Auto-Update: 2024-05-15T22:00:37.827761+00:00

This commit is contained in:
cad-safe-bot 2024-05-15 22:03:30 +00:00
parent 570d512026
commit c07cd33053
28 changed files with 1421 additions and 83 deletions

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2023-40297",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-05-15T20:15:08.767",
"lastModified": "2024-05-15T20:15:08.767",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Stakater Forecastle 1.0.139 and before allows %5C../ directory traversal in the website component."
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/sahar042/CVE-2023-40297",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2024-27243",
"sourceIdentifier": "security@zoom.us",
"published": "2024-05-15T21:15:07.987",
"lastModified": "2024-05-15T21:15:07.987",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Buffer overflow in some Zoom Workplace Apps and SDK\u2019s may allow an authenticated user to conduct a denial of service via network access."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security@zoom.us",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "security@zoom.us",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-119"
}
]
}
],
"references": [
{
"url": "https://www.zoom.com/en/trust/security-bulletin/zsb-24014/",
"source": "security@zoom.us"
}
]
}

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2024-27244",
"sourceIdentifier": "security@zoom.us",
"published": "2024-05-15T21:15:08.220",
"lastModified": "2024-05-15T21:15:08.220",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Insufficient verification of data authenticity in the installer for Zoom Workplace VDI App for Windows may allow an authenticated user to conduct an escalation of privilege via local access."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security@zoom.us",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "HIGH",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 6.7,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 0.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "security@zoom.us",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-345"
}
]
}
],
"references": [
{
"url": "https://www.zoom.com/en/trust/security-bulletin/zsb-24015/",
"source": "security@zoom.us"
}
]
}

View File

@ -2,12 +2,16 @@
"id": "CVE-2024-30055",
"sourceIdentifier": "secure@microsoft.com",
"published": "2024-05-14T15:21:50.940",
"lastModified": "2024-05-14T16:13:02.773",
"lastModified": "2024-05-15T20:15:11.047",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "Microsoft Edge (Chromium-based) Spoofing Vulnerability"
},
{
"lang": "es",
"value": "Vulnerabilidad de suplantaci\u00f3n de identidad en Microsoft Edge (basado en Chromium)"
}
],
"metrics": {
@ -34,6 +38,18 @@
}
]
},
"weaknesses": [
{
"source": "secure@microsoft.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-451"
}
]
}
],
"references": [
{
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30055",

View File

@ -0,0 +1,59 @@
{
"id": "CVE-2024-31409",
"sourceIdentifier": "ics-cert@hq.dhs.gov",
"published": "2024-05-15T20:15:11.203",
"lastModified": "2024-05-15T20:15:11.203",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Certain MQTT wildcards are not blocked on the \nCyberPower PowerPanel\n\nsystem, which might result in an attacker obtaining data from throughout the system after gaining access to any device."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "ics-cert@hq.dhs.gov",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "ics-cert@hq.dhs.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-285"
}
]
}
],
"references": [
{
"url": "https://www.cisa.gov/news-events/ics-advisories/icsa-24-123-01",
"source": "ics-cert@hq.dhs.gov"
},
{
"url": "https://www.cyberpower.com/global/en/product/sku/powerpanel_business_for_windows#downloads",
"source": "ics-cert@hq.dhs.gov"
}
]
}

View File

@ -0,0 +1,59 @@
{
"id": "CVE-2024-31410",
"sourceIdentifier": "ics-cert@hq.dhs.gov",
"published": "2024-05-15T20:15:11.473",
"lastModified": "2024-05-15T20:15:11.473",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "The devices which CyberPower PowerPanel manages use identical certificates based on a \nhard-coded cryptographic key. This can allow an attacker to impersonate \nany client in the system and send malicious data."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "ics-cert@hq.dhs.gov",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:H/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"availabilityImpact": "NONE",
"baseScore": 7.7,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.1,
"impactScore": 4.0
}
]
},
"weaknesses": [
{
"source": "ics-cert@hq.dhs.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-321"
}
]
}
],
"references": [
{
"url": "https://www.cisa.gov/news-events/ics-advisories/icsa-24-123-01",
"source": "ics-cert@hq.dhs.gov"
},
{
"url": "https://www.cyberpower.com/global/en/product/sku/powerpanel_business_for_windows#downloads",
"source": "ics-cert@hq.dhs.gov"
}
]
}

View File

@ -0,0 +1,59 @@
{
"id": "CVE-2024-31856",
"sourceIdentifier": "ics-cert@hq.dhs.gov",
"published": "2024-05-15T20:15:11.710",
"lastModified": "2024-05-15T20:15:11.710",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "An attacker with certain MQTT permissions can create malicious messages \nto all CyberPower PowerPanel devices. This could result in an attacker injecting \nSQL syntax, writing arbitrary files to the system, and executing remote \ncode."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "ics-cert@hq.dhs.gov",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "ics-cert@hq.dhs.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"references": [
{
"url": "https://www.cisa.gov/news-events/ics-advisories/icsa-24-123-01",
"source": "ics-cert@hq.dhs.gov"
},
{
"url": "https://www.cyberpower.com/global/en/product/sku/powerpanel_business_for_windows#downloads",
"source": "ics-cert@hq.dhs.gov"
}
]
}

View File

@ -0,0 +1,59 @@
{
"id": "CVE-2024-32042",
"sourceIdentifier": "ics-cert@hq.dhs.gov",
"published": "2024-05-15T20:15:11.950",
"lastModified": "2024-05-15T20:15:11.950",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "The key used to encrypt passwords stored in the database can be found in\n the \nCyberPower PowerPanel\n\napplication code, allowing the passwords to be recovered."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "ics-cert@hq.dhs.gov",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.9,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.2,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "ics-cert@hq.dhs.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-257"
}
]
}
],
"references": [
{
"url": "https://www.cisa.gov/news-events/ics-advisories/icsa-24-123-01",
"source": "ics-cert@hq.dhs.gov"
},
{
"url": "https://www.cyberpower.com/global/en/product/sku/powerpanel_business_for_windows#downloads",
"source": "ics-cert@hq.dhs.gov"
}
]
}

View File

@ -0,0 +1,59 @@
{
"id": "CVE-2024-32047",
"sourceIdentifier": "ics-cert@hq.dhs.gov",
"published": "2024-05-15T20:15:12.197",
"lastModified": "2024-05-15T20:15:12.197",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Hard-coded credentials for the \nCyberPower PowerPanel test server can be found in the \nproduction code. This might result in an attacker gaining access to the \ntesting or production server."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "ics-cert@hq.dhs.gov",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "ics-cert@hq.dhs.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-489"
}
]
}
],
"references": [
{
"url": "https://www.cisa.gov/news-events/ics-advisories/icsa-24-123-01",
"source": "ics-cert@hq.dhs.gov"
},
{
"url": "https://www.cyberpower.com/global/en/product/sku/powerpanel_business_for_windows#downloads",
"source": "ics-cert@hq.dhs.gov"
}
]
}

View File

@ -0,0 +1,59 @@
{
"id": "CVE-2024-32053",
"sourceIdentifier": "ics-cert@hq.dhs.gov",
"published": "2024-05-15T20:15:12.443",
"lastModified": "2024-05-15T20:15:12.443",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Hard-coded credentials are used by the\u00a0\nCyberPower PowerPanel \n\n platform to authenticate to the \ndatabase, other services, and the cloud. This could result in an \nattacker gaining access to services with the privileges of a Powerpanel \nbusiness application."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "ics-cert@hq.dhs.gov",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "ics-cert@hq.dhs.gov",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-798"
}
]
}
],
"references": [
{
"url": "https://www.cisa.gov/news-events/ics-advisories/icsa-24-123-01",
"source": "ics-cert@hq.dhs.gov"
},
{
"url": "https://www.cyberpower.com/global/en/product/sku/powerpanel_business_for_windows#downloads",
"source": "ics-cert@hq.dhs.gov"
}
]
}

View File

@ -0,0 +1,59 @@
{
"id": "CVE-2024-33615",
"sourceIdentifier": "ics-cert@hq.dhs.gov",
"published": "2024-05-15T20:15:12.687",
"lastModified": "2024-05-15T20:15:12.687",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "A specially crafted Zip file containing path traversal characters can be\n imported to the \nCyberPower PowerPanel \n\nserver, which allows file writing to the server outside\n the intended scope, and could allow an attacker to achieve remote code \nexecution."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "ics-cert@hq.dhs.gov",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "ics-cert@hq.dhs.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-23"
}
]
}
],
"references": [
{
"url": "https://www.cisa.gov/news-events/ics-advisories/icsa-24-123-01",
"source": "ics-cert@hq.dhs.gov"
},
{
"url": "https://www.cyberpower.com/global/en/product/sku/powerpanel_business_for_windows#downloads",
"source": "ics-cert@hq.dhs.gov"
}
]
}

View File

@ -0,0 +1,59 @@
{
"id": "CVE-2024-33625",
"sourceIdentifier": "ics-cert@hq.dhs.gov",
"published": "2024-05-15T20:15:12.927",
"lastModified": "2024-05-15T20:15:12.927",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "CyberPower PowerPanel business \napplication code contains a hard-coded JWT signing key. This could \nresult in an attacker forging JWT tokens to bypass authentication."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "ics-cert@hq.dhs.gov",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "ics-cert@hq.dhs.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-259"
}
]
}
],
"references": [
{
"url": "https://www.cisa.gov/news-events/ics-advisories/icsa-24-123-01",
"source": "ics-cert@hq.dhs.gov"
},
{
"url": "https://www.cyberpower.com/global/en/product/sku/powerpanel_business_for_windows#downloads",
"source": "ics-cert@hq.dhs.gov"
}
]
}

