Auto-Update: 2024-06-12T18:00:19.039330+00:00

This commit is contained in:
cad-safe-bot 2024-06-12 18:03:11 +00:00
parent 8d3b523b0e
commit 1df53dfc1e
73 changed files with 4177 additions and 423 deletions

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-1228",
"sourceIdentifier": "cvd@cert.pl",
"published": "2024-06-10T12:15:09.430",
"lastModified": "2024-06-10T12:40:41.360",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-06-12T17:54:10.157",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -14,8 +14,41 @@
"value": "El uso de una contrase\u00f1a codificada para la base de datos de los pacientes permite a un atacante recuperar datos confidenciales almacenados en la base de datos. La contrase\u00f1a es la misma en todas las instalaciones de Eurosoft Przychodnia. Este problema afecta al software Eurosoft Przychodnia antes de la versi\u00f3n 20240417.001 (a partir de esa versi\u00f3n se soluciona la vulnerabilidad)."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-798"
}
]
},
{
"source": "cvd@cert.pl",
"type": "Secondary",
@ -27,18 +60,45 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:eurosoft:przychodnia:*:*:*:*:*:*:*:*",
"versionEndExcluding": "20240417.001",
"matchCriteriaId": "0EF7775C-026C-4F8E-8C72-0ECECF0AB425"
}
]
}
]
}
],
"references": [
{
"url": "https://cert.pl/en/posts/2024/06/CVE-2024-1228/",
"source": "cvd@cert.pl"
"source": "cvd@cert.pl",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://cert.pl/posts/2024/06/CVE-2024-1228/",
"source": "cvd@cert.pl"
"source": "cvd@cert.pl",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://www.eurosoft.com.pl/eurosoft-przychodnia",
"source": "cvd@cert.pl"
"source": "cvd@cert.pl",
"tags": [
"Product"
]
}
]
}

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2024-1891",
"sourceIdentifier": "vulnreport@tenable.com",
"published": "2024-06-12T16:15:10.887",
"lastModified": "2024-06-12T16:15:10.887",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "A stored cross site scripting vulnerability exists in Tenable Security Center where an authenticated, remote attacker could inject HTML code into a web application scan result page."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "vulnreport@tenable.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 3.5,
"baseSeverity": "LOW"
},
"exploitabilityScore": 2.1,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "vulnreport@tenable.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://www.tenable.com/security/tns-2024-10",
"source": "vulnreport@tenable.com"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2024-22855",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-06-12T17:15:49.913",
"lastModified": "2024-06-12T17:15:49.913",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "A cross-site scripting (XSS) vulnerability in the User Maintenance section of ITSS iMLog v1.307 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Last Name parameter."
}
],
"metrics": {},
"references": [
{
"url": "https://www.exploit-db.com/exploits/52025",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2024-2230",
"sourceIdentifier": "cybersecurity@se.com",
"published": "2024-06-12T17:15:50.140",
"lastModified": "2024-06-12T17:15:50.140",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "CWE-798: Use of hard-coded credentials vulnerability exists that could cause local privilege\nescalation when logged in as a non-administrative user."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "cybersecurity@se.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "cybersecurity@se.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-798"
}
]
}
],
"references": [
{
"url": "https://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2024-044-03&p_enDocType=Security+and+Safety+Notice&p_File_Name=SEVD-2024-044-03.pdf",
"source": "cybersecurity@se.com"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-2408",
"sourceIdentifier": "security@php.net",
"published": "2024-06-09T20:15:09.270",
"lastModified": "2024-06-12T02:15:09.970",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-06-12T17:07:00.770",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -14,15 +14,105 @@
"value": "La funci\u00f3n openssl_private_decrypt en PHP, cuando se usa el relleno PKCS1 (OPENSSL_PKCS1_PADDING, que es el valor predeterminado), es vulnerable al ataque Marvin a menos que se use con una versi\u00f3n de OpenSSL que incluya los cambios de esta solicitud de extracci\u00f3n: https://github.com/ openssl/openssl/pull/13817 (rsa_pkcs1_implicit_rejection). Estos cambios son parte de OpenSSL 3.2 y tambi\u00e9n se han adaptado a versiones estables de varias distribuciones de Linux, as\u00ed como a las compilaciones de PHP proporcionadas para Windows desde la versi\u00f3n anterior. Todos los distribuidores y constructores deben asegurarse de que esta versi\u00f3n se utilice para evitar que PHP sea vulnerable. Las compilaciones PHP de Windows para las versiones 8.1.29, 8.2.20 y 8.3.8 y superiores incluyen parches OpenSSL que corrigen la vulnerabilidad."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.9,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.2,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-203"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:php:php:*:*:*:*:*:*:*:*",
"versionStartIncluding": "8.1.0",
"versionEndExcluding": "8.1.29",
"matchCriteriaId": "7DC2EEF8-834B-42A1-8DA3-0C2CF22A7070"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:php:php:*:*:*:*:*:*:*:*",
"versionStartIncluding": "8.2.0",
"versionEndExcluding": "8.2.20",
"matchCriteriaId": "A39988FF-D854-4277-9D66-6911AF371DD3"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:php:php:*:*:*:*:*:*:*:*",
"versionStartIncluding": "8.3.0",
"versionEndExcluding": "8.3.8",
"matchCriteriaId": "F579FFC1-4F81-4755-B14B-3AA73AC9FF7A"
}
]
}
]
},
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:fedoraproject:fedora:40:*:*:*:*:*:*:*",
"matchCriteriaId": "CA277A6C-83EC-4536-9125-97B84C4FAF59"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/php/php-src/security/advisories/GHSA-hh26-4ppw-5864",
"source": "security@php.net"
"source": "security@php.net",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PKGTQUOA2NTZ3RXN22CSAUJPIRUYRB4B/",
"source": "security@php.net"
"source": "security@php.net",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,157 +2,14 @@
"id": "CVE-2024-26979",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-05-01T06:15:15.227",
"lastModified": "2024-05-23T19:14:15.993",
"vulnStatus": "Analyzed",
"lastModified": "2024-06-12T16:15:11.147",
"vulnStatus": "Rejected",
"descriptions": [
{
"lang": "en",
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/vmwgfx: Fix possible null pointer derefence with invalid contexts\n\nvmw_context_cotable can return either an error or a null pointer and its\nusage sometimes went unchecked. Subsequent code would then try to access\neither a null pointer or an error value.\n\nThe invalid dereferences were only possible with malformed userspace\napps which never properly initialized the rendering contexts.\n\nCheck the results of vmw_context_cotable to fix the invalid derefs.\n\nThanks:\nziming zhang(@ezrak1e) from Ant Group Light-Year Security Lab\nwho was the first person to discover it.\nNiels De Graef who reported it and helped to track down the poc."
},
{
"lang": "es",
"value": "En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: drm/vmwgfx: corrige una posible desreferencia del puntero nulo con contextos no v\u00e1lidos. vmw_context_cotable puede devolver un error o un puntero nulo y, en ocasiones, su uso no se controlaba. El c\u00f3digo posterior intentar\u00eda acceder a un puntero nulo o a un valor de error. Las desreferencias no v\u00e1lidas solo fueron posibles con aplicaciones de espacio de usuario con formato incorrecto que nunca inicializaron correctamente los contextos de representaci\u00f3n. Verifique los resultados de vmw_context_cotable para corregir los derefs no v\u00e1lidos. Gracias: ziming zhang (@ezrak1e) de Ant Group Light-Year Security Lab, quien fue la primera persona en descubrirlo. Niels De Graef, quien lo inform\u00f3 y ayud\u00f3 a localizar al poc."
"value": "Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-476"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "4.20",
"versionEndExcluding": "5.10.215",
"matchCriteriaId": "232C4522-CA13-49F2-97E0-DAA480E1E801"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.11",
"versionEndExcluding": "5.15.154",
"matchCriteriaId": "577E212E-7E95-4A71-9B5C-F1D1A3AFFF46"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.16",
"versionEndExcluding": "6.1.84",
"matchCriteriaId": "834D9BD5-42A6-4D74-979E-4D6D93F630FD"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.2",
"versionEndExcluding": "6.6.24",
"matchCriteriaId": "8018C1D0-0A5F-48D0-BC72-A2B33FDDA693"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.7",
"versionEndExcluding": "6.7.12",
"matchCriteriaId": "6BE9771A-BAFD-4624-95F9-58D536540C53"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.8",
"versionEndExcluding": "6.8.3",
"matchCriteriaId": "4C59BBC3-6495-4A77-9C82-55EC7CDF5E02"
}
]
}
]
}
],
"references": [
{
"url": "https://git.kernel.org/stable/c/07c3fe923ff7eccf684fb4f8c953d0a7cc8ded73",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/517621b7060096e48e42f545fa6646fc00252eac",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/585fec7361e7850bead21fada49a7fcde2f2e791",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/899e154f9546fcae18065d74064889d08fff62c2",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/9cb3755b1e3680b720b74dbedfac889e904605c7",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/c560327d900bab968c2e1b4cd7fa2d46cd429e3d",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/ff41e0d4f3fa10d7cdd7d40f8026bea9fcc8b000",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
}
]
"metrics": {},
"references": []
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-28833",
"sourceIdentifier": "security@checkmk.com",
"published": "2024-06-10T12:15:09.927",
"lastModified": "2024-06-10T12:40:41.360",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-06-12T17:53:57.103",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -16,6 +16,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
},
{
"source": "security@checkmk.com",
"type": "Secondary",
@ -39,6 +59,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-307"
}
]
},
{
"source": "security@checkmk.com",
"type": "Secondary",
@ -50,10 +80,50 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:tribe29:checkmk:2.3.0:p1:*:*:*:*:*:*",
"matchCriteriaId": "28A099D2-633C-4FA0-9222-A75B4EB023CA"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:tribe29:checkmk:2.3.0:p2:*:*:*:*:*:*",
"matchCriteriaId": "AE12FFFC-AA27-4EF5-9156-4116C548EC77"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:tribe29:checkmk:2.3.0:p3:*:*:*:*:*:*",
"matchCriteriaId": "CB80C81C-52DB-40B3-B8CF-0A9EDE8B1DCD"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:tribe29:checkmk:2.3.0:p4:*:*:*:*:*:*",
"matchCriteriaId": "8F31F7B8-334E-4E93-B6B4-D1729DD1F449"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:tribe29:checkmk:2.3.0:p5:*:*:*:*:*:*",
"matchCriteriaId": "D2DCAD39-C949-42D7-922E-BE8914105083"
}
]
}
]
}
],
"references": [
{
"url": "https://checkmk.com/werk/16830",
"source": "security@checkmk.com"
"source": "security@checkmk.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,19 +2,78 @@
"id": "CVE-2024-31611",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-06-10T17:16:26.493",
"lastModified": "2024-06-10T18:06:22.600",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-06-12T17:44:20.730",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "SeaCMS 12.9 has a file deletion vulnerability via admin_template.php."
},
{
"lang": "es",
"value": "SeaCMS 12.9 tiene una vulnerabilidad de eliminaci\u00f3n de archivos a trav\u00e9s de admin_template.php."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.1,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.2
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:seacms:seacms:12.9:*:*:*:*:*:*:*",
"matchCriteriaId": "5A52C0BF-703A-4BF0-A5A9-E3995C30FE0D"
}
]
}
]
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/ss122-0ss/seacms/blob/main/readme.md",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Exploit"
]
}
]
}

View File

@ -2,16 +2,40 @@
"id": "CVE-2024-35650",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-06-10T16:15:15.000",
"lastModified": "2024-06-10T18:06:22.600",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-06-12T17:51:20.710",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in Melapress MelaPress Login Security allows PHP Remote File Inclusion.This issue affects MelaPress Login Security: from n/a through 1.3.0."
},
{
"lang": "es",
"value": "Control inadecuado del nombre de archivo para la declaraci\u00f3n Incluir/Requerir en el programa PHP ('Inclusi\u00f3n remota de archivos PHP') vulnerabilidad en Melapress MelaPress Login Security permite la inclusi\u00f3n remota de archivos PHP. Este problema afecta la seguridad de inicio de sesi\u00f3n de MelaPress: desde n/a hasta 1.3.0."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.2,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.2,
"impactScore": 5.9
},
{
"source": "audit@patchstack.com",
"type": "Secondary",
@ -35,6 +59,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-829"
}
]
},
{
"source": "audit@patchstack.com",
"type": "Secondary",
@ -46,10 +80,31 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:melapress:melapress_login_security:*:*:*:*:*:wordpress:*:*",
"versionEndExcluding": "1.3.1",
"matchCriteriaId": "26E130E2-0B5C-4B3A-A47A-07E2E035C725"
}
]
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/melapress-login-security/wordpress-melapress-login-security-plugin-1-3-0-remote-file-inclusion-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
"source": "audit@patchstack.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,16 +2,40 @@
"id": "CVE-2024-35658",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-06-10T16:15:15.280",
"lastModified": "2024-06-10T18:06:22.600",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-06-12T17:50:55.227",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in ThemeHigh Checkout Field Editor for WooCommerce (Pro) allows Functionality Misuse, File Manipulation.This issue affects Checkout Field Editor for WooCommerce (Pro): from n/a through 3.6.2."
},
{
"lang": "es",
"value": "La limitaci\u00f3n inadecuada de un nombre de ruta a una vulnerabilidad de directorio restringido (\"Path Traversal\") en ThemeHigh Checkout Field Editor para WooCommerce (Pro) permite el uso indebido de la funcionalidad y la manipulaci\u00f3n de archivos. Este problema afecta al Checkout Field Editor para WooCommerce (Pro): desde n/a hasta 3.6.2."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.1,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.2
},
{
"source": "audit@patchstack.com",
"type": "Secondary",
@ -46,10 +70,31 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:themehigh:checkout_field_editor_for_woocommerce:*:*:*:*:pro:wordpress:*:*",
"versionEndExcluding": "3.6.3",
"matchCriteriaId": "E199A745-B099-4CE8-9B45-AC1CD409F3E5"
}
]
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/woocommerce-checkout-field-editor-pro/wordpress-checkout-field-editor-for-woocommerce-pro-plugin-3-6-2-unauthenticated-arbitrary-file-deletion-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
"source": "audit@patchstack.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,16 +2,40 @@
"id": "CVE-2024-35677",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-06-10T16:15:15.533",
"lastModified": "2024-06-10T18:06:22.600",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-06-12T17:50:33.367",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in StylemixThemes MegaMenu allows PHP Local File Inclusion.This issue affects MegaMenu: from n/a through 2.3.12."
},
{
"lang": "es",
"value": "La limitaci\u00f3n inadecuada de un nombre de ruta a una vulnerabilidad de directorio restringido (\"Path Traversal\") en StylemixThemes MegaMenu permite la inclusi\u00f3n de archivos locales PHP. Este problema afecta a MegaMenu: desde n/a hasta 2.3.12."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
},
{
"source": "audit@patchstack.com",
"type": "Secondary",
@ -46,10 +70,31 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:stylemixthemes:mega_menu:*:*:*:*:*:wordpress:*:*",
"versionEndExcluding": "2.3.13",
"matchCriteriaId": "FE95B0C3-49D4-445C-92C2-377101BCCFCD"
}
]
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/stm-megamenu/wordpress-megamenu-plugin-2-3-12-unauthenticated-local-file-inclusion-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
"source": "audit@patchstack.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,16 +2,40 @@
"id": "CVE-2024-35680",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-06-10T16:15:15.790",
"lastModified": "2024-06-10T18:06:22.600",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-06-12T17:49:56.670",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection') vulnerability in YITH YITH WooCommerce Product Add-Ons allows Code Injection.This issue affects YITH WooCommerce Product Add-Ons: from n/a through 4.9.2."
},
{
"lang": "es",
"value": "La neutralizaci\u00f3n inadecuada de elementos especiales en la salida utilizados por una vulnerabilidad de componente posterior (\"inyecci\u00f3n\") en YITH YITH WooCommerce Product Add-Ons permite la inyecci\u00f3n de c\u00f3digo. Este problema afecta a YITH WooCommerce Product Add-Ons: desde n/a hasta 4.9.2."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 5.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 3.9,
"impactScore": 1.4
},
{
"source": "audit@patchstack.com",
"type": "Secondary",
@ -46,10 +70,31 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:yithemes:yith_woocommerce_product_add-ons:*:*:*:*:free:wordpress:*:*",
"versionEndExcluding": "4.9.3",
"matchCriteriaId": "8A358977-575B-4AFF-8B65-2F1A6C04B522"
}
]
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/yith-woocommerce-product-add-ons/wordpress-yith-woocommerce-product-add-ons-plugin-4-9-2-content-injection-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
"source": "audit@patchstack.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,16 +2,40 @@
"id": "CVE-2024-35712",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-06-10T16:15:16.150",
"lastModified": "2024-06-10T18:06:22.600",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-06-12T17:49:29.547",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in Jordy Meow Database Cleaner allows Relative Path Traversal.This issue affects Database Cleaner: from n/a through 1.0.5."
},
{
"lang": "es",
"value": "La limitaci\u00f3n inadecuada de un nombre de ruta a una vulnerabilidad de directorio restringido (\"Path Traversal\") en Jordy Meow Database Cleaner permite el Relative Path Traversal. Este problema afecta a Database Cleaner: desde n/a hasta 1.0.5."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.9,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.2,
"impactScore": 3.6
},
{
"source": "audit@patchstack.com",
"type": "Secondary",
@ -46,10 +70,31 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:meowapps:database_cleaner:*:*:*:*:*:wordpress:*:*",
"versionEndExcluding": "1.0.6",
"matchCriteriaId": "41C6F947-37BF-40DB-9E66-B45434F7F723"
}
]
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/database-cleaner/wordpress-database-cleaner-clean-optimize-repair-plugin-1-0-5-arbitrary-file-read-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
"source": "audit@patchstack.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-35721",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-06-10T08:15:49.180",
"lastModified": "2024-06-10T12:40:41.360",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-06-12T16:29:34.530",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -16,6 +16,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
},
{
"source": "audit@patchstack.com",
"type": "Secondary",
@ -50,10 +70,31 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:awplife:image_gallery:*:*:*:*:*:wordpress:*:*",
"versionEndExcluding": "1.4.6",
"matchCriteriaId": "5464FBC6-E84E-4359-BF34-C842ABFF2D66"
}
]
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/new-image-gallery/wordpress-image-gallery-plugin-1-4-5-broken-access-control-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
"source": "audit@patchstack.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-35722",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-06-10T08:15:49.400",
"lastModified": "2024-06-10T12:40:41.360",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-06-12T16:29:22.497",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -16,6 +16,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
},
{
"source": "audit@patchstack.com",
"type": "Secondary",
@ -50,10 +70,31 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:awplife:slider_responsive_slideshow:*:*:*:*:*:wordpress:*:*",
"versionEndExcluding": "1.4.2",
"matchCriteriaId": "1ACFEC6A-2F89-441C-96B3-B651621EFE78"
}
]
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/slider-responsive-slideshow/wordpress-slider-responsive-slideshow-image-slider-gallery-slideshow-plugin-1-4-0-broken-access-control-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
"source": "audit@patchstack.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-35723",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-06-10T08:15:49.627",
"lastModified": "2024-06-10T12:40:41.360",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-06-12T16:28:51.920",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -16,6 +16,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
},
{
"source": "audit@patchstack.com",
"type": "Secondary",
@ -50,10 +70,31 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:arwebdesign:dashboard_to-do_list:*:*:*:*:*:wordpress:*:*",
"versionEndExcluding": "1.3.0",
"matchCriteriaId": "3C43ADE3-0B4C-4A0B-AAC8-9D048712A1D3"
}
]
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/dashboard-to-do-list/wordpress-dashboard-to-do-list-plugin-1-2-0-broken-access-control-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
"source": "audit@patchstack.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-35724",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-06-10T08:15:49.853",
"lastModified": "2024-06-10T12:40:41.360",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-06-12T16:28:10.463",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -16,6 +16,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
},
{
"source": "audit@patchstack.com",
"type": "Secondary",
@ -39,6 +59,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-862"
}
]
},
{
"source": "audit@patchstack.com",
"type": "Secondary",
@ -50,10 +80,31 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:bosathemes:bosa_elementor_addons_and_templates_for_woocommerce:*:*:*:*:*:wordpress:*:*",
"versionEndExcluding": "1.0.13",
"matchCriteriaId": "C344DC5D-E121-42E4-A4F2-592FC235BD44"
}
]
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/bosa-elementor-for-woocommerce/wordpress-bosa-elementor-addons-and-templates-for-woocommerce-plugin-1-0-12-broken-access-control-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
"source": "audit@patchstack.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-35725",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-06-10T08:15:50.130",
"lastModified": "2024-06-10T12:40:41.360",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-06-12T16:27:55.390",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -16,6 +16,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
},
{
"source": "audit@patchstack.com",
"type": "Secondary",
@ -50,10 +70,31 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:la-studioweb:element_kit_for_elementor:*:*:*:*:*:wordpress:*:*",
"versionEndExcluding": "1.3.7.4",
"matchCriteriaId": "C94422F1-989E-4927-9B84-7F085BFAD58A"
}
]
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/lastudio-element-kit/wordpress-la-studio-element-kit-for-elementor-plugin-1-3-6-broken-access-control-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
"source": "audit@patchstack.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-35726",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-06-10T08:15:50.370",
"lastModified": "2024-06-10T12:40:41.360",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-06-12T16:27:05.920",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -16,6 +16,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
},
{
"source": "audit@patchstack.com",
"type": "Secondary",
@ -50,10 +70,31 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:themekraft:buddypress_woocommerce_my_account_integration._create_woocommerce_member_pages:*:*:*:*:*:wordpress:*:*",
"versionEndExcluding": "3.4.20",
"matchCriteriaId": "AE5B95E1-B717-4469-9CA9-087FEDE90FA1"
}
]
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/wc4bp/wordpress-woobuddy-plugin-3-4-19-broken-access-control-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
"source": "audit@patchstack.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-35727",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-06-10T08:15:50.600",
"lastModified": "2024-06-10T12:40:41.360",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-06-12T16:26:55.247",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -16,6 +16,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
},
{
"source": "audit@patchstack.com",
"type": "Secondary",
@ -50,10 +70,31 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:actpro:extra_product_options_for_woocommerce:*:*:*:*:*:wordpress:*:*",
"versionEndExcluding": "3.0.7",
"matchCriteriaId": "46E2750E-A567-47A8-B9FE-7759DBB7E3C1"
}
]
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/extra-product-options-for-woocommerce/wordpress-extra-product-options-for-woocommerce-plugin-3-0-6-broken-access-control-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
"source": "audit@patchstack.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,16 +2,40 @@
"id": "CVE-2024-35728",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-06-10T17:16:29.810",
"lastModified": "2024-06-10T18:06:22.600",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-06-12T17:43:24.173",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection') vulnerability in Themeisle PPOM for WooCommerce allows Code Inclusion.This issue affects PPOM for WooCommerce: from n/a through 32.0.20."
},
{
"lang": "es",
"value": "La neutralizaci\u00f3n inadecuada de elementos especiales en la salida utilizada por una vulnerabilidad de componente posterior (\"inyecci\u00f3n\") en Themeisle PPOM para WooCommerce permite la inclusi\u00f3n de c\u00f3digo. Este problema afecta a PPOM para WooCommerce: desde n/a hasta 32.0.20."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 5.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 3.9,
"impactScore": 1.4
},
{
"source": "audit@patchstack.com",
"type": "Secondary",
@ -46,10 +70,31 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:themeisle:product_addons_\\&_fields_for_woocommerce:*:*:*:*:*:wordpress:*:*",
"versionEndExcluding": "32.0.21",
"matchCriteriaId": "D530ADA6-2BF1-463C-A57E-D4FAA83A59A5"
}
]
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/woocommerce-product-addon/wordpress-product-addons-fields-for-woocommerce-plugin-32-0-20-content-injection-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
"source": "audit@patchstack.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-35729",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-06-10T08:15:50.820",
"lastModified": "2024-06-10T12:40:41.360",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-06-12T16:26:45.633",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -16,6 +16,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
},
{
"source": "audit@patchstack.com",
"type": "Secondary",
@ -39,6 +59,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-862"
}
]
},
{
"source": "audit@patchstack.com",
"type": "Secondary",
@ -50,10 +80,31 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:tickera:tickera:*:*:*:*:*:wordpress:*:*",
"versionEndExcluding": "3.5.2.7",
"matchCriteriaId": "F2E0181D-6D3A-4EE5-8451-B1FD033D8897"
}
]
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/tickera-event-ticketing-system/wordpress-tickera-wordpress-event-ticketing-plugin-3-5-2-6-broken-access-control-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
"source": "audit@patchstack.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-35735",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-06-10T08:15:51.053",
"lastModified": "2024-06-10T12:40:41.360",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-06-12T16:26:08.450",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -16,6 +16,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
},
{
"source": "audit@patchstack.com",
"type": "Secondary",
@ -50,10 +70,31 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:codepeople:wp_time_slots_booking_form:*:*:*:*:*:wordpress:*:*",
"versionEndExcluding": "1.2.12",
"matchCriteriaId": "E4BB03F8-53F2-4B1A-A5D2-87EF74C7DD59"
}
]
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/wp-time-slots-booking-form/wordpress-wp-time-slots-booking-form-plugin-1-2-11-broken-access-control-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
"source": "audit@patchstack.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-35741",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-06-10T08:15:51.277",
"lastModified": "2024-06-10T12:40:41.360",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-06-12T17:54:46.150",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -16,6 +16,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
},
{
"source": "audit@patchstack.com",
"type": "Secondary",
@ -50,10 +70,31 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:getawesomesupport:awesome_support:*:*:*:*:*:wordpress:*:*",
"versionEndExcluding": "6.1.8",
"matchCriteriaId": "F9CD5015-8E1A-4254-BEA3-9E8A74D0C609"
}
]
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/awesome-support/wordpress-awesome-support-plugin-6-1-7-broken-access-control-vulnerability-2?_s_id=cve",
"source": "audit@patchstack.com"
"source": "audit@patchstack.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,16 +2,40 @@
"id": "CVE-2024-35743",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-06-10T17:16:30.040",
"lastModified": "2024-06-10T18:06:22.600",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-06-12T17:42:56.900",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in Siteclean SC filechecker allows Path Traversal, File Manipulation.This issue affects SC filechecker: from n/a through 0.6."
},
{
"lang": "es",
"value": "La limitaci\u00f3n inadecuada de un nombre de ruta a una vulnerabilidad de directorio restringido (\"Path Traversal\") en Siteclean SC filechecker permite el Path Traversal y la manipulaci\u00f3n de archivos. Este problema afecta a SC filechecker: desde n/a hasta 0.6."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.2,
"impactScore": 5.2
},
{
"source": "audit@patchstack.com",
"type": "Secondary",
@ -46,10 +70,31 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:sc_filechecker_project:sc_filechecker:*:*:*:*:*:wordpress:*:*",
"versionEndIncluding": "0.6",
"matchCriteriaId": "6FCAEDE1-7F1F-40A3-A6E7-D143CC63DD37"
}
]
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/wp-file-checker/wordpress-sc-filechecker-plugin-0-6-arbitrary-file-deletion-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
"source": "audit@patchstack.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,16 +2,40 @@
"id": "CVE-2024-35744",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-06-10T17:16:30.280",
"lastModified": "2024-06-10T18:06:22.600",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-06-12T17:42:12.707",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in Ravidhu Dissanayake Upunzipper allows Path Traversal, File Manipulation.This issue affects Upunzipper: from n/a through 1.0.0."
},
{
"lang": "es",
"value": "La limitaci\u00f3n inadecuada de un nombre de ruta a una vulnerabilidad de directorio restringido (\"Path Traversal\") en Ravidhu Dissanayake Upunzipper permite el Path Traversals y la manipulaci\u00f3n de archivos. Este problema afecta a Upunzipper: desde n/a hasta 1.0.0."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.2,
"impactScore": 5.2
},
{
"source": "audit@patchstack.com",
"type": "Secondary",
@ -46,10 +70,31 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:upunzipper_project:upunzipper:*:*:*:*:*:wordpress:*:*",
"versionEndIncluding": "1.0.0",
"matchCriteriaId": "687331A0-C9E5-4BC4-9422-792C524F403B"
}
]
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/upunzipper/wordpress-upunzipper-plugin-1-0-0-arbitrary-file-deletion-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
"source": "audit@patchstack.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,16 +2,40 @@
"id": "CVE-2024-35745",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-06-10T17:16:30.497",
"lastModified": "2024-06-10T18:06:22.600",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-06-12T17:36:32.763",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in Gabriel Somoza / Joseph Fitzgibbons Strategery Migrations allows Path Traversal, File Manipulation.This issue affects Strategery Migrations: from n/a through 1.0."
},
{
"lang": "es",
"value": "Limitaci\u00f3n inadecuada de un nombre de ruta a una vulnerabilidad de directorio restringido (\"Path Traversal\") en Gabriel Somoza / Joseph Fitzgibbons Strategery Migrations permite Path Traversal y manipulaci\u00f3n de archivos. Este problema afecta a Strategery Migrations: desde n/a hasta 1.0."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
},
{
"source": "audit@patchstack.com",
"type": "Secondary",
@ -46,10 +70,31 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:strategery-migrations_project:strategery-migrations:*:*:*:*:*:wordpress:*:*",
"versionEndIncluding": "1.0",
"matchCriteriaId": "B083AD42-1A00-4FD0-9C6B-6DB976FF3244"
}
]
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/strategery-migrations/wordpress-strategery-migrations-plugin-1-0-arbitrary-file-deletion-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
"source": "audit@patchstack.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,16 +2,40 @@
"id": "CVE-2024-35746",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-06-10T17:16:30.710",
"lastModified": "2024-06-10T18:06:22.600",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-06-12T17:36:02.087",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "Unrestricted Upload of File with Dangerous Type vulnerability in Asghar Hatampoor BuddyPress Cover allows Code Injection.This issue affects BuddyPress Cover: from n/a through 2.1.4.2."
},
{
"lang": "es",
"value": "La carga sin restricciones de archivos con vulnerabilidad de tipo peligroso en Asghar Hatampoor BuddyPress Cover permite la inyecci\u00f3n de c\u00f3digo. Este problema afecta a BuddyPress Cover: desde n/a hasta 2.1.4.2."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
},
{
"source": "audit@patchstack.com",
"type": "Secondary",
@ -46,10 +70,31 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:buddypress_cover_project:buddypress_cover:*:*:*:*:*:wordpress:*:*",
"versionEndIncluding": "2.1.4.2",
"matchCriteriaId": "F4BB0A1D-3B6C-400D-AEB3-1A484195E52D"
}
]
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/bp-cover/wordpress-buddypress-cover-plugin-2-1-4-2-arbitrary-file-upload-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
"source": "audit@patchstack.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,16 +2,40 @@
"id": "CVE-2024-35747",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-06-10T17:16:30.947",
"lastModified": "2024-06-10T18:06:22.600",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-06-12T17:32:52.343",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "Improper Restriction of Excessive Authentication Attempts vulnerability in wpdevart Contact Form Builder, Contact Widget allows Functionality Bypass.This issue affects Contact Form Builder, Contact Widget: from n/a through 2.1.7."
},
{
"lang": "es",
"value": "Vulnerabilidad de restricci\u00f3n inadecuada de intentos de autenticaci\u00f3n excesivos en wpdevart Contact Form Builder, Contact Widget permite omitir la funcionalidad. Este problema afecta a Contact Form Builder, Contact Widget: desde n/a hasta 2.1.7."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 5.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 3.9,
"impactScore": 1.4
},
{
"source": "audit@patchstack.com",
"type": "Secondary",
@ -46,10 +70,31 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:contact_form_builder_project:contact_form_builder:*:*:*:*:*:wordpress:*:*",
"versionEndIncluding": "2.1.7",
"matchCriteriaId": "89DC4C1D-2BD2-4EBC-B8C5-913A818A78C4"
}
]
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/contact-forms-builder/wordpress-contact-form-builder-contact-widget-plugin-2-1-7-bypass-vulnerability-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
"source": "audit@patchstack.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-36263",
"sourceIdentifier": "security@apache.org",
"published": "2024-06-12T14:15:11.740",
"lastModified": "2024-06-12T14:15:11.740",
"lastModified": "2024-06-12T17:15:50.363",
"vulnStatus": "Received",
"descriptions": [
{
@ -24,6 +24,10 @@
}
],
"references": [
{
"url": "http://www.openwall.com/lists/oss-security/2024/06/12/1",
"source": "security@apache.org"
},
{
"url": "https://github.com/apache/submarine/pull/1121",
"source": "security@apache.org"

