Auto-Update: 2024-06-01T10:00:37.360702+00:00

This commit is contained in:
cad-safe-bot 2024-06-01 10:03:28 +00:00
parent 3c734e7ca1
commit b2ba691108
9 changed files with 380 additions and 14 deletions

View File

@ -0,0 +1,47 @@
{
"id": "CVE-2024-2295",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-06-01T08:15:08.407",
"lastModified": "2024-06-01T08:15:08.407",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "The Contact Form Manager plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's [xyz-cfm-form] shortcode in all versions up to, and including, 1.6.1 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers with contributor-level and above permissions to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security@wordfence.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 6.4,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 3.1,
"impactScore": 2.7
}
]
},
"references": [
{
"url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3095454%40contact-form-manager&new=3095454%40contact-form-manager&sfp_email=&sfph_mail=",
"source": "security@wordfence.com"
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/1cda411b-b277-4b4d-9087-dadede4b67dd?source=cve",
"source": "security@wordfence.com"
}
]
}

View File

@ -0,0 +1,47 @@
{
"id": "CVE-2024-3200",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-06-01T09:15:09.453",
"lastModified": "2024-06-01T09:15:09.453",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "The wpForo Forum plugin for WordPress is vulnerable to SQL Injection via the 'slug' attribute of the 'wpforo' shortcode in all versions up to, and including, 2.3.3 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for authenticated attackers, with contributor-level access and above, to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security@wordfence.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.9,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.1,
"impactScore": 6.0
}
]
},
"references": [
{
"url": "https://plugins.trac.wordpress.org/changeset?old_path=/wpforo/tags/2.3.3&new_path=/wpforo/tags/2.3.4&sfp_email=&sfph_mail=",
"source": "security@wordfence.com"
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/f54cdad2-88db-4604-8064-fa6175176760?source=cve",
"source": "security@wordfence.com"
}
]
}

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2024-35636",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-06-01T09:15:08.983",
"lastModified": "2024-06-01T09:15:08.983",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Cross-Site Request Forgery (CSRF) vulnerability in Uploadcare Uploadcare File Uploader and Adaptive Delivery (beta) uploadcare.This issue affects Uploadcare File Uploader and Adaptive Delivery (beta): from n/a through 3.0.11."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-352"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/uploadcare/wordpress-uploadcare-file-uploader-and-adaptive-delivery-plugin-3-0-11-cross-site-request-forgery-csrf-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -0,0 +1,47 @@
{
"id": "CVE-2024-3820",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-06-01T09:15:09.660",
"lastModified": "2024-06-01T09:15:09.660",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "The wpDataTables \u2013 WordPress Data Table, Dynamic Tables & Table Charts Plugin plugin for WordPress is vulnerable to SQL Injection via the 'id_key' parameter of the wdt_delete_table_row AJAX action in all versions up to, and including, 6.3.1 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database. Please note this only affects the premium version of the plugin."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security@wordfence.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 10.0,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 6.0
}
]
},
"references": [
{
"url": "https://wpdatatables.com/help/whats-new-changelog/",
"source": "security@wordfence.com"
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/fbba822b-172f-4167-bccf-4697a298178e?source=cve",
"source": "security@wordfence.com"
}
]
}

View File

@ -0,0 +1,47 @@
{
"id": "CVE-2024-3821",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-06-01T09:15:09.863",
"lastModified": "2024-06-01T09:15:09.863",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "The wpDataTables \u2013 WordPress Data Table, Dynamic Tables & Table Charts Plugin plugin for WordPress is vulnerable to unauthorized access due to a missing capability check on several functions in the wdt_ajax_actions.php file in all versions up to, and including, 6.3.2. This makes it possible for unauthenticated attackers to manipulate data tables. Please note this only affects the premium version of the plugin."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security@wordfence.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW",
"baseScore": 7.3,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.4
}
]
},
"references": [
{
"url": "https://wpdatatables.com/help/whats-new-changelog/",
"source": "security@wordfence.com"
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/d32215b5-9ecb-4feb-b76f-18821184dd8b?source=cve",
"source": "security@wordfence.com"
}
]
}

