Auto-Update: 2024-05-03T10:00:38.143835+00:00

This commit is contained in:
cad-safe-bot 2024-05-03 10:03:28 +00:00
parent d0c1e590cf
commit 6d32aa6193
29 changed files with 1488 additions and 85 deletions

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2023-25457",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-05-03T08:15:06.603",
"lastModified": "2024-05-03T08:15:06.603",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Missing Authorization vulnerability in Richteam Slider Carousel \u2013 Responsive Image Slider.This issue affects Slider Carousel \u2013 Responsive Image Slider: from n/a through 1.5.1.\n\n"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "LOW",
"baseScore": 5.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 3.9,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-862"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/slider-images/wordpress-slider-carousel-responsive-image-slider-plugin-1-5-0-broken-access-control-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-31211",
"sourceIdentifier": "security@checkmk.com",
"published": "2024-01-12T08:15:43.137",
"lastModified": "2024-01-19T02:09:26.650",
"vulnStatus": "Analyzed",
"lastModified": "2024-05-03T09:15:07.230",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@ -41,20 +41,20 @@
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H",
"attackVector": "LOCAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "CHANGED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.0,
"impactScore": 6.0
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
]
},

View File

@ -0,0 +1,32 @@
{
"id": "CVE-2023-35701",
"sourceIdentifier": "security@apache.org",
"published": "2024-05-03T09:15:07.587",
"lastModified": "2024-05-03T09:15:07.587",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Improper Control of Generation of Code ('Code Injection') vulnerability in Apache Hive.\n\nThe vulnerability affects the Hive JDBC driver component and it can potentially lead to arbitrary code execution on the machine/endpoint that the JDBC driver (client) is running. The malicious user must have sufficient permissions to specify/edit JDBC URL(s) in an endpoint relying on the Hive JDBC driver and the JDBC client process must run under a privileged user to fully exploit the vulnerability.\u00a0\n\nThe attacker can setup a malicious HTTP server and specify a JDBC URL pointing towards this server. When a JDBC connection is attempted, the malicious HTTP server can provide a special response with customized payload that can trigger the execution of certain commands in the JDBC client.This issue affects Apache Hive: from 4.0.0-alpha-1 before 4.0.0.\n\nUsers are recommended to upgrade to version 4.0.0, which fixes the issue.\n\n"
}
],
"metrics": {},
"weaknesses": [
{
"source": "security@apache.org",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-94"
}
]
}
],
"references": [
{
"url": "https://lists.apache.org/thread/7zcv6l63spl4r66xwz5jv9rtrg2opx81",
"source": "security@apache.org"
}
]
}

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2023-44472",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-05-03T08:15:06.850",
"lastModified": "2024-05-03T08:15:06.850",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Missing Authorization vulnerability in ThemeFuse Unyson.This issue affects Unyson: from n/a through 2.7.28.\n\n"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-862"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/unyson/wordpress-unyson-plugin-2-7-28-broken-access-control-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2024-23912",
"sourceIdentifier": "prodsec@nozominetworks.com",
"published": "2024-05-03T09:15:07.737",
"lastModified": "2024-05-03T09:15:07.737",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Out-of-bounds Read vulnerability in Merge DICOM Toolkit C/C++ on Windows.\n\nWhen MC_Open_File() function is used to read a malformed DICOM data, it might result in over-reading memory buffer and could cause memory access violation."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "prodsec@nozominetworks.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "LOW",
"baseScore": 4.0,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.5,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "prodsec@nozominetworks.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-125"
}
]
}
],
"references": [
{
"url": "https://www.nozominetworks.com/labs/vulnerability-advisories-cve-2024-23912",
"source": "prodsec@nozominetworks.com"
}
]
}

View File

@ -0,0 +1,43 @@
{
"id": "CVE-2024-23913",
"sourceIdentifier": "prodsec@nozominetworks.com",
"published": "2024-05-03T09:15:07.920",
"lastModified": "2024-05-03T09:15:07.920",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Use of Out-of-range Pointer Offset vulnerability in Merge DICOM Toolkit C/C++ on Windows.\n\nWhen deprecated MC_XML_To_Message() function is used to read a malformed DICOM XML file, it might result in memory access violation."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "prodsec@nozominetworks.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "LOW",
"baseScore": 4.0,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.5,
"impactScore": 1.4
}
]
},
"references": [
{
"url": "https://www.nozominetworks.com/labs/vulnerability-advisories-cve-2024-23913",
"source": "prodsec@nozominetworks.com"
}
]
}

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2024-23914",
"sourceIdentifier": "prodsec@nozominetworks.com",
"published": "2024-05-03T09:15:08.090",
"lastModified": "2024-05-03T09:15:08.090",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Use of Externally-Controlled Format String vulnerability in Merge DICOM Toolkit C/C++ on Windows.\n\nWhen MC_Open_Association() function is used to open DICOM Association and gets DICOM Application Context Name with illegal characters, it might result in an unhandled exception."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "prodsec@nozominetworks.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"attackVector": "ADJACENT_NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 5.7,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.1,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "prodsec@nozominetworks.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-134"
}
]
}
],
"references": [
{
"url": "https://www.nozominetworks.com/labs/vulnerability-advisories-cve-2024-23914",
"source": "prodsec@nozominetworks.com"
}
]
}

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2024-24710",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-05-03T08:15:07.033",
