Auto-Update: 2024-05-23T23:55:30.455594+00:00

This commit is contained in:
cad-safe-bot 2024-05-23 23:58:21 +00:00
parent 1379c11577
commit 5b88b22b07
21 changed files with 1106 additions and 113 deletions

View File

@ -2,54 +2,14 @@
"id": "CVE-2023-20239",
"sourceIdentifier": "ykramarz@cisco.com",
"published": "2024-05-22T17:16:02.760",
"lastModified": "2024-05-22T18:59:20.240",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-05-23T22:15:11.543",
"vulnStatus": "Rejected",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability in the web-based management interface of Cisco Firepower Management Center (FMC) Software could allow an authenticated, remote attacker to conduct SQL injection attacks on an affected system. This vulnerability exists because the web-based management interface does not adequately validate user input. An attacker could exploit this vulnerability by authenticating to the application and sending crafted SQL queries to an affected system. A successful exploit could allow the attacker to obtain any data from the database, execute arbitrary commands on the underlying operating system, and elevate privileges to root. To exploit this vulnerability, an attacker would need at least Read Only user credentials."
"value": "Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "ykramarz@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "ykramarz@cisco.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-sqli-WFFDnNOs",
"source": "ykramarz@cisco.com"
}
]
"metrics": {},
"references": []
}

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2024-5227",
"sourceIdentifier": "zdi-disclosures@trendmicro.com",
"published": "2024-05-23T22:15:12.727",
"lastModified": "2024-05-23T22:15:12.727",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "TP-Link Omada ER605 PPTP VPN username Command Injection Remote Code Execution Vulnerability. This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of TP-Link Omada ER605 routers. Authentication is not required to exploit this vulnerability. However, devices are only vulnerable if configured to use a PPTP VPN with LDAP authentication.\n\nThe specific flaw exists within the handling of the username parameter provided to the /usr/bin/pppd endpoint. The issue results from the lack of proper validation of a user-supplied string before using it to execute a system call. An attacker can leverage this vulnerability to execute code in the context of root. Was ZDI-CAN-22446."
}
],
"metrics": {
"cvssMetricV30": [
{
"source": "zdi-disclosures@trendmicro.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "ADJACENT_NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.6,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "zdi-disclosures@trendmicro.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-78"
}
]
}
],
"references": [
{
"url": "https://www.zerodayinitiative.com/advisories/ZDI-24-499/",
"source": "zdi-disclosures@trendmicro.com"
}
]
}

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2024-5228",
"sourceIdentifier": "zdi-disclosures@trendmicro.com",
"published": "2024-05-23T22:15:13.047",
"lastModified": "2024-05-23T22:15:13.047",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "TP-Link Omada ER605 Comexe DDNS Response Handling Heap-based Buffer Overflow Remote Code Execution Vulnerability. This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of TP-Link Omada ER605 routers. Authentication is not required to exploit this vulnerability. However, devices are vulnerable only if configured to use the Comexe DDNS service.\n\nThe specific flaw exists within the handling of DNS responses. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length heap-based buffer. An attacker can leverage this vulnerability to execute code in the context of root. Was ZDI-CAN-22383."
}
],
"metrics": {
"cvssMetricV30": [
{
"source": "zdi-disclosures@trendmicro.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "ADJACENT_NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.6,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "zdi-disclosures@trendmicro.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-122"
}
]
}
],
"references": [
{
"url": "https://www.zerodayinitiative.com/advisories/ZDI-24-500/",
"source": "zdi-disclosures@trendmicro.com"
}
]
}

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2024-5242",
"sourceIdentifier": "zdi-disclosures@trendmicro.com",
"published": "2024-05-23T22:15:13.310",
"lastModified": "2024-05-23T22:15:13.310",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "TP-Link Omada ER605 Stack-based Buffer Overflow Remote Code Execution Vulnerability. This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of TP-Link Omada ER605 routers. Authentication is not required to exploit this vulnerability. However, devices are vulnerable only if configured to use the Comexe DDNS service.\n\nThe specific flaw exists within the handling of DDNS error codes. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length stack-based buffer. An attacker can leverage this vulnerability to execute code in the context of root. Was ZDI-CAN-22522."
}
],
"metrics": {
"cvssMetricV30": [
{
"source": "zdi-disclosures@trendmicro.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "ADJACENT_NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.6,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "zdi-disclosures@trendmicro.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-121"
}
]
}
],
"references": [
{
"url": "https://www.zerodayinitiative.com/advisories/ZDI-24-501/",
"source": "zdi-disclosures@trendmicro.com"
}
]
}

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2024-5243",
"sourceIdentifier": "zdi-disclosures@trendmicro.com",
"published": "2024-05-23T22:15:13.503",
"lastModified": "2024-05-23T22:15:13.503",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "TP-Link Omada ER605 Buffer Overflow Remote Code Execution Vulnerability. This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of TP-Link Omada ER605 routers. Authentication is not required to exploit this vulnerability. However, devices are vulnerable only if configured to use the Comexe DDNS service.\n\nThe specific flaw exists within the handling of DNS names. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a buffer. An attacker can leverage this vulnerability to execute code in the context of root. Was ZDI-CAN-22523."
}
],
"metrics": {
"cvssMetricV30": [
{
"source": "zdi-disclosures@trendmicro.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "ADJACENT_NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.6,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "zdi-disclosures@trendmicro.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-120"
}
]
}
],
"references": [
{
"url": "https://www.zerodayinitiative.com/advisories/ZDI-24-502/",
"source": "zdi-disclosures@trendmicro.com"
}
]
}

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2024-5244",
"sourceIdentifier": "zdi-disclosures@trendmicro.com",
"published": "2024-05-23T22:15:13.777",
"lastModified": "2024-05-23T22:15:13.777",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "TP-Link Omada ER605 Reliance on Security Through Obscurity Vulnerability. This vulnerability allows network-adjacent attackers to access or spoof DDNS messages on affected installations of TP-Link Omada ER605 routers. Authentication is not required to exploit this vulnerability. However, devices are vulnerable only if configured to use the Comexe DDNS service.\n\nThe specific flaw exists within the cmxddnsd executable. The issue results from reliance on obscurity to secure network data. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of root. Was ZDI-CAN-22439."
}
],
"metrics": {
"cvssMetricV30": [
{
"source": "zdi-disclosures@trendmicro.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L",
"attackVector": "ADJACENT_NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW",
"baseScore": 5.0,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.6,
"impactScore": 3.4
}
]
},
"weaknesses": [
{
"source": "zdi-disclosures@trendmicro.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-656"
}
]
}
],
"references": [
{
"url": "https://www.zerodayinitiative.com/advisories/ZDI-24-503/",
"source": "zdi-disclosures@trendmicro.com"
}
]
}

View File

@ -0,0 +1,59 @@
{
"id": "CVE-2024-5245",
"sourceIdentifier": "zdi-disclosures@trendmicro.com",
"published": "2024-05-23T22:15:13.980",
"lastModified": "2024-05-23T22:15:13.980",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "NETGEAR ProSAFE Network Management System Default Credentials Local Privilege Escalation Vulnerability. This vulnerability allows local attackers to escalate privileges on affected installations of NETGEAR ProSAFE Network Management System. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.\n\nThe specific flaw exists within the product installer. The issue results from the use of default MySQL credentials. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of SYSTEM. Was ZDI-CAN-22755."
}
],
"metrics": {
"cvssMetricV30": [
{
"source": "zdi-disclosures@trendmicro.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "zdi-disclosures@trendmicro.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-1392"
}
]
}
],
"references": [
{
"url": "https://kb.netgear.com/000066164/Security-Advisory-for-Multiple-Vulnerabilities-on-the-NMS300-PSV-2024-0003-PSV-2024-0004",
"source": "zdi-disclosures@trendmicro.com"
},
{
"url": "https://www.zerodayinitiative.com/advisories/ZDI-24-496/",
"source": "zdi-disclosures@trendmicro.com"
}
]
}

