diff --git a/CVE-2023/CVE-2023-63xx/CVE-2023-6321.json b/CVE-2023/CVE-2023-63xx/CVE-2023-6321.json new file mode 100644 index 00000000000..5cdd1b52988 --- /dev/null +++ b/CVE-2023/CVE-2023-63xx/CVE-2023-6321.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2023-6321", + "sourceIdentifier": "cve-requests@bitdefender.com", + "published": "2024-05-15T13:15:25.230", + "lastModified": "2024-05-15T13:15:25.230", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "A command injection vulnerability exists in the IOCTL that manages OTA updates. A specially crafted command can lead to command execution as the root user. An attacker can make authenticated requests to trigger this vulnerability." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "cve-requests@bitdefender.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.2, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.2, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "cve-requests@bitdefender.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-78" + } + ] + } + ], + "references": [ + { + "url": "https://bitdefender.com/blog/labs/notes-on-throughtek-kalay-vulnerabilities-and-their-impact/", + "source": "cve-requests@bitdefender.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-63xx/CVE-2023-6322.json b/CVE-2023/CVE-2023-63xx/CVE-2023-6322.json new file mode 100644 index 00000000000..a599bc7b675 --- /dev/null +++ b/CVE-2023/CVE-2023-63xx/CVE-2023-6322.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2023-6322", + "sourceIdentifier": "cve-requests@bitdefender.com", + "published": "2024-05-15T13:15:25.543", + "lastModified": "2024-05-15T13:15:25.543", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "A stack-based buffer overflow vulnerability exists in the message parsing functionality of the Roku Indoor Camera SE version 3.0.2.4679 and Wyze Cam v3 version 4.36.11.5859. A specially crafted message can lead to stack-based buffer overflow. An attacker can make authenticated requests to trigger this vulnerability." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "cve-requests@bitdefender.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.2, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.2, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "cve-requests@bitdefender.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-121" + } + ] + } + ], + "references": [ + { + "url": "https://bitdefender.com/blog/labs/notes-on-throughtek-kalay-vulnerabilities-and-their-impact/", + "source": "cve-requests@bitdefender.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-63xx/CVE-2023-6323.json b/CVE-2023/CVE-2023-63xx/CVE-2023-6323.json new file mode 100644 index 00000000000..7df48648145 --- /dev/null +++ b/CVE-2023/CVE-2023-63xx/CVE-2023-6323.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2023-6323", + "sourceIdentifier": "cve-requests@bitdefender.com", + "published": "2024-05-15T13:15:25.780", + "lastModified": "2024-05-15T13:15:25.780", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "ThroughTek Kalay SDK does not verify the authenticity of received messages, allowing an attacker to impersonate an authoritative server." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "cve-requests@bitdefender.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 4.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "cve-requests@bitdefender.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-345" + } + ] + } + ], + "references": [ + { + "url": "https://bitdefender.com/blog/labs/notes-on-throughtek-kalay-vulnerabilities-and-their-impact/", + "source": "cve-requests@bitdefender.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-63xx/CVE-2023-6324.json b/CVE-2023/CVE-2023-63xx/CVE-2023-6324.json new file mode 100644 index 00000000000..4ab86f70e4f --- /dev/null +++ b/CVE-2023/CVE-2023-63xx/CVE-2023-6324.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2023-6324", + "sourceIdentifier": "cve-requests@bitdefender.com", + "published": "2024-05-15T13:15:26.010", + "lastModified": "2024-05-15T13:15:26.010", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "ThroughTek Kalay SDK uses a predictable PSK value in the DTLS session when encountering an unexpected PSK identity" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "cve-requests@bitdefender.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 8.1, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.2 + } + ] + }, + "weaknesses": [ + { + "source": "cve-requests@bitdefender.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-457" + } + ] + } + ], + "references": [ + { + "url": "https://bitdefender.com/blog/labs/notes-on-throughtek-kalay-vulnerabilities-and-their-impact/", + "source": "cve-requests@bitdefender.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-22xx/CVE-2024-2248.json b/CVE-2024/CVE-2024-22xx/CVE-2024-2248.json new file mode 100644 index 00000000000..6e4a91139f3 --- /dev/null +++ b/CVE-2024/CVE-2024-22xx/CVE-2024-2248.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2024-2248", + "sourceIdentifier": "reefs@jfrog.com", + "published": "2024-05-15T13:15:26.250", + "lastModified": "2024-05-15T13:15:26.250", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "A Header Injection vulnerability in the JFrog platform in versions below 7.85.0 (SaaS) and 7.84.7 (Self-Hosted) may allow threat actors to take over the end user's account when clicking on a specially crafted URL sent to the victim\u2019s user email." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "reefs@jfrog.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:H", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "HIGH", + "baseScore": 6.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.6, + "impactScore": 4.7 + } + ] + }, + "weaknesses": [ + { + "source": "reefs@jfrog.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-20" + } + ] + } + ], + "references": [ + { + "url": "https://jfrog.com/help/r/jfrog-release-information/jfrog-security-advisories", + "source": "reefs@jfrog.