Auto-Update: 2024-04-08T18:00:38.444374+00:00

This commit is contained in:
cad-safe-bot 2024-04-08 18:03:30 +00:00
parent b27fa6bd93
commit c16f7f88fa
9 changed files with 513 additions and 25 deletions

View File

@ -0,0 +1,67 @@
{
"id": "CVE-2024-31224",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-04-08T16:15:07.790",
"lastModified": "2024-04-08T16:15:07.790",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "GPT Academic provides interactive interfaces for large language models. A vulnerability was found in gpt_academic versions 3.64 through 3.73. The server deserializes untrustworthy data from the client, which may risk remote code execution. Any device that exposes the GPT Academic service to the Internet is vulnerable. Version 3.74 contains a patch for the issue. There are no known workarounds aside from upgrading to a patched version."
},
{
"lang": "es",
"value": "GPT Academic proporciona interfaces interactivas para modelos de lenguaje grandes. Se encontr\u00f3 una vulnerabilidad en las versiones 3.64 a 3.73 de gpt_academic. El servidor deserializa datos no confiables del cliente, lo que puede poner en riesgo la ejecuci\u00f3n remota de c\u00f3digo. Cualquier dispositivo que exponga el servicio GPT Academic a Internet es vulnerable. La versi\u00f3n 3.74 contiene un parche para el problema. No se conocen workarounds aparte de actualizar a una versi\u00f3n parcheada."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-502"
}
]
}
],
"references": [
{
"url": "https://github.com/binary-husky/gpt_academic/commit/8af6c0cab6d96f5c4520bec85b24802e6e823f35",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/binary-husky/gpt_academic/pull/1648",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/binary-husky/gpt_academic/security/advisories/GHSA-jcjc-89wr-vv7g",
"source": "security-advisories@github.com"
}
]
}

View File

@ -0,0 +1,63 @@
{
"id": "CVE-2024-31442",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-04-08T16:15:07.990",
"lastModified": "2024-04-08T16:15:07.990",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Redon Hub is a Roblox Product Delivery Bot, also known as a Hub. In all hubs before version 1.0.2, all commands are capable of being ran by all users, including admin commands. This allows users to receive products for free and delete/create/update products/tags/etc. The only non-affected command is `/products admin clear` as this was already programmed for bot owners only. All users should upgrade to version 1.0.2 to receive a patch."
},
{
"lang": "es",
"value": "Redon Hub es un robot de entrega de productos de Roblox, tambi\u00e9n conocido como Hub. En todos los centros anteriores a la versi\u00f3n 1.0.2, todos los usuarios pueden ejecutar todos los comandos, incluidos los comandos de administrador. Esto permite a los usuarios recibir productos de forma gratuita y eliminar/crear/actualizar productos/etiquetas/etc. El \u00fanico comando no afectado es `/products admin clear`, ya que ya estaba programado solo para propietarios de bots. Todos los usuarios deben actualizar a la versi\u00f3n 1.0.2 para recibir un parche."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-276"
}
]
}
],
"references": [
{
"url": "https://github.com/Redon-Tech/Redon-Hub/commit/38cb7c08d4d890e8a1badadbd46f459f06e3cdcd",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/Redon-Tech/Redon-Hub/security/advisories/GHSA-3rx8-6453-7q26",
"source": "security-advisories@github.com"
}
]
}

View File

@ -0,0 +1,67 @@
{
"id": "CVE-2024-31447",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-04-08T16:15:08.190",
"lastModified": "2024-04-08T16:15:08.190",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Shopware 6 is an open commerce platform based on Symfony Framework and Vue. Starting in version 6.3.5.0 and prior to versions 6.6.1.0 and 6.5.8.8, when a authenticated request is made to `POST /store-api/account/logout`, the cart will be cleared, but the User won't be logged out. This affects only the direct store-api usage, as the PHP Storefront listens additionally on `CustomerLogoutEvent` and invalidates the session additionally. The problem has been fixed in Shopware 6.6.1.0 and 6.5.8.8. Those who are unable to update can install the latest version of the Shopware Security Plugin as a workaround.\n"
},
{
"lang": "es",
"value": "Shopware 6 es una plataforma de comercio abierta basada en Symfony Framework y Vue. A partir de la versi\u00f3n 6.3.5.0 y anteriores a las versiones 6.6.1.0 y 6.5.8.8, cuando se realiza una solicitud autenticada a `POST /store-api/account/logout`, el carrito se borrar\u00e1, pero el Usuario no se va a desconectar. Esto afecta solo al uso directo de la API de la tienda, ya que PHP Storefront escucha adicionalmente en `CustomerLogoutEvent` e invalida la sesi\u00f3n adicionalmente. El problema se solucion\u00f3 en Shopware 6.6.1.0 y 6.5.8.8. Aquellos que no puedan actualizar pueden instalar la \u00faltima versi\u00f3n del complemento de seguridad de Shopware como workaround."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"availabilityImpact": "NONE",
"baseScore": 5.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.6,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-613"
}
]
}
],
"references": [
{
"url": "https://github.com/shopware/shopware/commit/5cc84ddd817ad0c1d07f9b3c79ab346d50514a77",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/shopware/shopware/commit/d29775aa758f70d08e0c5999795c7c26d230e7d3",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/shopware/shopware/security/advisories/GHSA-5297-wrrp-rcj7",
"source": "security-advisories@github.com"
}
]
}

