Auto-Update: 2024-04-22T16:00:38.206998+00:00

This commit is contained in:
cad-safe-bot 2024-04-22 16:03:27 +00:00
parent b014784987
commit dd5be71ccf
31 changed files with 689 additions and 105 deletions

View File

@ -0,0 +1,24 @@
{
"id": "CVE-2022-34560",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-04-22T15:15:46.420",
"lastModified": "2024-04-22T15:15:46.420",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "A cross-site scripting (XSS) vulnerability in PHPFox v4.8.9 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the History parameter."
}
],
"metrics": {},
"references": [
{
"url": "https://cwe.mitre.org/data/definitions/79.html",
"source": "cve@mitre.org"
},
{
"url": "https://mohammedshine.github.io/vulnresearch.html",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,24 @@
{
"id": "CVE-2022-34561",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-04-22T15:15:46.490",
"lastModified": "2024-04-22T15:15:46.490",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "A cross-site scripting (XSS) vulnerability in PHPFox v4.8.9 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the video description parameter."
}
],
"metrics": {},
"references": [
{
"url": "https://mohammedshine.github.io/vulnresearch.html",
"source": "cve@mitre.org"
},
{
"url": "https://v4.phpfox.com/",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,24 @@
{
"id": "CVE-2022-34562",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-04-22T15:15:46.540",
"lastModified": "2024-04-22T15:15:46.540",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "A cross-site scripting (XSS) vulnerability in PHPFox v4.8.9 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the status box."
}
],
"metrics": {},
"references": [
{
"url": "https://mohammedshine.github.io/vulnresearch.html",
"source": "cve@mitre.org"
},
{
"url": "https://v4.phpfox.com/",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,24 @@
{
"id": "CVE-2022-35503",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-04-22T15:15:46.590",
"lastModified": "2024-04-22T15:15:46.590",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Improper verification of a user input in Open Source MANO v7-v12 allows an authenticated attacker to execute arbitrary code within the LCM module container via a Virtual Network Function (VNF) descriptor. An attacker may be able execute code to change the normal execution of the OSM components, retrieve confidential information, or gain access other parts of a Telco Operator infrastructure other than OSM itself."
}
],
"metrics": {},
"references": [
{
"url": "http://osm.com",
"source": "cve@mitre.org"
},
{
"url": "https://osm.etsi.org/news-events/blog/83-cve-2022-35503-disclosure",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2023-38290",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-04-22T15:15:46.657",
"lastModified": "2024-04-22T15:15:46.657",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Certain software builds for the BLU View 2 and Sharp Rouvo V Android devices contain a vulnerable pre-installed app with a package name of com.evenwell.fqc (versionCode='9020801', versionName='9.0208.01' ; versionCode='9020913', versionName='9.0209.13' ; versionCode='9021203', versionName='9.0212.03') that allows local third-party apps to execute arbitrary shell commands in its context (system user) due to inadequate access control. No permissions or special privileges are necessary to exploit the vulnerability in the com.evenwell.fqc app. No user interaction is required beyond installing and running a third-party app. The vulnerability allows local apps to access sensitive functionality that is generally restricted to pre-installed apps, such as programmatically performing the following actions: granting arbitrary permissions (which can be used to obtain sensitive user data), installing arbitrary apps, video recording the screen, wiping the device (removing the user's apps and data), injecting arbitrary input events, calling emergency phone numbers, disabling apps, accessing notifications, and much more. The software build fingerprints for each confirmed vulnerable device are as follows: BLU View 2 (BLU/B131DL/B130DL:11/RP1A.200720.011/1672046950:user/release-keys, BLU/B131DL/B130DL:11/RP1A.200720.011/1663816427:user/release-keys, BLU/B131DL/B130DL:11/RP1A.200720.011/1656476696:user/release-keys, BLU/B131DL/B130DL:11/RP1A.200720.011/1647856638:user/release-keys) and Sharp Rouvo V (SHARP/VZW_STTM21VAPP/STTM21VAPP:12/SP1A.210812.016/1KN0_0_460:user/release-keys and SHARP/VZW_STTM21VAPP/STTM21VAPP:12/SP1A.210812.016/1KN0_0_530:user/release-keys). This malicious app starts an exported activity named com.evenwell.fqc/.activity.ClickTest, crashes the com.evenwell.fqc app by sending an empty Intent (i.e., having not extras) to the com.evenwell.fqc/.FQCBroadcastReceiver receiver component, and then it sends command arbitrary shell commands to the com.evenwell.fqc/.FQCService service component which executes them with \"system\" privileges."
}
],
"metrics": {},
"references": [
{
"url": "https://media.defcon.org/DEF%20CON%2031/DEF%20CON%2031%20presentations/Ryan%20Johnson%20Mohamed%20Elsabagh%20Angelos%20Stavrou%20-%20Still%20Vulnerable%20Out%20of%20the%20Box%20Revisiting%20the%20Security%20of%20Prepaid%20Android%20Carrier%20Devices.pdf",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2023-38291",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-04-22T15:15:46.710",
"lastModified": "2024-04-22T15:15:46.710",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "An issue was discovered in a third-party component related to ro.boot.wifimacaddr, shipped on devices from multiple device manufacturers. Various software builds for the following TCL devices (30Z and 10L) and Motorola devices (Moto G Pure and Moto G Power) leak the Wi-Fi MAC address to a system property that can be accessed by any local app on the device without any permissions or special privileges. Google restricted third-party apps from directly obtaining non-resettable device identifiers in Android 10 and higher, but in these instances they are leaked by a high-privilege process and can be obtained indirectly. The software build fingerprints for each confirmed vulnerable device are as follows: TCL A3X (TCL/A600DL/Delhi_TF:11/RKQ1.201202.002/vAAZ:user/release-keys, TCL/A600DL/Delhi_TF:11/RKQ1.201202.002/vAB3:user/release-keys, TCL/A600DL/Delhi_TF:11/RKQ1.201202.002/vAB7:user/release-keys, TCL/A600DL/Delhi_TF:11/RKQ1.201202.002/vABA:user/release-keys, TCL/A600DL/Delhi_TF:11/RKQ1.201202.002/vABM:user/release-keys, TCL/A600DL/Delhi_TF:11/RKQ1.201202.002/vABP:user/release-keys, and TCL/A600DL/Delhi_TF:11/RKQ1.201202.002/vABS:user/release-keys); TCL 10L (TCL/T770B/T1_LITE:10/QKQ1.200329.002/3CJ0:user/release-keys and TCL/T770B/T1_LITE:11/RKQ1.210107.001/8BIC:user/release-keys); Motorola Moto G Pure (motorola/ellis_trac/ellis:11/RRHS31.Q3-46-110-2/74844:user/release-keys, motorola/ellis_trac/ellis:11/RRHS31.Q3-46-110-7/5cde8:user/release-keys, motorola/ellis_trac/ellis:11/RRHS31.Q3-46-110-10/d67faa:user/release-keys, motorola/ellis_trac/ellis:11/RRHS31.Q3-46-110-13/b4a29:user/release-keys, motorola/ellis_trac/ellis:12/S3RH32.20-42-10/1c2540:user/release-keys, motorola/ellis_trac/ellis:12/S3RHS32.20-42-13-2-1/6368dd:user/release-keys, motorola/ellis_a/ellis:11/RRH31.Q3-46-50-2/20fec:user/release-keys, motorola/ellis_vzw/ellis:11/RRH31.Q3-46-138/103bd:user/release-keys, motorola/ellis_vzw/ellis:11/RRHS31.Q3-46-138-2/e5502:user/release-keys, and motorola/ellis_vzw/ellis:12/S3RHS32.20-42-10-14-2/5e0b0:user/release-keys); and Motorola Moto G Power (motorola/tonga_g/tonga:11/RRQ31.Q3-68-16-2/e5877:user/release-keys and motorola/tonga_g/tonga:12/S3RQS32.20-42-10-6/f876d3:user/release-keys). This malicious app reads from the \"ro.boot.wifimacaddr\" system property to indirectly obtain the Wi-Fi MAC address."
}
],
"metrics": {},
"references": [
{
"url": "https://media.defcon.org/DEF%20CON%2031/DEF%20CON%2031%20presentations/Ryan%20Johnson%20Mohamed%20Elsabagh%20Angelos%20Stavrou%20-%20Still%20Vulnerable%20Out%20of%20the%20Box%20Revisiting%20the%20Security%20of%20Prepaid%20Android%20Carrier%20Devices.pdf",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2023-38292",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-04-22T15:15:46.763",
"lastModified": "2024-04-22T15:15:46.763",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Certain software builds for the TCL 20XE Android device contain a vulnerable, pre-installed app with a package name of com.tct.gcs.hiddenmenuproxy (versionCode='2', versionName='v11.0.1.0.0201.0') that allows local third-party apps to programmatically perform a factory reset due to inadequate access control. No permissions or special privileges are necessary to exploit the vulnerability in the com.tct.gcs.hiddenmenuproxy app. No user interaction is required beyond installing and running a third-party app. The software build fingerprints for each confirmed vulnerable build are as follows: TCL/5087Z_BO/Doha_TMO:11/RP1A.200720.011/PB7I-0:user/release-keys and TCL/5087Z_BO/Doha_TMO:11/RP1A.200720.011/PB83-0:user/release-keys. This malicious app sends a broadcast intent to the exported com.tct.gcs.hiddenmenuproxy/.rtn.FactoryResetReceiver receiver component, which initiates a programmatic factory reset."
}
],
"metrics": {},
"references": [
{
"url": "https://media.defcon.org/DEF%20CON%2031/DEF%20CON%2031%20presentations/Ryan%20Johnson%20Mohamed%20Elsabagh%20Angelos%20Stavrou%20-%20Still%20Vulnerable%20Out%20of%20the%20Box%20Revisiting%20the%20Security%20of%20Prepaid%20Android%20Carrier%20Devices.pdf",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2023-38293",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-04-22T15:15:46.820",
"lastModified": "2024-04-22T15:15:46.820",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Certain software builds for the Nokia C200 and Nokia C100 Android devices contain a vulnerable, pre-installed app with a package name of com.tracfone.tfstatus (versionCode='31', versionName='12') that allows local third-party apps to execute arbitrary AT commands in its context (radio user) via AT command injection due to inadequate access control and inadequate input filtering. No permissions or special privileges are necessary to exploit the vulnerability in the com.tracfone.tfstatus app. No user interaction is required beyond installing and running a third-party app. The software build fingerprints for each confirmed vulnerable device are as follows: Nokia C200 (Nokia/Drake_02US/DRK:12/SP1A.210812.016/02US_1_080:user/release-keys and Nokia/Drake_02US/DRK:12/SP1A.210812.016/02US_1_040:user/release-keys) and Nokia C100 (Nokia/DrakeLite_02US/DKT:12/SP1A.210812.016/02US_1_270:user/release-keys, Nokia/DrakeLite_02US/DKT:12/SP1A.210812.016/02US_1_190:user/release-keys, Nokia/DrakeLite_02US/DKT:12/SP1A.210812.016/02US_1_130:user/release-keys, Nokia/DrakeLite_02US/DKT:12/SP1A.210812.016/02US_1_110:user/release-keys, Nokia/DrakeLite_02US/DKT:12/SP1A.210812.016/02US_1_080:user/release-keys, and Nokia/DrakeLite_02US/DKT:12/SP1A.210812.016/02US_1_050:user/release-keys). This malicious app sends a broadcast Intent to the receiver component named com.tracfone.tfstatus/.TFStatus. This broadcast receiver extracts a string from the Intent and uses it as an extra when it starts the com.tracfone.tfstatus/.TFStatusActivity activity component which uses the externally controlled string as an input to execute an AT command. There are two different injection techniques to successfully inject arbitrary AT commands to execute."
}
],
"metrics": {},
"references": [
{
"url": "https://media.defcon.org/DEF%20CON%2031/DEF%20CON%2031%20presentations/Ryan%20Johnson%20Mohamed%20Elsabagh%20Angelos%20Stavrou%20-%20Still%20Vulnerable%20Out%20of%20the%20Box%20Revisiting%20the%20Security%20of%20Prepaid%20Android%20Carrier%20Devices.pdf",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,24 @@
{
"id": "CVE-2023-38294",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-04-22T15:15:46.877",
"lastModified": "2024-04-22T15:15:46.877",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Certain software builds for the Itel Vision 3 Turbo Android device contain a vulnerable pre-installed app with a package name of com.transsion.autotest.factory (versionCode='7', versionName='1.8.0(220310_1027)') that allows local third-party apps to execute arbitrary shell commands in its context (system user) due to inadequate access control. No permissions or special privileges are necessary to exploit the vulnerability in the com.transsion.autotest.factory app. No user interaction is required beyond installing and running a third-party app. The vulnerability allows local apps to access sensitive functionality that is generally restricted to pre-installed apps, such as programmatically performing the following actions: granting arbitrary permissions (which can be used to obtain sensitive user data), installing arbitrary apps, video recording the screen, wiping the device (removing the user's apps and data), injecting arbitrary input events, calling emergency phone numbers, disabling apps, accessing notifications, and much more. The confirmed vulnerable software build fingerprints for the Itel Vision 3 Turbo device are as follows: Itel/F6321/itel-S661LP:11/RP1A.201005.001/GL-V92-20230105:user/release-keys, Itel/F6321/itel-S661LP:11/RP1A.201005.001/GL-V86-20221118:user/release-keys, Itel/F6321/itel-S661LP:11/RP1A.201005.001/GL-V78-20221101:user/release-keys, Itel/F6321/itel-S661LP:11/RP1A.201005.001/GL-V64-20220803:user/release-keys, Itel/F6321/itel-S661LP:11/RP1A.201005.001/GL-V61-20220721:user/release-keys, Itel/F6321/itel-S661LP:11/RP1A.201005.001/GL-V58-20220712:user/release-keys, and Itel/F6321/itel-S661LP:11/RP1A.201005.001/GL-V051-20220613:user/release-keys. This malicious app sends a broadcast Intent to the receiver component named com.transsion.autotest.factory/.broadcast.CommandReceiver with the path to a shell script that it creates in its scoped storage directory. Then the com.transsion.autotest.factory app will execute the shell script with \"system\" privileges."
}
],
"metrics": {},
"references": [
{
"url": "https://media.defcon.org/DEF%20CON%2031/DEF%20CON%2031%20presentations/Ryan%20Johnson%20Mohamed%20Elsabagh%20Angelos%20Stavrou%20-%20Still%20Vulnerable%20Out%20of%20the%20Box%20Revisiting%20the%20Security%20of%20Prepaid%20Android%20Carrier%20Devices.pdf",
"source": "cve@mitre.org"
},
{
"url": "https://security.tecno.com/SRC/blogdetail/99?lang=en_US",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2023-38295",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-04-22T15:15:46.937",
"lastModified": "2024-04-22T15:15:46.937",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Certain software builds for the TCL 30Z and TCL 10 Android devices contain a vulnerable, pre-installed app that relies on a missing permission that provides no protection at runtime. The missing permission is required as an access permission by components in various pre-installed apps. On the TCL 30Z device, the vulnerable app has a package name of com.tcl.screenrecorder (versionCode='1221092802', versionName='v5.2120.02.12008.1.T' ; versionCode='1221092805', versionName='v5.2120.02.12008.2.T'). On the TCL 10L device, the vulnerable app has a package name of com.tcl.sos (versionCode='2020102827', versionName='v3.2014.12.1012.B'). When a third-party app declares and requests the missing permission, it can interact with certain service components in the aforementioned apps (that execute with \"system\" privileges) to perform arbitrary files reads/writes in its context. An app exploiting this vulnerability only needs to declare and request the single missing permission and no user interaction is required beyond installing and running a third-party app. The software build fingerprints for each confirmed vulnerable device are as follows: TCL 10L (TCL/T770B/T1_LITE:11/RKQ1.210107.001/8BIC:user/release-keys) and TCL 30Z (TCL/4188R/Jetta_ATT:12/SP1A.210812.016/LV8E:user/release-keys, TCL/T602DL/Jetta_TF:12/SP1A.210812.016/vU5P:user/release-keys, TCL/T602DL/Jetta_TF:12/SP1A.210812.016/vU61:user/release-keys, TCL/T602DL/Jetta_TF:12/SP1A.210812.016/vU66:user/release-keys, TCL/T602DL/Jetta_TF:12/SP1A.210812.016/vU68:user/release-keys, TCL/T602DL/Jetta_TF:12/SP1A.210812.016/vU6P:user/release-keys, and TCL/T602DL/Jetta_TF:12/SP1A.210812.016/vU6X:user/release-keys). This malicious app declares the missing permission named com.tct.smart.switchphone.permission.SWITCH_DATA as a normal permission, requests the missing permission, and uses it to interact with the com.tct.smart.switchdata.DataService service component that is declared in vulnerable apps that execute with \"system\" privileges to perform arbitrary file reads/writes."
}
],
"metrics": {},
"references": [
{
