Auto-Update: 2024-04-29T08:00:38.345826+00:00

This commit is contained in:
cad-safe-bot 2024-04-29 08:03:28 +00:00
parent c80b3d270c
commit 2f6f999fcb
34 changed files with 1858 additions and 39 deletions

View File

@ -0,0 +1,28 @@
{
"id": "CVE-2023-52723",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-04-29T06:15:06.983",
"lastModified": "2024-04-29T06:15:06.983",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "In KDE libksieve before 23.03.80, kmanagesieve/session.cpp places a cleartext password in server logs because a username variable is accidentally given a password value."
}
],
"metrics": {},
"references": [
{
"url": "https://invent.kde.org/pim/libksieve/-/commit/6b460ba93ac4ac503ba039d0b788ac7595120db1",
"source": "cve@mitre.org"
},
{
"url": "https://invent.kde.org/pim/libksieve/-/tags/v23.03.80",
"source": "cve@mitre.org"
},
{
"url": "https://www.openwall.com/lists/oss-security/2024/04/25/1",
"source": "cve@mitre.org"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-1023",
"sourceIdentifier": "secalert@redhat.com",
"published": "2024-03-27T08:15:38.140",
"lastModified": "2024-04-09T12:15:07.627",
"lastModified": "2024-04-29T07:15:06.233",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
@ -59,6 +59,10 @@
"url": "https://access.redhat.com/errata/RHSA-2024:1706",
"source": "secalert@redhat.com"
},
{
"url": "https://access.redhat.com/errata/RHSA-2024:2088",
"source": "secalert@redhat.com"
},
{
"url": "https://access.redhat.com/security/cve/CVE-2024-1023",
"source": "secalert@redhat.com"

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-1300",
"sourceIdentifier": "secalert@redhat.com",
"published": "2024-04-02T08:15:53.993",
"lastModified": "2024-04-18T17:15:48.453",
"lastModified": "2024-04-29T07:15:06.423",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
@ -63,6 +63,10 @@
"url": "https://access.redhat.com/errata/RHSA-2024:1923",
"source": "secalert@redhat.com"
},
{
"url": "https://access.redhat.com/errata/RHSA-2024:2088",
"source": "secalert@redhat.com"
},
{
"url": "https://access.redhat.com/security/cve/CVE-2024-1300",
"source": "secalert@redhat.com"

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2024-1905",
"sourceIdentifier": "contact@wpscan.com",
"published": "2024-04-29T06:15:07.650",
"lastModified": "2024-04-29T06:15:07.650",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "The Smart Forms WordPress plugin before 2.6.96 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup)"
}
],
"metrics": {},
"references": [
{
"url": "https://wpscan.com/vulnerability/b9a448d2-4bc2-4933-8743-58c8768a619f/",
"source": "contact@wpscan.com"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2024-2505",
"sourceIdentifier": "contact@wpscan.com",
"published": "2024-04-29T06:15:07.937",
"lastModified": "2024-04-29T06:15:07.937",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "The GamiPress WordPress plugin before 6.8.9's access control mechanism fails to properly restrict access to its settings, permitting Authors to manipulate requests and extend access to lower privileged users, like Subscribers, despite initial settings prohibiting such access. This vulnerability resembles broken access control, enabling unauthorized users to modify critical GamiPress WordPress plugin before 6.8.9 configurations."
}
],
"metrics": {},
"references": [
{
"url": "https://wpscan.com/vulnerability/9b3d6148-ecee-4e59-84a4-3b3e9898473b/",
"source": "contact@wpscan.com"
}
]
}

View File

@ -0,0 +1,96 @@
{
"id": "CVE-2024-3191",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-04-29T07:15:07.080",
"lastModified": "2024-04-29T07:15:07.080",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability, which was classified as critical, has been found in MailCleaner up to 2023.03.14. This issue affects some unknown processing of the component Email Handler. The manipulation leads to os command injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-262307."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
],
"cvssMetricV2": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"availabilityImpact": "COMPLETE",
"baseScore": 10.0
},
"baseSeverity": "HIGH",
"exploitabilityScore": 10.0,
"impactScore": 10.0,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-78"
}
]
}
],
"references": [
{
"url": "https://github.com/MailCleaner/MailCleaner/pull/601",
"source": "cna@vuldb.com"
},
{
"url": "https://modzero.com/en/advisories/mz-24-01-mailcleaner/",
"source": "cna@vuldb.com"
},
{
"url": "https://modzero.com/static/MZ-24-01_modzero_MailCleaner.pdf",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?ctiid.262307",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?id.262307",
"source": "cna@vuldb.com"
}
]
}

View File

@ -0,0 +1,96 @@
{
"id": "CVE-2024-3192",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-04-29T07:15:07.480",
"lastModified": "2024-04-29T07:15:07.480",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability, which was classified as problematic, was found in MailCleaner up to 2023.03.14. Affected is an unknown function of the component Admin Interface. The manipulation leads to cross site scripting. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. It is recommended to apply a patch to fix this issue. The identifier of this vulnerability is VDB-262308."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 1.4
}
],
"cvssMetricV2": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N",
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"availabilityImpact": "NONE",
"baseScore": 5.0
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 10.0,
"impactScore": 2.9,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://github.com/MailCleaner/MailCleaner/pull/601",
"source": "cna@vuldb.com"
},
{
"url": "https://modzero.com/en/advisories/mz-24-01-mailcleaner/",
"source": "cna@vuldb.com"
},
{
"url": "https://modzero.com/static/MZ-24-01_modzero_MailCleaner.pdf",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?ctiid.262308",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?id.262308",
"source": "cna@vuldb.com"
}
]
}

View File

@ -0,0 +1,96 @@
{
"id": "CVE-2024-3193",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-04-29T07:15:07.773",
"lastModified": "2024-04-29T07:15:07.773",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability has been found in MailCleaner up to 2023.03.14 and classified as critical. Affected by this vulnerability is an unknown functionality of the component Admin Endpoints. The manipulation leads to os command injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. It is recommended to apply a patch to fix this issue. The identifier VDB-262309 was assigned to this vulnerability."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
],
"cvssMetricV2": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"availabilityImpact": "COMPLETE",
"baseScore": 10.0
},
"baseSeverity": "HIGH",
"exploitabilityScore": 10.0,
"impactScore": 10.0,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-78"
}
]
}
],
"references": [
{
"url": "https://github.com/MailCleaner/MailCleaner/pull/601",
"source": "cna@vuldb.com"
},
{
"url": "https://modzero.com/en/advisories/mz-24-01-mailcleaner/",
"source": "cna@vuldb.com"
},
{
"url": "https://modzero.com/static/MZ-24-01_modzero_MailCleaner.pdf",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?ctiid.262309",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?id.262309",
"source": "cna@vuldb.com"
}
]
}

View File

@ -0,0 +1,96 @@
{
"id": "CVE-2024-3194",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-04-29T07:15:08.070",
"lastModified": "2024-04-29T07:15:08.070",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was found in MailCleaner up to 2023.03.14 and classified as problematic. Affected by this issue is some unknown functionality of the component Log File Endpoint. The manipulation leads to cross site scripting. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. It is recommended to apply a patch to fix this issue. VDB-262310 is the identifier assigned to this vulnerability."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 1.4
}
],
"cvssMetricV2": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N",
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"availabilityImpact": "NONE",
"baseScore": 5.0
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 10.0,
"impactScore": 2.9,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://github.com/MailCleaner/MailCleaner/pull/601",
"source": "cna@vuldb.com"
},
{
"url": "https://modzero.com/en/advisories/mz-24-01-mailcleaner/",
"source": "cna@vuldb.com"
},
{
"url": "https://modzero.com/static/MZ-24-01_modzero_MailCleaner.pdf",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?ctiid.262310",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?id.262310",
"source": "cna@vuldb.com"
}
]
}