View File

@ -0,0 +1,59 @@
{
"id": "CVE-2024-34025",
"sourceIdentifier": "ics-cert@hq.dhs.gov",
"published": "2024-05-15T20:15:13.190",
"lastModified": "2024-05-15T20:15:13.190",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "CyberPower PowerPanel business application code contains a hard-coded set of authentication \ncredentials. This could result in an attacker bypassing authentication \nand gaining administrator privileges."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "ics-cert@hq.dhs.gov",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "ics-cert@hq.dhs.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-259"
}
]
}
],
"references": [
{
"url": "https://www.cisa.gov/news-events/ics-advisories/icsa-24-123-01",
"source": "ics-cert@hq.dhs.gov"
},
{
"url": "https://www.cyberpower.com/global/en/product/sku/powerpanel_business_for_windows#downloads",
"source": "ics-cert@hq.dhs.gov"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2024-34906",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-05-15T20:15:13.460",
"lastModified": "2024-05-15T20:15:13.460",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "An arbitrary file upload vulnerability in dootask v0.30.13 allows attackers to execute arbitrary code via uploading a crafted PDF file."
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/kuaifan/dootask/issues/210",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2024-34909",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-05-15T20:15:13.570",
"lastModified": "2024-05-15T20:15:13.570",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "An arbitrary file upload vulnerability in KYKMS v1.0.1 and below allows attackers to execute arbitrary code via uploading a crafted PDF file."
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/Joying-C/Cross-site-scripting-vulnerability/tree/main/KYKMS_Cross_site%20_scripting%20_vulnerability",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2024-34913",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-05-15T20:15:13.657",
"lastModified": "2024-05-15T20:15:13.657",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "An arbitrary file upload vulnerability in r-pan-scaffolding v5.0 and below allows attackers to execute arbitrary code via uploading a crafted PDF file."
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/Joying-C/Cross-site-scripting-vulnerability/tree/main/r-pan-scaffolding_Cross_site%20_scripting%20_vulnerability",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,92 @@
{
"id": "CVE-2024-4904",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-05-15T20:15:13.750",
"lastModified": "2024-05-15T20:15:13.750",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was found in Byzoro Smart S200 Management Platform up to 20240507. It has been rated as critical. This issue affects some unknown processing of the file /useratte/userattestation.php. The manipulation of the argument web_img leads to unrestricted upload. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-264437 was assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW",
"baseScore": 6.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 3.4
}
],
"cvssMetricV2": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "SINGLE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL",
"baseScore": 6.5
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 8.0,
"impactScore": 6.4,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-434"
}
]
}
],
"references": [
{
"url": "https://github.com/Hefei-Coffee/cve/blob/main/upload.md",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?ctiid.264437",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?id.264437",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?submit.330636",
"source": "cna@vuldb.com"
}
]
}

View File

@ -0,0 +1,92 @@
{
"id": "CVE-2024-4910",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-05-15T20:15:14.167",
"lastModified": "2024-05-15T20:15:14.167",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was found in Campcodes Complete Web-Based School Management System 1.0. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file /view/student_exam_mark_insert_form1.php. The manipulation of the argument grade leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-264445 was assigned to this vulnerability."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW",
"baseScore": 6.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 3.4
}
],
"cvssMetricV2": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "SINGLE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL",
"baseScore": 6.5
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 8.0,
"impactScore": 6.4,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"references": [
{
"url": "https://github.com/E1CHO/cve_hub/blob/main/Complete%20Web-Based%20School%20Management%20System%20-%20sql/Complete%20Web-Based%20School%20Management%20System%20-%20vuln%206.pdf",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?ctiid.264445",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?id.264445",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?submit.333296",
"source": "cna@vuldb.com"
}
]
}

View File

@ -0,0 +1,92 @@
{
"id": "CVE-2024-4911",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-05-15T21:15:08.447",
"lastModified": "2024-05-15T21:15:08.447",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was found in Campcodes Complete Web-Based School Management System 1.0. It has been rated as critical. Affected by this issue is some unknown functionality of the file /view/student_exam_mark_update_form.php. The manipulation of the argument exam leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB-264446 is the identifier assigned to this vulnerability."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW",
"baseScore": 6.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 3.4
}
],
"cvssMetricV2": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "SINGLE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL",
"baseScore": 6.5
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 8.0,
"impactScore": 6.4,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"references": [
{
"url": "https://github.com/E1CHO/cve_hub/blob/main/Complete%20Web-Based%20School%20Management%20System%20-%20sql/Complete%20Web-Based%20School%20Management%20System%20-%20vuln%207.pdf",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?ctiid.264446",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?id.264446",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?submit.333297",
"source": "cna@vuldb.com"
}
]
}

View File

@ -0,0 +1,92 @@
{
"id": "CVE-2024-4912",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-05-15T21:15:08.720",
"lastModified": "2024-05-15T21:15:08.720",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability classified as critical has been found in Campcodes Online Examination System 1.0. This affects an unknown part of the file addExamExe.php. The manipulation of the argument examTitle leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-264447."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW",
"baseScore": 6.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 3.4
}
],
"cvssMetricV2": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "SINGLE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL",
"baseScore": 6.5
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 8.0,
"impactScore": 6.4,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"references": [
{
"url": "https://github.com/yylmm/CVE/blob/main/Online%20Examination%20System%20With%20Timer/SQL_addExamExe.md",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?ctiid.264447",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?id.264447",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?submit.333402",
"source": "cna@vuldb.com"
}
]
}

View File

@ -0,0 +1,92 @@
{
"id": "CVE-2024-4913",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-05-15T21:15:09.000",
"lastModified": "2024-05-15T21:15:09.000",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability classified as critical was found in Campcodes Online Examination System 1.0. This vulnerability affects unknown code of the file exam.php. The manipulation of the argument id leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-264448."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW",
"baseScore": 6.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 3.4
}
],
"cvssMetricV2": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "SINGLE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL",
"baseScore": 6.5
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 8.0,
"impactScore": 6.4,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"references": [
{
"url": "https://github.com/yylmm/CVE/blob/main/Online%20Examination%20System%20With%20Timer/SQL_exam.md",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?ctiid.264448",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?id.264448",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?submit.333403",
"source": "cna@vuldb.com"
}
]
}

View File

@ -0,0 +1,24 @@
{
"id": "CVE-2024-4947",
"sourceIdentifier": "chrome-cve-admin@google.com",
"published": "2024-05-15T21:15:09.273",
"lastModified": "2024-05-15T21:15:09.273",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Type Confusion in V8 in Google Chrome prior to 125.0.6422.60 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page. (Chromium security severity: High)"
}
],
"metrics": {},
"references": [
{
"url": "https://chromereleases.googleblog.com/2024/05/stable-channel-update-for-desktop_15.html",
"source": "chrome-cve-admin@google.com"
},
{
"url": "https://issues.chromium.org/issues/340221135",
"source": "chrome-cve-admin@google.com"
}
]
}

View File

@ -0,0 +1,24 @@
{
"id": "CVE-2024-4948",
"sourceIdentifier": "chrome-cve-admin@google.com",
"published": "2024-05-15T21:15:09.347",
"lastModified": "2024-05-15T21:15:09.347",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Use after free in Dawn in Google Chrome prior to 125.0.6422.60 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)"
}
],
"metrics": {},
"references": [
{
"url": "https://chromereleases.googleblog.com/2024/05/stable-channel-update-for-desktop_15.html",
"source": "chrome-cve-admin@google.com"
},
{
"url": "https://issues.chromium.org/issues/333414294",
"source": "chrome-cve-admin@google.com"
}
]
}

View File

@ -0,0 +1,24 @@
{
"id": "CVE-2024-4949",
"sourceIdentifier": "chrome-cve-admin@google.com",
"published": "2024-05-15T21:15:09.430",
"lastModified": "2024-05-15T21:15:09.430",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Use after free in V8 in Google Chrome prior to 125.0.6422.60 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: Medium)"
}
],
"metrics": {},
"references": [
{
"url": "https://chromereleases.googleblog.com/2024/05/stable-channel-update-for-desktop_15.html",
"source": "chrome-cve-admin@google.com"
},
{
"url": "https://issues.chromium.org/issues/326607001",
"source": "chrome-cve-admin@google.com"
}
]
}

View File

@ -0,0 +1,24 @@
{
"id": "CVE-2024-4950",
"sourceIdentifier": "chrome-cve-admin@google.com",
"published": "2024-05-15T21:15:09.493",
"lastModified": "2024-05-15T21:15:09.493",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Inappropriate implementation in Downloads in Google Chrome prior to 125.0.6422.60 allowed a remote attacker who convinced a user to engage in specific UI gestures to perform UI spoofing via a crafted HTML page. (Chromium security severity: Low)"
}
],
"metrics": {},
"references": [
{
"url": "https://chromereleases.googleblog.com/2024/05/stable-channel-update-for-desktop_15.html",
"source": "chrome-cve-admin@google.com"
},
{
"url": "https://issues.chromium.org/issues/40065403",
"source": "chrome-cve-admin@google.com"
}
]
}

View File

@ -0,0 +1,32 @@
{
"id": "CVE-2024-4976",
"sourceIdentifier": "xpdf@xpdfreader.com",
"published": "2024-05-15T21:15:09.560",
"lastModified": "2024-05-15T21:15:09.560",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Out-of-bounds array write in Xpdf 4.05 and earlier, due to missing object type check in AcroForm field reference."
}
],
"metrics": {},
"weaknesses": [
{
"source": "xpdf@xpdfreader.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-787"
}
]
}
],
"references": [
{
"url": "https://www.xpdfreader.com/security-bug/CVE-2024-4976.html",
"source": "xpdf@xpdfreader.com"
}
]
}

