diff --git a/CVE-2021/CVE-2021-368xx/CVE-2021-36821.json b/CVE-2021/CVE-2021-368xx/CVE-2021-36821.json index 94df104e856..5820ffd32f1 100644 --- a/CVE-2021/CVE-2021-368xx/CVE-2021-36821.json +++ b/CVE-2021/CVE-2021-368xx/CVE-2021-36821.json @@ -2,12 +2,12 @@ "id": "CVE-2021-36821", "sourceIdentifier": "audit@patchstack.com", "published": "2023-03-16T15:15:10.113", - "lastModified": "2023-11-07T03:36:51.373", + "lastModified": "2024-04-29T09:15:06.850", "vulnStatus": "Modified", "descriptions": [ { "lang": "en", - "value": "Unauth. Stored Cross-Site Scripting (XSS) vulnerability in WPMU DEV Forminator \u2013 Contact Form, Payment Form & Custom Form Builder plugin\u00a0<= 1.14.11 versions." + "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in WPMU DEV Forminator \u2013 Contact Form, Payment Form & Custom Form Builder allows Stored XSS.This issue affects Forminator \u2013 Contact Form, Payment Form & Custom Form Builder: from n/a through 1.14.11.\n\n" } ], "metrics": { diff --git a/CVE-2021/CVE-2021-368xx/CVE-2021-36823.json b/CVE-2021/CVE-2021-368xx/CVE-2021-36823.json index 480cf0a5b17..328ea7ae2b8 100644 --- a/CVE-2021/CVE-2021-368xx/CVE-2021-36823.json +++ b/CVE-2021/CVE-2021-368xx/CVE-2021-36823.json @@ -2,12 +2,12 @@ "id": "CVE-2021-36823", "sourceIdentifier": "audit@patchstack.com", "published": "2021-09-23T17:15:12.080", - "lastModified": "2023-11-07T03:36:51.463", + "lastModified": "2024-04-29T09:15:07.020", "vulnStatus": "Modified", "descriptions": [ { "lang": "en", - "value": "Auth. Stored Cross-Site Scripting (XSS) vulnerability in WordPress Absolutely Glamorous Custom Admin plugin <= 6.8\u00a0versions.\n\n" + "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Cusmin AGCA - Absolutely Glamorous Custom Admin (WordPress plugin) allows Stored XSS.This issue affects AGCA - Absolutely Glamorous Custom Admin (WordPress plugin): from n/a through 6.8.\n\n" }, { "lang": "es", diff --git a/CVE-2023/CVE-2023-379xx/CVE-2023-37998.json b/CVE-2023/CVE-2023-379xx/CVE-2023-37998.json index f6589316340..1e6a37f334a 100644 --- a/CVE-2023/CVE-2023-379xx/CVE-2023-37998.json +++ b/CVE-2023/CVE-2023-379xx/CVE-2023-37998.json @@ -2,12 +2,12 @@ "id": "CVE-2023-37998", "sourceIdentifier": "audit@patchstack.com", "published": "2023-10-03T10:15:10.483", - "lastModified": "2023-10-04T19:54:12.660", - "vulnStatus": "Analyzed", + "lastModified": "2024-04-29T09:15:07.163", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", - "value": "Cross-Site Request Forgery (CSRF) vulnerability in Saas Disabler plugin <=\u00a03.0.3 versions." + "value": "Cross-Site Request Forgery (CSRF) vulnerability in Saas Disabler allows Cross Site Request Forgery.This issue affects Disabler: from n/a through 3.0.3.\n\n" }, { "lang": "es", diff --git a/CVE-2023/CVE-2023-417xx/CVE-2023-41728.json b/CVE-2023/CVE-2023-417xx/CVE-2023-41728.json index bbbe04be76b..b1dcc637305 100644 --- a/CVE-2023/CVE-2023-417xx/CVE-2023-41728.json +++ b/CVE-2023/CVE-2023-417xx/CVE-2023-41728.json @@ -2,12 +2,12 @@ "id": "CVE-2023-41728", "sourceIdentifier": "audit@patchstack.com", "published": "2023-10-02T08:15:38.580", - "lastModified": "2023-10-03T20:55:45.703", - "vulnStatus": "Analyzed", + "lastModified": "2024-04-29T09:15:07.277", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", - "value": "Auth. (contributor+) Stored Cross-Site Scripting (XSS) vulnerability in Rescue Themes Rescue Shortcodes plugin <=\u00a02.5 versions." + "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Rescue Themes Rescue Shortcodes allows Stored XSS.This issue affects Rescue Shortcodes: from n/a through 2.5.\n\n" }, { "lang": "es", diff --git a/CVE-2024/CVE-2024-279xx/CVE-2024-27956.json b/CVE-2024/CVE-2024-279xx/CVE-2024-27956.json index 5580b0c670d..fe14aa296a4 100644 --- a/CVE-2024/CVE-2024-279xx/CVE-2024-27956.json +++ b/CVE-2024/CVE-2024-279xx/CVE-2024-27956.json @@ -2,7 +2,7 @@ "id": "CVE-2024-27956", "sourceIdentifier": "audit@patchstack.com", "published": "2024-03-21T17:15:08.437", - "lastModified": "2024-03-21T19:47:03.943", + "lastModified": "2024-04-29T09:15:07.387", "vulnStatus": "Awaiting Analysis", "descriptions": [ { @@ -51,6 +51,10 @@ } ], "references": [ + { + "url": "https://patchstack.com/articles/critical-vulnerabilities-patched-in-wordpress-automatic-plugin?_s_id=cve", + "source": "audit@patchstack.com" + }, { "url": "https://patchstack.com/database/vulnerability/wp-automatic/wordpress-automatic-plugin-3-92-0-unauthenticated-arbitrary-sql-execution-vulnerability?_s_id=cve", "source": "audit@patchstack.com" diff --git a/CVE-2024/CVE-2024-289xx/CVE-2024-28961.json b/CVE-2024/CVE-2024-289xx/CVE-2024-28961.json new file mode 100644 index 00000000000..c8ad517f474 --- /dev/null +++ b/CVE-2024/CVE-2024-289xx/CVE-2024-28961.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2024-28961", + "sourceIdentifier": "security_alert@emc.com", + "published": "2024-04-29T09:15:07.477", + "lastModified": "2024-04-29T09:15:07.477", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Dell OpenManage Enterprise, versions 4.0.0 and 4.0.1, contains a sensitive information disclosure vulnerability. A local low privileged malicious user could potentially exploit this vulnerability to obtain credentials leading to unauthorized access with elevated privileges. This could lead to further attacks, thus Dell recommends customers to upgrade at the earliest opportunity." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security_alert@emc.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:L", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 6.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.0, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "security_alert@emc.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-256" + } + ] + } + ], + "references": [ + { + "url": "https://www.dell.com/support/kbdoc/en-us/000224251/dsa-2024-184-security-update-for-dell-openmanage-enterprise-vulnerability", + "source": "security_alert@emc.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-321xx/CVE-2024-32109.json b/CVE-2024/CVE-2024-321xx/CVE-2024-32109.json index f962831dc40..68c3fdbe5ff 100644 --- a/CVE-2024/CVE-2024-321xx/CVE-2024-32109.json +++ b/CVE-2024/CVE-2024-321xx/CVE-2024-32109.json @@ -2,12 +2,12 @@ "id": "CVE-2024-32109", "sourceIdentifier": "audit@patchstack.com", "published": "2024-04-11T13:15:56.157", - "lastModified": "2024-04-11T13:30:38.000", + "lastModified": "2024-04-29T09:15:07.707", "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", - "value": "Cross-Site Request Forgery (CSRF) vulnerability in Julien Berthelot / MPEmbed.Com WP Matterport Shortcode.This issue affects WP Matterport Shortcode: from n/a through 2.1.8.\n\n" + "value": "Cross-Site Request Forgery (CSRF) vulnerability in Julien Berthelot / MPEmbed.Com WP Matterport Shortcode allows Cross Site Request Forgery.This issue affects WP Matterport Shortcode: from n/a through 2.1.9.\n\n" }, { "lang": "es", diff --git a/CVE-2024/CVE-2024-321xx/CVE-2024-32129.json b/CVE-2024/CVE-2024-321xx/CVE-2024-32129.json index d73cd9d5a7c..325f041cbe2 100644 --- a/CVE-2024/CVE-2024-321xx/CVE-2024-32129.json +++ b/CVE-2024/CVE-2024-321xx/CVE-2024-32129.json @@ -2,12 +2,12 @@ "id": "CVE-2024-32129", "sourceIdentifier": "audit@patchstack.com", "published": "2024-04-15T11:15:11.233", - "lastModified": "2024-04-15T13:15:31.997", + "lastModified": "2024-04-29T09:15:07.803", "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", - "value": "URL Redirection to Untrusted Site ('Open Redirect') vulnerability in Freshworks Freshdesk (official).This issue affects Freshdesk (official): from n/a through 2.3.4.