Auto-Update: 2024-04-30T10:00:40.209077+00:00

This commit is contained in:
cad-safe-bot 2024-04-30 10:03:32 +00:00
parent 4614057735
commit cc0ac1a5a5
8 changed files with 227 additions and 211 deletions

View File

@ -2,43 +2,14 @@
"id": "CVE-2023-52630", "id": "CVE-2023-52630",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-04-02T07:15:40.667", "published": "2024-04-02T07:15:40.667",
"lastModified": "2024-04-02T12:50:42.233", "lastModified": "2024-04-30T09:15:06.730",
"vulnStatus": "Awaiting Analysis", "vulnStatus": "Rejected",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nblk-iocost: Fix an UBSAN shift-out-of-bounds warning\n\nWhen iocg_kick_delay() is called from a CPU different than the one which set\nthe delay, @now may be in the past of @iocg->delay_at leading to the\nfollowing warning:\n\n UBSAN: shift-out-of-bounds in block/blk-iocost.c:1359:23\n shift exponent 18446744073709 is too large for 64-bit type 'u64' (aka 'unsigned long long')\n ...\n Call Trace:\n <TASK>\n dump_stack_lvl+0x79/0xc0\n __ubsan_handle_shift_out_of_bounds+0x2ab/0x300\n iocg_kick_delay+0x222/0x230\n ioc_rqos_merge+0x1d7/0x2c0\n __rq_qos_merge+0x2c/0x80\n bio_attempt_back_merge+0x83/0x190\n blk_attempt_plug_merge+0x101/0x150\n blk_mq_submit_bio+0x2b1/0x720\n submit_bio_noacct_nocheck+0x320/0x3e0\n __swap_writepage+0x2ab/0x9d0\n\nThe underflow itself doesn't really affect the behavior in any meaningful\nway; however, the past timestamp may exaggerate the delay amount calculated\nlater in the code, which shouldn't be a material problem given the nature of\nthe delay mechanism.\n\nIf @now is in the past, this CPU is racing another CPU which recently set up\nthe delay and there's nothing this CPU can contribute w.r.t. the delay.\nLet's bail early from iocg_kick_delay() in such cases." "value": "Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority."
},
{
"lang": "es",
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: blk-iocost: corrige una advertencia de desplazamiento fuera de los l\u00edmites de UBSAN Cuando se llama a iocg_kick_delay() desde una CPU diferente a la que estableci\u00f3 el retraso, @now puede estar en el pasado de @iocg-&gt;delay_at genera la siguiente advertencia: UBSAN: shift-out-of-bounds in block/blk-iocost.c:1359:23 el exponente de desplazamiento 18446744073709 es demasiado grande para el tipo 'u64' de 64 bits ( tambi\u00e9n conocido como 'unsigned long long') ... Seguimiento de llamadas: dump_stack_lvl+0x79/0xc0 __ubsan_handle_shift_out_of_bounds+0x2ab/0x300 iocg_kick_delay+0x222/0x230 ioc_rqos_merge+0x1d7/0x2c0 __rq_qos_merge+0x2c/0x80 bio _intento_back_merge+0x83/0x190 blk_attempt_plug_merge+0x101/ 0x150 blk_mq_submit_bio+0x2b1/0x720 submit_bio_noacct_nocheck+0x320/0x3e0 __swap_writepage+0x2ab/0x9d0 El subdesbordamiento en s\u00ed no afecta realmente el comportamiento de ninguna manera significativa; sin embargo, la marca de tiempo anterior puede exagerar la cantidad de retraso calculada m\u00e1s adelante en el c\u00f3digo, lo que no deber\u00eda ser un problema material dada la naturaleza del mecanismo de retraso. Si @now est\u00e1 en el pasado, esta CPU est\u00e1 compitiendo con otra CPU que recientemente configur\u00f3 el retraso y no hay nada que esta CPU pueda contribuir con el retraso. Salgamos temprano de iocg_kick_delay() en tales casos."
} }
], ],
"metrics": {}, "metrics": {},
"references": [ "references": []
{
"url": "https://git.kernel.org/stable/c/1e4d3f8bd880e02932a9ea179f90bfa74fd2e899",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/27b216130e64651e76ed583742a1b4e4d08a67c3",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/2a427b49d02995ea4a6ff93a1432c40fa4d36821",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/9f56f38331171c9a19754004f0664686d67ee48d",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/cd33b330cb21675189e747953845f5c3689e4912",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/e5dc63f01e027721c29f82069f7e97e2149fa131",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
}
]
} }

View File

@ -0,0 +1,47 @@
{
"id": "CVE-2024-1895",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-04-30T09:15:06.813",
"lastModified": "2024-04-30T09:15:06.813",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "The Event Monster \u2013 Event Management, Tickets Booking, Upcoming Event plugin for WordPress is vulnerable to PHP Object Injection in all versions up to, and including, 1.3.4 via deserialization via shortcode of untrusted input from a custom meta value. This makes it possible for authenticated attackers, with contributor access and above, to inject a PHP Object. No POP chain is present in the vulnerable plugin. If a POP chain is present via an additional plugin or theme installed on the target system, it could allow the attacker to delete arbitrary files, retrieve sensitive data, or execute code."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security@wordfence.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.6,
"impactScore": 5.9
}
]
},
"references": [
{
"url": "https://plugins.trac.wordpress.org/browser/event-monster/tags/1.3.3/shortcode.php",
"source": "security@wordfence.com"
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/41d7b3f1-a133-4678-b2d9-3f9951cbc005?source=cve",
"source": "security@wordfence.com"
}
]
}