View File

@ -8,6 +8,10 @@
{
"lang": "en",
"value": "A vulnerability was found in Wangshen SecGate 3600 up to 20240408. It has been classified as critical. This affects an unknown part of the file /?g=net_pro_keyword_import_save. The manipulation of the argument reqfile leads to unrestricted upload. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-259701 was assigned to this vulnerability."
},
{
"lang": "es",
"value": "Una vulnerabilidad fue encontrada en Wangshen SecGate 3600 hasta 20240408 y clasificada como cr\u00edtica. Esto afecta a una parte desconocida del archivo /?g=net_pro_keyword_import_save. La manipulaci\u00f3n del argumento reqfile conduce a una carga sin restricciones. Es posible iniciar el ataque de forma remota. El exploit ha sido divulgado al p\u00fablico y puede utilizarse. A esta vulnerabilidad se le asign\u00f3 el identificador VDB-259701."
}
],
"metrics": {

View File

@ -0,0 +1,96 @@
{
"id": "CVE-2024-3445",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-04-08T16:15:08.410",
"lastModified": "2024-04-08T16:15:08.410",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was found in SourceCodester Laundry Management System 1.0. It has been declared as critical. This vulnerability affects unknown code of the file /karyawan/laporan_filter. The manipulation of the argument data_karyawan leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. VDB-259702 is the identifier assigned to this vulnerability."
},
{
"lang": "es",
"value": "Se encontr\u00f3 una vulnerabilidad en SourceCodester Laundry Management System 1.0. Ha sido declarada cr\u00edtica. Esta vulnerabilidad afecta a un c\u00f3digo desconocido del archivo /karyawan/laporan_filter. La manipulaci\u00f3n del argumento data_karyawan conduce a la inyecci\u00f3n de SQL. El ataque se puede iniciar de forma remota. El exploit ha sido divulgado al p\u00fablico y puede utilizarse. VDB-259702 es el identificador asignado a esta vulnerabilidad."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW",
"baseScore": 6.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 3.4
}
],
"cvssMetricV2": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "SINGLE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL",
"baseScore": 6.5
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 8.0,
"impactScore": 6.4,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"references": [
{
"url": "https://github.com/fubxx/CVE/blob/main/LaundryManagementSystemSQL.md",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?ctiid.259702",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?id.259702",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?submit.312296",
"source": "cna@vuldb.com"
}
]
}

View File

@ -0,0 +1,96 @@
{
"id": "CVE-2024-3455",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-04-08T16:15:08.643",
"lastModified": "2024-04-08T16:15:08.643",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was found in Netentsec NS-ASG Application Security Gateway 6.3. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file /admin/add_postlogin.php. The manipulation of the argument SingleLoginId leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-259711."
},
{
"lang": "es",
"value": "Se encontr\u00f3 una vulnerabilidad en Netentsec NS-ASG Application Security Gateway 6.3. Ha sido declarada cr\u00edtica. Una funci\u00f3n desconocida del archivo /admin/add_postlogin.php es afectada por esta vulnerabilidad. La manipulaci\u00f3n del argumento SingleLoginId conduce a la inyecci\u00f3n de SQL. El ataque se puede lanzar de forma remota. El exploit ha sido divulgado al p\u00fablico y puede utilizarse. El identificador asociado de esta vulnerabilidad es VDB-259711."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW",
"baseScore": 6.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 3.4
}
],
"cvssMetricV2": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "SINGLE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL",
"baseScore": 6.5
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 8.0,
"impactScore": 6.4,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"references": [
{
"url": "https://github.com/flyyue2001/cve/blob/main/NS-ASG-sql-add_postlogin.md",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?ctiid.259711",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?id.259711",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?submit.312182",
"source": "cna@vuldb.com"
}
]
}

