Auto-Update: 2024-04-10T23:55:29.847623+00:00

This commit is contained in:
cad-safe-bot 2024-04-10 23:58:19 +00:00
parent 4c14a907ce
commit ae1c8bd448
14 changed files with 568 additions and 63 deletions

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-28219",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-04-03T03:15:09.710",
"lastModified": "2024-04-10T05:15:48.810",
"lastModified": "2024-04-10T22:15:07.193",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
@ -39,6 +39,10 @@
]
},
"references": [
{
"url": "https://lists.debian.org/debian-lts-announce/2024/04/msg00008.html",
"source": "cve@mitre.org"
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4XLPUT3VK4GQ6EVY525TT2QNUIXNRU5M/",
"source": "cve@mitre.org"

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2024-29439",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-04-10T23:15:06.753",
"lastModified": "2024-04-10T23:15:06.753",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "An unauthorized node injection vulnerability has been identified in ROS2 Humble Hawksbill in ROS_VERSION 2 and ROS_PYTHON_VERSION 3, allows remote attackers to escalate privileges and inject malicious ROS2 nodes into the system."
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/yashpatelphd/CVE-2024-29439",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2024-29443",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-04-10T23:15:06.810",
"lastModified": "2024-04-10T23:15:06.810",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "A shell injection vulnerability was discovered in ROS2 (Robot Operating System 2) Humble Hawksbill in ROS_VERSION 2 and ROS_PYTHON_VERSION 3, allows remote attackers to execute arbitrary code, escalate privileges, and obtain sensitive information due to the way ROS2 handles shell command execution in components like command interpreters or interfaces that process external inputs."
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/yashpatelphd/CVE-2024-29443",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2024-29445",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-04-10T23:15:06.857",
"lastModified": "2024-04-10T23:15:06.857",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "An issue was discovered in ROS2 (Robot Operating System 2) Humble Hawksbill in ROS_VERSION 2 and ROS_PYTHON_VERSION 3 where the system transmits messages in plaintext, allowing attackers to access sensitive information via a man-in-the-middle attack."
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/yashpatelphd/CVE-2024-29445",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,24 @@
{
"id": "CVE-2024-29504",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-04-10T22:15:07.287",
"lastModified": "2024-04-10T22:15:07.287",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Cross Site Scripting vulnerability in Summernote v.0.8.18 and before allows a remote attacker to execute arbtirary code via a crafted payload to the codeview parameter."
}
],
"metrics": {},
"references": [
{
"url": "https://gist.github.com/phoenix118go/a9192281efcfa518daa709ab7638712b",
"source": "cve@mitre.org"
},
{
"url": "https://github.com/summernote/summernote/pull/3782",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,71 @@
{
"id": "CVE-2024-29902",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-04-10T23:15:06.920",
"lastModified": "2024-04-10T23:15:06.920",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Cosign provides code signing and transparency for containers and binaries. Prior to version 2.2.4, a remote image with a malicious attachment can cause denial of service of the host machine running Cosign. This can impact other services on the machine that rely on having memory available such as a Redis database which can result in data loss. It can also impact the availability of other services on the machine that will not be available for the duration of the machine denial. The root cause of this issue is that Cosign reads the attachment from a remote image entirely into memory without checking the size of the attachment first. As such, a large attachment can make Cosign read a large attachment into memory; If the attachments size is larger than the machine has memory available, the machine will be denied of service. The Go runtime will make a SigKill after a few seconds of system-wide denial. This issue can allow a supply-chain escalation from a compromised registry to the Cosign user: If an attacher has compromised a registry or the account of an image vendor, they can include a malicious attachment and hurt the image consumer. Version 2.2.4 contains a patch for the vulnerability."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:N/I:N/A:H",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "HIGH",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 4.2,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 0.5,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-770"
}
]
}
],
"references": [
{
"url": "https://github.com/google/go-containerregistry/blob/a0658aa1d0cc7a7f1bcc4a3af9155335b6943f40/pkg/v1/remote/layer.go#L36-L40",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/sigstore/cosign/blob/9bc3ee309bf35d2f6e17f5d23f231a3d8bf580bc/pkg/oci/remote/remote.go#L228-L239",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/sigstore/cosign/commit/629f5f8fa672973503edde75f84dcd984637629e",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/sigstore/cosign/releases/tag/v2.2.4",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/sigstore/cosign/security/advisories/GHSA-88jx-383q-w4qc",
"source": "security-advisories@github.com"
}
]
}

View File

@ -0,0 +1,71 @@
{
"id": "CVE-2024-29903",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-04-10T23:15:07.130",
"lastModified": "2024-04-10T23:15:07.130",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Cosign provides code signing and transparency for containers and binaries. Prior to version 2.2.4, maliciously-crafted software artifacts can cause denial of service of the machine running Cosign thereby impacting all services on the machine. The root cause is that Cosign creates slices based on the number of signatures, manifests or attestations in untrusted artifacts. As such, the untrusted artifact can control the amount of memory that Cosign allocates. The exact issue is Cosign allocates excessive memory on the lines that creates a slice of the same length as the manifests. Version 2.2.4 contains a patch for the vulnerability."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:N/I:N/A:H",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "HIGH",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 4.2,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 0.5,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-770"
}
]
}
],
"references": [
{
"url": "https://github.com/sigstore/cosign/blob/14795db16417579fac0c00c11e166868d7976b61/pkg/cosign/verify.go#L948-L955",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/sigstore/cosign/blob/286a98a4a99c1b2f32f84b0d560e324100312280/pkg/oci/remote/signatures.go#L56-L70",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/sigstore/cosign/commit/629f5f8fa672973503edde75f84dcd984637629e",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/sigstore/cosign/releases/tag/v2.2.4",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/sigstore/cosign/security/advisories/GHSA-95pr-fxf5-86gv",
"source": "security-advisories@github.com"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2024-30728",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-04-10T23:15:07.317",
"lastModified": "2024-04-10T23:15:07.317",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "An issue was discovered in the default configurations of ROS (Robot Operating System) Kinetic Kame ROS_VERSION 1 and ROS_ PYTHON_VERSION 3, allows unauthenticated attackers to gain access using default credentials."
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/yashpatelphd/CVE-2024-30728",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,67 @@
{
"id": "CVE-2024-31995",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-04-10T22:15:07.340",
"lastModified": "2024-04-10T22:15:07.340",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "`@digitalbazaar/zcap` provides JavaScript reference implementation for Authorization Capabilities. Prior to version 9.0.1, when invoking a capability with a chain depth of 2, i.e., it is delegated directly from the root capability, the `expires` property is not properly checked against the current date or other `date` param. This can allow invocations outside of the original intended time period. A zcap still cannot be invoked without being able to use the associated private key material. `@digitalbazaar/zcap` v9.0.1 fixes expiration checking. As a workaround, one may revoke a zcap at any time."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-613"
}
]
}
],
"references": [
{
"url": "https://github.com/digitalbazaar/zcap/commit/261eea040109b6e25159c88d8ed49d3c37f8fcfe",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/digitalbazaar/zcap/commit/55f8549c80124b85dfb0f3dcf83f2c63f42532e5",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/digitalbazaar/zcap/pull/82",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/digitalbazaar/zcap/security/advisories/GHSA-hp8h-7x69-4wmv",
"source": "security-advisories@github.com"
}
]
}

