Auto-Update: 2024-05-31T20:00:38.046133+00:00

This commit is contained in:
cad-safe-bot 2024-05-31 20:03:29 +00:00
parent 4e9fc39a16
commit da81768600
40 changed files with 1150 additions and 55 deletions

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2021-44534",
"sourceIdentifier": "support@hackerone.com",
"published": "2024-05-31T18:15:09.040",
"lastModified": "2024-05-31T19:14:47.793",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "Insufficient user input filtering leads to arbitrary file read by non-authenticated attacker, which results in sensitive information disclosure.\r\n"
}
],
"metrics": {},
"references": [
{
"url": "https://hackerone.com/reports/1096043",
"source": "support@hackerone.com"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-25037",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-05-31T16:15:09.133",
"lastModified": "2024-05-31T16:15:09.133",
"vulnStatus": "Received",
"lastModified": "2024-05-31T19:14:47.793",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-25038",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-05-31T16:15:09.240",
"lastModified": "2024-05-31T16:15:09.240",
"vulnStatus": "Received",
"lastModified": "2024-05-31T19:14:47.793",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -1,8 +1,8 @@
{
"id": "CVE-2023-36268",
"sourceIdentifier": "cve@mitre.org",
"sourceIdentifier": "security@documentfoundation.org",
"published": "2024-04-30T18:15:19.730",
"lastModified": "2024-04-30T19:35:36.960",
"lastModified": "2024-05-31T18:15:09.157",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
@ -15,10 +15,22 @@
}
],
"metrics": {},
"weaknesses": [
{
"source": "security@documentfoundation.org",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-405"
}
]
}
],
"references": [
{
"url": "https://github.com/kfx-N/test1",
"source": "cve@mitre.org"
"source": "security@documentfoundation.org"
}
]
}

View File

@ -0,0 +1,43 @@
{
"id": "CVE-2023-38042",
"sourceIdentifier": "support@hackerone.com",
"published": "2024-05-31T18:15:09.607",
"lastModified": "2024-05-31T19:14:47.793",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "A local privilege escalation vulnerability in Ivanti Secure Access Client for Windows allows a low privileged user to execute code as SYSTEM. "
}
],
"metrics": {
"cvssMetricV30": [
{
"source": "support@hackerone.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]
},
"references": [
{
"url": "https://forums.ivanti.com/s/article/Security-Advisory-May-2024?language=en_US",
"source": "support@hackerone.com"
}
]
}

View File

@ -0,0 +1,43 @@
{
"id": "CVE-2023-38551",
"sourceIdentifier": "support@hackerone.com",
"published": "2024-05-31T18:15:09.780",
"lastModified": "2024-05-31T19:14:47.793",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "A CRLF Injection vulnerability in Ivanti Connect Secure (9.x, 22.x) allows an authenticated high-privileged user to inject malicious code on a victim\u2019s browser, thereby leading to cross-site scripting attack."
}
],
"metrics": {
"cvssMetricV30": [
{
"source": "support@hackerone.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:C/C:L/I:L/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "HIGH",
"baseScore": 8.2,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.3,
"impactScore": 5.3
}
]
},
"references": [
{
"url": "https://forums.ivanti.com/s/article/Security-Advisory-May-2024",
"source": "support@hackerone.com"
}
]
}

View File

@ -0,0 +1,43 @@
{
"id": "CVE-2023-46810",
"sourceIdentifier": "support@hackerone.com",
"published": "2024-05-31T18:15:09.960",
"lastModified": "2024-05-31T19:14:47.793",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "A local privilege escalation vulnerability in Ivanti Secure Access Client for Linux before 22.7R1, allows a low privileged user to execute code as root. "
}
],
"metrics": {
"cvssMetricV30": [
{
"source": "support@hackerone.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.3,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.3,
"impactScore": 5.9
}
]
},
"references": [
{
"url": "https://forums.ivanti.com/s/article/Security-Advisory-May-2024",
"source": "support@hackerone.com"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-7073",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-05-31T15:15:09.190",
"lastModified": "2024-05-31T15:15:09.190",
"vulnStatus": "Received",
"lastModified": "2024-05-31T19:14:47.793",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -0,0 +1,32 @@
{
"id": "CVE-2024-1275",
"sourceIdentifier": "productsecurity@baxter.com",
"published": "2024-05-31T18:15:10.140",
"lastModified": "2024-05-31T19:14:47.793",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "Use of Default Cryptographic Key vulnerability in Baxter Welch Ally Connex Spot Monitor may allow Configuration/Environment Manipulation.This issue affects Welch Ally Connex Spot Monitor in all versions prior to 1.52."
}
],
"metrics": {},
"weaknesses": [
{
"source": "productsecurity@baxter.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-1394"
}
]
}
],
"references": [
{
"url": "https://www.cisa.gov/news-events/ics-medical-advisories/icsma-24-151-02",
"source": "productsecurity@baxter.com"
}
]
}

View File

@ -0,0 +1,43 @@
{
"id": "CVE-2024-22058",
"sourceIdentifier": "support@hackerone.com",
"published": "2024-05-31T18:15:10.317",
"lastModified": "2024-05-31T19:14:47.793",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "A buffer overflow allows a low privilege user on the local machine that has the EPM Agent installed to execute arbitrary code with elevated permissions in Ivanti EPM 2021.1 and older."
}
],
"metrics": {
"cvssMetricV30": [
{
"source": "support@hackerone.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]
},
"references": [
{
"url": "https://forums.ivanti.com/s/article/CVE-2024-22058-Privilege-Escalation-for-Ivanti-Endpoint-Manager-EPM",
"source": "support@hackerone.com"
}
]
}

View File

@ -0,0 +1,43 @@
{
"id": "CVE-2024-22059",
"sourceIdentifier": "support@hackerone.com",
"published": "2024-05-31T18:15:10.493",
"lastModified": "2024-05-31T19:14:47.793",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "A SQL injection vulnerability in web component of Ivanti Neurons for ITSM allows a remote authenticated user to read/modify/delete information in the underlying database. This may also lead to DoS."
}
],
"metrics": {
"cvssMetricV30": [
{
"source": "support@hackerone.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
]
},
"references": [
{
"url": "https://forums.ivanti.com/s/article/Security-Advisory-May-2024",
"source": "support@hackerone.com"
}
]
}

View File

@ -0,0 +1,43 @@
{
"id": "CVE-2024-22060",
"sourceIdentifier": "support@hackerone.com",
"published": "2024-05-31T18:15:10.660",
"lastModified": "2024-05-31T19:14:47.793",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "An unrestricted file upload vulnerability in web component of Ivanti Neurons for ITSM allows a remote, authenticated, high privileged user to write arbitrary files into sensitive directories of ITSM server."
}
],
"metrics": {
"cvssMetricV30": [
{
"source": "support@hackerone.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:C/C:N/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.7,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.3,
"impactScore": 5.8
}
]
},
"references": [
{
"url": "https://forums.ivanti.com/s/article/Security-Advisory-May-2024",
"source": "support@hackerone.com"
}
]
}

View File

@ -0,0 +1,40 @@
{
"id": "CVE-2024-23316",
"sourceIdentifier": "responsible-disclosure@pingidentity.com",
"published": "2024-05-31T19:15:08.723",
"lastModified": "2024-05-31T19:15:08.723",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "HTTP request desynchronization in Ping Identity PingAccess, all versions prior to 8.0.1 affected allows an attacker to send specially crafted http header requests to create a request smuggling condition for proxied requests."
}
],
"metrics": {},
"weaknesses": [
{
"source": "responsible-disclosure@pingidentity.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-444"
}
]
}
],
"references": [
{
"url": "https://docs.pingidentity.com/r/en-us/pingaccess-80/pa_801_rn",
"source": "responsible-disclosure@pingidentity.com"
},
{
"url": "https://support.pingidentity.com/s/article/SECADV045-PA-HTTP-Smuggling",
"source": "responsible-disclosure@pingidentity.com"
},
{
"url": "https://www.pingidentity.com/en/resources/downloads/pingaccess.html",
"source": "responsible-disclosure@pingidentity.com"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-28736",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-05-31T16:15:09.360",
"lastModified": "2024-05-31T16:15:09.360",
"vulnStatus": "Received",
"lastModified": "2024-05-31T19:14:47.793",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -0,0 +1,43 @@
{
"id": "CVE-2024-29822",
"sourceIdentifier": "support@hackerone.com",
"published": "2024-05-31T18:15:10.837",
"lastModified": "2024-05-31T19:14:47.793",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "An unspecified SQL Injection vulnerability in Core server of Ivanti EPM 2022 SU5 and prior allows an unauthenticated attacker within the same network to execute arbitrary code. "
}
],
"metrics": {
"cvssMetricV30": [
{
"source": "support@hackerone.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H",
"attackVector": "ADJACENT_NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.6,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 2.8,
"impactScore": 6.0
}
]
},
"references": [
{
"url": "https://forums.ivanti.com/s/article/Security-Advisory-May-2024",
"source": "support@hackerone.com"
}
]
}

