Auto-Update: 2024-05-05T23:55:30.245075+00:00

This commit is contained in:
cad-safe-bot 2024-05-05 23:58:21 +00:00
parent 5801a619dc
commit ad2d9d4676
9 changed files with 513 additions and 18 deletions

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-52723",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-04-29T06:15:06.983",
"lastModified": "2024-05-01T17:15:27.657",
"lastModified": "2024-05-05T22:15:07.487",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
@ -28,6 +28,10 @@
"url": "https://invent.kde.org/pim/libksieve/-/tags/v23.03.80",
"source": "cve@mitre.org"
},
{
"url": "https://lists.debian.org/debian-lts-announce/2024/05/msg00004.html",
"source": "cve@mitre.org"
},
{
"url": "https://www.openwall.com/lists/oss-security/2024/04/25/1",
"source": "cve@mitre.org"

View File

@ -0,0 +1,24 @@
{
"id": "CVE-2024-34519",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-05-05T22:15:07.563",
"lastModified": "2024-05-05T22:15:07.563",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Avantra Server 24.x before 24.0.7 and 24.1.x before 24.1.1 mishandles the security of dashboards, aka XAN-5367. If a user can create a dashboard with an auto-login user, data disclosure may occur. Access control can be bypassed when there is a shared dashboard, and its auto-login user has privileges that a dashboard visitor should not have."
}
],
"metrics": {},
"references": [
{
"url": "https://docs.avantra.com/release-notes/24/changes.html",
"source": "cve@mitre.org"
},
{
"url": "https://support.avantra.com/support/solutions/articles/44002516766-xan-5367-security-vulnerability-fix-for-dashboards",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,92 @@
{
"id": "CVE-2024-4502",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-05-05T22:15:07.623",
"lastModified": "2024-05-05T22:15:07.623",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability classified as critical has been found in Ruijie RG-UAC up to 20240428. Affected is an unknown function of the file /view/dhcp/dhcpClient/dhcp_client_commit.php. The manipulation of the argument ifName leads to os command injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. VDB-263106 is the identifier assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW",
"baseScore": 4.7,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.2,
"impactScore": 3.4
}
],
"cvssMetricV2": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:M/C:P/I:P/A:P",
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "MULTIPLE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL",
"baseScore": 5.8
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 6.4,
"impactScore": 6.4,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-78"
}
]
}
],
"references": [
{
"url": "https://github.com/h0e4a0r1t/-2x3J-1rPc-1-0-/blob/main/Ruijie%20RG-UAC%20Unified%20Internet%20Behavior%20Management%20Audit%20System%20Backend%20RCE%20Vulnerability-view_dhcp_dhcpClient_dhcp_client_commit.php.pdf",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?ctiid.263106",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?id.263106",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?submit.323811",
"source": "cna@vuldb.com"
}
]
}

View File

@ -0,0 +1,92 @@
{
"id": "CVE-2024-4503",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-05-05T22:15:07.927",
"lastModified": "2024-05-05T22:15:07.927",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability classified as critical was found in Ruijie RG-UAC up to 20240428. Affected by this vulnerability is an unknown functionality of the file /view/dhcp/dhcpConfig/dhcp_relay_commit.php. The manipulation of the argument interface_from leads to os command injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-263107. NOTE: The vendor was contacted early about this disclosure but did not respond in any way."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW",
"baseScore": 4.7,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.2,
"impactScore": 3.4
}
],
"cvssMetricV2": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:M/C:P/I:P/A:P",
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "MULTIPLE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL",
"baseScore": 5.8
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 6.4,
"impactScore": 6.4,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-78"
}
]
}
],
"references": [
{
"url": "https://github.com/h0e4a0r1t/-2x3J-1rPc-1-0-/blob/main/Ruijie%20RG-UAC%20Unified%20Internet%20Behavior%20Management%20Audit%20System%20Backend%20RCE%20Vulnerability-dhcp_relay_commit.php.pdf",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?ctiid.263107",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?id.263107",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?submit.323813",
"source": "cna@vuldb.com"
}
]
}