View File

@ -0,0 +1,96 @@
{
"id": "CVE-2024-3195",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-04-29T07:15:08.400",
"lastModified": "2024-04-29T07:15:08.400",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was found in MailCleaner up to 2023.03.14. It has been classified as critical. This affects an unknown part of the component Admin Endpoints. The manipulation leads to path traversal. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-262311."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW",
"baseScore": 4.7,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.2,
"impactScore": 3.4
}
],
"cvssMetricV2": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:M/C:P/I:P/A:P",
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "MULTIPLE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL",
"baseScore": 5.8
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 6.4,
"impactScore": 6.4,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-22"
}
]
}
],
"references": [
{
"url": "https://github.com/MailCleaner/MailCleaner/pull/601",
"source": "cna@vuldb.com"
},
{
"url": "https://modzero.com/en/advisories/mz-24-01-mailcleaner/",
"source": "cna@vuldb.com"
},
{
"url": "https://modzero.com/static/MZ-24-01_modzero_MailCleaner.pdf",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?ctiid.262311",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?id.262311",
"source": "cna@vuldb.com"
}
]
}

View File

@ -0,0 +1,96 @@
{
"id": "CVE-2024-3196",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-04-29T07:15:08.740",
"lastModified": "2024-04-29T07:15:08.740",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was found in MailCleaner up to 2023.03.14. It has been declared as critical. This vulnerability affects unknown code of the file /mailcleaner.php/getStats of the component SOAP Service. The manipulation leads to os command injection. Local access is required to approach this attack. The exploit has been disclosed to the public and may be used. It is recommended to apply a patch to fix this issue. The identifier of this vulnerability is VDB-262312."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 6.7,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 0.8,
"impactScore": 5.9
}
],
"cvssMetricV2": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:L/AC:L/Au:M/C:C/I:C/A:C",
"accessVector": "LOCAL",
"accessComplexity": "LOW",
"authentication": "MULTIPLE",
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"availabilityImpact": "COMPLETE",
"baseScore": 6.5
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 2.5,
"impactScore": 10.0,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-78"
}
]
}
],
"references": [
{
"url": "https://github.com/MailCleaner/MailCleaner/pull/601",
"source": "cna@vuldb.com"
},
{
"url": "https://modzero.com/en/advisories/mz-24-01-mailcleaner/",
"source": "cna@vuldb.com"
},
{
"url": "https://modzero.com/static/MZ-24-01_modzero_MailCleaner.pdf",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?ctiid.262312",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?id.262312",
"source": "cna@vuldb.com"
}
]
}

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2024-33537",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-04-29T06:15:08.083",
"lastModified": "2024-04-29T06:15:08.083",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Theme Horse WP Portfolio allows Stored XSS.This issue affects WP Portfolio: from n/a through 2.4.\n\n"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW",
"baseScore": 6.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.3,
"impactScore": 3.7
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/wp-portfolio/wordpress-wp-portfolio-theme-2-4-cross-site-scripting-xss-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2024-33539",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-04-29T06:15:08.930",
"lastModified": "2024-04-29T06:15:08.930",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in WPZOOM WPZOOM Addons for Elementor (Templates, Widgets) allows Stored XSS.This issue affects WPZOOM Addons for Elementor (Templates, Widgets): from n/a through 1.1.35.\n\n"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW",
"baseScore": 6.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.3,
"impactScore": 3.7
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/wpzoom-elementor-addons/wordpress-wpzoom-addons-for-elementor-plugin-1-1-35-cross-site-scripting-xss-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2024-33540",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-04-29T06:15:09.637",
"lastModified": "2024-04-29T06:15:09.637",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in ThemeGrill ColorNews allows Stored XSS.This issue affects ColorNews: from n/a through 1.2.6.\n\n"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW",
"baseScore": 6.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.3,
"impactScore": 3.7
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/colornews/wordpress-colornews-theme-1-2-6-cross-site-scripting-xss-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2024-33542",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-04-29T06:15:10.220",
"lastModified": "2024-04-29T06:15:10.220",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Authorization Bypass Through User-Controlled Key vulnerability in Fabio Rinaldi Crelly Slider.This issue affects Crelly Slider: from n/a through 1.4.5.\n\n"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-639"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/crelly-slider/wordpress-crelly-slider-plugin-1-4-5-insecure-direct-object-references-idor-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2024-33544",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-04-29T07:15:06.543",
"lastModified": "2024-04-29T07:15:06.543",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in AA-Team WZone allows SQL Injection.This issue affects WZone: from n/a through 14.0.10.\n\n"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "LOW",
"baseScore": 9.3,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 4.7
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/woozone/wordpress-wzone-plugin-14-0-10-unauthenticated-sql-injection-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2024-33546",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-04-29T07:15:06.810",
"lastModified": "2024-04-29T07:15:06.810",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in AA-Team WZone allows SQL Injection.This issue affects WZone: from n/a through 14.0.10.\n\n"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.6,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.1,
"impactScore": 5.8
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/woozone/wordpress-wzone-plugin-14-0-10-arbitrary-sql-update-execution-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2024-33548",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-04-29T06:15:10.937",
"lastModified": "2024-04-29T06:15:10.937",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in AA-Team WZone allows Reflected XSS.This issue affects WZone: from n/a through 14.0.10.\n\n"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW",
"baseScore": 7.1,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 3.7
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/woozone/wordpress-wzone-plugin-14-0-10-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2024-33551",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-04-29T06:15:11.487",
"lastModified": "2024-04-29T06:15:11.487",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in 8theme XStore Core allows SQL Injection.This issue affects XStore Core: from n/a through 5.3.5.\n\n"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "LOW",
"baseScore": 9.3,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 4.7
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/et-core-plugin/wordpress-xstore-core-plugin-5-3-5-unauthenticated-sql-injection-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2024-33554",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-04-29T06:15:12.090",
"lastModified": "2024-04-29T06:15:12.090",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in 8theme XStore Core allows Reflected XSS.This issue affects XStore Core: from n/a through 5.3.5.\n\n"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW",
"baseScore": 7.1,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 3.7
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/et-core-plugin/wordpress-xstore-core-plugin-5-3-5-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2024-33559",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-04-29T06:15:12.607",
"lastModified": "2024-04-29T06:15:12.607",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in 8theme XStore allows SQL Injection.This issue affects XStore: from n/a through 9.3.5.\n\n"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "LOW",
"baseScore": 9.3,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 4.7
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/xstore/wordpress-xstore-theme-9-3-5-unauthenticated-sql-injection-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2024-33562",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-04-29T06:15:13.163",
"lastModified": "2024-04-29T06:15:13.163",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in 8theme XStore allows Reflected XSS.This issue affects XStore: from n/a through 9.3.5.\n\n"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW",
"baseScore": 7.1,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 3.7
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/xstore/wordpress-xstore-theme-9-3-5-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2024-33571",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-04-29T06:15:13.667",
"lastModified": "2024-04-29T06:15:13.667",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Infomaniak Staff VOD Infomaniak allows Reflected XSS.This issue affects VOD Infomaniak: from n/a through 1.5.6.\n\n"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW",
"baseScore": 7.1,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 3.7
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/vod-infomaniak/wordpress-vod-infomaniak-plugin-1-5-6-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2024-33630",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-04-29T06:15:14.450",
"lastModified": "2024-04-29T06:15:14.450",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Piotnet Piotnet Addons For Elementor allows Stored XSS.This issue affects Piotnet Addons For Elementor: from n/a through 2.4.26.\n\n"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW",
"baseScore": 6.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.3,
"impactScore": 3.7
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/piotnet-addons-for-elementor/wordpress-piotnet-addons-for-elementor-plugin-2-4-26-cross-site-scripting-xss-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2024-33631",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-04-29T06:15:14.940",
"lastModified": "2024-04-29T06:15:14.940",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Piotnet Piotnet Addons For Elementor Pro allows Stored XSS.This issue affects Piotnet Addons For Elementor Pro: from n/a through 7.1.17.\n\n"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW",
"baseScore": 6.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.3,
"impactScore": 3.7
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/piotnet-addons-for-elementor-pro/wordpress-piotnet-addons-for-elementor-pro-plugin-7-1-17-authenticated-stored-cross-site-scripting-xss-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2024-33632",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-04-29T06:15:15.537",
"lastModified": "2024-04-29T06:15:15.537",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Cross-Site Request Forgery (CSRF) vulnerability in Piotnet Piotnet Addons For Elementor Pro.This issue affects Piotnet Addons For Elementor Pro: from n/a through 7.1.17.\n\n"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "LOW",
"baseScore": 5.4,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 2.5
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-352"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/piotnet-addons-for-elementor-pro/wordpress-piotnet-addons-for-elementor-pro-plugin-7-1-17-cross-site-request-forgery-csrf-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2024-33681",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-04-29T06:15:16.057",
"lastModified": "2024-04-29T06:15:16.057",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Cross-Site Request Forgery (CSRF) vulnerability in Sandor Kovacs Regenerate post permalink allows Cross-Site Scripting (XSS).This issue affects Regenerate post permalink: from n/a through 1.0.3.\n\n"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW",
"baseScore": 7.1,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 3.7
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-352"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/regenerate-post-permalinks/wordpress-regenerate-post-permalink-plugin-1-0-3-cross-site-request-forgery-csrf-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -0,0 +1,79 @@
{
"id": "CVE-2024-33686",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-04-29T06:15:16.623",
"lastModified": "2024-04-29T06:15:16.623",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Missing Authorization vulnerability in Extend Themes Pathway, Extend Themes Hugo WP, Extend Themes Althea WP, Extend Themes Elevate WP, Extend Themes Brite, Extend Themes Colibri WP, Extend Themes Vertice.This issue affects Pathway: from n/a through 1.0.15; Hugo WP: from n/a through 1.0.8; Althea WP: from n/a through 1.0.13; Elevate WP: from n/a through 1.0.15; Brite: from n/a through 1.0.11; Colibri WP: from n/a through 1.0.94; Vertice: from n/a through 1.0.7.\n\n"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-862"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/althea-wp/wordpress-althea-wp-theme-1-0-13-broken-access-control-vulnerability",
"source": "audit@patchstack.com"
},
{
"url": "https://patchstack.com/database/vulnerability/brite/wordpress-brite-theme-1-0-11-broken-access-control-vulnerability",
"source": "audit@patchstack.com"
},
{
"url": "https://patchstack.com/database/vulnerability/colibri-wp/wordpress-colibri-wp-theme-1-0-94-broken-access-control-vulnerability",
"source": "audit@patchstack.com"
},
{
"url": "https://patchstack.com/database/vulnerability/elevate-wp/wordpress-elevate-wp-theme-1-0-15-broken-access-control-vulnerability",
"source": "audit@patchstack.com"
},
{
"url": "https://patchstack.com/database/vulnerability/hugo-wp/wordpress-hugo-wp-theme-1-0-8-broken-access-control-vulnerability",
"source": "audit@patchstack.com"
},
{
"url": "https://patchstack.com/database/vulnerability/pathway/wordpress-pathway-theme-1-0-15-cross-site-request-forgery-csrf-vulnerability",
"source": "audit@patchstack.com"
},
{
"url": "https://patchstack.com/database/vulnerability/vertice/wordpress-vertice-theme-1-0-7-broken-access-control-vulnerability",
"source": "audit@patchstack.com"
}
]
}

