Auto-Update: 2024-05-24T14:00:30.028511+00:00

This commit is contained in:
cad-safe-bot 2024-05-24 14:03:21 +00:00
parent 79d335ceaa
commit b3acf270e6
35 changed files with 547 additions and 94 deletions

View File

@ -2,12 +2,16 @@
"id": "CVE-2023-1001", "id": "CVE-2023-1001",
"sourceIdentifier": "cna@vuldb.com", "sourceIdentifier": "cna@vuldb.com",
"published": "2024-05-24T06:15:07.797", "published": "2024-05-24T06:15:07.797",
"lastModified": "2024-05-24T06:15:07.797", "lastModified": "2024-05-24T13:03:11.993",
"vulnStatus": "Received", "vulnStatus": "Awaiting Analysis",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
"value": "A vulnerability, which was classified as problematic, has been found in xuliangzhan vxe-table up to 3.7.9. This issue affects the function export of the file packages/textarea/src/textarea.js of the component vxe-textarea. The manipulation of the argument inputValue leads to cross site scripting. The attack may be initiated remotely. Upgrading to version 3.7.10 is able to address this issue. The patch is named d70b0e089740b65a22c89c106ebc4627ac48a22d. It is recommended to upgrade the affected component. The associated identifier of this vulnerability is VDB-266123." "value": "A vulnerability, which was classified as problematic, has been found in xuliangzhan vxe-table up to 3.7.9. This issue affects the function export of the file packages/textarea/src/textarea.js of the component vxe-textarea. The manipulation of the argument inputValue leads to cross site scripting. The attack may be initiated remotely. Upgrading to version 3.7.10 is able to address this issue. The patch is named d70b0e089740b65a22c89c106ebc4627ac48a22d. It is recommended to upgrade the affected component. The associated identifier of this vulnerability is VDB-266123."
},
{
"lang": "es",
"value": "Una vulnerabilidad fue encontrada en xuliangzhan vxe-table hasta 3.7.9 y clasificada como problem\u00e1tica. Este problema afecta la funci\u00f3n de exportaci\u00f3n del archivo packages/textarea/src/textarea.js del componente vxe-textarea. La manipulaci\u00f3n del argumento inputValue conduce a Cross-Site Scripting. El ataque puede iniciarse de forma remota. La actualizaci\u00f3n a la versi\u00f3n 3.7.10 puede solucionar este problema. El parche se llama d70b0e089740b65a22c89c106ebc4627ac48a22d. Se recomienda actualizar el componente afectado. El identificador asociado de esta vulnerabilidad es VDB-266123."
} }
], ],
"metrics": { "metrics": {

View File

@ -2,12 +2,16 @@
"id": "CVE-2023-1111", "id": "CVE-2023-1111",
"sourceIdentifier": "cna@vuldb.com", "sourceIdentifier": "cna@vuldb.com",
"published": "2024-05-24T07:15:08.213", "published": "2024-05-24T07:15:08.213",
"lastModified": "2024-05-24T07:15:08.213", "lastModified": "2024-05-24T13:03:05.093",
"vulnStatus": "Received", "vulnStatus": "Awaiting Analysis",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
"value": "A vulnerability was found in FastCMS up to 0.1.5 and classified as problematic. Affected by this issue is some unknown functionality of the component New Article Tab. The manipulation of the argument Title leads to cross site scripting. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB-266126 is the identifier assigned to this vulnerability." "value": "A vulnerability was found in FastCMS up to 0.1.5 and classified as problematic. Affected by this issue is some unknown functionality of the component New Article Tab. The manipulation of the argument Title leads to cross site scripting. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB-266126 is the identifier assigned to this vulnerability."
},
{
"lang": "es",
"value": "Una vulnerabilidad fue encontrada en FastCMS hasta 0.1.5 y clasificada como problem\u00e1tica. Una funci\u00f3n desconocida del componente New Article Tab es afectada por esta vulnerabilidad. La manipulaci\u00f3n del argumento T\u00edtulo conduce a Cross-Site Scripting. El ataque puede lanzarse de forma remota. El exploit ha sido divulgado al p\u00fablico y puede utilizarse. VDB-266126 es el identificador asignado a esta vulnerabilidad."
} }
], ],
"metrics": { "metrics": {

View File

@ -0,0 +1,59 @@
{
"id": "CVE-2023-47710",
"sourceIdentifier": "psirt@us.ibm.com",
"published": "2024-05-24T12:15:08.553",
"lastModified": "2024-05-24T13:03:05.093",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "IBM Security Guardium 11.4, 11.5, and 12.0 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 271525."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "psirt@us.ibm.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
}
]
},
"weaknesses": [
{
"source": "psirt@us.ibm.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/271525",
"source": "psirt@us.ibm.com"
},
{
"url": "https://www.ibm.com/support/pages/node/7154435",
"source": "psirt@us.ibm.com"
}
]
}

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2023-49572",
"sourceIdentifier": "cve-coordination@incibe.es",
"published": "2024-05-24T13:15:08.030",
"lastModified": "2024-05-24T13:15:08.030",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability has been discovered in VX Search Enterprise affecting version 10.2.14 that could allow an attacker to execute persistent XSS through /setup_odbc in odbc_data_source, odbc_user and odbc_password parameters. This vulnerability could allow an attacker to store malicious JavaScript payloads on the system to be triggered when the page loads."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "cve-coordination@incibe.es",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW",
"baseScore": 7.1,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 3.7
}
]
},
"weaknesses": [
{
"source": "cve-coordination@incibe.es",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-flexense-vx-search-enterprise",
"source": "cve-coordination@incibe.es"
}
]
}

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2023-49573",
"sourceIdentifier": "cve-coordination@incibe.es",
"published": "2024-05-24T13:15:08.630",
"lastModified": "2024-05-24T13:15:08.630",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability has been discovered in VX Search Enterprise affecting version 10.2.14 that could allow an attacker to execute persistent XSS through /add_command_action in action_value. This vulnerability could allow an attacker to store malicious JavaScript payloads on the system to be triggered when the page loads."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "cve-coordination@incibe.es",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW",
"baseScore": 7.1,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 3.7
}
]
},
"weaknesses": [
{
"source": "cve-coordination@incibe.es",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-flexense-vx-search-enterprise",
"source": "cve-coordination@incibe.es"
}
]
}

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2023-49574",
"sourceIdentifier": "cve-coordination@incibe.es",
"published": "2024-05-24T13:15:09.023",
"lastModified": "2024-05-24T13:15:09.023",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability has been discovered in VX Search Enterprise affecting version 10.2.14 that could allow an attacker to execute persistent XSS through /add_job in job_name. This vulnerability could allow an attacker to store malicious JavaScript payloads on the system to be triggered when the page loads."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "cve-coordination@incibe.es",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW",
"baseScore": 7.1,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 3.7
}
]
},
"weaknesses": [
{
"source": "cve-coordination@incibe.es",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-flexense-vx-search-enterprise",
"source": "cve-coordination@incibe.es"
}
]
}

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2023-49575",
"sourceIdentifier": "cve-coordination@incibe.es",
"published": "2024-05-24T13:15:09.360",
"lastModified": "2024-05-24T13:15:09.360",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability has been discovered in VX Search Enterprise affecting version 10.2.14 that could allow an attacker to execute persistent XSS through /setup_smtp in smtp_server, smtp_user, smtp_password and smtp_email_address parameters. This vulnerability could allow an attacker to store malicious JavaScript payloads on the system to be triggered when the page loads."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "cve-coordination@incibe.es",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW",
"baseScore": 7.1,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 3.7
}
]
},
"weaknesses": [
{
"source": "cve-coordination@incibe.es",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-flexense-vx-search-enterprise",
"source": "cve-coordination@incibe.es"
}
]
}

View File

@ -2,12 +2,16 @@
"id": "CVE-2023-7259", "id": "CVE-2023-7259",
"sourceIdentifier": "cna@vuldb.com", "sourceIdentifier": "cna@vuldb.com",
"published": "2024-05-24T07:15:08.930", "published": "2024-05-24T07:15:08.930",
"lastModified": "2024-05-24T07:15:08.930", "lastModified": "2024-05-24T13:03:05.093",
"vulnStatus": "Received", "vulnStatus": "Awaiting Analysis",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
"value": "** DISPUTED ** A vulnerability was found in zzdevelop lenosp up to 20230831. It has been classified as problematic. This affects an unknown part of the component Adduser Page. The manipulation of the argument username with the input <script>alert(1)</script> leads to cross site scripting. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The real existence of this vulnerability is still doubted at the moment. The associated identifier of this vulnerability is VDB-266127. NOTE: The vendor rejected the issue because he claims that XSS which require administrative privileges are not of any use for attackers." "value": "** DISPUTED ** A vulnerability was found in zzdevelop lenosp up to 20230831. It has been classified as problematic. This affects an unknown part of the component Adduser Page. The manipulation of the argument username with the input <script>alert(1)</script> leads to cross site scripting. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The real existence of this vulnerability is still doubted at the moment. The associated identifier of this vulnerability is VDB-266127. NOTE: The vendor rejected the issue because he claims that XSS which require administrative privileges are not of any use for attackers."
},
{
"lang": "es",
"value": "** EN DISPUTA ** Se encontr\u00f3 una vulnerabilidad en zzdevelop lenosp hasta 20230831. Ha sido clasificada como problem\u00e1tica. Una parte desconocida del componente Adduser Page afecta a una parte desconocida. La manipulaci\u00f3n del argumento nombre de usuario con la entrada conduce a Cross-Site Scripting. Es posible iniciar el ataque de forma remota. El exploit ha sido divulgado al p\u00fablico y puede utilizarse. Por el momento todav\u00eda se duda de la existencia real de esta vulnerabilidad. El identificador asociado de esta vulnerabilidad es VDB-266127. NOTA: El proveedor rechaz\u00f3 el problema porque afirma que los XSS que requieren privilegios administrativos no son de ninguna utilidad para los atacantes."
} }
], ],
"metrics": { "metrics": {

View File

@ -2,12 +2,16 @@
"id": "CVE-2024-0867", "id": "CVE-2024-0867",
"sourceIdentifier": "security@wordfence.com", "sourceIdentifier": "security@wordfence.com",
"published": "2024-05-24T06:15:08.380", "published": "2024-05-24T06:15:08.380",
"lastModified": "2024-05-24T06:15:08.380", "lastModified": "2024-05-24T13:03:11.993",
"vulnStatus": "Received", "vulnStatus": "Awaiting Analysis",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
"value": "The Email Log plugin for WordPress is vulnerable to Unauthenticated Hook Injection in all versions up to, and including, 2.4.8 via the check_nonce function. This makes it possible for unauthenticated attackers to execute actions with hooks in WordPress under certain circumstances. The action the attacker wishes to execute needs to have a nonce check, and the nonce needs to be known to the attacker. Furthermore, the absence of a capability check is a requirement." "value": "The Email Log plugin for WordPress is vulnerable to Unauthenticated Hook Injection in all versions up to, and including, 2.4.8 via the check_nonce function. This makes it possible for unauthenticated attackers to execute actions with hooks in WordPress under certain circumstances. The action the attacker wishes to execute needs to have a nonce check, and the nonce needs to be known to the attacker. Furthermore, the absence of a capability check is a requirement."
},
{
"lang": "es",
"value": "El complemento Email Log para WordPress es vulnerable a la inyecci\u00f3n de gancho no autenticado en todas las versiones hasta la 2.4.8 incluida a trav\u00e9s de la funci\u00f3n check_nonce. Esto hace posible que atacantes no autenticados ejecuten acciones con ganchos en WordPress bajo ciertas circunstancias. La acci\u00f3n que el atacante desea ejecutar debe tener una verificaci\u00f3n de nonce, y el atacante debe conocer el nonce. Adem\u00e1s, es un requisito la ausencia de una verificaci\u00f3n de capacidad."
} }
], ],
"metrics": { "metrics": {

View File

@ -2,12 +2,16 @@
"id": "CVE-2024-0893", "id": "CVE-2024-0893",
"sourceIdentifier": "security@wordfence.com", "sourceIdentifier": "security@wordfence.com",
"published": "2024-05-24T07:15:09.387", "published": "2024-05-24T07:15:09.387",
"lastModified": "2024-05-24T07:15:09.387", "lastModified": "2024-05-24T13:03:05.093",
"vulnStatus": "Received", "vulnStatus": "Awaiting Analysis",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
"value": "The Schema App Structured Data plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the MarkupUpdate function in all versions up to, and including, 2.1.0. This makes it possible for authenticated attackers, with subscriber access or higher, to update or delete post metadata." "value": "The Schema App Structured Data plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the MarkupUpdate function in all versions up to, and including, 2.1.0. This makes it possible for authenticated attackers, with subscriber access or higher, to update or delete post metadata."
},
{
"lang": "es",
"value": "El complemento Schema App Structured Data para WordPress es vulnerable a modificaciones no autorizadas de datos debido a una falta de verificaci\u00f3n de capacidad en la funci\u00f3n MarkupUpdate en todas las versiones hasta la 2.1.0 incluida. Esto hace posible que atacantes autenticados, con acceso de suscriptor o superior, actualicen o eliminen metadatos de publicaciones."
} }
], ],
"metrics": { "metrics": {

View File

@ -2,12 +2,16 @@
"id": "CVE-2024-1134", "id": "CVE-2024-1134",
"sourceIdentifier": "security@wordfence.com", "sourceIdentifier": "security@wordfence.com",
"published": "2024-05-24T06:15:08.667", "published": "2024-05-24T06:15:08.667",
"lastModified": "2024-05-24T06:15:08.667", "lastModified": "2024-05-24T13:03:05.093",
"vulnStatus": "Received", "vulnStatus": "Awaiting Analysis",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
"value": "The SEOPress \u2013 On-site SEO plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the SEO title and description parameters as well as others in all versions up to, and including, 7.5.2.1 due to insufficient input sanitization and output escaping. This makes it possible for attackers, with contributor access or higher, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page." "value": "The SEOPress \u2013 On-site SEO plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the SEO title and description parameters as well as others in all versions up to, and including, 7.5.2.1 due to insufficient input sanitization and output escaping. This makes it possible for attackers, with contributor access or higher, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page."
},
{
"lang": "es",
"value": "El complemento SEOPress \u2013 SEO en el sitio para WordPress es vulnerable a Cross-Site Scripting Almacenado a trav\u00e9s del t\u00edtulo de SEO y los par\u00e1metros de descripci\u00f3n, as\u00ed como otros en todas las versiones hasta la 7.5.2.1 incluida, debido a una sanitizaci\u00f3n de entrada y un escape de salida insuficientes. Esto hace posible que los atacantes, con acceso de colaborador o superior, inyecten scripts web arbitrarios en p\u00e1ginas que se ejecutar\u00e1n cada vez que un usuario acceda a una p\u00e1gina inyectada."
} }
], ],
"metrics": { "metrics": {