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-36264",
"sourceIdentifier": "security@apache.org",
"published": "2024-06-12T14:15:11.983",
"lastModified": "2024-06-12T14:15:11.983",
"lastModified": "2024-06-12T17:15:50.447",
"vulnStatus": "Received",
"descriptions": [
{
@ -24,6 +24,10 @@
}
],
"references": [
{
"url": "http://www.openwall.com/lists/oss-security/2024/06/12/2",
"source": "security@apache.org"
},
{
"url": "https://github.com/apache/submarine/pull/1125",
"source": "security@apache.org"

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-36265",
"sourceIdentifier": "security@apache.org",
"published": "2024-06-12T15:15:52.247",
"lastModified": "2024-06-12T15:15:52.247",
"lastModified": "2024-06-12T17:15:50.520",
"vulnStatus": "Received",
"descriptions": [
{
@ -24,6 +24,10 @@
}
],
"references": [
{
"url": "http://www.openwall.com/lists/oss-security/2024/06/12/3",
"source": "security@apache.org"
},
{
"url": "https://lists.apache.org/thread/prckhhst19qxof064hsm8cccxtofvflz",
"source": "security@apache.org"

View File

@ -2,16 +2,40 @@
"id": "CVE-2024-36412",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-06-10T20:15:13.820",
"lastModified": "2024-06-10T20:54:18.443",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-06-12T18:00:00.317",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "SuiteCRM is an open-source Customer Relationship Management (CRM) software application. Prior to versions 7.14.4 and 8.6.1, a vulnerability in events response entry point allows for a SQL injection attack. Versions 7.14.4 and 8.6.1 contain a fix for this issue."
},
{
"lang": "es",
"value": "SuiteCRM es una aplicaci\u00f3n de software de gesti\u00f3n de relaciones con el cliente (CRM) de c\u00f3digo abierto. Antes de las versiones 7.14.4 y 8.6.1, una vulnerabilidad en el punto de entrada de respuesta a eventos permit\u00eda un ataque de inyecci\u00f3n SQL. Las versiones 7.14.4 y 8.6.1 contienen una soluci\u00f3n para este problema."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
},
{
"source": "security-advisories@github.com",
"type": "Secondary",
@ -35,6 +59,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
},
{
"source": "security-advisories@github.com",
"type": "Secondary",
@ -46,10 +80,38 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:salesagility:suitecrm:*:*:*:*:*:*:*:*",
"versionEndExcluding": "7.14.4",
"matchCriteriaId": "176C4E20-B96D-4391-986F-3314663983AC"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:salesagility:suitecrm:*:*:*:*:*:*:*:*",
"versionStartIncluding": "8.0.0",
"versionEndExcluding": "8.6.1",
"matchCriteriaId": "5249169E-5516-4705-A2C8-DE1BA56497D0"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/salesagility/SuiteCRM/security/advisories/GHSA-xjx2-38hv-5hh8",
"source": "security-advisories@github.com"
"source": "security-advisories@github.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,16 +2,40 @@
"id": "CVE-2024-36413",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-06-10T20:15:14.057",
"lastModified": "2024-06-10T20:54:18.443",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-06-12T17:59:44.673",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "SuiteCRM is an open-source Customer Relationship Management (CRM) software application. Prior to versions 7.14.4 and 8.6.1, a vulnerability in the import module error view allows for a cross-site scripting attack. Versions 7.14.4 and 8.6.1 contain a fix for this issue."
},
{
"lang": "es",
"value": "SuiteCRM es una aplicaci\u00f3n de software de gesti\u00f3n de relaciones con el cliente (CRM) de c\u00f3digo abierto. Antes de las versiones 7.14.4 y 8.6.1, una vulnerabilidad en la vista de errores del m\u00f3dulo de importaci\u00f3n permit\u00eda un ataque de Cross-Site Scripting. Las versiones 7.14.4 y 8.6.1 contienen una soluci\u00f3n para este problema."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
},
{
"source": "security-advisories@github.com",
"type": "Secondary",
@ -35,6 +59,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
},
{
"source": "security-advisories@github.com",
"type": "Secondary",
@ -46,10 +80,38 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:salesagility:suitecrm:*:*:*:*:*:*:*:*",
"versionEndExcluding": "7.14.4",
"matchCriteriaId": "176C4E20-B96D-4391-986F-3314663983AC"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:salesagility:suitecrm:*:*:*:*:*:*:*:*",
"versionStartIncluding": "8.0.0",
"versionEndExcluding": "8.6.1",
"matchCriteriaId": "5249169E-5516-4705-A2C8-DE1BA56497D0"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/salesagility/SuiteCRM/security/advisories/GHSA-ph2c-hvvf-r273",
"source": "security-advisories@github.com"
"source": "security-advisories@github.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,16 +2,40 @@
"id": "CVE-2024-36414",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-06-10T20:15:14.277",
"lastModified": "2024-06-10T20:54:18.443",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-06-12T17:59:14.353",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "SuiteCRM is an open-source Customer Relationship Management (CRM) software application. Prior to versions 7.14.4 and 8.6.1, a vulnerability in the connectors file verification allows for a server-side request forgery attack. Versions 7.14.4 and 8.6.1 contain a fix for this issue."
},
{
"lang": "es",
"value": "SuiteCRM es una aplicaci\u00f3n de software de gesti\u00f3n de relaciones con el cliente (CRM) de c\u00f3digo abierto. Antes de las versiones 7.14.4 y 8.6.1, una vulnerabilidad en la verificaci\u00f3n de archivos de los conectores permit\u00eda un ataque de server-side request forgery. Las versiones 7.14.4 y 8.6.1 contienen una soluci\u00f3n para este problema."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 3.6
},
{
"source": "security-advisories@github.com",
"type": "Secondary",
@ -35,6 +59,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-918"
}
]
},
{
"source": "security-advisories@github.com",
"type": "Secondary",
@ -46,10 +80,38 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:salesagility:suitecrm:*:*:*:*:*:*:*:*",
"versionEndExcluding": "7.14.4",
"matchCriteriaId": "176C4E20-B96D-4391-986F-3314663983AC"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:salesagility:suitecrm:*:*:*:*:*:*:*:*",
"versionStartIncluding": "8.0.0",
"versionEndExcluding": "8.6.1",
"matchCriteriaId": "5249169E-5516-4705-A2C8-DE1BA56497D0"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/salesagility/SuiteCRM/security/advisories/GHSA-wg74-772c-8gr7",
"source": "security-advisories@github.com"
"source": "security-advisories@github.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,16 +2,40 @@
"id": "CVE-2024-36415",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-06-10T20:15:14.503",
"lastModified": "2024-06-10T20:54:18.443",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-06-12T17:58:53.497",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "SuiteCRM is an open-source Customer Relationship Management (CRM) software application. Prior to versions 7.14.4 and 8.6.1, a vulnerability in uploaded file verification in products allows for remote code execution. Versions 7.14.4 and 8.6.1 contain a fix for this issue."
},
{
"lang": "es",
"value": "SuiteCRM es una aplicaci\u00f3n de software de gesti\u00f3n de relaciones con el cliente (CRM) de c\u00f3digo abierto. Antes de las versiones 7.14.4 y 8.6.1, una vulnerabilidad en la verificaci\u00f3n de archivos cargados en los productos permit\u00eda la ejecuci\u00f3n remota de c\u00f3digo. Las versiones 7.14.4 y 8.6.1 contienen una soluci\u00f3n para este problema."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
},
{
"source": "security-advisories@github.com",
"type": "Secondary",
@ -35,6 +59,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-434"
}
]
},
{
"source": "security-advisories@github.com",
"type": "Secondary",
@ -50,10 +84,38 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:salesagility:suitecrm:*:*:*:*:*:*:*:*",
"versionEndExcluding": "7.14.4",
"matchCriteriaId": "176C4E20-B96D-4391-986F-3314663983AC"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:salesagility:suitecrm:*:*:*:*:*:*:*:*",
"versionStartIncluding": "8.0.0",
"versionEndExcluding": "8.6.1",
"matchCriteriaId": "5249169E-5516-4705-A2C8-DE1BA56497D0"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/salesagility/SuiteCRM/security/advisories/GHSA-c82f-58jv-jfrh",
"source": "security-advisories@github.com"
"source": "security-advisories@github.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,16 +2,40 @@
"id": "CVE-2024-36416",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-06-10T20:15:14.730",
"lastModified": "2024-06-10T20:54:18.443",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-06-12T17:58:19.570",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "SuiteCRM is an open-source Customer Relationship Management (CRM) software application. Prior to versions 7.14.4 and 8.6.1, a deprecated v4 API example with no log rotation allows denial of service by logging excessive data. Versions 7.14.4 and 8.6.1 contain a fix for this issue."
},
{
"lang": "es",
"value": "SuiteCRM es una aplicaci\u00f3n de software de gesti\u00f3n de relaciones con el cliente (CRM) de c\u00f3digo abierto. Antes de las versiones 7.14.4 y 8.6.1, un ejemplo de API v4 obsoleto sin rotaci\u00f3n de registros permit\u00eda la denegaci\u00f3n de servicio al registrar datos excesivos. Las versiones 7.14.4 y 8.6.1 contienen una soluci\u00f3n para este problema."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
},
{
"source": "security-advisories@github.com",
"type": "Secondary",
@ -35,6 +59,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-Other"
}
]
},
{
"source": "security-advisories@github.com",
"type": "Secondary",
@ -46,10 +80,38 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:salesagility:suitecrm:*:*:*:*:*:*:*:*",
"versionEndExcluding": "7.14.4",
"matchCriteriaId": "176C4E20-B96D-4391-986F-3314663983AC"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:salesagility:suitecrm:*:*:*:*:*:*:*:*",
"versionStartIncluding": "8.0.0",
"versionEndExcluding": "8.6.1",
"matchCriteriaId": "5249169E-5516-4705-A2C8-DE1BA56497D0"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/salesagility/SuiteCRM/security/advisories/GHSA-jrpp-22g3-2j77",
"source": "security-advisories@github.com"
"source": "security-advisories@github.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,16 +2,40 @@
"id": "CVE-2024-36417",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-06-10T20:15:14.960",
"lastModified": "2024-06-10T20:54:18.443",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-06-12T17:58:04.477",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "SuiteCRM is an open-source Customer Relationship Management (CRM) software application. Prior to versions 7.14.4 and 8.6.1, an unverified IFrame can be added some some inputs, which could allow for a cross-site scripting attack. Versions 7.14.4 and 8.6.1 contain a fix for this issue."
},
{
"lang": "es",
"value": "SuiteCRM es una aplicaci\u00f3n de software de gesti\u00f3n de relaciones con el cliente (CRM) de c\u00f3digo abierto. Antes de las versiones 7.14.4 y 8.6.1, se pod\u00edan agregar algunas entradas a un IFrame no verificado, lo que podr\u00eda permitir un ataque de Cross-Site Scripting. Las versiones 7.14.4 y 8.6.1 contienen una soluci\u00f3n para este problema."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.0,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 2.3,
"impactScore": 6.0
},
{
"source": "security-advisories@github.com",
"type": "Secondary",
@ -35,6 +59,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
},
{
"source": "security-advisories@github.com",
"type": "Secondary",
@ -46,10 +80,38 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:salesagility:suitecrm:*:*:*:*:*:*:*:*",
"versionEndExcluding": "7.14.4",
"matchCriteriaId": "176C4E20-B96D-4391-986F-3314663983AC"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:salesagility:suitecrm:*:*:*:*:*:*:*:*",
"versionStartIncluding": "8.0.0",
"versionEndExcluding": "8.6.1",
"matchCriteriaId": "5249169E-5516-4705-A2C8-DE1BA56497D0"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/salesagility/SuiteCRM/security/advisories/GHSA-3www-6rqc-rm7j",
"source": "security-advisories@github.com"
"source": "security-advisories@github.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -0,0 +1,24 @@
{
"id": "CVE-2024-36761",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-06-12T16:15:11.983",
"lastModified": "2024-06-12T16:15:11.983",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "naga v0.14.0 was discovered to contain a stack overflow via the component /wgsl/parse/mod.rs."
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/MageWeiG/VulnerabilityCollection/blob/main/CVE-2024-36761/info.md",
"source": "cve@mitre.org"
},
{
"url": "https://github.com/gfx-rs/naga/issues/2591",
"source": "cve@mitre.org"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-3699",
"sourceIdentifier": "cvd@cert.pl",
"published": "2024-06-10T12:15:10.243",
"lastModified": "2024-06-10T12:40:41.360",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-06-12T17:53:09.130",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -14,8 +14,41 @@
"value": "El uso de una contrase\u00f1a codificada para la base de datos de los pacientes permite a un atacante recuperar datos confidenciales almacenados en la base de datos. La contrase\u00f1a es la misma en todas las instalaciones de drEryk Gabinet. Este problema afecta a las versiones del software drEryk Gabinet desde la 7.0.0.0 hasta la 9.17.0.0."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-798"
}
]
},
{
"source": "cvd@cert.pl",
"type": "Secondary",
@ -27,18 +60,46 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:dreryk:gabinet:*:*:*:*:*:*:*:*",
"versionStartIncluding": "7.0.0.0",
"versionEndExcluding": "9.17.0.0",
"matchCriteriaId": "BA6C7053-964C-430E-88D2-94943DA6DFFD"
}
]
}
]
}
],
"references": [
{
"url": "https://cert.pl/en/posts/2024/06/CVE-2024-1228/",
"source": "cvd@cert.pl"
"source": "cvd@cert.pl",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://cert.pl/posts/2024/06/CVE-2024-1228/",
"source": "cvd@cert.pl"
"source": "cvd@cert.pl",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://dreryk.pl/produkty/gabinet/",
"source": "cvd@cert.pl"
"source": "cvd@cert.pl",
"tags": [
"Product"
]
}
]
}

View File

@ -2,19 +2,80 @@
"id": "CVE-2024-37014",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-06-10T20:15:15.213",
"lastModified": "2024-06-10T20:54:18.443",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-06-12T17:57:01.660",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "Langflow through 0.6.19 allows remote code execution if untrusted users are able to reach the \"POST /api/v1/custom_component\" endpoint and provide a Python script."
},
{
"lang": "es",
"value": "Langflow hasta la versi\u00f3n 0.6.19 permite la ejecuci\u00f3n remota de c\u00f3digo si los usuarios que no son de confianza pueden acceder al endpoint \"POST /api/v1/custom_component\" y proporcionar un script de Python."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:langflow:langflow:*:*:*:*:*:*:*:*",
"versionEndIncluding": "0.6.19",
"matchCriteriaId": "32795F99-77E1-46F4-ABBF-53A7616F4777"
}
]
}
]
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/langflow-ai/langflow/issues/1973",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking"
]
}
]
}

