Auto-Update: 2024-04-11T20:00:37.404662+00:00

This commit is contained in:
cad-safe-bot 2024-04-11 20:03:27 +00:00
parent 7f17e48d8c
commit f40cc8283e
18 changed files with 247 additions and 51 deletions

View File

@ -2,12 +2,12 @@
"id": "CVE-2023-52070", "id": "CVE-2023-52070",
"sourceIdentifier": "cve@mitre.org", "sourceIdentifier": "cve@mitre.org",
"published": "2024-04-10T19:15:48.973", "published": "2024-04-10T19:15:48.973",
"lastModified": "2024-04-10T19:49:51.183", "lastModified": "2024-04-11T19:15:16.037",
"vulnStatus": "Awaiting Analysis", "vulnStatus": "Awaiting Analysis",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
"value": "JFreeChart v1.5.4 was discovered to be vulnerable to ArrayIndexOutOfBounds via the 'setSeriesNeedle(int index, int type)' method." "value": "JFreeChart v1.5.4 was discovered to be vulnerable to ArrayIndexOutOfBounds via the 'setSeriesNeedle(int index, int type)' method. NOTE: this is disputed by multiple third parties who believe there was not reasonable evidence to determine the existence of a vulnerability. The submission may have been based on a tool that is not sufficiently robust for vulnerability identification."
} }
], ],
"metrics": {}, "metrics": {},

View File

@ -2,12 +2,12 @@
"id": "CVE-2024-22949", "id": "CVE-2024-22949",
"sourceIdentifier": "cve@mitre.org", "sourceIdentifier": "cve@mitre.org",
"published": "2024-04-08T23:15:07.647", "published": "2024-04-08T23:15:07.647",
"lastModified": "2024-04-09T12:48:04.090", "lastModified": "2024-04-11T19:15:16.113",
"vulnStatus": "Awaiting Analysis", "vulnStatus": "Awaiting Analysis",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
"value": "JFreeChart v1.5.4 was discovered to contain a NullPointerException via the component /chart/annotations/CategoryLineAnnotation." "value": "JFreeChart v1.5.4 was discovered to contain a NullPointerException via the component /chart/annotations/CategoryLineAnnotation. NOTE: this is disputed by multiple third parties who believe there was not reasonable evidence to determine the existence of a vulnerability. The submission may have been based on a tool that is not sufficiently robust for vulnerability identification."
}, },
{ {
"lang": "es", "lang": "es",

View File

@ -2,12 +2,16 @@
"id": "CVE-2024-23076", "id": "CVE-2024-23076",
"sourceIdentifier": "cve@mitre.org", "sourceIdentifier": "cve@mitre.org",
"published": "2024-04-10T12:15:09.190", "published": "2024-04-10T12:15:09.190",
"lastModified": "2024-04-10T13:23:38.787", "lastModified": "2024-04-11T19:15:16.170",
"vulnStatus": "Awaiting Analysis", "vulnStatus": "Awaiting Analysis",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
"value": "FreeChart v1.5.4 was discovered to contain a NullPointerException via the component /labels/BubbleXYItemLabelGenerator.java." "value": "JFreeChart v1.5.4 was discovered to contain a NullPointerException via the component /labels/BubbleXYItemLabelGenerator.java. NOTE: this is disputed by multiple third parties who believe there was not reasonable evidence to determine the existence of a vulnerability. The submission may have been based on a tool that is not sufficiently robust for vulnerability identification."
},
{
"lang": "es",
"value": "Se descubri\u00f3 que FreeChart v1.5.4 conten\u00eda una excepci\u00f3n NullPointerException a trav\u00e9s del componente /labels/BubbleXYItemLabelGenerator.java."
} }
], ],
"metrics": {}, "metrics": {},

View File

@ -2,12 +2,12 @@
"id": "CVE-2024-23077", "id": "CVE-2024-23077",
"sourceIdentifier": "cve@mitre.org", "sourceIdentifier": "cve@mitre.org",
"published": "2024-04-10T19:15:49.020", "published": "2024-04-10T19:15:49.020",
"lastModified": "2024-04-10T19:49:51.183", "lastModified": "2024-04-11T19:15:16.223",
"vulnStatus": "Awaiting Analysis", "vulnStatus": "Awaiting Analysis",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
"value": "JFreeChart v1.5.4 was discovered to be vulnerable to ArrayIndexOutOfBounds via the component /chart/plot/CompassPlot.java." "value": "JFreeChart v1.5.4 was discovered to be vulnerable to ArrayIndexOutOfBounds via the component /chart/plot/CompassPlot.java. NOTE: this is disputed by multiple third parties who believe there was not reasonable evidence to determine the existence of a vulnerability. The submission may have been based on a tool that is not sufficiently robust for vulnerability identification."
} }
], ],
"metrics": {}, "metrics": {},

View File

@ -2,12 +2,12 @@
"id": "CVE-2024-23078", "id": "CVE-2024-23078",
"sourceIdentifier": "cve@mitre.org", "sourceIdentifier": "cve@mitre.org",
"published": "2024-04-08T20:15:08.500", "published": "2024-04-08T20:15:08.500",
"lastModified": "2024-04-09T12:48:04.090", "lastModified": "2024-04-11T19:15:16.270",
"vulnStatus": "Awaiting Analysis", "vulnStatus": "Awaiting Analysis",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
"value": "JGraphT Core v1.5.2 was discovered to contain a NullPointerException via the component org.jgrapht.alg.util.ToleranceDoubleComparator::compare(Double, Double)." "value": "JGraphT Core v1.5.2 was discovered to contain a NullPointerException via the component org.jgrapht.alg.util.ToleranceDoubleComparator::compare(Double, Double). NOTE: this is disputed by multiple third parties who believe there was not reasonable evidence to determine the existence of a vulnerability. The submission may have been based on a tool that is not sufficiently robust for vulnerability identification."
}, },
{ {
"lang": "es", "lang": "es",