View File

@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update
```plain
2024-05-15T20:00:38.583021+00:00
2024-05-15T22:00:37.827761+00:00
```
### Most recent CVE Modification Timestamp synchronized with NVD
```plain
2024-05-15T19:15:09.320000+00:00
2024-05-15T21:15:09.560000+00:00
```
### Last Data Feed Release
@ -33,57 +33,45 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
### Total Number of included CVEs
```plain
250026
250051
```
### CVEs added in the last Commit
Recently added CVEs: `17`
Recently added CVEs: `25`
- [CVE-2024-20256](CVE-2024/CVE-2024-202xx/CVE-2024-20256.json) (`2024-05-15T18:15:08.720`)
- [CVE-2024-20257](CVE-2024/CVE-2024-202xx/CVE-2024-20257.json) (`2024-05-15T18:15:08.967`)
- [CVE-2024-20258](CVE-2024/CVE-2024-202xx/CVE-2024-20258.json) (`2024-05-15T18:15:09.193`)
- [CVE-2024-20366](CVE-2024/CVE-2024-203xx/CVE-2024-20366.json) (`2024-05-15T18:15:09.440`)
- [CVE-2024-20369](CVE-2024/CVE-2024-203xx/CVE-2024-20369.json) (`2024-05-15T18:15:09.673`)
- [CVE-2024-20383](CVE-2024/CVE-2024-203xx/CVE-2024-20383.json) (`2024-05-15T18:15:09.910`)
- [CVE-2024-20391](CVE-2024/CVE-2024-203xx/CVE-2024-20391.json) (`2024-05-15T18:15:10.153`)
- [CVE-2024-20392](CVE-2024/CVE-2024-203xx/CVE-2024-20392.json) (`2024-05-15T18:15:10.390`)
- [CVE-2024-20394](CVE-2024/CVE-2024-203xx/CVE-2024-20394.json) (`2024-05-15T18:15:10.620`)
- [CVE-2024-25743](CVE-2024/CVE-2024-257xx/CVE-2024-25743.json) (`2024-05-15T18:15:10.837`)
- [CVE-2024-3182](CVE-2024/CVE-2024-31xx/CVE-2024-3182.json) (`2024-05-15T18:15:11.020`)
- [CVE-2024-35102](CVE-2024/CVE-2024-351xx/CVE-2024-35102.json) (`2024-05-15T19:15:08.063`)
- [CVE-2024-4905](CVE-2024/CVE-2024-49xx/CVE-2024-4905.json) (`2024-05-15T18:15:11.223`)
- [CVE-2024-4906](CVE-2024/CVE-2024-49xx/CVE-2024-4906.json) (`2024-05-15T19:15:08.203`)
- [CVE-2024-4907](CVE-2024/CVE-2024-49xx/CVE-2024-4907.json) (`2024-05-15T19:15:08.607`)
- [CVE-2024-4908](CVE-2024/CVE-2024-49xx/CVE-2024-4908.json) (`2024-05-15T19:15:08.980`)
- [CVE-2024-4909](CVE-2024/CVE-2024-49xx/CVE-2024-4909.json) (`2024-05-15T19:15:09.320`)
- [CVE-2023-40297](CVE-2023/CVE-2023-402xx/CVE-2023-40297.json) (`2024-05-15T20:15:08.767`)
- [CVE-2024-27243](CVE-2024/CVE-2024-272xx/CVE-2024-27243.json) (`2024-05-15T21:15:07.987`)
- [CVE-2024-27244](CVE-2024/CVE-2024-272xx/CVE-2024-27244.json) (`2024-05-15T21:15:08.220`)
- [CVE-2024-31409](CVE-2024/CVE-2024-314xx/CVE-2024-31409.json) (`2024-05-15T20:15:11.203`)
- [CVE-2024-31410](CVE-2024/CVE-2024-314xx/CVE-2024-31410.json) (`2024-05-15T20:15:11.473`)
- [CVE-2024-31856](CVE-2024/CVE-2024-318xx/CVE-2024-31856.json) (`2024-05-15T20:15:11.710`)
- [CVE-2024-32042](CVE-2024/CVE-2024-320xx/CVE-2024-32042.json) (`2024-05-15T20:15:11.950`)
- [CVE-2024-32047](CVE-2024/CVE-2024-320xx/CVE-2024-32047.json) (`2024-05-15T20:15:12.197`)
- [CVE-2024-32053](CVE-2024/CVE-2024-320xx/CVE-2024-32053.json) (`2024-05-15T20:15:12.443`)
- [CVE-2024-33615](CVE-2024/CVE-2024-336xx/CVE-2024-33615.json) (`2024-05-15T20:15:12.687`)
- [CVE-2024-33625](CVE-2024/CVE-2024-336xx/CVE-2024-33625.json) (`2024-05-15T20:15:12.927`)
- [CVE-2024-34025](CVE-2024/CVE-2024-340xx/CVE-2024-34025.json) (`2024-05-15T20:15:13.190`)
- [CVE-2024-34906](CVE-2024/CVE-2024-349xx/CVE-2024-34906.json) (`2024-05-15T20:15:13.460`)
- [CVE-2024-34909](CVE-2024/CVE-2024-349xx/CVE-2024-34909.json) (`2024-05-15T20:15:13.570`)
- [CVE-2024-34913](CVE-2024/CVE-2024-349xx/CVE-2024-34913.json) (`2024-05-15T20:15:13.657`)
- [CVE-2024-4904](CVE-2024/CVE-2024-49xx/CVE-2024-4904.json) (`2024-05-15T20:15:13.750`)
- [CVE-2024-4910](CVE-2024/CVE-2024-49xx/CVE-2024-4910.json) (`2024-05-15T20:15:14.167`)
- [CVE-2024-4911](CVE-2024/CVE-2024-49xx/CVE-2024-4911.json) (`2024-05-15T21:15:08.447`)
- [CVE-2024-4912](CVE-2024/CVE-2024-49xx/CVE-2024-4912.json) (`2024-05-15T21:15:08.720`)
- [CVE-2024-4913](CVE-2024/CVE-2024-49xx/CVE-2024-4913.json) (`2024-05-15T21:15:09.000`)
- [CVE-2024-4947](CVE-2024/CVE-2024-49xx/CVE-2024-4947.json) (`2024-05-15T21:15:09.273`)
- [CVE-2024-4948](CVE-2024/CVE-2024-49xx/CVE-2024-4948.json) (`2024-05-15T21:15:09.347`)
- [CVE-2024-4949](CVE-2024/CVE-2024-49xx/CVE-2024-4949.json) (`2024-05-15T21:15:09.430`)
- [CVE-2024-4950](CVE-2024/CVE-2024-49xx/CVE-2024-4950.json) (`2024-05-15T21:15:09.493`)
- [CVE-2024-4976](CVE-2024/CVE-2024-49xx/CVE-2024-4976.json) (`2024-05-15T21:15:09.560`)
### CVEs modified in the last Commit
Recently modified CVEs: `21`
Recently modified CVEs: `1`
- [CVE-2023-5938](CVE-2023/CVE-2023-59xx/CVE-2023-5938.json) (`2024-05-15T18:35:11.453`)
- [CVE-2023-7258](CVE-2023/CVE-2023-72xx/CVE-2023-7258.json) (`2024-05-15T18:35:11.453`)
- [CVE-2024-27593](CVE-2024/CVE-2024-275xx/CVE-2024-27593.json) (`2024-05-15T18:35:11.453`)
- [CVE-2024-28042](CVE-2024/CVE-2024-280xx/CVE-2024-28042.json) (`2024-05-15T18:35:11.453`)
- [CVE-2024-28087](CVE-2024/CVE-2024-280xx/CVE-2024-28087.json) (`2024-05-15T18:35:11.453`)
- [CVE-2024-34082](CVE-2024/CVE-2024-340xx/CVE-2024-34082.json) (`2024-05-15T18:35:11.453`)
- [CVE-2024-3483](CVE-2024/CVE-2024-34xx/CVE-2024-3483.json) (`2024-05-15T18:35:11.453`)
- [CVE-2024-3484](CVE-2024/CVE-2024-34xx/CVE-2024-3484.json) (`2024-05-15T18:35:11.453`)
- [CVE-2024-3485](CVE-2024/CVE-2024-34xx/CVE-2024-3485.json) (`2024-05-15T18:35:11.453`)
- [CVE-2024-3486](CVE-2024/CVE-2024-34xx/CVE-2024-3486.json) (`2024-05-15T18:35:11.453`)
- [CVE-2024-3487](CVE-2024/CVE-2024-34xx/CVE-2024-3487.json) (`2024-05-15T18:35:11.453`)
- [CVE-2024-3488](CVE-2024/CVE-2024-34xx/CVE-2024-3488.json) (`2024-05-15T18:35:11.453`)
- [CVE-2024-3892](CVE-2024/CVE-2024-38xx/CVE-2024-3892.json) (`2024-05-15T18:35:11.453`)
- [CVE-2024-3967](CVE-2024/CVE-2024-39xx/CVE-2024-3967.json) (`2024-05-15T18:35:11.453`)
- [CVE-2024-3968](CVE-2024/CVE-2024-39xx/CVE-2024-3968.json) (`2024-05-15T18:35:11.453`)
- [CVE-2024-3970](CVE-2024/CVE-2024-39xx/CVE-2024-3970.json) (`2024-05-15T18:35:11.453`)
- [CVE-2024-4200](CVE-2024/CVE-2024-42xx/CVE-2024-4200.json) (`2024-05-15T18:35:11.453`)
- [CVE-2024-4202](CVE-2024/CVE-2024-42xx/CVE-2024-4202.json) (`2024-05-15T18:35:11.453`)
- [CVE-2024-4357](CVE-2024/CVE-2024-43xx/CVE-2024-4357.json) (`2024-05-15T18:35:11.453`)
- [CVE-2024-4622](CVE-2024/CVE-2024-46xx/CVE-2024-4622.json) (`2024-05-15T18:35:11.453`)
- [CVE-2024-4837](CVE-2024/CVE-2024-48xx/CVE-2024-4837.json) (`2024-05-15T18:35:11.453`)
- [CVE-2024-30055](CVE-2024/CVE-2024-300xx/CVE-2024-30055.json) (`2024-05-15T20:15:11.047`)
## Download and Usage

