Auto-Update: 2024-05-27T08:00:38.218387+00:00

This commit is contained in:
cad-safe-bot 2024-05-27 08:03:30 +00:00
parent bc3705374a
commit 435bb6ddec
15 changed files with 473 additions and 12 deletions

View File

@ -0,0 +1,59 @@
{
"id": "CVE-2024-26289",
"sourceIdentifier": "a6d3dc9e-0591-4a13-bce7-0f5b31ff6158",
"published": "2024-05-27T07:15:08.807",
"lastModified": "2024-05-27T07:15:08.807",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Deserialization of Untrusted Data vulnerability in PMB Services PMB allows Remote Code Inclusion.This issue affects PMB: from 7.5.1 before 7.5.6-2, from 7.4.1 before 7.4.9, from 7.3.1 before 7.3.18."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "a6d3dc9e-0591-4a13-bce7-0f5b31ff6158",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "a6d3dc9e-0591-4a13-bce7-0f5b31ff6158",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-502"
}
]
}
],
"references": [
{
"url": "https://forge.sigb.net/projects/pmb/files",
"source": "a6d3dc9e-0591-4a13-bce7-0f5b31ff6158"
},
{
"url": "https://github.com/enisaeu/CNW/blob/main/advisories/2024/CNW-2024-A-12.md",
"source": "a6d3dc9e-0591-4a13-bce7-0f5b31ff6158"
}
]
}

View File

@ -0,0 +1,43 @@
{
"id": "CVE-2024-27314",
"sourceIdentifier": "0fc0942c-577d-436f-ae8e-945763c79b02",
"published": "2024-05-27T07:15:09.297",
"lastModified": "2024-05-27T07:15:09.297",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Zoho ManageEngine\u00a0ServiceDesk Plus versions below\u00a014730,\u00a0ServiceDesk Plus MSP below 14720 and\u00a0SupportCenter Plus below\u00a014730 are vulnerable to\u00a0stored XSS in the Custom Actions menu on the request details. This vulnerability can be exploited only by the SDAdmin role users."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "0fc0942c-577d-436f-ae8e-945763c79b02",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:N/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 2.4,
"baseSeverity": "LOW"
},
"exploitabilityScore": 0.9,
"impactScore": 1.4
}
]
},
"references": [
{
"url": "https://www.manageengine.com/products/service-desk/cve-2024-27314.html",
"source": "0fc0942c-577d-436f-ae8e-945763c79b02"
}
]
}

View File

@ -0,0 +1,67 @@
{
"id": "CVE-2024-3933",
"sourceIdentifier": "emo@eclipse.org",
"published": "2024-05-27T06:15:09.367",
"lastModified": "2024-05-27T06:15:09.367",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "In Eclipse OpenJ9 release versions prior to 0.44.0 and after 0.13.0, when running with JVM option -Xgc:concurrentScavenge, the sequence generated for System.arrayCopy on the IBM Z platform with hardware and software support for guarded storage [1], could allow access to a buffer with an incorrect length value when executing an arraycopy sequence while the Concurrent Scavenge Garbage Collection cycle is active and the source and destination memory regions for arraycopy overlap. This allows read and write to addresses beyond the end of the array range."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "emo@eclipse.org",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:L",