View File

@ -0,0 +1,43 @@
{
"id": "CVE-2024-29823",
"sourceIdentifier": "support@hackerone.com",
"published": "2024-05-31T18:15:11.017",
"lastModified": "2024-05-31T19:14:47.793",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "An unspecified SQL Injection vulnerability in Core server of Ivanti EPM 2022 SU5 and prior allows an unauthenticated attacker within the same network to execute arbitrary code. "
}
],
"metrics": {
"cvssMetricV30": [
{
"source": "support@hackerone.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H",
"attackVector": "ADJACENT_NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.6,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 2.8,
"impactScore": 6.0
}
]
},
"references": [
{
"url": "https://forums.ivanti.com/s/article/Security-Advisory-May-2024",
"source": "support@hackerone.com"
}
]
}

View File

@ -0,0 +1,43 @@
{
"id": "CVE-2024-29824",
"sourceIdentifier": "support@hackerone.com",
"published": "2024-05-31T18:15:11.177",
"lastModified": "2024-05-31T19:14:47.793",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "An unspecified SQL Injection vulnerability in Core server of Ivanti EPM 2022 SU5 and prior allows an unauthenticated attacker within the same network to execute arbitrary code."
}
],
"metrics": {
"cvssMetricV30": [
{
"source": "support@hackerone.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H",
"attackVector": "ADJACENT_NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.6,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 2.8,
"impactScore": 6.0
}
]
},
"references": [
{
"url": "https://forums.ivanti.com/s/article/Security-Advisory-May-2024",
"source": "support@hackerone.com"
}
]
}

View File

@ -0,0 +1,43 @@
{
"id": "CVE-2024-29825",
"sourceIdentifier": "support@hackerone.com",
"published": "2024-05-31T18:15:11.443",
"lastModified": "2024-05-31T19:14:47.793",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "An unspecified SQL Injection vulnerability in Core server of Ivanti EPM 2022 SU5 and prior allows an unauthenticated attacker within the same network to execute arbitrary code."
}
],
"metrics": {
"cvssMetricV30": [
{
"source": "support@hackerone.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H",
"attackVector": "ADJACENT_NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.6,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 2.8,
"impactScore": 6.0
}
]
},
"references": [
{
"url": "https://forums.ivanti.com/s/article/Security-Advisory-May-2024",
"source": "support@hackerone.com"
}
]
}

View File

@ -0,0 +1,43 @@
{
"id": "CVE-2024-29826",
"sourceIdentifier": "support@hackerone.com",
"published": "2024-05-31T18:15:11.617",
"lastModified": "2024-05-31T19:14:47.793",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "An unspecified SQL Injection vulnerability in Core server of Ivanti EPM 2022 SU5 and prior allows an unauthenticated attacker within the same network to execute arbitrary code."
}
],
"metrics": {
"cvssMetricV30": [
{
"source": "support@hackerone.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H",
"attackVector": "ADJACENT_NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.6,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 2.8,
"impactScore": 6.0
}
]
},
"references": [
{
"url": "https://forums.ivanti.com/s/article/Security-Advisory-May-2024",
"source": "support@hackerone.com"
}
]
}

View File

@ -0,0 +1,43 @@
{
"id": "CVE-2024-29827",
"sourceIdentifier": "support@hackerone.com",
"published": "2024-05-31T18:15:11.780",
"lastModified": "2024-05-31T19:14:47.793",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "An unspecified SQL Injection vulnerability in Core server of Ivanti EPM 2022 SU5 and prior allows an unauthenticated attacker within the same network to execute arbitrary code. "
}
],
"metrics": {
"cvssMetricV30": [
{
"source": "support@hackerone.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H",
"attackVector": "ADJACENT_NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.6,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 2.8,
"impactScore": 6.0
}
]
},
"references": [
{
"url": "https://forums.ivanti.com/s/article/Security-Advisory-May-2024",
"source": "support@hackerone.com"
}
]
}

View File

@ -0,0 +1,43 @@
{
"id": "CVE-2024-29828",
"sourceIdentifier": "support@hackerone.com",
"published": "2024-05-31T18:15:11.947",
"lastModified": "2024-05-31T19:14:47.793",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "An unspecified SQL Injection vulnerability in Core server of Ivanti EPM 2022 SU5 and prior allows an authenticated attacker within the same network to execute arbitrary code."
}
],
"metrics": {
"cvssMetricV30": [
{
"source": "support@hackerone.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:A/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H",
"attackVector": "ADJACENT_NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.4,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.7,
"impactScore": 6.0
}
]
},
"references": [
{
"url": "https://forums.ivanti.com/s/article/Security-Advisory-May-2024",
"source": "support@hackerone.com"
}
]
}

View File

@ -0,0 +1,43 @@
{
"id": "CVE-2024-29829",
"sourceIdentifier": "support@hackerone.com",
"published": "2024-05-31T18:15:12.107",
"lastModified": "2024-05-31T19:14:47.793",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "An unspecified SQL Injection vulnerability in Core server of Ivanti EPM 2022 SU5 and prior allows an authenticated attacker within the same network to execute arbitrary code."
}
],
"metrics": {
"cvssMetricV30": [
{
"source": "support@hackerone.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:A/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H",
"attackVector": "ADJACENT_NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.4,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.7,
"impactScore": 6.0
}
]
},
"references": [
{
"url": "https://forums.ivanti.com/s/article/Security-Advisory-May-2024",
"source": "support@hackerone.com"
}
]
}

View File

@ -0,0 +1,43 @@
{
"id": "CVE-2024-29830",
"sourceIdentifier": "support@hackerone.com",
"published": "2024-05-31T18:15:12.390",
"lastModified": "2024-05-31T19:14:47.793",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "An unspecified SQL Injection vulnerability in Core server of Ivanti EPM 2022 SU5 and prior allows an authenticated attacker within the same network to execute arbitrary code."
}
],
"metrics": {
"cvssMetricV30": [
{
"source": "support@hackerone.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:A/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H",
"attackVector": "ADJACENT_NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.4,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.7,
"impactScore": 6.0
}
]
},
"references": [
{
"url": "https://forums.ivanti.com/s/article/Security-Advisory-May-2024",
"source": "support@hackerone.com"
}
]
}

View File

@ -0,0 +1,43 @@
{
"id": "CVE-2024-29846",
"sourceIdentifier": "support@hackerone.com",
"published": "2024-05-31T18:15:12.557",
"lastModified": "2024-05-31T19:14:47.793",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "An unspecified SQL Injection vulnerability in Core server of Ivanti EPM 2022 SU5 and prior allows an authenticated attacker within the same network to execute arbitrary code."
}
],
"metrics": {
"cvssMetricV30": [
{
"source": "support@hackerone.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:A/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H",
"attackVector": "ADJACENT_NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.4,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.7,
"impactScore": 6.0
}
]
},
"references": [
{
"url": "https://www.ivanti.com/blog/topics/security-advisory",
"source": "support@hackerone.com"
}
]
}

