff696fe205678fe06de83037,2024-04-17T23:15:06.970000
CVE-2023-42320,0,0,3e7352de3aa6a2b56fea495ac18def69c814404eafb546927db3da5449ccca60,2023-09-21T17:37:44.687000
CVE-2023-42321,0,0,a9d3dad5c979397311768d2d8e7385c3b67a9229ee5239fc319d92d6ccdf28d9,2023-09-22T19:22:09.960000
CVE-2023-42322,0,0,f51c469ec66aa78bf1bddfd31d04f56e239cbd95a3f7919a9b6fda2ac1f5f8ac,2023-09-23T03:42:57.927000
@ -230026,13 +230026,13 @@ CVE-2023-42325,0,0,6c1f4ed57f48948ce9cfc30a4377d71ffc4c56d4c9d31f0e6886721ee68d1
CVE-2023-42326,0,0,65cb58c24a100a4b7d7cc1b87107ce8335b9dd2ff9415c116d0324f26015d854,2023-12-12T20:15:07.807000
CVE-2023-42327,0,0,dc17be2b5ae230f12251ba509da7b88646fb5698fd06ebe4ca1f917fc7979d8b,2023-12-12T20:15:07.867000
CVE-2023-42328,0,0,32a02006f7cc2ebca42918038c6b77c8b90ce4ad120066b09bec6b773c3c8adf,2023-09-21T17:48:17.520000
CVE-2023-4233,1,1,fb2a8b6a17bb21cebd079d4f4d9ea5e517d7f044f81129d989eeb4b441a06a62,2024-04-17T23:15:07.163000
CVE-2023-4233,0,0,fb2a8b6a17bb21cebd079d4f4d9ea5e517d7f044f81129d989eeb4b441a06a62,2024-04-17T23:15:07.163000
CVE-2023-42331,0,0,42653761bad098b0c4327d40791810a1e14184ca77d0408deba71c659e97b6c9,2023-10-13T01:19:51.037000
CVE-2023-42334,0,0,dc85f41ac33c8f46ba5464f6347fdd227b5819cc16d25bf8711c22468f10f42f,2023-09-22T02:10:48.637000
CVE-2023-42335,0,0,e816a9ad9da337f19a12e35c3dc875f6c604f80ee9f24737cd61f20fdb017380,2023-09-22T02:11:00.637000
CVE-2023-42336,0,0,50b89d1dd1d2271f828f4723297f4d3c69a79456b1f998bf3f3f4fa1aec0d82e,2023-09-20T20:55:55.307000
CVE-2023-4234,1,1,8dc2f74a9d69f007a2e77cccef83d943d3b6359a6f099dd97eeb107286eed48c,2024-04-17T23:15:07.330000
CVE-2023-4235,1,1,84286b8421ec78029048e84eac2d08ae1e51d6356fe64f0871c2dccc591624a2,2024-04-17T23:15:07.517000
CVE-2023-4234,0,0,8dc2f74a9d69f007a2e77cccef83d943d3b6359a6f099dd97eeb107286eed48c,2024-04-17T23:15:07.330000
CVE-2023-4235,0,0,84286b8421ec78029048e84eac2d08ae1e51d6356fe64f0871c2dccc591624a2,2024-04-17T23:15:07.517000
CVE-2023-42358,0,0,6a9ae5d1522b295c400ceb9de3acc488b399e291c07e9743cf6d77112b3cd474,2024-01-10T19:39:10.430000
CVE-2023-42359,0,0,43d5430ef7f42022ff5934174ff6b248d86704598bb7094b6e8db4d10d1b7688,2023-09-19T21:24:04.917000
CVE-2023-4236,0,0,64d74ccb60406eacd6dc3bec45c5dcfba20f9a20a5391537d7d1810abb634751,2024-02-01T00:53:41.997000
@ -231692,6 +231692,7 @@ CVE-2023-4508,0,0,f9ad50d23b9e42cc3c782f7b416b9ae1c64ceaf527646ce8727a68962f0369
