Auto-Update: 2024-06-05T10:00:45.477882+00:00

This commit is contained in:
cad-safe-bot 2024-06-05 10:03:38 +00:00
parent 18d297116f
commit 35d60935a7
11 changed files with 502 additions and 29 deletions

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2024-1272",
"sourceIdentifier": "iletisim@usom.gov.tr",
"published": "2024-06-05T09:15:09.620",
"lastModified": "2024-06-05T09:15:09.620",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Inclusion of Sensitive Information in Source Code vulnerability in TNB Mobile Solutions Cockpit Software allows Retrieve Embedded Sensitive Data.This issue affects Cockpit Software: before v0.251.1."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "iletisim@usom.gov.tr",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 3.9,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "iletisim@usom.gov.tr",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-540"
}
]
}
],
"references": [
{
"url": "https://www.usom.gov.tr/bildirim/tr-24-0601",
"source": "iletisim@usom.gov.tr"
}
]
}

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2024-23669",
"sourceIdentifier": "psirt@fortinet.com",
"published": "2024-06-05T08:15:09.537",
"lastModified": "2024-06-05T08:15:09.537",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "An improper authorization in Fortinet FortiWebManager version 7.2.0 and 7.0.0 through 7.0.4 and 6.3.0 and 6.2.3 through 6.2.4 and 6.0.2 allows attacker to execute unauthorized code or commands via HTTP requests or CLI."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "psirt@fortinet.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "psirt@fortinet.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-20"
}
]
}
],
"references": [
{
"url": "https://fortiguard.fortinet.com/psirt/FG-IR-23-222",
"source": "psirt@fortinet.com"
}
]
}

View File

@ -0,0 +1,47 @@
{
"id": "CVE-2024-4743",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-06-05T09:15:10.030",
"lastModified": "2024-06-05T09:15:10.030",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "The LifterLMS \u2013 WordPress LMS Plugin for eLearning plugin for WordPress is vulnerable to SQL Injection via the orderBy attribute of the lifterlms_favorites shortcode in all versions up to, and including, 7.6.2 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for authenticated attackers, with Contributor-level access and above, to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security@wordfence.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
"references": [
{
"url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&new=3095706%40lifterlms%2Ftrunk&old=3094820%40lifterlms%2Ftrunk&sfp_email=&sfph_mail=",
"source": "security@wordfence.com"
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/7e3a1e3c-eba0-4ef4-bcb8-929799bb56a8?source=cve",
"source": "security@wordfence.com"
}
]
}

View File

@ -0,0 +1,51 @@
{
"id": "CVE-2024-4821",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-06-05T09:15:10.260",
"lastModified": "2024-06-05T09:15:10.260",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "The WP Shortcodes Plugin \u2014 Shortcodes Ultimate plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's su_lightbox shortcode in all versions up to, and including, 7.1.6 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security@wordfence.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 6.4,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 3.1,
"impactScore": 2.7
}
]
},
"references": [
{
"url": "https://plugins.trac.wordpress.org/browser/shortcodes-ultimate/tags/7.1.5/includes/shortcodes/lightbox.php#L71",
"source": "security@wordfence.com"
},
{
"url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&new=3096024%40shortcodes-ultimate%2Ftrunk&old=3084162%40shortcodes-ultimate%2Ftrunk&sfp_email=&sfph_mail=#file1",
"source": "security@wordfence.com"
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/ec7649da-5358-4fe2-8706-b945bba02c93?source=cve",
"source": "security@wordfence.com"
}
]
}

View File

@ -0,0 +1,47 @@
{
"id": "CVE-2024-4939",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-06-05T08:15:09.787",
"lastModified": "2024-06-05T08:15:09.787",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "The Weaver Xtreme Theme Support plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's div shortcode in all versions up to, and including, 6.4 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security@wordfence.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 6.4,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 3.1,
"impactScore": 2.7
}
]
},
"references": [
{
"url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&new=3095286%40weaverx-theme-support%2Ftrunk&old=3017943%40weaverx-theme-support%2Ftrunk&sfp_email=&sfph_mail=",
"source": "security@wordfence.com"
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/bc121ed0-4cb3-4ba4-b693-413b1c25e4ca?source=cve",
"source": "security@wordfence.com"
}
]
}

View File

@ -0,0 +1,59 @@
{
"id": "CVE-2024-5006",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-06-05T08:15:09.983",
"lastModified": "2024-06-05T08:15:09.983",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "The Boostify Header Footer Builder for Elementor plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the \u2018size\u2019 parameter in all versions up to, and including, 1.3.2 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security@wordfence.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 6.4,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 3.1,
"impactScore": 2.7
}
]
},
"references": [
{
"url": "https://plugins.trac.wordpress.org/browser/boostify-header-footer-builder/trunk/inc/elementor/widgets/class-mega-menu-vertical.php#L393",
"source": "security@wordfence.com"
},
{
"url": "https://plugins.trac.wordpress.org/browser/boostify-header-footer-builder/trunk/inc/elementor/widgets/class-mega-menu.php#L525",
"source": "security@wordfence.com"
},
{
"url": "https://plugins.trac.wordpress.org/changeset/3097085/#file9",
"source": "security@wordfence.com"
},
{
"url": "https://wordpress.org/plugins/boostify-header-footer-builder/#developers",
"source": "security@wordfence.com"
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/72c2a5d4-f201-4cc8-ac49-cde1160ca468?source=cve",
"source": "security@wordfence.com"
}
]
}