"attackVector": "LOCAL",
"attackComplexity": "HIGH",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"availabilityImpact": "LOW",
"baseScore": 5.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.0,
"impactScore": 4.2
}
]
},
"weaknesses": [
{
"source": "emo@eclipse.org",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-125"
},
{
"lang": "en",
"value": "CWE-787"
},
{
"lang": "en",
"value": "CWE-805"
}
]
}
],
"references": [
{
"url": "https://github.com/eclipse/omr/pull/7275",
"source": "emo@eclipse.org"
},
{
"url": "https://gitlab.eclipse.org/security/cve-assignement/-/issues/21",
"source": "emo@eclipse.org"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2024-3939",
"sourceIdentifier": "contact@wpscan.com",
"published": "2024-05-27T06:15:09.733",
"lastModified": "2024-05-27T06:15:09.733",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "The Ditty WordPress plugin before 3.1.36 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup)"
}
],
"metrics": {},
"references": [
{
"url": "https://wpscan.com/vulnerability/80a9eb3a-2cb1-4844-9004-ba2554b2d46c/",
"source": "contact@wpscan.com"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2024-4529",
"sourceIdentifier": "contact@wpscan.com",
"published": "2024-05-27T06:15:09.840",
"lastModified": "2024-05-27T06:15:09.840",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "The Business Card WordPress plugin through 1.0.0 does not have CSRF checks in some places, which could allow attackers to make logged in users perform unwanted actions such as deleting card categories via CSRF attacks"
}
],
"metrics": {},
"references": [
{
"url": "https://wpscan.com/vulnerability/082ff0b8-2ecd-4292-832d-0a79e1ba8cb3/",
"source": "contact@wpscan.com"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2024-4530",
"sourceIdentifier": "contact@wpscan.com",
"published": "2024-05-27T06:15:09.927",
"lastModified": "2024-05-27T06:15:09.927",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "The Business Card WordPress plugin through 1.0.0 does not have CSRF checks in some places, which could allow attackers to make logged in users perform unwanted actions such as editing card categories via CSRF attacks"
}
],
"metrics": {},
"references": [
{
"url": "https://wpscan.com/vulnerability/952f6b5c-7728-4c87-8826-6b493f51a979/",
"source": "contact@wpscan.com"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2024-4531",
"sourceIdentifier": "contact@wpscan.com",
"published": "2024-05-27T06:15:10.017",
"lastModified": "2024-05-27T06:15:10.017",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "The Business Card WordPress plugin through 1.0.0 does not have CSRF checks in some places, which could allow attackers to make logged in users perform unwanted actions such as editing cards via CSRF attacks"
}
],
"metrics": {},
"references": [
{
"url": "https://wpscan.com/vulnerability/18c1b3bb-9998-416f-a972-c4a51643579c/",
"source": "contact@wpscan.com"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2024-4532",
"sourceIdentifier": "contact@wpscan.com",