View File

@ -0,0 +1,47 @@
{
"id": "CVE-2024-4958",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-06-01T08:15:08.637",
"lastModified": "2024-06-01T08:15:08.637",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "The User Registration \u2013 Custom Registration Form, Login Form, and User Profile WordPress Plugin plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the 'import_form_action' function in versions up to, and including, 3.2.0.1. This makes it possible for authenticated attackers, with contributor-level permissions and above, to import a registration form with a default user role of administrator. If an administrator approves or publishes a post or page with the shortcode to the imported form, any user can register as an administrator."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security@wordfence.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.1,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.2,
"impactScore": 5.9
}
]
},
"references": [
{
"url": "https://plugins.trac.wordpress.org/changeset/3095484/user-registration/tags/3.2.1/includes/class-ur-ajax.php",
"source": "security@wordfence.com"
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/710574a8-a6e2-4ee6-9ea7-03a34994fec7?source=cve",
"source": "security@wordfence.com"
}
]
}

View File

@ -0,0 +1,67 @@
{
"id": "CVE-2024-5348",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-06-01T09:15:10.063",
"lastModified": "2024-06-01T09:15:10.063",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "The Elements For Elementor plugin for WordPress is vulnerable to Local File Inclusion in all versions up to, and including, 2.1 via the 'beforeafter_layout' attribute of the beforeafter widget, the 'eventsgrid_layout' attribute of the eventsgrid and list widgets, the 'marquee_layout' attribute of the marquee widget, the 'postgrid_layout' attribute of the postgrid widget, the 'woocart_layout' attribute of the woocart widget, and the 'woogrid_layout' attribute of the woogrid widget. This makes it possible for authenticated attackers, with Contributor-level access and above, to include and execute arbitrary files on the server, allowing the execution of any PHP code in those files. This can be used to bypass access controls, obtain sensitive data, or achieve code execution in cases where images and other \u201csafe\u201d file types can be uploaded and included."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security@wordfence.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
]
},
"references": [
{
"url": "https://plugins.trac.wordpress.org/browser/nd-elements/trunk/widgets/beforeafter/index.php#L121",
"source": "security@wordfence.com"
},
{
"url": "https://plugins.trac.wordpress.org/browser/nd-elements/trunk/widgets/eventsgrid/index.php#L113",
"source": "security@wordfence.com"
},
{
"url": "https://plugins.trac.wordpress.org/browser/nd-elements/trunk/widgets/list/index.php#L401",
"source": "security@wordfence.com"
},
{
"url": "https://plugins.trac.wordpress.org/browser/nd-elements/trunk/widgets/marquee/index.php#L200",
"source": "security@wordfence.com"
},
{
"url": "https://plugins.trac.wordpress.org/browser/nd-elements/trunk/widgets/postgrid/index.php#L186",
"source": "security@wordfence.com"
},
{
"url": "https://plugins.trac.wordpress.org/changeset/3094318/",
"source": "security@wordfence.com"
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/e55b86e2-b42e-483d-93cd-2f09af64dbc7?source=cve",
"source": "security@wordfence.com"
}
]
}

View File

@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update
```plain
2024-06-01T08:00:37.915599+00:00
2024-06-01T10:00:37.360702+00:00
```
### Most recent CVE Modification Timestamp synchronized with NVD
```plain
2024-06-01T07:15:08.393000+00:00
2024-06-01T09:15:10.063000+00:00
```
### Last Data Feed Release
@ -33,18 +33,20 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
### Total Number of included CVEs
```plain
252354
252361
```
### CVEs added in the last Commit
Recently added CVEs: `5`
Recently added CVEs: `7`
- [CVE-2024-1324](CVE-2024/CVE-2024-13xx/CVE-2024-1324.json) (`2024-06-01T07:15:07.850`)
- [CVE-2024-2506](CVE-2024/CVE-2024-25xx/CVE-2024-2506.json) (`2024-06-01T07:15:08.393`)
- [CVE-2024-4087](CVE-2024/CVE-2024-40xx/CVE-2024-4087.json) (`2024-06-01T06:15:08.340`)
- [CVE-2024-4342](CVE-2024/CVE-2024-43xx/CVE-2024-4342.json) (`2024-06-01T06:15:09.520`)
- [CVE-2024-5501](CVE-2024/CVE-2024-55xx/CVE-2024-5501.json) (`2024-06-01T06:15:09.993`)
- [CVE-2024-2295](CVE-2024/CVE-2024-22xx/CVE-2024-2295.json) (`2024-06-01T08:15:08.407`)
- [CVE-2024-3200](CVE-2024/CVE-2024-32xx/CVE-2024-3200.json) (`2024-06-01T09:15:09.453`)
- [CVE-2024-35636](CVE-2024/CVE-2024-356xx/CVE-2024-35636.json) (`2024-06-01T09:15:08.983`)
- [CVE-2024-3820](CVE-2024/CVE-2024-38xx/CVE-2024-3820.json) (`2024-06-01T09:15:09.660`)
- [CVE-2024-3821](CVE-2024/CVE-2024-38xx/CVE-2024-3821.json) (`2024-06-01T09:15:09.863`)
- [CVE-2024-4958](CVE-2024/CVE-2024-49xx/CVE-2024-4958.json) (`2024-06-01T08:15:08.637`)
- [CVE-2024-5348](CVE-2024/CVE-2024-53xx/CVE-2024-5348.json) (`2024-06-01T09:15:10.063`)
### CVEs modified in the last Commit