View File

@ -0,0 +1,28 @@
{
"id": "CVE-2024-33904",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-04-29T06:15:17.320",
"lastModified": "2024-04-29T06:15:17.320",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "In plugins/HookSystem.cpp in Hyprland through 0.39.1 (before 28c8561), through a race condition, a local attacker can cause execution of arbitrary assembly code by writing to a predictable temporary file."
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/hyprwm/Hyprland/commit/28c85619243e6320e75d7abcfe8244fa99d054dd",
"source": "cve@mitre.org"
},
{
"url": "https://github.com/hyprwm/Hyprland/issues/5787",
"source": "cve@mitre.org"
},
{
"url": "https://www.openwall.com/lists/oss-security/2024/04/28/3",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,28 @@
{
"id": "CVE-2024-33905",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-04-29T06:15:17.667",
"lastModified": "2024-04-29T06:15:17.667",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "In Telegram WebK before 2.0.0 (488), a crafted Mini Web App allows XSS via the postMessage web_app_open_link event type."
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/morethanwords/tweb/commit/2153ea9878668769faac8dd5931b7e0b96a9f129/src/components/popups/webApp.ts",
"source": "cve@mitre.org"
},
{
"url": "https://medium.com/%40pedbap/telegram-web-app-xss-session-hijacking-1-click-95acccdc8d90",
"source": "cve@mitre.org"
},
{
"url": "https://www.openwall.com/lists/oss-security/2024/04/28/4",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2024-4302",
"sourceIdentifier": "twcert@cert.org.tw",
"published": "2024-04-29T06:15:17.803",
"lastModified": "2024-04-29T06:15:17.803",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Super 8 Live Chat online customer service platform fails to properly filter user input, allowing unauthenticated remote attackers to insert JavaScript code into the chat box. When the message recipient views the message, they become susceptible to Cross-site Scripting (XSS) attacks."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "twcert@cert.org.tw",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7
}
]
},
"weaknesses": [
{
"source": "twcert@cert.org.tw",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://www.twcert.org.tw/tw/cp-132-7779-35562-1.html",
"source": "twcert@cert.org.tw"
}
]
}

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2024-4303",
"sourceIdentifier": "twcert@cert.org.tw",
"published": "2024-04-29T06:15:18.457",
"lastModified": "2024-04-29T06:15:18.457",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "ArmorX Android APP's multi-factor authentication (MFA) for the login function is not properly implemented. Remote attackers who obtain user credentials can bypass MFA, allowing them to successfully log into the APP."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "twcert@cert.org.tw",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "twcert@cert.org.tw",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-287"
}
]
}
],
"references": [
{
"url": "https://www.twcert.org.tw/tw/cp-132-7781-ef309-1.html",
"source": "twcert@cert.org.tw"
}
]
}