CVE-2023-45083,0,0,a37adba5d127df7ce42d0c7509f473d2f387943a9e1ce94b97427bf02502a851,2023-12-12T16:40:40.463000
CVE-2023-45084,0,0,befb029ae9c961958946207946c26b4cab5e43363cc2d6c4dfadcd7d799875ff,2023-12-12T16:41:49.943000
CVE-2023-45085,0,0,e762b94add0cfd589cfa20b9744aa4e936aa52404371c90f082ccc967a2a818e,2023-12-12T16:14:09.460000
CVE-2023-4509,1,1,3bd721e68e72653922a484e2d270a5ac26a70bdd9771062f965af3e69c1d1917,2024-04-18T00:15:07.340000
CVE-2023-45102,0,0,a38b63bc09aca0182a9b8615c570ab3c18bd01a8c26bdc4f3524ef598a2b5002,2023-10-16T12:57:20.570000
CVE-2023-45103,0,0,8572ddf2749e5f070632f0177beb2edf78b8894ef3de63b13ee259fbc848a5f3,2023-10-16T12:57:31.997000
CVE-2023-45105,0,0,63be40f65735e6e3bdc913dfb1cb1a73c6f09af55f934b7a6b4aee54ca36601d,2024-02-03T01:40:06.433000
@ -244852,8 +244853,8 @@ CVE-2024-29949,0,0,2c66313a6c0e08be78f3175b6236e7b43ba69f970bb136fedf0178adbd27c
CVE-2024-2995,0,0,c87d76122714da8733dd7ff61010b11be1c71aaeaf58b39102c125532e66911b,2024-04-11T01:25:44.730000
CVE-2024-29950,0,0,4f55f4765dc732e5e5a2daa4589744a2dced20d7b31c8e7e2379aabe94d7be56,2024-04-17T20:08:21.887000
CVE-2024-29951,0,0,77ce0884f5270dcd8a3d9ca69626d640acd087f2571ecfb080c37be74cd27b9e,2024-04-17T20:15:08.060000
CVE-2024-29952,1,1,a0265751f5390eeca22f1eb44bddad6c76c4c6d02921a7c2cbe5a33caeb09696,2024-04-17T22:15:08.080000
CVE-2024-29955,1,1,0ce96b7cf571df75a34dd3d914ad078ffc8e330709197ef076bfaee069b6fed9,2024-04-17T22:15:08.370000
CVE-2024-29952,0,0,a0265751f5390eeca22f1eb44bddad6c76c4c6d02921a7c2cbe5a33caeb09696,2024-04-17T22:15:08.080000
CVE-2024-29955,0,0,0ce96b7cf571df75a34dd3d914ad078ffc8e330709197ef076bfaee069b6fed9,2024-04-17T22:15:08.370000
CVE-2024-2996,0,0,ce0ff76245864ce5ac90a5463bb82f1b7ea8cb5b36b1788a5a81e2b6f1ea29d1,2024-04-11T01:25:44.817000
CVE-2024-2997,0,0,9898fb7013ec19b0561eed8c77e485f2157863b27165155c8b5ee1597a437181,2024-04-11T01:25:44.910000
CVE-2024-2998,0,0,d70ba68eced6e12f3efc70fcd8b1293409b727b749095518ed0181052dee5fce,2024-04-11T01:25:44.997000
@ -245867,7 +245868,7 @@ CVE-2024-32456,0,0,c79ba4d56dc0cdd920d4bb67e9e6156d87b788691247bcddf5f9ecb31f2e2
CVE-2024-32457,0,0,1a428b7a00f1286f4863395037a31505955e8cbdc6b1fed202f720e69656314d,2024-04-17T12:48:07.510000
CVE-2024-32463,0,0,1671e195c4973ac11a31a2856358d6fb78fc6f39ffe0d1d851cfbba7a397b723,2024-04-17T16:51:07.347000
CVE-2024-3247,0,0,095afc187e8f976bc1a2eaa79a4c0328aa3c3e2487a10203585d8616775f8a4d,2024-04-03T12:38:04.840000
