Auto-Update: 2024-04-29T10:00:38.038569+00:00

This commit is contained in:
cad-safe-bot 2024-04-29 10:03:28 +00:00
parent 2f6f999fcb
commit ce5a61dc8f
28 changed files with 1153 additions and 86 deletions

View File

@ -2,12 +2,12 @@
"id": "CVE-2021-36821",
"sourceIdentifier": "audit@patchstack.com",
"published": "2023-03-16T15:15:10.113",
"lastModified": "2023-11-07T03:36:51.373",
"lastModified": "2024-04-29T09:15:06.850",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "Unauth. Stored Cross-Site Scripting (XSS) vulnerability in WPMU DEV Forminator \u2013 Contact Form, Payment Form & Custom Form Builder plugin\u00a0<= 1.14.11 versions."
"value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in WPMU DEV Forminator \u2013 Contact Form, Payment Form & Custom Form Builder allows Stored XSS.This issue affects Forminator \u2013 Contact Form, Payment Form & Custom Form Builder: from n/a through 1.14.11.\n\n"
}
],
"metrics": {

View File

@ -2,12 +2,12 @@
"id": "CVE-2021-36823",
"sourceIdentifier": "audit@patchstack.com",
"published": "2021-09-23T17:15:12.080",
"lastModified": "2023-11-07T03:36:51.463",
"lastModified": "2024-04-29T09:15:07.020",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "Auth. Stored Cross-Site Scripting (XSS) vulnerability in WordPress Absolutely Glamorous Custom Admin plugin <= 6.8\u00a0versions.\n\n"
"value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Cusmin AGCA - Absolutely Glamorous Custom Admin (WordPress plugin) allows Stored XSS.This issue affects AGCA - Absolutely Glamorous Custom Admin (WordPress plugin): from n/a through 6.8.\n\n"
},
{
"lang": "es",

View File

@ -2,12 +2,12 @@
"id": "CVE-2023-37998",
"sourceIdentifier": "audit@patchstack.com",
"published": "2023-10-03T10:15:10.483",
"lastModified": "2023-10-04T19:54:12.660",
"vulnStatus": "Analyzed",
"lastModified": "2024-04-29T09:15:07.163",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "Cross-Site Request Forgery (CSRF) vulnerability in Saas Disabler plugin <=\u00a03.0.3 versions."
"value": "Cross-Site Request Forgery (CSRF) vulnerability in Saas Disabler allows Cross Site Request Forgery.This issue affects Disabler: from n/a through 3.0.3.\n\n"
},
{
"lang": "es",

View File

@ -2,12 +2,12 @@
"id": "CVE-2023-41728",
"sourceIdentifier": "audit@patchstack.com",
"published": "2023-10-02T08:15:38.580",
"lastModified": "2023-10-03T20:55:45.703",
"vulnStatus": "Analyzed",
"lastModified": "2024-04-29T09:15:07.277",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "Auth. (contributor+) Stored Cross-Site Scripting (XSS) vulnerability in Rescue Themes Rescue Shortcodes plugin <=\u00a02.5 versions."
"value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Rescue Themes Rescue Shortcodes allows Stored XSS.This issue affects Rescue Shortcodes: from n/a through 2.5.\n\n"
},
{
"lang": "es",

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-27956",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-03-21T17:15:08.437",
"lastModified": "2024-03-21T19:47:03.943",
"lastModified": "2024-04-29T09:15:07.387",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
@ -51,6 +51,10 @@
}
],
"references": [
{
"url": "https://patchstack.com/articles/critical-vulnerabilities-patched-in-wordpress-automatic-plugin?_s_id=cve",
"source": "audit@patchstack.com"
},
{
"url": "https://patchstack.com/database/vulnerability/wp-automatic/wordpress-automatic-plugin-3-92-0-unauthenticated-arbitrary-sql-execution-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2024-28961",
"sourceIdentifier": "security_alert@emc.com",
"published": "2024-04-29T09:15:07.477",
"lastModified": "2024-04-29T09:15:07.477",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Dell OpenManage Enterprise, versions 4.0.0 and 4.0.1, contains a sensitive information disclosure vulnerability. A local low privileged malicious user could potentially exploit this vulnerability to obtain credentials leading to unauthorized access with elevated privileges. This could lead to further attacks, thus Dell recommends customers to upgrade at the earliest opportunity."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security_alert@emc.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:L",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW",
"baseScore": 6.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.0,
"impactScore": 3.7
}
]
},
"weaknesses": [
{
"source": "security_alert@emc.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-256"
}
]
}
],
"references": [
{
"url": "https://www.dell.com/support/kbdoc/en-us/000224251/dsa-2024-184-security-update-for-dell-openmanage-enterprise-vulnerability",
"source": "security_alert@emc.com"
}
]
}

View File

@ -2,12 +2,12 @@
"id": "CVE-2024-32109",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-04-11T13:15:56.157",
"lastModified": "2024-04-11T13:30:38.000",
"lastModified": "2024-04-29T09:15:07.707",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "Cross-Site Request Forgery (CSRF) vulnerability in Julien Berthelot / MPEmbed.Com WP Matterport Shortcode.This issue affects WP Matterport Shortcode: from n/a through 2.1.8.\n\n"
"value": "Cross-Site Request Forgery (CSRF) vulnerability in Julien Berthelot / MPEmbed.Com WP Matterport Shortcode allows Cross Site Request Forgery.This issue affects WP Matterport Shortcode: from n/a through 2.1.9.\n\n"
},
{
"lang": "es",

View File

@ -2,12 +2,12 @@
"id": "CVE-2024-32129",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-04-15T11:15:11.233",
"lastModified": "2024-04-15T13:15:31.997",
"lastModified": "2024-04-29T09:15:07.803",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "URL Redirection to Untrusted Site ('Open Redirect') vulnerability in Freshworks Freshdesk (official).This issue affects Freshdesk (official): from n/a through 2.3.4.\n\n"
"value": "URL Redirection to Untrusted Site ('Open Redirect') vulnerability in Freshworks Freshdesk (official).This issue affects Freshdesk (official): from n/a through 2.3.6.\n\n"
},
{
"lang": "es",