View File

@ -0,0 +1,43 @@
{
"id": "CVE-2024-29848",
"sourceIdentifier": "support@hackerone.com",
"published": "2024-05-31T18:15:12.727",
"lastModified": "2024-05-31T19:14:47.793",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "An unrestricted file upload vulnerability in web component of Ivanti Avalanche before 6.4.x allows an authenticated, privileged user to execute arbitrary commands as SYSTEM. "
}
],
"metrics": {
"cvssMetricV30": [
{
"source": "support@hackerone.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.2,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.2,
"impactScore": 5.9
}
]
},
"references": [
{
"url": "https://forums.ivanti.com/s/article/Security-Advisory-May-2024",
"source": "support@hackerone.com"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2024-31030",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-05-31T18:15:12.893",
"lastModified": "2024-05-31T19:14:47.793",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "An issue in coap_msg.c in Keith Cullen's FreeCoAP v.0.7 allows remote attackers to cause a Denial of Service or potentially disclose information via a specially crafted packet."
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/keith-cullen/FreeCoAP/issues/36",
"source": "cve@mitre.org"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-31889",
"sourceIdentifier": "psirt@us.ibm.com",
"published": "2024-05-31T13:15:09.407",
"lastModified": "2024-05-31T13:15:09.407",
"vulnStatus": "Received",
"lastModified": "2024-05-31T19:14:47.793",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-31907",
"sourceIdentifier": "psirt@us.ibm.com",
"published": "2024-05-31T13:15:09.637",
"lastModified": "2024-05-31T13:15:09.637",
"vulnStatus": "Received",
"lastModified": "2024-05-31T19:14:47.793",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-31908",
"sourceIdentifier": "psirt@us.ibm.com",
"published": "2024-05-31T13:15:09.853",
"lastModified": "2024-05-31T13:15:09.853",
"vulnStatus": "Received",
"lastModified": "2024-05-31T19:14:47.793",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-35140",
"sourceIdentifier": "psirt@us.ibm.com",
"published": "2024-05-31T17:15:08.837",
"lastModified": "2024-05-31T17:15:08.837",
"vulnStatus": "Received",
"lastModified": "2024-05-31T19:14:47.793",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-35142",
"sourceIdentifier": "psirt@us.ibm.com",
"published": "2024-05-31T17:15:09.080",
"lastModified": "2024-05-31T17:15:09.080",
"vulnStatus": "Received",
"lastModified": "2024-05-31T19:14:47.793",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -0,0 +1,79 @@
{
"id": "CVE-2024-35196",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-05-31T18:15:12.993",
"lastModified": "2024-05-31T19:14:47.793",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "Sentry is a developer-first error tracking and performance monitoring platform. Sentry's Slack integration incorrectly records the incoming request body in logs. This request data can contain sensitive information, including the deprecated Slack verification token. With this verification token, it is possible under specific configurations, an attacker can forge requests and act as the Slack integration. The request body is leaked in log entries matching `event == \"slack.*\" && name == \"sentry.integrations.slack\" && request_data == *`. The deprecated slack verification token, will be found in the `request_data.token` key. **SaaS users** do not need to take any action. **Self-hosted users** should upgrade to version 24.5.0 or higher, rotate their Slack verification token, and use the Slack Signing Secret instead of the verification token. For users only using the `slack.signing-secret` in their self-hosted configuration, the legacy verification token is not used to verify the webhook payload. It is ignored. Users unable to upgrade should either set the `slack.signing-secret` instead of `slack.verification-token`. The signing secret is Slack's recommended way of authenticating webhooks. By having `slack.singing-secret` set, Sentry self-hosted will no longer use the verification token for authentication of the webhooks, regardless of whether `slack.verification-token` is set or not. Alternatively if the self-hosted instance is unable to be upgraded or re-configured to use the `slack.signing-secret`, the logging configuration can be adjusted to not generate logs from the integration. The default logging configuration can be found in `src/sentry/conf/server.py`. **Services should be restarted once the configuration change is saved.**\n"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:L/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "HIGH",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 2.0,
"baseSeverity": "LOW"
},
"exploitabilityScore": 0.5,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-532"
}
]
}
],
"references": [
{
"url": "https://api.slack.com/authentication/verifying-requests-from-slack#app-management-updates",
"source": "security-advisories@github.com"
},
{
"url": "https://api.slack.com/authentication/verifying-requests-from-slack#deprecation",
"source": "security-advisories@github.com"
},
{
"url": "https://api.slack.com/authentication/verifying-requests-from-slack#regenerating",
"source": "security-advisories@github.com"
},
{
"url": "https://develop.sentry.dev/integrations/slack",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/getsentry/sentry/blob/17d2b87e39ccd57e11da4deed62971ff306253d1/src/sentry/conf/server.py#L1307",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/getsentry/sentry/pull/70508",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/getsentry/sentry/security/advisories/GHSA-c2g2-gx4j-rj3j",
"source": "security-advisories@github.com"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-36108",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-05-31T15:15:09.457",
"lastModified": "2024-05-31T15:15:09.457",
"vulnStatus": "Received",
"lastModified": "2024-05-31T19:14:47.793",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-36120",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-05-31T17:15:09.317",
"lastModified": "2024-05-31T17:15:09.317",
"vulnStatus": "Received",
"lastModified": "2024-05-31T19:14:47.793",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -0,0 +1,15 @@
{
"id": "CVE-2024-5144",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-05-31T18:15:13.217",
"lastModified": "2024-05-31T18:15:13.217",
"vulnStatus": "Rejected",
"descriptions": [
{
"lang": "en",
"value": "Rejected reason: ** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2024-4342. Reason: This candidate is a reservation duplicate of CVE-2024-4342. Notes: All CVE users should reference CVE-2024-4342 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage."
}
],
"metrics": {},
"references": []
}

View File

@ -0,0 +1,32 @@
{
"id": "CVE-2024-5176",
