Auto-Update: 2024-04-26T10:00:40.235804+00:00

This commit is contained in:
cad-safe-bot 2024-04-26 10:03:29 +00:00
parent 9b808f3884
commit 86c10041a9
67 changed files with 1431 additions and 107 deletions

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-32643",
"sourceIdentifier": "secalert@redhat.com",
"published": "2023-09-14T20:15:09.770",
"lastModified": "2023-09-20T14:32:32.347",
"vulnStatus": "Analyzed",
"lastModified": "2024-04-26T09:15:07.127",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@ -113,6 +113,10 @@
"tags": [
"Broken Link"
]
},
{
"url": "https://security.netapp.com/advisory/ntap-20240426-0005/",
"source": "secalert@redhat.com"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-32665",
"sourceIdentifier": "secalert@redhat.com",
"published": "2023-09-14T20:15:09.883",
"lastModified": "2023-11-27T14:15:07.820",
"lastModified": "2024-04-26T09:15:07.333",
"vulnStatus": "Modified",
"descriptions": [
{
@ -128,6 +128,10 @@
{
"url": "https://security.gentoo.org/glsa/202311-18",
"source": "secalert@redhat.com"
},
{
"url": "https://security.netapp.com/advisory/ntap-20240426-0006/",
"source": "secalert@redhat.com"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-41993",
"sourceIdentifier": "product-security@apple.com",
"published": "2023-09-21T19:15:11.660",
"lastModified": "2024-01-31T15:15:10.337",
"lastModified": "2024-04-26T09:15:07.533",
"vulnStatus": "Modified",
"cisaExploitAdd": "2023-09-25",
"cisaActionDue": "2023-10-16",
@ -150,6 +150,10 @@
"url": "https://security.gentoo.org/glsa/202401-33",
"source": "product-security@apple.com"
},
{
"url": "https://security.netapp.com/advisory/ntap-20240426-0004/",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/HT213940",
"source": "product-security@apple.com",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-44487",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-10-10T14:15:10.883",
"lastModified": "2024-02-02T15:40:23.610",
"vulnStatus": "Analyzed",
"lastModified": "2024-04-26T09:15:07.677",
"vulnStatus": "Modified",
"cisaExploitAdd": "2023-10-10",
"cisaActionDue": "2023-10-31",
"cisaRequiredAction": "Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.",
@ -3886,6 +3886,10 @@
"Third Party Advisory"
]
},
{
"url": "https://security.netapp.com/advisory/ntap-20240426-0007/",
"source": "cve@mitre.org"
},
{
"url": "https://security.paloaltonetworks.com/CVE-2023-44487",
"source": "cve@mitre.org",

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-4408",
"sourceIdentifier": "security-officer@isc.org",
"published": "2024-02-13T14:15:45.253",
"lastModified": "2024-03-04T03:15:06.087",
"lastModified": "2024-04-26T09:15:08.727",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
@ -62,6 +62,10 @@
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZDZFMEKQTZ4L7RY46FCENWFB5MDT263R/",
"source": "security-officer@isc.org"
},
{
"url": "https://security.netapp.com/advisory/ntap-20240426-0001/",
"source": "security-officer@isc.org"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-5679",
"sourceIdentifier": "security-officer@isc.org",
"published": "2024-02-13T14:15:45.677",
"lastModified": "2024-03-04T03:15:06.680",
"lastModified": "2024-04-26T09:15:08.843",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
@ -62,6 +62,10 @@
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZDZFMEKQTZ4L7RY46FCENWFB5MDT263R/",
"source": "security-officer@isc.org"
},
{
"url": "https://security.netapp.com/advisory/ntap-20240426-0002/",
"source": "security-officer@isc.org"
}
]
}

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2023-6095",
"sourceIdentifier": "fc9afe74-3f80-4fb7-a313-e6f036a89882",
"published": "2024-04-26T08:15:11.327",
"lastModified": "2024-04-26T08:15:11.327",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "\nVladimir Kononovich, a Security Researcher has found a flaw that allows for a remote code execution on the DVR. An attacker could inject malicious HTTP headers into request packets to execute arbitrary code. The manufacturer has released patch firmware for the flaw, please refer to the manufacturer's report for details and workarounds.\n\n"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "fc9afe74-3f80-4fb7-a313-e6f036a89882",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.9,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.2,
"impactScore": 6.0
}
]
},
"weaknesses": [
{
"source": "fc9afe74-3f80-4fb7-a313-e6f036a89882",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-121"
}
]
}
],
"references": [
{
"url": "https://www.hanwhavision.com/wp-content/uploads/2024/04/NVR-DVR-Vulnerability-Report-CVE-2023-6095-6096.pdf",
"source": "fc9afe74-3f80-4fb7-a313-e6f036a89882"
}
]
}

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2023-6096",
"sourceIdentifier": "fc9afe74-3f80-4fb7-a313-e6f036a89882",
"published": "2024-04-26T08:15:11.583",
"lastModified": "2024-04-26T08:15:11.583",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "\nVladimir Kononovich, a Security Researcher has found a flaw that using a inappropriate encryption logic on the DVR. firmware encryption is broken and allows to decrypt. The manufacturer has released patch firmware for the flaw, please refer to the manufacturer's report for details and workarounds.\n\n"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "fc9afe74-3f80-4fb7-a313-e6f036a89882",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "HIGH",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.4,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.4,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "fc9afe74-3f80-4fb7-a313-e6f036a89882",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-668"
}
]
}
],
"references": [
{
"url": "https://www.hanwhavision.com/wp-content/uploads/2024/04/NVR-DVR-Vulnerability-Report-CVE-2023-6095-6096.pdf",
"source": "fc9afe74-3f80-4fb7-a313-e6f036a89882"
}
]
}

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2023-6116",
"sourceIdentifier": "fc9afe74-3f80-4fb7-a313-e6f036a89882",
"published": "2024-04-26T08:15:11.797",
"lastModified": "2024-04-26T08:15:11.797",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "\nTeam ENVY, a Security Research TEAM has found a flaw that allows for a remote code execution on the camera. An attacker could inject malicious into http request packets to execute arbitrary code. The manufacturer has released patch firmware for the flaw, please refer to the manufacturer's report for details and workarounds.\n\n"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "fc9afe74-3f80-4fb7-a313-e6f036a89882",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.9,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.2,
"impactScore": 6.0
}
]
},
"weaknesses": [
{
"source": "fc9afe74-3f80-4fb7-a313-e6f036a89882",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-121"
}
]
}
],
"references": [
{
"url": "https://www.hanwhavision.com/wp-content/uploads/2024/04/NVR-DVR-Vulnerability-Report-CVE-2023-6116.pdf",
"source": "fc9afe74-3f80-4fb7-a313-e6f036a89882"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-6129",
"sourceIdentifier": "openssl-security@openssl.org",
"published": "2024-01-09T17:15:12.147",
"lastModified": "2024-02-16T13:15:09.910",
"lastModified": "2024-04-26T09:15:08.910",
"vulnStatus": "Modified",
"descriptions": [
{
@ -107,6 +107,14 @@
"url": "https://security.netapp.com/advisory/ntap-20240216-0009/",
"source": "openssl-security@openssl.org"
},
{
"url": "https://security.netapp.com/advisory/ntap-20240426-0008/",
"source": "openssl-security@openssl.org"
},
{
"url": "https://security.netapp.com/advisory/ntap-20240426-0013/",
"source": "openssl-security@openssl.org"
},
{
"url": "https://www.openssl.org/news/secadv/20240109.txt",
"source": "openssl-security@openssl.org",

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-0853",
"sourceIdentifier": "2499f714-1537-4658-8207-48ae4bb9eae9",
"published": "2024-02-03T14:15:50.850",
"lastModified": "2024-03-07T17:15:12.657",
"lastModified": "2024-04-26T09:15:09.023",
"vulnStatus": "Modified",
"descriptions": [
{
@ -93,6 +93,10 @@
{
"url": "https://security.netapp.com/advisory/ntap-20240307-0004/",
"source": "2499f714-1537-4658-8207-48ae4bb9eae9"
},
{
"url": "https://security.netapp.com/advisory/ntap-20240426-0009/",
"source": "2499f714-1537-4658-8207-48ae4bb9eae9"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-1139",
"sourceIdentifier": "secalert@redhat.com",
"published": "2024-04-25T17:15:47.650",
"lastModified": "2024-04-25T17:24:59.967",
"lastModified": "2024-04-26T09:15:09.103",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
@ -47,6 +47,10 @@
}
],
"references": [
{
"url": "https://access.redhat.com/errata/RHSA-2024:1887",
"source": "secalert@redhat.com"
},
{
"url": "https://access.redhat.com/security/cve/CVE-2024-1139",
"source": "secalert@redhat.com"

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-1753",
"sourceIdentifier": "secalert@redhat.com",
"published": "2024-03-18T15:15:41.170",
"lastModified": "2024-04-03T02:15:07.693",
"lastModified": "2024-04-26T08:15:12.060",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
@ -51,6 +51,18 @@
}
],
"references": [
{
"url": "https://access.redhat.com/errata/RHSA-2024:2055",
"source": "secalert@redhat.com"
},
{
"url": "https://access.redhat.com/errata/RHSA-2024:2064",
"source": "secalert@redhat.com"
},
{
"url": "https://access.redhat.com/errata/RHSA-2024:2066",
"source": "secalert@redhat.com"
},
{
"url": "https://access.redhat.com/security/cve/CVE-2024-1753",
"source": "secalert@redhat.com"

View File

@ -0,0 +1,47 @@
{
"id": "CVE-2024-1789",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-04-26T09:15:09.213",
"lastModified": "2024-04-26T09:15:09.213",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "The WP SMTP plugin for WordPress is vulnerable to SQL Injection via the 'search' parameter in versions 1.2 to 1.2.6 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for authenticated attackers, with administrator-level access and above, to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security@wordfence.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.2,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.2,
"impactScore": 5.9
}
]
},
"references": [
{
"url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3076663%40wp-smtp&new=3076663%40wp-smtp&sfp_email=&sfph_mail=",
"source": "security@wordfence.com"
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/ee269bc7-2822-4a07-be91-6763c1cf6cf2?source=cve",
"source": "security@wordfence.com"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-20993",
"sourceIdentifier": "secalert_us@oracle.com",
"published": "2024-04-16T22:15:12.453",
"lastModified": "2024-04-17T12:48:31.863",
"lastModified": "2024-04-26T09:15:09.417",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
@ -39,6 +39,10 @@
]
},
"references": [
{
"url": "https://security.netapp.com/advisory/ntap-20240426-0014/",
"source": "secalert_us@oracle.com"
},
{
"url": "https://www.oracle.com/security-alerts/cpuapr2024.html",
"source": "secalert_us@oracle.com"

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-20994",
"sourceIdentifier": "secalert_us@oracle.com",
"published": "2024-04-16T22:15:12.623",
"lastModified": "2024-04-17T12:48:31.863",
"lastModified": "2024-04-26T09:15:09.500",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
@ -39,6 +39,10 @@
]
},
"references": [
{
"url": "https://security.netapp.com/advisory/ntap-20240426-0013/",
"source": "secalert_us@oracle.com"
},
{
"url": "https://www.oracle.com/security-alerts/cpuapr2024.html",
"source": "secalert_us@oracle.com"

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-20998",
"sourceIdentifier": "secalert_us@oracle.com",
"published": "2024-04-16T22:15:13.140",
"lastModified": "2024-04-17T12:48:31.863",
"lastModified": "2024-04-26T09:15:09.567",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
@ -39,6 +39,10 @@
]
},
"references": [
{
"url": "https://security.netapp.com/advisory/ntap-20240426-0013/",
"source": "secalert_us@oracle.com"
},
{
"url": "https://www.oracle.com/security-alerts/cpuapr2024.html",
"source": "secalert_us@oracle.com"

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-21000",
"sourceIdentifier": "secalert_us@oracle.com",
"published": "2024-04-16T22:15:13.520",
"lastModified": "2024-04-17T12:48:31.863",
"lastModified": "2024-04-26T09:15:09.633",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
@ -39,6 +39,10 @@
]
},
"references": [
{
"url": "https://security.netapp.com/advisory/ntap-20240426-0013/",
"source": "secalert_us@oracle.com"
},
{
"url": "https://www.oracle.com/security-alerts/cpuapr2024.html",
"source": "secalert_us@oracle.com"

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-21002",
"sourceIdentifier": "secalert_us@oracle.com",
"published": "2024-04-16T22:15:13.870",
"lastModified": "2024-04-17T12:48:31.863",
"lastModified": "2024-04-26T09:15:09.700",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
@ -39,6 +39,10 @@
]
},
"references": [
{
"url": "https://security.netapp.com/advisory/ntap-20240426-0004/",
"source": "secalert_us@oracle.com"
},
{
"url": "https://www.oracle.com/security-alerts/cpuapr2024.html",
"source": "secalert_us@oracle.com"

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-21003",
"sourceIdentifier": "secalert_us@oracle.com",
"published": "2024-04-16T22:15:14.040",
"lastModified": "2024-04-17T12:48:31.863",
"lastModified": "2024-04-26T09:15:09.823",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
@ -39,6 +39,10 @@
]
},
"references": [
{
"url": "https://security.netapp.com/advisory/ntap-20240426-0004/",
"source": "secalert_us@oracle.com"
},
{
"url": "https://www.oracle.com/security-alerts/cpuapr2024.html",
"source": "secalert_us@oracle.com"

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-21004",
"sourceIdentifier": "secalert_us@oracle.com",
"published": "2024-04-16T22:15:14.210",
"lastModified": "2024-04-17T12:48:31.863",
"lastModified": "2024-04-26T09:15:09.933",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
@ -39,6 +39,10 @@
]
},
"references": [
{
"url": "https://security.netapp.com/advisory/ntap-20240426-0004/",
"source": "secalert_us@oracle.com"
},
{
"url": "https://www.oracle.com/security-alerts/cpuapr2024.html",
"source": "secalert_us@oracle.com"