"url": "https://media.defcon.org/DEF%20CON%2031/DEF%20CON%2031%20presentations/Ryan%20Johnson%20Mohamed%20Elsabagh%20Angelos%20Stavrou%20-%20Still%20Vulnerable%20Out%20of%20the%20Box%20Revisiting%20the%20Security%20of%20Prepaid%20Android%20Carrier%20Devices.pdf",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2023-38296",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-04-22T15:15:46.990",
"lastModified": "2024-04-22T15:15:46.990",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Various software builds for the following TCL 30Z and TCL A3X devices leak the ICCID to a system property that can be accessed by any local app on the device without any permissions or special privileges. Google restricted third-party apps from directly obtaining non-resettable device identifiers in Android 10 and higher, but in these instances they are leaked by a high-privilege process and can be obtained indirectly. The software build fingerprints for each confirmed vulnerable device are as follows: TCL 30Z (TCL/4188R/Jetta_ATT:12/SP1A.210812.016/LV8E:user/release-keys, TCL/T602DL/Jetta_TF:12/SP1A.210812.016/vU5P:user/release-keys, TCL/T602DL/Jetta_TF:12/SP1A.210812.016/vU61:user/release-keys, TCL/T602DL/Jetta_TF:12/SP1A.210812.016/vU66:user/release-keys, TCL/T602DL/Jetta_TF:12/SP1A.210812.016/vU68:user/release-keys, TCL/T602DL/Jetta_TF:12/SP1A.210812.016/vU6P:user/release-keys, and TCL/T602DL/Jetta_TF:12/SP1A.210812.016/vU6X:user/release-keys) and TCL A3X (TCL/A600DL/Delhi_TF:11/RKQ1.201202.002/vAAZ:user/release-keys, TCL/A600DL/Delhi_TF:11/RKQ1.201202.002/vAB3:user/release-keys, TCL/A600DL/Delhi_TF:11/RKQ1.201202.002/vAB7:user/release-keys, TCL/A600DL/Delhi_TF:11/RKQ1.201202.002/vABA:user/release-keys, TCL/A600DL/Delhi_TF:11/RKQ1.201202.002/vABM:user/release-keys, TCL/A600DL/Delhi_TF:11/RKQ1.201202.002/vABP:user/release-keys, and TCL/A600DL/Delhi_TF:11/RKQ1.201202.002/vABS:user/release-keys). This malicious app reads from the \"persist.sys.tctPowerIccid\" system property to indirectly obtain the ICCID."
}
],
"metrics": {},
"references": [
{
"url": "https://media.defcon.org/DEF%20CON%2031/DEF%20CON%2031%20presentations/Ryan%20Johnson%20Mohamed%20Elsabagh%20Angelos%20Stavrou%20-%20Still%20Vulnerable%20Out%20of%20the%20Box%20Revisiting%20the%20Security%20of%20Prepaid%20Android%20Carrier%20Devices.pdf",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2023-38297",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-04-22T15:15:47.043",
"lastModified": "2024-04-22T15:15:47.043",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "An issue was discovered in a third-party com.factory.mmigroup component, shipped on devices from multiple device manufacturers. Certain software builds for various Android devices contain a vulnerable pre-installed app with a package name of com.factory.mmigroup (versionCode='3', versionName='2.1) that allows local third-party apps to perform various actions, due to inadequate access control, in its context (system user), but the functionalities exposed depend on the specific device. The following capabilities are exposed to zero-permission, third-party apps on the following devices: arbitrary AT command execution via AT command injection (T-Mobile Revvl 6 Pro 5G, T-Mobile Revvl V+ 5G, and Boost Mobile Celero 5G); programmatic factory reset (Samsung Galaxy A03S, T-Mobile Revvl 6 Pro 5G, T-Mobile Revvl V+ 5G, Boost Mobile Celero, Realme C25Y, and Lenovo Tab M8 HD), leaking IMEI (Samsung Galaxy A03S, T-Mobile Revvl 6 Pro 5G, T-Mobile Revvl V+ 5G, Boost Mobile Celero, and Realme C25Y); leaking serial number (Samsung Galaxy A03s, T-Mobile Revvl 6 Pro 5G, T-Mobile Revvl V+ 5G, Boost Mobile Celero, Realme C25Y, and Lenovo Tab M8 HD); powering off the device (Realme C25Y, Samsung Galaxy A03S, and T-Mobile Revvl 6 Pro 5G); and programmatically enabling/disabling airplane mode (Samsung Galaxy A03S, T-Mobile Revvl 6 Pro 5G, T-Mobile Revvl V+ 5G, Boost Mobile Celero, and Realme C25Y); and enabling Wi-Fi, Bluetooth, and GPS (Samsung Galaxy A03S, T-Mobile Revvl 6 Pro 5G, T-Mobile Revvl V+ 5G, Boost Mobile Celero, and Realme C25Y). No permissions or special privileges are necessary to exploit the vulnerabilities in the com.factory.mmigroup app. No user interaction is required beyond installing and running a third-party app. The software build fingerprints for each confirmed vulnerable device are as follows: Boost Mobile Celero 5G (Celero5G/Jupiter/Jupiter:11/RP1A.200720.011/SW_S98119AA1_V067:user/release-keys, Celero5G/Jupiter/Jupiter:11/RP1A.200720.011/SW_S98119AA1_V064:user/release-keys, Celero5G/Jupiter/Jupiter:11/RP1A.200720.011/SW_S98119AA1_V061:user/release-keys, and Celero5G/Jupiter/Jupiter:11/RP1A.200720.011/SW_S98119AA1_V052:user/release-keys); Samsung Galaxy A03S (samsung/a03sutfn/a03su:13/TP1A.220624.014/S134DLUDU6CWB6:user/release-keys and samsung/a03sutfn/a03su:12/SP1A.210812.016/S134DLUDS5BWA1:user/release-keys); Lenovo Tab M8 HD (Lenovo/LenovoTB-8505F/8505F:10/QP1A.190711.020/S300637_220706_BMP:user/release-keys and Lenovo/LenovoTB-8505F/8505F:10/QP1A.190711.020/S300448_220114_BMP:user/release-keys); T-Mobile Revvl 6 Pro 5G (T-Mobile/Augusta/Augusta:12/SP1A.210812.016/SW_S98121AA1_V070:user/release-keys and T-Mobile/Augusta/Augusta:12/SP1A.210812.016/SW_S98121AA1_V066:user/release-keys); T-Mobile Revvl V+ 5G (T-Mobile/Sprout/Sprout:11/RP1A.200720.011/SW_S98115AA1_V077:user/release-keys and T-Mobile/Sprout/Sprout:11/RP1A.200720.011/SW_S98115AA1_V060:user/release-keys); and Realme C25Y (realme/RMX3269/RED8F6:11/RP1A.201005.001/1675861640000:user/release-keys, realme/RMX3269/RED8F6:11/RP1A.201005.001/1664031768000:user/release-keys, realme/RMX3269/RED8F6:11/RP1A.201005.001/1652814687000:user/release-keys, and realme/RMX3269/RED8F6:11/RP1A.201005.001/1635785712000:user/release-keys). This malicious app sends a broadcast Intent to com.factory.mmigroup/.MMIGroupReceiver. This causes the com.factory.mmigroup app to dynamically register for various action strings. The malicious app can then send these strings, allowing it to perform various behaviors that the com.factory.mmigroup app exposes. The actual behaviors exposed by the com.factory.mmigroup app depend on device model and chipset. The com.factory.mmigroup app executes as the \"system\" user, allowing it to interact with the baseband processor and perform various other sensitive actions."
}
],
"metrics": {},
"references": [
{
"url": "https://media.defcon.org/DEF%20CON%2031/DEF%20CON%2031%20presentations/Ryan%20Johnson%20Mohamed%20Elsabagh%20Angelos%20Stavrou%20-%20Still%20Vulnerable%20Out%20of%20the%20Box%20Revisiting%20the%20Security%20of%20Prepaid%20Android%20Carrier%20Devices.pdf",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2023-38298",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-04-22T15:15:47.100",
"lastModified": "2024-04-22T15:15:47.100",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Various software builds for the following TCL devices (30Z, A3X, 20XE, 10L) leak the device IMEI to a system property that can be accessed by any local app on the device without any permissions or special privileges. Google restricted third-party apps from directly obtaining non-resettable device identifiers in Android 10 and higher, but in these instances they are leaked by a high-privilege process and can be obtained indirectly. The software build fingerprints for each confirmed vulnerable device are as follows: TCL 30Z (TCL/4188R/Jetta_ATT:12/SP1A.210812.016/LV8E:user/release-keys, TCL/T602DL/Jetta_TF:12/SP1A.210812.016/vU5P:user/release-keys, TCL/T602DL/Jetta_TF:12/SP1A.210812.016/vU61:user/release-keys, TCL/T602DL/Jetta_TF:12/SP1A.210812.016/vU66:user/release-keys, TCL/T602DL/Jetta_TF:12/SP1A.210812.016/vU68:user/release-keys, TCL/T602DL/Jetta_TF:12/SP1A.210812.016/vU6P:user/release-keys, and TCL/T602DL/Jetta_TF:12/SP1A.210812.016/vU6X:user/release-keys); TCL A3X (TCL/A600DL/Delhi_TF:11/RKQ1.201202.002/vAAZ:user/release-keys, TCL/A600DL/Delhi_TF:11/RKQ1.201202.002/vAB3:user/release-keys, TCL/A600DL/Delhi_TF:11/RKQ1.201202.002/vAB7:user/release-keys, TCL/A600DL/Delhi_TF:11/RKQ1.201202.002/vABA:user/release-keys, TCL/A600DL/Delhi_TF:11/RKQ1.201202.002/vABM:user/release-keys, TCL/A600DL/Delhi_TF:11/RKQ1.201202.002/vABP:user/release-keys, and TCL/A600DL/Delhi_TF:11/RKQ1.201202.002/vABS:user/release-keys); TCL 20XE (TCL/5087Z_BO/Doha_TMO:11/RP1A.200720.011/PB7I-0:user/release-keys and TCL/5087Z_BO/Doha_TMO:11/RP1A.200720.011/PB83-0:user/release-keys); and TCL 10L (TCL/T770B/T1_LITE:10/QKQ1.200329.002/3CJ0:user/release-keys and TCL/T770B/T1_LITE:11/RKQ1.210107.001/8BIC:user/release-keys). This malicious app reads from the \"gsm.device.imei0\" system property to indirectly obtain the device IMEI."
}
],
"metrics": {},
"references": [
{
"url": "https://media.defcon.org/DEF%20CON%2031/DEF%20CON%2031%20presentations/Ryan%20Johnson%20Mohamed%20Elsabagh%20Angelos%20Stavrou%20-%20Still%20Vulnerable%20Out%20of%20the%20Box%20Revisiting%20the%20Security%20of%20Prepaid%20Android%20Carrier%20Devices.pdf",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2023-38299",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-04-22T15:15:47.157",
"lastModified": "2024-04-22T15:15:47.157",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Various software builds for the AT&T Calypso, Nokia C100, Nokia C200, and BLU View 3 devices leak the device IMEI to a system property that can be accessed by any local app on the device without any permissions or special privileges. Google restricted third-party apps from directly obtaining non-resettable device identifiers in Android 10 and higher, but in these instances they are leaked by a high-privilege process and can be obtained indirectly. The software build fingerprints for each confirmed vulnerable device are as follows: AT&T Calypso (ATT/U318AA/U318AA:10/QP1A.190711.020/1632369780:user/release-keys); Nokia C100 (Nokia/DrakeLite_02US/DKT:12/SP1A.210812.016/02US_1_190:user/release-keys and Nokia/DrakeLite_02US/DKT:12/SP1A.210812.016/02US_1_270:user/release-keys); Nokia C200 (Nokia/Drake_02US/DRK:12/SP1A.210812.016/02US_1_080:user/release-keys); and BLU View 3 (BLU/B140DL/B140DL:11/RP1A.200720.011/1628014629:user/release-keys, BLU/B140DL/B140DL:11/RP1A.200720.011/1632535579:user/release-keys, BLU/B140DL/B140DL:11/RP1A.200720.011/1637325978:user/release-keys, BLU/B140DL/B140DL:11/RP1A.200720.011/1650073052:user/release-keys, BLU/B140DL/B140DL:11/RP1A.200720.011/1657087912:user/release-keys, BLU/B140DL/B140DL:11/RP1A.200720.011/1666316280:user/release-keys, and BLU/B140DL/B140DL:11/RP1A.200720.011/1672371162:user/release-keys). This malicious app reads from the \"persist.sys.imei1\" system property to indirectly obtain the device IMEI."
}
],
"metrics": {},
"references": [
{
"url": "https://media.defcon.org/DEF%20CON%2031/DEF%20CON%2031%20presentations/Ryan%20Johnson%20Mohamed%20Elsabagh%20Angelos%20Stavrou%20-%20Still%20Vulnerable%20Out%20of%20the%20Box%20Revisiting%20the%20Security%20of%20Prepaid%20Android%20Carrier%20Devices.pdf",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2023-38300",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-04-22T15:15:47.210",
"lastModified": "2024-04-22T15:15:47.210",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "A certain software build for the Orbic Maui device (Orbic/RC545L/RC545L:10/ORB545L_V1.4.2_BVZPP/230106:user/release-keys) leaks the IMEI and the ICCID to system properties that can be accessed by any local app on the device without any permissions or special privileges. Google restricted third-party apps from directly obtaining non-resettable device identifiers in Android 10 and higher, but in this instance they are leaked by a high-privilege process and can be obtained indirectly. This malicious app reads from the \"persist.sys.verizon_test_plan_imei\" system property to indirectly obtain the IMEI and reads the \"persist.sys.verizon_test_plan_iccid\" system property to obtain the ICCID."
}
],
"metrics": {},
"references": [
{
"url": "https://media.defcon.org/DEF%20CON%2031/DEF%20CON%2031%20presentations/Ryan%20Johnson%20Mohamed%20Elsabagh%20Angelos%20Stavrou%20-%20Still%20Vulnerable%20Out%20of%20the%20Box%20Revisiting%20the%20Security%20of%20Prepaid%20Android%20Carrier%20Devices.pdf",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2023-38301",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-04-22T15:15:47.257",
"lastModified": "2024-04-22T15:15:47.257",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "An issue was discovered in a third-party component related to vendor.gsm.serial, shipped on devices from multiple device manufacturers. Various software builds for the BLU View 2, Boost Mobile Celero 5G, Sharp Rouvo V, Motorola Moto G Pure, Motorola Moto G Power, T-Mobile Revvl 6 Pro 5G, and T-Mobile Revvl V+ 5G devices leak the device serial number to a system property that can be accessed by any local app on the device without any permissions or special privileges. Google restricted third-party apps from directly obtaining non-resettable device identifiers in Android 10 and higher, but in these instances they are leaked by a high-privilege process and can be obtained indirectly. The software build fingerprints for each confirmed vulnerable device are as follows: BLU View 2 (BLU/B131DL/B130DL:11/RP1A.200720.011/1672046950:user/release-keys); Boost Mobile Celero 5G (Celero5G/Jupiter/Jupiter:11/RP1A.200720.011/SW_S98119AA1_V067:user/release-keys); Sharp Rouvo V (SHARP/VZW_STTM21VAPP/STTM21VAPP:12/SP1A.210812.016/1KN0_0_530:user/release-keys); Motorola Moto G Pure (motorola/ellis_trac/ellis:11/RRHS31.Q3-46-110-2/74844:user/release-keys, motorola/ellis_trac/ellis:11/RRHS31.Q3-46-110-7/5cde8:user/release-keys, motorola/ellis_trac/ellis:11/RRHS31.Q3-46-110-10/d67faa:user/release-keys, motorola/ellis_trac/ellis:11/RRHS31.Q3-46-110-13/b4a29:user/release-keys, motorola/ellis_trac/ellis:12/S3RH32.20-42-10/1c2540:user/release-keys, motorola/ellis_trac/ellis:12/S3RHS32.20-42-13-2-1/6368dd:user/release-keys, motorola/ellis_a/ellis:11/RRH31.Q3-46-50-2/20fec:user/release-keys, motorola/ellis_vzw/ellis:11/RRH31.Q3-46-138/103bd:user/release-keys, motorola/ellis_vzw/ellis:11/RRHS31.Q3-46-138-2/e5502:user/release-keys, and motorola/ellis_vzw/ellis:12/S3RHS32.20-42-10-14-2/5e0b0:user/release-keys); Motorola Moto G Power (motorola/tonga_g/tonga:11/RRQ31.Q3-68-16-2/e5877:user/release-keys and motorola/tonga_g/tonga:12/S3RQS32.20-42-10-6/f876d3:user/release-keys); T-Mobile Revvl 6 Pro 5G (T-Mobile/Augusta/Augusta:12/SP1A.210812.016/SW_S98121AA1_V070:user/release-keys); and T-Mobile Revvl V+ 5G (T-Mobile/Sprout/Sprout:11/RP1A.200720.011/SW_S98115AA1_V077:user/release-keys). This malicious app reads from the \"vendor.gsm.serial\" system property to indirectly obtain the device serial number."
}
],
"metrics": {},
"references": [
{
"url": "https://media.defcon.org/DEF%20CON%2031/DEF%20CON%2031%20presentations/Ryan%20Johnson%20Mohamed%20Elsabagh%20Angelos%20Stavrou%20-%20Still%20Vulnerable%20Out%20of%20the%20Box%20Revisiting%20the%20Security%20of%20Prepaid%20Android%20Carrier%20Devices.pdf",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2023-38302",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-04-22T15:15:47.313",
"lastModified": "2024-04-22T15:15:47.313",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "A certain software build for the Sharp Rouvo V device (SHARP/VZW_STTM21VAPP/STTM21VAPP:12/SP1A.210812.016/1KN0_0_530:user/release-keys) leaks the Wi-Fi MAC address and the Bluetooth MAC address to system properties that can be accessed by any local app on the device without any permissions or special privileges. Google restricted third-party apps from directly obtaining non-resettable device identifiers in Android 10 and higher, but in this instance they are leaked by a high-privilege process and can be obtained indirectly. This malicious app reads from the \"ro.boot.wifi_mac\" system property to indirectly obtain the Wi-Fi MAC address and reads the \"ro.boot.bt_mac\" system property to obtain the Bluetooth MAC address."
}
],
"metrics": {},
"references": [
{
"url": "https://media.defcon.org/DEF%20CON%2031/DEF%20CON%2031%20presentations/Ryan%20Johnson%20Mohamed%20Elsabagh%20Angelos%20Stavrou%20-%20Still%20Vulnerable%20Out%20of%20the%20Box%20Revisiting%20the%20Security%20of%20Prepaid%20Android%20Carrier%20Devices.pdf",
"source": "cve@mitre.org"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-21011",
"sourceIdentifier": "secalert_us@oracle.com",
"published": "2024-04-16T22:15:15.437",
"lastModified": "2024-04-17T12:48:31.863",
"lastModified": "2024-04-22T15:15:47.380",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
@ -39,6 +39,10 @@
]
},
"references": [
{
"url": "https://lists.debian.org/debian-lts-announce/2024/04/msg00014.html",
"source": "secalert_us@oracle.com"
},
{
"url": "https://www.oracle.com/security-alerts/cpuapr2024.html",
"source": "secalert_us@oracle.com"