View File

@ -241292,7 +241292,7 @@ CVE-2024-1320,0,0,3a0636d373189b89337775a3f1aacdfe2e6f337604803376016d2fcbf4500c
CVE-2024-1321,0,0,af85235b999d15d959919e61d6e5de59b85a9e9916fb22a2e4657d05e4933502,2024-03-13T18:16:18.563000
CVE-2024-1322,0,0,5019d30fc595e15b7284ce25283849f3514b2c7376ac1a074e5d6c20d0ba7d5b,2024-02-29T13:49:29.390000
CVE-2024-1323,0,0,f857e29b0540aed96943a25b1179a5166e6aff501672f2c505f52ee84f4e77cb,2024-02-27T14:20:06.637000
CVE-2024-1324,1,1,1604fe7b890447a97be74760baffe24e75a7dc51128f2d57200b4593dc3cf155,2024-06-01T07:15:07.850000
CVE-2024-1324,0,0,1604fe7b890447a97be74760baffe24e75a7dc51128f2d57200b4593dc3cf155,2024-06-01T07:15:07.850000
CVE-2024-1325,0,0,42176d3fb0ea047577bb43005fdd80a5b216404e4d10bfc5a87ca78c2479aa17,2024-03-20T13:00:16.367000
CVE-2024-1326,0,0,f742b2e1b0f964f5a5861c38f5d4ab056095ec8f5957f404653a524040bbf1d4,2024-03-21T12:58:51.093000
CVE-2024-1327,0,0,1b6e3f0296467e9f6b424925712e479dea0088dc2698e1adadd7f96bd6f1e88d,2024-04-03T12:38:04.840000
@ -243526,6 +243526,7 @@ CVE-2024-22939,0,0,98ae5450b25ceaff1169d7851ac12cb3d1f8ed4212f5c71a0110eb042c52a
CVE-2024-2294,0,0,7adaa24a33704366500d65a38c52ba5d5887ad22bed1bd0562d7b36efb6d901e,2024-03-17T22:38:29.433000
CVE-2024-22942,0,0,79bd7e0ad33fd20869abd839387d8922f33a08a9a291fa28b02d1093824080e6,2024-01-18T15:15:47.273000
CVE-2024-22949,0,0,422e733b9623e1850b76f79b7039472b307e7fc9b4786b379cdd80ebbc4b56bf,2024-05-17T02:36:27.340000
CVE-2024-2295,1,1,0c554dc1ce9c659b30b867d7a62eb8efeced95148247bab8b5248e28d5b0efa4,2024-06-01T08:15:08.407000
CVE-2024-22955,0,0,4ae6e1e162ac27be2c1563f300454f76989ec1b9814e0f4be1652f56a6f11be5,2024-01-25T14:54:48.427000
CVE-2024-22956,0,0,2da6b272cb072bcb92b74c4c5c3faca0048e5b46583e9ffdd9571398ebecd789,2024-01-25T14:55:01.053000
CVE-2024-22957,0,0,045bad9ba8bb739147d8dcd83b4e5a0ded4b848e11c744629a53c265926b4f4e,2024-01-25T14:59:59.737000
@ -244724,7 +244725,7 @@ CVE-2024-25047,0,0,13db085f684d79ef9745d34b45d7fc06de8a1d4ab15f35cf7f17ac2900698
CVE-2024-25048,0,0,610a65aa068817d20a042aeecc25c887034723f165ecc379125f80c2bf8a57aa,2024-04-29T12:42:03.667000
CVE-2024-2505,0,0,f9efd81999a67e571786699340d45ecbc4af4577ba4f92360cdbb165e79506a4,2024-04-29T12:42:03.667000
CVE-2024-25050,0,0,2895a503880459770c96f9ab5f8cf4bc71edd50703fee0b5f0e32007918ee69d,2024-04-29T12:42:03.667000
CVE-2024-2506,1,1,8ad373587e8f603f35f109fba476a8c7eaf4e0be07fd8830b82a826eb910cf72,2024-06-01T07:15:08.393000
CVE-2024-2506,0,0,8ad373587e8f603f35f109fba476a8c7eaf4e0be07fd8830b82a826eb910cf72,2024-06-01T07:15:08.393000
CVE-2024-25062,0,0,9596ed5cf07a8bc8469d4afc28fc727a431af7cff3b6b8e84435c301d9955756,2024-02-13T00:40:40.503000
