Auto-Update: 2024-05-15T04:00:38.232823+00:00

This commit is contained in:
cad-safe-bot 2024-05-15 04:03:31 +00:00
parent 409005e545
commit b1ccc3b814
15 changed files with 667 additions and 19 deletions

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2024-3189",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-05-15T03:15:13.627",
"lastModified": "2024-05-15T03:15:13.627",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "The Gutenberg Blocks by Kadence Blocks \u2013 Page Builder Features plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'Testimonial', 'Progress Bar', 'Lottie Animations', 'Row Layout', 'Google Maps', and 'Advanced Gallery' blocks in all versions up to, and including, 3.2.37 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security@wordfence.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 2.5
}
]
},
"references": [
{
"url": "https://plugins.trac.wordpress.org/changeset/3083616/kadence-blocks/trunk/includes/blocks/class-kadence-blocks-lottie-block.php",
"source": "security@wordfence.com"
},
{
"url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3076712%40kadence-blocks&new=3076712%40kadence-blocks&sfp_email=&sfph_mail=",
"source": "security@wordfence.com"
},
{
"url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3084683%40kadence-blocks&new=3084683%40kadence-blocks&sfp_email=&sfph_mail=#file2",
"source": "security@wordfence.com"
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/766b0bde-c555-40c1-b174-20045bd89c11?source=cve",
"source": "security@wordfence.com"
}
]
}

View File

@ -0,0 +1,71 @@
{
"id": "CVE-2024-32888",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-05-15T03:15:12.627",
"lastModified": "2024-05-15T03:15:12.627",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "The Amazon JDBC Driver for Redshift is a Type 4 JDBC driver that provides database connectivity through the standard JDBC application program interfaces (APIs) available in the Java Platform, Enterprise Editions. Prior to version 2.1.0.28, SQL injection is possible when using the non-default connection property `preferQueryMode=simple` in combination with application code which has a vulnerable SQL that negates a parameter value. There is no vulnerability in the driver when using the default, extended query mode. Note that `preferQueryMode` is not a supported parameter in Redshift JDBC driver, and is inherited code from Postgres JDBC driver. Users who do not override default settings to utilize this unsupported query mode are not affected. This issue is patched in driver version 2.1.0.28. As a workaround, do not use the connection property `preferQueryMode=simple`. (NOTE: Those who do not explicitly specify a query mode use the default of extended query mode and are not affected by this issue.)"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 10.0,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 6.0
}
]
},
"weaknesses": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"references": [
{
"url": "https://github.com/aws/amazon-redshift-jdbc-driver/commit/0d354a5f26ca23f7cac4e800e3b8734220230319",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/aws/amazon-redshift-jdbc-driver/commit/12a5e8ecfbb44c8154fc66041cca2e20ecd7b339",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/aws/amazon-redshift-jdbc-driver/commit/bc93694201a291493778ce5369a72befeca5ba7d",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/aws/amazon-redshift-jdbc-driver/security/advisories/GHSA-x3wm-hffr-chwm",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/pgjdbc/pgjdbc/security/advisories/GHSA-24rp-q3w6-vc56",
"source": "security-advisories@github.com"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2024-35108",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-05-15T02:15:08.143",
"lastModified": "2024-05-15T02:15:08.143",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "idccms v1.35 was discovered to contain a Cross-Site Request Forgery (CSRF) via the component /admin/homePro_deal.php?mudi=del&dataType=&dataTypeCN."
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/FirstLIF/cms/blob/main/1.md",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2024-35109",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-05-15T02:15:08.840",
"lastModified": "2024-05-15T02:15:08.840",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "idccms v1.35 was discovered to contain a Cross-Site Request Forgery (CSRF) via the component /homePro_deal.php?mudi=add&nohrefStr=close."
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/FirstLIF/cms/blob/main/2.md",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,47 @@
{
"id": "CVE-2024-4199",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-05-15T02:15:09.030",
"lastModified": "2024-05-15T02:15:09.030",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "The Bulk Posts Editing For WordPress plugin for WordPress is vulnerable to unauthorized access of functionality due to a missing capability check on the plugin's AJAX actions in all versions up to, and including, 4.2.3. This makes it possible for authenticated attackers, with subscriber access and higher, to invoke their corresponding functions. This may lead to post creation and duplication, post content retrieval, post taxonomy manipulation."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security@wordfence.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 1.4
}
]
},
"references": [
{
"url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&new=3085134%40ithemeland-bulk-posts-editing-lite%2Ftrunk&old=2946926%40ithemeland-bulk-posts-editing-lite%2Ftrunk&sfp_email=&sfph_mail=",
"source": "security@wordfence.com"
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/683131a0-eec3-4251-b322-5c2088855687?source=cve",
"source": "security@wordfence.com"
}
]
}