View File

@ -0,0 +1,71 @@
{
"id": "CVE-2024-31997",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-04-10T22:15:07.527",
"lastModified": "2024-04-10T22:15:07.527",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "XWiki Platform is a generic wiki platform. Prior to versions 4.10.19, 15.5.4, and 15.10-rc-1, parameters of UI extensions are always interpreted as Velocity code and executed with programming rights. Any user with edit right on any document like the user's own profile can create UI extensions. This allows remote code execution and thereby impacts the confidentiality, integrity and availability of the whole XWiki installation. This vulnerability has been patched in XWiki 14.10.19, 15.5.4 and 15.9-RC1. No known workarounds are available."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.9,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.1,
"impactScore": 6.0
}
]
},
"weaknesses": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-862"
}
]
}
],
"references": [
{
"url": "https://github.com/xwiki/xwiki-platform/commit/171e7c7d0e56deaa7b3678657ae26ef95379b1ea",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/xwiki/xwiki-platform/commit/1b2574eb966457ca4ef34e557376b8751d1be90d",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/xwiki/xwiki-platform/commit/56748e154a9011f0d6239bec0823eaaeab6ec3f7",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-c2gg-4gq4-jv5j",
"source": "security-advisories@github.com"
},
{
"url": "https://jira.xwiki.org/browse/XWIKI-21335",
"source": "security-advisories@github.com"
}
]
}

View File

@ -0,0 +1,59 @@
{
"id": "CVE-2024-31999",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-04-10T22:15:07.710",
"lastModified": "2024-04-10T22:15:07.710",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "@festify/secure-session creates a secure stateless cookie session for Fastify. At the end of the request handling, it will encrypt all data in the session with a secret key and attach the ciphertext as a cookie value with the defined cookie name. After that, the session on the server side is destroyed. When an encrypted cookie with matching session name is provided with subsequent requests, it will decrypt the ciphertext to get the data. The plugin then creates a new session with the data in the ciphertext. Thus theoretically the web instance is still accessing the data from a server-side session, but technically that session is generated solely from a user provided cookie (which is assumed to be non-craftable because it is encrypted with a secret key not known to the user). The issue exists in the session removal process. In the delete function of the code, when the session is deleted, it is marked for deletion. However, if an attacker could gain access to the cookie, they could keep using it forever. Version 7.3.0 contains a patch for the issue. As a workaround, one may include a \"last update\" field in the session, and treat \"old sessions\" as expired."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 7.4,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 4.0
}
]
},
"weaknesses": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-613"
}
]
}
],
"references": [
{
"url": "https://github.com/fastify/fastify-secure-session/commit/56d66642ecc633cff0606927601e81cdac361370",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/fastify/fastify-secure-session/security/advisories/GHSA-9wwp-q7wq-jx35",
"source": "security-advisories@github.com"
}
]
}

View File

@ -0,0 +1,63 @@
{
"id": "CVE-2024-32001",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-04-10T23:15:07.363",
"lastModified": "2024-04-10T23:15:07.363",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "SpiceDB is a graph database purpose-built for storing and evaluating access control data. Use of a relation of the form: `relation folder: folder | folder#parent` with an arrow such as `folder->view` can cause LookupSubjects to only return the subjects found under subjects for either `folder` or `folder#parent`. This bug only manifests if the same subject type is used multiple types in a relation, relationships exist for both subject types and an arrow is used over the relation. Any user making a negative authorization decision based on the results of a LookupSubjects request with version before v1.30.1 is affected. Version 1.30.1 contains a patch for the issue. As a workaround, avoid using LookupSubjects for negative authorization decisions and/or avoid using the broken schema.\n"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 2.2,
"baseSeverity": "LOW"
},
"exploitabilityScore": 0.7,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-755"
}
]
}
],
"references": [
{
"url": "https://github.com/authzed/spicedb/commit/a244ed1edfaf2382711dccdb699971ec97190c7b",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/authzed/spicedb/releases/tag/v1.30.1",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/authzed/spicedb/security/advisories/GHSA-j85q-46hg-36p2",
"source": "security-advisories@github.com"
}
]
}

