Auto-Update: 2024-04-15T02:00:31.232180+00:00

This commit is contained in:
cad-safe-bot 2024-04-15 02:03:20 +00:00
parent 17a0ce3038
commit f18f8253e1
12 changed files with 645 additions and 15 deletions

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2024-29836",
"sourceIdentifier": "430a6cef-dc26-47e3-9fa8-52fb7f19644e",
"published": "2024-04-15T00:15:12.847",
"lastModified": "2024-04-15T00:15:12.847",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "The Web interface of Evolution Controller Versions 2.04.560.31.03.2024 and below contains poorly configured access control, allowing for an unauthenticated attacker to update and add user profiles within the application, and gain full access of the site."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "430a6cef-dc26-47e3-9fa8-52fb7f19644e",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "430a6cef-dc26-47e3-9fa8-52fb7f19644e",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-284"
}
]
}
],
"references": [
{
"url": "https://directcyber.com.au/sa/CVE-2024-29836-to-29844-evolution-controller-multiple-vulnerabilities.html",
"source": "430a6cef-dc26-47e3-9fa8-52fb7f19644e"
}
]
}

View File

@ -0,0 +1,59 @@
{
"id": "CVE-2024-29837",
"sourceIdentifier": "430a6cef-dc26-47e3-9fa8-52fb7f19644e",
"published": "2024-04-15T00:15:13.097",
"lastModified": "2024-04-15T00:15:13.097",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "The Web interface of Evolution Controller Versions 2.04.560.31.03.2024 and below uses poor session management, allowing for an unauthenticated attacker to access administrator functionality if any other user is already signed in."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "430a6cef-dc26-47e3-9fa8-52fb7f19644e",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "430a6cef-dc26-47e3-9fa8-52fb7f19644e",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-1390"
},
{
"lang": "en",
"value": "CWE-284"
}
]
}
],
"references": [
{
"url": "https://directcyber.com.au/sa/CVE-2024-29836-to-29844-evolution-controller-multiple-vulnerabilities.html",
"source": "430a6cef-dc26-47e3-9fa8-52fb7f19644e"
}
]
}

View File

@ -0,0 +1,59 @@
{
"id": "CVE-2024-29838",
"sourceIdentifier": "430a6cef-dc26-47e3-9fa8-52fb7f19644e",
"published": "2024-04-15T00:15:13.307",
"lastModified": "2024-04-15T00:15:13.307",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "The Web interface of Evolution Controller Versions 2.04.560.31.03.2024 and below does not proper sanitize user input, allowing for an unauthenticated attacker to crash the controller software"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "430a6cef-dc26-47e3-9fa8-52fb7f19644e",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "430a6cef-dc26-47e3-9fa8-52fb7f19644e",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-20"
},
{
"lang": "en",
"value": "CWE-457"
}
]
}
],
"references": [
{
"url": "https://directcyber.com.au/sa/CVE-2024-29836-to-29844-evolution-controller-multiple-vulnerabilities.html",
"source": "430a6cef-dc26-47e3-9fa8-52fb7f19644e"
}
]
}

View File

@ -0,0 +1,59 @@
{
"id": "CVE-2024-29839",
"sourceIdentifier": "430a6cef-dc26-47e3-9fa8-52fb7f19644e",
"published": "2024-04-15T00:15:13.533",
"lastModified": "2024-04-15T00:15:13.533",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "The Web interface of Evolution Controller Versions 2.04.560.31.03.2024 and below contains poorly configured access control on DESKTOP_EDIT_USER_GET_CARD, allowing for an unauthenticated attacker to return the card value data of any user\n\n"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "430a6cef-dc26-47e3-9fa8-52fb7f19644e",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "430a6cef-dc26-47e3-9fa8-52fb7f19644e",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-200"
},
{
"lang": "en",
"value": "CWE-284"
}
]
}
],
"references": [
{
"url": "https://directcyber.com.au/sa/CVE-2024-29836-to-29844-evolution-controller-multiple-vulnerabilities.html",
"source": "430a6cef-dc26-47e3-9fa8-52fb7f19644e"
}
]
}