View File

@ -0,0 +1,92 @@
{
"id": "CVE-2024-4504",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-05-05T23:15:30.083",
"lastModified": "2024-05-05T23:15:30.083",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability, which was classified as critical, has been found in Ruijie RG-UAC up to 20240428. Affected by this issue is some unknown functionality of the file /view/HAconfig/baseConfig/commit.php. The manipulation of the argument peer_ip/local_ip leads to os command injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-263108. NOTE: The vendor was contacted early about this disclosure but did not respond in any way."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW",
"baseScore": 4.7,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.2,
"impactScore": 3.4
}
],
"cvssMetricV2": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:M/C:P/I:P/A:P",
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "MULTIPLE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL",
"baseScore": 5.8
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 6.4,
"impactScore": 6.4,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-78"
}
]
}
],
"references": [
{
"url": "https://github.com/h0e4a0r1t/-2x3J-1rPc-1-0-/blob/main/Ruijie%20RG-UAC%20Unified%20Internet%20Behavior%20Management%20Audit%20System%20Backend%20RCE%20Vulnerability-view_HAconfig_baseConfig_commit.php.pdf",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?ctiid.263108",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?id.263108",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?submit.323814",
"source": "cna@vuldb.com"
}
]
}

View File

@ -0,0 +1,92 @@
{
"id": "CVE-2024-4505",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-05-05T23:15:30.377",
"lastModified": "2024-05-05T23:15:30.377",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability, which was classified as critical, was found in Ruijie RG-UAC up to 20240428. This affects an unknown part of the file /view/IPV6/ipv6Addr/ip_addr_add_commit.php. The manipulation of the argument prelen/ethname leads to os command injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-263109 was assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW",
"baseScore": 4.7,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.2,
"impactScore": 3.4
}
],
"cvssMetricV2": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:M/C:P/I:P/A:P",
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "MULTIPLE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL",
"baseScore": 5.8
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 6.4,
"impactScore": 6.4,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-78"
}
]
}
],
"references": [
{
"url": "https://github.com/h0e4a0r1t/-2x3J-1rPc-1-0-/blob/main/Ruijie%20RG-UAC%20Unified%20Internet%20Behavior%20Management%20Audit%20System%20Backend%20RCE%20Vulnerability-ip_addr_add_commit.php.pdf",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?ctiid.263109",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?id.263109",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?submit.323815",
"source": "cna@vuldb.com"
}
]
}

View File

@ -0,0 +1,92 @@
{
"id": "CVE-2024-4506",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-05-05T23:15:30.673",
"lastModified": "2024-05-05T23:15:30.673",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability has been found in Ruijie RG-UAC up to 20240428 and classified as critical. This vulnerability affects unknown code of the file /view/IPV6/ipv6Addr/ip_addr_edit_commit.php. The manipulation of the argument text_ip_addr/orgprelen/orgname leads to os command injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. VDB-263110 is the identifier assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW",
"baseScore": 4.7,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.2,
"impactScore": 3.4
}
],
"cvssMetricV2": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:M/C:P/I:P/A:P",
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "MULTIPLE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL",
"baseScore": 5.8
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 6.4,
"impactScore": 6.4,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-78"
}
]
}
],
"references": [
{
"url": "https://github.com/h0e4a0r1t/-2x3J-1rPc-1-0-/blob/main/Ruijie%20RG-UAC%20Unified%20Internet%20Behavior%20Management%20Audit%20System%20Backend%20RCE%20Vulnerability-ip_addr_edit_commit.php.pdf",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?ctiid.263110",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?id.263110",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?submit.323816",
"source": "cna@vuldb.com"
}
]
}