View File

@ -0,0 +1,47 @@
{
"id": "CVE-2024-4208",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-05-15T03:15:14.077",
"lastModified": "2024-05-15T03:15:14.077",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "The Gutenberg Blocks with AI by Kadence WP \u2013 Page Builder Features plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the typer effect in the advanced heading widget in all versions up to, and including, 3.2.37 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security@wordfence.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 6.4,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 3.1,
"impactScore": 2.7
}
]
},
"references": [
{
"url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3084683%40kadence-blocks&new=3084683%40kadence-blocks&sfp_email=&sfph_mail=#file2",
"source": "security@wordfence.com"
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/7ea2bb8c-cc8b-49de-9c8e-2c8c0569f4ac?source=cve",
"source": "security@wordfence.com"
}
]
}

View File

@ -0,0 +1,47 @@
{
"id": "CVE-2024-4373",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-05-15T02:15:09.903",
"lastModified": "2024-05-15T02:15:09.903",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "The Sina Extension for Elementor (Slider, Gallery, Form, Modal, Data Table, Tab, Particle, Free Elementor Widgets & Elementor Templates) plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's Sina Particle Layer widget in all versions up to, and including, 3.5.3 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security@wordfence.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 6.4,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 3.1,
"impactScore": 2.7
}
]
},
"references": [
{
"url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3085825%40sina-extension-for-elementor&new=3085825%40sina-extension-for-elementor&sfp_email=&sfph_mail=",
"source": "security@wordfence.com"
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/eee04b1d-188a-4b92-a6f3-dfa843ca20d7?source=cve",
"source": "security@wordfence.com"
}
]
}

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2024-4618",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-05-15T02:15:10.333",
"lastModified": "2024-05-15T02:15:10.333",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "The Exclusive Addons for Elementor plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the Team Member widget in all versions up to, and including, 2.6.9.6 due to insufficient input sanitization and output escaping on user supplied 'url' attribute. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security@wordfence.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 6.4,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 3.1,
"impactScore": 2.7
}
]
},
"references": [
{
"url": "https://plugins.trac.wordpress.org/browser/exclusive-addons-for-elementor/tags/2.6.9.6/elements/team-member/team-member.php#L1696",
"source": "security@wordfence.com"
},
{
"url": "https://plugins.trac.wordpress.org/changeset/3083582/#file4",
"source": "security@wordfence.com"
},
{
"url": "https://wordpress.org/plugins/exclusive-addons-for-elementor/#developers",
"source": "security@wordfence.com"
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/2e82478c-e476-4cdf-ab72-f578331058e2?source=cve",
"source": "security@wordfence.com"
}
]
}

View File

@ -0,0 +1,47 @@
{
"id": "CVE-2024-4656",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-05-15T02:15:10.653",
"lastModified": "2024-05-15T02:15:10.653",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "The Import and export users and customers plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the user agent header in all versions up to, and including, 1.26.6.1 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with administrator access and higher, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security@wordfence.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 4.4,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.3,
"impactScore": 2.7
}
]
},
"references": [
{
"url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&new=3085346%40import-users-from-csv-with-meta%2Ftrunk&old=3078277%40import-users-from-csv-with-meta%2Ftrunk&sfp_email=&sfph_mail=",
"source": "security@wordfence.com"
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/af742451-b2d6-445a-9a10-e950490f6c7c?source=cve",
"source": "security@wordfence.com"
}
]
}

View File

@ -0,0 +1,47 @@
{
"id": "CVE-2024-4734",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-05-15T02:15:11.060",
"lastModified": "2024-05-15T02:15:11.060",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "The Import and export users and customers plugin for WordPress is vulnerable to Stored Cross-Site Scripting via admin settings in all versions up to, and including, 1.26.6.1 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with administrator-level permissions and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. This only affects multi-site installations and installations where unfiltered_html has been disabled."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security@wordfence.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 4.4,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.3,
"impactScore": 2.7
}
]
},
"references": [
{
"url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&new=3085346%40import-users-from-csv-with-meta%2Ftrunk&old=3078277%40import-users-from-csv-with-meta%2Ftrunk&sfp_email=&sfph_mail=",
"source": "security@wordfence.com"
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/0dca168f-a383-42fc-91ba-d78a5d7e6724?source=cve",
"source": "security@wordfence.com"
}
]
}

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2024-4847",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-05-15T02:15:11.330",
"lastModified": "2024-05-15T02:15:11.330",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "The Alt Text AI \u2013 Automatically generate image alt text for SEO and accessibility plugin for WordPress is vulnerable to generic SQL Injection via the \u2018last_post_id\u2019 parameter in all versions up to, and including, 1.4.9 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for authenticated attackers, with Subscriber-level access and above, to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security@wordfence.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
]
},
"references": [
{
"url": "https://plugins.trac.wordpress.org/browser/alttext-ai/trunk/includes/class-atai-attachment.php#L677",
"source": "security@wordfence.com"
},
{
"url": "https://plugins.trac.wordpress.org/changeset/3086107/",
"source": "security@wordfence.com"
},
{
"url": "https://wordpress.org/plugins/alttext-ai/#developers",
"source": "security@wordfence.com"
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/3c192623-eb46-4f1d-b897-433ac80608cb?source=cve",
"source": "security@wordfence.com"
}
]
}

