Auto-Update: 2024-04-25T12:00:42.658693+00:00

This commit is contained in:
cad-safe-bot 2024-04-25 12:03:33 +00:00
parent 662f731483
commit 363c09f102
15 changed files with 736 additions and 37 deletions

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2023-52220",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-04-25T10:15:08.260",
"lastModified": "2024-04-25T10:15:08.260",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Missing Authorization vulnerability in MonsterInsights Google Analytics by Monster Insights.This issue affects Google Analytics by Monster Insights: from n/a through 8.21.0.\n\n"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "LOW",
"baseScore": 4.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-862"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/google-analytics-for-wordpress/wordpress-monsterinsights-plugin-8-21-0-broken-access-control-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -0,0 +1,59 @@
{
"id": "CVE-2024-1347",
"sourceIdentifier": "cve@gitlab.com",
"published": "2024-04-25T11:15:45.637",
"lastModified": "2024-04-25T11:15:45.637",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "An issue has been discovered in GitLab CE/EE affecting all versions before 16.9.6, all versions starting from 16.10 before 16.10.4, all versions starting from 16.11 before 16.11.1. Under certain conditions, an attacker through a crafted email address may be able to bypass domain based restrictions on an instance or a group."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "cve@gitlab.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "cve@gitlab.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-287"
}
]
}
],
"references": [
{
"url": "https://gitlab.com/gitlab-org/gitlab/-/issues/441093",
"source": "cve@gitlab.com"
},
{
"url": "https://hackerone.com/reports/2355565",
"source": "cve@gitlab.com"
}
]
}

View File

@ -0,0 +1,59 @@
{
"id": "CVE-2024-2434",
"sourceIdentifier": "cve@gitlab.com",
"published": "2024-04-25T11:15:45.870",
"lastModified": "2024-04-25T11:15:45.870",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "An issue has been discovered in GitLab affecting all versions of GitLab CE/EE 16.9 prior to 16.9.6, 16.10 prior to 16.10.4, and 16.11 prior to 16.11.1 where path traversal could lead to DoS and restricted file read."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "cve@gitlab.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 8.5,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.1,
"impactScore": 4.7
}
]
},
"weaknesses": [
{
"source": "cve@gitlab.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-22"
}
]
}
],
"references": [
{
"url": "https://gitlab.com/gitlab-org/gitlab/-/issues/450303",
"source": "cve@gitlab.com"
},
{
"url": "https://hackerone.com/reports/2401952",
"source": "cve@gitlab.com"
}
]
}

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2024-25583",
"sourceIdentifier": "security@open-xchange.com",
"published": "2024-04-25T10:15:08.867",
"lastModified": "2024-04-25T10:15:08.867",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "A crafted response from an upstream server the recursor has been configured to forward-recurse to can cause a Denial of Service in the Recursor. The default configuration of the Recursor does not use recursive forwarding and is not affected.\n\n"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security@open-xchange.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "security@open-xchange.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-20"
}
]
}
],
"references": [
{
"url": "https://doc.powerdns.com/recursor/security-advisories/powerdns-advisory-2024-02.html",
"source": "security@open-xchange.com"
}
]
}

View File

@ -0,0 +1,59 @@
{
"id": "CVE-2024-2829",
"sourceIdentifier": "cve@gitlab.com",
"published": "2024-04-25T11:15:46.057",
"lastModified": "2024-04-25T11:15:46.057",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "An issue has been discovered in GitLab CE/EE affecting all versions starting from 12.5 before 16.9.6, all versions starting from 16.10 before 16.10.4, all versions starting from 16.11 before 16.11.1. A crafted wildcard filter in FileFinder may lead to a denial of service."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "cve@gitlab.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "cve@gitlab.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-400"
}
]
}
],
"references": [
{
"url": "https://gitlab.com/gitlab-org/gitlab/-/issues/451456",
"source": "cve@gitlab.com"
},
{
"url": "https://hackerone.com/reports/2416728",
"source": "cve@gitlab.com"
}
]
}

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2024-32676",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-04-25T11:15:46.243",
"lastModified": "2024-04-25T11:15:46.243",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Improper Restriction of Excessive Authentication Attempts vulnerability in LoginPress LoginPress Pro.This issue affects LoginPress Pro: from n/a before 3.0.0.\n\n"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 5.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 3.9,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-307"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/loginpress-pro/wordpress-loginpress-pro-plugin-2-5-3-captcha-bypass-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -2,12 +2,16 @@
"id": "CVE-2024-32677",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-04-24T16:15:09.710",
"lastModified": "2024-04-24T17:16:50.397",
"lastModified": "2024-04-25T11:15:46.440",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "Missing Authorization vulnerability in LoginPress LoginPress Pro.This issue affects LoginPress Pro: from n/a through 2.5.3.\n\n"
"value": "Missing Authorization vulnerability in LoginPress LoginPress Pro.This issue affects LoginPress Pro: from n/a before 3.0.0.\n\n"
},
{
"lang": "es",
"value": "Vulnerabilidad de autorizaci\u00f3n faltante en LoginPress LoginPress Pro. Este problema afecta a LoginPress Pro: desde n/a hasta 2.5.3."
}
],
"metrics": {

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2024-32961",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-04-25T10:15:09.067",
"lastModified": "2024-04-25T10:15:09.067",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Creative Themes HQ Blocksy allows Stored XSS.This issue affects Blocksy: from n/a through 2.0.33.\n\n"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW",
"baseScore": 6.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.3,
"impactScore": 3.7
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/blocksy/wordpress-blocksy-theme-2-0-33-cross-site-scripting-xss-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -0,0 +1,47 @@
{
"id": "CVE-2024-3730",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-04-25T11:15:46.603",
"lastModified": "2024-04-25T11:15:46.603",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "The Simple Membership plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'swpm_paypal_subscription_cancel_link' shortcode in all versions up to, and including, 4.4.3 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security@wordfence.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
}
]
},
"references": [
{
"url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3076221%40simple-membership&new=3076221%40simple-membership&sfp_email=&sfph_mail=#file31",
"source": "security@wordfence.com"
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/63779ab7-ba8b-459d-beb3-a32faf8f4394?source=cve",
"source": "security@wordfence.com"
}
]
}