View File

@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update
```plain
2024-04-10T22:00:38.015965+00:00
2024-04-10T23:55:29.847623+00:00
```
### Most recent CVE Modification Timestamp synchronized with NVD
```plain
2024-04-10T21:15:07.510000+00:00
2024-04-10T23:15:07.363000+00:00
```
### Last Data Feed Release
@ -33,47 +33,31 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
### Total Number of included CVEs
```plain
245139
245150
```
### CVEs added in the last Commit
Recently added CVEs: `19`
Recently added CVEs: `11`
- [CVE-2024-1481](CVE-2024/CVE-2024-14xx/CVE-2024-1481.json) (`2024-04-10T21:15:06.313`)
- [CVE-2024-26362](CVE-2024/CVE-2024-263xx/CVE-2024-26362.json) (`2024-04-10T21:15:06.533`)
- [CVE-2024-29269](CVE-2024/CVE-2024-292xx/CVE-2024-29269.json) (`2024-04-10T20:15:07.440`)
- [CVE-2024-29460](CVE-2024/CVE-2024-294xx/CVE-2024-29460.json) (`2024-04-10T21:15:06.583`)
- [CVE-2024-29500](CVE-2024/CVE-2024-295xx/CVE-2024-29500.json) (`2024-04-10T20:15:07.510`)
- [CVE-2024-29502](CVE-2024/CVE-2024-295xx/CVE-2024-29502.json) (`2024-04-10T20:15:07.567`)
- [CVE-2024-31430](CVE-2024/CVE-2024-314xx/CVE-2024-31430.json) (`2024-04-10T20:15:07.620`)
- [CVE-2024-31465](CVE-2024/CVE-2024-314xx/CVE-2024-31465.json) (`2024-04-10T20:15:07.833`)
- [CVE-2024-31819](CVE-2024/CVE-2024-318xx/CVE-2024-31819.json) (`2024-04-10T20:15:08.027`)
- [CVE-2024-31939](CVE-2024/CVE-2024-319xx/CVE-2024-31939.json) (`2024-04-10T20:15:08.083`)
- [CVE-2024-31981](CVE-2024/CVE-2024-319xx/CVE-2024-31981.json) (`2024-04-10T20:15:08.280`)
- [CVE-2024-31982](CVE-2024/CVE-2024-319xx/CVE-2024-31982.json) (`2024-04-10T20:15:08.463`)
- [CVE-2024-31983](CVE-2024/CVE-2024-319xx/CVE-2024-31983.json) (`2024-04-10T20:15:08.650`)
- [CVE-2024-31984](CVE-2024/CVE-2024-319xx/CVE-2024-31984.json) (`2024-04-10T20:15:08.830`)
- [CVE-2024-31985](CVE-2024/CVE-2024-319xx/CVE-2024-31985.json) (`2024-04-10T21:15:06.723`)
- [CVE-2024-31986](CVE-2024/CVE-2024-319xx/CVE-2024-31986.json) (`2024-04-10T21:15:06.917`)
- [CVE-2024-31987](CVE-2024/CVE-2024-319xx/CVE-2024-31987.json) (`2024-04-10T21:15:07.110`)
- [CVE-2024-31988](CVE-2024/CVE-2024-319xx/CVE-2024-31988.json) (`2024-04-10T21:15:07.297`)
- [CVE-2024-31996](CVE-2024/CVE-2024-319xx/CVE-2024-31996.json) (`2024-04-10T21:15:07.510`)
- [CVE-2024-29439](CVE-2024/CVE-2024-294xx/CVE-2024-29439.json) (`2024-04-10T23:15:06.753`)
- [CVE-2024-29443](CVE-2024/CVE-2024-294xx/CVE-2024-29443.json) (`2024-04-10T23:15:06.810`)
- [CVE-2024-29445](CVE-2024/CVE-2024-294xx/CVE-2024-29445.json) (`2024-04-10T23:15:06.857`)
- [CVE-2024-29504](CVE-2024/CVE-2024-295xx/CVE-2024-29504.json) (`2024-04-10T22:15:07.287`)
- [CVE-2024-29902](CVE-2024/CVE-2024-299xx/CVE-2024-29902.json) (`2024-04-10T23:15:06.920`)
- [CVE-2024-29903](CVE-2024/CVE-2024-299xx/CVE-2024-29903.json) (`2024-04-10T23:15:07.130`)
- [CVE-2024-30728](CVE-2024/CVE-2024-307xx/CVE-2024-30728.json) (`2024-04-10T23:15:07.317`)
- [CVE-2024-31995](CVE-2024/CVE-2024-319xx/CVE-2024-31995.json) (`2024-04-10T22:15:07.340`)
- [CVE-2024-31997](CVE-2024/CVE-2024-319xx/CVE-2024-31997.json) (`2024-04-10T22:15:07.527`)
- [CVE-2024-31999](CVE-2024/CVE-2024-319xx/CVE-2024-31999.json) (`2024-04-10T22:15:07.710`)
- [CVE-2024-32001](CVE-2024/CVE-2024-320xx/CVE-2024-32001.json) (`2024-04-10T23:15:07.363`)
### CVEs modified in the last Commit
Recently modified CVEs: `9`
Recently modified CVEs: `1`
- [CVE-2021-46945](CVE-2021/CVE-2021-469xx/CVE-2021-46945.json) (`2024-04-10T20:11:52.607`)
- [CVE-2021-46947](CVE-2021/CVE-2021-469xx/CVE-2021-46947.json) (`2024-04-10T20:00:47.847`)
- [CVE-2021-46948](CVE-2021/CVE-2021-469xx/CVE-2021-46948.json) (`2024-04-10T20:14:23.420`)
- [CVE-2021-46949](CVE-2021/CVE-2021-469xx/CVE-2021-46949.json) (`2024-04-10T20:14:05.477`)
- [CVE-2021-46950](CVE-2021/CVE-2021-469xx/CVE-2021-46950.json) (`2024-04-10T20:13:16.993`)
- [CVE-2021-46951](CVE-2021/CVE-2021-469xx/CVE-2021-46951.json) (`2024-04-10T20:15:55.593`)
- [CVE-2021-46952](CVE-2021/CVE-2021-469xx/CVE-2021-46952.json) (`2024-04-10T20:15:42.153`)
- [CVE-2021-46953](CVE-2021/CVE-2021-469xx/CVE-2021-46953.json) (`2024-04-10T20:15:31.827`)
- [CVE-2021-46954](CVE-2021/CVE-2021-469xx/CVE-2021-46954.json) (`2024-04-10T20:15:05.997`)
- [CVE-2024-28219](CVE-2024/CVE-2024-282xx/CVE-2024-28219.json) (`2024-04-10T22:15:07.193`)
## Download and Usage

