Auto-Update: 2024-05-08T04:00:37.878680+00:00

This commit is contained in:
cad-safe-bot 2024-05-08 04:03:29 +00:00
parent 942159792a
commit 7ef1d7b004
13 changed files with 435 additions and 19 deletions

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-3758",
"sourceIdentifier": "secalert@redhat.com",
"published": "2024-04-18T19:15:08.597",
"lastModified": "2024-04-30T20:15:06.787",
"lastModified": "2024-05-08T03:15:06.710",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
@ -86,6 +86,14 @@
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RV3HIZI3SURBUQKSOOL3XE64OOBQ2HTK/",
"source": "secalert@redhat.com"
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XEP62IDS7A55D5UHM6GH7QZ7SQFOAPVF/",
"source": "secalert@redhat.com"
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XMORAO2BDDA5YX4ZLMXDZ7SM6KU47SY5/",
"source": "secalert@redhat.com"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-1139",
"sourceIdentifier": "secalert@redhat.com",
"published": "2024-04-25T17:15:47.650",
"lastModified": "2024-04-26T09:15:09.103",
"lastModified": "2024-05-08T02:15:08.973",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
@ -55,6 +55,10 @@
"url": "https://access.redhat.com/errata/RHSA-2024:1887",
"source": "secalert@redhat.com"
},
{
"url": "https://access.redhat.com/errata/RHSA-2024:2047",
"source": "secalert@redhat.com"
},
{
"url": "https://access.redhat.com/security/cve/CVE-2024-1139",
"source": "secalert@redhat.com"

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-1725",
"sourceIdentifier": "secalert@redhat.com",
"published": "2024-03-07T20:15:50.690",
"lastModified": "2024-04-26T20:15:07.310",
"lastModified": "2024-05-08T02:15:09.067",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
@ -59,6 +59,10 @@
"url": "https://access.redhat.com/errata/RHSA-2024:1891",
"source": "secalert@redhat.com"
},
{
"url": "https://access.redhat.com/errata/RHSA-2024:2047",
"source": "secalert@redhat.com"
},
{
"url": "https://access.redhat.com/security/cve/CVE-2024-1725",
"source": "secalert@redhat.com"

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-1753",
"sourceIdentifier": "secalert@redhat.com",
"published": "2024-03-18T15:15:41.170",
"lastModified": "2024-05-01T20:15:12.390",
"lastModified": "2024-05-08T02:15:09.163",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
@ -51,6 +51,10 @@
}
],
"references": [
{
"url": "https://access.redhat.com/errata/RHSA-2024:2049",
"source": "secalert@redhat.com"
},
{
"url": "https://access.redhat.com/errata/RHSA-2024:2055",
"source": "secalert@redhat.com"

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2024-1929",
"sourceIdentifier": "patrick@puiterwijk.org",
"published": "2024-05-08T02:15:09.300",
"lastModified": "2024-05-08T02:15:09.300",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Local Root Exploit via Configuration Dictionary in dnf5daemon-server\u00a0before 5.1.17 allows a malicious user to impact Confidentiality and Integrity via Configuration Dictionary.\n\nThere are issues with the D-Bus interface long before Polkit is invoked. The `org.rpm.dnf.v0.SessionManager.open_session` method takes a key/value map of configuration entries. A sub-entry in this map, placed under the \"config\" key, is another key/value map. The configuration values found in it will be forwarded as configuration overrides to the `libdnf5::Base` configuration.\u00a0\n\nPractically all libdnf5 configuration aspects can be influenced here. Already when opening the session via D-Bus, the libdnf5 will be initialized using these override configuration values. There is no sanity checking of the content of this \"config\" map, which is untrusted data.\u00a0It is possible to make the library loading a plug-in shared library under control of an unprivileged user, hence achieving root access.\u00a0\n\n"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "patrick@puiterwijk.org",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:N",
"attackVector": "LOCAL",
"attackComplexity": "HIGH",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.1,
"impactScore": 5.8
}
]
},
"weaknesses": [
{
"source": "patrick@puiterwijk.org",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-20"
}
]
}
],
"references": [
{
"url": "https://www.openwall.com/lists/oss-security/2024/03/04/2",
"source": "patrick@puiterwijk.org"
}
]
}