View File

@ -0,0 +1,59 @@
{
"id": "CVE-2024-29840",
"sourceIdentifier": "430a6cef-dc26-47e3-9fa8-52fb7f19644e",
"published": "2024-04-15T00:15:13.753",
"lastModified": "2024-04-15T00:15:13.753",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "The Web interface of Evolution Controller Versions 2.04.560.31.03.2024 and below contains poorly configured access control on DESKTOP_EDIT_USER_GET_PIN_FIELDS, allowing for an unauthenticated attacker to return the pin value of any user\n\n"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "430a6cef-dc26-47e3-9fa8-52fb7f19644e",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "430a6cef-dc26-47e3-9fa8-52fb7f19644e",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-200"
},
{
"lang": "en",
"value": "CWE-284"
}
]
}
],
"references": [
{
"url": "https://directcyber.com.au/sa/CVE-2024-29836-to-29844-evolution-controller-multiple-vulnerabilities.html",
"source": "430a6cef-dc26-47e3-9fa8-52fb7f19644e"
}
]
}

View File

@ -0,0 +1,59 @@
{
"id": "CVE-2024-29841",
"sourceIdentifier": "430a6cef-dc26-47e3-9fa8-52fb7f19644e",
"published": "2024-04-15T00:15:13.963",
"lastModified": "2024-04-15T00:15:13.963",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "The Web interface of Evolution Controller Versions 2.04.560.31.03.2024 and below contains poorly configured access control on DESKTOP_EDIT_USER_GET_KEYS_FIELDS, allowing for an unauthenticated attacker to return the keys value of any user"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "430a6cef-dc26-47e3-9fa8-52fb7f19644e",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "430a6cef-dc26-47e3-9fa8-52fb7f19644e",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-200"
},
{
"lang": "en",
"value": "CWE-284"
}
]
}
],
"references": [
{
"url": "https://directcyber.com.au/sa/CVE-2024-29836-to-29844-evolution-controller-multiple-vulnerabilities.html",
"source": "430a6cef-dc26-47e3-9fa8-52fb7f19644e"
}
]
}

View File

@ -0,0 +1,59 @@
{
"id": "CVE-2024-29842",
"sourceIdentifier": "430a6cef-dc26-47e3-9fa8-52fb7f19644e",
"published": "2024-04-15T00:15:14.167",
"lastModified": "2024-04-15T00:15:14.167",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "The Web interface of Evolution Controller Versions 2.04.560.31.03.2024 and below contains poorly configured access control on DESKTOP_EDIT_USER_GET_ABACARD_FIELDS, allowing for an unauthenticated attacker to return the abacard field of any user"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "430a6cef-dc26-47e3-9fa8-52fb7f19644e",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "430a6cef-dc26-47e3-9fa8-52fb7f19644e",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-200"
},
{
"lang": "en",
"value": "CWE-284"
}
]
}
],
"references": [
{
"url": "https://directcyber.com.au/sa/CVE-2024-29836-to-29844-evolution-controller-multiple-vulnerabilities.html",
"source": "430a6cef-dc26-47e3-9fa8-52fb7f19644e"
}
]
}

View File

@ -0,0 +1,59 @@
{
"id": "CVE-2024-29843",
"sourceIdentifier": "430a6cef-dc26-47e3-9fa8-52fb7f19644e",
"published": "2024-04-15T00:15:14.373",
"lastModified": "2024-04-15T00:15:14.373",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "The Web interface of Evolution Controller Versions 2.04.560.31.03.2024 and below contains poorly configured access control on MOBILE_GET_USERS_LIST, allowing for an unauthenticated attacker to enumerate all users and their access levels\n\n"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "430a6cef-dc26-47e3-9fa8-52fb7f19644e",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "430a6cef-dc26-47e3-9fa8-52fb7f19644e",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-200"
},
{
"lang": "en",
"value": "CWE-284"
}
]
}
],
"references": [
{
"url": "https://directcyber.com.au/sa/CVE-2024-29836-to-29844-evolution-controller-multiple-vulnerabilities.html",
"source": "430a6cef-dc26-47e3-9fa8-52fb7f19644e"
}
]
}