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-21005",
"sourceIdentifier": "secalert_us@oracle.com",
"published": "2024-04-16T22:15:14.373",
"lastModified": "2024-04-17T12:48:31.863",
"lastModified": "2024-04-26T09:15:10.030",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
@ -39,6 +39,10 @@
]
},
"references": [
{
"url": "https://security.netapp.com/advisory/ntap-20240426-0004/",
"source": "secalert_us@oracle.com"
},
{
"url": "https://www.oracle.com/security-alerts/cpuapr2024.html",
"source": "secalert_us@oracle.com"

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-21008",
"sourceIdentifier": "secalert_us@oracle.com",
"published": "2024-04-16T22:15:14.920",
"lastModified": "2024-04-17T12:48:31.863",
"lastModified": "2024-04-26T09:15:10.100",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
@ -39,6 +39,10 @@
]
},
"references": [
{
"url": "https://security.netapp.com/advisory/ntap-20240426-0013/",
"source": "secalert_us@oracle.com"
},
{
"url": "https://www.oracle.com/security-alerts/cpuapr2024.html",
"source": "secalert_us@oracle.com"

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-21009",
"sourceIdentifier": "secalert_us@oracle.com",
"published": "2024-04-16T22:15:15.090",
"lastModified": "2024-04-17T12:48:31.863",
"lastModified": "2024-04-26T09:15:10.177",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
@ -39,6 +39,10 @@
]
},
"references": [
{
"url": "https://security.netapp.com/advisory/ntap-20240426-0013/",
"source": "secalert_us@oracle.com"
},
{
"url": "https://www.oracle.com/security-alerts/cpuapr2024.html",
"source": "secalert_us@oracle.com"

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-21011",
"sourceIdentifier": "secalert_us@oracle.com",
"published": "2024-04-16T22:15:15.437",
"lastModified": "2024-04-22T15:15:47.380",
"lastModified": "2024-04-26T09:15:10.240",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
@ -43,6 +43,10 @@
"url": "https://lists.debian.org/debian-lts-announce/2024/04/msg00014.html",
"source": "secalert_us@oracle.com"
},
{
"url": "https://security.netapp.com/advisory/ntap-20240426-0004/",
"source": "secalert_us@oracle.com"
},
{
"url": "https://www.oracle.com/security-alerts/cpuapr2024.html",
"source": "secalert_us@oracle.com"

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-21012",
"sourceIdentifier": "secalert_us@oracle.com",
"published": "2024-04-16T22:15:15.617",
"lastModified": "2024-04-22T15:15:47.473",
"lastModified": "2024-04-26T09:15:10.307",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
@ -43,6 +43,10 @@
"url": "https://lists.debian.org/debian-lts-announce/2024/04/msg00014.html",
"source": "secalert_us@oracle.com"
},
{
"url": "https://security.netapp.com/advisory/ntap-20240426-0004/",
"source": "secalert_us@oracle.com"
},
{
"url": "https://www.oracle.com/security-alerts/cpuapr2024.html",
"source": "secalert_us@oracle.com"

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-21013",
"sourceIdentifier": "secalert_us@oracle.com",
"published": "2024-04-16T22:15:15.793",
"lastModified": "2024-04-17T12:48:31.863",
"lastModified": "2024-04-26T09:15:10.370",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
@ -39,6 +39,10 @@
]
},
"references": [
{
"url": "https://security.netapp.com/advisory/ntap-20240426-0013/",
"source": "secalert_us@oracle.com"
},
{
"url": "https://www.oracle.com/security-alerts/cpuapr2024.html",
"source": "secalert_us@oracle.com"

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-21015",
"sourceIdentifier": "secalert_us@oracle.com",
"published": "2024-04-16T22:15:16.140",
"lastModified": "2024-04-17T12:48:31.863",
"lastModified": "2024-04-26T09:15:10.440",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
@ -39,6 +39,10 @@
]
},
"references": [
{
"url": "https://security.netapp.com/advisory/ntap-20240426-0010/",
"source": "secalert_us@oracle.com"
},
{
"url": "https://www.oracle.com/security-alerts/cpuapr2024.html",
"source": "secalert_us@oracle.com"

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-21047",
"sourceIdentifier": "secalert_us@oracle.com",
"published": "2024-04-16T22:15:21.643",
"lastModified": "2024-04-17T12:48:31.863",
"lastModified": "2024-04-26T09:15:10.500",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
@ -39,6 +39,10 @@
]
},
"references": [
{
"url": "https://security.netapp.com/advisory/ntap-20240426-0013/",
"source": "secalert_us@oracle.com"
},
{
"url": "https://www.oracle.com/security-alerts/cpuapr2024.html",
"source": "secalert_us@oracle.com"

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-21049",
"sourceIdentifier": "secalert_us@oracle.com",
"published": "2024-04-16T22:15:21.990",
"lastModified": "2024-04-17T12:48:31.863",
"lastModified": "2024-04-26T09:15:10.567",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
@ -39,6 +39,10 @@
]
},
"references": [
{
"url": "https://security.netapp.com/advisory/ntap-20240426-0012/",
"source": "secalert_us@oracle.com"
},
{
"url": "https://www.oracle.com/security-alerts/cpuapr2024.html",
"source": "secalert_us@oracle.com"

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-21050",
"sourceIdentifier": "secalert_us@oracle.com",
"published": "2024-04-16T22:15:22.157",
"lastModified": "2024-04-17T12:48:31.863",
"lastModified": "2024-04-26T09:15:10.637",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
@ -39,6 +39,10 @@
]
},
"references": [
{
"url": "https://security.netapp.com/advisory/ntap-20240426-0012/",
"source": "secalert_us@oracle.com"
},
{
"url": "https://www.oracle.com/security-alerts/cpuapr2024.html",
"source": "secalert_us@oracle.com"

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-21051",
"sourceIdentifier": "secalert_us@oracle.com",
"published": "2024-04-16T22:15:22.330",
"lastModified": "2024-04-17T12:48:31.863",
"lastModified": "2024-04-26T09:15:10.703",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
@ -39,6 +39,10 @@
]
},
"references": [
{
"url": "https://security.netapp.com/advisory/ntap-20240426-0012/",
"source": "secalert_us@oracle.com"
},
{
"url": "https://www.oracle.com/security-alerts/cpuapr2024.html",
"source": "secalert_us@oracle.com"

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-21052",
"sourceIdentifier": "secalert_us@oracle.com",
"published": "2024-04-16T22:15:22.500",
"lastModified": "2024-04-17T12:48:31.863",
"lastModified": "2024-04-26T09:15:10.767",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
@ -39,6 +39,10 @@
]
},
"references": [
{
"url": "https://security.netapp.com/advisory/ntap-20240426-0012/",
"source": "secalert_us@oracle.com"
},
{
"url": "https://www.oracle.com/security-alerts/cpuapr2024.html",
"source": "secalert_us@oracle.com"

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-21053",
"sourceIdentifier": "secalert_us@oracle.com",
"published": "2024-04-16T22:15:22.673",
"lastModified": "2024-04-17T12:48:31.863",
"lastModified": "2024-04-26T09:15:10.830",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
@ -39,6 +39,10 @@
]
},
"references": [
{
"url": "https://security.netapp.com/advisory/ntap-20240426-0012/",
"source": "secalert_us@oracle.com"
},
{
"url": "https://www.oracle.com/security-alerts/cpuapr2024.html",
"source": "secalert_us@oracle.com"

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-21054",
"sourceIdentifier": "secalert_us@oracle.com",
"published": "2024-04-16T22:15:22.840",
"lastModified": "2024-04-17T12:48:31.863",
"lastModified": "2024-04-26T09:15:10.893",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
@ -39,6 +39,10 @@
]
},
"references": [
{
"url": "https://security.netapp.com/advisory/ntap-20240426-0013/",
"source": "secalert_us@oracle.com"
},
{
"url": "https://www.oracle.com/security-alerts/cpuapr2024.html",
"source": "secalert_us@oracle.com"

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-21055",
"sourceIdentifier": "secalert_us@oracle.com",
"published": "2024-04-16T22:15:23.010",
"lastModified": "2024-04-17T12:48:31.863",
"lastModified": "2024-04-26T09:15:10.953",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
@ -39,6 +39,10 @@
]
},
"references": [
{
"url": "https://security.netapp.com/advisory/ntap-20240426-0011/",
"source": "secalert_us@oracle.com"
},
{
"url": "https://www.oracle.com/security-alerts/cpuapr2024.html",
"source": "secalert_us@oracle.com"

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-21056",
"sourceIdentifier": "secalert_us@oracle.com",
"published": "2024-04-16T22:15:23.183",
"lastModified": "2024-04-17T12:48:31.863",
"lastModified": "2024-04-26T09:15:11.017",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
@ -39,6 +39,10 @@
]
},
"references": [
{
"url": "https://security.netapp.com/advisory/ntap-20240426-0012/",
"source": "secalert_us@oracle.com"
},
{
"url": "https://www.oracle.com/security-alerts/cpuapr2024.html",
"source": "secalert_us@oracle.com"

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-21060",
"sourceIdentifier": "secalert_us@oracle.com",
"published": "2024-04-16T22:15:23.910",
"lastModified": "2024-04-17T12:48:31.863",
"lastModified": "2024-04-26T09:15:11.080",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
@ -39,6 +39,10 @@
]
},
"references": [
{
"url": "https://security.netapp.com/advisory/ntap-20240426-0013/",
"source": "secalert_us@oracle.com"
},
{
"url": "https://www.oracle.com/security-alerts/cpuapr2024.html",
"source": "secalert_us@oracle.com"

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-21061",
"sourceIdentifier": "secalert_us@oracle.com",
"published": "2024-04-16T22:15:24.080",
"lastModified": "2024-04-17T12:48:31.863",
"lastModified": "2024-04-26T09:15:11.143",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
@ -39,6 +39,10 @@
]
},
"references": [
{
"url": "https://security.netapp.com/advisory/ntap-20240426-0014/",
"source": "secalert_us@oracle.com"
},
{
"url": "https://www.oracle.com/security-alerts/cpuapr2024.html",
"source": "secalert_us@oracle.com"

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-21062",
"sourceIdentifier": "secalert_us@oracle.com",
"published": "2024-04-16T22:15:24.247",
"lastModified": "2024-04-17T12:48:31.863",
"lastModified": "2024-04-26T09:15:11.213",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
@ -39,6 +39,10 @@
]
},
"references": [
{
"url": "https://security.netapp.com/advisory/ntap-20240426-0013/",
"source": "secalert_us@oracle.com"
},
{
"url": "https://www.oracle.com/security-alerts/cpuapr2024.html",
"source": "secalert_us@oracle.com"

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-21068",
"sourceIdentifier": "secalert_us@oracle.com",
"published": "2024-04-16T22:15:25.307",
"lastModified": "2024-04-22T15:15:47.540",
"lastModified": "2024-04-26T09:15:11.273",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
@ -43,6 +43,10 @@
"url": "https://lists.debian.org/debian-lts-announce/2024/04/msg00014.html",
"source": "secalert_us@oracle.com"
},
{
"url": "https://security.netapp.com/advisory/ntap-20240426-0004/",
"source": "secalert_us@oracle.com"
},
{
"url": "https://www.oracle.com/security-alerts/cpuapr2024.html",
"source": "secalert_us@oracle.com"

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-21069",
"sourceIdentifier": "secalert_us@oracle.com",
"published": "2024-04-16T22:15:25.473",
"lastModified": "2024-04-17T12:48:31.863",
"lastModified": "2024-04-26T09:15:11.350",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
@ -39,6 +39,10 @@
]
},
"references": [
{
"url": "https://security.netapp.com/advisory/ntap-20240426-0013/",
"source": "secalert_us@oracle.com"
},
{
"url": "https://www.oracle.com/security-alerts/cpuapr2024.html",
"source": "secalert_us@oracle.com"

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-21085",
"sourceIdentifier": "secalert_us@oracle.com",
"published": "2024-04-16T22:15:28.293",
"lastModified": "2024-04-22T15:15:47.610",
"lastModified": "2024-04-26T09:15:11.447",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
@ -43,6 +43,10 @@
"url": "https://lists.debian.org/debian-lts-announce/2024/04/msg00014.html",
"source": "secalert_us@oracle.com"
},
{
"url": "https://security.netapp.com/advisory/ntap-20240426-0004/",
"source": "secalert_us@oracle.com"
},
{
"url": "https://www.oracle.com/security-alerts/cpuapr2024.html",
"source": "secalert_us@oracle.com"

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-21087",
"sourceIdentifier": "secalert_us@oracle.com",
"published": "2024-04-16T22:15:28.640",
"lastModified": "2024-04-17T12:48:31.863",
"lastModified": "2024-04-26T09:15:11.543",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
@ -39,6 +39,10 @@
]
},
"references": [
{
"url": "https://security.netapp.com/advisory/ntap-20240426-0013/",
"source": "secalert_us@oracle.com"
},
{
"url": "https://www.oracle.com/security-alerts/cpuapr2024.html",
"source": "secalert_us@oracle.com"

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-21094",
"sourceIdentifier": "secalert_us@oracle.com",
"published": "2024-04-16T22:15:29.857",
"lastModified": "2024-04-22T15:15:47.683",
"lastModified": "2024-04-26T09:15:11.613",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
@ -43,6 +43,10 @@
"url": "https://lists.debian.org/debian-lts-announce/2024/04/msg00014.html",
"source": "secalert_us@oracle.com"
},
{
"url": "https://security.netapp.com/advisory/ntap-20240426-0004/",
"source": "secalert_us@oracle.com"
},
{
"url": "https://www.oracle.com/security-alerts/cpuapr2024.html",
"source": "secalert_us@oracle.com"

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-21096",
"sourceIdentifier": "secalert_us@oracle.com",
"published": "2024-04-16T22:15:30.207",
"lastModified": "2024-04-17T12:48:31.863",
"lastModified": "2024-04-26T09:15:11.683",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
@ -39,6 +39,10 @@
]
},
"references": [
{
"url": "https://security.netapp.com/advisory/ntap-20240426-0013/",
"source": "secalert_us@oracle.com"
},
{
"url": "https://www.oracle.com/security-alerts/cpuapr2024.html",
"source": "secalert_us@oracle.com"