View File

@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update
```plain
2024-04-29T06:00:30.784700+00:00
2024-04-29T08:00:38.345826+00:00
```
### Most recent CVE Modification Timestamp synchronized with NVD
```plain
2024-04-29T05:15:07.787000+00:00
2024-04-29T07:15:08.740000+00:00
```
### Last Data Feed Release
@ -33,34 +33,46 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
### Total Number of included CVEs
```plain
247035
247065
```
### CVEs added in the last Commit
Recently added CVEs: `15`
Recently added CVEs: `30`
- [CVE-2024-1874](CVE-2024/CVE-2024-18xx/CVE-2024-1874.json) (`2024-04-29T04:15:07.580`)
- [CVE-2024-2756](CVE-2024/CVE-2024-27xx/CVE-2024-2756.json) (`2024-04-29T04:15:07.890`)
- [CVE-2024-2757](CVE-2024/CVE-2024-27xx/CVE-2024-2757.json) (`2024-04-29T04:15:08.113`)
- [CVE-2024-3096](CVE-2024/CVE-2024-30xx/CVE-2024-3096.json) (`2024-04-29T04:15:08.350`)
- [CVE-2024-33339](CVE-2024/CVE-2024-333xx/CVE-2024-33339.json) (`2024-04-29T05:15:06.340`)
- [CVE-2024-33633](CVE-2024/CVE-2024-336xx/CVE-2024-33633.json) (`2024-04-29T05:15:06.507`)
- [CVE-2024-33640](CVE-2024/CVE-2024-336xx/CVE-2024-33640.json) (`2024-04-29T05:15:06.757`)
- [CVE-2024-33643](CVE-2024/CVE-2024-336xx/CVE-2024-33643.json) (`2024-04-29T05:15:06.960`)
- [CVE-2024-33645](CVE-2024/CVE-2024-336xx/CVE-2024-33645.json) (`2024-04-29T05:15:07.153`)
- [CVE-2024-33646](CVE-2024/CVE-2024-336xx/CVE-2024-33646.json) (`2024-04-29T05:15:07.350`)
- [CVE-2024-33648](CVE-2024/CVE-2024-336xx/CVE-2024-33648.json) (`2024-04-29T05:15:07.580`)
- [CVE-2024-33649](CVE-2024/CVE-2024-336xx/CVE-2024-33649.json) (`2024-04-29T05:15:07.787`)
- [CVE-2024-4299](CVE-2024/CVE-2024-42xx/CVE-2024-4299.json) (`2024-04-29T04:15:08.623`)
- [CVE-2024-4300](CVE-2024/CVE-2024-43xx/CVE-2024-4300.json) (`2024-04-29T04:15:08.887`)
- [CVE-2024-4301](CVE-2024/CVE-2024-43xx/CVE-2024-4301.json) (`2024-04-29T04:15:09.110`)
- [CVE-2024-3193](CVE-2024/CVE-2024-31xx/CVE-2024-3193.json) (`2024-04-29T07:15:07.773`)
- [CVE-2024-3194](CVE-2024/CVE-2024-31xx/CVE-2024-3194.json) (`2024-04-29T07:15:08.070`)
- [CVE-2024-3195](CVE-2024/CVE-2024-31xx/CVE-2024-3195.json) (`2024-04-29T07:15:08.400`)
- [CVE-2024-3196](CVE-2024/CVE-2024-31xx/CVE-2024-3196.json) (`2024-04-29T07:15:08.740`)
- [CVE-2024-33537](CVE-2024/CVE-2024-335xx/CVE-2024-33537.json) (`2024-04-29T06:15:08.083`)
- [CVE-2024-33539](CVE-2024/CVE-2024-335xx/CVE-2024-33539.json) (`2024-04-29T06:15:08.930`)
- [CVE-2024-33540](CVE-2024/CVE-2024-335xx/CVE-2024-33540.json) (`2024-04-29T06:15:09.637`)
- [CVE-2024-33542](CVE-2024/CVE-2024-335xx/CVE-2024-33542.json) (`2024-04-29T06:15:10.220`)
- [CVE-2024-33544](CVE-2024/CVE-2024-335xx/CVE-2024-33544.json) (`2024-04-29T07:15:06.543`)
- [CVE-2024-33546](CVE-2024/CVE-2024-335xx/CVE-2024-33546.json) (`2024-04-29T07:15:06.810`)
- [CVE-2024-33548](CVE-2024/CVE-2024-335xx/CVE-2024-33548.json) (`2024-04-29T06:15:10.937`)
- [CVE-2024-33551](CVE-2024/CVE-2024-335xx/CVE-2024-33551.json) (`2024-04-29T06:15:11.487`)
- [CVE-2024-33554](CVE-2024/CVE-2024-335xx/CVE-2024-33554.json) (`2024-04-29T06:15:12.090`)
- [CVE-2024-33559](CVE-2024/CVE-2024-335xx/CVE-2024-33559.json) (`2024-04-29T06:15:12.607`)
- [CVE-2024-33562](CVE-2024/CVE-2024-335xx/CVE-2024-33562.json) (`2024-04-29T06:15:13.163`)
- [CVE-2024-33571](CVE-2024/CVE-2024-335xx/CVE-2024-33571.json) (`2024-04-29T06:15:13.667`)
- [CVE-2024-33630](CVE-2024/CVE-2024-336xx/CVE-2024-33630.json) (`2024-04-29T06:15:14.450`)
- [CVE-2024-33631](CVE-2024/CVE-2024-336xx/CVE-2024-33631.json) (`2024-04-29T06:15:14.940`)
- [CVE-2024-33632](CVE-2024/CVE-2024-336xx/CVE-2024-33632.json) (`2024-04-29T06:15:15.537`)
- [CVE-2024-33681](CVE-2024/CVE-2024-336xx/CVE-2024-33681.json) (`2024-04-29T06:15:16.057`)
- [CVE-2024-33686](CVE-2024/CVE-2024-336xx/CVE-2024-33686.json) (`2024-04-29T06:15:16.623`)
- [CVE-2024-33904](CVE-2024/CVE-2024-339xx/CVE-2024-33904.json) (`2024-04-29T06:15:17.320`)
- [CVE-2024-33905](CVE-2024/CVE-2024-339xx/CVE-2024-33905.json) (`2024-04-29T06:15:17.667`)
- [CVE-2024-4302](CVE-2024/CVE-2024-43xx/CVE-2024-4302.json) (`2024-04-29T06:15:17.803`)
- [CVE-2024-4303](CVE-2024/CVE-2024-43xx/CVE-2024-4303.json) (`2024-04-29T06:15:18.457`)
### CVEs modified in the last Commit
Recently modified CVEs: `0`
Recently modified CVEs: `2`
- [CVE-2024-1023](CVE-2024/CVE-2024-10xx/CVE-2024-1023.json) (`2024-04-29T07:15:06.233`)
- [CVE-2024-1300](CVE-2024/CVE-2024-13xx/CVE-2024-1300.json) (`2024-04-29T07:15:06.423`)
## Download and Usage

