Auto-Update: 2024-06-14T10:00:19.166132+00:00

This commit is contained in:
cad-safe-bot 2024-06-14 10:03:11 +00:00
parent bbfed69f3e
commit c4d1c0d493
22 changed files with 914 additions and 124 deletions

View File

@ -0,0 +1,36 @@
{
"id": "CVE-2024-25142",
"sourceIdentifier": "security@apache.org",
"published": "2024-06-14T09:15:09.103",
"lastModified": "2024-06-14T09:15:09.103",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Use of Web Browser Cache Containing Sensitive Information vulnerability in Apache Airflow.\u00a0\n\nAirflow did not return \"Cache-Control\" header for dynamic content, which in case of some browsers could result in potentially storing sensitive data in local cache of the browser.\n\nThis issue affects Apache Airflow: before 2.9.2.\n\nUsers are recommended to upgrade to version 2.9.2, which fixes the issue.\n\n"
}
],
"metrics": {},
"weaknesses": [
{
"source": "security@apache.org",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-525"
}
]
}
],
"references": [
{
"url": "https://github.com/apache/airflow/pull/39550",
"source": "security@apache.org"
},
{
"url": "https://lists.apache.org/thread/cg1j28lk0fhzthk0of1g7vy7p2n1j7nr",
"source": "security@apache.org"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-32989",
"sourceIdentifier": "psirt@huawei.com",
"published": "2024-05-14T15:37:21.000",
"lastModified": "2024-05-14T16:12:23.490",
"lastModified": "2024-06-14T08:15:40.147",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
@ -55,6 +55,10 @@
"url": "https://consumer.huawei.com/en/support/bulletin/2024/5/",
"source": "psirt@huawei.com"
},
{
"url": "https://consumer.huawei.com/en/support/bulletin/2024/6/",
"source": "psirt@huawei.com"
},
{
"url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-phones-202405-0000001902628049",
"source": "psirt@huawei.com"

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-32990",
"sourceIdentifier": "psirt@huawei.com",
"published": "2024-05-14T15:37:21.587",
"lastModified": "2024-05-14T16:12:23.490",
"lastModified": "2024-06-14T08:15:40.410",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
@ -55,6 +55,10 @@
"url": "https://consumer.huawei.com/en/support/bulletin/2024/5/",
"source": "psirt@huawei.com"
},
{
"url": "https://consumer.huawei.com/en/support/bulletin/2024/6/",
"source": "psirt@huawei.com"
},
{
"url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-phones-202405-0000001902628049",
"source": "psirt@huawei.com"

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2024-36287",
"sourceIdentifier": "responsibledisclosure@mattermost.com",
"published": "2024-06-14T09:15:09.450",
"lastModified": "2024-06-14T09:15:09.450",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Mattermost Desktop App versions <=5.7.0 fail to disable certain Electron debug flags which allows for bypassing\u00a0TCC restrictions on macOS."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "responsibledisclosure@mattermost.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 3.8,
"baseSeverity": "LOW"
},
"exploitabilityScore": 2.0,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "responsibledisclosure@mattermost.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-693"
}
]
}
],
"references": [
{
"url": "https://mattermost.com/security-updates",
"source": "responsibledisclosure@mattermost.com"
}
]
}

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2024-36499",
"sourceIdentifier": "psirt@huawei.com",
"published": "2024-06-14T08:15:40.523",
"lastModified": "2024-06-14T08:15:40.523",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Vulnerability of unauthorized screenshot capturing in the WMS module\nImpact: Successful exploitation of this vulnerability may affect service confidentiality."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "psirt@huawei.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:L",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "LOW",
"baseScore": 6.8,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.5,
"impactScore": 4.2
}
]
},
"weaknesses": [
{
"source": "psirt@huawei.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-269"
}
]
}
],
"references": [
{
"url": "https://consumer.huawei.com/en/support/bulletin/2024/6/",
"source": "psirt@huawei.com"
}
]
}

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2024-36500",
"sourceIdentifier": "psirt@huawei.com",
"published": "2024-06-14T08:15:40.783",
"lastModified": "2024-06-14T08:15:40.783",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Privilege escalation vulnerability in the AMS module\nImpact: Successful exploitation of this vulnerability may affect service confidentiality."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "psirt@huawei.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "psirt@huawei.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-269"
}
]
}
],
"references": [
{
"url": "https://consumer.huawei.com/en/support/bulletin/2024/6/",
"source": "psirt@huawei.com"
}
]
}

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2024-36501",
"sourceIdentifier": "psirt@huawei.com",
"published": "2024-06-14T08:15:41.007",
"lastModified": "2024-06-14T08:15:41.007",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Memory management vulnerability in the boottime module\nImpact: Successful exploitation of this vulnerability can affect integrity."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "psirt@huawei.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "HIGH",
"baseScore": 5.6,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 0.8,
"impactScore": 4.7
}
]
},
"weaknesses": [
{
"source": "psirt@huawei.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-787"
}
]
}
],
"references": [
{
"url": "https://consumer.huawei.com/en/support/bulletin/2024/6/",
"source": "psirt@huawei.com"
}
]
}

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2024-36502",
"sourceIdentifier": "psirt@huawei.com",
"published": "2024-06-14T08:15:41.240",
"lastModified": "2024-06-14T08:15:41.240",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Out-of-bounds read vulnerability in the audio module\nImpact: Successful exploitation of this vulnerability will affect availability."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "psirt@huawei.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 7.9,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.5,
"impactScore": 5.8
}
]
},
"weaknesses": [
{
"source": "psirt@huawei.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-125"
}
]
}
],
"references": [
{
"url": "https://consumer.huawei.com/en/support/bulletin/2024/6/",
"source": "psirt@huawei.com"
}
]
}

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2024-36503",
"sourceIdentifier": "psirt@huawei.com",
"published": "2024-06-14T08:15:41.463",
"lastModified": "2024-06-14T08:15:41.463",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Memory management vulnerability in the Gralloc module\nImpact: Successful exploitation of this vulnerability will affect availability."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "psirt@huawei.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "HIGH",
"baseScore": 7.3,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.5,
"impactScore": 4.7
}
]
},
"weaknesses": [
{
"source": "psirt@huawei.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-908"
}
]
}
],
"references": [
{
"url": "https://consumer.huawei.com/en/support/bulletin/2024/6/",
"source": "psirt@huawei.com"
}
]
}

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2024-37182",
"sourceIdentifier": "responsibledisclosure@mattermost.com",
"published": "2024-06-14T09:15:10.013",
"lastModified": "2024-06-14T09:15:10.013",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Mattermost Desktop App versions <=5.7.0 fail to correctly prompt for permission when opening external URLs which allows\u00a0a remote attacker to force a victim over the Internet to run arbitrary programs on the victim's system\u00a0via custom URI schemes."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "responsibledisclosure@mattermost.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 4.7,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.6,
"impactScore": 2.7
}
]
},
"weaknesses": [
{
"source": "responsibledisclosure@mattermost.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-693"
}
]
}
],
"references": [
{
"url": "https://mattermost.com/security-updates",
"source": "responsibledisclosure@mattermost.com"
}
]
}

View File

@ -0,0 +1,51 @@
{
"id": "CVE-2024-4863",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-06-14T09:15:10.613",
"lastModified": "2024-06-14T09:15:10.613",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "The Gutenberg Blocks with AI by Kadence WP \u2013 Page Builder Features plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the \u2018titleFont\u2019 parameter in all versions up to, and including, 3.2.38 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security@wordfence.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 6.4,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 3.1,
"impactScore": 2.7
}
]
},
"references": [
{
"url": "https://plugins.trac.wordpress.org/browser/kadence-blocks/trunk/includes/blocks/class-kadence-blocks-testimonial-block.php#L276",
"source": "security@wordfence.com"
},
{
"url": "https://plugins.trac.wordpress.org/changeset/3091170/kadence-blocks/trunk/includes/blocks/class-kadence-blocks-testimonial-block.php",
"source": "security@wordfence.com"
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/2e0cde65-f75c-4602-bffe-97b391a428b4?source=cve",
"source": "security@wordfence.com"
}
]
}

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2024-5464",
"sourceIdentifier": "psirt@huawei.com",
"published": "2024-06-14T08:15:41.710",
"lastModified": "2024-06-14T08:15:41.710",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Vulnerability of insufficient permission verification in the NearLink module\nImpact: Successful exploitation of this vulnerability may affect service confidentiality."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "psirt@huawei.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.0,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.5,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "psirt@huawei.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-200"
}
]
}
],
"references": [
{
"url": "https://consumer.huawei.com/en/support/bulletin/2024/6/",
"source": "psirt@huawei.com"
}
]
}

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2024-5465",
"sourceIdentifier": "psirt@huawei.com",
"published": "2024-06-14T08:15:41.930",
"lastModified": "2024-06-14T08:15:41.930",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Function vulnerabilities in the Calendar module\nImpact: Successful exploitation of this vulnerability will affect availability."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "psirt@huawei.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW",
"baseScore": 5.9,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.5,
"impactScore": 3.4
}
]
},
"weaknesses": [
{
"source": "psirt@huawei.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-264"
}
]
}
],
"references": [
{
"url": "https://consumer.huawei.com/en/support/bulletin/2024/6/",
"source": "psirt@huawei.com"
}
]
}

View File

@ -0,0 +1,47 @@
{
"id": "CVE-2024-5577",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-06-14T08:15:42.157",
"lastModified": "2024-06-14T08:15:42.157",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "The Where I Was, Where I Will Be plugin for WordPress is vulnerable to Remote File Inclusion in version <= 1.1.1 via the WIW_HEADER parameter of the /system/include/include_user.php file. This makes it possible for unauthenticated attackers to include and execute arbitrary files hosted on external servers, allowing the execution of any PHP code in those files. This can be used to bypass access controls, obtain sensitive data, or achieve code execution. This requires allow_url_include to be set to true in order to exploit, which is not commonly enabled."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security@wordfence.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
"references": [
{
"url": "https://plugins.trac.wordpress.org/browser/where-i-was-where-i-will-be/trunk/system/include/include_user.php",
"source": "security@wordfence.com"
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/68e0f54d-08ec-4e41-ac9b-d72cdde5a724?source=cve",
"source": "security@wordfence.com"
}
]
}