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-21101",
"sourceIdentifier": "secalert_us@oracle.com",
"published": "2024-04-16T22:15:31.087",
"lastModified": "2024-04-17T12:48:31.863",
"lastModified": "2024-04-26T09:15:11.750",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
@ -39,6 +39,10 @@
]
},
"references": [
{
"url": "https://security.netapp.com/advisory/ntap-20240426-0015/",
"source": "secalert_us@oracle.com"
},
{
"url": "https://www.oracle.com/security-alerts/cpuapr2024.html",
"source": "secalert_us@oracle.com"

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-21102",
"sourceIdentifier": "secalert_us@oracle.com",
"published": "2024-04-16T22:15:31.270",
"lastModified": "2024-04-17T12:48:31.863",
"lastModified": "2024-04-26T09:15:11.813",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
@ -39,6 +39,14 @@
]
},
"references": [
{
"url": "https://security.netapp.com/advisory/ntap-20240426-0013/",
"source": "secalert_us@oracle.com"
},
{
"url": "https://security.netapp.com/advisory/ntap-20240426-0015/",
"source": "secalert_us@oracle.com"
},
{
"url": "https://www.oracle.com/security-alerts/cpuapr2024.html",
"source": "secalert_us@oracle.com"

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2024-22091",
"sourceIdentifier": "responsibledisclosure@mattermost.com",
"published": "2024-04-26T09:15:11.880",
"lastModified": "2024-04-26T09:15:11.880",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Mattermost versions 8.1.x <= 8.1.10, 9.6.x <= 9.6.0, 9.5.x <= 9.5.2 and 8.1.x <= 8.1.11 fail to limit the size of a request path that includes user inputs which allows an attacker to cause\u00a0excessive resource\u00a0consumption, possibly leading to a DoS\u00a0via sending large request paths\n\n"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "responsibledisclosure@mattermost.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "LOW",
"baseScore": 3.1,
"baseSeverity": "LOW"
},
"exploitabilityScore": 1.6,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "responsibledisclosure@mattermost.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-400"
}
]
}
],
"references": [
{
"url": "https://mattermost.com/security-updates",
"source": "responsibledisclosure@mattermost.com"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-2312",
"sourceIdentifier": "security@ubuntu.com",
"published": "2024-04-05T20:15:09.020",
"lastModified": "2024-04-08T18:49:25.863",
"lastModified": "2024-04-26T09:15:12.073",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
@ -46,6 +46,10 @@
{
"url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2312",
"source": "security@ubuntu.com"
},
{
"url": "https://security.netapp.com/advisory/ntap-20240426-0003/",
"source": "security@ubuntu.com"
}
]
}

View File

@ -0,0 +1,47 @@
{
"id": "CVE-2024-2920",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-04-26T08:15:12.203",
"lastModified": "2024-04-26T08:15:12.203",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "The WP-Members Membership Plugin plugin for WordPress is vulnerable to Information Exposure in all versions up to, and including, 3.4.9.3 due to the plugin uploading user supplied files to a publicly accessible directory in wp-content without any restrictions. This makes it possible for unauthenticated attackers to view files uploaded by other users which may contain sensitive information."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security@wordfence.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 3.9,
"impactScore": 1.4
}
]
},
"references": [
{
"url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3074215%40wp-members&new=3074215%40wp-members&sfp_email=&sfph_mail=",
"source": "security@wordfence.com"
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/4319fa2e-8826-4100-9156-cbe80582367e?source=cve",
"source": "security@wordfence.com"
}
]
}

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2024-32046",
"sourceIdentifier": "responsibledisclosure@mattermost.com",
"published": "2024-04-26T09:15:12.157",
"lastModified": "2024-04-26T09:15:12.157",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Mattermost versions 9.6.x <= 9.6.0, 9.5.x <= 9.5.2, 9.4.x <= 9.4.4 and 8.1.x <= 8.1.11 fail to remove detailed error messages in API requests even if the developer mode is off which allows an attacker to get information about the server such as the full path were files are stored\n\n"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "responsibledisclosure@mattermost.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "LOW",
"baseScore": 4.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "responsibledisclosure@mattermost.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-200"
}
]
}
],
"references": [
{
"url": "https://mattermost.com/security-updates",
"source": "responsibledisclosure@mattermost.com"
}
]
}

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2024-33598",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-04-26T08:15:12.370",
"lastModified": "2024-04-26T08:15:12.370",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Twinpictures Annual Archive allows Stored XSS.This issue affects Annual Archive: from n/a through 1.6.0.\n\n"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW",
"baseScore": 5.9,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.7,
"impactScore": 3.7
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/anual-archive/wordpress-annual-archive-plugin-1-6-0-cross-site-scripting-xss-vulnerability-2?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2024-33638",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-04-26T08:15:12.567",
"lastModified": "2024-04-26T08:15:12.567",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Cross-Site Request Forgery (CSRF) vulnerability in Brijesh Kothari Smart Maintenance Mode.This issue affects Smart Maintenance Mode: from n/a through 1.4.4.\n\n"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "LOW",
"baseScore": 5.4,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 2.5
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-352"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/smart-maintenance-mode/wordpress-smart-maintenance-mode-plugin-1-4-4-cross-site-request-forgery-csrf-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2024-33639",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-04-26T08:15:12.770",
"lastModified": "2024-04-26T08:15:12.770",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in AccessAlly PopupAlly allows Stored XSS.This issue affects PopupAlly: from n/a through 2.1.1.\n\n"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW",
"baseScore": 5.9,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.7,
"impactScore": 3.7
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/popupally/wordpress-popupally-plugin-2-1-1-cross-site-scripting-xss-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2024-33642",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-04-26T08:15:12.977",
"lastModified": "2024-04-26T08:15:12.977",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in EkoJR Advanced Post List allows Stored XSS.This issue affects Advanced Post List: from n/a through 0.5.6.1.\n\n"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW",
"baseScore": 5.9,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.7,
"impactScore": 3.7
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/advanced-post-list/wordpress-advanced-post-list-plugin-0-5-6-1-cross-site-scripting-xss-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2024-33650",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-04-26T08:15:13.163",
"lastModified": "2024-04-26T08:15:13.163",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Cross-Site Request Forgery (CSRF) vulnerability in Cryout Creations Serious Slider.This issue affects Serious Slider: from n/a through 1.2.4.\n\n"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-352"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/cryout-serious-slider/wordpress-serious-slider-plugin-1-2-4-cross-site-request-forgery-csrf-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2024-33651",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-04-26T08:15:13.370",
"lastModified": "2024-04-26T08:15:13.370",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Cross-Site Request Forgery (CSRF) vulnerability in Matthew Fries MF Gig Calendar.This issue affects MF Gig Calendar : from n/a through 1.2.1.\n\n"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "LOW",
"baseScore": 5.4,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 2.5
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-352"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/mf-gig-calendar/wordpress-mf-gig-calendar-plugin-1-2-1-cross-site-request-forgery-csrf-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -0,0 +1,51 @@
{
"id": "CVE-2024-3678",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-04-26T08:15:13.567",
"lastModified": "2024-04-26T08:15:13.567",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "The Blog2Social: Social Media Auto Post & Scheduler plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 7.4.2. This makes it possible for unauthenticated attackers to view limited information from password protected posts."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security@wordfence.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 3.9,
"impactScore": 1.4
}
]
},
"references": [
{
"url": "https://plugins.trac.wordpress.org/changeset/3069574/blog2social/trunk/includes/Meta.php",
"source": "security@wordfence.com"
},
{
"url": "https://plugins.trac.wordpress.org/changeset/3074883/blog2social/trunk/includes/Meta.php",
"source": "security@wordfence.com"
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/2dea1bcb-14c2-4ec9-8a4d-087bac2db486?source=cve",
"source": "security@wordfence.com"
}
]
}

View File

@ -0,0 +1,47 @@
{
"id": "CVE-2024-3890",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-04-26T08:15:13.773",
"lastModified": "2024-04-26T08:15:13.773",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "The Happy Addons for Elementor plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the Calendly widget in all versions up to, and including, 3.10.5 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security@wordfence.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 6.4,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 3.1,
"impactScore": 2.7
}
]
},
"references": [
{
"url": "https://plugins.trac.wordpress.org/changeset/3076871/happy-elementor-addons/trunk/widgets/calendly/widget.php",
"source": "security@wordfence.com"
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/22e4eb2a-2c2b-4f4f-821e-8d2d7e558364?source=cve",
"source": "security@wordfence.com"
}
]
}

View File

@ -0,0 +1,51 @@
{
"id": "CVE-2024-3962",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-04-26T09:15:12.337",
"lastModified": "2024-04-26T09:15:12.337",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "The Product Addons & Fields for WooCommerce plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the ppom_upload_file function in all versions up to, and including, 32.0.18. This makes it possible for unauthenticated attackers to upload arbitrary files on the affected site's server which may make remote code execution possible. Successful exploitation requires the PPOM Pro plugin to be installed along with a WooCommerce product that contains a file upload field to retrieve the correct nonce."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security@wordfence.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
"references": [
{
"url": "https://plugins.trac.wordpress.org/changeset/3075669/woocommerce-product-addon",
"source": "security@wordfence.com"
},
{
"url": "https://themeisle.com/plugins/ppom-pro/",
"source": "security@wordfence.com"
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/4f95bcc3-354e-4016-9a17-945569b076b6?source=cve",
"source": "security@wordfence.com"
}
]
}

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2024-4182",
"sourceIdentifier": "responsibledisclosure@mattermost.com",
"published": "2024-04-26T09:15:12.523",
"lastModified": "2024-04-26T09:15:12.523",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Mattermost versions 9.6.0, 9.5.x before 9.5.3, 9.4.x before 9.4.5, and 8.1.x before 8.1.12 fail to handle JSON parsing errors in custom status values, which allows an authenticated attacker to crash other users' web clients via a malformed custom status.\n\n"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "responsibledisclosure@mattermost.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "LOW",
"baseScore": 4.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "responsibledisclosure@mattermost.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-754"
}
]
}
],
"references": [
{
"url": "https://mattermost.com/security-updates",
"source": "responsibledisclosure@mattermost.com"
}
]
}

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2024-4183",
"sourceIdentifier": "responsibledisclosure@mattermost.com",
"published": "2024-04-26T09:15:12.717",
"lastModified": "2024-04-26T09:15:12.717",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Mattermost versions 8.1.x before 8.1.12, 9.6.x before 9.6.1, 9.5.x before 9.5.3, 9.4.x before 9.4.5 fail to limit the number of active sessions, which allows an authenticated attacker to crash the server via repeated requests to the getSessions API after flooding the sessions table.\n\n"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "responsibledisclosure@mattermost.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "LOW",
"baseScore": 4.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "responsibledisclosure@mattermost.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-400"
}
]
}
],
"references": [
{
"url": "https://mattermost.com/security-updates",
"source": "responsibledisclosure@mattermost.com"
}
]
}

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2024-4195",
"sourceIdentifier": "responsibledisclosure@mattermost.com",
"published": "2024-04-26T09:15:12.897",
"lastModified": "2024-04-26T09:15:12.897",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Mattermost versions 9.6.0, 9.5.x before 9.5.3, and 8.1.x before 8.1.12 fail to fully validate role changes, which allows an attacker authenticated as a team admin to promote guests to team admins via crafted HTTP requests.\n\n"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "responsibledisclosure@mattermost.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 2.7,
"baseSeverity": "LOW"
},
"exploitabilityScore": 1.2,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "responsibledisclosure@mattermost.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-284"
}
]
}
],
"references": [
{
"url": "https://mattermost.com/security-updates",
"source": "responsibledisclosure@mattermost.com"
}
]
}

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2024-4198",
"sourceIdentifier": "responsibledisclosure@mattermost.com",
"published": "2024-04-26T09:15:13.097",
"lastModified": "2024-04-26T09:15:13.097",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Mattermost versions 9.6.0, 9.5.x before 9.5.3, and 8.1.x before 8.1.12 fail to fully validate role changes which allows an attacker authenticated as team admin to demote users to guest via crafted HTTP requests.\n\n"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "responsibledisclosure@mattermost.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 2.7,
"baseSeverity": "LOW"
},
"exploitabilityScore": 1.2,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "responsibledisclosure@mattermost.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-284"
}
]
}
],
"references": [
{
"url": "https://mattermost.com/security-updates",
"source": "responsibledisclosure@mattermost.com"
}
]
}