View File

@ -0,0 +1,92 @@
{
"id": "CVE-2024-3456",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-04-08T17:15:07.353",
"lastModified": "2024-04-08T17:15:07.353",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was found in Netentsec NS-ASG Application Security Gateway 6.3. It has been rated as critical. Affected by this issue is some unknown functionality of the file /admin/config_Anticrack.php. The manipulation of the argument GroupId leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-259712."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW",
"baseScore": 6.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 3.4
}
],
"cvssMetricV2": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "SINGLE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL",
"baseScore": 6.5
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 8.0,
"impactScore": 6.4,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"references": [
{
"url": "https://github.com/flyyue2001/cve/blob/main/NS-ASG-sql-config_Anticrack.md",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?ctiid.259712",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?id.259712",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?submit.312183",
"source": "cna@vuldb.com"
}
]
}

View File

@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update
```plain
2024-04-08T16:00:37.564234+00:00
2024-04-08T18:00:38.444374+00:00
```
### Most recent CVE Modification Timestamp synchronized with NVD
```plain
2024-04-08T15:15:08.833000+00:00
2024-04-08T17:15:07.353000+00:00
```
### Last Data Feed Release
@ -33,29 +33,26 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
### Total Number of included CVEs
```plain
244459
244465
```
### CVEs added in the last Commit
Recently added CVEs: `10`
Recently added CVEs: `6`
- [CVE-2024-2511](CVE-2024/CVE-2024-25xx/CVE-2024-2511.json) (`2024-04-08T14:15:07.660`)
- [CVE-2024-28732](CVE-2024/CVE-2024-287xx/CVE-2024-28732.json) (`2024-04-08T14:15:07.600`)
- [CVE-2024-30269](CVE-2024/CVE-2024-302xx/CVE-2024-30269.json) (`2024-04-08T15:15:07.820`)
- [CVE-2024-31205](CVE-2024/CVE-2024-312xx/CVE-2024-31205.json) (`2024-04-08T15:15:08.023`)
- [CVE-2024-31221](CVE-2024/CVE-2024-312xx/CVE-2024-31221.json) (`2024-04-08T15:15:08.207`)
- [CVE-2024-3440](CVE-2024/CVE-2024-34xx/CVE-2024-3440.json) (`2024-04-08T14:15:07.737`)
- [CVE-2024-3441](CVE-2024/CVE-2024-34xx/CVE-2024-3441.json) (`2024-04-08T14:15:07.953`)
- [CVE-2024-3442](CVE-2024/CVE-2024-34xx/CVE-2024-3442.json) (`2024-04-08T15:15:08.407`)
- [CVE-2024-3443](CVE-2024/CVE-2024-34xx/CVE-2024-3443.json) (`2024-04-08T15:15:08.623`)
- [CVE-2024-3444](CVE-2024/CVE-2024-34xx/CVE-2024-3444.json) (`2024-04-08T15:15:08.833`)
- [CVE-2024-31224](CVE-2024/CVE-2024-312xx/CVE-2024-31224.json) (`2024-04-08T16:15:07.790`)
- [CVE-2024-31442](CVE-2024/CVE-2024-314xx/CVE-2024-31442.json) (`2024-04-08T16:15:07.990`)
- [CVE-2024-31447](CVE-2024/CVE-2024-314xx/CVE-2024-31447.json) (`2024-04-08T16:15:08.190`)
- [CVE-2024-3445](CVE-2024/CVE-2024-34xx/CVE-2024-3445.json) (`2024-04-08T16:15:08.410`)
- [CVE-2024-3455](CVE-2024/CVE-2024-34xx/CVE-2024-3455.json) (`2024-04-08T16:15:08.643`)
- [CVE-2024-3456](CVE-2024/CVE-2024-34xx/CVE-2024-3456.json) (`2024-04-08T17:15:07.353`)
### CVEs modified in the last Commit
Recently modified CVEs: `0`
Recently modified CVEs: `1`
- [CVE-2024-3444](CVE-2024/CVE-2024-34xx/CVE-2024-3444.json) (`2024-04-08T15:15:08.833`)
## Download and Usage