View File

@ -236717,6 +236717,7 @@ CVE-2023-52716,0,0,fac095701883d01d5f92e56c70701dc066b3ae8f92d0c5921c5cf0aa2fbb0
CVE-2023-52717,0,0,e713315d9fcc50e6cbb98e0dd380e2c86ba52b63a35d352b23f2645ee0f83a24,2024-04-08T18:48:40.217000
CVE-2023-5272,0,0,e188ff056a72e73c412c109b97d5eb37c41b2dbce71d285e9dfeb205fc3a7064,2024-04-11T01:22:56.733000
CVE-2023-52722,0,0,58a4dacfed06269af66d591e2c90392281dec137a91dd3653eb193059da1f3b7,2024-04-28T00:15:07.270000
CVE-2023-52723,1,1,d4be2feca33226ddfe4838f7958d61e46f837250fa1c183dc1e9ed285ea7ec65,2024-04-29T06:15:06.983000
CVE-2023-5273,0,0,6f05c674078315237abe3d7b2ebcc88fea13416a5c7e4aafdfcff23a1ae8a322,2024-04-11T01:22:56.817000
CVE-2023-5274,0,0,230ef4c0e160801f289163632d814f7177c2b1395a715b72f33c8d0b5d876249,2023-12-05T18:20:39.937000
CVE-2023-5275,0,0,9a81436027e8dad0b67eefc484a675cc6dfdf47ffb7247993749a2124145a13c,2023-12-05T18:18:37.050000
@ -239232,7 +239233,7 @@ CVE-2024-1019,0,0,27c6fed97db80e9684966512d657c2ae1b8d86be0f46f2f894fd714e51d0d5
CVE-2024-1020,0,0,adc5ab5f2da8e36fe7b7aa7c315c830611f48798a94b22d42b050e3e9e630362,2024-04-11T01:24:18.170000
CVE-2024-1021,0,0,7bcf34eb76307cde4ae64d588874bf57854c5c64505f94e3349469a346a9c6cb,2024-04-11T01:24:18.257000
CVE-2024-1022,0,0,357efb4939784b3bedb659f15a28d0e47d08529e441db0e0be00cbc23a0198b9,2024-04-11T01:24:18.350000
CVE-2024-1023,0,0,68bde2f3580eb45ab5d6f3ebb52c2d06f8d25be5075193a68e136d0ef3abff5b,2024-04-09T12:15:07.627000
CVE-2024-1023,0,1,f385656c92a71370efff252bd7c129136dc520292043427aaca7a2375a03c816,2024-04-29T07:15:06.233000
CVE-2024-1024,0,0,85149b221a8921f7ffbd9c6aa85a2dfcc208fc0fbfab7fd4f41d63975d68c1d5,2024-04-11T01:24:18.463000
CVE-2024-1026,0,0,ce9d6ecfc0c397ada0ff1130145169bc08739645437cccf4be1ae651761bfb1b,2024-04-11T01:24:18.550000
CVE-2024-1027,0,0,ee916bdd4519e7da0384e34a5415b2bb4d3bac5a3382b229877ac74923e86538,2024-04-11T01:24:18.637000
@ -239467,7 +239468,7 @@ CVE-2024-1294,0,0,1a6fde55ee17952393d258a28e1938bfe41cafec05fa305cc82057814b7c2b
CVE-2024-1296,0,0,ab648d9dba58ca530bb990b50d92c4f5ce9f591faa8fbeeb49385095b8425c33,2024-03-13T18:16:18.563000
CVE-2024-1297,0,0,1fc219bb038ab422185a999365115aff94759fe3e5ff94e3dc4180f1d6bc82d0,2024-02-20T19:50:53.960000
CVE-2024-1299,0,0,165a6e5bf7396c9871edb84a6ce28d3386b33fd34eb9238065e890fa150a178a,2024-03-07T13:52:27.110000
CVE-2024-1300,0,0,aa2a037719c40df60b2d9bb001f22a8670a4e72a55eb304c0d1c9297e35e3cf2,2024-04-18T17:15:48.453000
CVE-2024-1300,0,1,0d670db12603e944dcc15b5481ece919335822514a418179c496d8822134bd6f,2024-04-29T07:15:06.423000
CVE-2024-1301,0,0,68d5e322fab21220735382791ea9287e8104e954fa5bc7b1f8f02021f25e280b,2024-03-12T17:46:17.273000
CVE-2024-1302,0,0,e42b35f7a02693024fada8fec8e812444e0bb721c54c537bf6c1b8db8c60ce66,2024-03-12T17:46:17.273000
CVE-2024-1303,0,0,d6386ac67e1b3bd9c657849a1747229ab86034b9c989d20fb5cde0be8bba0359,2024-03-12T17:46:17.273000
@ -239914,7 +239915,7 @@ CVE-2024-1869,0,0,ac853c90604d921515fb75a7a9d547bf372e5cec01a80f310b2670cc5a1922
CVE-2024-1870,0,0,f4fb5b22985880167f6ef7e58ca026ed8b40cb096cd98407286dd4dcc1e6fab1,2024-03-11T01:32:29.610000
CVE-2024-1871,0,0,6877313e5f635cc9e371a87a23e72e35f6ea815c7cde96f594cb922c016078f3,2024-04-11T01:24:32.670000
CVE-2024-1872,0,0,0e36724fd278d3b5ba1bf1780a959b96e873b9d84e6ffb5da1fec563cf60ff60,2024-03-29T12:45:02.937000
CVE-2024-1874,1,1,c541480f66d6871bd0e93a0dd6d4352ded246839add06e9279e08848b18bd851,2024-04-29T04:15:07.580000
CVE-2024-1874,0,0,c541480f66d6871bd0e93a0dd6d4352ded246839add06e9279e08848b18bd851,2024-04-29T04:15:07.580000
CVE-2024-1875,0,0,9510fe1472f0e028cce1eebf549e2390cdd0035aa50e364b7cc2151cc18bf7f8,2024-04-11T01:24:32.760000
CVE-2024-1876,0,0,7c1afc4b20753dec3d27b0c65fd66be5316aaad306a5323949b6752cbc5cfcdc,2024-04-11T01:24:32.843000
CVE-2024-1877,0,0,21c85e8ce951a56623918f35f9c0cbb9b3582dedf7e76a569b3f5e520d1d0387,2024-04-11T01:24:32.927000
@ -239937,6 +239938,7 @@ CVE-2024-1900,0,0,df3a7e0d7f662e0642af797e67801f5b993e667e914107fd3f604cd2322f2a
CVE-2024-1901,0,0,e852d825cede13009c4c827235fab136069de3983ba4df012d62632a4fcd1d38,2024-03-06T15:18:08.093000
CVE-2024-1902,0,0,012f8c6561b23779499ee60e1b0701a7ed975d80b89eade3a28f94f4708254ec,2024-04-15T18:15:10.070000
CVE-2024-1904,0,0,894e214d09f8efe1b9b69452204531788406056d1489422306bbd393d57cb47d,2024-04-10T13:23:38.787000
CVE-2024-1905,1,1,99fc2a264209d40d17540b1f82384a2b60d6e4fdfef05f9a479a7d2dc908eb8d,2024-04-29T06:15:07.650000
CVE-2024-1906,0,0,4a0389164694374915846934d3ecd021a9b146d80ff266286dcad5a6eeb2c849,2024-02-27T14:19:41.650000
CVE-2024-1907,0,0,674a8f990612fbd789e8b29e4f4db555efa2966321d7535d44b4ff9d82432ec5,2024-02-27T14:19:41.650000
CVE-2024-1908,0,0,92bf17210112d2d60d7d442f37608315d845944e26306753d826ae8aa1a4dd43,2024-03-21T12:58:51.093000
@ -242599,6 +242601,7 @@ CVE-2024-25030,0,0,fc3de3fd573e21787e1c0bdd960fb3a4c590b360d40ba7c7d9e34380b9c90
CVE-2024-2504,0,0,b952b345d554f248180cfc37dd33de3d29aef92bb40f82f2454b4ee2e2c1523d,2024-04-10T13:23:38.787000
CVE-2024-25046,0,0,64b67efbc5b2947bdef146aee983b6003b7daa23659b2bfe93519b90947330ac,2024-04-03T17:24:18.150000
CVE-2024-25048,0,0,f98b5f829311c9c9a726d02cd66b8a93a4755ae4aa235bf4cd2af7701d9667d0,2024-04-27T12:15:10.517000
CVE-2024-2505,1,1,52f7b4fb73939784ef566f22fc7864f65f01228d17a754b7b6510c54c8095deb,2024-04-29T06:15:07.937000
CVE-2024-25050,0,0,1ff20d693c75735252bb078c1b9df844137fdb7eca3fe844e495a58addd9c2a1,2024-04-28T13:15:08.257000
CVE-2024-25062,0,0,9596ed5cf07a8bc8469d4afc28fc727a431af7cff3b6b8e84435c301d9955756,2024-02-13T00:40:40.503000
CVE-2024-25063,0,0,ada8a3e76748f7f6ba8d6378c081423ac8f962f095964d00e876ad6b7009736e,2024-03-04T22:45:02.117000
@ -244046,7 +244049,7 @@ CVE-2024-27537,0,0,19c23a8ace2b9fa0f5b0c7f5ae887d2217327b1705c43697ebd005f0fa005