View File

@ -0,0 +1,40 @@
{
"id": "CVE-2024-5961",
"sourceIdentifier": "cvd@cert.pl",
"published": "2024-06-14T08:15:42.377",
"lastModified": "2024-06-14T08:15:42.377",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Improper neutralization of input during web page generation vulnerability in 2ClickPortal software allows reflected cross-site scripting\u00a0(XSS).\u00a0An attacker might trick somebody into using a crafted URL, which will cause a script to be run in user's browser.\u00a0This issue affects 2ClickPortal software versions from 7.2.31 through 7.6.4."
}
],
"metrics": {},
"weaknesses": [
{
"source": "cvd@cert.pl",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://2clickportal.pl/",
"source": "cvd@cert.pl"
},
{
"url": "https://cert.pl/en/posts/2024/06/CVE-2024-5961/",
"source": "cvd@cert.pl"
},
{
"url": "https://cert.pl/posts/2024/06/CVE-2024-5961/",
"source": "cvd@cert.pl"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-5983",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-06-14T02:15:10.173",
"lastModified": "2024-06-14T02:15:10.173",
"lastModified": "2024-06-14T08:15:42.550",
"vulnStatus": "Received",
"descriptions": [
{
@ -17,19 +17,19 @@
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW",
"baseScore": 6.3,
"baseSeverity": "MEDIUM"
"baseScore": 7.3,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"exploitabilityScore": 3.9,
"impactScore": 3.4
}
],
@ -39,17 +39,17 @@
"type": "Secondary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "SINGLE",
"authentication": "NONE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL",
"baseScore": 6.5
"baseScore": 7.5
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 8.0,
"baseSeverity": "HIGH",
"exploitabilityScore": 10.0,
"impactScore": 6.4,
"acInsufInfo": false,
"obtainAllPrivilege": false,

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-5984",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-06-14T02:15:10.443",
"lastModified": "2024-06-14T02:15:10.443",
"lastModified": "2024-06-14T08:15:42.843",
"vulnStatus": "Received",
"descriptions": [
{
@ -17,19 +17,19 @@
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW",
"baseScore": 6.3,
"baseSeverity": "MEDIUM"
"baseScore": 7.3,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"exploitabilityScore": 3.9,
"impactScore": 3.4
}
],
@ -39,17 +39,17 @@
"type": "Secondary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "SINGLE",
"authentication": "NONE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL",
"baseScore": 6.5
"baseScore": 7.5
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 8.0,
"baseSeverity": "HIGH",
"exploitabilityScore": 10.0,
"impactScore": 6.4,
"acInsufInfo": false,
"obtainAllPrivilege": false,

View File

@ -8,6 +8,10 @@
{
"lang": "en",
"value": "The WP Go Maps (formerly WP Google Maps) plugin for WordPress is vulnerable to Stored Cross-Site Scripting via Custom JS option in versions up to, and including, 9.0.38. This makes it possible for authenticated attackers that have been explicitly granted permissions by an administrator, with contributor-level permissions and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. Version 9.0.39 adds a caution to make administrators aware of the possibility for abuse if permissions are granted to lower-level users."
},
{
"lang": "es",
"value": "El complemento WP Go Maps (anteriormente WP Google Maps) para WordPress es vulnerable a Cross-Site Scripting Almacenado a trav\u00e9s de la opci\u00f3n Custom JS en versiones hasta la 9.0.38 incluida. Esto hace posible que los atacantes autenticados a los que un administrador les ha otorgado permisos expl\u00edcitamente, con permisos de nivel de colaborador y superiores, inyecten scripts web arbitrarios en p\u00e1ginas que se ejecutar\u00e1n cada vez que un usuario acceda a una p\u00e1gina inyectada. La versi\u00f3n 9.0.39 agrega una advertencia para que los administradores sean conscientes de la posibilidad de abuso si se otorgan permisos a usuarios de nivel inferior."
}
],
"metrics": {

View File

@ -0,0 +1,59 @@
{
"id": "CVE-2024-5995",
"sourceIdentifier": "twcert@cert.org.tw",
"published": "2024-06-14T08:15:43.097",
"lastModified": "2024-06-14T08:15:43.097",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "The notification emails sent by Soar Cloud HR Portal contain a link with a embedded session. The expiration of the session is not properly configured, remaining valid for more than 7 days and can be reused."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "twcert@cert.org.tw",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "twcert@cert.org.tw",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-613"
}
]
}
],
"references": [
{
"url": "https://www.twcert.org.tw/en/cp-139-7872-1c8b4-2.html",
"source": "twcert@cert.org.tw"
},
{
"url": "https://www.twcert.org.tw/tw/cp-132-7871-fecf1-1.html",
"source": "twcert@cert.org.tw"
}
]
}

View File

@ -0,0 +1,59 @@
{
"id": "CVE-2024-5996",
"sourceIdentifier": "twcert@cert.org.tw",
"published": "2024-06-14T09:15:11.010",
"lastModified": "2024-06-14T09:15:11.010",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "The notification emails sent by Soar Cloud HR Portal contain a link with a embedded session. These emails are sent without using an encrypted transmission protocol. If an attacker intercepts the packets, they can obtain the plaintext session information and use it to log into the system."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "twcert@cert.org.tw",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "twcert@cert.org.tw",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-319"
}
]
}
],
"references": [
{
"url": "https://www.twcert.org.tw/en/cp-139-7874-b6727-2.html",
"source": "twcert@cert.org.tw"
},
{
"url": "https://www.twcert.org.tw/tw/cp-132-7873-5ba4c-1.html",
"source": "twcert@cert.org.tw"
}
]
}