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2024-29844",
"sourceIdentifier": "430a6cef-dc26-47e3-9fa8-52fb7f19644e",
"published": "2024-04-15T00:15:14.573",
"lastModified": "2024-04-15T00:15:14.573",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Default credentials on the Web Interface of Evolution Controller 2.x (123 and 123) allows anyone to log in to the server directly to perform administrative functions. Upon installation or upon first login, the application does not ask the user to change the password. There is no warning or prompt to ask the user to change the default password."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "430a6cef-dc26-47e3-9fa8-52fb7f19644e",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "430a6cef-dc26-47e3-9fa8-52fb7f19644e",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-1392"
}
]
}
],
"references": [
{
"url": "https://directcyber.com.au/sa/CVE-2024-29836-to-29844-evolution-controller-multiple-vulnerabilities.html",
"source": "430a6cef-dc26-47e3-9fa8-52fb7f19644e"
}
]
}

View File

@ -0,0 +1,92 @@
{
"id": "CVE-2024-3766",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-04-15T00:15:14.773",
"lastModified": "2024-04-15T00:15:14.773",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability, which was classified as problematic, has been found in slowlyo OwlAdmin up to 3.5.7. Affected by this issue is some unknown functionality of the file /admin-api/upload_image of the component Image File Upload. The manipulation of the argument file leads to cross site scripting. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB-260606 is the identifier assigned to this vulnerability."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:N/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 2.4,
"baseSeverity": "LOW"
},
"exploitabilityScore": 0.9,
"impactScore": 1.4
}
],
"cvssMetricV2": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:M/C:N/I:P/A:N",
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "MULTIPLE",
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"availabilityImpact": "NONE",
"baseScore": 3.3
},
"baseSeverity": "LOW",
"exploitabilityScore": 6.4,
"impactScore": 2.9,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://github.com/fubxx/CVE/blob/main/OwlAdmin-XSS.md",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?ctiid.260606",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?id.260606",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?submit.311886",
"source": "cna@vuldb.com"
}
]
}

View File

@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update
```plain
2024-04-14T23:55:29.351494+00:00
2024-04-15T02:00:31.232180+00:00
```
### Most recent CVE Modification Timestamp synchronized with NVD
```plain
2024-04-14T23:15:46.650000+00:00
2024-04-15T00:15:14.773000+00:00
```
### Last Data Feed Release
@ -27,24 +27,29 @@ Repository synchronizes with the NVD every 2 hours.
Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/releases/latest)
```plain
2024-04-14T00:00:20.251311+00:00
2024-04-15T00:00:20.253820+00:00
```
### Total Number of included CVEs
```plain
245423
245433
```
### CVEs added in the last Commit
Recently added CVEs: `5`
Recently added CVEs: `10`
- [CVE-2024-27462](CVE-2024/CVE-2024-274xx/CVE-2024-27462.json) (`2024-04-14T23:15:45.830`)
- [CVE-2024-3762](CVE-2024/CVE-2024-37xx/CVE-2024-3762.json) (`2024-04-14T22:15:58.687`)
- [CVE-2024-3763](CVE-2024/CVE-2024-37xx/CVE-2024-3763.json) (`2024-04-14T23:15:46.110`)
- [CVE-2024-3764](CVE-2024/CVE-2024-37xx/CVE-2024-3764.json) (`2024-04-14T23:15:46.373`)
- [CVE-2024-3765](CVE-2024/CVE-2024-37xx/CVE-2024-3765.json) (`2024-04-14T23:15:46.650`)
- [CVE-2024-29836](CVE-2024/CVE-2024-298xx/CVE-2024-29836.json) (`2024-04-15T00:15:12.847`)
- [CVE-2024-29837](CVE-2024/CVE-2024-298xx/CVE-2024-29837.json) (`2024-04-15T00:15:13.097`)
- [CVE-2024-29838](CVE-2024/CVE-2024-298xx/CVE-2024-29838.json) (`2024-04-15T00:15:13.307`)
- [CVE-2024-29839](CVE-2024/CVE-2024-298xx/CVE-2024-29839.json) (`2024-04-15T00:15:13.533`)
- [CVE-2024-29840](CVE-2024/CVE-2024-298xx/CVE-2024-29840.json) (`2024-04-15T00:15:13.753`)
- [CVE-2024-29841](CVE-2024/CVE-2024-298xx/CVE-2024-29841.json) (`2024-04-15T00:15:13.963`)
- [CVE-2024-29842](CVE-2024/CVE-2024-298xx/CVE-2024-29842.json) (`2024-04-15T00:15:14.167`)
- [CVE-2024-29843](CVE-2024/CVE-2024-298xx/CVE-2024-29843.json) (`2024-04-15T00:15:14.373`)
- [CVE-2024-29844](CVE-2024/CVE-2024-298xx/CVE-2024-29844.json) (`2024-04-15T00:15:14.573`)
- [CVE-2024-3766](CVE-2024/CVE-2024-37xx/CVE-2024-3766.json) (`2024-04-15T00:15:14.773`)
### CVEs modified in the last Commit

