Auto-Update: 2024-05-15T14:01:12.614357+00:00

This commit is contained in:
cad-safe-bot 2024-05-15 14:04:02 +00:00
parent c600e093dc
commit 76b3dea67b
9 changed files with 401 additions and 31 deletions

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2023-6321",
"sourceIdentifier": "cve-requests@bitdefender.com",
"published": "2024-05-15T13:15:25.230",
"lastModified": "2024-05-15T13:15:25.230",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "A command injection vulnerability exists in the IOCTL that manages OTA updates. A specially crafted command can lead to command execution as the root user. An attacker can make authenticated requests to trigger this vulnerability."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "cve-requests@bitdefender.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.2,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.2,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "cve-requests@bitdefender.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-78"
}
]
}
],
"references": [
{
"url": "https://bitdefender.com/blog/labs/notes-on-throughtek-kalay-vulnerabilities-and-their-impact/",
"source": "cve-requests@bitdefender.com"
}
]
}

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2023-6322",
"sourceIdentifier": "cve-requests@bitdefender.com",
"published": "2024-05-15T13:15:25.543",
"lastModified": "2024-05-15T13:15:25.543",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "A stack-based buffer overflow vulnerability exists in the message parsing functionality of the Roku Indoor Camera SE version 3.0.2.4679 and Wyze Cam v3 version 4.36.11.5859. A specially crafted message can lead to stack-based buffer overflow. An attacker can make authenticated requests to trigger this vulnerability."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "cve-requests@bitdefender.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.2,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.2,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "cve-requests@bitdefender.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-121"
}
]
}
],
"references": [
{
"url": "https://bitdefender.com/blog/labs/notes-on-throughtek-kalay-vulnerabilities-and-their-impact/",
"source": "cve-requests@bitdefender.com"
}
]
}

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2023-6323",
"sourceIdentifier": "cve-requests@bitdefender.com",
"published": "2024-05-15T13:15:25.780",
"lastModified": "2024-05-15T13:15:25.780",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "ThroughTek Kalay SDK does not verify the authenticity of received messages, allowing an attacker to impersonate an authoritative server."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "cve-requests@bitdefender.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"attackVector": "ADJACENT_NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "cve-requests@bitdefender.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-345"
}
]
}
],
"references": [
{
"url": "https://bitdefender.com/blog/labs/notes-on-throughtek-kalay-vulnerabilities-and-their-impact/",
"source": "cve-requests@bitdefender.com"
}
]
}

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2023-6324",
"sourceIdentifier": "cve-requests@bitdefender.com",
"published": "2024-05-15T13:15:26.010",
"lastModified": "2024-05-15T13:15:26.010",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "ThroughTek Kalay SDK uses a predictable PSK value in the DTLS session when encountering an unexpected PSK identity"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "cve-requests@bitdefender.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "NONE",
"baseScore": 8.1,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.2
}
]
},
"weaknesses": [
{
"source": "cve-requests@bitdefender.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-457"
}
]
}
],
"references": [
{
"url": "https://bitdefender.com/blog/labs/notes-on-throughtek-kalay-vulnerabilities-and-their-impact/",
"source": "cve-requests@bitdefender.com"
}
]
}

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2024-2248",
"sourceIdentifier": "reefs@jfrog.com",
"published": "2024-05-15T13:15:26.250",
"lastModified": "2024-05-15T13:15:26.250",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "A Header Injection vulnerability in the JFrog platform in versions below 7.85.0 (SaaS) and 7.84.7 (Self-Hosted) may allow threat actors to take over the end user's account when clicking on a specially crafted URL sent to the victim\u2019s user email."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "reefs@jfrog.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:H",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "HIGH",
"baseScore": 6.4,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.6,
"impactScore": 4.7
}
]
},
"weaknesses": [
{
"source": "reefs@jfrog.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-20"
}
]
}
],
"references": [
{
"url": "https://jfrog.com/help/r/jfrog-release-information/jfrog-security-advisories",
"source": "reefs@jfrog.com"
}
]
}