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2024-1930",
"sourceIdentifier": "patrick@puiterwijk.org",
"published": "2024-05-08T02:15:09.503",
"lastModified": "2024-05-08T02:15:09.503",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "No Limit on Number of Open Sessions / Bad Session Close Behaviour in dnf5daemon-server before 5.1.17 allows a malicious user to impact Availability via\u00a0No Limit on Number of Open Sessions.\n\nThere is no limit on how many sessions D-Bus clients may create using the `open_session()` D-Bus method.\u00a0For each session a thread is created in dnf5daemon-server. This spends a couple of hundred megabytes of memory in the process. Further connections will become impossible, likely because no more threads can be spawned by the D-Bus service.\n\n"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "patrick@puiterwijk.org",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.0,
"impactScore": 4.0
}
]
},
"weaknesses": [
{
"source": "patrick@puiterwijk.org",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-400"
}
]
}
],
"references": [
{
"url": "https://www.openwall.com/lists/oss-security/2024/03/04/2",
"source": "patrick@puiterwijk.org"
}
]
}

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2024-2746",
"sourceIdentifier": "secalert@redhat.com",
"published": "2024-05-08T02:15:09.677",
"lastModified": "2024-05-08T02:15:09.677",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Incomplete fix for CVE-2024-1929\n\nThe problem with CVE-2024-1929 was that the dnf5 D-Bus daemon accepted arbitrary configuration parameters from unprivileged users, which allowed a\nlocal root exploit by tricking the daemon into loading a user controlled \"plugin\". All of this happened before Polkit authentication was even started.\n\nThe dnf5 library code does not check whether non-root users control the directory in question.\u00a0\n\nOn one hand, this poses a Denial-of-Service attack vector by making the daemonoperate on a blocking file (e.g. named FIFO special file) or a very large file\nthat causes an out-of-memory situation (e.g. /dev/zero). On the other hand, this can be used to let the daemon process privileged files like /etc/shadow.\nThe file in question is parsed as an INI file. Error diagnostics resulting from parsing privileged files could cause information leaks, if these diagnostics\nare accessible to unprivileged users. In the case of libdnf5, no such user accessible diagnostics should exist, though.\n\nAlso, a local attacker can place a valid repository configuration file in this directory. This configuration file allows to specify\na plethora of additional configuration options. This makes various\u00a0additional code paths in libdnf5 accessible to the attacker.\u00a0\n"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "secalert@redhat.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.0,
"impactScore": 6.0
}
]
},
"weaknesses": [
{
"source": "secalert@redhat.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-20"
}
]
}
],
"references": [
{
"url": "https://www.openwall.com/lists/oss-security/2024/04/03/5",
"source": "secalert@redhat.com"
}
]
}

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2024-2860",
"sourceIdentifier": "sirt@brocade.com",
"published": "2024-05-08T02:15:09.873",
"lastModified": "2024-05-08T02:15:09.873",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "The PostgreSQL implementation in Brocade SANnav versions before 2.3.0a is vulnerable to an incorrect local authentication flaw. An attacker accessing the VM where the Brocade SANnav is installed can gain access to sensitive data inside the PostgreSQL database.\n "
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "sirt@brocade.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "sirt@brocade.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-306"
}
]
}
],
"references": [
{
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/24260",
"source": "sirt@brocade.com"
}
]
}

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2024-4162",
"sourceIdentifier": "product-security@gg.jp.panasonic.com",
"published": "2024-05-08T03:15:06.830",
"lastModified": "2024-05-08T03:15:06.830",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "A buffer error in Panasonic KW Watcher versions 1.00 through 2.83 may allow attackers malicious read access to memory."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "product-security@gg.jp.panasonic.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "LOW",
"baseScore": 4.4,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.8,
"impactScore": 2.5
}
]
},
"weaknesses": [
{
"source": "product-security@gg.jp.panasonic.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-119"
}
]
}
],
"references": [
{
"url": "https://www3.panasonic.biz/ac/e/fasys/software_info/eco/tol_kwwatcher.jsp",
"source": "product-security@gg.jp.panasonic.com"
}
]
}