CVE-2024-25063,0,0,ada8a3e76748f7f6ba8d6378c081423ac8f962f095964d00e876ad6b7009736e,2024-03-04T22:45:02.117000
CVE-2024-25064,0,0,1c648660fe74d25bd4bc9587030796b3cc77cb44c915d4df3e4024ac11525ccf,2024-03-04T22:43:15.337000
@ -249014,6 +249015,7 @@ CVE-2024-31995,0,0,66dfe11a273e9e10d102f877b390a578235479d84ca6da17689c27557fdb1
CVE-2024-31996,0,0,4bc228afb2f37b1ef8f323b1e059ab55f2f5ea66358ab4f20e2844a94396b7b8,2024-04-11T12:47:44.137000
CVE-2024-31997,0,0,d95ca9b47538ea73a196934e9c1064ac6bfd03df35a75cfa6de5a54ba7f14856,2024-04-11T12:47:44.137000
CVE-2024-31999,0,0,92063baa188f8d1eb46101bed0277138de32335b249687b065a40c476ebdada7,2024-04-11T12:47:44.137000
CVE-2024-3200,1,1,c1352cf58376da334caf49545ca518e8dfdf66921c575a1da98714d4faf89d74,2024-06-01T09:15:09.453000
CVE-2024-32000,0,0,5a1773951b9e4056d222ee9010995a856338856d61b3ccc3a9db5455d3c02bfb,2024-04-15T13:15:31.997000
CVE-2024-32001,0,0,5f137f0e0d607eeec96c185575fc4489622e4c58e021858f7aee0551fd5f0547,2024-04-11T12:47:44.137000
CVE-2024-32002,0,0,48be14afa98a3d0838703e3a18294dea9901ede648690c195f851d5768397209,2024-05-23T20:40:28.707000
@ -250778,6 +250780,7 @@ CVE-2024-3560,0,0,66c1a96b1f1d19ab8c2a91f30bb939a8ccde028ecd6951f27029cb1628de4d
CVE-2024-35618,0,0,f4a659269990a7da5fc8a683283ab4936f111dc8d0577fd89324aa0b32252657,2024-05-24T18:09:20.027000
CVE-2024-35621,0,0,359bbde00ddda9bcf647c6b7e008c50b5044b1ab7e2482e3d77bfaec39975360,2024-05-28T17:11:47.007000
CVE-2024-35627,0,0,152f6a140367536a1e62d9a33b0213a3c0edb39ccbba33db112f0915411e954b,2024-05-24T01:15:30.977000
CVE-2024-35636,1,1,50355c13300a6ac082e1c483b1ab0ef66d8d81a837d0b58fd86ac7bbb9fe7982,2024-06-01T09:15:08.983000
CVE-2024-3564,0,0,126b0ad745c05ac2b6e0879d574d7c57b3c5395a16548c8e712a48ce4bee21ab,2024-06-01T04:15:08.743000
CVE-2024-3565,0,0,e1b2000c5686d2ca445ed687220d6569396d5c02fc079146ba9e31752c24516d,2024-06-01T04:15:09
CVE-2024-3566,0,0,e417ef1ceca67d3a9a8ba800520d4a9974bcf4eba2e3e6325dafdfbfe6af8d6b,2024-04-10T19:49:51.183000
@ -251369,6 +251372,8 @@ CVE-2024-3812,0,0,f751171253b8aec65ad3eb6d2474d3ee930fd7bd925f44cbf577354bd9ac3c
CVE-2024-3817,0,0,46e4b3903939ad7f28eeb8afee28fc4c5b18be71847d60ae426ede3b66e11122,2024-04-18T13:04:28.900000
CVE-2024-3818,0,0,3b93c96d931c7712dba585285a5a0f954163c40c8ab2b4d2e42e74b7a416a166,2024-04-19T13:10:25.637000
CVE-2024-3819,0,0,070335cf0d21b4518c9cf130cbde224bb7db7bd3582033700dab419bc756cd20,2024-05-02T18:00:37.360000
CVE-2024-3820,1,1,48d416ec6de0088cea36d5f27c3c88b33b9c9a808b213e785f402e355f2b1677,2024-06-01T09:15:09.660000