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2024-33538",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-04-29T08:15:06.383",
"lastModified": "2024-04-29T08:15:06.383",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Exposure of Sensitive Information to an Unauthorized Actor vulnerability in Fastline Media LLC Assistant \u2013 Every Day Productivity Apps.This issue affects Assistant \u2013 Every Day Productivity Apps: from n/a through 1.4.9.1.\n\n"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 3.9,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-200"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/assistant/wordpress-assistant-every-day-productivity-apps-plugin-1-4-9-1-sensitive-data-exposure-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2024-33553",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-04-29T08:15:06.603",
"lastModified": "2024-04-29T08:15:06.603",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Deserialization of Untrusted Data vulnerability in 8theme XStore Core.This issue affects XStore Core: from n/a through 5.3.5.\n\n"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.0,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 2.2,
"impactScore": 6.0
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-502"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/et-core-plugin/wordpress-xstore-core-plugin-5-3-5-unauthenticated-php-object-injection-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2024-33558",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-04-29T09:15:07.890",
"lastModified": "2024-04-29T09:15:07.890",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Missing Authorization vulnerability in 8theme XStore Core.This issue affects XStore Core: from n/a through 5.3.5.\n\n"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-862"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/et-core-plugin/wordpress-xstore-core-plugin-5-3-5-limited-arbitrary-file-download-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2024-33566",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-04-29T08:15:06.803",
"lastModified": "2024-04-29T08:15:06.803",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Missing Authorization vulnerability in N-Media OrderConvo allows OS Command Injection.This issue affects OrderConvo: from n/a through 12.4.\n\n"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 10.0,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 6.0
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-862"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/admin-and-client-message-after-order-for-woocommerce/wordpress-orderconvo-plugin-12-4-unauthenticated-api-access-to-arbitrary-file-upload-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2024-33575",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-04-29T08:15:06.987",
"lastModified": "2024-04-29T08:15:06.987",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Exposure of Sensitive Information to an Unauthorized Actor vulnerability in User Meta user-meta.This issue affects User Meta: from n/a through 3.0.\n\n"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 3.9,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-200"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/user-meta/wordpress-user-meta-plugin-3-0-sensitive-data-exposure-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2024-33584",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-04-29T08:15:07.170",
"lastModified": "2024-04-29T08:15:07.170",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "URL Redirection to Untrusted Site ('Open Redirect') vulnerability in Deepen Bajracharya Video Conferencing with Zoom.This issue affects Video Conferencing with Zoom: from n/a through 4.4.4.\n\n"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.7,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-601"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/video-conferencing-with-zoom-api/wordpress-video-conferencing-with-zoom-plugin-4-4-4-open-redirection-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2024-33596",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-04-29T09:15:08.080",
"lastModified": "2024-04-29T09:15:08.080",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Missing Authorization vulnerability in Five Star Plugins Five Star Restaurant Reservations.This issue affects Five Star Restaurant Reservations: from n/a through 2.6.16.\n\n"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 5.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 3.9,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-862"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/restaurant-reservations/wordpress-five-star-restaurant-reservations-plugin-2-6-16-broken-access-control-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2024-33597",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-04-29T09:15:08.270",
"lastModified": "2024-04-29T09:15:08.270",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Missing Authorization vulnerability in ProFaceOff SSU.This issue affects SSU: from n/a through 1.5.0.\n\n"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-862"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/wp-s3-smart-upload/wordpress-ssu-plugin-1-5-0-broken-access-control-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2024-33627",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-04-29T08:15:07.367",
"lastModified": "2024-04-29T08:15:07.367",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Server-Side Request Forgery (SSRF) vulnerability in Cusmin Absolutely Glamorous Custom Admin.This issue affects Absolutely Glamorous Custom Admin: from n/a through 7.2.2.\n\n"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 4.4,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.3,
"impactScore": 2.7
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-918"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/ag-custom-admin/wordpress-agca-custom-dashboard-login-page-plugin-7-2-2-server-side-request-forgery-ssrf-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2024-33629",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-04-29T08:15:07.640",
"lastModified": "2024-04-29T08:15:07.640",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Server-Side Request Forgery (SSRF) vulnerability in Creative Motion Auto Featured Image (Auto Post Thumbnail).This issue affects Auto Featured Image (Auto Post Thumbnail): from n/a through 4.0.0.\n\n"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 4.4,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.3,
"impactScore": 2.7
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-918"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/auto-post-thumbnail/wordpress-auto-featured-image-auto-post-thumbnail-plugin-4-0-0-server-side-request-forgery-ssrf-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2024-33634",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-04-29T08:15:07.830",
"lastModified": "2024-04-29T08:15:07.830",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Server-Side Request Forgery (SSRF) vulnerability in Piotnet Piotnet Addons For Elementor Pro.This issue affects Piotnet Addons For Elementor Pro: from n/a through 7.1.17.\n\n"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.2,
"impactScore": 2.7
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-918"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/piotnet-addons-for-elementor-pro/wordpress-piotnet-addons-for-elementor-pro-plugin-7-1-17-unauthenticated-server-side-request-forgery-ssrf-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2024-33635",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-04-29T09:15:08.460",
"lastModified": "2024-04-29T09:15:08.460",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Missing Authorization vulnerability in Piotnet Piotnet Addons For Elementor Pro.This issue affects Piotnet Addons For Elementor Pro: from n/a through 7.1.17.\n\n"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-862"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/piotnet-addons-for-elementor-pro/wordpress-piotnet-addons-for-elementor-pro-plugin-7-1-17-unauthenticated-arbitrary-post-page-deletion-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2024-33636",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-04-29T09:15:08.640",
"lastModified": "2024-04-29T09:15:08.640",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Missing Authorization vulnerability in Mahesh Vora WP Page Post Widget Clone.This issue affects WP Page Post Widget Clone: from n/a through 1.0.1.\n\n"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 2.5
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-862"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/wp-page-post-widget-clone/wordpress-wp-page-post-widget-clone-plugin-1-0-1-broken-access-control-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2024-33637",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-04-29T08:15:08.007",
"lastModified": "2024-04-29T08:15:08.007",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Insertion of Sensitive Information into Log File vulnerability in Solid Plugins Solid Affiliate.This issue affects Solid Affiliate: from n/a through 1.9.1.\n\n"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-532"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/solid-affiliate/wordpress-solid-affiliate-plugin-1-9-1-sensitive-data-exposure-via-log-file-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2024-33641",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-04-29T08:15:08.200",
"lastModified": "2024-04-29T08:15:08.200",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Deserialization of Untrusted Data vulnerability in Team Yoast Custom field finder.This issue affects Custom field finder: from n/a through 0.3.\n\n"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.2,
"impactScore": 2.7
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-502"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/custom-field-finder/wordpress-custom-field-finder-plugin-0-3-php-object-injection-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2024-33652",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-04-29T08:15:08.383",
"lastModified": "2024-04-29T08:15:08.383",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Missing Authorization vulnerability in Real Big Plugins Client Dash.This issue affects Client Dash: from n/a through 2.2.1.\n\n"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "LOW",
"baseScore": 5.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 3.9,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-862"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/client-dash/wordpress-client-dash-plugin-2-2-1-broken-access-control-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2024-33684",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-04-29T09:15:08.833",
"lastModified": "2024-04-29T09:15:08.833",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Missing Authorization vulnerability in Pdfcrowd Save as PDF plugin by Pdfcrowd allows Stored XSS.This issue affects Save as PDF plugin by Pdfcrowd: from n/a through 3.2.0.\n\n"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW",
"baseScore": 6.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.3,
"impactScore": 3.7
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-862"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/save-as-pdf-by-pdfcrowd/wordpress-save-as-pdf-plugin-by-pdfcrowd-plugin-3-2-0-broken-access-control-to-stored-xss-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2024-3375",
"sourceIdentifier": "iletisim@usom.gov.tr",
"published": "2024-04-29T09:15:09.017",
"lastModified": "2024-04-29T09:15:09.017",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Incorrect Permission Assignment for Critical Resource vulnerability in Havelsan Inc. Dialogue allows Accessing Functionality Not Properly Constrained by ACLs.This issue affects Dialogue: from v1.83 before v1.83.1 or v1.84.\n\n"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "iletisim@usom.gov.tr",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "LOW",
"availabilityImpact": "HIGH",
"baseScore": 9.4,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.5
}
]
},
"weaknesses": [
{
"source": "iletisim@usom.gov.tr",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-732"
}
]
}
],
"references": [
{
"url": "https://www.usom.gov.tr/bildirim/tr-24-0363",
"source": "iletisim@usom.gov.tr"
}
]
}