View File

@ -0,0 +1,47 @@
{
"id": "CVE-2024-4393",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-05-08T03:15:07.020",
"lastModified": "2024-05-08T03:15:07.020",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "The Social Connect plugin for WordPress is vulnerable to authentication bypass in versions up to, and including, 1.2. This is due to insufficient verification on the OpenID server being supplied during the social login through the plugin. This makes it possible for unauthenticated attackers to log in as any existing user on the site, such as an administrator, if they have access to the email."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security@wordfence.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
"references": [
{
"url": "https://plugins.trac.wordpress.org/browser/social-connect/tags/1.2/openid/openid.php#L575",
"source": "security@wordfence.com"
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/2882d9dd-0c73-4c9a-99cb-d10900503103?source=cve",
"source": "security@wordfence.com"
}
]
}

View File

@ -0,0 +1,59 @@
{
"id": "CVE-2024-4418",
"sourceIdentifier": "secalert@redhat.com",
"published": "2024-05-08T03:15:07.203",
"lastModified": "2024-05-08T03:15:07.203",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "A race condition leading to a stack use-after-free flaw was found in libvirt. Due to a bad assumption in the virNetClientIOEventLoop() method, the `data` pointer to a stack-allocated virNetClientIOEventData structure ended up being used in the virNetClientIOEventFD callback while the data pointer's stack frame was concurrently being \"freed\" when returning from virNetClientIOEventLoop(). The 'virtproxyd' daemon can be used to trigger requests. If libvirt is configured with fine-grained access control, this issue, in theory, allows a user to escape their otherwise limited access. This flaw allows a local, unprivileged user to access virtproxyd without authenticating. Remote users would need to authenticate before they could access it."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "secalert@redhat.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 6.2,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.5,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "secalert@redhat.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-416"
}
]
}
],
"references": [
{
"url": "https://access.redhat.com/security/cve/CVE-2024-4418",
"source": "secalert@redhat.com"
},
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2278616",
"source": "secalert@redhat.com"
}
]
}

View File

@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update
```plain
2024-05-08T02:00:30.574861+00:00
2024-05-08T04:00:37.878680+00:00
```
### Most recent CVE Modification Timestamp synchronized with NVD
```plain
2024-05-08T01:15:06.667000+00:00
2024-05-08T03:15:07.203000+00:00
```
### Last Data Feed Release
@ -33,22 +33,30 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
### Total Number of included CVEs
```plain
248983
248990
```
### CVEs added in the last Commit
Recently added CVEs: `1`
Recently added CVEs: `7`
- [CVE-2024-4456](CVE-2024/CVE-2024-44xx/CVE-2024-4456.json) (`2024-05-08T01:15:06.667`)
- [CVE-2024-1929](CVE-2024/CVE-2024-19xx/CVE-2024-1929.json) (`2024-05-08T02:15:09.300`)
- [CVE-2024-1930](CVE-2024/CVE-2024-19xx/CVE-2024-1930.json) (`2024-05-08T02:15:09.503`)
- [CVE-2024-2746](CVE-2024/CVE-2024-27xx/CVE-2024-2746.json) (`2024-05-08T02:15:09.677`)
- [CVE-2024-2860](CVE-2024/CVE-2024-28xx/CVE-2024-2860.json) (`2024-05-08T02:15:09.873`)
- [CVE-2024-4162](CVE-2024/CVE-2024-41xx/CVE-2024-4162.json) (`2024-05-08T03:15:06.830`)
- [CVE-2024-4393](CVE-2024/CVE-2024-43xx/CVE-2024-4393.json) (`2024-05-08T03:15:07.020`)
- [CVE-2024-4418](CVE-2024/CVE-2024-44xx/CVE-2024-4418.json) (`2024-05-08T03:15:07.203`)
### CVEs modified in the last Commit
Recently modified CVEs: `2`
Recently modified CVEs: `4`
- [CVE-2024-2756](CVE-2024/CVE-2024-27xx/CVE-2024-2756.json) (`2024-05-08T01:15:06.470`)
- [CVE-2024-3096](CVE-2024/CVE-2024-30xx/CVE-2024-3096.json) (`2024-05-08T01:15:06.587`)
- [CVE-2023-3758](CVE-2023/CVE-2023-37xx/CVE-2023-3758.json) (`2024-05-08T03:15:06.710`)
- [CVE-2024-1139](CVE-2024/CVE-2024-11xx/CVE-2024-1139.json) (`2024-05-08T02:15:08.973`)
- [CVE-2024-1725](CVE-2024/CVE-2024-17xx/CVE-2024-1725.json) (`2024-05-08T02:15:09.067`)
- [CVE-2024-1753](CVE-2024/CVE-2024-17xx/CVE-2024-1753.json) (`2024-05-08T02:15:09.163`)
## Download and Usage

