From bb670f983871158d3ece988293d13ee38f0cee53 Mon Sep 17 00:00:00 2001 From: cad-safe-bot Date: Wed, 8 May 2024 16:03:27 +0000 Subject: [PATCH] Auto-Update: 2024-05-08T16:00:37.448803+00:00 --- CVE-2022/CVE-2022-218xx/CVE-2022-21819.json | 8 +- CVE-2024/CVE-2024-217xx/CVE-2024-21793.json | 55 ++++ CVE-2024/CVE-2024-248xx/CVE-2024-24833.json | 55 ++++ CVE-2024/CVE-2024-255xx/CVE-2024-25515.json | 20 ++ CVE-2024/CVE-2024-255xx/CVE-2024-25517.json | 20 ++ CVE-2024/CVE-2024-255xx/CVE-2024-25518.json | 20 ++ CVE-2024/CVE-2024-255xx/CVE-2024-25519.json | 20 ++ CVE-2024/CVE-2024-255xx/CVE-2024-25520.json | 20 ++ CVE-2024/CVE-2024-255xx/CVE-2024-25521.json | 20 ++ CVE-2024/CVE-2024-255xx/CVE-2024-25522.json | 20 ++ CVE-2024/CVE-2024-255xx/CVE-2024-25523.json | 20 ++ CVE-2024/CVE-2024-255xx/CVE-2024-25524.json | 20 ++ CVE-2024/CVE-2024-255xx/CVE-2024-25525.json | 20 ++ CVE-2024/CVE-2024-255xx/CVE-2024-25526.json | 20 ++ CVE-2024/CVE-2024-255xx/CVE-2024-25560.json | 55 ++++ CVE-2024/CVE-2024-260xx/CVE-2024-26026.json | 55 ++++ CVE-2024/CVE-2024-265xx/CVE-2024-26579.json | 32 +++ CVE-2024/CVE-2024-269xx/CVE-2024-26925.json | 6 +- CVE-2024/CVE-2024-272xx/CVE-2024-27202.json | 55 ++++ CVE-2024/CVE-2024-281xx/CVE-2024-28132.json | 55 ++++ CVE-2024/CVE-2024-288xx/CVE-2024-28883.json | 55 ++++ CVE-2024/CVE-2024-288xx/CVE-2024-28889.json | 55 ++++ CVE-2024/CVE-2024-304xx/CVE-2024-30459.json | 55 ++++ CVE-2024/CVE-2024-311xx/CVE-2024-31156.json | 55 ++++ CVE-2024/CVE-2024-312xx/CVE-2024-31270.json | 55 ++++ CVE-2024/CVE-2024-320xx/CVE-2024-32049.json | 55 ++++ CVE-2024/CVE-2024-321xx/CVE-2024-32113.json | 44 +++ CVE-2024/CVE-2024-327xx/CVE-2024-32761.json | 55 ++++ CVE-2024/CVE-2024-328xx/CVE-2024-32886.json | 79 ++++++ CVE-2024/CVE-2024-329xx/CVE-2024-32980.json | 59 ++++ CVE-2024/CVE-2024-335xx/CVE-2024-33573.json | 55 ++++ CVE-2024/CVE-2024-335xx/CVE-2024-33574.json | 55 ++++ CVE-2024/CVE-2024-336xx/CVE-2024-33604.json | 55 ++++ CVE-2024/CVE-2024-336xx/CVE-2024-33608.json | 55 ++++ CVE-2024/CVE-2024-336xx/CVE-2024-33612.json | 55 ++++ CVE-2024/CVE-2024-343xx/CVE-2024-34347.json | 59 ++++ CVE-2024/CVE-2024-39xx/CVE-2024-3951.json | 55 ++++ CVE-2024/CVE-2024-42xx/CVE-2024-4233.json | 63 +++++ CVE-2024/CVE-2024-46xx/CVE-2024-4649.json | 92 +++++++ CVE-2024/CVE-2024-46xx/CVE-2024-4650.json | 92 +++++++ CVE-2024/CVE-2024-46xx/CVE-2024-4651.json | 92 +++++++ CVE-2024/CVE-2024-46xx/CVE-2024-4652.json | 92 +++++++ CVE-2024/CVE-2024-46xx/CVE-2024-4653.json | 92 +++++++ CVE-2024/CVE-2024-46xx/CVE-2024-4654.json | 92 +++++++ README.md | 78 +++--- _state.csv | 288 +++++++++++--------- 46 files changed, 2361 insertions(+), 172 deletions(-) create mode 100644 CVE-2024/CVE-2024-217xx/CVE-2024-21793.json create mode 100644 CVE-2024/CVE-2024-248xx/CVE-2024-24833.json create mode 100644 CVE-2024/CVE-2024-255xx/CVE-2024-25515.json create mode 100644 CVE-2024/CVE-2024-255xx/CVE-2024-25517.json create mode 100644 CVE-2024/CVE-2024-255xx/CVE-2024-25518.json create mode 100644 CVE-2024/CVE-2024-255xx/CVE-2024-25519.json create mode 100644 CVE-2024/CVE-2024-255xx/CVE-2024-25520.json create mode 100644 CVE-2024/CVE-2024-255xx/CVE-2024-25521.json create mode 100644 CVE-2024/CVE-2024-255xx/CVE-2024-25522.json create mode 100644 CVE-2024/CVE-2024-255xx/CVE-2024-25523.json create mode 100644 CVE-2024/CVE-2024-255xx/CVE-2024-25524.json create mode 100644 CVE-2024/CVE-2024-255xx/CVE-2024-25525.json create mode 100644 CVE-2024/CVE-2024-255xx/CVE-2024-25526.json create mode 100644 CVE-2024/CVE-2024-255xx/CVE-2024-25560.json create mode 100644 CVE-2024/CVE-2024-260xx/CVE-2024-26026.json create mode 100644 CVE-2024/CVE-2024-265xx/CVE-2024-26579.json create mode 100644 CVE-2024/CVE-2024-272xx/CVE-2024-27202.json create mode 100644 CVE-2024/CVE-2024-281xx/CVE-2024-28132.json create mode 100644 CVE-2024/CVE-2024-288xx/CVE-2024-28883.json create mode 100644 CVE-2024/CVE-2024-288xx/CVE-2024-28889.json create mode 100644 CVE-2024/CVE-2024-304xx/CVE-2024-30459.json create mode 100644 CVE-2024/CVE-2024-311xx/CVE-2024-31156.json create mode 100644 CVE-2024/CVE-2024-312xx/CVE-2024-31270.json create mode 100644 CVE-2024/CVE-2024-320xx/CVE-2024-32049.json create mode 100644 CVE-2024/CVE-2024-321xx/CVE-2024-32113.json create mode 100644 CVE-2024/CVE-2024-327xx/CVE-2024-32761.json create mode 100644 CVE-2024/CVE-2024-328xx/CVE-2024-32886.json create mode 100644 CVE-2024/CVE-2024-329xx/CVE-2024-32980.json create mode 100644 CVE-2024/CVE-2024-335xx/CVE-2024-33573.json create mode 100644 CVE-2024/CVE-2024-335xx/CVE-2024-33574.json create mode 100644 CVE-2024/CVE-2024-336xx/CVE-2024-33604.json create mode 100644 CVE-2024/CVE-2024-336xx/CVE-2024-33608.json create mode 100644 CVE-2024/CVE-2024-336xx/CVE-2024-33612.json create mode 100644 CVE-2024/CVE-2024-343xx/CVE-2024-34347.json create mode 100644 CVE-2024/CVE-2024-39xx/CVE-2024-3951.json create mode 100644 CVE-2024/CVE-2024-42xx/CVE-2024-4233.json create mode 100644 CVE-2024/CVE-2024-46xx/CVE-2024-4649.json create mode 100644 CVE-2024/CVE-2024-46xx/CVE-2024-4650.json create mode 100644 CVE-2024/CVE-2024-46xx/CVE-2024-4651.json create mode 100644 CVE-2024/CVE-2024-46xx/CVE-2024-4652.json create mode 100644 CVE-2024/CVE-2024-46xx/CVE-2024-4653.json create mode 100644 CVE-2024/CVE-2024-46xx/CVE-2024-4654.json diff --git a/CVE-2022/CVE-2022-218xx/CVE-2022-21819.json b/CVE-2022/CVE-2022-218xx/CVE-2022-21819.json index 3fa5879df94..a18e2a22fca 100644 --- a/CVE-2022/CVE-2022-218xx/CVE-2022-21819.json +++ b/CVE-2022/CVE-2022-218xx/CVE-2022-21819.json @@ -2,8 +2,8 @@ "id": "CVE-2022-21819", "sourceIdentifier": "psirt@nvidia.com", "published": "2022-03-11T14:15:07.700", - "lastModified": "2022-03-22T14:29:49.827", - "vulnStatus": "Analyzed", + "lastModified": "2024-05-08T14:15:07.550", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -148,6 +148,10 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "https://www.thegoodpenguin.co.uk/blog/pcie-dma-attack-against-a-secured-jetson-nano-cve-2022-21819/", + "source": "psirt@nvidia.com" } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-217xx/CVE-2024-21793.json b/CVE-2024/CVE-2024-217xx/CVE-2024-21793.json new file mode 100644 index 00000000000..20b4f364324 --- /dev/null +++ b/CVE-2024/CVE-2024-217xx/CVE-2024-21793.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2024-21793", + "sourceIdentifier": "f5sirt@f5.com", + "published": "2024-05-08T15:15:07.557", + "lastModified": "2024-05-08T15:15:07.557", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "\nAn OData injection vulnerability exists in the BIG-IP Next Central Manager API (URI).\u00a0 Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "f5sirt@f5.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "f5sirt@f5.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-200" + } + ] + } + ], + "references": [ + { + "url": "https://my.f5.com/manage/s/article/K000138732", + "source": "f5sirt@f5.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-248xx/CVE-2024-24833.json b/CVE-2024/CVE-2024-248xx/CVE-2024-24833.json new file mode 100644 index 00000000000..48cda686543 --- /dev/null +++ b/CVE-2024/CVE-2024-248xx/CVE-2024-24833.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2024-24833", + "sourceIdentifier": "audit@patchstack.com", + "published": "2024-05-08T14:15:07.730", + "lastModified": "2024-05-08T14:15:07.730", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Missing Authorization vulnerability in Leevio Happy Addons for Elementor.This issue affects Happy Addons for Elementor: from n/a through 3.10.1.\n\n" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 4.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/vulnerability/happy-elementor-addons/wordpress-happy-addons-for-elementor-plugin-3-10-1-broken-access-control-on-post-clone-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-255xx/CVE-2024-25515.json b/CVE-2024/CVE-2024-255xx/CVE-2024-25515.json new file mode 100644 index 00000000000..87beb0c14b2 --- /dev/null +++ b/CVE-2024/CVE-2024-255xx/CVE-2024-25515.json @@ -0,0 +1,20 @@ +{ + "id": "CVE-2024-25515", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-05-08T15:15:07.780", + "lastModified": "2024-05-08T15:15:07.780", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "RuvarOA v6.01 and v12.01 were discovered to contain a SQL injection vulnerability via the sys_file_storage_id parameter at /WorkFlow/wf_work_finish_file_down.aspx." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://gist.github.com/Mr-xn/bc8261a5c3e35a72768723acf1da358d#wf_work_finish_file_downaspx", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-255xx/CVE-2024-25517.json b/CVE-2024/CVE-2024-255xx/CVE-2024-25517.json new file mode 100644 index 00000000000..5eb3bf828de --- /dev/null +++ b/CVE-2024/CVE-2024-255xx/CVE-2024-25517.json @@ -0,0 +1,20 @@ +{ + "id": "CVE-2024-25517", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-05-08T15:15:07.843", + "lastModified": "2024-05-08T15:15:07.843", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "RuvarOA v6.01 and v12.01 were discovered to contain a SQL injection vulnerability via the tbTable argument at /WebUtility/MF.aspx." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://gist.github.com/Mr-xn/bc8261a5c3e35a72768723acf1da358d#mfaspx", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-255xx/CVE-2024-25518.json b/CVE-2024/CVE-2024-255xx/CVE-2024-25518.json new file mode 100644 index 00000000000..311906547a0 --- /dev/null +++ b/CVE-2024/CVE-2024-255xx/CVE-2024-25518.json @@ -0,0 +1,20 @@ +{ + "id": "CVE-2024-25518", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-05-08T15:15:07.903", + "lastModified": "2024-05-08T15:15:07.903", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "RuvarOA v6.01 and v12.01 were discovered to contain a SQL injection vulnerability via the template_id parameter at /WorkFlow/wf_get_fields_approve.aspx." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://gist.github.com/Mr-xn/bc8261a5c3e35a72768723acf1da358d#wf_get_fields_approveaspx", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-255xx/CVE-2024-25519.json b/CVE-2024/CVE-2024-255xx/CVE-2024-25519.json new file mode 100644 index 00000000000..17d166bfc00 --- /dev/null +++ b/CVE-2024/CVE-2024-255xx/CVE-2024-25519.json @@ -0,0 +1,20 @@ +{ + "id": "CVE-2024-25519", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-05-08T15:15:07.960", + "lastModified": "2024-05-08T15:15:07.960", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "RuvarOA v6.01 and v12.01 were discovered to contain a SQL injection vulnerability via the idlist parameter at /WorkFlow/wf_work_print.aspx." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://gist.github.com/Mr-xn/bc8261a5c3e35a72768723acf1da358d#wf_work_printaspx", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-255xx/CVE-2024-25520.json b/CVE-2024/CVE-2024-255xx/CVE-2024-25520.json new file mode 100644 index 00000000000..fcd03f4a351 --- /dev/null +++ b/CVE-2024/CVE-2024-255xx/CVE-2024-25520.json @@ -0,0 +1,20 @@ +{ + "id": "CVE-2024-25520", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-05-08T15:15:08.017", + "lastModified": "2024-05-08T15:15:08.017", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "RuvarOA v6.01 and v12.01 were discovered to contain a SQL injection vulnerability via the id parameter at /SysManage/sys_blogtemplate_new.aspx." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://gist.github.com/Mr-xn/bc8261a5c3e35a72768723acf1da358d#sys_blogtemplate_newaspx", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-255xx/CVE-2024-25521.json b/CVE-2024/CVE-2024-255xx/CVE-2024-25521.json new file mode 100644 index 00000000000..f2caaf369a8 --- /dev/null +++ b/CVE-2024/CVE-2024-255xx/CVE-2024-25521.json @@ -0,0 +1,20 @@ +{ + "id": "CVE-2024-25521", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-05-08T15:15:08.073", + "lastModified": "2024-05-08T15:15:08.073", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "RuvarOA v6.01 and v12.01 were discovered to contain a SQL injection vulnerability via the txt_keyword parameter at get_company.aspx." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://gist.github.com/Mr-xn/bc8261a5c3e35a72768723acf1da358d#get_companyaspx", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-255xx/CVE-2024-25522.json b/CVE-2024/CVE-2024-255xx/CVE-2024-25522.json new file mode 100644 index 00000000000..4aa5be6f8ab --- /dev/null +++ b/CVE-2024/CVE-2024-255xx/CVE-2024-25522.json @@ -0,0 +1,20 @@ +{ + "id": "CVE-2024-25522", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-05-08T15:15:08.130", + "lastModified": "2024-05-08T15:15:08.130", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "RuvarOA v6.01 and v12.01 were discovered to contain a SQL injection vulnerability via the office_missive_id parameter at /WorkFlow/wf_work_form_save.aspx." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://gist.github.com/Mr-xn/bc8261a5c3e35a72768723acf1da358d#wf_work_form_saveaspx", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-255xx/CVE-2024-25523.json b/CVE-2024/CVE-2024-255xx/CVE-2024-25523.json new file mode 100644 index 00000000000..7e7a65e4ec9 --- /dev/null +++ b/CVE-2024/CVE-2024-255xx/CVE-2024-25523.json @@ -0,0 +1,20 @@ +{ + "id": "CVE-2024-25523", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-05-08T15:15:08.183", + "lastModified": "2024-05-08T15:15:08.183", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "RuvarOA v6.01 and v12.01 were discovered to contain a SQL injection vulnerability via the file_id parameter at /filemanage/file_memo.aspx." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://gist.github.com/Mr-xn/bc8261a5c3e35a72768723acf1da358d#file_memoaspx", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-255xx/CVE-2024-25524.json b/CVE-2024/CVE-2024-255xx/CVE-2024-25524.json new file mode 100644 index 00000000000..5220e35d9e8 --- /dev/null +++ b/CVE-2024/CVE-2024-255xx/CVE-2024-25524.json @@ -0,0 +1,20 @@ +{ + "id": "CVE-2024-25524", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-05-08T15:15:08.253", + "lastModified": "2024-05-08T15:15:08.253", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "RuvarOA v6.01 and v12.01 were discovered to contain a SQL injection vulnerability via the sys_file_storage_id parameter at /WorkPlan/WorkPlanAttachDownLoad.aspx." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://gist.github.com/Mr-xn/bc8261a5c3e35a72768723acf1da358d#workplanattachdownloadaspx", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-255xx/CVE-2024-25525.json b/CVE-2024/CVE-2024-255xx/CVE-2024-25525.json new file mode 100644 index 00000000000..d29d47c46ee --- /dev/null +++ b/CVE-2024/CVE-2024-255xx/CVE-2024-25525.json @@ -0,0 +1,20 @@ +{ + "id": "CVE-2024-25525", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-05-08T15:15:08.310", + "lastModified": "2024-05-08T15:15:08.310", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "RuvarOA v6.01 and v12.01 were discovered to contain a SQL injection vulnerability via the filename parameter at /WorkFlow/OfficeFileDownload.aspx." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://gist.github.com/Mr-xn/bc8261a5c3e35a72768723acf1da358d#officefiledownloadaspx", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-255xx/CVE-2024-25526.json b/CVE-2024/CVE-2024-255xx/CVE-2024-25526.json new file mode 100644 index 00000000000..d6f44ab4206 --- /dev/null +++ b/CVE-2024/CVE-2024-255xx/CVE-2024-25526.json @@ -0,0 +1,20 @@ +{ + "id": "CVE-2024-25526", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-05-08T15:15:08.367", + "lastModified": "2024-05-08T15:15:08.367", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "RuvarOA v6.01 and v12.01 were discovered to contain a SQL injection vulnerability via the project_id parameter at /ProjectManage/pm_gatt_inc.aspx." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://gist.github.com/Mr-xn/bc8261a5c3e35a72768723acf1da358d#pm_gatt_incaspx", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-255xx/CVE-2024-25560.json b/CVE-2024/CVE-2024-255xx/CVE-2024-25560.json new file mode 100644 index 00000000000..e2d6bd879d9 --- /dev/null +++ b/CVE-2024/CVE-2024-255xx/CVE-2024-25560.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2024-25560", + "sourceIdentifier": "f5sirt@f5.com", + "published": "2024-05-08T15:15:08.423", + "lastModified": "2024-05-08T15:15:08.423", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "\nWhen BIG-IP AFM is licensed and provisioned, undisclosed DNS traffic can cause the Traffic Management Microkernel (TMM) to terminate.\n\n \n\n\nNote: Software versions which have reached End of Technical Support (EoTS) are not evaluated." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "f5sirt@f5.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "f5sirt@f5.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-476" + } + ] + } + ], + "references": [ + { + "url": "https://my.f5.com/manage/s/article/K000139037", + "source": "f5sirt@f5.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-260xx/CVE-2024-26026.json b/CVE-2024/CVE-2024-260xx/CVE-2024-26026.json new file mode 100644 index 00000000000..082057d959f --- /dev/null +++ b/CVE-2024/CVE-2024-260xx/CVE-2024-26026.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2024-26026", + "sourceIdentifier": "f5sirt@f5.com", + "published": "2024-05-08T15:15:08.623", + "lastModified": "2024-05-08T15:15:08.623", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "\n\n\nAn SQL injection vulnerability exists in the BIG-IP Next Central Manager API (URI).\u00a0 Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated\n\n" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "f5sirt@f5.