View File

@ -0,0 +1,59 @@
{
"id": "CVE-2024-4893",
"sourceIdentifier": "twcert@cert.org.tw",
"published": "2024-05-15T03:15:14.493",
"lastModified": "2024-05-15T03:15:14.493",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "DigiWin EasyFlow .NET lacks validation for certain input parameters, allowing remote attackers to inject arbitrary SQL commands. This vulnerability enables unauthorized access to read, modify, and delete database records, as well as execute system commands."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "twcert@cert.org.tw",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "twcert@cert.org.tw",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"references": [
{
"url": "https://www.twcert.org.tw/en/cp-139-7801-67d07-2.html",
"source": "twcert@cert.org.tw"
},
{
"url": "https://www.twcert.org.tw/tw/cp-132-7800-843f1-1.html",
"source": "twcert@cert.org.tw"
}
]
}

View File

@ -0,0 +1,59 @@
{
"id": "CVE-2024-4894",
"sourceIdentifier": "twcert@cert.org.tw",
"published": "2024-05-15T03:15:14.887",
"lastModified": "2024-05-15T03:15:14.887",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "ITPison OMICARD EDM fails to properly filter specific URL parameter, allowing unauthenticated remote attackers to modify the parameters and conduct Server-Side Request Forgery (SSRF) attacks. This vulnerability enables attackers to probe internal network information."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "twcert@cert.org.tw",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 3.9,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "twcert@cert.org.tw",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-918"
}
]
}
],
"references": [
{
"url": "https://www.twcert.org.tw/en/cp-139-7803-c0f73-2.html",
"source": "twcert@cert.org.tw"
},
{
"url": "https://www.twcert.org.tw/tw/cp-132-7802-18f3c-1.html",
"source": "twcert@cert.org.tw"
}
]
}

View File

@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update
```plain
2024-05-15T02:00:30.217153+00:00
2024-05-15T04:00:38.232823+00:00
```
### Most recent CVE Modification Timestamp synchronized with NVD
```plain
2024-05-15T01:15:07.843000+00:00
2024-05-15T03:15:14.887000+00:00
```
### Last Data Feed Release
@ -33,26 +33,32 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
### Total Number of included CVEs
```plain
249927
249940
```
### CVEs added in the last Commit
Recently added CVEs: `4`
Recently added CVEs: `13`
- [CVE-2024-0437](CVE-2024/CVE-2024-04xx/CVE-2024-0437.json) (`2024-05-15T00:15:08.320`)
- [CVE-2024-3744](CVE-2024/CVE-2024-37xx/CVE-2024-3744.json) (`2024-05-15T01:15:07.843`)
- [CVE-2024-4363](CVE-2024/CVE-2024-43xx/CVE-2024-4363.json) (`2024-05-15T00:15:10.403`)
- [CVE-2024-4370](CVE-2024/CVE-2024-43xx/CVE-2024-4370.json) (`2024-05-15T00:15:10.890`)
- [CVE-2024-3189](CVE-2024/CVE-2024-31xx/CVE-2024-3189.json) (`2024-05-15T03:15:13.627`)
- [CVE-2024-32888](CVE-2024/CVE-2024-328xx/CVE-2024-32888.json) (`2024-05-15T03:15:12.627`)
- [CVE-2024-35108](CVE-2024/CVE-2024-351xx/CVE-2024-35108.json) (`2024-05-15T02:15:08.143`)
- [CVE-2024-35109](CVE-2024/CVE-2024-351xx/CVE-2024-35109.json) (`2024-05-15T02:15:08.840`)
- [CVE-2024-4199](CVE-2024/CVE-2024-41xx/CVE-2024-4199.json) (`2024-05-15T02:15:09.030`)
- [CVE-2024-4208](CVE-2024/CVE-2024-42xx/CVE-2024-4208.json) (`2024-05-15T03:15:14.077`)
- [CVE-2024-4373](CVE-2024/CVE-2024-43xx/CVE-2024-4373.json) (`2024-05-15T02:15:09.903`)
- [CVE-2024-4618](CVE-2024/CVE-2024-46xx/CVE-2024-4618.json) (`2024-05-15T02:15:10.333`)
- [CVE-2024-4656](CVE-2024/CVE-2024-46xx/CVE-2024-4656.json) (`2024-05-15T02:15:10.653`)
- [CVE-2024-4734](CVE-2024/CVE-2024-47xx/CVE-2024-4734.json) (`2024-05-15T02:15:11.060`)
- [CVE-2024-4847](CVE-2024/CVE-2024-48xx/CVE-2024-4847.json) (`2024-05-15T02:15:11.330`)
- [CVE-2024-4893](CVE-2024/CVE-2024-48xx/CVE-2024-4893.json) (`2024-05-15T03:15:14.493`)
- [CVE-2024-4894](CVE-2024/CVE-2024-48xx/CVE-2024-4894.json) (`2024-05-15T03:15:14.887`)
### CVEs modified in the last Commit
Recently modified CVEs: `3`
Recently modified CVEs: `0`
- [CVE-2024-30040](CVE-2024/CVE-2024-300xx/CVE-2024-30040.json) (`2024-05-15T01:00:02.933`)
- [CVE-2024-30051](CVE-2024/CVE-2024-300xx/CVE-2024-30051.json) (`2024-05-15T01:00:02.933`)
- [CVE-2024-4671](CVE-2024/CVE-2024-46xx/CVE-2024-4671.json) (`2024-05-15T01:00:02.933`)
## Download and Usage