"published": "2024-05-27T06:15:10.100",
"lastModified": "2024-05-27T06:15:10.100",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "The Business Card WordPress plugin through 1.0.0 does not have CSRF checks in some places, which could allow attackers to make logged in users perform unwanted actions such as deleting cards via CSRF attacks"
}
],
"metrics": {},
"references": [
{
"url": "https://wpscan.com/vulnerability/64cf5f95-bbf0-4c5f-867b-62f1b7f6a42e/",
"source": "contact@wpscan.com"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2024-4533",
"sourceIdentifier": "contact@wpscan.com",
"published": "2024-05-27T06:15:10.283",
"lastModified": "2024-05-27T06:15:10.283",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "The KKProgressbar2 Free WordPress plugin through 1.1.4.2 does not sanitize and escape a parameter before using it in a SQL statement, allowing admin users to perform SQL injection attacks"
}
],
"metrics": {},
"references": [
{
"url": "https://wpscan.com/vulnerability/c3406236-aaee-480a-8931-79c867252f11/",
"source": "contact@wpscan.com"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2024-4534",
"sourceIdentifier": "contact@wpscan.com",
"published": "2024-05-27T06:15:10.423",
"lastModified": "2024-05-27T06:15:10.423",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "The KKProgressbar2 Free WordPress plugin through 1.1.4.2 does not have CSRF check in some places, and is missing sanitisation as well as escaping, which could allow attackers to make logged in admin add Stored XSS payloads via a CSRF attack"
}
],
"metrics": {},
"references": [
{
"url": "https://wpscan.com/vulnerability/7b0046d4-cf95-4307-95a5-9b823f2daaaa/",
"source": "contact@wpscan.com"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2024-4535",
"sourceIdentifier": "contact@wpscan.com",
"published": "2024-05-27T06:15:10.520",
"lastModified": "2024-05-27T06:15:10.520",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "The KKProgressbar2 Free WordPress plugin through 1.1.4.2 does not have CSRF checks in some places, which could allow attackers to make logged in users perform unwanted actions via CSRF attacks"
}
],
"metrics": {},
"references": [
{
"url": "https://wpscan.com/vulnerability/d4980886-da10-4bbc-a84a-fe071ab3b755/",
"source": "contact@wpscan.com"
}
]
}

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2024-5400",
"sourceIdentifier": "twcert@cert.org.tw",
"published": "2024-05-27T06:15:10.620",
"lastModified": "2024-05-27T06:15:10.620",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Openfind Mail2000 does not properly filter parameters of specific CGI. Remote attackers with regular privileges can exploit this vulnerability to execute arbitrary system commands on the remote server."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "twcert@cert.org.tw",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "twcert@cert.org.tw",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-78"
}
]
}
],
"references": [
{
"url": "https://www.twcert.org.tw/tw/cp-132-7819-9661a-1.html",