View File

@ -2,12 +2,12 @@
"id": "CVE-2024-23079", "id": "CVE-2024-23079",
"sourceIdentifier": "cve@mitre.org", "sourceIdentifier": "cve@mitre.org",
"published": "2024-04-08T23:15:07.703", "published": "2024-04-08T23:15:07.703",
"lastModified": "2024-04-09T12:48:04.090", "lastModified": "2024-04-11T19:15:16.317",
"vulnStatus": "Awaiting Analysis", "vulnStatus": "Awaiting Analysis",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
"value": "JGraphT Core v1.5.2 was discovered to contain a NullPointerException via the component org.jgrapht.alg.util.ToleranceDoubleComparator::compare(Double, Double)." "value": "JGraphT Core v1.5.2 was discovered to contain a NullPointerException via the component org.jgrapht.alg.util.ToleranceDoubleComparator::compare(Double, Double). NOTE: this is disputed by multiple third parties who believe there was not reasonable evidence to determine the existence of a vulnerability. The submission may have been based on a tool that is not sufficiently robust for vulnerability identification."
}, },
{ {
"lang": "es", "lang": "es",

View File

@ -2,12 +2,16 @@
"id": "CVE-2024-23080", "id": "CVE-2024-23080",
"sourceIdentifier": "cve@mitre.org", "sourceIdentifier": "cve@mitre.org",
"published": "2024-04-10T13:51:38.547", "published": "2024-04-10T13:51:38.547",
"lastModified": "2024-04-10T19:49:51.183", "lastModified": "2024-04-11T19:15:16.360",
"vulnStatus": "Awaiting Analysis", "vulnStatus": "Awaiting Analysis",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
"value": "Joda Time v2.12.5 was discovered to contain a NullPointerException via the component org.joda.time.format.PeriodFormat::wordBased(Locale)." "value": "Joda Time v2.12.5 was discovered to contain a NullPointerException via the component org.joda.time.format.PeriodFormat::wordBased(Locale). NOTE: this is disputed by multiple third parties who believe there was not reasonable evidence to determine the existence of a vulnerability. The submission may have been based on a tool that is not sufficiently robust for vulnerability identification."
},
{
"lang": "es",
"value": "Se descubri\u00f3 que Joda Time v2.12.5 conten\u00eda una NullPointerException a trav\u00e9s del componente org.joda.time.format.PeriodFormat::wordBased(Locale)."
} }
], ],
"metrics": {}, "metrics": {},

View File

@ -2,12 +2,12 @@
"id": "CVE-2024-23081", "id": "CVE-2024-23081",
"sourceIdentifier": "cve@mitre.org", "sourceIdentifier": "cve@mitre.org",
"published": "2024-04-08T23:15:07.757", "published": "2024-04-08T23:15:07.757",
"lastModified": "2024-04-09T12:48:04.090", "lastModified": "2024-04-11T19:15:16.410",
"vulnStatus": "Awaiting Analysis", "vulnStatus": "Awaiting Analysis",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
"value": "ThreeTen Backport v1.6.8 was discovered to contain a NullPointerException via the component org.threeten.bp.LocalDate::compareTo(ChronoLocalDate)." "value": "ThreeTen Backport v1.6.8 was discovered to contain a NullPointerException via the component org.threeten.bp.LocalDate::compareTo(ChronoLocalDate). NOTE: this is disputed by multiple third parties who believe there was not reasonable evidence to determine the existence of a vulnerability. The submission may have been based on a tool that is not sufficiently robust for vulnerability identification."
}, },
{ {
"lang": "es", "lang": "es",

View File

@ -2,12 +2,16 @@
"id": "CVE-2024-23082", "id": "CVE-2024-23082",
"sourceIdentifier": "cve@mitre.org", "sourceIdentifier": "cve@mitre.org",
"published": "2024-04-08T18:15:08.460", "published": "2024-04-08T18:15:08.460",
"lastModified": "2024-04-08T18:48:40.217", "lastModified": "2024-04-11T19:15:16.470",
"vulnStatus": "Awaiting Analysis", "vulnStatus": "Awaiting Analysis",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
"value": "ThreeTen Backport v1.6.8 was discovered to contain an integer overflow via the component org.threeten.bp.format.DateTimeFormatter::parse(CharSequence, ParsePosition)." "value": "ThreeTen Backport v1.6.8 was discovered to contain an integer overflow via the component org.threeten.bp.format.DateTimeFormatter::parse(CharSequence, ParsePosition). NOTE: this is disputed by multiple third parties who believe there was not reasonable evidence to determine the existence of a vulnerability. The submission may have been based on a tool that is not sufficiently robust for vulnerability identification."
},
{
"lang": "es",
"value": "Se descubri\u00f3 que ThreeTen Backport v1.6.8 contiene un desbordamiento de enteros a trav\u00e9s del componente org.treeten.bp.format.DateTimeFormatter::parse(CharSequence, ParsePosition)."
} }
], ],
"metrics": {}, "metrics": {},

View File

@ -2,12 +2,16 @@
"id": "CVE-2024-23083", "id": "CVE-2024-23083",
"sourceIdentifier": "cve@mitre.org", "sourceIdentifier": "cve@mitre.org",
"published": "2024-04-10T14:15:07.430", "published": "2024-04-10T14:15:07.430",
"lastModified": "2024-04-10T19:49:51.183", "lastModified": "2024-04-11T19:15:16.523",
"vulnStatus": "Awaiting Analysis", "vulnStatus": "Awaiting Analysis",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
"value": "Time4J Base v5.9.3 was discovered to contain a NullPointerException via the component net.time4j.format.internal.FormatUtils::useDefaultWeekmodel(Locale)." "value": "Time4J Base v5.9.3 was discovered to contain a NullPointerException via the component net.time4j.format.internal.FormatUtils::useDefaultWeekmodel(Locale). NOTE: this is disputed by multiple third parties who believe there was not reasonable evidence to determine the existence of a vulnerability. The submission may have been based on a tool that is not sufficiently robust for vulnerability identification."
},
{
"lang": "es",
"value": "Se descubri\u00f3 que Time4J Base v5.9.3 conten\u00eda una excepci\u00f3n NullPointerException a trav\u00e9s del componente net.time4j.format.internal.FormatUtils::useDefaultWeekmodel(Locale)."
} }
], ],
"metrics": {}, "metrics": {},