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "f5sirt@f5.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-200" + } + ] + } + ], + "references": [ + { + "url": "https://my.f5.com/manage/s/article/K000138733", + "source": "f5sirt@f5.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-265xx/CVE-2024-26579.json b/CVE-2024/CVE-2024-265xx/CVE-2024-26579.json new file mode 100644 index 00000000000..dc6b5100037 --- /dev/null +++ b/CVE-2024/CVE-2024-265xx/CVE-2024-26579.json @@ -0,0 +1,32 @@ +{ + "id": "CVE-2024-26579", + "sourceIdentifier": "security@apache.org", + "published": "2024-05-08T15:15:08.817", + "lastModified": "2024-05-08T15:15:08.817", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Deserialization of Untrusted Data vulnerability in Apache InLong.This issue affects Apache InLong: from 1.7.0 through 1.11.0,\u00a0\n\n the attackers can bypass using malicious parameters.\n\nUsers are advised to upgrade to Apache InLong's 1.12.0 or cherry-pick [1], [2] to solve it.\n\n[1] https://github.com/apache/inlong/pull/9694 \n\n[2]\u00a0 https://github.com/apache/inlong/pull/9707 \n\n" + } + ], + "metrics": {}, + "weaknesses": [ + { + "source": "security@apache.org", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-502" + } + ] + } + ], + "references": [ + { + "url": "https://lists.apache.org/thread/d2hndtvh6bll4pkl91o2oqxyynhr54k3", + "source": "security@apache.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-269xx/CVE-2024-26925.json b/CVE-2024/CVE-2024-269xx/CVE-2024-26925.json index c1d16bad9c8..c65c0988bdd 100644 --- a/CVE-2024/CVE-2024-269xx/CVE-2024-26925.json +++ b/CVE-2024/CVE-2024-269xx/CVE-2024-26925.json @@ -2,7 +2,7 @@ "id": "CVE-2024-26925", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-04-25T06:15:57.590", - "lastModified": "2024-05-07T18:15:08.287", + "lastModified": "2024-05-08T15:15:08.917", "vulnStatus": "Awaiting Analysis", "descriptions": [ { @@ -20,6 +20,10 @@ "url": "http://www.openwall.com/lists/oss-security/2024/05/07/6", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" }, + { + "url": "http://www.openwall.com/lists/oss-security/2024/05/08/2", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, { "url": "https://git.kernel.org/stable/c/0d459e2ffb541841714839e8228b845458ed3b27", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" diff --git a/CVE-2024/CVE-2024-272xx/CVE-2024-27202.json b/CVE-2024/CVE-2024-272xx/CVE-2024-27202.json new file mode 100644 index 00000000000..7e608a74342 --- /dev/null +++ b/CVE-2024/CVE-2024-272xx/CVE-2024-27202.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2024-27202", + "sourceIdentifier": "f5sirt@f5.com", + "published": "2024-05-08T15:15:08.980", + "lastModified": "2024-05-08T15:15:08.980", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "\nA DOM-based cross-site scripting (XSS) vulnerability exists in an undisclosed page of the BIG-IP Configuration utility that allows an attacker to run JavaScript in the context of the currently logged-in user.\u00a0 Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "f5sirt@f5.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 4.7, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.6, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "f5sirt@f5.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://my.f5.com/manage/s/article/K000138520", + "source": "f5sirt@f5.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-281xx/CVE-2024-28132.json b/CVE-2024/CVE-2024-281xx/CVE-2024-28132.json new file mode 100644 index 00000000000..30554b9971d --- /dev/null +++ b/CVE-2024/CVE-2024-281xx/CVE-2024-28132.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2024-28132", + "sourceIdentifier": "f5sirt@f5.com", + "published": "2024-05-08T15:15:09.183", + "lastModified": "2024-05-08T15:15:09.183", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "\nExposure of Sensitive Information vulnerability exists in the GSLB container, which may allow an authenticated attacker with local access to view sensitive information.\u00a0\u00a0Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.\n\n\n\n" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "f5sirt@f5.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 4.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 0.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "f5sirt@f5.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-922" + } + ] + } + ], + "references": [ + { + "url": "https://my.f5.com/manage/s/article/K000138913", + "source": "f5sirt@f5.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-288xx/CVE-2024-28883.json b/CVE-2024/CVE-2024-288xx/CVE-2024-28883.json new file mode 100644 index 00000000000..833d10cabd7 --- /dev/null +++ b/CVE-2024/CVE-2024-288xx/CVE-2024-28883.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2024-28883", + "sourceIdentifier": "f5sirt@f5.com", + "published": "2024-05-08T15:15:09.380", + "lastModified": "2024-05-08T15:15:09.380", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "An origin validation vulnerability exists in \n\nBIG-IP APM browser network access VPN client \n\n\n\n for Windows, macOS and Linux which may allow an attacker to bypass F5 endpoint inspection. \n\n\nNote: Software versions which have reached End of Technical Support (EoTS) are not evaluated." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "f5sirt@f5.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 7.4, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.2, + "impactScore": 5.2 + } + ] + }, + "weaknesses": [ + { + "source": "f5sirt@f5.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-346" + } + ] + } + ], + "references": [ + { + "url": "https://my.f5.com/manage/s/article/K000138744", + "source": "f5sirt@f5.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-288xx/CVE-2024-28889.json b/CVE-2024/CVE-2024-288xx/CVE-2024-28889.json new file mode 100644 index 00000000000..489fe7d5fe5 --- /dev/null +++ b/CVE-2024/CVE-2024-288xx/CVE-2024-28889.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2024-28889", + "sourceIdentifier": "f5sirt@f5.com", + "published": "2024-05-08T15:15:09.590", + "lastModified": "2024-05-08T15:15:09.590", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "\n\n\nWhen an SSL profile with alert timeout is configured with a non-default value on a virtual server, undisclosed traffic along with conditions beyond the attacker's control can cause the Traffic Management Microkernel (TMM) to terminate.\u00a0\u00a0Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "f5sirt@f5.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 5.9, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.2, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "f5sirt@f5.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-825" + } + ] + } + ], + "references": [ + { + "url": "https://my.f5.com/manage/s/article/K000138912", + "source": "f5sirt@f5.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-304xx/CVE-2024-30459.json b/CVE-2024/CVE-2024-304xx/CVE-2024-30459.json new file mode 100644 index 00000000000..d57c05812f6 --- /dev/null +++ b/CVE-2024/CVE-2024-304xx/CVE-2024-30459.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2024-30459", + "sourceIdentifier": "audit@patchstack.com", + "published": "2024-05-08T14:15:07.923", + "lastModified": "2024-05-08T14:15:07.923", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Missing Authorization vulnerability in AIpost AI WP Writer.This issue affects AI WP Writer: from n/a through 3.6.5.\n\n" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/vulnerability/ai-wp-writer/wordpress-ai-wp-writer-plugin-3-6-5-broken-access-control-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-311xx/CVE-2024-31156.json b/CVE-2024/CVE-2024-311xx/CVE-2024-31156.json new file mode 100644 index 00000000000..18ceb015875 --- /dev/null +++ b/CVE-2024/CVE-2024-311xx/CVE-2024-31156.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2024-31156", + "sourceIdentifier": "f5sirt@f5.com", + "published": "2024-05-08T15:15:09.790", + "lastModified": "2024-05-08T15:15:09.790", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "\nA stored cross-site scripting (XSS) vulnerability exists in an undisclosed page of the BIG-IP Configuration utility that allows an attacker to run JavaScript in the context of the currently logged-in user.\u00a0 Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.\n\n\n" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "f5sirt@f5.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.0, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.1, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "f5sirt@f5.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://my.f5.com/manage/s/article/K000138636", + "source": "f5sirt@f5.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-312xx/CVE-2024-31270.json b/CVE-2024/CVE-2024-312xx/CVE-2024-31270.json new file mode 100644 index 00000000000..1cff9e72aca --- /dev/null +++ b/CVE-2024/CVE-2024-312xx/CVE-2024-31270.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2024-31270", + "sourceIdentifier": "audit@patchstack.com", + "published": "2024-05-08T14:15:08.117", + "lastModified": "2024-05-08T14:15:08.117", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Missing Authorization vulnerability in Repute InfoSystems ARForms Form Builder.This issue affects ARForms Form Builder: from n/a through 1.6.1.\n\n" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "HIGH", + "availabilityImpact": "LOW", + "baseScore": 7.6, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 4.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/vulnerability/arforms-form-builder/wordpress-arforms-form-builder-plugin-1-6-1-broken-access-control-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-320xx/CVE-2024-32049.json b/CVE-2024/CVE-2024-320xx/CVE-2024-32049.json new file mode 100644 index 00000000000..330e36d0a4d --- /dev/null +++ b/CVE-2024/CVE-2024-320xx/CVE-2024-32049.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2024-32049", + "sourceIdentifier": "f5sirt@f5.com", + "published": "2024-05-08T15:15:09.987", + "lastModified": "2024-05-08T15:15:09.987", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "BIG-IP Next Central Manager (CM) may allow an unauthenticated, remote attacker to obtain the BIG-IP Next LTM/WAF instance credentials.\u00a0\n\nNote: Software versions which have reached End of Technical Support (EoTS) are not evaluated.\n" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "f5sirt@f5.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 7.4, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.2, + "impactScore": 5.2 + } + ] + }, + "weaknesses": [ + { + "source": "f5sirt@f5.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-300" + } + ] + } + ], + "references": [ + { + "url": "https://my.f5.com/manage/s/article/K000138634", + "source": "f5sirt@f5.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-321xx/CVE-2024-32113.json b/CVE-2024/CVE-2024-321xx/CVE-2024-32113.json new file mode 100644 index 00000000000..a9eb90db688 --- /dev/null +++ b/CVE-2024/CVE-2024-321xx/CVE-2024-32113.json @@ -0,0 +1,44 @@ +{ + "id": "CVE-2024-32113", + "sourceIdentifier": "security@apache.org", + "published": "2024-05-08T15:15:10.227", + "lastModified": "2024-05-08T15:15:10.227", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in Apache OFBiz.This issue affects Apache OFBiz: before 18.12.13.\n\nUsers are recommended to upgrade to version 18.12.13, which fixes the issue.\n\n" + } + ], + "metrics": {}, + "weaknesses": [ + { + "source": "security@apache.org", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-22" + } + ] + } + ], + "references": [ + { + "url": "https://issues.apache.org/jira/browse/OFBIZ-13006", + "source": "security@apache.org" + }, + { + "url": "https://lists.apache.org/thread/w6s60okgkxp2th1sr8vx0ndmgk68fqrd", + "source": "security@apache.org" + }, + { + "url": "https://ofbiz.apache.org/download.html", + "source": "security@apache.org" + }, + { + "url": "https://ofbiz.apache.org/security.html", + "source": "security@apache.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-327xx/CVE-2024-32761.json b/CVE-2024/CVE-2024-327xx/CVE-2024-32761.json new file mode 100644 index 00000000000..74f6d22cbc0 --- /dev/null +++ b/CVE-2024/CVE-2024-327xx/CVE-2024-32761.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2024-32761", + "sourceIdentifier": "f5sirt@f5.com", + "published": "2024-05-08T15:15:10.330", + "lastModified": "2024-05-08T15:15:10.330", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "\nUnder certain conditions, a potential data leak may occur in the Traffic Management Microkernels (TMMs) of BIG-IP tenants running on VELOS and rSeries platforms. However, this issue cannot be exploited by an attacker because it is not consistently reproducible and is beyond an attacker's control.\u00a0 Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "f5sirt@f5.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 6.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.2, + "impactScore": 4.2 + } + ] + }, + "weaknesses": [ + { + "source": "f5sirt@f5.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-119" + } + ] + } + ], + "references": [ + { + "url": "https://my.f5.com/manage/s/article/K000139217", + "source": "f5sirt@f5.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-328xx/CVE-2024-32886.json b/CVE-2024/CVE-2024-328xx/CVE-2024-32886.json new file mode 100644 index 00000000000..fb1be7701c2 --- /dev/null +++ b/CVE-2024/CVE-2024-328xx/CVE-2024-32886.json @@ -0,0 +1,79 @@ +{ + "id": "CVE-2024-32886", + "sourceIdentifier": "security-advisories@github.com", + "published": "2024-05-08T14:15:08.310", + "lastModified": "2024-05-08T14:15:08.310", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Vitess is a database clustering system for horizontal scaling of MySQL. When executing the following simple query, the `vtgate` will go into an endless loop that also keeps consuming memory and eventually will run out of memory. This vulnerability is fixed in 19.0.4, 18.0.5, and 17.0.7." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 4.9, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.2, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-835" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/vitessio/vitess/blob/8f6cfaaa643a08dc111395a75a2d250ee746cfa8/go/mysql/collations/charset/convert.go#L73-L79", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/vitessio/vitess/blob/8f6cfaaa643a08dc111395a75a2d250ee746cfa8/go/mysql/collations/charset/unicode/utf16.go#L69-L71", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/vitessio/vitess/commit/2fd5ba1dbf6e9b32fdfdaf869d130066b1b5c0df", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/vitessio/vitess/commit/9df4b66550e46b5d7079e21ed0e1b0f49f92b055", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/vitessio/vitess/commit/c46dc5b6a4329a10589ca928392218d96031ac8d", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/vitessio/vitess/commit/d438adf7e34a6cf00fe441db80842ec669a99202", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/vitessio/vitess/security/advisories/GHSA-649x-hxfx-57j2", + "source": "security-advisories@github.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-329xx/CVE-2024-32980.json b/CVE-2024/CVE-2024-329xx/CVE-2024-32980.json new file mode 100644 index 00000000000..4b03f8fd604 --- /dev/null +++ b/CVE-2024/CVE-2024-329xx/CVE-2024-32980.json @@ -0,0 +1,59 @@ +{ + "id": "CVE-2024-32980", + "sourceIdentifier": "security-advisories@github.com", + "published": "2024-05-08T15:15:10.530", + "lastModified": "2024-05-08T15:15:10.530", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Spin is the developer tool for building and running serverless applications powered by WebAssembly. Prior to 2.4.3, some specifically configured Spin applications that use `self` requests without a specified URL authority can be induced to make requests to arbitrary hosts via the `Host` HTTP header. The following conditions need to be met for an application to be vulnerable: 1. The environment Spin is deployed in routes requests to the Spin runtime based on the request URL instead of the `Host` header, and leaves the `Host` header set to its original value; 2. The Spin application's component handling the incoming request is configured with an `allow_outbound_hosts` list containing `\"self\"`; and 3. In reaction to an incoming request, the component makes an outbound request whose URL doesn't include the hostname/port. Spin 2.4.3 has been released to fix this issue." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 9.1, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.2 + } + ] + }, + "weaknesses": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-610" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/fermyon/spin/commit/b3db535c9edb72278d4db3a201f0ed214e561354", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/fermyon/spin/security/advisories/GHSA-f3h7-gpjj-wcvh", + "source": "security-advisories@github.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-335xx/CVE-2024-33573.json b/CVE-2024/CVE-2024-335xx/CVE-2024-33573.json new file mode 100644 index 00000000000..8d98b19e8da --- /dev/null +++ b/CVE-2024/CVE-2024-335xx/CVE-2024-33573.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2024-33573", + "sourceIdentifier": "audit@patchstack.com", + "published": "2024-05-08T14:15:08.523", + "lastModified": "2024-05-08T14:15:08.523", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Missing Authorization vulnerability in EPROLO EPROLO Dropshipping.This issue affects EPROLO Dropshipping: from n/a through 1.7.1.