View File

@ -227205,7 +227205,7 @@ CVE-2023-37576,0,0,b3086c097e8f97ccae74b878d2a502ec848400a667c99182b03cba4819265
CVE-2023-37577,0,0,3d47904e6714d7a055f1c3c55b7d81ffcc7991c99e251b7d10413eaa6b52422a,2024-04-09T21:15:12.807000
CVE-2023-37578,0,0,ba12ca5aa2e270904d2e8b59157d3f65b05f5a4d93e555484e17817f5052ca06,2024-04-09T21:15:12.900000
CVE-2023-37579,0,0,162475d9c10c03bb62253b4c06df5b03f8c0200b6108cb5a121856967edaa5b2,2023-07-20T17:37:20.790000
CVE-2023-3758,0,0,229a122999f71ddb82e173f067760a36b370f323f77511bcb4b87e837efab586,2024-04-30T20:15:06.787000
CVE-2023-3758,0,1,478819eb698d7312ffba28a3108416f0242ad0415bfa391864f9a2cb90901517,2024-05-08T03:15:06.710000
CVE-2023-37580,0,0,bae9f92d653d361aeb909d5e42dce31c2da6a6bba3b212aa2530c8274e5b606d,2023-12-22T15:16:27.810000
CVE-2023-37581,0,0,98103a9a7ec0c92020dfa9a697e6c5df21ed2d932a7d784c6317de2f609cd32a,2023-11-07T04:17:00.163000
CVE-2023-37582,0,0,32e5b7f8ae6b98ea7fa4c9ee1081e939ae14653ee66f31f201bc834b4e2b62d2,2023-07-20T02:11:34.330000
@ -240267,7 +240267,7 @@ CVE-2024-1135,0,0,2f6bc90f330f2812b6ceb34e2fa1ad9c1c5eca9415bce0719ca3f92f74cd24
CVE-2024-1136,0,0,609070256c4defa988e1113275bf8273fe15f50574e00ed3dcfde13143e471cc,2024-02-28T14:06:45.783000
CVE-2024-1137,0,0,9f8c1cf74ca4778ab709faeea998997368a7f042480977a7d6535f2dd892d7f7,2024-03-13T12:33:51.697000
CVE-2024-1138,0,0,0bb26866b03e9dd351d8284004467140fe2cfdfbd72af071fda864e5a2dc9e58,2024-03-13T12:33:51.697000
CVE-2024-1139,0,0,5a8632d8e699ad73a3e650a4a3a6435992f88e55a8f960d9b670e3692791caa5,2024-04-26T09:15:09.103000
CVE-2024-1139,0,1,e929c5c35816c8625451a37472d283afb7d567c0dafe06141acf746c5795db95,2024-05-08T02:15:08.973000
CVE-2024-1140,0,0,113ab98fbbd3f38fc36026b5aef44eb4b38cd7d347ba07fcabb6b9d9a69118a5,2024-02-27T19:17:32.253000
CVE-2024-1141,0,0,2d32c65ed599159df83e8a47a1f55987e8e9877658103a494dc3a1f00162db73,2024-04-01T15:52:06.640000
CVE-2024-1142,0,0,00d2baa79f6b61708bb1dbc0a1a3ef8f1bea10f64fa60e391934eddcb51481c3,2024-03-21T12:58:51.093000
@ -240749,7 +240749,7 @@ CVE-2024-1719,0,0,bd92ffe7c3f4bf124004e532d326d3643bc62f549595f2a7817efea0dc7c18
CVE-2024-1720,0,0,5a5ae92be6fac7e3fb5aac9fbad05927fd3add77d067fc4c0b5a11a75c8da7c7,2024-03-07T13:52:27.110000
