Auto-Update: 2024-04-05T14:00:38.541853+00:00

This commit is contained in:
cad-safe-bot 2024-04-05 14:03:28 +00:00
parent 1b6432e81f
commit cfac9ac0d1
58 changed files with 656 additions and 188 deletions

View File

@ -2,12 +2,16 @@
"id": "CVE-2023-38709",
"sourceIdentifier": "security@apache.org",
"published": "2024-04-04T20:15:08.047",
"lastModified": "2024-04-04T20:15:08.047",
"vulnStatus": "Received",
"lastModified": "2024-04-05T12:40:52.763",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "Faulty input validation in the core of Apache allows malicious or exploitable backend/content generators to split HTTP responses.\n\nThis issue affects Apache HTTP Server: through 2.4.58.\n"
},
{
"lang": "es",
"value": "La validaci\u00f3n de entrada defectuosa en el n\u00facleo de Apache permite que generadores de contenido/backend maliciosos o explotables dividan las respuestas HTTP. Este problema afecta al servidor HTTP Apache: hasta 2.4.58."
}
],
"metrics": {},

View File

@ -2,12 +2,16 @@
"id": "CVE-2023-45288",
"sourceIdentifier": "security@golang.org",
"published": "2024-04-04T21:15:16.113",
"lastModified": "2024-04-04T21:15:16.113",
"vulnStatus": "Received",
"lastModified": "2024-04-05T12:40:52.763",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "An attacker may cause an HTTP/2 endpoint to read arbitrary amounts of header data by sending an excessive number of CONTINUATION frames. Maintaining HPACK state requires parsing and processing all HEADERS and CONTINUATION frames on a connection. When a request's headers exceed MaxHeaderBytes, no memory is allocated to store the excess headers, but they are still parsed. This permits an attacker to cause an HTTP/2 endpoint to read arbitrary amounts of header data, all associated with a request which is going to be rejected. These headers can include Huffman-encoded data which is significantly more expensive for the receiver to decode than for an attacker to send. The fix sets a limit on the amount of excess header frames we will process before closing a connection."
},
{
"lang": "es",
"value": "Un atacante puede hacer que un endpoint HTTP/2 lea cantidades arbitrarias de datos de encabezado enviando una cantidad excesiva de tramas de CONTINUACI\u00d3N. Mantener el estado de HPACK requiere analizar y procesar todos los encabezados y tramas de CONTINUACI\u00d3N en una conexi\u00f3n. Cuando los encabezados de una solicitud exceden MaxHeaderBytes, no se asigna memoria para almacenar los encabezados sobrantes, pero a\u00fan as\u00ed se analizan. Esto permite a un atacante hacer que un endpoint HTTP/2 lea cantidades arbitrarias de datos de encabezado, todos asociados con una solicitud que ser\u00e1 rechazada. Estos encabezados pueden incluir datos codificados por Huffman, cuya decodificaci\u00f3n es significativamente m\u00e1s costosa para el receptor que para el atacante. La soluci\u00f3n establece un l\u00edmite en la cantidad de fotogramas de encabezado excedentes que procesaremos antes de cerrar una conexi\u00f3n."
}
],
"metrics": {},

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-52235",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-04-05T06:15:10.060",
"lastModified": "2024-04-05T06:15:10.060",
"vulnStatus": "Received",
"lastModified": "2024-04-05T12:40:52.763",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -0,0 +1,59 @@
{
"id": "CVE-2023-5692",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-04-05T13:15:07.773",
"lastModified": "2024-04-05T13:15:07.773",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "WordPress Core is vulnerable to Sensitive Information Exposure in versions up to, and including, 6.4.3 via the redirect_guess_404_permalink function. This can allow unauthenticated attackers to expose the slug of a custom post whose 'publicly_queryable' post status has been set to 'false'."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security@wordfence.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 3.9,
"impactScore": 1.4
}
]
},
"references": [
{
"url": "https://core.trac.wordpress.org/changeset/57645",
"source": "security@wordfence.com"
},
{
"url": "https://developer.wordpress.org/reference/functions/is_post_publicly_viewable/",
"source": "security@wordfence.com"
},
{
"url": "https://developer.wordpress.org/reference/functions/is_post_type_viewable/",
"source": "security@wordfence.com"
},
{
"url": "https://github.com/WordPress/wordpress-develop/blob/6.3/src/wp-includes/canonical.php#L763",
"source": "security@wordfence.com"
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/6e6f993b-ce09-4050-84a1-cbe9953f36b1?source=cve",
"source": "security@wordfence.com"
}
]
}

View File

@ -2,12 +2,16 @@
"id": "CVE-2023-5973",
"sourceIdentifier": "sirt@brocade.com",
"published": "2024-04-05T03:15:07.770",
"lastModified": "2024-04-05T03:15:07.770",
"vulnStatus": "Received",
"lastModified": "2024-04-05T12:40:52.763",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "Brocade\n Web Interface in Brocade Fabric OS v9.x and before v9.2.0 does not \nproperly represent the portName to the user if the portName contains \nreserved characters. This could allow an authenticated user to alter the\n UI of the Brocade Switch and change ports display.\n\n"
},
{
"lang": "es",
"value": "La interfaz web de Brocade en Brocade Fabric OS v9.x y versiones anteriores a v9.2.0 no representa correctamente el nombre del puerto para el usuario si el nombre del puerto contiene caracteres reservados. Esto podr\u00eda permitir a un usuario autenticado alterar la interfaz de usuario del Brocade Switch y cambiar la visualizaci\u00f3n de los puertos."
}
],
"metrics": {

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2023-6522",
"sourceIdentifier": "iletisim@usom.gov.tr",
"published": "2024-04-05T12:15:36.267",
"lastModified": "2024-04-05T12:40:52.763",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "Improper Privilege Management vulnerability in ExtremePacs Extreme XDS allows Collect Data as Provided by Users.This issue affects Extreme XDS: before 3914.\n\n"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "iletisim@usom.gov.tr",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 7.2,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 2.7
}
]
},
"weaknesses": [
{
"source": "iletisim@usom.gov.tr",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-269"
}
]
}
],
"references": [
{
"url": "https://www.usom.gov.tr/bildirim/tr-24-0276",
"source": "iletisim@usom.gov.tr"
}
]
}

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2023-6523",
"sourceIdentifier": "iletisim@usom.gov.tr",
"published": "2024-04-05T12:15:37.233",
"lastModified": "2024-04-05T12:40:52.763",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "Authorization Bypass Through User-Controlled Key vulnerability in ExtremePacs Extreme XDS allows Authentication Abuse.This issue affects Extreme XDS: before 3914.\n\n"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "iletisim@usom.gov.tr",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "iletisim@usom.gov.tr",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-639"
}
]
}
],
"references": [
{
"url": "https://www.usom.gov.tr/bildirim/tr-24-0276",
"source": "iletisim@usom.gov.tr"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-21848",
"sourceIdentifier": "responsibledisclosure@mattermost.com",
"published": "2024-04-05T09:15:09.017",
"lastModified": "2024-04-05T09:15:09.017",
"vulnStatus": "Received",
"lastModified": "2024-04-05T12:40:52.763",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,12 +2,16 @@
"id": "CVE-2024-21894",
"sourceIdentifier": "support@hackerone.com",
"published": "2024-04-04T23:15:15.640",
"lastModified": "2024-04-04T23:15:15.640",
"vulnStatus": "Received",
"lastModified": "2024-04-05T12:40:52.763",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "A heap overflow vulnerability in IPSec component of Ivanti Connect Secure (9.x, 22.x) and Ivanti Policy Secure allows an unauthenticated malicious user to send specially crafted requests in-order-to crash the service thereby causing a DoS attack. In certain conditions this may lead to execution of arbitrary code "
},
{
"lang": "es",
"value": "Una vulnerabilidad de desbordamiento de mont\u00f3n en el componente IPSec de Ivanti Connect Secure (9.x, 22.x) e Ivanti Policy Secure permite que un usuario malintencionado no autenticado env\u00ede solicitudes especialmente manipuladas para bloquear el servicio, provocando as\u00ed un ataque DoS. En determinadas condiciones, esto puede conducir a la ejecuci\u00f3n de c\u00f3digo arbitrario."
}
],
"metrics": {

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-2115",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-04-05T08:15:07.470",
"lastModified": "2024-04-05T08:15:07.470",
"vulnStatus": "Received",
"lastModified": "2024-04-05T12:40:52.763",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,12 +2,16 @@
"id": "CVE-2024-22023",
"sourceIdentifier": "support@hackerone.com",
"published": "2024-04-04T20:15:08.130",
"lastModified": "2024-04-04T20:15:08.130",
"vulnStatus": "Received",
"lastModified": "2024-04-05T12:40:52.763",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "An XML entity expansion or XEE vulnerability in SAML component of Ivanti Connect Secure (9.x, 22.x) and Ivanti Policy Secure allows an unauthenticated attacker to send specially crafted XML requests in-order-to temporarily cause resource exhaustion thereby resulting in a limited-time DoS. "
},
{
"lang": "es",
"value": "Una expansi\u00f3n de entidad XML o vulnerabilidad XEE en el componente SAML de Ivanti Connect Secure (9.x, 22.x) e Ivanti Policy Secure permite que un atacante no autenticado env\u00ede solicitudes XML especialmente manipuladas para causar temporalmente el agotamiento de los recursos, lo que resulta en una DoS por tiempo limitado."
}
],
"metrics": {

View File

@ -2,12 +2,16 @@
"id": "CVE-2024-22052",
"sourceIdentifier": "support@hackerone.com",
"published": "2024-04-04T20:15:08.333",
"lastModified": "2024-04-04T20:15:08.333",
"vulnStatus": "Received",
"lastModified": "2024-04-05T12:40:52.763",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "A null pointer dereference vulnerability in IPSec component of Ivanti Connect Secure (9.x, 22.x) and Ivanti Policy Secure allows an unauthenticated malicious user to send specially crafted requests in-order-to crash the service thereby causing a DoS attack "
},
{
"lang": "es",
"value": "Una vulnerabilidad de desreferencia de puntero nulo en el componente IPSec de Ivanti Connect Secure (9.x, 22.x) e Ivanti Policy Secure permite que un usuario malintencionado no autenticado env\u00ede solicitudes especialmente manipuladas para bloquear el servicio, provocando as\u00ed un ataque DoS."
}
],
"metrics": {

View File

@ -2,12 +2,16 @@
"id": "CVE-2024-22053",
"sourceIdentifier": "support@hackerone.com",
"published": "2024-04-04T20:15:08.500",
"lastModified": "2024-04-04T20:15:08.500",
"vulnStatus": "Received",
"lastModified": "2024-04-05T12:40:52.763",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "A heap overflow vulnerability in IPSec component of Ivanti Connect Secure (9.x\n 22.x) and Ivanti Policy Secure allows an unauthenticated malicious user to send specially crafted requests in-order-to crash the service thereby causing a DoS attack or in certain conditions read contents from memory. "
},
{
"lang": "es",
"value": "Una vulnerabilidad de desbordamiento de mont\u00f3n en el componente IPSec de Ivanti Connect Secure (9.x 22.x) e Ivanti Policy Secure permite que un usuario malintencionado no autenticado env\u00ede solicitudes especialmente manipuladas para bloquear el servicio, provocando as\u00ed un ataque DoS o en determinadas condiciones. leer contenidos de la memoria."
}
],
"metrics": {

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-22363",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-04-05T06:15:10.200",
"lastModified": "2024-04-05T06:15:10.200",
"vulnStatus": "Received",
"lastModified": "2024-04-05T12:40:52.763",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2024-2380",
"sourceIdentifier": "security@checkmk.com",
"published": "2024-04-05T13:15:07.973",
"lastModified": "2024-04-05T13:15:07.973",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Stored XSS in graph rendering in Checkmk <2.3.0b4."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security@checkmk.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 4.6,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.1,
"impactScore": 2.5
}
]
},
"weaknesses": [
{
"source": "security@checkmk.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-80"
}
]
}
],
"references": [
{
"url": "https://checkmk.com/werk/16618",
"source": "security@checkmk.com"
}
]
}

View File

@ -2,12 +2,16 @@
"id": "CVE-2024-24795",
"sourceIdentifier": "security@apache.org",
"published": "2024-04-04T20:15:08.663",
"lastModified": "2024-04-04T20:15:08.663",
"vulnStatus": "Received",
"lastModified": "2024-04-05T12:40:52.763",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "HTTP Response splitting in multiple modules in Apache HTTP Server allows an attacker that can inject malicious response headers into backend applications to cause an HTTP desynchronization attack.\n\nUsers are recommended to upgrade to version 2.4.59, which fixes this issue."
},
{
"lang": "es",
"value": "La divisi\u00f3n de la respuesta HTTP en varios m\u00f3dulos en el servidor HTTP Apache permite que un atacante pueda inyectar encabezados de respuesta maliciosos en aplicaciones backend para provocar un ataque de desincronizaci\u00f3n HTTP. Se recomienda a los usuarios actualizar a la versi\u00f3n 2.4.59, que soluciona este problema."
}
],
"metrics": {},

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-2447",
"sourceIdentifier": "responsibledisclosure@mattermost.com",
"published": "2024-04-05T09:15:09.860",
"lastModified": "2024-04-05T09:15:09.860",
"vulnStatus": "Received",
"lastModified": "2024-04-05T12:40:52.763",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -0,0 +1,47 @@
{
"id": "CVE-2024-2499",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-04-05T13:15:08.177",
"lastModified": "2024-04-05T13:15:08.177",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "The Squelch Tabs and Accordions Shortcodes plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'accordions' shortcode in all versions up to, and including, 0.4.3 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security@wordfence.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 6.4,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 3.1,
"impactScore": 2.7
}
]
},
"references": [
{
"url": "https://plugins.trac.wordpress.org/changeset/3052812/squelch-tabs-and-accordions-shortcodes",
"source": "security@wordfence.com"
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/adf10ad4-38b2-44be-bdc6-ba6b62e9fbe6?source=cve",
"source": "security@wordfence.com"
}
]
}

View File

@ -2,12 +2,16 @@
"id": "CVE-2024-2509",
"sourceIdentifier": "contact@wpscan.com",
"published": "2024-04-05T05:15:07.463",
"lastModified": "2024-04-05T05:15:07.463",
"vulnStatus": "Received",
"lastModified": "2024-04-05T12:40:52.763",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "The Gutenberg Blocks by Kadence Blocks WordPress plugin before 3.2.26 does not validate and escape some of its block options before outputting them back in a page/post where the block is embed, which could allow users with the contributor role and above to perform Stored Cross-Site Scripting attacks"
},
{
"lang": "es",
"value": "El complemento Gutenberg Blocks by Kadence Blocks de WordPress anterior a 3.2.26 no valida ni escapa algunas de sus opciones de bloqueo antes de devolverlas a una p\u00e1gina/publicaci\u00f3n donde est\u00e1 incrustado el bloque, lo que podr\u00eda permitir a los usuarios con el rol de colaborador y superior realiza ataques de Cross-Site Scripting Almacenado"
}
],
"metrics": {},

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-26329",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-04-05T07:15:10.970",
"lastModified": "2024-04-05T07:15:10.970",
"vulnStatus": "Received",
"lastModified": "2024-04-05T12:40:52.763",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-26810",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-04-05T09:15:09.230",
"lastModified": "2024-04-05T09:15:09.230",
"vulnStatus": "Received",
"lastModified": "2024-04-05T12:40:52.763",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-26812",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-04-05T09:15:09.283",
"lastModified": "2024-04-05T09:15:09.283",
"vulnStatus": "Received",
"lastModified": "2024-04-05T12:40:52.763",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-26813",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-04-05T09:15:09.340",
"lastModified": "2024-04-05T09:15:09.340",
"vulnStatus": "Received",
"lastModified": "2024-04-05T12:40:52.763",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-26814",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-04-05T09:15:09.393",
"lastModified": "2024-04-05T09:15:09.393",
"vulnStatus": "Received",
"lastModified": "2024-04-05T12:40:52.763",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,12 +2,16 @@
"id": "CVE-2024-27316",
"sourceIdentifier": "security@apache.org",
"published": "2024-04-04T20:15:08.720",
"lastModified": "2024-04-04T20:15:08.720",
"vulnStatus": "Received",
"lastModified": "2024-04-05T12:40:52.763",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "HTTP/2 incoming headers exceeding the limit are temporarily buffered in nghttp2 in order to generate an informative HTTP 413 response. If a client does not stop sending headers, this leads to memory exhaustion."
},
{
"lang": "es",
"value": "Los encabezados entrantes HTTP/2 que exceden el l\u00edmite se almacenan temporalmente en nghttp2 para generar una respuesta HTTP 413 informativa. Si un cliente no deja de enviar encabezados, esto provoca que se agote la memoria."
}
],
"metrics": {},

