Auto-Update: 2024-04-29T18:00:40.951932+00:00

This commit is contained in:
cad-safe-bot 2024-04-29 18:03:31 +00:00
parent 9fa00551d2
commit 0b3c378ba4
18 changed files with 553 additions and 29 deletions

View File

@ -0,0 +1,24 @@
{
"id": "CVE-2023-46270",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-04-29T16:15:34.600",
"lastModified": "2024-04-29T16:15:34.600",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "MacPaw The Unarchiver before 4.3.6 contains vulnerability related to missing quarantine attributes for extracted items."
}
],
"metrics": {},
"references": [
{
"url": "https://theunarchiver.com",
"source": "cve@mitre.org"
},
{
"url": "https://updates.devmate.com/releasenotes/143/com.macpaw.site.theunarchiver.html",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2023-48683",
"sourceIdentifier": "security@acronis.com",
"published": "2024-04-29T16:15:34.670",
"lastModified": "2024-04-29T16:15:34.670",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Sensitive information disclosure and manipulation due to missing authorization. The following products are affected: Acronis Cyber Protect Cloud Agent (Linux, macOS, Windows) before build 37758."
}
],
"metrics": {
"cvssMetricV30": [
{
"source": "security@acronis.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "NONE",
"baseScore": 7.1,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.2
}
]
},
"weaknesses": [
{
"source": "security@acronis.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-862"
}
]
}
],
"references": [
{
"url": "https://security-advisory.acronis.com/advisories/SEC-5899",
"source": "security@acronis.com"
}
]
}

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2023-48684",
"sourceIdentifier": "security@acronis.com",
"published": "2024-04-29T16:15:34.887",
"lastModified": "2024-04-29T16:15:34.887",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Sensitive information disclosure and manipulation due to missing authorization. The following products are affected: Acronis Cyber Protect Cloud Agent (Linux, macOS, Windows) before build 37758."
}
],
"metrics": {
"cvssMetricV30": [
{
"source": "security@acronis.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "NONE",
"baseScore": 7.1,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.2
}
]
},
"weaknesses": [
{
"source": "security@acronis.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-862"
}
]
}
],
"references": [
{
"url": "https://security-advisory.acronis.com/advisories/SEC-6021",
"source": "security@acronis.com"
}
]
}

View File

@ -0,0 +1,24 @@
{
"id": "CVE-2024-23995",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-04-29T16:15:35.070",
"lastModified": "2024-04-29T16:15:35.070",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Cross Site Scripting (XSS) in Beekeeper Studio 4.1.13 and earlier allows remote attackers to execute arbitrary code in the column name of a database table in tabulator-popup-container."
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/EQSTLab/PoC/blob/main/2024/RCE/CVE-2024-23995/README.md",
"source": "cve@mitre.org"
},
{
"url": "https://www.beekeeperstudio.io/",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,24 @@
{
"id": "CVE-2024-31621",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-04-29T17:15:19.057",
"lastModified": "2024-04-29T17:15:19.057",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "An issue in FlowiseAI Inc Flowise v.1.6.2 and before allows a remote attacker to execute arbitrary code via a crafted script to the api/v1 component."
}
],
"metrics": {},
"references": [
{
"url": "https://flowiseai.com/",
"source": "cve@mitre.org"
},
{
"url": "https://www.exploit-db.com/exploits/52001",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2024-32268",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-04-29T16:15:35.130",
"lastModified": "2024-04-29T16:15:35.130",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "An issue in Tuya Smart camera U6N v.3.2.5 allows a remote attacker to cause a denial of service via a crafted packet to the network connection component."
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/kzLiu2017/Tuya_Cam_CVE_Doc/blob/main/U6N-CVE-Document.pdf",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2024-32269",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-04-29T17:15:19.130",
"lastModified": "2024-04-29T17:15:19.130",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "An issue in Yonganda YAD-LOJ V3.0.561 allows a remote attacker to cause a denial of service via a crafted packet."
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/kzLiu2017/Tuya_Cam_CVE_Doc/blob/main/YAD-LOJ-Camera.pdf",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,24 @@
{
"id": "CVE-2024-32491",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-04-29T17:15:19.183",
"lastModified": "2024-04-29T17:15:19.183",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "An issue was discovered in Znuny and Znuny LTS 6.0.31 through 6.5.7 and Znuny 7.0.1 through 7.0.16 where a logged-in user can upload a file (via a manipulated AJAX Request) to an arbitrary writable location by traversing paths. Arbitrary code can be executed if this location is publicly available through the web server."
}
],
"metrics": {},
"references": [
{
"url": "https://www.znuny.org/en/advisories/zsa-2024-01",
"source": "cve@mitre.org"
},
{
"url": "https://znuny.com",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,24 @@
{
"id": "CVE-2024-32492",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-04-29T17:15:19.243",
"lastModified": "2024-04-29T17:15:19.243",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "An issue was discovered in Znuny 7.0.1 through 7.0.16 where the ticket detail view in the customer front allows the execution of external JavaScript."
