Auto-Update: 2024-04-25T10:00:39.344246+00:00

This commit is contained in:
cad-safe-bot 2024-04-25 10:03:30 +00:00
parent 82274015a8
commit 662f731483
17 changed files with 707 additions and 62 deletions

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2023-51478",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-04-25T08:15:07.160",
"lastModified": "2024-04-25T08:15:07.160",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Improper Authentication vulnerability in Abdul Hakeem Build App Online allows Privilege Escalation.This issue affects Build App Online: from n/a through 1.0.19.\n\n"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-287"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/build-app-online/wordpress-build-app-online-plugin-1-0-19-unauthenticated-account-takeover-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2023-51482",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-04-25T09:15:06.880",
"lastModified": "2024-04-25T09:15:06.880",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Improper Authentication vulnerability in EazyPlugins Eazy Plugin Manager allows Accessing Functionality Not Properly Constrained by ACLs.This issue affects Eazy Plugin Manager: from n/a through 4.1.2.\n\n"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.9,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.1,
"impactScore": 6.0
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-287"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/plugins-on-steroids/wordpress-eazy-plugin-manager-plugin-4-1-2-subscriber-arbitrary-options-update-lead-to-rce-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2023-51484",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-04-25T09:15:07.143",
"lastModified": "2024-04-25T09:15:07.143",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Improper Authentication vulnerability in wp-buy Login as User or Customer (User Switching) allows Privilege Escalation.This issue affects Login as User or Customer (User Switching): from n/a through 3.8.\n\n"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-287"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/login-as-customer-or-user/wordpress-login-as-user-or-customer-plugin-3-8-unauthenticated-account-takeover-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -8,6 +8,10 @@
{
"lang": "en",
"value": "Issue summary: Checking excessively long invalid RSA public keys may take\na long time.\n\nImpact summary: Applications that use the function EVP_PKEY_public_check()\nto check RSA public keys may experience long delays. Where the key that\nis being checked has been obtained from an untrusted source this may lead\nto a Denial of Service.\n\nWhen function EVP_PKEY_public_check() is called on RSA public keys,\na computation is done to confirm that the RSA modulus, n, is composite.\nFor valid RSA keys, n is a product of two or more large primes and this\ncomputation completes quickly. However, if n is an overly large prime,\nthen this computation would take a long time.\n\nAn application that calls EVP_PKEY_public_check() and supplies an RSA key\nobtained from an untrusted source could be vulnerable to a Denial of Service\nattack.\n\nThe function EVP_PKEY_public_check() is not called from other OpenSSL\nfunctions however it is called from the OpenSSL pkey command line\napplication. For that reason that application is also vulnerable if used\nwith the '-pubin' and '-check' options on untrusted data.\n\nThe OpenSSL SSL/TLS implementation is not affected by this issue.\n\nThe OpenSSL 3.0 and 3.1 FIPS providers are affected by this issue."
},
{
"lang": "es",
"value": "Resumen del problema: la comprobaci\u00f3n de claves p\u00fablicas RSA inv\u00e1lidas excesivamente largas puede llevar mucho tiempo. Resumen de impacto: las aplicaciones que utilizan la funci\u00f3n EVP_PKEY_public_check() para comprobar las claves p\u00fablicas RSA pueden experimentar grandes retrasos. Cuando la clave que se est\u00e1 verificando se obtuvo de una fuente que no es confiable, esto puede dar lugar a una denegaci\u00f3n de servicio. Cuando se llama a la funci\u00f3n EVP_PKEY_public_check() en claves p\u00fablicas RSA, se realiza un c\u00e1lculo para confirmar que el m\u00f3dulo RSA, n, es compuesto. Para claves RSA v\u00e1lidas, n es un producto de dos o m\u00e1s n\u00fameros primos grandes y este c\u00e1lculo se completa r\u00e1pidamente. Sin embargo, si n es un n\u00famero primo demasiado grande, entonces este c\u00e1lculo llevar\u00eda mucho tiempo. Una aplicaci\u00f3n que llama a EVP_PKEY_public_check() y proporciona una clave RSA obtenida de una fuente que no es de confianza podr\u00eda ser vulnerable a un ataque de denegaci\u00f3n de servicio. La funci\u00f3n EVP_PKEY_public_check() no se llama desde otras funciones de OpenSSL, sin embargo, se llama desde la aplicaci\u00f3n de l\u00ednea de comandos pkey de OpenSSL. Por esa raz\u00f3n, esa aplicaci\u00f3n tambi\u00e9n es vulnerable si se usa con las opciones '-pubin' y '-check' en datos que no son de confianza. La implementaci\u00f3n de OpenSSL SSL/TLS no se ve afectada por este problema. Los proveedores FIPS OpenSSL 3.0 y 3.1 se ven afectados por este problema."
}
],
"metrics": {},

View File

@ -2,12 +2,16 @@
"id": "CVE-2024-0151",
"sourceIdentifier": "arm-security@arm.com",
"published": "2024-04-24T18:15:11.130",
"lastModified": "2024-04-24T19:58:40.710",
"lastModified": "2024-04-25T08:15:07.420",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "Insufficient argument checking in Secure state Entry functions in software using Cortex-M Security Extensions (CMSE), that has been compiled using toolchains that implement 'Arm v8-M Security Extensions Requirements on Development Tools' prior to version 1.4, allows an attacker to pass values to Secure state that are out of range for types smaller than 32-bits. Out of range values might lead to incorrect operations in secure state due."
"value": "Insufficient argument checking in Secure state Entry functions in software using Cortex-M Security Extensions (CMSE), that has been compiled using toolchains that implement 'Arm v8-M Security Extensions Requirements on Development Tools' prior to version 1.4, allows an attacker to pass values to Secure state that are out of range for types smaller than 32-bits. Out of range values might lead to incorrect operations in secure state."
},
{
"lang": "es",
"value": "La comprobaci\u00f3n insuficiente de argumentos en las funciones de entrada de estado seguro en el software que utiliza Extensiones de seguridad Cortex-M (CMSE), que se ha compilado utilizando cadenas de herramientas que implementan los 'Requisitos de extensiones de seguridad Arm v8-M en herramientas de desarrollo' anteriores a la versi\u00f3n 1.4, permite que un atacante pase valores al estado Seguro que est\u00e1n fuera del rango para tipos menores de 32 bits. Los valores fuera de rango pueden provocar operaciones incorrectas en estado seguro debido."
}
],
"metrics": {},

View File

@ -0,0 +1,63 @@
{
"id": "CVE-2024-22144",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-04-25T09:15:07.360",
"lastModified": "2024-04-25T09:15:07.360",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Improper Control of Generation of Code ('Code Injection') vulnerability in Eli Scheetz Anti-Malware Security and Brute-Force Firewall gotmls allows Code Injection.This issue affects Anti-Malware Security and Brute-Force Firewall: from n/a through 4.21.96.\n\n"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.0,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 2.2,
"impactScore": 6.0
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-94"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/articles/critical-vulnerability-found-in-gotmls-plugin?_s_id=cve",
"source": "audit@patchstack.com"
},
{
"url": "https://patchstack.com/database/vulnerability/gotmls/wordpress-anti-malware-security-and-brute-force-firewall-plugin-4-21-96-unauthenticated-predictable-nonce-brute-force-leading-to-rce-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
},
{
"url": "https://sec.stealthcopter.com/cve-2024-22144/",
"source": "audit@patchstack.com"
}
]
}