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-27437",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-04-05T09:15:09.443",
"lastModified": "2024-04-05T09:15:09.443",
"vulnStatus": "Received",
"lastModified": "2024-04-05T12:40:52.763",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-27448",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-04-05T06:15:10.263",
"lastModified": "2024-04-05T06:15:10.263",
"vulnStatus": "Received",
"lastModified": "2024-04-05T12:40:52.763",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,12 +2,16 @@
"id": "CVE-2024-27981",
"sourceIdentifier": "support@hackerone.com",
"published": "2024-04-04T23:15:15.837",
"lastModified": "2024-04-04T23:15:15.837",
"vulnStatus": "Received",
"lastModified": "2024-04-05T12:40:52.763",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "A Command Injection vulnerability found in a Self-Hosted UniFi Network Servers (Linux) with UniFi Network Application (Version 8.0.28 and earlier) allows a malicious actor with UniFi Network Application Administrator credentials to escalate privileges to root on the host device.\r\n\r\nAffected Products:\r\nUniFi Network Application (Version 8.0.28 and earlier) .\r\n \r\nMitigation:\r\nUpdate UniFi Network Application to Version 8.1.113 or later."
},
{
"lang": "es",
"value": "Una vulnerabilidad de inyecci\u00f3n de comandos encontrada en servidores de red UniFi autohospedados (Linux) con la aplicaci\u00f3n de red UniFi (versi\u00f3n 8.0.28 y anteriores) permite a un actor malicioso con credenciales de administrador de la aplicaci\u00f3n de red UniFi escalar privilegios a root en el dispositivo host. Productos afectados: Aplicaci\u00f3n de red UniFi (Versi\u00f3n 8.0.28 y anteriores). Mitigaci\u00f3n: actualice la aplicaci\u00f3n UniFi Network a la versi\u00f3n 8.1.113 o posterior."
}
],
"metrics": {},

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-28949",
"sourceIdentifier": "responsibledisclosure@mattermost.com",
"published": "2024-04-05T09:15:09.497",
"lastModified": "2024-04-05T09:15:09.497",
"vulnStatus": "Received",
"lastModified": "2024-04-05T12:40:52.763",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,12 +2,16 @@
"id": "CVE-2024-29049",
"sourceIdentifier": "secure@microsoft.com",
"published": "2024-04-04T22:15:08.827",
"lastModified": "2024-04-04T22:15:08.827",
"vulnStatus": "Received",
"lastModified": "2024-04-05T12:40:52.763",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "Microsoft Edge (Chromium-based) Webview2 Spoofing Vulnerability"
},
{
"lang": "es",
"value": "Vulnerabilidad de suplantaci\u00f3n de identidad de Webview2 en Microsoft Edge (basado en Chromium)"
}
],
"metrics": {

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-29221",
"sourceIdentifier": "responsibledisclosure@mattermost.com",
"published": "2024-04-05T09:15:09.680",
"lastModified": "2024-04-05T09:15:09.680",
"vulnStatus": "Received",
"lastModified": "2024-04-05T12:40:52.763",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,12 +2,16 @@
"id": "CVE-2024-29386",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-04-04T20:15:08.837",
"lastModified": "2024-04-04T20:15:08.837",
"vulnStatus": "Received",
"lastModified": "2024-04-05T12:40:52.763",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "projeqtor up to 11.2.0 was discovered to contain a SQL injection vulnerability via the component /view/criticalResourceExport.php."
},
{
"lang": "es",
"value": "Se descubri\u00f3 que projeqtor hasta 11.2.0 conten\u00eda una vulnerabilidad de inyecci\u00f3n SQL a trav\u00e9s del componente /view/criticalResourceExport.php."
}
],
"metrics": {},

View File

@ -2,12 +2,16 @@
"id": "CVE-2024-29387",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-04-04T20:15:08.920",
"lastModified": "2024-04-04T20:15:08.920",
"vulnStatus": "Received",
"lastModified": "2024-04-05T12:40:52.763",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "projeqtor up to 11.2.0 was discovered to contain a remote code execution (RCE) vulnerability via the component /view/print.php."
},
{
"lang": "es",
"value": "Se descubri\u00f3 que projeqtor hasta la versi\u00f3n 11.2.0 contiene una vulnerabilidad de ejecuci\u00f3n remota de c\u00f3digo (RCE) a trav\u00e9s del componente /view/print.php."
}
],
"metrics": {},

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-29672",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-04-05T06:15:10.323",
"lastModified": "2024-04-05T06:15:10.323",
"vulnStatus": "Received",
"lastModified": "2024-04-05T12:40:52.763",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-29863",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-04-05T07:15:11.110",
"lastModified": "2024-04-05T07:15:11.110",
"vulnStatus": "Received",
"lastModified": "2024-04-05T12:40:52.763",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,12 +2,16 @@
"id": "CVE-2024-29981",
"sourceIdentifier": "secure@microsoft.com",
"published": "2024-04-04T22:15:09.153",
"lastModified": "2024-04-04T22:15:09.153",
"vulnStatus": "Received",
"lastModified": "2024-04-05T12:40:52.763",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "Microsoft Edge (Chromium-based) Spoofing Vulnerability"
},
{
"lang": "es",
"value": "Vulnerabilidad de suplantaci\u00f3n de identidad en Microsoft Edge (basado en Chromium)"
}
],
"metrics": {

View File

@ -2,12 +2,16 @@
"id": "CVE-2024-30255",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-04-04T20:15:08.983",
"lastModified": "2024-04-04T20:15:08.983",
"vulnStatus": "Received",
"lastModified": "2024-04-05T12:40:52.763",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "Envoy is a cloud-native, open source edge and service proxy. The HTTP/2 protocol stack in Envoy versions prior to 1.29.3, 1.28.2, 1.27.4, and 1.26.8 are vulnerable to CPU exhaustion due to flood of CONTINUATION frames. Envoy's HTTP/2 codec allows the client to send an unlimited number of CONTINUATION frames even after exceeding Envoy's header map limits. This allows an attacker to send a sequence of CONTINUATION frames without the END_HEADERS bit set causing CPU utilization, consuming approximately 1 core per 300Mbit/s of traffic and culminating in denial of service through CPU exhaustion. Users should upgrade to version 1.29.3, 1.28.2, 1.27.4, or 1.26.8 to mitigate the effects of the CONTINUATION flood. As a workaround, disable HTTP/2 protocol for downstream connections."
},
{
"lang": "es",
"value": "Envoy es un proxy de servicio y borde de c\u00f3digo abierto, nativo de la nube. La pila de protocolos HTTP/2 en las versiones de Envoy anteriores a 1.29.3, 1.28.2, 1.27.4 y 1.26.8 son vulnerables al agotamiento de la CPU debido a la inundaci\u00f3n de tramas de CONTINUACI\u00d3N. El c\u00f3dec HTTP/2 de Envoy permite al cliente enviar un n\u00famero ilimitado de tramas de CONTINUACI\u00d3N incluso despu\u00e9s de exceder los l\u00edmites del mapa de encabezado de Envoy. Esto permite a un atacante enviar una secuencia de tramas CONTINUATION sin que el bit END_HEADERS est\u00e9 configurado causando la utilizaci\u00f3n de la CPU, consumiendo aproximadamente 1 n\u00facleo por cada 300 Mbit/s de tr\u00e1fico y culminando en una denegaci\u00f3n de servicio por agotamiento de la CPU. Los usuarios deben actualizar a la versi\u00f3n 1.29.3, 1.28.2, 1.27.4 o 1.26.8 para mitigar los efectos de la inundaci\u00f3n de CONTINUACI\u00d3N. Como workaround, deshabilite el protocolo HTTP/2 para conexiones descendentes."
}
],
"metrics": {

View File

@ -2,12 +2,16 @@
"id": "CVE-2024-30264",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-04-04T21:15:16.380",
"lastModified": "2024-04-04T21:15:16.380",
"vulnStatus": "Received",
"lastModified": "2024-04-05T12:40:52.763",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "Typebot is an open-source chatbot builder. A reflected cross-site scripting (XSS) in the sign-in page of typebot.io prior to version 2.24.0 may allow an attacker to hijack a user's account. The sign-in page takes the `redirectPath` parameter from the URL. If a user clicks on a link where the `redirectPath` parameter has a javascript scheme, the attacker that crafted the link may be able to execute arbitrary JavaScript with the privileges of the user. Version 2.24.0 contains a patch for this issue."
},
{
"lang": "es",
"value": "Typebot es un creador de chatbots de c\u00f3digo abierto. Un cross-site scripting (XSS) reflejado en la p\u00e1gina de inicio de sesi\u00f3n de typebot.io antes de la versi\u00f3n 2.24.0 puede permitir que un atacante se apodere de la cuenta de un usuario. La p\u00e1gina de inicio de sesi\u00f3n toma el par\u00e1metro `redirectPath` de la URL. Si un usuario hace clic en un enlace donde el par\u00e1metro `redirectPath` tiene un esquema javascript, el atacante que cre\u00f3 el enlace puede ejecutar JavaScript arbitrario con los privilegios del usuario. La versi\u00f3n 2.24.0 contiene un parche para este problema."
}
],
"metrics": {

View File

@ -2,12 +2,16 @@
"id": "CVE-2024-30270",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-04-04T21:15:16.577",
"lastModified": "2024-04-04T21:15:16.577",
"vulnStatus": "Received",
"lastModified": "2024-04-05T12:40:52.763",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "mailcow: dockerized is an open source groupware/email suite based on docker. A security vulnerability has been identified in mailcow affecting versions prior to 2024-04. This vulnerability is a combination of path traversal and arbitrary code execution, specifically targeting the `rspamd_maps()` function. It allows authenticated admin users to overwrite any file writable by the www-data user by exploiting improper path validation. The exploit chain can lead to the execution of arbitrary commands on the server. Version 2024-04 contains a patch for the issue."
},
{
"lang": "es",
"value": "mailcow: dockerized es un software colaborativo/paquete de correo electr\u00f3nico de c\u00f3digo abierto basado en Docker. Se ha identificado una vulnerabilidad de seguridad en mailcow que afecta a versiones anteriores a 2024-04. Esta vulnerabilidad es una combinaci\u00f3n de path traversal y ejecuci\u00f3n de c\u00f3digo arbitrario, espec\u00edficamente dirigida a la funci\u00f3n `rspamd_maps()`. Permite a los usuarios administradores autenticados sobrescribir cualquier archivo en el que pueda escribir el usuario www-data aprovechando la validaci\u00f3n de ruta incorrecta. La cadena de exploits puede conducir a la ejecuci\u00f3n de comandos arbitrarios en el servidor. La versi\u00f3n 2024-04 contiene un parche para el problema."
}
],
"metrics": {

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-30849",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-04-05T08:15:07.733",
"lastModified": "2024-04-05T08:15:07.733",
"vulnStatus": "Received",
"lastModified": "2024-04-05T12:40:52.763",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-30891",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-04-05T08:15:07.800",
"lastModified": "2024-04-05T08:15:07.800",
"vulnStatus": "Received",
"lastModified": "2024-04-05T12:40:52.763",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -0,0 +1,59 @@
{
"id": "CVE-2024-31083",
"sourceIdentifier": "secalert@redhat.com",
"published": "2024-04-05T12:15:37.577",
"lastModified": "2024-04-05T12:40:52.763",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "A use-after-free vulnerability was found in the ProcRenderAddGlyphs() function of Xorg servers. This issue occurs when AllocateGlyph() is called to store new glyphs sent by the client to the X server, potentially resulting in multiple entries pointing to the same non-refcounted glyphs. Consequently, ProcRenderAddGlyphs() may free a glyph, leading to a use-after-free scenario when the same glyph pointer is subsequently accessed. This flaw allows an authenticated attacker to execute arbitrary code on the system by sending a specially crafted request."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "secalert@redhat.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "secalert@redhat.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-416"
}
]
}
],
"references": [
{
"url": "https://access.redhat.com/security/cve/CVE-2024-31083",
"source": "secalert@redhat.com"
},
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2272000",
"source": "secalert@redhat.com"
}
]
}

View File

@ -2,12 +2,16 @@
"id": "CVE-2024-31204",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-04-04T21:15:16.773",
"lastModified": "2024-04-04T21:15:16.773",
"vulnStatus": "Received",
"lastModified": "2024-04-05T12:40:52.763",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "mailcow: dockerized is an open source groupware/email suite based on docker. A security vulnerability has been identified in mailcow affecting versions prior to 2024-04. This vulnerability resides in the exception handling mechanism, specifically when not operating in DEV_MODE. The system saves exception details into a session array without proper sanitization or encoding. These details are later rendered into HTML and executed in a JavaScript block within the user's browser, without adequate escaping of HTML entities. This flaw allows for Cross-Site Scripting (XSS) attacks, where attackers can inject malicious scripts into the admin panel by triggering exceptions with controlled input. The exploitation method involves using any function that might throw an exception with user-controllable argument. This issue can lead to session hijacking and unauthorized administrative actions, posing a significant security risk. Version 2024-04 contains a fix for the issue."
},
{
"lang": "es",
"value": "mailcow: dockerized es un software colaborativo/paquete de correo electr\u00f3nico de c\u00f3digo abierto basado en Docker. Se ha identificado una vulnerabilidad de seguridad en mailcow que afecta a versiones anteriores a 2024-04. Esta vulnerabilidad reside en el mecanismo de manejo de excepciones, espec\u00edficamente cuando no se opera en DEV_MODE. El sistema guarda los detalles de la excepci\u00f3n en una matriz de sesiones sin una desinfecci\u00f3n o codificaci\u00f3n adecuada. Estos detalles luego se representan en HTML y se ejecutan en un bloque de JavaScript dentro del navegador del usuario, sin un escape adecuado de las entidades HTML. Esta falla permite ataques de Cross-Site Scripting (XSS), donde los atacantes pueden inyectar scripts maliciosos en el panel de administraci\u00f3n activando excepciones con entradas controladas. El m\u00e9todo de explotaci\u00f3n implica el uso de cualquier funci\u00f3n que pueda generar una excepci\u00f3n con un argumento controlable por el usuario. Este problema puede provocar secuestro de sesi\u00f3n y acciones administrativas no autorizadas, lo que supone un riesgo de seguridad importante. La versi\u00f3n 2024-04 contiene una soluci\u00f3n para el problema."
}
],
"metrics": {

View File

@ -2,12 +2,16 @@
"id": "CVE-2024-31206",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-04-04T23:15:15.897",
"lastModified": "2024-04-04T23:15:15.897",
"vulnStatus": "Received",
"lastModified": "2024-04-05T12:40:52.763",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "dectalk-tts is a Node package to interact with the aeiou Dectalk web API. In `dectalk-tts@1.0.0`, network requests to the third-party API are sent over HTTP, which is unencrypted. Unencrypted traffic can be easily intercepted and modified by attackers. Anyone who uses the package could be the victim of a man-in-the-middle (MITM) attack. The network request was upgraded to HTTPS in version `1.0.1`. There are no workarounds, but some precautions include not sending any sensitive information and carefully verifying the API response before saving it."
},
{
"lang": "es",
"value": "dectalk-tts es un paquete de Nodo para interactuar con la API web aeiou Dectalk. En `dectalk-tts@1.0.0`, las solicitudes de red a la API de terceros se env\u00edan a trav\u00e9s de HTTP, que no est\u00e1 cifrado. Los atacantes pueden interceptar y modificar f\u00e1cilmente el tr\u00e1fico no cifrado. Cualquiera que utilice el paquete podr\u00eda ser v\u00edctima de un ataque de intermediario (MITM). La solicitud de red se actualiz\u00f3 a HTTPS en la versi\u00f3n \"1.0.1\". No existen workarounds, pero algunas precauciones incluyen no enviar informaci\u00f3n confidencial y verificar cuidadosamente la respuesta de la API antes de guardarla."
}
],
"metrics": {

View File

@ -2,12 +2,16 @@
"id": "CVE-2024-31210",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-04-04T23:15:16.127",
"lastModified": "2024-04-04T23:15:16.127",
"vulnStatus": "Received",
"lastModified": "2024-04-05T12:40:52.763",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "WordPress is an open publishing platform for the Web. It's possible for a file of a type other than a zip file to be submitted as a new plugin by an administrative user on the Plugins -> Add New -> Upload Plugin screen in WordPress. If FTP credentials are requested for installation (in order to move the file into place outside of the `uploads` directory) then the uploaded file remains temporary available in the Media Library despite it not being allowed. If the `DISALLOW_FILE_EDIT` constant is set to `true` on the site _and_ FTP credentials are required when uploading a new theme or plugin, then this technically allows an RCE when the user would otherwise have no means of executing arbitrary PHP code. This issue _only_ affects Administrator level users on single site installations, and Super Admin level users on Multisite installations where it's otherwise expected that the user does not have permission to upload or execute arbitrary PHP code. Lower level users are not affected. Sites where the `DISALLOW_FILE_MODS` constant is set to `true` are not affected. Sites where an administrative user either does not need to enter FTP credentials or they have access to the valid FTP credentials, are not affected. The issue was fixed in WordPress 6.4.3 on January 30, 2024 and backported to versions 6.3.3, 6.2.4, 6.1.5, 6.0.7, 5.9.9, 5.8.9, 5.7.11, 5.6.13, 5.5.14, 5.4.15, 5.3.17, 5.2.20, 5.1.18, 5.0.21, 4.9.25, 2.8.24, 4.7.28, 4.6.28, 4.5.31, 4.4.32, 4.3.33, 4.2.37, and 4.1.40. A workaround is available. If the `DISALLOW_FILE_MODS` constant is defined as `true` then it will not be possible for any user to upload a plugin and therefore this issue will not be exploitable.\n"
},
{
"lang": "es",
"value": "WordPress es una plataforma de publicaci\u00f3n abierta para la Web. Es posible que un usuario administrativo env\u00ede un archivo de un tipo que no sea un archivo zip como un nuevo complemento en la pantalla Complementos -&gt; Agregar nuevo -&gt; Cargar complemento en WordPress. Si se solicitan credenciales FTP para la instalaci\u00f3n (para mover el archivo a un lugar fuera del directorio `uploads`), entonces el archivo cargado permanece disponible temporalmente en la librer\u00eda multimedia a pesar de que no est\u00e9 permitido. Si la constante `DISALLOW_FILE_EDIT` se establece en `true` en el sitio _y_ se requieren credenciales FTP al cargar un nuevo tema o complemento, entonces esto t\u00e9cnicamente permite un RCE cuando el usuario no tendr\u00eda medios para ejecutar c\u00f3digo PHP arbitrario. Este problema _solo_ afecta a los usuarios de nivel de administrador en instalaciones de un solo sitio y a los usuarios de nivel de superadministrador en instalaciones de m\u00faltiples sitios donde, de lo contrario, se espera que el usuario no tenga permiso para cargar o ejecutar c\u00f3digo PHP arbitrario. Los usuarios de niveles inferiores no se ven afectados. Los sitios donde la constante `DISALLOW_FILE_MODS` est\u00e1 establecida en `true` no se ven afectados. Los sitios donde un usuario administrativo no necesita ingresar credenciales FTP o tiene acceso a las credenciales FTP v\u00e1lidas no se ven afectados. El problema se solucion\u00f3 en WordPress 6.4.3 el 30 de enero de 2024 y se actualiz\u00f3 a las versiones 6.3.3, 6.2.4, 6.1.5, 6.0.7, 5.9.9, 5.8.9, 5.7.11, 5.6.13. 5.5.14, 5.4.15, 5.3.17, 5.2.20, 5.1.18, 5.0.21, 4.9.25, 2.8.24, 4.7.28, 4.6.28, 4.5.31, 4.4.32, 4.3. 33, 4.2.37 y 4.1.40. Hay una soluci\u00f3n disponible. Si la constante `DISALLOW_FILE_MODS` se define como `true`, ning\u00fan usuario podr\u00e1 cargar un complemento y, por lo tanto, este problema no ser\u00e1 explotable."
}
],
"metrics": {

