Auto-Update: 2024-06-04T14:00:38.127097+00:00

This commit is contained in:
cad-safe-bot 2024-06-04 14:03:33 +00:00
parent 7af11aff7a
commit 6b56aca921
36 changed files with 1807 additions and 151 deletions

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2023-49774",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-06-04T12:15:09.700",
"lastModified": "2024-06-04T12:15:09.700",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Exposure of Sensitive Information to an Unauthorized Actor vulnerability in J.N. Breetvelt a.K.A. OpaJaap WP Photo Album Plus allows Accessing Functionality Not Properly Constrained by ACLs.This issue affects WP Photo Album Plus: from n/a through 8.5.02.005."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 5.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 3.9,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-200"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/wp-photo-album-plus/wordpress-wp-photo-album-plus-plugin-8-5-02-005-ip-bypass-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2023-49822",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-06-04T12:15:09.933",
"lastModified": "2024-06-04T12:15:09.933",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Exposure of Sensitive Information to an Unauthorized Actor vulnerability in David Vongries Ultimate Dashboard allows Accessing Functionality Not Properly Constrained by ACLs.This issue affects Ultimate Dashboard: from n/a through 3.7.10."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 3.7,
"baseSeverity": "LOW"
},
"exploitabilityScore": 2.2,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-200"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/ultimate-dashboard/wordpress-ultimate-dashboard-plugin-3-7-10-secret-login-page-location-disclosure-on-multisites-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2023-49852",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-06-04T12:15:10.153",
"lastModified": "2024-06-04T12:15:10.153",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS) vulnerability in Vsourz Digital Responsive Slick Slider WordPress allows Code Injection.This issue affects Responsive Slick Slider WordPress: from n/a through 1.4."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "LOW",
"baseScore": 6.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 3.9,
"impactScore": 2.5
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-80"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/responsive-slick-slider/wordpress-responsive-slick-slider-wordpress-plugin-1-4-content-injection-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2023-51511",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-06-04T13:15:49.430",
"lastModified": "2024-06-04T13:15:49.430",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Improper Authentication vulnerability in Pluggabl LLC Booster Elite for WooCommerce allows Accessing Functionality Not Properly Constrained by ACLs.This issue affects Booster Elite for WooCommerce: from n/a before 7.1.3."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-287"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/booster-elite-for-woocommerce/wordpress-booster-elite-for-woocommerce-plugin-7-1-3-authenticated-production-creation-modification-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2023-51542",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-06-04T13:15:49.820",
"lastModified": "2024-06-04T13:15:49.820",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Authentication Bypass by Spoofing vulnerability in WPMU DEV Branda allows Accessing Functionality Not Properly Constrained by ACLs.This issue affects Branda: from n/a through 3.4.14."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 5.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 3.9,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-290"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/branda-white-labeling/wordpress-branda-plugin-3-4-14-ip-restriction-bypass-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2023-51543",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-06-04T13:15:50.047",
"lastModified": "2024-06-04T13:15:50.047",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Authentication Bypass by Spoofing vulnerability in Metagauss RegistrationMagic allows Accessing Functionality Not Properly Constrained by ACLs.This issue affects RegistrationMagic: from n/a through 5.2.5.0."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 5.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 3.9,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-290"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/custom-registration-form-builder-with-submission-manager/wordpress-registrationmagic-plugin-5-2-5-0-ip-limit-bypass-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2023-51544",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-06-04T13:15:50.277",
"lastModified": "2024-06-04T13:15:50.277",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Improper Control of Interaction Frequency vulnerability in Metagauss RegistrationMagic allows Functionality Misuse.This issue affects RegistrationMagic: from n/a through 5.2.5.0."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 5.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 3.9,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-799"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/custom-registration-form-builder-with-submission-manager/wordpress-registrationmagic-plugin-5-2-5-0-form-submission-limit-bypass-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2023-51667",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-06-04T13:15:50.500",
"lastModified": "2024-06-04T13:15:50.500",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Authentication Bypass by Spoofing vulnerability in FeedbackWP Rate my Post \u2013 WP Rating System allows Accessing Functionality Not Properly Constrained by ACLs.This issue affects Rate my Post \u2013 WP Rating System: from n/a through 3.4.2."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 3.9,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-290"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/rate-my-post/wordpress-rate-my-post-wp-rating-system-plugin-3-4-2-broken-access-control-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2023-52147",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-06-04T13:15:50.730",
"lastModified": "2024-06-04T13:15:50.730",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Exposure of Sensitive Information to an Unauthorized Actor vulnerability in All In One WP Security & Firewall Team All In One WP Security & Firewall allows Accessing Functionality Not Properly Constrained by ACLs.This issue affects All In One WP Security & Firewall: from n/a through 5.2.4."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 3.7,
"baseSeverity": "LOW"
},
"exploitabilityScore": 2.2,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-200"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/all-in-one-wp-security-and-firewall/wordpress-all-in-one-security-aios-plugin-5-2-4-secret-login-page-location-disclosure-on-multisites-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2023-52176",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-06-04T13:15:50.960",
"lastModified": "2024-06-04T13:15:50.960",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Authentication Bypass by Spoofing vulnerability in miniorange Malware Scanner allows Accessing Functionality Not Properly Constrained by ACLs.This issue affects Malware Scanner: from n/a through 4.7.1."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 3.9,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-290"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/miniorange-malware-protection/wordpress-malware-scanner-plugin-4-7-1-ip-restriction-bypass-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -0,0 +1,71 @@
{
"id": "CVE-2024-25600",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-06-04T13:15:51.183",
"lastModified": "2024-06-04T13:15:51.183",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Improper Control of Generation of Code ('Code Injection') vulnerability in Codeer Limited Bricks Builder allows Code Injection.This issue affects Bricks Builder: from n/a through 1.9.6."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 10.0,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 6.0
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-94"
}
]
}
],
"references": [
{
"url": "https://github.com/Chocapikk/CVE-2024-25600",
"source": "audit@patchstack.com"
},
{
"url": "https://github.com/K3ysTr0K3R/CVE-2024-25600-EXPLOIT",
"source": "audit@patchstack.com"
},
{
"url": "https://patchstack.com/articles/critical-rce-patched-in-bricks-builder-theme?_s_id=cve",
"source": "audit@patchstack.com"
},
{
"url": "https://patchstack.com/database/vulnerability/bricks/wordpress-bricks-theme-1-9-6-unauthenticated-remote-code-execution-rce-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
},
{
"url": "https://snicco.io/vulnerability-disclosure/bricks/unauthenticated-rce-in-bricks-1-9-6",
"source": "audit@patchstack.com"
}
]
}

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2024-29170",
"sourceIdentifier": "security_alert@emc.com",
"published": "2024-06-04T13:15:51.460",
"lastModified": "2024-06-04T13:15:51.460",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Dell PowerScale OneFS versions 8.2.x through 9.8.0.x contain a use of hard coded credentials vulnerability. An adjacent network unauthenticated attacker could potentially exploit this vulnerability, leading to information disclosure of network traffic and denial of service."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security_alert@emc.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H",
"attackVector": "ADJACENT_NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 8.1,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.2
}
]
},
"weaknesses": [
{
"source": "security_alert@emc.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-798"
}
]
}
],
"references": [
{
"url": "https://www.dell.com/support/kbdoc/en-us/000225667/dsa-2024-210-security-update-for-dell-powerscale-onefs-for-multiple-security-vulnerabilities",
"source": "security_alert@emc.com"
}
]
}

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2024-33541",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-06-04T13:15:51.717",
"lastModified": "2024-06-04T13:15:51.717",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in BetterAddons Better Elementor Addons allows PHP Local File Inclusion.This issue affects Better Elementor Addons: from n/a through 1.4.1."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-22"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/better-elementor-addons/wordpress-better-elementor-addons-plugin-1-4-1-local-file-inclusion-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2024-33557",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-06-04T13:15:51.943",
"lastModified": "2024-06-04T13:15:51.943",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in 8theme XStore Core allows PHP Local File Inclusion.This issue affects XStore Core: from n/a through 5.3.8."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.5,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 6.0
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-22"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/et-core-plugin/wordpress-xstore-core-plugin-5-3-5-local-file-inclusion-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2024-33560",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-06-04T13:15:52.177",
"lastModified": "2024-06-04T13:15:52.177",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in 8theme XStore allows PHP Local File Inclusion.This issue affects XStore: from n/a through 9.3.8."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.0,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 2.2,
"impactScore": 6.0
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-22"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/xstore/wordpress-xstore-theme-9-3-5-unauthenticated-local-file-inclusion-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -2,83 +2,14 @@
"id": "CVE-2024-35812",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-05-17T14:15:15.360",
"lastModified": "2024-05-17T18:35:35.070",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-06-04T13:15:52.390",
"vulnStatus": "Rejected",
"descriptions": [
{
"lang": "en",
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nusb: cdc-wdm: close race between read and workqueue\n\nwdm_read() cannot race with itself. However, in\nservice_outstanding_interrupt() it can race with the\nworkqueue, which can be triggered by error handling.\n\nHence we need to make sure that the WDM_RESPONDING\nflag is not just only set but tested."
},
{
"lang": "es",
"value": " En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: usb: cdc-wdm: ejecuci\u00f3n cercana entre lectura y cola de trabajo wdm_read() no puede ejecutarse consigo mismo. Sin embargo, en service_outstanding_interrupt() puede competir con la cola de trabajo, lo que puede desencadenarse mediante el manejo de errores. Por lo tanto, debemos asegurarnos de que el indicador WDM_RESPONDING no s\u00f3lo est\u00e9 configurado sino tambi\u00e9n probado."
"value": "Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority."
}
],
"metrics": {},
"references": [
{
"url": "https://git.kernel.org/stable/c/164be0a824387301312689bb29b2be92ab2cd39d",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/19f955ad9437a6859a529af34e2eafd903d5e7c1",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/2ff436b6399859e06539a2b9c667897d3cc85ad5",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/339f83612f3a569b194680768b22bf113c26a29d",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/347cca11bb78b9f3c29b45a9c52e70258bd008bf",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/3afdcc4e1a00facad210f5c5891bb2fbc026067f",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/5904411219601127ffdbd2d622bb5d67f9d8d16c",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/7182175f565ffffa2ba1911726c5656bfc7a1bae",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/8672ad663a22d0e4a325bb7d817b36ec412b967c",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/916cd2fcbc1e344bcabf4b2a834cdf5a0417d30c",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/9723602387217caa71d623ffcce314dc39e84a09",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/9b319f4a88094b2e020e6db6e819c808d890098d",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/a86e54a345139f1a7668c9f83bdc7ac6f91b6f78",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/ab92e11b73b48b79f144421430891f3aa6242656",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/da3b75931bb737be74d6b4341e0080f233ed1409",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/e4e47e406d74cab601b2ab21ba5e3add811e05ae",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
}
]
"references": []
}