View File

@ -0,0 +1,47 @@
{
"id": "CVE-2024-4670",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-05-15T13:15:26.503",
"lastModified": "2024-05-15T13:15:26.503",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "The All-in-One Video Gallery plugin for WordPress is vulnerable to Local File Inclusion in all versions up to, and including, 3.6.5 via the aiovg_search_form shortcode. This makes it possible for authenticated attackers, with contributor-level access and above, to include and execute arbitrary files on the server, allowing the execution of any PHP code in those files. This can be used to bypass access controls, obtain sensitive data, or achieve code execution in cases where images and other \u201csafe\u201d file types can be uploaded and included."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security@wordfence.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
]
},
"references": [
{
"url": "https://plugins.trac.wordpress.org/changeset/3085217/all-in-one-video-gallery",
"source": "security@wordfence.com"
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/e2793547-5edf-4d2a-bc3b-fcaeed62963d?source=cve",
"source": "security@wordfence.com"
}
]
}

View File

@ -0,0 +1,47 @@
{
"id": "CVE-2024-4702",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-05-15T12:15:08.147",
"lastModified": "2024-05-15T12:15:08.147",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "The Mega Elements plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's Button widget in all versions up to, and including, 1.2.1 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security@wordfence.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 6.4,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 3.1,
"impactScore": 2.7
}
]
},
"references": [
{
"url": "https://plugins.trac.wordpress.org/changeset/3085457/mega-elements-addons-for-elementor",
"source": "security@wordfence.com"
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/3808ca2a-e78e-4118-890b-c22a71f8e855?source=cve",
"source": "security@wordfence.com"
}
]
}

View File

@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update
```plain
2024-05-15T12:00:31.985967+00:00
2024-05-15T14:01:12.614357+00:00
```
### Most recent CVE Modification Timestamp synchronized with NVD
```plain
2024-05-15T11:15:46.040000+00:00
2024-05-15T13:15:26.503000+00:00
```
### Last Data Feed Release
@ -33,32 +33,26 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
### Total Number of included CVEs
```plain
249967
249974
```
### CVEs added in the last Commit
Recently added CVEs: `12`
Recently added CVEs: `7`
- [CVE-2024-30284](CVE-2024/CVE-2024-302xx/CVE-2024-30284.json) (`2024-05-15T10:15:08.313`)
- [CVE-2024-30310](CVE-2024/CVE-2024-303xx/CVE-2024-30310.json) (`2024-05-15T10:15:10.093`)
- [CVE-2024-30311](CVE-2024/CVE-2024-303xx/CVE-2024-30311.json) (`2024-05-15T10:15:10.640`)
- [CVE-2024-30312](CVE-2024/CVE-2024-303xx/CVE-2024-30312.json) (`2024-05-15T10:15:11.087`)
- [CVE-2024-34094](CVE-2024/CVE-2024-340xx/CVE-2024-34094.json) (`2024-05-15T10:15:11.433`)
- [CVE-2024-34095](CVE-2024/CVE-2024-340xx/CVE-2024-34095.json) (`2024-05-15T10:15:11.847`)
- [CVE-2024-34096](CVE-2024/CVE-2024-340xx/CVE-2024-34096.json) (`2024-05-15T10:15:12.303`)
- [CVE-2024-34097](CVE-2024/CVE-2024-340xx/CVE-2024-34097.json) (`2024-05-15T10:15:12.740`)
- [CVE-2024-34098](CVE-2024/CVE-2024-340xx/CVE-2024-34098.json) (`2024-05-15T10:15:13.133`)
- [CVE-2024-34099](CVE-2024/CVE-2024-340xx/CVE-2024-34099.json) (`2024-05-15T10:15:13.997`)
- [CVE-2024-34100](CVE-2024/CVE-2024-341xx/CVE-2024-34100.json) (`2024-05-15T10:15:14.393`)
- [CVE-2024-34101](CVE-2024/CVE-2024-341xx/CVE-2024-34101.json) (`2024-05-15T10:15:14.827`)
- [CVE-2023-6321](CVE-2023/CVE-2023-63xx/CVE-2023-6321.json) (`2024-05-15T13:15:25.230`)
- [CVE-2023-6322](CVE-2023/CVE-2023-63xx/CVE-2023-6322.json) (`2024-05-15T13:15:25.543`)
- [CVE-2023-6323](CVE-2023/CVE-2023-63xx/CVE-2023-6323.json) (`2024-05-15T13:15:25.780`)
- [CVE-2023-6324](CVE-2023/CVE-2023-63xx/CVE-2023-6324.json) (`2024-05-15T13:15:26.010`)
- [CVE-2024-2248](CVE-2024/CVE-2024-22xx/CVE-2024-2248.json) (`2024-05-15T13:15:26.250`)
- [CVE-2024-4670](CVE-2024/CVE-2024-46xx/CVE-2024-4670.json) (`2024-05-15T13:15:26.503`)
- [CVE-2024-4702](CVE-2024/CVE-2024-47xx/CVE-2024-4702.json) (`2024-05-15T12:15:08.147`)
### CVEs modified in the last Commit
Recently modified CVEs: `1`
Recently modified CVEs: `0`
- [CVE-2023-6022](CVE-2023/CVE-2023-60xx/CVE-2023-6022.json) (`2024-05-15T11:15:46.040`)
## Download and Usage

