Auto-Update: 2024-05-31T12:00:37.998802+00:00

This commit is contained in:
cad-safe-bot 2024-05-31 12:03:29 +00:00
parent bf40ebb6e5
commit ea7b6fd2fb
10 changed files with 348 additions and 21 deletions

View File

@ -0,0 +1,59 @@
{
"id": "CVE-2024-22338",
"sourceIdentifier": "psirt@us.ibm.com",
"published": "2024-05-31T11:15:09.180",
"lastModified": "2024-05-31T11:15:09.180",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "IBM Security Verify Access OIDC Provider 22.09 through 23.03 could disclose sensitive information to a local user due to hazardous input validation. IBM X-Force ID: 279978."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "psirt@us.ibm.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.0,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.5,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "psirt@us.ibm.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-20"
}
]
}
],
"references": [
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/279978",
"source": "psirt@us.ibm.com"
},
{
"url": "https://www.ibm.com/support/pages/node/7155340",
"source": "psirt@us.ibm.com"
}
]
}

View File

@ -0,0 +1,59 @@
{
"id": "CVE-2024-23692",
"sourceIdentifier": "disclosure@vulncheck.com",
"published": "2024-05-31T10:15:09.330",
"lastModified": "2024-05-31T10:15:09.330",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Rejetto HTTP File Server, up to and including version 2.3m, is vulnerable to a template injection vulnerability. This vulnerability allows a remote, unauthenticated attacker to execute arbitrary commands on the affected system by sending a specially crafted HTTP request. As of the CVE assignment date, Rejetto HFS 2.3m is no longer supported."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "disclosure@vulncheck.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "disclosure@vulncheck.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-1336"
}
]
}
],
"references": [
{
"url": "https://mohemiv.com/all/rejetto-http-file-server-2-3m-unauthenticated-rce/",
"source": "disclosure@vulncheck.com"
},
{
"url": "https://vulncheck.com/advisories/rejetto-unauth-rce",
"source": "disclosure@vulncheck.com"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-36037",
"sourceIdentifier": "0fc0942c-577d-436f-ae8e-945763c79b02",
"published": "2024-05-27T18:15:10.407",
"lastModified": "2024-05-28T12:39:28.377",
"lastModified": "2024-05-31T11:15:09.563",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
@ -21,20 +21,20 @@
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 3.3,
"baseSeverity": "LOW"
"baseScore": 5.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.8,
"impactScore": 1.4
"impactScore": 3.6
}
]
},

View File

@ -0,0 +1,63 @@
{
"id": "CVE-2024-4160",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-05-31T10:15:09.977",
"lastModified": "2024-05-31T10:15:09.977",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "The Download Manager plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'wpdm-all-packages' shortcode in all versions up to, and including, 3.2.90 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security@wordfence.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 6.4,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 3.1,
"impactScore": 2.7
}
]
},
"references": [
{
"url": "https://plugins.trac.wordpress.org/browser/download-manager/trunk/src/Package/views/all-packages-shortcode.php?rev=2996137#L202",
"source": "security@wordfence.com"
},
{
"url": "https://plugins.trac.wordpress.org/changeset/3080781/",
"source": "security@wordfence.com"
},
{
"url": "https://wordpress.org/plugins/download-manager/",
"source": "security@wordfence.com"
},
{
"url": "https://wordpress.org/plugins/download-manager/#developers",
"source": "security@wordfence.com"
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/9f51258a-e228-412f-9d97-28ab679136d7?source=cve",
"source": "security@wordfence.com"
},
{
"url": "https://www.wpdownloadmanager.com/doc/short-codes/wpdm_all_packages-list-all-downloads-in-tabular-format-in-a-page/",
"source": "security@wordfence.com"
}
]
}