View File

@ -2,12 +2,12 @@
"id": "CVE-2024-23084", "id": "CVE-2024-23084",
"sourceIdentifier": "cve@mitre.org", "sourceIdentifier": "cve@mitre.org",
"published": "2024-04-08T23:15:07.803", "published": "2024-04-08T23:15:07.803",
"lastModified": "2024-04-09T12:48:04.090", "lastModified": "2024-04-11T19:15:16.573",
"vulnStatus": "Awaiting Analysis", "vulnStatus": "Awaiting Analysis",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
"value": "Apfloat v1.10.1 was discovered to contain an ArrayIndexOutOfBoundsException via the component org.apfloat.internal.DoubleCRTMath::add(double[], double[])." "value": "Apfloat v1.10.1 was discovered to contain an ArrayIndexOutOfBoundsException via the component org.apfloat.internal.DoubleCRTMath::add(double[], double[]). NOTE: this is disputed by multiple third parties who believe there was not reasonable evidence to determine the existence of a vulnerability. The submission may have been based on a tool that is not sufficiently robust for vulnerability identification."
}, },
{ {
"lang": "es", "lang": "es",

View File

@ -2,12 +2,12 @@
"id": "CVE-2024-23085", "id": "CVE-2024-23085",
"sourceIdentifier": "cve@mitre.org", "sourceIdentifier": "cve@mitre.org",
"published": "2024-04-08T20:15:08.567", "published": "2024-04-08T20:15:08.567",
"lastModified": "2024-04-09T12:48:04.090", "lastModified": "2024-04-11T19:15:16.620",
"vulnStatus": "Awaiting Analysis", "vulnStatus": "Awaiting Analysis",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
"value": "Apfloat v1.10.1 was discovered to contain a NullPointerException via the component org.apfloat.internal.DoubleScramble::scramble(double[], int, int[])." "value": "Apfloat v1.10.1 was discovered to contain a NullPointerException via the component org.apfloat.internal.DoubleScramble::scramble(double[], int, int[]). NOTE: this is disputed by multiple third parties who believe there was not reasonable evidence to determine the existence of a vulnerability. The submission may have been based on a tool that is not sufficiently robust for vulnerability identification."
}, },
{ {
"lang": "es", "lang": "es",

View File

@ -2,12 +2,12 @@
"id": "CVE-2024-23086", "id": "CVE-2024-23086",
"sourceIdentifier": "cve@mitre.org", "sourceIdentifier": "cve@mitre.org",
"published": "2024-04-08T20:15:08.620", "published": "2024-04-08T20:15:08.620",
"lastModified": "2024-04-09T12:48:04.090", "lastModified": "2024-04-11T19:15:16.670",
"vulnStatus": "Awaiting Analysis", "vulnStatus": "Awaiting Analysis",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
"value": "Apfloat v1.10.1 was discovered to contain a stack overflow via the component org.apfloat.internal.DoubleModMath::modPow(double." "value": "Apfloat v1.10.1 was discovered to contain a stack overflow via the component org.apfloat.internal.DoubleModMath::modPow(double. NOTE: this is disputed by multiple third parties who believe there was not reasonable evidence to determine the existence of a vulnerability. The submission may have been based on a tool that is not sufficiently robust for vulnerability identification."
}, },
{ {
"lang": "es", "lang": "es",

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2024-30271",
"sourceIdentifier": "psirt@adobe.com",
"published": "2024-04-11T18:15:07.090",
"lastModified": "2024-04-11T18:15:07.090",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Illustrator versions 28.3, 27.9.2 and earlier are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "psirt@adobe.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "psirt@adobe.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-787"
}
]
}
],
"references": [
{
"url": "https://helpx.adobe.com/security/products/illustrator/apsb24-25.html",
"source": "psirt@adobe.com"
}
]
}

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2024-30272",
"sourceIdentifier": "psirt@adobe.com",
"published": "2024-04-11T18:15:07.307",
"lastModified": "2024-04-11T18:15:07.307",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Illustrator versions 28.3, 27.9.2 and earlier are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "psirt@adobe.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "psirt@adobe.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-787"
}
]
}
],
"references": [
{
"url": "https://helpx.adobe.com/security/products/illustrator/apsb24-25.html",
"source": "psirt@adobe.com"
}
]
}

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2024-30273",
"sourceIdentifier": "psirt@adobe.com",
"published": "2024-04-11T18:15:07.510",
"lastModified": "2024-04-11T18:15:07.510",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Illustrator versions 28.3, 27.9.2 and earlier are affected by a Stack-based Buffer Overflow vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "psirt@adobe.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "psirt@adobe.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-121"
}
]
}
],
"references": [
{
"url": "https://helpx.adobe.com/security/products/illustrator/apsb24-25.html",
"source": "psirt@adobe.com"
}
]
}