View File

@ -0,0 +1,47 @@
{
"id": "CVE-2024-5246",
"sourceIdentifier": "zdi-disclosures@trendmicro.com",
"published": "2024-05-23T22:15:14.200",
"lastModified": "2024-05-23T22:15:14.200",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "NETGEAR ProSAFE Network Management System Tomcat Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of NETGEAR ProSAFE Network Management System. Authentication is required to exploit this vulnerability.\n\nThe specific flaw exists within the product installer. The issue results from the use of a vulnerable version of Apache Tomcat. An attacker can leverage this vulnerability to execute code in the context of SYSTEM. Was ZDI-CAN-22868."
}
],
"metrics": {
"cvssMetricV30": [
{
"source": "zdi-disclosures@trendmicro.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
]
},
"references": [
{
"url": "https://kb.netgear.com/000066164/Security-Advisory-for-Multiple-Vulnerabilities-on-the-NMS300-PSV-2024-0003-PSV-2024-0004",
"source": "zdi-disclosures@trendmicro.com"
},
{
"url": "https://www.zerodayinitiative.com/advisories/ZDI-24-497/",
"source": "zdi-disclosures@trendmicro.com"
}
]
}

View File

@ -0,0 +1,59 @@
{
"id": "CVE-2024-5247",
"sourceIdentifier": "zdi-disclosures@trendmicro.com",
"published": "2024-05-23T22:15:14.387",
"lastModified": "2024-05-23T22:15:14.387",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "NETGEAR ProSAFE Network Management System UpLoadServlet Unrestricted File Upload Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of NETGEAR ProSAFE Network Management System. Authentication is required to exploit this vulnerability.\n\nThe specific flaw exists within the UpLoadServlet class. The issue results from the lack of proper validation of user-supplied data, which can allow the upload of arbitrary files. An attacker can leverage this vulnerability to execute code in the context of SYSTEM. Was ZDI-CAN-22923."
}
],
"metrics": {
"cvssMetricV30": [
{
"source": "zdi-disclosures@trendmicro.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "zdi-disclosures@trendmicro.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-434"
}
]
}
],
"references": [
{
"url": "https://kb.netgear.com/000066165/Security-Advisory-for-Missing-Function-Level-Access-Control-on-the-NMS300-PSV-2024-0005",
"source": "zdi-disclosures@trendmicro.com"
},
{
"url": "https://www.zerodayinitiative.com/advisories/ZDI-24-498/",
"source": "zdi-disclosures@trendmicro.com"
}
]
}

View File

@ -0,0 +1,88 @@
{
"id": "CVE-2024-5279",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-05-23T23:15:14.633",
"lastModified": "2024-05-23T23:15:14.633",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was found in Qiwen Netdisk up to 1.4.0. It has been declared as problematic. Affected by this vulnerability is an unknown functionality of the component File Rename Handler. The manipulation with the input <img src=\"\" onerror=\"alert(document.cookie)\"> leads to cross site scripting. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-266083."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 3.5,
"baseSeverity": "LOW"
},
"exploitabilityScore": 2.1,
"impactScore": 1.4
}
],
"cvssMetricV2": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:S/C:N/I:P/A:N",
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "SINGLE",
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"availabilityImpact": "NONE",
"baseScore": 4.0
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 8.0,
"impactScore": 2.9,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://gitee.com/qiwen-cloud/qiwen-file/issues/I8W3H2",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?ctiid.266083",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?id.266083",
"source": "cna@vuldb.com"
}
]
}

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2024-5291",
"sourceIdentifier": "zdi-disclosures@trendmicro.com",
"published": "2024-05-23T22:15:14.580",
"lastModified": "2024-05-23T22:15:14.580",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "D-Link DIR-2150 GetDeviceSettings Target Command Injection Remote Code Execution Vulnerability. This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of D-Link DIR-2150 routers. Authentication is not required to exploit this vulnerability.\n\nThe specific flaw exists within the SOAP API interface, which listens on TCP port 80 by default. The issue results from the lack of proper validation of a user-supplied string before using it to execute a system call. An attacker can leverage this vulnerability to execute code in the context of root. Was ZDI-CAN-21235."
}
],
"metrics": {
"cvssMetricV30": [
{
"source": "zdi-disclosures@trendmicro.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "ADJACENT_NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "zdi-disclosures@trendmicro.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-78"
}
]
}
],
"references": [
{
"url": "https://www.zerodayinitiative.com/advisories/ZDI-24-442/",
"source": "zdi-disclosures@trendmicro.com"
}
]
}

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2024-5292",
"sourceIdentifier": "zdi-disclosures@trendmicro.com",
"published": "2024-05-23T22:15:14.780",
"lastModified": "2024-05-23T22:15:14.780",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "D-Link Network Assistant Uncontrolled Search Path Element Local Privilege Escalation Vulnerability. This vulnerability allows local attackers to escalate privileges on affected installations of D-Link Network Assistant. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.\n\nThe specific flaw exists within the DNACore service. The service loads a file from an unsecured location. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of SYSTEM. Was ZDI-CAN-21426."
}
],
"metrics": {
"cvssMetricV30": [
{
"source": "zdi-disclosures@trendmicro.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.3,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.3,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "zdi-disclosures@trendmicro.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-427"
}
]
}
],
"references": [
{
"url": "https://www.zerodayinitiative.com/advisories/ZDI-24-443/",
"source": "zdi-disclosures@trendmicro.com"
}
]
}

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2024-5293",
"sourceIdentifier": "zdi-disclosures@trendmicro.com",
"published": "2024-05-23T22:15:15.000",
"lastModified": "2024-05-23T22:15:15.000",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "D-Link DIR-2640 HTTP Referer Stack-Based Buffer Overflow Remote Code Execution Vulnerability. This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of D-Link DIR-2640-US routers. Authentication is not required to exploit this vulnerability.\n\nThe specific flaw exists within prog.cgi, which handles HNAP requests made to the lighttpd webserver listening on TCP ports 80 and 443. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length stack-based buffer. An attacker can leverage this vulnerability to execute code in the context of root. Was ZDI-CAN-21853."
}
],
"metrics": {
"cvssMetricV30": [
{
"source": "zdi-disclosures@trendmicro.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "ADJACENT_NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "zdi-disclosures@trendmicro.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-121"
}
]
}
],
"references": [
{
"url": "https://www.zerodayinitiative.com/advisories/ZDI-24-444/",
"source": "zdi-disclosures@trendmicro.com"
}
]
}