View File

@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update
```plain
2024-04-29T08:00:38.345826+00:00
2024-04-29T10:00:38.038569+00:00
```
### Most recent CVE Modification Timestamp synchronized with NVD
```plain
2024-04-29T07:15:08.740000+00:00
2024-04-29T09:15:09.017000+00:00
```
### Last Data Feed Release
@ -33,46 +33,45 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
### Total Number of included CVEs
```plain
247065
247084
```
### CVEs added in the last Commit
Recently added CVEs: `30`
Recently added CVEs: `19`
- [CVE-2024-3193](CVE-2024/CVE-2024-31xx/CVE-2024-3193.json) (`2024-04-29T07:15:07.773`)
- [CVE-2024-3194](CVE-2024/CVE-2024-31xx/CVE-2024-3194.json) (`2024-04-29T07:15:08.070`)
- [CVE-2024-3195](CVE-2024/CVE-2024-31xx/CVE-2024-3195.json) (`2024-04-29T07:15:08.400`)
- [CVE-2024-3196](CVE-2024/CVE-2024-31xx/CVE-2024-3196.json) (`2024-04-29T07:15:08.740`)
- [CVE-2024-33537](CVE-2024/CVE-2024-335xx/CVE-2024-33537.json) (`2024-04-29T06:15:08.083`)
- [CVE-2024-33539](CVE-2024/CVE-2024-335xx/CVE-2024-33539.json) (`2024-04-29T06:15:08.930`)
- [CVE-2024-33540](CVE-2024/CVE-2024-335xx/CVE-2024-33540.json) (`2024-04-29T06:15:09.637`)
- [CVE-2024-33542](CVE-2024/CVE-2024-335xx/CVE-2024-33542.json) (`2024-04-29T06:15:10.220`)
- [CVE-2024-33544](CVE-2024/CVE-2024-335xx/CVE-2024-33544.json) (`2024-04-29T07:15:06.543`)
- [CVE-2024-33546](CVE-2024/CVE-2024-335xx/CVE-2024-33546.json) (`2024-04-29T07:15:06.810`)
- [CVE-2024-33548](CVE-2024/CVE-2024-335xx/CVE-2024-33548.json) (`2024-04-29T06:15:10.937`)
- [CVE-2024-33551](CVE-2024/CVE-2024-335xx/CVE-2024-33551.json) (`2024-04-29T06:15:11.487`)
- [CVE-2024-33554](CVE-2024/CVE-2024-335xx/CVE-2024-33554.json) (`2024-04-29T06:15:12.090`)
- [CVE-2024-33559](CVE-2024/CVE-2024-335xx/CVE-2024-33559.json) (`2024-04-29T06:15:12.607`)
- [CVE-2024-33562](CVE-2024/CVE-2024-335xx/CVE-2024-33562.json) (`2024-04-29T06:15:13.163`)
- [CVE-2024-33571](CVE-2024/CVE-2024-335xx/CVE-2024-33571.json) (`2024-04-29T06:15:13.667`)
- [CVE-2024-33630](CVE-2024/CVE-2024-336xx/CVE-2024-33630.json) (`2024-04-29T06:15:14.450`)
- [CVE-2024-33631](CVE-2024/CVE-2024-336xx/CVE-2024-33631.json) (`2024-04-29T06:15:14.940`)
- [CVE-2024-33632](CVE-2024/CVE-2024-336xx/CVE-2024-33632.json) (`2024-04-29T06:15:15.537`)
- [CVE-2024-33681](CVE-2024/CVE-2024-336xx/CVE-2024-33681.json) (`2024-04-29T06:15:16.057`)
- [CVE-2024-33686](CVE-2024/CVE-2024-336xx/CVE-2024-33686.json) (`2024-04-29T06:15:16.623`)
- [CVE-2024-33904](CVE-2024/CVE-2024-339xx/CVE-2024-33904.json) (`2024-04-29T06:15:17.320`)
- [CVE-2024-33905](CVE-2024/CVE-2024-339xx/CVE-2024-33905.json) (`2024-04-29T06:15:17.667`)
- [CVE-2024-4302](CVE-2024/CVE-2024-43xx/CVE-2024-4302.json) (`2024-04-29T06:15:17.803`)
- [CVE-2024-4303](CVE-2024/CVE-2024-43xx/CVE-2024-4303.json) (`2024-04-29T06:15:18.457`)
- [CVE-2024-28961](CVE-2024/CVE-2024-289xx/CVE-2024-28961.json) (`2024-04-29T09:15:07.477`)
- [CVE-2024-33538](CVE-2024/CVE-2024-335xx/CVE-2024-33538.json) (`2024-04-29T08:15:06.383`)
- [CVE-2024-33553](CVE-2024/CVE-2024-335xx/CVE-2024-33553.json) (`2024-04-29T08:15:06.603`)
- [CVE-2024-33558](CVE-2024/CVE-2024-335xx/CVE-2024-33558.json) (`2024-04-29T09:15:07.890`)
- [CVE-2024-33566](CVE-2024/CVE-2024-335xx/CVE-2024-33566.json) (`2024-04-29T08:15:06.803`)
- [CVE-2024-33575](CVE-2024/CVE-2024-335xx/CVE-2024-33575.json) (`2024-04-29T08:15:06.987`)
- [CVE-2024-33584](CVE-2024/CVE-2024-335xx/CVE-2024-33584.json) (`2024-04-29T08:15:07.170`)
- [CVE-2024-33596](CVE-2024/CVE-2024-335xx/CVE-2024-33596.json) (`2024-04-29T09:15:08.080`)
- [CVE-2024-33597](CVE-2024/CVE-2024-335xx/CVE-2024-33597.json) (`2024-04-29T09:15:08.270`)
- [CVE-2024-33627](CVE-2024/CVE-2024-336xx/CVE-2024-33627.json) (`2024-04-29T08:15:07.367`)
- [CVE-2024-33629](CVE-2024/CVE-2024-336xx/CVE-2024-33629.json) (`2024-04-29T08:15:07.640`)
- [CVE-2024-33634](CVE-2024/CVE-2024-336xx/CVE-2024-33634.json) (`2024-04-29T08:15:07.830`)
- [CVE-2024-33635](CVE-2024/CVE-2024-336xx/CVE-2024-33635.json) (`2024-04-29T09:15:08.460`)
- [CVE-2024-33636](CVE-2024/CVE-2024-336xx/CVE-2024-33636.json) (`2024-04-29T09:15:08.640`)
- [CVE-2024-33637](CVE-2024/CVE-2024-336xx/CVE-2024-33637.json) (`2024-04-29T08:15:08.007`)
- [CVE-2024-33641](CVE-2024/CVE-2024-336xx/CVE-2024-33641.json) (`2024-04-29T08:15:08.200`)
- [CVE-2024-33652](CVE-2024/CVE-2024-336xx/CVE-2024-33652.json) (`2024-04-29T08:15:08.383`)
- [CVE-2024-33684](CVE-2024/CVE-2024-336xx/CVE-2024-33684.json) (`2024-04-29T09:15:08.833`)
- [CVE-2024-3375](CVE-2024/CVE-2024-33xx/CVE-2024-3375.json) (`2024-04-29T09:15:09.017`)
### CVEs modified in the last Commit
Recently modified CVEs: `2`
Recently modified CVEs: `7`
- [CVE-2024-1023](CVE-2024/CVE-2024-10xx/CVE-2024-1023.json) (`2024-04-29T07:15:06.233`)
- [CVE-2024-1300](CVE-2024/CVE-2024-13xx/CVE-2024-1300.json) (`2024-04-29T07:15:06.423`)
- [CVE-2021-36821](CVE-2021/CVE-2021-368xx/CVE-2021-36821.json) (`2024-04-29T09:15:06.850`)
- [CVE-2021-36823](CVE-2021/CVE-2021-368xx/CVE-2021-36823.json) (`2024-04-29T09:15:07.020`)
- [CVE-2023-37998](CVE-2023/CVE-2023-379xx/CVE-2023-37998.json) (`2024-04-29T09:15:07.163`)
- [CVE-2023-41728](CVE-2023/CVE-2023-417xx/CVE-2023-41728.json) (`2024-04-29T09:15:07.277`)
- [CVE-2024-27956](CVE-2024/CVE-2024-279xx/CVE-2024-27956.json) (`2024-04-29T09:15:07.387`)
- [CVE-2024-32109](CVE-2024/CVE-2024-321xx/CVE-2024-32109.json) (`2024-04-29T09:15:07.707`)
- [CVE-2024-32129](CVE-2024/CVE-2024-321xx/CVE-2024-32129.json) (`2024-04-29T09:15:07.803`)
## Download and Usage