View File

@ -238363,7 +238363,7 @@ CVE-2023-6018,0,0,1f18b8de61bc6ae06a9f1a70edccee8980a16c3392f0168a647385eede76a7
CVE-2023-6019,0,0,1b0cf3846925e5cc1dbeeb5b2fb545f517a933a30cbe1db23c2d8b7036db5ad9,2023-12-06T21:15:08.467000
CVE-2023-6020,0,0,c5b979db11c96d70f2fb4c728678b447381e9e768003d4c9e2fe065f6a1f455f,2024-02-08T10:15:09.797000
CVE-2023-6021,0,0,16c98d713ada3df3a760fac5f34aab1dd2eb41ffe79f086315cd4d5089d3684a,2023-12-06T21:15:08.647000
CVE-2023-6022,0,1,76b8ee0a83206d584b1f37ec952aa0be39ecba05e630828c933b88a45d62772a,2024-05-15T11:15:46.040000
CVE-2023-6022,0,0,76b8ee0a83206d584b1f37ec952aa0be39ecba05e630828c933b88a45d62772a,2024-05-15T11:15:46.040000
CVE-2023-6023,0,0,ddafde48c295d34caeccb353f1308de5837fb4b219cc65dbf4cc6b34fc13534c,2023-11-28T19:15:56.937000
CVE-2023-6026,0,0,99eaefb13eab36b4df5364acf133959a538ec4c8c3188341458cee758e57fee1,2023-12-06T02:36:45.597000
CVE-2023-6027,0,0,1b77c3b0fa7942c8dbbdbd497f07e97a96b6877fec82e9b0e8cc4ac3f836e92e,2023-12-06T02:26:53.783000
@ -238622,6 +238622,10 @@ CVE-2023-6317,0,0,7d7bdd6df101d067864ba1ce1e0999d7faf07fe4e884cb0e07f2b66cbb2c2a
CVE-2023-6318,0,0,c5b0fd94faa5692041827b1e90cea49c70217d21979f19374a5399fa311000d9,2024-04-18T08:15:37.793000
CVE-2023-6319,0,0,f0c8ec35edda76734c52d8668ac037fa65c1f29b0ee20b6b276b3d575b1d8043,2024-04-18T08:15:37.873000
CVE-2023-6320,0,0,97c0d852626b4121996a68ef80a1034e5eac45cc3e27fd758a11cceb60b37d97,2024-04-18T08:15:37.953000
CVE-2023-6321,1,1,285b21a85545a600bf3100643030afcd6109e3b39af59aa02338c25736140ec1,2024-05-15T13:15:25.230000
CVE-2023-6322,1,1,43f9753b0684017c93abe4e57722e44bb6022b4abebac5d9aa3d522c2b8a942a,2024-05-15T13:15:25.543000
CVE-2023-6323,1,1,f3062729f0a03681dab75e4a60980cd926cf869c745ce5caa77c78279bbe324a,2024-05-15T13:15:25.780000
CVE-2023-6324,1,1,3fa77271d82bba0bcf716696b7e130c46fae84803bfb529db3c8adf55a318677,2024-05-15T13:15:26.010000
CVE-2023-6326,0,0,da68435ec565f5478deb03e75227a685933d8e7699006844b61a2674d05885d6,2024-03-04T13:58:23.447000
CVE-2023-6327,0,0,10c1a98e50d0d35fd1a6cdd0608eda418ed61dd6a6780a3079b7350e9a6a350e,2024-05-14T16:13:02.773000
CVE-2023-6329,0,0,acb69acf796efdc21d3e11700a3115c7e39470c82b6e643969998bcd2e6b6d74,2023-12-01T20:50:45.717000
@ -242450,6 +242454,7 @@ CVE-2024-2247,0,0,d47546a6b73ddee0cb6fd88f3ec9a57023bd3004d425b99bc080c7d9ccfa2e
CVE-2024-22472,0,0,4ab7182b892f9b0334d117f1f559304c9baa050ae6c095fdd3688919803d9fc3,2024-05-07T13:39:32.710000