CVE-2024-2754,0,0,1fcd4415dd3a76ae4bfdcbebc23b2eb9c440a110a989dd99eeab14538d1df9f4,2024-04-11T01:25:35.173000
CVE-2024-27558,0,0,7153680518d63c7932305620ccfbd7ee5fef9d259b5e0f563f6375bef36d085e,2024-03-01T22:22:25.913000
CVE-2024-27559,0,0,df9ea8940256beed3a439c54dc14f3a2ff3269b9257ecf55b0d7cb1c085a0238,2024-03-01T22:22:25.913000
CVE-2024-2756,1,1,5463ce6d0e21b44338dcc1e991e0d0bd20cc1ad2f08e590845375bd092842af6,2024-04-29T04:15:07.890000
CVE-2024-2756,0,0,5463ce6d0e21b44338dcc1e991e0d0bd20cc1ad2f08e590845375bd092842af6,2024-04-29T04:15:07.890000
CVE-2024-27561,0,0,6eefe1444b42138366028087602d71a400d94cfb2285aea30a4a52e3e99f8491,2024-03-05T18:50:18.333000
CVE-2024-27563,0,0,c70b4ac1004b8f01005bd67665b89f1a49dcd8b48b0e020f5d345a7e89fd281c,2024-03-05T18:50:18.333000
CVE-2024-27564,0,0,cfbb7ee5af0b2da089da0b8003ae338a360a5aa7de72516445a54c273e06a2cc,2024-03-05T18:50:18.333000
@ -244054,7 +244057,7 @@ CVE-2024-27565,0,0,96e6f13815f4c6a293b19a63ca7a0089b2c54f0432c50f30c4cd3de5a637e
CVE-2024-27567,0,0,4368e6c3c29630571d47ba92cf82bb82637985666e0ed1ee7f11385613c02512,2024-03-01T15:23:36.177000
CVE-2024-27568,0,0,323797eb146837ccc897ceddbc9a717a6133487b17fde4d619016ddccf714199,2024-03-01T15:23:36.177000
CVE-2024-27569,0,0,000ff88e8ff4678a3790d0ee96674581a9a53afd1b5f0d49033b717c5dd656d1,2024-03-01T15:23:36.177000
CVE-2024-2757,1,1,1fc026d8280c4289387fb466b206daaa73f3535e36a232a419e0350231b29c46,2024-04-29T04:15:08.113000
CVE-2024-2757,0,0,1fc026d8280c4289387fb466b206daaa73f3535e36a232a419e0350231b29c46,2024-04-29T04:15:08.113000
CVE-2024-27570,0,0,30e1bdadd931878127199d0565523cd94923921178695ba62d569ae38e48386b,2024-03-01T15:23:36.177000
CVE-2024-27571,0,0,2fcce61cb867ec2a650e4bd74e7018e990625a473882c12953648f5c8c2545b3,2024-03-01T15:23:36.177000
CVE-2024-27572,0,0,6169a6a6221da5c6dbb1556f7b45e6b45c4deebae5e21607b1e3cfa478f1fe5b,2024-03-01T15:23:36.177000
@ -245714,7 +245717,7 @@ CVE-2024-30950,0,0,992550aa16b7b69040c27b7eadb42b4babd9ce9c185610db0008bbada9865
CVE-2024-30951,0,0,64c319e5130efe1148872b6efd54e0b74d19e18724bc83608b600a523ab1d0cb,2024-04-17T20:08:21.887000
CVE-2024-30952,0,0,45f3818300706503aa11d9788e132ab06eaeaa5db69128a0c2116be2f61adacf,2024-04-17T15:31:50.160000
CVE-2024-30953,0,0,b6048a3223dd71969afb665512f3c96be52d96e721358fb67ff9cf9a8128e438,2024-04-17T20:08:21.887000
CVE-2024-3096,1,1,c93255ea67adad2bffdf60492111e523c8c547b098778e9ed06d95762d14d3bb,2024-04-29T04:15:08.350000
CVE-2024-3096,0,0,c93255ea67adad2bffdf60492111e523c8c547b098778e9ed06d95762d14d3bb,2024-04-29T04:15:08.350000
CVE-2024-30965,0,0,0e44dd5d951a25ac3e8873a32678a3145da47d1060cb5312576a9c0471b643ad,2024-04-02T18:12:16.283000
CVE-2024-3097,0,0,34b222095b4c58e8686826c73c47f391fd247710053df9aaf322e019da7a6c42,2024-04-26T15:56:40.820000
CVE-2024-30974,0,0,fad1ff421513e997a755a646f437b1cf2946e8e72ed4701dccf29e92d3c1baae,2024-04-22T13:28:50.310000
@ -246085,6 +246088,8 @@ CVE-2024-31873,0,0,30397559953deb34a9ae192149473632dc6b2334245e920787a4c5e14fc76
CVE-2024-31874,0,0,1770e58d0ae5591eb931a8cdfdb054fb4d854f81849d14af250c71db6caf553c,2024-04-10T19:49:51.183000
CVE-2024-3188,0,0,5d70d4884e37e1862c5503e8662fdd8be316d1df7ecad77f44114699c1426b8a,2024-04-26T12:58:17.720000
CVE-2024-31887,0,0,e951c215b0e12b882bcc7244c98d7631ee4f4b7a3271b5f24e369f1a635cd3e5,2024-04-17T12:48:07.510000
CVE-2024-3191,1,1,909de57a0e1134c017815b99f5374905a7cebaa6da948da4a489799e7c96ecfa,2024-04-29T07:15:07.080000
CVE-2024-3192,1,1,725dda67edbc96beb58e8c0c2444a458c6950abc195edff7ad4f85d511813766,2024-04-29T07:15:07.480000
CVE-2024-31920,0,0,3c0045dbbecad7d78d5b9eb044589c2fc290e421e2d5accb9391890092efc90f,2024-04-15T13:15:31.997000
CVE-2024-31921,0,0,732b3dfcff7f3c38928ece374bd7708cd93eb00a4dc0a7d5ac8e2f115b9d7217,2024-04-15T13:15:31.997000
CVE-2024-31922,0,0,ab7058b1ab970c1607707e3b516fb20a2b1bb9e11ac7a3e1d4bef18b1ec4d6b7,2024-04-15T13:15:31.997000
@ -246095,6 +246100,7 @@ CVE-2024-31926,0,0,5ea07bd781aaf165e7c249d84898bbaee298d70cc8e541e3b74d17ae8e2ec
CVE-2024-31927,0,0,6cd17f97d47f2415c03c97ad66e9324a16977292b8eb97b821aae9ba7a0f2833,2024-04-11T13:30:38
CVE-2024-31928,0,0,e6cc120c3629d81f3db9dcadc93c459e7b269490e6128fcc8be3997c3ef595e9,2024-04-11T13:30:38
CVE-2024-31929,0,0,5359df4522faa8d2c46f605d48868a6939d06d35e038e5f3287851d0461688a3,2024-04-11T13:30:38
CVE-2024-3193,1,1,ea73d12bc10265a58216dce72c432ee965205457c358de1f1b4800cf51e18cca,2024-04-29T07:15:07.773000
CVE-2024-31930,0,0,628cb0e5103582aeccc9f3e33331b9dbe7dba70b3951389bc2f9327ad3b8f5ee,2024-04-11T13:30:38
CVE-2024-31931,0,0,31bc6de522002d5fbdfc52e575ea088ef3d3fde1fc3f2ee4856692982b9dc2cf,2024-04-11T13:30:38
CVE-2024-31932,0,0,cbdc79dc2f64dd5bef9877c31b5d39549faf66977f5313958012ec22e616327c,2024-04-11T13:30:38
@ -246105,6 +246111,7 @@ CVE-2024-31936,0,0,41ae8d4679677e086c385533d0a63055153ebb271d32fb7547401292a6a57
CVE-2024-31937,0,0,24fb14fc8c636ca322e17128cc4ef69cbdba60a9f579b74e55aed300a2f73ed6,2024-04-11T13:30:38
CVE-2024-31938,0,0,5f3f05f61d1ef2cd5bad53d9f5667002cb10342b194111eed40f5ded72653f03,2024-04-15T13:15:31.997000
CVE-2024-31939,0,0,dc9cc0dfd8ae0f6c4caa1a4775b1cc86559b00f81c6408b5f2a51c57007b5d9e,2024-04-11T12:47:44.137000
CVE-2024-3194,1,1,d329211d83b0115ad0b19eeb5be2a89ccbb6bafb933feb45b5e8a49d955922d1,2024-04-29T07:15:08.070000
CVE-2024-31940,0,0,1ddf48c04277bac2492208785102f32503356b7d59b7891c524b2c22b8846edb,2024-04-15T13:15:31.997000
CVE-2024-31941,0,0,b8dc065fda42126e32d28a44ef547549a83996a827e764074359d3e3ec8c1e09,2024-04-15T13:15:31.997000
CVE-2024-31942,0,0,ceae4b513a0b6e905236b05cb5dd98d07a79c0420729857e9c51c87c35b65b17,2024-04-15T13:15:31.997000
@ -246112,8 +246119,10 @@ CVE-2024-31943,0,0,d050ed16bd2fd56e0b74cc5712c1eb7ef94538d6cfa9c00022a6cfa048bd2