View File

@ -2,170 +2,14 @@
"id": "CVE-2024-26908", "id": "CVE-2024-26908",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-04-17T11:15:11.310", "published": "2024-04-17T11:15:11.310",
"lastModified": "2024-04-29T19:44:48.577", "lastModified": "2024-04-30T08:15:17.140",
"vulnStatus": "Analyzed", "vulnStatus": "Rejected",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nx86/xen: Add some null pointer checking to smp.c\n\nkasprintf() returns a pointer to dynamically allocated memory\nwhich can be NULL upon failure. Ensure the allocation was successful\nby checking the pointer validity." "value": "Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority."
},
{
"lang": "es",
"value": "En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: x86/xen: agregue alguna verificaci\u00f3n de puntero nulo a smp.c kasprintf() devuelve un puntero a la memoria asignada din\u00e1micamente que puede ser NULL en caso de falla. Aseg\u00farese de que la asignaci\u00f3n se haya realizado correctamente comprobando la validez del puntero."
} }
], ],
"metrics": { "metrics": {},
"cvssMetricV31": [ "references": []
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-476"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionEndExcluding": "4.19.311",
"matchCriteriaId": "A6E19FC1-2A3F-4FF8-805C-2864C71553EC"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "4.20",
"versionEndExcluding": "5.4.273",
"matchCriteriaId": "620FD8B7-BF03-43E0-951A-0A58461D4C55"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.5",
"versionEndExcluding": "5.10.214",
"matchCriteriaId": "65987874-467B-4D3B-91D6-68A129B34FB8"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.11",
"versionEndExcluding": "5.15.153",
"matchCriteriaId": "ACB69438-845D-4E3C-B114-3140611F9C0B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.16",
"versionEndExcluding": "6.1.83",
"matchCriteriaId": "121A07F6-F505-4C47-86BF-9BB6CC7B6C19"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.2",
"versionEndExcluding": "6.6.23",
"matchCriteriaId": "E00814DC-0BA7-431A-9926-80FEB4A96C68"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.7",
"versionEndExcluding": "6.7.11",
"matchCriteriaId": "9B95D3A6-E162-47D5-ABFC-F3FA74FA7CFD"
}
]
}
]
}
],
"references": [
{
"url": "https://git.kernel.org/stable/c/025a8a96c7ef3ff24a9b4753a7e851ba16f11bfc",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/3693bb4465e6e32a204a5b86d3ec7e6b9f7e67c2",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/70a33a629090130d731fc1e1ad498bb672eea165",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/8082bccb7ac480ceab89b09c53d20c78ae54f9fa",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/a9bbb05c0c04b49a1f7f05fd03826321dca2b8d4",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/d211e8128c0e2122512fa5e859316540349b54af",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/eb279074badac0bbe28749906562d648ca4bc750",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/f49c513f46dc19bf01ffad2aaaf234d7f37f6799",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
}
]
} }

View File

@ -0,0 +1,47 @@
{
"id": "CVE-2024-2663",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-04-30T09:15:07.050",
"lastModified": "2024-04-30T09:15:07.050",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "The ZD YouTube FLV Player plugin for WordPress is vulnerable to Server-Side Request Forgery in all versions up to, and including, 1.2.6 via the $_GET['image'] parameter. This makes it possible for unauthenticated attackers to make web requests to arbitrary locations originating from the web application and can be used to query and modify information from internal services."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security@wordfence.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW",
"baseScore": 8.3,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.7
}
]
},
"references": [
{
"url": "https://wordpress.org/plugins/zd-youtube-flv-player/",
"source": "security@wordfence.com"
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/f6f26854-7e25-4e64-9f03-916ece6fde03?source=cve",
"source": "security@wordfence.com"
}
]
}

View File

@ -0,0 +1,47 @@
{
"id": "CVE-2024-3072",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-04-30T09:15:07.250",
"lastModified": "2024-04-30T09:15:07.250",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "The ACF Front End Editor plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the update_texts() function in all versions up to, and including, 2.0.2. This makes it possible for authenticated attackers, with subscriber-level access and above, to update arbitrary post title, content, and ACF data."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security@wordfence.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 1.4
}
]
},
"references": [
{
"url": "https://plugins.trac.wordpress.org/browser/acf-front-end-editor/trunk/public/class-acf-front-end-editor-public.php#L225",
"source": "security@wordfence.com"
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/8e7cbe45-5dd5-4b8f-8504-a52358156838?source=cve",
"source": "security@wordfence.com"
}
]
}