View File

@ -179206,8 +179206,8 @@ CVE-2021-36818,0,0,2033cd4988573d21f25ce8babf37194bb98983bd21b883fa66e8587ed3b5d
CVE-2021-36819,0,0,21dec9b0b146d489f3ee23dd8879ad8572069279acd9be25b86f3906e832f059,2023-11-07T03:36:50.893000
CVE-2021-3682,0,0,0f8e570c4f9966e0dfc70ace2ee43e3192608b4365180d452215f9eea36a5d5a,2023-03-31T18:26:51.630000
CVE-2021-36820,0,0,c6a4937e7063cb9ab4b264d0478673f6d51d9032791dbd93389c0b268f395049,2023-11-07T03:36:51.130000
CVE-2021-36821,0,0,61d58f36327d01044e65fbad1a3aef08f2ff4862546a68ba812efd5ed02b3928,2023-11-07T03:36:51.373000
CVE-2021-36823,0,0,9008ea2710ab1328fd307f8a5d98e3a5df66b9e7d4e7d6c6d091b79989e96320,2023-11-07T03:36:51.463000
CVE-2021-36821,0,1,5143e6cad35fa9a0f4029a8643b85a408f5d31fec8532aa4f1704d78dd733bcf,2024-04-29T09:15:06.850000
CVE-2021-36823,0,1,8cbcf9733cf1ed187f61116d89b52e148d59203005cad4a257f2215db428a4a0,2024-04-29T09:15:07.020000
CVE-2021-36826,0,0,08d3d74590139e3fb6d5829346559d76245d5ea576a3299c7ae0afa05861256b,2023-11-07T03:36:51.557000
CVE-2021-36827,0,0,c41dd6b48f6c916c91266a4cc3382d8af6038eefef9c1739e93482528ed892d5,2023-11-07T03:36:51.653000
CVE-2021-36828,0,0,63e193c12dcccf2cf5162cb230c3af11b82709a825557d9ed13a73b18760ff72,2023-10-12T12:15:09.920000
@ -227142,7 +227142,7 @@ CVE-2023-37994,0,0,145c46abd9a225a566f9e609d241a77007bf221aa4f45667049dff5ef2012
CVE-2023-37995,0,0,d2997272909836e557b3f86dfeec338712dbc866fa0d494a8e9dcdd88f6a8006,2023-10-05T17:04:25.617000
CVE-2023-37996,0,0,e3a09fdcf2e5a94ed2ba35ff3097a80c48c320097f9c91ee2fe29ed9d48ed7e7,2023-10-04T17:13:22.887000
CVE-2023-37997,0,0,634a8f00a3a7cefaea8286574903fd4dd9cef7262779039b9494ebb47f14c6b7,2023-09-07T13:05:27.313000
CVE-2023-37998,0,0,1e32225316349b19ac5d99a727f7ef3fdaabd14e9071142212ce28f8a95ba748,2023-10-04T19:54:12.660000
CVE-2023-37998,0,1,1747e4f0f6ddf4d50fd6cbdf2ef7e31b2a7283ba267cf7dde73ae9cd8c8e621a,2024-04-29T09:15:07.163000
CVE-2023-3800,0,0,774d32c7b5fb881d1d40e6872ba5eec3309f4fee64d58b63dc188b5cb5069530,2024-04-11T01:21:23.090000
CVE-2023-38000,0,0,0e0c6bbc8458c85090972cb27733399c7be344be574c892a61848bb47624d50a,2023-10-16T17:04:06.637000
CVE-2023-38003,0,0,1818608b52e574766674a96fd387dab05b406afb5af9478c08cafc61d6b9b561,2024-01-19T16:15:09.013000
@ -229810,7 +229810,7 @@ CVE-2023-41724,0,0,52a7ac367ea3adaef0da452d1f9fcfe8e474049192390ddce1cdad2f409b3
CVE-2023-41725,0,0,ef65a845340b2e5995978b7ff227127be0d8e07ed7a8d62bd421fd7106110973,2023-11-09T20:48:01.590000
CVE-2023-41726,0,0,fb669107c42200a4419d1537040429448894a928afcfa430fdee2f48dca99d87,2023-11-09T20:47:03.140000
CVE-2023-41727,0,0,1aea9ec78204883dbfc26cfb24b18446bca80c0abe98ce4d6d9d69448220db2e,2023-12-21T04:48:25.067000
CVE-2023-41728,0,0,412eb06c20bf3866dfa57a11d0ee087de3e3eff171a28895f60b7d9e0cc862d2,2023-10-03T20:55:45.703000
CVE-2023-41728,0,1,7a0742b27b0ade05defe664bcd5a99072ff0d518cd86f979b9cb64aefdbdc469,2024-04-29T09:15:07.277000
CVE-2023-41729,0,0,5df9823fffd4661ec50c1f97a1351b1d8951df4a280dd104e71fe164a121673d,2023-10-03T20:55:37.293000
CVE-2023-4173,0,0,4da8873068b249eb68d85abdc6a2b4432dbfdb20685e151dced0645fbf06d4cc,2024-04-11T01:22:22.807000
CVE-2023-41730,0,0,a5d777a2d4ed8b6bbf02038800ba1cae8428175b6bdde086d65deb9402e1c86d,2023-10-11T20:51:55.970000
@ -236717,7 +236717,7 @@ CVE-2023-52716,0,0,fac095701883d01d5f92e56c70701dc066b3ae8f92d0c5921c5cf0aa2fbb0
CVE-2023-52717,0,0,e713315d9fcc50e6cbb98e0dd380e2c86ba52b63a35d352b23f2645ee0f83a24,2024-04-08T18:48:40.217000
CVE-2023-5272,0,0,e188ff056a72e73c412c109b97d5eb37c41b2dbce71d285e9dfeb205fc3a7064,2024-04-11T01:22:56.733000
CVE-2023-52722,0,0,58a4dacfed06269af66d591e2c90392281dec137a91dd3653eb193059da1f3b7,2024-04-28T00:15:07.270000
CVE-2023-52723,1,1,d4be2feca33226ddfe4838f7958d61e46f837250fa1c183dc1e9ed285ea7ec65,2024-04-29T06:15:06.983000
CVE-2023-52723,0,0,d4be2feca33226ddfe4838f7958d61e46f837250fa1c183dc1e9ed285ea7ec65,2024-04-29T06:15:06.983000
CVE-2023-5273,0,0,6f05c674078315237abe3d7b2ebcc88fea13416a5c7e4aafdfcff23a1ae8a322,2024-04-11T01:22:56.817000
CVE-2023-5274,0,0,230ef4c0e160801f289163632d814f7177c2b1395a715b72f33c8d0b5d876249,2023-12-05T18:20:39.937000
CVE-2023-5275,0,0,9a81436027e8dad0b67eefc484a675cc6dfdf47ffb7247993749a2124145a13c,2023-12-05T18:18:37.050000
@ -239233,7 +239233,7 @@ CVE-2024-1019,0,0,27c6fed97db80e9684966512d657c2ae1b8d86be0f46f2f894fd714e51d0d5
CVE-2024-1020,0,0,adc5ab5f2da8e36fe7b7aa7c315c830611f48798a94b22d42b050e3e9e630362,2024-04-11T01:24:18.170000
CVE-2024-1021,0,0,7bcf34eb76307cde4ae64d588874bf57854c5c64505f94e3349469a346a9c6cb,2024-04-11T01:24:18.257000
CVE-2024-1022,0,0,357efb4939784b3bedb659f15a28d0e47d08529e441db0e0be00cbc23a0198b9,2024-04-11T01:24:18.350000
CVE-2024-1023,0,1,f385656c92a71370efff252bd7c129136dc520292043427aaca7a2375a03c816,2024-04-29T07:15:06.233000
CVE-2024-1023,0,0,f385656c92a71370efff252bd7c129136dc520292043427aaca7a2375a03c816,2024-04-29T07:15:06.233000
CVE-2024-1024,0,0,85149b221a8921f7ffbd9c6aa85a2dfcc208fc0fbfab7fd4f41d63975d68c1d5,2024-04-11T01:24:18.463000
CVE-2024-1026,0,0,ce9d6ecfc0c397ada0ff1130145169bc08739645437cccf4be1ae651761bfb1b,2024-04-11T01:24:18.550000
CVE-2024-1027,0,0,ee916bdd4519e7da0384e34a5415b2bb4d3bac5a3382b229877ac74923e86538,2024-04-11T01:24:18.637000
@ -239468,7 +239468,7 @@ CVE-2024-1294,0,0,1a6fde55ee17952393d258a28e1938bfe41cafec05fa305cc82057814b7c2b
CVE-2024-1296,0,0,ab648d9dba58ca530bb990b50d92c4f5ce9f591faa8fbeeb49385095b8425c33,2024-03-13T18:16:18.563000
CVE-2024-1297,0,0,1fc219bb038ab422185a999365115aff94759fe3e5ff94e3dc4180f1d6bc82d0,2024-02-20T19:50:53.960000
CVE-2024-1299,0,0,165a6e5bf7396c9871edb84a6ce28d3386b33fd34eb9238065e890fa150a178a,2024-03-07T13:52:27.110000
CVE-2024-1300,0,1,0d670db12603e944dcc15b5481ece919335822514a418179c496d8822134bd6f,2024-04-29T07:15:06.423000
CVE-2024-1300,0,0,0d670db12603e944dcc15b5481ece919335822514a418179c496d8822134bd6f,2024-04-29T07:15:06.423000
CVE-2024-1301,0,0,68d5e322fab21220735382791ea9287e8104e954fa5bc7b1f8f02021f25e280b,2024-03-12T17:46:17.273000