View File

@ -0,0 +1,47 @@
{
"id": "CVE-2024-3994",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-04-25T10:15:09.263",
"lastModified": "2024-04-25T10:15:09.263",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "The Tutor LMS \u2013 eLearning and online course solution plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'tutor_instructor_list' shortcode in all versions up to, and including, 2.6.2 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security@wordfence.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 2.5
}
]
},
"references": [
{
"url": "https://plugins.trac.wordpress.org/changeset/3076302/tutor/tags/2.7.0/templates/shortcode/instructor-filter.php",
"source": "security@wordfence.com"
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/324fc401-04ca-4707-8727-b8c3a66f7fd6?source=cve",
"source": "security@wordfence.com"
}
]
}

View File

@ -0,0 +1,47 @@
{
"id": "CVE-2024-4035",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-04-25T10:15:09.427",
"lastModified": "2024-04-25T10:15:09.427",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "The Photo Gallery \u2013 GT3 Image Gallery & Gutenberg Block Gallery plugin for WordPress is vulnerable to Stored Cross-Site Scripting via image alt text in all versions up to, and including, 2.7.7.21 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with author-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security@wordfence.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 6.4,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 3.1,
"impactScore": 2.7
}
]
},
"references": [
{
"url": "https://plugins.trac.wordpress.org/changeset/3076342/gt3-photo-video-gallery/trunk/core/actions/gt3pg_gallery_shortcode.php",
"source": "security@wordfence.com"
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/06ef1f0c-fdcc-4aaf-9e48-19b5be52351d?source=cve",
"source": "security@wordfence.com"
}
]
}

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2024-4077",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-04-25T10:15:09.590",
"lastModified": "2024-04-25T10:15:09.590",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in AndonDesign UDesign allows Reflected XSS.This issue affects UDesign: from n/a through 4.7.3.\n\n"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW",
"baseScore": 7.1,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 3.7
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/u-design/wordpress-udesign-theme-4-7-3-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -0,0 +1,92 @@
{
"id": "CVE-2024-4164",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-04-25T11:15:46.777",
"lastModified": "2024-04-25T11:15:46.777",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability, which was classified as critical, has been found in Tenda G3 15.11.0.17(9502). This issue affects the function formModifyPppAuthWhiteMac of the file /goform/ModifyPppAuthWhiteMac. The manipulation of the argument pppoeServerWhiteMacIndex leads to stack-based buffer overflow. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-261983. NOTE: The vendor was contacted early about this disclosure but did not respond in any way."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
],
"cvssMetricV2": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C",
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "SINGLE",
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"availabilityImpact": "COMPLETE",
"baseScore": 9.0
},
"baseSeverity": "HIGH",
"exploitabilityScore": 8.0,
"impactScore": 10.0,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-121"
}
]
}
],
"references": [
{
"url": "https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/G3/G3V15/formModifyPppAuthWhiteMac.md",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?ctiid.261983",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?id.261983",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?submit.318588",
"source": "cna@vuldb.com"
}
]
}

View File

@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update
```plain
2024-04-25T10:00:39.344246+00:00
2024-04-25T12:00:42.658693+00:00
```
### Most recent CVE Modification Timestamp synchronized with NVD
```plain
2024-04-25T09:15:08.237000+00:00
2024-04-25T11:15:46.777000+00:00
```
### Last Data Feed Release
@ -33,34 +33,32 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
### Total Number of included CVEs
```plain
246733
246745
```
### CVEs added in the last Commit
Recently added CVEs: `12`
- [CVE-2023-51478](CVE-2023/CVE-2023-514xx/CVE-2023-51478.json) (`2024-04-25T08:15:07.160`)
- [CVE-2023-51482](CVE-2023/CVE-2023-514xx/CVE-2023-51482.json) (`2024-04-25T09:15:06.880`)
- [CVE-2023-51484](CVE-2023/CVE-2023-514xx/CVE-2023-51484.json) (`2024-04-25T09:15:07.143`)
- [CVE-2024-22144](CVE-2024/CVE-2024-221xx/CVE-2024-22144.json) (`2024-04-25T09:15:07.360`)
- [CVE-2024-25917](CVE-2024/CVE-2024-259xx/CVE-2024-25917.json) (`2024-04-25T09:15:07.550`)
- [CVE-2024-30560](CVE-2024/CVE-2024-305xx/CVE-2024-30560.json) (`2024-04-25T09:15:07.740`)
- [CVE-2024-31266](CVE-2024/CVE-2024-312xx/CVE-2024-31266.json) (`2024-04-25T09:15:07.927`)
- [CVE-2024-3733](CVE-2024/CVE-2024-37xx/CVE-2024-3733.json) (`2024-04-25T09:15:08.237`)
- [CVE-2024-3893](CVE-2024/CVE-2024-38xx/CVE-2024-3893.json) (`2024-04-25T08:15:07.490`)
- [CVE-2024-3929](CVE-2024/CVE-2024-39xx/CVE-2024-3929.json) (`2024-04-25T08:15:07.657`)
- [CVE-2024-3988](CVE-2024/CVE-2024-39xx/CVE-2024-3988.json) (`2024-04-25T08:15:07.813`)
- [CVE-2024-4173](CVE-2024/CVE-2024-41xx/CVE-2024-4173.json) (`2024-04-25T08:15:07.977`)
- [CVE-2023-52220](CVE-2023/CVE-2023-522xx/CVE-2023-52220.json) (`2024-04-25T10:15:08.260`)
- [CVE-2024-1347](CVE-2024/CVE-2024-13xx/CVE-2024-1347.json) (`2024-04-25T11:15:45.637`)
- [CVE-2024-2434](CVE-2024/CVE-2024-24xx/CVE-2024-2434.json) (`2024-04-25T11:15:45.870`)
- [CVE-2024-25583](CVE-2024/CVE-2024-255xx/CVE-2024-25583.json) (`2024-04-25T10:15:08.867`)
- [CVE-2024-2829](CVE-2024/CVE-2024-28xx/CVE-2024-2829.json) (`2024-04-25T11:15:46.057`)
- [CVE-2024-32676](CVE-2024/CVE-2024-326xx/CVE-2024-32676.json) (`2024-04-25T11:15:46.243`)
- [CVE-2024-32961](CVE-2024/CVE-2024-329xx/CVE-2024-32961.json) (`2024-04-25T10:15:09.067`)
- [CVE-2024-3730](CVE-2024/CVE-2024-37xx/CVE-2024-3730.json) (`2024-04-25T11:15:46.603`)
- [CVE-2024-3994](CVE-2024/CVE-2024-39xx/CVE-2024-3994.json) (`2024-04-25T10:15:09.263`)
- [CVE-2024-4035](CVE-2024/CVE-2024-40xx/CVE-2024-4035.json) (`2024-04-25T10:15:09.427`)
- [CVE-2024-4077](CVE-2024/CVE-2024-40xx/CVE-2024-4077.json) (`2024-04-25T10:15:09.590`)
- [CVE-2024-4164](CVE-2024/CVE-2024-41xx/CVE-2024-4164.json) (`2024-04-25T11:15:46.777`)
### CVEs modified in the last Commit
Recently modified CVEs: `3`
Recently modified CVEs: `1`
- [CVE-2023-6237](CVE-2023/CVE-2023-62xx/CVE-2023-6237.json) (`2024-04-25T07:15:45.270`)
- [CVE-2024-0151](CVE-2024/CVE-2024-01xx/CVE-2024-0151.json) (`2024-04-25T08:15:07.420`)
- [CVE-2024-31380](CVE-2024/CVE-2024-313xx/CVE-2024-31380.json) (`2024-04-25T09:15:08.127`)
- [CVE-2024-32677](CVE-2024/CVE-2024-326xx/CVE-2024-32677.json) (`2024-04-25T11:15:46.440`)
## Download and Usage