View File

@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update ### Last Repository Update
```plain ```plain
2024-04-11T18:00:39.882622+00:00 2024-04-11T20:00:37.404662+00:00
``` ```
### Most recent CVE Modification Timestamp synchronized with NVD ### Most recent CVE Modification Timestamp synchronized with NVD
```plain ```plain
2024-04-11T17:15:30.427000+00:00 2024-04-11T19:15:16.670000+00:00
``` ```
### Last Data Feed Release ### Last Data Feed Release
@ -33,23 +33,35 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
### Total Number of included CVEs ### Total Number of included CVEs
```plain ```plain
245254 245257
``` ```
### CVEs added in the last Commit ### CVEs added in the last Commit
Recently added CVEs: `3` Recently added CVEs: `3`
- [CVE-2023-50949](CVE-2023/CVE-2023-509xx/CVE-2023-50949.json) (`2024-04-11T17:15:30.427`) - [CVE-2024-30271](CVE-2024/CVE-2024-302xx/CVE-2024-30271.json) (`2024-04-11T18:15:07.090`)
- [CVE-2024-0881](CVE-2024/CVE-2024-08xx/CVE-2024-0881.json) (`2024-04-11T16:15:24.800`) - [CVE-2024-30272](CVE-2024/CVE-2024-302xx/CVE-2024-30272.json) (`2024-04-11T18:15:07.307`)
- [CVE-2024-31678](CVE-2024/CVE-2024-316xx/CVE-2024-31678.json) (`2024-04-11T16:15:25.127`) - [CVE-2024-30273](CVE-2024/CVE-2024-302xx/CVE-2024-30273.json) (`2024-04-11T18:15:07.510`)
### CVEs modified in the last Commit ### CVEs modified in the last Commit
Recently modified CVEs: `1` Recently modified CVEs: `13`
- [CVE-2024-2866](CVE-2024/CVE-2024-28xx/CVE-2024-2866.json) (`2024-04-11T16:15:24.870`) - [CVE-2023-52070](CVE-2023/CVE-2023-520xx/CVE-2023-52070.json) (`2024-04-11T19:15:16.037`)
- [CVE-2024-22949](CVE-2024/CVE-2024-229xx/CVE-2024-22949.json) (`2024-04-11T19:15:16.113`)
- [CVE-2024-23076](CVE-2024/CVE-2024-230xx/CVE-2024-23076.json) (`2024-04-11T19:15:16.170`)
- [CVE-2024-23077](CVE-2024/CVE-2024-230xx/CVE-2024-23077.json) (`2024-04-11T19:15:16.223`)
- [CVE-2024-23078](CVE-2024/CVE-2024-230xx/CVE-2024-23078.json) (`2024-04-11T19:15:16.270`)
- [CVE-2024-23079](CVE-2024/CVE-2024-230xx/CVE-2024-23079.json) (`2024-04-11T19:15:16.317`)
- [CVE-2024-23080](CVE-2024/CVE-2024-230xx/CVE-2024-23080.json) (`2024-04-11T19:15:16.360`)
- [CVE-2024-23081](CVE-2024/CVE-2024-230xx/CVE-2024-23081.json) (`2024-04-11T19:15:16.410`)
- [CVE-2024-23082](CVE-2024/CVE-2024-230xx/CVE-2024-23082.json) (`2024-04-11T19:15:16.470`)
- [CVE-2024-23083](CVE-2024/CVE-2024-230xx/CVE-2024-23083.json) (`2024-04-11T19:15:16.523`)
- [CVE-2024-23084](CVE-2024/CVE-2024-230xx/CVE-2024-23084.json) (`2024-04-11T19:15:16.573`)
- [CVE-2024-23085](CVE-2024/CVE-2024-230xx/CVE-2024-23085.json) (`2024-04-11T19:15:16.620`)
- [CVE-2024-23086](CVE-2024/CVE-2024-230xx/CVE-2024-23086.json) (`2024-04-11T19:15:16.670`)
## Download and Usage ## Download and Usage

