diff --git a/CVE-2024/CVE-2024-04xx/CVE-2024-0451.json b/CVE-2024/CVE-2024-04xx/CVE-2024-0451.json new file mode 100644 index 00000000000..415a290001d --- /dev/null +++ b/CVE-2024/CVE-2024-04xx/CVE-2024-0451.json @@ -0,0 +1,51 @@ +{ + "id": "CVE-2024-0451", + "sourceIdentifier": "security@wordfence.com", + "published": "2024-05-22T04:15:09.130", + "lastModified": "2024-05-22T04:15:09.130", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "The AI ChatBot plugin for WordPress is vulnerable to unauthorized access of data due to a missing capability check on the openai_file_list_callback function in all versions up to, and including, 5.3.4. This makes it possible for authenticated attackers, with subscriber-level access and above, to list files existing in a linked OpenAI account." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security@wordfence.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 5.0, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 3.1, + "impactScore": 1.4 + } + ] + }, + "references": [ + { + "url": "https://plugins.trac.wordpress.org/browser/chatbot/trunk/includes/openai/qcld-bot-openai.php#L175", + "source": "security@wordfence.com" + }, + { + "url": "https://plugins.trac.wordpress.org/changeset/3089461/chatbot/trunk/includes/openai/qcld-bot-openai.php", + "source": "security@wordfence.com" + }, + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/1c0572a5-6cc9-43ab-a4a3-c8d3b93c8fcf?source=cve", + "source": "security@wordfence.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-04xx/CVE-2024-0452.json b/CVE-2024/CVE-2024-04xx/CVE-2024-0452.json new file mode 100644 index 00000000000..cff16716728 --- /dev/null +++ b/CVE-2024/CVE-2024-04xx/CVE-2024-0452.json @@ -0,0 +1,51 @@ +{ + "id": "CVE-2024-0452", + "sourceIdentifier": "security@wordfence.com", + "published": "2024-05-22T04:15:09.510", + "lastModified": "2024-05-22T04:15:09.510", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "The AI ChatBot plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the openai_file_upload_callback function in all versions up to, and including, 5.3.4. This makes it possible for authenticated attackers, with subscriber-level access and above, to upload files to a linked OpenAI account." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security@wordfence.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.0, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 3.1, + "impactScore": 1.4 + } + ] + }, + "references": [ + { + "url": "https://plugins.trac.wordpress.org/browser/chatbot/trunk/includes/openai/qcld-bot-openai.php#L208", + "source": "security@wordfence.com" + }, + { + "url": "https://plugins.trac.wordpress.org/changeset/3089461/chatbot/trunk/includes/openai/qcld-bot-openai.php", + "source": "security@wordfence.com" + }, + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/34b6475c-b5dd-42a1-98d1-9b5ae9ff4ad5?source=cve", + "source": "security@wordfence.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-04xx/CVE-2024-0453.json b/CVE-2024/CVE-2024-04xx/CVE-2024-0453.json new file mode 100644 index 00000000000..c49c3700bde --- /dev/null +++ b/CVE-2024/CVE-2024-04xx/CVE-2024-0453.json @@ -0,0 +1,51 @@ +{ + "id": "CVE-2024-0453", + "sourceIdentifier": "security@wordfence.com", + "published": "2024-05-22T04:15:09.757", + "lastModified": "2024-05-22T04:15:09.757", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "The AI ChatBot plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the openai_file_delete_callback function in all versions up to, and including, 5.3.4. This makes it possible for authenticated attackers, with subscriber-level access and above, to delete files from a linked OpenAI account." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security@wordfence.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.0, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 3.1, + "impactScore": 1.4 + } + ] + }, + "references": [ + { + "url": "https://plugins.trac.wordpress.org/browser/chatbot/trunk/includes/openai/qcld-bot-openai.php#L133", + "source": "security@wordfence.com" + }, + { + "url": "https://plugins.trac.wordpress.org/changeset/3089461/chatbot/trunk/includes/openai/qcld-bot-openai.php", + "source": "security@wordfence.com" + }, + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/7e0ef4a5-42d7-4cea-b19f-51917e3ee55f?source=cve", + "source": "security@wordfence.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-304xx/CVE-2024-30419.json b/CVE-2024/CVE-2024-304xx/CVE-2024-30419.json new file mode 100644 index 00000000000..ca97e504a62 --- /dev/null +++ b/CVE-2024/CVE-2024-304xx/CVE-2024-30419.json @@ -0,0 +1,24 @@ +{ + "id": "CVE-2024-30419", + "sourceIdentifier": "vultures@jpcert.or.jp", + "published": "2024-05-22T05:15:52.137", + "lastModified": "2024-05-22T05:15:52.137", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Cross-site scripting vulnerability exists in a-blog cms Ver.3.1.x series versions prior to Ver.3.1.12, Ver.3.0.x series versions prior to Ver.3.0.32, Ver.2.11.x series versions prior to Ver.2.11.61, Ver.2.10.x series versions prior to Ver.2.10.53, and Ver.2.9 and earlier versions. If this vulnerability is exploited, a user with a contributor or higher privilege who can log in to the product may execute an arbitrary script on the web browser of the user who accessed the website using the product." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://developer.a-blogcms.jp/blog/news/JVN-70977403.html", + "source": "vultures@jpcert.or.jp" + }, + { + "url": "https://jvn.jp/en/jp/JVN70977403/", + "source": "vultures@jpcert.or.jp" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-304xx/CVE-2024-30420.json b/CVE-2024/CVE-2024-304xx/CVE-2024-30420.json new file mode 100644 index 00000000000..faeef2af732 --- /dev/null +++ b/CVE-2024/CVE-2024-304xx/CVE-2024-30420.json @@ -0,0 +1,24 @@ +{ + "id": "CVE-2024-30420", + "sourceIdentifier": "vultures@jpcert.or.jp", + "published": "2024-05-22T05:15:52.983", + "lastModified": "2024-05-22T05:15:52.983", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Server-side request forgery (SSRF) vulnerability exists in a-blog cms Ver.3.1.x series versions prior to Ver.3.1.12 and Ver.3.0.x series versions prior to Ver.3.0.32. If this vulnerability is exploited, a user with an administrator or higher privilege who can log in to the product may obtain arbitrary files on the server and information on the internal server that is not disclosed to the public." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://developer.a-blogcms.jp/blog/news/JVN-70977403.html", + "source": "vultures@jpcert.or.jp" + }, + { + "url": "https://jvn.jp/en/jp/JVN70977403/", + "source": "vultures@jpcert.or.jp" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-313xx/CVE-2024-31394.json b/CVE-2024/CVE-2024-313xx/CVE-2024-31394.json new file mode 100644 index 00000000000..b3f56b0be20 --- /dev/null +++ b/CVE-2024/CVE-2024-313xx/CVE-2024-31394.json @@ -0,0 +1,24 @@ +{ + "id": "CVE-2024-31394", + "sourceIdentifier": "vultures@jpcert.or.jp", + "published": "2024-05-22T05:15:53.053", + "lastModified": "2024-05-22T05:15:53.053", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Directory traversal vulnerability exists in a-blog cms Ver.3.1.x series versions prior to Ver.3.1.12, Ver.3.0.x series versions prior to Ver.3.0.32, Ver.2.11.x series versions prior to Ver.2.11.61, Ver.2.10.x series versions prior to Ver.2.10.53, and Ver.2.9 and earlier versions. If this vulnerability is exploited, a user with an editor or higher privilege who can log in to the product may obtain arbitrary files on the server." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://developer.a-blogcms.jp/blog/news/JVN-70977403.html", + "source": "vultures@jpcert.or.jp" + }, + { + "url": "https://jvn.jp/en/jp/JVN70977403/", + "source": "vultures@jpcert.or.jp" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-313xx/CVE-2024-31395.json b/CVE-2024/CVE-2024-313xx/CVE-2024-31395.json new file mode 100644 index 00000000000..9d69f61d80d --- /dev/null +++ b/CVE-2024/CVE-2024-313xx/CVE-2024-31395.json @@ -0,0 +1,24 @@ +{ + "id": "CVE-2024-31395", + "sourceIdentifier": "vultures@jpcert.or.jp", + "published": "2024-05-22T05:15:53.120", + "lastModified": "2024-05-22T05:15:53.120", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Cross-site scripting vulnerability exists in a-blog cms Ver.3.1.x series versions prior to Ver.3.1.12, Ver.3.0.x series versions prior to Ver.3.0.32, Ver.2.11.x series versions prior to Ver.2.11.61, Ver.2.10.x series versions prior to Ver.2.10.53, and Ver.2.9 and earlier versions. If this vulnerability is exploited, a user with an editor or higher privilege who can log in to the product may execute an arbitrary script on the web browser of the user who accessed the schedule management page." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://developer.a-blogcms.jp/blog/news/JVN-70977403.html", + "source": "vultures@jpcert.or.jp" + }, + { + "url": "https://jvn.jp/en/jp/JVN70977403/", + "source": "vultures@jpcert.or.jp" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-313xx/CVE-2024-31396.json b/CVE-2024/CVE-2024-313xx/CVE-2024-31396.json new file mode 100644 index 00000000000..e211e9e104c --- /dev/null +++ b/CVE-2024/CVE-2024-313xx/CVE-2024-31396.json @@ -0,0 +1,24 @@ +{ + "id": "CVE-2024-31396", + "sourceIdentifier": "vultures@jpcert.or.jp", + "published": "2024-05-22T05:15:53.183", + "lastModified": "2024-05-22T05:15:53.183", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Code injection vulnerability exists in a-blog cms Ver.3.1.x series versions prior to Ver.3.1.12 and Ver.3.0.x series versions prior to Ver.3.0.32. If this vulnerability is exploited, a user with an administrator or higher privilege who can log in to the product may execute an arbitrary command on the server." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://developer.a-blogcms.jp/blog/news/JVN-70977403.html", + "source": "vultures@jpcert.or.jp" + }, + { + "url": "https://jvn.jp/en/jp/JVN70977403/", + "source": "vultures@jpcert.or.jp" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-49xx/CVE-2024-4980.json b/CVE-2024/CVE-2024-49xx/CVE-2024-4980.json new file mode 100644 index 00000000000..1b9e83a3e22 --- /dev/null +++ b/CVE-2024/CVE-2024-49xx/CVE-2024-4980.json @@ -0,0 +1,59 @@ +{ + "id": "CVE-2024-4980", + "sourceIdentifier": "security@wordfence.com", + "published": "2024-05-22T05:15:53.253", + "lastModified": "2024-05-22T05:15:53.253", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "The WPKoi Templates for Elementor plugin for WordPress is vulnerable to Stored Cross-Site Scripting via 'id', 'mixColor', 'backgroundColor', 'saveInCookies', and 'autoMatchOsTheme' parameters in all versions up to, and including, 2.5.9 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security@wordfence.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 6.