CVE-2024-1302,0,0,e42b35f7a02693024fada8fec8e812444e0bb721c54c537bf6c1b8db8c60ce66,2024-03-12T17:46:17.273000
CVE-2024-1303,0,0,d6386ac67e1b3bd9c657849a1747229ab86034b9c989d20fb5cde0be8bba0359,2024-03-12T17:46:17.273000
@ -239938,7 +239938,7 @@ CVE-2024-1900,0,0,df3a7e0d7f662e0642af797e67801f5b993e667e914107fd3f604cd2322f2a
CVE-2024-1901,0,0,e852d825cede13009c4c827235fab136069de3983ba4df012d62632a4fcd1d38,2024-03-06T15:18:08.093000
CVE-2024-1902,0,0,012f8c6561b23779499ee60e1b0701a7ed975d80b89eade3a28f94f4708254ec,2024-04-15T18:15:10.070000
CVE-2024-1904,0,0,894e214d09f8efe1b9b69452204531788406056d1489422306bbd393d57cb47d,2024-04-10T13:23:38.787000
CVE-2024-1905,1,1,99fc2a264209d40d17540b1f82384a2b60d6e4fdfef05f9a479a7d2dc908eb8d,2024-04-29T06:15:07.650000
CVE-2024-1905,0,0,99fc2a264209d40d17540b1f82384a2b60d6e4fdfef05f9a479a7d2dc908eb8d,2024-04-29T06:15:07.650000
CVE-2024-1906,0,0,4a0389164694374915846934d3ecd021a9b146d80ff266286dcad5a6eeb2c849,2024-02-27T14:19:41.650000
CVE-2024-1907,0,0,674a8f990612fbd789e8b29e4f4db555efa2966321d7535d44b4ff9d82432ec5,2024-02-27T14:19:41.650000
CVE-2024-1908,0,0,92bf17210112d2d60d7d442f37608315d845944e26306753d826ae8aa1a4dd43,2024-03-21T12:58:51.093000
@ -242601,7 +242601,7 @@ CVE-2024-25030,0,0,fc3de3fd573e21787e1c0bdd960fb3a4c590b360d40ba7c7d9e34380b9c90
CVE-2024-2504,0,0,b952b345d554f248180cfc37dd33de3d29aef92bb40f82f2454b4ee2e2c1523d,2024-04-10T13:23:38.787000
CVE-2024-25046,0,0,64b67efbc5b2947bdef146aee983b6003b7daa23659b2bfe93519b90947330ac,2024-04-03T17:24:18.150000
CVE-2024-25048,0,0,f98b5f829311c9c9a726d02cd66b8a93a4755ae4aa235bf4cd2af7701d9667d0,2024-04-27T12:15:10.517000
CVE-2024-2505,1,1,52f7b4fb73939784ef566f22fc7864f65f01228d17a754b7b6510c54c8095deb,2024-04-29T06:15:07.937000
CVE-2024-2505,0,0,52f7b4fb73939784ef566f22fc7864f65f01228d17a754b7b6510c54c8095deb,2024-04-29T06:15:07.937000
CVE-2024-25050,0,0,1ff20d693c75735252bb078c1b9df844137fdb7eca3fe844e495a58addd9c2a1,2024-04-28T13:15:08.257000
CVE-2024-25062,0,0,9596ed5cf07a8bc8469d4afc28fc727a431af7cff3b6b8e84435c301d9955756,2024-02-13T00:40:40.503000
CVE-2024-25063,0,0,ada8a3e76748f7f6ba8d6378c081423ac8f962f095964d00e876ad6b7009736e,2024-03-04T22:45:02.117000
@ -244203,7 +244203,7 @@ CVE-2024-27950,0,0,56d632dad56c45d949d3327de16e5b70b08683cea8ce7876ca8c59cc37ee8
CVE-2024-27951,0,0,fb648e7b48d01c386d90ab877e0e6e5ad9ac54d7f9cf31355978050c72eaffef,2024-04-03T12:38:04.840000
CVE-2024-27952,0,0,fe624616809d2b08e76659d4d30a802797c8b1dea609a0360dcd8752b7d9cac9,2024-03-13T18:15:58.530000
CVE-2024-27953,0,0,2a6d5a1801b407ff03c3610ff9d51f6689bbe6434fd00573a417d8c900d7386a,2024-03-13T18:15:58.530000
CVE-2024-27956,0,0,f490f7ec3bd48189a1ef57af88670e81296dde010b86c5edf00de693d7370df0,2024-03-21T19:47:03.943000
CVE-2024-27956,0,1,194fe594f0f82199e60d61684a1f7c8db8c04bdf57c93a45e71af1bb25f7851a,2024-04-29T09:15:07.387000
CVE-2024-27957,0,0,3bb51417dd78fa81cd8d3e079ab9ae6ed1b9709468847cb623b9c9568eef40f4,2024-03-17T22:38:29.433000
CVE-2024-27958,0,0,3c69427bef710d3f7bb781ce81b405984dd58d08367be619f590c223ad730fd4,2024-03-17T22:38:29.433000
CVE-2024-27959,0,0,b6158d09fbe57e466eaa147e639a460dd447ef6efe99a61800919c1426ccc29c,2024-03-17T22:38:29.433000
@ -244706,6 +244706,7 @@ CVE-2024-28951,0,0,c59d22693a6783914cb02db5be2e1a6f5b0c6277d54a6ec5614d046ef86ff
CVE-2024-28957,0,0,a169098a05ac68c39610a9d0c21c80f908b4c73fb6ad140d0292417789484670,2024-04-15T13:15:31.997000
CVE-2024-2896,0,0,5de59d7245da47f589f3ef8b760f3f6474bf3327cc8f382548cfd383506a8e1b,2024-04-11T01:25:40.217000
CVE-2024-28960,0,0,e8dbeb1ca04aba553db6ad0a923d45f708fa651bef11fd340f54cf32195f3cfb,2024-04-19T23:15:10.657000
CVE-2024-28961,1,1,bca106ae9d03a30b3071a716b43bd6a4eee060236e9367c779bc0c8b76366875,2024-04-29T09:15:07.477000
CVE-2024-28963,0,0,c5c3b185efea606aed4d9595c8d313f3f2c0068b841b7e1d435fe02dbde99f32,2024-04-24T13:39:42.883000
CVE-2024-2897,0,0,845f7ba04cd28c84698eb0ec67ce51aa02df2e982261e886754cbe95c0546759,2024-04-11T01:25:40.303000
CVE-2024-28976,0,0,224761c00a34a63d518e2df17d9e4e0dcdf6133206e4a1c859d89e6d8634ce80,2024-04-24T13:39:42.883000
@ -246088,8 +246089,8 @@ CVE-2024-31873,0,0,30397559953deb34a9ae192149473632dc6b2334245e920787a4c5e14fc76
CVE-2024-31874,0,0,1770e58d0ae5591eb931a8cdfdb054fb4d854f81849d14af250c71db6caf553c,2024-04-10T19:49:51.183000
CVE-2024-3188,0,0,5d70d4884e37e1862c5503e8662fdd8be316d1df7ecad77f44114699c1426b8a,2024-04-26T12:58:17.720000
CVE-2024-31887,0,0,e951c215b0e12b882bcc7244c98d7631ee4f4b7a3271b5f24e369f1a635cd3e5,2024-04-17T12:48:07.510000
CVE-2024-3191,1,1,909de57a0e1134c017815b99f5374905a7cebaa6da948da4a489799e7c96ecfa,2024-04-29T07:15:07.080000
CVE-2024-3192,1,1,725dda67edbc96beb58e8c0c2444a458c6950abc195edff7ad4f85d511813766,2024-04-29T07:15:07.480000
CVE-2024-3191,0,0,909de57a0e1134c017815b99f5374905a7cebaa6da948da4a489799e7c96ecfa,2024-04-29T07:15:07.080000
CVE-2024-3192,0,0,725dda67edbc96beb58e8c0c2444a458c6950abc195edff7ad4f85d511813766,2024-04-29T07:15:07.480000
CVE-2024-31920,0,0,3c0045dbbecad7d78d5b9eb044589c2fc290e421e2d5accb9391890092efc90f,2024-04-15T13:15:31.997000
CVE-2024-31921,0,0,732b3dfcff7f3c38928ece374bd7708cd93eb00a4dc0a7d5ac8e2f115b9d7217,2024-04-15T13:15:31.997000
CVE-2024-31922,0,0,ab7058b1ab970c1607707e3b516fb20a2b1bb9e11ac7a3e1d4bef18b1ec4d6b7,2024-04-15T13:15:31.997000
@ -246100,7 +246101,7 @@ CVE-2024-31926,0,0,5ea07bd781aaf165e7c249d84898bbaee298d70cc8e541e3b74d17ae8e2ec
CVE-2024-31927,0,0,6cd17f97d47f2415c03c97ad66e9324a16977292b8eb97b821aae9ba7a0f2833,2024-04-11T13:30:38
CVE-2024-31928,0,0,e6cc120c3629d81f3db9dcadc93c459e7b269490e6128fcc8be3997c3ef595e9,2024-04-11T13:30:38
CVE-2024-31929,0,0,5359df4522faa8d2c46f605d48868a6939d06d35e038e5f3287851d0461688a3,2024-04-11T13:30:38
CVE-2024-3193,1,1,ea73d12bc10265a58216dce72c432ee965205457c358de1f1b4800cf51e18cca,2024-04-29T07:15:07.773000
CVE-2024-3193,0,0,ea73d12bc10265a58216dce72c432ee965205457c358de1f1b4800cf51e18cca,2024-04-29T07:15:07.773000