View File

@ -239711,7 +239711,7 @@ CVE-2024-0432,0,0,1bb3e7c690e895540a9764c19a0fde579d3dbd6b31fe1eaf1d7d9b93ab570d
CVE-2024-0433,0,0,6c0cd3a959717c3eb8545fded89ce7c214809e8547648999f5b058b78de14721,2024-02-28T14:06:45.783000
CVE-2024-0435,0,0,a4af240181b4e436782afea0e258c3e740c3fb892526f1fb453ae7559781d8cd,2024-02-26T16:32:25.577000
CVE-2024-0436,0,0,9fcd929fbd2b1f03e9c67adbf6409986853be21d6f77c4049a846f8409bfeaad,2024-02-26T16:32:25.577000
CVE-2024-0437,1,1,618b9c571245b0d81f5426b2d9075590309c32c7f240382c0f466ac5c372c2a4,2024-05-15T00:15:08.320000
CVE-2024-0437,0,0,618b9c571245b0d81f5426b2d9075590309c32c7f240382c0f466ac5c372c2a4,2024-05-15T00:15:08.320000
CVE-2024-0438,0,0,53a4690c26d31ad07302f4f8bb392a0ef6b626c84e711c1975c410690e1c0b31,2024-02-29T13:49:29.390000
CVE-2024-0439,0,0,4f05abe07b33d52630e7e2f16b2fc654dc7361de9b17d784a387c5f2734969ab,2024-02-26T16:32:25.577000
CVE-2024-0440,0,0,1b8c6151d9e5112082edfbd55485c048af1a0e6af77ae8e6651b84d68c946722,2024-02-26T16:32:25.577000
@ -246818,7 +246818,7 @@ CVE-2024-30037,0,0,290baa9a753a465e003432308d4314f74ae40749154dfc1e92c58d68ca38a
CVE-2024-30038,0,0,d5e5e00bb88fa2843447c2e3ed1b2ae1b1b2615eae4c532258ee91f866c30bbb,2024-05-14T19:17:55.627000
CVE-2024-30039,0,0,d5fed7127e3f27a29aeb16aeda0549bdc31fc57cb02487e77f63c575f08b18cd,2024-05-14T19:17:55.627000
CVE-2024-3004,0,0,7c55cab9631a433ec42536dc524bdd182f43322c2736df2334a23893523f06a8,2024-05-14T15:39:43.917000
CVE-2024-30040,0,1,e5a169c3733196151ae3fa1b00aff24c3745513ccff1931ea2b7469793a33c1d,2024-05-15T01:00:02.933000
CVE-2024-30040,0,0,e5a169c3733196151ae3fa1b00aff24c3745513ccff1931ea2b7469793a33c1d,2024-05-15T01:00:02.933000
CVE-2024-30041,0,0,d45f4024daab7e07c7ae96b56beec67cf3e53c483e73985e9da894570c668627,2024-05-14T19:17:55.627000
CVE-2024-30042,0,0,85fca76e579caba4af755fec63b7b1391ba2804a8e71eaeebb80d9f71721f95d,2024-05-14T19:17:55.627000
CVE-2024-30043,0,0,93ada18189e424c30ab94efbcffc4fc6ff81a926860a0461dafdb067e4321783,2024-05-14T19:17:55.627000
@ -246830,7 +246830,7 @@ CVE-2024-30048,0,0,fa983d5d934bdca26c23e3805bcae1940249ecd4a15842181c71b36dc97f5
CVE-2024-30049,0,0,252aa9d3f9340fce12b32b9ca0d9fc65a3cf636494fb1b3718c2381a414ded59,2024-05-14T19:17:55.627000
CVE-2024-3005,0,0,3c8eaaa1feab3a9dd15a4bb7ad0f233dba19b722fe013443779e312c69c376cf,2024-05-02T13:27:25.103000
CVE-2024-30050,0,0,6cc63ca41548c168dfe0a918b16bc61670b8e886b85ca3011dc326ba1652642b,2024-05-14T19:17:55.627000
CVE-2024-30051,0,1,a4d312757bf10e98fc5abde48385ae5800bd3f734365fd985fcda1767b1f318b,2024-05-15T01:00:02.933000
CVE-2024-30051,0,0,a4d312757bf10e98fc5abde48385ae5800bd3f734365fd985fcda1767b1f318b,2024-05-15T01:00:02.933000
CVE-2024-30053,0,0,e35815c7138ab1a7098545e5c1f60270a71687b75ca8293c4e18b251852decd3,2024-05-14T19:17:55.627000
