Auto-Update: 2024-05-02T14:00:37.776516+00:00

This commit is contained in:
cad-safe-bot 2024-05-02 14:03:29 +00:00
parent cee59ab258
commit 951bfd5fbc
42 changed files with 557 additions and 114 deletions

View File

@ -2,8 +2,8 @@
"id": "CVE-2021-36593",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-05-01T22:15:09.340",
"lastModified": "2024-05-01T22:15:09.340",
"vulnStatus": "Received",
"lastModified": "2024-05-02T13:27:25.103",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2021-36594",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-05-01T22:15:09.413",
"lastModified": "2024-05-01T22:15:09.413",
"vulnStatus": "Received",
"lastModified": "2024-05-02T13:27:25.103",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2023-28798",
"sourceIdentifier": "cve@zscaler.com",
"published": "2024-05-02T13:23:05.807",
"lastModified": "2024-05-02T13:27:25.103",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "An out-of-bounds write to heap in the pacparser library on Zscaler Client Connector on Mac may lead to arbitrary code execution."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "cve@zscaler.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:L",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW",
"baseScore": 6.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.2,
"impactScore": 3.7
}
]
},
"weaknesses": [
{
"source": "cve@zscaler.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-122"
}
]
}
],
"references": [
{
"url": "https://help.zscaler.com/client-connector/client-connector-app-release-summary-2022?applicable_category=macOS&applicable_version=3.7&deployment_date=2022-08-19&id=1414851",
"source": "cve@zscaler.com"
}
]
}

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2023-41970",
"sourceIdentifier": "cve@zscaler.com",
"published": "2024-05-02T13:23:06.003",
"lastModified": "2024-05-02T13:27:25.103",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "An Improper Validation of Integrity Check Value vulnerability in Zscaler Client Connector on Windows during the Repair App functionality may allow Local Execution of Code.This issue affects Client Connector on Windows: before 4.1.0.62.\n\n"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "cve@zscaler.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:L",
"attackVector": "LOCAL",
"attackComplexity": "HIGH",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "LOW",
"baseScore": 6.0,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 0.5,
"impactScore": 5.5
}
]
},
"weaknesses": [
{
"source": "cve@zscaler.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-354"
}
]
}
],
"references": [
{
"url": "https://help.zscaler.com/client-connector/client-connector-app-release-summary-2022?applicable_category=windows&applicable_version=4.1",
"source": "cve@zscaler.com"
}
]
}

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2023-41971",
"sourceIdentifier": "cve@zscaler.com",
"published": "2024-05-02T13:23:06.180",
"lastModified": "2024-05-02T13:27:25.103",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "An Improper Link Resolution Before File Access ('Link Following') vulnerability in Zscaler Client Connector on Windows allows a system file to be overwritten.This issue affects Client Connector on Windows: before 3.7.\n\n"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "cve@zscaler.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H",
"attackVector": "LOCAL",
"attackComplexity": "HIGH",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "HIGH",
"baseScore": 5.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.0,
"impactScore": 4.2
}
]
},
"weaknesses": [
{
"source": "cve@zscaler.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-59"
}
]
}
],
"references": [
{
"url": "https://help.zscaler.com/zscaler-client-connector/client-connector-app-release-summary-2021??applicable_category=windows&applicable_version=3.7",
"source": "cve@zscaler.com"
}
]
}

View File

@ -2,12 +2,16 @@
"id": "CVE-2023-46294",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-05-01T20:15:12.267",
"lastModified": "2024-05-01T20:15:12.267",
"vulnStatus": "Received",
"lastModified": "2024-05-02T13:27:25.103",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "An issue was discovered in Teledyne FLIR M300 2.00-19. User account passwords are encrypted locally, and can be decrypted to cleartext passwords using the utility umSetup. This utility requires root permissions to execute."
},
{
"lang": "es",
"value": "Se descubri\u00f3 un problema en Teledyne FLIR M300 2.00-19. Las contrase\u00f1as de las cuentas de usuario se cifran localmente y se pueden descifrar en contrase\u00f1as de texto plano mediante la utilidad umSetup. Esta utilidad requiere permisos de root para ejecutarse."
}
],
"metrics": {},

View File

@ -2,12 +2,16 @@
"id": "CVE-2023-46295",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-05-01T20:15:12.330",
"lastModified": "2024-05-01T20:15:12.330",
"vulnStatus": "Received",
"lastModified": "2024-05-02T13:27:25.103",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "An issue was discovered in Teledyne FLIR M300 2.00-19. Unauthenticated remote code execution can occur in the web server. An attacker can exploit this by sending a POST request to the vulnerable PHP page. An attacker can elevate to root permissions with Sudo."
},
{
"lang": "es",
"value": "Se descubri\u00f3 un problema en Teledyne FLIR M300 2.00-19. Puede ocurrir una ejecuci\u00f3n remota de c\u00f3digo no autenticado en el servidor web. Un atacante puede aprovechar esto enviando una solicitud POST a la p\u00e1gina PHP vulnerable. Un atacante puede elevar los permisos a root con Sudo."
}
],
"metrics": {},

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-51631",
"sourceIdentifier": "zdi-disclosures@trendmicro.com",
"published": "2024-05-02T00:15:07.270",
"lastModified": "2024-05-02T00:15:07.270",
"vulnStatus": "Received",
"lastModified": "2024-05-02T13:27:25.103",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2024-23459",
"sourceIdentifier": "cve@zscaler.com",
"published": "2024-05-02T13:23:06.363",
"lastModified": "2024-05-02T13:27:25.103",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "An Improper Link Resolution Before File Access ('Link Following') vulnerability in Zscaler Client Connector on Mac allows a system file to be overwritten.This issue affects Zscaler Client Connector on Mac : before 3.7.\n\n"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "cve@zscaler.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.1,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.2
}
]
},
"weaknesses": [
{
"source": "cve@zscaler.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-59"
}
]
}
],
"references": [
{
"url": "https://help.zscaler.com/client-connector/client-connector-app-release-summary-2022?applicable_category=macos&applicable_version=3.7",
"source": "cve@zscaler.com"
}
]
}

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2024-23461",
"sourceIdentifier": "cve@zscaler.com",
"published": "2024-05-02T13:23:06.567",
"lastModified": "2024-05-02T13:27:25.103",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "An Improper Validation of Integrity Check Value vulnerability in Zscaler Client Connector on MacOS during the upgrade process may allow a Local Execution of Code.This issue affects Client Connector on MacOS: before 3.4.\n\n"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "cve@zscaler.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "ADJACENT_NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 4.2,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 0.5,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "cve@zscaler.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-354"
}
]
}
],
"references": [
{
"url": "https://help.zscaler.com/zscaler-client-connector/client-connector-app-release-summary-2021?applicable_category=macos&applicable_version=3.4",
"source": "cve@zscaler.com"
}
]
}

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2024-23462",
"sourceIdentifier": "cve@zscaler.com",
"published": "2024-05-02T13:23:06.810",
"lastModified": "2024-05-02T13:27:25.103",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "An Improper Validation of Integrity Check Value vulnerability in Zscaler Client Connector on MacOS allows a denial of service of the Client Connector binary and thus removing client functionality.This issue affects Client Connector on MacOS: before 3.4.\n\n"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "cve@zscaler.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "LOW",
"baseScore": 3.3,
"baseSeverity": "LOW"
},
"exploitabilityScore": 1.8,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "cve@zscaler.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-354"
}
]
}
],
"references": [
{
"url": "https://help.zscaler.com/zscaler-client-connector/client-connector-app-release-summary-2021?applicable_category=macos&applicable_version=3.4",
"source": "cve@zscaler.com"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-2405",
"sourceIdentifier": "contact@wpscan.com",
"published": "2024-05-02T06:15:49.947",
"lastModified": "2024-05-02T06:15:49.947",
"vulnStatus": "Received",
"lastModified": "2024-05-02T13:27:25.103",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,12 +2,16 @@
"id": "CVE-2024-25676",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-05-01T20:15:12.733",
"lastModified": "2024-05-01T20:15:12.733",
"vulnStatus": "Received",
"lastModified": "2024-05-02T13:27:25.103",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "An issue was discovered in ViewerJS 0.5.8. A script from the component loads content via URL TAGs without properly sanitizing it. This leads to both open redirection and out-of-band resource loading."
},
{
"lang": "es",
"value": "Se descubri\u00f3 un problema en ViewerJS 0.5.8. Un script del componente carga contenido a trav\u00e9s de ETIQUETAS URL sin sanitizarlo adecuadamente. Esto conduce tanto a la redirecci\u00f3n abierta como a la carga de recursos fuera de banda."
}
],
"metrics": {},