}
],
"metrics": {},
"references": [
{
"url": "https://www.znuny.org/en/advisories/zsa-2024-02",
"source": "cve@mitre.org"
},
{
"url": "https://znuny.com",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,24 @@
{
"id": "CVE-2024-32493",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-04-29T17:15:19.300",
"lastModified": "2024-04-29T17:15:19.300",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "An issue was discovered in Znuny LTS 6.5.1 through 6.5.7 and Znuny 7.0.1 through 7.0.16 where a logged-in agent is able to inject SQL in the draft form ID parameter of an AJAX request."
}
],
"metrics": {},
"references": [
{
"url": "https://www.znuny.org/en/advisories/zsa-2024-03",
"source": "cve@mitre.org"
},
{
"url": "https://znuny.com",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,28 @@
{
"id": "CVE-2024-33444",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-04-29T17:15:19.357",
"lastModified": "2024-04-29T17:15:19.357",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "SQL injection vulnerability in onethink v.1.1 allows a remote attacker to escalate privileges via a crafted script to the ModelModel.class.php component."
}
],
"metrics": {},
"references": [
{
"url": "https://gist.github.com/LioTree/1971a489dd5ff619b89e7a9e1da91152",
"source": "cve@mitre.org"
},
{
"url": "https://github.com/liu21st/onethink",
"source": "cve@mitre.org"
},
{
"url": "https://github.com/liu21st/onethink/issues/39",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,24 @@
{
"id": "CVE-2024-33445",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-04-29T17:15:19.410",
"lastModified": "2024-04-29T17:15:19.410",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "An issue in hisiphp v2.0.111 allows a remote attacker to execute arbitrary code via a crafted script to the SystemPlugins::mkInfo parameter in the SystemPlugins.php component."
}
],
"metrics": {},
"references": [
{
"url": "https://gist.github.com/LioTree/04a4ece38df53af4027d52b2aeb7aff6",
"source": "cve@mitre.org"
},
{
"url": "https://github.com/hisiphp/hisiphp/issues/11",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,24 @@
{
"id": "CVE-2024-33449",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-04-29T17:15:19.470",
"lastModified": "2024-04-29T17:15:19.470",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "An SSRF issue in the PDFMyURL service allows a remote attacker to obtain sensitive information and execute arbitrary code via a POST request in the url parameter"
}
],
"metrics": {},
"references": [
{
"url": "https://grumpz.net/uncovering-an-ssrf-vulnerability-in-pdfmyurl-affecting-numerous-users",
"source": "cve@mitre.org"
},
{
"url": "https://pdfmyurl.com/",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2024-34010",
"sourceIdentifier": "security@acronis.com",
"published": "2024-04-29T16:15:35.187",
"lastModified": "2024-04-29T16:15:35.187",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Local privilege escalation due to unquoted search path vulnerability. The following products are affected: Acronis Cyber Protect Cloud Agent (Windows) before build 37758."
}
],
"metrics": {
"cvssMetricV30": [
{
"source": "security@acronis.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.2,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.5,
"impactScore": 6.0
}
]
},
"weaknesses": [
{
"source": "security@acronis.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-428"
}
]
}
],
"references": [
{
"url": "https://security-advisory.acronis.com/advisories/SEC-7110",
"source": "security@acronis.com"
}
]
}

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2024-34011",
"sourceIdentifier": "security@acronis.com",
"published": "2024-04-29T16:15:35.380",
"lastModified": "2024-04-29T16:15:35.380",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Local privilege escalation due to insecure folder permissions. The following products are affected: Acronis Cyber Protect Cloud Agent (Windows) before build 37758."
}
],
"metrics": {
"cvssMetricV30": [
{
"source": "security@acronis.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:L",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "LOW",
"baseScore": 6.8,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.3,
"impactScore": 5.5
}
]
},
"weaknesses": [
{
"source": "security@acronis.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-276"
}
]
}
],
"references": [
{
"url": "https://security-advisory.acronis.com/advisories/SEC-7171",
"source": "security@acronis.com"
}
]
}

View File

@ -0,0 +1,24 @@
{
"id": "CVE-2024-34020",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-04-29T16:15:35.570",
"lastModified": "2024-04-29T16:15:35.570",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "A stack-based buffer overflow was found in the putSDN() function of mail.c in hcode through 2.1."