CVE-2024-3821,1,1,acbaf7f547cb98d9d82a5dc597afe162d8e8477fbf56803e65654df99ac62d31,2024-06-01T09:15:09.863000
CVE-2024-3822,0,0,fc2c97d17f172eec9f94cdc5060f4aab438cbcb9ae5ff2766add603f099f299e,2024-05-15T16:40:19.330000
CVE-2024-3823,0,0,cd28ea160a68276fdd70271b0ec926d19fdc3598e922bafa9bf05d9fdd41ea0b,2024-05-15T16:40:19.330000
CVE-2024-3824,0,0,8545575d3e734e1433cd4d7c91c77cd29907e6f5ee87d4739239efdf13c20f26,2024-05-15T16:40:19.330000
@ -251541,7 +251546,7 @@ CVE-2024-4082,0,0,9bcc679f7514b7d071aa621d11dbe3b6578d11cf65d1c2f18fedd0888ce997
CVE-2024-4083,0,0,90b3f0c23e53e5107774f39811ea28166caf07e02a51ec5c595625bec75a4f5e,2024-05-02T18:00:37.360000
CVE-2024-4085,0,0,18b49aedef154a5f78284d7ff3699691fe3b4904260085a931cc6d08f4fb7ca8,2024-05-02T18:00:37.360000
CVE-2024-4086,0,0,c06eb3f0c2fbe1c42ce58a59441202866280214c07091170b4fb53c94814c994,2024-05-02T18:00:37.360000
CVE-2024-4087,1,1,e74efa787d495285cea92567f71658c70a19cd01250c75f95c089062beb56709,2024-06-01T06:15:08.340000
CVE-2024-4087,0,0,e74efa787d495285cea92567f71658c70a19cd01250c75f95c089062beb56709,2024-06-01T06:15:08.340000
CVE-2024-4092,0,0,4be02f9c67d30932bc0929e64c1c04dde83d92e769e6b30b60cbc598e8e37f4c,2024-05-02T18:00:37.360000
CVE-2024-4093,0,0,5d27408cc41c323f4b0e69479d9f46468fbd0106e510632bee156499f1d6b2eb,2024-05-17T02:40:15.433000
CVE-2024-4097,0,0,6a60177672bc62dbe43e4e7ccd78e74b9159babed54b0d3a303c5a9a6fcd009a,2024-05-02T18:00:37.360000
@ -251706,7 +251711,7 @@ CVE-2024-4336,0,0,bea5a7f53013b694022e2bd0018a4064fb0ebf2c6ec290178b3a567f091ff4
CVE-2024-4337,0,0,08997cb0f3d0ed65aebc3b58ae13b7e381ac12042dd4375a545df1f240dc7b83,2024-04-30T13:11:16.690000
CVE-2024-4339,0,0,bea5b1829080bc48e0dd548941045de99c983236691a3af86422b1ab8f30d243,2024-05-14T16:11:39.510000
CVE-2024-4340,0,0,cc413663d0b28645506d2728a6df6437d317b717b85c09519211319a2c38a0e2,2024-04-30T17:52:35.057000
CVE-2024-4342,1,1,8ba42011d07c0715e835d7017e1b17f289de225c8673a4061c4059f69a247601,2024-06-01T06:15:09.520000
CVE-2024-4342,0,0,8ba42011d07c0715e835d7017e1b17f289de225c8673a4061c4059f69a247601,2024-06-01T06:15:09.520000
CVE-2024-4345,0,0,f00f50139993a52fd7c5e9953c5559186f91d77a99990283e2fa9024cdbc8333,2024-05-07T13:39:32.710000
CVE-2024-4346,0,0,f22ab2b57ab7913e1ee849412772d79e861a170867683be7f674b4f4c1e4df02,2024-05-07T13:39:32.710000
CVE-2024-4347,0,0,15643945d0a0665e7f19da09fb1e76c15695d6c7f0b26fb83512ea8bedffd3f1,2024-05-24T01:15:30.977000
@ -252091,6 +252096,7 @@ CVE-2024-4948,0,0,2b5345a3a2ad0f0e256c8a9888ed4459968962a0ab1b7459292f31a2fc3a82
CVE-2024-4949,0,0,259df003248cd164c42bd8e14c2329886e112004798407d6615ac49c44fb7c83,2024-05-16T13:03:05.353000
