Auto-Update: 2024-06-24T14:00:19.861010+00:00

This commit is contained in:
cad-safe-bot 2024-06-24 14:03:13 +00:00
parent 923d2a531c
commit 0be5ba9225
85 changed files with 1233 additions and 217 deletions

View File

@ -2,12 +2,16 @@
"id": "CVE-2012-6664",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-06-21T22:15:09.767",
"lastModified": "2024-06-21T22:15:09.767",
"vulnStatus": "Received",
"lastModified": "2024-06-24T12:57:36.513",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "Multiple directory traversal vulnerabilities in the TFTP Server in Distinct Intranet Servers 3.10 and earlier allow remote attackers to read or write arbitrary files via a .. (dot dot) in the (1) get or (2) put commands."
},
{
"lang": "es",
"value": "M\u00faltiples vulnerabilidades de directory traversal en el servidor TFTP en Distinct Intranet Servers 3.10 y anteriores permiten a atacantes remotos leer o escribir archivos de su elecci\u00f3n mediante un .. (punto punto) en los comandos (1) get o (2) put."
}
],
"metrics": {},

View File

@ -2,12 +2,16 @@
"id": "CVE-2014-5470",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-06-21T22:15:10.417",
"lastModified": "2024-06-21T22:15:10.417",
"vulnStatus": "Received",
"lastModified": "2024-06-24T12:57:36.513",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "Actual Analyzer through 2014-08-29 allows code execution via shell metacharacters because untrusted input is used for part of the input data passed to an eval operation."
},
{
"lang": "es",
"value": "Actual Analyzer hasta el 29 de agosto de 2014 permite la ejecuci\u00f3n de c\u00f3digo a trav\u00e9s de metacaracteres del shell porque se utilizan entradas que no son de confianza para parte de los datos de entrada pasados a una operaci\u00f3n de evaluaci\u00f3n."
}
],
"metrics": {},

View File

@ -2,12 +2,16 @@
"id": "CVE-2020-27352",
"sourceIdentifier": "security@ubuntu.com",
"published": "2024-06-21T20:15:10.630",
"lastModified": "2024-06-21T20:15:10.630",
"vulnStatus": "Received",
"lastModified": "2024-06-24T12:57:36.513",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "When generating the systemd service units for the docker snap (and other similar snaps), snapd does not specify Delegate=yes - as a result systemd will move processes from the containers created and managed by these snaps into the cgroup of the main daemon within the snap itself when reloading system units. This may grant additional privileges to a container within the snap that were not originally intended."
},
{
"lang": "es",
"value": "Al generar las unidades de servicio systemd para el complemento de Docker (y otros complementos similares), snapd no especifica Delegate=yes; como resultado, systemd mover\u00e1 los procesos de los contenedores creados y administrados por estos complementos al grupo c del daemon principal dentro del se rompe al recargar las unidades del sistema. Esto puede otorgar privilegios adicionales a un contenedor dentro del complemento que no estaban previstos originalmente."
}
],
"metrics": {

View File

@ -2,12 +2,16 @@
"id": "CVE-2022-42974",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-06-21T22:15:10.557",
"lastModified": "2024-06-21T22:15:10.557",
"vulnStatus": "Received",
"lastModified": "2024-06-24T12:57:36.513",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "In Kostal PIKO 1.5-1 MP plus HMI OEM p 1.0.1, the web application for the Solar Panel is vulnerable to a Stored Cross-Site Scripting (XSS) attack on /file.bootloader.upload.html. The application fails to sanitize the parameter filename, in a POST request to /file.bootloader.upload.html for a system update, thus allowing one to inject HTML and/or JavaScript on the page that will then be processed and stored by the application. Any subsequent requests to pages that retrieve the malicious content will automatically exploit the vulnerability on the victim's browser. This also happens because the tag is loaded in the function innerHTML in the page HTML."
},
{
"lang": "es",
"value": "En Kostal PIKO 1.5-1 MP plus HMI OEM p 1.0.1, la aplicaci\u00f3n web para el panel solar es vulnerable a un ataque de Cross-Site Scripting Almacenado (XSS) en /file.bootloader.upload.html. La aplicaci\u00f3n no puede sanitizar el nombre del archivo del par\u00e1metro, en una solicitud POST a /file.bootloader.upload.html para una actualizaci\u00f3n del sistema, lo que permite inyectar HTML y/o JavaScript en la p\u00e1gina que luego ser\u00e1 procesada y almacenada por la aplicaci\u00f3n. Cualquier solicitud posterior a p\u00e1ginas que recuperen contenido malicioso explotar\u00e1 autom\u00e1ticamente la vulnerabilidad en el navegador de la v\u00edctima. Esto tambi\u00e9n sucede porque la etiqueta se carga en la funci\u00f3n InnerHTML en la p\u00e1gina HTML."
}
],
"metrics": {},

View File

@ -2,12 +2,16 @@
"id": "CVE-2023-37898",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-06-21T20:15:11.583",
"lastModified": "2024-06-21T20:15:11.583",
"vulnStatus": "Received",
"lastModified": "2024-06-24T12:57:36.513",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "Joplin is a free, open source note taking and to-do application. A Cross-site Scripting (XSS) vulnerability allows an untrusted note opened in safe mode to execute arbitrary code. `packages/renderer/MarkupToHtml.ts` renders note content in safe mode by surrounding it with <pre> and </pre>, without escaping any interior HTML tags. Thus, an attacker can create a note that closes the opening <pre> tag, then includes HTML that runs JavaScript. Because the rendered markdown iframe has the same origin as the toplevel document and is not sandboxed, any scripts running in the preview iframe can access the top variable and, thus, access the toplevel NodeJS `require` function. `require` can then be used to import modules like fs or child_process and run arbitrary commands. This issue has been addressed in version 2.12.9 and all users are advised to upgrade. There are no known workarounds for this vulnerability."
},
{
"lang": "es",
"value": "Joplin es una aplicaci\u00f3n gratuita y de c\u00f3digo abierto para tomar notas y tareas pendientes. Una vulnerabilidad de Cross-Site Scripting (XSS) permite que una nota que no es de confianza abierta en modo seguro ejecute c\u00f3digo arbitrario. `packages/renderer/MarkupToHtml.ts` muestra el contenido de la nota en modo seguro rode\u00e1ndolo con <pre> y </pre>, sin escapar de ninguna etiqueta HTML interior. Por lo tanto, un atacante puede crear una nota que cierre la etiqueta <pre> de apertura y luego incluya HTML que ejecute JavaScript. Debido a que el iframe de rebajas renderizado tiene el mismo origen que el documento de nivel superior y no est\u00e1 en un espacio aislado, cualquier script que se ejecute en el iframe de vista previa puede acceder a la variable superior y, por lo tanto, acceder a la funci\u00f3n `require` de NodeJS de nivel superior. Luego, `require` se puede usar para importar m\u00f3dulos como fs o child_process y ejecutar comandos arbitrarios. Este problema se solucion\u00f3 en la versi\u00f3n 2.12.9 y se recomienda a todos los usuarios que actualicen. No se conocen workarounds para esta vulnerabilidad.</pre>"
}
],
"metrics": {

View File

@ -2,12 +2,16 @@
"id": "CVE-2023-38506",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-06-21T20:15:12.003",
"lastModified": "2024-06-21T20:15:12.003",
"vulnStatus": "Received",
"lastModified": "2024-06-24T12:57:36.513",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "Joplin is a free, open source note taking and to-do application. A Cross-site Scripting (XSS) vulnerability allows pasting untrusted data into the rich text editor to execute arbitrary code. HTML pasted into the rich text editor is not sanitized (or not sanitized properly). As such, the `onload` attribute of pasted images can execute arbitrary code. Because the TinyMCE editor frame does not use the `sandbox` attribute, such scripts can access NodeJS's `require` through the `top` variable. From this, an attacker can run arbitrary commands. This issue has been addressed in version 2.12.10 and users are advised to upgrade. There are no known workarounds for this vulnerability."
},
{
"lang": "es",
"value": "Joplin es una aplicaci\u00f3n gratuita y de c\u00f3digo abierto para tomar notas y tareas pendientes. Una vulnerabilidad de Cross-Site Scripting (XSS) permite pegar datos que no son de confianza en el editor de texto enriquecido para ejecutar c\u00f3digo arbitrario. El HTML pegado en el editor de texto enriquecido no se sanitiza (o no se sanitiza correctamente). Como tal, el atributo \"onload\" de las im\u00e1genes pegadas puede ejecutar c\u00f3digo arbitrario. Debido a que el marco del editor TinyMCE no utiliza el atributo `sandbox`, dichos scripts pueden acceder al `require` de NodeJS a trav\u00e9s de la variable `top`. A partir de esto, un atacante puede ejecutar comandos arbitrarios. Este problema se solucion\u00f3 en la versi\u00f3n 2.12.10 y se recomienda a los usuarios que actualicen. No se conocen workarounds para esta vulnerabilidad."
}
],
"metrics": {

View File

@ -2,12 +2,16 @@
"id": "CVE-2023-39517",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-06-21T20:15:12.307",
"lastModified": "2024-06-21T20:15:12.307",
"vulnStatus": "Received",
"lastModified": "2024-06-24T12:57:36.513",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "Joplin is a free, open source note taking and to-do application. A Cross site scripting (XSS) vulnerability in affected versions allows clicking on an untrusted image link to execute arbitrary shell commands. The HTML sanitizer (`packages/renderer/htmlUtils.ts::sanitizeHtml`) preserves `<map>` `<area>` links. However, unlike `<a>` links, the `target` and `href` attributes are not removed. Additionally, because the note preview pane isn't sandboxed to prevent top navigation, links with `target` set to `_top` can replace the toplevel electron page. Because any toplevel electron page, with Joplin's setup, has access to `require` and can require node libraries, a malicious replacement toplevel page can import `child_process` and execute arbitrary shell commands. This issue has been fixed in commit 7c52c3e9a81a52ef1b42a951f9deb9d378d59b0f which is included in release version 2.12.8. Users are advised to upgrade. There are no known workarounds for this vulnerability."
},
{
"lang": "es",
"value": "Joplin es una aplicaci\u00f3n gratuita y de c\u00f3digo abierto para tomar notas y tareas pendientes. Una vulnerabilidad de Cross-Site Scripting (XSS) en las versiones afectadas permite hacer clic en un enlace de imagen que no es de confianza para ejecutar comandos de shell arbitrarios. El sanitizante HTML (`packages/renderer/htmlUtils.ts::sanitizeHtml`) conserva los enlaces `` ``. Sin embargo, a diferencia de los enlaces `<a rel=\"nofollow\">`, los atributos `target` y `href` no se eliminan. Adem\u00e1s, debido a que el panel de vista previa de notas no est\u00e1 protegido para evitar la navegaci\u00f3n superior, los enlaces con \"destino\" configurado en \"_top\" pueden reemplazar la p\u00e1gina electr\u00f3nica de nivel superior. Debido a que cualquier p\u00e1gina electr\u00f3nica de nivel superior, con la configuraci\u00f3n de Joplin, tiene acceso a `require` y puede requerir librer\u00edas de nodos, una p\u00e1gina de nivel superior de reemplazo maliciosa puede importar `child_process` y ejecutar comandos de shell arbitrarios. Este problema se solucion\u00f3 en el commit 7c52c3e9a81a52ef1b42a951f9deb9d378d59b0f que se incluye en la versi\u00f3n 2.12.8. Se recomienda a los usuarios que actualicen. No se conocen workarounds para esta vulnerabilidad.</a>"
}
],
"metrics": {

View File

@ -2,12 +2,16 @@
"id": "CVE-2023-45673",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-06-21T20:15:12.620",
"lastModified": "2024-06-21T20:15:12.620",
"vulnStatus": "Received",
"lastModified": "2024-06-24T12:57:36.513",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "Joplin is a free, open source note taking and to-do application. A remote code execution (RCE) vulnerability in affected versions allows clicking on a link in a PDF in an untrusted note to execute arbitrary shell commands. Clicking links in PDFs allows for arbitrary code execution because Joplin desktop: 1. has not disabled top redirection for note viewer iframes, and 2. and has node integration enabled. This is a remote code execution vulnerability that impacts anyone who attaches untrusted PDFs to notes and has the icon enabled. This issue has been addressed in version 2.13.3. Users are advised to upgrade. There are no known workarounds for this vulnerability."
},
{
"lang": "es",
"value": "Joplin es una aplicaci\u00f3n gratuita y de c\u00f3digo abierto para tomar notas y tareas pendientes. Una vulnerabilidad de ejecuci\u00f3n remota de c\u00f3digo (RCE) en las versiones afectadas permite hacer clic en un enlace en un PDF en una nota que no es de confianza para ejecutar comandos de shell arbitrarios. Hacer clic en enlaces en archivos PDF permite la ejecuci\u00f3n de c\u00f3digo arbitrario porque el escritorio Joplin: 1. no ha deshabilitado la redirecci\u00f3n superior para los iframes del visor de notas, y 2. y tiene habilitada la integraci\u00f3n de nodos. Esta es una vulnerabilidad de ejecuci\u00f3n remota de c\u00f3digo que afecta a cualquiera que adjunte archivos PDF que no sean de confianza a notas y tenga el \u00edcono habilitado. Este problema se solucion\u00f3 en la versi\u00f3n 2.13.3. Se recomienda a los usuarios que actualicen. No se conocen workarounds para esta vulnerabilidad."
}
],
"metrics": {

View File

@ -2,12 +2,16 @@
"id": "CVE-2024-21514",
"sourceIdentifier": "report@snyk.io",
"published": "2024-06-22T05:15:09.637",
"lastModified": "2024-06-22T05:15:09.637",
"vulnStatus": "Received",
"lastModified": "2024-06-24T12:57:36.513",
"vulnStatus": "Undergoing Analysis",
"descriptions": [
{
"lang": "en",
"value": "This affects versions of the package opencart/opencart from 0.0.0. An SQL Injection issue was identified in the Divido payment extension for OpenCart, which is included by default in version 3.0.3.9. As an anonymous unauthenticated user, if the Divido payment module is installed (it does not have to be enabled), it is possible to exploit SQL injection to gain unauthorised access to the backend database. For any site which is vulnerable, any unauthenticated user could exploit this to dump the entire OpenCart database, including customer PII data."
},
{
"lang": "es",
"value": "Esto afecta a las versiones del paquete opencart/opencart desde 0.0.0. Se identific\u00f3 un problema de inyecci\u00f3n SQL en la extensi\u00f3n de pago Divido para OpenCart, que se incluye de forma predeterminada en la versi\u00f3n 3.0.3.9. Como usuario an\u00f3nimo no autenticado, si el m\u00f3dulo de pago Divido est\u00e1 instalado (no es necesario habilitarlo), es posible aprovechar la inyecci\u00f3n SQL para obtener acceso no autorizado a la base de datos backend. Para cualquier sitio que sea vulnerable, cualquier usuario no autenticado podr\u00eda aprovechar esto para volcar toda la base de datos de OpenCart, incluidos los datos de PII del cliente."
}
],
"metrics": {

View File

@ -2,12 +2,16 @@
"id": "CVE-2024-21515",
"sourceIdentifier": "report@snyk.io",
"published": "2024-06-22T05:15:10.730",
"lastModified": "2024-06-22T05:15:10.730",
"vulnStatus": "Received",
"lastModified": "2024-06-24T12:57:36.513",
"vulnStatus": "Undergoing Analysis",
"descriptions": [
{
"lang": "en",
"value": "This affects versions of the package opencart/opencart from 4.0.0.0. A reflected XSS issue was identified in the filename parameter of the admin tool/log route. An attacker could obtain a user's token by tricking the user to click on a maliciously crafted URL. The user is then prompted to login and redirected again upon authentication with the payload automatically executing. If the attacked user has admin privileges, this vulnerability could be used as the start of a chain of exploits like Zip Slip or arbitrary file write vulnerabilities in the admin functionality.\r\r**Notes:**\r\r1) This is only exploitable if the attacker knows the name or path of the admin directory. The name of the directory is \"admin\" by default but there is a pop-up in the dashboard warning users to rename it.\r\r2) The fix for this vulnerability is incomplete. The redirect is removed so that it is not possible for an attacker to control the redirect post admin login anymore, but it is still possible to exploit this issue in admin if the user is authenticated as an admin already."
},
{
"lang": "es",
"value": "Esto afecta a las versiones del paquete opencart/opencart desde 4.0.0.0. Se identific\u00f3 un problema XSS reflejado en el par\u00e1metro de nombre de archivo de la herramienta de administraci\u00f3n/ruta de registro. Un atacante podr\u00eda obtener el token de un usuario enga\u00f1\u00e1ndolo para que haga clic en una URL creada con fines malintencionados. Luego se solicita al usuario que inicie sesi\u00f3n y se le redirige nuevamente tras la autenticaci\u00f3n y la carga \u00fatil se ejecuta autom\u00e1ticamente. Si el usuario atacado tiene privilegios de administrador, esta vulnerabilidad podr\u00eda usarse como el inicio de una cadena de exploits como Zip Slip o vulnerabilidades de escritura de archivos arbitrarios en la funcionalidad de administraci\u00f3n. **Notas:** 1) Esto solo se puede explotar si el atacante conoce el nombre o la ruta del directorio de administraci\u00f3n. El nombre del directorio es \"admin\" de forma predeterminada, pero hay una ventana emergente en el panel que advierte a los usuarios que le cambien el nombre. 2) La soluci\u00f3n para esta vulnerabilidad est\u00e1 incompleta. El redireccionamiento se elimina para que un atacante ya no pueda controlar el inicio de sesi\u00f3n del administrador posterior al redireccionamiento, pero a\u00fan es posible explotar este problema en el administrador si el usuario ya est\u00e1 autenticado como administrador."
}
],
"metrics": {

View File

@ -2,12 +2,16 @@
"id": "CVE-2024-21516",
"sourceIdentifier": "report@snyk.io",
"published": "2024-06-22T05:15:10.967",
"lastModified": "2024-06-22T05:15:10.967",
"vulnStatus": "Received",
"lastModified": "2024-06-24T12:57:36.513",
"vulnStatus": "Undergoing Analysis",
"descriptions": [
{
"lang": "en",
"value": "This affects versions of the package opencart/opencart from 4.0.0.0. A reflected XSS issue was identified in the directory parameter of admin common/filemanager.list route. An attacker could obtain a user's token by tricking the user to click on a maliciously crafted URL. The user is then prompted to login and redirected again upon authentication with the payload automatically executing. If the attacked user has admin privileges, this vulnerability could be used as the start of a chain of exploits like Zip Slip or arbitrary file write vulnerabilities in the admin functionality.\r\r**Notes:**\r\r1) This is only exploitable if the attacker knows the name or path of the admin directory. The name of the directory is \"admin\" by default but there is a pop-up in the dashboard warning users to rename it.\r\r2) The fix for this vulnerability is incomplete. The redirect is removed so that it is not possible for an attacker to control the redirect post admin login anymore, but it is still possible to exploit this issue in admin if the user is authenticated as an admin already."
},
{
"lang": "es",
"value": "Esto afecta a las versiones del paquete opencart/opencart desde 4.0.0.0. Se identific\u00f3 un problema XSS reflejado en el par\u00e1metro de directorio de la ruta admin common/filemanager.list. Un atacante podr\u00eda obtener el token de un usuario enga\u00f1\u00e1ndolo para que haga clic en una URL creada con fines malintencionados. Luego se solicita al usuario que inicie sesi\u00f3n y se le redirige nuevamente tras la autenticaci\u00f3n y la carga \u00fatil se ejecuta autom\u00e1ticamente. Si el usuario atacado tiene privilegios de administrador, esta vulnerabilidad podr\u00eda usarse como el inicio de una cadena de exploits como Zip Slip o vulnerabilidades de escritura de archivos arbitrarios en la funcionalidad de administraci\u00f3n. **Notas:** 1) Esto solo se puede explotar si el atacante conoce el nombre o la ruta del directorio de administraci\u00f3n. El nombre del directorio es \"admin\" de forma predeterminada, pero hay una ventana emergente en el panel que advierte a los usuarios que le cambien el nombre. 2) La soluci\u00f3n para esta vulnerabilidad est\u00e1 incompleta. El redireccionamiento se elimina para que un atacante ya no pueda controlar el inicio de sesi\u00f3n del administrador posterior al redireccionamiento, pero a\u00fan es posible explotar este problema en el administrador si el usuario ya est\u00e1 autenticado como administrador."
}
],
"metrics": {

View File

@ -2,12 +2,16 @@
"id": "CVE-2024-21517",
"sourceIdentifier": "report@snyk.io",
"published": "2024-06-22T05:15:11.173",
"lastModified": "2024-06-22T05:15:11.173",
"vulnStatus": "Received",
"lastModified": "2024-06-24T12:57:36.513",
"vulnStatus": "Undergoing Analysis",
"descriptions": [
{
"lang": "en",
"value": "This affects versions of the package opencart/opencart from 4.0.0.0. A reflected XSS issue was identified in the redirect parameter of customer account/login route. An attacker can inject arbitrary HTML and Javascript into the page response. As this vulnerability is present in the account functionality it could be used to target and attack customers of the OpenCart shop.\r\r**Notes:**\r\r1) The fix for this vulnerability is incomplete"
},
{
"lang": "es",
"value": "Esto afecta a las versiones del paquete opencart/opencart desde 4.0.0.0. Se identific\u00f3 un problema de XSS reflejado en el par\u00e1metro de redireccionamiento de la cuenta del cliente/ruta de inicio de sesi\u00f3n. Un atacante puede inyectar HTML y Javascript arbitrarios en la respuesta de la p\u00e1gina. Como esta vulnerabilidad est\u00e1 presente en la funcionalidad de la cuenta, podr\u00eda usarse para apuntar y atacar a los clientes de la tienda OpenCart. **Notas:** 1) La soluci\u00f3n para esta vulnerabilidad est\u00e1 incompleta"
}
],
"metrics": {