View File

@ -2,12 +2,16 @@
"id": "CVE-2024-31211",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-04-04T23:15:16.333",
"lastModified": "2024-04-04T23:15:16.333",
"vulnStatus": "Received",
"lastModified": "2024-04-05T12:40:52.763",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "WordPress is an open publishing platform for the Web. Unserialization of instances of the `WP_HTML_Token` class allows for code execution via its `__destruct()` magic method. This issue was fixed in WordPress 6.4.2 on December 6th, 2023. Versions prior to 6.4.0 are not affected."
},
{
"lang": "es",
"value": "WordPress es una plataforma de publicaci\u00f3n abierta para la Web. La deserializaci\u00f3n de instancias de la clase `WP_HTML_Token` permite la ejecuci\u00f3n de c\u00f3digo a trav\u00e9s de su m\u00e9todo m\u00e1gico `__destruct()`. Este problema se solucion\u00f3 en WordPress 6.4.2 el 6 de diciembre de 2023. Las versiones anteriores a la 6.4.0 no se ven afectadas."
}
],
"metrics": {

View File

@ -2,12 +2,16 @@
"id": "CVE-2024-31212",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-04-04T23:15:16.540",
"lastModified": "2024-04-04T23:15:16.540",
"vulnStatus": "Received",
"lastModified": "2024-04-05T12:40:52.763",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "InstantCMS is a free and open source content management system. A SQL injection vulnerability affects instantcms v2.16.2 in which an attacker with administrative privileges can cause the application to execute unauthorized SQL code. The vulnerability exists in index_chart_data action, which receives an input from user and passes it unsanitized to the core model `filterFunc` function that further embeds this data in an SQL statement. This allows attackers to inject unwanted SQL code into the statement. The `period` should be escaped before inserting it in the query. As of time of publication, a patched version is not available."
},
{
"lang": "es",
"value": "InstantCMS es un sistema de gesti\u00f3n de contenidos gratuito y de c\u00f3digo abierto. Una vulnerabilidad de inyecci\u00f3n SQL afecta a instantcms v2.16.2 en la que un atacante con privilegios administrativos puede hacer que la aplicaci\u00f3n ejecute c\u00f3digo SQL no autorizado. La vulnerabilidad existe en la acci\u00f3n index_chart_data, que recibe una entrada del usuario y la pasa sin desinfectar a la funci\u00f3n `filterFunc` del modelo central que incorpora a\u00fan m\u00e1s estos datos en una declaraci\u00f3n SQL. Esto permite a los atacantes inyectar c\u00f3digo SQL no deseado en la declaraci\u00f3n. Se debe utilizar un car\u00e1cter de escape antes de insertarlo en la consulta. Al momento de la publicaci\u00f3n, no hay una versi\u00f3n parcheada disponible."
}
],
"metrics": {

View File

@ -2,12 +2,16 @@
"id": "CVE-2024-31498",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-04-04T23:15:16.743",
"lastModified": "2024-04-04T23:15:16.743",
"vulnStatus": "Received",
"lastModified": "2024-04-05T12:40:52.763",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "ykman-gui (aka YubiKey Manager GUI) before 1.2.6 on Windows, when Edge is not used, allows privilege escalation because browser windows can open as Administrator."
},
{
"lang": "es",
"value": "ykman-gui (tambi\u00e9n conocido como GUI de YubiKey Manager) anterior a 1.2.6 en Windows, cuando no se usa Edge, permite la escalada de privilegios porque las ventanas del navegador se pueden abrir como Administrador."
}
],
"metrics": {},

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-3217",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-04-05T08:15:07.853",
"lastModified": "2024-04-05T08:15:07.853",
"vulnStatus": "Received",
"lastModified": "2024-04-05T12:40:52.763",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,12 +2,16 @@
"id": "CVE-2024-3296",
"sourceIdentifier": "secalert@redhat.com",
"published": "2024-04-04T14:15:11.080",
"lastModified": "2024-04-04T16:33:06.610",
"lastModified": "2024-04-05T12:15:37.777",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "A timing-based side-channel exists in the rust-openssl package, which could be sufficient to recover a plaintext across a network in a Bleichenbacher-style attack. To achieve successful decryption, an attacker would have to be able to send a large number of trial messages for decryption. The vulnerability affects the legacy PKCS#1v1.5 RSA encryption padding mode."
"value": "A timing-based side-channel flaw exists in the rust-openssl package, which could be sufficient to recover a plaintext across a network in a Bleichenbacher-style attack. To achieve successful decryption, an attacker would have to be able to send a large number of trial messages for decryption. The vulnerability affects the legacy PKCS#1v1.5 RSA encryption padding mode."
},
{
"lang": "es",
"value": "Existe un canal lateral basado en temporizaci\u00f3n en el paquete rust-openssl, que podr\u00eda ser suficiente para recuperar un texto plano a trav\u00e9s de una red en un ataque estilo Bleichenbacher. Para lograr un descifrado exitoso, un atacante tendr\u00eda que poder enviar una gran cantidad de mensajes de prueba para descifrarlos. La vulnerabilidad afecta al modo de relleno de cifrado RSA PKCS#1v1.5 heredado."
}
],
"metrics": {

View File

@ -2,12 +2,16 @@
"id": "CVE-2024-3311",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-04-04T21:15:16.957",
"lastModified": "2024-04-04T21:15:16.957",
"vulnStatus": "Received",
"lastModified": "2024-04-05T12:40:52.763",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was found in Dreamer CMS up to 4.1.3.0. It has been declared as critical. Affected by this vulnerability is the function ZipUtils.unZipFiles of the file controller/admin/ThemesController.java. The manipulation leads to path traversal. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 4.1.3.1 is able to address this issue. It is recommended to upgrade the affected component. The identifier VDB-259369 was assigned to this vulnerability."
},
{
"lang": "es",
"value": "Se encontr\u00f3 una vulnerabilidad en Dreamer CMS hasta 4.1.3.0. Ha sido declarada cr\u00edtica. La funci\u00f3n ZipUtils.unZipFiles del archivo controlador/admin/ThemesController.java es afectada por esta vulnerabilidad. La manipulaci\u00f3n conduce al path traversal. El ataque se puede lanzar de forma remota. El exploit ha sido divulgado al p\u00fablico y puede utilizarse. La actualizaci\u00f3n a la versi\u00f3n 4.1.3.1 puede solucionar este problema. Se recomienda actualizar el componente afectado. A esta vulnerabilidad se le asign\u00f3 el identificador VDB-259369."
}
],
"metrics": {

View File

@ -2,12 +2,16 @@
"id": "CVE-2024-3314",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-04-04T21:15:17.203",
"lastModified": "2024-04-04T21:15:17.203",
"vulnStatus": "Received",
"lastModified": "2024-04-05T12:40:52.763",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was found in SourceCodester Computer Laboratory Management System 1.0 and classified as critical. This issue affects some unknown processing of the file /classes/Users.php. The manipulation leads to sql injection. The attack may be initiated remotely. The identifier VDB-259385 was assigned to this vulnerability."
},
{
"lang": "es",
"value": "Una vulnerabilidad fue encontrada en SourceCodester Computer Laboratory Management System 1.0 y clasificada como cr\u00edtica. Este problema afecta un procesamiento desconocido del archivo /classes/Users.php. La manipulaci\u00f3n conduce a la inyecci\u00f3n de SQL. El ataque puede iniciarse de forma remota. A esta vulnerabilidad se le asign\u00f3 el identificador VDB-259385."
}
],
"metrics": {

View File

@ -2,12 +2,16 @@
"id": "CVE-2024-3315",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-04-04T21:15:17.430",
"lastModified": "2024-04-04T21:15:17.430",
"vulnStatus": "Received",
"lastModified": "2024-04-05T12:40:52.763",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was found in SourceCodester Computer Laboratory Management System 1.0. It has been classified as critical. Affected is an unknown function of the file classes/user.php. The manipulation of the argument id leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. VDB-259386 is the identifier assigned to this vulnerability."
},
{
"lang": "es",
"value": "Se encontr\u00f3 una vulnerabilidad en SourceCodester Computer Laboratory Management System 1.0. Ha sido clasificada como cr\u00edtica. Una funci\u00f3n desconocida del archivo class/user.php es afectada por esta vulnerabilidad. La manipulaci\u00f3n del argumento id conduce a la inyecci\u00f3n de SQL. Es posible lanzar el ataque de forma remota. El exploit ha sido divulgado al p\u00fablico y puede utilizarse. VDB-259386 es el identificador asignado a esta vulnerabilidad."
}
],
"metrics": {

View File

@ -2,12 +2,16 @@
"id": "CVE-2024-3316",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-04-04T22:15:09.420",
"lastModified": "2024-04-04T22:15:09.420",
"vulnStatus": "Received",
"lastModified": "2024-04-05T12:40:52.763",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was found in SourceCodester Computer Laboratory Management System 1.0. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file /admin/category/view_category.php. The manipulation of the argument id leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-259387."
},
{
"lang": "es",
"value": "Se encontr\u00f3 una vulnerabilidad en SourceCodester Computer Laboratory Management System 1.0. Ha sido declarada cr\u00edtica. Una funci\u00f3n desconocida del archivo /admin/category/view_category.php es afectada por esta vulnerabilidad. La manipulaci\u00f3n del argumento id conduce a la inyecci\u00f3n de SQL. El ataque se puede lanzar de forma remota. El exploit ha sido divulgado al p\u00fablico y puede utilizarse. El identificador asociado de esta vulnerabilidad es VDB-259387."
}
],
"metrics": {

View File

@ -2,12 +2,16 @@
"id": "CVE-2024-3320",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-04-05T00:15:08.147",
"lastModified": "2024-04-05T00:15:08.147",
"vulnStatus": "Received",
"lastModified": "2024-04-05T12:40:52.763",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was found in SourceCodester eLearning System 1.0. It has been rated as problematic. Affected by this issue is some unknown functionality. The manipulation of the argument page leads to cross site scripting. The attack may be launched remotely. The identifier of this vulnerability is VDB-259388."
},
{
"lang": "es",
"value": "Se encontr\u00f3 una vulnerabilidad en SourceCodester eLearning System 1.0. Ha sido calificada como problem\u00e1tica. Una funci\u00f3n desconocida es afectada por este problema. La manipulaci\u00f3n de la p\u00e1gina de argumentos conduce a Cross-Site Scripting. El ataque puede lanzarse de forma remota. El identificador de esta vulnerabilidad es VDB-259388."
}
],
"metrics": {

View File

@ -2,12 +2,16 @@
"id": "CVE-2024-3321",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-04-05T01:15:51.747",
"lastModified": "2024-04-05T01:15:51.747",
"vulnStatus": "Received",
"lastModified": "2024-04-05T12:40:52.763",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability classified as problematic has been found in SourceCodester eLearning System 1.0. This affects an unknown part of the component Maintenance Module. The manipulation of the argument Subject Code/Description leads to cross site scripting. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-259389 was assigned to this vulnerability."
},
{
"lang": "es",
"value": "Una vulnerabilidad ha sido encontrada en SourceCodester eLearning System 1.0 y clasificada como problem\u00e1tica. Una parte desconocida del componente Maintenance Module afecta a una parte desconocida. La manipulaci\u00f3n del argumento C\u00f3digo de asunto/Descripci\u00f3n conduce a Cross-Site Scripting. Es posible iniciar el ataque de forma remota. El exploit ha sido divulgado al p\u00fablico y puede utilizarse. A esta vulnerabilidad se le asign\u00f3 el identificador VDB-259389."
}
],
"metrics": {