View File

@ -2,35 +2,14 @@
"id": "CVE-2024-35941",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-05-19T11:15:49.823",
"lastModified": "2024-05-20T13:00:04.957",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-06-04T13:15:52.613",
"vulnStatus": "Rejected",
"descriptions": [
{
"lang": "en",
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: skbuff: add overflow debug check to pull/push helpers\n\nsyzbot managed to trigger following splat:\nBUG: KASAN: use-after-free in __skb_flow_dissect+0x4a3b/0x5e50\nRead of size 1 at addr ffff888208a4000e by task a.out/2313\n[..]\n __skb_flow_dissect+0x4a3b/0x5e50\n __skb_get_hash+0xb4/0x400\n ip_tunnel_xmit+0x77e/0x26f0\n ipip_tunnel_xmit+0x298/0x410\n ..\n\nAnalysis shows that the skb has a valid ->head, but bogus ->data\npointer.\n\nskb->data gets its bogus value via the neigh layer, which does:\n\n1556 __skb_pull(skb, skb_network_offset(skb));\n\n... and the skb was already dodgy at this point:\n\nskb_network_offset(skb) returns a negative value due to an\nearlier overflow of skb->network_header (u16). __skb_pull thus\n\"adjusts\" skb->data by a huge offset, pointing outside skb->head\narea.\n\nAllow debug builds to splat when we try to pull/push more than\nINT_MAX bytes.\n\nAfter this, the syzkaller reproducer yields a more precise splat\nbefore the flow dissector attempts to read off skb->data memory:\n\nWARNING: CPU: 5 PID: 2313 at include/linux/skbuff.h:2653 neigh_connected_output+0x28e/0x400\n ip_finish_output2+0xb25/0xed0\n iptunnel_xmit+0x4ff/0x870\n ipgre_xmit+0x78e/0xbb0"
},
{
"lang": "es",
"value": "En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: net: skbuff: agregar verificaci\u00f3n de depuraci\u00f3n de desbordamiento a los asistentes de extracci\u00f3n/empuje syzbot logr\u00f3 activar el siguiente s\u00edmbolo: BUG: KASAN: use after free en __skb_flow_dissect+0x4a3b/0x5e50 Lectura de tama\u00f1o 1 en la direcci\u00f3n ffff888208a4000e por tarea a.out/2313 [..] __skb_flow_dissect+0x4a3b/0x5e50 __skb_get_hash+0xb4/0x400 ip_tunnel_xmit+0x77e/0x26f0 ipip_tunnel_xmit+0x298/0x410 .. El an\u00e1lisis muestra que el skb tiene un ->head v\u00e1lido, pero falso ->puntero de datos. skb->data obtiene su valor falso a trav\u00e9s de la capa vecina, que hace: 1556 __skb_pull(skb, skb_network_offset(skb)); ... y el skb ya era dudoso en este punto: skb_network_offset(skb) devuelve un valor negativo debido a un desbordamiento anterior de skb->network_header (u16). __skb_pull por lo tanto \"ajusta\" los datos skb-> con un desplazamiento enorme, apuntando fuera del \u00e1rea principal de skb->. Permitir que las compilaciones de depuraci\u00f3n se ejecuten cuando intentamos extraer/enviar m\u00e1s de INT_MAX bytes. Despu\u00e9s de esto, el reproductor syzkaller produce un sonido m\u00e1s preciso antes de que el disector de flujo intente leer skb->memoria de datos: ADVERTENCIA: CPU: 5 PID: 2313 en include/linux/skbuff.h:2653 neigh_connected_output+0x28e/0x400 ip_finish_output2+ 0xb25/0xed0 iptunnel_xmit+0x4ff/0x870 ipgre_xmit+0x78e/0xbb0"
"value": "Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority."
}
],
"metrics": {},
"references": [
{
"url": "https://git.kernel.org/stable/c/1b2b26595bb09febf14c5444c873ac4ec90a5a77",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/219eee9c0d16f1b754a8b85275854ab17df0850a",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/8af60bb2b215f478b886f1d6d302fefa7f0b917d",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/fff05b2b004d9a8a2416d08647f3dc9068e357c8",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
}
]
"references": []
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2024-36800",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-06-04T13:15:52.740",
"lastModified": "2024-06-04T13:15:52.740",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "A SQL injection vulnerability in SEMCMS v.4.8, allows a remote attacker to obtain sensitive information via the ID parameter in Download.php."
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/want1997/SEMCMS_VUL/blob/main/Download_sql_vul.md",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2024-36801",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-06-04T13:15:52.857",
"lastModified": "2024-06-04T13:15:52.857",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "A SQL injection vulnerability in SEMCMS v.4.8, allows a remote attacker to obtain sensitive information via the lgid parameter in Download.php."
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/want1997/SEMCMS_VUL/blob/main/Download_sql_vul_2.md",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2024-37052",
"sourceIdentifier": "6f8de1f0-f67e-45a6-b68f-98777fdb759c",
"published": "2024-06-04T12:15:10.413",
"lastModified": "2024-06-04T12:15:10.413",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Deserialization of untrusted data can occur in versions of the MLflow platform running version 1.1.0 or newer, enabling a maliciously uploaded scikit-learn model to run arbitrary code on an end user\u2019s system when interacted with."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "6f8de1f0-f67e-45a6-b68f-98777fdb759c",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "6f8de1f0-f67e-45a6-b68f-98777fdb759c",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-502"
}
]
}
],
"references": [
{
"url": "https://hiddenlayer.com/sai-security-advisory/mlflow-june2024",
"source": "6f8de1f0-f67e-45a6-b68f-98777fdb759c"
}
]
}

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2024-37053",
"sourceIdentifier": "6f8de1f0-f67e-45a6-b68f-98777fdb759c",
"published": "2024-06-04T12:15:10.957",
"lastModified": "2024-06-04T12:15:10.957",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Deserialization of untrusted data can occur in versions of the MLflow platform running version 1.1.0 or newer, enabling a maliciously uploaded scikit-learn model to run arbitrary code on an end user\u2019s system when interacted with."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "6f8de1f0-f67e-45a6-b68f-98777fdb759c",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "6f8de1f0-f67e-45a6-b68f-98777fdb759c",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-502"
}
]
}
],
"references": [
{
"url": "https://hiddenlayer.com/sai-security-advisory/mlflow-june2024",
"source": "6f8de1f0-f67e-45a6-b68f-98777fdb759c"
}
]
}

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2024-37054",
"sourceIdentifier": "6f8de1f0-f67e-45a6-b68f-98777fdb759c",
"published": "2024-06-04T12:15:11.190",
"lastModified": "2024-06-04T12:15:11.190",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Deserialization of untrusted data can occur in versions of the MLflow platform running version 0.9.0 or newer, enabling a maliciously uploaded PyFunc model to run arbitrary code on an end user\u2019s system when interacted with."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "6f8de1f0-f67e-45a6-b68f-98777fdb759c",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "6f8de1f0-f67e-45a6-b68f-98777fdb759c",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-502"
}
]
}
],
"references": [
{
"url": "https://hiddenlayer.com/sai-security-advisory/mlflow-june2024",
"source": "6f8de1f0-f67e-45a6-b68f-98777fdb759c"
}
]
}

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2024-37055",
"sourceIdentifier": "6f8de1f0-f67e-45a6-b68f-98777fdb759c",
"published": "2024-06-04T12:15:11.397",
"lastModified": "2024-06-04T12:15:11.397",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Deserialization of untrusted data can occur in versions of the MLflow platform running version 1.24.0 or newer, enabling a maliciously uploaded pmdarima model to run arbitrary code on an end user\u2019s system when interacted with."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "6f8de1f0-f67e-45a6-b68f-98777fdb759c",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "6f8de1f0-f67e-45a6-b68f-98777fdb759c",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-502"
}
]
}
],
"references": [
{
"url": "https://hiddenlayer.com/sai-security-advisory/mlflow-june2024",
"source": "6f8de1f0-f67e-45a6-b68f-98777fdb759c"
}
]
}

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2024-37056",
"sourceIdentifier": "6f8de1f0-f67e-45a6-b68f-98777fdb759c",
"published": "2024-06-04T12:15:11.593",
"lastModified": "2024-06-04T12:15:11.593",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Deserialization of untrusted data can occur in versions of the MLflow platform running version 1.23.0 or newer, enabling a maliciously uploaded LightGBM scikit-learn model to run arbitrary code on an end user\u2019s system when interacted with."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "6f8de1f0-f67e-45a6-b68f-98777fdb759c",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "6f8de1f0-f67e-45a6-b68f-98777fdb759c",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-502"
}
]
}
],
"references": [
{
"url": "https://hiddenlayer.com/sai-security-advisory/mlflow-june2024",
"source": "6f8de1f0-f67e-45a6-b68f-98777fdb759c"
}
]
}

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2024-37057",
"sourceIdentifier": "6f8de1f0-f67e-45a6-b68f-98777fdb759c",
"published": "2024-06-04T12:15:11.800",
"lastModified": "2024-06-04T12:15:11.800",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Deserialization of untrusted data can occur in versions of the MLflow platform running version 2.0.0rc0 or newer, enabling a maliciously uploaded Tensorflow model to run arbitrary code on an end user\u2019s system when interacted with."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "6f8de1f0-f67e-45a6-b68f-98777fdb759c",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "6f8de1f0-f67e-45a6-b68f-98777fdb759c",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-502"
}
]
}
],
"references": [
{
"url": "https://hiddenlayer.com/sai-security-advisory/mlflow-june2024",
"source": "6f8de1f0-f67e-45a6-b68f-98777fdb759c"
}
]
}

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2024-37058",
"sourceIdentifier": "6f8de1f0-f67e-45a6-b68f-98777fdb759c",
"published": "2024-06-04T12:15:12.023",
"lastModified": "2024-06-04T12:15:12.023",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Deserialization of untrusted data can occur in versions of the MLflow platform running version 2.5.0 or newer, enabling a maliciously uploaded Langchain AgentExecutor model to run arbitrary code on an end user\u2019s system when interacted with."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "6f8de1f0-f67e-45a6-b68f-98777fdb759c",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "6f8de1f0-f67e-45a6-b68f-98777fdb759c",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-502"
}
]
}
],
"references": [
{
"url": "https://hiddenlayer.com/sai-security-advisory/mlflow-june2024",
"source": "6f8de1f0-f67e-45a6-b68f-98777fdb759c"
}
]
}

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2024-37059",
"sourceIdentifier": "6f8de1f0-f67e-45a6-b68f-98777fdb759c",
"published": "2024-06-04T12:15:12.227",
"lastModified": "2024-06-04T12:15:12.227",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Deserialization of untrusted data can occur in versions of the MLflow platform running version 0.5.0 or newer, enabling a maliciously uploaded PyTorch model to run arbitrary code on an end user\u2019s system when interacted with."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "6f8de1f0-f67e-45a6-b68f-98777fdb759c",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "6f8de1f0-f67e-45a6-b68f-98777fdb759c",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-502"
}
]
}
],
"references": [
{
"url": "https://hiddenlayer.com/sai-security-advisory/mlflow-june2024",
"source": "6f8de1f0-f67e-45a6-b68f-98777fdb759c"
}
]
}

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2024-37060",
"sourceIdentifier": "6f8de1f0-f67e-45a6-b68f-98777fdb759c",
"published": "2024-06-04T12:15:12.463",
"lastModified": "2024-06-04T12:15:12.463",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Deserialization of untrusted data can occur in versions of the MLflow platform running version 1.27.0 or newer, enabling a maliciously crafted Recipe to execute arbitrary code on an end user\u2019s system when run."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "6f8de1f0-f67e-45a6-b68f-98777fdb759c",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "6f8de1f0-f67e-45a6-b68f-98777fdb759c",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-502"
}
]
}
],
"references": [
{
"url": "https://hiddenlayer.com/sai-security-advisory/mlflow-june2024",
"source": "6f8de1f0-f67e-45a6-b68f-98777fdb759c"
}
]
}

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2024-37061",
"sourceIdentifier": "6f8de1f0-f67e-45a6-b68f-98777fdb759c",
"published": "2024-06-04T12:15:12.703",
"lastModified": "2024-06-04T12:15:12.703",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Remote Code Execution can occur in versions of the MLflow platform running version 1.11.0 or newer, enabling a maliciously crafted MLproject to execute arbitrary code on an end user\u2019s system when run."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "6f8de1f0-f67e-45a6-b68f-98777fdb759c",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "6f8de1f0-f67e-45a6-b68f-98777fdb759c",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-94"
}
]
}
],
"references": [
{
"url": "https://hiddenlayer.com/sai-security-advisory/mlflow-june2024",
"source": "6f8de1f0-f67e-45a6-b68f-98777fdb759c"
}
]
}

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2024-37062",
"sourceIdentifier": "6f8de1f0-f67e-45a6-b68f-98777fdb759c",
"published": "2024-06-04T12:15:12.907",
"lastModified": "2024-06-04T12:15:12.907",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Deserialization of untrusted data can occur in versions 3.7.0 or newer of Ydata's ydata-profiling open-source library, enabling a malicously crafted report to run arbitrary code on an end user's system when loaded."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "6f8de1f0-f67e-45a6-b68f-98777fdb759c",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "6f8de1f0-f67e-45a6-b68f-98777fdb759c",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-502"
}
]
}
],
"references": [
{
"url": "https://hiddenlayer.com/sai-security-advisory/ydata-june2024",
"source": "6f8de1f0-f67e-45a6-b68f-98777fdb759c"
}
]
}

