Auto-Update: 2024-04-06T06:00:37.742939+00:00

This commit is contained in:
cad-safe-bot 2024-04-06 06:03:27 +00:00
parent 86dc006c4a
commit 83555fc2ff
11 changed files with 573 additions and 11 deletions

View File

@ -0,0 +1,47 @@
{
"id": "CVE-2024-1385",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-04-06T04:15:10.747",
"lastModified": "2024-04-06T04:15:10.747",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "The WP-Stateless \u2013 Google Cloud Storage plugin for WordPress is vulnerable to unauthorized loss of data due to a missing capability check on the dismiss_notices() function in all versions up to, and including, 3.4.0. This makes it possible for authenticated attackers, with subscriber-level access and above, to update arbitrary option values to the current time, which may completely take a site offline."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security@wordfence.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "HIGH",
"baseScore": 7.1,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 4.2
}
]
},
"references": [
{
"url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3035169%40wp-stateless&new=3035169%40wp-stateless&sfp_email=&sfph_mail=",
"source": "security@wordfence.com"
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/9a475017-ef45-4614-bdc6-ddd619b8caf3?source=cve",
"source": "security@wordfence.com"
}
]
}

View File

@ -0,0 +1,63 @@
{
"id": "CVE-2024-21506",
"sourceIdentifier": "report@snyk.io",
"published": "2024-04-06T05:15:07.210",
"lastModified": "2024-04-06T05:15:07.210",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Versions of the package pymongo before 4.6.3 are vulnerable to Out-of-bounds Read in the bson module. Using the crafted payload the attacker could force the parser to deserialize unmanaged memory. The parser tries to interpret bytes next to buffer and throws an exception with string. If the following bytes are not printable UTF-8 the parser throws an exception with a single byte."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "report@snyk.io",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:L",
"attackVector": "LOCAL",
"attackComplexity": "HIGH",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW",
"baseScore": 5.2,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.0,
"impactScore": 3.7
}
]
},
"weaknesses": [
{
"source": "report@snyk.io",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-125"
}
]
}
],
"references": [
{
"url": "https://gist.github.com/keltecc/62a7c2bf74a997d0a7b48a0ff3853a03",
"source": "report@snyk.io"
},
{
"url": "https://github.com/mongodb/mongo-python-driver/commit/56b6b6dbc267d365d97c037082369dabf37405d2",
"source": "report@snyk.io"
},
{
"url": "https://security.snyk.io/vuln/SNYK-PYTHON-PYMONGO-6370597",
"source": "report@snyk.io"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2024-2444",
"sourceIdentifier": "contact@wpscan.com",
"published": "2024-04-06T05:15:07.500",
"lastModified": "2024-04-06T05:15:07.500",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "The Inline Related Posts WordPress plugin before 3.5.0 does not sanitise and escape some of its settings, which could allow high privilege users such as Admin to perform Cross-Site Scripting attacks even when unfiltered_html is disallowed"
}
],
"metrics": {},
"references": [
{
"url": "https://wpscan.com/vulnerability/214e5fd7-8684-418a-b67d-60b1dcf11a48/",
"source": "contact@wpscan.com"
}
]
}

View File

@ -0,0 +1,47 @@
{
"id": "CVE-2024-2656",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-04-06T04:15:11.030",
"lastModified": "2024-04-06T04:15:11.030",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "The Email Subscribers by Icegram Express \u2013 Email Marketing, Newsletters, Automation for WordPress & WooCommerce plugin for WordPress is vulnerable to Stored Cross-Site Scripting via a CSV import in all versions up to, and including, 5.7.14 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with administrator-level permissions and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. This only affects multi-site installations and installations where unfiltered_html has been disabled."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security@wordfence.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 4.4,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.3,
"impactScore": 2.7
}
]
},
"references": [
{
"url": "https://plugins.trac.wordpress.org/changeset/3063438/email-subscribers/trunk/lite/includes/classes/class-es-import-subscribers.php",
"source": "security@wordfence.com"
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/159ddb06-e7c4-4279-a8a1-c78a02e15891?source=cve",
"source": "security@wordfence.com"
}
]
}