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2024-25917",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-04-25T09:15:07.550",
"lastModified": "2024-04-25T09:15:07.550",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Exposure of Sensitive Information to an Unauthorized Actor vulnerability in CodeRevolution WP Setup Wizard.This issue affects WP Setup Wizard: from n/a through 1.0.8.1.\n\n"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-200"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/wp-setup-wizard/wordpress-wp-setup-wizard-plugin-1-0-8-1-subscriber-full-database-download-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2024-30560",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-04-25T09:15:07.740",
"lastModified": "2024-04-25T09:15:07.740",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Cross-Site Request Forgery (CSRF) vulnerability in \u5927\u4fa0WP DX-Watermark.This issue affects DX-Watermark: from n/a through 1.0.4.\n\n"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.6,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 2.8,
"impactScore": 6.0
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-352"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/dx-watermark/wordpress-dx-watermark-plugin-1-0-4-csrf-to-arbitrary-file-upload-and-xss-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2024-31266",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-04-25T09:15:07.927",
"lastModified": "2024-04-25T09:15:07.927",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Improper Control of Generation of Code ('Code Injection') vulnerability in AlgolPlus Advanced Order Export For WooCommerce allows Code Injection.This issue affects Advanced Order Export For WooCommerce: from n/a through 3.4.4.\n\n"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.1,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 2.3,
"impactScore": 6.0
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-94"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/woo-order-export-lite/wordpress-advanced-order-export-for-woocommerce-plugin-3-4-4-remote-code-execution-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-31380",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-04-03T12:15:13.530",
"lastModified": "2024-04-05T14:15:10.487",
"lastModified": "2024-04-25T09:15:08.127",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
@ -51,17 +51,9 @@
}
],
"references": [
{
"url": "https://patchstack.com/articles/unpatched-authenticated-rce-in-oxygen-and-breakdance-builder?_s_id=cve",
"source": "audit@patchstack.com"
},
{
"url": "https://patchstack.com/database/vulnerability/oxygen/wordpress-oxygen-plugin-4-8-1-auth-remote-code-execution-rce-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
},
{
"url": "https://snicco.io/vulnerability-disclosure/oxygen/client-control-remote-code-execution-oxygen-4-8-1?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -0,0 +1,47 @@
{
"id": "CVE-2024-3733",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-04-25T09:15:08.237",
"lastModified": "2024-04-25T09:15:08.237",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "The Essential Addons for Elementor \u2013 Best Elementor Templates, Widgets, Kits & WooCommerce Builders plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 5.9.15 via the ajax_load_more() , eael_woo_pagination_product_ajax(), and ajax_eael_product_gallery() functions. This makes it possible for unauthenticated attackers to extract posts that may be in private or draft status."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security@wordfence.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 3.9,
"impactScore": 1.4
}
]
},
"references": [
{
"url": "https://plugins.trac.wordpress.org/changeset/3075644/essential-addons-for-elementor-lite/tags/5.9.16/includes/Traits/Ajax_Handler.php",
"source": "security@wordfence.com"
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/3d604f7a-947c-43f4-bba6-e7e98b2d7844?source=cve",
"source": "security@wordfence.com"
}
]
}

View File

@ -0,0 +1,47 @@
{
"id": "CVE-2024-3893",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-04-25T08:15:07.490",
"lastModified": "2024-04-25T08:15:07.490",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "The Classified Listing \u2013 Classified ads & Business Directory Plugin plugin for WordPress is vulnerable to unauthorized loss of data due to a missing capability check on the rtcl_fb_gallery_image_delete AJAX action in all versions up to, and including, 3.0.10.3. This makes it possible for authenticated attackers, with subscriber-level access and above, to delete arbitrary attachements."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security@wordfence.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 5.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 3.9,
"impactScore": 1.4
}
]
},
"references": [
{
"url": "https://plugins.trac.wordpress.org/changeset/3073754/classified-listing/trunk/app/Controllers/Ajax/FormBuilderAjax.php",
"source": "security@wordfence.com"
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/e7113b1c-78dc-4648-b14a-52ff6668fd1d?source=cve",
"source": "security@wordfence.com"
}
]
}

View File

@ -0,0 +1,47 @@
{
"id": "CVE-2024-3929",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-04-25T08:15:07.657",
"lastModified": "2024-04-25T08:15:07.657",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "The Content Views \u2013 Post Grid & Filter, Recent Posts, Category Posts, & More (Gutenberg Blocks and Shortcode) plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the Widget Post Overlay block in all versions up to, and including, 3.7.0 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security@wordfence.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 6.4,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 3.1,
"impactScore": 2.7
}
]
},
"references": [
{
"url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3074758%40content-views-query-and-display-post-page&new=3074758%40content-views-query-and-display-post-page&sfp_email=&sfph_mail=",
"source": "security@wordfence.com"
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/5666da4a-ffb6-47ed-8b48-a80f09dd2501?source=cve",
"source": "security@wordfence.com"
}
]
}

View File

@ -0,0 +1,51 @@
{
"id": "CVE-2024-3988",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-04-25T08:15:07.813",
"lastModified": "2024-04-25T08:15:07.813",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "The Sina Extension for Elementor (Slider, Gallery, Form, Modal, Data Table, Tab, Particle, Free Elementor Widgets & Elementor Templates) plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's Sina Fancy Text Widget in all versions up to, and including, 3.5.2 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security@wordfence.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 6.4,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 3.1,
"impactScore": 2.7
}
]
},
"references": [
{
"url": "https://plugins.trac.wordpress.org/browser/sina-extension-for-elementor/tags/3.5.1/widgets/basic/sina-fancytext.php#L475",
"source": "security@wordfence.com"
},
{
"url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3076054%40sina-extension-for-elementor&new=3076054%40sina-extension-for-elementor&sfp_email=&sfph_mail=",
"source": "security@wordfence.com"
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/78b24567-c185-4bef-b025-016b091be2e4?source=cve",
"source": "security@wordfence.com"
}
]
}

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2024-4173",
"sourceIdentifier": "sirt@brocade.com",
"published": "2024-04-25T08:15:07.977",
"lastModified": "2024-04-25T08:15:07.977",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "\nA vulnerability in Brocade SANnav ova versions before Brocade SANnav v2.3.1 and v2.3.0a exposes Kafka in the wan interface.\n\nThe vulnerability could allow an unauthenticated attacker to perform various attacks, including DOS, the Brocade SANnav appliance.\n\n"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "sirt@brocade.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "LOW",
"availabilityImpact": "HIGH",
"baseScore": 9.4,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.5
}
]
},
"weaknesses": [
{
"source": "sirt@brocade.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-200"
}
]
}
],
"references": [
{
"url": "https://support.broadcom.com/external/content/SecurityAdvisories/0/23285",
"source": "sirt@brocade.com"
}
]
}