CVE-2024-1722,0,0,44f76876458eb58496685e90ceedacd781a70fa58f68fffc91c47d3fb5ef0258,2024-02-29T13:49:29.390000
CVE-2024-1723,0,0,6ede5956ec1f8bc932d476f2c9a22da838daca98409da5821be1a9704022149c,2024-03-13T18:15:58.530000
CVE-2024-1725,0,0,2b831655c37805b5d11b8fccbdef32ca54003b5ea78039a012ddccaea3f2f5c4,2024-04-26T20:15:07.310000
CVE-2024-1725,0,1,2b67489798d9737b91fd16a498376a5587f5568c79dfd7ba3525bea30ad52e10,2024-05-08T02:15:09.067000
CVE-2024-1726,0,0,d3bfaab416df86220192f6157913674e0f272ddcbb1b0c1818f7957f51ab4db2,2024-04-25T17:24:59.967000
CVE-2024-1727,0,0,a7ba950431c841d63e5eda97447121909cf0b94a0e0f2a68d97b3e6ce11f4afe,2024-04-16T12:15:09.843000
CVE-2024-1728,0,0,cc77f96c808327822a9f33d38543fe59887a1a70be257d5713ef1082e9fb55b5,2024-04-10T19:49:51.183000
@ -240772,7 +240772,7 @@ CVE-2024-1749,0,0,333be4b88192e2e4c430588986a6c08bc8d18a961724558cd63d34341f9df2
CVE-2024-1750,0,0,e3bbc65ee5131d172a658128bbf945392e55621bf205fc2f71228c3e1b5f20b2,2024-04-11T01:24:30.157000
CVE-2024-1751,0,0,7aa616bef5e27ed13b371ce9dacd4080fc5ffa6154b1e45a0ce11f0de1f1df9e,2024-03-13T18:15:58.530000
CVE-2024-1752,0,0,3b691eb63c202be2eb926d4c3601a8229a1e699fd5812dcaec474adfd9c6bd05,2024-04-08T18:48:40.217000
CVE-2024-1753,0,0,fe00dc6d1956d172d0cc8a106c36d713c83fe2af349aebc005f2856536dd88ce,2024-05-01T20:15:12.390000
CVE-2024-1753,0,1,827aea31816d1c11886eb1bbd251d3bb24db0d96d2de7a5a285803b4b577852e,2024-05-08T02:15:09.163000
CVE-2024-1754,0,0,bb1af71458eba5bdfb6b90e382cbcddd60b96fb9bcb7aef4fa5483aa2a532c8d,2024-04-15T13:15:31.997000
CVE-2024-1755,0,0,c4c00c2e9213cda2dc6708362bc52ae20ba1dfc3c894f2897c9375b229ad840b,2024-04-15T13:15:31.997000
CVE-2024-1756,0,0,62e52d79aae78b309e4cd5e4ccf86fb8ee93e230c568d1d0b7a63a1cf36aba4f,2024-04-24T13:39:42.883000
@ -240920,6 +240920,8 @@ CVE-2024-1925,0,0,b15aa98b0592f9242d13916a80688f3bbf7b6d60030fd101a2b9d466d1a26c
CVE-2024-1926,0,0,8773a8337f80e596bf6f4e6c01da1a317fcd71717c4b5292efe100c03e77fc15,2024-04-11T01:24:34.163000
CVE-2024-1927,0,0,272489f4addf45cf6bb38d4183c6459b672282a671714ea158eabbc383424da2,2024-04-11T01:24:34.247000
CVE-2024-1928,0,0,ce94ec63205e6aa85b5a559496f823814c1cb4c8bba251a028dd87a071a77e46,2024-04-11T01:24:34.327000
CVE-2024-1929,1,1,0392b82d0f265a8dcf3cdd3b3f9bf71affd471208318a49b9417c67306f3a299,2024-05-08T02:15:09.300000