CVE-2024-31930,0,0,628cb0e5103582aeccc9f3e33331b9dbe7dba70b3951389bc2f9327ad3b8f5ee,2024-04-11T13:30:38
CVE-2024-31931,0,0,31bc6de522002d5fbdfc52e575ea088ef3d3fde1fc3f2ee4856692982b9dc2cf,2024-04-11T13:30:38
CVE-2024-31932,0,0,cbdc79dc2f64dd5bef9877c31b5d39549faf66977f5313958012ec22e616327c,2024-04-11T13:30:38
@ -246111,7 +246112,7 @@ CVE-2024-31936,0,0,41ae8d4679677e086c385533d0a63055153ebb271d32fb7547401292a6a57
CVE-2024-31937,0,0,24fb14fc8c636ca322e17128cc4ef69cbdba60a9f579b74e55aed300a2f73ed6,2024-04-11T13:30:38
CVE-2024-31938,0,0,5f3f05f61d1ef2cd5bad53d9f5667002cb10342b194111eed40f5ded72653f03,2024-04-15T13:15:31.997000
CVE-2024-31939,0,0,dc9cc0dfd8ae0f6c4caa1a4775b1cc86559b00f81c6408b5f2a51c57007b5d9e,2024-04-11T12:47:44.137000
CVE-2024-3194,1,1,d329211d83b0115ad0b19eeb5be2a89ccbb6bafb933feb45b5e8a49d955922d1,2024-04-29T07:15:08.070000
CVE-2024-3194,0,0,d329211d83b0115ad0b19eeb5be2a89ccbb6bafb933feb45b5e8a49d955922d1,2024-04-29T07:15:08.070000
CVE-2024-31940,0,0,1ddf48c04277bac2492208785102f32503356b7d59b7891c524b2c22b8846edb,2024-04-15T13:15:31.997000
CVE-2024-31941,0,0,b8dc065fda42126e32d28a44ef547549a83996a827e764074359d3e3ec8c1e09,2024-04-15T13:15:31.997000
CVE-2024-31942,0,0,ceae4b513a0b6e905236b05cb5dd98d07a79c0420729857e9c51c87c35b65b17,2024-04-15T13:15:31.997000
@ -246119,10 +246120,10 @@ CVE-2024-31943,0,0,d050ed16bd2fd56e0b74cc5712c1eb7ef94538d6cfa9c00022a6cfa048bd2
CVE-2024-31944,0,0,d1cf01bee95ac2d1b4f198f30f665ce7f3dae041b6378dd5d37f86b95341e18f,2024-04-10T19:49:51.183000
CVE-2024-31948,0,0,61f6d35222c1e3f11e25e4eb10990c24f6ea2b07724ec51b46fb0ba4b709b0cc,2024-04-28T07:15:08.843000
CVE-2024-31949,0,0,d55253e38f8bc425df8f875d525d4d6b96cb3180b7d665ec7de9778e227e2105,2024-04-28T07:15:08.917000
CVE-2024-3195,1,1,6d60776e21ae5e9a12630c8927b26ba77fa690068c68c10ca942d3c06a3f5897,2024-04-29T07:15:08.400000
CVE-2024-3195,0,0,6d60776e21ae5e9a12630c8927b26ba77fa690068c68c10ca942d3c06a3f5897,2024-04-29T07:15:08.400000
CVE-2024-31950,0,0,6cefb0ca8246a802eee33ecaeabf30a3794c53c92173f69e19945e3bf38104d7,2024-04-08T18:48:40.217000
CVE-2024-31951,0,0,a02cb6e83819b8aefe87f14fcbaf10a3986c9b6174676e08f67eb54fe256f190,2024-04-08T18:48:40.217000
CVE-2024-3196,1,1,ddedfe5cfa69a5a0e563bb0daac4e7b058b56096294d5609b3943dc244d20005,2024-04-29T07:15:08.740000
CVE-2024-3196,0,0,ddedfe5cfa69a5a0e563bb0daac4e7b058b56096294d5609b3943dc244d20005,2024-04-29T07:15:08.740000
CVE-2024-31978,0,0,905fe24a9cf546b211ed3cfae7258dc772856eb0550beb1f55c95bc3799601d2,2024-04-09T12:48:04.090000
CVE-2024-31981,0,0,6b90fc014c719d42bc6275e095b2e18dc9d544859b6ab5a3b554ecb5ab03a845,2024-04-11T12:47:44.137000
CVE-2024-31982,0,0,8e15c1dad7e15762a1fbb5bb26c4de9afb40b54c1e4ad12ab123edd90435cd54,2024-04-11T12:47:44.137000
@ -246198,14 +246199,14 @@ CVE-2024-32105,0,0,14f3c307fe159fa2b4817fc42bb4e5becf74df81f12e854ac688d637ee1e6
CVE-2024-32106,0,0,2e3f5a57bd781bd3a30c937e8aa33ba1f212672a8df9850b791a63471fb05d63,2024-04-11T13:30:38
CVE-2024-32107,0,0,b90c8135a82473fde7e5bf44c3c1cf9d7846ba95270115659d7d68306d87ca81,2024-04-11T13:30:38
CVE-2024-32108,0,0,950a29a68ef37c40439ae0dcf3c3d4b039242eaece664c349c7d4089e193ee6e,2024-04-11T13:30:38
CVE-2024-32109,0,0,e0a4e8c5f217571de21e69ff68b322f2becdcc662ae51f8c1b5dcaad24451a40,2024-04-11T13:30:38
CVE-2024-32109,0,1,4ab4248625b2b88c43ecf2bed644e80e80c54bafb94ddc41cebae0bbd84f78ff,2024-04-29T09:15:07.707000
CVE-2024-3211,0,0,d6d8ef851a76d01f08b13c4c6093534cf0125e4133f007b8f3a299cb3bb38192,2024-04-12T12:43:46.210000
CVE-2024-32112,0,0,2df62c2ad1478d07a612eff17f984ad78c51d3b47027012c1c38076227812cd3,2024-04-11T12:47:44.137000
CVE-2024-32125,0,0,df49ac279a5dab5894d2cf46d4df920e793fb77c32b1360bd4eb9ce6cc4c2bcb,2024-04-15T13:15:31.997000
CVE-2024-32126,0,0,03bbe2b7a7bd325cdda583bb7823f2b70916aad3961fcbd3bac07e945035870f,2024-04-18T13:04:28.900000
CVE-2024-32127,0,0,57252810e1702be160161ac7dc44c20062237ffc3e0f3ad79884c0b06ee5b822,2024-04-15T13:15:31.997000
CVE-2024-32128,0,0,cb935dc8078553e54335e879bd7502243cd9a625b79c1c1dfceb4bfba45b9de1,2024-04-15T13:15:31.997000
CVE-2024-32129,0,0,7dc12cce8517a17cd70ddfa746950a5eac6137ebf8d213b92102ec061182c7b6,2024-04-15T13:15:31.997000
CVE-2024-32129,0,1,836d2bd4732456c79c79f4c8efead95083abe0bdcddc45563d15237fa265590b,2024-04-29T09:15:07.803000
CVE-2024-3213,0,0,ea3f20ff836368484318fafaf2de028dfc4fe493b01551892e8e53b852a2d76e,2024-04-10T13:23:38.787000
CVE-2024-32130,0,0,c3815df651bee8fabb39b6ee1601a12e78be3e64615a56410b03d7d3217c5c2f,2024-04-17T12:48:07.510000
CVE-2024-32132,0,0,b8f2c67a5eb9317d71844e548f7098002fd937824ef3f3cc031dff8cdf6f8053,2024-04-15T13:15:31.997000
@ -246637,38 +246638,53 @@ CVE-2024-3351,0,0,4e83ab506e7228a3886d0c35bd4699b3cc13e079b52b9390280e70733aeb1d
CVE-2024-3352,0,0,2bb858a13268847c6f0639e9c58251e5b0608c0fcc2f637338ed79183e654688,2024-04-11T01:25:59.117000
CVE-2024-3353,0,0,a43304c0c957cee30ec6a0fe5705b568475f27f66d5199c2166f449cd8eb908f,2024-04-11T01:25:59.200000
CVE-2024-33531,0,0,71e7e7c369e07333ae7410b9238493e0b8e5a70255296aafd8bfae114b6e76d5,2024-04-24T13:39:42.883000
CVE-2024-33537,1,1,1abcca94500cff61689bc299259daf6c77965db351f4065549770837c6336670,2024-04-29T06:15:08.083000
CVE-2024-33539,1,1,8f41542e5f77851d2f4faa8d70582127978bd07484561d364c44db3eb5ca61fd,2024-04-29T06:15:08.930000
CVE-2024-33537,0,0,1abcca94500cff61689bc299259daf6c77965db351f4065549770837c6336670,2024-04-29T06:15:08.083000
CVE-2024-33538,1,1,2c1e0d3b7f9f337908146a436e9747f359f4444ae266b9d82b0a3ad465ad1d36,2024-04-29T08:15:06.383000
CVE-2024-33539,0,0,8f41542e5f77851d2f4faa8d70582127978bd07484561d364c44db3eb5ca61fd,2024-04-29T06:15:08.930000
CVE-2024-3354,0,0,4a4ea1b685e77f1329c6119be3c557bd8627ab8e6e7bcdf524dde072c4485f2b,2024-04-11T01:25:59.280000
CVE-2024-33540,1,1,747a115e4ae2ca6e4d30057a4f7d7e64e2b02e1bc21f016e186f3ec5a7c4cbee,2024-04-29T06:15:09.637000