View File

@ -2,12 +2,16 @@
"id": "CVE-2024-1332", "id": "CVE-2024-1332",
"sourceIdentifier": "security@wordfence.com", "sourceIdentifier": "security@wordfence.com",
"published": "2024-05-24T07:15:09.733", "published": "2024-05-24T07:15:09.733",
"lastModified": "2024-05-24T07:15:09.733", "lastModified": "2024-05-24T13:03:05.093",
"vulnStatus": "Received", "vulnStatus": "Awaiting Analysis",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
"value": "The Custom Fonts \u2013 Host Your Fonts Locally plugin for WordPress is vulnerable to Stored Cross-Site Scripting via svg file upload in all versions up to, and including, 2.1.4 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with author level or higher, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page." "value": "The Custom Fonts \u2013 Host Your Fonts Locally plugin for WordPress is vulnerable to Stored Cross-Site Scripting via svg file upload in all versions up to, and including, 2.1.4 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with author level or higher, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page."
},
{
"lang": "es",
"value": "El complemento Custom Fonts \u2013 Host Your Fonts Locally para WordPress es vulnerable a Cross-Site Scripting Almacenado mediante la carga de archivos svg en todas las versiones hasta la 2.1.4 incluida debido a una sanitizaci\u00f3n de entrada y un escape de salida insuficientes. Esto hace posible que atacantes autenticados, con nivel de autor o superior, inyecten scripts web arbitrarios en p\u00e1ginas que se ejecutar\u00e1n cada vez que un usuario acceda a una p\u00e1gina inyectada."
} }
], ],
"metrics": { "metrics": {

View File

@ -2,12 +2,16 @@
"id": "CVE-2024-1376", "id": "CVE-2024-1376",
"sourceIdentifier": "security@wordfence.com", "sourceIdentifier": "security@wordfence.com",
"published": "2024-05-24T07:15:10.057", "published": "2024-05-24T07:15:10.057",
"lastModified": "2024-05-24T07:15:10.057", "lastModified": "2024-05-24T13:03:05.093",
"vulnStatus": "Received", "vulnStatus": "Awaiting Analysis",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
"value": "The Event post plugin for WordPress is vulnerable to unauthorized bulk metadata update due to a missing capability check on the save_bulkdatas function in all versions up to, and including, 5.9.4. This makes it possible for authenticated attackers, with subscriber access or higher, to update post_meta_data." "value": "The Event post plugin for WordPress is vulnerable to unauthorized bulk metadata update due to a missing capability check on the save_bulkdatas function in all versions up to, and including, 5.9.4. This makes it possible for authenticated attackers, with subscriber access or higher, to update post_meta_data."
},
{
"lang": "es",
"value": "El complemento Event post para WordPress es vulnerable a actualizaciones masivas de metadatos no autorizadas debido a una falta de verificaci\u00f3n de capacidad en la funci\u00f3n save_bulkdatas en todas las versiones hasta la 5.9.4 incluida. Esto hace posible que atacantes autenticados, con acceso de suscriptor o superior, actualicen post_meta_data."
} }
], ],
"metrics": { "metrics": {

View File

@ -2,12 +2,16 @@
"id": "CVE-2024-2618", "id": "CVE-2024-2618",
"sourceIdentifier": "security@wordfence.com", "sourceIdentifier": "security@wordfence.com",
"published": "2024-05-24T05:15:09.297", "published": "2024-05-24T05:15:09.297",
"lastModified": "2024-05-24T05:15:09.297", "lastModified": "2024-05-24T13:03:11.993",
"vulnStatus": "Received", "vulnStatus": "Awaiting Analysis",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
"value": "The Elementor Header & Footer Builder plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the size attribute in all versions up to, and including, 1.6.26 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with contributor access or higher, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page." "value": "The Elementor Header & Footer Builder plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the size attribute in all versions up to, and including, 1.6.26 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with contributor access or higher, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page."
},
{
"lang": "es",
"value": "El complemento Elementor Header &amp; Footer Builder para WordPress es vulnerable a Cross-Site Scripting Almacenado a trav\u00e9s del atributo de tama\u00f1o en todas las versiones hasta la 1.6.26 incluida debido a una sanitizaci\u00f3n de entrada y un escape de salida insuficientes. Esto hace posible que atacantes autenticados, con acceso de colaborador o superior, inyecten scripts web arbitrarios en p\u00e1ginas que se ejecutar\u00e1n cada vez que un usuario acceda a una p\u00e1gina inyectada."
} }
], ],
"metrics": { "metrics": {

View File

@ -2,12 +2,16 @@
"id": "CVE-2024-2784", "id": "CVE-2024-2784",
"sourceIdentifier": "security@wordfence.com", "sourceIdentifier": "security@wordfence.com",
"published": "2024-05-24T05:15:09.620", "published": "2024-05-24T05:15:09.620",
"lastModified": "2024-05-24T05:15:09.620", "lastModified": "2024-05-24T13:03:11.993",
"vulnStatus": "Received", "vulnStatus": "Awaiting Analysis",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
"value": "The The Plus Addons for Elementor plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the Hover Card widget in all versions up to, and including, 5.5.4 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page." "value": "The The Plus Addons for Elementor plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the Hover Card widget in all versions up to, and including, 5.5.4 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page."
},
{
"lang": "es",
"value": "El complemento The Plus Addons para Elementor para WordPress es vulnerable a Cross-Site Scripting Almacenado a trav\u00e9s del widget Hover Card en todas las versiones hasta la 5.5.4 incluida debido a una sanitizaci\u00f3n de entrada insuficiente y a un escape de salida en los atributos proporcionados por el usuario. Esto hace posible que atacantes autenticados, con acceso de nivel de colaborador y superior, inyecten scripts web arbitrarios en p\u00e1ginas que se ejecutar\u00e1n cada vez que un usuario acceda a una p\u00e1gina inyectada."
} }
], ],
"metrics": { "metrics": {

View File

@ -2,12 +2,16 @@
"id": "CVE-2024-3557", "id": "CVE-2024-3557",
"sourceIdentifier": "security@wordfence.com", "sourceIdentifier": "security@wordfence.com",
"published": "2024-05-24T05:15:09.833", "published": "2024-05-24T05:15:09.833",
"lastModified": "2024-05-24T05:15:09.833", "lastModified": "2024-05-24T13:03:11.993",
"vulnStatus": "Received", "vulnStatus": "Awaiting Analysis",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
"value": "The WP Go Maps (formerly WP Google Maps) plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's wpgmza shortcode in all versions up to, and including, 9.0.36 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page." "value": "The WP Go Maps (formerly WP Google Maps) plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's wpgmza shortcode in all versions up to, and including, 9.0.36 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page."
},
{
"lang": "es",
"value": "El complemento WP Go Maps (anteriormente WP Google Maps) para WordPress es vulnerable a las Cross-Site Scripting Almacenado a trav\u00e9s del c\u00f3digo corto wpgmza del complemento en todas las versiones hasta la 9.0.36 incluida debido a una sanitizaci\u00f3n de entrada insuficiente y a un escape de salida en los atributos proporcionados por el usuario. Esto hace posible que atacantes autenticados, con acceso de nivel de colaborador y superior, inyecten scripts web arbitrarios en p\u00e1ginas que se ejecutar\u00e1n cada vez que un usuario acceda a una p\u00e1gina inyectada."
} }
], ],
"metrics": { "metrics": {

View File

@ -2,12 +2,16 @@
"id": "CVE-2024-36361", "id": "CVE-2024-36361",
"sourceIdentifier": "cve@mitre.org", "sourceIdentifier": "cve@mitre.org",
"published": "2024-05-24T06:15:08.947", "published": "2024-05-24T06:15:08.947",
"lastModified": "2024-05-24T06:15:08.947", "lastModified": "2024-05-24T13:03:05.093",
"vulnStatus": "Received", "vulnStatus": "Awaiting Analysis",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
"value": "Pug through 3.0.2 allows JavaScript code execution if an application accepts untrusted input for the name option of the compileClient, compileFileClient, or compileClientWithDependenciesTracked function. NOTE: these functions are for compiling Pug templates into JavaScript, and there would typically be no reason to allow untrusted callers." "value": "Pug through 3.0.2 allows JavaScript code execution if an application accepts untrusted input for the name option of the compileClient, compileFileClient, or compileClientWithDependenciesTracked function. NOTE: these functions are for compiling Pug templates into JavaScript, and there would typically be no reason to allow untrusted callers."
},
{
"lang": "es",
"value": "Pug hasta 3.0.2 permite la ejecuci\u00f3n de c\u00f3digo JavaScript si una aplicaci\u00f3n acepta entradas que no son de confianza para la opci\u00f3n de nombre de la funci\u00f3n compileClient, compileFileClient o compileClientWithDependenciesTracked. NOTA: estas funciones son para compilar plantillas de Pug en JavaScript y normalmente no habr\u00eda motivo para permitir llamadas que no sean de confianza."
} }
], ],
"metrics": {}, "metrics": {},

View File

@ -2,12 +2,16 @@
"id": "CVE-2024-3718", "id": "CVE-2024-3718",
"sourceIdentifier": "security@wordfence.com", "sourceIdentifier": "security@wordfence.com",
"published": "2024-05-24T06:15:09.100", "published": "2024-05-24T06:15:09.100",
"lastModified": "2024-05-24T06:15:09.100", "lastModified": "2024-05-24T13:03:05.093",
"vulnStatus": "Received", "vulnStatus": "Awaiting Analysis",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
"value": "The The Plus Addons for Elementor plugin for WordPress is vulnerable to Stored Cross-Site Scripting via several of the plugin's widgets all versions up to, and including, 5.5.4 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page." "value": "The The Plus Addons for Elementor plugin for WordPress is vulnerable to Stored Cross-Site Scripting via several of the plugin's widgets all versions up to, and including, 5.5.4 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page."
},
{
"lang": "es",
"value": "El complemento The Plus Addons para Elementor para WordPress es vulnerable a Cross-Site Scripting Almacenado a trav\u00e9s de varios de los widgets del complemento, todas las versiones hasta la 5.5.4 incluida, debido a una sanitizaci\u00f3n de entrada insuficiente y a un escape de salida en los atributos proporcionados por el usuario. Esto hace posible que atacantes autenticados, con acceso de nivel de colaborador y superior, inyecten scripts web arbitrarios en p\u00e1ginas que se ejecutar\u00e1n cada vez que un usuario acceda a una p\u00e1gina inyectada."
} }
], ],
"metrics": { "metrics": {

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-4037", "id": "CVE-2024-4037",
"sourceIdentifier": "security@wordfence.com", "sourceIdentifier": "security@wordfence.com",
"published": "2024-05-24T09:15:08.873", "published": "2024-05-24T09:15:08.873",
"lastModified": "2024-05-24T09:15:08.873", "lastModified": "2024-05-24T13:03:05.093",
"vulnStatus": "Received", "vulnStatus": "Awaiting Analysis",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",

View File

@ -2,12 +2,16 @@
"id": "CVE-2024-4366", "id": "CVE-2024-4366",
"sourceIdentifier": "security@wordfence.com", "sourceIdentifier": "security@wordfence.com",
"published": "2024-05-24T08:15:09.680", "published": "2024-05-24T08:15:09.680",
"lastModified": "2024-05-24T08:15:09.680", "lastModified": "2024-05-24T13:03:05.093",
"vulnStatus": "Received", "vulnStatus": "Awaiting Analysis",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
"value": "The Spectra \u2013 WordPress Gutenberg Blocks plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the \u2018block_id\u2019 parameter in versions up to, and including, 2.13.0 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with author-level permissions and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page." "value": "The Spectra \u2013 WordPress Gutenberg Blocks plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the \u2018block_id\u2019 parameter in versions up to, and including, 2.13.0 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with author-level permissions and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page."
},
{
"lang": "es",
"value": "El complemento Spectra \u2013 WordPress Gutenberg Blocks para WordPress es vulnerable a Cross-Site Scripting Almacenado a trav\u00e9s del par\u00e1metro 'block_id' en versiones hasta la 2.13.0 incluida debido a una sanitizaci\u00f3n de entrada y un escape de salida insuficientes. Esto hace posible que atacantes autenticados, con permisos de nivel de autor y superiores, inyecten scripts web arbitrarios en p\u00e1ginas que se ejecutar\u00e1n cada vez que un usuario acceda a una p\u00e1gina inyectada."
} }
], ],
"metrics": { "metrics": {

View File

@ -2,12 +2,16 @@
"id": "CVE-2024-4409", "id": "CVE-2024-4409",
"sourceIdentifier": "security@wordfence.com", "sourceIdentifier": "security@wordfence.com",
"published": "2024-05-24T03:15:08.340", "published": "2024-05-24T03:15:08.340",
"lastModified": "2024-05-24T03:15:08.340", "lastModified": "2024-05-24T13:03:11.993",
"vulnStatus": "Received", "vulnStatus": "Awaiting Analysis",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
"value": "The WP-ViperGB plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 1.6.1. This is due to missing or incorrect nonce validation when saving plugin settings. This makes it possible for unauthenticated attackers to change the plugin's settings via a forged request granted they can trick a site administrator into performing an action such as clicking on a link." "value": "The WP-ViperGB plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 1.6.1. This is due to missing or incorrect nonce validation when saving plugin settings. This makes it possible for unauthenticated attackers to change the plugin's settings via a forged request granted they can trick a site administrator into performing an action such as clicking on a link."
},
{
"lang": "es",
"value": "El complemento WP-ViperGB para WordPress es vulnerable a la Cross-Site Request Forgery en todas las versiones hasta la 1.6.1 incluida. Esto se debe a que falta una validaci\u00f3n nonce o es incorrecta al guardar la configuraci\u00f3n del complemento. Esto hace posible que atacantes no autenticados cambien la configuraci\u00f3n del complemento mediante una solicitud falsificada, siempre que puedan enga\u00f1ar al administrador del sitio para que realice una acci\u00f3n como hacer clic en un enlace."
} }
], ],
"metrics": { "metrics": {

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-4455", "id": "CVE-2024-4455",
"sourceIdentifier": "security@wordfence.com", "sourceIdentifier": "security@wordfence.com",
"published": "2024-05-24T11:15:09.613", "published": "2024-05-24T11:15:09.613",
"lastModified": "2024-05-24T11:15:09.613", "lastModified": "2024-05-24T13:03:05.093",
"vulnStatus": "Received", "vulnStatus": "Awaiting Analysis",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",