CVE-2024-32472,1,1,c62e62d9ac3721b4538fe82068a41602b08e03441973add0ac8d54aa59cadef8,2024-04-17T22:15:08.557000
CVE-2024-32472,0,0,c62e62d9ac3721b4538fe82068a41602b08e03441973add0ac8d54aa59cadef8,2024-04-17T22:15:08.557000
CVE-2024-3248,0,0,65f6d4ddfc43ae235edf2e59fc9daa1f1d020439a4fa197a41a6ddd58e106004,2024-04-03T12:38:04.840000
CVE-2024-32487,0,0,746d95a6c3889a9e0164763739aef81432a5222f159aa33a064a3132dbd4a7ad,2024-04-15T13:15:31.997000
CVE-2024-32488,0,0,6ce6bcee8af0a677e98d2bf7a3efd66cf8a3e580423515387116f39d710ba974,2024-04-15T13:15:31.997000
@ -245991,7 +245992,7 @@ CVE-2024-3385,0,0,dafd55987e5738b5d6ec37d523526a7e0269d60d96cd780933abafbc800645
CVE-2024-3386,0,0,d08d523d066834a85bfe06023f05a033d8631a6197479f66bfb86438af143c6d,2024-04-10T19:49:51.183000
CVE-2024-3387,0,0,59a783d7f5a632f1312dc02ccd745e7c758f93e478c4554a0dbc9aba27d256c0,2024-04-10T19:49:51.183000
CVE-2024-3388,0,0,9a13547aa29d2171bfe252870fb3dde44261a463a11a31d9062dc130e0f3c4f3,2024-04-10T19:49:51.183000
CVE-2024-3400,0,0,0fdfd694513ac9960d5987af66b7d58386b695c1f51f8a7276365f229128833a,2024-04-16T01:00:01.463000
CVE-2024-3400,0,1,aadf7c9d2a56f5cd808a6005acc9ff24e9bae3c905daa10ce077db9df942ce15,2024-04-18T01:00:01.527000
CVE-2024-3413,0,0,7c0263f5aa26015f580f259b17ac76e3fb232807ce6eb6b3e0fa4a42d34def58,2024-04-11T01:26:00.727000
CVE-2024-3414,0,0,fcf8b2012e3dcab7048965e9d40e8c26f25a86217cc70e6c24a2ae712b119943,2024-04-11T01:26:00.803000
CVE-2024-3415,0,0,80d83d8ba89e3620cb20eb7a8b2b10e1c5fbd8b76c068e7c00b4af6deadd81dd,2024-04-11T01:26:00.900000
@ -246188,3 +246189,6 @@ CVE-2024-3908,0,0,14819196bd06b3f47df9a72a4748d3af3ea51b51fecc6fc14f6bb0ea5ac20e
CVE-2024-3909,0,0,88409e12ed6fe478dbedde42ee0b29fb69f3bd755cbe1c9aee9c2d33e78a2db7,2024-04-17T12:48:07.510000
CVE-2024-3910,0,0,86d1a96ddd3463e152d9d08dee2f0faab8142fd78de3719a4a22f0df5c358cdf,2024-04-17T12:48:07.510000
CVE-2024-3914,0,0,f93977105202dbc9d06c0cd96ce45891e87c322bf8bb225cb96c3dd248984c2c,2024-04-17T20:08:21.887000
CVE-2024-3928,1,1,3a491d85e7ac82f506cd6d0632b4632be31396fe4a14c260d7b808f8656e6c51,2024-04-18T00:15:07.523000
CVE-2024-3931,1,1,00e4dcf58c27094929770929932635c0ac41778feef8cfb4d4b8ae56ac218544,2024-04-18T00:15:07.810000
CVE-2024-3932,1,1,3d97f4daafb1ee3bdff6b350a6da680923cf8bf3d7f295646f7244d805db66a9,2024-04-18T00:15:08.033000

Can't render this file because it is too large.