View File

@ -2,12 +2,16 @@
"id": "CVE-2024-21518",
"sourceIdentifier": "report@snyk.io",
"published": "2024-06-22T05:15:11.403",
"lastModified": "2024-06-22T05:15:11.403",
"vulnStatus": "Received",
"lastModified": "2024-06-24T12:57:36.513",
"vulnStatus": "Undergoing Analysis",
"descriptions": [
{
"lang": "en",
"value": "This affects versions of the package opencart/opencart from 4.0.0.0. A Zip Slip issue was identified via the marketplace installer due to improper sanitization of the target path, allowing files within a malicious archive to traverse the filesystem and be extracted to arbitrary locations. An attacker can create arbitrary files in the web root of the application and overwrite other existing files by exploiting this vulnerability."
},
{
"lang": "es",
"value": "Esto afecta a las versiones del paquete opencart/opencart desde 4.0.0.0. Se identific\u00f3 un problema de Zip Slip a trav\u00e9s del instalador del mercado debido a una sanitizaci\u00f3n inadecuada de la ruta de destino, lo que permite que los archivos dentro de un archivo malicioso atraviesen el sistema de archivos y se extraigan a ubicaciones arbitrarias. Un atacante puede crear archivos arbitrarios en la ra\u00edz web de la aplicaci\u00f3n y sobrescribir otros archivos existentes aprovechando esta vulnerabilidad."
}
],
"metrics": {

View File

@ -2,12 +2,16 @@
"id": "CVE-2024-21519",
"sourceIdentifier": "report@snyk.io",
"published": "2024-06-22T05:15:11.620",
"lastModified": "2024-06-22T05:15:11.620",
"vulnStatus": "Received",
"lastModified": "2024-06-24T12:57:36.513",
"vulnStatus": "Undergoing Analysis",
"descriptions": [
{
"lang": "en",
"value": "This affects versions of the package opencart/opencart from 4.0.0.0. An Arbitrary File Creation issue was identified via the database restoration functionality. By injecting PHP code into the database, an attacker with admin privileges can create a backup file with an arbitrary filename (including the extension), within /system/storage/backup.\r\r**Note:**\r\rIt is less likely for the created file to be available within the web root, as part of the security recommendations for the application suggest moving the storage path outside of the web root."
},
{
"lang": "es",
"value": "Esto afecta a las versiones del paquete opencart/opencart desde 4.0.0.0. Se identific\u00f3 un problema de creaci\u00f3n arbitraria de archivos mediante la funcionalidad de restauraci\u00f3n de la base de datos. Al inyectar c\u00f3digo PHP en la base de datos, un atacante con privilegios de administrador puede crear un archivo de copia de seguridad con un nombre de archivo arbitrario (incluida la extensi\u00f3n), dentro de /system/storage/backup. **Nota:** Es menos probable que el archivo creado est\u00e9 disponible en la ra\u00edz web, ya que parte de las recomendaciones de seguridad para la aplicaci\u00f3n sugieren mover la ruta de almacenamiento fuera de la ra\u00edz web."
}
],
"metrics": {

View File

@ -2,12 +2,16 @@
"id": "CVE-2024-24550",
"sourceIdentifier": "vulnerability@ncsc.ch",
"published": "2024-06-24T07:15:13.580",
"lastModified": "2024-06-24T07:15:13.580",
"vulnStatus": "Received",
"lastModified": "2024-06-24T12:57:36.513",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "A security vulnerability has been identified in Bludit, allowing attackers with knowledge of the API token to upload arbitrary files through the File API which leads to arbitrary code execution on the server. This vulnerability arises from improper handling of file uploads, enabling malicious actors to upload and execute PHP files."
},
{
"lang": "es",
"value": "Se ha identificado una vulnerabilidad de seguridad en Bludit, que permite a atacantes con conocimiento del token API cargar archivos arbitrarios a trav\u00e9s de File API, lo que conduce a la ejecuci\u00f3n de c\u00f3digo arbitrario en el servidor. Esta vulnerabilidad surge del manejo inadecuado de la carga de archivos, lo que permite a actores malintencionados cargar y ejecutar archivos PHP."
}
],
"metrics": {},

View File

@ -2,12 +2,16 @@
"id": "CVE-2024-24551",
"sourceIdentifier": "vulnerability@ncsc.ch",
"published": "2024-06-24T07:15:14.760",
"lastModified": "2024-06-24T07:15:14.760",
"vulnStatus": "Received",
"lastModified": "2024-06-24T12:57:36.513",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "A security vulnerability has been identified in Bludit, allowing authenticated attackers to execute arbitrary code through the Image API. This vulnerability arises from improper handling of file uploads, enabling malicious actors to upload and execute PHP files."
},
{
"lang": "es",
"value": "Se ha identificado una vulnerabilidad de seguridad en Bludit, que permite a atacantes autenticados ejecutar c\u00f3digo arbitrario a trav\u00e9s de Image API. Esta vulnerabilidad surge del manejo inadecuado de la carga de archivos, lo que permite a actores malintencionados cargar y ejecutar archivos PHP."
}
],
"metrics": {},

View File

@ -2,12 +2,16 @@
"id": "CVE-2024-24552",
"sourceIdentifier": "vulnerability@ncsc.ch",
"published": "2024-06-24T07:15:14.903",
"lastModified": "2024-06-24T07:15:14.903",
"vulnStatus": "Received",
"lastModified": "2024-06-24T12:57:36.513",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "A session fixation vulnerability in Bludit allows an attacker to bypass the server's authentication if they can trick an administrator or any other user into authorizing a session ID of their choosing."
},
{
"lang": "es",
"value": "Una vulnerabilidad de fijaci\u00f3n de sesi\u00f3n en Bludit permite a un atacante eludir la autenticaci\u00f3n del servidor si puede enga\u00f1ar a un administrador o cualquier otro usuario para que autorice una ID de sesi\u00f3n de su elecci\u00f3n."
}
],
"metrics": {},

View File

@ -2,12 +2,16 @@
"id": "CVE-2024-24553",
"sourceIdentifier": "vulnerability@ncsc.ch",
"published": "2024-06-24T07:15:15.063",
"lastModified": "2024-06-24T07:15:15.063",
"vulnStatus": "Received",
"lastModified": "2024-06-24T12:57:36.513",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "Bludit uses the SHA-1 hashing algorithm to compute password hashes. Thus, attackers could determine cleartext passwords with brute-force attacks due to the inherent speed of SHA-1. In addition, the salt that is computed by Bludit is generated with a non-cryptographically secure function."
},
{
"lang": "es",
"value": "Bludit utiliza el algoritmo hash SHA-1 para calcular hashes de contrase\u00f1as. Por lo tanto, los atacantes podr\u00edan determinar contrase\u00f1as de texto sin cifrar con ataques de fuerza bruta debido a la velocidad inherente de SHA-1. Adem\u00e1s, la sal que calcula Bludit se genera con una funci\u00f3n no criptogr\u00e1ficamente segura."
}
],
"metrics": {},

View File

@ -2,12 +2,16 @@
"id": "CVE-2024-24554",
"sourceIdentifier": "vulnerability@ncsc.ch",
"published": "2024-06-24T08:15:09.130",
"lastModified": "2024-06-24T08:15:09.130",
"vulnStatus": "Received",
"lastModified": "2024-06-24T12:57:36.513",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "Bludit uses predictable methods in combination with the MD5 hashing algorithm to generate sensitive tokens such as the API token and the user token. This allows attackers to authenticate against the Bludit API."
},
{
"lang": "es",
"value": "Bludit utiliza m\u00e9todos predecibles en combinaci\u00f3n con el algoritmo hash MD5 para generar tokens confidenciales, como el token API y el token de usuario. Esto permite a los atacantes autenticarse en la API de Bludit."
}
],
"metrics": {},

View File

@ -2,12 +2,16 @@
"id": "CVE-2024-2484",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-06-22T02:15:44.940",
"lastModified": "2024-06-22T02:15:44.940",
"vulnStatus": "Received",
"lastModified": "2024-06-24T12:57:36.513",
"vulnStatus": "Undergoing Analysis",
"descriptions": [
{
"lang": "en",
"value": "The Orbit Fox by ThemeIsle plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the Services and Post Type Grid widgets in all versions up to, and including, 2.10.34 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page."
},
{
"lang": "es",
"value": "El complemento Orbit Fox de ThemeIsle para WordPress es vulnerable a Cross-Site Scripting Almacenado a trav\u00e9s de los widgets Servicios y Cuadr\u00edcula de tipo de publicaci\u00f3n en todas las versiones hasta la 2.10.34 incluida debido a una sanitizaci\u00f3n de entrada y un escape de salida insuficientes. Esto hace posible que atacantes autenticados, con acceso de nivel de colaborador y superior, inyecten scripts web arbitrarios en p\u00e1ginas que se ejecutar\u00e1n cada vez que un usuario acceda a una p\u00e1gina inyectada."
}
],
"metrics": {

View File

@ -2,12 +2,16 @@
"id": "CVE-2024-27136",
"sourceIdentifier": "security@apache.org",
"published": "2024-06-24T08:15:09.297",
"lastModified": "2024-06-24T08:15:09.297",
"vulnStatus": "Received",
"lastModified": "2024-06-24T12:57:36.513",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "XSS in Upload page in Apache JSPWiki 2.12.1 and priors allows the attacker to execute javascript in the victim's browser and get some sensitive information about the victim. Apache JSPWiki users should upgrade to 2.12.2 or later. "
},
{
"lang": "es",
"value": "XSS en la p\u00e1gina de carga en Apache JSPWiki 2.12.1 y versiones anteriores permite al atacante ejecutar javascript en el navegador de la v\u00edctima y obtener informaci\u00f3n confidencial sobre la v\u00edctima. Los usuarios de Apache JSPWiki deben actualizar a 2.12.2 o posterior."
}
],
"metrics": {},

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-29868",
"sourceIdentifier": "security@apache.org",
"published": "2024-06-24T10:15:09.387",
"lastModified": "2024-06-24T10:15:09.387",
"vulnStatus": "Received",
"lastModified": "2024-06-24T12:57:36.513",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,12 +2,16 @@
"id": "CVE-2024-3121",
"sourceIdentifier": "security@huntr.dev",
"published": "2024-06-24T00:15:09.680",
"lastModified": "2024-06-24T00:15:09.680",
"vulnStatus": "Received",
"lastModified": "2024-06-24T12:57:36.513",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "A remote code execution vulnerability exists in the create_conda_env function of the parisneo/lollms repository, version 5.9.0. The vulnerability arises from the use of shell=True in the subprocess.Popen function, which allows an attacker to inject arbitrary commands by manipulating the env_name and python_version parameters. This issue could lead to a serious security breach as demonstrated by the ability to execute the 'whoami' command among potentially other harmful commands."
},
{
"lang": "es",
"value": "Existe una vulnerabilidad de ejecuci\u00f3n remota de c\u00f3digo en la funci\u00f3n create_conda_env del repositorio parisneo/lollms, versi\u00f3n 5.9.0. La vulnerabilidad surge del uso de shell=True en la funci\u00f3n subprocess.Popen, que permite a un atacante inyectar comandos arbitrarios manipulando los par\u00e1metros env_name y python_version. Este problema podr\u00eda provocar una grave violaci\u00f3n de la seguridad, como lo demuestra la capacidad de ejecutar el comando \"whoami\" entre otros comandos potencialmente da\u00f1inos."
}
],
"metrics": {

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2024-3264",
"sourceIdentifier": "iletisim@usom.gov.tr",
"published": "2024-06-24T13:15:11.627",
"lastModified": "2024-06-24T13:15:11.627",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Use of a Broken or Risky Cryptographic Algorithm vulnerability in Mia Technology Inc. Mia-Med Health Aplication allows Signature Spoofing by Improper Validation.This issue affects Mia-Med Health Aplication: before 1.0.14."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "iletisim@usom.gov.tr",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 3.9,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "iletisim@usom.gov.tr",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-327"
}
]
}
],
"references": [
{
"url": "https://www.usom.gov.tr/bildirim/tr-24-0765",
"source": "iletisim@usom.gov.tr"
}
]
}

View File

@ -2,12 +2,16 @@
"id": "CVE-2024-34452",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-06-21T22:15:10.877",
"lastModified": "2024-06-21T22:15:10.877",
"vulnStatus": "Received",
"lastModified": "2024-06-24T12:57:36.513",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "CMSimple_XH 1.7.6 allows XSS by uploading a crafted SVG document."
},
{
"lang": "es",
"value": "CMSimple_XH 1.7.6 permite XSS cargando un documento SVG manipulado."
}
],
"metrics": {},

View File

@ -2,12 +2,16 @@
"id": "CVE-2024-34989",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-06-21T22:15:10.947",
"lastModified": "2024-06-21T22:15:10.947",
"vulnStatus": "Received",
"lastModified": "2024-06-24T12:57:36.513",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "In the module RSI PDF/HTML catalog evolution (prestapdf) <= 7.0.0 from RSI for PrestaShop, a guest can perform SQL injection via `PrestaPDFProductListModuleFrontController::queryDb().'"
},
{
"lang": "es",
"value": "En el m\u00f3dulo Evoluci\u00f3n del cat\u00e1logo RSI PDF/HTML (prestapdf) &lt;= 7.0.0 de RSI para PrestaShop, un invitado puede realizar una inyecci\u00f3n SQL a trav\u00e9s de `PrestaPDFProductListModuleFrontController::queryDb().'"
}
],
"metrics": {},

View File

@ -2,12 +2,16 @@
"id": "CVE-2024-3593",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-06-22T06:15:09.683",
"lastModified": "2024-06-22T06:15:09.683",
"vulnStatus": "Received",
"lastModified": "2024-06-24T12:57:36.513",
"vulnStatus": "Undergoing Analysis",
"descriptions": [
{
"lang": "en",
"value": "The UberMenu plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 3.8.3. This is due to missing or incorrect nonce validation on the ubermenu_delete_all_item_settings and ubermenu_reset_settings functions. This makes it possible for unauthenticated attackers to delete and reset the plugin's settings via a forged request granted they can trick a site administrator into performing an action such as clicking on a link."
},
{
"lang": "es",
"value": "El complemento UberMenu para WordPress es vulnerable a Cross-Site Request Forgery en todas las versiones hasta la 3.8.3 incluida. Esto se debe a una validaci\u00f3n nonce faltante o incorrecta en las funciones ubermenu_delete_all_item_settings y ubermenu_reset_settings. Esto hace posible que atacantes no autenticados eliminen y restablezcan la configuraci\u00f3n del complemento mediante una solicitud falsificada, siempre que puedan enga\u00f1ar al administrador del sitio para que realice una acci\u00f3n como hacer clic en un enlace."
}
],
"metrics": {

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2024-36038",
"sourceIdentifier": "0fc0942c-577d-436f-ae8e-945763c79b02",
"published": "2024-06-24T12:15:09.630",
"lastModified": "2024-06-24T12:57:36.513",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "Zoho ManageEngine ITOM products versions from\u00a0128234 to 128248 are affected by the stored cross-site scripting vulnerability in the proxy server option."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "0fc0942c-577d-436f-ae8e-945763c79b02",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:H/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "HIGH",
"availabilityImpact": "NONE",
"baseScore": 6.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.1,
"impactScore": 4.2
}
]
},
"weaknesses": [
{
"source": "0fc0942c-577d-436f-ae8e-945763c79b02",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://www.manageengine.com/itom/advisory/cve-2024-36038.html",
"source": "0fc0942c-577d-436f-ae8e-945763c79b02"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-36495",
"sourceIdentifier": "551230f0-3615-47bd-b7cc-93e92e730bbf",
"published": "2024-06-24T09:15:09.730",
"lastModified": "2024-06-24T09:15:09.730",
"vulnStatus": "Received",
"lastModified": "2024-06-24T12:57:36.513",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-36496",
"sourceIdentifier": "551230f0-3615-47bd-b7cc-93e92e730bbf",
"published": "2024-06-24T09:15:09.860",
"lastModified": "2024-06-24T09:15:09.860",
"vulnStatus": "Received",
"lastModified": "2024-06-24T12:57:36.513",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-36497",
"sourceIdentifier": "551230f0-3615-47bd-b7cc-93e92e730bbf",
"published": "2024-06-24T09:15:09.973",
"lastModified": "2024-06-24T09:15:09.973",
"vulnStatus": "Received",
"lastModified": "2024-06-24T12:57:36.513",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,12 +2,16 @@
"id": "CVE-2024-36532",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-06-21T22:15:11.020",
"lastModified": "2024-06-21T22:15:11.020",
"vulnStatus": "Received",
"lastModified": "2024-06-24T12:57:36.513",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "Insecure permissions in kruise v1.6.2 allows attackers to access sensitive data and escalate privileges by obtaining the service account's token."
},
{
"lang": "es",
"value": "Los permisos inseguros en Kruise v1.6.2 permiten a los atacantes acceder a datos confidenciales y escalar privilegios obteniendo el token de la cuenta de servicio."
}
],
"metrics": {},

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2024-37089",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-06-24T12:15:09.940",
"lastModified": "2024-06-24T12:57:36.513",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in StylemixThemes Consulting Elementor Widgets allows PHP Local File Inclusion.This issue affects Consulting Elementor Widgets: from n/a through 1.3.0."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.0,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 2.2,
"impactScore": 6.0
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-22"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/consulting-elementor-widgets/wordpress-consulting-elementor-widgets-plugin-1-3-0-unauthenticated-local-file-inclusion-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2024-37091",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-06-24T12:15:10.170",
"lastModified": "2024-06-24T12:57:36.513",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "Improper Neutralization of Special Elements used in a Command ('Command Injection') vulnerability in StylemixThemes Consulting Elementor Widgets allows OS Command Injection.This issue affects Consulting Elementor Widgets: from n/a through 1.3.0."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.9,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.1,
"impactScore": 6.0
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-77"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/consulting-elementor-widgets/wordpress-consulting-elementor-widgets-plugin-1-3-0-remote-code-execution-rce-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2024-37092",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-06-24T13:15:10.010",
"lastModified": "2024-06-24T13:15:10.010",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in StylemixThemes Consulting Elementor Widgets allows PHP Local File Inclusion.This issue affects Consulting Elementor Widgets: from n/a through 1.3.0."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.5,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 6.0
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-22"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/consulting-elementor-widgets/wordpress-consulting-elementor-widgets-plugin-1-3-0-local-file-inclusion-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2024-37107",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-06-24T13:15:10.247",
"lastModified": "2024-06-24T13:15:10.247",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Improper Privilege Management vulnerability in Membership Software WishList Member X allows Privilege Escalation.This issue affects WishList Member X: from n/a through 3.25.1."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-269"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/wishlist-member-x/wordpress-wishlist-member-x-plugin-3-25-1-authenticated-privilege-escalation-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2024-37109",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-06-24T13:15:10.483",
"lastModified": "2024-06-24T13:15:10.483",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Improper Control of Generation of Code ('Code Injection') vulnerability in Membership Software WishList Member X allows Code Injection.This issue affects WishList Member X: from n/a through 3.25.1."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.9,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.1,
"impactScore": 6.0
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-94"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/wishlist-member-x/wordpress-wishlist-member-x-plugin-3-25-1-authenticated-arbitrary-php-code-execution-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2024-37111",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-06-24T13:15:10.720",
"lastModified": "2024-06-24T13:15:10.720",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Missing Authorization vulnerability in Membership Software WishList Member X.This issue affects WishList Member X: from n/a through 3.25.1."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-862"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/wishlist-member-x/wordpress-wishlist-member-x-plugin-3-25-1-unauthenticated-denial-of-service-attack-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2024-37228",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-06-24T13:15:10.947",
"lastModified": "2024-06-24T13:15:10.947",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Improper Control of Generation of Code ('Code Injection') vulnerability in InstaWP Team InstaWP Connect allows Code Injection.This issue affects InstaWP Connect: from n/a through 0.1.0.38."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 10.0,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 6.0
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-94"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/instawp-connect/wordpress-instawp-connect-plugin-0-1-0-38-arbitrary-file-upload-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2024-37231",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-06-24T13:15:11.177",
"lastModified": "2024-06-24T13:15:11.177",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in Salon Booking System Salon booking system allows File Manipulation.This issue affects Salon booking system: from n/a through 9.9."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 8.6,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 4.0
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-22"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/salon-booking-system/wordpress-salon-booking-system-plugin-9-9-arbitrary-file-deletion-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2024-37233",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-06-24T13:15:11.400",
"lastModified": "2024-06-24T13:15:11.400",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Improper Authentication vulnerability in Play.Ht allows Accessing Functionality Not Properly Constrained by ACLs.This issue affects Play.Ht: from n/a through 3.6.4."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "LOW",
"baseScore": 4.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-287"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/play-ht/wordpress-play-ht-plugin-3-6-4-broken-access-control-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -2,12 +2,16 @@
"id": "CVE-2024-37654",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-06-21T22:15:11.087",
"lastModified": "2024-06-21T22:15:11.087",
"vulnStatus": "Received",
"lastModified": "2024-06-24T12:57:36.513",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "An issue in BAS-IP AV-01D, AV-01MD, AV-01MFD, AV-01ED, AV-01KD, AV-01BD, AV-01KBD, AV-02D, AV-02IDE, AV-02IDR, AV-02IPD, AV-02FDE, AV-02FDR, AV-03D, AV-03BD, AV-04AFD, AV-04ASD, AV-04FD, AV-04SD, AV-05FD, AV-05SD, AA-07BD, AA-07BDI, BA-04BD, BA-04MD, BA-08BD, BA-08MD, BA-12BD, BA-12MD, CR-02BD before 3.9.2 allows a remote attacker to obtain sensitive information via a crafted HTTP GET request."
},
{
"lang": "es",
"value": "Un problema en BAS-IP AV-01D, AV-01MD, AV-01MFD, AV-01ED, AV-01KD, AV-01BD, AV-01KBD, AV-02D, AV-02IDE, AV-02IDR, AV-02IPD, AV-02FDE, AV-02FDR, AV-03D, AV-03BD, AV-04AFD, AV-04ASD, AV-04FD, AV-04SD, AV-05FD, AV-05SD, AA-07BD, AA-07BDI, BA- 04BD, BA-04MD, BA-08BD, BA-08MD, BA-12BD, BA-12MD, CR-02BD anteriores a 3.9.2 permiten a un atacante remoto obtener informaci\u00f3n confidencial a trav\u00e9s de una solicitud HTTP GET manipulada."
}
],
"metrics": {},

View File

@ -2,12 +2,16 @@
"id": "CVE-2024-37694",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-06-21T22:15:11.157",
"lastModified": "2024-06-21T22:15:11.157",
"vulnStatus": "Received",
"lastModified": "2024-06-24T12:57:36.513",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "ArcGIS Enterprise Server 10.8.0 allows a remote attacker to obtain sensitive information because /arcgis/rest/services does not require authentication."
},
{
"lang": "es",
"value": "ArcGIS Enterprise Server 10.8.0 permite a un atacante remoto obtener informaci\u00f3n confidencial porque /arcgis/rest/services no requiere autenticaci\u00f3n."
}
],
"metrics": {},