View File

@ -0,0 +1,47 @@
{
"id": "CVE-2024-5439",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-06-05T08:15:10.210",
"lastModified": "2024-06-05T08:15:10.210",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "The Blocksy theme for WordPress is vulnerable to Reflected Cross-Site Scripting via the custom_url parameter in all versions up to, and including, 2.0.50 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security@wordfence.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 6.4,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 3.1,
"impactScore": 2.7
}
]
},
"references": [
{
"url": "https://themes.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&new=229705%40blocksy%2F2.0.51&old=228990%40blocksy%2F2.0.50",
"source": "security@wordfence.com"
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/c05687f4-5ea2-4226-982f-c3499f204685?source=cve",
"source": "security@wordfence.com"
}
]
}

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2024-5453",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-06-05T08:15:10.410",
"lastModified": "2024-06-05T08:15:10.410",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "The ProfileGrid \u2013 User Profiles, Groups and Communities plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the pm_dismissible_notice and pm_wizard_update_group_icon functions in all versions up to, and including, 5.8.6. This makes it possible for authenticated attackers, with Subscriber-level access and above, to change arbitrary options to the value '1' or change group icons."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security@wordfence.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 1.4
}
]
},
"references": [
{
"url": "https://plugins.trac.wordpress.org/browser/profilegrid-user-profiles-groups-and-communities/trunk/admin/class-profile-magic-admin.php#L1378",
"source": "security@wordfence.com"
},
{
"url": "https://plugins.trac.wordpress.org/browser/profilegrid-user-profiles-groups-and-communities/trunk/admin/class-profile-magic-admin.php#L2006",
"source": "security@wordfence.com"
},
{
"url": "https://plugins.trac.wordpress.org/changeset/3095503/profilegrid-user-profiles-groups-and-communities/trunk/admin/class-profile-magic-admin.php?contextall=1",
"source": "security@wordfence.com"
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/7a44d182-2a43-47c0-ab2e-36c0514c1d47?source=cve",
"source": "security@wordfence.com"
}
]
}

View File

@ -0,0 +1,51 @@
{
"id": "CVE-2024-5571",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-06-05T09:15:10.463",
"lastModified": "2024-06-05T09:15:10.463",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "The EmbedPress \u2013 Embed PDF, Google Docs, Vimeo, Wistia, Embed YouTube Videos, Audios, Maps & Embed Any Documents in Gutenberg & Elementor plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'url' attribute within the plugin's EmbedPress PDF widget in all versions up to, and including, 4.0.1 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security@wordfence.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 6.4,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 3.1,
"impactScore": 2.7
}
]
},
"references": [
{
"url": "https://plugins.trac.wordpress.org/browser/embedpress/tags/4.0.0/EmbedPress/Elementor/Widgets/Embedpress_Pdf.php#L690",
"source": "security@wordfence.com"
},
{
"url": "https://plugins.trac.wordpress.org/changeset/3097114/",
"source": "security@wordfence.com"
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/7becdab6-f952-4649-8cea-4efadf841619?source=cve",
"source": "security@wordfence.com"
}
]
}

View File

@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update
```plain
2024-06-05T08:00:37.797656+00:00
2024-06-05T10:00:45.477882+00:00
```
### Most recent CVE Modification Timestamp synchronized with NVD
```plain
2024-06-05T07:15:46.127000+00:00
2024-06-05T09:15:10.463000+00:00
```
### Last Data Feed Release
@ -33,31 +33,28 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
### Total Number of included CVEs
```plain
252693
252702
```
### CVEs added in the last Commit
Recently added CVEs: `10`
Recently added CVEs: `9`
- [CVE-2024-1161](CVE-2024/CVE-2024-11xx/CVE-2024-1161.json) (`2024-06-05T06:15:09.010`)
- [CVE-2024-1164](CVE-2024/CVE-2024-11xx/CVE-2024-1164.json) (`2024-06-05T07:15:45.310`)
- [CVE-2024-1940](CVE-2024/CVE-2024-19xx/CVE-2024-1940.json) (`2024-06-05T06:15:09.780`)
- [CVE-2024-2087](CVE-2024/CVE-2024-20xx/CVE-2024-2087.json) (`2024-06-05T06:15:10.833`)
- [CVE-2024-2368](CVE-2024/CVE-2024-23xx/CVE-2024-2368.json) (`2024-06-05T07:15:45.690`)
- [CVE-2024-3667](CVE-2024/CVE-2024-36xx/CVE-2024-3667.json) (`2024-06-05T06:15:11.590`)
- [CVE-2024-4088](CVE-2024/CVE-2024-40xx/CVE-2024-4088.json) (`2024-06-05T07:15:45.910`)
- [CVE-2024-4295](CVE-2024/CVE-2024-42xx/CVE-2024-4295.json) (`2024-06-05T06:15:12.007`)
- [CVE-2024-4886](CVE-2024/CVE-2024-48xx/CVE-2024-4886.json) (`2024-06-05T06:15:12.443`)
- [CVE-2024-5222](CVE-2024/CVE-2024-52xx/CVE-2024-5222.json) (`2024-06-05T07:15:46.127`)
- [CVE-2024-1272](CVE-2024/CVE-2024-12xx/CVE-2024-1272.json) (`2024-06-05T09:15:09.620`)
- [CVE-2024-23669](CVE-2024/CVE-2024-236xx/CVE-2024-23669.json) (`2024-06-05T08:15:09.537`)
- [CVE-2024-4743](CVE-2024/CVE-2024-47xx/CVE-2024-4743.json) (`2024-06-05T09:15:10.030`)
- [CVE-2024-4821](CVE-2024/CVE-2024-48xx/CVE-2024-4821.json) (`2024-06-05T09:15:10.260`)
- [CVE-2024-4939](CVE-2024/CVE-2024-49xx/CVE-2024-4939.json) (`2024-06-05T08:15:09.787`)
- [CVE-2024-5006](CVE-2024/CVE-2024-50xx/CVE-2024-5006.json) (`2024-06-05T08:15:09.983`)
- [CVE-2024-5439](CVE-2024/CVE-2024-54xx/CVE-2024-5439.json) (`2024-06-05T08:15:10.210`)
- [CVE-2024-5453](CVE-2024/CVE-2024-54xx/CVE-2024-5453.json) (`2024-06-05T08:15:10.410`)
- [CVE-2024-5571](CVE-2024/CVE-2024-55xx/CVE-2024-5571.json) (`2024-06-05T09:15:10.463`)
### CVEs modified in the last Commit
Recently modified CVEs: `2`
Recently modified CVEs: `0`
- [CVE-2024-29972](CVE-2024/CVE-2024-299xx/CVE-2024-29972.json) (`2024-06-05T06:15:10.307`)
- [CVE-2024-29974](CVE-2024/CVE-2024-299xx/CVE-2024-29974.json) (`2024-06-05T06:15:10.657`)
## Download and Usage