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-46xx/CVE-2024-4670.json b/CVE-2024/CVE-2024-46xx/CVE-2024-4670.json new file mode 100644 index 00000000000..4e7d57e241b --- /dev/null +++ b/CVE-2024/CVE-2024-46xx/CVE-2024-4670.json @@ -0,0 +1,47 @@ +{ + "id": "CVE-2024-4670", + "sourceIdentifier": "security@wordfence.com", + "published": "2024-05-15T13:15:26.503", + "lastModified": "2024-05-15T13:15:26.503", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "The All-in-One Video Gallery plugin for WordPress is vulnerable to Local File Inclusion in all versions up to, and including, 3.6.5 via the aiovg_search_form shortcode. This makes it possible for authenticated attackers, with contributor-level access and above, to include and execute arbitrary files on the server, allowing the execution of any PHP code in those files. This can be used to bypass access controls, obtain sensitive data, or achieve code execution in cases where images and other \u201csafe\u201d file types can be uploaded and included." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security@wordfence.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, + "references": [ + { + "url": "https://plugins.trac.wordpress.org/changeset/3085217/all-in-one-video-gallery", + "source": "security@wordfence.com" + }, + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/e2793547-5edf-4d2a-bc3b-fcaeed62963d?source=cve", + "source": "security@wordfence.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-47xx/CVE-2024-4702.json b/CVE-2024/CVE-2024-47xx/CVE-2024-4702.json new file mode 100644 index 00000000000..866f6ea89b2 --- /dev/null +++ b/CVE-2024/CVE-2024-47xx/CVE-2024-4702.json @@ -0,0 +1,47 @@ +{ + "id": "CVE-2024-4702", + "sourceIdentifier": "security@wordfence.com", + "published": "2024-05-15T12:15:08.147", + "lastModified": "2024-05-15T12:15:08.147", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "The Mega Elements plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's Button widget in all versions up to, and including, 1.2.1 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security@wordfence.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 6.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 3.1, + "impactScore": 2.7 + } + ] + }, + "references": [ + { + "url": "https://plugins.trac.wordpress.org/changeset/3085457/mega-elements-addons-for-elementor", + "source": "security@wordfence.com" + }, + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/3808ca2a-e78e-4118-890b-c22a71f8e855?source=cve", + "source": "security@wordfence.com" + } + ] +} \ No newline at end of file diff --git a/README.md b/README.md index f290e44a1f8..d782966da7f 100644 --- a/README.md +++ b/README.md @@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2024-05-15T12:00:31.985967+00:00 +2024-05-15T14:01:12.614357+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2024-05-15T11:15:46.040000+00:00 +2024-05-15T13:15:26.503000+00:00 ``` ### Last Data Feed Release @@ -33,32 +33,26 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### Total