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2024-4185",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-04-30T09:15:07.463",
"lastModified": "2024-04-30T09:15:07.463",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "The Customer Email Verification for WooCommerce plugin for WordPress is vulnerable to Email Verification and Authentication Bypass in all versions up to, and including, 2.7.4 via the use of insufficiently random activation code. This makes it possible for unauthenticated attackers to bypass the email verification, and if both the \"Login the user automatically after the account is verified\" and \"Verify account for current users\" options are checked, then it potentially makes it possible for attackers to bypass authentication for other users."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security@wordfence.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.1,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.2,
"impactScore": 5.9
}
]
},
"references": [
{
"url": "https://plugins.trac.wordpress.org/browser/emails-verification-for-woocommerce/tags/2.7.4/includes/alg-wc-ev-functions.php#L299",
"source": "security@wordfence.com"
},
{
"url": "https://plugins.trac.wordpress.org/browser/emails-verification-for-woocommerce/tags/2.7.4/includes/class-alg-wc-ev-core.php#L731",
"source": "security@wordfence.com"
},
{
"url": "https://plugins.trac.wordpress.org/changeset/3078804/emails-verification-for-woocommerce#file2",
"source": "security@wordfence.com"
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/ebae4b18-5b5f-45c3-86e2-02eefd7abdb7?source=cve",
"source": "security@wordfence.com"
}
]
}

View File

@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update ### Last Repository Update
```plain ```plain
2024-04-30T08:00:37.769445+00:00 2024-04-30T10:00:40.209077+00:00
``` ```
### Most recent CVE Modification Timestamp synchronized with NVD ### Most recent CVE Modification Timestamp synchronized with NVD
```plain ```plain
2024-04-30T07:15:49.107000+00:00 2024-04-30T09:15:07.463000+00:00
``` ```
### Last Data Feed Release ### Last Data Feed Release
@ -33,24 +33,25 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
### Total Number of included CVEs ### Total Number of included CVEs
```plain ```plain
247173 247177
``` ```
### CVEs added in the last Commit ### CVEs added in the last Commit
Recently added CVEs: `2` Recently added CVEs: `4`
- [CVE-2024-31837](CVE-2024/CVE-2024-318xx/CVE-2024-31837.json) (`2024-04-30T07:15:48.993`) - [CVE-2024-1895](CVE-2024/CVE-2024-18xx/CVE-2024-1895.json) (`2024-04-30T09:15:06.813`)
- [CVE-2024-4225](CVE-2024/CVE-2024-42xx/CVE-2024-4225.json) (`2024-04-30T07:15:49.107`) - [CVE-2024-2663](CVE-2024/CVE-2024-26xx/CVE-2024-2663.json) (`2024-04-30T09:15:07.050`)
- [CVE-2024-3072](CVE-2024/CVE-2024-30xx/CVE-2024-3072.json) (`2024-04-30T09:15:07.250`)
- [CVE-2024-4185](CVE-2024/CVE-2024-41xx/CVE-2024-4185.json) (`2024-04-30T09:15:07.463`)
### CVEs modified in the last Commit ### CVEs modified in the last Commit
Recently modified CVEs: `3` Recently modified CVEs: `2`
- [CVE-2017-7938](CVE-2017/CVE-2017-79xx/CVE-2017-7938.json) (`2024-04-30T07:15:48.343`) - [CVE-2023-52630](CVE-2023/CVE-2023-526xx/CVE-2023-52630.json) (`2024-04-30T09:15:06.730`)
- [CVE-2022-25517](CVE-2022/CVE-2022-255xx/CVE-2022-25517.json) (`2024-04-30T07:15:48.720`) - [CVE-2024-26908](CVE-2024/CVE-2024-269xx/CVE-2024-26908.json) (`2024-04-30T08:15:17.140`)
- [CVE-2024-28815](CVE-2024/CVE-2024-288xx/CVE-2024-28815.json) (`2024-04-30T07:15:48.897`)
## Download and Usage ## Download and Usage