View File

@ -241234,10 +241234,10 @@ CVE-2024-1157,0,0,c47361e1397b03eed535508c9ec506a27255415c46de202eb894db1bcf5cb3
CVE-2024-1158,0,0,995dea25d678a81957450018def2710d810650928efacbe0a4cd027592c45fcd,2024-03-13T18:16:18.563000
CVE-2024-1159,0,0,d0250faef462038e0120055a7c1a6779f3d892d3b8c2c1aaf5ccce9550779728,2024-02-13T14:01:00.987000
CVE-2024-1160,0,0,c82942832f2bf6c3ff41a88402b9dca5a934aaf9eae2920b01f254b593b20d40,2024-02-13T14:01:00.987000
CVE-2024-1161,1,1,6b91af3e18b1f072d7f4cc8031e43b42cedc6d4b6c6ab109f49637b951916a4f,2024-06-05T06:15:09.010000
CVE-2024-1161,0,0,6b91af3e18b1f072d7f4cc8031e43b42cedc6d4b6c6ab109f49637b951916a4f,2024-06-05T06:15:09.010000
CVE-2024-1162,0,0,5f2954147a2ad0bfda8f51ea41ff0a374d1e4a1c83a2e06e1e47465f3c5f70b8,2024-02-08T14:22:37.180000
CVE-2024-1163,0,0,c0817c91ae84923184209dc3c71e6209d979097a49b0e341f691fe7193cd2db3,2024-02-29T15:15:07.473000
CVE-2024-1164,1,1,26046e2b3dd096eefbcd5b8dcc8d04e8411fb9142e8a1e4c5de30439e6e80651,2024-06-05T07:15:45.310000
CVE-2024-1164,0,0,26046e2b3dd096eefbcd5b8dcc8d04e8411fb9142e8a1e4c5de30439e6e80651,2024-06-05T07:15:45.310000
CVE-2024-1165,0,0,09d0c48437e50305f6b70b9aab3bb8805a9bc240d0fb341de398e33a6ad98f02,2024-02-26T16:32:25.577000
CVE-2024-1166,0,0,cbc50c0645991c69523344b23f8a84819598bdfdeb24c5f4ba7570f86b9c6398,2024-05-14T16:13:02.773000
CVE-2024-1167,0,0,646f860ad24a5198d530bba39bcdba3b9fb385431091cfa90a0190891cfad025,2024-02-09T20:20:51.900000
@ -241334,6 +241334,7 @@ CVE-2024-1266,0,0,5dd53fa554a7634e1c048a8f95923aa3088a9a992e77cce161d6c3e73b044c
CVE-2024-1267,0,0,e1baf417ea5b1200261bbe0e762e7d306442092cb87ea0c0daf956e73a64be41,2024-05-17T02:35:21.940000
CVE-2024-1268,0,0,a71f6831ef4e801110d9a785c473764d7dc4eb42bf088dcd5198930cf6d73f8c,2024-05-17T02:35:22.040000
CVE-2024-1269,0,0,c0e96ce08aa8cc4b0c5c9b01a4dfe6413b6a1aa0ecfba529b99ff41ed595060e,2024-05-17T02:35:22.143000
CVE-2024-1272,1,1,2db590adf1e128bc28ed4e0057f0348cac0353dc56ffd935e6fae1513e6e3ba0,2024-06-05T09:15:09.620000
CVE-2024-1273,0,0,0a310035a5b694469d93d82e5859918e80208ec594b8c8228e8be9ae18ebdda5,2024-03-12T12:40:13.500000
CVE-2024-1274,0,0,e620aeced049d61f6d382460fbf5059a46434714ff81966b55927aa96a1401ee,2024-04-02T12:50:42.233000
CVE-2024-1275,0,0,bf26cd5e632f2b0f1b86a7cb8d63ebc17497163a682c8c1239e0557cf3b49995,2024-05-31T19:14:47.793000
@ -241908,7 +241909,7 @@ CVE-2024-1935,0,0,a7f7eb7b74a22681adc4071f1d8733546534bbce79c7b6b4b422bbf2e64105
CVE-2024-1936,0,0,7b3792457d5905a49db010db7b736af0c923e8894b5bdd1a854744f20603a17d,2024-03-23T12:15:08.453000
CVE-2024-1938,0,0,24dc90499c61d902708c3560ef4b72bc4a3172c10dbf5b005bb9075fcee4ff4b,2024-03-07T23:15:07.177000
CVE-2024-1939,0,0,862ed503c4cd6a96fea863f557f2290de2baf913d152cc1cb93720d0bf768f1c,2024-03-07T23:15:07.250000
CVE-2024-1940,1,1,2fe903c72b21b896e9f0b18cd7302ecb17306bdcf8cd11dcb83068a71594d5cd,2024-06-05T06:15:09.780000
CVE-2024-1940,0,0,2fe903c72b21b896e9f0b18cd7302ecb17306bdcf8cd11dcb83068a71594d5cd,2024-06-05T06:15:09.780000