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2024-37036",
"sourceIdentifier": "cybersecurity@se.com",
"published": "2024-06-12T17:15:50.637",
"lastModified": "2024-06-12T17:15:50.637",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "CWE-787: Out-of-bounds Write vulnerability exists that could result in an authentication bypass\nwhen sending a malformed POST request and particular configuration parameters are set."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "cybersecurity@se.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "cybersecurity@se.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-787"
}
]
}
],
"references": [
{
"url": "https://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2024-163-05&p_enDocType=Security+and+Safety+Notice&p_File_Name=SEVD-2024-163-05.pdf",
"source": "cybersecurity@se.com"
}
]
}

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2024-37037",
"sourceIdentifier": "cybersecurity@se.com",
"published": "2024-06-12T17:15:50.853",
"lastModified": "2024-06-12T17:15:50.853",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "CWE-22: Improper Limitation of a Pathname to a Restricted Directory (\u2018Path\nTraversal\u2019) vulnerability exists that could allow an authenticated user with access to the device\u2019s\nweb interface to corrupt files and impact device functionality when sending a crafted HTTP\nrequest."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "cybersecurity@se.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.1,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.2
}
]
},
"weaknesses": [
{
"source": "cybersecurity@se.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-22"
}
]
}
],
"references": [
{
"url": "https://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2024-163-05&p_enDocType=Security+and+Safety+Notice&p_File_Name=SEVD-2024-163-05.pdf",
"source": "cybersecurity@se.com"
}
]
}

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2024-37038",
"sourceIdentifier": "cybersecurity@se.com",
"published": "2024-06-12T17:15:51.080",
"lastModified": "2024-06-12T17:15:51.080",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "CWE-276: Incorrect Default Permissions vulnerability exists that could allow an authenticated\nuser with access to the device\u2019s web interface to perform unauthorized file and firmware\nuploads when crafting custom web requests."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "cybersecurity@se.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.6,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "cybersecurity@se.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-276"
}
]
}
],
"references": [
{
"url": "https://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2024-163-05&p_enDocType=Security+and+Safety+Notice&p_File_Name=SEVD-2024-163-05.pdf",
"source": "cybersecurity@se.com"
}
]
}

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2024-37039",
"sourceIdentifier": "cybersecurity@se.com",
"published": "2024-06-12T17:15:51.313",
"lastModified": "2024-06-12T17:15:51.313",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "CWE-252: Unchecked Return Value vulnerability exists that could cause denial of service of the\ndevice when an attacker sends a specially crafted HTTP request."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "cybersecurity@se.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 5.9,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.2,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "cybersecurity@se.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-252"
}
]
}
],
"references": [
{
"url": "https://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2024-163-05&p_enDocType=Security+and+Safety+Notice&p_File_Name=SEVD-2024-163-05.pdf",
"source": "cybersecurity@se.com"
}
]
}

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2024-37040",
"sourceIdentifier": "cybersecurity@se.com",
"published": "2024-06-12T17:15:51.540",
"lastModified": "2024-06-12T17:15:51.540",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "CWE-120: Buffer Copy without Checking Size of Input (\u2018Classic Buffer Overflow\u2019) vulnerability\nexists that could allow a user with access to the device\u2019s web interface to cause a fault on the\ndevice when sending a malformed HTTP request."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "cybersecurity@se.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "LOW",
"baseScore": 5.4,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 2.5
}
]
},
"weaknesses": [
{
"source": "cybersecurity@se.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-120"
}
]
}
],
"references": [
{
"url": "https://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2024-163-05&p_enDocType=Security+and+Safety+Notice&p_File_Name=SEVD-2024-163-05.pdf",
"source": "cybersecurity@se.com"
}
]
}

View File

@ -2,16 +2,40 @@
"id": "CVE-2024-37051",
"sourceIdentifier": "cve@jetbrains.com",
"published": "2024-06-10T16:15:16.713",
"lastModified": "2024-06-10T18:06:22.600",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-06-12T17:49:04.017",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "GitHub access token could be exposed to third-party sites in JetBrains IDEs after version 2023.1 and less than: IntelliJ IDEA 2023.1.7, 2023.2.7, 2023.3.7, 2024.1.3, 2024.2 EAP3; Aqua 2024.1.2; CLion 2023.1.7, 2023.2.4, 2023.3.5, 2024.1.3, 2024.2 EAP2; DataGrip 2023.1.3, 2023.2.4, 2023.3.5, 2024.1.4; DataSpell 2023.1.6, 2023.2.7, 2023.3.6, 2024.1.2, 2024.2 EAP1; GoLand 2023.1.6, 2023.2.7, 2023.3.7, 2024.1.3, 2024.2 EAP3; MPS 2023.2.1, 2023.3.1, 2024.1 EAP2; PhpStorm 2023.1.6, 2023.2.6, 2023.3.7, 2024.1.3, 2024.2 EAP3; PyCharm 2023.1.6, 2023.2.7, 2023.3.6, 2024.1.3, 2024.2 EAP2; Rider 2023.1.7, 2023.2.5, 2023.3.6, 2024.1.3; RubyMine 2023.1.7, 2023.2.7, 2023.3.7, 2024.1.3, 2024.2 EAP4; RustRover 2024.1.1; WebStorm 2023.1.6, 2023.2.7, 2023.3.7, 2024.1.4"
},
{
"lang": "es",
"value": "El token de acceso de GitHub podr\u00eda estar expuesto a sitios de terceros en los IDE de JetBrains posteriores a la versi\u00f3n 2023.1 y anteriores a: IntelliJ IDEA 2023.1.7, 2023.2.7, 2023.3.7, 2024.1.3, 2024.2 EAP3; Aqua 2024.1.2; CLion 2023.1.7, 2023.2.4, 2023.3.5, 2024.1.3, 2024.2 EAP2; DataGrip 2023.1.3, 2023.2.4, 2023.3.5, 2024.1.4; DataSpell 2023.1.6, 2023.2.7, 2023.3.6, 2024.1.2, 2024.2 EAP1; GoLand 2023.1.6, 2023.2.7, 2023.3.7, 2024.1.3, 2024.2 EAP3; MPS 2023.2.1, 2023.3.1, 2024.1 EAP2; PhpStorm 2023.1.6, 2023.2.6, 2023.3.7, 2024.1.3, 2024.2 EAP3; PyCharm 2023.1.6, 2023.2.7, 2023.3.6, 2024.1.3, 2024.2 EAP2; Rider 2023.1.7, 2023.2.5, 2023.3.6, 2024.1.3; RubyMine 2023.1.7, 2023.2.7, 2023.3.7, 2024.1.3, 2024.2 EAP4; RustRover 2024.1.1; WebStorm 2023.1.6, 2023.2.7, 2023.3.7, 2024.1.4 "
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
},
{
"source": "cve@jetbrains.com",
"type": "Secondary",
@ -35,6 +59,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-522"
}
]
},
{
"source": "cve@jetbrains.com",
"type": "Secondary",
@ -46,10 +80,319 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:jetbrains:aqua:*:*:*:*:*:*:*:*",
"versionEndExcluding": "2024.1.2",
"matchCriteriaId": "20608E8B-5B89-41AC-BDF9-1B78BA4CDE62"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:jetbrains:clion:*:*:*:*:*:*:*:*",
"versionEndExcluding": "2023.1.7",
"matchCriteriaId": "5FC5C849-5663-4040-A967-D82B67588F15"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:jetbrains:clion:*:*:*:*:*:*:*:*",
"versionStartIncluding": "2023.2.0",
"versionEndExcluding": "2023.2.4",
"matchCriteriaId": "394A2D3B-C1D5-4942-A6B3-326DA6E4586B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:jetbrains:clion:*:*:*:*:*:*:*:*",
"versionStartIncluding": "2023.3.0",
"versionEndExcluding": "2023.3.5",
"matchCriteriaId": "AB121B1D-34B9-4C08-8652-4791E7B92C20"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:jetbrains:clion:*:*:*:*:*:*:*:*",
"versionStartIncluding": "2024.1.0",
"versionEndExcluding": "2024.1.3",
"matchCriteriaId": "177F5831-420A-4EC7-8520-79BEA7DC91A1"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:jetbrains:datagrip:*:*:*:*:*:*:*:*",
"versionStartIncluding": "2023.1.0",
"versionEndExcluding": "2023.1.3",
"matchCriteriaId": "7F42B34B-DD62-4076-B965-D784F28361F1"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:jetbrains:datagrip:*:*:*:*:*:*:*:*",
"versionStartIncluding": "2023.2.0",
"versionEndExcluding": "2023.2.4",
"matchCriteriaId": "8371359A-BCB7-40E6-BE71-16E107288E49"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:jetbrains:datagrip:*:*:*:*:*:*:*:*",
"versionStartIncluding": "2023.3.0",
"versionEndExcluding": "2023.3.5",
"matchCriteriaId": "7B2E54A2-FCAF-451D-87D2-70F9D4DC5C5F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:jetbrains:datagrip:*:*:*:*:*:*:*:*",
"versionStartIncluding": "2024.1.0",
"versionEndExcluding": "2024.1.4",
"matchCriteriaId": "198ED5D0-C88D-4AFA-9E15-9934C66650F6"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:jetbrains:dataspell:*:*:*:*:*:*:*:*",
"versionEndExcluding": "2023.1.6",
"matchCriteriaId": "FD714D72-765A-4C2B-A1EA-ED79681DF0A1"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:jetbrains:dataspell:*:*:*:*:*:*:*:*",
"versionStartIncluding": "2023.2.0",
"versionEndExcluding": "2023.2.7",
"matchCriteriaId": "04D60572-17BB-4F5C-96E2-41482F0312DA"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:jetbrains:dataspell:*:*:*:*:*:*:*:*",
"versionStartIncluding": "2023.3.0",
"versionEndExcluding": "2023.3.6",
"matchCriteriaId": "249CCE69-467E-4181-B114-4BE2566CFAC4"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:jetbrains:dataspell:*:*:*:*:*:*:*:*",
"versionStartIncluding": "2024.1.0",
"versionEndExcluding": "2024.1.2",
"matchCriteriaId": "2523C4F3-39A5-4FCA-90CA-3B121460733B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:jetbrains:goland:*:*:*:*:*:*:*:*",
"versionEndExcluding": "2023.1.6",
"matchCriteriaId": "FF8C3F6C-4CAD-4AFC-9625-7CDD5AB2472E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:jetbrains:goland:*:*:*:*:*:*:*:*",
"versionStartIncluding": "2023.2.0",
"versionEndExcluding": "2023.2.7",
"matchCriteriaId": "C7FA39DB-F6A1-4213-A0BF-37A1FFC56CF2"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:jetbrains:goland:*:*:*:*:*:*:*:*",
"versionStartIncluding": "2023.3.0",
"versionEndExcluding": "2023.3.7",
"matchCriteriaId": "91F7AE04-C3B2-4700-89C2-64FFD59C313B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:jetbrains:goland:*:*:*:*:*:*:*:*",
"versionStartIncluding": "2024.1.0",
"versionEndExcluding": "2024.1.3",
"matchCriteriaId": "EB43612E-FD6C-4220-8B11-336B4F2AF1ED"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:jetbrains:intellij_idea:*:*:*:*:*:*:*:*",
"versionEndExcluding": "2023.1.7",
"matchCriteriaId": "3B29A0AC-82A9-4E3B-A425-CE60024A0B2B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:jetbrains:intellij_idea:*:*:*:*:*:*:*:*",
"versionStartIncluding": "2023.2.0",
"versionEndExcluding": "2023.2.7",
"matchCriteriaId": "3284FF4C-73B4-41B8-8F68-AF8DD234DDB6"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:jetbrains:intellij_idea:*:*:*:*:*:*:*:*",
"versionStartIncluding": "2023.3.0",
"versionEndExcluding": "2023.3.7",
"matchCriteriaId": "39D4B44F-9182-437D-8E69-FDE818F7921B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:jetbrains:intellij_idea:*:*:*:*:*:*:*:*",
"versionStartIncluding": "2024.1.0",
"versionEndExcluding": "2024.1.3",
"matchCriteriaId": "BBF21B58-29E9-4446-A27A-BB12C7C311E9"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:jetbrains:mps:*:*:*:*:*:*:*:*",
"versionEndExcluding": "2023.2.1",
"matchCriteriaId": "B284C2E0-4CE1-49BA-9AEF-8B0B5D6CB33C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:jetbrains:mps:2023.3.0:*:*:*:*:*:*:*",
"matchCriteriaId": "1342D0F0-35E1-42B6-8D0B-95D2C6E5E348"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:jetbrains:phpstorm:*:*:*:*:*:*:*:*",
"versionEndExcluding": "2023.1.6",
"matchCriteriaId": "1FC207EA-07BE-403B-B759-900F3EE90272"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:jetbrains:phpstorm:*:*:*:*:*:*:*:*",
"versionStartIncluding": "2023.2.0",
"versionEndExcluding": "2023.2.6",
"matchCriteriaId": "71DF05BF-A5E6-4BCF-B806-BD4E73D4D903"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:jetbrains:phpstorm:*:*:*:*:*:*:*:*",
"versionStartIncluding": "2023.3.0",
"versionEndExcluding": "2023.3.7",
"matchCriteriaId": "61A47B15-DA71-48AE-8AA0-B9BA68F20AFC"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:jetbrains:phpstorm:*:*:*:*:*:*:*:*",
"versionStartIncluding": "2024.1.0",
"versionEndExcluding": "2024.1.3",
"matchCriteriaId": "07D8FF11-75BC-4802-8414-7A132D929040"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:jetbrains:pycharm:*:*:*:*:*:*:*:*",
"versionEndExcluding": "2023.1.6",
"matchCriteriaId": "21BB4064-431B-4D86-9C48-D2AC47E37226"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:jetbrains:pycharm:*:*:*:*:*:*:*:*",
"versionStartIncluding": "2023.2.0",
"versionEndExcluding": "2023.2.7",
"matchCriteriaId": "FD2CF5D2-0BC4-43F2-BC49-CB3F3641B9E1"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:jetbrains:pycharm:*:*:*:*:*:*:*:*",
"versionStartIncluding": "2023.3.0",
"versionEndExcluding": "2023.3.6",
"matchCriteriaId": "394B00FC-FBA7-40FE-8082-28C662692ECB"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:jetbrains:pycharm:*:*:*:*:*:*:*:*",
"versionStartIncluding": "2024.1.0",
"versionEndExcluding": "2024.1.3",
"matchCriteriaId": "C55365AC-1F86-4EDF-BB75-0AD048E6BE21"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:jetbrains:rider:*:*:*:*:*:*:*:*",
"versionEndExcluding": "2023.1.7",
"matchCriteriaId": "4B5658AA-5223-4E63-BB1F-9584C614CBE6"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:jetbrains:rider:*:*:*:*:*:*:*:*",
"versionStartIncluding": "2023.2.0",
"versionEndExcluding": "2023.2.5",
"matchCriteriaId": "6DC318D9-7713-42E1-BD17-B3A569F356EF"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:jetbrains:rider:*:*:*:*:*:*:*:*",
"versionStartIncluding": "2023.3.0",
"versionEndExcluding": "2023.3.6",
"matchCriteriaId": "D5525193-53E0-42B5-87CD-DDABBFBCBD99"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:jetbrains:rider:*:*:*:*:*:*:*:*",
"versionStartIncluding": "2024.1.0",
"versionEndExcluding": "2024.1.3",
"matchCriteriaId": "E62FF44C-C639-4751-A512-9A88E7D16982"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:jetbrains:rubymine:*:*:*:*:*:*:*:*",
"versionEndExcluding": "2023.1.7",
"matchCriteriaId": "C88E44A7-4F55-47DD-8B45-33FA50FF4D92"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:jetbrains:rubymine:*:*:*:*:*:*:*:*",
"versionStartIncluding": "2023.2.0",
"versionEndExcluding": "2023.2.7",
"matchCriteriaId": "017D5DBB-AD63-4B95-86BD-A1425EB4D881"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:jetbrains:rubymine:*:*:*:*:*:*:*:*",
"versionStartIncluding": "2023.3.0",
"versionEndExcluding": "2023.3.7",
"matchCriteriaId": "091F7E8D-18F9-47BA-9DC9-96245DF10789"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:jetbrains:rubymine:*:*:*:*:*:*:*:*",
"versionStartIncluding": "2024.1.0",
"versionEndExcluding": "2024.1.3",
"matchCriteriaId": "34DC255F-9ECC-4B41-A8BA-0F70792823A3"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:jetbrains:rustrover:*:*:*:*:*:*:*:*",
"versionEndExcluding": "2024.1.1",
"matchCriteriaId": "0EA65266-C23F-403C-AD23-59096B41AD58"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:jetbrains:webstorm:*:*:*:*:*:*:*:*",
"versionEndExcluding": "2023.1.6",
"matchCriteriaId": "A6367B0C-9050-4BDC-9D26-80C251FC3270"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:jetbrains:webstorm:*:*:*:*:*:*:*:*",
"versionStartIncluding": "2023.2.0",
"versionEndExcluding": "2023.2.7",
"matchCriteriaId": "FA57E3D7-80D1-420F-9FA7-2D503626027F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:jetbrains:webstorm:*:*:*:*:*:*:*:*",
"versionStartIncluding": "2023.3.0",
"versionEndExcluding": "2023.3.7",
"matchCriteriaId": "D60460C9-6913-441E-99BE-19EB4459836F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:jetbrains:webstorm:*:*:*:*:*:*:*:*",
"versionStartIncluding": "2024.1.0",
"versionEndExcluding": "2024.1.4",
"matchCriteriaId": "1720820F-2FB4-4AAC-A139-CF7C493A751A"
}
]
}
]
}
],
"references": [
{
"url": "https://www.jetbrains.com/privacy-security/issues-fixed/",
"source": "cve@jetbrains.com"
"source": "cve@jetbrains.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -0,0 +1,63 @@
{
"id": "CVE-2024-37300",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-06-12T16:15:12.097",
"lastModified": "2024-06-12T16:15:12.097",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "OAuthenticator is software that allows OAuth2 identity providers to be plugged in and used with JupyterHub. JupyterHub < 5.0, when used with `GlobusOAuthenticator`, could be configured to allow all users from a particular institution only. This worked fine prior to JupyterHub 5.0, because `allow_all` did not take precedence over `identity_provider`. Since JupyterHub 5.0, `allow_all` does take precedence over `identity_provider`. On a hub with the same config, now all users will be allowed to login, regardless of `identity_provider`. `identity_provider` will basically be ignored. This is a documented change in JupyterHub 5.0, but is likely to catch many users by surprise. OAuthenticator 16.3.1 fixes the issue with JupyterHub 5.0, and does not affect previous versions. As a workaround, do not upgrade to JupyterHub 5.0 when using `GlobusOAuthenticator` in the prior configuration."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "NONE",
"baseScore": 8.1,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.2
}
]
},
"weaknesses": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-863"
}
]
}
],
"references": [
{
"url": "https://github.com/jupyterhub/oauthenticator/commit/d1aea05fa89f2beae15ab0fa0b0d071030f79654",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/jupyterhub/oauthenticator/security/advisories/GHSA-gprj-3p75-f996",
"source": "security-advisories@github.com"
},
{
"url": "https://jupyterhub.readthedocs.io/en/stable/howto/upgrading-v5.html#authenticator-allow-all-and-allow-existing-users",
"source": "security-advisories@github.com"
}
]
}

View File

@ -2,27 +2,94 @@
"id": "CVE-2024-37393",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-06-10T20:15:15.293",
"lastModified": "2024-06-10T20:54:18.443",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-06-12T17:56:23.390",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "Multiple LDAP injections vulnerabilities exist in SecurEnvoy MFA before 9.4.514 due to improper validation of user-supplied input. An unauthenticated remote attacker could exfiltrate data from Active Directory through blind LDAP injection attacks against the DESKTOP service exposed on the /secserver HTTP endpoint. This may include ms-Mcs-AdmPwd, which has a cleartext password for the Local Administrator Password Solution (LAPS) feature."
},
{
"lang": "es",
"value": "Existen m\u00faltiples vulnerabilidades de inyecciones LDAP en SecurEnvoy MFA antes de la versi\u00f3n 9.4.514 debido a una validaci\u00f3n incorrecta de la entrada proporcionada por el usuario. Un atacante remoto no autenticado podr\u00eda exfiltrar datos de Active Directory mediante ataques de inyecci\u00f3n LDAP ciegos contra el servicio DESKTOP expuesto en el endpoint HTTP /secserver. Esto puede incluir ms-Mcs-AdmPwd, que tiene una contrase\u00f1a de texto plano para la funci\u00f3n Soluci\u00f3n de contrase\u00f1a de administrador local (LAPS)."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-319"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:securenvoy:multi-factor_authentication_solutions:*:*:*:*:*:*:*:*",
"versionEndExcluding": "9.4.514",
"matchCriteriaId": "D30EF233-2538-42B4-AF36-5667C8C38755"
}
]
}
]
}
],
"metrics": {},
"references": [
{
"url": "https://learn.microsoft.com/en-us/openspecs/windows_protocols/ms-ada2/ad2ce8fa-42a0-4371-ad18-5d1d1c488b22",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Exploit"
]
},
{
"url": "https://securenvoy.com/support/",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Product"
]
},
{
"url": "https://www.optistream.io/blogs/tech/securenvoy-cve-2024-37393",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
]
}
]
}

View File

@ -2,27 +2,113 @@
"id": "CVE-2024-37569",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-06-09T20:15:09.377",
"lastModified": "2024-06-10T02:52:08.267",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-06-12T16:32:56.203",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "An issue was discovered on Mitel 6869i through 4.5.0.41 and 5.x through 5.0.0.1018 devices. A command injection vulnerability exists in the hostname parameter taken in by the provis.html endpoint. The provis.html endpoint performs no sanitization on the hostname parameter (sent by an authenticated user), which is subsequently written to disk. During boot, the hostname parameter is executed as part of a series of shell commands. Attackers can achieve remote code execution in the root context by placing shell metacharacters in the hostname parameter."
},
{
"lang": "es",
"value": "Se descubri\u00f3 un problema en dispositivos Mitel 6869i hasta 4.5.0.41 y 5.x hasta 5.0.0.1018. Existe una vulnerabilidad de inyecci\u00f3n de comando en el par\u00e1metro de nombre de host tomado por el endpoint provis.html. El endpoint provis.html no realiza ninguna sanitizaci\u00f3n en el par\u00e1metro de nombre de host (enviado por un usuario autenticado), que posteriormente se escribe en el disco. Durante el arranque, el par\u00e1metro de nombre de host se ejecuta como parte de una serie de comandos de shell. Los atacantes pueden lograr la ejecuci\u00f3n remota de c\u00f3digo en el contexto ra\u00edz colocando metacaracteres del shell en el par\u00e1metro de nombre de host."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-77"
}
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:mitel:6869i_sip_firmware:*:*:*:*:*:*:*:*",
"versionEndIncluding": "4.5.0.41",
"matchCriteriaId": "E8D691F3-B302-475B-9527-09D091318240"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:mitel:6869i_sip_firmware:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.0.0.0",
"versionEndIncluding": "5.0.0.1018",
"matchCriteriaId": "4D0EC3DA-18DD-48AC-803C-1EB9E8281F9D"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:mitel:6869i_sip:-:*:*:*:*:*:*:*",
"matchCriteriaId": "654554ED-253C-4928-92D0-92EADF5F4768"
}
]
}
]
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/kwburns/CVE/blob/main/Mitel/5.0.0.1018/code/exploit-provis.py",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Product"
]
},
{
"url": "https://github.com/kwburns/CVE/tree/main/Mitel/5.0.0.1018#authenticated-remote-command-execution-provis",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://www.youtube.com/watch?v=I9TQqfP5qzM",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Exploit"
]
}
]
}