CVE-2024-33542,1,1,c46844096e18c90d4389e00877bdc86b55250f44e249077d028e212eff872075,2024-04-29T06:15:10.220000
CVE-2024-33544,1,1,1466a86d502d8d54ff1b9a60222a92956c868d95a390bd0d2b95b1d73fa6edf0,2024-04-29T07:15:06.543000
CVE-2024-33546,1,1,3ef102e69d02cbc32fbb5297ea63418695ffc6bd67887340158d2086fadabd61,2024-04-29T07:15:06.810000
CVE-2024-33548,1,1,f1884ac10132cc8231eb6aaac64ad6b1e7a3129e60b9c76432db676e6c17cc0b,2024-04-29T06:15:10.937000
CVE-2024-33540,0,0,747a115e4ae2ca6e4d30057a4f7d7e64e2b02e1bc21f016e186f3ec5a7c4cbee,2024-04-29T06:15:09.637000
CVE-2024-33542,0,0,c46844096e18c90d4389e00877bdc86b55250f44e249077d028e212eff872075,2024-04-29T06:15:10.220000
CVE-2024-33544,0,0,1466a86d502d8d54ff1b9a60222a92956c868d95a390bd0d2b95b1d73fa6edf0,2024-04-29T07:15:06.543000
CVE-2024-33546,0,0,3ef102e69d02cbc32fbb5297ea63418695ffc6bd67887340158d2086fadabd61,2024-04-29T07:15:06.810000
CVE-2024-33548,0,0,f1884ac10132cc8231eb6aaac64ad6b1e7a3129e60b9c76432db676e6c17cc0b,2024-04-29T06:15:10.937000
CVE-2024-3355,0,0,1992313db0de37cd343f2e0c4d60ca5be53ec7c18d85010c791b43a1a0033536,2024-04-11T01:25:59.360000
CVE-2024-33551,1,1,48cbe7358b0d6b0348a8420e63ce1222decf42609ef0aa9cdee85f45dc0831b8,2024-04-29T06:15:11.487000
CVE-2024-33554,1,1,44f60587812c323490409e830f796cfbd35a235319f7237d253181849d9ed8df,2024-04-29T06:15:12.090000
CVE-2024-33559,1,1,948fdd92ac3165b98a9a3e7d7bdf15d3f487bac4b7adfad2a4fb49bd7435a7e9,2024-04-29T06:15:12.607000
CVE-2024-33551,0,0,48cbe7358b0d6b0348a8420e63ce1222decf42609ef0aa9cdee85f45dc0831b8,2024-04-29T06:15:11.487000
CVE-2024-33553,1,1,58c7a083e3fbc8457256ecd25a5cfe4812df86ca040239bf0e4438f4512e16fb,2024-04-29T08:15:06.603000
CVE-2024-33554,0,0,44f60587812c323490409e830f796cfbd35a235319f7237d253181849d9ed8df,2024-04-29T06:15:12.090000
CVE-2024-33558,1,1,5029ca8f3a7bf223327e10c6a6ec6d6546659ad2ec7630fc2ce0a4310b50be3e,2024-04-29T09:15:07.890000
CVE-2024-33559,0,0,948fdd92ac3165b98a9a3e7d7bdf15d3f487bac4b7adfad2a4fb49bd7435a7e9,2024-04-29T06:15:12.607000
CVE-2024-3356,0,0,087254ad27ba51e796f585bd19b7860bdf92d5d8812be46839c2000c6ff7ec4e,2024-04-11T01:25:59.443000
CVE-2024-33562,1,1,ba9f8f690ca4d53bf11bc838f8b9a916ae70cc6d375248da36a8a28d84f314fd,2024-04-29T06:15:13.163000
CVE-2024-33562,0,0,ba9f8f690ca4d53bf11bc838f8b9a916ae70cc6d375248da36a8a28d84f314fd,2024-04-29T06:15:13.163000
CVE-2024-33566,1,1,f351fdb0905c12001d59ba086a0e050db3a855534570f5f484c67c74322726ad,2024-04-29T08:15:06.803000
CVE-2024-3357,0,0,4504c33b3bb653378795a255a83c05295c4cb93d37914e6c8a1edf8397686b85,2024-04-11T01:25:59.530000
CVE-2024-33571,1,1,32fa1280ecb5787c1681505d41e97480c3bdfd2dc281b5a45dc4061c57561d00,2024-04-29T06:15:13.667000
CVE-2024-33571,0,0,32fa1280ecb5787c1681505d41e97480c3bdfd2dc281b5a45dc4061c57561d00,2024-04-29T06:15:13.667000
CVE-2024-33575,1,1,8a6bf9849cfd0c7120251b3216db90d4f144aeb07869d1cd1863ab78ad1f77a6,2024-04-29T08:15:06.987000
CVE-2024-3358,0,0,694a0960c89fb254bc37c7c2f594e5cb197e9c3b955cd9433f44c414aff75d2b,2024-04-11T01:25:59.610000
CVE-2024-33584,1,1,39d0b5b446b0f295919190ab8bffd1407daf4c41e0b5ed410bbb4e880d676836,2024-04-29T08:15:07.170000
CVE-2024-3359,0,0,a779b2e33399e3789113d39f065b1425ad824801b217abc54417c2cce7e7d2db,2024-04-11T01:25:59.687000
CVE-2024-33592,0,0,db5c0b056d9b2b7db6cca903286bba2d07a26aaa9035eb96ef4301de432670e3,2024-04-25T17:25:05.903000
CVE-2024-33596,1,1,59d33578c03d9dd8ac1b12b8c12643b60a50f1912263f798db68827f617e9fd5,2024-04-29T09:15:08.080000
CVE-2024-33597,1,1,09b0dc0dcae761c513b39db2acacd77654acadc7386cfd702498cf05f993342e,2024-04-29T09:15:08.270000
CVE-2024-33598,0,0,951d122bd41cb7218bd6ac7f6b225f4876d714fab2f67658757b81f4282e18e0,2024-04-26T12:58:17.720000
CVE-2024-3360,0,0,2ffbaa301c04a2d62013f221bb69a21a0f4034a97959f93c6ac130d96a9162d3,2024-04-11T01:25:59.770000
CVE-2024-3361,0,0,c120caf4947180a69c26140d9354a0af916b072bcc15573944dc923bbf223f7d,2024-04-11T01:25:59.847000
CVE-2024-3362,0,0,4f698660b915c64322658e8738d0fb3f09460cf98fd487b3189e8f9d96e2b2c1,2024-04-11T01:25:59.930000
CVE-2024-33627,1,1,6bd293ec393a12757f348a08df0a807d274a93e48d6a424cd8ed2e1993e9af24,2024-04-29T08:15:07.367000
CVE-2024-33629,1,1,7451df54ae983be1843ec70db21b668071acfab04684129da17a41f9e4f5a70f,2024-04-29T08:15:07.640000
CVE-2024-3363,0,0,f5bcc8af5a66d22a73abe7e86b636154362f284983c790b03385b20aa4737ceb,2024-04-11T01:26:00.010000
CVE-2024-33630,1,1,d429997353148ad4f03de5fcc4c3beaa034ad03ad4bb2b1118cf25cea4d32b29,2024-04-29T06:15:14.450000
CVE-2024-33631,1,1,c9134f1e88711f8a04a135872712a121867f709063e57f4fb1d965c1ed67f734,2024-04-29T06:15:14.940000
CVE-2024-33632,1,1,f4f40947da0388a7ccb639f255eb9d8f044af737b4c70d0121643974544be28d,2024-04-29T06:15:15.537000
CVE-2024-33630,0,0,d429997353148ad4f03de5fcc4c3beaa034ad03ad4bb2b1118cf25cea4d32b29,2024-04-29T06:15:14.450000
CVE-2024-33631,0,0,c9134f1e88711f8a04a135872712a121867f709063e57f4fb1d965c1ed67f734,2024-04-29T06:15:14.940000
CVE-2024-33632,0,0,f4f40947da0388a7ccb639f255eb9d8f044af737b4c70d0121643974544be28d,2024-04-29T06:15:15.537000
CVE-2024-33633,0,0,14ae8b34b1aba55606c0bcadc7809f885230f727e35d21246f86a6c94ca95b9f,2024-04-29T05:15:06.507000
CVE-2024-33634,1,1,7c3d356780beb93432a0e8b51f643638872933a4cee73820a4c86a4470818a9b,2024-04-29T08:15:07.830000
CVE-2024-33635,1,1,c95e29b9a1ad1d8dfb46c7dde2788e355ca94abf4e510c87e381e8c28a569823,2024-04-29T09:15:08.460000
CVE-2024-33636,1,1,c5b178766ef408aa0a01f491826a34cda7a22147287653a27a481b3e6d345fd1,2024-04-29T09:15:08.640000
CVE-2024-33637,1,1,e0f43624862cba671c8f707d69b8ea9ebc41776e51399eeb6e5319abd0b8c50d,2024-04-29T08:15:08.007000
CVE-2024-33638,0,0,3427361ab991422b101cc37f7607a376f6587ef09d6fc7a47e3613da65e0631b,2024-04-26T12:58:17.720000
CVE-2024-33639,0,0,c46b4523c8f0d554545e91766a68c1aa539c722a582823f8a257dc980bedbf11,2024-04-26T12:58:17.720000
CVE-2024-3364,0,0,2986dc00429f74e0e2572cb8153933c26e825f7eed092370bca7e4ac84ee4fdf,2024-04-11T01:26:00.090000
CVE-2024-33640,0,0,569f42cf53adfed99d6bea04072e40faa2e5188d736f2609872b6d759c9e31ac,2024-04-29T05:15:06.757000