View File

@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update
```plain
2024-04-26T08:00:41.422303+00:00
2024-04-26T10:00:40.235804+00:00
```
### Most recent CVE Modification Timestamp synchronized with NVD
```plain
2024-04-26T07:15:47.467000+00:00
2024-04-26T09:15:13.097000+00:00
```
### Last Data Feed Release
@ -33,24 +33,64 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
### Total Number of included CVEs
```plain
246844
246864
```
### CVEs added in the last Commit
Recently added CVEs: `1`
Recently added CVEs: `20`
- [CVE-2024-4056](CVE-2024/CVE-2024-40xx/CVE-2024-4056.json) (`2024-04-26T06:15:06.610`)
- [CVE-2023-6095](CVE-2023/CVE-2023-60xx/CVE-2023-6095.json) (`2024-04-26T08:15:11.327`)
- [CVE-2023-6096](CVE-2023/CVE-2023-60xx/CVE-2023-6096.json) (`2024-04-26T08:15:11.583`)
- [CVE-2023-6116](CVE-2023/CVE-2023-61xx/CVE-2023-6116.json) (`2024-04-26T08:15:11.797`)
- [CVE-2024-1789](CVE-2024/CVE-2024-17xx/CVE-2024-1789.json) (`2024-04-26T09:15:09.213`)
- [CVE-2024-22091](CVE-2024/CVE-2024-220xx/CVE-2024-22091.json) (`2024-04-26T09:15:11.880`)
- [CVE-2024-2920](CVE-2024/CVE-2024-29xx/CVE-2024-2920.json) (`2024-04-26T08:15:12.203`)
- [CVE-2024-32046](CVE-2024/CVE-2024-320xx/CVE-2024-32046.json) (`2024-04-26T09:15:12.157`)
- [CVE-2024-33598](CVE-2024/CVE-2024-335xx/CVE-2024-33598.json) (`2024-04-26T08:15:12.370`)
- [CVE-2024-33638](CVE-2024/CVE-2024-336xx/CVE-2024-33638.json) (`2024-04-26T08:15:12.567`)
- [CVE-2024-33639](CVE-2024/CVE-2024-336xx/CVE-2024-33639.json) (`2024-04-26T08:15:12.770`)
- [CVE-2024-33642](CVE-2024/CVE-2024-336xx/CVE-2024-33642.json) (`2024-04-26T08:15:12.977`)
- [CVE-2024-33650](CVE-2024/CVE-2024-336xx/CVE-2024-33650.json) (`2024-04-26T08:15:13.163`)
- [CVE-2024-33651](CVE-2024/CVE-2024-336xx/CVE-2024-33651.json) (`2024-04-26T08:15:13.370`)
- [CVE-2024-3678](CVE-2024/CVE-2024-36xx/CVE-2024-3678.json) (`2024-04-26T08:15:13.567`)
- [CVE-2024-3890](CVE-2024/CVE-2024-38xx/CVE-2024-3890.json) (`2024-04-26T08:15:13.773`)
- [CVE-2024-3962](CVE-2024/CVE-2024-39xx/CVE-2024-3962.json) (`2024-04-26T09:15:12.337`)
- [CVE-2024-4182](CVE-2024/CVE-2024-41xx/CVE-2024-4182.json) (`2024-04-26T09:15:12.523`)
- [CVE-2024-4183](CVE-2024/CVE-2024-41xx/CVE-2024-4183.json) (`2024-04-26T09:15:12.717`)
- [CVE-2024-4195](CVE-2024/CVE-2024-41xx/CVE-2024-4195.json) (`2024-04-26T09:15:12.897`)
- [CVE-2024-4198](CVE-2024/CVE-2024-41xx/CVE-2024-4198.json) (`2024-04-26T09:15:13.097`)
### CVEs modified in the last Commit
Recently modified CVEs: `4`
Recently modified CVEs: `45`
- [CVE-2019-10190](CVE-2019/CVE-2019-101xx/CVE-2019-10190.json) (`2024-04-26T07:15:46.890`)
- [CVE-2019-10191](CVE-2019/CVE-2019-101xx/CVE-2019-10191.json) (`2024-04-26T07:15:47.220`)
- [CVE-2019-19331](CVE-2019/CVE-2019-193xx/CVE-2019-19331.json) (`2024-04-26T07:15:47.327`)
- [CVE-2020-12667](CVE-2020/CVE-2020-126xx/CVE-2020-12667.json) (`2024-04-26T07:15:47.467`)
- [CVE-2024-21011](CVE-2024/CVE-2024-210xx/CVE-2024-21011.json) (`2024-04-26T09:15:10.240`)
- [CVE-2024-21012](CVE-2024/CVE-2024-210xx/CVE-2024-21012.json) (`2024-04-26T09:15:10.307`)
- [CVE-2024-21013](CVE-2024/CVE-2024-210xx/CVE-2024-21013.json) (`2024-04-26T09:15:10.370`)
- [CVE-2024-21015](CVE-2024/CVE-2024-210xx/CVE-2024-21015.json) (`2024-04-26T09:15:10.440`)
- [CVE-2024-21047](CVE-2024/CVE-2024-210xx/CVE-2024-21047.json) (`2024-04-26T09:15:10.500`)
- [CVE-2024-21049](CVE-2024/CVE-2024-210xx/CVE-2024-21049.json) (`2024-04-26T09:15:10.567`)
- [CVE-2024-21050](CVE-2024/CVE-2024-210xx/CVE-2024-21050.json) (`2024-04-26T09:15:10.637`)
- [CVE-2024-21051](CVE-2024/CVE-2024-210xx/CVE-2024-21051.json) (`2024-04-26T09:15:10.703`)
- [CVE-2024-21052](CVE-2024/CVE-2024-210xx/CVE-2024-21052.json) (`2024-04-26T09:15:10.767`)
- [CVE-2024-21053](CVE-2024/CVE-2024-210xx/CVE-2024-21053.json) (`2024-04-26T09:15:10.830`)
- [CVE-2024-21054](CVE-2024/CVE-2024-210xx/CVE-2024-21054.json) (`2024-04-26T09:15:10.893`)
- [CVE-2024-21055](CVE-2024/CVE-2024-210xx/CVE-2024-21055.json) (`2024-04-26T09:15:10.953`)
- [CVE-2024-21056](CVE-2024/CVE-2024-210xx/CVE-2024-21056.json) (`2024-04-26T09:15:11.017`)
- [CVE-2024-21060](CVE-2024/CVE-2024-210xx/CVE-2024-21060.json) (`2024-04-26T09:15:11.080`)
- [CVE-2024-21061](CVE-2024/CVE-2024-210xx/CVE-2024-21061.json) (`2024-04-26T09:15:11.143`)
- [CVE-2024-21062](CVE-2024/CVE-2024-210xx/CVE-2024-21062.json) (`2024-04-26T09:15:11.213`)
- [CVE-2024-21068](CVE-2024/CVE-2024-210xx/CVE-2024-21068.json) (`2024-04-26T09:15:11.273`)
- [CVE-2024-21069](CVE-2024/CVE-2024-210xx/CVE-2024-21069.json) (`2024-04-26T09:15:11.350`)
- [CVE-2024-21085](CVE-2024/CVE-2024-210xx/CVE-2024-21085.json) (`2024-04-26T09:15:11.447`)
- [CVE-2024-21087](CVE-2024/CVE-2024-210xx/CVE-2024-21087.json) (`2024-04-26T09:15:11.543`)
- [CVE-2024-21094](CVE-2024/CVE-2024-210xx/CVE-2024-21094.json) (`2024-04-26T09:15:11.613`)
- [CVE-2024-21096](CVE-2024/CVE-2024-210xx/CVE-2024-21096.json) (`2024-04-26T09:15:11.683`)
- [CVE-2024-21101](CVE-2024/CVE-2024-211xx/CVE-2024-21101.json) (`2024-04-26T09:15:11.750`)
- [CVE-2024-21102](CVE-2024/CVE-2024-211xx/CVE-2024-21102.json) (`2024-04-26T09:15:11.813`)
- [CVE-2024-2312](CVE-2024/CVE-2024-23xx/CVE-2024-2312.json) (`2024-04-26T09:15:12.073`)
## Download and Usage