View File

@ -0,0 +1,51 @@
{
"id": "CVE-2024-5041",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-05-31T10:15:10.220",
"lastModified": "2024-05-31T10:15:10.220",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "The Happy Addons for Elementor plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the \u2018ha-ia-content-button\u2019 parameter in all versions up to, and including, 3.10.9 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security@wordfence.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 6.4,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 3.1,
"impactScore": 2.7
}
]
},
"references": [
{
"url": "https://plugins.trac.wordpress.org/browser/happy-elementor-addons/trunk/widgets/image-accordion/widget.php#L1462",
"source": "security@wordfence.com"
},
{
"url": "https://plugins.trac.wordpress.org/changeset/3095128/",
"source": "security@wordfence.com"
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/fb037c9f-5d20-46f6-b1ff-34b9d192bad2?source=cve",
"source": "security@wordfence.com"
}
]
}

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2024-5347",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-05-31T10:15:10.413",
"lastModified": "2024-05-31T10:15:10.413",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "The Happy Addons for Elementor plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'arrow' attribute within the plugin's Post Navigation widget in all versions up to, and including, 3.10.9 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security@wordfence.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 6.4,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 3.1,
"impactScore": 2.7
}
]
},
"references": [
{
"url": "https://plugins.trac.wordpress.org/browser/happy-elementor-addons/tags/3.10.9/widgets/post-navigation/widget.php#L588",
"source": "security@wordfence.com"
},
{
"url": "https://plugins.trac.wordpress.org/changeset/3095128/happy-elementor-addons/trunk/widgets/post-navigation/widget.php",
"source": "security@wordfence.com"
},
{
"url": "https://wordpress.org/plugins/happy-elementor-addons/#developers",
"source": "security@wordfence.com"
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/415a7201-bdff-4342-9e06-ce0e500cdc7c?source=cve",
"source": "security@wordfence.com"
}
]
}

View File

@ -0,0 +1,15 @@
{
"id": "CVE-2024-5484",
"sourceIdentifier": "security@huntr.dev",
"published": "2024-05-31T11:15:09.783",
"lastModified": "2024-05-31T11:15:09.783",
"vulnStatus": "Rejected",
"descriptions": [
{
"lang": "en",
"value": "Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority."
}
],
"metrics": {},
"references": []
}

View File

@ -0,0 +1,15 @@
{
"id": "CVE-2024-5538",
"sourceIdentifier": "security@huntr.dev",
"published": "2024-05-31T11:15:09.923",
"lastModified": "2024-05-31T11:15:09.923",
"vulnStatus": "Rejected",
"descriptions": [
{
"lang": "en",
"value": "Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority."
}
],
"metrics": {},
"references": []
}

View File

@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update
```plain
2024-05-31T10:00:38.580556+00:00
2024-05-31T12:00:37.998802+00:00
```
### Most recent CVE Modification Timestamp synchronized with NVD
```plain
2024-05-31T09:15:09.780000+00:00
2024-05-31T11:15:09.923000+00:00
```
### Last Data Feed Release
@ -33,24 +33,27 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
### Total Number of included CVEs
```plain
252281
252288
```
### CVEs added in the last Commit
Recently added CVEs: `4`
Recently added CVEs: `7`
- [CVE-2024-5436](CVE-2024/CVE-2024-54xx/CVE-2024-5436.json) (`2024-05-31T09:15:09.780`)
- [CVE-2024-5523](CVE-2024/CVE-2024-55xx/CVE-2024-5523.json) (`2024-05-31T08:15:08.870`)
- [CVE-2024-5524](CVE-2024/CVE-2024-55xx/CVE-2024-5524.json) (`2024-05-31T08:15:09.127`)
- [CVE-2024-5525](CVE-2024/CVE-2024-55xx/CVE-2024-5525.json) (`2024-05-31T08:15:09.357`)
- [CVE-2024-22338](CVE-2024/CVE-2024-223xx/CVE-2024-22338.json) (`2024-05-31T11:15:09.180`)
- [CVE-2024-23692](CVE-2024/CVE-2024-236xx/CVE-2024-23692.json) (`2024-05-31T10:15:09.330`)
- [CVE-2024-4160](CVE-2024/CVE-2024-41xx/CVE-2024-4160.json) (`2024-05-31T10:15:09.977`)
- [CVE-2024-5041](CVE-2024/CVE-2024-50xx/CVE-2024-5041.json) (`2024-05-31T10:15:10.220`)
- [CVE-2024-5347](CVE-2024/CVE-2024-53xx/CVE-2024-5347.json) (`2024-05-31T10:15:10.413`)
- [CVE-2024-5484](CVE-2024/CVE-2024-54xx/CVE-2024-5484.json) (`2024-05-31T11:15:09.783`)
- [CVE-2024-5538](CVE-2024/CVE-2024-55xx/CVE-2024-5538.json) (`2024-05-31T11:15:09.923`)
### CVEs modified in the last Commit
Recently modified CVEs: `1`
- [CVE-2022-41678](CVE-2022/CVE-2022-416xx/CVE-2022-41678.json) (`2024-05-31T09:15:09.367`)
- [CVE-2024-36037](CVE-2024/CVE-2024-360xx/CVE-2024-36037.json) (`2024-05-31T11:15:09.563`)
## Download and Usage