}
],
"metrics": {},
"references": [
{
"url": "http://ftp.kaist.ac.kr/hangul/code/hcode/",
"source": "cve@mitre.org"
},
{
"url": "https://bugzilla.suse.com/show_bug.cgi?id=1223534",
"source": "cve@mitre.org"
}
]
}

View File

@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update
```plain
2024-04-29T16:00:30.006196+00:00
2024-04-29T18:00:40.951932+00:00
```
### Most recent CVE Modification Timestamp synchronized with NVD
```plain
2024-04-29T14:15:08.727000+00:00
2024-04-29T17:15:19.470000+00:00
```
### Last Data Feed Release
@ -33,31 +33,35 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
### Total Number of included CVEs
```plain
247103
247119
```
### CVEs added in the last Commit
Recently added CVEs: `2`
Recently added CVEs: `16`
- [CVE-2024-1579](CVE-2024/CVE-2024-15xx/CVE-2024-1579.json) (`2024-04-29T14:15:08.120`)
- [CVE-2024-1969](CVE-2024/CVE-2024-19xx/CVE-2024-1969.json) (`2024-04-29T14:15:08.430`)
- [CVE-2023-46270](CVE-2023/CVE-2023-462xx/CVE-2023-46270.json) (`2024-04-29T16:15:34.600`)
- [CVE-2023-48683](CVE-2023/CVE-2023-486xx/CVE-2023-48683.json) (`2024-04-29T16:15:34.670`)
- [CVE-2023-48684](CVE-2023/CVE-2023-486xx/CVE-2023-48684.json) (`2024-04-29T16:15:34.887`)
- [CVE-2024-23995](CVE-2024/CVE-2024-239xx/CVE-2024-23995.json) (`2024-04-29T16:15:35.070`)
- [CVE-2024-31621](CVE-2024/CVE-2024-316xx/CVE-2024-31621.json) (`2024-04-29T17:15:19.057`)
- [CVE-2024-32268](CVE-2024/CVE-2024-322xx/CVE-2024-32268.json) (`2024-04-29T16:15:35.130`)
- [CVE-2024-32269](CVE-2024/CVE-2024-322xx/CVE-2024-32269.json) (`2024-04-29T17:15:19.130`)
- [CVE-2024-32491](CVE-2024/CVE-2024-324xx/CVE-2024-32491.json) (`2024-04-29T17:15:19.183`)
- [CVE-2024-32492](CVE-2024/CVE-2024-324xx/CVE-2024-32492.json) (`2024-04-29T17:15:19.243`)
- [CVE-2024-32493](CVE-2024/CVE-2024-324xx/CVE-2024-32493.json) (`2024-04-29T17:15:19.300`)
- [CVE-2024-33444](CVE-2024/CVE-2024-334xx/CVE-2024-33444.json) (`2024-04-29T17:15:19.357`)
- [CVE-2024-33445](CVE-2024/CVE-2024-334xx/CVE-2024-33445.json) (`2024-04-29T17:15:19.410`)
- [CVE-2024-33449](CVE-2024/CVE-2024-334xx/CVE-2024-33449.json) (`2024-04-29T17:15:19.470`)
- [CVE-2024-34010](CVE-2024/CVE-2024-340xx/CVE-2024-34010.json) (`2024-04-29T16:15:35.187`)
- [CVE-2024-34011](CVE-2024/CVE-2024-340xx/CVE-2024-34011.json) (`2024-04-29T16:15:35.380`)
- [CVE-2024-34020](CVE-2024/CVE-2024-340xx/CVE-2024-34020.json) (`2024-04-29T16:15:35.570`)
### CVEs modified in the last Commit
Recently modified CVEs: `10`
Recently modified CVEs: `0`
- [CVE-2023-40546](CVE-2023/CVE-2023-405xx/CVE-2023-40546.json) (`2024-04-29T14:15:07.383`)
- [CVE-2023-40547](CVE-2023/CVE-2023-405xx/CVE-2023-40547.json) (`2024-04-29T14:15:07.543`)
- [CVE-2023-40548](CVE-2023/CVE-2023-405xx/CVE-2023-40548.json) (`2024-04-29T14:15:07.680`)
- [CVE-2023-40549](CVE-2023/CVE-2023-405xx/CVE-2023-40549.json) (`2024-04-29T14:15:07.807`)
- [CVE-2023-40550](CVE-2023/CVE-2023-405xx/CVE-2023-40550.json) (`2024-04-29T14:15:07.910`)
- [CVE-2023-40551](CVE-2023/CVE-2023-405xx/CVE-2023-40551.json) (`2024-04-29T14:15:08.007`)