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-21012",
"sourceIdentifier": "secalert_us@oracle.com",
"published": "2024-04-16T22:15:15.617",
"lastModified": "2024-04-17T12:48:31.863",
"lastModified": "2024-04-22T15:15:47.473",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
@ -39,6 +39,10 @@
]
},
"references": [
{
"url": "https://lists.debian.org/debian-lts-announce/2024/04/msg00014.html",
"source": "secalert_us@oracle.com"
},
{
"url": "https://www.oracle.com/security-alerts/cpuapr2024.html",
"source": "secalert_us@oracle.com"

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-21068",
"sourceIdentifier": "secalert_us@oracle.com",
"published": "2024-04-16T22:15:25.307",
"lastModified": "2024-04-17T12:48:31.863",
"lastModified": "2024-04-22T15:15:47.540",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
@ -39,6 +39,10 @@
]
},
"references": [
{
"url": "https://lists.debian.org/debian-lts-announce/2024/04/msg00014.html",
"source": "secalert_us@oracle.com"
},
{
"url": "https://www.oracle.com/security-alerts/cpuapr2024.html",
"source": "secalert_us@oracle.com"

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-21085",
"sourceIdentifier": "secalert_us@oracle.com",
"published": "2024-04-16T22:15:28.293",
"lastModified": "2024-04-17T12:48:31.863",
"lastModified": "2024-04-22T15:15:47.610",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
@ -39,6 +39,10 @@
]
},
"references": [
{
"url": "https://lists.debian.org/debian-lts-announce/2024/04/msg00014.html",
"source": "secalert_us@oracle.com"
},
{
"url": "https://www.oracle.com/security-alerts/cpuapr2024.html",
"source": "secalert_us@oracle.com"

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-21094",
"sourceIdentifier": "secalert_us@oracle.com",
"published": "2024-04-16T22:15:29.857",
"lastModified": "2024-04-17T12:48:31.863",
"lastModified": "2024-04-22T15:15:47.683",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
@ -39,6 +39,10 @@
]
},
"references": [
{
"url": "https://lists.debian.org/debian-lts-announce/2024/04/msg00014.html",
"source": "secalert_us@oracle.com"
},
{
"url": "https://www.oracle.com/security-alerts/cpuapr2024.html",
"source": "secalert_us@oracle.com"

View File

@ -0,0 +1,32 @@
{
"id": "CVE-2024-27347",
"sourceIdentifier": "security@apache.org",
"published": "2024-04-22T14:15:07.310",
"lastModified": "2024-04-22T14:15:07.310",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Server-Side Request Forgery (SSRF) vulnerability in Apache HugeGraph-Hubble.This issue affects Apache HugeGraph-Hubble: from 1.0.0 before 1.3.0.\n\nUsers are recommended to upgrade to version 1.3.0, which fixes the issue.\n\n"
}
],
"metrics": {},
"weaknesses": [
{
"source": "security@apache.org",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-918"
}
]
}
],
"references": [
{
"url": "https://lists.apache.org/thread/z0v71148slfkw60hsp35pl7ddjyvg01l",
"source": "security@apache.org"
}
]
}

View File

@ -0,0 +1,24 @@
{
"id": "CVE-2024-27348",
"sourceIdentifier": "security@apache.org",
"published": "2024-04-22T14:15:07.420",
"lastModified": "2024-04-22T14:15:07.420",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "RCE-Remote Command Execution vulnerability in Apache HugeGraph-Server.This issue affects Apache HugeGraph-Server: from 1.0.0 before 1.3.0 in Java8 & Java11\n\nUsers are recommended to upgrade to version 1.3.0 with Java11 & enable the Auth system, which fixes the issue.\n\n"
}
],
"metrics": {},
"references": [
{
"url": "https://hugegraph.apache.org/docs/config/config-authentication/#configure-user-authentication",
"source": "security@apache.org"
},
{
"url": "https://lists.apache.org/thread/nx6g6htyhpgtzsocybm242781o8w5kq9",
"source": "security@apache.org"
}
]
}

View File

@ -0,0 +1,32 @@
{
"id": "CVE-2024-27349",
"sourceIdentifier": "security@apache.org",
"published": "2024-04-22T14:15:07.470",
"lastModified": "2024-04-22T14:15:07.470",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Authentication Bypass by Spoofing vulnerability in Apache HugeGraph-Server.This issue affects Apache HugeGraph-Server: from 1.0.0 before 1.3.0.\n\nUsers are recommended to upgrade to version 1.3.0, which fixes the issue.\n\n"
}
],
"metrics": {},
"weaknesses": [
{
"source": "security@apache.org",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-290"
}
]
}
],
"references": [
{
"url": "https://lists.apache.org/thread/dz9n9lndqfsf64t72o73r7sttrc6ocsd",
"source": "security@apache.org"
}
]
}

View File

@ -0,0 +1,28 @@
{
"id": "CVE-2024-28699",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-04-22T15:15:47.757",
"lastModified": "2024-04-22T15:15:47.757",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "A buffer overflow vulnerability in pdf2json v0.70 allows a local attacker to execute arbitrary code via the GString::copy() and ImgOutputDev::ImgOutputDev function."
}
],
"metrics": {},
"references": [
{
"url": "http://pdf2json.com",
"source": "cve@mitre.org"
},
{
"url": "https://github.com/flexpaper/pdf2json",
"source": "cve@mitre.org"
},
{
"url": "https://github.com/flexpaper/pdf2json/issues/52",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,24 @@
{
"id": "CVE-2024-32368",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-04-22T14:15:07.560",
"lastModified": "2024-04-22T14:15:07.560",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Insecure Permission vulnerability in Agasta Sanketlife 2.0 Pocket 12-Lead ECG Monitor FW Version 3.0 allows a local attacker to cause a denial of service via the Bluetooth Low Energy (BLE) component."
}
],
"metrics": {},
"references": [
{
"url": "https://en.wikipedia.org/wiki/Bluetooth_Low_Energy_denial_of_service_attacks/",
"source": "cve@mitre.org"
},
{
"url": "https://github.com/Yashodhanvivek/Agasta-SanketLife-2.0-ECG-Monitor_-Vulnerability/tree/main",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,47 @@
{
"id": "CVE-2024-3645",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-04-22T14:15:07.617",
"lastModified": "2024-04-22T14:15:07.617",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "The Essential Addons for Elementor Pro plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's Counter widget in all versions up to, and including, 5.8.11 due to insufficient input sanitization and output escaping on user supplied attributes such as 'title_html_tag'. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security@wordfence.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 6.4,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 3.1,
"impactScore": 2.7
}
]
},
"references": [
{
"url": "https://essential-addons.com/changelog/",
"source": "security@wordfence.com"
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/7fdad62e-d43a-4eb8-a637-0a257f3f18d4?source=cve",
"source": "security@wordfence.com"
}
]
}

View File

@ -2,12 +2,12 @@
"id": "CVE-2024-4021",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-04-21T10:15:06.963",
"lastModified": "2024-04-22T13:28:43.747",
"lastModified": "2024-04-22T15:15:47.813",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was found in Keenetic KN-1010, KN-1410, KN-1711, KN-1810 and KN-1910 up to 4.1.2.15. It has been declared as problematic. Affected by this vulnerability is an unknown functionality of the file /ndmComponents.js of the component Configuration Setting Handler. The manipulation leads to information disclosure. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-261673 was assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way."
"value": "A vulnerability was found in Keenetic KN-1010, KN-1410, KN-1711, KN-1810 and KN-1910 up to 4.1.2.15. It has been declared as problematic. Affected by this vulnerability is an unknown functionality of the file /ndmComponents.js of the component Configuration Setting Handler. The manipulation leads to information disclosure. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-261673 was assigned to this vulnerability. NOTE: The vendor is aware of this issue and plans to fix it by the end of 2024."
},
{
"lang": "es",