View File

@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update
```plain
2024-06-14T08:00:19.274263+00:00
2024-06-14T10:00:19.166132+00:00
```
### Most recent CVE Modification Timestamp synchronized with NVD
```plain
2024-06-14T07:15:51.130000+00:00
2024-06-14T09:15:11.010000+00:00
```
### Last Data Feed Release
@ -33,63 +33,39 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
### Total Number of included CVEs
```plain
254119
254134
```
### CVEs added in the last Commit
Recently added CVEs: `28`
Recently added CVEs: `15`
- [CVE-2023-51497](CVE-2023/CVE-2023-514xx/CVE-2023-51497.json) (`2024-06-14T06:15:10.673`)
- [CVE-2024-1295](CVE-2024/CVE-2024-12xx/CVE-2024-1295.json) (`2024-06-14T06:15:10.937`)
- [CVE-2024-2122](CVE-2024/CVE-2024-21xx/CVE-2024-2122.json) (`2024-06-14T06:15:11.320`)
- [CVE-2024-2218](CVE-2024/CVE-2024-22xx/CVE-2024-2218.json) (`2024-06-14T06:15:11.570`)
- [CVE-2024-23504](CVE-2024/CVE-2024-235xx/CVE-2024-23504.json) (`2024-06-14T06:15:11.023`)
- [CVE-2024-31162](CVE-2024/CVE-2024-311xx/CVE-2024-31162.json) (`2024-06-14T07:15:50.153`)
- [CVE-2024-31163](CVE-2024/CVE-2024-311xx/CVE-2024-31163.json) (`2024-06-14T07:15:50.713`)
- [CVE-2024-3754](CVE-2024/CVE-2024-37xx/CVE-2024-3754.json) (`2024-06-14T06:15:11.950`)
- [CVE-2024-3965](CVE-2024/CVE-2024-39xx/CVE-2024-3965.json) (`2024-06-14T06:15:12.060`)
- [CVE-2024-3966](CVE-2024/CVE-2024-39xx/CVE-2024-3966.json) (`2024-06-14T06:15:12.170`)
- [CVE-2024-3971](CVE-2024/CVE-2024-39xx/CVE-2024-3971.json) (`2024-06-14T06:15:12.250`)
- [CVE-2024-3972](CVE-2024/CVE-2024-39xx/CVE-2024-3972.json) (`2024-06-14T06:15:12.330`)
- [CVE-2024-3977](CVE-2024/CVE-2024-39xx/CVE-2024-3977.json) (`2024-06-14T06:15:12.427`)
- [CVE-2024-3978](CVE-2024/CVE-2024-39xx/CVE-2024-3978.json) (`2024-06-14T06:15:12.520`)
- [CVE-2024-3992](CVE-2024/CVE-2024-39xx/CVE-2024-3992.json) (`2024-06-14T06:15:12.607`)
- [CVE-2024-3993](CVE-2024/CVE-2024-39xx/CVE-2024-3993.json) (`2024-06-14T06:15:12.680`)
- [CVE-2024-4005](CVE-2024/CVE-2024-40xx/CVE-2024-4005.json) (`2024-06-14T06:15:12.753`)
- [CVE-2024-4270](CVE-2024/CVE-2024-42xx/CVE-2024-4270.json) (`2024-06-14T06:15:12.827`)
- [CVE-2024-4271](CVE-2024/CVE-2024-42xx/CVE-2024-4271.json) (`2024-06-14T06:15:12.907`)
- [CVE-2024-4404](CVE-2024/CVE-2024-44xx/CVE-2024-4404.json) (`2024-06-14T06:15:12.987`)
- [CVE-2024-4480](CVE-2024/CVE-2024-44xx/CVE-2024-4480.json) (`2024-06-14T06:15:13.220`)
- [CVE-2024-4751](CVE-2024/CVE-2024-47xx/CVE-2024-4751.json) (`2024-06-14T06:15:13.297`)
- [CVE-2024-5155](CVE-2024/CVE-2024-51xx/CVE-2024-5155.json) (`2024-06-14T06:15:13.373`)
- [CVE-2024-5551](CVE-2024/CVE-2024-55xx/CVE-2024-5551.json) (`2024-06-14T06:15:13.443`)
- [CVE-2024-5994](CVE-2024/CVE-2024-59xx/CVE-2024-5994.json) (`2024-06-14T07:15:51.130`)
- [CVE-2024-25142](CVE-2024/CVE-2024-251xx/CVE-2024-25142.json) (`2024-06-14T09:15:09.103`)
- [CVE-2024-36287](CVE-2024/CVE-2024-362xx/CVE-2024-36287.json) (`2024-06-14T09:15:09.450`)
- [CVE-2024-36499](CVE-2024/CVE-2024-364xx/CVE-2024-36499.json) (`2024-06-14T08:15:40.523`)
- [CVE-2024-36500](CVE-2024/CVE-2024-365xx/CVE-2024-36500.json) (`2024-06-14T08:15:40.783`)
- [CVE-2024-36501](CVE-2024/CVE-2024-365xx/CVE-2024-36501.json) (`2024-06-14T08:15:41.007`)
- [CVE-2024-36502](CVE-2024/CVE-2024-365xx/CVE-2024-36502.json) (`2024-06-14T08:15:41.240`)
- [CVE-2024-36503](CVE-2024/CVE-2024-365xx/CVE-2024-36503.json) (`2024-06-14T08:15:41.463`)
- [CVE-2024-37182](CVE-2024/CVE-2024-371xx/CVE-2024-37182.json) (`2024-06-14T09:15:10.013`)
- [CVE-2024-4863](CVE-2024/CVE-2024-48xx/CVE-2024-4863.json) (`2024-06-14T09:15:10.613`)
- [CVE-2024-5464](CVE-2024/CVE-2024-54xx/CVE-2024-5464.json) (`2024-06-14T08:15:41.710`)
- [CVE-2024-5465](CVE-2024/CVE-2024-54xx/CVE-2024-5465.json) (`2024-06-14T08:15:41.930`)
- [CVE-2024-5577](CVE-2024/CVE-2024-55xx/CVE-2024-5577.json) (`2024-06-14T08:15:42.157`)
- [CVE-2024-5961](CVE-2024/CVE-2024-59xx/CVE-2024-5961.json) (`2024-06-14T08:15:42.377`)
- [CVE-2024-5995](CVE-2024/CVE-2024-59xx/CVE-2024-5995.json) (`2024-06-14T08:15:43.097`)
- [CVE-2024-5996](CVE-2024/CVE-2024-59xx/CVE-2024-5996.json) (`2024-06-14T09:15:11.010`)
### CVEs modified in the last Commit
Recently modified CVEs: `19`
Recently modified CVEs: `5`
- [CVE-2024-34055](CVE-2024/CVE-2024-340xx/CVE-2024-34055.json) (`2024-06-14T06:15:11.650`)
- [CVE-2024-5830](CVE-2024/CVE-2024-58xx/CVE-2024-5830.json) (`2024-06-14T06:15:13.690`)
- [CVE-2024-5831](CVE-2024/CVE-2024-58xx/CVE-2024-5831.json) (`2024-06-14T06:15:14.000`)
- [CVE-2024-5832](CVE-2024/CVE-2024-58xx/CVE-2024-5832.json) (`2024-06-14T06:15:14.293`)
- [CVE-2024-5833](CVE-2024/CVE-2024-58xx/CVE-2024-5833.json) (`2024-06-14T06:15:14.547`)
- [CVE-2024-5834](CVE-2024/CVE-2024-58xx/CVE-2024-5834.json) (`2024-06-14T06:15:14.953`)
- [CVE-2024-5835](CVE-2024/CVE-2024-58xx/CVE-2024-5835.json) (`2024-06-14T06:15:15.090`)
- [CVE-2024-5836](CVE-2024/CVE-2024-58xx/CVE-2024-5836.json) (`2024-06-14T06:15:15.463`)
- [CVE-2024-5837](CVE-2024/CVE-2024-58xx/CVE-2024-5837.json) (`2024-06-14T06:15:15.683`)
- [CVE-2024-5838](CVE-2024/CVE-2024-58xx/CVE-2024-5838.json) (`2024-06-14T06:15:15.887`)
- [CVE-2024-5839](CVE-2024/CVE-2024-58xx/CVE-2024-5839.json) (`2024-06-14T06:15:16.180`)
- [CVE-2024-5840](CVE-2024/CVE-2024-58xx/CVE-2024-5840.json) (`2024-06-14T06:15:16.280`)
- [CVE-2024-5841](CVE-2024/CVE-2024-58xx/CVE-2024-5841.json) (`2024-06-14T06:15:16.640`)
- [CVE-2024-5842](CVE-2024/CVE-2024-58xx/CVE-2024-5842.json) (`2024-06-14T06:15:16.913`)
- [CVE-2024-5843](CVE-2024/CVE-2024-58xx/CVE-2024-5843.json) (`2024-06-14T06:15:17.170`)
- [CVE-2024-5844](CVE-2024/CVE-2024-58xx/CVE-2024-5844.json) (`2024-06-14T06:15:17.517`)
- [CVE-2024-5845](CVE-2024/CVE-2024-58xx/CVE-2024-5845.json) (`2024-06-14T06:15:17.790`)
- [CVE-2024-5846](CVE-2024/CVE-2024-58xx/CVE-2024-5846.json) (`2024-06-14T06:15:18.070`)
- [CVE-2024-5847](CVE-2024/CVE-2024-58xx/CVE-2024-5847.json) (`2024-06-14T06:15:18.340`)
- [CVE-2024-32989](CVE-2024/CVE-2024-329xx/CVE-2024-32989.json) (`2024-06-14T08:15:40.147`)
- [CVE-2024-32990](CVE-2024/CVE-2024-329xx/CVE-2024-32990.json) (`2024-06-14T08:15:40.410`)
- [CVE-2024-5983](CVE-2024/CVE-2024-59xx/CVE-2024-5983.json) (`2024-06-14T08:15:42.550`)
- [CVE-2024-5984](CVE-2024/CVE-2024-59xx/CVE-2024-5984.json) (`2024-06-14T08:15:42.843`)
- [CVE-2024-5994](CVE-2024/CVE-2024-59xx/CVE-2024-5994.json) (`2024-06-14T07:15:51.130`)
## Download and Usage