View File

@ -2,23 +2,98 @@
"id": "CVE-2024-37570",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-06-09T20:15:09.460",
"lastModified": "2024-06-10T02:52:08.267",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-06-12T16:32:34.513",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "On Mitel 6869i 4.5.0.41 devices, the Manual Firmware Update (upgrade.html) page does not perform sanitization on the username and path parameters (sent by an authenticated user) before appending flags to the busybox ftpget command. This leads to $() command execution."
},
{
"lang": "es",
"value": "En dispositivos Mitel 6869i 4.5.0.41, la p\u00e1gina Actualizaci\u00f3n manual de firmware (upgrade.html) no realiza sanitizaci\u00f3n en los par\u00e1metros de nombre de usuario y ruta (enviados por un usuario autenticado) antes de agregar indicadores al comando ftpget de Busybox. Esto lleva a la ejecuci\u00f3n del comando $()."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-77"
}
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:mitel:6869i_sip_firmware:4.5.0.41:*:*:*:*:*:*:*",
"matchCriteriaId": "51590F94-5237-4121-A6F0-C8C25D55FBDD"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:mitel:6869i_sip:-:*:*:*:*:*:*:*",
"matchCriteriaId": "654554ED-253C-4928-92D0-92EADF5F4768"
}
]
}
]
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/kwburns/CVE/blob/main/Mitel/5.0.0.1018/code/exploit-firmware.py",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Product"
]
},
{
"url": "https://github.com/kwburns/CVE/tree/main/Mitel/5.0.0.1018#authenticated-remote-command-execution-firmware",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
]
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2024-37878",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-06-12T17:15:51.803",
"lastModified": "2024-06-12T17:15:51.803",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Cross Site Scripting vulnerability in TWCMS v.2.0.3 allows a remote attacker to execute arbitrary code via the /TWCMS-gh-pages/twcms/runtime/twcms_view/default,index.htm.php\" PHP directly echoes parameters input from external sources"
}
],
"metrics": {},
"references": [
{
"url": "https://gist.github.com/sylvieverykawaii/243f1756151bee027725c6961d8c1ba9",
"source": "cve@mitre.org"
}
]
}

View File

@ -2,35 +2,108 @@
"id": "CVE-2024-37880",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-06-10T02:15:47.160",
"lastModified": "2024-06-10T02:52:08.267",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-06-12T16:30:15.053",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "The Kyber reference implementation before 9b8d306, when compiled by LLVM Clang through 18.x with some common optimization options, has a timing side channel that allows attackers to recover an ML-KEM 512 secret key in minutes. This occurs because poly_frommsg in poly.c does not prevent Clang from emitting a vulnerable secret-dependent branch."
},
{
"lang": "es",
"value": "La implementaci\u00f3n de referencia de Kyber anterior a 9b8d306, cuando la compila LLVM Clang hasta 18.x con algunas opciones de optimizaci\u00f3n comunes, tiene un canal lateral de temporizaci\u00f3n que permite a los atacantes recuperar una clave secreta ML-KEM 512 en minutos. Esto ocurre porque poly_frommsg en poly.c no impide que Clang emita una rama vulnerable dependiente de un secreto."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-203"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:pq-crystals:kyber:*:*:*:*:*:*:*:*",
"versionEndExcluding": "2024-06-03",
"matchCriteriaId": "346EEBCC-A9CB-4394-BB8B-9E741FB4331F"
}
]
}
]
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/antoonpurnal/clangover",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Exploit"
]
},
{
"url": "https://github.com/pq-crystals/kyber/commit/9b8d30698a3e7449aeb34e62339d4176f11e3c6c",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Patch"
]
},
{
"url": "https://news.ycombinator.com/item?id=40577486",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Not Applicable"
]
},
{
"url": "https://pqshield.com/pqshield-plugs-timing-leaks-in-kyber-ml-kem-to-improve-pqc-implementation-maturity/",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://twitter.com/purnaltoon/status/1797644696568959476",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Exploit"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-3700",
"sourceIdentifier": "cvd@cert.pl",
"published": "2024-06-10T12:15:10.370",
"lastModified": "2024-06-10T12:40:41.360",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-06-12T17:51:52.710",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -14,8 +14,41 @@
"value": "El uso de una contrase\u00f1a codificada para la base de datos de los pacientes permite a un atacante recuperar datos confidenciales almacenados en la base de datos. La contrase\u00f1a es la misma en todas las instalaciones del software Simple Care. Este problema afecta a Estomed Sp. z o.o. Software z oo Simple Care en todas las versiones. El software ya no es compatible."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-798"
}
]
},
{
"source": "cvd@cert.pl",
"type": "Secondary",
@ -27,14 +60,37 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:estomed:simple_care:*:*:*:*:*:*:*:*",
"matchCriteriaId": "4A116B08-6E0A-444B-BB1C-2AC1D621C219"
}
]
}
]
}
],
"references": [
{
"url": "https://cert.pl/en/posts/2024/06/CVE-2024-1228/",
"source": "cvd@cert.pl"
"source": "cvd@cert.pl",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://cert.pl/posts/2024/06/CVE-2024-1228/",
"source": "cvd@cert.pl"
"source": "cvd@cert.pl",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-4744",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-06-10T08:15:51.970",
"lastModified": "2024-06-10T12:40:41.360",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-06-12T16:44:12.157",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -16,6 +16,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW",
"baseScore": 7.3,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.4
},
{
"source": "audit@patchstack.com",
"type": "Secondary",
@ -50,10 +70,31 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ipages_flipbook_project:ipages_flipbook:*:*:*:*:*:wordpress:*:*",
"versionEndExcluding": "1.5.2",
"matchCriteriaId": "42735126-1E56-46F8-92FB-98B01DEC68E5"
}
]
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/ipages-flipbook/wordpress-ipages-flipbook-plugin-1-5-1-broken-access-control-vulnerability-2?_s_id=cve",
"source": "audit@patchstack.com"
"source": "audit@patchstack.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-4745",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-06-10T08:15:52.210",
"lastModified": "2024-06-10T12:40:41.360",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-06-12T16:23:34.197",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -16,6 +16,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW",
"baseScore": 6.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 3.4
},
{
"source": "audit@patchstack.com",
"type": "Secondary",
@ -50,10 +70,31 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:seedprod:rafflepress:*:*:*:*:*:wordpress:*:*",
"versionEndExcluding": "1.12.5",
"matchCriteriaId": "2711EBCE-B093-4E16-9CF2-CB99798A998F"
}
]
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/rafflepress/wordpress-giveaways-and-contests-by-rafflepress-plugin-1-12-4-broken-access-control-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
"source": "audit@patchstack.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-4746",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-06-10T08:15:52.430",
"lastModified": "2024-06-10T12:40:41.360",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-06-12T16:17:42.223",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -16,6 +16,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW",
"baseScore": 6.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 3.4
},
{
"source": "audit@patchstack.com",
"type": "Secondary",
@ -50,10 +70,31 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:netgsm:netgsm:*:*:*:*:*:wordpress:*:*",
"versionEndIncluding": "2.9.16",
"matchCriteriaId": "CF0256E4-E507-49B7-8AFF-8680DF0E7E8F"
}
]
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/netgsm/wordpress-netgsm-plugin-2-9-16-broken-access-control-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
"source": "audit@patchstack.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,15 +2,41 @@
"id": "CVE-2024-5389",
"sourceIdentifier": "security@huntr.dev",
"published": "2024-06-09T23:15:50.490",
"lastModified": "2024-06-10T02:52:08.267",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-06-12T16:31:30.577",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "In lunary-ai/lunary version 1.2.13, an insufficient granularity of access control vulnerability allows users to create, update, get, and delete prompt variations for datasets not owned by their organization. This issue arises due to the application not properly validating the ownership of dataset prompts and their variations against the organization or project of the requesting user. As a result, unauthorized modifications to dataset prompts can occur, leading to altered or removed dataset prompts without proper authorization. This vulnerability impacts the integrity and consistency of dataset information, potentially affecting the results of experiments."
},
{
"lang": "es",
"value": "En lunary-ai/lunary versi\u00f3n 1.2.13, una granularidad insuficiente de la vulnerabilidad de control de acceso permite a los usuarios crear, actualizar, obtener y eliminar variaciones r\u00e1pidas para conjuntos de datos que no pertenecen a su organizaci\u00f3n. Este problema surge debido a que la aplicaci\u00f3n no valida adecuadamente la propiedad de las solicitudes del conjunto de datos y sus variaciones con respecto a la organizaci\u00f3n o proyecto del usuario solicitante. Como resultado, pueden ocurrir modificaciones no autorizadas en las indicaciones del conjunto de datos, lo que lleva a modificaciones o eliminaci\u00f3n de las indicaciones del conjunto de datos sin la autorizaci\u00f3n adecuada. Esta vulnerabilidad afecta la integridad y coherencia de la informaci\u00f3n del conjunto de datos, lo que podr\u00eda afectar los resultados de los experimentos."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "NONE",
"baseScore": 8.1,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.2
}
],
"cvssMetricV30": [
{
"source": "security@huntr.dev",
@ -36,8 +62,18 @@
},
"weaknesses": [
{
"source": "security@huntr.dev",
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-Other"
}
]
},
{
"source": "security@huntr.dev",
"type": "Secondary",
"description": [
{
"lang": "en",
@ -46,10 +82,31 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:lunary:lunary:1.2.13:*:*:*:*:*:*:*",
"matchCriteriaId": "7223CE59-4E84-4008-9E35-D2B9D25ADD1E"
}
]
}
]
}
],
"references": [
{
"url": "https://huntr.com/bounties/3ca5309f-5615-4d5b-8043-968af220d7a2",
"source": "security@huntr.dev"
"source": "security@huntr.dev",
"tags": [
"Exploit",
"Third Party Advisory"
]
}
]
}

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2024-5557",
"sourceIdentifier": "cybersecurity@se.com",
"published": "2024-06-12T17:15:51.943",
"lastModified": "2024-06-12T17:15:51.943",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "CWE-532: Insertion of Sensitive Information into Log File vulnerability exists that could cause\nexposure of SNMP credentials when an attacker has access to the controller logs."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "cybersecurity@se.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N",
"attackVector": "ADJACENT_NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 0.9,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "cybersecurity@se.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-532"
}
]
}
],
"references": [
{
"url": "https://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2024-163-04&p_enDocType=Security+and+Safety+Notice&p_File_Name=SEVD-2024-163-04.pdf",
"source": "cybersecurity@se.com"
}
]
}

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2024-5558",
"sourceIdentifier": "cybersecurity@se.com",
"published": "2024-06-12T17:15:52.160",
"lastModified": "2024-06-12T17:15:52.160",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "CWE-367: Time-of-check Time-of-use (TOCTOU) Race Condition vulnerability exists that could\ncause escalation of privileges when an attacker abuses a limited admin account."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "cybersecurity@se.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "HIGH",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 6.4,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 0.5,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "cybersecurity@se.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-367"
}
]
}
],
"references": [
{
"url": "https://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2024-163-04&p_enDocType=Security+and+Safety+Notice&p_File_Name=SEVD-2024-163-04.pdf",
"source": "cybersecurity@se.com"
}
]
}

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2024-5560",
"sourceIdentifier": "cybersecurity@se.com",
"published": "2024-06-12T17:15:52.357",
"lastModified": "2024-06-12T17:15:52.357",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "CWE-125: Out-of-bounds Read vulnerability exists that could cause denial of service of the\ndevice\u2019s web interface when an attacker sends a specially crafted HTTP request."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "cybersecurity@se.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "LOW",
"baseScore": 5.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 3.9,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "cybersecurity@se.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-125"
}
]
}
],
"references": [
{
"url": "https://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2024-163-05&p_enDocType=Security+and+Safety+Notice&p_File_Name=SEVD-2024-163-05.pdf",
"source": "cybersecurity@se.com"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-5585",
"sourceIdentifier": "security@php.net",
"published": "2024-06-09T19:15:52.597",
"lastModified": "2024-06-12T02:15:10.907",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-06-12T17:15:04.083",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -16,6 +16,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
},
{
"source": "security@php.net",
"type": "Secondary",
@ -39,6 +59,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-116"
}
]
},
{
"source": "security@php.net",
"type": "Secondary",
@ -54,18 +84,77 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:php:php:*:*:*:*:*:*:*:*",
"versionStartIncluding": "8.1.0",
"versionEndExcluding": "8.1.29",
"matchCriteriaId": "7DC2EEF8-834B-42A1-8DA3-0C2CF22A7070"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:php:php:*:*:*:*:*:*:*:*",
"versionStartIncluding": "8.2.0",
"versionEndExcluding": "8.2.20",
"matchCriteriaId": "A39988FF-D854-4277-9D66-6911AF371DD3"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:php:php:*:*:*:*:*:*:*:*",
"versionStartIncluding": "8.3.0",
"versionEndExcluding": "8.3.8",
"matchCriteriaId": "F579FFC1-4F81-4755-B14B-3AA73AC9FF7A"
}
]
}
]
},
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:fedoraproject:fedora:40:*:*:*:*:*:*:*",
"matchCriteriaId": "CA277A6C-83EC-4536-9125-97B84C4FAF59"
}
]
}
]
}
],
"references": [
{
"url": "http://www.openwall.com/lists/oss-security/2024/06/07/1",
"source": "security@php.net"
"source": "security@php.net",
"tags": [
"Mailing List",
"Third Party Advisory"
]
},
{
"url": "https://github.com/php/php-src/security/advisories/GHSA-9fcc-425m-g385",
"source": "security@php.net"
"source": "security@php.net",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PKGTQUOA2NTZ3RXN22CSAUJPIRUYRB4B/",
"source": "security@php.net"
"source": "security@php.net",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2024-5759",
"sourceIdentifier": "vulnreport@tenable.com",
"published": "2024-06-12T16:15:12.550",
"lastModified": "2024-06-12T16:15:12.550",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "An improper privilege management vulnerability exists in Tenable Security Center where an authenticated, remote attacker could view unauthorized objects and launch scans without having the required privileges"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "vulnreport@tenable.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "LOW",
"baseScore": 5.4,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 2.5
}
]
},
"weaknesses": [
{
"source": "vulnreport@tenable.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-269"
}
]
}
],
"references": [
{
"url": "https://www.tenable.com/security/tns-2024-10",
"source": "vulnreport@tenable.com"
}
]
}

View File

@ -0,0 +1,92 @@
{
"id": "CVE-2024-5896",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-06-12T16:15:12.813",
"lastModified": "2024-06-12T16:15:12.813",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability, which was classified as critical, was found in SourceCodester Employee and Visitor Gate Pass Logging System 1.0. Affected is the function save_users of the file /classes/Users.php?f=save. The manipulation of the argument id leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-268140."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW",
"baseScore": 7.3,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.4
}
],
"cvssMetricV2": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5
},
"baseSeverity": "HIGH",
"exploitabilityScore": 10.0,
"impactScore": 6.4,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"references": [
{
"url": "https://github.com/Hefei-Coffee/cve/blob/main/sql12.md",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?ctiid.268140",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?id.268140",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?submit.354925",
"source": "cna@vuldb.com"
}
]
}

View File

@ -0,0 +1,92 @@
{
"id": "CVE-2024-5897",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-06-12T16:15:13.100",
"lastModified": "2024-06-12T16:15:13.100",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability has been found in SourceCodester Employee and Visitor Gate Pass Logging System 1.0 and classified as problematic. Affected by this vulnerability is an unknown functionality of the file /classes/Master.php?f=log_visitor. The manipulation of the argument name leads to cross site scripting. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-268141 was assigned to this vulnerability."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 1.4
}
],
"cvssMetricV2": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N",
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"availabilityImpact": "NONE",
"baseScore": 5.0
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 10.0,
"impactScore": 2.9,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://github.com/Hefei-Coffee/cve/blob/main/xss.md",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?ctiid.268141",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?id.268141",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?submit.354923",
"source": "cna@vuldb.com"
}
]
}

View File

@ -0,0 +1,92 @@
{
"id": "CVE-2024-5898",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-06-12T17:15:52.577",
"lastModified": "2024-06-12T17:15:52.577",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was found in itsourcecode Payroll Management System 1.0 and classified as critical. Affected by this issue is some unknown functionality of the file print_payroll.php. The manipulation of the argument id leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB-268142 is the identifier assigned to this vulnerability."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW",
"baseScore": 6.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 3.4
}
],
"cvssMetricV2": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "SINGLE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL",
"baseScore": 6.5
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 8.0,
"impactScore": 6.4,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"references": [
{
"url": "https://github.com/guiyxli/cve/issues/1",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?ctiid.268142",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?id.268142",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?submit.354926",
"source": "cna@vuldb.com"
}
]
}

View File

@ -0,0 +1,32 @@
{
"id": "CVE-2024-5905",
"sourceIdentifier": "psirt@paloaltonetworks.com",
"published": "2024-06-12T17:15:52.847",
"lastModified": "2024-06-12T17:15:52.847",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "A problem with a protection mechanism in the Palo Alto Networks Cortex XDR agent on Windows devices allows a local low privileged Windows user to disrupt some functionality of the agent. However, they are not able to disrupt Cortex XDR agent protection mechanisms using this vulnerability."
}
],
"metrics": {},
"weaknesses": [
{
"source": "psirt@paloaltonetworks.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-346"
}
]
}
],
"references": [
{
"url": "https://security.paloaltonetworks.com/CVE-2024-5905",
"source": "psirt@paloaltonetworks.com"
}
]
}

View File

@ -0,0 +1,32 @@
{
"id": "CVE-2024-5906",
"sourceIdentifier": "psirt@paloaltonetworks.com",
"published": "2024-06-12T17:15:53.000",
"lastModified": "2024-06-12T17:15:53.000",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "A cross-site scripting (XSS) vulnerability in Palo Alto Networks Prisma Cloud Compute software enables a malicious administrator with add/edit permissions for identity providers to store a JavaScript payload using the web interface on Prisma Cloud Compute. This enables a malicious administrator to perform actions in the context of another user's browser when accessed by that other user."
}
],
"metrics": {},
"weaknesses": [
{
"source": "psirt@paloaltonetworks.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://security.paloaltonetworks.com/CVE-2024-5906",
"source": "psirt@paloaltonetworks.com"
}
]
}

View File

@ -0,0 +1,32 @@
{
"id": "CVE-2024-5907",
"sourceIdentifier": "psirt@paloaltonetworks.com",
"published": "2024-06-12T17:15:53.127",
"lastModified": "2024-06-12T17:15:53.127",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "A privilege escalation (PE) vulnerability in the Palo Alto Networks Cortex XDR agent on Windows devices enables a local user to execute programs with elevated privileges. However, execution does require the local user to successfully exploit a race condition, which makes this vulnerability difficult to exploit."
}
],
"metrics": {},
"weaknesses": [
{
"source": "psirt@paloaltonetworks.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-269"
}
]
}
],
"references": [
{
"url": "https://security.paloaltonetworks.com/CVE-2024-5907",
"source": "psirt@paloaltonetworks.com"
}
]
}

View File

@ -0,0 +1,32 @@
{
"id": "CVE-2024-5908",
"sourceIdentifier": "psirt@paloaltonetworks.com",
"published": "2024-06-12T17:15:53.253",
"lastModified": "2024-06-12T17:15:53.253",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "A problem with the Palo Alto Networks GlobalProtect app can result in exposure of encrypted user credentials, used for connecting to GlobalProtect, in application logs. Normally, these application logs are only viewable by local users and are included when generating logs for troubleshooting purposes. This means that these encrypted credentials are exposed to recipients of the application logs."
}
],
"metrics": {},
"weaknesses": [
{
"source": "psirt@paloaltonetworks.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-532"
}
]
}
],
"references": [
{
"url": "https://security.paloaltonetworks.com/CVE-2024-5908",
"source": "psirt@paloaltonetworks.com"
}
]
}

View File

@ -0,0 +1,32 @@
{
"id": "CVE-2024-5909",
"sourceIdentifier": "psirt@paloaltonetworks.com",
"published": "2024-06-12T17:15:53.370",
"lastModified": "2024-06-12T17:15:53.370",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "A problem with a protection mechanism in the Palo Alto Networks Cortex XDR agent on Windows devices allows a low privileged local Windows user to disable the agent. This issue may be leveraged by malware to disable the Cortex XDR agent and then to perform malicious activity."
}
],
"metrics": {},
"weaknesses": [
{
"source": "psirt@paloaltonetworks.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-269"
}
]
}
],
"references": [
{
"url": "https://security.paloaltonetworks.com/CVE-2024-5909",
"source": "psirt@paloaltonetworks.com"
}
]
}