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-3005",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-05-02T11:15:46.477",
"lastModified": "2024-05-02T11:15:46.477",
"vulnStatus": "Received",
"lastModified": "2024-05-02T13:27:25.103",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-32114",
"sourceIdentifier": "security@apache.org",
"published": "2024-05-02T09:15:06.990",
"lastModified": "2024-05-02T09:15:06.990",
"vulnStatus": "Received",
"lastModified": "2024-05-02T13:27:25.103",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-32638",
"sourceIdentifier": "security@apache.org",
"published": "2024-05-02T10:15:08.443",
"lastModified": "2024-05-02T10:15:08.443",
"vulnStatus": "Received",
"lastModified": "2024-05-02T13:27:25.103",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-32882",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-05-02T07:15:20.967",
"lastModified": "2024-05-02T07:15:20.967",
"vulnStatus": "Received",
"lastModified": "2024-05-02T13:27:25.103",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-32962",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-05-02T07:15:21.420",
"lastModified": "2024-05-02T07:15:21.420",
"vulnStatus": "Received",
"lastModified": "2024-05-02T13:27:25.103",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-32971",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-05-02T07:15:21.733",
"lastModified": "2024-05-02T07:15:21.733",
"vulnStatus": "Received",
"lastModified": "2024-05-02T13:27:25.103",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-3280",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-05-02T08:15:08.270",
"lastModified": "2024-05-02T08:15:08.270",
"vulnStatus": "Received",
"lastModified": "2024-05-02T13:27:25.103",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,12 +2,16 @@
"id": "CVE-2024-33306",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-05-01T20:15:12.787",
"lastModified": "2024-05-01T20:15:12.787",
"vulnStatus": "Received",
"lastModified": "2024-05-02T13:27:25.103",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "SourceCodester Laboratory Management System 1.0 is vulnerable to Cross Site Scripting (XSS) via \"First Name\" parameter in Create User."
},
{
"lang": "es",
"value": "SourceCodester Laboratory Management System 1.0 es vulnerable a Cross Site Scripting (XSS) a trav\u00e9s del par\u00e1metro \"Nombre\" en Crear usuario."
}
],
"metrics": {},

View File

@ -2,12 +2,16 @@
"id": "CVE-2024-33307",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-05-01T20:15:12.837",
"lastModified": "2024-05-01T20:15:12.837",
"vulnStatus": "Received",
"lastModified": "2024-05-02T13:27:25.103",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "SourceCodester Laboratory Management System 1.0 is vulnerable to Cross Site Scripting (XSS) via \"Last Name\" parameter in Create User."
},
{
"lang": "es",
"value": "SourceCodester Laboratory Management System 1.0 es vulnerable a Cross Site Scripting (XSS) a trav\u00e9s del par\u00e1metro \"Apellido\" en Crear usuario."
}
],
"metrics": {},

View File

@ -2,12 +2,16 @@
"id": "CVE-2024-33423",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-05-01T20:15:12.887",
"lastModified": "2024-05-01T20:15:12.887",
"vulnStatus": "Received",
"lastModified": "2024-05-02T13:27:25.103",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "Cross-Site Scripting (XSS) vulnerability in the Settings menu of CMSimple v5.15 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Logout parameter under the Language section."
},
{
"lang": "es",
"value": "La vulnerabilidad de Cross Site Scripting (XSS) en el men\u00fa Configuraci\u00f3n de CMSimple v5.15 permite a los atacantes ejecutar script web o HTML arbitrarios a trav\u00e9s de un payload manipulado inyectado en el par\u00e1metro Cerrar sesi\u00f3n en la secci\u00f3n Idioma."
}
],
"metrics": {},

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-33911",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-05-02T11:15:45.663",
"lastModified": "2024-05-02T11:15:45.663",
"vulnStatus": "Received",
"lastModified": "2024-05-02T13:27:25.103",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-33913",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-05-02T11:15:45.883",
"lastModified": "2024-05-02T11:15:45.883",
"vulnStatus": "Received",
"lastModified": "2024-05-02T13:27:25.103",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-33922",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-05-02T11:15:46.080",
"lastModified": "2024-05-02T11:15:46.080",
"vulnStatus": "Received",
"lastModified": "2024-05-02T13:27:25.103",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-33930",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-05-02T11:15:46.273",
"lastModified": "2024-05-02T11:15:46.273",
"vulnStatus": "Received",
"lastModified": "2024-05-02T13:27:25.103",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2024-33944",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-05-02T13:15:26.240",
"lastModified": "2024-05-02T13:27:25.103",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "Missing Authorization vulnerability in Kestrel WooCommerce AWeber Newsletter Subscription.This issue affects WooCommerce AWeber Newsletter Subscription: from n/a through 4.0.2.\n\n"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "LOW",
"baseScore": 6.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 3.9,
"impactScore": 2.5
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-862"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/woocommerce-aweber-newsletter-subscription/wordpress-woocommerce-aweber-newsletter-subscription-plugin-4-0-1-unauthenticated-access-token-change-reset-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-3471",
"sourceIdentifier": "contact@wpscan.com",
"published": "2024-05-02T06:15:50.350",
"lastModified": "2024-05-02T06:15:50.350",
"vulnStatus": "Received",
"lastModified": "2024-05-02T13:27:25.103",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-3472",
"sourceIdentifier": "contact@wpscan.com",
"published": "2024-05-02T06:15:50.453",
"lastModified": "2024-05-02T06:15:50.453",
"vulnStatus": "Received",
"lastModified": "2024-05-02T13:27:25.103",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-3474",
"sourceIdentifier": "contact@wpscan.com",
"published": "2024-05-02T06:15:50.527",
"lastModified": "2024-05-02T06:15:50.527",
"vulnStatus": "Received",
"lastModified": "2024-05-02T13:27:25.103",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-3475",
"sourceIdentifier": "contact@wpscan.com",
"published": "2024-05-02T06:15:50.660",
"lastModified": "2024-05-02T06:15:50.660",
"vulnStatus": "Received",
"lastModified": "2024-05-02T13:27:25.103",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-3476",
"sourceIdentifier": "contact@wpscan.com",
"published": "2024-05-02T06:15:50.887",
"lastModified": "2024-05-02T06:15:50.887",
"vulnStatus": "Received",
"lastModified": "2024-05-02T13:27:25.103",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-3477",
"sourceIdentifier": "contact@wpscan.com",
"published": "2024-05-02T06:15:50.950",
"lastModified": "2024-05-02T06:15:50.950",
"vulnStatus": "Received",
"lastModified": "2024-05-02T13:27:25.103",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-3478",
"sourceIdentifier": "contact@wpscan.com",
"published": "2024-05-02T06:15:51.033",
"lastModified": "2024-05-02T06:15:51.033",
"vulnStatus": "Received",
"lastModified": "2024-05-02T13:27:25.103",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-3481",
"sourceIdentifier": "contact@wpscan.com",
"published": "2024-05-02T06:15:51.130",
"lastModified": "2024-05-02T06:15:51.130",
"vulnStatus": "Received",
"lastModified": "2024-05-02T13:27:25.103",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-3490",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-05-02T07:15:22.040",
"lastModified": "2024-05-02T07:15:22.040",
"vulnStatus": "Received",
"lastModified": "2024-05-02T13:27:25.103",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-3883",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-05-02T09:15:07.233",
"lastModified": "2024-05-02T09:15:07.233",
"vulnStatus": "Received",
"lastModified": "2024-05-02T13:27:25.103",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-3955",
"sourceIdentifier": "cvd@cert.pl",
"published": "2024-05-02T10:15:08.630",
"lastModified": "2024-05-02T10:15:08.630",
"vulnStatus": "Received",
"lastModified": "2024-05-02T13:27:25.103",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,12 +2,16 @@
"id": "CVE-2024-4142",
"sourceIdentifier": "reefs@jfrog.com",
"published": "2024-05-01T21:15:51.000",
"lastModified": "2024-05-01T21:15:51.000",
"vulnStatus": "Received",
"lastModified": "2024-05-02T13:27:25.103",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "An Improper input validation vulnerability that could potentially lead to privilege escalation\u00a0was discovered in JFrog Artifactory.\n\nDue to this vulnerability, users with low privileges may gain administrative access to the system.\n\nThis issue can also be exploited in Artifactory platforms with anonymous access enabled.\n\n"
},
{
"lang": "es",
"value": "Se descubri\u00f3 en JFrog Artifactory una vulnerabilidad de validaci\u00f3n de entrada incorrecta que podr\u00eda conducir a una escalada de privilegios. Debido a esta vulnerabilidad, los usuarios con privilegios bajos pueden obtener acceso administrativo al sistema. Este problema tambi\u00e9n se puede aprovechar en plataformas Artifactory con acceso an\u00f3nimo habilitado."
}
],
"metrics": {