View File

@ -237315,7 +237315,7 @@ CVE-2023-51371,0,0,3aedbdd2ebcefdee1d4ecc7e34ad4946769243f5b6156bf507da0f1e10c7a
CVE-2023-51372,0,0,faf10f39d38879b1877c2b4b79fccfffa8ba55d0f2c230b96325f105b3943945,2024-01-05T04:53:29.053000
CVE-2023-51373,0,0,ec933750877dd764c811f2f21965ce53a21d0bcaec72c86a5800d7678bae3291,2024-01-05T04:53:36.090000
CVE-2023-51374,0,0,5cfd079eb630f7378776bd71d950f89ec6bc9672899c475804bfa5be25959bf1,2024-01-05T04:53:45.327000
CVE-2023-51377,1,1,6736aa5d948f3cfcc9a13df1cf3d75a26277f1f33f8d0318acabe066b930f8ee,2024-06-14T06:15:09.687000
CVE-2023-51377,0,0,6736aa5d948f3cfcc9a13df1cf3d75a26277f1f33f8d0318acabe066b930f8ee,2024-06-14T06:15:09.687000
CVE-2023-51378,0,0,cfb34f8c0413f5c8c80707e698b878e1dfc35501d7b8ccfdcfa56ee80ec9005e,2024-01-05T16:20:35.933000
CVE-2023-51379,0,0,16f24987d2353ca790b085f58095f212ea8af481563ccadbbfff7530ad2081cc,2023-12-29T15:30:21.787000
CVE-2023-5138,0,0,c9d3f5e8397e5d65043919751a1cd49595d1a257d57175d1bac5336e75f36521,2024-01-10T16:37:55.867000
@ -237440,9 +237440,9 @@ CVE-2023-51491,0,0,9a630e61b90ae68231ccba63898cc12e25e82adc34d74019316f737ba08d8
CVE-2023-51492,0,0,0d58b27a14611c109e89a3494fa756a640689ff79517444f7259a888456dbe6f,2024-02-15T06:26:42.423000
CVE-2023-51493,0,0,f83cd3e9ef3ea1708a4f0f0755e074e9ad1d27d8d5ae20aecf4ecfd903ab0733,2024-02-15T06:26:48.450000
CVE-2023-51494,0,0,cdbe694111a067a670940f1f6937175f6a61a9c39ae4f116bd5e17bad447b32c,2024-06-10T02:52:08.267000
CVE-2023-51495,1,1,16cb2cf6bd8adcc04924ca948a6a322c0a89bca458aad1dc5c7aa3715ad97a1d,2024-06-14T06:15:10.103000
CVE-2023-51496,1,1,6e2c7ba18f5724f1a9f7dae7f52ccb642f0aeac4a1517a159272a83dd3994abf,2024-06-14T06:15:10.407000
CVE-2023-51497,1,1,06332a05fd4ac3a075738e64fa946ef6f28695940ce2a827137f627290b76c0a,2024-06-14T06:15:10.673000
CVE-2023-51495,0,0,16cb2cf6bd8adcc04924ca948a6a322c0a89bca458aad1dc5c7aa3715ad97a1d,2024-06-14T06:15:10.103000
CVE-2023-51496,0,0,6e2c7ba18f5724f1a9f7dae7f52ccb642f0aeac4a1517a159272a83dd3994abf,2024-06-14T06:15:10.407000
CVE-2023-51497,0,0,06332a05fd4ac3a075738e64fa946ef6f28695940ce2a827137f627290b76c0a,2024-06-14T06:15:10.673000
CVE-2023-51498,0,0,ab8c2beb319a6c51ec29052d217c30e93f2503597d7d0b7932e01b0c25bc46aa,2024-06-13T18:36:45.417000
CVE-2023-51499,0,0,b9b7f0cb79987f6473d87d127fe53323a00f8ae64e5778981713c6a91fb94ca1,2024-04-15T13:15:51.577000
CVE-2023-5150,0,0,2f5e1e90547bd29c8e7cd2b67cb1157d0145916e107fb086f39413bd0ac1897a,2024-05-17T02:32:51.870000
@ -241487,7 +241487,7 @@ CVE-2024-1291,0,0,fe166acb5d95f395c2c2fc690290a718609fcb00811b1e4c9c8ca50b4e3f8d
CVE-2024-1292,0,0,907fd2224f3cc98f6ddba430073b9fe125cb0f29dd99769274d8a3062533485a,2024-04-08T18:48:40.217000
CVE-2024-1293,0,0,51959b2d10b4ca1210a0917015b6e0ba4809214d01553289260d6a92beabc64d,2024-03-13T18:16:18.563000
CVE-2024-1294,0,0,1a6fde55ee17952393d258a28e1938bfe41cafec05fa305cc82057814b7c2b7d,2024-02-29T13:49:29.390000
CVE-2024-1295,1,1,419aabd6237846c43090fedd4dce57ae3cb2efcc987065738ea727076fd19f81,2024-06-14T06:15:10.937000
CVE-2024-1295,0,0,419aabd6237846c43090fedd4dce57ae3cb2efcc987065738ea727076fd19f81,2024-06-14T06:15:10.937000
CVE-2024-1296,0,0,ab648d9dba58ca530bb990b50d92c4f5ce9f591faa8fbeeb49385095b8425c33,2024-03-13T18:16:18.563000
CVE-2024-1297,0,0,1fc219bb038ab422185a999365115aff94759fe3e5ff94e3dc4180f1d6bc82d0,2024-02-20T19:50:53.960000
CVE-2024-1298,0,0,b14e73b9f89ef2bb5f90efe91191494dc122a0d6eae045ea12354e4504b4ff5a,2024-06-11T04:15:12.513000
@ -242808,7 +242808,7 @@ CVE-2024-2118,0,0,cc7239e1911b2fedd7efefc2bcf43293737a1c458586fdac470d8d5bcdb87f
CVE-2024-2119,0,0,fddfb28891aa483f76592c7c27b82101a08176e818c0033898539a16e1ac7da1,2024-05-22T12:46:53.887000
CVE-2024-2120,0,0,d869e2d6a05f40fd099ef5d11b57f9e00d7f0b266e38148b71c8a447ce60ab1d,2024-03-27T12:29:30.307000
CVE-2024-2121,0,0,4e86b6ec3433d288b50b9e9c9587d6707962f4c2d7ff92215a6366c5fd16dc6b,2024-03-27T12:29:30.307000
CVE-2024-2122,1,1,52d18fec0f04835d210ed85787b4868efd0165fb881bb53971d6814f1744b58f,2024-06-14T06:15:11.320000
CVE-2024-2122,0,0,52d18fec0f04835d210ed85787b4868efd0165fb881bb53971d6814f1744b58f,2024-06-14T06:15:11.320000
CVE-2024-2123,0,0,50093ae27aa67e742757e304ff2f215cc4cf255fadb869543328103242423601,2024-03-13T12:33:51.697000
CVE-2024-2124,0,0,6c05438396435f5a71d022df467bc26ef0c83811ea38fc903b63d8ae9658d2c8,2024-03-20T13:00:16.367000
CVE-2024-2125,0,0,21907277d02e81dabf0303aac375ec9a544529904f2ff625079487b0f36ac4ce,2024-04-10T13:23:38.787000
@ -243396,7 +243396,7 @@ CVE-2024-2217,0,0,07b67ca85e13a2c6962db1475a9d0f8a931b674f51497121f9a33c8078bd4b
CVE-2024-22177,0,0,1ff2297e612a95969b8693bc6a53ecafa7223eba267b1cfe298d3bc1fedfbe99,2024-04-02T12:50:42.233000
CVE-2024-22178,0,0,894383da751aaa1046c611146ada59662a01e512644efee9e31c744bf34674c7,2024-04-03T17:24:18.150000
CVE-2024-22179,0,0,077a89cd90d357917ee36a8e199f939ad2a69cb604b53e3f5f34bba5fb27b47b,2024-05-28T17:15:09.547000
CVE-2024-2218,1,1,9f3d01c1fbe6399526a0d4f69d8959ee16170a7f2d67fa62f7126d66bae09824,2024-06-14T06:15:11.570000
CVE-2024-2218,0,0,9f3d01c1fbe6399526a0d4f69d8959ee16170a7f2d67fa62f7126d66bae09824,2024-06-14T06:15:11.570000
CVE-2024-22180,0,0,19e9318ece70bb0e88968bad696b07798db0b84c54153f426e33acb6b2d89f93,2024-04-02T12:50:42.233000
CVE-2024-22181,0,0,aa4f7fc8e8236ce5a2a5625d560e720bca0124d088633712af3a8c63643e6bd8,2024-06-10T17:16:18.890000
CVE-2024-22182,0,0,33412ce4ff69d7e4ec2fcd049c27451f4c9a424792b679659080bdcd047dcd32,2024-05-17T02:36:15.670000
@ -244146,7 +244146,7 @@ CVE-2024-23500,0,0,b6642b73aef2e4cdba157839c8fde9771818b399a7f64cf89ea1ee42a68c8
CVE-2024-23501,0,0,b3e85809586c989dd0a69f1f88e280acf334973e6408d57bc052ae66513752bd,2024-02-29T13:49:29.390000
CVE-2024-23502,0,0,8f894ed7c8e8f8359294a01d255055a873ed16e9a79e2948ed3ac6f5d8f8da9f,2024-02-09T14:46:17.743000
CVE-2024-23503,0,0,31f4279f0042279b1e83884b504dbd77ff571f8da819058d434170bb0112db1f,2024-06-13T18:36:45.417000
CVE-2024-23504,1,1,e2f1708a0f0629eafb5c37fbc341131c55215c47e54a596367257ea2808f745f,2024-06-14T06:15:11.023000
CVE-2024-23504,0,0,e2f1708a0f0629eafb5c37fbc341131c55215c47e54a596367257ea2808f745f,2024-06-14T06:15:11.023000
CVE-2024-23505,0,0,1c1e95102de07fb5891297ba209ce274fdd1b187d013f9d2d61a7cdf81f20a18,2024-02-05T20:27:44.793000
CVE-2024-23506,0,0,1374ac637ee795ef76e472829586ea10162cf799e7f8facdf1ae775daa957ca7,2024-02-01T04:14:07.073000
CVE-2024-23507,0,0,5e40ce7b11a8b26bc0a529a8393436247da9b21902b7ceeec2a950c934f8cd05,2024-02-05T20:42:09.590000
@ -245142,6 +245142,7 @@ CVE-2024-25139,0,0,74a1a5b7a626d7e1a0de61a1ac7f86e47d772626c4f0df2c72c44f9b9fe45
CVE-2024-2514,0,0,40bdac6fedbbfa3e45ec5e41e61e2794b1635576a9ed9aa904ae5ed7facdbc24,2024-05-17T02:38:16.170000
CVE-2024-25140,0,0,531f7b5bf7af89134534b93bfbbb303a3e40e0ca6401d81bdacee6ed36c47e67,2024-05-17T02:36:54.770000
CVE-2024-25141,0,0,48f7b04af2e96f1eec8716e65032c2fb66196d4c47edca9d45198681efaeed74,2024-02-20T22:15:08.670000
CVE-2024-25142,1,1,bb1a72d1814cdd545fe6ac941ec4e08d84573e61642ffeefd16be919783437e5,2024-06-14T09:15:09.103000