"lastModified": "2024-05-03T08:15:07.033",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Missing Authorization vulnerability in SlickRemix Feed Them Social.This issue affects Feed Them Social: from n/a through 4.2.0.\n\n"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-862"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/feed-them-social/wordpress-feed-them-social-plugin-4-2-0-broken-access-control-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -0,0 +1,59 @@
{
"id": "CVE-2024-28072",
"sourceIdentifier": "psirt@solarwinds.com",
"published": "2024-05-03T08:15:07.217",
"lastModified": "2024-05-03T08:15:07.217",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "A highly privileged account can overwrite arbitrary files on the system with log output. The log file path tags were not sanitized properly. \n\n\n\n\n\n\n"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "psirt@solarwinds.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:H/UI:N/S:U/C:L/I:H/A:L",
"attackVector": "ADJACENT_NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "HIGH",
"availabilityImpact": "LOW",
"baseScore": 5.7,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 0.9,
"impactScore": 4.7
}
]
},
"weaknesses": [
{
"source": "psirt@solarwinds.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-532"
}
]
}
],
"references": [
{
"url": "https://solarwindscore.my.site.com/SuccessCenter/s/article/Serv-U-15-4-2-Hotfix-1-Release-Notes?language=en_US",
"source": "psirt@solarwinds.com"
},
{
"url": "https://www.solarwinds.com/trust-center/security-advisories/CVE-2024-28072",
"source": "psirt@solarwinds.com"
}
]
}

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2024-32810",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-05-03T08:15:07.430",
"lastModified": "2024-05-03T08:15:07.430",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Missing Authorization vulnerability in ShortPixel ShortPixel Critical CSS.This issue affects ShortPixel Critical CSS: from n/a through 1.0.2.\n\n"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "HIGH",
"availabilityImpact": "LOW",
"baseScore": 7.6,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 4.7
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-862"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/shortpixel-critical-css/wordpress-shortpixel-critical-css-plugin-1-0-2-broken-access-control-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2024-32831",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-05-03T08:15:07.713",
"lastModified": "2024-05-03T08:15:07.713",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Lorna Timbah (webgrrrl) Accessibility Widget allows Stored XSS.This issue affects Accessibility Widget: from n/a through 2.2.\n\n"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW",
"baseScore": 6.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.3,
"impactScore": 3.7
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/accessibility-widget/wordpress-accessibility-widget-plugin-2-2-cross-site-scripting-xss-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2024-33914",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-05-03T09:15:08.257",
"lastModified": "2024-05-03T09:15:08.257",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Missing Authorization vulnerability in Exclusive Addons Exclusive Addons Elementor.This issue affects Exclusive Addons Elementor: from n/a through 2.6.9.1.\n\n"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-862"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/exclusive-addons-for-elementor/wordpress-exclusive-addons-for-elementor-plugin-2-6-9-1-broken-access-control-on-post-duplication-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2024-33915",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-05-03T09:15:08.443",
"lastModified": "2024-05-03T09:15:08.443",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Missing Authorization vulnerability in Bowo Debug Log Manager.This issue affects Debug Log Manager: from n/a through 2.3.1.\n\n"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-862"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/debug-log-manager/wordpress-debug-log-manager-plugin-2-3-1-broken-access-control-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2024-33916",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-05-03T08:15:07.930",
"lastModified": "2024-05-03T08:15:07.930",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in MachoThemes CPO Companion allows Stored XSS.This issue affects CPO Companion: from n/a through 1.1.0.\n\n"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW",
"baseScore": 6.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.3,
"impactScore": 3.7
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/cpo-companion/wordpress-cpo-companion-plugin-1-1-0-cross-site-scripting-xss-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2024-33918",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-05-03T08:15:08.113",
"lastModified": "2024-05-03T08:15:08.113",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Maxim K AJAX Login and Registration modal popup + inline form allows Stored XSS.This issue affects AJAX Login and Registration modal popup + inline form: from n/a through 2.23.\n\n"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW",
"baseScore": 5.9,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.7,
"impactScore": 3.7
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/ajax-login-and-registration-modal-popup/wordpress-ajax-login-and-registration-modal-popup-inline-form-plugin-2-23-cross-site-scripting-xss-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2024-33919",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-05-03T09:15:08.633",
"lastModified": "2024-05-03T09:15:08.633",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Missing Authorization vulnerability in Rometheme RomethemeKit For Elementor.This issue affects RomethemeKit For Elementor: from n/a through 1.4.1.\n\n"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "LOW",
"baseScore": 6.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 3.9,
"impactScore": 2.5
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-862"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/rometheme-for-elementor/wordpress-romethemekit-for-elementor-plugin-1-4-1-broken-access-control-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2024-33920",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-05-03T09:15:08.827",
"lastModified": "2024-05-03T09:15:08.827",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Missing Authorization vulnerability in Kama Democracy Poll.This issue affects Democracy Poll: from n/a through 6.0.3.\n\n"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 5.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 3.9,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-862"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/democracy-poll/wordpress-democracy-poll-plugin-6-0-3-broken-access-control-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -0,0 +1,43 @@