CVE-2024-22473,0,0,ba695bcad0bbe2cba422f3053697429916506f0f0ce55f150fe9af4a818e1f6b,2024-02-22T19:07:27.197000
CVE-2024-22475,0,0,0731764c36503d08ce16e32f1988cf42ad9d113053cd70f3c3f861f6ae04ccf2,2024-03-18T12:38:25.490000
CVE-2024-2248,1,1,8f2b0f102bb59fc4958c8b8150f622f733e4cb0cc9d24324f983a7db26974963,2024-05-15T13:15:26.250000
CVE-2024-2249,0,0,f298ad136cb14c6033692740767f3b439e3f51f5d5979e590804f3d1c2c5ae5e,2024-03-15T12:53:06.423000
CVE-2024-22490,0,0,36caaa8caefc70cd3fb65a62a9488b2446e68d14844d0a61d7baf757d2000caa,2024-01-29T22:48:35.493000
CVE-2024-22491,0,0,99c25b0ff8de89fe3ebd04368e499e7fe9b3820707560bd21fed90048934c0ad,2024-01-23T14:28:45.890000
@ -246955,7 +246960,7 @@ CVE-2024-30271,0,0,7934d49c76a773104fea3a055c8dca49939c18c3dc4eab227ecf5b491d166
CVE-2024-30272,0,0,fe18d25a398b5738660bb343d4a7fb499e0a8c129d952f35b1144eb8f7e44fa0,2024-04-12T12:44:04.930000
CVE-2024-30273,0,0,430d9deac2ea84fb25615ee056f7341da6ab62ae3551a67df5079d8156e28185,2024-04-12T12:44:04.930000
CVE-2024-3028,0,0,080bb069f1a2cade59952c14793e39c6c54825fa436573f5b60987254afab568,2024-04-16T13:24:07.103000
CVE-2024-30284,1,1,35d31a55e7178d0ef66bd390e789056411e7b70252f4123a5a61bc2cb45e7597,2024-05-15T10:15:08.313000
CVE-2024-30284,0,0,35d31a55e7178d0ef66bd390e789056411e7b70252f4123a5a61bc2cb45e7597,2024-05-15T10:15:08.313000
CVE-2024-3029,0,0,54e489ae31021cd62a123b17a985eef09bd69f22c945608ba51d64fcde83450f,2024-04-16T13:24:07.103000
CVE-2024-3030,0,0,88c29228ef56d61e184f00d5d8d99ea5dd9800435eeb42a07f389309c9f00688,2024-04-04T12:48:41.700000
CVE-2024-30301,0,0,34b23729cd9edf28be4c2d988192584b2980a0ec70b16064c51311fdd3e3b57c,2024-05-03T12:50:34.250000
@ -246964,9 +246969,9 @@ CVE-2024-30303,0,0,6f33b81c4af944bbf96dcd2699ecddcaedfa18b6645e1843afc4e3d8d61b0
CVE-2024-30304,0,0,c008b216bc83741e9c3f86a48d2f036636f57f601f0be3b09d08b9238e3b8d69,2024-05-03T12:50:34.250000
CVE-2024-30305,0,0,f9170aedfcb56d495924dc338c4bff877992c1a111fc2374df14a2f13d9685ae,2024-05-03T12:50:34.250000
CVE-2024-30306,0,0,3d0be5fa22f6a17837661930cea95c4e979049e02e29ef28995e28fef468bf8e,2024-05-03T12:50:34.250000
CVE-2024-30310,1,1,eb158a7e62595885f5021b7c20ed7f80822507fa2c5d04a302c6a46ab68f36b0,2024-05-15T10:15:10.093000
CVE-2024-30311,1,1,71b6e2602687d0675addcc55b2431ec9603f4d9b849e4ef1a72de27acf18bf42,2024-05-15T10:15:10.640000
CVE-2024-30312,1,1,69953fa13d2a91a24a0ff355544a5c1e1389cbf8a2a8a212da6700fe7c342d02,2024-05-15T10:15:11.087000
CVE-2024-30310,0,0,eb158a7e62595885f5021b7c20ed7f80822507fa2c5d04a302c6a46ab68f36b0,2024-05-15T10:15:10.093000