View File

@ -107877,7 +107877,7 @@ CVE-2017-7934,0,0,6509ad1210147a2f37f99de18e77bec245bc09c56f84bb9b94b5fbcaa5a1c2
CVE-2017-7935,0,0,c5b12e45bd362aa8b8c96239cac3088010c77b7957ce01a05282debacb0084a6,2019-10-09T23:30:01.030000 CVE-2017-7935,0,0,c5b12e45bd362aa8b8c96239cac3088010c77b7957ce01a05282debacb0084a6,2019-10-09T23:30:01.030000
CVE-2017-7936,0,0,ee771e0b581393ddde2c1929f0985e971498f5b2e1fb63d557fd8cf900b8544c,2019-10-09T23:30:01.157000 CVE-2017-7936,0,0,ee771e0b581393ddde2c1929f0985e971498f5b2e1fb63d557fd8cf900b8544c,2019-10-09T23:30:01.157000
CVE-2017-7937,0,0,22c3662b5698f152a3ca69e20a068cacf1bc487977b467bca5a0881756320ef8,2019-10-09T23:30:01.593000 CVE-2017-7937,0,0,22c3662b5698f152a3ca69e20a068cacf1bc487977b467bca5a0881756320ef8,2019-10-09T23:30:01.593000
CVE-2017-7938,0,1,4ffebf7db337676f4207e98e9d663eae30c19fdd4c100bb4112e52d4b5697bf2,2024-04-30T07:15:48.343000 CVE-2017-7938,0,0,4ffebf7db337676f4207e98e9d663eae30c19fdd4c100bb4112e52d4b5697bf2,2024-04-30T07:15:48.343000
CVE-2017-7939,0,0,cc88ad4617c70e129da4ca01930c326cd1795f28efd38af7e0b79c0cb9c73bb6,2019-10-03T00:03:26.223000 CVE-2017-7939,0,0,cc88ad4617c70e129da4ca01930c326cd1795f28efd38af7e0b79c0cb9c73bb6,2019-10-03T00:03:26.223000
CVE-2017-7940,0,0,e6315dda7bb4159979b6f2383fb2002b6137e1a073f8f8a41fedc549a7f15f90,2019-09-16T14:33:28.640000 CVE-2017-7940,0,0,e6315dda7bb4159979b6f2383fb2002b6137e1a073f8f8a41fedc549a7f15f90,2019-09-16T14:33:28.640000
CVE-2017-7941,0,0,046b4e9e2f5936b9dee3468621e77878134ca79650e8b0d28f3d271668fd2ebb,2019-10-03T00:03:26.223000 CVE-2017-7941,0,0,046b4e9e2f5936b9dee3468621e77878134ca79650e8b0d28f3d271668fd2ebb,2019-10-03T00:03:26.223000
@ -193888,7 +193888,7 @@ CVE-2022-25512,0,0,b1c52ac21af7250e857ad7d3985d7bc7f57879f1a24979d1fb5e09eddb0eb
CVE-2022-25514,0,0,f1c59f22d2e4b565c8a11c7a6bfeec9d476bf98622771797a7f4a62a438a26f7,2024-04-11T01:14:51.077000 CVE-2022-25514,0,0,f1c59f22d2e4b565c8a11c7a6bfeec9d476bf98622771797a7f4a62a438a26f7,2024-04-11T01:14:51.077000
CVE-2022-25515,0,0,172f8e1e5d01426a23d61bd25b6ebc6f4d75111de98d4a5d3e8cc93d80a1deae,2024-04-11T01:14:51.140000 CVE-2022-25515,0,0,172f8e1e5d01426a23d61bd25b6ebc6f4d75111de98d4a5d3e8cc93d80a1deae,2024-04-11T01:14:51.140000
CVE-2022-25516,0,0,465345018be8e617c1a005efa2d9875ffde962bc2da0eb32f30ac004005a22a4,2024-04-11T01:14:51.197000 CVE-2022-25516,0,0,465345018be8e617c1a005efa2d9875ffde962bc2da0eb32f30ac004005a22a4,2024-04-11T01:14:51.197000
CVE-2022-25517,0,1,ee1f736415d1d6f570e99015d022356ab2037b736141809a5b1c7311ffd48f3d,2024-04-30T07:15:48.720000 CVE-2022-25517,0,0,ee1f736415d1d6f570e99015d022356ab2037b736141809a5b1c7311ffd48f3d,2024-04-30T07:15:48.720000
CVE-2022-25518,0,0,d1a9366eab4bd91c59f6bf12692e59eb1c69dbadcaea3ad3132182cbffcfd280,2022-03-28T20:08:30.037000 CVE-2022-25518,0,0,d1a9366eab4bd91c59f6bf12692e59eb1c69dbadcaea3ad3132182cbffcfd280,2022-03-28T20:08:30.037000
CVE-2022-2552,0,0,125fa71079048e18e7435d117a5f8b319e30f8387bf3eb810bcd3b5b3c73dabb,2023-11-07T03:46:39.677000 CVE-2022-2552,0,0,125fa71079048e18e7435d117a5f8b319e30f8387bf3eb810bcd3b5b3c73dabb,2023-11-07T03:46:39.677000
CVE-2022-25521,0,0,369c8b3e5327b316aa0ef07431129995f3d0b64c4960eae6c42480cc301fc961,2023-11-07T03:44:47.390000 CVE-2022-25521,0,0,369c8b3e5327b316aa0ef07431129995f3d0b64c4960eae6c42480cc301fc961,2023-11-07T03:44:47.390000
