Auto-Update: 2024-05-22T23:55:30.139509+00:00

This commit is contained in:
cad-safe-bot 2024-05-22 23:58:20 +00:00
parent d562206766
commit 5b92d9a5cc
14 changed files with 414 additions and 31 deletions

View File

@ -0,0 +1,43 @@
{
"id": "CVE-2023-46806",
"sourceIdentifier": "support@hackerone.com",
"published": "2024-05-22T23:15:08.050",
"lastModified": "2024-05-22T23:15:08.050",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "An SQL Injection vulnerability in a web component of EPMM versions before 12.1.0.0 allows an authenticated user with appropriate privilege to access or modify data in the underlying database. "
}
],
"metrics": {
"cvssMetricV30": [
{
"source": "support@hackerone.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "LOW",
"baseScore": 6.7,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.2,
"impactScore": 5.5
}
]
},
"references": [
{
"url": "https://forums.ivanti.com/s/article/Security-Advisory-EPMM-May-2024?language=en_US",
"source": "support@hackerone.com"
}
]
}

View File

@ -0,0 +1,43 @@
{
"id": "CVE-2023-46807",
"sourceIdentifier": "support@hackerone.com",
"published": "2024-05-22T23:15:08.340",
"lastModified": "2024-05-22T23:15:08.340",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "An SQL Injection vulnerability in web component of EPMM before 12.1.0.0 allows an authenticated user with appropriate privilege to access or modify data in the underlying database."
}
],
"metrics": {
"cvssMetricV30": [
{
"source": "support@hackerone.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "LOW",
"baseScore": 6.7,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.2,
"impactScore": 5.5
}
]
},
"references": [
{
"url": "https://forums.ivanti.com/s/article/Security-Advisory-EPMM-May-2024?language=en_US",
"source": "support@hackerone.com"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-6725",
"sourceIdentifier": "secalert@redhat.com",
"published": "2024-03-15T13:15:06.857",
"lastModified": "2024-03-15T16:26:49.320",
"lastModified": "2024-05-22T22:15:08.463",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
@ -51,6 +51,14 @@
}
],
"references": [
{
"url": "https://access.redhat.com/errata/RHSA-2024:2736",
"source": "secalert@redhat.com"
},
{
"url": "https://access.redhat.com/errata/RHSA-2024:2770",
"source": "secalert@redhat.com"
},
{
"url": "https://access.redhat.com/security/cve/CVE-2023-6725",
"source": "secalert@redhat.com"

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-1141",
"sourceIdentifier": "secalert@redhat.com",
"published": "2024-02-01T15:15:08.547",
"lastModified": "2024-04-01T15:52:06.640",
"vulnStatus": "Analyzed",
"lastModified": "2024-05-22T22:15:08.627",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@ -99,6 +99,10 @@
}
],
"references": [
{
"url": "https://access.redhat.com/errata/RHSA-2024:2732",
"source": "secalert@redhat.com"
},
{
"url": "https://access.redhat.com/security/cve/CVE-2024-1141",
"source": "secalert@redhat.com",

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-1394",
"sourceIdentifier": "secalert@redhat.com",
"published": "2024-03-21T13:00:08.037",
"lastModified": "2024-05-22T17:16:12.157",
"lastModified": "2024-05-22T22:15:08.797",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
@ -123,6 +123,18 @@
"url": "https://access.redhat.com/errata/RHSA-2024:2569",
"source": "secalert@redhat.com"
},
{
"url": "https://access.redhat.com/errata/RHSA-2024:2729",
"source": "secalert@redhat.com"
},
{
"url": "https://access.redhat.com/errata/RHSA-2024:2730",
"source": "secalert@redhat.com"
},
{
"url": "https://access.redhat.com/errata/RHSA-2024:2767",
"source": "secalert@redhat.com"
},
{
"url": "https://access.redhat.com/errata/RHSA-2024:3265",
"source": "secalert@redhat.com"

View File

@ -0,0 +1,43 @@
{
"id": "CVE-2024-22026",
"sourceIdentifier": "support@hackerone.com",
"published": "2024-05-22T23:15:08.520",
"lastModified": "2024-05-22T23:15:08.520",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "A local privilege escalation vulnerability in EPMM before 12.1.0.0 allows an authenticated local user to bypass shell restriction and execute arbitrary commands on the appliance."
}
],
"metrics": {
"cvssMetricV30": [
{
"source": "support@hackerone.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 6.7,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 0.8,
"impactScore": 5.9
}
]
},
"references": [
{
"url": "https://forums.ivanti.com/s/article/Security-Advisory-EPMM-May-2024?language=en_US",
"source": "support@hackerone.com"
}
]
}