View File

@ -229320,6 +229320,7 @@ CVE-2023-40293,0,0,3e91b40761ee299655829605f60c684af2a5be7622d2e61ae3ccedf339529
CVE-2023-40294,0,0,d4bd6509d5c1ac7e980af451b8a70fd7d25239a642ad089d43c8d5295f4c19e4,2023-08-21T17:25:38.010000
CVE-2023-40295,0,0,a743eadcf15cc96af9c3861d2210341230395528d845a64c1ccef9069b916475,2023-08-21T17:35:53.970000
CVE-2023-40296,0,0,6fa5b6a6cc075360dfd806c6ac6e24533f004f65081952e873daa3d057118e65,2023-08-22T16:26:40.227000
CVE-2023-40297,1,1,e62d2327e729521dda43bbd10b29ddfb3c1f9e9a9de6f06ccce8d75e4976cad5,2024-05-15T20:15:08.767000
CVE-2023-40299,0,0,c403d355d03425836ef9677b0a19b2c1f60383456e53bb25ea5048d388ab5ab5,2023-10-12T17:32:03.607000
CVE-2023-4030,0,0,d357275122959a0f2477f9ecad7a5c2fbfddb1530041a10f12b3e5e5399828d2,2023-08-24T20:29:39.293000
CVE-2023-40300,0,0,12b768d230215ee821727c2018b2bf2ec81a405ef96ae608fc36f431cdf69658,2023-12-12T18:55:01.573000
@ -238285,7 +238286,7 @@ CVE-2023-5933,0,0,b2dc47ea60178dce229171efc17286a9a55ba1bc64b7b2f8288caea3b27b5e
CVE-2023-5935,0,0,81f95d21b7b94dd1eb3e20596c297bdbc3dd4848319eaaded7d3d980ed63f6db,2024-05-15T16:40:19.330000
CVE-2023-5936,0,0,5583f504e014a609ffa35d8b6201fa07340f6f24825dc96039f92040f0a2fc42,2024-05-15T16:40:19.330000
CVE-2023-5937,0,0,f573ce14ccf02e11266a0930261acb30e0788b26c797d69ab598918a1f4f9ebc,2024-05-15T16:40:19.330000
CVE-2023-5938,0,1,433a731ff307f200afe94e480886c553e321402c80fed8a46cedf3f46d71c801,2024-05-15T18:35:11.453000
CVE-2023-5938,0,0,433a731ff307f200afe94e480886c553e321402c80fed8a46cedf3f46d71c801,2024-05-15T18:35:11.453000
CVE-2023-5939,0,0,df30bba0057ad768b860073ac619e1d98f9a50f696bcc39965da02846f053a07,2024-01-04T18:41:13.330000
CVE-2023-5940,0,0,a96f1dd9e0c7bdaa0639d108ff3eb2bb7ebf848c0013a388fa5ecd323f3843ba,2023-12-13T17:39:17.437000
CVE-2023-5941,0,0,0d4c6bc97b5579529ae556c93551e474467a1cc1b4a0ed7961a3178ffe37a698,2023-12-14T10:15:08.630000
@ -239402,7 +239403,7 @@ CVE-2023-7250,0,0,fa224a4f893e1e2e50282b2f218d1652024c983faf50d7c13dc5c8e5ec9643
CVE-2023-7251,0,0,73fa31f7b11a2c8f7785ccd98b3beff89a3869cfbe5b74910fb2dd1341267135,2024-03-26T12:55:05.010000
CVE-2023-7252,0,0,2392d7e3f3e585dc7390c0e965b0650ef11fa8ae2796aaf6e5db491d8ab57d29,2024-04-22T13:28:43.747000
CVE-2023-7253,0,0,6000cb96a7cdff75b79b770b4fe76bc65674b2e521cea85c3d83d19816bdddbc,2024-04-24T13:39:42.883000
CVE-2023-7258,0,1,4640d21b8f3b1e2c63db46c55b88ec973130a40e864e043f94398430f0c06052,2024-05-15T18:35:11.453000
CVE-2023-7258,0,0,4640d21b8f3b1e2c63db46c55b88ec973130a40e864e043f94398430f0c06052,2024-05-15T18:35:11.453000
CVE-2024-0007,0,0,3bebeca11ed66b29340ad5b2f4a6fdda381d640f217ed7214dda7d3a471e9da1,2024-02-15T06:23:39.303000
CVE-2024-0008,0,0,db70626ccf03b2491d218a1d6d38cb10870a351e02a617fba1e6e23a0ac8502b,2024-02-15T06:23:39.303000
CVE-2024-0009,0,0,a481cbe6336f9e8c7286d10d3efcc3169667e3db231d83fec3fad506beda4652,2024-02-15T06:23:39.303000
@ -241150,9 +241151,9 @@ CVE-2024-20252,0,0,b3e7ab7affd116881816a7adc1b9a82671c5b4da83512a13f8133ebc1b35c
CVE-2024-20253,0,0,d3a8e74c395d6dc3e7ac6947f74fcfd7abc559db9a2a5673b58b5d97e64fbd4a,2024-02-02T16:15:53.893000
CVE-2024-20254,0,0,483b1bcc903a1f3fe5774e73017e3920b0d7ed3bc82e804e2d29798a514160f0,2024-02-15T15:54:33.153000
CVE-2024-20255,0,0,4c8067b6b3b68c94894b4ecd8c182992b7e2d67f936be466104b1472a1d76a79,2024-02-15T15:54:19.960000
CVE-2024-20256,1,1,b0dd789612b602052ef2f31485ad5ace974daa07ff42f3a5fb8888aea29b2994,2024-05-15T18:35:11.453000
CVE-2024-20257,1,1,b53819264bd51765687f1bbea48604ce7c247cba64f273330beefab6a49de0ca,2024-05-15T18:35:11.453000
CVE-2024-20258,1,1,7e0281275342a4241ab1f67f44548dd6cb6ea6363247f2ca0cdb423f16f0e942,2024-05-15T18:35:11.453000
CVE-2024-20256,0,0,b0dd789612b602052ef2f31485ad5ace974daa07ff42f3a5fb8888aea29b2994,2024-05-15T18:35:11.453000
CVE-2024-20257,0,0,b53819264bd51765687f1bbea48604ce7c247cba64f273330beefab6a49de0ca,2024-05-15T18:35:11.453000
CVE-2024-20258,0,0,7e0281275342a4241ab1f67f44548dd6cb6ea6363247f2ca0cdb423f16f0e942,2024-05-15T18:35:11.453000
CVE-2024-20259,0,0,73ab78da8d0a510423d7dde4580b3cd86ea36933046212658a9baf6cc1c10b54,2024-03-27T17:48:21.140000
CVE-2024-2026,0,0,5071705b646dd74094af5cbedc0c8f83ed6481f03743c4a8c8e638254d8625b5,2024-04-10T13:23:38.787000
CVE-2024-20262,0,0,0f454f18496ee5ef2600ffeec90b1f623047ba774ff76b9352de48c47d8ed167,2024-03-13T18:15:58.530000
@ -241225,18 +241226,18 @@ CVE-2024-20357,0,0,3a1d2757f67674d091902d27d845115a7046a8d266fe0b3daa6615e60c820
CVE-2024-20358,0,0,a08433ecd9375b9385be343adba44e1b907ae2f57b9c630ccf362a5c87517062,2024-04-30T14:47:57.753000
CVE-2024-20359,0,0,103c2bc1c6783d5aa055ed80504c27ea24cb5bf5556deb17c85950666ec17e99,2024-04-26T15:25:02.773000
CVE-2024-20362,0,0,0e125a5f57daca09b3a31c24c5285918bb46201f033defe636102ce0379b9ecc,2024-04-03T17:24:18.150000
CVE-2024-20366,1,1,3c3610af9b81661c93f19efcd99e3b49e6274e6f71fdc733ec6e8ff70752486e,2024-05-15T18:35:11.453000
CVE-2024-20366,0,0,3c3610af9b81661c93f19efcd99e3b49e6274e6f71fdc733ec6e8ff70752486e,2024-05-15T18:35:11.453000
CVE-2024-20367,0,0,e44fa9dcd83189ac4bb0284b57ce6be9f7d161e3fd46e74e477fe5fd623ca1b7,2024-04-03T17:24:18.150000
CVE-2024-20368,0,0,4814a8127430faf4ae61ecb30b9f4c874f54598057d22bcc8b2ca14f1fefa88a,2024-04-03T17:24:18.150000
CVE-2024-20369,1,1,114f4c17a7bd9ac58900a0a37ba8d2c7df45f310ac4ea9f52d75d3d1b6987930,2024-05-15T18:35:11.453000
CVE-2024-20369,0,0,114f4c17a7bd9ac58900a0a37ba8d2c7df45f310ac4ea9f52d75d3d1b6987930,2024-05-15T18:35:11.453000
CVE-2024-20376,0,0,f2d63c495e29c041f088c737c43bc0376762038f0c232e5dc947b16dc2d9b6dc,2024-05-01T19:50:25.633000
CVE-2024-20378,0,0,c56331427543a017f67772b9050096817613a232760574cb874b9fcd7b7a2694,2024-05-01T19:50:25.633000
CVE-2024-20380,0,0,27a40430fe20b612112590b142958d67807aaab6acdd377d10e76eb25b3ce068,2024-04-19T13:10:25.637000
CVE-2024-20383,1,1,ceeddb30ef22193fb87040cbeceb56f942e1176f81db960f5b82d11b7a051d69,2024-05-15T19:15:07.900000
CVE-2024-20383,0,0,ceeddb30ef22193fb87040cbeceb56f942e1176f81db960f5b82d11b7a051d69,2024-05-15T19:15:07.900000
CVE-2024-2039,0,0,4f1e5a8a814f51edc0234cc5670da2107cc2a93a2ef1eadc628898e3eec44b24,2024-04-10T13:23:38.787000
CVE-2024-20391,1,1,23208b722cbec0fe0bcc97ff800afcbfc01e9218747bbaec63dfa6fb2c457339,2024-05-15T18:35:11.453000
CVE-2024-20392,1,1,68ce5e0c88f12b888365e155a5ef33213deaaec600edba3211e7ebff5e44a0a7,2024-05-15T18:35:11.453000
CVE-2024-20394,1,1,8f49f910e0be2f8c15f8cb5e1959b54a9b81cda2ced34ad7d46b8621bbfc2ab5,2024-05-15T18:35:11.453000
CVE-2024-20391,0,0,23208b722cbec0fe0bcc97ff800afcbfc01e9218747bbaec63dfa6fb2c457339,2024-05-15T18:35:11.453000
CVE-2024-20392,0,0,68ce5e0c88f12b888365e155a5ef33213deaaec600edba3211e7ebff5e44a0a7,2024-05-15T18:35:11.453000
CVE-2024-20394,0,0,8f49f910e0be2f8c15f8cb5e1959b54a9b81cda2ced34ad7d46b8621bbfc2ab5,2024-05-15T18:35:11.453000