"sourceIdentifier": "productsecurity@baxter.com",
"published": "2024-05-31T18:15:13.280",
"lastModified": "2024-05-31T19:14:47.793",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "Insufficiently Protected Credentials vulnerability in Baxter Welch Allyn Configuration Tool may allow Remote Services with Stolen Credentials.This issue affects Welch Allyn Configuration Tool: versions 1.9.4.1 and prior."
}
],
"metrics": {},
"weaknesses": [
{
"source": "productsecurity@baxter.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-522"
}
]
}
],
"references": [
{
"url": "https://cisa.gov/news-events/ics-medical-advisories/icsma-24-151-01",
"source": "productsecurity@baxter.com"
}
]
}

View File

@ -0,0 +1,59 @@
{
"id": "CVE-2024-5564",
"sourceIdentifier": "secalert@redhat.com",
"published": "2024-05-31T19:15:08.883",
"lastModified": "2024-05-31T19:15:08.883",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was found in libndp. This flaw allows a local malicious user to cause a buffer overflow in NetworkManager, triggered by sending a malformed IPv6 router advertisement packet. This issue occurred as libndp was not correctly validating the route length information."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "secalert@redhat.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "HIGH",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.4,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.4,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "secalert@redhat.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-120"
}
]
}
],
"references": [
{
"url": "https://access.redhat.com/security/cve/CVE-2024-5564",
"source": "secalert@redhat.com"
},
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2284122",
"source": "secalert@redhat.com"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-5565",
"sourceIdentifier": "reefs@jfrog.com",
"published": "2024-05-31T15:15:09.673",
"lastModified": "2024-05-31T15:15:09.673",
"vulnStatus": "Received",
"lastModified": "2024-05-31T19:14:47.793",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update
```plain
2024-05-31T18:00:38.559484+00:00
2024-05-31T20:00:38.046133+00:00
```
### Most recent CVE Modification Timestamp synchronized with NVD
```plain
2024-05-31T17:15:09.317000+00:00
2024-05-31T19:15:08.883000+00:00
```
### Last Data Feed Release
@ -33,27 +33,57 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
### Total Number of included CVEs
```plain
252301
252326
```
### CVEs added in the last Commit
Recently added CVEs: `6`
Recently added CVEs: `25`
- [CVE-2022-25037](CVE-2022/CVE-2022-250xx/CVE-2022-25037.json) (`2024-05-31T16:15:09.133`)
- [CVE-2022-25038](CVE-2022/CVE-2022-250xx/CVE-2022-25038.json) (`2024-05-31T16:15:09.240`)
- [CVE-2024-28736](CVE-2024/CVE-2024-287xx/CVE-2024-28736.json) (`2024-05-31T16:15:09.360`)
- [CVE-2024-35140](CVE-2024/CVE-2024-351xx/CVE-2024-35140.json) (`2024-05-31T17:15:08.837`)
- [CVE-2024-35142](CVE-2024/CVE-2024-351xx/CVE-2024-35142.json) (`2024-05-31T17:15:09.080`)
- [CVE-2024-36120](CVE-2024/CVE-2024-361xx/CVE-2024-36120.json) (`2024-05-31T17:15:09.317`)
- [CVE-2021-44534](CVE-2021/CVE-2021-445xx/CVE-2021-44534.json) (`2024-05-31T18:15:09.040`)
- [CVE-2023-38042](CVE-2023/CVE-2023-380xx/CVE-2023-38042.json) (`2024-05-31T18:15:09.607`)
- [CVE-2023-38551](CVE-2023/CVE-2023-385xx/CVE-2023-38551.json) (`2024-05-31T18:15:09.780`)
- [CVE-2023-46810](CVE-2023/CVE-2023-468xx/CVE-2023-46810.json) (`2024-05-31T18:15:09.960`)
- [CVE-2024-1275](CVE-2024/CVE-2024-12xx/CVE-2024-1275.json) (`2024-05-31T18:15:10.140`)
- [CVE-2024-22058](CVE-2024/CVE-2024-220xx/CVE-2024-22058.json) (`2024-05-31T18:15:10.317`)
- [CVE-2024-22059](CVE-2024/CVE-2024-220xx/CVE-2024-22059.json) (`2024-05-31T18:15:10.493`)
- [CVE-2024-22060](CVE-2024/CVE-2024-220xx/CVE-2024-22060.json) (`2024-05-31T18:15:10.660`)
- [CVE-2024-23316](CVE-2024/CVE-2024-233xx/CVE-2024-23316.json) (`2024-05-31T19:15:08.723`)
- [CVE-2024-29822](CVE-2024/CVE-2024-298xx/CVE-2024-29822.json) (`2024-05-31T18:15:10.837`)
- [CVE-2024-29823](CVE-2024/CVE-2024-298xx/CVE-2024-29823.json) (`2024-05-31T18:15:11.017`)
- [CVE-2024-29824](CVE-2024/CVE-2024-298xx/CVE-2024-29824.json) (`2024-05-31T18:15:11.177`)
- [CVE-2024-29825](CVE-2024/CVE-2024-298xx/CVE-2024-29825.json) (`2024-05-31T18:15:11.443`)
- [CVE-2024-29826](CVE-2024/CVE-2024-298xx/CVE-2024-29826.json) (`2024-05-31T18:15:11.617`)
- [CVE-2024-29827](CVE-2024/CVE-2024-298xx/CVE-2024-29827.json) (`2024-05-31T18:15:11.780`)
- [CVE-2024-29828](CVE-2024/CVE-2024-298xx/CVE-2024-29828.json) (`2024-05-31T18:15:11.947`)
- [CVE-2024-29829](CVE-2024/CVE-2024-298xx/CVE-2024-29829.json) (`2024-05-31T18:15:12.107`)
- [CVE-2024-29830](CVE-2024/CVE-2024-298xx/CVE-2024-29830.json) (`2024-05-31T18:15:12.390`)
- [CVE-2024-29846](CVE-2024/CVE-2024-298xx/CVE-2024-29846.json) (`2024-05-31T18:15:12.557`)
- [CVE-2024-29848](CVE-2024/CVE-2024-298xx/CVE-2024-29848.json) (`2024-05-31T18:15:12.727`)
- [CVE-2024-31030](CVE-2024/CVE-2024-310xx/CVE-2024-31030.json) (`2024-05-31T18:15:12.893`)
- [CVE-2024-35196](CVE-2024/CVE-2024-351xx/CVE-2024-35196.json) (`2024-05-31T18:15:12.993`)
- [CVE-2024-5144](CVE-2024/CVE-2024-51xx/CVE-2024-5144.json) (`2024-05-31T18:15:13.217`)
- [CVE-2024-5176](CVE-2024/CVE-2024-51xx/CVE-2024-5176.json) (`2024-05-31T18:15:13.280`)
- [CVE-2024-5564](CVE-2024/CVE-2024-55xx/CVE-2024-5564.json) (`2024-05-31T19:15:08.883`)
### CVEs modified in the last Commit
Recently modified CVEs: `2`
Recently modified CVEs: `13`
- [CVE-2024-24919](CVE-2024/CVE-2024-249xx/CVE-2024-24919.json) (`2024-05-31T16:04:09.703`)
- [CVE-2024-4978](CVE-2024/CVE-2024-49xx/CVE-2024-4978.json) (`2024-05-31T16:03:52.247`)
- [CVE-2022-25037](CVE-2022/CVE-2022-250xx/CVE-2022-25037.json) (`2024-05-31T19:14:47.793`)
- [CVE-2022-25038](CVE-2022/CVE-2022-250xx/CVE-2022-25038.json) (`2024-05-31T19:14:47.793`)
- [CVE-2023-36268](CVE-2023/CVE-2023-362xx/CVE-2023-36268.json) (`2024-05-31T18:15:09.157`)
- [CVE-2023-7073](CVE-2023/CVE-2023-70xx/CVE-2023-7073.json) (`2024-05-31T19:14:47.793`)
- [CVE-2024-28736](CVE-2024/CVE-2024-287xx/CVE-2024-28736.json) (`2024-05-31T19:14:47.793`)
- [CVE-2024-31889](CVE-2024/CVE-2024-318xx/CVE-2024-31889.json) (`2024-05-31T19:14:47.793`)
- [CVE-2024-31907](CVE-2024/CVE-2024-319xx/CVE-2024-31907.json) (`2024-05-31T19:14:47.793`)
- [CVE-2024-31908](CVE-2024/CVE-2024-319xx/CVE-2024-31908.json) (`2024-05-31T19:14:47.793`)
- [CVE-2024-35140](CVE-2024/CVE-2024-351xx/CVE-2024-35140.json) (`2024-05-31T19:14:47.793`)
- [CVE-2024-35142](CVE-2024/CVE-2024-351xx/CVE-2024-35142.json) (`2024-05-31T19:14:47.793`)
- [CVE-2024-36108](CVE-2024/CVE-2024-361xx/CVE-2024-36108.json) (`2024-05-31T19:14:47.793`)
- [CVE-2024-36120](CVE-2024/CVE-2024-361xx/CVE-2024-36120.json) (`2024-05-31T19:14:47.793`)
- [CVE-2024-5565](CVE-2024/CVE-2024-55xx/CVE-2024-5565.json) (`2024-05-31T19:14:47.793`)
## Download and Usage