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2024-5294",
"sourceIdentifier": "zdi-disclosures@trendmicro.com",
"published": "2024-05-23T22:15:15.213",
"lastModified": "2024-05-23T22:15:15.213",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "D-Link DIR-3040 prog.cgi websSecurityHandler Memory Leak Denial-of-Service Vulnerability. This vulnerability allows network-adjacent attackers to create a denial-of-service condition on affected installations of D-Link DIR-3040 routers. Authentication is not required to exploit this vulnerability.\n\nThe specific flaw exists within the prog.cgi program, which handles HNAP requests made to the lighttpd webserver listening on ports 80 and 443. The issue results from the lack of proper memory management when processing HTTP cookie values. An attacker can leverage this vulnerability to create a denial-of-service condition on the system.\n. Was ZDI-CAN-21668."
}
],
"metrics": {
"cvssMetricV30": [
{
"source": "zdi-disclosures@trendmicro.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"attackVector": "ADJACENT_NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "LOW",
"baseScore": 4.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "zdi-disclosures@trendmicro.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-401"
}
]
}
],
"references": [
{
"url": "https://www.zerodayinitiative.com/advisories/ZDI-24-445/",
"source": "zdi-disclosures@trendmicro.com"
}
]
}

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2024-5295",
"sourceIdentifier": "zdi-disclosures@trendmicro.com",
"published": "2024-05-23T22:15:15.420",
"lastModified": "2024-05-23T22:15:15.420",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "D-Link G416 flupl self Command Injection Remote Code Execution Vulnerability. This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of D-Link G416 wireless routers. Authentication is not required to exploit this vulnerability.\n\nThe specific flaw exists within the HTTP service listening on TCP port 80. The issue results from the lack of proper validation of a user-supplied string before using it to execute a system call. An attacker can leverage this vulnerability to execute code in the context of root. Was ZDI-CAN-21294."
}
],
"metrics": {
"cvssMetricV30": [
{
"source": "zdi-disclosures@trendmicro.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "ADJACENT_NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "zdi-disclosures@trendmicro.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-78"
}
]
}
],
"references": [
{
"url": "https://www.zerodayinitiative.com/advisories/ZDI-24-446/",
"source": "zdi-disclosures@trendmicro.com"
}
]
}

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2024-5296",
"sourceIdentifier": "zdi-disclosures@trendmicro.com",
"published": "2024-05-23T22:15:15.617",
"lastModified": "2024-05-23T22:15:15.617",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "D-Link D-View Use of Hard-coded Cryptographic Key Authentication Bypass Vulnerability. This vulnerability allows remote attackers to bypass authentication on affected installations of D-Link D-View. Authentication is not required to exploit this vulnerability.\n\nThe specific flaw exists within the TokenUtils class. The issue results from a hard-coded cryptographic key. An attacker can leverage this vulnerability to bypass authentication on the system. Was ZDI-CAN-21991."
}
],
"metrics": {
"cvssMetricV30": [
{
"source": "zdi-disclosures@trendmicro.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "zdi-disclosures@trendmicro.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-321"
}
]
}
],
"references": [
{
"url": "https://www.zerodayinitiative.com/advisories/ZDI-24-447/",
"source": "zdi-disclosures@trendmicro.com"
}
]
}

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2024-5297",
"sourceIdentifier": "zdi-disclosures@trendmicro.com",
"published": "2024-05-23T22:15:15.890",
"lastModified": "2024-05-23T22:15:15.890",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "D-Link D-View executeWmicCmd Command Injection Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of D-Link D-View. Although authentication is required to exploit this vulnerability, the existing authentication mechanism can be bypassed.\n\nThe specific flaw exists within the executeWmicCmd method. The issue results from the lack of proper validation of a user-supplied string before using it to execute a system call. An attacker can leverage this vulnerability to execute code in the context of root. Was ZDI-CAN-21821."
}
],
"metrics": {
"cvssMetricV30": [
{
"source": "zdi-disclosures@trendmicro.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "zdi-disclosures@trendmicro.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-78"
}
]
}
],
"references": [
{
"url": "https://www.zerodayinitiative.com/advisories/ZDI-24-448/",
"source": "zdi-disclosures@trendmicro.com"
}
]
}

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2024-5298",
"sourceIdentifier": "zdi-disclosures@trendmicro.com",
"published": "2024-05-23T22:15:16.107",
"lastModified": "2024-05-23T22:15:16.107",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "D-Link D-View queryDeviceCustomMonitorResult Exposed Dangerous Method Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of D-Link D-View. Although authentication is required to exploit this vulnerability, the existing authentication mechanism can be bypassed.\n\nThe specific flaw exists within the queryDeviceCustomMonitorResult method. The issue results from an exposed dangerous method. An attacker can leverage this vulnerability to execute code in the context of root. Was ZDI-CAN-21842."
}
],
"metrics": {
"cvssMetricV30": [
{
"source": "zdi-disclosures@trendmicro.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "zdi-disclosures@trendmicro.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-749"
}
]
}
],
"references": [
{
"url": "https://www.zerodayinitiative.com/advisories/ZDI-24-449/",
"source": "zdi-disclosures@trendmicro.com"
}
]
}

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2024-5299",
"sourceIdentifier": "zdi-disclosures@trendmicro.com",
"published": "2024-05-23T22:15:16.320",
"lastModified": "2024-05-23T22:15:16.320",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "D-Link D-View execMonitorScript Exposed Dangerous Method Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of D-Link D-View. Although authentication is required to exploit this vulnerability, the existing authentication mechanism can be bypassed.\n\nThe specific flaw exists within the execMonitorScript method. The issue results from an exposed dangerous method. An attacker can leverage this vulnerability to execute code in the context of root. Was ZDI-CAN-21828."
}
],
"metrics": {
"cvssMetricV30": [
{
"source": "zdi-disclosures@trendmicro.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "zdi-disclosures@trendmicro.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-749"
}
]
}
],
"references": [
{
"url": "https://www.zerodayinitiative.com/advisories/ZDI-24-450/",
"source": "zdi-disclosures@trendmicro.com"
}
]
}