View File

@ -0,0 +1,43 @@
{
"id": "CVE-2024-29849",
"sourceIdentifier": "support@hackerone.com",
"published": "2024-05-22T23:15:08.683",
"lastModified": "2024-05-22T23:15:08.683",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Veeam Backup Enterprise Manager allows unauthenticated users to log in as any user to enterprise manager web interface."
}
],
"metrics": {
"cvssMetricV30": [
{
"source": "support@hackerone.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
"references": [
{
"url": "https://veeam.com/kb4581",
"source": "support@hackerone.com"
}
]
}

View File

@ -0,0 +1,43 @@
{
"id": "CVE-2024-29850",
"sourceIdentifier": "support@hackerone.com",
"published": "2024-05-22T23:15:08.857",
"lastModified": "2024-05-22T23:15:08.857",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Veeam Backup Enterprise Manager allows account takeover via NTLM relay."
}
],
"metrics": {
"cvssMetricV30": [
{
"source": "support@hackerone.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
]
},
"references": [
{
"url": "https://veeam.com/kb4581",
"source": "support@hackerone.com"
}
]
}

View File

@ -0,0 +1,43 @@
{
"id": "CVE-2024-29851",
"sourceIdentifier": "support@hackerone.com",
"published": "2024-05-22T23:15:09.027",
"lastModified": "2024-05-22T23:15:09.027",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Veeam Backup Enterprise Manager allows high-privileged users to steal NTLM hash of Enterprise manager service account."
}
],
"metrics": {
"cvssMetricV30": [
{
"source": "support@hackerone.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.2,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.2,
"impactScore": 5.9
}
]
},
"references": [
{
"url": "https://veeam.com/kb4581",
"source": "support@hackerone.com"
}
]
}

View File

@ -0,0 +1,43 @@
{
"id": "CVE-2024-29852",
"sourceIdentifier": "support@hackerone.com",
"published": "2024-05-22T23:15:09.193",
"lastModified": "2024-05-22T23:15:09.193",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Veeam Backup Enterprise Manager allows high-privileged users to read backup session logs."
}
],
"metrics": {
"cvssMetricV30": [
{
"source": "support@hackerone.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 2.7,
"baseSeverity": "LOW"
},
"exploitabilityScore": 1.2,
"impactScore": 1.4
}
]
},
"references": [
{
"url": "https://veeam.com/kb4581",
"source": "support@hackerone.com"
}
]
}

View File

@ -0,0 +1,43 @@
{
"id": "CVE-2024-29853",
"sourceIdentifier": "support@hackerone.com",
"published": "2024-05-22T23:15:09.367",
"lastModified": "2024-05-22T23:15:09.367",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "An authentication bypass vulnerability in Veeam Agent for Microsoft Windows allows for local privilege escalation."
}
],
"metrics": {
"cvssMetricV30": [
{
"source": "support@hackerone.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]
},
"references": [
{
"url": "https://veeam.com/kb4582",
"source": "support@hackerone.com"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-4438",
"sourceIdentifier": "secalert@redhat.com",
"published": "2024-05-08T09:15:09.663",
"lastModified": "2024-05-08T13:15:00.690",
"lastModified": "2024-05-22T22:15:09.170",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
@ -51,6 +51,10 @@
}
],
"references": [
{
"url": "https://access.redhat.com/errata/RHSA-2024:2729",
"source": "secalert@redhat.com"
},
{
"url": "https://access.redhat.com/security/cve/CVE-2024-4438",
"source": "secalert@redhat.com"