View File

@ -2,12 +2,16 @@
"id": "CVE-2024-4484", "id": "CVE-2024-4484",
"sourceIdentifier": "security@wordfence.com", "sourceIdentifier": "security@wordfence.com",
"published": "2024-05-24T07:15:10.397", "published": "2024-05-24T07:15:10.397",
"lastModified": "2024-05-24T07:15:10.397", "lastModified": "2024-05-24T13:03:05.093",
"vulnStatus": "Received", "vulnStatus": "Awaiting Analysis",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
"value": "The The Plus Addons for Elementor \u2013 Elementor Addons, Page Templates, Widgets, Mega Menu, WooCommerce plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the \u2018xai_username\u2019 parameter in versions up to, and including, 5.5.2 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with contributor-level permissions and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page." "value": "The The Plus Addons for Elementor \u2013 Elementor Addons, Page Templates, Widgets, Mega Menu, WooCommerce plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the \u2018xai_username\u2019 parameter in versions up to, and including, 5.5.2 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with contributor-level permissions and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page."
},
{
"lang": "es",
"value": "Los complementos The Plus Addons for Elementor \u2013 Elementor Addons, Page Templates, Widgets, Mega Menu, WooCommerce para WordPress son vulnerables a Cross-Site Scripting Almacenado a trav\u00e9s del par\u00e1metro 'xai_username' en versiones hasta la 5.5.2 incluida debido a insuficiencia higienizaci\u00f3n de insumos y escape de salidas. Esto hace posible que atacantes autenticados, con permisos de nivel de colaborador y superiores, inyecten scripts web arbitrarios en p\u00e1ginas que se ejecutar\u00e1n cada vez que un usuario acceda a una p\u00e1gina inyectada."
} }
], ],
"metrics": { "metrics": {

View File

@ -2,12 +2,16 @@
"id": "CVE-2024-4485", "id": "CVE-2024-4485",
"sourceIdentifier": "security@wordfence.com", "sourceIdentifier": "security@wordfence.com",
"published": "2024-05-24T07:15:10.700", "published": "2024-05-24T07:15:10.700",
"lastModified": "2024-05-24T07:15:10.700", "lastModified": "2024-05-24T13:03:05.093",
"vulnStatus": "Received", "vulnStatus": "Awaiting Analysis",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
"value": "The The Plus Addons for Elementor \u2013 Elementor Addons, Page Templates, Widgets, Mega Menu, WooCommerce plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the \u2018button_custom_attributes\u2019 parameter in versions up to, and including, 5.5.2 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with contributor-level permissions and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page." "value": "The The Plus Addons for Elementor \u2013 Elementor Addons, Page Templates, Widgets, Mega Menu, WooCommerce plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the \u2018button_custom_attributes\u2019 parameter in versions up to, and including, 5.5.2 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with contributor-level permissions and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page."
},
{
"lang": "es",
"value": "Los complementos The Plus Addons for Elementor \u2013 Elementor Addons, Page Templates, Widgets, Mega Menu, WooCommerce para WordPress son vulnerables a Cross-Site Scripting Almacenado a trav\u00e9s del par\u00e1metro 'button_custom_attributes' en versiones hasta la 5.5.2 incluida debido a insuficiencia higienizaci\u00f3n de insumos y escape de salidas. Esto hace posible que atacantes autenticados, con permisos de nivel de colaborador y superiores, inyecten scripts web arbitrarios en p\u00e1ginas que se ejecutar\u00e1n cada vez que un usuario acceda a una p\u00e1gina inyectada."
} }
], ],
"metrics": { "metrics": {

View File

@ -2,12 +2,16 @@
"id": "CVE-2024-4544", "id": "CVE-2024-4544",
"sourceIdentifier": "security@wordfence.com", "sourceIdentifier": "security@wordfence.com",
"published": "2024-05-24T04:15:08.670", "published": "2024-05-24T04:15:08.670",
"lastModified": "2024-05-24T04:15:08.670", "lastModified": "2024-05-24T13:03:11.993",
"vulnStatus": "Received", "vulnStatus": "Awaiting Analysis",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
"value": "The Pie Register - Social Sites Login (Add on) plugin for WordPress is vulnerable to authentication bypass in versions up to, and including, 1.7.7. This is due to insufficient verification on the user being supplied during a social login through the plugin. This makes it possible for unauthenticated attackers to log in as any existing user on the site, such as an administrator, if they have access to the email." "value": "The Pie Register - Social Sites Login (Add on) plugin for WordPress is vulnerable to authentication bypass in versions up to, and including, 1.7.7. This is due to insufficient verification on the user being supplied during a social login through the plugin. This makes it possible for unauthenticated attackers to log in as any existing user on the site, such as an administrator, if they have access to the email."
},
{
"lang": "es",
"value": "El complemento Pie Register - Social Sites Login (Add on) para WordPress es vulnerable a la omisi\u00f3n de autenticaci\u00f3n en versiones hasta la 1.7.7 incluida. Esto se debe a una verificaci\u00f3n insuficiente del usuario que se proporciona durante un inicio de sesi\u00f3n social a trav\u00e9s del complemento. Esto hace posible que atacantes no autenticados inicien sesi\u00f3n como cualquier usuario existente en el sitio, como un administrador, si tienen acceso al correo electr\u00f3nico."
} }
], ],
"metrics": { "metrics": {

View File

@ -2,12 +2,16 @@
"id": "CVE-2024-5060", "id": "CVE-2024-5060",
"sourceIdentifier": "security@wordfence.com", "sourceIdentifier": "security@wordfence.com",
"published": "2024-05-24T07:15:10.967", "published": "2024-05-24T07:15:10.967",
"lastModified": "2024-05-24T07:15:10.967", "lastModified": "2024-05-24T13:03:05.093",
"vulnStatus": "Received", "vulnStatus": "Awaiting Analysis",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
"value": "The LottieFiles \u2013 JSON Based Animation Lottie & Bodymovin for Elementor plugin for WordPress is vulnerable to Stored Cross-Site Scripting in all versions up to, and including, 1.10.9 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page." "value": "The LottieFiles \u2013 JSON Based Animation Lottie & Bodymovin for Elementor plugin for WordPress is vulnerable to Stored Cross-Site Scripting in all versions up to, and including, 1.10.9 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page."
},
{
"lang": "es",
"value": "El complemento LottieFiles \u2013 JSON Based Animation Lottie &amp; Bodymovin for Elementor para WordPress es vulnerable a Cross-Site Scripting Almacenado en todas las versiones hasta la 1.10.9 incluida debido a una sanitizaci\u00f3n de entrada y un escape de salida insuficientes. Esto hace posible que atacantes autenticados, con acceso de nivel de Colaborador y superior, inyecten scripts web arbitrarios en p\u00e1ginas que se ejecutar\u00e1n cada vez que un usuario acceda a una p\u00e1gina inyectada."
} }
], ],
"metrics": { "metrics": {

View File

@ -2,12 +2,16 @@
"id": "CVE-2024-5142", "id": "CVE-2024-5142",
"sourceIdentifier": "security@m-files.com", "sourceIdentifier": "security@m-files.com",
"published": "2024-05-24T06:15:09.360", "published": "2024-05-24T06:15:09.360",
"lastModified": "2024-05-24T06:15:09.360", "lastModified": "2024-05-24T13:03:05.093",
"vulnStatus": "Received", "vulnStatus": "Awaiting Analysis",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
"value": "Stored Cross-Site Scripting vulnerability in Social Module in M-Files Hubshare before version 5.0.3.8 allows authenticated attacker to run scripts in other users browser" "value": "Stored Cross-Site Scripting vulnerability in Social Module in M-Files Hubshare before version 5.0.3.8 allows authenticated attacker to run scripts in other users browser"
},
{
"lang": "es",
"value": "Vulnerabilidad de Cross-Site Scripting almacenadas en Social Module in M-Files Hubshare anterior a la versi\u00f3n 5.0.3.8 permite a un atacante autenticado ejecutar scripts en el navegador de otros usuarios"
} }
], ],
"metrics": {}, "metrics": {},

View File

@ -2,12 +2,16 @@
"id": "CVE-2024-5205", "id": "CVE-2024-5205",
"sourceIdentifier": "security@wordfence.com", "sourceIdentifier": "security@wordfence.com",
"published": "2024-05-24T03:15:08.580", "published": "2024-05-24T03:15:08.580",
"lastModified": "2024-05-24T03:15:08.580", "lastModified": "2024-05-24T13:03:11.993",
"vulnStatus": "Received", "vulnStatus": "Awaiting Analysis",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
"value": "The Videojs HTML5 Player plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's videojs_video shortcode in all versions up to, and including, 1.1.11 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page." "value": "The Videojs HTML5 Player plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's videojs_video shortcode in all versions up to, and including, 1.1.11 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page."
},
{
"lang": "es",
"value": "El complemento Videojs HTML5 Player para WordPress es vulnerable a Cross-Site Scripting Almacenado a trav\u00e9s del c\u00f3digo corto videojs_video del complemento en todas las versiones hasta la 1.1.11 incluida debido a una sanitizaci\u00f3n de entrada insuficiente y a un escape de salida en los atributos proporcionados por el usuario. Esto hace posible que atacantes autenticados, con acceso de nivel de colaborador y superior, inyecten scripts web arbitrarios en p\u00e1ginas que se ejecutar\u00e1n cada vez que un usuario acceda a una p\u00e1gina inyectada."
} }
], ],
"metrics": { "metrics": {

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-5310", "id": "CVE-2024-5310",
"sourceIdentifier": "cna@vuldb.com", "sourceIdentifier": "cna@vuldb.com",
"published": "2024-05-24T09:15:09.337", "published": "2024-05-24T09:15:09.337",
"lastModified": "2024-05-24T09:15:09.337", "lastModified": "2024-05-24T13:03:05.093",
"vulnStatus": "Received", "vulnStatus": "Awaiting Analysis",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-5312", "id": "CVE-2024-5312",
"sourceIdentifier": "cve-coordination@incibe.es", "sourceIdentifier": "cve-coordination@incibe.es",
"published": "2024-05-24T11:15:10.017", "published": "2024-05-24T11:15:10.017",
"lastModified": "2024-05-24T11:15:10.017", "lastModified": "2024-05-24T13:03:05.093",
"vulnStatus": "Received", "vulnStatus": "Awaiting Analysis",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-5314", "id": "CVE-2024-5314",
"sourceIdentifier": "cve-coordination@incibe.es", "sourceIdentifier": "cve-coordination@incibe.es",
"published": "2024-05-24T10:15:10.760", "published": "2024-05-24T10:15:10.760",
"lastModified": "2024-05-24T10:15:10.760", "lastModified": "2024-05-24T13:03:05.093",
"vulnStatus": "Received", "vulnStatus": "Awaiting Analysis",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-5315", "id": "CVE-2024-5315",
"sourceIdentifier": "cve-coordination@incibe.es", "sourceIdentifier": "cve-coordination@incibe.es",
"published": "2024-05-24T10:15:11.197", "published": "2024-05-24T10:15:11.197",
"lastModified": "2024-05-24T10:15:11.197", "lastModified": "2024-05-24T13:03:05.093",
"vulnStatus": "Received", "vulnStatus": "Awaiting Analysis",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",

View File

@ -0,0 +1,59 @@
{
"id": "CVE-2024-5318",
"sourceIdentifier": "cve@gitlab.com",
"published": "2024-05-24T13:15:09.717",
"lastModified": "2024-05-24T13:15:09.717",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "An issue has been discovered in GitLab CE/EE affecting all versions starting from 11.11 prior to 16.10.6, starting from 16.11 prior to 16.11.3, and starting from 17.0 prior to 17.0.1. A Guest user can view dependency lists of private projects through job artifacts."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "cve@gitlab.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.0,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.5,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "cve@gitlab.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-284"
}
]
}
],
"references": [
{
"url": "https://gitlab.com/gitlab-org/gitlab/-/issues/427526",
"source": "cve@gitlab.com"
},
{
"url": "https://hackerone.com/reports/2189464",
"source": "cve@gitlab.com"
}
]
}

View File

@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update ### Last Repository Update
```plain ```plain
2024-05-24T12:01:00.064698+00:00 2024-05-24T14:00:30.028511+00:00
``` ```
### Most recent CVE Modification Timestamp synchronized with NVD ### Most recent CVE Modification Timestamp synchronized with NVD
```plain ```plain
2024-05-24T11:15:10.017000+00:00 2024-05-24T13:15:09.717000+00:00
``` ```
### Last Data Feed Release ### Last Data Feed Release
@ -33,25 +33,50 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
### Total Number of included CVEs ### Total Number of included CVEs
```plain ```plain
251662 251668
``` ```
### CVEs added in the last Commit ### CVEs added in the last Commit
Recently added CVEs: `4` Recently added CVEs: `6`
- [CVE-2024-4455](CVE-2024/CVE-2024-44xx/CVE-2024-4455.json) (`2024-05-24T11:15:09.613`) - [CVE-2023-47710](CVE-2023/CVE-2023-477xx/CVE-2023-47710.json) (`2024-05-24T12:15:08.553`)
- [CVE-2024-5312](CVE-2024/CVE-2024-53xx/CVE-2024-5312.json) (`2024-05-24T11:15:10.017`) - [CVE-2023-49572](CVE-2023/CVE-2023-495xx/CVE-2023-49572.json) (`2024-05-24T13:15:08.030`)
- [CVE-2024-5314](CVE-2024/CVE-2024-53xx/CVE-2024-5314.json) (`2024-05-24T10:15:10.760`) - [CVE-2023-49573](CVE-2023/CVE-2023-495xx/CVE-2023-49573.json) (`2024-05-24T13:15:08.630`)
- [CVE-2024-5315](CVE-2024/CVE-2024-53xx/CVE-2024-5315.json) (`2024-05-24T10:15:11.197`) - [CVE-2023-49574](CVE-2023/CVE-2023-495xx/CVE-2023-49574.json) (`2024-05-24T13:15:09.023`)
- [CVE-2023-49575](CVE-2023/CVE-2023-495xx/CVE-2023-49575.json) (`2024-05-24T13:15:09.360`)
- [CVE-2024-5318](CVE-2024/CVE-2024-53xx/CVE-2024-5318.json) (`2024-05-24T13:15:09.717`)
### CVEs modified in the last Commit ### CVEs modified in the last Commit
Recently modified CVEs: `2` Recently modified CVEs: `27`
- [CVE-2020-36825](CVE-2020/CVE-2020-368xx/CVE-2020-36825.json) (`2024-05-24T10:15:09.153`) - [CVE-2023-7259](CVE-2023/CVE-2023-72xx/CVE-2023-7259.json) (`2024-05-24T13:03:05.093`)
- [CVE-2023-52823](CVE-2023/CVE-2023-528xx/CVE-2023-52823.json) (`2024-05-24T11:15:09.367`) - [CVE-2024-0867](CVE-2024/CVE-2024-08xx/CVE-2024-0867.json) (`2024-05-24T13:03:11.993`)
- [CVE-2024-0893](CVE-2024/CVE-2024-08xx/CVE-2024-0893.json) (`2024-05-24T13:03:05.093`)
- [CVE-2024-1134](CVE-2024/CVE-2024-11xx/CVE-2024-1134.json) (`2024-05-24T13:03:05.093`)
- [CVE-2024-1332](CVE-2024/CVE-2024-13xx/CVE-2024-1332.json) (`2024-05-24T13:03:05.093`)
- [CVE-2024-1376](CVE-2024/CVE-2024-13xx/CVE-2024-1376.json) (`2024-05-24T13:03:05.093`)
- [CVE-2024-2618](CVE-2024/CVE-2024-26xx/CVE-2024-2618.json) (`2024-05-24T13:03:11.993`)
- [CVE-2024-2784](CVE-2024/CVE-2024-27xx/CVE-2024-2784.json) (`2024-05-24T13:03:11.993`)
- [CVE-2024-3557](CVE-2024/CVE-2024-35xx/CVE-2024-3557.json) (`2024-05-24T13:03:11.993`)
- [CVE-2024-36361](CVE-2024/CVE-2024-363xx/CVE-2024-36361.json) (`2024-05-24T13:03:05.093`)
- [CVE-2024-3718](CVE-2024/CVE-2024-37xx/CVE-2024-3718.json) (`2024-05-24T13:03:05.093`)
- [CVE-2024-4037](CVE-2024/CVE-2024-40xx/CVE-2024-4037.json) (`2024-05-24T13:03:05.093`)
- [CVE-2024-4366](CVE-2024/CVE-2024-43xx/CVE-2024-4366.json) (`2024-05-24T13:03:05.093`)
- [CVE-2024-4409](CVE-2024/CVE-2024-44xx/CVE-2024-4409.json) (`2024-05-24T13:03:11.993`)
- [CVE-2024-4455](CVE-2024/CVE-2024-44xx/CVE-2024-4455.json) (`2024-05-24T13:03:05.093`)
- [CVE-2024-4484](CVE-2024/CVE-2024-44xx/CVE-2024-4484.json) (`2024-05-24T13:03:05.093`)
- [CVE-2024-4485](CVE-2024/CVE-2024-44xx/CVE-2024-4485.json) (`2024-05-24T13:03:05.093`)
- [CVE-2024-4544](CVE-2024/CVE-2024-45xx/CVE-2024-4544.json) (`2024-05-24T13:03:11.993`)
- [CVE-2024-5060](CVE-2024/CVE-2024-50xx/CVE-2024-5060.json) (`2024-05-24T13:03:05.093`)
- [CVE-2024-5142](CVE-2024/CVE-2024-51xx/CVE-2024-5142.json) (`2024-05-24T13:03:05.093`)
- [CVE-2024-5205](CVE-2024/CVE-2024-52xx/CVE-2024-5205.json) (`2024-05-24T13:03:11.993`)
- [CVE-2024-5310](CVE-2024/CVE-2024-53xx/CVE-2024-5310.json) (`2024-05-24T13:03:05.093`)
- [CVE-2024-5312](CVE-2024/CVE-2024-53xx/CVE-2024-5312.json) (`2024-05-24T13:03:05.093`)
- [CVE-2024-5314](CVE-2024/CVE-2024-53xx/CVE-2024-5314.json) (`2024-05-24T13:03:05.093`)
- [CVE-2024-5315](CVE-2024/CVE-2024-53xx/CVE-2024-5315.json) (`2024-05-24T13:03:05.093`)
## Download and Usage ## Download and Usage