CVE-2024-30054,0,0,0a03f044a7097f59453921f002025a6e0ea1442fa3989cfe0a7dc7863bbd74d0,2024-05-14T19:17:55.627000
CVE-2024-30055,0,0,ea5af506f93723b5b522e6509b55c3faab44e1e96792f001de97fc266cf47da8,2024-05-14T16:13:02.773000
@ -247789,6 +247789,7 @@ CVE-2024-31873,0,0,30397559953deb34a9ae192149473632dc6b2334245e920787a4c5e14fc76
CVE-2024-31874,0,0,1770e58d0ae5591eb931a8cdfdb054fb4d854f81849d14af250c71db6caf553c,2024-04-10T19:49:51.183000
CVE-2024-3188,0,0,5d70d4884e37e1862c5503e8662fdd8be316d1df7ecad77f44114699c1426b8a,2024-04-26T12:58:17.720000
CVE-2024-31887,0,0,e951c215b0e12b882bcc7244c98d7631ee4f4b7a3271b5f24e369f1a635cd3e5,2024-04-17T12:48:07.510000
CVE-2024-3189,1,1,5aa2781204f47ee23cb5615515676c1f1ad24d249b02381287512c40b849723a,2024-05-15T03:15:13.627000
CVE-2024-3191,0,0,586e95910cbcc7cf787668cd046449c145bd5a7bf4a9b7d3e5bbaaeaf1c1282b,2024-05-14T15:40:21.440000
CVE-2024-3192,0,0,aa518b748d7098792cfaf383dd95a19733ae50c0a01b0441788fbe73273424c5,2024-05-14T15:40:21.693000
CVE-2024-31920,0,0,3c0045dbbecad7d78d5b9eb044589c2fc290e421e2d5accb9391890092efc90f,2024-04-15T13:15:31.997000
@ -248405,6 +248406,7 @@ CVE-2024-32883,0,0,e2e880e0de452420192927c1f1d12c9c36baa1369f4d1c0ab4e6cde1e002a
CVE-2024-32884,0,0,06add33b7e931ee07e2f51e4a86646fd0a9c5d7e5967928a204325c2528e5c2e,2024-04-26T19:59:19.793000
CVE-2024-32886,0,0,31849641a11d89489de88f6acec8c151823b3e9a1671398cb3ce14ea686af9d1,2024-05-08T17:05:24.083000
CVE-2024-32887,0,0,9a0b5c279911d37e81f985d5cbe7f0510b3ecf67815d6d232314f8cb4e8f94aa,2024-04-29T12:42:03.667000
CVE-2024-32888,1,1,0e41066fa14334689ac6dcde592c4dfd3e4783f43a8cc1f889f9570e7d368ef8,2024-05-15T03:15:12.627000
CVE-2024-32890,0,0,80b53d257dbc47827b967a6ec22fc70e9bb39dae5de4579c97bb47ad58884e95,2024-05-01T13:01:51.263000
CVE-2024-3293,0,0,3552485a27a6b6c8b2cadd17fbdb3e630238722099a3e2d8d97b0f239cd2dc1a,2024-04-23T12:52:26.253000
CVE-2024-32947,0,0,35287e8f28304ee9599f9712f94ac6e419772e1d66820555100faf85f8aeebf3,2024-04-24T17:16:50.397000
@ -249209,6 +249211,8 @@ CVE-2024-35050,0,0,40188866046a91f191c7f1639193ce449b408a68c45e9e97f9642e7aafb53
CVE-2024-3507,0,0,4311efcb171543ec92e46563bc97a34308842d5cb27d2460f854a987393d053f,2024-05-09T09:15:09.623000
CVE-2024-3508,0,0,c82390a1238326cf6817e875dca33757792126eb5098bd44b5a908dea5e7149a,2024-04-26T12:58:17.720000
CVE-2024-35099,0,0,93e942b92f9cdfe43455da9473fe46e57ccc0e6f1660402d8f3a7786b97c7b2a,2024-05-14T16:11:39.510000
CVE-2024-35108,1,1,3355190a8ee0bbfa467cb5597c5e6afa212a1f34d3a4aee986fbd25e46c2fa8f,2024-05-15T02:15:08.143000
CVE-2024-35109,1,1,0f7d28d4c2861d45b18b341c873e3202a62d1b062d7d5ec560ef543e012ae528,2024-05-15T02:15:08.840000
CVE-2024-3512,0,0,7186c9ec3829c2082fd68b5fc8e23caed587fdf0f4e68c2974db5f41b90fb514,2024-04-25T13:15:51.663000