CVE-2024-25143,0,0,1e8c832f1a9dadf4942cad4aead6d2b651b3644cad4a347f966955fac6cc114d,2024-02-07T17:04:54.407000
CVE-2024-25144,0,0,a6c13ad7167848c49a5d40b01da68d21d9e0c28e7dcf9021386119f5261fbaa8,2024-02-15T04:36:24.350000
CVE-2024-25145,0,0,4d151fe37dc24069dd8110580bdd4f039d66d4f3402218ddef43cec9606e51ad,2024-02-15T15:10:35.503000
@ -249204,8 +249205,8 @@ CVE-2024-31159,0,0,2a53ec66414fdd93c519f60e7c23e0f68e7f66b7565c7e21e39cbd5903166
CVE-2024-3116,0,0,398207d2760952c7d30e8a692022e3a890986df7c49b38076f15d6ef6a9e4edb,2024-04-23T02:15:48.310000
CVE-2024-31160,0,0,d32a6d0d2c234144b1d8fb8d66e1ff1ce69ab40a7c1a5b84e40b1964a63bfaab,2024-06-14T04:15:42.083000
CVE-2024-31161,0,0,421418feb6f0ed4c933a9ddfd416c9ca3be473d9866b6501ff145e0ba88fb5a3,2024-06-14T04:15:42.323000
CVE-2024-31162,1,1,c0044cb909f773cafb533a3f0d8a0edf3110fff813af552f2592b97d8fd26513,2024-06-14T07:15:50.153000
CVE-2024-31163,1,1,0346351befc7fffc5039a693faec68928a266b9975796b750e7252f0df71991e,2024-06-14T07:15:50.713000
CVE-2024-31162,0,0,c0044cb909f773cafb533a3f0d8a0edf3110fff813af552f2592b97d8fd26513,2024-06-14T07:15:50.153000
CVE-2024-31163,0,0,0346351befc7fffc5039a693faec68928a266b9975796b750e7252f0df71991e,2024-06-14T07:15:50.713000
CVE-2024-3117,0,0,36e4fb078204cafbff3c0bf42c3651ee711cc6ce8c13ce5342e84f5d6a7e20c5,2024-05-17T02:39:43.503000
CVE-2024-3118,0,0,15f27d451e8e705fa26218ddfa2c270e5eeb49ba056f64a8eb948a9d6ebbfc1c,2024-05-17T02:39:43.597000
CVE-2024-3119,0,0,c9ebed2773ddbf745c504aabd30f479f39fcc6099045c2c447aecf409439659a,2024-04-10T13:23:38.787000
@ -250429,9 +250430,9 @@ CVE-2024-32984,0,0,c1781ab02b497f7ad9edbf8a8951c53661ebdb78ecb66c7cf14dd96168971
CVE-2024-32985,0,0,551603a9d573917dc6e8180e1c86e20de47d20027e99828156dce46dac42a764,2024-05-14T16:12:23.490000
CVE-2024-32986,0,0,e1deb5dce0a20a0acf4a8da9213d1a6d597cdffb3cc6f869414020bdcaf43631,2024-05-03T12:48:41.067000
CVE-2024-32988,0,0,bc48c608e9b42d070b551acc6687d58b1535377e62e996f0e4be09d902452e5d,2024-05-22T12:46:53.887000
CVE-2024-32989,0,0,506acdc6a7a5fbf0f74597c19aaae856579758431c921ae0bd29de5689f13f54,2024-05-14T16:12:23.490000
CVE-2024-32989,0,1,87c157b1e3d25527b7d1928b44314ff5515bc68d28ca4b835a710f703915d021,2024-06-14T08:15:40.147000
CVE-2024-3299,0,0,f60f2a80accdd6f345a6a9cd66637eda180121596f90c2e7d75707c9fce20eb6,2024-04-04T16:33:06.610000
CVE-2024-32990,0,0,c28c0547bf1581c48cf9bb50b0cf7281764b07f259abad0cc919458ee7c1bf3e,2024-05-14T16:12:23.490000
CVE-2024-32990,0,1,f517fd83eeb745717387dc59840882f5435aeb995e5118d634e1729423fc341a,2024-06-14T08:15:40.410000
CVE-2024-32991,0,0,c30900c9c6007d9bd3f64bac9e942540cb2d3d2cd2e3fe2c3033e1ff0fa6a2e9,2024-05-14T16:12:23.490000
CVE-2024-32992,0,0,b43328c2e6b8e0aa396ab88fa7084326904c6a88cce5a778fe9e2c03ce7fc50f,2024-05-14T16:12:23.490000
CVE-2024-32993,0,0,d47ae0a7d792b622ff9b78d95f872069c2c525b6c7d9e748b8613faefcfe18f2,2024-05-14T16:12:23.490000
@ -250948,7 +250949,7 @@ CVE-2024-34049,0,0,659b6c20c375fc6a98cdfe826f7b991bd781b69ca08f703cc4572e5c76f88
CVE-2024-3405,0,0,168ec7f9b410ce208cd59ad1ea840c83def6fd83f8512f3bb62051f5ec3a0bc0,2024-05-15T16:40:19.330000
CVE-2024-34050,0,0,12266ec53b888a39d080cf759ea4efcf86e297f4b6422a5e48e41cdfdabd201f,2024-04-30T13:11:16.690000
CVE-2024-34051,0,0,ac84f2fd7dd43d4574139c8cf26e6f74ad2fa41e2254272b15b5513f0e198e55,2024-06-04T16:57:41.057000
CVE-2024-34055,0,1,748778fa7056cb22d8c756b4b872bd19417a23dfc74d45fea46f818df71b0835,2024-06-14T06:15:11.650000
CVE-2024-34055,0,0,748778fa7056cb22d8c756b4b872bd19417a23dfc74d45fea46f818df71b0835,2024-06-14T06:15:11.650000
CVE-2024-34058,0,0,859a5867c3261cbc3116f378e08c5280a9474e2ad72a0c908fe3c9d61944df2b,2024-06-10T17:16:28.297000
CVE-2024-3406,0,0,b05755db76fca4314b8e99a4179a31010371036c16427145226d1ec275309899,2024-05-15T16:40:19.330000
CVE-2024-34060,0,0,3a924f7009b7e35c5ed89c1ddd4a1ea338a526dc659a3f0f832e02177cf8d5cd,2024-05-24T01:15:30.977000
@ -252286,6 +252287,7 @@ CVE-2024-36265,0,0,00a9e362e8a489eb7027d68fd71b14b08824e37d9652a79a38b01c7bc61ba
CVE-2024-36266,0,0,83df454a9d264cabc9c075046ae12e249cd453c24f6de612ee1d9f73df0ef774,2024-06-11T13:54:12.057000
CVE-2024-36267,0,0,5b402628b4c430b8eab614a5b3330f6f2d186537f83ff9a60bb1a91e4b3c3cac,2024-05-30T13:15:41.297000
CVE-2024-3628,0,0,ad2a38a3d431944b5239dd67ace3bcd2603e3057c8d0a04d847db45516b0c9ea,2024-05-07T13:39:32.710000
CVE-2024-36287,1,1,d92323da669a2d07e04781562897424b811ea0fdb934c66465fa9ff2dd2acccb,2024-06-14T09:15:09.450000
CVE-2024-3629,0,0,ed67d1a2dc82a6f7d8e47e5534a14b4493dd33c5e11e4c564b2ef763c111a4ba,2024-05-15T16:40:19.330000
CVE-2024-3630,0,0,1b4d82e848787accdc20ad3d430430e1a1fa399ad678a3e5fbc87f1ba9867411,2024-05-15T16:40:19.330000
CVE-2024-36302,0,0,e1f4931beacda377102258578e84cb72b47284751be4a5dc324f70f76b3c6500,2024-06-11T13:54:12.057000
@ -252364,7 +252366,12 @@ CVE-2024-36472,0,0,9bfd7afc4b2e800059c7e7a1cc84b36bb079950920b1605d92cfb4dcf501f
CVE-2024-36473,0,0,fdab9cfd1652fb2a67390d3a8e49efbc4911425ddf31224888be2ea2f102443c,2024-06-11T13:54:12.057000
CVE-2024-3648,0,0,347cd63bf86e6b194279224a49f79f49cff1705e1f9b364650443227c716e8b1,2024-05-24T01:15:30.977000
CVE-2024-3649,0,0,969867829e20da4acc88ade671a27808c021dddbe3e27e051d2004e683670e61,2024-05-02T18:00:37.360000
CVE-2024-36499,1,1,ebf262fa149ccfe4c71c1e515426092516fc43c35d2cd3763e261e9ea3d4e384,2024-06-14T08:15:40.523000
CVE-2024-3650,0,0,e078ac649d7d0d133fe9598e10336739bc9d365236ed72d408805e3868c3d439,2024-05-02T18:00:37.360000
CVE-2024-36500,1,1,8c7a876ea9e5ea40d0848f4ca260a73783408bb9b02b946dcda4cbb7a9c588f7,2024-06-14T08:15:40.783000
CVE-2024-36501,1,1,0ea4783c50477771b13cccbcde2481d7e81c490d8359529a55d560561ca46edc,2024-06-14T08:15:41.007000
CVE-2024-36502,1,1,f31221a8addecfaa33b2b4eaf8279a5f28bfeb9176075985d7208179bef5f639,2024-06-14T08:15:41.240000
CVE-2024-36503,1,1,959f6cc7fb5920822b2bd7c48ceb489ab01422592afbd92039308e89ffc64c99,2024-06-14T08:15:41.463000
CVE-2024-3652,0,0,455dabb71414a7592172807b25da69c5818ecc78456d9f87c63904d4c0988a33,2024-05-01T17:15:37.793000
CVE-2024-36523,0,0,779ff20f3e54c54b68fa38cf8a73a6874fca821f18024ef38fb974b398395dd0,2024-06-13T18:36:09.010000
CVE-2024-36528,0,0,1afcf266a14ff33b672f0cab5c8ebdb326a94f75a49ab0339cbb24c3b53942e4,2024-06-10T18:06:22.600000
@ -252622,6 +252629,7 @@ CVE-2024-37176,0,0,d1a35fccbf9345cac8b07991c8d6b2cc7ed3bc253ab49e3211031359d59ab
CVE-2024-37177,0,0,0421ff7903314276b7c17b8917958f0d79116e678cb0fb3c4c323480013ea020,2024-06-11T13:54:12.057000
CVE-2024-37178,0,0,09d4f25c1f8a3d05343115dea3f64d1198524e716da67f7a6714a382347c3c9a,2024-06-11T13:54:12.057000
CVE-2024-3718,0,0,a740a1633905d284711162c33f52150d8f35c5a9e41e141a82d07851d64c55d1,2024-05-24T13:03:05.093000
CVE-2024-37182,1,1,23465e2a3b7c742194a4e503dd941502be69262a5ed711ae5f2aa306fa3cdc57,2024-06-14T09:15:10.013000
CVE-2024-3719,0,0,d2320674d04cefde56a0b36b463f74328d6f18494803030bdfe9b0b1b4374afd,2024-06-04T19:20:23.553000
CVE-2024-3720,0,0,f4e69514093cc630aeda39d0a41fe705e0d9916a1077cef429b7dcf05a404308,2024-06-04T19:20:23.660000
CVE-2024-3721,0,0,ec8dc4b0ad5d1d9ba11acb18015142f7d1715fd653f7ca2987e266e9c9e8ef01,2024-05-17T02:40:05.290000
