Auto-Update: 2024-04-18T10:00:39.484350+00:00

This commit is contained in:
cad-safe-bot 2024-04-18 10:03:30 +00:00
parent 48dc8fd5cb
commit 2e7343cf8b
29 changed files with 1231 additions and 20 deletions

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2023-41864",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-04-18T09:15:11.123",
"lastModified": "2024-04-18T09:15:11.123",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Cross-Site Request Forgery (CSRF) vulnerability in Pepro Dev. Group PeproDev CF7 Database.This issue affects PeproDev CF7 Database: from n/a through 1.8.0.\n\n"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-352"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/pepro-cf7-database/wordpress-peprodev-cf7-database-plugin-1-8-0-cross-site-request-forgery-csrf-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2023-49742",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-04-18T08:15:37.330",
"lastModified": "2024-04-18T08:15:37.330",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Missing Authorization vulnerability in Support Genix.This issue affects Support Genix: from n/a through 1.2.3.\n\n"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.9,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.1,
"impactScore": 6.0
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-862"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/support-genix-lite/wordpress-support-genix-plugin-1-2-3-broken-access-control-lead-to-arbitrary-file-upload-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-51391", "id": "CVE-2023-51391",
"sourceIdentifier": "product-security@silabs.com", "sourceIdentifier": "product-security@silabs.com",
"published": "2024-04-16T20:15:09.437", "published": "2024-04-16T20:15:09.437",
"lastModified": "2024-04-17T12:48:31.863", "lastModified": "2024-04-18T09:15:11.370",
"vulnStatus": "Awaiting Analysis", "vulnStatus": "Awaiting Analysis",
"descriptions": [ "descriptions": [
{ {
@ -58,6 +58,10 @@
{ {
"url": "https://community.silabs.com/068Vm000004688g", "url": "https://community.silabs.com/068Vm000004688g",
"source": "product-security@silabs.com" "source": "product-security@silabs.com"
},
{
"url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2024-1945",
"source": "product-security@silabs.com"
} }
] ]
} }

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-6317", "id": "CVE-2023-6317",
"sourceIdentifier": "cve-requests@bitdefender.com", "sourceIdentifier": "cve-requests@bitdefender.com",
"published": "2024-04-09T14:15:07.683", "published": "2024-04-09T14:15:07.683",
"lastModified": "2024-04-10T13:24:22.187", "lastModified": "2024-04-18T08:15:37.663",
"vulnStatus": "Awaiting Analysis", "vulnStatus": "Awaiting Analysis",
"descriptions": [ "descriptions": [
{ {
@ -54,6 +54,10 @@
{ {
"url": "https://bitdefender.com/blog/labs/vulnerabilities-identified-in-lg-webos/", "url": "https://bitdefender.com/blog/labs/vulnerabilities-identified-in-lg-webos/",
"source": "cve-requests@bitdefender.com" "source": "cve-requests@bitdefender.com"
},
{
"url": "https://lgsecurity.lge.com/bulletins/tv#updateDetails",
"source": "cve-requests@bitdefender.com"
} }
] ]
} }

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-6318", "id": "CVE-2023-6318",
"sourceIdentifier": "cve-requests@bitdefender.com", "sourceIdentifier": "cve-requests@bitdefender.com",
"published": "2024-04-09T14:15:07.897", "published": "2024-04-09T14:15:07.897",
"lastModified": "2024-04-10T13:24:22.187", "lastModified": "2024-04-18T08:15:37.793",
"vulnStatus": "Awaiting Analysis", "vulnStatus": "Awaiting Analysis",
"descriptions": [ "descriptions": [
{ {
@ -54,6 +54,10 @@
{ {
"url": "https://bitdefender.com/blog/labs/vulnerabilities-identified-in-lg-webos/", "url": "https://bitdefender.com/blog/labs/vulnerabilities-identified-in-lg-webos/",
"source": "cve-requests@bitdefender.com" "source": "cve-requests@bitdefender.com"
},
{
"url": "https://lgsecurity.lge.com/bulletins/tv#updateDetails",
"source": "cve-requests@bitdefender.com"
} }
] ]
} }

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-6319", "id": "CVE-2023-6319",
"sourceIdentifier": "cve-requests@bitdefender.com", "sourceIdentifier": "cve-requests@bitdefender.com",
"published": "2024-04-09T14:15:08.093", "published": "2024-04-09T14:15:08.093",
"lastModified": "2024-04-10T13:24:22.187", "lastModified": "2024-04-18T08:15:37.873",
"vulnStatus": "Awaiting Analysis", "vulnStatus": "Awaiting Analysis",
"descriptions": [ "descriptions": [
{ {
@ -54,6 +54,10 @@
{ {
"url": "https://bitdefender.com/blog/labs/vulnerabilities-identified-in-lg-webos/", "url": "https://bitdefender.com/blog/labs/vulnerabilities-identified-in-lg-webos/",
"source": "cve-requests@bitdefender.com" "source": "cve-requests@bitdefender.com"
},
{
"url": "https://lgsecurity.lge.com/bulletins/tv#updateDetails",
"source": "cve-requests@bitdefender.com"
} }
] ]
} }

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-6320", "id": "CVE-2023-6320",
"sourceIdentifier": "cve-requests@bitdefender.com", "sourceIdentifier": "cve-requests@bitdefender.com",
"published": "2024-04-09T14:15:08.287", "published": "2024-04-09T14:15:08.287",
"lastModified": "2024-04-10T13:24:22.187", "lastModified": "2024-04-18T08:15:37.953",
"vulnStatus": "Awaiting Analysis", "vulnStatus": "Awaiting Analysis",
"descriptions": [ "descriptions": [
{ {
@ -54,6 +54,10 @@
{ {
"url": "https://bitdefender.com/blog/labs/vulnerabilities-identified-in-lg-webos/", "url": "https://bitdefender.com/blog/labs/vulnerabilities-identified-in-lg-webos/",
"source": "cve-requests@bitdefender.com" "source": "cve-requests@bitdefender.com"
},
{
"url": "https://lgsecurity.lge.com/bulletins/tv#updateDetails",
"source": "cve-requests@bitdefender.com"
} }
] ]
} }

View File

@ -0,0 +1,59 @@
{
"id": "CVE-2024-28076",
"sourceIdentifier": "psirt@solarwinds.com",
"published": "2024-04-18T09:15:11.463",
"lastModified": "2024-04-18T09:15:11.463",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "The SolarWinds Platform was susceptible to a Arbitrary Open Redirection Vulnerability. A potential attacker can redirect to different domain when using URL parameter with relative entry in the correct format"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "psirt@solarwinds.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:C/C:H/I:L/A:L",
"attackVector": "ADJACENT_NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "LOW",
"availabilityImpact": "LOW",
"baseScore": 7.0,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.2,
"impactScore": 5.3
}
]
},
"weaknesses": [
{
"source": "psirt@solarwinds.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-601"
}
]
}
],
"references": [
{
"url": "https://documentation.solarwinds.com/en/success_center/orionplatform/content/release_notes/solarwinds_platform_2024-1-1_release_notes.htm",
"source": "psirt@solarwinds.com"
},
{
"url": "https://www.solarwinds.com/trust-center/security-advisories/CVE-2024-28073",
"source": "psirt@solarwinds.com"
}
]
}