View File

@ -0,0 +1,47 @@
{
"id": "CVE-2024-2950",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-04-06T04:15:11.463",
"lastModified": "2024-04-06T04:15:11.463",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "The BoldGrid Easy SEO \u2013 Simple and Effective SEO plugin for WordPress is vulnerable to Information Exposure in all versions up to, and including, 1.6.14 via meta information (og:description) This makes it possible for unauthenticated attackers to view the first 130 characters of a password protected post which can contain sensitive information."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security@wordfence.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 3.9,
"impactScore": 1.4
}
]
},
"references": [
{
"url": "https://plugins.trac.wordpress.org/browser/boldgrid-easy-seo/tags/1.6.15/includes/class-boldgrid-seo-admin.php?rev=3064911",
"source": "security@wordfence.com"
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/d502e617-a59f-4385-b050-3702a1b1ed7e?source=cve",
"source": "security@wordfence.com"
}
]
}

View File

@ -0,0 +1,47 @@
{
"id": "CVE-2024-3216",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-04-06T04:15:11.813",
"lastModified": "2024-04-06T04:15:11.813",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "The WooCommerce PDF Invoices, Packing Slips, Delivery Notes and Shipping Labels plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the wt_pklist_reset_settings() function in all versions up to, and including, 4.4.2. This makes it possible for unauthenticated attackers to reset all of the plugin's settings."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security@wordfence.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 5.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 3.9,
"impactScore": 1.4
}
]
},
"references": [
{
"url": "https://plugins.trac.wordpress.org/browser/print-invoices-packing-slip-labels-for-woocommerce/trunk/admin/class-wf-woocommerce-packing-list-admin.php#L4262",
"source": "security@wordfence.com"
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/aeac9c4a-0754-4fb1-bf11-0cd8483451b6?source=cve",
"source": "security@wordfence.com"
}
]
}

View File

@ -0,0 +1,92 @@
{
"id": "CVE-2024-3358",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-04-06T04:15:12.070",
"lastModified": "2024-04-06T04:15:12.070",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability classified as problematic was found in SourceCodester Aplaya Beach Resort Online Reservation System 1.0. This vulnerability affects unknown code of the file /index.php. The manipulation of the argument to leads to cross site scripting. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. VDB-259462 is the identifier assigned to this vulnerability."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 3.5,
"baseSeverity": "LOW"
},
"exploitabilityScore": 2.1,
"impactScore": 1.4
}
],
"cvssMetricV2": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:S/C:N/I:P/A:N",
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "SINGLE",
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"availabilityImpact": "NONE",
"baseScore": 4.0
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 8.0,
"impactScore": 2.9,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://github.com/qqqyc/vlun1/blob/main/Aplaya-Beach-Resort-Online-Reservation-System-12.md",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?ctiid.259462",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?id.259462",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?submit.310229",
"source": "cna@vuldb.com"
}
]
}

View File

@ -0,0 +1,92 @@
{
"id": "CVE-2024-3359",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-04-06T04:15:12.503",
"lastModified": "2024-04-06T04:15:12.503",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability, which was classified as critical, has been found in SourceCodester Online Library System 1.0. This issue affects some unknown processing of the file admin/login.php. The manipulation of the argument user_email leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-259463."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW",
"baseScore": 7.3,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.4
}
],
"cvssMetricV2": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5
},
"baseSeverity": "HIGH",
"exploitabilityScore": 10.0,
"impactScore": 6.4,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"references": [
{
"url": "https://github.com/thisissuperann/Vul/blob/main/Online-Library-System-01",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?ctiid.259463",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?id.259463",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?submit.310423",
"source": "cna@vuldb.com"
}
]
}

View File

@ -0,0 +1,92 @@
{
"id": "CVE-2024-3360",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-04-06T05:15:07.550",
"lastModified": "2024-04-06T05:15:07.550",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability, which was classified as critical, was found in SourceCodester Online Library System 1.0. Affected is an unknown function of the file admin/books/index.php. The manipulation of the argument id leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-259464."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW",
"baseScore": 7.3,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.4
}
],
"cvssMetricV2": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5
},
"baseSeverity": "HIGH",
"exploitabilityScore": 10.0,
"impactScore": 6.4,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"references": [
{
"url": "https://github.com/thisissuperann/Vul/blob/main/Online-Library-System-02",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?ctiid.259464",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?id.259464",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?submit.310424",
"source": "cna@vuldb.com"
}
]
}