View File

@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update
```plain
2024-06-12T16:00:19.217625+00:00
2024-06-12T18:00:19.039330+00:00
```
### Most recent CVE Modification Timestamp synchronized with NVD
```plain
2024-06-12T15:43:28.280000+00:00
2024-06-12T18:00:00.317000+00:00
```
### Last Data Feed Release
@ -33,50 +33,67 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
### Total Number of included CVEs
```plain
253665
253688
```
### CVEs added in the last Commit
Recently added CVEs: `21`
Recently added CVEs: `23`
- [CVE-2024-1576](CVE-2024/CVE-2024-15xx/CVE-2024-1576.json) (`2024-06-12T14:15:10.487`)
- [CVE-2024-1577](CVE-2024/CVE-2024-15xx/CVE-2024-1577.json) (`2024-06-12T14:15:10.683`)
- [CVE-2024-1659](CVE-2024/CVE-2024-16xx/CVE-2024-1659.json) (`2024-06-12T14:15:10.803`)
- [CVE-2024-2300](CVE-2024/CVE-2024-23xx/CVE-2024-2300.json) (`2024-06-12T15:15:51.097`)
- [CVE-2024-23445](CVE-2024/CVE-2024-234xx/CVE-2024-23445.json) (`2024-06-12T14:15:10.963`)
- [CVE-2024-28964](CVE-2024/CVE-2024-289xx/CVE-2024-28964.json) (`2024-06-12T15:15:50.647`)
- [CVE-2024-29181](CVE-2024/CVE-2024-291xx/CVE-2024-29181.json) (`2024-06-12T15:15:50.873`)
- [CVE-2024-31217](CVE-2024/CVE-2024-312xx/CVE-2024-31217.json) (`2024-06-12T15:15:51.170`)
- [CVE-2024-34065](CVE-2024/CVE-2024-340xx/CVE-2024-34065.json) (`2024-06-12T15:15:51.460`)
- [CVE-2024-36263](CVE-2024/CVE-2024-362xx/CVE-2024-36263.json) (`2024-06-12T14:15:11.740`)
- [CVE-2024-36264](CVE-2024/CVE-2024-362xx/CVE-2024-36264.json) (`2024-06-12T14:15:11.983`)
- [CVE-2024-36265](CVE-2024/CVE-2024-362xx/CVE-2024-36265.json) (`2024-06-12T15:15:52.247`)
- [CVE-2024-36691](CVE-2024/CVE-2024-366xx/CVE-2024-36691.json) (`2024-06-12T15:15:52.400`)
- [CVE-2024-36699](CVE-2024/CVE-2024-366xx/CVE-2024-36699.json) (`2024-06-12T14:15:12.100`)
- [CVE-2024-36840](CVE-2024/CVE-2024-368xx/CVE-2024-36840.json) (`2024-06-12T15:15:52.493`)
- [CVE-2024-37297](CVE-2024/CVE-2024-372xx/CVE-2024-37297.json) (`2024-06-12T15:15:52.677`)
- [CVE-2024-37304](CVE-2024/CVE-2024-373xx/CVE-2024-37304.json) (`2024-06-12T15:15:52.910`)
- [CVE-2024-5891](CVE-2024/CVE-2024-58xx/CVE-2024-5891.json) (`2024-06-12T14:15:12.460`)
- [CVE-2024-5893](CVE-2024/CVE-2024-58xx/CVE-2024-5893.json) (`2024-06-12T15:15:53.393`)
- [CVE-2024-5894](CVE-2024/CVE-2024-58xx/CVE-2024-5894.json) (`2024-06-12T15:15:53.693`)
- [CVE-2024-5895](CVE-2024/CVE-2024-58xx/CVE-2024-5895.json) (`2024-06-12T15:15:53.970`)
- [CVE-2024-1891](CVE-2024/CVE-2024-18xx/CVE-2024-1891.json) (`2024-06-12T16:15:10.887`)
- [CVE-2024-2230](CVE-2024/CVE-2024-22xx/CVE-2024-2230.json) (`2024-06-12T17:15:50.140`)
- [CVE-2024-22855](CVE-2024/CVE-2024-228xx/CVE-2024-22855.json) (`2024-06-12T17:15:49.913`)
- [CVE-2024-36761](CVE-2024/CVE-2024-367xx/CVE-2024-36761.json) (`2024-06-12T16:15:11.983`)
- [CVE-2024-37036](CVE-2024/CVE-2024-370xx/CVE-2024-37036.json) (`2024-06-12T17:15:50.637`)
- [CVE-2024-37037](CVE-2024/CVE-2024-370xx/CVE-2024-37037.json) (`2024-06-12T17:15:50.853`)
- [CVE-2024-37038](CVE-2024/CVE-2024-370xx/CVE-2024-37038.json) (`2024-06-12T17:15:51.080`)
- [CVE-2024-37039](CVE-2024/CVE-2024-370xx/CVE-2024-37039.json) (`2024-06-12T17:15:51.313`)
- [CVE-2024-37040](CVE-2024/CVE-2024-370xx/CVE-2024-37040.json) (`2024-06-12T17:15:51.540`)
- [CVE-2024-37300](CVE-2024/CVE-2024-373xx/CVE-2024-37300.json) (`2024-06-12T16:15:12.097`)
- [CVE-2024-37878](CVE-2024/CVE-2024-378xx/CVE-2024-37878.json) (`2024-06-12T17:15:51.803`)
- [CVE-2024-5557](CVE-2024/CVE-2024-55xx/CVE-2024-5557.json) (`2024-06-12T17:15:51.943`)
- [CVE-2024-5558](CVE-2024/CVE-2024-55xx/CVE-2024-5558.json) (`2024-06-12T17:15:52.160`)
- [CVE-2024-5560](CVE-2024/CVE-2024-55xx/CVE-2024-5560.json) (`2024-06-12T17:15:52.357`)
- [CVE-2024-5759](CVE-2024/CVE-2024-57xx/CVE-2024-5759.json) (`2024-06-12T16:15:12.550`)
- [CVE-2024-5896](CVE-2024/CVE-2024-58xx/CVE-2024-5896.json) (`2024-06-12T16:15:12.813`)
- [CVE-2024-5897](CVE-2024/CVE-2024-58xx/CVE-2024-5897.json) (`2024-06-12T16:15:13.100`)
- [CVE-2024-5898](CVE-2024/CVE-2024-58xx/CVE-2024-5898.json) (`2024-06-12T17:15:52.577`)
- [CVE-2024-5905](CVE-2024/CVE-2024-59xx/CVE-2024-5905.json) (`2024-06-12T17:15:52.847`)
- [CVE-2024-5906](CVE-2024/CVE-2024-59xx/CVE-2024-5906.json) (`2024-06-12T17:15:53.000`)
- [CVE-2024-5907](CVE-2024/CVE-2024-59xx/CVE-2024-5907.json) (`2024-06-12T17:15:53.127`)
- [CVE-2024-5908](CVE-2024/CVE-2024-59xx/CVE-2024-5908.json) (`2024-06-12T17:15:53.253`)
- [CVE-2024-5909](CVE-2024/CVE-2024-59xx/CVE-2024-5909.json) (`2024-06-12T17:15:53.370`)
### CVEs modified in the last Commit
Recently modified CVEs: `10`
Recently modified CVEs: `48`
- [CVE-2024-23326](CVE-2024/CVE-2024-233xx/CVE-2024-23326.json) (`2024-06-12T15:32:11.303`)
- [CVE-2024-28021](CVE-2024/CVE-2024-280xx/CVE-2024-28021.json) (`2024-06-12T15:15:50.353`)
- [CVE-2024-28023](CVE-2024/CVE-2024-280xx/CVE-2024-28023.json) (`2024-06-12T15:15:50.463`)
- [CVE-2024-28024](CVE-2024/CVE-2024-280xx/CVE-2024-28024.json) (`2024-06-12T15:15:50.553`)
- [CVE-2024-30080](CVE-2024/CVE-2024-300xx/CVE-2024-30080.json) (`2024-06-12T14:19:52.130`)
- [CVE-2024-32974](CVE-2024/CVE-2024-329xx/CVE-2024-32974.json) (`2024-06-12T15:16:12.630`)
- [CVE-2024-32975](CVE-2024/CVE-2024-329xx/CVE-2024-32975.json) (`2024-06-12T15:12:55.383`)
- [CVE-2024-32976](CVE-2024/CVE-2024-329xx/CVE-2024-32976.json) (`2024-06-12T14:24:25.297`)
- [CVE-2024-34467](CVE-2024/CVE-2024-344xx/CVE-2024-34467.json) (`2024-06-12T15:15:52.083`)
- [CVE-2024-36971](CVE-2024/CVE-2024-369xx/CVE-2024-36971.json) (`2024-06-12T15:43:28.280`)
- [CVE-2024-35745](CVE-2024/CVE-2024-357xx/CVE-2024-35745.json) (`2024-06-12T17:36:32.763`)
- [CVE-2024-35746](CVE-2024/CVE-2024-357xx/CVE-2024-35746.json) (`2024-06-12T17:36:02.087`)
- [CVE-2024-35747](CVE-2024/CVE-2024-357xx/CVE-2024-35747.json) (`2024-06-12T17:32:52.343`)
- [CVE-2024-36263](CVE-2024/CVE-2024-362xx/CVE-2024-36263.json) (`2024-06-12T17:15:50.363`)
- [CVE-2024-36264](CVE-2024/CVE-2024-362xx/CVE-2024-36264.json) (`2024-06-12T17:15:50.447`)
- [CVE-2024-36265](CVE-2024/CVE-2024-362xx/CVE-2024-36265.json) (`2024-06-12T17:15:50.520`)
- [CVE-2024-36412](CVE-2024/CVE-2024-364xx/CVE-2024-36412.json) (`2024-06-12T18:00:00.317`)
- [CVE-2024-36413](CVE-2024/CVE-2024-364xx/CVE-2024-36413.json) (`2024-06-12T17:59:44.673`)
- [CVE-2024-36414](CVE-2024/CVE-2024-364xx/CVE-2024-36414.json) (`2024-06-12T17:59:14.353`)
- [CVE-2024-36415](CVE-2024/CVE-2024-364xx/CVE-2024-36415.json) (`2024-06-12T17:58:53.497`)
- [CVE-2024-36416](CVE-2024/CVE-2024-364xx/CVE-2024-36416.json) (`2024-06-12T17:58:19.570`)
- [CVE-2024-36417](CVE-2024/CVE-2024-364xx/CVE-2024-36417.json) (`2024-06-12T17:58:04.477`)
- [CVE-2024-3699](CVE-2024/CVE-2024-36xx/CVE-2024-3699.json) (`2024-06-12T17:53:09.130`)
- [CVE-2024-3700](CVE-2024/CVE-2024-37xx/CVE-2024-3700.json) (`2024-06-12T17:51:52.710`)
- [CVE-2024-37014](CVE-2024/CVE-2024-370xx/CVE-2024-37014.json) (`2024-06-12T17:57:01.660`)
- [CVE-2024-37051](CVE-2024/CVE-2024-370xx/CVE-2024-37051.json) (`2024-06-12T17:49:04.017`)
- [CVE-2024-37393](CVE-2024/CVE-2024-373xx/CVE-2024-37393.json) (`2024-06-12T17:56:23.390`)
- [CVE-2024-37569](CVE-2024/CVE-2024-375xx/CVE-2024-37569.json) (`2024-06-12T16:32:56.203`)
- [CVE-2024-37570](CVE-2024/CVE-2024-375xx/CVE-2024-37570.json) (`2024-06-12T16:32:34.513`)
- [CVE-2024-37880](CVE-2024/CVE-2024-378xx/CVE-2024-37880.json) (`2024-06-12T16:30:15.053`)
- [CVE-2024-4744](CVE-2024/CVE-2024-47xx/CVE-2024-4744.json) (`2024-06-12T16:44:12.157`)
- [CVE-2024-4745](CVE-2024/CVE-2024-47xx/CVE-2024-4745.json) (`2024-06-12T16:23:34.197`)
- [CVE-2024-4746](CVE-2024/CVE-2024-47xx/CVE-2024-4746.json) (`2024-06-12T16:17:42.223`)
- [CVE-2024-5389](CVE-2024/CVE-2024-53xx/CVE-2024-5389.json) (`2024-06-12T16:31:30.577`)
- [CVE-2024-5585](CVE-2024/CVE-2024-55xx/CVE-2024-5585.json) (`2024-06-12T17:15:04.083`)
## Download and Usage