\n\n" + "value": "URL Redirection to Untrusted Site ('Open Redirect') vulnerability in Freshworks Freshdesk (official).This issue affects Freshdesk (official): from n/a through 2.3.6.\n\n" }, { "lang": "es", diff --git a/CVE-2024/CVE-2024-335xx/CVE-2024-33538.json b/CVE-2024/CVE-2024-335xx/CVE-2024-33538.json new file mode 100644 index 00000000000..576c8d07400 --- /dev/null +++ b/CVE-2024/CVE-2024-335xx/CVE-2024-33538.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2024-33538", + "sourceIdentifier": "audit@patchstack.com", + "published": "2024-04-29T08:15:06.383", + "lastModified": "2024-04-29T08:15:06.383", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Exposure of Sensitive Information to an Unauthorized Actor vulnerability in Fastline Media LLC Assistant \u2013 Every Day Productivity Apps.This issue affects Assistant \u2013 Every Day Productivity Apps: from n/a through 1.4.9.1.\n\n" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 5.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-200" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/vulnerability/assistant/wordpress-assistant-every-day-productivity-apps-plugin-1-4-9-1-sensitive-data-exposure-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-335xx/CVE-2024-33553.json b/CVE-2024/CVE-2024-335xx/CVE-2024-33553.json new file mode 100644 index 00000000000..16f253a0edb --- /dev/null +++ b/CVE-2024/CVE-2024-335xx/CVE-2024-33553.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2024-33553", + "sourceIdentifier": "audit@patchstack.com", + "published": "2024-04-29T08:15:06.603", + "lastModified": "2024-04-29T08:15:06.603", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Deserialization of Untrusted Data vulnerability in 8theme XStore Core.This issue affects XStore Core: from n/a through 5.3.5.\n\n" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.0, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 2.2, + "impactScore": 6.0 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-502" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/vulnerability/et-core-plugin/wordpress-xstore-core-plugin-5-3-5-unauthenticated-php-object-injection-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-335xx/CVE-2024-33558.json b/CVE-2024/CVE-2024-335xx/CVE-2024-33558.json new file mode 100644 index 00000000000..72842f34d16 --- /dev/null +++ b/CVE-2024/CVE-2024-335xx/CVE-2024-33558.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2024-33558", + "sourceIdentifier": "audit@patchstack.com", + "published": "2024-04-29T09:15:07.890", + "lastModified": "2024-04-29T09:15:07.890", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Missing Authorization vulnerability in 8theme XStore Core.This issue affects XStore Core: from n/a through 5.3.5.\n\n" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 6.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/vulnerability/et-core-plugin/wordpress-xstore-core-plugin-5-3-5-limited-arbitrary-file-download-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-335xx/CVE-2024-33566.json b/CVE-2024/CVE-2024-335xx/CVE-2024-33566.json new file mode 100644 index 00000000000..88483f18e05 --- /dev/null +++ b/CVE-2024/CVE-2024-335xx/CVE-2024-33566.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2024-33566", + "sourceIdentifier": "audit@patchstack.com", + "published": "2024-04-29T08:15:06.803", + "lastModified": "2024-04-29T08:15:06.803", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Missing Authorization vulnerability in N-Media OrderConvo allows OS Command Injection.This issue affects OrderConvo: from n/a through 12.4.\n\n" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 10.0, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 6.0 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/vulnerability/admin-and-client-message-after-order-for-woocommerce/wordpress-orderconvo-plugin-12-4-unauthenticated-api-access-to-arbitrary-file-upload-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-335xx/CVE-2024-33575.json b/CVE-2024/CVE-2024-335xx/CVE-2024-33575.json new file mode 100644 index 00000000000..a066cdc5d68 --- /dev/null +++ b/CVE-2024/CVE-2024-335xx/CVE-2024-33575.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2024-33575", + "sourceIdentifier": "audit@patchstack.com", + "published": "2024-04-29T08:15:06.987", + "lastModified": "2024-04-29T08:15:06.987", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Exposure of Sensitive Information to an Unauthorized Actor vulnerability in User Meta user-meta.This issue affects User Meta: from n/a through 3.0.\n\n" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 5.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-200" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/vulnerability/user-meta/wordpress-user-meta-plugin-3-0-sensitive-data-exposure-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-335xx/CVE-2024-33584.json b/CVE-2024/CVE-2024-335xx/CVE-2024-33584.json new file mode 100644 index 00000000000..ac7a53f3f6a --- /dev/null +++ b/CVE-2024/CVE-2024-335xx/CVE-2024-33584.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2024-33584", + "sourceIdentifier": "audit@patchstack.com", + "published": "2024-04-29T08:15:07.170", + "lastModified": "2024-04-29T08:15:07.170", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "URL Redirection to Untrusted Site ('Open Redirect') vulnerability in Deepen Bajracharya Video Conferencing with Zoom.This issue affects Video Conferencing with Zoom: from n/a through 4.4.4.\n\n" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 4.7, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-601" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/vulnerability/video-conferencing-with-zoom-api/wordpress-video-conferencing-with-zoom-plugin-4-4-4-open-redirection-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-335xx/CVE-2024-33596.json b/CVE-2024/CVE-2024-335xx/CVE-2024-33596.json new file mode 100644 index 00000000000..20a10021104 --- /dev/null +++ b/CVE-2024/CVE-2024-335xx/CVE-2024-33596.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2024-33596", + "sourceIdentifier": "audit@patchstack.com", + "published": "2024-04-29T09:15:08.080", + "lastModified": "2024-04-29T09:15:08.080", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Missing Authorization vulnerability in Five Star Plugins Five Star Restaurant Reservations.This issue affects Five Star Restaurant Reservations: from n/a through 2.6.16.\n\n" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/vulnerability/restaurant-reservations/wordpress-five-star-restaurant-reservations-plugin-2-6-16-broken-access-control-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-335xx/CVE-2024-33597.json b/CVE-2024/CVE-2024-335xx/CVE-2024-33597.json new file mode 100644 index 00000000000..0ba82a923e9 --- /dev/null +++ b/CVE-2024/CVE-2024-335xx/CVE-2024-33597.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2024-33597", + "sourceIdentifier": "audit@patchstack.com", + "published": "2024-04-29T09:15:08.270", + "lastModified": "2024-04-29T09:15:08.270", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Missing Authorization vulnerability in ProFaceOff SSU.This issue affects SSU: from n/a through 1.5.0.