CVE-2024-3514,0,0,fd39bbcd0f0890f4d85c4ccfb46694b71dc6efa7f8c56852e1f4fd99d58e20d2,2024-04-24T17:15:47.423000
CVE-2024-3515,0,0,5591c01553945d08e143bb397e7b7011721b53594a14b5bacff6fedc69b36f26,2024-04-19T23:15:11.963000
@ -249363,7 +249367,7 @@ CVE-2024-3740,0,0,748b3d32842018acf940cf6ed3ddcd2c513bd665648e4641816075fb24dc78
CVE-2024-3741,0,0,18f0bf81f75c963cb35a1681834c986aa53b39e5d2ec23e117ba7b35df9dd647,2024-04-19T13:10:25.637000
CVE-2024-3742,0,0,4b3ada4ba8a852763747bd8b7f375d88aab1b05d8dd7734620799c1f9021e3bc,2024-04-19T13:10:25.637000
CVE-2024-3743,0,0,a066d49023268d129172d910e0990b3a457ebf914ca5a08a9f020fc0da48a3af,2024-05-02T18:00:37.360000
CVE-2024-3744,1,1,41e6ebd7fe2a296aa0ab14c6ea8bdc52d92894cf0797f04739c3b319b205470e,2024-05-15T01:15:07.843000
CVE-2024-3744,0,0,41e6ebd7fe2a296aa0ab14c6ea8bdc52d92894cf0797f04739c3b319b205470e,2024-05-15T01:15:07.843000
CVE-2024-3746,0,0,ab6567509a82c4f0182861199dbafd1145e3e92d047a264ff58554ba2ee7e5b2,2024-05-01T13:02:20.750000
CVE-2024-3747,0,0,6871870ddb764bd7e2884ba1607d3a8e3ec9c4bf7e3490a3d61f8ca42b77a2e1,2024-05-02T18:00:37.360000
CVE-2024-3752,0,0,06a3522f543993aef42f352f0c011207c560c2e5a1d63c9d8ccc34a87adab0ce,2024-05-06T12:44:56.377000
@ -249616,7 +249620,9 @@ CVE-2024-4192,0,0,d6751fa9142aaa91446de5baa4aa2b6db344761a0aff4ab695cf6603148e6a
CVE-2024-4193,0,0,e9deeb0bdc41c13676562ca936725d7aeb1ece3758666bf0b3b852acf97adf31,2024-05-14T16:11:39.510000
CVE-2024-4195,0,0,320e8c641dbb71fd3a637ea44d2a1260b2aea61b9d12f44c9e97c80bff500815,2024-04-26T12:58:17.720000
CVE-2024-4198,0,0,845a410de3c7b102462b76b86fccfba72df0a0950e69dc55e9742bae00fec8d9,2024-04-26T12:58:17.720000
CVE-2024-4199,1,1,4f8558739d2cfd4bdbe82788f33e66396baa9490f057d1df0b2d37201b297e67,2024-05-15T02:15:09.030000
CVE-2024-4203,0,0,b9100cb2d762239b42c8cf03df52f7e057bb3e7a71ddd83596d3f071a56b0f43,2024-05-02T18:00:37.360000
CVE-2024-4208,1,1,5f0bdac6a84e5ad031ccfeffc3aedeb130766585e0850d0d03a9aad54bf386aa,2024-05-15T03:15:14.077000
CVE-2024-4209,0,0,d8400e0dd8f4909c53290c35079fb7499a08d2e56ed4f79281678d4505414506,2024-05-14T16:11:39.510000
CVE-2024-4213,0,0,33db088b2047cab4402e24074b0626ffc423161f2f205cab9408ae51552f548f,2024-05-14T16:11:39.510000
CVE-2024-4215,0,0,0d7dbfaf8275e9ff6c32259712a00cedd32b92104e92991d7893f67c59faf7d0,2024-05-03T12:50:34.250000
@ -249690,11 +249696,12 @@ CVE-2024-4345,0,0,f00f50139993a52fd7c5e9953c5559186f91d77a99990283e2fa9024cdbc83
CVE-2024-4346,0,0,f22ab2b57ab7913e1ee849412772d79e861a170867683be7f674b4f4c1e4df02,2024-05-07T13:39:32.710000
CVE-2024-4348,0,0,7ecf9e2f00b440e06f89d6de0f2df4f5974c418de77e873b94dee542bc66d4a9,2024-05-14T15:43:25.100000
CVE-2024-4349,0,0,b0d1c3b85ef1776752c2fc81adc9e145cc6f1d929f017c205ea9b4290d878b74,2024-05-14T15:43:26.100000
CVE-2024-4363,1,1,e5018ac2d29a76dfe237f674085e6caf1fa26ed19836135947cff6eacc9c307b,2024-05-15T00:15:10.403000