View File

@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update
```plain
2024-04-25T08:00:41.676283+00:00
2024-04-25T10:00:39.344246+00:00
```
### Most recent CVE Modification Timestamp synchronized with NVD
```plain
2024-04-25T07:15:45.270000+00:00
2024-04-25T09:15:08.237000+00:00
```
### Last Data Feed Release
@ -33,41 +33,34 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
### Total Number of included CVEs
```plain
246721
246733
```
### CVEs added in the last Commit
Recently added CVEs: `10`
Recently added CVEs: `12`
- [CVE-2023-6237](CVE-2023/CVE-2023-62xx/CVE-2023-6237.json) (`2024-04-25T07:15:45.270`)
- [CVE-2024-23527](CVE-2024/CVE-2024-235xx/CVE-2024-23527.json) (`2024-04-25T06:15:54.657`)
- [CVE-2024-26923](CVE-2024/CVE-2024-269xx/CVE-2024-26923.json) (`2024-04-25T06:15:57.160`)
- [CVE-2024-26924](CVE-2024/CVE-2024-269xx/CVE-2024-26924.json) (`2024-04-25T06:15:57.407`)
- [CVE-2024-26925](CVE-2024/CVE-2024-269xx/CVE-2024-26925.json) (`2024-04-25T06:15:57.590`)
- [CVE-2024-26926](CVE-2024/CVE-2024-269xx/CVE-2024-26926.json) (`2024-04-25T06:15:57.780`)
- [CVE-2024-2907](CVE-2024/CVE-2024-29xx/CVE-2024-2907.json) (`2024-04-25T06:15:58.887`)
- [CVE-2024-29205](CVE-2024/CVE-2024-292xx/CVE-2024-29205.json) (`2024-04-25T06:15:57.923`)
- [CVE-2024-4159](CVE-2024/CVE-2024-41xx/CVE-2024-4159.json) (`2024-04-25T06:16:00.560`)
- [CVE-2024-4161](CVE-2024/CVE-2024-41xx/CVE-2024-4161.json) (`2024-04-25T06:16:01.427`)
- [CVE-2023-51478](CVE-2023/CVE-2023-514xx/CVE-2023-51478.json) (`2024-04-25T08:15:07.160`)
- [CVE-2023-51482](CVE-2023/CVE-2023-514xx/CVE-2023-51482.json) (`2024-04-25T09:15:06.880`)
- [CVE-2023-51484](CVE-2023/CVE-2023-514xx/CVE-2023-51484.json) (`2024-04-25T09:15:07.143`)
- [CVE-2024-22144](CVE-2024/CVE-2024-221xx/CVE-2024-22144.json) (`2024-04-25T09:15:07.360`)
- [CVE-2024-25917](CVE-2024/CVE-2024-259xx/CVE-2024-25917.json) (`2024-04-25T09:15:07.550`)
- [CVE-2024-30560](CVE-2024/CVE-2024-305xx/CVE-2024-30560.json) (`2024-04-25T09:15:07.740`)
- [CVE-2024-31266](CVE-2024/CVE-2024-312xx/CVE-2024-31266.json) (`2024-04-25T09:15:07.927`)
- [CVE-2024-3733](CVE-2024/CVE-2024-37xx/CVE-2024-3733.json) (`2024-04-25T09:15:08.237`)
- [CVE-2024-3893](CVE-2024/CVE-2024-38xx/CVE-2024-3893.json) (`2024-04-25T08:15:07.490`)
- [CVE-2024-3929](CVE-2024/CVE-2024-39xx/CVE-2024-3929.json) (`2024-04-25T08:15:07.657`)
- [CVE-2024-3988](CVE-2024/CVE-2024-39xx/CVE-2024-3988.json) (`2024-04-25T08:15:07.813`)
- [CVE-2024-4173](CVE-2024/CVE-2024-41xx/CVE-2024-4173.json) (`2024-04-25T08:15:07.977`)
### CVEs modified in the last Commit
Recently modified CVEs: `12`
Recently modified CVEs: `3`
- [CVE-2023-3758](CVE-2023/CVE-2023-37xx/CVE-2023-3758.json) (`2024-04-25T06:15:50.693`)
- [CVE-2023-45288](CVE-2023/CVE-2023-452xx/CVE-2023-45288.json) (`2024-04-25T06:15:52.357`)
- [CVE-2023-52575](CVE-2023/CVE-2023-525xx/CVE-2023-52575.json) (`2024-04-25T06:15:52.767`)
- [CVE-2024-0713](CVE-2024/CVE-2024-07xx/CVE-2024-0713.json) (`2024-04-25T06:15:53.647`)
- [CVE-2024-2004](CVE-2024/CVE-2024-20xx/CVE-2024-2004.json) (`2024-04-25T06:15:58.303`)
- [CVE-2024-23638](CVE-2024/CVE-2024-236xx/CVE-2024-23638.json) (`2024-04-25T06:15:55.550`)
- [CVE-2024-2398](CVE-2024/CVE-2024-23xx/CVE-2024-2398.json) (`2024-04-25T06:15:58.640`)
- [CVE-2024-24498](CVE-2024/CVE-2024-244xx/CVE-2024-24498.json) (`2024-04-25T06:15:56.283`)
- [CVE-2024-25111](CVE-2024/CVE-2024-251xx/CVE-2024-25111.json) (`2024-04-25T06:15:56.810`)
- [CVE-2024-31497](CVE-2024/CVE-2024-314xx/CVE-2024-31497.json) (`2024-04-25T06:15:59.070`)
- [CVE-2024-3177](CVE-2024/CVE-2024-31xx/CVE-2024-3177.json) (`2024-04-25T06:16:00.237`)
- [CVE-2024-32462](CVE-2024/CVE-2024-324xx/CVE-2024-32462.json) (`2024-04-25T06:15:59.887`)
- [CVE-2023-6237](CVE-2023/CVE-2023-62xx/CVE-2023-6237.json) (`2024-04-25T07:15:45.270`)
- [CVE-2024-0151](CVE-2024/CVE-2024-01xx/CVE-2024-0151.json) (`2024-04-25T08:15:07.420`)
- [CVE-2024-31380](CVE-2024/CVE-2024-313xx/CVE-2024-31380.json) (`2024-04-25T09:15:08.127`)
## Download and Usage