View File

@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update
```plain
2024-05-02T12:00:33.114492+00:00
2024-05-02T14:00:37.776516+00:00
```
### Most recent CVE Modification Timestamp synchronized with NVD
```plain
2024-05-02T11:15:46.477000+00:00
2024-05-02T13:27:25.103000+00:00
```
### Last Data Feed Release
@ -33,28 +33,51 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
### Total Number of included CVEs
```plain
247528
247535
```
### CVEs added in the last Commit
Recently added CVEs: `7`
- [CVE-2024-3005](CVE-2024/CVE-2024-30xx/CVE-2024-3005.json) (`2024-05-02T11:15:46.477`)
- [CVE-2024-32638](CVE-2024/CVE-2024-326xx/CVE-2024-32638.json) (`2024-05-02T10:15:08.443`)
- [CVE-2024-33911](CVE-2024/CVE-2024-339xx/CVE-2024-33911.json) (`2024-05-02T11:15:45.663`)
- [CVE-2024-33913](CVE-2024/CVE-2024-339xx/CVE-2024-33913.json) (`2024-05-02T11:15:45.883`)
- [CVE-2024-33922](CVE-2024/CVE-2024-339xx/CVE-2024-33922.json) (`2024-05-02T11:15:46.080`)
- [CVE-2024-33930](CVE-2024/CVE-2024-339xx/CVE-2024-33930.json) (`2024-05-02T11:15:46.273`)
- [CVE-2024-3955](CVE-2024/CVE-2024-39xx/CVE-2024-3955.json) (`2024-05-02T10:15:08.630`)
- [CVE-2023-28798](CVE-2023/CVE-2023-287xx/CVE-2023-28798.json) (`2024-05-02T13:23:05.807`)
- [CVE-2023-41970](CVE-2023/CVE-2023-419xx/CVE-2023-41970.json) (`2024-05-02T13:23:06.003`)
- [CVE-2023-41971](CVE-2023/CVE-2023-419xx/CVE-2023-41971.json) (`2024-05-02T13:23:06.180`)
- [CVE-2024-23459](CVE-2024/CVE-2024-234xx/CVE-2024-23459.json) (`2024-05-02T13:23:06.363`)
- [CVE-2024-23461](CVE-2024/CVE-2024-234xx/CVE-2024-23461.json) (`2024-05-02T13:23:06.567`)
- [CVE-2024-23462](CVE-2024/CVE-2024-234xx/CVE-2024-23462.json) (`2024-05-02T13:23:06.810`)
- [CVE-2024-33944](CVE-2024/CVE-2024-339xx/CVE-2024-33944.json) (`2024-05-02T13:15:26.240`)
### CVEs modified in the last Commit
Recently modified CVEs: `2`
Recently modified CVEs: `33`
- [CVE-2023-52651](CVE-2023/CVE-2023-526xx/CVE-2023-52651.json) (`2024-05-02T10:15:07.500`)
- [CVE-2024-31390](CVE-2024/CVE-2024-313xx/CVE-2024-31390.json) (`2024-05-02T11:15:45.547`)
- [CVE-2024-32114](CVE-2024/CVE-2024-321xx/CVE-2024-32114.json) (`2024-05-02T13:27:25.103`)
- [CVE-2024-32638](CVE-2024/CVE-2024-326xx/CVE-2024-32638.json) (`2024-05-02T13:27:25.103`)
- [CVE-2024-3280](CVE-2024/CVE-2024-32xx/CVE-2024-3280.json) (`2024-05-02T13:27:25.103`)
- [CVE-2024-32882](CVE-2024/CVE-2024-328xx/CVE-2024-32882.json) (`2024-05-02T13:27:25.103`)
- [CVE-2024-32962](CVE-2024/CVE-2024-329xx/CVE-2024-32962.json) (`2024-05-02T13:27:25.103`)
- [CVE-2024-32971](CVE-2024/CVE-2024-329xx/CVE-2024-32971.json) (`2024-05-02T13:27:25.103`)
- [CVE-2024-33306](CVE-2024/CVE-2024-333xx/CVE-2024-33306.json) (`2024-05-02T13:27:25.103`)
- [CVE-2024-33307](CVE-2024/CVE-2024-333xx/CVE-2024-33307.json) (`2024-05-02T13:27:25.103`)
- [CVE-2024-33423](CVE-2024/CVE-2024-334xx/CVE-2024-33423.json) (`2024-05-02T13:27:25.103`)
- [CVE-2024-33911](CVE-2024/CVE-2024-339xx/CVE-2024-33911.json) (`2024-05-02T13:27:25.103`)
- [CVE-2024-33913](CVE-2024/CVE-2024-339xx/CVE-2024-33913.json) (`2024-05-02T13:27:25.103`)
- [CVE-2024-33922](CVE-2024/CVE-2024-339xx/CVE-2024-33922.json) (`2024-05-02T13:27:25.103`)
- [CVE-2024-33930](CVE-2024/CVE-2024-339xx/CVE-2024-33930.json) (`2024-05-02T13:27:25.103`)
- [CVE-2024-3471](CVE-2024/CVE-2024-34xx/CVE-2024-3471.json) (`2024-05-02T13:27:25.103`)
- [CVE-2024-3472](CVE-2024/CVE-2024-34xx/CVE-2024-3472.json) (`2024-05-02T13:27:25.103`)
- [CVE-2024-3474](CVE-2024/CVE-2024-34xx/CVE-2024-3474.json) (`2024-05-02T13:27:25.103`)
- [CVE-2024-3475](CVE-2024/CVE-2024-34xx/CVE-2024-3475.json) (`2024-05-02T13:27:25.103`)
- [CVE-2024-3476](CVE-2024/CVE-2024-34xx/CVE-2024-3476.json) (`2024-05-02T13:27:25.103`)
- [CVE-2024-3477](CVE-2024/CVE-2024-34xx/CVE-2024-3477.json) (`2024-05-02T13:27:25.103`)
- [CVE-2024-3478](CVE-2024/CVE-2024-34xx/CVE-2024-3478.json) (`2024-05-02T13:27:25.103`)
- [CVE-2024-3481](CVE-2024/CVE-2024-34xx/CVE-2024-3481.json) (`2024-05-02T13:27:25.103`)
- [CVE-2024-3490](CVE-2024/CVE-2024-34xx/CVE-2024-3490.json) (`2024-05-02T13:27:25.103`)
- [CVE-2024-3883](CVE-2024/CVE-2024-38xx/CVE-2024-3883.json) (`2024-05-02T13:27:25.103`)
- [CVE-2024-3955](CVE-2024/CVE-2024-39xx/CVE-2024-3955.json) (`2024-05-02T13:27:25.103`)
- [CVE-2024-4142](CVE-2024/CVE-2024-41xx/CVE-2024-4142.json) (`2024-05-02T13:27:25.103`)
## Download and Usage