View File

@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update
```plain
2024-05-05T22:00:37.741998+00:00
2024-05-05T23:55:30.245075+00:00
```
### Most recent CVE Modification Timestamp synchronized with NVD
```plain
2024-05-05T21:15:55.650000+00:00
2024-05-05T23:15:30.673000+00:00
```
### Last Data Feed Release
@ -33,25 +33,26 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
### Total Number of included CVEs
```plain
248629
248635
```
### CVEs added in the last Commit
Recently added CVEs: `6`
- [CVE-2024-34508](CVE-2024/CVE-2024-345xx/CVE-2024-34508.json) (`2024-05-05T20:15:07.310`)
- [CVE-2024-34509](CVE-2024/CVE-2024-345xx/CVE-2024-34509.json) (`2024-05-05T20:15:07.367`)
- [CVE-2024-34510](CVE-2024/CVE-2024-345xx/CVE-2024-34510.json) (`2024-05-05T20:15:07.417`)
- [CVE-2024-34511](CVE-2024/CVE-2024-345xx/CVE-2024-34511.json) (`2024-05-05T20:15:07.627`)
- [CVE-2024-34515](CVE-2024/CVE-2024-345xx/CVE-2024-34515.json) (`2024-05-05T21:15:55.650`)
- [CVE-2024-4501](CVE-2024/CVE-2024-45xx/CVE-2024-4501.json) (`2024-05-05T20:15:07.923`)
- [CVE-2024-34519](CVE-2024/CVE-2024-345xx/CVE-2024-34519.json) (`2024-05-05T22:15:07.563`)
- [CVE-2024-4502](CVE-2024/CVE-2024-45xx/CVE-2024-4502.json) (`2024-05-05T22:15:07.623`)
- [CVE-2024-4503](CVE-2024/CVE-2024-45xx/CVE-2024-4503.json) (`2024-05-05T22:15:07.927`)
- [CVE-2024-4504](CVE-2024/CVE-2024-45xx/CVE-2024-4504.json) (`2024-05-05T23:15:30.083`)
- [CVE-2024-4505](CVE-2024/CVE-2024-45xx/CVE-2024-4505.json) (`2024-05-05T23:15:30.377`)
- [CVE-2024-4506](CVE-2024/CVE-2024-45xx/CVE-2024-4506.json) (`2024-05-05T23:15:30.673`)
### CVEs modified in the last Commit
Recently modified CVEs: `0`
Recently modified CVEs: `1`
- [CVE-2023-52723](CVE-2023/CVE-2023-527xx/CVE-2023-52723.json) (`2024-05-05T22:15:07.487`)
## Download and Usage