CVE-2024-1941,0,0,2deee38d49f655dc85a14e0f9cc0860e5fd72126cfed04ebe024762ac27ab897,2024-03-01T14:04:26.010000
CVE-2024-1942,0,0,980efc55f5eab41cf2c4f30738d9bba260cb2905950fe4e94d5f18fcbaafef3e,2024-02-29T13:49:29.390000
CVE-2024-1943,0,0,12241ffd50e07c2810c1836c3e8f27c317becac2e0f94ec708a8bb306904594f,2024-02-28T14:06:45.783000
@ -242382,7 +242383,7 @@ CVE-2024-20866,0,0,58d3db3c436cd4edcfbee612570f2e77cc32989fe5de8d87bea6a0e56551a
CVE-2024-20867,0,0,0e6b5e18a9f86247a6a1090b01cf596581daded4155bfbc09972d6cdc5714d2a,2024-05-07T13:39:32.710000
CVE-2024-20868,0,0,23d1ca1dba7a2ad9810a7b603f4dc59801094aa235b5516b22a3aa3c056e5066,2024-05-07T13:39:32.710000
CVE-2024-20869,0,0,205bcfae207f01cfe9e76e25dfb8358434940d02212d78ea178f2e739e243546,2024-05-07T13:39:32.710000
CVE-2024-2087,1,1,0d62a549ffc6556068b093343ad599a4ca1ecc0c53b01f7c29946b57d38406fe,2024-06-05T06:15:10.833000
CVE-2024-2087,0,0,0d62a549ffc6556068b093343ad599a4ca1ecc0c53b01f7c29946b57d38406fe,2024-06-05T06:15:10.833000
CVE-2024-20870,0,0,247de2e7cb6c1589f56f1a1780b91fbe4feee02648b4f01650496931882d0b24,2024-05-07T13:39:32.710000
CVE-2024-20871,0,0,4b5019addc2549a143f67a36860f5a0576db2a31268cf1be920df7487aeaeae8,2024-05-07T13:39:32.710000
CVE-2024-20872,0,0,f057840a1e0e70ef07c9af92e3c53b5e58e8fd31ea1c15cdb3fe23cd840da357,2024-05-07T13:39:32.710000
@ -244070,6 +244071,7 @@ CVE-2024-23664,0,0,fef7b517001d2c9ded36e59d6e6f76dd4dad49d2f1a97c16a9e2d13b88233
CVE-2024-23665,0,0,9b721572a9eab0f097d40ba2bb4435bfadacb0c946c8971f2e8262fe3a7027b8,2024-06-03T14:46:24.250000
CVE-2024-23667,0,0,56789b6d65cfb24cf53469fc30bd1ef9ec2c55d090fed01acd87410507e26bb2,2024-06-03T14:46:24.250000
CVE-2024-23668,0,0,f824ecc20d8a28779421def62b365e05c131b29e7f5f1b0a1c4c94219889443e,2024-06-03T14:46:24.250000
CVE-2024-23669,1,1,0cc7f72a8491d01671d47f311e81b6a2db9eec3e950a816995bcbfb67b5c5fa0,2024-06-05T08:15:09.537000
CVE-2024-23670,0,0,4d67c08986dae2f7effe1d794f6cb5ef791bdddbdc24c82df7382f96f5b8f09b,2024-06-03T14:46:24.250000
CVE-2024-23671,0,0,108c61a6aa74a9b71687a2e3aa153a422c4a0c3adcd258415c5b065e1ef21ae7,2024-04-10T13:24:22.187000
CVE-2024-23672,0,0,ecf21cf6fef0fb9a72fe820ee02e2854b5a2d1575ce42cd766c4a52761cff3de,2024-05-01T18:15:14.357000
@ -244080,7 +244082,7 @@ CVE-2024-23676,0,0,56ef125eb2696d6a370cb1fcee9cbf4c70187c994325783ccd00cee906067
CVE-2024-23677,0,0,5002fb89610cfd38f5d468dc18f3c5331733998bb74f1ff07d319dde587b2882,2024-04-10T01:15:18.390000
CVE-2024-23678,0,0,5d448947bf54ec004c72c54b20b24d8bf3a971bcebd8f73c5e7293fdadfe4a1b,2024-04-10T01:15:18.543000
CVE-2024-23679,0,0,640c7c61fdad62898ad4f1df55f17c5c64134e2dc64c7047206373e2ec219dcc,2024-01-26T19:12:45.117000
CVE-2024-2368,1,1,6d8fd48fa8d3f24a2a0e5985f428af6c1c9ac3d702fa6817f3892fa1d7924b80,2024-06-05T07:15:45.690000
CVE-2024-2368,0,0,6d8fd48fa8d3f24a2a0e5985f428af6c1c9ac3d702fa6817f3892fa1d7924b80,2024-06-05T07:15:45.690000
CVE-2024-23680,0,0,65bdb0a5f8b9a48a1100a0dc9afd500ed5d0157f9effc3b8f1a9f7c133b834bf,2024-01-26T19:08:47.817000