View File

@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update
```plain
2024-04-05T10:00:38.649160+00:00
2024-04-05T14:00:38.541853+00:00
```
### Most recent CVE Modification Timestamp synchronized with NVD
```plain
2024-04-05T09:15:09.860000+00:00
2024-04-05T13:15:08.177000+00:00
```
### Last Data Feed Release
@ -33,42 +33,50 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
### Total Number of included CVEs
```plain
244187
244193
```
### CVEs added in the last Commit
Recently added CVEs: `13`
Recently added CVEs: `6`
- [CVE-2024-2115](CVE-2024/CVE-2024-21xx/CVE-2024-2115.json) (`2024-04-05T08:15:07.470`)
- [CVE-2024-21848](CVE-2024/CVE-2024-218xx/CVE-2024-21848.json) (`2024-04-05T09:15:09.017`)
- [CVE-2024-2447](CVE-2024/CVE-2024-24xx/CVE-2024-2447.json) (`2024-04-05T09:15:09.860`)
- [CVE-2024-26810](CVE-2024/CVE-2024-268xx/CVE-2024-26810.json) (`2024-04-05T09:15:09.230`)
- [CVE-2024-26812](CVE-2024/CVE-2024-268xx/CVE-2024-26812.json) (`2024-04-05T09:15:09.283`)
- [CVE-2024-26813](CVE-2024/CVE-2024-268xx/CVE-2024-26813.json) (`2024-04-05T09:15:09.340`)
- [CVE-2024-26814](CVE-2024/CVE-2024-268xx/CVE-2024-26814.json) (`2024-04-05T09:15:09.393`)
- [CVE-2024-27437](CVE-2024/CVE-2024-274xx/CVE-2024-27437.json) (`2024-04-05T09:15:09.443`)
- [CVE-2024-28949](CVE-2024/CVE-2024-289xx/CVE-2024-28949.json) (`2024-04-05T09:15:09.497`)
- [CVE-2024-29221](CVE-2024/CVE-2024-292xx/CVE-2024-29221.json) (`2024-04-05T09:15:09.680`)
- [CVE-2024-30849](CVE-2024/CVE-2024-308xx/CVE-2024-30849.json) (`2024-04-05T08:15:07.733`)
- [CVE-2024-30891](CVE-2024/CVE-2024-308xx/CVE-2024-30891.json) (`2024-04-05T08:15:07.800`)
- [CVE-2024-3217](CVE-2024/CVE-2024-32xx/CVE-2024-3217.json) (`2024-04-05T08:15:07.853`)
- [CVE-2023-5692](CVE-2023/CVE-2023-56xx/CVE-2023-5692.json) (`2024-04-05T13:15:07.773`)
- [CVE-2023-6522](CVE-2023/CVE-2023-65xx/CVE-2023-6522.json) (`2024-04-05T12:15:36.267`)
- [CVE-2023-6523](CVE-2023/CVE-2023-65xx/CVE-2023-6523.json) (`2024-04-05T12:15:37.233`)
- [CVE-2024-2380](CVE-2024/CVE-2024-23xx/CVE-2024-2380.json) (`2024-04-05T13:15:07.973`)
- [CVE-2024-2499](CVE-2024/CVE-2024-24xx/CVE-2024-2499.json) (`2024-04-05T13:15:08.177`)
- [CVE-2024-31083](CVE-2024/CVE-2024-310xx/CVE-2024-31083.json) (`2024-04-05T12:15:37.577`)
### CVEs modified in the last Commit
Recently modified CVEs: `10`
Recently modified CVEs: `50`
- [CVE-2022-34357](CVE-2022/CVE-2022-343xx/CVE-2022-34357.json) (`2024-04-05T09:15:08.060`)
- [CVE-2023-22655](CVE-2023/CVE-2023-226xx/CVE-2023-22655.json) (`2024-04-05T09:15:08.203`)
- [CVE-2023-30996](CVE-2023/CVE-2023-309xx/CVE-2023-30996.json) (`2024-04-05T09:15:08.317`)
- [CVE-2023-32344](CVE-2023/CVE-2023-323xx/CVE-2023-32344.json) (`2024-04-05T09:15:08.407`)
- [CVE-2023-32666](CVE-2023/CVE-2023-326xx/CVE-2023-32666.json) (`2024-04-05T09:15:08.497`)
- [CVE-2023-35191](CVE-2023/CVE-2023-351xx/CVE-2023-35191.json) (`2024-04-05T09:15:08.583`)
- [CVE-2023-38359](CVE-2023/CVE-2023-383xx/CVE-2023-38359.json) (`2024-04-05T09:15:08.677`)
- [CVE-2023-38575](CVE-2023/CVE-2023-385xx/CVE-2023-38575.json) (`2024-04-05T09:15:08.763`)
- [CVE-2023-39368](CVE-2023/CVE-2023-393xx/CVE-2023-39368.json) (`2024-04-05T09:15:08.850`)
- [CVE-2023-43490](CVE-2023/CVE-2023-434xx/CVE-2023-43490.json) (`2024-04-05T09:15:08.930`)
- [CVE-2024-29221](CVE-2024/CVE-2024-292xx/CVE-2024-29221.json) (`2024-04-05T12:40:52.763`)
- [CVE-2024-29386](CVE-2024/CVE-2024-293xx/CVE-2024-29386.json) (`2024-04-05T12:40:52.763`)
- [CVE-2024-29387](CVE-2024/CVE-2024-293xx/CVE-2024-29387.json) (`2024-04-05T12:40:52.763`)
- [CVE-2024-29672](CVE-2024/CVE-2024-296xx/CVE-2024-29672.json) (`2024-04-05T12:40:52.763`)
- [CVE-2024-29863](CVE-2024/CVE-2024-298xx/CVE-2024-29863.json) (`2024-04-05T12:40:52.763`)
- [CVE-2024-29981](CVE-2024/CVE-2024-299xx/CVE-2024-29981.json) (`2024-04-05T12:40:52.763`)
- [CVE-2024-30255](CVE-2024/CVE-2024-302xx/CVE-2024-30255.json) (`2024-04-05T12:40:52.763`)
- [CVE-2024-30264](CVE-2024/CVE-2024-302xx/CVE-2024-30264.json) (`2024-04-05T12:40:52.763`)
- [CVE-2024-30270](CVE-2024/CVE-2024-302xx/CVE-2024-30270.json) (`2024-04-05T12:40:52.763`)
- [CVE-2024-30849](CVE-2024/CVE-2024-308xx/CVE-2024-30849.json) (`2024-04-05T12:40:52.763`)
- [CVE-2024-30891](CVE-2024/CVE-2024-308xx/CVE-2024-30891.json) (`2024-04-05T12:40:52.763`)
- [CVE-2024-31204](CVE-2024/CVE-2024-312xx/CVE-2024-31204.json) (`2024-04-05T12:40:52.763`)
- [CVE-2024-31206](CVE-2024/CVE-2024-312xx/CVE-2024-31206.json) (`2024-04-05T12:40:52.763`)
- [CVE-2024-31210](CVE-2024/CVE-2024-312xx/CVE-2024-31210.json) (`2024-04-05T12:40:52.763`)
- [CVE-2024-31211](CVE-2024/CVE-2024-312xx/CVE-2024-31211.json) (`2024-04-05T12:40:52.763`)
- [CVE-2024-31212](CVE-2024/CVE-2024-312xx/CVE-2024-31212.json) (`2024-04-05T12:40:52.763`)
- [CVE-2024-31498](CVE-2024/CVE-2024-314xx/CVE-2024-31498.json) (`2024-04-05T12:40:52.763`)
- [CVE-2024-3217](CVE-2024/CVE-2024-32xx/CVE-2024-3217.json) (`2024-04-05T12:40:52.763`)
- [CVE-2024-3296](CVE-2024/CVE-2024-32xx/CVE-2024-3296.json) (`2024-04-05T12:15:37.777`)
- [CVE-2024-3311](CVE-2024/CVE-2024-33xx/CVE-2024-3311.json) (`2024-04-05T12:40:52.763`)
- [CVE-2024-3314](CVE-2024/CVE-2024-33xx/CVE-2024-3314.json) (`2024-04-05T12:40:52.763`)
- [CVE-2024-3315](CVE-2024/CVE-2024-33xx/CVE-2024-3315.json) (`2024-04-05T12:40:52.763`)
- [CVE-2024-3316](CVE-2024/CVE-2024-33xx/CVE-2024-3316.json) (`2024-04-05T12:40:52.763`)
- [CVE-2024-3320](CVE-2024/CVE-2024-33xx/CVE-2024-3320.json) (`2024-04-05T12:40:52.763`)
- [CVE-2024-3321](CVE-2024/CVE-2024-33xx/CVE-2024-3321.json) (`2024-04-05T12:40:52.763`)
## Download and Usage