View File

@ -0,0 +1,59 @@
{
"id": "CVE-2024-29001",
"sourceIdentifier": "psirt@solarwinds.com",
"published": "2024-04-18T09:15:11.670",
"lastModified": "2024-04-18T09:15:11.670",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "A SolarWinds Platform SWQL Injection Vulnerability was identified in the user interface. This vulnerability requires authentication and user interaction to be exploited. "
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "psirt@solarwinds.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:R/S:C/C:H/I:L/A:L",
"attackVector": "ADJACENT_NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "LOW",
"availabilityImpact": "LOW",
"baseScore": 7.5,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.7,
"impactScore": 5.3
}
]
},
"weaknesses": [
{
"source": "psirt@solarwinds.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"references": [
{
"url": "https://documentation.solarwinds.com/en/success_center/orionplatform/content/release_notes/solarwinds_platform_2024-1-1_release_notes.htm",
"source": "psirt@solarwinds.com"
},
{
"url": "https://www.solarwinds.com/trust-center/security-advisories/CVE-2024-29001",
"source": "psirt@solarwinds.com"
}
]
}

View File

@ -0,0 +1,36 @@
{
"id": "CVE-2024-31869",
"sourceIdentifier": "security@apache.org",
"published": "2024-04-18T08:15:38.037",
"lastModified": "2024-04-18T08:15:38.037",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Airflow versions 2.7.0 through 2.8.4 have a vulnerability that allows an authenticated user to see sensitive provider configuration via the \"configuration\" UI page\u00a0when \"non-sensitive-only\" was set as \"webserver.expose_config\" configuration (The celery provider is the only community provider currently that has sensitive configurations). You should migrate to Airflow 2.9 or change your \"expose_config\" configuration to False as a workaround. This is similar, but different to CVE-2023-46288 https://github.com/advisories/GHSA-9qqg-mh7c-chfq which concerned API, not UI configuration page."
}
],
"metrics": {},
"weaknesses": [
{
"source": "security@apache.org",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-200"
}
]
}
],
"references": [
{
"url": "https://github.com/apache/airflow/pull/38795",
"source": "security@apache.org"
},
{
"url": "https://lists.apache.org/thread/pz6vg7wcjk901rmsgt86h76g6kfcgtk3",
"source": "security@apache.org"
}
]
}

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2024-32142",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-04-18T08:15:38.143",
"lastModified": "2024-04-18T08:15:38.143",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Missing Authorization vulnerability in Ovic Team Ovic Responsive WPBakery.This issue affects Ovic Responsive WPBakery: from n/a through 1.3.0.\n\n"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "LOW",
"baseScore": 5.4,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 2.5
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-862"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/ovic-vc-addon/wordpress-ovic-responsive-wpbakery-plugin-1-3-0-broken-access-control-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2024-32587",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-04-18T09:15:12.000",
"lastModified": "2024-04-18T09:15:12.000",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in EnvialoSimple Env\u00edaloSimple allows Reflected XSS.This issue affects Env\u00edaloSimple: from n/a through 2.2.\n\n"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW",
"baseScore": 7.1,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 3.7
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/envialosimple-email-marketing-y-newsletters-gratis/wordpress-envialosimple-plugin-2-2-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2024-32588",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-04-18T09:15:12.267",
"lastModified": "2024-04-18T09:15:12.267",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in ThimPress LearnPress Export Import allows Reflected XSS.This issue affects LearnPress Export Import: from n/a through 4.0.3.\n\n"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW",
"baseScore": 7.1,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 3.7
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/learnpress-import-export/wordpress-learnpress-export-import-plugin-4-0-3-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2024-32590",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-04-18T09:15:12.503",
"lastModified": "2024-04-18T09:15:12.503",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Webfood Kattene allows Stored XSS.This issue affects Kattene: from n/a through 1.7.\n\n"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW",
"baseScore": 6.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.3,
"impactScore": 3.7
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/kattene/wordpress-kattene-plugin-1-7-cross-site-scripting-xss-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2024-32591",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-04-18T09:15:12.700",
"lastModified": "2024-04-18T09:15:12.700",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Daniele De Rosa Backend Designer allows Stored XSS.This issue affects Backend Designer: from n/a through 1.3.\n\n"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW",
"baseScore": 5.9,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.7,
"impactScore": 3.7
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/backend-designer/wordpress-backend-designer-plugin-1-3-cross-site-scripting-xss-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2024-32592",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-04-18T09:15:13.010",
"lastModified": "2024-04-18T09:15:13.010",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in VoidCoders, innovs Void Elementor WHMCS Elements For Elementor Page Builder allows Stored XSS.This issue affects Void Elementor WHMCS Elements For Elementor Page Builder: from n/a through 2.0.\n\n"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW",
"baseScore": 6.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.3,
"impactScore": 3.7
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/void-elementor-whmcs-elements/wordpress-void-elementor-whmcs-elements-for-elementor-page-builder-plugin-2-0-cross-site-scripting-xss-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2024-32593",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-04-18T09:15:13.257",
"lastModified": "2024-04-18T09:15:13.257",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in WPBits WPBITS Addons For Elementor Page Builder allows Stored XSS.This issue affects WPBITS Addons For Elementor Page Builder: from n/a through 1.3.4.2.\n\n"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW",
"baseScore": 6.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.3,
"impactScore": 3.7
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/wpbits-addons-for-elementor/wordpress-wpbits-addons-for-elementor-page-builder-plugin-1-3-4-2-cross-site-scripting-xss-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2024-32594",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-04-18T09:15:13.493",
"lastModified": "2024-04-18T09:15:13.493",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in AttesaWP Attesa Extra allows Stored XSS.This issue affects Attesa Extra: from n/a through 1.3.9.\n\n"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW",
"baseScore": 6.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.3,
"impactScore": 3.7
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/attesa-extra/wordpress-attesa-extra-plugin-1-3-9-cross-site-scripting-xss-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2024-32595",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-04-18T09:15:13.797",
"lastModified": "2024-04-18T09:15:13.797",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Mat Bao Corp WP Helper Premium allows Reflected XSS.This issue affects WP Helper Premium: from n/a before 4.6.0.\n\n"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW",
"baseScore": 7.1,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 3.7
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/wp-helper-lite/wordpress-wp-helper-premium-plugin-4-6-0-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2024-32596",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-04-18T09:15:14.057",
"lastModified": "2024-04-18T09:15:14.057",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Eric-Oliver M\u00e4chler DSGVO Youtube allows Stored XSS.This issue affects DSGVO Youtube: from n/a through 1.4.5.\n\n"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW",
"baseScore": 6.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.3,
"impactScore": 3.7
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/dsgvo-youtube/wordpress-dsgvo-youtube-plugin-1-4-5-cross-site-scripting-xss-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2024-32597",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-04-18T09:15:14.317",
"lastModified": "2024-04-18T09:15:14.317",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Xylus Themes WordPress Importer allows Stored XSS.This issue affects WordPress Importer: from n/a through 1.0.7.\n\n"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW",
"baseScore": 5.9,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.7,
"impactScore": 3.7
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/wp-smart-import/wordpress-wp-smart-import-plugin-1-0-7-cross-site-scripting-xss-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2024-32598",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-04-18T09:15:14.593",
"lastModified": "2024-04-18T09:15:14.593",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Booking Algorithms BA Book Everything allows Stored XSS.This issue affects BA Book Everything: from n/a through 1.6.8.\n\n"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW",
"baseScore": 5.9,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.7,
"impactScore": 3.7
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/ba-book-everything/wordpress-ba-book-everything-plugin-1-6-8-cross-site-scripting-xss-vulnerability-2?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2024-32599",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-04-18T09:15:14.823",
"lastModified": "2024-04-18T09:15:14.823",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Improper Control of Generation of Code ('Code Injection') vulnerability in Deepak anand WP Dummy Content Generator.This issue affects WP Dummy Content Generator: from n/a through 3.2.1.\n\n"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 10.0,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 6.0
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-94"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/wp-dummy-content-generator/wordpress-wp-dummy-content-generator-plugin-3-2-1-arbitrary-code-execution-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2024-32601",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-04-18T09:15:15.053",
"lastModified": "2024-04-18T09:15:15.053",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Missing Authorization vulnerability in WP OnlineSupport, Essential Plugin Popup Anything.This issue affects Popup Anything: from n/a through 2.8.\n\n"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 3.9,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-862"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/popup-anything-on-click/wordpress-popup-anything-plugin-2-8-broken-access-control-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2024-32603",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-04-18T09:15:15.330",
"lastModified": "2024-04-18T09:15:15.330",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Deserialization of Untrusted Data vulnerability in ThemeKraft WooBuddy.This issue affects WooBuddy: from n/a through 3.4.20.\n\n"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.5,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 6.0
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-502"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/wc4bp/wordpress-woobuddy-plugin-3-4-20-php-object-injection-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2024-32604",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-04-18T09:15:15.550",
"lastModified": "2024-04-18T09:15:15.550",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Authorization Bypass Through User-Controlled Key vulnerability in Plechev Andrey WP-Recall.This issue affects WP-Recall: from n/a through 16.26.5.\n\n"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-639"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/wp-recall/wordpress-wp-recall-plugin-16-26-5-insecure-direct-object-references-idor-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -2,12 +2,12 @@
"id": "CVE-2024-3446", "id": "CVE-2024-3446",
"sourceIdentifier": "secalert@redhat.com", "sourceIdentifier": "secalert@redhat.com",
"published": "2024-04-09T20:15:10.450", "published": "2024-04-09T20:15:10.450",
"lastModified": "2024-04-10T13:23:38.787", "lastModified": "2024-04-18T08:15:38.340",
"vulnStatus": "Awaiting Analysis", "vulnStatus": "Awaiting Analysis",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
"value": "A double free vulnerability was found in QEMU virtio devices (virtio-gpu, virtio-serial-bus, virtio-crypto), where the mem_reentrancy_guard flag insufficiently protects against DMA reentrancy issues. This issue could allow a malicious privileged guest to crash the QEMU process on the host, resulting in a denial of service or allow arbitrary code execution within the context of the QEMU process on the host." "value": "A double free vulnerability was found in QEMU virtio devices (virtio-gpu, virtio-serial-bus, virtio-crypto), where the mem_reentrancy_guard flag insufficiently protects against DMA reentrancy issues. This issue could allow a malicious privileged guest user to crash the QEMU process on the host, resulting in a denial of service or allow arbitrary code execution within the context of the QEMU process on the host."
}, },
{ {
"lang": "es", "lang": "es",