View File

@ -241774,7 +241774,7 @@ CVE-2024-25106,0,0,8dd509f504f26480381227e2c04ae3a9349d520b35ffd468656ee448e39af
CVE-2024-25107,0,0,992c3cc86b9f4e37cd07cf04dd6b07a615d04dcf9532b8285a434870940db3c5,2024-02-15T18:52:25.613000
CVE-2024-25108,0,0,2f3b0912c45a14bc4609391cde835a7bde0bd98f58e5cc253a1a3a5d46e14714,2024-02-12T20:39:09.773000
CVE-2024-25109,0,0,66bef0024d89c0196f311e07e8ca5885fe47e2eb23f582eff05d8874e7ab5e40,2024-02-11T22:29:15.837000
CVE-2024-2511,1,1,7ac7d160101e52de6ef2d1b1fa4b88240b9ae386337efbf8e31231af77b9bffe,2024-04-08T14:15:07.660000
CVE-2024-2511,0,0,7ac7d160101e52de6ef2d1b1fa4b88240b9ae386337efbf8e31231af77b9bffe,2024-04-08T14:15:07.660000
CVE-2024-25110,0,0,1882d1c872d6fb46fba6f5e40e671a2fda6881ec6c33fd95f706ae7cf820760c,2024-02-12T20:39:09.773000
CVE-2024-25111,0,0,f72e8e44455321d1ed6e80f096ea71e33de3e8d0ccd8f6d4c6adc0c0a3546f5f,2024-03-06T21:42:48.053000
CVE-2024-25112,0,0,9f92b56982d5d0e159eb7030e033a87c46cac6fe6908722221c7e2c374361051,2024-02-13T14:01:40.577000
@ -243393,7 +243393,7 @@ CVE-2024-28713,0,0,beab16cae2dae6cd08028a095390b29624a6437ed474d84784c32091c71ec
CVE-2024-28714,0,0,05d12d8ac80645ded00d1ead25c51baa98cf4af4d5a078fc724fffec6f7925ec,2024-03-29T12:45:02.937000
CVE-2024-28715,0,0,054dc6dc725c244acb835446cab8d82270f7d8ffd8311eb9aca1ba238d62a38d,2024-03-20T13:00:16.367000
CVE-2024-2873,0,0,38b44d61d3230fcaba1c551f8073fe8dda4eadd0cd50d8705b668e3c4529f628,2024-03-26T12:55:05.010000
CVE-2024-28732,1,1,2a8a82892f5ff982d8c39eab88daf82e9eaf93a7fe90e90d01072dc1a7f77cc6,2024-04-08T14:15:07.600000
CVE-2024-28732,0,0,2a8a82892f5ff982d8c39eab88daf82e9eaf93a7fe90e90d01072dc1a7f77cc6,2024-04-08T14:15:07.600000
CVE-2024-28734,0,0,f4687488b267ac163f3e0d4b9d3eb38f6f5a041c19b985a560624c627a7f4e16,2024-04-01T21:15:33.200000
CVE-2024-28735,0,0,27a3fb731c930af76bd97477e46fd57873e1d90373135fa3e190a08c95c9db47,2024-04-01T21:15:37.360000
CVE-2024-28741,0,0,1678ed4de6f62b62747c7cf1ef99a3f3ff7e7dec4db75414c76ffae859a52b6b,2024-04-06T19:15:07.247000
@ -243936,7 +243936,7 @@ CVE-2024-30263,0,0,865e3a568432a1e114cdb349ba49e79d9bbc223ad67092921d5af173a6615
CVE-2024-30264,0,0,a36afcbf82744a440a1fca3c8df613ac17f10025eaa77ba35cbe326ee3634d26,2024-04-05T12:40:52.763000
CVE-2024-30265,0,0,8b7bd77316a7922f3fb99eedf42325c9dfd214ba3a070dae26dd8c71a6913b9c,2024-04-04T12:48:41.700000
CVE-2024-30266,0,0,e3c467c9914201aad848d0a5b4b17739ce57c9b602514a7cf905d903659d55fa,2024-04-04T16:33:06.610000
CVE-2024-30269,1,1,055916305bd660d9b64d72a16185c4d580145377dd39425d064d3053e2a64f84,2024-04-08T15:15:07.820000
CVE-2024-30269,0,0,055916305bd660d9b64d72a16185c4d580145377dd39425d064d3053e2a64f84,2024-04-08T15:15:07.820000
