Auto-Update: 2024-06-09T10:00:18.752344+00:00

This commit is contained in:
cad-safe-bot 2024-06-09 10:03:11 +00:00
parent ca08401903
commit d16e35d7ae
13 changed files with 669 additions and 6 deletions

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2023-51494",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-06-09T09:15:08.793",
"lastModified": "2024-06-09T09:15:08.793",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Missing Authorization vulnerability in Woo WooCommerce Product Vendors.This issue affects WooCommerce Product Vendors: from n/a through 2.2.1."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 5.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 3.9,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-862"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/woocommerce-product-vendors/wordpress-woocommerce-product-vendors-plugin-2-2-1-broken-access-control-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2023-52230",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-06-09T09:15:09.150",
"lastModified": "2024-06-09T09:15:09.150",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Missing Authorization vulnerability in Pluggabl LLC Booster Plus for WooCommerce.This issue affects Booster Plus for WooCommerce: from n/a before 7.1.3."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-862"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/booster-plus-for-woocommerce/wordpress-booster-plus-for-woocommerce-plugin-7-1-3-authenticated-arbitrary-wordpress-option-disclosure-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2023-52232",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-06-09T09:15:09.513",
"lastModified": "2024-06-09T09:15:09.513",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Missing Authorization vulnerability in Pluggabl LLC Booster Plus for WooCommerce.This issue affects Booster Plus for WooCommerce: from n/a before 7.1.2."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-862"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/booster-plus-for-woocommerce/wordpress-booster-plus-for-woocommerce-plugin-7-1-2-authenticated-arbitrary-post-page-deletion-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2024-30534",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-06-09T09:15:09.830",
"lastModified": "2024-06-09T09:15:09.830",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Missing Authorization vulnerability in typps Calendarista Basic Edition.This issue affects Calendarista Basic Edition: from n/a through 3.0.5."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "LOW",
"baseScore": 6.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 3.9,
"impactScore": 2.5
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-862"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/calendarista-basic-edition/wordpress-calendarista-basic-edition-plugin-3-0-5-broken-access-control-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2024-30537",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-06-09T09:15:10.130",
"lastModified": "2024-06-09T09:15:10.130",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Missing Authorization vulnerability in WPClever WPC Badge Management for WooCommerce.This issue affects WPC Badge Management for WooCommerce: from n/a through 2.4.0."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-862"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/wpc-badge-management/wordpress-wpc-badge-management-for-woocommerce-plugin-2-4-0-broken-access-control-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2024-30538",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-06-09T09:15:10.507",
"lastModified": "2024-06-09T09:15:10.507",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Missing Authorization vulnerability in DELUCKS GmbH DELUCKS SEO.This issue affects DELUCKS SEO: from n/a through 2.5.4."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 3.9,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-862"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/delucks-seo/wordpress-delucks-seo-plugin-2-5-4-broken-access-control-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2024-30539",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-06-09T09:15:10.817",
"lastModified": "2024-06-09T09:15:10.817",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Missing Authorization vulnerability in Awesome Support Team Awesome Support.This issue affects Awesome Support: from n/a through 6.1.7."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 3.9,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-862"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/awesome-support/wordpress-awesome-support-plugin-6-1-7-broken-access-control-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2024-31098",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-06-09T09:15:11.073",
"lastModified": "2024-06-09T09:15:11.073",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Missing Authorization vulnerability in Mr.Ebabi New Order Notification for Woocommerce.This issue affects New Order Notification for Woocommerce: from n/a through 2.0.2."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "NONE",
"baseScore": 8.1,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.2
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-862"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/new-order-notification-for-woocommerce/wordpress-new-order-notification-for-woocommerce-plugin-2-0-2-broken-access-control-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2024-31246",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-06-09T09:15:11.393",
"lastModified": "2024-06-09T09:15:11.393",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Missing Authorization vulnerability in Post Grid Team by WPXPO PostX \u2013 Gutenberg Blocks for Post Grid.This issue affects PostX \u2013 Gutenberg Blocks for Post Grid: from n/a through 3.2.3."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 2.5
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-862"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/ultimate-post/wordpress-post-grid-gutenberg-blocks-and-wordpress-blog-plugin-postx-plugin-3-2-3-author-post-page-duplication-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2024-31294",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-06-09T09:15:11.710",
"lastModified": "2024-06-09T09:15:11.710",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Missing Authorization vulnerability in Fahad Mahmood WP Sort Order.This issue affects WP Sort Order: from n/a through 1.3.1."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-862"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/wp-sort-order/wordpress-wp-sort-order-plugin-1-3-1-broken-access-control-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -0,0 +1,92 @@
{
"id": "CVE-2024-5775",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-06-09T08:15:23.373",
"lastModified": "2024-06-09T08:15:23.373",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was found in SourceCodester Vehicle Management System 1.0 and classified as critical. Affected by this issue is some unknown functionality of the file updatebill.php. The manipulation of the argument id leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB-267458 is the identifier assigned to this vulnerability."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW",
"baseScore": 6.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 3.4
}
],
"cvssMetricV2": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5
},
"baseSeverity": "HIGH",
"exploitabilityScore": 10.0,
"impactScore": 6.4,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"references": [
{
"url": "https://github.com/CveSecLook/cve/issues/44",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?ctiid.267458",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?id.267458",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?submit.352338",
"source": "cna@vuldb.com"
}
]
}