{
"id": "CVE-2024-33921",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-05-03T09:15:09.020",
"lastModified": "2024-05-03T09:15:09.020",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Broken Access Control vulnerability in ReviewX.This issue affects ReviewX: from n/a through 1.6.21.\n\n"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 1.4
}
]
},
"references": [
{
"url": "https://patchstack.com/database/vulnerability/reviewx/wordpress-reviewx-plugin-1-6-21-broken-access-control-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2024-33923",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-05-03T09:15:09.183",
"lastModified": "2024-05-03T09:15:09.183",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Missing Authorization vulnerability in Smartypants SP Project & Document Manager.This issue affects SP Project & Document Manager : from n/a through 4.69.\n\n"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW",
"baseScore": 6.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 3.4
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-862"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/sp-client-document-manager/wordpress-sp-project-document-manager-plugin-4-69-broken-access-control-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2024-33924",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-05-03T08:15:08.303",
"lastModified": "2024-05-03T08:15:08.303",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Realtyna Realtyna Organic IDX plugin allows Reflected XSS.This issue affects Realtyna Organic IDX plugin: from n/a through 4.14.4.\n\n"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW",
"baseScore": 7.1,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 3.7
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/real-estate-listing-realtyna-wpl/wordpress-realtyna-organic-idx-plugin-wpl-real-estate-plugin-4-14-4-cross-site-scripting-xss-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2024-33925",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-05-03T09:15:09.387",
"lastModified": "2024-05-03T09:15:09.387",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Missing Authorization vulnerability in Adrian M\u00f6rchen Embed Google Fonts.This issue affects Embed Google Fonts: from n/a through 3.1.0.\n\n"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-862"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/embed-google-fonts/wordpress-embed-google-fonts-plugin-3-1-0-broken-access-control-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2024-33926",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-05-03T08:15:08.490",
"lastModified": "2024-05-03T08:15:08.490",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Karl Kiesinger GWP-Histats allows Stored XSS.This issue affects GWP-Histats: from n/a through 1.0.\n\n"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW",
"baseScore": 6.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.3,
"impactScore": 3.7
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/gwp-histats/wordpress-gwp-histats-plugin-1-0-cross-site-scripting-xss-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2024-33927",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-05-03T08:15:08.673",
"lastModified": "2024-05-03T08:15:08.673",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Team GIPHY Giphypress allows Stored XSS.This issue affects Giphypress: from n/a through 1.6.2.\n\n"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW",
"baseScore": 6.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.3,
"impactScore": 3.7
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/giphypress/wordpress-giphypress-plugin-1-6-2-cross-site-scripting-xss-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2024-33929",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-05-03T09:15:09.580",
"lastModified": "2024-05-03T09:15:09.580",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Missing Authorization vulnerability in wpWax Directorist.This issue affects Directorist: from n/a through 7.8.6.\n\n"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 5.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 3.9,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-862"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/directorist/wordpress-directorist-plugin-7-8-6-broken-access-control-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2024-33931",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-05-03T09:15:09.763",
"lastModified": "2024-05-03T09:15:09.763",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Missing Authorization vulnerability in ilGhera JW Player for WordPress.This issue affects JW Player for WordPress: from n/a through 2.3.3.\n\n"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "LOW",
"baseScore": 6.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 3.9,
"impactScore": 2.5
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-862"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/jw-player-7-for-wp/wordpress-jw-player-for-wordpress-plugin-2-3-3-broken-access-control-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2024-33937",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-05-03T09:15:09.950",
"lastModified": "2024-05-03T09:15:09.950",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Missing Authorization vulnerability in Nico Martin Progressive WordPress (PWA).This issue affects Progressive WordPress (PWA): from n/a through 2.1.13.\n\n"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-862"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/progressive-wp/wordpress-progressive-wordpress-pwa-plugin-2-1-13-broken-access-control-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2024-33941",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-05-03T08:15:08.863",
"lastModified": "2024-05-03T08:15:08.863",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Missing Authorization vulnerability in Avirtum iPanorama 360 WordPress Virtual Tour Builder.This issue affects iPanorama 360 WordPress Virtual Tour Builder: from n/a through 1.8.1.\n\n"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 3.9,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-862"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/ipanorama-360-virtual-tour-builder-lite/wordpress-ipanorama-360-plugin-1-8-1-broken-access-control-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update
```plain
2024-05-03T08:00:38.282086+00:00
2024-05-03T10:00:38.143835+00:00
```
### Most recent CVE Modification Timestamp synchronized with NVD
```plain
2024-05-03T07:15:40.610000+00:00
2024-05-03T09:15:09.950000+00:00
```
### Last Data Feed Release
@ -33,55 +33,45 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
### Total Number of included CVEs
```plain