CVE-2024-4363,0,0,e5018ac2d29a76dfe237f674085e6caf1fa26ed19836135947cff6eacc9c307b,2024-05-15T00:15:10.403000
CVE-2024-4367,0,0,afc88763d21b72640d447a05ef1cc5bae3b59696ba891e4d36a74743b38e403b,2024-05-14T19:17:55.627000
CVE-2024-4368,0,0,0ee02ebde276d817508f5495294b3429c463a1f4241660388e0c329992e72be6,2024-05-04T02:15:06.853000
CVE-2024-4369,0,0,ab5992320463150d25768d540495632f3cea0e672e96fca10ae18e5fed17e7b3,2024-05-02T03:15:15.027000
CVE-2024-4370,1,1,885c04de05f5a662d1c5ffce650ff27268bf059fdb4fb82067fc4f59d3100bb9,2024-05-15T00:15:10.890000
CVE-2024-4370,0,0,885c04de05f5a662d1c5ffce650ff27268bf059fdb4fb82067fc4f59d3100bb9,2024-05-15T00:15:10.890000
CVE-2024-4373,1,1,fa44fb9567dc52146482e7630d0f753fe4eb088b1022f879b3592ac331f523b4,2024-05-15T02:15:09.903000
CVE-2024-4383,0,0,5a1fe08151a13ea21e71cf2d0c78ad0aa3b9532b0b753d777378763b8935a44b,2024-05-14T16:11:39.510000
CVE-2024-4386,0,0,e3470cc6a1cc1ee4032b4297ad39fc1eda67f128aadce11b5ef951d1e0deaf83,2024-05-14T16:11:39.510000
CVE-2024-4392,0,0,295add67f1c1835ca48b184321ee2a614cdfb2bd5847957c4de906f109f41ee2,2024-05-14T19:17:55.627000
@ -249809,6 +249816,7 @@ CVE-2024-4601,0,0,9e1e1f008012e98662e601d1d10e65eeb89abb9d2b4ea828e06c076d042c7c
CVE-2024-4605,0,0,a4edcc830b87308032d99d0feea9a229ab6e4f42dd443adbf886b62b0aa44528,2024-05-14T16:11:39.510000
CVE-2024-4606,0,0,3cb7c67f52970802d09367b8e1299e023e023c69e85466074593b74325edd330,2024-05-14T16:11:39.510000
CVE-2024-4614,0,0,beb5630ff5db8a415fa4bf6f109dad49279ea5965bb91a1d7f892cd406978f05,2024-05-14T15:44:12.883000
CVE-2024-4618,1,1,0634fcd1eff6d21c3761efb327d910146d9585661dd0573e8eb3bfa2fe783559,2024-05-15T02:15:10.333000
CVE-2024-4624,0,0,2f2dfaacad2af40d5d5be1945c7dfb7bd2ed3b09b9d237413e46013b6e4c845a,2024-05-14T19:17:55.627000
CVE-2024-4630,0,0,9ee39c9e70c3fde26d4ddaa20f9f4583498b5ac1a624dc38857653acd661b1f9,2024-05-14T16:11:39.510000
CVE-2024-4631,0,0,e8ed3d07eca49fd9ce5a62406bcf23da9793cbcc792a956665a267b4f25fd693,2024-05-14T15:44:13.487000
@ -249823,8 +249831,9 @@ CVE-2024-4651,0,0,1987e6caff29e378d864306cdefe53691d1f02dcd17d43746abc58ad9d526d
CVE-2024-4652,0,0,662f778a4d5ad721f4cad55dc8ee0012faf6a66bbb8ee06523c4766bf40b6c97,2024-05-14T15:44:14.850000
CVE-2024-4653,0,0,e8399611ff9b3c22a49b29fd6c48d03e625100ac4d82ba02efbcf4dc2d1c1f0e,2024-05-14T15:44:14.983000
CVE-2024-4654,0,0,54e1bc582a5bc46d650cbca5fe2319c8ac0b454abcc9791786eb7af7e6d008e5,2024-05-14T15:44:15.280000
CVE-2024-4656,1,1,09582a8f36f9a29d7c15e38d53099bc5ba2768f3beed43b9bf7055d3b6b75ba8,2024-05-15T02:15:10.653000
CVE-2024-4666,0,0,bf53d4dc056caa27b5c961c61e08b20ea2c8744b37ef1ad83219dd5d8d1bf152,2024-05-14T23:15:13.340000
CVE-2024-4671,0,1,f2e3b6c0de159d5b4f685d54d499be3e2ad6bf853ced24939cfa6f60b46f6050,2024-05-15T01:00:02.933000
