From 0b279bd0df2cdd319d2130155103e322cca3f63b Mon Sep 17 00:00:00 2001 From: cad-safe-bot Date: Thu, 6 Jun 2024 16:03:37 +0000 Subject: [PATCH] Auto-Update: 2024-06-06T16:00:44.365720+00:00 --- CVE-2023/CVE-2023-499xx/CVE-2023-49927.json | 8 +- CVE-2023/CVE-2023-499xx/CVE-2023-49928.json | 8 +- CVE-2023/CVE-2023-508xx/CVE-2023-50803.json | 8 +- CVE-2023/CVE-2023-508xx/CVE-2023-50804.json | 8 +- CVE-2023/CVE-2023-69xx/CVE-2023-6956.json | 8 +- CVE-2023/CVE-2023-69xx/CVE-2023-6966.json | 8 +- CVE-2023/CVE-2023-69xx/CVE-2023-6968.json | 8 +- CVE-2024/CVE-2024-09xx/CVE-2024-0910.json | 8 +- CVE-2024/CVE-2024-09xx/CVE-2024-0912.json | 8 +- CVE-2024/CVE-2024-09xx/CVE-2024-0972.json | 8 +- CVE-2024/CVE-2024-11xx/CVE-2024-1175.json | 8 +- CVE-2024/CVE-2024-12xx/CVE-2024-1202.json | 2 +- CVE-2024/CVE-2024-204xx/CVE-2024-20404.json | 8 +- CVE-2024/CVE-2024-204xx/CVE-2024-20405.json | 8 +- CVE-2024/CVE-2024-20xx/CVE-2024-2017.json | 8 +- CVE-2024/CVE-2024-20xx/CVE-2024-2087.json | 71 ++++++- CVE-2024/CVE-2024-236xx/CVE-2024-23692.json | 6 +- CVE-2024/CVE-2024-23xx/CVE-2024-2350.json | 8 +- CVE-2024/CVE-2024-247xx/CVE-2024-24789.json | 8 +- CVE-2024/CVE-2024-247xx/CVE-2024-24790.json | 8 +- CVE-2024/CVE-2024-273xx/CVE-2024-27370.json | 8 +- CVE-2024/CVE-2024-273xx/CVE-2024-27371.json | 8 +- CVE-2024/CVE-2024-273xx/CVE-2024-27372.json | 8 +- CVE-2024/CVE-2024-273xx/CVE-2024-27373.json | 8 +- CVE-2024/CVE-2024-273xx/CVE-2024-27374.json | 8 +- CVE-2024/CVE-2024-273xx/CVE-2024-27375.json | 8 +- CVE-2024/CVE-2024-273xx/CVE-2024-27376.json | 8 +- CVE-2024/CVE-2024-273xx/CVE-2024-27377.json | 8 +- CVE-2024/CVE-2024-273xx/CVE-2024-27378.json | 8 +- CVE-2024/CVE-2024-273xx/CVE-2024-27379.json | 8 +- CVE-2024/CVE-2024-273xx/CVE-2024-27380.json | 8 +- CVE-2024/CVE-2024-273xx/CVE-2024-27381.json | 8 +- CVE-2024/CVE-2024-273xx/CVE-2024-27382.json | 8 +- CVE-2024/CVE-2024-288xx/CVE-2024-28818.json | 8 +- CVE-2024/CVE-2024-289xx/CVE-2024-28995.json | 8 +- CVE-2024/CVE-2024-29xx/CVE-2024-2922.json | 8 +- CVE-2024/CVE-2024-30xx/CVE-2024-3049.json | 8 +- CVE-2024/CVE-2024-348xx/CVE-2024-34832.json | 20 ++ CVE-2024/CVE-2024-34xx/CVE-2024-3469.json | 8 +- CVE-2024/CVE-2024-356xx/CVE-2024-35673.json | 8 +- CVE-2024/CVE-2024-356xx/CVE-2024-35674.json | 8 +- CVE-2024/CVE-2024-361xx/CVE-2024-36106.json | 59 ++++++ CVE-2024/CVE-2024-361xx/CVE-2024-36129.json | 8 +- CVE-2024/CVE-2024-363xx/CVE-2024-36393.json | 8 +- CVE-2024/CVE-2024-363xx/CVE-2024-36394.json | 8 +- CVE-2024/CVE-2024-365xx/CVE-2024-36547.json | 68 +++++- CVE-2024/CVE-2024-365xx/CVE-2024-36548.json | 67 +++++- CVE-2024/CVE-2024-365xx/CVE-2024-36549.json | 68 +++++- CVE-2024/CVE-2024-365xx/CVE-2024-36550.json | 68 +++++- CVE-2024/CVE-2024-366xx/CVE-2024-36667.json | 8 +- CVE-2024/CVE-2024-366xx/CVE-2024-36668.json | 8 +- CVE-2024/CVE-2024-366xx/CVE-2024-36669.json | 8 +- CVE-2024/CVE-2024-366xx/CVE-2024-36670.json | 8 +- CVE-2024/CVE-2024-367xx/CVE-2024-36779.json | 4 +- CVE-2024/CVE-2024-368xx/CVE-2024-36837.json | 8 +- CVE-2024/CVE-2024-36xx/CVE-2024-3667.json | 71 ++++++- CVE-2024/CVE-2024-37xx/CVE-2024-3716.json | 8 +- CVE-2024/CVE-2024-40xx/CVE-2024-4008.json | 8 +- CVE-2024/CVE-2024-40xx/CVE-2024-4009.json | 8 +- CVE-2024/CVE-2024-41xx/CVE-2024-4177.json | 8 +- CVE-2024/CVE-2024-41xx/CVE-2024-4194.json | 8 +- CVE-2024/CVE-2024-42xx/CVE-2024-4212.json | 8 +- CVE-2024/CVE-2024-43xx/CVE-2024-4364.json | 8 +- CVE-2024/CVE-2024-44xx/CVE-2024-4458.json | 8 +- CVE-2024/CVE-2024-44xx/CVE-2024-4459.json | 8 +- CVE-2024/CVE-2024-46xx/CVE-2024-4608.json | 8 +- CVE-2024/CVE-2024-47xx/CVE-2024-4705.json | 8 +- CVE-2024/CVE-2024-47xx/CVE-2024-4707.json | 8 +- CVE-2024/CVE-2024-47xx/CVE-2024-4788.json | 8 +- CVE-2024/CVE-2024-48xx/CVE-2024-4812.json | 8 +- CVE-2024/CVE-2024-49xx/CVE-2024-4942.json | 8 +- CVE-2024/CVE-2024-50xx/CVE-2024-5001.json | 8 +- CVE-2024/CVE-2024-50xx/CVE-2024-5037.json | 8 +- CVE-2024/CVE-2024-50xx/CVE-2024-5038.json | 8 +- CVE-2024/CVE-2024-51xx/CVE-2024-5141.json | 8 +- CVE-2024/CVE-2024-51xx/CVE-2024-5149.json | 66 +++++- CVE-2024/CVE-2024-51xx/CVE-2024-5152.json | 8 +- CVE-2024/CVE-2024-51xx/CVE-2024-5153.json | 8 +- CVE-2024/CVE-2024-51xx/CVE-2024-5161.json | 8 +- CVE-2024/CVE-2024-51xx/CVE-2024-5162.json | 8 +- CVE-2024/CVE-2024-51xx/CVE-2024-5171.json | 8 +- CVE-2024/CVE-2024-51xx/CVE-2024-5179.json | 8 +- CVE-2024/CVE-2024-51xx/CVE-2024-5184.json | 8 +- CVE-2024/CVE-2024-51xx/CVE-2024-5188.json | 8 +- CVE-2024/CVE-2024-52xx/CVE-2024-5221.json | 8 +- CVE-2024/CVE-2024-52xx/CVE-2024-5224.json | 8 +- CVE-2024/CVE-2024-52xx/CVE-2024-5259.json | 8 +- CVE-2024/CVE-2024-53xx/CVE-2024-5324.json | 8 +- CVE-2024/CVE-2024-53xx/CVE-2024-5329.json | 8 +- CVE-2024/CVE-2024-53xx/CVE-2024-5342.json | 8 +- CVE-2024/CVE-2024-54xx/CVE-2024-5449.json | 8 +- CVE-2024/CVE-2024-54xx/CVE-2024-5459.json | 8 +- CVE-2024/CVE-2024-54xx/CVE-2024-5489.json | 4 +- CVE-2024/CVE-2024-56xx/CVE-2024-5615.json | 8 +- CVE-2024/CVE-2024-56xx/CVE-2024-5629.json | 8 +- CVE-2024/CVE-2024-56xx/CVE-2024-5653.json | 8 +- CVE-2024/CVE-2024-56xx/CVE-2024-5656.json | 8 +- CVE-2024/CVE-2024-56xx/CVE-2024-5657.json | 8 +- CVE-2024/CVE-2024-56xx/CVE-2024-5658.json | 8 +- CVE-2024/CVE-2024-56xx/CVE-2024-5665.json | 8 +- CVE-2024/CVE-2024-56xx/CVE-2024-5673.json | 8 +- CVE-2024/CVE-2024-56xx/CVE-2024-5675.json | 4 +- CVE-2024/CVE-2024-56xx/CVE-2024-5684.json | 4 +- README.md | 48 +++-- _state.csv | 218 ++++++++++---------- 105 files changed, 1209 insertions(+), 343 deletions(-) create mode 100644 CVE-2024/CVE-2024-348xx/CVE-2024-34832.json create mode 100644 CVE-2024/CVE-2024-361xx/CVE-2024-36106.json diff --git a/CVE-2023/CVE-2023-499xx/CVE-2023-49927.json b/CVE-2023/CVE-2023-499xx/CVE-2023-49927.json index e5cdd4aa454..9d0e22dbe09 100644 --- a/CVE-2023/CVE-2023-499xx/CVE-2023-49927.json +++ b/CVE-2023/CVE-2023-499xx/CVE-2023-49927.json @@ -2,12 +2,16 @@ "id": "CVE-2023-49927", "sourceIdentifier": "cve@mitre.org", "published": "2024-06-05T19:15:11.373", - "lastModified": "2024-06-05T19:15:11.373", - "vulnStatus": "Received", + "lastModified": "2024-06-06T14:17:35.017", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", "value": "An issue was discovered in Samsung Mobile Processor, Automotive Processor, Wearable Processor, and Modem Exynos 980, 990, 850, 1080, 2100, 2200, 1280, 1380, 1330, 9110, W920, Exynos Modem 5123, Exynos Modem 5300, and Exynos Auto T5123. The baseband software does not properly check format types specified by the RRC. This can lead to a lack of encryption." + }, + { + "lang": "es", + "value": "Se descubri\u00f3 un problema en el procesador m\u00f3vil Samsung, el procesador automotriz, el procesador port\u00e1til y el m\u00f3dem Exynos 980, 990, 850, 1080, 2100, 2200, 1280, 1380, 1330, 9110, W920, Exynos Modem 5123, Exynos Modem 5300 y Exynos. Auto T5123. El software de banda base no verifica adecuadamente los tipos de formato especificados por el RRC. Esto puede provocar una falta de cifrado." } ], "metrics": { diff --git a/CVE-2023/CVE-2023-499xx/CVE-2023-49928.json b/CVE-2023/CVE-2023-499xx/CVE-2023-49928.json index 07a8aad2a2e..997ce50bf18 100644 --- a/CVE-2023/CVE-2023-499xx/CVE-2023-49928.json +++ b/CVE-2023/CVE-2023-499xx/CVE-2023-49928.json @@ -2,12 +2,16 @@ "id": "CVE-2023-49928", "sourceIdentifier": "cve@mitre.org", "published": "2024-06-05T19:15:11.617", - "lastModified": "2024-06-05T19:15:11.617", - "vulnStatus": "Received", + "lastModified": "2024-06-06T14:17:35.017", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", "value": "An issue was discovered in Samsung Mobile Processor, Automotive Processor, Wearable Processor, and Modem Exynos 980, 990, 850, 1080, 2100, 2200, 1280, 1380, 1330, 9110, W920, Exynos Modem 5123, Exynos Modem 5300, and Exynos Auto T5123. The baseband software does not properly check states specified by the RRC. This can lead to disclosure of sensitive information." + }, + { + "lang": "es", + "value": "Se descubri\u00f3 un problema en el procesador m\u00f3vil Samsung, el procesador automotriz, el procesador port\u00e1til y el m\u00f3dem Exynos 980, 990, 850, 1080, 2100, 2200, 1280, 1380, 1330, 9110, W920, Exynos Modem 5123, Exynos Modem 5300 y Exynos. Auto T5123. El software de banda base no verifica adecuadamente los estados especificados por el RRC. Esto puede dar lugar a la divulgaci\u00f3n de informaci\u00f3n confidencial." } ], "metrics": {}, diff --git a/CVE-2023/CVE-2023-508xx/CVE-2023-50803.json b/CVE-2023/CVE-2023-508xx/CVE-2023-50803.json index 797501cef7e..014d118946b 100644 --- a/CVE-2023/CVE-2023-508xx/CVE-2023-50803.json +++ b/CVE-2023/CVE-2023-508xx/CVE-2023-50803.json @@ -2,12 +2,16 @@ "id": "CVE-2023-50803", "sourceIdentifier": "cve@mitre.org", "published": "2024-06-05T19:15:11.700", - "lastModified": "2024-06-05T19:15:11.700", - "vulnStatus": "Received", + "lastModified": "2024-06-06T14:17:35.017", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", "value": "An issue was discovered in Samsung Mobile Processor, Automotive Processor, and Modem Exynos 9820, 9825, 980, 990, 850, 1080, 2100, 2200, 1280, 1380, 1330, Modem 5123, Modem 5300, and Auto T5123. The baseband software does not properly check replay protection specified by the NAS (Non-Access-Stratum) module. This can lead to denial of service." + }, + { + "lang": "es", + "value": "Se descubri\u00f3 un problema en el procesador m\u00f3vil Samsung, el procesador automotriz y el m\u00f3dem Exynos 9820, 9825, 980, 990, 850, 1080, 2100, 2200, 1280, 1380, 1330, el m\u00f3dem 5123, el m\u00f3dem 5300 y el Auto T5123. El software de banda base no verifica adecuadamente la protecci\u00f3n de reproducci\u00f3n especificada por el m\u00f3dulo NAS (Non-Access-Stratum). Esto puede llevar a la denegaci\u00f3n del servicio." } ], "metrics": { diff --git a/CVE-2023/CVE-2023-508xx/CVE-2023-50804.json b/CVE-2023/CVE-2023-508xx/CVE-2023-50804.json index 707ebb1cdfd..68e6eeae62c 100644 --- a/CVE-2023/CVE-2023-508xx/CVE-2023-50804.json +++ b/CVE-2023/CVE-2023-508xx/CVE-2023-50804.json @@ -2,12 +2,16 @@ "id": "CVE-2023-50804", "sourceIdentifier": "cve@mitre.org", "published": "2024-06-05T19:15:11.900", - "lastModified": "2024-06-05T19:15:11.900", - "vulnStatus": "Received", + "lastModified": "2024-06-06T14:17:35.017", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", "value": "An issue was discovered in Samsung Mobile Processor, Automotive Processor, and Modem Exynos 9820, 9825, 980, 990, 850, 1080, 2100, 2200, 1280, 1380, 1330, Modem 5123, Modem 5300, and Auto T5123. The baseband software does not properly check format types specified by the NAS (Non-Access-Stratum) module. This can lead to bypass of authentication." + }, + { + "lang": "es", + "value": "Se descubri\u00f3 un problema en el procesador m\u00f3vil Samsung, el procesador automotriz y el m\u00f3dem Exynos 9820, 9825, 980, 990, 850, 1080, 2100, 2200, 1280, 1380, 1330, el m\u00f3dem 5123, el m\u00f3dem 5300 y el Auto T5123. El software de banda base no verifica correctamente los tipos de formato especificados por el m\u00f3dulo NAS (Non-Access-Stratum). Esto puede provocar que se omita la autenticaci\u00f3n." } ], "metrics": { diff --git a/CVE-2023/CVE-2023-69xx/CVE-2023-6956.json b/CVE-2023/CVE-2023-69xx/CVE-2023-6956.json index ffe25dc13c0..8a0eee8ce1b 100644 --- a/CVE-2023/CVE-2023-69xx/CVE-2023-6956.json +++ b/CVE-2023/CVE-2023-69xx/CVE-2023-6956.json @@ -2,12 +2,16 @@ "id": "CVE-2023-6956", "sourceIdentifier": "security@wordfence.com", "published": "2024-06-06T02:15:52.377", - "lastModified": "2024-06-06T02:15:52.377", - "vulnStatus": "Received", + "lastModified": "2024-06-06T14:17:35.017", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", "value": "The EasyAzon \u2013 Amazon Associates Affiliate Plugin plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the \u2018easyazon-cloaking-locale\u2019 parameter in all versions up to, and including, 5.1.0 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link." + }, + { + "lang": "es", + "value": "El complemento EasyAzon \u2013 Amazon Associates Affiliate Plugin para WordPress es vulnerable a Cross-Site Scripting Reflejado a trav\u00e9s del par\u00e1metro 'easyazon-cloaking-locale' en todas las versiones hasta la 5.1.0 incluida debido a una sanitizaci\u00f3n de entrada y un escape de salida insuficientes. Esto hace posible que atacantes no autenticados inyecten scripts web arbitrarios en p\u00e1ginas que se ejecutan si logran enga\u00f1ar a un usuario para que realice una acci\u00f3n como hacer clic en un enlace." } ], "metrics": { diff --git a/CVE-2023/CVE-2023-69xx/CVE-2023-6966.json b/CVE-2023/CVE-2023-69xx/CVE-2023-6966.json index 7d88a9e0b02..4d0bed8e8b2 100644 --- a/CVE-2023/CVE-2023-69xx/CVE-2023-6966.json +++ b/CVE-2023/CVE-2023-69xx/CVE-2023-6966.json @@ -2,12 +2,16 @@ "id": "CVE-2023-6966", "sourceIdentifier": "security@wordfence.com", "published": "2024-06-06T02:15:52.607", - "lastModified": "2024-06-06T02:15:52.607", - "vulnStatus": "Received", + "lastModified": "2024-06-06T14:17:35.017", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", "value": "The The Moneytizer plugin for WordPress is vulnerable to unauthorized access of data, modification of data, and loss of data due to a missing capability check on multiple AJAX functions in the /core/core_ajax.php file in all versions up to, and including, 9.5.20. This makes it possible for authenticated attackers, with subscriber access and above, to update and retrieve billing and bank details, update and reset the plugin's settings, and update languages as well as other lower-severity actions." + }, + { + "lang": "es", + "value": "El complemento The Moneytizer para WordPress es vulnerable al acceso no autorizado a datos, modificaci\u00f3n de datos y p\u00e9rdida de datos debido a una falta de verificaci\u00f3n de capacidad en m\u00faltiples funciones AJAX en el archivo /core/core_ajax.php en todas las versiones hasta, e incluyendo, 9.5.20. Esto hace posible que atacantes autenticados, con acceso de suscriptor y superior, actualicen y recuperen detalles bancarios y de facturaci\u00f3n, actualicen y restablezcan la configuraci\u00f3n del complemento y actualicen idiomas, as\u00ed como otras acciones de menor gravedad." } ], "metrics": { diff --git a/CVE-2023/CVE-2023-69xx/CVE-2023-6968.json b/CVE-2023/CVE-2023-69xx/CVE-2023-6968.json index 5f398c306d8..f69ad5ec7f2 100644 --- a/CVE-2023/CVE-2023-69xx/CVE-2023-6968.json +++ b/CVE-2023/CVE-2023-69xx/CVE-2023-6968.json @@ -2,12 +2,16 @@ "id": "CVE-2023-6968", "sourceIdentifier": "security@wordfence.com", "published": "2024-06-06T02:15:52.810", - "lastModified": "2024-06-06T02:15:52.810", - "vulnStatus": "Received", + "lastModified": "2024-06-06T14:17:35.017", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", "value": "The The Moneytizer plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 9.5.20. This is due to missing or incorrect nonce validation on multiple AJAX functions. This makes it possible for unauthenticated attackers to to update and retrieve billing and bank details, update and reset the plugin's settings, and update languages as well as other lower-severity actions via a forged request granted they can trick a site administrator into performing an action such as clicking on a link." + }, + { + "lang": "es", + "value": "El complemento The Moneytizer para WordPress es vulnerable a Cross-Site Request Forgery en todas las versiones hasta la 9.5.20 incluida. Esto se debe a una validaci\u00f3n nonce faltante o incorrecta en m\u00faltiples funciones AJAX. Esto hace posible que atacantes no autenticados actualicen y recuperen datos bancarios y de facturaci\u00f3n, actualicen y restablezcan la configuraci\u00f3n del complemento y actualicen idiomas, as\u00ed como otras acciones de menor gravedad a trav\u00e9s de una solicitud falsificada, siempre que puedan enga\u00f1ar a un administrador del sitio para que realice una acci\u00f3n como hacer clic en un enlace." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-09xx/CVE-2024-0910.json b/CVE-2024/CVE-2024-09xx/CVE-2024-0910.json index e9151a608dd..21d73f5b527 100644 --- a/CVE-2024/CVE-2024-09xx/CVE-2024-0910.json +++ b/CVE-2024/CVE-2024-09xx/CVE-2024-0910.json @@ -2,12 +2,16 @@ "id": "CVE-2024-0910", "sourceIdentifier": "security@wordfence.com", "published": "2024-06-06T02:15:53.010", - "lastModified": "2024-06-06T02:15:53.010", - "vulnStatus": "Received", + "lastModified": "2024-06-06T14:17:35.017", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", "value": "The Restrict for Elementor plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 1.0.6 due to improper restrictions on hidden data that make it accessible through the REST API. This makes it possible for unauthenticated attackers to extract potentially sensitive data from post content." + }, + { + "lang": "es", + "value": "El complemento Restrict for Elementor para WordPress es vulnerable a la exposici\u00f3n de informaci\u00f3n confidencial en todas las versiones hasta la 1.0.6 incluida debido a restricciones inadecuadas sobre datos ocultos que los hacen accesibles a trav\u00e9s de la API REST. Esto hace posible que atacantes no autenticados extraigan datos potencialmente confidenciales del contenido de las publicaciones." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-09xx/CVE-2024-0912.json b/CVE-2024/CVE-2024-09xx/CVE-2024-0912.json index 6bde8f42238..64f95b40840 100644 --- a/CVE-2024/CVE-2024-09xx/CVE-2024-0912.json +++ b/CVE-2024/CVE-2024-09xx/CVE-2024-0912.json @@ -2,12 +2,16 @@ "id": "CVE-2024-0912", "sourceIdentifier": "productsecurity@jci.com", "published": "2024-06-06T00:15:09.117", - "lastModified": "2024-06-06T00:15:09.117", - "vulnStatus": "Received", + "lastModified": "2024-06-06T14:17:35.017", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", "value": "Under certain circumstances the Microsoft\u00ae Internet Information Server (IIS) used to host the C\u2022CURE 9000 Web Server will log Microsoft Windows credential details within logs. There is no impact to non-web service interfaces C\u2022CURE 9000 or prior versions" + }, + { + "lang": "es", + "value": "En determinadas circunstancias, Microsoft\u00ae Internet Information Server (IIS) utilizado para alojar el servidor web C\u2022CURE 9000 registrar\u00e1 los detalles de las credenciales de Microsoft Windows en los registros. No hay ning\u00fan impacto en las interfaces de servicios que no son web C\u2022CURE 9000 o versiones anteriores" } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-09xx/CVE-2024-0972.json b/CVE-2024/CVE-2024-09xx/CVE-2024-0972.json index 859c182f19c..2bc8da17c37 100644 --- a/CVE-2024/CVE-2024-09xx/CVE-2024-0972.json +++ b/CVE-2024/CVE-2024-09xx/CVE-2024-0972.json @@ -2,12 +2,16 @@ "id": "CVE-2024-0972", "sourceIdentifier": "security@wordfence.com", "published": "2024-06-06T04:15:10.923", - "lastModified": "2024-06-06T04:15:10.923", - "vulnStatus": "Received", + "lastModified": "2024-06-06T14:17:35.017", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", "value": "The BuddyPress Members Only plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 3.3.5 via the REST API. This makes it possible for unauthenticated attackers to bypass the plugin's \"All Other Sections On Your Site Will be Opened to Guest\" feature (when unset) and view restricted page and post content." + }, + { + "lang": "es", + "value": "El complemento BuddyPress Members Only para WordPress es vulnerable a la exposici\u00f3n de informaci\u00f3n confidencial en todas las versiones hasta la 3.3.5 incluida a trav\u00e9s de la API REST. Esto hace posible que atacantes no autenticados omitan la funci\u00f3n \"Todas las dem\u00e1s secciones de su sitio se abrir\u00e1n para invitados\" del complemento (cuando no est\u00e1 configurada) y vean p\u00e1ginas restringidas y contenido de publicaciones." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-11xx/CVE-2024-1175.json b/CVE-2024/CVE-2024-11xx/CVE-2024-1175.json index cab3c142a44..9a74021d79f 100644 --- a/CVE-2024/CVE-2024-11xx/CVE-2024-1175.json +++ b/CVE-2024/CVE-2024-11xx/CVE-2024-1175.json @@ -2,12 +2,16 @@ "id": "CVE-2024-1175", "sourceIdentifier": "security@wordfence.com", "published": "2024-06-06T04:15:11.230", - "lastModified": "2024-06-06T04:15:11.230", - "vulnStatus": "Received", + "lastModified": "2024-06-06T14:17:35.017", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", "value": "The WP-Recall \u2013 Registration, Profile, Commerce & More plugin for WordPress is vulnerable to unauthorized loss of data due to a missing capability check on the 'delete_payment' function in all versions up to, and including, 16.26.6. This makes it possible for unauthenticated attackers to delete arbitrary payments." + }, + { + "lang": "es", + "value": "El complemento WP-Recall \u2013 Registration, Profile, Commerce & More para WordPress es vulnerable a la p\u00e9rdida no autorizada de datos debido a una falta de verificaci\u00f3n de capacidad en la funci\u00f3n 'delete_paid' en todas las versiones hasta la 16.26.6 incluida. Esto hace posible que atacantes no autenticados eliminen pagos arbitrarios." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-12xx/CVE-2024-1202.json b/CVE-2024/CVE-2024-12xx/CVE-2024-1202.json index d1bff445c47..58edf35c15d 100644 --- a/CVE-2024/CVE-2024-12xx/CVE-2024-1202.json +++ b/CVE-2024/CVE-2024-12xx/CVE-2024-1202.json @@ -2,7 +2,7 @@ "id": "CVE-2024-1202", "sourceIdentifier": "iletisim@usom.gov.tr", "published": "2024-03-21T02:51:38.000", - "lastModified": "2024-06-04T19:18:19.990", + "lastModified": "2024-06-06T14:15:10.523", "vulnStatus": "Awaiting Analysis", "descriptions": [ { diff --git a/CVE-2024/CVE-2024-204xx/CVE-2024-20404.json b/CVE-2024/CVE-2024-204xx/CVE-2024-20404.json index aeb170d2250..4a0261a429c 100644 --- a/CVE-2024/CVE-2024-204xx/CVE-2024-20404.json +++ b/CVE-2024/CVE-2024-204xx/CVE-2024-20404.json @@ -2,12 +2,16 @@ "id": "CVE-2024-20404", "sourceIdentifier": "ykramarz@cisco.com", "published": "2024-06-05T17:15:11.790", - "lastModified": "2024-06-05T17:15:11.790", - "vulnStatus": "Received", + "lastModified": "2024-06-06T14:17:35.017", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", "value": "A vulnerability in the web-based management interface of Cisco Finesse could allow an unauthenticated, remote attacker to conduct an SSRF attack on an affected system.\r\n\r This vulnerability is due to insufficient validation of user-supplied input for specific HTTP requests that are sent to an affected system. An attacker could exploit this vulnerability by sending a crafted HTTP request to the affected device. A successful exploit could allow the attacker to obtain limited sensitive information for services that are associated to the affected device." + }, + { + "lang": "es", + "value": "Una vulnerabilidad en la interfaz de administraci\u00f3n basada en web de Cisco Finesse podr\u00eda permitir que un atacante remoto no autenticado lleve a cabo un ataque SSRF en un sistema afectado. Esta vulnerabilidad se debe a una validaci\u00f3n insuficiente de la entrada proporcionada por el usuario para solicitudes HTTP espec\u00edficas que se env\u00edan a un sistema afectado. Un atacante podr\u00eda aprovechar esta vulnerabilidad enviando una solicitud HTTP manipulada al dispositivo afectado. Un exploit exitoso podr\u00eda permitir al atacante obtener informaci\u00f3n confidencial limitada para los servicios asociados al dispositivo afectado." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-204xx/CVE-2024-20405.json b/CVE-2024/CVE-2024-204xx/CVE-2024-20405.json index 22d643d1401..0073d972551 100644 --- a/CVE-2024/CVE-2024-204xx/CVE-2024-20405.json +++ b/CVE-2024/CVE-2024-204xx/CVE-2024-20405.json @@ -2,12 +2,16 @@ "id": "CVE-2024-20405", "sourceIdentifier": "ykramarz@cisco.com", "published": "2024-06-05T17:15:12.107", - "lastModified": "2024-06-05T17:15:12.107", - "vulnStatus": "Received", + "lastModified": "2024-06-06T14:17:35.017", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", "value": "A vulnerability in the web-based management interface of Cisco Finesse could allow an unauthenticated, remote attacker to conduct a stored XSS attack by exploiting an RFI vulnerability. \r\n\r This vulnerability is due to insufficient validation of user-supplied input for specific HTTP requests that are sent to an affected device. An attacker could exploit this vulnerability by persuading a user to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive information on the affected device." + }, + { + "lang": "es", + "value": "Una vulnerabilidad en la interfaz de administraci\u00f3n basada en web de Cisco Finesse podr\u00eda permitir que un atacante remoto no autenticado lleve a cabo un ataque XSS almacenado explotando una vulnerabilidad RFI. Esta vulnerabilidad se debe a una validaci\u00f3n insuficiente de la entrada proporcionada por el usuario para solicitudes HTTP espec\u00edficas que se env\u00edan a un dispositivo afectado. Un atacante podr\u00eda aprovechar esta vulnerabilidad persuadiendo a un usuario para que haga clic en un enlace manipulado. Un exploit exitoso podr\u00eda permitir al atacante ejecutar c\u00f3digo de script arbitrario en el contexto de la interfaz afectada o acceder a informaci\u00f3n confidencial en el dispositivo afectado." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-20xx/CVE-2024-2017.json b/CVE-2024/CVE-2024-20xx/CVE-2024-2017.json index 43154926336..135456e0548 100644 --- a/CVE-2024/CVE-2024-20xx/CVE-2024-2017.json +++ b/CVE-2024/CVE-2024-20xx/CVE-2024-2017.json @@ -2,12 +2,16 @@ "id": "CVE-2024-2017", "sourceIdentifier": "security@wordfence.com", "published": "2024-06-06T03:15:08.847", - "lastModified": "2024-06-06T03:15:08.847", - "vulnStatus": "Received", + "lastModified": "2024-06-06T14:17:35.017", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", "value": "The Countdown, Coming Soon, Maintenance \u2013 Countdown & Clock plugin for WordPress is vulnerable to unauthorized access due to a missing capability check on the conditionsRow and switchCountdown functions in all versions up to, and including, 2.7.8. This makes it possible for authenticated attackers, with subscriber-level access and above, to inject PHP Objects and modify the status of countdowns." + }, + { + "lang": "es", + "value": "El complemento Countdown, Coming Soon, Maintenance \u2013 Countdown & Clock para WordPress es vulnerable al acceso no autorizado debido a una falta de verificaci\u00f3n de capacidad en las funciones conditionRow y switchCountdown en todas las versiones hasta la 2.7.8 incluida. Esto hace posible que atacantes autenticados, con acceso a nivel de suscriptor y superior, inyecten objetos PHP y modifiquen el estado de las cuentas regresivas." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-20xx/CVE-2024-2087.json b/CVE-2024/CVE-2024-20xx/CVE-2024-2087.json index fd1f9a19f8f..b3b84fd695f 100644 --- a/CVE-2024/CVE-2024-20xx/CVE-2024-2087.json +++ b/CVE-2024/CVE-2024-20xx/CVE-2024-2087.json @@ -2,8 +2,8 @@ "id": "CVE-2024-2087", "sourceIdentifier": "security@wordfence.com", "published": "2024-06-05T06:15:10.833", - "lastModified": "2024-06-05T12:53:50.240", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-06-06T14:07:14.967", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -17,8 +17,28 @@ "metrics": { "cvssMetricV31": [ { - "source": "security@wordfence.com", + "source": "nvd@nist.gov", "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 6.1, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 + }, + { + "source": "security@wordfence.com", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N", @@ -38,18 +58,57 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:brizy:brizy-page_builder:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "2.4.44", + "matchCriteriaId": "0E89EC06-A340-4DE2-B625-4AC05E3C42F6" + } + ] + } + ] + } + ], "references": [ { "url": "https://plugins.trac.wordpress.org/browser/brizy/tags/2.4.41/admin/views/form-data.php#L6", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product" + ] }, { "url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&new=3086506%40brizy%2Ftrunk&old=3058896%40brizy%2Ftrunk&sfp_email=&sfph_mail=", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Patch" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/694d0b49-c4dd-40f0-99c9-5eb8c3c08ba9?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-236xx/CVE-2024-23692.json b/CVE-2024/CVE-2024-236xx/CVE-2024-23692.json index 87b5569e716..3275b84d13c 100644 --- a/CVE-2024/CVE-2024-236xx/CVE-2024-23692.json +++ b/CVE-2024/CVE-2024-236xx/CVE-2024-23692.json @@ -2,12 +2,16 @@ "id": "CVE-2024-23692", "sourceIdentifier": "disclosure@vulncheck.com", "published": "2024-05-31T10:15:09.330", - "lastModified": "2024-05-31T13:15:09.310", + "lastModified": "2024-06-06T15:15:43.993", "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", "value": "Rejetto HTTP File Server, up to and including version 2.3m, is vulnerable to a template injection vulnerability. This vulnerability allows a remote, unauthenticated attacker to execute arbitrary commands on the affected system by sending a specially crafted HTTP request. As of the CVE assignment date, Rejetto HFS 2.3m is no longer supported." + }, + { + "lang": "es", + "value": "Rejetto HTTP File Server, hasta la versi\u00f3n 2.3m incluida, es vulnerable a una vulnerabilidad de inyecci\u00f3n de plantilla. Esta vulnerabilidad permite que un atacante remoto no autenticado ejecute comandos arbitrarios en el sistema afectado enviando una solicitud HTTP especialmente manipulada. A partir de la fecha de asignaci\u00f3n de CVE, Rejetto HFS 2.3m ya no es compatible." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-23xx/CVE-2024-2350.json b/CVE-2024/CVE-2024-23xx/CVE-2024-2350.json index 1d6abb65871..538bf629ff6 100644 --- a/CVE-2024/CVE-2024-23xx/CVE-2024-2350.json +++ b/CVE-2024/CVE-2024-23xx/CVE-2024-2350.json @@ -2,12 +2,16 @@ "id": "CVE-2024-2350", "sourceIdentifier": "security@wordfence.com", "published": "2024-06-06T02:15:53.237", - "lastModified": "2024-06-06T02:15:53.237", - "vulnStatus": "Received", + "lastModified": "2024-06-06T14:17:35.017", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", "value": "The Clever Addons for Elementor plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the CAFE Icon, CAFE Team Member, and CAFE Slider widgets in all versions up to, and including, 2.1.9 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page." + }, + { + "lang": "es", + "value": "El complemento Clever Addons for Elementor para WordPress es vulnerable a Cross-Site Scripting Almacenado a trav\u00e9s de los widgets CAFE Icon, CAFE Team Member y CAFE Slider en todas las versiones hasta la 2.1.9 incluida debido a una sanitizaci\u00f3n de entrada y un escape de salida insuficientes. Esto hace posible que atacantes autenticados, con acceso de nivel de colaborador y superior, inyecten scripts web arbitrarios en p\u00e1ginas que se ejecutar\u00e1n cada vez que un usuario acceda a una p\u00e1gina inyectada." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-247xx/CVE-2024-24789.json b/CVE-2024/CVE-2024-247xx/CVE-2024-24789.json index bd668d1dc04..e5f1f47ef39 100644 --- a/CVE-2024/CVE-2024-247xx/CVE-2024-24789.json +++ b/CVE-2024/CVE-2024-247xx/CVE-2024-24789.json @@ -2,12 +2,16 @@ "id": "CVE-2024-24789", "sourceIdentifier": "security@golang.org", "published": "2024-06-05T16:15:10.470", - "lastModified": "2024-06-05T16:15:10.470", - "vulnStatus": "Received", + "lastModified": "2024-06-06T14:17:35.017", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", "value": "The archive/zip package's handling of certain types of invalid zip files differs from the behavior of most zip implementations. This misalignment could be exploited to create an zip file with contents that vary depending on the implementation reading the file. The archive/zip package now rejects files containing these errors." + }, + { + "lang": "es", + "value": "El manejo que hace el paquete archive/zip de ciertos tipos de archivos zip no v\u00e1lidos difiere del comportamiento de la mayor\u00eda de las implementaciones zip. Esta desalineaci\u00f3n podr\u00eda aprovecharse para crear un archivo zip con contenidos que var\u00edan seg\u00fan la implementaci\u00f3n que lea el archivo. El paquete archive/zip ahora rechaza los archivos que contienen estos errores." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-247xx/CVE-2024-24790.json b/CVE-2024/CVE-2024-247xx/CVE-2024-24790.json index b0f0ccc2391..7a7bdf6dad1 100644 --- a/CVE-2024/CVE-2024-247xx/CVE-2024-24790.json +++ b/CVE-2024/CVE-2024-247xx/CVE-2024-24790.json @@ -2,12 +2,16 @@ "id": "CVE-2024-24790", "sourceIdentifier": "security@golang.org", "published": "2024-06-05T16:15:10.560", - "lastModified": "2024-06-05T16:15:10.560", - "vulnStatus": "Received", + "lastModified": "2024-06-06T14:17:35.017", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", "value": "The various Is methods (IsPrivate, IsLoopback, etc) did not work as expected for IPv4-mapped IPv6 addresses, returning false for addresses which would return true in their traditional IPv4 forms." + }, + { + "lang": "es", + "value": "Los diversos m\u00e9todos Is (IsPrivate, IsLoopback, etc.) no funcionaron como se esperaba para las direcciones IPv6 asignadas a IPv4, devolviendo falso para direcciones que devolver\u00edan verdadero en sus formas IPv4 tradicionales." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-273xx/CVE-2024-27370.json b/CVE-2024/CVE-2024-273xx/CVE-2024-27370.json index a90a9ca8abf..2d097d5755b 100644 --- a/CVE-2024/CVE-2024-273xx/CVE-2024-27370.json +++ b/CVE-2024/CVE-2024-273xx/CVE-2024-27370.json @@ -2,12 +2,16 @@ "id": "CVE-2024-27370", "sourceIdentifier": "cve@mitre.org", "published": "2024-06-05T19:15:12.473", - "lastModified": "2024-06-05T19:15:12.473", - "vulnStatus": "Received", + "lastModified": "2024-06-06T14:17:35.017", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", "value": "An issue was discovered in Samsung Mobile Processor Exynos 980, Exynos 850, Exynos 1280, Exynos 1380, and Exynos 1330. In the function slsi_nan_config_get_nl_params(), there is no input validation check on hal_req->num_config_discovery_attr coming from userspace, which can lead to a heap overwrite." + }, + { + "lang": "es", + "value": "Se descubri\u00f3 un problema en el procesador m\u00f3vil Samsung Exynos 980, Exynos 850, Exynos 1280, Exynos 1380 y Exynos 1330. En la funci\u00f3n slsi_nan_config_get_nl_params(), no hay ninguna verificaci\u00f3n de validaci\u00f3n de entrada en hal_req->num_config_discovery_attr procedente del espacio de usuario, lo que puede provocar una sobrescritura del mont\u00f3n." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-273xx/CVE-2024-27371.json b/CVE-2024/CVE-2024-273xx/CVE-2024-27371.json index e565a23753f..8cef9fe5667 100644 --- a/CVE-2024/CVE-2024-273xx/CVE-2024-27371.json +++ b/CVE-2024/CVE-2024-273xx/CVE-2024-27371.json @@ -2,12 +2,16 @@ "id": "CVE-2024-27371", "sourceIdentifier": "cve@mitre.org", "published": "2024-06-05T19:15:12.687", - "lastModified": "2024-06-05T19:15:12.687", - "vulnStatus": "Received", + "lastModified": "2024-06-06T14:17:35.017", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", "value": "An issue was discovered in Samsung Mobile Processor Exynos 980, Exynos 850, Exynos 1280, Exynos 1380, and Exynos 1330. In the function slsi_nan_followup_get_nl_params(), there is no input validation check on hal_req->service_specific_info_len coming from userspace, which can lead to a heap overwrite." + }, + { + "lang": "es", + "value": "Se descubri\u00f3 un problema en el procesador m\u00f3vil Samsung Exynos 980, Exynos 850, Exynos 1280, Exynos 1380 y Exynos 1330. En la funci\u00f3n slsi_nan_followup_get_nl_params(), no hay ninguna verificaci\u00f3n de validaci\u00f3n de entrada en hal_req->service_specific_info_len procedente del espacio de usuario, lo que puede provocar una sobrescritura del mont\u00f3n." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-273xx/CVE-2024-27372.json b/CVE-2024/CVE-2024-273xx/CVE-2024-27372.json index da5facc758a..0d27773e610 100644 --- a/CVE-2024/CVE-2024-273xx/CVE-2024-27372.json +++ b/CVE-2024/CVE-2024-273xx/CVE-2024-27372.json @@ -2,12 +2,16 @@ "id": "CVE-2024-27372", "sourceIdentifier": "cve@mitre.org", "published": "2024-06-05T19:15:12.893", - "lastModified": "2024-06-05T19:15:12.893", - "vulnStatus": "Received", + "lastModified": "2024-06-06T14:17:35.017", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", "value": "An issue was discovered in Samsung Mobile Processor Exynos 980, Exynos 850, Exynos 1280, Exynos 1380, and Exynos 1330. In the function slsi_nan_config_get_nl_params(), there is no input validation check on disc_attr->infrastructure_ssid_len coming from userspace, which can lead to a heap overwrite." + }, + { + "lang": "es", + "value": "Se descubri\u00f3 un problema en el procesador m\u00f3vil Samsung Exynos 980, Exynos 850, Exynos 1280, Exynos 1380 y Exynos 1330. En la funci\u00f3n slsi_nan_config_get_nl_params(), no hay ninguna verificaci\u00f3n de validaci\u00f3n de entrada en disc_attr->infrastructure_ssid_len procedente del espacio de usuario, lo que puede provocar una sobrescritura del mont\u00f3n." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-273xx/CVE-2024-27373.json b/CVE-2024/CVE-2024-273xx/CVE-2024-27373.json index 509e44a885e..73f905796cd 100644 --- a/CVE-2024/CVE-2024-273xx/CVE-2024-27373.json +++ b/CVE-2024/CVE-2024-273xx/CVE-2024-27373.json @@ -2,12 +2,16 @@ "id": "CVE-2024-27373", "sourceIdentifier": "cve@mitre.org", "published": "2024-06-05T19:15:13.143", - "lastModified": "2024-06-05T19:15:13.143", - "vulnStatus": "Received", + "lastModified": "2024-06-06T14:17:35.017", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", "value": "An issue was discovered in Samsung Mobile Processor Exynos 980, Exynos 850, Exynos 1280, Exynos 1380, and Exynos 1330. In the function slsi_nan_config_get_nl_params(), there is no input validation check on disc_attr->mesh_id_len coming from userspace, which can lead to a heap overwrite." + }, + { + "lang": "es", + "value": "Se descubri\u00f3 un problema en el procesador m\u00f3vil Samsung Exynos 980, Exynos 850, Exynos 1280, Exynos 1380 y Exynos 1330. En la funci\u00f3n slsi_nan_config_get_nl_params(), no hay ninguna verificaci\u00f3n de validaci\u00f3n de entrada en disc_attr->mesh_id_len procedente del espacio de usuario, lo que puede provocar una sobrescritura del mont\u00f3n." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-273xx/CVE-2024-27374.json b/CVE-2024/CVE-2024-273xx/CVE-2024-27374.json index ab408eaaa3c..394f36bd626 100644 --- a/CVE-2024/CVE-2024-273xx/CVE-2024-27374.json +++ b/CVE-2024/CVE-2024-273xx/CVE-2024-27374.json @@ -2,12 +2,16 @@ "id": "CVE-2024-27374", "sourceIdentifier": "cve@mitre.org", "published": "2024-06-05T19:15:13.347", - "lastModified": "2024-06-05T19:15:13.347", - "vulnStatus": "Received", + "lastModified": "2024-06-06T14:17:35.017", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", "value": "An issue was discovered in Samsung Mobile Processor Exynos 980, Exynos 850, Exynos 1280, Exynos 1380, and Exynos 1330. In the function slsi_nan_publish_get_nl_params(), there is no input validation check on hal_req->service_specific_info_len coming from userspace, which can lead to a heap overwrite." + }, + { + "lang": "es", + "value": "Se descubri\u00f3 un problema en el procesador m\u00f3vil Samsung Exynos 980, Exynos 850, Exynos 1280, Exynos 1380 y Exynos 1330. En la funci\u00f3n slsi_nan_publish_get_nl_params(), no hay ninguna verificaci\u00f3n de validaci\u00f3n de entrada en hal_req->service_specific_info_len procedente del espacio de usuario, lo que puede provocar una sobrescritura del mont\u00f3n." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-273xx/CVE-2024-27375.json b/CVE-2024/CVE-2024-273xx/CVE-2024-27375.json index 5d83350e2ae..0d08b81498e 100644 --- a/CVE-2024/CVE-2024-273xx/CVE-2024-27375.json +++ b/CVE-2024/CVE-2024-273xx/CVE-2024-27375.json @@ -2,12 +2,16 @@ "id": "CVE-2024-27375", "sourceIdentifier": "cve@mitre.org", "published": "2024-06-05T19:15:13.557", - "lastModified": "2024-06-05T19:15:13.557", - "vulnStatus": "Received", + "lastModified": "2024-06-06T14:17:35.017", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", "value": "An issue was discovered in Samsung Mobile Processor Exynos 980, Exynos 850, Exynos 1280, Exynos 1380, and Exynos 1330. In the function slsi_nan_followup_get_nl_params(), there is no input validation check on hal_req->sdea_service_specific_info_len coming from userspace, which can lead to a heap overwrite." + }, + { + "lang": "es", + "value": "Se descubri\u00f3 un problema en el procesador m\u00f3vil Samsung Exynos 980, Exynos 850, Exynos 1280, Exynos 1380 y Exynos 1330. En la funci\u00f3n slsi_nan_followup_get_nl_params(), no hay ninguna verificaci\u00f3n de validaci\u00f3n de entrada en hal_req->sdea_service_specific_info_len procedente del espacio de usuario, lo que puede provocar una sobrescritura del mont\u00f3n." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-273xx/CVE-2024-27376.json b/CVE-2024/CVE-2024-273xx/CVE-2024-27376.json index dc380daad88..179ca284290 100644 --- a/CVE-2024/CVE-2024-273xx/CVE-2024-27376.json +++ b/CVE-2024/CVE-2024-273xx/CVE-2024-27376.json @@ -2,12 +2,16 @@ "id": "CVE-2024-27376", "sourceIdentifier": "cve@mitre.org", "published": "2024-06-05T19:15:13.767", - "lastModified": "2024-06-05T19:15:13.767", - "vulnStatus": "Received", + "lastModified": "2024-06-06T14:17:35.017", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", "value": "An issue was discovered in Samsung Mobile Processor Exynos 980, Exynos 850, Exynos 1280, Exynos 1380, and Exynos 1330. In the function slsi_nan_subscribe_get_nl_params(), there is no input validation check on hal_req->rx_match_filter_len coming from userspace, which can lead to a heap overwrite." + }, + { + "lang": "es", + "value": "Se descubri\u00f3 un problema en el procesador m\u00f3vil Samsung Exynos 980, Exynos 850, Exynos 1280, Exynos 1380 y Exynos 1330. En la funci\u00f3n slsi_nan_subscribe_get_nl_params(), no hay ninguna verificaci\u00f3n de validaci\u00f3n de entrada en hal_req->rx_match_filter_len procedente del espacio de usuario, lo que puede provocar una sobrescritura del mont\u00f3n." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-273xx/CVE-2024-27377.json b/CVE-2024/CVE-2024-273xx/CVE-2024-27377.json index ed0a8b78081..5772f860a23 100644 --- a/CVE-2024/CVE-2024-273xx/CVE-2024-27377.json +++ b/CVE-2024/CVE-2024-273xx/CVE-2024-27377.json @@ -2,12 +2,16 @@ "id": "CVE-2024-27377", "sourceIdentifier": "cve@mitre.org", "published": "2024-06-05T19:15:13.967", - "lastModified": "2024-06-05T19:15:13.967", - "vulnStatus": "Received", + "lastModified": "2024-06-06T14:17:35.017", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", "value": "An issue was discovered in Samsung Mobile Processor Exynos 980, Exynos 850, Exynos 1280, Exynos 1380, and Exynos 1330. In the function slsi_nan_get_security_info_nl(), there is no input validation check on sec_info->key_info.body.pmk_info.pmk_len coming from userspace, which can lead to a heap overwrite." + }, + { + "lang": "es", + "value": "Se descubri\u00f3 un problema en el procesador m\u00f3vil Samsung Exynos 980, Exynos 850, Exynos 1280, Exynos 1380 y Exynos 1330. En la funci\u00f3n slsi_nan_get_security_info_nl(), no hay ninguna verificaci\u00f3n de validaci\u00f3n de entrada en sec_info->key_info.body.pmk_info.pmk_len procedente de espacio de usuario, lo que puede provocar una sobrescritura del mont\u00f3n." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-273xx/CVE-2024-27378.json b/CVE-2024/CVE-2024-273xx/CVE-2024-27378.json index 109d079ab43..9ce14bad4e8 100644 --- a/CVE-2024/CVE-2024-273xx/CVE-2024-27378.json +++ b/CVE-2024/CVE-2024-273xx/CVE-2024-27378.json @@ -2,12 +2,16 @@ "id": "CVE-2024-27378", "sourceIdentifier": "cve@mitre.org", "published": "2024-06-05T19:15:14.170", - "lastModified": "2024-06-05T19:15:14.170", - "vulnStatus": "Received", + "lastModified": "2024-06-06T14:17:35.017", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", "value": "An issue was discovered in Samsung Mobile Processor Exynos 980, Exynos 850, Exynos 1280, Exynos 1380, and Exynos 1330. In the function slsi_send_action_frame_cert(), there is no input validation check on len coming from userspace, which can lead to a heap over-read." + }, + { + "lang": "es", + "value": "Se descubri\u00f3 un problema en el procesador m\u00f3vil Samsung Exynos 980, Exynos 850, Exynos 1280, Exynos 1380 y Exynos 1330. En la funci\u00f3n slsi_send_action_frame_cert(), no hay ninguna verificaci\u00f3n de validaci\u00f3n de entrada en len procedente del espacio de usuario, lo que puede generar una sobrescritura del mont\u00f3n." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-273xx/CVE-2024-27379.json b/CVE-2024/CVE-2024-273xx/CVE-2024-27379.json index 6c4509f0277..2be05ff83a5 100644 --- a/CVE-2024/CVE-2024-273xx/CVE-2024-27379.json +++ b/CVE-2024/CVE-2024-273xx/CVE-2024-27379.json @@ -2,12 +2,16 @@ "id": "CVE-2024-27379", "sourceIdentifier": "cve@mitre.org", "published": "2024-06-05T19:15:14.370", - "lastModified": "2024-06-05T19:15:14.370", - "vulnStatus": "Received", + "lastModified": "2024-06-06T14:17:35.017", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", "value": "An issue was discovered in Samsung Mobile Processor Exynos 980, Exynos 850, Exynos 1280, Exynos 1380, and Exynos 1330. In the function slsi_nan_subscribe_get_nl_params(), there is no input validation check on hal_req->num_intf_addr_present coming from userspace, which can lead to a heap overwrite." + }, + { + "lang": "es", + "value": "Se descubri\u00f3 un problema en el procesador m\u00f3vil Samsung Exynos 980, Exynos 850, Exynos 1280, Exynos 1380 y Exynos 1330. En la funci\u00f3n slsi_nan_subscribe_get_nl_params(), no hay ninguna verificaci\u00f3n de validaci\u00f3n de entrada en hal_req->num_intf_addr_present procedente del espacio de usuario, lo que puede provocar una sobrescritura del mont\u00f3n." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-273xx/CVE-2024-27380.json b/CVE-2024/CVE-2024-273xx/CVE-2024-27380.json index 611d81fb069..f4bd9587a32 100644 --- a/CVE-2024/CVE-2024-273xx/CVE-2024-27380.json +++ b/CVE-2024/CVE-2024-273xx/CVE-2024-27380.json @@ -2,12 +2,16 @@ "id": "CVE-2024-27380", "sourceIdentifier": "cve@mitre.org", "published": "2024-06-05T19:15:14.570", - "lastModified": "2024-06-05T19:15:14.570", - "vulnStatus": "Received", + "lastModified": "2024-06-06T14:17:35.017", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", "value": "An issue was discovered in Samsung Mobile Processor Exynos 980, Exynos 850, Exynos 1280, Exynos 1380, and Exynos 1330. In the function slsi_set_delayed_wakeup_type(), there is no input validation check on a length of ioctl_args->args[i] coming from userspace, which can lead to a heap over-read." + }, + { + "lang": "es", + "value": "Se descubri\u00f3 un problema en el procesador m\u00f3vil Samsung Exynos 980, Exynos 850, Exynos 1280, Exynos 1380 y Exynos 1330. En la funci\u00f3n slsi_set_delayed_wakeup_type(), no hay ninguna verificaci\u00f3n de validaci\u00f3n de entrada en una longitud de ioctl_args->args[i] procedente de espacio de usuario, lo que puede provocar una sobrescritura del mont\u00f3n." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-273xx/CVE-2024-27381.json b/CVE-2024/CVE-2024-273xx/CVE-2024-27381.json index ba41353c173..d517a2ac5a0 100644 --- a/CVE-2024/CVE-2024-273xx/CVE-2024-27381.json +++ b/CVE-2024/CVE-2024-273xx/CVE-2024-27381.json @@ -2,12 +2,16 @@ "id": "CVE-2024-27381", "sourceIdentifier": "cve@mitre.org", "published": "2024-06-05T19:15:14.760", - "lastModified": "2024-06-05T19:15:14.760", - "vulnStatus": "Received", + "lastModified": "2024-06-06T14:17:35.017", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", "value": "An issue was discovered in Samsung Mobile Processor Exynos 980, Exynos 850, Exynos 1280, Exynos 1380, and Exynos 1330. In the function slsi_send_action_frame_ut(), there is no input validation check on len coming from userspace, which can lead to a heap over-read." + }, + { + "lang": "es", + "value": "Se descubri\u00f3 un problema en el procesador m\u00f3vil Samsung Exynos 980, Exynos 850, Exynos 1280, Exynos 1380 y Exynos 1330. En la funci\u00f3n slsi_send_action_frame_ut(), no hay ninguna verificaci\u00f3n de validaci\u00f3n de entrada en len procedente del espacio de usuario, lo que puede generar una sobrescritura del mont\u00f3n.." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-273xx/CVE-2024-27382.json b/CVE-2024/CVE-2024-273xx/CVE-2024-27382.json index 177e0165d0d..d0a7ce9c7a7 100644 --- a/CVE-2024/CVE-2024-273xx/CVE-2024-27382.json +++ b/CVE-2024/CVE-2024-273xx/CVE-2024-27382.json @@ -2,12 +2,16 @@ "id": "CVE-2024-27382", "sourceIdentifier": "cve@mitre.org", "published": "2024-06-05T19:15:14.957", - "lastModified": "2024-06-05T19:15:14.957", - "vulnStatus": "Received", + "lastModified": "2024-06-06T14:17:35.017", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", "value": "An issue was discovered in Samsung Mobile Processor Exynos 980, Exynos 850, Exynos 1280, Exynos 1380, and Exynos 1330. In the function slsi_send_action_frame(), there is no input validation check on len coming from userspace, which can lead to a heap over-read." + }, + { + "lang": "es", + "value": "Se descubri\u00f3 un problema en el procesador m\u00f3vil Samsung Exynos 980, Exynos 850, Exynos 1280, Exynos 1380 y Exynos 1330. En la funci\u00f3n slsi_send_action_frame(), no hay ninguna verificaci\u00f3n de validaci\u00f3n de entrada en len proveniente del espacio de usuario, lo que puede generar una sobrescritura del mont\u00f3n." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-288xx/CVE-2024-28818.json b/CVE-2024/CVE-2024-288xx/CVE-2024-28818.json index 6b47b426d99..a656537ba4a 100644 --- a/CVE-2024/CVE-2024-288xx/CVE-2024-28818.json +++ b/CVE-2024/CVE-2024-288xx/CVE-2024-28818.json @@ -2,12 +2,16 @@ "id": "CVE-2024-28818", "sourceIdentifier": "cve@mitre.org", "published": "2024-06-05T19:15:15.150", - "lastModified": "2024-06-05T19:15:15.150", - "vulnStatus": "Received", + "lastModified": "2024-06-06T14:17:35.017", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", "value": "An issue was discovered in Samsung Mobile Processor, Wearable Processor, Automotive Processor, and Modem Exynos 980, 990, 850, 1080, 2100, 2200, 1280, 1380, 1330, 2400, 9110, W920, W930, Modem 5123, Modem 5300, and Auto T5123. The baseband software does not properly check states specified by the RRC (Radio Resource Control) module. This can lead to disclosure of sensitive information." + }, + { + "lang": "es", + "value": "Se descubri\u00f3 un problema en el procesador m\u00f3vil, el procesador port\u00e1til, el procesador automotriz y el m\u00f3dem Samsung Exynos 980, 990, 850, 1080, 2100, 2200, 1280, 1380, 1330, 2400, 9110, W920, W930, M\u00f3dem 5123, M\u00f3dem 5300, y Auto T5123. El software de banda base no verifica adecuadamente los estados especificados por el m\u00f3dulo RRC (Control de recursos de radio). Esto puede dar lugar a la divulgaci\u00f3n de informaci\u00f3n confidencial." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-289xx/CVE-2024-28995.json b/CVE-2024/CVE-2024-289xx/CVE-2024-28995.json index a2423016c4a..da96b11af92 100644 --- a/CVE-2024/CVE-2024-289xx/CVE-2024-28995.json +++ b/CVE-2024/CVE-2024-289xx/CVE-2024-28995.json @@ -2,12 +2,16 @@ "id": "CVE-2024-28995", "sourceIdentifier": "psirt@solarwinds.com", "published": "2024-06-06T09:15:14.167", - "lastModified": "2024-06-06T09:15:14.167", - "vulnStatus": "Received", + "lastModified": "2024-06-06T14:17:35.017", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", "value": "\n\n\n\n\n\n\n\n\n\n\n\nSolarWinds Serv-U was susceptible to a directory transversal vulnerability that would allow access to read sensitive files on the host machine. \n\n\n\n\n\n\n\n" + }, + { + "lang": "es", + "value": "SolarWinds Serv-U era susceptible a una vulnerabilidad directory transversal que permitir\u00eda el acceso para leer archivos confidenciales en la m\u00e1quina host." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-29xx/CVE-2024-2922.json b/CVE-2024/CVE-2024-29xx/CVE-2024-2922.json index f0f18dafc51..4424f8c841a 100644 --- a/CVE-2024/CVE-2024-29xx/CVE-2024-2922.json +++ b/CVE-2024/CVE-2024-29xx/CVE-2024-2922.json @@ -2,12 +2,16 @@ "id": "CVE-2024-2922", "sourceIdentifier": "security@wordfence.com", "published": "2024-06-06T04:15:11.673", - "lastModified": "2024-06-06T04:15:11.673", - "vulnStatus": "Received", + "lastModified": "2024-06-06T14:17:35.017", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", "value": "The Themesflat Addons For Elementor plugin for WordPress is vulnerable to Stored Cross-Site Scripting via widget tags in all versions up to, and including, 2.1.1 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page." + }, + { + "lang": "es", + "value": "El complemento Themesflat Addons For Elementor para WordPress es vulnerable a Cross-Site Scripting Almacenado a trav\u00e9s de etiquetas de widgets en todas las versiones hasta la 2.1.1 incluida debido a una sanitizaci\u00f3n de entrada insuficiente y a un escape de salida en los atributos proporcionados por el usuario. Esto hace posible que atacantes autenticados, con acceso de nivel de colaborador y superior, inyecten scripts web arbitrarios en p\u00e1ginas que se ejecutar\u00e1n cada vez que un usuario acceda a una p\u00e1gina inyectada." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-30xx/CVE-2024-3049.json b/CVE-2024/CVE-2024-30xx/CVE-2024-3049.json index be7842f3414..c4fc4875c45 100644 --- a/CVE-2024/CVE-2024-30xx/CVE-2024-3049.json +++ b/CVE-2024/CVE-2024-30xx/CVE-2024-3049.json @@ -2,12 +2,16 @@ "id": "CVE-2024-3049", "sourceIdentifier": "secalert@redhat.com", "published": "2024-06-06T06:15:09.550", - "lastModified": "2024-06-06T11:15:48.553", - "vulnStatus": "Received", + "lastModified": "2024-06-06T14:17:35.017", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", "value": "A flaw was found in Booth, a cluster ticket manager. If a specially-crafted hash is passed to gcry_md_get_algo_dlen(), it may allow an invalid HMAC to be accepted by the Booth server." + }, + { + "lang": "es", + "value": "Se encontr\u00f3 una falla en Booth, un administrador de tickets de cl\u00faster. Si se pasa un hash especialmente manipulado a gcry_md_get_algo_dlen(), es posible que el servidor Booth acepte un HMAC no v\u00e1lido." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-348xx/CVE-2024-34832.json b/CVE-2024/CVE-2024-348xx/CVE-2024-34832.json new file mode 100644 index 00000000000..cec81f887dc --- /dev/null +++ b/CVE-2024/CVE-2024-348xx/CVE-2024-34832.json @@ -0,0 +1,20 @@ +{ + "id": "CVE-2024-34832", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-06-06T15:15:44.873", + "lastModified": "2024-06-06T15:15:44.873", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Directory Traversal vulnerability in CubeCart v.6.5.5 and before allows an attacker to execute arbitrary code via a crafted file uploaded to the _g and node parameters." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/julio-cfa/CVE-2024-34832", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-34xx/CVE-2024-3469.json b/CVE-2024/CVE-2024-34xx/CVE-2024-3469.json index ae496f6e92e..79479f38e2b 100644 --- a/CVE-2024/CVE-2024-34xx/CVE-2024-3469.json +++ b/CVE-2024/CVE-2024-34xx/CVE-2024-3469.json @@ -2,12 +2,16 @@ "id": "CVE-2024-3469", "sourceIdentifier": "security@wordfence.com", "published": "2024-06-05T13:15:12.707", - "lastModified": "2024-06-05T13:15:12.707", - "vulnStatus": "Received", + "lastModified": "2024-06-06T14:17:35.017", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", "value": "The GP Premium plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the message parameter in all versions up to, and including, 2.4.0 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link." + }, + { + "lang": "es", + "value": "El complemento GP Premium para WordPress es vulnerable a Cross-Site Scripting Reflejado a trav\u00e9s del par\u00e1metro de mensaje en todas las versiones hasta la 2.4.0 incluida debido a una sanitizaci\u00f3n de entrada y un escape de salida insuficientes. Esto hace posible que atacantes no autenticados inyecten scripts web arbitrarios en p\u00e1ginas que se ejecutan si logran enga\u00f1ar a un usuario para que realice una acci\u00f3n como hacer clic en un enlace." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-356xx/CVE-2024-35673.json b/CVE-2024/CVE-2024-356xx/CVE-2024-35673.json index 178e68e94ac..a39a37aa8c4 100644 --- a/CVE-2024/CVE-2024-356xx/CVE-2024-35673.json +++ b/CVE-2024/CVE-2024-356xx/CVE-2024-35673.json @@ -2,12 +2,16 @@ "id": "CVE-2024-35673", "sourceIdentifier": "audit@patchstack.com", "published": "2024-06-05T14:15:13.680", - "lastModified": "2024-06-05T14:15:13.680", - "vulnStatus": "Received", + "lastModified": "2024-06-06T14:17:35.017", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", "value": "Cross-Site Request Forgery (CSRF) vulnerability in Pure Chat by Ruby Pure Chat.This issue affects Pure Chat: from n/a through 2.22." + }, + { + "lang": "es", + "value": "Vulnerabilidad de Cross-Site Request Forgery (CSRF) en Pure Chat de Ruby Pure Chat. Este problema afecta a Pure Chat: desde n/a hasta 2.22." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-356xx/CVE-2024-35674.json b/CVE-2024/CVE-2024-356xx/CVE-2024-35674.json index 2ef93369f6d..6f7d240fc82 100644 --- a/CVE-2024/CVE-2024-356xx/CVE-2024-35674.json +++ b/CVE-2024/CVE-2024-356xx/CVE-2024-35674.json @@ -2,12 +2,16 @@ "id": "CVE-2024-35674", "sourceIdentifier": "audit@patchstack.com", "published": "2024-06-05T17:15:13.543", - "lastModified": "2024-06-05T17:15:13.543", - "vulnStatus": "Received", + "lastModified": "2024-06-06T14:17:35.017", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", "value": "Missing Authorization vulnerability in Unlimited Elements Unlimited Elements For Elementor (Free Widgets, Addons, Templates).This issue affects Unlimited Elements For Elementor (Free Widgets, Addons, Templates): from n/a through 1.5.109." + }, + { + "lang": "es", + "value": "Vulnerabilidad de autorizaci\u00f3n faltante en Unlimited Elements Unlimited Elements For Elementor (widgets, complementos y plantillas gratuitos). Este problema afecta a Unlimited Elements For Elementor (widgets, complementos y plantillas gratuitos): desde n/a hasta 1.5.109." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-361xx/CVE-2024-36106.json b/CVE-2024/CVE-2024-361xx/CVE-2024-36106.json new file mode 100644 index 00000000000..b65eb524704 --- /dev/null +++ b/CVE-2024/CVE-2024-361xx/CVE-2024-36106.json @@ -0,0 +1,59 @@ +{ + "id": "CVE-2024-36106", + "sourceIdentifier": "security-advisories@github.com", + "published": "2024-06-06T15:15:45.023", + "lastModified": "2024-06-06T15:15:45.023", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Argo CD is a declarative, GitOps continuous delivery tool for Kubernetes. It\u2019s possible for authenticated users to enumerate clusters by name by inspecting error messages. It\u2019s also possible to enumerate the names of projects with project-scoped clusters if you know the names of the clusters. This vulnerability is fixed in 2.11.3, 2.10.12, and 2.9.17." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 4.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-209" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/argoproj/argo-cd/commit/c2647055c261a550e5da075793260f6524e65ad9", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/argoproj/argo-cd/security/advisories/GHSA-3cqf-953p-h5cp", + "source": "security-advisories@github.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-361xx/CVE-2024-36129.json b/CVE-2024/CVE-2024-361xx/CVE-2024-36129.json index ba3b1bd366b..f4008d391e7 100644 --- a/CVE-2024/CVE-2024-361xx/CVE-2024-36129.json +++ b/CVE-2024/CVE-2024-361xx/CVE-2024-36129.json @@ -2,12 +2,16 @@ "id": "CVE-2024-36129", "sourceIdentifier": "security-advisories@github.com", "published": "2024-06-05T18:15:10.833", - "lastModified": "2024-06-05T18:15:10.833", - "vulnStatus": "Received", + "lastModified": "2024-06-06T14:17:35.017", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", "value": "The OpenTelemetry Collector offers a vendor-agnostic implementation on how to receive, process and export telemetry data. An unsafe decompression vulnerability allows unauthenticated attackers to crash the collector via excessive memory consumption. OTel Collector version 0.102.1 fixes this issue. It is also fixed in the confighttp module version 0.102.0 and configgrpc module version 0.102.1.\n" + }, + { + "lang": "es", + "value": "OpenTelemetry Collector ofrece una implementaci\u00f3n independiente del proveedor sobre c\u00f3mo recibir, procesar y exportar datos de telemetr\u00eda. Una vulnerabilidad de descompresi\u00f3n insegura permite a atacantes no autenticados bloquear el recopilador mediante un consumo excesivo de memoria. La versi\u00f3n 0.102.1 de OTel Collector soluciona este problema. Tambi\u00e9n est\u00e1 corregido en la versi\u00f3n 0.102.0 del m\u00f3dulo confighttp y en la versi\u00f3n 0.102.1 del m\u00f3dulo configgrpc." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-363xx/CVE-2024-36393.json b/CVE-2024/CVE-2024-363xx/CVE-2024-36393.json index 8140d171d88..ab35e037f4a 100644 --- a/CVE-2024/CVE-2024-363xx/CVE-2024-36393.json +++ b/CVE-2024/CVE-2024-363xx/CVE-2024-36393.json @@ -2,12 +2,16 @@ "id": "CVE-2024-36393", "sourceIdentifier": "cna@cyber.gov.il", "published": "2024-06-06T09:15:14.420", - "lastModified": "2024-06-06T09:15:14.420", - "vulnStatus": "Received", + "lastModified": "2024-06-06T14:17:35.017", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", "value": "SysAid - CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')" + }, + { + "lang": "es", + "value": "SysAid - CWE-89: Neutralizaci\u00f3n inadecuada de elementos especiales utilizados en un comando SQL (\"Inyecci\u00f3n SQL\")" } ], "metrics": { diff --git a/CVE-2024/CVE-2024-363xx/CVE-2024-36394.json b/CVE-2024/CVE-2024-363xx/CVE-2024-36394.json index e303ac39499..0c0d589d04a 100644 --- a/CVE-2024/CVE-2024-363xx/CVE-2024-36394.json +++ b/CVE-2024/CVE-2024-363xx/CVE-2024-36394.json @@ -2,12 +2,16 @@ "id": "CVE-2024-36394", "sourceIdentifier": "cna@cyber.gov.il", "published": "2024-06-06T09:15:14.660", - "lastModified": "2024-06-06T09:15:14.660", - "vulnStatus": "Received", + "lastModified": "2024-06-06T14:17:35.017", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", "value": "SysAid - CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')" + }, + { + "lang": "es", + "value": "SysAid - CWE-78: Neutralizaci\u00f3n inadecuada de elementos especiales utilizados en un comando del sistema operativo (\"Inyecci\u00f3n de comando del sistema operativo\")" } ], "metrics": { diff --git a/CVE-2024/CVE-2024-365xx/CVE-2024-36547.json b/CVE-2024/CVE-2024-365xx/CVE-2024-36547.json index ad01b69fec0..dd3f17bf17f 100644 --- a/CVE-2024/CVE-2024-365xx/CVE-2024-36547.json +++ b/CVE-2024/CVE-2024-365xx/CVE-2024-36547.json @@ -2,19 +2,79 @@ "id": "CVE-2024-36547", "sourceIdentifier": "cve@mitre.org", "published": "2024-06-04T15:15:47.210", - "lastModified": "2024-06-04T16:57:41.053", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-06-06T15:16:11.897", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "idccms V1.35 was discovered to contain a Cross-Site Request Forgery (CSRF) via the component admin/vpsClass_deal.php?mudi=add" + }, + { + "lang": "es", + "value": "Se descubri\u00f3 que idccms V1.35 conten\u00eda Cross-Site Request Forgery (CSRF) a trav\u00e9s del componente admin/vpsClass_deal.php?mudi=add" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:idccms:idccms:1.35:*:*:*:*:*:*:*", + "matchCriteriaId": "0790E0F4-51A6-479C-9321-8E42F139EDC7" + } + ] + } + ] } ], - "metrics": {}, "references": [ { "url": "https://github.com/da271133/cms/blob/main/32/csrf.md", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-365xx/CVE-2024-36548.json b/CVE-2024/CVE-2024-365xx/CVE-2024-36548.json index ab2865d4a25..58f44053416 100644 --- a/CVE-2024/CVE-2024-365xx/CVE-2024-36548.json +++ b/CVE-2024/CVE-2024-365xx/CVE-2024-36548.json @@ -2,19 +2,78 @@ "id": "CVE-2024-36548", "sourceIdentifier": "cve@mitre.org", "published": "2024-06-04T15:15:47.307", - "lastModified": "2024-06-04T16:57:41.053", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-06-06T15:24:02.577", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "idccms V1.35 was discovered to contain a Cross-Site Request Forgery (CSRF) via admin/vpsCompany_deal.php?mudi=del" + }, + { + "lang": "es", + "value": "Se descubri\u00f3 que idccms V1.35 conten\u00eda Cross-Site Request Forgery (CSRF) a trav\u00e9s de admin/vpsCompany_deal.php?mudi=del" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:idccms:idccms:1.35:*:*:*:*:*:*:*", + "matchCriteriaId": "0790E0F4-51A6-479C-9321-8E42F139EDC7" + } + ] + } + ] } ], - "metrics": {}, "references": [ { "url": "https://github.com/da271133/cms/blob/main/31/csrf.md", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-365xx/CVE-2024-36549.json b/CVE-2024/CVE-2024-365xx/CVE-2024-36549.json index ea47579ca26..95a4715ec00 100644 --- a/CVE-2024/CVE-2024-365xx/CVE-2024-36549.json +++ b/CVE-2024/CVE-2024-365xx/CVE-2024-36549.json @@ -2,19 +2,79 @@ "id": "CVE-2024-36549", "sourceIdentifier": "cve@mitre.org", "published": "2024-06-04T15:15:47.397", - "lastModified": "2024-06-04T16:57:41.053", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-06-06T15:24:35.210", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "idccms v1.35 was discovered to contain a Cross-Site Request Forgery (CSRF) via /admin/vpsCompany_deal.php?mudi=rev&nohrefStr=close" + }, + { + "lang": "es", + "value": "Se descubri\u00f3 que idccms v1.35 conten\u00eda Cross-Site Request Forgery (CSRF) a trav\u00e9s de /admin/vpsCompany_deal.php?mudi=rev&nohrefStr=close" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:idccms:idccms:1.35:*:*:*:*:*:*:*", + "matchCriteriaId": "0790E0F4-51A6-479C-9321-8E42F139EDC7" + } + ] + } + ] } ], - "metrics": {}, "references": [ { "url": "https://github.com/da271133/cms/blob/main/30/csrf.md", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-365xx/CVE-2024-36550.json b/CVE-2024/CVE-2024-365xx/CVE-2024-36550.json index 188d7b77da9..af058b2e4b8 100644 --- a/CVE-2024/CVE-2024-365xx/CVE-2024-36550.json +++ b/CVE-2024/CVE-2024-365xx/CVE-2024-36550.json @@ -2,19 +2,79 @@ "id": "CVE-2024-36550", "sourceIdentifier": "cve@mitre.org", "published": "2024-06-04T15:15:47.497", - "lastModified": "2024-06-04T16:57:41.053", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-06-06T15:24:43.683", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "idccms V1.35 was discovered to contain a Cross-Site Request Forgery (CSRF) via /admin/vpsCompany_deal.php?mudi=add&nohrefStr=close" + }, + { + "lang": "es", + "value": "Se descubri\u00f3 que idccms V1.35 conten\u00eda Cross-Site Request Forgery (CSRF) a trav\u00e9s de /admin/vpsCompany_deal.php?mudi=add&nohrefStr=close" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:idccms:idccms:1.35:*:*:*:*:*:*:*", + "matchCriteriaId": "0790E0F4-51A6-479C-9321-8E42F139EDC7" + } + ] + } + ] } ], - "metrics": {}, "references": [ { "url": "https://github.com/da271133/cms/blob/main/29/csrf.md", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-366xx/CVE-2024-36667.json b/CVE-2024/CVE-2024-366xx/CVE-2024-36667.json index 56795aadd24..22b9f805a8e 100644 --- a/CVE-2024/CVE-2024-366xx/CVE-2024-36667.json +++ b/CVE-2024/CVE-2024-366xx/CVE-2024-36667.json @@ -2,12 +2,16 @@ "id": "CVE-2024-36667", "sourceIdentifier": "cve@mitre.org", "published": "2024-06-05T19:15:15.687", - "lastModified": "2024-06-05T19:15:15.687", - "vulnStatus": "Received", + "lastModified": "2024-06-06T14:17:35.017", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", "value": "idccms v1.35 was discovered to contain a Cross-Site Request Forgery (CSRF) via the component /admin/idcProType_deal.php?mudi=add&nohrefStr=close" + }, + { + "lang": "es", + "value": "Se descubri\u00f3 que idccms v1.35 conten\u00eda Cross-Site Request Forgery (CSRF) a trav\u00e9s del componente /admin/idcProType_deal.php?mudi=add&nohrefStr=close" } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-366xx/CVE-2024-36668.json b/CVE-2024/CVE-2024-366xx/CVE-2024-36668.json index 01ed81d8726..f8b39937232 100644 --- a/CVE-2024/CVE-2024-366xx/CVE-2024-36668.json +++ b/CVE-2024/CVE-2024-366xx/CVE-2024-36668.json @@ -2,12 +2,16 @@ "id": "CVE-2024-36668", "sourceIdentifier": "cve@mitre.org", "published": "2024-06-05T19:15:15.777", - "lastModified": "2024-06-05T19:15:15.777", - "vulnStatus": "Received", + "lastModified": "2024-06-06T14:17:35.017", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", "value": "idccms v1.35 was discovered to contain a Cross-Site Request Forgery (CSRF) via the component admin/type_deal.php?mudi=del" + }, + { + "lang": "es", + "value": "Se descubri\u00f3 que idccms v1.35 conten\u00eda Cross-Site Request Forgery (CSRF) a trav\u00e9s del componente admin/type_deal.php?mudi=del" } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-366xx/CVE-2024-36669.json b/CVE-2024/CVE-2024-366xx/CVE-2024-36669.json index eb4713c09f1..37727b96e92 100644 --- a/CVE-2024/CVE-2024-366xx/CVE-2024-36669.json +++ b/CVE-2024/CVE-2024-366xx/CVE-2024-36669.json @@ -2,12 +2,16 @@ "id": "CVE-2024-36669", "sourceIdentifier": "cve@mitre.org", "published": "2024-06-05T19:15:15.860", - "lastModified": "2024-06-05T19:15:15.860", - "vulnStatus": "Received", + "lastModified": "2024-06-06T14:17:35.017", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", "value": "idccms v1.35 was discovered to contain a Cross-Site Request Forgery (CSRF) via the component admin/type_deal.php?mudi=add." + }, + { + "lang": "es", + "value": "Se descubri\u00f3 que idccms v1.35 conten\u00eda Cross-Site Request Forgery (CSRF) a trav\u00e9s del componente admin/type_deal.php?mudi=add." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-366xx/CVE-2024-36670.json b/CVE-2024/CVE-2024-366xx/CVE-2024-36670.json index 1346d03faa7..9e58371d1e3 100644 --- a/CVE-2024/CVE-2024-366xx/CVE-2024-36670.json +++ b/CVE-2024/CVE-2024-366xx/CVE-2024-36670.json @@ -2,12 +2,16 @@ "id": "CVE-2024-36670", "sourceIdentifier": "cve@mitre.org", "published": "2024-06-05T19:15:15.950", - "lastModified": "2024-06-05T19:15:15.950", - "vulnStatus": "Received", + "lastModified": "2024-06-06T14:17:35.017", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", "value": "idccms v1.35 was discovered to contain a Cross-Site Request Forgery (CSRF) via the component admin/vpsClass_deal.php?mudi=del" + }, + { + "lang": "es", + "value": "Se descubri\u00f3 que idccms v1.35 conten\u00eda Cross-Site Request Forgery (CSRF) a trav\u00e9s del componente admin/vpsClass_deal.php?mudi=del" } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-367xx/CVE-2024-36779.json b/CVE-2024/CVE-2024-367xx/CVE-2024-36779.json index e5cd06cbfb4..1c9aa469bdb 100644 --- a/CVE-2024/CVE-2024-367xx/CVE-2024-36779.json +++ b/CVE-2024/CVE-2024-367xx/CVE-2024-36779.json @@ -2,8 +2,8 @@ "id": "CVE-2024-36779", "sourceIdentifier": "cve@mitre.org", "published": "2024-06-06T13:15:31.590", - "lastModified": "2024-06-06T13:15:31.590", - "vulnStatus": "Received", + "lastModified": "2024-06-06T14:17:35.017", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-368xx/CVE-2024-36837.json b/CVE-2024/CVE-2024-368xx/CVE-2024-36837.json index 7847e361b04..7c5d8264ac7 100644 --- a/CVE-2024/CVE-2024-368xx/CVE-2024-36837.json +++ b/CVE-2024/CVE-2024-368xx/CVE-2024-36837.json @@ -2,12 +2,16 @@ "id": "CVE-2024-36837", "sourceIdentifier": "cve@mitre.org", "published": "2024-06-05T15:15:11.803", - "lastModified": "2024-06-05T15:15:11.803", - "vulnStatus": "Received", + "lastModified": "2024-06-06T14:17:35.017", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", "value": "SQL Injection vulnerability in CRMEB v.5.2.2 allows a remote attacker to obtain sensitive information via the getProductList function in the ProductController.php file." + }, + { + "lang": "es", + "value": "Una vulnerabilidad de inyecci\u00f3n SQL en CRMEB v.5.2.2 permite a un atacante remoto obtener informaci\u00f3n confidencial a trav\u00e9s de la funci\u00f3n getProductList en el archivo ProductController.php." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-36xx/CVE-2024-3667.json b/CVE-2024/CVE-2024-36xx/CVE-2024-3667.json index 3a2601209ae..ea8ca59a8cf 100644 --- a/CVE-2024/CVE-2024-36xx/CVE-2024-3667.json +++ b/CVE-2024/CVE-2024-36xx/CVE-2024-3667.json @@ -2,8 +2,8 @@ "id": "CVE-2024-3667", "sourceIdentifier": "security@wordfence.com", "published": "2024-06-05T06:15:11.590", - "lastModified": "2024-06-05T12:53:50.240", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-06-06T14:07:44.473", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -17,8 +17,28 @@ "metrics": { "cvssMetricV31": [ { - "source": "security@wordfence.com", + "source": "nvd@nist.gov", "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 + }, + { + "source": "security@wordfence.com", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:L", @@ -38,18 +58,57 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:brizy:brizy-page_builder:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "2.4.44", + "matchCriteriaId": "0E89EC06-A340-4DE2-B625-4AC05E3C42F6" + } + ] + } + ] + } + ], "references": [ { "url": "https://plugins.trac.wordpress.org/browser/brizy/trunk/public/editor-build/282-wp/editor/js", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product" + ] }, { "url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&new=3086506%40brizy%2Ftrunk&old=3058896%40brizy%2Ftrunk&sfp_email=&sfph_mail=", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Patch" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/f0edfebc-bf6b-4346-9cd7-ce00007e3620?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-37xx/CVE-2024-3716.json b/CVE-2024/CVE-2024-37xx/CVE-2024-3716.json index 2fa7039b180..a80497f0274 100644 --- a/CVE-2024/CVE-2024-37xx/CVE-2024-3716.json +++ b/CVE-2024/CVE-2024-37xx/CVE-2024-3716.json @@ -2,12 +2,16 @@ "id": "CVE-2024-3716", "sourceIdentifier": "secalert@redhat.com", "published": "2024-06-05T15:15:12.043", - "lastModified": "2024-06-05T15:15:12.043", - "vulnStatus": "Received", + "lastModified": "2024-06-06T14:17:35.017", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", "value": "A flaw was found in foreman-installer when puppet-candlepin is invoked cpdb with the --password parameter. This issue leaks the password in the process list and allows an attacker to take advantage and obtain the password." + }, + { + "lang": "es", + "value": "Se encontr\u00f3 una falla en Foreman-installer cuando se invoca a Puppet-candlepin cpdb con el par\u00e1metro --password. Este problema filtra la contrase\u00f1a en la lista de procesos y permite que un atacante aproveche y obtenga la contrase\u00f1a." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-40xx/CVE-2024-4008.json b/CVE-2024/CVE-2024-40xx/CVE-2024-4008.json index 356bf41aaa8..05e247587aa 100644 --- a/CVE-2024/CVE-2024-40xx/CVE-2024-4008.json +++ b/CVE-2024/CVE-2024-40xx/CVE-2024-4008.json @@ -2,12 +2,16 @@ "id": "CVE-2024-4008", "sourceIdentifier": "cybersecurity@ch.abb.com", "published": "2024-06-05T18:15:11.113", - "lastModified": "2024-06-05T18:15:11.113", - "vulnStatus": "Received", + "lastModified": "2024-06-06T14:17:35.017", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", "value": "FDSK Leak in ABB, Busch-Jaeger, FTS Display (version 1.00) and BCU (version 1.3.0.33) allows attacker to take control via access to local KNX Bus-System" + }, + { + "lang": "es", + "value": "La fuga de FDSK en ABB, Busch-Jaeger, FTS Display (versi\u00f3n 1.00) y BCU (versi\u00f3n 1.3.0.33) permite al atacante tomar el control mediante el acceso al sistema de bus KNX local" } ], "metrics": { diff --git a/CVE-2024/CVE-2024-40xx/CVE-2024-4009.json b/CVE-2024/CVE-2024-40xx/CVE-2024-4009.json index 4392795a1d3..e0823237fc6 100644 --- a/CVE-2024/CVE-2024-40xx/CVE-2024-4009.json +++ b/CVE-2024/CVE-2024-40xx/CVE-2024-4009.json @@ -2,12 +2,16 @@ "id": "CVE-2024-4009", "sourceIdentifier": "cybersecurity@ch.abb.com", "published": "2024-06-05T18:15:11.420", - "lastModified": "2024-06-05T18:15:11.420", - "vulnStatus": "Received", + "lastModified": "2024-06-06T14:17:35.017", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", "value": "Replay Attack\n\nin ABB, Busch-Jaeger, FTS Display (version 1.00) and BCU (version 1.3.0.33) allows attacker to capture/replay KNX telegram to local KNX Bus-System" + }, + { + "lang": "es", + "value": "Replay Attack en ABB, Busch-Jaeger, FTS Display (versi\u00f3n 1.00) y BCU (versi\u00f3n 1.3.0.33) permite al atacante capturar/reproducir telegramas KNX al sistema de bus KNX local" } ], "metrics": { diff --git a/CVE-2024/CVE-2024-41xx/CVE-2024-4177.json b/CVE-2024/CVE-2024-41xx/CVE-2024-4177.json index 20800860fbc..2ac3e5c9dcf 100644 --- a/CVE-2024/CVE-2024-41xx/CVE-2024-4177.json +++ b/CVE-2024/CVE-2024-41xx/CVE-2024-4177.json @@ -2,12 +2,16 @@ "id": "CVE-2024-4177", "sourceIdentifier": "cve-requests@bitdefender.com", "published": "2024-06-06T08:15:39.767", - "lastModified": "2024-06-06T08:15:39.767", - "vulnStatus": "Received", + "lastModified": "2024-06-06T14:17:35.017", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", "value": "A host whitelist parser issue in the proxy service implemented in the GravityZone Update Server allows an attacker to cause a server-side request forgery. This issue only affects GravityZone Console versions before 6.38.1-2 that are running only on premise." + }, + { + "lang": "es", + "value": "Un problema con el analizador de lista blanca de host en el servicio proxy implementado en GravityZone Update Server permite a un atacante provocar server-side request forgery. Este problema solo afecta a las versiones de GravityZone Console anteriores a 6.38.1-2 que se ejecutan \u00fanicamente en las instalaciones." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-41xx/CVE-2024-4194.json b/CVE-2024/CVE-2024-41xx/CVE-2024-4194.json index 08c13296fb1..52423b448fd 100644 --- a/CVE-2024/CVE-2024-41xx/CVE-2024-4194.json +++ b/CVE-2024/CVE-2024-41xx/CVE-2024-4194.json @@ -2,12 +2,16 @@ "id": "CVE-2024-4194", "sourceIdentifier": "security@wordfence.com", "published": "2024-06-06T02:15:53.453", - "lastModified": "2024-06-06T02:15:53.453", - "vulnStatus": "Received", + "lastModified": "2024-06-06T14:17:35.017", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", "value": "The The Album and Image Gallery plus Lightbox plugin for WordPress is vulnerable to arbitrary shortcode execution in all versions up to, and including, 2.0. This is due to the software allowing users to execute an action that does not properly validate a value before running do_shortcode. This makes it possible for unauthenticated attackers to execute arbitrary shortcodes." + }, + { + "lang": "es", + "value": "El complemento The Album and Image Gallery plus Lightbox para WordPress es vulnerable a la ejecuci\u00f3n arbitraria de c\u00f3digos cortos en todas las versiones hasta la 2.0 incluida. Esto se debe a que el software permite a los usuarios ejecutar una acci\u00f3n que no valida correctamente un valor antes de ejecutar do_shortcode. Esto hace posible que atacantes no autenticados ejecuten c\u00f3digos cortos arbitrarios." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-42xx/CVE-2024-4212.json b/CVE-2024/CVE-2024-42xx/CVE-2024-4212.json index a29c6f6fdd9..927075a01fd 100644 --- a/CVE-2024/CVE-2024-42xx/CVE-2024-4212.json +++ b/CVE-2024/CVE-2024-42xx/CVE-2024-4212.json @@ -2,12 +2,16 @@ "id": "CVE-2024-4212", "sourceIdentifier": "security@wordfence.com", "published": "2024-06-06T04:15:11.970", - "lastModified": "2024-06-06T04:15:11.970", - "vulnStatus": "Received", + "lastModified": "2024-06-06T14:17:35.017", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", "value": "The Themesflat Addons For Elementor plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's TF Group Image, TF Nav Menu, TF Posts, TF Woo Product Grid, TF Accordion, and TF Image Box widgets in all versions up to, and including, 2.1.1 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page." + }, + { + "lang": "es", + "value": "El complemento Themesflat Addons para Elementor para WordPress es vulnerable a Cross-Site Scripting Almacenado a trav\u00e9s de los widgets TF Group Image, TF Nav Menu, TF Posts, TF Woo Product Grid, TF Accordion y TF Image Box en todas las versiones hasta e incluida, 2.1.1 debido a una sanitizaci\u00f3n insuficiente de las entradas y a la salida de datos que se escapan de los atributos proporcionados por el usuario. Esto hace posible que atacantes autenticados, con acceso de nivel de colaborador y superior, inyecten scripts web arbitrarios en p\u00e1ginas que se ejecutar\u00e1n cada vez que un usuario acceda a una p\u00e1gina inyectada." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-43xx/CVE-2024-4364.json b/CVE-2024/CVE-2024-43xx/CVE-2024-4364.json index a1b99a97329..edd86598931 100644 --- a/CVE-2024/CVE-2024-43xx/CVE-2024-4364.json +++ b/CVE-2024/CVE-2024-43xx/CVE-2024-4364.json @@ -2,12 +2,16 @@ "id": "CVE-2024-4364", "sourceIdentifier": "security@wordfence.com", "published": "2024-06-06T04:15:12.220", - "lastModified": "2024-06-06T04:15:12.220", - "vulnStatus": "Received", + "lastModified": "2024-06-06T14:17:35.017", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", "value": "The Qi Addons For Elementor plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's button widgets in all versions up to, and including, 1.7.2 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page." + }, + { + "lang": "es", + "value": "El complemento Qi Addons For Elementor para WordPress es vulnerable a Cross-Site Scripting Almacenado a trav\u00e9s de los widgets de botones del complemento en todas las versiones hasta la 1.7.2 incluida debido a una sanitizaci\u00f3n de entrada insuficiente y a un escape de salida en los atributos proporcionados por el usuario. Esto hace posible que atacantes autenticados, con acceso de nivel de colaborador y superior, inyecten scripts web arbitrarios en p\u00e1ginas que se ejecutar\u00e1n cada vez que un usuario acceda a una p\u00e1gina inyectada." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-44xx/CVE-2024-4458.json b/CVE-2024/CVE-2024-44xx/CVE-2024-4458.json index fb1f055e879..313286eb99a 100644 --- a/CVE-2024/CVE-2024-44xx/CVE-2024-4458.json +++ b/CVE-2024/CVE-2024-44xx/CVE-2024-4458.json @@ -2,12 +2,16 @@ "id": "CVE-2024-4458", "sourceIdentifier": "security@wordfence.com", "published": "2024-06-06T04:15:12.483", - "lastModified": "2024-06-06T04:15:12.483", - "vulnStatus": "Received", + "lastModified": "2024-06-06T14:17:35.017", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", "value": "The Themesflat Addons For Elementor plugin for WordPress is vulnerable to Stored Cross-Site Scripting in several widgets via URL parameters in all versions up to, and including, 2.1.1 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with contributor access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page." + }, + { + "lang": "es", + "value": "El complemento Themesflat Addons For Elementor para WordPress es vulnerable a Cross-Site Scripting Almacenado en varios widgets a trav\u00e9s de par\u00e1metros de URL en todas las versiones hasta la 2.1.1 incluida debido a una sanitizaci\u00f3n de entrada y un escape de salida insuficientes. Esto hace posible que atacantes autenticados, con acceso de colaborador y superior, inyecten scripts web arbitrarios en p\u00e1ginas que se ejecutar\u00e1n cada vez que un usuario acceda a una p\u00e1gina inyectada." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-44xx/CVE-2024-4459.json b/CVE-2024/CVE-2024-44xx/CVE-2024-4459.json index 9060470e786..75d94aaa564 100644 --- a/CVE-2024/CVE-2024-44xx/CVE-2024-4459.json +++ b/CVE-2024/CVE-2024-44xx/CVE-2024-4459.json @@ -2,12 +2,16 @@ "id": "CVE-2024-4459", "sourceIdentifier": "security@wordfence.com", "published": "2024-06-06T04:15:12.717", - "lastModified": "2024-06-06T04:15:12.717", - "vulnStatus": "Received", + "lastModified": "2024-06-06T14:17:35.017", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", "value": "The Themesflat Addons For Elementor plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's widget's titles in all versions up to, and including, 2.1.1 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page." + }, + { + "lang": "es", + "value": "El complemento Themesflat Addons For Elementor para WordPress es vulnerable a Cross-Site Scripting Almacenado a trav\u00e9s de los t\u00edtulos de los widgets del complemento en todas las versiones hasta la 2.1.1 incluida debido a una sanitizaci\u00f3n de entrada insuficiente y a un escape de salida en los atributos proporcionados por el usuario. Esto hace posible que atacantes autenticados, con acceso de nivel de colaborador y superior, inyecten scripts web arbitrarios en p\u00e1ginas que se ejecutar\u00e1n cada vez que un usuario acceda a una p\u00e1gina inyectada." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-46xx/CVE-2024-4608.json b/CVE-2024/CVE-2024-46xx/CVE-2024-4608.json index cb76cdb229f..efb22aa75f1 100644 --- a/CVE-2024/CVE-2024-46xx/CVE-2024-4608.json +++ b/CVE-2024/CVE-2024-46xx/CVE-2024-4608.json @@ -2,12 +2,16 @@ "id": "CVE-2024-4608", "sourceIdentifier": "security@wordfence.com", "published": "2024-06-06T04:15:12.953", - "lastModified": "2024-06-06T04:15:12.953", - "vulnStatus": "Received", + "lastModified": "2024-06-06T14:17:35.017", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", "value": "The SellKit \u2013 Funnel builder and checkout optimizer for WooCommerce to sell more, faster plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'id' parameter in all versions up to, and including, 1.9.8 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page." + }, + { + "lang": "es", + "value": "El complemento SellKit \u2013 Funnel builder and checkout optimizer for WooCommerce to sell more, faster para WordPress es vulnerable a Cross-Site Scripting Almacenado a trav\u00e9s del par\u00e1metro 'id' en todas las versiones hasta la 1.9.8 incluida debido a una sanitizaci\u00f3n de entrada insuficiente y salida que se escapa. Esto hace posible que atacantes autenticados, con acceso de nivel de colaborador y superior, inyecten scripts web arbitrarios en p\u00e1ginas que se ejecutar\u00e1n cada vez que un usuario acceda a una p\u00e1gina inyectada." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-47xx/CVE-2024-4705.json b/CVE-2024/CVE-2024-47xx/CVE-2024-4705.json index 3b2f79a85cd..688543d2366 100644 --- a/CVE-2024/CVE-2024-47xx/CVE-2024-4705.json +++ b/CVE-2024/CVE-2024-47xx/CVE-2024-4705.json @@ -2,12 +2,16 @@ "id": "CVE-2024-4705", "sourceIdentifier": "security@wordfence.com", "published": "2024-06-06T02:15:53.663", - "lastModified": "2024-06-06T02:15:53.663", - "vulnStatus": "Received", + "lastModified": "2024-06-06T14:17:35.017", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", "value": "The Testimonials Widget plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's testimonials shortcode in all versions up to, and including, 4.0.4 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page." + }, + { + "lang": "es", + "value": "El complemento Testimonials Widget para WordPress es vulnerable a Cross-Site Scripting Almacenado a trav\u00e9s del c\u00f3digo abreviado de testimonios del complemento en todas las versiones hasta la 4.0.4 incluida debido a una sanitizaci\u00f3n de entrada insuficiente y a un escape de salida en los atributos proporcionados por el usuario. Esto hace posible que atacantes autenticados, con acceso de nivel de colaborador y superior, inyecten scripts web arbitrarios en p\u00e1ginas que se ejecutar\u00e1n cada vez que un usuario acceda a una p\u00e1gina inyectada." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-47xx/CVE-2024-4707.json b/CVE-2024/CVE-2024-47xx/CVE-2024-4707.json index ffb0825ed1b..0863fd45dbd 100644 --- a/CVE-2024/CVE-2024-47xx/CVE-2024-4707.json +++ b/CVE-2024/CVE-2024-47xx/CVE-2024-4707.json @@ -2,12 +2,16 @@ "id": "CVE-2024-4707", "sourceIdentifier": "security@wordfence.com", "published": "2024-06-06T04:15:13.213", - "lastModified": "2024-06-06T04:15:13.213", - "vulnStatus": "Received", + "lastModified": "2024-06-06T14:17:35.017", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", "value": "The Materialis Companion plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's materialis_contact_form shortcode in all versions up to, and including, 1.3.41 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page." + }, + { + "lang": "es", + "value": "El complemento Materialis Companion para WordPress es vulnerable a Cross-Site Scripting Almacenado a trav\u00e9s del c\u00f3digo corto materialis_contact_form del complemento en todas las versiones hasta la 1.3.41 incluida debido a una sanitizaci\u00f3n de entrada insuficiente y a un escape de salida en los atributos proporcionados por el usuario. Esto hace posible que atacantes autenticados, con acceso de nivel de colaborador y superior, inyecten scripts web arbitrarios en p\u00e1ginas que se ejecutar\u00e1n cada vez que un usuario acceda a una p\u00e1gina inyectada." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-47xx/CVE-2024-4788.json b/CVE-2024/CVE-2024-47xx/CVE-2024-4788.json index 6e33a25cf1d..4c22b554e7b 100644 --- a/CVE-2024/CVE-2024-47xx/CVE-2024-4788.json +++ b/CVE-2024/CVE-2024-47xx/CVE-2024-4788.json @@ -2,12 +2,16 @@ "id": "CVE-2024-4788", "sourceIdentifier": "security@wordfence.com", "published": "2024-06-06T02:15:53.860", - "lastModified": "2024-06-06T02:15:53.860", - "vulnStatus": "Received", + "lastModified": "2024-06-06T14:17:35.017", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", "value": "The Boostify Header Footer Builder for Elementor plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the create_bhf_post function in all versions up to, and including, 1.3.3. This makes it possible for authenticated attackers, with subscriber-level access and above, to create pages or posts with arbitrary content." + }, + { + "lang": "es", + "value": "El complemento Boostify Header Footer Builder para Elementor para WordPress es vulnerable a modificaciones no autorizadas de datos debido a una falta de verificaci\u00f3n de capacidad en la funci\u00f3n create_bhf_post en todas las versiones hasta la 1.3.3 incluida. Esto hace posible que atacantes autenticados, con acceso a nivel de suscriptor y superior, creen p\u00e1ginas o publicaciones con contenido arbitrario." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-48xx/CVE-2024-4812.json b/CVE-2024/CVE-2024-48xx/CVE-2024-4812.json index 0564e9a6744..385436efb4b 100644 --- a/CVE-2024/CVE-2024-48xx/CVE-2024-4812.json +++ b/CVE-2024/CVE-2024-48xx/CVE-2024-4812.json @@ -2,12 +2,16 @@ "id": "CVE-2024-4812", "sourceIdentifier": "secalert@redhat.com", "published": "2024-06-05T15:15:12.333", - "lastModified": "2024-06-05T15:15:12.333", - "vulnStatus": "Received", + "lastModified": "2024-06-06T14:17:35.017", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", "value": "A flaw was found in the Katello plugin for Foreman, where it is possible to store malicious JavaScript code in the \"Description\" field of a user. This code can be executed when opening certain pages, for example, Host Collections." + }, + { + "lang": "es", + "value": "Se encontr\u00f3 una falla en el complemento Katello para Foreman, donde es posible almacenar c\u00f3digo JavaScript malicioso en el campo \"Descripci\u00f3n\" de un usuario. Este c\u00f3digo se puede ejecutar al abrir determinadas p\u00e1ginas, por ejemplo, Colecciones de hosts." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-49xx/CVE-2024-4942.json b/CVE-2024/CVE-2024-49xx/CVE-2024-4942.json index aa831061b78..703a23ef715 100644 --- a/CVE-2024/CVE-2024-49xx/CVE-2024-4942.json +++ b/CVE-2024/CVE-2024-49xx/CVE-2024-4942.json @@ -2,12 +2,16 @@ "id": "CVE-2024-4942", "sourceIdentifier": "security@wordfence.com", "published": "2024-06-06T02:15:54.080", - "lastModified": "2024-06-06T02:15:54.080", - "vulnStatus": "Received", + "lastModified": "2024-06-06T14:17:35.017", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", "value": "The Custom Dash plugin for WordPress is vulnerable to Stored Cross-Site Scripting via admin settings in all versions up to, and including, 1.0.2 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with administrator-level permissions and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. This only affects multi-site installations and installations where unfiltered_html has been disabled." + }, + { + "lang": "es", + "value": "El complemento Custom Dash para WordPress es vulnerable a Cross-Site Scripting Almacenado a trav\u00e9s de la configuraci\u00f3n de administrador en todas las versiones hasta la 1.0.2 incluida debido a una sanitizaci\u00f3n de entrada y un escape de salida insuficientes. Esto hace posible que atacantes autenticados, con permisos de nivel de administrador y superiores, inyecten scripts web arbitrarios en p\u00e1ginas que se ejecutar\u00e1n cada vez que un usuario acceda a una p\u00e1gina inyectada. Esto solo afecta a las instalaciones multisitio y a las instalaciones en las que se ha deshabilitado unfiltered_html." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-50xx/CVE-2024-5001.json b/CVE-2024/CVE-2024-50xx/CVE-2024-5001.json index cbc8cbf4c39..d387f4695b5 100644 --- a/CVE-2024/CVE-2024-50xx/CVE-2024-5001.json +++ b/CVE-2024/CVE-2024-50xx/CVE-2024-5001.json @@ -2,12 +2,16 @@ "id": "CVE-2024-5001", "sourceIdentifier": "security@wordfence.com", "published": "2024-06-06T02:15:54.283", - "lastModified": "2024-06-06T02:15:54.283", - "vulnStatus": "Received", + "lastModified": "2024-06-06T14:17:35.017", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", "value": "The Image Hover Effects for Elementor with Lightbox and Flipbox plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the '_id', 'oxi_addons_f_title_tag', and 'content_description_tag' parameters in all versions up to, and including, 3.0.2 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page." + }, + { + "lang": "es", + "value": "El complemento Image Hover Effects for Elementor with Lightbox and Flipbox para WordPress son vulnerables a Cross-Site Scripting Almacenado a trav\u00e9s de los par\u00e1metros '_id', 'oxi_addons_f_title_tag' y 'content_description_tag' en todas las versiones hasta la 3.0.2 incluida debido a una sanitizaci\u00f3n insuficiente de los insumos y escape de los productos. Esto hace posible que atacantes autenticados, con acceso de nivel de Colaborador y superior, inyecten scripts web arbitrarios en p\u00e1ginas que se ejecutar\u00e1n cada vez que un usuario acceda a una p\u00e1gina inyectada." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-50xx/CVE-2024-5037.json b/CVE-2024/CVE-2024-50xx/CVE-2024-5037.json index efba50f6f31..6de335b1cbe 100644 --- a/CVE-2024/CVE-2024-50xx/CVE-2024-5037.json +++ b/CVE-2024/CVE-2024-50xx/CVE-2024-5037.json @@ -2,12 +2,16 @@ "id": "CVE-2024-5037", "sourceIdentifier": "secalert@redhat.com", "published": "2024-06-05T18:15:11.747", - "lastModified": "2024-06-05T18:15:11.747", - "vulnStatus": "Received", + "lastModified": "2024-06-06T14:17:35.017", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", "value": "A flaw was found in OpenShift's Telemeter. If certain conditions are in place, an attacker can use a forged token to bypass the issue (\"iss\") check during JSON web token (JWT) authentication." + }, + { + "lang": "es", + "value": "Se encontr\u00f3 una falla en Telemeter de OpenShift. Si se cumplen ciertas condiciones, un atacante puede usar un token falsificado para evitar la verificaci\u00f3n del problema (\"iss\") durante la autenticaci\u00f3n del token web JSON (JWT)." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-50xx/CVE-2024-5038.json b/CVE-2024/CVE-2024-50xx/CVE-2024-5038.json index 78fc6244848..d1b92871ea8 100644 --- a/CVE-2024/CVE-2024-50xx/CVE-2024-5038.json +++ b/CVE-2024/CVE-2024-50xx/CVE-2024-5038.json @@ -2,12 +2,16 @@ "id": "CVE-2024-5038", "sourceIdentifier": "security@wordfence.com", "published": "2024-06-06T11:15:48.770", - "lastModified": "2024-06-06T11:15:48.770", - "vulnStatus": "Received", + "lastModified": "2024-06-06T14:17:35.017", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", "value": "The Colibri Page Builder plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's shortcode(s) in all versions up to, and including, 1.0.276 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page." + }, + { + "lang": "es", + "value": "El complemento Colibri Page Builder para WordPress es vulnerable a Cross-Site Scripting Almacenado a trav\u00e9s de los c\u00f3digos cortos del complemento en todas las versiones hasta la 1.0.276 incluida debido a una sanitizaci\u00f3n de entrada insuficiente y a un escape de salida en los atributos proporcionados por el usuario. Esto hace posible que atacantes autenticados, con acceso de nivel de colaborador y superior, inyecten scripts web arbitrarios en p\u00e1ginas que se ejecutar\u00e1n cada vez que un usuario acceda a una p\u00e1gina inyectada." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-51xx/CVE-2024-5141.json b/CVE-2024/CVE-2024-51xx/CVE-2024-5141.json index af0e564ba69..5b01ec3e1ac 100644 --- a/CVE-2024/CVE-2024-51xx/CVE-2024-5141.json +++ b/CVE-2024/CVE-2024-51xx/CVE-2024-5141.json @@ -2,12 +2,16 @@ "id": "CVE-2024-5141", "sourceIdentifier": "security@wordfence.com", "published": "2024-06-06T04:15:13.467", - "lastModified": "2024-06-06T04:15:13.467", - "vulnStatus": "Received", + "lastModified": "2024-06-06T14:17:35.017", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", "value": "The Rotating Tweets (Twitter widget and shortcode) plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's' 'rotatingtweets' in all versions up to, and including, 1.9.10 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page." + }, + { + "lang": "es", + "value": "El complemento Rotating Tweets (widget de Twitter y c\u00f3digo abreviado) para WordPress es vulnerable a Cross-Site Scripting Almacenado a trav\u00e9s de los 'tweets giratorios' del complemento en todas las versiones hasta la 1.9.10 incluida debido a una sanitizaci\u00f3n de entrada insuficiente y a un escape de salida en los atributos proporcionados por el usuario. Esto hace posible que atacantes autenticados, con acceso de nivel de colaborador y superior, inyecten scripts web arbitrarios en p\u00e1ginas que se ejecutar\u00e1n cada vez que un usuario acceda a una p\u00e1gina inyectada." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-51xx/CVE-2024-5149.json b/CVE-2024/CVE-2024-51xx/CVE-2024-5149.json index c2c5ef2c443..8e681dba9f7 100644 --- a/CVE-2024/CVE-2024-51xx/CVE-2024-5149.json +++ b/CVE-2024/CVE-2024-51xx/CVE-2024-5149.json @@ -2,8 +2,8 @@ "id": "CVE-2024-5149", "sourceIdentifier": "security@wordfence.com", "published": "2024-06-05T05:15:50.260", - "lastModified": "2024-06-05T12:53:50.240", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-06-06T14:15:01.960", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -17,8 +17,28 @@ "metrics": { "cvssMetricV31": [ { - "source": "security@wordfence.com", + "source": "nvd@nist.gov", "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 + }, + { + "source": "security@wordfence.com", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N", @@ -38,14 +58,50 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-330" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:themekraft:buddyforms:*:*:*:*:*:wordpress:*:*", + "versionEndIncluding": "2.8.9", + "matchCriteriaId": "FA366645-68E9-4808-821F-E0A5F8582939" + } + ] + } + ] + } + ], "references": [ { "url": "https://plugins.trac.wordpress.org/browser/buddyforms/tags/2.8.9/includes/wp-insert-user.php#L334", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/a5c8d361-698b-4abd-bcdd-0361d3fd10c5?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-51xx/CVE-2024-5152.json b/CVE-2024/CVE-2024-51xx/CVE-2024-5152.json index 449086962e4..e8af3892b2b 100644 --- a/CVE-2024/CVE-2024-51xx/CVE-2024-5152.json +++ b/CVE-2024/CVE-2024-51xx/CVE-2024-5152.json @@ -2,12 +2,16 @@ "id": "CVE-2024-5152", "sourceIdentifier": "security@wordfence.com", "published": "2024-06-06T04:15:13.720", - "lastModified": "2024-06-06T04:15:13.720", - "vulnStatus": "Received", + "lastModified": "2024-06-06T14:17:35.017", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", "value": "The ElementsReady Addons for Elementor plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the \u2018_id\u2019 parameter in all versions up to, and including, 6.1.0 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page." + }, + { + "lang": "es", + "value": "El complemento ElementsReady Addons para Elementor para WordPress es vulnerable a Cross-Site Scripting Almacenado a trav\u00e9s del par\u00e1metro '_id' en todas las versiones hasta la 6.1.0 incluida debido a una sanitizaci\u00f3n de entrada y un escape de salida insuficientes. Esto hace posible que atacantes autenticados, con acceso de nivel de Colaborador y superior, inyecten scripts web arbitrarios en p\u00e1ginas que se ejecutar\u00e1n cada vez que un usuario acceda a una p\u00e1gina inyectada." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-51xx/CVE-2024-5153.json b/CVE-2024/CVE-2024-51xx/CVE-2024-5153.json index 72522be8f9d..24d99da99f1 100644 --- a/CVE-2024/CVE-2024-51xx/CVE-2024-5153.json +++ b/CVE-2024/CVE-2024-51xx/CVE-2024-5153.json @@ -2,12 +2,16 @@ "id": "CVE-2024-5153", "sourceIdentifier": "security@wordfence.com", "published": "2024-06-06T04:15:13.950", - "lastModified": "2024-06-06T04:15:13.950", - "vulnStatus": "Received", + "lastModified": "2024-06-06T14:17:35.017", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", "value": "The Startklar Elementor Addons plugin for WordPress is vulnerable to Directory Traversal in all versions up to, and including, 1.7.15 via the 'dropzone_hash' parameter. This makes it possible for unauthenticated attackers to copy the contents of arbitrary files on the server, which can contain sensitive information, and to delete arbitrary directories, including the root WordPress directory." + }, + { + "lang": "es", + "value": "El complemento Startklar Elementor Addons para WordPress es vulnerable a Directory Traversal en todas las versiones hasta la 1.7.15 incluida a trav\u00e9s del par\u00e1metro 'dropzone_hash'. Esto hace posible que atacantes no autenticados copien el contenido de archivos arbitrarios en el servidor, que pueden contener informaci\u00f3n confidencial, y eliminen directorios arbitrarios, incluido el directorio ra\u00edz de WordPress." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-51xx/CVE-2024-5161.json b/CVE-2024/CVE-2024-51xx/CVE-2024-5161.json index 3a9d7ce43ba..67e4142a9a5 100644 --- a/CVE-2024/CVE-2024-51xx/CVE-2024-5161.json +++ b/CVE-2024/CVE-2024-51xx/CVE-2024-5161.json @@ -2,12 +2,16 @@ "id": "CVE-2024-5161", "sourceIdentifier": "security@wordfence.com", "published": "2024-06-06T04:15:14.217", - "lastModified": "2024-06-06T04:15:14.217", - "vulnStatus": "Received", + "lastModified": "2024-06-06T14:17:35.017", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", "value": "The Magical Addons For Elementor ( Header Footer Builder, Free Elementor Widgets, Elementor Templates Library ) plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the \u2018_id\u2019 parameter in all versions up to, and including, 1.1.39 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page." + }, + { + "lang": "es", + "value": "El complemento Magical Addons For Elementor (Header Footer Builder, Free Elementor Widgets, Elementor Templates Library) para WordPress es vulnerable a las Cross-Site Scripting Almacenado a trav\u00e9s del par\u00e1metro '_id' en todas las versiones hasta la 1.1.39 incluida debido a una insuficiencia sanitizaci\u00f3n de insumos y escape de salidas. Esto hace posible que atacantes autenticados, con acceso de nivel de Colaborador y superior, inyecten scripts web arbitrarios en p\u00e1ginas que se ejecutar\u00e1n cada vez que un usuario acceda a una p\u00e1gina inyectada." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-51xx/CVE-2024-5162.json b/CVE-2024/CVE-2024-51xx/CVE-2024-5162.json index 166d2c704fa..56630508a2c 100644 --- a/CVE-2024/CVE-2024-51xx/CVE-2024-5162.json +++ b/CVE-2024/CVE-2024-51xx/CVE-2024-5162.json @@ -2,12 +2,16 @@ "id": "CVE-2024-5162", "sourceIdentifier": "security@wordfence.com", "published": "2024-06-06T04:15:14.463", - "lastModified": "2024-06-06T04:15:14.463", - "vulnStatus": "Received", + "lastModified": "2024-06-06T14:17:35.017", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", "value": "The WordPress prettyPhoto plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the \u2018url\u2019 parameter in all versions up to, and including, 1.2.3 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page." + }, + { + "lang": "es", + "value": "El complemento WordPress PrettyPhoto para WordPress es vulnerable a Cross-Site Scripting Almacenado a trav\u00e9s del par\u00e1metro 'url' en todas las versiones hasta la 1.2.3 incluida debido a una sanitizaci\u00f3n de entrada y un escape de salida insuficientes. Esto hace posible que atacantes autenticados, con acceso de nivel de Colaborador y superior, inyecten scripts web arbitrarios en p\u00e1ginas que se ejecutar\u00e1n cada vez que un usuario acceda a una p\u00e1gina inyectada." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-51xx/CVE-2024-5171.json b/CVE-2024/CVE-2024-51xx/CVE-2024-5171.json index 50154bb138c..8aa82c9432d 100644 --- a/CVE-2024/CVE-2024-51xx/CVE-2024-5171.json +++ b/CVE-2024/CVE-2024-51xx/CVE-2024-5171.json @@ -2,12 +2,16 @@ "id": "CVE-2024-5171", "sourceIdentifier": "cve-coordination@google.com", "published": "2024-06-05T20:15:13.800", - "lastModified": "2024-06-05T20:15:13.800", - "vulnStatus": "Received", + "lastModified": "2024-06-06T14:17:35.017", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", "value": "Integer overflow in libaom internal function\u00a0img_alloc_helper can lead to heap buffer overflow. This function can be reached via 3 callers:\n\n\n * Calling aom_img_alloc() with a large value of the d_w, d_h, or align parameter may result in integer overflows in the calculations of buffer sizes and offsets and some fields of the returned aom_image_t struct may be invalid.\n * Calling aom_img_wrap() with a large value of the d_w, d_h, or align parameter may result in integer overflows in the calculations of buffer sizes and offsets and some fields of the returned aom_image_t struct may be invalid.\n * Calling aom_img_alloc_with_border() with a large value of the d_w, d_h, align, size_align, or border parameter may result in integer overflows in the calculations of buffer sizes and offsets and some fields of the returned aom_image_t struct may be invalid." + }, + { + "lang": "es", + "value": "El desbordamiento de enteros en la funci\u00f3n interna de libaom img_alloc_helper puede provocar un desbordamiento del b\u00fafer del mont\u00f3n. Se puede acceder a esta funci\u00f3n a trav\u00e9s de 3 llamadores: * Llamar a aom_img_alloc() con un valor grande del par\u00e1metro d_w, d_h o align puede resultar en desbordamientos de enteros en los c\u00e1lculos de tama\u00f1os y compensaciones del b\u00fafer y algunos campos de la estructura aom_image_t devuelta pueden ser inv\u00e1lido. * Llamar a aom_img_wrap() con un valor grande del par\u00e1metro d_w, d_h o align puede provocar desbordamientos de enteros en los c\u00e1lculos de tama\u00f1os y compensaciones del b\u00fafer y algunos campos de la estructura aom_image_t devuelta pueden no ser v\u00e1lidos. * Llamar a aom_img_alloc_with_border() con un valor grande del par\u00e1metro d_w, d_h, align, size_align o border puede provocar desbordamientos de enteros en los c\u00e1lculos de tama\u00f1os y compensaciones del b\u00fafer y algunos campos de la estructura aom_image_t devuelta pueden no ser v\u00e1lidos." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-51xx/CVE-2024-5179.json b/CVE-2024/CVE-2024-51xx/CVE-2024-5179.json index 4a102413055..1e6eaa53e8a 100644 --- a/CVE-2024/CVE-2024-51xx/CVE-2024-5179.json +++ b/CVE-2024/CVE-2024-51xx/CVE-2024-5179.json @@ -2,12 +2,16 @@ "id": "CVE-2024-5179", "sourceIdentifier": "security@wordfence.com", "published": "2024-06-06T02:15:54.487", - "lastModified": "2024-06-06T02:15:54.487", - "vulnStatus": "Received", + "lastModified": "2024-06-06T14:17:35.017", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", "value": "The Cowidgets \u2013 Elementor Addons plugin for WordPress is vulnerable to Local File Inclusion in all versions up to, and including, 1.1.1 via the 'item_style' and 'style' parameters. This makes it possible for authenticated attackers, with Contributor-level access and above, to include and execute arbitrary files on the server, allowing the execution of any PHP code in those files. This can be used to bypass access controls, obtain sensitive data, or achieve code execution in cases where images and other \u201csafe\u201d file types can be uploaded and included." + }, + { + "lang": "es", + "value": "El complemento Cowidgets \u2013 Elementor Addons para WordPress es vulnerable a la inclusi\u00f3n de archivos locales en todas las versiones hasta la 1.1.1 incluida a trav\u00e9s de los par\u00e1metros 'item_style' y 'style'. Esto hace posible que atacantes autenticados, con acceso de nivel Colaborador y superior, incluyan y ejecuten archivos arbitrarios en el servidor, permitiendo la ejecuci\u00f3n de cualquier c\u00f3digo PHP en esos archivos. Esto se puede utilizar para eludir los controles de acceso, obtener datos confidenciales o lograr la ejecuci\u00f3n de c\u00f3digo en los casos en que se puedan cargar e incluir im\u00e1genes y otros tipos de archivos \"seguros\"." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-51xx/CVE-2024-5184.json b/CVE-2024/CVE-2024-51xx/CVE-2024-5184.json index d44d60b6e44..b68e088b216 100644 --- a/CVE-2024/CVE-2024-51xx/CVE-2024-5184.json +++ b/CVE-2024/CVE-2024-51xx/CVE-2024-5184.json @@ -2,12 +2,16 @@ "id": "CVE-2024-5184", "sourceIdentifier": "disclosure@synopsys.com", "published": "2024-06-05T18:15:11.993", - "lastModified": "2024-06-05T18:15:11.993", - "vulnStatus": "Received", + "lastModified": "2024-06-06T14:17:35.017", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", "value": "The EmailGPT service contains a prompt injection vulnerability.\u00a0The service uses an API service that allows a malicious user to inject a direct prompt and take over the service logic. Attackers can exploit the issue by forcing the AI service to leak the standard hard-coded system prompts and/or execute unwanted prompts.\u00a0When engaging with EmailGPT by submitting a malicious prompt that requests harmful information, the system will respond by providing the requested data. This vulnerability can be exploited by any individual with access to the service." + }, + { + "lang": "es", + "value": "El servicio EmailGPT contiene una vulnerabilidad de inyecci\u00f3n r\u00e1pida. El servicio utiliza un servicio API que permite a un usuario malintencionado inyectar un mensaje directo y hacerse cargo de la l\u00f3gica del servicio. Los atacantes pueden aprovechar el problema obligando al servicio de inteligencia artificial a filtrar los mensajes est\u00e1ndar codificados del sistema y/o ejecutar mensajes no deseados. Al interactuar con EmailGPT enviando un mensaje malicioso que solicita informaci\u00f3n da\u00f1ina, el sistema responder\u00e1 proporcionando los datos solicitados. Esta vulnerabilidad puede ser aprovechada por cualquier persona con acceso al servicio." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-51xx/CVE-2024-5188.json b/CVE-2024/CVE-2024-51xx/CVE-2024-5188.json index a4eb3b88a2c..2287727d7e4 100644 --- a/CVE-2024/CVE-2024-51xx/CVE-2024-5188.json +++ b/CVE-2024/CVE-2024-51xx/CVE-2024-5188.json @@ -2,12 +2,16 @@ "id": "CVE-2024-5188", "sourceIdentifier": "security@wordfence.com", "published": "2024-06-06T11:15:49.057", - "lastModified": "2024-06-06T11:15:49.057", - "vulnStatus": "Received", + "lastModified": "2024-06-06T14:17:35.017", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", "value": "The Essential Addons for Elementor \u2013 Best Elementor Templates, Widgets, Kits & WooCommerce Builders plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'get_manual_calendar_events' function in all versions up to, and including, 5.9.22 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page." + }, + { + "lang": "es", + "value": "Los complementos Essential Addons for Elementor \u2013 Best Elementor Templates, Widgets, Kits & WooCommerce Builders para WordPress son vulnerables a Cross-Site Scripting Almacenado a trav\u00e9s de la funci\u00f3n 'get_manual_calendar_events' en todas las versiones hasta la 5.9.22 incluida debido a una sanitizaci\u00f3n de entrada insuficiente y la salida se escapa. Esto hace posible que atacantes autenticados, con acceso de nivel de Colaborador y superior, inyecten scripts web arbitrarios en p\u00e1ginas que se ejecutar\u00e1n cada vez que un usuario acceda a una p\u00e1gina inyectada." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-52xx/CVE-2024-5221.json b/CVE-2024/CVE-2024-52xx/CVE-2024-5221.json index ab1c39c69fb..1d6d30ad054 100644 --- a/CVE-2024/CVE-2024-52xx/CVE-2024-5221.json +++ b/CVE-2024/CVE-2024-52xx/CVE-2024-5221.json @@ -2,12 +2,16 @@ "id": "CVE-2024-5221", "sourceIdentifier": "security@wordfence.com", "published": "2024-06-06T09:15:14.977", - "lastModified": "2024-06-06T09:15:14.977", - "vulnStatus": "Received", + "lastModified": "2024-06-06T14:17:35.017", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", "value": "The Qi Blocks plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's file uploader in all versions up to, and including, 1.2.9 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Author-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page." + }, + { + "lang": "es", + "value": "El complemento Qi Blocks para WordPress es vulnerable a Cross-Site Scripting Almacenado a trav\u00e9s del cargador de archivos del complemento en todas las versiones hasta la 1.2.9 incluida debido a una sanitizaci\u00f3n de entrada y un escape de salida insuficientes. Esto hace posible que atacantes autenticados, con acceso de nivel de autor y superior, inyecten scripts web arbitrarios en p\u00e1ginas que se ejecutar\u00e1n cada vez que un usuario acceda a una p\u00e1gina inyectada." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-52xx/CVE-2024-5224.json b/CVE-2024/CVE-2024-52xx/CVE-2024-5224.json index d3215d829c7..917de461e72 100644 --- a/CVE-2024/CVE-2024-52xx/CVE-2024-5224.json +++ b/CVE-2024/CVE-2024-52xx/CVE-2024-5224.json @@ -2,12 +2,16 @@ "id": "CVE-2024-5224", "sourceIdentifier": "security@wordfence.com", "published": "2024-06-06T02:15:54.690", - "lastModified": "2024-06-06T02:15:54.690", - "vulnStatus": "Received", + "lastModified": "2024-06-06T14:17:35.017", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", "value": "The Easy Social Like Box \u2013 Popup \u2013 Sidebar Widget plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'cardoza_facebook_like_box' shortcode in all versions up to, and including, 4.0 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page." + }, + { + "lang": "es", + "value": "El complemento Easy Social Like Box \u2013 Popup \u2013 Sidebar Widget para WordPress es vulnerable a Cross-Site Scripting Almacenado a trav\u00e9s del c\u00f3digo corto 'cardoza_facebook_like_box' del complemento en todas las versiones hasta la 4.0 incluida debido a una sanitizaci\u00f3n de entrada insuficiente y a un escape de salida en los atributos proporcionados por el usuario. Esto hace posible que atacantes autenticados, con acceso de nivel de colaborador y superior, inyecten scripts web arbitrarios en p\u00e1ginas que se ejecutar\u00e1n cada vez que un usuario acceda a una p\u00e1gina inyectada." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-52xx/CVE-2024-5259.json b/CVE-2024/CVE-2024-52xx/CVE-2024-5259.json index 5b0f8f96932..948d27aedc9 100644 --- a/CVE-2024/CVE-2024-52xx/CVE-2024-5259.json +++ b/CVE-2024/CVE-2024-52xx/CVE-2024-5259.json @@ -2,12 +2,16 @@ "id": "CVE-2024-5259", "sourceIdentifier": "security@wordfence.com", "published": "2024-06-06T10:15:09.557", - "lastModified": "2024-06-06T10:15:09.557", - "vulnStatus": "Received", + "lastModified": "2024-06-06T14:17:35.017", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", "value": "The MultiVendorX Marketplace \u2013 WooCommerce MultiVendor Marketplace Solution plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the \u2018hover_animation\u2019 parameter in all versions up to, and including, 4.1.11 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page." + }, + { + "lang": "es", + "value": "El complemento MultiVendorX Marketplace \u2013 WooCommerce MultiVendor Marketplace Solution para WordPress es vulnerable a Cross-Site Scripting Almacenado a trav\u00e9s del par\u00e1metro 'hover_animation' en todas las versiones hasta la 4.1.11 incluida debido a una sanitizaci\u00f3n de entrada y un escape de salida insuficientes. Esto hace posible que atacantes autenticados, con acceso de nivel de Colaborador y superior, inyecten scripts web arbitrarios en p\u00e1ginas que se ejecutar\u00e1n cada vez que un usuario acceda a una p\u00e1gina inyectada." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-53xx/CVE-2024-5324.json b/CVE-2024/CVE-2024-53xx/CVE-2024-5324.json index c6e799d87b7..f0aa9fb24d4 100644 --- a/CVE-2024/CVE-2024-53xx/CVE-2024-5324.json +++ b/CVE-2024/CVE-2024-53xx/CVE-2024-5324.json @@ -2,12 +2,16 @@ "id": "CVE-2024-5324", "sourceIdentifier": "security@wordfence.com", "published": "2024-06-06T02:15:54.890", - "lastModified": "2024-06-06T02:15:54.890", - "vulnStatus": "Received", + "lastModified": "2024-06-06T14:17:35.017", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", "value": "The Login/Signup Popup ( Inline Form + Woocommerce ) plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the 'import_settings' function in versions 2.7.1 to 2.7.2. This makes it possible for authenticated attackers, with Subscriber-level access and above, to change arbitrary options on affected sites. This can be used to enable new user registration and set the default role for new users to Administrator." + }, + { + "lang": "es", + "value": "El complemento Login/Signup Popup (Inline Form + Woocommerce) para WordPress es vulnerable a modificaciones no autorizadas de datos debido a una falta de verificaci\u00f3n de capacidad en la funci\u00f3n 'import_settings' en las versiones 2.7.1 a 2.7.2. Esto hace posible que atacantes autenticados, con acceso de nivel de suscriptor y superior, cambien opciones arbitrarias en los sitios afectados. Esto se puede utilizar para habilitar el registro de nuevos usuarios y establecer la funci\u00f3n predeterminada para los nuevos usuarios en Administrador." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-53xx/CVE-2024-5329.json b/CVE-2024/CVE-2024-53xx/CVE-2024-5329.json index 382c0f223d3..38e9cdd5dab 100644 --- a/CVE-2024/CVE-2024-53xx/CVE-2024-5329.json +++ b/CVE-2024/CVE-2024-53xx/CVE-2024-5329.json @@ -2,12 +2,16 @@ "id": "CVE-2024-5329", "sourceIdentifier": "security@wordfence.com", "published": "2024-06-06T10:15:10.493", - "lastModified": "2024-06-06T10:15:10.493", - "vulnStatus": "Received", + "lastModified": "2024-06-06T14:17:35.017", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", "value": "The Unlimited Elements For Elementor (Free Widgets, Addons, Templates) plugin for WordPress is vulnerable to blind SQL Injection via the \u2018data[addonID]\u2019 parameter in all versions up to, and including, 1.5.109 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for authenticated attackers, with Contributor-level access and above, to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database." + }, + { + "lang": "es", + "value": "El complemento Unlimited Elements For Elementor (widgets, complementos y plantillas gratuitos) para WordPress es vulnerable a la inyecci\u00f3n SQL ciega a trav\u00e9s del par\u00e1metro 'data[addonID]' en todas las versiones hasta la 1.5.109 debido a un escape insuficiente en el par\u00e1metro proporcionado por el usuario y a la falta de preparaci\u00f3n suficiente en la consulta SQL existente. Esto hace posible que los atacantes autenticados, con acceso de nivel de colaborador y superior, agreguen consultas SQL adicionales a consultas ya existentes que pueden usarse para extraer informaci\u00f3n confidencial de la base de datos." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-53xx/CVE-2024-5342.json b/CVE-2024/CVE-2024-53xx/CVE-2024-5342.json index 9bcc286f214..157ed082e14 100644 --- a/CVE-2024/CVE-2024-53xx/CVE-2024-5342.json +++ b/CVE-2024/CVE-2024-53xx/CVE-2024-5342.json @@ -2,12 +2,16 @@ "id": "CVE-2024-5342", "sourceIdentifier": "security@wordfence.com", "published": "2024-06-06T02:15:55.087", - "lastModified": "2024-06-06T02:15:55.087", - "vulnStatus": "Received", + "lastModified": "2024-06-06T14:17:35.017", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", "value": "The Simple Image Popup Shortcode plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'sips_popup' shortcode in all versions up to, and including, 1.0 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page." + }, + { + "lang": "es", + "value": "El complemento Simple Image Popup Shortcode para WordPress es vulnerable a Cross-Site Scripting Almacenado a trav\u00e9s del c\u00f3digo abreviado 'sips_popup' del complemento en todas las versiones hasta la 1.0 incluida debido a una sanitizaci\u00f3n de entrada insuficiente y a un escape de salida en los atributos proporcionados por el usuario. Esto hace posible que atacantes autenticados, con acceso de nivel de colaborador y superior, inyecten scripts web arbitrarios en p\u00e1ginas que se ejecutar\u00e1n cada vez que un usuario acceda a una p\u00e1gina inyectada." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-54xx/CVE-2024-5449.json b/CVE-2024/CVE-2024-54xx/CVE-2024-5449.json index 95689bec796..0d6798e3fd0 100644 --- a/CVE-2024/CVE-2024-54xx/CVE-2024-5449.json +++ b/CVE-2024/CVE-2024-54xx/CVE-2024-5449.json @@ -2,12 +2,16 @@ "id": "CVE-2024-5449", "sourceIdentifier": "security@wordfence.com", "published": "2024-06-06T04:15:14.720", - "lastModified": "2024-06-06T04:15:14.720", - "vulnStatus": "Received", + "lastModified": "2024-06-06T14:17:35.017", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", "value": "The WP Dark Mode \u2013 WordPress Dark Mode Plugin for Improved Accessibility, Dark Theme, Night Mode, and Social Sharing plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the wpdm_social_share_save_options function in all versions up to, and including, 5.0.4. This makes it possible for authenticated attackers, with Subscriber-level access and above, to update the plugin's settings." + }, + { + "lang": "es", + "value": "El complemento WP Dark Mode \u2013 WordPress Dark Mode Plugin for Improved Accessibility, Dark Theme, Night Mode, and Social Sharing para WordPress es vulnerable a modificaciones no autorizadas de datos debido a una falta de verificaci\u00f3n de capacidad en la funci\u00f3n wpdm_social_share_save_options en todas las versiones hasta e incluyendo, 5.0.4. Esto hace posible que atacantes autenticados, con acceso de nivel de suscriptor y superior, actualicen la configuraci\u00f3n del complemento." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-54xx/CVE-2024-5459.json b/CVE-2024/CVE-2024-54xx/CVE-2024-5459.json index efce89859da..3cf9aa076e1 100644 --- a/CVE-2024/CVE-2024-54xx/CVE-2024-5459.json +++ b/CVE-2024/CVE-2024-54xx/CVE-2024-5459.json @@ -2,12 +2,16 @@ "id": "CVE-2024-5459", "sourceIdentifier": "security@wordfence.com", "published": "2024-06-05T13:15:13.437", - "lastModified": "2024-06-05T13:15:13.437", - "vulnStatus": "Received", + "lastModified": "2024-06-06T14:17:35.017", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", "value": "The Restaurant Menu and Food Ordering plugin for WordPress is vulnerable to unauthorized creation of data due to a missing capability check on 'add_section', 'add_menu', 'add_menu_item', and 'add_menu_page' functions in all versions up to, and including, 2.4.16. This makes it possible for authenticated attackers, with Subscriber-level access and above, to create menu sections, menus, food items, and new menu pages." + }, + { + "lang": "es", + "value": "El complemento Restaurant Menu and Food Ordering para WordPress es vulnerable a la creaci\u00f3n no autorizada de datos debido a una falta de verificaci\u00f3n de capacidad en las funciones 'add_section', 'add_menu', 'add_menu_item' y 'add_menu_page' en todas las versiones hasta la 2.4.16 incluida. Esto hace posible que atacantes autenticados, con acceso de nivel de suscriptor y superior, creen secciones de men\u00fa, men\u00fas, alimentos y nuevas p\u00e1ginas de men\u00fa." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-54xx/CVE-2024-5489.json b/CVE-2024/CVE-2024-54xx/CVE-2024-5489.json index f6f635a562e..7cda8c5959f 100644 --- a/CVE-2024/CVE-2024-54xx/CVE-2024-5489.json +++ b/CVE-2024/CVE-2024-54xx/CVE-2024-5489.json @@ -2,8 +2,8 @@ "id": "CVE-2024-5489", "sourceIdentifier": "security@wordfence.com", "published": "2024-06-06T12:15:09.227", - "lastModified": "2024-06-06T12:15:09.227", - "vulnStatus": "Received", + "lastModified": "2024-06-06T14:17:35.017", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-56xx/CVE-2024-5615.json b/CVE-2024/CVE-2024-56xx/CVE-2024-5615.json index da9a5058e06..1921ddd9538 100644 --- a/CVE-2024/CVE-2024-56xx/CVE-2024-5615.json +++ b/CVE-2024/CVE-2024-56xx/CVE-2024-5615.json @@ -2,12 +2,16 @@ "id": "CVE-2024-5615", "sourceIdentifier": "security@wordfence.com", "published": "2024-06-06T04:15:15.010", - "lastModified": "2024-06-06T04:15:15.010", - "vulnStatus": "Received", + "lastModified": "2024-06-06T14:17:35.017", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", "value": "The Open Graph plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 1.11.2 via the 'opengraph_default_description' function. This makes it possible for unauthenticated attackers to extract sensitive data including partial content of password-protected blog posts." + }, + { + "lang": "es", + "value": "El complemento Open Graph para WordPress es vulnerable a la exposici\u00f3n de informaci\u00f3n confidencial en todas las versiones hasta la 1.11.2 incluida a trav\u00e9s de la funci\u00f3n 'opengraph_default_description'. Esto hace posible que atacantes no autenticados extraigan datos confidenciales, incluido el contenido parcial de publicaciones de blog protegidas con contrase\u00f1a." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-56xx/CVE-2024-5629.json b/CVE-2024/CVE-2024-56xx/CVE-2024-5629.json index fa8c50ceca8..5cc08796366 100644 --- a/CVE-2024/CVE-2024-56xx/CVE-2024-5629.json +++ b/CVE-2024/CVE-2024-56xx/CVE-2024-5629.json @@ -2,12 +2,16 @@ "id": "CVE-2024-5629", "sourceIdentifier": "cna@mongodb.com", "published": "2024-06-05T15:15:12.737", - "lastModified": "2024-06-05T15:15:12.737", - "vulnStatus": "Received", + "lastModified": "2024-06-06T14:17:35.017", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", "value": "An out-of-bounds read in the 'bson' module of PyMongo 4.6.2 or earlier allows deserialization of malformed BSON provided by a Server to raise an exception which may contain arbitrary application memory." + }, + { + "lang": "es", + "value": "Una lectura fuera de los l\u00edmites en el m\u00f3dulo 'bson' de PyMongo 4.6.2 o anterior permite la deserializaci\u00f3n de BSON mal formado proporcionado por un servidor para generar una excepci\u00f3n que puede contener memoria de aplicaci\u00f3n arbitraria." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-56xx/CVE-2024-5653.json b/CVE-2024/CVE-2024-56xx/CVE-2024-5653.json index b4f10a50cc6..23a7a5f1574 100644 --- a/CVE-2024/CVE-2024-56xx/CVE-2024-5653.json +++ b/CVE-2024/CVE-2024-56xx/CVE-2024-5653.json @@ -2,12 +2,16 @@ "id": "CVE-2024-5653", "sourceIdentifier": "cna@vuldb.com", "published": "2024-06-05T21:15:15.247", - "lastModified": "2024-06-05T21:15:15.247", - "vulnStatus": "Received", + "lastModified": "2024-06-06T14:17:35.017", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", "value": "A vulnerability, which was classified as critical, has been found in Chanjet Smooth T+system 3.5. This issue affects some unknown processing of the file /tplus/UFAQD/keyEdit.aspx. The manipulation of the argument KeyID leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-267185 was assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way." + }, + { + "lang": "es", + "value": "Una vulnerabilidad fue encontrada en Chanjet Smooth T+system 3.5 y clasificada como cr\u00edtica. Este problema afecta un procesamiento desconocido del archivo /tplus/UFAQD/keyEdit.aspx. La manipulaci\u00f3n del argumento KeyID conduce a la inyecci\u00f3n SQL. El ataque puede iniciarse de forma remota. El exploit ha sido divulgado al p\u00fablico y puede utilizarse. A esta vulnerabilidad se le asign\u00f3 el identificador VDB-267185. NOTA: Se contact\u00f3 primeramente con el proveedor sobre esta divulgaci\u00f3n, pero no respondi\u00f3 de ninguna manera." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-56xx/CVE-2024-5656.json b/CVE-2024/CVE-2024-56xx/CVE-2024-5656.json index 7e0331d65c0..fde42fdd3f4 100644 --- a/CVE-2024/CVE-2024-56xx/CVE-2024-5656.json +++ b/CVE-2024/CVE-2024-56xx/CVE-2024-5656.json @@ -2,12 +2,16 @@ "id": "CVE-2024-5656", "sourceIdentifier": "security@wordfence.com", "published": "2024-06-06T05:15:49.377", - "lastModified": "2024-06-06T05:15:49.377", - "vulnStatus": "Received", + "lastModified": "2024-06-06T14:17:35.017", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", "value": "The Google CSE plugin for WordPress is vulnerable to Stored Cross-Site Scripting via admin settings in all versions up to, and including, 1.0.7 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with administrator-level permissions and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. This only affects multi-site installations and installations where unfiltered_html has been disabled." + }, + { + "lang": "es", + "value": "El complemento Google CSE para WordPress es vulnerable a Cross-Site Scripting Almacenado a trav\u00e9s de la configuraci\u00f3n de administrador en todas las versiones hasta la 1.0.7 incluida debido a una sanitizaci\u00f3n de entrada y un escape de salida insuficientes. Esto hace posible que atacantes autenticados, con permisos de nivel de administrador y superiores, inyecten scripts web arbitrarios en p\u00e1ginas que se ejecutar\u00e1n cada vez que un usuario acceda a una p\u00e1gina inyectada. Esto solo afecta a las instalaciones multisitio y a las instalaciones en las que se ha deshabilitado unfiltered_html." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-56xx/CVE-2024-5657.json b/CVE-2024/CVE-2024-56xx/CVE-2024-5657.json index e182035b815..5c5b77e2a05 100644 --- a/CVE-2024/CVE-2024-56xx/CVE-2024-5657.json +++ b/CVE-2024/CVE-2024-56xx/CVE-2024-5657.json @@ -2,12 +2,16 @@ "id": "CVE-2024-5657", "sourceIdentifier": "1e3a9e0f-5156-4bf8-b8a3-cc311bfc0f4a", "published": "2024-06-06T11:15:49.277", - "lastModified": "2024-06-06T11:15:49.277", - "vulnStatus": "Received", + "lastModified": "2024-06-06T14:17:35.017", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", "value": "The CraftCMS plugin Two-Factor Authentication in versions 3.3.1, 3.3.2 and 3.3.3 discloses the password hash of the currently authenticated user after submitting a valid TOTP." + }, + { + "lang": "es", + "value": "El complemento CraftCMS Autenticaci\u00f3n de dos factores en las versiones 3.3.1, 3.3.2 y 3.3.3 revela el hash de contrase\u00f1a del usuario actualmente autenticado despu\u00e9s de enviar un TOTP v\u00e1lido." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-56xx/CVE-2024-5658.json b/CVE-2024/CVE-2024-56xx/CVE-2024-5658.json index 9f54a304dde..cd6da6eb31e 100644 --- a/CVE-2024/CVE-2024-56xx/CVE-2024-5658.json +++ b/CVE-2024/CVE-2024-56xx/CVE-2024-5658.json @@ -2,12 +2,16 @@ "id": "CVE-2024-5658", "sourceIdentifier": "1e3a9e0f-5156-4bf8-b8a3-cc311bfc0f4a", "published": "2024-06-06T11:15:49.573", - "lastModified": "2024-06-06T11:15:49.573", - "vulnStatus": "Received", + "lastModified": "2024-06-06T14:17:35.017", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", "value": "The CraftCMS plugin Two-Factor Authentication through 3.3.3 allows reuse of TOTP tokens multiple times within the validity period." + }, + { + "lang": "es", + "value": "El complemento CraftCMS Autenticaci\u00f3n de dos factores hasta 3.3.3 permite la reutilizaci\u00f3n de tokens TOTP varias veces dentro del per\u00edodo de validez." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-56xx/CVE-2024-5665.json b/CVE-2024/CVE-2024-56xx/CVE-2024-5665.json index b1211b2cdc0..6c52b1b1199 100644 --- a/CVE-2024/CVE-2024-56xx/CVE-2024-5665.json +++ b/CVE-2024/CVE-2024-56xx/CVE-2024-5665.json @@ -2,12 +2,16 @@ "id": "CVE-2024-5665", "sourceIdentifier": "security@wordfence.com", "published": "2024-06-06T08:15:40.153", - "lastModified": "2024-06-06T08:15:40.153", - "vulnStatus": "Received", + "lastModified": "2024-06-06T14:17:35.017", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", "value": "The Login/Signup Popup ( Inline Form + Woocommerce ) plugin for WordPress is vulnerable to unauthorized access of data due to a missing capability check on the \u2018export_settings\u2019 function in versions 2.7.1 to 2.7.2. This makes it possible for authenticated attackers, with Subscriber-level access and above, to read arbitrary options on affected sites." + }, + { + "lang": "es", + "value": "El complemento Login/Signup Popup (Inline Form + Woocommerce) para WordPress es vulnerable al acceso no autorizado a los datos debido a una falta de verificaci\u00f3n de capacidad en la funci\u00f3n 'export_settings' en las versiones 2.7.1 a 2.7.2. Esto hace posible que atacantes autenticados, con acceso a nivel de suscriptor y superior, lean opciones arbitrarias en los sitios afectados." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-56xx/CVE-2024-5673.json b/CVE-2024/CVE-2024-56xx/CVE-2024-5673.json index c0bfef35502..30fd0cbdddc 100644 --- a/CVE-2024/CVE-2024-56xx/CVE-2024-5673.json +++ b/CVE-2024/CVE-2024-56xx/CVE-2024-5673.json @@ -2,12 +2,16 @@ "id": "CVE-2024-5673", "sourceIdentifier": "cve-coordination@incibe.es", "published": "2024-06-06T11:15:49.807", - "lastModified": "2024-06-06T11:15:49.807", - "vulnStatus": "Received", + "lastModified": "2024-06-06T14:17:35.017", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", "value": "Vulnerability in Dulldusk's PHP File Manager affecting version 1.7.8. This vulnerability consists of an XSS through the fm_current_dir parameter of index.php. An attacker could send a specially crafted JavaScript payload to an authenticated user and partially hijack their browser session." + }, + { + "lang": "es", + "value": "Vulnerabilidad en Dulldusk's PHP File Manager que afecta a la versi\u00f3n 1.7.8. Esta vulnerabilidad consiste en un XSS a trav\u00e9s del par\u00e1metro fm_current_dir de index.php. Un atacante podr\u00eda enviar un payload de JavaScript especialmente manipulado a un usuario autenticado y secuestrar parcialmente su sesi\u00f3n de navegador." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-56xx/CVE-2024-5675.json b/CVE-2024/CVE-2024-56xx/CVE-2024-5675.json index db61e91ef29..caaddb9346d 100644 --- a/CVE-2024/CVE-2024-56xx/CVE-2024-5675.json +++ b/CVE-2024/CVE-2024-56xx/CVE-2024-5675.json @@ -2,8 +2,8 @@ "id": "CVE-2024-5675", "sourceIdentifier": "cve-coordination@incibe.es", "published": "2024-06-06T13:15:31.713", - "lastModified": "2024-06-06T13:15:31.713", - "vulnStatus": "Received", + "lastModified": "2024-06-06T14:17:35.017", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-56xx/CVE-2024-5684.json b/CVE-2024/CVE-2024-56xx/CVE-2024-5684.json index fd52d44b9cf..d0fae127369 100644 --- a/CVE-2024/CVE-2024-56xx/CVE-2024-5684.json +++ b/CVE-2024/CVE-2024-56xx/CVE-2024-5684.json @@ -2,8 +2,8 @@ "id": "CVE-2024-5684", "sourceIdentifier": "cve@asrg.io", "published": "2024-06-06T13:15:32.027", - "lastModified": "2024-06-06T13:15:32.027", - "vulnStatus": "Received", + "lastModified": "2024-06-06T14:17:35.017", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/README.md b/README.md index 37ced32a9d1..3ba0a2b39e0 100644 --- a/README.md +++ b/README.md @@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2024-06-06T14:01:03.595100+00:00 +2024-06-06T16:00:44.365720+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2024-06-06T13:59:09.023000+00:00 +2024-06-06T15:24:43.683000+00:00 ``` ### Last Data Feed Release @@ -33,30 +33,46 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### Total Number of included CVEs ```plain -252810 +252812 ``` ### CVEs added in the last Commit -Recently added CVEs: `4` +Recently added CVEs: `2` -- [CVE-2024-36779](CVE-2024/CVE-2024-367xx/CVE-2024-36779.json) (`2024-06-06T13:15:31.590`) -- [CVE-2024-5489](CVE-2024/CVE-2024-54xx/CVE-2024-5489.json) (`2024-06-06T12:15:09.227`) -- [CVE-2024-5675](CVE-2024/CVE-2024-56xx/CVE-2024-5675.json) (`2024-06-06T13:15:31.713`) -- [CVE-2024-5684](CVE-2024/CVE-2024-56xx/CVE-2024-5684.json) (`2024-06-06T13:15:32.027`) +- [CVE-2024-34832](CVE-2024/CVE-2024-348xx/CVE-2024-34832.json) (`2024-06-06T15:15:44.873`) +- [CVE-2024-36106](CVE-2024/CVE-2024-361xx/CVE-2024-36106.json) (`2024-06-06T15:15:45.023`) ### CVEs modified in the last Commit -Recently modified CVEs: `7` +Recently modified CVEs: `101` -- [CVE-2024-1161](CVE-2024/CVE-2024-11xx/CVE-2024-1161.json) (`2024-06-06T13:57:52.483`) -- [CVE-2024-1940](CVE-2024/CVE-2024-19xx/CVE-2024-1940.json) (`2024-06-06T13:59:09.023`) -- [CVE-2024-21512](CVE-2024/CVE-2024-215xx/CVE-2024-21512.json) (`2024-06-06T13:15:31.390`) -- [CVE-2024-35649](CVE-2024/CVE-2024-356xx/CVE-2024-35649.json) (`2024-06-06T13:26:46.537`) -- [CVE-2024-35651](CVE-2024/CVE-2024-356xx/CVE-2024-35651.json) (`2024-06-06T13:31:03.307`) -- [CVE-2024-35652](CVE-2024/CVE-2024-356xx/CVE-2024-35652.json) (`2024-06-06T13:36:05.853`) -- [CVE-2024-35653](CVE-2024/CVE-2024-356xx/CVE-2024-35653.json) (`2024-06-06T13:37:21.420`) +- [CVE-2024-5161](CVE-2024/CVE-2024-51xx/CVE-2024-5161.json) (`2024-06-06T14:17:35.017`) +- [CVE-2024-5162](CVE-2024/CVE-2024-51xx/CVE-2024-5162.json) (`2024-06-06T14:17:35.017`) +- [CVE-2024-5171](CVE-2024/CVE-2024-51xx/CVE-2024-5171.json) (`2024-06-06T14:17:35.017`) +- [CVE-2024-5179](CVE-2024/CVE-2024-51xx/CVE-2024-5179.json) (`2024-06-06T14:17:35.017`) +- [CVE-2024-5184](CVE-2024/CVE-2024-51xx/CVE-2024-5184.json) (`2024-06-06T14:17:35.017`) +- [CVE-2024-5188](CVE-2024/CVE-2024-51xx/CVE-2024-5188.json) (`2024-06-06T14:17:35.017`) +- [CVE-2024-5221](CVE-2024/CVE-2024-52xx/CVE-2024-5221.json) (`2024-06-06T14:17:35.017`) +- [CVE-2024-5224](CVE-2024/CVE-2024-52xx/CVE-2024-5224.json) (`2024-06-06T14:17:35.017`) +- [CVE-2024-5259](CVE-2024/CVE-2024-52xx/CVE-2024-5259.json) (`2024-06-06T14:17:35.017`) +- [CVE-2024-5324](CVE-2024/CVE-2024-53xx/CVE-2024-5324.json) (`2024-06-06T14:17:35.017`) +- [CVE-2024-5329](CVE-2024/CVE-2024-53xx/CVE-2024-5329.json) (`2024-06-06T14:17:35.017`) +- [CVE-2024-5342](CVE-2024/CVE-2024-53xx/CVE-2024-5342.json) (`2024-06-06T14:17:35.017`) +- [CVE-2024-5449](CVE-2024/CVE-2024-54xx/CVE-2024-5449.json) (`2024-06-06T14:17:35.017`) +- [CVE-2024-5459](CVE-2024/CVE-2024-54xx/CVE-2024-5459.json) (`2024-06-06T14:17:35.017`) +- [CVE-2024-5489](CVE-2024/CVE-2024-54xx/CVE-2024-5489.json) (`2024-06-06T14:17:35.017`) +- [CVE-2024-5615](CVE-2024/CVE-2024-56xx/CVE-2024-5615.json) (`2024-06-06T14:17:35.017`) +- [CVE-2024-5629](CVE-2024/CVE-2024-56xx/CVE-2024-5629.json) (`2024-06-06T14:17:35.017`) +- [CVE-2024-5653](CVE-2024/CVE-2024-56xx/CVE-2024-5653.json) (`2024-06-06T14:17:35.017`) +- [CVE-2024-5656](CVE-2024/CVE-2024-56xx/CVE-2024-5656.json) (`2024-06-06T14:17:35.017`) +- [CVE-2024-5657](CVE-2024/CVE-2024-56xx/CVE-2024-5657.json) (`2024-06-06T14:17:35.017`) +- [CVE-2024-5658](CVE-2024/CVE-2024-56xx/CVE-2024-5658.json) (`2024-06-06T14:17:35.017`) +- [CVE-2024-5665](CVE-2024/CVE-2024-56xx/CVE-2024-5665.json) (`2024-06-06T14:17:35.017`) +- [CVE-2024-5673](CVE-2024/CVE-2024-56xx/CVE-2024-5673.json) (`2024-06-06T14:17:35.017`) +- [CVE-2024-5675](CVE-2024/CVE-2024-56xx/CVE-2024-5675.json) (`2024-06-06T14:17:35.017`) +- [CVE-2024-5684](CVE-2024/CVE-2024-56xx/CVE-2024-5684.json) (`2024-06-06T14:17:35.017`) ## Download and Usage diff --git a/_state.csv b/_state.csv index 4599ef7de3e..0b5c3f78aaa 100644 --- a/_state.csv +++ b/_state.csv @@ -236490,8 +236490,8 @@ CVE-2023-49920,0,0,95ad99a89e65f0f1a24a3af0d45eca609ac623e79fcc48b1b462a9d0752f0 CVE-2023-49922,0,0,08399520b800d4342637b05f466e75991a66c2a5dc2abfe822e63cfdfcf3b210,2023-12-19T15:11:00.423000 CVE-2023-49923,0,0,cc20b12cf71fd0ecd04716b866e5798040119e88d225d6a6980fc09c4393a774,2023-12-19T15:07:43.147000 CVE-2023-49926,0,0,38bd34fe4fa68545de39daa7b41edef1740dc88d3d455f834082917fe495eea7,2023-12-06T20:51:09.867000 -CVE-2023-49927,0,0,02ae10293c5b17a771c1e540eb8bb6a8aff25c4572468c632ed0dab08f4068b6,2024-06-05T19:15:11.373000 -CVE-2023-49928,0,0,3e3856bff7e43e4e8eb2959f1b35d920293c1f60be305d6e101f50bd50e67c6f,2024-06-05T19:15:11.617000 +CVE-2023-49927,0,1,c76b78ab3df8bfca3fa3b1a0151355433525e967a4f9ecc9be989c55fb5d76fd,2024-06-06T14:17:35.017000 +CVE-2023-49928,0,1,eb065809f59ca82eb2711ca840c17365af3155a5f1e847398048c7ab67ce7ce7,2024-06-06T14:17:35.017000 CVE-2023-4993,0,0,0aa520989311989f8dda69dcceb7c3644d2c7233075002323e6c9cbcec90f45f,2024-02-15T19:55:09.230000 CVE-2023-49930,0,0,07523e305cb8e7929e98b2c66491bd549b582f37d8c92fffaa782fc8c110df3e,2024-02-29T13:49:47.277000 CVE-2023-49931,0,0,5fab84d32c196d8a81407ce9a907c9aa26c566638a7609e35e4095775febedd0,2024-02-29T13:49:47.277000 @@ -236960,8 +236960,8 @@ CVE-2023-50784,0,0,74da89fd43fc39ff9ac4a72d47f54a9522873ca4eda535551b10a5697b2d2 CVE-2023-50785,0,0,19a66124be4d87742990add6470245b631cddb6338cb34d90239f31e181024ad,2024-01-31T19:16:46.520000 CVE-2023-5079,0,0,08ac6672159acf69cea4333ef87da7c32cafd59333c06b74d19b42baa7321cae,2023-11-22T18:45:31.787000 CVE-2023-5080,0,0,6a142fa9fe4d669768c0073981351de1258996b6b98c92dd7c3370c182d5051a,2024-01-26T16:02:33.997000 -CVE-2023-50803,0,0,ee464e046a44764488a20c515e45d27a540ea8597b6f541991d8c8ac191665e5,2024-06-05T19:15:11.700000 -CVE-2023-50804,0,0,aa215aaebdba0eda4a1cb9ca8373660d28787ca6fd19d51af8caa2c7e5316377,2024-06-05T19:15:11.900000 +CVE-2023-50803,0,1,ff90625138710e750b6f072957b42b89f8b91db8c99c12e6c75296042645b267,2024-06-06T14:17:35.017000 +CVE-2023-50804,0,1,46b0fc2ceaa04534b98e70d7a8ceceee1872ddd1f2fd50d5d71d621f1cc559a9,2024-06-06T14:17:35.017000 CVE-2023-50808,0,0,8c416c054c26be865b4d8688f52c713fbfd724e8770c5464ef0c943565a6db7e,2024-02-13T18:23:02.393000 CVE-2023-5081,0,0,8e24ba17156a8dae7a7282a8cfaf28621f0db12df779ff326aab5dfe7d321c92,2024-01-26T16:02:59.793000 CVE-2023-50811,0,0,e4d21463d439be20b918caa6cf8d80372ece22f0ede7a7aef6305c4c982019a5,2024-04-29T19:52:21.503000 @@ -240007,7 +240007,7 @@ CVE-2023-6951,0,0,57082808549e246805e8d818c1f0b361c71c67cf5af35497921bf2b2066177 CVE-2023-6953,0,0,a4eae60c09f86b37536b6072986cf2d081babcc1cdd107376a1ba9bb2012ddfc,2024-02-22T03:39:59.017000 CVE-2023-6954,0,0,ac4de842b7d6e02ca6bae2b19dfae50dd2ce8593b754802f4ea868ef889692b2,2024-03-13T18:16:18.563000 CVE-2023-6955,0,0,7a80cfe846d10fcea6780b4ae01cccd9684aeac6ad97c3a3415c4424a672be7e,2024-01-18T21:16:42.053000 -CVE-2023-6956,0,0,76acfe238ba96655429066a44b1309fe6b07359501a9406d887b2a8878226c0a,2024-06-06T02:15:52.377000 +CVE-2023-6956,0,1,9dc863532730bb1e0f4fcb9474401e9fff925e6913a766f4a935c17e6f0fbf2f,2024-06-06T14:17:35.017000 CVE-2023-6957,0,0,37410c0850f39e84fec09030c05455cdb6b71566f4cc25e69cd2d10526403569,2024-03-13T18:16:18.563000 CVE-2023-6958,0,0,360585034baba3dde8bbd2b4edec3a36320e0765453af141d99ea526bd11ab61,2024-01-24T20:47:14.900000 CVE-2023-6959,0,0,3499bdabf9b48447bf05d447c84d13393f065f476750e301dd4268abb320735c,2024-02-14T17:01:57.227000 @@ -240017,9 +240017,9 @@ CVE-2023-6962,0,0,7907abbc88b8cf8cf42e1839634495abd8a2527db0e75bbd7b44b875253217 CVE-2023-6963,0,0,231e665c342f619449883ebe35105e509b0377505f1217d0d32ee087d0bccd84,2024-02-14T17:05:16.533000 CVE-2023-6964,0,0,c0ad1bab867494413e0d294a1b4ba02b00c210ce5ff95683c4a7abe457ff5c04,2024-04-10T13:24:00.070000 CVE-2023-6965,0,0,3161cd0566c2f4cc68cf7da3dd5f4f40c9e680a32873d29dc93679331f60d2f6,2024-04-10T13:24:00.070000 -CVE-2023-6966,0,0,02c0dc58b2465eceb4e2384647ce930ddb7198fe4f9eb8569de9c5930ab12885,2024-06-06T02:15:52.607000 +CVE-2023-6966,0,1,bcf085e8ba97a6a396a04e7482e46e02dc0ccf63b96e31d682a3f6b90d0d73a3,2024-06-06T14:17:35.017000 CVE-2023-6967,0,0,e8d18a8c3855ee1871e469a1371a3b540ec58090306c27aae2cc4afa88f127e6,2024-04-10T13:24:00.070000 -CVE-2023-6968,0,0,323d07943f1f9e6176dab362786c10a21d70625d554a5e57789a45afdb45501b,2024-06-06T02:15:52.810000 +CVE-2023-6968,0,1,a4892f6bb229591aa172f21db037813d0473bf4121f2db7a5d23d43a94c4e496,2024-06-06T14:17:35.017000 CVE-2023-6969,0,0,af7f1fac7c19184dd4a346dfa3002dd56ea8bf066ba1c7fbe000ae3b87995670,2024-03-13T18:16:18.563000 CVE-2023-6970,0,0,0f9239778a6c6425e613c8adeae37463c6bdd10b4d16dd22430636510b0bbc4a,2024-01-24T20:48:25.003000 CVE-2023-6971,0,0,87d9fb2fea287f164d59546a7daf008cb5ef4f3ea279e66acf661ea916f01d0f,2023-12-29T06:21:25.760000 @@ -241017,9 +241017,9 @@ CVE-2024-0906,0,0,2cb73c39a2e6fe8ef5222442ed25db55924374576f26540dbc47cb2f830bdc CVE-2024-0907,0,0,736d9a373e93547114922fac343df53c487c280e59648bef9a3cecc6379f908e,2024-02-29T13:49:29.390000 CVE-2024-0908,0,0,a7a4198c8ea4948ff50baff5b198d47526d6c715136e7f4dee3e5232dedc1252,2024-05-02T18:00:37.360000 CVE-2024-0909,0,0,7864e9d833556eb295eb67e87cebb39c8d9b11d41ed1f5327a80b30fe013438c,2024-02-08T20:07:51.410000 -CVE-2024-0910,0,0,61a42a2e5daba771d4e4ca60017e22bda15ffd658049f7614b4fe8b3bcb17506,2024-06-06T02:15:53.010000 +CVE-2024-0910,0,1,25f4d987c3cbfae1fbcba1a35bd39d06c575a6cdd449c84c812fce4124ac1803,2024-06-06T14:17:35.017000 CVE-2024-0911,0,0,5f8186e1a077698fb2fa1e99d28cc6e32ac8b7b7afb205a3a02bc10c8ca698f0,2024-02-14T18:15:48.077000 -CVE-2024-0912,0,0,2b04b96169ee6110d55472434e7f20f6c2bcb38bf7ba23a2f8e7630b42830ffb,2024-06-06T00:15:09.117000 +CVE-2024-0912,0,1,608771984eddf7873765cdb59ba024a5553cf10ced185bb1319aa45c5e96ebb1,2024-06-06T14:17:35.017000 CVE-2024-0913,0,0,cc9dbbd0e1eb40baf69d2dc96719798ae1dcba5ab6fc531754d7fd6a8c7e7f1d,2024-03-29T12:45:02.937000 CVE-2024-0914,0,0,7f22c9d9b9fd7b20f24efa4809ae53ac72b9c07a501ffa9df44287c5ae5e04b9,2024-04-25T17:15:47.280000 CVE-2024-0916,0,0,dbd837ff0d4e90412c881926a28001e8dfd148788fa6a11c24c9e0a7b4b8d813,2024-04-26T12:58:17.720000 @@ -241072,7 +241072,7 @@ CVE-2024-0967,0,0,9fd29428758cc7103c27ff768899ac1f1027dfb29b99d14d825027787d9c2b CVE-2024-0968,0,0,c1945b692689ad2f744c5e2d1d9cf9272687841f9bcfad2dcb0e3ca7e46c8c2d,2024-04-08T11:15:49.610000 CVE-2024-0969,0,0,b70a3e678841d5c3e905a1a4d78ee61bc51fd818aa668b1889827f06c393559b,2024-02-13T19:44:42.503000 CVE-2024-0971,0,0,10711fc5fd019982dab0af4d04cad68f7d925a8d90883facb336aae2462a64e3,2024-03-04T22:58:00.967000 -CVE-2024-0972,0,0,cae7562b1044041c22dfbfcf666bd62e66e570bc3c86a1a1862fa131b7c4242f,2024-06-06T04:15:10.923000 +CVE-2024-0972,0,1,2a8d3a85f6223a6c38540c13150a8805bcc289466ff43a37dc35cbb6bde1ee58,2024-06-06T14:17:35.017000 CVE-2024-0973,0,0,87a64eeb8545d2aed4850999f1a0515438bc623727357d945a5399ed140bee41,2024-03-18T19:40:00.173000 CVE-2024-0975,0,0,727e762e9bf21cc79d41b3d973240a06501d145479fa8fca0d0cfdc6efc382cc,2024-02-28T14:06:45.783000 CVE-2024-0976,0,0,961ca83ff90147b357fdad21a4ce2284407f8f5fed2f5570590409615417a9e7,2024-03-13T18:16:18.563000 @@ -241245,7 +241245,7 @@ CVE-2024-1157,0,0,c47361e1397b03eed535508c9ec506a27255415c46de202eb894db1bcf5cb3 CVE-2024-1158,0,0,995dea25d678a81957450018def2710d810650928efacbe0a4cd027592c45fcd,2024-03-13T18:16:18.563000 CVE-2024-1159,0,0,d0250faef462038e0120055a7c1a6779f3d892d3b8c2c1aaf5ccce9550779728,2024-02-13T14:01:00.987000 CVE-2024-1160,0,0,c82942832f2bf6c3ff41a88402b9dca5a934aaf9eae2920b01f254b593b20d40,2024-02-13T14:01:00.987000 -CVE-2024-1161,0,1,47735b834fdf9e1182a0273ccf52648b0626c5df5fdee235dd1c80bdc67cf573,2024-06-06T13:57:52.483000 +CVE-2024-1161,0,0,47735b834fdf9e1182a0273ccf52648b0626c5df5fdee235dd1c80bdc67cf573,2024-06-06T13:57:52.483000 CVE-2024-1162,0,0,5f2954147a2ad0bfda8f51ea41ff0a374d1e4a1c83a2e06e1e47465f3c5f70b8,2024-02-08T14:22:37.180000 CVE-2024-1163,0,0,c0817c91ae84923184209dc3c71e6209d979097a49b0e341f691fe7193cd2db3,2024-02-29T15:15:07.473000 CVE-2024-1164,0,0,24df03029a70153116b0af902b93010b8aee882bf45630401f0cc4dfe70c3da9,2024-06-05T12:53:50.240000 @@ -241258,7 +241258,7 @@ CVE-2024-1171,0,0,6b87cc518b4ec22739c7ae66eda5d8c3cdf1db30d4dec8967ce2f3257f9601 CVE-2024-1172,0,0,3e0b781542e911cd26b4c5c68b4bb4de402a70910d88a0031456f626a8dc6655,2024-02-29T13:49:29.390000 CVE-2024-1173,0,0,e03ac25b63a360304a72a163d3a27c75f5a0143aea09b3c9bad3038f206cf778,2024-05-02T18:00:37.360000 CVE-2024-1174,0,0,8ef9d5cfead4490d51dff3523dd75d950803ab9cc5257ee13ff11b3323910199,2024-03-01T22:22:25.913000 -CVE-2024-1175,0,0,405a4084bc224c4eb218cf684ed3a379acc9d9f6e52e76e4e05cbf445c433163,2024-06-06T04:15:11.230000 +CVE-2024-1175,0,1,769d37a7de4cd5dcd44cd4caf2bdcd514160ce4844ef654dfa1005546bf3d752,2024-06-06T14:17:35.017000 CVE-2024-1176,0,0,f15000f649fe2b7f5cd356cd32d8300de590418dbba27f06c6203f39d98cc334,2024-03-13T18:16:18.563000 CVE-2024-1177,0,0,2975630ef7f8a77b7876a87ad1120fd917ca4ca2d762e9d0ae54267a750cb012,2024-02-13T14:06:04.817000 CVE-2024-1178,0,0,1d79d2baf0c52babf00a18f14ce6291cb7fba70afba005e5722ced55b2d8af24,2024-03-05T13:41:01.900000 @@ -241284,7 +241284,7 @@ CVE-2024-1198,0,0,50ecf2a3ffe4ac32210b5b9322b94d35e7db110ac617c2e5629cab9d2f807c CVE-2024-1199,0,0,ebcee45e6b8a66ad41bf5912d0c00178ce45000570e9b839ccb55a2c9f9d25b9,2024-05-17T02:35:18.570000 CVE-2024-1200,0,0,34f3327e52268af6598a3ed2e1fe7065c0a7d9b826aea15a86c5ffb2ab105c5b,2024-05-17T02:35:18.673000 CVE-2024-1201,0,0,ff74f12e6106529eaffb9117e70c6f3a10b2b8f55039a19edec6d706d4090510,2024-02-09T19:27:29.517000 -CVE-2024-1202,0,0,fa033807a7fc7ad4337e3825fc922a2a411b5dda216cf35a77858d5617efa427,2024-06-04T19:18:19.990000 +CVE-2024-1202,0,1,f81c25465162623e375dc607a2453a5b326099ddc8d46c3996f7d092705cb575,2024-06-06T14:15:10.523000 CVE-2024-1203,0,0,fb24c2a27e75750ae607c5c83e02745495de5eedde1bafe986263083a797f7c6,2024-03-13T18:16:18.563000 CVE-2024-1204,0,0,9391cba801c85cf15166cddc29feca62acf989ce01f1be05c55056df23b9a5b0,2024-04-15T13:15:31.997000 CVE-2024-1205,0,0,6377c19ab3caf8be6436fa7835c35a6e44c7097e9389c96aef4f0a1e0a912393,2024-03-20T13:00:16.367000 @@ -241922,7 +241922,7 @@ CVE-2024-1935,0,0,a7f7eb7b74a22681adc4071f1d8733546534bbce79c7b6b4b422bbf2e64105 CVE-2024-1936,0,0,7b3792457d5905a49db010db7b736af0c923e8894b5bdd1a854744f20603a17d,2024-03-23T12:15:08.453000 CVE-2024-1938,0,0,24dc90499c61d902708c3560ef4b72bc4a3172c10dbf5b005bb9075fcee4ff4b,2024-03-07T23:15:07.177000 CVE-2024-1939,0,0,862ed503c4cd6a96fea863f557f2290de2baf913d152cc1cb93720d0bf768f1c,2024-03-07T23:15:07.250000 -CVE-2024-1940,0,1,dd619686e16aab03f5e2fc27827d7128cb7778549d96625e82659eeb370b169a,2024-06-06T13:59:09.023000 +CVE-2024-1940,0,0,dd619686e16aab03f5e2fc27827d7128cb7778549d96625e82659eeb370b169a,2024-06-06T13:59:09.023000 CVE-2024-1941,0,0,2deee38d49f655dc85a14e0f9cc0860e5fd72126cfed04ebe024762ac27ab897,2024-03-01T14:04:26.010000 CVE-2024-1942,0,0,980efc55f5eab41cf2c4f30738d9bba260cb2905950fe4e94d5f18fcbaafef3e,2024-02-29T13:49:29.390000 CVE-2024-1943,0,0,12241ffd50e07c2810c1836c3e8f27c317becac2e0f94ec708a8bb306904594f,2024-02-28T14:06:45.783000 @@ -242055,7 +242055,7 @@ CVE-2024-2009,0,0,71459ca320e3ba6a6c331932225f22d43a50dc1f7bd5a77e40fa738dd949ae CVE-2024-2014,0,0,5960248fb8bbf5de40f54070e9a0bf6ae1851c3dbf1c40767a4c730aca696f9f,2024-05-17T02:37:59.427000 CVE-2024-2015,0,0,4f254a79e909247754188d5f89a636bda7a9c29066bee89e20a1544caa513b84,2024-05-17T02:37:59.517000 CVE-2024-2016,0,0,3f768688e7f1c82234f5951f683936f2d0e621b5ebe8941365eb345dccd68eef,2024-06-04T19:19:12.807000 -CVE-2024-2017,0,0,d6d6debe321bcd0c43e6b162f4f1a93fefdd94a6755ed72b1ac2b857513ad9d4,2024-06-06T03:15:08.847000 +CVE-2024-2017,0,1,24736adcfee2c6a9fa5a7400419e89660785aa2184251baa4e82b2244d0b2034,2024-06-06T14:17:35.017000 CVE-2024-2018,0,0,d35c240fd39d286b27481a94e4954ccbe09b47d7acc7f4c0e9843003d15978e5,2024-04-10T13:23:38.787000 CVE-2024-2019,0,0,45ce7201cd9ed050cffb9d1f4dffbf8f77a4772ac3549b7094702a3c37ca6cf3,2024-06-04T16:57:41.053000 CVE-2024-2020,0,0,fae0c240b0782069c1e4908f1890c1c955952a86e3799d8e37b19bbdb6902437,2024-03-13T18:15:58.530000 @@ -242164,8 +242164,8 @@ CVE-2024-2039,0,0,4f1e5a8a814f51edc0234cc5670da2107cc2a93a2ef1eadc628898e3eec44b CVE-2024-20391,0,0,f91eada0700f8cd9f2eaea2b871ba7d3969d87e51919a0eb478edbaaab6f3a9d,2024-05-15T18:35:11.453000 CVE-2024-20392,0,0,ace66ba4c79c3f433832bd6cfa0988701f79a2b5d6c0fbe5016f71bba33a0a9b,2024-05-15T18:35:11.453000 CVE-2024-20394,0,0,d0e5fc3a79dfeb923dc3f02320ce7649899cba8340301b836f168cfe3139baa9,2024-05-15T18:35:11.453000 -CVE-2024-20404,0,0,3be8a5fb7a407a44659c89af082fcdce8a9a794897d08042b1f6cbecb1a9c8cf,2024-06-05T17:15:11.790000 -CVE-2024-20405,0,0,dd4c9595c00fc4f34ee19c4414201b7cc0d96dd05a5ddd2b5f488666eb146228,2024-06-05T17:15:12.107000 +CVE-2024-20404,0,1,9c2467d93b0d83503fd285f19e625a0e373240fa885a5606dad070b87f880216,2024-06-06T14:17:35.017000 +CVE-2024-20405,0,1,149a9c8a606eeeb959182d0091d0a52736f4f99f39d68f4aa5b3e1cc0e82374e,2024-06-06T14:17:35.017000 CVE-2024-2041,0,0,f285d116ebee20fb02fc2c7de4f69fe8567e76fe9eda446fb7969801431b3d7d,2024-05-06T14:15:07.747000 CVE-2024-2042,0,0,67e98a9ddaa62c913ab5a6b6d5de4b0b93571e9b9955fcfed7d86ddfd42889ed,2024-03-17T22:38:29.433000 CVE-2024-2043,0,0,460bc52876e8486363c6c006eee49a91636701c262b01e4f4016a237e9fb24ba,2024-05-02T18:00:37.360000 @@ -242399,7 +242399,7 @@ CVE-2024-20866,0,0,58d3db3c436cd4edcfbee612570f2e77cc32989fe5de8d87bea6a0e56551a CVE-2024-20867,0,0,0e6b5e18a9f86247a6a1090b01cf596581daded4155bfbc09972d6cdc5714d2a,2024-05-07T13:39:32.710000 CVE-2024-20868,0,0,23d1ca1dba7a2ad9810a7b603f4dc59801094aa235b5516b22a3aa3c056e5066,2024-05-07T13:39:32.710000 CVE-2024-20869,0,0,205bcfae207f01cfe9e76e25dfb8358434940d02212d78ea178f2e739e243546,2024-05-07T13:39:32.710000 -CVE-2024-2087,0,0,4bfa6b5320d599c49c5c3edd2f0d2e3ebb8b69d42b842cd5b758a35acbe93a6b,2024-06-05T12:53:50.240000 +CVE-2024-2087,0,1,05e5cf6b26d12dfa478a648c070b3e6cbc1ed723182a139277886620d52214ae,2024-06-06T14:07:14.967000 CVE-2024-20870,0,0,247de2e7cb6c1589f56f1a1780b91fbe4feee02648b4f01650496931882d0b24,2024-05-07T13:39:32.710000 CVE-2024-20871,0,0,4b5019addc2549a143f67a36860f5a0576db2a31268cf1be920df7487aeaeae8,2024-05-07T13:39:32.710000 CVE-2024-20872,0,0,f057840a1e0e70ef07c9af92e3c53b5e58e8fd31ea1c15cdb3fe23cd840da357,2024-05-07T13:39:32.710000 @@ -242858,7 +242858,7 @@ CVE-2024-21508,0,0,cd586a09fe54df7c696f2b333fd5accf6715d2f6a2387d472b5f305a62739 CVE-2024-21509,0,0,b1840eaff4c2213087c96721aaf87fdc6158bea90de6f63bdc95977af5681b08,2024-04-10T13:23:38.787000 CVE-2024-2151,0,0,43d1a22352e1e830bef22f2b8bd5a33b83725db15329384a70a3ee26b8a5da55,2024-05-17T02:38:04.663000 CVE-2024-21511,0,0,d034a9f6c4dcc55a5c4fdcdd7e3a31e0606abc8a26dae5773e22f734aa49e036,2024-04-23T12:52:09.397000 -CVE-2024-21512,0,1,aa76b050e4c93f61d8197b2abb831a8245fb81d83da1143493979b801398852e,2024-06-06T13:15:31.390000 +CVE-2024-21512,0,0,aa76b050e4c93f61d8197b2abb831a8245fb81d83da1143493979b801398852e,2024-06-06T13:15:31.390000 CVE-2024-2152,0,0,3cc97618eb3606d7138054800fe4c9dd1b810706cf75a720e72d22a25acc79fd,2024-05-17T02:38:04.770000 CVE-2024-2153,0,0,32d949763a8c44673b751742c2df9fc58704fdbb602a296b8827b8bcaaa1ed2f,2024-05-17T02:38:04.867000 CVE-2024-2154,0,0,ad1f5443da5008cd83aa665fb0ec59294e0b766fedda6af927118b7949d4ad34,2024-05-17T02:38:04.970000 @@ -243962,7 +243962,7 @@ CVE-2024-23492,0,0,91de285aeba2def4f51072f4040716a212510b247857fcd41eeb21376774f CVE-2024-23493,0,0,91cbf193a715aa0c526237151c4d36164df1ccaf1f366a7cf8bdf551267e12ba,2024-02-29T13:49:29.390000 CVE-2024-23494,0,0,b0caf2085e392cc3bc68ca55116da91c21555e60e2c1de42e26200119e65e7a6,2024-03-22T12:45:36.130000 CVE-2024-23496,0,0,29fb5a470006604a7ccc20bd4735cbedfb46db27a6f8fed0f648af644e626e13,2024-02-26T18:15:07.580000 -CVE-2024-2350,0,0,6c6c739916b3c0f2cf86a7c038db039e78be88c5c4e6e9d4f34144f5c45efec8,2024-06-06T02:15:53.237000 +CVE-2024-2350,0,1,16bc9ead74e715fa72070f0cc0d88701bdb9f0cbc698622077c44670fc69d840,2024-06-06T14:17:35.017000 CVE-2024-23500,0,0,b6642b73aef2e4cdba157839c8fde9771818b399a7f64cf89ea1ee42a68c85c1,2024-03-28T12:42:56.150000 CVE-2024-23501,0,0,b3e85809586c989dd0a69f1f88e280acf334973e6408d57bc052ae66513752bd,2024-02-29T13:49:29.390000 CVE-2024-23502,0,0,8f894ed7c8e8f8359294a01d255055a873ed16e9a79e2948ed3ac6f5d8f8da9f,2024-02-09T14:46:17.743000 @@ -244111,7 +244111,7 @@ CVE-2024-23687,0,0,888c703c13765b4aadeca06043a7e3dd693e14ab5fbf0ceb683a371be24cf