View File

@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update
```plain
2024-05-22T22:00:38.025313+00:00
2024-05-22T23:55:30.139509+00:00
```
### Most recent CVE Modification Timestamp synchronized with NVD
```plain
2024-05-22T21:15:08.100000+00:00
2024-05-22T23:15:09.367000+00:00
```
### Last Data Feed Release
@ -33,28 +33,31 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
### Total Number of included CVEs
```plain
251507
251515
```
### CVEs added in the last Commit
Recently added CVEs: `8`
- [CVE-2023-51636](CVE-2023/CVE-2023-516xx/CVE-2023-51636.json) (`2024-05-22T20:15:08.407`)
- [CVE-2023-51637](CVE-2023/CVE-2023-516xx/CVE-2023-51637.json) (`2024-05-22T20:15:08.713`)
- [CVE-2024-27264](CVE-2024/CVE-2024-272xx/CVE-2024-27264.json) (`2024-05-22T20:15:09.047`)
- [CVE-2024-31894](CVE-2024/CVE-2024-318xx/CVE-2024-31894.json) (`2024-05-22T20:15:09.260`)
- [CVE-2024-31895](CVE-2024/CVE-2024-318xx/CVE-2024-31895.json) (`2024-05-22T20:15:09.480`)
- [CVE-2024-4267](CVE-2024/CVE-2024-42xx/CVE-2024-4267.json) (`2024-05-22T20:15:09.700`)
- [CVE-2024-4453](CVE-2024/CVE-2024-44xx/CVE-2024-4453.json) (`2024-05-22T20:15:09.923`)
- [CVE-2024-4454](CVE-2024/CVE-2024-44xx/CVE-2024-4454.json) (`2024-05-22T20:15:10.130`)
- [CVE-2023-46806](CVE-2023/CVE-2023-468xx/CVE-2023-46806.json) (`2024-05-22T23:15:08.050`)
- [CVE-2023-46807](CVE-2023/CVE-2023-468xx/CVE-2023-46807.json) (`2024-05-22T23:15:08.340`)
- [CVE-2024-22026](CVE-2024/CVE-2024-220xx/CVE-2024-22026.json) (`2024-05-22T23:15:08.520`)
- [CVE-2024-29849](CVE-2024/CVE-2024-298xx/CVE-2024-29849.json) (`2024-05-22T23:15:08.683`)
- [CVE-2024-29850](CVE-2024/CVE-2024-298xx/CVE-2024-29850.json) (`2024-05-22T23:15:08.857`)
- [CVE-2024-29851](CVE-2024/CVE-2024-298xx/CVE-2024-29851.json) (`2024-05-22T23:15:09.027`)
- [CVE-2024-29852](CVE-2024/CVE-2024-298xx/CVE-2024-29852.json) (`2024-05-22T23:15:09.193`)
- [CVE-2024-29853](CVE-2024/CVE-2024-298xx/CVE-2024-29853.json) (`2024-05-22T23:15:09.367`)
### CVEs modified in the last Commit
Recently modified CVEs: `1`
Recently modified CVEs: `4`
- [CVE-2024-35204](CVE-2024/CVE-2024-352xx/CVE-2024-35204.json) (`2024-05-22T21:15:08.100`)
- [CVE-2023-6725](CVE-2023/CVE-2023-67xx/CVE-2023-6725.json) (`2024-05-22T22:15:08.463`)
- [CVE-2024-1141](CVE-2024/CVE-2024-11xx/CVE-2024-1141.json) (`2024-05-22T22:15:08.627`)
- [CVE-2024-1394](CVE-2024/CVE-2024-13xx/CVE-2024-1394.json) (`2024-05-22T22:15:08.797`)
- [CVE-2024-4438](CVE-2024/CVE-2024-44xx/CVE-2024-4438.json) (`2024-05-22T22:15:09.170`)
## Download and Usage