View File

@ -185223,6 +185223,7 @@ CVE-2021-44530,0,0,3f15c3b556169eb703ccfc6a06993cf774ed0372e7c3519d18d62ee61b373
CVE-2021-44531,0,0,22ecb4a37716a1bf13ecdc1523488af8d10da410c337855b860416b5b01f58f9,2022-10-05T13:56:24.620000
CVE-2021-44532,0,0,7b5f8e61434a78460bfc37ba9d479a188a39d971b9fd7242c8d12e0bad426243,2022-10-05T14:00:39.580000
CVE-2021-44533,0,0,8f37b375f097f3ed857ec0e06e863398c8b05412951caf6897b1620ae5918b20,2022-10-06T02:28:19.260000
CVE-2021-44534,1,1,f682745028317f26a96623fdbad8cc286b23ee3105b8246413652b75652d84af,2024-05-31T19:14:47.793000
CVE-2021-44537,0,0,98221955cc68c6f1f55c32aeedda94c05474da3662de0ae882a622ac4c426cc3,2023-11-07T03:39:39.547000
CVE-2021-44538,0,0,71f8964aa4274805978905df27b61842b00bfac427d5404f43e606aa91713840,2023-08-08T14:22:24.967000
CVE-2021-44540,0,0,8fd25b5ed3868cf9651982d0cbc8ed01ac5a03b91ac14ac45aa4451192fc3753,2023-11-07T03:39:39.620000
@ -193920,8 +193921,8 @@ CVE-2022-25028,0,0,f85aa4363920ec08a79947d5ddb76236a7ef941d9f2d1a5eeb0e499df05c0
CVE-2022-25029,0,0,c647072346148dcc042db03afedae79cfed699c221c3e0957c58765c5289b69c,2023-11-07T03:44:43.777000
CVE-2022-2503,0,0,64818820bc99b260ef5fd004e07bc2ffde05e4de1af72389d63c2292acdaf8ec,2023-02-14T13:15:10.920000
CVE-2022-25031,0,0,1ca88f78591e3cb1e51ffbf109646c0946600c59413b0268c14f9d05dde6c099,2022-03-09T20:09:58.927000
CVE-2022-25037,1,1,f075996499c583f86284bd47c26ee8a0a3bd90e560a9b072220d044495579d90,2024-05-31T16:15:09.133000
CVE-2022-25038,1,1,d6e7e3b116124f2d71621d403270da79271fc2936fb2121c1a3c8f9807b965f8,2024-05-31T16:15:09.240000
CVE-2022-25037,0,1,93867b0971faf38744d84a1258051a2351c79bd1552af57a2f8cebfc42087a14,2024-05-31T19:14:47.793000
CVE-2022-25038,0,1,b2e3d7df1f113ad48932af77e681bfe7482608332038fae0dacd666634092de5,2024-05-31T19:14:47.793000
CVE-2022-2504,0,0,8c67e8ed6cc566f1bfa567a3c9f5df1590a1f15e8f8be3d4feedd4c0f5dc33ea,2023-11-07T03:46:37.600000
CVE-2022-25041,0,0,93ce0229f05d9ddc29d5d1fb486f7a36d95db3d7b73919071d30129f24c9befc,2022-03-29T13:50:33.407000
CVE-2022-25044,0,0,3c4273800955b68c667f9051a1ddd9a171bcd540c06ae9459893e1e60a9e8fce,2022-03-11T15:58:29.333000
@ -226625,7 +226626,7 @@ CVE-2023-36260,0,0,df1237c6457c1b4206b0d5ad02f97032b3a81e18fce3bd69452c4d79fca18
CVE-2023-36262,0,0,0329ac7656644a7553d710ca8782f80b6527e8ade23f535dbdfe1383401c9bcd,2023-11-07T04:16:25.310000
CVE-2023-36263,0,0,4649624e62df1f3c72417442caed269512009de2869b36a656dd3f389025818b,2023-11-08T16:48:00.990000
CVE-2023-36266,0,0,c1aa488a681cc1956fd75006960cd6c7c828125dd8c47d0a0f508b4841f1fbf5,2024-05-17T02:25:39.600000
CVE-2023-36268,0,0,6f366d6984a0940c0aee0778312e04c270f8e108ec26c4d4b716244b32fc78b2,2024-04-30T19:35:36.960000
CVE-2023-36268,0,1,59334e42c29ce9a6ad90592497e198d3a9a05a7bc406a9f7630efd960c25d4f7,2024-05-31T18:15:09.157000
CVE-2023-3627,0,0,34eb25ece400e692d01118e91cdb54357e138708553e491dd2e85d00353848ee,2023-07-18T19:58:32.613000
CVE-2023-36271,0,0,ed782faec3fc64ed9c5c1d539673fb2cac501e252bddbf55d0751af403a70480,2023-06-27T12:18:30.333000
CVE-2023-36272,0,0,0a127fb20debfd02d6d9a91e4212d106baf67f3f214966d88f98ab750ccd33ca,2023-06-27T12:18:19.927000
@ -227972,6 +227973,7 @@ CVE-2023-38039,0,0,7db5af6c572825a9174ccc95ad16c4e12ebd14b1ef46c51362e3097488d07
CVE-2023-3804,0,0,50cbc26a3f5e44a8fe79709141241b7d7687c5f657f918ece12ccc0ea2529047,2024-05-17T02:27:49.553000
CVE-2023-38040,0,0,42706fa6ad3aa3125db8313a47b3f5acd95c5ceca15de9f1b51f5fe325d0a8b5,2023-09-20T15:42:07.227000
CVE-2023-38041,0,0,4a41cdf6b4d4d8580a5676d4c70ea5c301d1b539eede7397ec86b75932016377,2023-10-31T15:09:45.307000
CVE-2023-38042,1,1,d0652b87aa98cce85eb0141c4d31e4e753bd30e6c4cdb866abfc1450253e8316,2024-05-31T19:14:47.793000
CVE-2023-38043,0,0,ddff95dc84d5474f013af01b45f2fea839bdff1a00b460948921745cd94837d5,2023-11-23T00:15:08.033000
CVE-2023-38044,0,0,5beacf7f100d92fa14b8932837b2d0d55c41ff0a223a951f0943e0c0a0a6001d,2023-08-09T17:51:49.967000
CVE-2023-38045,0,0,3913939a5a0e5f3900ee3567494b99f1952a15509319eeff3e5069f87b759c75,2023-08-09T17:51:59.253000
@ -228450,6 +228452,7 @@ CVE-2023-38547,0,0,af4de014faa06f3323f7fdc4435b554b381c401ea0830089ff19064c07ff4
CVE-2023-38548,0,0,9ff41ede9320d02570b41096aabc9432d3a36bcd6a1a1226221231941097735e,2023-11-14T20:16:04.373000
CVE-2023-38549,0,0,46018680dec58f7fc82631321835339d05314902c5183bee61873d2828eb3b34,2023-11-14T20:22:56.610000
CVE-2023-3855,0,0,08cfa35b06324c88da8ba03489ed91728b4c09b424dab0b303add4d48d6a1235,2024-05-17T02:27:53.960000
CVE-2023-38551,1,1,f4a88a24b9069a807bc5325ec4ff1f823492de4bc436700fff9fd29a1f2d3417,2024-05-31T19:14:47.793000
CVE-2023-38552,0,0,23162ecda3650c5efc56c139f2468932372e978286111ace7e49b5bab57cb2e5,2024-02-16T17:11:52.637000
CVE-2023-38553,0,0,55c7bddef38dc2af7327df2613d60dee53ee2419a230018de1d36eafa52d5c89,2023-09-08T06:45:58.037000
CVE-2023-38554,0,0,5f58920178f3653e3d18e6313595bca1044c0970210e158914f1599cc600cf91,2023-09-08T06:46:18.607000
@ -234288,6 +234291,7 @@ CVE-2023-46806,0,0,9c963a2febb7ff838b4c28cffca7e0db14a0e07828484b5709c1386765763
CVE-2023-46807,0,0,077574d4e6428ea3dd7a6b80ba2c35e8b4ec40cf97524e039aebad25e5aaeeae,2024-05-24T01:15:30.977000
CVE-2023-46808,0,0,cbddf0c466af810602e3b5e48604f0a280381993f5e5339e9c62959d89628764,2024-04-01T15:31:56.613000
CVE-2023-4681,0,0,d4b1d47c3f1f541f581a94f5a50c79c85882e6afa6d0d58510fdf4b0129b96ab,2023-09-05T16:22:15.077000
CVE-2023-46810,1,1,dac159cc5ebce030f8c3080f5eab246f87996f81dfddc115833d240610cc4462,2024-05-31T19:14:47.793000
CVE-2023-46813,0,0,0af53a0caece30dfcd1819ea3bb4e83013593f443624938126da8e4e939c317d,2024-01-11T21:15:10.350000
CVE-2023-46814,0,0,ba4d8a5154258f17727562d2860faee7bec7e29c3673f06da981b83898e56786,2023-11-29T18:54:35.827000
CVE-2023-46815,0,0,3585371bee4af7726640cda0d13d0b96485effe2b43241c7b3c28fb0b2edc28c,2023-11-07T20:46:40.287000
@ -240013,7 +240017,7 @@ CVE-2023-7069,0,0,76accaf19ff7061689b623859471b6167bfd5be5c4040f161f8f881f1093dc
CVE-2023-7070,0,0,6c8bd2c09a87f95a15301a389b593ff945e70de707293c37e60be3f2a98abc3d,2024-01-17T22:40:43.227000
CVE-2023-7071,0,0,78f74dc912537e618118419b14904618dddacf09709f10c13e8f266737a05610,2024-01-18T17:36:11.930000
CVE-2023-7072,0,0,b3f88e4f264e605e176fee64d4b48ecf7c140e88975c1f766cd228335172670c,2024-03-13T12:33:51.697000
CVE-2023-7073,0,0,305787791acb1ba21bc40de4794907286ab7089d98adab4ad79910530f088ce1,2024-05-31T15:15:09.190000