View File

@ -2,12 +2,16 @@
"id": "CVE-2024-38319",
"sourceIdentifier": "psirt@us.ibm.com",
"published": "2024-06-22T19:15:09.070",
"lastModified": "2024-06-22T19:15:09.070",
"vulnStatus": "Received",
"lastModified": "2024-06-24T12:57:36.513",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "IBM Security SOAR 51.0.2.0 could allow an authenticated user to execute malicious code loaded from a specially crafted script. IBM X-Force ID: 294830."
},
{
"lang": "es",
"value": "IBM Security SOAR 51.0.2.0 podr\u00eda permitir que un usuario autenticado ejecute c\u00f3digo malicioso cargado desde un script especialmente manipulado. ID de IBM X-Force: 294830."
}
],
"metrics": {

View File

@ -2,12 +2,16 @@
"id": "CVE-2024-38379",
"sourceIdentifier": "security@apache.org",
"published": "2024-06-22T09:15:09.577",
"lastModified": "2024-06-22T09:15:09.577",
"vulnStatus": "Received",
"lastModified": "2024-06-24T12:57:36.513",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "Apache Allura's neighborhood settings are vulnerable to a stored XSS attack.\u00a0 Only neighborhood admins can access these settings, so the scope of risk is limited to configurations where neighborhood admins are not fully trusted.\n\nThis issue affects Apache Allura: from 1.4.0 through 1.17.0.\n\nUsers are recommended to upgrade to version 1.17.1, which fixes the issue.\n\n"
},
{
"lang": "es",
"value": "La configuraci\u00f3n del vecindario de Apache Allura es vulnerable a un ataque XSS almacenado. Solo los administradores de vecindario pueden acceder a estas configuraciones, por lo que el alcance del riesgo se limita a configuraciones en las que no se conf\u00eda plenamente en los administradores de vecindario. Este problema afecta a Apache Allura: desde 1.4.0 hasta 1.17.0. Se recomienda a los usuarios actualizar a la versi\u00f3n 1.17.1, que soluciona el problema."
}
],
"metrics": {},

View File

@ -2,12 +2,16 @@
"id": "CVE-2024-39331",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-06-23T22:15:09.370",
"lastModified": "2024-06-23T22:15:09.370",
"vulnStatus": "Received",
"lastModified": "2024-06-24T12:57:36.513",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "In Emacs before 29.4, org-link-expand-abbrev in lisp/ol.el expands a %(...) link abbrev even when it specifies an unsafe function, such as shell-command-to-string. This affects Org Mode before 9.7.5."
},
{
"lang": "es",
"value": "En Emacs anterior a 29.4, org-link-expand-abbrev en lisp/ol.el expande una abreviatura de enlace %(...) incluso cuando especifica una funci\u00f3n no segura, como shell-command-to-string. Esto afecta al modo de organizaci\u00f3n anterior a 9.7.5."
}
],
"metrics": {},

View File

@ -2,12 +2,16 @@
"id": "CVE-2024-39334",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-06-23T23:15:09.387",
"lastModified": "2024-06-23T23:15:09.387",
"vulnStatus": "Received",
"lastModified": "2024-06-24T12:57:36.513",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "MENDELSON AS4 before 2024 B376 has a client-side vulnerability when a trading partner provides prepared XML data. When a victim opens the details of this transaction in the client, files can be written to the computer on which the client process is running. (The server process is not affected.)"
},
{
"lang": "es",
"value": "MENDELSON AS4 antes de 2024 B376 tiene una vulnerabilidad del lado del cliente cuando un socio comercial proporciona datos XML preparados. Cuando una v\u00edctima abre los detalles de esta transacci\u00f3n en el cliente, se pueden escribir archivos en la computadora en la que se ejecuta el proceso del cliente. (El proceso del servidor no se ve afectado)."
}
],
"metrics": {},

View File

@ -2,12 +2,16 @@
"id": "CVE-2024-39337",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-06-24T00:15:09.577",
"lastModified": "2024-06-24T00:15:09.577",
"vulnStatus": "Received",
"lastModified": "2024-06-24T12:57:36.513",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "Click Studios Passwordstate Core before 9.8 build 9858 allows Authentication Bypass."
},
{
"lang": "es",
"value": "Click Studios Passwordstate Core anterior a la versi\u00f3n 9.8 build 9858 permite la omisi\u00f3n de autenticaci\u00f3n."
}
],
"metrics": {},

View File

@ -2,12 +2,16 @@
"id": "CVE-2024-4313",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-06-22T02:15:45.143",
"lastModified": "2024-06-22T02:15:45.143",
"vulnStatus": "Received",
"lastModified": "2024-06-24T12:57:36.513",
"vulnStatus": "Undergoing Analysis",
"descriptions": [
{
"lang": "en",
"value": "The Table Addons for Elementor plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the \u2018_id\u2019 parameter in all versions up to, and including, 2.1.2 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page."
},
{
"lang": "es",
"value": "El complemento Table Addons para Elementor para WordPress es vulnerable a Cross-Site Scripting Almacenado a trav\u00e9s del par\u00e1metro '_id' en todas las versiones hasta la 2.1.2 incluida debido a una sanitizaci\u00f3n de entrada y un escape de salida insuficientes. Esto hace posible que atacantes autenticados, con acceso de nivel de colaborador y superior, inyecten scripts web arbitrarios en p\u00e1ginas que se ejecutar\u00e1n cada vez que un usuario acceda a una p\u00e1gina inyectada."
}
],
"metrics": {

View File

@ -2,12 +2,16 @@
"id": "CVE-2024-4460",
"sourceIdentifier": "security@huntr.dev",
"published": "2024-06-24T07:15:15.400",
"lastModified": "2024-06-24T07:15:15.400",
"vulnStatus": "Received",
"lastModified": "2024-06-24T12:57:36.513",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "A denial of service (DoS) vulnerability exists in zenml-io/zenml version 0.56.3 due to improper handling of line feed (`\\n`) characters in component names. When a low-privileged user adds a component through the API endpoint `api/v1/workspaces/default/components` with a name containing a `\\n` character, it leads to uncontrolled resource consumption. This vulnerability results in the inability of users to add new components in certain categories (e.g., 'Image Builder') and to register new stacks through the UI, thereby degrading the user experience and potentially rendering the ZenML Dashboard unusable. The issue does not affect component addition through the Web UI, as `\\n` characters are properly escaped in that context. The vulnerability was tested on ZenML running in Docker, and it was observed in both Firefox and Chrome browsers."
},
{
"lang": "es",
"value": "Existe una vulnerabilidad de denegaci\u00f3n de servicio (DoS) en zenml-io/zenml versi\u00f3n 0.56.3 debido al manejo inadecuado de los caracteres de avance de l\u00ednea (`\\n`) en los nombres de los componentes. Cuando un usuario con pocos privilegios agrega un componente a trav\u00e9s del endpoint API `api/v1/workspaces/default/components` con un nombre que contiene un car\u00e1cter `\\n`, genera un consumo incontrolado de recursos. Esta vulnerabilidad da como resultado la incapacidad de los usuarios para agregar nuevos componentes en ciertas categor\u00edas (por ejemplo, 'Creador de im\u00e1genes') y registrar nuevas pilas a trav\u00e9s de la interfaz de usuario, lo que degrada la experiencia del usuario y potencialmente inutiliza el panel ZenML. El problema no afecta la adici\u00f3n de componentes a trav\u00e9s de la interfaz de usuario web, ya que los caracteres `\\n` se escapan correctamente en ese contexto. La vulnerabilidad se prob\u00f3 en ZenML ejecut\u00e1ndose en Docker y se observ\u00f3 en los navegadores Firefox y Chrome."
}
],
"metrics": {

View File

@ -2,12 +2,16 @@
"id": "CVE-2024-4499",
"sourceIdentifier": "security@huntr.dev",
"published": "2024-06-24T03:15:09.797",
"lastModified": "2024-06-24T03:15:09.797",
"vulnStatus": "Received",
"lastModified": "2024-06-24T12:57:36.513",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "A Cross-Site Request Forgery (CSRF) vulnerability exists in the XTTS server of parisneo/lollms version 9.6 due to a lax CORS policy. The vulnerability allows attackers to perform unauthorized actions by tricking a user into visiting a malicious webpage, which can then trigger arbitrary LoLLMS-XTTS API requests. This issue can lead to the reading and writing of audio files and, when combined with other vulnerabilities, could allow for the reading of arbitrary files on the system and writing files outside the permitted audio file location."
},
{
"lang": "es",
"value": "Existe una vulnerabilidad de Cross-Site Request Forgery (CSRF) en el servidor XTTS de parisneo/lollms versi\u00f3n 9.6 debido a una pol\u00edtica CORS laxa. La vulnerabilidad permite a los atacantes realizar acciones no autorizadas enga\u00f1ando a un usuario para que visite una p\u00e1gina web maliciosa, lo que luego puede desencadenar solicitudes arbitrarias de la API LoLLMS-XTTS. Este problema puede provocar la lectura y escritura de archivos de audio y, cuando se combina con otras vulnerabilidades, podr\u00eda permitir la lectura de archivos arbitrarios en el sistema y la escritura de archivos fuera de la ubicaci\u00f3n permitida para archivos de audio."
}
],
"metrics": {

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-4754",
"sourceIdentifier": "iletisim@usom.gov.tr",
"published": "2024-06-24T09:15:10.083",
"lastModified": "2024-06-24T09:15:10.083",
"vulnStatus": "Received",
"lastModified": "2024-06-24T12:57:36.513",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2024-4839",
"sourceIdentifier": "security@huntr.dev",
"published": "2024-06-24T13:15:11.900",
"lastModified": "2024-06-24T13:15:11.900",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "A Cross-Site Request Forgery (CSRF) vulnerability exists in the 'Servers Configurations' function of the parisneo/lollms-webui, versions 9.6 to the latest. The affected functions include Elastic search Service (under construction), XTTS service, Petals service, vLLM service, and Motion Ctrl service, which lack CSRF protection. This vulnerability allows attackers to deceive users into unwittingly installing the XTTS service among other packages by submitting a malicious installation request. Successful exploitation results in attackers tricking users into performing actions without their consent."
}
],
"metrics": {
"cvssMetricV30": [
{
"source": "security@huntr.dev",
"type": "Secondary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "LOW",
"baseScore": 4.4,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.8,
"impactScore": 2.5
}
]
},
"weaknesses": [
{
"source": "security@huntr.dev",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-352"
}
]
}
],
"references": [
{
"url": "https://huntr.com/bounties/dcfc5a07-0427-42b5-a623-8d943873d7ff",
"source": "security@huntr.dev"
}
]
}

View File

@ -2,12 +2,16 @@
"id": "CVE-2024-4841",
"sourceIdentifier": "security@huntr.dev",
"published": "2024-06-23T15:15:09.233",
"lastModified": "2024-06-23T15:15:09.233",
"vulnStatus": "Received",
"lastModified": "2024-06-24T12:57:36.513",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "A Path Traversal vulnerability exists in the parisneo/lollms-webui, specifically within the 'add_reference_to_local_mode' function due to the lack of input sanitization. This vulnerability affects versions v9.6 to the latest. By exploiting this vulnerability, an attacker can predict the folders, subfolders, and files present on the victim's computer. The vulnerability is present in the way the application handles the 'path' parameter in HTTP requests to the '/add_reference_to_local_model' endpoint."
},
{
"lang": "es",
"value": "Existe una vulnerabilidad de Path Traversal en parisneo/lollms-webui, espec\u00edficamente dentro de la funci\u00f3n 'add_reference_to_local_mode' debido a la falta de sanitizaci\u00f3n de entrada. Esta vulnerabilidad afecta a las versiones v9.6 hasta la \u00faltima. Al explotar esta vulnerabilidad, un atacante puede predecir las carpetas, subcarpetas y archivos presentes en la computadora de la v\u00edctima. La vulnerabilidad est\u00e1 presente en la forma en que la aplicaci\u00f3n maneja el par\u00e1metro 'ruta' en las solicitudes HTTP al endpoint '/add_reference_to_local_model'."
}
],
"metrics": {

View File

@ -2,12 +2,16 @@
"id": "CVE-2024-4874",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-06-22T05:15:11.837",
"lastModified": "2024-06-22T05:15:11.837",
"vulnStatus": "Received",
"lastModified": "2024-06-24T12:57:36.513",
"vulnStatus": "Undergoing Analysis",
"descriptions": [
{
"lang": "en",
"value": "The Bricks Builder plugin for WordPress is vulnerable to Insecure Direct Object Reference in all versions up to, and including, 1.9.8 via the postId parameter due to missing validation on a user controlled key. This makes it possible for authenticated attackers, with Contributor-level access and above, to modify posts and pages created by other users including admins. As a requirement for this, an admin would have to enable access to the editor specifically for such a user or enable it for all users with a certain user account type."
},
{
"lang": "es",
"value": "El complemento Bricks Builder para WordPress es vulnerable a Insecure Direct Object Reference en todas las versiones hasta la 1.9.8 incluida a trav\u00e9s del par\u00e1metro postId debido a la falta de validaci\u00f3n en una clave controlada por el usuario. Esto hace posible que atacantes autenticados, con acceso de nivel de colaborador y superior, modifiquen publicaciones y p\u00e1ginas creadas por otros usuarios, incluidos los administradores. Como requisito para esto, un administrador tendr\u00eda que habilitar el acceso al editor espec\u00edficamente para dicho usuario o habilitarlo para todos los usuarios con un determinado tipo de cuenta de usuario."
}
],
"metrics": {

View File

@ -2,12 +2,16 @@
"id": "CVE-2024-4899",
"sourceIdentifier": "contact@wpscan.com",
"published": "2024-06-24T06:15:11.307",
"lastModified": "2024-06-24T06:15:11.307",
"vulnStatus": "Received",
"lastModified": "2024-06-24T12:57:36.513",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "The SEOPress WordPress plugin before 7.8 does not sanitise and escape some of its Post settings, which could allow high privilege users such as contributor to perform Stored Cross-Site Scripting attacks."
},
{
"lang": "es",
"value": "El complemento SEOPress WordPress anterior a 7.8 no sanitiza ni escapa a algunas de sus configuraciones de publicaci\u00f3n, lo que podr\u00eda permitir a usuarios con altos privilegios, como los contribuyentes, realizar ataques de Cross-Site Scripting Almacenado."
}
],
"metrics": {},

View File

@ -2,12 +2,16 @@
"id": "CVE-2024-4900",
"sourceIdentifier": "contact@wpscan.com",
"published": "2024-06-24T06:15:11.423",
"lastModified": "2024-06-24T06:15:11.423",
"vulnStatus": "Received",
"lastModified": "2024-06-24T12:57:36.513",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "The SEOPress WordPress plugin before 7.8 does not validate and escape one of its Post settings, which could allow contributor and above role to perform Open redirect attacks against any user viewing a malicious post"
},
{
"lang": "es",
"value": "El complemento SEOPress WordPress anterior a 7.8 no valida ni escapa a una de sus configuraciones de publicaci\u00f3n, lo que podr\u00eda permitir que el colaborador y el rol superior realicen ataques de redireccionamiento abierto contra cualquier usuario que vea una publicaci\u00f3n maliciosa."
}
],
"metrics": {},

View File

@ -2,12 +2,16 @@
"id": "CVE-2024-4940",
"sourceIdentifier": "security@huntr.dev",
"published": "2024-06-22T06:15:11.137",
"lastModified": "2024-06-22T06:15:11.137",
"vulnStatus": "Received",
"lastModified": "2024-06-24T12:57:36.513",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "An open redirect vulnerability exists in the gradio-app/gradio, affecting the latest version. The vulnerability allows an attacker to redirect users to arbitrary websites, which can be exploited for phishing attacks, Cross-site Scripting (XSS), Server-Side Request Forgery (SSRF), amongst others. This issue is due to improper validation of user-supplied input in the handling of URLs. Attackers can exploit this vulnerability by crafting a malicious URL that, when processed by the application, redirects the user to an attacker-controlled web page."
},
{
"lang": "es",
"value": "Existe una vulnerabilidad de redireccionamiento abierto en gradio-app/gradio, que afecta a la \u00faltima versi\u00f3n. La vulnerabilidad permite a un atacante redirigir a los usuarios a sitios web arbitrarios, que pueden explotarse para ataques de phishing, Cross-Site Scripting (XSS) y Server-Side Request Forgery (SSRF), entre otros. Este problema se debe a una validaci\u00f3n inadecuada de la entrada proporcionada por el usuario en el manejo de las URL. Los atacantes pueden aprovechar esta vulnerabilidad creando una URL maliciosa que, cuando la aplicaci\u00f3n la procesa, redirige al usuario a una p\u00e1gina web controlada por el atacante."
}
],
"metrics": {

View File

@ -2,12 +2,16 @@
"id": "CVE-2024-5346",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-06-22T02:15:45.340",
"lastModified": "2024-06-22T02:15:45.340",
"vulnStatus": "Received",
"lastModified": "2024-06-24T12:57:36.513",
"vulnStatus": "Undergoing Analysis",
"descriptions": [
{
"lang": "en",
"value": "The Flatsome theme for WordPress is vulnerable to Stored Cross-Site Scripting via the UX Countdown, Video Button, UX Video, UX Slider, UX Sidebar, and UX Payment Icons shortcodes in all versions up to, and including, 3.18.7 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page."
},
{
"lang": "es",
"value": "El tema Flatsome para WordPress es vulnerable a Cross-Site Scripting Almacenado a trav\u00e9s de los c\u00f3digos cortos de cuenta regresiva de UX, bot\u00f3n de video, video de UX, control deslizante de UX, barra lateral de UX e \u00edconos de pago de UX en todas las versiones hasta la 3.18.7 incluida debido a insuficiencia sanitizaci\u00f3n de entrada y escape de salida en atributos proporcionados por el usuario. Esto hace posible que atacantes autenticados, con acceso de nivel de colaborador y superior, inyecten scripts web arbitrarios en p\u00e1ginas que se ejecutar\u00e1n cada vez que un usuario acceda a una p\u00e1gina inyectada."
}
],
"metrics": {

View File

@ -2,12 +2,16 @@
"id": "CVE-2024-5443",
"sourceIdentifier": "security@huntr.dev",
"published": "2024-06-22T17:15:34.410",
"lastModified": "2024-06-22T17:15:34.410",
"vulnStatus": "Received",
"lastModified": "2024-06-24T12:57:36.513",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "CVE-2024-4320 describes a vulnerability in the parisneo/lollms software, specifically within the `ExtensionBuilder().build_extension()` function. The vulnerability arises from the `/mount_extension` endpoint, where a path traversal issue allows attackers to navigate beyond the intended directory structure. This is facilitated by the `data.category` and `data.folder` parameters accepting empty strings (`\"\"`), which, due to inadequate input sanitization, can lead to the construction of a `package_path` that points to the root directory. Consequently, if an attacker can create a `config.yaml` file in a controllable path, this path can be appended to the `extensions` list and trigger the execution of `__init__.py` in the current directory, leading to remote code execution. The vulnerability affects versions up to 5.9.0, and has been addressed in version 9.8."
},
{
"lang": "es",
"value": "CVE-2024-4320 describe una vulnerabilidad en el software parisneo/lollms, espec\u00edficamente dentro de la funci\u00f3n `ExtensionBuilder().build_extension()`. La vulnerabilidad surge del endpoint `/mount_extension`, donde un problema de path traversal permite a los atacantes navegar m\u00e1s all\u00e1 de la estructura de directorios prevista. Esto se ve facilitado por los par\u00e1metros `data.category` y `data.folder` que aceptan cadenas vac\u00edas (`\"\"`), lo que, debido a una sanitizaci\u00f3n de entrada inadecuada, puede conducir a la construcci\u00f3n de un `package_path` que apunte al directorio ra\u00edz. En consecuencia, si un atacante puede crear un archivo `config.yaml` en una ruta controlable, esta ruta puede agregarse a la lista de `extensiones` y desencadenar la ejecuci\u00f3n de `__init__.py` en el directorio actual, lo que lleva a la ejecuci\u00f3n remota de c\u00f3digo. La vulnerabilidad afecta a las versiones hasta la 5.9.0 y se solucion\u00f3 en la versi\u00f3n 9.8."
}
],
"metrics": {

View File

@ -2,12 +2,16 @@
"id": "CVE-2024-5596",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-06-22T06:15:11.470",
"lastModified": "2024-06-22T06:15:11.470",
"vulnStatus": "Received",
"lastModified": "2024-06-24T12:57:36.513",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "The ARMember Premium plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 6.7. This is due to incorrectly implemented nonce validation function on multiple functions. This makes it possible for unauthenticated attackers to modify, or delete user meta and plugin options which can lead to limited privilege escalation."
},
{
"lang": "es",
"value": "El complemento ARMember Premium para WordPress es vulnerable a Cross-Site Request Forgery en versiones hasta la 6.7 incluida. Esto se debe a una funci\u00f3n de validaci\u00f3n nonce implementada incorrectamente en m\u00faltiples funciones. Esto hace posible que atacantes no autenticados modifiquen o eliminen metaopciones y complementos del usuario, lo que puede conducir a una escalada de privilegios limitada."
}
],
"metrics": {

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-5683",
"sourceIdentifier": "iletisim@usom.gov.tr",
"published": "2024-06-24T09:15:10.347",
"lastModified": "2024-06-24T09:15:10.347",
"vulnStatus": "Received",
"lastModified": "2024-06-24T12:57:36.513",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,12 +2,16 @@
"id": "CVE-2024-5791",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-06-22T02:15:45.523",
"lastModified": "2024-06-22T02:15:45.523",
"vulnStatus": "Received",
"lastModified": "2024-06-24T12:57:36.513",
"vulnStatus": "Undergoing Analysis",
"descriptions": [
{
"lang": "en",
"value": "The Online Booking & Scheduling Calendar for WordPress by vcita plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'wp_id' parameter in all versions up to, and including, 4.4.2 due to missing authorization checks on processAction function, as well as insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts that will execute whenever a user accesses a wp-admin dashboard."
},
{
"lang": "es",
"value": "El complemento Online Booking &amp; Scheduling Calendar for WordPress by vcita para WordPress es vulnerable a Cross-Site Scripting Almacenado a trav\u00e9s del par\u00e1metro 'wp_id' en todas las versiones hasta la 4.4.2 incluida debido a la falta de controles de autorizaci\u00f3n en la funci\u00f3n ProcessAction, as\u00ed como como una higienizaci\u00f3n insuficiente de los insumos y fugas de productos. Esto hace posible que atacantes no autenticados inyecten scripts web arbitrarios que se ejecutar\u00e1n cada vez que un usuario acceda a un panel de administraci\u00f3n de wp."
}
],
"metrics": {