View File

@ -179059,8 +179059,8 @@ CVE-2021-36581,0,0,28f8ea59999d4558aee34d2c014fcb68377b3d5200cfb73c0f2065280cb46
CVE-2021-36582,0,0,aec2b4c2ad5639c3875456cc05c5a75c67ea0c230a00eecca0f7679b2d6b74cb,2021-09-28T14:57:24.057000
CVE-2021-36584,0,0,f9476909b004a3c17d2b2fb626756e5e1ce61872e9bc17b0420d36921e31c97f,2021-08-12T18:56:25.233000
CVE-2021-3659,0,0,f6fc2184fd003eece7a84f930a31721a62bc4c4eab4def2834bf08132b926069,2023-11-07T03:38:11.547000
CVE-2021-36593,0,0,3ec3deec62293992fea9d31f42488020012eff32789e1e52bc3683ee46c0f473,2024-05-01T22:15:09.340000
CVE-2021-36594,0,0,d9948746dcff9a74447e56a96019b9153de86ebaf4c8b5c9d4c2de6c87cb4640,2024-05-01T22:15:09.413000
CVE-2021-36593,0,1,33f6ee3b593829bb556439be69cabe3ea83905e273d461bcedf335295e86166a,2024-05-02T13:27:25.103000
CVE-2021-36594,0,1,9d68287e23e0a7190a393a52ed4e64fa87e82cd43f6169ce4cd49454b6821931,2024-05-02T13:27:25.103000
CVE-2021-3660,0,0,45339e93b73a8e367140c34fa3b160abd0afe9d9c5b347481f7388450a2dafee,2023-02-12T23:42:07.917000
CVE-2021-36601,0,0,efd8db70ae16b416c5df047a47a4200389b707a770874f88bfc7d6ece7c156e8,2021-08-19T14:05:14.620000
CVE-2021-36603,0,0,7fb0e80c74bdfd8f2dc4edef2e166e14fe11ff7343deacfe1c010480e838d371,2023-01-13T14:59:33.493000
@ -220719,6 +220719,7 @@ CVE-2023-28794,0,0,9d51fc9f9827cf3a9571a22038a1941a51dbb81199c04a2297ad7d779556e
CVE-2023-28795,0,0,64c65c1aefea896c155021adfe19b01db7da306ed5e6ec262f956af64c2861c4,2023-10-27T00:41:21.067000
CVE-2023-28796,0,0,6bc02a1ea37dbd7efb5a62c0a7f9b8486d8965b21edb4572472ded7b0020d893,2023-10-27T00:41:34.893000
CVE-2023-28797,0,0,82b327a4ee3d3fcf4befb89dcf050b6020e6db547cc8e579973bb925d433a26d,2023-10-27T00:41:53.097000
CVE-2023-28798,1,1,e2efa1e591c173b572917abb1d2598c8ea00f419a0cbd8540e0ce71442dededd,2024-05-02T13:27:25.103000
CVE-2023-28799,0,0,21c5c181de36d4b9fe988d12e6caae360f4ff902c380bd31c4880bb3a0fa4c45,2023-06-30T17:15:59.797000
CVE-2023-2880,0,0,4308abad4c2c9d1051fac1abec8354d5a397aa885799ec5c32dc39f4199c6ab0,2023-07-12T15:39:38.407000
CVE-2023-28800,0,0,20e475c7b2fbd54ae242e7400ab113b4511bff874b581889b9a4cf71acf2a912,2023-06-30T15:08:41.290000
@ -230018,6 +230019,8 @@ CVE-2023-41967,0,0,8e02dbae31e5167552a8965141c33a2e264759fb6dbab0897ce89326a49ec
CVE-2023-41968,0,0,1248c9df7ecfb3920853d876ba26e870eae54e3bdcb4167f52b0214e6558ef25,2023-11-07T04:21:11.093000
CVE-2023-41969,0,0,bf5a7b1169643942e6a97bb41a89261410b2d9b234111ccc127efeb4ca378c2c,2024-03-26T17:09:53.043000
CVE-2023-4197,0,0,f146d2ff6232fd5933bf8142dd157ce30d6c6646be201da9229ef783e3b9cbfb,2023-11-08T19:47:53.387000
CVE-2023-41970,1,1,9022449cbd13c153fd7a0dd3bf4e1e71d460721d35a4530ddf1557b74452f024,2024-05-02T13:27:25.103000
CVE-2023-41971,1,1,5c526b74a29770e051dcbbfa956abb97bb9d78828def320907d1102e963ff5a3,2024-05-02T13:27:25.103000
CVE-2023-41972,0,0,2d440c64845c645ec5ed0f2f136f4f51547ba1f4cbbb8dacb5d7780b5782ba31,2024-03-26T17:09:53.043000
CVE-2023-41973,0,0,72880a2948f5f25cc0a4df217a1d2ea4ff5f2bd81d6cea96a01b5cecf905ce10,2024-03-26T17:09:53.043000
CVE-2023-41974,0,0,ec7dd2b6702f5a8bbc562cadb789ab42ea352cdfbc62d11784bae6116e1e8ab4,2024-01-17T21:17:26.303000
@ -232653,8 +232656,8 @@ CVE-2023-46288,0,0,cd41e139907d96ac2db3ea78bc3121553172dc6779b14d26502efe4fb9ccf
CVE-2023-46289,0,0,eeb8999c1027929e8e1432385e10738220f809cefa40c971cda5d3b70278abe2,2023-11-07T18:18:35.950000
CVE-2023-4629,0,0,46099667ebb1d5620c651151fc81b80f7b26e3b0acd8b7bf49782cc690ba95f3,2024-03-12T12:40:13.500000
CVE-2023-46290,0,0,60b800c48e60334c2e69f95b8f0bf14e1eb82a55ac0513b709fcee11b9dfacac,2023-11-07T19:09:56.033000
CVE-2023-46294,0,0,02073655bb64bd18f43e3ab8f74c510771a3d9083c7aa327c87c18f708e3b206,2024-05-01T20:15:12.267000
CVE-2023-46295,0,0,e8d4359171cc571df7ef4cfa8d8d375520d56e03872894d4273bbcb542d65a4b,2024-05-01T20:15:12.330000
CVE-2023-46294,0,1,d783b82054408b7c98198cf9de768f7b26016fb2ccfc90ad71b9515834779094,2024-05-02T13:27:25.103000
CVE-2023-46295,0,1,457eaf15e2892398271302dc9373fdd6809c617422b7b9e79ec4f464f0931804,2024-05-02T13:27:25.103000
CVE-2023-46298,0,0,b077731bbae2546ee5da04f8027611b1fe7cb45539952cb1927c0319e4c642b7,2023-10-28T03:30:11.740000
CVE-2023-4630,0,0,4ec69a1c8fa3ee9a535125a88ba9d69fb2f86c9491ff178e8c57f885e14fd03b,2023-09-13T16:50:23.250000
CVE-2023-46300,0,0,0717e33737bc41686c733bf7e7fb3f4e87670f94456a3f5f908d9ad680b0f47e,2023-10-31T17:08:50.757000
@ -236004,7 +236007,7 @@ CVE-2023-5161,0,0,9b65b8e4b4f79aedfd4feee2a1808cd60164bd7cfa868cb8a3eaab434c101f
CVE-2023-5162,0,0,0eac3e9fd752be3c7b22805015c13078655cd25c41aeb7e980086d31f6b61a06,2023-11-07T04:23:34.360000
CVE-2023-5163,0,0,dcb773ab2d6fe9431102c7737c1a9ab1410c0276847172a178a17b93819afb8b,2023-11-27T22:10:37.123000
CVE-2023-51630,0,0,e9c56408d552b149daee5fe15432377ab22c6d1afc3ccc27406f3f891f5d5f7f,2024-02-15T17:15:20.487000
CVE-2023-51631,0,0,4086391b4b1eb0340d783c2e9a6f98b675ad3f645b1ee1447c6022b585eeeb13,2024-05-02T00:15:07.270000
CVE-2023-51631,0,1,baf8bcb2af27fa04761ad3ab7475a98ffaef9a3784170fa6c2f3e50a9ac1759f,2024-05-02T13:27:25.103000
CVE-2023-5164,0,0,eb58535c78bf4b607f05ff8e1f903241064df3ad7b0f4d3f1636df61307fb477,2023-11-07T20:09:50.093000
CVE-2023-51649,0,0,11e105f951d553e940608590efdc1e572e1718a59f6fe7f415e90e2b5b510151,2024-01-03T20:05:01.863000
CVE-2023-5165,0,0,a5831e8b47bcc2e026ef3c692d9374429299bcbb82887bff8c322b1d5bf13c3b,2023-09-26T15:50:49.217000