View File

@ -226810,7 +226810,7 @@ CVE-2023-37576,0,0,b3086c097e8f97ccae74b878d2a502ec848400a667c99182b03cba4819265
CVE-2023-37577,0,0,3d47904e6714d7a055f1c3c55b7d81ffcc7991c99e251b7d10413eaa6b52422a,2024-04-09T21:15:12.807000
CVE-2023-37578,0,0,ba12ca5aa2e270904d2e8b59157d3f65b05f5a4d93e555484e17817f5052ca06,2024-04-09T21:15:12.900000
CVE-2023-37579,0,0,162475d9c10c03bb62253b4c06df5b03f8c0200b6108cb5a121856967edaa5b2,2023-07-20T17:37:20.790000
CVE-2023-3758,0,1,6dcfd0ba75ff066aaefc5f8b1630f95b7f8544824d35ae075f5b382cdf168fdb,2024-04-25T06:15:50.693000
CVE-2023-3758,0,0,6dcfd0ba75ff066aaefc5f8b1630f95b7f8544824d35ae075f5b382cdf168fdb,2024-04-25T06:15:50.693000
CVE-2023-37580,0,0,bae9f92d653d361aeb909d5e42dce31c2da6a6bba3b212aa2530c8274e5b606d,2023-12-22T15:16:27.810000
CVE-2023-37581,0,0,98103a9a7ec0c92020dfa9a697e6c5df21ed2d932a7d784c6317de2f609cd32a,2023-11-07T04:17:00.163000
CVE-2023-37582,0,0,32e5b7f8ae6b98ea7fa4c9ee1081e939ae14653ee66f31f201bc834b4e2b62d2,2023-07-20T02:11:34.330000
@ -231889,7 +231889,7 @@ CVE-2023-45284,0,0,8ac30ea66f71a985fe5bb7a9cd5117880ebafd3abf8acdf27e1d0743d36c9
CVE-2023-45285,0,0,16ff5e8b79188755e5a7a8fbe86dba64b6537f7e34fac57b399b003651fea1da,2024-01-20T04:15:08.013000
CVE-2023-45286,0,0,aa66fbaae1e0c30c7595917e56819be1bbb9d239333872f0ea607184384ab322,2024-01-04T19:15:08.737000
CVE-2023-45287,0,0,3d0bb90ad6b09d1d9f3bb34a82b2143afa61d21142b51c29073fbf468a053219,2024-01-12T14:15:48.310000
CVE-2023-45288,0,1,62fb09c9e2a24c0431cbe061401f4a7fcbd1146ace36d040283bec5fb28a3b06,2024-04-25T06:15:52.357000
CVE-2023-45288,0,0,62fb09c9e2a24c0431cbe061401f4a7fcbd1146ace36d040283bec5fb28a3b06,2024-04-25T06:15:52.357000
CVE-2023-45289,0,0,3447b599eb83a7083c6a73e53671fb2c29c7d970990d5513c7349cd0a7644fe2,2024-03-29T13:15:13.893000
CVE-2023-45290,0,0,d5f93b7a8b1619be03e3f67168cb7e7212bf0df22f898247e2ec2a4b96561862,2024-03-29T13:15:13.957000
CVE-2023-45292,0,0,a4390d55b5d08527c3f372908b1fbe1aa0cdd99af7a0f4f36d5f5803a9a43941,2023-12-14T16:26:54.007000
@ -235834,8 +235834,11 @@ CVE-2023-51473,0,0,c717b541715384069e4e1f234809a3353cecd65454fe611c8ad98ac99f14b
CVE-2023-51474,0,0,f6ae408c3a922cfdfc785e0a99ab0da323d66aa2473d9214f464f168abaf8486,2024-03-17T22:38:29.433000
CVE-2023-51475,0,0,3b22b7562ec7c62760bcb36076150336b816419fb1f4781f9eda477c8bacc5ab,2024-01-08T17:09:53.473000
CVE-2023-51477,0,0,4f67f178a6452a49208e4b34c27938dce123af4b2194e32c4684df74c0e3ddfc,2024-04-24T17:16:50.397000
CVE-2023-51478,1,1,d95bd80c2189309451ce0328f4070da16ebe8aa874e07e024cedc5c96915ced7,2024-04-25T08:15:07.160000
CVE-2023-5148,0,0,b9cccef0db87619d4d8a66efab7c8a65309c4d041d7c92a0d212f6da340fb299,2024-04-11T01:22:53.670000
CVE-2023-51480,0,0,f8823f539951e34f7db1aecf23364bc135467d8a0c59ff2384ab35a6a58cc37b,2024-02-15T21:06:20.197000
CVE-2023-51482,1,1,88f7dac76b71eb806f6bb357dc905c8dfb9823e04c69aa6647fe35a5b7a190a6,2024-04-25T09:15:06.880000
CVE-2023-51484,1,1,0bd652f8cafc530bbdd0cf00956ec32b9fce8fd128b051dbaf378ace36ea3beb,2024-04-25T09:15:07.143000
CVE-2023-51485,0,0,b45b2ac9de0fefa98f7d5095938cdcfb38d785140d230b3d93a0e5b7be6e9281,2024-02-15T06:26:27.350000
CVE-2023-51486,0,0,9229ace1c5a78534c4a29354f69eed7eb15a32aa9ba93f26a4ff614b16fec211,2024-03-17T22:38:29.433000
CVE-2023-51487,0,0,847a2f263199d3d0b7e3580ccc5065b94cfbf72d7c5fef0109251fbebd97904b,2024-03-17T22:38:29.433000
@ -236561,7 +236564,7 @@ CVE-2023-52571,0,0,ae0d469323426c684aa7e48d06518993ef8a4df83b5f3f497ffd98c3564e3
CVE-2023-52572,0,0,c720014f64ce6d355fc7163a634fc6b5add37c7f00cf73f90838d23307eda4f3,2024-03-04T13:58:23.447000
CVE-2023-52573,0,0,86b3c8dfed5fbd27f1aed875d2cce315bbf595ce10fe7fb7daa681006df276a7,2024-03-04T13:58:23.447000
CVE-2023-52574,0,0,f0679357774d7f85109d4a03b2d5f958bccf9db9e04390fd2145b547520b0862,2024-03-04T13:58:23.447000
CVE-2023-52575,0,1,64c9dcb5008b2ba32e7902eef2b14fb88a695d3f6b35b4fa73ac4bfee47ac42b,2024-04-25T06:15:52.767000
CVE-2023-52575,0,0,64c9dcb5008b2ba32e7902eef2b14fb88a695d3f6b35b4fa73ac4bfee47ac42b,2024-04-25T06:15:52.767000
CVE-2023-52576,0,0,0b4c1bba09bfc68a1aff8c4e61a45bb987173b59b3ebf1d30c2f3124e00c39fe,2024-03-04T13:58:23.447000
CVE-2023-52577,0,0,d347543ecb98a15cfae2d3117c8d2e88873fbf710fd58d4986eaa1ac0f204ea3,2024-04-04T14:15:09.200000
CVE-2023-52578,0,0,8a45e2debe9cd054247eae536813d2bb1415e8d2f39df4f7c678fa7c94c2e5f4,2024-03-04T13:58:23.447000
@ -237523,7 +237526,7 @@ CVE-2023-6233,0,0,219eace3a1a0153d9e9c47c5f968398c12850df06483ce044fb78774d98c68
CVE-2023-6234,0,0,c300a8904deed01fc5477fc97fa27627c8d1f6d71059c668e1fb941f32fdf7e2,2024-02-13T19:51:46.740000
CVE-2023-6235,0,0,a6ac280c87945b3531740d074fb7f02bafe0fd764523c0dc65a87b2c28ffc24b,2023-11-29T16:59:51.970000
CVE-2023-6236,0,0,c746200290431ebe52c336c97f229880dd537f5eeffbab0aaed59ac6b0e48cbf,2024-04-10T13:23:38.787000
CVE-2023-6237,1,1,f97e6b6b4736230aafd36757a81d2a566a3d4fe0d8f0a8bb7f6980870866f1ec,2024-04-25T07:15:45.270000
CVE-2023-6237,0,1,3fd833d8df196076b15248237a7e6cb9d5598d7d6e10626d77ae121cb0a3fbae,2024-04-25T07:15:45.270000
CVE-2023-6238,0,0,7332193d1454e7405dd3270d745aa7f762b874d0f84c51906784a637ceb0212d,2024-02-07T00:15:55.240000
CVE-2023-6239,0,0,6ce1b576ddd7c9169d0997e75fde3efd606153edbf61fba1116d733c98bbf90d,2023-12-04T19:06:20.213000
CVE-2023-6240,0,0,9f82f7462b3110d2d963e8af8e7c4ae7d74cf243233e0832a0fe614b539f6ea4,2024-04-18T04:15:09.903000
@ -238406,7 +238409,7 @@ CVE-2024-0080,0,0,6c0d206dd91620b9eed7dc804b37cabf92e6b94b99ac768289c8d5abe0e718
CVE-2024-0081,0,0,7224cfd553042ae01e2abfd02f661fee4ab9e15edf612773f3a2b6523001079f,2024-04-08T18:49:25.863000
CVE-2024-0082,0,0,2f8bf036b6ccf9a376740e76b27024fe830e6e0ae585ea5b083515d36ff830e7,2024-04-09T12:48:04.090000
CVE-2024-0083,0,0,ab832b2e89667613797d661d736b6cac31cc3f4854c5fe470b78e46bd7a9f856,2024-04-09T12:48:04.090000