248471
248497
```
### CVEs added in the last Commit
Recently added CVEs: `15`
Recently added CVEs: `26`
- [CVE-2024-33928](CVE-2024/CVE-2024-339xx/CVE-2024-33928.json) (`2024-05-03T07:15:38.507`)
- [CVE-2024-33932](CVE-2024/CVE-2024-339xx/CVE-2024-33932.json) (`2024-05-03T07:15:38.870`)
- [CVE-2024-33934](CVE-2024/CVE-2024-339xx/CVE-2024-33934.json) (`2024-05-03T07:15:39.073`)
- [CVE-2024-33935](CVE-2024/CVE-2024-339xx/CVE-2024-33935.json) (`2024-05-03T07:15:39.283`)
- [CVE-2024-33936](CVE-2024/CVE-2024-339xx/CVE-2024-33936.json) (`2024-05-03T07:15:39.510`)
- [CVE-2024-33940](CVE-2024/CVE-2024-339xx/CVE-2024-33940.json) (`2024-05-03T07:15:39.737`)
- [CVE-2024-33943](CVE-2024/CVE-2024-339xx/CVE-2024-33943.json) (`2024-05-03T07:15:39.960`)
- [CVE-2024-33945](CVE-2024/CVE-2024-339xx/CVE-2024-33945.json) (`2024-05-03T07:15:40.183`)
- [CVE-2024-33946](CVE-2024/CVE-2024-339xx/CVE-2024-33946.json) (`2024-05-03T07:15:40.390`)
- [CVE-2024-33947](CVE-2024/CVE-2024-339xx/CVE-2024-33947.json) (`2024-05-03T07:15:40.610`)
- [CVE-2024-34408](CVE-2024/CVE-2024-344xx/CVE-2024-34408.json) (`2024-05-03T06:15:13.883`)
- [CVE-2024-3637](CVE-2024/CVE-2024-36xx/CVE-2024-3637.json) (`2024-05-03T06:15:14.367`)
- [CVE-2024-3692](CVE-2024/CVE-2024-36xx/CVE-2024-3692.json) (`2024-05-03T06:15:14.590`)
- [CVE-2024-3703](CVE-2024/CVE-2024-37xx/CVE-2024-3703.json) (`2024-05-03T06:15:14.800`)
- [CVE-2024-4439](CVE-2024/CVE-2024-44xx/CVE-2024-4439.json) (`2024-05-03T06:15:14.947`)
- [CVE-2023-35701](CVE-2023/CVE-2023-357xx/CVE-2023-35701.json) (`2024-05-03T09:15:07.587`)
- [CVE-2023-44472](CVE-2023/CVE-2023-444xx/CVE-2023-44472.json) (`2024-05-03T08:15:06.850`)
- [CVE-2024-23912](CVE-2024/CVE-2024-239xx/CVE-2024-23912.json) (`2024-05-03T09:15:07.737`)
- [CVE-2024-23913](CVE-2024/CVE-2024-239xx/CVE-2024-23913.json) (`2024-05-03T09:15:07.920`)
- [CVE-2024-23914](CVE-2024/CVE-2024-239xx/CVE-2024-23914.json) (`2024-05-03T09:15:08.090`)
- [CVE-2024-24710](CVE-2024/CVE-2024-247xx/CVE-2024-24710.json) (`2024-05-03T08:15:07.033`)
- [CVE-2024-28072](CVE-2024/CVE-2024-280xx/CVE-2024-28072.json) (`2024-05-03T08:15:07.217`)
- [CVE-2024-32810](CVE-2024/CVE-2024-328xx/CVE-2024-32810.json) (`2024-05-03T08:15:07.430`)
- [CVE-2024-32831](CVE-2024/CVE-2024-328xx/CVE-2024-32831.json) (`2024-05-03T08:15:07.713`)
- [CVE-2024-33914](CVE-2024/CVE-2024-339xx/CVE-2024-33914.json) (`2024-05-03T09:15:08.257`)
- [CVE-2024-33915](CVE-2024/CVE-2024-339xx/CVE-2024-33915.json) (`2024-05-03T09:15:08.443`)
- [CVE-2024-33916](CVE-2024/CVE-2024-339xx/CVE-2024-33916.json) (`2024-05-03T08:15:07.930`)
- [CVE-2024-33918](CVE-2024/CVE-2024-339xx/CVE-2024-33918.json) (`2024-05-03T08:15:08.113`)
- [CVE-2024-33919](CVE-2024/CVE-2024-339xx/CVE-2024-33919.json) (`2024-05-03T09:15:08.633`)
- [CVE-2024-33920](CVE-2024/CVE-2024-339xx/CVE-2024-33920.json) (`2024-05-03T09:15:08.827`)
- [CVE-2024-33921](CVE-2024/CVE-2024-339xx/CVE-2024-33921.json) (`2024-05-03T09:15:09.020`)
- [CVE-2024-33923](CVE-2024/CVE-2024-339xx/CVE-2024-33923.json) (`2024-05-03T09:15:09.183`)
- [CVE-2024-33924](CVE-2024/CVE-2024-339xx/CVE-2024-33924.json) (`2024-05-03T08:15:08.303`)
- [CVE-2024-33925](CVE-2024/CVE-2024-339xx/CVE-2024-33925.json) (`2024-05-03T09:15:09.387`)
- [CVE-2024-33926](CVE-2024/CVE-2024-339xx/CVE-2024-33926.json) (`2024-05-03T08:15:08.490`)
- [CVE-2024-33927](CVE-2024/CVE-2024-339xx/CVE-2024-33927.json) (`2024-05-03T08:15:08.673`)
- [CVE-2024-33929](CVE-2024/CVE-2024-339xx/CVE-2024-33929.json) (`2024-05-03T09:15:09.580`)
- [CVE-2024-33931](CVE-2024/CVE-2024-339xx/CVE-2024-33931.json) (`2024-05-03T09:15:09.763`)
- [CVE-2024-33937](CVE-2024/CVE-2024-339xx/CVE-2024-33937.json) (`2024-05-03T09:15:09.950`)
- [CVE-2024-33941](CVE-2024/CVE-2024-339xx/CVE-2024-33941.json) (`2024-05-03T08:15:08.863`)
### CVEs modified in the last Commit
Recently modified CVEs: `21`
Recently modified CVEs: `1`
- [CVE-2023-52614](CVE-2023/CVE-2023-526xx/CVE-2023-52614.json) (`2024-05-03T06:15:08.503`)
- [CVE-2024-26920](CVE-2024/CVE-2024-269xx/CVE-2024-26920.json) (`2024-05-03T06:15:09.207`)
- [CVE-2024-26922](CVE-2024/CVE-2024-269xx/CVE-2024-26922.json) (`2024-05-03T06:15:09.570`)
- [CVE-2024-26923](CVE-2024/CVE-2024-269xx/CVE-2024-26923.json) (`2024-05-03T06:15:10.053`)
- [CVE-2024-26924](CVE-2024/CVE-2024-269xx/CVE-2024-26924.json) (`2024-05-03T06:15:10.280`)
- [CVE-2024-26926](CVE-2024/CVE-2024-269xx/CVE-2024-26926.json) (`2024-05-03T06:15:10.483`)
- [CVE-2024-26981](CVE-2024/CVE-2024-269xx/CVE-2024-26981.json) (`2024-05-03T06:15:10.663`)
- [CVE-2024-26982](CVE-2024/CVE-2024-269xx/CVE-2024-26982.json) (`2024-05-03T06:15:10.953`)
- [CVE-2024-26984](CVE-2024/CVE-2024-269xx/CVE-2024-26984.json) (`2024-05-03T06:15:11.130`)
- [CVE-2024-26988](CVE-2024/CVE-2024-269xx/CVE-2024-26988.json) (`2024-05-03T06:15:11.337`)
- [CVE-2024-26993](CVE-2024/CVE-2024-269xx/CVE-2024-26993.json) (`2024-05-03T06:15:11.530`)
- [CVE-2024-26994](CVE-2024/CVE-2024-269xx/CVE-2024-26994.json) (`2024-05-03T06:15:11.740`)
- [CVE-2024-26997](CVE-2024/CVE-2024-269xx/CVE-2024-26997.json) (`2024-05-03T06:15:11.950`)
- [CVE-2024-26999](CVE-2024/CVE-2024-269xx/CVE-2024-26999.json) (`2024-05-03T06:15:12.137`)
- [CVE-2024-27000](CVE-2024/CVE-2024-270xx/CVE-2024-27000.json) (`2024-05-03T06:15:12.350`)
- [CVE-2024-27001](CVE-2024/CVE-2024-270xx/CVE-2024-27001.json) (`2024-05-03T06:15:12.590`)
- [CVE-2024-27004](CVE-2024/CVE-2024-270xx/CVE-2024-27004.json) (`2024-05-03T06:15:12.800`)
- [CVE-2024-27008](CVE-2024/CVE-2024-270xx/CVE-2024-27008.json) (`2024-05-03T06:15:13.000`)
- [CVE-2024-27013](CVE-2024/CVE-2024-270xx/CVE-2024-27013.json) (`2024-05-03T06:15:13.277`)
- [CVE-2024-27020](CVE-2024/CVE-2024-270xx/CVE-2024-27020.json) (`2024-05-03T06:15:13.507`)
- [CVE-2024-27022](CVE-2024/CVE-2024-270xx/CVE-2024-27022.json) (`2024-05-03T06:15:13.697`)
- [CVE-2023-31211](CVE-2023/CVE-2023-312xx/CVE-2023-31211.json) (`2024-05-03T09:15:07.230`)
## Download and Usage

View File

@ -217992,6 +217992,7 @@ CVE-2023-25451,0,0,bf9f65354c0c14c6247ca4f7ffbc13c8f1c663eb328d83c64fc6ef4fc9f28
CVE-2023-25452,0,0,571ef3748c95bfbe0b203cdf3ffc5b7535ee70d82cfd72e88027c72ee00eeb46,2023-05-10T02:26:18.077000
CVE-2023-25453,0,0,60471186e0c170cee446cbaa0f4fe3eca3fe1a604dd5df7fc93e2fb25442b2c0,2023-09-01T12:09:39.707000
CVE-2023-25456,0,0,408499d865f2649a5a437b37da197fa52a399927aa162950e5bbd8727fe58d15,2023-11-07T04:08:58.840000
CVE-2023-25457,1,1,c0229a4d30959c47c34eae5d740cf13de0563946cd3c7c0384fa985d436f62bb,2024-05-03T08:15:06.603000
CVE-2023-25458,0,0,1065fa2b79e67ae65d3a3be77e6869d78ed621dc83197f39f93d1f300f7d61c5,2023-05-08T13:38:48.890000
CVE-2023-25459,0,0,b452b828450505952fe00d6bb72761dbdbf71b667f1dd51cd4b90d57aea38cfd,2023-08-10T03:52:36.750000
CVE-2023-2546,0,0,0c9ab6d4260067a910f2654d5f4ba8d79079cf0fe265a6a584c483c68b3635ea,2023-11-07T04:12:51.690000
