diff --git a/CVE-2024/CVE-2024-33xx/CVE-2024-3345.json b/CVE-2024/CVE-2024-33xx/CVE-2024-3345.json new file mode 100644 index 00000000000..670fdec2029 --- /dev/null +++ b/CVE-2024/CVE-2024-33xx/CVE-2024-3345.json @@ -0,0 +1,51 @@ +{ + "id": "CVE-2024-3345", + "sourceIdentifier": "security@wordfence.com", + "published": "2024-05-21T09:15:08.533", + "lastModified": "2024-05-21T09:15:08.533", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "The ShopLentor plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's woolentorsearch shortcode in all versions up to, and including, 2.8.8 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security@wordfence.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 6.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 3.1, + "impactScore": 2.7 + } + ] + }, + "references": [ + { + "url": "https://plugins.trac.wordpress.org/browser/woolentor-addons/tags/2.8.3/includes/modules/ajax-search/base.php#L137", + "source": "security@wordfence.com" + }, + { + "url": "https://plugins.trac.wordpress.org/changeset/3088881/woolentor-addons/trunk/includes/modules/ajax-search/base.php", + "source": "security@wordfence.com" + }, + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/d6a73a7f-53ac-4930-a1cd-c39818f64678?source=cve", + "source": "security@wordfence.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-45xx/CVE-2024-4566.json b/CVE-2024/CVE-2024-45xx/CVE-2024-4566.json new file mode 100644 index 00000000000..f4e3e77637c --- /dev/null +++ b/CVE-2024/CVE-2024-45xx/CVE-2024-4566.json @@ -0,0 +1,51 @@ +{ + "id": "CVE-2024-4566", + "sourceIdentifier": "security@wordfence.com", + "published": "2024-05-21T09:15:08.890", + "lastModified": "2024-05-21T09:15:08.890", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "The ShopLentor plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the ajax_dismiss function in all versions up to, and including, 2.8.8. This makes it possible for authenticated attackers, with contributor-level access and above, to set arbitrary WordPress options to \"true\". NOTE: This vulnerability can be exploited by attackers with subscriber- or customer-level access and above if (1) the WooCommerce plugin is deactivated or (2) access to the default WordPress admin dashboard is explicitly enabled for authenticated users." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security@wordfence.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "HIGH", + "baseScore": 7.1, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 4.2 + } + ] + }, + "references": [ + { + "url": "https://plugins.trac.wordpress.org/browser/woolentor-addons/trunk/includes/admin/include/class.notice.php#L52", + "source": "security@wordfence.com" + }, + { + "url": "https://plugins.trac.wordpress.org/changeset/3088881/woolentor-addons/trunk/includes/admin/include/class.notice.php", + "source": "security@wordfence.com" + }, + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/c6aaabe9-4f55-4c01-b350-573e6a944353?source=cve", + "source": "security@wordfence.