- [CVE-2024-1753](CVE-2024/CVE-2024-17xx/CVE-2024-1753.json) (`2024-04-29T14:15:08.310`)
- [CVE-2024-30203](CVE-2024/CVE-2024-302xx/CVE-2024-30203.json) (`2024-04-29T14:15:08.613`)
- [CVE-2024-30204](CVE-2024/CVE-2024-302xx/CVE-2024-30204.json) (`2024-04-29T14:15:08.683`)
- [CVE-2024-30205](CVE-2024/CVE-2024-302xx/CVE-2024-30205.json) (`2024-04-29T14:15:08.727`)
## Download and Usage

View File

@ -229019,13 +229019,13 @@ CVE-2023-40541,0,0,22a9285aa1b8eaf9b78df89c2cbb56f1e6618929d807faee9dc240a09c8ba
CVE-2023-40542,0,0,11b6cee368035492cc0902cbd689ed768c381493a72ea99cc6412d219fc6a963,2023-10-17T19:43:55.697000
CVE-2023-40544,0,0,8edafee03220c010d1be42f0f88433974482550243d48b064788fcb74f868b01,2024-02-12T16:43:42.320000
CVE-2023-40545,0,0,9bca2c73be74af7f189b3862ba8d7799cfe8ca7403c861883fba27fbc72753b2,2024-02-13T21:08:23.400000
CVE-2023-40546,0,1,1ddeac5f194f063aae577edee72cd747e93ea9135d9ae1c5d7b4289ce24e2abb,2024-04-29T14:15:07.383000
CVE-2023-40547,0,1,865a5ae6eb55dfa788508ca8a154799c5b2e4da3eb1092951308a1c53332e912,2024-04-29T14:15:07.543000
CVE-2023-40548,0,1,a08ab49671acfaa41aba7e35e409bdce6fb74da098a445cf639efbc864202dd2,2024-04-29T14:15:07.680000
CVE-2023-40549,0,1,2dca77dad5937812b745a51a756d187eede356959532cb6b279202a73058b056,2024-04-29T14:15:07.807000
CVE-2023-40546,0,0,1ddeac5f194f063aae577edee72cd747e93ea9135d9ae1c5d7b4289ce24e2abb,2024-04-29T14:15:07.383000
CVE-2023-40547,0,0,865a5ae6eb55dfa788508ca8a154799c5b2e4da3eb1092951308a1c53332e912,2024-04-29T14:15:07.543000
CVE-2023-40548,0,0,a08ab49671acfaa41aba7e35e409bdce6fb74da098a445cf639efbc864202dd2,2024-04-29T14:15:07.680000
CVE-2023-40549,0,0,2dca77dad5937812b745a51a756d187eede356959532cb6b279202a73058b056,2024-04-29T14:15:07.807000
CVE-2023-4055,0,0,a76fc1fa0e45973f400a49513a2db89a2627bd4fbf5c01947ac1c4f676cd8aeb,2023-08-09T21:15:11.820000
CVE-2023-40550,0,1,9864919469344599131cd1b688fef5e941920060bb7313224630a88097ff0926,2024-04-29T14:15:07.910000
CVE-2023-40551,0,1,91136b2609431a9d8da3c07c818ac63b0e9587a2b2d5fe7494603245232fa5f5,2024-04-29T14:15:08.007000
CVE-2023-40550,0,0,9864919469344599131cd1b688fef5e941920060bb7313224630a88097ff0926,2024-04-29T14:15:07.910000
CVE-2023-40551,0,0,91136b2609431a9d8da3c07c818ac63b0e9587a2b2d5fe7494603245232fa5f5,2024-04-29T14:15:08.007000
CVE-2023-40552,0,0,c2622408aa36bd78f5e5430d30ee7193e6af4e034508bc1f26ac2385010c374f,2023-09-08T21:27:56.877000
CVE-2023-40553,0,0,f75c02cf1e791ac55e3a969e16572991fc3e66a0701028da1fb8fc02a85ffa08,2023-09-08T21:22:31.697000
CVE-2023-40554,0,0,a92d3a47fe3c14157d269f90a7243f921fd8d94afe574f04f0e5826a46692480,2023-09-08T21:22:23.213000
@ -232618,6 +232618,7 @@ CVE-2023-46265,0,0,faf523b1f1d0f0b64e6f9ab8e8a2832ca9a7d04bf9c1f990309bb2fe7d08d
CVE-2023-46266,0,0,a4f4513e58b724eae636fafc894b6e8a50f10ad01eaf673113e5003824aa7430,2023-12-28T19:58:21.497000
CVE-2023-46267,0,0,2b45133556ae3ed9c00ad189d4ce5d3b4164596783eb51e3ddd752a7518bed60,2023-11-07T04:21:53.713000