View File

@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update
```plain
2024-04-22T14:00:38.302736+00:00
2024-04-22T16:00:38.206998+00:00
```
### Most recent CVE Modification Timestamp synchronized with NVD
```plain
2024-04-22T13:28:50.310000+00:00
2024-04-22T15:15:47.813000+00:00
```
### Last Data Feed Release
@ -33,54 +33,48 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
### Total Number of included CVEs
```plain
246468
246491
```
### CVEs added in the last Commit
Recently added CVEs: `10`
Recently added CVEs: `23`
- [CVE-2024-22807](CVE-2024/CVE-2024-228xx/CVE-2024-22807.json) (`2024-04-22T12:15:07.240`)
- [CVE-2024-22808](CVE-2024/CVE-2024-228xx/CVE-2024-22808.json) (`2024-04-22T12:15:07.313`)
- [CVE-2024-22809](CVE-2024/CVE-2024-228xx/CVE-2024-22809.json) (`2024-04-22T12:15:07.370`)
- [CVE-2024-22811](CVE-2024/CVE-2024-228xx/CVE-2024-22811.json) (`2024-04-22T12:15:07.427`)
- [CVE-2024-22813](CVE-2024/CVE-2024-228xx/CVE-2024-22813.json) (`2024-04-22T12:15:07.497`)
- [CVE-2024-22815](CVE-2024/CVE-2024-228xx/CVE-2024-22815.json) (`2024-04-22T12:15:07.550`)
- [CVE-2024-22856](CVE-2024/CVE-2024-228xx/CVE-2024-22856.json) (`2024-04-22T12:15:07.610`)
- [CVE-2024-28717](CVE-2024/CVE-2024-287xx/CVE-2024-28717.json) (`2024-04-22T12:15:07.663`)
- [CVE-2024-29661](CVE-2024/CVE-2024-296xx/CVE-2024-29661.json) (`2024-04-22T12:15:07.720`)
- [CVE-2024-4026](CVE-2024/CVE-2024-40xx/CVE-2024-4026.json) (`2024-04-22T12:15:07.780`)
- [CVE-2022-34560](CVE-2022/CVE-2022-345xx/CVE-2022-34560.json) (`2024-04-22T15:15:46.420`)
- [CVE-2022-34561](CVE-2022/CVE-2022-345xx/CVE-2022-34561.json) (`2024-04-22T15:15:46.490`)
- [CVE-2022-34562](CVE-2022/CVE-2022-345xx/CVE-2022-34562.json) (`2024-04-22T15:15:46.540`)
- [CVE-2022-35503](CVE-2022/CVE-2022-355xx/CVE-2022-35503.json) (`2024-04-22T15:15:46.590`)
- [CVE-2023-38290](CVE-2023/CVE-2023-382xx/CVE-2023-38290.json) (`2024-04-22T15:15:46.657`)
- [CVE-2023-38291](CVE-2023/CVE-2023-382xx/CVE-2023-38291.json) (`2024-04-22T15:15:46.710`)
- [CVE-2023-38292](CVE-2023/CVE-2023-382xx/CVE-2023-38292.json) (`2024-04-22T15:15:46.763`)
- [CVE-2023-38293](CVE-2023/CVE-2023-382xx/CVE-2023-38293.json) (`2024-04-22T15:15:46.820`)
- [CVE-2023-38294](CVE-2023/CVE-2023-382xx/CVE-2023-38294.json) (`2024-04-22T15:15:46.877`)
- [CVE-2023-38295](CVE-2023/CVE-2023-382xx/CVE-2023-38295.json) (`2024-04-22T15:15:46.937`)
- [CVE-2023-38296](CVE-2023/CVE-2023-382xx/CVE-2023-38296.json) (`2024-04-22T15:15:46.990`)
- [CVE-2023-38297](CVE-2023/CVE-2023-382xx/CVE-2023-38297.json) (`2024-04-22T15:15:47.043`)
- [CVE-2023-38298](CVE-2023/CVE-2023-382xx/CVE-2023-38298.json) (`2024-04-22T15:15:47.100`)
- [CVE-2023-38299](CVE-2023/CVE-2023-382xx/CVE-2023-38299.json) (`2024-04-22T15:15:47.157`)
- [CVE-2023-38300](CVE-2023/CVE-2023-383xx/CVE-2023-38300.json) (`2024-04-22T15:15:47.210`)
- [CVE-2023-38301](CVE-2023/CVE-2023-383xx/CVE-2023-38301.json) (`2024-04-22T15:15:47.257`)
- [CVE-2023-38302](CVE-2023/CVE-2023-383xx/CVE-2023-38302.json) (`2024-04-22T15:15:47.313`)
- [CVE-2024-27347](CVE-2024/CVE-2024-273xx/CVE-2024-27347.json) (`2024-04-22T14:15:07.310`)
- [CVE-2024-27348](CVE-2024/CVE-2024-273xx/CVE-2024-27348.json) (`2024-04-22T14:15:07.420`)
- [CVE-2024-27349](CVE-2024/CVE-2024-273xx/CVE-2024-27349.json) (`2024-04-22T14:15:07.470`)
- [CVE-2024-28699](CVE-2024/CVE-2024-286xx/CVE-2024-28699.json) (`2024-04-22T15:15:47.757`)
- [CVE-2024-32368](CVE-2024/CVE-2024-323xx/CVE-2024-32368.json) (`2024-04-22T14:15:07.560`)
- [CVE-2024-3645](CVE-2024/CVE-2024-36xx/CVE-2024-3645.json) (`2024-04-22T14:15:07.617`)
### CVEs modified in the last Commit
Recently modified CVEs: `43`
Recently modified CVEs: `6`
- [CVE-2024-31994](CVE-2024/CVE-2024-319xx/CVE-2024-31994.json) (`2024-04-22T13:28:43.747`)
- [CVE-2024-32391](CVE-2024/CVE-2024-323xx/CVE-2024-32391.json) (`2024-04-22T13:28:50.310`)
- [CVE-2024-32392](CVE-2024/CVE-2024-323xx/CVE-2024-32392.json) (`2024-04-22T13:28:50.310`)
- [CVE-2024-32418](CVE-2024/CVE-2024-324xx/CVE-2024-32418.json) (`2024-04-22T13:28:43.747`)
- [CVE-2024-32652](CVE-2024/CVE-2024-326xx/CVE-2024-32652.json) (`2024-04-22T13:28:50.310`)
- [CVE-2024-32681](CVE-2024/CVE-2024-326xx/CVE-2024-32681.json) (`2024-04-22T13:28:34.007`)
- [CVE-2024-32682](CVE-2024/CVE-2024-326xx/CVE-2024-32682.json) (`2024-04-22T13:28:34.007`)
- [CVE-2024-32684](CVE-2024/CVE-2024-326xx/CVE-2024-32684.json) (`2024-04-22T13:28:34.007`)
- [CVE-2024-32687](CVE-2024/CVE-2024-326xx/CVE-2024-32687.json) (`2024-04-22T13:28:34.007`)
- [CVE-2024-32688](CVE-2024/CVE-2024-326xx/CVE-2024-32688.json) (`2024-04-22T13:28:34.007`)
- [CVE-2024-32690](CVE-2024/CVE-2024-326xx/CVE-2024-32690.json) (`2024-04-22T13:28:43.747`)
- [CVE-2024-32691](CVE-2024/CVE-2024-326xx/CVE-2024-32691.json) (`2024-04-22T13:28:34.007`)
- [CVE-2024-32693](CVE-2024/CVE-2024-326xx/CVE-2024-32693.json) (`2024-04-22T13:28:43.747`)
- [CVE-2024-32694](CVE-2024/CVE-2024-326xx/CVE-2024-32694.json) (`2024-04-22T13:28:43.747`)
- [CVE-2024-32695](CVE-2024/CVE-2024-326xx/CVE-2024-32695.json) (`2024-04-22T13:28:34.007`)
- [CVE-2024-32696](CVE-2024/CVE-2024-326xx/CVE-2024-32696.json) (`2024-04-22T13:28:34.007`)
- [CVE-2024-32697](CVE-2024/CVE-2024-326xx/CVE-2024-32697.json) (`2024-04-22T13:28:34.007`)
- [CVE-2024-32698](CVE-2024/CVE-2024-326xx/CVE-2024-32698.json) (`2024-04-22T13:28:34.007`)
- [CVE-2024-4014](CVE-2024/CVE-2024-40xx/CVE-2024-4014.json) (`2024-04-22T13:28:43.747`)
- [CVE-2024-4017](CVE-2024/CVE-2024-40xx/CVE-2024-4017.json) (`2024-04-22T13:28:50.310`)
- [CVE-2024-4018](CVE-2024/CVE-2024-40xx/CVE-2024-4018.json) (`2024-04-22T13:28:50.310`)
- [CVE-2024-4019](CVE-2024/CVE-2024-40xx/CVE-2024-4019.json) (`2024-04-22T13:28:43.747`)
- [CVE-2024-4020](CVE-2024/CVE-2024-40xx/CVE-2024-4020.json) (`2024-04-22T13:28:43.747`)
- [CVE-2024-4021](CVE-2024/CVE-2024-40xx/CVE-2024-4021.json) (`2024-04-22T13:28:43.747`)
- [CVE-2024-4022](CVE-2024/CVE-2024-40xx/CVE-2024-4022.json) (`2024-04-22T13:28:43.747`)
- [CVE-2024-21011](CVE-2024/CVE-2024-210xx/CVE-2024-21011.json) (`2024-04-22T15:15:47.380`)
- [CVE-2024-21012](CVE-2024/CVE-2024-210xx/CVE-2024-21012.json) (`2024-04-22T15:15:47.473`)
- [CVE-2024-21068](CVE-2024/CVE-2024-210xx/CVE-2024-21068.json) (`2024-04-22T15:15:47.540`)
- [CVE-2024-21085](CVE-2024/CVE-2024-210xx/CVE-2024-21085.json) (`2024-04-22T15:15:47.610`)
- [CVE-2024-21094](CVE-2024/CVE-2024-210xx/CVE-2024-21094.json) (`2024-04-22T15:15:47.683`)
- [CVE-2024-4021](CVE-2024/CVE-2024-40xx/CVE-2024-4021.json) (`2024-04-22T15:15:47.813`)
## Download and Usage