\n\n" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/vulnerability/wp-s3-smart-upload/wordpress-ssu-plugin-1-5-0-broken-access-control-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-336xx/CVE-2024-33627.json b/CVE-2024/CVE-2024-336xx/CVE-2024-33627.json new file mode 100644 index 00000000000..a6467d5db0b --- /dev/null +++ b/CVE-2024/CVE-2024-336xx/CVE-2024-33627.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2024-33627", + "sourceIdentifier": "audit@patchstack.com", + "published": "2024-04-29T08:15:07.367", + "lastModified": "2024-04-29T08:15:07.367", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Server-Side Request Forgery (SSRF) vulnerability in Cusmin Absolutely Glamorous Custom Admin.This issue affects Absolutely Glamorous Custom Admin: from n/a through 7.2.2.\n\n" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 4.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.3, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-918" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/vulnerability/ag-custom-admin/wordpress-agca-custom-dashboard-login-page-plugin-7-2-2-server-side-request-forgery-ssrf-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-336xx/CVE-2024-33629.json b/CVE-2024/CVE-2024-336xx/CVE-2024-33629.json new file mode 100644 index 00000000000..9a2c09f28c7 --- /dev/null +++ b/CVE-2024/CVE-2024-336xx/CVE-2024-33629.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2024-33629", + "sourceIdentifier": "audit@patchstack.com", + "published": "2024-04-29T08:15:07.640", + "lastModified": "2024-04-29T08:15:07.640", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Server-Side Request Forgery (SSRF) vulnerability in Creative Motion Auto Featured Image (Auto Post Thumbnail).This issue affects Auto Featured Image (Auto Post Thumbnail): from n/a through 4.0.0.\n\n" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 4.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.3, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-918" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/vulnerability/auto-post-thumbnail/wordpress-auto-featured-image-auto-post-thumbnail-plugin-4-0-0-server-side-request-forgery-ssrf-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-336xx/CVE-2024-33634.json b/CVE-2024/CVE-2024-336xx/CVE-2024-33634.json new file mode 100644 index 00000000000..20c9b2176b4 --- /dev/null +++ b/CVE-2024/CVE-2024-336xx/CVE-2024-33634.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2024-33634", + "sourceIdentifier": "audit@patchstack.com", + "published": "2024-04-29T08:15:07.830", + "lastModified": "2024-04-29T08:15:07.830", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Server-Side Request Forgery (SSRF) vulnerability in Piotnet Piotnet Addons For Elementor Pro.This issue affects Piotnet Addons For Elementor Pro: from n/a through 7.1.17.\n\n" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.2, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-918" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/vulnerability/piotnet-addons-for-elementor-pro/wordpress-piotnet-addons-for-elementor-pro-plugin-7-1-17-unauthenticated-server-side-request-forgery-ssrf-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-336xx/CVE-2024-33635.json b/CVE-2024/CVE-2024-336xx/CVE-2024-33635.json new file mode 100644 index 00000000000..6cea088aeb6 --- /dev/null +++ b/CVE-2024/CVE-2024-336xx/CVE-2024-33635.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2024-33635", + "sourceIdentifier": "audit@patchstack.com", + "published": "2024-04-29T09:15:08.460", + "lastModified": "2024-04-29T09:15:08.460", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Missing Authorization vulnerability in Piotnet Piotnet Addons For Elementor Pro.This issue affects Piotnet Addons For Elementor Pro: from n/a through 7.1.17.\n\n" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/vulnerability/piotnet-addons-for-elementor-pro/wordpress-piotnet-addons-for-elementor-pro-plugin-7-1-17-unauthenticated-arbitrary-post-page-deletion-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-336xx/CVE-2024-33636.json b/CVE-2024/CVE-2024-336xx/CVE-2024-33636.json new file mode 100644 index 00000000000..f50d62fa560 --- /dev/null +++ b/CVE-2024/CVE-2024-336xx/CVE-2024-33636.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2024-33636", + "sourceIdentifier": "audit@patchstack.com", + "published": "2024-04-29T09:15:08.640", + "lastModified": "2024-04-29T09:15:08.640", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Missing Authorization vulnerability in Mahesh Vora WP Page Post Widget Clone.This issue affects WP Page Post Widget Clone: from n/a through 1.0.1.\n\n" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.5 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/vulnerability/wp-page-post-widget-clone/wordpress-wp-page-post-widget-clone-plugin-1-0-1-broken-access-control-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-336xx/CVE-2024-33637.json b/CVE-2024/CVE-2024-336xx/CVE-2024-33637.json new file mode 100644 index 00000000000..e3f0a9be0ae --- /dev/null +++ b/CVE-2024/CVE-2024-336xx/CVE-2024-33637.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2024-33637", + "sourceIdentifier": "audit@patchstack.com", + "published": "2024-04-29T08:15:08.007", + "lastModified": "2024-04-29T08:15:08.007", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Insertion of Sensitive Information into Log File vulnerability in Solid Plugins Solid Affiliate.This issue affects Solid Affiliate: from n/a through 1.9.1.\n\n" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-532" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/vulnerability/solid-affiliate/wordpress-solid-affiliate-plugin-1-9-1-sensitive-data-exposure-via-log-file-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-336xx/CVE-2024-33641.json b/CVE-2024/CVE-2024-336xx/CVE-2024-33641.json new file mode 100644 index 00000000000..0fd87e1c8fc --- /dev/null +++ b/CVE-2024/CVE-2024-336xx/CVE-2024-33641.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2024-33641", + "sourceIdentifier": "audit@patchstack.com", + "published": "2024-04-29T08:15:08.200", + "lastModified": "2024-04-29T08:15:08.200", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Deserialization of Untrusted Data vulnerability in Team Yoast Custom field finder.This issue affects Custom field finder: from n/a through 0.3.\n\n" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.2, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-502" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/vulnerability/custom-field-finder/wordpress-custom-field-finder-plugin-0-3-php-object-injection-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-336xx/CVE-2024-33652.json b/CVE-2024/CVE-2024-336xx/CVE-2024-33652.json new file mode 100644 index 00000000000..f16f15d666b --- /dev/null +++ b/CVE-2024/CVE-2024-336xx/CVE-2024-33652.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2024-33652", + "sourceIdentifier": "audit@patchstack.com", + "published": "2024-04-29T08:15:08.383", + "lastModified": "2024-04-29T08:15:08.383", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Missing Authorization vulnerability in Real Big Plugins Client Dash.This issue affects Client Dash: from n/a through 2.2.1.\n\n" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "LOW", + "baseScore": 5.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/vulnerability/client-dash/wordpress-client-dash-plugin-2-2-1-broken-access-control-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-336xx/CVE-2024-33684.json b/CVE-2024/CVE-2024-336xx/CVE-2024-33684.json new file mode 100644 index 00000000000..bd3fb92f06e --- /dev/null +++ b/CVE-2024/CVE-2024-336xx/CVE-2024-33684.