View File

@ -241392,7 +241392,7 @@ CVE-2024-1224,0,0,6671b720f58aa0150d14676a615208ff783ead72a8a766227d501b4f2f840d
CVE-2024-1225,0,0,0b68eae0ee984524ebb2df359b44e58b9ba84a615ada907a65e017a24d65ff7a,2024-05-17T02:35:19.560000
CVE-2024-1226,0,0,14a580d4b3eab4674d6ae40acd0cb53f118cafa2e8004e611e071913cd041fe6,2024-03-12T16:02:33.900000
CVE-2024-1227,0,0,94dce1bd607b6903e23d54a7d6b05a85e9dc37b645ba64935d33bd38f11890aa,2024-03-12T16:02:33.900000
CVE-2024-1228,0,0,9ed4be4b64f071a926435d781e56cc24beb311b621e58ce6e504c6303075b0fa,2024-06-10T12:40:41.360000
CVE-2024-1228,0,1,32605b1907163ad08b6f7354355ad82a69536fce794750addc55c0f4867cda18,2024-06-12T17:54:10.157000
CVE-2024-1229,0,0,2de2ced35127929201da3cc9dd41aa7d4097d2d61f9931ef1592526b3e0b7dfa,2024-05-14T16:13:02.773000
CVE-2024-1230,0,0,8bd1dd7f8fd55f9189a6ea53392185485a1a6386a5bf97397fc7d3598cb5fb14,2024-05-14T16:13:02.773000
CVE-2024-1231,0,0,3fff2a2694f3a2890eda32488c438fe0ab80785883b0aefb67199c2eabc0d967,2024-03-25T13:47:14.087000
@ -241700,8 +241700,8 @@ CVE-2024-1569,0,0,4b71bedec4a1528fa42ec60009db4665ea96567ec249e5864edd831fa0bb98
CVE-2024-1570,0,0,1629a1493afa93044df9f22af1e83d093e3e06db82a23b409138b92d94c2f5f4,2024-02-29T13:49:29.390000
CVE-2024-1571,0,0,b1806e0b2d46f5d2ef86ed95b11ec13eeefb63bf2736347df987f91692e6e418,2024-04-10T13:24:00.070000
CVE-2024-1572,0,0,4deddd16a8e62290b13f0cdb450608c505fd6cdf76365f1d944ed8337c4c95f6,2024-05-02T18:00:37.360000
CVE-2024-1576,1,1,0728508066f7161894bf5d1c5ee8dffe691b95c87307e7c395d7e8af273e838b,2024-06-12T14:15:10.487000
CVE-2024-1577,1,1,9e7e2b2ded921820b90d21c672639a9a1fb42bd5ece854e0446aa515468b48ab,2024-06-12T14:15:10.683000
CVE-2024-1576,0,0,0728508066f7161894bf5d1c5ee8dffe691b95c87307e7c395d7e8af273e838b,2024-06-12T14:15:10.487000
CVE-2024-1577,0,0,9e7e2b2ded921820b90d21c672639a9a1fb42bd5ece854e0446aa515468b48ab,2024-06-12T14:15:10.683000
CVE-2024-1579,0,0,b19774dd42578330a3da1ea9eac4803944dc51b8f7e2cc4d4d08fb40df600dc0,2024-04-30T13:11:16.690000
CVE-2024-1580,0,0,4a10e63fa95d49470234e2661449f906487822e0aeb3a95c53a88e84627958f0,2024-03-27T18:15:09.063000
CVE-2024-1582,0,0,5801086f12a7b25e0a24481309300eacfe3989ff6a37128452730610efa279b1,2024-03-13T12:33:51.697000
@ -241763,7 +241763,7 @@ CVE-2024-1654,0,0,ac0509f6deb6f3ed4a3e95d25ed4dd3bdd67f0f87914e461aded05c6f6644a
CVE-2024-1655,0,0,4b77006431ba07ecbc46dae3c8a08b9d1a8f7126e8ade7abcd81e5f88d783104,2024-04-15T13:15:31.997000
CVE-2024-1657,0,0,a497f7c000aaae813c345480c074db7bfac8435097b4ea8536600de4b426afce,2024-04-25T17:24:59.967000
CVE-2024-1658,0,0,bd2757c2314dc2f8bd52ce15b18a6ca41069d2e3f9ff401d7a725ad82b1db09d,2024-03-18T19:40:00.173000
CVE-2024-1659,1,1,be9b2a7375d60d2f90e33e3074ce20cf607b3db6eaa534035909340b5cb0ce23,2024-06-12T14:15:10.803000
CVE-2024-1659,0,0,be9b2a7375d60d2f90e33e3074ce20cf607b3db6eaa534035909340b5cb0ce23,2024-06-12T14:15:10.803000
CVE-2024-1660,0,0,068c83f9afc694d855bcbb99610bd3ca5f918af7baf81b6ceb2a3be3520f6bf7,2024-04-15T13:15:31.997000
CVE-2024-1661,0,0,b7671ba7b0cc968bc464682e512c319d5a4f7189c60b340cf16a0b0c1d49a626,2024-05-17T02:35:32.207000
CVE-2024-1662,0,0,5e3f0bbaa835f83ed5b390ba0fde3c07f4c25fb4b3918d631b6b1d14a1fb5ba4,2024-06-11T17:27:19.127000
@ -241972,6 +241972,7 @@ CVE-2024-1887,0,0,c4ea1f30b4ee64401ec471c46007c0919b3d087c3cc77ec486ec75f252891a
CVE-2024-1888,0,0,5c48c7ef8072bebc640799142c34dfeb37124cccb7d60f3f8c8d95bce0e2f85b,2024-02-29T13:49:29.390000
CVE-2024-1889,0,0,34f0990ceccd75a569863a77fd268eb539c7d5ec488f2446cd3288ee4234f41c,2024-05-17T02:35:40.333000
CVE-2024-1890,0,0,7900533f7cd4681e9cd51c85aaf38899f8710ddf980029322947b07f23ce149a,2024-05-17T02:35:40.430000
CVE-2024-1891,1,1,9802320e49bf94f684ebc24df2bdd7287205d192242bfac06185b4199b96884b,2024-06-12T16:15:10.887000
CVE-2024-1892,0,0,496f86c779f360256e1e190fecff75b396ebefe831fecdca264ec166e984ab7e,2024-04-16T12:15:10.050000
CVE-2024-1893,0,0,678e936c89e4c4b6fa8874f1c864b24cc93a2715a395ba59ed61dfe9d57d4f11,2024-04-10T13:23:38.787000
CVE-2024-1894,0,0,9ac2447d78b1be48d8de07fcf9beac6b1c3a9f0af4ea5741b3b2d6e9b7f97eab,2024-03-13T18:15:58.530000
@ -243453,6 +243454,7 @@ CVE-2024-22296,0,0,26497821bdd6523c6ffa82c8932df21c7375a0b75c6b4829fe7611d85fa93
CVE-2024-22297,0,0,577fc11ad5b0d749376591ad16a375dfa540e32ffa2e1012a2392bbaefc0287d,2024-02-06T15:38:07.050000
CVE-2024-22298,0,0,eb4e5161d1233abda8028026a5fd3bc810ac81a8912963670187ebce3b0787a2,2024-06-10T12:40:41.360000
CVE-2024-22299,0,0,80a4882f4c9ab5eec2fd5d8b16ede08da3f188bafea457394bae184bfdc470b7,2024-03-27T12:29:30.307000
CVE-2024-2230,1,1,e82ed198b5ea9197ae8c82fa57588e9a9ab058667665b30035da7ff4601497f5,2024-06-12T17:15:50.140000
CVE-2024-22300,0,0,6a2ac22ff64061be14a64819ed6b0717dea7f94ee6239bf636e871d8862b7a4e,2024-03-27T12:29:30.307000
CVE-2024-22301,0,0,5c83b0c07edb476e78cc7de384bddf72fcd86e319684689177ab1f8ee28c611d,2024-01-30T17:44:59.847000
CVE-2024-22302,0,0,18ed1122bd0976f0a4301ea9eae7070b9d3278277ba02d3b706dc015d0fd056d,2024-02-06T15:03:44.550000
@ -243734,6 +243736,7 @@ CVE-2024-22851,0,0,e3b3a4173f66bde18bcde8b4d6e07ed058612b81ace293aa36efd8837ff83
CVE-2024-22852,0,0,fba9226bfac500a19dd8b91a9788eed1682675a652e0b6dd1f0ee08e7df876f5,2024-02-13T18:16:51.790000
CVE-2024-22853,0,0,ec6a06bd931391a16658f5323e2bffe5ddc884df4aacc34598a685bd3979b258,2024-02-12T17:50:31.950000
CVE-2024-22854,0,0,8b8b90cd6c1c9786e2fb5396ca19284ddab9c4ff42eae4bf034495afa4860075,2024-02-16T13:37:51.433000
CVE-2024-22855,1,1,cfcf005f31b5547d2fa8c00cc5f7f6b8e097a82610a7ccea6c31a0a094af8224,2024-06-12T17:15:49.913000
CVE-2024-22856,0,0,1db436dd1cb2a23310320ff23e9771e20af5e9762fcab5bed6358a83124247e2,2024-04-22T13:28:34.007000
CVE-2024-22857,0,0,dc8c498662e053f2e9a39f301d349f3ad8950912cf2843180c278fecc58efab5,2024-04-19T01:15:06.297000
CVE-2024-22859,0,0,b948ee8fe798cbf01c18cac852f304ecb9e81e6d367124ad19db38465396c137,2024-05-17T02:36:25.953000
@ -243790,7 +243793,7 @@ CVE-2024-22983,0,0,1b3e25c68b4f4c09625b6b1616200d426118f4ab97bcd8f55256ede34123b
CVE-2024-22984,0,0,e1878756268a68f030b8a1f4c487c52d091cec58671de352e5b7d5d34740ed57,2024-02-07T20:15:49.320000
CVE-2024-22988,0,0,9bce914ce9d429b5a5cd734f9618e22363c87c41939b422b32cac88106642a90,2024-03-18T20:15:08.793000
CVE-2024-2299,0,0,a2c0639aafa318e37cbe84745db202f92d0844b28db3911da779489e209e6323,2024-05-14T16:13:02.773000
CVE-2024-2300,1,1,f8bf9e7e8ab2f891438b66829ca7f369affa6a73abe4c76e23adcd789fbf7428,2024-06-12T15:15:51.097000
CVE-2024-2300,0,0,f8bf9e7e8ab2f891438b66829ca7f369affa6a73abe4c76e23adcd789fbf7428,2024-06-12T15:15:51.097000
CVE-2024-2301,0,0,67f9991b7f02e714f4c2fc9cddcd6d171d25cd505201db2923a395b2636da189,2024-05-24T01:15:30.977000
CVE-2024-2302,0,0,111ef6bb80800aad8b5212c78d791bb76a08a7abc709646851b3bdf2c22369ae,2024-04-10T13:23:38.787000
CVE-2024-2303,0,0,e8ec06902514d48e2641fcd827085959ad9d4a100b3417c3f9c5bb681b9976f4,2024-03-26T12:55:05.010000
@ -244013,7 +244016,7 @@ CVE-2024-23322,0,0,efdd5208c12e6ab610c84f708ac54206d4a8e094359274c8f3041236f4686
CVE-2024-23323,0,0,9ef57ef11998f55bee596cb29f1fbe7dc637ddbdf2aa13fe046f9f2eea8d8f88,2024-02-15T04:48:09.937000
CVE-2024-23324,0,0,35720c684b54e965146363a2e121313965ffb87bf31cdf01edc9c60f19b814c6,2024-02-15T04:46:33.747000
CVE-2024-23325,0,0,70301add03c2e2278861270a456ddd507fac1caa8f238d4654fa7a889c0634df,2024-02-15T04:46:07.523000
CVE-2024-23326,0,1,ff8e0379bcc07da5c3324f9237cac14fefe6ec88ce748b3d4f51dc7e0f0647e8,2024-06-12T15:32:11.303000
CVE-2024-23326,0,0,ff8e0379bcc07da5c3324f9237cac14fefe6ec88ce748b3d4f51dc7e0f0647e8,2024-06-12T15:32:11.303000
CVE-2024-23327,0,0,23e7e171aa9435048ef128fcb499e07e85d88191467319d42823b5790591ee1c,2024-02-15T04:45:57.207000
CVE-2024-23328,0,0,c6365a32f3e08f9ae9322d77197538e35765bb36247196fdd4549570c228c068,2024-02-29T13:49:29.390000
CVE-2024-23329,0,0,0872cee4434cd36ea6d6e070e0df43a79e4470fecf3359a8aa00c845af990886,2024-01-26T20:19:59.393000
@ -244054,7 +244057,7 @@ CVE-2024-23439,0,0,75842703fc8396c264bf7f64d302dcdccc156c8a0d8e8ba1a2e2bc4a679ac
CVE-2024-2344,0,0,9cae69222ac86b797893a236952e2b67d0f04fb96cc74f0182a6b9bc4a4c1da0,2024-04-10T13:23:38.787000
CVE-2024-23440,0,0,9dd065aa3db280abdb31ad5cddbf9a0771593c407067e49d6917c21b3390f15a,2024-02-13T15:16:05.223000
CVE-2024-23441,0,0,de32eb33b55d8738bd8a9d16a7a81a54994489d7a2b6a46fb774fdf5c385031e,2024-02-05T18:41:43.547000
CVE-2024-23445,1,1,1afd8af92dd9e7994d98c05d47d495104d2d8093facaa235d1afb92fb1ecffe0,2024-06-12T14:15:10.963000
CVE-2024-23445,0,0,1afd8af92dd9e7994d98c05d47d495104d2d8093facaa235d1afb92fb1ecffe0,2024-06-12T14:15:10.963000
CVE-2024-23446,0,0,250d55c97e03f858281f4b571f5417bd7430f2eb75d812ec1a5460363cd232aa,2024-02-14T20:10:24.323000
CVE-2024-23447,0,0,d914699914a1032e2f26c2be4fcf7737ff60c4d99dbe7a58145b0312508d8818,2024-02-14T20:02:00.753000
CVE-2024-23448,0,0,9b1c1e9aca41646e9bc0b5aea887714df628a3eafb241e1a8858ac207b41bd27,2024-02-15T15:39:14.317000
@ -244492,7 +244495,7 @@ CVE-2024-2406,0,0,bce1950aa0ba3247257e0f9798cc049e12ff07a8e21e9064eb763cce3e8229
CVE-2024-24060,0,0,3a6250076b98d97024da5e52a26f1f0c29807ef38de327e60f431783e4f1deaa,2024-02-03T00:40:48.600000
CVE-2024-24061,0,0,3ae0e78c2ecb0941fa62f48d1dc7792d4436b76ec841f1dbf3bf2317943894c3,2024-02-03T00:40:50.623000
CVE-2024-24062,0,0,ce51fb5fa7f08b3262a47fca149a06dc25ea5ca7c584b3ae7210563fa9fd54c1,2024-02-03T00:40:52.877000
CVE-2024-2408,0,0,cbc6c59d9b6dfbedcc88744a5d3bc0cbec74f0db4412015b7dce85aee7cfdf37,2024-06-12T02:15:09.970000
CVE-2024-2408,0,1,79608ac2b73485aa622d02d7fd2cdce295f0e378608808ccee920b0119f98fdd,2024-06-12T17:07:00.770000
CVE-2024-2409,0,0,ba586e1c6181b06c3ede339eac17164a8a25d5149e65ad7809000b9e6c808051,2024-03-29T12:45:02.937000
CVE-2024-24091,0,0,6258a73a312c8c072d234b916137958d60ec77d8bc24aab7428a6677fc85f73a,2024-02-08T13:44:21.670000
CVE-2024-24092,0,0,d4ab4cc918de723ea385c13013f3b5223c8222e6f58b4c0135bd83322e27d646,2024-03-13T12:33:51.697000
@ -246390,7 +246393,7 @@ CVE-2024-26975,0,0,8f19cd721adbc3dd7c661f9a8d550ab97e4f94e7a1b3b7e5ff34954db774d
CVE-2024-26976,0,0,7f3160fd993055d2d086205203ac721ed6cf29a59d28518fd22c6db2c5d69b1f,2024-05-01T13:02:20.750000
CVE-2024-26977,0,0,7f4303ba7265fe68f47a9d9801d011f3d78c2b9c80b2b80c869116171921f0d6,2024-05-01T13:02:20.750000
CVE-2024-26978,0,0,8d561a460191ee18f3c0a08c6e5356905628e7e52b101255033d5d975d400ae1,2024-05-23T19:14:12.637000
CVE-2024-26979,0,0,8b43b56d6e8afb93c65be5c5090f4a2ff2e19b842ecb60f8c0d45c442782c34d,2024-05-23T19:14:15.993000
CVE-2024-26979,0,1,54694270d008c20297a5341208d33ae44a9e8eec55dc5d4e396d03aaba5d47ac,2024-06-12T16:15:11.147000
CVE-2024-2698,0,0,a1683e28c7d60c58b4273f4c288780d16aef9c7ec236a8f1e9da79ec4d3513a9,2024-06-12T08:15:50.250000
CVE-2024-26980,0,0,ec5b812a8dbedf3c6e27cceb9a929403fd6e62291ad747f9f2a67748a6189d95,2024-05-17T11:15:08.357000
CVE-2024-26981,0,0,3038c3174fa5069e42a0db4274374d74c2b5066ad475e921f47c4589915379cd,2024-05-03T06:15:10.663000
@ -247111,10 +247114,10 @@ CVE-2024-28015,0,0,c36a569e47a8cc25a559aa19a480d47088d8456072eb6e8c9e0575d3988b3
CVE-2024-28016,0,0,fe85c1f239b1cebe9726ce271c3f5722bfdbb4bcff9b0aba329f58c6fcbf12b8,2024-04-02T06:15:15.603000
CVE-2024-2802,0,0,3b7ed9aefbc68681b0633b6ab16c0b3db6db844ee4c655f6c7e6863ac6e1f543,2024-03-26T15:15:49.677000
CVE-2024-28020,0,0,6d430c8d5773c5572703e8eb1ebbed11ccb042f06624dd0f60fb4b806712100b,2024-06-11T19:16:05.787000
CVE-2024-28021,0,1,3d1bb5c5868fed6eed2dfb29d699a10d907345500aceff4e34c7b4ef93959b5f,2024-06-12T15:15:50.353000
CVE-2024-28021,0,0,3d1bb5c5868fed6eed2dfb29d699a10d907345500aceff4e34c7b4ef93959b5f,2024-06-12T15:15:50.353000
CVE-2024-28022,0,0,f33400be2ed20790c2a66a6e8cf14bba54eaa102058f1c9f1e38933e2142945a,2024-06-11T19:16:06.017000
CVE-2024-28023,0,1,728eb5640072225812cacc31cecdb3bc72496475e9c39428e691e9ab3de62176,2024-06-12T15:15:50.463000
CVE-2024-28024,0,1,fc03814c74e522cb402107128eb7e94517e79f2b2e83a5afbe9366d4f9649ffb,2024-06-12T15:15:50.553000
CVE-2024-28023,0,0,728eb5640072225812cacc31cecdb3bc72496475e9c39428e691e9ab3de62176,2024-06-12T15:15:50.463000
CVE-2024-28024,0,0,fc03814c74e522cb402107128eb7e94517e79f2b2e83a5afbe9366d4f9649ffb,2024-06-12T15:15:50.553000
CVE-2024-28029,0,0,ccc7402fca90b7f3950f1059a1d69e89046b1f9e52fa792eb9ddd9a398189f20,2024-03-25T16:06:44.403000
CVE-2024-2803,0,0,ce930c4e9bc9258ecb2ab0c912abdd19cc32c8e899acb9b2ec454e5acd9e0ebd,2024-04-04T12:48:41.700000
CVE-2024-28033,0,0,d380f707343e80ca8a48383d7130e8455ae81fc182e0d67c36374f1eb571652f,2024-03-26T12:55:05.010000
@ -247515,7 +247518,7 @@ CVE-2024-28824,0,0,5a9476ae0fdb0520e3a986c832f5f9e27a50da5cb3aa11e06910544296f0e
CVE-2024-28825,0,0,9e6f2228e06896e59bb560ffc81c60a9a09c25eeaded2122eaaaf9d670949d13,2024-04-24T13:39:42.883000
CVE-2024-28826,0,0,af714d67b245e2002324726263b60e676423e9fa16954adb4190fa57b660a93f,2024-05-29T13:02:09.280000
CVE-2024-2883,0,0,e66be81816608580e2e81ffcb02cca4ae9a2aa5cbea60907cc2e1d80cffbaf4a,2024-03-29T04:15:08.743000
CVE-2024-28833,0,0,842c9aabaad5fddecf13dbff5608f1a3d0d32dbf619f87e495fbcb304105ee07,2024-06-10T12:40:41.360000
CVE-2024-28833,0,1,c28d0621123671b94853f5763fc92ce8098ea4f6621d0443f950677dd9d3b57a,2024-06-12T17:53:57.103000
CVE-2024-28834,0,0,af4d9c1dfe16b4591e02664fd7ad00b6706b6af449eca3208820bfc8e9b376f7,2024-06-10T17:16:24.560000
CVE-2024-28835,0,0,7ffb3867ffb469cae5c61eed57191c292b3344e17f215833454f077170fed24a,2024-05-16T23:15:47.883000
CVE-2024-28836,0,0,ef9665bb9a0895616f82c07b3b8f93ecbb9dcd318a88906096e3fd29af01d6df,2024-04-03T12:38:04.840000
@ -247617,7 +247620,7 @@ CVE-2024-2896,0,0,3ad2fe64a41141fed7b0fa53a3444b82c00070fabdab5a39ddb04419c22696
CVE-2024-28960,0,0,e8dbeb1ca04aba553db6ad0a923d45f708fa651bef11fd340f54cf32195f3cfb,2024-04-19T23:15:10.657000
CVE-2024-28961,0,0,0ddc41642ad07ac3588b209701b64adc26c13e6c39a5545ce50919c420215bae,2024-04-29T12:42:03.667000
CVE-2024-28963,0,0,c5c3b185efea606aed4d9595c8d313f3f2c0068b841b7e1d435fe02dbde99f32,2024-04-24T13:39:42.883000
CVE-2024-28964,1,1,fb329d1e04afee3f4c132c0e99318c03fd4dffad35869d987d70b69e5a024ccc,2024-06-12T15:15:50.647000
CVE-2024-28964,0,0,fb329d1e04afee3f4c132c0e99318c03fd4dffad35869d987d70b69e5a024ccc,2024-06-12T15:15:50.647000
CVE-2024-2897,0,0,0e1e1d677ec9e72b6995e546603f98ab77935f85885a6483b68b217559eb34fe,2024-06-04T19:19:19.267000
CVE-2024-28970,0,0,a070c839d5653c6b9137332b6bb0245cc7bff1791d48e4f8bfab9e344eddc7e0,2024-06-12T07:15:51.347000
CVE-2024-28971,0,0,5cc2a2bfd21b51036452ce03834ca76b5f458ae1e1ea0b2042ea0e7434d790f7,2024-05-08T17:05:24.083000
@ -247780,7 +247783,7 @@ CVE-2024-29170,0,0,3a6ff2257b9f972ea2c611b834271a3e0fac88ad6ff708b8c384b495ffa37
CVE-2024-29179,0,0,f19d4d0a9f8b6dc85e6e021ab22950c73dd30b1b16e940f3cfc8d8b6deab42d4,2024-03-26T12:55:05.010000
CVE-2024-2918,0,0,ce50c7c24dc6b969578ed47f388645920a5e5c8ad0b49917ec2e7ecd8d9606ee,2024-04-10T13:23:38.787000
CVE-2024-29180,0,0,41debf5c02b25447b090e1fe17310ae2918a3e33749dbf7033ce058b1311f912,2024-03-21T19:47:03.943000
CVE-2024-29181,1,1,25ab5a8f39ebf9c58e88f66072d62244b66f2bab1f5ee83a2672c203a90baf3e,2024-06-12T15:15:50.873000
CVE-2024-29181,0,0,25ab5a8f39ebf9c58e88f66072d62244b66f2bab1f5ee83a2672c203a90baf3e,2024-06-12T15:15:50.873000
CVE-2024-29182,0,0,994aac2c86ee972711edfdd4e92cd8578cd6ea33eb856fd8da15e01f82c49b30,2024-04-04T16:33:06.610000
CVE-2024-29183,0,0,049d4e847cbbb623401abad42c4260487616bb33c13b99007ea2cd07073a7b2f,2024-04-19T16:19:49.043000
CVE-2024-29184,0,0,5d28e98e710e6ef5aa032fbd7c50016a2d314d8a7140355939fc7fee0918ef2b,2024-03-22T19:02:10.300000
@ -248306,7 +248309,7 @@ CVE-2024-30076,0,0,dcaba5bc065683f80b98a1989c72a6cea051efe0b468b8f12449e12f18073
CVE-2024-30077,0,0,fd561c7c339b8655ae079619734ef41eff442ab84aaa628dbda914b9919b3b04,2024-06-11T17:15:54.737000
CVE-2024-30078,0,0,39aa12ef4dd0c17c5fc61ff8c43512e7d441bd50efc833f8c9513df8fce5a010,2024-06-11T17:15:54.977000
CVE-2024-3008,0,0,38114235bd0d847f323f6f6f0b2b45ba228af3f4b3b2140fd5d29a91c2eeeb7d,2024-05-17T02:39:40.280000
CVE-2024-30080,0,1,c299675de4a96d93eee1a5e28be354af6ac28e3e5f6d5e73e3997e8f7e7e8d82,2024-06-12T14:19:52.130000
CVE-2024-30080,0,0,c299675de4a96d93eee1a5e28be354af6ac28e3e5f6d5e73e3997e8f7e7e8d82,2024-06-12T14:19:52.130000
CVE-2024-30082,0,0,0cedf0f69f90844b0d119e4edcdbc3e8db68173e9c3b80b0a0605f6f1978e75c,2024-06-11T17:15:55.443000
CVE-2024-30083,0,0,29560d17dab386c9c8ee0d6ad7d018c640e5a77611c188ce312aab346412692e,2024-06-11T17:15:55.677000
CVE-2024-30084,0,0,93d591981c733e062582bc321e6a2423220e12b6fb3619ee884c971110f77287,2024-06-11T17:15:55.893000
@ -249049,7 +249052,7 @@ CVE-2024-31213,0,0,4aff9e2c15103485e15f2d72563e8cf5ff3745458bc3eeef8638c53a238fa
CVE-2024-31214,0,0,6fd2ca8f7b5ff5092bca889a448aa20cbf70a081c1713baee29d50f1f1ef6c72,2024-04-10T19:49:51.183000
CVE-2024-31215,0,0,34a0a231f3970708fb3e5686678c657f48cd1675d27ab51eed18f5cf652dec67,2024-04-04T16:33:06.610000
CVE-2024-31216,0,0,d81eedaba41c66ff5403344865ad7320029e4218bc907b5fcd390407a8729d6d,2024-05-15T16:40:19.330000
CVE-2024-31217,1,1,cc44d616b9c319bcbd243fb309b85a12836a06e699af1fc73e7a735000869fa3,2024-06-12T15:15:51.170000
CVE-2024-31217,0,0,cc44d616b9c319bcbd243fb309b85a12836a06e699af1fc73e7a735000869fa3,2024-06-12T15:15:51.170000
CVE-2024-31218,0,0,7bde3095db5888b85ce9669e8bb2502e2c0767a6efc1fdc83c6973eaeb264970,2024-04-08T18:49:25.863000
CVE-2024-31219,0,0,d2d2811e70f71b6e8f1f63a3f7bda6856d7eb5bcd23ce2727f866e79d3b49966,2024-04-15T19:12:25.887000
CVE-2024-31220,0,0,5364fec01a2c522837b9bb1f12dd2e109f09573a57ee59445d858fa07dd681f7,2024-04-08T18:49:25.863000
@ -249337,7 +249340,7 @@ CVE-2024-31601,0,0,77cac7e969e7044d11a270a83972e4e2e2dc079687b9a26234b27560790da
CVE-2024-31609,0,0,a5493714821f0e0bdf3fb4b62cbe59dc9498aefc0ac9439c259bc304a5043f24,2024-04-26T12:58:17.720000
CVE-2024-3161,0,0,fb0275ae00c4597a14b8da67383742a33ef20f00a5c359deab992b83c03fa869,2024-05-02T18:00:37.360000
CVE-2024-31610,0,0,25f0fe7dce01b290d07505f210ca0196ceaddb3229e43445c402c10f0654acf3,2024-04-26T12:58:17.720000
CVE-2024-31611,0,0,d061a13a3ca8400dc49a173cd8ddd164874a180fe99e2fae6d212467a4c38120,2024-06-10T18:06:22.600000