View File

@ -159260,7 +159260,7 @@ CVE-2020-3679,0,0,afde5c571c6799f82db69f1984f97d2103767c09176e5f828078551066c249
CVE-2020-3680,0,0,8c1c6b8d5f4d7704e9bf3f9ae4b8143f4d26da3b4ea95adcafe78c8ee378c04b,2020-06-03T13:44:37.213000 CVE-2020-3680,0,0,8c1c6b8d5f4d7704e9bf3f9ae4b8143f4d26da3b4ea95adcafe78c8ee378c04b,2020-06-03T13:44:37.213000
CVE-2020-3681,0,0,82eec7677a5040e74bf37e554674ce19bdde5a5cae1c834825ce2b2ae6133076,2020-08-10T18:40:44.703000 CVE-2020-3681,0,0,82eec7677a5040e74bf37e554674ce19bdde5a5cae1c834825ce2b2ae6133076,2020-08-10T18:40:44.703000
CVE-2020-3682,0,0,24a4348c2423fb50a4d883ab97a98087dac9114a52e3cd5f84438c3d7a885f75,2023-11-07T03:23:01.990000 CVE-2020-3682,0,0,24a4348c2423fb50a4d883ab97a98087dac9114a52e3cd5f84438c3d7a885f75,2023-11-07T03:23:01.990000
CVE-2020-36825,0,1,11fd8bfa5fd2d4cc998966e9cf3841111405b021462997cacb9442811ebd2342,2024-05-24T10:15:09.153000 CVE-2020-36825,0,0,11fd8bfa5fd2d4cc998966e9cf3841111405b021462997cacb9442811ebd2342,2024-05-24T10:15:09.153000
CVE-2020-36826,0,0,0e31ad1f2936d026f31ea8a8c60fd59484d066fc31980942e49d09e9fe78ef75,2024-05-17T01:48:58.757000 CVE-2020-36826,0,0,0e31ad1f2936d026f31ea8a8c60fd59484d066fc31980942e49d09e9fe78ef75,2024-05-17T01:48:58.757000
CVE-2020-36827,0,0,85af821d9eb495826ed1ba9a91785e23077914210ba31b106d9f6119fa8ab1a2,2024-03-25T01:51:01.223000 CVE-2020-36827,0,0,85af821d9eb495826ed1ba9a91785e23077914210ba31b106d9f6119fa8ab1a2,2024-03-25T01:51:01.223000
CVE-2020-36828,0,0,1ef1be7e7b2ae938902b8d1465831da75638f338eae1e3e5e8f488ed8cff3335,2024-05-17T01:48:58.900000 CVE-2020-36828,0,0,1ef1be7e7b2ae938902b8d1465831da75638f338eae1e3e5e8f488ed8cff3335,2024-05-17T01:48:58.900000
@ -212986,7 +212986,7 @@ CVE-2023-0997,0,0,9d867f728bb348fa4696e97c8e4b017968a3b3bb8b47c0b8301db5c6498f4e
CVE-2023-0998,0,0,ba5f68f8590fb13504e5e9b2fcbd34380148b745a4b26a6bbaa9c9aacfd35a55,2024-05-17T02:17:43.290000 CVE-2023-0998,0,0,ba5f68f8590fb13504e5e9b2fcbd34380148b745a4b26a6bbaa9c9aacfd35a55,2024-05-17T02:17:43.290000
CVE-2023-0999,0,0,b1e7884f1d1818453ea32891517ca75a4f407be2a70ee70a439e634db86a737f,2024-05-17T02:17:43.410000 CVE-2023-0999,0,0,b1e7884f1d1818453ea32891517ca75a4f407be2a70ee70a439e634db86a737f,2024-05-17T02:17:43.410000
CVE-2023-1000,0,0,4aa58533c5dbb24f12efb55a44fc3e6b226f201aaeb3adf708f655b46d5885d5,2024-05-17T02:17:43.510000 CVE-2023-1000,0,0,4aa58533c5dbb24f12efb55a44fc3e6b226f201aaeb3adf708f655b46d5885d5,2024-05-17T02:17:43.510000
CVE-2023-1001,0,0,c503ff5fcef2b722339d35b124404a82040640bc157044fe4326554acd2fde3f,2024-05-24T06:15:07.797000 CVE-2023-1001,0,1,2231a822aee83ff042a464ea331ee711b47747a8e88a086cffbd2ff200b9dc59,2024-05-24T13:03:11.993000
CVE-2023-1002,0,0,131af00873ba3d719d248a3d55c1c0fedb7d4a756c10d98fe624675155b70314,2024-05-17T02:17:43.627000 CVE-2023-1002,0,0,131af00873ba3d719d248a3d55c1c0fedb7d4a756c10d98fe624675155b70314,2024-05-17T02:17:43.627000
CVE-2023-1003,0,0,8bf836cf081253b3290c22b088bb9f1d5e02d957313468642ff89c27911f506d,2024-05-17T02:17:43.750000 CVE-2023-1003,0,0,8bf836cf081253b3290c22b088bb9f1d5e02d957313468642ff89c27911f506d,2024-05-17T02:17:43.750000
CVE-2023-1004,0,0,058d27fdff044a808f27ea337ecac6b052290a8dbc6d2048e8b9947a523130a1,2024-05-17T02:17:43.863000 CVE-2023-1004,0,0,058d27fdff044a808f27ea337ecac6b052290a8dbc6d2048e8b9947a523130a1,2024-05-17T02:17:43.863000
@ -213091,7 +213091,7 @@ CVE-2023-1107,0,0,9a52bef9a1ca429be140a10c84bc12a629590b53316a867749752072c0b261
CVE-2023-1108,0,0,aeacf9d513f2b7dab05d3e517bca24fd3b051615c399a2a076f95c7e59be4ff3,2024-05-03T16:15:10.140000 CVE-2023-1108,0,0,aeacf9d513f2b7dab05d3e517bca24fd3b051615c399a2a076f95c7e59be4ff3,2024-05-03T16:15:10.140000
CVE-2023-1109,0,0,2509c662afdb3f0a0ec45035471a3248ff9a739f276b59dc8726839849d40390,2023-04-26T23:00:01.937000 CVE-2023-1109,0,0,2509c662afdb3f0a0ec45035471a3248ff9a739f276b59dc8726839849d40390,2023-04-26T23:00:01.937000
CVE-2023-1110,0,0,1f7300cb8eef018806d7e6dafa6e92f63d8af6d27f8e22d3167347856cbbc3a7,2023-11-07T04:02:31.253000 CVE-2023-1110,0,0,1f7300cb8eef018806d7e6dafa6e92f63d8af6d27f8e22d3167347856cbbc3a7,2023-11-07T04:02:31.253000
CVE-2023-1111,0,0,0aa3127d5099c7e18746393b094731b974e27286ebd8f18b9df86905760ba727,2024-05-24T07:15:08.213000 CVE-2023-1111,0,1,0e39b6f373e0791e31e2e5cd1a607fc6c385a08998b6cfe550cdfa78860f1925,2024-05-24T13:03:05.093000
CVE-2023-1112,0,0,c2c9f1db857cae7a09406557a787eabf2708a23b13791e35059196c8811a0094,2024-05-17T02:17:49.600000 CVE-2023-1112,0,0,c2c9f1db857cae7a09406557a787eabf2708a23b13791e35059196c8811a0094,2024-05-17T02:17:49.600000
CVE-2023-1113,0,0,7f797892ab35c630cc5504c64a0bd7915415118eb8247b006d6445eec8741408,2024-05-17T02:17:49.707000 CVE-2023-1113,0,0,7f797892ab35c630cc5504c64a0bd7915415118eb8247b006d6445eec8741408,2024-05-17T02:17:49.707000
CVE-2023-1114,0,0,4ec36f3280ef61f0749c18afea2bb24b982915597e6f1fee380d9a87d5ca57c4,2024-02-01T16:56:59.573000 CVE-2023-1114,0,0,4ec36f3280ef61f0749c18afea2bb24b982915597e6f1fee380d9a87d5ca57c4,2024-02-01T16:56:59.573000
@ -234786,6 +234786,7 @@ CVE-2023-47706,0,0,0cfaecc187d4236dd38d13dc0e25752f35e7adc63caac950330b0f64c0b0d
CVE-2023-47707,0,0,c0b40bcf5eaa712d14fa41e4477281db7d00ecb46e35f8e08b13ff46eeb7db79,2023-12-22T10:00:51.667000 CVE-2023-47707,0,0,c0b40bcf5eaa712d14fa41e4477281db7d00ecb46e35f8e08b13ff46eeb7db79,2023-12-22T10:00:51.667000
CVE-2023-47709,0,0,93d96d63d91c745cac8c52f213bc77fe5630312603ac43fa332e2b932b096fe0,2024-05-14T16:13:02.773000 CVE-2023-47709,0,0,93d96d63d91c745cac8c52f213bc77fe5630312603ac43fa332e2b932b096fe0,2024-05-14T16:13:02.773000
CVE-2023-4771,0,0,a10ac44bb2935eb6f98087d3bf01615747fac6d99bafb1ed062d46d56b0c70f4,2023-11-28T19:09:05.517000 CVE-2023-4771,0,0,a10ac44bb2935eb6f98087d3bf01615747fac6d99bafb1ed062d46d56b0c70f4,2023-11-28T19:09:05.517000
CVE-2023-47710,1,1,35076a404dd6467620e09df11731acf3dc6377480731d5993e679531910af1fd,2024-05-24T13:03:05.093000
CVE-2023-47711,0,0,9f810d4f82da7bdbf262a2e39dd4eb45df3b32840bfd3f44da0617ac6ecd8b4b,2024-05-14T16:13:02.773000 CVE-2023-47711,0,0,9f810d4f82da7bdbf262a2e39dd4eb45df3b32840bfd3f44da0617ac6ecd8b4b,2024-05-14T16:13:02.773000
CVE-2023-47712,0,0,23b2f86a27a46076a0d66fdc5dc48282daae5ee375de5d778b677f2571294f39,2024-05-14T16:13:02.773000 CVE-2023-47712,0,0,23b2f86a27a46076a0d66fdc5dc48282daae5ee375de5d778b677f2571294f39,2024-05-14T16:13:02.773000
CVE-2023-47714,0,0,64b476fb281b190c23c9a568b145296581a6cf3f5118192550da9aa137a7cfd0,2024-04-15T13:15:51.577000 CVE-2023-47714,0,0,64b476fb281b190c23c9a568b145296581a6cf3f5118192550da9aa137a7cfd0,2024-04-15T13:15:51.577000
@ -236070,6 +236071,10 @@ CVE-2023-49563,0,0,568bb8dae2170ecad6ff665923c66fd996b7f9696d3b5fedc878ebf5a259f
CVE-2023-49568,0,0,eea6dfafe58a200cc2bdd4c894a031a2140f2a690fbad28fd3f3fcf012684e16,2024-01-22T17:57:41.193000 CVE-2023-49568,0,0,eea6dfafe58a200cc2bdd4c894a031a2140f2a690fbad28fd3f3fcf012684e16,2024-01-22T17:57:41.193000
CVE-2023-49569,0,0,cc733e53fb10360cbb86a61a1193719ac345809b6a7edc8d3e6fe43a3626ad3c,2024-01-22T18:57:03.500000 CVE-2023-49569,0,0,cc733e53fb10360cbb86a61a1193719ac345809b6a7edc8d3e6fe43a3626ad3c,2024-01-22T18:57:03.500000
CVE-2023-4957,0,0,6123c2f9476dd712735e2804060fd8bc7342ccf38d59719ab59edd593da9cb5e,2023-10-16T14:08:22.900000 CVE-2023-4957,0,0,6123c2f9476dd712735e2804060fd8bc7342ccf38d59719ab59edd593da9cb5e,2023-10-16T14:08:22.900000
CVE-2023-49572,1,1,544db1530efd63d611613ace2e6299a4d29a3bcd985eb33b86e37baea3aa59a2,2024-05-24T13:15:08.030000
CVE-2023-49573,1,1,37cb92e368bd368d57855dfa1021ccbfde2eb34657686de0880fd75ab09ded62,2024-05-24T13:15:08.630000
CVE-2023-49574,1,1,66a3016a6a0a87f2c257657fa83f939bed6e892f5e0024c51f082e2f1c72f2eb,2024-05-24T13:15:09.023000
CVE-2023-49575,1,1,a87ffbdb97e8e9cc9bc8c6be9b2709bb3c7f40676ae1ec10b057e3205db16f4d,2024-05-24T13:15:09.360000
CVE-2023-49577,0,0,1f65ced445adb284f431bcef7043879f5979584e59fd8388853ca3184bafa947,2023-12-19T14:50:18.817000 CVE-2023-49577,0,0,1f65ced445adb284f431bcef7043879f5979584e59fd8388853ca3184bafa947,2023-12-19T14:50:18.817000
CVE-2023-49578,0,0,d68e58fde60e997e9217b7ce12398fa74b4d3ca91d4656fe0761f096343719b8,2023-12-15T14:32:38.473000 CVE-2023-49578,0,0,d68e58fde60e997e9217b7ce12398fa74b4d3ca91d4656fe0761f096343719b8,2023-12-15T14:32:38.473000
CVE-2023-4958,0,0,90fe993ce0b9e6aed83dbae80590489de4551e745f037f6202294c4142a6cc2a,2024-05-03T16:15:11.227000 CVE-2023-4958,0,0,90fe993ce0b9e6aed83dbae80590489de4551e745f037f6202294c4142a6cc2a,2024-05-03T16:15:11.227000
@ -238254,7 +238259,7 @@ CVE-2023-5282,0,0,3cf3ef811f6e609952984570f89ddc58fa09ae87ea1fa4c2cc494d101f578a
CVE-2023-52820,0,0,e6e4c34d7f3c581ac4e9ac948de11ffc3614675f1c7105160889b8666bb70275,2024-05-21T16:53:56.550000 CVE-2023-52820,0,0,e6e4c34d7f3c581ac4e9ac948de11ffc3614675f1c7105160889b8666bb70275,2024-05-21T16:53:56.550000
CVE-2023-52821,0,0,cce01229a55fb7caa6b55c76589ced5c2384b3d1a12985f456b20e8ac4dc9dc8,2024-05-24T01:14:35.980000 CVE-2023-52821,0,0,cce01229a55fb7caa6b55c76589ced5c2384b3d1a12985f456b20e8ac4dc9dc8,2024-05-24T01:14:35.980000