@ -252681,7 +252689,7 @@ CVE-2024-3749,0,0,e5012183af13abb8287d9f7e2369a778a614f06e1c5ed11cd73c4e040e4a12
CVE-2024-3750,0,0,803f7e301e80982b4e00371ccc1f410724a29d03fdd424fb4c54aeb0b034ff94,2024-05-16T13:03:05.353000
CVE-2024-3752,0,0,06a3522f543993aef42f352f0c011207c560c2e5a1d63c9d8ccc34a87adab0ce,2024-05-06T12:44:56.377000
CVE-2024-37535,0,0,07f7d930de9d2427116ed26f9657c7962aa8122c29cd0ba965c2b1ee75b9b36e,2024-06-10T17:16:32.753000
CVE-2024-3754,1,1,5faeb6509ed30be92f241bea3d91c29cdb6175d667e84326f2240d59e13cd592,2024-06-14T06:15:11.950000
CVE-2024-3754,0,0,5faeb6509ed30be92f241bea3d91c29cdb6175d667e84326f2240d59e13cd592,2024-06-14T06:15:11.950000
CVE-2024-3755,0,0,255cc63bdc34aca663119fb8f6757a7da5a9acef7ecda034d88dc05babf4b05b,2024-05-06T12:44:56.377000
CVE-2024-3756,0,0,978b8204ea279199334a4c8c549150dc6420f24480b5effb717e8509749d66aa,2024-05-06T12:44:56.377000
CVE-2024-37568,0,0,c31dda2ce4e2cf1c14da8896dd1ff7847e88710326c3ff8a35f20f8d9a2e2a98,2024-06-12T13:29:13.877000
@ -252875,17 +252883,17 @@ CVE-2024-3955,0,0,bba90f25cff74c274e08a67a3936bf55505a38180fc074269167b54bd09035
CVE-2024-3956,0,0,84c84e343f731479baad188521c68e2e10d428da5ee4bd61443cf640ccedc17a,2024-05-14T16:11:39.510000
CVE-2024-3957,0,0,6e4e327328ad5c18e880466a103b162c10591051d90490bf0a67f6889d728425,2024-05-02T18:00:37.360000
CVE-2024-3962,0,0,9de964d29f43823164300439a0e71453bbca4a5c1f5767eca51db600267798cd,2024-04-26T12:58:17.720000
CVE-2024-3965,1,1,d3cc73c01ab764bf8b8a8a1089e415cce11f6be3e746514f9b3266f70cb7922b,2024-06-14T06:15:12.060000
CVE-2024-3966,1,1,acdc21ce162ac9bf599365d9657ca1e26c0b9e574eccdcf8c4b567b9d8b6efcf,2024-06-14T06:15:12.170000
CVE-2024-3965,0,0,d3cc73c01ab764bf8b8a8a1089e415cce11f6be3e746514f9b3266f70cb7922b,2024-06-14T06:15:12.060000
CVE-2024-3966,0,0,acdc21ce162ac9bf599365d9657ca1e26c0b9e574eccdcf8c4b567b9d8b6efcf,2024-06-14T06:15:12.170000
CVE-2024-3967,0,0,b2af76e65b0ac2fff588b8ab332f0978e5b083cdcdd41f3fd643403fe236fa29,2024-05-15T18:35:11.453000
CVE-2024-3968,0,0,cdd73cfcec56ac4302e4eb4a932f862086b9a3ed46ed5ff92d17197e11553e8f,2024-05-15T18:35:11.453000
CVE-2024-3969,0,0,793622b6641cb8c2dc34802adf1ab9ece645cce7d321b9faf1a6b76d5e28ec78,2024-05-28T17:11:55.903000
CVE-2024-3970,0,0,a6d2ad116e736372d8ee0cd28cd0cbfef25f3ce953ea92bdb2b1ac922e65eedf,2024-05-15T18:35:11.453000
CVE-2024-3971,1,1,137aa1e674b21ade99d6733c2104b04ff84ac40c79412060bbfc1a9928b2c0ad,2024-06-14T06:15:12.250000
CVE-2024-3972,1,1,98031c6637d18ba8ee682a8ce3a7afef41b4c6087b87a09e33631b6451b470fe,2024-06-14T06:15:12.330000
CVE-2024-3971,0,0,137aa1e674b21ade99d6733c2104b04ff84ac40c79412060bbfc1a9928b2c0ad,2024-06-14T06:15:12.250000
CVE-2024-3972,0,0,98031c6637d18ba8ee682a8ce3a7afef41b4c6087b87a09e33631b6451b470fe,2024-06-14T06:15:12.330000
CVE-2024-3974,0,0,30b94b89b01dd2c6057362330f67dc78937f3f3edffa0c5a57e7602f711f919a,2024-05-14T16:11:39.510000
CVE-2024-3977,1,1,d72bf2865564ac51ed035648bdffeda91801e455c00b7fc6aa36d6f895c70e76,2024-06-14T06:15:12.427000
CVE-2024-3978,1,1,7a090226b8ac6815aa754092194a22dc6edd4ea87964f6d9d3fbbdabbbb10d81,2024-06-14T06:15:12.520000
CVE-2024-3977,0,0,d72bf2865564ac51ed035648bdffeda91801e455c00b7fc6aa36d6f895c70e76,2024-06-14T06:15:12.427000
CVE-2024-3978,0,0,7a090226b8ac6815aa754092194a22dc6edd4ea87964f6d9d3fbbdabbbb10d81,2024-06-14T06:15:12.520000
CVE-2024-3979,0,0,4ac2126fe63098861061c1ed3772b0712449f42e64a5481492de94fd61a5b947,2024-06-06T20:15:14.127000
CVE-2024-3985,0,0,73586f1cedc99952324792e19f078c055584e6e606f6222ac3907090ad395ced,2024-05-02T18:00:37.360000
CVE-2024-3987,0,0,05499205f937534ee026fd5a41dcafd44deae059117eea743b5e3e3c53eaee01,2024-06-07T14:56:05.647000
@ -252893,14 +252901,14 @@ CVE-2024-3988,0,0,ed49ad0e503298ba2fe40c90a665a86dcb918b5087ac61c1edfd746c2ca95d
CVE-2024-3989,0,0,41a6b1dcae0354fb8cba40366dc7ed1eeb84d6a6a33689c35123198fe63c8f01,2024-05-14T16:11:39.510000
CVE-2024-3990,0,0,7879115af68e1891db08bd2dafc44fb55db15680f59885de2ed87fd5c16d9492,2024-05-14T16:11:39.510000
CVE-2024-3991,0,0,f4b27e31b2ebe06401478accd9d85264142bf207d27ef139c240399354705c4f,2024-05-02T18:00:37.360000
CVE-2024-3992,1,1,9f6f9ed6b9f2419611b40da6c6729d5a683e31642eae913cbd1604058245c143,2024-06-14T06:15:12.607000
CVE-2024-3993,1,1,c7c2575cefdc9f7b915324e0a619f9bbd6e44eec78cadaafe315061601b735dc,2024-06-14T06:15:12.680000
CVE-2024-3992,0,0,9f6f9ed6b9f2419611b40da6c6729d5a683e31642eae913cbd1604058245c143,2024-06-14T06:15:12.607000
CVE-2024-3993,0,0,c7c2575cefdc9f7b915324e0a619f9bbd6e44eec78cadaafe315061601b735dc,2024-06-14T06:15:12.680000
CVE-2024-3994,0,0,292539249e741e7003c555a5d4fa2182b15a01b393fb04fa15e675750c01906e,2024-04-25T13:18:02.660000
CVE-2024-3997,0,0,507ae8762d75f9d68eda75aa3a6fbbaf1b3579404dfa0ecd9f2978d2aa87a55f,2024-05-24T01:15:30.977000
CVE-2024-4000,0,0,63e68b686bb1abbdcd2ddeab613f2e83d1883c904c164f21a1076ada49583fc9,2024-05-02T18:00:37.360000
CVE-2024-4001,0,0,01ff67c0d3df1be38408b913fb09a0fa8e839c64a815c3de41b48a61aa2ae8cb,2024-06-11T17:27:53.637000
CVE-2024-4003,0,0,9b9be828f15a04db891b79e7c6ebf75d000360176e249e61f2acbb014741196d,2024-05-02T18:00:37.360000
CVE-2024-4005,1,1,2f2292ddc9d91b15e0e334df7230c36516581b7812eb752ae8ed46619154cba1,2024-06-14T06:15:12.753000
CVE-2024-4005,0,0,2f2292ddc9d91b15e0e334df7230c36516581b7812eb752ae8ed46619154cba1,2024-06-14T06:15:12.753000
CVE-2024-4006,0,0,cea97555ee62217aaca46943155964ba917aa17a210befae3806ab46c6606005,2024-04-25T17:25:05.903000
CVE-2024-4008,0,0,ab88da5f03295a5c82b2b02d767da89d9d5f6b64be017927f79b2a477f07ce81,2024-06-06T14:17:35.017000
CVE-2024-4009,0,0,1efc6fffaaf5a87d264faa44168af33f94d0754350a147286e05077495885670,2024-06-06T14:17:35.017000
@ -253094,8 +253102,8 @@ CVE-2024-4264,0,0,fb86e94ce42096b29068bc1af12f8df8e421d67d4a541250a03ae9bd98f162
CVE-2024-4265,0,0,91d38fbd7b9c4ea0cd26c0f2028b5e1f8ee8c7d7e1c2c632d6b17cd2b7b69603,2024-05-02T18:00:37.360000
CVE-2024-4266,0,0,116b52a29fd0a6039b308734c72b0d2ae8aa871f2547c292da7232e2003a6f6b,2024-06-11T13:54:12.057000
CVE-2024-4267,0,0,ce2653255d43ae5f4599b240b7efe5c0da7fc5b70a5363cdc03dcce3fe58b4ed,2024-05-24T01:15:30.977000
CVE-2024-4270,1,1,37cc37c1193f3880eaeb558cbb01c0dd570faa0689ff6012af6124e657242867,2024-06-14T06:15:12.827000
CVE-2024-4271,1,1,58cd7d287d8fb8afde6f1b9fa45bc15975e70876b5571e9b3ac04d71b9bf945d,2024-06-14T06:15:12.907000
CVE-2024-4270,0,0,37cc37c1193f3880eaeb558cbb01c0dd570faa0689ff6012af6124e657242867,2024-06-14T06:15:12.827000
CVE-2024-4271,0,0,58cd7d287d8fb8afde6f1b9fa45bc15975e70876b5571e9b3ac04d71b9bf945d,2024-06-14T06:15:12.907000
CVE-2024-4273,0,0,136233599d68a0536ba99c3313767218f535edf424c12fad350903aa42bf81fa,2024-06-04T16:57:41.053000
CVE-2024-4274,0,0,f007ffa253f631296ec9b2caed7d1faf5b31c76fe42ca7e92fd5b40ffb00a28e,2024-06-04T16:57:41.053000
CVE-2024-4275,0,0,70e1a00c60419d92634d3a56b566530d560ae59bb86d2c5a8041fd963d9db39d,2024-05-14T16:11:39.510000
@ -253199,7 +253207,7 @@ CVE-2024-4398,0,0,4b7d20498f56e38cff1d1c0b655156a2b3f15862c52a314f7c4c607a40427b
CVE-2024-4399,0,0,3d19e4ab740018443fd6f7e134fb90cb1dbd4ba6681853dbea09ee003df9e238,2024-05-24T01:15:30.977000