View File

@ -200854,7 +200854,7 @@ CVE-2022-34352,0,0,1e1d4fbb5a377507f21a2bed94d2ebc5281a09581aee987536370e13d6395
CVE-2022-34354,0,0,02584ee6b8cb0bff7f27c7009429134f0b39fd1a6b1116c23548e4adeee7b542,2023-11-07T03:48:33.893000
CVE-2022-34355,0,0,c113b0077901660ecb6420de68116b847470d756b400e1b61d0de5945949d9a8,2023-10-10T20:41:30.020000
CVE-2022-34356,0,0,2ae14f15be104cb235faa8a6ab8ed3afc398f20d7225fc326f5247476834ae64,2022-09-16T02:56:48.280000
CVE-2022-34357,0,1,af87a974bbeca9e2d6e7bafe81283ee0f5421ac9d7cafc5f56a460dca06db348,2024-04-05T09:15:08.060000
CVE-2022-34357,0,0,af87a974bbeca9e2d6e7bafe81283ee0f5421ac9d7cafc5f56a460dca06db348,2024-04-05T09:15:08.060000
CVE-2022-34358,0,0,c81aeda061a6e1c39a5ea95bf08044fe1aed3523aa70c0f131fd41eb0542b8c2,2022-07-27T23:07:58.250000
CVE-2022-3436,0,0,628499c3069d5d4d40a6545fab742a3d0bedd629a4e56c085297ef7620ea4d2d,2023-11-30T14:15:08.173000
CVE-2022-34361,0,0,62e052216474f4951eeb4a3cb3acba62f053ad7d01461ecc470cfb339c52d99a,2023-11-07T03:48:34.060000
@ -215730,7 +215730,7 @@ CVE-2023-22651,0,0,71c4ad22d720a14f556cbdbb0dfeae4cea5ba5bc7c522362e29fd79de49a8
CVE-2023-22652,0,0,22b310772038f08a4e58450ff2cc11ade814694d9e643598182c60a0305bcac8,2023-09-13T03:15:07.693000
CVE-2023-22653,0,0,a51dcac8d7628283af317fae95110ee2fc893a6c8b2b6ebf1624613b419371fc,2023-08-02T15:34:59.683000
CVE-2023-22654,0,0,5b1a8feee98010e65bed848785e61db9d7b8c5ab9fbbb79f8736b9741ba8db64,2023-05-30T22:22:43.403000
CVE-2023-22655,0,1,4014795b5db8a78148a9a1e089cc32279c6823fb131fc7bb94f4872889f6e033,2024-04-05T09:15:08.203000
CVE-2023-22655,0,0,4014795b5db8a78148a9a1e089cc32279c6823fb131fc7bb94f4872889f6e033,2024-04-05T09:15:08.203000
CVE-2023-22657,0,0,50aba77e7826f44f75fd8eca9cdefd06087e1b24472024d8ed2ae2967b0f87b1,2023-11-07T04:07:12.750000
CVE-2023-22659,0,0,71d1f10cbb6b53df610f190613167a6c75fa7f817c0f72a1094380595ddd5133,2023-07-13T17:17:26.230000
CVE-2023-2266,0,0,21c36958639008dc9b075634492f4955ca2430a255612c0db16c56bae462bdf1,2023-12-06T00:35:24.197000
@ -222139,7 +222139,7 @@ CVE-2023-30991,0,0,d2cd3864d4d0c1e0346308db047da023695d9d74eb35ca6206a98aedc11f1
CVE-2023-30993,0,0,03bf4ae9dfc255a68d7e0f8c0d83b167e401827066b7281a4017436cb44acd16,2023-07-05T18:47:03.063000
CVE-2023-30994,0,0,50f2536b42ff1c52ec44103505245abc9de1d3604cb0eec34abbe616f409e899,2023-10-18T20:48:41.863000
CVE-2023-30995,0,0,52e1bdffb80c2cd6a5585042ac96f61096b1fdd1a66207a01a6edf115e2cc942,2023-10-10T20:15:09.650000
CVE-2023-30996,0,1,0cbc5199ab8703e9e1e8f5db93dac42c6c5c4fbde7a4c589a63ada853499569d,2024-04-05T09:15:08.317000
CVE-2023-30996,0,0,0cbc5199ab8703e9e1e8f5db93dac42c6c5c4fbde7a4c589a63ada853499569d,2024-04-05T09:15:08.317000
CVE-2023-30999,0,0,1ddc78f54cf0c47e9336bc540c859356a71014614a888d063a16c4ae23a656c0,2024-02-06T21:31:55.033000
CVE-2023-3100,0,0,178f8cfb72823422aea10e7ffea4194c7bfad6260e8286d491b815750e8a8864,2024-03-21T02:48:24.370000
CVE-2023-31001,0,0,c53512fa1496d57027073df272050bde089a391b1726720adc054c5082b0bad7,2024-01-18T17:06:28.277000
@ -223041,7 +223041,7 @@ CVE-2023-32339,0,0,cb517b5b344e935e47f6fa2b5d4d177564da71d9c5673af6029fc8ae03edb
CVE-2023-3234,0,0,a73a9cbedb7f5d4c8e9c6e64bd0603a581ffe38a404e785fa8e0687b891ef8df,2024-03-21T02:48:28.063000
CVE-2023-32341,0,0,1ddf31eafe868585a40c30471b117fdf8bc01f015bb58b603e688577fc61bd21,2024-02-15T04:40:13.650000
CVE-2023-32342,0,0,718b739606ceddf8e116cda5b49dc56f9002b527775d566e068e3f50abde9e5c,2023-06-06T18:18:41.097000
CVE-2023-32344,0,1,a97deba342fd58800328e47f88083826c0a2753dea8ce966e07e7c270b69e45e,2024-04-05T09:15:08.407000
CVE-2023-32344,0,0,a97deba342fd58800328e47f88083826c0a2753dea8ce966e07e7c270b69e45e,2024-04-05T09:15:08.407000
CVE-2023-32346,0,0,1720a4f1887d300a5a8abe90d8a81fa98e2566da8b280c128fac5c7393e4f6c4,2023-05-31T20:17:36.940000
CVE-2023-32347,0,0,8e4f4f9285f7dd35eb61db76d54965657bbc3f0a44cb8d351372ee30c4f36a96,2023-05-31T20:18:22.233000
CVE-2023-32348,0,0,8c439649256e002f4389c48d462357d3b5521993f6f3fda6e5a636fc0d57887a,2023-06-01T14:26:59.373000
@ -223361,7 +223361,7 @@ CVE-2023-32662,0,0,e6ecfd432d8093b5086df379db0b57cdf40d1685dba2c7fabe307bec0ed72
CVE-2023-32663,0,0,3e7ef52ee8898923e5c75493bfae74a9e09e3258bba72eb62046ef7118b9edb7,2023-08-21T17:15:47.183000
CVE-2023-32664,0,0,eb42d87345b4b74142e9d98b628cc63fc43d215142fe85e83066ebee2586bda4,2023-09-15T19:15:07.340000
CVE-2023-32665,0,0,31f6fbb04d38e24ef8a8bd7c7b632bd8e055665c900cbecbc4c539e406f2b02a,2023-11-27T14:15:07.820000
CVE-2023-32666,0,1,9e4cb6a8ebc3b9a62bc711210afb6752a4df60b12745e2e1ba1c7436db1cb9d9,2024-04-05T09:15:08.497000
CVE-2023-32666,0,0,9e4cb6a8ebc3b9a62bc711210afb6752a4df60b12745e2e1ba1c7436db1cb9d9,2024-04-05T09:15:08.497000
CVE-2023-32668,0,0,6870504f63fd451347fe0c331096f1e45ff8f6811229f296b8ba61f0b4142f10,2023-05-23T17:31:45.217000
CVE-2023-32669,0,0,0f9d4ef16e2f26deb90011f7c395852feb44144b8263c413043ff4187727c7dd,2023-10-04T21:07:05.703000
CVE-2023-3267,0,0,2d4c8daf423de31384ed6303e8fbed7365844c7d43ecaa98d82b4375b3aba328,2023-08-22T16:15:46.067000
@ -225157,7 +225157,7 @@ CVE-2023-35187,0,0,726f3d269c3fc4ab0e4f8bf02f0782a65d9f79c8f65fbe320311a563e2133
CVE-2023-35188,0,0,dc2d51582b0c40a1a991431e82dc96ea83b69d4b6cd75cf2797291ed1d48e8fe,2024-02-13T20:36:01.653000
CVE-2023-35189,0,0,727918a3b8004e51f12292fde6090cd74f994ad6d97365addee6dbdc84715391,2023-07-27T17:43:17.170000
CVE-2023-3519,0,0,7329bec3703bdc39aea3e59a1cc85b2341feb74f79ed91f9be508e94879784da,2023-08-04T18:15:17.077000
CVE-2023-35191,0,1,c31c71c496abdb7f6b10202e2976b8f837d4c71b7eaa2c4113c2b95cf33357cf,2024-04-05T09:15:08.583000
CVE-2023-35191,0,0,c31c71c496abdb7f6b10202e2976b8f837d4c71b7eaa2c4113c2b95cf33357cf,2024-04-05T09:15:08.583000
CVE-2023-35193,0,0,35d999215ee0714de627ba46454d683b144c8672ad7068fc25e9877364a0d4d5,2023-10-18T14:59:29.847000
CVE-2023-35194,0,0,f1422d8c09e7347a9549c0a032c4e17cf30f4016d4503b676ff325c6bb8df1e1,2023-10-18T14:59:10.533000
CVE-2023-3520,0,0,03168a3d34c4551d3f89d5576703d3fa9269c779a40ea50d5fa229233446f0fa,2023-07-12T15:34:13.653000
@ -227261,7 +227261,7 @@ CVE-2023-38354,0,0,d1e8aae350b3efaa7d933d306935881b296a663e5e0dd367535a6a3341ed7
CVE-2023-38355,0,0,249d62dea42b65c43f485337cf2b025ca84978994be22a87ed6e3b2716c3280d,2023-10-13T01:14:34.023000
CVE-2023-38356,0,0,c55e6df572a7ad6a09d93d8bf024b6549d086d1593f311c0dcd9f5f419a32e73,2023-09-22T16:45:59.370000
CVE-2023-38357,0,0,f899c24b9076099671d7a5c797705766cb7feaa772c69dc54fed2a6af7ab8b59,2023-08-04T18:43:48.817000
CVE-2023-38359,0,1,8e809a2260654b54c4b5a8d307cfb00bbc63342d56d8255c4f45147077ddfa79,2024-04-05T09:15:08.677000
CVE-2023-38359,0,0,8e809a2260654b54c4b5a8d307cfb00bbc63342d56d8255c4f45147077ddfa79,2024-04-05T09:15:08.677000
CVE-2023-3836,0,0,8354a50233ed3d7b2f0f73c2e8a8f66f78bb8f5bae55abc92ae927e41b4b7142,2024-03-21T02:48:47.537000
CVE-2023-38360,0,0,79486c66229a0fa5a2154e2865bfba1395d11138731e5917b327ce675040bb76,2024-03-05T13:41:01.900000
CVE-2023-38361,0,0,c6e79c96c692623eff2910c3872ad8af4e3692fed7acdbdf474970bee66927f0,2023-11-29T20:52:28.337000
@ -227458,7 +227458,7 @@ CVE-2023-38571,0,0,59422f4a140d130cd11989d6215360f540ea5ce2d1940f49a1884661bcc08
CVE-2023-38572,0,0,d548f53924cef1c9fed50ca54f02dd79c795d64a5950d4afb21f0974051e6ecc,2024-01-05T14:15:47.123000
CVE-2023-38573,0,0,473858576dcb468ddb455cbd057d8489cb45e9be3d5a82dde3da1329775f6312,2023-12-01T20:52:57.627000
CVE-2023-38574,0,0,b5446bdb7033f5711e00ad3535ee9383e878f8f0159bc3255c479d6656c1d4a4,2023-09-11T12:50:00.413000
CVE-2023-38575,0,1,4e79fe8d2ce008298825516df254661a63b525dae6fedee20e49c3138e848b6a,2024-04-05T09:15:08.763000
CVE-2023-38575,0,0,4e79fe8d2ce008298825516df254661a63b525dae6fedee20e49c3138e848b6a,2024-04-05T09:15:08.763000
CVE-2023-38576,0,0,af8fe57eb812ce53861c61345d0fee8b81c4f54d4d6d4bf17791b20b4197fa51,2023-08-24T18:26:00.547000
CVE-2023-38579,0,0,d675649c63083678f4f6251f8e7bc0f6b675249c8aaa3432eda8a193ed725f0c,2024-02-13T21:56:17.013000
CVE-2023-3858,0,0,b0181383daef6c4e2640c077649efa29542f55d1afd5014233b3c6c43dd98b7b,2024-03-21T02:48:49.360000
@ -227569,7 +227569,7 @@ CVE-2023-38704,0,0,71ad417d2d62aca56ced15b4b3782cb7ef14a1a963bb598f7ad603e82b901
CVE-2023-38706,0,0,d617f4ba91b248078cb18ecbeaa51cab201c52ad3c8f2f18f77c483b475b121f,2023-09-20T19:59:40.533000
CVE-2023-38707,0,0,1555d65b227585a9a17048663d159df62df160dae7a887969466cf59d80e31d9,2023-11-07T04:17:23.830000
CVE-2023-38708,0,0,7fedbbf4bbe078eadce738b4508b175a97c5b3d1293a62ffb0695e275be0d573,2023-08-09T16:15:56.907000
CVE-2023-38709,0,0,4f43d1652d35d613d139bafa21365d4cb956860648974f9c28cfd6c75ee351b3,2024-04-04T20:15:08.047000
CVE-2023-38709,0,1,1b21e70572cd6faad02b973b7e9263859747bdbce6656ca4f202620deee31e0d,2024-04-05T12:40:52.763000
CVE-2023-3871,0,0,347060670f53b0cd99e5d44184b3be46ead6a2c87242979454189d84cb6cc054,2024-03-21T02:48:49.850000
CVE-2023-38710,0,0,c92dcd4884e376d2c6467d62a4785461b746cf66b09b5c314c8a7501bae93f64,2023-12-11T19:34:38.997000
CVE-2023-38711,0,0,165f0388158a27a13a90130c6df8b1216fb4e778781b739e91f43d98820cbc39,2023-12-12T13:52:11.970000
@ -228048,7 +228048,7 @@ CVE-2023-39363,0,0,3b5e03600cf70b560e94452186ae68035e14537be8e3ab0775f4768bbd4e3
CVE-2023-39364,0,0,c3c94f3ad4cb220374e3d08f341ea50d15ec66dff6a2b9cc99e74f26a2402284,2024-03-18T20:15:07.727000
CVE-2023-39365,0,0,e973380538b25f82f11649a42c0b64ff80692ed5ec34a2c9828c426b7e157e90,2024-03-18T20:15:07.827000
CVE-2023-39366,0,0,ec1d63cbca61e10ab8a85d0a3e36a9a8f98189047df6aef06ced93f8760dd051,2023-11-09T05:15:10.317000
CVE-2023-39368,0,1,80c88d98cccc8fda18cc4ce42c7e61c86543eb9a5fed9f7febed87a045c89328,2024-04-05T09:15:08.850000
CVE-2023-39368,0,0,80c88d98cccc8fda18cc4ce42c7e61c86543eb9a5fed9f7febed87a045c89328,2024-04-05T09:15:08.850000
CVE-2023-39369,0,0,e8aa62682a22aacbf757723c98e0bd960e9af84f36a645dc487bf02ca20fc2a4,2023-09-07T17:44:36.470000
CVE-2023-3937,0,0,1b9c2edef5222aa8070478842961fb82be451273a242472108ff086c86dfad93,2023-08-18T14:30:09.183000
CVE-2023-39370,0,0,c3e1bdce95fcb360380a5bb3623ace17d0c7e5b2b109774631c738473e281f23,2023-09-08T06:42:31.750000
@ -230679,7 +230679,7 @@ CVE-2023-43484,0,0,0e3fd100d8cdabff15f5388cc7ad52bc20ee89b047f07e3d1be0d5fe0a15a
CVE-2023-43485,0,0,56e06eecce10771793782bda7486bdc0abaf33406a8b34746335ac307311004e,2023-10-17T20:31:53.560000
CVE-2023-43488,0,0,73963ff8fac3febe7fcf1226608d7faad6241fb5160a15c4381098ef0daabd52,2023-11-06T14:41:18.393000
CVE-2023-4349,0,0,7bcfa9d15cfc992ac2e945aa6e7aec95ce86c568d8f15fb3ba2380084473c42f,2024-01-31T17:15:14.370000
CVE-2023-43490,0,1,9855c56390f04a7d3184cf28686e801bde9b11bfcd2582fd5bccb6e92bdd6f36,2024-04-05T09:15:08.930000
CVE-2023-43490,0,0,9855c56390f04a7d3184cf28686e801bde9b11bfcd2582fd5bccb6e92bdd6f36,2024-04-05T09:15:08.930000
CVE-2023-43492,0,0,42b5f695dc2a37dd6c1424d01d87bfa34fecc8146eed1f8b9a6b38bb9493ae43,2023-10-30T14:33:25.570000
CVE-2023-43493,0,0,c9ba762920ceac7459278a5fd1ff76127d128352a3279e28d59d1b8b275a2639,2023-09-27T20:51:26.677000
CVE-2023-43494,0,0,a5e1abcb0e0cbdd68150bd25ed5f4171fce3829cb775e04ccec60c9f09070438,2023-09-25T13:43:35.503000
@ -231752,7 +231752,7 @@ CVE-2023-45284,0,0,8ac30ea66f71a985fe5bb7a9cd5117880ebafd3abf8acdf27e1d0743d36c9
CVE-2023-45285,0,0,16ff5e8b79188755e5a7a8fbe86dba64b6537f7e34fac57b399b003651fea1da,2024-01-20T04:15:08.013000
CVE-2023-45286,0,0,aa66fbaae1e0c30c7595917e56819be1bbb9d239333872f0ea607184384ab322,2024-01-04T19:15:08.737000
CVE-2023-45287,0,0,3d0bb90ad6b09d1d9f3bb34a82b2143afa61d21142b51c29073fbf468a053219,2024-01-12T14:15:48.310000
CVE-2023-45288,0,0,ff6b87efc60530a09df028bf9af80d06d949ee5c74e3378e9bd7946c57b6df66,2024-04-04T21:15:16.113000
CVE-2023-45288,0,1,081d1fc2c52516346fd1583109c04c9c4ee2b6109c03b6a0ea80fd8097e9c5ed,2024-04-05T12:40:52.763000
CVE-2023-45289,0,0,3447b599eb83a7083c6a73e53671fb2c29c7d970990d5513c7349cd0a7644fe2,2024-03-29T13:15:13.893000
CVE-2023-45290,0,0,d5f93b7a8b1619be03e3f67168cb7e7212bf0df22f898247e2ec2a4b96561862,2024-03-29T13:15:13.957000
CVE-2023-45292,0,0,a4390d55b5d08527c3f372908b1fbe1aa0cdd99af7a0f4f36d5f5803a9a43941,2023-12-14T16:26:54.007000
@ -236058,7 +236058,7 @@ CVE-2023-52229,0,0,ea00ad4e0597affd30c31fe4f98a420e37e7ad7335b14877a8e6dc8a42c24
CVE-2023-5223,0,0,89e8c184d21745a264c9fc9e444990021f80eaf45de773e9b410a22e5226ce45,2024-03-21T02:50:11.113000
CVE-2023-52231,0,0,b5d4f82f731fe2c9cd0c678c3b61a598c79c626b8e6400879ca4a307d29966f3,2024-03-28T12:42:56.150000
CVE-2023-52234,0,0,1fff4c9561934a3ed1e9215004c9ee935ccd38ea2e79cd4cda085a56cc775bc1,2024-03-28T12:42:56.150000
CVE-2023-52235,0,0,f4252331265cbed47d565e61c2d6af947ae9657df278785c08221b7895baa311,2024-04-05T06:15:10.060000
CVE-2023-52235,0,1,16981ffc5fe969f81317d84f727c6e32258dd02cfb8c5b06541b383bfe064ddb,2024-04-05T12:40:52.763000
CVE-2023-52239,0,0,53232ab6cc2fc288fa443c530cf5456f2ca2ee6e47506bdc07862ff96f4b1242,2024-02-13T22:50:50.313000
CVE-2023-52240,0,0,e12239f2302ca733fadb51e07b144a2ef6f5c195fb579e55287a44a10e77cb78,2024-01-08T14:32:47.203000
CVE-2023-52251,0,0,37b652e51a7c39e57b6fb6d1511e1d015580821275c80dc97e7e00b5102f4597,2024-02-29T01:42:07.630000