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2024-5862",
"sourceIdentifier": "iletisim@usom.gov.tr",
"published": "2024-06-24T13:15:12.120",
"lastModified": "2024-06-24T13:15:12.120",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Improper Restriction of Excessive Authentication Attempts vulnerability in Mia Technology Inc. Mia-Med Health Aplication allows Interface Manipulation.This issue affects Mia-Med Health Aplication: before 1.0.14."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "iletisim@usom.gov.tr",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "iletisim@usom.gov.tr",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-307"
}
]
}
],
"references": [
{
"url": "https://www.usom.gov.tr/bildirim/tr-24-0765",
"source": "iletisim@usom.gov.tr"
}
]
}

View File

@ -2,12 +2,16 @@
"id": "CVE-2024-5965",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-06-22T04:15:12.460",
"lastModified": "2024-06-22T04:15:12.460",
"vulnStatus": "Received",
"lastModified": "2024-06-24T12:57:36.513",
"vulnStatus": "Undergoing Analysis",
"descriptions": [
{
"lang": "en",
"value": "The Mosaic theme for WordPress is vulnerable to Stored Cross-Site Scripting via the \u2018link\u2019 parameter within the theme's Button shortcode in all versions up to, and including, 1.7.1 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page."
},
{
"lang": "es",
"value": "El tema Mosaic para WordPress es vulnerable a Cross-Site Scripting Almacenado a trav\u00e9s del par\u00e1metro 'enlace' dentro del c\u00f3digo abreviado del bot\u00f3n del tema en todas las versiones hasta la 1.7.1 incluida debido a una sanitizaci\u00f3n de entrada y un escape de salida insuficientes. Esto hace posible que atacantes autenticados, con acceso de nivel de Colaborador y superior, inyecten scripts web arbitrarios en p\u00e1ginas que se ejecutar\u00e1n cada vez que un usuario acceda a una p\u00e1gina inyectada."
}
],
"metrics": {

View File

@ -2,12 +2,16 @@
"id": "CVE-2024-5966",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-06-22T04:15:12.940",
"lastModified": "2024-06-22T04:15:12.940",
"vulnStatus": "Received",
"lastModified": "2024-06-24T12:57:36.513",
"vulnStatus": "Undergoing Analysis",
"descriptions": [
{
"lang": "en",
"value": "The Grey Opaque theme for WordPress is vulnerable to Stored Cross-Site Scripting via the \u2018url\u2019 parameter within the theme's Download-Button shortcode in all versions up to, and including, 2.0.1 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page."
},
{
"lang": "es",
"value": "El tema Gray Opaque para WordPress es vulnerable a Cross-Site Scripting Almacenado a trav\u00e9s del par\u00e1metro 'url' dentro del c\u00f3digo abreviado del bot\u00f3n de descarga del tema en todas las versiones hasta la 2.0.1 incluida debido a una sanitizaci\u00f3n de entrada y un escape de salida insuficientes. Esto hace posible que atacantes autenticados, con acceso de nivel de Colaborador y superior, inyecten scripts web arbitrarios en p\u00e1ginas que se ejecutar\u00e1n cada vez que un usuario acceda a una p\u00e1gina inyectada."
}
],
"metrics": {

View File

@ -2,12 +2,16 @@
"id": "CVE-2024-6120",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-06-22T00:15:09.690",
"lastModified": "2024-06-22T00:15:09.690",
"vulnStatus": "Received",
"lastModified": "2024-06-24T12:57:36.513",
"vulnStatus": "Undergoing Analysis",
"descriptions": [
{
"lang": "en",
"value": "The Sparkle Demo Importer plugin for WordPress is vulnerable to unauthorized database reset and demo data import due to a missing capability check on the multiple functions in all versions up to and including 1.4.7. This makes it possible for authenticated attackers, with Subscriber-level access and above, to delete all posts, pages, and uploaded files, as well as download and install a limited set of demo plugins."
},
{
"lang": "es",
"value": "El complemento Sparkle Demo Importer para WordPress es vulnerable al restablecimiento no autorizado de la base de datos y a la importaci\u00f3n de datos de demostraci\u00f3n debido a una falta de verificaci\u00f3n de capacidad en las m\u00faltiples funciones en todas las versiones hasta la 1.4.7 incluida. Esto hace posible que los atacantes autenticados, con acceso de nivel de suscriptor y superior, eliminen todas las publicaciones, p\u00e1ginas y archivos cargados, as\u00ed como tambi\u00e9n descarguen e instalen un conjunto limitado de complementos de demostraci\u00f3n."
}
],
"metrics": {

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-6160",
"sourceIdentifier": "cvd@cert.pl",
"published": "2024-06-24T10:15:10.277",
"lastModified": "2024-06-24T10:15:10.277",
"vulnStatus": "Received",
"lastModified": "2024-06-24T12:57:36.513",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,12 +2,16 @@
"id": "CVE-2024-6251",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-06-22T12:15:09.923",
"lastModified": "2024-06-22T12:15:09.923",
"vulnStatus": "Received",
"lastModified": "2024-06-24T12:57:36.513",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability, which was classified as problematic, was found in playSMS 1.4.3. Affected is an unknown function of the file /index.php?app=main&inc=feature_phonebook&op=phonebook_list of the component New Phonebook Handler. The manipulation of the argument name/email leads to basic cross site scripting. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. VDB-269418 is the identifier assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way."
},
{
"lang": "es",
"value": "Una vulnerabilidad fue encontrada en playSMS 1.4.3 y clasificada como problem\u00e1tica. Una funci\u00f3n desconocida del archivo /index.php?app=main&amp;inc=feature_phonebook&amp;op=phonebook_list del componente New Phonebook Handler es afectada por esta vulnerabilidad. La manipulaci\u00f3n del argumento nombre/correo electr\u00f3nico conduce a Cross-Site Scripting b\u00e1sicas. Es posible lanzar el ataque de forma remota. El exploit ha sido divulgado al p\u00fablico y puede utilizarse. VDB-269418 es el identificador asignado a esta vulnerabilidad. NOTA: Se contact\u00f3 primeramente con el proveedor sobre esta divulgaci\u00f3n, pero no respondi\u00f3 de ninguna manera."
}
],
"metrics": {

View File

@ -2,12 +2,16 @@
"id": "CVE-2024-6252",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-06-22T12:15:11.160",
"lastModified": "2024-06-22T12:15:11.160",
"vulnStatus": "Received",
"lastModified": "2024-06-24T12:57:36.513",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability has been found in Zorlan SkyCaiji up to 2.8 and classified as problematic. Affected by this vulnerability is an unknown functionality of the component Task Handler. The manipulation of the argument onerror leads to cross site scripting. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-269419."
},
{
"lang": "es",
"value": "Una vulnerabilidad fue encontrada en Zorlan SkyCaiji hasta 2.8 y clasificada como problem\u00e1tica. Una funci\u00f3n desconocida del componente Task Handler es afectada por esta vulnerabilidad. La manipulaci\u00f3n del argumento onerror conduce a Cross-Site Scripting. El ataque se puede lanzar de forma remota. El exploit ha sido divulgado al p\u00fablico y puede utilizarse. El identificador asociado de esta vulnerabilidad es VDB-269419."
}
],
"metrics": {

View File

@ -2,12 +2,16 @@
"id": "CVE-2024-6253",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-06-22T14:15:09.673",
"lastModified": "2024-06-22T14:15:09.673",
"vulnStatus": "Received",
"lastModified": "2024-06-24T12:57:36.513",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was found in itsourcecode Online Food Ordering System 1.0 and classified as critical. Affected by this issue is some unknown functionality of the file /purchase.php. The manipulation of the argument customer leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-269420."
},
{
"lang": "es",
"value": "Una vulnerabilidad fue encontrada en itsourcecode Online Food Ordering System 1.0 y clasificada como cr\u00edtica. Una funci\u00f3n desconocida del archivo /purchase.php es afectada por esta vulnerabilidad. La manipulaci\u00f3n del argumento cliente conduce a la inyecci\u00f3n SQL. El ataque puede lanzarse de forma remota. El exploit ha sido divulgado al p\u00fablico y puede utilizarse. El identificador de esta vulnerabilidad es VDB-269420."
}
],
"metrics": {

View File

@ -2,12 +2,16 @@
"id": "CVE-2024-6266",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-06-23T03:15:51.817",
"lastModified": "2024-06-23T03:15:51.817",
"vulnStatus": "Received",
"lastModified": "2024-06-24T12:57:36.513",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability classified as critical has been found in Pear Admin Boot up to 2.0.2. Affected is an unknown function of the file /system/dictData/loadDictItem. The manipulation leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. VDB-269478 is the identifier assigned to this vulnerability."
},
{
"lang": "es",
"value": "Una vulnerabilidad ha sido encontrada en Pear Admin Boot hasta 2.0.2 y clasificada como cr\u00edtica. Una funci\u00f3n desconocida del archivo /system/dictData/loadDictItem es afectada por esta vulnerabilidad. La manipulaci\u00f3n conduce a la inyecci\u00f3n de SQL. Es posible lanzar el ataque de forma remota. El exploit ha sido divulgado al p\u00fablico y puede utilizarse. VDB-269478 es el identificador asignado a esta vulnerabilidad."
}
],
"metrics": {

View File

@ -2,12 +2,16 @@
"id": "CVE-2024-6267",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-06-23T06:15:09.633",
"lastModified": "2024-06-23T09:15:11.320",
"vulnStatus": "Received",
"lastModified": "2024-06-24T12:57:36.513",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability classified as problematic was found in SourceCodester Service Provider Management System 1.0. Affected by this vulnerability is an unknown functionality of the file system_info/index.php of the component System Info Page. The manipulation of the argument System Name/System Short Name leads to cross site scripting. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-269479."
},
{
"lang": "es",
"value": "Una vulnerabilidad fue encontrada en SourceCodester Service Provider Management System 1.0 y clasificada como problem\u00e1tica. Una funci\u00f3n desconocida del archivo system_info/index.php del componente System Info Page es afectada por esta vulnerabilidad. La manipulaci\u00f3n del argumento Nombre del sistema/Nombre corto del sistema conduce a Cross-Site Scripting. El ataque se puede lanzar de forma remota. El exploit ha sido divulgado al p\u00fablico y puede utilizarse. El identificador asociado de esta vulnerabilidad es VDB-269479."
}
],
"metrics": {

View File

@ -2,12 +2,16 @@
"id": "CVE-2024-6268",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-06-23T10:15:09.753",
"lastModified": "2024-06-23T10:15:09.753",
"vulnStatus": "Received",
"lastModified": "2024-06-24T12:57:36.513",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability, which was classified as critical, has been found in lahirudanushka School Management System 1.0.0/1.0.1. Affected by this issue is some unknown functionality of the file login.php of the component Login Page. The manipulation of the argument email leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-269480."
},
{
"lang": "es",
"value": "Una vulnerabilidad fue encontrada en lahirudanushka School Management System 1.0.0/1.0.1 y clasificada como cr\u00edtica. Una funci\u00f3n desconocida del archivo login.php del componente Login Page es afectada por esta vulnerabilidad. La manipulaci\u00f3n del argumento email conduce a la inyecci\u00f3n de SQL. El ataque puede lanzarse de forma remota. El exploit ha sido divulgado al p\u00fablico y puede utilizarse. El identificador de esta vulnerabilidad es VDB-269480."
}
],
"metrics": {

View File

@ -2,12 +2,16 @@
"id": "CVE-2024-6269",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-06-23T12:15:09.710",
"lastModified": "2024-06-23T12:15:09.710",
"vulnStatus": "Received",
"lastModified": "2024-06-24T12:57:36.513",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability has been found in Ruijie RG-UAC 1.0 and classified as critical. This vulnerability affects the function get_ip.addr_details of the file /view/vpn/autovpn/sxh_vpnlic.php of the component HTTP POST Request Handler. The manipulation of the argument indevice leads to command injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. VDB-269482 is the identifier assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way."
},
{
"lang": "es",
"value": "Una vulnerabilidad ha sido encontrada en Ruijie RG-UAC 1.0 y clasificada como cr\u00edtica. Esta vulnerabilidad afecta a la funci\u00f3n get_ip.addr_details del archivo /view/vpn/autovpn/sxh_vpnlic.php del componente HTTP POST Request Handler. La manipulaci\u00f3n del argumento en dispositivo conduce a la inyecci\u00f3n de comando. El ataque se puede iniciar de forma remota. El exploit ha sido divulgado al p\u00fablico y puede utilizarse. VDB-269482 es el identificador asignado a esta vulnerabilidad. NOTA: Se contact\u00f3 primeramente con el proveedor sobre esta divulgaci\u00f3n, pero no respondi\u00f3 de ninguna manera. "
}
],
"metrics": {

View File

@ -2,12 +2,16 @@
"id": "CVE-2024-6273",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-06-23T22:15:09.490",
"lastModified": "2024-06-23T22:15:09.490",
"vulnStatus": "Received",
"lastModified": "2024-06-24T12:57:36.513",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was found in SourceCodester Clinic Queuing System 1.0. It has been declared as problematic. Affected by this vulnerability is the function save_patient of the file patient_side.php. The manipulation of the argument Full Name/Contact/Address leads to cross site scripting. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-269485 was assigned to this vulnerability."
},
{
"lang": "es",
"value": "Se encontr\u00f3 una vulnerabilidad en SourceCodester Clinic Queuing System 1.0. Ha sido declarada problem\u00e1tica. La funci\u00f3n save_patient del archivopatient_side.php es afectada por esta vulnerabilidad. La manipulaci\u00f3n del argumento Nombre completo/Contacto/Direcci\u00f3n conduce a Cross-Site Scripting. El ataque se puede lanzar de forma remota. El exploit ha sido divulgado al p\u00fablico y puede utilizarse. A esta vulnerabilidad se le asign\u00f3 el identificador VDB-269485."
}
],
"metrics": {

View File

@ -2,12 +2,16 @@
"id": "CVE-2024-6274",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-06-24T02:15:53.827",
"lastModified": "2024-06-24T02:15:53.827",
"vulnStatus": "Received",
"lastModified": "2024-06-24T12:57:36.513",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability classified as critical has been found in lahirudanushka School Management System 1.0.0/1.0.1. This affects an unknown part of the file /attendancelist.php of the component Attendance Report Page. The manipulation of the argument aid leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-269487."
},
{
"lang": "es",
"value": "Una vulnerabilidad ha sido encontrada en lahirudanushka School Management System 1.0.0/1.0.1 y clasificada como cr\u00edtica. Una parte desconocida del archivo /attendancelist.php del componente Attendance Report Page afecta a una parte desconocida. La manipulaci\u00f3n del argumento ayuda conduce a la inyecci\u00f3n de SQL. Es posible iniciar el ataque de forma remota. El exploit ha sido divulgado al p\u00fablico y puede utilizarse. El identificador asociado de esta vulnerabilidad es VDB-269487."
}
],
"metrics": {

View File

@ -2,12 +2,16 @@
"id": "CVE-2024-6275",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-06-24T02:15:54.140",
"lastModified": "2024-06-24T02:15:54.140",
"vulnStatus": "Received",
"lastModified": "2024-06-24T12:57:36.513",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability classified as critical was found in lahirudanushka School Management System 1.0.0/1.0.1. This vulnerability affects unknown code of the file parent.php of the component Parent Page. The manipulation of the argument update leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-269488."
},
{
"lang": "es",
"value": "Una vulnerabilidad fue encontrada en lahirudanushka School Management System 1.0.0/1.0.1 y clasificada como cr\u00edtica. Esta vulnerabilidad afecta a un c\u00f3digo desconocido del archivo parent.php del componente Parent Page. La manipulaci\u00f3n de la actualizaci\u00f3n del argumento conduce a la inyecci\u00f3n de SQL. El ataque se puede iniciar de forma remota. El exploit ha sido divulgado al p\u00fablico y puede utilizarse. El identificador de esta vulnerabilidad es VDB-269488."
}
],
"metrics": {

View File

@ -2,12 +2,16 @@
"id": "CVE-2024-6276",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-06-24T02:15:54.410",
"lastModified": "2024-06-24T02:15:54.410",
"vulnStatus": "Received",
"lastModified": "2024-06-24T12:57:36.513",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability, which was classified as critical, has been found in lahirudanushka School Management System 1.0.0/1.0.1. This issue affects some unknown processing of the file teacher.php of the component Teacher Page. The manipulation of the argument update leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-269489 was assigned to this vulnerability."
},
{
"lang": "es",
"value": "Una vulnerabilidad fue encontrada en lahirudanushka School Management System 1.0.0/1.0.1 y clasificada como cr\u00edtica. Este problema afecta un procesamiento desconocido del archivo profesor.php del componente P\u00e1gina del Profesor. La manipulaci\u00f3n de la actualizaci\u00f3n del argumento conduce a la inyecci\u00f3n de SQL. El ataque puede iniciarse de forma remota. El exploit ha sido divulgado al p\u00fablico y puede utilizarse. A esta vulnerabilidad se le asign\u00f3 el identificador VDB-269489."
}
],
"metrics": {

View File

@ -2,12 +2,16 @@
"id": "CVE-2024-6277",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-06-24T03:15:10.027",
"lastModified": "2024-06-24T03:15:10.027",
"vulnStatus": "Received",
"lastModified": "2024-06-24T12:57:36.513",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability, which was classified as critical, was found in lahirudanushka School Management System 1.0.0/1.0.1. Affected is an unknown function of the file student.php of the component Student Page. The manipulation of the argument update leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. VDB-269490 is the identifier assigned to this vulnerability."
},
{
"lang": "es",
"value": "Una vulnerabilidad fue encontrada en lahirudanushka School Management System 1.0.0/1.0.1 y clasificada como cr\u00edtica. Una funci\u00f3n desconocida del archivo Student.php del componente Student Page es afectada por esta vulnerabilidad. La manipulaci\u00f3n de la actualizaci\u00f3n del argumento conduce a la inyecci\u00f3n de SQL. Es posible lanzar el ataque de forma remota. El exploit ha sido divulgado al p\u00fablico y puede utilizarse. VDB-269490 es el identificador asignado a esta vulnerabilidad."
}
],
"metrics": {

View File

@ -2,12 +2,16 @@
"id": "CVE-2024-6278",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-06-24T03:15:10.290",
"lastModified": "2024-06-24T03:15:10.290",
"vulnStatus": "Received",
"lastModified": "2024-06-24T12:57:36.513",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability has been found in lahirudanushka School Management System 1.0.0/1.0.1 and classified as critical. Affected by this vulnerability is an unknown functionality of the file subject.php of the component Subject Page. The manipulation of the argument update leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-269491."
},
{
"lang": "es",
"value": "Una vulnerabilidad ha sido encontrada en lahirudanushka School Management System 1.0.0/1.0.1 y clasificada como cr\u00edtica. Una funci\u00f3n desconocida del archivo subject.php del componente Subject Page es afectada por esta vulnerabilidad. La manipulaci\u00f3n de la actualizaci\u00f3n del argumento conduce a la inyecci\u00f3n de SQL. El ataque se puede lanzar de forma remota. El exploit ha sido divulgado al p\u00fablico y puede utilizarse. El identificador asociado de esta vulnerabilidad es VDB-269491."
}
],
"metrics": {

View File

@ -2,12 +2,16 @@
"id": "CVE-2024-6279",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-06-24T03:15:10.573",
"lastModified": "2024-06-24T03:15:10.573",
"vulnStatus": "Received",
"lastModified": "2024-06-24T12:57:36.513",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was found in lahirudanushka School Management System 1.0.0/1.0.1 and classified as critical. Affected by this issue is some unknown functionality of the file examresults-par.php of the component Exam Results Page. The manipulation of the argument sid leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-269492."
},
{
"lang": "es",
"value": "Una vulnerabilidad fue encontrada en lahirudanushka School Management System 1.0.0/1.0.1 y clasificada como cr\u00edtica. Una funci\u00f3n desconocida del archivo examresults-par.php del componente Exam Results Page es afectada por esta vulnerabilidad. La manipulaci\u00f3n del argumento sid conduce a la inyecci\u00f3n de SQL. El ataque puede lanzarse de forma remota. El exploit ha sido divulgado al p\u00fablico y puede utilizarse. El identificador de esta vulnerabilidad es VDB-269492."
}
],
"metrics": {

View File

@ -2,12 +2,16 @@
"id": "CVE-2024-6280",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-06-24T03:15:10.847",
"lastModified": "2024-06-24T03:15:10.847",
"vulnStatus": "Received",
"lastModified": "2024-06-24T12:57:36.513",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was found in SourceCodester Simple Online Bidding System 1.0. It has been classified as critical. This affects an unknown part of the file /admin/ajax.php?action=save_settings. The manipulation of the argument img leads to unrestricted upload. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-269493 was assigned to this vulnerability."
},
{
"lang": "es",
"value": "Se encontr\u00f3 una vulnerabilidad en SourceCodester Simple Online Bidding System 1.0. Ha sido clasificada como cr\u00edtica. Esto afecta a una parte desconocida del archivo /admin/ajax.php?action=save_settings. La manipulaci\u00f3n del argumento img conduce a una carga sin restricciones. Es posible iniciar el ataque de forma remota. El exploit ha sido divulgado al p\u00fablico y puede utilizarse. A esta vulnerabilidad se le asign\u00f3 el identificador VDB-269493."
}
],
"metrics": {