View File

@ -74569,7 +74569,7 @@ CVE-2015-10129,0,0,755c8f09711ccfe9e4e53a36625543ee62c2dfc1935932dc459f38bf8ed00
CVE-2015-1013,0,0,23f947ef2a14ceb5b694d30df996f8b07d473b30458159701da9568ed0c06853,2015-05-27T16:44:25.970000
CVE-2015-10130,0,0,c9cd0bb1902f6b2922598f4ff9cb0b2bc2845ec1c78759c0478a96b36f83ddfe,2024-03-13T12:33:51.697000
CVE-2015-10131,0,0,1fcef2b76049a886ad9d963ed69c1e4979e0a017d414b6472810d121d2773bc5,2024-04-11T00:53:09.873000
CVE-2015-10132,0,1,8ae829b9c9d5d828c39a8669dfcb3a6fd5cbf2b7bbed40061f48a96956867a6a,2024-04-22T13:28:43.747000
CVE-2015-10132,0,0,8ae829b9c9d5d828c39a8669dfcb3a6fd5cbf2b7bbed40061f48a96956867a6a,2024-04-22T13:28:43.747000
CVE-2015-1014,0,0,bcef1257ddc4c4f77cf21cd284e8ee72e8a135c6962181cd5a3131a49fdfdb96,2019-10-09T23:13:03.937000
CVE-2015-1015,0,0,956792c50ce2b78cf733dec45219e1d485d14d19c9547c307372ee3a9d399d12,2015-10-06T23:49:39.873000
CVE-2015-1026,0,0,267d1aaec4f9d9694d71557c2fea9d2ff75e1a7f8f7e8d82ae922091bfb48756,2018-10-09T19:55:41.077000
@ -121378,7 +121378,7 @@ CVE-2018-25097,0,0,347b569342894544d5b1688d12f00d8e5a46edd855e2fe6fe632b1cf81157
CVE-2018-25098,0,0,ffbf532e396af68d9e068e3d9067d9f3bdabbc916aa9126b3546a85a032e6693,2024-04-11T01:02:05.707000
CVE-2018-25099,0,0,4477c16cb5a3503e957873dbddbd3b50ffb7092ffd27acf2a352c93f686dfb7f,2024-03-18T12:38:25.490000
CVE-2018-25100,0,0,26375a09020100e722ed36e37b25c669512cdaa2d61a780ec73480ee78db5d6b,2024-03-25T01:51:01.223000
CVE-2018-25101,0,1,761fb6b9aead6e996134e5eb72fd41c720aa2aa6d48b025ce3bcec25d26934ab,2024-04-22T13:28:43.747000
CVE-2018-25101,0,0,761fb6b9aead6e996134e5eb72fd41c720aa2aa6d48b025ce3bcec25d26934ab,2024-04-22T13:28:43.747000
CVE-2018-2515,0,0,158f882e4275a7485a2b9ce17e7e57c4ea22cf74c55a78a9900c73a4caa327c0,2023-11-07T02:57:57.887000
CVE-2018-2560,0,0,0bb1a26d6c05fddeb488697adb0bbe667a3dd77c1a5bc7af495c8721df5b1197,2020-08-24T17:37:01.140000
CVE-2018-2561,0,0,b76feaa260e2f54fc8eeb8d50d578ffdd22b603f486ac4f8f5b3bc42df22fa45,2018-01-25T13:53:15.120000
@ -201083,6 +201083,9 @@ CVE-2022-34556,0,0,aa52f6a5c659c290c408772b18dca6a09cecaa0bdb0a91b6b28d35825dfdf
CVE-2022-34557,0,0,eecc8b4bc07828b9b1046bebce9f29c4e5bf4a70e8e91f5056094a302147e2b7,2022-08-04T13:13:11.320000
CVE-2022-34558,0,0,fbe60d47fc8f6f689dbf168e606cdea671312f94d428e8ee9c8ecf061888f6d0,2022-08-04T18:14:00.777000
CVE-2022-3456,0,0,b8ac2735d87fb3428674d1a6a5c18dac0738f373459ad6b97d466d7c80e95ab6,2022-10-14T09:18:29.033000
CVE-2022-34560,1,1,b55cb5c828e5583a11ca3a4377bdfff9143213d217c11ebd1aba49832034fc74,2024-04-22T15:15:46.420000
CVE-2022-34561,1,1,6ff737ce5dd95b8484fb56ed80160bad5d83dfd6174086db1f3a7926aed0847a,2024-04-22T15:15:46.490000
CVE-2022-34562,1,1,3c98fb7d1b9051d0be3b772c75b3c9c1f71ab7683738783501cc9506a757e9db,2024-04-22T15:15:46.540000
CVE-2022-34567,0,0,c7081cacbea5c4bf7e640ccd7be62566ef6f65f476c142672c62d14de0fec3d5,2022-08-09T15:16:01.133000
CVE-2022-34568,0,0,7d7e21cf0f762a871ae8e12be991913f168ecf5cf382ff57f18f7a6cb3db8140,2023-08-08T14:21:49.707000
CVE-2022-3457,0,0,9a924251aed79c69f1d1dd68238769c87841231341ac463480c5315265ce1509,2022-10-14T09:20:49.210000
@ -201901,6 +201904,7 @@ CVE-2022-35493,0,0,3fbd6e82bbdf46b2fc6829f415a2cc90121509376addf5102172805f20f63
CVE-2022-3550,0,0,756957ccd55359b7c0978f68036f94b6b7a1a89f37ba4fbd76e88b0c1375bad5,2023-11-07T03:51:25.593000
CVE-2022-35500,0,0,e4a3e6aaf78e4048d7dd258306698c8f6c2483fa0c0e3adbb5e1e15607e82bd5,2022-11-28T15:26:40.780000
CVE-2022-35501,0,0,0f02773590d7a16f97f67c931824c201f7e648389cd66dfda888e1343e91f455,2022-11-28T18:14:00.097000
CVE-2022-35503,1,1,6cdecfe2846d2a4d52545cfaf49f8fe98e440fc788ea055e5ace37dcc4a6e170,2024-04-22T15:15:46.590000
CVE-2022-35505,0,0,6c78edaa4497d167f87abd11a1b8b8aa506854460361fcf9259c1dc57318c246,2022-08-10T15:48:34.157000
CVE-2022-35506,0,0,43651b2bf00b655a27022bdb0fe35c1cce7134fb3dcfbf8b5fc5c0c25002da17,2023-08-08T14:22:24.967000
CVE-2022-35507,0,0,e86eac31135a1e76950fd89549b8296eb5af137be3ef8ade737d6ee342e0e457,2023-11-07T03:49:18.840000
@ -227292,7 +227296,20 @@ CVE-2023-38286,0,0,2ea40158ec9818cea2c111e32a6cdb85ffdb6be90a0776aa260b7c62e0143
CVE-2023-38288,0,0,4e09fe935b211d8976ac35865aa2db8a9a2746aebcba83a2a42f77442b554063,2023-11-07T04:17:14.293000
CVE-2023-38289,0,0,393a3d2cd00bfa282df8ba81ff2cfa497d880c900a7962bc261a38de402aa26a,2023-11-07T04:17:14.330000
CVE-2023-3829,0,0,11de827fa2f4f60302e922fe13b8c29fb210f9be0092546c6d8134dbf61befd4,2024-04-11T01:21:24.700000
CVE-2023-38290,1,1,aa472fc82c5846ff66a4e0e23621a1b6af992286e83c1a61a34d693aad663d4b,2024-04-22T15:15:46.657000
CVE-2023-38291,1,1,554e1de5dadfb116fd96cb5f4ed7396431b38933872662f42e8d4a880a80da2b,2024-04-22T15:15:46.710000
CVE-2023-38292,1,1,307d0a9e2716b1d27f922d855521a3704c436d9cb62756d765612eb013dba5da,2024-04-22T15:15:46.763000
CVE-2023-38293,1,1,6102d5113a1aa8f8f20810a6429122dd6894a6a27cc24e967811e40707d8efbe,2024-04-22T15:15:46.820000
CVE-2023-38294,1,1,921d3df24da36f28fc21d91b444a521c477a44c1b388ed9bc8459a64561d952d,2024-04-22T15:15:46.877000
CVE-2023-38295,1,1,78d0f56c9967f0236e1099c69001ccfeace035fd6786640e7bfdeae7cd850870,2024-04-22T15:15:46.937000
CVE-2023-38296,1,1,ff695827b1e7e67bc58c145f7a84a49e8cbce61602ce810e2673cc2c0872b943,2024-04-22T15:15:46.990000
CVE-2023-38297,1,1,0829990fa094439bb040922db90029644654b1d55f04db69ea5602758857d7cc,2024-04-22T15:15:47.043000
CVE-2023-38298,1,1,36ba6c90893f57cd9ca6ca4ea5d136bfce804e7129cd15fa9d73901368a8ba5a,2024-04-22T15:15:47.100000
CVE-2023-38299,1,1,d7adf4b6df80615c17353a0641b4697e179158c6dcb1ea1c29085b6b86a49fc9,2024-04-22T15:15:47.157000
CVE-2023-3830,0,0,6d4ec217426ee9a3638671ac0f4ede6d6db3b4f622b64762d45397337db875e2,2024-04-11T01:21:24.783000
CVE-2023-38300,1,1,06171492e338e0dc58404c19d789ad5ba20aa337ebdafff983dde72999086785,2024-04-22T15:15:47.210000
CVE-2023-38301,1,1,c0bb77f81d8615f98cc6b8a7492e34dd25c47568b5a2f14e975b785cd82c397d,2024-04-22T15:15:47.257000
CVE-2023-38302,1,1,434d7788bdd3a6f21e0ae9a99a6a89479147522a9c95deffb0aca138950d6cdf,2024-04-22T15:15:47.313000
CVE-2023-38303,0,0,12954e6b7d49a5b662e015224c39000c66a3dd29e3015d088530a37f229066c7,2023-08-04T03:55:50.193000
CVE-2023-38304,0,0,9e8d5aebcfc08be2edd64e8f958069ec67f79bd58d373fe39daf0d9a39b342c0,2023-08-04T03:55:41.383000
CVE-2023-38305,0,0,1b49c2ace31bafd75cb93967b9e97913e0b9652debcea0de2ad5fd5ce8ae20f9,2023-08-04T12:57:27.330000
@ -238303,7 +238320,7 @@ CVE-2023-7247,0,0,c2c23a7b7393abf86d5128d2c24b59326c78c84a35ee098ee0a06670d40df4
CVE-2023-7248,0,0,73545909515ba9da671114a339e1418b83b4c4cb1fae4d9763595cd55045ee5e,2024-03-17T22:38:29.433000
CVE-2023-7250,0,0,fa224a4f893e1e2e50282b2f218d1652024c983faf50d7c13dc5c8e5ec9643d3,2024-03-18T19:40:00.173000
CVE-2023-7251,0,0,73fa31f7b11a2c8f7785ccd98b3beff89a3869cfbe5b74910fb2dd1341267135,2024-03-26T12:55:05.010000
CVE-2023-7252,0,1,2392d7e3f3e585dc7390c0e965b0650ef11fa8ae2796aaf6e5db491d8ab57d29,2024-04-22T13:28:43.747000
CVE-2023-7252,0,0,2392d7e3f3e585dc7390c0e965b0650ef11fa8ae2796aaf6e5db491d8ab57d29,2024-04-22T13:28:43.747000
CVE-2024-0007,0,0,3bebeca11ed66b29340ad5b2f4a6fdda381d640f217ed7214dda7d3a471e9da1,2024-02-15T06:23:39.303000
CVE-2024-0008,0,0,db70626ccf03b2491d218a1d6d38cb10870a351e02a617fba1e6e23a0ac8502b,2024-02-15T06:23:39.303000
CVE-2024-0009,0,0,a481cbe6336f9e8c7286d10d3efcc3169667e3db231d83fec3fad506beda4652,2024-02-15T06:23:39.303000
@ -239137,7 +239154,7 @@ CVE-2024-1052,0,0,cf5f5c6bda7a4876cbb6b2b3fc9e6319f0131320e8b68a9cc322eb9aae6817
CVE-2024-1053,0,0,47a983161efc38cb28d2682fa08d2baacc5d0ed2824df2057fa217999f12681f,2024-02-22T19:07:27.197000
CVE-2024-1054,0,0,4b761a967a3f90222e01c654cbefb06554641e418df54cc7b5146c275adfa7cd,2024-02-29T13:49:29.390000
CVE-2024-1055,0,0,97a62a6617bb3b286c4d4b3643aeb8f78fad886ecdafdfd8b3366af9abaa25ad,2024-02-14T18:59:33.780000
CVE-2024-1057,0,1,bc2325bc6a68c0d44d023589d362ae89cc1ea47027a85188e1a7c73996460272,2024-04-22T13:28:43.747000
CVE-2024-1057,0,0,bc2325bc6a68c0d44d023589d362ae89cc1ea47027a85188e1a7c73996460272,2024-04-22T13:28:43.747000
CVE-2024-1058,0,0,80a5d2ee91b8c3ada73727957fcd82a05a735762aa11fd58991ea78d55e3405b,2024-02-29T13:49:29.390000
CVE-2024-1059,0,0,3ce9662c746bf2f12465a0b043cc52736ac7f03a00d65ac500ff02babc948f48,2024-02-05T20:50:26.783000
CVE-2024-1060,0,0,947f187e18fc5925a95a10d5904537b397d57987c304e13aa92944e395ef1895,2024-02-05T20:49:55.413000
@ -239493,7 +239510,7 @@ CVE-2024-1476,0,0,d66db5b934d457173411a6e7c87c116f96f98ca76565b282c78606f1c9c844
CVE-2024-1477,0,0,b1175a71510fd842138862374f281c1bda7457d7b234a1bf81a7a2fcce39bd63,2024-03-20T13:00:16.367000
CVE-2024-1478,0,0,54fc4d2d1af2d772e45f440cc01a56a5078a7b4f242f25febd2c561b4b9b409a,2024-03-05T13:41:01.900000
CVE-2024-1479,0,0,75eecf66dbf69c578ea2f09e6e564cdf3b04311a1ae51ea49bee3724800fe960,2024-03-13T18:15:58.530000
CVE-2024-1480,0,1,e3c7fd19d7fe5ff43bf6f873c1d14cb0985599390e4107b8a61532a5f296336d,2024-04-22T13:28:43.747000
CVE-2024-1480,0,0,e3c7fd19d7fe5ff43bf6f873c1d14cb0985599390e4107b8a61532a5f296336d,2024-04-22T13:28:43.747000
CVE-2024-1481,0,0,9be0fdcf57b38b07a109c4217cf66bb00129c047018ee84a1da402a4636338fe,2024-04-11T12:47:44.137000
CVE-2024-1482,0,0,61f1933d97f430ea5062371f54d100c6fb03c771024804bcdad5092bc2efbfc7,2024-02-15T06:23:39.303000
CVE-2024-1483,0,0,1ba808cb1c0d1fdcf5723092c3904b20d4561fdb7083f3ee67b919f5196c5851,2024-04-16T13:24:07.103000
@ -239636,7 +239653,7 @@ CVE-2024-1674,0,0,149a05d1fb99cd45cde6ef745b8b9b9e22a1fc2f3ec04b42f9d9bd60196bb1
CVE-2024-1675,0,0,5f30a51f6df64259307e988bc84d5a52725068543b1ac51c6e60eb38234537d5,2024-02-26T16:27:52.870000
CVE-2024-1676,0,0,75a25dbf1da186d6f531373499511171b06f00b3a04068d4f734276fb08847e7,2024-02-26T16:27:52.910000
CVE-2024-1680,0,0,84c54ffc4a845d72d977f64fd9e3463dea2e8084066506d86ea0b1690c435926,2024-03-13T18:15:58.530000
CVE-2024-1681,0,1,3b5cef338a5b7a2238d5f3f0d2714a3eaa87bd7549ada34fc64b5b0cc6b90679,2024-04-22T13:28:50.310000
CVE-2024-1681,0,0,3b5cef338a5b7a2238d5f3f0d2714a3eaa87bd7549ada34fc64b5b0cc6b90679,2024-04-22T13:28:50.310000
CVE-2024-1683,0,0,7ecd19ae06c69275a37eebb7fa2847d878a0b37ebed5f2352a74c546e33c1b09,2024-02-23T02:42:54.547000
CVE-2024-1684,0,0,fc25c96ed7c44e70ae89b409cf36671a8c2c9bfb5e5d2d52779f9f24c7b00664,2024-03-13T18:15:58.530000