CVE-2024-23681,0,0,5784aa8d00dbad48397c875e3410cbaf00b669b08aed5acdb560ab01d2b57314,2024-01-26T15:08:04.263000
CVE-2024-23682,0,0,051b25f120cad0cdd9a52c659e33751066e3fa9d41bbdc9f8e31ffa7e2662331,2024-01-26T15:08:33.007000
@ -247959,9 +247961,9 @@ CVE-2024-29967,0,0,3697c6ed64dbd076ce60ecfa47f5b907fa72bc99eadb005dc57c9cc60eb5d
CVE-2024-29968,0,0,76c6a6d6e702eab18ed6ce28244f46395278fc23ed27747337db2cb902c35659,2024-04-19T13:10:25.637000
CVE-2024-29969,0,0,f16f6487ea10360dec838824d2148298e2039f6602688dd9caf524b4969c6186,2024-04-19T13:10:25.637000
CVE-2024-2997,0,0,3a578291c3b241bab600655a4ba011b593bae43f4bacaa35e28ecb654fca1f55,2024-05-17T02:38:41.790000
CVE-2024-29972,0,1,6eb07d32580185ea51f927f67f2978b808addad4d830734cf44d0e61f642dd0c,2024-06-05T06:15:10.307000
CVE-2024-29972,0,0,6eb07d32580185ea51f927f67f2978b808addad4d830734cf44d0e61f642dd0c,2024-06-05T06:15:10.307000
CVE-2024-29973,0,0,fed305ac9bbfd8a3bcb05f4012099f51e000b0123ac4db28d9d3e1a93ebbff3b,2024-06-05T04:15:11.330000
CVE-2024-29974,0,1,0fabd0ed87d1a17e2d57c3925a4a991d1b1c401d215c10f3d80cab083de41ead,2024-06-05T06:15:10.657000
CVE-2024-29974,0,0,0fabd0ed87d1a17e2d57c3925a4a991d1b1c401d215c10f3d80cab083de41ead,2024-06-05T06:15:10.657000
CVE-2024-29975,0,0,49c807a12409727c8a1afb2f2806b07c0d451dfb8359eeb78ceb9a9de79debef,2024-06-05T04:15:11.617000
CVE-2024-29976,0,0,0fa1d772a8223241204b7c64472e90f5c1bb1a92000917507c17fda5770ef8d0,2024-06-04T20:15:10.677000
CVE-2024-2998,0,0,eefb5ffb4f4c69125c8918f19ada8e94baebaa500baf95dbd5f811afe3390da3,2024-05-17T02:38:41.883000
@ -251411,7 +251413,7 @@ CVE-2024-3663,0,0,d70e03397b7b1ab439d27e0f0ba070e0cb9801b42863e8c396c4da4f0822fd
CVE-2024-3664,0,0,afb9452532a9b46276f3e123567931f2d9b14afd62c66b887c9d751f65c725bc,2024-04-23T12:52:09.397000
CVE-2024-3665,0,0,22dbbd6c0bec2b9f433688ae97b549cd541e7f2d387c3796dd32246c851476cf,2024-04-23T12:52:09.397000
CVE-2024-3666,0,0,07796934f1ac3c83f9027f055a741df04ffd0473d9b06f5fc0b3f20da9ef9091,2024-05-22T12:46:53.887000
CVE-2024-3667,1,1,f0f48fea7f3689737f64ee01165bcce60345c4b6a636bea81a0081340d56eed4,2024-06-05T06:15:11.590000
CVE-2024-3667,0,0,f0f48fea7f3689737f64ee01165bcce60345c4b6a636bea81a0081340d56eed4,2024-06-05T06:15:11.590000
CVE-2024-36674,0,0,64a41fc68368d9bae481254f7aef4332736d337353346af2d18107a9908d2826,2024-06-03T19:23:17.807000
CVE-2024-36675,0,0,8462bd5f50a70efb58434e8885819435358cf52e0610c9d2ea69d850af6c6e27,2024-06-04T22:15:10.740000
CVE-2024-3670,0,0,c82d0130c8edc16344a78447d1514c5ffe18d421cd344e5799606a7730bedf8c,2024-05-02T18:00:37.360000
@ -251830,7 +251832,7 @@ CVE-2024-4084,0,0,cdd0df7919c28f881bd53cf1deb5b03087820977803cb8c9e5d4d4b8259a38
CVE-2024-4085,0,0,18b49aedef154a5f78284d7ff3699691fe3b4904260085a931cc6d08f4fb7ca8,2024-05-02T18:00:37.360000
CVE-2024-4086,0,0,c06eb3f0c2fbe1c42ce58a59441202866280214c07091170b4fb53c94814c994,2024-05-02T18:00:37.360000
CVE-2024-4087,0,0,c042d2a1de26e6b1fe0621a6edcac1fb8cab9f866d13a8bc2e77c06eafe2f2ff,2024-06-03T14:46:24.250000