@ -222531,7 +222532,7 @@ CVE-2023-31208,0,0,5734c51815db6b57a8026bf78fa2fd363219f3d8846acb63cc3b1fa2c8f74
CVE-2023-31209,0,0,265b69c6c647506d4027f23aaf619e8ae4ead2ce4ba1cf17fdeb126549adc09a,2023-08-17T18:46:11.130000
CVE-2023-3121,0,0,acc3ea9a35e95881e6fb1a32ac832e4e0495284aeb391e11d047b4fb76b05fbc,2024-04-11T01:21:03.627000
CVE-2023-31210,0,0,22db411452e4413b24810b6f87647cdbad1853694542f15e240cee8fe93fc316,2023-12-18T17:31:51.650000
CVE-2023-31211,0,0,25b8616d1c09299eaeb19215263ab8a437b4688bd3d65f84a2c4134e75a29552,2024-01-19T02:09:26.650000
CVE-2023-31211,0,1,bcf13972193b4b415b2d12adfbcf8d2f73fba1f0337b67e0fcd53d7d3aa27bd8,2024-05-03T09:15:07.230000
CVE-2023-31212,0,0,b3dca3f1049aeb20dc6f644e1d420b3cba3b924328724987f22ceb6add12b28e,2023-11-08T18:47:36.203000
CVE-2023-31213,0,0,aa93d62aa161bdef803d7fb4d1edfbba0517314ec0fd9cf94fe731d75469d683,2023-07-19T18:25:45.263000
CVE-2023-31215,0,0,b89fa5ca9251f56c11de8c448270940ecd6643a443f0f280749266a956d5de72,2023-12-28T13:32:56.443000
@ -225664,6 +225665,7 @@ CVE-2023-35698,0,0,1a5f0de9e827e1f26d8ce1a23936779b2a92a9242596f2af26444c4d5f2f3
CVE-2023-35699,0,0,c06aba707c695839836dd82c54f55ca34badb20d57868cee747251dc69fa9bf6,2023-07-18T11:46:43.907000
CVE-2023-3570,0,0,12377f8f2531f9bb5228e4098a72207ca93d76b44354ff18076ee4d4cf633e78,2023-08-25T07:15:08.680000
CVE-2023-35700,0,0,d85439aec76d8ba3f8c755512b44f4a752c457c5d0362fdcaf7a45cdedd4d318,2023-11-07T04:15:57.173000
CVE-2023-35701,1,1,e6dce6e08d5a6cc3d293e6cd63d2a5714872136194df65318be5a5281538d41d,2024-05-03T09:15:07.587000
CVE-2023-35702,0,0,43a538fd2a6551344790ddc23675ac41256cc49affe767c42203bb8af1f9d9f6,2024-04-09T21:15:08.687000
CVE-2023-35703,0,0,bd220da906e6173a01fcf88c08076bd5470744a21943fd30147c0383607c053a,2024-04-09T21:15:08.797000
CVE-2023-35704,0,0,9f7caa8dfb464038a77a6e4bcadca0149b6bc7207c34073f0385815b079c70e4,2024-04-09T21:15:08.890000
@ -232174,6 +232176,7 @@ CVE-2023-44469,0,0,960da4dd20058cd7b4d769768e751d771f02293e397b85b243d1f37fdbb2c
CVE-2023-4447,0,0,04feba11f7263b0d5ebcdb950df716fdf7ecaf06906bce3ab8c4a6b5740dbd87,2024-04-11T01:22:28.583000
CVE-2023-44470,0,0,20af9da7b19e16e3f751716ce6388203de2002045e4dd1b4757141898d21d736,2023-10-12T19:50:34.870000
CVE-2023-44471,0,0,789a6d719a2ecab868455dd65b3c31581b8eb5ef3909c19aa7f5e53cf830ab7f,2023-10-12T19:47:22.937000
CVE-2023-44472,1,1,9fc2dc211aae777b11c8a71d5cd607751cc27d1aea020eca500662a619a692d0,2024-05-03T08:15:06.850000
CVE-2023-44473,0,0,3a9f0b2529589df722344951f86b13ba970a14c956936c368f28ca8952e1920d,2023-10-12T17:53:16.280000
CVE-2023-44474,0,0,906c16b458f6396badf347b8626690f11ce844c55596d85f29232e2ffaca4997,2023-10-04T02:15:06.293000
CVE-2023-44475,0,0,708b5c32369c471fc4e211ff1c1662f1ff9edd336e0cb60d14f1fa0bbbd0bda8,2023-10-12T19:42:15.347000
@ -237427,7 +237430,7 @@ CVE-2023-52610,0,0,ebaaf65a540d2d00c4af03f0e9706e60a1009d9da7920c40e2c8ec7ab71ca
CVE-2023-52611,0,0,adfea1110379d41eef258374943e124ecab67c2f114c78e000c2827978075fff,2024-03-18T12:38:25.490000
CVE-2023-52612,0,0,be8ed4f9689fee6a6f6e71f10685bce50996952b147db667defb3c11e0b94b65,2024-03-18T12:38:25.490000
CVE-2023-52613,0,0,2a6a775fa4fd80939ff842c405dbd6a4a567d8e153ce0381397d1e3184eb21ad,2024-03-18T12:38:25.490000
CVE-2023-52614,0,1,5fa9392dab1a0ff2ef9ab069524da01ac5c70765327d5cf6ad2105a88f5860e1,2024-05-03T06:15:08.503000
CVE-2023-52614,0,0,5fa9392dab1a0ff2ef9ab069524da01ac5c70765327d5cf6ad2105a88f5860e1,2024-05-03T06:15:08.503000
CVE-2023-52615,0,0,b03f1c20882d93ba4b42bf55c3ee735bb7dd825a67b076e419d8b9cf0c5ffa93,2024-03-18T12:38:25.490000
CVE-2023-52616,0,0,731b6afefc6a8d9bec529131375a0b58acf488391c57bbd120c7bdf51049fbac,2024-03-18T12:38:25.490000
CVE-2023-52617,0,0,0af55b403517bed7905346887f3a1061bb99bf76dd43932b8429b5d4200ff19c,2024-03-18T12:38:25.490000
@ -242933,6 +242936,9 @@ CVE-2024-23905,0,0,2d8ebad5c05b335845d8a0c6b27832798a9c27087f41f1dd4daf5a7e2afef
CVE-2024-2391,0,0,fd3c56d19cfdb51c26b65d074d54709719e794ba6c0db8c6b8b791a18f6fe3ca,2024-04-11T01:25:23.393000
CVE-2024-23910,0,0,e6adc416dd7b19484faa305c4e8491b3ff3f8809d94d53eb510d517290865995,2024-04-04T01:15:50.027000
CVE-2024-23911,0,0,f05e17f474751d92c0d0b7dd0326335d7f22fd7de41e1b09eac2c91ab043885f,2024-04-15T13:15:31.997000
CVE-2024-23912,1,1,8b76a5e0353fd2e3399286fd1795cfde96165072137263962a5069d762fe6be6,2024-05-03T09:15:07.737000
CVE-2024-23913,1,1,62a397291ca4ff6f894ba2b8fb788e66ab96f4372c15c5465e89848a8108a6f0,2024-05-03T09:15:07.920000
CVE-2024-23914,1,1,481b78c97eba7946db4772e616ee8e8ae3f254b4a59e9894073706a7f542c37d,2024-05-03T09:15:08.090000
CVE-2024-23917,0,0,43acd2786eef775b4e5af3da03e8f628e79a58b917087bea0e9c91638665592f,2024-02-09T01:05:22.180000
CVE-2024-2392,0,0,42336a48d6bafcd50dc6522fe24a4d56dee45c4fa6295037e9d4d2226834e64c,2024-03-22T12:45:36.130000
CVE-2024-2393,0,0,a735f579c8d8282e2e770bb2e57ba455b9e1d053a4e15dfbb3b2c5e4432a6f37,2024-04-11T01:25:23.490000
@ -243225,6 +243231,7 @@ CVE-2024-24706,0,0,4d433b03a4c26ebc6bd4b9712c01509648b3f2cecc7341b14e252b0e38dfa
CVE-2024-24707,0,0,23a49dd490264be4d0f1f787e396daad28e9b33e6cecae6e6ede109ea8372e70,2024-04-03T17:24:18.150000
CVE-2024-24708,0,0,f693d4f4acd95516c93eac11f2cab76ea0d55ea86fcf1b386fdcecddbfc9bf86,2024-02-29T13:49:29.390000
CVE-2024-2471,0,0,c433bac72e984da7ddd7f5d293078fb939e9f74235bc4818486a5edc71f6f4a6,2024-04-08T18:48:40.217000
CVE-2024-24710,1,1,302749c2c1ec57ae8197be467cd5499b82b7cfef1d6d9bf6afcb026b279a5b1f,2024-05-03T08:15:07.033000
CVE-2024-24711,0,0,0d048c3822039d008612960507a20bcb0af4972abb0e8757f981885d0a5986fc,2024-03-26T12:55:05.010000
CVE-2024-24712,0,0,3eb883409ceb5cd8ab7cfb2c23165937e7138a0fdba93206148a8d8c39991d81,2024-02-16T14:48:04.207000
CVE-2024-24713,0,0,016796105eec4ced1aaab79578ed2b6dc8b6c4a64b21f9341804bb78b76a15f2,2024-02-16T15:48:04.237000
@ -244696,13 +244703,13 @@ CVE-2024-26917,0,0,76ac629e9c8e03234b1cc0f2056c3a72474e19f6de790dc934c6f9ce7aac4
CVE-2024-26918,0,0,856369cd1dea2e2c11af16942fbef9a6c4bc54310e835905719eaafb6e04f03b,2024-04-17T16:51:07.347000
CVE-2024-26919,0,0,8ce229e6f304423499a3d2dbc331713eb1fbfa99e3cc0b71da0db8b8b65f091c,2024-04-17T16:51:07.347000
CVE-2024-2692,0,0,aefc05ddca23ffc90de039367cc7fed9a06f50bd32c460cfe2bbf1c8645c8f06,2024-04-04T12:48:41.700000
CVE-2024-26920,0,1,21e54f7cffce25f076f12e61f0ebb2408a05fa58f844d6d62f7a9b8a454f9f45,2024-05-03T06:15:09.207000
CVE-2024-26920,0,0,21e54f7cffce25f076f12e61f0ebb2408a05fa58f844d6d62f7a9b8a454f9f45,2024-05-03T06:15:09.207000
CVE-2024-26921,0,0,76d623900726b55efb66263c05dcf2e665a9ce9fb4f9ecc19bf3b35e90cf98c7,2024-04-18T13:04:28.900000
CVE-2024-26922,0,1,af76b1b0f3ab9ee10956791f730bd4870f5c1e7911748c677fba653e48abc0dc,2024-05-03T06:15:09.570000
CVE-2024-26923,0,1,da4573b83844f36cbecbdc77d107c82583a707415e7aff11d2f41c3052c0b580,2024-05-03T06:15:10.053000
CVE-2024-26924,0,1,f1745d5b13e99b2b6fe2577e278513d3ec9c9776eb98248608246c98329d345c,2024-05-03T06:15:10.280000