View File

@ -235834,11 +235834,11 @@ CVE-2023-51473,0,0,c717b541715384069e4e1f234809a3353cecd65454fe611c8ad98ac99f14b
CVE-2023-51474,0,0,f6ae408c3a922cfdfc785e0a99ab0da323d66aa2473d9214f464f168abaf8486,2024-03-17T22:38:29.433000
CVE-2023-51475,0,0,3b22b7562ec7c62760bcb36076150336b816419fb1f4781f9eda477c8bacc5ab,2024-01-08T17:09:53.473000
CVE-2023-51477,0,0,4f67f178a6452a49208e4b34c27938dce123af4b2194e32c4684df74c0e3ddfc,2024-04-24T17:16:50.397000
CVE-2023-51478,1,1,d95bd80c2189309451ce0328f4070da16ebe8aa874e07e024cedc5c96915ced7,2024-04-25T08:15:07.160000
CVE-2023-51478,0,0,d95bd80c2189309451ce0328f4070da16ebe8aa874e07e024cedc5c96915ced7,2024-04-25T08:15:07.160000
CVE-2023-5148,0,0,b9cccef0db87619d4d8a66efab7c8a65309c4d041d7c92a0d212f6da340fb299,2024-04-11T01:22:53.670000
CVE-2023-51480,0,0,f8823f539951e34f7db1aecf23364bc135467d8a0c59ff2384ab35a6a58cc37b,2024-02-15T21:06:20.197000
CVE-2023-51482,1,1,88f7dac76b71eb806f6bb357dc905c8dfb9823e04c69aa6647fe35a5b7a190a6,2024-04-25T09:15:06.880000
CVE-2023-51484,1,1,0bd652f8cafc530bbdd0cf00956ec32b9fce8fd128b051dbaf378ace36ea3beb,2024-04-25T09:15:07.143000
CVE-2023-51482,0,0,88f7dac76b71eb806f6bb357dc905c8dfb9823e04c69aa6647fe35a5b7a190a6,2024-04-25T09:15:06.880000
CVE-2023-51484,0,0,0bd652f8cafc530bbdd0cf00956ec32b9fce8fd128b051dbaf378ace36ea3beb,2024-04-25T09:15:07.143000
CVE-2023-51485,0,0,b45b2ac9de0fefa98f7d5095938cdcfb38d785140d230b3d93a0e5b7be6e9281,2024-02-15T06:26:27.350000
CVE-2023-51486,0,0,9229ace1c5a78534c4a29354f69eed7eb15a32aa9ba93f26a4ff614b16fec211,2024-03-17T22:38:29.433000
CVE-2023-51487,0,0,847a2f263199d3d0b7e3580ccc5065b94cfbf72d7c5fef0109251fbebd97904b,2024-03-17T22:38:29.433000
@ -236275,6 +236275,7 @@ CVE-2023-52216,0,0,0abddcd9cec3889c982561204259a4fbd6d1dbd4b2cc9d289f548ce07e0b2
CVE-2023-52218,0,0,7b665670ae49b9a55269793dbdbcff40e383cda41d548bb50d0820fbba3ce68a,2024-01-11T18:43:19.067000
CVE-2023-52219,0,0,725e019d2fc10de270113e602317a73de8b7fdc7857e05e8af3c8ee08f8ddb31,2024-01-11T18:43:08.093000
CVE-2023-5222,0,0,c1e341045c0f11dc51130ddd6c55bbdb6c5b59e7e51042c31060eb80c77b1e20,2024-04-11T01:22:54.960000
CVE-2023-52220,1,1,effd6e7e63c3fb32c2c4bcc7b485d35224afea40f41329ef33223e593036407c,2024-04-25T10:15:08.260000
CVE-2023-52221,0,0,6c853580c221f82c51262bc0fe815c852a280cf9888ed2875fd663a1fd304e49,2024-01-30T17:01:51.733000
CVE-2023-52222,0,0,1142f590e1a21aeacceaabe68ed8ad5f9063502f197fc05ff7c0c8e41c0a95cb,2024-01-11T19:01:03.343000
CVE-2023-52223,0,0,3daf999840f1c944c0431f78081f2c2548ca4a0fcff350348e23cd8c51c83648,2024-02-29T13:49:47.277000
@ -237526,7 +237527,7 @@ CVE-2023-6233,0,0,219eace3a1a0153d9e9c47c5f968398c12850df06483ce044fb78774d98c68
CVE-2023-6234,0,0,c300a8904deed01fc5477fc97fa27627c8d1f6d71059c668e1fb941f32fdf7e2,2024-02-13T19:51:46.740000
CVE-2023-6235,0,0,a6ac280c87945b3531740d074fb7f02bafe0fd764523c0dc65a87b2c28ffc24b,2023-11-29T16:59:51.970000
CVE-2023-6236,0,0,c746200290431ebe52c336c97f229880dd537f5eeffbab0aaed59ac6b0e48cbf,2024-04-10T13:23:38.787000
CVE-2023-6237,0,1,3fd833d8df196076b15248237a7e6cb9d5598d7d6e10626d77ae121cb0a3fbae,2024-04-25T07:15:45.270000
CVE-2023-6237,0,0,3fd833d8df196076b15248237a7e6cb9d5598d7d6e10626d77ae121cb0a3fbae,2024-04-25T07:15:45.270000
CVE-2023-6238,0,0,7332193d1454e7405dd3270d745aa7f762b874d0f84c51906784a637ceb0212d,2024-02-07T00:15:55.240000
CVE-2023-6239,0,0,6ce1b576ddd7c9169d0997e75fde3efd606153edbf61fba1116d733c98bbf90d,2023-12-04T19:06:20.213000
CVE-2023-6240,0,0,9f82f7462b3110d2d963e8af8e7c4ae7d74cf243233e0832a0fe614b539f6ea4,2024-04-18T04:15:09.903000
@ -238409,7 +238410,7 @@ CVE-2024-0080,0,0,6c0d206dd91620b9eed7dc804b37cabf92e6b94b99ac768289c8d5abe0e718