View File

@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update ### Last Repository Update
```plain ```plain
2024-04-18T08:00:38.003129+00:00 2024-04-18T10:00:39.484350+00:00
``` ```
### Most recent CVE Modification Timestamp synchronized with NVD ### Most recent CVE Modification Timestamp synchronized with NVD
```plain ```plain
2024-04-18T06:15:06.627000+00:00 2024-04-18T09:15:15.550000+00:00
``` ```
### Last Data Feed Release ### Last Data Feed Release
@ -33,20 +33,46 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
### Total Number of included CVEs ### Total Number of included CVEs
```plain ```plain
246197 246218
``` ```
### CVEs added in the last Commit ### CVEs added in the last Commit
Recently added CVEs: `0` Recently added CVEs: `21`
- [CVE-2023-41864](CVE-2023/CVE-2023-418xx/CVE-2023-41864.json) (`2024-04-18T09:15:11.123`)
- [CVE-2023-49742](CVE-2023/CVE-2023-497xx/CVE-2023-49742.json) (`2024-04-18T08:15:37.330`)
- [CVE-2024-28076](CVE-2024/CVE-2024-280xx/CVE-2024-28076.json) (`2024-04-18T09:15:11.463`)
- [CVE-2024-29001](CVE-2024/CVE-2024-290xx/CVE-2024-29001.json) (`2024-04-18T09:15:11.670`)
- [CVE-2024-31869](CVE-2024/CVE-2024-318xx/CVE-2024-31869.json) (`2024-04-18T08:15:38.037`)
- [CVE-2024-32142](CVE-2024/CVE-2024-321xx/CVE-2024-32142.json) (`2024-04-18T08:15:38.143`)
- [CVE-2024-32587](CVE-2024/CVE-2024-325xx/CVE-2024-32587.json) (`2024-04-18T09:15:12.000`)
- [CVE-2024-32588](CVE-2024/CVE-2024-325xx/CVE-2024-32588.json) (`2024-04-18T09:15:12.267`)
- [CVE-2024-32590](CVE-2024/CVE-2024-325xx/CVE-2024-32590.json) (`2024-04-18T09:15:12.503`)
- [CVE-2024-32591](CVE-2024/CVE-2024-325xx/CVE-2024-32591.json) (`2024-04-18T09:15:12.700`)
- [CVE-2024-32592](CVE-2024/CVE-2024-325xx/CVE-2024-32592.json) (`2024-04-18T09:15:13.010`)
- [CVE-2024-32593](CVE-2024/CVE-2024-325xx/CVE-2024-32593.json) (`2024-04-18T09:15:13.257`)
- [CVE-2024-32594](CVE-2024/CVE-2024-325xx/CVE-2024-32594.json) (`2024-04-18T09:15:13.493`)
- [CVE-2024-32595](CVE-2024/CVE-2024-325xx/CVE-2024-32595.json) (`2024-04-18T09:15:13.797`)
- [CVE-2024-32596](CVE-2024/CVE-2024-325xx/CVE-2024-32596.json) (`2024-04-18T09:15:14.057`)
- [CVE-2024-32597](CVE-2024/CVE-2024-325xx/CVE-2024-32597.json) (`2024-04-18T09:15:14.317`)
- [CVE-2024-32598](CVE-2024/CVE-2024-325xx/CVE-2024-32598.json) (`2024-04-18T09:15:14.593`)
- [CVE-2024-32599](CVE-2024/CVE-2024-325xx/CVE-2024-32599.json) (`2024-04-18T09:15:14.823`)
- [CVE-2024-32601](CVE-2024/CVE-2024-326xx/CVE-2024-32601.json) (`2024-04-18T09:15:15.053`)
- [CVE-2024-32603](CVE-2024/CVE-2024-326xx/CVE-2024-32603.json) (`2024-04-18T09:15:15.330`)
- [CVE-2024-32604](CVE-2024/CVE-2024-326xx/CVE-2024-32604.json) (`2024-04-18T09:15:15.550`)
### CVEs modified in the last Commit ### CVEs modified in the last Commit
Recently modified CVEs: `1` Recently modified CVEs: `6`
- [CVE-2021-20599](CVE-2021/CVE-2021-205xx/CVE-2021-20599.json) (`2024-04-18T06:15:06.627`) - [CVE-2023-51391](CVE-2023/CVE-2023-513xx/CVE-2023-51391.json) (`2024-04-18T09:15:11.370`)
- [CVE-2023-6317](CVE-2023/CVE-2023-63xx/CVE-2023-6317.json) (`2024-04-18T08:15:37.663`)
- [CVE-2023-6318](CVE-2023/CVE-2023-63xx/CVE-2023-6318.json) (`2024-04-18T08:15:37.793`)
- [CVE-2023-6319](CVE-2023/CVE-2023-63xx/CVE-2023-6319.json) (`2024-04-18T08:15:37.873`)
- [CVE-2023-6320](CVE-2023/CVE-2023-63xx/CVE-2023-6320.json) (`2024-04-18T08:15:37.953`)
- [CVE-2024-3446](CVE-2024/CVE-2024-34xx/CVE-2024-3446.json) (`2024-04-18T08:15:38.340`)
## Download and Usage ## Download and Usage

