From a3d27e2c78cc2273e8e404435f041b0b14121317 Mon Sep 17 00:00:00 2001 From: cad-safe-bot Date: Fri, 3 May 2024 12:03:28 +0000 Subject: [PATCH] Auto-Update: 2024-05-03T12:00:38.715413+00:00 --- CVE-2024/CVE-2024-329xx/CVE-2024-32986.json | 71 +++++++++++++++++++++ CVE-2024/CVE-2024-340xx/CVE-2024-34062.json | 59 +++++++++++++++++ CVE-2024/CVE-2024-340xx/CVE-2024-34063.json | 59 +++++++++++++++++ CVE-2024/CVE-2024-340xx/CVE-2024-34072.json | 59 +++++++++++++++++ CVE-2024/CVE-2024-340xx/CVE-2024-34073.json | 63 ++++++++++++++++++ CVE-2024/CVE-2024-44xx/CVE-2024-4461.json | 55 ++++++++++++++++ README.md | 42 ++++-------- _state.csv | 60 +++++++++-------- 8 files changed, 410 insertions(+), 58 deletions(-) create mode 100644 CVE-2024/CVE-2024-329xx/CVE-2024-32986.json create mode 100644 CVE-2024/CVE-2024-340xx/CVE-2024-34062.json create mode 100644 CVE-2024/CVE-2024-340xx/CVE-2024-34063.json create mode 100644 CVE-2024/CVE-2024-340xx/CVE-2024-34072.json create mode 100644 CVE-2024/CVE-2024-340xx/CVE-2024-34073.json create mode 100644 CVE-2024/CVE-2024-44xx/CVE-2024-4461.json diff --git a/CVE-2024/CVE-2024-329xx/CVE-2024-32986.json b/CVE-2024/CVE-2024-329xx/CVE-2024-32986.json new file mode 100644 index 00000000000..04fc0e2e0e3 --- /dev/null +++ b/CVE-2024/CVE-2024-329xx/CVE-2024-32986.json @@ -0,0 +1,71 @@ +{ + "id": "CVE-2024-32986", + "sourceIdentifier": "security-advisories@github.com", + "published": "2024-05-03T10:15:07.767", + "lastModified": "2024-05-03T10:15:07.767", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "PWAsForFirefox is a tool to install, manage and use Progressive Web Apps (PWAs) in Mozilla Firefox. Due to improper sanitization of web app properties (such as name, description, shortcuts), web apps were able to inject additional lines into XDG Desktop Entries (on Linux) and `AppInfo.ini` (on PortableApps.com). This allowed malicious web apps to introduce keys like `Exec`, which could run arbitrary code when the affected web app was launched. This vulnerability affects all Linux and PortableApps.com users of all PWAsForFirefox versions up to (excluding) 2.12.0. Windows and macOS users are not affected. This vulnerability has been fixed in commit `9932d4b` which has been included in release in v2.12.0. The main fix is implemented in the native part, but the extension also contains additional fixes. All Linux and PortableApps.com users are advised to update to this version as soon as possible. It is also recommended for Windows and macOS users to update to this version, as it contains additional fixes related to properties sanitization. There are no known workarounds for this vulnerability." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.6, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 2.8, + "impactScore": 6.0 + } + ] + }, + "weaknesses": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-150" + }, + { + "lang": "en", + "value": "CWE-74" + }, + { + "lang": "en", + "value": "CWE-93" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/filips123/PWAsForFirefox/commit/9932d4b289631d447f88ace09a2fabafe4cd5bd5", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/filips123/PWAsForFirefox/releases/tag/v2.12.0", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/filips123/PWAsForFirefox/security/advisories/GHSA-jmhv-m7v5-g5jq", + "source": "security-advisories@github.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-340xx/CVE-2024-34062.json b/CVE-2024/CVE-2024-340xx/CVE-2024-34062.json new file mode 100644 index 00000000000..2308a7f556d --- /dev/null +++ b/CVE-2024/CVE-2024-340xx/CVE-2024-34062.json @@ -0,0 +1,59 @@ +{ + "id": "CVE-2024-34062", + "sourceIdentifier": "security-advisories@github.com", + "published": "2024-05-03T10:15:08.500", + "lastModified": "2024-05-03T10:15:08.500", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "tqdm is an open source progress bar for Python and CLI. Any optional non-boolean CLI arguments (e.g. `--delim`, `--buf-size`, `--manpath`) are passed through python's `eval`, allowing arbitrary code execution. This issue is only locally exploitable and had been addressed in release version 4.66.3. All users are advised to upgrade. There are no known workarounds for this vulnerability." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 4.8, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.3, + "impactScore": 3.4 + } + ] + }, + "weaknesses": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-74" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/tqdm/tqdm/commit/4e613f84ed2ae029559f539464df83fa91feb316", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/tqdm/tqdm/security/advisories/GHSA-g7vv-2v7x-gj9p", + "source": "security-advisories@github.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-340xx/CVE-2024-34063.json b/CVE-2024/CVE-2024-340xx/CVE-2024-34063.json new file mode 100644 index 00000000000..49e5c8a7067 --- /dev/null +++ b/CVE-2024/CVE-2024-340xx/CVE-2024-34063.json @@ -0,0 +1,59 @@ +{ + "id": "CVE-2024-34063", + "sourceIdentifier": "security-advisories@github.com", + "published": "2024-05-03T10:15:08.690", + "lastModified": "2024-05-03T10:15:08.690", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "vodozemac is an implementation of Olm and Megolm in pure Rust. Versions 0.5.0 and 0.5.1 of vodozemac have degraded secret zeroization capabilities, due to changes in third-party cryptographic dependencies (the Dalek crates), which moved secret zeroization capabilities behind a feature flag and defaulted this feature to off. The degraded zeroization capabilities could result in the production of more memory copies of encryption secrets and secrets could linger in memory longer than necessary. This marginally increases the risk of sensitive data exposure. This issue has been addressed in version 0.6.0 and users are advised to upgrade. There are no known workarounds for this vulnerability." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N", + "attackVector": "LOCAL", + "attackComplexity": "HIGH", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 2.5, + "baseSeverity": "LOW" + }, + "exploitabilityScore": 1.0, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-1188" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/matrix-org/vodozemac/commit/297548cad4016ce448c4b5007c54db7ee39489d9", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/matrix-org/vodozemac/security/advisories/GHSA-c3hm-hxwf-g5c6", + "source": "security-advisories@github.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-340xx/CVE-2024-34072.json b/CVE-2024/CVE-2024-340xx/CVE-2024-34072.json new file mode 100644 index 00000000000..4200a0ccd8b --- /dev/null +++ b/CVE-2024/CVE-2024-340xx/CVE-2024-34072.json @@ -0,0 +1,59 @@ +{ + "id": "CVE-2024-34072", + "sourceIdentifier": "security-advisories@github.com", + "published": "2024-05-03T11:15:22.260", + "lastModified": "2024-05-03T11:15:22.260", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "sagemaker-python-sdk is a library for training and deploying machine learning models on Amazon SageMaker. The sagemaker.base_deserializers.NumpyDeserializer module before v2.218.0 allows potentially unsafe deserialization when untrusted data is passed as pickled object arrays. This consequently may allow an unprivileged third party to cause remote code execution, denial of service, affecting both confidentiality and integrity. Users are advised to upgrade to version 2.218.0. Users unable to upgrade should not pass pickled numpy object arrays which originated from an untrusted source, or that could have been tampered with. Only pass pickled numpy object arrays from trusted sources." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-502" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/aws/sagemaker-python-sdk/pull/4557", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/aws/sagemaker-python-sdk/security/advisories/GHSA-wjvx-jhpj-r54r", + "source": "security-advisories@github.