\n\n" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "LOW", + "baseScore": 4.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/vulnerability/eprolo-dropshipping/wordpress-eprolo-dropshipping-plugin-1-7-1-broken-access-control-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-335xx/CVE-2024-33574.json b/CVE-2024/CVE-2024-335xx/CVE-2024-33574.json new file mode 100644 index 00000000000..629c9dbc68e --- /dev/null +++ b/CVE-2024/CVE-2024-335xx/CVE-2024-33574.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2024-33574", + "sourceIdentifier": "audit@patchstack.com", + "published": "2024-05-08T14:15:08.713", + "lastModified": "2024-05-08T14:15:08.713", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Missing Authorization vulnerability in appsbd Vitepos.This issue affects Vitepos: from n/a through 3.0.1.\n\n" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "LOW", + "baseScore": 4.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/vulnerability/vitepos-lite/wordpress-vitepos-plugin-3-0-1-broken-access-control-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-336xx/CVE-2024-33604.json b/CVE-2024/CVE-2024-336xx/CVE-2024-33604.json new file mode 100644 index 00000000000..a3ac78d108a --- /dev/null +++ b/CVE-2024/CVE-2024-336xx/CVE-2024-33604.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2024-33604", + "sourceIdentifier": "f5sirt@f5.com", + "published": "2024-05-08T15:15:10.733", + "lastModified": "2024-05-08T15:15:10.733", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "\nA reflected cross-site scripting (XSS) vulnerability exist in undisclosed page of the BIG-IP Configuration utility that allows an attacker to run JavaScript in the context of the currently logged-in user.\u00a0 Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "f5sirt@f5.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 6.1, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "f5sirt@f5.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://my.f5.com/manage/s/article/K000138894", + "source": "f5sirt@f5.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-336xx/CVE-2024-33608.json b/CVE-2024/CVE-2024-336xx/CVE-2024-33608.json new file mode 100644 index 00000000000..b38389ed42d --- /dev/null +++ b/CVE-2024/CVE-2024-336xx/CVE-2024-33608.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2024-33608", + "sourceIdentifier": "f5sirt@f5.com", + "published": "2024-05-08T15:15:10.930", + "lastModified": "2024-05-08T15:15:10.930", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "When IPsec is configured on a virtual server, undisclosed traffic can cause the Traffic Management Microkernel (TMM) to terminate. \n\n\nNote: Software versions which have reached End of Technical Support (EoTS) are not evaluated." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "f5sirt@f5.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "f5sirt@f5.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-824" + } + ] + } + ], + "references": [ + { + "url": "https://my.f5.com/manage/s/article/K000138728", + "source": "f5sirt@f5.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-336xx/CVE-2024-33612.json b/CVE-2024/CVE-2024-336xx/CVE-2024-33612.json new file mode 100644 index 00000000000..31ed300509b --- /dev/null +++ b/CVE-2024/CVE-2024-336xx/CVE-2024-33612.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2024-33612", + "sourceIdentifier": "f5sirt@f5.com", + "published": "2024-05-08T15:15:11.113", + "lastModified": "2024-05-08T15:15:11.113", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "\n\n\nAn improper certificate validation vulnerability exists in BIG-IP Next Central Manager and may allow an attacker to impersonate an Instance Provider system. A successful exploit of this vulnerability can allow the attacker to cross a security boundary.\u00a0\u00a0Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.\n\n" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "f5sirt@f5.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 6.8, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.6, + "impactScore": 5.2 + } + ] + }, + "weaknesses": [ + { + "source": "f5sirt@f5.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-295" + } + ] + } + ], + "references": [ + { + "url": "https://my.f5.com/manage/s/article/K000139012", + "source": "f5sirt@f5.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-343xx/CVE-2024-34347.json b/CVE-2024/CVE-2024-343xx/CVE-2024-34347.json new file mode 100644 index 00000000000..33eda84258e --- /dev/null +++ b/CVE-2024/CVE-2024-343xx/CVE-2024-34347.json @@ -0,0 +1,59 @@ +{ + "id": "CVE-2024-34347", + "sourceIdentifier": "security-advisories@github.com", + "published": "2024-05-08T15:15:11.310", + "lastModified": "2024-05-08T15:15:11.310", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "@hoppscotch/cli is a CLI to run Hoppscotch Test Scripts in CI environments. Prior to 0.8.0, the @hoppscotch/js-sandbox package provides a Javascript sandbox that uses the Node.js vm module. However, the vm module is not safe for sandboxing untrusted Javascript code. This is because code inside the vm context can break out if it can get a hold of any reference to an object created outside of the vm. In the case of @hoppscotch/js-sandbox, multiple references to external objects are passed into the vm context to allow pre-request scripts interactions with environment variables and more. But this also allows the pre-request script to escape the sandbox. This vulnerability is fixed in 0.8.0." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.3, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.6, + "impactScore": 6.0 + } + ] + }, + "weaknesses": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-77" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/hoppscotch/hoppscotch/commit/22c6eabd133195d22874250a5ae40cb26b851b01", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/hoppscotch/hoppscotch/security/advisories/GHSA-qmmm-73r2-f8xr", + "source": "security-advisories@github.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-39xx/CVE-2024-3951.json b/CVE-2024/CVE-2024-39xx/CVE-2024-3951.json new file mode 100644 index 00000000000..92da9e6cd36 --- /dev/null +++ b/CVE-2024/CVE-2024-39xx/CVE-2024-3951.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2024-3951", + "sourceIdentifier": "ics-cert@hq.dhs.gov", + "published": "2024-05-08T15:15:11.517", + "lastModified": "2024-05-08T15:15:11.517", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "\nPTC Codebeamer is vulnerable to a cross site scripting vulnerability that could allow an attacker to inject and execute malicious code.\n\n" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "ics-cert@hq.dhs.gov", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 7.1, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "ics-cert@hq.dhs.gov", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-24-128-01", + "source": "ics-cert@hq.dhs.gov" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-42xx/CVE-2024-4233.json b/CVE-2024/CVE-2024-42xx/CVE-2024-4233.json new file mode 100644 index 00000000000..831869f0445 --- /dev/null +++ b/CVE-2024/CVE-2024-42xx/CVE-2024-4233.json @@ -0,0 +1,63 @@ +{ + "id": "CVE-2024-4233", + "sourceIdentifier": "audit@patchstack.com", + "published": "2024-05-08T14:15:08.907", + "lastModified": "2024-05-08T14:15:08.907", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Missing Authorization vulnerability in Tyche Softwares Print Invoice & Delivery Notes for WooCommerce, Tyche Softwares Arconix Shortcodes, Tyche Softwares Arconix FAQ.This issue affects Print Invoice & Delivery Notes for WooCommerce: from n/a through 4.8.1; Arconix Shortcodes: from n/a through 2.1.10; Arconix FAQ: from n/a through 1.9.3.\n\n" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 4.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/vulnerability/arconix-faq/wordpress-arconix-faq-plugin-1-9-3-broken-access-control-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + }, + { + "url": "https://patchstack.com/database/vulnerability/arconix-shortcodes/wordpress-arconix-shortcodes-plugin-2-1-10-broken-access-control-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + }, + { + "url": "https://patchstack.com/database/vulnerability/woocommerce-delivery-notes/wordpress-print-invoice-delivery-notes-for-woocommerce-plugin-4-8-1-broken-access-control-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-46xx/CVE-2024-4649.json b/CVE-2024/CVE-2024-46xx/CVE-2024-4649.json new file mode 100644 index 00000000000..72c93072119 --- /dev/null +++ b/CVE-2024/CVE-2024-46xx/CVE-2024-4649.json @@ -0,0 +1,92 @@ +{ + "id": "CVE-2024-4649", + "sourceIdentifier": "cna@vuldb.com", + "published": "2024-05-08T14:15:09.107", + "lastModified": "2024-05-08T14:15:09.107", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability classified as problematic has been found in Campcodes Complete Web-Based School Management System 1.0. This affects an unknown part of the file /view/student_exam_mark_insert_form1.php. The manipulation of the argument page leads to cross site scripting. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-263493 was assigned to this vulnerability." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 3.5, + "baseSeverity": "LOW" + }, + "exploitabilityScore": 2.1, + "impactScore": 1.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:S/C:N/I:P/A:N", + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "SINGLE", + "confidentialityImpact": "NONE", + "integrityImpact": "PARTIAL", + "availabilityImpact": "NONE", + "baseScore": 4.0 + }, + "baseSeverity": "MEDIUM", + "exploitabilityScore": 8.0, + "impactScore": 2.9, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/E1CHO/cve_hub/blob/main/Complete%20Web-Based%20School%20Management%20System%20-%20xss/Complete%20Web-Based%20School%20Management%20System%20-%20vuln%2018.pdf", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.263493", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.263493", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.330123", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-46xx/CVE-2024-4650.json b/CVE-2024/CVE-2024-46xx/CVE-2024-4650.json new file mode 100644 index 00000000000..9d83a014ae1 --- /dev/null +++ b/CVE-2024/CVE-2024-46xx/CVE-2024-4650.json @@ -0,0 +1,92 @@ +{ + "id": "CVE-2024-4650", + "sourceIdentifier": "cna@vuldb.com", + "published": "2024-05-08T14:15:09.337", + "lastModified": "2024-05-08T14:15:09.337", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability classified as problematic was found in Campcodes Complete Web-Based School Management System 1.0. This vulnerability affects unknown code of the file /view/student_due_payment.php. The manipulation of the argument due_month leads to cross site scripting. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. VDB-263494 is the identifier assigned to this vulnerability." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 3.5, + "baseSeverity": "LOW" + }, + "exploitabilityScore": 2.1, + "impactScore": 1.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:S/C:N/I:P/A:N", + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "SINGLE", + "confidentialityImpact": "NONE", + "integrityImpact": "PARTIAL", + "availabilityImpact": "NONE", + "baseScore": 4.0 + }, + "baseSeverity": "MEDIUM", + "exploitabilityScore": 8.0, + "impactScore": 2.9, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/E1CHO/cve_hub/blob/main/Complete%20Web-Based%20School%20Management%20System%20-%20xss/Complete%20Web-Based%20School%20Management%20System%20-%20vuln%2019.pdf", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.263494", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.263494", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.330124", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-46xx/CVE-2024-4651.json b/CVE-2024/CVE-2024-46xx/CVE-2024-4651.json new file mode 100644 index 00000000000..f0181d67c73 --- /dev/null +++ b/CVE-2024/CVE-2024-46xx/CVE-2024-4651.json @@ -0,0 +1,92 @@ +{ + "id": "CVE-2024-4651", + "sourceIdentifier": "cna@vuldb.com", + "published": "2024-05-08T14:15:09.563", + "lastModified": "2024-05-08T14:15:09.563", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability, which was classified as problematic, has been found in Campcodes Complete Web-Based School Management System 1.0. This issue affects some unknown processing of the file /view/student_attendance_history1.php. The manipulation of the argument year leads to cross site scripting. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-263495." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 3.5, + "baseSeverity": "LOW" + }, + "exploitabilityScore": 2.1, + "impactScore": 1.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:S/C:N/I:P/A:N", + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "SINGLE", + "confidentialityImpact": "NONE", + "integrityImpact": "PARTIAL", + "availabilityImpact": "NONE", + "baseScore": 4.0 + }, + "baseSeverity": "MEDIUM", + "exploitabilityScore": 8.0, + "impactScore": 2.9, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/E1CHO/cve_hub/blob/main/Complete%20Web-Based%20School%20Management%20System%20-%20xss/Complete%20Web-Based%20School%20Management%20System%20-%20vuln%2020.pdf", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.263495", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.263495", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.330125", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-46xx/CVE-2024-4652.json b/CVE-2024/CVE-2024-46xx/CVE-2024-4652.json new file mode 100644 index 00000000000..75c155dd225 --- /dev/null +++ b/CVE-2024/CVE-2024-46xx/CVE-2024-4652.json @@ -0,0 +1,92 @@ +{ + "id": "CVE-2024-4652", + "sourceIdentifier": "cna@vuldb.com", + "published": "2024-05-08T14:15:09.780", + "lastModified": "2024-05-08T14:15:09.780", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability, which was classified as problematic, was found in Campcodes Complete Web-Based School Management System 1.0. Affected is an unknown function of the file /view/show_teacher2.php. The manipulation of the argument month leads to cross site scripting. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-263496." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 3.5, + "baseSeverity": "LOW" + }, + "exploitabilityScore": 2.1, + "impactScore": 1.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:S/C:N/I:P/A:N", + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "SINGLE", + "confidentialityImpact": "NONE", + "integrityImpact": "PARTIAL", + "availabilityImpact": "NONE", + "baseScore": 4.0 + }, + "baseSeverity": "MEDIUM", + "exploitabilityScore": 8.0, + "impactScore": 2.9, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/E1CHO/cve_hub/blob/main/Complete%20Web-Based%20School%20Management%20System%20-%20xss/Complete%20Web-Based%20School%20Management%20System%20-%20vuln%2021.pdf", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.263496", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.263496", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.330126", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-46xx/CVE-2024-4653.json b/CVE-2024/CVE-2024-46xx/CVE-2024-4653.json new file mode 100644 index 00000000000..43edb8c43fb --- /dev/null +++ b/CVE-2024/CVE-2024-46xx/CVE-2024-4653.json @@ -0,0 +1,92 @@ +{ + "id": "CVE-2024-4653", + "sourceIdentifier": "cna@vuldb.com", + "published": "2024-05-08T15:15:11.723", + "lastModified": "2024-05-08T15:15:11.723", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability was found in BlueNet Technology Clinical Browsing System 1.2.1 and classified as critical. Affected by this issue is some unknown functionality of the file /xds/outIndex.php. The manipulation of the argument name leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB-263498 is the identifier assigned to this vulnerability." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 6.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "SINGLE", + "confidentialityImpact": "PARTIAL", + "integrityImpact": "PARTIAL", + "availabilityImpact": "PARTIAL", + "baseScore": 6.5 + }, + "baseSeverity": "MEDIUM", + "exploitabilityScore": 8.0, + "impactScore": 6.4, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/Hefei-Coffee/cve/blob/main/sql.md", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.263498", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.263498", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.330628", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-46xx/CVE-2024-4654.json b/CVE-2024/CVE-2024-46xx/CVE-2024-4654.json new file mode 100644 index 00000000000..8690bc4ac06 --- /dev/null +++ b/CVE-2024/CVE-2024-46xx/CVE-2024-4654.json @@ -0,0 +1,92 @@ +{ + "id": "CVE-2024-4654", + "sourceIdentifier": "cna@vuldb.com", + "published": "2024-05-08T15:15:11.950", + "lastModified": "2024-05-08T15:15:11.950", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability was found in BlueNet Technology Clinical Browsing System 1.2.1. It has been classified as critical. This affects an unknown part of the file /xds/cloudInterface.php. The manipulation of the argument INSTI_CODE leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-263499." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 6.