CVE-2024-0081,0,0,7224cfd553042ae01e2abfd02f661fee4ab9e15edf612773f3a2b6523001079f,2024-04-08T18:49:25.863000
CVE-2024-0082,0,0,2f8bf036b6ccf9a376740e76b27024fe830e6e0ae585ea5b083515d36ff830e7,2024-04-09T12:48:04.090000
CVE-2024-0083,0,0,ab832b2e89667613797d661d736b6cac31cc3f4854c5fe470b78e46bd7a9f856,2024-04-09T12:48:04.090000
CVE-2024-0151,0,1,aafc841cfb528b9ef4d150e11c8565679b9331c9ad5bf3569e38f74d72962c86,2024-04-25T08:15:07.420000
CVE-2024-0151,0,0,aafc841cfb528b9ef4d150e11c8565679b9331c9ad5bf3569e38f74d72962c86,2024-04-25T08:15:07.420000
CVE-2024-0154,0,0,fee6d0edd38400fe9a2f331d67a355be9bc81701717352554939ef10dafbbf73,2024-03-13T18:15:58.530000
CVE-2024-0155,0,0,56d3003aea28bbff1e776f33de697fc847d720d7a8270931f6c22f264f5611eb,2024-03-04T13:58:23.447000
CVE-2024-0156,0,0,47a5ee4f12284e0f109441891942aa0eb589b2387e172b6366b6741bcabc51b4,2024-03-04T13:58:23.447000
@ -239432,6 +239433,7 @@ CVE-2024-1343,0,0,7985dc5630dbf743d174adfd5bcbbeffba7f6f107c154562a0a1291a9163d2
CVE-2024-1344,0,0,6e9ea80e9b1906095e19ebbcfe72bb26c4abf1a00053a32e3b2ac9d853412ece,2024-02-20T19:50:53.960000
CVE-2024-1345,0,0,edc14e21821ef700ebe0363d9d625110658b2ac84664f2109ac9f28db37f2b84,2024-02-20T19:50:53.960000
CVE-2024-1346,0,0,f9b1cf937db0cca6baf401ddf2b76ede34aff7f78d164647460f90ba78591111,2024-02-20T19:50:53.960000
CVE-2024-1347,1,1,d59a7fe81057cda9528d10602538be86d933607cac829b14d8fff6670c10ea86,2024-04-25T11:15:45.637000
CVE-2024-1349,0,0,b279200dbd0caf4e8952d9c37c4c16e81897b7eb26d17adae101e27da89cab26,2024-02-29T13:49:29.390000
CVE-2024-1350,0,0,f5a86475fc1dc34b3dba1cdb58ce8a034cff8f306bdf175488f056a4cdebab37,2024-04-17T12:48:07.510000
CVE-2024-1351,0,0,ccfc6382e78432a14bc2d9bf0a36d4e4d8658043dc7dae2de5101e9686831717,2024-03-08T14:02:57.420000
@ -241023,7 +241025,7 @@ CVE-2024-22140,0,0,7531d09a0f968b5d2b1e4e11b41757eb318c7a2cf822561fb39f6b355e958
CVE-2024-22141,0,0,82c169c1dd57a019cf6b1fa659a8204ad1d91b953c7a71671ed9e1905b8d4a0f,2024-01-30T20:18:38.460000
CVE-2024-22142,0,0,8637a6c60024e32494bb4696b4c838486f6176e902ea0c9e3d4b4fb3a1805b63,2024-01-19T19:59:49.717000
CVE-2024-22143,0,0,adccc14524111072286cffd424e6560dcad4b1e2e3b7161d3a46107433633930,2024-02-03T00:24:07.510000
CVE-2024-22144,1,1,252b4f2b7d870ce8636523e623089fc030194c61f182b05f207035c7bf5113c8,2024-04-25T09:15:07.360000
CVE-2024-22144,0,0,252b4f2b7d870ce8636523e623089fc030194c61f182b05f207035c7bf5113c8,2024-04-25T09:15:07.360000
CVE-2024-22146,0,0,8a44d2f783f8546b1d5e9fc855a9089455ad2fafc8ab97139269e47d5d414f01,2024-02-06T15:51:01.533000
CVE-2024-22147,0,0,0b0e8745bfea72bbfa1b747625dc2bbdeefcf97593cd8b6f4d26d36641e1e2b9,2024-02-01T04:13:36.740000
CVE-2024-22148,0,0,eb4d4a193f2153f5fe3df79c79a6ba27f52e6d1edc409f8c9f4419f061b12f8c,2024-02-03T00:30:56.520000
@ -242146,6 +242148,7 @@ CVE-2024-24334,0,0,da06e1e254e82aef6a8ae8700111f26a6ca009a50ffc571e730349ef73e52
CVE-2024-24335,0,0,5e7519464b215df4f7724f66c24af45a646a0a7e87ae840c74db5854f34f48da,2024-03-27T12:29:30.307000
CVE-2024-24336,0,0,f4912e863fa74b8ab422c3568a4f277c89a6d7944484768fcb0717c5b37fc600,2024-03-20T13:00:16.367000
CVE-2024-24337,0,0,aea724cce42152cfbca31af56ebea4b4144a07dac6916cd215f4a89a5f259b76,2024-02-13T14:01:49.147000
CVE-2024-2434,1,1,04c152a98feb21794f0b43e3b94b64417b1f21316c4c0cfb69b32a54efa153f8,2024-04-25T11:15:45.870000
CVE-2024-2435,0,0,a82b6b668d8e82e4d367c64006f2c2586551c9f49283b8f01e55602069760d54,2024-04-02T18:12:16.283000
CVE-2024-24350,0,0,9134767962641c17d78d439bf5ad6b0040b309c747242ef118ff001480ea18e9,2024-02-14T21:53:21.057000