CVE-2024-26922,0,0,af76b1b0f3ab9ee10956791f730bd4870f5c1e7911748c677fba653e48abc0dc,2024-05-03T06:15:09.570000
CVE-2024-26923,0,0,da4573b83844f36cbecbdc77d107c82583a707415e7aff11d2f41c3052c0b580,2024-05-03T06:15:10.053000
CVE-2024-26924,0,0,f1745d5b13e99b2b6fe2577e278513d3ec9c9776eb98248608246c98329d345c,2024-05-03T06:15:10.280000
CVE-2024-26925,0,0,205e70a4a50c2237fc125a81400662661ac0821c29e77dd6328c788eab96e62d,2024-04-25T13:18:20.370000
CVE-2024-26926,0,1,a92f86f9d106171e65901edda1c9fe34c87217de61e4b80a80c2e7bdcc5c3e47,2024-05-03T06:15:10.483000
CVE-2024-26926,0,0,a92f86f9d106171e65901edda1c9fe34c87217de61e4b80a80c2e7bdcc5c3e47,2024-05-03T06:15:10.483000
CVE-2024-26927,0,0,28230e8b97d6569ef237a255c6a2e0072a98bc7d1c93aa8cc80d54b6a5ee9b90,2024-04-29T12:42:03.667000
CVE-2024-26928,0,0,53acf010395ad47667d15ddc661fbb74b301d2b8a0a815cafc528a88f313f269,2024-04-29T12:42:03.667000
CVE-2024-26929,0,0,210a45e065d81016f9f4302ea5eeb9d3cefda708dec3da96a9abae5328ec9000,2024-05-01T13:02:20.750000
@ -244758,40 +244765,40 @@ CVE-2024-26977,0,0,59fbfe9ac1b848fdb83996742e166e4603a5bfea7240a7586e65048734931
CVE-2024-26978,0,0,257555735a82f0f0efd2e94ab4b0ebf9c131fcff18bc7c75ac3a99b0b6b5f572,2024-05-01T13:02:20.750000
CVE-2024-26979,0,0,08c2e9d864acb753e6fde04699b98be30568e3e09397d447207596d52a0e4221,2024-05-01T13:02:20.750000
CVE-2024-26980,0,0,76e4503c5881b9716dec0fa482a2044db22902d212dbbb181fd17d260a1362d1,2024-05-03T03:16:26.907000
CVE-2024-26981,0,1,3038c3174fa5069e42a0db4274374d74c2b5066ad475e921f47c4589915379cd,2024-05-03T06:15:10.663000
CVE-2024-26982,0,1,71a4b88e652ac72451ef2b1c06677d2a8721eacfd6194887bc3cbe1ed1aa0fda,2024-05-03T06:15:10.953000
CVE-2024-26981,0,0,3038c3174fa5069e42a0db4274374d74c2b5066ad475e921f47c4589915379cd,2024-05-03T06:15:10.663000
CVE-2024-26982,0,0,71a4b88e652ac72451ef2b1c06677d2a8721eacfd6194887bc3cbe1ed1aa0fda,2024-05-03T06:15:10.953000
CVE-2024-26983,0,0,ccd819c1ec21baac0e82aceb812621bf7a6f5600a1aad568a7abc52c10f314e2,2024-05-03T03:16:27.040000
CVE-2024-26984,0,1,51fd78b3299a4f7fe92b2972cdef3a37b9d7ca38e2666df6b4d0952e7bd0b097,2024-05-03T06:15:11.130000
CVE-2024-26984,0,0,51fd78b3299a4f7fe92b2972cdef3a37b9d7ca38e2666df6b4d0952e7bd0b097,2024-05-03T06:15:11.130000
CVE-2024-26985,0,0,ce7ffde23e660a23826c5fcfbdd5ad4846c5aa4f0b4b6f75087a6ed63926e72a,2024-05-03T03:16:27.140000
CVE-2024-26986,0,0,0e86af409a08ebe8b054bd624b96ed0e828f392c169b319d54501b325508aadd,2024-05-03T03:16:27.180000
CVE-2024-26987,0,0,265a594118bd17bd2c87735bf4fa037cf64a099e7646ca58a130053e3ef0c2de,2024-05-03T03:16:27.223000
CVE-2024-26988,0,1,20a9c0c0c1e4b746621fc27fde9b93d36608a168e68af7fd64c18a89981d9bc7,2024-05-03T06:15:11.337000
CVE-2024-26988,0,0,20a9c0c0c1e4b746621fc27fde9b93d36608a168e68af7fd64c18a89981d9bc7,2024-05-03T06:15:11.337000
CVE-2024-26989,0,0,d7f79764735bb4bdca04432cc868232052eb8d9179b27315b8e08d4922b9686a,2024-05-03T03:16:27.310000
CVE-2024-26990,0,0,c2b48f7cac4e7058728495aeb50489a6af7fceca948a9ba35a0bfe9cf11f80df,2024-05-03T03:16:27.360000
CVE-2024-26991,0,0,92aca6f670fd950bfe8e8d7689a5b2dcc7fdd95b5fa52a077f4602d6da9ab552,2024-05-03T03:16:27.407000
CVE-2024-26992,0,0,d7559e1aed92214c24aa61e94393eb033d4d8c74c8b1c622d267c4c8db1a1879,2024-05-03T03:16:27.453000
CVE-2024-26993,0,1,4c5086a6b5387518cd4e4c2b518527fd853d25c2e06829ce9a9cb9a4e269dcf7,2024-05-03T06:15:11.530000
CVE-2024-26994,0,1,c0b1a2d204b67af1b29d2f01286a4399fab92fd0c89afdec263b4c615c8875fe,2024-05-03T06:15:11.740000
CVE-2024-26993,0,0,4c5086a6b5387518cd4e4c2b518527fd853d25c2e06829ce9a9cb9a4e269dcf7,2024-05-03T06:15:11.530000
CVE-2024-26994,0,0,c0b1a2d204b67af1b29d2f01286a4399fab92fd0c89afdec263b4c615c8875fe,2024-05-03T06:15:11.740000
CVE-2024-26995,0,0,2146327fe9ef53c3bea971f53925b0d81cb30e2aa49b7f2fcad91b5a54abf9f9,2024-05-03T03:16:27.580000
CVE-2024-26996,0,0,20e9ce694108d42f9ed143bd1ce7355d03895129e220e05953a671dfaa83faab,2024-05-03T03:16:27.623000
CVE-2024-26997,0,1,bdfca562d47f9e5d3fc1098c4dacc21d61a7ba014b51a9e792d5f847f7afb48b,2024-05-03T06:15:11.950000
CVE-2024-26997,0,0,bdfca562d47f9e5d3fc1098c4dacc21d61a7ba014b51a9e792d5f847f7afb48b,2024-05-03T06:15:11.950000
CVE-2024-26998,0,0,48b4ca2a741e8d6d024f95381b4079f893db1ee6d4448ad105243249c86303ae,2024-05-03T03:16:27.673000
CVE-2024-26999,0,1,9ac4807c2521e1d8db890c0527b001317552b4ac44ce0b01702365258c787f45,2024-05-03T06:15:12.137000
CVE-2024-26999,0,0,9ac4807c2521e1d8db890c0527b001317552b4ac44ce0b01702365258c787f45,2024-05-03T06:15:12.137000
CVE-2024-2700,0,0,ec51b942504a96d4888f64f81c70906fd44973b0d1ace8e2f862241f82ce29e0,2024-04-17T20:15:08.240000
CVE-2024-27000,0,1,ad2ef5bdd7c2f9d77d1b6346a92f926b0e0114b79caa616e96d2bb2c427a8aac,2024-05-03T06:15:12.350000
CVE-2024-27001,0,1,f4defde5af84e6133600f9028ad4a44c6061db86e7d3ca3705bde065e8cf1441,2024-05-03T06:15:12.590000
CVE-2024-27000,0,0,ad2ef5bdd7c2f9d77d1b6346a92f926b0e0114b79caa616e96d2bb2c427a8aac,2024-05-03T06:15:12.350000
CVE-2024-27001,0,0,f4defde5af84e6133600f9028ad4a44c6061db86e7d3ca3705bde065e8cf1441,2024-05-03T06:15:12.590000
CVE-2024-27002,0,0,4cebae80cd053089254650a19e4cdf93233e79968b6c0483f943fbf8eb0cf543,2024-05-03T03:16:27.847000
CVE-2024-27003,0,0,20d6474febb33d1d9738664aa924171cff621ef4d42b96c379bbc7ca17910189,2024-05-03T03:16:27.890000
CVE-2024-27004,0,1,5ee749957714436a863b1829cedb06effa94ab50e8e0d157eedbc8feaa729442,2024-05-03T06:15:12.800000
CVE-2024-27004,0,0,5ee749957714436a863b1829cedb06effa94ab50e8e0d157eedbc8feaa729442,2024-05-03T06:15:12.800000
CVE-2024-27005,0,0,0c7a4c5a8a302385907f4d9c54b83be92049a557d43dc801da14311e4ea3f7a4,2024-05-03T03:16:27.987000
CVE-2024-27006,0,0,9900a00aac2a484a183478a545d94e3424532992b67d5cfee8fd40ed3f7546e8,2024-05-03T03:16:28.030000
CVE-2024-27007,0,0,de7399fdc0b28ed2c42071d5017655949f209978d39881d9334f8ddef84470c7,2024-05-03T03:16:28.070000
CVE-2024-27008,0,1,7c531cd27599bc8e765bc8b2bcfe3367556b19229be46bca53a9aed7b180470f,2024-05-03T06:15:13
CVE-2024-27008,0,0,7c531cd27599bc8e765bc8b2bcfe3367556b19229be46bca53a9aed7b180470f,2024-05-03T06:15:13
CVE-2024-27009,0,0,082aadf95ded16775ba368e9fa1e3bc06e75ebc1b513c777a07e1478cf4c616b,2024-05-03T03:16:28.153000
CVE-2024-27010,0,0,a6b226a3d7862570b3a5f1461f3ecf1560912a7fcca01d922620078fb22bf622,2024-05-03T03:16:28.203000
CVE-2024-27011,0,0,db70e071dff497d63faa562953c0d7c3853f1610192f278ddda0161d961a984c,2024-05-03T03:16:28.243000
CVE-2024-27012,0,0,b8e156e06c82d793b237dbde50ffe6b624c2b1835a7cba57a14fe890f6110d04,2024-05-03T03:16:28.290000
CVE-2024-27013,0,1,2cb52126af3572c7b5f55dc10a3eca31ff3fe95965d644de25764971ca372951,2024-05-03T06:15:13.277000
CVE-2024-27013,0,0,2cb52126af3572c7b5f55dc10a3eca31ff3fe95965d644de25764971ca372951,2024-05-03T06:15:13.277000
CVE-2024-27014,0,0,3bc710ae26afc6886d8e44039274f51c5633db31a76486b47eb838367827ccb0,2024-05-03T03:16:28.390000
CVE-2024-27015,0,0,865c903fbd1b927b928209eb7b4c7715de07a45a86f79d252af767bda9c897a4,2024-05-03T03:16:28.440000