CVE-2024-31944,0,0,d1cf01bee95ac2d1b4f198f30f665ce7f3dae041b6378dd5d37f86b95341e18f,2024-04-10T19:49:51.183000
CVE-2024-31948,0,0,61f6d35222c1e3f11e25e4eb10990c24f6ea2b07724ec51b46fb0ba4b709b0cc,2024-04-28T07:15:08.843000
CVE-2024-31949,0,0,d55253e38f8bc425df8f875d525d4d6b96cb3180b7d665ec7de9778e227e2105,2024-04-28T07:15:08.917000
CVE-2024-3195,1,1,6d60776e21ae5e9a12630c8927b26ba77fa690068c68c10ca942d3c06a3f5897,2024-04-29T07:15:08.400000
CVE-2024-31950,0,0,6cefb0ca8246a802eee33ecaeabf30a3794c53c92173f69e19945e3bf38104d7,2024-04-08T18:48:40.217000
CVE-2024-31951,0,0,a02cb6e83819b8aefe87f14fcbaf10a3986c9b6174676e08f67eb54fe256f190,2024-04-08T18:48:40.217000
CVE-2024-3196,1,1,ddedfe5cfa69a5a0e563bb0daac4e7b058b56096294d5609b3943dc244d20005,2024-04-29T07:15:08.740000
CVE-2024-31978,0,0,905fe24a9cf546b211ed3cfae7258dc772856eb0550beb1f55c95bc3799601d2,2024-04-09T12:48:04.090000
CVE-2024-31981,0,0,6b90fc014c719d42bc6275e095b2e18dc9d544859b6ab5a3b554ecb5ab03a845,2024-04-11T12:47:44.137000
CVE-2024-31982,0,0,8e15c1dad7e15762a1fbb5bb26c4de9afb40b54c1e4ad12ab123edd90435cd54,2024-04-11T12:47:44.137000
@ -246612,7 +246621,7 @@ CVE-2024-33259,0,0,7baedb8a8dc783fa88b887fd5c3c1eaf3e0afda0857f326c9372530e2281b
CVE-2024-33260,0,0,e8aa0d878f3a05d87e2a04d2b95090816ce2a8144679e05279a245ccba53bc96,2024-04-26T15:32:22.523000
CVE-2024-3333,0,0,8caee5b26018a8a7a4f06ec5d64d35dd731cf8d2f43a25885f4e67db044a1bff,2024-04-17T12:48:07.510000
CVE-2024-33331,0,0,d376453cc8c649ab7a3cb33fa711c6bde798d37e4f57b1f2e9caeddda1eec751,2024-04-28T23:15:07.120000
CVE-2024-33339,1,1,1af2e0249bed8750531b95be13d2086bbc874a9cb43e2918f6202dbfdd9b1a67,2024-04-29T05:15:06.340000
CVE-2024-33339,0,0,1af2e0249bed8750531b95be13d2086bbc874a9cb43e2918f6202dbfdd9b1a67,2024-04-29T05:15:06.340000
CVE-2024-33342,0,0,4ff11c7e369d836ce7a1244b0b48afc72b8090af879823bb663cc593e2824dbc,2024-04-26T19:59:19.793000
CVE-2024-33343,0,0,17e1971be9c2ae8ba52a2cc25de4ae4286a5a8f05a2fb81a46885d3dfd33cb1b,2024-04-26T19:59:19.793000
CVE-2024-33344,0,0,f74e33f11e6670462bc5b65f54260ae5e05e3409e05b053682376a20da3d6d34,2024-04-26T19:59:19.793000
@ -246628,10 +246637,22 @@ CVE-2024-3351,0,0,4e83ab506e7228a3886d0c35bd4699b3cc13e079b52b9390280e70733aeb1d
CVE-2024-3352,0,0,2bb858a13268847c6f0639e9c58251e5b0608c0fcc2f637338ed79183e654688,2024-04-11T01:25:59.117000
CVE-2024-3353,0,0,a43304c0c957cee30ec6a0fe5705b568475f27f66d5199c2166f449cd8eb908f,2024-04-11T01:25:59.200000
CVE-2024-33531,0,0,71e7e7c369e07333ae7410b9238493e0b8e5a70255296aafd8bfae114b6e76d5,2024-04-24T13:39:42.883000
CVE-2024-33537,1,1,1abcca94500cff61689bc299259daf6c77965db351f4065549770837c6336670,2024-04-29T06:15:08.083000
CVE-2024-33539,1,1,8f41542e5f77851d2f4faa8d70582127978bd07484561d364c44db3eb5ca61fd,2024-04-29T06:15:08.930000
CVE-2024-3354,0,0,4a4ea1b685e77f1329c6119be3c557bd8627ab8e6e7bcdf524dde072c4485f2b,2024-04-11T01:25:59.280000
CVE-2024-33540,1,1,747a115e4ae2ca6e4d30057a4f7d7e64e2b02e1bc21f016e186f3ec5a7c4cbee,2024-04-29T06:15:09.637000
CVE-2024-33542,1,1,c46844096e18c90d4389e00877bdc86b55250f44e249077d028e212eff872075,2024-04-29T06:15:10.220000
CVE-2024-33544,1,1,1466a86d502d8d54ff1b9a60222a92956c868d95a390bd0d2b95b1d73fa6edf0,2024-04-29T07:15:06.543000
CVE-2024-33546,1,1,3ef102e69d02cbc32fbb5297ea63418695ffc6bd67887340158d2086fadabd61,2024-04-29T07:15:06.810000
CVE-2024-33548,1,1,f1884ac10132cc8231eb6aaac64ad6b1e7a3129e60b9c76432db676e6c17cc0b,2024-04-29T06:15:10.937000
CVE-2024-3355,0,0,1992313db0de37cd343f2e0c4d60ca5be53ec7c18d85010c791b43a1a0033536,2024-04-11T01:25:59.360000
CVE-2024-33551,1,1,48cbe7358b0d6b0348a8420e63ce1222decf42609ef0aa9cdee85f45dc0831b8,2024-04-29T06:15:11.487000
CVE-2024-33554,1,1,44f60587812c323490409e830f796cfbd35a235319f7237d253181849d9ed8df,2024-04-29T06:15:12.090000
CVE-2024-33559,1,1,948fdd92ac3165b98a9a3e7d7bdf15d3f487bac4b7adfad2a4fb49bd7435a7e9,2024-04-29T06:15:12.607000
CVE-2024-3356,0,0,087254ad27ba51e796f585bd19b7860bdf92d5d8812be46839c2000c6ff7ec4e,2024-04-11T01:25:59.443000
CVE-2024-33562,1,1,ba9f8f690ca4d53bf11bc838f8b9a916ae70cc6d375248da36a8a28d84f314fd,2024-04-29T06:15:13.163000
CVE-2024-3357,0,0,4504c33b3bb653378795a255a83c05295c4cb93d37914e6c8a1edf8397686b85,2024-04-11T01:25:59.530000
CVE-2024-33571,1,1,32fa1280ecb5787c1681505d41e97480c3bdfd2dc281b5a45dc4061c57561d00,2024-04-29T06:15:13.667000
CVE-2024-3358,0,0,694a0960c89fb254bc37c7c2f594e5cb197e9c3b955cd9433f44c414aff75d2b,2024-04-11T01:25:59.610000
CVE-2024-3359,0,0,a779b2e33399e3789113d39f065b1425ad824801b217abc54417c2cce7e7d2db,2024-04-11T01:25:59.687000
CVE-2024-33592,0,0,db5c0b056d9b2b7db6cca903286bba2d07a26aaa9035eb96ef4301de432670e3,2024-04-25T17:25:05.903000
@ -246640,17 +246661,20 @@ CVE-2024-3360,0,0,2ffbaa301c04a2d62013f221bb69a21a0f4034a97959f93c6ac130d96a9162
CVE-2024-3361,0,0,c120caf4947180a69c26140d9354a0af916b072bcc15573944dc923bbf223f7d,2024-04-11T01:25:59.847000
CVE-2024-3362,0,0,4f698660b915c64322658e8738d0fb3f09460cf98fd487b3189e8f9d96e2b2c1,2024-04-11T01:25:59.930000
CVE-2024-3363,0,0,f5bcc8af5a66d22a73abe7e86b636154362f284983c790b03385b20aa4737ceb,2024-04-11T01:26:00.010000
CVE-2024-33633,1,1,14ae8b34b1aba55606c0bcadc7809f885230f727e35d21246f86a6c94ca95b9f,2024-04-29T05:15:06.507000
CVE-2024-33630,1,1,d429997353148ad4f03de5fcc4c3beaa034ad03ad4bb2b1118cf25cea4d32b29,2024-04-29T06:15:14.450000
CVE-2024-33631,1,1,c9134f1e88711f8a04a135872712a121867f709063e57f4fb1d965c1ed67f734,2024-04-29T06:15:14.940000
CVE-2024-33632,1,1,f4f40947da0388a7ccb639f255eb9d8f044af737b4c70d0121643974544be28d,2024-04-29T06:15:15.537000
CVE-2024-33633,0,0,14ae8b34b1aba55606c0bcadc7809f885230f727e35d21246f86a6c94ca95b9f,2024-04-29T05:15:06.507000