@ -236752,7 +236755,7 @@ CVE-2023-52648,0,0,0cd0cdab462fcf2c595167fa5d1cd9cc7cdc530a2c1038043e42a9a4861e6
CVE-2023-52649,0,0,932fa73ad16a2d4cd94f89d74e91afa7bbc2458b1b7df1b9277843dba2b1e76d,2024-05-01T19:50:25.633000
CVE-2023-5265,0,0,2a8378d4c6e1a4043ef9a62bd4c22a5b923a77fb44f4c12af78e362e629e3051,2024-04-11T01:22:56.040000
CVE-2023-52650,0,0,6c0999d320440dd5b65301df92fb13a3042ac6f53ee18da8c9bb76d62d39cee9,2024-05-01T19:50:25.633000
CVE-2023-52651,0,1,b4f3a0cd669ba420fce4a6d4537b1eeb00fca2d8899e3172188c84b869ede5da,2024-05-02T10:15:07.500000
CVE-2023-52651,0,0,b4f3a0cd669ba420fce4a6d4537b1eeb00fca2d8899e3172188c84b869ede5da,2024-05-02T10:15:07.500000
CVE-2023-52652,0,0,a4852fe9f75c6ec40bb56bc2f1b85635ed06dc40f0d8bbbdb99a6820ccab51aa,2024-05-01T19:50:25.633000
CVE-2023-52653,0,0,40b231362ce2dd826d58c4fdcf0dc86a21ef14260f86ab2a2cb525882bd63297,2024-05-01T19:50:25.633000
CVE-2023-5266,0,0,832870c6041d22c4531b84dd381b413460d59a972119dc82a2f73fc33512c1a5,2024-04-11T01:22:56.120000
@ -241850,6 +241853,9 @@ CVE-2024-23451,0,0,1527b911dea291b0766ddb3062c19eeaba982e875c4189924798b47289a05
CVE-2024-23452,0,0,aaa529ca6e03eefd16006bb57cfd95647fc8b44bb3a3176fd8a83e06021cb7e9,2024-02-29T01:44:08.877000
CVE-2024-23453,0,0,ab3a22284e10fea1933712f86026a2e7792304e1f83321557a4d02140679b266,2024-01-29T22:58:07.777000
CVE-2024-23457,0,0,dddcb9f63fdf61bed2576a33360886a9fc9b5c97f52251225a112f2d6a151192,2024-05-01T19:50:25.633000
CVE-2024-23459,1,1,4ed7f4199c264d3f5f28878b60206e5d5e03f218babe4efae2e82f0c38f4bb0e,2024-05-02T13:27:25.103000
CVE-2024-23461,1,1,592e53b60d3189db5240e48bca603c7e471bea37b7133779df77751b554cbf6a,2024-05-02T13:27:25.103000
CVE-2024-23462,1,1,041d85efc6ce88ff6e6fced0dbd768b5895566f8813b2133ec33b5efb25d14d4,2024-05-02T13:27:25.103000
CVE-2024-23463,0,0,3070d116c7eebce5ad718e81d73788ac1f4a2d237e9b828c393b0270c134b332,2024-04-30T17:52:35.057000
CVE-2024-2347,0,0,72273356ef668e46bc249f1161d9e793d562ab02a3d6eaa18d7e41a99c45f641,2024-04-10T13:23:38.787000
CVE-2024-23476,0,0,e3d84cdb88c20fc5ad4183c7e154fd4eb94d6574a64f56328103056889f0fc9e,2024-02-20T20:39:10.033000
@ -242210,7 +242216,7 @@ CVE-2024-2404,0,0,bb119e7c54353aa80d96b0c40c09b73768b3e9de919c9d8afc1368ad1d5506
CVE-2024-24041,0,0,f96650c9700d93c943d8efc95d65c599a8e77cc1d7aaa4ba87820d6237153959,2024-02-07T17:14:41.607000
CVE-2024-24042,0,0,4a4e7ea160d5d0244b906cb4642841160ba9374fd30aaa87521360ed2e8ecd1a,2024-03-19T13:26:46
CVE-2024-24043,0,0,8fe33813863354c4eead332dc6243b19fd5b77f5e3a94ddd813814cf68659374,2024-03-19T13:26:46
CVE-2024-2405,0,0,ca5ba74f3b1e356b2b6f78e8802858483445502ae4c688933a3c7d0fa75fd8a5,2024-05-02T06:15:49.947000
CVE-2024-2405,0,1,a312bfe89e28af8302190c1b58eb6d0f15f2a12e6045507a036b540098cdfc29,2024-05-02T13:27:25.103000
CVE-2024-24050,0,0,ccdf8a4463bf6582ad99a29c76e6e3640436eaa4075881cd577d9e7450feacb8,2024-03-21T12:58:51.093000
CVE-2024-24059,0,0,3da8cffbcfd869f14b04835347f156c5cf1a6025fa9627a3ec1ec79a41a9d0be,2024-02-03T00:40:43.793000
CVE-2024-2406,0,0,8d2b09ba3140c788e70ce565b39b21e35552b7351d8b624734dbaec586875fdb,2024-04-11T01:25:23.690000
@ -243022,7 +243028,7 @@ CVE-2024-2566,0,0,2f62bcc0096a9cfce28d9f1629303aca5ddd1acc1617ceaa0e5d962e8bbd56
CVE-2024-2567,0,0,cc7e72a7a709da818c37cf067d917b3c0e066e65a77707e27383c334e41c88c1,2024-04-11T01:25:28.590000
CVE-2024-25674,0,0,880844ace2ad9fa6a214f1eff7f46e3beaded8f86ef202dfc09585e1e07ca21c,2024-02-12T14:30:40.343000
CVE-2024-25675,0,0,7eb120f8543ce89181641a0a8c791e82666c8e07d23577075c360f9dbf73d233,2024-02-12T14:30:28.640000
CVE-2024-25676,0,0,42547099b92752a0d480889307a8cd269ab9cf2b19365c84e7d2495655a01888,2024-05-01T20:15:12.733000
CVE-2024-25676,0,1,6e92b41ae6bd1911a9a842e41a79d250b20cd9da74201914715c0c0b9b590631,2024-05-02T13:27:25.103000
CVE-2024-25677,0,0,1d7f4f51208daa48b27418602ba1484337c537523201080701287445cfed0006,2024-02-15T19:43:24.983000
CVE-2024-25678,0,0,9470e3115b8c3f5b60b6b175aa8ef46b05e07e3f194ab4ff036467dbe264bd9e,2024-02-15T18:45:09.663000
CVE-2024-25679,0,0,224a0956154aafe3a65144732719712897f981c578a083f4eecb3f79135bc5a3,2024-02-15T18:44:40.547000
@ -245503,7 +245509,7 @@ CVE-2024-3001,0,0,166014582f95ace18f19056bf46328e639c7eacf99106f9aa7a80816fde73f
CVE-2024-3002,0,0,16788083fe7e681bdbe59bf4b485529665f3f0fe70ff2027f0a151c33e7f2889,2024-04-11T01:25:51.360000
CVE-2024-3003,0,0,2a188d39504a8ef237d1494970327966c9b79531cd80142b261ee3cd1a2bfd25,2024-04-11T01:25:51.437000
CVE-2024-3004,0,0,13c3a49477c1957f3ba862d9d64f7f0cfc7a867ab429294dcc31aefbf0339669,2024-04-11T01:25:51.517000
CVE-2024-3005,1,1,a0607436e077f05390a767a1d51d8a3c6066c7f4c28e09323279f31b4946de06,2024-05-02T11:15:46.477000
CVE-2024-3005,0,1,882e8609d3372a51aa89545afbcb75a47ad1aeefa870edd59b9a824ffa4ac294,2024-05-02T13:27:25.103000
CVE-2024-3006,0,0,7e4efd97d17f29ea2d10f563ddab0fe2014f89540c16cf776c4bac4b7579d473,2024-04-11T01:25:51.597000
CVE-2024-3007,0,0,83ad0d540449e02aee098a1031a34f2d8297179700c7acb99470f214bdabbce9,2024-04-11T01:25:51.677000
CVE-2024-3008,0,0,9c438d43ee970ebac15533a5b88357c1f258f5ed280b95afc9cf1b5285727535,2024-04-11T01:25:51.757000
@ -246219,7 +246225,7 @@ CVE-2024-31387,0,0,ae479bfa1926a7fd40fb5cef5475ced5aee0d15930c68100ea8467ea55c88
CVE-2024-31388,0,0,26d907273df7947ec6ad690e5e970b363bc74f3d9bdbd15977ad183463b21599,2024-04-15T13:15:31.997000
CVE-2024-31389,0,0,ec18832e3cfc0d0ccb73210696ec4d56f9e9fc30aaf99bfa52a18537d9ffe4ce,2024-04-15T13:15:31.997000