CVE-2024-27016,0,0,b2331bdd993764cb67ade407248d33cc3fb586a90e9566cbcc5899af3f716753,2024-05-03T03:16:28.483000
@ -244799,9 +244806,9 @@ CVE-2024-27017,0,0,392c3e259be6fc543be409181e8df13c7334fad3361f061cae96ba4f88846
CVE-2024-27018,0,0,b13a811b60b2f25c3befd7c81c629dbd75dc7217b56740e51cd33ae5baaebae5,2024-05-03T03:16:28.567000
CVE-2024-27019,0,0,8449fc532c456110a7b37562bd69b32b830596967c204f5dcc1f236b208ecec6,2024-05-03T03:16:28.623000
CVE-2024-2702,0,0,d714950951d2438da53d97b453b8470335efdb106b4a3aaafe4c816e98d263df,2024-03-20T13:00:16.367000
CVE-2024-27020,0,1,92e449b5dfa875d0c65fac42a6b907353432a5a01260d217191fb3e39711aefc,2024-05-03T06:15:13.507000
CVE-2024-27020,0,0,92e449b5dfa875d0c65fac42a6b907353432a5a01260d217191fb3e39711aefc,2024-05-03T06:15:13.507000
CVE-2024-27021,0,0,7629e8b536a7370126b5401755d0979503442514581afaecdca94d05ca6a3a8e,2024-05-03T03:16:28.710000
CVE-2024-27022,0,1,181d1b8331ba17e558fecd3c8e3cefddaa774350612d20cdd672dcecfa940b03,2024-05-03T06:15:13.697000
CVE-2024-27022,0,0,181d1b8331ba17e558fecd3c8e3cefddaa774350612d20cdd672dcecfa940b03,2024-05-03T06:15:13.697000
CVE-2024-27023,0,0,bfdbebf8e04e0e157abeb9fd87665eab36c5df352f61196601859b27ac3c2ee3,2024-05-01T19:50:25.633000
CVE-2024-27024,0,0,96efa799e2ac56fadc351826798dc36d316169ab611d5986673fe6d683b41700,2024-05-01T19:50:25.633000
CVE-2024-27025,0,0,82ff3eddcb89598ee39fb858ceee867459deeb1b4ff43367b3380d9fbdbba60e,2024-05-01T19:50:25.633000
@ -245328,6 +245335,7 @@ CVE-2024-28066,0,0,8d264de635ae9c8dc6d41b6ed16f7f85828f585eea298ce9fb065b16c3368
CVE-2024-28069,0,0,99a57a9955c5ed5463e7c560b95e0a17dfa2789ec3c024f2825003d476d4b80d,2024-03-17T22:38:29.433000
CVE-2024-2807,0,0,389dec77d863d88d0729c3b21a13c4f638dbaad2d7ffdf5a3bec6019fd1a7b1b,2024-04-11T01:25:36.783000
CVE-2024-28070,0,0,c8eeec88fa6e3b91036a4eadc63dd921f090ad52309176e7af22a570b911aeac,2024-03-17T22:38:29.433000
CVE-2024-28072,1,1,6596801048e07b80a6611c70d3d9bcb61d1ca69e1e839f899621c9e0d90f7e27,2024-05-03T08:15:07.217000
CVE-2024-28073,0,0,cdb5d61cc6a19952dccba6c20cc81a1525eeb0c1fc701ee23bfbd240d2d310cb,2024-04-17T20:08:21.887000
CVE-2024-28076,0,0,573150dd6c1cd2ebee3e74b864dba3fbe351c8f7cfb57fda1c213b0f2a3aeb0c,2024-04-19T14:15:11.080000
CVE-2024-2808,0,0,c3ed3b9e68948cd880b53f1e926f321cf4b47941f31cc49bbad2cbe5e609284b,2024-04-11T01:25:36.883000
@ -247678,6 +247686,7 @@ CVE-2024-32803,0,0,87ef628ed36a01981de6b24a9a46f4b15174f60f02a3679855347999c2d8f
CVE-2024-32806,0,0,d8037ba4bbb861d02087bc0e815d7d332fc801a9609bcadd59a9397c35ec5a94,2024-04-24T17:16:50.397000
CVE-2024-32808,0,0,4a82bef92c296d86caf3ed2592cda4e11078b8b017423c1d319584391f5d5ff2,2024-04-24T13:39:42.883000
CVE-2024-3281,0,0,b3c51db3aca3b371ad4faa3c1c4537d2c54d8323123f7ae9b26414cd9ee432a6,2024-04-10T13:24:22.187000
CVE-2024-32810,1,1,c173dd59fdda872fb4ca533b772f6e53231f1a4fcade1e500868c541949d68e3,2024-05-03T08:15:07.430000
CVE-2024-32812,0,0,a6c0140cb5875c5619d43acc5c77a24a0f3ff7202fb936829a583061f4a5590b,2024-04-24T13:39:42.883000
CVE-2024-32815,0,0,fdfcf6bbe35deb9ef34763a17ff64d385e838875d5c0ab731c71e0463aa8a48a,2024-04-24T13:39:42.883000
CVE-2024-32816,0,0,2fa63efd4ad7910d44e8053cdc5b80901495c5148f9f0b492de6d141c5af6f05,2024-04-24T13:39:42.883000
@ -247690,6 +247699,7 @@ CVE-2024-32826,0,0,0d7c35c38998736930e8124de26137dd3edb154046638c71583ab2454604a
CVE-2024-32828,0,0,e98a289b3626e9e97ee2c25450e252107ac1631ec54c8e821ef6379945d6166a,2024-04-26T12:58:17.720000
CVE-2024-32829,0,0,af974fc6efe469e422423920d456ebe47e66f08b752628aef0bab2a184975ddc,2024-04-26T12:58:17.720000
CVE-2024-3283,0,0,8b1939d21df3d4399a3bf874e70470053c1a0ae20421841ad51c79aca5727c56,2024-04-10T19:49:51.183000
CVE-2024-32831,1,1,d49d650149fd5e16e13712d2e2e041eb3e0fdad6c40d10c333d65e676beb8060,2024-05-03T08:15:07.713000
CVE-2024-32833,0,0,75a734274df361ea9a3f6b3015d66d3525b2c570f6f2524ded71781e2b6ac99a,2024-04-24T13:39:42.883000
CVE-2024-32834,0,0,d2ed9ea40163afd5f111e44be27b5edfb4cb8a8dd0234c49fdc13943a21fbf2d,2024-04-24T13:39:42.883000
CVE-2024-32835,0,0,a55a936ce932c192bddb52ecc7ef5c50500f7aaee0689f590c1aa942fe932618,2024-04-24T13:39:42.883000
@ -247976,19 +247986,35 @@ CVE-2024-33904,0,0,94e3a98c0463f8acd176e3df60de225e1631e2e1dbcd1a948aa64ab2e616e
CVE-2024-33905,0,0,4f2af541fd9603df50f92dd094e460dd4dcee3f568c1f2af9533e6ef2f5fb1b0,2024-05-01T18:15:24.390000
CVE-2024-33911,0,0,3aecc9c6853b34c79146d922a590e2ff56a9634dc21e6f2275a777f672ad645b,2024-05-02T13:27:25.103000
CVE-2024-33913,0,0,fdcdfb506731b7f26c0d67c69dc8ed8c4bfdff71029b6b2f6e847f10e09b4905,2024-05-02T13:27:25.103000
CVE-2024-33914,1,1,d122138be1a4fa8f27f9a0154da62d95ee81352feb2e1f626c2b2720e3403478,2024-05-03T09:15:08.257000
CVE-2024-33915,1,1,7c97997ce00e2d31c63289dc1e9746492eef885457e2bab723cd9319b57ba16f,2024-05-03T09:15:08.443000
CVE-2024-33916,1,1,ddd81f51d78ff782f4665a4ee9d333f86d813d4bcccec8ffdac234592aabb001,2024-05-03T08:15:07.930000
CVE-2024-33918,1,1,ba35302d59b1f228115eeac250b715e051bd909d507675eba6b357f166b006e0,2024-05-03T08:15:08.113000
CVE-2024-33919,1,1,7570d4fc7a2e8b3576ff733bced3ede576f448bf3de61a243b932998bf7c9cfc,2024-05-03T09:15:08.633000
CVE-2024-33920,1,1,382fce48f7cf5efd062e4ed4411b3d4fd03d6495b1dddc1fcc58d48f4c3f1134,2024-05-03T09:15:08.827000
CVE-2024-33921,1,1,3e9250cf923f5f8f392eda3aa5efd0f95f852ae8dee59bbffa2326e66a8927bb,2024-05-03T09:15:09.020000
CVE-2024-33922,0,0,581070d9342f09fc7f3ba266aca2e54acec3a9f423037ff85b1ca1eb7af20122,2024-05-02T13:27:25.103000
CVE-2024-33928,1,1,37e17338656e9b82882ce5a5575a68963bdf87b4947c48e4b26d76ff5fc32cc9,2024-05-03T07:15:38.507000
CVE-2024-33923,1,1,d0d8882dc254b1dcabb14b1df2e1b07735ce639cb0a50e662607c8688e0f97e0,2024-05-03T09:15:09.183000
CVE-2024-33924,1,1,c02dc11273085260cc198f1ebd137c9b0764a090b5b9cf33d2498355cfaf7699,2024-05-03T08:15:08.303000
CVE-2024-33925,1,1,6888fe843484e9b81477479a204796f7c7a51535f6e24af1459fa8ee19ffd0a0,2024-05-03T09:15:09.387000
CVE-2024-33926,1,1,5dccccae30fe1c23daacb6f298ed41edbf09405611ee109b3ef629696835fed5,2024-05-03T08:15:08.490000
CVE-2024-33927,1,1,5086b925ed192a5a3cd38aeac2295c3ce6c4ec549de3f122558161961985c3ee,2024-05-03T08:15:08.673000
CVE-2024-33928,0,0,37e17338656e9b82882ce5a5575a68963bdf87b4947c48e4b26d76ff5fc32cc9,2024-05-03T07:15:38.507000
CVE-2024-33929,1,1,0aca218489f58414054b89a88071ccd0d02935eac4a07478a9646fce00efdfde,2024-05-03T09:15:09.580000
CVE-2024-33930,0,0,d4854365518648983f110687642324ab33baba9fea77b8107ff83d4e8904d188,2024-05-02T13:27:25.103000
CVE-2024-33932,1,1,7914dfec4aa92667bc194a1419455363ed058990262d7d04ea185f47de84ebe0,2024-05-03T07:15:38.870000
CVE-2024-33934,1,1,03f4279a02f160865e001cc3fbf5c3b2df6b3e7680a55c79cf854ef137560caa,2024-05-03T07:15:39.073000
CVE-2024-33935,1,1,436e9a7e0496167e6737047ce6da521178a6b9ea215919af8b8c47e7f3f44db3,2024-05-03T07:15:39.283000