View File

@ -207074,7 +207074,7 @@ CVE-2022-41674,0,0,7fddcb7da73c0a96be4a43c013ced65ac91a32b25cf6ee2d0f1097f6052ba
CVE-2022-41675,0,0,fa38ec524a80469fa143a01e1364670741f60e2a8be20fdc9a6168877206f5ed,2022-12-01T16:47:55.830000
CVE-2022-41676,0,0,6ce6503c29641a706d14bba4abeec57ebe3e3ee749376675b5b49dd933d9333b,2022-12-01T15:15:19.983000
CVE-2022-41677,0,0,fb584e4ff9e502def2431b17e01237a80e6cc9a2ebead6cf2d47ad83358a63a1,2023-12-22T20:06:30.313000
CVE-2022-41678,0,1,540d29c005ee03044b254bf150c3f6911e6fccecb2b155f588a45a5d7392e54b,2024-05-31T09:15:09.367000
CVE-2022-41678,0,0,540d29c005ee03044b254bf150c3f6911e6fccecb2b155f588a45a5d7392e54b,2024-05-31T09:15:09.367000
CVE-2022-41679,0,0,579980e7286f2080fdbe9cd35aa2f90696096731c4705f1d688555e08181fc9f,2022-11-01T19:57:52.373000
CVE-2022-4168,0,0,962a8cf6a20124f2860cc6a8ad0647c6a278a309ba496e80c45aa72c11ab92ed,2023-11-07T03:57:07.430000
CVE-2022-41680,0,0,afa69c855a090a6536c33922c710fb608e5ac1e3ecd34844a4dc67e08ea1cac7,2022-11-01T20:06:05.093000
@ -243214,6 +243214,7 @@ CVE-2024-22334,0,0,a38b89fac619e220b3f32a5ed9cb762bdaa0f4626e986bbf119b83360e4c1
CVE-2024-22335,0,0,94b1135a0842e43602bc9fceeeec6f6d8338d5d9b6e931e6a3e1f0f5ed52affb,2024-02-20T19:50:53.960000
CVE-2024-22336,0,0,92b17f3ddf77b7c8a53a41f903603d0d36207de06fae8bd71fc2469777bc3663,2024-02-20T19:50:53.960000
CVE-2024-22337,0,0,9a674fac9bc4716d61a028d3be9473027552f3c1c11335efca4b4ddefd1e14f0,2024-02-20T19:50:53.960000
CVE-2024-22338,1,1,9b4b392249331c85d8695bec03585e00cd93e88164ca3cbcd21b0b1cbdbae06f,2024-05-31T11:15:09.180000
CVE-2024-22339,0,0,7da5694b93905b7c6d93ed93108dac6dab6202238259984860ef1d6e1bec9ec9,2024-04-15T13:15:31.997000
CVE-2024-22343,0,0,98c7840ac2eb50dcfa88f4141a657f976aab7d39f92de1ccb97b49719a76ede0,2024-05-14T16:13:02.773000
CVE-2024-22344,0,0,dd931266b7e962044b40a6567c41617f6ff2ceb50100fcd1ed62bcdaadd651ee,2024-05-14T16:13:02.773000
@ -243946,6 +243947,7 @@ CVE-2024-23687,0,0,888c703c13765b4aadeca06043a7e3dd693e14ab5fbf0ceb683a371be24cf
CVE-2024-23688,0,0,07f47d429f26f5d25558115321368745a1af1492969a475a8855a8882844f455,2024-01-26T15:53:31.397000
CVE-2024-23689,0,0,d7d4e018343e45ab929852f091e2e71006911f05a5c0cdd59769a6f5a80fdcee,2024-01-26T14:50:45.023000