CVE-2024-3139,0,0,c174ece4bd5366d5eddcb8afdcde0c6c7c4276d7790f9ff1f5e9ef5c069a0098,2024-04-11T01:25:54.583000
CVE-2024-31390,0,1,dfa8d8f4e77b9847761a388d3f327a708e1f4a96a1363bc14cb318e90d22d684,2024-05-02T11:15:45.547000
CVE-2024-31390,0,0,dfa8d8f4e77b9847761a388d3f327a708e1f4a96a1363bc14cb318e90d22d684,2024-05-02T11:15:45.547000
CVE-2024-31391,0,0,7edc74b1175065af6008c4d194ed91acb716bd48f1d16beca88a58acb51aa8e5,2024-05-01T17:15:36.400000
CVE-2024-31392,0,0,e47fa59932bfeb069e43bdeea717668f4f8eb0beb6cf866b3eeac98c4b5a7755,2024-04-03T17:24:18.150000
CVE-2024-31393,0,0,37f7a5992221d6bde3095665f91d96a5b3c012db649e1c1c87f1a16619b63290,2024-04-03T17:24:18.150000
@ -246494,7 +246500,7 @@ CVE-2024-32108,0,0,950a29a68ef37c40439ae0dcf3c3d4b039242eaece664c349c7d4089e193e
CVE-2024-32109,0,0,4ab4248625b2b88c43ecf2bed644e80e80c54bafb94ddc41cebae0bbd84f78ff,2024-04-29T09:15:07.707000
CVE-2024-3211,0,0,d6d8ef851a76d01f08b13c4c6093534cf0125e4133f007b8f3a299cb3bb38192,2024-04-12T12:43:46.210000
CVE-2024-32112,0,0,2df62c2ad1478d07a612eff17f984ad78c51d3b47027012c1c38076227812cd3,2024-04-11T12:47:44.137000
CVE-2024-32114,0,0,971257cb4ba4edfac252d62e09fe34f2f864d6c516457b593b2a9396fc1094df,2024-05-02T09:15:06.990000
CVE-2024-32114,0,1,f74e35bf4baba0bdaef9add7ba1f45cafb6d7b14cf428324b385a7c33bdb04ae,2024-05-02T13:27:25.103000
CVE-2024-32125,0,0,df49ac279a5dab5894d2cf46d4df920e793fb77c32b1360bd4eb9ce6cc4c2bcb,2024-04-15T13:15:31.997000
CVE-2024-32126,0,0,03bbe2b7a7bd325cdda583bb7823f2b70916aad3961fcbd3bac07e945035870f,2024-04-18T13:04:28.900000
CVE-2024-32127,0,0,57252810e1702be160161ac7dc44c20062237ffc3e0f3ad79884c0b06ee5b822,2024-04-15T13:15:31.997000
@ -246770,7 +246776,7 @@ CVE-2024-32631,0,0,f6179c4a1916a92ef208430456218c10bd0600c556ab5afe50d23115ed2f9
CVE-2024-32632,0,0,363f256990a9e0bbc1d5ebda216d881268683761016a5132b054fbdb44080942,2024-04-16T13:24:07.103000
CVE-2024-32633,0,0,8ac8ce6a1ac201ef8dc36e7fab192ecb8b1b583d781df940a83a5707e31555c1,2024-04-16T13:24:07.103000
CVE-2024-32634,0,0,399e2bba8e548c1c98770d2f478e96e69a60afbc020788dd69a365e3ae504be6,2024-04-16T13:24:07.103000
CVE-2024-32638,1,1,c80a8de09c6e4da739a162a0f5a8963e91a633669180aa78c293985c47a9d80b,2024-05-02T10:15:08.443000
CVE-2024-32638,0,1,1c203c569295d2700dd4cdcc26da0f3bdbdbd15a786655ac909defaba54a8fd1,2024-05-02T13:27:25.103000
CVE-2024-32644,0,0,e88c5eb3a89ae127bbaa68ee6900bb69776588719de1a17fdbc979f8b62412c9,2024-04-19T16:19:49.043000
CVE-2024-32645,0,0,b793223b9f315c955102349a0fffec6d395200342592d911bfc2d42be0594699,2024-04-26T12:58:17.720000
CVE-2024-32646,0,0,9f830707470a3978892edc29be298706f63ea6896e8eab377ae270338a7fdb45,2024-04-26T12:58:17.720000
@ -246851,7 +246857,7 @@ CVE-2024-32793,0,0,0401f7dd95b92b4af3dcee32342e29d30d2d3f61cc7363bc65938bb767c3d
CVE-2024-32794,0,0,af04326430aa58ca3538b2b06900d7134dad884debf7c66f895129df101dc2a3,2024-04-24T17:16:50.397000
CVE-2024-32795,0,0,64f3e792420781d69f50cef2545cc7bb9fa85c0624bbe3b99a02d4e4d983f838,2024-04-24T17:16:50.397000
CVE-2024-32796,0,0,843f023f5500c45cf310f05263a796673694f0181757f7df75501ca87d8b0d28,2024-04-24T13:39:42.883000
CVE-2024-3280,0,0,423c17c6bb2c676f7980b7a8094ef07781cc5067b2ad63b7e24525d82bd1880b,2024-05-02T08:15:08.270000
CVE-2024-3280,0,1,d522c5cdd1fc6ab9f1068e3b6fa43977f9255dadc036b3f1de62c96a4196e80e,2024-05-02T13:27:25.103000
CVE-2024-32801,0,0,4be65ed820d72048b16cb83f60ce532f34668282312680f5d997e7dd9ae65c7e,2024-04-24T13:39:42.883000
CVE-2024-32803,0,0,87ef628ed36a01981de6b24a9a46f4b15174f60f02a3679855347999c2d8f373,2024-04-24T13:39:42.883000
CVE-2024-32806,0,0,d8037ba4bbb861d02087bc0e815d7d332fc801a9609bcadd59a9397c35ec5a94,2024-04-24T17:16:50.397000
@ -246884,7 +246890,7 @@ CVE-2024-32878,0,0,d8e3ab888c6aa88a915625acc211c2c1d2f518e2e93c8d03f4a103f476f0c
CVE-2024-32879,0,0,0b0046e51a12ad5b1f4492d6cff2d6482480cc94626283d2a6f79bd97479ab0a,2024-04-25T13:18:20.370000
CVE-2024-32880,0,0,5c7d6aa44fda3ee69a48104785812fedaa6d3ea7fbc26c71102dbf3b2182bded,2024-04-26T19:59:19.793000
CVE-2024-32881,0,0,537bd0e70a49a0bbbedab5b33f25129a5e0bd4c96a0fa7233edc0c7a221f4717,2024-04-29T12:42:03.667000
CVE-2024-32882,0,0,77e2d4e38a68544e2d04b1615ce5bd2ca0a83a57d1e3fbe19af21f16f9eee751,2024-05-02T07:15:20.967000
CVE-2024-32882,0,1,62d5134d31fd8b76c053c6dec56f8f4efa47d49f1286970c4ba0dbde3e9c31c1,2024-05-02T13:27:25.103000
CVE-2024-32883,0,0,a9c9fca2091d1c27f409014c2160b5507d3c163d519fd25861f91b38d4e5bf24,2024-04-29T12:42:03.667000
CVE-2024-32884,0,0,feb09aaeaf00882860d9891266c7a76bef3350941384b117a7f5be081c117262,2024-04-26T19:59:19.793000
CVE-2024-32887,0,0,b5ae3b4b1b4138c74179295fbe12f89b3d44be2f4f1d80d57b3f63df33aa8023,2024-04-29T12:42:03.667000
@ -246903,12 +246909,12 @@ CVE-2024-32957,0,0,346b5f65dd888f3e9cb1b26dea7ac5e5c32edd9cfc4549cda79654054cc98
CVE-2024-32958,0,0,6e18b56f26294982072f644e4fa58f1addf07815dbbad1f52ebebe6c09cb7d66,2024-04-24T17:16:50.397000
CVE-2024-3296,0,0,bcc39314c1e9f6d53aa0ccc8e7e7cac7c279f7f6ee5a27f19287b128ea2ed6c7,2024-04-05T12:15:37.777000
CVE-2024-32961,0,0,37957fa4fcdb7f781bae6e07abfae16d232866e70e85a1248b96c2770b0e66b0,2024-04-25T13:18:13.537000
CVE-2024-32962,0,0,cffd765d2dc7e2918662878421ad7e9abc0fd21eb6caa1737b404d451742f73e,2024-05-02T07:15:21.420000
CVE-2024-32962,0,1,021a4fe9ba919861c38c2b964e77028fcdb55186c2b0e5c56245031d0a0c9a14,2024-05-02T13:27:25.103000