View File

@ -186671,16 +186671,16 @@ CVE-2021-46941,0,0,2ce82780f5a41832c9f1a25f06ccfdaa21aea0198a98e335b1d5dcb3a9149
CVE-2021-46942,0,0,71a41cff6abe69a3265caabe98ca8aa57ab0c584e39536edfbd964c34d56e2cf,2024-04-10T19:56:14.227000
CVE-2021-46943,0,0,2a1ca0405fb7880053d590ee8ada03dc0948253fa996ab8b3397058593a5b290,2024-04-10T19:54:14.133000
CVE-2021-46944,0,0,d82544911189784027f8e2047744f9ca05b54cebfb5102fe4426566e939bb2ca,2024-04-10T19:53:31.403000
CVE-2021-46945,0,1,1613c958c09405129a6b68f2262f9d58b2f5c10f7a982b4987ec1994d9a32d3b,2024-04-10T20:11:52.607000
CVE-2021-46945,0,0,1613c958c09405129a6b68f2262f9d58b2f5c10f7a982b4987ec1994d9a32d3b,2024-04-10T20:11:52.607000
CVE-2021-46946,0,0,0a7824c78fda312e2a69c092b1751fd0538157938572285a8b1a980223fde408,2024-03-08T10:15:45.650000
CVE-2021-46947,0,1,b836dedfa92fccc459fea40fd62d889b18f3a7211503c6e1458f463ce4cd94fa,2024-04-10T20:00:47.847000
CVE-2021-46948,0,1,b735e473c0cc9db781753c23f03e7c4346b8baca6dd6c7b501cb74c7e8f13da1,2024-04-10T20:14:23.420000
CVE-2021-46949,0,1,5b1e4d2b1d1decfe38452960e2060c08e8baefdc1774769d6276c72ce0ba66a0,2024-04-10T20:14:05.477000
CVE-2021-46950,0,1,3e0c1477c3d1b853b315d95e62161507cd6ba5a2f228afbd68ca9b69bca6cc21,2024-04-10T20:13:16.993000
CVE-2021-46951,0,1,cdeb017dba1dc02345762262d8f58167052941f9bff86ac49714bca449358df9,2024-04-10T20:15:55.593000
CVE-2021-46952,0,1,f0590ad3581458f5870bbcc3eeafad1b8dc84f834be560190a650ebee3f1aec9,2024-04-10T20:15:42.153000
CVE-2021-46953,0,1,fc975863d057a83236efe5442bd7ee1f9bf1317c42d05c8e8457e553a3d1fcab,2024-04-10T20:15:31.827000
CVE-2021-46954,0,1,7b86c3106c31d68eb2c15d95a5dc1291fc4efed7efd9059eadfa1b565e6e38e1,2024-04-10T20:15:05.997000
CVE-2021-46947,0,0,b836dedfa92fccc459fea40fd62d889b18f3a7211503c6e1458f463ce4cd94fa,2024-04-10T20:00:47.847000
CVE-2021-46948,0,0,b735e473c0cc9db781753c23f03e7c4346b8baca6dd6c7b501cb74c7e8f13da1,2024-04-10T20:14:23.420000
CVE-2021-46949,0,0,5b1e4d2b1d1decfe38452960e2060c08e8baefdc1774769d6276c72ce0ba66a0,2024-04-10T20:14:05.477000
CVE-2021-46950,0,0,3e0c1477c3d1b853b315d95e62161507cd6ba5a2f228afbd68ca9b69bca6cc21,2024-04-10T20:13:16.993000
CVE-2021-46951,0,0,cdeb017dba1dc02345762262d8f58167052941f9bff86ac49714bca449358df9,2024-04-10T20:15:55.593000
CVE-2021-46952,0,0,f0590ad3581458f5870bbcc3eeafad1b8dc84f834be560190a650ebee3f1aec9,2024-04-10T20:15:42.153000
CVE-2021-46953,0,0,fc975863d057a83236efe5442bd7ee1f9bf1317c42d05c8e8457e553a3d1fcab,2024-04-10T20:15:31.827000
CVE-2021-46954,0,0,7b86c3106c31d68eb2c15d95a5dc1291fc4efed7efd9059eadfa1b565e6e38e1,2024-04-10T20:15:05.997000
CVE-2021-46955,0,0,8e7e45a3c2d2d91bfe6dad4aedbcc224c005a793a9b3eb00dc68e85801b57fe7,2024-02-28T14:06:45.783000
CVE-2021-46956,0,0,f7bc9f8b64d6935913ddffde8af0208d9079784355a122db9c80c84c9d51a638,2024-02-28T14:06:45.783000
CVE-2021-46957,0,0,14fd49e37d540c926a80f3f6606795d4205f9233f4239fe575d9c38428402a5d,2024-02-28T14:06:45.783000
@ -239335,7 +239335,7 @@ CVE-2024-1476,0,0,d66db5b934d457173411a6e7c87c116f96f98ca76565b282c78606f1c9c844
CVE-2024-1477,0,0,b1175a71510fd842138862374f281c1bda7457d7b234a1bf81a7a2fcce39bd63,2024-03-20T13:00:16.367000
CVE-2024-1478,0,0,54fc4d2d1af2d772e45f440cc01a56a5078a7b4f242f25febd2c561b4b9b409a,2024-03-05T13:41:01.900000
CVE-2024-1479,0,0,75eecf66dbf69c578ea2f09e6e564cdf3b04311a1ae51ea49bee3724800fe960,2024-03-13T18:15:58.530000
CVE-2024-1481,1,1,5a8cba030f734642adbec08edae8c0145fab160bd4605da2cbc1b80853cd5c84,2024-04-10T21:15:06.313000
CVE-2024-1481,0,0,5a8cba030f734642adbec08edae8c0145fab160bd4605da2cbc1b80853cd5c84,2024-04-10T21:15:06.313000
CVE-2024-1482,0,0,61f1933d97f430ea5062371f54d100c6fb03c771024804bcdad5092bc2efbfc7,2024-02-15T06:23:39.303000
CVE-2024-1484,0,0,2816ffb064ebf87ebca44e6afd6928df4e130e61997f3bc50802157887bafe8f,2024-03-13T18:15:58.530000
CVE-2024-1485,0,0,b9f4145834ee9d538c2d6e8caecb301f8f2dde5a282a13e80f59671c5263bb0b,2024-02-22T01:15:07.980000