CVE-2024-1930,1,1,170dafc3f2447a1404a924c6101bbb942973e6def25914da296f6a3a2c6a03cb,2024-05-08T02:15:09.503000
CVE-2024-1931,0,0,e71f7a88f68b5d3702fc1141e5fbdcf00d33a90e3791bbd349a9e1c6ddf3f008,2024-04-28T04:15:11
CVE-2024-1932,0,0,dfd6617a73caabfbfba2b5ee899213931b787c71ad6a77e11bae9543ad134a99,2024-02-28T14:06:45.783000
CVE-2024-1933,0,0,22dab3b8ed3dbdec751e3b3ea3557732635c7de83916428fa2e460c959fedb1c,2024-03-26T17:09:53.043000
@ -245279,6 +245281,7 @@ CVE-2024-27453,0,0,cd1a7b85d4587bfefcd89bf35294964a1d211509b3fabcc9d2dccae653d97
CVE-2024-27454,0,0,6d3a09532b89ef204254e66da503964dcbafd450b5bdda0990f449d144c8e54b,2024-02-26T16:32:25.577000
CVE-2024-27455,0,0,2d941179924c9f77cb732b35f1b7b9f5792b70ca51de1e84f09167eb77852176,2024-03-26T16:15:12.263000
CVE-2024-27456,0,0,3292722b93148b4ab52923fa8e4498babe5b306f79794afb1b6b9f9d803c4911,2024-02-26T16:32:25.577000
CVE-2024-2746,1,1,749213e44b789342a3993c882fa4be4d27a7fc77740431142b6c1eb4e91e858a,2024-05-08T02:15:09.677000
CVE-2024-27462,0,0,ffc1613a8162349f9e85ee9ce86cbdc5073a2092a76bc9fd14c2d891290e403c,2024-04-14T23:15:45.830000
CVE-2024-27474,0,0,eedd7f52a8e754286d0994212e940bbab5a78ce0f631ba173f8be2320f55c67f,2024-04-10T19:49:51.183000
CVE-2024-27476,0,0,8cccfbd88a289b73ae2a82f1969e7e11b3256be620bf6a323e970ad5fee54963,2024-04-10T19:49:51.183000
@ -245303,7 +245306,7 @@ CVE-2024-27537,0,0,19c23a8ace2b9fa0f5b0c7f5ae887d2217327b1705c43697ebd005f0fa005
CVE-2024-2754,0,0,1fcd4415dd3a76ae4bfdcbebc23b2eb9c440a110a989dd99eeab14538d1df9f4,2024-04-11T01:25:35.173000
CVE-2024-27558,0,0,7153680518d63c7932305620ccfbd7ee5fef9d259b5e0f563f6375bef36d085e,2024-03-01T22:22:25.913000
CVE-2024-27559,0,0,df9ea8940256beed3a439c54dc14f3a2ff3269b9257ecf55b0d7cb1c085a0238,2024-03-01T22:22:25.913000
CVE-2024-2756,0,1,df93717a7225ef0bdf3a267d333e1f6ce779c2fd34635a961f3e5da29fa8d53d,2024-05-08T01:15:06.470000
CVE-2024-2756,0,0,df93717a7225ef0bdf3a267d333e1f6ce779c2fd34635a961f3e5da29fa8d53d,2024-05-08T01:15:06.470000
CVE-2024-27561,0,0,6eefe1444b42138366028087602d71a400d94cfb2285aea30a4a52e3e99f8491,2024-03-05T18:50:18.333000
CVE-2024-27563,0,0,c70b4ac1004b8f01005bd67665b89f1a49dcd8b48b0e020f5d345a7e89fd281c,2024-03-05T18:50:18.333000