View File

@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update
```plain
2024-04-06T04:00:38.666720+00:00
2024-04-06T06:00:37.742939+00:00
```
### Most recent CVE Modification Timestamp synchronized with NVD
```plain
2024-04-06T03:15:08.103000+00:00
2024-04-06T05:15:07.550000+00:00
```
### Last Data Feed Release
@ -33,22 +33,28 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
### Total Number of included CVEs
```plain
244260
244269
```
### CVEs added in the last Commit
Recently added CVEs: `2`
Recently added CVEs: `9`
- [CVE-2024-1994](CVE-2024/CVE-2024-19xx/CVE-2024-1994.json) (`2024-04-06T02:15:07.493`)
- [CVE-2024-3245](CVE-2024/CVE-2024-32xx/CVE-2024-3245.json) (`2024-04-06T03:15:08.103`)
- [CVE-2024-1385](CVE-2024/CVE-2024-13xx/CVE-2024-1385.json) (`2024-04-06T04:15:10.747`)
- [CVE-2024-21506](CVE-2024/CVE-2024-215xx/CVE-2024-21506.json) (`2024-04-06T05:15:07.210`)
- [CVE-2024-2444](CVE-2024/CVE-2024-24xx/CVE-2024-2444.json) (`2024-04-06T05:15:07.500`)
- [CVE-2024-2656](CVE-2024/CVE-2024-26xx/CVE-2024-2656.json) (`2024-04-06T04:15:11.030`)
- [CVE-2024-2950](CVE-2024/CVE-2024-29xx/CVE-2024-2950.json) (`2024-04-06T04:15:11.463`)
- [CVE-2024-3216](CVE-2024/CVE-2024-32xx/CVE-2024-3216.json) (`2024-04-06T04:15:11.813`)
- [CVE-2024-3358](CVE-2024/CVE-2024-33xx/CVE-2024-3358.json) (`2024-04-06T04:15:12.070`)
- [CVE-2024-3359](CVE-2024/CVE-2024-33xx/CVE-2024-3359.json) (`2024-04-06T04:15:12.503`)
- [CVE-2024-3360](CVE-2024/CVE-2024-33xx/CVE-2024-3360.json) (`2024-04-06T05:15:07.550`)
### CVEs modified in the last Commit
Recently modified CVEs: `1`
Recently modified CVEs: `0`
- [CVE-2024-3209](CVE-2024/CVE-2024-32xx/CVE-2024-3209.json) (`2024-04-06T03:15:07.983`)
## Download and Usage