CVE-2023-4627,0,0,8c0a96d77922562ec0b059b344d7ae9cb872d6b33e5aaa58d94257588ba62b9d,2024-03-12T12:40:13.500000
CVE-2023-46270,1,1,f9e04d1e169222d2b9a4137a1db0e141afc3125ee72372b6db6811ebf5557107,2024-04-29T16:15:34.600000
CVE-2023-46277,0,0,6346b0b2bb00d68871673d9961e625945aee8892c521790c0cdf6d29b95a3bbd,2023-10-26T17:45:23.253000
CVE-2023-46278,0,0,28b89b923e29170c00d156680e8a97ed4a093fd98ccdfca3056e88f9c5127503,2023-11-08T23:22:08.177000
CVE-2023-46279,0,0,54a6c5c82fc86a1a519a6f28d73c552f4a184828f561419a812832af4a2e8a29,2023-12-19T17:40:49.427000
@ -234299,6 +234300,8 @@ CVE-2023-4868,0,0,ff27e6795c457a4ccfa41e5d83a770c6e0f593369bcb4ee3019e5986eb641c
CVE-2023-48680,0,0,9102aa82c1f06c443cc0682bc93d42e735a974ad547f26038f9dc6dc690f1581,2024-02-28T14:07:00.563000
CVE-2023-48681,0,0,793ad5c9077215d08a0ce3197d1fff4d37c8b8be80b1ea785eadb6dfbe7ab67e,2024-02-28T14:07:00.563000
CVE-2023-48682,0,0,e04d47c8e52de68f9ddcd6a228af2890509df7fa03010fc99b1f4226edcdc69e,2024-02-28T14:07:00.563000
CVE-2023-48683,1,1,a97c830d1af3b0b4e20141c0088fc163b98f3a36c203a83997f3eb440726b8c0,2024-04-29T16:15:34.670000
CVE-2023-48684,1,1,d41a5c37ab6ad85617d4df5dcd2c3a203ade8267f7cdb69722888c06f4a4b43a,2024-04-29T16:15:34.887000
CVE-2023-48685,0,0,ac5bdaa156bc7eef846e5378c5c25da67eab1bfa4f17c18cc2fb56e074344e89,2023-12-29T14:09:02.460000
CVE-2023-48686,0,0,8cd24a18f6b72ea5976ceac61f451fd7fba8624048c0f3cf62ff60d38183226d,2024-01-02T15:15:09.390000
CVE-2023-48687,0,0,48139597c11b972030f448445e5805a1a0d6cdf6108afbaf167d47acfa58089f,2023-12-29T14:09:32.003000
@ -239697,7 +239700,7 @@ CVE-2024-1568,0,0,7ab3f38998f0710d2dd36692efaa4d3f1b1bcb35035794e68e81071a3e18c0
CVE-2024-1569,0,0,4b71bedec4a1528fa42ec60009db4665ea96567ec249e5864edd831fa0bb983a,2024-04-16T13:24:07.103000
CVE-2024-1570,0,0,1629a1493afa93044df9f22af1e83d093e3e06db82a23b409138b92d94c2f5f4,2024-02-29T13:49:29.390000
CVE-2024-1571,0,0,b1806e0b2d46f5d2ef86ed95b11ec13eeefb63bf2736347df987f91692e6e418,2024-04-10T13:24:00.070000
CVE-2024-1579,1,1,e0726e45d88b6e717afe62832e367f88cb5982e277584922ebea4d11785b9109,2024-04-29T14:15:08.120000
CVE-2024-1579,0,0,e0726e45d88b6e717afe62832e367f88cb5982e277584922ebea4d11785b9109,2024-04-29T14:15:08.120000
CVE-2024-1580,0,0,4a10e63fa95d49470234e2661449f906487822e0aeb3a95c53a88e84627958f0,2024-03-27T18:15:09.063000
CVE-2024-1582,0,0,5801086f12a7b25e0a24481309300eacfe3989ff6a37128452730610efa279b1,2024-03-13T12:33:51.697000
CVE-2024-1585,0,0,28463bd155a05d2316353e6514b9a508a20ac865f3758bba518e17e798be46b0,2024-03-13T18:15:58.530000
@ -239822,7 +239825,7 @@ CVE-2024-1749,0,0,333be4b88192e2e4c430588986a6c08bc8d18a961724558cd63d34341f9df2
CVE-2024-1750,0,0,e3bbc65ee5131d172a658128bbf945392e55621bf205fc2f71228c3e1b5f20b2,2024-04-11T01:24:30.157000
CVE-2024-1751,0,0,7aa616bef5e27ed13b371ce9dacd4080fc5ffa6154b1e45a0ce11f0de1f1df9e,2024-03-13T18:15:58.530000
CVE-2024-1752,0,0,3b691eb63c202be2eb926d4c3601a8229a1e699fd5812dcaec474adfd9c6bd05,2024-04-08T18:48:40.217000
CVE-2024-1753,0,1,7979415e263c368f20b4611eea0cf3cf8d4431e42944aa3f3fa893c8471587b8,2024-04-29T14:15:08.310000