@ -242777,7 +242777,7 @@ CVE-2024-26350,0,0,94fde44080954984b73836ed416075677e0fc24eadc0bc6ed473bcf70a41b
CVE-2024-26351,0,0,ca59fd7de6fb4b8be3d1dd63bf1340c6e097ec7efd2f74728f2b6d3782e5af9c,2024-02-22T19:07:27.197000
CVE-2024-26352,0,0,a91e9b827b34ff74d03de6eecd5ed6a244c3125227e96fd7536e6e0fc75fc75e,2024-02-22T19:07:27.197000
CVE-2024-2636,0,0,2136f31c86bb7a335e516e0265dfb7c3eee5b1d10cfc06f1391b5375fe684311,2024-03-19T13:26:46
CVE-2024-26362,1,1,62de1107964cb50e28a10d04c294360068e68e0c98598460e24293d6c63a086a,2024-04-10T21:15:06.533000
CVE-2024-26362,0,0,62de1107964cb50e28a10d04c294360068e68e0c98598460e24293d6c63a086a,2024-04-10T21:15:06.533000
CVE-2024-26369,0,0,b0322db94f9b89a2da31dd1ffa70ef568f3b1c4901ca044ba9c0ea1e2eb29c09,2024-03-19T13:26:46
CVE-2024-2639,0,0,be497fbeac2957b5f2ef163ba1fe7a3d496ebe7aa691b9e8ccc0009da154c0e9,2024-03-21T02:52:40.373000
CVE-2024-2641,0,0,f0564c17f72fe0389b5a4a0ad2383b43964c9e94cd832dbe5a5b092dd0b3e0d4,2024-03-21T02:52:40.450000
@ -243606,7 +243606,7 @@ CVE-2024-28213,0,0,090aa70f4759221eeb170ac061c15ca31a585444d2e87d3363c44ed2fcccc
CVE-2024-28214,0,0,1704cd87ae391533dc81cb622240473051339c712493c3e6ead802f63dccb239,2024-03-07T13:52:27.110000
CVE-2024-28215,0,0,3c9fd1adfdd2b7f063ffbf1a9fc9f520d65955380ea257f42f44086732bef016,2024-03-07T13:52:27.110000
CVE-2024-28216,0,0,81cb418e285cc210ffc29a8a25f8e508c54e8fe29c1cf038a851918d914b9b1e,2024-03-07T13:52:27.110000
CVE-2024-28219,0,0,dab1bc76d4dd1af61b2ba887cb87738dccae692dcedd66dd3387ec79710c0330,2024-04-10T05:15:48.810000
CVE-2024-28219,0,1,eda37ea75b94b99dc06763135a1bebed717144ccd3b72bb74b162bc69b3a8690,2024-04-10T22:15:07.193000
CVE-2024-2822,0,0,6ab09d9d7524c6d95c8d1ae5b3671b49edc27757385c7737f509e182267f103a,2024-03-22T19:02:10.300000
CVE-2024-28222,0,0,d419d3ada13caae27e6dde281d73cbc44d2f509d635642c67ccba01f063babd6,2024-03-07T13:52:27.110000
CVE-2024-28224,0,0,3152cc64dff1bcf9fde70fb8b36c735f55a1cb82cfb6f7caa3c629344bcaff59,2024-04-09T12:48:04.090000
@ -244053,7 +244053,7 @@ CVE-2024-29241,0,0,0d22a80c0de17d3b18b0f9136bc6951a88a9b84e77f5185bb4dfc57412ae7
CVE-2024-29243,0,0,862def336b16032c1130c00f979aa4f537404b17294c1ae567f40eb15801f627,2024-03-21T15:24:35.093000
CVE-2024-29244,0,0,f38f58b77ca3d656d49038b33ac381f2ddffb3511144fd7b7141fdc358ac519c,2024-03-21T15:24:35.093000
CVE-2024-2925,0,0,7e1bff7e262b77495d2e25a300630629f063c78f4962ee86607d3baa34c6e9cb,2024-04-02T12:50:42.233000
CVE-2024-29269,1,1,ad7729230bf69a7e0a7cadebe307ecc7578dda38d8655a375eb1129da284af5e,2024-04-10T20:15:07.440000
CVE-2024-29269,0,0,ad7729230bf69a7e0a7cadebe307ecc7578dda38d8655a375eb1129da284af5e,2024-04-10T20:15:07.440000
CVE-2024-2927,0,0,870c2fd2083a457bf8424548a11bf469c31670915b4b854d8d74bdf756bd3242,2024-03-27T12:29:30.307000
CVE-2024-29271,0,0,86d82853285296d2653b2954b1f865b89755729787a00c9a08bf8b4da2a10347,2024-03-22T12:45:36.130000
CVE-2024-29272,0,0,bb3421cdf283ecf2f8722dd79d31aa3f3d26bad518191ad6f8ea2a70c28d47bf,2024-03-22T12:45:36.130000
@ -244093,12 +244093,15 @@ CVE-2024-29432,0,0,935ce59b23319f15478ff1d005b1786853efcea9f20ed5b78b83dcf1879a3
CVE-2024-29433,0,0,b10a666a979afbf6ffc25b1ef458e1d0fb9c766493f3b32e8a3cbc2c3e4a9e2b,2024-04-02T12:50:42.233000
CVE-2024-29434,0,0,e2dd739e4fe1b524f01d6355aa24f60868a619e4b33fdd429c31c5ef2f0acc1e,2024-04-03T12:38:04.840000
CVE-2024-29435,0,0,4d03d83d8cb615246ed4e783c1ea07f9aee9ed7e6aa6133cefbb15bfb0a5c168,2024-04-02T12:50:42.233000
CVE-2024-29439,1,1,1d69df312d39ff606afcc228505a3de56229b4c462672c963ba3cffa502b3e5d,2024-04-10T23:15:06.753000
CVE-2024-2944,0,0,edbe06654b669678b299b573aae74f1e6525956b78541d7e0f3aff7e4dd8cf16,2024-03-27T12:29:30.307000
CVE-2024-29440,0,0,b41dbba691936eb263a6e48ee2f4c3b0c65bf928cbb922caedd1e0f5f03baacf,2024-03-26T12:55:05.010000