Number of included CVEs ```plain -249967 +249974 ``` ### CVEs added in the last Commit -Recently added CVEs: `12` +Recently added CVEs: `7` -- [CVE-2024-30284](CVE-2024/CVE-2024-302xx/CVE-2024-30284.json) (`2024-05-15T10:15:08.313`) -- [CVE-2024-30310](CVE-2024/CVE-2024-303xx/CVE-2024-30310.json) (`2024-05-15T10:15:10.093`) -- [CVE-2024-30311](CVE-2024/CVE-2024-303xx/CVE-2024-30311.json) (`2024-05-15T10:15:10.640`) -- [CVE-2024-30312](CVE-2024/CVE-2024-303xx/CVE-2024-30312.json) (`2024-05-15T10:15:11.087`) -- [CVE-2024-34094](CVE-2024/CVE-2024-340xx/CVE-2024-34094.json) (`2024-05-15T10:15:11.433`) -- [CVE-2024-34095](CVE-2024/CVE-2024-340xx/CVE-2024-34095.json) (`2024-05-15T10:15:11.847`) -- [CVE-2024-34096](CVE-2024/CVE-2024-340xx/CVE-2024-34096.json) (`2024-05-15T10:15:12.303`) -- [CVE-2024-34097](CVE-2024/CVE-2024-340xx/CVE-2024-34097.json) (`2024-05-15T10:15:12.740`) -- [CVE-2024-34098](CVE-2024/CVE-2024-340xx/CVE-2024-34098.json) (`2024-05-15T10:15:13.133`) -- [CVE-2024-34099](CVE-2024/CVE-2024-340xx/CVE-2024-34099.json) (`2024-05-15T10:15:13.997`) -- [CVE-2024-34100](CVE-2024/CVE-2024-341xx/CVE-2024-34100.json) (`2024-05-15T10:15:14.393`) -- [CVE-2024-34101](CVE-2024/CVE-2024-341xx/CVE-2024-34101.json) (`2024-05-15T10:15:14.827`) +- [CVE-2023-6321](CVE-2023/CVE-2023-63xx/CVE-2023-6321.json) (`2024-05-15T13:15:25.230`) +- [CVE-2023-6322](CVE-2023/CVE-2023-63xx/CVE-2023-6322.json) (`2024-05-15T13:15:25.543`) +- [CVE-2023-6323](CVE-2023/CVE-2023-63xx/CVE-2023-6323.json) (`2024-05-15T13:15:25.780`) +- [CVE-2023-6324](CVE-2023/CVE-2023-63xx/CVE-2023-6324.json) (`2024-05-15T13:15:26.010`) +- [CVE-2024-2248](CVE-2024/CVE-2024-22xx/CVE-2024-2248.json) (`2024-05-15T13:15:26.250`) +- [CVE-2024-4670](CVE-2024/CVE-2024-46xx/CVE-2024-4670.json) (`2024-05-15T13:15:26.503`) +- [CVE-2024-4702](CVE-2024/CVE-2024-47xx/CVE-2024-4702.json) (`2024-05-15T12:15:08.147`) ### CVEs modified in the last Commit -Recently modified CVEs: `1` +Recently modified CVEs: `0` -- [CVE-2023-6022](CVE-2023/CVE-2023-60xx/CVE-2023-6022.json) (`2024-05-15T11:15:46.040`) ## Download and Usage diff --git a/_state.csv b/_state.csv index a2095b2dde1..0803732a442 100644 --- a/_state.csv +++ b/_state.csv @@ -238363,7 +238363,7 @@ CVE-2023-6018,0,0,1f18b8de61bc6ae06a9f1a70edccee8980a16c3392f0168a647385eede76a7 CVE-2023-6019,0,0,1b0cf3846925e5cc1dbeeb5b2fb545f517a933a30cbe1db23c2d8b7036db5ad9,2023-12-06T21:15:08.467000 CVE-2023-6020,0,0,c5b979db11c96d70f2fb4c728678b447381e9e768003d4c9e2fe065f6a1f455f,2024-02-08T10:15:09.797000 CVE-2023-6021,0,0,16c98d713ada3df3a760fac5f34aab1dd2eb41ffe79f086315cd4d5089d3684a,2023-12-06T21:15:08.647000 -CVE-2023-6022,0,1,76b8ee0a83206d584b1f37ec952aa0be39ecba05e630828c933b88a45d62772a,2024-05-15T11:15:46.040000 +CVE-2023-6022,0,0,76b8ee0a83206d584b1f37ec952aa0be39ecba05e630828c933b88a45d62772a,2024-05-15T11:15:46.040000 CVE-2023-6023,0,0,ddafde48c295d34caeccb353f1308de5837fb4b219cc65dbf4cc6b34fc13534c,2023-11-28T19:15:56.937000 