View File

@ -235442,7 +235442,7 @@ CVE-2023-50943,0,0,9de9b170e61e152149ef3400c6b47c1c1683e5f697e4225e96f5644f1c9cf
CVE-2023-50944,0,0,30d6475db55fa5214a0eb86acb7bde474255e9eb6366c067f979612f143e5789,2024-01-30T22:58:18.047000 CVE-2023-50944,0,0,30d6475db55fa5214a0eb86acb7bde474255e9eb6366c067f979612f143e5789,2024-01-30T22:58:18.047000
CVE-2023-50947,0,0,9d9c6311280a8f7937919991c5be0caaec13d505f0f919f091478b3a0eb44a28,2024-02-10T00:57:09.610000 CVE-2023-50947,0,0,9d9c6311280a8f7937919991c5be0caaec13d505f0f919f091478b3a0eb44a28,2024-02-10T00:57:09.610000
CVE-2023-50948,0,0,3c02519a72037dff711d5ee48432aa7f2b5638da69466874289b5ec8a9701c27,2024-01-11T17:00:50.077000 CVE-2023-50948,0,0,3c02519a72037dff711d5ee48432aa7f2b5638da69466874289b5ec8a9701c27,2024-01-11T17:00:50.077000
CVE-2023-50949,1,1,bd2eeb1d43281ce6e0dc5f44516b92d8a98e4798139be8c8f8390cc0c69793e9,2024-04-11T17:15:30.427000 CVE-2023-50949,0,0,bd2eeb1d43281ce6e0dc5f44516b92d8a98e4798139be8c8f8390cc0c69793e9,2024-04-11T17:15:30.427000
CVE-2023-50950,0,0,dfea2c60bf930725232ee8dec76ee1dc7db647db5a23e4d3c95d00ce14c241f2,2024-01-24T19:42:29.450000 CVE-2023-50950,0,0,dfea2c60bf930725232ee8dec76ee1dc7db647db5a23e4d3c95d00ce14c241f2,2024-01-24T19:42:29.450000
CVE-2023-50951,0,0,ac9a2ba6b69cc6219b314f88f75f8d16d80977a7838c8861bc4cc4a5a90b32d2,2024-02-20T19:50:53.960000 CVE-2023-50951,0,0,ac9a2ba6b69cc6219b314f88f75f8d16d80977a7838c8861bc4cc4a5a90b32d2,2024-02-20T19:50:53.960000
CVE-2023-50955,0,0,2dac25424bb634048955c93e845cd595a5737c34f7a73119031e8a018fd0e20a,2024-02-22T19:07:27.197000 CVE-2023-50955,0,0,2dac25424bb634048955c93e845cd595a5737c34f7a73119031e8a018fd0e20a,2024-02-22T19:07:27.197000
@ -236010,7 +236010,7 @@ CVE-2023-52064,0,0,d161416577f26fcbecd38bb973b8c964ce87228edb02a6ee42c92f03db6b0
CVE-2023-52068,0,0,46dc0fb42ad609daf31d3e02e701415ff11a96cf786461d87c5b67e664893e04,2024-01-22T19:53:08.497000 CVE-2023-52068,0,0,46dc0fb42ad609daf31d3e02e701415ff11a96cf786461d87c5b67e664893e04,2024-01-22T19:53:08.497000
CVE-2023-52069,0,0,770903ab1d55ddc9209197d2b9a5ac15e4c462725c148188d13afa72d2843b5a,2024-01-23T21:41:02.097000 CVE-2023-52069,0,0,770903ab1d55ddc9209197d2b9a5ac15e4c462725c148188d13afa72d2843b5a,2024-01-23T21:41:02.097000
CVE-2023-5207,0,0,68bb12ed05545b826662bd3f81bdb86f249305fd13af79b5c6ef464a8fb92564,2023-10-04T01:55:31.953000 CVE-2023-5207,0,0,68bb12ed05545b826662bd3f81bdb86f249305fd13af79b5c6ef464a8fb92564,2023-10-04T01:55:31.953000
CVE-2023-52070,0,0,74b9c81339cac8b7dfb6be70ad507723e107f8672d679f4dc3dc9d7a0c67c883,2024-04-10T19:49:51.183000 CVE-2023-52070,0,1,8966cb69ab112df374514f68f3740e32c894d7a9d7ef3e0954b2323fbfa4c980,2024-04-11T19:15:16.037000
CVE-2023-52071,0,0,ad965383e3002b3edaaabcd0d35cb4f0d481af86aa23ed4bd97e6efd9d6aa2dc,2024-02-23T09:15:21.867000 CVE-2023-52071,0,0,ad965383e3002b3edaaabcd0d35cb4f0d481af86aa23ed4bd97e6efd9d6aa2dc,2024-02-23T09:15:21.867000
CVE-2023-52072,0,0,02127eb9ae4273b1ad79732d9280cd4f630158412943ba361c9a56a2bce352ce,2024-01-11T20:05:45.403000 CVE-2023-52072,0,0,02127eb9ae4273b1ad79732d9280cd4f630158412943ba361c9a56a2bce352ce,2024-01-11T20:05:45.403000
CVE-2023-52073,0,0,123468189ce68f3cfbeab56f91e9e4c60c12979b9e605872064a295c45e39979,2024-01-11T20:05:37.137000 CVE-2023-52073,0,0,123468189ce68f3cfbeab56f91e9e4c60c12979b9e605872064a295c45e39979,2024-01-11T20:05:37.137000
@ -238859,7 +238859,7 @@ CVE-2024-0872,0,0,ada5775916c2cac4c195eaa3d280c11fbe735ac51fe2a74eac9940cadda51b
CVE-2024-0873,0,0,95754cd203c9a7796aab440a440d7aceb25e9f419f0726f1824dd4021e5694ea,2024-04-10T13:24:00.070000 CVE-2024-0873,0,0,95754cd203c9a7796aab440a440d7aceb25e9f419f0726f1824dd4021e5694ea,2024-04-10T13:24:00.070000
CVE-2024-0879,0,0,71dbf86688bbf3d39fdd16f3840204e31946256b985438bb8d263e8d387364ad,2024-01-31T19:16:07.630000 CVE-2024-0879,0,0,71dbf86688bbf3d39fdd16f3840204e31946256b985438bb8d263e8d387364ad,2024-01-31T19:16:07.630000