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 3.1, + "impactScore": 2.7 + } + ] + }, + "references": [ + { + "url": "https://plugins.trac.wordpress.org/browser/wpkoi-templates-for-elementor/trunk/elements/elements/advanced-heading/advanced-heading.php#L626", + "source": "security@wordfence.com" + }, + { + "url": "https://plugins.trac.wordpress.org/browser/wpkoi-templates-for-elementor/trunk/elements/elements/darkmode/darkmode.php#L291", + "source": "security@wordfence.com" + }, + { + "url": "https://plugins.trac.wordpress.org/browser/wpkoi-templates-for-elementor/trunk/elements/elements/qr-code/qr-code.php#L110", + "source": "security@wordfence.com" + }, + { + "url": "https://plugins.trac.wordpress.org/changeset/3088306/", + "source": "security@wordfence.com" + }, + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/6054a885-e67a-4731-93ea-64d7f90d9ea8?source=cve", + "source": "security@wordfence.com" + } + ] +} \ No newline at end of file diff --git a/README.md b/README.md index a2b998c2514..0088ca55b87 100644 --- a/README.md +++ b/README.md @@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2024-05-22T04:00:39.548804+00:00 +2024-05-22T06:00:38.105283+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2024-05-22T03:15:08.273000+00:00 +2024-05-22T05:15:53.253000+00:00 ``` ### Last Data Feed Release @@ -33,14 +33,22 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### Total Number of included CVEs ```plain -251335 +251344 ``` ### CVEs added in the last Commit -Recently added CVEs: `1` +Recently added CVEs: `9` -- [CVE-2024-5190](CVE-2024/CVE-2024-51xx/CVE-2024-5190.json) (`2024-05-22T03:15:08.273`) +- [CVE-2024-0451](CVE-2024/CVE-2024-04xx/CVE-2024-0451.json) (`2024-05-22T04:15:09.130`) +- [CVE-2024-0452](CVE-2024/CVE-2024-04xx/CVE-2024-0452.json) (`2024-05-22T04:15:09.510`) +- [CVE-2024-0453](CVE-2024/CVE-2024-04xx/CVE-2024-0453.json) (`2024-05-22T04:15:09.757`) +- [CVE-2024-30419](CVE-2024/CVE-2024-304xx/CVE-2024-30419.json) (`2024-05-22T05:15:52.137`) +- [CVE-2024-30420](CVE-2024/CVE-2024-304xx/CVE-2024-30420.json) (`2024-05-22T05:15:52.983`) +- [CVE-2024-31394](CVE-2024/CVE-2024-313xx/CVE-2024-31394.json) (`2024-05-22T05:15:53.053`) +- [CVE-2024-31395](CVE-2024/CVE-2024-313xx/CVE-2024-31395.json) (`2024-05-22T05:15:53.120`) +- [CVE-2024-31396](CVE-2024/CVE-2024-313xx/CVE-2024-31396.json) (`2024-05-22T05:15:53.183`) +- [CVE-2024-4980](CVE-2024/CVE-2024-49xx/CVE-2024-4980.json) (`2024-05-22T05:15:53.253`) ### CVEs modified in the last Commit diff --git a/_state.csv b/_state.csv index cf404179a27..87bed398159 100644 --- a/_state.csv +++ b/_state.csv @@ -240291,6 +240291,9 @@ CVE-2024-0447,0,0,462dd19e6dceba84c0c2bc16f20ac9c6c50b5a3824b0b2c21023eddf8c13ab CVE-2024-0448,0,0,34d135a6c32b742f6287060adde7fa7a1eec7917b9f747a74526de46b9fe8477,2024-02-13T18:33:30.020000 CVE-2024-0449,0,0,dead353ffa3f388b449946c4d3d42dd3a9297270c90b2ba3933cb6b3bee7076f,2024-03-13T18:16:18.563000 CVE-2024-0450,0,0,397007e82d0d2f6f655d9c185b4871d7beec4cbb5bac0a7a747cca335e7accab,2024-05-07T22:15:07.430000 +CVE-2024-0451,1,1,7955a3eb5ea28004ac449a1eb65ca95f0f566cc5bb27e1af432d5dd15142ca83,2024-05-22T04:15:09.130000 +CVE-2024-0452,1,1,1e2068b8cbf089743294465783dbc53c57c03a46518691bb604de5b11cbcb65a,2024-05-22T04:15:09.510000 +CVE-2024-0453,1,1,9f30ee04fbe36c5c19fbebaadfaf3f46a7f09de853a21d0bbb8bdabca9c2af31,2024-05-22T04:15:09.757000 CVE-2024-0454,0,0,25ff8f078c1dec0a2c9a1525b3ff1e589f769b56ef1e529ccfeadf8bed600e18,2024-01-22T16:10:47.897000 CVE-2024-0455,0,0,f9f11c37c78a9061f2abc348465d08ff9209e8803592ae601410e1ceb4b66d33,2024-02-26T16:32:25.577000 CVE-2024-0456,0,0,b7149a60bcad100dc614ada7456561f1d7527e1b845005213074d4fe4b957d52,2024-01-31T20:12:00.077000 @@ -247784,7 +247787,9 @@ CVE-2024-30415,0,0,c67029325d33a1ce8e97b7604f93756b30725418df8597cb37f9b0d437540 