CVE-2024-2041,0,0,f285d116ebee20fb02fc2c7de4f69fe8567e76fe9eda446fb7969801431b3d7d,2024-05-06T14:15:07.747000
CVE-2024-2042,0,0,67e98a9ddaa62c913ab5a6b6d5de4b0b93571e9b9955fcfed7d86ddfd42889ed,2024-03-17T22:38:29.433000
CVE-2024-2043,0,0,460bc52876e8486363c6c006eee49a91636701c262b01e4f4016a237e9fb24ba,2024-05-02T18:00:37.360000
@ -244209,7 +244210,7 @@ CVE-2024-25739,0,0,3f77808e2a48c50aab928b0c96b70686e724f3302ff450f04c0ab77d04e27
CVE-2024-2574,0,0,bb9537e11e6b08d3b85900eb213f5c041b817e4a7c01b1325f1847f41c652182,2024-05-14T15:19:55.943000
CVE-2024-25740,0,0,e49082457da2ca822066645fd01741e2b46dee6a85b6e915fd169e8229594e99,2024-02-26T21:11:27.837000
CVE-2024-25741,0,0,f1234f859d02ff2a7aa2753dc2a1e43b929acf864167d8c3c5522f3098d24837,2024-02-12T14:20:03.287000
CVE-2024-25743,1,1,37902cd6ceb18dc7f5198dc1c50c8c984eab5fa3022e6df53dcc7738f6794e13,2024-05-15T18:35:11.453000
CVE-2024-25743,0,0,37902cd6ceb18dc7f5198dc1c50c8c984eab5fa3022e6df53dcc7738f6794e13,2024-05-15T18:35:11.453000
CVE-2024-25744,0,0,4b0b476da30d39c3d73f2f74d7d6a3fe7e372d371ce439923d15b6b4e22ccfeb,2024-02-12T14:20:03.287000
CVE-2024-25746,0,0,6272a47b2c23f44a1fdd2c4a804d33aa59797a37bb203c19911b0f26f1951dd8,2024-02-23T02:42:54.547000
CVE-2024-25748,0,0,beca6aa38f2f4693ac0e2f34d593b69359263cf9d72b56c066509cc509297ece,2024-02-23T02:42:54.547000
@ -245348,6 +245349,8 @@ CVE-2024-27236,0,0,050a1052e26047f2e5d0b58d8351e3e856ec1c52f1b2daf95f02084addfb0
CVE-2024-27237,0,0,c9df1e7ac4a8ec03918c32a86c9c817e799f7110838b8d32905600c71cb57808,2024-03-12T12:40:13.500000
CVE-2024-2724,0,0,d84af29dc771f15bf9bc747f8064ec43ed6ea62cecc1d0bdf5353519ea88d1ba,2024-03-22T15:34:43.663000
CVE-2024-27242,0,0,4bcf7143849c415b8cba90784829de5a74333601b3e2c00d25c6430d064be462,2024-04-10T13:24:00.070000
CVE-2024-27243,1,1,e44f20f525e45fccb02d77d3a6200843def346a565e57649276c04506a3f5eb0,2024-05-15T21:15:07.987000
CVE-2024-27244,1,1,c6337efca1fe10fb443e4701968ffd92ffe4a5ff6932dae35f9eb59e356d64a3,2024-05-15T21:15:08.220000
CVE-2024-27247,0,0,9590a32000c7161883bd601f17b84889ac73a7794287ae1fd94cd04419528997,2024-04-10T13:24:00.070000
CVE-2024-2725,0,0,f5993e44d4dd2cf17ff419f8f154eb7cefc4802f6428c3ec1541fed0378bb103,2024-03-22T15:34:43.663000
CVE-2024-27254,0,0,6863e2c846e99549e249a94dae3c18d1781ed3b7e7fcc2d6019a28e44086daf5,2024-04-03T17:24:18.150000
@ -245518,7 +245521,7 @@ CVE-2024-27575,0,0,fe78cdbfc48ba2557faf61957a122c11738e27bfad3d91860b0cc50d57150
CVE-2024-2758,0,0,17991f9023170386d082f67ecd28c59f739c4b241c4acc5ac889665593ad11b4,2024-05-01T18:15:19.300000
CVE-2024-2759,0,0,cb410b99122b16bbafd55e196fc83701c95bae09fba9353767401f5fe587c56c,2024-04-04T16:33:06.610000
CVE-2024-27592,0,0,1ee880de3a9d61f4b25b2b3ac56dc03f1e8964452682bc0959dc8a13f2b2c67c,2024-04-16T23:15:08.690000
CVE-2024-27593,0,1,bc7852c90f4f5b0f7f04ef845ab44a5b18bd065a2574fd35b8d203f7b3a647c7,2024-05-15T18:35:11.453000
CVE-2024-27593,0,0,bc7852c90f4f5b0f7f04ef845ab44a5b18bd065a2574fd35b8d203f7b3a647c7,2024-05-15T18:35:11.453000
CVE-2024-2760,0,0,a061be605bfdf89df12f7caacd6b7263c7034257ee7260474dff7d3e633c6b9d,2024-04-23T12:52:09.397000
CVE-2024-27602,0,0,641d004f193cbc187bf560868353a5607871444565457a2a1f222c57bafe0082,2024-04-03T12:38:04.840000
CVE-2024-27604,0,0,5dd90a20288c95f7805059ddcbf501c6de9e3b933a16f752b43bf101ed5f2058,2024-04-03T12:38:04.840000
@ -245764,7 +245767,7 @@ CVE-2024-28039,0,0,9ef35c96ff38e007b2fd4f37c3f1f5b6d35461c4eaa69f2b36faccd438b26
CVE-2024-2804,0,0,e0bc04f900a999f4a26367b15f33e067e2f6beed81e7fe017505f263f65dfc77,2024-04-10T13:23:38.787000
CVE-2024-28040,0,0,92dbc878ad6b57fc9235f8005b7929f517428204d8ea6a98b01d4757cc97218d,2024-03-22T12:45:36.130000
CVE-2024-28041,0,0,4d284a807f7da2d3fcf5f7c7ae19f2272c31bf9662bccbca7ea6b863e800e974,2024-03-25T13:47:14.087000
CVE-2024-28042,0,1,568c7e6609303186ee4d31cfad1af77c468d67824da92bcbd2f8e5b9c8c02e04,2024-05-15T18:35:11.453000
CVE-2024-28042,0,0,568c7e6609303186ee4d31cfad1af77c468d67824da92bcbd2f8e5b9c8c02e04,2024-05-15T18:35:11.453000
CVE-2024-28045,0,0,f398328ae0e32872e31247004b322ba0fa2d2bf6f860a8ec81e7f59b3326d256,2024-03-22T12:45:36.130000
CVE-2024-28048,0,0,e5666138598204bcf10d324dcf85f36b61e34128f66eec1b98b8c785274aa0cf,2024-03-26T12:55:05.010000
CVE-2024-2805,0,0,65ecd352418838698058c0251e8b8046382b22c77fa2bf4cbfab1f489cceac98,2024-05-14T15:20:55.190000
@ -245784,7 +245787,7 @@ CVE-2024-28076,0,0,573150dd6c1cd2ebee3e74b864dba3fbe351c8f7cfb57fda1c213b0f2a3ae
CVE-2024-2808,0,0,0ddc0efb07baf1abf1c2622a6109caa29a4eab8dbb700e58539ddfe8d8656fb4,2024-05-14T15:20:56.390000
CVE-2024-28084,0,0,e855eaf3201adbee7f29bca688e63324787cf32844050753a9cd1965f8c4b542,2024-03-23T03:15:11.583000
CVE-2024-28085,0,0,f3746c3ddd8d0352f413aa7741d83f5b369ac18a2feb54c8be56427b7c5d5c29,2024-05-01T18:15:16.630000
CVE-2024-28087,0,1,57c137f6465d01ad9e26bb9e81229401ea6d3209e391354de557e42e58ac6c64,2024-05-15T18:35:11.453000
CVE-2024-28087,0,0,57c137f6465d01ad9e26bb9e81229401ea6d3209e391354de557e42e58ac6c64,2024-05-15T18:35:11.453000
CVE-2024-28088,0,0,d2f20b1069b24ba10d21e8bf3b61c2c6a1c6b345ff59786676752b80abbde7a4,2024-03-13T21:16:00.380000
CVE-2024-28089,0,0,ebb0921cb9fb93aeb61f55f441ccf2f84797f1edc4a13bbbf59b2589f6308e97,2024-03-11T01:32:29.610000
CVE-2024-2809,0,0,f8db6f0d3888771d61b3d045937990f324a2616ff4993d7cb8260fa12f281628,2024-05-14T15:20:56.780000
@ -246859,7 +246862,7 @@ CVE-2024-30050,0,0,6cc63ca41548c168dfe0a918b16bc61670b8e886b85ca3011dc326ba16526
CVE-2024-30051,0,0,a4d312757bf10e98fc5abde48385ae5800bd3f734365fd985fcda1767b1f318b,2024-05-15T01:00:02.933000
CVE-2024-30053,0,0,e35815c7138ab1a7098545e5c1f60270a71687b75ca8293c4e18b251852decd3,2024-05-14T19:17:55.627000
CVE-2024-30054,0,0,0a03f044a7097f59453921f002025a6e0ea1442fa3989cfe0a7dc7863bbd74d0,2024-05-14T19:17:55.627000
CVE-2024-30055,0,0,ea5af506f93723b5b522e6509b55c3faab44e1e96792f001de97fc266cf47da8,2024-05-14T16:13:02.773000
CVE-2024-30055,0,1,3c1bf54fd3fe6c5ab3703162f359c88c3cd7915d8f1fdb651cdd28bec89280a6,2024-05-15T20:15:11.047000
CVE-2024-30059,0,0,641bfe1fd5037a786b7946fc4a87eacdde994549eb26a51143ba04c7be98fba1,2024-05-14T19:17:55.627000
CVE-2024-3006,0,0,9040253cbc6508390736e1481a4bf2fb025630f8a64b9e7a311033e723677258,2024-05-14T15:39:44.300000
CVE-2024-3007,0,0,d1ce0225ebf6de374a1afad6b25cd532199967321f1b7a3dc00faa6df881ee0b,2024-05-14T15:39:44.623000
@ -247628,7 +247631,9 @@ CVE-2024-31392,0,0,e47fa59932bfeb069e43bdeea717668f4f8eb0beb6cf866b3eeac98c4b5a7
CVE-2024-31393,0,0,37f7a5992221d6bde3095665f91d96a5b3c012db649e1c1c87f1a16619b63290,2024-04-03T17:24:18.150000
CVE-2024-3140,0,0,2744d4fc444c3f2c4374003cc63b6e233618c3b69d8d4c39689a5f4bd63a4f88,2024-05-14T15:40:01.177000
CVE-2024-31406,0,0,21585692d302884cf3150faa716f097a2673ce3764bdf3b78bdfd36f438a0484,2024-04-24T13:39:42.883000