CVE-2024-4671,0,0,f2e3b6c0de159d5b4f685d54d499be3e2ad6bf853ced24939cfa6f60b46f6050,2024-05-15T01:00:02.933000
CVE-2024-4672,0,0,0757de8ca73f855a9108a8fa1c5cf086a0160cf81b5241c2bdf6e296b8d20e94,2024-05-14T16:11:39.510000
CVE-2024-4673,0,0,6653b18426020bb158c9af8a31628f48225b12a113e8d380d8144ae272b5739e,2024-05-14T16:11:39.510000
CVE-2024-4674,0,0,a3fe6dba5629269df17582d74be1a6b28d0ce2d6eb6f9a312b40b469e0773ed5,2024-05-14T16:11:39.510000
@ -249865,6 +249874,7 @@ CVE-2024-4729,0,0,375ecc5084060d79bf72c7bc760e2f2b558484c0cffa7c7232e0ab6f659f87
CVE-2024-4730,0,0,b0dca9f83fb2f204157804cf4073378ac70f58a1b5bf16925d50bf4ed33f94f2,2024-05-14T16:11:39.510000
CVE-2024-4731,0,0,60dd4bd3dcfa1c8a29fa6ff8efa41e67e60e8cf74630b45f6b602b21c50655d2,2024-05-14T16:11:39.510000
CVE-2024-4732,0,0,3316be967ba0129e0235093a735c8589ba9ef5aac7901a0137aa601dbe59d6f5,2024-05-14T16:11:39.510000
CVE-2024-4734,1,1,d0c4b3015eb4bf8aba008740a23b48b5138ca2ac284f02127a13e876ce08c30b,2024-05-15T02:15:11.060000
CVE-2024-4735,0,0,63464a81db3daf645fffaf10894f68b4918e555b0017488d48c6ee3eef8f2544,2024-05-14T16:11:39.510000
CVE-2024-4736,0,0,e4d06087e1882aaff25701cd3a044c6201b15e2764fcf11d2265206d665993cd,2024-05-14T16:11:39.510000
CVE-2024-4737,0,0,bfb4b2c8212ccf694e4ea54dd95fb9645e59e585b5fb9cdc8914cf5a29e42b17,2024-05-14T16:11:39.510000
@ -249920,9 +249930,12 @@ CVE-2024-4823,0,0,8f31bcd40817f289d241c4794563294d4e400345d0538e98840e69ced9022c
CVE-2024-4824,0,0,12997f7cb79ce3030574eecdb24c333619e16861704962f1656fbd26f7680d48,2024-05-14T16:11:39.510000
CVE-2024-4825,0,0,1e0f749d21405e7cf2edd3aac0c05b5f99c8de86001892a511648a80a7280ab0,2024-05-14T16:11:39.510000
CVE-2024-4840,0,0,c9ca0895b4a51cab0e2c0d59965d65e29a18e7a3fb86aea7f8e73c28a9d25dc4,2024-05-14T16:11:39.510000
CVE-2024-4847,1,1,168de28d43a8994e6be1b393cdf67b3b0d4b763bc2fc32da3a2089561970ea24,2024-05-15T02:15:11.330000
CVE-2024-4853,0,0,08d9956cd1fc82aacd4cc52b553fb1ad7c9d41ecc90cc195f4a6a68d3e7942e4,2024-05-14T16:11:39.510000
CVE-2024-4854,0,0,3d480ab215b58518bc8b4d2ff21b01ce90d2ee2286e511ec2300ae6a56284679,2024-05-14T16:11:39.510000
CVE-2024-4855,0,0,bb7758177ed568c219e106881d12c1be9e05abe80abbc1ed8dc52d386d88e25c,2024-05-14T16:11:39.510000
CVE-2024-4859,0,0,0e7c5125874f1925896116e914ab4a4e3b887f22c447a3549ca2e9da643585d9,2024-05-14T19:17:55.627000
CVE-2024-4860,0,0,4e8a6a855a2e6e16dad5d91e17b904b6b709d252c51887af538903d405cd55bc,2024-05-14T19:17:55.627000
CVE-2024-4871,0,0,8ab16008698c56948c2f0ae8cf729bc698d4cce8f05c254b91a2ba1c9d6200d3,2024-05-14T19:17:55.627000
CVE-2024-4893,1,1,60156774591da77869979207d38e215089485fdce2e0c23df362a29761d30a35,2024-05-15T03:15:14.493000
CVE-2024-4894,1,1,b00b88743bad4751654f198d7526fd5c7ba8f24e7bd58f5b01e79855c3745b20,2024-05-15T03:15:14.887000

Can't render this file because it is too large.