View File

@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update
```plain
2024-06-09T08:00:18.149746+00:00
2024-06-09T10:00:18.752344+00:00
```
### Most recent CVE Modification Timestamp synchronized with NVD
```plain
2024-06-09T06:15:07.410000+00:00
2024-06-09T09:15:11.710000+00:00
```
### Last Data Feed Release
@ -33,14 +33,24 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
### Total Number of included CVEs
```plain
253101
253112
```
### CVEs added in the last Commit
Recently added CVEs: `1`
Recently added CVEs: `11`
- [CVE-2024-5774](CVE-2024/CVE-2024-57xx/CVE-2024-5774.json) (`2024-06-09T06:15:07.410`)
- [CVE-2023-51494](CVE-2023/CVE-2023-514xx/CVE-2023-51494.json) (`2024-06-09T09:15:08.793`)
- [CVE-2023-52230](CVE-2023/CVE-2023-522xx/CVE-2023-52230.json) (`2024-06-09T09:15:09.150`)
- [CVE-2023-52232](CVE-2023/CVE-2023-522xx/CVE-2023-52232.json) (`2024-06-09T09:15:09.513`)
- [CVE-2024-30534](CVE-2024/CVE-2024-305xx/CVE-2024-30534.json) (`2024-06-09T09:15:09.830`)
- [CVE-2024-30537](CVE-2024/CVE-2024-305xx/CVE-2024-30537.json) (`2024-06-09T09:15:10.130`)
- [CVE-2024-30538](CVE-2024/CVE-2024-305xx/CVE-2024-30538.json) (`2024-06-09T09:15:10.507`)
- [CVE-2024-30539](CVE-2024/CVE-2024-305xx/CVE-2024-30539.json) (`2024-06-09T09:15:10.817`)
- [CVE-2024-31098](CVE-2024/CVE-2024-310xx/CVE-2024-31098.json) (`2024-06-09T09:15:11.073`)
- [CVE-2024-31246](CVE-2024/CVE-2024-312xx/CVE-2024-31246.json) (`2024-06-09T09:15:11.393`)
- [CVE-2024-31294](CVE-2024/CVE-2024-312xx/CVE-2024-31294.json) (`2024-06-09T09:15:11.710`)
- [CVE-2024-5775](CVE-2024/CVE-2024-57xx/CVE-2024-5775.json) (`2024-06-09T08:15:23.373`)
### CVEs modified in the last Commit