CVE-2023-6026,0,0,99eaefb13eab36b4df5364acf133959a538ec4c8c3188341458cee758e57fee1,2023-12-06T02:36:45.597000 CVE-2023-6027,0,0,1b77c3b0fa7942c8dbbdbd497f07e97a96b6877fec82e9b0e8cc4ac3f836e92e,2023-12-06T02:26:53.783000 @@ -238622,6 +238622,10 @@ CVE-2023-6317,0,0,7d7bdd6df101d067864ba1ce1e0999d7faf07fe4e884cb0e07f2b66cbb2c2a CVE-2023-6318,0,0,c5b0fd94faa5692041827b1e90cea49c70217d21979f19374a5399fa311000d9,2024-04-18T08:15:37.793000 CVE-2023-6319,0,0,f0c8ec35edda76734c52d8668ac037fa65c1f29b0ee20b6b276b3d575b1d8043,2024-04-18T08:15:37.873000 CVE-2023-6320,0,0,97c0d852626b4121996a68ef80a1034e5eac45cc3e27fd758a11cceb60b37d97,2024-04-18T08:15:37.953000 +CVE-2023-6321,1,1,285b21a85545a600bf3100643030afcd6109e3b39af59aa02338c25736140ec1,2024-05-15T13:15:25.230000 +CVE-2023-6322,1,1,43f9753b0684017c93abe4e57722e44bb6022b4abebac5d9aa3d522c2b8a942a,2024-05-15T13:15:25.543000 +CVE-2023-6323,1,1,f3062729f0a03681dab75e4a60980cd926cf869c745ce5caa77c78279bbe324a,2024-05-15T13:15:25.780000 +CVE-2023-6324,1,1,3fa77271d82bba0bcf716696b7e130c46fae84803bfb529db3c8adf55a318677,2024-05-15T13:15:26.010000 CVE-2023-6326,0,0,da68435ec565f5478deb03e75227a685933d8e7699006844b61a2674d05885d6,2024-03-04T13:58:23.447000 CVE-2023-6327,0,0,10c1a98e50d0d35fd1a6cdd0608eda418ed61dd6a6780a3079b7350e9a6a350e,2024-05-14T16:13:02.773000 CVE-2023-6329,0,0,acb69acf796efdc21d3e11700a3115c7e39470c82b6e643969998bcd2e6b6d74,2023-12-01T20:50:45.717000 @@ -242450,6 +242454,7 @@ CVE-2024-2247,0,0,d47546a6b73ddee0cb6fd88f3ec9a57023bd3004d425b99bc080c7d9ccfa2e CVE-2024-22472,0,0,4ab7182b892f9b0334d117f1f559304c9baa050ae6c095fdd3688919803d9fc3,2024-05-07T13:39:32.710000 CVE-2024-22473,0,0,ba695bcad0bbe2cba422f3053697429916506f0f0ce55f150fe9af4a818e1f6b,2024-02-22T19:07:27.197000 CVE-2024-22475,0,0,0731764c36503d08ce16e32f1988cf42ad9d113053cd70f3c3f861f6ae04ccf2,2024-03-18T12:38:25.490000 +CVE-2024-2248,1,1,8f2b0f102bb59fc4958c8b8150f622f733e4cb0cc9d24324f983a7db26974963,2024-05-15T13:15:26.250000 CVE-2024-2249,0,0,f298ad136cb14c6033692740767f3b439e3f51f5d5979e590804f3d1c2c5ae5e,2024-03-15T12:53:06.423000 CVE-2024-22490,0,0,36caaa8caefc70cd3fb65a62a9488b2446e68d14844d0a61d7baf757d2000caa,2024-01-29T22:48:35.493000 CVE-2024-22491,0,0,99c25b0ff8de89fe3ebd04368e499e7fe9b3820707560bd21fed90048934c0ad,2024-01-23T14:28:45.890000 @@ -246955,7 +246960,7 @@ CVE-2024-30271,0,0,7934d49c76a773104fea3a055c8dca49939c18c3dc4eab227ecf5b491d166 CVE-2024-30272,0,0,fe18d25a398b5738660bb343d4a7fb499e0a8c129d952f35b1144eb8f7e44fa0,2024-04-12T12:44:04.930000 CVE-2024-30273,0,0,430d9deac2ea84fb25615ee056f7341da6ab62ae3551a67df5079d8156e28185,2024-04-12T12:44:04.930000 CVE-2024-3028,0,0,080bb069f1a2cade59952c14793e39c6c54825fa436573f5b60987254afab568,2024-04-16T13:24:07.103000 -CVE-2024-30284,1,1,35d31a55e7178d0ef66bd390e789056411e7b70252f4123a5a61bc2cb45e7597,2024-05-15T10:15:08.313000 +CVE-2024-30284,0,0,35d31a55e7178d0ef66bd390e789056411e7b70252f4123a5a61bc2cb45e7597,2024-05-15T10:15:08.313000 CVE-2024-3029,0,0,54e489ae31021cd62a123b17a985eef09bd69f22c945608ba51d64fcde83450f,2024-04-16T13:24:07.103000 