CVE-2024-0880,0,0,12dd80add99b4278efc505ba644272f57307bd9169ca281bf7019fd00c56c698,2024-04-11T01:24:11.007000 CVE-2024-0880,0,0,12dd80add99b4278efc505ba644272f57307bd9169ca281bf7019fd00c56c698,2024-04-11T01:24:11.007000
CVE-2024-0881,1,1,a54131dbe2db0be7af91dd421a66cdf6e1d3119d615e3ed285ad1362b7fa10f6,2024-04-11T16:15:24.800000 CVE-2024-0881,0,0,a54131dbe2db0be7af91dd421a66cdf6e1d3119d615e3ed285ad1362b7fa10f6,2024-04-11T16:15:24.800000
CVE-2024-0882,0,0,e76bfa499fa073969fa1373a3afdea70f0e1bf497e80578c905b9674f5689a35,2024-04-11T01:24:11.103000 CVE-2024-0882,0,0,e76bfa499fa073969fa1373a3afdea70f0e1bf497e80578c905b9674f5689a35,2024-04-11T01:24:11.103000
CVE-2024-0883,0,0,00a44d9a3355974533aaf203e591423357e542413d02bd2b075da4621ae51603,2024-04-11T01:24:11.197000 CVE-2024-0883,0,0,00a44d9a3355974533aaf203e591423357e542413d02bd2b075da4621ae51603,2024-04-11T01:24:11.197000
CVE-2024-0884,0,0,3ee0e8d74c812a9b0417625628bb93bebd86d3e96d99fb3be333fcbf90b56dc8,2024-04-11T01:24:11.290000 CVE-2024-0884,0,0,3ee0e8d74c812a9b0417625628bb93bebd86d3e96d99fb3be333fcbf90b56dc8,2024-04-11T01:24:11.290000
@ -241007,7 +241007,7 @@ CVE-2024-22938,0,0,d14c96ecc84394e0c226b15d653363af8f866fc8a362ffe8912d5673a5fc1
CVE-2024-22939,0,0,98ae5450b25ceaff1169d7851ac12cb3d1f8ed4212f5c71a0110eb042c52a6d7,2024-02-29T13:49:29.390000 CVE-2024-22939,0,0,98ae5450b25ceaff1169d7851ac12cb3d1f8ed4212f5c71a0110eb042c52a6d7,2024-02-29T13:49:29.390000
CVE-2024-2294,0,0,7adaa24a33704366500d65a38c52ba5d5887ad22bed1bd0562d7b36efb6d901e,2024-03-17T22:38:29.433000 CVE-2024-2294,0,0,7adaa24a33704366500d65a38c52ba5d5887ad22bed1bd0562d7b36efb6d901e,2024-03-17T22:38:29.433000
CVE-2024-22942,0,0,27e1b96b16010d66938a1930cd0293d602396f85521af099c802bf269035b527,2024-01-18T15:15:47.273000 CVE-2024-22942,0,0,27e1b96b16010d66938a1930cd0293d602396f85521af099c802bf269035b527,2024-01-18T15:15:47.273000
CVE-2024-22949,0,0,5a39ec4e6a69cf95914d802d151998eb5762c2e80f80af227e65b64f7b64e313,2024-04-09T12:48:04.090000 CVE-2024-22949,0,1,03d6827f41bb06eac79397128b1e202ff15f9ad974eb2b9788a10fca24f98746,2024-04-11T19:15:16.113000
CVE-2024-22955,0,0,4ae6e1e162ac27be2c1563f300454f76989ec1b9814e0f4be1652f56a6f11be5,2024-01-25T14:54:48.427000 CVE-2024-22955,0,0,4ae6e1e162ac27be2c1563f300454f76989ec1b9814e0f4be1652f56a6f11be5,2024-01-25T14:54:48.427000
CVE-2024-22956,0,0,2da6b272cb072bcb92b74c4c5c3faca0048e5b46583e9ffdd9571398ebecd789,2024-01-25T14:55:01.053000 CVE-2024-22956,0,0,2da6b272cb072bcb92b74c4c5c3faca0048e5b46583e9ffdd9571398ebecd789,2024-01-25T14:55:01.053000
CVE-2024-22957,0,0,045bad9ba8bb739147d8dcd83b4e5a0ded4b848e11c744629a53c265926b4f4e,2024-01-25T14:59:59.737000 CVE-2024-22957,0,0,045bad9ba8bb739147d8dcd83b4e5a0ded4b848e11c744629a53c265926b4f4e,2024-01-25T14:59:59.737000
@ -241035,18 +241035,18 @@ CVE-2024-2306,0,0,bc5118b4183fb8d85b363074da38c21425d73c04ce07dac09760780e15d985
CVE-2024-23060,0,0,293f3db63669f513fdf6243d872feab4a40014b3abd2eff3b8edca7a0ed1b3d3,2024-01-18T15:17:35.587000 CVE-2024-23060,0,0,293f3db63669f513fdf6243d872feab4a40014b3abd2eff3b8edca7a0ed1b3d3,2024-01-18T15:17:35.587000
CVE-2024-23061,0,0,d40b225d92d8f0f0d47201622b24e50bc3550ed3e56a2682a133a8aeae5027e3,2024-01-18T15:18:14.357000 CVE-2024-23061,0,0,d40b225d92d8f0f0d47201622b24e50bc3550ed3e56a2682a133a8aeae5027e3,2024-01-18T15:18:14.357000
CVE-2024-2307,0,0,4b089dd0281a455952ab30b1c14e2b1725f875efc3e98fe223b3d9160259d255,2024-03-20T13:00:16.367000 CVE-2024-2307,0,0,4b089dd0281a455952ab30b1c14e2b1725f875efc3e98fe223b3d9160259d255,2024-03-20T13:00:16.367000
CVE-2024-23076,0,0,52c255ca9ab7781385d8e3020a001d7970b1a5ca7171525999c588fa36537326,2024-04-10T13:23:38.787000 CVE-2024-23076,0,1,700ca636baaf983297d803f7f456b25aa5c602cae51535b97505ad7243477397,2024-04-11T19:15:16.170000
CVE-2024-23077,0,0,4c56b5fddcba18deb13531c7da543e19113d1c46412db123578c47ef01f32139,2024-04-10T19:49:51.183000 CVE-2024-23077,0,1,df31910c1e429b1e9f298bd00c0b1f1808de437ccbe476ca6824b67d02870831,2024-04-11T19:15:16.223000