View File

@ -237390,6 +237390,7 @@ CVE-2023-51490,0,0,2680f2d6f6375b9824fc6757a48e23b37f978e2d9eb836f9e43a2664af2bf
CVE-2023-51491,0,0,9a630e61b90ae68231ccba63898cc12e25e82adc34d74019316f737ba08d8e2f,2024-03-17T22:38:29.433000
CVE-2023-51492,0,0,0d58b27a14611c109e89a3494fa756a640689ff79517444f7259a888456dbe6f,2024-02-15T06:26:42.423000
CVE-2023-51493,0,0,f83cd3e9ef3ea1708a4f0f0755e074e9ad1d27d8d5ae20aecf4ecfd903ab0733,2024-02-15T06:26:48.450000
CVE-2023-51494,1,1,d88db5342fe5b6412587900764106aa026e3a11f915daf5d22bd3efe84a42ff8,2024-06-09T09:15:08.793000
CVE-2023-51499,0,0,b9b7f0cb79987f6473d87d127fe53323a00f8ae64e5778981713c6a91fb94ca1,2024-04-15T13:15:51.577000
CVE-2023-5150,0,0,2f5e1e90547bd29c8e7cd2b67cb1157d0145916e107fb086f39413bd0ac1897a,2024-05-17T02:32:51.870000
CVE-2023-51500,0,0,82db7ddf130eebd20c9e1d0dc704a5c643e0e5d73482cc7fd8e56f0d34164c19,2024-04-17T12:48:07.510000
@ -237919,7 +237920,9 @@ CVE-2023-52226,0,0,f18226e9f27e785dfc61eeb3839db907e0408d3f53462fb7658d2c7baa33d
CVE-2023-52228,0,0,5aacc2f976942dff5645893eeeee67eaac9a951bc74387f5e36df9c19354987f,2024-03-27T12:29:30.307000
CVE-2023-52229,0,0,ea00ad4e0597affd30c31fe4f98a420e37e7ad7335b14877a8e6dc8a42c24daa,2024-03-20T13:00:16.367000
CVE-2023-5223,0,0,e77b2364283941b08ebd4aa250d136179627e0b7bfa72051c5a974c89d8a0c03,2024-05-17T02:32:54.503000
CVE-2023-52230,1,1,aefc70ad84c0fae531b43751018d7404724edab5d1bdb07bd517064e1719ee6e,2024-06-09T09:15:09.150000
CVE-2023-52231,0,0,b5d4f82f731fe2c9cd0c678c3b61a598c79c626b8e6400879ca4a307d29966f3,2024-03-28T12:42:56.150000
CVE-2023-52232,1,1,451b48f21edde93e23df238b099b3094e93c4a6f0f4c3217bff10ce7dbd76d96,2024-06-09T09:15:09.513000
CVE-2023-52234,0,0,1fff4c9561934a3ed1e9215004c9ee935ccd38ea2e79cd4cda085a56cc775bc1,2024-03-28T12:42:56.150000
CVE-2023-52235,0,0,cd0fd933ddc53865fa09d8b56f84ffa70ea224ae48315dee51674d5a7a8efbaa,2024-04-05T12:40:52.763000
CVE-2023-52239,0,0,53232ab6cc2fc288fa443c530cf5456f2ca2ee6e47506bdc07862ff96f4b1242,2024-02-13T22:50:50.313000
@ -248493,8 +248496,12 @@ CVE-2024-30530,0,0,dbaedca63c2d0063e70329af2f2e13f2d8eb98748a64909895cfdcfc37f36
CVE-2024-30531,0,0,b09c54bc9b690b21f0b4a0d96b7e8e1d6291d5af0953063c3755ba446b38cd3e,2024-04-02T20:31:58.463000
CVE-2024-30532,0,0,357b3cd0362ba41f527f4c50b79023773ef0743103703dd0647d41de653db743,2024-04-02T20:31:58.463000
CVE-2024-30533,0,0,79210a276c197ef0c96ad47c4fb12b67135bbfbac578e6cbb91cd58ced29019a,2024-04-01T01:12:59.077000
CVE-2024-30534,1,1,4b4b8e24a933285bbc933312779792c6d9f7caa52c525fa58fe9de31f2f121e8,2024-06-09T09:15:09.830000
CVE-2024-30535,0,0,44cf559c2f239523454379743fc839df0944a89751d0feea3aa49546c20c2f6f,2024-04-01T01:12:59.077000
CVE-2024-30536,0,0,8b71121133ca2bd2e4e447453aa973175f5a1f5afa02099ef20cc2e88af30470,2024-04-01T01:12:59.077000
CVE-2024-30537,1,1,835d062e8efca1aa4ae9f3637787cc411394880d6b435afa7f2c10f2b15beb19,2024-06-09T09:15:10.130000
CVE-2024-30538,1,1,f049f72fe19b5903498769fbd215528c5a603e266e36375760471022e14e4441,2024-06-09T09:15:10.507000
CVE-2024-30539,1,1,44408f1828b0e984a927f003c020f0f797115a1c2ec5e21b7137434aec80cf4b,2024-06-09T09:15:10.817000
CVE-2024-3054,0,0,926125286f908d4e62beb1186f52b352009c6bf9873091ee97e35e312c717661,2024-04-12T12:43:46.210000
CVE-2024-30540,0,0,9e0acd594b79c3373f59486bddb128a80a243885b6c9fe93fb641f9f766002a0,2024-05-17T18:36:05.263000
CVE-2024-30541,0,0,d78a79d3d88afd14cd20c527bfe41ab0fe37668194e235410187bd48d18e8829,2024-04-01T01:12:59.077000