CVE-2024-2436,0,0,0058451184de01ace2b295600d83c490983eb7c72ad2716d828043436e9ab2c7,2024-04-10T13:23:38.787000
@ -242759,6 +242762,7 @@ CVE-2024-25578,0,0,ff68f9ee0e3394b3fa83fe8766f2e044325a5fd043b437de063c0cd80654c
CVE-2024-25579,0,0,838cd17118b030eacfba49a0ada30a1ba4831f0bedbfd768ff2707f55789078e,2024-04-04T01:15:50.083000
CVE-2024-2558,0,0,05ecdd587f34cceb1493c24040a39ce304ec6f718c555097cfbd0b512bd51f16,2024-04-11T01:25:27.900000
CVE-2024-25580,0,0,aa78600da8abcfd02ed93a87510a3e3684060f93f36da496d331a2464d925d23,2024-03-27T12:29:30.307000
CVE-2024-25583,1,1,2b54e7f24be9d3570e6a548fc802dcc59ae929ac07b6602cc1dfe4ed86350999,2024-04-25T10:15:08.867000
CVE-2024-2559,0,0,0df14d2b8b0850aef83be7e2591ffb20aabcbafcf048e059668c41d2f3aea928,2024-04-11T01:25:27.973000
CVE-2024-25591,0,0,c65f01ca63ad0801e05905a469f348aac6155e03a8ca96328b00fe29f06ee168,2024-03-17T22:38:29.433000
CVE-2024-25592,0,0,3bf77ce6c0d5ce69c3b2d29d57784babd24dff1d07ed5b59dadd6cc7feeb66a0,2024-03-15T16:26:49.320000
@ -242955,7 +242959,7 @@ CVE-2024-25913,0,0,f836a846f4079f05601564732cb9a5408cfd48a38708177104907308615f9
CVE-2024-25914,0,0,6c21c235c508fdd4e37939a7918e64e3dd4e50979a576bdc305d842a25f11a05,2024-02-13T14:01:07.747000
CVE-2024-25915,0,0,2b3eb3b61519c3cc7ec9c696d86f766a5ba91455b2def2592d7df0099d9b76fa,2024-02-23T16:14:43.447000
CVE-2024-25916,0,0,9a157d9e9f7c2a47535d6fe7b72d4b8297c899743fb7757d707e251d0e0cee3c,2024-03-15T16:26:49.320000
CVE-2024-25917,1,1,8bfc3970fc7ef8f76b99ffb0454019d0824e0f1bba8d867fa50e33f8e5788128,2024-04-25T09:15:07.550000
CVE-2024-25917,0,0,8bfc3970fc7ef8f76b99ffb0454019d0824e0f1bba8d867fa50e33f8e5788128,2024-04-25T09:15:07.550000
CVE-2024-25918,0,0,94384e507f0050673085096762ed49a5498803fb71358620832f7751f166af55,2024-04-03T12:38:04.840000
CVE-2024-25919,0,0,10e90b733b4139783c8edab5a7be80b4a6a1310bbbe6bd2d191c5b664c04198b,2024-03-15T16:26:49.320000
CVE-2024-2592,0,0,234860397f53316d0fc14e6428f643653c1a443db32886f209582c59f6a746af,2024-03-18T19:40:00.173000
@ -244317,6 +244321,7 @@ CVE-2024-28283,0,0,268ce493b20c7a589a5e50c22f5ba70e4448bc55aa5cacedfa25c50cee9c0
CVE-2024-28286,0,0,7b760a4769f45c40990c61b4c6dca958dc26708f19d30b01bb3a34dbec61c15d,2024-03-21T12:58:51.093000
CVE-2024-28287,0,0,f3e972680aaba746036e0c18fb52d806a7d00f059e355ec696b64bf775ceea80,2024-04-02T18:12:16.283000
CVE-2024-28288,0,0,a02e3d9826d4212dd14a4181934d81e2a653b8135d5e48cc021c9f921b853477,2024-04-01T01:12:59.077000
CVE-2024-2829,1,1,a3397755340cc107bcbf3baf36ebef46488327d274491f88b8ab5140fb526050,2024-04-25T11:15:46.057000
CVE-2024-2830,0,0,d5b60d4e864f39f624f9c75c8c5ccee07e6c5fbd8045c5529f94cb5bf65e5175,2024-04-04T12:48:41.700000
CVE-2024-28303,0,0,32d4865094af329a688db1798283b86ca81a4a5fae30846af22292284fa8cb98,2024-03-20T13:00:16.367000
CVE-2024-28318,0,0,ede034690df957e6783d45bfb66a16f12d36f93dac03aab57e77aeedfffbbc90,2024-03-15T16:26:49.320000
@ -245396,7 +245401,7 @@ CVE-2024-30556,0,0,f1da61d39a2aaf955621919b0301fa9315dc388c72c47a5c5e3e3f6db8419
CVE-2024-30557,0,0,7e51550c5d84adae681c592a59742ffb76e054dc707c58b718a0779baf95a502,2024-04-01T01:12:59.077000
CVE-2024-30558,0,0,c487b7e520828364fad2b07b74e7c881d68876bac73b13b5c83e0dfd99fede24,2024-04-01T01:12:59.077000
CVE-2024-30559,0,0,30881b502a00e1f0b4af436d9e17ecd66ddff7c4f60889245892c374e2f0a5b2,2024-04-01T01:12:59.077000
CVE-2024-30560,1,1,bba19f1a227fac96bb2a35e6b98384a021b2e05fd187d58b8e0da53bd32c3cd7,2024-04-25T09:15:07.740000
CVE-2024-30560,0,0,bba19f1a227fac96bb2a35e6b98384a021b2e05fd187d58b8e0da53bd32c3cd7,2024-04-25T09:15:07.740000
CVE-2024-30561,0,0,03bc43de8aff9caae9f72d908884b596acdfb45cf5a607bf3a61d00b78d408af,2024-04-01T01:12:59.077000