CVE-2024-4088,1,1,6d34f566da56f9300211e5c50e40b9bb5af3a3441c80e89d7e45604cb2a100d6,2024-06-05T07:15:45.910000
CVE-2024-4088,0,0,6d34f566da56f9300211e5c50e40b9bb5af3a3441c80e89d7e45604cb2a100d6,2024-06-05T07:15:45.910000
CVE-2024-4092,0,0,4be02f9c67d30932bc0929e64c1c04dde83d92e769e6b30b60cbc598e8e37f4c,2024-05-02T18:00:37.360000
CVE-2024-4093,0,0,5d27408cc41c323f4b0e69479d9f46468fbd0106e510632bee156499f1d6b2eb,2024-05-17T02:40:15.433000
CVE-2024-4097,0,0,6a60177672bc62dbe43e4e7ccd78e74b9159babed54b0d3a303c5a9a6fcd009a,2024-05-02T18:00:37.360000
@ -251968,7 +251970,7 @@ CVE-2024-4291,0,0,6fb6b0e83a49b64a5565b2ca5f6437971dbeea9c5ab39460fc142df5bce327
CVE-2024-4292,0,0,f51ff84855f02b0bc4dd3e03d8351463229984e5d3c218f3331913e1b68e232f,2024-06-04T19:20:35.097000
CVE-2024-4293,0,0,631458ecd34e0e099a1efde23f32eb7981cbcf3111570b5f9cad2a4f0ec45cb7,2024-06-04T19:20:35.203000
CVE-2024-4294,0,0,97bd940eeda24c94b1982f85ff25718412e73b2bf939766f3f03c261351a8304,2024-06-04T19:20:35.300000
CVE-2024-4295,1,1,335930b49eb96e27b3d3c521fd8430c91e27a43abd039593bac00db44fbaf6da,2024-06-05T06:15:12.007000
CVE-2024-4295,0,0,335930b49eb96e27b3d3c521fd8430c91e27a43abd039593bac00db44fbaf6da,2024-06-05T06:15:12.007000
CVE-2024-4296,0,0,7c8632bf90851b299a9885e1b23a1d23a32667f17280ec361546d21dc35de10e,2024-04-29T12:42:03.667000
CVE-2024-4297,0,0,92dc96fdab7f356cdc83f7d1d85286a03b04dbf93d10ca9e6efacd8b516bbae3,2024-04-29T12:42:03.667000
CVE-2024-4298,0,0,c30353f487462f14da90ba9761a3d280aecbb2b2af7a8a57b196c96d31910116,2024-04-29T12:42:03.667000
@ -252281,6 +252283,7 @@ CVE-2024-4735,0,0,525831e83b784b99ed7ef48881d0a232b57485de376b3c68786c9225fdef83
CVE-2024-4736,0,0,35e0fe51ccd6e16c666173722ffd72f471827cead112caeaf869dd95515427ec,2024-06-04T19:20:48.497000
CVE-2024-4737,0,0,0d605ad76fcca9d9a8748ea1570213b2a20be8e7af59e1490aa0de37640ee426,2024-06-04T19:20:48.597000
CVE-2024-4738,0,0,703597dd680fa7def2747a141a4237503bd7e8917e070a49546a7e715e951f69,2024-06-04T19:20:48.783000
CVE-2024-4743,1,1,2f310e54344c8bede825f6134503d16f7553328fdad57e9a28f8c9b627c012e0,2024-06-05T09:15:10.030000
CVE-2024-4747,0,0,99152f6494a1192f3bae59b436abcc51d11f811ed1e0a72c2e65c8381fda6054,2024-05-14T16:11:39.510000
CVE-2024-4749,0,0,676e331864bc41907c4c80c44886e7dac480ef6dea2c29bc22838d992753d4da,2024-06-04T16:57:41.053000
CVE-2024-4750,0,0,423585a3e250903ac62d761ecb0e0e6dc6b4649ccd4411b90275a4e6d2f87495,2024-06-04T16:57:41.053000
@ -252333,6 +252336,7 @@ CVE-2024-4817,0,0,25f671d255c133539a14922245d93cb8e9f73263de30634add3e11638c71ff
CVE-2024-4818,0,0,b4281c0fc833ff67f25a4dec3c5716911b53a31935e38b0310baa3a499b478f8,2024-06-04T19:20:51.510000
CVE-2024-4819,0,0,e38245aea9a32f985ed2dae01aba40bf33a21f00080c8d20286bf8b00a9f57bf,2024-06-04T19:20:51.613000
CVE-2024-4820,0,0,402d6f18855ed225f564a1aa077cdcb508a467147f3c0e0905e2eb4030f9a1a9,2024-06-04T19:20:51.710000
CVE-2024-4821,1,1,57645af1e5819381d8d6a88aa08a0e4143555dc738e4f7883f2511b7271f62b0,2024-06-05T09:15:10.260000