@ -236751,6 +236751,7 @@ CVE-2023-5688,0,0,06a783b4a174a26699fc289ad2f278ef95fec4ff44eb7fd150fc30bbf083b5
CVE-2023-5689,0,0,4e3175cf7178e77dacef582bf9fb5b0a74671e5f8f56f8b3a11c32f3e6ac3b3e,2023-10-27T18:52:11.203000
CVE-2023-5690,0,0,eb25183a76528a8e7fa2a9848820a0b672578839c362a07eeb93f6f992e63076,2023-10-27T18:50:44.663000
CVE-2023-5691,0,0,15284afecb760980909bdc0c9968d11e1d4acb39199c2aeb8b4a5c4f0836df39,2024-01-18T15:17:46.287000
CVE-2023-5692,1,1,5a43de17769fba853ff662143cfae5b0d47f04a0b28851274071da242abdb9b0,2024-04-05T13:15:07.773000
CVE-2023-5693,0,0,92f3c9bc23405271e955ea89350dfa098d870f91e3ef1d0b756cb5a2e610bf09,2024-03-21T02:50:22.343000
CVE-2023-5694,0,0,4c7b11d0cd8db135050384a220d7020e36a17cc009f33795b53f57f9cc32303b,2024-03-21T02:50:22.423000
CVE-2023-5695,0,0,73e9d0b7d5252380d1b6beec6a6c5cee87c3cd6ce063a9209b7f0140e59c2765,2024-03-21T02:50:22.503000
@ -237009,7 +237010,7 @@ CVE-2023-5968,0,0,3df68a2dd455892737ae4ccd5a51eebeb6501735dcdf4b0df0cec23abf6d9c
CVE-2023-5969,0,0,134a47156763573087c261bbe70bb15989d9036802658ea7ded005b60736db52,2023-11-14T17:13:54.790000
CVE-2023-5970,0,0,a3d173231982020ef5f7b38c5168b740ee778873f57c322454e8fe7b89485a50,2023-12-13T15:32:02.247000
CVE-2023-5972,0,0,656064d47e5a67cc669b3046e3f9950e9c88ceaf574ff9ba75f67da5f86ce1b3,2023-11-30T20:31:31.227000
CVE-2023-5973,0,0,32a44e92efb19c712cd19c194485505b305f6c23b4a7c9444fc75fd9a02a489d,2024-04-05T03:15:07.770000
CVE-2023-5973,0,1,f7b898402b583edab1f75d9292cd44439c623e8c829f2231aab55dc8a659cafe,2024-04-05T12:40:52.763000
CVE-2023-5974,0,0,fa5f45166fa670d4c6344a3fb91459f3146ad2d35e7850fcf71ad2fdc079fd1e,2023-12-01T20:14:58.070000
CVE-2023-5975,0,0,30b6644af3852b24c8154dd79a3d90d108a53c8bc9032f107504cbc0845a2880,2023-11-14T18:11:18.403000
CVE-2023-5976,0,0,97d27a9c52f95e55c71eed6991c193cbb58fd61fdb979d5c6cfd47c0258b66ff,2023-11-14T18:39:05.787000
@ -237454,6 +237455,8 @@ CVE-2023-6517,0,0,3467593a9d1064dca9fbac50097aac110e8ea12ac0f5d56273a5e05aa70522
CVE-2023-6518,0,0,701884efa90328aec127750f6d7a617892af73d7d9d1cbf5cfc7a0127e0ae388,2024-03-21T02:50:38.627000
CVE-2023-6519,0,0,1067c6eb2fdb653773710a715d19abe17d72d4948b55787118a707da115fb55e,2024-03-21T02:50:38.713000
CVE-2023-6520,0,0,51cb07e213c2b58051c216c89b744fc7c414cbeef02be0ba128dd84d6c032cdf,2024-01-17T20:43:01.987000
CVE-2023-6522,1,1,e2a708a4903adadeca3b568b6a016d873c022ef513915335664038e161f935de,2024-04-05T12:40:52.763000
CVE-2023-6523,1,1,d3a9048f5a7ff44e2a6950b8c3357bca3f23405f7d00dd88c1769618a08641fd,2024-04-05T12:40:52.763000
CVE-2023-6524,0,0,c1e8fe40a4048e04c188cd09d174accb2325b4f144f04207980ba18caef1e277,2024-02-02T16:33:29.477000
CVE-2023-6525,0,0,ac70555a2bef1a8087998ae6359b27cf29025600da9a470253289615b5779d5a,2024-03-17T22:38:29.433000
CVE-2023-6526,0,0,bf53e42fb8e2321f8ebfec63b58aabc5d9b3663864ac691d642ae796c386736c,2024-02-12T16:00:51.520000
@ -239873,7 +239876,7 @@ CVE-2024-2108,0,0,c2fa70d90e7c92604d37599b63a68c51b88c7a208a94e63da1f79da8e05cb6
CVE-2024-2110,0,0,1d85de629a97570a97242f5d089550bba2e60a5923838c39c1151e294a5fdcf3,2024-03-28T12:42:56.150000
CVE-2024-2111,0,0,bb223011165a425455ec8ad438d31acdc69716e592665db5e015c6e3c7a0ad9a,2024-03-28T12:42:56.150000
CVE-2024-2113,0,0,1af2e189d0f766a4a77361c625e87ddcd239476cacd0eaf00d619a2d2d68e8de,2024-03-29T12:45:02.937000
CVE-2024-2115,1,1,958070a5428d52f8ec76429e64306fbbf091a0766862fcf468e218b71279864a,2024-04-05T08:15:07.470000
CVE-2024-2115,0,1,ad4a99897aa65ee70731a7a49c28f7d6309b2934d1a4b752871efea7dc55e0f1,2024-04-05T12:40:52.763000
CVE-2024-2116,0,0,0a8927d2c3af56415377e26a49eef636f1c80d9f9b3374c561d3bce1d3a48066,2024-03-29T12:45:02.937000
CVE-2024-2120,0,0,d869e2d6a05f40fd099ef5d11b57f9e00d7f0b266e38148b71c8a447ce60ab1d,2024-03-27T12:29:30.307000
CVE-2024-2121,0,0,4e86b6ec3433d288b50b9e9c9587d6707962f4c2d7ff92215a6366c5fd16dc6b,2024-03-27T12:29:30.307000
@ -240202,7 +240205,7 @@ CVE-2024-21838,0,0,2e87184ffbd37f09fc02bbbce38359315ed0c01cd7f2541a39d089530736b
CVE-2024-2184,0,0,b7ea4f5ba4c2bd608dff608bfe2a87def706e3fb064d33fdd3c3733ae6e79e4b,2024-03-11T01:32:29.610000
CVE-2024-21840,0,0,ba783d6125c59c9321abeb19e4ad3c65376e311d48c8d637117e60a3ad69607f,2024-02-06T18:32:20.340000
CVE-2024-21845,0,0,c3c19550dac060de10c39d04cca7b66f65b34853e3fc2412b58fd540397606b8,2024-02-07T18:23:06.690000
CVE-2024-21848,1,1,4034ab55412051bd5498ab10b360fcb8e191d5ee68b1a2843a65c4f1c9ab4ae1,2024-04-05T09:15:09.017000
CVE-2024-21848,0,1,7a5c20e4b54cd22bcbafb7b3c75de756ff2f96e19251406e86ddab1348ece0ad,2024-04-05T12:40:52.763000
CVE-2024-21849,0,0,777d92a1c4bb7f79ad58de292d7b92c84e7bc7c1bbc5ad80d97c5d175c6259e9,2024-02-14T18:04:45.380000
CVE-2024-21851,0,0,854dd5d2aabc832591989b715d43ec08aeafe79b0e7fb2b7b8e58485d72989a1,2024-02-07T18:15:48.700000
CVE-2024-21852,0,0,3082fd3c592fa6da1ceb030e60633f5be1a3b7d2adb2434a27465175a4927608,2024-02-07T17:15:05.653000
@ -240222,7 +240225,7 @@ CVE-2024-21890,0,0,d0d6d1a152080740d6ba84ad392a919d70445665b25a7f6969e602652f189
CVE-2024-21891,0,0,e424ef0f7a416dd53e40d650cdce75de43c958a1f5dba4ec358496f75617d5f2,2024-03-15T11:15:08.753000
CVE-2024-21892,0,0,20e5acefe40d87bdcf0ddd06c773a67f885e875636f69c9336b01748da654b1a,2024-03-22T19:15:08.477000
CVE-2024-21893,0,0,8e30826f2f638f6b28dccfb70150ad8a33cc616c290d8b76095e5ee871803b64,2024-02-01T02:00:01.187000
CVE-2024-21894,0,0,2c2a0cfb64a28c521a5d401dd83f4046f41809ef6e3c15336e7ccdba4ed23297,2024-04-04T23:15:15.640000
CVE-2024-21894,0,1,9d561f5d68a88dbb0fe4b09146f8c0ec004a64c1ddb6725eb8bf0a7776a74734,2024-04-05T12:40:52.763000
CVE-2024-21896,0,0,19b337275b4c80290e30856ac5f19a33170bf79b2972a381de5433010e95582d,2024-03-29T13:15:14
CVE-2024-21899,0,0,688bbc85b9f5d15251f75737cd336d68aa458da265ba78cb33907c6eacd4fe61,2024-03-13T14:25:02.043000
CVE-2024-21900,0,0,e9e3bacd169a2499fbcf9944a7d36b5aa443f74334f0445e246d0d286dadb841,2024-03-13T14:24:02.157000
@ -240263,7 +240266,7 @@ CVE-2024-22019,0,0,f2437e68c6ddb8f7177f54a0e9f52e5ca8426b13996c7a8a6cfcbbb0d671c
CVE-2024-2202,0,0,830996a3e5b6be902d6f2e65d3759482285591493d041fcbf74113f66926d781,2024-03-25T01:51:01.223000
CVE-2024-22021,0,0,ba38d4b86a2c5af951f989c7a28594b6207f0b19739ba3d580be6e4d49001bfb,2024-02-29T01:44:04.690000
CVE-2024-22022,0,0,925c0d46bbd39b5d0f2644b5e26e0cd82488a20b7de7cccfa4639e9bb8f60d9e,2024-02-15T18:45:30.887000
CVE-2024-22023,0,0,3577df410797e367ce591a8450abe7916586f9d990d75d779fa2e2a673d5962f,2024-04-04T20:15:08.130000
CVE-2024-22023,0,1,a14daae4923791ad31d681c00afbf50ebb0f4d987cec3ae42ffd6ea2dc03c88f,2024-04-05T12:40:52.763000
CVE-2024-22024,0,0,980d44adebdc63cfe4985efd7aa2ee2044d33423093fc7c9f165c43f20a43115,2024-02-13T15:15:32.193000
CVE-2024-22025,0,0,61459addde8d883e2fba52001930c3fdd5c1e72e223ae9ae0e9157b1bc2b1032,2024-03-27T03:15:11.187000
CVE-2024-22027,0,0,0822e6ca4a0197c830c667319442a46ae27f8152642de8d7f05f1858eada021b,2024-01-18T20:02:46.993000
@ -240282,8 +240285,8 @@ CVE-2024-22048,0,0,ccec92a3265daf717c2bbbed7f0a34c57c44b3241b68cc37edd5bca0fad67
CVE-2024-22049,0,0,9b7359ed630e382551d4570c9533818edaca377c6778b42eef7546c62195794e,2024-01-23T19:15:08.283000
CVE-2024-22050,0,0,6cc1f5932c87c1ee4d5f0c22a81597d6852da9226b500ed6c316fab1f5f2b61b,2024-01-10T15:10:36.697000
CVE-2024-22051,0,0,351db93d6ca76e0dc0a7975efc553f9724406030c8337d111a27ec7033241658,2024-01-11T17:07:05.660000
CVE-2024-22052,0,0,14a4d768869c7a28971d2b2d04b0cf77c314f16631ff983678d9e73790ea25dd,2024-04-04T20:15:08.333000
CVE-2024-22053,0,0,4a596ffc7aaec783dbef5de90d68ac9881b9dea6109c03b8af42d8c2c9698fb6,2024-04-04T20:15:08.500000
CVE-2024-22052,0,1,5e2f4c08b3f4163dfe9e774d57a2db3d49d7eb216d47a5f7bb0aca6cb4eec961,2024-04-05T12:40:52.763000
CVE-2024-22053,0,1,7ecf5fef317ab73ad441d4089ec4b67bac87b1b3bf186e44d3cfa84a2302e11c,2024-04-05T12:40:52.763000
CVE-2024-22054,0,0,ea7f90611fdd0de53fc019330b39d133a7eda202c929c51b6ca495fd39ad0bf5,2024-03-04T02:15:16.820000
CVE-2024-2206,0,0,d5a4112d81b12c296cee2d4a4427b7935f710f4d11684daab2b2fb84c48f6bc9,2024-03-27T12:29:30.307000
CVE-2024-22075,0,0,e134c94ca50cfff14da7c6327f518dbd409e37e86810fc1b2a583012e3bdb9ef,2024-01-10T15:06:42.563000
@ -240470,7 +240473,7 @@ CVE-2024-2236,0,0,1caa0e5cdfb424662cbf6124414533e4ab1dd9ca210ea89ecd59ad25abc68f
CVE-2024-22360,0,0,dde3d7768ad1c8bc414b134384042470a384d3453ec0b0a0aa751c2a96e1b961,2024-04-03T17:24:18.150000
CVE-2024-22361,0,0,2cb34447b61b8680c66e6f142987700b31f9f16d4e9b8d748c59e5b8ad5a9a29,2024-02-16T21:35:31.953000
CVE-2024-22362,0,0,194d4da61fd0e172838ae5e875415deb5a10e6ec31fc18ececc7e4c5ad8228c4,2024-03-21T02:52:03.063000
CVE-2024-22363,0,0,a2fd052c0c680128839144798c1421a18aa4438b9681bf79d0004d695dacd4dd,2024-04-05T06:15:10.200000
CVE-2024-22363,0,1,f2093904f2c0c2583f88242c81aca179a42da115cdf994261e5d1b6c9758852a,2024-04-05T12:40:52.763000
CVE-2024-22365,0,0,b09f0e3dd0fc2bf60706805e33c1f78b209416e9ed2aa43cb1cfb00b1fe90d17,2024-02-14T00:27:40.143000
CVE-2024-22366,0,0,430ca6193adfaa0b9afcb94c1ccbb70fbf418a97a177252da5823216c0a609df,2024-01-30T22:15:32.033000
CVE-2024-22368,0,0,6b22b40b8e4884565fa5c7d8677cdf0e0ae6419db0baf589179542cd6fadbd26,2024-02-27T04:15:06.767000
@ -241085,6 +241088,7 @@ CVE-2024-23796,0,0,68b49052815222361e392dae7427245991f98ccb54551665c676eabfa56f8
CVE-2024-23797,0,0,88296fcabd0c62d23d6dc4d83f31f348234c406224d771d8c186bba7ca31c7dc,2024-02-13T19:21:42.603000
CVE-2024-23798,0,0,2cd5e41e302315de9e9135d604da2d70b7599d127c9a28288d56b32356a443e1,2024-02-13T19:21:49.827000
CVE-2024-23799,0,0,87474387c81d478806fb0844a22528b99032771880013f1769bf52de59e38674,2024-02-13T19:22:01.760000
CVE-2024-2380,1,1,9c51024d2b67cc435aaad0d9db16bc7c0ef7ca52b0001085e3a5ffd67b099be7,2024-04-05T13:15:07.973000
CVE-2024-23800,0,0,1219452dfbe476ca185cadc545cb6e1faf7967b99d4f45a73f3a0c41132a5b8f,2024-02-13T19:22:19.453000
CVE-2024-23801,0,0,75b12712cd23dd547e6f46d61312c143d26d1a1e7385a235203762e98c4f26c8,2024-02-13T19:22:25.110000
CVE-2024-23802,0,0,2a32b0e6c5f032ce10681625af798e5d1e36f4ff8cac4eb598f5f6d1a1d78fb2,2024-02-13T19:22:31.803000
@ -241359,7 +241363,7 @@ CVE-2024-2445,0,0,2f855bbcb84a342093922fd73320bfe19138d60313d23c629da4de19e559d7
CVE-2024-2446,0,0,42e5c66ebcf58bc3242675333cd3d5679a04b8d2c648c26027e5a47b9ff8b42a,2024-03-15T12:53:06.423000
CVE-2024-24468,0,0,2ffe0e787add87754da9d28139dd49fe0df5af62f9576796ac86e102fb215c8b,2024-02-07T22:03:09.897000
CVE-2024-24469,0,0,4f6c0d02ab780395cc2795972f5ccd070037d1f155bb48f88977ff7315e7ceab,2024-02-07T22:02:57.743000
CVE-2024-2447,1,1,a48cc78008d5334dfa13937b2dfd060f6e97d4807995da04c53d98553bc8065e,2024-04-05T09:15:09.860000
CVE-2024-2447,0,1,906e36be68bb3e3b54c27f29a8d05491b5e785fe002de5d733845b79907f4576,2024-04-05T12:40:52.763000
CVE-2024-24470,0,0,0ed64df001bff16a393bf92778dffdaa6681f7af33a9a33c77cdaa83290d7947,2024-02-06T21:07:34.547000
CVE-2024-24474,0,0,7ff84388b8a92907ef716e1ca2c29ef338e5f699b29d362e7b2c54bbc2735acd,2024-02-21T01:15:07.857000
CVE-2024-24475,0,0,da128c239114738663c22cbcb468c90723f598d143228b589356daf6901317f8,2024-02-21T01:15:07.890000
@ -241505,7 +241509,7 @@ CVE-2024-24786,0,0,4dc9334988f29d383874110c009efd994347fefdf817f6300d6c17c85e9cd
CVE-2024-2479,0,0,b512f9327eef1235a6ef71b4ddf8b5b87d57b4d3640a58dce1a34c5e174ab6a0,2024-03-21T02:52:34.570000
CVE-2024-24793,0,0,c02d48f5d574325816298b4b1d2848ca92f5dc7aa67a2fd30978e3885630bc1b,2024-02-20T19:50:53.960000
CVE-2024-24794,0,0,0d491c54da3b197a1321ac69102f9de79d058e3462ee7572209ea583555d837a,2024-02-20T19:50:53.960000
CVE-2024-24795,0,0,a0fb4134754f1b931405ad4725d371593b99e9d95b4becb51c162365d10beffb,2024-04-04T20:15:08.663000
CVE-2024-24795,0,1,80f6394441dfafaf02f24d20135aff9247904d9ab465f40c096785211238f225,2024-04-05T12:40:52.763000
CVE-2024-24796,0,0,a14eda4226a58c2c4e1be311d88c2631825b3dc125c63aa2226f772d7e85a358,2024-02-12T14:19:54.330000
CVE-2024-24797,0,0,c19a8ac8bc5c78a5206d6c6bb45c357c3a8b7076e1d1a067b2d060905019e0d6,2024-02-12T14:19:54.330000
CVE-2024-24798,0,0,27adaa65a015e65d65b2afdd5c0a25214a188429d30f4388b6afc3dde21fa6d1,2024-02-22T19:07:27.197000
@ -241640,6 +241644,7 @@ CVE-2024-24975,0,0,375565038c24fc327fc2c0a3c714946ca9e1c626fbb524a69b78744e6d3ea
CVE-2024-24976,0,0,05e50835253d405344bcce43c792303468cefdb2ef727462820c1e8401a1c574,2024-04-03T17:24:18.150000
CVE-2024-24988,0,0,5be9c22e9d6c42885be25053a8e3f832fee202eb91ce1cb05a36918eae761d1a,2024-02-29T13:49:29.390000
CVE-2024-24989,0,0,d97e7d59a888108ba0075e9a97f262f9ddf8641635a797a2d7dbde62ef345a25,2024-02-14T18:04:45.380000
CVE-2024-2499,1,1,8a6f5fdea855cf8d6c10df1c0b8ab45ca5a4fd19528655a57590bd6b5d827ee7,2024-04-05T13:15:08.177000
CVE-2024-24990,0,0,8460904a0a222feea20d2b8fa6ac812aab0f6e9d5924ea842cc9dfa3c9617545,2024-02-14T18:04:45.380000
CVE-2024-2500,0,0,f5c841f144cdfe7169c1d4e3da08b5dd9b9f87140741671656f61d60bd0ec54e,2024-03-22T12:45:36.130000
CVE-2024-25001,0,0,c1f11a8c76d43265d10cf34f1d6db6525f3220be11629d1b39a2f52375286f02,2024-02-02T09:15:37.527000
@ -241663,7 +241668,7 @@ CVE-2024-25081,0,0,c28ed534590feb1739659669df4a7c74247df29d1ac0d5daa9ed512959af8