View File

@ -234171,6 +234171,8 @@ CVE-2023-46802,0,0,81ab742ef444b7c62f7f45fae874a3923600da74bccd6c05821cc0f3c3485
CVE-2023-46803,0,0,6d9acf7fa697eba714f52e6c2563d15daaa62001c85a491829c55db066eb5d2d,2023-12-21T04:49:22.117000
CVE-2023-46804,0,0,303fee7e8ddf7f125b651ea337e3f6426140c80ed6928e8d77bc4dfdbfc39c28,2023-12-21T04:49:19.073000
CVE-2023-46805,0,0,b3750b1134c367aa26eee38c16dcc83cd379c521a8dbf852dda3b3c6b98f8cb7,2024-01-22T17:15:09.080000
CVE-2023-46806,1,1,a399e49dd45975c8117b7070fa84e0dfa7f03b65fc56efff304a3577fdf629e3,2024-05-22T23:15:08.050000
CVE-2023-46807,1,1,777c07b6ef04ccc5ee9685cb9156b9df55bbfc086c7b244f43a632c29ff85b0a,2024-05-22T23:15:08.340000
CVE-2023-46808,0,0,cbddf0c466af810602e3b5e48604f0a280381993f5e5339e9c62959d89628764,2024-04-01T15:31:56.613000
CVE-2023-4681,0,0,d4b1d47c3f1f541f581a94f5a50c79c85882e6afa6d0d58510fdf4b0129b96ab,2023-09-05T16:22:15.077000
CVE-2023-46813,0,0,0af53a0caece30dfcd1819ea3bb4e83013593f443624938126da8e4e939c317d,2024-01-11T21:15:10.350000
@ -237313,8 +237315,8 @@ CVE-2023-5163,0,0,dcb773ab2d6fe9431102c7737c1a9ab1410c0276847172a178a17b93819afb
CVE-2023-51630,0,0,e9c56408d552b149daee5fe15432377ab22c6d1afc3ccc27406f3f891f5d5f7f,2024-02-15T17:15:20.487000
CVE-2023-51631,0,0,7ca00593c4263cd6a331ad27b48650ba2b0364d4a177ea286bc8bf674e135a9a,2024-05-02T13:27:25.103000
CVE-2023-51633,0,0,55125673d01a37395fc498a22f6f19d44160c863d8a90af77443ed2f4b8cde75,2024-05-03T12:48:41.067000
CVE-2023-51636,1,1,459ee9f881bc02c599b6caf3d90fe0c26bbc6eb475f5f293e4037219de8bb9d9,2024-05-22T20:15:08.407000
CVE-2023-51637,1,1,4c83b2813d25d9f23540a0aeecf204c9c27435721f68aec380c3e3459bb5fb27,2024-05-22T20:15:08.713000
CVE-2023-51636,0,0,459ee9f881bc02c599b6caf3d90fe0c26bbc6eb475f5f293e4037219de8bb9d9,2024-05-22T20:15:08.407000
CVE-2023-51637,0,0,4c83b2813d25d9f23540a0aeecf204c9c27435721f68aec380c3e3459bb5fb27,2024-05-22T20:15:08.713000
CVE-2023-5164,0,0,eb58535c78bf4b607f05ff8e1f903241064df3ad7b0f4d3f1636df61307fb477,2023-11-07T20:09:50.093000
CVE-2023-51649,0,0,11e105f951d553e940608590efdc1e572e1718a59f6fe7f415e90e2b5b510151,2024-01-03T20:05:01.863000
CVE-2023-5165,0,0,a5831e8b47bcc2e026ef3c692d9374429299bcbb82887bff8c322b1d5bf13c3b,2023-09-26T15:50:49.217000
@ -239579,7 +239581,7 @@ CVE-2023-6721,0,0,2baa6c13f444a73c8fb708ab0933aa43f74442dd83269a4b99012840f04e4f
CVE-2023-6722,0,0,d32d2d7ab88d7b27501031c246b7de1d18841f9831592e8928e0295e33c59b6c,2023-12-18T17:33:10.883000
CVE-2023-6723,0,0,0256b9a79fe5fd6a26df76092daabbd127e889141255d3fca4ab7e5083681e37,2023-12-15T20:37:10.720000
CVE-2023-6724,0,0,fe9b9f3e5a0c77767c8fbb38c69fe4abc8f7e517abb9a915da744e7f8cd31e28,2024-02-15T18:44:49.107000
CVE-2023-6725,0,0,94055ef245915afbd9d4f84be8e8ead1cd748849df2283bbdfb8d012a97f953a,2024-03-15T16:26:49.320000