CVE-2024-4822,0,0,2afc6a99d0a53e8f4d7991726996560d97ea71ce3c63aa067c8bb04f0c1c8bcf,2024-05-14T16:11:39.510000
CVE-2024-4823,0,0,544460ea4efbe18fdd003c94911529fa16ddf77347bca6256c2d97529bd3f076,2024-05-14T16:11:39.510000
CVE-2024-4824,0,0,18f5c845247adede0ddca9ae15329e658bfdaa618402437af47bcb2e661d694c,2024-05-14T16:11:39.510000
@ -252360,7 +252364,7 @@ CVE-2024-4870,0,0,789ccad79b53f3162faaa4d0c14e00ab550e7e413c46a4332529e5d35d1d04
CVE-2024-4871,0,0,089a89f3309c27433f20e3be4ef9a00379f9f19601c1c8029649846113aed43a,2024-05-14T19:17:55.627000
CVE-2024-4875,0,0,aa35cb89fee530b58aa987ffc67ea97738c0ba567903bf01429a1a1259923db8,2024-05-21T12:37:59.687000
CVE-2024-4876,0,0,02aac8d1be489833aa2e07f8be8ce083249ac7dc2fcc33fd144386b8d365fef2,2024-05-21T12:37:59.687000
CVE-2024-4886,1,1,9c9fb2520bf49e6dda512ddac94c860619ccafb0b5624e485434ec420368c9b8,2024-06-05T06:15:12.443000
CVE-2024-4886,0,0,9c9fb2520bf49e6dda512ddac94c860619ccafb0b5624e485434ec420368c9b8,2024-06-05T06:15:12.443000
CVE-2024-4891,0,0,10c2ed4e0db3df7fca9d6075befed08f57db6578dbf3546fd28a3b8b6a103a31,2024-05-20T13:00:34.807000
CVE-2024-4893,0,0,d5ebc2dfcb13b74b4f1951a124d2e638a95f79aa05d19e6fadfe65b7ad1c4f46,2024-05-15T16:40:19.330000
CVE-2024-4894,0,0,d68130303d356c053d0f6768d0ee08506e206d16216142c952b9b56af8835d24,2024-05-15T16:40:19.330000
@ -252396,6 +252400,7 @@ CVE-2024-4930,0,0,6ff76d7aaffb879ad1ba04c82aee4d6862810bf82c41e96981364c74ee8131
CVE-2024-4931,0,0,83efd803f055d34e0373b998807732a66d1be28ff93405fe1ae45ba9ee6af2a3,2024-06-04T19:20:54.543000
CVE-2024-4932,0,0,2da4bffdf4d6e38ae009aae9065c7b2f8049c53fc8beaf73dfbb4354175c5b68,2024-05-17T02:40:43.357000
CVE-2024-4933,0,0,9fe90c4f8856bf6bdad48e78d639ea10366bef215c1d0d507cc52649860ab1b1,2024-06-04T19:20:54.643000
CVE-2024-4939,1,1,0f5da7c4f78ee1d4cfa142a2e38ccef8b824d364bf9fcc429715affa649dbe71,2024-06-05T08:15:09.787000
CVE-2024-4943,0,0,d9b88319a5992961df806c2aff168607709c5e19495e72269f7fd7790830e1d9,2024-05-21T12:37:59.687000
CVE-2024-4945,0,0,862ec6002e9c3369e40f6935606e597aac95fb1ef3a2f5a2c72d02ef723dafd2,2024-06-04T19:20:54.767000
CVE-2024-4946,0,0,de881559bc92412238785deff68c564cad0647963d61d3efd064c0cec6c4ee1e,2024-06-04T19:20:54.867000
@ -252432,6 +252437,7 @@ CVE-2024-4997,0,0,381fe62c0cd224246ea5324bab3cef489202298d3bb7b0d185aa70d1dc0d5b
CVE-2024-4998,0,0,e12f9512d41da053bcfd5626dd0ee21afd4da3e61146c4f0c8f9da42ca3dff98,2024-05-17T16:15:08.160000
CVE-2024-4999,0,0,1bac5cc77e7ceb1bce6c078fbd59e76f5556984ef2124d365e8638bfa6b6fdfa,2024-05-16T15:44:44.683000
CVE-2024-5000,0,0,21f44bae275ca5e7f3a45da963612f2fb705c74e44c15e2681f54ff4506e6afb,2024-06-04T16:57:41.053000
CVE-2024-5006,1,1,971ce3dd34f2161629a353f7a3094cac2074b284283e2226864e8f278e6d9956,2024-06-05T08:15:09.983000
CVE-2024-5022,0,0,106355f86b530d1586a5d339031de27a1a2312467a76eb449e8e9901150235d8,2024-05-20T13:00:34.807000
CVE-2024-5023,0,0,974704283893df4cc9d8e0bcce8bb65ebf635268235f75f47c922033893214ce,2024-05-17T18:36:31.297000