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "SINGLE", + "confidentialityImpact": "PARTIAL", + "integrityImpact": "PARTIAL", + "availabilityImpact": "PARTIAL", + "baseScore": 6.5 + }, + "baseSeverity": "MEDIUM", + "exploitabilityScore": 8.0, + "impactScore": 6.4, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/Hefei-Coffee/cve/blob/main/sql2.md", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.263499", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.263499", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.330631", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/README.md b/README.md index aa57afcfca0..aabe2cbff89 100644 --- a/README.md +++ b/README.md @@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2024-05-08T14:00:37.732351+00:00 +2024-05-08T16:00:37.448803+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2024-05-08T13:15:17.563000+00:00 +2024-05-08T15:15:11.950000+00:00 ``` ### Last Data Feed Release @@ -33,60 +33,46 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### Total Number of included CVEs ```plain -249030 +249072 ``` ### CVEs added in the last Commit -Recently added CVEs: `16` +Recently added CVEs: `42` -- [CVE-2022-40218](CVE-2022/CVE-2022-402xx/CVE-2022-40218.json) (`2024-05-08T12:15:07.650`) -- [CVE-2024-1438](CVE-2024/CVE-2024-14xx/CVE-2024-1438.json) (`2024-05-08T13:15:07.733`) -- [CVE-2024-34255](CVE-2024/CVE-2024-342xx/CVE-2024-34255.json) (`2024-05-08T13:15:08.033`) -- [CVE-2024-34414](CVE-2024/CVE-2024-344xx/CVE-2024-34414.json) (`2024-05-08T12:15:07.990`) -- [CVE-2024-34546](CVE-2024/CVE-2024-345xx/CVE-2024-34546.json) (`2024-05-08T12:15:08.180`) -- [CVE-2024-34547](CVE-2024/CVE-2024-345xx/CVE-2024-34547.json) (`2024-05-08T12:15:08.370`) -- [CVE-2024-34548](CVE-2024/CVE-2024-345xx/CVE-2024-34548.json) (`2024-05-08T12:15:08.560`) -- [CVE-2024-34553](CVE-2024/CVE-2024-345xx/CVE-2024-34553.json) (`2024-05-08T12:15:08.747`) -- [CVE-2024-34558](CVE-2024/CVE-2024-345xx/CVE-2024-34558.json) (`2024-05-08T12:15:08.933`) -- [CVE-2024-34560](CVE-2024/CVE-2024-345xx/CVE-2024-34560.json) (`2024-05-08T12:15:09.133`) -- [CVE-2024-34561](CVE-2024/CVE-2024-345xx/CVE-2024-34561.json) (`2024-05-08T12:15:09.330`) -- [CVE-2024-4644](CVE-2024/CVE-2024-46xx/CVE-2024-4644.json) (`2024-05-08T12:15:09.540`) -- [CVE-2024-4645](CVE-2024/CVE-2024-46xx/CVE-2024-4645.json) (`2024-05-08T13:15:08.090`) -- [CVE-2024-4646](CVE-2024/CVE-2024-46xx/CVE-2024-4646.json) (`2024-05-08T13:15:08.307`) -- [CVE-2024-4647](CVE-2024/CVE-2024-46xx/CVE-2024-4647.json) (`2024-05-08T13:15:08.517`) -- [CVE-2024-4648](CVE-2024/CVE-2024-46xx/CVE-2024-4648.json) (`2024-05-08T13:15:08.740`) +- [CVE-2024-28132](CVE-2024/CVE-2024-281xx/CVE-2024-28132.json) (`2024-05-08T15:15:09.183`) +- [CVE-2024-28883](CVE-2024/CVE-2024-288xx/CVE-2024-28883.json) (`2024-05-08T15:15:09.380`) +- [CVE-2024-28889](CVE-2024/CVE-2024-288xx/CVE-2024-28889.json) (`2024-05-08T15:15:09.590`) +- [CVE-2024-30459](CVE-2024/CVE-2024-304xx/CVE-2024-30459.json) (`2024-05-08T14:15:07.923`) +- [CVE-2024-31156](CVE-2024/CVE-2024-311xx/CVE-2024-31156.json) (`2024-05-08T15:15:09.790`) +- [CVE-2024-31270](CVE-2024/CVE-2024-312xx/CVE-2024-31270.json) (`2024-05-08T14:15:08.117`) +- [CVE-2024-32049](CVE-2024/CVE-2024-320xx/CVE-2024-32049.json) (`2024-05-08T15:15:09.987`) +- [CVE-2024-32113](CVE-2024/CVE-2024-321xx/CVE-2024-32113.json) (`2024-05-08T15:15:10.227`) +- [CVE-2024-32761](CVE-2024/CVE-2024-327xx/CVE-2024-32761.json) (`2024-05-08T15:15:10.330`) +- [CVE-2024-32886](CVE-2024/CVE-2024-328xx/CVE-2024-32886.json) (`2024-05-08T14:15:08.310`) +- [CVE-2024-32980](CVE-2024/CVE-2024-329xx/CVE-2024-32980.json) (`2024-05-08T15:15:10.530`) +- [CVE-2024-33573](CVE-2024/CVE-2024-335xx/CVE-2024-33573.json) (`2024-05-08T14:15:08.523`) +- [CVE-2024-33574](CVE-2024/CVE-2024-335xx/CVE-2024-33574.json) (`2024-05-08T14:15:08.713`) +- [CVE-2024-33604](CVE-2024/CVE-2024-336xx/CVE-2024-33604.json) (`2024-05-08T15:15:10.733`) +- [CVE-2024-33608](CVE-2024/CVE-2024-336xx/CVE-2024-33608.json) (`2024-05-08T15:15:10.930`) +- [CVE-2024-33612](CVE-2024/CVE-2024-336xx/CVE-2024-33612.json) (`2024-05-08T15:15:11.113`) +- [CVE-2024-34347](CVE-2024/CVE-2024-343xx/CVE-2024-34347.json) (`2024-05-08T15:15:11.310`) +- [CVE-2024-3951](CVE-2024/CVE-2024-39xx/CVE-2024-3951.json) (`2024-05-08T15:15:11.517`) +- [CVE-2024-4233](CVE-2024/CVE-2024-42xx/CVE-2024-4233.json) (`2024-05-08T14:15:08.907`) +- [CVE-2024-4649](CVE-2024/CVE-2024-46xx/CVE-2024-4649.json) (`2024-05-08T14:15:09.107`) +- [CVE-2024-4650](CVE-2024/CVE-2024-46xx/CVE-2024-4650.json) (`2024-05-08T14:15:09.337`) +- [CVE-2024-4651](CVE-2024/CVE-2024-46xx/CVE-2024-4651.json) (`2024-05-08T14:15:09.563`) +- [CVE-2024-4652](CVE-2024/CVE-2024-46xx/CVE-2024-4652.json) (`2024-05-08T14:15:09.780`) +- [CVE-2024-4653](CVE-2024/CVE-2024-46xx/CVE-2024-4653.json) (`2024-05-08T15:15:11.723`) +- [CVE-2024-4654](CVE-2024/CVE-2024-46xx/CVE-2024-4654.json) (`2024-05-08T15:15:11.950`) ### CVEs modified in the last Commit -Recently modified CVEs: `105` +Recently modified CVEs: `2` -- [CVE-2024-34346](CVE-2024/CVE-2024-343xx/CVE-2024-34346.json) (`2024-05-08T13:15:00.690`) -- [CVE-2024-34562](CVE-2024/CVE-2024-345xx/CVE-2024-34562.json) (`2024-05-08T13:15:00.690`) -- [CVE-2024-34563](CVE-2024/CVE-2024-345xx/CVE-2024-34563.json) (`2024-05-08T13:15:00.690`) -- [CVE-2024-34564](CVE-2024/CVE-2024-345xx/CVE-2024-34564.json) (`2024-05-08T13:15:00.690`) -- [CVE-2024-34565](CVE-2024/CVE-2024-345xx/CVE-2024-34565.json) (`2024-05-08T13:15:00.690`) -- [CVE-2024-34566](CVE-2024/CVE-2024-345xx/CVE-2024-34566.json) (`2024-05-08T13:15:00.690`) -- [CVE-2024-34568](CVE-2024/CVE-2024-345xx/CVE-2024-34568.json) (`2024-05-08T13:15:00.690`) -- [CVE-2024-34569](CVE-2024/CVE-2024-345xx/CVE-2024-34569.json) (`2024-05-08T13:15:00.690`) -- [CVE-2024-34570](CVE-2024/CVE-2024-345xx/CVE-2024-34570.json) (`2024-05-08T13:15:00.690`) -- [CVE-2024-34571](CVE-2024/CVE-2024-345xx/CVE-2024-34571.json) (`2024-05-08T13:15:00.690`) -- [CVE-2024-34572](CVE-2024/CVE-2024-345xx/CVE-2024-34572.json) (`2024-05-08T13:15:00.690`) -- [CVE-2024-34573](CVE-2024/CVE-2024-345xx/CVE-2024-34573.json) (`2024-05-08T13:15:00.690`) -- [CVE-2024-34574](CVE-2024/CVE-2024-345xx/CVE-2024-34574.json) (`2024-05-08T13:15:00.690`) -- [CVE-2024-3494](CVE-2024/CVE-2024-34xx/CVE-2024-3494.json) (`2024-05-08T13:15:00.690`) -- [CVE-2024-3507](CVE-2024/CVE-2024-35xx/CVE-2024-3507.json) (`2024-05-08T13:15:00.690`) -- [CVE-2024-4030](CVE-2024/CVE-2024-40xx/CVE-2024-4030.json) (`2024-05-08T13:15:00.690`) -- [CVE-2024-4135](CVE-2024/CVE-2024-41xx/CVE-2024-4135.json) (`2024-05-08T13:15:00.690`) -- [CVE-2024-4162](CVE-2024/CVE-2024-41xx/CVE-2024-4162.json) (`2024-05-08T13:15:00.690`) -- [CVE-2024-4281](CVE-2024/CVE-2024-42xx/CVE-2024-4281.json) (`2024-05-08T13:15:00.690`) -- [CVE-2024-4393](CVE-2024/CVE-2024-43xx/CVE-2024-4393.json) (`2024-05-08T13:15:00.690`) -- [CVE-2024-4418](CVE-2024/CVE-2024-44xx/CVE-2024-4418.json) (`2024-05-08T13:15:00.690`) -- [CVE-2024-4436](CVE-2024/CVE-2024-44xx/CVE-2024-4436.json) (`2024-05-08T13:15:00.690`) -- [CVE-2024-4437](CVE-2024/CVE-2024-44xx/CVE-2024-4437.json) (`2024-05-08T13:15:00.690`) -- [CVE-2024-4438](CVE-2024/CVE-2024-44xx/CVE-2024-4438.json) (`2024-05-08T13:15:00.690`) -- [CVE-2024-4456](CVE-2024/CVE-2024-44xx/CVE-2024-4456.json) (`2024-05-08T13:15:00.690`) +- [CVE-2022-21819](CVE-2022/CVE-2022-218xx/CVE-2022-21819.json) (`2024-05-08T14:15:07.550`) +- [CVE-2024-26925](CVE-2024/CVE-2024-269xx/CVE-2024-26925.json) (`2024-05-08T15:15:08.917`) ## Download and Usage diff --git a/_state.csv b/_state.csv index 4f34e8a21a1..635c29f6117 100644 --- a/_state.csv +++ b/_state.csv @@ -178066,47 +178066,47 @@ CVE-2021-34943,0,0,79829aa4e8783586817907836ed443f420cfb8a4403a57667921019530660 CVE-2021-34944,0,0,c251446deb1df58e883468eb0bef8656750c01994be8bdbce125a763b0fdb358,2022-01-14T21:57:39.450000 CVE-2021-34945,0,0,894124dcd5223928e2b30904e128120e5a452de8fb669f38709e2ba6ac86b5e0,2022-01-14T21:57:42.767000 CVE-2021-34946,0,0,238cb2ff5021a0153160e32639313470e17854d0eea313b4da0fa2f4583545f2,2022-01-14T21:57:47.790000 -CVE-2021-34947,0,1,649edcfe6b39f68e79e05dad7dcfb15a395f710bfcaa9804eddddba5e9ef91bb,2024-05-08T13:15:00.690000 -CVE-2021-34948,0,1,d2afb226a87a6e2c18a5b2a9f306f3d0645d5e2dc6c2165b491181aab7268e11,2024-05-08T13:15:00.690000 -CVE-2021-34949,0,1,bbdfa7136555493fe298163227e7993bf5d1c04aa5114adb65f8d6b02f98350b,2024-05-08T13:15:00.690000 +CVE-2021-34947,0,0,649edcfe6b39f68e79e05dad7dcfb15a395f710bfcaa9804eddddba5e9ef91bb,2024-05-08T13:15:00.690000 +CVE-2021-34948,0,0,d2afb226a87a6e2c18a5b2a9f306f3d0645d5e2dc6c2165b491181aab7268e11,2024-05-08T13:15:00.690000 +CVE-2021-34949,0,0,bbdfa7136555493fe298163227e7993bf5d1c04aa5114adb65f8d6b02f98350b,2024-05-08T13:15:00.690000 CVE-2021-3495,0,0,6c8feb86378604f2c77172669992d6bfb20c95890248f2554fbfd7b80008fd78,2021-06-14T15:13:37.510000 -CVE-2021-34950,0,1,aafc5335462a2c28106e5f5b776399ed5a22a6e6b1f33449692cd05add2545f9,2024-05-08T13:15:00.690000 -CVE-2021-34951,0,1,f306d43e0c33211afb834bd5581a2becd5e29f6dfe7e4a3dc86808fa5242a6d4,2024-05-08T13:15:00.690000 -CVE-2021-34952,0,1,a46c13a50448f2931fcdbc4ee19d0d2c06d1b9e47202990d844d329751a5b782,2024-05-08T13:15:00.690000 -CVE-2021-34953,0,1,8e84df010ac9cb7bb5de4c59310ed030d3f112dd6c30dde57c2c32408595aeac,2024-05-08T13:15:00.690000 -CVE-2021-34954,0,1,bc887410ac50d49dd38cc1f5dc58b204a6155f5ccbdfe3e38862a21d5b7fefde,2024-05-08T13:15:00.690000 -CVE-2021-34955,0,1,c6d5bc7c374da12dcac72ef7798b7bf292c105454208da6eee29af0d77a7b6d3,2024-05-08T13:15:00.690000 -CVE-2021-34956,0,1,0672b5dbf6599284ce1c834072e1ce517be79ac003f3896bf209cd93c5889f95,2024-05-08T13:15:00.690000 -CVE-2021-34957,0,1,e6053f3c82578492fbd6985dc0e1c5051fd88167d77de3a99703999b26281e72,2024-05-08T13:15:00.690000 -CVE-2021-34958,0,1,fe385bacb5e189b50f943bc6f20b511d10b49d60aba643358585f0bc06deddfb,2024-05-08T13:15:00.690000 -CVE-2021-34959,0,1,086001c27334536f5791f172ee72a20c71b0165c4f328eb7e14723e2fc54cbf1,2024-05-08T13:15:00.690000 +CVE-2021-34950,0,0,aafc5335462a2c28106e5f5b776399ed5a22a6e6b1f33449692cd05add2545f9,2024-05-08T13:15:00.690000 +CVE-2021-34951,0,0,f306d43e0c33211afb834bd5581a2becd5e29f6dfe7e4a3dc86808fa5242a6d4,2024-05-08T13:15:00.690000 +CVE-2021-34952,0,0,a46c13a50448f2931fcdbc4ee19d0d2c06d1b9e47202990d844d329751a5b782,2024-05-08T13:15:00.690000 +CVE-2021-34953,0,0,8e84df010ac9cb7bb5de4c59310ed030d3f112dd6c30dde57c2c32408595aeac,2024-05-08T13:15:00.690000 +CVE-2021-34954,0,0,bc887410ac50d49dd38cc1f5dc58b204a6155f5ccbdfe3e38862a21d5b7fefde,2024-05-08T13:15:00.690000 +CVE-2021-34955,0,0,c6d5bc7c374da12dcac72ef7798b7bf292c105454208da6eee29af0d77a7b6d3,2024-05-08T13:15:00.690000 +CVE-2021-34956,0,0,0672b5dbf6599284ce1c834072e1ce517be79ac003f3896bf209cd93c5889f95,2024-05-08T13:15:00.690000 +CVE-2021-34957,0,0,e6053f3c82578492fbd6985dc0e1c5051fd88167d77de3a99703999b26281e72,2024-05-08T13:15:00.690000 +CVE-2021-34958,0,0,fe385bacb5e189b50f943bc6f20b511d10b49d60aba643358585f0bc06deddfb,2024-05-08T13:15:00.690000 +CVE-2021-34959,0,0,086001c27334536f5791f172ee72a20c71b0165c4f328eb7e14723e2fc54cbf1,2024-05-08T13:15:00.690000 CVE-2021-3496,0,0,cba6ca6d32c9979e9f0216c0fdbd435ff14a04133999a2a1669335c6016d76c8,2022-12-21T15:01:19.963000 -CVE-2021-34960,0,1,b27fbff663a84d419e6fdca00cfed15814964be1df8122bb2e9ae4cec29f7ae7,2024-05-08T13:15:00.690000 -CVE-2021-34961,0,1,59efd67a3424408ff99bc86d6fee5fd1b0df402a9084fdc8664be4ac997b5a3a,2024-05-08T13:15:00.690000 -CVE-2021-34962,0,1,2342232c5305895f7551abe7751aee6b55c213d464f8bb710567a4ce39cecab1,2024-05-08T13:15:00.690000 -CVE-2021-34963,0,1,a6ffd5163efcf3092294214185994805cdf15ed32d18e7718b58219b164e7658,2024-05-08T13:15:00.690000 -CVE-2021-34964,0,1,d7654e6ee590fc3f94f2d2dc0dc58c5517b9b5803d764b640840ecfaa4a688c0,2024-05-08T13:15:00.690000 -CVE-2021-34965,0,1,4e9e9ef37af4133c023bdf9af13d7f3eb13f661c7d2196be78f203d624402297,2024-05-08T13:15:00.690000 -CVE-2021-34966,0,1,316ff66b067e781d53ae85d9b82916d3f9c78a579e6cb5944c97c56b205c40db,2024-05-08T13:15:00.690000 -CVE-2021-34967,0,1,9fca0ce93543b650605b4191049cf51344fcab7545ef01d9bf4ef15553a5c0aa,2024-05-08T13:15:00.690000 -CVE-2021-34968,0,1,8b9041efbb07731cca038e497c0e9f165041b1e2b5081f0ff480f39f4257d4ac,2024-05-08T13:15:00.690000 -CVE-2021-34969,0,1,6cfa3f938bb810b82e9c28471142e9cd064f6efca7860f3d2bbb4b426b723d9d,2024-05-08T13:15:00.690000 +CVE-2021-34960,0,0,b27fbff663a84d419e6fdca00cfed15814964be1df8122bb2e9ae4cec29f7ae7,2024-05-08T13:15:00.690000 +CVE-2021-34961,0,0,59efd67a3424408ff99bc86d6fee5fd1b0df402a9084fdc8664be4ac997b5a3a,2024-05-08T13:15:00.690000 +CVE-2021-34962,0,0,2342232c5305895f7551abe7751aee6b55c213d464f8bb710567a4ce39cecab1,2024-05-08T13:15:00.690000 +CVE-2021-34963,0,0,a6ffd5163efcf3092294214185994805cdf15ed32d18e7718b58219b164e7658,2024-05-08T13:15:00.690000 +CVE-2021-34964,0,0,d7654e6ee590fc3f94f2d2dc0dc58c5517b9b5803d764b640840ecfaa4a688c0,2024-05-08T13:15:00.690000 +CVE-2021-34965,0,0,4e9e9ef37af4133c023bdf9af13d7f3eb13f661c7d2196be78f203d624402297,2024-05-08T13:15:00.690000 +CVE-2021-34966,0,0,316ff66b067e781d53ae85d9b82916d3f9c78a579e6cb5944c97c56b205c40db,2024-05-08T13:15:00.690000 +CVE-2021-34967,0,0,9fca0ce93543b650605b4191049cf51344fcab7545ef01d9bf4ef15553a5c0aa,2024-05-08T13:15:00.690000 +CVE-2021-34968,0,0,8b9041efbb07731cca038e497c0e9f165041b1e2b5081f0ff480f39f4257d4ac,2024-05-08T13:15:00.690000 +CVE-2021-34969,0,0,6cfa3f938bb810b82e9c28471142e9cd064f6efca7860f3d2bbb4b426b723d9d,2024-05-08T13:15:00.690000 CVE-2021-3497,0,0,8c93190c8f8f06570107ff3200a0533b7ac5baa5d7a48e3fdbc516aad460b63f,2022-09-28T20:02:01.217000 -CVE-2021-34970,0,1,14405ef4c46b56d686653d0357ca18863bbc1164fa150218f3610d5ff53f7c26,2024-05-08T13:15:00.690000 -CVE-2021-34971,0,1,6121ff3bf31a0d383e66f001991eb2adabe6c8f47a486e5d986dd4ddc0be0b5a,2024-05-08T13:15:00.690000 -CVE-2021-34972,0,1,1c38da68ccb62b69f875b53b0840dc3066e4a933dccf0818206dfb16c98ec646,2024-05-08T13:15:00.690000 -CVE-2021-34973,0,1,d31680b0dfbeedad62a487fa7db63ccba73bc0bf72867a581e220ec61f33cbd5,2024-05-08T13:15:00.690000 -CVE-2021-34974,0,1,23628a5f495633834f3b7ee1316fd6b42a3107901420a6e2c3ea8e2bdee41573,2024-05-08T13:15:00.690000 -CVE-2021-34975,0,1,172eec8eecb7b856eb302f28f67369e4d997d215085f22640aeccacd8e80f2d2,2024-05-08T13:15:00.690000 -CVE-2021-34976,0,1,089b37ad8bf254a3c1d51dfccb25b235a2e8088fd2895fb48b887e04d7df2571,2024-05-08T13:15:00.690000 +CVE-2021-34970,0,0,14405ef4c46b56d686653d0357ca18863bbc1164fa150218f3610d5ff53f7c26,2024-05-08T13:15:00.690000 +CVE-2021-34971,0,0,6121ff3bf31a0d383e66f001991eb2adabe6c8f47a486e5d986dd4ddc0be0b5a,2024-05-08T13:15:00.690000 +CVE-2021-34972,0,0,1c38da68ccb62b69f875b53b0840dc3066e4a933dccf0818206dfb16c98ec646,2024-05-08T13:15:00.690000 +CVE-2021-34973,0,0,d31680b0dfbeedad62a487fa7db63ccba73bc0bf72867a581e220ec61f33cbd5,2024-05-08T13:15:00.690000 +CVE-2021-34974,0,0,23628a5f495633834f3b7ee1316fd6b42a3107901420a6e2c3ea8e2bdee41573,2024-05-08T13:15:00.690000 +CVE-2021-34975,0,0,172eec8eecb7b856eb302f28f67369e4d997d215085f22640aeccacd8e80f2d2,2024-05-08T13:15:00.690000 +CVE-2021-34976,0,0,089b37ad8bf254a3c1d51dfccb25b235a2e8088fd2895fb48b887e04d7df2571,2024-05-08T13:15:00.690000 CVE-2021-34977,0,0,1ed94e884f1d18f5e0d22d17f5665be0e83b35a39386a165550b262f89d1f3f3,2022-01-20T14:46:59.397000 CVE-2021-34978,0,0,41b87c3619dadcd2e0d7e11b17da3c8be7889d7da3f99c606dd82257bedb540e,2022-01-20T14:53:48.037000 CVE-2021-34979,0,0,af86c47ae95e4db95b1d595fc69d3e18c1383e2db7496d6d464cf9aacbca1b0a,2022-01-19T20:12:40.507000 CVE-2021-3498,0,0,9db04db7fa73b3a1d604a88a21add474c43d170fe2a85578e0a339a540e923b2,2022-10-24T15:08:30.287000 CVE-2021-34980,0,0,695d450ac3010085055af6f4c8015c9a5a99f4cbd53d27536267deac44ef250c,2022-01-19T20:09:51.213000 -CVE-2021-34981,0,1,a86c7a2b8999d98fb3cff07db08d72432f44527c148646cacd0001e7ee781074,2024-05-08T13:15:00.690000 -CVE-2021-34982,0,1,4a2b26920c2e3bf27a87a0154230c8ea58f21f56e8aaaddf18f7211819a6d859,2024-05-08T13:15:00.690000 -CVE-2021-34983,0,1,725f20735fbd875cf89d00c7e1722de3066f0e1ade7f4d5934ee13a34ed2f180,2024-05-08T13:15:00.690000 +CVE-2021-34981,0,0,a86c7a2b8999d98fb3cff07db08d72432f44527c148646cacd0001e7ee781074,2024-05-08T13:15:00.690000 +CVE-2021-34982,0,0,4a2b26920c2e3bf27a87a0154230c8ea58f21f56e8aaaddf18f7211819a6d859,2024-05-08T13:15:00.690000 +CVE-2021-34983,0,0,725f20735fbd875cf89d00c7e1722de3066f0e1ade7f4d5934ee13a34ed2f180,2024-05-08T13:15:00.690000 CVE-2021-34984,0,0,ed1596c3833443a873e7d02bebcfed85bd0444d4a8d914b244eb5c80f1614178,2022-01-20T18:19:58.510000 CVE-2021-34985,0,0,4b3f317c382d7c1092261fe5dc1b7226e47650b7fb394ae8588db8e05c896d21,2022-01-20T18:20:32.257000 CVE-2021-34986,0,0,24560d4aa489c4308ce32c4030da8089bd5fc75cf6cb58858d651dbb454ae7ab,2022-07-22T14:01:25.817000 @@ -178120,11 +178120,11 @@ CVE-2021-34995,0,0,b987e23c91a9ce361d255ee6b68e9a84185cbe93748de3bf17bc2e7f20725 CVE-2021-34996,0,0,ac8345224df59bef3395e866995ae852f29a3052f38a0210a3dbb91d08aa851b,2022-01-22T03:54:01.530000 CVE-2021-34997,0,0,da191d65fecb70eff6271c6a391f2981294bc6a88a19f2ecc798b5ba41cc7768,2022-01-22T03:51:16.197000 CVE-2021-34998,0,0,8daaf5896e25e964bec08f6f47903b28cac7f2914df3cdc6447f9a908fa517c7,2022-01-20T18:30:33.707000 -CVE-2021-34999,0,1,7460fefdb7b6ed665d1f312799e5033a8f64cf693047164f67834fd77673950c,2024-05-08T13:15:00.690000 +CVE-2021-34999,0,0,7460fefdb7b6ed665d1f312799e5033a8f64cf693047164f67834fd77673950c,2024-05-08T13:15:00.690000 CVE-2021-3500,0,0,9340bdcc39d6768c22cad58393e78acf0df9529bcfee4fd6641fb12b733ff973,2022-03-09T21:41:13.120000 -CVE-2021-35000,0,1,6579d1fb9c2e90b707d7de3a0ffcf1a4362253aff04bbdfaf65eff2b8fcb667b,2024-05-08T13:15:00.690000 -CVE-2021-35001,0,1,8f50c031057706b7317d47524eaec76ed0328c5e883a18e5845dc7a55ba180b9,2024-05-08T13:15:00.690000 -CVE-2021-35002,0,1,0388a2638126566f81340042c88e6c8663a143d6fef041e488bbe0deec0df791,2024-05-08T13:15:00.690000 +CVE-2021-35000,0,0,6579d1fb9c2e90b707d7de3a0ffcf1a4362253aff04bbdfaf65eff2b8fcb667b,2024-05-08T13:15:00.690000 +CVE-2021-35001,0,0,8f50c031057706b7317d47524eaec76ed0328c5e883a18e5845dc7a55ba180b9,2024-05-08T13:15:00.690000 +CVE-2021-35002,0,0,0388a2638126566f81340042c88e6c8663a143d6fef041e488bbe0deec0df791,2024-05-08T13:15:00.690000 CVE-2021-35003,0,0,e1f603fec983e36b9544b98ede333cdc2216c0b32bcde04e0c0f7fd473ff7e2c,2022-01-27T18:31:58.600000 CVE-2021-35004,0,0,5847821a90bcfa1efaf35ec5b2f7f51f3387e0ecee584dd4bd7bf6f90ac3bf29,2022-01-27T18:34:57.367000 CVE-2021-35005,0,0,5f8ced7f6f59f4d8b9536a43fdcf32ebf6d441af082d683e6baf41b534b6e569,2023-06-26T18:59:40.723000 @@ -187300,7 +187300,7 @@ CVE-2022-0365,0,0,07faf7616acb5d4e690848e6f4ff862b450b8d4c606f022dfba5b2f7db152a CVE-2022-0366,0,0,2a55351fff07363d45bfbd9160d74d0088ede08bd3bb090a9a4a676a0ad53cd5,2023-08-08T14:21:49.707000 CVE-2022-0367,0,0,6ddd9cb85cd6bbf4e0b9be6b5f146d6cbde4e3c46172bd8a577bacac285a5e43,2022-09-30T19:49:41.133000 CVE-2022-0368,0,0,3ad0e782e93ac056f3d86a89eda3b83a1844078678a6a83c7f60ca644ddd950b,2022-11-09T03:52:57.447000 -CVE-2022-0369,0,1,f8bdaa41a10652b21e1376614d162903049ec39a9642f8c09bd948fbabd5eaba,2024-05-08T13:15:00.690000 +CVE-2022-0369,0,0,f8bdaa41a10652b21e1376614d162903049ec39a9642f8c09bd948fbabd5eaba,2024-05-08T13:15:00.690000 CVE-2022-0370,0,0,7e34e2221c03b6539d97cfd37ee954f1affe7ff993bbca23cafdb8ee9b87e718,2022-02-02T15:09:35.097000 CVE-2022-0371,0,0,6c6244223f3a0bab81469c49be9c48280022ce75b9e2133a4f29e3db7544fd45,2022-04-04T19:14:52.183000 CVE-2022-0372,0,0,47f87f1a5ce57bbd11f98832e2e10f944ae82e2d1db25dec8cc34c7d4bb1dfee,2022-02-02T13:44:12.263000 @@ -190626,7 +190626,7 @@ CVE-2022-21815,0,0,f790f24d37214e5cee37ca7dd83c3f9be7e1b0d536a79e6787a4256244465 CVE-2022-21816,0,0,ff386e80493db4cd98a1a498f62fa81e99311c0b7b45d8997863e5ceb3bcb87e,2023-07-03T20:35:17.977000 CVE-2022-21817,0,0,78085610e2b74dca4affb0f714ededbe8979cf749a9ad83032b7af356387479f,2023-07-24T13:52:04.670000 CVE-2022-21818,0,0,8c3dabf9409ba2c34ba37156ecb0548dd15470740eab0bd4ab6e79b85a651abe,2022-02-23T18:41:10.190000 -CVE-2022-21819,0,0,a26342226b8977acfd1c6b6c0b0211b6796d9b989fafd5ccc9770168f220df57,2022-03-22T14:29:49.827000 +CVE-2022-21819,0,1,0d9ec6e831e4bd73c8a3f8993cd365fad8bee4b339a5102c4dfb20ae3eb486cf,2024-05-08T14:15:07.550000 CVE-2022-2182,0,0,1678e61b09551ae00c4f35ba0646d900331f1aba85e86d9e915a60bd4ea99c30,2023-11-07T03:46:16.313000 CVE-2022-21820,0,0,cf3582b742e22dfdecfb5803c157bd69b598e0e8d06a19877f47bbd9861ee182,2023-07-24T13:46:40.093000 CVE-2022-21821,0,0,081dee849832e209023e970e855bf73489de7624c404e3a0f7a77172356f5c99,2022-04-08T14:31:45.347000 @@ -205515,7 +205515,7 @@ CVE-2022-40214,0,0,075704b9c4a2c8aecf891493001e82ba198db96beb659a7b1ac4a36c0957b CVE-2022-40215,0,0,d75a99076a8c740b3f576f7cdfeae73dd9f62a50323901377cebd6b7bbacf0d6,2022-09-26T15:05:46.373000 CVE-2022-40216,0,0,578a4640f64b639ee8557ea6ff7e75f120d314383b545d883c772250da267b49,2023-08-08T14:21:49.707000 CVE-2022-40217,0,0,6ebd6bb26c34914dd8a9dcd60d89bbfb999ba13007fbb6f92cfb8d2d618d50a8,2022-09-23T03:00:39.007000 -CVE-2022-40218,1,1,3de3658f286ae76c9878bb9d8c127fed7745738ff159500e49559c3190d1017f,2024-05-08T13:15:00.690000 +CVE-2022-40218,0,0,3de3658f286ae76c9878bb9d8c127fed7745738ff159500e49559c3190d1017f,2024-05-08T13:15:00.690000 CVE-2022-40219,0,0,b00f290daafe970dd9a2d96c68c220d6aef2fb5d4b3533fc8231158cca1c9f55,2022-09-22T19:46:08.817000 CVE-2022-4022,0,0,b1531080342a1541d377df22cb8e9b2c299a211720859560e80cb74f74e2de1d,2023-11-07T03:56:43.417000 CVE-2022-40220,0,0,aefda2ad93fea5ab1d1535bfff5d1f23f6fd7af321bf1bee60f4c9e3c1e959d4,2023-02-02T17:20:47.583000 @@ -208262,12 +208262,12 @@ CVE-2022-43648,0,0,bdd9262c3bc11efb72013cc7895b70c85732c3dce34edf8a9d5912dc646af CVE-2022-43649,0,0,0a87f35670ab11ed7ba3a548795d36641100c4bd1dad68de11109653eb18c0e5,2023-04-06T18:37:24.863000 CVE-2022-4365,0,0,1852e2977e24c854a31a9df11d5dc6e0dfc7668a1c5c7b038970503352a6e237,2023-01-20T19:31:53.417000 CVE-2022-43650,0,0,915b098b5f13f8eaadcfa71658bd16c657272a7d2b0eca08378973d2655fc548,2023-04-06T18:37:46.767000 -CVE-2022-43651,0,1,8e4308cf1283500cb364395695cd353a89be45d5ebb791a86295492d8c69c633,2024-05-08T13:15:00.690000 -CVE-2022-43652,0,1,d74962f6eb609d18ade801721cb354bdcfd86326c925bdb66d7580d58622601e,2024-05-08T13:15:00.690000 -CVE-2022-43653,0,1,5413e82f80d30e22068f51ffc72b0d7c7f057df3dd1b120403ad570f1d08ed46,2024-05-08T13:15:00.690000 -CVE-2022-43654,0,1,de8187c585c0eef83bdf3f8a520ac6b636dcbd30ed2ad15befe25b62fc168b60,2024-05-08T13:15:00.690000 -CVE-2022-43655,0,1,c6400d1086cff4ba4a77dcef9144438ba34ec2f6060ff4f50af494cd0dd65348,2024-05-08T13:15:00.690000 -CVE-2022-43656,0,1,d9b357a17376d24305ac854eceacc16ee0459c9dec20db9df1e59aebdea4de0c,2024-05-08T13:15:00.690000 +CVE-2022-43651,0,0,8e4308cf1283500cb364395695cd353a89be45d5ebb791a86295492d8c69c633,2024-05-08T13:15:00.690000 +CVE-2022-43652,0,0,d74962f6eb609d18ade801721cb354bdcfd86326c925bdb66d7580d58622601e,2024-05-08T13:15:00.690000 +CVE-2022-43653,0,0,5413e82f80d30e22068f51ffc72b0d7c7f057df3dd1b120403ad570f1d08ed46,2024-05-08T13:15:00.690000 +CVE-2022-43654,0,0,de8187c585c0eef83bdf3f8a520ac6b636dcbd30ed2ad15befe25b62fc168b60,2024-05-08T13:15:00.690000 +CVE-2022-43655,0,0,c6400d1086cff4ba4a77dcef9144438ba34ec2f6060ff4f50af494cd0dd65348,2024-05-08T13:15:00.690000 +CVE-2022-43656,0,0,d9b357a17376d24305ac854eceacc16ee0459c9dec20db9df1e59aebdea4de0c,2024-05-08T13:15:00.690000 CVE-2022-4366,0,0,a73b27b189ffafd993f726a18e71a333c3a03fd5d6ed74db9e5e6da0f7f5be96,2023-07-06T15:15:10.590000 CVE-2022-43660,0,0,f4be19524560855b9acca8631d26d41a54a0dc2b41b0475637c3e7df271fa33e,2022-12-12T14:35:51.977000 CVE-2022-43662,0,0,c94c66f61778619c4675f0b29f72c8958f79e71f1b6836ff081509227bc42f03,2023-01-12T20:54:32.723000 @@ -219493,7 +219493,7 @@ CVE-2023-27318,0,0,4b557d087d889e8a68b0d6e103495a8af7301d02f420bf35baafcd7b8fb5c CVE-2023-27319,0,0,361240baf6163199a352b75919fdde2e3cd331e152206bea9eeb65d833be25e2,2024-01-03T02:24:18.600000 CVE-2023-2732,0,0,e6ae3fed49f77287aee8b9024664e6b99ed70688d5521a62d46378dd2694ede3,2023-11-07T04:13:13.630000 CVE-2023-27320,0,0,50bb51731b4dd6f4bb053c0c0f44829920be232907835206d2d1a9de0622e6b6,2023-11-07T04:09:54.090000 -CVE-2023-27321,0,1,3a70c31017de0e06cd0c44c94aadf1a4201f888d6966e3912ba5b1d287c306e8,2024-05-08T13:15:00.690000 +CVE-2023-27321,0,0,3a70c31017de0e06cd0c44c94aadf1a4201f888d6966e3912ba5b1d287c306e8,2024-05-08T13:15:00.690000 CVE-2023-27322,0,0,41af2c06fac92feb8df0e81204cac6d7b9ba1aec806a5677145a46170b52b1b5,2024-05-03T12:50:34.250000 CVE-2023-27323,0,0,6a2729b07ef3245b45a326d76896c33be30fd211e92f44198f5795b647d4e2c8,2024-05-03T12:50:34.250000 CVE-2023-27324,0,0,547cb3927c5d8c05690a62fcd13600df2209c003f4bd104333b7fe7a757672d4,2024-05-03T12:50:34.250000 @@ -225801,8 +225801,8 @@ CVE-2023-35744,0,0,df67bcbfbb16baf2b8445f9f20cb23715272e1e0ead1addb32883be084a90 CVE-2023-35745,0,0,7cf6a1507013b7aa83e9cecaf0998c3dee4e2e14cbeb467894edaa9f5133d103,2024-05-03T12:50:12.213000 CVE-2023-35746,0,0,aa9c17076dfa4c5c8a4607e866ac8d5ccf21cb29b88388ada09aa8d7ba85bcb8,2024-05-03T12:50:12.213000 CVE-2023-35747,0,0,b6c6a00a997e0a2b0a87f8bf52f72741c3ebbdffbd62ef30cc7c1bbba130e1eb,2024-05-03T12:50:12.213000 -CVE-2023-35748,0,1,4c3b7135c62ff40d3afe6ff9647ffccf6acac2e0900ade2e38082d5e448a89f1,2024-05-08T13:15:00.690000 -CVE-2023-35749,0,1,03f0c1977658a384a85a933af7f38097372b623e597d41019d59aa00f540e7bf,2024-05-08T13:15:00.690000 +CVE-2023-35748,0,0,4c3b7135c62ff40d3afe6ff9647ffccf6acac2e0900ade2e38082d5e448a89f1,2024-05-08T13:15:00.690000 +CVE-2023-35749,0,0,03f0c1977658a384a85a933af7f38097372b623e597d41019d59aa00f540e7bf,2024-05-08T13:15:00.690000 CVE-2023-3575,0,0,cb418c109da6ae5c3db4c1cfd49867dd6bedc2e2b3460bc932b1f4a8938017b2,2023-11-07T04:19:05.260000 CVE-2023-35750,0,0,0372fdf8be4a69445e10f831caaa306bdf1b02ee7c3b66fd6eda9263966bfcf6,2024-05-03T12:50:12.213000 CVE-2023-35751,0,0,0f50fad6b3b7a0459c70e86432b10bae4122d7443f7fb868b5171b5aea23331b,2024-05-03T12:50:12.213000 @@ -225811,7 +225811,7 @@ CVE-2023-35753,0,0,7a70e676378efbbb870d1f0f9a76ec3615e50d6acc096ee2d609d1af3ad17 CVE-2023-35754,0,0,1e0f0d78a4ecf1adaabb8f5a19739c526e2531fbd08365f73bd093b0b8394950,2024-05-03T12:50:12.213000 CVE-2023-35755,0,0,edf49f2a8ea8cf41eee80c59e4adebbdaada76c11859c81036e6f73b5c2a5af3,2024-05-03T12:50:12.213000 CVE-2023-35756,0,0,76696556b0e4ba9767b90a754c99636c8e6597c5e271095f546d8259220d87ff,2024-05-03T12:50:12.213000 -CVE-2023-35757,0,1,2eb1ed81b6cdbd4be6706f0031f503e2553199c4c017452ffb1406c7e84b5a9d,2024-05-08T13:15:00.690000 +CVE-2023-35757,0,0,2eb1ed81b6cdbd4be6706f0031f503e2553199c4c017452ffb1406c7e84b5a9d,2024-05-08T13:15:00.690000 CVE-2023-35759,0,0,737d089372a13d311d938b6f73fbc87604835ac5d6e732c4dc0dc97aa37b299e,2024-02-05T17:15:08.490000 CVE-2023-3576,0,0,afc3943dafc3dce0b127a1fe6f63cb13cec0d0d4331467a034b7ea0ef34bb624,2024-03-11T13:15:52.550000 CVE-2023-35762,0,0,d3d58c95cdc44cd1c3674a8efa00d524d00379a36ec6dd9b457951306765e9b9,2023-11-29T20:52:44.790000 @@ -226980,7 +226980,7 @@ CVE-2023-37321,0,0,7c383faa91513be4ead255891df748499b1447afff42ed1591b2a025cabe3 CVE-2023-37322,0,0,fb7a634b2d0f8ddc6d1ed4cf2afb5ad92cf97f2a13b8d335fb41696615c84711,2024-05-03T12:50:12.213000 CVE-2023-37323,0,0,0460568f5180ac29f059e52bdc148313fb27e1c6b06e1d04456c200acb66ff9b,2024-05-03T12:50:12.213000 CVE-2023-37324,0,0,7fcdc5f162f2d4b2b04e7d6795f31b50183891bc06d51062996d0f203c2804d7,2024-05-03T12:50:12.213000 -CVE-2023-37325,0,1,dea1514d9c11c6d5d4356a3c2588812a2ccc1bd6f08f64e8add2cfdb254c682d,2024-05-08T13:15:00.690000 +CVE-2023-37325,0,0,dea1514d9c11c6d5d4356a3c2588812a2ccc1bd6f08f64e8add2cfdb254c682d,2024-05-08T13:15:00.690000 CVE-2023-37326,0,0,0df6959df6e8982524522a10dc1d191985b3996ef1566d234e34302217acc9d7,2024-05-03T12:50:12.213000 CVE-2023-37327,0,0,90780d89452b29664e500b2739c0d60da7e932d962f7bc71d717dc20e4b5ac3b,2024-05-03T12:50:12.213000 CVE-2023-37328,0,0,25b4e136455ce1498a01d29129b6919e670d241d5aa8e2f9f70f42049455c17a,2024-05-03T12:50:12.213000 @@ -229468,7 +229468,7 @@ CVE-2023-40487,0,0,8babb802d8684ea3bd8f9f67c241c0f9f14e99f5d74d33b3dd3b9d36fd425 CVE-2023-40488,0,0,7f21d512cffd575a0b255ee798409fad47c0a840c0e08cb08274de3f5ba9ecf8,2024-05-03T12:50:12.213000 CVE-2023-40489,0,0,e64d33464be70f7e4501830d0597fb979910a11708f1acc1a44b3cf8dc8e2f18,2024-05-03T12:50:12.213000 CVE-2023-4049,0,0,71fae35bc5d304b4be264c850401392d3380077690fcdea8849d782905b00193,2023-08-09T21:15:11.627000 -CVE-2023-40490,0,1,e15b444a315d38da98c3a1d9a1624f8dae029dcbbd73cf4b751e8d0528064c01,2024-05-08T13:15:00.690000 +CVE-2023-40490,0,0,e15b444a315d38da98c3a1d9a1624f8dae029dcbbd73cf4b751e8d0528064c01,2024-05-08T13:15:00.690000 CVE-2023-40491,0,0,73976a6eabc49ccd31da65a633203c752cf2a8c25b805aff7ea6ac769479984f,2024-05-03T12:50:12.213000 CVE-2023-40492,0,0,1fda272f8f38bd4c92c81f3da6aa8bca351b2ccfb672ada5f5e3fc6b4efba7fd,2024-05-03T12:50:12.213000 CVE-2023-40493,0,0,95dbd3b6fb9e364aaa69cd65610d769b0fc7657ddfeff767ccaafb4904008488,2024-05-03T12:50:12.213000 @@ -229655,7 +229655,7 @@ CVE-2023-40687,0,0,3d5325cd240fff6828d190edc5180b5c0b1be7c3f0943dafebe093747f11e CVE-2023-4069,0,0,21c4fe7ce1f447c2893d0b683f06466646b5a992fd8ff8d7a5624190920b09a9,2024-01-31T17:15:13.707000 CVE-2023-40691,0,0,b19d0039b9d369e8da51138f6cbdcd9b571d7277a76106e34e44eadf845402b8,2023-12-22T18:29:03.297000 CVE-2023-40692,0,0,5d1534d4e7e21fa9390b98d81651d1d7826202f8500ba044c71064fec8968b6e,2024-01-19T16:15:09.330000 -CVE-2023-40694,0,1,0fa6cdbe2c00c431ec9d5a6bfbacf334a258182d521c89240f8842910996f304,2024-05-08T13:15:00.690000 +CVE-2023-40694,0,0,0fa6cdbe2c00c431ec9d5a6bfbacf334a258182d521c89240f8842910996f304,2024-05-08T13:15:00.690000 CVE-2023-40695,0,0,2bea21fe3c5416b457ba380a7e1a1c6215790bf723f762940cfae8bd3ab130bb,2024-05-06T12:44:56.377000 CVE-2023-40696,0,0,5cc23a9fc279a6ebb2e55081c25a1adbd79450799afb579e9da839d39db118b2,2024-05-06T12:44:56.377000 CVE-2023-40699,0,0,79bc213a5cd564549a74658337333acb19913662247889e9cab8e99673e71d45,2023-12-04T18:33:32.667000 @@ -230298,7 +230298,7 @@ CVE-2023-41646,0,0,18872d99f41225485498d9e8c2692d88ff9a8f83473e28d824a74d5f8abd8 CVE-2023-41648,0,0,7aba724c272c2df8b8df1a5d1668309227ee6a4fe293519e1f4c4824c288d64f,2023-12-22T20:46:36.737000 CVE-2023-4165,0,0,5b69fb5f32ae07ea85ff672c7ffd70f448ef951c413cd6f1090367a0a10eb99c,2024-04-11T01:22:22.110000 CVE-2023-41650,0,0,9301942fc8bae797416fce3a76261015bdf039ff60e62aca5237c480ffc103c9,2023-10-10T19:22:25.553000 -CVE-2023-41651,0,1,86b78991012b3ebea03de6aaab56373fe382ba23780a7a5d99ef61e2bc9fafc5,2024-05-08T13:15:00.690000 +CVE-2023-41651,0,0,86b78991012b3ebea03de6aaab56373fe382ba23780a7a5d99ef61e2bc9fafc5,2024-05-08T13:15:00.690000 CVE-2023-41652,0,0,fd70badbcd1f95421c8de96225f9166fcc4a236e21cd876cdf9c4c72509bc439,2023-11-13T18:31:03.343000 CVE-2023-41653,0,0,1a702717000197b0f80f8de0a045beb5c11fffa51b0d21f6eb81f9064866a1f6,2023-09-28T17:16:29.787000 CVE-2023-41654,0,0,b5bb5221e9e5cf15a520603d1385650d64de3086bf708eff528b6ccb1f9fe959,2023-10-10T19:22:19.100000 @@ -238498,7 +238498,7 @@ CVE-2023-6236,0,0,c746200290431ebe52c336c97f229880dd537f5eeffbab0aaed59ac6b0e48c CVE-2023-6237,0,0,d39862f419c6ec5c3793deb43c92a1a0aad502a73e1a347dcb18a61acce9047c,2024-05-01T18:15:12.590000 CVE-2023-6238,0,0,7332193d1454e7405dd3270d745aa7f762b874d0f84c51906784a637ceb0212d,2024-02-07T00:15:55.240000 CVE-2023-6239,0,0,6ce1b576ddd7c9169d0997e75fde3efd606153edbf61fba1116d733c98bbf90d,2023-12-04T19:06:20.213000 -CVE-2023-6240,0,1,c5033d7fe03cb9e41aeef2152afb93e522fc64264cea8994e31cac8161d5570e,2024-05-08T13:15:07.470000 +CVE-2023-6240,0,0,c5033d7fe03cb9e41aeef2152afb93e522fc64264cea8994e31cac8161d5570e,2024-05-08T13:15:07.470000 CVE-2023-6241,0,0,0b049661e1c37f8f2850456643594af3b5520aab1f0e1861b7e81cf1492260e4,2024-03-04T13:58:23.447000 CVE-2023-6242,0,0,6d69e67cbd815bd255adaa5950d4591e05a6bb1ed9a7b28e0dca7e7af1589ec7,2024-01-18T18:13:53.840000 CVE-2023-6244,0,0,738eadbc72f60cd69becd30725fdeeb14cb3b5c05736eda414dcb1a46832ac22,2024-01-18T16:13:00.490000 @@ -239351,12 +239351,12 @@ CVE-2024-0018,0,0,bb0a25fb19b9bf711b5002d2fc95b30c44dbd513c8d66774c21d649b174725 CVE-2024-0019,0,0,2a992db62ce12ab2ee987ae6d8596f1222c80c515fbedbed97a1af53d00222a9,2024-02-16T21:39:50.223000 CVE-2024-0020,0,0,10041dfbf81efabcaeebded3d09f521b1a43a499af72b2f92a5be41564fb243b,2024-02-16T21:39:50.223000 CVE-2024-0021,0,0,195598eeee803724595407e6749c18133eef4a41fdfa20e3801df52f8b02d210,2024-02-16T21:39:50.223000 -CVE-2024-0022,0,1,4a467d6471e95818a3d22a3a3b2b0ace1e955edd8938bf07362529e426c48b2a,2024-05-08T13:15:00.690000 +CVE-2024-0022,0,0,4a467d6471e95818a3d22a3a3b2b0ace1e955edd8938bf07362529e426c48b2a,2024-05-08T13:15:00.690000 CVE-2024-0023,0,0,71da3b12c0926fa4407d7d8b99e783afc4b3b8dca223802c3cbec4fc1454193b,2024-02-16T21:39:50.223000 -CVE-2024-0024,0,1,9695496faf21869ae27e24fd5804a5db62c0e4d48854b678bfad1ed86d21796b,2024-05-08T13:15:00.690000 -CVE-2024-0025,0,1,af2ba2278c83468f9c9ee0818a23ceb585092240fb112c4e6afc1134d6fd4bad,2024-05-08T13:15:00.690000 -CVE-2024-0026,0,1,e6a377fd8570a4c81be68a612c3de8ef2df46e27fc79072d59d489ce3a103b25,2024-05-08T13:15:00.690000 -CVE-2024-0027,0,1,feebb29267eef6b846e635c87d884020111a5d4fbb253c2894c96109d4c1ea4e,2024-05-08T13:15:00.690000 +CVE-2024-0024,0,0,9695496faf21869ae27e24fd5804a5db62c0e4d48854b678bfad1ed86d21796b,2024-05-08T13:15:00.690000 +CVE-2024-0025,0,0,af2ba2278c83468f9c9ee0818a23ceb585092240fb112c4e6afc1134d6fd4bad,2024-05-08T13:15:00.690000 +CVE-2024-0026,0,0,e6a377fd8570a4c81be68a612c3de8ef2df46e27fc79072d59d489ce3a103b25,2024-05-08T13:15:00.690000 +CVE-2024-0027,0,0,feebb29267eef6b846e635c87d884020111a5d4fbb253c2894c96109d4c1ea4e,2024-05-08T13:15:00.690000 CVE-2024-0029,0,0,095a39a40d263e89af48de4c6c2fad99c624ff9d4486c4388646dda629a45307,2024-02-16T13:37:55.033000 CVE-2024-0030,0,0,13b9ef30b4ddf3dc33f3691e1ffdf43744c22c4945c3db2bbc2cc35ea6de8cb0,2024-02-16T13:37:55.033000 CVE-2024-0031,0,0,4729fe791b13e496056e5a737d467f275a73408750b6410f5cd4e4a046530604,2024-02-16T13:37:55.033000 @@ -239370,8 +239370,8 @@ CVE-2024-0038,0,0,8798af074e75acf30506472783c98fe3ca6f9989b456036fb13460ce3a0660 CVE-2024-0039,0,0,eef2053d277ee92cf2426457ee1c3166f51184d93b11850784119e4a32b8f532,2024-03-12T12:40:13.500000 CVE-2024-0040,0,0,4afedb45d19d9a2df9a3ecdcf577c422a3b0751bcf061eb077253f060c2e8e31,2024-02-16T13:37:51.433000 CVE-2024-0041,0,0,4dc5cf8202a81389ba1711e9ab4229bb6c315c100ad135fbbcb3e9e75477a4a9,2024-02-16T13:37:51.433000 -CVE-2024-0042,0,1,54aa11511c3436154cc58982a9c29fd41c0a94a3fbbc291e5ee682eb8413416c,2024-05-08T13:15:00.690000 -CVE-2024-0043,0,1,d8662c3f376186d2afa8921d0f64ba917609cb5d50d7912e4139ecbce23b8235,2024-05-08T13:15:00.690000 +CVE-2024-0042,0,0,54aa11511c3436154cc58982a9c29fd41c0a94a3fbbc291e5ee682eb8413416c,2024-05-08T13:15:00.690000 +CVE-2024-0043,0,0,d8662c3f376186d2afa8921d0f64ba917609cb5d50d7912e4139ecbce23b8235,2024-05-08T13:15:00.690000 CVE-2024-0044,0,0,252052610b4ae0ffd4cf0806647555b0208a30970458880cb5d65b093fa59399,2024-03-12T20:15:07.633000 CVE-2024-0045,0,0,74be948ede2409dd1fced42dd7b971d5edcab5dd8de9a50e019ab3d0529aa80e,2024-03-12T12:40:13.500000 CVE-2024-0046,0,0,db8b26e423bc7f5764a0a6553823c47d2a6413b4d120bb9d62204abe423b4123,2024-03-12T12:40:13.500000 @@ -240215,7 +240215,7 @@ CVE-2024-1072,0,0,32fe471ba00a9e765c56a143079ee3e98644ebc38ce83029c2cc4a8bc24964 CVE-2024-1073,0,0,adaf97fc5155b3c580417fc4779c1ce9fb6459b581a763739c6822c5178eb839,2024-02-07T20:56:30.313000 CVE-2024-1074,0,0,633d4c34e54d562a3c8ef166e41f454bd743f2b77196fa371b31e3cbb9b84270,2024-03-13T18:16:18.563000 