View File

@ -166832,7 +166832,7 @@ CVE-2021-20595,0,0,54091619e9a973b57aaa95e99df009c2c6c78df845b1f1f4269becb97f96e
CVE-2021-20596,0,0,a0ff9fa4a237f9a78322aa815369f8873c6b92bf575b4824cca00d26de4f2d97,2021-08-02T14:25:16.287000 CVE-2021-20596,0,0,a0ff9fa4a237f9a78322aa815369f8873c6b92bf575b4824cca00d26de4f2d97,2021-08-02T14:25:16.287000
CVE-2021-20597,0,0,47bb071e2ba107e2cdb7a8730ebd52a20ab8b00118532bb2721e3af8e4e3e92b,2022-10-14T18:15:14.477000 CVE-2021-20597,0,0,47bb071e2ba107e2cdb7a8730ebd52a20ab8b00118532bb2721e3af8e4e3e92b,2022-10-14T18:15:14.477000
CVE-2021-20598,0,0,8906f45643b6277fa9f592c088e169b719c9855f3a65a41e28e980eeda63213f,2021-08-27T13:10:04.973000 CVE-2021-20598,0,0,8906f45643b6277fa9f592c088e169b719c9855f3a65a41e28e980eeda63213f,2021-08-27T13:10:04.973000
CVE-2021-20599,0,1,e5627ca58794178fcd969f7ef02a30018dc48154c890a9b15e17156856bb881c,2024-04-18T06:15:06.627000 CVE-2021-20599,0,0,e5627ca58794178fcd969f7ef02a30018dc48154c890a9b15e17156856bb881c,2024-04-18T06:15:06.627000
CVE-2021-2060,0,0,61606dcd34403072c3a5917747b918eb39dbd0b36f6f004b94aa44c2f142691f,2022-01-04T17:08:34.690000 CVE-2021-2060,0,0,61606dcd34403072c3a5917747b918eb39dbd0b36f6f004b94aa44c2f142691f,2022-01-04T17:08:34.690000
CVE-2021-20600,0,0,3cb79a977d387d68bab143a33be703b13655f1423d037cb679749908257af30e,2023-05-16T22:50:39.020000 CVE-2021-20600,0,0,3cb79a977d387d68bab143a33be703b13655f1423d037cb679749908257af30e,2023-05-16T22:50:39.020000
CVE-2021-20601,0,0,495b71279c777c98b13a1141b468cb5a33e8e53888a2515f4d6e890bcce5e8c8,2021-11-29T16:20:24.440000 CVE-2021-20601,0,0,495b71279c777c98b13a1141b468cb5a33e8e53888a2515f4d6e890bcce5e8c8,2021-11-29T16:20:24.440000
@ -229829,6 +229829,7 @@ CVE-2023-4186,0,0,3abcdb46d80abad104dce39b9350b3a6c8b38797243f9179ad443285e2b2d7
CVE-2023-41860,0,0,4d08e5ff25e45b721b429e2300d096467b55e8ddcbddf4556f1eaa2767de6509,2023-09-28T17:48:04.947000 CVE-2023-41860,0,0,4d08e5ff25e45b721b429e2300d096467b55e8ddcbddf4556f1eaa2767de6509,2023-09-28T17:48:04.947000
CVE-2023-41861,0,0,987ffad05223ade61e9ab0b717071315ebf0cf09b5de64178e7918616ff02e9c,2023-09-28T17:49:32.943000 CVE-2023-41861,0,0,987ffad05223ade61e9ab0b717071315ebf0cf09b5de64178e7918616ff02e9c,2023-09-28T17:49:32.943000
CVE-2023-41863,0,0,dc1f96ad0e6adcd5c9b117e284c1ab7a9537ba92010418f76f598af8967c33a1,2023-09-26T14:36:16.600000 CVE-2023-41863,0,0,dc1f96ad0e6adcd5c9b117e284c1ab7a9537ba92010418f76f598af8967c33a1,2023-09-26T14:36:16.600000
CVE-2023-41864,1,1,85444e51357590732fe0cc9687932cb04f6f28ca18ab3911d63b1bd3ba1127c9,2024-04-18T09:15:11.123000
CVE-2023-41867,0,0,eee5a1532a938ae7d8971f2eace1505dc851ed2c27f4f91e9813ae02bb99cb45,2023-09-26T14:36:32.207000 CVE-2023-41867,0,0,eee5a1532a938ae7d8971f2eace1505dc851ed2c27f4f91e9813ae02bb99cb45,2023-09-26T14:36:32.207000
CVE-2023-41868,0,0,5618b3d59c8e4b7ad31dfb8fd14c6e924f637eb2eafda521eafee9b5136f233b,2023-09-26T14:53:37.590000 CVE-2023-41868,0,0,5618b3d59c8e4b7ad31dfb8fd14c6e924f637eb2eafda521eafee9b5136f233b,2023-09-26T14:53:37.590000
CVE-2023-4187,0,0,f2c6a706ec6eae8ed54edf79dd7cb4527eda4e5a5692b563f1ad18c73c946d59,2023-08-09T17:58:37.840000 CVE-2023-4187,0,0,f2c6a706ec6eae8ed54edf79dd7cb4527eda4e5a5692b563f1ad18c73c946d59,2023-08-09T17:58:37.840000
@ -234864,6 +234865,7 @@ CVE-2023-49738,0,0,5c4f6ee44efbee607c5172901fe24b0e1c0f9924fd7d48aa8f7d198bbcf99
CVE-2023-49739,0,0,ed7af1af7b29da09287b9796692740d5a8f67a583e414c6ddb16b5263abbb30d,2023-12-19T18:06:46.643000 CVE-2023-49739,0,0,ed7af1af7b29da09287b9796692740d5a8f67a583e414c6ddb16b5263abbb30d,2023-12-19T18:06:46.643000
CVE-2023-4974,0,0,35450376420e332ac02a2249b8d034eb51dc9b872c207d5cf39076508be3d2f7,2024-04-11T01:22:38.740000 CVE-2023-4974,0,0,35450376420e332ac02a2249b8d034eb51dc9b872c207d5cf39076508be3d2f7,2024-04-11T01:22:38.740000
CVE-2023-49740,0,0,3b57b466e1f923eaa7ef022a2f7c4ea812dd859f4964babb0a9a182102c6b49e,2023-12-18T18:29:26.233000 CVE-2023-49740,0,0,3b57b466e1f923eaa7ef022a2f7c4ea812dd859f4964babb0a9a182102c6b49e,2023-12-18T18:29:26.233000