CVE-2024-23078,0,0,9d7aaea68d8acb3538ca428049148f2dac206a89706e35d40108cb3eb8be6ee5,2024-04-09T12:48:04.090000 CVE-2024-23078,0,1,7542b39a6d77d318cffec2a0d48f88fc80581f152adedc13166a11343c2a6b36,2024-04-11T19:15:16.270000
CVE-2024-23079,0,0,c1744d41ef3d7ad1d99296d598f8fcec333fcf26813851f4f429e9678b14abb3,2024-04-09T12:48:04.090000 CVE-2024-23079,0,1,0e48d79f0a15a7541c0b37162a74d592ae7fd494b012db345a4a7c0c62a4ecb4,2024-04-11T19:15:16.317000
CVE-2024-2308,0,0,e35ab419c5c511708eb8574821633f88a1168237ea61ded1d7aa5b331f06479a,2024-03-17T22:38:29.433000 CVE-2024-2308,0,0,e35ab419c5c511708eb8574821633f88a1168237ea61ded1d7aa5b331f06479a,2024-03-17T22:38:29.433000
CVE-2024-23080,0,0,2d72ee15a636c06d79451cf099c7178af5ef05efb3d159e49bf2c8ed8e66d945,2024-04-10T19:49:51.183000 CVE-2024-23080,0,1,0dc870fc34ca263494d91a1d4277ef25dd449969d7da35594508801303b52305,2024-04-11T19:15:16.360000
CVE-2024-23081,0,0,9fa2a613be75462894d464b8e34e68b6da9b9d59d63e22685e547814dd9a5ab9,2024-04-09T12:48:04.090000 CVE-2024-23081,0,1,37f1c5a50e9747e6a908a6795ae398bb43a7c1ac49d25256bee9702ed2265fc4,2024-04-11T19:15:16.410000
CVE-2024-23082,0,0,0a9e38aa01f043532a8be7b3040bd9f24c4cb812cc5c2c38c18325d962369a71,2024-04-08T18:48:40.217000 CVE-2024-23082,0,1,4927d1876ebf507acbbf9d7013f9a52a8f10cfd1604412dbf3b1d67af64d98e9,2024-04-11T19:15:16.470000
CVE-2024-23083,0,0,ae8313200a6da4d29d95ed3fd5fa28ce3e6cd133bf222ee1491a75d948506409,2024-04-10T19:49:51.183000 CVE-2024-23083,0,1,8a46cc09679b624942342c2da2ca06884962c092bd89812e0271f88f22f9435a,2024-04-11T19:15:16.523000
CVE-2024-23084,0,0,82d7094530d5cd6c77dbe215344f65b7328c1ecf1670686e248abcdd712b3b36,2024-04-09T12:48:04.090000 CVE-2024-23084,0,1,2d04cef8c6b37f78b757c3809ebaf1c23e3bc250ee3bdff2ab0ebb977d593daa,2024-04-11T19:15:16.573000
CVE-2024-23085,0,0,f435d93167b9f4a31bec2831629dfa7b34bb533a49bb29329c43fee636db5bac,2024-04-09T12:48:04.090000 CVE-2024-23085,0,1,27d0f44875030ba128821d0a5604f24565f110d196fa9a9783c10c633bc8b87a,2024-04-11T19:15:16.620000
CVE-2024-23086,0,0,d8559a198e6f56b9e1a9a9c93fee6add743a34a70b05d723355a013a78276599,2024-04-09T12:48:04.090000 CVE-2024-23086,0,1,84287977eab241265f69ad39dd1efe49fbc488d3bee216c68604fc835c00c346,2024-04-11T19:15:16.670000
CVE-2024-23094,0,0,8b7fd2c37601b9f636934db44ed8e567ef20eff4d921df465afdbb6ef925a041,2024-02-22T19:07:27.197000 CVE-2024-23094,0,0,8b7fd2c37601b9f636934db44ed8e567ef20eff4d921df465afdbb6ef925a041,2024-02-22T19:07:27.197000
CVE-2024-23108,0,0,4bd66ae4e2150cd9c3073e095bacf489de77af9a273b611e130c3e3fa4edf7ea,2024-02-07T15:02:00.203000 CVE-2024-23108,0,0,4bd66ae4e2150cd9c3073e095bacf489de77af9a273b611e130c3e3fa4edf7ea,2024-02-07T15:02:00.203000
CVE-2024-23109,0,0,c2686a38cd2651bfef8ab0e98ee0dbcce98e98fd7c1f1805290cb9df9c03fe78,2024-02-07T15:04:28.237000 CVE-2024-23109,0,0,c2686a38cd2651bfef8ab0e98ee0dbcce98e98fd7c1f1805290cb9df9c03fe78,2024-02-07T15:04:28.237000
@ -243802,7 +243802,7 @@ CVE-2024-28639,0,0,329b7b8ad88c37a706d7a70398ba531ff9e74bf0911225af5f9e1a6b5cf5a
CVE-2024-2864,0,0,1aedd87fc58891bfced0cf84913cc38a985cc16fc422e05e5d28bea02686210b,2024-03-25T13:47:14.087000 CVE-2024-2864,0,0,1aedd87fc58891bfced0cf84913cc38a985cc16fc422e05e5d28bea02686210b,2024-03-25T13:47:14.087000
CVE-2024-28640,0,0,e4f9177f5bcd97210c5334738dfd8748ea6c1196b829523c5ee5f16ed9874073,2024-03-17T22:38:29.433000 CVE-2024-28640,0,0,e4f9177f5bcd97210c5334738dfd8748ea6c1196b829523c5ee5f16ed9874073,2024-03-17T22:38:29.433000
CVE-2024-2865,0,0,b112553debad5e10152e5bdccb20c93c0d6578c3f79ccf552d74c99c8c746fcd,2024-03-25T16:43:06.137000 CVE-2024-2865,0,0,b112553debad5e10152e5bdccb20c93c0d6578c3f79ccf552d74c99c8c746fcd,2024-03-25T16:43:06.137000
CVE-2024-2866,0,1,465c2e11d3bc4e1dcb66c1b8adc97e41b9833e464897ffa8b5116a3cf594e97d,2024-04-11T16:15:24.870000 CVE-2024-2866,0,0,465c2e11d3bc4e1dcb66c1b8adc97e41b9833e464897ffa8b5116a3cf594e97d,2024-04-11T16:15:24.870000
CVE-2024-28662,0,0,69ece6d6842931df6f24b49f57aa09e3d2ee5159729500803e8b5fa3837da086,2024-03-14T12:52:16.723000 CVE-2024-28662,0,0,69ece6d6842931df6f24b49f57aa09e3d2ee5159729500803e8b5fa3837da086,2024-03-14T12:52:16.723000