CVE-2024-27564,0,0,cfbb7ee5af0b2da089da0b8003ae338a360a5aa7de72516445a54c273e06a2cc,2024-03-05T18:50:18.333000
@ -245816,6 +245819,7 @@ CVE-2024-28589,0,0,0bbfba634be0a6220fb48d12550a4d1e9192f3d277848f34860717c51da56
CVE-2024-2859,0,0,815e8dcdbaea58414fdcd79cdf68569eba0b4de72a6cab4f785b8ad0b30ed870,2024-04-29T12:42:03.667000
CVE-2024-28593,0,0,12e50d1047d9408aca5b77d1096e4a71cda0fba8e4dc35d15cd483b7f871d0cb,2024-04-11T01:25:10.400000
CVE-2024-28595,0,0,542734c5d7a6316ed6be596eecae4717d67621271c4b97cd461c76a709543cb8,2024-03-20T13:00:16.367000
CVE-2024-2860,1,1,448b669352a7c248f83c8e78ab3a846efca2216ebdaa98d4387ddcf2c4e50e12,2024-05-08T02:15:09.873000
CVE-2024-28613,0,0,bda4150312b2b3b79a305a8c0a3aeb6013ca159f1baaa84b69f3b052dab94ea7,2024-04-24T13:39:42.883000
CVE-2024-2862,0,0,a714f5e8cb944f65576648fcdb042cca021906895d812cc8cb0301d4fdfba94b,2024-03-25T13:47:14.087000
CVE-2024-28623,0,0,972befedc73e4c4f8bdd2f8c4cf61d42fcf307bb5ef2beaaeb5c62226e79d63e,2024-03-13T12:33:51.697000
@ -247032,7 +247036,7 @@ CVE-2024-30950,0,0,992550aa16b7b69040c27b7eadb42b4babd9ce9c185610db0008bbada9865
CVE-2024-30951,0,0,64c319e5130efe1148872b6efd54e0b74d19e18724bc83608b600a523ab1d0cb,2024-04-17T20:08:21.887000
CVE-2024-30952,0,0,45f3818300706503aa11d9788e132ab06eaeaa5db69128a0c2116be2f61adacf,2024-04-17T15:31:50.160000
CVE-2024-30953,0,0,b6048a3223dd71969afb665512f3c96be52d96e721358fb67ff9cf9a8128e438,2024-04-17T20:08:21.887000
CVE-2024-3096,0,1,0437ef212cdf23cd25b7eae6af90631464ac68b48a660be114c7737d92ecd64c,2024-05-08T01:15:06.587000
CVE-2024-3096,0,0,0437ef212cdf23cd25b7eae6af90631464ac68b48a660be114c7737d92ecd64c,2024-05-08T01:15:06.587000
CVE-2024-30965,0,0,0e44dd5d951a25ac3e8873a32678a3145da47d1060cb5312576a9c0471b643ad,2024-04-02T18:12:16.283000
CVE-2024-3097,0,0,34b222095b4c58e8686826c73c47f391fd247710053df9aaf322e019da7a6c42,2024-04-26T15:56:40.820000
CVE-2024-30973,0,0,60d233d75a25952277335789c679aa444f3525d6e5b6af0f3b5901b26ae4a555,2024-05-07T13:39:32.710000
@ -248834,6 +248838,7 @@ CVE-2024-4142,0,0,6297707db3df670a282f3d4e6720e4836d7467220b5fcc108ef053e6a6308f
CVE-2024-4156,0,0,08ed32a025121f03b8a02946b754b432972d33916a48e29ae90b57a1d08fdf80,2024-05-02T18:00:37.360000
CVE-2024-4159,0,0,cf0daf8ecd317ce4288e8a4812364c59b3b10d10c0c5945533667d40be8a71fc,2024-04-25T23:15:47.087000