CVE-2024-30564,0,0,5f976284dee8adc6f867c668cd15b1659935b33cf9e4e2c130b09997500e7317,2024-04-18T18:25:55.267000
CVE-2024-30565,0,0,3c10663ebaef8c263e29a3b4fcd5ce9f26a98e5c4788e4f23a40d6624f566f6b,2024-04-04T12:48:41.700000
@ -245720,7 +245725,7 @@ CVE-2024-31262,0,0,2a9bcea0985fcaddd83893245a1b9fdc06643313b9df1f9c0a4fa4b5530f3
CVE-2024-31263,0,0,8f2890afedcc5d88494c2f6c1c034154cfb17cbd4a58e7b9478e628be5899862,2024-04-15T13:15:51.577000
CVE-2024-31264,0,0,c428617dd4afe9db95ef9b76c24f075b8caced8c4ee5d37fbc0432619eab40a5,2024-04-15T13:15:51.577000
CVE-2024-31265,0,0,73b53303ea2aa4510d95cf2e30536090282921bee1e4ddf1a7938462135cb9c0,2024-04-15T13:15:51.577000
CVE-2024-31266,1,1,572aff496d14246f188a5def7d09d331b6670ef56cc3dfa020b78be489d23e33,2024-04-25T09:15:07.927000
CVE-2024-31266,0,0,572aff496d14246f188a5def7d09d331b6670ef56cc3dfa020b78be489d23e33,2024-04-25T09:15:07.927000
CVE-2024-31268,0,0,c260b292f4a0557333471e9a298a56aee0f8adfc83aea133a9470b069de5a2b5,2024-04-15T13:15:51.577000
CVE-2024-31269,0,0,d795c0acb6cd496e9d563a25767f3786288bcffe37844eb18ef033fe012b3b5a,2024-04-15T13:15:51.577000
CVE-2024-31271,0,0,d8228662c1440f14ee742f57032f82398c2055e3f352f6a0fc3cc42050b1d28d,2024-04-15T13:15:51.577000
@ -245789,7 +245794,7 @@ CVE-2024-31376,0,0,a5cd7decb3aa77b7c9dfe04828eefa3f789d2a15ced405db0122622e67c0d
CVE-2024-31378,0,0,46b9b8732b642d44c5d384306dfbdf69a9115d6098ab0a36faa3f26c08690e37,2024-04-15T13:15:31.997000
CVE-2024-31379,0,0,24f2bdeb0f1fb4bdf974899fe3fab2725f6d89406a545ae15090a05eaf09429a,2024-04-15T13:15:31.997000
CVE-2024-3138,0,0,952bef3e912c81d77b1f4b71c423532beae8fc55963465bb23e6cf3f92e09bdf,2024-04-11T01:25:54.493000
CVE-2024-31380,0,1,8c491764a24eea5e95145b5c62b11d20bc6b7216a5ecf959aad591fd2cab2e94,2024-04-25T09:15:08.127000
CVE-2024-31380,0,0,8c491764a24eea5e95145b5c62b11d20bc6b7216a5ecf959aad591fd2cab2e94,2024-04-25T09:15:08.127000
CVE-2024-31381,0,0,c9f8b2a8bb43383a6d2b44f4c2bce621630063d464575918f98bc752cd934627,2024-04-15T13:15:31.997000
CVE-2024-31382,0,0,fdb9f25138a089e37ff91a85435d838e4c79e5961d1d783d123309eb6b480c40,2024-04-15T13:15:31.997000
CVE-2024-31383,0,0,969012fe96b80e550a1eee7edc6c8a1c541c828926b828c1a67fc199b91a261d,2024-04-15T13:15:31.997000
@ -246316,7 +246321,8 @@ CVE-2024-32661,0,0,0b4f6f6bf08605ad36c3697d5c10f022921cc6cf1c11c6d2a8c37ca647145
CVE-2024-32662,0,0,cc82e255660f76e8294a012a16568aaf2fb6ae82fd6edb9a95574f4ae5e4ec18,2024-04-24T13:39:42.883000
CVE-2024-3267,0,0,00a210ede7a73ca33b64d3b8a0e382509d5bafa34ae84022125b180763aee2bd,2024-04-10T13:23:38.787000
CVE-2024-32675,0,0,597168f82a15ece6f0d4e4d1f7460a085e409a51dae9c8ea8f8173b85f0b866d,2024-04-24T17:16:50.397000
CVE-2024-32677,0,0,3ebbb3828922e8418f63ca2fe97588ef6ea586f81b213ed0ff8eaf06ecf39afc,2024-04-24T17:16:50.397000
CVE-2024-32676,1,1,716fac011b9dcb9e330192470cb562714bdb90b0b7a9f7776017360b478eb0bc,2024-04-25T11:15:46.243000
CVE-2024-32677,0,1,b2d5b21c6c0b64a6ef3d2bb5d4a7fb394174b9e010ebfad39ee101d085a71d44,2024-04-25T11:15:46.440000
CVE-2024-32678,0,0,e1cc34cfef6fbca3bc4c61530e9653503dc08aed7ddf2a53024c1679bd074407,2024-04-24T17:16:50.397000
CVE-2024-32679,0,0,47f25b53322dabb6e1a721a9caf70ab58f695c8ffaee75067972f951cb497019,2024-04-24T13:39:42.883000
CVE-2024-32681,0,0,30385cf8415af0417b19f52d5eb22ace0b875cd333ead985847624dbf28043cd,2024-04-22T13:28:34.007000
@ -246408,6 +246414,7 @@ CVE-2024-32955,0,0,4110c217be7c8e99337e07561aafd3b44e4ea4a473b206cd84ab63a5159eb
CVE-2024-32956,0,0,d66d4590ba60a597e1a04a825f1bc4c4665719511bc6e488154ea811617d794b,2024-04-24T13:39:42.883000
CVE-2024-32958,0,0,cef1b6bbedd4c8c60a926a11138b6464f77bbaf19e9ffb1c03d74bbc158a75b6,2024-04-24T17:16:50.397000