View File

@ -128373,8 +128373,8 @@ CVE-2019-10187,0,0,ae4efc6a9a41fbe0d29ffdeb828add0b75008d49c7bc6c91e9a24ed88ecab
CVE-2019-10188,0,0,a13d4ceb0f13d35aeba832a596ced2b432748762a9a8b2b493ff33e5207b061d,2020-09-30T18:05:01.380000
CVE-2019-10189,0,0,eb169748c83adb0ad7fbaaf60d671d37009a7e6c40d15a068f3dda73779b0d70,2020-10-01T16:44:05.143000
CVE-2019-1019,0,0,0b12b6732dc995748532289557ef7cd9235eb1cf9a7e26c1ffe53d6b8ccbf0ec,2020-08-24T17:37:01.140000
CVE-2019-10190,0,1,bb1346d4047c63ad540479aea221fbc23d5bc608df08182b4599bac8df429675,2024-04-26T07:15:46.890000
CVE-2019-10191,0,1,21dec4da056735722660008d63c33d3f84466d3184f4ef9a0b1a92eb8e21b013,2024-04-26T07:15:47.220000
CVE-2019-10190,0,0,bb1346d4047c63ad540479aea221fbc23d5bc608df08182b4599bac8df429675,2024-04-26T07:15:46.890000
CVE-2019-10191,0,0,21dec4da056735722660008d63c33d3f84466d3184f4ef9a0b1a92eb8e21b013,2024-04-26T07:15:47.220000
CVE-2019-10192,0,0,f3dcb0c725c48d0c924ab718c861d70bda755b05d176cf095712d5438715f35c,2021-10-28T12:14:58.633000
CVE-2019-10193,0,0,401344071bf625f34467a49523730da2f7243f818eddb9d73b2466f103fe820a,2021-10-28T12:14:51.763000
CVE-2019-10194,0,0,b417fd7192af4bf5cb5d93fbdccf69225cff4665a2a319b30921b160866de7d1,2023-03-01T16:32:18.023000
@ -136372,7 +136372,7 @@ CVE-2019-19328,0,0,a59eed6226128a2f18753f662e460929a2eae01faa2963309e41f09013704
CVE-2019-19329,0,0,1a2581e92c9705766dbedb3eb4edb9189fab2e5ff8a3ebd1c8255961a5f99b0c,2019-12-18T18:13:12.107000
CVE-2019-1933,0,0,be9658941a3a80193f3901ae9da6e79b0e089e4cb170647e0a7a38b628dcca48,2019-10-09T23:48:35.973000
CVE-2019-19330,0,0,38f6f3c1e0ce2cfa7e603942e48095aa1c9a7754913e9d3d14517490db6f04b1,2023-11-07T03:07:37.857000
CVE-2019-19331,0,1,23d30054eda2d3f126d2dfc066fafab123cea86021e172fa3a0246294685bafb,2024-04-26T07:15:47.327000
CVE-2019-19331,0,0,23d30054eda2d3f126d2dfc066fafab123cea86021e172fa3a0246294685bafb,2024-04-26T07:15:47.327000
CVE-2019-19332,0,0,c67cf1a70603b7b226bbee8afe8fc4bb03ced117f10262a0858d9196420c3ae8,2023-02-12T23:37:11
CVE-2019-19333,0,0,a17142b3af21dbe86290257021ca41508c13b89df17226966b11722fcb0359ac,2023-11-07T03:07:38.043000
CVE-2019-19334,0,0,38da0cd5a9492d6da306869ca26bf9e5d597ea01ab9636bf27c632f7f48be694,2023-11-07T03:07:38.133000
@ -147488,7 +147488,7 @@ CVE-2020-1266,0,0,be568c62410ad866d9e5ce6f856285eef36527344ae35a531c0ace60bf4aa7
CVE-2020-12662,0,0,a50202a22e5fd6ca70e2ddc132c2e601eb50d5054d053a8739f12375441ac6cf,2023-11-07T03:15:42.370000
CVE-2020-12663,0,0,75beb77ebadaa78b84642c5f4c9f19cfe75a93733a1e1b2a433185b1f5b74682,2023-11-07T03:15:42.447000
CVE-2020-12666,0,0,fe755727c03d8130c7fd2ed15e9ba86f693d12f15275354037125d23793eaa13,2023-11-07T03:15:42.550000
CVE-2020-12667,0,1,fd96d32138ba34fff8302fe18c7d4480b5c7e076daa1e21a385059e1f8c882e9,2024-04-26T07:15:47.467000
CVE-2020-12667,0,0,fd96d32138ba34fff8302fe18c7d4480b5c7e076daa1e21a385059e1f8c882e9,2024-04-26T07:15:47.467000
CVE-2020-12668,0,0,76729c036030ac405133032ed3ea2891f1f66ef07a3eb7665de76e2610c0bcfd,2021-07-21T11:39:23.747000
CVE-2020-12669,0,0,74ee601d98fd6ad7039430102906960989d828cf9bd6e4c06ed3d687ff46d97d,2021-07-21T11:39:23.747000
CVE-2020-1267,0,0,05789cc17c6058015a629047859d2317dbbb98762c770905ae60901f6166798e,2021-07-21T11:39:23.747000
@ -223432,7 +223432,7 @@ CVE-2023-32639,0,0,5a9dc0b401e1480e783ebd3f6d1222909155323292cc3c55c85aa264db66f
CVE-2023-3264,0,0,c99d9106aaa36b20e35519e6a10f0fca32ccd3d6d1eadc97461d4558600774b0,2023-08-25T06:15:10.350000
CVE-2023-32641,0,0,61452629ef60827dfe0112aab36e1ea82f081c8eeffba568cbbbb06b3431257d,2023-11-21T20:29:33.007000
CVE-2023-32642,0,0,719a98d80599a68c58f789a9156c03155acb9b87132b9cddf4c2b65c16077e70,2024-02-14T15:01:51.137000
CVE-2023-32643,0,0,aad79394dd54391c1010467928b66be776031803d7b8c222fac99d09ef62788b,2023-09-20T14:32:32.347000
CVE-2023-32643,0,1,a1c2dd3a6ce9789dcfc494218e67b9af2d5e182965c84e78dba5f384cd16b028,2024-04-26T09:15:07.127000
CVE-2023-32644,0,0,053df6cababdb2a9193eaa714bc5fba84791e72be4faf2e3a06f4863dd750cb0,2024-02-14T15:01:51.137000
CVE-2023-32645,0,0,8f0ff3ec710846e254ffe7c9bdf1260cd6177f09ffe702802c13d06564a68529,2023-10-12T22:27:09.257000
CVE-2023-32646,0,0,8a8666e5d8c745f2a8205ab201ba1d9d1ed5f8d8012e7df895ac6a0ef3dc332c,2024-02-14T15:01:51.137000
@ -223455,7 +223455,7 @@ CVE-2023-32661,0,0,f6a5bfdc0cd8251bbdbbcac9f7eaed8996e0997cd50c3b864f7b545cb620b
CVE-2023-32662,0,0,e6ecfd432d8093b5086df379db0b57cdf40d1685dba2c7fabe307bec0ed72a45,2023-11-21T19:41:02.917000
CVE-2023-32663,0,0,3e7ef52ee8898923e5c75493bfae74a9e09e3258bba72eb62046ef7118b9edb7,2023-08-21T17:15:47.183000
CVE-2023-32664,0,0,eb42d87345b4b74142e9d98b628cc63fc43d215142fe85e83066ebee2586bda4,2023-09-15T19:15:07.340000
CVE-2023-32665,0,0,31f6fbb04d38e24ef8a8bd7c7b632bd8e055665c900cbecbc4c539e406f2b02a,2023-11-27T14:15:07.820000
CVE-2023-32665,0,1,9ed2be48c5a7a2b745c7f5e956180148905604b496256df4241d270f55982e23,2024-04-26T09:15:07.333000
CVE-2023-32666,0,0,9e4cb6a8ebc3b9a62bc711210afb6752a4df60b12745e2e1ba1c7436db1cb9d9,2024-04-05T09:15:08.497000
CVE-2023-32668,0,0,6870504f63fd451347fe0c331096f1e45ff8f6811229f296b8ba61f0b4142f10,2023-05-23T17:31:45.217000
CVE-2023-32669,0,0,0f9d4ef16e2f26deb90011f7c395852feb44144b8263c413043ff4187727c7dd,2023-10-04T21:07:05.703000
@ -229974,7 +229974,7 @@ CVE-2023-4199,0,0,c7095e600e2e6104c16cd9da29e380b6a8276a658fe0fe7adf07a5b20c4faa
CVE-2023-41990,0,0,4cdf41ae5457182e2854914f83e208b2b103461a48653080b69c6bc694e9ca27,2024-02-16T18:45:01.993000
CVE-2023-41991,0,0,b9b7eeceae5fb1c749856b474c11967b1f94ed12b649a9ca87d624eb6cfcea52,2024-01-10T22:15:49.337000
CVE-2023-41992,0,0,4eb24e92af8591fd41a5264722e8726361a4901d27ef469b051a318156e45b2b,2024-01-10T22:15:49.427000
CVE-2023-41993,0,0,1c71cab945194fe2abbfebb0e7101c5f873ca77df6714b50e5f6dfe5c508a4e7,2024-01-31T15:15:10.337000
CVE-2023-41993,0,1,a5ebf50a1c06468411de149019839caee6547ef2870a8a011d2945fcbedaefe1,2024-04-26T09:15:07.533000
CVE-2023-41994,0,0,9d9ed96a7983233cac79f96192d0a87b7a85f153815c6f80ec3cd0d903fdd3d2,2024-01-12T14:42:23.890000
CVE-2023-41995,0,0,e3cc6815d15e6c68ba1ad2369c922ee2a0d1bddabf438d7900aa1668a96a5bd0,2023-12-22T16:15:29.073000
CVE-2023-41996,0,0,4b33e62f353d6c102117ee546f57300f74113d54fc9245a6b2d032ea8b426565,2023-12-22T22:15:07.727000
@ -231204,7 +231204,7 @@ CVE-2023-4407,0,0,e669c07a7dc059be0bd1b4728409504c7b17834b012b01a7143b3f1fe36f2b
CVE-2023-44075,0,0,091daf74eaaa0fe55822ff73dca545ea12eb9b3f14a99e900201c781ab527c78,2023-10-06T22:31:17.653000
CVE-2023-44077,0,0,f742ce7317ff364032cd358a2a9b32548511e2577bc38fb124a1555161e98956,2024-02-08T01:15:26.870000
CVE-2023-44078,0,0,e7930dc4c0042f4f50d7212b8b55ee198ca6ab0d8d9a32241fa37a7329c3fd8c,2023-11-07T04:21:33.440000
CVE-2023-4408,0,0,17b1b9df5a6e223a554f55371a8a9204b951c6589739223148a81fde12ffbec0,2024-03-04T03:15:06.087000
CVE-2023-4408,0,1,091b0b0d5e1cfd7b81d20015e500aa8019139679446883a80eb59aa479088f72,2024-04-26T09:15:08.727000
CVE-2023-44080,0,0,8f44dd93ae9e021e47f3c338b063885856b0579c4a679f698c074decabf4099c,2023-10-02T20:30:36.210000
CVE-2023-44081,0,0,e6a34f57fc1870af14fa217fa0a03c73a472924196905cf3f0227b4e0abca524,2023-10-12T00:42:21.237000
CVE-2023-44082,0,0,4edc17f85492156b37037a4987f6e178c62e3cc7fc3d512e93a29ed66c2b97b6,2023-10-12T00:42:40.427000
@ -231538,7 +231538,7 @@ CVE-2023-44483,0,0,abd458c39d7804f35d86c409409a0a51acd7b59d8a71577458b89521b8ca6
CVE-2023-44484,0,0,3c607aa228a68b964b2db52548635ff25ac48c22853ba49c216d6a5c0f224f68,2024-01-02T16:15:11.687000
CVE-2023-44485,0,0,783d43993598e52c4aa946caec4327e5b178637e838ddc90f5a0e6fb91208055,2024-01-02T16:15:11.810000
CVE-2023-44486,0,0,69e660b2752ca15314f148c70bf76df91d277bf32edc7e9e09d8fad6284a8a31,2024-01-02T16:15:11.897000
CVE-2023-44487,0,0,fad8e2f8b52339c0f52337af7162696b1ec76824950c9358e65e680180b1e953,2024-02-02T15:40:23.610000
CVE-2023-44487,0,1,a1e06b612dc65a1fc6f53db74286c844420d3c0e0a1b2334299b94162e9414d3,2024-04-26T09:15:07.677000
CVE-2023-44488,0,0,2a0e5afb897d8cb72909ca1ebb1e5285fb8773a2ddf2bff312bb80a3fab5c5ff,2023-11-16T01:37:32.350000
CVE-2023-4449,0,0,e13401ba65778368398b487a53c2205295852d929e801d32a588cf912ffa98b1,2024-04-11T01:22:28.753000
CVE-2023-4450,0,0,c53d8c7a7998b0ccf4c896be5ae8139e30b049b43842554fe027579d8cd1b8ac,2024-04-11T01:22:28.840000
@ -237033,7 +237033,7 @@ CVE-2023-5675,0,0,2afc649da9f718a03c8832aa97b201cab4db6707ad961f549c65ca40d5f049
CVE-2023-5676,0,0,c192e1317c9dd9e6e795afdc87fde3c831c86613079a468411f986e2046923eb,2023-11-22T22:39:25.137000
CVE-2023-5677,0,0,bf0403fa11a7a963d15423f4bb38a7680c1d99fd326f3defc8c62611e429b9f6,2024-02-13T00:38:00.893000
CVE-2023-5678,0,0,10ee8f19cb0834ae8a34613205f620c83611435a6974173b992451221b4bf83e,2023-11-30T22:15:09.723000
CVE-2023-5679,0,0,5cd480b6cc7ccd0b2720277841d93ba4628ee4ef02ce20d34193ee4e27a8e14f,2024-03-04T03:15:06.680000
CVE-2023-5679,0,1,dec1659e5e42ba39c76a827c151af3c27f0e229b63208f59a860838a2c78b11e,2024-04-26T09:15:08.843000
CVE-2023-5680,0,0,214b6742640440787c304ef213658edb5018ddf74792231076d1e107b24bdb56,2024-02-13T15:16:05.223000
CVE-2023-5681,0,0,c8515c91e7de329908b78ff5da5c4b7570295fc0bfb78f4f5768b1289e9cf5f3,2024-04-11T01:23:04.830000
CVE-2023-5682,0,0,f6333687ab0645a1fd8953eb4ecc238bde4805dd1880c1dd8846d7fce2a7def8,2024-04-11T01:23:04.923000
@ -237414,6 +237414,8 @@ CVE-2023-6091,0,0,c030733ef31619d8d6493175fde6228dc979143695432976718bf70837f7ad
CVE-2023-6092,0,0,29d6c12d74742133215ae81895362e8792ffaeaedc68872f3a97584c78958e27,2023-11-14T00:15:09.117000
CVE-2023-6093,0,0,cdcbd1e1997de9b83295e1322a460ec7a9df4b733c53160638c79ab78836ce70,2024-01-08T19:09:29.700000
CVE-2023-6094,0,0,fe64a29ca809dd77087aaa4828738c31a5bbe16b56c0195785a6e8bedba08bc7,2024-01-09T14:55:23.847000
CVE-2023-6095,1,1,063b9fc987ce6fe9840675b29d7e2d06898b90480af60f1ef9ea8a2cd48a95ac,2024-04-26T08:15:11.327000
CVE-2023-6096,1,1,3d3e813c350f35059bf11b504d05992497571c882f523653d6fdadf662fb8627,2024-04-26T08:15:11.583000
CVE-2023-6097,0,0,8f471927c0db95c9c443d2b569c30a548ccaade10ba424581756adcc75d923fc,2023-11-17T21:50:46.223000