"source": "twcert@cert.org.tw"
}
]
}

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2024-5403",
"sourceIdentifier": "twcert@cert.org.tw",
"published": "2024-05-27T07:15:09.530",
"lastModified": "2024-05-27T07:15:09.530",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "ASKEY 5G NR Small Cell fails to properly filter user input for certain functionality, allowing remote attackers with administrator privilege to execute arbitrary system commands on the remote server."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "twcert@cert.org.tw",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.2,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.2,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "twcert@cert.org.tw",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-78"
}
]
}
],
"references": [
{
"url": "https://www.twcert.org.tw/tw/cp-132-7821-87e38-1.html",
"source": "twcert@cert.org.tw"
}
]
}

View File

@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update ### Last Repository Update
```plain ```plain
2024-05-27T06:00:31.312532+00:00 2024-05-27T08:00:38.218387+00:00
``` ```
### Most recent CVE Modification Timestamp synchronized with NVD ### Most recent CVE Modification Timestamp synchronized with NVD
```plain ```plain
2024-05-27T05:15:09.617000+00:00 2024-05-27T07:15:09.530000+00:00
``` ```
### Last Data Feed Release ### Last Data Feed Release
@ -33,17 +33,26 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
### Total Number of included CVEs ### Total Number of included CVEs
```plain ```plain
251842 251855
``` ```
### CVEs added in the last Commit ### CVEs added in the last Commit
Recently added CVEs: `4` Recently added CVEs: `13`
- [CVE-2024-35291](CVE-2024/CVE-2024-352xx/CVE-2024-35291.json) (`2024-05-27T05:15:08.750`) - [CVE-2024-26289](CVE-2024/CVE-2024-262xx/CVE-2024-26289.json) (`2024-05-27T07:15:08.807`)
- [CVE-2024-35297](CVE-2024/CVE-2024-352xx/CVE-2024-35297.json) (`2024-05-27T05:15:09.617`) - [CVE-2024-27314](CVE-2024/CVE-2024-273xx/CVE-2024-27314.json) (`2024-05-27T07:15:09.297`)
- [CVE-2024-36384](CVE-2024/CVE-2024-363xx/CVE-2024-36384.json) (`2024-05-27T04:15:09.143`) - [CVE-2024-3933](CVE-2024/CVE-2024-39xx/CVE-2024-3933.json) (`2024-05-27T06:15:09.367`)
- [CVE-2024-5399](CVE-2024/CVE-2024-53xx/CVE-2024-5399.json) (`2024-05-27T04:15:09.300`) - [CVE-2024-3939](CVE-2024/CVE-2024-39xx/CVE-2024-3939.json) (`2024-05-27T06:15:09.733`)
- [CVE-2024-4529](CVE-2024/CVE-2024-45xx/CVE-2024-4529.json) (`2024-05-27T06:15:09.840`)
- [CVE-2024-4530](CVE-2024/CVE-2024-45xx/CVE-2024-4530.json) (`2024-05-27T06:15:09.927`)
- [CVE-2024-4531](CVE-2024/CVE-2024-45xx/CVE-2024-4531.json) (`2024-05-27T06:15:10.017`)
- [CVE-2024-4532](CVE-2024/CVE-2024-45xx/CVE-2024-4532.json) (`2024-05-27T06:15:10.100`)
- [CVE-2024-4533](CVE-2024/CVE-2024-45xx/CVE-2024-4533.json) (`2024-05-27T06:15:10.283`)
- [CVE-2024-4534](CVE-2024/CVE-2024-45xx/CVE-2024-4534.json) (`2024-05-27T06:15:10.423`)
- [CVE-2024-4535](CVE-2024/CVE-2024-45xx/CVE-2024-4535.json) (`2024-05-27T06:15:10.520`)