View File

@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update
```plain
2024-06-24T12:00:18.238602+00:00
2024-06-24T14:00:19.861010+00:00
```
### Most recent CVE Modification Timestamp synchronized with NVD
```plain
2024-06-24T10:15:10.277000+00:00
2024-06-24T13:15:12.120000+00:00
```
### Last Data Feed Release
@ -33,21 +33,57 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
### Total Number of included CVEs
```plain
254987
255000
```
### CVEs added in the last Commit
Recently added CVEs: `2`
Recently added CVEs: `13`
- [CVE-2024-29868](CVE-2024/CVE-2024-298xx/CVE-2024-29868.json) (`2024-06-24T10:15:09.387`)
- [CVE-2024-6160](CVE-2024/CVE-2024-61xx/CVE-2024-6160.json) (`2024-06-24T10:15:10.277`)
- [CVE-2024-3264](CVE-2024/CVE-2024-32xx/CVE-2024-3264.json) (`2024-06-24T13:15:11.627`)
- [CVE-2024-36038](CVE-2024/CVE-2024-360xx/CVE-2024-36038.json) (`2024-06-24T12:15:09.630`)
- [CVE-2024-37089](CVE-2024/CVE-2024-370xx/CVE-2024-37089.json) (`2024-06-24T12:15:09.940`)
- [CVE-2024-37091](CVE-2024/CVE-2024-370xx/CVE-2024-37091.json) (`2024-06-24T12:15:10.170`)
- [CVE-2024-37092](CVE-2024/CVE-2024-370xx/CVE-2024-37092.json) (`2024-06-24T13:15:10.010`)
- [CVE-2024-37107](CVE-2024/CVE-2024-371xx/CVE-2024-37107.json) (`2024-06-24T13:15:10.247`)
- [CVE-2024-37109](CVE-2024/CVE-2024-371xx/CVE-2024-37109.json) (`2024-06-24T13:15:10.483`)
- [CVE-2024-37111](CVE-2024/CVE-2024-371xx/CVE-2024-37111.json) (`2024-06-24T13:15:10.720`)
- [CVE-2024-37228](CVE-2024/CVE-2024-372xx/CVE-2024-37228.json) (`2024-06-24T13:15:10.947`)
- [CVE-2024-37231](CVE-2024/CVE-2024-372xx/CVE-2024-37231.json) (`2024-06-24T13:15:11.177`)
- [CVE-2024-37233](CVE-2024/CVE-2024-372xx/CVE-2024-37233.json) (`2024-06-24T13:15:11.400`)
- [CVE-2024-4839](CVE-2024/CVE-2024-48xx/CVE-2024-4839.json) (`2024-06-24T13:15:11.900`)
- [CVE-2024-5862](CVE-2024/CVE-2024-58xx/CVE-2024-5862.json) (`2024-06-24T13:15:12.120`)
### CVEs modified in the last Commit
Recently modified CVEs: `0`
Recently modified CVEs: `70`
- [CVE-2024-4940](CVE-2024/CVE-2024-49xx/CVE-2024-4940.json) (`2024-06-24T12:57:36.513`)
- [CVE-2024-5346](CVE-2024/CVE-2024-53xx/CVE-2024-5346.json) (`2024-06-24T12:57:36.513`)
- [CVE-2024-5443](CVE-2024/CVE-2024-54xx/CVE-2024-5443.json) (`2024-06-24T12:57:36.513`)
- [CVE-2024-5596](CVE-2024/CVE-2024-55xx/CVE-2024-5596.json) (`2024-06-24T12:57:36.513`)
- [CVE-2024-5683](CVE-2024/CVE-2024-56xx/CVE-2024-5683.json) (`2024-06-24T12:57:36.513`)
- [CVE-2024-5791](CVE-2024/CVE-2024-57xx/CVE-2024-5791.json) (`2024-06-24T12:57:36.513`)
- [CVE-2024-5965](CVE-2024/CVE-2024-59xx/CVE-2024-5965.json) (`2024-06-24T12:57:36.513`)
- [CVE-2024-5966](CVE-2024/CVE-2024-59xx/CVE-2024-5966.json) (`2024-06-24T12:57:36.513`)
- [CVE-2024-6120](CVE-2024/CVE-2024-61xx/CVE-2024-6120.json) (`2024-06-24T12:57:36.513`)
- [CVE-2024-6160](CVE-2024/CVE-2024-61xx/CVE-2024-6160.json) (`2024-06-24T12:57:36.513`)
- [CVE-2024-6251](CVE-2024/CVE-2024-62xx/CVE-2024-6251.json) (`2024-06-24T12:57:36.513`)
- [CVE-2024-6252](CVE-2024/CVE-2024-62xx/CVE-2024-6252.json) (`2024-06-24T12:57:36.513`)
- [CVE-2024-6253](CVE-2024/CVE-2024-62xx/CVE-2024-6253.json) (`2024-06-24T12:57:36.513`)
- [CVE-2024-6266](CVE-2024/CVE-2024-62xx/CVE-2024-6266.json) (`2024-06-24T12:57:36.513`)
- [CVE-2024-6267](CVE-2024/CVE-2024-62xx/CVE-2024-6267.json) (`2024-06-24T12:57:36.513`)
- [CVE-2024-6268](CVE-2024/CVE-2024-62xx/CVE-2024-6268.json) (`2024-06-24T12:57:36.513`)
- [CVE-2024-6269](CVE-2024/CVE-2024-62xx/CVE-2024-6269.json) (`2024-06-24T12:57:36.513`)
- [CVE-2024-6273](CVE-2024/CVE-2024-62xx/CVE-2024-6273.json) (`2024-06-24T12:57:36.513`)
- [CVE-2024-6274](CVE-2024/CVE-2024-62xx/CVE-2024-6274.json) (`2024-06-24T12:57:36.513`)
- [CVE-2024-6275](CVE-2024/CVE-2024-62xx/CVE-2024-6275.json) (`2024-06-24T12:57:36.513`)
- [CVE-2024-6276](CVE-2024/CVE-2024-62xx/CVE-2024-6276.json) (`2024-06-24T12:57:36.513`)
- [CVE-2024-6277](CVE-2024/CVE-2024-62xx/CVE-2024-6277.json) (`2024-06-24T12:57:36.513`)
- [CVE-2024-6278](CVE-2024/CVE-2024-62xx/CVE-2024-6278.json) (`2024-06-24T12:57:36.513`)
- [CVE-2024-6279](CVE-2024/CVE-2024-62xx/CVE-2024-6279.json) (`2024-06-24T12:57:36.513`)
- [CVE-2024-6280](CVE-2024/CVE-2024-62xx/CVE-2024-6280.json) (`2024-06-24T12:57:36.513`)
## Download and Usage