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-48xx/CVE-2024-4875.json b/CVE-2024/CVE-2024-48xx/CVE-2024-4875.json new file mode 100644 index 00000000000..5c79df986da --- /dev/null +++ b/CVE-2024/CVE-2024-48xx/CVE-2024-4875.json @@ -0,0 +1,51 @@ +{ + "id": "CVE-2024-4875", + "sourceIdentifier": "security@wordfence.com", + "published": "2024-05-21T09:15:09.103", + "lastModified": "2024-05-21T09:15:09.103", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "The HT Mega \u2013 Absolute Addons For Elementor plugin for WordPress is vulnerable to unauthorized modification of data|loss of data due to a missing capability check on the 'ajax_dismiss' function in versions up to, and including, 2.5.2. This makes it possible for authenticated attackers, with subscriber-level permissions and above, to update options such as users_can_register, which can lead to unauthorized user registration." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security@wordfence.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 4.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ] + }, + "references": [ + { + "url": "https://plugins.trac.wordpress.org/browser/ht-mega-for-elementor/trunk/admin/include/class.dynamic-notice.php#L52", + "source": "security@wordfence.com" + }, + { + "url": "https://plugins.trac.wordpress.org/changeset/3088899/ht-mega-for-elementor/trunk/admin/include/class.dynamic-notice.php", + "source": "security@wordfence.com" + }, + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/bdd3868a-d741-42b4-bc7f-6fb5d33bb71b?source=cve", + "source": "security@wordfence.com" + } + ] +} \ No newline at end of file diff --git a/README.md b/README.md index 875b51b3a89..3237941aa5e 100644 --- a/README.md +++ b/README.md @@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2024-05-21T08:01:05.489972+00:00 +2024-05-21T10:01:14.137926+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2024-05-21T07:15:09.087000+00:00 +2024-05-21T09:15:09.103000+00:00 ``` ### Last Data Feed Release @@ -33,29 +33,22 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### Total Number of included CVEs ```plain -250891 +250894 ``` ### CVEs added in the last Commit -Recently added CVEs: `8` +Recently added CVEs: `3` -- [CVE-2024-2189](CVE-2024/CVE-2024-21xx/CVE-2024-2189.json) (`2024-05-21T06:15:08.540`) -- [CVE-2024-4061](CVE-2024/CVE-2024-40xx/CVE-2024-4061.json) (`2024-05-21T06:15:09.247`) -- [CVE-2024-4289](CVE-2024/CVE-2024-42xx/CVE-2024-4289.json) (`2024-05-21T06:15:09.517`) -- [CVE-2024-4290](CVE-2024/CVE-2024-42xx/CVE-2024-4290.json) (`2024-05-21T06:15:09.767`) -- [CVE-2024-4372](CVE-2024/CVE-2024-43xx/CVE-2024-4372.json) (`2024-05-21T06:15:10.000`) -- [CVE-2024-4442](CVE-2024/CVE-2024-44xx/CVE-2024-4442.json) (`2024-05-21T07:15:08.460`) -- [CVE-2024-4470](CVE-2024/CVE-2024-44xx/CVE-2024-4470.json) (`2024-05-21T07:15:08.810`) -- [CVE-2024-4710](CVE-2024/CVE-2024-47xx/CVE-2024-4710.json) (`2024-05-21T07:15:09.087`) +- [CVE-2024-3345](CVE-2024/CVE-2024-33xx/CVE-2024-3345.json) (`2024-05-21T09:15:08.533`) +- [CVE-2024-4566](CVE-2024/CVE-2024-45xx/CVE-2024-4566.json) (`2024-05-21T09:15:08.890`) +- [CVE-2024-4875](CVE-2024/CVE-2024-48xx/CVE-2024-4875.json) (`2024-05-21T09:15:09.103`) ### CVEs