CVE-2024-30311,0,0,71b6e2602687d0675addcc55b2431ec9603f4d9b849e4ef1a72de27acf18bf42,2024-05-15T10:15:10.640000
CVE-2024-30312,0,0,69953fa13d2a91a24a0ff355544a5c1e1389cbf8a2a8a212da6700fe7c342d02,2024-05-15T10:15:11.087000
CVE-2024-30322,0,0,82127178dd2c4390457a625b1b802dc21960ed844c23f33ac3f61e8d8c162a4f,2024-04-03T17:24:18.150000
CVE-2024-30323,0,0,4ba71c995b9c718766f72cb8f425ef56f31d70d4141fb317ff1b84d1d4bea62f,2024-04-03T17:24:18.150000
CVE-2024-30324,0,0,b34850e80ab56aec12159793bc4cf321b46343aaa9dfe2615612dc24168ff93e,2024-04-03T17:24:18.150000
@ -248897,14 +248902,14 @@ CVE-2024-34090,0,0,73f27f58371a8666265526d07222810acdb885707b1b55123938a5e253903
CVE-2024-34091,0,0,70a30dbd3192646aee95560e088991088bfd360be9272880b76f6d0c49ad6fc3,2024-05-06T19:53:38.797000
CVE-2024-34092,0,0,079ea99bb21d4c1a138d545f7e5e5abbd38b83ad27446c874b351279df34c3ee,2024-05-06T19:53:38.797000
CVE-2024-34093,0,0,a0f074d00436b49ca53556630e0d0ac1028fcb54a8c44a292fda62eb4d8b7b7c,2024-05-06T19:53:38.797000
CVE-2024-34094,1,1,4ee57a51695ec5fe27e4a9e282d49852d1de480549e3073786dea7de331fca13,2024-05-15T10:15:11.433000
CVE-2024-34095,1,1,52cceb06bdde3e10cd623c28d10ca65453e48679bfbdd1c5ad1238c896edcc28,2024-05-15T10:15:11.847000
CVE-2024-34096,1,1,33fb4142e5a446af3fd4a297d4255959412a2dff85b13b74df24a81c395c0a08,2024-05-15T10:15:12.303000
CVE-2024-34097,1,1,596cb369596a689ab627c9ce08ef2e104aa328d9857c942957bd1fe8809dd575,2024-05-15T10:15:12.740000
CVE-2024-34098,1,1,528b352141a32d7e2f05cc84d2bf0525b23b5965bd28a7bbbd4a48bd81686df5,2024-05-15T10:15:13.133000
CVE-2024-34099,1,1,f2ed23b4a077d449fe35c7faf3c0928a6d640184b1b8540d44c1323b076f8aa3,2024-05-15T10:15:13.997000
CVE-2024-34100,1,1,a5b876a02f40e5b6869ea96db5e4495246697d8f35a6e4e7f0ad20b3e38237ac,2024-05-15T10:15:14.393000
CVE-2024-34101,1,1,d41a939220b5e33c6a283252c7c85a3892629e2819c87fce820ced3ae07c2448,2024-05-15T10:15:14.827000
CVE-2024-34094,0,0,4ee57a51695ec5fe27e4a9e282d49852d1de480549e3073786dea7de331fca13,2024-05-15T10:15:11.433000
CVE-2024-34095,0,0,52cceb06bdde3e10cd623c28d10ca65453e48679bfbdd1c5ad1238c896edcc28,2024-05-15T10:15:11.847000
CVE-2024-34096,0,0,33fb4142e5a446af3fd4a297d4255959412a2dff85b13b74df24a81c395c0a08,2024-05-15T10:15:12.303000
CVE-2024-34097,0,0,596cb369596a689ab627c9ce08ef2e104aa328d9857c942957bd1fe8809dd575,2024-05-15T10:15:12.740000
CVE-2024-34098,0,0,528b352141a32d7e2f05cc84d2bf0525b23b5965bd28a7bbbd4a48bd81686df5,2024-05-15T10:15:13.133000