View File

@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update
```plain
2024-05-23T22:00:38.534222+00:00
2024-05-23T23:55:30.455594+00:00
```
### Most recent CVE Modification Timestamp synchronized with NVD
```plain
2024-05-23T21:05:01.570000+00:00
2024-05-23T23:15:14.633000+00:00
```
### Last Data Feed Release
@ -33,46 +33,38 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
### Total Number of included CVEs
```plain
251617
251635
```
### CVEs added in the last Commit
Recently added CVEs: `2`
Recently added CVEs: `18`
- [CVE-2024-5201](CVE-2024/CVE-2024-52xx/CVE-2024-5201.json) (`2024-05-23T20:15:09.283`)
- [CVE-2024-5202](CVE-2024/CVE-2024-52xx/CVE-2024-5202.json) (`2024-05-23T20:15:09.543`)
- [CVE-2024-5227](CVE-2024/CVE-2024-52xx/CVE-2024-5227.json) (`2024-05-23T22:15:12.727`)
- [CVE-2024-5228](CVE-2024/CVE-2024-52xx/CVE-2024-5228.json) (`2024-05-23T22:15:13.047`)
- [CVE-2024-5242](CVE-2024/CVE-2024-52xx/CVE-2024-5242.json) (`2024-05-23T22:15:13.310`)
- [CVE-2024-5243](CVE-2024/CVE-2024-52xx/CVE-2024-5243.json) (`2024-05-23T22:15:13.503`)
- [CVE-2024-5244](CVE-2024/CVE-2024-52xx/CVE-2024-5244.json) (`2024-05-23T22:15:13.777`)
- [CVE-2024-5245](CVE-2024/CVE-2024-52xx/CVE-2024-5245.json) (`2024-05-23T22:15:13.980`)
- [CVE-2024-5246](CVE-2024/CVE-2024-52xx/CVE-2024-5246.json) (`2024-05-23T22:15:14.200`)
- [CVE-2024-5247](CVE-2024/CVE-2024-52xx/CVE-2024-5247.json) (`2024-05-23T22:15:14.387`)
- [CVE-2024-5279](CVE-2024/CVE-2024-52xx/CVE-2024-5279.json) (`2024-05-23T23:15:14.633`)
- [CVE-2024-5291](CVE-2024/CVE-2024-52xx/CVE-2024-5291.json) (`2024-05-23T22:15:14.580`)
- [CVE-2024-5292](CVE-2024/CVE-2024-52xx/CVE-2024-5292.json) (`2024-05-23T22:15:14.780`)
- [CVE-2024-5293](CVE-2024/CVE-2024-52xx/CVE-2024-5293.json) (`2024-05-23T22:15:15.000`)
- [CVE-2024-5294](CVE-2024/CVE-2024-52xx/CVE-2024-5294.json) (`2024-05-23T22:15:15.213`)
- [CVE-2024-5295](CVE-2024/CVE-2024-52xx/CVE-2024-5295.json) (`2024-05-23T22:15:15.420`)
- [CVE-2024-5296](CVE-2024/CVE-2024-52xx/CVE-2024-5296.json) (`2024-05-23T22:15:15.617`)
- [CVE-2024-5297](CVE-2024/CVE-2024-52xx/CVE-2024-5297.json) (`2024-05-23T22:15:15.890`)
- [CVE-2024-5298](CVE-2024/CVE-2024-52xx/CVE-2024-5298.json) (`2024-05-23T22:15:16.107`)
- [CVE-2024-5299](CVE-2024/CVE-2024-52xx/CVE-2024-5299.json) (`2024-05-23T22:15:16.320`)
### CVEs modified in the last Commit
Recently modified CVEs: `33`
Recently modified CVEs: `1`
- [CVE-2022-48689](CVE-2022/CVE-2022-486xx/CVE-2022-48689.json) (`2024-05-23T20:33:57.590`)
- [CVE-2022-48691](CVE-2022/CVE-2022-486xx/CVE-2022-48691.json) (`2024-05-23T20:34:05.590`)
- [CVE-2022-48692](CVE-2022/CVE-2022-486xx/CVE-2022-48692.json) (`2024-05-23T20:34:02.510`)
- [CVE-2022-48693](CVE-2022/CVE-2022-486xx/CVE-2022-48693.json) (`2024-05-23T20:34:08.557`)
- [CVE-2022-48694](CVE-2022/CVE-2022-486xx/CVE-2022-48694.json) (`2024-05-23T20:34:12.060`)
- [CVE-2023-42089](CVE-2023/CVE-2023-420xx/CVE-2023-42089.json) (`2024-05-23T20:03:33.647`)
- [CVE-2023-42090](CVE-2023/CVE-2023-420xx/CVE-2023-42090.json) (`2024-05-23T20:11:59.477`)
- [CVE-2023-42091](CVE-2023/CVE-2023-420xx/CVE-2023-42091.json) (`2024-05-23T20:20:52.897`)
- [CVE-2023-42092](CVE-2023/CVE-2023-420xx/CVE-2023-42092.json) (`2024-05-23T20:21:55.943`)
- [CVE-2023-42093](CVE-2023/CVE-2023-420xx/CVE-2023-42093.json) (`2024-05-23T20:22:37.423`)
- [CVE-2023-42094](CVE-2023/CVE-2023-420xx/CVE-2023-42094.json) (`2024-05-23T20:25:14.140`)
- [CVE-2023-42095](CVE-2023/CVE-2023-420xx/CVE-2023-42095.json) (`2024-05-23T20:25:47.147`)
- [CVE-2023-42096](CVE-2023/CVE-2023-420xx/CVE-2023-42096.json) (`2024-05-23T20:26:03.157`)
- [CVE-2023-42097](CVE-2023/CVE-2023-420xx/CVE-2023-42097.json) (`2024-05-23T20:26:16.510`)
- [CVE-2024-32002](CVE-2024/CVE-2024-320xx/CVE-2024-32002.json) (`2024-05-23T20:40:28.707`)
- [CVE-2024-34905](CVE-2024/CVE-2024-349xx/CVE-2024-34905.json) (`2024-05-23T21:03:49.143`)
- [CVE-2024-34906](CVE-2024/CVE-2024-349xx/CVE-2024-34906.json) (`2024-05-23T20:42:22.080`)
- [CVE-2024-34909](CVE-2024/CVE-2024-349xx/CVE-2024-34909.json) (`2024-05-23T20:56:30.393`)
- [CVE-2024-34913](CVE-2024/CVE-2024-349xx/CVE-2024-34913.json) (`2024-05-23T20:59:34.540`)
- [CVE-2024-35972](CVE-2024/CVE-2024-359xx/CVE-2024-35972.json) (`2024-05-23T21:04:02.433`)
- [CVE-2024-35978](CVE-2024/CVE-2024-359xx/CVE-2024-35978.json) (`2024-05-23T21:04:07.447`)
- [CVE-2024-35982](CVE-2024/CVE-2024-359xx/CVE-2024-35982.json) (`2024-05-23T21:04:12.530`)
- [CVE-2024-35984](CVE-2024/CVE-2024-359xx/CVE-2024-35984.json) (`2024-05-23T21:04:17.397`)
- [CVE-2024-35990](CVE-2024/CVE-2024-359xx/CVE-2024-35990.json) (`2024-05-23T21:05:01.570`)
- [CVE-2024-35992](CVE-2024/CVE-2024-359xx/CVE-2024-35992.json) (`2024-05-23T20:33:31.133`)
- [CVE-2023-20239](CVE-2023/CVE-2023-202xx/CVE-2023-20239.json) (`2024-05-23T22:15:11.543`)
## Download and Usage