CVE-2024-1753,0,0,7979415e263c368f20b4611eea0cf3cf8d4431e42944aa3f3fa893c8471587b8,2024-04-29T14:15:08.310000
CVE-2024-1754,0,0,bb1af71458eba5bdfb6b90e382cbcddd60b96fb9bcb7aef4fa5483aa2a532c8d,2024-04-15T13:15:31.997000
CVE-2024-1755,0,0,c4c00c2e9213cda2dc6708362bc52ae20ba1dfc3c894f2897c9375b229ad840b,2024-04-15T13:15:31.997000
CVE-2024-1756,0,0,62e52d79aae78b309e4cd5e4ccf86fb8ee93e230c568d1d0b7a63a1cf36aba4f,2024-04-24T13:39:42.883000
@ -239986,7 +239989,7 @@ CVE-2024-1960,0,0,dfd1b0f1ac48f633451a81968052e172becf7727c212216325a77c71278347
CVE-2024-1961,0,0,1ad40dbb280787cbf7aa20e2a91cddc248067e17c5f59d7460567ef9bed4a35c,2024-04-16T13:24:07.103000
CVE-2024-1962,0,0,8c71ccd644902c0f670c27728543c4472e05aeb359cd7fb7b0615991cb743fd6,2024-03-25T13:47:14.087000
CVE-2024-1965,0,0,53b8948dc1992d8ed8a6fb1de9b8b2c61bce73181655f1de36932a04b4a837af,2024-02-28T14:06:45.783000
CVE-2024-1969,1,1,3f372fe6cdfd88e136947830a4a16e730e5ef4899796b672ba14d2f848965ff4,2024-04-29T14:15:08.430000
CVE-2024-1969,0,0,3f372fe6cdfd88e136947830a4a16e730e5ef4899796b672ba14d2f848965ff4,2024-04-29T14:15:08.430000
CVE-2024-1970,0,0,d3aea28e144f49dbf23817ed920457508211fde47410f2dc8402d51fca340e23,2024-04-11T01:24:34.623000
CVE-2024-1971,0,0,3941b1255117148389caff017cc56f445270956ee3ccbc478da194cbc8ba98d9,2024-04-11T01:24:34.700000
CVE-2024-1972,0,0,c71fb5f5db3d66affd27c6de84e37984ba71563e0476d90de04fd0cfc90397ec,2024-04-11T01:24:34.773000
@ -242102,6 +242105,7 @@ CVE-2024-2398,0,0,35b62d7ed7f94f24619dd248b0c14f97293390511d6f92686838c3c90d9ea7
CVE-2024-23982,0,0,d52003f4ccb21aa01a008299898f0d6a9180af3e2a0a80305a9ab57dd3077531,2024-02-14T18:04:45.380000
CVE-2024-23985,0,0,258f4468fe9f37b9a6c2732e57d96bdd80375c2f3603af19ad729cbcccfb8b72,2024-02-01T17:33:41.777000
CVE-2024-2399,0,0,f2ed8991b7f5b58c5d0da553893384268ad252865f28d0238c77e027b3f6c098,2024-03-15T12:53:06.423000
CVE-2024-23995,1,1,9025737b2c0d704fc56a9c715daeeb5f8c3bf2862774d3130e2252070dd999eb,2024-04-29T16:15:35.070000
CVE-2024-2400,0,0,82b734e73e945d6c0e34c9b62506a785c5b1b229f740be0471c259696bfd026f,2024-03-16T03:15:07.307000
CVE-2024-24000,0,0,c0e25ee371e3e2954ce1c31994df30792949134b707de19bf25452c7e2c5373a,2024-02-13T20:30:10.053000
CVE-2024-24001,0,0,ee1c723e23fc182642c00ee71c6c1dbca341b34ff9a2a69da4bee1c4da91e395,2024-02-09T02:10:25.807000
@ -245273,9 +245277,9 @@ CVE-2024-3020,0,0,d48d97f2e6cf6f4abdcfb96091c7720f82f38bf4177577222de3405e587a6a
CVE-2024-30200,0,0,9adcefcb3e5812cec8cd44a9a88b692de594f8e133ab1714b423d1bff89ce491,2024-03-28T12:42:56.150000
CVE-2024-30201,0,0,3952b6c13b3d885aad66ee813b7d523c28ff501b8652baca0c999976127b257e,2024-03-27T12:29:30.307000
CVE-2024-30202,0,0,31db9c331e53ee7e35e14a4f4da9c9118966173e7dfd1773c267c14439e4dc77,2024-03-25T16:43:06.137000
CVE-2024-30203,0,1,490ba3d4a49aae65f7d28331859e615e749528e1c913f707b04c8f653a2fd370,2024-04-29T14:15:08.613000
CVE-2024-30204,0,1,5e827e78cbd70fb3da0b9235381ee7c96b3b3fd0aa81ab46d391cd22ec17870f,2024-04-29T14:15:08.683000