CVE-2023-6098,0,0,a884ea5c9cec9a8ae0c24d3946c293e66894754a64e111c1bb7e645080a0c3a7,2023-11-17T21:54:07.117000
CVE-2023-6099,0,0,b8fe11324ada285b9d0e78e759658d2387e0ec4bc2c7d7d48f6a6a2955428aab,2024-04-11T01:23:13.680000
@ -237431,6 +237433,7 @@ CVE-2023-6112,0,0,af49c4c4bc744bcc2ee1b4c87739ad21bf87ca007d7142e64e08afa25a9756
CVE-2023-6113,0,0,5bd7b44ff4099818bdd115cc24760ba9d3747e7a2a042be585601a5c63a2e165,2024-01-08T19:05:26.813000
CVE-2023-6114,0,0,3cded372d5c081c5316ad7b631bf158c1f936b766a13d127b36046c252df1206,2024-01-05T15:08:00.537000
CVE-2023-6115,0,0,24acacd56f69c2299025b1b25e6bcea11e1bac46384e3a27a5d55fdd10bf6c5c,2023-11-14T00:15:09.233000
CVE-2023-6116,1,1,1ca8acdcd802088f8c48fd39c5b8e3938ac5646f04a12da16ac1f84f73fa3787,2024-04-26T08:15:11.797000
CVE-2023-6117,0,0,23ffc5f4c90a279ac244adcf67ed121b77f5bce3b75efa2fc7c1f1221d790e64,2023-11-30T04:57:56.360000
CVE-2023-6118,0,0,185b02f0f82d3669ee7d955ce632c2e7e3f4b765df0085b453c9c70d7373b586,2023-11-30T21:03:09.543000
CVE-2023-6119,0,0,6fa8c2bdfe58774c0eadb834ea8a4a17c61f17e55241a9e2b26790316447df0e,2023-11-29T19:32:07.657000
@ -237443,7 +237446,7 @@ CVE-2023-6125,0,0,2e00f32201259639e50997e6e826e4503bf2e37b59d034dc77a357159a51bf
CVE-2023-6126,0,0,d3bc6c5eab2daa7bc87b0c35afe4663a5f89789dfb523f0d366461cc962f1ba0,2023-11-17T17:59:32.487000
CVE-2023-6127,0,0,cbc528ca6c2f4d426493b21c45c9756ec6b73a23feda062df5cd6f6147f97119,2023-11-17T17:58:50.183000
CVE-2023-6128,0,0,18a5185c872c0195c00df7b4cefda8a4ec9e052028ee22a9430a9442f1b3e276,2023-11-17T17:46:55.197000
CVE-2023-6129,0,0,1b080a1a26a2f3299110bfcdc61805c292589350768c30bc91a7bd92d5febdf4,2024-02-16T13:15:09.910000
CVE-2023-6129,0,1,43e66ccf22b129c3c495ae4baed564cdbb3fc2729b1f53557763b6940f3ba104,2024-04-26T09:15:08.910000
CVE-2023-6130,0,0,8239845a39313eacf028b2bd63492686b07fc70f3767d7058e75c10c52bfe245,2023-11-17T21:28:58.080000
CVE-2023-6131,0,0,21c0fa6db4db155f01eda37b69f1ad685fb7a96721612d297d93f2ddfa5ed708,2023-11-17T21:28:31.490000
CVE-2023-6132,0,0,fede4b64bb05a0d8ba325ed71575084f395f4d8796bbeae1c8737cc00109ccb1,2024-03-01T14:04:26.010000
@ -239031,7 +239034,7 @@ CVE-2024-0841,0,0,00c1a87332bcc448f20d823e8d7d15c699f2b88301134bf45ff680384c84d2
CVE-2024-0842,0,0,2d4febcc0a5bd3f6b5f6eeeb222e1bdadfd7499df5c95fd0f9cc7e2a10a87dbd,2024-02-15T19:11:14.253000
CVE-2024-0844,0,0,9b0ede7ee0379ed34aa516e6f2cba464e96d05ae45278d47c03f7b0b4baaf7d5,2024-02-08T16:15:39.903000
CVE-2024-0849,0,0,ab143b9a0b5d37d266faac9cd54f50fee666b57f962e8e1bec5db73357a455f9,2024-02-13T19:16:30.810000
CVE-2024-0853,0,0,72eb57fa9d91eeed9b78ea6861ab48b720d6a39710ade722cce53b9624df3bc8,2024-03-07T17:15:12.657000
CVE-2024-0853,0,1,10d2950cab7add5c8b74a387f490bd3fdcebc839d913eb1d487dd6b215cf9d3b,2024-04-26T09:15:09.023000
CVE-2024-0854,0,0,b2a19a635a88b4ff68549abb31f11c392c07f9e329d9704350bbb3ee75810c41,2024-01-30T17:01:37.127000
CVE-2024-0855,0,0,fee06b61accc977f963cdb2b2ef743d4f7ee62d05033c371692bc8e3d7ebf823,2024-02-27T14:20:06.637000
CVE-2024-0856,0,0,8a983d8c50be1d3613f19eded6b95fe0d8c3112f3be2f7896b7d9e22f3aaf5cc,2024-03-20T13:00:16.367000
@ -239274,7 +239277,7 @@ CVE-2024-1135,0,0,2f6bc90f330f2812b6ceb34e2fa1ad9c1c5eca9415bce0719ca3f92f74cd24
CVE-2024-1136,0,0,609070256c4defa988e1113275bf8273fe15f50574e00ed3dcfde13143e471cc,2024-02-28T14:06:45.783000
CVE-2024-1137,0,0,9f8c1cf74ca4778ab709faeea998997368a7f042480977a7d6535f2dd892d7f7,2024-03-13T12:33:51.697000
CVE-2024-1138,0,0,0bb26866b03e9dd351d8284004467140fe2cfdfbd72af071fda864e5a2dc9e58,2024-03-13T12:33:51.697000
CVE-2024-1139,0,0,fcb53b016a89db0029717168444fac33ac9c8268f043f5b1ef53bbb358230373,2024-04-25T17:24:59.967000
CVE-2024-1139,0,1,7c10a081b52deeb6bf17c8aead933de0237a8edb19d8cd0f48777aa131178e29,2024-04-26T09:15:09.103000
CVE-2024-1140,0,0,113ab98fbbd3f38fc36026b5aef44eb4b38cd7d347ba07fcabb6b9d9a69118a5,2024-02-27T19:17:32.253000
CVE-2024-1141,0,0,2d32c65ed599159df83e8a47a1f55987e8e9877658103a494dc3a1f00162db73,2024-04-01T15:52:06.640000
CVE-2024-1142,0,0,00d2baa79f6b61708bb1dbc0a1a3ef8f1bea10f64fa60e391934eddcb51481c3,2024-03-21T12:58:51.093000
@ -239760,7 +239763,7 @@ CVE-2024-1749,0,0,333be4b88192e2e4c430588986a6c08bc8d18a961724558cd63d34341f9df2
CVE-2024-1750,0,0,e3bbc65ee5131d172a658128bbf945392e55621bf205fc2f71228c3e1b5f20b2,2024-04-11T01:24:30.157000
CVE-2024-1751,0,0,7aa616bef5e27ed13b371ce9dacd4080fc5ffa6154b1e45a0ce11f0de1f1df9e,2024-03-13T18:15:58.530000
CVE-2024-1752,0,0,3b691eb63c202be2eb926d4c3601a8229a1e699fd5812dcaec474adfd9c6bd05,2024-04-08T18:48:40.217000
CVE-2024-1753,0,0,aa30df1cb172801f871eb1fa3df691669f8009710c533f5936be4b1cb4f55960,2024-04-03T02:15:07.693000
CVE-2024-1753,0,1,d4184dde14f41b28b8c5025367fbdfec6752c2aa224d3be8e304ee89a1814ce5,2024-04-26T08:15:12.060000
CVE-2024-1754,0,0,bb1af71458eba5bdfb6b90e382cbcddd60b96fb9bcb7aef4fa5483aa2a532c8d,2024-04-15T13:15:31.997000
CVE-2024-1755,0,0,c4c00c2e9213cda2dc6708362bc52ae20ba1dfc3c894f2897c9375b229ad840b,2024-04-15T13:15:31.997000
CVE-2024-1756,0,0,62e52d79aae78b309e4cd5e4ccf86fb8ee93e230c568d1d0b7a63a1cf36aba4f,2024-04-24T13:39:42.883000
@ -239791,6 +239794,7 @@ CVE-2024-1785,0,0,876f54e758144e65bdb2dbfed145663c2de508f0271124e6075f587cf87035
CVE-2024-1786,0,0,8d272bb934edd6ba22bea71862b8c1a4f9dd955b8b61c076d6b42c937a212ef5,2024-04-11T01:24:30.693000
CVE-2024-1787,0,0,4146a54c8ed6fe4a4bd4ac127005b4c82b6cbf8a65b06534af23146a4cc88e7f,2024-03-20T13:00:16.367000
CVE-2024-1788,0,0,880181e49a800669246c4d4cd32ccd361560cda70996b821fd2bf7b522fa9d8b,2024-03-04T13:15:44.523000
CVE-2024-1789,1,1,7ef8e657f7f02a7d374125039e6483a1fa4efb90d64c9213b4900fa70beade86,2024-04-26T09:15:09.213000
CVE-2024-1790,0,0,b8412da1a4c3f521dd650e697e4a3d85fe859c9cf5470ebe731f0a2e75023a71,2024-04-10T13:23:38.787000
CVE-2024-1791,0,0,94b807664cc318fbe90aaeaea162bfe11604582cb7b653dcbd8bff403308918c,2024-02-28T14:06:45.783000
CVE-2024-1792,0,0,a70c1954f887a10d02e564a2dd7108def38a57268e885b26020a4a15e640cbe4,2024-04-10T13:23:38.787000
@ -240396,29 +240400,29 @@ CVE-2024-20989,0,0,1099698bdd22d39f9e25479c50b0efd206bf85aad553a1e3f77c7b4a07fab
CVE-2024-20990,0,0,d40aaaae46d3a5fa8355d5298d9c8617ba7ddcfab984f3b5ca25b46a177af7b9,2024-04-17T12:48:31.863000
CVE-2024-20991,0,0,d04ea58647934f66efbbeb3379f091486fa915d04eb4ee7cbcd83a9f8dbd19bb,2024-04-17T12:48:31.863000
CVE-2024-20992,0,0,5c7cfd024f695fd73c7feaaec20c6f4cc8fc9e334a8defeab9c811fd17e29167,2024-04-17T12:48:31.863000
CVE-2024-20993,0,0,72f8e8c32c6de7ef2e9788cd36709a3e68ff4a57347045317bf4d73bae761208,2024-04-17T12:48:31.863000
CVE-2024-20994,0,0,b5f5e0a9e8a6be7fe7828caea12e7d0386e93ea7df7f0aae0e352a68a4367a32,2024-04-17T12:48:31.863000
CVE-2024-20993,0,1,c76300dcc4585f2fd56825f1fae341382d1cd779fec3e9fb9411c2853b2830e0,2024-04-26T09:15:09.417000
CVE-2024-20994,0,1,b3403ec5f8f7e61f7f4af0c6aace34821d061ec3c3a5defb0a1731263df52eb0,2024-04-26T09:15:09.500000
CVE-2024-20995,0,0,b95ab7ba1796a5c7c3d8cca5a05491e5c3405546d94cafab94c4e486e52dbfc6,2024-04-17T12:48:31.863000
CVE-2024-20997,0,0,a0562a98fec8a4ebdffc03b42c8a9bd17be145809ca03786920461d7f7935e0b,2024-04-17T12:48:31.863000
CVE-2024-20998,0,0,96dd78d69c02e408e75ef50fd9ad7830a63a57a680fb7f8ab10cde65d262dc87,2024-04-17T12:48:31.863000
CVE-2024-20998,0,1,85de6ffd6030cc8a221ae4016bc0c4c8c05647ac9c3e97be0058ceba11b095e5,2024-04-26T09:15:09.567000
CVE-2024-20999,0,0,38d72c1914c2f7cd32bbca38dbf6b31d7cdb66a1301d3d4028479f0594575e11,2024-04-17T12:48:31.863000
CVE-2024-21000,0,0,8d2efaf2a3706f357d5510fe423a69ed1f2164d79355e1c8d99469a7ee6fc42d,2024-04-17T12:48:31.863000
CVE-2024-21000,0,1,b798a7a05ed2c5c61deffa53fd920f65f082fefcd1be9dcb2f05765ff755e538,2024-04-26T09:15:09.633000
CVE-2024-21001,0,0,3ea0c4d6e032b3ca8ec16b34404a4967da44fa0d30a3f03ab34610e8d8a28c90,2024-04-17T12:48:31.863000
CVE-2024-21002,0,0,ae6bee545c68a7d8988256c0575d1ace87a5c7a690da7a83a89f0ecd8a6f25a8,2024-04-17T12:48:31.863000
CVE-2024-21003,0,0,19e5512e083323b4346eb914dae95d1df35c630e6cd102f5b2d783e1c651871f,2024-04-17T12:48:31.863000
CVE-2024-21004,0,0,a403b0423950f749e2642568ca13532dbbfccd822f14e940da0d7ee2e2d24f29,2024-04-17T12:48:31.863000
CVE-2024-21005,0,0,8f177a15ee6ad4a78a1d4009e3187651c8eac8438be37604962afc63c73254f1,2024-04-17T12:48:31.863000
CVE-2024-21002,0,1,912079d25edc735374135830d5e38e11308fc296dc1524a0614b28b00ea75838,2024-04-26T09:15:09.700000
CVE-2024-21003,0,1,2c71360234bbd88e8e1ffe30dd6c2d57548d38b1fc1ad2177acf6fe245551297,2024-04-26T09:15:09.823000
CVE-2024-21004,0,1,9c8d18a475fd16283e8e319d765bd94c58704b78df42c7bd6a9b9793fec706a8,2024-04-26T09:15:09.933000
CVE-2024-21005,0,1,0242b6ef89ff4f42964dcb9c191790e8b5db8cf4176ffe3303956ff8a5e8f568,2024-04-26T09:15:10.030000
CVE-2024-21006,0,0,24276fa121e200514fbab563a229066611a958ddf026b368bb42bffc3d6d1536,2024-04-17T12:48:31.863000
CVE-2024-21007,0,0,5e79b59d23f74227973014469c9c006292d5a48a207617d864ea85e415e8727f,2024-04-17T12:48:31.863000
CVE-2024-21008,0,0,1f74aa2bfb98889c1bed8925030ffa9517c511fc8005172f7be9db4e39a2d548,2024-04-17T12:48:31.863000
CVE-2024-21009,0,0,af97e37904620b744b697a7c41a38f3bc0333ea61492fd7779760f5a79950296,2024-04-17T12:48:31.863000
CVE-2024-21008,0,1,180cac58dafa1a6df58140c22b0eca553c92b315a62e4ef184cd9f39162279ed,2024-04-26T09:15:10.100000
CVE-2024-21009,0,1,18229ce1f393c1090ccc124960e638f3e12f15d4c4376268b2d606e28dd897cc,2024-04-26T09:15:10.177000
CVE-2024-2101,0,0,c8a12667f3958d332efb261f4cb3c420df5b094482122aff9dbb41fd78e244db,2024-04-17T12:48:07.510000
CVE-2024-21010,0,0,0583ed22b473d6988a741927f390c519f270906aef73a2591d45e4735fe791d0,2024-04-17T12:48:31.863000
CVE-2024-21011,0,0,8f8c368ee3f30b65341b77ece082caabad559cb8815d7702ed7d6231b225272a,2024-04-22T15:15:47.380000
CVE-2024-21012,0,0,efcc536381b894205d2c997792afa24e2ccb5279bf98472cbea3d0304933b6da,2024-04-22T15:15:47.473000
CVE-2024-21013,0,0,db21600de0498200b832ed44aabc58eb8b49c1d4a8d6c8cec7db7074ddb629ed,2024-04-17T12:48:31.863000