CVE-2024-32963,0,0,f743abd9aa526f3db97a21eadfaf4dc2f78a15d414daa21cc895f590ee32aaa6,2024-05-01T13:01:51.263000
CVE-2024-32966,0,0,a2baf3fb2b5c80cd4610837ff7bcc9d3104b6f5e43dec9799ce3ae8e928c9347,2024-05-01T13:01:51.263000
CVE-2024-32967,0,0,33de1e5d8e137ccf9d9b5b41849c40d635d06fe85dd3137a481db57c2b683f2c,2024-05-01T13:01:51.263000
CVE-2024-32970,0,0,2982e33a9b9fd795c78b587d4b9af475752bff8fc1f960ef793d6562bbaa4d4c,2024-05-01T13:02:20.750000
CVE-2024-32971,0,0,1ce587cf771e56839dbc652517f8efd235dc7989393d175fd24d10b1f9281038,2024-05-02T07:15:21.733000
CVE-2024-32971,0,1,adadc7f800bad47f6e908f977629062b54aa4131018b80d8cf97c9d00ec0bdc7,2024-05-02T13:27:25.103000
CVE-2024-32973,0,0,26b1e65a2b333830ce66544334f5113e1beaf6a050e56e0aaddd733df67df7d2,2024-05-01T13:01:51.263000
CVE-2024-32979,0,0,4609f2e37347930e20422fd7d03fe2a9f10f1e16fc9069624b36f432c125737a,2024-05-01T13:01:51.263000
CVE-2024-3298,0,0,35145d829af4d19541380a93e6723503e514b69e11aa4b007b05099610c37f21,2024-04-04T16:33:06.610000
@ -246953,8 +246959,8 @@ CVE-2024-33276,0,0,e40c3e22a282bef2a772b0e5f45a645b1fd132b128d015830c0d51073e572
CVE-2024-33292,0,0,020ab2c353c55eeef9a1e2b2491642f03af415da4e6b7c13c8119d36fd6b99ec,2024-05-01T19:50:25.633000
CVE-2024-33300,0,0,a8560aed29473cc1a37b4579725520190d52c05a1e4bff50c24662249af209ac,2024-05-01T19:50:25.633000
CVE-2024-33304,0,0,026cbcee891c3ff389557bc0be4741a8beff7985f5bea7709dba7a015c5d1fd5,2024-05-01T19:50:25.633000
CVE-2024-33306,0,0,909dc24eadff430d79bde03d04d11a7220581a5702b8aa3bedac7a6807c5d6aa,2024-05-01T20:15:12.787000
CVE-2024-33307,0,0,c6016f93d6f8e8f6d1fc979ff128ac687b3fdf296b7210ed46420666ce893096,2024-05-01T20:15:12.837000
CVE-2024-33306,0,1,428bbc6a8b5a62ff998dea118b0c1a9bedf7e8da9bb5b3a1ca2dc047c805df5f,2024-05-02T13:27:25.103000
CVE-2024-33307,0,1,685e6dd47a08dab94c9ba0e23fd24014f68fb2d510e871d193d497b88ce19585,2024-05-02T13:27:25.103000
CVE-2024-33308,0,0,c7a96f814c2d5cc70229a8e21ec556c626542afdc137f20682b753e0d11d5580,2024-04-30T17:52:35.057000
CVE-2024-33309,0,0,bc213cb8c1d9aef27edd281310b54c36cbe3c640e12ed51efcef8f301e533289,2024-04-30T17:52:35.057000
CVE-2024-3333,0,0,8caee5b26018a8a7a4f06ec5d64d35dd731cf8d2f43a25885f4e67db044a1bff,2024-04-17T12:48:07.510000
@ -246972,7 +246978,7 @@ CVE-2024-33383,0,0,b8f5911f0b0cbe287e38f2b2fab377f64f313b30790fd4bdc966dac5709dc
CVE-2024-33393,0,0,2ab9320d7f4b87c8af5836daf49f2661e07e659861544cc1220a6a10a480893a,2024-05-01T19:50:25.633000
CVE-2024-33401,0,0,0257ba245d43966b8ea0e03e8f08a7375e5df55049a2ef0dac897f7812fea9bd,2024-04-30T13:11:16.690000
CVE-2024-3342,0,0,de1407685a84ff141581e4e11e63bda4ec890e2f76cb4a57d17a5da8af4ca55a,2024-04-29T12:42:03.667000
CVE-2024-33423,0,0,7702a103f8c4aa8a8aa61aa707fcd42d7cce8fa17a21b83ffe65dd9f4d28eec5,2024-05-01T20:15:12.887000
CVE-2024-33423,0,1,8f1fa788450514658e193af05941c337fea69ba60eb865ed38aa69b9043ad774,2024-05-02T13:27:25.103000
CVE-2024-33424,0,0,9ddd443c9165aa595f3269bf3ff48c5e18f823e6a41a214de5a31d11eee5736f,2024-05-01T19:50:25.633000
CVE-2024-33428,0,0,fcab77d6fc0b69ab678ed2bb9da6ee9d864cbf9ca3697923a1cae36bc98dec59,2024-05-01T19:50:25.633000
CVE-2024-33429,0,0,2b80ce1efdb79d5635575a559e9b2aee95026f445ddab8685a5ec9d01adac202,2024-05-01T19:50:25.633000
@ -247138,10 +247144,11 @@ CVE-2024-33899,0,0,7114a5be0b85d57a35dcfad97c0c36a38d30e75da327295f2beafea50fa60
CVE-2024-33903,0,0,68f0c13d39cafb4abebbd2993c0e3f21cb6d5284664624c053d60cc9d0b27b3e,2024-04-29T12:42:03.667000
CVE-2024-33904,0,0,94e3a98c0463f8acd176e3df60de225e1631e2e1dbcd1a948aa64ab2e616e6ce,2024-04-29T12:42:03.667000
CVE-2024-33905,0,0,4f2af541fd9603df50f92dd094e460dd4dcee3f568c1f2af9533e6ef2f5fb1b0,2024-05-01T18:15:24.390000
CVE-2024-33911,1,1,18f97d50c742f8eaea6fa218d788a2655d570ba52b280d709e96fcd2034acced,2024-05-02T11:15:45.663000
CVE-2024-33913,1,1,04462e0a4e4e7888344fec411a58f4fb2d5ab710919843d562a94b1f3da5c179,2024-05-02T11:15:45.883000
CVE-2024-33922,1,1,b8b7648fa381a27565b385f3500dd5dc18b0e2fb8196c940baf15b27d7ddd521,2024-05-02T11:15:46.080000
CVE-2024-33930,1,1,ad48838396558beade10730a795a90efe6b623381cb35cbdbe412ca11b8d78a7,2024-05-02T11:15:46.273000
CVE-2024-33911,0,1,3aecc9c6853b34c79146d922a590e2ff56a9634dc21e6f2275a777f672ad645b,2024-05-02T13:27:25.103000
CVE-2024-33913,0,1,fdcdfb506731b7f26c0d67c69dc8ed8c4bfdff71029b6b2f6e847f10e09b4905,2024-05-02T13:27:25.103000
CVE-2024-33922,0,1,581070d9342f09fc7f3ba266aca2e54acec3a9f423037ff85b1ca1eb7af20122,2024-05-02T13:27:25.103000
CVE-2024-33930,0,1,d4854365518648983f110687642324ab33baba9fea77b8107ff83d4e8904d188,2024-05-02T13:27:25.103000
CVE-2024-33944,1,1,4cc781cd62cbbf938c7006c765253cd67313b7791b0366c8f2092cb45b8a99dc,2024-05-02T13:27:25.103000
CVE-2024-3400,0,0,5bb68c1f741d7492d6e3e08b6f1711eb6e28a4a827bd2f3f354ccd1b7a47a1fe,2024-04-23T19:57:25.207000
CVE-2024-34010,0,0,c7884be7d8f67ffff162a59652385bb9347b3f5ac2f6a7086eb2095d43bb9782,2024-04-30T13:11:16.690000
CVE-2024-34011,0,0,92172f1292d1799c8fa1869d3451ebd57e86a05ed284e99cb50bbf506cf263ac,2024-04-30T13:11:16.690000
@ -247199,15 +247206,15 @@ CVE-2024-3464,0,0,0c53100717f2f28c54c57fbaaef472d29e3cb0ff81ebf61eb104a899922afe
CVE-2024-3465,0,0,a42aecf57f43969ec60c90b90013ebe0e449783aa33103b39be184486d2b2ca9,2024-04-11T01:26:03.697000
CVE-2024-3466,0,0,06b3d0b5c629cfcd72994ab03bcc3d914522a60f9b439b6d13775db50704418a,2024-04-11T01:26:03.777000
CVE-2024-3470,0,0,736c8b21abac392de8987478bb4430873353b2c43829321b68bed57cd49a65ed,2024-04-19T16:19:49.043000