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-340xx/CVE-2024-34073.json b/CVE-2024/CVE-2024-340xx/CVE-2024-34073.json new file mode 100644 index 00000000000..2ad367ad817 --- /dev/null +++ b/CVE-2024/CVE-2024-340xx/CVE-2024-34073.json @@ -0,0 +1,63 @@ +{ + "id": "CVE-2024-34073", + "sourceIdentifier": "security-advisories@github.com", + "published": "2024-05-03T11:15:22.447", + "lastModified": "2024-05-03T11:15:22.447", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "sagemaker-python-sdk is a library for training and deploying machine learning models on Amazon SageMaker. In affected versions the capture_dependencies function in `sagemaker.serve.save_retrive.version_1_0_0.save.utils` module allows for potentially unsafe Operating System (OS) Command Injection if inappropriate command is passed as the \u201crequirements_path\u201d parameter. This consequently may allow an unprivileged third party to cause remote code execution, denial of service, affecting both confidentiality and integrity. This issue has been addressed in version 2.214.3. Users are advised to upgrade. Users unable to upgrade should not override the \u201crequirements_path\u201d parameter of capture_dependencies function in `sagemaker.serve.save_retrive.version_1_0_0.save.utils`, and instead use the default value." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-78" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/aws/sagemaker-python-sdk/commit/2d873d53f708ea570fc2e2a6974f8c3097fe9df5", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/aws/sagemaker-python-sdk/pull/4556", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/aws/sagemaker-python-sdk/security/advisories/GHSA-7pc3-pr3q-58vg", + "source": "security-advisories@github.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-44xx/CVE-2024-4461.json b/CVE-2024/CVE-2024-44xx/CVE-2024-4461.json new file mode 100644 index 00000000000..0ebadd16541 --- /dev/null +++ b/CVE-2024/CVE-2024-44xx/CVE-2024-4461.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2024-4461", + "sourceIdentifier": "cve-coordination@incibe.es", + "published": "2024-05-03T11:15:22.630", + "lastModified": "2024-05-03T11:15:22.630", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Unquoted path or search item vulnerability in SugarSync versions prior to 4.1.3 for Windows. This misconfiguration could allow an unauthorized local user to inject arbitrary code into the unquoted service path, resulting in privilege escalation." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "cve-coordination@incibe.es", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "cve-coordination@incibe.es", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-428" + } + ] + } + ], + "references": [ + { + "url": "https://www.incibe.es/en/incibe-cert/notices/aviso/unquoted-path-or-search-item-vulnerability-sugarsync", + "source": "cve-coordination@incibe.es" + } + ] +} \ No newline at end of file diff --git a/README.md b/README.md index b6d033cca5f..8058af8a518 100644 --- a/README.md +++ b/README.md @@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2024-05-03T10:00:38.143835+00:00 +2024-05-03T12:00:38.715413+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2024-05-03T09:15:09.950000+00:00 +2024-05-03T11:15:22.630000+00:00 ``` ### Last Data Feed Release @@ -33,45 +33,25 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### Total Number of included CVEs ```plain -248497 +248503 ``` ### CVEs added in the last Commit -Recently added CVEs: `26` +Recently added CVEs: `6` -- [CVE-2023-35701](CVE-2023/CVE-2023-357xx/CVE-2023-35701.json) (`2024-05-03T09:15:07.587`) -- [CVE-2023-44472](CVE-2023/CVE-2023-444xx/CVE-2023-44472.json) (`2024-05-03T08:15:06.850`) -- [CVE-2024-23912](CVE-2024/CVE-2024-239xx/CVE-2024-23912.json) (`2024-05-03T09:15:07.737`) -- [CVE-2024-23913](CVE-2024/CVE-2024-239xx/CVE-2024-23913.json) (`2024-05-03T09:15:07.920`) -- [CVE-2024-23914](CVE-2024/CVE-2024-239xx/CVE-2024-23914.json) (`2024-05-03T09:15:08.090`) -- [CVE-2024-24710](CVE-2024/CVE-2024-247xx/CVE-2024-24710.json) (`2024-05-03T08:15:07.033`) -- [CVE-2024-28072](CVE-2024/CVE-2024-280xx/CVE-2024-28072.json) (`2024-05-03T08:15:07.217`) -- [CVE-2024-32810](CVE-2024/CVE-2024-328xx/CVE-2024-32810.json) (`2024-05-03T08:15:07.430`) -- [CVE-2024-32831](CVE-2024/CVE-2024-328xx/CVE-2024-32831.json) (`2024-05-03T08:15:07.713`) -- [CVE-2024-33914](CVE-2024/CVE-2024-339xx/CVE-2024-33914.json) (`2024-05-03T09:15:08.257`) -- [CVE-2024-33915](CVE-2024/CVE-2024-339xx/CVE-2024-33915.json) (`2024-05-03T09:15:08.443`) -- [CVE-2024-33916](CVE-2024/CVE-2024-339xx/CVE-2024-33916.json) (`2024-05-03T08:15:07.930`) -- [CVE-2024-33918](CVE-2024/CVE-2024-339xx/CVE-2024-33918.json) (`2024-05-03T08:15:08.113`) -- [CVE-2024-33919](CVE-2024/CVE-2024-339xx/CVE-2024-33919.json) (`2024-05-03T09:15:08.633`) -- [CVE-2024-33920](CVE-2024/CVE-2024-339xx/CVE-2024-33920.json) (`2024-05-03T09:15:08.827`) -- [CVE-2024-33921](CVE-2024/CVE-2024-339xx/CVE-2024-33921.json) (`2024-05-03T09:15:09.020`) -- [CVE-2024-33923](CVE-2024/CVE-2024-339xx/CVE-2024-33923.json) (`2024-05-03T09:15:09.183`) -- [CVE-2024-33924](CVE-2024/CVE-2024-339xx/CVE-2024-33924.json) (`2024-05-03T08:15:08.303`) -- [CVE-2024-33925](CVE-2024/CVE-2024-339xx/CVE-2024-33925.json) (`2024-05-03T09:15:09.387`) -- [CVE-2024-33926](CVE-2024/CVE-2024-339xx/CVE-2024-33926.json) (`2024-05-03T08:15:08.490`) -- [CVE-2024-33927](CVE-2024/CVE-2024-339xx/CVE-2024-33927.json) (`2024-05-03T08:15:08.673`) -- [CVE-2024-33929](CVE-2024/CVE-2024-339xx/CVE-2024-33929.json) (`2024-05-03T09:15:09.580`) -- [CVE-2024-33931](CVE-2024/CVE-2024-339xx/CVE-2024-33931.json) (`2024-05-03T09:15:09.763`) -- [CVE-2024-33937](CVE-2024/CVE-2024-339xx/CVE-2024-33937.json) (`2024-05-03T09:15:09.950`) -- [CVE-2024-33941](CVE-2024/CVE-2024-339xx/CVE-2024-33941.json) (`2024-05-03T08:15:08.863`) +- [CVE-2024-32986](CVE-2024/CVE-2024-329xx/CVE-2024-32986.json) (`2024-05-03T10:15:07.767`) +- [CVE-2024-34062](CVE-2024/CVE-2024-340xx/CVE-2024-34062.json) (`2024-05-03T10:15:08.500`) +- [CVE-2024-34063](CVE-2024/CVE-2024-340xx/CVE-2024-34063.json) (`2024-05-03T10:15:08.690`) +- [CVE-2024-34072](CVE-2024/CVE-2024-340xx/CVE-2024-34072.json) (`2024-05-03T11:15:22.260`) +- [CVE-2024-34073](CVE-2024/CVE-2024-340xx/CVE-2024-34073.json) (`2024-05-03T11:15:22.447`) +- [CVE-2024-4461](CVE-2024/CVE-2024-44xx/CVE-2024-4461.json) (`2024-05-03T11:15:22.630`) ### CVEs modified in the last Commit -Recently modified CVEs: `1` +Recently modified CVEs: `0` -- [CVE-2023-31211](CVE-2023/CVE-2023-312xx/CVE-2023-31211.json) (`2024-05-03T09:15:07.230`) ## Download and Usage diff --git a/_state.csv b/_state.csv index a0a88ab94ab..9b20f98fd52 100644 --- a/_state.csv +++ b/_state.csv @@ -217992,7 +217992,7 @@ CVE-2023-25451,0,0,bf9f65354c0c14c6247ca4f7ffbc13c8f1c663eb328d83c64fc6ef4fc9f28 CVE-2023-25452,0,0,571ef3748c95bfbe0b203cdf3ffc5b7535ee70d82cfd72e88027c72ee00eeb46,2023-05-10T02:26:18.077000 CVE-2023-25453,0,0,60471186e0c170cee446cbaa0f4fe3eca3fe1a604dd5df7fc93e2fb25442b2c0,2023-09-01T12:09:39.707000 CVE-2023-25456,0,0,408499d865f2649a5a437b37da197fa52a399927aa162950e5bbd8727fe58d15,2023-11-07T04:08:58.840000 -CVE-2023-25457,1,1,c0229a4d30959c47c34eae5d740cf13de0563946cd3c7c0384fa985d436f62bb,2024-05-03T08:15:06.603000 +CVE-2023-25457,0,0,c0229a4d30959c47c34eae5d740cf13de0563946cd3c7c0384fa985d436f62bb,2024-05-03T08:15:06.603000 CVE-2023-25458,0,0,1065fa2b79e67ae65d3a3be77e6869d78ed621dc83197f39f93d1f300f7d61c5,2023-05-08T13:38:48.890000 CVE-2023-25459,0,0,b452b828450505952fe00d6bb72761dbdbf71b667f1dd51cd4b90d57aea38cfd,2023-08-10T03:52:36.750000 CVE-2023-2546,0,0,0c9ab6d4260067a910f2654d5f4ba8d79079cf0fe265a6a584c483c68b3635ea,2023-11-07T04:12:51.690000 @@ -222532,7 +222532,7 @@ CVE-2023-31208,0,0,5734c51815db6b57a8026bf78fa2fd363219f3d8846acb63cc3b1fa2c8f74 CVE-2023-31209,0,0,265b69c6c647506d4027f23aaf619e8ae4ead2ce4ba1cf17fdeb126549adc09a,2023-08-17T18:46:11.130000 CVE-2023-3121,0,0,acc3ea9a35e95881e6fb1a32ac832e4e0495284aeb391e11d047b4fb76b05fbc,2024-04-11T01:21:03.627000 