CVE-2024-21011,0,1,e51db7fcde12c70e147c567049e27d3541f52ee809a17a8d7464122ff2dfd216,2024-04-26T09:15:10.240000
CVE-2024-21012,0,1,1ba8160029b175c6622d869a0e69ea4e7de662e09959c9853286e890342c833a,2024-04-26T09:15:10.307000
CVE-2024-21013,0,1,6e30c4aa1baa0b00a8e15e0b9f7d28d136b57f26f5cb2d1ad7669cc31adc0e9e,2024-04-26T09:15:10.370000
CVE-2024-21014,0,0,b080b2efe5f2fb3649d836e7607fe2a15a5965b7e113573ba21bc7eaa39a2434,2024-04-17T12:48:31.863000
CVE-2024-21015,0,0,f3158fa1ebc013f3ee7e3704ac259afbfadb34d45c753fdc5d90a070e709ed84,2024-04-17T12:48:31.863000
CVE-2024-21015,0,1,ea5567f1cbb685bc8fbac0a611486dcc7ac0c356f4ef23cb3183c111dd29bcc0,2024-04-26T09:15:10.440000
CVE-2024-21016,0,0,4c3ad5a49669763de2f73fce64666f049b86c2fb193497660cf9decc483339c2,2024-04-17T12:48:31.863000
CVE-2024-21017,0,0,4ec8c4a0bbf41e6c3c752fb69bf253b045b4bb72205aa58b04c616812b4b7dd3,2024-04-17T12:48:31.863000
CVE-2024-21018,0,0,e0675cd160267d9376d85a38011a6863fae1399733907b8655543ea315aa93bd,2024-04-17T12:48:31.863000
@ -240452,30 +240456,30 @@ CVE-2024-21043,0,0,dc53e5b2fe828c248a1b79bd90c649b6e9d473f8d2bf850bfa71770b33e88
CVE-2024-21044,0,0,f5f0129664ed5d5f4ef6ba4b8ff7227550db0957efcbf9e27471a8341fd1353e,2024-04-17T12:48:31.863000
CVE-2024-21045,0,0,a3c2b9878bba51820c773e32fc44034cb31f47d9579db1ed3eeab399c07f1a9b,2024-04-17T12:48:31.863000
CVE-2024-21046,0,0,13af5418e2a34ce6167e6ab981ecad17f165025d8704a841301a1fba4468c0ed,2024-04-17T12:48:31.863000
CVE-2024-21047,0,0,e38834140f8b944f78da6f6fb25c51da4f3a85fda323ca934705e923232f602b,2024-04-17T12:48:31.863000
CVE-2024-21047,0,1,918119a0efff6c685604ffe2d05dc98f5b40aca5161da05c5aad375bc55a7bf6,2024-04-26T09:15:10.500000
CVE-2024-21048,0,0,7c4ad44b360736f7e8a0910dcc5802fde181125afe297ec3d8d4f833b676c612,2024-04-17T12:48:31.863000
CVE-2024-21049,0,0,a1a753910647db623bcbefc6825cfaa0c33250a562818f48ec3b04c902de88ac,2024-04-17T12:48:31.863000
CVE-2024-21050,0,0,5d6aa75fa7939279ac58d6386d2cf96ad09d2acdb11fa94832c977805deb1587,2024-04-17T12:48:31.863000
CVE-2024-21051,0,0,e8001505ef0efbc2904b6cdd5f70dd1420d4bc0e604e77665b6146e96fd3836d,2024-04-17T12:48:31.863000
CVE-2024-21052,0,0,5bcd819f0c7d0779ca8508bd66b5e1f8037dd3c8d550bc7fa5fcdb35e1167703,2024-04-17T12:48:31.863000
CVE-2024-21053,0,0,5f3690c8b6394d324badf842cd9e0ac255e25fec8acb1e50c6fcc7a9b443ad7f,2024-04-17T12:48:31.863000
CVE-2024-21054,0,0,9ea8b742b5c841e05e78c0f7da0539d289cc401f142cc054e2b7bd87d6c84312,2024-04-17T12:48:31.863000
CVE-2024-21055,0,0,065746b7f94228f556df7cfe20a9a0f30b84537f8d3d78b9c4dc219e027bbaef,2024-04-17T12:48:31.863000
CVE-2024-21056,0,0,d05743f80d00bccaeee3cbbe1aa70b0a119dd03c55418635ce7a218b4cf85a36,2024-04-17T12:48:31.863000
CVE-2024-21049,0,1,7054a195f3429edd9476cd9dfa40257598e09d87ccf8f54b2b49bb0bfb4da7d4,2024-04-26T09:15:10.567000
CVE-2024-21050,0,1,f98fec72eb6309b4b34ce86a8c3fc1af06635e46cd1cd5c3eb0a8d6c20caca8c,2024-04-26T09:15:10.637000
CVE-2024-21051,0,1,730cfd973bf7091010cd7d085d104e60aabba29ee2a6c8c244aff9d1cbbed2ab,2024-04-26T09:15:10.703000
CVE-2024-21052,0,1,8fcaea640b31493e5de3c6ccb4ebeb658571630df3fef65a5175d6e228e8694b,2024-04-26T09:15:10.767000
CVE-2024-21053,0,1,c2c0a8c5dcab83286aca7e7963eac42e47eb420c2e3d2a667e93e64c217a6979,2024-04-26T09:15:10.830000
CVE-2024-21054,0,1,e24c12fb30efee61e27276f118ec633c2f2181c3cc815f52a626e859d3b61ead,2024-04-26T09:15:10.893000
CVE-2024-21055,0,1,2df92d5c8d1855c6d37c903263abdc53486ae44cb92f073c6ae1754af77b63df,2024-04-26T09:15:10.953000
CVE-2024-21056,0,1,579cbfc70c1c9aab939983ee7e32b20bd0bb975794ba9eef2d4101c6cd0ec5ba,2024-04-26T09:15:11.017000
CVE-2024-21057,0,0,ad7960b918cba84a9285e5b5081ac7265ed8f95ac167f4cd8446241a852a140e,2024-04-17T12:48:31.863000
CVE-2024-21058,0,0,eae646366535f64911b6f5c11cf05f1d61655fe725482e333195d91352108784,2024-04-17T12:48:31.863000
CVE-2024-21059,0,0,d0601741f771540671417f30cde21017e42f48bcbaa909a0b589bd2b89204ba5,2024-04-17T12:48:31.863000
CVE-2024-2106,0,0,15de6b929ace188c18cf26b3c461a92f15449ebc8c35903dbddfc1b7b27db756,2024-03-13T18:15:58.530000
CVE-2024-21060,0,0,3adc5db380329c2a5b56a0c3ebde28cdf3b61ed34fa861ceee80c7f5142f8a31,2024-04-17T12:48:31.863000
CVE-2024-21061,0,0,51d92b8ebe655e1b6b499d0a31b659c7a916e5d7eef7efc3eaec50f44827a983,2024-04-17T12:48:31.863000
CVE-2024-21062,0,0,618793b1d7cdd6ec2f7aab886d0b30fabcf867ba7b496e9d9f123669957cc7d3,2024-04-17T12:48:31.863000
CVE-2024-21060,0,1,b942e5dad21401bfd1ddb5c1762fba0f27820544c03df6084d9db3684eef12f2,2024-04-26T09:15:11.080000
CVE-2024-21061,0,1,c067c76274d3dd0d768c412c439a785c45be17779bda9b8868cf83195c350110,2024-04-26T09:15:11.143000
CVE-2024-21062,0,1,8c99a8a390e279e41608a032223c81c88432586b692c9bfab98f514db375d2e0,2024-04-26T09:15:11.213000
CVE-2024-21063,0,0,00386ec9dcc1fb2e461a93486ecd091af48c62d800497f6a70a354e04b74b45f,2024-04-17T12:48:31.863000
CVE-2024-21064,0,0,9f3d1dcc2da77fdbd8284a8907c4fea172ce50f42d0e165f15cd0a1ff6590ae3,2024-04-17T12:48:31.863000
CVE-2024-21065,0,0,5c383c00c861b9299dc3d8d083a6c7b2ef320b710a4f76187481f80141c2960a,2024-04-17T12:48:31.863000
CVE-2024-21066,0,0,de5f164f54f519fa892c56099d5df7cc21033da5ed96c3454d6c06c478b93607,2024-04-17T12:48:31.863000
CVE-2024-21067,0,0,a54cc3b06c3985193c6346b3dbabf214dd2faeed68c1d4b7f9a909ecc6ea6d17,2024-04-17T12:48:31.863000
CVE-2024-21068,0,0,90b056284ac67c84f3312caa17843414162f46147b609efb3ab8bcab9df91c74,2024-04-22T15:15:47.540000
CVE-2024-21069,0,0,1356f0035f59f4ebe3cabf5fb137a1d458f1cefbb702a427e5d48bbf638d91b4,2024-04-17T12:48:31.863000
CVE-2024-21068,0,1,925ab1df7b4fc7b2307589563b56953da02ae712410669caebdddd5ebcb570bd,2024-04-26T09:15:11.273000
CVE-2024-21069,0,1,87d696eca5e17159ac8157bf45da621592d6c3e7efa7c60a73c51b2eb6a682a6,2024-04-26T09:15:11.350000
CVE-2024-2107,0,0,b116f601239eee1477d732dcdf4bd402d2ca5c711c20a89df0a8e9dd54cd4cd1,2024-03-13T12:33:51.697000
CVE-2024-21070,0,0,e8030e5c2290cb4930c1b97772fc5cd61f6499852535f41c7c876dacccf80408,2024-04-17T12:48:31.863000
CVE-2024-21071,0,0,03289049dae9db581ba288f8404b2ec6bffda8d448aa4ca077c7b01898c361e5,2024-04-17T12:48:31.863000
@ -240493,25 +240497,25 @@ CVE-2024-21081,0,0,8525b7c574e97940ea59e5c3f9b60a1dccb8ad8d7a8590b7c7a54ff25a5e4
CVE-2024-21082,0,0,c26bfca8435f62f7a91a96e3ea3770988e364ed37b65c6e9e3c3fa331f2f9538,2024-04-17T12:48:31.863000
CVE-2024-21083,0,0,1bebe608617a7b6c263f2bd12f08aa2fed726df83e43e9cb80226396336525ef,2024-04-17T12:48:31.863000
CVE-2024-21084,0,0,1cb8a741188b441a8430ab8dada3a0d4db99599bc63794a25c2cddb40535089e,2024-04-17T12:48:31.863000
CVE-2024-21085,0,0,7423bef7d293723948e7f7692336a4c4f435c8fc76c92741a8460985a7e7c3fc,2024-04-22T15:15:47.610000
CVE-2024-21085,0,1,0058a664b0df21c244c1d472b5e2011b273e74051e0bea775e1fbfbea1bb74a2,2024-04-26T09:15:11.447000
CVE-2024-21086,0,0,6225dbda94f0cf6447c5470d5f742e2b6c9860df4608d2672fbec36d7710ddae,2024-04-17T12:48:31.863000
CVE-2024-21087,0,0,a583c55d3bff66d9e8b3ea3e82126959d82631d9ebff26ed8c89dc44f6423327,2024-04-17T12:48:31.863000
CVE-2024-21087,0,1,f8237848d938fc88482015bdb3b6d1a78dccab6ea7842d043b863cb9cebae2ad,2024-04-26T09:15:11.543000
CVE-2024-21088,0,0,0b47b6e6f749e55fe17c53a0cff2705786e752e1ca3d888cedabbece54b4b377,2024-04-17T12:48:31.863000
CVE-2024-21089,0,0,7ae0e2f140ca265b5d64456eb374dbc3af60cb417339d84d08e68381e3cd98b4,2024-04-17T12:48:31.863000
CVE-2024-21090,0,0,60f046f0a9c5304d80718309bd3f85c9cf0c6185072eb892eff16f11c4191497,2024-04-17T12:48:31.863000
CVE-2024-21091,0,0,44e6366ed6ec2fbfb62bb3aa882742738c04c1e25886d4262fb2f0c2b7a75b22,2024-04-17T12:48:31.863000
CVE-2024-21092,0,0,a96f28afb2f79eb08be708f78284cdf08500da8888a0d9699ed9e4b0d6e8e593,2024-04-17T12:48:31.863000
CVE-2024-21093,0,0,3d565421d62fe80376ef2125e9dfb06fdc2a836fda042dda6ad1a1534f2a4f7d,2024-04-17T12:48:31.863000
CVE-2024-21094,0,0,aa2a61960fd4fa521e8a1ca2553d138d7964c870b77a3be8a092c2a795bdfda4,2024-04-22T15:15:47.683000
CVE-2024-21094,0,1,45dda780f642e6a4bed8a6906d75e79d99e2cd6f95b5c06d841ff6133c98a162,2024-04-26T09:15:11.613000
CVE-2024-21095,0,0,5ad9583e4e50b36f664407f6f6164a53dc891483d679c27c4541f930caca17b4,2024-04-17T12:48:31.863000
CVE-2024-21096,0,0,ca67a44a0e0eaa923750522145c8947551bcd426be3766e54dffcdf25890c9ef,2024-04-17T12:48:31.863000
CVE-2024-21096,0,1,4f32780ae5e28458f2ccddfae5bcad756026bb0de4afeda793309b07a06d714f,2024-04-26T09:15:11.683000
CVE-2024-21097,0,0,8349406a296787533db135239586ab1e354af73ee7e59b17b17098f82af1b697,2024-04-17T12:48:31.863000
CVE-2024-21098,0,0,831ff7ad8d2c7af64e56d89acbf46d4cc91ab5d8748a94e6b6ad4c192afd1308,2024-04-17T12:48:31.863000
CVE-2024-21099,0,0,a8cfc88916a19c4050e2f5c67f5f573e697d20587d6396cec4852563c2a2b6c3,2024-04-17T12:48:31.863000
CVE-2024-2110,0,0,1d85de629a97570a97242f5d089550bba2e60a5923838c39c1151e294a5fdcf3,2024-03-28T12:42:56.150000
CVE-2024-21100,0,0,af6cffb0e0f6aae56d794497f70f97e4a84ef698b88ffe8d33577d53eb93d579,2024-04-17T12:48:31.863000
CVE-2024-21101,0,0,1f9e2a6fad8918e7ac06fa980975da063ccfd0f3a92fff652ef36f600383191d,2024-04-17T12:48:31.863000
CVE-2024-21102,0,0,ac72369f1d359c6a6f900c9810273301debf5573205b12f9d3a5703ac9e97a78,2024-04-17T12:48:31.863000
CVE-2024-21101,0,1,0211a2aa9549834c29504b837c60e0f78abe166f7178dde571f87f6dba739e23,2024-04-26T09:15:11.750000
CVE-2024-21102,0,1,77bd9ccd93d37b7215a3cbfb08f0ebda21e1d1a7ad6e291d055f22aa80163473,2024-04-26T09:15:11.813000
CVE-2024-21103,0,0,da07604f216fc47762cc3558419009b27ee70b9a7579c84b768140ec3056e0d7,2024-04-17T12:48:31.863000
CVE-2024-21104,0,0,7d7c80407ef04bc733a3eeb547cb035ca30c1fc982a790df18c6a46533ef0669,2024-04-17T12:48:31.863000
CVE-2024-21105,0,0,c58e4dcf9abc945e03aaff2ad3b2c6e3c65a1dc3c33e82bc37b3e354bdcfdfbc,2024-04-17T12:48:31.863000
@ -241010,6 +241014,7 @@ CVE-2024-22086,0,0,caac68f21275279653fa2eac0d4515b609803b0b74511cc0ca396756f082c
CVE-2024-22087,0,0,3bed8292ec524894fc0b4fe8dc2027c662afaeeff7b4dbd00214d4fc1b7ce8b4,2024-01-11T17:03:51.967000
CVE-2024-22088,0,0,754170cc6c96efa135c7c7667ac8c5d4d79d7cd2abcaaf938446792b9a2bc8b8,2024-01-10T20:05:19.737000
CVE-2024-2209,0,0,eeaa5baaa32a49eda6878a59f2ebb6696131e5d9ac6771a3c4e8da4f915f93d8,2024-03-27T12:29:30.307000