modified in the last Commit -Recently modified CVEs: `2` +Recently modified CVEs: `0` -- [CVE-2023-52665](CVE-2023/CVE-2023-526xx/CVE-2023-52665.json) (`2024-05-21T07:15:08.063`) -- [CVE-2024-26904](CVE-2024/CVE-2024-269xx/CVE-2024-26904.json) (`2024-05-21T07:15:08.260`) ## Download and Usage diff --git a/_state.csv b/_state.csv index 22f16d31088..00a2836645f 100644 --- a/_state.csv +++ b/_state.csv @@ -237785,7 +237785,7 @@ CVE-2023-52661,0,0,1dbeccb9eacb34c302d3ddff035870c695ace80916461a042d1f30d95acfc CVE-2023-52662,0,0,bdd6bda2d726799fa055af169dff2cfa2e72783f1701a8915299c214f51384dc,2024-05-17T18:35:35.070000 CVE-2023-52663,0,0,6fdf9bf74f5520bdc3a90c3b513231be758b3dcd7c10d063b14d1ce36d3f7627,2024-05-17T18:35:35.070000 CVE-2023-52664,0,0,82b193593b6298a24a9d99379e99c4f58e9e94981325ba063f9758c035e411df,2024-05-17T18:35:35.070000 -CVE-2023-52665,0,1,223587f9b020dfc4f7c6c14abdecbb69d6296e17f8cbe2aa66f58a9b6fd27643,2024-05-21T07:15:08.063000 +CVE-2023-52665,0,0,223587f9b020dfc4f7c6c14abdecbb69d6296e17f8cbe2aa66f58a9b6fd27643,2024-05-21T07:15:08.063000 CVE-2023-52666,0,0,8135c2458930f054da0899f143918918c17c28a63600afcafe11b48cf5834a46,2024-05-17T18:35:35.070000 CVE-2023-52667,0,0,3c80102722df023325b9acfadeda6f8602f7ecd95b96730db1f409c15c00075f,2024-05-17T18:35:35.070000 CVE-2023-52668,0,0,5c13c0b847e48d9b126324f274bc3bcccec8abe254d046eaafb879efe19c95ea,2024-05-17T18:35:35.070000 @@ -242293,7 +242293,7 @@ CVE-2024-21885,0,0,3a8555aba848a763891301ea45be2dc447cf6e91c8980c7f8fb662d07f448 CVE-2024-21886,0,0,51c64b750a7fa30c4151f47347eefcb19a07d8afc937f6dd2165654f59623a1b,2024-04-30T14:15:14.867000 CVE-2024-21887,0,0,27308d07d43795d3f4289d79a64af5933e89a71cf679d41be9d0c5a30a308379,2024-01-22T17:15:09.523000 CVE-2024-21888,0,0,9de3f75608c2ffa998f0bcfa0dcc7f6af68bb755862afa34798392c7baa192b3,2024-01-31T19:53:06.303000 -CVE-2024-2189,1,1,7e013d10d951078be3a093b0dc0856b42b1454039adc893485a99f1726b0b4fc,2024-05-21T06:15:08.540000 +CVE-2024-2189,0,0,7e013d10d951078be3a093b0dc0856b42b1454039adc893485a99f1726b0b4fc,2024-05-21T06:15:08.540000 CVE-2024-21890,0,0,a23e39bf178457ea1a62055175acdccf21db560a2e161d84f67585a3aec660a5,2024-05-01T18:15:13.430000 CVE-2024-21891,0,0,a2485cf665b74852ec579d22867079892dab474f76b17a713a8f19b29fc1374c,2024-05-01T18:15:13.500000 CVE-2024-21892,0,0,0a2d4c2722cd9d0c5169a54525f85c8a3a71dec229f64a884ec45af2c9ceefca,2024-05-01T18:15:13.610000 @@ -245300,7 +245300,7 @@ CVE-2024-26900,0,0,7d396e2f9d436e2b737a24c012d00c80957fc0ed041765143888d895b983c CVE-2024-26901,0,0,0b69a2bddc7a89f4a9274440cdd8336560c75256cb438cb50cf8b2c1d8036b52,2024-04-29T19:38:34.730000 CVE-2024-26902,0,0,79dd09d64774289a294bba37c7616f62083466aaf39eb549f12f6f728e6a3fa4,2024-04-29T19:40:05.897000 CVE-2024-26903,0,0,21a53434b791da4ce02d5af7f605d1d70b522d70f04ff414b8e2a7f15b1fa47a,2024-04-29T19:41:09.400000 -CVE-2024-26904,0,1,37626f6bc581b325e48f53fe8a5b21da44d9f414e15eb9fb0721d0de3e45a169,2024-05-21T07:15:08.260000 +CVE-2024-26904,0,0,37626f6bc581b325e48f53fe8a5b21da44d9f414e15eb9fb0721d0de3e45a169,2024-05-21T07:15:08.260000 CVE-2024-26905,0,0,b2eb4233229c7ebf6d1f823188c91f6d5ec6f202c5b26a0cfddc918598c98c54,2024-04-17T12:48:07.510000 CVE-2024-26906,0,0,ab0559b52d04a535dceb9e9c10280e22d32dc74dd6f462f3401a818acc49de6b,2024-04-17T12:48:07.510000 CVE-2024-26907,0,0,2f67b26b0d30d6258d15eaffbdba785264c13510ac97fa56a9a1d2c082244bfa,2024-04-29T19:44:18.727000 @@ -248987,6 +248987,7 @@ CVE-2024-33443,0,0,7f62cc637ddbcb31d4d27451ebd5ff31e1289fc0b12403902ee9379da64c7 CVE-2024-33444,0,0,dd8f738307cf7a98c771473a6747e7b5352188764c18ccbccd77e23af1117ede,2024-04-30T13:11:16.690000 CVE-2024-33445,0,0,2adc5b1320c62f7d749fc302bf856c4946bcb2b6ed78c5da9933008a1fbfc075,2024-04-30T13:11:16.690000 CVE-2024-33449,0,0,82c0fe8439f268eedf63ed1da3eb3fb2ad29e68126122a5274369bbec0c38b68,2024-04-30T13:11:16.690000 +CVE-2024-3345,1,1,8e6db83f3ba149228a22c93b704121b0bd8780f96b60adf565d8c294045ae6e7,2024-05-21T09:15:08.533000 CVE-2024-33454,0,0,af2458e2a92892beb63c1bf2d95ff7e9398d77f429fab02bbeabef831c2c6674,2024-05-14T16:12:23.490000 CVE-2024-3346,0,0,312355f19bae8f6fad300133bd9d49713b734c255da277af0376b1f0fb7936a0,2024-05-17T02:39:51.207000 CVE-2024-33465,0,0,eadb6536921f299769dd28ca056127bee4ec0a5d9a79c4314362582bea14e967,2024-04-30T17:52:35.057000 @@ -250316,7 +250317,7 @@ CVE-2024-4056,0,0,8d2872a63b61af99b314442fa34c585e616ec707e8d3b58da8a6d93a2f4a48 CVE-2024-4058,0,0,89d601f0a6556a83c3f1ddb11302d59200b53d35574245a735ec02b677ca6a2a,2024-05-03T03:16:29.387000 CVE-2024-4059,0,0,f7356d83fe5fccf2c54f421bb90f2c15bd9bf33edb756392f4236a5836d7af45,2024-05-03T03:16:29.430000 CVE-2024-4060,0,0,e73d48dba8d4867b445df561ca35c4a253ea1abc6b1746f05e1e8b87e0d0ee8e,2024-05-03T04:15:09.620000 -CVE-2024-4061,1,1,971d0b947b761785e23526b244f19a8746f5586888ed97e319384f6d771167a6,2024-05-21T06:15:09.247000 +CVE-2024-4061,0,0,971d0b947b761785e23526b244f19a8746f5586888ed97e319384f6d771167a6,2024-05-21T06:15:09.247000 CVE-2024-4062,0,0,88e0189a903dc491d969324b51281f72bfa6b01ddae9db1a05c8c0b817ed3796,2024-05-17T02:40:14.040000 CVE-2024-4063,0,0,18284e200045179ad5ce0dcd8451273a1895c48566173aa3752f335ebb5e339d,2024-05-17T02:40:14.133000 CVE-2024-4064,0,0,0a357968458dd966b7a4969f86556627b0af0220edbb91249e767e6972ab2a17,2024-05-17T02:40:14.223000 @@ -250450,8 +250451,8 @@ CVE-2024-4281,0,0,f2f6c94941e4ed7f1c98ab6351686f1d868a8657bf9b3ff2bb73d7d016e69d CVE-2024-4284,0,0,6b0486c923019958d1c20328f9a4263f9ca3aa289165b466591abb7c0e677c17,2024-05-20T13:00:04.957000 CVE-2024-4287,0,0,ae556e7173c21b1abf7f9026eca2cea8416285aae89182bc9ebe9e9352811522,2024-05-20T15:17:54.513000 CVE-2024-4288,0,0,9367649ffe77365cb201f95bc69986ffb5e481ba50542c3f0953c5f2e0eb0d2a,2024-05-16T13:03:05.353000 -CVE-2024-4289,1,1,743c81dfd0948c5a441dfd6c68fb612b58ac65c0714ecdd8156eaeba6a723b90,2024-05-21T06:15:09.517000 -CVE-2024-4290,1,1,feb53fe3af2bcf551731520a6da077d2bdc3155342f2e3fa22ef573f55b0a911,2024-05-21T06:15:09.767000 +CVE-2024-4289,0,0,743c81dfd0948c5a441dfd6c68fb612b58ac65c0714ecdd8156eaeba6a723b90,2024-05-21T06:15:09.517000 +CVE-2024-4290,0,0,feb53fe3af2bcf551731520a6da077d2bdc3155342f2e3fa22ef573f55b0a911,2024-05-21T06:15:09.767000 CVE-2024-4291,0,0,dcab47edda64598994b6d35eea1a5bae28c719351e51b2665b279255f64e7970,2024-05-17T02:40:21.667000 CVE-2024-4292,0,0,3a853b90a84b704f0ceeeca9f33221358bfd4e7e30200ef38bb21c91a07a856b,2024-05-17T02:40:21.770000 CVE-2024-4293,0,0,84e742f5c5d4f4e3db1209335ece4a5ada2a411ffdf91576a76a726027b3c6ab,2024-05-17T02:40:21.860000 @@ -250502,7 +250503,7 @@ CVE-2024-4367,0,0,10c9ba4e2375d81f02eb3145704f99e298b4c446473517eea4810baa65f2c6 CVE-2024-4368,0,0,0ee02ebde276d817508f5495294b3429c463a1f4241660388e0c329992e72be6,2024-05-04T02:15:06.853000 CVE-2024-4369,0,0,ab5992320463150d25768d540495632f3cea0e672e96fca10ae18e5fed17e7b3,2024-05-02T03:15:15.027000 CVE-2024-4370,0,0,069da1b0ae5c656e192af67776d4fb05a1e574a802cd3af79b4e6cc7490b0dbc,2024-05-15T16:40:19.330000 -CVE-2024-4372,1,1,53a93c7dc9a8f67c8ad9cabf8ceb14d3171505144d5a455fc191f7b0213c33ca,2024-05-21T06:15:10 +CVE-2024-4372,0,0,53a93c7dc9a8f67c8ad9cabf8ceb14d3171505144d5a455fc191f7b0213c33ca,2024-05-21T06:15:10 CVE-2024-4373,0,0,f38def9014d5248f107e6bba87e0f735d485b9410ddb561204173488b0ad462b,2024-05-15T16:40:19.330000 CVE-2024-4374,0,0,6250e338d545ce81ee79d41df4e92db6c03dfd1d9083685761485050a6001f35,2024-05-20T13:00:34.807000 CVE-2024-4383,0,0,71e35b2278aca455b2ce46e7157369face569e9a329ff0e3436aa90a5b256792,2024-05-14T16:11:39.510000 @@ -250533,7 +250534,7 @@ CVE-2024-4438,0,0,93ceea5f04a92ff8a47d298b7349cd99931c0f6ebe6d5712d64fba3d2e18a7 CVE-2024-4439,0,0,d4904ab7f03492cebfcab113d16c9db0e8589fc24c413d994223fa5d5b94f71f,2024-05-03T12:48:41.067000 CVE-2024-4440,0,0,51dabd0ed14011a33ac13484b9ff25988940854e7446055f86986b74eaffda88,2024-05-14T19:17:55.627000 CVE-2024-4441,0,0,21bddaae6271b56b94db02a08e641400bfc943be91594296c54fd13926b71ef2,2024-05-14T16:11:39.510000 -CVE-2024-4442,1,1,8981bfe18557018c10f106a9c8a8f9cc8f8ea47fe462fbf345d0482f1efb0b49,2024-05-21T07:15:08.460000 +CVE-2024-4442,0,0,8981bfe18557018c10f106a9c8a8f9cc8f8ea47fe462fbf345d0482f1efb0b49,2024-05-21T07:15:08.460000 CVE-2024-4444,0,0,76481c90a9c81b157f25a6ad93f33f71969c6509d3c28850adb0a1bd3cfa3281,2024-05-14T16:11:39.510000 CVE-2024-4445,0,0,42f5f65e0ec1a0527ed0ebe136ff3e505384e30728c0f33fdcc95acd928f2f50,2024-05-14T19:17:55.627000 CVE-2024-4446,0,0,c1a78a1d4c0d05d17b6cead174a683289ca018fac3b1c104ff2e5b23dbf06e48,2024-05-14T16:11:39.510000 @@ -250543,7 +250544,7 @@ CVE-2024-4456,0,0,43bdd543de001702ca45614b4a3579c52bfa7b188e5cb3e6b81f25f610f74e CVE-2024-4461,0,0,ad05f4e37257e33f27f784f842f8dfa34f685ff06dd273bc6842a04c51c93bf6,2024-05-03T12:48:41.067000 CVE-2024-4463,0,0,aaa5b32073fcbc7160927d348961b4790302ca7b8c414e16cdb6cacefbfd98b3,2024-05-14T16:11:39.510000 CVE-2024-4466,0,0,d6c981370b54d7938faad670495d8ca5b736025a1a2ded921b62354a18385ccc,2024-05-03T12:48:41.067000 -CVE-2024-4470,1,1,0cce68e99689f24a95161cb241f1136b781bbe6d1f0b9316e16ae32d6f56f073,2024-05-21T07:15:08.810000 +CVE-2024-4470,0,0,0cce68e99689f24a95161cb241f1136b781bbe6d1f0b9316e16ae32d6f56f073,2024-05-21T07:15:08.810000 