View File

@ -239099,6 +239099,7 @@ CVE-2024-1380,0,0,a6643d22691040d519e55989c30cc282c581b968e343a9ffa704d3b3b4093b
CVE-2024-1381,0,0,d91e8a30b8be52d3f20fae315772163054b248740b5446a92a5d7400055357f3,2024-03-05T13:41:01.900000
CVE-2024-1382,0,0,2a91cda82e6eccbb12479004f1cab52cf9c7a68d5341c41e9ea2a1161aafd11d,2024-03-07T13:52:27.110000
CVE-2024-1383,0,0,9b7f3b63a5060d2ec2114b4c1750cf327ef7ed2270b46ed8e25ed7e6ce34b642,2024-03-13T18:15:58.530000
CVE-2024-1385,1,1,d24637b7ae6ec561f36894345a5c912abcd74360897163ee3f5c43f5b644ee21,2024-04-06T04:15:10.747000
CVE-2024-1388,0,0,a64ad787329a1a90b9d619f8ebf265bcdd5478117890b0948e19434b66711749,2024-02-28T14:06:45.783000
CVE-2024-1389,0,0,226d878edb33aaeccb843dfb02fa51c12df5fa099ed0c545a3e0cbe9644a211e,2024-02-29T13:49:29.390000
CVE-2024-1390,0,0,71eb0c49e1915160a890c9df4d2040fa529dd6e699ca4bdcf3f6829a9c0e60ea,2024-02-29T13:49:29.390000
@ -239471,7 +239472,7 @@ CVE-2024-1986,0,0,3573e34f135546ed04633bd0d17cea080212de55551e8ab04d2e00c52e1a50
CVE-2024-1987,0,0,51b6353c7487197fcf85dba32dd0017998b1425a36ba707e32269bf4afb531af,2024-03-08T14:02:57.420000
CVE-2024-1989,0,0,e603d4bdfbac73448a418c09b573178507e96a797a5be54fa1a78504bbf887da,2024-03-06T15:18:08.093000
CVE-2024-1992,0,0,5414f0dcecaa73989b0a42a4479c3faccff7f0923e4cfe603f1f9c3c287083d8,2024-03-20T17:15:07.307000
CVE-2024-1994,1,1,2d320061e2c6e529463ce81ef236173e7a49dd141485fa7a01f610922097b56e,2024-04-06T02:15:07.493000
CVE-2024-1994,0,0,2d320061e2c6e529463ce81ef236173e7a49dd141485fa7a01f610922097b56e,2024-04-06T02:15:07.493000
CVE-2024-1995,0,0,941755b4b854fdf87f18ab79194bcc08291f96cbab42350512c28358afffef58,2024-03-20T13:00:16.367000
CVE-2024-1996,0,0,5966bad552d6bc038d1a2d91bc8f9a32839c685a6932cffdc232ba52d55e3b88,2024-03-13T18:15:58.530000
CVE-2024-1997,0,0,b02f2b8fcf27f075ede3d31ab90af2f1a113a308252f819da806cdcb7ece15d4,2024-03-13T18:15:58.530000
@ -240069,6 +240070,7 @@ CVE-2024-21502,0,0,4303e1ae1b6dcbd72e1c376c19ab8a2359e92d842fa95b6d253e62be71a35
CVE-2024-21503,0,0,dbde89ae4e130de7b3da2486efecec01760e430d7d72c91a7a50092dd8618341,2024-03-19T13:26:46
CVE-2024-21504,0,0,49e3dd2437933564763de1c9017a71fc9b864133b3b4959dcdb8b06a9a352074,2024-03-19T13:26:46
CVE-2024-21505,0,0,790ab171c9e46ac93718d1bb5680fe990f4ed1edc4d489f5e4dab09077e05267,2024-03-25T13:47:14.087000
CVE-2024-21506,1,1,49464276e60fcd34c863a66da1cf82d37758d497d1e222e815718c162a2f958d,2024-04-06T05:15:07.210000
CVE-2024-2151,0,0,18a6fcad8683189bc1efb506f6c521736ba6197d27ab556e14dde08640970095,2024-03-21T02:52:29.870000
CVE-2024-2152,0,0,310025f5ea8ce44d7a0a0b2b3eebc18ed40ff16bb94c0d195ab98727b21e2e8b,2024-03-21T02:52:29.957000
CVE-2024-2153,0,0,4fc2c1bd0729a4b4b5924182d6367224ebd43d77d2c89d30aad10d987c6cdb2a,2024-03-21T02:52:30.037000