@ -248793,6 +248800,7 @@ CVE-2024-31094,0,0,a6b61e0ad372a91e5d2c676a3a7e36738ffd5b51e391477ca3daeea89a0f3
CVE-2024-31095,0,0,1d14ad118dbc5bd845ece70c84c008e9141b3dab5e45eee13156e9529c02077c,2024-04-01T01:12:59.077000
CVE-2024-31096,0,0,13378816ee39cd668cfabb3d0026dd951106eddbb455545416d7a9928ee922e3,2024-04-01T01:12:59.077000
CVE-2024-31097,0,0,31f68e0dbefeb0a9ceef4f02934fc228ed8dda21ede5ecd48d87d25620e089ce,2024-04-01T01:12:59.077000
CVE-2024-31098,1,1,94b912c46813d68f96f4bbec8f7ebc042690772905ec046718701f8690148cb3,2024-06-09T09:15:11.073000
CVE-2024-31099,0,0,652e2931976c620c3c3252bc93158bbdd9f5fd91e4aaa8cbd8b6559ef6df5f82,2024-06-05T14:15:13.310000
CVE-2024-3110,0,0,b0d92cf18547129722f65f660fb77c88cd079eabf44be0be50c5ba31b00dcbc8,2024-06-07T14:56:05.647000
CVE-2024-31100,0,0,bb90890800c593ff32b3af632f936b4946ef3ea16c0390d004eb7fe5d4508046,2024-04-01T01:12:59.077000
@ -248866,6 +248874,7 @@ CVE-2024-31240,0,0,9f07781697aa759fcc59082b4c6f556aee9b7696b0665c6342bdd8006b526
CVE-2024-31241,0,0,a7d99fde72ef29ff1cfd0fe2a269999470568d058381f56a307f35a902159e4c,2024-04-08T18:48:40.217000
CVE-2024-31242,0,0,9ee974fc6556a5b879b5916c73230ef7487ed734210b932a96111b95d6ab825e,2024-04-10T19:49:51.183000
CVE-2024-31245,0,0,a6748783471098ea606b7da1fa492f255051d20d67b4ea874b20f32f5f6c40b9,2024-04-10T19:49:51.183000
CVE-2024-31246,1,1,aba338a90df4723614d0f52237646583f6b86fb0ba7a15a5a4e6808934e92090,2024-06-09T09:15:11.393000
CVE-2024-31247,0,0,77f99349b5ee73d1d46417701c14587b13c4fc026bae1e1e3dcacdb5020e8602,2024-04-10T19:49:51.183000
CVE-2024-31249,0,0,dc567d0b773bf4b13e4b74ab8b32236d97624056231327aa00701fee632c0a46,2024-04-10T19:49:51.183000
CVE-2024-3125,0,0,5b368671fb29ca77532e96b321edf6dbd6e260736e386b5fd2355575e1bfdbd2,2024-05-17T02:39:43.820000
@ -248907,6 +248916,7 @@ CVE-2024-31290,0,0,3a4f9021a955fef781c735808d1ec9f5ec2a526e03bbf5b510d3dc4d834c1
CVE-2024-31291,0,0,0650af4fe4b6cc0120edec2cb58310f5b2a57c0e765ec2df7495db5e8150ac38,2024-04-08T18:48:40.217000
CVE-2024-31292,0,0,c70d462af6bc2404bf991c897ce5371715c148323bb7e37fc83e7d154cd03a36,2024-04-08T18:48:40.217000
CVE-2024-31293,0,0,d0aa21216c294f55a61097e89d25c48783b0b8c11d0c131295216d0930c76390,2024-04-15T13:15:51.577000
CVE-2024-31294,1,1,a5e75acf131c7e43e28fc9316c6137b1e2a4051dc9fa8423cd874337c260c9e8,2024-06-09T09:15:11.710000
CVE-2024-31295,0,0,fbc5c144dbe41e3c0abe964cd07f5c1a32364238ec76729bd08a065a2f236dfc,2024-05-17T18:36:05.263000
CVE-2024-31296,0,0,47134b63bac7f8af797ca504db1cf6e76dc826da8fa665ee8c7ed1c27292df1b,2024-04-08T18:48:40.217000
CVE-2024-31297,0,0,88f6848587565ccdefc9d08a51c388afa534b4f0ce7911a5a1799f7110c82c1d,2024-04-10T19:49:51.183000
@ -253099,4 +253109,5 @@ CVE-2024-5770,0,0,fe310be1d952d0455f64ae72c485c582bcaeef4aad88d85c194ca59111d07d
CVE-2024-5771,0,0,544c69d557f3f1445d867df7783efe66cb201979ca9a9a489935450045960947,2024-06-08T22:15:48.660000
CVE-2024-5772,0,0,55d1d1509abf6f5419a43ebc1a23d095faa4e1acb4f2d997ad1c69c5a88ae375,2024-06-09T03:15:54.283000
CVE-2024-5773,0,0,954f9eb7b4746a974f27eda1e428c9287a48b1ae6090ec3d65176457cc9b08ee,2024-06-09T03:15:55.633000
CVE-2024-5774,1,1,6483c48f3ff36d08d9e3f99fccc09c79222b4feff4f777ec7067c878f3fcf0f3,2024-06-09T06:15:07.410000
CVE-2024-5774,0,0,6483c48f3ff36d08d9e3f99fccc09c79222b4feff4f777ec7067c878f3fcf0f3,2024-06-09T06:15:07.410000
CVE-2024-5775,1,1,5eedc0bbb404bece0103429811312f7651b7719ca76e5708dccb4b05663c5f70,2024-06-09T08:15:23.373000

Can't render this file because it is too large.