View File

@ -211900,26 +211900,26 @@ CVE-2022-48667,0,0,fea320fc30b8e20d03bd29c66176a5d330022cbe5a7c1c17bc4a9da6e49c8
CVE-2022-48668,0,0,228d489d1f34a9e09a2e0db1a8ecaeed153a7dbdd673765ef8b5cfd95f8e0655,2024-04-29T12:42:03.667000
CVE-2022-48669,0,0,924a5a271b2b1f1e2b644fe7e0386ec6c2bc9af4df977f70bde60730dd6a3160,2024-05-01T19:50:25.633000
CVE-2022-4867,0,0,df30bf033a8b71c87ccc147259fbbc1d4b447580323b889a3d7676505e257148,2023-01-06T21:26:37.597000
CVE-2022-48670,0,1,2f00d002688b586b078e34d3bbf056acf45ed73c426d1eb153fd3d7885546faf,2024-05-23T20:26:26.033000
CVE-2022-48671,0,1,345b087fdf7a29c2a22f9407913d44a46a6dcb9e2d8bc831170752c9ec2199f8,2024-05-23T20:26:32.357000
CVE-2022-48672,0,1,608a9f4bbdbfeaa5c234d43ea7d6267c5cfed6a3f49f2f595d741d22e8bb0e69,2024-05-23T20:26:40.327000
CVE-2022-48673,0,1,9605618fa7597ed94995f84a27fb057932599afff122e438d60e99636f587007,2024-05-23T20:26:54.160000
CVE-2022-48670,0,0,2f00d002688b586b078e34d3bbf056acf45ed73c426d1eb153fd3d7885546faf,2024-05-23T20:26:26.033000
CVE-2022-48671,0,0,345b087fdf7a29c2a22f9407913d44a46a6dcb9e2d8bc831170752c9ec2199f8,2024-05-23T20:26:32.357000
CVE-2022-48672,0,0,608a9f4bbdbfeaa5c234d43ea7d6267c5cfed6a3f49f2f595d741d22e8bb0e69,2024-05-23T20:26:40.327000
CVE-2022-48673,0,0,9605618fa7597ed94995f84a27fb057932599afff122e438d60e99636f587007,2024-05-23T20:26:54.160000
CVE-2022-48674,0,0,fa42813fe90b0585e3ad673a0800f86f62acc80eb213e88f44bacff6d05e9fd4,2024-05-23T19:36:25.633000
CVE-2022-48675,0,1,ffdc7ff07043ff8d904f74a8a1b71fad7bff2a559dea9c5bb178531131fc30c0,2024-05-23T20:33:42.183000
CVE-2022-48675,0,0,ffdc7ff07043ff8d904f74a8a1b71fad7bff2a559dea9c5bb178531131fc30c0,2024-05-23T20:33:42.183000
CVE-2022-4868,0,0,49bc3762269009af54870f2860cabd5c2f0372571503d002526079fe993a74bc,2023-01-06T21:20:41.477000
CVE-2022-48682,0,0,a9e8566df4d423615eab0842eba8f88c67d4de5de15c1876586d34ed294d4bbf,2024-04-26T12:58:17.720000
CVE-2022-48684,0,0,183793e4ba2f09101fce115e434fee8cb8ff9c6a4ec46d5771edf2b59c69d11d,2024-04-29T12:42:03.667000
CVE-2022-48685,0,0,ffa3e1d85b1e2d4bd3c19f046cb04890a395016777f2401ecc051ad5f33c92b4,2024-04-29T12:42:03.667000
CVE-2022-48686,0,1,ee162749a361db1a0b6a353b0eb61f9a34a852517c7d84ecd41264480ae7864b,2024-05-23T20:33:45.640000
CVE-2022-48687,0,1,154cc9d9f32ec8b0f10de1628955ee37a741d3f226440d234da62eb278afefe6,2024-05-23T20:33:49.117000
CVE-2022-48688,0,1,2b696539b728bee97e44de8c598ffc8f476d756e332df2a283fc8a9074238df0,2024-05-23T20:33:54.213000
CVE-2022-48689,0,1,8c5e17be7f3d5892523929694e6776d9a497e15f529c60dbb701d2fc4f469e2f,2024-05-23T20:33:57.590000
CVE-2022-48686,0,0,ee162749a361db1a0b6a353b0eb61f9a34a852517c7d84ecd41264480ae7864b,2024-05-23T20:33:45.640000
CVE-2022-48687,0,0,154cc9d9f32ec8b0f10de1628955ee37a741d3f226440d234da62eb278afefe6,2024-05-23T20:33:49.117000
CVE-2022-48688,0,0,2b696539b728bee97e44de8c598ffc8f476d756e332df2a283fc8a9074238df0,2024-05-23T20:33:54.213000
CVE-2022-48689,0,0,8c5e17be7f3d5892523929694e6776d9a497e15f529c60dbb701d2fc4f469e2f,2024-05-23T20:33:57.590000
CVE-2022-4869,0,0,5b7b2ea9a47dff3b53da6eb2b79f229dd760425d82069982970d64b162546221,2024-05-17T02:17:00.030000
CVE-2022-48690,0,0,3bf2b7383dedf1b2ce6c2ca7145377e77848973096f501b231a7b1919c6a2366,2024-05-06T12:44:56.377000
CVE-2022-48691,0,1,78460f3d579f8d025d413b4e5084115051c9505854758717f2911c3e457a9330,2024-05-23T20:34:05.590000
CVE-2022-48692,0,1,aff174e5de8240f7eeb215a974629e18c37c98651f8f655c24ed7766ce32a01d,2024-05-23T20:34:02.510000
CVE-2022-48693,0,1,d6e7aa54f0c447d57b766a60c626b4ab3ddf1f43df6d2e702984b990e4adc451,2024-05-23T20:34:08.557000
CVE-2022-48694,0,1,910a15b10a70e2085e592dc798e379210d71c50e824a0184076c2766c86fee88,2024-05-23T20:34:12.060000
CVE-2022-48691,0,0,78460f3d579f8d025d413b4e5084115051c9505854758717f2911c3e457a9330,2024-05-23T20:34:05.590000
CVE-2022-48692,0,0,aff174e5de8240f7eeb215a974629e18c37c98651f8f655c24ed7766ce32a01d,2024-05-23T20:34:02.510000
CVE-2022-48693,0,0,d6e7aa54f0c447d57b766a60c626b4ab3ddf1f43df6d2e702984b990e4adc451,2024-05-23T20:34:08.557000
CVE-2022-48694,0,0,910a15b10a70e2085e592dc798e379210d71c50e824a0184076c2766c86fee88,2024-05-23T20:34:12.060000
CVE-2022-48695,0,0,5597f7680e0947e146d1de0c8d0e40fdf3811110f06a260ab5a6dadef93e0451,2024-05-06T12:44:56.377000
CVE-2022-48696,0,0,bb3f4e94ce2427b3ca1fcaa726a4e20810cfed0e3cb97d8a7607647d16161033,2024-05-06T12:44:56.377000
CVE-2022-48697,0,0,0e9a749323cfd051bbdaaf987011b5f32efa3788b4f7ef451aa4e20d090082a3,2024-05-06T12:44:56.377000
@ -214169,7 +214169,7 @@ CVE-2023-20235,0,0,5dba974f1c210cf2a03787c3d3e9c441feee75819526969b64e2f4a80cd00
CVE-2023-20236,0,0,c6a29bb276fa53045a1d5dbdcd5f535a774cb8c2b4a2da6d6d6378ae41d08dd7,2024-01-25T17:15:39.850000
CVE-2023-20237,0,0,f975d459d3015a3f408e596ac215a6d75cfb23fa7b1171a2fa054590faa43dfe,2024-01-25T17:15:39.970000