CVE-2023-52822,0,0,e5720e3f80bcf171007cfb74d3468296aa87b5d72fb63374216904a60c97a16f,2024-05-21T16:53:56.550000 CVE-2023-52822,0,0,e5720e3f80bcf171007cfb74d3468296aa87b5d72fb63374216904a60c97a16f,2024-05-21T16:53:56.550000
CVE-2023-52823,0,1,740d08fec0994d1401cb971c5c5f05c53768592a67e6b3a1c62475fe642eecfb,2024-05-24T11:15:09.367000 CVE-2023-52823,0,0,740d08fec0994d1401cb971c5c5f05c53768592a67e6b3a1c62475fe642eecfb,2024-05-24T11:15:09.367000
CVE-2023-52824,0,0,bac5cecf9bee0906aae80b5e64b21cf6a2b6db040a78a50e013899559115426b,2024-05-21T16:53:56.550000 CVE-2023-52824,0,0,bac5cecf9bee0906aae80b5e64b21cf6a2b6db040a78a50e013899559115426b,2024-05-21T16:53:56.550000
CVE-2023-52825,0,0,787ca76e1a5acd5ab56fa7aa248dab6b1ffb636794805132c732f856dbd10866,2024-05-21T16:53:56.550000 CVE-2023-52825,0,0,787ca76e1a5acd5ab56fa7aa248dab6b1ffb636794805132c732f856dbd10866,2024-05-21T16:53:56.550000
CVE-2023-52826,0,0,32e36d302d5fd0bc32b6f5244bceb5c1dac2fbe53451e80e83cd49c1b4300fce,2024-05-21T16:53:56.550000 CVE-2023-52826,0,0,32e36d302d5fd0bc32b6f5244bceb5c1dac2fbe53451e80e83cd49c1b4300fce,2024-05-21T16:53:56.550000
@ -240041,7 +240046,7 @@ CVE-2023-7251,0,0,73fa31f7b11a2c8f7785ccd98b3beff89a3869cfbe5b74910fb2dd13412671
CVE-2023-7252,0,0,2392d7e3f3e585dc7390c0e965b0650ef11fa8ae2796aaf6e5db491d8ab57d29,2024-04-22T13:28:43.747000 CVE-2023-7252,0,0,2392d7e3f3e585dc7390c0e965b0650ef11fa8ae2796aaf6e5db491d8ab57d29,2024-04-22T13:28:43.747000
CVE-2023-7253,0,0,6000cb96a7cdff75b79b770b4fe76bc65674b2e521cea85c3d83d19816bdddbc,2024-04-24T13:39:42.883000 CVE-2023-7253,0,0,6000cb96a7cdff75b79b770b4fe76bc65674b2e521cea85c3d83d19816bdddbc,2024-04-24T13:39:42.883000
CVE-2023-7258,0,0,5ff9fbb18c87cd79eeba5bdac9e20b834be684e2899fd63fb3e107422ede555b,2024-05-15T18:35:11.453000 CVE-2023-7258,0,0,5ff9fbb18c87cd79eeba5bdac9e20b834be684e2899fd63fb3e107422ede555b,2024-05-15T18:35:11.453000
CVE-2023-7259,0,0,430343a1f0907dd4ce6fd174419c90c3307c14955cd3c6e119afc73602557521,2024-05-24T07:15:08.930000 CVE-2023-7259,0,1,caa59250f329d77676b7e238f282a67085e0bc859653d1d94fa298417ec87e80,2024-05-24T13:03:05.093000
CVE-2024-0007,0,0,3bebeca11ed66b29340ad5b2f4a6fdda381d640f217ed7214dda7d3a471e9da1,2024-02-15T06:23:39.303000 CVE-2024-0007,0,0,3bebeca11ed66b29340ad5b2f4a6fdda381d640f217ed7214dda7d3a471e9da1,2024-02-15T06:23:39.303000
CVE-2024-0008,0,0,db70626ccf03b2491d218a1d6d38cb10870a351e02a617fba1e6e23a0ac8502b,2024-02-15T06:23:39.303000 CVE-2024-0008,0,0,db70626ccf03b2491d218a1d6d38cb10870a351e02a617fba1e6e23a0ac8502b,2024-02-15T06:23:39.303000
CVE-2024-0009,0,0,a481cbe6336f9e8c7286d10d3efcc3169667e3db231d83fec3fad506beda4652,2024-02-15T06:23:39.303000 CVE-2024-0009,0,0,a481cbe6336f9e8c7286d10d3efcc3169667e3db231d83fec3fad506beda4652,2024-02-15T06:23:39.303000
@ -240752,7 +240757,7 @@ CVE-2024-0861,0,0,896e71725cbfb614341352655e0b66e7def84c2617b58556401d4278cc8b74
CVE-2024-0862,0,0,8d5bc8312d1d93cf3fbc9bc4464ee1ea50ba5434e84839c1491be95817a91a77,2024-05-14T19:17:55.627000 CVE-2024-0862,0,0,8d5bc8312d1d93cf3fbc9bc4464ee1ea50ba5434e84839c1491be95817a91a77,2024-05-14T19:17:55.627000
CVE-2024-0864,0,0,d89dcae43b5200797b81bcd0ad7b3b6e3cba6f54866805aee9a386996fe0fcfc,2024-02-29T13:49:29.390000 CVE-2024-0864,0,0,d89dcae43b5200797b81bcd0ad7b3b6e3cba6f54866805aee9a386996fe0fcfc,2024-02-29T13:49:29.390000
CVE-2024-0866,0,0,2315ea7233a9f152b45c2f2db1db04866f3fbf8a4d5b6e4bad65f402d240f082,2024-03-26T12:55:05.010000 CVE-2024-0866,0,0,2315ea7233a9f152b45c2f2db1db04866f3fbf8a4d5b6e4bad65f402d240f082,2024-03-26T12:55:05.010000
CVE-2024-0867,0,0,1cc00ae0c7c78fd04c13abfc9a88ad7ae845577d6430c70a87f455a0689bcb45,2024-05-24T06:15:08.380000 CVE-2024-0867,0,1,bff6dce5de81ae7891647493682c1a4a2fb7bb408cce62ce65d5462da59ac834,2024-05-24T13:03:11.993000
CVE-2024-0868,0,0,50dc470faec27f67202fe3c6b32f6e0e6b35686ae887e56f6aa6e0525b6a38ff,2024-04-17T12:48:07.510000 CVE-2024-0868,0,0,50dc470faec27f67202fe3c6b32f6e0e6b35686ae887e56f6aa6e0525b6a38ff,2024-04-17T12:48:07.510000
CVE-2024-0869,0,0,39eb12d4def5ace38cccd71318a17cc1945f05a59b2d0897303b6745b871b84d,2024-02-13T19:45:09.783000 CVE-2024-0869,0,0,39eb12d4def5ace38cccd71318a17cc1945f05a59b2d0897303b6745b871b84d,2024-02-13T19:45:09.783000
CVE-2024-0870,0,0,41ded14ab5c6dc5551576c156b8ab1e84832c7db1a7e8550e9e61978443b627a,2024-05-14T19:18:31.490000 CVE-2024-0870,0,0,41ded14ab5c6dc5551576c156b8ab1e84832c7db1a7e8550e9e61978443b627a,2024-05-14T19:18:31.490000
@ -240773,7 +240778,7 @@ CVE-2024-0888,0,0,1251f1e0b57697e39ab302ac1708a8ac792e88534122258215da50974afe10
CVE-2024-0889,0,0,1af68ae8d1cfa13ae0eded53cf456b483512352e891d764583ded6c2ad78addd,2024-05-17T02:35:01.543000 CVE-2024-0889,0,0,1af68ae8d1cfa13ae0eded53cf456b483512352e891d764583ded6c2ad78addd,2024-05-17T02:35:01.543000
CVE-2024-0890,0,0,e67541998dd7949997cc026684667cf6adf88f664c3932cae28e899dee3bafce,2024-05-17T02:35:01.833000 CVE-2024-0890,0,0,e67541998dd7949997cc026684667cf6adf88f664c3932cae28e899dee3bafce,2024-05-17T02:35:01.833000
CVE-2024-0891,0,0,43d38de51f0536067727703a5bf8557870f5608362301ff29cf47c54bddd3a28,2024-05-17T02:35:02.087000 CVE-2024-0891,0,0,43d38de51f0536067727703a5bf8557870f5608362301ff29cf47c54bddd3a28,2024-05-17T02:35:02.087000
CVE-2024-0893,0,0,ce7ae2f3a462ac35875f9067831135d6cd7e06d31ea47ec53dc412ade7713a14,2024-05-24T07:15:09.387000 CVE-2024-0893,0,1,d5e225f71a08a9253f53b86df05cb878c68c87356cab7a56674d7f5c0b4f38c7,2024-05-24T13:03:05.093000
CVE-2024-0895,0,0,6a76c7f2f120789a65253031d7521e1f62411bd227b5e6c7a4bb77914289251e,2024-02-12T17:03:38.533000 CVE-2024-0895,0,0,6a76c7f2f120789a65253031d7521e1f62411bd227b5e6c7a4bb77914289251e,2024-02-12T17:03:38.533000
CVE-2024-0896,0,0,5348557c7ea4ddb4fdb7fdcc9e92238aad12e82aa66cf5c51f44520b0ef95acb,2024-03-13T18:16:18.563000 CVE-2024-0896,0,0,5348557c7ea4ddb4fdb7fdcc9e92238aad12e82aa66cf5c51f44520b0ef95acb,2024-03-13T18:16:18.563000
CVE-2024-0897,0,0,54d1bf8163931c80ebde85ab8390c0fecedb390a8355fe15103e3a67a3a29cc9,2024-03-13T18:16:18.563000 CVE-2024-0897,0,0,54d1bf8163931c80ebde85ab8390c0fecedb390a8355fe15103e3a67a3a29cc9,2024-03-13T18:16:18.563000
@ -240989,7 +240994,7 @@ CVE-2024-1129,0,0,efcf801aad96aab23ddf4c5c1c7fe067759cd524a5f540fb4b3132cd808f2d
CVE-2024-1130,0,0,19b9a2e3e227bc6e3d85f9dd98bd15cfd41c18a2ee1bc79c328385d5148fea32,2024-02-29T13:49:29.390000 CVE-2024-1130,0,0,19b9a2e3e227bc6e3d85f9dd98bd15cfd41c18a2ee1bc79c328385d5148fea32,2024-02-29T13:49:29.390000
CVE-2024-1132,0,0,fb94aeb2e33ee06cb38818cec4589dec64951d860b9f9a67435a2701e6505b51,2024-05-21T18:15:08.657000 CVE-2024-1132,0,0,fb94aeb2e33ee06cb38818cec4589dec64951d860b9f9a67435a2701e6505b51,2024-05-21T18:15:08.657000
CVE-2024-1133,0,0,85f4bf6d861639f9431d20ab28a51d2af9f3a3ecb32590788260710816d3a125,2024-02-29T13:49:29.390000 CVE-2024-1133,0,0,85f4bf6d861639f9431d20ab28a51d2af9f3a3ecb32590788260710816d3a125,2024-02-29T13:49:29.390000
CVE-2024-1134,0,0,cca4aca7610094a06b75f63f6e516c082b1da3319b5df5c587aebfa467f5ce8a,2024-05-24T06:15:08.667000 CVE-2024-1134,0,1,2e7c5ee3a71225c7c6e3e9d595fec8d66565da1f8113a13a6b762c5258606aef,2024-05-24T13:03:05.093000
CVE-2024-1135,0,0,2f6bc90f330f2812b6ceb34e2fa1ad9c1c5eca9415bce0719ca3f92f74cd2497,2024-04-16T13:24:07.103000 CVE-2024-1135,0,0,2f6bc90f330f2812b6ceb34e2fa1ad9c1c5eca9415bce0719ca3f92f74cd2497,2024-04-16T13:24:07.103000
CVE-2024-1136,0,0,609070256c4defa988e1113275bf8273fe15f50574e00ed3dcfde13143e471cc,2024-02-28T14:06:45.783000 CVE-2024-1136,0,0,609070256c4defa988e1113275bf8273fe15f50574e00ed3dcfde13143e471cc,2024-02-28T14:06:45.783000
CVE-2024-1137,0,0,9f8c1cf74ca4778ab709faeea998997368a7f042480977a7d6535f2dd892d7f7,2024-03-13T12:33:51.697000 CVE-2024-1137,0,0,9f8c1cf74ca4778ab709faeea998997368a7f042480977a7d6535f2dd892d7f7,2024-03-13T12:33:51.697000
@ -241159,7 +241164,7 @@ CVE-2024-1327,0,0,1b6e3f0296467e9f6b424925712e479dea0088dc2698e1adadd7f96bd6f1e8
CVE-2024-1328,0,0,1e360ec5f794b47c3c1949d058d4dcab1ca058a0302ffe54a63801cf38181f90,2024-03-12T12:40:13.500000 CVE-2024-1328,0,0,1e360ec5f794b47c3c1949d058d4dcab1ca058a0302ffe54a63801cf38181f90,2024-03-12T12:40:13.500000
CVE-2024-1329,0,0,c251ab89131ed5db620ce7b9371daf5508a26377e3f0f0d0996003e3074e8cd1,2024-02-15T18:27:28.837000 CVE-2024-1329,0,0,c251ab89131ed5db620ce7b9371daf5508a26377e3f0f0d0996003e3074e8cd1,2024-02-15T18:27:28.837000
CVE-2024-1331,0,0,1deb1e21efa47891bffcfc0f7c5a5a4e56a2cce5d50551f8ec8837f30ffffb10,2024-03-18T19:40:00.173000 CVE-2024-1331,0,0,1deb1e21efa47891bffcfc0f7c5a5a4e56a2cce5d50551f8ec8837f30ffffb10,2024-03-18T19:40:00.173000
CVE-2024-1332,0,0,018ced21ef3250a9c45fda9c423096357256d7df8d96cfcde31205ec8c75fa36,2024-05-24T07:15:09.733000 CVE-2024-1332,0,1,ce91a247ee20b5086ffc922000a1236f0f0a17c39483df8ffb3ea515e6b84e26,2024-05-24T13:03:05.093000
CVE-2024-1333,0,0,258128469d54cc44538629ab13a661542f0353cc3076e7f49f79a63a3b1847c4,2024-03-18T19:40:00.173000 CVE-2024-1333,0,0,258128469d54cc44538629ab13a661542f0353cc3076e7f49f79a63a3b1847c4,2024-03-18T19:40:00.173000
CVE-2024-1334,0,0,944ed42170a8df7f2e4c4a2f85c1c273c219b29edac392443c71fda9748dc88d,2024-02-29T13:49:29.390000 CVE-2024-1334,0,0,944ed42170a8df7f2e4c4a2f85c1c273c219b29edac392443c71fda9748dc88d,2024-02-29T13:49:29.390000