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2024-33684", + "sourceIdentifier": "audit@patchstack.com", + "published": "2024-04-29T09:15:08.833", + "lastModified": "2024-04-29T09:15:08.833", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Missing Authorization vulnerability in Pdfcrowd Save as PDF plugin by Pdfcrowd allows Stored XSS.This issue affects Save as PDF plugin by Pdfcrowd: from n/a through 3.2.0.\n\n" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 6.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.3, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/vulnerability/save-as-pdf-by-pdfcrowd/wordpress-save-as-pdf-plugin-by-pdfcrowd-plugin-3-2-0-broken-access-control-to-stored-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-33xx/CVE-2024-3375.json b/CVE-2024/CVE-2024-33xx/CVE-2024-3375.json new file mode 100644 index 00000000000..65065e3cea8 --- /dev/null +++ b/CVE-2024/CVE-2024-33xx/CVE-2024-3375.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2024-3375", + "sourceIdentifier": "iletisim@usom.gov.tr", + "published": "2024-04-29T09:15:09.017", + "lastModified": "2024-04-29T09:15:09.017", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Incorrect Permission Assignment for Critical Resource vulnerability in Havelsan Inc. Dialogue allows Accessing Functionality Not Properly Constrained by ACLs.This issue affects Dialogue: from v1.83 before v1.83.1 or v1.84.\n\n" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "iletisim@usom.gov.tr", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "LOW", + "availabilityImpact": "HIGH", + "baseScore": 9.4, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.5 + } + ] + }, + "weaknesses": [ + { + "source": "iletisim@usom.gov.tr", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-732" + } + ] + } + ], + "references": [ + { + "url": "https://www.usom.gov.tr/bildirim/tr-24-0363", + "source": "iletisim@usom.gov.tr" + } + ] +} \ No newline at end of file diff --git a/README.md b/README.md index 6c1dd572f73..e38c2eaa1e6 100644 --- a/README.md +++ b/README.md @@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2024-04-29T08:00:38.345826+00:00 +2024-04-29T10:00:38.038569+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2024-04-29T07:15:08.740000+00:00 +2024-04-29T09:15:09.017000+00:00 ``` ### Last Data Feed Release @@ -33,46 +33,45 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### Total Number of included CVEs ```plain -247065 +247084 ``` ### CVEs added in the last Commit -Recently added CVEs: `30` +Recently added CVEs: `19` -- [CVE-2024-3193](CVE-2024/CVE-2024-31xx/CVE-2024-3193.json) (`2024-04-29T07:15:07.773`) -- [CVE-2024-3194](CVE-2024/CVE-2024-31xx/CVE-2024-3194.json) (`2024-04-29T07:15:08.070`) -- [CVE-2024-3195](CVE-2024/CVE-2024-31xx/CVE-2024-3195.json) (`2024-04-29T07:15:08.400`) -- [CVE-2024-3196](CVE-2024/CVE-2024-31xx/CVE-2024-3196.json) (`2024-04-29T07:15:08.740`) -- [CVE-2024-33537](CVE-2024/CVE-2024-335xx/CVE-2024-33537.json) (`2024-04-29T06:15:08.083`) -- [CVE-2024-33539](CVE-2024/CVE-2024-335xx/CVE-2024-33539.json) (`2024-04-29T06:15:08.930`) -- [CVE-2024-33540](CVE-2024/CVE-2024-335xx/CVE-2024-33540.json) (`2024-04-29T06:15:09.637`) -- [CVE-2024-33542](CVE-2024/CVE-2024-335xx/CVE-2024-33542.json) (`2024-04-29T06:15:10.220`) -- [CVE-2024-33544](CVE-2024/CVE-2024-335xx/CVE-2024-33544.json) (`2024-04-29T07:15:06.543`) -- [CVE-2024-33546](CVE-2024/CVE-2024-335xx/CVE-2024-33546.json) (`2024-04-29T07:15:06.810`) -- [CVE-2024-33548](CVE-2024/CVE-2024-335xx/CVE-2024-33548.json) (`2024-04-29T06:15:10.937`) -- [CVE-2024-33551](CVE-2024/CVE-2024-335xx/CVE-2024-33551.json) (`2024-04-29T06:15:11.487`) -- [CVE-2024-33554](CVE-2024/CVE-2024-335xx/CVE-2024-33554.json) (`2024-04-29T06:15:12.090`) -- [CVE-2024-33559](CVE-2024/CVE-2024-335xx/CVE-2024-33559.json) (`2024-04-29T06:15:12.607`) -- [CVE-2024-33562](CVE-2024/CVE-2024-335xx/CVE-2024-33562.json) (`2024-04-29T06:15:13.163`) -- [CVE-2024-33571](CVE-2024/CVE-2024-335xx/CVE-2024-33571.json) (`2024-04-29T06:15:13.667`) -- [CVE-2024-33630](CVE-2024/CVE-2024-336xx/CVE-2024-33630.json) (`2024-04-29T06:15:14.450`) -- [CVE-2024-33631](CVE-2024/CVE-2024-336xx/CVE-2024-33631.json) (`2024-04-29T06:15:14.940`) -- [CVE-2024-33632](CVE-2024/CVE-2024-336xx/CVE-2024-33632.json) (`2024-04-29T06:15:15.537`) -- [CVE-2024-33681](CVE-2024/CVE-2024-336xx/CVE-2024-33681.json) (`2024-04-29T06:15:16.057`) -- [CVE-2024-33686](CVE-2024/CVE-2024-336xx/CVE-2024-33686.json) (`2024-04-29T06:15:16.623`) -- [CVE-2024-33904](CVE-2024/CVE-2024-339xx/CVE-2024-33904.json) (`2024-04-29T06:15:17.320`) -- [CVE-2024-33905](CVE-2024/CVE-2024-339xx/CVE-2024-33905.json) (`2024-04-29T06:15:17.667`) -- [CVE-2024-4302](CVE-2024/CVE-2024-43xx/CVE-2024-4302.json) (`2024-04-29T06:15:17.803`) -- [CVE-2024-4303](CVE-2024/CVE-2024-43xx/CVE-2024-4303.json) (`2024-04-29T06:15:18.457`) +- [CVE-2024-28961](CVE-2024/CVE-2024-289xx/CVE-2024-28961.json) (`2024-04-29T09:15:07.477`) +- [CVE-2024-33538](CVE-2024/CVE-2024-335xx/CVE-2024-33538.json) (`2024-04-29T08:15:06.383`) +- [CVE-2024-33553](CVE-2024/CVE-2024-335xx/CVE-2024-33553.json) (`2024-04-29T08:15:06.603`) +- [CVE-2024-33558](CVE-2024/CVE-2024-335xx/CVE-2024-33558.json) (`2024-04-29T09:15:07.890`) +- [CVE-2024-33566](CVE-2024/CVE-2024-335xx/CVE-2024-33566.json) (`2024-04-29T08:15:06.803`) +- [CVE-2024-33575](CVE-2024/CVE-2024-335xx/CVE-2024-33575.json) (`2024-04-29T08:15:06.987`) +- [CVE-2024-33584](CVE-2024/CVE-2024-335xx/CVE-2024-33584.json) (`2024-04-29T08:15:07.170`) +- [CVE-2024-33596](CVE-2024/CVE-2024-335xx/CVE-2024-33596.json) (`2024-04-29T09:15:08.080`) +- [CVE-2024-33597](CVE-2024/CVE-2024-335xx/CVE-2024-33597.json) (`2024-04-29T09:15:08.270`) +- [CVE-2024-33627](CVE-2024/CVE-2024-336xx/CVE-2024-33627.json) (`2024-04-29T08:15:07.367`) +- [CVE-2024-33629](CVE-2024/CVE-2024-336xx/CVE-2024-33629.json) (`2024-04-29T08:15:07.640`) +- [CVE-2024-33634](CVE-2024/CVE-2024-336xx/CVE-2024-33634.json) (`2024-04-29T08:15:07.830`) +- [CVE-2024-33635](CVE-2024/CVE-2024-336xx/CVE-2024-33635.json) (`2024-04-29T09:15:08.460`) +- [CVE-2024-33636](CVE-2024/CVE-2024-336xx/CVE-2024-33636.json) (`2024-04-29T09:15:08.640`) +- [CVE-2024-33637](CVE-2024/CVE-2024-336xx/CVE-2024-33637.json) (`2024-04-29T08:15:08.007`) +- [CVE-2024-33641](CVE-2024/CVE-2024-336xx/CVE-2024-33641.json) (`2024-04-29T08:15:08.200`) +- [CVE-2024-33652](CVE-2024/CVE-2024-336xx/CVE-2024-33652.json) (`2024-04-29T08:15:08.383`) +- [CVE-2024-33684](CVE-2024/CVE-2024-336xx/CVE-2024-33684.json) (`2024-04-29T09:15:08.833`) +- [CVE-2024-3375](CVE-2024/CVE-2024-33xx/CVE-2024-3375.json) (`2024-04-29T09:15:09.017`) ### CVEs modified in the last Commit -Recently modified CVEs: `2` +Recently modified CVEs: `7` -- [CVE-2024-1023](CVE-2024/CVE-2024-10xx/CVE-2024-1023.json) (`2024-04-29T07:15:06.233`) -- [CVE-2024-1300](CVE-2024/CVE-2024-13xx/CVE-2024-1300.json) (`2024-04-29T07:15:06.423`) +- [CVE-2021-36821](CVE-2021/CVE-2021-368xx/CVE-2021-36821.json) (`2024-04-29T09:15:06.850`) +- [CVE-2021-36823](CVE-2021/CVE-2021-368xx/CVE-2021-36823.json) (`2024-04-29T09:15:07.020`) +- [CVE-2023-37998](CVE-2023/CVE-2023-379xx/CVE-2023-37998.json) (`2024-04-29T09:15:07.163`) +- [CVE-2023-41728](CVE-2023/CVE-2023-417xx/CVE-2023-41728.json) (`2024-04-29T09:15:07.277`) +- [CVE-2024-27956](CVE-2024/CVE-2024-279xx/CVE-2024-27956.json) (`2024-04-29T09:15:07.387`) +- [CVE-2024-32109](CVE-2024/CVE-2024-321xx/CVE-2024-32109.json) (`2024-04-29T09:15:07.707`) +- [CVE-2024-32129](CVE-2024/CVE-2024-321xx/CVE-2024-32129.json) (`2024-04-29T09:15:07.803`) ## Download