CVE-2023-6725,0,1,d8fba7ecc0ac06fbaad8790a4f981b277576b56dc6f132299ff24e6c1eeb590d,2024-05-22T22:15:08.463000
CVE-2023-6727,0,0,6ec2c8890148313c75d2521ac9dcb5bcdc679ead10a2731713c6e45c491d3e46,2023-12-15T14:43:08.920000
CVE-2023-6730,0,0,daf67cb33b45f797c478299d62236f8fa267c9e9eab404abeacd1583fccd7584,2023-12-28T17:15:33.537000
CVE-2023-6731,0,0,aa4c7268daf17e995424df103e330d077dd990a225f43b2413d88f98f9d2d19d,2024-05-02T18:00:37.360000
@ -240983,7 +240985,7 @@ CVE-2024-1137,0,0,9f8c1cf74ca4778ab709faeea998997368a7f042480977a7d6535f2dd892d7
CVE-2024-1138,0,0,0bb26866b03e9dd351d8284004467140fe2cfdfbd72af071fda864e5a2dc9e58,2024-03-13T12:33:51.697000
CVE-2024-1139,0,0,67812d80b115bb709f356fbed107923a0b2a9794b49b65f37601816b6e3f2071,2024-05-16T23:15:47.323000
CVE-2024-1140,0,0,113ab98fbbd3f38fc36026b5aef44eb4b38cd7d347ba07fcabb6b9d9a69118a5,2024-02-27T19:17:32.253000
CVE-2024-1141,0,0,2d32c65ed599159df83e8a47a1f55987e8e9877658103a494dc3a1f00162db73,2024-04-01T15:52:06.640000
CVE-2024-1141,0,1,9b3390011e2f064ea81ccb90f3a2285873cdfc61cbfdd8bb924f33e338c96145,2024-05-22T22:15:08.627000
CVE-2024-1142,0,0,00d2baa79f6b61708bb1dbc0a1a3ef8f1bea10f64fa60e391934eddcb51481c3,2024-03-21T12:58:51.093000
CVE-2024-1143,0,0,0e1cc50dc6fadb90e5e9f42ce552c5269c71acc03717875a86d6ea10d7db2994,2024-02-09T19:08:27.423000
CVE-2024-1144,0,0,9bd37ced51691b307ecb685d488150dc72881153be6445443975c27ffcc91569,2024-03-19T13:26:46
@ -241204,7 +241206,7 @@ CVE-2024-1390,0,0,71eb0c49e1915160a890c9df4d2040fa529dd6e699ca4bdcf3f6829a9c0e60
CVE-2024-1391,0,0,95159e2513e9127a66f6050cbc2679326245e87281e8aee9653919649cc97f74,2024-03-13T18:15:58.530000
CVE-2024-1392,0,0,0948736f211221c32ddb432668205bccae67223b950d877ef11c76bff68a1c8f,2024-03-13T18:15:58.530000
CVE-2024-1393,0,0,d7662d0cf4655f5dc37cac1727274e85c0d695350e85be99fa06d400366cbddc,2024-03-13T18:15:58.530000
CVE-2024-1394,0,0,b9291470de8f5430a0efce828f0fb93d2fbd512feaf0ea4e95de91da35c98bc3,2024-05-22T17:16:12.157000
CVE-2024-1394,0,1,8e3669b0bacf72c96ac10134512ed71f1ee7cd3759b152995014d42c5e7d2f5b,2024-05-22T22:15:08.797000
CVE-2024-1395,0,0,bc906c24f3b97a1f76fb28d9eb27a1438a7ca78483d0c0a7452e9b7efa2da958,2024-05-03T14:17:53.690000
CVE-2024-1396,0,0,c2c7f8124754e0c20b02f3a3637cca1d95a3c2b253208efd7a2814f2d0550bd5,2024-05-02T18:00:37.360000
CVE-2024-1397,0,0,e6d8c9c2beca75d3fdc5f918cb423cf21913a9c807f46126d5b49c29c7bd60f0,2024-03-13T12:33:51.697000
@ -242829,6 +242831,7 @@ CVE-2024-22022,0,0,925c0d46bbd39b5d0f2644b5e26e0cd82488a20b7de7cccfa4639e9bb8f60
CVE-2024-22023,0,0,7e8e0e905a60ffd4a97223bf6516f7cf037ccc58c54cec4a4d059a3dd8a4e247,2024-04-08T22:51:43.003000
CVE-2024-22024,0,0,980d44adebdc63cfe4985efd7aa2ee2044d33423093fc7c9f165c43f20a43115,2024-02-13T15:15:32.193000
CVE-2024-22025,0,0,61459addde8d883e2fba52001930c3fdd5c1e72e223ae9ae0e9157b1bc2b1032,2024-03-27T03:15:11.187000