CVE-2024-1685,0,0,8445feed0f23c24c027406dbf274ee8e68366861af592aeb58da42b6e5505410,2024-03-17T22:38:29.433000
@ -239671,7 +239688,7 @@ CVE-2024-1725,0,0,d50733b72e0a7510fad89b9c9b7bf0d2638e14767cb02af892440874a7d930
CVE-2024-1727,0,0,a7ba950431c841d63e5eda97447121909cf0b94a0e0f2a68d97b3e6ce11f4afe,2024-04-16T12:15:09.843000
CVE-2024-1728,0,0,cc77f96c808327822a9f33d38543fe59887a1a70be257d5713ef1082e9fb55b5,2024-04-10T19:49:51.183000
CVE-2024-1729,0,0,e89faa43e2aac352951c59ebd22691fbb83ea1dce43d3c94d1423497ec4f419a,2024-04-16T12:15:09.930000
CVE-2024-1730,0,1,857f57a206560b77c6429eac4dad94d05861663f6ac47a2ad01d2f946b8c2572,2024-04-22T13:28:43.747000
CVE-2024-1730,0,0,857f57a206560b77c6429eac4dad94d05861663f6ac47a2ad01d2f946b8c2572,2024-04-22T13:28:43.747000
CVE-2024-1731,0,0,821cb90315cb9f4f7918b214fe3fccab28c34a154536cc83cdd6334afe7fa34e,2024-03-05T13:41:01.900000
CVE-2024-1732,0,0,8ef28be53d93676ca4adde749fa15f7be0c9b44418d87a27465d25f0d08763cf,2024-04-02T12:50:42.233000
CVE-2024-1733,0,0,0a3bd094d039e642acfbaf43d971fa4ffe129283e1d81d79ef06d054dffc1500,2024-03-17T22:38:29.433000
@ -240335,8 +240352,8 @@ CVE-2024-21008,0,0,1f74aa2bfb98889c1bed8925030ffa9517c511fc8005172f7be9db4e39a2d
CVE-2024-21009,0,0,af97e37904620b744b697a7c41a38f3bc0333ea61492fd7779760f5a79950296,2024-04-17T12:48:31.863000
CVE-2024-2101,0,0,c8a12667f3958d332efb261f4cb3c420df5b094482122aff9dbb41fd78e244db,2024-04-17T12:48:07.510000
CVE-2024-21010,0,0,0583ed22b473d6988a741927f390c519f270906aef73a2591d45e4735fe791d0,2024-04-17T12:48:31.863000
CVE-2024-21011,0,0,eb1e002eb792c1edefdbc682f58918f8ed609b1d759ff3c7281bc1fb7586fb46,2024-04-17T12:48:31.863000
CVE-2024-21012,0,0,08bd1c5d80c822a07ef05058c8c1689725bb2942d1f830ff4c7187562f3fc06a,2024-04-17T12:48:31.863000
CVE-2024-21011,0,1,8f8c368ee3f30b65341b77ece082caabad559cb8815d7702ed7d6231b225272a,2024-04-22T15:15:47.380000
CVE-2024-21012,0,1,efcc536381b894205d2c997792afa24e2ccb5279bf98472cbea3d0304933b6da,2024-04-22T15:15:47.473000
CVE-2024-21013,0,0,db21600de0498200b832ed44aabc58eb8b49c1d4a8d6c8cec7db7074ddb629ed,2024-04-17T12:48:31.863000
CVE-2024-21014,0,0,b080b2efe5f2fb3649d836e7607fe2a15a5965b7e113573ba21bc7eaa39a2434,2024-04-17T12:48:31.863000
CVE-2024-21015,0,0,f3158fa1ebc013f3ee7e3704ac259afbfadb34d45c753fdc5d90a070e709ed84,2024-04-17T12:48:31.863000
@ -240395,7 +240412,7 @@ CVE-2024-21064,0,0,9f3d1dcc2da77fdbd8284a8907c4fea172ce50f42d0e165f15cd0a1ff6590
CVE-2024-21065,0,0,5c383c00c861b9299dc3d8d083a6c7b2ef320b710a4f76187481f80141c2960a,2024-04-17T12:48:31.863000
CVE-2024-21066,0,0,de5f164f54f519fa892c56099d5df7cc21033da5ed96c3454d6c06c478b93607,2024-04-17T12:48:31.863000
CVE-2024-21067,0,0,a54cc3b06c3985193c6346b3dbabf214dd2faeed68c1d4b7f9a909ecc6ea6d17,2024-04-17T12:48:31.863000
CVE-2024-21068,0,0,e7d9522ca13576b208b08d4fd425a3f59939f919c2e5396bbec32f828b318699,2024-04-17T12:48:31.863000
CVE-2024-21068,0,1,90b056284ac67c84f3312caa17843414162f46147b609efb3ab8bcab9df91c74,2024-04-22T15:15:47.540000
CVE-2024-21069,0,0,1356f0035f59f4ebe3cabf5fb137a1d458f1cefbb702a427e5d48bbf638d91b4,2024-04-17T12:48:31.863000
CVE-2024-2107,0,0,b116f601239eee1477d732dcdf4bd402d2ca5c711c20a89df0a8e9dd54cd4cd1,2024-03-13T12:33:51.697000
CVE-2024-21070,0,0,e8030e5c2290cb4930c1b97772fc5cd61f6499852535f41c7c876dacccf80408,2024-04-17T12:48:31.863000
@ -240414,7 +240431,7 @@ CVE-2024-21081,0,0,8525b7c574e97940ea59e5c3f9b60a1dccb8ad8d7a8590b7c7a54ff25a5e4
CVE-2024-21082,0,0,c26bfca8435f62f7a91a96e3ea3770988e364ed37b65c6e9e3c3fa331f2f9538,2024-04-17T12:48:31.863000
CVE-2024-21083,0,0,1bebe608617a7b6c263f2bd12f08aa2fed726df83e43e9cb80226396336525ef,2024-04-17T12:48:31.863000
CVE-2024-21084,0,0,1cb8a741188b441a8430ab8dada3a0d4db99599bc63794a25c2cddb40535089e,2024-04-17T12:48:31.863000
CVE-2024-21085,0,0,5c75a545bf417258ff0da52be43c2201a788dbf24bdb0529b936c35b6480cccb,2024-04-17T12:48:31.863000
CVE-2024-21085,0,1,7423bef7d293723948e7f7692336a4c4f435c8fc76c92741a8460985a7e7c3fc,2024-04-22T15:15:47.610000
CVE-2024-21086,0,0,6225dbda94f0cf6447c5470d5f742e2b6c9860df4608d2672fbec36d7710ddae,2024-04-17T12:48:31.863000
CVE-2024-21087,0,0,a583c55d3bff66d9e8b3ea3e82126959d82631d9ebff26ed8c89dc44f6423327,2024-04-17T12:48:31.863000
CVE-2024-21088,0,0,0b47b6e6f749e55fe17c53a0cff2705786e752e1ca3d888cedabbece54b4b377,2024-04-17T12:48:31.863000
@ -240423,7 +240440,7 @@ CVE-2024-21090,0,0,60f046f0a9c5304d80718309bd3f85c9cf0c6185072eb892eff16f11c4191
CVE-2024-21091,0,0,44e6366ed6ec2fbfb62bb3aa882742738c04c1e25886d4262fb2f0c2b7a75b22,2024-04-17T12:48:31.863000
CVE-2024-21092,0,0,a96f28afb2f79eb08be708f78284cdf08500da8888a0d9699ed9e4b0d6e8e593,2024-04-17T12:48:31.863000
CVE-2024-21093,0,0,3d565421d62fe80376ef2125e9dfb06fdc2a836fda042dda6ad1a1534f2a4f7d,2024-04-17T12:48:31.863000
CVE-2024-21094,0,0,876c177a2adf738a018a4a0fe587e5ffec332f3d1d0d3e57dfe45071b19b0a59,2024-04-17T12:48:31.863000
CVE-2024-21094,0,1,aa2a61960fd4fa521e8a1ca2553d138d7964c870b77a3be8a092c2a795bdfda4,2024-04-22T15:15:47.683000
CVE-2024-21095,0,0,5ad9583e4e50b36f664407f6f6164a53dc891483d679c27c4541f930caca17b4,2024-04-17T12:48:31.863000
CVE-2024-21096,0,0,ca67a44a0e0eaa923750522145c8947551bcd426be3766e54dffcdf25890c9ef,2024-04-17T12:48:31.863000
CVE-2024-21097,0,0,8349406a296787533db135239586ab1e354af73ee7e59b17b17098f82af1b697,2024-04-17T12:48:31.863000
@ -241305,13 +241322,13 @@ CVE-2024-22780,0,0,7f3239e2db375f765f90f52543bdbcccb2a20757a7cd068a76d9a55c97657
CVE-2024-2279,0,0,840779d3b8dde5a422cda59c3e85c02ce57b31f4846ea3c8574f9bd433ec61e7,2024-04-12T12:43:57.400000
CVE-2024-22795,0,0,74ecb133836626bb2368eab49a74768ea23b2ee0b898200b84b5a979cafed20f,2024-02-15T17:53:54.680000
CVE-2024-2280,0,0,b064f3feb8722910a4651d8fcd5aa5f1892c8cb4f5e0e1796b328260936ab591,2024-04-05T21:15:09.660000
CVE-2024-22807,1,1,8db10dd8e7cfd45827efc498f5083ae2402aa6183b07533b22eb0bba2fa8be6d,2024-04-22T13:28:34.007000
CVE-2024-22808,1,1,e892853d7e45804ff4b8420a14390907147a48d162272f56b22d86c13a952069,2024-04-22T13:28:34.007000
CVE-2024-22809,1,1,1213100fcc3141cd8a323799d748f199b5095fc96d6acfac253f1ba653ee3e62,2024-04-22T13:28:34.007000
CVE-2024-22807,0,0,8db10dd8e7cfd45827efc498f5083ae2402aa6183b07533b22eb0bba2fa8be6d,2024-04-22T13:28:34.007000
CVE-2024-22808,0,0,e892853d7e45804ff4b8420a14390907147a48d162272f56b22d86c13a952069,2024-04-22T13:28:34.007000
CVE-2024-22809,0,0,1213100fcc3141cd8a323799d748f199b5095fc96d6acfac253f1ba653ee3e62,2024-04-22T13:28:34.007000
CVE-2024-2281,0,0,f3438c7ab7641dd719863e24482dbf8314b67feb70036f1e8b4e26133f1de72b,2024-04-11T01:25:21.293000
CVE-2024-22811,1,1,780b24ab418fba23767e654465472b4e88d8b5068726c4c05b576b551f04b890,2024-04-22T13:28:34.007000
CVE-2024-22813,1,1,90f4ed95adc18ff58534e2fb72046185cb29c561cab34ca67286486b185aa98a,2024-04-22T13:28:34.007000
CVE-2024-22815,1,1,09b9b029e34aca0b588d70480e5c361cd6700cd278999cb9693d90ea2691b322,2024-04-22T13:28:34.007000
CVE-2024-22811,0,0,780b24ab418fba23767e654465472b4e88d8b5068726c4c05b576b551f04b890,2024-04-22T13:28:34.007000
CVE-2024-22813,0,0,90f4ed95adc18ff58534e2fb72046185cb29c561cab34ca67286486b185aa98a,2024-04-22T13:28:34.007000
CVE-2024-22815,0,0,09b9b029e34aca0b588d70480e5c361cd6700cd278999cb9693d90ea2691b322,2024-04-22T13:28:34.007000
CVE-2024-22817,0,0,eb15e92e9d0667f5c190034654618b8eeeb0dfc84cfb608c765282f0f5a04fcf,2024-01-23T14:23:18.990000
CVE-2024-22818,0,0,cb135bb8e203bf8edbad428e88de582fd5c2ab18516529aab641b2e535a51f86,2024-01-23T14:23:46.073000
CVE-2024-22819,0,0,0eb9b3434533fedaa8cbae17f2a15bb53110d617baacce71ff390d25b5e6cc78,2024-01-23T14:23:51.943000
@ -241325,7 +241342,7 @@ CVE-2024-22851,0,0,e3b3a4173f66bde18bcde8b4d6e07ed058612b81ace293aa36efd8837ff83
CVE-2024-22852,0,0,fba9226bfac500a19dd8b91a9788eed1682675a652e0b6dd1f0ee08e7df876f5,2024-02-13T18:16:51.790000
CVE-2024-22853,0,0,ec6a06bd931391a16658f5323e2bffe5ddc884df4aacc34598a685bd3979b258,2024-02-12T17:50:31.950000
CVE-2024-22854,0,0,8b8b90cd6c1c9786e2fb5396ca19284ddab9c4ff42eae4bf034495afa4860075,2024-02-16T13:37:51.433000
CVE-2024-22856,1,1,213d31904e80643bb407e6a04df4ca51d71b3d3c5fddca041bc06b4b94f6e837,2024-04-22T13:28:34.007000
CVE-2024-22856,0,0,213d31904e80643bb407e6a04df4ca51d71b3d3c5fddca041bc06b4b94f6e837,2024-04-22T13:28:34.007000
CVE-2024-22857,0,0,dc8c498662e053f2e9a39f301d349f3ad8950912cf2843180c278fecc58efab5,2024-04-19T01:15:06.297000
CVE-2024-22859,0,0,f21c1f55163f2e8148347c74f0ecf53a5beec677d1447140d631069d639d308a,2024-04-11T01:24:46.117000
CVE-2024-2286,0,0,657861131740076699183211e8ffc4b18c067668bfd7d2635b81e0ec9c54a21c,2024-03-13T18:15:58.530000
@ -241347,7 +241364,7 @@ CVE-2024-22900,0,0,254e082003561180ecd392f3a9c102fc841e1bde56aa59cbf964fe2817289
CVE-2024-22901,0,0,8a50b23cdceca6b003b10fb1d10a0eb69c8b3f5c24256d493c5ce2629f318cde,2024-02-07T17:37:28.593000
CVE-2024-22902,0,0,fbf1665f8a0c495bb4c5734518bdb188f14e0ba8d35feaea9e626f6d31bec387,2024-02-07T17:37:40.617000
CVE-2024-22903,0,0,b065e43b3567286ff1c11abbe22fe1f66bcb052a0745b0d35654b96ab7e2d4be,2024-02-07T17:37:48.350000
CVE-2024-22905,0,1,cfff96a7bd3fe64b5e210d15d7b0cb253e9ac8308b72b2526d9bd7beb7986173,2024-04-22T13:28:50.310000
CVE-2024-22905,0,0,cfff96a7bd3fe64b5e210d15d7b0cb253e9ac8308b72b2526d9bd7beb7986173,2024-04-22T13:28:50.310000
CVE-2024-2291,0,0,5a0d8dd1dccfcea1bdf6701723096db89286716c354b8745f8eab33b1e17acb9,2024-03-20T17:18:21.343000
CVE-2024-22911,0,0,2c6bed04bf2f4f5833b6ceb73482cd6c764a8005f6b7e06026bae5b9181bc291,2024-01-25T15:26:07.957000
CVE-2024-22912,0,0,f6bf556aaf07db2588cac5054f205bfcba2fbc32115a360994ef805c2fa463ec,2024-01-25T15:26:24.400000
@ -243816,6 +243833,9 @@ CVE-2024-27343,0,0,45c7ed1c4eed9ea624ee8b5def6c8c375e3f0f3011b69d57beef7384d6bbc
CVE-2024-27344,0,0,8aefe242670cc36dda0dce3798a7acb646a2bde29ffc66b45e4357a4348e3048,2024-04-03T17:24:18.150000
CVE-2024-27345,0,0,fe911dc85212419c00cd206bd5ce379cb6ba140e18be3c5480a17f10aedd8eb1,2024-04-03T17:24:18.150000
CVE-2024-27346,0,0,386b701029626639fdc143fc77e569108911d00594cd7781652dc458bf9d469e,2024-04-03T17:24:18.150000
CVE-2024-27347,1,1,1b88983989e0d31819b45651d21a1258b36d997775b8610ccf32365340580424,2024-04-22T14:15:07.310000