CVE-2024-33641,1,1,a4251f6ea07e08afbeb0bf2d03ec4e4c399ced810e586f0e722387b3653df811,2024-04-29T08:15:08.200000
CVE-2024-33642,0,0,7569707402e488c170fb19233ca774daa51c8f856e1cd5f3428c5b203d123531,2024-04-26T12:58:17.720000
CVE-2024-33643,0,0,0ff6c747729a96b60f6ad504f202ccec54992f8c5c6e4d4ffb32ec39b77ce94a,2024-04-29T05:15:06.960000
CVE-2024-33645,0,0,85d2eafbf303b88d1d1d02964653d2fa337d6e4277b033b67c0b7e23c7278b7a,2024-04-29T05:15:07.153000
@ -246678,6 +246694,7 @@ CVE-2024-33649,0,0,76be47f9e9623693c2dc4f7dbd7700f237602a11cf08c5a162589622dee41
CVE-2024-3365,0,0,64a2e531185071bb7e6b7a9cf067546b0c6c5f700f703a6639ecd4e081a3dcb7,2024-04-11T01:26:00.170000
CVE-2024-33650,0,0,19d8d8a0b27cf4dde85e5f92d8bf04c572aaff417d777c3294978343c2e4f677,2024-04-26T12:58:17.720000
CVE-2024-33651,0,0,1cefad65f2bec7e29ec0f3af20b45cba9167a66152171d6da2043875d9e6dcf1,2024-04-26T12:58:17.720000
CVE-2024-33652,1,1,bb7b23e1593a340c3c6db2f3594ba525e0f418b8d14449e6abdfdb58acdc7dfc,2024-04-29T08:15:08.383000
CVE-2024-3366,0,0,641beaaa3f9fd7d2de3006c0b03aadadafd130dcdab91419774c604b06cf9b30,2024-04-11T01:26:00.240000
CVE-2024-33661,0,0,335b3962b8b35021f7d1525fb53b5e1ed72d069375d3f8ee59966d5db4f26d91,2024-04-26T12:58:17.720000
CVE-2024-33663,0,0,ec8e93da37d2d2637b8f6a349ca26f3f71e8cd5e6cb10be23a57d50df0caa826,2024-04-26T12:58:17.720000
@ -246696,10 +246713,11 @@ CVE-2024-33677,0,0,923eddda39cd03a5bb517e05a480a9596b3c6c82a0ed2f89c09750c19ea74
CVE-2024-33678,0,0,e29c82afa965b755a6e3188aace0a357ae40d5fe9b52b7f7177043f7792e9dd7,2024-04-26T12:58:17.720000
CVE-2024-33679,0,0,f84e540fe859a7afe5f4ff76589343075f3d0bdf8c9cff62c28aa7a3f40455e2,2024-04-26T12:58:17.720000
CVE-2024-33680,0,0,0b464bc2ce373b95fed587888415ba32213dd9ce01298ab4cd8f52af9d530aea,2024-04-26T12:58:17.720000
CVE-2024-33681,1,1,548950ce0064cdd92a907d7ce32bf554f4a3c02c1609223f9d1197b4fd07d45c,2024-04-29T06:15:16.057000
CVE-2024-33681,0,0,548950ce0064cdd92a907d7ce32bf554f4a3c02c1609223f9d1197b4fd07d45c,2024-04-29T06:15:16.057000
CVE-2024-33682,0,0,2077d9f86dbcd7afb58135718cb00b93d9684082b8213c0215eee7a02c222543,2024-04-26T12:58:17.720000
CVE-2024-33683,0,0,d7c4bf8bbdd8bd3ca6f26bbf7a4bf0688b7570f813369db65ed2d59e99a11ae9,2024-04-26T12:58:17.720000
CVE-2024-33686,1,1,cb11bce9d4222859e78a22a350bf0fbd12a312d0c6cee087f3196d5cf87e6c79,2024-04-29T06:15:16.623000
CVE-2024-33684,1,1,13115094fafe12c8a45609d682b3f7f12077f3ddd305c85974dca87e43b95406,2024-04-29T09:15:08.833000
CVE-2024-33686,0,0,cb11bce9d4222859e78a22a350bf0fbd12a312d0c6cee087f3196d5cf87e6c79,2024-04-29T06:15:16.623000
CVE-2024-33688,0,0,15c623ea6d0e85e99afd20753787faa07eb45674316852700f3732b9713c4938,2024-04-26T15:32:22.523000
CVE-2024-33689,0,0,9a3d372175f3eea45d33e57473572a2b8c9a57d63f47cd918b323f42ce5db301,2024-04-26T15:32:22.523000
CVE-2024-3369,0,0,943fbc9826beb11428b980e60e48ec152ecf5fda97b5d1c26bb0e96c030079eb,2024-04-11T01:26:00.317000
@ -246712,6 +246730,7 @@ CVE-2024-33695,0,0,1d926ddf5c81a389bb7d8e4855841dceb198002508750e6d1b49d88c03728
CVE-2024-33696,0,0,073bc1cd15f6e8f569b263e3a552dcd1544b7a88083033c38736ec61b1c19277,2024-04-26T15:32:22.523000
CVE-2024-33697,0,0,f1a322dee5ec8563df23e02e8d701179da9c0f74bc61aaadca8daa27bdd8a04b,2024-04-26T15:32:22.523000
CVE-2024-3371,0,0,a0481e14f6cfcb9b0215a88c87fda086117ad0add8d553a83f1550e7381c3170,2024-04-26T15:15:49.357000
CVE-2024-3375,1,1,ce382d1eeef77887b1f05ea91dffb7654a2e9ab836368bbd657742b42f2551ed,2024-04-29T09:15:09.017000
CVE-2024-3376,0,0,f944ee3af49afac066405b13bcc14ad1a3aba304f57c015d653c31ce71a21bf1,2024-04-11T01:26:00.397000
CVE-2024-3377,0,0,4f5c5a9a0c925d4c25c7e7a8167aad399bf59289271bce69d10c801ec2848ece,2024-04-11T01:26:00.473000
CVE-2024-3378,0,0,4f86c276b9b6898b0be7d5e038b0b93861aa9bc2234c5fb397df84486317a3f0,2024-04-14T04:15:56.560000
@ -246727,8 +246746,8 @@ CVE-2024-33883,0,0,3b17b48394bf62744fbd468bf457ba6f01138ca86f08a667646ea9846d188
CVE-2024-33891,0,0,4d067bbdb453306352bedaf699cdd4319a93f8f140e1ffcfce72980a6fa91b2e,2024-04-28T23:15:07.200000
CVE-2024-33899,0,0,83c5c675381e020685b43fd536d5112506568fc46560c71323f3b12b51ed8097,2024-04-29T00:15:07.773000
CVE-2024-33903,0,0,d96c3db96f0e438997e300c2112a3a0d050aa12880229d964d5b557d89ba9aa1,2024-04-29T01:15:09.600000
CVE-2024-33904,1,1,f1065144aff1f3a07dac950b2bff4e0d7bebc724ec8bb15e6e11e7eef4705f37,2024-04-29T06:15:17.320000
CVE-2024-33905,1,1,5f8214ca78ea0daa3bd7aaf864c15a416c36c5d929bc1d8c2eeecabcee92677e,2024-04-29T06:15:17.667000
CVE-2024-33904,0,0,f1065144aff1f3a07dac950b2bff4e0d7bebc724ec8bb15e6e11e7eef4705f37,2024-04-29T06:15:17.320000
CVE-2024-33905,0,0,5f8214ca78ea0daa3bd7aaf864c15a416c36c5d929bc1d8c2eeecabcee92677e,2024-04-29T06:15:17.667000
CVE-2024-3400,0,0,5bb68c1f741d7492d6e3e08b6f1711eb6e28a4a827bd2f3f354ccd1b7a47a1fe,2024-04-23T19:57:25.207000
CVE-2024-3413,0,0,7c0263f5aa26015f580f259b17ac76e3fb232807ce6eb6b3e0fa4a42d34def58,2024-04-11T01:26:00.727000
CVE-2024-3414,0,0,fcf8b2012e3dcab7048965e9d40e8c26f25a86217cc70e6c24a2ae712b119943,2024-04-11T01:26:00.803000
@ -247062,5 +247081,5 @@ CVE-2024-4298,0,0,f9266dd2ad13ca247a2df7083a82f45a12f2423c014a4332f080e78d4a3074
CVE-2024-4299,0,0,6dce476fcec521482054b6b4839e21007c148c2a950959748caa8366570861ec,2024-04-29T04:15:08.623000
CVE-2024-4300,0,0,7a5406d5809ec914ba2d29d702f12271779019152ddc347a0ac4109f28246321,2024-04-29T04:15:08.887000
CVE-2024-4301,0,0,ac824d829df059c2e56cb3512d1d60cfb48e2f3b0d50bb1c7774c0330baa7e64,2024-04-29T04:15:09.110000
CVE-2024-4302,1,1,974068c107cd4e505ac6377f0f4fb62ae26afdc69c450f8704f68a7f42518f2c,2024-04-29T06:15:17.803000
CVE-2024-4303,1,1,269dace03dedf0bc843109dbe92c35792422f71f9659b58da62f3fe6d0141fa9,2024-04-29T06:15:18.457000
CVE-2024-4302,0,0,974068c107cd4e505ac6377f0f4fb62ae26afdc69c450f8704f68a7f42518f2c,2024-04-29T06:15:17.803000
CVE-2024-4303,0,0,269dace03dedf0bc843109dbe92c35792422f71f9659b58da62f3fe6d0141fa9,2024-04-29T06:15:18.457000

Can't render this file because it is too large.