CVE-2023-31210,0,0,22db411452e4413b24810b6f87647cdbad1853694542f15e240cee8fe93fc316,2023-12-18T17:31:51.650000 -CVE-2023-31211,0,1,bcf13972193b4b415b2d12adfbcf8d2f73fba1f0337b67e0fcd53d7d3aa27bd8,2024-05-03T09:15:07.230000 +CVE-2023-31211,0,0,bcf13972193b4b415b2d12adfbcf8d2f73fba1f0337b67e0fcd53d7d3aa27bd8,2024-05-03T09:15:07.230000 CVE-2023-31212,0,0,b3dca3f1049aeb20dc6f644e1d420b3cba3b924328724987f22ceb6add12b28e,2023-11-08T18:47:36.203000 CVE-2023-31213,0,0,aa93d62aa161bdef803d7fb4d1edfbba0517314ec0fd9cf94fe731d75469d683,2023-07-19T18:25:45.263000 CVE-2023-31215,0,0,b89fa5ca9251f56c11de8c448270940ecd6643a443f0f280749266a956d5de72,2023-12-28T13:32:56.443000 @@ -225665,7 +225665,7 @@ CVE-2023-35698,0,0,1a5f0de9e827e1f26d8ce1a23936779b2a92a9242596f2af26444c4d5f2f3 CVE-2023-35699,0,0,c06aba707c695839836dd82c54f55ca34badb20d57868cee747251dc69fa9bf6,2023-07-18T11:46:43.907000 CVE-2023-3570,0,0,12377f8f2531f9bb5228e4098a72207ca93d76b44354ff18076ee4d4cf633e78,2023-08-25T07:15:08.680000 CVE-2023-35700,0,0,d85439aec76d8ba3f8c755512b44f4a752c457c5d0362fdcaf7a45cdedd4d318,2023-11-07T04:15:57.173000 -CVE-2023-35701,1,1,e6dce6e08d5a6cc3d293e6cd63d2a5714872136194df65318be5a5281538d41d,2024-05-03T09:15:07.587000 +CVE-2023-35701,0,0,e6dce6e08d5a6cc3d293e6cd63d2a5714872136194df65318be5a5281538d41d,2024-05-03T09:15:07.587000 CVE-2023-35702,0,0,43a538fd2a6551344790ddc23675ac41256cc49affe767c42203bb8af1f9d9f6,2024-04-09T21:15:08.687000 CVE-2023-35703,0,0,bd220da906e6173a01fcf88c08076bd5470744a21943fd30147c0383607c053a,2024-04-09T21:15:08.797000 CVE-2023-35704,0,0,9f7caa8dfb464038a77a6e4bcadca0149b6bc7207c34073f0385815b079c70e4,2024-04-09T21:15:08.890000 @@ -232176,7 +232176,7 @@ CVE-2023-44469,0,0,960da4dd20058cd7b4d769768e751d771f02293e397b85b243d1f37fdbb2c CVE-2023-4447,0,0,04feba11f7263b0d5ebcdb950df716fdf7ecaf06906bce3ab8c4a6b5740dbd87,2024-04-11T01:22:28.583000 CVE-2023-44470,0,0,20af9da7b19e16e3f751716ce6388203de2002045e4dd1b4757141898d21d736,2023-10-12T19:50:34.870000 CVE-2023-44471,0,0,789a6d719a2ecab868455dd65b3c31581b8eb5ef3909c19aa7f5e53cf830ab7f,2023-10-12T19:47:22.937000 -CVE-2023-44472,1,1,9fc2dc211aae777b11c8a71d5cd607751cc27d1aea020eca500662a619a692d0,2024-05-03T08:15:06.850000 +CVE-2023-44472,0,0,9fc2dc211aae777b11c8a71d5cd607751cc27d1aea020eca500662a619a692d0,2024-05-03T08:15:06.850000 CVE-2023-44473,0,0,3a9f0b2529589df722344951f86b13ba970a14c956936c368f28ca8952e1920d,2023-10-12T17:53:16.280000 CVE-2023-44474,0,0,906c16b458f6396badf347b8626690f11ce844c55596d85f29232e2ffaca4997,2023-10-04T02:15:06.293000 CVE-2023-44475,0,0,708b5c32369c471fc4e211ff1c1662f1ff9edd336e0cb60d14f1fa0bbbd0bda8,2023-10-12T19:42:15.347000 @@ -242936,9 +242936,9 @@ CVE-2024-23905,0,0,2d8ebad5c05b335845d8a0c6b27832798a9c27087f41f1dd4daf5a7e2afef CVE-2024-2391,0,0,fd3c56d19cfdb51c26b65d074d54709719e794ba6c0db8c6b8b791a18f6fe3ca,2024-04-11T01:25:23.393000 CVE-2024-23910,0,0,e6adc416dd7b19484faa305c4e8491b3ff3f8809d94d53eb510d517290865995,2024-04-04T01:15:50.027000 CVE-2024-23911,0,0,f05e17f474751d92c0d0b7dd0326335d7f22fd7de41e1b09eac2c91ab043885f,2024-04-15T13:15:31.997000 -CVE-2024-23912,1,1,8b76a5e0353fd2e3399286fd1795cfde96165072137263962a5069d762fe6be6,2024-05-03T09:15:07.737000 -CVE-2024-23913,1,1,62a397291ca4ff6f894ba2b8fb788e66ab96f4372c15c5465e89848a8108a6f0,2024-05-03T09:15:07.920000 -CVE-2024-23914,1,1,481b78c97eba7946db4772e616ee8e8ae3f254b4a59e9894073706a7f542c37d,2024-05-03T09:15:08.090000 +CVE-2024-23912,0,0,8b76a5e0353fd2e3399286fd1795cfde96165072137263962a5069d762fe6be6,2024-05-03T09:15:07.737000 +CVE-2024-23913,0,0,62a397291ca4ff6f894ba2b8fb788e66ab96f4372c15c5465e89848a8108a6f0,2024-05-03T09:15:07.920000 +CVE-2024-23914,0,0,481b78c97eba7946db4772e616ee8e8ae3f254b4a59e9894073706a7f542c37d,2024-05-03T09:15:08.090000 CVE-2024-23917,0,0,43acd2786eef775b4e5af3da03e8f628e79a58b917087bea0e9c91638665592f,2024-02-09T01:05:22.180000 CVE-2024-2392,0,0,42336a48d6bafcd50dc6522fe24a4d56dee45c4fa6295037e9d4d2226834e64c,2024-03-22T12:45:36.130000 