CVE-2024-22026,1,1,498bdc865ee186cacb62c03d9b885ce7f061884d640e1671593c444a7b0e60ed,2024-05-22T23:15:08.520000
CVE-2024-22027,0,0,0822e6ca4a0197c830c667319442a46ae27f8152642de8d7f05f1858eada021b,2024-01-18T20:02:46.993000
CVE-2024-22028,0,0,298ce73f07aec6f02f064335339ad9cfcae063fc1fc57c34177913aa68770c1d,2024-01-22T20:22:47.847000
CVE-2024-2203,0,0,8fb22f1c1f8741fb265e3b3e915ec8a593bb59007feb26ed500ad32a5d473253,2024-03-27T12:29:30.307000
@ -246081,7 +246084,7 @@ CVE-2024-27255,0,0,1a87ed865e33969bd25e1a85296cce48c9cd6a59a0cfe097079e825c89c05
CVE-2024-2726,0,0,86fe8b0d397a8074a2c940021570750a55036cbee3d4d8f0a542dcc682e4af2c,2024-03-22T15:34:43.663000
CVE-2024-27260,0,0,35cc3a1e9cc20863b87027e674db993404964801c204d20b0f5a987c39a4b80a,2024-05-17T18:36:31.297000
CVE-2024-27261,0,0,bbed66d7d6087a4518d3eea41ca0d4f2f5d3d3e2b2ec24c87084c9ef60c5b4e2,2024-04-15T13:15:51.577000
CVE-2024-27264,1,1,0e666d8a771fa2ff39790ac131ea6d651444c828144a06eca82ba04c7cb6ed11,2024-05-22T20:15:09.047000
CVE-2024-27264,0,0,0e666d8a771fa2ff39790ac131ea6d651444c828144a06eca82ba04c7cb6ed11,2024-05-22T20:15:09.047000
CVE-2024-27265,0,0,a52bbd360a6e47490ba11a2331048d18c2ebad63cb5bd9c43f26e021577a44df,2024-03-19T16:52:02.767000
CVE-2024-27266,0,0,f3ab0f27c5fbbc81843b4329fa53134d5b91174cad9bacbbc5dbf01cfacc3864,2024-03-19T16:52:35.400000
CVE-2024-27268,0,0,3c687588a19276e5b44431496d7af7239b9640f9b0218bde7d09fb0845bffcbc,2024-05-16T01:15:07.370000
@ -247448,7 +247451,12 @@ CVE-2024-29841,0,0,55b576137a980baf276319e7949f14a0b7f1bac68593183f67439c72ef1c2
CVE-2024-29842,0,0,c555d339d968965f67a62125788ebd30337e465ee62002c966027b486a7b6656,2024-04-15T13:15:31.997000
CVE-2024-29843,0,0,0e7cac2423043e71c46c0b1e43ac9a8c810800e1746f633c825d47d92993ebb0,2024-04-15T13:15:31.997000
CVE-2024-29844,0,0,0b2bf20574d5156f6a667769b4d5660c6c41f0f9a81de3ca328a866e5a169d72,2024-04-15T13:15:31.997000
CVE-2024-29849,1,1,b84f570311d2119bd286f1fc215d5d3c3ce383443a8af81a2ad767af0c7baac5,2024-05-22T23:15:08.683000
CVE-2024-2985,0,0,fa2452bdca8bf817e9c39173e50c9398ab81e8bbe363c5d181d5470655c888f8,2024-05-17T02:38:40.683000
CVE-2024-29850,1,1,9ef633943b092845cbc63dd1691a09369a2b586ca50c38994abb516bb8248dc2,2024-05-22T23:15:08.857000
CVE-2024-29851,1,1,0885e7c894f51ff2efb100cfae5c9b2a5cb115e84dd695a869c5583d9f216a7b,2024-05-22T23:15:09.027000
CVE-2024-29852,1,1,0faeef1a9b26d8a0ad33874f1a532d650663a48730e5748e736d29c44bd54298,2024-05-22T23:15:09.193000
CVE-2024-29853,1,1,480e1f862de79920ff48d6c32c06ce85c52e602b6fa05b43a1652a51bb33ddf4,2024-05-22T23:15:09.367000
CVE-2024-29857,0,0,9325f9fdc1f4e8265930eb53922aae24948d06e15ce403473a616a945c01d1ad,2024-05-14T16:13:02.773000
CVE-2024-29858,0,0,ec21ad079a83cd076ada45f6eaa6cdca3318bb07ab260d892702dff1f9c09fde,2024-03-21T12:58:51.093000