CVE-2024-4950,0,0,ee7f090411e231f963c331a4d42c01705715794d425732d14831f9be8aa12a99,2024-05-16T13:03:05.353000
CVE-2024-4956,0,0,ee2bcf2dea357e2a10f3afc4aab6bf4b7aa596bd0271ebb4f60e3d58e4ce3e86,2024-05-17T18:36:31.297000
CVE-2024-4958,1,1,04862eec13688fbded39d1b2f225094d393af4262309c9857a4e05cd2c33b531,2024-06-01T08:15:08.637000
CVE-2024-4960,0,0,ef25dcb7666716cb0b96f37296443474114cea70a21d0ab39d740c2fd1ad7b47,2024-05-17T02:40:43.877000
CVE-2024-4961,0,0,0d2d4f4239c9a9f29742a2da2d8e79004d41b07adb750c3d0ef3c07228a3521b,2024-05-17T02:40:43.983000
CVE-2024-4962,0,0,8bdf0697ee3d9e144772b39a0ef2523a003c7f01f25c4eacca12a9d372d3285d,2024-05-17T02:40:44.093000
@ -252266,6 +252272,7 @@ CVE-2024-5340,0,0,c66c0c9e55de3c725084d3080da1dc604d47daf703d95b2c548541ec6a3822
CVE-2024-5341,0,0,2b72dd4ef57e598a2469a1d6786a4762ce0fcb8187c35f2f4bd1ff39b4044b7e,2024-05-30T13:15:41.297000
CVE-2024-5345,0,0,4ef09b351c74f9d110d594e3f259309be3bb624b771ff16733d9a7bb289d18d1,2024-05-31T13:01:46.727000
CVE-2024-5347,0,0,9a2a71210aaa051d4636ad0136ca45d374f37b52e66a2ab59e561ff84b7f7ab3,2024-05-31T13:01:46.727000
CVE-2024-5348,1,1,6ccd3ae4427fc8195f55f69e99352ba2924ed63eef7a8159374aab2a5e28fc1e,2024-06-01T09:15:10.063000
CVE-2024-5350,0,0,60bbd22831ddecb115d40713a9dc768f9983e70563a63aa9f7486c68fbd4f9e1,2024-05-28T12:39:42.673000
CVE-2024-5351,0,0,75936f9a30b9b2678d667660507da4226e150a018add31c316ae6f6c8d9a34b8,2024-05-28T12:39:42.673000
CVE-2024-5352,0,0,436cc86ab2a56db91a02662bc69df77d88892fce705caf803e28ba33694f3f1c,2024-05-28T12:39:42.673000
@ -252337,7 +252344,7 @@ CVE-2024-5496,0,0,f9ff11a24b3abb894f34c14951341b2ee370de96e88bd569fd2da0a0739988
CVE-2024-5497,0,0,5457e11aa9912ccaa85ab2dbc667746bc0af564346b70457a8e484fb204a2400,2024-05-31T13:01:46.727000
CVE-2024-5498,0,0,dab02e844b257084ed7b3549ae0f3640a76ecb84ebd8816420b3fd7743f6bb99,2024-05-31T13:01:46.727000
CVE-2024-5499,0,0,81e89a725c57d0700c4cd096315f3d39ae027d50af2b014e3217c574a66f3e1e,2024-05-31T13:01:46.727000
CVE-2024-5501,1,1,01b60c5bdecafbdbde7ec8a89defab59e96659e3d3cad6a10a6037081b726d85,2024-06-01T06:15:09.993000
CVE-2024-5501,0,0,01b60c5bdecafbdbde7ec8a89defab59e96659e3d3cad6a10a6037081b726d85,2024-06-01T06:15:09.993000
CVE-2024-5514,0,0,70c4aeaa591affd56aff675f51e2f18386671ce8fe86006ee8f4233a6878a480,2024-05-30T13:15:41.297000
CVE-2024-5515,0,0,75c087cba560c69ea51e2ef7fee0a75443e34aed02c5f5a8120168bfbc9c38e7,2024-05-30T13:40:12.593000
CVE-2024-5516,0,0,336f81c0c897f191b942647b5f4688ae70d8be9537f65a708fdfac1e0e3d267a,2024-05-30T18:19:11.743000

Can't render this file because it is too large.