CVE-2024-33638,0,0,3427361ab991422b101cc37f7607a376f6587ef09d6fc7a47e3613da65e0631b,2024-04-26T12:58:17.720000
CVE-2024-33639,0,0,c46b4523c8f0d554545e91766a68c1aa539c722a582823f8a257dc980bedbf11,2024-04-26T12:58:17.720000
CVE-2024-3364,0,0,2986dc00429f74e0e2572cb8153933c26e825f7eed092370bca7e4ac84ee4fdf,2024-04-11T01:26:00.090000
CVE-2024-33640,1,1,569f42cf53adfed99d6bea04072e40faa2e5188d736f2609872b6d759c9e31ac,2024-04-29T05:15:06.757000
CVE-2024-33640,0,0,569f42cf53adfed99d6bea04072e40faa2e5188d736f2609872b6d759c9e31ac,2024-04-29T05:15:06.757000
CVE-2024-33642,0,0,7569707402e488c170fb19233ca774daa51c8f856e1cd5f3428c5b203d123531,2024-04-26T12:58:17.720000
CVE-2024-33643,1,1,0ff6c747729a96b60f6ad504f202ccec54992f8c5c6e4d4ffb32ec39b77ce94a,2024-04-29T05:15:06.960000
CVE-2024-33645,1,1,85d2eafbf303b88d1d1d02964653d2fa337d6e4277b033b67c0b7e23c7278b7a,2024-04-29T05:15:07.153000
CVE-2024-33646,1,1,ea7d4b106bf97e4a36f40d68153e29cb44df509ec470f0b72a5b82ef6fccb9e8,2024-04-29T05:15:07.350000
CVE-2024-33648,1,1,73a31fda23738297aada9438e1f4a0d12d8e695d95a654278ed854d08f287a70,2024-04-29T05:15:07.580000
CVE-2024-33649,1,1,76be47f9e9623693c2dc4f7dbd7700f237602a11cf08c5a162589622dee41d45,2024-04-29T05:15:07.787000
CVE-2024-33643,0,0,0ff6c747729a96b60f6ad504f202ccec54992f8c5c6e4d4ffb32ec39b77ce94a,2024-04-29T05:15:06.960000
CVE-2024-33645,0,0,85d2eafbf303b88d1d1d02964653d2fa337d6e4277b033b67c0b7e23c7278b7a,2024-04-29T05:15:07.153000
CVE-2024-33646,0,0,ea7d4b106bf97e4a36f40d68153e29cb44df509ec470f0b72a5b82ef6fccb9e8,2024-04-29T05:15:07.350000
CVE-2024-33648,0,0,73a31fda23738297aada9438e1f4a0d12d8e695d95a654278ed854d08f287a70,2024-04-29T05:15:07.580000
CVE-2024-33649,0,0,76be47f9e9623693c2dc4f7dbd7700f237602a11cf08c5a162589622dee41d45,2024-04-29T05:15:07.787000
CVE-2024-3365,0,0,64a2e531185071bb7e6b7a9cf067546b0c6c5f700f703a6639ecd4e081a3dcb7,2024-04-11T01:26:00.170000
CVE-2024-33650,0,0,19d8d8a0b27cf4dde85e5f92d8bf04c572aaff417d777c3294978343c2e4f677,2024-04-26T12:58:17.720000
CVE-2024-33651,0,0,1cefad65f2bec7e29ec0f3af20b45cba9167a66152171d6da2043875d9e6dcf1,2024-04-26T12:58:17.720000
@ -246672,8 +246696,10 @@ CVE-2024-33677,0,0,923eddda39cd03a5bb517e05a480a9596b3c6c82a0ed2f89c09750c19ea74
CVE-2024-33678,0,0,e29c82afa965b755a6e3188aace0a357ae40d5fe9b52b7f7177043f7792e9dd7,2024-04-26T12:58:17.720000
CVE-2024-33679,0,0,f84e540fe859a7afe5f4ff76589343075f3d0bdf8c9cff62c28aa7a3f40455e2,2024-04-26T12:58:17.720000
CVE-2024-33680,0,0,0b464bc2ce373b95fed587888415ba32213dd9ce01298ab4cd8f52af9d530aea,2024-04-26T12:58:17.720000
CVE-2024-33681,1,1,548950ce0064cdd92a907d7ce32bf554f4a3c02c1609223f9d1197b4fd07d45c,2024-04-29T06:15:16.057000
CVE-2024-33682,0,0,2077d9f86dbcd7afb58135718cb00b93d9684082b8213c0215eee7a02c222543,2024-04-26T12:58:17.720000
CVE-2024-33683,0,0,d7c4bf8bbdd8bd3ca6f26bbf7a4bf0688b7570f813369db65ed2d59e99a11ae9,2024-04-26T12:58:17.720000
CVE-2024-33686,1,1,cb11bce9d4222859e78a22a350bf0fbd12a312d0c6cee087f3196d5cf87e6c79,2024-04-29T06:15:16.623000
CVE-2024-33688,0,0,15c623ea6d0e85e99afd20753787faa07eb45674316852700f3732b9713c4938,2024-04-26T15:32:22.523000
CVE-2024-33689,0,0,9a3d372175f3eea45d33e57473572a2b8c9a57d63f47cd918b323f42ce5db301,2024-04-26T15:32:22.523000
CVE-2024-3369,0,0,943fbc9826beb11428b980e60e48ec152ecf5fda97b5d1c26bb0e96c030079eb,2024-04-11T01:26:00.317000
@ -246701,6 +246727,8 @@ CVE-2024-33883,0,0,3b17b48394bf62744fbd468bf457ba6f01138ca86f08a667646ea9846d188
CVE-2024-33891,0,0,4d067bbdb453306352bedaf699cdd4319a93f8f140e1ffcfce72980a6fa91b2e,2024-04-28T23:15:07.200000
CVE-2024-33899,0,0,83c5c675381e020685b43fd536d5112506568fc46560c71323f3b12b51ed8097,2024-04-29T00:15:07.773000
CVE-2024-33903,0,0,d96c3db96f0e438997e300c2112a3a0d050aa12880229d964d5b557d89ba9aa1,2024-04-29T01:15:09.600000
CVE-2024-33904,1,1,f1065144aff1f3a07dac950b2bff4e0d7bebc724ec8bb15e6e11e7eef4705f37,2024-04-29T06:15:17.320000
CVE-2024-33905,1,1,5f8214ca78ea0daa3bd7aaf864c15a416c36c5d929bc1d8c2eeecabcee92677e,2024-04-29T06:15:17.667000
CVE-2024-3400,0,0,5bb68c1f741d7492d6e3e08b6f1711eb6e28a4a827bd2f3f354ccd1b7a47a1fe,2024-04-23T19:57:25.207000
CVE-2024-3413,0,0,7c0263f5aa26015f580f259b17ac76e3fb232807ce6eb6b3e0fa4a42d34def58,2024-04-11T01:26:00.727000
CVE-2024-3414,0,0,fcf8b2012e3dcab7048965e9d40e8c26f25a86217cc70e6c24a2ae712b119943,2024-04-11T01:26:00.803000
@ -247031,6 +247059,8 @@ CVE-2024-4294,0,0,acd8c525c0dbd05d938d9cfd91b4f84bb2cd9884ab996901732c285a16449a
CVE-2024-4296,0,0,c1d96940ea7b43530c90e361026a1465dd23d6cea465eae6b4e8fab350dd5200,2024-04-29T02:15:06.153000
CVE-2024-4297,0,0,beec816d4a0b36417a8c7e4d11aae9631f4c8663ea5a064622665d3b052214e9,2024-04-29T03:15:09.613000
CVE-2024-4298,0,0,f9266dd2ad13ca247a2df7083a82f45a12f2423c014a4332f080e78d4a30747d,2024-04-29T03:15:09.810000
CVE-2024-4299,1,1,6dce476fcec521482054b6b4839e21007c148c2a950959748caa8366570861ec,2024-04-29T04:15:08.623000
CVE-2024-4300,1,1,7a5406d5809ec914ba2d29d702f12271779019152ddc347a0ac4109f28246321,2024-04-29T04:15:08.887000
CVE-2024-4301,1,1,ac824d829df059c2e56cb3512d1d60cfb48e2f3b0d50bb1c7774c0330baa7e64,2024-04-29T04:15:09.110000
CVE-2024-4299,0,0,6dce476fcec521482054b6b4839e21007c148c2a950959748caa8366570861ec,2024-04-29T04:15:08.623000
CVE-2024-4300,0,0,7a5406d5809ec914ba2d29d702f12271779019152ddc347a0ac4109f28246321,2024-04-29T04:15:08.887000
CVE-2024-4301,0,0,ac824d829df059c2e56cb3512d1d60cfb48e2f3b0d50bb1c7774c0330baa7e64,2024-04-29T04:15:09.110000
CVE-2024-4302,1,1,974068c107cd4e505ac6377f0f4fb62ae26afdc69c450f8704f68a7f42518f2c,2024-04-29T06:15:17.803000
CVE-2024-4303,1,1,269dace03dedf0bc843109dbe92c35792422f71f9659b58da62f3fe6d0141fa9,2024-04-29T06:15:18.457000

Can't render this file because it is too large.