CVE-2024-25082,0,0,0376e5832e39b19bc504b78433ebb158054a5715ce980118648e2b6c7f603eff,2024-03-23T03:15:11.393000
CVE-2024-25083,0,0,ecc895ce722780048524674e78ace2df40ec2c99910e00911749a5ffd9d0dca3,2024-02-16T21:39:50.223000
CVE-2024-25089,0,0,5efabd2c26974f37d1846cb1668b5b36df31dff51c549d5b8d4c512bfb0c7d05,2024-02-13T00:38:12.137000
CVE-2024-2509,0,0,e34a229d63bc84791384d23b01283323f1475cd5ed4d696c700df524b07d1dcb,2024-04-05T05:15:07.463000
CVE-2024-2509,0,1,e5ff08fec88fb147b1de99cec8e42cff61d51e229b4671aa8632ef1aeac3067d,2024-04-05T12:40:52.763000
CVE-2024-25091,0,0,01b357047b564e780ed13b7e87b2fb8ec79ae12ad4e744cc9437e3dc74a94964,2024-03-01T14:04:04.827000
CVE-2024-25093,0,0,c29d732f68144a1dd5d537415c8d51940073ac1e6ff114431aa6a52d78b263f0,2024-02-29T13:49:29.390000
CVE-2024-25094,0,0,6ba9f5c53aa4aac51446efc522144ae35e985d8a070a664685b43e0df39aa007,2024-02-29T13:49:29.390000
@ -242324,7 +242329,7 @@ CVE-2024-26318,0,0,5a8434e81e693bc0f90a66d9a6d8655df17a4e5f3f1f4a63075d970f5e64f
CVE-2024-2632,0,0,ea393f116b0cce8559537657b6b48805c98531cb8a651d292d9e39cc33b1c1ca,2024-03-19T13:26:46
CVE-2024-26327,0,0,ed8d19077e03f59789fd57e15d79ebd6fa2e85738782585f472f97265da3d970,2024-02-20T19:50:53.960000
CVE-2024-26328,0,0,483204e568c37ddd385ae6419587f3cba8922820a5f3e4626565041a8ff87314,2024-02-20T19:50:53.960000
CVE-2024-26329,0,0,abe0338d3180af0be53532b1668c2fb2a7dc77c306bc74aac5adb05a928048ec,2024-04-05T07:15:10.970000
CVE-2024-26329,0,1,61f5ce23611f085b03f5d098cc8be55618eca0c5c59bafee25a97403dd794491,2024-04-05T12:40:52.763000
CVE-2024-2633,0,0,d6d619ede14eb7136c8ee12cb2cd0efea8cc18b4fa44aa46ef5af23251d75954,2024-03-19T13:26:46
CVE-2024-26333,0,0,72ddcf1e5079d4095fb63f71d350456e693bb97135c81208eeffa24430bb0b2f,2024-03-05T13:41:01.900000
CVE-2024-26334,0,0,561e27fe6d2eae55228bd8cfd4e061bf762c84a8f4fc571dc41629b9250a54d4,2024-03-05T13:41:01.900000
@ -242634,10 +242639,10 @@ CVE-2024-26807,0,0,dd58971be5b2b7ae4d4d293dc140016766895ff28462656c96a25f4364a4b
CVE-2024-26808,0,0,811c6dcfe9e097a1e05a422eed27dc92a175aa2bf6a558020423935445f2e0d3,2024-04-04T12:48:22.650000
CVE-2024-26809,0,0,d8b70b9ed098155a50a0b82965aa5ef8be6d2e172d92379b17e564e5b8017a02,2024-04-04T12:48:22.650000
CVE-2024-2681,0,0,211b9a75c4368c46da39324b5885baab82086ddd4b191379e2bc3298587cc094,2024-03-21T02:52:42.143000
CVE-2024-26810,1,1,619461e7c161084dbce3405d57c92829428e68e5077dd6f12f741fa63c1ba5fe,2024-04-05T09:15:09.230000
CVE-2024-26812,1,1,a16f4ec13ccedd393f7841277e07984befb70b54a45d192608d189ddc454eaa9,2024-04-05T09:15:09.283000
CVE-2024-26813,1,1,be7dd918da8f885ffa1fdfa97ab2c9a28b6c6fe4e40508eea87dc59bb9ef1fb4,2024-04-05T09:15:09.340000
CVE-2024-26814,1,1,2ae796bc8d6711c6ab5953ca1946cf5304e495f4f0de3b5061a3b39de7ac3e14,2024-04-05T09:15:09.393000
CVE-2024-26810,0,1,38efc0e271ddc68cf77956d8ead6e6522daf46934f85727df3e802d5a57313d4,2024-04-05T12:40:52.763000
CVE-2024-26812,0,1,9d7026ebf11b448528088f214f842f936958cf9c929eb812614762d5a59c6f36,2024-04-05T12:40:52.763000
CVE-2024-26813,0,1,af4f2b053ee61ea2d2b7978accbda1976a2018d4986bdf351689365b94c98f84,2024-04-05T12:40:52.763000
CVE-2024-26814,0,1,faf3dfecf29bf595a382a75d07263a7b936c1f72070d1b90b4961ca213525430,2024-04-05T12:40:52.763000
CVE-2024-2682,0,0,a085f90f84cb4770a2a70d67fe3862306cc151ef177a765e07fccc3d6343039b,2024-03-21T02:52:42.233000
CVE-2024-2683,0,0,788c441aaf8a379a9ab516c0ce7daee2808d93b02ac7acef8c96a67609395231,2024-03-21T02:52:42.310000
CVE-2024-2684,0,0,5b5a341f7bbb8bdeccb5899b1d3a7c9eda23994ff0a4743b71e098a891662295,2024-03-21T02:52:42.383000
@ -242780,7 +242785,7 @@ CVE-2024-27305,0,0,b3f2edbf169d953c39bcc940e16d0680bda3e4c24593a205df513ed3ad926
CVE-2024-27307,0,0,0637b05d2a36e47d121bc1fe1beac809e09e2be90d0aa4c4cb901114110f37d2,2024-03-06T21:42:48.053000
CVE-2024-27308,0,0,2c1853ceb0d45fb092e9c133d6553571b7b9f8a855fc6b4950edbdaad595214f,2024-03-06T21:42:48.053000
CVE-2024-27315,0,0,1b06bd54abb4ee7969c3aca53e6bed402762ed42c4492d0ee8674e3fa0b42312,2024-02-28T15:15:09.670000
CVE-2024-27316,0,0,8385929768940a7e02cc85a622a9931384f535f78ec65c9efcbd3e7cac582b97,2024-04-04T20:15:08.720000
CVE-2024-27316,0,1,f74760c26c990a740e0324824f0b675680e5de06987a970f7e8469d8bc15b083,2024-04-05T12:40:52.763000
CVE-2024-27317,0,0,4c274cf3230c0a934555f5c84dc2c211701c44c03ccbc45b4514969783da0dab,2024-03-13T12:33:51.697000
CVE-2024-27318,0,0,a3f0f72595f3809c797819f31508bb028083ad173f51faf5deddf5194d7af605,2024-03-30T02:15:08.007000
CVE-2024-27319,0,0,d6fe8be68b6b995886693969b0a488a73d70bd11aff8f81dff41640aa7a63508,2024-03-30T02:15:08.090000
@ -242815,14 +242820,14 @@ CVE-2024-27354,0,0,3ace96f0cae30cfccef0c08e69f46a230792c5572ff398d91aa2a719b3624
CVE-2024-27355,0,0,f69927749d318ce3d471850deb21bc77767a9c94b5f501be3a1713c1109a5c66,2024-03-21T02:52:19.970000
CVE-2024-27356,0,0,2464f4bdc7cd759969915038df7055199f0bd02c6d9b1a8ceb85c7588507e9ba,2024-02-27T14:20:06.637000
CVE-2024-27359,0,0,d9efe9852d793e4ebe4144d07c8562893d90ae6614ba783353ad624a692629dc,2024-02-26T16:32:25.577000
CVE-2024-27437,1,1,bda9c439214cca7315752c7e4c1d89e20a7e8bdbee0a1e19cad2d8dde55dbb93,2024-04-05T09:15:09.443000
CVE-2024-27437,0,1,6b8491015671cc826aad57b159844f246e0ba09783b584677586c4dd72d60804,2024-04-05T12:40:52.763000
CVE-2024-27438,0,0,2aea60b4a1b2c2b9fbe16a013c293c52cf237fb88e8c577aa1b3bbbfc664d4e7,2024-03-21T12:58:51.093000
CVE-2024-27439,0,0,124ffecc940e3b1aff5b6c15ba45628af60d45a457d4c32687f284efa16b3296,2024-03-19T13:26:46
CVE-2024-27440,0,0,f656cf3f867b554b4acbc17eee670f16835e4e41b3c8da203b1b487ef7d6f2b3,2024-03-13T12:33:51.697000
CVE-2024-27441,0,0,e840685b8600bbca2bd5265ffc2375dd0e1834727afca845fa72402578217a21,2024-03-13T15:15:52.083000
CVE-2024-27444,0,0,e4b72098e3b1a45c8b94b724b5aa67a3c5d7a627e3b85b33a53ae8fca137be64,2024-02-26T16:32:25.577000
CVE-2024-27447,0,0,0ad05b799b801710378617c3e979150b26491a5a3c175938d5888d52afd14aa3,2024-02-26T16:32:25.577000
CVE-2024-27448,0,0,be24d2577b4483025f569d831033ddf830d10a5290591dcc6bd6ba289f63fd5b,2024-04-05T06:15:10.263000
CVE-2024-27448,0,1,f81f5d795d2c514b1278f07b1bfac28be27d44388681ccc2d557339e34fe134c,2024-04-05T12:40:52.763000
CVE-2024-2745,0,0,21dd83e50808577458b12385abb6a5e6bc2a585cd70ef551295012e31869f5dd,2024-04-02T12:50:42.233000
CVE-2024-27454,0,0,6d3a09532b89ef204254e66da503964dcbafd450b5bdda0990f449d144c8e54b,2024-02-26T16:32:25.577000
CVE-2024-27455,0,0,2d941179924c9f77cb732b35f1b7b9f5792b70ca51de1e84f09167eb77852176,2024-03-26T16:15:12.263000
@ -242975,7 +242980,7 @@ CVE-2024-27965,0,0,f61123ce4029323df5e9d7b3d5861b1b78032137365817fb982ed2ce3f089
CVE-2024-27968,0,0,81cf818ff4c52a717cdd4ac78ff685291ab11ee5a0785fe2aaaed4be1173d92c,2024-03-21T19:47:03.943000
CVE-2024-27972,0,0,5f2a44ef4455f2392170f0062af4e1f33c4163a5c961cda58ad08221f3c689b8,2024-04-03T12:38:04.840000
CVE-2024-27974,0,0,c5d12161a6a294fb4d33a068888d07d2dec693f9073d8d47f06182bf4fe2779a,2024-03-18T12:38:25.490000
CVE-2024-27981,0,0,9b5a12843bd42fcdebdcb67b05505c9c782e5c81b48b126959ed335e973891c2,2024-04-04T23:15:15.837000
CVE-2024-27981,0,1,bca4d502eb0003b495c2e3eabf4c8b77f995ffb842787b13a54996fb18ec7ff9,2024-04-05T12:40:52.763000
CVE-2024-27986,0,0,221ac31a72264e8303bc0dc716d0bcad27f92aa2e3b64824247f9d02601983b8,2024-03-14T12:52:09.877000
CVE-2024-27987,0,0,457341cfe208a4dd4f1ca3a12fe23df96b337000dbd585aed58689be29e5bec4,2024-03-15T12:53:06.423000
CVE-2024-27993,0,0,4178545ce3cee5131bcc85417ac208f6615c9c5305016cf5248ec96a71c28f2b,2024-03-21T15:24:35.093000
@ -243334,7 +243339,7 @@ CVE-2024-28916,0,0,84c072546ea410ea13293f0749492a9c6fc43f88cd890d2ffd9bf253bd04a
CVE-2024-2892,0,0,68731cecf8a220eab24c534e33692124a7488fde840638ea320037b01630a7ff,2024-03-26T17:09:53.043000
CVE-2024-2893,0,0,63faf4ffcc4fb1d866004561f401a900492be39dd72829ee9d2ea13386dae33b,2024-03-27T12:29:41.530000
CVE-2024-2894,0,0,fe5793bc2f37c037f66adaaa9d347995617de1caef61563c1e61d5c7a1ea58be,2024-03-27T12:29:41.530000
CVE-2024-28949,1,1,e1b2e05a7bdf7038f29dd0d6b29a3c6d8008bcaa0e8b3bc61536543928ab0363,2024-04-05T09:15:09.497000
CVE-2024-28949,0,1,d59e9094e037f96ff4bc86b6cb6d10d8eb628a7e17d47b677dc979654662e8ff,2024-04-05T12:40:52.763000
CVE-2024-2895,0,0,4e78767633bce48ab1dc77c80a270eff03b05a18553fcf7f775b3399e9d28d88,2024-03-27T12:29:41.530000
CVE-2024-28951,0,0,c59d22693a6783914cb02db5be2e1a6f5b0c6277d54a6ec5614d046ef86ffa02,2024-04-02T12:50:42.233000
CVE-2024-2896,0,0,4ba95787c6889a3eb868a106c99e2b979e5226eabc78640ebaa42c934eab2ab2,2024-03-27T12:29:41.530000
@ -243365,7 +243370,7 @@ CVE-2024-29037,0,0,d14590394517ae3abb6cee2c5008c5f9a159ea7cb5e3f1665632e06ebb11a
CVE-2024-2904,0,0,ad94cde058aa186716aa9a9e0abda85712b8f6121542c812afe32aed48147ca1,2024-03-26T12:55:05.010000
CVE-2024-29041,0,0,062cd423858e5d93d3fcaca6dd38a28eee29d2cae2776de71c0c9845b66bbfc2,2024-03-26T12:55:05.010000
CVE-2024-29042,0,0,1acd40f3f2614341c5d235ab7d1243ecc16ed46461e3f61d34bea944cf83e729,2024-03-22T19:02:10.300000
CVE-2024-29049,0,0,e78e1e35594f3663bd8ea8d75f4f522d6e9d8a0da7f1b20a9db995d28eba4f15,2024-04-04T22:15:08.827000
CVE-2024-29049,0,1,97f1c31413368c53fe5ff54808ff292f8d59ee94d523491d590a05715711e4f2,2024-04-05T12:40:52.763000
CVE-2024-29057,0,0,1a7d236424310c38bf79fff65250ee548fa2fb68d692d6ba086f9244a484a161,2024-03-26T03:18:48.760000
CVE-2024-29059,0,0,d93ec606be992e55fa01c28ef1ad5d3cf38a06f675d6b6e016fe3fa040aeab38,2024-04-04T22:15:09.033000
CVE-2024-2906,0,0,7907d5a5cd3460f6f133374b708901f61c1d81fd1b49c6a2c33ea92916afc2fe,2024-03-26T17:09:53.043000
@ -243459,7 +243464,7 @@ CVE-2024-29202,0,0,2407457fd23b926dc515687b0bc64391303eb3a1899c8635138115822d248
CVE-2024-29203,0,0,132c3d83e906b655066bee1fc4d3f90e18def73beb9178e8cc6662be34f71a9c,2024-03-26T17:09:53.043000
CVE-2024-2921,0,0,c022f783cf261e367ca963516715cb4a81bead64a9c47249d0bf651e034f5912,2024-03-26T17:09:53.043000
CVE-2024-29216,0,0,59c06798795d05e391cdd301154441d31362295e800c3b46a2b7bd83a3e2dbc0,2024-03-25T13:47:14.087000
CVE-2024-29221,1,1,2f586d9fe2b7f2c29ef1c4cbe3cf77d28a6fba9f7916246ff73247bae23f244d,2024-04-05T09:15:09.680000
CVE-2024-29221,0,1,f2d1d960d4a048ea2d2f1110f82493b575c09a1c9952fc52354f28724a9b468d,2024-04-05T12:40:52.763000
CVE-2024-29225,0,0,ebfd9b0992193d61aef178f6206711ffe8f1fc7ffd12fdaca779e58e62421cb3,2024-04-04T12:48:41.700000
CVE-2024-29227,0,0,f6ae69390655a5f3b8c2022246ade0c8e664001b7471a757ba66feb751afa8e1,2024-03-28T12:42:56.150000
CVE-2024-29228,0,0,c25efa24257cb2397a0d93759c26652d6dbbd7283b577526be7a83acca6ea890,2024-03-28T12:42:56.150000
@ -243504,8 +243509,8 @@ CVE-2024-29374,0,0,dd275404ab360479a756d96aca2b6517b11bd3239b0ee4b1b68a18e9bbec3
CVE-2024-29375,0,0,38d62c5a230a5d1d6e302dab1df6776e74059ff78e9ec6d309012755deaa55f1,2024-04-04T12:48:41.700000
CVE-2024-2938,0,0,74cee8ddd44bab6f9e56f6f66215742d85b488aeba84c862b69365829e2e81e5,2024-03-27T12:29:30.307000
CVE-2024-29385,0,0,8759a5732499ce248301d7321fb10ac2a0ff45ccfb82ec638dc2ec07b266090d,2024-03-22T19:02:10.300000
CVE-2024-29386,0,0,90865f4630f6b94332bbcba4d50cd16db056d8c7fb60611a586a9b39591ef7b6,2024-04-04T20:15:08.837000
CVE-2024-29387,0,0,203be31a92de9eced9d51e0be589b4f7d2c836b6f39b6a6f484910d729a4a454,2024-04-04T20:15:08.920000
CVE-2024-29386,0,1,46150b3636ce7f0c25cb166967d8e2ffb59b578767fa72331e04f23b7ba93e5f,2024-04-05T12:40:52.763000
CVE-2024-29387,0,1,64dc77a900c3b36a10f003711c44947a360d31708081f08c65915c82f4e2f15d,2024-04-05T12:40:52.763000
CVE-2024-2939,0,0,da1b78713b2ffab9e788aedae3466ad09fc771d3ff8f225a843c9a7dc25c77cd,2024-03-27T12:29:30.307000
CVE-2024-2940,0,0,1b204d3a7a2103faf20c302c00f4324f89ed0d30301919cb0f9e11008a4cbcf9,2024-03-27T12:29:30.307000
CVE-2024-29401,0,0,679ee7eb07f94632974ee3a3d5e9f1f36658f780199e198816f5b2401b4eaa19,2024-03-26T17:09:53.043000
@ -243547,7 +243552,7 @@ CVE-2024-29644,0,0,39829980cc0c3cec42e83f1a7d1e74f651bed504f90005be4e46042a91527
CVE-2024-29650,0,0,8ad374bfabee755625e57dff59b85656db535734df280985070b11f8f0b8c3b6,2024-03-25T16:43:06.137000
CVE-2024-29666,0,0,a8926fce030310567330d9b7c126003f732556a2ce979a6a3fd232707f8bbd99,2024-03-26T12:55:05.010000
CVE-2024-29667,0,0,1425649af0fe5303ac647a61948436bd641374e6a3c12789edb4485c777699d5,2024-04-01T01:12:59.077000
CVE-2024-29672,0,0,6d7c3144a7c4f0335a7d56a16d1b970f3c8dfd1e397b4170b5f91cc4aa856463,2024-04-05T06:15:10.323000
CVE-2024-29672,0,1,776eb07524d64e6e5cc2e229f34f0dd803ed0649383c6a95c6b77a4d3423b9d6,2024-04-05T12:40:52.763000
CVE-2024-2968,0,0,bb1433aeb37408aced09cd0721b3e3c51d5f43d4ee9668f91f68b12504b22dc7,2024-03-29T12:45:02.937000
CVE-2024-29684,0,0,cda7b88ce861488cce375da0c97c96f4e8ca98f9272907d42a882870472a7fa4,2024-03-26T17:09:53.043000
CVE-2024-29686,0,0,3fe58549e83b02ecfa4305dc0559466a6aba26f966980b7f6cfaa89fef3c5836,2024-04-01T02:15:07.663000
@ -243626,7 +243631,7 @@ CVE-2024-29858,0,0,ec21ad079a83cd076ada45f6eaa6cdca3318bb07ab260d892702dff1f9c09
CVE-2024-29859,0,0,1a3bc8759fdc8c10e013f96dddd14f2ff64d6c749aade8e9054f9e130df1726e,2024-03-21T12:58:51.093000
CVE-2024-2986,0,0,2e8b76dcc13c2c0ef53bfba5513dd96506aae0980f1810e28f63c6a33c67f33f,2024-03-27T17:48:21.140000