CVE-2024-3030,0,0,88c29228ef56d61e184f00d5d8d99ea5dd9800435eeb42a07f389309c9f00688,2024-04-04T12:48:41.700000 CVE-2024-30301,0,0,34b23729cd9edf28be4c2d988192584b2980a0ec70b16064c51311fdd3e3b57c,2024-05-03T12:50:34.250000 @@ -246964,9 +246969,9 @@ CVE-2024-30303,0,0,6f33b81c4af944bbf96dcd2699ecddcaedfa18b6645e1843afc4e3d8d61b0 CVE-2024-30304,0,0,c008b216bc83741e9c3f86a48d2f036636f57f601f0be3b09d08b9238e3b8d69,2024-05-03T12:50:34.250000 CVE-2024-30305,0,0,f9170aedfcb56d495924dc338c4bff877992c1a111fc2374df14a2f13d9685ae,2024-05-03T12:50:34.250000 CVE-2024-30306,0,0,3d0be5fa22f6a17837661930cea95c4e979049e02e29ef28995e28fef468bf8e,2024-05-03T12:50:34.250000 -CVE-2024-30310,1,1,eb158a7e62595885f5021b7c20ed7f80822507fa2c5d04a302c6a46ab68f36b0,2024-05-15T10:15:10.093000 -CVE-2024-30311,1,1,71b6e2602687d0675addcc55b2431ec9603f4d9b849e4ef1a72de27acf18bf42,2024-05-15T10:15:10.640000 -CVE-2024-30312,1,1,69953fa13d2a91a24a0ff355544a5c1e1389cbf8a2a8a212da6700fe7c342d02,2024-05-15T10:15:11.087000 +CVE-2024-30310,0,0,eb158a7e62595885f5021b7c20ed7f80822507fa2c5d04a302c6a46ab68f36b0,2024-05-15T10:15:10.093000 +CVE-2024-30311,0,0,71b6e2602687d0675addcc55b2431ec9603f4d9b849e4ef1a72de27acf18bf42,2024-05-15T10:15:10.640000 +CVE-2024-30312,0,0,69953fa13d2a91a24a0ff355544a5c1e1389cbf8a2a8a212da6700fe7c342d02,2024-05-15T10:15:11.087000 CVE-2024-30322,0,0,82127178dd2c4390457a625b1b802dc21960ed844c23f33ac3f61e8d8c162a4f,2024-04-03T17:24:18.150000 CVE-2024-30323,0,0,4ba71c995b9c718766f72cb8f425ef56f31d70d4141fb317ff1b84d1d4bea62f,2024-04-03T17:24:18.150000 CVE-2024-30324,0,0,b34850e80ab56aec12159793bc4cf321b46343aaa9dfe2615612dc24168ff93e,2024-04-03T17:24:18.150000 @@ -248897,14 +248902,14 @@ CVE-2024-34090,0,0,73f27f58371a8666265526d07222810acdb885707b1b55123938a5e253903 CVE-2024-34091,0,0,70a30dbd3192646aee95560e088991088bfd360be9272880b76f6d0c49ad6fc3,2024-05-06T19:53:38.797000 CVE-2024-34092,0,0,079ea99bb21d4c1a138d545f7e5e5abbd38b83ad27446c874b351279df34c3ee,2024-05-06T19:53:38.797000 CVE-2024-34093,0,0,a0f074d00436b49ca53556630e0d0ac1028fcb54a8c44a292fda62eb4d8b7b7c,2024-05-06T19:53:38.797000 -CVE-2024-34094,1,1,4ee57a51695ec5fe27e4a9e282d49852d1de480549e3073786dea7de331fca13,2024-05-15T10:15:11.433000 -CVE-2024-34095,1,1,52cceb06bdde3e10cd623c28d10ca65453e48679bfbdd1c5ad1238c896edcc28,2024-05-15T10:15:11.847000 -CVE-2024-34096,1,1,33fb4142e5a446af3fd4a297d4255959412a2dff85b13b74df24a81c395c0a08,2024-05-15T10:15:12.303000 -CVE-2024-34097,1,1,596cb369596a689ab627c9ce08ef2e104aa328d9857c942957bd1fe8809dd575,2024-05-15T10:15:12.740000 -CVE-2024-34098,1,1,528b352141a32d7e2f05cc84d2bf0525b23b5965bd28a7bbbd4a48bd81686df5,2024-05-15T10:15:13.133000 -CVE-2024-34099,1,1,f2ed23b4a077d449fe35c7faf3c0928a6d640184b1b8540d44c1323b076f8aa3,2024-05-15T10:15:13.997000 -CVE-2024-34100,1,1,a5b876a02f40e5b6869ea96db5e4495246697d8f35a6e4e7f0ad20b3e38237ac,2024-05-15T10:15:14.393000 -CVE-2024-34101,1,1,d41a939220b5e33c6a283252c7c85a3892629e2819c87fce820ced3ae07c2448,2024-05-15T10:15:14.827000 +CVE-2024-34094,0,0,4ee57a51695ec5fe27e4a9e282d49852d1de480549e3073786dea7de331fca13,2024-05-15T10:15:11.433000 +CVE-2024-34095,0,0,52cceb06bdde3e10cd623c28d10ca65453e48679bfbdd1c5ad1238c896edcc28,2024-05-15T10:15:11.847000 +CVE-2024-34096,0,0,33fb4142e5a446af3fd4a297d4255959412a2dff85b13b74df24a81c395c0a08,2024-05-15T10:15:12.303000 +CVE-2024-34097,0,0,596cb369596a689ab627c9ce08ef2e104aa328d9857c942957bd1fe8809dd575,2024-05-15T10:15:12.740000 +CVE-2024-34098,0,0,528b352141a32d7e2f05cc84d2bf0525b23b5965bd28a7bbbd4a48bd81686df5,2024-05-15T10:15:13.133000 +CVE-2024-34099,0,0,f2ed23b4a077d449fe35c7faf3c0928a6d640184b1b8540d44c1323b076f8aa3,2024-05-15T10:15:13.997000 +CVE-2024-34100,0,0,a5b876a02f40e5b6869ea96db5e4495246697d8f35a6e4e7f0ad20b3e38237ac,2024-05-15T10:15:14.393000 +CVE-2024-34101,0,0,d41a939220b5e33c6a283252c7c85a3892629e2819c87fce820ced3ae07c2448,2024-05-15T10:15:14.827000 CVE-2024-3411,0,0,1527ccef7805d20e12db1e61173246b27470986be341d9b24d7b20f806f94433,2024-04-30T19:35:36.960000 CVE-2024-3413,0,0,8df9edda77a29d759520ec151c1de561865d6f5b033a8805b093f3cff4c018a6,2024-05-14T15:40:52.120000 CVE-2024-3414,0,0,7c1cc48be95711821345a71d160c9c7a41121cec5756203ccdb016b750acef98,2024-05-14T15:40:52.380000 @@ -249860,6 +249865,7 @@ CVE-2024-4653,0,0,e8399611ff9b3c22a49b29fd6c48d03e625100ac4d82ba02efbcf4dc2d1c1f CVE-2024-4654,0,0,54e1bc582a5bc46d650cbca5fe2319c8ac0b454abcc9791786eb7af7e6d008e5,2024-05-14T15:44:15.280000 CVE-2024-4656,0,0,09582a8f36f9a29d7c15e38d53099bc5ba2768f3beed43b9bf7055d3b6b75ba8,2024-05-15T02:15:10.653000 CVE-2024-4666,0,0,bf53d4dc056caa27b5c961c61e08b20ea2c8744b37ef1ad83219dd5d8d1bf152,2024-05-14T23:15:13.340000 +CVE-2024-4670,1,1,b15e82ee627a897b30491803b5e024571f26ee963db78a8d1af53fb138a514b1,2024-05-15T13:15:26.503000 CVE-2024-4671,0,0,f2e3b6c0de159d5b4f685d54d499be3e2ad6bf853ced24939cfa6f60b46f6050,2024-05-15T01:00:02.933000 CVE-2024-4672,0,0,0757de8ca73f855a9108a8fa1c5cf086a0160cf81b5241c2bdf6e296b8d20e94,2024-05-14T16:11:39.510000 CVE-2024-4673,0,0,6653b18426020bb158c9af8a31628f48225b12a113e8d380d8144ae272b5739e,2024-05-14T16:11:39.510000 @@ -249880,6 +249886,7 @@ CVE-2024-4689,0,0,dc95d8f4f9f77b231313911514e3d3b97848c495dee3874d04a472dce09476 CVE-2024-4693,0,0,8b202b0a3d7cdbe460ad8fc60aa4dcd9510713b61e0c7f4c4b9991496781ed47,2024-05-14T16:11:39.510000 CVE-2024-4699,0,0,392ffce8fac31dcce0631553fbbc8be8df266f6b80af30533be7482ea0251693,2024-05-14T16:11:39.510000 CVE-2024-4701,0,0,761d41a28193a1e33042d464e0d5792093f168eb245e7d1be80e9000538f9ccc,2024-05-14T16:11:39.510000 +CVE-2024-4702,1,1,4ca9ca65b028bbe73dc6dbe9e7d56329a672e97179003443879a6a90e4ccab8e,2024-05-15T12:15:08.147000 CVE-2024-4712,0,0,1b096c388f37a8dc235e93a130297376c1188074ec6b9a37b1819e757fb63d04,2024-05-14T16:11:39.510000 CVE-2024-4713,0,0,f6ff7be5d9612d85084a028a6e0372af93d73ed27667172e03baae3f27c4f63b,2024-05-14T16:11:39.510000 CVE-2024-4714,0,0,992b8ce4d72ac491742d6edfbbc59e263a119552b8eeb895b68648636d6eedb7,2024-05-14T16:11:39.510000