View File

@ -237539,7 +237539,7 @@ CVE-2023-52716,0,0,fac095701883d01d5f92e56c70701dc066b3ae8f92d0c5921c5cf0aa2fbb0
CVE-2023-52717,0,0,e713315d9fcc50e6cbb98e0dd380e2c86ba52b63a35d352b23f2645ee0f83a24,2024-04-08T18:48:40.217000
CVE-2023-5272,0,0,e188ff056a72e73c412c109b97d5eb37c41b2dbce71d285e9dfeb205fc3a7064,2024-04-11T01:22:56.733000
CVE-2023-52722,0,0,98127abf72f40ccdfd330396916afd82fb054ba100d5c84d9a9427744af0fae8,2024-04-29T12:42:03.667000
CVE-2023-52723,0,0,c33a6b8ae0283a929c75a65001b47edbc392d284a6e9581215bdd6ddec58e52d,2024-05-01T17:15:27.657000
CVE-2023-52723,0,1,583a4c96a7b28499ddb7ff561365e6e19aba033c74ad8d268661d6153971a1dd,2024-05-05T22:15:07.487000
CVE-2023-52724,0,0,e4f95bcab1195f846dc270610c1bdc3ac2e4854ca9278c47b39a202d9f9600b6,2024-04-30T13:11:16.690000
CVE-2023-52725,0,0,88d4f88411bb4be959efdeb51d80e463c208ec56315d110e44fcff8343b01a06,2024-04-30T13:11:16.690000
CVE-2023-52726,0,0,5e306dbe5f156c9416e227d0fff184c45bfebf2f1e4b91c9c4b65ae3bc844b98,2024-04-30T13:11:16.690000
@ -248196,11 +248196,12 @@ CVE-2024-34500,0,0,58eeeb4ceee7cd56efef9405aae967c580bdd887869944bcbb113fe48fe20
CVE-2024-34502,0,0,8a176dc8d4a6b9c7fef7feca2203e30e3bc49cd72dd5eb92234bdb310cc21562,2024-05-05T19:15:07.197000
CVE-2024-34506,0,0,be90bb03e4465dcd59e0d2c96abe5fe3b0ea571022938936caf88d3cb7267ece,2024-05-05T19:15:07.253000
CVE-2024-34507,0,0,b5ba2ea2df1211c2666eb42c55a42e747c64c39eb3ac0738b802dd96692e1fe7,2024-05-05T19:15:07.307000
CVE-2024-34508,1,1,99ea82e896ebc25f60992ed5579c210ed81d3d42ca7acefe04b381fbf52f6c3a,2024-05-05T20:15:07.310000
CVE-2024-34509,1,1,6bf2150b2596626c514845d30540487bb1d950ccdf706219c76a6afbc5cfda72,2024-05-05T20:15:07.367000
CVE-2024-34510,1,1,70c105ba345d0fa8609a9db9459099b788908b71b0b900afc0747ce8d55f49a3,2024-05-05T20:15:07.417000
CVE-2024-34511,1,1,4e86e2a278a7abc19602c23a8e6582af1482bd970eb4f4e0c89a29dca169ee47,2024-05-05T20:15:07.627000
CVE-2024-34515,1,1,3c778723bf571e048a4b56610d5bfcf3e49a1dece61fe69668baa7b58396004a,2024-05-05T21:15:55.650000
CVE-2024-34508,0,0,99ea82e896ebc25f60992ed5579c210ed81d3d42ca7acefe04b381fbf52f6c3a,2024-05-05T20:15:07.310000
CVE-2024-34509,0,0,6bf2150b2596626c514845d30540487bb1d950ccdf706219c76a6afbc5cfda72,2024-05-05T20:15:07.367000
CVE-2024-34510,0,0,70c105ba345d0fa8609a9db9459099b788908b71b0b900afc0747ce8d55f49a3,2024-05-05T20:15:07.417000
CVE-2024-34511,0,0,4e86e2a278a7abc19602c23a8e6582af1482bd970eb4f4e0c89a29dca169ee47,2024-05-05T20:15:07.627000
CVE-2024-34515,0,0,3c778723bf571e048a4b56610d5bfcf3e49a1dece61fe69668baa7b58396004a,2024-05-05T21:15:55.650000
CVE-2024-34519,1,1,ff08f781b18880538cd447086482a9c2019e6851e3e318f99fcac49c6db575d1,2024-05-05T22:15:07.563000
CVE-2024-3455,0,0,18e948f1ff2182718852b2ba697f0fa9a8598811bb1c2e87509c3bd543b90a57,2024-04-11T01:26:03.233000
CVE-2024-3456,0,0,944b33373fddc7621692e3fce6708723c7abc962139d88da65ad0c4ce610f104,2024-04-11T01:26:03.310000
CVE-2024-3457,0,0,eda30bdfb17395ab91987b75a43f4990cc086dc3cfa77a90fc0cb388efd5e793,2024-04-11T01:26:03.387000
@ -248627,4 +248628,9 @@ CVE-2024-4495,0,0,090c905364a66d6b3afd5ea162f8d6fc1e1632995f309fe54f30ab337afebb
CVE-2024-4496,0,0,e1fcc45b1034f985f4823efe20fe933874806e2d2221fef290013797f50d095e,2024-05-05T06:15:08.027000
CVE-2024-4497,0,0,ccd8c07caa7e538c008422f1f8d5b32bba85ed00504a43d05b15927b41ba1488,2024-05-05T07:15:06.463000
CVE-2024-4500,0,0,ff5efd9f33021e890cd375fe167f7344647ce437a4cb036a2626992a1c802eda,2024-05-05T18:15:27.753000
CVE-2024-4501,1,1,7d84c8624ffa9e467ffa6080915f7901ab1d1e830d9f877fb7181460457121f5,2024-05-05T20:15:07.923000
CVE-2024-4501,0,0,7d84c8624ffa9e467ffa6080915f7901ab1d1e830d9f877fb7181460457121f5,2024-05-05T20:15:07.923000
CVE-2024-4502,1,1,ce4ff076eb826a8aa73ad98b8d4795ac10b199c57e413ecdab0d4827e4b779f1,2024-05-05T22:15:07.623000
CVE-2024-4503,1,1,ea57e2e9f66eb184b782d41149d1f80f1c84bb5e1ae57a71494c64f4e742f47e,2024-05-05T22:15:07.927000
CVE-2024-4504,1,1,24932f91fc45aefa51c7342937d4549ac6f96aee8afc0012b20f7eaec2bd5660,2024-05-05T23:15:30.083000
CVE-2024-4505,1,1,8fd7784498ae958779a4f7bbbffa4f2fba67e7c4d2b175ce3313d0d38efef96a,2024-05-05T23:15:30.377000
CVE-2024-4506,1,1,08b373214d4a28df4e063caeee7262d68425f0368b4960fe913f6afb094bc0a8,2024-05-05T23:15:30.673000

Can't render this file because it is too large.