CVE-2023-49742,1,1,9eb0c789de97bcd583baa8cf8c68cab7b5c71607b5e4de6908869c53abe66674,2024-04-18T08:15:37.330000
CVE-2023-49743,0,0,13f5af3ccb1e4b324e598e3022c0f930ec45448d3679021de25381951c590aa0,2023-12-18T18:39:56.250000 CVE-2023-49743,0,0,13f5af3ccb1e4b324e598e3022c0f930ec45448d3679021de25381951c590aa0,2023-12-18T18:39:56.250000
CVE-2023-49744,0,0,62713799f09c53108f2fff9617764ffd422292e0d6304d7c901d420c7eef25ca,2023-12-21T17:29:00.677000 CVE-2023-49744,0,0,62713799f09c53108f2fff9617764ffd422292e0d6304d7c901d420c7eef25ca,2023-12-21T17:29:00.677000
CVE-2023-49745,0,0,fffe20c1d784d2b7c929f594f59c7d620c018b6b1ac8213ab25365d0b1ce526d,2023-12-18T18:40:10.603000 CVE-2023-49745,0,0,fffe20c1d784d2b7c929f594f59c7d620c018b6b1ac8213ab25365d0b1ce526d,2023-12-18T18:40:10.603000
@ -235686,7 +235688,7 @@ CVE-2023-51388,0,0,23d45ab8268f61b603be601097b6403fe4846d03068822a939edea7f32dfb
CVE-2023-51389,0,0,1ab7e7a3a71f66a7621faf47f7e371d4af946a67075635b4b3343083855bb6c4,2024-02-22T19:07:27.197000 CVE-2023-51389,0,0,1ab7e7a3a71f66a7621faf47f7e371d4af946a67075635b4b3343083855bb6c4,2024-02-22T19:07:27.197000
CVE-2023-5139,0,0,45ab71d0a08a733e36a646ff7244b4f355dd92a60fbfd4d74553b86425e7d813,2024-01-21T01:44:13.437000 CVE-2023-5139,0,0,45ab71d0a08a733e36a646ff7244b4f355dd92a60fbfd4d74553b86425e7d813,2024-01-21T01:44:13.437000
CVE-2023-51390,0,0,aec164d1ba230dc6205a9a23a906268daf85aeab87f80c94d3bcd0e722b52384,2024-01-02T16:25:35.387000 CVE-2023-51390,0,0,aec164d1ba230dc6205a9a23a906268daf85aeab87f80c94d3bcd0e722b52384,2024-01-02T16:25:35.387000
CVE-2023-51391,0,0,c9a98b090a72bc9978fd2ba371e2c66e95f01fb1d9891276e6130e67557dd8fe,2024-04-17T12:48:31.863000 CVE-2023-51391,0,1,957fce0f26a1f3c1171609031d2144db63e306bf4dd5366bdd07bd5aacc5a870,2024-04-18T09:15:11.370000
CVE-2023-51392,0,0,67927e656158c46412ae3bb504118fce54b24cfa01ec58a8655578d96aa8e815,2024-02-23T19:31:25.817000 CVE-2023-51392,0,0,67927e656158c46412ae3bb504118fce54b24cfa01ec58a8655578d96aa8e815,2024-02-23T19:31:25.817000
CVE-2023-51393,0,0,134d5dde596b1c0957ff0f344967668816279a31dc85a1621f6b9d383706e3f6,2024-02-26T13:42:22.567000 CVE-2023-51393,0,0,134d5dde596b1c0957ff0f344967668816279a31dc85a1621f6b9d383706e3f6,2024-02-26T13:42:22.567000
CVE-2023-51394,0,0,71b2bd989998d21aa0bbb95271be09edc08ce6d20103c2e6bcee8ea1c20c92b8,2024-02-26T13:42:22.567000 CVE-2023-51394,0,0,71b2bd989998d21aa0bbb95271be09edc08ce6d20103c2e6bcee8ea1c20c92b8,2024-02-26T13:42:22.567000
@ -237519,10 +237521,10 @@ CVE-2023-6313,0,0,37257477d4aa2923e734a02239fe22761c2b383dd01a5ad6f0805b72148ecb
CVE-2023-6314,0,0,f4128a234377715ed433398ed29329489185b89566c1f8948f1313fe3eb87e21,2024-01-02T13:31:21.217000 CVE-2023-6314,0,0,f4128a234377715ed433398ed29329489185b89566c1f8948f1313fe3eb87e21,2024-01-02T13:31:21.217000
CVE-2023-6315,0,0,0ea3d757b463802bd072d80c605e85486723b96d15e4b6f43ffdbe4b27553792,2024-01-02T13:43:51.817000 CVE-2023-6315,0,0,0ea3d757b463802bd072d80c605e85486723b96d15e4b6f43ffdbe4b27553792,2024-01-02T13:43:51.817000
CVE-2023-6316,0,0,d2a53cf9d574188a1d1db73921a61c0a0e0e318b0720f84fd1373b0184553c47,2024-01-17T20:17:22.003000 CVE-2023-6316,0,0,d2a53cf9d574188a1d1db73921a61c0a0e0e318b0720f84fd1373b0184553c47,2024-01-17T20:17:22.003000
CVE-2023-6317,0,0,8005668dd53be4160301b5b7b73d649ca2700c557cff68617cb9f4fc86cf1b50,2024-04-10T13:24:22.187000 CVE-2023-6317,0,1,7d7bdd6df101d067864ba1ce1e0999d7faf07fe4e884cb0e07f2b66cbb2c2a46,2024-04-18T08:15:37.663000
CVE-2023-6318,0,0,31c2fb1cd754277e618c0d9fd0a07d39188240a3788ec94703d397062dcf56fd,2024-04-10T13:24:22.187000 CVE-2023-6318,0,1,c5b0fd94faa5692041827b1e90cea49c70217d21979f19374a5399fa311000d9,2024-04-18T08:15:37.793000
CVE-2023-6319,0,0,d367b191e27375692172eb19bcb0608e2452cabe89ff70ee26a0cc611e078cfc,2024-04-10T13:24:22.187000 CVE-2023-6319,0,1,f0c8ec35edda76734c52d8668ac037fa65c1f29b0ee20b6b276b3d575b1d8043,2024-04-18T08:15:37.873000
CVE-2023-6320,0,0,12439bfbb9ea4a0b41dc589df0e6b582f49a61d5d7d25f7801f6519055dfdbe8,2024-04-10T13:24:22.187000 CVE-2023-6320,0,1,97c0d852626b4121996a68ef80a1034e5eac45cc3e27fd758a11cceb60b37d97,2024-04-18T08:15:37.953000