and Usage diff --git a/_state.csv b/_state.csv index ce3cead89e8..33d7025c15e 100644 --- a/_state.csv +++ b/_state.csv @@ -179206,8 +179206,8 @@ CVE-2021-36818,0,0,2033cd4988573d21f25ce8babf37194bb98983bd21b883fa66e8587ed3b5d CVE-2021-36819,0,0,21dec9b0b146d489f3ee23dd8879ad8572069279acd9be25b86f3906e832f059,2023-11-07T03:36:50.893000 CVE-2021-3682,0,0,0f8e570c4f9966e0dfc70ace2ee43e3192608b4365180d452215f9eea36a5d5a,2023-03-31T18:26:51.630000 CVE-2021-36820,0,0,c6a4937e7063cb9ab4b264d0478673f6d51d9032791dbd93389c0b268f395049,2023-11-07T03:36:51.130000 -CVE-2021-36821,0,0,61d58f36327d01044e65fbad1a3aef08f2ff4862546a68ba812efd5ed02b3928,2023-11-07T03:36:51.373000 -CVE-2021-36823,0,0,9008ea2710ab1328fd307f8a5d98e3a5df66b9e7d4e7d6c6d091b79989e96320,2023-11-07T03:36:51.463000 +CVE-2021-36821,0,1,5143e6cad35fa9a0f4029a8643b85a408f5d31fec8532aa4f1704d78dd733bcf,2024-04-29T09:15:06.850000 +CVE-2021-36823,0,1,8cbcf9733cf1ed187f61116d89b52e148d59203005cad4a257f2215db428a4a0,2024-04-29T09:15:07.020000 CVE-2021-36826,0,0,08d3d74590139e3fb6d5829346559d76245d5ea576a3299c7ae0afa05861256b,2023-11-07T03:36:51.557000 CVE-2021-36827,0,0,c41dd6b48f6c916c91266a4cc3382d8af6038eefef9c1739e93482528ed892d5,2023-11-07T03:36:51.653000 CVE-2021-36828,0,0,63e193c12dcccf2cf5162cb230c3af11b82709a825557d9ed13a73b18760ff72,2023-10-12T12:15:09.920000 @@ -227142,7 +227142,7 @@ CVE-2023-37994,0,0,145c46abd9a225a566f9e609d241a77007bf221aa4f45667049dff5ef2012 CVE-2023-37995,0,0,d2997272909836e557b3f86dfeec338712dbc866fa0d494a8e9dcdd88f6a8006,2023-10-05T17:04:25.617000 CVE-2023-37996,0,0,e3a09fdcf2e5a94ed2ba35ff3097a80c48c320097f9c91ee2fe29ed9d48ed7e7,2023-10-04T17:13:22.887000 CVE-2023-37997,0,0,634a8f00a3a7cefaea8286574903fd4dd9cef7262779039b9494ebb47f14c6b7,2023-09-07T13:05:27.313000 -CVE-2023-37998,0,0,1e32225316349b19ac5d99a727f7ef3fdaabd14e9071142212ce28f8a95ba748,2023-10-04T19:54:12.660000 +CVE-2023-37998,0,1,1747e4f0f6ddf4d50fd6cbdf2ef7e31b2a7283ba267cf7dde73ae9cd8c8e621a,2024-04-29T09:15:07.163000 CVE-2023-3800,0,0,774d32c7b5fb881d1d40e6872ba5eec3309f4fee64d58b63dc188b5cb5069530,2024-04-11T01:21:23.090000 CVE-2023-38000,0,0,0e0c6bbc8458c85090972cb27733399c7be344be574c892a61848bb47624d50a,2023-10-16T17:04:06.637000 CVE-2023-38003,0,0,1818608b52e574766674a96fd387dab05b406afb5af9478c08cafc61d6b9b561,2024-01-19T16:15:09.013000 @@ -229810,7 +229810,7 @@ CVE-2023-41724,0,0,52a7ac367ea3adaef0da452d1f9fcfe8e474049192390ddce1cdad2f409b3 CVE-2023-41725,0,0,ef65a845340b2e5995978b7ff227127be0d8e07ed7a8d62bd421fd7106110973,2023-11-09T20:48:01.590000 CVE-2023-41726,0,0,fb669107c42200a4419d1537040429448894a928afcfa430fdee2f48dca99d87,2023-11-09T20:47:03.140000 CVE-2023-41727,0,0,1aea9ec78204883dbfc26cfb24b18446bca80c0abe98ce4d6d9d69448220db2e,2023-12-21T04:48:25.067000 -CVE-2023-41728,0,0,412eb06c20bf3866dfa57a11d0ee087de3e3eff171a28895f60b7d9e0cc862d2,2023-10-03T20:55:45.703000 +CVE-2023-41728,0,1,7a0742b27b0ade05defe664bcd5a99072ff0d518cd86f979b9cb64aefdbdc469,2024-04-29T09:15:07.277000 CVE-2023-41729,0,0,5df9823fffd4661ec50c1f97a1351b1d8951df4a280dd104e71fe164a121673d,2023-10-03T20:55:37.293000 CVE-2023-4173,0,0,4da8873068b249eb68d85abdc6a2b4432dbfdb20685e151dced0645fbf06d4cc,2024-04-11T01:22:22.807000 CVE-2023-41730,0,0,a5d777a2d4ed8b6bbf02038800ba1cae8428175b6bdde086d65deb9402e1c86d,2023-10-11T20:51:55.970000 @@ -236717,7 +236717,7 @@ CVE-2023-52716,0,0,fac095701883d01d5f92e56c70701dc066b3ae8f92d0c5921c5cf0aa2fbb0 CVE-2023-52717,0,0,e713315d9fcc50e6cbb98e0dd380e2c86ba52b63a35d352b23f2645ee0f83a24,2024-04-08T18:48:40.217000 CVE-2023-5272,0,0,e188ff056a72e73c412c109b97d5eb37c41b2dbce71d285e9dfeb205fc3a7064,2024-04-11T01:22:56.733000 CVE-2023-52722,0,0,58a4dacfed06269af66d591e2c90392281dec137a91dd3653eb193059da1f3b7,2024-04-28T00:15:07.270000 -CVE-2023-52723,1,1,d4be2feca33226ddfe4838f7958d61e46f837250fa1c183dc1e9ed285ea7ec65,2024-04-29T06:15:06.983000 +CVE-2023-52723,0,0,d4be2feca33226ddfe4838f7958d61e46f837250fa1c183dc1e9ed285ea7ec65,2024-04-29T06:15:06.983000 CVE-2023-5273,0,0,6f05c674078315237abe3d7b2ebcc88fea13416a5c7e4aafdfcff23a1ae8a322,2024-04-11T01:22:56.817000 CVE-2023-5274,0,0,230ef4c0e160801f289163632d814f7177c2b1395a715b72f33c8d0b5d876249,2023-12-05T18:20:39.937000 CVE-2023-5275,0,0,9a81436027e8dad0b67eefc484a675cc6dfdf47ffb7247993749a2124145a13c,2023-12-05T18:18:37.050000 @@ -239233,7 +239233,7 @@ CVE-2024-1019,0,0,27c6fed97db80e9684966512d657c2ae1b8d86be0f46f2f894fd714e51d0d5 CVE-2024-1020,0,0,adc5ab5f2da8e36fe7b7aa7c315c830611f48798a94b22d42b050e3e9e630362,2024-04-11T01:24:18.170000 CVE-2024-1021,0,0,7bcf34eb76307cde4ae64d588874bf57854c5c64505f94e3349469a346a9c6cb,2024-04-11T01:24:18.257000 CVE-2024-1022,0,0,357efb4939784b3bedb659f15a28d0e47d08529e441db0e0be00cbc23a0198b9,2024-04-11T01:24:18.350000 -CVE-2024-1023,0,1,f385656c92a71370efff252bd7c129136dc520292043427aaca7a2375a03c816,2024-04-29T07:15:06.233000 +CVE-2024-1023,0,0,f385656c92a71370efff252bd7c129136dc520292043427aaca7a2375a03c816,2024-04-29T07:15:06.233000 CVE-2024-1024,0,0,85149b221a8921f7ffbd9c6aa85a2dfcc208fc0fbfab7fd4f41d63975d68c1d5,2024-04-11T01:24:18.463000 CVE-2024-1026,0,0,ce9d6ecfc0c397ada0ff1130145169bc08739645437cccf4be1ae651761bfb1b,2024-04-11T01:24:18.550000 CVE-2024-1027,0,0,ee916bdd4519e7da0384e34a5415b2bb4d3bac5a3382b229877ac74923e86538,2024-04-11T01:24:18.637000 @@ -239468,7 +239468,7 @@ CVE-2024-1294,0,0,1a6fde55ee17952393d258a28e1938bfe41cafec05fa305cc82057814b7c2b CVE-2024-1296,0,0,ab648d9dba58ca530bb990b50d92c4f5ce9f591faa8fbeeb49385095b8425c33,2024-03-13T18:16:18.563000 CVE-2024-1297,0,0,1fc219bb038ab422185a999365115aff94759fe3e5ff94e3dc4180f1d6bc82d0,2024-02-20T19:50:53.960000 CVE-2024-1299,0,0,165a6e5bf7396c9871edb84a6ce28d3386b33fd34eb9238065e890fa150a178a,2024-03-07T13:52:27.110000 -CVE-2024-1300,0,1,0d670db12603e944dcc15b5481ece919335822514a418179c496d8822134bd6f,2024-04-29T07:15:06.423000 +CVE-2024-1300,0,0,0d670db12603e944dcc15b5481ece919335822514a418179c496d8822134bd6f,2024-04-29T07:15:06.423000 CVE-2024-1301,0,0,68d5e322fab21220735382791ea9287e8104e954fa5bc7b1f8f02021f25e280b,2024-03-12T17:46:17.273000 CVE-2024-1302,0,0,e42b35f7a02693024fada8fec8e812444e0bb721c54c537bf6c1b8db8c60ce66,2024-03-12T17:46:17.273000 CVE-2024-1303,0,0,d6386ac67e1b3bd9c657849a1747229ab86034b9c989d20fb5cde0be8bba0359,2024-03-12T17:46:17.273000 @@ -239938,7 +239938,7 @@ CVE-2024-1900,0,0,df3a7e0d7f662e0642af797e67801f5b993e667e914107fd3f604cd2322f2a CVE-2024-1901,0,0,e852d825cede13009c4c827235fab136069de3983ba4df012d62632a4fcd1d38,2024-03-06T15:18:08.093000 CVE-2024-1902,0,0,012f8c6561b23779499ee60e1b0701a7ed975d80b89eade3a28f94f4708254ec,2024-04-15T18:15:10.070000 CVE-2024-1904,0,0,894e214d09f8efe1b9b69452204531788406056d1489422306bbd393d57cb47d,2024-04-10T13:23:38.787000 -CVE-2024-1905,1,1,99fc2a264209d40d17540b1f82384a2b60d6e4fdfef05f9a479a7d2dc908eb8d,2024-04-29T06:15:07.650000 +CVE-2024-1905,0,0,99fc2a264209d40d17540b1f82384a2b60d6e4fdfef05f9a479a7d2dc908eb8d,2024-04-29T06:15:07.650000 CVE-2024-1906,0,0,4a0389164694374915846934d3ecd021a9b146d80ff266286dcad5a6eeb2c849,2024-02-27T14:19:41.650000 CVE-2024-1907,0,0,674a8f990612fbd789e8b29e4f4db555efa2966321d7535d44b4ff9d82432ec5,2024-02-27T14:19:41.650000 CVE-2024-1908,0,0,92bf17210112d2d60d7d442f37608315d845944e26306753d826ae8aa1a4dd43,2024-03-21T12:58:51.093000 @@ -242601,7 +242601,7 @@ CVE-2024-25030,0,0,fc3de3fd573e21787e1c0bdd960fb3a4c590b360d40ba7c7d9e34380b9c90 CVE-2024-2504,0,0,b952b345d554f248180cfc37dd33de3d29aef92bb40f82f2454b4ee2e2c1523d,2024-04-10T13:23:38.787000 CVE-2024-25046,0,0,64b67efbc5b2947bdef146aee983b6003b7daa23659b2bfe93519b90947330ac,2024-04-03T17:24:18.150000 CVE-2024-25048,0,0,f98b5f829311c9c9a726d02cd66b8a93a4755ae4aa235bf4cd2af7701d9667d0,2024-04-27T12:15:10.517000 -CVE-2024-2505,1,1,52f7b4fb73939784ef566f22fc7864f65f01228d17a754b7b6510c54c8095deb,2024-04-29T06:15:07.937000 +CVE-2024-2505,0,0,52f7b4fb73939784ef566f22fc7864f65f01228d17a754b7b6510c54c8095deb,2024-04-29T06:15:07.937000 CVE-2024-25050,0,0,1ff20d693c75735252bb078c1b9df844137fdb7eca3fe844e495a58addd9c2a1,2024-04-28T13:15:08.257000 CVE-2024-25062,0,0,9596ed5cf07a8bc8469d4afc28fc727a431af7cff3b6b8e84435c301d9955756,2024-02-13T00:40:40.503000 CVE-2024-25063,0,0,ada8a3e76748f7f6ba8d6378c081423ac8f962f095964d00e876ad6b7009736e,2024-03-04T22:45:02.117000 @@ -244203,7 +244203,7 @@ CVE-2024-27950,0,0,56d632dad56c45d949d3327de16e5b70b08683cea8ce7876ca8c59cc37ee8 CVE-2024-27951,0,0,fb648e7b48d01c386d90ab877e0e6e5ad9ac54d7f9cf31355978050c72eaffef,2024-04-03T12:38:04.840000 CVE-2024-27952,0,0,fe624616809d2b08e76659d4d30a802797c8b1dea609a0360dcd8752b7d9cac9,2024-03-13T18:15:58.530000 CVE-2024-27953,0,0,2a6d5a1801b407ff03c3610ff9d51f6689bbe6434fd00573a417d8c900d7386a,2024-03-13T18:15:58.530000 -CVE-2024-27956,0,0,f490f7ec3bd48189a1ef57af88670e81296dde010b86c5edf00de693d7370df0,2024-03-21T19:47:03.943000 +CVE-2024-27956,0,1,194fe594f0f82199e60d61684a1f7c8db8c04bdf57c93a45e71af1bb25f7851a,2024-04-29T09:15:07.387000 CVE-2024-27957,0,0,3bb51417dd78fa81cd8d3e079ab9ae6ed1b9709468847cb623b9c9568eef40f4,2024-03-17T22:38:29.433000 CVE-2024-27958,0,0,3c69427bef710d3f7bb781ce81b405984dd58d08367be619f590c223ad730fd4,2024-03-17T22:38:29.433000 CVE-2024-27959,0,0,b6158d09fbe57e466eaa147e639a460dd447ef6efe99a61800919c1426ccc29c,2024-03-17T22:38:29.433000 @@ -244706,6 +244706,7 @@ CVE-2024-28951,0,0,c59d22693a6783914cb02db5be2e1a6f5b0c6277d54a6ec5614d046ef86ff CVE-2024-28957,0,0,a169098a05ac68c39610a9d0c21c80f908b4c73fb6ad140d0292417789484670,2024-04-15T13:15:31.997000 CVE-2024-2896,0,0,5de59d7245da47f589f3ef8b760f3f6474bf3327cc8f382548cfd383506a8e1b,2024-04-11T01:25:40.217000 CVE-2024-28960,0,0,e8dbeb1ca04aba553db6ad0a923d45f708fa651bef11fd340f54cf32195f3cfb,2024-04-19T23:15:10.657000 +CVE-2024-28961,1,1,bca106ae9d03a30b3071a716b43bd6a4eee060236e9367c779bc0c8b76366875,2024-04-29T09:15:07.477000 CVE-2024-28963,0,0,c5c3b185efea606aed4d9595c8d313f3f2c0068b841b7e1d435fe02dbde99f32,2024-04-24T13:39:42.883000 CVE-2024-2897,0,0,845f7ba04cd28c84698eb0ec67ce51aa02df2e982261e886754cbe95c0546759,2024-04-11T01:25:40.303000 CVE-2024-28976,0,0,224761c00a34a63d518e2df17d9e4e0dcdf6133206e4a1c859d89e6d8634ce80,2024-04-24T13:39:42.883000 @@ -246088,8 +246089,8 @@ CVE-2024-31873,0,0,30397559953deb34a9ae192149473632dc6b2334245e920787a4c5e14fc76 CVE-2024-31874,0,0,1770e58d0ae5591eb931a8cdfdb054fb4d854f81849d14af250c71db6caf553c,2024-04-10T19:49:51.183000 CVE-2024-3188,0,0,5d70d4884e37e1862c5503e8662fdd8be316d1df7ecad77f44114699c1426b8a,2024-04-26T12:58:17.720000 CVE-2024-31887,0,0,e951c215b0e12b882bcc7244c98d7631ee4f4b7a3271b5f24e369f1a635cd3e5,2024-04-17T12:48:07.510000 -CVE-2024-3191,1,1,909de57a0e1134c017815b99f5374905a7cebaa6da948da4a489799e7c96ecfa,2024-04-29T07:15:07.080000 -CVE-2024-3192,1,1,725dda67edbc96beb58e8c0c2444a458c6950abc195edff7ad4f85d511813766,2024-04-29T07:15:07.480000 +CVE-2024-3191,0,0,909de57a0e1134c017815b99f5374905a7cebaa6da948da4a489799e7c96ecfa,2024-04-29T07:15:07.080000 +CVE-2024-3192,0,0,725dda67edbc96beb58e8c0c2444a458c6950abc195edff7ad4f85d511813766,2024-04-29T07:15:07.480000 CVE-2024-31920,0,0,3c0045dbbecad7d78d5b9eb044589c2fc290e421e2d5accb9391890092efc90f,2024-04-15T13:15:31.997000 CVE-2024-31921,0,0,732b3dfcff7f3c38928ece374bd7708cd93eb00a4dc0a7d5ac8e2f115b9d7217,2024-04-15T13:15:31.997000 CVE-2024-31922,0,0,ab7058b1ab970c1607707e3b516fb20a2b1bb9e11ac7a3e1d4bef18b1ec4d6b7,2024-04-15T13:15:31.997000 @@ -246100,7 +246101,7 @@ CVE-2024-31926,0,0,5ea07bd781aaf165e7c249d84898bbaee298d70cc8e541e3b74d17ae8e2ec CVE-2024-31927,0,0,6cd17f97d47f2415c03c97ad66e9324a16977292b8eb97b821aae9ba7a0f2833,2024-04-11T13:30:38 CVE-2024-31928,0,0,e6cc120c3629d81f3db9dcadc93c459e7b269490e6128fcc8be3997c3ef595e9,2024-04-11T13:30:38 CVE-2024-31929,0,0,5359df4522faa8d2c46f605d48868a6939d06d35e038e5f3287851d0461688a3,2024-04-11T13:30:38 -CVE-2024-3193,1,1,ea73d12bc10265a58216dce72c432ee965205457c358de1f1b4800cf51e18cca,2024-04-29T07:15:07.773000 +CVE-2024-3193,0,0,ea73d12bc10265a58216dce72c432ee965205457c358de1f1b4800cf51e18cca,2024-04-29T07:15:07.773000 CVE-2024-31930,0,0,628cb0e5103582aeccc9f3e33331b9dbe7dba70b3951389bc2f9327ad3b8f5ee,2024-04-11T13:30:38 CVE-2024-31931,0,0,31bc6de522002d5fbdfc52e575ea088ef3d3fde1fc3f2ee4856692982b9dc2cf,2024-04-11T13:30:38 CVE-2024-31932,0,0,cbdc79dc2f64dd5bef9877c31b5d39549faf66977f5313958012ec22e616327c,2024-04-11T13:30:38 @@ -246111,7 +246112,7 @@ CVE-2024-31936,0,0,41ae8d4679677e086c385533d0a63055153ebb271d32fb7547401292a6a57 CVE-2024-31937,0,0,24fb14fc8c636ca322e17128cc4ef69cbdba60a9f579b74e55aed300a2f73ed6,2024-04-11T13:30:38 CVE-2024-31938,0,0,5f3f05f61d1ef2cd5bad53d9f5667002cb10342b194111eed40f5ded72653f03,2024-04-15T13:15:31.997000 CVE-2024-31939,0,0,dc9cc0dfd8ae0f6c4caa1a4775b1cc86559b00f81c6408b5f2a51c57007b5d9e,2024-04-11T12:47:44.137000 -CVE-2024-3194,1,1,d329211d83b0115ad0b19eeb5be2a89ccbb6bafb933feb45b5e8a49d955922d1,2024-04-29T07:15:08.070000 +CVE-2024-3194,0,0,d329211d83b0115ad0b19eeb5be2a89ccbb6bafb933feb45b5e8a49d955922d1,2024-04-29T07:15:08.070000 CVE-2024-31940,0,0,1ddf48c04277bac2492208785102f32503356b7d59b7891c524b2c22b8846edb,2024-04-15T13:15:31.997000 CVE-2024-31941,0,0,b8dc065fda42126e32d28a44ef547549a83996a827e764074359d3e3ec8c1e09,2024-04-15T13:15:31.997000 CVE-2024-31942,0,0,ceae4b513a0b6e905236b05cb5dd98d07a79c0420729857e9c51c87c35b65b17,2024-04-15T13:15:31.997000 @@ -246119,10 +246120,10 @@ CVE-2024-31943,0,0,d050ed16bd2fd56e0b74cc5712c1eb7ef94538d6cfa9c00022a6cfa048bd2 CVE-2024-31944,0,0,d1cf01bee95ac2d1b4f198f30f665ce7f3dae041b6378dd5d37f86b95341e18f,2024-04-10T19:49:51.183000 CVE-2024-31948,0,0,61f6d35222c1e3f11e25e4eb10990c24f6ea2b07724ec51b46fb0ba4b709b0cc,2024-04-28T07:15:08.843000 CVE-2024-31949,0,0,d55253e38f8bc425df8f875d525d4d6b96cb3180b7d665ec7de9778e227e2105,2024-04-28T07:15:08.917000 -CVE-2024-3195,1,1,6d60776e21ae5e9a12630c8927b26ba77fa690068c68c10ca942d3c06a3f5897,2024-04-29T07:15:08.400000 +CVE-2024-3195,0,0,6d60776e21ae5e9a12630c8927b26ba77fa690068c68c10ca942d3c06a3f5897,2024-04-29T07:15:08.400000 CVE-2024-31950,0,0,6cefb0ca8246a802eee33ecaeabf30a3794c53c92173f69e19945e3bf38104d7,2024-04-08T18:48:40.217000 CVE-2024-31951,0,0,a02cb6e83819b8aefe87f14fcbaf10a3986c9b6174676e08f67eb54fe256f190,2024-04-08T18:48:40.217000 -CVE-2024-3196,1,1,ddedfe5cfa69a5a0e563bb0daac4e7b058b56096294d5609b3943dc244d20005,2024-04-29T07:15:08.740000 +CVE-2024-3196,0,0,ddedfe5cfa69a5a0e563bb0daac4e7b058b56096294d5609b3943dc244d20005,2024-04-29T07:15:08.740000 CVE-2024-31978,0,0,905fe24a9cf546b211ed3cfae7258dc772856eb0550beb1f55c95bc3799601d2,2024-04-09T12:48:04.090000 CVE-2024-31981,0,0,6b90fc014c719d42bc6275e095b2e18dc9d544859b6ab5a3b554ecb5ab03a845,2024-04-11T12:47:44.137000 CVE-2024-31982,0,0,8e15c1dad7e15762a1fbb5bb26c4de9afb40b54c1e4ad12ab123edd90435cd54,2024-04-11T12:47:44.137000 @@ -246198,14 +246199,14 @@ CVE-2024-32105,0,0,14f3c307fe159fa2b4817fc42bb4e5becf74df81f12e854ac688d637ee1e6 CVE-2024-32106,0,0,2e3f5a57bd781bd3a30c937e8aa33ba1f212672a8df9850b791a63471fb05d63,2024-04-11T13:30:38 CVE-2024-32107,0,0,b90c8135a82473fde7e5bf44c3c1cf9d7846ba95270115659d7d68306d87ca81,2024-04-11T13:30:38 CVE-2024-32108,0,0,950a29a68ef37c40439ae0dcf3c3d4b039242eaece664c349c7d4089e193ee6e,2024-04-11T13:30:38 -CVE-2024-32109,0,0,e0a4e8c5f217571de21e69ff68b322f2becdcc662ae51f8c1b5dcaad24451a40,2024-04-11T13:30:38 +CVE-2024-32109,0,1,4ab4248625b2b88c43ecf2bed644e80e80c54bafb94ddc41cebae0bbd84f78ff,2024-04-29T09:15:07.707000 CVE-2024-3211,0,0,d6d8ef851a76d01f08b13c4c6093534cf0125e4133f007b8f3a299cb3bb38192,2024-04-12T12:43:46.210000 CVE-2024-32112,0,0,2df62c2ad1478d07a612eff17f984ad78c51d3b47027012c1c38076227812cd3,2024-04-11T12:47:44.137000 CVE-2024-32125,0,0,df49ac279a5dab5894d2cf46d4df920e793fb77c32b1360bd4eb9ce6cc4c2bcb,2024-04-15T13:15:31.997000 CVE-2024-32126,0,0,03bbe2b7a7bd325cdda583bb7823f2b70916aad3961fcbd3bac07e945035870f,2024-04-18T13:04:28.900000 CVE-2024-32127,0,0,57252810e1702be160161ac7dc44c20062237ffc3e0f3ad79884c0b06ee5b822,2024-04-15T13:15:31.997000 CVE-2024-32128,0,0,cb935dc8078553e54335e879bd7502243cd9a625b79c1c1dfceb4bfba45b9de1,2024-04-15T13:15:31.997000 -CVE-2024-32129,0,0,7dc12cce8517a17cd70ddfa746950a5eac6137ebf8d213b92102ec061182c7b6,2024-04-15T13:15:31.997000 +CVE-2024-32129,0,1,836d2bd4732456c79c79f4c8efead95083abe0bdcddc45563d15237fa265590b,2024-04-29T09:15:07.803000 CVE-2024-3213,0,0,ea3f20ff836368484318fafaf2de028dfc4fe493b01551892e8e53b852a2d76e,2024-04-10T13:23:38.787000 CVE-2024-32130,0,0,c3815df651bee8fabb39b6ee1601a12e78be3e64615a56410b03d7d3217c5c2f,2024-04-17T12:48:07.510000 CVE-2024-32132,0,0,b8f2c67a5eb9317d71844e548f7098002fd937824ef3f3cc031dff8cdf6f8053,2024-04-15T13:15:31.997000 @@ -246637,38 +246638,53 @@ CVE-2024-3351,0,0,4e83ab506e7228a3886d0c35bd4699b3cc13e079b52b9390280e70733aeb1d CVE-2024-3352,0,0,2bb858a13268847c6f0639e9c58251e5b0608c0fcc2f637338ed79183e654688,2024-04-11T01:25:59.117000 CVE-2024-3353,0,0,a43304c0c957cee30ec6a0fe5705b568475f27f66d5199c2166f449cd8eb908f,2024-04-11T01:25:59.200000 CVE-2024-33531,0,0,71e7e7c369e07333ae7410b9238493e0b8e5a70255296aafd8bfae114b6e76d5,2024-04-24T13:39:42.883000 -CVE-2024-33537,1,1,1abcca94500cff61689bc299259daf6c77965db351f4065549770837c6336670,2024-04-29T06:15:08.083000 -CVE-2024-33539,1,1,8f41542e5f77851d2f4faa8d70582127978bd07484561d364c44db3eb5ca61fd,2024-04-29T06:15:08.930000 +CVE-2024-33537,0,0,1abcca94500cff61689bc299259daf6c77965db351f4065549770837c6336670,2024-04-29T06:15:08.083000 +CVE-2024-33538,1,1,2c1e0d3b7f9f337908146a436e9747f359f4444ae266b9d82b0a3ad465ad1d36,2024-04-29T08:15:06.383000 +CVE-2024-33539,0,0,8f41542e5f77851d2f4faa8d70582127978bd07484561d364c44db3eb5ca61fd,2024-04-29T06:15:08.930000 CVE-2024-3354,0,0,4a4ea1b685e77f1329c6119be3c557bd8627ab8e6e7bcdf524dde072c4485f2b,2024-04-11T01:25:59.280000 -CVE-2024-33540,1,1,747a115e4ae2ca6e4d30057a4f7d7e64e2b02e1bc21f016e186f3ec5a7c4cbee,2024-04-29T06:15:09.637000 -CVE-2024-33542,1,1,c46844096e18c90d4389e00877bdc86b55250f44e249077d028e212eff872075,2024-04-29T06:15:10.220000 -CVE-2024-33544,1,1,1466a86d502d8d54ff1b9a60222a92956c868d95a390bd0d2b95b1d73fa6edf0,2024-04-29T07:15:06.543000 -CVE-2024-33546,1,1,3ef102e69d02cbc32fbb5297ea63418695ffc6bd67887340158d2086fadabd61,2024-04-29T07:15:06.810000 -CVE-2024-33548,1,1,f1884ac10132cc8231eb6aaac64ad6b1e7a3129e60b9c76432db676e6c17cc0b,2024-04-29T06:15:10.937000 +CVE-2024-33540,0,0,747a115e4ae2ca6e4d30057a4f7d7e64e2b02e1bc21f016e186f3ec5a7c4cbee,2024-04-29T06:15:09.637000 +CVE-2024-33542,0,0,c46844096e18c90d4389e00877bdc86b55250f44e249077d028e212eff872075,2024-04-29T06:15:10.220000 +CVE-2024-33544,0,0,1466a86d502d8d54ff1b9a60222a92956c868d95a390bd0d2b95b1d73fa6edf0,2024-04-29T07:15:06.543000 +CVE-2024-33546,0,0,3ef102e69d02cbc32fbb5297ea63418695ffc6bd67887340158d2086fadabd61,2024-04-29T07:15:06.810000 +CVE-2024-33548,0,0,f1884ac10132cc8231eb6aaac64ad6b1e7a3129e60b9c76432db676e6c17cc0b,2024-04-29T06:15:10.937000 CVE-2024-3355,0,0,1992313db0de37cd343f2e0c4d60ca5be53ec7c18d85010c791b43a1a0033536,2024-04-11T01:25:59.360000 -CVE-2024-33551,1,1,48cbe7358b0d6b0348a8420e63ce1222decf42609ef0aa9cdee85f45dc0831b8,2024-04-29T06:15:11.487000 -CVE-2024-33554,1,1,44f60587812c323490409e830f796cfbd35a235319f7237d253181849d9ed8df,2024-04-29T06:15:12.090000 -CVE-2024-33559,1,1,948fdd92ac3165b98a9a3e7d7bdf15d3f487bac4b7adfad2a4fb49bd7435a7e9,2024-04-29T06:15:12.607000 +CVE-2024-33551,0,0,48cbe7358b0d6b0348a8420e63ce1222decf42609ef0aa9cdee85f45dc0831b8,2024-04-29T06:15:11.487000 +CVE-2024-33553,1,1,58c7a083e3fbc8457256ecd25a5cfe4812df86ca040239bf0e4438f4512e16fb,2024-04-29T08:15:06.603000 +CVE-2024-33554,0,0,44f60587812c323490409e830f796cfbd35a235319f7237d253181849d9ed8df,2024-04-29T06:15:12.090000 +CVE-2024-33558,1,1,5029ca8f3a7bf223327e10c6a6ec6d6546659ad2ec7630fc2ce0a4310b50be3e,2024-04-29T09:15:07.890000 +CVE-2024-33559,0,0,948fdd92ac3165b98a9a3e7d7bdf15d3f487bac4b7adfad2a4fb49bd7435a7e9,2024-04-29T06:15:12.607000 CVE-2024-3356,0,0,087254ad27ba51e796f585bd19b7860bdf92d5d8812be46839c2000c6ff7ec4e,2024-04-11T01:25:59.443000 -CVE-2024-33562,1,1,ba9f8f690ca4d53bf11bc838f8b9a916ae70cc6d375248da36a8a28d84f314fd,2024-04-29T06:15:13.163000 +CVE-2024-33562,0,0,ba9f8f690ca4d53bf11bc838f8b9a916ae70cc6d375248da36a8a28d84f314fd,2024-04-29T06:15:13.163000 +CVE-2024-33566,1,1,f351fdb0905c12001d59ba086a0e050db3a855534570f5f484c67c74322726ad,2024-04-29T08:15:06.803000 CVE-2024-3357,0,0,4504c33b3bb653378795a255a83c05295c4cb93d37914e6c8a1edf8397686b85,2024-04-11T01:25:59.530000 -CVE-2024-33571,1,1,32fa1280ecb5787c1681505d41e97480c3bdfd2dc281b5a45dc4061c57561d00,2024-04-29T06:15:13.667000 +CVE-2024-33571,0,0,32fa1280ecb5787c1681505d41e97480c3bdfd2dc281b5a45dc4061c57561d00,2024-04-29T06:15:13.667000 +CVE-2024-33575,1,1,8a6bf9849cfd0c7120251b3216db90d4f144aeb07869d1cd1863ab78ad1f77a6,2024-04-29T08:15:06.987000 CVE-2024-3358,0,0,694a0960c89fb254bc37c7c2f594e5cb197e9c3b955cd9433f44c414aff75d2b,2024-04-11T01:25:59.610000 +CVE-2024-33584,1,1,39d0b5b446b0f295919190ab8bffd1407daf4c41e0b5ed410bbb4e880d676836,2024-04-29T08:15:07.170000 CVE-2024-3359,0,0,a779b2e33399e3789113d39f065b1425ad824801b217abc54417c2cce7e7d2db,2024-04-11T01:25:59.687000 CVE-2024-33592,0,0,db5c0b056d9b2b7db6cca903286bba2d07a26aaa9035eb96ef4301de432670e3,2024-04-25T17:25:05.903000 +CVE-2024-33596,1,1,59d33578c03d9dd8ac1b12b8c12643b60a50f1912263f798db68827f617e9fd5,2024-04-29T09:15:08.080000 +CVE-2024-33597,1,1,09b0dc0dcae761c513b39db2acacd77654acadc7386cfd702498cf05f993342e,2024-04-29T09:15:08.270000 CVE-2024-33598,0,0,951d122bd41cb7218bd6ac7f6b225f4876d714fab2f67658757b81f4282e18e0,2024-04-26T12:58:17.720000 CVE-2024-3360,0,0,2ffbaa301c04a2d62013f221bb69a21a0f4034a97959f93c6ac130d96a9162d3,2024-04-11T01:25:59.770000 CVE-2024-3361,0,0,c120caf4947180a69c26140d9354a0af916b072bcc15573944dc923bbf223f7d,2024-04-11T01:25:59.847000 CVE-2024-3362,0,0,4f698660b915c64322658e8738d0fb3f09460cf98fd487b3189e8f9d96e2b2c1,2024-04-11T01:25:59.930000 +CVE-2024-33627,1,1,6bd293ec393a12757f348a08df0a807d274a93e48d6a424cd8ed2e1993e9af24,2024-04-29T08:15:07.367000 +CVE-2024-33629,1,1,7451df54ae983be1843ec70db21b668071acfab04684129da17a41f9e4f5a70f,2024-04-29T08:15:07.640000 CVE-2024-3363,0,0,f5bcc8af5a66d22a73abe7e86b636154362f284983c790b03385b20aa4737ceb,2024-04-11T01:26:00.010000 -CVE-2024-33630,1,1,d429997353148ad4f03de5fcc4c3beaa034ad03ad4bb2b1118cf25cea4d32b29,2024-04-29T06:15:14.450000 -CVE-2024-33631,1,1,c9134f1e88711f8a04a135872712a121867f709063e57f4fb1d965c1ed67f734,2024-04-29T06:15:14.940000 -CVE-2024-33632,1,1,f4f40947da0388a7ccb639f255eb9d8f044af737b4c70d0121643974544be28d,2024-04-29T06:15:15.537000 +CVE-2024-33630,0,0,d429997353148ad4f03de5fcc4c3beaa034ad03ad4bb2b1118cf25cea4d32b29,2024-04-29T06:15:14.450000 +CVE-2024-33631,0,0,c9134f1e88711f8a04a135872712a121867f709063e57f4fb1d965c1ed67f734,2024-04-29T06:15:14.940000 +CVE-2024-33632,0,0,f4f40947da0388a7ccb639f255eb9d8f044af737b4c70d0121643974544be28d,2024-04-29T06:15:15.537000 CVE-2024-33633,0,0,14ae8b34b1aba55606c0bcadc7809f885230f727e35d21246f86a6c94ca95b9f,2024-04-29T05:15:06.507000 +CVE-2024-33634,1,1,7c3d356780beb93432a0e8b51f643638872933a4cee73820a4c86a4470818a9b,2024-04-29T08:15:07.830000 +CVE-2024-33635,1,1,c95e29b9a1ad1d8dfb46c7dde2788e355ca94abf4e510c87e381e8c28a569823,2024-04-29T09:15:08.460000 +CVE-2024-33636,1,1,c5b178766ef408aa0a01f491826a34cda7a22147287653a27a481b3e6d345fd1,2024-04-29T09:15:08.640000 +CVE-2024-33637,1,1,e0f43624862cba671c8f707d69b8ea9ebc41776e51399eeb6e5319abd0b8c50d,2024-04-29T08:15:08.007000 CVE-2024-33638,0,0,3427361ab991422b101cc37f7607a376f6587ef09d6fc7a47e3613da65e0631b,2024-04-26T12:58:17.720000 CVE-2024-33639,0,0,c46b4523c8f0d554545e91766a68c1aa539c722a582823f8a257dc980bedbf11,2024-04-26T12:58:17.720000 CVE-2024-3364,0,0,2986dc00429f74e0e2572cb8153933c26e825f7eed092370bca7e4ac84ee4fdf,2024-04-11T01:26:00.090000 CVE-2024-33640,0,0,569f42cf53adfed99d6bea04072e40faa2e5188d736f2609872b6d759c9e31ac,2024-04-29T05:15:06.757000 +CVE-2024-33641,1,1,a4251f6ea07e08afbeb0bf2d03ec4e4c399ced810e586f0e722387b3653df811,2024-04-29T08:15:08.200000 CVE-2024-33642,0,0,7569707402e488c170fb19233ca774daa51c8f856e1cd5f3428c5b203d123531,2024-04-26T12:58:17.720000 CVE-2024-33643,0,0,0ff6c747729a96b60f6ad504f202ccec54992f8c5c6e4d4ffb32ec39b77ce94a,2024-04-29T05:15:06.960000 CVE-2024-33645,0,0,85d2eafbf303b88d1d1d02964653d2fa337d6e4277b033b67c0b7e23c7278b7a,2024-04-29T05:15:07.153000 @@ -246678,6 +246694,7 @@ CVE-2024-33649,0,0,76be47f9e9623693c2dc4f7dbd7700f237602a11cf08c5a162589622dee41 CVE-2024-3365,0,0,64a2e531185071bb7e6b7a9cf067546b0c6c5f700f703a6639ecd4e081a3dcb7,2024-04-11T01:26:00.170000 CVE-2024-33650,0,0,19d8d8a0b27cf4dde85e5f92d8bf04c572aaff417d777c3294978343c2e4f677,2024-04-26T12:58:17.720000 CVE-2024-33651,0,0,1cefad65f2bec7e29ec0f3af20b45cba9167a66152171d6da2043875d9e6dcf1,2024-04-26T12:58:17.720000 +CVE-2024-33652,1,1,bb7b23e1593a340c3c6db2f3594ba525e0f418b8d14449e6abdfdb58acdc7dfc,2024-04-29T08:15:08.383000 CVE-2024-3366,0,0,641beaaa3f9fd7d2de3006c0b03aadadafd130dcdab91419774c604b06cf9b30,2024-04-11T01:26:00.240000 CVE-2024-33661,0,0,335b3962b8b35021f7d1525fb53b5e1ed72d069375d3f8ee59966d5db4f26d91,2024-04-26T12:58:17.720000 CVE-2024-33663,0,0,ec8e93da37d2d2637b8f6a349ca26f3f71e8cd5e6cb10be23a57d50df0caa826,2024-04-26T12:58:17.720000 @@ -246696,10 +246713,11 @@ CVE-2024-33677,0,0,923eddda39cd03a5bb517e05a480a9596b3c6c82a0ed2f89c09750c19ea74 CVE-2024-33678,0,0,e29c82afa965b755a6e3188aace0a357ae40d5fe9b52b7f7177043f7792e9dd7,2024-04-26T12:58:17.720000 CVE-2024-33679,0,0,f84e540fe859a7afe5f4ff76589343075f3d0bdf8c9cff62c28aa7a3f40455e2,2024-04-26T12:58:17.720000 CVE-2024-33680,0,0,0b464bc2ce373b95fed587888415ba32213dd9ce01298ab4cd8f52af9d530aea,2024-04-26T12:58:17.720000 -CVE-2024-33681,1,1,548950ce0064cdd92a907d7ce32bf554f4a3c02c1609223f9d1197b4fd07d45c,2024-04-29T06:15:16.057000 +CVE-2024-33681,0,0,548950ce0064cdd92a907d7ce32bf554f4a3c02c1609223f9d1197b4fd07d45c,2024-04-29T06:15:16.057000 CVE-2024-33682,0,0,2077d9f86dbcd7afb58135718cb00b93d9684082b8213c0215eee7a02c222543,2024-04-26T12:58:17.720000 CVE-2024-33683,0,0,d7c4bf8bbdd8bd3ca6f26bbf7a4bf0688b7570f813369db65ed2d59e99a11ae9,2024-04-26T12:58:17.720000 -CVE-2024-33686,1,1,cb11bce9d4222859e78a22a350bf0fbd12a312d0c6cee087f3196d5cf87e6c79,2024-04-29T06:15:16.623000 +CVE-2024-33684,1,1,13115094fafe12c8a45609d682b3f7f12077f3ddd305c85974dca87e43b95406,2024-04-29T09:15:08.833000 +CVE-2024-33686,0,0,cb11bce9d4222859e78a22a350bf0fbd12a312d0c6cee087f3196d5cf87e6c79,2024-04-29T06:15:16.623000 CVE-2024-33688,0,0,15c623ea6d0e85e99afd20753787faa07eb45674316852700f3732b9713c4938,2024-04-26T15:32:22.523000 CVE-2024-33689,0,0,9a3d372175f3eea45d33e57473572a2b8c9a57d63f47cd918b323f42ce5db301,2024-04-26T15:32:22.523000 CVE-2024-3369,0,0,943fbc9826beb11428b980e60e48ec152ecf5fda97b5d1c26bb0e96c030079eb,2024-04-11T01:26:00.317000 @@ -246712,6 +246730,7 @@ CVE-2024-33695,0,0,1d926ddf5c81a389bb7d8e4855841dceb198002508750e6d1b49d88c03728 CVE-2024-33696,0,0,073bc1cd15f6e8f569b263e3a552dcd1544b7a88083033c38736ec61b1c19277,2024-04-26T15:32:22.523000 CVE-2024-33697,0,0,f1a322dee5ec8563df23e02e8d701179da9c0f74bc61aaadca8daa27bdd8a04b,2024-04-26T15:32:22.523000 CVE-2024-3371,0,0,a0481e14f6cfcb9b0215a88c87fda086117ad0add8d553a83f1550e7381c3170,2024-04-26T15:15:49.357000 +CVE-2024-3375,1,1,ce382d1eeef77887b1f05ea91dffb7654a2e9ab836368bbd657742b42f2551ed,2024-04-29T09:15:09.017000 CVE-2024-3376,0,0,f944ee3af49afac066405b13bcc14ad1a3aba304f57c015d653c31ce71a21bf1,2024-04-11T01:26:00.397000 CVE-2024-3377,0,0,4f5c5a9a0c925d4c25c7e7a8167aad399bf59289271bce69d10c801ec2848ece,2024-04-11T01:26:00.473000 CVE-2024-3378,0,0,4f86c276b9b6898b0be7d5e038b0b93861aa9bc2234c5fb397df84486317a3f0,2024-04-14T04:15:56.560000 @@ -246727,8 +246746,8 @@ CVE-2024-33883,0,0,3b17b48394bf62744fbd468bf457ba6f01138ca86f08a667646ea9846d188 CVE-2024-33891,0,0,4d067bbdb453306352bedaf699cdd4319a93f8f140e1ffcfce72980a6fa91b2e,2024-04-28T23:15:07.200000 CVE-2024-33899,0,0,83c5c675381e020685b43fd536d5112506568fc46560c71323f3b12b51ed8097,2024-04-29T00:15:07.773000 CVE-2024-33903,0,0,d96c3db96f0e438997e300c2112a3a0d050aa12880229d964d5b557d89ba9aa1,2024-04-29T01:15:09.600000 -CVE-2024-33904,1,1,f1065144aff1f3a07dac950b2bff4e0d7bebc724ec8bb15e6e11e7eef4705f37,2024-04-29T06:15:17.320000 -CVE-2024-33905,1,1,5f8214ca78ea0daa3bd7aaf864c15a416c36c5d929bc1d8c2eeecabcee92677e,2024-04-29T06:15:17.667000 +CVE-2024-33904,0,0,f1065144aff1f3a07dac950b2bff4e0d7bebc724ec8bb15e6e11e7eef4705f37,2024-04-29T06:15:17.320000 +CVE-2024-33905,0,0,5f8214ca78ea0daa3bd7aaf864c15a416c36c5d929bc1d8c2eeecabcee92677e,2024-04-29T06:15:17.667000 CVE-2024-3400,0,0,5bb68c1f741d7492d6e3e08b6f1711eb6e28a4a827bd2f3f354ccd1b7a47a1fe,2024-04-23T19:57:25.207000 CVE-2024-3413,0,0,7c0263f5aa26015f580f259b17ac76e3fb232807ce6eb6b3e0fa4a42d34def58,2024-04-11T01:26:00.727000 CVE-2024-3414,0,0,fcf8b2012e3dcab7048965e9d40e8c26f25a86217cc70e6c24a2ae712b119943,2024-04-11T01:26:00.803000 @@ -247062,5 +247081,5 @@ CVE-2024-4298,0,0,f9266dd2ad13ca247a2df7083a82f45a12f2423c014a4332f080e78d4a3074 CVE-2024-4299,0,0,6dce476fcec521482054b6b4839e21007c148c2a950959748caa8366570861ec,2024-04-29T04:15:08.623000 CVE-2024-4300,0,0,7a5406d5809ec914ba2d29d702f12271779019152ddc347a0ac4109f28246321,2024-04-29T04:15:08.887000 CVE-2024-4301,0,0,ac824d829df059c2e56cb3512d1d60cfb48e2f3b0d50bb1c7774c0330baa7e64,2024-04-29T04:15:09.110000 -CVE-2024-4302,1,1,974068c107cd4e505ac6377f0f4fb62ae26afdc69c450f8704f68a7f42518f2c,2024-04-29T06:15:17.803000 -CVE-2024-4303,1,1,269dace03dedf0bc843109dbe92c35792422f71f9659b58da62f3fe6d0141fa9,2024-04-29T06:15:18.457000 +CVE-2024-4302,0,0,974068c107cd4e505ac6377f0f4fb62ae26afdc69c450f8704f68a7f42518f2c,2024-04-29T06:15:17.803000 +CVE-2024-4303,0,0,269dace03dedf0bc843109dbe92c35792422f71f9659b58da62f3fe6d0141fa9,2024-04-29T06:15:18.457000