CVE-2024-31409,1,1,75121b5fd6befad9837845a75d72c51008b62cb175e0851e507e0f538bc5ad0d,2024-05-15T20:15:11.203000
CVE-2024-3141,0,0,bad35b74388efc9a159a74689bd08287dcf312f9e2c82d7b8d2698820a1f4d16,2024-05-14T15:40:01.717000
CVE-2024-31410,1,1,62f60a42e8c97728999144148612a776755f39d5a3f19a64a21e380500f53c38,2024-05-15T20:15:11.473000
CVE-2024-31412,0,0,bf5e4b7125888123ed114d5a41d3a9e2f2c13a81227e8af339e531675aae10d6,2024-05-01T19:50:25.633000
CVE-2024-31413,0,0,698cad7cc2e917bb34bb0c2eff1e375ca818f5fcbe8e16911c403ef0fbd2428b,2024-05-01T19:50:25.633000
CVE-2024-31419,0,0,36c8a60658bbd6b33e2cacab3bae7069924fea2c95b1bfd68ef2a5a438c0a6d2,2024-04-03T17:24:18.150000
@ -247788,7 +247793,7 @@ CVE-2024-31816,0,0,8b0edd8a38c33b33b513f099b5e67906c887d32cd0308b5fdfadcac29bc21
CVE-2024-31817,0,0,440a95dbf8589f9a9953a43f37d15f507abb02f786409b55238dedab4fef773a,2024-04-08T18:48:40.217000
CVE-2024-31818,0,0,72cb9554b67c0af94ffbc580efc3a62e49e452a23305845c2a6157eaa69b0f7f,2024-04-15T13:15:51.577000
CVE-2024-31819,0,0,1f8122b9110b9c9e379686153d36743829cf8787fef8a8a1bf73fc202035f197,2024-04-11T12:47:44.137000
CVE-2024-3182,1,1,6c8175e2d6a5adec87d6a333f1946440d4dd82fdc394055a831d749195152d50,2024-05-15T18:35:11.453000
CVE-2024-3182,0,0,6c8175e2d6a5adec87d6a333f1946440d4dd82fdc394055a831d749195152d50,2024-05-15T18:35:11.453000
CVE-2024-31820,0,0,53a16faaf48888346903fcbd57d0be6b6e997c7cc9b808188a566b0da0cce561,2024-04-30T13:11:16.690000
CVE-2024-31821,0,0,c569fd754a13100f99a004a097455b073140e65e59c749e53df718879b6f98c3,2024-04-30T13:11:16.690000
CVE-2024-31822,0,0,39f03d3ff200c72017a27779b734a3b0a55aa46362d194ac94877ae191a015e0,2024-04-30T13:11:16.690000
@ -247804,6 +247809,7 @@ CVE-2024-3185,0,0,7fcf61647d547b77181d5225cd4d3f1f2099e2653d1cd7f2d6fbb610b985c0
CVE-2024-31850,0,0,4dfa9605a049a09744618be099ad889f274ff40fc42a18e168685588a6a44b6d,2024-04-08T18:49:25.863000
CVE-2024-31851,0,0,0e8250a21123e214b1f09f2b325f0d0e22e98cb6715480d7ac13d673f761eb46,2024-04-08T18:49:25.863000
CVE-2024-31852,0,0,7a968282e2d23775fda0d6edce03c38caf21ca868b2fca3251339d962c2ec4c6,2024-04-08T18:49:25.863000
CVE-2024-31856,1,1,2fb6a67e4bccfcb957f4ff072409a4238fd92fa1a8ccff2d33cdd48ef9d0d60d,2024-05-15T20:15:11.710000
CVE-2024-31857,0,0,3e7ac60afeec75094fbcaec8b53e1a238b7bcb05ca078ef7a1edb4dbe4dfc654,2024-04-23T12:52:09.397000
CVE-2024-31860,0,0,a2cd98cb7498e7c2656edd8e2839918c590dac3d691d82a031a70fae29aab7e2,2024-05-01T18:15:23.393000
CVE-2024-31861,0,0,9373eb863c6ff79969ca8cd07d1a0b13ff0cef9f98ab0a21b4aa070f1acd5bf4,2024-05-01T18:15:23.450000
@ -247914,10 +247920,13 @@ CVE-2024-32039,0,0,ad4990c66c843cfb78c18ddf4863c9df097d3c92a62d93c490b95501745f6
CVE-2024-3204,0,0,bc0f1978e5e6211ff53bd820ee230ce63d55ef94ae9e4225c8cae3bc2ba7740b,2024-05-14T15:40:27.180000
CVE-2024-32040,0,0,c9e8a9bafebd4e002463be520ee967b3c928ddf4cec6865e7aa23fa1d81b2834,2024-04-23T12:52:26.253000
CVE-2024-32041,0,0,e88f61c8c702a5d00724562a1be23c2ca0fc9ec03e84f95db2dfed035982cfb4,2024-04-23T12:52:26.253000
CVE-2024-32042,1,1,18f96607196f60df563ea4d0006bcb08eebbb7c581c1ac075c7d9087f3444b53,2024-05-15T20:15:11.950000
CVE-2024-32046,0,0,3771b70436f95435fc521db21da6fd859bb3ed607b3e6e7edd188445267746f3,2024-04-26T12:58:17.720000
CVE-2024-32047,1,1,81aa201d8f391c623ace611d56c3632457de0b4fca5b72f90454ed1713dff2dc,2024-05-15T20:15:12.197000
CVE-2024-32049,0,0,d9cad06fbf5a30eecb78b22409f73f445b96767def965004d9fc51455fda8ca6,2024-05-08T17:05:24.083000
CVE-2024-3205,0,0,10c74c58b3966e2a00c16f7270bdcbd811aa5b381e01a238860c78cea2b79c84,2024-05-14T15:40:27.550000
CVE-2024-32051,0,0,6b68078466255ceca82525e73c2bf321431fb4aeacd1939a9b40ac3cfa9637f8,2024-04-24T13:39:42.883000
CVE-2024-32053,1,1,4aad82d61cd1c4047b29c959274705961fb06a479ecc985fe1208eb7f2f4de71,2024-05-15T20:15:12.443000
CVE-2024-32055,0,0,3f8e8a5289d54fb272f8396bfe2ad3739e217a3be6adbbeaee8406791320efbb,2024-05-14T19:17:55.627000
CVE-2024-32057,0,0,51b57062e41a1f932a85024c46a8a2ec9ea669d7244ddac01bd3050c5649adf5,2024-05-14T19:17:55.627000
CVE-2024-32058,0,0,53257fd9b340d779398d943b31a969b49b3889080b3875550678d88fe76d1bbe,2024-05-14T19:17:55.627000
@ -248703,7 +248712,9 @@ CVE-2024-33604,0,0,3ab2c002c5d377b142c243de99829b91e6a82788bf0b2eb8f577e38ce442a
CVE-2024-33608,0,0,75bd6a7cfea3f46ff885a646fe991c9389ed68527f615bf970851ddf524ca214,2024-05-08T17:05:24.083000
CVE-2024-3361,0,0,987fc9016e6caaea2a05e0ecaac54b996dc88be59c54c7758912ef93d8b301eb,2024-05-14T15:40:45.990000
CVE-2024-33612,0,0,0425b598952d370f8a45e51ed1855ee3ad8884230e79284f598bf766f7d5da62,2024-05-08T17:05:24.083000
CVE-2024-33615,1,1,ecf057e01e02da48e43be47a3267679fd8628e752ae9702d34b92a2ff396f4a4,2024-05-15T20:15:12.687000
CVE-2024-3362,0,0,6ecfba6acd565e85eacdb7075415486f6ca2cf37583c56497e03b226e597b508,2024-05-14T15:40:46.150000
CVE-2024-33625,1,1,5178fcf8dfcf7ff7b204eb214114f384509c97b72381770cf1a5dd5cf54c62d7,2024-05-15T20:15:12.927000
CVE-2024-33627,0,0,46d1ca344f6adedbf698f1c5642ffd1e81c65d9ee122179e4726e5c233352e37,2024-04-29T12:42:03.667000
CVE-2024-33629,0,0,9c289386a90a37d7a3105c6378e86670a64a304277cc6973b5fc7ab9cb833007,2024-04-29T12:42:03.667000
CVE-2024-3363,0,0,3541abf9d89d8ffa40b51384a23b6439efdfda78eac97dfab7c1dcd2ccb27dba,2024-05-14T15:40:46.557000
@ -248887,6 +248898,7 @@ CVE-2024-3400,0,0,bb755e0acb269b886784f5549d850dac352a6e059a8f5cb5827539d3e41b8b
CVE-2024-34010,0,0,c31f2f180475c1f3f2204c1feb2010c5ada948eb1b4d37517c54f97316341f08,2024-04-30T13:11:16.690000
CVE-2024-34011,0,0,4e2e0fb5d64e6e75da5ff3561c6f86ff1f891a3646e890e015512c561d328a58,2024-04-30T13:11:16.690000
CVE-2024-34020,0,0,9d9b11f4db84c3770acd92b1150bad9b802c58de4fce781bba37a89c232e029f,2024-04-30T13:11:16.690000
CVE-2024-34025,1,1,efef57ec9aa0e082e9a5c83219cb61ece32e743eacd52a5ecd541daf92a87dd0,2024-05-15T20:15:13.190000
CVE-2024-34031,0,0,32832cbb1e8c12d82b1b4f0b17dd8da5298483e844da3b9dfde76f943f816f64,2024-05-03T12:50:34.250000
CVE-2024-34032,0,0,5a4c84545c086e02a753cbdc2a69955417aff416961e34fcc07fc6e9fddc4770,2024-05-03T12:50:34.250000
CVE-2024-34033,0,0,719a8ff9b4eb14602d2888920177741310f8b0330069ca799cf076b91625a4df,2024-05-03T12:50:34.250000
@ -248919,7 +248931,7 @@ CVE-2024-34078,0,0,82828053870f4925c57756113c35390ae666a52c7685f7de8391ec7c16f1a
CVE-2024-34079,0,0,9fcb0ad4a3dfcb1ea318cd4910e18003a9a5afbe5b2fb94481c76cdbd73faadd,2024-05-14T16:12:23.490000
CVE-2024-34080,0,0,31511bc199a6f2ff58d809d178822180b69f7a01cc54f423d19f4303cc5c9823,2024-05-14T16:12:23.490000
CVE-2024-34081,0,0,e1e1e5fa3e03beaf407cadde441648651a034f36cd3c66a34f4de6854261c6dc,2024-05-14T16:12:23.490000
CVE-2024-34082,0,1,dfcfb42195688d761efac33b725f89283a0ee86d0d1c124a1f7eb69250a70c25,2024-05-15T18:35:11.453000
CVE-2024-34082,0,0,dfcfb42195688d761efac33b725f89283a0ee86d0d1c124a1f7eb69250a70c25,2024-05-15T18:35:11.453000