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2024-37063",
"sourceIdentifier": "6f8de1f0-f67e-45a6-b68f-98777fdb759c",
"published": "2024-06-04T12:15:13.110",
"lastModified": "2024-06-04T12:15:13.110",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "A cross-site scripting (XSS) vulnerability in versions 3.7.0 or newer of Ydata's ydata-profiling open-source library allows for payloads to be run when a maliocusly crafted report is viewed in the browser."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "6f8de1f0-f67e-45a6-b68f-98777fdb759c",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "6f8de1f0-f67e-45a6-b68f-98777fdb759c",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://hiddenlayer.com/sai-security-advisory/ydata-june2024",
"source": "6f8de1f0-f67e-45a6-b68f-98777fdb759c"
}
]
}

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2024-37064",
"sourceIdentifier": "6f8de1f0-f67e-45a6-b68f-98777fdb759c",
"published": "2024-06-04T12:15:13.313",
"lastModified": "2024-06-04T12:15:13.313",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Deseriliazation of untrusted data can occur in versions 3.7.0 or newer of Ydata's ydata-profiling open-source library, enabling a maliciously crafted dataset to run arbitrary code on an end user's system when loaded."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "6f8de1f0-f67e-45a6-b68f-98777fdb759c",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "6f8de1f0-f67e-45a6-b68f-98777fdb759c",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-502"
}
]
}
],
"references": [
{
"url": "https://hiddenlayer.com/sai-security-advisory/ydata-june2024",
"source": "6f8de1f0-f67e-45a6-b68f-98777fdb759c"
}
]
}

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2024-37065",
"sourceIdentifier": "6f8de1f0-f67e-45a6-b68f-98777fdb759c",
"published": "2024-06-04T12:15:13.507",
"lastModified": "2024-06-04T12:15:13.507",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Deserialization of untrusted data can occur in versions 0.6 or newer of the skops python library, enabling a maliciously crafted model to run arbitrary code on an end user's system when loaded."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "6f8de1f0-f67e-45a6-b68f-98777fdb759c",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "6f8de1f0-f67e-45a6-b68f-98777fdb759c",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-502"
}
]
}
],
"references": [
{
"url": "https://hiddenlayer.com/sai-security-advisory/skops-june2024",
"source": "6f8de1f0-f67e-45a6-b68f-98777fdb759c"
}
]
}

View File

@ -0,0 +1,59 @@
{
"id": "CVE-2024-4254",
"sourceIdentifier": "security@huntr.dev",
"published": "2024-06-04T12:15:13.710",
"lastModified": "2024-06-04T12:15:13.710",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "The 'deploy-website.yml' workflow in the gradio-app/gradio repository, specifically in the 'main' branch, is vulnerable to secrets exfiltration due to improper authorization. The vulnerability arises from the workflow's explicit checkout and execution of code from a fork, which is unsafe as it allows the running of untrusted code in an environment with access to push to the base repository and access secrets. This flaw could lead to the exfiltration of sensitive secrets such as GITHUB_TOKEN, HF_TOKEN, VERCEL_ORG_ID, VERCEL_PROJECT_ID, COMMENT_TOKEN, AWSACCESSKEYID, AWSSECRETKEY, and VERCEL_TOKEN. The vulnerability is present in the workflow file located at https://github.com/gradio-app/gradio/blob/72f4ca88ab569aae47941b3fb0609e57f2e13a27/.github/workflows/deploy-website.yml."
},
{
"lang": "es",
"value": "La neutralizaci\u00f3n inadecuada de etiquetas HTML relacionadas con scripts en una vulnerabilidad de p\u00e1gina web (XSS b\u00e1sico) en PickPlugins Tabs & Accordion permite la inyecci\u00f3n de c\u00f3digo. Este problema afecta a Tabs & Accordion: desde n/a hasta 1.3.10."
}
],
"metrics": {
"cvssMetricV30": [
{
"source": "security@huntr.dev",
"type": "Secondary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 7.1,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 4.2
}
]
},
"weaknesses": [
{
"source": "security@huntr.dev",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-285"
}
]
}
],
"references": [
{
"url": "https://huntr.com/bounties/59873fbd-5698-4ec3-87f9-5d70c6055d01",
"source": "security@huntr.dev"
}
]
}

View File

@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update
```plain
2024-06-04T12:00:30.469610+00:00
2024-06-04T14:00:38.127097+00:00
```
### Most recent CVE Modification Timestamp synchronized with NVD
```plain
2024-06-04T11:15:51.010000+00:00
2024-06-04T13:15:52.857000+00:00
```
### Last Data Feed Release
@ -33,42 +33,46 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
### Total Number of included CVEs
```plain
252575
252607
```
### CVEs added in the last Commit
Recently added CVEs: `23`
Recently added CVEs: `32`
- [CVE-2023-45053](CVE-2023/CVE-2023-450xx/CVE-2023-45053.json) (`2024-06-04T10:15:08.910`)
- [CVE-2023-45635](CVE-2023/CVE-2023-456xx/CVE-2023-45635.json) (`2024-06-04T10:15:10.230`)
- [CVE-2023-46310](CVE-2023/CVE-2023-463xx/CVE-2023-46310.json) (`2024-06-04T10:15:10.503`)
- [CVE-2023-46630](CVE-2023/CVE-2023-466xx/CVE-2023-46630.json) (`2024-06-04T10:15:10.763`)
- [CVE-2023-47189](CVE-2023/CVE-2023-471xx/CVE-2023-47189.json) (`2024-06-04T10:15:11.010`)
- [CVE-2023-47513](CVE-2023/CVE-2023-475xx/CVE-2023-47513.json) (`2024-06-04T10:15:11.250`)
- [CVE-2023-47663](CVE-2023/CVE-2023-476xx/CVE-2023-47663.json) (`2024-06-04T10:15:11.483`)
- [CVE-2023-47769](CVE-2023/CVE-2023-477xx/CVE-2023-47769.json) (`2024-06-04T10:15:11.733`)
- [CVE-2023-47818](CVE-2023/CVE-2023-478xx/CVE-2023-47818.json) (`2024-06-04T10:15:11.997`)
- [CVE-2023-47837](CVE-2023/CVE-2023-478xx/CVE-2023-47837.json) (`2024-06-04T10:15:12.237`)
- [CVE-2023-48271](CVE-2023/CVE-2023-482xx/CVE-2023-48271.json) (`2024-06-04T11:15:48.110`)
- [CVE-2023-48276](CVE-2023/CVE-2023-482xx/CVE-2023-48276.json) (`2024-06-04T11:15:48.360`)
- [CVE-2023-48285](CVE-2023/CVE-2023-482xx/CVE-2023-48285.json) (`2024-06-04T11:15:48.580`)
- [CVE-2023-48290](CVE-2023/CVE-2023-482xx/CVE-2023-48290.json) (`2024-06-04T11:15:48.830`)
- [CVE-2023-48318](CVE-2023/CVE-2023-483xx/CVE-2023-48318.json) (`2024-06-04T11:15:49.053`)
- [CVE-2023-48335](CVE-2023/CVE-2023-483xx/CVE-2023-48335.json) (`2024-06-04T11:15:49.897`)
- [CVE-2023-48745](CVE-2023/CVE-2023-487xx/CVE-2023-48745.json) (`2024-06-04T11:15:50.123`)
- [CVE-2023-48747](CVE-2023/CVE-2023-487xx/CVE-2023-48747.json) (`2024-06-04T11:15:50.347`)
- [CVE-2023-48753](CVE-2023/CVE-2023-487xx/CVE-2023-48753.json) (`2024-06-04T11:15:50.563`)
- [CVE-2023-49741](CVE-2023/CVE-2023-497xx/CVE-2023-49741.json) (`2024-06-04T11:15:50.783`)
- [CVE-2023-49748](CVE-2023/CVE-2023-497xx/CVE-2023-49748.json) (`2024-06-04T11:15:51.010`)
- [CVE-2024-4637](CVE-2024/CVE-2024-46xx/CVE-2024-4637.json) (`2024-06-04T10:15:12.503`)
- [CVE-2024-5463](CVE-2024/CVE-2024-54xx/CVE-2024-5463.json) (`2024-06-04T10:15:12.747`)
- [CVE-2023-51667](CVE-2023/CVE-2023-516xx/CVE-2023-51667.json) (`2024-06-04T13:15:50.500`)
- [CVE-2023-52147](CVE-2023/CVE-2023-521xx/CVE-2023-52147.json) (`2024-06-04T13:15:50.730`)
- [CVE-2023-52176](CVE-2023/CVE-2023-521xx/CVE-2023-52176.json) (`2024-06-04T13:15:50.960`)
- [CVE-2024-25600](CVE-2024/CVE-2024-256xx/CVE-2024-25600.json) (`2024-06-04T13:15:51.183`)
- [CVE-2024-29170](CVE-2024/CVE-2024-291xx/CVE-2024-29170.json) (`2024-06-04T13:15:51.460`)
- [CVE-2024-33541](CVE-2024/CVE-2024-335xx/CVE-2024-33541.json) (`2024-06-04T13:15:51.717`)
- [CVE-2024-33557](CVE-2024/CVE-2024-335xx/CVE-2024-33557.json) (`2024-06-04T13:15:51.943`)
- [CVE-2024-33560](CVE-2024/CVE-2024-335xx/CVE-2024-33560.json) (`2024-06-04T13:15:52.177`)
- [CVE-2024-36800](CVE-2024/CVE-2024-368xx/CVE-2024-36800.json) (`2024-06-04T13:15:52.740`)
- [CVE-2024-36801](CVE-2024/CVE-2024-368xx/CVE-2024-36801.json) (`2024-06-04T13:15:52.857`)
- [CVE-2024-37052](CVE-2024/CVE-2024-370xx/CVE-2024-37052.json) (`2024-06-04T12:15:10.413`)
- [CVE-2024-37053](CVE-2024/CVE-2024-370xx/CVE-2024-37053.json) (`2024-06-04T12:15:10.957`)
- [CVE-2024-37054](CVE-2024/CVE-2024-370xx/CVE-2024-37054.json) (`2024-06-04T12:15:11.190`)
- [CVE-2024-37055](CVE-2024/CVE-2024-370xx/CVE-2024-37055.json) (`2024-06-04T12:15:11.397`)
- [CVE-2024-37056](CVE-2024/CVE-2024-370xx/CVE-2024-37056.json) (`2024-06-04T12:15:11.593`)
- [CVE-2024-37057](CVE-2024/CVE-2024-370xx/CVE-2024-37057.json) (`2024-06-04T12:15:11.800`)
- [CVE-2024-37058](CVE-2024/CVE-2024-370xx/CVE-2024-37058.json) (`2024-06-04T12:15:12.023`)
- [CVE-2024-37059](CVE-2024/CVE-2024-370xx/CVE-2024-37059.json) (`2024-06-04T12:15:12.227`)
- [CVE-2024-37060](CVE-2024/CVE-2024-370xx/CVE-2024-37060.json) (`2024-06-04T12:15:12.463`)
- [CVE-2024-37061](CVE-2024/CVE-2024-370xx/CVE-2024-37061.json) (`2024-06-04T12:15:12.703`)
- [CVE-2024-37062](CVE-2024/CVE-2024-370xx/CVE-2024-37062.json) (`2024-06-04T12:15:12.907`)
- [CVE-2024-37063](CVE-2024/CVE-2024-370xx/CVE-2024-37063.json) (`2024-06-04T12:15:13.110`)
- [CVE-2024-37064](CVE-2024/CVE-2024-370xx/CVE-2024-37064.json) (`2024-06-04T12:15:13.313`)
- [CVE-2024-37065](CVE-2024/CVE-2024-370xx/CVE-2024-37065.json) (`2024-06-04T12:15:13.507`)
- [CVE-2024-4254](CVE-2024/CVE-2024-42xx/CVE-2024-4254.json) (`2024-06-04T12:15:13.710`)
### CVEs modified in the last Commit
Recently modified CVEs: `0`
Recently modified CVEs: `2`
- [CVE-2024-35812](CVE-2024/CVE-2024-358xx/CVE-2024-35812.json) (`2024-06-04T13:15:52.390`)
- [CVE-2024-35941](CVE-2024/CVE-2024-359xx/CVE-2024-35941.json) (`2024-06-04T13:15:52.613`)
## Download and Usage