CVE-2023-7073,0,1,bde875b8eda3d2bfe625ce0ee81796659c33b984858813f64ad83219208bf8d3,2024-05-31T19:14:47.793000
CVE-2023-7074,0,0,8f1ea4c91bbed5f749e5ad5898f652b9d3535e567ecfe0485c584e8d36746192,2024-02-03T00:27:20.647000
CVE-2023-7075,0,0,d51690ce0887c4fde2f29abca615b161bc19b2d6032e7468914f0de24d50becd,2024-05-17T02:34:07.877000
CVE-2023-7076,0,0,a546b632507ea257c76d5e50c56a3ab90c5a3716054a9589f748ec0065028897,2024-05-17T02:34:07.980000
@ -241245,6 +241249,7 @@ CVE-2024-1268,0,0,a71f6831ef4e801110d9a785c473764d7dc4eb42bf088dcd5198930cf6d73f
CVE-2024-1269,0,0,c0e96ce08aa8cc4b0c5c9b01a4dfe6413b6a1aa0ecfba529b99ff41ed595060e,2024-05-17T02:35:22.143000
CVE-2024-1273,0,0,0a310035a5b694469d93d82e5859918e80208ec594b8c8228e8be9ae18ebdda5,2024-03-12T12:40:13.500000
CVE-2024-1274,0,0,e620aeced049d61f6d382460fbf5059a46434714ff81966b55927aa96a1401ee,2024-04-02T12:50:42.233000
CVE-2024-1275,1,1,bf26cd5e632f2b0f1b86a7cb8d63ebc17497163a682c8c1239e0557cf3b49995,2024-05-31T19:14:47.793000
CVE-2024-1276,0,0,60c6ef54b41de6d280d208c3ec2e6bb083543bd924def8892118e76fa08f7669,2024-02-29T13:49:29.390000
CVE-2024-1277,0,0,9bddcc1878c0a31d4a2779a833acd09a395aa5873a5b8a56410ae09baac7e94b,2024-02-29T13:49:29.390000
CVE-2024-1278,0,0,f8dd576b16a10330d2949f5064c92b15102ff25442ef34f204f66d4cc997e4f3,2024-03-21T12:58:51.093000
@ -243008,7 +243013,10 @@ CVE-2024-22051,0,0,351db93d6ca76e0dc0a7975efc553f9724406030c8337d111a27ec7033241
CVE-2024-22052,0,0,0227f99d44e89893938b4544ca95dcc1c41e798d05744c94fdce48542d951019,2024-04-08T22:52:44.573000
CVE-2024-22053,0,0,8caa4e40ec88ec96bdfc5af942e0f8feb54eb37f45d5fc1c8cea6c8e5bc74f38,2024-04-08T22:53:03.443000
CVE-2024-22054,0,0,ea7f90611fdd0de53fc019330b39d133a7eda202c929c51b6ca495fd39ad0bf5,2024-03-04T02:15:16.820000
CVE-2024-22058,1,1,202a9ac45d7edd0c4b961e8883999a05499166834d449ab22e939f18aa229192,2024-05-31T19:14:47.793000
CVE-2024-22059,1,1,72b8d3679bb9ac38739c1b25d654788c7a97b1e05d8ae66d101cf4da78206b03,2024-05-31T19:14:47.793000
CVE-2024-2206,0,0,89bb78f285eca92521ddf90479f409077fb3db3aa39188b40e35723bcbb7e9a7,2024-04-16T12:15:10.187000
CVE-2024-22060,1,1,37a68923072fe3f4f0215f125faca2d9729e3dde5dd0b622d0335fc31ac7112a,2024-05-31T19:14:47.793000
CVE-2024-22061,0,0,7e6b9bd07913a675f2f822ab70679b29ef286665a0e4e28b5039260be9545249,2024-04-19T13:10:25.637000
CVE-2024-22064,0,0,c629ceda13b1d36f0f60a6ea95a2c77f87751465f007aa3a59355e800a89dfe9,2024-05-14T16:13:02.773000
CVE-2024-22075,0,0,e134c94ca50cfff14da7c6327f518dbd409e37e86810fc1b2a583012e3bdb9ef,2024-01-10T15:06:42.563000
@ -243733,6 +243741,7 @@ CVE-2024-23310,0,0,eec2d3d01897f03b092512705ef9c1a60bff0efbb611b5ad57ec6adf5219c
CVE-2024-23313,0,0,13245e21fab07d527abf4d414da9107709ee7261ac0f2eced3f2c2d5a62b3bec,2024-04-02T15:15:53.050000
CVE-2024-23314,0,0,dd6112b5494f5f3b553193d89c0ec5a0dd61b4aa5a1d51fde0a6bbf84929e386,2024-02-14T18:04:45.380000
CVE-2024-23315,0,0,10dffad8a8f1dbff3c5c2e28a0726af9d727e5139c71bd0c06f5e9c696513a30,2024-05-29T13:15:49.203000
CVE-2024-23316,1,1,997d6ff1f1c044325e4e353c654bbc5764f096e1a2a2c7bc66aa120ae609f46c,2024-05-31T19:15:08.723000
CVE-2024-23319,0,0,6250a98d8fb4de9dc7adf992ef419352b4c640948bb204f9b6b1a6a1e471f523,2024-02-15T18:44:04.737000
CVE-2024-2332,0,0,bad3de665e7a6fe09fc285529837f450dd66b631476d3cb654444ad8c9c674ae,2024-05-17T02:38:10.740000
CVE-2024-23320,0,0,ee2624eedcd0c08c0309a46e353f298bafcc0ebbc7e5a02fe31e837cfcf5accf,2024-02-23T19:31:25.817000
@ -244629,7 +244638,7 @@ CVE-2024-24908,0,0,8283d99d7a40754c521eccb4d65696182424210fa0da9643faa3048901b25
CVE-2024-2491,0,0,56d5936f32866edf29962cfc16d1b84e21384fb0d36dc5404e3888c50a6878ee,2024-04-01T01:12:59.077000
CVE-2024-24910,0,0,bb7bb7f4f89300a6c40465a407ba5586d91f4a455e8da02c5a17663b7715ec72,2024-04-18T18:25:55.267000
CVE-2024-24912,0,0,79cdf936b61cd3c2ac1888b2bf7026a51d657f04895fbd14d8ade234a06c9bbb,2024-05-01T19:50:25.633000
CVE-2024-24919,0,1,631488eceb3aa7a5b392dcd29a6118459517fd4a65613afe40baee8a3cebfa78,2024-05-31T16:04:09.703000
CVE-2024-24919,0,0,631488eceb3aa7a5b392dcd29a6118459517fd4a65613afe40baee8a3cebfa78,2024-05-31T16:04:09.703000
CVE-2024-2492,0,0,a83da3e7ac12e71f3238f0026df94ba19b3a7e74326df6047a5459c611fae961,2024-04-10T13:23:38.787000
CVE-2024-24920,0,0,0c6e0a299c3dcb3e2c9c47cd3391320c9c9126b8fcb7683d54f65bff941cba09,2024-02-13T14:01:00.987000
CVE-2024-24921,0,0,2756f13f54e6771800d4e52f7442498e73a8fe2b3f97e730b1c320dbcf7f624d,2024-02-13T14:01:00.987000
@ -247106,7 +247115,7 @@ CVE-2024-2873,0,0,38b44d61d3230fcaba1c551f8073fe8dda4eadd0cd50d8705b668e3c4529f6
CVE-2024-28732,0,0,ec5e6c9882e97cf45b4c95c1c5ffa7b0d32a1a92ed89d346b2a432d5adcd9a14,2024-04-08T18:48:40.217000
CVE-2024-28734,0,0,ab89139fe8499f37581a857758b5dd911586d271cde02f4e4d8e7c034753a72e,2024-04-25T19:15:49.850000
CVE-2024-28735,0,0,96e109e8715188f76ee57d058460375db0bc7cb9155343dbdf53039c574fd622,2024-04-25T19:15:49.910000
CVE-2024-28736,1,1,1e2a21e14e60bfa4df02ab044b0a772752c9be526dcfbe3db3d726f75b491f61,2024-05-31T16:15:09.360000
CVE-2024-28736,0,1,2784b72f5ebb5fe2048e408e57ce8f6c856546be39e0026e012f030a94509d88,2024-05-31T19:14:47.793000
CVE-2024-2874,0,0,81d4f55665967a7403f77c13a3fe1cec09fb59ce9d6702cf1fc8df1173ec5909,2024-05-24T01:15:30.977000
CVE-2024-28741,0,0,ba024af92e852f8cb07287ef01e36bda32f00b417065062fcdaec7d68cbce596,2024-04-08T18:48:40.217000
CVE-2024-28744,0,0,9056a307a9a71984eefaac6c50b454d137864982a45296e74420e75a1c59bcd1,2024-04-08T18:48:40.217000
@ -247663,7 +247672,16 @@ CVE-2024-29818,0,0,1f8959f01324e92affea2052755ae86441537116ae9d8dda4a17418633306
CVE-2024-29819,0,0,489085f50dbde78feed33cc0a68fd671c989aac2e872d0b30a126d7fff3447e6,2024-03-27T12:29:30.307000
CVE-2024-2982,0,0,4aa7b937619803bd745055b07038dec2aac337789514c96ad26dee4b03439859,2024-05-17T02:38:40.403000
CVE-2024-29820,0,0,da81473ce6ac9b7a0c8169d0e94b81abe513c85a432f3965c234ec8d7d8b927f,2024-03-27T12:29:30.307000
CVE-2024-29822,1,1,bf27bc8ad187a5cd4fd410397ee6860b07ffa88d06871bf3c4b61acdbbbec54c,2024-05-31T19:14:47.793000
CVE-2024-29823,1,1,ec483bad5be20d216bbe995d37001fc6acc504df78da762dd4a87be66cf3068b,2024-05-31T19:14:47.793000
CVE-2024-29824,1,1,5d45b3e815f849975db0ea31b3598b1cddaa56a710983661a84206ba353828be,2024-05-31T19:14:47.793000
CVE-2024-29825,1,1,300bde3efe372a48d0db97beb56b99f96d0a02c14850ff33ca83282e71d51ce9,2024-05-31T19:14:47.793000