CVE-2024-30270,0,0,1d63c3afc5f402042a52c95204320e8698a660fcf024b4b1cd2dbe82419521bf,2024-04-05T12:40:52.763000
CVE-2024-3030,0,0,88c29228ef56d61e184f00d5d8d99ea5dd9800435eeb42a07f389309c9f00688,2024-04-04T12:48:41.700000
CVE-2024-30322,0,0,82127178dd2c4390457a625b1b802dc21960ed844c23f33ac3f61e8d8c162a4f,2024-04-03T17:24:18.150000
@ -244264,7 +244264,7 @@ CVE-2024-3116,0,0,442c5653c6cfe9feb902808d7a86b402a42b6c98e54ac39c11d1d128b28eb1
CVE-2024-3117,0,0,136fb5551ef6dfa1bf4e08424db43ed91a6bb8dd83f3d6ce39a5378e07bb201b,2024-04-01T01:12:59.077000
CVE-2024-3118,0,0,f6c34b2c6946d5fdb10aa55aa3b524d7a78d6b6fed9a90242c451ed5ef8e29f1,2024-04-01T01:12:59.077000
CVE-2024-31204,0,0,d77d8a78ba72f2a1144250dcbd3aeb2b57d00c9418a1c9337730d8bd71684606,2024-04-05T12:40:52.763000
CVE-2024-31205,1,1,a6d36033e64309ba1256ccf74dd3497e30901befe8a78ff0f29c1f7440c2ef65,2024-04-08T15:15:08.023000
CVE-2024-31205,0,0,a6d36033e64309ba1256ccf74dd3497e30901befe8a78ff0f29c1f7440c2ef65,2024-04-08T15:15:08.023000
CVE-2024-31206,0,0,bd1cbc8a5901cc2b410cb59c86ef8c814546918b6efc52403de5ae308d36d9dc,2024-04-05T12:40:52.763000
CVE-2024-31207,0,0,af1a3137415a749d0a1549c9f6fa25303b24e194f3861bc2095545bb707985a2,2024-04-04T16:33:06.610000
CVE-2024-31209,0,0,dc7f150a1f8931f337c3d30121f71937562fb9b370a799204e5d75b796fcdc02,2024-04-04T16:33:06.610000
@ -244275,7 +244275,8 @@ CVE-2024-31213,0,0,19a0c401ca67e66e86518628c3bc67a57443f6d2510fb0e2e0eb2b07016e3
CVE-2024-31215,0,0,34a0a231f3970708fb3e5686678c657f48cd1675d27ab51eed18f5cf652dec67,2024-04-04T16:33:06.610000
CVE-2024-31218,0,0,2cc0c7155891260a2e304c7f7c9b9f864ea2df678ab0837aa91ce6bd7b753c89,2024-04-05T15:15:07.863000
CVE-2024-31220,0,0,8d197f4e82630274399fe6c2cf5db685f8a9989529d5618ae3648323da3da3fe,2024-04-05T15:15:08.060000
CVE-2024-31221,1,1,db08706f0e4cf0a4b15a3fb27b6262d35e75ecb4a425ad19e41547e21bfb7e0c,2024-04-08T15:15:08.207000
CVE-2024-31221,0,0,db08706f0e4cf0a4b15a3fb27b6262d35e75ecb4a425ad19e41547e21bfb7e0c,2024-04-08T15:15:08.207000
CVE-2024-31224,1,1,b5e4b5815319f91e39519a7cdce1e86e9ce8fe6bd0520d3bded1f60770db3e3c,2024-04-08T16:15:07.790000
CVE-2024-31233,0,0,01776c48338e2c3eab6d14190a3411779ae36b37bbb141038e67728efaf69c9a,2024-04-07T18:15:08.797000
CVE-2024-31234,0,0,1fa31637e187c994b5d6f8d31633b9c52245dc14b1ef75120de91cf881de99c2,2024-04-07T18:15:09
CVE-2024-31236,0,0,e30316997648dd95fa701bb0da95fa4c9d6a2e26dca12b212bba28299a961fd8,2024-04-07T18:15:09.197000
@ -244322,6 +244323,8 @@ CVE-2024-3142,0,0,9dd81c211bf76d67e1c43a667eb2bd313a4a58232363655578ff94c12b7d19
CVE-2024-31420,0,0,5d7e593d118cd1f41577542846ec46b792c74358a1c27af2e9295870ce46a7f7,2024-04-03T17:24:18.150000