@ -236698,7 +236698,7 @@ CVE-2023-52627,0,0,1177d7f8df5893e173c3f648ff1e434a565a16e241c97d7f1223e59bb1fbb
CVE-2023-52628,0,0,5d56cd3e0ebeee06c144138f502e99f62319bea7ac4a22de713221e49e0dd152,2024-03-28T12:42:56.150000 CVE-2023-52628,0,0,5d56cd3e0ebeee06c144138f502e99f62319bea7ac4a22de713221e49e0dd152,2024-03-28T12:42:56.150000
CVE-2023-52629,0,0,c2b47813411406ce2764ee3e378a85b7d3bc040a958f3c0591cdbe8559412c56,2024-03-29T12:45:02.937000 CVE-2023-52629,0,0,c2b47813411406ce2764ee3e378a85b7d3bc040a958f3c0591cdbe8559412c56,2024-03-29T12:45:02.937000
CVE-2023-5263,0,0,1a62de6a1e2d5e20741edbc70ba2e5dca5145afffdb56e487960615e8d66bf2f,2024-04-11T01:22:55.880000 CVE-2023-5263,0,0,1a62de6a1e2d5e20741edbc70ba2e5dca5145afffdb56e487960615e8d66bf2f,2024-04-11T01:22:55.880000
CVE-2023-52630,0,0,56ab31fba94da0d495dd07ae060142b969256ac7461b7a92185ee963aa478ac5,2024-04-02T12:50:42.233000 CVE-2023-52630,0,1,5775dd46232bc5a0625a4a9f601f3671c4246a60e28369ff24e80a7e2f52040e,2024-04-30T09:15:06.730000
CVE-2023-52631,0,0,596a4323ed2359dd3a2e5d91cfcc42d2c956554c70ddee535d41eb3f1d0437fd,2024-04-02T12:50:42.233000 CVE-2023-52631,0,0,596a4323ed2359dd3a2e5d91cfcc42d2c956554c70ddee535d41eb3f1d0437fd,2024-04-02T12:50:42.233000
CVE-2023-52632,0,0,f06761547a39a3c580e029a0147bebbeb75867e5a9ff152361372090752fcf4d,2024-04-02T12:50:42.233000 CVE-2023-52632,0,0,f06761547a39a3c580e029a0147bebbeb75867e5a9ff152361372090752fcf4d,2024-04-02T12:50:42.233000
CVE-2023-52633,0,0,994dc33effe20bcda42b3f8baa7344472ba337f1b03cc5040c676373fa32e8f3,2024-04-02T12:50:42.233000 CVE-2023-52633,0,0,994dc33effe20bcda42b3f8baa7344472ba337f1b03cc5040c676373fa32e8f3,2024-04-02T12:50:42.233000
@ -239954,6 +239954,7 @@ CVE-2024-1890,0,0,d821e28303657343be278f464dff038e934f4ce7013e324636dd2062e1ff0b
CVE-2024-1892,0,0,496f86c779f360256e1e190fecff75b396ebefe831fecdca264ec166e984ab7e,2024-04-16T12:15:10.050000 CVE-2024-1892,0,0,496f86c779f360256e1e190fecff75b396ebefe831fecdca264ec166e984ab7e,2024-04-16T12:15:10.050000
CVE-2024-1893,0,0,678e936c89e4c4b6fa8874f1c864b24cc93a2715a395ba59ed61dfe9d57d4f11,2024-04-10T13:23:38.787000 CVE-2024-1893,0,0,678e936c89e4c4b6fa8874f1c864b24cc93a2715a395ba59ed61dfe9d57d4f11,2024-04-10T13:23:38.787000
CVE-2024-1894,0,0,9ac2447d78b1be48d8de07fcf9beac6b1c3a9f0af4ea5741b3b2d6e9b7f97eab,2024-03-13T18:15:58.530000 CVE-2024-1894,0,0,9ac2447d78b1be48d8de07fcf9beac6b1c3a9f0af4ea5741b3b2d6e9b7f97eab,2024-03-13T18:15:58.530000
CVE-2024-1895,1,1,19b3d614a6bd2f3198217637f9bc7ee6cc30a77d90b9eb9e355789c278b05778,2024-04-30T09:15:06.813000
CVE-2024-1898,0,0,cd46da23aa9e689b946891d810a24293bd08f970fb7bfbbf6f19e3a7303f1ecd,2024-03-06T15:18:08.093000 CVE-2024-1898,0,0,cd46da23aa9e689b946891d810a24293bd08f970fb7bfbbf6f19e3a7303f1ecd,2024-03-06T15:18:08.093000
CVE-2024-1899,0,0,0cc7828b184cee934c2917326a122f6c3f70483a306517df38cc4ef91b9244cb,2024-02-26T22:10:40.463000 CVE-2024-1899,0,0,0cc7828b184cee934c2917326a122f6c3f70483a306517df38cc4ef91b9244cb,2024-02-26T22:10:40.463000
CVE-2024-1900,0,0,df3a7e0d7f662e0642af797e67801f5b993e667e914107fd3f604cd2322f2a71,2024-03-06T15:18:08.093000 CVE-2024-1900,0,0,df3a7e0d7f662e0642af797e67801f5b993e667e914107fd3f604cd2322f2a71,2024-03-06T15:18:08.093000
@ -243523,6 +243524,7 @@ CVE-2024-26626,0,0,144b70a967c255a0ac33e20cfa403c3f12d2b0b80c4b891f29c37c572ce37
CVE-2024-26627,0,0,9c09d4f73dbc04e8bf693f2b91f36043cf32b88ec1b0ffef850696b2f5157e34,2024-03-06T15:18:08.093000 CVE-2024-26627,0,0,9c09d4f73dbc04e8bf693f2b91f36043cf32b88ec1b0ffef850696b2f5157e34,2024-03-06T15:18:08.093000