CVE-2024-29826,1,1,f7c13e63a2fee490f445d5c68665c2325ee592ca28d608948b52aed3a7f5be32,2024-05-31T19:14:47.793000
CVE-2024-29827,1,1,acbbe9e85826049828d15aa3cd6f3cf7d3cf87819e3da198f298e122d6326c08,2024-05-31T19:14:47.793000
CVE-2024-29828,1,1,b569b7fb07961dd03996b659238fbb756f90b956bb580b7df5679b001e48ddc4,2024-05-31T19:14:47.793000
CVE-2024-29829,1,1,a0a7648fa44eaa8d1057314aab368d9f966c0f0cf76a351a01c986a7190f8a4f,2024-05-31T19:14:47.793000
CVE-2024-2983,0,0,bbc8512579381338bf10ae1b698e35829f3ad472ac95ecb989d0b205ba03dc93,2024-05-17T02:38:40.503000
CVE-2024-29830,1,1,28e6fdeb5fb1d6ebd7574b882b36cedf3326d0118d62073809f52b427c8bd1ed,2024-05-31T19:14:47.793000
CVE-2024-29832,0,0,9f165dd8af7b150aedd8ba0e648c487f081558a3943c83b1f6267f1670f3eb8a,2024-03-26T17:09:53.043000
CVE-2024-29833,0,0,425a7917efe73a1770fcefa4ce4ec7e1a0c1da408936ec3b87fe92c30b675f21,2024-03-26T17:09:53.043000
CVE-2024-29834,0,0,8cc60342382915a3218e3b4fbfae27625c02b9703c9f2ace2a02e0ceee6666b1,2024-05-01T17:15:32.153000
@ -247677,6 +247695,8 @@ CVE-2024-29841,0,0,55b576137a980baf276319e7949f14a0b7f1bac68593183f67439c72ef1c2
CVE-2024-29842,0,0,c555d339d968965f67a62125788ebd30337e465ee62002c966027b486a7b6656,2024-04-15T13:15:31.997000
CVE-2024-29843,0,0,0e7cac2423043e71c46c0b1e43ac9a8c810800e1746f633c825d47d92993ebb0,2024-04-15T13:15:31.997000
CVE-2024-29844,0,0,0b2bf20574d5156f6a667769b4d5660c6c41f0f9a81de3ca328a866e5a169d72,2024-04-15T13:15:31.997000
CVE-2024-29846,1,1,6454cb06a7142f733944e9d52e14aa4fb410a5811d304ff7247c79d8c0ad5dbf,2024-05-31T19:14:47.793000
CVE-2024-29848,1,1,42f15726ca8d21508453d2a775697d983e895c90f88c506788fb62ade2fbf739,2024-05-31T19:14:47.793000
CVE-2024-29849,0,0,ccaf70e0ea920c9401408369b91e6b1138ad2d7173b8d336d5c09826b845da90,2024-05-24T01:15:30.977000
CVE-2024-2985,0,0,fa2452bdca8bf817e9c39173e50c9398ab81e8bbe363c5d181d5470655c888f8,2024-05-17T02:38:40.683000
CVE-2024-29850,0,0,312685b23dbad4c8f8e6bd1bd0266c24c6e302be8a27839473fa75007f2aca05,2024-05-24T01:15:30.977000
@ -248478,6 +248498,7 @@ CVE-2024-31012,0,0,59265fe10316d43a2acb459ea9de60f6a264c8b6d13bc4dae0d363d3b5d71
CVE-2024-31013,0,0,137ba39b03bbaab20823954557195167ac08df3fa32a6782dd4080f1d723f338,2024-04-03T12:38:04.840000
CVE-2024-31022,0,0,a14e43455f8667f5b08643f4accc0ded65ef08c98d3d4f6b069b1542bbf69336,2024-04-08T18:48:40.217000
CVE-2024-31025,0,0,049c3aee715c9c75f255eea2ba7d71aee620ad97e93ef3b0e0a948ae51dd0b57,2024-04-04T12:48:41.700000
CVE-2024-31030,1,1,b17002288aa05abca79327b012be4280f7a02a0b97bc696e400d659fdf247947,2024-05-31T19:14:47.793000
CVE-2024-31031,0,0,10bc7caba6a65e01bc9ea074e7bedfc063099ea11411b0d4a72c811b144cdc06,2024-05-03T03:16:28.790000
CVE-2024-31032,0,0,2f308f228deb76e92177e5f96ebfbe834c95bdfff6cc9b10092e4afc0a7c1465,2024-04-24T03:15:05.933000
CVE-2024-31033,0,0,c7a6cbfb5d238335f35ef47bba4fa3a92246db284515ca8db031f344b12dfa7a,2024-05-17T02:38:58.313000
@ -248912,15 +248933,15 @@ CVE-2024-31874,0,0,1770e58d0ae5591eb931a8cdfdb054fb4d854f81849d14af250c71db6caf5
CVE-2024-31879,0,0,9e400de08d7e3b57ea9b7110f44ae1b22a7e387f9dc2f33f777f519f045dfc82,2024-05-20T13:00:34.807000
CVE-2024-3188,0,0,5d70d4884e37e1862c5503e8662fdd8be316d1df7ecad77f44114699c1426b8a,2024-04-26T12:58:17.720000
CVE-2024-31887,0,0,e951c215b0e12b882bcc7244c98d7631ee4f4b7a3271b5f24e369f1a635cd3e5,2024-04-17T12:48:07.510000
CVE-2024-31889,0,0,2d29be687e8687c259c416c5ae3ac2d71f9d81d6c7967ac22a172e03f903c1e1,2024-05-31T13:15:09.407000
CVE-2024-31889,0,1,b675dcb763b914bb83f59d390ea6e8cf77efcb3f31cf4f0aa6017b7ff786bd95,2024-05-31T19:14:47.793000
CVE-2024-3189,0,0,1214acc8d4ffdbc5da1a7913ab352a27b53d04d94b5a178d0c09d285be9bf460,2024-05-15T16:40:19.330000
CVE-2024-31893,0,0,12d01c628fd750c0cbf441575efefbf394d1654280d687a3cb134821594970b6,2024-05-24T01:15:30.977000
CVE-2024-31894,0,0,5d58af989adc88e1f21decb4e4b73370061e14ed54479d7579f2f2b5b7332e1e,2024-05-24T01:15:30.977000
CVE-2024-31895,0,0,38db7df97417d61bcac3e1b48b52fd0d409c4088497b5231955dcf460bac575b,2024-05-24T01:15:30.977000
CVE-2024-3190,0,0,c17e9142af04bd9f9561cc561aacffdced5eb94e572636fb91c22838cccaf428,2024-05-30T13:15:41.297000
CVE-2024-31904,0,0,f581f8d898f5db4b0367557c06fa4b666380cc23610e816c03e35138e889ca3c,2024-05-24T01:15:30.977000
CVE-2024-31907,0,0,682599c9c1e495ff6c55ec20ae3bcf229697be55b3288438c7c3d29ae4fdc790,2024-05-31T13:15:09.637000
CVE-2024-31908,0,0,8844d044105c8d70463d3a2ef48463aae273f9f9c37d5a31dc881e8f2cfa7e44,2024-05-31T13:15:09.853000
CVE-2024-31907,0,1,127efa031ee04b5365525b52c28173acad88fd18483e7e6af4aae476ecf12290,2024-05-31T19:14:47.793000
CVE-2024-31908,0,1,6c8db78b9af83adccedcc60e0b95c9692101caab8a23eba05e1f29deab69f437,2024-05-31T19:14:47.793000
CVE-2024-3191,0,0,8cf962bd9b56831bd79ade84a34de9b023bb925809cd58e4b9fc80c44fe6835a,2024-05-17T02:39:45.973000
CVE-2024-3192,0,0,e3aebeb6cd86739531dd732871b7a29e3a45f5c2393a43be256648b47f7f7a36,2024-05-17T02:39:46.077000
CVE-2024-31920,0,0,3c0045dbbecad7d78d5b9eb044589c2fc290e421e2d5accb9391890092efc90f,2024-04-15T13:15:31.997000
@ -250553,8 +250574,8 @@ CVE-2024-35109,0,0,1723de5edad4801c113dd0d41cbe0df6c36d556c862ef08d4faf7caa71ed9
CVE-2024-35110,0,0,07f2b4eefabbfedf17e2731cca374c4a367989ecaeb945f63f5af7217d209b46,2024-05-17T18:36:05.263000
CVE-2024-3512,0,0,7186c9ec3829c2082fd68b5fc8e23caed587fdf0f4e68c2974db5f41b90fb514,2024-04-25T13:15:51.663000
CVE-2024-3514,0,0,fd39bbcd0f0890f4d85c4ccfb46694b71dc6efa7f8c56852e1f4fd99d58e20d2,2024-04-24T17:15:47.423000
CVE-2024-35140,1,1,62eca5fc6e200ca33bc3bc1574b440275006138609c4f6f62efebb2d07ac8350,2024-05-31T17:15:08.837000
CVE-2024-35142,1,1,57fe1e834264dd18ca83a0f0a08dfb089c8ae5831db6a9f03f783f46ad2f1ac6,2024-05-31T17:15:09.080000
CVE-2024-35140,0,1,fe65c21ab6eba08fe8ce39006b41053372ef719d2c5658322af11db959ebabf2,2024-05-31T19:14:47.793000
CVE-2024-35142,0,1,47d99d23ef8abe3648315994e5d14b895c62bcea0531a514e84a4a66b224be78,2024-05-31T19:14:47.793000
CVE-2024-3515,0,0,5591c01553945d08e143bb397e7b7011721b53594a14b5bacff6fedc69b36f26,2024-04-19T23:15:11.963000
CVE-2024-3516,0,0,c67f1b1a12bf3a4087d8b779d182fd3cd73d7fc172668a9a1561ab7e0601a8e1,2024-04-19T23:15:12.003000
CVE-2024-35162,0,0,096de883de595ba1679c139890301da91a94c85a87a466687ddcd8baf8fe1502,2024-05-22T12:46:53.887000
@ -250587,6 +250608,7 @@ CVE-2024-35191,0,0,055c86fc8aa559d85e1bf7f687d257f4de966c39afc0ea1e40b275af0d541