CVE-2024-1335,0,0,c84b322e1aa2f7dde321fa7adf9db9730c3948c96461d0bba36cb342c6cd701c,2024-02-29T13:49:29.390000 CVE-2024-1335,0,0,c84b322e1aa2f7dde321fa7adf9db9730c3948c96461d0bba36cb342c6cd701c,2024-02-29T13:49:29.390000
@ -241202,7 +241207,7 @@ CVE-2024-1371,0,0,93706cb3903d44813efe65388227c96437c2154d1873db13a512d53a3d1e58
CVE-2024-1372,0,0,fd6a0b0bdbecc63f56aef495458a3c5dd8f2e76f436e6cb5f113766b10bba4a3,2024-03-05T17:12:04.487000 CVE-2024-1372,0,0,fd6a0b0bdbecc63f56aef495458a3c5dd8f2e76f436e6cb5f113766b10bba4a3,2024-03-05T17:12:04.487000
CVE-2024-1373,0,0,6182eba24b857bc2b56524dd4b982074bd00b00d58fe9873ed20ec6b67a1b251,2024-03-11T10:15:49.383000 CVE-2024-1373,0,0,6182eba24b857bc2b56524dd4b982074bd00b00d58fe9873ed20ec6b67a1b251,2024-03-11T10:15:49.383000
CVE-2024-1374,0,0,7fe6e2944b2df04d1912da5645567f3da2009d2f734eda817ead1dbb0beca205,2024-03-06T15:26:34.817000 CVE-2024-1374,0,0,7fe6e2944b2df04d1912da5645567f3da2009d2f734eda817ead1dbb0beca205,2024-03-06T15:26:34.817000
CVE-2024-1376,0,0,a4797f01b6f1ccfcf92f9151a1f32d0bbf3d787e041847c4af137e800d478b6a,2024-05-24T07:15:10.057000 CVE-2024-1376,0,1,3f5093aebba17bcc569f7c0a532d073178955aeebf7468859be137b5aa030a60,2024-05-24T13:03:05.093000
CVE-2024-1377,0,0,89ec0d3cfd7c9e3eb401e7d154a45976b7a536cce1245cff377347594bc84e11,2024-03-07T13:52:27.110000 CVE-2024-1377,0,0,89ec0d3cfd7c9e3eb401e7d154a45976b7a536cce1245cff377347594bc84e11,2024-03-07T13:52:27.110000
CVE-2024-1378,0,0,861a3323ec8efaeb758681460069e84c3f0f238c20d369cc8b41f972b8f59fb9,2024-03-01T23:02:21.513000 CVE-2024-1378,0,0,861a3323ec8efaeb758681460069e84c3f0f238c20d369cc8b41f972b8f59fb9,2024-03-01T23:02:21.513000
CVE-2024-1379,0,0,a5dc4ff194b2081d660b7d1ebd72a79c6bfbea7bdeb0b3322f977151df1ae46c,2024-03-20T13:00:16.367000 CVE-2024-1379,0,0,a5dc4ff194b2081d660b7d1ebd72a79c6bfbea7bdeb0b3322f977151df1ae46c,2024-03-20T13:00:16.367000
@ -245243,7 +245248,7 @@ CVE-2024-26176,0,0,f59903f2631e58e79a3070c1f29430524476df93867e947d3ea24ca678f70
CVE-2024-26177,0,0,5e5591b51929988e6d47df6b283f8296af1e7f5e6dd74dff0a5dcb3d5b9bd2a6,2024-04-11T20:15:34.493000 CVE-2024-26177,0,0,5e5591b51929988e6d47df6b283f8296af1e7f5e6dd74dff0a5dcb3d5b9bd2a6,2024-04-11T20:15:34.493000
CVE-2024-26178,0,0,0ea3ff59f80ecc740a7520fa54df65db9194a0e2f5b284e4a28108c6cdd7c32b,2024-04-11T20:15:34.590000 CVE-2024-26178,0,0,0ea3ff59f80ecc740a7520fa54df65db9194a0e2f5b284e4a28108c6cdd7c32b,2024-04-11T20:15:34.590000
CVE-2024-26179,0,0,2c0e9c26edbe7391894ae0316bece6d7f0e00e30d0dd35ed10702d1f0851486d,2024-04-10T13:24:00.070000 CVE-2024-26179,0,0,2c0e9c26edbe7391894ae0316bece6d7f0e00e30d0dd35ed10702d1f0851486d,2024-04-10T13:24:00.070000
CVE-2024-2618,0,0,fd31576c33993f719aeaf2b889819ad687d49e448baafc356e1fa2ce5662909d,2024-05-24T05:15:09.297000 CVE-2024-2618,0,1,4f0bf0b0dc9c6915a48b034c1474a3201e87a6008c756895fbaf294b9390d39b,2024-05-24T13:03:11.993000
CVE-2024-26180,0,0,2642e54652d0be099215ac2592071956276bb0b78149f1f8d9ba58e9dd3a0ce8,2024-04-10T13:24:00.070000 CVE-2024-26180,0,0,2642e54652d0be099215ac2592071956276bb0b78149f1f8d9ba58e9dd3a0ce8,2024-04-10T13:24:00.070000
CVE-2024-26181,0,0,3a411991e2aecfef78fa22d696562d983ee0c725c3bcbac06e5fb980d6ae1993,2024-03-12T17:46:17.273000 CVE-2024-26181,0,0,3a411991e2aecfef78fa22d696562d983ee0c725c3bcbac06e5fb980d6ae1993,2024-03-12T17:46:17.273000
CVE-2024-26182,0,0,485ae09810036858e090542cbab32de37612825a546d21a345f4c90039e51c49,2024-04-11T20:15:34.707000 CVE-2024-26182,0,0,485ae09810036858e090542cbab32de37612825a546d21a345f4c90039e51c49,2024-04-11T20:15:34.707000
@ -246418,7 +246423,7 @@ CVE-2024-27834,0,0,948524c0dc915de48f1a30f0f83847626c289c570280c228779565f014fee
CVE-2024-27835,0,0,c5b496e09974875402a7d06441907c8d5ea81f42dba79f32428e849dbc6472f0,2024-05-14T16:13:02.773000 CVE-2024-27835,0,0,c5b496e09974875402a7d06441907c8d5ea81f42dba79f32428e849dbc6472f0,2024-05-14T16:13:02.773000
CVE-2024-27837,0,0,8626be99cac1ae00bafee020dd05df66abeadfaec1fcc678d068c1e35de61db0,2024-05-14T16:13:02.773000 CVE-2024-27837,0,0,8626be99cac1ae00bafee020dd05df66abeadfaec1fcc678d068c1e35de61db0,2024-05-14T16:13:02.773000
CVE-2024-27839,0,0,74675cf311db299675a03969100f02247b00aca595ece392255eaa46bf7427bf,2024-05-14T16:13:02.773000 CVE-2024-27839,0,0,74675cf311db299675a03969100f02247b00aca595ece392255eaa46bf7427bf,2024-05-14T16:13:02.773000
CVE-2024-2784,0,0,b7629c0a6a4797a90210270ead1fd8b046015558c379db74b467baf1269bc9c5,2024-05-24T05:15:09.620000 CVE-2024-2784,0,1,ba1190a588b039c20289ccfefd73f048dc164c370109c9a0315fb7e323728a74,2024-05-24T13:03:11.993000
CVE-2024-27841,0,0,b865fdab78cc8f48674a0c8e8cef06e953677f093a832a5849b168bd71ab3c3a,2024-05-14T16:13:02.773000 CVE-2024-27841,0,0,b865fdab78cc8f48674a0c8e8cef06e953677f093a832a5849b168bd71ab3c3a,2024-05-14T16:13:02.773000
CVE-2024-27842,0,0,dfd659630e6d8c02d425306ac5fe92c5fdda89cde2357e956a1f302da3bf29f4,2024-05-14T16:13:02.773000 CVE-2024-27842,0,0,dfd659630e6d8c02d425306ac5fe92c5fdda89cde2357e956a1f302da3bf29f4,2024-05-14T16:13:02.773000
CVE-2024-27843,0,0,6f00e50e144ffd155eb02d09b582c344ba6cc9bd465b8d628b0a2a26ea39a90c,2024-05-14T16:13:02.773000 CVE-2024-27843,0,0,6f00e50e144ffd155eb02d09b582c344ba6cc9bd465b8d628b0a2a26ea39a90c,2024-05-14T16:13:02.773000
@ -250394,7 +250399,7 @@ CVE-2024-35559,0,0,0e0ce300b73ed62ad8a51cb05e5d24371bbac77caf688feb79ef16ffd5184
CVE-2024-3556,0,0,3585ee5c92a9c3d529b040dd670fbfee3d6182484f87bd29638348adaae5ce9a,2024-04-09T22:15:07.470000 CVE-2024-3556,0,0,3585ee5c92a9c3d529b040dd670fbfee3d6182484f87bd29638348adaae5ce9a,2024-04-09T22:15:07.470000
CVE-2024-35560,0,0,597dd8543549aa3918a7c198c5233aa0b7527be9ddf9110727da0897342b10aa,2024-05-22T14:30:41.953000 CVE-2024-35560,0,0,597dd8543549aa3918a7c198c5233aa0b7527be9ddf9110727da0897342b10aa,2024-05-22T14:30:41.953000
CVE-2024-35561,0,0,8de74913deeb82bc0c13bc3d399d98340f8983a7e0aea38e829e82b55ca5ac91,2024-05-22T14:30:41.953000 CVE-2024-35561,0,0,8de74913deeb82bc0c13bc3d399d98340f8983a7e0aea38e829e82b55ca5ac91,2024-05-22T14:30:41.953000
CVE-2024-3557,0,0,6384e09f2b0861df209b78cf9037d44063de5d04caa08149eec83e046f79228b,2024-05-24T05:15:09.833000 CVE-2024-3557,0,1,c3ea56b0bdc34dfc5cf46195aafe89ecd6c9203d05038c46d80fbbba3f6bf60d,2024-05-24T13:03:11.993000
CVE-2024-35570,0,0,28e94b3751ac99658b6b5e14fdb2c13c8c8e708c1afff9f925a1cc500050b2b3,2024-05-24T01:15:30.977000 CVE-2024-35570,0,0,28e94b3751ac99658b6b5e14fdb2c13c8c8e708c1afff9f925a1cc500050b2b3,2024-05-24T01:15:30.977000
CVE-2024-35571,0,0,67f76ae9f90c9f57899e4b508cc3f136e4d8caf290ab8a02ecec3dd8d722ed10,2024-05-20T19:34:58.277000 CVE-2024-35571,0,0,67f76ae9f90c9f57899e4b508cc3f136e4d8caf290ab8a02ecec3dd8d722ed10,2024-05-20T19:34:58.277000
CVE-2024-35576,0,0,6cb958bfbb2aa8f28dc30b2057abfc4520624058806f8d23062e42f766a7e31c,2024-05-20T19:34:58.277000 CVE-2024-35576,0,0,6cb958bfbb2aa8f28dc30b2057abfc4520624058806f8d23062e42f766a7e31c,2024-05-20T19:34:58.277000
@ -250694,7 +250699,7 @@ CVE-2024-3629,0,0,ed67d1a2dc82a6f7d8e47e5534a14b4493dd33c5e11e4c564b2ef763c111a4
CVE-2024-3630,0,0,1b4d82e848787accdc20ad3d430430e1a1fa399ad678a3e5fbc87f1ba9867411,2024-05-15T16:40:19.330000 CVE-2024-3630,0,0,1b4d82e848787accdc20ad3d430430e1a1fa399ad678a3e5fbc87f1ba9867411,2024-05-15T16:40:19.330000
CVE-2024-3631,0,0,52e896a80c9b063fda6224c04771bbd75f72f78e3d3636ccff4bb724fd16615d,2024-05-15T16:40:19.330000 CVE-2024-3631,0,0,52e896a80c9b063fda6224c04771bbd75f72f78e3d3636ccff4bb724fd16615d,2024-05-15T16:40:19.330000
CVE-2024-3634,0,0,940ae4dd6e92f9452379e49ccdcd29aa6fe6e9bda25faf9f7045c78090371ae8,2024-05-15T16:40:19.330000 CVE-2024-3634,0,0,940ae4dd6e92f9452379e49ccdcd29aa6fe6e9bda25faf9f7045c78090371ae8,2024-05-15T16:40:19.330000
CVE-2024-36361,0,0,d42eb303b2cacb7d0470c3408aff6b176d967b0f036c129e7bcef840cc548caf,2024-05-24T06:15:08.947000 CVE-2024-36361,0,1,f38f7877ee2fdf122f5bc8d2352bd0aed642365f6f8794612d7f1076f7aeed30,2024-05-24T13:03:05.093000
CVE-2024-3637,0,0,e0d8ef5f7498633f88592f7b832da01e95be5d925cdaa67450761833b0152a3c,2024-05-03T12:48:41.067000 CVE-2024-3637,0,0,e0d8ef5f7498633f88592f7b832da01e95be5d925cdaa67450761833b0152a3c,2024-05-03T12:48:41.067000
CVE-2024-3640,0,0,2c53ddbb0d3c9f63f5ef9575482e63f0bb81ae3ef5b4d53a76dd016e62e8657a,2024-05-17T18:36:31.297000 CVE-2024-3640,0,0,2c53ddbb0d3c9f63f5ef9575482e63f0bb81ae3ef5b4d53a76dd016e62e8657a,2024-05-17T18:36:31.297000
CVE-2024-3641,0,0,c281de95cce057acff2793609e8f843aad579a2f0257c0c2e0b6442733e87b14,2024-05-16T13:03:05.353000 CVE-2024-3641,0,0,c281de95cce057acff2793609e8f843aad579a2f0257c0c2e0b6442733e87b14,2024-05-16T13:03:05.353000
@ -250752,7 +250757,7 @@ CVE-2024-3711,0,0,b2ab182a6cd64f6398e71b1acf256dc2d496d129302aa4acbb7a9cb3b9f832
CVE-2024-3714,0,0,67d2f256f515fc7fb7a12633af83387395a2a6015e3786015a9a5a4420323bea,2024-05-20T13:00:34.807000 CVE-2024-3714,0,0,67d2f256f515fc7fb7a12633af83387395a2a6015e3786015a9a5a4420323bea,2024-05-20T13:00:34.807000
CVE-2024-3715,0,0,902861be5261e2c029ed83a5c6920fde180817c53e05bb93208dc31c820658c5,2024-05-02T18:00:37.360000 CVE-2024-3715,0,0,902861be5261e2c029ed83a5c6920fde180817c53e05bb93208dc31c820658c5,2024-05-02T18:00:37.360000