CVE-2023-20238,0,0,79a23b4efc590566cd58d4cbff45d13d4f3db09516083d401270e6b9d775efcf,2024-01-25T17:15:40.067000
CVE-2023-20239,0,0,826e38211d328eeacf8b74ba34a8ec7e417b358bc8709bf7d61605481ebb92e6,2024-05-22T18:59:20.240000
CVE-2023-20239,0,1,5dd8be818e18e1a04d7c98aee7cfcb486050d3e0a53ae7e4e7e015f455f8a455,2024-05-23T22:15:11.543000
CVE-2023-2024,0,0,a3df09772ebf731a0c1b5b6db5674d9bb51b9794a600088bf32d2d3c6a061d68,2023-05-25T18:10:24.590000
CVE-2023-20240,0,0,015a0e0281847d8e48d2582559aafcb4c3d1269bf49b1b0162dcef443724c650,2024-01-25T17:15:40.187000
CVE-2023-20241,0,0,96357ec1544a3578befd4c4e9e8f2d0182f6d55009c374e33215ccb07ff2801f,2024-01-25T17:15:40.280000
@ -231059,16 +231059,16 @@ CVE-2023-42085,0,0,cf93f61909db37ccb952df99954d17c52886a5577ba198c6e8431075299ae
CVE-2023-42086,0,0,5faade454dfaca84ed7f76ac90f0e62c45c41414ad327adff71535f973c4c1c7,2024-05-03T12:49:24.027000
CVE-2023-42087,0,0,ee670b3f09b1758041850601f55d23fe6541df0f228efdd8af3f03b86ee41b30,2024-05-03T12:49:24.027000
CVE-2023-42088,0,0,c60c8f0710b3f8907a770edb35aff0985f42f234d49f40bc81207964a8ea5c36,2024-05-03T12:49:24.027000
CVE-2023-42089,0,1,0f0f43e1de035594b7a5d040a88bb6dc44d053c78339abea8c30d4839080e458,2024-05-23T20:03:33.647000
CVE-2023-42089,0,0,0f0f43e1de035594b7a5d040a88bb6dc44d053c78339abea8c30d4839080e458,2024-05-23T20:03:33.647000
CVE-2023-4209,0,0,492b848ec95a38529284f183cefb82398c79fd370952b71b8dc65095053f77ba,2023-11-07T04:22:20.387000
CVE-2023-42090,0,1,6b7e3a8fd94987365b1cb45944db97b941cf84f6565f6e96b66a6e42484818bb,2024-05-23T20:11:59.477000
CVE-2023-42091,0,1,e00677eebf7bd4f68ec882d55f8bcb52c551c0f7a9e89271ba7f56dc8d15ec68,2024-05-23T20:20:52.897000
CVE-2023-42092,0,1,e455456d0d00ff006fc5660ce755c70b1953e30a969fae2970de4e0253dae01b,2024-05-23T20:21:55.943000
CVE-2023-42093,0,1,014bd8d52604fdd4aa74d1e4dfbd48ddebd2af65d93740262c35ef98f1e28f47,2024-05-23T20:22:37.423000
CVE-2023-42094,0,1,4387da5325d781ac7ee92e6b509718673641ba11d388eea76084b9882d15058a,2024-05-23T20:25:14.140000
CVE-2023-42095,0,1,136d9791b8309eed30123dcbd7abeb566ac2794053448f5ef6cced75dc460daa,2024-05-23T20:25:47.147000
CVE-2023-42096,0,1,de90800eed4cbf71026bd6635a7ee5366f03358d43e4f25f4c9bfb82668e66ee,2024-05-23T20:26:03.157000
CVE-2023-42097,0,1,967acb3f125ad6b7060ff6c566c00b25797743a7ea1df86a18e19500e899187f,2024-05-23T20:26:16.510000
CVE-2023-42090,0,0,6b7e3a8fd94987365b1cb45944db97b941cf84f6565f6e96b66a6e42484818bb,2024-05-23T20:11:59.477000
CVE-2023-42091,0,0,e00677eebf7bd4f68ec882d55f8bcb52c551c0f7a9e89271ba7f56dc8d15ec68,2024-05-23T20:20:52.897000
CVE-2023-42092,0,0,e455456d0d00ff006fc5660ce755c70b1953e30a969fae2970de4e0253dae01b,2024-05-23T20:21:55.943000
CVE-2023-42093,0,0,014bd8d52604fdd4aa74d1e4dfbd48ddebd2af65d93740262c35ef98f1e28f47,2024-05-23T20:22:37.423000
CVE-2023-42094,0,0,4387da5325d781ac7ee92e6b509718673641ba11d388eea76084b9882d15058a,2024-05-23T20:25:14.140000
CVE-2023-42095,0,0,136d9791b8309eed30123dcbd7abeb566ac2794053448f5ef6cced75dc460daa,2024-05-23T20:25:47.147000
CVE-2023-42096,0,0,de90800eed4cbf71026bd6635a7ee5366f03358d43e4f25f4c9bfb82668e66ee,2024-05-23T20:26:03.157000
CVE-2023-42097,0,0,967acb3f125ad6b7060ff6c566c00b25797743a7ea1df86a18e19500e899187f,2024-05-23T20:26:16.510000
CVE-2023-42098,0,0,8e4c84f368263878ec32a418628232f9aef570903e3aeab4d53a15e28f6988c8,2024-05-03T12:49:24.027000
CVE-2023-42099,0,0,6d2bd1d2af6074ca20b13addfc54270b89b7af594cac5c451e24e69f3bca3260,2024-05-03T12:49:24.027000
CVE-2023-42100,0,0,75cc696ab19e7fc6d667f97b8ac523e1bbae5b6e3d042063d90a46a6e4e81071,2024-05-03T12:49:24.027000
@ -248767,7 +248767,7 @@ CVE-2024-31997,0,0,d95ca9b47538ea73a196934e9c1064ac6bfd03df35a75cfa6de5a54ba7f14
CVE-2024-31999,0,0,92063baa188f8d1eb46101bed0277138de32335b249687b065a40c476ebdada7,2024-04-11T12:47:44.137000
CVE-2024-32000,0,0,5a1773951b9e4056d222ee9010995a856338856d61b3ccc3a9db5455d3c02bfb,2024-04-15T13:15:31.997000
CVE-2024-32001,0,0,5f137f0e0d607eeec96c185575fc4489622e4c58e021858f7aee0551fd5f0547,2024-04-11T12:47:44.137000
CVE-2024-32002,0,1,48be14afa98a3d0838703e3a18294dea9901ede648690c195f851d5768397209,2024-05-23T20:40:28.707000
CVE-2024-32002,0,0,48be14afa98a3d0838703e3a18294dea9901ede648690c195f851d5768397209,2024-05-23T20:40:28.707000
CVE-2024-32003,0,0,8e8c8d945f0ee0a518068e981d0cc584a07044ae728a9a77ce2d918bc43c232f,2024-04-15T13:15:31.997000
CVE-2024-32004,0,0,36c53e6b23ae4855264d40aff92ae0ce3b5701c2e0b937ef9fe8ca91ba7755d7,2024-05-14T19:17:55.627000
CVE-2024-32005,0,0,67300e4989f99e2e013d8397bc4806c53fe7ab524173b29e08f1814aa041fd14,2024-04-15T13:15:31.997000
@ -250212,11 +250212,11 @@ CVE-2024-3488,0,0,bf7c4b33b6e91489947313990def9ab3ebf80b81d3d9e53cfe72c6eb903d1d
CVE-2024-3489,0,0,407fc99ac607d8b254895aa9dc68afca4c0fff929cb004325e3c06bd83280a91,2024-05-02T18:00:37.360000