CVE-2024-29442,0,0,7905121fe561461f75c739d09685b7ffc46a6e6f08464603a503f7d567bf4eab,2024-03-26T12:55:05.010000
CVE-2024-29443,1,1,1bc9ffda251ef99e368f68a14e5a690c42b0f16382b7e7c81c9aa6a95f66c213,2024-04-10T23:15:06.810000
CVE-2024-29445,1,1,6455b8fc0fc660a0a93f47d1c88010878e6e7a3a9d67a016856e4f554a80e1be,2024-04-10T23:15:06.857000
CVE-2024-2945,0,0,309a513aec715a57b9d74929d2379e417477e6045825bb68d9c761cada7aab5c,2024-03-27T12:29:30.307000
CVE-2024-2946,0,0,8a22c9853e8b531bbd8a8e90a11cfdbe9528f15dbd8531539c68a8acd7935dc8,2024-04-10T13:23:38.787000
CVE-2024-29460,1,1,317a4f50f0ffd064a420b5baaaddb1a19ecc45eaf513e4dd83a36a6cb36ef4e4,2024-04-10T21:15:06.583000
CVE-2024-29460,0,0,317a4f50f0ffd064a420b5baaaddb1a19ecc45eaf513e4dd83a36a6cb36ef4e4,2024-04-10T21:15:06.583000
CVE-2024-29469,0,0,fcd29429266b7a87e58735d5b1a87e454245abd68c4217f0834c945fcf2dbdeb,2024-03-21T12:58:51.093000
CVE-2024-2947,0,0,1f5db3dcaa8eaba268358fabd07cd32a790eaac8bc91ef0018408fc63d80627e,2024-03-31T02:15:09.150000
CVE-2024-29470,0,0,47e23a8af4be8b838695296b19cd4bea426144fbae12eb976431244ea0a84b06,2024-03-21T12:58:51.093000
@ -244112,8 +244115,9 @@ CVE-2024-29489,0,0,281c97da696e2014734e05639dd64d47354e5c2b4bcf9f1b7827a4a4899ee
CVE-2024-2949,0,0,fe05e354f0ebdb867f0f2833560dc840c15ef92daf8a56e7a3e31b95f453d065,2024-04-08T18:48:40.217000
CVE-2024-29499,0,0,6d5bcd6ddf0ffffbb229032818f99219d3a96f2f060fbc36a33564f3ae345d5e,2024-03-22T19:02:10.300000
CVE-2024-2950,0,0,e07028f6204e1653615da40fab9edc1b22f1b4a28f65125bfe5341d4aac985fa,2024-04-08T18:49:25.863000
CVE-2024-29500,1,1,1a3796c93fd977880b2e3f6a4cd449efb28cd1e6c930031b6f04cd70a164fb96,2024-04-10T20:15:07.510000
CVE-2024-29502,1,1,83c51beb31398b16e738b71df94823c943f102b6a43cefa73fb403ae46123c92,2024-04-10T20:15:07.567000
CVE-2024-29500,0,0,1a3796c93fd977880b2e3f6a4cd449efb28cd1e6c930031b6f04cd70a164fb96,2024-04-10T20:15:07.510000
CVE-2024-29502,0,0,83c51beb31398b16e738b71df94823c943f102b6a43cefa73fb403ae46123c92,2024-04-10T20:15:07.567000
CVE-2024-29504,1,1,b8293d9f170f6d84c833f829ce8ea6210ec4ee95b384f58aa344ba945af5e201,2024-04-10T22:15:07.287000
CVE-2024-2951,0,0,7025f71f619ebfb5f00b29e3d72fe62bb5f0ea0dbfe92a58b33e63352aa0779c,2024-03-27T12:29:41.530000
CVE-2024-29514,0,0,2d6d3d0a4ae4b5ae40dadfbf4537d707f35bed7e85002b6d4e3d8180d6408f0b,2024-04-02T18:12:16.283000
CVE-2024-29515,0,0,79c9f65757e49bdb19c4dcff88d6ba2d524b1951e790ac90d5ffb4f302abcf45,2024-03-26T12:55:05.010000
@ -244267,6 +244271,8 @@ CVE-2024-29898,0,0,a2f935bfbb33add93aff8d32c09dc9f7952be5c0243aad5cba34861657283
CVE-2024-2990,0,0,482f4612170da1e0b0598818577827b0753e61cf3a51eabc7ad5396b674dba51,2024-03-28T02:01:13.303000
CVE-2024-29900,0,0,b99cd571d8d699adcff1d9a0f6085772745471b84efa1b60422f06d61cde9485,2024-04-01T01:12:59.077000
CVE-2024-29901,0,0,b07651b5e3683d58062a2619f65cd6b587a09c22191d8a54182f7055ad9642db,2024-04-01T01:12:59.077000
CVE-2024-29902,1,1,74d510bae7e52dcfb693caa83fc6056a89f5c9774565283c7495690e3bd96059,2024-04-10T23:15:06.920000
CVE-2024-29903,1,1,8f1077224a906fb1bd4ee1e5bd6784bc6127d53cc34f41ad8602c1fa589ac993,2024-04-10T23:15:07.130000
CVE-2024-29904,0,0,922d3ca540b7a7a38e394677ef40fbe71374cf5fd3f36e5754c424444d9736e1,2024-04-01T01:12:59.077000
CVE-2024-29905,0,0,3a300037a30bf563b822204e8e235e379178549d87f6d48f161231fe894a3135,2024-04-10T13:24:00.070000
CVE-2024-29906,0,0,5e6afa8dbe77b2ceaee29629c66d8bdf273caddf4f38f955d682aeefe9beab4c,2024-03-27T12:29:30.307000
@ -244691,6 +244697,7 @@ CVE-2024-30723,0,0,dc330635bd2c0f023fa185f0fdee50819537ec1cb3e04c9b923279375b9e4
CVE-2024-30724,0,0,c5bc1d62745db5722694ff82efab2f050e090e2cdc10d3b46cd1ca9a686ec9d6,2024-04-10T13:23:38.787000
CVE-2024-30726,0,0,3d4fe5e2b1ab21972d6cf937194590c4e66b9e113c35d539a0da2d600d1f2acc,2024-04-10T13:23:38.787000
CVE-2024-30727,0,0,0d4038bb750868d5905673e402c30dc4315a2d8a9c9f26326b27ae647049f1e0,2024-04-10T13:23:38.787000