CVE-2024-33936,1,1,57c60904b917bc2363b0f4e62d2bc144fa23a459366819d356164d1c0fc67f33,2024-05-03T07:15:39.510000
CVE-2024-33940,1,1,d916933a371eec0e6c276877f59092e5f502eed100e4b352e50f04737f83ce33,2024-05-03T07:15:39.737000
CVE-2024-33943,1,1,4003668220f55a0b39406712e9a49dee067bde2efbe0782460513424b1eec6a1,2024-05-03T07:15:39.960000
CVE-2024-33931,1,1,1dcb86ce59e2bbe2442d913840b204a26a61261b4e27f6ae256bf1d0926993aa,2024-05-03T09:15:09.763000
CVE-2024-33932,0,0,7914dfec4aa92667bc194a1419455363ed058990262d7d04ea185f47de84ebe0,2024-05-03T07:15:38.870000
CVE-2024-33934,0,0,03f4279a02f160865e001cc3fbf5c3b2df6b3e7680a55c79cf854ef137560caa,2024-05-03T07:15:39.073000
CVE-2024-33935,0,0,436e9a7e0496167e6737047ce6da521178a6b9ea215919af8b8c47e7f3f44db3,2024-05-03T07:15:39.283000
CVE-2024-33936,0,0,57c60904b917bc2363b0f4e62d2bc144fa23a459366819d356164d1c0fc67f33,2024-05-03T07:15:39.510000
CVE-2024-33937,1,1,2b2f5f3899102cebc3eb08181d91585bb923176ca2570954e37dd77f42f2811c,2024-05-03T09:15:09.950000
CVE-2024-33940,0,0,d916933a371eec0e6c276877f59092e5f502eed100e4b352e50f04737f83ce33,2024-05-03T07:15:39.737000
CVE-2024-33941,1,1,c23d6d664b6e586d7cbfe565b596f55ce703d669b0d8c8e1f468764b7f0499f0,2024-05-03T08:15:08.863000
CVE-2024-33943,0,0,4003668220f55a0b39406712e9a49dee067bde2efbe0782460513424b1eec6a1,2024-05-03T07:15:39.960000
CVE-2024-33944,0,0,4cc781cd62cbbf938c7006c765253cd67313b7791b0366c8f2092cb45b8a99dc,2024-05-02T13:27:25.103000
CVE-2024-33945,1,1,1f8ed9e30fbf665a8f89e5c2ed08da58ea4f4a4d8aac43703bea3cdd0d82f183,2024-05-03T07:15:40.183000
CVE-2024-33946,1,1,7749bc95bb44b6b3399654fc1acfa67a1aa736677e6f671389a5a081f68ebe0f,2024-05-03T07:15:40.390000
CVE-2024-33947,1,1,a4152554225f2e5b535d459a8d349f7815ed1971de50ee606ff773d00d6ba544,2024-05-03T07:15:40.610000
CVE-2024-33945,0,0,1f8ed9e30fbf665a8f89e5c2ed08da58ea4f4a4d8aac43703bea3cdd0d82f183,2024-05-03T07:15:40.183000
CVE-2024-33946,0,0,7749bc95bb44b6b3399654fc1acfa67a1aa736677e6f671389a5a081f68ebe0f,2024-05-03T07:15:40.390000
CVE-2024-33947,0,0,a4152554225f2e5b535d459a8d349f7815ed1971de50ee606ff773d00d6ba544,2024-05-03T07:15:40.610000
CVE-2024-33948,0,0,2bb7b1a0fe53ad644dd8a2c603bf2dadaa4b303b20f5403ca2602ecee7c6317d,2024-05-02T18:00:37.360000
CVE-2024-33949,0,0,9d0ce2c159023e8535673165a86e327dfd4d2416dece4753f569198bb9736d90,2024-05-02T18:00:37.360000
CVE-2024-3400,0,0,5bb68c1f741d7492d6e3e08b6f1711eb6e28a4a827bd2f3f354ccd1b7a47a1fe,2024-04-23T19:57:25.207000
@ -248049,7 +248075,7 @@ CVE-2024-34401,0,0,d39980a44b57d8fe0020ed0bdce81702e281b86c7f9454dc35849d8e484fd
CVE-2024-34402,0,0,0d3847bdfd4bfbe9f122b3fcf7acc95f3a8de36e7abc3044a43566cbb28e2d12,2024-05-03T01:15:48.633000
CVE-2024-34403,0,0,b7c7a64d817fd02e8957eb2d5226e2560fb04b07c2a754376240d5d9a61b4f6f,2024-05-03T01:15:48.693000
CVE-2024-34404,0,0,588c33f3a39dbf54a6a30da6c4efbef4f6b568a9b48e3960d118c2011f0523bd,2024-05-03T01:15:48.753000
CVE-2024-34408,1,1,9674e37790921a6412ccb1ad00a4c7e299039ac9af39ad200e5276e5bd5862bc,2024-05-03T06:15:13.883000
CVE-2024-34408,0,0,9674e37790921a6412ccb1ad00a4c7e299039ac9af39ad200e5276e5bd5862bc,2024-05-03T06:15:13.883000
CVE-2024-3441,0,0,657e15d08a05c85e0f4e982fae7cec49fd4b8dda898982a18c454ae2db45f222,2024-04-11T01:26:02.813000
CVE-2024-3442,0,0,756156f7de62e4a3ae69e9bbc13d8b798986428892e90d3991a24b2c8375a976,2024-04-11T01:26:02.893000
CVE-2024-3443,0,0,05006967bda17a889e39c8ccda497403cb2b35584eb895b86d4c8dd8b79230c6,2024-04-11T01:26:02.973000
@ -248153,7 +248179,7 @@ CVE-2024-3622,0,0,8a36012169667d948c0b90aa74b5439b232e5ac011c2df4d1ba7f1e8b3410d
CVE-2024-3623,0,0,9044a03f32811b426f24d5347da98fbfdb67f97317f2e90baed487a2da0b464c,2024-04-26T12:58:17.720000
CVE-2024-3624,0,0,e0ac19607b4c8d1214127703973418b820b7283270ffca198194137ef8f4191a,2024-04-26T12:58:17.720000
CVE-2024-3625,0,0,bb7fa72c43d725aef9f66641f31c3359a614ed8ba414acf9f05b8e44148cef81,2024-04-26T12:58:17.720000
CVE-2024-3637,1,1,a862d2c5cd0cacf30f8cf772ed0aa1e62601ac9ac72ada5ce414ffd1ac3478ed,2024-05-03T06:15:14.367000
CVE-2024-3637,0,0,a862d2c5cd0cacf30f8cf772ed0aa1e62601ac9ac72ada5ce414ffd1ac3478ed,2024-05-03T06:15:14.367000
CVE-2024-3645,0,0,9bfaa42192c6fa49951fba1d7645fb7975d3a2b4cd9bcc55a7dd9ceef33e077c,2024-04-22T19:24:12.920000
CVE-2024-3646,0,0,f1ba7615d07aeacaca9371aa5a68bf3033db9a231eaf2716a6cbfd3f340bcd58,2024-04-19T16:19:49.043000
CVE-2024-3647,0,0,9a58c5cd1724db67ae31d7fcb82614e13b94745ce70e2f631b6a89fd4209e534,2024-05-02T18:00:37.360000
@ -248181,13 +248207,13 @@ CVE-2024-3688,0,0,3c3da89dff2f70e57f08c91100cb9c86b1a450e1376976b3915fc6db73e441
CVE-2024-3689,0,0,ca03c96614779955212f56af1bfe396d14767fb4e42684be0d25e5a13ee997ef,2024-04-15T13:15:51.577000
CVE-2024-3690,0,0,45ec985edc29a1318bd4462496029f540b76442d39a99652ea154ad9b947ac31,2024-04-15T13:15:51.577000
CVE-2024-3691,0,0,50a4350944100a4a70bc8a429651ad99366d63f29ce56edffa6a7e21ea9072d9,2024-04-15T13:15:51.577000
CVE-2024-3692,1,1,73b00bb45ab9f367e8f05b791b33fa9be05cd13d0f8ae9132ec2f390fa44c71e,2024-05-03T06:15:14.590000
CVE-2024-3692,0,0,73b00bb45ab9f367e8f05b791b33fa9be05cd13d0f8ae9132ec2f390fa44c71e,2024-05-03T06:15:14.590000
CVE-2024-3695,0,0,0a43ca9cb7c9ed3b42a0a2ca78fb1a22450722e79069ea4af175196569fb25d2,2024-04-15T13:15:51.577000
CVE-2024-3696,0,0,76b6c8c2c1c888d8dbcd35fa3dca1be5fd86a30262a9814ac950ae6f81231ade,2024-04-15T13:15:51.577000
CVE-2024-3697,0,0,e4b1bcbf89b8a1942985523bcb445f6ad3c80d5c75b882ffd7ee4a29710123b3,2024-04-15T13:15:31.997000
CVE-2024-3698,0,0,fa933a41a7207cccf1114c08f1063dd5ca2a9eed2da27e37cd95d87db2808078,2024-04-15T13:15:31.997000
CVE-2024-3701,0,0,d78f52a76181001272debccb095fb5971bb478ebc111313d9ff2994f4ec0598f,2024-04-15T13:15:31.997000
CVE-2024-3703,1,1,5474bf3418205b5be3a5cf5d423333337e108efebac07931feb7c2c558316d32,2024-05-03T06:15:14.800000
CVE-2024-3703,0,0,5474bf3418205b5be3a5cf5d423333337e108efebac07931feb7c2c558316d32,2024-05-03T06:15:14.800000
CVE-2024-3704,0,0,ad7f205e31bc442943bbd584692b194a3485d815654eeb83e4eefef6a6eff393,2024-04-15T13:15:51.577000
CVE-2024-3705,0,0,44f1c76d2f6cd8dab882ddfdbdbe908a4e3a8f22d6a90f31f0279b7faf87a669,2024-04-15T13:15:51.577000
CVE-2024-3706,0,0,93b27543775cdce8e7b256b8d014ea258e7a61f0ddb1cca03581da1a85330700,2024-04-15T13:15:51.577000
@ -248469,4 +248495,4 @@ CVE-2024-4369,0,0,352391da6a6ef399397c7f9abf94d5a6fda2875f0f06f0b38dacd9a1a940e5
CVE-2024-4405,0,0,ae0f4db23c6909c7d74c90a9689be79a58cad53d93c458fbc8aa608abe2f0377,2024-05-02T18:00:37.360000
CVE-2024-4406,0,0,e1c30f2212dcad9d546e3af047be1a2ed8c32271936aca83f8eb5fa48d87e35c,2024-05-02T18:00:37.360000
CVE-2024-4433,0,0,57fa2b8bf7e34ebce0673dcb40cbc1cb3d930cfbe754fed569c751398fdf1c6b,2024-05-02T18:00:37.360000
CVE-2024-4439,1,1,1a2ab1ea900fe1258f90808166f3d7d377ba90d092c402bdfc5c7c6496b9b12b,2024-05-03T06:15:14.947000
CVE-2024-4439,0,0,1a2ab1ea900fe1258f90808166f3d7d377ba90d092c402bdfc5c7c6496b9b12b,2024-05-03T06:15:14.947000

Can't render this file because it is too large.