CVE-2024-1075,0,0,1a2b469e57d35fd84b679f6fccb1281a6feade2a72464af7e7a4de99488a9956,2024-02-13T19:43:13.480000 -CVE-2024-1076,0,1,5a9f9042e17a4f18255753cc0108cf3dbe7c5142f87a1141b1768f9f2a5c2e61,2024-05-08T13:15:00.690000 +CVE-2024-1076,0,0,5a9f9042e17a4f18255753cc0108cf3dbe7c5142f87a1141b1768f9f2a5c2e61,2024-05-08T13:15:00.690000 CVE-2024-1077,0,0,e9f68f289e9abed92d15ff856c2fcc321bbcef63d9600b92166ab0eb9a1d34f2,2024-02-05T20:49:00.927000 CVE-2024-1078,0,0,6c9dee916fa3df09a1f7e03c1b0577e56d8c16195545070c4376ae3f631ca16e,2024-02-14T18:39:51.437000 CVE-2024-1079,0,0,6ac7286a778516cf89549df1a9d53e18b60d41d010ca37479fb08260829225dd,2024-02-14T19:33:09.977000 @@ -240530,7 +240530,7 @@ CVE-2024-1434,0,0,e4e786f55d846b84af2540d68c957293cebce80ec0876b8df12d123ed18145 CVE-2024-1435,0,0,3d9157bea425ae0ccbf8fb80f8804820a71722fe736e6d6583f664e8ae632d19,2024-02-29T13:49:29.390000 CVE-2024-1436,0,0,6bc8b27a2ea5af40fccc1e92152c5147ee2de193867fde85be366aba07117a2b,2024-02-26T16:32:25.577000 CVE-2024-1437,0,0,95b845910a840a20b7fa4620989917eab09ec6f88cd90b7d076b0bb6f7afcc4a,2024-02-29T13:49:29.390000 -CVE-2024-1438,1,1,98e5f1d1b0aa2bcf2b5587462d47fc60c81d5c232fad2af007df499ad01e48d6,2024-05-08T13:15:17.563000 +CVE-2024-1438,0,0,98e5f1d1b0aa2bcf2b5587462d47fc60c81d5c232fad2af007df499ad01e48d6,2024-05-08T13:15:17.563000 CVE-2024-1439,0,0,111aa319a28b6612b690706c94ad9d813b84a022aa5a41258ea3f5bb43056ff3,2024-02-12T14:19:54.330000 CVE-2024-1441,0,0,f364258337462cfa80910faec94b096ae863c3d271a16626be7d0063c601ef00,2024-04-30T20:15:07.380000 CVE-2024-1442,0,0,d5be8c6d2acf818787220c68cc096ecac92494a9aeb2f3b78b57d2953e31d3e2,2024-03-08T14:02:57.420000 @@ -240924,8 +240924,8 @@ CVE-2024-1925,0,0,b15aa98b0592f9242d13916a80688f3bbf7b6d60030fd101a2b9d466d1a26c CVE-2024-1926,0,0,8773a8337f80e596bf6f4e6c01da1a317fcd71717c4b5292efe100c03e77fc15,2024-04-11T01:24:34.163000 CVE-2024-1927,0,0,272489f4addf45cf6bb38d4183c6459b672282a671714ea158eabbc383424da2,2024-04-11T01:24:34.247000 CVE-2024-1928,0,0,ce94ec63205e6aa85b5a559496f823814c1cb4c8bba251a028dd87a071a77e46,2024-04-11T01:24:34.327000 -CVE-2024-1929,0,1,3332c348abe2ec55e440f6248fed1a4ed270158e5658f7c88b1e6bb963ccdab9,2024-05-08T13:15:00.690000 -CVE-2024-1930,0,1,fdb59fca49fb5e54ea59db9c9eb6e43f53d3770fb02303c610334b8657eb9ae1,2024-05-08T13:15:00.690000 +CVE-2024-1929,0,0,3332c348abe2ec55e440f6248fed1a4ed270158e5658f7c88b1e6bb963ccdab9,2024-05-08T13:15:00.690000 +CVE-2024-1930,0,0,fdb59fca49fb5e54ea59db9c9eb6e43f53d3770fb02303c610334b8657eb9ae1,2024-05-08T13:15:00.690000 CVE-2024-1931,0,0,e71f7a88f68b5d3702fc1141e5fbdcf00d33a90e3791bbd349a9e1c6ddf3f008,2024-04-28T04:15:11 CVE-2024-1932,0,0,dfd6617a73caabfbfba2b5ee899213931b787c71ad6a77e11bae9543ad134a99,2024-02-28T14:06:45.783000 CVE-2024-1933,0,0,22dab3b8ed3dbdec751e3b3ea3557732635c7de83916428fa2e460c959fedb1c,2024-03-26T17:09:53.043000 @@ -241946,6 +241946,7 @@ CVE-2024-21780,0,0,d48d7051a12d6b86e075a9d1aefe4f65d2bdd55923d9dc3dc8a6a540d4a90 CVE-2024-21782,0,0,a54768f93a9b07a30680122b1877fb41eae0f01a5d667d71a8861ee6fcf71d48,2024-02-14T18:04:45.380000 CVE-2024-21789,0,0,065592bcd8c720a7bd60596f25729aa5b68a77a3a9f40afcc7521d9d3e39931f,2024-02-14T18:04:45.380000 CVE-2024-2179,0,0,ae7ec0d777d4f092532ca994d6b0860fc5ecc6f92bb84e39b0499b0a5cdf3be6,2024-03-06T15:18:08.093000 +CVE-2024-21793,1,1,8e503f45a5253e4068ac235bda3d34f56a956ccc1949447202434630f9e53347,2024-05-08T15:15:07.557000 CVE-2024-21794,0,0,5140601c591fc7e01c922f6b4426d49907b4278c42a623419c59c4c96fa7afa6,2024-02-07T17:15:44.653000 CVE-2024-21795,0,0,3f97d15b4fad76f44a86834312294b67e000044b0ba6ac0faa07d011642d4d38,2024-04-02T15:15:52.517000 CVE-2024-21796,0,0,ad6ea83e4ba68ed8909637d1ef7b65d12f04c56232c1b05d9173891b89591836,2024-01-30T22:14:16.247000 @@ -242218,8 +242219,8 @@ CVE-2024-22258,0,0,73834c066fffbf1ceac081ac0d8fd511b8fd9e870301a54667895cd45741a CVE-2024-22259,0,0,547e720795826cec4771fb96783f58d3e37f083da9aea1ec36ad1e3651ab2c72,2024-03-17T22:38:29.433000 CVE-2024-2226,0,0,ee8f1ca60db458688b285f09c24138ba2af43e7eda48e7abf64d7861f3a6fd0e,2024-04-10T13:23:38.787000 CVE-2024-22262,0,0,9e557bc78734cb2cf073f865dcae26aa42c53d7117f48641d9186f5ec0f03587,2024-04-16T13:24:07.103000 -CVE-2024-22264,0,1,96bdae8486634c5f71f7c0824f656da1157e383d5f4bd5d08e042b1398b50bf7,2024-05-08T13:15:00.690000 -CVE-2024-22266,0,1,00ca0b0bb686e5de0808c372a0dca387ad248949c8bb90b3dfb3008d90a00e7f,2024-05-08T13:15:00.690000 +CVE-2024-22264,0,0,96bdae8486634c5f71f7c0824f656da1157e383d5f4bd5d08e042b1398b50bf7,2024-05-08T13:15:00.690000 +CVE-2024-22266,0,0,00ca0b0bb686e5de0808c372a0dca387ad248949c8bb90b3dfb3008d90a00e7f,2024-05-08T13:15:00.690000 CVE-2024-2227,0,0,a04566641cf07b0256d6370713fe01392f720fcac34bba4d9533a8931d87226f,2024-03-22T19:02:10.300000 CVE-2024-2228,0,0,9da409d4c88fb5c41c04e34c5096b8810f55668a8720e19e0dcad976dea69ce5,2024-03-22T19:02:10.300000 CVE-2024-22282,0,0,53d62e993d25bddde67f64a9b7b05dfd45a21e7eb7c9bf0be8fb90ec2911d888,2024-02-06T16:55:19.983000 @@ -242866,7 +242867,7 @@ CVE-2024-2354,0,0,bfb745cc28a2103da071c6c9a02a91e2d148dfd7208d02f92e01be3195a8e6 CVE-2024-23540,0,0,5f2fc628eb81e8c82d87211152b074fc9fa203c38db7086bfb5e6e1436b136d8,2024-04-03T17:24:18.150000 CVE-2024-2355,0,0,f6c721310f82df9519580d017e8bf61029f8844a70bedd8de94b8b84e67d5aa4,2024-04-11T01:25:22.953000 CVE-2024-23550,0,0,233aa541fdda788f0e4e95c8a9a0a8f5d7fa7689dcd559af0cf5e5843a531076,2024-02-13T00:57:33.613000 -CVE-2024-23551,0,1,96a25e11351f4649a98a4c5ff5524cf1d9d2fddc8f277b1f892661e041d69491,2024-05-08T13:15:00.690000 +CVE-2024-23551,0,0,96a25e11351f4649a98a4c5ff5524cf1d9d2fddc8f277b1f892661e041d69491,2024-05-08T13:15:00.690000 CVE-2024-23553,0,0,51ea2d50cc1ff4dbab518de2a29e9ef6a91bd6b91073c23eb1a7f0cb7c8f1090,2024-02-10T00:59:00.423000 CVE-2024-23557,0,0,c1e3777f7706c5637c3babf0c39f0462f9d51e731fae3bfba6c8c968c64a983b,2024-04-19T13:10:25.637000 CVE-2024-23558,0,0,0e030b3ddee305097ecf13a5fc93f84821f79454ea82e12098abf6fd591f4cb5,2024-04-16T13:24:07.103000 @@ -242959,16 +242960,16 @@ CVE-2024-23688,0,0,07f47d429f26f5d25558115321368745a1af1492969a475a8855a8882844f CVE-2024-23689,0,0,d7d4e018343e45ab929852f091e2e71006911f05a5c0cdd59769a6f5a80fdcee,2024-01-26T14:50:45.023000 CVE-2024-2369,0,0,6a36576cd82a0efb1a6cf47fca1f81c4dce9d8f7b0632041d2d5bfbf236b9c0b,2024-04-08T18:15:08.527000 CVE-2024-2370,0,0,d585ae9ac856bf263bbb5fc87411ce61002d06f83e420348ba9623542805dbad,2024-03-20T16:15:08.270000 -CVE-2024-23704,0,1,b6e98937a05e8e3c54df94790ffc1b76a7a7dbc7d0f374847ce3c9bc63a138f4,2024-05-08T13:15:00.690000 -CVE-2024-23705,0,1,208f2921dda59fa7b14af1145627e3c7132ea207198825c4a670a9a509059f41,2024-05-08T13:15:00.690000 -CVE-2024-23706,0,1,ede5e9781e6c6ec2abcdffec573f476f646b6ee17b57168f8acd6e142b27a4f2,2024-05-08T13:15:00.690000 -CVE-2024-23707,0,1,beaafb205c308f17a4429b5bf78e5116812407accb95c86e274dcfc855a4d3d2,2024-05-08T13:15:00.690000 -CVE-2024-23708,0,1,944bf8e3b1bdd5dd13087e52b6bc0b12db4ce28387d3267bdede3aac1b86f48b,2024-05-08T13:15:00.690000 -CVE-2024-23709,0,1,7d7720ecbab15759adcb1691fe9ddfb28fe198373b1d1b7d71dfb9c0add8cd6b,2024-05-08T13:15:00.690000 +CVE-2024-23704,0,0,b6e98937a05e8e3c54df94790ffc1b76a7a7dbc7d0f374847ce3c9bc63a138f4,2024-05-08T13:15:00.690000 +CVE-2024-23705,0,0,208f2921dda59fa7b14af1145627e3c7132ea207198825c4a670a9a509059f41,2024-05-08T13:15:00.690000 +CVE-2024-23706,0,0,ede5e9781e6c6ec2abcdffec573f476f646b6ee17b57168f8acd6e142b27a4f2,2024-05-08T13:15:00.690000 +CVE-2024-23707,0,0,beaafb205c308f17a4429b5bf78e5116812407accb95c86e274dcfc855a4d3d2,2024-05-08T13:15:00.690000 +CVE-2024-23708,0,0,944bf8e3b1bdd5dd13087e52b6bc0b12db4ce28387d3267bdede3aac1b86f48b,2024-05-08T13:15:00.690000 +CVE-2024-23709,0,0,7d7720ecbab15759adcb1691fe9ddfb28fe198373b1d1b7d71dfb9c0add8cd6b,2024-05-08T13:15:00.690000 CVE-2024-2371,0,0,a8997ff43822803cbf539ca13b12874ecac2c50678484052b1886a13bb4141ef,2024-03-12T12:40:13.500000 -CVE-2024-23710,0,1,875b540c736db70688faac8a12bf84197a0fca29c77d660c89604a89a08155fc,2024-05-08T13:15:00.690000 -CVE-2024-23712,0,1,919e3319d1f664152d53fed292be330cd72f407fec402d411bcb187a93e318fb,2024-05-08T13:15:00.690000 -CVE-2024-23713,0,1,0691c897fc48ab427b9bc1671f8a76e244ad28c6f85b4df5ef0dd1573e78d54a,2024-05-08T13:15:00.690000 +CVE-2024-23710,0,0,875b540c736db70688faac8a12bf84197a0fca29c77d660c89604a89a08155fc,2024-05-08T13:15:00.690000 +CVE-2024-23712,0,0,919e3319d1f664152d53fed292be330cd72f407fec402d411bcb187a93e318fb,2024-05-08T13:15:00.690000 +CVE-2024-23713,0,0,0691c897fc48ab427b9bc1671f8a76e244ad28c6f85b4df5ef0dd1573e78d54a,2024-05-08T13:15:00.690000 CVE-2024-23717,0,0,6124f28576b39881108c8f8a6a5c6f0e66ec8c6ba51a289d578374ba7fe9cba6,2024-03-12T12:40:13.500000 CVE-2024-23721,0,0,4c5a2d52378f8e46ea724b0f797b6d954983df3d251eb4a27defb616bbf83240,2024-03-21T12:58:51.093000 CVE-2024-23722,0,0,a9b0a777e5fe6ce3139b9265b8428b51f6f9a472e3a11168445dfbf933d3ddd3,2024-03-26T17:09:53.043000 @@ -243535,6 +243536,7 @@ CVE-2024-2483,0,0,682c56b97d015c05c7ea646f5d7c8218367bfe51d46c303c40c0e16e3cd0bc CVE-2024-24830,0,0,0d9adea9164c18f7ff7989d5488b101c9a82392f2b7e4acf1331d044331cbf79,2024-02-15T18:53:54.370000 CVE-2024-24831,0,0,c84e178260bd3abff1690dc35c00a2b3b1eccfdb8ac833753e26fa86bbd36f7d,2024-02-16T16:22:00.857000 CVE-2024-24832,0,0,7442a4fba2f00ec0598b4c5e5afb5878a3ed7e240a66642725dee24340656d52,2024-03-25T01:51:01.223000 +CVE-2024-24833,1,1,f05d3344d5652b6b94d395eb49827e58eee9f8759e93c31985abe3750eddaa1f,2024-05-08T14:15:07.730000 CVE-2024-24834,0,0,f1b0afc5b1406c76028e9a1457aaaa7c9c4a1ab2208a1bb8ffbf62e150ea41ea,2024-02-15T03:16:47.957000 CVE-2024-24835,0,0,036d694eb9f3305dd8b127674f2ba284ec80fdae7e0031d0ac7d97b66371b4a6,2024-03-25T01:51:01.223000 CVE-2024-24836,0,0,ee629b5aec26f66dc40add401b90f57bfb13b9931b4b44678b51676d92007087,2024-02-15T02:40:53.413000 @@ -243926,6 +243928,17 @@ CVE-2024-25511,0,0,36990ea230f8e0295138374df895088f1be44b9af326906b2ad95eb8bb736 CVE-2024-25512,0,0,487e85c1efba2c219f7ab96f81a2282d8bcbf7dcfb1a58d12077094e43d2fae9,2024-05-07T20:07:58.737000 CVE-2024-25513,0,0,93bd4fc6036371c36be39d026b8c850f42962428d21b144f40c0e447c5572c87,2024-05-07T20:07:58.737000 CVE-2024-25514,0,0,38640653ba8f160458aa00a44eadb3429ad755b0b55104858ca21d629404a949,2024-05-07T20:07:58.737000 +CVE-2024-25515,1,1,85c8e54a584231bb6f4577a45d957673ff610c3a63094c02b71515449cb08a69,2024-05-08T15:15:07.780000 +CVE-2024-25517,1,1,f8998713716cb22b0e29876c68beff0b0523082e54b7c7821336906b48781b9d,2024-05-08T15:15:07.843000 +CVE-2024-25518,1,1,6cd463cc9fe041aa696858ddf42524f83b820a052f299d689c9f5d06c39dfb77,2024-05-08T15:15:07.903000 +CVE-2024-25519,1,1,3efa026769d792fa692d64237e3b1f77109b85c526662a999fe3f20a6c915f35,2024-05-08T15:15:07.960000 +CVE-2024-25520,1,1,f8201c937c04a0d30cab6d897128ea32fcc94d4aea4dd69a557f65a32311812e,2024-05-08T15:15:08.017000 +CVE-2024-25521,1,1,0bdbb758eec31a40c94a6f1cfa30e30ebf6e9552b1256a96359d34ced008400d,2024-05-08T15:15:08.073000 +CVE-2024-25522,1,1,ebe7d50ff147650b02943d7ba78a25a4186cc91d5934f5cfa4c851a63e81a62c,2024-05-08T15:15:08.130000 +CVE-2024-25523,1,1,a94280f6832c4ac7f9c34825277ea9b5c6bb7d21dc6f3cba44fcb9cdfe8558a6,2024-05-08T15:15:08.183000 +CVE-2024-25524,1,1,d846745bf4b12f650055faa37725c7daf56a31199b86928256d3ecb415d4f2df,2024-05-08T15:15:08.253000 +CVE-2024-25525,1,1,bcc0d44d9b1f076f15e25ee59e45e853ef891942ca41c51416bbd5af233fe91b,2024-05-08T15:15:08.310000 +CVE-2024-25526,1,1,20b2483d52fba5b39c6ee7536543d9745bdafbcd5615acac2d26f08c4bad99d1,2024-05-08T15:15:08.367000 CVE-2024-2553,0,0,eb7ced6efdb6fe86afb3f2317443a6426cb70bdf9ec8bc702fd587bbd249ae12,2024-04-11T01:25:27.517000 CVE-2024-2554,0,0,19388cc1a3622a95c4f2bac0ba7738d03fe03eea95bbda485b36a1780f948f91,2024-04-11T01:25:27.590000 CVE-2024-25545,0,0,8526ed8de9098a72565cdcc04fa7aedeb1b9a5c07e5de61b39c48fe6223c15e6,2024-04-15T13:15:51.577000 @@ -243936,6 +243949,7 @@ CVE-2024-25553,0,0,7897cd9b8668fce1d605300c650e28167f9921d03a4fde26bc34f4ebe4511 CVE-2024-25554,0,0,a87c08d7479e0670c1de7ac680e974b7c966b7f12d7b309312798a5acd199088,2024-03-01T08:15:38.107000 CVE-2024-25559,0,0,b710ef2f87d2510e81b25ebbc4243b848284fc64bfa4b8a44d47d25b0e965b42,2024-02-15T06:23:39.303000 CVE-2024-2556,0,0,5a3397ecc5fdef519ab75d3f33842b25dc006ffb41e1f908e35adb09560e9ffb,2024-04-11T01:25:27.740000 +CVE-2024-25560,1,1,5212feb610f6926efda1e74bc04cd7c47142ba08fc20fe69ea6ad6cc7e08bcdc,2024-05-08T15:15:08.423000 CVE-2024-25567,0,0,bbb8c64eb3dcee3e8e89951734f837d0c3bea66c11459a30529f4c9133593805,2024-03-22T12:45:36.130000 CVE-2024-25568,0,0,64eb53482937f270c14cf377745a1f7d8d5cbc3555eb58e76e7de7c26a9505c7,2024-04-04T12:48:41.700000 CVE-2024-25569,0,0,4638448a8546825fa9e00c3ff94a077ca9cbdaa5d8882a201d353ede23041668,2024-05-05T03:15:07.033000 @@ -244231,6 +244245,7 @@ CVE-2024-26016,0,0,225df2de732dbe1aa65450d758c74d9fd62d1571f14eb88fac267d40c0b49 CVE-2024-26018,0,0,f0a23aadd063ff7c7efa65bdfb2fba637cb4053fe19b3da7278a7f893beabdc7,2024-03-26T12:55:05.010000 CVE-2024-26019,0,0,fbe6a7f77deb15cc085d52bc5fe2b39474b81c363a3a1755ab2818a8be2623e5,2024-04-11T12:47:44.137000 CVE-2024-26023,0,0,03df4473c85ab0c8247169f36cdaabb6d0ade251a86d2a476e4dede57424f28c,2024-04-15T13:15:31.997000 +CVE-2024-26026,1,1,7453e5140765a794c806980b93e175082dfb907f2c6f6326c0de5f7769ab22cf,2024-05-08T15:15:08.623000 CVE-2024-26028,0,0,f0eeab6f00388b393e9761660fb13451fd75e54f8248c45c23f5d18cc79809b2,2024-03-18T19:40:00.173000 CVE-2024-2603,0,0,4c37ef52a7f3919b1ed75f79e6f53895a8c8809eb0619c9287c9e5b10ed97fd0,2024-04-26T12:58:17.720000 CVE-2024-26030,0,0,6e3023416b037dd092fe7b5e942072e3533649d1b2cfd157142cc39338fedbad,2024-03-18T19:40:00.173000 @@ -244541,6 +244556,7 @@ CVE-2024-26566,0,0,e082212a38f258b5c22bdd7daa5a29191a5e851b4c959cb2f66848d27d20d CVE-2024-26574,0,0,dcbd7ef017b2c94376d84166225aa21f7faefc7d209424b74f38bdb42fbf0b3e,2024-04-08T18:48:40.217000 CVE-2024-26577,0,0,eb994672bf510d158b4978f43b0d7e0594f22405d228a7c909ba4da4498cc451,2024-03-27T12:29:30.307000 CVE-2024-26578,0,0,631d617cd0985d9923eed32b0cb4b9e9025809830b6a3ca2ef1a468d4f2a7124,2024-02-22T19:07:27.197000 +CVE-2024-26579,1,1,72033f66020a56983373fd3c4d64584fe418341ce1b2e913ce65b0e85b1e59f6,2024-05-08T15:15:08.817000 CVE-2024-26580,0,0,e93e326bf874d6375913aabe9e4eb74306f223b50ee60aec567361b7229e49cb,2024-05-01T18:15:15.603000 CVE-2024-26581,0,0,6313645f513de26967acd9d6721419082a344ce45ec1a0cf923d928a6491861a,2024-04-19T17:41:29.470000 CVE-2024-26582,0,0,3ff5c496d753899c1fc1e8062e53c8f61453498de38167daf1346ce24125ba81,2024-03-15T13:56:41.843000 @@ -244918,7 +244934,7 @@ CVE-2024-26921,0,0,76d623900726b55efb66263c05dcf2e665a9ce9fb4f9ecc19bf3b35e90cf9 CVE-2024-26922,0,0,af76b1b0f3ab9ee10956791f730bd4870f5c1e7911748c677fba653e48abc0dc,2024-05-03T06:15:09.570000 CVE-2024-26923,0,0,da4573b83844f36cbecbdc77d107c82583a707415e7aff11d2f41c3052c0b580,2024-05-03T06:15:10.053000 CVE-2024-26924,0,0,f1745d5b13e99b2b6fe2577e278513d3ec9c9776eb98248608246c98329d345c,2024-05-03T06:15:10.280000 -CVE-2024-26925,0,0,9454200f70256d027955c429f9168d9e9350fb44e0e5b5b439cad7f6988e131a,2024-05-07T18:15:08.287000 +CVE-2024-26925,0,1,61d82bb84ab1f11ebda78632ac94a8e6e8b3f938a1962639db9167a8cafdfdeb,2024-05-08T15:15:08.917000 CVE-2024-26926,0,0,a92f86f9d106171e65901edda1c9fe34c87217de61e4b80a80c2e7bdcc5c3e47,2024-05-03T06:15:10.483000 CVE-2024-26927,0,0,84d28aa2d82d7b353955d491991b07be5f1f5eedde26b528784c0de359b7829c,2024-04-29T12:42:03.667000 CVE-2024-26928,0,0,356749b5efd3e51950b32012233c612b93e1c25f21b750fb61ffd2aaf8554d2d,2024-04-29T12:42:03.667000 @@ -245138,6 +245154,7 @@ CVE-2024-27198,0,0,e4259fe3d4611134ab5dfb0d4f88f5b563c21b8238f30b4253811838ad004 CVE-2024-27199,0,0,3dd3bfb58b796a8c7735f0a6f342852f32998fc13795786d35eb3d4375df0417,2024-03-11T15:15:47.663000 CVE-2024-2720,0,0,1e73fd7ceb3d6de541dbc5fc4c6f9e1db2be88473b780597a0d18540df181039,2024-04-11T01:25:34.303000 CVE-2024-27201,0,0,10d33bde6c72f02eeeb78886fe63b84ea9f8986232310509561963bb62431c7f,2024-04-03T17:24:18.150000 +CVE-2024-27202,1,1,ecd59f27fa3e1eee6d02a6fed492d725c0e4b623c9905b09ef7bef337a9d9a6b,2024-05-08T15:15:08.980000 CVE-2024-27204,0,0,31307da8b37d2876c0a574bcaca818758278f54e6ee44387e0d35b50299a386d,2024-03-12T12:40:13.500000 CVE-2024-27205,0,0,52855ef1396675bf7ce515be434e694f795d99891e26fffa6e36d6a889b1c72f,2024-03-15T20:15:08.703000 CVE-2024-27206,0,0,7a39e0c9f0f47b5a6e43427d7518d5d862cb34ba539b01bd0717056c4e6dcf42,2024-03-15T20:15:08.743000 @@ -245186,7 +245203,7 @@ CVE-2024-27266,0,0,f3ab0f27c5fbbc81843b4329fa53134d5b91174cad9bacbbc5dbf01cfacc3 CVE-2024-27268,0,0,5ee3875e7ce23e0a22f3973d639f8ec37762f6a4d7ebf553d0b8d456239df178,2024-05-04T14:16:02.520000 CVE-2024-2727,0,0,958214357d5cfc59c51fd0300fa3ab5e09b0479b417a5156cb98159538007f76,2024-03-22T15:34:43.663000 CVE-2024-27270,0,0,90fac36f214c0b31b291ee9cc7c1398845637888710e65e72962c5636284122e,2024-03-27T15:49:51.300000 -CVE-2024-27273,0,1,121e1276bc15459b31678ff1a9bdce8a08ac88a34e7ab9da955a5958c30154f9,2024-05-08T13:15:00.690000 +CVE-2024-27273,0,0,121e1276bc15459b31678ff1a9bdce8a08ac88a34e7ab9da955a5958c30154f9,2024-05-08T13:15:00.690000 CVE-2024-27277,0,0,6c09ef572e665868238fb6d81d7d941702112e8d7fb954bfa230fe4edfeb437e,2024-03-21T19:47:03.943000 CVE-2024-27278,0,0,2ef9546b6eb3a76ad70be700186038d995dd630654759ed72b9b3d10968f6d39,2024-03-06T15:18:08.093000 CVE-2024-27279,0,0,a0a465925dfcee0f633443a4d3db070f2bf023c10d4135b020d1a0fbe76c5a4b,2024-03-12T12:40:13.500000 @@ -245287,7 +245304,7 @@ CVE-2024-27453,0,0,cd1a7b85d4587bfefcd89bf35294964a1d211509b3fabcc9d2dccae653d97 CVE-2024-27454,0,0,6d3a09532b89ef204254e66da503964dcbafd450b5bdda0990f449d144c8e54b,2024-02-26T16:32:25.577000 CVE-2024-27455,0,0,2d941179924c9f77cb732b35f1b7b9f5792b70ca51de1e84f09167eb77852176,2024-03-26T16:15:12.263000 