CVE-2024-2369,0,0,6a36576cd82a0efb1a6cf47fca1f81c4dce9d8f7b0632041d2d5bfbf236b9c0b,2024-04-08T18:15:08.527000
CVE-2024-23692,1,1,ec02d7f8fe7cd4a5a5f916a2baddfabc466ebee07cd8bcb02e8fca13e7d4c274,2024-05-31T10:15:09.330000
CVE-2024-2370,0,0,d585ae9ac856bf263bbb5fc87411ce61002d06f83e420348ba9623542805dbad,2024-03-20T16:15:08.270000
CVE-2024-23704,0,0,b6e98937a05e8e3c54df94790ffc1b76a7a7dbc7d0f374847ce3c9bc63a138f4,2024-05-08T13:15:00.690000
CVE-2024-23705,0,0,208f2921dda59fa7b14af1145627e3c7132ea207198825c4a670a9a509059f41,2024-05-08T13:15:00.690000
@ -251004,7 +251006,7 @@ CVE-2024-36031,0,0,f1f7732b588d979c4d00ffb8d25c959f8c8bff0081fecca244d58693de70d
CVE-2024-36032,0,0,77f61e4eb9b69791255a1749011bbf5bfe101901226204e159aab9fa96fdf06d,2024-05-30T18:19:11.743000
CVE-2024-36033,0,0,4595ccbf163ec0bc444a3229a8e7d6e073fa8ea6bfd6b25c7eb2ce3a32399639,2024-05-30T18:19:11.743000
CVE-2024-36036,0,0,399529c38d111e737eeb859298f0b12af936846a2a63555a4e1fd24103a1ae63,2024-05-28T12:39:28.377000
CVE-2024-36037,0,0,0f6f02ecbfa932c634fa472570a56c7201914f9b8fefa1f5fa9e003f7709a6de,2024-05-28T12:39:28.377000
CVE-2024-36037,0,1,e8ddc31f39a62a0d6f93584a2886b907bf85fcebcdd4d47a54b701feefb8d09a,2024-05-31T11:15:09.563000
CVE-2024-36039,0,0,a8363180f0299206d54e6558901cb5cddfc68c9874309661faf6b2f8a76377e4,2024-05-21T16:53:56.550000
CVE-2024-36043,0,0,a692d077d358c1feb0a509deb9a8e16caf647bf207b7ab7a4cd103038bbab39e,2024-05-20T13:00:04.957000
CVE-2024-36048,0,0,e007b0325d407bc8859f041fde0fd19208cc3895dbb6e40867a5a83e255b52f5,2024-05-20T13:00:04.957000
@ -251523,6 +251525,7 @@ CVE-2024-4156,0,0,adce86e733c051c288bfe88b689ecb95a01f304de9b2f4b7c4a80ca844fcaf
CVE-2024-4157,0,0,d7f17200d1961bf339712e1e1bb3214a7e4d567794b6612602f24588bbec4550,2024-05-22T12:46:53.887000
CVE-2024-4158,0,0,e2e18bbc2894b8bc9f7922444db50e4c9e9d54450b012e9427f5b5a6c6168969,2024-05-14T16:11:39.510000
CVE-2024-4159,0,0,cf0daf8ecd317ce4288e8a4812364c59b3b10d10c0c5945533667d40be8a71fc,2024-04-25T23:15:47.087000
CVE-2024-4160,1,1,94898ec54378c7899c9ee7834ce66fd30656bd7c70fac2c5359b1de9573d71fd,2024-05-31T10:15:09.977000
CVE-2024-4161,0,0,8c35858b76cabcd8cf78ed758e4c9d58e5dffa2b20a32ec25b41a43a372b2218,2024-04-25T13:18:13.537000
CVE-2024-4162,0,0,3ab30e180def8149fd8494b0a91d0c176ba9184404d532022796a118c67b4ade,2024-05-08T13:15:00.690000