View File

@ -233023,7 +233023,7 @@ CVE-2023-4505,0,0,08b70dab223e070448e8024455ddb0f539257ee2b24cfc38a707e72f793349
CVE-2023-45050,0,0,8f8aaf9978e1f6b51424180837903cefeda602198ba3442bade325d037556925,2023-12-06T01:35:40.773000
CVE-2023-45051,0,0,98c1234cd2915993eece196edbe810f57ef1b010cf2ce9dd18b13e4b80b75999,2023-10-25T17:38:21.743000
CVE-2023-45052,0,0,77eae12b4fa2c0060b640686cdc1b66acb79dc74365b8ea6d1b0f525f1ee5cd3,2023-10-17T18:46:40.420000
CVE-2023-45053,1,1,5d5291c2be05a1a0d3d29941ccec77b140bce37622b0ae0a5dcaedb27d06d603,2024-06-04T10:15:08.910000
CVE-2023-45053,0,0,5d5291c2be05a1a0d3d29941ccec77b140bce37622b0ae0a5dcaedb27d06d603,2024-06-04T10:15:08.910000
CVE-2023-45054,0,0,5cf4f35927445900a23289b0d29f26559cbb68153e91dcb6f028b8c7bffa42f5,2023-10-25T17:38:17.183000
CVE-2023-45055,0,0,29d2114299b4c74ef616613f44aa4a41e7c344a77a335209ab301aa44eec913d,2023-11-10T04:17:47.710000
CVE-2023-45056,0,0,604dfc916b43be62f3fa1decb2fd0cdd1a0e154ba3f074058bd7b87bd6fc06af,2023-10-25T17:38:11.073000
@ -233412,7 +233412,7 @@ CVE-2023-4563,0,0,412b1f6b2f76e9ab4f58110f6336496ea198dfd1f5fe1f2104578419cf6b7d
CVE-2023-45630,0,0,9fc893dbea1d675c98e712ff9836a3725b1d9f0d2e711bc0435b7b8c3484f136,2023-10-25T01:25:54.793000
CVE-2023-45632,0,0,88e1fbb02ed73f35a312972f995f300ebe519b50b83ad604758f398fd3076f01,2023-10-25T01:25:40.933000
CVE-2023-45634,0,0,222c7ba9ec90c1b83fd757865960ed1c5030304592c085cf10febdc47ea7b650,2023-10-27T21:58:08.617000
CVE-2023-45635,1,1,8b30674cfea1649c0e4c539bc42c7beae8cfb0be774152d3e3da09df26a34b31,2024-06-04T10:15:10.230000
CVE-2023-45635,0,0,8b30674cfea1649c0e4c539bc42c7beae8cfb0be774152d3e3da09df26a34b31,2024-06-04T10:15:10.230000
CVE-2023-45637,0,0,ce351731ba0a8610cbad237c54fb040fc139e08d0e54bb0f87f52fa3c2b38441,2023-10-27T21:56:43.497000
CVE-2023-45638,0,0,f34ee74ed9686647b6878a8dbcb2dcdc1cb7815775b0d609411d36d8b03bee09,2023-10-18T22:46:07.233000
CVE-2023-45639,0,0,d05428ded578d92aae600cdf5ba945b03825316ce06495020814900fe8c77295,2023-10-19T17:44:02.860000
@ -233941,7 +233941,7 @@ CVE-2023-46306,0,0,3cc3c3abc132825b0de5e5713618461432ca75d34cf5d6314908b068992c1
CVE-2023-46307,0,0,70b1e7b39477592163424a81cdcac5736b174b2b3ef677dc9db177c5b5ec12cc,2023-12-12T17:06:02.260000
CVE-2023-46308,0,0,93fc954f3a128690a25cd4b8d8fc47afecd3303f2e318c0a2f0696550f2b4f76,2024-01-09T17:47:09.937000
CVE-2023-4631,0,0,f9a75b3fa9259593f2eb56bbd324a3965971ccf8066af6586ae560be6a935dcc,2023-11-07T04:22:48.020000
CVE-2023-46310,1,1,697ca4ef4362b8d3acea8b057f97868ca23a1d6027a886ae69340c819919f451,2024-06-04T10:15:10.503000
CVE-2023-46310,0,0,697ca4ef4362b8d3acea8b057f97868ca23a1d6027a886ae69340c819919f451,2024-06-04T10:15:10.503000
CVE-2023-46311,0,0,0e5573500a39b307b2c60ac16805905b2aa525dda4cdcdcb4966393d238681d6,2023-12-28T20:06:13.850000
CVE-2023-46312,0,0,d9900d295c00c4481ba9b90bea85e05da8631659306e5a8ba168f098d658bd0c,2023-11-08T02:24:43.287000
CVE-2023-46313,0,0,26bdfe7606548277b659acc13ea81113d83bd485148153f8e6f1479f3453c4b8,2023-11-08T02:24:23.733000
@ -234162,7 +234162,7 @@ CVE-2023-46626,0,0,0b0beadc63340a6291f32184a96243409d2f154e401306ac5354c2b1c4a6a
CVE-2023-46627,0,0,7f16ed5dc70512013a689d7944b262d15c359a886dfc5e808745660f4609f404,2023-11-14T21:37:36.790000
CVE-2023-46629,0,0,5503221f06ac5332965ebc5158075320ae19f6baca95ee3c98fed08ac83638f2,2023-11-16T23:43:08.647000
CVE-2023-4663,0,0,cb622107dd10fb47dae31471f695667bb4b847cab355f5a2ad5655a20b6c6ab1,2023-09-20T15:13:47.473000
CVE-2023-46630,1,1,96512019659de34a7264860eb952668dd8e608ba653a8728f3562b0fd195a886,2024-06-04T10:15:10.763000
CVE-2023-46630,0,0,96512019659de34a7264860eb952668dd8e608ba653a8728f3562b0fd195a886,2024-06-04T10:15:10.763000
CVE-2023-46634,0,0,26b30da45e705e737045cedcde5ac25dcf6d1d8f3125169488fe7ac5dfacf289,2023-11-16T18:16:13.293000
CVE-2023-46636,0,0,76f23cc9dc7d46435807ed86a5b91b8788ee4db7afc6a3de8bbb87d83d51b54e,2023-11-16T23:43:01.907000
CVE-2023-46638,0,0,3b1109a32586059e441b0a97ccdf0f6ba9d2e5b5fd1cdbeed38bc39f535c3e34,2023-11-16T23:42:55.590000
@ -234584,7 +234584,7 @@ CVE-2023-47182,0,0,eee2b9dfe6778e43d4732644b2e34d2afd4c49bd2f627bf97c8e8b049e269
CVE-2023-47184,0,0,006726597518e035c83402b563d90ce82bbd4e93b3d7bff5677ac8e71b1804be,2023-11-14T17:04:27.783000
CVE-2023-47185,0,0,ac03a4a2ac5445aa1c0a5599ec1cdcab29877cde46f4b0a2c7ea0971295ff8b2,2023-11-14T17:04:12.320000
CVE-2023-47186,0,0,a6af3e99b206f650a389e2a8494459f846190c40032cb975dfcfe476c602b082,2023-11-14T16:23:05.433000
CVE-2023-47189,1,1,c164f4fb23212fe24e6dbdc9124ae3764e9471c2aea778ee152a86ac10f51d2d,2024-06-04T10:15:11.010000
CVE-2023-47189,0,0,c164f4fb23212fe24e6dbdc9124ae3764e9471c2aea778ee152a86ac10f51d2d,2024-06-04T10:15:11.010000
CVE-2023-4719,0,0,9d704bdac1249c1a3cf0b1f88156a66fb03186a2a8754fabc0ad1e260ab11edd,2023-11-07T04:22:53.820000
CVE-2023-47190,0,0,e27cf06847b50fbed203c73f80d55aba75b4ca0cd31399718ceaccb76d2c2842,2023-11-14T21:11:29.610000
CVE-2023-47191,0,0,796a13ca4fd3a2989a78f73cb74e0c925cce0a5be713b993f15a19097a7de4e9,2023-12-30T03:20:37.497000
@ -234775,7 +234775,7 @@ CVE-2023-4751,0,0,b474afbd68a51ccc03983fb09d5bc361aa5e9bd679ddad99f0eb8301553cba
CVE-2023-47510,0,0,71e4b62dfe2ca075ffc368295060ad4f08e446acff4b59a4de0732b86e57af88,2023-11-14T20:56:50.343000
CVE-2023-47511,0,0,dc9ad40d182dd905b0efd3c019af8e1021f2bf27961092c32bd1879259c14169,2023-11-22T18:23:46.350000
CVE-2023-47512,0,0,6a66c2385408c365d0ff6a8ea66cc9e3cb01fa3d0449aa00aa5c2aed8f58da63,2023-11-21T01:05:27.800000
CVE-2023-47513,1,1,ef0f7402d042d768b876c444e1f50e8441924c964fd91afced37d11e13e0bb6a,2024-06-04T10:15:11.250000
CVE-2023-47513,0,0,ef0f7402d042d768b876c444e1f50e8441924c964fd91afced37d11e13e0bb6a,2024-06-04T10:15:11.250000
CVE-2023-47514,0,0,a8e90cce931ded77e76cd956d1561635883b69077cf7fbb5fd3d59a8e4382686,2023-11-22T18:31:02.543000
CVE-2023-47516,0,0,5e1e7faad407b03f5aedd6d01043b5471f45260b07b691d1aea5a2815ab05971,2023-11-16T18:16:05.383000
CVE-2023-47517,0,0,af418bf6e062ac43a7ba3a8a7bd4b86a8406757faed0cee97fddcbbf9b7f27ea,2023-11-21T00:45:47.997000
@ -234899,7 +234899,7 @@ CVE-2023-47659,0,0,8be60f9ac5ea724d3de91bba3a133532ccfd93b448ae5f662e01779b71fc1
CVE-2023-4766,0,0,45c5b495c455d2e827148893303d53ee4181ef288443d797f74c2953a841cc0a,2023-09-19T02:26:50.013000
CVE-2023-47660,0,0,223305f40be65b9cd91149bb778c4d946d32d4a22823fbb8b304b1f867c082de,2023-11-20T16:56:01.590000
CVE-2023-47662,0,0,54da8b7441f7ec7d21dd4df05a98b5af1e7fc05632dc959a9adff5e987eba44b,2023-11-21T17:01:11.083000
CVE-2023-47663,1,1,d978480323dfa79cf2cb95eff29b69070c43e007b7cb9ad4dc0ed7a818785933,2024-06-04T10:15:11.483000
CVE-2023-47663,0,0,d978480323dfa79cf2cb95eff29b69070c43e007b7cb9ad4dc0ed7a818785933,2024-06-04T10:15:11.483000
CVE-2023-47664,0,0,36cf2c33ba3fa94d975d1f76be3a2e8972d58018edf6c33a7ab266f2bdb50ced,2023-11-24T22:48:31.267000
CVE-2023-47665,0,0,d831123b04a54e61afcecac29d93ba42a3fdfb5ad3ac75aa9ca009babd761374,2023-11-16T23:44:26.317000
CVE-2023-47666,0,0,f0e686f55dddcc71b3497b4ac6b93dd63942c388eb21336b70c919030c9772e7,2023-11-24T22:48:09.573000
@ -234972,7 +234972,7 @@ CVE-2023-47765,0,0,3251ed3fd28a6fec07ac7cb9a8062141687a024f352fd8ca51a5261474100
CVE-2023-47766,0,0,7899cca13e1385e375f32ebb1b3937b93c65cd574d277550bab56e26b7a4da55,2023-11-28T19:18:00.713000
CVE-2023-47767,0,0,d83e27c39cbb312ccf0217c3b2c5d4f56f6e2b810766abaf5e7fcfbee9251a94,2023-11-28T19:19:35.667000
CVE-2023-47768,0,0,9cefbe9c9b382b54c5ee099fb76d85e1fd42d31125fbe85625df2f10a347f516,2023-11-28T19:22:41.277000
CVE-2023-47769,1,1,eccf1058d1edd338fb4f0de8019ef7933459516585ba4f07210404762e4fe061,2024-06-04T10:15:11.733000
CVE-2023-47769,0,0,eccf1058d1edd338fb4f0de8019ef7933459516585ba4f07210404762e4fe061,2024-06-04T10:15:11.733000
CVE-2023-4777,0,0,2285f3b3937f1b6ee7b5013a1072c08eed965f2b904b03b7b4184647f26697b4,2023-09-13T12:54:59.283000