CVE-2024-3717,0,0,f925293668cd733410cea58d8de3d8ac1f08ce4fec8b5812651df64ea2fd428a,2024-05-02T18:00:37.360000 CVE-2024-3717,0,0,f925293668cd733410cea58d8de3d8ac1f08ce4fec8b5812651df64ea2fd428a,2024-05-02T18:00:37.360000
CVE-2024-3718,0,0,16168547faa11f93ed45be23709c887a11ecba67c1899866d6c5595e9bc921ce,2024-05-24T06:15:09.100000 CVE-2024-3718,0,1,a740a1633905d284711162c33f52150d8f35c5a9e41e141a82d07851d64c55d1,2024-05-24T13:03:05.093000
CVE-2024-3719,0,0,98817b00c300460b7ee17e28b90d655bc3286869de6cea5831a06059286a41a5,2024-05-17T02:40:05.100000 CVE-2024-3719,0,0,98817b00c300460b7ee17e28b90d655bc3286869de6cea5831a06059286a41a5,2024-05-17T02:40:05.100000
CVE-2024-3720,0,0,e90b9112f0b556a63557eff3929848b7a3fd36c353e364ec4c7371f42a8b366d,2024-05-17T02:40:05.197000 CVE-2024-3720,0,0,e90b9112f0b556a63557eff3929848b7a3fd36c353e364ec4c7371f42a8b366d,2024-05-17T02:40:05.197000
CVE-2024-3721,0,0,ec8dc4b0ad5d1d9ba11acb18015142f7d1715fd653f7ca2987e266e9c9e8ef01,2024-05-17T02:40:05.290000 CVE-2024-3721,0,0,ec8dc4b0ad5d1d9ba11acb18015142f7d1715fd653f7ca2987e266e9c9e8ef01,2024-05-17T02:40:05.290000
@ -250965,7 +250970,7 @@ CVE-2024-4033,0,0,9c08f15b4d3308634dd41e6afc3001fb3d24483554aaa58982323fa330ce65
CVE-2024-4034,0,0,fbbc9986eba42f39f504e14d62a8f5aac7c2749ef90d02af8ad89eb5ef4d1cca,2024-05-02T18:00:37.360000 CVE-2024-4034,0,0,fbbc9986eba42f39f504e14d62a8f5aac7c2749ef90d02af8ad89eb5ef4d1cca,2024-05-02T18:00:37.360000
CVE-2024-4035,0,0,02906ca1b496a2e42ac8610e4dfcaad284409da5fa1faeb0fe6ebb26c1e7ae4c,2024-04-25T13:18:02.660000 CVE-2024-4035,0,0,02906ca1b496a2e42ac8610e4dfcaad284409da5fa1faeb0fe6ebb26c1e7ae4c,2024-04-25T13:18:02.660000
CVE-2024-4036,0,0,a384819513ae72390ab82c2a7b5ea2fdbb1087d8a7f4dfd460e817b5f8f6a48f,2024-05-02T18:00:37.360000 CVE-2024-4036,0,0,a384819513ae72390ab82c2a7b5ea2fdbb1087d8a7f4dfd460e817b5f8f6a48f,2024-05-02T18:00:37.360000
CVE-2024-4037,0,0,9bddd01bd4a05928602359cee6ebeaabe577bed22b950be20a34d1328cf8012b,2024-05-24T09:15:08.873000 CVE-2024-4037,0,1,a80cdb655268e6d22b37e4b121efb01e7555aa19b68a91679e2e385d50ad36a0,2024-05-24T13:03:05.093000
CVE-2024-4038,0,0,bcee2fa5b2489836af4ab9c65caafd6eced0b2bbd0ce06913efc5e02957c745c,2024-05-14T16:11:39.510000 CVE-2024-4038,0,0,bcee2fa5b2489836af4ab9c65caafd6eced0b2bbd0ce06913efc5e02957c745c,2024-05-14T16:11:39.510000
CVE-2024-4039,0,0,cfdce9a10bb12a92a3dc5b97194d2925027fafc434caeab17aac25e26b57811c,2024-05-14T16:11:39.510000 CVE-2024-4039,0,0,cfdce9a10bb12a92a3dc5b97194d2925027fafc434caeab17aac25e26b57811c,2024-05-14T16:11:39.510000
CVE-2024-4040,0,0,aaa64890b494cdcdee2557c76769096315107a08c599010f9c12f5edc2e86037,2024-04-26T15:25:47.270000 CVE-2024-4040,0,0,aaa64890b494cdcdee2557c76769096315107a08c599010f9c12f5edc2e86037,2024-04-26T15:25:47.270000
@ -251169,7 +251174,7 @@ CVE-2024-4361,0,0,73ddfe2adce7d05432def4f47addf8f84eda9a30fdc3baa140fd6866bc8a2a
CVE-2024-4362,0,0,7f41e0c07e69c05f76665c888ba128e44dae52656bfc3d33cd11b51b4c09f3e6,2024-05-22T12:46:53.887000 CVE-2024-4362,0,0,7f41e0c07e69c05f76665c888ba128e44dae52656bfc3d33cd11b51b4c09f3e6,2024-05-22T12:46:53.887000
CVE-2024-4363,0,0,d30828b887305e475a68737a9c01556f9e261cb37bd7c595ea12b948125a2ae0,2024-05-15T16:40:19.330000 CVE-2024-4363,0,0,d30828b887305e475a68737a9c01556f9e261cb37bd7c595ea12b948125a2ae0,2024-05-15T16:40:19.330000
CVE-2024-4365,0,0,1dd74f69169778a99b3d1926254e01bee0638b05a899ef2e1df1f56792d6fd91,2024-05-24T01:15:30.977000 CVE-2024-4365,0,0,1dd74f69169778a99b3d1926254e01bee0638b05a899ef2e1df1f56792d6fd91,2024-05-24T01:15:30.977000
CVE-2024-4366,0,0,8af173e2731c6a7f720f3da015a94c394f53b29be115947509dad7b95f84bcdc,2024-05-24T08:15:09.680000 CVE-2024-4366,0,1,c04cea9d73579a737d5c3d200547b1e50e3a1d3ac8e5c0e3a1d88c878c2e9d6a,2024-05-24T13:03:05.093000
CVE-2024-4367,0,0,10c9ba4e2375d81f02eb3145704f99e298b4c446473517eea4810baa65f2c650,2024-05-14T19:17:55.627000 CVE-2024-4367,0,0,10c9ba4e2375d81f02eb3145704f99e298b4c446473517eea4810baa65f2c650,2024-05-14T19:17:55.627000
CVE-2024-4368,0,0,0ee02ebde276d817508f5495294b3429c463a1f4241660388e0c329992e72be6,2024-05-04T02:15:06.853000 CVE-2024-4368,0,0,0ee02ebde276d817508f5495294b3429c463a1f4241660388e0c329992e72be6,2024-05-04T02:15:06.853000
CVE-2024-4369,0,0,ab5992320463150d25768d540495632f3cea0e672e96fca10ae18e5fed17e7b3,2024-05-02T03:15:15.027000 CVE-2024-4369,0,0,ab5992320463150d25768d540495632f3cea0e672e96fca10ae18e5fed17e7b3,2024-05-02T03:15:15.027000
@ -251191,7 +251196,7 @@ CVE-2024-4399,0,0,fe21123427edd30f48d6d0588040c0a328291952c3ca476c440e2015af4e6c
CVE-2024-4400,0,0,620572dcee5d436c42b3994ee0aa67743b2a3990e6a672a60de9f72d6796092e,2024-05-16T13:03:05.353000 CVE-2024-4400,0,0,620572dcee5d436c42b3994ee0aa67743b2a3990e6a672a60de9f72d6796092e,2024-05-16T13:03:05.353000
CVE-2024-4405,0,0,c1f36263ba5841514dcf823ce87455ea826983b04201750caf275a7578687d86,2024-05-02T18:00:37.360000 CVE-2024-4405,0,0,c1f36263ba5841514dcf823ce87455ea826983b04201750caf275a7578687d86,2024-05-02T18:00:37.360000
CVE-2024-4406,0,0,24efbd07edfc7f89a7b1e694cb4faff02b108244486a9e17a0ab6aa554d1cf0e,2024-05-02T18:00:37.360000 CVE-2024-4406,0,0,24efbd07edfc7f89a7b1e694cb4faff02b108244486a9e17a0ab6aa554d1cf0e,2024-05-02T18:00:37.360000
CVE-2024-4409,0,0,17fcf25226f115ec79c6e2ec66d4eb1d34bcd020c5d1952c9573dc8ecbd7e01c,2024-05-24T03:15:08.340000 CVE-2024-4409,0,1,7dd623ac9467a0484d209647a6b8fb064b225334d3e5c23c1ee095e63ba20831,2024-05-24T13:03:11.993000
CVE-2024-4411,0,0,c7fa179581fd2f838a938c9431cc636dd9fa2af2bec9103de58ade770f105c65,2024-05-14T16:11:39.510000 CVE-2024-4411,0,0,c7fa179581fd2f838a938c9431cc636dd9fa2af2bec9103de58ade770f105c65,2024-05-14T16:11:39.510000
CVE-2024-4413,0,0,cca9f27cd31d87a0c2b601e673b97ef7118798e076ad06575846010a4eaaeef8,2024-05-14T16:11:39.510000 CVE-2024-4413,0,0,cca9f27cd31d87a0c2b601e673b97ef7118798e076ad06575846010a4eaaeef8,2024-05-14T16:11:39.510000
CVE-2024-4417,0,0,56d1a7db112c78a6a4f4098b6b92b23b4d7cd4e314ee26ae65a28dbbe4d8642e,2024-05-14T16:11:39.510000 CVE-2024-4417,0,0,56d1a7db112c78a6a4f4098b6b92b23b4d7cd4e314ee26ae65a28dbbe4d8642e,2024-05-14T16:11:39.510000
@ -251222,7 +251227,7 @@ CVE-2024-4449,0,0,5f461a2e161ed0d547590d7983036c434e3239f67f76e9397bc8163418dcb3
CVE-2024-4452,0,0,e48f0cdf03196e20de5e5f5902dc7c7b1a1024a4dcd852e9c13b4253f638fd6a,2024-05-21T16:54:26.047000 CVE-2024-4452,0,0,e48f0cdf03196e20de5e5f5902dc7c7b1a1024a4dcd852e9c13b4253f638fd6a,2024-05-21T16:54:26.047000
CVE-2024-4453,0,0,aebd4a287b29a7246d8e2a67911583d9b81d12cb6db5cffd77fbe0f84746d33a,2024-05-24T01:15:30.977000 CVE-2024-4453,0,0,aebd4a287b29a7246d8e2a67911583d9b81d12cb6db5cffd77fbe0f84746d33a,2024-05-24T01:15:30.977000
CVE-2024-4454,0,0,276969a8c39f4986d91d14c189ed84d9836df569540af26d861d37455376483e,2024-05-24T01:15:30.977000 CVE-2024-4454,0,0,276969a8c39f4986d91d14c189ed84d9836df569540af26d861d37455376483e,2024-05-24T01:15:30.977000
CVE-2024-4455,1,1,f0899de3343f4b058b793158aec5fbf09d80ec5db489dfcd717ea82b452c1ebf,2024-05-24T11:15:09.613000 CVE-2024-4455,0,1,c7d586019d2a720ebcca3beaadd71f1e3c83ec1b90aa8f7755475177dfa39010,2024-05-24T13:03:05.093000
CVE-2024-4456,0,0,43bdd543de001702ca45614b4a3579c52bfa7b188e5cb3e6b81f25f610f74e45,2024-05-08T13:15:00.690000 CVE-2024-4456,0,0,43bdd543de001702ca45614b4a3579c52bfa7b188e5cb3e6b81f25f610f74e45,2024-05-08T13:15:00.690000
CVE-2024-4461,0,0,ad05f4e37257e33f27f784f842f8dfa34f685ff06dd273bc6842a04c51c93bf6,2024-05-03T12:48:41.067000 CVE-2024-4461,0,0,ad05f4e37257e33f27f784f842f8dfa34f685ff06dd273bc6842a04c51c93bf6,2024-05-03T12:48:41.067000
CVE-2024-4463,0,0,aaa5b32073fcbc7160927d348961b4790302ca7b8c414e16cdb6cacefbfd98b3,2024-05-14T16:11:39.510000 CVE-2024-4463,0,0,aaa5b32073fcbc7160927d348961b4790302ca7b8c414e16cdb6cacefbfd98b3,2024-05-14T16:11:39.510000
@ -251232,8 +251237,8 @@ CVE-2024-4471,0,0,6c9bd6420a05ba387ffb41670e602f56b02ca7f7dc377deece8093fdfb2625
CVE-2024-4473,0,0,be8deb42c9d1905b301c3bfbae608b1551ce9395ac2fbbb337038c3a7eb347fa,2024-05-14T19:17:55.627000 CVE-2024-4473,0,0,be8deb42c9d1905b301c3bfbae608b1551ce9395ac2fbbb337038c3a7eb347fa,2024-05-14T19:17:55.627000
CVE-2024-4478,0,0,31a4a4c48861c0c170c939e3aa0b10661ec97e9653465707919926dbd3595183,2024-05-16T13:03:05.353000 CVE-2024-4478,0,0,31a4a4c48861c0c170c939e3aa0b10661ec97e9653465707919926dbd3595183,2024-05-16T13:03:05.353000
CVE-2024-4481,0,0,7ecf88f2a22a659849266bdc0bd40c464d195e3dafdf490c58869a301c87572b,2024-05-14T16:11:39.510000 CVE-2024-4481,0,0,7ecf88f2a22a659849266bdc0bd40c464d195e3dafdf490c58869a301c87572b,2024-05-14T16:11:39.510000
CVE-2024-4484,0,0,0e6d10ae60614bbe98513fc8ca09aa4acd80a1ee39e1ccb1def452f2e785ea28,2024-05-24T07:15:10.397000 CVE-2024-4484,0,1,72c4859b8727b60eeb9f8012483883c0571b4cb8b1cb2ce9a8b1f5e495641e3c,2024-05-24T13:03:05.093000
CVE-2024-4485,0,0,684f04eef081e68d4088066c89d7d1f89bd3d0ab1025bb3d7b0e383ba48cecfb,2024-05-24T07:15:10.700000 CVE-2024-4485,0,1,856a7368e5f121163f839e4b6c92a8e77de213c5eccf98592455e970e028d37d,2024-05-24T13:03:05.093000