CVE-2023-6326,0,0,da68435ec565f5478deb03e75227a685933d8e7699006844b61a2674d05885d6,2024-03-04T13:58:23.447000 CVE-2023-6326,0,0,da68435ec565f5478deb03e75227a685933d8e7699006844b61a2674d05885d6,2024-03-04T13:58:23.447000
CVE-2023-6329,0,0,acb69acf796efdc21d3e11700a3115c7e39470c82b6e643969998bcd2e6b6d74,2023-12-01T20:50:45.717000 CVE-2023-6329,0,0,acb69acf796efdc21d3e11700a3115c7e39470c82b6e643969998bcd2e6b6d74,2023-12-01T20:50:45.717000
CVE-2023-6333,0,0,c9c5b2d28685d70e3694c86d73a2ffba7633a0d13b15746a0b23ea79549ea6b5,2023-12-12T20:39:57.697000 CVE-2023-6333,0,0,c9c5b2d28685d70e3694c86d73a2ffba7633a0d13b15746a0b23ea79549ea6b5,2023-12-12T20:39:57.697000
@ -243998,6 +244000,7 @@ CVE-2024-28069,0,0,99a57a9955c5ed5463e7c560b95e0a17dfa2789ec3c024f2825003d476d4b
CVE-2024-2807,0,0,389dec77d863d88d0729c3b21a13c4f638dbaad2d7ffdf5a3bec6019fd1a7b1b,2024-04-11T01:25:36.783000 CVE-2024-2807,0,0,389dec77d863d88d0729c3b21a13c4f638dbaad2d7ffdf5a3bec6019fd1a7b1b,2024-04-11T01:25:36.783000
CVE-2024-28070,0,0,c8eeec88fa6e3b91036a4eadc63dd921f090ad52309176e7af22a570b911aeac,2024-03-17T22:38:29.433000 CVE-2024-28070,0,0,c8eeec88fa6e3b91036a4eadc63dd921f090ad52309176e7af22a570b911aeac,2024-03-17T22:38:29.433000
CVE-2024-28073,0,0,11595a1e096ea791c7b3c722c3e27da07919e96619a7c3a0a6fbf6f73647b227,2024-04-17T20:08:21.887000 CVE-2024-28073,0,0,11595a1e096ea791c7b3c722c3e27da07919e96619a7c3a0a6fbf6f73647b227,2024-04-17T20:08:21.887000
CVE-2024-28076,1,1,9f59893f8c48e7887c5ca0fc1d844ab7452ab34e4eaeddbd3e74c5aab680b336,2024-04-18T09:15:11.463000
CVE-2024-2808,0,0,c3ed3b9e68948cd880b53f1e926f321cf4b47941f31cc49bbad2cbe5e609284b,2024-04-11T01:25:36.883000 CVE-2024-2808,0,0,c3ed3b9e68948cd880b53f1e926f321cf4b47941f31cc49bbad2cbe5e609284b,2024-04-11T01:25:36.883000
CVE-2024-28084,0,0,e855eaf3201adbee7f29bca688e63324787cf32844050753a9cd1965f8c4b542,2024-03-23T03:15:11.583000 CVE-2024-28084,0,0,e855eaf3201adbee7f29bca688e63324787cf32844050753a9cd1965f8c4b542,2024-03-23T03:15:11.583000
CVE-2024-28085,0,0,50b7c8ccc5599b7ab0a3fb9fa52479a655595623006a86c4fef2d0664fd54633,2024-04-07T12:15:08.903000 CVE-2024-28085,0,0,50b7c8ccc5599b7ab0a3fb9fa52479a655595623006a86c4fef2d0664fd54633,2024-04-07T12:15:08.903000
@ -244400,6 +244403,7 @@ CVE-2024-2897,0,0,845f7ba04cd28c84698eb0ec67ce51aa02df2e982261e886754cbe95c05467
CVE-2024-2898,0,0,a9e168d2d155295869c860f65d1c37cd69170336e2176bd6e18025be31d1bd5d,2024-04-11T01:25:40.393000 CVE-2024-2898,0,0,a9e168d2d155295869c860f65d1c37cd69170336e2176bd6e18025be31d1bd5d,2024-04-11T01:25:40.393000
CVE-2024-2899,0,0,5a6a51f3ed72df0a6dd64abc73047bf55c3b64e6e92d5e232b7d6d24120a6174,2024-04-11T01:25:40.480000 CVE-2024-2899,0,0,5a6a51f3ed72df0a6dd64abc73047bf55c3b64e6e92d5e232b7d6d24120a6174,2024-04-11T01:25:40.480000
CVE-2024-2900,0,0,0c94ddc095b3847b98b965817804f73bd4e2c123c1146ff5d0c398accd06d081,2024-04-11T01:25:40.563000 CVE-2024-2900,0,0,0c94ddc095b3847b98b965817804f73bd4e2c123c1146ff5d0c398accd06d081,2024-04-11T01:25:40.563000
CVE-2024-29001,1,1,6b1d7dbe9a0f6f77f79a7c6f2a9a4414a75cf3bbfb3e3961e471be9204f696f6,2024-04-18T09:15:11.670000
CVE-2024-29006,0,0,372dae7e0517fadec7afbebb95bb2f6ce85fed46918b994309163c310eb23334,2024-04-04T12:48:41.700000 CVE-2024-29006,0,0,372dae7e0517fadec7afbebb95bb2f6ce85fed46918b994309163c310eb23334,2024-04-04T12:48:41.700000
CVE-2024-29007,0,0,8d6137d5f48685e1b64d39fd4cc7492f2850ddf9c3f329869c8ad7ee434fc200,2024-04-04T12:48:41.700000 CVE-2024-29007,0,0,8d6137d5f48685e1b64d39fd4cc7492f2850ddf9c3f329869c8ad7ee434fc200,2024-04-04T12:48:41.700000
CVE-2024-29008,0,0,1a4f3f4485b339858eac2ebf1bb542365a61220eb67f8fc5d6a3ce2d6f0576ed,2024-04-04T12:48:41.700000 CVE-2024-29008,0,0,1a4f3f4485b339858eac2ebf1bb542365a61220eb67f8fc5d6a3ce2d6f0576ed,2024-04-04T12:48:41.700000
@ -245665,6 +245669,7 @@ CVE-2024-31865,0,0,55f6426de8554bc6f4da7fb7dfa9079a9656bfc67d2afbc128c56bec8f8ea