CVE-2023-47772,0,0,7713bada3e93d580185e7757a00736557df9fbba8e32d5584ac0aaf5b9527567,2023-11-27T20:23:44.047000
CVE-2023-47773,0,0,298e58c18c603d342f120209e3a04b3e42e7e1fc100c9336741efc054d287705,2023-11-30T04:55:31.483000
@ -235011,7 +235011,7 @@ CVE-2023-47814,0,0,4856a6025149093aa5ff1e806dfe9fc38a6ab4027dcdee287805bc3052d1f
CVE-2023-47815,0,0,14ce2eef99bc2d9086139a275a9b134de7a4f7b6cb6c448a8a7e25edfd1efa90,2023-11-28T20:05:31.977000
CVE-2023-47816,0,0,e082edd53a6a4eed5960f7ab77c59be8833c6ec71604cf00765311a3b449101b,2023-11-28T20:07:47.730000
CVE-2023-47817,0,0,c7f6e34a92682e0578e30cc5b35895d83c1350af99047d963ddb37699701bf08,2023-11-28T20:23:25.427000
CVE-2023-47818,1,1,18ca272b54a0147dc671e257ee3463ad43770ea986245527463f858af9b66b50,2024-06-04T10:15:11.997000
CVE-2023-47818,0,0,18ca272b54a0147dc671e257ee3463ad43770ea986245527463f858af9b66b50,2024-06-04T10:15:11.997000
CVE-2023-47819,0,0,3ac1dddd9619f10e6a99e054670d02ef9e97893f1f3f4906281325d948991a94,2023-11-29T02:29:33
CVE-2023-4782,0,0,a08a89cf905ee8629cef1fe4ebfdaf2e3f2cfe374d0c88eaa92a133223524295,2023-09-12T18:34:45.990000
CVE-2023-47821,0,0,dac8e9ebeae5e88fc92354391c4f187a5fe46b91ec13faf3e8bb2be9422c5e19,2023-11-28T20:23:38.657000
@ -235024,7 +235024,7 @@ CVE-2023-47831,0,0,4ffecae7c979e98c1749b725e6bb7e9e2e4e58e21f7a0369a7e31a101a513
CVE-2023-47833,0,0,f7236df431372004a0d559bf44f7c2f8b84efc80bec2779f11bc374cd0c0ad16,2023-11-28T20:25:42.100000
CVE-2023-47834,0,0,920967a055b2bc21ff0798aa9e7d238eed9616b66b2486f71c8817a9616735ed,2023-11-28T20:24:06.653000
CVE-2023-47835,0,0,7a712355ce5c48eadcb9e26f4f27778335f03b4bfa9861aa3fd9d0cda8b8d8fa,2023-11-28T20:21:32.220000
CVE-2023-47837,1,1,33f52880a7c61768be04c7c57e1a848f73ef1b73ab6050bceb722ef8a3b3f93a,2024-06-04T10:15:12.237000
CVE-2023-47837,0,0,33f52880a7c61768be04c7c57e1a848f73ef1b73ab6050bceb722ef8a3b3f93a,2024-06-04T10:15:12.237000
CVE-2023-47839,0,0,7480547339b9b3ac3798f9c06e00c706f49ca35ebe73ec8189117729e422f769,2023-11-28T21:07:29.180000
CVE-2023-47840,0,0,7e24f7bfe5242765e69f6a2a237de2196af9eb411219ff1fe89053605cf27eb0,2024-01-04T21:27:45.337000
CVE-2023-47842,0,0,f440905c307b5610d2cfc83060eabc85c90c284cc9c17dab2bd938d9d5409ffb,2024-03-27T12:29:30.307000
@ -235233,10 +235233,10 @@ CVE-2023-48265,0,0,b17021609fe4e77772f01fb0192ebb95b1219206f6043e8cd864d7b0ca321
CVE-2023-48266,0,0,d6f171231beb0ee1180aa8d7b71e94eefc1322fbdfbaea0d577085088643877b,2024-01-16T20:31:40.710000
CVE-2023-48268,0,0,7fbc38e1f3021e6f57ddbb59802c5c032dea61c9b04627258986c5e024d76a9e,2023-12-01T21:30:14.497000
CVE-2023-4827,0,0,660cb613242cf8fb9cab965004afed839f4beeb124259e7181eab5017ac3219d,2023-11-07T04:23:00.800000
CVE-2023-48271,1,1,e198b5fcc18c6acd50fcc74a52358b75b0f4bb3d7f5d0c3de02bfc704ca71c88,2024-06-04T11:15:48.110000
CVE-2023-48271,0,0,e198b5fcc18c6acd50fcc74a52358b75b0f4bb3d7f5d0c3de02bfc704ca71c88,2024-06-04T11:15:48.110000
CVE-2023-48272,0,0,6b4df1e347c87fa206b94499a385869f076cd0e708e56b463683f8e1d53c3c9b,2023-12-06T03:01:23.517000
CVE-2023-48275,0,0,21d3cdc7ae6f4754c5c550b6018b42b200823b5664b8a35a50e38d3b76fa2a9c,2024-03-27T12:29:30.307000
CVE-2023-48276,1,1,bad73fc5cc054e9eae25b42b78cfe9155a3d57077a37b2e9742a40a863a5ea1c,2024-06-04T11:15:48.360000
CVE-2023-48276,0,0,bad73fc5cc054e9eae25b42b78cfe9155a3d57077a37b2e9742a40a863a5ea1c,2024-06-04T11:15:48.360000
CVE-2023-48278,0,0,b8b615ff398a78f2adcd1913a459812b30de22df732a4689ed336a4365900549,2023-12-06T03:09:04.530000
CVE-2023-48279,0,0,677bb12e80f04b87e5ac81a35a4d9bd35cc895da5798b0a5048d841cd32d97ee,2023-12-05T20:02:01.297000
CVE-2023-4828,0,0,24b41979bedd35424b37496bcb2f184802754cdeb975ef549331a7b6a0081487,2023-10-13T22:15:10.717000
@ -235244,11 +235244,11 @@ CVE-2023-48281,0,0,78bb75864e8c316aa8b5f84c9c0f28b82743f6997d5689af36c482f028e2d
CVE-2023-48282,0,0,ee3f545b59bd799e6b5f304fecb83dbf55a1929c520ea20b716dec4f6a6eff71,2023-12-05T01:59:29.907000
CVE-2023-48283,0,0,83cf0ca71c7297ce8678051d1511978415ac96314858b5a75a8f14c4ce5a7132,2023-12-05T02:00:00.967000
CVE-2023-48284,0,0,707a63c06b80a67b3edfbd0b32b7920d7daf4bc225624c51ea3cda01f05f1c20,2023-12-05T02:00:11.640000
CVE-2023-48285,1,1,2589b932e1f372cc09b55a9fe98aaa4ee06515d7a55d9d5f1f59af36cd4c8fe3,2024-06-04T11:15:48.580000
CVE-2023-48285,0,0,2589b932e1f372cc09b55a9fe98aaa4ee06515d7a55d9d5f1f59af36cd4c8fe3,2024-06-04T11:15:48.580000
CVE-2023-48288,0,0,19ac24ac88dcab5b08a8c9544462ea918482f622a54e6ba82de96a12c2a282a6,2023-12-29T03:27:57.107000
CVE-2023-48289,0,0,d07d661ce1e3569a469e3ecdc2654b4ce8846c7807e0b2fb1419505629ae39ee,2023-12-05T19:24:11.607000
CVE-2023-4829,0,0,d207290f9e2022e9bf7ed5126f661135ba76d996e11407f54a0a92ba9b964dd1,2023-10-17T16:10:31.727000
CVE-2023-48290,1,1,8b6c0e67ff8875f134bad31ffe29f2d1b73e00eb622e7abfb7d449464c836c8e,2024-06-04T11:15:48.830000
CVE-2023-48290,0,0,8b6c0e67ff8875f134bad31ffe29f2d1b73e00eb622e7abfb7d449464c836c8e,2024-06-04T11:15:48.830000
CVE-2023-48291,0,0,f9f5f2eb0ee5639697b41278ba7a983f05d86493bd5557765f2336f6bf74d216,2023-12-28T13:52:59.233000
CVE-2023-48292,0,0,ce3417881b0a91671ae0501e6e6066ed9d24b7b451a210ac59f07a3bb04fedda,2023-11-29T20:44:39.200000
CVE-2023-48293,0,0,8b35a584f0bf90d96e4cf0e61badd1f4868f960a52dc86a9d33b7fb2539e9f7c,2023-11-29T18:02:07.070000
@ -235278,7 +235278,7 @@ CVE-2023-48314,0,0,9faec629ee42cb2d239fc27af92843fe8286afd13377596097cb188be12b6
CVE-2023-48315,0,0,b5df8c75d4323e7134f44169a32c9df27b1253f0ff5a8201e03343cd29e61c28,2023-12-08T19:04:07.240000
CVE-2023-48316,0,0,857bf20f41fa7a3be7807df7bb8e38c1def4778751697190e5b9f3a21242ff65,2023-12-08T19:11:52.763000
CVE-2023-48317,0,0,7792e8cbc097ce577ab5b895a0b0f250d15b4f382f87fdd999ddce58d5d46587,2023-12-06T03:11:49.693000
CVE-2023-48318,1,1,6eeecba77be61a056a2739dffad13829d0c8359b90c9921283361f36e52d4aad,2024-06-04T11:15:49.053000
CVE-2023-48318,0,0,6eeecba77be61a056a2739dffad13829d0c8359b90c9921283361f36e52d4aad,2024-06-04T11:15:49.053000
CVE-2023-48319,0,0,6f307cc1d3fe5a52a026e29c7ed597400875aab92dc03ab360104b504ec086ab,2024-05-17T18:36:05.263000
CVE-2023-4832,0,0,94f20a83da1f90d8e1573598745a404568d383a7c6bb0d697ca18c3852df9ac1,2023-09-19T02:20:05.197000
CVE-2023-48320,0,0,3a6fc5517ddbc74cc8db16fff59b8cf108a7136e6d86351f82a35efe62af93be,2023-12-06T03:16:01.150000
@ -235295,7 +235295,7 @@ CVE-2023-48330,0,0,dbc01d30bd987a885da2abf85c259b7eafb32a598c6492f0d6ac884ee4432
CVE-2023-48331,0,0,90599aae60a7de59bbff07d3db2722ed871e44e71153a5cea792d198ebc8ecdf,2023-12-05T02:00:32.513000
CVE-2023-48333,0,0,aff8a1f751c328260becb0872b2d13f301390b582cd5ade313bcca2bbf616602,2023-12-06T17:25:08.207000
CVE-2023-48334,0,0,6c4983b648ff0cc4af8a2fc83d49f8205652fd2c9aff677b7fc762cd680a8807,2023-12-05T02:00:37.353000
CVE-2023-48335,1,1,61b5f7033f164cb2481607d543c464519186923441d0880cb42294b6d6bbb6a6,2024-06-04T11:15:49.897000
CVE-2023-48335,0,0,61b5f7033f164cb2481607d543c464519186923441d0880cb42294b6d6bbb6a6,2024-06-04T11:15:49.897000
CVE-2023-48336,0,0,0500b8d2c9b08c2545fc053ed48c8b3dd50e78c44ecbc2baa7b08208fc134e3a,2023-12-05T19:35:59.777000
CVE-2023-48339,0,0,54b580af57f5c06ac8bbaf90202520b9bf64e5db8bbec32ab8b76ceee04983cd,2024-01-25T02:12:20.037000
CVE-2023-4834,0,0,1aad50d674b08296d5b986a72b4429e47fba418a23c5c6f2bbe28c922123bb70,2023-10-24T14:52:35.443000
@ -235714,15 +235714,15 @@ CVE-2023-48741,0,0,a92c2da5cebe16780e28f133edac9861605b0d925126e08e6df09f76e8f6f
CVE-2023-48742,0,0,f211d26a39684bbc82397688428859c96ab63447077c12eb49e1380e6817d650,2023-12-05T20:10:51.070000
CVE-2023-48743,0,0,7b8ec35a78dea18972ab266a206481f6371ca390074dfd6538358cd75b0f4147,2023-12-05T20:44:29.720000
CVE-2023-48744,0,0,25a26f9835da4908a5c5aefd541c33d57f99b04f95414d164a291a09a158ed7f,2023-12-05T02:00:43.043000