CVE-2024-5025,0,0,d287dc9bcba0fba1784ec3f3fe4bf65eea235ed5e6f91d741018beb442d992d7,2024-05-22T12:46:53.887000
@ -252531,7 +252537,7 @@ CVE-2024-5207,0,0,837facf8fac5843bbf7aea1ce36fa00287f1ba077f8fbca1302b0ab4087ec5
CVE-2024-5214,0,0,77a86526714522a20940695733fe46b4562089752d3c663cf289b583b7c6bbda,2024-06-03T19:15:09.360000
CVE-2024-5218,0,0,928b5f8d4e08afc285c0cf6e370373ec87899b716b1cb4db68027907b01d2a82,2024-05-28T12:39:42.673000
CVE-2024-5220,0,0,f61a4e43424028e9a9336f6f6ed766295c86a8a5421f6ff87daa2be13ac80d02,2024-05-28T12:39:42.673000
CVE-2024-5222,1,1,85215479f7f09036f0035b7eca417d01a8a5da55290907af67715ef68160560a,2024-06-05T07:15:46.127000
CVE-2024-5222,0,0,85215479f7f09036f0035b7eca417d01a8a5da55290907af67715ef68160560a,2024-06-05T07:15:46.127000
CVE-2024-5223,0,0,8366f6c6b4592ec30854ea2204a3ebdc0b5f6592483a6a57d3251ddc4233fcd1,2024-05-30T13:15:41.297000
CVE-2024-5227,0,0,9d34b575e4c4193bf3b7e2c70f772c52e473e90eee580d6cd20ca38df9886e09,2024-05-24T01:15:30.977000
CVE-2024-5228,0,0,0a0ae3d586a473bc70cb0721078887f2918e42e82919d39880ecf7432c31100c,2024-05-24T01:15:30.977000
@ -252659,6 +252665,8 @@ CVE-2024-5433,0,0,d0946774ada383b4af0e78f23b9c449d05f83a7124810af4e383f90b0cdbda
CVE-2024-5434,0,0,dc2716eb218edba725ac85c17a2930de7a00b6563d0ca53040574106ea0b92ed,2024-05-29T13:02:09.280000
CVE-2024-5436,0,0,95eba267f429de080e9b35fcd14e1e1840b0308e404c32773ec35c18106c7cbc,2024-05-31T13:01:46.727000
CVE-2024-5437,0,0,551b020f0044e3ab584c14f08f0984900b4bc26534c92382eb6ac2bb660708ea,2024-06-04T19:21:09.363000
CVE-2024-5439,1,1,5cb5743566262a7db1dbc065eea81546f2260b27c4c57998688474e77a737137,2024-06-05T08:15:10.210000
CVE-2024-5453,1,1,2febbf1e341d103770d5518ca487e5210a458c994aa4096fa101457d87279f05,2024-06-05T08:15:10.410000
CVE-2024-5463,0,0,a83ead02d534db419d64d9a246adc999062f3a690f2d2cbba14bffeb9debf0f5,2024-06-04T16:57:41.053000
CVE-2024-5483,0,0,5529c97278d3f25108282683906a92383dd2ca1a9ba0be070cd04ea84d856791,2024-06-05T03:15:08.810000
CVE-2024-5484,0,0,7de35f8eee9232651ed147ec3168f6740617b1737ec3ff6913988b98b84f6ef1,2024-05-31T11:15:09.783000
@ -252686,6 +252694,7 @@ CVE-2024-5537,0,0,071475eb8c0f92cc8ea9522d658283ad0e8213ba6740ff46ee05e5b24c18c3
CVE-2024-5538,0,0,183cea799fa9410e329e72f326a10b8369aedcea9a5b7583a44bf33ecc305070,2024-05-31T11:15:09.923000
CVE-2024-5564,0,0,cd961630c6982ea90916e9cc290067a2c4a02a79292d87af6b0ec76760478ca9,2024-06-03T14:46:24.250000
CVE-2024-5565,0,0,ca2b275160a932f35493ef873c1e3b3376ac0de1d1f0359f5898f4a0c4303049,2024-05-31T19:14:47.793000
CVE-2024-5571,1,1,265798639a90035e137c4841b22621f20815ec8389fe53aa22fef8de63e7337c,2024-06-05T09:15:10.463000
CVE-2024-5587,0,0,9180b0762a5a5a7a17ce70cd861bdf25e955d88caf903bee442f7c48a0a2a218,2024-06-03T14:46:24.250000
CVE-2024-5588,0,0,21589c4423d1fee081cb695dd8009f3bd5a36bd74dae1713c28449f0da1cd8d1,2024-06-04T19:21:10.267000
CVE-2024-5589,0,0,dc63c38434ce5bb089af0d0f8aa09f6a46f1fae34dd45c15f4542741dea047b7,2024-06-03T14:46:24.250000

Can't render this file because it is too large.