CVE-2024-3471,0,0,e541290d721d2b5e7cc32c8a1d842931b0d359aad1fcbb12cc9dfcca3abc212f,2024-05-02T06:15:50.350000
CVE-2024-3472,0,0,e66d94a260f396cd2818a7e0fb014bcdd72caed7f142c32f42d8f202a4d6f234,2024-05-02T06:15:50.453000
CVE-2024-3474,0,0,19256a603288843ef4957f755876dda44d2ff7236c5c87e71a9744bb3a115e2f,2024-05-02T06:15:50.527000
CVE-2024-3475,0,0,5ab7580b07fdcc174360630058d4e84c427107435d0ba2262027ed3024bbf325,2024-05-02T06:15:50.660000
CVE-2024-3476,0,0,51e1c923f1df0f86e114d870c961d0bafe1f0be0b2c57ccf5e916dc6715bb10c,2024-05-02T06:15:50.887000
CVE-2024-3477,0,0,6a6e64dbf9c90af7cfc44f0b75391927494f4071435a4181b76c104182a02dd0,2024-05-02T06:15:50.950000
CVE-2024-3478,0,0,f8a37bb4ffffb5ad2048f3d48be4ff9deef053a6c4502828e1728418c54dd747,2024-05-02T06:15:51.033000
CVE-2024-3481,0,0,3bd1195a471d42f599c39971cba83ae972241d10ef31e66b5133987c56bb6c5b,2024-05-02T06:15:51.130000
CVE-2024-3490,0,0,0e9f7f2bbbdc9a59708ede1ee3d312621701cfcf2d134fb6e542d2086ba6d7b2,2024-05-02T07:15:22.040000
CVE-2024-3471,0,1,cbc5cb26007632d100e107fde481d72ff9ba06a89efad1e9ff744a9c1739fbf7,2024-05-02T13:27:25.103000
CVE-2024-3472,0,1,f68a94f1652baaa594c100312dcabc5e1efb3130c41114defb02ca9928a769f8,2024-05-02T13:27:25.103000
CVE-2024-3474,0,1,53c5670b18dc6efe7d3a5e88fe978e0627d53230b8847a965c80dee6dd1780b1,2024-05-02T13:27:25.103000
CVE-2024-3475,0,1,db623f7e8ebc459406db8205bf10c97451f6b3addd71e8a79752e00cf4508384,2024-05-02T13:27:25.103000
CVE-2024-3476,0,1,00e7dfb333b8fa42d7d616bccfce141aab1431d73f385df2d140fc38580dc8b6,2024-05-02T13:27:25.103000
CVE-2024-3477,0,1,11ef2e1865e18bceb9ea45f02068625dd5bcb5e8c6d6e0bf96d90ee4f4de10aa,2024-05-02T13:27:25.103000
CVE-2024-3478,0,1,c4bafaa9faa426369eb02c9eba910e713d91bcb0d6aa64f149900899ce6d93b5,2024-05-02T13:27:25.103000
CVE-2024-3481,0,1,dcd5e193ceb8a2177751b79e2f89dd989eec37674b662702f65fe4d13178c825,2024-05-02T13:27:25.103000
CVE-2024-3490,0,1,2d446316d7bcf1534476db11353610538165cd9a08885b6a1ae3fad6c54bb10c,2024-05-02T13:27:25.103000
CVE-2024-3491,0,0,155e981c246f1ab173bd75da38bee4b8800ff4b0566c01179dcadac412465c38,2024-04-23T12:52:09.397000
CVE-2024-3493,0,0,63ead7e160b6b2cbd834dd6075f87d345af3361e8d55520f11e81a53e2086aaa,2024-04-16T13:24:07.103000
CVE-2024-3505,0,0,d46d6b7d35449c168e9ff66f3c93f973f2e1e579109b94b88c63ad7baac2b7b8,2024-04-15T13:15:31.997000
@ -247382,7 +247389,7 @@ CVE-2024-3879,0,0,9c5ce4d1a3fc01133b3321115c4ccd096980cfe5baa042c4c9bf7b273029d2
CVE-2024-3880,0,0,237e3bb93a0b113a1c50538806f68b5377561349bd4f47a9139ec72cd356417d,2024-04-17T12:48:31.863000
CVE-2024-3881,0,0,9055ecf63e1aedc7e2787afc56e67bc831564d5ee15f418ef1b408c81c24bb16,2024-04-17T12:48:31.863000
CVE-2024-3882,0,0,846c922d5cf92347db05da515dc041ccc83bdcd548fefc386c188946857d0db7,2024-04-17T12:48:31.863000
CVE-2024-3883,0,0,9ea655a2b0770b5f6ffb7da3956dd1607de90059c9cfd51599ac5d996e832c9a,2024-05-02T09:15:07.233000
CVE-2024-3883,0,1,d522e1e6d76397d7d1c41b40447ec6f8b3dea98505e8f95466fe7adb4c43b24d,2024-05-02T13:27:25.103000
CVE-2024-3889,0,0,c4039354ee4d81ce5faec2ce618c8f0af30c97c1ad1feeb689836cb585b438a6,2024-04-23T12:52:09.397000
CVE-2024-3890,0,0,167befe3a418fe829a07bf47548aa5d5c5fe13f91b75a3184f188bef038919b6,2024-04-26T12:58:17.720000
CVE-2024-3893,0,0,44a15b07d473e504956c2fc6e9bdbbb981ef84a8f1b69c702ee1ea4228dd1195,2024-04-25T13:18:13.537000
@ -247400,7 +247407,7 @@ CVE-2024-3929,0,0,31d0a734bfd88727a2a61deb7a29595ac9c8ac4a930ee35c31639990489d02
CVE-2024-3931,0,0,adc8a79b07f48b35a9681a97a568e852ba1ef2cbd3b7271f585750c2d2c4216b,2024-04-18T13:04:28.900000
CVE-2024-3932,0,0,bce0f8b09e2fc4acc0cfce5940d57ce5f1e0384ac19f6c68ed218175688d8f12,2024-04-18T13:04:28.900000
CVE-2024-3948,0,0,427154a0226db385c08a1dc567a28e238ab290a5825189b73e5e958b25b296e5,2024-04-18T13:04:28.900000
CVE-2024-3955,1,1,229e44a55eb86fafe24e428a64a08d05e85be3a8fb4ceef1e03c0b4b17ec4724,2024-05-02T10:15:08.630000
CVE-2024-3955,0,1,b36745fcce7d9f6f62e934de905ca8807abf8663f34b0c9516f7cf619fc6ffde,2024-05-02T13:27:25.103000
CVE-2024-3962,0,0,9de964d29f43823164300439a0e71453bbca4a5c1f5767eca51db600267798cd,2024-04-26T12:58:17.720000
CVE-2024-3979,0,0,6aa42ee8d62ec6e8fed861933fb15c1009717c3d7f11cc3e5cf9c236e2a9f63c,2024-04-19T18:29:53.040000
CVE-2024-3988,0,0,ed49ad0e503298ba2fe40c90a665a86dcb918b5087ac61c1edfd746c2ca95d24,2024-04-25T13:18:13.537000
@ -247454,7 +247461,7 @@ CVE-2024-4125,0,0,19bddfa0d8b792df08a0313793e20293ca71260dadfffff6dfe8897c2d9d61
CVE-2024-4126,0,0,52d53c69f90fffba02f4ee03823f6932b3dbf87e0fe4c676029ee51a28a9165b,2024-04-25T13:18:20.370000
CVE-2024-4127,0,0,4364ebf3636399a6b862124e1d4818af14c41cdffb5c73435c8a8f0aa84db1d3,2024-04-25T13:18:20.370000
CVE-2024-4141,0,0,569cd2fcd9188d9eabeb08d432690880975d5549c17482aa7e239fef9c6bb2e6,2024-04-24T19:58:40.710000
CVE-2024-4142,0,0,3319bcb448f3c3357df7dde2998672d2661950e66b9efb9011de480ed8c964ff,2024-05-01T21:15:51
CVE-2024-4142,0,1,6297707db3df670a282f3d4e6720e4836d7467220b5fcc108ef053e6a6308f68,2024-05-02T13:27:25.103000
CVE-2024-4159,0,0,cf0daf8ecd317ce4288e8a4812364c59b3b10d10c0c5945533667d40be8a71fc,2024-04-25T23:15:47.087000
CVE-2024-4161,0,0,8c35858b76cabcd8cf78ed758e4c9d58e5dffa2b20a32ec25b41a43a372b2218,2024-04-25T13:18:13.537000
CVE-2024-4163,0,0,0abae06321832430d51e94179291aa50a40ff5a5f25f762f5290e51ebf608907,2024-04-26T12:58:17.720000

Can't render this file because it is too large.