CVE-2024-30205,0,1,0b64b91af9ae2043c9b32e6a1b4cc8b6b7b15fa8fbdaed0f82516a2f158418cd,2024-04-29T14:15:08.727000
CVE-2024-30203,0,0,490ba3d4a49aae65f7d28331859e615e749528e1c913f707b04c8f653a2fd370,2024-04-29T14:15:08.613000
CVE-2024-30204,0,0,5e827e78cbd70fb3da0b9235381ee7c96b3b3fd0aa81ab46d391cd22ec17870f,2024-04-29T14:15:08.683000
CVE-2024-30205,0,0,0b64b91af9ae2043c9b32e6a1b4cc8b6b7b15fa8fbdaed0f82516a2f158418cd,2024-04-29T14:15:08.727000
CVE-2024-30210,0,0,a10bd2f1b80d4ceae5c55ba545178d694a936a7f0be8c7017c0ad5dccf76eae4,2024-04-15T13:15:51.577000
CVE-2024-30214,0,0,7c4820c684a267b228fa4a4665b794d39804e491dff54bd3f2105fbbb658d34b,2024-04-09T12:48:04.090000
CVE-2024-30215,0,0,ab2bb7d1fb5a1429f982c34c6c343c5bdb990b01f1c65a84e0f966e88ca26da6,2024-04-09T12:48:04.090000
@ -246024,6 +246028,7 @@ CVE-2024-31610,0,0,25f0fe7dce01b290d07505f210ca0196ceaddb3229e43445c402c10f0654a
CVE-2024-31615,0,0,fec656de044fff01992f2ac4c2d789e80286f56b4ff6f28fca891fbe026d80d2,2024-04-26T12:58:17.720000
CVE-2024-31616,0,0,0d01710e8c157f0d32189692d849b27951e2db80c68fce9b88dd89c45379117e,2024-04-24T13:39:42.883000
CVE-2024-3162,0,0,7209bf9b1b4a4f41543ae01bfd19e9aec1dd355164cd1434a8cb5548ea161c65,2024-04-03T12:38:04.840000
CVE-2024-31621,1,1,f424bad8f77d81247076e9ff72c661ece143e12c64eec3e9f90a401ccd8dcfd3,2024-04-29T17:15:19.057000
CVE-2024-31634,0,0,4aa9be86cd809cace2c7d458fd82ce0e6e4c21e7757f642f911286874e9406fe,2024-04-16T13:24:07.103000
CVE-2024-3164,0,0,7f780c294c8831979bff32bef1a48b2e6fa61521035bd6f029f476ca7c0385b5,2024-04-11T01:25:55.603000
CVE-2024-31648,0,0,f70c933feb3072bcb2ead02f6b1a919b0f866e1a11c84c8f391e2e290925af4f,2024-04-16T13:24:07.103000
@ -246247,6 +246252,8 @@ CVE-2024-32254,0,0,0a822eba06a834cf336156a0938a7461bb1c4b55ddb75ffba99f3f6b4a1c1
CVE-2024-32256,0,0,a5d1df3249255701878f4ca3cc2c96f2401df41f8b31a37dac5eb50e5dc9f740,2024-04-17T12:48:31.863000
CVE-2024-32258,0,0,4a9e799b5a75ad39b8560e95b812a67f5b992d61d15e8ff99b2d36a5987dc294,2024-04-24T13:39:42.883000
CVE-2024-3226,0,0,d213b85d0cbf6ef26ba0599f6da2fa60a98a166b29d84dd0281911091a21b49d,2024-04-11T01:25:56.760000
CVE-2024-32268,1,1,95096bad26e8eaac309ba683d77af4c1f8646029740795d547a00147593c5594,2024-04-29T16:15:35.130000
CVE-2024-32269,1,1,7db23929c303ec0055751d3d751df171c4a4787262fb985ae9df2c68fda2e961,2024-04-29T17:15:19.130000
CVE-2024-3227,0,0,0159675aa02206c3d84e4c8df37fb1381a8ad1f04bbe993fe609d30c45518b6a,2024-04-11T01:25:56.837000
CVE-2024-32281,0,0,a566b9f3cf096fab338948e132be23b66a9f2501c95039dd7186fafc15df3cca,2024-04-17T15:31:50.160000
CVE-2024-32282,0,0,e5357aafcfe3da38abc16b53a2fe91b224de61a5ed23923f7ac518d25d82dbfb,2024-04-17T15:31:50.160000
@ -246362,6 +246369,9 @@ CVE-2024-32482,0,0,e0309808bf3b2543b39750b9d9b0b794ac723e1476b62ac8f4870801d35fc
CVE-2024-32487,0,0,746d95a6c3889a9e0164763739aef81432a5222f159aa33a064a3132dbd4a7ad,2024-04-15T13:15:31.997000
CVE-2024-32488,0,0,6ce6bcee8af0a677e98d2bf7a3efd66cf8a3e580423515387116f39d710ba974,2024-04-15T13:15:31.997000