CVE-2024-27456,0,0,3292722b93148b4ab52923fa8e4498babe5b306f79794afb1b6b9f9d803c4911,2024-02-26T16:32:25.577000 -CVE-2024-2746,0,1,1b5368899c557a576ffe86c7e7b79d4b6baeb106e8e490e5cd11b765b982c384,2024-05-08T13:15:00.690000 +CVE-2024-2746,0,0,1b5368899c557a576ffe86c7e7b79d4b6baeb106e8e490e5cd11b765b982c384,2024-05-08T13:15:00.690000 CVE-2024-27462,0,0,ffc1613a8162349f9e85ee9ce86cbdc5073a2092a76bc9fd14c2d891290e403c,2024-04-14T23:15:45.830000 CVE-2024-27474,0,0,eedd7f52a8e754286d0994212e940bbab5a78ce0f631ba173f8be2320f55c67f,2024-04-10T19:49:51.183000 CVE-2024-27476,0,0,8cccfbd88a289b73ae2a82f1969e7e11b3256be620bf6a323e970ad5fee54963,2024-04-10T19:49:51.183000 @@ -245599,6 +245616,7 @@ CVE-2024-28128,0,0,ef4664596358b3dc6747b9cba3aab3612190b1b010cfc8ac1373f0312ebe3 CVE-2024-2813,0,0,3865aecff2b91b62589698cb7c5e00900ba25735c720a1f987c1446276b2b657,2024-04-11T01:25:37.367000 CVE-2024-28130,0,0,cbec5f7662fe045bb02cd420ce819fd5bf0b6932c239a81cf021f71390340ca7,2024-04-24T13:39:42.883000 CVE-2024-28131,0,0,71ad2488de19c24d1ea9f5cf9bb09689eb95070aa628709b8cf1a59fb2b5934d,2024-03-26T12:55:05.010000 +CVE-2024-28132,1,1,e1e957ff15e140805c5e801a3628b7634e3b21c473d476e5b3e24b716c491bbb,2024-05-08T15:15:09.183000 CVE-2024-2814,0,0,5e97abae59e20490512eaa4d4563fb81e8669546976139cfba889d604f681692,2024-04-11T01:25:37.477000 CVE-2024-28148,0,0,dae8adaa9a9f352e6ec75654d798899599fff5056d36885fb288ef42e72a3322,2024-05-08T09:15:08.620000 CVE-2024-28149,0,0,41104aad52a41f735bff830317158bdc9ba92207034c216d3619939dc1f50d3c,2024-05-01T18:15:16.697000 @@ -245825,7 +245843,7 @@ CVE-2024-28589,0,0,0bbfba634be0a6220fb48d12550a4d1e9192f3d277848f34860717c51da56 CVE-2024-2859,0,0,815e8dcdbaea58414fdcd79cdf68569eba0b4de72a6cab4f785b8ad0b30ed870,2024-04-29T12:42:03.667000 CVE-2024-28593,0,0,12e50d1047d9408aca5b77d1096e4a71cda0fba8e4dc35d15cd483b7f871d0cb,2024-04-11T01:25:10.400000 CVE-2024-28595,0,0,542734c5d7a6316ed6be596eecae4717d67621271c4b97cd461c76a709543cb8,2024-03-20T13:00:16.367000 -CVE-2024-2860,0,1,848e87a843db1b43e30fcdf29537e9a17cd2aded1859da70c487ffc26ec541ae,2024-05-08T13:15:00.690000 +CVE-2024-2860,0,0,848e87a843db1b43e30fcdf29537e9a17cd2aded1859da70c487ffc26ec541ae,2024-05-08T13:15:00.690000 CVE-2024-28613,0,0,bda4150312b2b3b79a305a8c0a3aeb6013ca159f1baaa84b69f3b052dab94ea7,2024-04-24T13:39:42.883000 CVE-2024-2862,0,0,a714f5e8cb944f65576648fcdb042cca021906895d812cc8cb0301d4fdfba94b,2024-03-25T13:47:14.087000 CVE-2024-28623,0,0,972befedc73e4c4f8bdd2f8c4cf61d42fcf307bb5ef2beaaeb5c62226e79d63e,2024-03-13T12:33:51.697000 @@ -245926,6 +245944,8 @@ CVE-2024-28870,0,0,0cf8b42440c9130608dacb5605e29ce5ef5a35c267c5a5fa0e99bf26d2d01 CVE-2024-28871,0,0,afc28d49a83d8eabefecf413603caf0043f414fa513c9500837e2c75462e6216,2024-04-04T16:33:06.610000 CVE-2024-28878,0,0,fe5b4dea6079affbe530b6afc0ec6cbc2c58efa98e54aaf61e9565b0ce4541ce,2024-04-15T13:15:51.577000 CVE-2024-2888,0,0,e48cc71bf8d96ab718c88bf59dd81f25047204b13c0446dd48014e6c60fc42d9,2024-03-26T12:55:05.010000 +CVE-2024-28883,1,1,b11156b41f6b1ff6e3ff92213af684ada9e592b35095dd9c08d2502710c4402d,2024-05-08T15:15:09.380000 +CVE-2024-28889,1,1,83e698f4455b3107ed49f7bd5d8d5d50741f723e21f11de59ecf8a9bcc2532a1,2024-05-08T15:15:09.590000 CVE-2024-2889,0,0,047900621574a9797901d8767443e859750a2765d7b4c1f50c805ec45928b2d3,2024-03-26T12:55:05.010000 CVE-2024-28890,0,0,9dae4a32452d4c238c84193167d3f8528617bb8ee93882e0c116e3ba82982853,2024-04-23T12:52:09.397000 CVE-2024-28891,0,0,d3e45bd47b45b967827b685dc5aca79c502a599b4c4b2ae06f1259844016862c,2024-03-22T12:45:36.130000 @@ -246775,6 +246795,7 @@ CVE-2024-30455,0,0,115244366736fad049cb2d568fd37bcd1f9387962814ae164a94d7f893776 CVE-2024-30456,0,0,58b7f6d9df0133114222c028c59aa68a983be02157b04b25b467f54970276f3b,2024-03-29T13:28:22.880000 CVE-2024-30457,0,0,0e1a5411ec4ddd12ef39ffb10d5b7f249bf382292e8158c3b3ccafeb0f7acbcd,2024-03-29T13:28:22.880000 CVE-2024-30458,0,0,138b6d21084a1b9981d25ac0a20e6d58c8531b97987312f29ce581613992ae6f,2024-03-29T13:28:22.880000 +CVE-2024-30459,1,1,35e11e77078005c8c409b09bd879a757f7bd6f4571a1865c425a82358f4c83a1,2024-05-08T14:15:07.923000 CVE-2024-3046,0,0,f5e052c1ea891df75a0fe667fc4295d772a2daf5c23e7fc1339c4348c40758b9,2024-04-10T06:15:07.253000 CVE-2024-30460,0,0,60239bce124e04867e82f31e5cfb960c5f3a93584351525e2543cdd96d5ccb22,2024-04-01T01:12:59.077000 CVE-2024-30462,0,0,d59392c9106e622ed8a8be18c11749718bba226bfa2a23231020ec7d96976f3a,2024-04-01T01:12:59.077000 @@ -247123,7 +247144,7 @@ CVE-2024-31109,0,0,3766de0285c03422fb77f1fd2a4106a3e09e42f3bd086e20e704d883507e7 CVE-2024-31110,0,0,cc696090cfd929541a1ca3b42d624a66dc89644b2049217890247603bee15f04,2024-04-01T01:12:59.077000 CVE-2024-31112,0,0,4c0b6d124815c5fbc71413fa9db9ceb5adb5efe4d3f57754f8397ffa9f3c1ac9,2024-04-01T01:12:59.077000 CVE-2024-31114,0,0,2db2f19bbb762fd0846a2fd0f4c21316984760b44cf0e285d2fa1b7eb4e97fa5,2024-04-01T01:12:59.077000 -CVE-2024-31115,0,1,f67bb2935cdc482183cf83d729450e227d4215d9791e6eef39eb5dd63dc4ee92,2024-05-08T13:15:07.937000 +CVE-2024-31115,0,0,f67bb2935cdc482183cf83d729450e227d4215d9791e6eef39eb5dd63dc4ee92,2024-05-08T13:15:07.937000 CVE-2024-31116,0,0,3e5261af5d77a4c950ede646e6aaa3b3de701ce47018fc260e62e0781699fc7b,2024-04-01T01:12:59.077000 CVE-2024-31117,0,0,f06fda643bf8c516426ab572b27573cbf6214c3aa5f8b1df27ac2265745b81dc,2024-04-01T01:12:59.077000 CVE-2024-31120,0,0,7340f0aa8567a325d352b7087d6dd0d44e3a1e7ab597204dd16dbc0e323747bc,2024-04-01T01:12:59.077000 @@ -247137,6 +247158,7 @@ CVE-2024-31137,0,0,d8c60b512e3cd344cbe0e7070d591f251aa086e93689a00f3d05728c7eb4b CVE-2024-31138,0,0,80619d8b23ffb923a4bb521ee1877f29e2a086a5161850672cdc2424af6c6396,2024-04-08T22:41:43.087000 CVE-2024-31139,0,0,6254efb24474a93bf19fb224a952376f20b94666e671b313ffb9fb5d6ba4e123,2024-03-28T16:07:30.893000 CVE-2024-31140,0,0,8ac72cdd6b5f7f56e71e87459ff46ad8714fcc8b963def523c845a786f9f62ca,2024-03-28T16:07:30.893000 +CVE-2024-31156,1,1,f8e6ab52f4d541105e93e50105da007b9790407e8d5a5db424334e62cf8382b2,2024-05-08T15:15:09.790000 CVE-2024-3116,0,0,398207d2760952c7d30e8a692022e3a890986df7c49b38076f15d6ef6a9e4edb,2024-04-23T02:15:48.310000 CVE-2024-3117,0,0,5cfd272187006d856ef7162243290045436f0b0b42109be53aee5ea008fdca8a,2024-04-11T01:25:53.827000 CVE-2024-3118,0,0,9600b12c1bed90a06c567891d64400576dd46ef84328956c7b0762f081c0594a,2024-04-11T01:25:53.910000 @@ -247193,6 +247215,7 @@ CVE-2024-31265,0,0,73b53303ea2aa4510d95cf2e30536090282921bee1e4ddf1a7938462135cb CVE-2024-31266,0,0,f7171832f2bbf1c48f48a13e14cce15186ad868f1fa9f9b4e6a38a27a645802a,2024-04-25T13:18:13.537000 CVE-2024-31268,0,0,c260b292f4a0557333471e9a298a56aee0f8adfc83aea133a9470b069de5a2b5,2024-04-15T13:15:51.577000 CVE-2024-31269,0,0,d795c0acb6cd496e9d563a25767f3786288bcffe37844eb18ef033fe012b3b5a,2024-04-15T13:15:51.577000 +CVE-2024-31270,1,1,66bdfdfc48b5b34cc2c92c9655d58c7fa17ce37d3684862913380d1b2925663c,2024-05-08T14:15:08.117000 CVE-2024-31271,0,0,d8228662c1440f14ee742f57032f82398c2055e3f352f6a0fc3cc42050b1d28d,2024-04-15T13:15:51.577000 CVE-2024-31272,0,0,cd2f0ad40b656f4b3504a130655e8227ea71f55dca7e33bbe56d00f117fbeb5f,2024-04-15T13:15:51.577000 CVE-2024-31277,0,0,6d9f95169e2f33c46b0cc3384ba6f4f8c5335f74523b1231fd7b9d9c4e3271a9,2024-04-08T18:48:40.217000 @@ -247518,6 +247541,7 @@ CVE-2024-3204,0,0,2a2a133d829052d72380a6f7a45e32f6ecd96ec6da65fdbadcbe92a1f79d77 CVE-2024-32040,0,0,c9e8a9bafebd4e002463be520ee967b3c928ddf4cec6865e7aa23fa1d81b2834,2024-04-23T12:52:26.253000 CVE-2024-32041,0,0,e88f61c8c702a5d00724562a1be23c2ca0fc9ec03e84f95db2dfed035982cfb4,2024-04-23T12:52:26.253000 CVE-2024-32046,0,0,3771b70436f95435fc521db21da6fd859bb3ed607b3e6e7edd188445267746f3,2024-04-26T12:58:17.720000 +CVE-2024-32049,1,1,b94a24b0b23a2f488c11ba182406872c38e4f15261e3934a160da59783b9672a,2024-05-08T15:15:09.987000 CVE-2024-3205,0,0,befb48df2bb5e20af3b4383c1ef82865b9f9fb3145e096ffb7e0098ff096b4f8,2024-04-11T01:25:56.010000 CVE-2024-32051,0,0,6b68078466255ceca82525e73c2bf321431fb4aeacd1939a9b40ac3cfa9637f8,2024-04-24T13:39:42.883000 CVE-2024-3206,0,0,4f66dc84e4a326417e01236d129b8e00324e4f8f4b544443bf63c69a85f69c50,2024-05-02T18:00:37.360000 @@ -247557,6 +247581,7 @@ CVE-2024-32108,0,0,950a29a68ef37c40439ae0dcf3c3d4b039242eaece664c349c7d4089e193e CVE-2024-32109,0,0,4ab4248625b2b88c43ecf2bed644e80e80c54bafb94ddc41cebae0bbd84f78ff,2024-04-29T09:15:07.707000 CVE-2024-3211,0,0,d6d8ef851a76d01f08b13c4c6093534cf0125e4133f007b8f3a299cb3bb38192,2024-04-12T12:43:46.210000 CVE-2024-32112,0,0,2df62c2ad1478d07a612eff17f984ad78c51d3b47027012c1c38076227812cd3,2024-04-11T12:47:44.137000 +CVE-2024-32113,1,1,24d20595f33dd2e7d018ed8dac09191bb93c497144e8b8d579ad173db490c8b7,2024-05-08T15:15:10.227000 CVE-2024-32114,0,0,f86e794836506b6f3debc92c788cbea6d342740812ff0770c4838ed0614d76f2,2024-05-02T13:27:25.103000 CVE-2024-32125,0,0,df49ac279a5dab5894d2cf46d4df920e793fb77c32b1360bd4eb9ce6cc4c2bcb,2024-04-15T13:15:31.997000 CVE-2024-32126,0,0,03bbe2b7a7bd325cdda583bb7823f2b70916aad3961fcbd3bac07e945035870f,2024-04-18T13:04:28.900000 @@ -247864,7 +247889,7 @@ CVE-2024-32662,0,0,cc82e255660f76e8294a012a16568aaf2fb6ae82fd6edb9a95574f4ae5e4e CVE-2024-32663,0,0,63ceaab581055a3d9a9b8c8792c2fbb320ea717f7ea9a74b5dcef8cec26756f1,2024-05-07T20:07:58.737000 CVE-2024-32664,0,0,1f356e6ff19a379eb7e5d2f904c065cf238ccbf66a59d74313de573a133634e5,2024-05-07T20:07:58.737000 CVE-2024-3267,0,0,00a210ede7a73ca33b64d3b8a0e382509d5bafa34ae84022125b180763aee2bd,2024-04-10T13:23:38.787000 -CVE-2024-32674,0,1,96f59a78cffb2c821be18a303b9da0d3f816839c22dca4209a77529199edce40,2024-05-08T13:15:00.690000 +CVE-2024-32674,0,0,96f59a78cffb2c821be18a303b9da0d3f816839c22dca4209a77529199edce40,2024-05-08T13:15:00.690000 CVE-2024-32675,0,0,87b463967c2204618d7e556d0f9b434f519dfbe770ec74ef985201062de7ccc7,2024-04-24T17:16:50.397000 CVE-2024-32676,0,0,3585205cf50aeb554d2a389a3c92c05231728f39aed4a3ec7d0a9db1453b1c81,2024-04-25T13:18:02.660000 CVE-2024-32677,0,0,b2d5b21c6c0b64a6ef3d2bb5d4a7fb394174b9e010ebfad39ee101d085a71d44,2024-04-25T11:15:46.440000 @@ -247910,6 +247935,7 @@ CVE-2024-32744,0,0,1b7d2f5284e3100bac5a22aa75dd41934cf75bbb03b5daf27a5bf3a3b911d CVE-2024-32745,0,0,7c7ddc449e8c742cc889f2211c73cf5b3fd566001a852588319e29620ec0008a,2024-04-18T13:04:28.900000 CVE-2024-32746,0,0,15529f833c25b7b5b5022877593c49d5afec10018bbf65b56334a694e0bc455a,2024-04-18T13:04:28.900000 CVE-2024-3275,0,0,911ea91aef7f88befc82f4227a09867c3c1d7c5e1f1eaf9e7dcf15d1eb26a443,2024-05-02T18:00:37.360000 +CVE-2024-32761,1,1,0d8c041084d5273dcaf584c946bad9c126a0ef128138a2a6b6b88a14cfa42a74,2024-05-08T15:15:10.330000 CVE-2024-32764,0,0,bc3d072b957e003e653de0b420ab306da82665736b4d7b512b364e6134049d7c,2024-04-26T15:32:22.523000 CVE-2024-32766,0,0,7119553a94fda386a48677f0171c3a85e12acf48042d943380d9db048f166a25,2024-04-26T15:32:22.523000 CVE-2024-32772,0,0,2d4fb680b13b3176b160b34c5ead370c8635624f7414f557ffce882457014cd9,2024-04-24T13:39:42.883000 @@ -247967,6 +247993,7 @@ CVE-2024-32881,0,0,a69d7f9beb676365acef6aaf3810d23c9ee7ac916fc4e9b8b59f337998d4f CVE-2024-32882,0,0,5274fa89ec3421b5c11bab925ea13ca1712a5851453fd229685e139cad05710c,2024-05-02T13:27:25.103000 CVE-2024-32883,0,0,e2e880e0de452420192927c1f1d12c9c36baa1369f4d1c0ab4e6cde1e002abd2,2024-04-29T12:42:03.667000 CVE-2024-32884,0,0,06add33b7e931ee07e2f51e4a86646fd0a9c5d7e5967928a204325c2528e5c2e,2024-04-26T19:59:19.793000 +CVE-2024-32886,1,1,3b9eb74f36f71837a6b682dd80fea8318a558b6bc8b40f39b33b40c70bfc2b96,2024-05-08T14:15:08.310000 CVE-2024-32887,0,0,9a0b5c279911d37e81f985d5cbe7f0510b3ecf67815d6d232314f8cb4e8f94aa,2024-04-29T12:42:03.667000 CVE-2024-32890,0,0,80b53d257dbc47827b967a6ec22fc70e9bb39dae5de4579c97bb47ad58884e95,2024-05-01T13:01:51.263000 CVE-2024-3293,0,0,3552485a27a6b6c8b2cadd17fbdb3e630238722099a3e2d8d97b0f239cd2dc1a,2024-04-23T12:52:26.253000 @@ -247994,6 +248021,7 @@ CVE-2024-32972,0,0,5937a84a65773c5e3fbf207041e07c28ee92384b1ea5fdf94ab9ab961121a CVE-2024-32973,0,0,c022c9f4134f1adead82c1b269e30d0c14622c1fcaf8b6997a4d5a316715d39c,2024-05-01T13:01:51.263000 CVE-2024-32979,0,0,415a3504af4253fb9330760c79feca97e4169fdf22dd7f9c2c9ff0e4f9c129df,2024-05-01T13:01:51.263000 CVE-2024-3298,0,0,35145d829af4d19541380a93e6723503e514b69e11aa4b007b05099610c37f21,2024-04-04T16:33:06.610000 +CVE-2024-32980,1,1,0951a382ff0fd365dfc3eb638de57bfcfb828f3192ad40e643095eead459e715,2024-05-08T15:15:10.530000 CVE-2024-32982,0,0,cccb00c23d7b545c6bc74a2356624cd9a0d0d2e9e8f2661f68a558928cf51708,2024-05-06T21:15:48.373000 CVE-2024-32984,0,0,c1781ab02b497f7ad9edbf8a8951c53661ebdb78ecb66c7cf14dd96168971cad,2024-05-01T13:01:51.263000 CVE-2024-32986,0,0,b404a42958c3dfcc24f18b47a69c095e379b00c067dc9631f47ed1d9304ece33,2024-05-03T12:48:41.067000 @@ -248158,6 +248186,8 @@ CVE-2024-33566,0,0,46d17e7fcf76ea9cc29b76ef68ee9038fd04b7d980a772b2f399515ebb8e8 CVE-2024-3357,0,0,4504c33b3bb653378795a255a83c05295c4cb93d37914e6c8a1edf8397686b85,2024-04-11T01:25:59.530000 CVE-2024-33570,0,0,0537b9c72bfbf1655961ce253b4489c4b95e74d24416659de6615e2bf1c6b703,2024-05-07T13:39:32.710000 CVE-2024-33571,0,0,7491ee4b5721aac2bfd880f448bc941e8fa61c24acdbbd5222ab9b2cea79a689,2024-04-29T12:42:03.667000 +CVE-2024-33573,1,1,ac61cc3ebd489322c415b628f4e8eddbd5c01b89ef17c5da55c59770ead5b620,2024-05-08T14:15:08.523000 +CVE-2024-33574,1,1,42b46397cfc2829b03cf6a789e780ff39350a3cbb9ab853345a11cb1e34066be,2024-05-08T14:15:08.713000 CVE-2024-33575,0,0,ba650f18eda31a51989bac6516ae56cab367e4b24de4dc251d448b46a52e51ca,2024-04-29T12:42:03.667000 CVE-2024-33576,0,0,afeccf39ea64ea858ce0f73e9ac8d3f7813955ee6b94e1666af6f7ba451357db,2024-05-07T13:39:32.710000 CVE-2024-3358,0,0,694a0960c89fb254bc37c7c2f594e5cb197e9c3b955cd9433f44c414aff75d2b,2024-04-11T01:25:59.610000 @@ -248182,7 +248212,10 @@ CVE-2024-3360,0,0,2ffbaa301c04a2d62013f221bb69a21a0f4034a97959f93c6ac130d96a9162 CVE-2024-33600,0,0,392d663a20e37ea99d531b2d1494f9731213af52e8d86eceeba8709856ff36b8,2024-05-07T13:39:32.710000 CVE-2024-33601,0,0,677e02c7b9a7354d12f1558cb835f8d17e5599681a196d853572e599231ef4d5,2024-05-07T13:39:32.710000 CVE-2024-33602,0,0,15d94cc4914bd563b5cebd7d733d131cd923c30c1c31fb52ef556530a056ad7c,2024-05-07T13:39:32.710000 +CVE-2024-33604,1,1,aeaa4aea30a25fdb25e337437e4513b6bd0e9ec0305f9cb6d86872360c8e16f8,2024-05-08T15:15:10.733000 +CVE-2024-33608,1,1,1eb408b24400baae1d061b646fdb6038f6f79e320fd21b6dd67246df8b702a05,2024-05-08T15:15:10.930000 CVE-2024-3361,0,0,c120caf4947180a69c26140d9354a0af916b072bcc15573944dc923bbf223f7d,2024-04-11T01:25:59.847000 +CVE-2024-33612,1,1,2ce9126000c293500d697a3712215b0aa640d59962b2277dc4b77bd5204a609e,2024-05-08T15:15:11.113000 CVE-2024-3362,0,0,4f698660b915c64322658e8738d0fb3f09460cf98fd487b3189e8f9d96e2b2c1,2024-04-11T01:25:59.930000 CVE-2024-33627,0,0,46d1ca344f6adedbf698f1c5642ffd1e81c65d9ee122179e4726e5c233352e37,2024-04-29T12:42:03.667000 CVE-2024-33629,0,0,9c289386a90a37d7a3105c6378e86670a64a304277cc6973b5fc7ab9cb833007,2024-04-29T12:42:03.667000 @@ -248392,7 +248425,7 @@ CVE-2024-3425,0,0,0b502b5fe56c141fc6aaa3ded71e217f218e1c6fcf28e8e0142e3542789425 CVE-2024-34250,0,0,26e21f2bb01a57acf78e728eb5d9f3c5603451355511d5ba33182a62d5e78195,2024-05-06T19:53:38.797000 CVE-2024-34251,0,0,74f3f22bcb4835c3e235b981a0ef23d39df6ae8f5972284fca2feabee345728d,2024-05-06T19:53:38.797000 CVE-2024-34252,0,0,00f099c2475d0a549ea8547eb6ad8d068470fc0abe3ed5b882b055d8806f95cc,2024-05-06T16:00:59.253000 -CVE-2024-34255,1,1,ee350c63effad23ae3a0aab2930d2dfb38f6c069dadf7ea6d06ddef1d4b08ca1,2024-05-08T13:15:17.563000 +CVE-2024-34255,0,0,ee350c63effad23ae3a0aab2930d2dfb38f6c069dadf7ea6d06ddef1d4b08ca1,2024-05-08T13:15:17.563000 CVE-2024-3426,0,0,420411016bf478ae85cc2a4f27037eb2ff47235b4f68d61b15fe1ac7cc727921,2024-04-11T01:26:01.757000 CVE-2024-3427,0,0,4fd695df226b35a5776d38ab2775e26c898b2763a8bf7883f6b39f5ee92452ea,2024-04-11T01:26:01.840000 CVE-2024-3428,0,0,50915d543bb4362075920ac47216610e54188a7796ff3aa0592e5ad1754de0f3,2024-04-11T01:26:01.917000 @@ -248405,7 +248438,8 @@ CVE-2024-3433,0,0,9daf2209e24504628b986e1f65ece6eda07fd4ab55bdd47fe9779359663e71 CVE-2024-3434,0,0,954da8a67c7ed83cd00d8f12a08610158a6b6e85c4d2c5bfe68c69ad1cf2e22e,2024-04-11T01:26:02.303000 CVE-2024-34341,0,0,401915f472d8b560762fae9a3c4d0749731347c66e7bd00518f3019ddfe821fa,2024-05-07T20:07:58.737000 CVE-2024-34342,0,0,aa3191e56985251661624a2fa3b491ca3b13c762a81e998933c326f33a99f181,2024-05-07T20:07:58.737000 -CVE-2024-34346,0,1,f52097ade7b5e4599f6ef6850f0ed1a9b313d490e9105e7facad506e728d0b5f,2024-05-08T13:15:00.690000 +CVE-2024-34346,0,0,f52097ade7b5e4599f6ef6850f0ed1a9b313d490e9105e7facad506e728d0b5f,2024-05-08T13:15:00.690000 +CVE-2024-34347,1,1,1b37926286a5636f5dd46778deed3a5f8d34fb4ec740bf865bd38646cdd2dcda,2024-05-08T15:15:11.310000 CVE-2024-3436,0,0,d56d6daef5f64944191e2814a0e8e0368edbb9fb66b8510fd7eacfe56842ed00,2024-04-11T01:26:02.383000 CVE-2024-34366,0,0,0d3f5bedc206c2395fd40f02a930e96a2ecd55a373d55f2b02f6aeccbb807ecf,2024-05-06T19:53:38.797000 CVE-2024-34367,0,0,09cdc74d280ef140661f2da3bf1a0a89bd8cdc87b8783ab4e406f707e957795e,2024-05-06T19:53:38.797000 @@ -248446,7 +248480,7 @@ CVE-2024-34408,0,0,3c2f335ba274ff508132a154cc309c40bc38b19efdd9298e3de175f41fa57 CVE-2024-3441,0,0,657e15d08a05c85e0f4e982fae7cec49fd4b8dda898982a18c454ae2db45f222,2024-04-11T01:26:02.813000 CVE-2024-34412,0,0,351dac1423dc8e8517c032f303060fddddfb4b70d0143bb8c231e0e9db5dba48,2024-05-06T19:53:38.797000 CVE-2024-34413,0,0,e5e744c34345ba6294637a8f85597b78c532aba1fad9c01dda8872ea5e3b50da,2024-05-07T13:39:32.710000 -CVE-2024-34414,1,1,db5e229a6208cf153470eb619a9f053a88051c892d8bfdd6779719795c6eb462,2024-05-08T13:15:00.690000 +CVE-2024-34414,0,0,db5e229a6208cf153470eb619a9f053a88051c892d8bfdd6779719795c6eb462,2024-05-08T13:15:00.690000 