CVE-2024-0151,0,0,16859428358b8f81e7e0332f3c821014ec6b4095d4fbee723889ec26f5045346,2024-04-24T19:58:40.710000
CVE-2024-0151,0,1,aafc841cfb528b9ef4d150e11c8565679b9331c9ad5bf3569e38f74d72962c86,2024-04-25T08:15:07.420000
CVE-2024-0154,0,0,fee6d0edd38400fe9a2f331d67a355be9bc81701717352554939ef10dafbbf73,2024-03-13T18:15:58.530000
CVE-2024-0155,0,0,56d3003aea28bbff1e776f33de697fc847d720d7a8270931f6c22f264f5611eb,2024-03-04T13:58:23.447000
CVE-2024-0156,0,0,47a5ee4f12284e0f109441891942aa0eb589b2387e172b6366b6741bcabc51b4,2024-03-04T13:58:23.447000
@ -238898,7 +238901,7 @@ CVE-2024-0708,0,0,17fc428e1c33ccb3bd291cbe7e1a8679d97ec9168980ea2b9dd3853dce87d0
CVE-2024-0709,0,0,0e357f6774a7394257ae883615c0144309fd483508b911088763fabcc344a7b0,2024-02-13T17:12:33.200000
CVE-2024-0711,0,0,5a6e71ae09dbf6e25f393a319ce8ef1fa1768d44ec589fe8a2215806a5622835,2024-03-18T19:40:00.173000
CVE-2024-0712,0,0,780b7d7fc40ca1e3f6295c4acb5190097e77c352cc0855f3f8c7ac9b96328284,2024-04-11T01:24:06.757000
CVE-2024-0713,0,1,4a843e0f08eef16fea795d4d12770feb2c9845a852ebf78c56800bf69a5bb798,2024-04-25T06:15:53.647000
CVE-2024-0713,0,0,4a843e0f08eef16fea795d4d12770feb2c9845a852ebf78c56800bf69a5bb798,2024-04-25T06:15:53.647000
CVE-2024-0714,0,0,8a87f5e0139b8bdc524a91e6571278264e9a2393fbcb7fcd0000c85e14ef45ee,2024-04-11T01:24:06.943000
CVE-2024-0715,0,0,64c1f967ff09f86cf8d386ebc94fd0da7a975f436999a1d0b65b9fab11c7a283,2024-02-20T19:50:53.960000
CVE-2024-0716,0,0,ca5b7b5752f5a68cbd5c671183e6cb8ae9051426bcc87e53d4f23732ac01891e,2024-04-11T01:24:07.043000
@ -239962,7 +239965,7 @@ CVE-2024-20036,0,0,7016446f74f2148ba6dea33766b6827610d502eb9c245e0a1c0d7d040f7a8
CVE-2024-20037,0,0,01128565246092f61c328423c961d180f319d8569a52c3d96eb198cb92edb3a4,2024-03-04T13:58:23.447000
CVE-2024-20038,0,0,ca6160c9ee802f2f7025c409725accb336619b3068c3b423047000c1c0be64c1,2024-03-04T13:58:23.447000
CVE-2024-20039,0,0,9a1aec6c692c7ea1a32f8f2a06b073157ba8250ebca50606ffe9369bebc6c14d,2024-04-01T12:49:09.583000
CVE-2024-2004,0,1,6474ef26a58a63bf0cb46e7f72a79c708e14ade9d9eff711867b201f5792fe40,2024-04-25T06:15:58.303000
CVE-2024-2004,0,0,6474ef26a58a63bf0cb46e7f72a79c708e14ade9d9eff711867b201f5792fe40,2024-04-25T06:15:58.303000
CVE-2024-20040,0,0,5b510d8ce08224e8d7209fa602ef8f1b04d1879dc497a7da7b4292a3ccd7d3f4,2024-04-01T12:49:09.583000
CVE-2024-20041,0,0,67d5a777a7e1478cbd690b3b02e76ec18ef42d4bf0e75f9321f18c25486f2416,2024-04-01T12:49:09.583000
CVE-2024-20042,0,0,c37c5a81be5d4d69cb8134a6f40bb33d66d6ee794131c7efbee5ef8b7bcaf0da,2024-04-01T12:49:09.583000
@ -241020,6 +241023,7 @@ CVE-2024-22140,0,0,7531d09a0f968b5d2b1e4e11b41757eb318c7a2cf822561fb39f6b355e958
CVE-2024-22141,0,0,82c169c1dd57a019cf6b1fa659a8204ad1d91b953c7a71671ed9e1905b8d4a0f,2024-01-30T20:18:38.460000
CVE-2024-22142,0,0,8637a6c60024e32494bb4696b4c838486f6176e902ea0c9e3d4b4fb3a1805b63,2024-01-19T19:59:49.717000
CVE-2024-22143,0,0,adccc14524111072286cffd424e6560dcad4b1e2e3b7161d3a46107433633930,2024-02-03T00:24:07.510000
CVE-2024-22144,1,1,252b4f2b7d870ce8636523e623089fc030194c61f182b05f207035c7bf5113c8,2024-04-25T09:15:07.360000
CVE-2024-22146,0,0,8a44d2f783f8546b1d5e9fc855a9089455ad2fafc8ab97139269e47d5d414f01,2024-02-06T15:51:01.533000
CVE-2024-22147,0,0,0b0e8745bfea72bbfa1b747625dc2bbdeefcf97593cd8b6f4d26d36641e1e2b9,2024-02-01T04:13:36.740000
CVE-2024-22148,0,0,eb4d4a193f2153f5fe3df79c79a6ba27f52e6d1edc409f8c9f4419f061b12f8c,2024-02-03T00:30:56.520000
@ -241714,7 +241718,7 @@ CVE-2024-23520,0,0,6231203085a20b2d4cba5048549458f88829476b5e6533d86ed85baf0d8a6
CVE-2024-23523,0,0,13316361d7846e6bf749bdea54d907de9d96954e12edb4899346015be33f686c,2024-03-17T22:38:29.433000
CVE-2024-23525,0,0,d87ac004ae364b7188eb5b5618bc7a0354a8aea809beaa37863d308d19bc3d3a,2024-01-27T22:15:08.360000
CVE-2024-23526,0,0,30d606f0eba5761919592b8a5008d0e69ca508d137995732983dadd8b2152fdd,2024-04-19T13:10:25.637000
CVE-2024-23527,1,1,63edf75523f9ffcc36859a789808908087c440c7f2023859bf0337a9e2d738d9,2024-04-25T06:15:54.657000
CVE-2024-23527,0,0,63edf75523f9ffcc36859a789808908087c440c7f2023859bf0337a9e2d738d9,2024-04-25T06:15:54.657000
CVE-2024-23528,0,0,849b6d3d79c8413a2d280ebe68004e7b6c77a93efb497d64b5a385ef1fbb2d19,2024-04-19T13:10:25.637000
CVE-2024-23529,0,0,aaeaf2f05c047c5ba120f59b4e7397229e9960e52723bb51b5eed42c58b65abf,2024-04-19T13:10:25.637000
CVE-2024-2353,0,0,7b6a09da18e3356abf43fe748f30abce941d0a80813a4afe868b4c3998caa4f6,2024-04-11T01:25:22.793000
@ -241776,7 +241780,7 @@ CVE-2024-23634,0,0,d2085c6c44ef7ae46bb5b74e6150164401643f2806df5f22a3878ed03baa2
CVE-2024-23635,0,0,09525ad38a64fdeb9be1ffe96b44d7c6fff146dbf26d2e4ce636be3a6251bc00,2024-02-10T01:38:06.613000
CVE-2024-23636,0,0,d19520e32e522045a24cd114a132c9f76c4938aca57ea0abababe2cd2db0420a,2024-02-01T20:17:34.393000
CVE-2024-23637,0,0,4ce99e3ba9e4e35b7661a207da02c05f527b0cf05a4b61e598a39622467ece35,2024-02-08T01:38:50.143000
CVE-2024-23638,0,1,d4dd909884536372da54328356fb9c6f3e36b0517de50772b4d064b2b9c06cd8,2024-04-25T06:15:55.550000
CVE-2024-23638,0,0,d4dd909884536372da54328356fb9c6f3e36b0517de50772b4d064b2b9c06cd8,2024-04-25T06:15:55.550000
CVE-2024-23639,0,0,ab4bd76865c30ccb5c4f63dae1e0110a3965faca7b274f06d76083969d6a2548,2024-02-16T13:53:20.800000
CVE-2024-2364,0,0,457c41efec972187f08bbd26e3f97f15375ab8eb12149d9e4fad2f7a7cb685c1,2024-04-11T01:25:23.160000
CVE-2024-23640,0,0,6b8cfbb0f4f21626b8bed64e18e7e1c8dad4cae3816fbcbf23df4fb6c09099d2,2024-03-20T17:18:21.343000
@ -241999,7 +242003,7 @@ CVE-2024-23975,0,0,baeca8d4c06e1a18eea86da121d0a833b4b39a471498d57fc82722b025e37
CVE-2024-23976,0,0,9685f4f7ec189a5d86ae9e492003126f133b025f9dbebea5b2080780048e5888,2024-02-14T18:04:45.380000
CVE-2024-23978,0,0,e1857c353eed9f61fa476b5e0089cb191d24c6fab4326dd88df47ad6e74b90ff,2024-04-11T01:24:50.970000