CVE-2024-31866,0,0,9d4ecb9aa9c29d85edac6e2052e365b7781227bb2f4fea81ddf721491f897e1e,2024-04-10T13:24:22.187000 CVE-2024-31866,0,0,9d4ecb9aa9c29d85edac6e2052e365b7781227bb2f4fea81ddf721491f897e1e,2024-04-10T13:24:22.187000
CVE-2024-31867,0,0,d9ca0aa9578216e078b0a79214f51d5fd012c5b9e5fcd78052a038316e3088f8,2024-04-10T13:24:00.070000 CVE-2024-31867,0,0,d9ca0aa9578216e078b0a79214f51d5fd012c5b9e5fcd78052a038316e3088f8,2024-04-10T13:24:00.070000
CVE-2024-31868,0,0,a79f3943c68f02bd30297ac353bf9f000b38c0f07e44f3ffb16a4f3e82c12f40,2024-04-10T13:24:22.187000 CVE-2024-31868,0,0,a79f3943c68f02bd30297ac353bf9f000b38c0f07e44f3ffb16a4f3e82c12f40,2024-04-10T13:24:22.187000
CVE-2024-31869,1,1,d93bcc2c83a183090097521a1470aa851a1749fd31baa5e83ada98336d56a815,2024-04-18T08:15:38.037000
CVE-2024-31871,0,0,2e9cb20a8839296f42d6bc6aa4eee6ec286fed065eef42e4971f116c0f81a135,2024-04-10T19:49:51.183000 CVE-2024-31871,0,0,2e9cb20a8839296f42d6bc6aa4eee6ec286fed065eef42e4971f116c0f81a135,2024-04-10T19:49:51.183000
CVE-2024-31872,0,0,7d09da772d85c1598253bebf81c543077ef995af0f84d1cf088132605a2400f9,2024-04-10T19:49:51.183000 CVE-2024-31872,0,0,7d09da772d85c1598253bebf81c543077ef995af0f84d1cf088132605a2400f9,2024-04-10T19:49:51.183000
CVE-2024-31873,0,0,30397559953deb34a9ae192149473632dc6b2334245e920787a4c5e14fc76375,2024-04-10T19:49:51.183000 CVE-2024-31873,0,0,30397559953deb34a9ae192149473632dc6b2334245e920787a4c5e14fc76375,2024-04-10T19:49:51.183000
@ -245783,6 +245788,7 @@ CVE-2024-32139,0,0,f0d5014bb10dda1d4c60387d3ee25cb89484d8347271efa44c8824b99e4cd
CVE-2024-3214,0,0,d9b62addfa853a8ede1a8dcf4e065081d1f9021a8cffa0357e41cb2e91733c15,2024-04-10T13:23:38.787000 CVE-2024-3214,0,0,d9b62addfa853a8ede1a8dcf4e065081d1f9021a8cffa0357e41cb2e91733c15,2024-04-10T13:23:38.787000
CVE-2024-32140,0,0,25ce82707bac814bfa60dbd042d77eeb2e77d40673480a75309bcbecca8ba7aa,2024-04-15T13:15:31.997000 CVE-2024-32140,0,0,25ce82707bac814bfa60dbd042d77eeb2e77d40673480a75309bcbecca8ba7aa,2024-04-15T13:15:31.997000
CVE-2024-32141,0,0,d919f1f06e8f9dddc68864df4d4cc49a38b5318983c1cd8a09580919ead44629,2024-04-15T13:15:31.997000 CVE-2024-32141,0,0,d919f1f06e8f9dddc68864df4d4cc49a38b5318983c1cd8a09580919ead44629,2024-04-15T13:15:31.997000
CVE-2024-32142,1,1,298263eb64042ee39f67302a17ce7849954b5bc138e519c7bd1afdaf6e5114d0,2024-04-18T08:15:38.143000
CVE-2024-32145,0,0,46f82be3b79b18ba25f2a9e0fa1663c301fc655d81936963a35db2da93921f80,2024-04-15T13:15:31.997000 CVE-2024-32145,0,0,46f82be3b79b18ba25f2a9e0fa1663c301fc655d81936963a35db2da93921f80,2024-04-15T13:15:31.997000
CVE-2024-32147,0,0,221f8d37c746fb10439627f9391d23954c77e6687fd4a296059e2d8c0758881a,2024-04-15T13:15:31.997000 CVE-2024-32147,0,0,221f8d37c746fb10439627f9391d23954c77e6687fd4a296059e2d8c0758881a,2024-04-15T13:15:31.997000
CVE-2024-32149,0,0,12d107e3c0999cbcd27b2d933b885433c81cf0faba3d46ab08b4e66fab365309,2024-04-15T13:15:31.997000 CVE-2024-32149,0,0,12d107e3c0999cbcd27b2d933b885433c81cf0faba3d46ab08b4e66fab365309,2024-04-15T13:15:31.997000
@ -245927,7 +245933,22 @@ CVE-2024-32557,0,0,a0d48866dc85bb81bf860dbf507dd0114438e0c1a5f7430be94c879937364
CVE-2024-3256,0,0,16875209444216c7ddeeb37cb7b039ce17b63ab170d52bcb48aafa2d5e629841,2024-04-11T01:25:57.377000 CVE-2024-3256,0,0,16875209444216c7ddeeb37cb7b039ce17b63ab170d52bcb48aafa2d5e629841,2024-04-11T01:25:57.377000
CVE-2024-3257,0,0,3c0b711c0035bcf8d4b92bcec7dfdb1ab21cf5c848bdfe1dfc7f34628ee0f77e,2024-04-11T01:25:57.457000 CVE-2024-3257,0,0,3c0b711c0035bcf8d4b92bcec7dfdb1ab21cf5c848bdfe1dfc7f34628ee0f77e,2024-04-11T01:25:57.457000
CVE-2024-3258,0,0,00a0a017c084aafa026269300c69a9360444c24c6a4308e5e8f072ac33cf3451,2024-04-11T01:25:57.540000 CVE-2024-3258,0,0,00a0a017c084aafa026269300c69a9360444c24c6a4308e5e8f072ac33cf3451,2024-04-11T01:25:57.540000
CVE-2024-32587,1,1,c0101340dd6e57977cd824dbc19762084b1f0311c3d79fc90768f09c9a11ff91,2024-04-18T09:15:12
CVE-2024-32588,1,1,06199b7ea06222cb98c8d66024bbbf552b7a1ac7ada928b15b247be58d64ecb0,2024-04-18T09:15:12.267000