CVE-2024-30728,1,1,2794f029da79b2bc9c60b7ad583ff105d73050acce1e67ce6834c0754eded9ae,2024-04-10T23:15:07.317000
CVE-2024-30729,0,0,2dc1920138a02b98187be4280645fa3245cc8bcb6e49f3a9af11f72c0a8c1673,2024-04-10T13:23:38.787000
CVE-2024-30730,0,0,55714fc9d38b1912a54f0372ab1aa07c606dae0d74e47062a6cd1a41e2c6378e,2024-04-10T13:23:38.787000
CVE-2024-30733,0,0,a9382491192019dac57569c44518f9ec249641fcfad37be5bc7ffe4231d9be0e,2024-04-10T13:23:38.787000
@ -244896,7 +244903,7 @@ CVE-2024-31419,0,0,36c8a60658bbd6b33e2cacab3bae7069924fea2c95b1bfd68ef2a5a438c0a
CVE-2024-3142,0,0,9dd81c211bf76d67e1c43a667eb2bd313a4a58232363655578ff94c12b7d19a5,2024-04-04T13:15:44.937000
CVE-2024-31420,0,0,5d7e593d118cd1f41577542846ec46b792c74358a1c27af2e9295870ce46a7f7,2024-04-03T17:24:18.150000
CVE-2024-3143,0,0,adef6ddf8aed4b85f5b9ec5c41837e0ea05c8056f77fa6600789550fcc865a57,2024-04-02T12:50:42.233000
CVE-2024-31430,1,1,bbb77e152f331e83b1c68e6924ec3fc502573653809464066d1a1ac2ed1c0e1b,2024-04-10T20:15:07.620000
CVE-2024-31430,0,0,bbb77e152f331e83b1c68e6924ec3fc502573653809464066d1a1ac2ed1c0e1b,2024-04-10T20:15:07.620000
CVE-2024-3144,0,0,0d76c2330ba298defd0f1b4b8583f5577295a22c7482e9267c8cbbe09aa0eb3a,2024-04-02T12:50:42.233000
CVE-2024-31442,0,0,bd0c0777ffd79341352bfaf4bac13513052ca764dc9351410c56fde55ac0fa91,2024-04-08T18:48:40.217000
CVE-2024-31447,0,0,1686ea065902cff688a9e0e72258f816c60304799af9644c7db6f9ae37572786,2024-04-08T18:48:40.217000
@ -244908,7 +244915,7 @@ CVE-2024-31457,0,0,2a3df56afd0a6a9934427214a76e8de40165fd02e6f2532ac344e6e6c96b3
CVE-2024-3146,0,0,c53d63ca526f35fd2250cfdb239f061e8b52186457f5fd4f6bc18a291d69a364,2024-04-02T12:50:42.233000
CVE-2024-31461,0,0,78d12ab3381b5c3fda69b1f5421edfe2ff30f397a9794d52b313ced0ec0ec1d3,2024-04-10T19:49:51.183000
CVE-2024-31464,0,0,0e334e051a2f53edc57cbce800fcc17540fa9d746f3833bb6b1e894dc6dae023,2024-04-10T19:49:51.183000
CVE-2024-31465,1,1,09972dd369e6d00ab757e161e12581c05fa6b6e384bbce760d0168d56b304400,2024-04-10T20:15:07.833000
CVE-2024-31465,0,0,09972dd369e6d00ab757e161e12581c05fa6b6e384bbce760d0168d56b304400,2024-04-10T20:15:07.833000
CVE-2024-3147,0,0,02625b405a9656dc1928c253c58a24946e5b9cb50ef47acb30b3a3a470e8efd5,2024-04-02T12:50:42.233000
CVE-2024-3148,0,0,da83dea91bd5fed523ca15df13db4100d62650319dcc492fed6d52171a819a8a,2024-04-02T12:50:42.233000
CVE-2024-31487,0,0,4f24e6db0f56a97932d1fcb48db397a06c0f937b932a453b76d90975be251d2c,2024-04-10T13:24:22.187000
@ -244943,7 +244950,7 @@ CVE-2024-31814,0,0,e3ca4010fb6a58f61e69bd6376064660d2fdaf6bb387d308db35cab7cd7c1
CVE-2024-31815,0,0,30302ad414ab45baa3ec4e6cb3fe786fcebb8651723a135b55d05ee22523845e,2024-04-08T18:48:40.217000
CVE-2024-31816,0,0,8b0edd8a38c33b33b513f099b5e67906c887d32cd0308b5fdfadcac29bc21611,2024-04-08T18:48:40.217000
CVE-2024-31817,0,0,440a95dbf8589f9a9953a43f37d15f507abb02f786409b55238dedab4fef773a,2024-04-08T18:48:40.217000
CVE-2024-31819,1,1,2a3b89d939962fa7b4d302db84d776372b0ec20a0b5a80da0c929edbc2e74167,2024-04-10T20:15:08.027000
CVE-2024-31819,0,0,2a3b89d939962fa7b4d302db84d776372b0ec20a0b5a80da0c929edbc2e74167,2024-04-10T20:15:08.027000
CVE-2024-31848,0,0,2da60f6a287cac48661bc0aa0bb0ac92caa20fc3ae4255bef230dfecf644c92e,2024-04-08T18:49:25.863000
CVE-2024-31849,0,0,f45798bfe1f17890c1c9f615c3d632efe82fbe29dd84fe4753d6d6beae3b4f6a,2024-04-08T18:49:25.863000
CVE-2024-31850,0,0,4dfa9605a049a09744618be099ad889f274ff40fc42a18e168685588a6a44b6d,2024-04-08T18:49:25.863000
@ -244962,7 +244969,7 @@ CVE-2024-31872,0,0,7d09da772d85c1598253bebf81c543077ef995af0f84d1cf088132605a240
CVE-2024-31873,0,0,30397559953deb34a9ae192149473632dc6b2334245e920787a4c5e14fc76375,2024-04-10T19:49:51.183000
CVE-2024-31874,0,0,1770e58d0ae5591eb931a8cdfdb054fb4d854f81849d14af250c71db6caf553c,2024-04-10T19:49:51.183000
CVE-2024-31924,0,0,f6b9db9f53cdffb6f393ef618d7b0bada6f867ced301e91b9a83cccba162e103,2024-04-10T19:49:51.183000