View File

@ -243378,7 +243378,7 @@ CVE-2024-2745,0,0,21dd83e50808577458b12385abb6a5e6bc2a585cd70ef551295012e31869f5
CVE-2024-27454,0,0,6d3a09532b89ef204254e66da503964dcbafd450b5bdda0990f449d144c8e54b,2024-02-26T16:32:25.577000
CVE-2024-27455,0,0,2d941179924c9f77cb732b35f1b7b9f5792b70ca51de1e84f09167eb77852176,2024-03-26T16:15:12.263000
CVE-2024-27456,0,0,3292722b93148b4ab52923fa8e4498babe5b306f79794afb1b6b9f9d803c4911,2024-02-26T16:32:25.577000
CVE-2024-27462,1,1,ffc1613a8162349f9e85ee9ce86cbdc5073a2092a76bc9fd14c2d891290e403c,2024-04-14T23:15:45.830000
CVE-2024-27462,0,0,ffc1613a8162349f9e85ee9ce86cbdc5073a2092a76bc9fd14c2d891290e403c,2024-04-14T23:15:45.830000
CVE-2024-27474,0,0,eedd7f52a8e754286d0994212e940bbab5a78ce0f631ba173f8be2320f55c67f,2024-04-10T19:49:51.183000
CVE-2024-27476,0,0,8cccfbd88a289b73ae2a82f1969e7e11b3256be620bf6a323e970ad5fee54963,2024-04-10T19:49:51.183000
CVE-2024-27477,0,0,475b0780b17016d259d91214e57785f69e50a4f85e3c7b3b34cb0c00dc852aa4,2024-04-10T19:49:51.183000
@ -244356,7 +244356,16 @@ CVE-2024-2983,0,0,23d5f9d4638c65dc43b0706ddf09d53e64a3d415ebcd6885079f6fe9d10c5f
CVE-2024-29832,0,0,9f165dd8af7b150aedd8ba0e648c487f081558a3943c83b1f6267f1670f3eb8a,2024-03-26T17:09:53.043000
CVE-2024-29833,0,0,425a7917efe73a1770fcefa4ce4ec7e1a0c1da408936ec3b87fe92c30b675f21,2024-03-26T17:09:53.043000
CVE-2024-29834,0,0,fcb2204bebc95a769cbfbc7fb2ab65826176bce82e40b2c7464bcb200fbaac1b,2024-04-02T20:31:58.463000
CVE-2024-29836,1,1,37e4cbfbd0c62fd1e658a8e84b366928b44e312be64057cf7e2b4fe4abf6ffa1,2024-04-15T00:15:12.847000
CVE-2024-29837,1,1,f17756fb522a9e39a5905d0c4c9a7248e53b5b5c923422cb93441052e18a639e,2024-04-15T00:15:13.097000
CVE-2024-29838,1,1,24f1232d2cd448e0457658913ca8918f08ce3b3ab5c4de21cbbff97efcd84d58,2024-04-15T00:15:13.307000
CVE-2024-29839,1,1,b682176657620433b340ec7cfe7e7687d1614406cb337baba237d351bc3bf298,2024-04-15T00:15:13.533000
CVE-2024-2984,0,0,4b5982b3c3e0e5e17ce3322c4c77f227ad9c5e510c9a2d4ef229246c4d0c5f67,2024-04-11T01:25:43.683000
CVE-2024-29840,1,1,e0bf1336a8777f05d9ddff6cf61dfcb3c4a78e2ee7e7598df2b7d8f55e88ae24,2024-04-15T00:15:13.753000
CVE-2024-29841,1,1,bf6d11f8ff0404b2beb5351f96a9cc308cffb274608eb7f51e441183d4b2ea09,2024-04-15T00:15:13.963000