CVE-2024-23979,0,0,3d911dc61bf5e87f1ad51f604a1f73c131a2123fd076410323dd618c86bb88f2,2024-02-14T18:04:45.380000
CVE-2024-2398,0,1,35b62d7ed7f94f24619dd248b0c14f97293390511d6f92686838c3c90d9ea751,2024-04-25T06:15:58.640000
CVE-2024-2398,0,0,35b62d7ed7f94f24619dd248b0c14f97293390511d6f92686838c3c90d9ea751,2024-04-25T06:15:58.640000
CVE-2024-23982,0,0,d52003f4ccb21aa01a008299898f0d6a9180af3e2a0a80305a9ab57dd3077531,2024-02-14T18:04:45.380000
CVE-2024-23985,0,0,258f4468fe9f37b9a6c2732e57d96bdd80375c2f3603af19ad729cbcccfb8b72,2024-02-01T17:33:41.777000
CVE-2024-2399,0,0,f2ed8991b7f5b58c5d0da553893384268ad252865f28d0238c77e027b3f6c098,2024-03-15T12:53:06.423000
@ -242186,7 +242190,7 @@ CVE-2024-24494,0,0,81f8461d94de9e292cd8ff42a2c2a5da1fbe2233d78d68b156c60eaf9ab5a
CVE-2024-24495,0,0,85b476ee903b981e44768f930a7e6f08423d0eeff2df2b9bb45af20131c5e4c5,2024-02-22T03:38:09.717000
CVE-2024-24496,0,0,d3af8fed4f9dc5ab516231a6a765383283bf96cc93c20c6077308e5e48b88c15,2024-02-22T03:38:14.123000
CVE-2024-24497,0,0,72eb9f3d22bca6c65aa4420d2a23ecb69ba14f77ada41d9988b1135bc93d8885,2024-04-24T21:15:46.997000
CVE-2024-24498,0,1,be84e5243b37a8ddad28600ec94a380db6f73d91cc542b196275804312fbe485,2024-04-25T06:15:56.283000
CVE-2024-24498,0,0,be84e5243b37a8ddad28600ec94a380db6f73d91cc542b196275804312fbe485,2024-04-25T06:15:56.283000
CVE-2024-24499,0,0,0358171fa488104ce97d732c7fae3c38624eaf7da8d6a75a6fd0c84d38db29bf,2024-04-24T21:15:47.147000
CVE-2024-2450,0,0,c6274f13679a48de3cbfa808b97d39015aae575e0cec8084e13c5a7baf01b69a,2024-03-15T12:53:06.423000
CVE-2024-24506,0,0,e61e773fa9130f4d91d19f538e9680b88b3d221c4a4c885492956cab65f5dd2f,2024-04-03T12:38:04.840000
@ -242527,7 +242531,7 @@ CVE-2024-25108,0,0,2f3b0912c45a14bc4609391cde835a7bde0bd98f58e5cc253a1a3a5d46e14
CVE-2024-25109,0,0,66bef0024d89c0196f311e07e8ca5885fe47e2eb23f582eff05d8874e7ab5e40,2024-02-11T22:29:15.837000
CVE-2024-2511,0,0,862c12e603950cb6958ada76ff8c1cf792934cb09551cfc4917e14719217861c,2024-04-08T18:48:40.217000
CVE-2024-25110,0,0,1882d1c872d6fb46fba6f5e40e671a2fda6881ec6c33fd95f706ae7cf820760c,2024-02-12T20:39:09.773000
CVE-2024-25111,0,1,83bc5a39cc9e4d787d31ecb746cf71bbb4667eaff7db56d1196cb0a0e0e84f50,2024-04-25T06:15:56.810000
CVE-2024-25111,0,0,83bc5a39cc9e4d787d31ecb746cf71bbb4667eaff7db56d1196cb0a0e0e84f50,2024-04-25T06:15:56.810000
CVE-2024-25112,0,0,9f92b56982d5d0e159eb7030e033a87c46cac6fe6908722221c7e2c374361051,2024-02-13T14:01:40.577000
CVE-2024-25113,0,0,e5d677582d1aad971970a68e649e33cfa2ee5186bf6cd06840ccc711efadc8c5,2024-02-17T22:15:46.660000
CVE-2024-25114,0,0,ecee9bf310f42cdc25e42eb7e8e0873fc105e6d49306efcf1c5e89293138d56c,2024-03-12T12:40:13.500000
@ -242951,6 +242955,7 @@ CVE-2024-25913,0,0,f836a846f4079f05601564732cb9a5408cfd48a38708177104907308615f9
CVE-2024-25914,0,0,6c21c235c508fdd4e37939a7918e64e3dd4e50979a576bdc305d842a25f11a05,2024-02-13T14:01:07.747000
CVE-2024-25915,0,0,2b3eb3b61519c3cc7ec9c696d86f766a5ba91455b2def2592d7df0099d9b76fa,2024-02-23T16:14:43.447000
CVE-2024-25916,0,0,9a157d9e9f7c2a47535d6fe7b72d4b8297c899743fb7757d707e251d0e0cee3c,2024-03-15T16:26:49.320000
CVE-2024-25917,1,1,8bfc3970fc7ef8f76b99ffb0454019d0824e0f1bba8d867fa50e33f8e5788128,2024-04-25T09:15:07.550000
CVE-2024-25918,0,0,94384e507f0050673085096762ed49a5498803fb71358620832f7751f166af55,2024-04-03T12:38:04.840000
CVE-2024-25919,0,0,10e90b733b4139783c8edab5a7be80b4a6a1310bbbe6bd2d191c5b664c04198b,2024-03-15T16:26:49.320000
CVE-2024-2592,0,0,234860397f53316d0fc14e6428f643653c1a443db32886f209582c59f6a746af,2024-03-18T19:40:00.173000
@ -243708,10 +243713,10 @@ CVE-2024-2692,0,0,aefc05ddca23ffc90de039367cc7fed9a06f50bd32c460cfe2bbf1c8645c8f
CVE-2024-26920,0,0,8ad9dc4497d0ab325621ba9253d9bafe6f0648f6e0dcc53db528add7b30825c1,2024-04-17T16:51:07.347000
CVE-2024-26921,0,0,76d623900726b55efb66263c05dcf2e665a9ce9fb4f9ecc19bf3b35e90cf98c7,2024-04-18T13:04:28.900000
CVE-2024-26922,0,0,568c54f02287b1d7fb902390d617a12e7e604e44948c34f27405b196aec957ed,2024-04-24T13:39:42.883000
CVE-2024-26923,1,1,02b3de685ec70515e28418b760f8c5ab4b3f70fb7ffdd3a5d7213c101b74e0f2,2024-04-25T06:15:57.160000
CVE-2024-26924,1,1,db91767fd485e7eac8264999243b81539214561b84e5f7919cbe36e924ada6dc,2024-04-25T06:15:57.407000
CVE-2024-26925,1,1,7191f1d57857a48973054c8fff4350f3d49594716a8dc0edff1591c3abf52ec4,2024-04-25T06:15:57.590000
CVE-2024-26926,1,1,0aeef61aa8bdc066dc3afce0653a77355631037f35cbf158a4f1e8bcbcf843ee,2024-04-25T06:15:57.780000
CVE-2024-26923,0,0,02b3de685ec70515e28418b760f8c5ab4b3f70fb7ffdd3a5d7213c101b74e0f2,2024-04-25T06:15:57.160000
CVE-2024-26924,0,0,db91767fd485e7eac8264999243b81539214561b84e5f7919cbe36e924ada6dc,2024-04-25T06:15:57.407000
CVE-2024-26925,0,0,7191f1d57857a48973054c8fff4350f3d49594716a8dc0edff1591c3abf52ec4,2024-04-25T06:15:57.590000
CVE-2024-26926,0,0,0aeef61aa8bdc066dc3afce0653a77355631037f35cbf158a4f1e8bcbcf843ee,2024-04-25T06:15:57.780000
CVE-2024-2693,0,0,0523f248585c70810eb494560526f8a16efe419cf7f3014aa23838648b0d3e89,2024-04-10T13:23:38.787000
CVE-2024-2700,0,0,ec51b942504a96d4888f64f81c70906fd44973b0d1ace8e2f862241f82ce29e0,2024-04-17T20:15:08.240000
CVE-2024-2702,0,0,d714950951d2438da53d97b453b8470335efdb106b4a3aaafe4c816e98d263df,2024-03-20T13:00:16.367000
@ -244639,7 +244644,7 @@ CVE-2024-29062,0,0,4039e6b96e75b35756d0ae5e495115fc06020359b7d4ba01efde13442f9b2
CVE-2024-29063,0,0,9dd92692e86c18107436ef4a5c609dee7af8a065ae51bf02187ee7cc8285048a,2024-04-10T13:24:00.070000
CVE-2024-29064,0,0,6a31c4be5cdf5b4136f98ebcdea18ed590cfcb656650a646fb3bcb2e2a9235de,2024-04-10T13:24:00.070000
CVE-2024-29066,0,0,b033dec16249c47216f72affbb210c8ed478f17a804b8c831619777a2cc5b7fc,2024-04-10T13:24:00.070000
CVE-2024-2907,1,1,f116cd7c12eadc1b92a0cf0bda96e0d06e17e13c5b7c62dd0a12e75dffb498a8,2024-04-25T06:15:58.887000