CVE-2024-4473,0,0,be8deb42c9d1905b301c3bfbae608b1551ce9395ac2fbbb337038c3a7eb347fa,2024-05-14T19:17:55.627000 CVE-2024-4478,0,0,31a4a4c48861c0c170c939e3aa0b10661ec97e9653465707919926dbd3595183,2024-05-16T13:03:05.353000 CVE-2024-4481,0,0,7ecf88f2a22a659849266bdc0bd40c464d195e3dafdf490c58869a301c87572b,2024-05-14T16:11:39.510000 @@ -250599,6 +250600,7 @@ CVE-2024-4559,0,0,04253977f1b3aac9c2c8228f67b55a5d97f0f228a3fd1b3fdffeaf9dbbc176 CVE-2024-4560,0,0,01330bc30e6abf90cd0e894076fd4822775b90946ecfbbe71c3855f1f2c00212,2024-05-14T16:11:39.510000 CVE-2024-4561,0,0,419f075cb470fc0bcbe1e02ad47a96fd3735721568a3ea0b27d92242ea08e526,2024-05-15T16:40:19.330000 CVE-2024-4562,0,0,4b41dac3b3dc0160472fa769fd66d4820687adcd6a603b6680aeb5866557430b,2024-05-15T16:40:19.330000 +CVE-2024-4566,1,1,a756d09326ad85d3086ea7fa0189442dde86c5a73f4d221083940825fe4edfd2,2024-05-21T09:15:08.890000 CVE-2024-4567,0,0,bff521ec958712c348010a89da0e0aec519b6a717613a798e9a8fee426de5e74,2024-05-14T16:11:39.510000 CVE-2024-4568,0,0,79c6e65478e2e86d702896e792fead76bbebdb118f8c0f66e6390a241a22321a,2024-05-07T13:39:32.710000 CVE-2024-4571,0,0,b379f15291a8a65b330c223bc6a31fd0a21b183a906c0a4077ca3cf5d38b8ad0,2024-05-14T15:44:05.750000 @@ -250677,7 +250679,7 @@ CVE-2024-4699,0,0,21634a770b960d22aa24dc1f0ea343763012f9507287610a68f53780612049 CVE-2024-4701,0,0,31c0f40927cc6a1a9aece611ec4491a5435df4e5c3a9daffc9dfb7710658ca96,2024-05-14T16:11:39.510000 CVE-2024-4702,0,0,391d02c5718dd442c026ca8f3973c4fe10894f8eeb54175158dc44cd7ef50d4a,2024-05-15T16:40:19.330000 CVE-2024-4709,0,0,383dbf3a5b128343c77c07c63d6b9081028427dd357dd94a114eb158c69d030d,2024-05-20T13:00:34.807000 -CVE-2024-4710,1,1,608aa390af8e84e2c9fa201d024990a01f6045b0e7eb161424a2ea87e1078294,2024-05-21T07:15:09.087000 +CVE-2024-4710,0,0,608aa390af8e84e2c9fa201d024990a01f6045b0e7eb161424a2ea87e1078294,2024-05-21T07:15:09.087000 CVE-2024-4712,0,0,f79d5936efdb7279077ea6da35ae307312c55a147f3075b5570853347f8017b9,2024-05-14T16:11:39.510000 CVE-2024-4713,0,0,63c8fe02e071c01e10e60f543cd0776ed83adea75c2d063179e2f75e75c30c3b,2024-05-17T02:40:33.880000 CVE-2024-4714,0,0,4e7ff77f8284c93c8758bb989744763ec5c4cb8551eeb8d726beabface4981b3,2024-05-17T02:40:33.983000 @@ -250772,6 +250774,7 @@ CVE-2024-4859,0,0,3de5434b35db9344c6a8c9ff1c0891dd93d801d8510e1a23be87da56d66078 CVE-2024-4860,0,0,078ece1acb5f59d15050f08de42942705925d025d9ef9dfb969c99e0b62152d4,2024-05-14T19:17:55.627000 CVE-2024-4865,0,0,329a52916bfd6dfb743076cafa1076f06a8ce9ff30efb7c2cd8c895178c7ad64,2024-05-20T13:00:34.807000 CVE-2024-4871,0,0,089a89f3309c27433f20e3be4ef9a00379f9f19601c1c8029649846113aed43a,2024-05-14T19:17:55.627000 +CVE-2024-4875,1,1,196d997c6e8c967fc738be0f9232c06bbee9b2632adf2326052dc6b01f415553,2024-05-21T09:15:09.103000 CVE-2024-4891,0,0,e74bd5bb85af020930d6b90474dcbd5a7bb8df3f51cfa57310da23b320714b43,2024-05-20T13:00:34.807000 CVE-2024-4893,0,0,d5ebc2dfcb13b74b4f1951a124d2e638a95f79aa05d19e6fadfe65b7ad1c4f46,2024-05-15T16:40:19.330000 CVE-2024-4894,0,0,d68130303d356c053d0f6768d0ee08506e206d16216142c952b9b56af8835d24,2024-05-15T16:40:19.330000