CVE-2024-35192,0,0,874d644d3dc47004bb6ac78a86506bcaca35164c28a85b524cccc3621b300b70,2024-05-21T12:37:59.687000
CVE-2024-35194,0,0,3a5048b285c2d61baf7aaaca19132c1e1a9ee26490a80e912d656bc4d8d667bc,2024-05-21T12:37:59.687000
CVE-2024-35195,0,0,392cf5bc84517d8d5cfb0b7af25760d2c3ea1f4acb6929d042f42ca4ba07a42a,2024-05-21T12:37:59.687000
CVE-2024-35196,1,1,21aeb8ba6ec15dd1be908460109b09bdb728d35cc67ce718f80fd072da042e80,2024-05-31T19:14:47.793000
CVE-2024-35197,0,0,416bcb1a932d9a0fd41caaeb4c9deb5fd7f244f1a2a38750f955428ee2ae2267,2024-05-24T01:15:30.977000
CVE-2024-3520,0,0,f6428e86e9ec472cba9c3c5754043cb34202461d79bcb1fa1b6a365d8347f93e,2024-05-02T18:00:37.360000
CVE-2024-35200,0,0,d12af7da88be879f5b7911afbca6146d7e90c9682299864994d9d3145037ea8c,2024-05-29T19:50:25.303000
@ -251039,7 +251061,7 @@ CVE-2024-36081,0,0,d4f0cf242ca757b4f303ae5368ae2b4579e3452ad04759648a40396f5d2c3
CVE-2024-3609,0,0,ed7edf68142e8387ad834c19a7338682e57310d52666dd6c703556dcd2e4f649,2024-05-17T18:36:05.263000
CVE-2024-36105,0,0,4b0fed9ed2485549411fb1c0dd5b530df11ef2b63c1b154f3cb43f2c66dea72a,2024-05-28T12:39:28.377000
CVE-2024-36107,0,0,3822d3240549b49c3e2603142bff0a390b754055e04abd1375217acc3ea4ac02,2024-05-29T13:02:09.280000
CVE-2024-36108,0,0,2cdb3200d9a1f9a5714f34dad47f049edfb809d349ed57b60a2c62fd5dab807c,2024-05-31T15:15:09.457000
CVE-2024-36108,0,1,1712acab6fb5bcc0e89c140fd4bc7f953ab5cd6a3b2df721c59b01e1212e5edf,2024-05-31T19:14:47.793000
CVE-2024-36109,0,0,8442e3c76593510de83882ecc41707b0c4728f640a49fe701ed403b144ef7ca0,2024-05-29T13:02:09.280000
CVE-2024-3611,0,0,b6a9e7e031fc264aaf6cc25eb2de4637a54a3c74ff1ad6ab29710fbea0fb99c4,2024-05-22T12:46:53.887000
CVE-2024-36110,0,0,60de6d063a43c2488fb7938eb212a9d443b4f1b9215af12070cdde5c64f618d1,2024-05-29T13:02:09.280000
@ -251048,7 +251070,7 @@ CVE-2024-36114,0,0,cd6667af901bf4e55598a9890cfbf772045b36365134bac1827f2ee46e0e9
CVE-2024-36118,0,0,53f698bffaea7efe52ffb4ccf4a1eea148091f5ed4f5211735767002a2e4cd7a,2024-05-30T18:18:58.870000
CVE-2024-36119,0,0,df322ac6443fcc8a013c93b7e5a35f3678792028e0c0bb1f44fa863251664f98,2024-05-31T13:01:46.727000
CVE-2024-3612,0,0,d6528427cbb589467c111cbd40a18dd09640d3302d8baf887860f351407e958e,2024-05-17T02:40:01.520000
CVE-2024-36120,1,1,6b4ff9dc6b2ffddb9ed8198be49adf19f6c16d2246446a9fa050884009378969,2024-05-31T17:15:09.317000
CVE-2024-36120,0,1,12c175c12bdeb4293d9514b1beb0f27c807f78064a3798691100bae1fd82d8c0,2024-05-31T19:14:47.793000
CVE-2024-3613,0,0,d7eb1ddde521e54e1fe9acae408bd9221d7036e0a03927b308a853106c490093,2024-05-17T02:40:01.607000
CVE-2024-3614,0,0,d78c7f8216ffec54e56d2e3340bc15a51d2b21c733cf27c47b22562ec2fb117c,2024-05-17T02:40:01.707000
CVE-2024-3615,0,0,64005ae223a0e1b13c6b7f52d8fc0c9c88326db37e9d2598154be43e0038ff8a,2024-04-19T13:10:25.637000
@ -252058,7 +252080,7 @@ CVE-2024-4973,0,0,d1c31717b80c03e41be3bd842d252cef2dc66b6b1bc2b5755b99db37d32f43
CVE-2024-4974,0,0,290ba3b48a1ce24a86fae7c3368a5af9c4419eb8a820a975b488bb8cd54f59bd,2024-05-17T02:40:44.973000
CVE-2024-4975,0,0,5819422b3c2f1314ca1c81054a039332fa592912ca94cd84250a09eca1b41925,2024-05-17T02:40:45.073000
CVE-2024-4976,0,0,cec1c528b9c81bb2353d630af7aeaeed80f8c396bb33272f9e3c075fa645e3ec,2024-05-16T13:03:05.353000
CVE-2024-4978,0,1,da55fe81f202b0e5309a26be3ab7a8c7197ff6f40533e0aebba1988f8f75f5d4,2024-05-31T16:03:52.247000
CVE-2024-4978,0,0,da55fe81f202b0e5309a26be3ab7a8c7197ff6f40533e0aebba1988f8f75f5d4,2024-05-31T16:03:52.247000
CVE-2024-4980,0,0,b5b93d089fa3d245393b7cb268984100664e9544bf4ff7971c072bbdebb0992d,2024-05-22T12:46:53.887000
CVE-2024-4984,0,0,c181b2792419ab292757f17fa7ed54efe54e64b1f0d7a8e32f201040654607f4,2024-05-16T13:03:05.353000
CVE-2024-4985,0,0,8a1d7360ecb0b336e479fb881fdc484ef9fe33bf7265e6809734a732fb238e9f,2024-05-21T12:37:59.687000
@ -252137,6 +252159,7 @@ CVE-2024-5136,0,0,5cce275ffb1550a3c7261f5e567e7647a017e807bac86076084d9c82ab83e2
CVE-2024-5137,0,0,eed8df071842e1a03ca59c05a5655638342140960be3a16fc81a02125200e22f,2024-05-20T13:00:04.957000
CVE-2024-5142,0,0,9a7d794c7ee50b5ecd06d952c402fab37c046b0a6bb4d29e0c6b11e7df538957,2024-05-24T13:03:05.093000
CVE-2024-5143,0,0,85d2302aa16b15f892bf139ed2f510515c9c051290de1dbf060be25f39190615,2024-05-24T01:15:30.977000
CVE-2024-5144,1,1,3682eb32ab74a69dce2a20f55af124165ad49665bd2dae692d6703bd4728c599,2024-05-31T18:15:13.217000
CVE-2024-5145,0,0,c57b6b7c97a43c5bdbc8afd9ede6d6c7d049277ca6f2a47ca0d1b05b23f9da5b,2024-05-21T12:37:59.687000
CVE-2024-5147,0,0,f4d57cc5a9319b417b98271562a6c18c09e411a2e24f5685a34653839c587f1d,2024-05-22T12:46:53.887000
CVE-2024-5150,0,0,b6666c6d6ac9830dd3015f5fc02fd79f0a3b63d41ee2e14f8cd76da933186cb1,2024-05-29T13:02:09.280000
@ -252147,6 +252170,7 @@ CVE-2024-5160,0,0,186682202af617fcd5fde94e1dccd429b6dae548d190fed969fd472f14ae0a
CVE-2024-5165,0,0,1249b447729c1b58db4dd874ebf3238410613919325ce73c31963c57eb2e607f,2024-05-24T01:15:30.977000
CVE-2024-5166,0,0,acd04bdcb3927ae2fc6875213ce44649287d9e14ecc961e10fc982fe1f8beeeb,2024-05-22T18:59:20.240000
CVE-2024-5168,0,0,306ce12eec3dfa604048647f5d45c62ae3c9962c8122be3c41030f354ed300c2,2024-05-24T01:15:30.977000
CVE-2024-5176,1,1,70717fe5bf34e825a1c2e0544b85071ff8c546cc57454bf790b1fc8c43eb95da,2024-05-31T19:14:47.793000
CVE-2024-5177,0,0,754731e9b12ab9d5b8190add19111b94a5e340744a68664c6a765c48e93c422c,2024-05-24T01:15:30.977000
CVE-2024-5185,0,0,987898786ec74b7c18a7a4f481c05ddbbecd659eded8fc6c1b5fac3b77c5eff4,2024-05-29T15:18:26.427000
CVE-2024-5190,0,0,e11755e15485ad7d65ed59ac9abe5cac7f4b4c3e2591d1a6c69b4386ed9dea65,2024-05-22T03:15:08.273000
@ -252299,4 +252323,5 @@ CVE-2024-5524,0,0,cae078246cb68e9db21efee85fd3858e79fb1203c0e063487740b9c1df1ad7
CVE-2024-5525,0,0,e6c5a1ee43ca8e6712f567b8cfbba1abaf5011df1fe231dde327e809aed6654f,2024-05-31T13:01:46.727000
CVE-2024-5537,0,0,071475eb8c0f92cc8ea9522d658283ad0e8213ba6740ff46ee05e5b24c18c3d8,2024-05-30T17:15:34.583000
CVE-2024-5538,0,0,183cea799fa9410e329e72f326a10b8369aedcea9a5b7583a44bf33ecc305070,2024-05-31T11:15:09.923000
CVE-2024-5565,0,0,09c880965e149a843046e2e7ee83a666276ed80f9f1f6bb83d71a50baebca931,2024-05-31T15:15:09.673000
CVE-2024-5564,1,1,f7faa47ddc158f9856a111ddb265bd8c9a26316b66118569da1a6c1b8891e06c,2024-05-31T19:15:08.883000
CVE-2024-5565,0,1,ca2b275160a932f35493ef873c1e3b3376ac0de1d1f0359f5898f4a0c4303049,2024-05-31T19:14:47.793000

Can't render this file because it is too large.