CVE-2024-4486,0,0,a73f1b43309f4975525156a3992ab83bea82776aa822ddaaf973001731263834,2024-05-24T01:15:30.977000 CVE-2024-4486,0,0,a73f1b43309f4975525156a3992ab83bea82776aa822ddaaf973001731263834,2024-05-24T01:15:30.977000
CVE-2024-4487,0,0,50c826d9a63ca2cf478652fe406866ee1f801cabb050eb8635e58a006f7805c7,2024-05-14T16:11:39.510000 CVE-2024-4487,0,0,50c826d9a63ca2cf478652fe406866ee1f801cabb050eb8635e58a006f7805c7,2024-05-14T16:11:39.510000
CVE-2024-4490,0,0,e9307362c9e30effa78a675ee98be99c8b3d9c66fa0a2fa85d2752ca1d5cbd01,2024-05-14T16:11:39.510000 CVE-2024-4490,0,0,e9307362c9e30effa78a675ee98be99c8b3d9c66fa0a2fa85d2752ca1d5cbd01,2024-05-14T16:11:39.510000
@ -251277,7 +251282,7 @@ CVE-2024-4537,0,0,bc82aa6954c5799b0476dc279149a81ab940e42aa35e918500f89f663af922
CVE-2024-4538,0,0,dbb952ff57fc82a37e26bc4eac10a9f198285e190e0ce1d17eb40564657c4b33,2024-05-07T13:39:32.710000 CVE-2024-4538,0,0,dbb952ff57fc82a37e26bc4eac10a9f198285e190e0ce1d17eb40564657c4b33,2024-05-07T13:39:32.710000
CVE-2024-4539,0,0,83e8dd6ad2ba7f5df744ac27f19ba7dd20f88687370090b4e13c20c65e81aa4f,2024-05-14T16:11:39.510000 CVE-2024-4539,0,0,83e8dd6ad2ba7f5df744ac27f19ba7dd20f88687370090b4e13c20c65e81aa4f,2024-05-14T16:11:39.510000
CVE-2024-4542,0,0,d17f875757344f90ad0b6ea46d223a5444286908c9043b3fba1504d3883c4c6d,2024-05-16T14:15:08.980000 CVE-2024-4542,0,0,d17f875757344f90ad0b6ea46d223a5444286908c9043b3fba1504d3883c4c6d,2024-05-16T14:15:08.980000
CVE-2024-4544,0,0,ced6cb69757f5ba8c45427e412ecd77e6a83109cb40aff3fbe1a625845cbca2c,2024-05-24T04:15:08.670000 CVE-2024-4544,0,1,5a154bb8f5362adfa7d1d9ca8e07fcce2012291bc3a87e95a1b546af1c241c8c,2024-05-24T13:03:11.993000
CVE-2024-4545,0,0,6a8513e5f42227bdebff4b9eb7cd99ee2da82484e9d02165945026400c877f9c,2024-05-14T16:11:39.510000 CVE-2024-4545,0,0,6a8513e5f42227bdebff4b9eb7cd99ee2da82484e9d02165945026400c877f9c,2024-05-14T16:11:39.510000
CVE-2024-4546,0,0,3d8214b19328ce0698128d2541020c31eac589ba32f1eccefac58acec39f32be,2024-05-16T13:03:05.353000 CVE-2024-4546,0,0,3d8214b19328ce0698128d2541020c31eac589ba32f1eccefac58acec39f32be,2024-05-16T13:03:05.353000
CVE-2024-4547,0,0,6b600f363e41b63ee43a4b2365298fb38de96fd61b910d0724ca38ee29a8a8df,2024-05-06T16:00:59.253000 CVE-2024-4547,0,0,6b600f363e41b63ee43a4b2365298fb38de96fd61b910d0724ca38ee29a8a8df,2024-05-06T16:00:59.253000
@ -251560,7 +251565,7 @@ CVE-2024-5050,0,0,be8f3852fc1ee0c7c6f3d9ea8e9de609d6b3106a1d1264936ecc028a9ffecb
CVE-2024-5051,0,0,05278087a2e45b7f804d2ac5ded899aaa080da1c72c5fd177e38e1c11ec82cf6,2024-05-17T18:35:35.070000 CVE-2024-5051,0,0,05278087a2e45b7f804d2ac5ded899aaa080da1c72c5fd177e38e1c11ec82cf6,2024-05-17T18:35:35.070000
CVE-2024-5052,0,0,e91d117e4e1be9076555bb5304fe1acddd9d3634cfedff3f9a612b7def3416c1,2024-05-17T18:35:35.070000 CVE-2024-5052,0,0,e91d117e4e1be9076555bb5304fe1acddd9d3634cfedff3f9a612b7def3416c1,2024-05-17T18:35:35.070000
CVE-2024-5055,0,0,2c441c6b199abc8bb09d755706b6b6e6a0c1c1abcfa9df3dac57cd2dcc6091d3,2024-05-17T18:35:35.070000 CVE-2024-5055,0,0,2c441c6b199abc8bb09d755706b6b6e6a0c1c1abcfa9df3dac57cd2dcc6091d3,2024-05-17T18:35:35.070000
CVE-2024-5060,0,0,a684a8b33e246e735d1eac127a5350340720acb8fcdad824f275c19f4a0fe67a,2024-05-24T07:15:10.967000 CVE-2024-5060,0,1,908e82bd4ef2431179c104b39273fb8e5e968812815f848a9881f7577e0ff35b,2024-05-24T13:03:05.093000
CVE-2024-5063,0,0,58a3e73736caa423017f4765a458f0556a3988aff53fbc778cde0be207e8f3c0,2024-05-20T13:00:34.807000 CVE-2024-5063,0,0,58a3e73736caa423017f4765a458f0556a3988aff53fbc778cde0be207e8f3c0,2024-05-20T13:00:34.807000
CVE-2024-5064,0,0,278ab368b63cb29376cafc56d50f76e64a52eec9e724980377f85cc060f2e4ed,2024-05-20T13:00:34.807000 CVE-2024-5064,0,0,278ab368b63cb29376cafc56d50f76e64a52eec9e724980377f85cc060f2e4ed,2024-05-20T13:00:34.807000
CVE-2024-5065,0,0,61cda3c56538a884bedac0a7dbf902fc270042a859c82155c18493f3425ff365,2024-05-20T13:00:34.807000 CVE-2024-5065,0,0,61cda3c56538a884bedac0a7dbf902fc270042a859c82155c18493f3425ff365,2024-05-20T13:00:34.807000
@ -251605,7 +251610,7 @@ CVE-2024-5134,0,0,44a789f42f5a3c13ba63d82e5081c6abc6a3d25c1481cb7c53cfc6c6e78700
CVE-2024-5135,0,0,68cf9bdf9dec0a96d7d353e92a3ea23735e4dfab71f12aba03f45faad350b446,2024-05-20T13:00:04.957000 CVE-2024-5135,0,0,68cf9bdf9dec0a96d7d353e92a3ea23735e4dfab71f12aba03f45faad350b446,2024-05-20T13:00:04.957000
CVE-2024-5136,0,0,7e1453b58a6b8cdb889318a17e467bc4887e911147f2bbd5898eefe5c0fc0fa9,2024-05-20T13:00:04.957000 CVE-2024-5136,0,0,7e1453b58a6b8cdb889318a17e467bc4887e911147f2bbd5898eefe5c0fc0fa9,2024-05-20T13:00:04.957000
CVE-2024-5137,0,0,9ef636c571a0277ac03884ccb19a37de0ac2ceab7c0195ff8a91e587e734c012,2024-05-20T13:00:04.957000 CVE-2024-5137,0,0,9ef636c571a0277ac03884ccb19a37de0ac2ceab7c0195ff8a91e587e734c012,2024-05-20T13:00:04.957000
CVE-2024-5142,0,0,6cd1c095f50ef180f4b85f460cd1e80771396e1628f588562f607669516a5f66,2024-05-24T06:15:09.360000 CVE-2024-5142,0,1,9a7d794c7ee50b5ecd06d952c402fab37c046b0a6bb4d29e0c6b11e7df538957,2024-05-24T13:03:05.093000
CVE-2024-5143,0,0,6fb867f42f8c3ca7c9111a79dd4a6f4f194bf553f9063ef95dc380f05caaf7ce,2024-05-24T01:15:30.977000 CVE-2024-5143,0,0,6fb867f42f8c3ca7c9111a79dd4a6f4f194bf553f9063ef95dc380f05caaf7ce,2024-05-24T01:15:30.977000
CVE-2024-5145,0,0,779a53179978014855de22e41604c12feef2bb6901d36d253a629d55b7b44ab6,2024-05-21T12:37:59.687000 CVE-2024-5145,0,0,779a53179978014855de22e41604c12feef2bb6901d36d253a629d55b7b44ab6,2024-05-21T12:37:59.687000
CVE-2024-5147,0,0,f786cdd04c7e64ee05dc3a502a4fef5436dd8390bfdc70803ca93e4405d481a0,2024-05-22T12:46:53.887000 CVE-2024-5147,0,0,f786cdd04c7e64ee05dc3a502a4fef5436dd8390bfdc70803ca93e4405d481a0,2024-05-22T12:46:53.887000
@ -251624,7 +251629,7 @@ CVE-2024-5195,0,0,6f936c1a350f3aa4241c2485aebe122e7725b90fcb612ab0345f361f301112
CVE-2024-5196,0,0,5d3f231a43c31999680087469716ad4f3327a52b153d985ebb2cb490ce1591bb,2024-05-22T12:46:53.887000 CVE-2024-5196,0,0,5d3f231a43c31999680087469716ad4f3327a52b153d985ebb2cb490ce1591bb,2024-05-22T12:46:53.887000
CVE-2024-5201,0,0,81f846161e431f4061849f73f284a647933a16f2dae4eac954a714561d2b5ac6,2024-05-24T01:15:30.977000 CVE-2024-5201,0,0,81f846161e431f4061849f73f284a647933a16f2dae4eac954a714561d2b5ac6,2024-05-24T01:15:30.977000
CVE-2024-5202,0,0,1c05e157c3d14a467d804b0cdb60f2b737187a0758793a87fe251b0e49272bf0,2024-05-24T01:15:30.977000 CVE-2024-5202,0,0,1c05e157c3d14a467d804b0cdb60f2b737187a0758793a87fe251b0e49272bf0,2024-05-24T01:15:30.977000
CVE-2024-5205,0,0,900c244e6875237c51576d67e7b5c4eaf7ee8faf6afec490525818cf0bec77e8,2024-05-24T03:15:08.580000 CVE-2024-5205,0,1,cb36ec671fed104039900e6835467ad487e54c052bb39844cd3bc6979a6fc551,2024-05-24T13:03:11.993000
CVE-2024-5227,0,0,764fb0f16b4be474e014f5b57d633ec17b38b77286d8198d7e553896bd7bbab8,2024-05-24T01:15:30.977000 CVE-2024-5227,0,0,764fb0f16b4be474e014f5b57d633ec17b38b77286d8198d7e553896bd7bbab8,2024-05-24T01:15:30.977000
CVE-2024-5228,0,0,7fbc53a71d297b0e47d7a3142759157603a147b1ae1e469af28fd6a561b32095,2024-05-24T01:15:30.977000 CVE-2024-5228,0,0,7fbc53a71d297b0e47d7a3142759157603a147b1ae1e469af28fd6a561b32095,2024-05-24T01:15:30.977000
CVE-2024-5230,0,0,1dfdc1f75adf11a1631a2035669fccd144f45320efda1d74487ef2b2c2eb1408,2024-05-24T01:15:30.977000 CVE-2024-5230,0,0,1dfdc1f75adf11a1631a2035669fccd144f45320efda1d74487ef2b2c2eb1408,2024-05-24T01:15:30.977000
@ -251657,7 +251662,8 @@ CVE-2024-5296,0,0,80f6223bc1afd3f0e0b60c2e6a9ac760594c32bf81790f9a1c01f1f45efab7
CVE-2024-5297,0,0,a5b37125199df8170b6cacac7a53fb7ebe964005f8f04fbed90d5e13f439ef44,2024-05-24T01:15:30.977000 CVE-2024-5297,0,0,a5b37125199df8170b6cacac7a53fb7ebe964005f8f04fbed90d5e13f439ef44,2024-05-24T01:15:30.977000
CVE-2024-5298,0,0,f725059e3d8a3164232bce0b703a1bd3cdd51babd13996981eafdd135ebec89a,2024-05-24T01:15:30.977000 CVE-2024-5298,0,0,f725059e3d8a3164232bce0b703a1bd3cdd51babd13996981eafdd135ebec89a,2024-05-24T01:15:30.977000
CVE-2024-5299,0,0,1995cf7aaf2c0dc3e17475bd79c48936282524e051c2d7d06f964366204ee47a,2024-05-24T01:15:30.977000 CVE-2024-5299,0,0,1995cf7aaf2c0dc3e17475bd79c48936282524e051c2d7d06f964366204ee47a,2024-05-24T01:15:30.977000
CVE-2024-5310,0,0,44d513e726a68832e1717984f136330cb5b053bcc8dc2bf47ab16aae1dd4ab87,2024-05-24T09:15:09.337000 CVE-2024-5310,0,1,d0903509d064a4ce19dace1cca4fd5695bdd19cef98f852bea4e0d29ba2a63ae,2024-05-24T13:03:05.093000
CVE-2024-5312,1,1,f2061507461a2ac36e69839fc5eb7022f47f00ca10760a6bb25260197c716aff,2024-05-24T11:15:10.017000 CVE-2024-5312,0,1,082c9ac2393cf8e57fdd7df5653c9ea7402a5c66b3a64380a6e8455af1865a65,2024-05-24T13:03:05.093000
CVE-2024-5314,1,1,c04d750553339c4a02ce1deca8ecb536f1d71b43d242b264e139da0413d6fdad,2024-05-24T10:15:10.760000 CVE-2024-5314,0,1,a78e716fa392b8cb9869f7797ea197c1011e46ba4bc9c8c5da0073e7e12b93dd,2024-05-24T13:03:05.093000
CVE-2024-5315,1,1,645181abcab29a37f07691e1f8b9a19e6692d262b40a0742a6708329a0fd8218,2024-05-24T10:15:11.197000 CVE-2024-5315,0,1,17a737dcad42e55d9b51354513bcf6a79d52e58b0565b3a7bb2bcb2078a35d4b,2024-05-24T13:03:05.093000
CVE-2024-5318,1,1,1814b7dc0350fcf5944d4c6f89ecfd1e0434b22b2da251cf986bc6d5d0f63a2b,2024-05-24T13:15:09.717000

Can't render this file because it is too large.