CVE-2024-3259,0,0,3481f546c5fee878032df1d9aae401834d514bd5070dbdd69c5e7940d2e2efbe,2024-04-11T01:25:57.637000 CVE-2024-3259,0,0,3481f546c5fee878032df1d9aae401834d514bd5070dbdd69c5e7940d2e2efbe,2024-04-11T01:25:57.637000
CVE-2024-32590,1,1,db34fe33ced7f25e3181ef7f278c309a9064327983fee1bedbae1e55394843ba,2024-04-18T09:15:12.503000
CVE-2024-32591,1,1,00473bc3a983b7fc96333bf1501cdfaefb079cbe68bae057780e02a5581572b8,2024-04-18T09:15:12.700000
CVE-2024-32592,1,1,8d3099b5f23ce9d41fa0ba5f02c1a65403577ea96ede3e8c51cfc83555cc3fbc,2024-04-18T09:15:13.010000
CVE-2024-32593,1,1,caff7c586216de07cbe4b60548974acb79f738bd62066bd7f2e2a2aa5a923a7e,2024-04-18T09:15:13.257000
CVE-2024-32594,1,1,4308ec0d34e3ed3c5a3718c79a111b9f300285740da56659ba0d68b316586447,2024-04-18T09:15:13.493000
CVE-2024-32595,1,1,9d69f0586c28204877cc712d36c3783fa59b17f74c4738c0fa0b2a2de58087eb,2024-04-18T09:15:13.797000
CVE-2024-32596,1,1,b246122c5d7389d43c23bef1db0c73b663438c58540076bad1b8b9f4e61486d6,2024-04-18T09:15:14.057000
CVE-2024-32597,1,1,51f27b098078170afc9827fb2383191fed7f8c050b4f6dbf2abfddd1a93be587,2024-04-18T09:15:14.317000
CVE-2024-32598,1,1,77579937e04e87143a2992dc1d37125ae40cd82911a70e2aa1c84099a87908ec,2024-04-18T09:15:14.593000
CVE-2024-32599,1,1,ac6b88817e953f6fd9c1d9e015a366dfb3b261ff03948cfd08c270336a09f70d,2024-04-18T09:15:14.823000
CVE-2024-32601,1,1,e55511b9e3e88f07023816dfd5dcf78b8e73f5e9d9e9e8145640fbf83cf0d2f6,2024-04-18T09:15:15.053000
CVE-2024-32603,1,1,99dc9bddebf2ce3a291941a3ef798cc8afc75cd8a435bf59b25a8a6ffebae1aa,2024-04-18T09:15:15.330000
CVE-2024-32604,1,1,f6f2ddb0da87c5d3b38c0b0646f3f9c3ce37b3eea3394add99286494619cb6a9,2024-04-18T09:15:15.550000
CVE-2024-3262,0,0,758c253f08a1135a2d383be61db9b8d36970b2087c7788f9321bc534b0b4222c,2024-04-04T12:48:22.650000 CVE-2024-3262,0,0,758c253f08a1135a2d383be61db9b8d36970b2087c7788f9321bc534b0b4222c,2024-04-04T12:48:22.650000
CVE-2024-32625,0,0,83e118a0392b3bec4594db5d969d72238cd7025e3075e1bbd62c95f93a226798,2024-04-16T13:24:07.103000 CVE-2024-32625,0,0,83e118a0392b3bec4594db5d969d72238cd7025e3075e1bbd62c95f93a226798,2024-04-16T13:24:07.103000
CVE-2024-32631,0,0,f6179c4a1916a92ef208430456218c10bd0600c556ab5afe50d23115ed2f9700,2024-04-16T13:24:07.103000 CVE-2024-32631,0,0,f6179c4a1916a92ef208430456218c10bd0600c556ab5afe50d23115ed2f9700,2024-04-16T13:24:07.103000
@ -246028,7 +246049,7 @@ CVE-2024-3442,0,0,756156f7de62e4a3ae69e9bbc13d8b798986428892e90d3991a24b2c8375a9
CVE-2024-3443,0,0,05006967bda17a889e39c8ccda497403cb2b35584eb895b86d4c8dd8b79230c6,2024-04-11T01:26:02.973000 CVE-2024-3443,0,0,05006967bda17a889e39c8ccda497403cb2b35584eb895b86d4c8dd8b79230c6,2024-04-11T01:26:02.973000
CVE-2024-3444,0,0,20ed8f6fb3358c183e59c59fd1e15718847c74b3b8477277ced05a568bf760d4,2024-04-11T01:26:03.057000 CVE-2024-3444,0,0,20ed8f6fb3358c183e59c59fd1e15718847c74b3b8477277ced05a568bf760d4,2024-04-11T01:26:03.057000
CVE-2024-3445,0,0,c9628f9221624aa27cf7f5ca164e4ed34c93be648ba2ac6a84e0908c02d87fc9,2024-04-11T01:26:03.137000 CVE-2024-3445,0,0,c9628f9221624aa27cf7f5ca164e4ed34c93be648ba2ac6a84e0908c02d87fc9,2024-04-11T01:26:03.137000
CVE-2024-3446,0,0,c0a3792d28bb120cb23b962cb1280f6386526857c06b5c4bfe6072b3fea4955f,2024-04-10T13:23:38.787000 CVE-2024-3446,0,1,d41b6ff09ba21a5a975268b5a0441447c6b2bcfd6bedfe0914b9c96867cd290f,2024-04-18T08:15:38.340000
CVE-2024-3448,0,0,38511310080ef6cbfb33c1721e41ad41c6df0877e6ffcdbf14f478fa1ea7a673,2024-04-10T19:49:51.183000 CVE-2024-3448,0,0,38511310080ef6cbfb33c1721e41ad41c6df0877e6ffcdbf14f478fa1ea7a673,2024-04-10T19:49:51.183000
CVE-2024-3455,0,0,18e948f1ff2182718852b2ba697f0fa9a8598811bb1c2e87509c3bd543b90a57,2024-04-11T01:26:03.233000 CVE-2024-3455,0,0,18e948f1ff2182718852b2ba697f0fa9a8598811bb1c2e87509c3bd543b90a57,2024-04-11T01:26:03.233000
CVE-2024-3456,0,0,944b33373fddc7621692e3fce6708723c7abc962139d88da65ad0c4ce610f104,2024-04-11T01:26:03.310000 CVE-2024-3456,0,0,944b33373fddc7621692e3fce6708723c7abc962139d88da65ad0c4ce610f104,2024-04-11T01:26:03.310000

Can't render this file because it is too large.