CVE-2023-48745,1,1,9b5e5a5d545943a39781323d90eb43a3f450a94fb9dbb4800f1c542c947f2b72,2024-06-04T11:15:50.123000
CVE-2023-48745,0,0,9b5e5a5d545943a39781323d90eb43a3f450a94fb9dbb4800f1c542c947f2b72,2024-06-04T11:15:50.123000
CVE-2023-48746,0,0,db79a88b883fab98d8d2f19205a2ffe39fb095bd0d059dac263e60576f54eca9,2023-12-06T13:22:43.777000
CVE-2023-48747,1,1,cbc7a34b81842e11d57df1dfbff383a92142f4141ae108e99770ba30164913ce,2024-06-04T11:15:50.347000
CVE-2023-48747,0,0,cbc7a34b81842e11d57df1dfbff383a92142f4141ae108e99770ba30164913ce,2024-06-04T11:15:50.347000
CVE-2023-48748,0,0,e27240c4bb25988cb0190927138af5aff6a5e96fe21a6d72f9fae4e348f442bc,2023-12-06T13:15:14.420000
CVE-2023-48749,0,0,7c695c40b2bc6fb4ed546b0695996ab1cd706a664727f360b733f720631c34e8,2023-12-06T13:07:08.697000
CVE-2023-4875,0,0,4b1b5c484a012ff1b28a7f0dc51210addb30740757cbd9468800a3ba3f8e9ac5,2023-10-15T01:55:18.347000
CVE-2023-48751,0,0,fb75af98554e00c7cdc3ce2660694f94aa9646c4fa85eb2252007edf922741d4,2023-12-22T19:32:34.560000
CVE-2023-48752,0,0,6617438a452311d1c3b3c4464f90889ea0bbee28b49f83519f60c00eab92683b,2023-12-06T13:29:00.633000
CVE-2023-48753,1,1,abd24014c7570f4f03cdfbbb79d7834d5bee2d37875be12b849d4eb11701156e,2024-06-04T11:15:50.563000
CVE-2023-48753,0,0,abd24014c7570f4f03cdfbbb79d7834d5bee2d37875be12b849d4eb11701156e,2024-06-04T11:15:50.563000
CVE-2023-48754,0,0,0569193cd78a4efadd60bf838471661ca63bd091c9aeb68b7a8fe14fbc81daf8,2023-12-06T00:38:46.417000
CVE-2023-48755,0,0,89f1a2b9527257064e17a247159ee4cc7befcc939c8ab5a8c446ef85da2287a4,2023-12-20T21:09:32.063000
CVE-2023-48756,0,0,8c30dc5020c654f585a0d5dd735951cb2629fc1084a1290d46751808b441b84a,2023-12-18T19:06:14.257000
@ -236345,14 +236345,14 @@ CVE-2023-49738,0,0,5c4f6ee44efbee607c5172901fe24b0e1c0f9924fd7d48aa8f7d198bbcf99
CVE-2023-49739,0,0,ed7af1af7b29da09287b9796692740d5a8f67a583e414c6ddb16b5263abbb30d,2023-12-19T18:06:46.643000
CVE-2023-4974,0,0,c4bd83e1a1fa436b6dfdd7a5ef085fb02d99f77a4587e2924b09b7a6db31a622,2024-05-17T02:31:54.310000
CVE-2023-49740,0,0,3b57b466e1f923eaa7ef022a2f7c4ea812dd859f4964babb0a9a182102c6b49e,2023-12-18T18:29:26.233000
CVE-2023-49741,1,1,6b611525c8b073f615443d94018d2c2732d21203a58aba597ee75a13322020a0,2024-06-04T11:15:50.783000
CVE-2023-49741,0,0,6b611525c8b073f615443d94018d2c2732d21203a58aba597ee75a13322020a0,2024-06-04T11:15:50.783000
CVE-2023-49742,0,0,62d3d5e2d89e9ccd812d34cbd7497ba402f194b446f9b240dbcc0a1df068be93,2024-04-18T13:04:28.900000
CVE-2023-49743,0,0,13f5af3ccb1e4b324e598e3022c0f930ec45448d3679021de25381951c590aa0,2023-12-18T18:39:56.250000
CVE-2023-49744,0,0,62713799f09c53108f2fff9617764ffd422292e0d6304d7c901d420c7eef25ca,2023-12-21T17:29:00.677000
CVE-2023-49745,0,0,fffe20c1d784d2b7c929f594f59c7d620c018b6b1ac8213ab25365d0b1ce526d,2023-12-18T18:40:10.603000
CVE-2023-49746,0,0,7086509a0a0c71fbe6be2d29719e82b965414157929156963d5040af0551b492,2023-12-12T16:56:40.860000
CVE-2023-49747,0,0,21a210db97f34b7bf95b947fb2b54bbde2fb7bfd23ca7325bb5d718084ed2eba,2023-12-21T17:35:43.413000
CVE-2023-49748,1,1,bbdccad53f9cbcf17dbd24c4803f84db4f01fafb605cc6da67255d93ce80b947,2024-06-04T11:15:51.010000
CVE-2023-49748,0,0,bbdccad53f9cbcf17dbd24c4803f84db4f01fafb605cc6da67255d93ce80b947,2024-06-04T11:15:51.010000
CVE-2023-49749,0,0,54d721a1f8919dabe6c9453544384d6d3d957df342128d6b5aecbaa6f328df38,2023-12-21T17:43:48.513000
CVE-2023-4975,0,0,8746de5a5b3e758d2eb01465a0483347d84f3de15eb42458491766dbe13375a2,2023-11-07T04:23:15.203000
CVE-2023-49750,0,0,d8056be5916469b0d9e94f40417ace5cb8a17b4b964d872989008fc697c814a7,2023-12-22T12:14:32.417000
@ -236375,6 +236375,7 @@ CVE-2023-49770,0,0,0a27ec81e7d2882781700f3f05263aa58179bb03e78b71006e6b846b4d551
CVE-2023-49771,0,0,25464d73165426744b02c9f49706298b0ff1f4a9711ed66b34eb497db89f9d7a,2023-12-18T19:48:00.757000
CVE-2023-49772,0,0,a9c6d356989d18cbdf75cc99aa7292cd305b1269f1734c9284be97b44edfd318,2023-12-29T06:51:44.587000
CVE-2023-49773,0,0,a29c82b68c38b870b413fd21f673ae686821be0c9914c1dbad6cd5a31f2164d6,2024-01-05T12:07:52.007000
CVE-2023-49774,1,1,d87eec6c937071ed390422c146a471f625251b48bb973e62c93290badc718e3b,2024-06-04T12:15:09.700000
CVE-2023-49775,0,0,40c822889bf4000ae32008f8ef3937292cf731d4ad1dad7389d0d22508b83295,2024-02-22T03:40:18.307000
CVE-2023-49776,0,0,1a7a5f372e14f3c9fad3450d1c48237fd9788b252ad2be1ba464bd51debd7e73,2023-12-29T16:55:58.180000
CVE-2023-49777,0,0,07d0b44c4bf3b90fa1fb298960b918af48834842fa08093065f9437c7c73af76,2024-01-08T17:32:52.710000
@ -236419,6 +236420,7 @@ CVE-2023-49819,0,0,547af230d15dfd9c5dd18465c1156e2cd30992e5bd1e74e9c3b0138634a11
CVE-2023-4982,0,0,41bf569dca1252afc469aa49798e49aceff83425feac1cab042002f01a9fbb29,2023-09-20T13:13:16.680000
CVE-2023-49820,0,0,cc65d3c16a2ed6a78a8dc44a38f48d2d659c8d8dc6d13d0c7f0f31e620dc95b1,2023-12-18T19:47:40.197000
CVE-2023-49821,0,0,ea958c3a5356314f5ebd8da019a3638d7ee7d98170762858f9b87732987da0f5,2023-12-27T14:40:34.053000
CVE-2023-49822,1,1,210f290b7589629b96c13ccb5934320741a8d110551b75a63233a62682430343,2024-06-04T12:15:09.933000
CVE-2023-49823,0,0,8f2fc02f1bb3df69cf426805af6c0c29004c9c376f2fc1b3cdee732e682a2a1f,2023-12-21T17:48:09.407000
CVE-2023-49824,0,0,d656c2942fa1d9047823eeaf8be29fe598a8e3bce63744a39ef17792669626af,2023-12-20T04:21:23.460000
CVE-2023-49825,0,0,564d625cac80c8dd44c72e2b8977f13c7ccf226b197a9d82a51ee60081d03869,2023-12-26T21:33:58.223000
@ -236443,6 +236445,7 @@ CVE-2023-49844,0,0,f2868caf273e3497c015d6733bece2f3f8af42caa378ba666fe51e3cb2e80
CVE-2023-49846,0,0,e2e1045a2d57e3d1aaac660179893a2dc5c48927dc834c27f1c9d97c6b8ed287,2023-12-18T18:20:32.197000
CVE-2023-49847,0,0,57ad2c297ed98561b1b6ae8e6341166fa7a927823adeb102e61d4eedfe017a39,2023-12-18T18:21:09.460000
CVE-2023-4985,0,0,d6d14f319e2bc2661748ecc56a5fd5f644c6eac7bc3510996570baa1839c3227,2024-05-17T02:31:54.817000
CVE-2023-49852,1,1,53d932a7b3600e5f1bfd3d9acd4f8b6b81737c2c607394811290ef32857eba15,2024-06-04T12:15:10.153000
CVE-2023-49853,0,0,df9c497ec180b0ea27bb19dc1ec5d9bf2dd7d8f1a8f86c93a2259f3f2ff71482,2024-02-29T01:41:39.820000
CVE-2023-49854,0,0,9c2a3b81b76198670284c219165421a8ef4dfb208eeb34f7864c56e36865d11a,2023-12-20T04:29:09.497000
CVE-2023-49855,0,0,71b807144c6de240eef9dab96b3d99b0ad27634e5a9757aeed24c9dc84513bb2,2023-12-20T04:29:01.180000
@ -237375,6 +237378,7 @@ CVE-2023-51508,0,0,099af3ff1b9f679effb5120ee494202dac60ab65a92678cc7e6be069d589f
CVE-2023-51509,0,0,aca08ca21768d303c35e41d15b9bbe6af6c7742abca074387d9b454c0c3c1bfc,2024-02-06T01:02:16.330000
CVE-2023-5151,0,0,1b68d8ee874e236cbdc70956d4d3baa8dfa247178722cc1fc700d4d7c992bbf0,2024-05-17T02:32:51.987000
CVE-2023-51510,0,0,1353ad84455c49924d2f2d254540a7ae311db5ead3a69fa8532e229874af65a0,2024-03-17T22:38:29.433000
CVE-2023-51511,1,1,042b8e47f2b821b02bf4f7824ba766a19e245eba9bd1eb1020bc3f40dfabead2,2024-06-04T13:15:49.430000
CVE-2023-51512,0,0,b503b131cbc4230950d7fc98e64892f0904a9f3b2b59ccf4a240d2b4fe53e2d1,2024-03-17T22:38:29.433000
CVE-2023-51514,0,0,44a388f30c139a4590a3bf56e00fe693595a163e9cef7869b048530195c7b7e1,2024-02-06T01:02:10.990000
CVE-2023-51515,0,0,3422ae4f26a23a247945a7b0cf74e34e46aa8f9a141eed6440357fa69f923e4b,2024-04-15T13:15:51.577000
@ -237401,6 +237405,9 @@ CVE-2023-51539,0,0,bdb4b88364881927645b78ec47bf86f0a85efb3eff25f2564bb75c3725083
CVE-2023-5154,0,0,a99c59508426987620982876617160c47179b836a93c4355f648aeed6078c463,2024-05-17T02:32:52.320000
CVE-2023-51540,0,0,4fb8cacaaec655ca39d5ac85ca2324b1623f919eb27ed5943f1e12c52d59db00,2024-02-07T17:05:59.580000
CVE-2023-51541,0,0,cf9fd5251982ae34f9d1a6c7ef7137712140adac1b14b66e98b30f5cf2d4cd8e,2024-02-29T01:42:04.593000
CVE-2023-51542,1,1,1771922fd3484598e40baa54b054b8bdea7b32ec3763a0875ced67628c53b9e5,2024-06-04T13:15:49.820000
CVE-2023-51543,1,1,fbd491baaf7fcf6e74371f364724907217f6b5e90af51db95dd93552dc9a512e,2024-06-04T13:15:50.047000