View File

@ -57657,7 +57657,7 @@ CVE-2012-6660,0,0,4204af3ea712772dc4d2606f2cf6e50a4341f1ad86d3a699d4638987ff7995
CVE-2012-6661,0,0,f39755d71d5dcc549a8db5e512206dba577042eda0dc3867bbe57bd93b2c2a66,2014-11-05T03:32:38.557000
CVE-2012-6662,0,0,1e751bc515057f0a0c08389a90d61351cc4d3ce27e4b7bbe699da54113df605c,2018-07-14T01:29:00.267000
CVE-2012-6663,0,0,3f87372a88dc5ad47844a9ccc94a467ebb7601db36607697bda1bc45ab17e576,2020-01-28T20:10:46.747000
CVE-2012-6664,0,0,4d32d0ecd8f188cf0d9d9bcc0d971ec37c249a31850ecd4f8b74cc0e68f17a7b,2024-06-21T22:15:09.767000
CVE-2012-6664,0,1,6080c2ea515d440e0d90bd1b2385410b9842e9236d647a4b263d6a7cd7c30c44,2024-06-24T12:57:36.513000
CVE-2012-6665,0,0,4c489dc740807bb39593fa609a1515059c128f2ac44b714b33a3cf55b66a3194,2014-11-18T16:54:06.737000
CVE-2012-6666,0,0,962b7cb2904b2d0ca796b3fd595fd8726e2100a0e8fd30af14539bc437b2ae26,2020-02-11T17:40:31.837000
CVE-2012-6667,0,0,41abfcc68b31ea0d99df1ebdea5c67ae9abb0258c45c1107f8327c663f06ea92,2018-01-29T13:07:10.593000
@ -69393,7 +69393,7 @@ CVE-2014-5464,0,0,8deeb0281b9db4f212ca4efdc66134ce9c70ee9145596f228ca92cc47c5e63
CVE-2014-5465,0,0,e8b4208809e03f584a6bb3cd21c0f2caf8fc4911bc0406369f6e78ca20d1fd36,2014-09-03T20:15:36.530000
CVE-2014-5466,0,0,db9eafbbaf858dce0cad9d969bef5c12f1cdb630be454ce3009b8131d8762879,2014-12-17T19:31:00.807000
CVE-2014-5468,0,0,812685be9ec8145ad2039b5d3daf489a0510c1859c48812122bc52998a08515c,2020-02-11T16:02:39.280000
CVE-2014-5470,0,0,4d4ee6a8bbf3c1575a3c9a9cd5e71a3b04c2585195cd4920d156c6c260ad74ac,2024-06-21T22:15:10.417000
CVE-2014-5470,0,1,525514ccbdeb1911827d4c3ea2565d7a420b8a5ef765a77a313f3f56c7982ccd,2024-06-24T12:57:36.513000
CVE-2014-5471,0,0,511c8895ca38af1a8d65229a32673dc6b2ea2427c860430ddaa267c61dd3f125,2023-11-07T02:20:50.287000
CVE-2014-5472,0,0,a2fdef957a40c099c9f524e19471baf211bdbb59c08d4930abb8cfc2e4fbac0d,2023-11-07T02:20:50.383000
CVE-2014-5500,0,0,d3411653c84229d5b2a0ee341eae110722fede3a1b2b0df5c988c79a9ce8736e,2020-01-28T21:17:09.127000
@ -156054,7 +156054,7 @@ CVE-2020-27349,0,0,ef3b2d3e612e690132545938179929f176a6ba136a61ce8e2ba5a0f22d8d5
CVE-2020-2735,0,0,5ed2dcc843c2aa0f70c01b3b04a7d2d4a91ff944b2732397fc6241efa2aaecff,2020-04-16T13:46:11.010000
CVE-2020-27350,0,0,af17d465acd51bc162bfc23e932ea96c98e49e911a17cd3c85b21ce58f1c65ff,2022-10-29T02:41:36.810000
CVE-2020-27351,0,0,23ce876d0cc9cd7447f4adbd408d27289c1b3011c303be7d699e76c691aa1761,2020-12-14T19:56:18.940000
CVE-2020-27352,0,0,737d1cf2ba5fd4b3ec4ca13c6428d955b3075022012da6d5ca5400e19b3668c9,2024-06-21T20:15:10.630000
CVE-2020-27352,0,1,775271b331d443f05f3811969b3f2c16758eb8ecfab950785d2d834fec0c4dac,2024-06-24T12:57:36.513000
CVE-2020-27353,0,0,dc1a7f42a9a4f966e49a5b6386fd9687eba1eac037e40cb29822574f6ad4b163,2024-06-04T23:15:09.320000
CVE-2020-27354,0,0,45dbf196c098dca554d5a1355d73bf4a1e889b5e4842af65035d79e289fb9b14,2024-06-05T00:15:09.547000
CVE-2020-27355,0,0,a2f55d973e1e8b65f87c5f3fb63316f566dec73ca1e0dd417dfb723f7fe99ad0,2024-06-05T00:15:09.617000
@ -208192,7 +208192,7 @@ CVE-2022-42970,0,0,684351571c726e3643d500eb09cd3f89b360763f0fd695f8bb69c804dc28d
CVE-2022-42971,0,0,a1a760e3587785043d9b78a199e09a9c4c8e485ce4f48cc34275b0d788d0cab8,2023-02-08T19:43:51.890000
CVE-2022-42972,0,0,5f3b3d9ac192cbb1a45d6a773c5e886c09251dfb9ca13b3ca9cb8c11930ec490,2023-02-08T19:40:51.330000
CVE-2022-42973,0,0,0f6e1ea59a6d9a4bb4e66c46715b9ab0d86461aefc26a6b95446083a3d658078,2023-02-08T19:00:42.387000
CVE-2022-42974,0,0,49f443c5827a338ddd14ea16dbc2f0da9897a889efbc29752336cec27fa650b5,2024-06-21T22:15:10.557000
CVE-2022-42974,0,1,edd3e9f8732ff4df34e6a20ed1be68a223b678c7e3ab4ecc085c942516210d61,2024-06-24T12:57:36.513000
CVE-2022-42975,0,0,f256f7d52b33ef16660e0ebf6c4ccc6fe1ffaf6c18f82025b01cf1cab52da7cb,2022-10-20T14:12:10.597000
CVE-2022-42977,0,0,4fbf7f5ca129c3ea9e7ba51c6d4ee0d909c52d7d9db35f31f31607b56dc98718,2023-08-08T14:22:24.967000
CVE-2022-42978,0,0,02efb548f6368a021b2a0aa5395451ba1b2aaa35e6f5787da8fad0ffe5e4b189,2022-11-17T04:59:09.643000
@ -228061,7 +228061,7 @@ CVE-2023-37894,0,0,4bbe93630e5c88aaa168650ee7decbbed51e8651e9481ea0b2ab4325f8895
CVE-2023-37895,0,0,5ab5b20db4c6e20aeaa134c4d8abd0f013429c0c247d4496bfe1b82a504531b0,2023-08-03T13:46:25.603000
CVE-2023-37896,0,0,3ecf40f8cf2f8c0ff36bbe5ea08a7aaad4d226d927fede46bcdab27141cf4141,2023-08-10T14:08:02.640000
CVE-2023-37897,0,0,f98dbe8882c7c3ab5f785a21ea28b2787699c34482263dd1eb6040b064c2dcca,2023-07-28T22:24:41.520000
CVE-2023-37898,0,0,1f7ca067066dfc6c356212d190352777a826475ebb485791eab72964adc0c903,2024-06-21T20:15:11.583000
CVE-2023-37898,0,1,3336519c2f8351ef624b8f3b0225df1892def2b360b83ad3e6dd675817f74c65,2024-06-24T12:57:36.513000
CVE-2023-37899,0,0,2d16854cfbc3fbb36523fc677e4d80b09d5385a633407c4bfa059474a4242848,2023-07-28T15:55:57.443000
CVE-2023-3790,0,0,bde00eebc8cc92bd7784fe9a54066bdd4875521aa89050ad28ef8b30072821be,2024-05-17T02:27:47.987000
CVE-2023-37900,0,0,af6036ee134d0225b0b50e819295de548cdf6485df3b5b730e0532d421d89a28,2023-08-03T13:34:40.327000
@ -228632,7 +228632,7 @@ CVE-2023-38502,0,0,6df62ddd9f9f33ef1b9f1f5e0bdc4dde584092ce2b3aa6e7883e9989bb266
CVE-2023-38503,0,0,2bf2f3b94747ae17a77ec0945ee92cb252bd888ca6467cdc7911a685010466c8,2023-08-03T15:33:06.607000
CVE-2023-38504,0,0,010bf69aae5659eee63c94c006066569935ea1b14ffd2ea77e84d47d9e1bcdf0,2023-08-03T13:40:02.697000
CVE-2023-38505,0,0,b0e4a9fa5f054e49b0ce4f0736498a347dd78e339437c52c30c1050187152a5a,2023-08-03T13:40:43.150000
CVE-2023-38506,0,0,52eaa1b9648d616fa5264921fbd9307ffd41f8f60db6edc00f43943e08877394,2024-06-21T20:15:12.003000
CVE-2023-38506,0,1,fd2490410e681fb30d81c26d18905730f8687ac2333971e5eb5d3f7b1e23f9db,2024-06-24T12:57:36.513000
CVE-2023-38507,0,0,5426b3165e7bcfd976cf2ecb06425e14dec20450ae76c5f7cda8287528b6ed23,2023-09-21T14:09:16.523000
CVE-2023-38508,0,0,f1125d8fc92aeea60580be087aecbfa9f6ec32c3ec4276f93811b99b53f900a5,2023-08-30T18:23:27.400000
CVE-2023-38509,0,0,ad4c82e395d5ca4d14371219a4320da10ad4178c3fd494c53f7996576892237c,2024-03-18T18:15:07.627000
@ -229453,7 +229453,7 @@ CVE-2023-39513,0,0,b917e874a9c425318aacac3ba1de2982758ec6e3bfe0d6e78ed128c68cdb4
CVE-2023-39514,0,0,ca4200318c6c6e7ee1d00ac7ab7b5838c6208550cf3b9c80ec1a449b3a264fb1,2023-11-09T05:15:10.750000
CVE-2023-39515,0,0,874ee27a2787d501f8c81f06c3539dd7ae8217292d7f664ec47f7deabdb6d470,2024-03-18T20:15:08.063000
CVE-2023-39516,0,0,1570cc9ed07604763b9dce66d141e6d15a2ff9cd45975c7cea319f970a8713b2,2024-03-18T20:15:08.180000
CVE-2023-39517,0,0,f0b307b44ea82bd25b6b44a70dc67e22d409e88b6b8932643fd687595463475a,2024-06-21T20:15:12.307000
CVE-2023-39517,0,1,5645f97d045d7732881a28879350c913c0d207d7f725f1abd694334e494aa40f,2024-06-24T12:57:36.513000
CVE-2023-39518,0,0,04dff26579f6cf441e85482ab177b9a2bc21b450c5011735e7e33cb208c812c3,2023-08-10T21:10:19.233000
CVE-2023-39519,0,0,63e49c3acbdc7c27ec04d3ad4ff5edccebcdde27b0dadb5b0b810c1df1150f49,2023-08-29T16:06:35.303000
CVE-2023-39520,0,0,54fbfcf047af2f3782404cf6c772af2ac2b775173979a2c4ddb9050659b269a2,2023-08-11T18:10:39.823000
@ -233678,7 +233678,7 @@ CVE-2023-4567,0,0,12b3cac6d4aedf57d3dceb60316c77b1d8e43f24d27cb3caa82a9bbc2d53a8
CVE-2023-45670,0,0,0e706639d6c4ba9473ea3bfe4aa6d756d7458b7f9a7cbb83b6ef1ab198ee6d3c,2023-12-13T20:15:49.010000
CVE-2023-45671,0,0,06f7c207d9be9d98f8ad421e51d3b7fe88672ca21aae1721e8ac12ff7bd6b5df,2023-12-13T20:15:49.170000
CVE-2023-45672,0,0,2f03af43e92281fa5fc8962bdb95e802763bad5da4be324cc0487c106272d300,2023-12-13T20:15:49.260000
CVE-2023-45673,0,0,6d462a9afd4963850eef54fac02c6a3a0bfb20d51e4ab5eb6921f4ba79df1023,2024-06-21T20:15:12.620000
CVE-2023-45673,0,1,ec456be3f96341c55156e7373360d93aea17920e59cecf8d63d0867215b38a80,2024-06-24T12:57:36.513000
CVE-2023-45674,0,0,28fcbf9f864cce272f6e270e13233a2cb3f970c8d869fa94156b19d9e0dc7397,2023-10-18T20:55:55.410000
CVE-2023-45675,0,0,6676e6c635b6fd8130d99da86e6b65983125743d78bd2bc574c9a6c515a04f8b,2023-11-04T06:15:53.630000
CVE-2023-45676,0,0,ead07d4ac2e9dba78ca99fb9b7eb9b48fb0107c5ee188d8b691904fb361113c5,2023-10-26T22:44:03.933000
@ -243224,12 +243224,12 @@ CVE-2024-21509,0,0,b1840eaff4c2213087c96721aaf87fdc6158bea90de6f63bdc95977af5681
CVE-2024-2151,0,0,43d1a22352e1e830bef22f2b8bd5a33b83725db15329384a70a3ee26b8a5da55,2024-05-17T02:38:04.663000
CVE-2024-21511,0,0,d034a9f6c4dcc55a5c4fdcdd7e3a31e0606abc8a26dae5773e22f734aa49e036,2024-04-23T12:52:09.397000
CVE-2024-21512,0,0,aa76b050e4c93f61d8197b2abb831a8245fb81d83da1143493979b801398852e,2024-06-06T13:15:31.390000
CVE-2024-21514,0,0,eda90a60621e0f44ed39680a983efe1636a533ac39f703d4f7e15e9ea899ac40,2024-06-22T05:15:09.637000
CVE-2024-21515,0,0,c231f80a1974a2ba4009fda65f5305b6ce586d7c49acc6406d93a1fb57f8010c,2024-06-22T05:15:10.730000
CVE-2024-21516,0,0,1e219491fe86c0c0389748c76658c75362774fb08c98a9e6e10035a8b3295b61,2024-06-22T05:15:10.967000
CVE-2024-21517,0,0,44addbee25eeb628a89b45abcf056e500672454316f2fba920ffb665f4eac087,2024-06-22T05:15:11.173000
CVE-2024-21518,0,0,d176c05aeea1917b37c37a96a5403bad5a3dd404e893ec8849f30190746e0ac6,2024-06-22T05:15:11.403000
CVE-2024-21519,0,0,2065325e10215ac437a91a40fa4cfdeec3b134efe7e89432621676cb2c28c3f1,2024-06-22T05:15:11.620000
CVE-2024-21514,0,1,223140fdefdf1ae534b5e1437aa6ce2b522342315fe6284f6a3d8c4144b5ff9b,2024-06-24T12:57:36.513000
CVE-2024-21515,0,1,0bcfd0c25b18449f1eb210a2daee0e9d596026bdd7dec79357dcd22c4875cafe,2024-06-24T12:57:36.513000
CVE-2024-21516,0,1,bbb51d1b185da32b8a7cbecc866f9128522a5dcd1e8598ad02f5da6f24cc0a98,2024-06-24T12:57:36.513000
CVE-2024-21517,0,1,337be68f70d59a13bae92d112cc5635d1e5e3117107ee89a1ff44c58dc693318,2024-06-24T12:57:36.513000
CVE-2024-21518,0,1,ae1c7fa9851915da1c2487d92fd221fc7d27d0a27054804bafcc806adda2234b,2024-06-24T12:57:36.513000
CVE-2024-21519,0,1,17ba06e0d881f765b8c5e52e432c0bed322f013a3d41ea668ad189f7ad45584c,2024-06-24T12:57:36.513000
CVE-2024-2152,0,0,3cc97618eb3606d7138054800fe4c9dd1b810706cf75a720e72d22a25acc79fd,2024-05-17T02:38:04.770000
CVE-2024-2153,0,0,32d949763a8c44673b751742c2df9fc58704fdbb602a296b8827b8bcaaa1ed2f,2024-05-17T02:38:04.867000
CVE-2024-2154,0,0,ad1f5443da5008cd83aa665fb0ec59294e0b766fedda6af927118b7949d4ad34,2024-05-17T02:38:04.970000
@ -244964,11 +244964,11 @@ CVE-2024-2454,0,0,0b9f095d4355e2ae908fadafa529487790a4decf8d55ba7b4076087a413392
CVE-2024-24543,0,0,f516e88d85199344e1e2c4ae69468b4de7248951f71da4710fc97171a286ff1a,2024-02-14T17:13:32.827000
CVE-2024-24548,0,0,9dbe1af5af4a9b865bf88b2a305b739ac231a7ce95c9c8ed04344b3144708c91,2024-02-08T18:53:14.107000
CVE-2024-24549,0,0,7307c54c0ee6a9a65247489e8d526cb2c7b7a14f1ca835929ecd7a55bbe78415,2024-06-23T09:15:11.213000
CVE-2024-24550,0,0,91ed89072f346ece3378c3b8cc26e70db4dac38421f3f5215f3d25a61fe9e993,2024-06-24T07:15:13.580000
CVE-2024-24551,0,0,2b898e8e8b496b4e3e19967665dd0e050a5aaa08f0403143650c93ddecb810c3,2024-06-24T07:15:14.760000
CVE-2024-24552,0,0,2ca568287ff7a4646bbdcecd6ec42745f8c73fcda46c19750af4c579ffbcbc5d,2024-06-24T07:15:14.903000
CVE-2024-24553,0,0,bea459affabde308db7a87d6a1bd3fb504d4d4f3eafcb8f0a0083fee19b95ab9,2024-06-24T07:15:15.063000
CVE-2024-24554,0,0,8a71f884ece483692fc8315e1bda1ef879a5a27b3892cd9444f8ec53bc820e6d,2024-06-24T08:15:09.130000
CVE-2024-24550,0,1,61ac0958f7c81e21ffc6e212d90df9448e358c246c7d982ac945bf9b3b54c3a6,2024-06-24T12:57:36.513000
CVE-2024-24551,0,1,c09e43903e6a99d3af4df7dea02c9ad73e2d982e9e97e52cd339d3e743832e20,2024-06-24T12:57:36.513000
CVE-2024-24552,0,1,8c9f5fc1be9547d1cc4306ebe8110c94c4da95fac0673e30f4087ef66a731828,2024-06-24T12:57:36.513000
CVE-2024-24553,0,1,347ce3dff4c5f444571005e84e436cfa714b57025aa4bb0601f3d28b65e59932,2024-06-24T12:57:36.513000
CVE-2024-24554,0,1,c53682f3116f6d8da786d0b5f222cfa790e954b5211b280edd55cfb101b8cd2a,2024-06-24T12:57:36.513000
CVE-2024-24556,0,0,5eadc80f5e2b4d40f2247a29eb7c2aa8b2d9f2f191f8cfe4f491f2d184a6cbe7,2024-02-06T19:24:46.810000
CVE-2024-24557,0,0,803986686a1d77830cb33582e01547bf1b4ed013f71e8dbf2a84322efe6db933,2024-02-09T20:21:32.970000
CVE-2024-24558,0,0,26ffac7b2f9dc8041f02bc6fb374f1f9b0b06e69d8b3e191802aa68af28d0bbc,2024-04-23T19:52:49.107000
@ -245161,7 +245161,7 @@ CVE-2024-24836,0,0,ee629b5aec26f66dc40add401b90f57bfb13b9931b4b44678b51676d92007
CVE-2024-24837,0,0,16c85efff4010603171913a3ff6143d350f674b996ff4a5acabe204694e7ae97,2024-02-22T19:07:27.197000
CVE-2024-24838,0,0,4afcde48d14164adfc15cf4d7f939a164717f3393f5f9be45549860895bc5511,2024-02-07T23:29:33.553000
CVE-2024-24839,0,0,37b5c6617fe0fcff7aec5339a27f9a6c16c22aca80044b82a4026771c3eca093,2024-02-07T23:29:44.520000
CVE-2024-2484,0,0,5476945073e3724e7f50390e1ba18e36c819b641ba69ba6a75131843c9b50279,2024-06-22T02:15:44.940000
CVE-2024-2484,0,1,43d0e97073b91ce539fcee9fb95aea4e22d5aa8af5eae7b86f2c11b3bf75f021,2024-06-24T12:57:36.513000
CVE-2024-24840,0,0,69e7ab6281eb75008c5d108e09c9d4558fced2c9ad6a26ec80f0787514d3f4ef,2024-03-25T01:51:01.223000
CVE-2024-24841,0,0,8d08a6d1ed3e8a8d7ebad26c8c83a1c96f0b8da3465bfb5372729a0bb8fb45ab,2024-02-07T23:30:01.510000
CVE-2024-24842,0,0,8b1c2c4a8d0fd58f7f91ef2ff0475d75e7e2be5243ca5626fa0a7bf8e3b4fcc7,2024-03-27T12:29:30.307000
@ -246881,7 +246881,7 @@ CVE-2024-27130,0,0,387d6d6bd78861e8f479c2855dcd6ca0a6b290bc9bab5fadd88ddb47cbcf6
CVE-2024-27132,0,0,0d4a858300081e7b1734f10a34971409f661ea8e5d10f439041910c3efb6a17b,2024-02-26T13:42:22.567000
CVE-2024-27133,0,0,1ea41b494ad0a5106ea020fe3275dce436a1bf62da11c275e95a71856ace701b,2024-02-26T13:42:22.567000
CVE-2024-27135,0,0,c0b7364866f5910220db1f3515d91e63f085beb1f854242bc27d0a872c26bbb9,2024-05-01T17:15:30.087000
CVE-2024-27136,0,0,ba5122bff8d11f89f413f3a3c07e0fd16f5fda04ad923cfc74647c43821a4f5c,2024-06-24T08:15:09.297000
CVE-2024-27136,0,1,e50c2edb7818a90bd0149f3670cc29bcfdc4b13b378869b6a1fb132c8bd18baa,2024-06-24T12:57:36.513000
CVE-2024-27138,0,0,b099a37bd6bd06771ccd0d4a605b41ff72cf31165d4c7c0ea37d0b28b310e949,2024-05-17T02:37:25.107000
CVE-2024-27139,0,0,5e7888e89d482e3e5f40cfdc640fb4169d86933380e96bafbb3178e764d3924e,2024-05-17T02:37:25.190000
CVE-2024-2714,0,0,14f40cd4bfa53feeb5e4acf18b5d2b179b0ad5429d8ebda8d963bedfd21bc4c2,2024-05-17T02:38:26.850000
@ -248501,7 +248501,7 @@ CVE-2024-29863,0,0,5ec71e17f35f1b20d68a8fb4a9c7a1d55d3d29cfb9efd5769e3093565fc81
CVE-2024-29864,0,0,a6ff60d6eca0eec860cad03d4ebcf6ddb2a8ce1d06f7fbda3179547925ea7c1b,2024-03-21T12:58:51.093000
CVE-2024-29865,0,0,c71ea820e322882cfd10f1c29db59e00803f8a609d75b87f5e2466dff384d5b6,2024-03-22T15:34:43.663000
CVE-2024-29866,0,0,2169c0f3fed16be1069cbb5502128dfabe18fe6fbc7db4f274cc3c93caea8ddd,2024-03-21T15:24:35.093000
CVE-2024-29868,1,1,fcd8de6d09688eaf5b0c8e2fa6636f13f4605cc2bc22f7b4f9b1cfc9b60cd8cf,2024-06-24T10:15:09.387000
CVE-2024-29868,0,1,6456e128accc60aee2aef86dbbae1cd4b0483a8173709cce49d20eaf8f8b4d72,2024-06-24T12:57:36.513000
CVE-2024-2987,0,0,8e4472435dae1bc704d5dce95b8b76dabb2648c6f5bada5b41186e08bd4d1ecf,2024-05-17T02:38:40.867000
CVE-2024-29870,0,0,e30dc3832a6e40f96f36d6a14e8c8edd290056d5cc189e329ff7d917f01a8001,2024-03-21T15:24:35.093000
CVE-2024-29871,0,0,26669ba5bfad06e749b4da0897856b8ae6b3b31b4382f6713c54983091b3efd3,2024-03-21T15:24:35.093000
@ -249469,7 +249469,7 @@ CVE-2024-31206,0,0,bd1cbc8a5901cc2b410cb59c86ef8c814546918b6efc52403de5ae308d36d
CVE-2024-31207,0,0,af1a3137415a749d0a1549c9f6fa25303b24e194f3861bc2095545bb707985a2,2024-04-04T16:33:06.610000
CVE-2024-31208,0,0,3b50aadb71f25a9cf7ee15f4c1f11e4e7c181ffc1eae0b9bc067f01e2c928e28,2024-05-03T03:16:28.857000
CVE-2024-31209,0,0,dc7f150a1f8931f337c3d30121f71937562fb9b370a799204e5d75b796fcdc02,2024-04-04T16:33:06.610000
CVE-2024-3121,0,0,55334ecd2c29cda963388103b75e6243cd2af3528469cd1facc04d3d39e0f871,2024-06-24T00:15:09.680000
CVE-2024-3121,0,1,b054d5ae865eab70f066866741f3be3269a64b983c81b37ff42ed38c0b68ea3d,2024-06-24T12:57:36.513000
CVE-2024-31210,0,0,0c3a74f1634842d277fcf52471d61be8d27ebe967ace4d479af8f65fffdace19,2024-04-05T12:40:52.763000
CVE-2024-31211,0,0,37f6ef15b9def8ff0d686fae9ad61ad1a082be15bc6a18f70a40cbfe15e962e2,2024-04-05T12:40:52.763000
CVE-2024-31212,0,0,bc73795c68873aacd12eddecc823b76392ffac886146f1dd814e2d43e468bb84,2024-04-05T12:40:52.763000
@ -250397,6 +250397,7 @@ CVE-2024-32636,0,0,b839e4487b1638854c5d5ed3e87a4fdbdb3bc06aadde0672da5bb7c4c2664
CVE-2024-32637,0,0,97158ed5566d3250b3fb8d995175abcc4416b94fccd5758c6cd34951fc968110,2024-05-14T19:17:55.627000
CVE-2024-32638,0,0,59375073558f82dda1dfd378010829dbc4b43397a23c1692acbbc241abef4929,2024-05-02T14:15:09.830000
CVE-2024-32639,0,0,f99f2a7c37840cbb9e81b91cedc42f4b5433fcd481ea7dcba5df3b2b90ac9ebd,2024-05-14T19:17:55.627000
CVE-2024-3264,1,1,a807c4bc2c30dd7f0a58e7010c78e23a60c343a32a50d9fdc9ac32546c12e4a7,2024-06-24T13:15:11.627000
CVE-2024-32644,0,0,e88c5eb3a89ae127bbaa68ee6900bb69776588719de1a17fdbc979f8b62412c9,2024-04-19T16:19:49.043000
CVE-2024-32645,0,0,b793223b9f315c955102349a0fffec6d395200342592d911bfc2d42be0594699,2024-04-26T12:58:17.720000
CVE-2024-32646,0,0,9f830707470a3978892edc29be298706f63ea6896e8eab377ae270338a7fdb45,2024-04-26T12:58:17.720000
@ -251478,7 +251479,7 @@ CVE-2024-34448,0,0,2ee47d576d9de678e8b37edc8c4fb672f63b76bc5fc5740404718a42f40a4
CVE-2024-34449,0,0,97d09fdadfd613905dbfd9871f1d974c32ae8fd0c469e4b64fe2252427eb7288,2024-06-04T19:20:00.563000
CVE-2024-3445,0,0,2031eee497e177f244890449ab10d2f196dd08d103f846fc9b20779b1f74d465,2024-05-17T02:39:56.830000
CVE-2024-34451,0,0,e70710b537fe2eeb930751f9cb9f8206f6cd9179f5b8e341e64ba4d6bec23b04,2024-06-17T12:42:04.623000
CVE-2024-34452,0,0,2334b13963677fe15aa1df4f4d0c3bfced186e52ba6ea069fb1effa59ff65005,2024-06-21T22:15:10.877000
CVE-2024-34452,0,1,1539d23d88439359c8056a55b62128368abc940cc3fe41e5eb768680fb4e9509,2024-06-24T12:57:36.513000