CVE-2024-3296,0,0,bcc39314c1e9f6d53aa0ccc8e7e7cac7c279f7f6ee5a27f19287b128ea2ed6c7,2024-04-05T12:15:37.777000
CVE-2024-32961,1,1,eb18021c37a6cf34a128f1dc588c08b91507e01991dff3711f150703abc858e1,2024-04-25T10:15:09.067000
CVE-2024-3298,0,0,35145d829af4d19541380a93e6723503e514b69e11aa4b007b05099610c37f21,2024-04-04T16:33:06.610000
CVE-2024-3299,0,0,f60f2a80accdd6f345a6a9cd66637eda180121596f90c2e7d75707c9fce20eb6,2024-04-04T16:33:06.610000
CVE-2024-3302,0,0,125cce6ead91da0349b4d4d5e52af6eb4c2a0511fb870ab9451e4f4746c28bb4,2024-04-24T10:15:07.417000
@ -246588,9 +246595,10 @@ CVE-2024-3707,0,0,cb892298714e8d1628bf09ece0bc00ef0a1a1429034ce83bb3286f4d822c16
CVE-2024-3719,0,0,f291ba68ba6e93978bc9c39b527e377db4603f9cf0b58326694ce4a62db06977,2024-04-15T13:15:31.997000
CVE-2024-3720,0,0,548129ada226460eeed0bbe63afac7cb948fd16d011c5ffd900fa7625265466b,2024-04-15T13:15:31.997000
CVE-2024-3721,0,0,e2cd22ce24461bd25c9ec7cb92e927b75c559a9256137266b8480ef946c8e320,2024-04-15T13:15:31.997000
CVE-2024-3730,1,1,62c92a9474f499bf2009c922debbb3f61228803890b0890ea7cc5e5fb9abfd35,2024-04-25T11:15:46.603000
CVE-2024-3731,0,0,bdcc8f677627b7b108ec8e839a01e7cc6ba34354d6004394dff79046d7838f40,2024-04-19T13:10:25.637000
CVE-2024-3732,0,0,47b10b9e83ea0bac70990c3295c25b56cc73657af82bc6f5c1f4fd37930f5edb,2024-04-23T12:52:09.397000
CVE-2024-3733,1,1,7048fa2a6d6ace3c1b4095e840494448f8f41b7bf603ced5e4516b0d4a0f8872,2024-04-25T09:15:08.237000
CVE-2024-3733,0,0,7048fa2a6d6ace3c1b4095e840494448f8f41b7bf603ced5e4516b0d4a0f8872,2024-04-25T09:15:08.237000
CVE-2024-3735,0,0,9300dd852c0feb2e50ee641119a226f214818e2f2843b357387d0b439146ec2c,2024-04-15T13:15:31.997000
CVE-2024-3736,0,0,8e1e49a70c099a42d25fc2ef350c0eb9767073e2fa96b7ffe6bc4d265c3f8c23,2024-04-15T13:15:31.997000
CVE-2024-3737,0,0,1990edd10a050a438850658c5a42b3f737afd31a7356a3decab691dfe1bc7cad,2024-04-15T13:15:31.997000
@ -246671,7 +246679,7 @@ CVE-2024-3880,0,0,237e3bb93a0b113a1c50538806f68b5377561349bd4f47a9139ec72cd35641
CVE-2024-3881,0,0,9055ecf63e1aedc7e2787afc56e67bc831564d5ee15f418ef1b408c81c24bb16,2024-04-17T12:48:31.863000
CVE-2024-3882,0,0,846c922d5cf92347db05da515dc041ccc83bdcd548fefc386c188946857d0db7,2024-04-17T12:48:31.863000
CVE-2024-3889,0,0,c4039354ee4d81ce5faec2ce618c8f0af30c97c1ad1feeb689836cb585b438a6,2024-04-23T12:52:09.397000
CVE-2024-3893,1,1,d69befe4b9c26bab47130e2550d58417589158f460839d5dddb71000af5513de,2024-04-25T08:15:07.490000
CVE-2024-3893,0,0,d69befe4b9c26bab47130e2550d58417589158f460839d5dddb71000af5513de,2024-04-25T08:15:07.490000
CVE-2024-3900,0,0,5bafaa90d65e26f460054cb65a089d31ecb0030e0f85c3f0ee595a0cce123691,2024-04-17T20:08:21.887000
CVE-2024-3905,0,0,666ba6ab36ae43f19518f88ffcc3dc3578e7336eef9fa01b067c40b574dea570,2024-04-17T12:48:07.510000
CVE-2024-3906,0,0,dd9841bce880aeaa28c9d51ba9e314b7fd3abe4741e8e805c9e3a8477cebd832,2024-04-17T12:48:07.510000
@ -246682,12 +246690,13 @@ CVE-2024-3910,0,0,7d8aafa4b35964a72cdc3d08dd6c7b1615ef522d553c6c78d413b0e25fdc71
CVE-2024-3911,0,0,421a4146dc8ebd653de189c62bd791d7d943c2a07a6c17029678795c1bffde3d,2024-04-24T13:39:42.883000
CVE-2024-3914,0,0,97e3c2a1ceda5baa1eed65646997d7cab2203eabae8e05a9bf7340c2163a5004,2024-04-23T18:15:15.823000
CVE-2024-3928,0,0,114c97f372c53f33fe3b26cd091686f1eb78a3749714814b77901a77b62a0107,2024-04-18T13:04:28.900000
CVE-2024-3929,1,1,ec0312638fce606a6fa058aa3faff9ab28473bc202fdcc2f993c4e28ca45b633,2024-04-25T08:15:07.657000
CVE-2024-3929,0,0,ec0312638fce606a6fa058aa3faff9ab28473bc202fdcc2f993c4e28ca45b633,2024-04-25T08:15:07.657000
CVE-2024-3931,0,0,adc8a79b07f48b35a9681a97a568e852ba1ef2cbd3b7271f585750c2d2c4216b,2024-04-18T13:04:28.900000