CVE-2024-26628,0,0,c81fd3a5ad105931eb915543b147e48cdc3d2e1a2a90d930b948d12a8b8ed86c,2024-03-20T17:15:07.367000 CVE-2024-26628,0,0,c81fd3a5ad105931eb915543b147e48cdc3d2e1a2a90d930b948d12a8b8ed86c,2024-03-20T17:15:07.367000
CVE-2024-26629,0,0,c935b22ca2f2b7fc187b254875a352a6a70600efa1223e320aa3066e22cdd304,2024-04-10T15:16:04.297000 CVE-2024-26629,0,0,c935b22ca2f2b7fc187b254875a352a6a70600efa1223e320aa3066e22cdd304,2024-04-10T15:16:04.297000
CVE-2024-2663,1,1,14dc2d8ffef9bba3e06b3a396c83843cccf4678d6526c0082ac982a24e8737b2,2024-04-30T09:15:07.050000
CVE-2024-26630,0,0,5c24e6549a4bf437d13995c2ff418c1a6446686ddbb1e2b096648761881da114,2024-03-13T18:15:58.530000 CVE-2024-26630,0,0,5c24e6549a4bf437d13995c2ff418c1a6446686ddbb1e2b096648761881da114,2024-03-13T18:15:58.530000
CVE-2024-26631,0,0,222d3f04973ef7b8bd710a7add62de2fd6653eb660b6c5918d7c02d522dbc80b,2024-03-18T12:38:25.490000 CVE-2024-26631,0,0,222d3f04973ef7b8bd710a7add62de2fd6653eb660b6c5918d7c02d522dbc80b,2024-03-18T12:38:25.490000
CVE-2024-26632,0,0,8b51b67583fc3a4cc3512b8291c6146d1acb8da0ef47e543de910809f49bab97,2024-03-18T12:38:25.490000 CVE-2024-26632,0,0,8b51b67583fc3a4cc3512b8291c6146d1acb8da0ef47e543de910809f49bab97,2024-03-18T12:38:25.490000
@ -243827,7 +243829,7 @@ CVE-2024-26904,0,0,b15bec250224e48b922f5edb75915d33fc9d65baf24cf748a4caf3c847264
CVE-2024-26905,0,0,b2eb4233229c7ebf6d1f823188c91f6d5ec6f202c5b26a0cfddc918598c98c54,2024-04-17T12:48:07.510000 CVE-2024-26905,0,0,b2eb4233229c7ebf6d1f823188c91f6d5ec6f202c5b26a0cfddc918598c98c54,2024-04-17T12:48:07.510000
CVE-2024-26906,0,0,ab0559b52d04a535dceb9e9c10280e22d32dc74dd6f462f3401a818acc49de6b,2024-04-17T12:48:07.510000 CVE-2024-26906,0,0,ab0559b52d04a535dceb9e9c10280e22d32dc74dd6f462f3401a818acc49de6b,2024-04-17T12:48:07.510000
CVE-2024-26907,0,0,2f67b26b0d30d6258d15eaffbdba785264c13510ac97fa56a9a1d2c082244bfa,2024-04-29T19:44:18.727000 CVE-2024-26907,0,0,2f67b26b0d30d6258d15eaffbdba785264c13510ac97fa56a9a1d2c082244bfa,2024-04-29T19:44:18.727000
CVE-2024-26908,0,0,1e18d9b69a796c3e7892dcb353124f9ba334a73a17bef59174ba029d780d21ae,2024-04-29T19:44:48.577000 CVE-2024-26908,0,1,cc506bb33339692d77ff509743c6d61742e5ec03ec87d0c908cd1194ca34c117,2024-04-30T08:15:17.140000
CVE-2024-26909,0,0,5464bad426f9a347bf5b7c14958cdcbc62204295a40d8afbbb4e3cbb5befd2ed,2024-04-29T19:45:21.680000 CVE-2024-26909,0,0,5464bad426f9a347bf5b7c14958cdcbc62204295a40d8afbbb4e3cbb5befd2ed,2024-04-29T19:45:21.680000
CVE-2024-26910,0,0,48f8f3796f4f128f5eb639d107da50d334d370e630908ad97b6801bd2e7b8d28,2024-04-29T19:14:32.273000 CVE-2024-26910,0,0,48f8f3796f4f128f5eb639d107da50d334d370e630908ad97b6801bd2e7b8d28,2024-04-29T19:14:32.273000
CVE-2024-26911,0,0,8d846935fb779f6db6689d65fb02ba1050fa8170a7d139801044f762aace6d45,2024-04-29T19:17:11.627000 CVE-2024-26911,0,0,8d846935fb779f6db6689d65fb02ba1050fa8170a7d139801044f762aace6d45,2024-04-29T19:17:11.627000
@ -244636,7 +244638,7 @@ CVE-2024-28782,0,0,2c346a16649d57b4cd6688055d888a86d12f94177200ab9afb6a4e0c69d4e
CVE-2024-28784,0,0,c979b0334a0081e1847a4bc955e67dbbc0397aed136c4d3aa1b489c4f3f267b2,2024-03-27T15:49:51.300000 CVE-2024-28784,0,0,c979b0334a0081e1847a4bc955e67dbbc0397aed136c4d3aa1b489c4f3f267b2,2024-03-27T15:49:51.300000