CVE-2024-28665,0,0,3da970721fb98fa61e50e971271bd0e638eaf6e4b5ee261eac2ece4940b67793,2024-03-13T14:28:45.217000 CVE-2024-28665,0,0,3da970721fb98fa61e50e971271bd0e638eaf6e4b5ee261eac2ece4940b67793,2024-03-13T14:28:45.217000
CVE-2024-28666,0,0,0a602d6f38395f6173995d550028f5ef3d41196962b1541950032a732a9f8cc0,2024-03-13T14:28:45.217000 CVE-2024-28666,0,0,0a602d6f38395f6173995d550028f5ef3d41196962b1541950032a732a9f8cc0,2024-03-13T14:28:45.217000
@ -244488,6 +244488,9 @@ CVE-2024-30265,0,0,8b7bd77316a7922f3fb99eedf42325c9dfd214ba3a070dae26dd8c71a6913
CVE-2024-30266,0,0,e3c467c9914201aad848d0a5b4b17739ce57c9b602514a7cf905d903659d55fa,2024-04-04T16:33:06.610000 CVE-2024-30266,0,0,e3c467c9914201aad848d0a5b4b17739ce57c9b602514a7cf905d903659d55fa,2024-04-04T16:33:06.610000
CVE-2024-30269,0,0,08dc53837ae3c49db915ca6fbf68dbca18e8552aca089682c64e540b3e2addf0,2024-04-08T18:48:40.217000 CVE-2024-30269,0,0,08dc53837ae3c49db915ca6fbf68dbca18e8552aca089682c64e540b3e2addf0,2024-04-08T18:48:40.217000
CVE-2024-30270,0,0,1d63c3afc5f402042a52c95204320e8698a660fcf024b4b1cd2dbe82419521bf,2024-04-05T12:40:52.763000 CVE-2024-30270,0,0,1d63c3afc5f402042a52c95204320e8698a660fcf024b4b1cd2dbe82419521bf,2024-04-05T12:40:52.763000
CVE-2024-30271,1,1,467452667eddfa0feca2162eb0646445420c7bef403eafd1c63ffaca3025ab5b,2024-04-11T18:15:07.090000
CVE-2024-30272,1,1,bf8bce7ac6d26984a7aa484aae5289d7d2ea3038b8b7fb23c10b911d639a6f9c,2024-04-11T18:15:07.307000
CVE-2024-30273,1,1,1a2b6fa316e99cf2c663de1d9a0d9422d56c23674d03d10d580a3aa522413a45,2024-04-11T18:15:07.510000
CVE-2024-3030,0,0,88c29228ef56d61e184f00d5d8d99ea5dd9800435eeb42a07f389309c9f00688,2024-04-04T12:48:41.700000 CVE-2024-3030,0,0,88c29228ef56d61e184f00d5d8d99ea5dd9800435eeb42a07f389309c9f00688,2024-04-04T12:48:41.700000
CVE-2024-30322,0,0,82127178dd2c4390457a625b1b802dc21960ed844c23f33ac3f61e8d8c162a4f,2024-04-03T17:24:18.150000 CVE-2024-30322,0,0,82127178dd2c4390457a625b1b802dc21960ed844c23f33ac3f61e8d8c162a4f,2024-04-03T17:24:18.150000
CVE-2024-30323,0,0,4ba71c995b9c718766f72cb8f425ef56f31d70d4141fb317ff1b84d1d4bea62f,2024-04-03T17:24:18.150000 CVE-2024-30323,0,0,4ba71c995b9c718766f72cb8f425ef56f31d70d4141fb317ff1b84d1d4bea62f,2024-04-03T17:24:18.150000
@ -245003,7 +245006,7 @@ CVE-2024-3162,0,0,7209bf9b1b4a4f41543ae01bfd19e9aec1dd355164cd1434a8cb5548ea161c
CVE-2024-3164,0,0,7f780c294c8831979bff32bef1a48b2e6fa61521035bd6f029f476ca7c0385b5,2024-04-11T01:25:55.603000 CVE-2024-3164,0,0,7f780c294c8831979bff32bef1a48b2e6fa61521035bd6f029f476ca7c0385b5,2024-04-11T01:25:55.603000
CVE-2024-3165,0,0,de9c55d425cf1712b174cf5953c3fab2e18950a6202399f31519128938dc300f,2024-04-02T12:50:42.233000 CVE-2024-3165,0,0,de9c55d425cf1712b174cf5953c3fab2e18950a6202399f31519128938dc300f,2024-04-02T12:50:42.233000
CVE-2024-3167,0,0,588aeff7b6a3f0765daeb7f9f263a3ad6de4b6b1df80e4179885c415f61ea66c,2024-04-10T13:23:38.787000 CVE-2024-3167,0,0,588aeff7b6a3f0765daeb7f9f263a3ad6de4b6b1df80e4179885c415f61ea66c,2024-04-10T13:23:38.787000
CVE-2024-31678,1,1,de45433236bbba8f748694b8f39f0b50695c1deba3ed0ccfab1c7c8de96cc7fc,2024-04-11T16:15:25.127000 CVE-2024-31678,0,0,de45433236bbba8f748694b8f39f0b50695c1deba3ed0ccfab1c7c8de96cc7fc,2024-04-11T16:15:25.127000
CVE-2024-3178,0,0,e1b2edc538f836ffb506a17d476e0f961db2588242ddd1b2358ad3487cd818bf,2024-04-04T12:48:41.700000 CVE-2024-3178,0,0,e1b2edc538f836ffb506a17d476e0f961db2588242ddd1b2358ad3487cd818bf,2024-04-04T12:48:41.700000
CVE-2024-3179,0,0,5abb24f6a5051585dee8d043e9230e5c2a9202caf7e3c5044373b856d11a8a98,2024-04-04T12:48:41.700000 CVE-2024-3179,0,0,5abb24f6a5051585dee8d043e9230e5c2a9202caf7e3c5044373b856d11a8a98,2024-04-04T12:48:41.700000
CVE-2024-3180,0,0,cb7e6ecd5dde884356237a2b2dbf7b6ac67d07b2baecdd8da937f602eadd96a4,2024-04-04T12:48:41.700000 CVE-2024-3180,0,0,cb7e6ecd5dde884356237a2b2dbf7b6ac67d07b2baecdd8da937f602eadd96a4,2024-04-04T12:48:41.700000

Can't render this file because it is too large.