CVE-2024-29859,0,0,1a3bc8759fdc8c10e013f96dddd14f2ff64d6c749aade8e9054f9e130df1726e,2024-03-21T12:58:51.093000
@ -248665,8 +248673,8 @@ CVE-2024-3188,0,0,5d70d4884e37e1862c5503e8662fdd8be316d1df7ecad77f44114699c1426b
CVE-2024-31887,0,0,e951c215b0e12b882bcc7244c98d7631ee4f4b7a3271b5f24e369f1a635cd3e5,2024-04-17T12:48:07.510000
CVE-2024-3189,0,0,1214acc8d4ffdbc5da1a7913ab352a27b53d04d94b5a178d0c09d285be9bf460,2024-05-15T16:40:19.330000
CVE-2024-31893,0,0,38832e07ea9705065b713afbef90a53d598b0ed52a0e87dc548f70516d21e0fd,2024-05-22T19:15:08.893000
CVE-2024-31894,1,1,80b6826b80410f0e513614f16c31b482f4dec10ee253620eee5cb32449d4f744,2024-05-22T20:15:09.260000
CVE-2024-31895,1,1,3ca1235030db0f2e699b4e4dab09eb5487de7f0d2b9bfacafb9b9bb6f2aee7cf,2024-05-22T20:15:09.480000
CVE-2024-31894,0,0,80b6826b80410f0e513614f16c31b482f4dec10ee253620eee5cb32449d4f744,2024-05-22T20:15:09.260000
CVE-2024-31895,0,0,3ca1235030db0f2e699b4e4dab09eb5487de7f0d2b9bfacafb9b9bb6f2aee7cf,2024-05-22T20:15:09.480000
CVE-2024-31904,0,0,a5c1afc73930c75c0e4f0cca7e598ebd551c1a4c257da0dd95c5279861133025,2024-05-22T19:15:09.153000
CVE-2024-3191,0,0,8cf962bd9b56831bd79ade84a34de9b023bb925809cd58e4b9fc80c44fe6835a,2024-05-17T02:39:45.973000
CVE-2024-3192,0,0,e3aebeb6cd86739531dd732871b7a29e3a45f5c2393a43be256648b47f7f7a36,2024-05-17T02:39:46.077000
@ -250265,7 +250273,7 @@ CVE-2024-35192,0,0,23cd729e19fbc1d14c67ebc44010f4e0066ae84ba866902513e5881072f82
CVE-2024-35194,0,0,48af49ad15298b97e4182e649aa9ff3b175135c022e246334d8184050eb47ce3,2024-05-21T12:37:59.687000
CVE-2024-35195,0,0,9af34c5ee8ad1c1fa6450f4ca43e0ba18410a0c881b480e1c9b625168aec2e65,2024-05-21T12:37:59.687000
CVE-2024-3520,0,0,f6428e86e9ec472cba9c3c5754043cb34202461d79bcb1fa1b6a365d8347f93e,2024-05-02T18:00:37.360000
CVE-2024-35204,0,1,426b422871683d1b16b6e67a7918f8f9959a907fcff966c6f5833a5066df0ead,2024-05-22T21:15:08.100000
CVE-2024-35204,0,0,426b422871683d1b16b6e67a7918f8f9959a907fcff966c6f5833a5066df0ead,2024-05-22T21:15:08.100000
CVE-2024-35205,0,0,e759b9359595ebaf333ccada053519f187d3d1cfddc6ef72f21bfd74e59fe204,2024-05-14T16:11:39.510000
CVE-2024-3521,0,0,6a912375551b2b833dbf10976aa7a2942ee5411f45e7dcbcfe8caeaca7c22d09,2024-05-17T02:39:58.603000
CVE-2024-35218,0,0,b14fa11104b3be270b2ec1bc371bb22cdbf5b58f56cbde41365d0ab9a810855b,2024-05-21T16:54:26.047000
@ -251022,7 +251030,7 @@ CVE-2024-4262,0,0,48de03b038c3a9950f1b2d36329d9f6a6297e28f8023eb3afff323d082fd07
CVE-2024-4263,0,0,b1f2b30077721ef2ca6e11fb6bda0f0973b13bae19df9c4c6804c151ec0ef6fb,2024-05-16T13:03:05.353000
CVE-2024-4264,0,0,900b6e21a73808decad0bbd9ff6caa01ca608bdbd52b2ff79e0e58d7828f5894,2024-05-20T13:00:34.807000
CVE-2024-4265,0,0,91d38fbd7b9c4ea0cd26c0f2028b5e1f8ee8c7d7e1c2c632d6b17cd2b7b69603,2024-05-02T18:00:37.360000