CVE-2024-23688,0,0,07f47d429f26f5d25558115321368745a1af1492969a475a8855a8882844f455,2024-01-26T15:53:31.397000 CVE-2024-23689,0,0,d7d4e018343e45ab929852f091e2e71006911f05a5c0cdd59769a6f5a80fdcee,2024-01-26T14:50:45.023000 CVE-2024-2369,0,0,6a36576cd82a0efb1a6cf47fca1f81c4dce9d8f7b0632041d2d5bfbf236b9c0b,2024-04-08T18:15:08.527000 -CVE-2024-23692,0,0,4ced1bd3ad106f26b01ebcb14f0faa80a2617be5b220e6397d753d6040a1ad35,2024-05-31T13:15:09.310000 +CVE-2024-23692,0,1,b3859b9de611033da68be28de176bb6100258312a93359113a32c59c7e3cb5fa,2024-06-06T15:15:43.993000 CVE-2024-2370,0,0,d585ae9ac856bf263bbb5fc87411ce61002d06f83e420348ba9623542805dbad,2024-03-20T16:15:08.270000 CVE-2024-23704,0,0,b6e98937a05e8e3c54df94790ffc1b76a7a7dbc7d0f374847ce3c9bc63a138f4,2024-05-08T13:15:00.690000 CVE-2024-23705,0,0,208f2921dda59fa7b14af1145627e3c7132ea207198825c4a670a9a509059f41,2024-05-08T13:15:00.690000 @@ -244670,9 +244670,9 @@ CVE-2024-24785,0,0,cc84396d420fdc7cd1eec42a211ce9d46ae1b3fd12a46276acc97b91955cf CVE-2024-24786,0,0,2ab5258c4f4b859b5725766bbf2d516fb49e89ad73d54ff6c419a75b61510866,2024-05-01T17:15:29.667000 CVE-2024-24787,0,0,76e1df9de5cb37d65d7a165c67617e8e17ff625b4a4ea63ea7bc61e29e0e59a5,2024-05-08T17:05:24.083000 CVE-2024-24788,0,0,ffbbae0fb4e974bb3dc9845047ec6974c743c206623b4d7c8c59f753b6d67bac,2024-05-08T17:05:24.083000 -CVE-2024-24789,0,0,c5737dc72561d82a69d042a3d4257c797db1c385fb4c59b647f42dc808ed0c61,2024-06-05T16:15:10.470000 +CVE-2024-24789,0,1,93b2da22748f478427051c7cfd7283821b9f714c6485bb3f197915d9d016fc6f,2024-06-06T14:17:35.017000 CVE-2024-2479,0,0,62ab2572f43d54e062a6ec9f07869b63a0bdfad1924b8c09404f39717bdfbd77,2024-05-17T02:38:14.640000 -CVE-2024-24790,0,0,e58eba3ac1189b7092203d5a8813d4addea893edd542c298da54a5a2e06a0aaa,2024-06-05T16:15:10.560000 +CVE-2024-24790,0,1,c8956ea59637f248fbfab4a441772bc39c6cbc79e6a37e25c831989fc9e35aa2,2024-06-06T14:17:35.017000 CVE-2024-24793,0,0,c02d48f5d574325816298b4b1d2848ca92f5dc7aa67a2fd30978e3885630bc1b,2024-02-20T19:50:53.960000 CVE-2024-24794,0,0,0d491c54da3b197a1321ac69102f9de79d058e3462ee7572209ea583555d837a,2024-02-20T19:50:53.960000 CVE-2024-24795,0,0,1c528a1d5677405f95e443ef77785a8eed8eb4708edcbd54697e77c3c9c18f60,2024-05-04T03:15:07.187000 @@ -246550,20 +246550,20 @@ CVE-2024-27355,0,0,f69927749d318ce3d471850deb21bc77767a9c94b5f501be3a1713c1109a5 CVE-2024-27356,0,0,2464f4bdc7cd759969915038df7055199f0bd02c6d9b1a8ceb85c7588507e9ba,2024-02-27T14:20:06.637000 CVE-2024-27359,0,0,d9efe9852d793e4ebe4144d07c8562893d90ae6614ba783353ad624a692629dc,2024-02-26T16:32:25.577000 CVE-2024-2736,0,0,96df463215442710ad6542ed46ad6ce78bf41dcfbe1139413a93d5accfaff739,2024-04-10T13:23:38.787000 -CVE-2024-27370,0,0,95f6a53449246f9defa7884f040b7838ff39bb9469f894ee111157064afe56cc,2024-06-05T19:15:12.473000 -CVE-2024-27371,0,0,20d90fe6dacac4fd9fdb59c5eb650c78a68768582dc0fea8b9529236639f14d5,2024-06-05T19:15:12.687000 -CVE-2024-27372,0,0,43aeb69d56442734f2656b306c2539b11cf58db8b698165000e68b4b2ddf17ab,2024-06-05T19:15:12.893000 -CVE-2024-27373,0,0,e49add2c2599429ca8341007f2c1630c8ae9324a2ffec200a08987b07167695e,2024-06-05T19:15:13.143000 -CVE-2024-27374,0,0,2720cee98108887b457e6d6711d00acd920080e64ce86b636b0a29e8f3b0f96b,2024-06-05T19:15:13.347000 -CVE-2024-27375,0,0,2955aa8968945cddb5f9cad417fa012d25601c43f3b7bc7251b0112c4af59ec1,2024-06-05T19:15:13.557000 -CVE-2024-27376,0,0,b92670a03231b8861423f97ffedb792f7e9a9e1647114ea841a925b4223d5f1b,2024-06-05T19:15:13.767000 -CVE-2024-27377,0,0,50c3873960f41579c2a095c7d051c4d0695a3d082f8a4c3dccd2b8a4789b48d8,2024-06-05T19:15:13.967000 -CVE-2024-27378,0,0,18dd0bf42c8e9d4cb93626fe78bff3620ddcb2f81583d8c4f6416beb0b01a08b,2024-06-05T19:15:14.170000 -CVE-2024-27379,0,0,857953a40abdf6846093c8cdf093970d0b85f435a212c8a283a8d202692933ed,2024-06-05T19:15:14.370000 +CVE-2024-27370,0,1,3d57867e1aea610d8b9625c2237a7b368e8ceddbc4562ce26a69eecdeb3afd96,2024-06-06T14:17:35.017000 +CVE-2024-27371,0,1,7cb4e923072d9e6fde0592b089d10e6ba50212517133935eb1f944e23c8a8824,2024-06-06T14:17:35.017000 +CVE-2024-27372,0,1,8be3ecbf5169d3ae2febc81bfe94f3d76c9f1c24c3db6561dac70dff0d3c27a5,2024-06-06T14:17:35.017000 +CVE-2024-27373,0,1,a70a82503570b1682a5c57b233945ce31511d019b1d3e7e858207d5eb2f088f6,2024-06-06T14:17:35.017000 +CVE-2024-27374,0,1,46870fc1c7ad0a666443bdb8d4605cfa1aa566ad0e0ebcf580450a8c6332b4b5,2024-06-06T14:17:35.017000 +CVE-2024-27375,0,1,230cdadf8acf24d58a4c89b74eb937e16946a3bd62d840c2705e6ead7d545367,2024-06-06T14:17:35.017000 +CVE-2024-27376,0,1,8f6e2dcba177a321627e6d8e78639b752102783f4e6f107650134095a4f45f5d,2024-06-06T14:17:35.017000 +CVE-2024-27377,0,1,ebb5186e7a5302bac54580637baf9c7843a83f0358657e6926157adac7ffea30,2024-06-06T14:17:35.017000 +CVE-2024-27378,0,1,e01ddfdf51e2e83a0699e0c20470d2f38e6867dcecd8af12f4eb81d8342329d2,2024-06-06T14:17:35.017000 +CVE-2024-27379,0,1,84bc3b48e02a2a3933c3012ccad95c473488deb1b13f73fbed8be0719ac81ee3,2024-06-06T14:17:35.017000 CVE-2024-2738,0,0,6819e123d1b9c89828d0cda96e445b3a2cfd159134a3eaf302a0f1f8d1cb625a,2024-04-10T13:23:38.787000 -CVE-2024-27380,0,0,70adf6d3ad8c37dc852c8381c4eb7465729dfa09236032917ac699cc98cd881a,2024-06-05T19:15:14.570000 -CVE-2024-27381,0,0,e74c355e0e6bbc03750dd0c1d2d171620791e530b785403038f6eddb05d44565,2024-06-05T19:15:14.760000 -CVE-2024-27382,0,0,c2354c98f1e5897d7c2ccdf0d09f6564ce1f0d273b57835ef08991960b90e233,2024-06-05T19:15:14.957000 +CVE-2024-27380,0,1,db16fe4e66f3e54b371caa184151d2ab7d0523962e3ac25e8c6085a818b581b6,2024-06-06T14:17:35.017000 +CVE-2024-27381,0,1,5fa44c1c2a9f789275d963e252bbb1cf4997eaafea3d25f6fe3354704f27f75b,2024-06-06T14:17:35.017000 +CVE-2024-27382,0,1,7952a4757a540edbdb9de8cd27206d65034ef51c4ec4c26f43b9e746ab6965f8,2024-06-06T14:17:35.017000 CVE-2024-27388,0,0,fcbb53a4e007c6e5d78dd0959d626db1f3e777abf71fb992540de2781ae3140b,2024-05-01T19:50:25.633000 CVE-2024-27389,0,0,84e8f98d7373f585e11251f165e8a3d401d2ea257f6532e4408157e8a9f0a9ee,2024-05-01T19:50:25.633000 CVE-2024-2739,0,0,01f4358b131d63aa6c4b85d098b6d7ce2028f8434e497e05210c81006774d4d9,2024-04-15T13:15:31.997000 @@ -247315,7 +247315,7 @@ CVE-2024-2879,0,0,b3cb63a21efa9503ae3e8fbd2c3fbecce8466a6f50871d6397f8e38479a77e CVE-2024-28793,0,0,ff5a88e2016bb6525e121a3971e1512b066d1e7a9c1c05ed8e7fab11d718580d,2024-05-28T12:39:28.377000 CVE-2024-28815,0,0,e7bdcd0ac6977f9c059dbb312ad54d9a388fdc8f6a137aa4ed5f32fc20fa20fd,2024-04-30T07:15:48.897000 CVE-2024-28816,0,0,4b9f923b99f4095b32672af0003c81bae1f3b3136774827600fae7accfedcfe3,2024-03-11T12:47:42.653000 -CVE-2024-28818,0,0,82f65ace9670a01dc1640c6eceae9827c84484dceb43ea886d5d9116c27a4964,2024-06-05T19:15:15.150000 +CVE-2024-28818,0,1,021fe833584ef25f978a754e287a1b42e89b5ae6876b747459ae20b60addcdf9,2024-06-06T14:17:35.017000 CVE-2024-28823,0,0,d5aa89b5cdac6c3847ac374cba2a65b191e57c43dc618aabb1da571ab5b5e9dc,2024-03-11T12:47:42.653000 CVE-2024-28824,0,0,5a9476ae0fdb0520e3a986c832f5f9e27a50da5cb3aa11e06910544296f0e530,2024-03-22T12:45:36.130000 CVE-2024-28825,0,0,9e6f2228e06896e59bb560ffc81c60a9a09c25eeaded2122eaaaf9d670949d13,2024-04-24T13:39:42.883000 @@ -247430,7 +247430,7 @@ CVE-2024-28978,0,0,c1808ba5cc7d394021a34c4436b18922fdfd0f689f028622205841f891e3f CVE-2024-28979,0,0,1e8150fa51d059ee46f9ef1bfb23a0a517c44eb200b6531263fa54ebf9d48ec5,2024-05-23T19:05:51.923000 CVE-2024-2898,0,0,76a38588eeca70ecb25472849eb8998ee4d4f74eb5e3aa36fdb6d66de01eda42,2024-05-17T02:38:36.130000 CVE-2024-2899,0,0,4aa5ec01ca1d3b835467a231d9836714c4e4cef27dea7210f2a97d49ae8b91f5,2024-05-17T02:38:36.220000 -CVE-2024-28995,0,0,da1d82b9c77f90f1256e51ac3378aa8311eab59b2164a48e716d00e906e66feb,2024-06-06T09:15:14.167000 +CVE-2024-28995,0,1,eb96d6d7ff63bb13920b6a9749bfbe3749162de4c37f0a2e74ef56633fdd61ab,2024-06-06T14:17:35.017000 CVE-2024-28996,0,0,c091e9a41f5048ec29426a8e9b82eb061ea03bae0c2e3066189331f2e0b77a05,2024-06-04T16:57:41.053000 CVE-2024-28999,0,0,550b4a9d771a3e3d1ca73c8358889ff343556390202bfeba27bac528e16324e4,2024-06-04T16:57:41.053000 CVE-2024-2900,0,0,a407b1858236d84c8f3b34f7314a68104abd6fc43c858c1e78b5ff160bd6a726,2024-05-17T02:38:36.333000 @@ -247617,7 +247617,7 @@ CVE-2024-29216,0,0,59c06798795d05e391cdd301154441d31362295e800c3b46a2b7bd83a3e2d CVE-2024-29217,0,0,692aac671426b5dcedcd56fb24933db6c5a96f7af1aee50fe065d75a9d19b5cb,2024-05-01T17:15:31.350000 CVE-2024-29218,0,0,671653d28334eb1b29de221436a2464edfec5acf42885adc45ca7b102375c361,2024-04-15T13:15:31.997000 CVE-2024-29219,0,0,4481109cba1c43e8c57c43af416b7ffd0dce43a288900ab9b937cea0ab69c2a2,2024-04-15T13:15:31.997000 -CVE-2024-2922,0,0,69b366d29199463eabfeca4ec4865d003c6d5f3c30ef5f39afaaa5a61f259e0d,2024-06-06T04:15:11.673000 +CVE-2024-2922,0,1,3cb36cd942c44fb4bc05e47c0e65638d7b7319c1bc41952ab87c0a978527a366,2024-06-06T14:17:35.017000 CVE-2024-29220,0,0,1b65a8d6c350605472de3d4a64b6e0ccc843853d705695d9c55dd012b24dc815,2024-04-11T12:47:44.137000 CVE-2024-29221,0,0,5b9bc923efd821827e4ccdc23f19bce61ce6bc08809d3d2c26ee85f72d1e2770,2024-04-05T12:40:52.763000 CVE-2024-29225,0,0,a6cc20b79c51246e02458e8af6d1ba48add09d07b0dc74d5ff710efa51c99a1a,2024-04-04T12:48:41.700000 @@ -248388,7 +248388,7 @@ CVE-2024-30486,0,0,3b668ae931cda4b6a387bfa69ea17dffa696817ef5a0dd2b2ba0b8d1d89d0 CVE-2024-30487,0,0,8478a9894c02433324d52a7694bbe43e86c58bc36ce6feb0280d7b18225d7d5b,2024-04-01T01:12:59.077000 CVE-2024-30488,0,0,9fdeb2b805850984cf4d5d3f20362f356c5feecfdc17015a244efcf21ce430a4,2024-04-01T01:12:59.077000 CVE-2024-30489,0,0,a540270477b853fde36fa10dfe995d2d2e2733bc4b87077bcb9c4c6ebae67f39,2024-04-01T01:12:59.077000 -CVE-2024-3049,0,0,27ebc60e7c2d11abe1a5ad0068b64b07a7812b6334ebdab9632b2490d1afb4b4,2024-06-06T11:15:48.553000 +CVE-2024-3049,0,1,d4abcbb27b0978ee27e6e1e798566bdd3820959a1a029188fcb85adf872b5a9c,2024-06-06T14:17:35.017000 CVE-2024-30490,0,0,90b7ec0455290f5d2e36c376f09e8aa64ea00d396ba819e3726d0e96e7b15d7a,2024-04-01T01:12:59.077000 CVE-2024-30491,0,0,b49d75f845cb12239329721ac75b384e508f42c19c755d45b7137bd1b7ebec86,2024-04-01T01:12:59.077000 CVE-2024-30492,0,0,d40dabecb8ac11d6b8ece8b02edecd34ab567f2bff5c23fac9f75367d1b0fc90,2024-04-01T01:12:59.077000 @@ -250673,7 +250673,7 @@ CVE-2024-3464,0,0,e1a6a35891c3c38cf23929aa88b7dd55b7b7561b2b012478c752dccfb02717 CVE-2024-3465,0,0,cc7142bc1559aee30fd4240971422ac4fbc49f323b8e88820a6b582cede6d695,2024-05-17T02:39:57.623000 CVE-2024-3466,0,0,f437d504c2a4423db5fc4e7046f91c0c20332b67987c55770e18cacdf9497a6d,2024-05-17T02:39:57.717000 CVE-2024-34687,0,0,4ff76c42affc0861ee718b9e208e6eefdbf0a3ab639bfa3166f3943bc94075ba,2024-05-14T19:17:55.627000 -CVE-2024-3469,0,0,34074f235b8e0115e4ea41ac7557fdaa2d21b81d3a703439a694c69f2ba03a04,2024-06-05T13:15:12.707000 +CVE-2024-3469,0,1,d1288c39f8f011625990493f472d2caae53932004068c7cd0aeac85640cf553f,2024-06-06T14:17:35.017000 CVE-2024-34695,0,0,d5ed5d99c8f0d08b73ea3cb249327295e787f14594542dd2f27279ab9312830c,2024-05-14T16:12:23.490000 CVE-2024-34697,0,0,95295a45851b4a50f600527e364638272a5d24a08a1ec02edb19abea712755b2,2024-05-14T16:12:23.490000 CVE-2024-34698,0,0,10e59d69dc4df1155204551f8483405755bab4be109bdea52b3a75e369d53b1b,2024-05-14T16:12:23.490000 @@ -250749,6 +250749,7 @@ CVE-2024-34825,0,0,da4c9ce510f00e0a854bf235f0a803bebe7336aa5abd8cd7cbf31f6e4dc54 CVE-2024-34827,0,0,967f2d32afb0b2dfaa20d1f45e0df3e21389d96466bc0e3abad227fc206b40cd,2024-05-14T16:12:23.490000 CVE-2024-34828,0,0,7605aa3bedb5fc5d707a6b481c1cc91c79f17545427a53b88cbe66a14822c076,2024-05-14T16:12:23.490000 CVE-2024-3483,0,0,f497cc0f9f7ed97ac693fa9f9e6ee9a3d8c1c00c57913a6c4140ae3ca9834d87,2024-05-15T18:35:11.453000 +CVE-2024-34832,1,1,442c1fbf0bc603328a0a57cbf648d0a0d68f02e82c6b87be4014b5ad8bbdee38,2024-06-06T15:15:44.873000 CVE-2024-3484,0,0,77b96fc6faa401f39469e2fe8fb49203604ce091be4caf53c785afcea370dbf3,2024-05-15T18:35:11.453000 CVE-2024-3485,0,0,e8641b5678d7bfcdabd6408cac9c77af492485e4b29f63fc9dc56af18234e19a,2024-05-15T18:35:11.453000 CVE-2024-34852,0,0,a2b46166918037a96ec96511b7428ab937c28a5b7c34beca90d286eb089cfe06,2024-05-29T13:02:09.280000 @@ -251044,11 +251045,11 @@ CVE-2024-35643,0,0,9a85f980733a203d1afe2125556ca8fd446a55a9337a6390df2cb9ebd797d CVE-2024-35645,0,0,4890cccefabc4d0ca257524f83767bb085050fd6c5aa3f9f764f54694fba20ff,2024-06-03T14:46:24.250000 CVE-2024-35646,0,0,0e09ad267a508b8a536900d74395f7d6fd0b87a4648f067a40bf0167f0c61ae4,2024-06-03T14:46:24.250000 CVE-2024-35647,0,0,dd07a9e9a3804b0b3fdbbe9e6cdd58e439fe4bcd9c7b53cb07e789eae1ef1bd7,2024-06-03T14:46:24.250000 -CVE-2024-35649,0,1,d2b425bcfde98a2966defe9ae6862e0c80d81675a5706c35a1abbc9f35d7c710,2024-06-06T13:26:46.537000 +CVE-2024-35649,0,0,d2b425bcfde98a2966defe9ae6862e0c80d81675a5706c35a1abbc9f35d7c710,2024-06-06T13:26:46.537000 CVE-2024-3565,0,0,a4b6a30a1c15667775d02efa34a8d23be7f17c664853400b6c8d4dfd523ae02d,2024-06-03T14:46:24.250000 -CVE-2024-35651,0,1,c7cb64a650c120e950c2ebdd125d00702e2f5a45bd11dc5dcd4c353649900947,2024-06-06T13:31:03.307000 -CVE-2024-35652,0,1,9510ec3ad0224331e475c18e35d7d417da7a9c92aa8f4cfe1b6338dfa113c106,2024-06-06T13:36:05.853000 -CVE-2024-35653,0,1,4b4970e5c1ab1eb20df6ebb598ecfea858a4722a1a783fe88469bdbb9ecad5dd,2024-06-06T13:37:21.420000 +CVE-2024-35651,0,0,c7cb64a650c120e950c2ebdd125d00702e2f5a45bd11dc5dcd4c353649900947,2024-06-06T13:31:03.307000 +CVE-2024-35652,0,0,9510ec3ad0224331e475c18e35d7d417da7a9c92aa8f4cfe1b6338dfa113c106,2024-06-06T13:36:05.853000 +CVE-2024-35653,0,0,4b4970e5c1ab1eb20df6ebb598ecfea858a4722a1a783fe88469bdbb9ecad5dd,2024-06-06T13:37:21.420000 CVE-2024-35654,0,0,3cac475a93442101684fae84c2c521be626ce332985f59ed92e31d95d1644e3b,2024-06-04T16:57:41.053000 CVE-2024-35655,0,0,601e442a18c4da5a8735e92d8f9fc475270b1e233cb1966c02ba478a71ba1edc,2024-06-05T20:26:14.720000 CVE-2024-3566,0,0,e417ef1ceca67d3a9a8ba800520d4a9974bcf4eba2e3e6325dafdfbfe6af8d6b,2024-04-10T19:49:51.183000 @@ -251058,8 +251059,8 @@ CVE-2024-35668,0,0,e28d20c2d98d1a373b031e13d9cabba896a6e448df914921afbea8281107f CVE-2024-3567,0,0,20839fe5058050b88e3eab46e96c3f4983a4ed5d3b8a31d734ec6d77ca524853,2024-04-10T19:49:51.183000 CVE-2024-35670,0,0,73750f9851edcb4e69a614add6516a80303684a17d124f9c4de5d312adb907f3,2024-06-05T12:53:50.240000 CVE-2024-35672,0,0,55d6b261119374cd3faa4eaa39d96a050af2ec6d719a35d44d5d1508f743f033,2024-06-05T12:53:50.240000 -CVE-2024-35673,0,0,2e8c3f64bf2e6d5e2d675eb38d5d89a71a870fd5239b7d085ea360ca81fa791f,2024-06-05T14:15:13.680000 -CVE-2024-35674,0,0,85f3ddb7ee8ec56e247c99da30256ac17673ec1d1e4ad7631074b8570bb8e55a,2024-06-05T17:15:13.543000 +CVE-2024-35673,0,1,b2fbe24f0db2be82a21d56e6af9fa939a75372c8c56128cfd1a449a3505ad62c,2024-06-06T14:17:35.017000 +CVE-2024-35674,0,1,61cb77c7b559c0aea326b97e0a24dca407c217fd649698447cd12a1a2e660866,2024-06-06T14:17:35.017000 CVE-2024-3568,0,0,573133d2a7191a46b0975280ef7162f7787321191e0ad33f2c4c70c7e8d9c3f5,2024-04-10T19:49:51.183000 CVE-2024-3569,0,0,1713859ca5226d02b2325e4195882c2c405d5fa4ce56952eae5e58bc3dad6bde,2024-04-10T19:49:51.183000 CVE-2024-3570,0,0,df44050a6262c2969e286478660750960763247b24187b06070fe7dd6b9e3002,2024-04-10T19:49:51.183000 @@ -251362,6 +251363,7 @@ CVE-2024-36081,0,0,d4f0cf242ca757b4f303ae5368ae2b4579e3452ad04759648a40396f5d2c3 CVE-2024-3609,0,0,ed7edf68142e8387ad834c19a7338682e57310d52666dd6c703556dcd2e4f649,2024-05-17T18:36:05.263000 CVE-2024-36104,0,0,d791090d63e65d841ba8ee5d3ad2141bb986481787582de2f23200ce4780a74f,2024-06-04T16:57:41.053000 CVE-2024-36105,0,0,4b0fed9ed2485549411fb1c0dd5b530df11ef2b63c1b154f3cb43f2c66dea72a,2024-05-28T12:39:28.377000 +CVE-2024-36106,1,1,c85ddb4d7775f0329c0634c88aaccae0158c08f5ddf89531bfeafaa54770278a,2024-06-06T15:15:45.023000 CVE-2024-36107,0,0,3822d3240549b49c3e2603142bff0a390b754055e04abd1375217acc3ea4ac02,2024-05-29T13:02:09.280000 CVE-2024-36108,0,0,1712acab6fb5bcc0e89c140fd4bc7f953ab5cd6a3b2df721c59b01e1212e5edf,2024-05-31T19:14:47.793000 CVE-2024-36109,0,0,8442e3c76593510de83882ecc41707b0c4728f640a49fe701ed403b144ef7ca0,2024-05-29T13:02:09.280000 @@ -251378,7 +251380,7 @@ CVE-2024-36123,0,0,cf850cc9d9baa3221d632583c4ffa7e41c6f0a00f79ee46cdb95d9dd23563 CVE-2024-36124,0,0,8957b645faef2eaa32b5248d8ccada6df58d8f1b93548954f7e7f9498df53590,2024-06-03T19:23:17.807000 CVE-2024-36127,0,0,1861d6cbc85f6c0cea91586022e6f94d8ab5dbffdf653d93e569c051e5a17664,2024-06-03T19:23:17.807000 CVE-2024-36128,0,0,b0a50f9d9d12005b089b632e55813c75e34af2c2ed592f6047cfc620fd27bf2a,2024-06-03T19:23:17.807000 -CVE-2024-36129,0,0,cffbea256b4935a70af24eaeb016699abc56e94e51556ddb62d9cea62ab1430e,2024-06-05T18:15:10.833000 +CVE-2024-36129,0,1,892155cf051d2e12d47123c2eb7308e35f61744f321e64d126bb0087276e154c,2024-06-06T14:17:35.017000 CVE-2024-3613,0,0,d7eb1ddde521e54e1fe9acae408bd9221d7036e0a03927b308a853106c490093,2024-05-17T02:40:01.607000 CVE-2024-3614,0,0,d78c7f8216ffec54e56d2e3340bc15a51d2b21c733cf27c47b22562ec2fb117c,2024-05-17T02:40:01.707000 CVE-2024-3615,0,0,64005ae223a0e1b13c6b7f52d8fc0c9c88326db37e9d2598154be43e0038ff8a,2024-04-19T13:10:25.637000 @@ -251428,8 +251430,8 @@ CVE-2024-36389,0,0,b7f3ae9ec80f48852fb2df638815a295e32fee22ddec84c26d88db15c966c CVE-2024-36390,0,0,b28e05065e61bd7a9bb35d69c3db1c5b9fc640899f1d11e151111ef78e00d787,2024-06-03T14:46:24.250000 CVE-2024-36391,0,0,912b7ffb7dfb6dfb15f70d7bea2f2a5105573bbf43d36923ced033abcc265d3d,2024-06-03T14:46:24.250000 CVE-2024-36392,0,0,7b41af317d30bf0386ed81503024aa5664470441af94b00ab8ae6362055ee697,2024-06-03T14:46:24.250000 -CVE-2024-36393,0,0,e308f789edbc27fa9521680f4243d0e3c8481dee040c431cbb0ba760e9f2ba9e,2024-06-06T09:15:14.420000 -CVE-2024-36394,0,0,5435cd5a5ef31499c04ac9bc5a3f98810beccd17e54679b087786cb7f412a1e2,2024-06-06T09:15:14.660000 +CVE-2024-36393,0,1,dad9a318c2494ff47436b4a590250d168d0c818dc3eda817c0e3ba447f985b67,2024-06-06T14:17:35.017000 +CVE-2024-36394,0,1,0836b42c2ed8b0b26ece5429f06f273f62ad8b7051c36ce9a182ada775da7277,2024-06-06T14:17:35.017000 CVE-2024-3640,0,0,abbf5a33cbca708fe19710dda7a796491ae1d1614e9cd03f43d6cddef8b09500,2024-05-17T18:36:31.297000 CVE-2024-36400,0,0,adfa37aa9ee5bdbeb119043e05eb6c3cae4bca70563f93beec768283d523dfe5,2024-06-04T16:57:41.053000 CVE-2024-3641,0,0,c281de95cce057acff2793609e8f843aad579a2f0257c0c2e0b6442733e87b14,2024-05-16T13:03:05.353000 @@ -251449,10 +251451,10 @@ CVE-2024-3649,0,0,969867829e20da4acc88ade671a27808c021dddbe3e27e051d2004e683670e CVE-2024-3650,0,0,e078ac649d7d0d133fe9598e10336739bc9d365236ed72d408805e3868c3d439,2024-05-02T18:00:37.360000 CVE-2024-3652,0,0,455dabb71414a7592172807b25da69c5818ecc78456d9f87c63904d4c0988a33,2024-05-01T17:15:37.793000 CVE-2024-3654,0,0,954800a828ed246c147def14a6599156bd18a3e2cc72072dd62b0ab02b4bbf53,2024-04-19T16:19:49.043000 -CVE-2024-36547,0,0,f11c5682e38aa4b915e6209ff5412137336f1079a94c10e2a130c9ed57bd9f23,2024-06-04T16:57:41.053000 -CVE-2024-36548,0,0,c18fdef44a9db7a23e310540c221679551672dcfd432905f97359460a94e611a,2024-06-04T16:57:41.053000 -CVE-2024-36549,0,0,f0f7b276f6566cdfba9e6280fc5f8be128d5156634fd9dfedad0aa0c00111410,2024-06-04T16:57:41.053000 -CVE-2024-36550,0,0,62bd414e23e0128ac5a34502a53e11b8c0cf2afe8917899e71dfa6f294422152,2024-06-04T16:57:41.053000 +CVE-2024-36547,0,1,6660ddee6e567c7988e43d4b24008e0896770307b9894b7b829c762e8a195005,2024-06-06T15:16:11.897000 +CVE-2024-36548,0,1,9d28d8e8972db5bd27a8a65faaafcca56f3bdf2175ddc670e3a757d6c577d105,2024-06-06T15:24:02.577000 +CVE-2024-36549,0,1,ede738893685493385854bf4f5b6680c7d976cf01bd2e0f64b85833020e8a996,2024-06-06T15:24:35.210000 +CVE-2024-36550,0,1,affd201d52525b08fe9dc0ac43cf536ec50f780fc23bf861db62d86c798cfc86,2024-06-06T15:24:43.683000 CVE-2024-36568,0,0,da1ad45e35e3ebd045cc1d605f7bb2f31fdab5434a117b3c1ca7da7d4ea95450,2024-06-03T14:46:24.250000 CVE-2024-36569,0,0,6cb2ef882f018dab4ea69f61d1bc370bfefe1380a18e6327825251eff3623fff,2024-06-03T14:46:24.250000 CVE-2024-3657,0,0,b3ddc632f51ff9b9080079d8b3c5a6b7a01651c0414e2741d5c53ebe23c9db3e,2024-05-28T14:59:09.827000 @@ -251465,11 +251467,11 @@ CVE-2024-3663,0,0,d70e03397b7b1ab439d27e0f0ba070e0cb9801b42863e8c396c4da4f0822fd CVE-2024-3664,0,0,afb9452532a9b46276f3e123567931f2d9b14afd62c66b887c9d751f65c725bc,2024-04-23T12:52:09.397000 CVE-2024-3665,0,0,22dbbd6c0bec2b9f433688ae97b549cd541e7f2d387c3796dd32246c851476cf,2024-04-23T12:52:09.397000 CVE-2024-3666,0,0,07796934f1ac3c83f9027f055a741df04ffd0473d9b06f5fc0b3f20da9ef9091,2024-05-22T12:46:53.887000 -CVE-2024-36667,0,0,38368a1fcc2a641ba5eec757051c966ae8bed5860fc1cfafd14da1c516df347c,2024-06-05T19:15:15.687000 -CVE-2024-36668,0,0,3f82cd17ba4cebc844ff5228080dfa8f27cb2ef17c19c43fd7fbedc77706d721,2024-06-05T19:15:15.777000 -CVE-2024-36669,0,0,ff317fe1af1a95f7ab3caa88f91c78054eaaebde81840dc324d4d5784e665b52,2024-06-05T19:15:15.860000 -CVE-2024-3667,0,0,590dc761d35bdeb78cb60dee51d43d803446d23bf32a862973772b7155719968,2024-06-05T12:53:50.240000 -CVE-2024-36670,0,0,af8169af5577314761861fff273e465e5f6107dda3ad0313e7041bcd9b3fc609,2024-06-05T19:15:15.950000 +CVE-2024-36667,0,1,f633a9fdea8a298fa142bef239ca89fb8be18cac4ae9173c3d76b2a6be44183b,2024-06-06T14:17:35.017000 +CVE-2024-36668,0,1,4cedc166eb0bd391c040c5196589bbd754cdd7e90f4a579e8e01dedf42e83ad7,2024-06-06T14:17:35.017000 +CVE-2024-36669,0,1,c31d1b743dee91f6b455e92a9273f2707d1346a2a80737e220c6a9249b386f62,2024-06-06T14:17:35.017000 +CVE-2024-3667,0,1,b8aaa7837b9708a00cf0b0659c0d909767a8ae9572c9d0bb67e828adada10c4b,2024-06-06T14:07:44.473000 +CVE-2024-36670,0,1,fdafe9c66140e5a2018ce6b3a330b135107007226ee1c746bda0de7803753e50,2024-06-06T14:17:35.017000 CVE-2024-36674,0,0,64a41fc68368d9bae481254f7aef4332736d337353346af2d18107a9908d2826,2024-06-03T19:23:17.807000 CVE-2024-36675,0,0,5c3f7593516cde09c4cffe5f588ba2d6bd558d4e765f212515d844554079cc61,2024-06-05T12:53:50.240000 CVE-2024-3670,0,0,c82d0130c8edc16344a78447d1514c5ffe18d421cd344e5799606a7730bedf8c,2024-05-02T18:00:37.360000 @@ -251481,7 +251483,7 @@ CVE-2024-3674,0,0,f0fad7a5bda9e15945dde9432e31b1e267affdedcf2e230210a842bcd40fa4 CVE-2024-3675,0,0,00d1234baac079cf413c516618dd0fc3e7ad5eadaec0ab200df9e28f23d3ebe2,2024-05-02T18:00:37.360000 CVE-2024-3676,0,0,afffaa433a0219105ab8db2fc3cac72e262ac997e8b5329e1239c5388df90382,2024-05-14T19:17:55.627000 CVE-2024-3677,0,0,822256c91d31044a13b27ee319c8c0a4bbd148e7653d3ef44cb1c97299aa9fe7,2024-05-02T18:00:37.360000 -CVE-2024-36779,1,1,149e86509c4bee6b0dc3208962ef7ad48629fadc4a1e92b1b0377cc7b9ef03bd,2024-06-06T13:15:31.590000 +CVE-2024-36779,0,1,8c7e83df3afae13bc8d33f62f8b15e49a81040b0a6b2ddb11061136937a55355,2024-06-06T14:17:35.017000 CVE-2024-3678,0,0,d720397e0ff5aed34935621b66252dd502ae3dd7e987e20f2aefa29510c09059,2024-04-26T12:58:17.720000 CVE-2024-36782,0,0,e7ea68c65c5ca104712b302d02b4ac394c2f9961920c167363ea2d5cb5f8492d,2024-06-04T16:57:41.057000 CVE-2024-36783,0,0,836a2ceb0d98b8a700028ad4ff916db5f51e7a924e1a9f84d5d28e5cfa23ba3e,2024-06-04T16:57:41.057000 @@ -251490,7 +251492,7 @@ CVE-2024-36800,0,0,967d3236939728405f0bc2636be420e66aaebd51f71e3cb4a6ae3a4ede9ef CVE-2024-36801,0,0,cb5a003a5410a18732b1906d50ac09307cc6038359a69f635327e6d9be7df9a7,2024-06-04T16:57:41.053000 CVE-2024-3681,0,0,4cc6e1e77320458af0f4beee59a38c9a663fe20b962b28f234c099bc7c23ab32,2024-05-02T18:00:37.360000 CVE-2024-3682,0,0,a140f5eb71acf183c1e80e0d2f5a14a5c7d8a92c7cf9dd3ea5250a20e3cb490f,2024-04-26T12:58:17.720000 -CVE-2024-36837,0,0,9047b7c4b1c697a37a74068ebe63e1a5b1fa477badbdef1c69c95f9927767cec,2024-06-05T15:15:11.803000 +CVE-2024-36837,0,1,47ca3391700f1c8fe38372397571450c964664f9edef8a6b063febfb6bda26de,2024-06-06T14:17:35.017000 CVE-2024-3684,0,0,e7edf7d6bce31b480b46d692afd4304c988268ba4618e87da8566dc118f2be92,2024-04-19T16:19:49.043000 CVE-2024-36843,0,0,dffd8a9db459cea7141db065370811228354e9ed0a00ef7accb6e04cac03982c,2024-06-03T14:46:24.250000 CVE-2024-36844,0,0,e97265dff1b9c5c617aea3c1ed095692195c0e84c6f318663f5bdfc9ec429f88,2024-06-03T14:46:24.250000 @@ -251623,7 +251625,7 @@ CVE-2024-3708,0,0,09132fb1644ebf0c808002aa8ac15b19f13ae71d0beb378f7a9664a5ae685f CVE-2024-3711,0,0,00ee502ae0ae8bdc802cd38eb1ec1e1356c10e1c18d766a4effd20297a066f55,2024-05-24T01:15:30.977000 CVE-2024-3714,0,0,29d3de80cc1f6e0ff07b09e17d8d58f6e17e5f0164ed94da7b2235ed17131c18,2024-05-20T13:00:34.807000 CVE-2024-3715,0,0,902861be5261e2c029ed83a5c6920fde180817c53e05bb93208dc31c820658c5,2024-05-02T18:00:37.360000 -CVE-2024-3716,0,0,94ed27c274330823dac6752d79b883f27571600354e61c72f00bebbce4c755b1,2024-06-05T15:15:12.043000 +CVE-2024-3716,0,1,bdf7b94eaf3a61f5d833423267272b016419fd984cbc8abd8ff807268a3875f7,2024-06-06T14:17:35.017000 CVE-2024-3717,0,0,f925293668cd733410cea58d8de3d8ac1f08ce4fec8b5812651df64ea2fd428a,2024-05-02T18:00:37.360000 CVE-2024-3718,0,0,a740a1633905d284711162c33f52150d8f35c5a9e41e141a82d07851d64c55d1,2024-05-24T13:03:05.093000 CVE-2024-3719,0,0,d2320674d04cefde56a0b36b463f74328d6f18494803030bdfe9b0b1b4374afd,2024-06-04T19:20:23.553000 @@ -251838,8 +251840,8 @@ CVE-2024-4000,0,0,63e68b686bb1abbdcd2ddeab613f2e83d1883c904c164f21a1076ada49583f CVE-2024-4001,0,0,9087c824343a197f49253ec388f203b19bc7567114e0cb1c21c7da34a6a10aaf,2024-06-05T12:53:50.240000 CVE-2024-4003,0,0,9b9be828f15a04db891b79e7c6ebf75d000360176e249e61f2acbb014741196d,2024-05-02T18:00:37.360000 CVE-2024-4006,0,0,cea97555ee62217aaca46943155964ba917aa17a210befae3806ab46c6606005,2024-04-25T17:25:05.903000 -CVE-2024-4008,0,0,e21156ece8cb4078fd01b08a7dad51b6a2b8169df09029b1fd76baaaaa495073,2024-06-05T18:15:11.113000 -CVE-2024-4009,0,0,b28142432c19fc2bcbd21d3bda75179ddf7fe561d4997e9ed89a828cb92ca50b,2024-06-05T18:15:11.420000 +CVE-2024-4008,0,1,ab88da5f03295a5c82b2b02d767da89d9d5f6b64be017927f79b2a477f07ce81,2024-06-06T14:17:35.017000 +CVE-2024-4009,0,1,1efc6fffaaf5a87d264faa44168af33f94d0754350a147286e05077495885670,2024-06-06T14:17:35.017000 CVE-2024-4010,0,0,b0efc140530d7080bd135b9c9b54b60a51a2a7dd68cfd5652cea86eef30822c4,2024-05-15T16:40:19.330000 CVE-2024-4014,0,0,321273114f78ac117c4f7a805b62a62926b23a5461c74b2705504b7b2e21d158,2024-04-22T13:28:43.747000 CVE-2024-4017,0,0,9cc899b07e49c20d1d42511c9c41a533c695fd74b1701843b26490566c6e33e3,2024-04-22T13:28:50.310000 @@ -251953,7 +251955,7 @@ CVE-2024-4172,0,0,451a98bc37a8913689c170fa50248cd8ea0889d257d9eb9d44eb4ecc18ef5d CVE-2024-4173,0,0,806a08191dc2b624e0ee02a7be11ce6c5ceee33617f7b3eb9464afb5420bb62b,2024-04-25T23:15:47.240000 CVE-2024-4174,0,0,c142274bead27dee8f65c018633c5143a8f9b64dc6c6d83b389a2c439d2fca3c,2024-04-25T13:18:02.660000 CVE-2024-4175,0,0,60706a95032c3b7b71280c12c10b7cdce6a73ddf5468ef6a0d21aafa3328ee4a,2024-04-25T13:18:02.660000 -CVE-2024-4177,0,0,992de65de3096243373a3221fce18e99d8551ddc56caddcf8368583d63922e67,2024-06-06T08:15:39.767000 +CVE-2024-4177,0,1,ed06ea0b75bd672c2714cf74b6e6094d25829ae835b8a223781264b926031651,2024-06-06T14:17:35.017000 