CVE-2023-51544,1,1,8d6401d7505902ff136f9423094cec411f84918880925bb458970b00c9fa3d3e,2024-06-04T13:15:50.277000
CVE-2023-51545,0,0,a4142e2ca4ce5852b08d515f5a62a78fc16a002d435f2b6b5d7f079a888f8b26,2024-01-05T18:05:04.407000
CVE-2023-51546,0,0,26733dcf79d4f473dab932b27fb2a2b7a3d3d4f7a3911c5af91f1e6b8bc34ece,2024-05-17T18:36:05.263000
CVE-2023-51547,0,0,c982f4b046496a731b5048a632534aea5fe458955a1b974571191fb8d5f7c885,2024-01-05T20:49:25.943000
@ -237517,6 +237524,7 @@ CVE-2023-51663,0,0,d83a7d32fbb7435bcb58f5bdc28a62b2d33e29b22cfaddf45ebd3b75bac9f
CVE-2023-51664,0,0,b0d24350338011662545bfc012cfe08d4b6a10d0b7b21df88520461376c5490b,2024-01-04T16:57:12.717000
CVE-2023-51665,0,0,8c54347d2c48708098279dbf3ec2f0230cb0c4a2e65ee8666de19a799abdd62d,2024-01-05T15:02:21.103000
CVE-2023-51666,0,0,d01488de41e6bcc8e1d26db42f71396fa97f6f13c18ef4f0fc4b1c0b568d6404,2024-02-07T17:06:35.410000
CVE-2023-51667,1,1,2f3ac86e61a526f622f2323a646b7b9e8d3209faee82adab403ec6357b34130a,2024-06-04T13:15:50.500000
CVE-2023-51668,0,0,1605f66809b9c96416733ec8082d6eaac2861c71b77512691b688d40edaed58d,2024-01-09T14:27:16.827000
CVE-2023-51669,0,0,ecdca3dab41c8a74480f540b0cebb63f42a6ac98e701e7aab8001a68e4335dc0,2024-02-07T17:06:50.843000
CVE-2023-5167,0,0,cc354b4f412e0824e85932f819009ad505168825905c48c26b3fe18753ae9969,2023-11-07T04:23:34.800000
@ -237820,6 +237828,7 @@ CVE-2023-52143,0,0,711faec443a2eceed610aa81a0c2fce4bb20cec3fd1831b74c7a26cbff4d3
CVE-2023-52144,0,0,f3e06f44687c2af6d25f760f06e0239c02c3db680ee09c9d59e0d01da4248947,2024-04-15T13:15:31.997000
CVE-2023-52145,0,0,7a4b86956bd2ef9e4b16ef2a82e6462f9219f9e13f0ae66de84a4e79d421a16c,2024-01-12T14:39:24.130000
CVE-2023-52146,0,0,a01692a3acbd9936f1f4912ddff572a9839d99c6f5ecef64634d55ed19972c47,2024-02-06T11:15:08.657000
CVE-2023-52147,1,1,a7e0e57795124e1ebd09e5759142657a8bd03b4d277d1dbb4ee511f3c64cdd69,2024-06-04T13:15:50.730000
CVE-2023-52148,0,0,716b87f6e18a732ca60d290639cb79893e0331604cbc045eda29dee1d4212aa5,2024-01-10T04:02:08.553000
CVE-2023-52149,0,0,0bd5a11707677d04ec1d347e3774371d4331c358a0588dd55ae4cf33b96f538e,2024-01-09T15:32:14.667000
CVE-2023-5215,0,0,13126b2cecc0981cc34463918545b3414c046ccc056278c34b43595cc3474eef,2024-04-30T14:15:11.137000
@ -237837,6 +237846,7 @@ CVE-2023-5217,0,0,7ba5b927181a714978a513b1447492d30b9204770bc875e02b0ddf7485f511
CVE-2023-52173,0,0,653751d06808116187d115997433d85c759b866ee7527f311b397336366ebb4c,2024-01-04T23:34:46.453000
CVE-2023-52174,0,0,79e20d77a07605a892f972d0d5b1fee1a2293c3b3ed991923dbc5981d1985ef0,2024-01-04T23:35:08.563000
CVE-2023-52175,0,0,dc148159de02306a075c5c5a9359ae7fb04b3bcbdbd59c15cb123213aa494f1c,2024-02-06T20:46:18.473000
CVE-2023-52176,1,1,60b4bca549b28d34a700f5f03601ae624af8ad7a2f4a2ac1a316d4c5023c3f21,2024-06-04T13:15:50.960000
CVE-2023-52178,0,0,c09e49f81eb32d843010688fb3f1a4cc63da60711f94d2031dcf5162594c7cfa,2024-01-11T14:17:42.607000
CVE-2023-5218,0,0,5d39c307a229ebb116959b5d798682370d3d430565ab1c1feb7036208e28c8da,2024-01-31T17:15:18.423000
CVE-2023-52180,0,0,8b413e2e8c63ed1227bc9cbfc39a312c2260cfa648393fc28b71bda1979be008,2024-01-08T14:46:37.220000
@ -245135,6 +245145,7 @@ CVE-2024-25597,0,0,995a42bb5448cb09cb985e0b42e6cccd2cae6222c241291d138853f854550
CVE-2024-25598,0,0,43981dc647595567427079648c996df524b855802acc767a53f000d4ab2b6b3f,2024-03-15T16:26:49.320000
CVE-2024-25599,0,0,032448a69971fef9ee741a14b966aa271b8012f133cb0ca23a0dce51bf94426e,2024-03-28T12:42:56.150000
CVE-2024-2560,0,0,809d62945ef2e3d90fbf469b99de295e3fded702b00ce1ccb1e2ea6f85a4ab6a,2024-05-17T02:38:19.143000
CVE-2024-25600,1,1,9728ea83eff5cc16eb40a7f851f99566d3f8a03981b26f312619d45f01c05cb0,2024-06-04T13:15:51.183000
CVE-2024-25601,0,0,81f4fdae91c2e2979380ffdf7201132bd42db70ea50ec659a221655da6bb1b91,2024-02-22T19:07:37.840000
CVE-2024-25602,0,0,6a0412f9e3d86cacfb35a934a8fd793128a0f85212ec26797b187230b94df26a,2024-02-22T19:07:37.840000
CVE-2024-25603,0,0,863f490c7ea22d0d3c701bfeb2e8a36747268d73fdd29bb24261158009a35432,2024-02-22T19:07:37.840000
@ -247505,6 +247516,7 @@ CVE-2024-29165,0,0,56d636407e1bb4b0ac449c45605f98b67e37c82a870441216999fc8912fdf
CVE-2024-29166,0,0,b13dfaf0c8e4ea3bbd358bd8614d1947c156835fe22c5095fd83f7cd95ae4bba,2024-05-14T16:13:02.773000
CVE-2024-29167,0,0,bf34fde11ddaf885eca651982ced409116d0263648d1d196b5990bfa9a0517fe,2024-05-17T02:37:49.993000
CVE-2024-2917,0,0,738b9419e321262581cbcbc36e60bc25c85f82bd40a8ab12d5b727ad6cc0972c,2024-05-17T02:38:37.297000
CVE-2024-29170,1,1,bf425dc43dbbce8ec07b471a39b9166b4abc9f24b393471e7948f4e337b6d71b,2024-06-04T13:15:51.460000
CVE-2024-29179,0,0,f19d4d0a9f8b6dc85e6e021ab22950c73dd30b1b16e940f3cfc8d8b6deab42d4,2024-03-26T12:55:05.010000
CVE-2024-2918,0,0,ce50c7c24dc6b969578ed47f388645920a5e5c8ad0b49917ec2e7ecd8d9606ee,2024-04-10T13:23:38.787000
CVE-2024-29180,0,0,41debf5c02b25447b090e1fe17310ae2918a3e33749dbf7033ce058b1311f912,2024-03-21T19:47:03.943000
@ -249966,6 +249978,7 @@ CVE-2024-33538,0,0,e7d86585abc433df63c34994a7b1a015734175492b100326db14778bb8d1f
CVE-2024-33539,0,0,87f154978a987e28cf100a131c9fad421daff9a6f4f5e6dbc40640de68db94cd,2024-04-29T12:42:03.667000
CVE-2024-3354,0,0,5aae79cede7291e1765a3e1fa18184af5eeaede0f0b8f7a4b3c7ba1d02dd5fd5,2024-05-17T02:39:51.963000
CVE-2024-33540,0,0,1e814a0ea27748156363c52e26bb77b4bb9ce63c0961730b17ad99865f2d78c6,2024-04-29T12:42:03.667000
CVE-2024-33541,1,1,a61e990affe83985122586c91f6ad3d92feb633a02d52b64fc38eee6bc8a69ce,2024-06-04T13:15:51.717000
CVE-2024-33542,0,0,5cebfa7c22f12a6aa2675dd4ec6e19e1966575adb9d6e6e73c2f3dcae54dbf8b,2024-04-29T12:42:03.667000
CVE-2024-33544,0,0,6e4ff4d9102a5d0f999b74773217097beffc904dc7d907863d8222867af3d336,2024-04-29T12:42:03.667000
CVE-2024-33546,0,0,b169a469c02b39c7428e1081bafd0bce76a92a565897fda0bd0e3619ddaf047f,2024-04-29T12:42:03.667000
@ -249978,9 +249991,11 @@ CVE-2024-33552,0,0,fde617a71e53ba17ca9f10ac03296324c4dbf70e1400c675507bd26b68dc4
CVE-2024-33553,0,0,a63cd25e668e51ecdb575a6c39c2fdd900060fbc8acd7ddcf7e42aae11fc033a,2024-04-29T12:42:03.667000
CVE-2024-33554,0,0,2fa44634a105abf41bf64ae29b253ae6fabbadcb928bf62199eae71c375589ab,2024-04-29T12:42:03.667000
CVE-2024-33556,0,0,bf8553efa7bbc1b53671beaaba018dbbf4557a86527dffcc557df95897680dab,2024-05-17T18:36:05.263000
CVE-2024-33557,1,1,42cbf8fc34dea1ad453bb3d2e23e10183cebceee26581826255fb0494e61e154,2024-06-04T13:15:51.943000
CVE-2024-33558,0,0,cf1181c3a097a2fb7b0482529266f16182741fa48852985dd7469f08bd1e4d39,2024-04-29T12:42:03.667000
CVE-2024-33559,0,0,7cbd898a0eece080f97fc20fdacdba598f6fa88c2c0ecdd34006e14d646ba964,2024-04-29T12:42:03.667000
CVE-2024-3356,0,0,cd18273ede30de9828727c0da7510b9e37ba44a42d6203a51ac948e77f776d06,2024-05-17T02:39:52.150000
CVE-2024-33560,1,1,5ef739de84b42583b231c5b739be0d6b3fb9f1233b52b0423556c9a8ef411bbe,2024-06-04T13:15:52.177000
CVE-2024-33562,0,0,27fac541d1d64e11476c3268a849af55b6413283c20341e42235e842aff36652,2024-04-29T12:42:03.667000
CVE-2024-33566,0,0,46d17e7fcf76ea9cc29b76ef68ee9038fd04b7d980a772b2f399515ebb8e8216,2024-04-29T12:42:03.667000
CVE-2024-33567,0,0,dbf0f06551a8f63fcd89d5d4c2980276f319d41b21ef5e34182332a6cf0b6381,2024-05-17T18:36:05.263000
@ -250976,7 +250991,7 @@ CVE-2024-35809,0,0,a20abd752ca7263fa57e17381fdf662c622b2b6d7c563548527c7d46a06a4
CVE-2024-3581,0,0,a1d8e06f506128ffd15dfdbfe16c45cbeda8736a3df4c463fa4b80646e4712e7,2024-05-02T18:00:37.360000
CVE-2024-35810,0,0,be2abeea367f182a6b1ad511a953cc5bc3876003e09c08bacbcea430ee5fe141,2024-05-17T18:35:35.070000
CVE-2024-35811,0,0,27b4a06cce495c0252bdb484475751deb9bef827ca7f31a4d89a8659cbc66076,2024-05-17T18:35:35.070000
CVE-2024-35812,0,0,f13f173d6de0c30473a98a382eed04b265d2b463e58ba0ce3e6936a82c1dce11,2024-05-17T18:35:35.070000
CVE-2024-35812,0,1,7d0d1a60f242229a3825673001282d0446ce7ae166b119c0e506a39221a4e148,2024-06-04T13:15:52.390000