CVE-2024-34099,0,0,f2ed23b4a077d449fe35c7faf3c0928a6d640184b1b8540d44c1323b076f8aa3,2024-05-15T10:15:13.997000
CVE-2024-34100,0,0,a5b876a02f40e5b6869ea96db5e4495246697d8f35a6e4e7f0ad20b3e38237ac,2024-05-15T10:15:14.393000
CVE-2024-34101,0,0,d41a939220b5e33c6a283252c7c85a3892629e2819c87fce820ced3ae07c2448,2024-05-15T10:15:14.827000
CVE-2024-3411,0,0,1527ccef7805d20e12db1e61173246b27470986be341d9b24d7b20f806f94433,2024-04-30T19:35:36.960000
CVE-2024-3413,0,0,8df9edda77a29d759520ec151c1de561865d6f5b033a8805b093f3cff4c018a6,2024-05-14T15:40:52.120000
CVE-2024-3414,0,0,7c1cc48be95711821345a71d160c9c7a41121cec5756203ccdb016b750acef98,2024-05-14T15:40:52.380000
@ -249860,6 +249865,7 @@ CVE-2024-4653,0,0,e8399611ff9b3c22a49b29fd6c48d03e625100ac4d82ba02efbcf4dc2d1c1f
CVE-2024-4654,0,0,54e1bc582a5bc46d650cbca5fe2319c8ac0b454abcc9791786eb7af7e6d008e5,2024-05-14T15:44:15.280000
CVE-2024-4656,0,0,09582a8f36f9a29d7c15e38d53099bc5ba2768f3beed43b9bf7055d3b6b75ba8,2024-05-15T02:15:10.653000
CVE-2024-4666,0,0,bf53d4dc056caa27b5c961c61e08b20ea2c8744b37ef1ad83219dd5d8d1bf152,2024-05-14T23:15:13.340000
CVE-2024-4670,1,1,b15e82ee627a897b30491803b5e024571f26ee963db78a8d1af53fb138a514b1,2024-05-15T13:15:26.503000
CVE-2024-4671,0,0,f2e3b6c0de159d5b4f685d54d499be3e2ad6bf853ced24939cfa6f60b46f6050,2024-05-15T01:00:02.933000
CVE-2024-4672,0,0,0757de8ca73f855a9108a8fa1c5cf086a0160cf81b5241c2bdf6e296b8d20e94,2024-05-14T16:11:39.510000
CVE-2024-4673,0,0,6653b18426020bb158c9af8a31628f48225b12a113e8d380d8144ae272b5739e,2024-05-14T16:11:39.510000
@ -249880,6 +249886,7 @@ CVE-2024-4689,0,0,dc95d8f4f9f77b231313911514e3d3b97848c495dee3874d04a472dce09476
CVE-2024-4693,0,0,8b202b0a3d7cdbe460ad8fc60aa4dcd9510713b61e0c7f4c4b9991496781ed47,2024-05-14T16:11:39.510000
CVE-2024-4699,0,0,392ffce8fac31dcce0631553fbbc8be8df266f6b80af30533be7482ea0251693,2024-05-14T16:11:39.510000
CVE-2024-4701,0,0,761d41a28193a1e33042d464e0d5792093f168eb245e7d1be80e9000538f9ccc,2024-05-14T16:11:39.510000
CVE-2024-4702,1,1,4ca9ca65b028bbe73dc6dbe9e7d56329a672e97179003443879a6a90e4ccab8e,2024-05-15T12:15:08.147000
CVE-2024-4712,0,0,1b096c388f37a8dc235e93a130297376c1188074ec6b9a37b1819e757fb63d04,2024-05-14T16:11:39.510000
CVE-2024-4713,0,0,f6ff7be5d9612d85084a028a6e0372af93d73ed27667172e03baae3f27c4f63b,2024-05-14T16:11:39.510000
CVE-2024-4714,0,0,992b8ce4d72ac491742d6edfbbc59e263a119552b8eeb895b68648636d6eedb7,2024-05-14T16:11:39.510000

Can't render this file because it is too large.