CVE-2024-34453,0,0,9363deaf6a5ec68194d671cadb0973a2ba23402d3e2800c4f9eea6dbd677c5cd,2024-05-06T12:44:56.377000
CVE-2024-34454,0,0,5a4e256350d1e944e58328b51d73ec47802d2b17d3b93d5d7c62570b2e291430,2024-05-28T12:39:28.377000
CVE-2024-34455,0,0,cf6832f7361884f15470d2143d9f538281f7bb0657fc697433a93775fe331b3f,2024-05-07T18:15:08.417000
@ -251737,7 +251738,7 @@ CVE-2024-34974,0,0,519613cdbc229706fafa4388ed0de03632496af6e2fd3a5450a4996c9b966
CVE-2024-3498,0,0,5a88bde38eadc03f84603569fdec38fe83a6606de78277714e78faa80a5569cc,2024-06-17T12:42:04.623000
CVE-2024-34982,0,0,ef460a32eb987949d8c2a373dc7919974bee9f6e2b2a3c53ead2e4138396cd2a,2024-05-17T18:35:35.070000
CVE-2024-34987,0,0,262d3ccca2f7e7df7be241d8326c4714ae2b44466572454690af1a110c26db06,2024-06-18T19:15:59.873000
CVE-2024-34989,0,0,8b6b6014c5b52a35449706cfa58a6728031aebb0f65d9df003ca411259b06d82,2024-06-21T22:15:10.947000
CVE-2024-34989,0,1,a75d8ba41908a8d4a011a34c5328e77e756e2c0766173d0c2f6d80fbf3e9fc4f,2024-06-24T12:57:36.513000
CVE-2024-3499,0,0,38e1f3a6ce5aff826b19a73a4f796b980cc1161eaf58f8fada2f6f87e54573a4,2024-05-02T18:00:37.360000
CVE-2024-34990,0,0,954e9cad148d93781e06727d2db5247f2f552d787151dbf2d18611cf67a55aa3,2024-06-20T12:43:25.663000
CVE-2024-34993,0,0,88520e58b3968956ee44832ef9bca602378dea4f2524d5113c2eaf5052b0d026,2024-06-20T12:43:25.663000
@ -252327,7 +252328,7 @@ CVE-2024-35926,0,0,3d2ac2a243ca9048cff71d0540f9f97d2905350e3f238d4a33454ffd229ef
CVE-2024-35927,0,0,2bcd735e32c2af1f7e79dd26901d4373a7c4ef8ed5e2d8dba0a02e14274fe96e,2024-06-16T13:15:52.210000
CVE-2024-35928,0,0,a8dd6c98251d56ea2212a0301bd7693ba0fba47583ce10689329bb703f6a5832,2024-05-20T13:00:04.957000
CVE-2024-35929,0,0,b0976c945734b786059cbe173ebcdddfdbb33c2a425bef7cc1a51cc621711858,2024-05-20T13:00:04.957000
CVE-2024-3593,0,0,b61b4f58a8c00e15052840cee5d727e9d222d3ea8d331a7659ded68e3aee23ee,2024-06-22T06:15:09.683000
CVE-2024-3593,0,1,50acbf7960e7625d05da9c7b7d3132eed4d98afbc22e4645d383611e54614202,2024-06-24T12:57:36.513000
CVE-2024-35930,0,0,2a97a1ff87590a7e1fe94b612cee91739241b0cbec5ac34e91077bb8527f1f84,2024-05-20T13:00:04.957000
CVE-2024-35931,0,0,bbab3f0c9f0ef1064e0fe5e3a06458e22ca3658e43381297612e0f4a8c31dbf3,2024-05-20T13:00:04.957000
CVE-2024-35932,0,0,a2b9c7df497b22693711ec0433b1152b0c1e4b5c96252607b0317c8f6571001a,2024-05-20T13:00:04.957000
@ -252442,6 +252443,7 @@ CVE-2024-36032,0,0,5a12487bf2cb4627b147414b9dd50756c55a274ce8d6f1678519c36adada0
CVE-2024-36033,0,0,761ce8e91fd8ec725f5fd70906c3e8b3e4ae739a30faa4a1ecc4c7502a89a5b5,2024-05-30T18:19:11.743000
CVE-2024-36036,0,0,399529c38d111e737eeb859298f0b12af936846a2a63555a4e1fd24103a1ae63,2024-05-28T12:39:28.377000
CVE-2024-36037,0,0,e8ddc31f39a62a0d6f93584a2886b907bf85fcebcdd4d47a54b701feefb8d09a,2024-05-31T11:15:09.563000
CVE-2024-36038,1,1,c689030949db2782a8d69ade71f9a1affc97ffaf319c773509c47cb5ee7f1cd3,2024-06-24T12:57:36.513000
CVE-2024-36039,0,0,2459d11347af42cb829e5007b01f06e3d0aed0906f508ec72619f858b8aa6d3e,2024-06-24T07:15:15.230000
CVE-2024-36042,0,0,2ba301066fcf3b5e2098ddfbb2759b29cc55ab5a805cf9edc9ebe22e6b436ca1,2024-06-03T14:46:24.250000
CVE-2024-36043,0,0,a692d077d358c1feb0a509deb9a8e16caf647bf207b7ab7a4cd103038bbab39e,2024-05-20T13:00:04.957000
@ -252707,9 +252709,9 @@ CVE-2024-36481,0,0,289e7e75bda9b051d0f16493c3f7ea721a35d329796879f3ae868bd0ce7af
CVE-2024-36484,0,0,d8980b6175f97dcbe3120732bdd3f5c4554f0bf6402d98cdd4a7efe1e2dc7659,2024-06-21T11:22:01.687000
CVE-2024-36489,0,0,706602251538409bdd6d4f26c7d5b5f5da3d2d56202958896118ef2720f4e680,2024-06-21T11:22:01.687000
CVE-2024-3649,0,0,969867829e20da4acc88ade671a27808c021dddbe3e27e051d2004e683670e61,2024-05-02T18:00:37.360000
CVE-2024-36495,0,0,6ed534b3914581c2d718a5af5dab95525c5ee99a2e37b7b16e42963dac7da249,2024-06-24T09:15:09.730000
CVE-2024-36496,0,0,5d4f653e98532d8e3c120ed293c6b23c3e6c972681112b087748cf948d242561,2024-06-24T09:15:09.860000
CVE-2024-36497,0,0,5127841a489d1ab5caa3b0be5e2e28ad3a89ddbad5090d1bb055835bd029c09b,2024-06-24T09:15:09.973000
CVE-2024-36495,0,1,d9d28e1a1fd281ca964f0042d0fd265c5763c72a4d99c5be9029cbc7cc87d6f8,2024-06-24T12:57:36.513000
CVE-2024-36496,0,1,9d76f9f331f7a3ce8e8c07fdc139a40e82082320b813e0048d8ab2eddcd0dab0,2024-06-24T12:57:36.513000
CVE-2024-36497,0,1,6ff4168316a11cfbe12c62dbc93afe8b943f1b1990726380c4d2212c636c0ad3,2024-06-24T12:57:36.513000
CVE-2024-36499,0,0,077c5caf8d301ff2d1947e18a01670bc02e5c0dd9fda48352816e5be2251d0eb,2024-06-17T12:42:04.623000
CVE-2024-3650,0,0,e078ac649d7d0d133fe9598e10336739bc9d365236ed72d408805e3868c3d439,2024-05-02T18:00:37.360000
CVE-2024-36500,0,0,257fd399a14a7141c50c9e2046f94aaac781c0de172f7af5b46d8dab39ba2a83,2024-06-17T12:42:04.623000
@ -252721,7 +252723,7 @@ CVE-2024-36523,0,0,779ff20f3e54c54b68fa38cf8a73a6874fca821f18024ef38fb974b398395
CVE-2024-36527,0,0,78d7584b160535d1351b569ab12493248c714d50ee4dfafee49cf0501ef01071,2024-06-20T12:44:22.977000
CVE-2024-36528,0,0,f25edd031c479e2eb08ab34031d71804f3bb9f2a7bd4f1a1d0b25d391d002135,2024-06-10T18:06:22.600000
CVE-2024-36531,0,0,991b1a5a568679e84b92f85516ddb5ed86f9e4a97046e45c71aa818ce6df4847,2024-06-10T18:06:22.600000
CVE-2024-36532,0,0,59588622f628a9e766e59400afc9655121bcb429e9640a58ed6291563d38616d,2024-06-21T22:15:11.020000
CVE-2024-36532,0,1,4ecc13b4c128bec93f6e823ccd296809f806d38583394cf96f9983f47941daec,2024-06-24T12:57:36.513000
CVE-2024-3654,0,0,954800a828ed246c147def14a6599156bd18a3e2cc72072dd62b0ab02b4bbf53,2024-04-19T16:19:49.043000
CVE-2024-36543,0,0,96dadbfc1ecb488523e1445b9cca4f88005d70a44d460cd8a195bc76559786cc,2024-06-20T12:44:22.977000
CVE-2024-36547,0,0,6660ddee6e567c7988e43d4b24008e0896770307b9894b7b829c762e8a195005,2024-06-06T15:16:11.897000
@ -252981,7 +252983,13 @@ CVE-2024-37079,0,0,9bbd76d5444005ceb39d0ac68b0b4e335d82d5da3fc1107a95914993fa985
CVE-2024-3708,0,0,09132fb1644ebf0c808002aa8ac15b19f13ae71d0beb378f7a9664a5ae685f9a,2024-05-24T01:15:30.977000
CVE-2024-37080,0,0,c953e426661198e9665c742ef09fb44af751efb40a1f491b02b9f5389b1d3d21,2024-06-20T12:44:01.637000
CVE-2024-37081,0,0,462e18659ef5f7f4965b221966912e397932217f36959496e3a505bf8400d835,2024-06-20T12:44:01.637000
CVE-2024-37089,1,1,546734d08a472f24d21b11f96a62ff07ba2d9777252aa2840029efb67a03052d,2024-06-24T12:57:36.513000
CVE-2024-37091,1,1,70ef4cb5aa59df22f5d9bec3c45f39a3b926dd43e7416671f8860a54328745e5,2024-06-24T12:57:36.513000
CVE-2024-37092,1,1,971a03f9af7b1d4b19cf531fe5b564d86176fa4578858214186f85168c2756ec,2024-06-24T13:15:10.010000
CVE-2024-37107,1,1,a06218ce885c7a31503b0bac4faf9933303574516d8c93220100d059c34cdda3,2024-06-24T13:15:10.247000
CVE-2024-37109,1,1,1f82bf035d42d194ad9fed242ac79a3a117b8af6edb9002a90c11d231651c6a4,2024-06-24T13:15:10.483000
CVE-2024-3711,0,0,00ee502ae0ae8bdc802cd38eb1ec1e1356c10e1c18d766a4effd20297a066f55,2024-05-24T01:15:30.977000
CVE-2024-37111,1,1,41d72840ce8d15bfa799af2a2f06fa84fe7fe1e9bb4118f440490b5bc69eb18e,2024-06-24T13:15:10.720000
CVE-2024-37118,0,0,324096007c08912dfaef7c3d0cc3ac615d8bd1b4cfe586711e107346e35c781e,2024-06-21T15:58:38.553000
CVE-2024-37124,0,0,bdb1c2622a72a7efb103c3f5603bc06acb88520168a2b939ad78f62d410bde2b,2024-06-20T12:44:01.637000
CVE-2024-37130,0,0,e0f79c9f14be5102570781fc06be35c79666eecf04eb579171e468c9a760aecc,2024-06-11T13:54:12.057000
@ -253019,8 +253027,11 @@ CVE-2024-37212,0,0,ae4a36aa63ece820d606153b80eacb3f7e497935120df4142b03200847559
CVE-2024-3722,0,0,7c1b4fae7e86bf4c1bc76a0d39819ffc592a7b598c7675ac0628daa278671c4c,2024-05-14T16:11:39.510000
CVE-2024-37222,0,0,65c65c234c553e022a88bb4c0528d9ed3832ed1be7f7805c03100111f1d159f6,2024-06-20T16:07:50.417000
CVE-2024-37227,0,0,5f91d8a6e7671152348b8531b9b1b326309073799bc135ebcc76c7074c644de2,2024-06-21T15:58:38.553000
CVE-2024-37228,1,1,390ee13309def507aec97c3c88775dd8a41e300274a0b08802f9399ab1f09971,2024-06-24T13:15:10.947000
CVE-2024-3723,0,0,21c397ab5e875f2652ba15d9001cdd8ef5c5941ff996881e18084aebeaee892e,2024-06-11T13:54:12.057000
CVE-2024-37230,0,0,ff886f458710fd75389417297f1ffe0ec70d41e161a7ba04217925f513d3c2c9,2024-06-21T15:58:38.553000
CVE-2024-37231,1,1,295ba080f6c07f6aa4148ad30310af64835d3fa5043ac5171b7a6a32ee323523,2024-06-24T13:15:11.177000
CVE-2024-37233,1,1,9763774c3aa953fe9befe743f392137d30984a777e620234e6d0572e5cdc561e,2024-06-24T13:15:11.400000
CVE-2024-3724,0,0,a2f08bb0a2e36a5c374b862fb3e4beff315b3d6672953c5eeabe10290b435e2c,2024-05-02T18:00:37.360000
CVE-2024-3725,0,0,dd194c190207038aca40dcc17eaac7bd7c6f9f34e04d00c016e0de6cd9837da0,2024-05-02T18:00:37.360000
CVE-2024-3726,0,0,5d13f10d5b73efb7ab7c6448eee56ee5b7f1a739226807fb6eef2a4ab850d2f7,2024-05-30T13:15:41.297000
@ -253136,7 +253147,7 @@ CVE-2024-37643,0,0,dd4dd1cf62f3e08f00b2f338cadf964b79fd48d825ed68a41a2bd5d2e825e
CVE-2024-37644,0,0,5f7f97e28e218e3fb348230aa8347ee3b0354d72853f4d6c2591e151f0231333,2024-06-17T12:42:04.623000
CVE-2024-37645,0,0,1f2d6a8f87fac13d3d11d6cbec3b695ad44ed6f32f14768d5b077122546347a3,2024-06-17T12:42:04.623000
CVE-2024-3765,0,0,4fdba2eb80818b350bc57cc64ca06a70a8e5d2cec5cc9e99a6b5fff1df632742,2024-05-17T02:40:06.923000
CVE-2024-37654,0,0,bfe186dd8770e8a9781221dcafdd78b7e079c590fc95991e151268f2e9524093,2024-06-21T22:15:11.087000
CVE-2024-37654,0,1,2be5fad4abae82a09a489f1c5b0c12ed88c0a91ac4520b7fdb6aef9d062d3590,2024-06-24T12:57:36.513000
CVE-2024-3766,0,0,332312c4ae938e5b9f3b0590f4ebc42c71b180341fc998112e3b0be5e6d60da1,2024-06-20T16:15:14.380000
CVE-2024-37661,0,0,81e23698cd648834aff1e39e66ffecdc62f564b919dc4643e362915df5fa1b2a,2024-06-20T12:44:22.977000
CVE-2024-37662,0,0,2581d16ac0c1e64ed9489a4956fd58fc745c5ab4cf8c43694c38d8d5ee60569c,2024-06-20T12:44:22.977000
@ -253152,7 +253163,7 @@ CVE-2024-37675,0,0,2d85884f52ce751c1f86857c3080dbca34070b59adfb64d2a979b44418ef3
CVE-2024-37676,0,0,9b6174275e973fa26ace8eeff114e47be3264bfcc9cbe3eb6174581137c23815,2024-06-21T11:22:01.687000
CVE-2024-3768,0,0,778d3eea8bf87c1f80239f04628ed71cfd577dabb0ce88459344c4cd4d61bb16,2024-05-17T02:40:07.203000
CVE-2024-3769,0,0,a35a1a6580261497cd040b87c6b68395a49a236a06454712c9a126123641e120,2024-05-17T02:40:07.297000
CVE-2024-37694,0,0,b5443d606b3fdcb928d14f416949c0c2b3a5fcdf4505d05407ccf938b25cfe71,2024-06-21T22:15:11.157000
CVE-2024-37694,0,1,5368167ec99eb6ece190aa9225c5926bf9e44c57bc2336a35816fa241ead9559,2024-06-24T12:57:36.513000
CVE-2024-37699,0,0,e6aa9aad96c5cb91a6fa4201b1b47001ba232f78e3136af80ddfa6d4248f51dc,2024-06-21T11:22:01.687000
CVE-2024-3770,0,0,8954a3ad0db5fc9b48d9243a1de01e444d03084d0f8b5d5da9ebc562e8f0e6a6,2024-05-17T02:40:07.387000
CVE-2024-3771,0,0,1bf22922ed0657906343b6368a2362d22a78a1ff9d5272db064e582b3b0855d4,2024-05-17T02:40:07.477000
@ -253262,7 +253273,7 @@ CVE-2024-38295,0,0,c0872c7c53c37c26d78f688a94fd2e7f57965fc18ec3a253d1cbc168692f7
CVE-2024-3831,0,0,28fa4e2fb2524144138a610966fa5501c7b19e1083bb04e4062bd6679bbd2a31,2024-05-14T16:11:39.510000
CVE-2024-38312,0,0,a025bc282a0932c71cb95ccc5342a2a383a8f77cb388790ae2ac3d82d89cfc0a,2024-06-17T12:43:31.090000
CVE-2024-38313,0,0,1c234fe7a87659718d48f2a88e14944f64c41ea923fa0d6325e8d4b1e192fda1,2024-06-17T12:43:31.090000
CVE-2024-38319,0,0,1e56e195f12e1e70d4e7a74fa7afe0dcd9bb8240f46f1c4233e434a28cd989d8,2024-06-22T19:15:09.070000
CVE-2024-38319,0,1,b424d3c1ce5233c9ed183de13fbb6b30d800a84b86175662e040e79a80011cf5,2024-06-24T12:57:36.513000
CVE-2024-3832,0,0,1075b96952121645fbb81b228e0c3813e39db7e21c4c9aa1fc24c30b61618c13,2024-04-23T18:15:15.187000
CVE-2024-38329,0,0,6a4543a55a7780ada6e17c79a82dd0a8355d271b676150df85f00b992a580a6b,2024-06-20T12:44:01.637000
CVE-2024-3833,0,0,ba630503495cf2aaf1fce7ce704a30930ed35eb1665a53e19102e8c18f607a36,2024-05-03T03:16:28.940000
@ -253278,7 +253289,7 @@ CVE-2024-38358,0,0,d7fa4473d29cbfc514ec5a6118f6b700b95e48744d7580b8a99541a6dd9ba
CVE-2024-38359,0,0,3c4a78257f1dc283c0e90aef4e0803c297f82552e9ac95d2cc406a3431781604,2024-06-21T11:22:01.687000
CVE-2024-38361,0,0,a76df29cb5f27115adee4ca4e20976361dfcfc6eae95b97031ba2314a1f45bae,2024-06-21T11:22:01.687000
CVE-2024-3837,0,0,5046b04f6fff161407832d91f839d6c01f3dcf30bcf75f620bfd7221b5de1c27,2024-05-03T03:16:29.010000
CVE-2024-38379,0,0,290edb4a82ab5a9fc068ab253273a58239aca80886e608c2d8020f715709baf3,2024-06-22T09:15:09.577000
CVE-2024-38379,0,1,d0af2d7e81a6285c1c7099c958a4a50ce3d2f639bd068091599f2b1327853e0b,2024-06-24T12:57:36.513000
CVE-2024-3838,0,0,bd55ca068ebe4472845bce1f3d037932d27279da54b129864c942318cbf6c399,2024-04-23T18:15:15.410000
CVE-2024-38381,0,0,57bad93cce191bbc955387dd0e3d9e6db94203bba2cb2542c0250ea811d81445,2024-06-21T11:22:01.687000
CVE-2024-38388,0,0,7c0bb01f9b9fb79d83dbd6e2c27fd6e239bc8d3e90d248b1b279840e35bf7176,2024-06-21T11:22:01.687000
@ -253500,9 +253511,9 @@ CVE-2024-3929,0,0,31d0a734bfd88727a2a61deb7a29595ac9c8ac4a930ee35c31639990489d02
CVE-2024-3931,0,0,ff26b5a8728d6a7f3e1f8095f9d431d98f0c624577950ceaf4dc1cf9ad688034,2024-06-06T20:15:13.933000
CVE-2024-3932,0,0,371291a71f9c99e371f96e7d7b61e3e11967567047c07fae80310c4772d1c0c7,2024-06-06T20:15:14.030000
CVE-2024-3933,0,0,1d08d4e317596700be65ef5300f76b449794bb2d8b1542a98c34b9cd74fea015,2024-05-28T12:39:28.377000
CVE-2024-39331,0,0,0004c9080d524d1b169c2f47687275982d21fd1cdd7181b1048338d08a3deaa0,2024-06-23T22:15:09.370000
CVE-2024-39334,0,0,91d0b0de89be300a86a73b924fe0e63e4dd8272867397f0b420a2f8d6e51abda,2024-06-23T23:15:09.387000
CVE-2024-39337,0,0,0f7a6ca5ea40d60b939f5d1147a0b6871b2f3fa97346a61ede14b029a2e9b5dc,2024-06-24T00:15:09.577000
CVE-2024-39331,0,1,d1461e039a637b8713f6e32e0beebb2ef4c2e762f105aa6c4f21bab6716eddb8,2024-06-24T12:57:36.513000
CVE-2024-39334,0,1,7a242c73a28ed17874e43348a26da2104869d7ef8d91c48fe0d8d7e00f57c31d,2024-06-24T12:57:36.513000
CVE-2024-39337,0,1,7c96f97902de4594057b22d7507f3218093cc9f703d055990179db138387110a,2024-06-24T12:57:36.513000
CVE-2024-3936,0,0,1a9ebdb5653b792bdb8abb0138184d539d6d0e0c9af8da519de630a92cc0aee0,2024-05-02T18:00:37.360000
CVE-2024-3937,0,0,47b49a69bcae07617978c4de23b5bd0d4eef565a4a3d61421481625d7a4abea5,2024-05-29T13:02:09.280000
CVE-2024-3939,0,0,8db4cbfcc78e197894431199cdad6af4ac1ac13ee2f1028e231ba1f907931766,2024-05-28T12:39:28.377000
@ -253783,7 +253794,7 @@ CVE-2024-4308,0,0,c30b8d7bce14d8d06db9bf545139ec925cbf528f27e8b442e0e9c6b9a7a518
CVE-2024-4309,0,0,f1f14d3d80b8943142865ddb6cb7e0bda2252fff5ef38ed63d563490a010cefb,2024-04-30T13:11:16.690000
CVE-2024-4310,0,0,6a8887d86a728fc0163c37e4f3726fb9d19866f95653c15dd5d393e7592aa1b6,2024-04-30T13:11:16.690000
CVE-2024-4312,0,0,9e55bf62ae99c615e6428643ba23c177214afa107267a60fb24a14ad6d9006da,2024-05-14T16:11:39.510000
CVE-2024-4313,0,0,b0ea30d1a5738d43841449a96d3d716686d8b8648510d41195a7de577b9c3e44,2024-06-22T02:15:45.143000
CVE-2024-4313,0,1,d55be6ca4814817e3ec901c3121a371ea3b53546d27d55f9bba710a7d124de65,2024-06-24T12:57:36.513000
CVE-2024-4314,0,0,917e44d69c76fb7381314145ce5012ff94d63258309b3ec3d14bdf6a76c85d11,2024-05-14T16:11:39.510000
CVE-2024-4315,0,0,995d1a036dd5464d03708a1f15510f6b9a69355ad24bf6c219e8296e5f036307,2024-06-13T18:36:09.013000
CVE-2024-4316,0,0,5a945ac0a4e5139fc35505b0ad29ed6f4f78dc21cf82c5a713e2fc10353001af,2024-05-14T16:11:39.510000
@ -253905,7 +253916,7 @@ CVE-2024-4455,0,0,e18738afbef678c84ea567282093c6582d8247bf14c57fe724fa93ee096ec5
CVE-2024-4456,0,0,43bdd543de001702ca45614b4a3579c52bfa7b188e5cb3e6b81f25f610f74e45,2024-05-08T13:15:00.690000
CVE-2024-4458,0,0,78210a24e5c56842073afd1809a4bb2418e02424d7be783c86e219719dd0857b,2024-06-06T14:17:35.017000
CVE-2024-4459,0,0,a416ba14244e130e353615c3d33f61a53ec702533b4ddc327eb1ed858a6b026e,2024-06-06T14:17:35.017000
CVE-2024-4460,0,0,692325c73f255a435715fd2d0e6353ae382a2eebcce50fd182f3ae121f35b4b0,2024-06-24T07:15:15.400000
CVE-2024-4460,0,1,862a51320c426deaf3bd9e2e5f72b280b8de3148daed4a38b4b5a01f7fecee88,2024-06-24T12:57:36.513000
CVE-2024-4461,0,0,ad05f4e37257e33f27f784f842f8dfa34f685ff06dd273bc6842a04c51c93bf6,2024-05-03T12:48:41.067000
CVE-2024-4462,0,0,c8f7490df4b9ef7118fdef5b7ade6db6ae196f6576f8cec5720233f982c7a0b4,2024-06-04T16:57:41.053000
CVE-2024-4463,0,0,aaa5b32073fcbc7160927d348961b4790302ca7b8c414e16cdb6cacefbfd98b3,2024-05-14T16:11:39.510000
@ -253936,7 +253947,7 @@ CVE-2024-4494,0,0,918249bcec6c97b277e3b4f550dceb7b2011aee0beee5ec958afda7f3738c4
CVE-2024-4495,0,0,fe9f63f3d5d1b610e50beccc2de27a1d5b44365b084262ae38bb4fd9d5328cdc,2024-05-17T02:40:25.167000
CVE-2024-4496,0,0,4878b7878675893c8860dfe2f628aacf9ba89db4defe7afc239c902840c6a063,2024-06-04T19:20:39.340000
CVE-2024-4497,0,0,50d7ba6642949616c67705bbd4e65539b7b6c5038eedacdf442c2c58b50804af,2024-06-04T19:20:39.437000
CVE-2024-4499,0,0,6c383c6161dee8590159edbeaf009f1ab69e820be693fb0343d394109b063cc7,2024-06-24T03:15:09.797000
CVE-2024-4499,0,1,f4b472a59fe34d2ac64bdac793946e35a6b106a1185caa9e468ffec3d977af40,2024-06-24T12:57:36.513000
CVE-2024-4500,0,0,184ac3c3db109ec0d3b3a58c1a88c0ffd13050ae02d0994392f9ed87744cbb9b,2024-06-04T19:20:39.540000
CVE-2024-4501,0,0,78ba43474897acce19ce9d16c899049eb30d079a8149999ee597d7e98a169843,2024-06-04T19:20:39.640000
CVE-2024-4502,0,0,653df23e213fc50f206c7824b75fb38cef543a337a0b7a3299e8e9f894ad1dac,2024-06-04T19:20:39.747000
@ -254144,7 +254155,7 @@ CVE-2024-4747,0,0,99152f6494a1192f3bae59b436abcc51d11f811ed1e0a72c2e65c8381fda60
CVE-2024-4749,0,0,676e331864bc41907c4c80c44886e7dac480ef6dea2c29bc22838d992753d4da,2024-06-04T16:57:41.053000
CVE-2024-4750,0,0,423585a3e250903ac62d761ecb0e0e6dc6b4649ccd4411b90275a4e6d2f87495,2024-06-04T16:57:41.053000
CVE-2024-4751,0,0,980cee331660133759599aaa98eeae384de48fe7bcc98af4a2333b20d054b0b6,2024-06-17T12:42:04.623000
CVE-2024-4754,0,0,cfd9e5babf41a7c2c5cd02f9b538bb66bc8b2969c9bce4d32f39c788fb710059,2024-06-24T09:15:10.083000
CVE-2024-4754,0,1,65f7d30a77e8c92b9ac1114b7ed7f43c32a5bfb34fe46cea0e558e1fff1e464e,2024-06-24T12:57:36.513000