CVE-2024-28787,0,0,466884053e2fb97771b0b18e87658d91d7f6894823937327962bdc9b1ecfdc33,2024-04-04T19:24:50.670000 CVE-2024-28787,0,0,466884053e2fb97771b0b18e87658d91d7f6894823937327962bdc9b1ecfdc33,2024-04-04T19:24:50.670000
CVE-2024-2879,0,0,b3cb63a21efa9503ae3e8fbd2c3fbecce8466a6f50871d6397f8e38479a77e62,2024-04-08T22:49:41.533000 CVE-2024-2879,0,0,b3cb63a21efa9503ae3e8fbd2c3fbecce8466a6f50871d6397f8e38479a77e62,2024-04-08T22:49:41.533000
CVE-2024-28815,0,1,e7bdcd0ac6977f9c059dbb312ad54d9a388fdc8f6a137aa4ed5f32fc20fa20fd,2024-04-30T07:15:48.897000 CVE-2024-28815,0,0,e7bdcd0ac6977f9c059dbb312ad54d9a388fdc8f6a137aa4ed5f32fc20fa20fd,2024-04-30T07:15:48.897000
CVE-2024-28816,0,0,4b9f923b99f4095b32672af0003c81bae1f3b3136774827600fae7accfedcfe3,2024-03-11T12:47:42.653000 CVE-2024-28816,0,0,4b9f923b99f4095b32672af0003c81bae1f3b3136774827600fae7accfedcfe3,2024-03-11T12:47:42.653000
CVE-2024-28823,0,0,d5aa89b5cdac6c3847ac374cba2a65b191e57c43dc618aabb1da571ab5b5e9dc,2024-03-11T12:47:42.653000 CVE-2024-28823,0,0,d5aa89b5cdac6c3847ac374cba2a65b191e57c43dc618aabb1da571ab5b5e9dc,2024-03-11T12:47:42.653000
CVE-2024-28824,0,0,5a9476ae0fdb0520e3a986c832f5f9e27a50da5cb3aa11e06910544296f0e530,2024-03-22T12:45:36.130000 CVE-2024-28824,0,0,5a9476ae0fdb0520e3a986c832f5f9e27a50da5cb3aa11e06910544296f0e530,2024-03-22T12:45:36.130000
@ -245663,6 +245665,7 @@ CVE-2024-30715,0,0,1aef6e778337429a4e916390c7c49019059ffec6032d4a1a4f0ac32d0b4b6
CVE-2024-30716,0,0,cbae0b698d7abc032f63ea21fe25b210a4aed4495dea7bc65cf3f24037eeab00,2024-04-17T02:15:11.233000 CVE-2024-30716,0,0,cbae0b698d7abc032f63ea21fe25b210a4aed4495dea7bc65cf3f24037eeab00,2024-04-17T02:15:11.233000
CVE-2024-30718,0,0,0af1f0a01aff2d54c0c10eab26eb36f6dd79897a14e0db7b615c824e6fc0242f,2024-04-17T02:15:11.290000 CVE-2024-30718,0,0,0af1f0a01aff2d54c0c10eab26eb36f6dd79897a14e0db7b615c824e6fc0242f,2024-04-17T02:15:11.290000
CVE-2024-30719,0,0,c898b1573cb28d548bc7a6b87450a8466ea5b113d2a2e09460024a1482d6041c,2024-04-17T02:15:11.347000 CVE-2024-30719,0,0,c898b1573cb28d548bc7a6b87450a8466ea5b113d2a2e09460024a1482d6041c,2024-04-17T02:15:11.347000
CVE-2024-3072,1,1,dfb0eb0e1379652491a4ba9f0d25fdbba76afb0c242f2721052735a5ec34f9d3,2024-04-30T09:15:07.250000
CVE-2024-30721,0,0,cfe66cb0a0d169a00ef7b85017d45ab992548cc8d5232209ee41301acc196fbd,2024-04-17T02:15:11.400000 CVE-2024-30721,0,0,cfe66cb0a0d169a00ef7b85017d45ab992548cc8d5232209ee41301acc196fbd,2024-04-17T02:15:11.400000
CVE-2024-30722,0,0,1fe5c2e6734a0cd888961745fe085c09d6649694093aefb46627a3f8e4d54d69,2024-04-17T02:15:11.457000 CVE-2024-30722,0,0,1fe5c2e6734a0cd888961745fe085c09d6649694093aefb46627a3f8e4d54d69,2024-04-17T02:15:11.457000
CVE-2024-30723,0,0,7f608a558cfd46363f395fc3d859d1e187a66a08bb86fef27d684b15753dd6ca,2024-04-17T02:15:11.507000 CVE-2024-30723,0,0,7f608a558cfd46363f395fc3d859d1e187a66a08bb86fef27d684b15753dd6ca,2024-04-17T02:15:11.507000
@ -246099,7 +246102,7 @@ CVE-2024-31821,0,0,e6b107a08767c4659cc5cd5ec36d2173bbd9e6a1567ae281bf420ac79ebda
CVE-2024-31822,0,0,d1a2d153e2e72301c5ee224300dd8256de2a7637db4ea4fe3cdd06ef29d2a953,2024-04-29T18:15:07.817000 CVE-2024-31822,0,0,d1a2d153e2e72301c5ee224300dd8256de2a7637db4ea4fe3cdd06ef29d2a953,2024-04-29T18:15:07.817000
CVE-2024-31823,0,0,b12a6c84fe9735ba90ffa046a7e378a0f142a42d4e6b1c6d4c5d047b60c30cb2,2024-04-29T18:15:07.880000 CVE-2024-31823,0,0,b12a6c84fe9735ba90ffa046a7e378a0f142a42d4e6b1c6d4c5d047b60c30cb2,2024-04-29T18:15:07.880000