CVE-2024-34084,0,0,3472cf0a3060d39e1085c2356da46bf3f00aecf0dd516fa3a42f335f20a49f9d,2024-05-07T20:07:58.737000
CVE-2024-34085,0,0,d83738fa0c2a322f0cb71130623850a2b6a31059d871027b26253eaf9e4bb5fd,2024-05-14T19:17:55.627000
CVE-2024-34086,0,0,c2ccb7f5604719631c62cb46c494b7e7a3c3f8dacc5c8c6ad647f8150087c2bd,2024-05-14T19:17:55.627000
@ -249230,16 +249242,19 @@ CVE-2024-34823,0,0,737c5995b3eabe424ea36d114ec1a1d3c39830934d7abcd5d0d3c17fbd538
CVE-2024-34825,0,0,6ba1ce532bfd92191eb86f87183f51a75f938fb2026554a0d94db57766c13bfd,2024-05-14T16:12:23.490000
CVE-2024-34827,0,0,ec3b4bec9ac3936112ec0f5ade0d9f415950617463511cbea94e2ae26286d697,2024-05-14T16:12:23.490000
CVE-2024-34828,0,0,9c80d5b75e8365d647d79189b0dcedf971cc9e925e8468faddbfc0a85ec25e3d,2024-05-14T16:12:23.490000
CVE-2024-3483,0,1,427fe5c7afe21571985090a3e61d2dfd832c806066e0f05497be971746e1a0ea,2024-05-15T18:35:11.453000
CVE-2024-3484,0,1,eca82b2b79c9812d5f85e32cebf89030f3b45a4b466571083f5222acfb8150bb,2024-05-15T18:35:11.453000
CVE-2024-3485,0,1,d37df2823d4b30e0edd74bea10436beccdf4d8f8ab754078c59bdfe32b09cd12,2024-05-15T18:35:11.453000
CVE-2024-3486,0,1,9d5afe379cd99633f59e6221033e894c2df3adb2ee4d60a572c8e4ee81c5dba3,2024-05-15T18:35:11.453000
CVE-2024-3487,0,1,c7132b6420a5077c5f8de0d217cf5f82271148747d4fe614f8f6800a4f4b117f,2024-05-15T18:35:11.453000
CVE-2024-3488,0,1,d6ddf0f923c322dee9b1adbf84db0f6fa06c73b8cc2a3ea94ab21e4aa0e42100,2024-05-15T18:35:11.453000
CVE-2024-3483,0,0,427fe5c7afe21571985090a3e61d2dfd832c806066e0f05497be971746e1a0ea,2024-05-15T18:35:11.453000
CVE-2024-3484,0,0,eca82b2b79c9812d5f85e32cebf89030f3b45a4b466571083f5222acfb8150bb,2024-05-15T18:35:11.453000
CVE-2024-3485,0,0,d37df2823d4b30e0edd74bea10436beccdf4d8f8ab754078c59bdfe32b09cd12,2024-05-15T18:35:11.453000
CVE-2024-3486,0,0,9d5afe379cd99633f59e6221033e894c2df3adb2ee4d60a572c8e4ee81c5dba3,2024-05-15T18:35:11.453000
CVE-2024-3487,0,0,c7132b6420a5077c5f8de0d217cf5f82271148747d4fe614f8f6800a4f4b117f,2024-05-15T18:35:11.453000
CVE-2024-3488,0,0,d6ddf0f923c322dee9b1adbf84db0f6fa06c73b8cc2a3ea94ab21e4aa0e42100,2024-05-15T18:35:11.453000
CVE-2024-3489,0,0,407fc99ac607d8b254895aa9dc68afca4c0fff929cb004325e3c06bd83280a91,2024-05-02T18:00:37.360000
CVE-2024-34899,0,0,a85a36cd499c09d94efbeda56212d2ba58c2478d4fddc573ece3a4dbf1232e63,2024-05-14T16:12:23.490000
CVE-2024-3490,0,0,243d31a8a91d548ae7245abd7ab9112de0ee4857a2da5c2f334b7a81fefaf51e,2024-05-02T13:27:25.103000
CVE-2024-34906,1,1,47527fcdfd69ac5314a6e330311f17ba651fcfaa2f59fdfa90c62d2e0c088d22,2024-05-15T20:15:13.460000
CVE-2024-34909,1,1,18b038e3cd8824227114274d526008cb38f6fd3f1f837d580c42a9692d89eb19,2024-05-15T20:15:13.570000
CVE-2024-3491,0,0,155e981c246f1ab173bd75da38bee4b8800ff4b0566c01179dcadac412465c38,2024-04-23T12:52:09.397000
CVE-2024-34913,1,1,a53e1bbb348c8d111f61abb25b3cd4602a13f6853d4612e95a84b25de9bcf03f,2024-05-15T20:15:13.657000
CVE-2024-34914,0,0,5bc7d29eabf3d60ac7563aebb997ef32f71e2c79c881b0df9620a63718fdc787,2024-05-14T19:17:55.627000
CVE-2024-34921,0,0,e6321f463933f9111e0a5517ef67fece2dbb43da2af562174271b850a60b5090,2024-05-14T16:12:23.490000
CVE-2024-3493,0,0,63ead7e160b6b2cbd834dd6075f87d345af3361e8d55520f11e81a53e2086aaa,2024-04-16T13:24:07.103000
@ -249266,7 +249281,7 @@ CVE-2024-35050,0,0,40188866046a91f191c7f1639193ce449b408a68c45e9e97f9642e7aafb53
CVE-2024-3507,0,0,4311efcb171543ec92e46563bc97a34308842d5cb27d2460f854a987393d053f,2024-05-09T09:15:09.623000
CVE-2024-3508,0,0,c82390a1238326cf6817e875dca33757792126eb5098bd44b5a908dea5e7149a,2024-04-26T12:58:17.720000
CVE-2024-35099,0,0,93e942b92f9cdfe43455da9473fe46e57ccc0e6f1660402d8f3a7786b97c7b2a,2024-05-14T16:11:39.510000
CVE-2024-35102,1,1,7da50a60dd60f1e8d0d29c1c6c16eeb50c73c2afd5ccd062fa12f4bca86353d6,2024-05-15T19:15:08.063000
CVE-2024-35102,0,0,7da50a60dd60f1e8d0d29c1c6c16eeb50c73c2afd5ccd062fa12f4bca86353d6,2024-05-15T19:15:08.063000
CVE-2024-35108,0,0,3f3dd71c8bba83e52560608eda839ceb07358fe0eac2940e38801ea6c4f52fe7,2024-05-15T16:40:19.330000
CVE-2024-35109,0,0,22ca550b25f858548d0753bd84153c4f353fa8f289d5d5402f105e17ad6c273f,2024-05-15T16:40:19.330000
CVE-2024-3512,0,0,7186c9ec3829c2082fd68b5fc8e23caed587fdf0f4e68c2974db5f41b90fb514,2024-04-25T13:15:51.663000
@ -249539,7 +249554,7 @@ CVE-2024-3885,0,0,18d5fcf15976a3d948a4584d141049e724e0352960b62e33e0645d8a5c3912
CVE-2024-3889,0,0,c4039354ee4d81ce5faec2ce618c8f0af30c97c1ad1feeb689836cb585b438a6,2024-04-23T12:52:09.397000
CVE-2024-3890,0,0,167befe3a418fe829a07bf47548aa5d5c5fe13f91b75a3184f188bef038919b6,2024-04-26T12:58:17.720000
CVE-2024-3891,0,0,8daff08d10085680eb7790a9a2c0ef842bf636f7de8dcdfbf7cd60ad81535ead,2024-05-02T18:00:37.360000
CVE-2024-3892,0,1,f624bde4016dca03d61765cf880936f8aeb5bf50ea89634973cc6911c089d7aa,2024-05-15T18:35:11.453000
CVE-2024-3892,0,0,f624bde4016dca03d61765cf880936f8aeb5bf50ea89634973cc6911c089d7aa,2024-05-15T18:35:11.453000
CVE-2024-3893,0,0,44a15b07d473e504956c2fc6e9bdbbb981ef84a8f1b69c702ee1ea4228dd1195,2024-04-25T13:18:13.537000
CVE-2024-3895,0,0,e17d122bfb4ca0c486d0790093f87ef90da21ea7556181e7099c23bc52ef24ea,2024-05-02T18:00:37.360000
CVE-2024-3897,0,0,2e6547d98bffe49274878683fd846b0dea4d063f5cc123163d759ecec392b068,2024-05-02T18:00:37.360000
@ -249572,9 +249587,9 @@ CVE-2024-3955,0,0,bba90f25cff74c274e08a67a3936bf55505a38180fc074269167b54bd09035
CVE-2024-3956,0,0,8f179ad85710f95d08b051c8d0b5b2621fe218860be993c193453df1e0f7004b,2024-05-14T16:11:39.510000
CVE-2024-3957,0,0,6e4e327328ad5c18e880466a103b162c10591051d90490bf0a67f6889d728425,2024-05-02T18:00:37.360000
CVE-2024-3962,0,0,9de964d29f43823164300439a0e71453bbca4a5c1f5767eca51db600267798cd,2024-04-26T12:58:17.720000
CVE-2024-3967,0,1,099dcb4e0ea3276e58d4ae59fff4b2d8b43db5590de7a705773810b96cdf9f56,2024-05-15T18:35:11.453000
CVE-2024-3968,0,1,611abf2a3aab73b0f2915499615e54e318f5ba5471c6b03989989674a1034421,2024-05-15T18:35:11.453000
CVE-2024-3970,0,1,0ab1a85d07ea361613f15ca4850db019bae5b14452cf6d0fe0130701075daa91,2024-05-15T18:35:11.453000
CVE-2024-3967,0,0,099dcb4e0ea3276e58d4ae59fff4b2d8b43db5590de7a705773810b96cdf9f56,2024-05-15T18:35:11.453000
CVE-2024-3968,0,0,611abf2a3aab73b0f2915499615e54e318f5ba5471c6b03989989674a1034421,2024-05-15T18:35:11.453000
CVE-2024-3970,0,0,0ab1a85d07ea361613f15ca4850db019bae5b14452cf6d0fe0130701075daa91,2024-05-15T18:35:11.453000
CVE-2024-3974,0,0,be006e5b3616e00e2f4e1e0d6bc008c0eb4e52aea8dc159d27ca65cdb7fbf6cb,2024-05-14T16:11:39.510000
CVE-2024-3979,0,0,d8a406849a56e67550abc4fa218f247855beca50c5a748d1d4b81f36623dd46a,2024-05-14T15:42:39.440000
CVE-2024-3985,0,0,73586f1cedc99952324792e19f078c055584e6e606f6222ac3907090ad395ced,2024-05-02T18:00:37.360000
@ -249693,8 +249708,8 @@ CVE-2024-4193,0,0,e9deeb0bdc41c13676562ca936725d7aeb1ece3758666bf0b3b852acf97adf