CVE-2024-2393,0,0,a735f579c8d8282e2e770bb2e57ba455b9e1d053a4e15dfbb3b2c5e4432a6f37,2024-04-11T01:25:23.490000 @@ -243231,7 +243231,7 @@ CVE-2024-24706,0,0,4d433b03a4c26ebc6bd4b9712c01509648b3f2cecc7341b14e252b0e38dfa CVE-2024-24707,0,0,23a49dd490264be4d0f1f787e396daad28e9b33e6cecae6e6ede109ea8372e70,2024-04-03T17:24:18.150000 CVE-2024-24708,0,0,f693d4f4acd95516c93eac11f2cab76ea0d55ea86fcf1b386fdcecddbfc9bf86,2024-02-29T13:49:29.390000 CVE-2024-2471,0,0,c433bac72e984da7ddd7f5d293078fb939e9f74235bc4818486a5edc71f6f4a6,2024-04-08T18:48:40.217000 -CVE-2024-24710,1,1,302749c2c1ec57ae8197be467cd5499b82b7cfef1d6d9bf6afcb026b279a5b1f,2024-05-03T08:15:07.033000 +CVE-2024-24710,0,0,302749c2c1ec57ae8197be467cd5499b82b7cfef1d6d9bf6afcb026b279a5b1f,2024-05-03T08:15:07.033000 CVE-2024-24711,0,0,0d048c3822039d008612960507a20bcb0af4972abb0e8757f981885d0a5986fc,2024-03-26T12:55:05.010000 CVE-2024-24712,0,0,3eb883409ceb5cd8ab7cfb2c23165937e7138a0fdba93206148a8d8c39991d81,2024-02-16T14:48:04.207000 CVE-2024-24713,0,0,016796105eec4ced1aaab79578ed2b6dc8b6c4a64b21f9341804bb78b76a15f2,2024-02-16T15:48:04.237000 @@ -245335,7 +245335,7 @@ CVE-2024-28066,0,0,8d264de635ae9c8dc6d41b6ed16f7f85828f585eea298ce9fb065b16c3368 CVE-2024-28069,0,0,99a57a9955c5ed5463e7c560b95e0a17dfa2789ec3c024f2825003d476d4b80d,2024-03-17T22:38:29.433000 CVE-2024-2807,0,0,389dec77d863d88d0729c3b21a13c4f638dbaad2d7ffdf5a3bec6019fd1a7b1b,2024-04-11T01:25:36.783000 CVE-2024-28070,0,0,c8eeec88fa6e3b91036a4eadc63dd921f090ad52309176e7af22a570b911aeac,2024-03-17T22:38:29.433000 -CVE-2024-28072,1,1,6596801048e07b80a6611c70d3d9bcb61d1ca69e1e839f899621c9e0d90f7e27,2024-05-03T08:15:07.217000 +CVE-2024-28072,0,0,6596801048e07b80a6611c70d3d9bcb61d1ca69e1e839f899621c9e0d90f7e27,2024-05-03T08:15:07.217000 CVE-2024-28073,0,0,cdb5d61cc6a19952dccba6c20cc81a1525eeb0c1fc701ee23bfbd240d2d310cb,2024-04-17T20:08:21.887000 CVE-2024-28076,0,0,573150dd6c1cd2ebee3e74b864dba3fbe351c8f7cfb57fda1c213b0f2a3aeb0c,2024-04-19T14:15:11.080000 CVE-2024-2808,0,0,c3ed3b9e68948cd880b53f1e926f321cf4b47941f31cc49bbad2cbe5e609284b,2024-04-11T01:25:36.883000 @@ -247686,7 +247686,7 @@ CVE-2024-32803,0,0,87ef628ed36a01981de6b24a9a46f4b15174f60f02a3679855347999c2d8f CVE-2024-32806,0,0,d8037ba4bbb861d02087bc0e815d7d332fc801a9609bcadd59a9397c35ec5a94,2024-04-24T17:16:50.397000 CVE-2024-32808,0,0,4a82bef92c296d86caf3ed2592cda4e11078b8b017423c1d319584391f5d5ff2,2024-04-24T13:39:42.883000 CVE-2024-3281,0,0,b3c51db3aca3b371ad4faa3c1c4537d2c54d8323123f7ae9b26414cd9ee432a6,2024-04-10T13:24:22.187000 -CVE-2024-32810,1,1,c173dd59fdda872fb4ca533b772f6e53231f1a4fcade1e500868c541949d68e3,2024-05-03T08:15:07.430000 +CVE-2024-32810,0,0,c173dd59fdda872fb4ca533b772f6e53231f1a4fcade1e500868c541949d68e3,2024-05-03T08:15:07.430000 CVE-2024-32812,0,0,a6c0140cb5875c5619d43acc5c77a24a0f3ff7202fb936829a583061f4a5590b,2024-04-24T13:39:42.883000 CVE-2024-32815,0,0,fdfcf6bbe35deb9ef34763a17ff64d385e838875d5c0ab731c71e0463aa8a48a,2024-04-24T13:39:42.883000 CVE-2024-32816,0,0,2fa63efd4ad7910d44e8053cdc5b80901495c5148f9f0b492de6d141c5af6f05,2024-04-24T13:39:42.883000 @@ -247699,7 +247699,7 @@ CVE-2024-32826,0,0,0d7c35c38998736930e8124de26137dd3edb154046638c71583ab2454604a CVE-2024-32828,0,0,e98a289b3626e9e97ee2c25450e252107ac1631ec54c8e821ef6379945d6166a,2024-04-26T12:58:17.720000 CVE-2024-32829,0,0,af974fc6efe469e422423920d456ebe47e66f08b752628aef0bab2a184975ddc,2024-04-26T12:58:17.720000 CVE-2024-3283,0,0,8b1939d21df3d4399a3bf874e70470053c1a0ae20421841ad51c79aca5727c56,2024-04-10T19:49:51.183000 -CVE-2024-32831,1,1,d49d650149fd5e16e13712d2e2e041eb3e0fdad6c40d10c333d65e676beb8060,2024-05-03T08:15:07.713000 +CVE-2024-32831,0,0,d49d650149fd5e16e13712d2e2e041eb3e0fdad6c40d10c333d65e676beb8060,2024-05-03T08:15:07.713000 CVE-2024-32833,0,0,75a734274df361ea9a3f6b3015d66d3525b2c570f6f2524ded71781e2b6ac99a,2024-04-24T13:39:42.883000 CVE-2024-32834,0,0,d2ed9ea40163afd5f111e44be27b5edfb4cb8a8dd0234c49fdc13943a21fbf2d,2024-04-24T13:39:42.883000 