CVE-2024-35813,0,0,7f0801adafe019d639700d85a9fa220ec1f0b3c66e04320a29bcb7624d670e5a,2024-05-17T18:35:35.070000
CVE-2024-35814,0,0,18619d6cf722935daa54c4a2017ed9cd3b4228dac5f23c34be01df98692cef75,2024-05-17T18:35:35.070000
CVE-2024-35815,0,0,1d00d6fdf4115b14510d7465a283171c0668b0395473dd9063745f95bf83afd8,2024-05-17T18:35:35.070000
@ -251113,7 +251128,7 @@ CVE-2024-35938,0,0,0a97241552b0a2279900378439f264fc85d4dadf028946adfbf927738a4e8
CVE-2024-35939,0,0,20c3dbeef818d9aa28443d6cf86dac7a5d6a50e673e76146dc31fd6948dfac55,2024-05-20T13:00:04.957000
CVE-2024-3594,0,0,209dc6f01ccd5e1ecec06375c2725f4b71324d4b1d9a6775144228e87cb1819d,2024-05-24T01:15:30.977000
CVE-2024-35940,0,0,ff44bf313ea93cfd1f39b3e086ab02419b832b3abdb6b56cf686dfe8c2dd1d2b,2024-05-20T13:00:04.957000
CVE-2024-35941,0,0,797c49d7896742bdeec32c59cc1111415415a7dcb18ab809dc56475f10c88702,2024-05-20T13:00:04.957000
CVE-2024-35941,0,1,cdd45b79cac38121859bfcfe5c975cf81ee19a43fc4a3c73b0bb3e31cf6dffb4,2024-06-04T13:15:52.613000
CVE-2024-35942,0,0,9db86445e57f0ae9bd7c5c221f0b1ea58d46a866af07a30b8b6df3d6360c4681,2024-05-20T13:00:04.957000
CVE-2024-35943,0,0,6d5a179a77a7d5fbfc1a09ae3c18a0804de9a0f865d9e440ccce732b214ab68b,2024-05-20T13:00:04.957000
CVE-2024-35944,0,0,03e78dc0d2dba5cd5703c6b70b572bff837a7d117c07064ba4587d2453d9da68,2024-05-20T13:00:04.957000
@ -251343,6 +251358,8 @@ CVE-2024-3678,0,0,d720397e0ff5aed34935621b66252dd502ae3dd7e987e20f2aefa29510c090
CVE-2024-36782,0,0,b125b3a72d1ca291a6285f37e0bf5c6002ab42e2c44720275654f49004fa59e7,2024-06-03T21:15:08.453000
CVE-2024-36783,0,0,9429685fad0c5f6ef563b0834ac6de6fd1a76a909464a9f869ec3bc63d22200e,2024-06-03T20:15:09.370000
CVE-2024-3680,0,0,b1ed78ba2c31e060c65591b1b4aa0e0cdd627bc790583f352919e473d1394bc8,2024-05-14T16:11:39.510000
CVE-2024-36800,1,1,0ef8068eb66e203a29f33ae72b6609698d839354f5120eaa85406c000d7fda7f,2024-06-04T13:15:52.740000
CVE-2024-36801,1,1,bde29bd91f0ea2b17756cf39c0023fc8cf0d38db1955cca314b84697fedaf84f,2024-06-04T13:15:52.857000
CVE-2024-3681,0,0,4cc6e1e77320458af0f4beee59a38c9a663fe20b962b28f234c099bc7c23ab32,2024-05-02T18:00:37.360000
CVE-2024-3682,0,0,a140f5eb71acf183c1e80e0d2f5a14a5c7d8a92c7cf9dd3ea5250a20e3cb490f,2024-04-26T12:58:17.720000
CVE-2024-3684,0,0,e7edf7d6bce31b480b46d692afd4304c988268ba4618e87da8566dc118f2be92,2024-04-19T16:19:49.043000
@ -251455,7 +251472,21 @@ CVE-2024-37031,0,0,967b2a62510a1f35de5969f18efe9a7e1918d9bc4c74d0011148e6a904de3
CVE-2024-37032,0,0,2685d1c2a61b0baf7e7faa92d5cf7d5d7556f92ff89a923043de9b45c0417821,2024-05-31T13:01:46.727000
CVE-2024-3704,0,0,ad7f205e31bc442943bbd584692b194a3485d815654eeb83e4eefef6a6eff393,2024-04-15T13:15:51.577000
CVE-2024-3705,0,0,44f1c76d2f6cd8dab882ddfdbdbe908a4e3a8f22d6a90f31f0279b7faf87a669,2024-04-15T13:15:51.577000
CVE-2024-37052,1,1,3f5dbb8279abb63e329080724732187fc9f99ad501f149512a1c7e8e700a5b5f,2024-06-04T12:15:10.413000
CVE-2024-37053,1,1,06b14decaca586b1a1f96c116b9f8676964806f8e8a9c20ec7e3dbfd0fec766c,2024-06-04T12:15:10.957000
CVE-2024-37054,1,1,57448177ce71e9f56b05c697cb4673d16b29d6e153f2c2e962ca0027372bb9b4,2024-06-04T12:15:11.190000
CVE-2024-37055,1,1,8c0eb9eff684d7865d587e04b6bdc7d688269b03387be1a776c35a49dde5e71a,2024-06-04T12:15:11.397000
CVE-2024-37056,1,1,9287ec26e966b7115e7aaf90bacd0db24c904322d02e7e19db805676003ae906,2024-06-04T12:15:11.593000
CVE-2024-37057,1,1,be37f1a17287222d62db0a9c6e595917b58461a2c6e9f49801079ad506331f26,2024-06-04T12:15:11.800000
CVE-2024-37058,1,1,9d697419d978d0964970869c524cfc70dad406c081a5667b762d19e7e5310d7b,2024-06-04T12:15:12.023000
CVE-2024-37059,1,1,03b47b4ebe2e5e1032a2f0b2a9d620d3b5632604a674dce4406017b56267f0d7,2024-06-04T12:15:12.227000
CVE-2024-3706,0,0,93b27543775cdce8e7b256b8d014ea258e7a61f0ddb1cca03581da1a85330700,2024-04-15T13:15:51.577000
CVE-2024-37060,1,1,661eba28447dfad4d9ccc377c33f78f29646d134c2785f7c0a91f9ea3edcd552,2024-06-04T12:15:12.463000
CVE-2024-37061,1,1,9e56eb047fd6a9bfdb96b5456491054b4b30d574a06065e25ab99d482d4d1aef,2024-06-04T12:15:12.703000
CVE-2024-37062,1,1,af2a31045e6a2bb6b86be7ee8f84bff534ad3fe7ba658b72c1e279e59df9bbbc,2024-06-04T12:15:12.907000
CVE-2024-37063,1,1,c36321c284258a858f2e761d8bc93fd058f2479d01ee0d17d4414dc878be5b32,2024-06-04T12:15:13.110000
CVE-2024-37064,1,1,c1846da256912416f57b22cac34f81d6cba7e772bf4878b3b976ec712e871da4,2024-06-04T12:15:13.313000
CVE-2024-37065,1,1,d0e09f8ff65ce62f3f9761336170e1df68ac6860fc59f9faeca2497dcfedce51,2024-06-04T12:15:13.507000
CVE-2024-3707,0,0,cb892298714e8d1628bf09ece0bc00ef0a1a1429034ce83bb3286f4d822c160d,2024-04-15T13:15:51.577000
CVE-2024-3708,0,0,09132fb1644ebf0c808002aa8ac15b19f13ae71d0beb378f7a9664a5ae685f9a,2024-05-24T01:15:30.977000
CVE-2024-3711,0,0,00ee502ae0ae8bdc802cd38eb1ec1e1356c10e1c18d766a4effd20297a066f55,2024-05-24T01:15:30.977000
@ -251834,6 +251865,7 @@ CVE-2024-4250,0,0,b54487ffa8dc260b8a713e1b78312dec0b498701946f695ae48ef053246603
CVE-2024-4251,0,0,704c5045f34e20b238053203ffa6ddaa27c0f1f93911f12090c1ee9114f5097d,2024-05-17T02:40:20.940000
CVE-2024-4252,0,0,3896f5ee238bad3d7e0a938dc110cad0a34521ba589448d2dc895a14fc511275,2024-05-17T02:40:21.053000
CVE-2024-4253,0,0,de2ab3010fb03c983c55ebf995f5dbb83eb08b82e01721b3c66a29011336f26b,2024-06-04T08:15:10.863000
CVE-2024-4254,1,1,06ffe91e2ddfc00c3065cea3e4124d1316c753ab6132ef0f7c3b9e309588ba4c,2024-06-04T12:15:13.710000
CVE-2024-4255,0,0,fe667b23218914fa44fee4b4c2a7be125396fae9094659c59aa2ca90b0b1e450,2024-05-17T02:40:21.147000
CVE-2024-4256,0,0,f01b9b3012ce7ea24c9894def6f3f1cef49ac09bb4f57d3ed8f552e5b1070b71,2024-05-17T02:40:21.240000
CVE-2024-4257,0,0,0f6d2313bd719b89d901deefe2dc2f87463055c189b3c018795a055e61e9ea45,2024-05-17T02:40:21.330000
@ -252097,7 +252129,7 @@ CVE-2024-4631,0,0,e8ed3d07eca49fd9ce5a62406bcf23da9793cbcc792a956665a267b4f25fd6
CVE-2024-4634,0,0,26305cc83de7193b57243a5cab6ca5caf74694a0d7bbca15218a554118aa8eb8,2024-05-16T13:03:05.353000
CVE-2024-4635,0,0,39b2c6bf6977107b11329776563f920ebcfe13f250d063c0984d8282a28a8353,2024-05-16T13:03:05.353000
CVE-2024-4636,0,0,408131d6e6f7a1de019141a0a08ced7ddc9316cec6084c2dbfd44b2d5b664bc5,2024-05-15T16:40:19.330000
CVE-2024-4637,1,1,a605a04484b96e3a6a910efe0a6e265dcf432bd7a6e2f2cd212d05a85cc08f14,2024-06-04T10:15:12.503000
CVE-2024-4637,0,0,a605a04484b96e3a6a910efe0a6e265dcf432bd7a6e2f2cd212d05a85cc08f14,2024-06-04T10:15:12.503000
CVE-2024-4642,0,0,af413e9c39a7a95f4fad15629993388538023a0a54f7d3f1141388f9a4b404f9,2024-05-20T17:15:09.667000
CVE-2024-4644,0,0,b69c44e7031d29361edbff8c9258531bdbfd599edff21b6fb592b731a3a8f1d3,2024-05-17T02:40:30.603000
CVE-2024-4645,0,0,029fc657c20e99e63c4a0896df7eaed00c7e95079c841983238fcd27dbc9082f,2024-05-29T20:15:13.240000
@ -252544,7 +252576,7 @@ CVE-2024-5433,0,0,d0946774ada383b4af0e78f23b9c449d05f83a7124810af4e383f90b0cdbda
CVE-2024-5434,0,0,dc2716eb218edba725ac85c17a2930de7a00b6563d0ca53040574106ea0b92ed,2024-05-29T13:02:09.280000
CVE-2024-5436,0,0,95eba267f429de080e9b35fcd14e1e1840b0308e404c32773ec35c18106c7cbc,2024-05-31T13:01:46.727000
CVE-2024-5437,0,0,557d2d92d351d0b9c718cc97d7a9d4fae40afc0a93c4cab84fee8196b51766e4,2024-05-29T13:02:09.280000
CVE-2024-5463,1,1,fe017f987e6e38031b776f174b46d000a6764b4fc1c9858754e10d32745d4ce1,2024-06-04T10:15:12.747000
CVE-2024-5463,0,0,fe017f987e6e38031b776f174b46d000a6764b4fc1c9858754e10d32745d4ce1,2024-06-04T10:15:12.747000
CVE-2024-5484,0,0,7de35f8eee9232651ed147ec3168f6740617b1737ec3ff6913988b98b84f6ef1,2024-05-31T11:15:09.783000
CVE-2024-5485,0,0,cd934d054521f90c46895e6b8fbe14d28fa1f85abdd6db3cb4bf3a673d266bae,2024-06-04T07:15:47.700000
CVE-2024-5493,0,0,8180f9c7c83a7ebab82ac7c00536ed64f553bc96cb8ba2cddb06ad7e2d969883,2024-05-31T13:01:46.727000

Can't render this file because it is too large.