@ -241374,6 +241376,7 @@ CVE-2024-24402,0,0,05bde6c2c908d6bd00d03e2f32a00232b16c7e0716c59c44c87ccc77dc0ed
CVE-2024-24407,0,0,4193bde31373fba07b9911bdf83cf058d1a88c50f8e538ed6dc5165a28a70be3,2024-03-29T12:45:02.937000
CVE-2024-2442,0,0,4a0108630272c9d1ae8cbd16d021c5a020f9f82cadb01d3a92c49cf60c8b3b5a,2024-03-20T13:00:16.367000
CVE-2024-2443,0,0,72183cadd70f38595a21379efb2f0e00cd3d95dbe7e44da788d1807f622cd6cc,2024-03-21T12:58:51.093000
CVE-2024-2444,1,1,90108671d071ce282a97c310520d66b331b06b9d9989a34b8d673b57fe7fca97,2024-04-06T05:15:07.500000
CVE-2024-2445,0,0,2f855bbcb84a342093922fd73320bfe19138d60313d23c629da4de19e559d727,2024-03-15T12:53:06.423000
CVE-2024-2446,0,0,42e5c66ebcf58bc3242675333cd3d5679a04b8d2c648c26027e5a47b9ff8b42a,2024-03-15T12:53:06.423000
CVE-2024-24468,0,0,2ffe0e787add87754da9d28139dd49fe0df5af62f9576796ac86e102fb215c8b,2024-02-07T22:03:09.897000
@ -242406,6 +242409,7 @@ CVE-2024-26542,0,0,84bcc676050237f7706e936cd8d9d490aa0a127cdccddbe7afe739c073267
CVE-2024-26548,0,0,7b31129407d10e539a4174451b23a0f83a48cdb246d6dd13af61036fdc95df1c,2024-03-01T14:04:26.010000
CVE-2024-26557,0,0,413b34482d1eed582f272b955524fa71f7b68414d25ad46ae764ef2e2b3412f9,2024-03-22T12:45:36.130000
CVE-2024-26559,0,0,32dd037e107446e11601c6ddb83598fc34f3ebdb48b667f29294eba708b9e4c1,2024-02-29T13:49:47.277000
CVE-2024-2656,1,1,6b1e617671c5db4410a66b02a7ae4562c59aef6d1d72bcdc3b2418b06c13ceed,2024-04-06T04:15:11.030000
CVE-2024-26566,0,0,e082212a38f258b5c22bdd7daa5a29191a5e851b4c959cb2f66848d27d20d8bb,2024-03-07T13:52:27.110000
CVE-2024-26577,0,0,eb994672bf510d158b4978f43b0d7e0594f22405d228a7c909ba4da4498cc451,2024-03-27T12:29:30.307000
CVE-2024-26578,0,0,631d617cd0985d9923eed32b0cb4b9e9025809830b6a3ca2ef1a468d4f2a7124,2024-02-22T19:07:27.197000
@ -243561,6 +243565,7 @@ CVE-2024-29477,0,0,5231aab2983543fdf491ab629db6bbcb71a18478e7074594e3d1100549f6a
CVE-2024-2948,0,0,3594bbd430dd5444695ca044dc4efc4195ce92c17c43c967ca88fadf4c9f5e69,2024-04-01T01:12:59.077000
CVE-2024-29489,0,0,281c97da696e2014734e05639dd64d47354e5c2b4bcf9f1b7827a4a4899ee03d,2024-03-29T12:45:02.937000
CVE-2024-29499,0,0,6d5bcd6ddf0ffffbb229032818f99219d3a96f2f060fbc36a33564f3ae345d5e,2024-03-22T19:02:10.300000
CVE-2024-2950,1,1,4490b094193c27c7b50356493c173985060b11fe58eb1177815e1eb668a30b5f,2024-04-06T04:15:11.463000
CVE-2024-2951,0,0,7025f71f619ebfb5f00b29e3d72fe62bb5f0ea0dbfe92a58b33e63352aa0779c,2024-03-27T12:29:41.530000
CVE-2024-29514,0,0,2d6d3d0a4ae4b5ae40dadfbf4537d707f35bed7e85002b6d4e3d8180d6408f0b,2024-04-02T18:12:16.283000
CVE-2024-29515,0,0,79c9f65757e49bdb19c4dcff88d6ba2d524b1951e790ac90d5ffb4f302abcf45,2024-03-26T12:55:05.010000
@ -244210,7 +244215,8 @@ CVE-2024-3203,0,0,697bde31fba6d3c5a0e2d11da403a2e3b16828faac086b66cd78b0527d17b9