- [CVE-2024-5400](CVE-2024/CVE-2024-54xx/CVE-2024-5400.json) (`2024-05-27T06:15:10.620`)
- [CVE-2024-5403](CVE-2024/CVE-2024-54xx/CVE-2024-5403.json) (`2024-05-27T07:15:09.530`)
### CVEs modified in the last Commit ### CVEs modified in the last Commit

View File

@ -245428,6 +245428,7 @@ CVE-2024-26283,0,0,c7426af4f72de6bd8169b87f55aaf0821db59807c5f80e4d23e5063ce2590
CVE-2024-26284,0,0,f79dc1c634537120e378ab4b0514a9846d07e853714505b28d8ffc47ff6035fc,2024-02-22T19:07:27.197000 CVE-2024-26284,0,0,f79dc1c634537120e378ab4b0514a9846d07e853714505b28d8ffc47ff6035fc,2024-02-22T19:07:27.197000
CVE-2024-26287,0,0,c39408b47e386d860866dbaf91481bf6cc5c7b2fdab909e591b6b072220a00ce,2024-02-22T12:15:46.420000 CVE-2024-26287,0,0,c39408b47e386d860866dbaf91481bf6cc5c7b2fdab909e591b6b072220a00ce,2024-02-22T12:15:46.420000
CVE-2024-26288,0,0,d09d5769f2845cca860d6607c437523a6856a9ad896646c33e831fd58d53d7c6,2024-03-12T12:40:13.500000 CVE-2024-26288,0,0,d09d5769f2845cca860d6607c437523a6856a9ad896646c33e831fd58d53d7c6,2024-03-12T12:40:13.500000
CVE-2024-26289,1,1,8f5a75fca4d7dd9cde27b895beee3de29dbe3741928bd7153c68659165c1f576,2024-05-27T07:15:08.807000
CVE-2024-2629,0,0,4b7ef148c53e03230aadc0d4dc17e5a892bccf176cf56d9e83cf2cfc553954c2,2024-04-01T15:23:21.117000 CVE-2024-2629,0,0,4b7ef148c53e03230aadc0d4dc17e5a892bccf176cf56d9e83cf2cfc553954c2,2024-04-01T15:23:21.117000
CVE-2024-26294,0,0,8f2653a28865ca804b8370948c9e7d3e637353d4b46577fce92b2448c794af47,2024-02-28T14:06:45.783000 CVE-2024-26294,0,0,8f2653a28865ca804b8370948c9e7d3e637353d4b46577fce92b2448c794af47,2024-02-28T14:06:45.783000
CVE-2024-26295,0,0,65ee85dc804537ea0b26ffe740c08dea57534a215c648fbb89367faf852ebc5e,2024-02-28T14:06:45.783000 CVE-2024-26295,0,0,65ee85dc804537ea0b26ffe740c08dea57534a215c648fbb89367faf852ebc5e,2024-02-28T14:06:45.783000
@ -246234,6 +246235,7 @@ CVE-2024-27308,0,0,2c1853ceb0d45fb092e9c133d6553571b7b9f8a855fc6b4950edbdaad5952
CVE-2024-27309,0,0,4ff276f1fa3a42e9cba86006da159d603e23baa66b2db98c085aa5a6c3adaee2,2024-05-01T18:15:15.967000 CVE-2024-27309,0,0,4ff276f1fa3a42e9cba86006da159d603e23baa66b2db98c085aa5a6c3adaee2,2024-05-01T18:15:15.967000
CVE-2024-2731,0,0,7242593ba3e5c5b48a25383d38b7647a4613c0186c7dc999e27ef7b770a540e3,2024-04-10T19:49:51.183000 CVE-2024-2731,0,0,7242593ba3e5c5b48a25383d38b7647a4613c0186c7dc999e27ef7b770a540e3,2024-04-10T19:49:51.183000
CVE-2024-27312,0,0,03b9c1d615c7eea419258607ab4327a45a73e24a5e571b82ecc5b8d0b7dc264a,2024-05-20T15:17:54.513000 CVE-2024-27312,0,0,03b9c1d615c7eea419258607ab4327a45a73e24a5e571b82ecc5b8d0b7dc264a,2024-05-20T15:17:54.513000
CVE-2024-27314,1,1,ac1493e462403a46c12e85e6796125c8ed735dacb926ca788dd0b7320e8a9447,2024-05-27T07:15:09.297000
CVE-2024-27315,0,0,1b06bd54abb4ee7969c3aca53e6bed402762ed42c4492d0ee8674e3fa0b42312,2024-02-28T15:15:09.670000 CVE-2024-27315,0,0,1b06bd54abb4ee7969c3aca53e6bed402762ed42c4492d0ee8674e3fa0b42312,2024-02-28T15:15:09.670000
CVE-2024-27316,0,0,42d27b12e519cd2645cf692e286d8fde89efcbae83d79644c67975e4ec7fea81,2024-05-01T18:15:16.023000 CVE-2024-27316,0,0,42d27b12e519cd2645cf692e286d8fde89efcbae83d79644c67975e4ec7fea81,2024-05-01T18:15:16.023000