CVE-2024-4195,0,0,320e8c641dbb71fd3a637ea44d2a1260b2aea61b9d12f44c9e97c80bff500815,2024-04-26T12:58:17.720000
CVE-2024-4198,0,0,845a410de3c7b102462b76b86fccfba72df0a0950e69dc55e9742bae00fec8d9,2024-04-26T12:58:17.720000
CVE-2024-4199,0,0,cf6d3693370511a3e101e3f64be76698c9597ca550274152fcbac0c1d8ff2663,2024-05-15T16:40:19.330000
CVE-2024-4200,0,1,20489663ef6581577b44e2fe00c40941cede013c8a6115f48d1dde72e3c9c743,2024-05-15T18:35:11.453000
CVE-2024-4202,0,1,844c9951a48b3e33cafbd80a61570f748c650c80ab93b55d4a680fa3512b0e12,2024-05-15T18:35:11.453000
CVE-2024-4200,0,0,20489663ef6581577b44e2fe00c40941cede013c8a6115f48d1dde72e3c9c743,2024-05-15T18:35:11.453000
CVE-2024-4202,0,0,844c9951a48b3e33cafbd80a61570f748c650c80ab93b55d4a680fa3512b0e12,2024-05-15T18:35:11.453000
CVE-2024-4203,0,0,b9100cb2d762239b42c8cf03df52f7e057bb3e7a71ddd83596d3f071a56b0f43,2024-05-02T18:00:37.360000
CVE-2024-4208,0,0,011160616b763d0a5081c6e2be131e6e753a26d85dcf1b2bacf647a83ceef05b,2024-05-15T16:40:19.330000
CVE-2024-4209,0,0,d8400e0dd8f4909c53290c35079fb7499a08d2e56ed4f79281678d4505414506,2024-05-14T16:11:39.510000
@ -249770,7 +249785,7 @@ CVE-2024-4345,0,0,f00f50139993a52fd7c5e9953c5559186f91d77a99990283e2fa9024cdbc83
CVE-2024-4346,0,0,f22ab2b57ab7913e1ee849412772d79e861a170867683be7f674b4f4c1e4df02,2024-05-07T13:39:32.710000
CVE-2024-4348,0,0,7ecf9e2f00b440e06f89d6de0f2df4f5974c418de77e873b94dee542bc66d4a9,2024-05-14T15:43:25.100000
CVE-2024-4349,0,0,b0d1c3b85ef1776752c2fc81adc9e145cc6f1d929f017c205ea9b4290d878b74,2024-05-14T15:43:26.100000
CVE-2024-4357,0,1,33cb7b166449bad445492f17a8c037924e4da5ea5b4742ac02321837721bff0d,2024-05-15T18:35:11.453000
CVE-2024-4357,0,0,33cb7b166449bad445492f17a8c037924e4da5ea5b4742ac02321837721bff0d,2024-05-15T18:35:11.453000
CVE-2024-4363,0,0,731dcd1f4c4c888e4437518d0f6d54c108b1221ced167b35922e12ec173e95de,2024-05-15T16:40:19.330000
CVE-2024-4367,0,0,afc88763d21b72640d447a05ef1cc5bae3b59696ba891e4d36a74743b38e403b,2024-05-14T19:17:55.627000
CVE-2024-4368,0,0,0ee02ebde276d817508f5495294b3429c463a1f4241660388e0c329992e72be6,2024-05-04T02:15:06.853000
@ -249892,7 +249907,7 @@ CVE-2024-4605,0,0,a4edcc830b87308032d99d0feea9a229ab6e4f42dd443adbf886b62b0aa445
CVE-2024-4606,0,0,3cb7c67f52970802d09367b8e1299e023e023c69e85466074593b74325edd330,2024-05-14T16:11:39.510000
CVE-2024-4614,0,0,beb5630ff5db8a415fa4bf6f109dad49279ea5965bb91a1d7f892cd406978f05,2024-05-14T15:44:12.883000
CVE-2024-4618,0,0,2c2ff682e4ce5d6b8070b11795aac4e89df6536fa089f1d6d721027dca3a2ac9,2024-05-15T16:40:19.330000
CVE-2024-4622,0,1,db6b68bd807a8a0ddb358e449d01643070e9098450ab994d9259859922691c59,2024-05-15T18:35:11.453000
CVE-2024-4622,0,0,db6b68bd807a8a0ddb358e449d01643070e9098450ab994d9259859922691c59,2024-05-15T18:35:11.453000
CVE-2024-4624,0,0,2f2dfaacad2af40d5d5be1945c7dfb7bd2ed3b09b9d237413e46013b6e4c845a,2024-05-14T19:17:55.627000
CVE-2024-4630,0,0,9ee39c9e70c3fde26d4ddaa20f9f4583498b5ac1a624dc38857653acd661b1f9,2024-05-14T16:11:39.510000
CVE-2024-4631,0,0,e8ed3d07eca49fd9ce5a62406bcf23da9793cbcc792a956665a267b4f25fd693,2024-05-14T15:44:13.487000
@ -250008,7 +250023,7 @@ CVE-2024-4822,0,0,aa15929882cb3b183256f12091f4f730b093d0429ec93cc3d87b04f30f0ba3
CVE-2024-4823,0,0,8f31bcd40817f289d241c4794563294d4e400345d0538e98840e69ced9022cee,2024-05-14T16:11:39.510000
CVE-2024-4824,0,0,12997f7cb79ce3030574eecdb24c333619e16861704962f1656fbd26f7680d48,2024-05-14T16:11:39.510000
CVE-2024-4825,0,0,1e0f749d21405e7cf2edd3aac0c05b5f99c8de86001892a511648a80a7280ab0,2024-05-14T16:11:39.510000
CVE-2024-4837,0,1,98aa18fa41c916e1bd621beebea0d7870bfc50e824dc02b9686403b5c337ef1b,2024-05-15T18:35:11.453000
CVE-2024-4837,0,0,98aa18fa41c916e1bd621beebea0d7870bfc50e824dc02b9686403b5c337ef1b,2024-05-15T18:35:11.453000
CVE-2024-4840,0,0,c9ca0895b4a51cab0e2c0d59965d65e29a18e7a3fb86aea7f8e73c28a9d25dc4,2024-05-14T16:11:39.510000
CVE-2024-4847,0,0,bba6603a81b56f6d60e806e2e7574571e772d40efe56d1512e7524611ff51b1c,2024-05-15T16:40:19.330000
CVE-2024-4853,0,0,08d9956cd1fc82aacd4cc52b553fb1ad7c9d41ecc90cc195f4a6a68d3e7942e4,2024-05-14T16:11:39.510000
@ -250020,8 +250035,18 @@ CVE-2024-4871,0,0,8ab16008698c56948c2f0ae8cf729bc698d4cce8f05c254b91a2ba1c9d6200
CVE-2024-4893,0,0,8ffb453add192bbe3edd5219a0cc1fecef136881814a15b6a6fff19e64221c30,2024-05-15T16:40:19.330000
CVE-2024-4894,0,0,6ac5cb6e261d69ae931137ad62bda7bde45e9f279ec9c4c45067086e1e08f8a1,2024-05-15T16:40:19.330000
CVE-2024-4903,0,0,c9b4ffdf46fc8451d7269331919432007ce882add1bc99c6aee19d392a06ed4c,2024-05-15T16:40:19.330000
CVE-2024-4905,1,1,c8a95f887e4224ee07a1acc6bff2a43dfef4589e656da09459f2781a65331d7b,2024-05-15T18:35:11.453000
CVE-2024-4906,1,1,2c601a955269aafb6830d9cede65bbd366a0f024c1801724d970935df42f3f51,2024-05-15T19:15:08.203000
CVE-2024-4907,1,1,3113954bbefa43c45c3595d8fd618aaa69e1f187ec4fb5985c7de73ea2928b89,2024-05-15T19:15:08.607000
CVE-2024-4908,1,1,49953f13c6eb1739a4b893e978dfff6e9d81247d9e887ebf79651c9ba7eae5fb,2024-05-15T19:15:08.980000
CVE-2024-4909,1,1,33c70ce6259d6da0a92a6c71c0ea14d1539f9c07a708d9f99240c99eb1475c60,2024-05-15T19:15:09.320000
CVE-2024-4904,1,1,820f404bd5f1471552c81d52ea4d478ea95c67f4035d4dafb5d9d0ead535fdc0,2024-05-15T20:15:13.750000
CVE-2024-4905,0,0,c8a95f887e4224ee07a1acc6bff2a43dfef4589e656da09459f2781a65331d7b,2024-05-15T18:35:11.453000
CVE-2024-4906,0,0,2c601a955269aafb6830d9cede65bbd366a0f024c1801724d970935df42f3f51,2024-05-15T19:15:08.203000
CVE-2024-4907,0,0,3113954bbefa43c45c3595d8fd618aaa69e1f187ec4fb5985c7de73ea2928b89,2024-05-15T19:15:08.607000
CVE-2024-4908,0,0,49953f13c6eb1739a4b893e978dfff6e9d81247d9e887ebf79651c9ba7eae5fb,2024-05-15T19:15:08.980000
CVE-2024-4909,0,0,33c70ce6259d6da0a92a6c71c0ea14d1539f9c07a708d9f99240c99eb1475c60,2024-05-15T19:15:09.320000
CVE-2024-4910,1,1,a82052dfa103200f3b9fc39482e4d4d960a5e5de9c8e240b89074cee62e90b4e,2024-05-15T20:15:14.167000
CVE-2024-4911,1,1,8d1608f0fa29a13cf0a21881c2ede6ff746ff4b49cb14c00be575f111b962149,2024-05-15T21:15:08.447000
CVE-2024-4912,1,1,959608c998df40105cb04722815b6866fe50f22984a019f9f852ebbd393b327c,2024-05-15T21:15:08.720000
CVE-2024-4913,1,1,ef1882efdbb97e7e5b3a9f1d624c71c7c6ca83c593dde5ac79d713777664dae8,2024-05-15T21:15:09
CVE-2024-4947,1,1,f706014ab5e494173f189b6b147bc73eaca2bb6d431298f9b49d098b14ff5782,2024-05-15T21:15:09.273000
CVE-2024-4948,1,1,bdd7cd38392862513bf6cf6f69f8c528e08e359340031d01daba548f07be3f14,2024-05-15T21:15:09.347000
CVE-2024-4949,1,1,7a7f679654eca12ebf0c1d1d6ac210b4148b3d26ab259c26b5f77d48b40c4cf5,2024-05-15T21:15:09.430000
CVE-2024-4950,1,1,efed32b4f23b877a04e85fe2ab12f10b9d3c39ad2529470125a1a9db3cdcfb9e,2024-05-15T21:15:09.493000
CVE-2024-4976,1,1,7bb4e20b87953c4b97f492da11cca71d462ce6af7b37913524811fb56920cd3a,2024-05-15T21:15:09.560000

Can't render this file because it is too large.