CVE-2024-29862,0,0,a716ba813aa67ee5575393b9d0a0602e3eeaba0f3c15482bf8b9bf774b2f14bb,2024-03-21T12:58:51.093000
CVE-2024-29863,0,0,464d1b384d2a13b48267b12cb30c1c0bb3380f5fff95f7b0465f3639fc2cc0f1,2024-04-05T07:15:11.110000
CVE-2024-29863,0,1,388618c2b783009f36afce6af0c89975a6bf81e4406d69131389d902724e5763,2024-04-05T12:40:52.763000
CVE-2024-29864,0,0,a6ff60d6eca0eec860cad03d4ebcf6ddb2a8ce1d06f7fbda3179547925ea7c1b,2024-03-21T12:58:51.093000
CVE-2024-29865,0,0,c71ea820e322882cfd10f1c29db59e00803f8a609d75b87f5e2466dff384d5b6,2024-03-22T15:34:43.663000
CVE-2024-29866,0,0,2169c0f3fed16be1069cbb5502128dfabe18fe6fbc7db4f274cc3c93caea8ddd,2024-03-21T15:24:35.093000
@ -243707,7 +243712,7 @@ CVE-2024-2995,0,0,ba31d4fdf46a8e9145ed5495217455e3d9072a2ebb94ae2fda6621c0845110
CVE-2024-2996,0,0,0b0c96cd4401e8e1fb8060c81f23c89572ad9b0c24303b77f9fc9c7260b30593,2024-03-28T02:01:13.303000
CVE-2024-2997,0,0,c25a0bbfb8b81ba4a7609ce1db6b052bf0c441b86ae99d5b115f9aed54aacfaa,2024-03-28T02:01:13.303000
CVE-2024-2998,0,0,5681a062ccdd5a830be0384ff482de7d54d630b9f9b97e51bbdaf99053da129c,2024-03-28T02:01:13.303000
CVE-2024-29981,0,0,888b77e83dcf240e93a379474f69e048d7dea25488489d8826c8450b166b5347,2024-04-04T22:15:09.153000
CVE-2024-29981,0,1,740b7a7428b7d8c9d6ce59873e24813d3664bb9de131e85953b6bdbd8bbce47c,2024-04-05T12:40:52.763000
CVE-2024-2999,0,0,80ecdff89fed5b636507b4867b9a819cb9159e93542975d19d9e3f967fe6eba6,2024-03-28T02:01:13.303000
CVE-2024-3000,0,0,f99d838672e9d5c2290539736a593838bb67e89cbadb925e87e0aba821826952,2024-03-28T02:01:13.303000
CVE-2024-3001,0,0,d9a538358fb1081709849ee14267762e99c97d14b00ed634db4923647ee7e3e9,2024-03-28T02:01:13.303000
@ -243788,14 +243793,14 @@ CVE-2024-30249,0,0,b5eba21814438c4e1a3ef97e0a76f9c8e347b440d3e249ce46e1eae5ce64e
CVE-2024-30250,0,0,d4c91b52e7ce4c3826ebfe4b0506b29f2a92b911536de8645e4f5c4e45878370,2024-04-04T16:33:06.610000
CVE-2024-30252,0,0,b6d7c4bd509d9f0774d6943656971e4b68036813cf38ed2db60a8c1944b8cf86,2024-04-04T19:24:50.670000
CVE-2024-30254,0,0,ad69a53ab45fa2dd08c93eaad54ffdf163154de857f05b80a3b804e09305e630,2024-04-04T19:24:50.670000
CVE-2024-30255,0,0,f355c4bd77abaf21db6ca3c04f400ecb2a4ac2a3eaaf3cc8bff292612494f559,2024-04-04T20:15:08.983000
CVE-2024-30255,0,1,7a6027ee928c41155eb75584731055507a485cc638e26b6a9a3843b7b8e81c23,2024-04-05T12:40:52.763000
CVE-2024-30260,0,0,53a68ae353495c80d5d447e9dd64955bc7cded16cfb5e4994cb366d0b2f97411,2024-04-04T16:33:06.610000
CVE-2024-30261,0,0,f29558ae55bd6ca47bd5dfae867bb2008a3cd73d7f89b694daf87a66b35a249c,2024-04-04T16:33:06.610000
CVE-2024-30263,0,0,6a1f1d03e4b4892044b17a4441df6e18091902fb61c4e9453e9e248247a1e2bf,2024-04-04T19:24:50.670000
CVE-2024-30264,0,0,e5c928e81456ae849333596cfc53e15ae2d16cad862cca19a048df643395ed6d,2024-04-04T21:15:16.380000
CVE-2024-30264,0,1,a36afcbf82744a440a1fca3c8df613ac17f10025eaa77ba35cbe326ee3634d26,2024-04-05T12:40:52.763000
CVE-2024-30265,0,0,f6c1bebbf0f1dd21a5d850b0d285e56edc6e352a64c24f325fdadabccdfb42c9,2024-04-04T12:48:41.700000
CVE-2024-30266,0,0,d54283c3548d40ae157748dc50ebd3d7610cba8a4ef6358f6778ac8bb913f298,2024-04-04T16:33:06.610000
CVE-2024-30270,0,0,d8af92cca4c96f82cfb6c6d7c56e93aa27e0b045144d04b253835e3311c8b4bf,2024-04-04T21:15:16.577000
CVE-2024-30270,0,1,1d63c3afc5f402042a52c95204320e8698a660fcf024b4b1cd2dbe82419521bf,2024-04-05T12:40:52.763000
CVE-2024-3030,0,0,ed3d394560fc992f2a931197efacab6ed2b55fb06d9f3928dd0d9fc577ffe7d4,2024-04-04T12:48:41.700000
CVE-2024-30322,0,0,64e521cd60b942f55f264dd1b34a0063ca35d4db4eef121c1f7bc208aac4f7ab,2024-04-03T17:24:18.150000
CVE-2024-30323,0,0,e32fdd05c5f30f68cf1412b7e36fda0cb57a7690cef1889aa844a8506beb3ac4,2024-04-03T17:24:18.150000
@ -244012,7 +244017,7 @@ CVE-2024-30808,0,0,3edb296009dfb16a5061a2505986b3903e36250320b7a7a1ea6af0d775f58
CVE-2024-30809,0,0,40751d191f9ee13ea0defe4c96fc4834cb0c82544cd8de5e25d1d000018428a9,2024-04-02T20:31:58.463000
CVE-2024-3081,0,0,866ce1fc3c293e10fe34bf8200fad33ced51ccecfb774a7b3540f6fe2adb2cfa,2024-04-01T01:12:59.077000
CVE-2024-3084,0,0,c1c38fe5a209c672b804078473ede419a8e761fb44d3cb82a215c5c8a2e1ea16,2024-04-01T01:12:59.077000
CVE-2024-30849,1,1,4aabb9bd1031c9de63789df6a4eecf7c5eb5cf5b1d28121f46f8cb27e6112f78,2024-04-05T08:15:07.733000
CVE-2024-30849,0,1,7b5f44f857a491a504ba5c8594af0e6700798260b9e3192b0dae6774fedb652e,2024-04-05T12:40:52.763000
CVE-2024-3085,0,0,fded51d53dc12d3d7ee965d316f419f95e091e314414485b8200db89663fd527,2024-04-01T01:12:59.077000
CVE-2024-30858,0,0,16878632bf0dd21efb8a79fb907fb3fd610dae344e4207e4821dadfd05b70fba,2024-04-02T12:50:42.233000
CVE-2024-30859,0,0,07863108200ea1214b143e037da0e726261ba3163514cc96b0c60d438d3489a3,2024-04-02T12:50:42.233000
@ -244032,7 +244037,7 @@ CVE-2024-30871,0,0,d803e8a22e3cb0ffc63ce535e7477c16423f4c13198cbe4b49e5311fcca22
CVE-2024-30872,0,0,f945e56669ed547eb36a2b5a674eaf51c6f019a23fe630e2694f76da90849356,2024-04-01T15:53:18.060000
CVE-2024-3088,0,0,8e3ac933024cbca067c1e71fbcd05cd16f007cceadb9e395d1a7912e6d4c4a98,2024-04-01T01:12:59.077000
CVE-2024-3089,0,0,ecb913d4389f70cc5019c633a263616e8c2eb0cbfbc9caeb5e20ebcc84dd91c1,2024-04-01T01:12:59.077000
CVE-2024-30891,1,1,e12281cb1191ffa9096f2fd71c8ce450f0aa6b4ad8005e3588610e44c1c03829,2024-04-05T08:15:07.800000
CVE-2024-30891,0,1,6288187f9f60f4f25d31df7f5ef76e595bcc7f1b47451b55a9d9d5f34746252d,2024-04-05T12:40:52.763000
CVE-2024-3090,0,0,6efcf7101cc09e49c5b79d9f2d4752051b90babce57580f4f3b9d28367ffa945,2024-04-01T01:12:59.077000
CVE-2024-3091,0,0,4af5b5d1eaeb5dcee2b11f765f7e4e07712d76dbe9222ddb5cfc716c8e60d042,2024-04-01T01:12:59.077000
CVE-2024-3094,0,0,502febf68b0d02803300ecc80fd5edf81a987966a53e4a71d6dd7ef4cc670f65,2024-04-03T06:15:07.873000
@ -244060,6 +244065,7 @@ CVE-2024-31065,0,0,36c2c4ddfef551b3df9316a574430562ba7ec0ea51f9e5ecbfa0af993c794
CVE-2024-31080,0,0,2ca401fd0c1bed66d451d429c0a44a80ca91b5d5de868201fe057f3b492cfdf4,2024-04-04T16:33:06.610000
CVE-2024-31081,0,0,a153eccae067a2f8e03bacbf6acb5a809a5d5fedc66a88773d969612a36b423a,2024-04-04T16:33:06.610000
CVE-2024-31082,0,0,1a6d789846dce49d3862bee255d972938e0973085f31646705de1076cce206f9,2024-04-04T16:33:06.610000
CVE-2024-31083,1,1,caa3a4de00aa6cf9e253d952f8057265c0ceb3e7cfcf7603d13adec1810e7ff6,2024-04-05T12:40:52.763000
CVE-2024-31084,0,0,7e7f6ad60462c421140a8806edcef098f25e94de0014c2ff06256ca8e21d3894,2024-04-01T01:12:59.077000
CVE-2024-31085,0,0,159d63f28600902a854d5dada2c0b5fba89225c71015785af44f46e211303b47,2024-04-01T01:12:59.077000
CVE-2024-31087,0,0,add2066c1d5f1a4308c5f84501c183a9350a71ec462e958963303b4527a9777f,2024-04-01T01:12:59.077000
@ -244102,13 +244108,13 @@ CVE-2024-31140,0,0,8ac72cdd6b5f7f56e71e87459ff46ad8714fcc8b963def523c845a786f9f6
CVE-2024-3116,0,0,07e1280cec0acc3241084e2928dc995b883b3c79a61f023bec5928b4f884c12d,2024-04-04T16:33:06.610000
CVE-2024-3117,0,0,136fb5551ef6dfa1bf4e08424db43ed91a6bb8dd83f3d6ce39a5378e07bb201b,2024-04-01T01:12:59.077000
CVE-2024-3118,0,0,f6c34b2c6946d5fdb10aa55aa3b524d7a78d6b6fed9a90242c451ed5ef8e29f1,2024-04-01T01:12:59.077000
CVE-2024-31204,0,0,778ee2e514ae8409a34251ec0718428b19b33226c54155d49c58197316f49800,2024-04-04T21:15:16.773000
CVE-2024-31206,0,0,70d97487a50457fdcab2c2764b35210d26c9f34a06e50a16c35d54a406291451,2024-04-04T23:15:15.897000
CVE-2024-31204,0,1,d77d8a78ba72f2a1144250dcbd3aeb2b57d00c9418a1c9337730d8bd71684606,2024-04-05T12:40:52.763000
CVE-2024-31206,0,1,bd1cbc8a5901cc2b410cb59c86ef8c814546918b6efc52403de5ae308d36d9dc,2024-04-05T12:40:52.763000
CVE-2024-31207,0,0,d3876c49ae6a717d1d96886a61c00def756b07d67a7072af0e0c707139e9cb22,2024-04-04T16:33:06.610000
CVE-2024-31209,0,0,05d38da92090c630ce652bea70fb74ebd0e72d4aebc34edd452f84719c7d745a,2024-04-04T16:33:06.610000
CVE-2024-31210,0,0,6a68e2b347e546ed314c6dab4e2650330525d917ed609ef801f21d7d99ab70b2,2024-04-04T23:15:16.127000
CVE-2024-31211,0,0,0b15058289053aebd70a2cd0ee0261afe0048a2d30cb11e09f1019511cc1fed1,2024-04-04T23:15:16.333000
CVE-2024-31212,0,0,715d3b2218b5b0fe7089cfd9e66ac01fb8eb421d8519c3bc381247d44fbb7a36,2024-04-04T23:15:16.540000
CVE-2024-31210,0,1,0c3a74f1634842d277fcf52471d61be8d27ebe967ace4d479af8f65fffdace19,2024-04-05T12:40:52.763000
CVE-2024-31211,0,1,37f6ef15b9def8ff0d686fae9ad61ad1a082be15bc6a18f70a40cbfe15e962e2,2024-04-05T12:40:52.763000
CVE-2024-31212,0,1,bc73795c68873aacd12eddecc823b76392ffac886146f1dd814e2d43e468bb84,2024-04-05T12:40:52.763000
CVE-2024-31215,0,0,07f7af48d0999954ee8c150eeba531641360a8fad1af070d9e9675df4d3ed6e9,2024-04-04T16:33:06.610000
CVE-2024-3124,0,0,0636ee928c0356d73e2effbc159ce59d850c83e7a22c6ba92b3f50b98c28bb80,2024-04-01T15:53:18.060000
CVE-2024-3125,0,0,7c2049f0f2088c1a2b8c1e4ee00a5f848a0ae8a9d91f54f3eb97b0a3f7d4e8d6,2024-04-01T15:53:18.060000
@ -244135,7 +244141,7 @@ CVE-2024-3145,0,0,910eeb7fc8d864d7945418c0e4535b894388c19da07aa9b0f359cad540d768
CVE-2024-3146,0,0,c53d63ca526f35fd2250cfdb239f061e8b52186457f5fd4f6bc18a291d69a364,2024-04-02T12:50:42.233000
CVE-2024-3147,0,0,02625b405a9656dc1928c253c58a24946e5b9cb50ef47acb30b3a3a470e8efd5,2024-04-02T12:50:42.233000
CVE-2024-3148,0,0,da83dea91bd5fed523ca15df13db4100d62650319dcc492fed6d52171a819a8a,2024-04-02T12:50:42.233000
CVE-2024-31498,0,0,76b23ac689905bc2a9281513cf35e67dae5a9eba3661ce4f444119b6c633f27b,2024-04-04T23:15:16.743000
CVE-2024-31498,0,1,dbdfff68d351d6d87cb24a5ceff71e8a2890b85f17286eb00296e97541f537ef,2024-04-05T12:40:52.763000
CVE-2024-3151,0,0,dbc1fd34b22356e776c12a200bc45c40de5eea60ac1974d151d7c1d279b32bb4,2024-04-02T18:12:16.283000
CVE-2024-3160,0,0,f3860e2f9070e5e070adb0fe8ff153c3f84611a0ac253de8db1847a3b6990614,2024-04-02T12:50:42.233000
CVE-2024-3162,0,0,7209bf9b1b4a4f41543ae01bfd19e9aec1dd355164cd1434a8cb5548ea161c65,2024-04-03T12:38:04.840000
@ -244151,7 +244157,7 @@ CVE-2024-3204,0,0,a9dea1ca01b499632a34af3ee57c461ecd8a21787537da790c2ae8f833a611
CVE-2024-3205,0,0,b2f3ceb1bf38a09a954460b526a18eba5a5a22a0c7181b9f1de158755c6153d4,2024-04-03T12:38:04.840000
CVE-2024-3207,0,0,5c9ae7819818cf69391317769652edafe7eb5058db1623e7c6299d6d13471791,2024-04-03T12:38:04.840000
CVE-2024-3209,0,0,30868cdb47dd928f589dfe2abcfe897db3e1f5f5372f4956ca12525c6828bcc3,2024-04-03T12:38:04.840000
CVE-2024-3217,1,1,679d1c28c7be3c33a25056dfbdb8aa41d98bff972405e02ba4eb33f3cb0dab3b,2024-04-05T08:15:07.853000
CVE-2024-3217,0,1,4de075781ed27d9af99ed393e165df2d285dc08a6ed9934e378886c989fa51ff,2024-04-05T12:40:52.763000
CVE-2024-3218,0,0,2efa792f2f422ae3d499fd8bd729cdb1e057c75ae9cfbaccf7a66bc466210399,2024-04-03T12:38:04.840000
CVE-2024-3221,0,0,265e838721fb682684198a7086d104f84e57519a8c4d6ef772db38592eb6bf44,2024-04-03T12:38:04.840000
CVE-2024-3222,0,0,b37821a3e0768163f96b2bee06bee09f327b52e150bd3dc09c830a3634a1e6b2,2024-04-03T12:38:04.840000
@ -244177,12 +244183,12 @@ CVE-2024-3270,0,0,06803f1697053009ed748b01b78c6c9cfb2903b8272aa543347ffd9d7a62c6
CVE-2024-3272,0,0,32d3ad93a54dc7dcb0170715c810c40dd0605ff3f1d2f7f8a6ff591782374412,2024-04-05T05:15:07.580000
CVE-2024-3273,0,0,1ae2eaf61f98318aed8ff92c4b5febb2d8229962f8b7b2bc67bc40cbaea73f73,2024-04-05T05:15:07.747000
CVE-2024-3274,0,0,64bfe86321ec1e05b957bdddb515317b23c7b94e70b2d69aa950c222026c2d4b,2024-04-05T05:15:07.843000
CVE-2024-3296,0,0,166fd19b54c7f066a468db032b1192efadbbddbd2bd126df3550e4cdc8bb66bf,2024-04-04T16:33:06.610000
CVE-2024-3296,0,1,bcc39314c1e9f6d53aa0ccc8e7e7cac7c279f7f6ee5a27f19287b128ea2ed6c7,2024-04-05T12:15:37.777000
CVE-2024-3298,0,0,56186a0c5d2e3bcaa6b6bd1b394585c42533a8f19e8ba33fa08b025b47b84ed1,2024-04-04T16:33:06.610000
CVE-2024-3299,0,0,e27ead5ec50888cbdeacdd9f017ce3d5215207dea15a19473541db1dd6d943fd,2024-04-04T16:33:06.610000
CVE-2024-3311,0,0,aa7fc1deae3f232a19fb15f73746be3e8b5bdfb16344ac194a9778a38a36d502,2024-04-04T21:15:16.957000
CVE-2024-3314,0,0,92d4bf971d9d793b8beffddc0437396a7128d83d27097a782b33fe476e5a79c0,2024-04-04T21:15:17.203000
CVE-2024-3315,0,0,17d09e074eb10ede9f7c310480abb639bee1cdd7c753516a84c89a3dd7d1dc28,2024-04-04T21:15:17.430000
CVE-2024-3316,0,0,496578d334aeef18643bc7c87251f0adbce19e341ca837c7de563b8b7302373a,2024-04-04T22:15:09.420000
CVE-2024-3320,0,0,61949eb200cfcf307cf3670b344aa4460c284a0d1eb9c45cc5c9d9521bae735a,2024-04-05T00:15:08.147000
CVE-2024-3321,0,0,99daf7bab74755b93d5229da76327f6e1862554d58dff72b09f28543f99e3f0c,2024-04-05T01:15:51.747000
CVE-2024-3311,0,1,fdae3a838ab8d7960174e896ed4df4f0220eb58d7d9e06edfb8bc48c78cfd124,2024-04-05T12:40:52.763000
CVE-2024-3314,0,1,1bf793748b7ca2d665b157bc1b2bc90ac99fa8b35d4a0447ad9f365652349fa7,2024-04-05T12:40:52.763000
CVE-2024-3315,0,1,0420f58b267bbc99aea4d213036324de5dcedffd2eceb50b924a336f387693ef,2024-04-05T12:40:52.763000
CVE-2024-3316,0,1,1444bd7ef3d37273f79650663feec303d5173a142d9c7212c8d3d49e93eb50e1,2024-04-05T12:40:52.763000
CVE-2024-3320,0,1,95054a6af32d4d5be645ff1a865e77fad3dc94a1c0e3c1eb556113e9b46031a4,2024-04-05T12:40:52.763000
CVE-2024-3321,0,1,749354b1bf7d6ff99646046beb4c99e5e46cc0546c732c8138afab8d9cdc9733,2024-04-05T12:40:52.763000

Can't render this file because it is too large.