CVE-2024-4161,0,0,8c35858b76cabcd8cf78ed758e4c9d58e5dffa2b20a32ec25b41a43a372b2218,2024-04-25T13:18:13.537000
CVE-2024-4162,1,1,269fc7eb936ae8f57585fc57b26ad7afae2e8f2de25ba9e32b4ebfb1b7883d47,2024-05-08T03:15:06.830000
CVE-2024-4163,0,0,0abae06321832430d51e94179291aa50a40ff5a5f25f762f5290e51ebf608907,2024-04-26T12:58:17.720000
CVE-2024-4164,0,0,47d42509563ff118e80fb01ab32da3a01e6b310e48a92c3ae5fc79acb90ef6df,2024-04-25T13:18:02.660000
CVE-2024-4165,0,0,2b8667aaf2a68631633b130c7e16d5d65b2d5175fcfbf6deaef662c04ff84691,2024-04-25T13:18:02.660000
@ -248913,11 +248918,13 @@ CVE-2024-4348,0,0,58c372bcfdfd13a40dcad9095bf019969258123c09df37a486f5ad5f3ede8e
CVE-2024-4349,0,0,f37ccdd1092fa74fa2c30a0fd9ee697b77c3abde136f8542413ea2c7851c4bb8,2024-05-06T14:15:08.090000
CVE-2024-4368,0,0,0ee02ebde276d817508f5495294b3429c463a1f4241660388e0c329992e72be6,2024-05-04T02:15:06.853000
CVE-2024-4369,0,0,ab5992320463150d25768d540495632f3cea0e672e96fca10ae18e5fed17e7b3,2024-05-02T03:15:15.027000
CVE-2024-4393,1,1,8c005f7adb3f114a27849f1e6d18368799332a4035d75d420674cd95c24a8c50,2024-05-08T03:15:07.020000
CVE-2024-4405,0,0,c1f36263ba5841514dcf823ce87455ea826983b04201750caf275a7578687d86,2024-05-02T18:00:37.360000
CVE-2024-4406,0,0,24efbd07edfc7f89a7b1e694cb4faff02b108244486a9e17a0ab6aa554d1cf0e,2024-05-02T18:00:37.360000
CVE-2024-4418,1,1,f2220911b8624010425347d9a1653d455051f3bf8146c7f110ccbc907ac0cd8d,2024-05-08T03:15:07.203000
CVE-2024-4433,0,0,a671ce2518271e49fdeb5cf5eaca489e751e352fe28902a9e3a1500395ee9006,2024-05-02T18:00:37.360000
CVE-2024-4439,0,0,a04aad1631b3777470b58d8a82d09407f3c5e63b2eeaeebb2f2cdb5c6b9c3ede,2024-05-03T12:48:41.067000
CVE-2024-4456,1,1,acb616f16515f850a9aaa50e605887b7bf8c45956f6fe6dfe1c1dd84ae730e5c,2024-05-08T01:15:06.667000
CVE-2024-4456,0,0,acb616f16515f850a9aaa50e605887b7bf8c45956f6fe6dfe1c1dd84ae730e5c,2024-05-08T01:15:06.667000
CVE-2024-4461,0,0,7ca39b07094b9badd740410c9408db11fe23a2c272b945e9ccd422d33b255a72,2024-05-03T12:48:41.067000
CVE-2024-4466,0,0,362cf34285ea8ef22c0a4fe2e518499aaa4b8f79660cea3c0f457b3e58b9b244,2024-05-03T12:48:41.067000
CVE-2024-4491,0,0,d21d67654af00d0e8aec399506b941096b080e93fc90b1b79355cb50deb5ffe8,2024-05-06T12:44:56.377000

Can't render this file because it is too large.