CVE-2024-4400,0,0,620572dcee5d436c42b3994ee0aa67743b2a3990e6a672a60de9f72d6796092e,2024-05-16T13:03:05.353000
CVE-2024-4403,0,0,3581c625bf880c956b4215171ed64bae0b186e6c05d44521b4c86bf430fcf85e,2024-06-10T18:06:22.600000
CVE-2024-4404,1,1,d285ed2c4c0d400743afd71328b120554c420ec459916094a4a847b34772eba9,2024-06-14T06:15:12.987000
CVE-2024-4404,0,0,d285ed2c4c0d400743afd71328b120554c420ec459916094a4a847b34772eba9,2024-06-14T06:15:12.987000
CVE-2024-4405,0,0,c1f36263ba5841514dcf823ce87455ea826983b04201750caf275a7578687d86,2024-05-02T18:00:37.360000
CVE-2024-4406,0,0,24efbd07edfc7f89a7b1e694cb4faff02b108244486a9e17a0ab6aa554d1cf0e,2024-05-02T18:00:37.360000
CVE-2024-4409,0,0,7dd623ac9467a0484d209647a6b8fb064b225334d3e5c23c1ee095e63ba20831,2024-05-24T13:03:11.993000
@ -253253,7 +253261,7 @@ CVE-2024-4470,0,0,a1486a2c35813e6b458e62c6cab3ba58a94b094bc9cbcdae130972a477a7e8
CVE-2024-4471,0,0,9792233119a62c3ea240ba8e0af602c011f72a48705fdc1ef6f6e423f04dac09,2024-05-24T01:15:30.977000
CVE-2024-4473,0,0,be8deb42c9d1905b301c3bfbae608b1551ce9395ac2fbbb337038c3a7eb347fa,2024-05-14T19:17:55.627000
CVE-2024-4478,0,0,31a4a4c48861c0c170c939e3aa0b10661ec97e9653465707919926dbd3595183,2024-05-16T13:03:05.353000
CVE-2024-4480,1,1,7ba9472d0ba78ec30048cdbee9f7035ee304e104c01056d42a23ef04c9c59a93,2024-06-14T06:15:13.220000
CVE-2024-4480,0,0,7ba9472d0ba78ec30048cdbee9f7035ee304e104c01056d42a23ef04c9c59a93,2024-06-14T06:15:13.220000
CVE-2024-4481,0,0,7ecf88f2a22a659849266bdc0bd40c464d195e3dafdf490c58869a301c87572b,2024-05-14T16:11:39.510000
CVE-2024-4484,0,0,72c4859b8727b60eeb9f8012483883c0571b4cb8b1cb2ce9a8b1f5e495641e3c,2024-05-24T13:03:05.093000
CVE-2024-4485,0,0,856a7368e5f121163f839e4b6c92a8e77de213c5eccf98592455e970e028d37d,2024-05-24T13:03:05.093000
@ -253466,7 +253474,7 @@ CVE-2024-4746,0,0,f4f2ac85907c7b5b329cbda786b397a3fc954bb6f671df10eda8148346b3a1
CVE-2024-4747,0,0,99152f6494a1192f3bae59b436abcc51d11f811ed1e0a72c2e65c8381fda6054,2024-05-14T16:11:39.510000
CVE-2024-4749,0,0,676e331864bc41907c4c80c44886e7dac480ef6dea2c29bc22838d992753d4da,2024-06-04T16:57:41.053000
CVE-2024-4750,0,0,423585a3e250903ac62d761ecb0e0e6dc6b4649ccd4411b90275a4e6d2f87495,2024-06-04T16:57:41.053000
CVE-2024-4751,1,1,c2897383d6378078de4b0f176845caa6860afdf70554ca836e449365df477d65,2024-06-14T06:15:13.297000
CVE-2024-4751,0,0,c2897383d6378078de4b0f176845caa6860afdf70554ca836e449365df477d65,2024-06-14T06:15:13.297000
CVE-2024-4756,0,0,b303493fc627eee25a3b39c986ea25472e7aab1866612b83c9a7c14522d2c360,2024-06-07T14:56:05.647000
CVE-2024-4760,0,0,8b9593f0d88cbd24a061db082c8cd5c20f19b8a61431542d1ce576639ef3bdc0,2024-05-16T15:44:44.683000
CVE-2024-4761,0,0,1a5c101148c08794fbcc9293bdcf48ea45ef131413b853bd53bee7bfdc7d1522,2024-06-10T18:15:36.997000
@ -253544,6 +253552,7 @@ CVE-2024-4857,0,0,23edc16ac7d8115e8f5dde6cd82a4022bcfda577b01ff7d148fca6e240fbd4
CVE-2024-4858,0,0,7e6f62031377207832745d7baec775cb8f5592ecc9e1490c12da872c1b62dd11,2024-05-28T12:39:42.673000
CVE-2024-4859,0,0,3de5434b35db9344c6a8c9ff1c0891dd93d801d8510e1a23be87da56d66078a2,2024-05-14T19:17:55.627000
CVE-2024-4860,0,0,078ece1acb5f59d15050f08de42942705925d025d9ef9dfb969c99e0b62152d4,2024-05-14T19:17:55.627000
CVE-2024-4863,1,1,47adbc3719234f8d683d2303089ae82681accdb995ea43b1edcb178646950414,2024-06-14T09:15:10.613000
CVE-2024-4865,0,0,034a7c12f3d6f4bd5ac54ee1f34abd70a559c5b9a18ae852351f79db6d61b9c9,2024-05-20T13:00:34.807000
CVE-2024-4870,0,0,789ccad79b53f3162faaa4d0c14e00ab550e7e413c46a4332529e5d35d1d0423,2024-06-04T16:57:41.053000
CVE-2024-4871,0,0,089a89f3309c27433f20e3be4ef9a00379f9f19601c1c8029649846113aed43a,2024-05-14T19:17:55.627000
@ -253733,7 +253742,7 @@ CVE-2024-5150,0,0,b6666c6d6ac9830dd3015f5fc02fd79f0a3b63d41ee2e14f8cd76da933186c
CVE-2024-5152,0,0,897a950e1a56cf66b3762a0b7d02348f108b131c1556072d1a2c46cab20012e4,2024-06-06T14:17:35.017000
CVE-2024-5153,0,0,828bf0d922f71aaeb9a620d2a28fca02e54e4a39590cf3792a194a4a5970d881,2024-06-06T14:17:35.017000
CVE-2024-5154,0,0,1ba58da557e7753fe147db1d89f118e44764c86c1e3799ad99b07e3033b5f30f,2024-06-13T18:36:09.010000
CVE-2024-5155,1,1,ba5a62125168808d608462e382a769fb49330a759db720b9808830628a850442,2024-06-14T06:15:13.373000
CVE-2024-5155,0,0,ba5a62125168808d608462e382a769fb49330a759db720b9808830628a850442,2024-06-14T06:15:13.373000
CVE-2024-5157,0,0,968c06835e3febdba747d4dd49e60507daf1a01e5377b117ee6e566931506abf,2024-06-10T18:15:37.893000
CVE-2024-5158,0,0,76369e6e46f6c34bbc5a354a762f99c1a790d22381b6a166821eb73e4f6cf9b3,2024-06-10T18:15:37.953000
CVE-2024-5159,0,0,21e48f9c116346beacd1ff1b36dcd3eeb5d22159bc679bcf4bc325526369218a,2024-06-10T18:15:38.010000
@ -253936,6 +253945,8 @@ CVE-2024-5453,0,0,f53a0f7c14e91f56fc73f4b75f7a3c7cc751f83b7f0078edb3a1d42587e454
CVE-2024-5458,0,0,280c02138e919e94dbbf1601703ec46acfb6deb4d1cb320c03863f40e695d8a3,2024-06-13T04:15:17.220000
CVE-2024-5459,0,0,81bd5d1a4ebf239ba65f5777fb4bfb17f71fa270ff31c5f59fd635927a6c453f,2024-06-13T19:35:55.083000
CVE-2024-5463,0,0,a83ead02d534db419d64d9a246adc999062f3a690f2d2cbba14bffeb9debf0f5,2024-06-04T16:57:41.053000
CVE-2024-5464,1,1,8058c4737be1e926d32509cb2e10b7a4562f56d527275616126536a3a8ae00b3,2024-06-14T08:15:41.710000
CVE-2024-5465,1,1,73f4626242a1d0966ebfc2cf1625d18e8d4f0535b49484a9cd09227629f4936d,2024-06-14T08:15:41.930000
CVE-2024-5468,0,0,2bc9c38a1a2994a4c4ceddf0376e8b3ff5412f95fe840378ab4577710a81e066,2024-06-13T18:36:09.010000
CVE-2024-5469,0,0,fb182133b6a592c90497a67ce9f1bf7105e8da3781285628adb3e682051474e6,2024-06-14T04:15:43.120000
CVE-2024-5478,0,0,cbce39d40f4102e26dfaf35e6a6b20bf349245ad3d94d864b4543f6f43a9d245,2024-06-07T14:56:05.647000
@ -253979,7 +253990,7 @@ CVE-2024-5538,0,0,183cea799fa9410e329e72f326a10b8369aedcea9a5b7583a44bf33ecc3050
CVE-2024-5542,0,0,77ae3f3a7c4ffc662d4e5625f82b1efcc56a12c39abbd3546ebc6e9e7e619033,2024-06-11T18:25:51.200000
CVE-2024-5543,0,0,8e93e3d42337fd51f8d8d19b50b3f68377ba39e905a95b2594b9c3824c59b9ee,2024-06-13T18:36:09.013000
CVE-2024-5550,0,0,e4fc13aea5b719d7c555043aa9a8be47a59e2f4d5eac2e9fa0d5ff8a8edb892f,2024-06-07T14:56:05.647000
CVE-2024-5551,1,1,7fd2c74ca03d76faa8444afc79e362b5f954f3fe72c0353b145fced7fb4c3dd7,2024-06-14T06:15:13.443000
CVE-2024-5551,0,0,7fd2c74ca03d76faa8444afc79e362b5f954f3fe72c0353b145fced7fb4c3dd7,2024-06-14T06:15:13.443000
CVE-2024-5552,0,0,12abaaddd513e722275738643d6cd32f6bb9e257da98294dd5bedf4ad4cbf55d,2024-06-07T14:56:05.647000
CVE-2024-5553,0,0,c64ee567a06c549ac68fcb5d897f8979386bb1ca79793b5b6b7b17be3abbece0,2024-06-13T18:36:09.013000
CVE-2024-5557,0,0,d46453be6b66f76046381e0db014eed7a6e7aed2ef0e3daec4893bcd8fb5d27d,2024-06-13T18:36:09.010000
@ -253989,6 +254000,7 @@ CVE-2024-5560,0,0,f1a6e79f857dcb0da00298e85540b2901c155f3f4e8e842ef291f9f993b61e
CVE-2024-5564,0,0,cd961630c6982ea90916e9cc290067a2c4a02a79292d87af6b0ec76760478ca9,2024-06-03T14:46:24.250000
CVE-2024-5565,0,0,830316f5c713618fdad4a0eda5b7296c22d5d93c87a8813197db3ff9cf28c4ee,2024-05-31T19:14:47.793000
CVE-2024-5571,0,0,105c4e644019eeccf72c6e63813cdc36601b1b9a7e3cba5bc172df86631261e6,2024-06-11T17:29:03.277000