CVE-2024-34899,0,0,9579694904378722f2b9da74dd16a33f2e9423032433b6d7a12c13c9e08feaa9,2024-05-14T16:12:23.490000
CVE-2024-3490,0,0,243d31a8a91d548ae7245abd7ab9112de0ee4857a2da5c2f334b7a81fefaf51e,2024-05-02T13:27:25.103000
CVE-2024-34905,0,1,bdcf1575bdf737bf5b4544470c5680061fbc9eb772b09650c4ee060b5e223269,2024-05-23T21:03:49.143000
CVE-2024-34906,0,1,2e87c19545a662b9bbb732affd4033eedf71c0d6ff41c50506bab921f34df110,2024-05-23T20:42:22.080000
CVE-2024-34909,0,1,200d6e135c597cb2e777da35c986586f176b28b1430331d2d52fe002caa50f25,2024-05-23T20:56:30.393000
CVE-2024-34905,0,0,bdcf1575bdf737bf5b4544470c5680061fbc9eb772b09650c4ee060b5e223269,2024-05-23T21:03:49.143000
CVE-2024-34906,0,0,2e87c19545a662b9bbb732affd4033eedf71c0d6ff41c50506bab921f34df110,2024-05-23T20:42:22.080000
CVE-2024-34909,0,0,200d6e135c597cb2e777da35c986586f176b28b1430331d2d52fe002caa50f25,2024-05-23T20:56:30.393000
CVE-2024-3491,0,0,155e981c246f1ab173bd75da38bee4b8800ff4b0566c01179dcadac412465c38,2024-04-23T12:52:09.397000
CVE-2024-34913,0,1,482ab417b16d36cac885da18c13005f6c4dcc004509b2b573a33dd2947f7d3b7,2024-05-23T20:59:34.540000
CVE-2024-34913,0,0,482ab417b16d36cac885da18c13005f6c4dcc004509b2b573a33dd2947f7d3b7,2024-05-23T20:59:34.540000
CVE-2024-34914,0,0,70a7c11501909b39ef53f8b81e0474e671bd02725d09e7751be6f86dc2b4f270,2024-05-14T19:17:55.627000
CVE-2024-34919,0,0,3b58bcaada9443a615b9da4a712e7a9b2cf49d93cbec4e97e3462cce15a1e03d,2024-05-17T18:35:35.070000
CVE-2024-34921,0,0,dbf53dbc9b81b9221c12f4c1ada0297cc361fc3675871ab0069ddf8fe9b53895,2024-05-14T16:12:23.490000
@ -250601,29 +250601,29 @@ CVE-2024-35968,0,0,455842c0a4d55666496fa40a79a465ae6f1a76b6cda131514488328ea35c0
CVE-2024-35969,0,0,d9ff80f9e86dc6ec09d3d73a2c622fd8ab88d79413f238450526cf2d09ad3c05,2024-05-20T13:00:04.957000
CVE-2024-35970,0,0,96c10ee560020395797cdef9b864f6d3cdaba14b965e10eda86ce0385cd15848,2024-05-20T13:00:04.957000
CVE-2024-35971,0,0,effec5050df593cb0a5fcbfeeadb2f59554f22230700f7672813bbc9fe591940,2024-05-20T13:00:04.957000
CVE-2024-35972,0,1,8fcf39d4ace4f1fcc0a244e6329df0b275111c4ac22e4ce79dcba8599cd853de,2024-05-23T21:04:02.433000
CVE-2024-35972,0,0,8fcf39d4ace4f1fcc0a244e6329df0b275111c4ac22e4ce79dcba8599cd853de,2024-05-23T21:04:02.433000
CVE-2024-35973,0,0,41f3886c10db3750b388959132c4d4bd76a858dc2682bcea0347de3b3322c0fc,2024-05-20T13:00:04.957000
CVE-2024-35974,0,0,99aabf4606519b47da26b388b64955b6d9d56b1f34614cfa4dd1087fe54ff0a9,2024-05-20T13:00:04.957000
CVE-2024-35975,0,0,9ccca75aff95c5c07486f4ffd822fc6d64fc6a460bf3425f20890c15d921fd6d,2024-05-20T13:00:04.957000
CVE-2024-35976,0,0,91795b3537c076d70885e843bee8aac3e47a116196fc144491efe4fdcedf990a,2024-05-20T13:00:04.957000
CVE-2024-35977,0,0,2d804b886f49d95cae94751dee4a424dbc6e4b9c37e3a8a4837566ea12fb2e66,2024-05-20T13:00:04.957000
CVE-2024-35978,0,1,afa9ef21c96ee0c6e9d19e5f919b427cc9cf6c4a69e553c8cb767295ba777f46,2024-05-23T21:04:07.447000
CVE-2024-35978,0,0,afa9ef21c96ee0c6e9d19e5f919b427cc9cf6c4a69e553c8cb767295ba777f46,2024-05-23T21:04:07.447000
CVE-2024-35979,0,0,d4e16323071271d934aec8db56e2e5374b8e5b0a0154f42f629d21361e33f8db,2024-05-20T13:00:04.957000
CVE-2024-3598,0,0,885c48b686e5bb2258cc0c91f29020f7833d7484ea51a21d94da9f5d8904b730,2024-04-19T13:10:25.637000
CVE-2024-35980,0,0,058b0cecf53a78c7f6c74b546625ff7ae5e3f40bb9966fbec455937d5141e6d9,2024-05-20T13:00:04.957000
CVE-2024-35981,0,0,27e7e8b41f3b2aebe895d0b71a07a84c3d7ee00b6a6fee9ef12a978cee9e7b57,2024-05-20T13:00:04.957000
CVE-2024-35982,0,1,906dc3d7b5c5d9be313af01e34960e48a3b6accfc782bb11a7745f3e14c3a02a,2024-05-23T21:04:12.530000
CVE-2024-35982,0,0,906dc3d7b5c5d9be313af01e34960e48a3b6accfc782bb11a7745f3e14c3a02a,2024-05-23T21:04:12.530000
CVE-2024-35983,0,0,91efa68748fb762071812cab7e815ebbc2ed836cfe9f67c1f785c1a848a5528b,2024-05-20T13:00:04.957000
CVE-2024-35984,0,1,5d36a758410a9b5e9899a4e8e4e25a348dd448ebca1c56dd71f5f66f015f02a1,2024-05-23T21:04:17.397000
CVE-2024-35984,0,0,5d36a758410a9b5e9899a4e8e4e25a348dd448ebca1c56dd71f5f66f015f02a1,2024-05-23T21:04:17.397000
CVE-2024-35985,0,0,8cc1c917a7738d893ec0a9d1c44209bd1d7b3f8cef708316309cbf9a4215535a,2024-05-20T13:00:04.957000
CVE-2024-35986,0,0,be7afb82513a1b370add045e8c1b2ac1955bfb3c3a30e92ae07ea1c246fcd26a,2024-05-20T13:00:04.957000
CVE-2024-35987,0,0,38fbeb762a26a248e4c552518d83a2ba642c404289b1a591d9ed8a636187a4b1,2024-05-20T13:00:04.957000
CVE-2024-35988,0,0,755a0019dfe8ec6eea7c008269fab2add53414d43021d5f586f0a5a780ddd270,2024-05-20T13:00:04.957000
CVE-2024-35989,0,0,74d32fb7723857587d8cded7b34ee0daeadad294e1321b16d4f13290ed1a3ffa,2024-05-20T13:00:04.957000
CVE-2024-3599,0,0,f91d9eb89bd43a7fdb8f84ac15f658b45bd8ceb29436b55e3e5788315fb781e2,2024-05-02T18:00:37.360000