CVE-2024-31611,0,1,5f9e3922a5a892423d1bcf4416bca54c649670eb4a86ab19022e098b2dd1541f,2024-06-12T17:44:20.730000
CVE-2024-31612,0,0,49b396f89a743014e777c696cbe0e8a08f9d50db5428a29b14912920ed331742,2024-06-10T20:54:18.443000
CVE-2024-31613,0,0,b22e0ead922262609ccd5adc643348b5359bd4a3d7fad40a103e18586e9e197b,2024-06-10T18:06:22.600000
CVE-2024-31615,0,0,fec656de044fff01992f2ac4c2d789e80286f56b4ff6f28fca891fbe026d80d2,2024-04-26T12:58:17.720000
@ -250195,9 +250198,9 @@ CVE-2024-32970,0,0,b126f2141510dcb54e926e47a7ca1df0de893436174ab5ed3374ec3e4a125
CVE-2024-32971,0,0,08a74512fac53a47fe5bae183f1689f8caa1fd800f4d158ca372e66d19cd6316,2024-05-02T13:27:25.103000
CVE-2024-32972,0,0,849652650e04d2a2cf928beb303038daae9f4b88c338eff0619c140035b2effa,2024-05-06T16:00:59.253000
CVE-2024-32973,0,0,c022c9f4134f1adead82c1b269e30d0c14622c1fcaf8b6997a4d5a316715d39c,2024-05-01T13:01:51.263000
CVE-2024-32974,0,1,3c7a1e6783757ad77697cbfdca934da8dc7122e851a35c4161505b1633b59bd8,2024-06-12T15:16:12.630000
CVE-2024-32975,0,1,08c4090909ec38448366d4ab0b35e6077e7f8109e6cfeea962f1fff3b5060830,2024-06-12T15:12:55.383000
CVE-2024-32976,0,1,4dc2b853593cc8407fbc17e5d943247608bcaacfd5b7f1efb57f56d4c6f90ed3,2024-06-12T14:24:25.297000
CVE-2024-32974,0,0,3c7a1e6783757ad77697cbfdca934da8dc7122e851a35c4161505b1633b59bd8,2024-06-12T15:16:12.630000
CVE-2024-32975,0,0,08c4090909ec38448366d4ab0b35e6077e7f8109e6cfeea962f1fff3b5060830,2024-06-12T15:12:55.383000
CVE-2024-32976,0,0,4dc2b853593cc8407fbc17e5d943247608bcaacfd5b7f1efb57f56d4c6f90ed3,2024-06-12T14:24:25.297000
CVE-2024-32977,0,0,0fe4b56f20a37baa6e6e483a47c7afc89bc0a54a6fef05fea67ddd1983a8007b,2024-05-14T19:17:55.627000
CVE-2024-32978,0,0,e90314d84ee19a910681cfee4518d999a937d25285c7a155e2e4880e35c0d5c6,2024-05-28T16:15:15.833000
CVE-2024-32979,0,0,415a3504af4253fb9330760c79feca97e4169fdf22dd7f9c2c9ff0e4f9c129df,2024-05-01T13:01:51.263000
@ -250735,7 +250738,7 @@ CVE-2024-34061,0,0,3ce76c3220f695556e9bc43d23c63a4d4d07710be053bec43ac41fe85d030
CVE-2024-34062,0,0,d8d24aa0382f75f0d829a2a89a836c5f21da658981a967707e8f1f36c81faad2,2024-06-10T17:16:28.360000
CVE-2024-34063,0,0,89203048e8a5c6f0a9a278ee3ee759b36283535b5d1bbdb2ab5d680903f7fdc6,2024-05-03T12:48:41.067000
CVE-2024-34064,0,0,86f11f5b13de20c7e93fb78acdc4a6824188e1e0a6ec2071307a39e0b4bdfae7,2024-06-10T18:15:34.583000
CVE-2024-34065,1,1,2fcc9e499c1149565b31f60ac76f0bdbd186adb208c9bc0af98d56e3bbd019fe,2024-06-12T15:15:51.460000
CVE-2024-34065,0,0,2fcc9e499c1149565b31f60ac76f0bdbd186adb208c9bc0af98d56e3bbd019fe,2024-06-12T15:15:51.460000
CVE-2024-34066,0,0,e7ea762d407e43f2240bb3754ec52285087c0f293e145c429f01621948c327a5,2024-05-06T12:44:56.377000
CVE-2024-34067,0,0,44f51ac699d7dc59dc5c4d716fb932669e0775f482117289b722cd92c6ee4f2f,2024-05-06T12:44:56.377000
CVE-2024-34068,0,0,6b5e10382809437662673061404a0c29ee6d46eb60b53e78fc9d6699f4c6fea5,2024-05-06T12:44:56.377000
@ -250971,7 +250974,7 @@ CVE-2024-34460,0,0,99c6d0d412292b29abd0eb6b005513cae3139ce4a46c3a1130ade276e61e2
CVE-2024-34461,0,0,2a236ceaca3a093c5fd8c7e190397c18e1c79e84a07d33e6c0476230dd6f4789,2024-05-06T12:44:56.377000
CVE-2024-34462,0,0,143fa078dbd399415573f2f781d6f37adfaf8fe7791e3821230cc7b7ff1bfa27,2024-05-06T12:44:56.377000
CVE-2024-34466,0,0,dcb84331447b0337457fa6227ff5df8fd1e06a206cd354189f985bab3feb6181,2024-05-06T15:15:24.473000
CVE-2024-34467,0,1,95c6cc8baa0369b7efcdf8bf7ebbf6be364e923ab4bf96b6bd3cddae28bde482,2024-06-12T15:15:52.083000
CVE-2024-34467,0,0,95c6cc8baa0369b7efcdf8bf7ebbf6be364e923ab4bf96b6bd3cddae28bde482,2024-06-12T15:15:52.083000
CVE-2024-34468,0,0,a40ff6fb5b40ba197993bb345fa17becf6195272ce9db7f4f3085d63801852aa,2024-05-06T12:44:56.377000
CVE-2024-34469,0,0,cc38c52cb01a5bd7d1ef7476faf1d55aeed17cdf4eba155d2e9487cc36f60510,2024-05-06T12:44:56.377000
CVE-2024-34470,0,0,7563a552ca2be8a7bfec68cf96ce2167a4e74ad20fa48edfb3bf720fb3040d7f,2024-05-06T16:00:59.253000
@ -251491,14 +251494,14 @@ CVE-2024-35646,0,0,0e09ad267a508b8a536900d74395f7d6fd0b87a4648f067a40bf0167f0c61
CVE-2024-35647,0,0,dd07a9e9a3804b0b3fdbbe9e6cdd58e439fe4bcd9c7b53cb07e789eae1ef1bd7,2024-06-03T14:46:24.250000
CVE-2024-35649,0,0,d2b425bcfde98a2966defe9ae6862e0c80d81675a5706c35a1abbc9f35d7c710,2024-06-06T13:26:46.537000
CVE-2024-3565,0,0,a4b6a30a1c15667775d02efa34a8d23be7f17c664853400b6c8d4dfd523ae02d,2024-06-03T14:46:24.250000
CVE-2024-35650,0,0,6e28c55ec5671c27f19e48d06f1086fc01223356f0e8e8afab1f667b4efa88d2,2024-06-10T18:06:22.600000
CVE-2024-35650,0,1,88f71076c8da2d896db64a869bec9bd7a99a8aa038f8111659743d5eada46f6e,2024-06-12T17:51:20.710000
CVE-2024-35651,0,0,c7cb64a650c120e950c2ebdd125d00702e2f5a45bd11dc5dcd4c353649900947,2024-06-06T13:31:03.307000
CVE-2024-35652,0,0,9510ec3ad0224331e475c18e35d7d417da7a9c92aa8f4cfe1b6338dfa113c106,2024-06-06T13:36:05.853000
CVE-2024-35653,0,0,4b4970e5c1ab1eb20df6ebb598ecfea858a4722a1a783fe88469bdbb9ecad5dd,2024-06-06T13:37:21.420000
CVE-2024-35654,0,0,403af0bf2fa4d57830f12a96c5ed9dd1e0545db0132e87e50cac0f148d9af859,2024-06-10T20:24:17.467000
CVE-2024-35655,0,0,1a8db850dc208775392ef9c5c3a34b4b09a3268c6e51da6a685217112000f91b,2024-06-12T10:15:30.750000
CVE-2024-35657,0,0,ec3d4a59ee1d38b4a1682b94b858ea40acc94a4e2de21f7ce8d2cd2eed427722,2024-06-10T02:52:08.267000
CVE-2024-35658,0,0,71700ecba9fffe191ebd94e2b3685959d020053e0e10be46d03a8e6a60a198e2,2024-06-10T18:06:22.600000
CVE-2024-35658,0,1,3cb3bd435b1fac14fe5eaac53d9db5d29070b97d8c6a9cdf7abd4efbfc625cc2,2024-06-12T17:50:55.227000
CVE-2024-35659,0,0,f212e44ec6c22c0baf538b4517ba7b487235e2fde0f9df0b7a9af518af224687,2024-06-10T02:52:08.267000
CVE-2024-3566,0,0,e417ef1ceca67d3a9a8ba800520d4a9974bcf4eba2e3e6325dafdfbfe6af8d6b,2024-04-10T19:49:51.183000
CVE-2024-35660,0,0,2144517a38c7b64dced7262d27a94b4362008ce987204b48e77a7c0e29f52214,2024-06-10T02:52:08.267000
@ -251519,11 +251522,11 @@ CVE-2024-35673,0,0,b2fbe24f0db2be82a21d56e6af9fa939a75372c8c56128cfd1a449a3505ad
CVE-2024-35674,0,0,61cb77c7b559c0aea326b97e0a24dca407c217fd649698447cd12a1a2e660866,2024-06-06T14:17:35.017000
CVE-2024-35675,0,0,d7aba91d6e03b6f23f94998b1bbf8b95344e8e8bd8d66158e67ae8b5f0f9b824,2024-06-10T02:52:08.267000
CVE-2024-35676,0,0,166eba80edb14795a5db8d246b6f75a63e949d50aa6c3420d82832ddae687bce,2024-06-10T02:52:08.267000
CVE-2024-35677,0,0,021dc6e10dfa6d3f69ca68e530633a6f7128e9e668a4bf40575ae244c331bdad,2024-06-10T18:06:22.600000
CVE-2024-35677,0,1,a3d618a3c7c44c9a2d5f73466c7858c8d9d95222181b688c0b22353d99594014,2024-06-12T17:50:33.367000
CVE-2024-35678,0,0,6bc2c5c60f113bbad24188332113cc6602fdbe13d58e8cdb7dadac89ed3cab7f,2024-06-10T02:52:08.267000
CVE-2024-35679,0,0,dc8fe3cbba8d2dc64f92808386423d05749489681fc72acff538a223b0a0ce77,2024-06-10T02:52:08.267000
CVE-2024-3568,0,0,573133d2a7191a46b0975280ef7162f7787321191e0ad33f2c4c70c7e8d9c3f5,2024-04-10T19:49:51.183000
CVE-2024-35680,0,0,7c6a0c434a989f035385e4f510042e999925f24da6b6ec85caba055ac9e0cec4,2024-06-10T18:06:22.600000
CVE-2024-35680,0,1,abcc5f0eeb10e717c7a703c1bfe0ea4283e28aa8c32eb264f3894dee0391af2a,2024-06-12T17:49:56.670000
CVE-2024-35681,0,0,525bdaafae75f5bf5cf51a1834d939c20d16bf8cdef623f1824a094f964d2f1e,2024-06-10T02:52:08.267000
CVE-2024-35682,0,0,d5d2707642803696da8586799f5705a4682d89a42a48773cd9ba1156a6a65a23,2024-06-10T02:52:08.267000
CVE-2024-35683,0,0,543ee45c55cfe4df71023cbc2ca445f0891a26383910f017400d4b92d415a6a8,2024-06-11T14:15:12.453000
@ -251556,7 +251559,7 @@ CVE-2024-35709,0,0,6e0a619a531b0e86e830f3c2f5f94e3f83db0d1d14cf3f0af71428a6ad96e
CVE-2024-3571,0,0,69cf6aaba9ed550ce2e1f492d0ecd149e8d5cd4d3ef343f36ac06a714698dced,2024-04-16T13:24:07.103000
CVE-2024-35710,0,0,2821683de41fa3eeb51b9282bc176211774b4c3042581edf1e5d173ac55f1b1a,2024-06-10T02:52:08.267000
CVE-2024-35711,0,0,abde08774d127ad0db34965655a4de5b5dad73c102e868a4d0f8c3582ef01c98,2024-06-10T02:52:08.267000
CVE-2024-35712,0,0,0d3858b32f5f0b043b6d272d638d67f5b854a9be4ef0265399d45a499f4195fb,2024-06-10T18:06:22.600000
CVE-2024-35712,0,1,8f4bb9399a50a51194e79d6df3895aca303c8f418f373df47beb5d65f20c7133,2024-06-12T17:49:29.547000
CVE-2024-35713,0,0,67f12030ef9ae03f21eeefc61a2db714e1cd54b5976a2138aaa81f95299ca1f4,2024-06-10T02:52:08.267000
CVE-2024-35714,0,0,fda77c484f1be31559583b8ce420a09ac05ec40a4cbe01b6366029636befebbf,2024-06-10T02:52:08.267000
CVE-2024-35715,0,0,a8feb3a0e36b1ed746ea7b8db0d283a4e527ecef045188b4e311eb2de1d8e60b,2024-06-10T02:52:08.267000
@ -251566,35 +251569,35 @@ CVE-2024-35718,0,0,88ba8367c19f7a9dbc9e6ec292607ddba06c8c0ffe199e953febc26814251
CVE-2024-35719,0,0,dd1d7bca8ae8cde9f9e3f2600aa39b26178c0f1f411f5a0803d6eedab9a3d37c,2024-06-10T02:52:08.267000
CVE-2024-3572,0,0,fac7085e464e1d98d017bfc9635e53b969d9f55d28ae04030a557f0ab1b04301,2024-04-16T13:24:07.103000
CVE-2024-35720,0,0,0f164f8f9b670114152a0f88625e47d291e06bcc76a25b980fca9f1df0718e97,2024-06-10T12:40:41.360000
CVE-2024-35721,0,0,47fa83a2c06aeb873011a7d9e72984af4163e18b6a4f8557e11aab266c20f0b4,2024-06-10T12:40:41.360000
CVE-2024-35722,0,0,fe1b2ecadfc6fa65c80ce7f0dd7231a203031927df17e4b70112a6a2a6775c60,2024-06-10T12:40:41.360000
CVE-2024-35723,0,0,0c8aec2c87d6958c9ad6bcd8848a1c193563820b9352824d84714622c28f59f6,2024-06-10T12:40:41.360000
CVE-2024-35724,0,0,e48b3a00c2b00635aee81c29e3ca82632c54edc0f72b88507c61ca124823f068,2024-06-10T12:40:41.360000
CVE-2024-35725,0,0,6387fa62c9303a450388588acd1b532583602036be1cf579cac326cfca4117f0,2024-06-10T12:40:41.360000
CVE-2024-35726,0,0,5883eebf37d5a82afde62efd9b451f2cc474bd63c2ff9ae6e7e67c955ac5df05,2024-06-10T12:40:41.360000
CVE-2024-35727,0,0,fa60ef12791ac41cbac7ca7ddae65aef20b84d89ffc1e42657dd68e45415ddb1,2024-06-10T12:40:41.360000
CVE-2024-35728,0,0,fe8213126fa7f12c48b263be496a176fb3056bbac16fa92ea79109ef5d69d88f,2024-06-10T18:06:22.600000
CVE-2024-35729,0,0,704c66cc889ab065c72f8d4d1ff2c74d179c18006d46b0f8f7d363da1f47ae5d,2024-06-10T12:40:41.360000
CVE-2024-35721,0,1,1807f30f29f0ac6b48d19063b461698322580402ce67e1233fa1480e571b35ca,2024-06-12T16:29:34.530000
CVE-2024-35722,0,1,2e6d40e808b87f9cc3afd3fe92f67b7f9b679f9fc483d9a2a452a3933a833b76,2024-06-12T16:29:22.497000
CVE-2024-35723,0,1,d21aa2ceb958c34983036417b55927b69725a1c80082efddfb006619febf87fb,2024-06-12T16:28:51.920000
CVE-2024-35724,0,1,3dcf56a5238fff86e0902a51c35aa1bbf1d6e4243c4c748bcdbe9328ad3cb3d6,2024-06-12T16:28:10.463000
CVE-2024-35725,0,1,276f09c680172cbb9c625bbd562e9e55d8cb15c0ae19e5da74ceb507e318f9d8,2024-06-12T16:27:55.390000
CVE-2024-35726,0,1,923fc98f297ebc14a7cd4aa382f37d2dbb48b57a67365e8f6804065b2625ca49,2024-06-12T16:27:05.920000
CVE-2024-35727,0,1,cd1bc1c7642d589d608eb5fbc76d5f9982b1e35e7746c63331eae50d9790b9bc,2024-06-12T16:26:55.247000
CVE-2024-35728,0,1,306fd0fcb80558a8a58d3e182d1bc6fcb13b5e686d98a23fefefa9b2415e6d65,2024-06-12T17:43:24.173000
CVE-2024-35729,0,1,0ea27869f1ce9b6503e333de597369ca39c33950492540d653a43ac76950edcb,2024-06-12T16:26:45.633000
CVE-2024-3573,0,0,f978306925f93ca64332932b6f5a09fb648fa8e8ad9d4b00bd427fd81ec82478,2024-04-16T13:24:07.103000
CVE-2024-35730,0,0,49335cae17539a2ff75d573d2c355a9e96d242f541f9939e3a5e291d5780cbb8,2024-06-10T02:52:08.267000
CVE-2024-35731,0,0,143fbc50e8cef612366366b66d67424075ebe4c9c1a8d543f78a4729c1a58e2a,2024-06-10T02:52:08.267000
CVE-2024-35732,0,0,7fdcba0fd7fddef85feb7e6673a8f96d3154b7974fa22b232cf3fd801d3f54de,2024-06-10T02:52:08.267000
CVE-2024-35733,0,0,a1ae2286f7bc76a6978fa6bf1b5fce5a756320de3c88f0e64dedfe42b522a5d8,2024-06-10T02:52:08.267000
CVE-2024-35734,0,0,4db4068d084716e23e2c716612575cf1c31577ae6452883821d760d3b2973e48,2024-06-10T02:52:08.267000
CVE-2024-35735,0,0,b0449a6fba46649e5663f9a33b4825977c92b11ac690bf46af299295386d8cd6,2024-06-10T12:40:41.360000
CVE-2024-35735,0,1,255e899388da84f45c210958c5d8702fbaa1352b1af6a25a9e4c37e262562a2e,2024-06-12T16:26:08.450000
CVE-2024-35736,0,0,ce53c5603569b56b066418efe2441dcc3ec4daf52569cea931f378aa336fd127,2024-06-10T02:52:08.267000
CVE-2024-35737,0,0,68b854bcf8f4224101727c49f7d231c73d532ff04fc75a01e1d9fe383907d041,2024-06-10T02:52:08.267000
CVE-2024-35738,0,0,b35b0370c2dd956489606373203db0f27e1293b12d9ab83c9b53ee18df600402,2024-06-10T02:52:08.267000
CVE-2024-35739,0,0,b4f70001f5f669ef8233f6bfef832af600079b2d34c768ea99133be9875bdb3d,2024-06-10T02:52:08.267000
CVE-2024-3574,0,0,a6cc99c8a389ea7db1c37fe05b40106752b73810cdac85caab18aeb26d6bc576,2024-04-16T13:24:07.103000
CVE-2024-35740,0,0,cd3c4df653c403e3da38132e6a2e32e99932f9e5ed5f1383de768204108321b2,2024-06-10T02:52:08.267000
CVE-2024-35741,0,0,707acb0728ba27890892df794126a1bdbb77c7090bf509b5331eaa5cd7510864,2024-06-10T12:40:41.360000
CVE-2024-35741,0,1,2398aa682188cccc3380c9f03f79a94b0e61bedb784ddc6bf6525e6c832a8362,2024-06-12T17:54:46.150000
CVE-2024-35742,0,0,fe154a3e8fa530687ef00116cc4be8a04e7fc1ca3143f50ff0ea0f84f7dba929,2024-06-10T12:40:41.360000
CVE-2024-35743,0,0,29d6eea7bd448b11e945733f64b67be9e8ecb2edf8f01a72dafd44540edfe8ec,2024-06-10T18:06:22.600000
CVE-2024-35744,0,0,9822a558ad9d00aa4023fd6faab648025e03c934557b0bc8cd760f944753571f,2024-06-10T18:06:22.600000
CVE-2024-35745,0,0,1c90816f94bb2e728472a304d5650b957d7933090f73780e95db9fa3c65e54b6,2024-06-10T18:06:22.600000
CVE-2024-35746,0,0,754459702d3b4286cf355f5093e8976c9d0822b900eb85e6677e362cc05698da,2024-06-10T18:06:22.600000
CVE-2024-35747,0,0,22e1bdde202cb0f39192a2e412391baf4691f68cbf2f46b0a3fbb0601b1f4a10,2024-06-10T18:06:22.600000
CVE-2024-35743,0,1,cdf57129513ee1ed4c8cf3c1eadcafc386204e60f908e5a57b98299bfc433ed5,2024-06-12T17:42:56.900000
CVE-2024-35744,0,1,9e54541e70135d5f75d1822350da3a752ee91afb0b56b1661f0c8acd6c0af81b,2024-06-12T17:42:12.707000
CVE-2024-35745,0,1,07997091a8cd648631b3f4b65df28a3ac2b2bc0c62bc29345dc307bf6450bbbe,2024-06-12T17:36:32.763000
CVE-2024-35746,0,1,6bfd0656dae71d387fa12929060a524c27e2e27454d60b936c90b1042e33379d,2024-06-12T17:36:02.087000
CVE-2024-35747,0,1,ccfdca49cb01bd94b0d2ef1d42ed69046774e7d23d14b1ca7e95e0cc185aa883,2024-06-12T17:32:52.343000
CVE-2024-35748,0,0,ab07387e8cbceeb936ade78e834c5c15ec3b5a2cc852cd848f3fc4076b8b7a4e,2024-06-12T13:30:18.963000
CVE-2024-35749,0,0,1d4109865cdef92c2876bf85af6a2839448c5bccd0ef1b4a023a36e807df8057,2024-06-10T18:06:22.600000
CVE-2024-3575,0,0,59be73eca5c53cbbcf99414bd65c6b74b4dff22ff5983c2d091439c46f610b22,2024-04-16T13:24:07.103000
@ -251936,9 +251939,9 @@ CVE-2024-36246,0,0,50338f85842e71924c1397e2b0a309f647146226696bf59a5411ba0e6e468
CVE-2024-3625,0,0,bb7fa72c43d725aef9f66641f31c3359a614ed8ba414acf9f05b8e44148cef81,2024-04-26T12:58:17.720000
CVE-2024-36255,0,0,22b21684452ad4563618ad5cee66dc719af723b04c8a1647fe9cf6d970347f9a,2024-05-28T12:39:28.377000
CVE-2024-3626,0,0,668faec6d18ac8a7c33197af94901aaf7ddac1dec4c77c1d646fba224d5f8541,2024-05-24T01:15:30.977000
CVE-2024-36263,1,1,312ddd7d473feff51ac1105b8caf39774ad5cc4baa598d6e64127638ab6b1c2b,2024-06-12T14:15:11.740000
CVE-2024-36264,1,1,df1652b5d4f8fdec9151b44c6bee68e7b79ea964f85d60d1119a3ac288515e4e,2024-06-12T14:15:11.983000
CVE-2024-36265,1,1,658a123de62463b33723513384456d0c520ad521423271f1482ccf0678fd76bb,2024-06-12T15:15:52.247000
CVE-2024-36263,0,1,04ea6f141e5e9883d4c0410a515e19097ad4d5fc98cc6380d6fe8513b8b1aa09,2024-06-12T17:15:50.363000
CVE-2024-36264,0,1,9ef31114da021eb9789083f1ed78ae2fc93afdf41a8bb695140a634b5b37f930,2024-06-12T17:15:50.447000
CVE-2024-36265,0,1,0079a3aa5b78f3732cbbe3adb7417ca40923c1032ca8fa54976ab501576b0297,2024-06-12T17:15:50.520000
CVE-2024-36266,0,0,83df454a9d264cabc9c075046ae12e249cd453c24f6de612ee1d9f73df0ef774,2024-06-11T13:54:12.057000
CVE-2024-36267,0,0,5b402628b4c430b8eab614a5b3330f6f2d186537f83ff9a60bb1a91e4b3c3cac,2024-05-30T13:15:41.297000
CVE-2024-3628,0,0,ad2a38a3d431944b5239dd67ace3bcd2603e3057c8d0a04d847db45516b0c9ea,2024-05-07T13:39:32.710000
@ -251994,12 +251997,12 @@ CVE-2024-36409,0,0,9cd16a7e24bd8394d1f0c2721003efcbffc242645298d2d4538f59e84a64e
CVE-2024-3641,0,0,c281de95cce057acff2793609e8f843aad579a2f0257c0c2e0b6442733e87b14,2024-05-16T13:03:05.353000
CVE-2024-36410,0,0,fac35f9377acbd5e62bae482d6b26ac497ea92f83ead8605ae0a4d55fc9e3cbf,2024-06-10T20:54:18.443000
CVE-2024-36411,0,0,aa7544310bc332364ee37edb0f84d400824d961008ffebd8db7c1ce2dc3e5b05,2024-06-10T20:54:18.443000
CVE-2024-36412,0,0,a619ad22a1d68a8f40d70d48464145488782bda6673d56d0e5135b2c234d7b82,2024-06-10T20:54:18.443000
CVE-2024-36413,0,0,1bc0e5f1f685a431b03d42fbd68d763214ac67bb9997a03ea1f72631820109c7,2024-06-10T20:54:18.443000
CVE-2024-36414,0,0,3be41dd255c0a86d13c6d2260ca2c592b7e0e326317bfe45eb58db95117d1d70,2024-06-10T20:54:18.443000
CVE-2024-36415,0,0,7d8a0c689183eef5c3c9de473b177c2b57d875c0e031aefe3739778bb4e71f3c,2024-06-10T20:54:18.443000
CVE-2024-36416,0,0,25503f980f12e01665c842f0d4fe1481ad1ead24e489f78749ca4f73e0f7490a,2024-06-10T20:54:18.443000
CVE-2024-36417,0,0,5fbc3ad347fb54c3e573e8cc7360062c2e8ae644325cc01e42d267f57f6377cc,2024-06-10T20:54:18.443000
CVE-2024-36412,0,1,548544c4ffb106ae4459efe54787516f7a8b91038e9bd99db46c682309c7b7b1,2024-06-12T18:00:00.317000
CVE-2024-36413,0,1,4069f61c28f83942cd6f32b01d400d2c9b955950d9c25442379f797d94d57edc,2024-06-12T17:59:44.673000
CVE-2024-36414,0,1,0b668116227fd5781118170b1cdfe9c95e50c019e2f7cf5a2f38009ed0ae2db9,2024-06-12T17:59:14.353000
CVE-2024-36415,0,1,97f30d08c26bffa9b2c4d6a7a9001234ed7c9da30e93e3ea400c7ad232ab473d,2024-06-12T17:58:53.497000
CVE-2024-36416,0,1,9328a3d2121fa2da1a29b5be1b12cf7cf7ba857605f6afc42d167fd6f6079815,2024-06-12T17:58:19.570000
CVE-2024-36417,0,1,7f72be2da88bd03f2618a97d909b76dab66b1196af11257e6aa2fac632513220,2024-06-12T17:58:04.477000
CVE-2024-36418,0,0,52272dc570f5081df6975298e5712cf123b760ef720bb4951287c4366378282e,2024-06-11T13:54:12.057000
CVE-2024-36419,0,0,e561cf6fec966fa1d9dbaeadf6c1b7f0c1186aebf1fa6c9a3ce263fb312ad74d,2024-06-11T13:54:12.057000
CVE-2024-3642,0,0,bbed1ee941355da6f32a6eba37e95a843dd7913c7dd227d8da7f65dcb683674b,2024-05-16T13:03:05.353000
@ -252049,8 +252052,8 @@ CVE-2024-36673,0,0,c3fdb493385fd7349af8a7f0f647aa65a0c25320dc90b659d1425197d89ce
CVE-2024-36674,0,0,80518ec37aaca3163e2f2a38f2de20c8dedbcb7f0e795fb382e532f1b66ca868,2024-06-03T19:23:17.807000