CVE-2024-32489,0,0,cbc8895e7f5e99c09f7bd505220fcc5514b4573939580e3f381a933acf3c9ef0,2024-04-15T13:15:31.997000
CVE-2024-32491,1,1,fe5ec7fe7a45b44cbe7a0b9888d1bf8d5d9e4344661640c36ede49509c405369,2024-04-29T17:15:19.183000
CVE-2024-32492,1,1,2d0e8616c639d066f16f3cfc1f5739555f5046c10c01b8985c9a07574028f52c,2024-04-29T17:15:19.243000
CVE-2024-32493,1,1,4d675df588b69cda07404aa02a1c42b8344267e83617d472053df3bceae30927,2024-04-29T17:15:19.300000
CVE-2024-3250,0,0,42d0527e4e3750c8dcbea25ddc3c02af060082636d586aa4581df30dc613d6b8,2024-04-04T22:15:09.350000
CVE-2024-32505,0,0,f00ba1bea0fed936bba09a3ddc8367be797652510d4b08d45ee56a08717b6629,2024-04-17T12:48:07.510000
CVE-2024-32506,0,0,58fedc2d03a3103f2000181847e0d82ef0a337b365a3707fbe423487ceb945e1,2024-04-17T12:48:07.510000
@ -246632,6 +246642,9 @@ CVE-2024-33344,0,0,f74e33f11e6670462bc5b65f54260ae5e05e3409e05b053682376a20da3d6
CVE-2024-3342,0,0,de1407685a84ff141581e4e11e63bda4ec890e2f76cb4a57d17a5da8af4ca55a,2024-04-29T12:42:03.667000
CVE-2024-3343,0,0,c7ada54a8973c3f80fc415b1484b0c0d7aeb75e458012c05cd3c69dcc6f0e33f,2024-04-11T12:47:44.137000
CVE-2024-3344,0,0,9f0d30bf7471aa86a4cb4a703805df84e7338e4a65408c3f6ac2fd777c6250e1,2024-04-11T12:47:44.137000
CVE-2024-33444,1,1,ec877560ca3f79b48de2bb3c7c3421124ce2cabb28e240228004b8177d167f9e,2024-04-29T17:15:19.357000
CVE-2024-33445,1,1,00cf47cf1a2f1b36ac62bc28ca37c4a45b12e71cbad97857ac834bd7a45a506f,2024-04-29T17:15:19.410000
CVE-2024-33449,1,1,8fdc04dff32ab5637765b1faff752d59a7b70400ebbeff37a452fb38c10c8618,2024-04-29T17:15:19.470000
CVE-2024-3346,0,0,e1501efbca46250b1b984725e11942bb9306686e2cffb2edd3d8dd5b4c4ccc5c,2024-04-11T01:25:58.637000
CVE-2024-3347,0,0,f531aca6ac2c0d8c742afa906f1c675ed72b73f770b0dc5b59ea1d37af1ecdde,2024-04-11T01:25:58.723000
CVE-2024-3348,0,0,25c5a153d1148795607a2b1c3bff5dd76b89c464d7f7630dde394d2c2f4d4efd,2024-04-11T01:25:58.807000
@ -246762,6 +246775,9 @@ CVE-2024-33903,0,0,68f0c13d39cafb4abebbd2993c0e3f21cb6d5284664624c053d60cc9d0b27
CVE-2024-33904,0,0,94e3a98c0463f8acd176e3df60de225e1631e2e1dbcd1a948aa64ab2e616e6ce,2024-04-29T12:42:03.667000
CVE-2024-33905,0,0,598cecd176d13bb22ec469973f5aa9d3ed7cda81eae3a509782b865d46fbfbf8,2024-04-29T12:42:03.667000
CVE-2024-3400,0,0,5bb68c1f741d7492d6e3e08b6f1711eb6e28a4a827bd2f3f354ccd1b7a47a1fe,2024-04-23T19:57:25.207000
CVE-2024-34010,1,1,d7406a0a97d52c6db47b508292441448b334d738f7796df4063e03c4cd886295,2024-04-29T16:15:35.187000
CVE-2024-34011,1,1,9b0c61573d508c5b171748dfd9e25ab0f72bebc8ee00ba899efaf3b8d5d1d341,2024-04-29T16:15:35.380000
CVE-2024-34020,1,1,a878d630916cd572c11513bc9834210dade2036ac554987d69c4264461923a5f,2024-04-29T16:15:35.570000
CVE-2024-3413,0,0,7c0263f5aa26015f580f259b17ac76e3fb232807ce6eb6b3e0fa4a42d34def58,2024-04-11T01:26:00.727000
CVE-2024-3414,0,0,fcf8b2012e3dcab7048965e9d40e8c26f25a86217cc70e6c24a2ae712b119943,2024-04-11T01:26:00.803000
CVE-2024-3415,0,0,80d83d8ba89e3620cb20eb7a8b2b10e1c5fbd8b76c068e7c00b4af6deadd81dd,2024-04-11T01:26:00.900000

Can't render this file because it is too large.