CVE-2024-4180,0,0,9058921b947f24d8b0a5b1b796b2d37085ddebacdef82bce4988d1eb0672ae93,2024-06-04T16:57:41.053000 CVE-2024-4181,0,0,ae08963d7323466f42108cc4145b2377e0c682d334302c4a8213f2b0fcb1ee61,2024-05-16T13:03:05.353000 CVE-2024-4182,0,0,e7bfd5d03ac4e50248987fdc4c50fca364e9bca2384ff17427febaa9cba5bb33,2024-04-26T12:58:17.720000 @@ -251962,7 +251964,7 @@ CVE-2024-4185,0,0,4997c26f83a14bd54a98f3da542941a3f7d6c6c6777c0f0d023281d709e1d8 CVE-2024-4186,0,0,c459d76d4346b2737077f5ae7b0a1b0ace4353328a79efd93c790decc23cc54f,2024-05-07T13:39:32.710000 CVE-2024-4192,0,0,d6751fa9142aaa91446de5baa4aa2b6db344761a0aff4ab695cf6603148e6a9a,2024-05-01T13:02:20.750000 CVE-2024-4193,0,0,34caa150e2a546168eedf60ed0041c1af9a5a97d1e635e24d38bfff73af8076d,2024-05-14T16:11:39.510000 -CVE-2024-4194,0,0,b4a3d33dc3b16633aa216c7013b47f627cdf09898f4a51776aea0b398eb43053,2024-06-06T02:15:53.453000 +CVE-2024-4194,0,1,205e2b5a2f07968c592d660b3e76de377655cfeebffc35ccc9754d5f0c3bfee6,2024-06-06T14:17:35.017000 CVE-2024-4195,0,0,320e8c641dbb71fd3a637ea44d2a1260b2aea61b9d12f44c9e97c80bff500815,2024-04-26T12:58:17.720000 CVE-2024-4198,0,0,845a410de3c7b102462b76b86fccfba72df0a0950e69dc55e9742bae00fec8d9,2024-04-26T12:58:17.720000 CVE-2024-4199,0,0,afdafa31ddacec6eea606de503a440282409912f425fdd165997fbd1146b1fe5,2024-05-15T16:40:19.330000 @@ -251973,7 +251975,7 @@ CVE-2024-4204,0,0,b5b0e814a1a205542e0eb5276440679954b3096492a66b2515974ebf51e239 CVE-2024-4205,0,0,3f129ec0db23b7af1da57407fcaa887a58d3c53b22aa7a77bbb6b2ea890345d4,2024-05-31T13:01:46.727000 CVE-2024-4208,0,0,46b12305041a8c6139eb3938f17acbaea3df190f99e69b7dbe6da0ff971df44f,2024-05-15T16:40:19.330000 CVE-2024-4209,0,0,173d5cb49108fafb4e6ca62fca16c9db9e3ef928b93b1435472365368476864c,2024-05-14T16:11:39.510000 -CVE-2024-4212,0,0,dfc70e08cc25a2b3b1f74302297ff4f7bbb3b2c413a3c8d4fc2661bca81a9269,2024-06-06T04:15:11.970000 +CVE-2024-4212,0,1,9d03056b6fd89b00a99251c37ea5cec20a93e96520680d3762404caf20fca822,2024-06-06T14:17:35.017000 CVE-2024-4213,0,0,42ea90224045d73e2b0e3583ac57d426d05abb547b5044b93cb751055084fa1f,2024-05-14T16:11:39.510000 CVE-2024-4214,0,0,20486a6e70da9590b0bf48d308272f5e2303dba1772619a1d43b68b5a571b06a,2024-05-17T18:35:35.070000 CVE-2024-4215,0,0,0d7dbfaf8275e9ff6c32259712a00cedd32b92104e92991d7893f67c59faf7d0,2024-05-03T12:50:34.250000 @@ -252088,7 +252090,7 @@ CVE-2024-4358,0,0,8bbd537c5ea875d2c5ecdfbb7633e029c613e3b42b156894ae15f8f10f6e5a CVE-2024-4361,0,0,133909e17de135792173cf72624f64f1510a4ce9cc19a57a2e3a0686665955c8,2024-05-21T12:37:59.687000 CVE-2024-4362,0,0,af0fb88b473869224d001344dee6aa8815e25580824ec25d2696d475519ed716,2024-05-22T12:46:53.887000 CVE-2024-4363,0,0,d30828b887305e475a68737a9c01556f9e261cb37bd7c595ea12b948125a2ae0,2024-05-15T16:40:19.330000 -CVE-2024-4364,0,0,0c324bc9787091b25c432ca5344d5441452afb79eb240ee348e0ef7f3534b38f,2024-06-06T04:15:12.220000 +CVE-2024-4364,0,1,5edc139442e19a08636aa02c6e9afe48e9a2ca53e1abef91f65b8b0f93a33cba,2024-06-06T14:17:35.017000 CVE-2024-4365,0,0,9806433296206bcec148d9648ab2fc91142327d17ef07e64e0ad9e5ff3907a52,2024-05-24T01:15:30.977000 CVE-2024-4366,0,0,c04cea9d73579a737d5c3d200547b1e50e3a1d3ac8e5c0e3a1d88c878c2e9d6a,2024-05-24T13:03:05.093000 CVE-2024-4367,0,0,10c9ba4e2375d81f02eb3145704f99e298b4c446473517eea4810baa65f2c650,2024-05-14T19:17:55.627000 @@ -252152,8 +252154,8 @@ CVE-2024-4453,0,0,839eb0feb1010733ba000fd27e8db769e9a1bbb03e913a1271e40ed1ca3d82 CVE-2024-4454,0,0,914a7b9e833666c0b110fe9be947f5b60542326fbbcbbd52692d581f0fc5648b,2024-05-24T01:15:30.977000 CVE-2024-4455,0,0,e18738afbef678c84ea567282093c6582d8247bf14c57fe724fa93ee096ec5c2,2024-05-24T13:03:05.093000 CVE-2024-4456,0,0,43bdd543de001702ca45614b4a3579c52bfa7b188e5cb3e6b81f25f610f74e45,2024-05-08T13:15:00.690000 -CVE-2024-4458,0,0,f67bc7a208d418552d927207547249c7bba34258ccf901e515311bb76aa96372,2024-06-06T04:15:12.483000 -CVE-2024-4459,0,0,415ba84c8435c056ccb8661bf0ea8f68711ce4ad81557e1ae181cf200d9d545d,2024-06-06T04:15:12.717000 +CVE-2024-4458,0,1,78210a24e5c56842073afd1809a4bb2418e02424d7be783c86e219719dd0857b,2024-06-06T14:17:35.017000 +CVE-2024-4459,0,1,a416ba14244e130e353615c3d33f61a53ec702533b4ddc327eb1ed858a6b026e,2024-06-06T14:17:35.017000 CVE-2024-4461,0,0,ad05f4e37257e33f27f784f842f8dfa34f685ff06dd273bc6842a04c51c93bf6,2024-05-03T12:48:41.067000 CVE-2024-4462,0,0,c8f7490df4b9ef7118fdef5b7ade6db6ae196f6576f8cec5720233f982c7a0b4,2024-06-04T16:57:41.053000 CVE-2024-4463,0,0,aaa5b32073fcbc7160927d348961b4790302ca7b8c414e16cdb6cacefbfd98b3,2024-05-14T16:11:39.510000 @@ -252264,7 +252266,7 @@ CVE-2024-4601,0,0,9e1e1f008012e98662e601d1d10e65eeb89abb9d2b4ea828e06c076d042c7c CVE-2024-4603,0,0,593187637c7acfa4eac78a8706fc86467f2576f06aa1b8b54ad4501e31abefee,2024-05-17T18:36:31.297000 CVE-2024-4605,0,0,953638d724b858b3af29d2158adc8bf0b3f03be99b297e319002baf558be51c5,2024-05-14T16:11:39.510000 CVE-2024-4606,0,0,6a0f9aa1de71c84cf915c091fa2bebebead3ebb4c4bdbaf5b5bc091e1c955edc,2024-05-14T16:11:39.510000 -CVE-2024-4608,0,0,4c27578928dd71b2c65a4996258b117429000b043383a87c4b9461c1fe0588f9,2024-06-06T04:15:12.953000 +CVE-2024-4608,0,1,66fd8dbc7b1c172bc789c4876374c82bfd54c48e5902295fa28145d061770319,2024-06-06T14:17:35.017000 CVE-2024-4609,0,0,c23c3de39dc98d86dc6853d31c2bc52148fecec26ec42d14e3cca3645de4f823,2024-05-17T18:36:31.297000 CVE-2024-4611,0,0,0152495de6f2454e6b1280dd3d20184c586b399950947591d94dfb5475ea0272,2024-05-29T13:02:09.280000 CVE-2024-4614,0,0,beb5630ff5db8a415fa4bf6f109dad49279ea5965bb91a1d7f892cd406978f05,2024-05-14T15:44:12.883000 @@ -252321,9 +252323,9 @@ CVE-2024-4699,0,0,21634a770b960d22aa24dc1f0ea343763012f9507287610a68f53780612049 CVE-2024-4700,0,0,fd7d4a078191a1c31b5f2cfdfc5bd65709b727d250ddf2b831fd6aa84ec620ac,2024-05-21T12:37:59.687000 CVE-2024-4701,0,0,31c0f40927cc6a1a9aece611ec4491a5435df4e5c3a9daffc9dfb7710658ca96,2024-05-14T16:11:39.510000 CVE-2024-4702,0,0,391d02c5718dd442c026ca8f3973c4fe10894f8eeb54175158dc44cd7ef50d4a,2024-05-15T16:40:19.330000 -CVE-2024-4705,0,0,d25cf3ef7cfb8bf5dc4e954c9ac6e781ccafc588a38781584280ab4510a3f381,2024-06-06T02:15:53.663000 +CVE-2024-4705,0,1,b45f335ad46575e30510e82573f02b490faa16d9b6ee89b66a9844ff390b53aa,2024-06-06T14:17:35.017000 CVE-2024-4706,0,0,a959e13293b1a5966007eb60c79cb973f34e4d1d8bd1c12986cac54d81ac9a3d,2024-05-24T01:15:30.977000 -CVE-2024-4707,0,0,421aba3d9d15a5ac7f14377031ac87bab219e6bcffdc649a6419e5e62801caf8,2024-06-06T04:15:13.213000 +CVE-2024-4707,0,1,d6a01a1a459dfd9ab21945d56af40919cce44b311e282118c993194b130db955,2024-06-06T14:17:35.017000 CVE-2024-4709,0,0,c27b22c30c2569acd5c758eb82bd584c5ae09da5862ed28e288bc8b8f592259a,2024-05-20T13:00:34.807000 CVE-2024-4710,0,0,500a7d3af356181a474ebd9523b50fd3ae653f9a07ad01e5b7699589bd4ccc5d,2024-05-21T12:37:59.687000 CVE-2024-4711,0,0,5c0c1fdafdfc7c3555551e67a6280882d1277b637b3ccb31a4bc6994c2c7441c,2024-06-03T14:46:24.250000 @@ -252377,7 +252379,7 @@ CVE-2024-4777,0,0,871c0aa9bb9189afc5f5526abead12f9f754ed9ce1a10923259013af7abd7d CVE-2024-4778,0,0,37531b60d89a44d35c14fde25587b4d8cbf891fd39da513ae2adbe2646535312,2024-05-14T19:17:55.627000 CVE-2024-4779,0,0,e93e79f4a86fab8cb11a3f6a53c3afceec1606ec76ba934e81e552f2e4a9a244,2024-05-24T01:15:30.977000 CVE-2024-4783,0,0,daba56adbc0652555be3afeccbdbe190fb7cbe9964b63627bf6508f75d28c65f,2024-05-24T01:15:30.977000 -CVE-2024-4788,0,0,e76544cfd4773a2d4539c370c11a6f901454e574d92ff055b281e01009d7ba6f,2024-06-06T02:15:53.860000 +CVE-2024-4788,0,1,1c9a8fbf6bcaa04fd9a337cf6b1788c99808cca0f3735caac5c9d9e2c279004c,2024-06-06T14:17:35.017000 CVE-2024-4789,0,0,c3ead1522386330c98ef03f50054b683a63e62c43c9e3867ea226ff37f2983a1,2024-05-17T18:35:35.070000 CVE-2024-4790,0,0,9ca82e19e832a950283217f2bfd1db7efd6838c8a8bf54a7d78165e2752eb0b9,2024-05-17T02:40:36.990000 CVE-2024-4791,0,0,bc4ba581266356fcb662bc273060193bcd7412d6015907e518b3ebb2854be230,2024-05-17T02:40:37.090000 @@ -252400,7 +252402,7 @@ CVE-2024-4807,0,0,67718b6eb078c9f0d2237a6e70705d1e95cd34dc2fb309a428589e88b69185 CVE-2024-4808,0,0,31aace84eb5cf8ae7b33b4f67a8927defaac7e795c19b6dbc527982928e508d3,2024-05-17T02:40:38.870000 CVE-2024-4809,0,0,c8da4086309fc1b4b6ab82ad9c18ebde517bbc82c18481b03f62e4a51f6d5f84,2024-06-04T19:20:50.867000 CVE-2024-4810,0,0,c71ec4cc1ddb906248abb5b717b1e9cae79dac31d38b7ef77deffef387924854,2024-05-29T08:15:33.960000 -CVE-2024-4812,0,0,617471c4a0b87a34381d10f169b09b714d2d2b128a65081394225e3d946bb023,2024-06-05T15:15:12.333000 +CVE-2024-4812,0,1,b3cda9028d0f02379f62d65b48aa6347b0cbcc1d7d19bc6d1ff0fb8cb3a1a9e9,2024-06-06T14:17:35.017000 CVE-2024-4813,0,0,b5b0c22b55c8f68b2571ed5b959868f4ed2457b0b53290280edf5c5af953a78c,2024-06-04T19:20:50.970000 CVE-2024-4814,0,0,237aca528b64f5bf796fb858f78996cec1dc1e2f05f3a438ed0cd7f53aa1a865,2024-06-04T19:20:51.077000 CVE-2024-4815,0,0,8ff9e465e306e529b3b329df1b79c4d2ebff7ec5e9027fadca7e17fa97570b22,2024-06-04T19:20:51.183000 @@ -252474,7 +252476,7 @@ CVE-2024-4931,0,0,83efd803f055d34e0373b998807732a66d1be28ff93405fe1ae45ba9ee6af2 CVE-2024-4932,0,0,2da4bffdf4d6e38ae009aae9065c7b2f8049c53fc8beaf73dfbb4354175c5b68,2024-05-17T02:40:43.357000 CVE-2024-4933,0,0,9fe90c4f8856bf6bdad48e78d639ea10366bef215c1d0d507cc52649860ab1b1,2024-06-04T19:20:54.643000 CVE-2024-4939,0,0,9b3d9056d0ef1d9ece33bf387a55f6ff5207b427eb3d8aa6eb326ad7a1f5fa3f,2024-06-05T12:53:50.240000 -CVE-2024-4942,0,0,6c116bfdb49462d803f56006d3ca8142d185a99abba926032abdc43f497c0f4a,2024-06-06T02:15:54.080000 +CVE-2024-4942,0,1,157240698edb46a5deca9943c90e89d5c268795c03f1dadbb4d2f6e28d77068b,2024-06-06T14:17:35.017000 CVE-2024-4943,0,0,d9b88319a5992961df806c2aff168607709c5e19495e72269f7fd7790830e1d9,2024-05-21T12:37:59.687000 CVE-2024-4945,0,0,862ec6002e9c3369e40f6935606e597aac95fb1ef3a2f5a2c72d02ef723dafd2,2024-06-04T19:20:54.767000 CVE-2024-4946,0,0,de881559bc92412238785deff68c564cad0647963d61d3efd064c0cec6c4ee1e,2024-06-04T19:20:54.867000 @@ -252511,15 +252513,15 @@ CVE-2024-4997,0,0,381fe62c0cd224246ea5324bab3cef489202298d3bb7b0d185aa70d1dc0d5b CVE-2024-4998,0,0,e12f9512d41da053bcfd5626dd0ee21afd4da3e61146c4f0c8f9da42ca3dff98,2024-05-17T16:15:08.160000 CVE-2024-4999,0,0,1bac5cc77e7ceb1bce6c078fbd59e76f5556984ef2124d365e8638bfa6b6fdfa,2024-05-16T15:44:44.683000 CVE-2024-5000,0,0,21f44bae275ca5e7f3a45da963612f2fb705c74e44c15e2681f54ff4506e6afb,2024-06-04T16:57:41.053000 -CVE-2024-5001,0,0,8e0cc1ea37be2b7771e69c694fb0ebecc5c3c0cedfd5a988941255955a03fd8d,2024-06-06T02:15:54.283000 +CVE-2024-5001,0,1,bac0073c23ed28e836068e8632acf1110bc49b73246f9cff53f5a706acc4a57d,2024-06-06T14:17:35.017000 CVE-2024-5006,0,0,dd22c8e58768fd94bd48e3be3a4dc52cd3210392642ba6489895072643348644,2024-06-05T12:53:50.240000 CVE-2024-5022,0,0,106355f86b530d1586a5d339031de27a1a2312467a76eb449e8e9901150235d8,2024-05-20T13:00:34.807000 CVE-2024-5023,0,0,974704283893df4cc9d8e0bcce8bb65ebf635268235f75f47c922033893214ce,2024-05-17T18:36:31.297000 CVE-2024-5025,0,0,d287dc9bcba0fba1784ec3f3fe4bf65eea235ed5e6f91d741018beb442d992d7,2024-05-22T12:46:53.887000 CVE-2024-5031,0,0,e598ebc5c9fa457f9bece560d72de6fc8851ac943a5e7908ec776eb9202f17df,2024-05-22T12:46:53.887000 CVE-2024-5035,0,0,04b94f66274e3d3d22c52a6f453c8b285ab22579cfad76ef028d6a110e1aa148,2024-05-29T05:16:08.793000 -CVE-2024-5037,0,0,65868da730f2393bc36e8d5bf0125a28857fd79b4b1f204c144a496074505ca9,2024-06-05T18:15:11.747000 -CVE-2024-5038,0,0,957c2aac7ceb1411a4af0adf0465beca468b76b40c63d0ebe0f4ce607ede4fa9,2024-06-06T11:15:48.770000 +CVE-2024-5037,0,1,10d28aafa9e9bd8dcd65c435579824df0f7216429d2845d4410a8a8948579200,2024-06-06T14:17:35.017000 +CVE-2024-5038,0,1,843517ce01ce26c41e513c8063ce293b75b8bbb6b99254c06fe5f5ff2155a3f9,2024-06-06T14:17:35.017000 CVE-2024-5039,0,0,42959b486bf28971702f84d5d970f64301a550626d1348beb35b7505e0fa75c5,2024-05-29T15:18:26.427000 CVE-2024-5040,0,0,0ff887bafdff8fcd61409221ff18cf1da08d6038e0047c0178293c334ec34d62,2024-05-22T12:46:53.887000 CVE-2024-5041,0,0,148e8fd0668e27a7f2596320dde0751f2f894ecceedc9c62c72ab421064aaee0,2024-05-31T13:01:46.727000 @@ -252584,32 +252586,32 @@ CVE-2024-5135,0,0,a74f6a753fe0dfdbe9ef14fb62e3c1e241b2d21757276b9c7925f9871c2f34 CVE-2024-5136,0,0,54496e679f22e87b39775a5e450097ff5331534eeddd241fc9a4272c74b45ed9,2024-06-04T19:21:01.267000 CVE-2024-5137,0,0,76e7ce146465303f25f551e768907426737dd0ce95d882fbebb638efe3e073bc,2024-06-04T19:21:01.370000 CVE-2024-5138,0,0,3ed46b06696d079a65e133c6fd95dc6d08f3963b56086a9a24fa821689266527,2024-06-03T14:46:24.250000 -CVE-2024-5141,0,0,68fc1d64a8fd2e204fe817c1cd740c801ff7a9f1c8241761944802e94557be3d,2024-06-06T04:15:13.467000 +CVE-2024-5141,0,1,5a0a7460d405ae0e793d240f719a9c5685d4ed36a459e63c509a0158f30988bc,2024-06-06T14:17:35.017000 CVE-2024-5142,0,0,9a7d794c7ee50b5ecd06d952c402fab37c046b0a6bb4d29e0c6b11e7df538957,2024-05-24T13:03:05.093000 CVE-2024-5143,0,0,85d2302aa16b15f892bf139ed2f510515c9c051290de1dbf060be25f39190615,2024-05-24T01:15:30.977000 CVE-2024-5144,0,0,3682eb32ab74a69dce2a20f55af124165ad49665bd2dae692d6703bd4728c599,2024-05-31T18:15:13.217000 CVE-2024-5145,0,0,0acb7691362a1bc72a9e4e71d498873a314e4674d3384b4bf3903540c5103a68,2024-06-04T19:21:01.520000 CVE-2024-5147,0,0,f4d57cc5a9319b417b98271562a6c18c09e411a2e24f5685a34653839c587f1d,2024-05-22T12:46:53.887000 -CVE-2024-5149,0,0,364802fa270d017fba6f416e3117d6dca3ad93a3eb767f3194b95ff1f96ff814,2024-06-05T12:53:50.240000 +CVE-2024-5149,0,1,e167f321a43176bbe51b79fcd0ea912cf6c260f7c91862b43f4c0c9d62cbbb1d,2024-06-06T14:15:01.960000 CVE-2024-5150,0,0,b6666c6d6ac9830dd3015f5fc02fd79f0a3b63d41ee2e14f8cd76da933186cb1,2024-05-29T13:02:09.280000 -CVE-2024-5152,0,0,e6a0cdb7239e1bf1dce12f6af04b749a740b2aa4816cb5875c4d75dc49cc455f,2024-06-06T04:15:13.720000 -CVE-2024-5153,0,0,aba940d98129b45e4e759a45de139cd1dcd5b21369749804602fc5af9b4cb397,2024-06-06T04:15:13.950000 +CVE-2024-5152,0,1,897a950e1a56cf66b3762a0b7d02348f108b131c1556072d1a2c46cab20012e4,2024-06-06T14:17:35.017000 +CVE-2024-5153,0,1,828bf0d922f71aaeb9a620d2a28fca02e54e4a39590cf3792a194a4a5970d881,2024-06-06T14:17:35.017000 CVE-2024-5157,0,0,d1a998bf0d4dfb4fd055882979d4054df97060c8814d4ddde025533b9446aec3,2024-05-22T18:59:20.240000 CVE-2024-5158,0,0,977b7b5952131680dd428eb1410f2d0eff9e1337c54f1532a6f9419cdea73d4c,2024-05-22T18:59:20.240000 CVE-2024-5159,0,0,e38cab9897bbe28b3147c92a1de2a98f85909f9a825751a118b622eb7ce3cc9b,2024-05-22T18:59:20.240000 CVE-2024-5160,0,0,186682202af617fcd5fde94e1dccd429b6dae548d190fed969fd472f14ae0ac3,2024-05-22T18:59:20.240000 -CVE-2024-5161,0,0,f66ba2be25090780051aaa038aa572f9ebd28aa1e418771b392666dc4c1c91b5,2024-06-06T04:15:14.217000 -CVE-2024-5162,0,0,cce95534386eca768ad34947a7e643d499f7a01f383bb59395357c64f929c70a,2024-06-06T04:15:14.463000 +CVE-2024-5161,0,1,e7ee50e132209c9af2d04e0f78f70daa2f8e4d8e66a5c74b97f79aeb602e94ca,2024-06-06T14:17:35.017000 +CVE-2024-5162,0,1,d15fa704d37693972ec8048da97de07e102beeb78dcaeaa088ebcc9b6b634ff1,2024-06-06T14:17:35.017000 CVE-2024-5165,0,0,1249b447729c1b58db4dd874ebf3238410613919325ce73c31963c57eb2e607f,2024-05-24T01:15:30.977000 CVE-2024-5166,0,0,acd04bdcb3927ae2fc6875213ce44649287d9e14ecc961e10fc982fe1f8beeeb,2024-05-22T18:59:20.240000 CVE-2024-5168,0,0,306ce12eec3dfa604048647f5d45c62ae3c9962c8122be3c41030f354ed300c2,2024-05-24T01:15:30.977000 -CVE-2024-5171,0,0,a3da81d81f7a3c483dfcf905163f287af857f8aad3b9fafc4db97a697d360548,2024-06-05T20:15:13.800000 +CVE-2024-5171,0,1,48a4e93c0e5c114307317a61f5ebb55a23b4e7180462277e993e611f49dd510f,2024-06-06T14:17:35.017000 CVE-2024-5176,0,0,d56ed998903dfaef1849b554412c043d7bedaec08a06683735e348a1e4cdd46d,2024-06-05T15:15:12.620000 CVE-2024-5177,0,0,754731e9b12ab9d5b8190add19111b94a5e340744a68664c6a765c48e93c422c,2024-05-24T01:15:30.977000 -CVE-2024-5179,0,0,1b58a2732f8a8d8fa6e628942784cc1379ed7149a4b7d5fb2243a48800512c05,2024-06-06T02:15:54.487000 -CVE-2024-5184,0,0,8b2f6c9a378252db9318617634b3c5d9d6b37c2d0152582d3972dd63de17906b,2024-06-05T18:15:11.993000 +CVE-2024-5179,0,1,54358caa6e0360966d6f1b65f621cdbf9937e802ed8f2b5c2ee31999cdede484,2024-06-06T14:17:35.017000 +CVE-2024-5184,0,1,469ae4b4101ce70838982062b92b16e6c320dc3a978486babbbd116acc562e40,2024-06-06T14:17:35.017000 CVE-2024-5185,0,0,b5caf3da810dd6351b96bbd5e231331a05f92e8956c63f18c155c13a8af19485,2024-05-29T15:18:26.427000 -CVE-2024-5188,0,0,2001bfc5ababc1f408ca80386db14dc53b8f536b6f02a5289cc53eb480f5af1b,2024-06-06T11:15:49.057000 +CVE-2024-5188,0,1,1462875bcfd86c2862b0d5dac7469b05c2d6e4a9326d1a71fe8f5b451e2a9a78,2024-06-06T14:17:35.017000 CVE-2024-5190,0,0,e11755e15485ad7d65ed59ac9abe5cac7f4b4c3e2591d1a6c69b4386ed9dea65,2024-05-22T03:15:08.273000 CVE-2024-5193,0,0,4619a3332fd1de828c7e949279cabe4a2b063d71a4e227126d8bf6d303fb6eb4,2024-06-04T19:21:01.867000 CVE-2024-5194,0,0,2277a7390d0159b3dc2e5dfd100175220ffc5f5725f8c88a7a9344e62a79d516,2024-06-04T19:21:01.977000 @@ -252624,10 +252626,10 @@ CVE-2024-5207,0,0,837facf8fac5843bbf7aea1ce36fa00287f1ba077f8fbca1302b0ab4087ec5 CVE-2024-5214,0,0,77a86526714522a20940695733fe46b4562089752d3c663cf289b583b7c6bbda,2024-06-03T19:15:09.360000 CVE-2024-5218,0,0,928b5f8d4e08afc285c0cf6e370373ec87899b716b1cb4db68027907b01d2a82,2024-05-28T12:39:42.673000 CVE-2024-5220,0,0,f61a4e43424028e9a9336f6f6ed766295c86a8a5421f6ff87daa2be13ac80d02,2024-05-28T12:39:42.673000 -CVE-2024-5221,0,0,3e2e4681b9c0fd3379038300c75a1774f4648897bd9c33586309bb0571825768,2024-06-06T09:15:14.977000 +CVE-2024-5221,0,1,8f497cca9e988f4e32c0119e26090a2c609a1a09b8f068ea2ade2b28f6d270c5,2024-06-06T14:17:35.017000 CVE-2024-5222,0,0,e769bb480236b36cbba7fdebb79adf1189e90d39aec093b6e4e34002be122181,2024-06-05T12:53:50.240000 CVE-2024-5223,0,0,8366f6c6b4592ec30854ea2204a3ebdc0b5f6592483a6a57d3251ddc4233fcd1,2024-05-30T13:15:41.297000 -CVE-2024-5224,0,0,053d9cb953df4cca5c1d480fd26fabd5416b4fb54774fd7bbc419b94872e1a64,2024-06-06T02:15:54.690000 +CVE-2024-5224,0,1,60b1bcb89040b5c3e85ac5131fd112ccc87db84d011046ada6bfcb3cc04495bd,2024-06-06T14:17:35.017000 CVE-2024-5227,0,0,9d34b575e4c4193bf3b7e2c70f772c52e473e90eee580d6cd20ca38df9886e09,2024-05-24T01:15:30.977000 CVE-2024-5228,0,0,0a0ae3d586a473bc70cb0721078887f2918e42e82919d39880ecf7432c31100c,2024-05-24T01:15:30.977000 CVE-2024-5229,0,0,5591fcb6917655cbf3944dcd6615ff3ff9ee2f54b68a25aab97dceee478c25ea,2024-05-28T12:39:42.673000 @@ -252650,7 +252652,7 @@ CVE-2024-5245,0,0,885af784a1c7b3c68788b03806b782abc316cb75da65e88871ee466ba1a204 CVE-2024-5246,0,0,a3caa78128bac4a72615dccb481ff335052f3377ab67fd694d7f5fc053234984,2024-05-24T01:15:30.977000 CVE-2024-5247,0,0,1e269e58ef46756e33578f4c5df34dcec3de646d04312bef41a8353e3fc1fce7,2024-05-24T01:15:30.977000 CVE-2024-5258,0,0,44dc29bb0ed4f47fbd56a17c4d4592048fc8f73fd8d93b1b1d7d82e5e8477ede,2024-05-24T01:15:30.977000 -CVE-2024-5259,0,0,10c5979117323794651be410d673ea2ab28740d646a590a72351dcad9445c1f3,2024-06-06T10:15:09.557000 +CVE-2024-5259,0,1,08e48dc4b198d6c1c014170574c3eefd22e9d7f4fec81c569fda7e92033ecbe4,2024-06-06T14:17:35.017000 CVE-2024-5262,0,0,d3d11be98b1db30aa602921aa94b60a718be9a0bc4ccd1e4ef634546f525f9dd,2024-06-05T12:53:50.240000 CVE-2024-5264,0,0,8231398a0715961af60c236587d7e9f037c5bc092ccd3f5680c73ce92c6726b7,2024-05-24T01:15:30.977000 CVE-2024-5270,0,0,e200d6ed6ebdb84a917f949dcb40f0d98c76339d55f3b191cf4ff77238c630ff,2024-05-28T12:39:28.377000 @@ -252675,17 +252677,17 @@ CVE-2024-5314,0,0,fb6304ffb5d50ce8724d643a46fad25ba80695f7c0c0eb4ec33a07d41bc498 CVE-2024-5315,0,0,e1b0baaf93d62cf125eea53091da57c404cdf61d625ae810529ebef84e73357d,2024-05-24T13:03:05.093000 CVE-2024-5317,0,0,0e4df649aa2081733cc8377041229cfce850d909b63f156a77d02d6d4c5141bb,2024-06-05T12:53:50.240000 CVE-2024-5318,0,0,812431b83287688611dc496217ea25ba5560744235da04dca7a35239cac1fe9a,2024-05-24T18:09:20.027000 -CVE-2024-5324,0,0,d26cf1e929818d3cdca421e9ed490c63699ddd1398c18367847dbcc9acab6063,2024-06-06T02:15:54.890000 +CVE-2024-5324,0,1,239b526476b291cf58ac1a7ce87454c70f83a8964e6e304d358d59b9fc037786,2024-06-06T14:17:35.017000 CVE-2024-5326,0,0,9beaa1147d54b3ae536a6eb0023672ae377946ef8aec317bd58c5324df5850c7,2024-05-30T13:15:41.297000 CVE-2024-5327,0,0,84b1605ed9f8fbbcd152a70275bed021ec8172a393ec025e57c9733c6898763a,2024-05-30T13:15:41.297000 -CVE-2024-5329,0,0,901c9939b1d947f07e99f2f0a0406193e63ca64e7e8bd81147f4c1d180e0ccf4,2024-06-06T10:15:10.493000 +CVE-2024-5329,0,1,c257130c45a1d3db05de46f1dc5423be58d1e475a56e84fae142bce7bd7c36bc,2024-06-06T14:17:35.017000 CVE-2024-5336,0,0,c369166950e96ac23803f815e7b4d2b11cfe953eea9e75568f6bd3a698e57d70,2024-06-04T19:21:04.947000 CVE-2024-5337,0,0,c248444f5c3efb36aad99df75367002d79331c50b5d3f0b33d4749de26828e2b,2024-06-04T19:21:05.063000 CVE-2024-5338,0,0,89168a7f7dbda5d5f11c938f5cea67ca543a537a0633e07e1ea1ce3fb43d8fd7,2024-06-04T19:21:05.170000 CVE-2024-5339,0,0,dff314e9f4c01abbc68b16981f5aeded8be46345bf871723981d333f3ae3b583,2024-06-04T19:21:05.273000 CVE-2024-5340,0,0,b7957b42011f8f774e1db1ddaec566846336d3063a4d70dd9b49754c316b8f99,2024-06-04T19:21:05.373000 CVE-2024-5341,0,0,2b72dd4ef57e598a2469a1d6786a4762ce0fcb8187c35f2f4bd1ff39b4044b7e,2024-05-30T13:15:41.297000 -CVE-2024-5342,0,0,26e0706b5dd53df24341fd3c9dfd9d8f4ed189b150edd1e8c5efca7bc950fd4e,2024-06-06T02:15:55.087000 +CVE-2024-5342,0,1,2ad102e094253384b79cb972f14f27186ce8a4683bb8eb4d7004a3553600b118,2024-06-06T14:17:35.017000 CVE-2024-5345,0,0,4ef09b351c74f9d110d594e3f259309be3bb624b771ff16733d9a7bb289d18d1,2024-05-31T13:01:46.727000 CVE-2024-5347,0,0,9a2a71210aaa051d4636ad0136ca45d374f37b52e66a2ab59e561ff84b7f7ab3,2024-05-31T13:01:46.727000 CVE-2024-5348,0,0,cdabb7de233f48a7127c4333bb3ba86c3b13ada38da5d506ab1226337e3a511b,2024-06-03T14:46:24.250000 @@ -252759,14 +252761,14 @@ CVE-2024-5434,0,0,dc2716eb218edba725ac85c17a2930de7a00b6563d0ca53040574106ea0b92 CVE-2024-5436,0,0,95eba267f429de080e9b35fcd14e1e1840b0308e404c32773ec35c18106c7cbc,2024-05-31T13:01:46.727000 CVE-2024-5437,0,0,551b020f0044e3ab584c14f08f0984900b4bc26534c92382eb6ac2bb660708ea,2024-06-04T19:21:09.363000 CVE-2024-5439,0,0,abaad0f03a42ef683e08fa0b9e3df38062d4c8e86744ed6e348d5f6378ac054e,2024-06-05T12:53:50.240000 -CVE-2024-5449,0,0,773627a4e9b7ce7854da3a1bdab1a87cb1217791ee4741b55a70b3e9119f77e8,2024-06-06T04:15:14.720000 +CVE-2024-5449,0,1,98f03fd41a859602711a787e6c6738ac5b4c6552335bab31c9f953ba2b79cc72,2024-06-06T14:17:35.017000 CVE-2024-5453,0,0,7c8641ed8daae70878106ab21b3cb2696b56b68c7012b2cceeb0fd9522a96b5d,2024-06-05T12:53:50.240000 -CVE-2024-5459,0,0,a6cce27e4bb0299dd2bb46d9d34dbfafbced52cf1ffe0ede9ae8efb94d391c96,2024-06-05T13:15:13.437000 +CVE-2024-5459,0,1,9ffec4e6ddf7de8eef808a13af7e4d67efb473b64a2ed4688c4272492e191c2e,2024-06-06T14:17:35.017000 CVE-2024-5463,0,0,a83ead02d534db419d64d9a246adc999062f3a690f2d2cbba14bffeb9debf0f5,2024-06-04T16:57:41.053000 CVE-2024-5483,0,0,88635ac2041f9699472eef4c51a5eb67a3fcf4378dec7f1a98452fd31b9eaa6a,2024-06-05T12:53:50.240000 CVE-2024-5484,0,0,7de35f8eee9232651ed147ec3168f6740617b1737ec3ff6913988b98b84f6ef1,2024-05-31T11:15:09.783000 CVE-2024-5485,0,0,dca0cc3d797ec50003ec75de23195400e6c002137c330b8a6fe7501d852f23b7,2024-06-04T16:57:41.053000 -CVE-2024-5489,1,1,4ffc930473fea439c17c2c7abcd7c7cda399e823d280847f422b0cb037534a77,2024-06-06T12:15:09.227000 +CVE-2024-5489,0,1,3329a69164f805119c8687504d6111efb9b1c20a59203f4c64e2907691564f5f,2024-06-06T14:17:35.017000 CVE-2024-5493,0,0,8180f9c7c83a7ebab82ac7c00536ed64f553bc96cb8ba2cddb06ad7e2d969883,2024-05-31T13:01:46.727000 CVE-2024-5494,0,0,c5eb3025aebdd04b962a5f5eeebf34876e16a2b3c2469f3bb5a7dcb42288ba78,2024-05-31T13:01:46.727000 CVE-2024-5495,0,0,36f3f532052cc191b5d9fd702a2e672002fe219b200f260251098e8a64e9a2da,2024-05-31T13:01:46.727000 @@ -252797,15 +252799,15 @@ CVE-2024-5587,0,0,9180b0762a5a5a7a17ce70cd861bdf25e955d88caf903bee442f7c48a0a2a2 CVE-2024-5588,0,0,21589c4423d1fee081cb695dd8009f3bd5a36bd74dae1713c28449f0da1cd8d1,2024-06-04T19:21:10.267000 CVE-2024-5589,0,0,dc63c38434ce5bb089af0d0f8aa09f6a46f1fae34dd45c15f4542741dea047b7,2024-06-03T14:46:24.250000 CVE-2024-5590,0,0,ca60332ff9933405c7b9b37e93d2404b53274b9ec741b4065c0c1eadbd60da94,2024-06-03T14:46:24.250000 -CVE-2024-5615,0,0,a6d0e34867dfc41954e48e4a2f34ad9f5238236f85dff6d1cdf3635185a9f202,2024-06-06T04:15:15.010000 -CVE-2024-5629,0,0,0300d7d81a2aecc3520dff4d6859e271dcddc80452b174865e98e97ce1d81452,2024-06-05T15:15:12.737000 +CVE-2024-5615,0,1,2b9f4fbf88dd4ea6ff55678ac9c0762fd6b29ae2ea4765ff6af29ac25e53e3d4,2024-06-06T14:17:35.017000 +CVE-2024-5629,0,1,2b19d175fd80b16aa424307957676ae3dd964a506cce5329fc9e2ea04d26ec96,2024-06-06T14:17:35.017000 CVE-2024-5635,0,0,2f4fd95f40cb43c9475682f37f78b479557c0ba40bc4b87c84bd3a410bdbca2c,2024-06-05T12:53:50.240000 CVE-2024-5636,0,0,ae2ff24a8e15c0ed795cb405ff4b68943ed8f15194eed9e4ca4bf581e03cae2a,2024-06-05T12:53:50.240000 -CVE-2024-5653,0,0,bda90fa1e35f426f58289868154624d48472d54436ea542dc77fcd4496e1f495,2024-06-05T21:15:15.247000 -CVE-2024-5656,0,0,725676261217df265b5d16c4df407014fb560c0237032897a4b92d5811c7ace6,2024-06-06T05:15:49.377000 -CVE-2024-5657,0,0,4aff170ef0376fc7ecf2238b8c030fc3b4f33f0bff6cf0598837ab0cf031aaa4,2024-06-06T11:15:49.277000 -CVE-2024-5658,0,0,0d888411cde4389c2c3487d978b000b6abbd30f2cf7d619206cbad26a6a79a3e,2024-06-06T11:15:49.573000 -CVE-2024-5665,0,0,1b03a5d290e3ee023b0301dd5df4281647072b42b0a6a98410bed3c16246a2bf,2024-06-06T08:15:40.153000 -CVE-2024-5673,0,0,4742bfdcfce3abd3b9dd71f4cb74c33a1ebd805b6a51f16c178c26c6c81cde47,2024-06-06T11:15:49.807000 -CVE-2024-5675,1,1,bdcff7f859ad16f6cd7aa3c3840d3d7c0515f88b2aa80ae7eb78ab43d0563612,2024-06-06T13:15:31.713000 -CVE-2024-5684,1,1,1bb19f8d82134cecc4477a5b8956cf5f7fb745e33a6765a7efa3f0e3d7a66741,2024-06-06T13:15:32.027000 +CVE-2024-5653,0,1,283076b6ccce08ae3d1ddf9d7f5983a839d66c80929543a8a527d0bfdf86a2f9,2024-06-06T14:17:35.017000 +CVE-2024-5656,0,1,adabf37f78545832b9e31783c044d8f042bfbaaca432946aa95ed82eb518777b,2024-06-06T14:17:35.017000 +CVE-2024-5657,0,1,b9899ab9d953b5e4a78b96db0691f3e8b536e92241286e49b6931592afb0dbef,2024-06-06T14:17:35.017000 +CVE-2024-5658,0,1,f9a4660898e79de730b34f0f4bc7034aff51985f481860d10ff11713ac36cafd,2024-06-06T14:17:35.017000 +CVE-2024-5665,0,1,bd958d396bb4ad35b63d57ac1176d92cc2fe04cdc3b5189c4ab55e781e3023c0,2024-06-06T14:17:35.017000 +CVE-2024-5673,0,1,b896d7e323904f9e987f87941609f4675d0746a7c5358db642d05671db0b87b4,2024-06-06T14:17:35.017000 +CVE-2024-5675,0,1,38acd8263eeb8d1e4c48e0984f055dd4606319e26fa8928f4d3e5881bdfd6563,2024-06-06T14:17:35.017000 +CVE-2024-5684,0,1,b2f8ad263f684025e461aeac45146ad505c13a2339a4851373464b5600c43386,2024-06-06T14:17:35.017000