CVE-2024-4163,0,0,0abae06321832430d51e94179291aa50a40ff5a5f25f762f5290e51ebf608907,2024-04-26T12:58:17.720000
@ -252060,6 +252063,7 @@ CVE-2024-5031,0,0,e598ebc5c9fa457f9bece560d72de6fc8851ac943a5e7908ec776eb9202f17
CVE-2024-5035,0,0,04b94f66274e3d3d22c52a6f453c8b285ab22579cfad76ef028d6a110e1aa148,2024-05-29T05:16:08.793000
CVE-2024-5039,0,0,b127541466e1e4b8bc6b8f397a7aacd2a75f26f3d1a91377e6b8a8edd312b492,2024-05-29T15:18:26.427000
CVE-2024-5040,0,0,0ff887bafdff8fcd61409221ff18cf1da08d6038e0047c0178293c334ec34d62,2024-05-22T12:46:53.887000
CVE-2024-5041,1,1,eb2305a4f98c01029366fe1714dd39120c2faf53804227b88e7ab45165cd007f,2024-05-31T10:15:10.220000
CVE-2024-5042,0,0,f1d9a9fcfa7383b6226ef8151dfed6201a75da0740b190c8c597da456657abd9,2024-05-20T06:15:08.723000
CVE-2024-5043,0,0,2d8ce763fd3fd63cad8518145d585bd4026207a52cef2d0ff57c8a20bc93669f,2024-05-17T18:35:35.070000
CVE-2024-5044,0,0,6219fee342540ef7a286bcddf9d98d227f7468ec28bf9c4a7c254b2f76b9d570,2024-05-17T18:35:35.070000
@ -252198,6 +252202,7 @@ CVE-2024-5339,0,0,06454cd858966bd04fe11523962adaa26a10dc55f1781c23c279a6bf8e0f11
CVE-2024-5340,0,0,c66c0c9e55de3c725084d3080da1dc604d47daf703d95b2c548541ec6a382225,2024-05-28T12:39:42.673000
CVE-2024-5341,0,0,2b72dd4ef57e598a2469a1d6786a4762ce0fcb8187c35f2f4bd1ff39b4044b7e,2024-05-30T13:15:41.297000
CVE-2024-5345,0,0,ab408465466f89085738a2657691827a8c34288c9c24d6282b532357c2e7aa95,2024-05-31T03:15:08.613000
CVE-2024-5347,1,1,1884a03651c7a09ff016c5d307b4503616718e8866ef272ca8ed86c6fc1b8d75,2024-05-31T10:15:10.413000
CVE-2024-5350,0,0,60bbd22831ddecb115d40713a9dc768f9983e70563a63aa9f7486c68fbd4f9e1,2024-05-28T12:39:42.673000
CVE-2024-5351,0,0,75936f9a30b9b2678d667660507da4226e150a018add31c316ae6f6c8d9a34b8,2024-05-28T12:39:42.673000
CVE-2024-5352,0,0,436cc86ab2a56db91a02662bc69df77d88892fce705caf803e28ba33694f3f1c,2024-05-28T12:39:42.673000
@ -252259,8 +252264,9 @@ CVE-2024-5427,0,0,4f849b019b7beeb02bfb03ff7ed60d017364c7c9c7607c47eed7de9a4f23d8
CVE-2024-5428,0,0,48df461aef64d2744feebfecb3948a4ed7b72d467be8b3109a057cc13cad6e25,2024-05-28T14:59:09.827000
CVE-2024-5433,0,0,d0946774ada383b4af0e78f23b9c449d05f83a7124810af4e383f90b0cdbda75,2024-05-29T13:02:09.280000