CVE-2024-27348,1,1,a980c111c4411e925968fa116acbecf63ed723ea5883f896a7e109bd13a0b986,2024-04-22T14:15:07.420000
CVE-2024-27349,1,1,33f2dd6c9c189231645f2601e2d6c164e75ab277ceac1b42d3f50b843954a4a8,2024-04-22T14:15:07.470000
CVE-2024-2735,0,0,0fc46982ae2bb65c79d893d71d43586449f915b196de8114a5c92c3c81993284,2024-04-10T13:23:38.787000
CVE-2024-27350,0,0,5597abb0ceda36739a00afc67d358c9c0f6015c501af0eb35c72e1c96465f58f,2024-02-26T16:32:25.577000
CVE-2024-27351,0,0,520ca3352966dfa67fe05df7be34472788802f7733d01bdf3c788fd202eaad5b,2024-04-20T03:15:06.900000
@ -244370,13 +244390,14 @@ CVE-2024-28681,0,0,ab17b4fa17ebf8eb3957de6dd91fe40414f05e3821f3c9e15b7d517b0542f
CVE-2024-28682,0,0,5152c6a3d71ef9256a4c100c1d46f03254aeda535ba4c982fc323d50132c0ded,2024-03-13T18:15:58.530000
CVE-2024-28683,0,0,5e05ced0c6e7903250735aacec4ea0453b4627030ef2e380ed47238db8bee0a9,2024-03-13T18:15:58.530000
CVE-2024-28684,0,0,5e8cf612c51178ce0b7db285e9479c0e753c1929aaa4babe1afc56000a57a8d5,2024-03-13T14:28:45.217000
CVE-2024-28699,1,1,48d6a2edadfcdeed21ae2731af60b3e334c291273f6fe5b0dde98deae2200e20,2024-04-22T15:15:47.757000
CVE-2024-2871,0,0,e9558decb3cc4c54584df3eb06fe6d1bb0c12954fd3dc0d6fb0a6933455338ba,2024-04-10T13:23:38.787000
CVE-2024-28713,0,0,beab16cae2dae6cd08028a095390b29624a6437ed474d84784c32091c71ece60,2024-03-28T20:53:20.813000
CVE-2024-28714,0,0,05d12d8ac80645ded00d1ead25c51baa98cf4af4d5a078fc724fffec6f7925ec,2024-03-29T12:45:02.937000
CVE-2024-28715,0,0,054dc6dc725c244acb835446cab8d82270f7d8ffd8311eb9aca1ba238d62a38d,2024-03-20T13:00:16.367000
CVE-2024-28717,1,1,8c421a78182b478df2458664e4a4d7a91a5381c69c010d35ebfa2b713f2241a8,2024-04-22T13:28:34.007000
CVE-2024-28717,0,0,8c421a78182b478df2458664e4a4d7a91a5381c69c010d35ebfa2b713f2241a8,2024-04-22T13:28:34.007000
CVE-2024-28718,0,0,5f0a839ac4250fecd45af64be191fc810afd4c63b89d4fc0f63a8d6841ad970e,2024-04-15T13:15:51.577000
CVE-2024-28722,0,1,9f3d9610dcb3a88962a775c4bceb1adf34898d2ad0bcbbf8f024b9f550b378b8,2024-04-22T13:28:43.747000
CVE-2024-28722,0,0,9f3d9610dcb3a88962a775c4bceb1adf34898d2ad0bcbbf8f024b9f550b378b8,2024-04-22T13:28:43.747000
CVE-2024-2873,0,0,38b44d61d3230fcaba1c551f8073fe8dda4eadd0cd50d8705b668e3c4529f628,2024-03-26T12:55:05.010000
CVE-2024-28732,0,0,ec5e6c9882e97cf45b4c95c1c5ffa7b0d32a1a92ed89d346b2a432d5adcd9a14,2024-04-08T18:48:40.217000
CVE-2024-28734,0,0,f4687488b267ac163f3e0d4b9d3eb38f6f5a041c19b985a560624c627a7f4e16,2024-04-01T21:15:33.200000
@ -244642,7 +244663,7 @@ CVE-2024-29203,0,0,132c3d83e906b655066bee1fc4d3f90e18def73beb9178e8cc6662be34f71
CVE-2024-29204,0,0,ec859d0e8fa3a1772fb0be403427e1a00a2b3fa2a9c0decec9ddc0392ff924fb,2024-04-19T13:10:25.637000
CVE-2024-2921,0,0,6f7f3b512cf8e7465b0aea1823cce56bf608a3c1f40869feddab084c3da126e6,2024-04-09T19:15:38.423000
CVE-2024-29216,0,0,59c06798795d05e391cdd301154441d31362295e800c3b46a2b7bd83a3e2dbc0,2024-03-25T13:47:14.087000
CVE-2024-29217,0,1,6aea24c6a3b30090b34762347afd8fb6e2aa0ed6c7d8e921a0460a2ce19272af,2024-04-22T13:28:43.747000
CVE-2024-29217,0,0,6aea24c6a3b30090b34762347afd8fb6e2aa0ed6c7d8e921a0460a2ce19272af,2024-04-22T13:28:43.747000
CVE-2024-29218,0,0,671653d28334eb1b29de221436a2464edfec5acf42885adc45ca7b102375c361,2024-04-15T13:15:31.997000
CVE-2024-29219,0,0,4481109cba1c43e8c57c43af416b7ffd0dce43a288900ab9b937cea0ab69c2a2,2024-04-15T13:15:31.997000
CVE-2024-29220,0,0,1b65a8d6c350605472de3d4a64b6e0ccc843853d705695d9c55dd012b24dc815,2024-04-11T12:47:44.137000
@ -244762,7 +244783,7 @@ CVE-2024-29640,0,0,87923c5f8022466da2d8ef6f4760770a9b5d77108f7ca786dd890e142c1a6
CVE-2024-29644,0,0,39829980cc0c3cec42e83f1a7d1e74f651bed504f90005be4e46042a91527a65,2024-03-26T12:55:05.010000
CVE-2024-29650,0,0,8ad374bfabee755625e57dff59b85656db535734df280985070b11f8f0b8c3b6,2024-03-25T16:43:06.137000
CVE-2024-2966,0,0,474ae2e5b1d6c6447ca9bee38c5e4dafcb7b2c2503070dea1f4351179cfe9798,2024-04-11T12:47:44.137000
CVE-2024-29661,1,1,0af56c9e6c3f4789c6952b6fc2267b505cb820e8c95b985131711686eeb372e4,2024-04-22T13:28:34.007000
CVE-2024-29661,0,0,0af56c9e6c3f4789c6952b6fc2267b505cb820e8c95b985131711686eeb372e4,2024-04-22T13:28:34.007000
CVE-2024-29666,0,0,a8926fce030310567330d9b7c126003f732556a2ce979a6a3fd232707f8bbd99,2024-03-26T12:55:05.010000
CVE-2024-29667,0,0,1425649af0fe5303ac647a61948436bd641374e6a3c12789edb4485c777699d5,2024-04-01T01:12:59.077000
CVE-2024-29672,0,0,1eb55fec3ce5ae998cf80be88c51c3b9d6ba2532b7f0accc6fb84646ec36fc57,2024-04-05T12:40:52.763000
@ -244773,7 +244794,7 @@ CVE-2024-2969,0,0,6a92a8306d48d89fa5e78ba3ed0ad9ff22c73e6ed21c55f23493a4ccc01056
CVE-2024-2970,0,0,55e4260b924ae12c92b2afb309e159a34e3ff23ffc5827039ee4146bc8707502,2024-03-29T12:45:02.937000
CVE-2024-2971,0,0,898bc718d43d0c390c6d16657d6a8f74b1bed4195ca2be9f6e03b60807e37565,2024-03-27T12:29:30.307000
CVE-2024-29732,0,0,f91e9a53bb8c78b9eaa9a43eb2f41d18e7980ac57e838dd405b45ee97833017f,2024-03-21T12:58:51.093000
CVE-2024-29733,0,1,57292da3a62666831c1051ff842ae2b0d158365061ef113f38677b32f17b4e9e,2024-04-22T13:28:43.747000
CVE-2024-29733,0,0,57292da3a62666831c1051ff842ae2b0d158365061ef113f38677b32f17b4e9e,2024-04-22T13:28:43.747000
CVE-2024-29734,0,0,8d99461dc9b8889d99315bde49edbce5536e3a20b88b53095157d8f0afc148b5,2024-04-03T12:38:04.840000
CVE-2024-29735,0,0,286fbba4f7cb1bbd32eae740efb468430068245735dc6c522579c415dcd44e18,2024-03-27T12:29:41.530000
CVE-2024-29738,0,0,99465af485b39ff68e105b0428c69eb9adbd1c8e009fe9a3569be9db8bf56cc1,2024-04-08T18:49:25.863000
@ -245414,7 +245435,7 @@ CVE-2024-30736,0,0,c9d1cbf13e640c6d0aad30d5b12c1d8e9eb4c675776ee84065ff7ca937010
CVE-2024-30737,0,0,1c036a16278ee8ea2e333e89f0d66457a587f7e2e9da86fd57591a8972289c80,2024-04-17T02:15:12.117000
CVE-2024-3077,0,0,df42d4a62ceb1c6a6275b9b1d36ac8da42c0ae3505d0e07beac8238605b5504b,2024-03-29T12:45:02.937000
CVE-2024-3078,0,0,de9e294582cbb558bf2417239a323549d99f034f1b581828b43e34b1ad1f5683,2024-04-11T01:25:52.940000
CVE-2024-30799,0,1,eae5bca102ad0c1fe3f236f7e51af89eca892740403953a6086f43b81ad7d92b,2024-04-22T13:28:43.747000
CVE-2024-30799,0,0,eae5bca102ad0c1fe3f236f7e51af89eca892740403953a6086f43b81ad7d92b,2024-04-22T13:28:43.747000
CVE-2024-30806,0,0,3c4bbd71defb52c4de24f9ad1626459edef6b60997b976e6d74aead4ee0b3b0f,2024-04-02T20:31:58.463000
CVE-2024-30807,0,0,8463e04fd42dedab289dad3fe1621f8f66d69fb63942da8a4e7f4baade23226e,2024-04-02T20:31:58.463000
CVE-2024-30808,0,0,3edb296009dfb16a5061a2505986b3903e36250320b7a7a1ea6af0d775f588e5,2024-04-02T20:31:58.463000
@ -245477,7 +245498,7 @@ CVE-2024-30952,0,0,45f3818300706503aa11d9788e132ab06eaeaa5db69128a0c2116be2f61ad
CVE-2024-30953,0,0,b6048a3223dd71969afb665512f3c96be52d96e721358fb67ff9cf9a8128e438,2024-04-17T20:08:21.887000
CVE-2024-30965,0,0,0e44dd5d951a25ac3e8873a32678a3145da47d1060cb5312576a9c0471b643ad,2024-04-02T18:12:16.283000
CVE-2024-3097,0,0,806f9356cc4622ff9b031006ecb4c94e90929f098cb7a0b907d59fb3d0d09798,2024-04-10T13:23:38.787000
CVE-2024-30974,0,1,fad1ff421513e997a755a646f437b1cf2946e8e72ed4701dccf29e92d3c1baae,2024-04-22T13:28:50.310000
CVE-2024-30974,0,0,fad1ff421513e997a755a646f437b1cf2946e8e72ed4701dccf29e92d3c1baae,2024-04-22T13:28:50.310000
CVE-2024-30977,0,0,0a99023cc49f8723c27525ea3fd6d09c0a18e0536fb7ad1e37e70ef0654b9714,2024-04-08T18:49:25.863000
CVE-2024-30979,0,0,80ab36bca498e33975593d086ceeeedf107c2c6f87bef059b959bbe8c3731bf4,2024-04-17T16:51:07.347000
CVE-2024-3098,0,0,6c9612ddcc0eabe1134a3c49c1d4f4b4a8fb99e39689761d9db9b207a4883fdf,2024-04-10T19:49:51.183000
@ -245720,7 +245741,7 @@ CVE-2024-31442,0,0,bd0c0777ffd79341352bfaf4bac13513052ca764dc9351410c56fde55ac0f
CVE-2024-31446,0,0,1a21e0c4eec911630e360128cbf20c658c7da3792258e417cd0bfcd4e43962d1,2024-04-17T12:48:31.863000
CVE-2024-31447,0,0,1686ea065902cff688a9e0e72258f816c60304799af9644c7db6f9ae37572786,2024-04-08T18:48:40.217000
CVE-2024-3145,0,0,30d7039ca4630abed1ac79b5e5068d170488eb4a6c9740ed0209e585b5eb2f84,2024-04-11T01:25:55.100000
CVE-2024-31450,0,1,39c51ef3dbf7180860d74ae8e43591aa884e429980b1a235ef41f58df58087bc,2024-04-22T13:28:50.310000
CVE-2024-31450,0,0,39c51ef3dbf7180860d74ae8e43591aa884e429980b1a235ef41f58df58087bc,2024-04-22T13:28:50.310000
CVE-2024-31451,0,0,5cd63a7516500f280402302edc80f37e0a69defff35e484ff50f396618580060,2024-04-19T17:15:54.780000
CVE-2024-31452,0,0,45e5c903cec7cbe18673da15b04f8c57c9e71a7a28162860a533aebab0360b95,2024-04-17T12:48:07.510000
CVE-2024-31453,0,0,1b1ead27c6870d2affe09236bc3123473d08b6ddf2bca0a49b08400d4b48a120,2024-04-10T13:24:00.070000
@ -245756,7 +245777,7 @@ CVE-2024-31580,0,0,e997e3f25c911fc04de779fa9168de4ebef90131449df2b2dfb57ff9ee6e6
CVE-2024-31581,0,0,d4a48f7cd6a3f11d5bd7242e0dfac3a15852b862f2cf96a614cc33083f70d5cc,2024-04-17T20:08:21.887000
CVE-2024-31582,0,0,fe103b3051ee1c8e8159af1dc183525df22a48d013c16c8b28c94f3527365cf7,2024-04-17T20:08:21.887000
CVE-2024-31583,0,0,eec650b2d1a967bea49e6ce27fbd51a980897e8355103b69036a477d8192c36f,2024-04-17T20:08:21.887000
CVE-2024-31584,0,1,7bd8b8c71b3cbc23e6db4c252c0ef145f85399e414092971d73799c932fbe46b,2024-04-22T13:28:50.310000
CVE-2024-31584,0,0,7bd8b8c71b3cbc23e6db4c252c0ef145f85399e414092971d73799c932fbe46b,2024-04-22T13:28:50.310000
CVE-2024-31585,0,0,ca870b59b85ac9b6cfa4a8fee4976da074575d82dd3c02566198bbf835617bd1,2024-04-17T20:08:21.887000
CVE-2024-31587,0,0,6aaa189139b27b06a683c1dac5c91d5124a2971d077e3d9157f284239b68e61a,2024-04-19T16:19:49.043000
CVE-2024-3159,0,0,372cd652e2632717ba4bd0c7aadd6df6465a25a12553b2fe9846988ffe1987d3,2024-04-19T23:15:11.687000
@ -245860,10 +245881,10 @@ CVE-2024-31986,0,0,43afc54623bebf262d37dd906c7efd37eb56ded00de01504423bee1057bdc
CVE-2024-31987,0,0,60d0bda711bcaaea27f455d1e392e029e767cb7013c9064db5359f058621c0df,2024-04-11T12:47:44.137000
CVE-2024-31988,0,0,51c3ab0f42083010a6201d8c5e43ded78b92f566d0bca12748a99bba4a186fcd,2024-04-11T12:47:44.137000
CVE-2024-31990,0,0,77ac4f6468312f14b2ffccf0214dd51bfa3f27166872b6029ecb265054e5d1ca,2024-04-16T13:24:07.103000
CVE-2024-31991,0,1,084d7dd9d9efb52ebd37b0899dddb9aa3e6df4c2dec8b6459a0c084eed997c1b,2024-04-22T13:28:50.310000
CVE-2024-31992,0,1,16f137e2cce79630840976201d80964696f3568c3892a903d39c3af6f94d1f69,2024-04-22T13:28:50.310000
CVE-2024-31993,0,1,c52760b1434a3fd90288429257de75f706037011e72eaec78e8c6fea078d30da,2024-04-22T13:28:50.310000