CVE-2024-32835,0,0,a55a936ce932c192bddb52ecc7ef5c50500f7aaee0689f590c1aa942fe932618,2024-04-24T13:39:42.883000 @@ -247746,6 +247746,7 @@ CVE-2024-32973,0,0,26b1e65a2b333830ce66544334f5113e1beaf6a050e56e0aaddd733df67df CVE-2024-32979,0,0,4609f2e37347930e20422fd7d03fe2a9f10f1e16fc9069624b36f432c125737a,2024-05-01T13:01:51.263000 CVE-2024-3298,0,0,35145d829af4d19541380a93e6723503e514b69e11aa4b007b05099610c37f21,2024-04-04T16:33:06.610000 CVE-2024-32984,0,0,5b03a340c5de82db1ed070c218c4a0e85ff4025dd7e89763ef1d803cf99be350,2024-05-01T13:01:51.263000 +CVE-2024-32986,1,1,13229c4b26b428d7bfcd362d89141e3c924f1461973abaebd8330230cc8d6339,2024-05-03T10:15:07.767000 CVE-2024-3299,0,0,f60f2a80accdd6f345a6a9cd66637eda180121596f90c2e7d75707c9fce20eb6,2024-04-04T16:33:06.610000 CVE-2024-3302,0,0,125cce6ead91da0349b4d4d5e52af6eb4c2a0511fb870ab9451e4f4746c28bb4,2024-04-24T10:15:07.417000 CVE-2024-3307,0,0,ab47865c84ef4547c2f039bbb335c52934bd5e420dc0d5cb41d5a9faf0de7460,2024-05-02T18:00:37.360000 @@ -247986,30 +247987,30 @@ CVE-2024-33904,0,0,94e3a98c0463f8acd176e3df60de225e1631e2e1dbcd1a948aa64ab2e616e CVE-2024-33905,0,0,4f2af541fd9603df50f92dd094e460dd4dcee3f568c1f2af9533e6ef2f5fb1b0,2024-05-01T18:15:24.390000 CVE-2024-33911,0,0,3aecc9c6853b34c79146d922a590e2ff56a9634dc21e6f2275a777f672ad645b,2024-05-02T13:27:25.103000 CVE-2024-33913,0,0,fdcdfb506731b7f26c0d67c69dc8ed8c4bfdff71029b6b2f6e847f10e09b4905,2024-05-02T13:27:25.103000 -CVE-2024-33914,1,1,d122138be1a4fa8f27f9a0154da62d95ee81352feb2e1f626c2b2720e3403478,2024-05-03T09:15:08.257000 -CVE-2024-33915,1,1,7c97997ce00e2d31c63289dc1e9746492eef885457e2bab723cd9319b57ba16f,2024-05-03T09:15:08.443000 -CVE-2024-33916,1,1,ddd81f51d78ff782f4665a4ee9d333f86d813d4bcccec8ffdac234592aabb001,2024-05-03T08:15:07.930000 -CVE-2024-33918,1,1,ba35302d59b1f228115eeac250b715e051bd909d507675eba6b357f166b006e0,2024-05-03T08:15:08.113000 -CVE-2024-33919,1,1,7570d4fc7a2e8b3576ff733bced3ede576f448bf3de61a243b932998bf7c9cfc,2024-05-03T09:15:08.633000 -CVE-2024-33920,1,1,382fce48f7cf5efd062e4ed4411b3d4fd03d6495b1dddc1fcc58d48f4c3f1134,2024-05-03T09:15:08.827000 -CVE-2024-33921,1,1,3e9250cf923f5f8f392eda3aa5efd0f95f852ae8dee59bbffa2326e66a8927bb,2024-05-03T09:15:09.020000 +CVE-2024-33914,0,0,d122138be1a4fa8f27f9a0154da62d95ee81352feb2e1f626c2b2720e3403478,2024-05-03T09:15:08.257000 +CVE-2024-33915,0,0,7c97997ce00e2d31c63289dc1e9746492eef885457e2bab723cd9319b57ba16f,2024-05-03T09:15:08.443000 +CVE-2024-33916,0,0,ddd81f51d78ff782f4665a4ee9d333f86d813d4bcccec8ffdac234592aabb001,2024-05-03T08:15:07.930000 +CVE-2024-33918,0,0,ba35302d59b1f228115eeac250b715e051bd909d507675eba6b357f166b006e0,2024-05-03T08:15:08.113000 +CVE-2024-33919,0,0,7570d4fc7a2e8b3576ff733bced3ede576f448bf3de61a243b932998bf7c9cfc,2024-05-03T09:15:08.633000 +CVE-2024-33920,0,0,382fce48f7cf5efd062e4ed4411b3d4fd03d6495b1dddc1fcc58d48f4c3f1134,2024-05-03T09:15:08.827000 +CVE-2024-33921,0,0,3e9250cf923f5f8f392eda3aa5efd0f95f852ae8dee59bbffa2326e66a8927bb,2024-05-03T09:15:09.020000 CVE-2024-33922,0,0,581070d9342f09fc7f3ba266aca2e54acec3a9f423037ff85b1ca1eb7af20122,2024-05-02T13:27:25.103000 -CVE-2024-33923,1,1,d0d8882dc254b1dcabb14b1df2e1b07735ce639cb0a50e662607c8688e0f97e0,2024-05-03T09:15:09.183000 -CVE-2024-33924,1,1,c02dc11273085260cc198f1ebd137c9b0764a090b5b9cf33d2498355cfaf7699,2024-05-03T08:15:08.303000 -CVE-2024-33925,1,1,6888fe843484e9b81477479a204796f7c7a51535f6e24af1459fa8ee19ffd0a0,2024-05-03T09:15:09.387000 -CVE-2024-33926,1,1,5dccccae30fe1c23daacb6f298ed41edbf09405611ee109b3ef629696835fed5,2024-05-03T08:15:08.490000 -CVE-2024-33927,1,1,5086b925ed192a5a3cd38aeac2295c3ce6c4ec549de3f122558161961985c3ee,2024-05-03T08:15:08.673000 +CVE-2024-33923,0,0,d0d8882dc254b1dcabb14b1df2e1b07735ce639cb0a50e662607c8688e0f97e0,2024-05-03T09:15:09.183000 +CVE-2024-33924,0,0,c02dc11273085260cc198f1ebd137c9b0764a090b5b9cf33d2498355cfaf7699,2024-05-03T08:15:08.303000 +CVE-2024-33925,0,0,6888fe843484e9b81477479a204796f7c7a51535f6e24af1459fa8ee19ffd0a0,2024-05-03T09:15:09.387000 +CVE-2024-33926,0,0,5dccccae30fe1c23daacb6f298ed41edbf09405611ee109b3ef629696835fed5,2024-05-03T08:15:08.490000 +CVE-2024-33927,0,0,5086b925ed192a5a3cd38aeac2295c3ce6c4ec549de3f122558161961985c3ee,2024-05-03T08:15:08.673000 CVE-2024-33928,0,0,37e17338656e9b82882ce5a5575a68963bdf87b4947c48e4b26d76ff5fc32cc9,2024-05-03T07:15:38.507000 -CVE-2024-33929,1,1,0aca218489f58414054b89a88071ccd0d02935eac4a07478a9646fce00efdfde,2024-05-03T09:15:09.580000 +CVE-2024-33929,0,0,0aca218489f58414054b89a88071ccd0d02935eac4a07478a9646fce00efdfde,2024-05-03T09:15:09.580000 CVE-2024-33930,0,0,d4854365518648983f110687642324ab33baba9fea77b8107ff83d4e8904d188,2024-05-02T13:27:25.103000 -CVE-2024-33931,1,1,1dcb86ce59e2bbe2442d913840b204a26a61261b4e27f6ae256bf1d0926993aa,2024-05-03T09:15:09.763000 +CVE-2024-33931,0,0,1dcb86ce59e2bbe2442d913840b204a26a61261b4e27f6ae256bf1d0926993aa,2024-05-03T09:15:09.763000 CVE-2024-33932,0,0,7914dfec4aa92667bc194a1419455363ed058990262d7d04ea185f47de84ebe0,2024-05-03T07:15:38.870000 CVE-2024-33934,0,0,03f4279a02f160865e001cc3fbf5c3b2df6b3e7680a55c79cf854ef137560caa,2024-05-03T07:15:39.073000 CVE-2024-33935,0,0,436e9a7e0496167e6737047ce6da521178a6b9ea215919af8b8c47e7f3f44db3,2024-05-03T07:15:39.283000 CVE-2024-33936,0,0,57c60904b917bc2363b0f4e62d2bc144fa23a459366819d356164d1c0fc67f33,2024-05-03T07:15:39.510000 -CVE-2024-33937,1,1,2b2f5f3899102cebc3eb08181d91585bb923176ca2570954e37dd77f42f2811c,2024-05-03T09:15:09.950000 +CVE-2024-33937,0,0,2b2f5f3899102cebc3eb08181d91585bb923176ca2570954e37dd77f42f2811c,2024-05-03T09:15:09.950000 CVE-2024-33940,0,0,d916933a371eec0e6c276877f59092e5f502eed100e4b352e50f04737f83ce33,2024-05-03T07:15:39.737000 -CVE-2024-33941,1,1,c23d6d664b6e586d7cbfe565b596f55ce703d669b0d8c8e1f468764b7f0499f0,2024-05-03T08:15:08.863000 +CVE-2024-33941,0,0,c23d6d664b6e586d7cbfe565b596f55ce703d669b0d8c8e1f468764b7f0499f0,2024-05-03T08:15:08.863000 CVE-2024-33943,0,0,4003668220f55a0b39406712e9a49dee067bde2efbe0782460513424b1eec6a1,2024-05-03T07:15:39.960000 CVE-2024-33944,0,0,4cc781cd62cbbf938c7006c765253cd67313b7791b0366c8f2092cb45b8a99dc,2024-05-02T13:27:25.103000 CVE-2024-33945,0,0,1f8ed9e30fbf665a8f89e5c2ed08da58ea4f4a4d8aac43703bea3cdd0d82f183,2024-05-03T07:15:40.183000 @@ -248033,6 +248034,10 @@ CVE-2024-34048,0,0,e6d9ff471f531552b989ab0670c8eba7287d8741cecbce9b0cbb9a4d53fb0 CVE-2024-34049,0,0,9aa3f131f75fc45cd4bc8429cac44eaca2da5b2edc029e7ac3fe3439cdf03695,2024-04-30T13:11:16.690000 CVE-2024-34050,0,0,9a2c282d83ab4ad91eb1f6c4ddeacad349b06e44af38b78f3e2f6ef4239dbf10,2024-04-30T13:11:16.690000 CVE-2024-34061,0,0,84fa5d1c11c110207cf83316bf3758cd4ac462979d022953c80b53bc750b0674,2024-05-02T18:00:37.360000 +CVE-2024-34062,1,1,3e11a1e97bc9c7d2b1f6e3c7f0e1347e039bc2a756b7c299a9cd9dbfc887dd73,2024-05-03T10:15:08.500000 +CVE-2024-34063,1,1,61769c99c3d21bb4b1fa3244438c3cd47a834f257b0b58709a9c99907659b44a,2024-05-03T10:15:08.690000 +CVE-2024-34072,1,1,b784d2f0e3ca6609d0b53961bb8ab731b315f17b0f3dd03fea50f8ee49b7d20e,2024-05-03T11:15:22.260000 +CVE-2024-34073,1,1,a8280a0d286204d59dafbe0ac2defb7e766c2e61a88db48a5ffc7d350ededc3a,2024-05-03T11:15:22.447000 CVE-2024-34088,0,0,636fbe5b1a1e19e1af9ede6b8164c4740f450d66b2d6624f11a2b266568f819e,2024-04-30T19:35:36.960000 CVE-2024-3411,0,0,96154d16b686810c762f6aaf3528d3da5f7f3979059b90a737e06407f7a9307a,2024-04-30T19:35:36.960000 CVE-2024-3413,0,0,7c0263f5aa26015f580f259b17ac76e3fb232807ce6eb6b3e0fa4a42d34def58,2024-04-11T01:26:00.727000 @@ -248496,3 +248501,4 @@ CVE-2024-4405,0,0,ae0f4db23c6909c7d74c90a9689be79a58cad53d93c458fbc8aa608abe2f03 CVE-2024-4406,0,0,e1c30f2212dcad9d546e3af047be1a2ed8c32271936aca83f8eb5fa48d87e35c,2024-05-02T18:00:37.360000 CVE-2024-4433,0,0,57fa2b8bf7e34ebce0673dcb40cbc1cb3d930cfbe754fed569c751398fdf1c6b,2024-05-02T18:00:37.360000 CVE-2024-4439,0,0,1a2ab1ea900fe1258f90808166f3d7d377ba90d092c402bdfc5c7c6496b9b12b,2024-05-03T06:15:14.947000 +CVE-2024-4461,1,1,7a4951f5733ea7c136a56424d9728472d8993c24ffa3a071766222677a0e87ea,2024-05-03T11:15:22.630000