CVE-2024-5434,0,0,dc2716eb218edba725ac85c17a2930de7a00b6563d0ca53040574106ea0b92ed,2024-05-29T13:02:09.280000
CVE-2024-5436,1,1,c16c90ed7ed9948e598284837e6c2630f0ce02eadc0aa812d962b1fdca10ed9e,2024-05-31T09:15:09.780000
CVE-2024-5436,0,0,c16c90ed7ed9948e598284837e6c2630f0ce02eadc0aa812d962b1fdca10ed9e,2024-05-31T09:15:09.780000
CVE-2024-5437,0,0,557d2d92d351d0b9c718cc97d7a9d4fae40afc0a93c4cab84fee8196b51766e4,2024-05-29T13:02:09.280000
CVE-2024-5484,1,1,7de35f8eee9232651ed147ec3168f6740617b1737ec3ff6913988b98b84f6ef1,2024-05-31T11:15:09.783000
CVE-2024-5493,0,0,11b7af2f62e6d6617c3409ca97866719f8ce54243ff3b1ec625b16c827265657,2024-05-30T23:15:48.283000
CVE-2024-5494,0,0,770b334fc231b3ed86ae9b94e3aa5e641833df0b665cac1de3b4be5b91f5348c,2024-05-30T23:15:48.367000
CVE-2024-5495,0,0,ba59129b2f25efe96d350aefd57f1c72ec1a1f1a0aaba3ef25408c33b5cf0b75,2024-05-30T23:15:48.433000
@ -252276,7 +252282,8 @@ CVE-2024-5518,0,0,c6c5d729da0a7fdb252df13e9278838e657e3d1804b499a08e554d0de2d3ed
CVE-2024-5519,0,0,d519626b70411be113b4a81745e5090515ba34ffa73270abb5493ddd8c6cc2f5,2024-05-30T18:18:58.870000
CVE-2024-5520,0,0,01643a0812792ebebe752e00036b007afdec14baaae8989ff2384745352cbc26,2024-05-30T13:15:41.297000
CVE-2024-5521,0,0,4a2f2a375f9f418bc825efb2ed9dd95828617be6bdda6d395d3c50391732dd4e,2024-05-30T13:15:41.297000
CVE-2024-5523,1,1,165c99436126f7404444d93277c5a47eac29e3acdc0abd60745a5fdb7c6f25c7,2024-05-31T08:15:08.870000
CVE-2024-5524,1,1,1f4648c59290af45a15ed0b32642c88763bb4399a5b86d8bf7fd00c68b8acea3,2024-05-31T08:15:09.127000
CVE-2024-5525,1,1,dd375b350d045f12eb8c756453986ca845a7005cf5e0164acd540fad2e234806,2024-05-31T08:15:09.357000
CVE-2024-5523,0,0,165c99436126f7404444d93277c5a47eac29e3acdc0abd60745a5fdb7c6f25c7,2024-05-31T08:15:08.870000
CVE-2024-5524,0,0,1f4648c59290af45a15ed0b32642c88763bb4399a5b86d8bf7fd00c68b8acea3,2024-05-31T08:15:09.127000
CVE-2024-5525,0,0,dd375b350d045f12eb8c756453986ca845a7005cf5e0164acd540fad2e234806,2024-05-31T08:15:09.357000
CVE-2024-5537,0,0,071475eb8c0f92cc8ea9522d658283ad0e8213ba6740ff46ee05e5b24c18c3d8,2024-05-30T17:15:34.583000
CVE-2024-5538,1,1,183cea799fa9410e329e72f326a10b8369aedcea9a5b7583a44bf33ecc305070,2024-05-31T11:15:09.923000

Can't render this file because it is too large.