CVE-2024-31994,0,1,0bbd509bc505f57934a1390958b5deca30a5e56e0049f806caed65f3fe335c46,2024-04-22T13:28:43.747000
CVE-2024-31991,0,0,084d7dd9d9efb52ebd37b0899dddb9aa3e6df4c2dec8b6459a0c084eed997c1b,2024-04-22T13:28:50.310000
CVE-2024-31992,0,0,16f137e2cce79630840976201d80964696f3568c3892a903d39c3af6f94d1f69,2024-04-22T13:28:50.310000
CVE-2024-31993,0,0,c52760b1434a3fd90288429257de75f706037011e72eaec78e8c6fea078d30da,2024-04-22T13:28:50.310000
CVE-2024-31994,0,0,0bbd509bc505f57934a1390958b5deca30a5e56e0049f806caed65f3fe335c46,2024-04-22T13:28:43.747000
CVE-2024-31995,0,0,66dfe11a273e9e10d102f877b390a578235479d84ca6da17689c27557fdb1258,2024-04-11T12:47:44.137000
CVE-2024-31996,0,0,4bc228afb2f37b1ef8f323b1e059ab55f2f5ea66358ab4f20e2844a94396b7b8,2024-04-11T12:47:44.137000
CVE-2024-31997,0,0,d95ca9b47538ea73a196934e9c1064ac6bfd03df35a75cfa6de5a54ba7f14856,2024-04-11T12:47:44.137000
@ -246006,10 +246027,11 @@ CVE-2024-32343,0,0,862e8e3fbd92547c244c5be90d83e1339d7a18685f98ec207b76da84ef301
CVE-2024-32344,0,0,47eb1a8da70bc975fdd4934340a6940373147153bf19749b3895ed5e2ae65a6e,2024-04-18T13:04:28.900000
CVE-2024-32345,0,0,3c4abcf95580a888529432fa6af7f966006546429f30889ca33584d7f7f45c9a,2024-04-18T13:04:28.900000
CVE-2024-3235,0,0,87b194ac57d76e3164f790cf262b7f15e5577bfab72d12fd067ebb5070eb75e0,2024-04-10T13:23:38.787000
CVE-2024-32391,0,1,b9d2ada2509e9e002fcf7fc50c30e5fa24f6bd077b7f0fab83dbe519d76755ce,2024-04-22T13:28:50.310000
CVE-2024-32392,0,1,e9dc77721f231608117a79f151c9f1e6be5cd7530989658bd3dd67ce41889ce5,2024-04-22T13:28:50.310000
CVE-2024-32368,1,1,320ba457a0782b53c00011fd3775e2202f9a5e70399db1c563cf9afd31fa33ba,2024-04-22T14:15:07.560000
CVE-2024-32391,0,0,b9d2ada2509e9e002fcf7fc50c30e5fa24f6bd077b7f0fab83dbe519d76755ce,2024-04-22T13:28:50.310000
CVE-2024-32392,0,0,e9dc77721f231608117a79f151c9f1e6be5cd7530989658bd3dd67ce41889ce5,2024-04-22T13:28:50.310000
CVE-2024-32409,0,0,2cc0bf26ecd8938fd89992a98bae2541af2d19072f0bc8cdc919759b6ea980aa,2024-04-19T16:19:49.043000
CVE-2024-32418,0,1,95e561b293359ffe96c6d53d8bd7aa5dba172944f2d114b653ec1a760700c5d9,2024-04-22T13:28:43.747000
CVE-2024-32418,0,0,95e561b293359ffe96c6d53d8bd7aa5dba172944f2d114b653ec1a760700c5d9,2024-04-22T13:28:43.747000
CVE-2024-32428,0,0,87a3edde2c4b0ace5bed90e6337013a3436ae0c663c6eeed3dbaf59e4e702dff,2024-04-15T13:15:31.997000
CVE-2024-32429,0,0,eb5275541e0171326bf869e836661a3d04172e6e7d4adfaa9657297147332796,2024-04-15T13:15:31.997000
CVE-2024-3243,0,0,c0b3d501de451bd25695181364b192f45772ac0c3be190b71ef36c93a88e910d,2024-04-16T13:24:07.103000
@ -246166,25 +246188,25 @@ CVE-2024-32633,0,0,8ac8ce6a1ac201ef8dc36e7fab192ecb8b1b583d781df940a83a5707e3155
CVE-2024-32634,0,0,399e2bba8e548c1c98770d2f478e96e69a60afbc020788dd69a365e3ae504be6,2024-04-16T13:24:07.103000
CVE-2024-32644,0,0,1c6536d9b118a22e007df0508c4274faf4a9f6bb52ca2e5c9b157aa559740e67,2024-04-19T16:19:49.043000
CVE-2024-32650,0,0,3ec938fa621d2b09851dc7c9c4a0bab9e06500eb12a687bac8f1323156efc6df,2024-04-19T16:19:49.043000
CVE-2024-32652,0,1,507899e8cc0ef719a4df6a408b43b1aeaf42e8d25b41dcf9a35617406adccb9d,2024-04-22T13:28:50.310000
CVE-2024-32652,0,0,507899e8cc0ef719a4df6a408b43b1aeaf42e8d25b41dcf9a35617406adccb9d,2024-04-22T13:28:50.310000
CVE-2024-3266,0,0,254a5ba127b10ac48f062b62dbe4c90ef51eaba1ed741161e5a22416cbb32240,2024-04-10T13:23:38.787000
CVE-2024-3267,0,0,00a210ede7a73ca33b64d3b8a0e382509d5bafa34ae84022125b180763aee2bd,2024-04-10T13:23:38.787000
CVE-2024-32681,0,1,30385cf8415af0417b19f52d5eb22ace0b875cd333ead985847624dbf28043cd,2024-04-22T13:28:34.007000
CVE-2024-32682,0,1,58e88eb4e58693904e72af409db2b73d4765a2b0a2362496a490b92c932d2d60,2024-04-22T13:28:34.007000
CVE-2024-32681,0,0,30385cf8415af0417b19f52d5eb22ace0b875cd333ead985847624dbf28043cd,2024-04-22T13:28:34.007000
CVE-2024-32682,0,0,58e88eb4e58693904e72af409db2b73d4765a2b0a2362496a490b92c932d2d60,2024-04-22T13:28:34.007000
CVE-2024-32683,0,0,a0b9622e54426858713ec284b3b35f1e3398d7792b7ab5de8a29a6635c271abc,2024-04-19T13:10:25.637000
CVE-2024-32684,0,1,45409a46b6c2aef394952cf53f9074a8fb5f677d47ff8e382f222436e5428b09,2024-04-22T13:28:34.007000
CVE-2024-32684,0,0,45409a46b6c2aef394952cf53f9074a8fb5f677d47ff8e382f222436e5428b09,2024-04-22T13:28:34.007000
CVE-2024-32686,0,0,852c454a1d3bbf27e69c45ac3a82e5061f231ff76a794447de0366c288490e9f,2024-04-18T13:04:28.900000
CVE-2024-32687,0,1,f51b7763fb704912aead612d939613099fe226355e98a37ae798883bfd707667,2024-04-22T13:28:34.007000
CVE-2024-32688,0,1,6e59715667d9b15d5d174972819c691193d74d15b97cf6c6fe45f2bf4908f8ea,2024-04-22T13:28:34.007000
CVE-2024-32687,0,0,f51b7763fb704912aead612d939613099fe226355e98a37ae798883bfd707667,2024-04-22T13:28:34.007000
CVE-2024-32688,0,0,6e59715667d9b15d5d174972819c691193d74d15b97cf6c6fe45f2bf4908f8ea,2024-04-22T13:28:34.007000
CVE-2024-32689,0,0,16874a71c9e632f769995766bf2f4ed6e183b5fc555d1d7f129ab5a8c673df33,2024-04-18T13:04:28.900000
CVE-2024-32690,0,1,a5c3efbe443cf42b8bcd8044eca65a720a8f83179f73ad11a935d5b1da69e0fc,2024-04-22T13:28:43.747000
CVE-2024-32691,0,1,47a620e1c936aa6c98068b87aaef82dc660370cf405c37f50aedb6cd32c40c5e,2024-04-22T13:28:34.007000
CVE-2024-32693,0,1,e7339c8b84970dceb7f27fc70179e84265f9a92972682371e824a11db13ee997,2024-04-22T13:28:43.747000
CVE-2024-32694,0,1,ff376270c0d03e4fa17c8b43797e107f0072f0908378ab1e963713a1158905af,2024-04-22T13:28:43.747000
CVE-2024-32695,0,1,caed8267603babbb5835fd8eadf3f2dca399f066c74d00c0a4d5b64c1b57142d,2024-04-22T13:28:34.007000
CVE-2024-32696,0,1,e7758d11ccb79b8e8842b12077365c0f608e298b7aff71d6241568ff720ff6dd,2024-04-22T13:28:34.007000
CVE-2024-32697,0,1,080d53d42ba50cae897d0f614c32560b058087a597070d329674949eb0662dca,2024-04-22T13:28:34.007000
CVE-2024-32698,0,1,62d9323bbf42a20a367a2bf88d0f3ecbf462ca871e0485b99440a7338327b80d,2024-04-22T13:28:34.007000
CVE-2024-32690,0,0,a5c3efbe443cf42b8bcd8044eca65a720a8f83179f73ad11a935d5b1da69e0fc,2024-04-22T13:28:43.747000
CVE-2024-32691,0,0,47a620e1c936aa6c98068b87aaef82dc660370cf405c37f50aedb6cd32c40c5e,2024-04-22T13:28:34.007000
CVE-2024-32693,0,0,e7339c8b84970dceb7f27fc70179e84265f9a92972682371e824a11db13ee997,2024-04-22T13:28:43.747000
CVE-2024-32694,0,0,ff376270c0d03e4fa17c8b43797e107f0072f0908378ab1e963713a1158905af,2024-04-22T13:28:43.747000
CVE-2024-32695,0,0,caed8267603babbb5835fd8eadf3f2dca399f066c74d00c0a4d5b64c1b57142d,2024-04-22T13:28:34.007000
CVE-2024-32696,0,0,e7758d11ccb79b8e8842b12077365c0f608e298b7aff71d6241568ff720ff6dd,2024-04-22T13:28:34.007000
CVE-2024-32697,0,0,080d53d42ba50cae897d0f614c32560b058087a597070d329674949eb0662dca,2024-04-22T13:28:34.007000
CVE-2024-32698,0,0,62d9323bbf42a20a367a2bf88d0f3ecbf462ca871e0485b99440a7338327b80d,2024-04-22T13:28:34.007000
CVE-2024-3270,0,0,6f3801d6fa573f4a130c8a1ad393f7345008a6cf48547c2d9608d260a00cb3bb,2024-04-11T01:25:57.753000
CVE-2024-3271,0,0,427448d66ebe59002a93ad233a5fbd2b2253db3687d924fc6f5652a183f66ed0,2024-04-16T13:24:07.103000
CVE-2024-3272,0,0,ef44e7e2e0d0ab3ec436a6ccc174b0a90f543a9a2cfa65f7a6d262da6c5446ee,2024-04-15T20:14:55.570000
@ -246340,6 +246362,7 @@ CVE-2024-3618,0,0,4930954b63fbf1867ea6023e0e85abb5ce3c463a36dea55dc99465af5aaf25
CVE-2024-3619,0,0,e46a3b263395cb61cb97e22d10d38e54d57de91c1d7f1832b85e56c338bf09fb,2024-04-11T12:47:44.137000
CVE-2024-3620,0,0,a7eeb1bc049879e174341aab349252fb94be8452f8b1f4ee171cd19f6ef0b10d,2024-04-11T12:47:44.137000
CVE-2024-3621,0,0,84afe5bfc8ac11b311e81571bedd8fcb4ae60929cf687215eae135d692582687,2024-04-11T12:47:44.137000
CVE-2024-3645,1,1,bee980acfce5b6ddcb1616470edd36a9a4a84ca7bbfead0c0191d071e049a665,2024-04-22T14:15:07.617000
CVE-2024-3646,0,0,acb9cfc5d5c2523df1f5225ae5c2cd01f196734634fe01108d948b04f61908e2,2024-04-19T16:19:49.043000
CVE-2024-3652,0,0,a467de8b64f8147acdef48edc35752a89afb7d5856e17302ea9c57335ed0f61c,2024-04-11T12:47:44.137000
CVE-2024-3654,0,0,7e2b4ab81bb1b43884c0db8e806df093bdf87a3fc5c587d83d67f54180b50daf,2024-04-19T16:19:49.043000
@ -246459,11 +246482,11 @@ CVE-2024-3931,0,0,adc8a79b07f48b35a9681a97a568e852ba1ef2cbd3b7271f585750c2d2c421
CVE-2024-3932,0,0,bce0f8b09e2fc4acc0cfce5940d57ce5f1e0384ac19f6c68ed218175688d8f12,2024-04-18T13:04:28.900000
CVE-2024-3948,0,0,427154a0226db385c08a1dc567a28e238ab290a5825189b73e5e958b25b296e5,2024-04-18T13:04:28.900000
CVE-2024-3979,0,0,9ef752ac5397ef4280bc4d9888fb417cb985331164bf90affafa759f391a2bfe,2024-04-19T18:29:53.040000
CVE-2024-4014,0,1,321273114f78ac117c4f7a805b62a62926b23a5461c74b2705504b7b2e21d158,2024-04-22T13:28:43.747000
CVE-2024-4017,0,1,9cc899b07e49c20d1d42511c9c41a533c695fd74b1701843b26490566c6e33e3,2024-04-22T13:28:50.310000
CVE-2024-4018,0,1,b534838241485b84911a40a305fab0f06a9a1281f09d3d1140d27d7f52b1a84d,2024-04-22T13:28:50.310000
CVE-2024-4019,0,1,4ced7c6540a74633018fd49c35c9e41874265303e22396ab90391c2405ff63d0,2024-04-22T13:28:43.747000
CVE-2024-4020,0,1,fd9bedf3f2e4b41e8bc994bd6387cb7e34a5d92d9443a0588f231180a5be8980,2024-04-22T13:28:43.747000
CVE-2024-4021,0,1,b9c31c9ddb04cfbc98ed2b7bcc3a8b279bda917775a5da2e55bd44974dd3912a,2024-04-22T13:28:43.747000
CVE-2024-4022,0,1,ebd323c8f90bdf29bd6ff35ea1eff449874a3d962dc85b687039f47f7b416e73,2024-04-22T13:28:43.747000
CVE-2024-4026,1,1,65bff2dba626fde0f88488c1e6df610a37e761e2e041855587a3bbcb3e849c23,2024-04-22T13:28:34.007000
CVE-2024-4014,0,0,321273114f78ac117c4f7a805b62a62926b23a5461c74b2705504b7b2e21d158,2024-04-22T13:28:43.747000
CVE-2024-4017,0,0,9cc899b07e49c20d1d42511c9c41a533c695fd74b1701843b26490566c6e33e3,2024-04-22T13:28:50.310000
CVE-2024-4018,0,0,b534838241485b84911a40a305fab0f06a9a1281f09d3d1140d27d7f52b1a84d,2024-04-22T13:28:50.310000
CVE-2024-4019,0,0,4ced7c6540a74633018fd49c35c9e41874265303e22396ab90391c2405ff63d0,2024-04-22T13:28:43.747000
CVE-2024-4020,0,0,fd9bedf3f2e4b41e8bc994bd6387cb7e34a5d92d9443a0588f231180a5be8980,2024-04-22T13:28:43.747000
CVE-2024-4021,0,1,21ca31bf18d88881f7a6cc1002b89ea9bbd51b89715a0adf7c08b2eb5ac210a6,2024-04-22T15:15:47.813000
CVE-2024-4022,0,0,ebd323c8f90bdf29bd6ff35ea1eff449874a3d962dc85b687039f47f7b416e73,2024-04-22T13:28:43.747000
CVE-2024-4026,0,0,65bff2dba626fde0f88488c1e6df610a37e761e2e041855587a3bbcb3e849c23,2024-04-22T13:28:34.007000

Can't render this file because it is too large.