CVE-2024-3932,0,0,bce0f8b09e2fc4acc0cfce5940d57ce5f1e0384ac19f6c68ed218175688d8f12,2024-04-18T13:04:28.900000
CVE-2024-3948,0,0,427154a0226db385c08a1dc567a28e238ab290a5825189b73e5e958b25b296e5,2024-04-18T13:04:28.900000
CVE-2024-3979,0,0,9ef752ac5397ef4280bc4d9888fb417cb985331164bf90affafa759f391a2bfe,2024-04-19T18:29:53.040000
CVE-2024-3988,1,1,b29ac0147c5e6d0c49359de13f52e1f6a660eeb53737b8c0e3def81fd96a0f78,2024-04-25T08:15:07.813000
CVE-2024-3988,0,0,b29ac0147c5e6d0c49359de13f52e1f6a660eeb53737b8c0e3def81fd96a0f78,2024-04-25T08:15:07.813000
CVE-2024-3994,1,1,a14ba4054706f5b0f33c62595d06e70efeab5d431147ba5cdbfa7a0e731a83bf,2024-04-25T10:15:09.263000
CVE-2024-4014,0,0,321273114f78ac117c4f7a805b62a62926b23a5461c74b2705504b7b2e21d158,2024-04-22T13:28:43.747000
CVE-2024-4017,0,0,9cc899b07e49c20d1d42511c9c41a533c695fd74b1701843b26490566c6e33e3,2024-04-22T13:28:50.310000
CVE-2024-4018,0,0,b534838241485b84911a40a305fab0f06a9a1281f09d3d1140d27d7f52b1a84d,2024-04-22T13:28:50.310000
@ -246697,6 +246706,7 @@ CVE-2024-4021,0,0,21ca31bf18d88881f7a6cc1002b89ea9bbd51b89715a0adf7c08b2eb5ac210
CVE-2024-4022,0,0,ebd323c8f90bdf29bd6ff35ea1eff449874a3d962dc85b687039f47f7b416e73,2024-04-22T13:28:43.747000
CVE-2024-4026,0,0,65bff2dba626fde0f88488c1e6df610a37e761e2e041855587a3bbcb3e849c23,2024-04-22T13:28:34.007000
CVE-2024-4031,0,0,4baeaad68cf3411bf45d41e53c64aca0aa19dc8cf620cd2c5028b0d61a50ba2c,2024-04-23T12:52:09.397000
CVE-2024-4035,1,1,3c97dbc459f27fd6f27a5fad16013f4954effbdf185f19a0463e9ca471ba5099,2024-04-25T10:15:09.427000
CVE-2024-4040,0,0,a8c13c2ea93261639ce0bb9b0a36d4120d837055b81d6b1ea3d5d9f015206ec9,2024-04-23T23:15:48.790000
CVE-2024-4062,0,0,00e701b26925636f4b147891efd3607d8441f5743e72ff31df8ffeb1293615e9,2024-04-24T13:39:42.883000
CVE-2024-4063,0,0,45ec0afed63b6cdcc64eb9b7f37753004f82dbe9793a74b35da8bcfe5ff1c982,2024-04-24T13:39:42.883000
@ -246710,6 +246720,7 @@ CVE-2024-4072,0,0,23b253a931e3508f3a1005d6a8e36875356ae44a1423e0377599374bef4bd3
CVE-2024-4073,0,0,cd6b9a0b4041273b39eacc88accab4b27eed8bb21a661b97a552fff795cecb9e,2024-04-24T13:39:42.883000
CVE-2024-4074,0,0,54ee17fd7f393f43bd085cf0dad52e1098d3a86070f7c8e5db37e41aca4270c3,2024-04-24T13:39:42.883000
CVE-2024-4075,0,0,b337ce732e80d61a7a94e7d1b24517f369d5a9145712a3118619de41efc762cf,2024-04-24T13:39:42.883000
CVE-2024-4077,1,1,d497ce731770f9703997c9ef34f40360e0899c1dee6e84d6d4006806e04dbf8b,2024-04-25T10:15:09.590000
CVE-2024-4093,0,0,9d77513f5fb5e3e452600e46458fe98bb5da01bc49d6b9079762b82e5ad01fa6,2024-04-24T13:39:42.883000
CVE-2024-4111,0,0,f20c320bd5ca80655eb3563ab31ffb2b0ea8139e24b198ea11373682803605fc,2024-04-24T17:16:50.397000
CVE-2024-4112,0,0,51e6f8af3a203245bfdc6a063306377d7ade6d49f743078c73d6466628a7bdb0,2024-04-24T17:16:50.397000
@ -246731,4 +246742,5 @@ CVE-2024-4127,0,0,9f3daf88f98aa9a5b11198255f78ca942b2ab5518927e04fb0a738be86bc8e
CVE-2024-4141,0,0,cc9e710826c489d0ee22d4c7d9dd610e35e7eaed543a00c568b5470b560db2a2,2024-04-24T19:58:40.710000
CVE-2024-4159,0,0,83c5328a03798238305f310f084078d3cad1fb6c98d5d54e9a84a0987f74cd3f,2024-04-25T06:16:00.560000
CVE-2024-4161,0,0,2f77617960a9a5075b552af086040f8ad3ba69e67003299944e166633358fbf1,2024-04-25T06:16:01.427000
CVE-2024-4173,1,1,4cf3c2b76ec47f8931ff62c340004180d5832fb2961611b4c2709afe37444bdc,2024-04-25T08:15:07.977000
CVE-2024-4164,1,1,b636b4eac35d4002e496b996af715f3120aedfdd9d228b18553c2b02cc675f24,2024-04-25T11:15:46.777000
CVE-2024-4173,0,0,4cf3c2b76ec47f8931ff62c340004180d5832fb2961611b4c2709afe37444bdc,2024-04-25T08:15:07.977000

Can't render this file because it is too large.