CVE-2024-2907,0,0,f116cd7c12eadc1b92a0cf0bda96e0d06e17e13c5b7c62dd0a12e75dffb498a8,2024-04-25T06:15:58.887000
CVE-2024-29071,0,0,5ff903755374c23b025a98d3cc2b0f06ea188aa4151e3658c02fd385bc8b4fa8,2024-03-25T13:47:14.087000
CVE-2024-29074,0,0,9e8f322269475ed9cf88d107d6401cb08d7756267afe6b14bb883cfb51c03588,2024-04-02T12:50:42.233000
CVE-2024-29086,0,0,1ba59cf7e266064553649d504d13e7bbef5ec69a70b08610439516755a245119,2024-04-02T12:50:42.233000
@ -244732,7 +244737,7 @@ CVE-2024-29201,0,0,5033916f5c6e37ebfb2f1925ef22415c52e7214153fce901347173dc9b9eb
CVE-2024-29202,0,0,2407457fd23b926dc515687b0bc64391303eb3a1899c8635138115822d2488d1,2024-04-01T01:12:59.077000
CVE-2024-29203,0,0,132c3d83e906b655066bee1fc4d3f90e18def73beb9178e8cc6662be34f71a9c,2024-03-26T17:09:53.043000
CVE-2024-29204,0,0,ec859d0e8fa3a1772fb0be403427e1a00a2b3fa2a9c0decec9ddc0392ff924fb,2024-04-19T13:10:25.637000
CVE-2024-29205,1,1,9a6205020c5cea18233ed14267b4927d4544c2886f48d0bcbe5adf6aa209e86f,2024-04-25T06:15:57.923000
CVE-2024-29205,0,0,9a6205020c5cea18233ed14267b4927d4544c2886f48d0bcbe5adf6aa209e86f,2024-04-25T06:15:57.923000
CVE-2024-2921,0,0,6f7f3b512cf8e7465b0aea1823cce56bf608a3c1f40869feddab084c3da126e6,2024-04-09T19:15:38.423000
CVE-2024-29216,0,0,59c06798795d05e391cdd301154441d31362295e800c3b46a2b7bd83a3e2dbc0,2024-03-25T13:47:14.087000
CVE-2024-29217,0,0,6aea24c6a3b30090b34762347afd8fb6e2aa0ed6c7d8e921a0460a2ce19272af,2024-04-22T13:28:43.747000
@ -245391,6 +245396,7 @@ CVE-2024-30556,0,0,f1da61d39a2aaf955621919b0301fa9315dc388c72c47a5c5e3e3f6db8419
CVE-2024-30557,0,0,7e51550c5d84adae681c592a59742ffb76e054dc707c58b718a0779baf95a502,2024-04-01T01:12:59.077000
CVE-2024-30558,0,0,c487b7e520828364fad2b07b74e7c881d68876bac73b13b5c83e0dfd99fede24,2024-04-01T01:12:59.077000
CVE-2024-30559,0,0,30881b502a00e1f0b4af436d9e17ecd66ddff7c4f60889245892c374e2f0a5b2,2024-04-01T01:12:59.077000
CVE-2024-30560,1,1,bba19f1a227fac96bb2a35e6b98384a021b2e05fd187d58b8e0da53bd32c3cd7,2024-04-25T09:15:07.740000
CVE-2024-30561,0,0,03bc43de8aff9caae9f72d908884b596acdfb45cf5a607bf3a61d00b78d408af,2024-04-01T01:12:59.077000
CVE-2024-30564,0,0,5f976284dee8adc6f867c668cd15b1659935b33cf9e4e2c130b09997500e7317,2024-04-18T18:25:55.267000
CVE-2024-30565,0,0,3c10663ebaef8c263e29a3b4fcd5ce9f26a98e5c4788e4f23a40d6624f566f6b,2024-04-04T12:48:41.700000
@ -245714,6 +245720,7 @@ CVE-2024-31262,0,0,2a9bcea0985fcaddd83893245a1b9fdc06643313b9df1f9c0a4fa4b5530f3
CVE-2024-31263,0,0,8f2890afedcc5d88494c2f6c1c034154cfb17cbd4a58e7b9478e628be5899862,2024-04-15T13:15:51.577000
CVE-2024-31264,0,0,c428617dd4afe9db95ef9b76c24f075b8caced8c4ee5d37fbc0432619eab40a5,2024-04-15T13:15:51.577000
CVE-2024-31265,0,0,73b53303ea2aa4510d95cf2e30536090282921bee1e4ddf1a7938462135cb9c0,2024-04-15T13:15:51.577000
CVE-2024-31266,1,1,572aff496d14246f188a5def7d09d331b6670ef56cc3dfa020b78be489d23e33,2024-04-25T09:15:07.927000
CVE-2024-31268,0,0,c260b292f4a0557333471e9a298a56aee0f8adfc83aea133a9470b069de5a2b5,2024-04-15T13:15:51.577000
CVE-2024-31269,0,0,d795c0acb6cd496e9d563a25767f3786288bcffe37844eb18ef033fe012b3b5a,2024-04-15T13:15:51.577000
CVE-2024-31271,0,0,d8228662c1440f14ee742f57032f82398c2055e3f352f6a0fc3cc42050b1d28d,2024-04-15T13:15:51.577000
@ -245782,7 +245789,7 @@ CVE-2024-31376,0,0,a5cd7decb3aa77b7c9dfe04828eefa3f789d2a15ced405db0122622e67c0d
CVE-2024-31378,0,0,46b9b8732b642d44c5d384306dfbdf69a9115d6098ab0a36faa3f26c08690e37,2024-04-15T13:15:31.997000
CVE-2024-31379,0,0,24f2bdeb0f1fb4bdf974899fe3fab2725f6d89406a545ae15090a05eaf09429a,2024-04-15T13:15:31.997000
CVE-2024-3138,0,0,952bef3e912c81d77b1f4b71c423532beae8fc55963465bb23e6cf3f92e09bdf,2024-04-11T01:25:54.493000
CVE-2024-31380,0,0,d044c4c41af2f67b9e10a84372a0da5aeb36e8aa53f4901f4d0660af26a33358,2024-04-05T14:15:10.487000
CVE-2024-31380,0,1,8c491764a24eea5e95145b5c62b11d20bc6b7216a5ecf959aad591fd2cab2e94,2024-04-25T09:15:08.127000
CVE-2024-31381,0,0,c9f8b2a8bb43383a6d2b44f4c2bce621630063d464575918f98bc752cd934627,2024-04-15T13:15:31.997000
CVE-2024-31382,0,0,fdb9f25138a089e37ff91a85435d838e4c79e5961d1d783d123309eb6b480c40,2024-04-15T13:15:31.997000
CVE-2024-31383,0,0,969012fe96b80e550a1eee7edc6c8a1c541c828926b828c1a67fc199b91a261d,2024-04-15T13:15:31.997000
@ -245839,7 +245846,7 @@ CVE-2024-3147,0,0,f05061e9d718b866336ceef3f83885c168403f8d387cf11dbe00ac736df358
CVE-2024-3148,0,0,12b6e15e00d964ce79c059c99a6c4df70691a740ad2056657f2d4843c78fc654,2024-04-11T01:25:55.337000
CVE-2024-31487,0,0,ffef7fcdc05bb476a1f2c02c71de4a76075ea7f0301d6a8889db629ce9b194c6,2024-04-10T13:24:22.187000
CVE-2024-31492,0,0,a251126d380ad734bdcae40155276c0c8cd0f78c057d6c232814179759c90bf9,2024-04-10T19:49:51.183000
CVE-2024-31497,0,1,23c23e83cd3e5e3826ba8927f878c1f2c2157a97c094b678ff08832d1ea37d93,2024-04-25T06:15:59.070000
CVE-2024-31497,0,0,23c23e83cd3e5e3826ba8927f878c1f2c2157a97c094b678ff08832d1ea37d93,2024-04-25T06:15:59.070000
CVE-2024-31498,0,0,db3c4e2337e3fccc66e084ef6016d8532925f451bef4124b0c2782f0c54d90b6,2024-04-08T00:15:08
CVE-2024-31503,0,0,a2a7c8d9eaf4775895950c76302a02326a8d6e67bb7d5ec85d9e8a8516e17053,2024-04-17T12:48:07.510000
CVE-2024-31506,0,0,8be7ef5b3e9d65e4bba9dd63e2b7475f0658a4b183369094a98038d4eee40099,2024-04-10T13:24:00.070000
@ -245883,7 +245890,7 @@ CVE-2024-31745,0,0,ca5ec1c092fce054af70d410aee2649145d7a18036901e509dca6c0e74718
CVE-2024-31750,0,0,ef2fe441e5dcedf0cb2da823df8fe57e9b7ada67d4a5ac9a3c649524c0ed2fa2,2024-04-19T13:10:25.637000
CVE-2024-31759,0,0,7081cd22df5b9e4148ecc914176fc1f6cc04366073f8b1e4eccd8dfe4f2b7d73,2024-04-17T12:48:07.510000
CVE-2024-31760,0,0,7b1e0b53a94a63e7f108110799c5f85524efc23136fc5608e680b8482e690959,2024-04-17T12:48:07.510000