CVE-2024-3143,0,0,adef6ddf8aed4b85f5b9ec5c41837e0ea05c8056f77fa6600789550fcc865a57,2024-04-02T12:50:42.233000
CVE-2024-3144,0,0,0d76c2330ba298defd0f1b4b8583f5577295a22c7482e9267c8cbbe09aa0eb3a,2024-04-02T12:50:42.233000
CVE-2024-31442,1,1,b91c90a075abc76a93af271c4434191798238bef9ea147b43528d0574f7e08df,2024-04-08T16:15:07.990000
CVE-2024-31447,1,1,8b927d8aa5d31620cf786cfcbe8dae4a5fb7caac862f340ae8c32bc64907e9c6,2024-04-08T16:15:08.190000
CVE-2024-3145,0,0,910eeb7fc8d864d7945418c0e4535b894388c19da07aa9b0f359cad540d76837,2024-04-02T12:50:42.233000
CVE-2024-3146,0,0,c53d63ca526f35fd2250cfdb239f061e8b52186457f5fd4f6bc18a291d69a364,2024-04-02T12:50:42.233000
CVE-2024-3147,0,0,02625b405a9656dc1928c253c58a24946e5b9cb50ef47acb30b3a3a470e8efd5,2024-04-02T12:50:42.233000
@ -244453,8 +244456,11 @@ CVE-2024-3436,0,0,e0e5ca3dd8c714d9a5e39a78035c324e727b4b3c8f911bb9e4a1189c878cbe
CVE-2024-3437,0,0,123eb2c99d4357ae11fb4721846c8d14f1c5c5df0aa6b588d74123cc924c8ceb,2024-04-08T00:15:08.537000
CVE-2024-3438,0,0,6aa2babb713a9ff09398356e50b2cda9faed0e388dee6285a645928c2aca71c0,2024-04-08T11:15:50.310000
CVE-2024-3439,0,0,69cc741ea655c4a2d89b68a8daf53cfa66f6de13bb1c1dcde6c854895f506c54,2024-04-08T12:15:08.220000
CVE-2024-3440,1,1,effe0961510bad7e8c4ff018cfa0edf1ee22b6e3dca0f11cd720843b6e621572,2024-04-08T14:15:07.737000
CVE-2024-3441,1,1,8d5bbefefea6812fc49088025995bef976f75da71f1ba2c98279a63d9f20e4b8,2024-04-08T14:15:07.953000
CVE-2024-3442,1,1,9cc36f8f361a3d8960eaa6fc08e1e4540639d14611f1e55df640efc83188f693,2024-04-08T15:15:08.407000
CVE-2024-3443,1,1,c84c0ff8127a2896cfdad8c89089c5330f71dbb74239c5797b2db62ead1d2484,2024-04-08T15:15:08.623000
CVE-2024-3444,1,1,f3f0a7a83b7dee21ee32f2a842641df915e1807265b186dc1fd440ed4bdc6a3f,2024-04-08T15:15:08.833000
CVE-2024-3440,0,0,effe0961510bad7e8c4ff018cfa0edf1ee22b6e3dca0f11cd720843b6e621572,2024-04-08T14:15:07.737000
CVE-2024-3441,0,0,8d5bbefefea6812fc49088025995bef976f75da71f1ba2c98279a63d9f20e4b8,2024-04-08T14:15:07.953000
CVE-2024-3442,0,0,9cc36f8f361a3d8960eaa6fc08e1e4540639d14611f1e55df640efc83188f693,2024-04-08T15:15:08.407000
CVE-2024-3443,0,0,c84c0ff8127a2896cfdad8c89089c5330f71dbb74239c5797b2db62ead1d2484,2024-04-08T15:15:08.623000
CVE-2024-3444,0,1,160aca2cc592f86b74a7d95a50d597033576af3698e2347dda87ec25ee428f38,2024-04-08T15:15:08.833000
CVE-2024-3445,1,1,c778acc217fb1bac78e8dc9898ab1a3277210bb6e620cc1e8d1f7526fe8d689d,2024-04-08T16:15:08.410000
CVE-2024-3455,1,1,672ae8f43fbcd9ac5d1da24f41144970e000618918624502ed555524df19f3f4,2024-04-08T16:15:08.643000
CVE-2024-3456,1,1,84ad473eb57e846f426db7e785d769ca5fb08dd378161424360ae4e0b59e0289,2024-04-08T17:15:07.353000

Can't render this file because it is too large.