CVE-2024-29842,1,1,9fcd654a2b9c876cb5d73b31ac2983bb0f5f46f7812ffeaa12170dee8d6b58fd,2024-04-15T00:15:14.167000
CVE-2024-29843,1,1,fe546397c94a00575ea363edd74f297119a8af5489577f632f47948f6fe7f2f2,2024-04-15T00:15:14.373000
CVE-2024-29844,1,1,cc64152b8477f4266dbd6ddf7c24c949161e7a5b01c40ea0ed75920030365afd,2024-04-15T00:15:14.573000
CVE-2024-2985,0,0,eae3273dd06632fb9083734fb3ca3d6279482f4638135d81e5659988419ffe7f,2024-04-11T01:25:43.773000
CVE-2024-29858,0,0,ec21ad079a83cd076ada45f6eaa6cdca3318bb07ab260d892702dff1f9c09fde,2024-03-21T12:58:51.093000
CVE-2024-29859,0,0,1a3bc8759fdc8c10e013f96dddd14f2ff64d6c749aade8e9054f9e130df1726e,2024-03-21T12:58:51.093000
@ -245418,7 +245427,8 @@ CVE-2024-3737,0,0,3ece3dc04e2a51c738908804fdc895437fedad772f68ffb6b51e1e486b0c00
CVE-2024-3738,0,0,09bc2e3a802ac8f6c70c5517ac81e7b57f06695f5612a81cd6c91a0a61213828,2024-04-13T18:15:07.390000
CVE-2024-3739,0,0,7ec4f828f90436048bb80fdf887bc8a60adc89dbf654d1396a79394bec55d21d,2024-04-13T19:15:53.757000
CVE-2024-3740,0,0,cad4660a05c482b6800e402dcb0a2b908ba4751bb8506078e808ef0aee3e4761,2024-04-13T21:15:48.353000
CVE-2024-3762,1,1,b191d101f4a9d645c7e9f95afa47f2c207df5b4c70ecd3749179a783e15e08f0,2024-04-14T22:15:58.687000
CVE-2024-3763,1,1,262909d0950c7a3228e8fed8ae6373f18cbf0c3e21f14cf96c53b24e96840fc4,2024-04-14T23:15:46.110000
CVE-2024-3764,1,1,4d189903af3cfe6d7249ff59c89b78dd404f54d55b4d90a0597a6d48e963acf9,2024-04-14T23:15:46.373000
CVE-2024-3765,1,1,b3d1b16d269cee243522ba0b3be107f044389782884d6822e375f86a69fc36c5,2024-04-14T23:15:46.650000
CVE-2024-3762,0,0,b191d101f4a9d645c7e9f95afa47f2c207df5b4c70ecd3749179a783e15e08f0,2024-04-14T22:15:58.687000
CVE-2024-3763,0,0,262909d0950c7a3228e8fed8ae6373f18cbf0c3e21f14cf96c53b24e96840fc4,2024-04-14T23:15:46.110000
CVE-2024-3764,0,0,4d189903af3cfe6d7249ff59c89b78dd404f54d55b4d90a0597a6d48e963acf9,2024-04-14T23:15:46.373000
CVE-2024-3765,0,0,b3d1b16d269cee243522ba0b3be107f044389782884d6822e375f86a69fc36c5,2024-04-14T23:15:46.650000
CVE-2024-3766,1,1,28f42c457ae28605580e5cf8d3ddbf5c4178184dcd9c90284dd7756c20e9f53b,2024-04-15T00:15:14.773000

Can't render this file because it is too large.