CVE-2024-22091,1,1,0ccaa7159e772c2ba1bc028c933a09529def018166ae7ea09a94bd3354c7f0ef,2024-04-26T09:15:11.880000
CVE-2024-22092,0,0,35cd11c9c07a47737b4e29cb95e656383a3704154bd1a4578e67800eda161eb7,2024-04-02T12:50:42.233000
CVE-2024-22093,0,0,b7c449b9319413a66024fe7dcdb8bf0035d00dbeef636282eb761ad13794295d,2024-02-14T18:04:45.380000
CVE-2024-22096,0,0,330d7fb3350f034a1e0c8805b47a2db6dbe2ceb88846f9ddfaaa7c652ddde766,2024-02-07T17:33:26.800000
@ -241509,7 +241514,7 @@ CVE-2024-23116,0,0,c69470152165ed3c6f07842580a9d276db25fe5e384880b4a7931b780caf1
CVE-2024-23117,0,0,879d7d05d3f28235be6d3551861450f70c4e2f56b92f39afe7f23938cb7730c9,2024-04-02T12:50:42.233000
CVE-2024-23118,0,0,2a710ffc24b98413c0e2df0c0c64682e3878440889d1038072b49d9104f7509a,2024-04-02T12:50:42.233000
CVE-2024-23119,0,0,dc7a02dfe6c2319112aa9c9c7ba24d29c0a54406c32b5bc7828bc06ecc1e505b,2024-04-02T12:50:42.233000
CVE-2024-2312,0,0,67b34d6f82234370a21d304a50f41d547c6298b6b869842388e8a3a4f564b2a2,2024-04-08T18:49:25.863000
CVE-2024-2312,0,1,b61108ae65321d61a758b0c732ce308a7e62bd5c3710897745a7af4ce6324077,2024-04-26T09:15:12.073000
CVE-2024-23120,0,0,1fdd5384a3247451b572eec50acc63b80f4302d338e02a15db81dbcc92866844,2024-03-01T16:15:45.920000
CVE-2024-23121,0,0,ae89a79fcf6c313d61197ac6f338d68b00711a8ed1e7b84e5d9691d517b9b085,2024-03-13T03:15:06.320000
CVE-2024-23122,0,0,53a6a7f808f40f9f8ccc6c9426a05387fb59e2867d6b512f9c97f02c17acdf90,2024-03-13T03:15:06.390000
@ -244773,6 +244778,7 @@ CVE-2024-29195,0,0,12b6fcead703f320c2faaa3dbf933701901e834c51cbd479cd70a3447afc3
CVE-2024-29196,0,0,e02aa4919ed0d6b8af5e1fbc5257465a64fdae2f23d9b9aaabfbc3da2c0d39fa,2024-03-26T12:55:05.010000
CVE-2024-29197,0,0,858dd1bb84d1ebe6698f05d7dcbe5bf56e67ebea01a2e217e45dddfd661a75cd,2024-03-26T17:09:53.043000
CVE-2024-29199,0,0,78313b772930e0d3c119e70c910c05a3509fc574028745b1b9c80a0f992c34f5,2024-03-26T12:55:05.010000
CVE-2024-2920,1,1,8410dfc9e792ac7aff7b47f65d4740a258b943ed52abd67da927c900d6eaabb1,2024-04-26T08:15:12.203000
CVE-2024-29200,0,0,2fded465a0d157f739ca7c28831045e810d35e1ed39056bf30a71fa62dc84b9e,2024-03-28T16:07:30.893000
CVE-2024-29201,0,0,5033916f5c6e37ebfb2f1925ef22415c52e7214153fce901347173dc9b9eb9c1,2024-04-01T01:12:59.077000
CVE-2024-29202,0,0,2407457fd23b926dc515687b0bc64391303eb3a1899c8635138115822d2488d1,2024-04-01T01:12:59.077000
@ -246061,6 +246067,7 @@ CVE-2024-32039,0,0,ad4990c66c843cfb78c18ddf4863c9df097d3c92a62d93c490b95501745f6
CVE-2024-3204,0,0,2a2a133d829052d72380a6f7a45e32f6ecd96ec6da65fdbadcbe92a1f79d774f,2024-04-11T01:25:55.933000
CVE-2024-32040,0,0,c9e8a9bafebd4e002463be520ee967b3c928ddf4cec6865e7aa23fa1d81b2834,2024-04-23T12:52:26.253000
CVE-2024-32041,0,0,e88f61c8c702a5d00724562a1be23c2ca0fc9ec03e84f95db2dfed035982cfb4,2024-04-23T12:52:26.253000
CVE-2024-32046,1,1,fe58d32837688e75837a3054b1a147db2781db55145575b7901479b793653292,2024-04-26T09:15:12.157000
CVE-2024-3205,0,0,befb48df2bb5e20af3b4383c1ef82865b9f9fb3145e096ffb7e0098ff096b4f8,2024-04-11T01:25:56.010000
CVE-2024-32051,0,0,6b68078466255ceca82525e73c2bf321431fb4aeacd1939a9b40ac3cfa9637f8,2024-04-24T13:39:42.883000
CVE-2024-3207,0,0,a57734da301192d6a9381ac71eef9bc84e6acf70886d5628a9c0939255320fc2,2024-04-11T01:25:56.090000
@ -246518,12 +246525,18 @@ CVE-2024-3357,0,0,4504c33b3bb653378795a255a83c05295c4cb93d37914e6c8a1edf8397686b
CVE-2024-3358,0,0,694a0960c89fb254bc37c7c2f594e5cb197e9c3b955cd9433f44c414aff75d2b,2024-04-11T01:25:59.610000
CVE-2024-3359,0,0,a779b2e33399e3789113d39f065b1425ad824801b217abc54417c2cce7e7d2db,2024-04-11T01:25:59.687000
CVE-2024-33592,0,0,dc3e0d94cd47d0ea73220517b5aaa098a37fe316a3d5e3b0ef33e4a8423b62af,2024-04-25T17:25:05.903000
CVE-2024-33598,1,1,3f9b63fd5124b3c4c33e063e0bc809f5770244ad29d1368cbc67d28d0eff4352,2024-04-26T08:15:12.370000
CVE-2024-3360,0,0,2ffbaa301c04a2d62013f221bb69a21a0f4034a97959f93c6ac130d96a9162d3,2024-04-11T01:25:59.770000
CVE-2024-3361,0,0,c120caf4947180a69c26140d9354a0af916b072bcc15573944dc923bbf223f7d,2024-04-11T01:25:59.847000
CVE-2024-3362,0,0,4f698660b915c64322658e8738d0fb3f09460cf98fd487b3189e8f9d96e2b2c1,2024-04-11T01:25:59.930000
CVE-2024-3363,0,0,f5bcc8af5a66d22a73abe7e86b636154362f284983c790b03385b20aa4737ceb,2024-04-11T01:26:00.010000
CVE-2024-33638,1,1,4e4f1e7644790a0bfb1dc4da745aa7ec35a8ca20f79185e32f06b55784b91e6f,2024-04-26T08:15:12.567000
CVE-2024-33639,1,1,0ce27d3d156ecf7b594497a0ac3f7803d7ff916273e6dd4248564f0211c61924,2024-04-26T08:15:12.770000
CVE-2024-3364,0,0,2986dc00429f74e0e2572cb8153933c26e825f7eed092370bca7e4ac84ee4fdf,2024-04-11T01:26:00.090000
CVE-2024-33642,1,1,3b3f2c46d58606960c2d108729a638055dbf60cf4d2ac19fcde69ec4bdc6a06b,2024-04-26T08:15:12.977000
CVE-2024-3365,0,0,64a2e531185071bb7e6b7a9cf067546b0c6c5f700f703a6639ecd4e081a3dcb7,2024-04-11T01:26:00.170000
CVE-2024-33650,1,1,92b9aa1b09034ce03c5077674003b0f884ebf6a849f1826bf0e8ef3ac4dad11f,2024-04-26T08:15:13.163000
CVE-2024-33651,1,1,c97ae072fa5b5756d7760eb457507d14e160cfdb7ae29d2d655972fdde3a6aff,2024-04-26T08:15:13.370000
CVE-2024-3366,0,0,641beaaa3f9fd7d2de3006c0b03aadadafd130dcdab91419774c604b06cf9b30,2024-04-11T01:26:00.240000
CVE-2024-33661,0,0,a720540c11f666fd8c4f23d288d75213cf5be306e2228f0ae43d82ff0de97bc0,2024-04-26T00:15:08.953000
CVE-2024-33663,0,0,eaf65d2ce8cdafafc60192a1bafd6c646cef2a9e6415fd9da4ad3cf341b6fb24,2024-04-26T00:15:09.010000
@ -246660,6 +246673,7 @@ CVE-2024-3662,0,0,aac492e0cb08799a7f888c46af5bedb595fa2e9ad6dc15c21be50e9dae7006
CVE-2024-3664,0,0,afb9452532a9b46276f3e123567931f2d9b14afd62c66b887c9d751f65c725bc,2024-04-23T12:52:09.397000
CVE-2024-3665,0,0,22dbbd6c0bec2b9f433688ae97b549cd541e7f2d387c3796dd32246c851476cf,2024-04-23T12:52:09.397000
CVE-2024-3672,0,0,b7de207aaf40bb160711ae23312b83bd4f3d950fbf99cf282ee38b1e3854739f,2024-04-16T13:24:07.103000
CVE-2024-3678,1,1,6d5eb93d93cadfb495b170883a8b5b26f4360513ec85acc8b5229fc0058301f9,2024-04-26T08:15:13.567000
CVE-2024-3684,0,0,693360cd268d4b961448865406a570238e347409fa389434d499b6fc0f790dc0,2024-04-19T16:19:49.043000
CVE-2024-3685,0,0,2d04d41485feb8a52bd1142022b18bc3f24805efb219d419e0508c4773991260,2024-04-15T13:15:51.577000
CVE-2024-3686,0,0,811bcae5db0f32a24e5b10c51fcb2c5c47ac8ca123d5e8befb2d943ee92f7589,2024-04-15T13:15:51.577000
@ -246764,6 +246778,7 @@ CVE-2024-3880,0,0,237e3bb93a0b113a1c50538806f68b5377561349bd4f47a9139ec72cd35641
CVE-2024-3881,0,0,9055ecf63e1aedc7e2787afc56e67bc831564d5ee15f418ef1b408c81c24bb16,2024-04-17T12:48:31.863000
CVE-2024-3882,0,0,846c922d5cf92347db05da515dc041ccc83bdcd548fefc386c188946857d0db7,2024-04-17T12:48:31.863000
CVE-2024-3889,0,0,c4039354ee4d81ce5faec2ce618c8f0af30c97c1ad1feeb689836cb585b438a6,2024-04-23T12:52:09.397000
CVE-2024-3890,1,1,933fd852998a68d1f6b06f4cb4253693cd03f3c6092eccc0e302f52938d20f9f,2024-04-26T08:15:13.773000
CVE-2024-3893,0,0,44a15b07d473e504956c2fc6e9bdbbb981ef84a8f1b69c702ee1ea4228dd1195,2024-04-25T13:18:13.537000
CVE-2024-3900,0,0,5bafaa90d65e26f460054cb65a089d31ecb0030e0f85c3f0ee595a0cce123691,2024-04-17T20:08:21.887000
CVE-2024-3905,0,0,666ba6ab36ae43f19518f88ffcc3dc3578e7336eef9fa01b067c40b574dea570,2024-04-17T12:48:07.510000
@ -246779,6 +246794,7 @@ CVE-2024-3929,0,0,31d0a734bfd88727a2a61deb7a29595ac9c8ac4a930ee35c31639990489d02
CVE-2024-3931,0,0,adc8a79b07f48b35a9681a97a568e852ba1ef2cbd3b7271f585750c2d2c4216b,2024-04-18T13:04:28.900000
CVE-2024-3932,0,0,bce0f8b09e2fc4acc0cfce5940d57ce5f1e0384ac19f6c68ed218175688d8f12,2024-04-18T13:04:28.900000
CVE-2024-3948,0,0,427154a0226db385c08a1dc567a28e238ab290a5825189b73e5e958b25b296e5,2024-04-18T13:04:28.900000
CVE-2024-3962,1,1,5c615e9897bcbd9f054de5357a3d10fd7f2f15096f7a2d99bafd8a866c72bc8e,2024-04-26T09:15:12.337000
CVE-2024-3979,0,0,9ef752ac5397ef4280bc4d9888fb417cb985331164bf90affafa759f391a2bfe,2024-04-19T18:29:53.040000
CVE-2024-3988,0,0,ed49ad0e503298ba2fe40c90a665a86dcb918b5087ac61c1edfd746c2ca95d24,2024-04-25T13:18:13.537000
CVE-2024-3994,0,0,b2b5b0b0c4c4fea2326dd93e55a0fe437a44bb4fcb47799868e54f8400b49891,2024-04-25T13:18:02.660000
@ -246795,7 +246811,7 @@ CVE-2024-4026,0,0,65bff2dba626fde0f88488c1e6df610a37e761e2e041855587a3bbcb3e849c
CVE-2024-4031,0,0,4baeaad68cf3411bf45d41e53c64aca0aa19dc8cf620cd2c5028b0d61a50ba2c,2024-04-23T12:52:09.397000
CVE-2024-4035,0,0,c5a100809c68e4eb6a9b717e4eec2ebc0eca46983cf9d752b9f7c4bddb880732,2024-04-25T13:18:02.660000
CVE-2024-4040,0,0,a0c74dcbb8003f53cf76254ffa1dd71c6614e1d71772e98a05f6c7cb5372cc75,2024-04-26T01:00:01.587000
CVE-2024-4056,1,1,0e8abea95116ef4fcaf49d76f76e892288e09a2762b021ff80c2a05fe9016ece,2024-04-26T06:15:06.610000
CVE-2024-4056,0,0,0e8abea95116ef4fcaf49d76f76e892288e09a2762b021ff80c2a05fe9016ece,2024-04-26T06:15:06.610000
CVE-2024-4062,0,0,00e701b26925636f4b147891efd3607d8441f5743e72ff31df8ffeb1293615e9,2024-04-24T13:39:42.883000
CVE-2024-4063,0,0,45ec0afed63b6cdcc64eb9b7f37753004f82dbe9793a74b35da8bcfe5ff1c982,2024-04-24T13:39:42.883000
CVE-2024-4064,0,0,700737c89c3d95dc4345be318b6f65da5b04cbacf0da44f1e91682579e7a15b3,2024-04-24T13:39:42.883000
@ -246843,3 +246859,7 @@ CVE-2024-4172,0,0,74935923348139a33a5ec86dfba1caf328eac5abe35bcbc7775440df01ee84
CVE-2024-4173,0,0,806a08191dc2b624e0ee02a7be11ce6c5ceee33617f7b3eb9464afb5420bb62b,2024-04-25T23:15:47.240000
CVE-2024-4174,0,0,8165b92f84043201b67993ccc68eb94f9c51d9c6b32fc95aff490860d26962cf,2024-04-25T13:18:02.660000
CVE-2024-4175,0,0,17322bbbd4155ded1e9cb395a3c60d3f922650a6043102cb41ba3b81f581a395,2024-04-25T13:18:02.660000
CVE-2024-4182,1,1,4dfc94f0ffa2b6a4213efe93241e3a5df76b05f6fe80bd19904d7872f105409b,2024-04-26T09:15:12.523000
CVE-2024-4183,1,1,be11ae4b2fab81e7fd11e32b9b5a199a61aa1f37c528a8b1c46bbec98d9dc643,2024-04-26T09:15:12.717000
CVE-2024-4195,1,1,fac1853799892f9a8ca0ff4bd37d4fb83107570b979ad94f080c84c1bc9a42fb,2024-04-26T09:15:12.897000
CVE-2024-4198,1,1,8c63284311f6661f84f943baba2393e9df632e4831ae1d83e08404c40b1cfd9a,2024-04-26T09:15:13.097000

Can't render this file because it is too large.