CVE-2024-4755,0,0,60cecdfed0bd43adc43dc2d247a1ee989fd3070ddc34fbd20a182a68e206cadc,2024-06-21T11:22:01.687000
CVE-2024-4756,0,0,b303493fc627eee25a3b39c986ea25472e7aab1866612b83c9a7c14522d2c360,2024-06-07T14:56:05.647000
CVE-2024-4760,0,0,8b9593f0d88cbd24a061db082c8cd5c20f19b8a61431542d1ce576639ef3bdc0,2024-05-16T15:44:44.683000
@ -254208,8 +254219,9 @@ CVE-2024-4826,0,0,af3613d04b75e94cea034c72d0262809043a8c645db91b90f9ab3d043b9e85
CVE-2024-4835,0,0,b9626bd6b7354ef649f3d482141bd2eedfd065e81dc3c11d391c7f577be02861,2024-05-24T01:15:30.977000
CVE-2024-4837,0,0,67f132196b6c5804deb56deda048fcbd80dd9bcaa597012fb36064245b7ca6b6,2024-05-15T18:35:11.453000
CVE-2024-4838,0,0,213892fd4e00ded7d0e7161081f565f4e4fb5fc98a2507596b17757660a932b0,2024-05-16T13:03:05.353000
CVE-2024-4839,1,1,eab67651709fb63542b0ba4ae9b81e1bdd72090a4bb4da35a2aba173a9de39fa,2024-06-24T13:15:11.900000
CVE-2024-4840,0,0,0433203d32cea74c83d368a573acbff4a265569f0c59cff4b7c2310b61ae299a,2024-05-14T16:11:39.510000
CVE-2024-4841,0,0,79642fdffc683c6b0d04a13ce6417a60c387339808a5119462faf1e701444ffc,2024-06-23T15:15:09.233000
CVE-2024-4841,0,1,a28905a7e1206b85fd97eb79cf72481b65736373dcb78baccea43db452bc24b5,2024-06-24T12:57:36.513000
CVE-2024-4842,0,0,42725480e618d2e75cdf5b0a1412ffa80e3600e0a1a1d76c6fd07755cc858e7e,2024-05-30T20:15:09.703000
CVE-2024-4843,0,0,58cfe808f738fd9393d526b6ae9c349063459aa7046a90d478177ce3db0c98a6,2024-05-16T13:03:05.353000
CVE-2024-4844,0,0,9cc52c71da3e5a51bc8bac3549d843df2f9b393e878f774cc4555ff01bf8c6f2,2024-05-16T13:03:05.353000
@ -254230,7 +254242,7 @@ CVE-2024-4865,0,0,034a7c12f3d6f4bd5ac54ee1f34abd70a559c5b9a18ae852351f79db6d61b9
CVE-2024-4870,0,0,789ccad79b53f3162faaa4d0c14e00ab550e7e413c46a4332529e5d35d1d0423,2024-06-04T16:57:41.053000
CVE-2024-4871,0,0,089a89f3309c27433f20e3be4ef9a00379f9f19601c1c8029649846113aed43a,2024-05-14T19:17:55.627000
CVE-2024-4873,0,0,6d8194e640b182e2a2eb107c362a6b36fc019fdb0666ba51ea48c7f29b4462a1,2024-06-20T12:44:01.637000
CVE-2024-4874,0,0,f686ddee13d10c7fac51bda340776b3cecedfe2e7331ba8f185a6ea4effabf78,2024-06-22T05:15:11.837000
CVE-2024-4874,0,1,e78bb742111e727a1a7f2f3131f7d231a71650be72b27c7dea3ee4c223f6a2f2,2024-06-24T12:57:36.513000
CVE-2024-4875,0,0,aa35cb89fee530b58aa987ffc67ea97738c0ba567903bf01429a1a1259923db8,2024-05-21T12:37:59.687000
CVE-2024-4876,0,0,02aac8d1be489833aa2e07f8be8ce083249ac7dc2fcc33fd144386b8d365fef2,2024-05-21T12:37:59.687000
CVE-2024-4881,0,0,4f17be95dbf63ebb1e221e9270b941e4838c9b4d4b1f7c998cfbd25da7153e04,2024-06-07T14:56:05.647000
@ -254246,8 +254258,8 @@ CVE-2024-4894,0,0,d68130303d356c053d0f6768d0ee08506e206d16216142c952b9b56af8835d
CVE-2024-4895,0,0,be42ef886a64c01ec9437b4cfbce4dfdf0b902fbee0c6083bfc71de776f15b0e,2024-05-24T01:15:30.977000
CVE-2024-4896,0,0,6456cc9b22aff68532bfeeb7637d5235216630d84771d1ec52d84fa467e4b7a6,2024-05-22T12:46:53.887000
CVE-2024-4898,0,0,4ea5d2aea02f0385cebab454e7d6b2e480bf3eab8470b7157c155067bed66344,2024-06-13T18:36:09.010000
CVE-2024-4899,0,0,53aea92e37c47aa080fa9a0cdd6aa6f050c2abee652916c55aee5472b43c983e,2024-06-24T06:15:11.307000
CVE-2024-4900,0,0,ea095ae8914b51f2213c123745cc5b860bd97ecf322a46092d331b725b842323,2024-06-24T06:15:11.423000
CVE-2024-4899,0,1,67b323357bb49d8a98f8aef30f13d75a082b23ba24ff9269116bd3a4e859e8a6,2024-06-24T12:57:36.513000
CVE-2024-4900,0,1,bf21c014329db3bdc252e0dfea038d8cc3dd03e7972d5bd787db3fb8215cd9e5,2024-06-24T12:57:36.513000
CVE-2024-4902,0,0,190ae6556b466a5228ce6680f8d8f4ba4789cfafa6765b2e868dc7feb28ee1e3,2024-06-07T14:56:05.647000
CVE-2024-4903,0,0,74f6793baa838082db19325ded8d53157feab60a90892d7bb13ebdea205ed94c,2024-06-07T20:15:11.967000
CVE-2024-4904,0,0,44558a4b32290e2f940be10d0a83b859aa6fae2c01ef1c881d37a435bb46f91d,2024-06-04T19:20:52.380000
@ -254282,7 +254294,7 @@ CVE-2024-4932,0,0,2da4bffdf4d6e38ae009aae9065c7b2f8049c53fc8beaf73dfbb4354175c5b
CVE-2024-4933,0,0,9fe90c4f8856bf6bdad48e78d639ea10366bef215c1d0d507cc52649860ab1b1,2024-06-04T19:20:54.643000
CVE-2024-4936,0,0,a731ea39a2abdd8ed5ffb7274944b4c3b5578233bd6509536eab3c4454adaafe,2024-06-17T12:42:04.623000
CVE-2024-4939,0,0,6859feec38f69c636602db339fa7ab03b302bd67a24dc957bb8f045d97aede0c,2024-06-11T17:08:33.350000
CVE-2024-4940,0,0,30eb9b0ad79753b897a1f09595cee8f061bbad04f8c5901540cf6b52c77963f4,2024-06-22T06:15:11.137000
CVE-2024-4940,0,1,cb78cb49a43bd348a99dcd2f7e1d39ee831dc08e65c1988e89651f8662313063,2024-06-24T12:57:36.513000
CVE-2024-4941,0,0,04ed79d9b1e3032260e31cb6cd2ea8a25db6821440182f4cb50592b145bee1e2,2024-06-07T14:56:05.647000
CVE-2024-4942,0,0,157240698edb46a5deca9943c90e89d5c268795c03f1dadbb4d2f6e28d77068b,2024-06-06T14:17:35.017000
CVE-2024-4943,0,0,d9b88319a5992961df806c2aff168607709c5e19495e72269f7fd7790830e1d9,2024-05-21T12:37:59.687000
@ -254556,7 +254568,7 @@ CVE-2024-5342,0,0,2ad102e094253384b79cb972f14f27186ce8a4683bb8eb4d7004a3553600b1
CVE-2024-5343,0,0,9c4ca8593b34d766d7b52cb001faa9ca8155eefb491f359cde7885e1510a1702,2024-06-20T12:44:01.637000
CVE-2024-5344,0,0,f3651f2851d61dc170a57c7e8c6c64234b906618cf4077ea0b134228fcec896c,2024-06-21T11:22:01.687000
CVE-2024-5345,0,0,6eb378e53e73ecd765d027e2916fd67b3a9d8ae24f673780d53a54e981925c7f,2024-05-31T13:01:46.727000
CVE-2024-5346,0,0,09a6420991cc5b9677377ceef4be361006cdf527c205cd82512f4948f224cbc5,2024-06-22T02:15:45.340000
CVE-2024-5346,0,1,6146cd53b46d5e5ca157f315f93e7cf0ec8a8135eb15c06b610a99b21679ffa3,2024-06-24T12:57:36.513000
CVE-2024-5347,0,0,1da2ccb898789a7c7262d2aa6524b222bbe92ed9796804e25855dd4dd20a5fae,2024-05-31T13:01:46.727000
CVE-2024-5348,0,0,cdabb7de233f48a7127c4333bb3ba86c3b13ada38da5d506ab1226337e3a511b,2024-06-03T14:46:24.250000
CVE-2024-5350,0,0,60bbd22831ddecb115d40713a9dc768f9983e70563a63aa9f7486c68fbd4f9e1,2024-05-28T12:39:42.673000
@ -254636,7 +254648,7 @@ CVE-2024-5436,0,0,512ff808a53596bd19353e26c03602bd4b39921efe131952ebcd76460c505f
CVE-2024-5437,0,0,551b020f0044e3ab584c14f08f0984900b4bc26534c92382eb6ac2bb660708ea,2024-06-04T19:21:09.363000
CVE-2024-5438,0,0,b27637930797cbba2af64a5218ab07d5b0a2d8c36c1ae10d453afe4fa1e1f2e0,2024-06-11T18:26:45.147000
CVE-2024-5439,0,0,d933d33f15def11b210f94c43e434fbcbcedf874aa4bf1c51db16a3b591b2644,2024-06-11T17:35:43.313000
CVE-2024-5443,0,0,8e4a3a427b028ca98ebf7277e8adc1a25bcc5753358d92329dc04602e08776fd,2024-06-22T17:15:34.410000
CVE-2024-5443,0,1,925856e128685c50d1cb7d9e876369e7979bded1a2c53610b230353ba1bb3f2d,2024-06-24T12:57:36.513000
CVE-2024-5447,0,0,c5738c3e4fe71709cd71685bcb4608b123c1b3a1d401bd25524bec95ebdb2570,2024-06-21T11:22:01.687000
CVE-2024-5448,0,0,19199364ebaf7981038236888485159312f902e6980013982256549a5affdb36,2024-06-21T11:22:01.687000
CVE-2024-5449,0,0,98f03fd41a859602711a787e6c6738ac5b4c6552335bab31c9f953ba2b79cc72,2024-06-06T14:17:35.017000
@ -254714,7 +254726,7 @@ CVE-2024-5587,0,0,9180b0762a5a5a7a17ce70cd861bdf25e955d88caf903bee442f7c48a0a2a2
CVE-2024-5588,0,0,21589c4423d1fee081cb695dd8009f3bd5a36bd74dae1713c28449f0da1cd8d1,2024-06-04T19:21:10.267000
CVE-2024-5589,0,0,dc63c38434ce5bb089af0d0f8aa09f6a46f1fae34dd45c15f4542741dea047b7,2024-06-03T14:46:24.250000
CVE-2024-5590,0,0,ca60332ff9933405c7b9b37e93d2404b53274b9ec741b4065c0c1eadbd60da94,2024-06-03T14:46:24.250000
CVE-2024-5596,0,0,4016bf95a79f12b924e7ab5cbf9a07088fcdd715a03926a86714537a6b8a14bc,2024-06-22T06:15:11.470000
CVE-2024-5596,0,1,c69cbcadf0a7f1e5940d842c2c9e90907cbda728581a745e7acd494576e03c9c,2024-06-24T12:57:36.513000
CVE-2024-5597,0,0,652827ff26b80eabae5b3eddf519a61b0da7de181ce61fd257911ec48c45cdb0,2024-06-12T18:10:47.080000
CVE-2024-5599,0,0,e4d8d3217ca804a33354b51b54e1f3f41ce0e1fc1f554dedfe90ad1a46a87370,2024-06-11T18:24:39.057000
CVE-2024-5605,0,0,4bb70fac398eb5e1fc6a3b8761dcfee9993510711b196c5d9f90dc1e34c785a3,2024-06-20T12:43:25.663000
@ -254749,7 +254761,7 @@ CVE-2024-5673,0,0,f6db27a8b7c99bb0a58922425d96edcb461eeb527f78adfd8d9aed9c993301
CVE-2024-5674,0,0,69b0f5cdcc6414c1b3093ac76e322fc42e17eb869b8f1b328084f458395232cf,2024-06-13T18:36:09.010000
CVE-2024-5675,0,0,c04fc1bf8ef6e3f232c30ddf0bd6a524958c9eab63fe205331e1fedef14ccf13,2024-06-11T18:14:02.017000
CVE-2024-5676,0,0,7110ec4f1d7a030c3f52d0d64b45a1f2c788bd0c12290f7487a0ece147b33240,2024-06-24T05:15:09.600000
CVE-2024-5683,0,0,776b3afe6ce973fb91d46fd6db99fba176ff636e37c3bc0bd205640173c41437,2024-06-24T09:15:10.347000
CVE-2024-5683,0,1,416fdce68077ec4a3eabb7881f93e8b3f956fda57e2d7ec858b12f0a2abb9f15,2024-06-24T12:57:36.513000
CVE-2024-5684,0,0,e183f6f3c944efddc1281bf86b4d20b3677f4c3ab127fc0c8f4bc522f6d9ba19,2024-06-11T18:13:30.163000
CVE-2024-5685,0,0,e8364a4460a12edf9e3cf94a37b74977806b751958607c5dfe543a64e3c22871,2024-06-19T09:15:12.173000
CVE-2024-5686,0,0,5baef36d265e76c8a185391151bfaa15c3d3a21cf5116dcf4f0b4cb376e1e9d1,2024-06-20T12:43:25.663000
@ -254804,7 +254816,7 @@ CVE-2024-5783,0,0,e65b469aba92209e135f01d801ec2e7ebd41770aa11624b30224f43d98aec8
CVE-2024-5785,0,0,b8e4d96c063df13aad53416cef79463db3c390621a0b569b6ab0f4db2568beeb,2024-06-10T18:06:22.600000
CVE-2024-5786,0,0,ed5396800d42f59a8cc5d452fd1faa0265b1965bb10ec68fd437a404a4a909e1,2024-06-10T18:06:22.600000
CVE-2024-5787,0,0,a3d405a0f4e66faab3a863affeada58e47a227c5d73cf2b53ea525af4385d342,2024-06-13T18:36:09.010000
CVE-2024-5791,0,0,e92120fc7904729dc10045455e693e755df880bb8a63013227b7626607b2cc1d,2024-06-22T02:15:45.523000
CVE-2024-5791,0,1,ae146429191f9b93b0acc0b4a7ba1324a78c8b4f34dedb6dfb2e99dd1ae595a9,2024-06-24T12:57:36.513000
CVE-2024-5798,0,0,f6c60b5ac812e7711b355fdc9c4ea7ca1c381d5fa9189e95b5ac079c15b31d9c,2024-06-13T18:36:09.010000
CVE-2024-5812,0,0,b231b6b4b2edc3b100956cc90803ec880aa99de51e5a0f50bc4b9e381c5722ed,2024-06-13T18:36:45.417000
CVE-2024-5813,0,0,d695683c807a1777a11ef158e495934f31ab7056ebdb25d58f5f11112f2d1965,2024-06-13T18:36:45.417000
@ -254833,6 +254845,7 @@ CVE-2024-5853,0,0,4db307c3757855b51e51fa12e1eb9aa67e540512d9bb40f822c5370c3893dc
CVE-2024-5858,0,0,30241924d409355226bb80c4fb982c4833f84483f4f89b94e986f70fe7751e71,2024-06-17T12:42:04.623000
CVE-2024-5859,0,0,4ada1cd42a97e2e02bd6e82518de5b55743f946eb846e36a0c12b6c6f5a48dab,2024-06-21T11:22:01.687000
CVE-2024-5860,0,0,f855eee13286327286a851090329abd51f0ce228b863644ab8e1f7f80e1d731d,2024-06-20T12:44:01.637000
CVE-2024-5862,1,1,5db66e1efb3f6a90205ef128b9aab7bf948c69d81e9fd812cec53d7830dcad48,2024-06-24T13:15:12.120000
CVE-2024-5868,0,0,cddb0a1baa550d897574c2505eb276b5cd69c2fd57d27d79dec0dad91553a572,2024-06-17T12:42:04.623000
CVE-2024-5871,0,0,83e6d3ea3d7363cdcbcb485d9161ada2b3d6bba887290fa58ab89820983d4022,2024-06-17T12:42:04.623000
CVE-2024-5873,0,0,4affe4b1f71505ca05298a33c7e23c3ae147869580237755bed2d180fbea1b8e,2024-06-12T08:15:51.550000
@ -254863,8 +254876,8 @@ CVE-2024-5951,0,0,7ddd1cddf9a9fdc846148c5866e7aa3c8ed2def81486ca15d97d818d600ecb
CVE-2024-5952,0,0,a56b129ed0896e22b77ffae27056ae02e2ff1e28286e49f9b0ac6b9f084a57b2,2024-06-17T12:43:31.090000
CVE-2024-5953,0,0,5a82a23010422744b690f4b6e35b5f6ac9a7dbe5fabc2cd37af30b93c2bed444,2024-06-20T12:44:01.637000
CVE-2024-5961,0,0,5b2a3ec0406c808b5387d2b9b0077c5bc424b1c4427d5cb7165a954efcfd8c0c,2024-06-17T12:42:04.623000
CVE-2024-5965,0,0,ebeb204b95dcd79a479722fe7e94006c506f9a990da3afb7470f8fc3aa78b0d5,2024-06-22T04:15:12.460000
CVE-2024-5966,0,0,f47f07d4960c5a2b5c339649a9c11b10622c84049c0341a9572840ab934c1ed7,2024-06-22T04:15:12.940000
CVE-2024-5965,0,1,b630cabbfeff490b0cf9f2fe2bb08a83f731444ae0da490cd7b61dee4e491dce,2024-06-24T12:57:36.513000
CVE-2024-5966,0,1,d19bc59fe12bb80f44ec9e669ff46bf1cf267e696e633a0a1c0a5d316e249042,2024-06-24T12:57:36.513000
CVE-2024-5967,0,0,a8cf0971f84f68dc327704c7b15af8c68f3ca5a6cf4ca8aa54163d9ca95100d5,2024-06-20T12:44:01.637000
CVE-2024-5970,0,0,118b7b2e028a3447b60495fc36df0133e6c8ea6adad2a5f3d89bac8698786790,2024-06-20T12:44:01.637000
CVE-2024-5976,0,0,e855126a3e03657c0f9ccfb70e360e6531fe17aa442fb39ef6227c53616360fe,2024-06-17T12:43:31.090000
@ -254925,7 +254938,7 @@ CVE-2024-6113,0,0,2758e7c3cd85245ae6a2ad9a4a7217abac687e9fa00a3d92e721d936abed15
CVE-2024-6114,0,0,dc0a82373381e9c7cd4b1e6c5bf523878ecb08863d5210f6468d495d6395d8da,2024-06-20T12:44:01.637000
CVE-2024-6115,0,0,a9f6dd92ef3b2f9b6542508effdf3ace054749ced1343c5fd4f924ccbd13328b,2024-06-20T12:44:01.637000
CVE-2024-6116,0,0,5843dd08daba10a4f1c43a634f4172ccf9c702c464ac49dc5f784b4aa5e3fcb5,2024-06-20T12:44:01.637000
CVE-2024-6120,0,0,92c47b803dd834323f58d34f6d6933e7d3feee2a7f49e89f30d9740f74ae0640,2024-06-22T00:15:09.690000
CVE-2024-6120,0,1,9ac2d341251e8c0ed1b9fc89bd308ec56317a52d6676116ba1521369db181bce,2024-06-24T12:57:36.513000
CVE-2024-6125,0,0,85b92914638eb24a081146fd823c584c2333b183768ef26d618955e83646311b,2024-06-20T12:44:01.637000
CVE-2024-6128,0,0,cd2531d89b3a76f4be34b5ead44f5b65458326ae9dfb5c97dcd0243e237eb5b3,2024-06-21T16:15:12.570000
CVE-2024-6129,0,0,dfa20fd20a0a3099fcdc2f66c56de27040819ee45bd7efe66cb95f894b77d645,2024-06-20T12:44:01.637000
@ -254938,7 +254951,7 @@ CVE-2024-6146,0,0,835232b778d7e80b1c73cad2f19f1275692bff270d5e664fd4c7fc64973110
CVE-2024-6147,0,0,4a4919271ad23db4250af2d646dfd99f64704c8a0c63e163a55ff156915fc472,2024-06-21T11:22:01.687000
CVE-2024-6153,0,0,a3cbabebaa196b7fc704a5b9ef76e592e68ec6c4195aa6f7531f701a27a837d5,2024-06-21T11:22:01.687000
CVE-2024-6154,0,0,14c261dad2c658f3f85287831ecf663ba772d4a017166d6d5d3cda8ce8388677,2024-06-21T11:22:01.687000
CVE-2024-6160,1,1,ea5b8c23f2f1a390fbb4f3fd30516f8d928c266505891d1767e5480e415f3257,2024-06-24T10:15:10.277000
CVE-2024-6160,0,1,e0e9df11502e0f78d6d764c03981bde61fa7fdce13ce5e8e72c2edbfe567293b,2024-06-24T12:57:36.513000
CVE-2024-6162,0,0,bd502c2e3c0167c78ca1c8188e0261103b8f8aa5eaa8e4a394c72d49dddda11b,2024-06-20T16:07:50.417000
CVE-2024-6176,0,0,855875508d6019a3b7cc5455db83c0ed155c5813092b253896702a30576b2ecb,2024-06-20T12:43:25.663000
CVE-2024-6177,0,0,a0175799dd5324c2ac4fd3e8bb126589ce94cff0760703c070fdf39975a6cb07,2024-06-20T15:17:06.493000
@ -254971,18 +254984,18 @@ CVE-2024-6225,0,0,6ed1d43d06f485ccaed4b1752e22d4ce9d1eed2448bbfb08512f066656343c
CVE-2024-6239,0,0,53cf42770796c3db162cc16fe559218fd3c6ebc6b5e9f53cc44af7105fcfa2b7,2024-06-21T15:58:38.553000
CVE-2024-6240,0,0,de501234a44fc7c0509792079b6c39795e52e560510de99adad4e9c3dfebe15d,2024-06-21T15:58:38.553000
CVE-2024-6241,0,0,e484d97715a2702731f3459289e15a93d4ff11956028ea230912e5becf5d7301,2024-06-22T14:15:09.497000
CVE-2024-6251,0,0,48c1ad6f1a0826892e67eeb6c0d9262de6ccd562f647faae344988cfc87df71b,2024-06-22T12:15:09.923000
CVE-2024-6252,0,0,485d6c5c491b3be10abc5f2d0abc7d3bad8fc6fe294bde724fb841b1115419dd,2024-06-22T12:15:11.160000
CVE-2024-6253,0,0,36afe0470776b2066530d7f83b649e84a5bf248040996b76e07345297ebaaf31,2024-06-22T14:15:09.673000
CVE-2024-6266,0,0,70666cb36be680ae24e3b529873b2f76b9772ce56140af79219b2227eed230ed,2024-06-23T03:15:51.817000
CVE-2024-6267,0,0,9ee9d3ae56be6680575548576947e037de2c4b890a9205e4f9e207294729b9e2,2024-06-23T09:15:11.320000
CVE-2024-6268,0,0,d5f22f854a068a47453548a1178f4ed15437dffc736d923ed553c44b59a8eea7,2024-06-23T10:15:09.753000
CVE-2024-6269,0,0,1e8f9e9c3bfd0a35fc5f3a43852838aac6176b60453f405532505e06c6623810,2024-06-23T12:15:09.710000
CVE-2024-6273,0,0,2a20125ff6fb39b88ec3a7ac35b04aea41f736595011e009df3ffdaa1143e961,2024-06-23T22:15:09.490000
CVE-2024-6274,0,0,a20cccdf24012ecfe4aaa853cd26e54a49da3a6489ee3659bdb56945e7b65110,2024-06-24T02:15:53.827000
CVE-2024-6275,0,0,753dd3ecf59e8e46d93f954e775c443c59e74c3f80e12bfeb7d6f5e43743fb8c,2024-06-24T02:15:54.140000
CVE-2024-6276,0,0,80d288eed914f78b0b2743c2cb55dadb8b4f6c1804197b270427b362fde7f01b,2024-06-24T02:15:54.410000
CVE-2024-6277,0,0,4e6dd575ad20fe64e48dea8a8ccb1cf5ce7e87f1aae34a54aa944c69f8a0b3a2,2024-06-24T03:15:10.027000
CVE-2024-6278,0,0,7bfffa2bee8707f3164a11c093c57716453c2f09e10a3cdf4898044dccbf73d7,2024-06-24T03:15:10.290000
CVE-2024-6279,0,0,7e239ccb3eae2db09da436ab15da76f01e218247ac708bc9933c17fc088172b0,2024-06-24T03:15:10.573000
CVE-2024-6280,0,0,533b6763b14d2e62b33eddf73cd7042ee0a24e8215c62e81ea96da39fabb11c8,2024-06-24T03:15:10.847000
CVE-2024-6251,0,1,76d6a56e1b2f86f9d8f71f51691147da73df155a07e8f8a63cfd8ad441487e4d,2024-06-24T12:57:36.513000
CVE-2024-6252,0,1,d0448f5f90c2324a1a3e496c2987ee10db6f54b2bb5275823c9b2cefee9ba708,2024-06-24T12:57:36.513000
CVE-2024-6253,0,1,d90274240d7f8ac1c199c7a9acffbba8a5612974265448a80b6cf839380923b5,2024-06-24T12:57:36.513000
CVE-2024-6266,0,1,f14331da5cd861226d53e015f2a1f08c9e1d5e7f7b1b843a3feb7cb151cc145a,2024-06-24T12:57:36.513000
CVE-2024-6267,0,1,57a6099a94e301a7c52dc6caa4dd6148fa280b745cea9cb47571a477a23faf00,2024-06-24T12:57:36.513000
CVE-2024-6268,0,1,57211ae22f5487b97f011249bf73edd578474123c48952c8421da87d99ef64f9,2024-06-24T12:57:36.513000
CVE-2024-6269,0,1,cc9e0267763ecfac41b5d3a517fdba068b6a2da99f320a35204e8092ecb68d40,2024-06-24T12:57:36.513000
CVE-2024-6273,0,1,f6b69b88df522bbe87033e0c58d79f5fc45c3e18da3179f4c2f73e1e2c66cec2,2024-06-24T12:57:36.513000
CVE-2024-6274,0,1,972129c4472795babca7e5a09e6780210c3b4bbedc3590b6f184f318bcd2e09e,2024-06-24T12:57:36.513000
CVE-2024-6275,0,1,427c51c43b1773ea1cd67396c445c590a48390d4be1c9b6b63f99972e6a5594b,2024-06-24T12:57:36.513000
CVE-2024-6276,0,1,57ea18081d0dc54388be6999e56cd514c45f23a632b825798fd0cf09d29fc94d,2024-06-24T12:57:36.513000
CVE-2024-6277,0,1,c4e987285cdb447f79ad370d2234136cc811f9798bdf2fa75ab663c3b5d73ca9,2024-06-24T12:57:36.513000
CVE-2024-6278,0,1,0e5aed794d203e14e4f3db589cabf4551e503c90176905a3485d276e34e33a98,2024-06-24T12:57:36.513000
CVE-2024-6279,0,1,b4db90bd3c185f4671769d36fcbbafe037e9aff6dc24be7990311f62fb441a65,2024-06-24T12:57:36.513000
CVE-2024-6280,0,1,4e5bdd720fdc6d68a51312dcfd366ac88ed5daebd5ed348aefe6d5aa74c57712,2024-06-24T12:57:36.513000

Can't render this file because it is too large.