CVE-2024-31828,0,0,13feac7cf63f02c8d248e7c048b8aecc3b5bd73dc02c3a86ce1d7360cb58bb31,2024-04-29T12:42:03.667000 CVE-2024-31828,0,0,13feac7cf63f02c8d248e7c048b8aecc3b5bd73dc02c3a86ce1d7360cb58bb31,2024-04-29T12:42:03.667000
CVE-2024-31837,1,1,ed72a0044974cd73b52bc5804bc2eee175db23fb84bbc5d56300ac09b898bbd5,2024-04-30T07:15:48.993000 CVE-2024-31837,0,0,ed72a0044974cd73b52bc5804bc2eee175db23fb84bbc5d56300ac09b898bbd5,2024-04-30T07:15:48.993000
CVE-2024-31839,0,0,25a7daa33bac03a27a09e1621adb92d9361c02bf4ef6c11d27831735c896c138,2024-04-15T13:15:51.577000 CVE-2024-31839,0,0,25a7daa33bac03a27a09e1621adb92d9361c02bf4ef6c11d27831735c896c138,2024-04-15T13:15:51.577000
CVE-2024-31841,0,0,e807a83ca93985dc842f15dd9311ce37f6ae1c5acd5a2d45df542202c187b560,2024-04-19T16:19:49.043000 CVE-2024-31841,0,0,e807a83ca93985dc842f15dd9311ce37f6ae1c5acd5a2d45df542202c187b560,2024-04-19T16:19:49.043000
CVE-2024-31846,0,0,ec1f3478d8b62b2fb094bc9ce16da74fa6c5e7add097c8b7f5b857bd703bef58,2024-04-19T16:19:49.043000 CVE-2024-31846,0,0,ec1f3478d8b62b2fb094bc9ce16da74fa6c5e7add097c8b7f5b857bd703bef58,2024-04-19T16:19:49.043000
@ -247127,9 +247130,10 @@ CVE-2024-4174,0,0,c142274bead27dee8f65c018633c5143a8f9b64dc6c6d83b389a2c439d2fca
CVE-2024-4175,0,0,60706a95032c3b7b71280c12c10b7cdce6a73ddf5468ef6a0d21aafa3328ee4a,2024-04-25T13:18:02.660000 CVE-2024-4175,0,0,60706a95032c3b7b71280c12c10b7cdce6a73ddf5468ef6a0d21aafa3328ee4a,2024-04-25T13:18:02.660000
CVE-2024-4182,0,0,e7bfd5d03ac4e50248987fdc4c50fca364e9bca2384ff17427febaa9cba5bb33,2024-04-26T12:58:17.720000 CVE-2024-4182,0,0,e7bfd5d03ac4e50248987fdc4c50fca364e9bca2384ff17427febaa9cba5bb33,2024-04-26T12:58:17.720000
CVE-2024-4183,0,0,ccc399a2445bf78d9e7d0cacf88ee6d06233217c2d933caf866c50fd88c63c71,2024-04-26T12:58:17.720000 CVE-2024-4183,0,0,ccc399a2445bf78d9e7d0cacf88ee6d06233217c2d933caf866c50fd88c63c71,2024-04-26T12:58:17.720000
CVE-2024-4185,1,1,4258d947520d0914eea3c8bdb31205810932fcb42a8f4d8c5c0a96d2d50b0424,2024-04-30T09:15:07.463000
CVE-2024-4195,0,0,320e8c641dbb71fd3a637ea44d2a1260b2aea61b9d12f44c9e97c80bff500815,2024-04-26T12:58:17.720000 CVE-2024-4195,0,0,320e8c641dbb71fd3a637ea44d2a1260b2aea61b9d12f44c9e97c80bff500815,2024-04-26T12:58:17.720000
CVE-2024-4198,0,0,845a410de3c7b102462b76b86fccfba72df0a0950e69dc55e9742bae00fec8d9,2024-04-26T12:58:17.720000 CVE-2024-4198,0,0,845a410de3c7b102462b76b86fccfba72df0a0950e69dc55e9742bae00fec8d9,2024-04-26T12:58:17.720000
CVE-2024-4225,1,1,46281fee3cca773fc8eddf2650a3f4b13f2b07ad86ca3e4b2f133be2c8c6a4ad,2024-04-30T07:15:49.107000 CVE-2024-4225,0,0,46281fee3cca773fc8eddf2650a3f4b13f2b07ad86ca3e4b2f133be2c8c6a4ad,2024-04-30T07:15:49.107000
CVE-2024-4226,0,0,b0c1e922b4532c695b1b593c555201ee563ec3e11f0284c146f42fa3db283ee7,2024-04-30T02:15:06.577000 CVE-2024-4226,0,0,b0c1e922b4532c695b1b593c555201ee563ec3e11f0284c146f42fa3db283ee7,2024-04-30T02:15:06.577000
CVE-2024-4234,0,0,007b9b5f266bd1a230094439603af6b2584a9759013139ef15c8a83c147fb7e2,2024-04-26T15:32:22.523000 CVE-2024-4234,0,0,007b9b5f266bd1a230094439603af6b2584a9759013139ef15c8a83c147fb7e2,2024-04-26T15:32:22.523000
CVE-2024-4235,0,0,99093520f9467f6bc9df1e67ba828ed8d5a52b47abe017780b1bbfac822d38bb,2024-04-26T19:59:19.793000 CVE-2024-4235,0,0,99093520f9467f6bc9df1e67ba828ed8d5a52b47abe017780b1bbfac822d38bb,2024-04-26T19:59:19.793000

Can't render this file because it is too large.