CVE-2024-4267,1,1,71e7feae8dfa8dd7f29e580e524e7cdeefc3ea2f2de0a7a38902725afdc0d3f1,2024-05-22T20:15:09.700000
CVE-2024-4267,0,0,71e7feae8dfa8dd7f29e580e524e7cdeefc3ea2f2de0a7a38902725afdc0d3f1,2024-05-22T20:15:09.700000
CVE-2024-4275,0,0,70e1a00c60419d92634d3a56b566530d560ae59bb86d2c5a8041fd963d9db39d,2024-05-14T16:11:39.510000
CVE-2024-4277,0,0,0e2597ca58054c89bbcbec7f866e9744f2b63f46782c4e0a7d31ae57f9529329,2024-05-14T16:11:39.510000
CVE-2024-4279,0,0,d3b17e17d1b5650487c2ef2a762ae7d90400bd6e48ec29863d7d603500f64a36,2024-05-16T13:03:05.353000
@ -251114,7 +251122,7 @@ CVE-2024-4434,0,0,cde9fa120977e75c0573204952d5b71ccbd57bef4f0e70a5b7f5a93b9a0c5d
CVE-2024-4435,0,0,c69916e4d792ec97c7ba3c61d03343d05b082956370e8cd374bd8edcd90a269d,2024-05-21T12:37:59.687000
CVE-2024-4436,0,0,64033ee8163e93734d3356c76b1219aa507b767e43c629d466579eff9eca6a17,2024-05-08T13:15:00.690000
CVE-2024-4437,0,0,a62637ebd732289d5432e95cdaf60c3e47133a5119cabcd67c7d4d14d6736462,2024-05-08T13:15:00.690000
CVE-2024-4438,0,0,93ceea5f04a92ff8a47d298b7349cd99931c0f6ebe6d5712d64fba3d2e18a77c,2024-05-08T13:15:00.690000
CVE-2024-4438,0,1,c6d32df1a2e993851c84a6b5f2f9af41ec984f69923c0adfc1cb0314a6f36408,2024-05-22T22:15:09.170000
CVE-2024-4439,0,0,d4904ab7f03492cebfcab113d16c9db0e8589fc24c413d994223fa5d5b94f71f,2024-05-03T12:48:41.067000
CVE-2024-4440,0,0,51dabd0ed14011a33ac13484b9ff25988940854e7446055f86986b74eaffda88,2024-05-14T19:17:55.627000
CVE-2024-4441,0,0,21bddaae6271b56b94db02a08e641400bfc943be91594296c54fd13926b71ef2,2024-05-14T16:11:39.510000
@ -251126,8 +251134,8 @@ CVE-2024-4446,0,0,c1a78a1d4c0d05d17b6cead174a683289ca018fac3b1c104ff2e5b23dbf06e
CVE-2024-4448,0,0,c0706d1927abee0ebde095d1bd8c9375ae579980372e3f8e4e4c3b77a255c913,2024-05-14T16:11:39.510000
CVE-2024-4449,0,0,5f461a2e161ed0d547590d7983036c434e3239f67f76e9397bc8163418dcb335,2024-05-14T16:11:39.510000
CVE-2024-4452,0,0,e48f0cdf03196e20de5e5f5902dc7c7b1a1024a4dcd852e9c13b4253f638fd6a,2024-05-21T16:54:26.047000
CVE-2024-4453,1,1,76de60ffe129cc0f8139ecfad6bc0720432aab5d18bbe4920a7b34d4385b0a5f,2024-05-22T20:15:09.923000
CVE-2024-4454,1,1,c24879cf57a1c9399548f22aefb71f03f3beb75d43495f040ee325bb1fe20f1f,2024-05-22T20:15:10.130000
CVE-2024-4453,0,0,76de60ffe129cc0f8139ecfad6bc0720432aab5d18bbe4920a7b34d4385b0a5f,2024-05-22T20:15:09.923000
CVE-2024-4454,0,0,c24879cf57a1c9399548f22aefb71f03f3beb75d43495f040ee325bb1fe20f1f,2024-05-22T20:15:10.130000
CVE-2024-4456,0,0,43bdd543de001702ca45614b4a3579c52bfa7b188e5cb3e6b81f25f610f74e45,2024-05-08T13:15:00.690000
CVE-2024-4461,0,0,ad05f4e37257e33f27f784f842f8dfa34f685ff06dd273bc6842a04c51c93bf6,2024-05-03T12:48:41.067000
CVE-2024-4463,0,0,aaa5b32073fcbc7160927d348961b4790302ca7b8c414e16cdb6cacefbfd98b3,2024-05-14T16:11:39.510000

Can't render this file because it is too large.