CVE-2024-27317,0,0,c3dded617afb79b595cc5394bc34fa2395e63ed9fe33b66ba0cb8f90b0b09bad,2024-05-01T18:15:16.097000 CVE-2024-27317,0,0,c3dded617afb79b595cc5394bc34fa2395e63ed9fe33b66ba0cb8f90b0b09bad,2024-05-01T18:15:16.097000
@ -250442,8 +250444,8 @@ CVE-2024-3525,0,0,d160b9aacf64da3afa7deea3824b335adab6f10a287b9b570340cfda8c91ff
CVE-2024-3526,0,0,7aa053534daa29503e740ad77b77cb47be1c8cd5e2a6b1d98f33dcb689c14e4e,2024-05-17T02:39:59.067000 CVE-2024-3526,0,0,7aa053534daa29503e740ad77b77cb47be1c8cd5e2a6b1d98f33dcb689c14e4e,2024-05-17T02:39:59.067000
CVE-2024-3528,0,0,12c1cd3d931c23013d321f77d84374875132cb3a519f997e82936b57d5eb40c0,2024-05-17T02:39:59.157000 CVE-2024-3528,0,0,12c1cd3d931c23013d321f77d84374875132cb3a519f997e82936b57d5eb40c0,2024-05-17T02:39:59.157000
CVE-2024-3529,0,0,a5064dfdb29cc291d331e7cb349f1ad4d7941de74c2bc68b73712d362eb35016,2024-05-17T02:39:59.247000 CVE-2024-3529,0,0,a5064dfdb29cc291d331e7cb349f1ad4d7941de74c2bc68b73712d362eb35016,2024-05-17T02:39:59.247000
CVE-2024-35291,1,1,a3d5b12307b63ea94946a3e2606f8b88d1d11c12b2225a7b8a5ddfab5295e490,2024-05-27T05:15:08.750000 CVE-2024-35291,0,0,a3d5b12307b63ea94946a3e2606f8b88d1d11c12b2225a7b8a5ddfab5295e490,2024-05-27T05:15:08.750000
CVE-2024-35297,1,1,e360861fe1667d91be7d69a5bb5a77bf18c59a0b9349b049c420eca76e721d5d,2024-05-27T05:15:09.617000 CVE-2024-35297,0,0,e360861fe1667d91be7d69a5bb5a77bf18c59a0b9349b049c420eca76e721d5d,2024-05-27T05:15:09.617000
CVE-2024-35299,0,0,3e4e645ea2334a2d70a8ac0e5a235ab378675ad9f04d95540b17d9c98a4ac10a,2024-05-16T13:03:05.353000 CVE-2024-35299,0,0,3e4e645ea2334a2d70a8ac0e5a235ab378675ad9f04d95540b17d9c98a4ac10a,2024-05-16T13:03:05.353000
CVE-2024-3530,0,0,e12d930d34076470c73bc5005c248ade707b9149f13bae62cf727f0aa959148f,2024-05-17T02:39:59.340000 CVE-2024-3530,0,0,e12d930d34076470c73bc5005c248ade707b9149f13bae62cf727f0aa959148f,2024-05-17T02:39:59.340000
CVE-2024-35300,0,0,c9948d6a23b607dc905f5cedb43ddb5e762c784721f0ec88d5b26fbba2ccfab0,2024-05-16T13:03:05.353000 CVE-2024-35300,0,0,c9948d6a23b607dc905f5cedb43ddb5e762c784721f0ec88d5b26fbba2ccfab0,2024-05-16T13:03:05.353000
@ -250816,7 +250818,7 @@ CVE-2024-3631,0,0,52e896a80c9b063fda6224c04771bbd75f72f78e3d3636ccff4bb724fd1661
CVE-2024-3634,0,0,940ae4dd6e92f9452379e49ccdcd29aa6fe6e9bda25faf9f7045c78090371ae8,2024-05-15T16:40:19.330000 CVE-2024-3634,0,0,940ae4dd6e92f9452379e49ccdcd29aa6fe6e9bda25faf9f7045c78090371ae8,2024-05-15T16:40:19.330000
CVE-2024-36361,0,0,f38f7877ee2fdf122f5bc8d2352bd0aed642365f6f8794612d7f1076f7aeed30,2024-05-24T13:03:05.093000 CVE-2024-36361,0,0,f38f7877ee2fdf122f5bc8d2352bd0aed642365f6f8794612d7f1076f7aeed30,2024-05-24T13:03:05.093000
CVE-2024-3637,0,0,e0d8ef5f7498633f88592f7b832da01e95be5d925cdaa67450761833b0152a3c,2024-05-03T12:48:41.067000 CVE-2024-3637,0,0,e0d8ef5f7498633f88592f7b832da01e95be5d925cdaa67450761833b0152a3c,2024-05-03T12:48:41.067000