CVE-2024-3204,0,0,a9dea1ca01b499632a34af3ee57c461ecd8a21787537da790c2ae8f833a61142,2024-04-03T12:38:04.840000
CVE-2024-3205,0,0,b2f3ceb1bf38a09a954460b526a18eba5a5a22a0c7181b9f1de158755c6153d4,2024-04-03T12:38:04.840000
CVE-2024-3207,0,0,5c9ae7819818cf69391317769652edafe7eb5058db1623e7c6299d6d13471791,2024-04-03T12:38:04.840000
CVE-2024-3209,0,1,cbfab2641f7deaa26fa0bc09801c52aa5b55dcac193d132dc1556c423a22c65d,2024-04-06T03:15:07.983000
CVE-2024-3209,0,0,cbfab2641f7deaa26fa0bc09801c52aa5b55dcac193d132dc1556c423a22c65d,2024-04-06T03:15:07.983000
CVE-2024-3216,1,1,2dc4fb4b2bb02dfb9b4c69bd5e9febd5fa358539ce9d22b80adb6f50c85f1961,2024-04-06T04:15:11.813000
CVE-2024-3217,0,0,4de075781ed27d9af99ed393e165df2d285dc08a6ed9934e378886c989fa51ff,2024-04-05T12:40:52.763000
CVE-2024-3218,0,0,2efa792f2f422ae3d499fd8bd729cdb1e057c75ae9cfbaccf7a66bc466210399,2024-04-03T12:38:04.840000
CVE-2024-3221,0,0,265e838721fb682684198a7086d104f84e57519a8c4d6ef772db38592eb6bf44,2024-04-03T12:38:04.840000
@ -244220,7 +244226,7 @@ CVE-2024-3224,0,0,df4c497061254d88e30845f005326a0e8dcc0160759089f479b7881ad8ceac
CVE-2024-3225,0,0,c811644d786446dc903ce63beb97b40688ffdfe279f9ae136fe25e53360310ab,2024-04-03T12:38:04.840000
CVE-2024-3226,0,0,0d9ebebedadf244922f8385228c3d640f57a5f4e2e40a7b8124aa06fa756c486,2024-04-03T12:38:04.840000
CVE-2024-3227,0,0,5e86de506c0356caace938eb3ddc76daf74ee07964bebbed2f3824e6fdb4ef31,2024-04-03T12:38:04.840000
CVE-2024-3245,1,1,f4ace3e27e90324ae2d6a62ba6dc26be58efe872e0e8b571a9ab725be446fd07,2024-04-06T03:15:08.103000
CVE-2024-3245,0,0,f4ace3e27e90324ae2d6a62ba6dc26be58efe872e0e8b571a9ab725be446fd07,2024-04-06T03:15:08.103000
CVE-2024-3247,0,0,095afc187e8f976bc1a2eaa79a4c0328aa3c3e2487a10203585d8616775f8a4d,2024-04-03T12:38:04.840000
CVE-2024-3248,0,0,65f6d4ddfc43ae235edf2e59fc9daa1f1d020439a4fa197a41a6ddd58e106004,2024-04-03T12:38:04.840000
CVE-2024-3250,0,0,2d6e4fa76cca7b8e01352ea4b54b7151a6b9e9608e9608dee225853dfeeb2f71,2024-04-04T22:15:09.350000
@ -244259,3 +244265,6 @@ CVE-2024-3354,0,0,d035bebbbe4ba20bd3a170fae23b0047b357c9ccbebf4d91c0e7d2d35e44b1
CVE-2024-3355,0,0,ca68600fd0628cb5ae79a1a70be90a2c45f3bd0e143e4bf60e7a607aceefa438,2024-04-05T21:15:09.800000
CVE-2024-3356,0,0,ba2a4323d3ef545405bc3e57d4d8fd5b2db7ed6b3db10c68e5aaa772d5c08f2c,2024-04-05T21:15:10.033000
CVE-2024-3357,0,0,b2df18286a35ae9917365c7ebbd57657afc4476a2e1c86e29f32309e79b4d063,2024-04-05T22:15:07.563000
CVE-2024-3358,1,1,ab01dabc23656440b3622c5007937546b313923d6095d4c2551b2566ba26e9b1,2024-04-06T04:15:12.070000
CVE-2024-3359,1,1,5a660a9bb906bcbec699f4b9a6978728fbbe08a520c355f924362a3191722f40,2024-04-06T04:15:12.503000
CVE-2024-3360,1,1,d06c422a19de6ea1e839ee38dfed0f550d0d98475308f312095f1fd62a5b8dfb,2024-04-06T05:15:07.550000

Can't render this file because it is too large.