CVE-2024-5577,1,1,58d8d7b8d912382b89611f62f9a6dc49044796f134783d6f97a0a142f7209241,2024-06-14T08:15:42.157000
CVE-2024-5584,0,0,612eacfcf6c3fd3d6fdd0ff2c66e496cc817b02568ea9f69c40277bbc0300578,2024-06-11T13:54:12.057000
CVE-2024-5585,0,0,7ca8acd7f48a83dc2f9c7f2dbf799bd4542c4abbbf9453c8a4fa401160a3a849,2024-06-13T04:15:17.407000
CVE-2024-5587,0,0,9180b0762a5a5a7a17ce70cd861bdf25e955d88caf903bee442f7c48a0a2a218,2024-06-03T14:46:24.250000
@ -254071,24 +254083,24 @@ CVE-2024-5812,0,0,b231b6b4b2edc3b100956cc90803ec880aa99de51e5a0f50bc4b9e381c5722
CVE-2024-5813,0,0,d695683c807a1777a11ef158e495934f31ab7056ebdb25d58f5f11112f2d1965,2024-06-13T18:36:45.417000
CVE-2024-5825,0,0,800930249192b4fb36871d2a50a6622621c6dfa5eae6376e2c2995741b4630b2,2024-06-11T10:15:13.960000
CVE-2024-5829,0,0,ece2333b3f7675cb0340d51c6d538163a9e25ac5d3d71e718ed0157d499370ee,2024-06-11T14:15:13.150000
CVE-2024-5830,0,1,25b30fd6a57f8dadfda81ce3fb510d579f1e215006a2c351624b51e1f8f5cb63,2024-06-14T06:15:13.690000
CVE-2024-5831,0,1,bab2c3dec91029a2d8f120c0ea657c710c868b8acc11906580db2573b29ce25a,2024-06-14T06:15:14
CVE-2024-5832,0,1,0a4578bcc0208791e029236e4a087666b73ecc267c8469678218068ccaf06f86,2024-06-14T06:15:14.293000
CVE-2024-5833,0,1,35ed52785f12cb93d4a2f93f598a29d22779685fb371c11cb9ebd648b1b3f2e1,2024-06-14T06:15:14.547000
CVE-2024-5834,0,1,2a6e308224634c23f806d9b1045e368f2b7b1ef5ecb688147237d305e2607289,2024-06-14T06:15:14.953000
CVE-2024-5835,0,1,0f73e9e934e8bbe8893daf9e3f67daf1afd0978e3d150ceeec57a2e80aa8382c,2024-06-14T06:15:15.090000
CVE-2024-5836,0,1,3a5558248327549226b6cc6135824e0344e9cec92ee964b1f734cfa18f5aeab5,2024-06-14T06:15:15.463000
CVE-2024-5837,0,1,2e89ce3964ce151afe063dca1e64c5ae6e4d4381ef9c873cb8b30e7dc3f2830d,2024-06-14T06:15:15.683000
CVE-2024-5838,0,1,ed59e1a65bb4129da9b71e3f50927c18e71724dbe6fa5f13c07ad14372b0fac0,2024-06-14T06:15:15.887000
CVE-2024-5839,0,1,8f034c510a7fd0e0745bd30b404393daf7037ac09470f44def1786be54068041,2024-06-14T06:15:16.180000
CVE-2024-5840,0,1,c526d5256b038fff7afa444b028c33817d0c13b5b161b9652cb13c250696c2a7,2024-06-14T06:15:16.280000
CVE-2024-5841,0,1,a7a170eb2414a99bd9910abfc7f708acbc3c4b92192ba0f04dadd7b46dac3399,2024-06-14T06:15:16.640000
CVE-2024-5842,0,1,4eb87bac0c50e1f717e5710274414381670e8c18a9c6f1b04f400ac18981dd9a,2024-06-14T06:15:16.913000
CVE-2024-5843,0,1,2be4b00ab957673a25b135ebb64fcc6e3b51903ce8774e77938fc9dc297acd9c,2024-06-14T06:15:17.170000
CVE-2024-5844,0,1,bdfdfc1f02e824433f5edcf6ca843d62bd4b218e96cc2df29214d0c6275327db,2024-06-14T06:15:17.517000
CVE-2024-5845,0,1,109c5cd760bc6bcfea448de275120469251e47b6c5f10dfa49429d52e7e14565,2024-06-14T06:15:17.790000
CVE-2024-5846,0,1,74cdfbc72d0ccccfb4960f8d9f050011c9367ff3a9087fe2085d5d3a9a567ba2,2024-06-14T06:15:18.070000
CVE-2024-5847,0,1,fb0db0442787e77827fbf12115b06f51612cc2a1c9a9d0bc9a8c9faefc3d9705,2024-06-14T06:15:18.340000
CVE-2024-5830,0,0,25b30fd6a57f8dadfda81ce3fb510d579f1e215006a2c351624b51e1f8f5cb63,2024-06-14T06:15:13.690000
CVE-2024-5831,0,0,bab2c3dec91029a2d8f120c0ea657c710c868b8acc11906580db2573b29ce25a,2024-06-14T06:15:14
CVE-2024-5832,0,0,0a4578bcc0208791e029236e4a087666b73ecc267c8469678218068ccaf06f86,2024-06-14T06:15:14.293000
CVE-2024-5833,0,0,35ed52785f12cb93d4a2f93f598a29d22779685fb371c11cb9ebd648b1b3f2e1,2024-06-14T06:15:14.547000
CVE-2024-5834,0,0,2a6e308224634c23f806d9b1045e368f2b7b1ef5ecb688147237d305e2607289,2024-06-14T06:15:14.953000
CVE-2024-5835,0,0,0f73e9e934e8bbe8893daf9e3f67daf1afd0978e3d150ceeec57a2e80aa8382c,2024-06-14T06:15:15.090000
CVE-2024-5836,0,0,3a5558248327549226b6cc6135824e0344e9cec92ee964b1f734cfa18f5aeab5,2024-06-14T06:15:15.463000
CVE-2024-5837,0,0,2e89ce3964ce151afe063dca1e64c5ae6e4d4381ef9c873cb8b30e7dc3f2830d,2024-06-14T06:15:15.683000
CVE-2024-5838,0,0,ed59e1a65bb4129da9b71e3f50927c18e71724dbe6fa5f13c07ad14372b0fac0,2024-06-14T06:15:15.887000
CVE-2024-5839,0,0,8f034c510a7fd0e0745bd30b404393daf7037ac09470f44def1786be54068041,2024-06-14T06:15:16.180000
CVE-2024-5840,0,0,c526d5256b038fff7afa444b028c33817d0c13b5b161b9652cb13c250696c2a7,2024-06-14T06:15:16.280000
CVE-2024-5841,0,0,a7a170eb2414a99bd9910abfc7f708acbc3c4b92192ba0f04dadd7b46dac3399,2024-06-14T06:15:16.640000
CVE-2024-5842,0,0,4eb87bac0c50e1f717e5710274414381670e8c18a9c6f1b04f400ac18981dd9a,2024-06-14T06:15:16.913000
CVE-2024-5843,0,0,2be4b00ab957673a25b135ebb64fcc6e3b51903ce8774e77938fc9dc297acd9c,2024-06-14T06:15:17.170000
CVE-2024-5844,0,0,bdfdfc1f02e824433f5edcf6ca843d62bd4b218e96cc2df29214d0c6275327db,2024-06-14T06:15:17.517000
CVE-2024-5845,0,0,109c5cd760bc6bcfea448de275120469251e47b6c5f10dfa49429d52e7e14565,2024-06-14T06:15:17.790000
CVE-2024-5846,0,0,74cdfbc72d0ccccfb4960f8d9f050011c9367ff3a9087fe2085d5d3a9a567ba2,2024-06-14T06:15:18.070000
CVE-2024-5847,0,0,fb0db0442787e77827fbf12115b06f51612cc2a1c9a9d0bc9a8c9faefc3d9705,2024-06-14T06:15:18.340000
CVE-2024-5851,0,0,1ff86bf427427298fe5dc39bbfedb897b9870fd2315cf065507e70165fb41d41,2024-06-13T18:36:09.013000
CVE-2024-5873,0,0,4affe4b1f71505ca05298a33c7e23c3ae147869580237755bed2d180fbea1b8e,2024-06-12T08:15:51.550000
CVE-2024-5891,0,0,da4ba5748ecb097f5befd86d4787f2c76143132bf594110b21f16b774e08e15d,2024-06-13T18:36:09.010000
@ -254112,9 +254124,12 @@ CVE-2024-5949,0,0,b3986a8edb1512233064a5da51557c0fa4f711ec9b142a106f76745321d3ce
CVE-2024-5950,0,0,1f86aa27bca5269525cdd401ce251fe2cb91fad6e36bea2e480bcbcdf6032a6e,2024-06-13T20:15:16.923000
CVE-2024-5951,0,0,fff68899d3009d75df7027ceba73ebc8730458ee33bb67011fd27dc83f85a1f2,2024-06-13T20:15:17.140000
CVE-2024-5952,0,0,417f3877151c0966e5133a5fd225fe602bd3ee4917b6bc769756fb14d3a30c86,2024-06-13T20:15:17.350000
CVE-2024-5961,1,1,b440137329b976f0b8c78f9e98dd35a3c37762ea79a4b3f62bdc8ead42b28d8b,2024-06-14T08:15:42.377000
CVE-2024-5976,0,0,8ad4fe84c9006c6743ccdbedb7ac649699be956a4b5f416470a5b939bc8dbac3,2024-06-14T03:15:15.327000
CVE-2024-5981,0,0,c021f0e87e8a9bc67184ae54917b7538b0a7383b265f005413cc498575c90f46,2024-06-14T02:15:09.897000
CVE-2024-5983,0,0,d45671faa415b160e1a63cc5e7f78ea7860e778a55f924cf86d97430e4149871,2024-06-14T02:15:10.173000
CVE-2024-5984,0,0,03fca76e26072017e4ea4f49f9638244fcc95d14d8a7905b4ba1013839a62ab1,2024-06-14T02:15:10.443000
CVE-2024-5983,0,1,6b0960283f56bbd0c8fee7719d1537cd30e374b70cf4ff8a30b52cbdba8f3f5c,2024-06-14T08:15:42.550000
CVE-2024-5984,0,1,0f63f0c126f74e56b7604626b4132713a42849cc9023a033be10da98fdb3d993,2024-06-14T08:15:42.843000
CVE-2024-5985,0,0,49a38267a9ce797f1b9e3a5a1b0820a2bd8e915256f564f2f744e9be24bef4de,2024-06-14T02:15:10.713000
CVE-2024-5994,1,1,4b417b2409adf1cfb062272ddf9dab639d715406e66503c860b838a6da714a73,2024-06-14T07:15:51.130000
CVE-2024-5994,0,1,b678ba7844dbb9440c0118c55fb917843e6316e30468d41dd4d372cdc7eeb766,2024-06-14T07:15:51.130000
CVE-2024-5995,1,1,ede0470f9d86fed4f618bc468676b26641d05d4bd4a249ad161aea8b2cec90ce,2024-06-14T08:15:43.097000
CVE-2024-5996,1,1,39e608463feedd3b2c4692002beac62fb7b065fa02bb74368f2c8f4d20db9740,2024-06-14T09:15:11.010000

Can't render this file because it is too large.