CVE-2024-35990,0,1,06cceae2bf943dd33610aa5921336bb9e4b51ab802f5aca7743daeb9e09e12ea,2024-05-23T21:05:01.570000
CVE-2024-35990,0,0,06cceae2bf943dd33610aa5921336bb9e4b51ab802f5aca7743daeb9e09e12ea,2024-05-23T21:05:01.570000
CVE-2024-35991,0,0,2ec1879b27963a38a501cadf4dfbe3633d294feee31a8b14ec87c1ec5c0413e6,2024-05-20T13:00:04.957000
CVE-2024-35992,0,1,c748b9e28b199fd28c92e210d134a908e9da81ab9434f465a91f612846c1269c,2024-05-23T20:33:31.133000
CVE-2024-35992,0,0,c748b9e28b199fd28c92e210d134a908e9da81ab9434f465a91f612846c1269c,2024-05-23T20:33:31.133000
CVE-2024-35993,0,0,bad1b5b49ce7b76fa895299042043a78a83a2ec3c0153aeb29b5deeac017aaf3,2024-05-20T13:00:04.957000
CVE-2024-35994,0,0,b65f4c52916d4cf46be28de4b7b8d2043a3d41d53ca03b78ebc632d730387b3d,2024-05-20T13:00:04.957000
CVE-2024-35995,0,0,7170efe44af3e1ab57e075c5210892dd1f90918d41bfca64d16d522f3a4ce5cb,2024-05-20T13:00:04.957000
@ -251600,8 +251600,10 @@ CVE-2024-5193,0,0,10c68e7444190b04603fe41121d5ca46f60a4a86754539b9aa3d12094e7245
CVE-2024-5194,0,0,449708a9669696a9d45dc12d62d0dd60618e438564c2c2163a0a40f19cb2695e,2024-05-22T12:46:53.887000
CVE-2024-5195,0,0,6f936c1a350f3aa4241c2485aebe122e7725b90fcb612ab0345f361f301112f3,2024-05-22T12:46:53.887000
CVE-2024-5196,0,0,5d3f231a43c31999680087469716ad4f3327a52b153d985ebb2cb490ce1591bb,2024-05-22T12:46:53.887000
CVE-2024-5201,1,1,c022274fc30559e48cee770c6219a56ceb32ca923aab9904e95811ede9bb3649,2024-05-23T20:15:09.283000
CVE-2024-5202,1,1,0158807f44e8299a8fc55ccca562c6b2d8d66c63988f86575c821e8e732d18b0,2024-05-23T20:15:09.543000
CVE-2024-5201,0,0,c022274fc30559e48cee770c6219a56ceb32ca923aab9904e95811ede9bb3649,2024-05-23T20:15:09.283000
CVE-2024-5202,0,0,0158807f44e8299a8fc55ccca562c6b2d8d66c63988f86575c821e8e732d18b0,2024-05-23T20:15:09.543000
CVE-2024-5227,1,1,022a7b3b0252db3f02e5f77ec1c0b45feba41c13657e9d4764d868ef6c413a71,2024-05-23T22:15:12.727000
CVE-2024-5228,1,1,791205a57cc2f393befe7c7c647a097afb3d7e710fb9e38052999f679cb9573b,2024-05-23T22:15:13.047000
CVE-2024-5230,0,0,cf2becfcaf10c991a6e891134ca15d918b17a419b24de9a99e4b60c016014c40,2024-05-23T02:15:09.503000
CVE-2024-5231,0,0,2fc06f277cf3b2ccd9f8bef63c31f29dbbc25b6622a63bce2a1973925c5571e0,2024-05-23T03:15:08.307000
CVE-2024-5232,0,0,ed53713218d3c3309d574d9b93cb7335aa67af33785bf9d72a3f19c8a0aa9151,2024-05-23T04:15:09.410000
@ -251614,5 +251616,21 @@ CVE-2024-5238,0,0,54af8c72ea663ab58e18883a934ebe7b4f3d213d13d52462bb8f1383833c12
CVE-2024-5239,0,0,6e790ea9c157d6ca48103062e904e3e176a7312f4d801654e6a47203a462fdea,2024-05-23T06:15:13.557000
CVE-2024-5240,0,0,3494efb6705fdae8c11113fbb015528d382fe3d61e884fe5fa0e91c0a340e60f,2024-05-23T07:15:09.987000
CVE-2024-5241,0,0,2052da6845c087b37d3912fd46165ee199b25d2ea734d5794afc72a994cd7a50,2024-05-23T07:15:10.803000
CVE-2024-5242,1,1,d026f6801d13ae97248c72031bd6e18b8dd706fd38317f4d80fcd0798e0d4878,2024-05-23T22:15:13.310000
CVE-2024-5243,1,1,d9436981cded9c508f07d702d996ecc3e019346e1d8dc38841782dbefbe66642,2024-05-23T22:15:13.503000
CVE-2024-5244,1,1,2666e35b1ebe5e714dc55caa5a7c8d77c485b993feaabdf62a2df1a1b51e398b,2024-05-23T22:15:13.777000
CVE-2024-5245,1,1,a4bf8e634fb7b967231b40de4d0431e956cbe5b513e75240d48115a25b716fb0,2024-05-23T22:15:13.980000
CVE-2024-5246,1,1,e51ed885e614d815c3c5e68b18784ef663c33ccf223adb79e5763591c4998274,2024-05-23T22:15:14.200000
CVE-2024-5247,1,1,97831c1cfb627b04bf272f8465aa703f3871fab689e3a8225c28176756132b6c,2024-05-23T22:15:14.387000
CVE-2024-5258,0,0,612239f97aff7a3f1b6375ec653a87b4fa47054b6007332650f0500858bd751f,2024-05-23T11:15:24.640000
CVE-2024-5264,0,0,fb1838ba27f9c5882d711f864f2c2fd731d10e808866432d51827ab685b7373f,2024-05-23T09:15:10.170000
CVE-2024-5279,1,1,9e2969775d17ec0d5b5572f7950ffafdd40aeefa695b8680cc16a034d5eee30a,2024-05-23T23:15:14.633000
CVE-2024-5291,1,1,df22d5846a0d93a861b5f68ed9abb3324189f6b9f83d8bffd99dd26f015762ec,2024-05-23T22:15:14.580000
CVE-2024-5292,1,1,55558d2c1998d35fbb040ff5aff58e22ec1a35cc2d7e4f74de51d44f90464b49,2024-05-23T22:15:14.780000
CVE-2024-5293,1,1,4556f35dee29f84319302fba42935f847e22656946a5cbc7a117cd441adb6ff7,2024-05-23T22:15:15
CVE-2024-5294,1,1,9c0b6ffc86c297a3b138baeb7692a9d1c060894778670522dffa1b8f2a5bef87,2024-05-23T22:15:15.213000
CVE-2024-5295,1,1,da5937ff9af5190ae8518e2b7fcc2ba1330ba93e0e93db55f339f585f182c107,2024-05-23T22:15:15.420000
CVE-2024-5296,1,1,8a06543e486c1b24a4a71d6d0ebe5390ca2a6e4bb6f9d5da93d0fecc717e546c,2024-05-23T22:15:15.617000
CVE-2024-5297,1,1,65655899622134e98f4d05e0ca2e98ccca1f8bbb0f7a26d058dfea771ee9d298,2024-05-23T22:15:15.890000
CVE-2024-5298,1,1,ede0967903480caa8215754a03fa2e5d1e856d282fd45cfdb137964c51b36b9a,2024-05-23T22:15:16.107000
CVE-2024-5299,1,1,1f14fe120d2bba658f2ad78a695844fc61bfb586a4437d040e27e25526dd88ae,2024-05-23T22:15:16.320000

Can't render this file because it is too large.