CVE-2024-30416,0,0,3af0469edbc7730189819c559bfc99705333bc039fec00229c75444e3843fffd,2024-04-08T18:48:40.217000 CVE-2024-30417,0,0,4b0219fd35ed725db3c26aba1f1f4ed768dae0878c967a047f37117e414e514d,2024-04-08T18:48:40.217000 CVE-2024-30418,0,0,0aa631f82db225e247e747f2c214d9d726c3914e3c3ad6a01574772c58c07455,2024-04-08T18:48:40.217000 +CVE-2024-30419,1,1,80ab5e12510a0da6dfe31d647685bb38e5381678c8e0e89409a9cdb56e8b5b12,2024-05-22T05:15:52.137000 CVE-2024-3042,0,0,edf49fe44d6b8870126e49562de5abc06841d778b9974de7464ab1f1965672d6,2024-05-17T02:39:41.680000 +CVE-2024-30420,1,1,71f842cd745ce4a1e2b74e70ffa2c5ae2c918455c0992a3eb7008667a1ee43d0,2024-05-22T05:15:52.983000 CVE-2024-30421,0,0,8cfd124574a85b45cac2d52527d901d612a69bb0525bed810c2e40b98978560c,2024-03-28T12:42:56.150000 CVE-2024-30422,0,0,ba819084ec2bbeb55fdd38ba0e9a54a8d622d3ff700a26bbbbcd13ded8068264,2024-03-28T12:42:56.150000 CVE-2024-30423,0,0,74bc2dbfde5420cbad3f729c7db5638acde8be31bf67643ef1eb0fd0dcec244e,2024-04-01T01:12:59.077000 @@ -248354,6 +248359,9 @@ CVE-2024-31390,0,0,73191a580d5f26147ef0a547b260cdf5d2e21bc8f5fd8e751c04bbe213616 CVE-2024-31391,0,0,7edc74b1175065af6008c4d194ed91acb716bd48f1d16beca88a58acb51aa8e5,2024-05-01T17:15:36.400000 CVE-2024-31392,0,0,e47fa59932bfeb069e43bdeea717668f4f8eb0beb6cf866b3eeac98c4b5a7755,2024-04-03T17:24:18.150000 CVE-2024-31393,0,0,37f7a5992221d6bde3095665f91d96a5b3c012db649e1c1c87f1a16619b63290,2024-04-03T17:24:18.150000 +CVE-2024-31394,1,1,8afa22e5af8c6e7e818bf9d7f009b351010634044736b7bcb03711623ebc12db,2024-05-22T05:15:53.053000 +CVE-2024-31395,1,1,13dbff0bf211af3c125f8d48fca9183035d15ff4c2db416807b8ee26257bf641,2024-05-22T05:15:53.120000 +CVE-2024-31396,1,1,444b054513f55f9c31acbbcdb5315bac303069e54ef06c53fc8341261dcda247,2024-05-22T05:15:53.183000 CVE-2024-3140,0,0,8b1da86666a037f64c40af1ea9ecd283309aabcaa13d249aa0e2a07593cba475,2024-05-17T02:39:44.507000 CVE-2024-31406,0,0,21585692d302884cf3150faa716f097a2673ce3764bdf3b78bdfd36f438a0484,2024-04-24T13:39:42.883000 CVE-2024-31409,0,0,2c3474e7adf2dfd4ffe107e0f21a962b12ec9583a2a32f1b573e427bba6ce25c,2024-05-16T13:03:05.353000 @@ -251268,6 +251276,7 @@ CVE-2024-4973,0,0,ad7c577ee4f5c4118bca59729635919eaea613eef16c91713940397f35ef51 CVE-2024-4974,0,0,30c18840d61a7da1f6d082016a110f1f3e155cb69a321c5f3011e04a781acecd,2024-05-17T02:40:44.973000 CVE-2024-4975,0,0,09924b0fbe93d87fd37542372e09ae669637640cc2222ca882fa05e7d37dfb27,2024-05-17T02:40:45.073000 CVE-2024-4976,0,0,cec1c528b9c81bb2353d630af7aeaeed80f8c396bb33272f9e3c075fa645e3ec,2024-05-16T13:03:05.353000 +CVE-2024-4980,1,1,c4d2727668c5e44bc798e0ac92629615df0fa54426d7a092599e30e085ae5b8f,2024-05-22T05:15:53.253000 CVE-2024-4984,0,0,c181b2792419ab292757f17fa7ed54efe54e64b1f0d7a8e32f201040654607f4,2024-05-16T13:03:05.353000 CVE-2024-4985,0,0,b81bff980fe085b1791160496ce934ae0ce49626339c7659d52666ce349dace5,2024-05-21T12:37:59.687000 CVE-2024-4988,0,0,b136f7f37fdbbd6a6ab0e760e9dd916727466972ccc9dddca11313f5dcf89779,2024-05-21T12:37:59.687000 @@ -251333,4 +251342,4 @@ CVE-2024-5135,0,0,68cf9bdf9dec0a96d7d353e92a3ea23735e4dfab71f12aba03f45faad350b4 CVE-2024-5136,0,0,7e1453b58a6b8cdb889318a17e467bc4887e911147f2bbd5898eefe5c0fc0fa9,2024-05-20T13:00:04.957000 CVE-2024-5137,0,0,9ef636c571a0277ac03884ccb19a37de0ac2ceab7c0195ff8a91e587e734c012,2024-05-20T13:00:04.957000 CVE-2024-5145,0,0,779a53179978014855de22e41604c12feef2bb6901d36d253a629d55b7b44ab6,2024-05-21T12:37:59.687000 -CVE-2024-5190,1,1,e11755e15485ad7d65ed59ac9abe5cac7f4b4c3e2591d1a6c69b4386ed9dea65,2024-05-22T03:15:08.273000 +CVE-2024-5190,0,0,e11755e15485ad7d65ed59ac9abe5cac7f4b4c3e2591d1a6c69b4386ed9dea65,2024-05-22T03:15:08.273000