CVE-2024-31939,1,1,1dd1845a3abbc7a2c9bab39b6b25c3966258c3e92d4b72d4feca81b5b57bb65b,2024-04-10T20:15:08.083000
CVE-2024-31939,0,0,1dd1845a3abbc7a2c9bab39b6b25c3966258c3e92d4b72d4feca81b5b57bb65b,2024-04-10T20:15:08.083000
CVE-2024-31943,0,0,d050ed16bd2fd56e0b74cc5712c1eb7ef94538d6cfa9c00022a6cfa048bd2dcc,2024-04-10T19:49:51.183000
CVE-2024-31944,0,0,d1cf01bee95ac2d1b4f198f30f665ce7f3dae041b6378dd5d37f86b95341e18f,2024-04-10T19:49:51.183000
CVE-2024-31948,0,0,b8fd3eda997fc89b9e55a498d2068e6465c743165b4060fd79003e8bed0e6076,2024-04-08T18:48:40.217000
@ -244970,15 +244977,19 @@ CVE-2024-31949,0,0,e7ba39ada062d71e6dcc57a3b21fdc31258fde0372c873d76cfd22b57d87a
CVE-2024-31950,0,0,6cefb0ca8246a802eee33ecaeabf30a3794c53c92173f69e19945e3bf38104d7,2024-04-08T18:48:40.217000
CVE-2024-31951,0,0,a02cb6e83819b8aefe87f14fcbaf10a3986c9b6174676e08f67eb54fe256f190,2024-04-08T18:48:40.217000
CVE-2024-31978,0,0,905fe24a9cf546b211ed3cfae7258dc772856eb0550beb1f55c95bc3799601d2,2024-04-09T12:48:04.090000
CVE-2024-31981,1,1,41ed28ce6bba23b85449be82f11fff9b7cf78c541c7a9b52c36a8133a4d7e339,2024-04-10T20:15:08.280000
CVE-2024-31982,1,1,11e46b46340c61f03840a7ce00d1d951c5614258b1b16fe8c8055060204d36ad,2024-04-10T20:15:08.463000
CVE-2024-31983,1,1,74f8b65fb73ac5166030eaca2fb6bcbb3eaeea646572692ba025d68a44d23657,2024-04-10T20:15:08.650000
CVE-2024-31984,1,1,3dd967b6d867d35a2c47c2387078e637e793f4dd993188fda54bcb553ac6a80b,2024-04-10T21:15:06.637000
CVE-2024-31985,1,1,276c22cdfab88ce17976e1fb31121d1912584557af449dc431fd410c22061e99,2024-04-10T21:15:06.723000
CVE-2024-31986,1,1,43669e074c85477994fcd4cf3c2c0c0f46b7f690fe7395ed093bf6da81a7c2ed,2024-04-10T21:15:06.917000
CVE-2024-31987,1,1,eaf04e5e8adb7495522ece035bec1afa6fa22951b4cdb91bb3bde2024b9f74c0,2024-04-10T21:15:07.110000
CVE-2024-31988,1,1,5da0fc4a1538121c707391b7b21e94efdcfa92fbaa21aa92953be0e501557b00,2024-04-10T21:15:07.297000
CVE-2024-31996,1,1,1735e73cb95bb856b03a29dc9274bca12643ea7963276488bac15e1aeea916a8,2024-04-10T21:15:07.510000
CVE-2024-31981,0,0,41ed28ce6bba23b85449be82f11fff9b7cf78c541c7a9b52c36a8133a4d7e339,2024-04-10T20:15:08.280000
CVE-2024-31982,0,0,11e46b46340c61f03840a7ce00d1d951c5614258b1b16fe8c8055060204d36ad,2024-04-10T20:15:08.463000
CVE-2024-31983,0,0,74f8b65fb73ac5166030eaca2fb6bcbb3eaeea646572692ba025d68a44d23657,2024-04-10T20:15:08.650000
CVE-2024-31984,0,0,3dd967b6d867d35a2c47c2387078e637e793f4dd993188fda54bcb553ac6a80b,2024-04-10T21:15:06.637000
CVE-2024-31985,0,0,276c22cdfab88ce17976e1fb31121d1912584557af449dc431fd410c22061e99,2024-04-10T21:15:06.723000
CVE-2024-31986,0,0,43669e074c85477994fcd4cf3c2c0c0f46b7f690fe7395ed093bf6da81a7c2ed,2024-04-10T21:15:06.917000
CVE-2024-31987,0,0,eaf04e5e8adb7495522ece035bec1afa6fa22951b4cdb91bb3bde2024b9f74c0,2024-04-10T21:15:07.110000
CVE-2024-31988,0,0,5da0fc4a1538121c707391b7b21e94efdcfa92fbaa21aa92953be0e501557b00,2024-04-10T21:15:07.297000
CVE-2024-31995,1,1,9eb94cdaf5afaba2fbdff98ac2f35a24992c9534ea3eecdf8ad26f5366819717,2024-04-10T22:15:07.340000
CVE-2024-31996,0,0,1735e73cb95bb856b03a29dc9274bca12643ea7963276488bac15e1aeea916a8,2024-04-10T21:15:07.510000
CVE-2024-31997,1,1,c7ea8c4fd6950595c321adc6b23cbabb7d0eb9826ffba95dd878e3333e4b4022,2024-04-10T22:15:07.527000
CVE-2024-31999,1,1,1a2be178d542add2c25b65bd95b65507dd0c56f0e74624fb1f4fb118afe77597,2024-04-10T22:15:07.710000
CVE-2024-32001,1,1,f09b35b6b84716fea2178dcb53bcec08140cf7614e1ec079378bf4663c7cad6e,2024-04-10T23:15:07.363000
CVE-2024-3202,0,0,c740eb561a7c1440cb5a8dd5eb2f94f0cce226529c05056c2f841e5a9fe9ca73,2024-04-03T12:38:04.840000
CVE-2024-3203,0,0,50d63f401f7659abc3d4fe6662d0f1a519a0e385e123db03b5f1830a5a75ec57,2024-04-06T16:15:08.350000
CVE-2024-3204,0,0,f0ecaa4cd894fa75e44a48d7dd9614c107f33ee3ea503e315d2394814a086ab4,2024-04-06T16:15:08.530000

Can't render this file because it is too large.