CVE-2024-3177,0,1,7ac29b234ae819e7e031e3cd5f5b542db573e269bf19234225624f7ae92277ac,2024-04-25T06:16:00.237000
CVE-2024-3177,0,0,7ac29b234ae819e7e031e3cd5f5b542db573e269bf19234225624f7ae92277ac,2024-04-25T06:16:00.237000
CVE-2024-3178,0,0,e1b2edc538f836ffb506a17d476e0f961db2588242ddd1b2358ad3487cd818bf,2024-04-04T12:48:41.700000
CVE-2024-31783,0,0,39c4df7f07fa9e66dc5d42dd16bc0981c0d6511a0c96852796a6de0ccb03c2ac,2024-04-16T13:24:07.103000
CVE-2024-31784,0,0,0055eda0e2e2e3cebbac3d895c086f3674073feab99e847bee4ca99f9495a801,2024-04-16T13:24:07.103000
@ -246168,7 +246175,7 @@ CVE-2024-32458,0,0,63f1a521197c952f60c25934e7fd7aa3c850cb789e0fbf4fc9820f8232200
CVE-2024-32459,0,0,d31dd58136316769d63b8c95928f52be7e44ec5e5809b7af370f96f2aca14313,2024-04-23T12:52:26.253000
CVE-2024-32460,0,0,fc58ca5ee1d47b6a3e46a6c825461997a8b177fb47b38edb8831274c3530e6c9,2024-04-23T12:52:26.253000
CVE-2024-32461,0,0,3941d8bd271b020582637450c6381a991de4b9ffa39f4db030841834b9e2af51,2024-04-23T12:52:26.253000
CVE-2024-32462,0,1,f73d0de6041f829663fddce09f88dca46cdcc3d89024cfa5abf2ed880863f550,2024-04-25T06:15:59.887000
CVE-2024-32462,0,0,f73d0de6041f829663fddce09f88dca46cdcc3d89024cfa5abf2ed880863f550,2024-04-25T06:15:59.887000
CVE-2024-32463,0,0,1671e195c4973ac11a31a2856358d6fb78fc6f39ffe0d1d851cfbba7a397b723,2024-04-17T16:51:07.347000
CVE-2024-32466,0,0,0986c266c64cc5e4b364446dfb796a6c4980d483c5a2beb3f21f15de4cb49c0b,2024-04-18T18:25:55.267000
CVE-2024-3247,0,0,095afc187e8f976bc1a2eaa79a4c0328aa3c3e2487a10203585d8616775f8a4d,2024-04-03T12:38:04.840000
@ -246583,6 +246590,7 @@ CVE-2024-3720,0,0,548129ada226460eeed0bbe63afac7cb948fd16d011c5ffd900fa762526546
CVE-2024-3721,0,0,e2cd22ce24461bd25c9ec7cb92e927b75c559a9256137266b8480ef946c8e320,2024-04-15T13:15:31.997000
CVE-2024-3731,0,0,bdcc8f677627b7b108ec8e839a01e7cc6ba34354d6004394dff79046d7838f40,2024-04-19T13:10:25.637000
CVE-2024-3732,0,0,47b10b9e83ea0bac70990c3295c25b56cc73657af82bc6f5c1f4fd37930f5edb,2024-04-23T12:52:09.397000
CVE-2024-3733,1,1,7048fa2a6d6ace3c1b4095e840494448f8f41b7bf603ced5e4516b0d4a0f8872,2024-04-25T09:15:08.237000
CVE-2024-3735,0,0,9300dd852c0feb2e50ee641119a226f214818e2f2843b357387d0b439146ec2c,2024-04-15T13:15:31.997000
CVE-2024-3736,0,0,8e1e49a70c099a42d25fc2ef350c0eb9767073e2fa96b7ffe6bc4d265c3f8c23,2024-04-15T13:15:31.997000
CVE-2024-3737,0,0,1990edd10a050a438850658c5a42b3f737afd31a7356a3decab691dfe1bc7cad,2024-04-15T13:15:31.997000
@ -246663,6 +246671,7 @@ CVE-2024-3880,0,0,237e3bb93a0b113a1c50538806f68b5377561349bd4f47a9139ec72cd35641
CVE-2024-3881,0,0,9055ecf63e1aedc7e2787afc56e67bc831564d5ee15f418ef1b408c81c24bb16,2024-04-17T12:48:31.863000
CVE-2024-3882,0,0,846c922d5cf92347db05da515dc041ccc83bdcd548fefc386c188946857d0db7,2024-04-17T12:48:31.863000
CVE-2024-3889,0,0,c4039354ee4d81ce5faec2ce618c8f0af30c97c1ad1feeb689836cb585b438a6,2024-04-23T12:52:09.397000
CVE-2024-3893,1,1,d69befe4b9c26bab47130e2550d58417589158f460839d5dddb71000af5513de,2024-04-25T08:15:07.490000
CVE-2024-3900,0,0,5bafaa90d65e26f460054cb65a089d31ecb0030e0f85c3f0ee595a0cce123691,2024-04-17T20:08:21.887000
CVE-2024-3905,0,0,666ba6ab36ae43f19518f88ffcc3dc3578e7336eef9fa01b067c40b574dea570,2024-04-17T12:48:07.510000
CVE-2024-3906,0,0,dd9841bce880aeaa28c9d51ba9e314b7fd3abe4741e8e805c9e3a8477cebd832,2024-04-17T12:48:07.510000
@ -246673,10 +246682,12 @@ CVE-2024-3910,0,0,7d8aafa4b35964a72cdc3d08dd6c7b1615ef522d553c6c78d413b0e25fdc71
CVE-2024-3911,0,0,421a4146dc8ebd653de189c62bd791d7d943c2a07a6c17029678795c1bffde3d,2024-04-24T13:39:42.883000
CVE-2024-3914,0,0,97e3c2a1ceda5baa1eed65646997d7cab2203eabae8e05a9bf7340c2163a5004,2024-04-23T18:15:15.823000
CVE-2024-3928,0,0,114c97f372c53f33fe3b26cd091686f1eb78a3749714814b77901a77b62a0107,2024-04-18T13:04:28.900000
CVE-2024-3929,1,1,ec0312638fce606a6fa058aa3faff9ab28473bc202fdcc2f993c4e28ca45b633,2024-04-25T08:15:07.657000
CVE-2024-3931,0,0,adc8a79b07f48b35a9681a97a568e852ba1ef2cbd3b7271f585750c2d2c4216b,2024-04-18T13:04:28.900000
CVE-2024-3932,0,0,bce0f8b09e2fc4acc0cfce5940d57ce5f1e0384ac19f6c68ed218175688d8f12,2024-04-18T13:04:28.900000
CVE-2024-3948,0,0,427154a0226db385c08a1dc567a28e238ab290a5825189b73e5e958b25b296e5,2024-04-18T13:04:28.900000
CVE-2024-3979,0,0,9ef752ac5397ef4280bc4d9888fb417cb985331164bf90affafa759f391a2bfe,2024-04-19T18:29:53.040000
CVE-2024-3988,1,1,b29ac0147c5e6d0c49359de13f52e1f6a660eeb53737b8c0e3def81fd96a0f78,2024-04-25T08:15:07.813000
CVE-2024-4014,0,0,321273114f78ac117c4f7a805b62a62926b23a5461c74b2705504b7b2e21d158,2024-04-22T13:28:43.747000
CVE-2024-4017,0,0,9cc899b07e49c20d1d42511c9c41a533c695fd74b1701843b26490566c6e33e3,2024-04-22T13:28:50.310000
CVE-2024-4018,0,0,b534838241485b84911a40a305fab0f06a9a1281f09d3d1140d27d7f52b1a84d,2024-04-22T13:28:50.310000
@ -246718,5 +246729,6 @@ CVE-2024-4125,0,0,3d6596b014bbe4dce69e07812c33e0a8106135c037dd867848accf6d0e2704
CVE-2024-4126,0,0,fa3042759e9c18b41c31d059ae3a6e840ae3a94d23d5cba18cd7b09a72f8b2ac,2024-04-24T20:15:08.083000
CVE-2024-4127,0,0,9f3daf88f98aa9a5b11198255f78ca942b2ab5518927e04fb0a738be86bc8e99,2024-04-24T20:15:08.313000
CVE-2024-4141,0,0,cc9e710826c489d0ee22d4c7d9dd610e35e7eaed543a00c568b5470b560db2a2,2024-04-24T19:58:40.710000
CVE-2024-4159,1,1,83c5328a03798238305f310f084078d3cad1fb6c98d5d54e9a84a0987f74cd3f,2024-04-25T06:16:00.560000
CVE-2024-4161,1,1,2f77617960a9a5075b552af086040f8ad3ba69e67003299944e166633358fbf1,2024-04-25T06:16:01.427000
CVE-2024-4159,0,0,83c5328a03798238305f310f084078d3cad1fb6c98d5d54e9a84a0987f74cd3f,2024-04-25T06:16:00.560000
CVE-2024-4161,0,0,2f77617960a9a5075b552af086040f8ad3ba69e67003299944e166633358fbf1,2024-04-25T06:16:01.427000
CVE-2024-4173,1,1,4cf3c2b76ec47f8931ff62c340004180d5832fb2961611b4c2709afe37444bdc,2024-04-25T08:15:07.977000

Can't render this file because it is too large.