CVE-2024-3442,0,0,756156f7de62e4a3ae69e9bbc13d8b798986428892e90d3991a24b2c8375a976,2024-04-11T01:26:02.893000 CVE-2024-3443,0,0,05006967bda17a889e39c8ccda497403cb2b35584eb895b86d4c8dd8b79230c6,2024-04-11T01:26:02.973000 CVE-2024-3444,0,0,20ed8f6fb3358c183e59c59fd1e15718847c74b3b8477277ced05a568bf760d4,2024-04-11T01:26:03.057000 @@ -248501,28 +248535,28 @@ CVE-2024-34532,0,0,d9b4420ad130ffd345b42ea32943d3ea85ac93b28aeef2c295a30cff870d6 CVE-2024-34533,0,0,fed7485b3815bc732c1be42f2d650622d72077ebf51ccbf0574f1a6ca151164a,2024-05-07T13:39:32.710000 CVE-2024-34534,0,0,5b41ae364cb5686db0e61f768f78dbb771742090e9171960a6e9b0a284823916,2024-05-07T13:39:32.710000 CVE-2024-34538,0,0,ad2e465bd4501134b8655c84262a62a1ec8a7e4ecf43c5e35b8118420879cc3c,2024-05-06T12:44:56.377000 -CVE-2024-34546,1,1,c2d3cb2b20dc218584a3e29d42bf74758d50d12287d7d00198db4d41ad728570,2024-05-08T13:15:00.690000 -CVE-2024-34547,1,1,68485045b79b039986ac8a2bc39116a73bcfb61cefe86b3c97c2629af1031b6d,2024-05-08T13:15:00.690000 -CVE-2024-34548,1,1,a263052f22b9ed630797ec6d56bcffb08c7a0f2402a01d542130845b1abea7a8,2024-05-08T13:15:00.690000 +CVE-2024-34546,0,0,c2d3cb2b20dc218584a3e29d42bf74758d50d12287d7d00198db4d41ad728570,2024-05-08T13:15:00.690000 +CVE-2024-34547,0,0,68485045b79b039986ac8a2bc39116a73bcfb61cefe86b3c97c2629af1031b6d,2024-05-08T13:15:00.690000 +CVE-2024-34548,0,0,a263052f22b9ed630797ec6d56bcffb08c7a0f2402a01d542130845b1abea7a8,2024-05-08T13:15:00.690000 CVE-2024-3455,0,0,18e948f1ff2182718852b2ba697f0fa9a8598811bb1c2e87509c3bd543b90a57,2024-04-11T01:26:03.233000 -CVE-2024-34553,1,1,1304ae8bb8e28c589f4f4c4923637af1159951d928589d0c318d92743d849bb1,2024-05-08T13:15:00.690000 -CVE-2024-34558,1,1,fd5998d9df1dce5cfda505c9e8613d541a45f233eb2b964898c563a731af2258,2024-05-08T13:15:00.690000 +CVE-2024-34553,0,0,1304ae8bb8e28c589f4f4c4923637af1159951d928589d0c318d92743d849bb1,2024-05-08T13:15:00.690000 +CVE-2024-34558,0,0,fd5998d9df1dce5cfda505c9e8613d541a45f233eb2b964898c563a731af2258,2024-05-08T13:15:00.690000 CVE-2024-3456,0,0,944b33373fddc7621692e3fce6708723c7abc962139d88da65ad0c4ce610f104,2024-04-11T01:26:03.310000 -CVE-2024-34560,1,1,4482b0d4c584fd15cdd119877a459e5053a4023f991ca5c022656cf8754ce943,2024-05-08T13:15:00.690000 -CVE-2024-34561,1,1,471655415e985f0d6ce4b171d0bc58c0f90a4268b0b352f88e346d893b94c886,2024-05-08T13:15:00.690000 -CVE-2024-34562,0,1,3f0e5c20e0dadc17ed9db4089e3ebe7fa1e7ac47de5d2db66a9348541c0f510b,2024-05-08T13:15:00.690000 -CVE-2024-34563,0,1,a1a78de36c2dd2191843017818934aa0e4f73a29819ebfe2dd110f648f9d03e7,2024-05-08T13:15:00.690000 -CVE-2024-34564,0,1,1832f6b4f0801ec1d0785f1dd9384001c877135270106c4799ceaf9117f6cbba,2024-05-08T13:15:00.690000 -CVE-2024-34565,0,1,c835f062edb5d41d0f2a3cee2de3ffc7f38996768fc7d529d0c23909c136399c,2024-05-08T13:15:00.690000 -CVE-2024-34566,0,1,54ad4ed9349a29320a16d9315bd5c4f96767a25129864c6a9b89fdbce70ab854,2024-05-08T13:15:00.690000 -CVE-2024-34568,0,1,d7ca48abcd0c40ef13ec95e8a2a1a6b305163aff78729aa16c87f25cec895423,2024-05-08T13:15:00.690000 -CVE-2024-34569,0,1,a16024e78299b43c5762559dcff860a8c87dc6e28da153486a499004aa4ac322,2024-05-08T13:15:00.690000 +CVE-2024-34560,0,0,4482b0d4c584fd15cdd119877a459e5053a4023f991ca5c022656cf8754ce943,2024-05-08T13:15:00.690000 +CVE-2024-34561,0,0,471655415e985f0d6ce4b171d0bc58c0f90a4268b0b352f88e346d893b94c886,2024-05-08T13:15:00.690000 +CVE-2024-34562,0,0,3f0e5c20e0dadc17ed9db4089e3ebe7fa1e7ac47de5d2db66a9348541c0f510b,2024-05-08T13:15:00.690000 +CVE-2024-34563,0,0,a1a78de36c2dd2191843017818934aa0e4f73a29819ebfe2dd110f648f9d03e7,2024-05-08T13:15:00.690000 +CVE-2024-34564,0,0,1832f6b4f0801ec1d0785f1dd9384001c877135270106c4799ceaf9117f6cbba,2024-05-08T13:15:00.690000 +CVE-2024-34565,0,0,c835f062edb5d41d0f2a3cee2de3ffc7f38996768fc7d529d0c23909c136399c,2024-05-08T13:15:00.690000 +CVE-2024-34566,0,0,54ad4ed9349a29320a16d9315bd5c4f96767a25129864c6a9b89fdbce70ab854,2024-05-08T13:15:00.690000 +CVE-2024-34568,0,0,d7ca48abcd0c40ef13ec95e8a2a1a6b305163aff78729aa16c87f25cec895423,2024-05-08T13:15:00.690000 +CVE-2024-34569,0,0,a16024e78299b43c5762559dcff860a8c87dc6e28da153486a499004aa4ac322,2024-05-08T13:15:00.690000 CVE-2024-3457,0,0,eda30bdfb17395ab91987b75a43f4990cc086dc3cfa77a90fc0cb388efd5e793,2024-04-11T01:26:03.387000 -CVE-2024-34570,0,1,e2defb2768fd7a805110ecf9a5728133ca58bcd0d6d6a88c80feca8c7f2f026a,2024-05-08T13:15:00.690000 -CVE-2024-34571,0,1,ed7ca309054164b81bcbb5f66ed020554ce5c66aae91fb6e039e5de0badcc945,2024-05-08T13:15:00.690000 -CVE-2024-34572,0,1,9ed710fb369f730183cf747ddcccd35192867c6d5121bdeb0e64eb444712f476,2024-05-08T13:15:00.690000 -CVE-2024-34573,0,1,41ab5ca1c62c51e2d5398c3ef19591aec3618667df7c2294a33f2fd9794a697b,2024-05-08T13:15:00.690000 -CVE-2024-34574,0,1,da62f69044cff1544e9db72428db6676f4511c77628679a41b2b8efda0b3bd93,2024-05-08T13:15:00.690000 +CVE-2024-34570,0,0,e2defb2768fd7a805110ecf9a5728133ca58bcd0d6d6a88c80feca8c7f2f026a,2024-05-08T13:15:00.690000 +CVE-2024-34571,0,0,ed7ca309054164b81bcbb5f66ed020554ce5c66aae91fb6e039e5de0badcc945,2024-05-08T13:15:00.690000 +CVE-2024-34572,0,0,9ed710fb369f730183cf747ddcccd35192867c6d5121bdeb0e64eb444712f476,2024-05-08T13:15:00.690000 +CVE-2024-34573,0,0,41ab5ca1c62c51e2d5398c3ef19591aec3618667df7c2294a33f2fd9794a697b,2024-05-08T13:15:00.690000 +CVE-2024-34574,0,0,da62f69044cff1544e9db72428db6676f4511c77628679a41b2b8efda0b3bd93,2024-05-08T13:15:00.690000 CVE-2024-3458,0,0,7db0bf8708dfce15955953888170391178462556da97d3ad2486d006a9f8ebab,2024-04-11T01:26:03.460000 CVE-2024-3463,0,0,f35096c01e521c580de90ee225d8b67562638ead2824e5fc7702bc6c9f4524f8,2024-04-11T01:26:03.537000 CVE-2024-3464,0,0,0c53100717f2f28c54c57fbaaef472d29e3cb0ff81ebf61eb104a899922afe93,2024-04-11T01:26:03.617000 @@ -248544,11 +248578,11 @@ CVE-2024-3489,0,0,407fc99ac607d8b254895aa9dc68afca4c0fff929cb004325e3c06bd83280a CVE-2024-3490,0,0,243d31a8a91d548ae7245abd7ab9112de0ee4857a2da5c2f334b7a81fefaf51e,2024-05-02T13:27:25.103000 CVE-2024-3491,0,0,155e981c246f1ab173bd75da38bee4b8800ff4b0566c01179dcadac412465c38,2024-04-23T12:52:09.397000 CVE-2024-3493,0,0,63ead7e160b6b2cbd834dd6075f87d345af3361e8d55520f11e81a53e2086aaa,2024-04-16T13:24:07.103000 -CVE-2024-3494,0,1,64d46dc2a19508d3711e9aedb3c5a94f86b9d5284b5f5f7adc98cacb6f1d9c54,2024-05-08T13:15:00.690000 +CVE-2024-3494,0,0,64d46dc2a19508d3711e9aedb3c5a94f86b9d5284b5f5f7adc98cacb6f1d9c54,2024-05-08T13:15:00.690000 CVE-2024-3499,0,0,38e1f3a6ce5aff826b19a73a4f796b980cc1161eaf58f8fada2f6f87e54573a4,2024-05-02T18:00:37.360000 CVE-2024-3500,0,0,bd83544d3c8c82359104dcd5b032a6095cbae3178ec9c9c56ddfe242d28462ee,2024-05-02T18:00:37.360000 CVE-2024-3505,0,0,d46d6b7d35449c168e9ff66f3c93f973f2e1e579109b94b88c63ad7baac2b7b8,2024-04-15T13:15:31.997000 -CVE-2024-3507,0,1,1c054f8eb468e9fc0cea1e0bf278f9d5e4223b4637b6d1e6bd047269f92998e3,2024-05-08T13:15:00.690000 +CVE-2024-3507,0,0,1c054f8eb468e9fc0cea1e0bf278f9d5e4223b4637b6d1e6bd047269f92998e3,2024-05-08T13:15:00.690000 CVE-2024-3508,0,0,c82390a1238326cf6817e875dca33757792126eb5098bd44b5a908dea5e7149a,2024-04-26T12:58:17.720000 CVE-2024-3512,0,0,7186c9ec3829c2082fd68b5fc8e23caed587fdf0f4e68c2974db5f41b90fb514,2024-04-25T13:15:51.663000 CVE-2024-3514,0,0,fd39bbcd0f0890f4d85c4ccfb46694b71dc6efa7f8c56852e1f4fd99d58e20d2,2024-04-24T17:15:47.423000 @@ -248792,6 +248826,7 @@ CVE-2024-3932,0,0,bce0f8b09e2fc4acc0cfce5940d57ce5f1e0384ac19f6c68ed218175688d8f CVE-2024-3936,0,0,eab146c2dabc68c3a2670ed40014918c1546d7792590be508b2f098c474c009c,2024-05-02T18:00:37.360000 CVE-2024-3942,0,0,093aed42e5de67d43c3e1fe2ea0608a4fa8ab77d933bee3fc5a54a0d1f857aa1,2024-05-02T18:00:37.360000 CVE-2024-3948,0,0,427154a0226db385c08a1dc567a28e238ab290a5825189b73e5e958b25b296e5,2024-04-18T13:04:28.900000 +CVE-2024-3951,1,1,63353908b055c38cd048fe7a4791055e9557ccfbed275726db22304d5ceff8db,2024-05-08T15:15:11.517000 CVE-2024-3955,0,0,bba90f25cff74c274e08a67a3936bf55505a38180fc074269167b54bd0903537,2024-05-02T13:27:25.103000 CVE-2024-3957,0,0,2b744dd88d6cc9c827c02d6b12c55f272a575442480ebe581b900faacfe3a2a0,2024-05-02T18:00:37.360000 CVE-2024-3962,0,0,9de964d29f43823164300439a0e71453bbca4a5c1f5767eca51db600267798cd,2024-04-26T12:58:17.720000 @@ -248813,7 +248848,7 @@ CVE-2024-4022,0,0,ebd323c8f90bdf29bd6ff35ea1eff449874a3d962dc85b687039f47f7b416e CVE-2024-4024,0,0,ef64ae76a72fe30f0382303f22cba197d841a5535eb50d7c4ad40f3e475d662a,2024-04-25T17:25:05.903000 CVE-2024-4026,0,0,9eff728af4fb17cd0b046ae2444303f230bc7685cadbda3feb2bd1007c766627,2024-04-22T13:28:34.007000 CVE-2024-4029,0,0,9463712b5e647e14085984bed383bec7860a9d9a5318196c531ac42338eae2f7,2024-05-02T18:00:37.360000 -CVE-2024-4030,0,1,795a3bbc64b5f3c541eda3871e64672190edffb58908cba6374ff9dfb2797a41,2024-05-08T13:15:00.690000 +CVE-2024-4030,0,0,795a3bbc64b5f3c541eda3871e64672190edffb58908cba6374ff9dfb2797a41,2024-05-08T13:15:00.690000 CVE-2024-4031,0,0,4baeaad68cf3411bf45d41e53c64aca0aa19dc8cf620cd2c5028b0d61a50ba2c,2024-04-23T12:52:09.397000 CVE-2024-4033,0,0,ec8e3c78ea3271fa1478d4b20befe7f07ff679b5d632c0e137b31e0d9ec5ea21,2024-05-02T18:00:37.360000 CVE-2024-4034,0,0,fafd19fe9fec289104edaec6de04b5d97871dbbe831f4ab5035660db95fb5c8a,2024-05-02T18:00:37.360000 @@ -248862,14 +248897,14 @@ CVE-2024-4126,0,0,52d53c69f90fffba02f4ee03823f6932b3dbf87e0fe4c676029ee51a28a916 CVE-2024-4127,0,0,4364ebf3636399a6b862124e1d4818af14c41cdffb5c73435c8a8f0aa84db1d3,2024-04-25T13:18:20.370000 CVE-2024-4128,0,0,dbb061a4cce465a0cb61b00ade10d9b747ca5e17e039d640902bb2e7236edc48,2024-05-02T18:00:37.360000 CVE-2024-4133,0,0,edddaf22ac50287e4d41278289e1df9ea316ee8a51647f77da27d00841431234,2024-05-02T18:00:37.360000 -CVE-2024-4135,0,1,2f5ec05990a2d3fd6c58d2bd3017e3c06528bb0d0b0a54b28242ee75749e6a9b,2024-05-08T13:15:00.690000 +CVE-2024-4135,0,0,2f5ec05990a2d3fd6c58d2bd3017e3c06528bb0d0b0a54b28242ee75749e6a9b,2024-05-08T13:15:00.690000 CVE-2024-4140,0,0,bb3e400fe6c4b8cf6821bf141f5d1d6536fc52c547337b85d936fc6d6f95cc9a,2024-05-03T12:50:34.250000 CVE-2024-4141,0,0,569cd2fcd9188d9eabeb08d432690880975d5549c17482aa7e239fef9c6bb2e6,2024-04-24T19:58:40.710000 CVE-2024-4142,0,0,6297707db3df670a282f3d4e6720e4836d7467220b5fcc108ef053e6a6308f68,2024-05-02T13:27:25.103000 CVE-2024-4156,0,0,08ed32a025121f03b8a02946b754b432972d33916a48e29ae90b57a1d08fdf80,2024-05-02T18:00:37.360000 CVE-2024-4159,0,0,cf0daf8ecd317ce4288e8a4812364c59b3b10d10c0c5945533667d40be8a71fc,2024-04-25T23:15:47.087000 CVE-2024-4161,0,0,8c35858b76cabcd8cf78ed758e4c9d58e5dffa2b20a32ec25b41a43a372b2218,2024-04-25T13:18:13.537000 -CVE-2024-4162,0,1,3ab30e180def8149fd8494b0a91d0c176ba9184404d532022796a118c67b4ade,2024-05-08T13:15:00.690000 +CVE-2024-4162,0,0,3ab30e180def8149fd8494b0a91d0c176ba9184404d532022796a118c67b4ade,2024-05-08T13:15:00.690000 CVE-2024-4163,0,0,0abae06321832430d51e94179291aa50a40ff5a5f25f762f5290e51ebf608907,2024-04-26T12:58:17.720000 CVE-2024-4164,0,0,47d42509563ff118e80fb01ab32da3a01e6b310e48a92c3ae5fc79acb90ef6df,2024-04-25T13:18:02.660000 CVE-2024-4165,0,0,2b8667aaf2a68631633b130c7e16d5d65b2d5175fcfbf6deaef662c04ff84691,2024-04-25T13:18:02.660000 @@ -248895,6 +248930,7 @@ CVE-2024-4215,0,0,0d7dbfaf8275e9ff6c32259712a00cedd32b92104e92991d7893f67c59faf7 CVE-2024-4216,0,0,80b76898bbc4459141293c47297450a985b668060a3a6e72db0d9ef898a4d417,2024-05-03T12:50:34.250000 CVE-2024-4225,0,0,ac71ef092dab43c080586d967efe31f36fc3673c6a3103eaf0a29ff9fdbbfa8b,2024-04-30T13:11:16.690000 CVE-2024-4226,0,0,71c8bf7eb5a4d3d3ec7c43ac428cd4d409488f8f04217410fc871554bd101d4e,2024-04-30T13:11:16.690000 +CVE-2024-4233,1,1,97cfae5f1f0e419dfc77283cca8b5b34fe72abf6b0cc53925731cf781bdd8568,2024-05-08T14:15:08.907000 CVE-2024-4234,0,0,007b9b5f266bd1a230094439603af6b2584a9759013139ef15c8a83c147fb7e2,2024-04-26T15:32:22.523000 CVE-2024-4235,0,0,56fe55bfa9e5032250cb76a0428e6701e1156edfc8fca4b04bbe3adaedf6d795,2024-04-26T19:59:19.793000 CVE-2024-4236,0,0,7ac00e186cd2c2e1c79c57240d28f35f7ae0ebb8e21a175f5525fb6a05d72ea1,2024-04-26T19:59:19.793000 @@ -248918,7 +248954,7 @@ CVE-2024-4255,0,0,e56f3d9fc9bcac063de04d50ea338ebd897707944646fe347248f9057b44ad CVE-2024-4256,0,0,7306acbdfbcfdbac15858c1f2c67d7bd707c7019b8eaaf3005a017f2282a931e,2024-04-29T12:42:03.667000 CVE-2024-4257,0,0,63a2e5a626e37ee2037a88ecaf87159da170b2e93a6613f6fd5f09cce2014f62,2024-04-29T12:42:03.667000 CVE-2024-4265,0,0,91d38fbd7b9c4ea0cd26c0f2028b5e1f8ee8c7d7e1c2c632d6b17cd2b7b69603,2024-05-02T18:00:37.360000 -CVE-2024-4281,0,1,f2f6c94941e4ed7f1c98ab6351686f1d868a8657bf9b3ff2bb73d7d016e69d14,2024-05-08T13:15:00.690000 +CVE-2024-4281,0,0,f2f6c94941e4ed7f1c98ab6351686f1d868a8657bf9b3ff2bb73d7d016e69d14,2024-05-08T13:15:00.690000 CVE-2024-4291,0,0,026425f7582d5a8b9b7c69bee6a121d95c15faa949c9b0f3f135fcde175ec19a,2024-04-29T12:42:03.667000 CVE-2024-4292,0,0,16b2c7000f08d30809e9aff3078f5630d0209d46626c0ae6f1710109bf28b425,2024-04-29T12:42:03.667000 CVE-2024-4293,0,0,ff4ebb1950772c60e21bdd44e74ba1ef8486ce2724daf47c032714a7f53490f7,2024-04-29T12:42:03.667000 @@ -248950,16 +248986,16 @@ CVE-2024-4348,0,0,58c372bcfdfd13a40dcad9095bf019969258123c09df37a486f5ad5f3ede8e CVE-2024-4349,0,0,f37ccdd1092fa74fa2c30a0fd9ee697b77c3abde136f8542413ea2c7851c4bb8,2024-05-06T14:15:08.090000 CVE-2024-4368,0,0,0ee02ebde276d817508f5495294b3429c463a1f4241660388e0c329992e72be6,2024-05-04T02:15:06.853000 CVE-2024-4369,0,0,ab5992320463150d25768d540495632f3cea0e672e96fca10ae18e5fed17e7b3,2024-05-02T03:15:15.027000 -CVE-2024-4393,0,1,104b496ba9688611beda7ef57b83424396e65d62ee7d7a6e8c7b696d3fc66e71,2024-05-08T13:15:00.690000 +CVE-2024-4393,0,0,104b496ba9688611beda7ef57b83424396e65d62ee7d7a6e8c7b696d3fc66e71,2024-05-08T13:15:00.690000 CVE-2024-4405,0,0,c1f36263ba5841514dcf823ce87455ea826983b04201750caf275a7578687d86,2024-05-02T18:00:37.360000 CVE-2024-4406,0,0,24efbd07edfc7f89a7b1e694cb4faff02b108244486a9e17a0ab6aa554d1cf0e,2024-05-02T18:00:37.360000 -CVE-2024-4418,0,1,b75df24fbcd879bc4a65285c93bd33dc1c31ae502a7b108d2ac08220fcbe0dd6,2024-05-08T13:15:00.690000 +CVE-2024-4418,0,0,b75df24fbcd879bc4a65285c93bd33dc1c31ae502a7b108d2ac08220fcbe0dd6,2024-05-08T13:15:00.690000 CVE-2024-4433,0,0,a671ce2518271e49fdeb5cf5eaca489e751e352fe28902a9e3a1500395ee9006,2024-05-02T18:00:37.360000 -CVE-2024-4436,0,1,64033ee8163e93734d3356c76b1219aa507b767e43c629d466579eff9eca6a17,2024-05-08T13:15:00.690000 -CVE-2024-4437,0,1,a62637ebd732289d5432e95cdaf60c3e47133a5119cabcd67c7d4d14d6736462,2024-05-08T13:15:00.690000 -CVE-2024-4438,0,1,93ceea5f04a92ff8a47d298b7349cd99931c0f6ebe6d5712d64fba3d2e18a77c,2024-05-08T13:15:00.690000 +CVE-2024-4436,0,0,64033ee8163e93734d3356c76b1219aa507b767e43c629d466579eff9eca6a17,2024-05-08T13:15:00.690000 +CVE-2024-4437,0,0,a62637ebd732289d5432e95cdaf60c3e47133a5119cabcd67c7d4d14d6736462,2024-05-08T13:15:00.690000 +CVE-2024-4438,0,0,93ceea5f04a92ff8a47d298b7349cd99931c0f6ebe6d5712d64fba3d2e18a77c,2024-05-08T13:15:00.690000 CVE-2024-4439,0,0,a04aad1631b3777470b58d8a82d09407f3c5e63b2eeaeebb2f2cdb5c6b9c3ede,2024-05-03T12:48:41.067000 -CVE-2024-4456,0,1,43bdd543de001702ca45614b4a3579c52bfa7b188e5cb3e6b81f25f610f74e45,2024-05-08T13:15:00.690000 +CVE-2024-4456,0,0,43bdd543de001702ca45614b4a3579c52bfa7b188e5cb3e6b81f25f610f74e45,2024-05-08T13:15:00.690000 CVE-2024-4461,0,0,7ca39b07094b9badd740410c9408db11fe23a2c272b945e9ccd422d33b255a72,2024-05-03T12:48:41.067000 CVE-2024-4466,0,0,362cf34285ea8ef22c0a4fe2e518499aaa4b8f79660cea3c0f457b3e58b9b244,2024-05-03T12:48:41.067000 CVE-2024-4491,0,0,d21d67654af00d0e8aec399506b941096b080e93fc90b1b79355cb50deb5ffe8,2024-05-06T12:44:56.377000 @@ -249024,8 +249060,14 @@ CVE-2024-4596,0,0,be8f6f31f7b9fe629a0401c9cf81fadfc64729080c75f7aaf2c3860b6963e2 CVE-2024-4599,0,0,7a2dd9d366beb25d47b0c05043c7c832d7abfddbca078d457eae393ffc0c13b9,2024-05-07T13:39:32.710000 CVE-2024-4600,0,0,34514a912341a00b4dd13ba9bc66d0fe1a7a1cb8661452904cea5e1c3463f08f,2024-05-07T13:39:32.710000 CVE-2024-4601,0,0,9e1e1f008012e98662e601d1d10e65eeb89abb9d2b4ea828e06c076d042c7c66,2024-05-07T13:39:32.710000 -CVE-2024-4644,1,1,fe8c946aa85c5afed75f9f115eec97bea79a068ee2bf126353993d4359a1320d,2024-05-08T13:15:00.690000 -CVE-2024-4645,1,1,d16dc3a11840f0e48a1d6ecd44be97aa16267f5e0e0f86be91755b05a89e5159,2024-05-08T13:15:17.563000 -CVE-2024-4646,1,1,b5453579534812ac281aa61d279375375a21c607e3f47f1297a5f64dff9b26e8,2024-05-08T13:15:17.563000 -CVE-2024-4647,1,1,2aa6e717228c7562a555a387c458fa7f53158f3e272215b16fecc7a791b9fb29,2024-05-08T13:15:17.563000 -CVE-2024-4648,1,1,5282bfe48e6b6eea5c6083fe67a31e29341655bccc37d1c45b982574f2095da3,2024-05-08T13:15:17.563000 +CVE-2024-4644,0,0,fe8c946aa85c5afed75f9f115eec97bea79a068ee2bf126353993d4359a1320d,2024-05-08T13:15:00.690000 +CVE-2024-4645,0,0,d16dc3a11840f0e48a1d6ecd44be97aa16267f5e0e0f86be91755b05a89e5159,2024-05-08T13:15:17.563000 +CVE-2024-4646,0,0,b5453579534812ac281aa61d279375375a21c607e3f47f1297a5f64dff9b26e8,2024-05-08T13:15:17.563000 +CVE-2024-4647,0,0,2aa6e717228c7562a555a387c458fa7f53158f3e272215b16fecc7a791b9fb29,2024-05-08T13:15:17.563000 +CVE-2024-4648,0,0,5282bfe48e6b6eea5c6083fe67a31e29341655bccc37d1c45b982574f2095da3,2024-05-08T13:15:17.563000 +CVE-2024-4649,1,1,cd5786310b255003ffd2f50fb4679b37c80b9ad4ef02f4614b554f58a86aa605,2024-05-08T14:15:09.107000 +CVE-2024-4650,1,1,94b83e87d8c77355e308ebe7f64fdfce28546fc7789f8cae8d4ffbb00dd93332,2024-05-08T14:15:09.337000 +CVE-2024-4651,1,1,c89f5e8523846ffe07d1e5d9cdf31b1c588c40ccc00298f42d057418ce29c0c2,2024-05-08T14:15:09.563000 +CVE-2024-4652,1,1,3fb7704a5138fbf59862b522c8dbad2a3392af8430b8684654ef307d0ae4c14a,2024-05-08T14:15:09.780000 +CVE-2024-4653,1,1,3a4121672e5ec11915823af5ad2554dc391eb4183f232bf20d773e2232961cd8,2024-05-08T15:15:11.723000 +CVE-2024-4654,1,1,019e4638b3e7c571cf7613cc239a081aaec2e1bdbcd1daa9ddfad2feb06bb726,2024-05-08T15:15:11.950000