CVE-2024-36384,1,1,a0d79da3fdcabd7b9bb7cff9348fa87578adddb020086454394ad176d2bb39e2,2024-05-27T04:15:09.143000 CVE-2024-36384,0,0,a0d79da3fdcabd7b9bb7cff9348fa87578adddb020086454394ad176d2bb39e2,2024-05-27T04:15:09.143000
CVE-2024-3640,0,0,abbf5a33cbca708fe19710dda7a796491ae1d1614e9cd03f43d6cddef8b09500,2024-05-17T18:36:31.297000 CVE-2024-3640,0,0,abbf5a33cbca708fe19710dda7a796491ae1d1614e9cd03f43d6cddef8b09500,2024-05-17T18:36:31.297000
CVE-2024-3641,0,0,c281de95cce057acff2793609e8f843aad579a2f0257c0c2e0b6442733e87b14,2024-05-16T13:03:05.353000 CVE-2024-3641,0,0,c281de95cce057acff2793609e8f843aad579a2f0257c0c2e0b6442733e87b14,2024-05-16T13:03:05.353000
CVE-2024-3642,0,0,bbed1ee941355da6f32a6eba37e95a843dd7913c7dd227d8da7f65dcb683674b,2024-05-16T13:03:05.353000 CVE-2024-3642,0,0,bbed1ee941355da6f32a6eba37e95a843dd7913c7dd227d8da7f65dcb683674b,2024-05-16T13:03:05.353000
@ -251042,7 +251044,9 @@ CVE-2024-3928,0,0,537f117f8c3572d036e1aa43e9ee1a226723d4a5980268ff58c8876839ea31
CVE-2024-3929,0,0,31d0a734bfd88727a2a61deb7a29595ac9c8ac4a930ee35c31639990489d025d,2024-04-25T13:18:13.537000 CVE-2024-3929,0,0,31d0a734bfd88727a2a61deb7a29595ac9c8ac4a930ee35c31639990489d025d,2024-04-25T13:18:13.537000
CVE-2024-3931,0,0,e22ac9b330de34ffd0826895a71fc25f4c0d9f18776ea985f00f3d672117685b,2024-05-17T02:40:11.813000 CVE-2024-3931,0,0,e22ac9b330de34ffd0826895a71fc25f4c0d9f18776ea985f00f3d672117685b,2024-05-17T02:40:11.813000
CVE-2024-3932,0,0,c0d9a67b2c517f2563118cc1f9a01d2e8e41cb18884f915915898eddf3b5dc57,2024-05-17T02:40:11.913000 CVE-2024-3932,0,0,c0d9a67b2c517f2563118cc1f9a01d2e8e41cb18884f915915898eddf3b5dc57,2024-05-17T02:40:11.913000
CVE-2024-3933,1,1,608bf955e7e3afdfd756e7d44d97ddce9b13554752f96d8cc087de14653bf09f,2024-05-27T06:15:09.367000
CVE-2024-3936,0,0,1a9ebdb5653b792bdb8abb0138184d539d6d0e0c9af8da519de630a92cc0aee0,2024-05-02T18:00:37.360000 CVE-2024-3936,0,0,1a9ebdb5653b792bdb8abb0138184d539d6d0e0c9af8da519de630a92cc0aee0,2024-05-02T18:00:37.360000
CVE-2024-3939,1,1,1004bf05e633d82b8a6f77e8ce101817a3c5f89effd6fa890cec55ae112b10ad,2024-05-27T06:15:09.733000
CVE-2024-3940,0,0,52f7bf6d70193ddf6b45db8d32585f84af1f44b7487d20897766e34b437b8581,2024-05-14T16:11:39.510000 CVE-2024-3940,0,0,52f7bf6d70193ddf6b45db8d32585f84af1f44b7487d20897766e34b437b8581,2024-05-14T16:11:39.510000
CVE-2024-3941,0,0,3315566f834adaa65bc779c72609390662785ebcc4aac50a6cb30731cb96d90c,2024-05-14T16:11:39.510000 CVE-2024-3941,0,0,3315566f834adaa65bc779c72609390662785ebcc4aac50a6cb30731cb96d90c,2024-05-14T16:11:39.510000
CVE-2024-3942,0,0,e822d69f7c80cdc7914f6c6d228f749a2878411b19bb34f624a4ef0b72687edf,2024-05-02T18:00:37.360000 CVE-2024-3942,0,0,e822d69f7c80cdc7914f6c6d228f749a2878411b19bb34f624a4ef0b72687edf,2024-05-02T18:00:37.360000
@ -251395,6 +251399,13 @@ CVE-2024-4525,0,0,81bd3a31a3c4a81aa703e7d72da0991ec9963fc2a8e8ef88d231cff9f6e1a6
CVE-2024-4526,0,0,ee6465488f566257f8056f9d367cdaf90969462b9cc42af44c48f971f9f329ef,2024-05-17T02:40:27.837000 CVE-2024-4526,0,0,ee6465488f566257f8056f9d367cdaf90969462b9cc42af44c48f971f9f329ef,2024-05-17T02:40:27.837000
CVE-2024-4527,0,0,40c2edc0e3fc8765d50aab05ebe93e0491c6359e480ffebabfe9415feba30234,2024-05-17T02:40:27.927000 CVE-2024-4527,0,0,40c2edc0e3fc8765d50aab05ebe93e0491c6359e480ffebabfe9415feba30234,2024-05-17T02:40:27.927000
CVE-2024-4528,0,0,4c65481daa9c96787216a8b3f047a2879ace4bcfe57b75dc61cc4f940018d649,2024-05-17T02:40:28.020000 CVE-2024-4528,0,0,4c65481daa9c96787216a8b3f047a2879ace4bcfe57b75dc61cc4f940018d649,2024-05-17T02:40:28.020000
CVE-2024-4529,1,1,e49ba15798dd8b824b0a7d792cccb4816c7e8f5c9ff64bdb3790e8bebf225c13,2024-05-27T06:15:09.840000
CVE-2024-4530,1,1,d7163540f5fcb4a1695fd4125b056fb2456dc62fddf701bf3ebf3d2284945ec8,2024-05-27T06:15:09.927000
CVE-2024-4531,1,1,1ed7aa241d5c809c947f2029a4e7ba549d86a295d139ac83d7b027c5d7559e82,2024-05-27T06:15:10.017000
CVE-2024-4532,1,1,79b4cdc6d7f3c5d544e8ed5f8ced908d39fe88eb79c668592ba0ac7322cf638f,2024-05-27T06:15:10.100000
CVE-2024-4533,1,1,bab2beec0846103019a97fa614a0e6e2fdb9949357ed4e5e2eb3a7c3012b03fc,2024-05-27T06:15:10.283000
CVE-2024-4534,1,1,5291f105d670796a5e740275bf99c356379be737eb16b81f04f22f20a1f7edba,2024-05-27T06:15:10.423000
CVE-2024-4535,1,1,d445951b0e53dd340fb4505b31c23d298c6010f0cde71cc5f7ea1252bbff88dd,2024-05-27T06:15:10.520000
CVE-2024-4536,0,0,6d02ed0759b0f2029154ac1e9fa623fe4e250972d7d12c9e4f8d0247100613d5,2024-05-07T13:39:32.710000 CVE-2024-4536,0,0,6d02ed0759b0f2029154ac1e9fa623fe4e250972d7d12c9e4f8d0247100613d5,2024-05-07T13:39:32.710000
CVE-2024-4537,0,0,bc82aa6954c5799b0476dc279149a81ab940e42aa35e918500f89f663af922c5,2024-05-07T13:39:32.710000 CVE-2024-4537,0,0,bc82aa6954c5799b0476dc279149a81ab940e42aa35e918500f89f663af922c5,2024-05-07T13:39:32.710000
CVE-2024-4538,0,0,dbb952ff57fc82a37e26bc4eac10a9f198285e190e0ce1d17eb40564657c4b33,2024-05-07T13:39:32.710000 CVE-2024-4538,0,0,dbb952ff57fc82a37e26bc4eac10a9f198285e190e0ce1d17eb40564657c4b33,2024-05-07T13:39:32.710000
@ -251840,4 +251851,6 @@ CVE-2024-5394,0,0,537bb898c77df0519c24f9f1263831287dc2feb6fe05007fed2482e0ced321
CVE-2024-5395,0,0,f154f3c924c46a245ea427b3f229e3a073afff7418f39b61c0609f592714797a,2024-05-27T03:15:08.370000 CVE-2024-5395,0,0,f154f3c924c46a245ea427b3f229e3a073afff7418f39b61c0609f592714797a,2024-05-27T03:15:08.370000
CVE-2024-5396,0,0,e9f88811caa549baff5b3a6d103ce0530ca526bf72b174c586ccd5552f6e4a10,2024-05-27T03:15:08.650000 CVE-2024-5396,0,0,e9f88811caa549baff5b3a6d103ce0530ca526bf72b174c586ccd5552f6e4a10,2024-05-27T03:15:08.650000
CVE-2024-5397,0,0,127f0e4aebb20af982b9f8f3c5e3c610f094604b0e4dbcdf747a9ca9a9d17d0c,2024-05-27T03:15:08.923000 CVE-2024-5397,0,0,127f0e4aebb20af982b9f8f3c5e3c610f094604b0e4dbcdf747a9ca9a9d17d0c,2024-05-27T03:15:08.923000
CVE-2024-5399,1,1,11939ed21acc3c5ec586746ddde14b797a390e121836283682232169079970b5,2024-05-27T04:15:09.300000 CVE-2024-5399,0,0,11939ed21acc3c5ec586746ddde14b797a390e121836283682232169079970b5,2024-05-27T04:15:09.300000
CVE-2024-5400,1,1,3934e126a75210a22708febe3829ce6c46f46cc7e12a3a7182ec01f8e6ac35ad,2024-05-27T06:15:10.620000
CVE-2024-5403,1,1,ed1d166ca6bf87c091bd718e3e0b00502f1d612d8d3d042e4dc422513dd0bdef,2024-05-27T07:15:09.530000

Can't render this file because it is too large.