CVE-2024-36675,0,0,d8b3bb8705c0d8b166e699377141fb97d9735e483700819521a5fc1573c26a90,2024-06-11T16:49:10.457000
CVE-2024-3668,0,0,e416ac04a22e7361e1b734c255fae55a76bf75713df9c7a40bea0ebc10271344,2024-06-10T02:52:08.267000
CVE-2024-36691,1,1,944a46ac656889a9696e3fe8f6255974614c0406e7aac235d1568f2d0a69716c,2024-06-12T15:15:52.400000
CVE-2024-36699,1,1,c33de5439cf36817d49f836aea7b68397009f6184030920d6f1baaf60275cc77,2024-06-12T14:15:12.100000
CVE-2024-36691,0,0,944a46ac656889a9696e3fe8f6255974614c0406e7aac235d1568f2d0a69716c,2024-06-12T15:15:52.400000
CVE-2024-36699,0,0,c33de5439cf36817d49f836aea7b68397009f6184030920d6f1baaf60275cc77,2024-06-12T14:15:12.100000
CVE-2024-3670,0,0,c82d0130c8edc16344a78447d1514c5ffe18d421cd344e5799606a7730bedf8c,2024-05-02T18:00:37.360000
CVE-2024-36702,0,0,eb8976599a00e60736645541c2ea3028e0c597e6e7a8194352abb5bbb6fa2405,2024-06-11T19:16:07.697000
CVE-2024-3671,0,0,d4c07d059b6fad473ffadbf866eab2d0161459cafd3d5843ab40df0df4e33fe1,2024-05-22T12:46:53.887000
@ -252070,6 +252073,7 @@ CVE-2024-36743,0,0,947029ef079964db2f975300f543b502c98bef02b4c5f9f3d5de943b90d77
CVE-2024-36745,0,0,c21f6d498139c367702b2a5b310b830e45905feb661fd13e2ada12120c92ab59,2024-06-07T14:56:05.647000
CVE-2024-3675,0,0,00d1234baac079cf413c516618dd0fc3e7ad5eadaec0ab200df9e28f23d3ebe2,2024-05-02T18:00:37.360000
CVE-2024-3676,0,0,afffaa433a0219105ab8db2fc3cac72e262ac997e8b5329e1239c5388df90382,2024-05-14T19:17:55.627000
CVE-2024-36761,1,1,45e68de3caa2edbd8ec7e3d9314dfa2a85dcb79f20010465ff7c3f4953532c02,2024-06-12T16:15:11.983000
CVE-2024-3677,0,0,822256c91d31044a13b27ee319c8c0a4bbd148e7653d3ef44cb1c97299aa9fe7,2024-05-02T18:00:37.360000
CVE-2024-36773,0,0,be07270490997748ed5042323acf595cf65a4ec0fdf18429a47f38918783b6b9,2024-06-07T19:24:09.243000
CVE-2024-36774,0,0,2df072beaff79bc30583e2884ff43f38048f215ce893570cbe619b2c4b3ea848,2024-06-07T14:56:05.647000
@ -252095,7 +252099,7 @@ CVE-2024-36823,0,0,aad699347c3b05ee3cd9abd97cd2dd91acd777507ac0def145495f15e3829
CVE-2024-36827,0,0,cd2fc352996964585296a4acf2649e715a83e9269d8d0556b59991bed0a52931,2024-06-07T19:24:09.243000
CVE-2024-36837,0,0,47ca3391700f1c8fe38372397571450c964664f9edef8a6b063febfb6bda26de,2024-06-06T14:17:35.017000
CVE-2024-3684,0,0,e7edf7d6bce31b480b46d692afd4304c988268ba4618e87da8566dc118f2be92,2024-04-19T16:19:49.043000
CVE-2024-36840,1,1,bac3ed3fda3d6fc7fac0f55c6e88837f484a7539f6204e8fac1534d5bdd17173,2024-06-12T15:15:52.493000
CVE-2024-36840,0,0,bac3ed3fda3d6fc7fac0f55c6e88837f484a7539f6204e8fac1534d5bdd17173,2024-06-12T15:15:52.493000
CVE-2024-36843,0,0,dffd8a9db459cea7141db065370811228354e9ed0a00ef7accb6e04cac03982c,2024-06-03T14:46:24.250000
CVE-2024-36844,0,0,e97265dff1b9c5c617aea3c1ed095692195c0e84c6f318663f5bdfc9ec429f88,2024-06-03T14:46:24.250000
CVE-2024-36845,0,0,4b9d7b96ab3c57fe0fa6236fc4a20ae85e48dc606d8eba3c5478623a05a01e27,2024-06-03T14:46:24.250000
@ -252204,22 +252208,27 @@ CVE-2024-36968,0,0,f0f21aa6f4ea767dfafdd294c58686690201a864544403fb09f4a16273582
CVE-2024-36969,0,0,59e2acee532b11c3e63b43cffe867838c5cd47d8ce39b95770454986faf7fb4c,2024-06-10T02:52:08.267000
CVE-2024-3697,0,0,600d9314ffac8217c56b5ddb9a6dd8f383edc3a52ae15aefe26cd04d9d92b65a,2024-06-04T19:20:23.323000
CVE-2024-36970,0,0,50083cf534f5df621aa7bead6ce71043c6360c6ed1cf8d6bd9cf7a1a7b652265,2024-06-10T02:52:08.267000
CVE-2024-36971,0,1,82b8b9fbabc6d1a263f871b2e3cf77e6c0d2c9b2290e695c225e46a96ddc8130,2024-06-12T15:43:28.280000
CVE-2024-36971,0,0,82b8b9fbabc6d1a263f871b2e3cf77e6c0d2c9b2290e695c225e46a96ddc8130,2024-06-12T15:43:28.280000
CVE-2024-36972,0,0,639469afbfc3c8e61ad1446aeb28d8bbb041cd80eb7cb8c17f6c32ebdf799618,2024-06-12T10:15:31.347000
CVE-2024-3698,0,0,13b4029eb6179dbe788598788e16556a1995d850ddfc4af1ee0c4e86961a3a21,2024-05-17T02:40:04.800000
CVE-2024-3699,0,0,dd2e1591c868057b2d17bebcabb2164fe4c7f17553e4a5b77bcfe050bfd1e081,2024-06-10T12:40:41.360000
CVE-2024-3700,0,0,6dc3558d4ce4d0b98bd682199438a088f246b3a4a6bfc13ee9740e66c795b093,2024-06-10T12:40:41.360000
CVE-2024-3699,0,1,6e64dedcb1ec83e842b9c3ed18b374381a62ef4f7982a43d9405eeb95e55d0fc,2024-06-12T17:53:09.130000
CVE-2024-3700,0,1,f1913b84964a9a87ca4f78bbad55a262819a35385e2c066c91eaa7c4a1891262,2024-06-12T17:51:52.710000
CVE-2024-3701,0,0,d78f52a76181001272debccb095fb5971bb478ebc111313d9ff2994f4ec0598f,2024-04-15T13:15:31.997000
CVE-2024-37014,0,0,b77f6839311b0869c5eb96b5efcfe978df324e19579a4a9de32f13cdb9b04c12,2024-06-10T20:54:18.443000
CVE-2024-37014,0,1,c47c2b09802b94267a83a7981860e8f6f71032b8440b3dd55d1a2f768ec7199d,2024-06-12T17:57:01.660000
CVE-2024-37017,0,0,fd4284c5a2195342d9622b5d20527d4d58db85192e227730c5a741287dc835e4,2024-05-31T13:01:46.727000
CVE-2024-37018,0,0,92b8b0fbc5eb3b3ff9e996cdb38184b7cd381c3e78fdf37e960ede7860319106,2024-05-31T13:01:46.727000
CVE-2024-37019,0,0,c7b7779ae7837bd324c73dde7cb1a43454b31469d3554588beff0fd2aed9bc3d,2024-06-03T19:23:17.807000
CVE-2024-3703,0,0,46d289814974ee20b6160fe56cc828277066d832a1c60ccf5d9c1a62d06c47e2,2024-05-03T12:48:41.067000
CVE-2024-37031,0,0,967b2a62510a1f35de5969f18efe9a7e1918d9bc4c74d0011148e6a904de3800,2024-06-03T14:46:24.250000
CVE-2024-37032,0,0,2fd16d835b1a2cd56c97d409a29d6a495e6793f4206084713a4efe57de2f2107,2024-05-31T13:01:46.727000
CVE-2024-37036,1,1,419b32893b7c15b1ad5886eee490ad49f9f76afce4dc71f5feadde311f406369,2024-06-12T17:15:50.637000
CVE-2024-37037,1,1,9717fa38c618eabcfe1f3f2a1df3fd72894a992126d0ee2e1290f2219868f934,2024-06-12T17:15:50.853000
CVE-2024-37038,1,1,2adaf850c80e6bddd36fbdba564518a6090262b1b15eac3d2f8554f70811ee8b,2024-06-12T17:15:51.080000
CVE-2024-37039,1,1,871fbad7e4cd60608e22285ba1036c660d58782590c4808c122d51a46c8029de,2024-06-12T17:15:51.313000
CVE-2024-3704,0,0,ad7f205e31bc442943bbd584692b194a3485d815654eeb83e4eefef6a6eff393,2024-04-15T13:15:51.577000
CVE-2024-37040,1,1,2e4e3e051164ccd059ed47f35e3875e946b2ab9f4ffaa3045c5f164c197e72b8,2024-06-12T17:15:51.540000
CVE-2024-3705,0,0,44f1c76d2f6cd8dab882ddfdbdbe908a4e3a8f22d6a90f31f0279b7faf87a669,2024-04-15T13:15:51.577000
CVE-2024-37051,0,0,d8875f6c50c15bfcc0dee4e0bfc6dba64eaecb94fd955f9b9c8a653950cce8ed,2024-06-10T18:06:22.600000
CVE-2024-37051,0,1,0d2e5970f87c8d9c22ba6507f170a3b81c5f970d2e6b258a94c4dded4fd0590b,2024-06-12T17:49:04.017000
CVE-2024-37052,0,0,b5eb259457f95c1e8621c6844ccb575aa5920121a474c1c74037900643b492aa,2024-06-04T16:57:41.053000
CVE-2024-37053,0,0,1081c2339448dc4a976b760458c506e7c94aa413116003d5e0e73d2124757682,2024-06-04T16:57:41.053000
CVE-2024-37054,0,0,dd5e5c1cbe28a100cc6cbec6281d65acc5f0b582cd904acdbac1ca15040981ec,2024-06-04T16:57:41.053000
@ -252276,10 +252285,11 @@ CVE-2024-37293,0,0,129a6721f34b93e77a75c2bc87f624b2823628bad71e52c3afb55c8517a9e
CVE-2024-37294,0,0,6bccada75d840bb27019cce9f7bf25d38e77606963a80a01cd808306aef03266,2024-06-11T15:16:09.467000
CVE-2024-37295,0,0,489b7cf64c9161735dcc4e60b77f6320915669d39993b442952b536afb71d58f,2024-06-11T15:16:09.710000
CVE-2024-37296,0,0,2aaf9d94ef056cce09e0b5724aee7c4e629647a09dbe0d79a994991f97a3ce49,2024-06-11T15:16:09.963000
CVE-2024-37297,1,1,577a76783d232067279e3b65b1d0e5486f1ee5085aad4d7376d7ace51c240070,2024-06-12T15:15:52.677000
CVE-2024-37297,0,0,577a76783d232067279e3b65b1d0e5486f1ee5085aad4d7376d7ace51c240070,2024-06-12T15:15:52.677000
CVE-2024-3730,0,0,a30960de1676c855ee35b61976bc4581959cd1a98a7ba3127a461fb7fc955146,2024-04-25T13:18:02.660000
CVE-2024-37300,1,1,e695bf813c4b2c9ac897c60297973f24cdf1699ac80492d5b5ef8d3561eea312,2024-06-12T16:15:12.097000
CVE-2024-37301,0,0,1426a850b241ee3963e992e98f12d9875eb125b26184e9013bd9eaf89532808e,2024-06-11T19:16:07.890000
CVE-2024-37304,1,1,a0d53a238603c7b00022def6bac211f79e2e4865ec26e30c72b3c7b78c9449ba,2024-06-12T15:15:52.910000
CVE-2024-37304,0,0,a0d53a238603c7b00022def6bac211f79e2e4865ec26e30c72b3c7b78c9449ba,2024-06-12T15:15:52.910000
CVE-2024-3731,0,0,bdcc8f677627b7b108ec8e839a01e7cc6ba34354d6004394dff79046d7838f40,2024-04-19T13:10:25.637000
CVE-2024-3732,0,0,47b10b9e83ea0bac70990c3295c25b56cc73657af82bc6f5c1f4fd37930f5edb,2024-04-23T12:52:09.397000
CVE-2024-37325,0,0,7aad069d9af71aa89b0a02f611badaa27cd28b4488184423f704e55afa4d20d1,2024-06-11T17:16:04.477000
@ -252295,7 +252305,7 @@ CVE-2024-37384,0,0,60b664762f9333df5975c65ab9b722a03bcb9e931609f92fdae7cd1cf2f9f
CVE-2024-37385,0,0,ab67b8a0f073ce7f5c28ca11584627dbf70b59e11b1337a1068ce1887aeb0943,2024-06-07T14:56:05.647000
CVE-2024-37388,0,0,4bb786bca42a11ef8edd07a6799bb4caedfa95038e4371ae55f637f2792eab26,2024-06-07T19:24:09.243000
CVE-2024-3739,0,0,18ca969c974b63c6d16494fbcc2d63756747cacc5947332fefb20d9c592537e4,2024-05-17T02:40:06.067000
CVE-2024-37393,0,0,8ba5c8946b351653ceff6bd5df66edb54eab4cc929c4eabb64b6a9119181a3a6,2024-06-10T20:54:18.443000
CVE-2024-37393,0,1,adb4710ef8d4e8e5b898aa80bff6a41a92b599e232f1db44a8b62c91938837ef,2024-06-12T17:56:23.390000
CVE-2024-3740,0,0,1025f598f3437296a5a18526d2723c88eb3b5b46ea06c50b765dc694c6a0bd1a,2024-05-17T02:40:06.170000
CVE-2024-37407,0,0,aec5c198a3463e3996afdb2b87dcd156119620da199d8e9853297e329cd2e74b,2024-06-10T02:52:08.267000
CVE-2024-37408,0,0,43de84338ac833cd78092ec836ae8beffbac830f1aa1a52e6c8ca816bfb77c27,2024-06-10T02:52:08.267000
@ -252314,9 +252324,9 @@ CVE-2024-37535,0,0,07f7d930de9d2427116ed26f9657c7962aa8122c29cd0ba965c2b1ee75b9b
CVE-2024-3755,0,0,255cc63bdc34aca663119fb8f6757a7da5a9acef7ecda034d88dc05babf4b05b,2024-05-06T12:44:56.377000
CVE-2024-3756,0,0,978b8204ea279199334a4c8c549150dc6420f24480b5effb717e8509749d66aa,2024-05-06T12:44:56.377000
CVE-2024-37568,0,0,c31dda2ce4e2cf1c14da8896dd1ff7847e88710326c3ff8a35f20f8d9a2e2a98,2024-06-12T13:29:13.877000
CVE-2024-37569,0,0,08c1891a4f2e9a9f8094d5311d33bdc72f2171a0dbb5eee314560ac561c52cf6,2024-06-10T02:52:08.267000
CVE-2024-37569,0,1,748406cd7b0e731a2b9037b16c6d1dde7e8c81aa1003e1ce6c82275ceb288683,2024-06-12T16:32:56.203000
CVE-2024-3757,0,0,62301a2775fcbfb9e8b5b1aa90b79aa074cd639699f2863765d338333af4b798,2024-05-07T13:39:32.710000
CVE-2024-37570,0,0,94c8be9721672d33d79e5a2eb9683d914a73ca2e3a587358e24a24aa5cca8bc3,2024-06-10T02:52:08.267000
CVE-2024-37570,0,1,a374041c2622c9ba66d2048315fc9e015af6a8717cce4f8beb5b59800398626a,2024-06-12T16:32:34.513000
CVE-2024-3758,0,0,3ea9ecbea279ca1eb1159e542db09b1cab2d2435be79c6a6a563dc4d73ca4285,2024-05-07T13:39:32.710000
CVE-2024-3759,0,0,20211226ea875c33805e71e9c0afa18c7ce1ad112702c8859afd48ee84347f62,2024-05-07T13:39:32.710000
CVE-2024-3761,0,0,c0af44e486388b5bef077e784125f415f33c54c3c3a8677d0ab80af1f3e8df6c,2024-05-20T13:00:04.957000
@ -252344,8 +252354,9 @@ CVE-2024-3784,0,0,c3548262a5dd94ab612636409a3bf8cd74017da9deb24debb2f77536fe2746
CVE-2024-3785,0,0,fc93f2e321d044bf7a0ccc45f351722880d9f0bf94368b28b702ab59c5cb3144,2024-04-15T19:12:25.887000
CVE-2024-3786,0,0,e7dff42d10ea5f51aefb5b7728f1b7d65e7bf6f944a436f82b5cbbe6bdc82c9e,2024-04-15T19:12:25.887000
CVE-2024-3787,0,0,570870b6338590c353431fe2587b532b039679da85c30ab8bb196a257bca2d47,2024-05-14T16:11:39.510000
CVE-2024-37878,1,1,8f7712233494afef3eb7225c90d712354063c6005f7fa9f8e86929491655b1bd,2024-06-12T17:15:51.803000
CVE-2024-3788,0,0,746d07fda684df68d3fb292ada95a2bfbbf82c49ef53e13b55d1c7f158f32ee7,2024-05-14T16:11:39.510000
CVE-2024-37880,0,0,cd5ee8253e37142811bfa5bcca28d4b2f1c32547d7ddf9ac5732f94c185d6664,2024-06-10T02:52:08.267000
CVE-2024-37880,0,1,8fc2a7037c003cd05c8204143fd08c5c781310cbac1dbb1e80c2c17a0b28d4e3,2024-06-12T16:30:15.053000
CVE-2024-3789,0,0,63d455d46acf2815a86f3b9bf286e732f6c1d2d557d093772c64f0c37d315365,2024-05-14T16:11:39.510000
CVE-2024-3790,0,0,ea62135e66a6e7a74daddc8d443b8b9750f000d596c0e5f30e202f53e21ec40b,2024-05-14T16:11:39.510000
CVE-2024-3791,0,0,9bc6cec70e672f5f7f9ccdb1c0603c19b269c41965293930113b85d0de980142,2024-05-14T16:11:39.510000
@ -253043,9 +253054,9 @@ CVE-2024-4736,0,0,35e0fe51ccd6e16c666173722ffd72f471827cead112caeaf869dd95515427
CVE-2024-4737,0,0,0d605ad76fcca9d9a8748ea1570213b2a20be8e7af59e1490aa0de37640ee426,2024-06-04T19:20:48.597000
CVE-2024-4738,0,0,703597dd680fa7def2747a141a4237503bd7e8917e070a49546a7e715e951f69,2024-06-04T19:20:48.783000
CVE-2024-4743,0,0,e42c9380fd03fa2e7e8dd1d108eb6ee48e234f06ee604011f8e8a51de81bb3cb,2024-06-11T17:32:50.367000
CVE-2024-4744,0,0,58a292f0991440815bda1982c64fa673d2647379e91b7d563512a421e417b184,2024-06-10T12:40:41.360000
CVE-2024-4745,0,0,f9dc606a5e4c521176fdcdd05c5bf69502f1d4e2e04b134cfd3bcdd72aba1b32,2024-06-10T12:40:41.360000
CVE-2024-4746,0,0,106a7251b4a60a86c21027852f1ca8deee3cf7597b635fb1229b8aa4a30a0153,2024-06-10T12:40:41.360000
CVE-2024-4744,0,1,00389d0f632a53abd6687abe1695ed0d94106b42a5446a5e1de91a20dcdffac8,2024-06-12T16:44:12.157000
CVE-2024-4745,0,1,52090afb58a281a3371ee6c6ad54ec80b0aac7a7ded5dbbe0e95b57b1a9dc746,2024-06-12T16:23:34.197000
CVE-2024-4746,0,1,f4f2ac85907c7b5b329cbda786b397a3fc954bb6f671df10eda8148346b3a114,2024-06-12T16:17:42.223000
CVE-2024-4747,0,0,99152f6494a1192f3bae59b436abcc51d11f811ed1e0a72c2e65c8381fda6054,2024-05-14T16:11:39.510000
CVE-2024-4749,0,0,676e331864bc41907c4c80c44886e7dac480ef6dea2c29bc22838d992753d4da,2024-06-04T16:57:41.053000
CVE-2024-4750,0,0,423585a3e250903ac62d761ecb0e0e6dc6b4649ccd4411b90275a4e6d2f87495,2024-06-04T16:57:41.053000
@ -253471,7 +253482,7 @@ CVE-2024-5384,0,0,fc8a760c5f8c6533d32783fcf44bb063e589b4e165b4e3e16391c3aeb9ec5e
CVE-2024-5385,0,0,bc3c0d01b2051e708e659a5c3590b7dd8cb9dd588e93f64ca3944fc804f9c929,2024-05-28T12:39:28.377000
CVE-2024-5387,0,0,857b2af9507e1fb781392f9f45599eb9ea380f1e8b91dd3c69ea7be187de1f2a,2024-06-03T19:15:09.500000
CVE-2024-5388,0,0,0c90149987e278137050d2b65080c43dd31aa72e74992bde244a30e0d49fbf46,2024-06-03T19:15:09.557000
CVE-2024-5389,0,0,c86597f1600c5fdddd26daac7c1467820b6c39acf37385ce35cae139e30a2c14,2024-06-10T02:52:08.267000
CVE-2024-5389,0,1,b03364a2f4d6f0b56bedc45ec6b964cb0ed203a7d91090b995d6798f5653a980,2024-06-12T16:31:30.577000
CVE-2024-5390,0,0,7bbbc0fbbf0080c37ea508796076f5055d10a83119ccd7fea3223bbf180b1d73,2024-06-04T19:21:08.020000
CVE-2024-5391,0,0,00f61420375c40b8d29b33273a9abb170480b355b8f71230d76cd6238a9db4ff,2024-06-07T20:15:12.687000
CVE-2024-5392,0,0,f7219b2013d34cef28a688dbd5b89c3b8013dcb24b8103dca8d259a586db6696,2024-06-04T19:21:08.117000
@ -253559,11 +253570,14 @@ CVE-2024-5543,0,0,1f8dadf7ddfb1e1c1a8006df6622727e1de688b7f483cab717adee12c7f279
CVE-2024-5550,0,0,e4fc13aea5b719d7c555043aa9a8be47a59e2f4d5eac2e9fa0d5ff8a8edb892f,2024-06-07T14:56:05.647000
CVE-2024-5552,0,0,12abaaddd513e722275738643d6cd32f6bb9e257da98294dd5bedf4ad4cbf55d,2024-06-07T14:56:05.647000
CVE-2024-5553,0,0,3f2e6115738134af7d285604a77d6396ef9f781ed1953efa7c72f957ec883035,2024-06-12T04:15:13.127000
CVE-2024-5557,1,1,846a1b5724880eee14b60af63bb003aea0869123c1e447b716eab3576476cae9,2024-06-12T17:15:51.943000
CVE-2024-5558,1,1,8a2a6beaaea21cb5c7551abc76b759f246695b8ddd48af468f7d6b90b9bf0565,2024-06-12T17:15:52.160000
CVE-2024-5560,1,1,ef0761cc09cb2a3b612bdc0fa8d549dbc116ec36d61e23df3cadcf2b2b11eaf9,2024-06-12T17:15:52.357000
CVE-2024-5564,0,0,cd961630c6982ea90916e9cc290067a2c4a02a79292d87af6b0ec76760478ca9,2024-06-03T14:46:24.250000
CVE-2024-5565,0,0,830316f5c713618fdad4a0eda5b7296c22d5d93c87a8813197db3ff9cf28c4ee,2024-05-31T19:14:47.793000
CVE-2024-5571,0,0,105c4e644019eeccf72c6e63813cdc36601b1b9a7e3cba5bc172df86631261e6,2024-06-11T17:29:03.277000
CVE-2024-5584,0,0,612eacfcf6c3fd3d6fdd0ff2c66e496cc817b02568ea9f69c40277bbc0300578,2024-06-11T13:54:12.057000
CVE-2024-5585,0,0,72613efdbdb78d29e0276b6193cc5c7551de5a3d6d4b70998b9e754a062f01fd,2024-06-12T02:15:10.907000
CVE-2024-5585,0,1,23f2e7b2ee30c2e56251fdffeaabd2833482d3483754dca28b1f5ab4921ddb38,2024-06-12T17:15:04.083000
CVE-2024-5587,0,0,9180b0762a5a5a7a17ce70cd861bdf25e955d88caf903bee442f7c48a0a2a218,2024-06-03T14:46:24.250000
CVE-2024-5588,0,0,21589c4423d1fee081cb695dd8009f3bd5a36bd74dae1713c28449f0da1cd8d1,2024-06-04T19:21:10.267000
CVE-2024-5589,0,0,dc63c38434ce5bb089af0d0f8aa09f6a46f1fae34dd45c15f4542741dea047b7,2024-06-03T14:46:24.250000
@ -253617,6 +253631,7 @@ CVE-2024-5739,0,0,5773cc5124d6a6a0e954a481f5ce31fb721ea51c10912a509188eda9635d70
CVE-2024-5742,0,0,d09d1105fb5596a722b05fe43f0b05eb11b548e04093f54406c8e99009264b31,2024-06-12T09:15:23.037000
CVE-2024-5745,0,0,8788b99580d43fd9eb900afb700ee157c954d289b603d58451eabd57873852f0,2024-06-08T04:15:10.027000
CVE-2024-5758,0,0,60f3603833ce9f04e269788c1d2a3370191ec81ac34b615f7c4c140d7286ef3a,2024-06-10T02:52:08.267000
CVE-2024-5759,1,1,826729e04d02664132e22a6c7cc2d0756738f94f6ebbdeb3f8b7aba1ab3ed272,2024-06-12T16:15:12.550000
CVE-2024-5761,0,0,e0022a8d80317cd3941058bae14b514f68707790a5051038049a1d552ba8de69,2024-06-07T19:15:24.467000
CVE-2024-5766,0,0,86ed0bd8ec5f973a61dc526186a645f1ec84961008a0f608efabd599d39dbfeb,2024-06-10T02:52:08.267000
CVE-2024-5770,0,0,2161bc3bb7995521a02976cf67b0f5030935d13dcc8500f4bdfe07ad52c43c37,2024-06-10T02:52:08.267000
@ -253659,8 +253674,16 @@ CVE-2024-5846,0,0,ea2553e0459d3fe8bc5c2385de9bf7e5d83dc4f66cd2b3387989ad5992e58b
CVE-2024-5847,0,0,1f8e8b788cae00065716e021a76263fe6498d5293d83d97bb67786e0b5765cb1,2024-06-11T21:15:55.500000
CVE-2024-5851,0,0,812870dd68f694f8cb7317d5a8b0b798b4c33892ccc0a6c22c4a632bb6af2576,2024-06-11T19:16:08.300000
CVE-2024-5873,0,0,4affe4b1f71505ca05298a33c7e23c3ae147869580237755bed2d180fbea1b8e,2024-06-12T08:15:51.550000
CVE-2024-5891,1,1,81d9f8b71bacc11f5dc360efb1b0d50499697611b49f365c1b4a23895b7163be,2024-06-12T14:15:12.460000
CVE-2024-5891,0,0,81d9f8b71bacc11f5dc360efb1b0d50499697611b49f365c1b4a23895b7163be,2024-06-12T14:15:12.460000
CVE-2024-5892,0,0,aedbf3b6ff4f72315e0710a5e0053eef0159f2cd6280fed23810bd46e4afaad4,2024-06-12T06:15:09.473000
CVE-2024-5893,1,1,75a17ab9c78de4e86da4ff51cb3473e6f5cc4487a936043b29cff71664107009,2024-06-12T15:15:53.393000
CVE-2024-5894,1,1,7a3b9e35f82b06ba3832b29b7a4adfea2b9b21ad7b996e37db3c45efd09e4655,2024-06-12T15:15:53.693000
CVE-2024-5895,1,1,ef4becbdaae8731d4c9d3f6a2de4c570b3a9c61f102e39b10564fa421edd1d54,2024-06-12T15:15:53.970000
CVE-2024-5893,0,0,75a17ab9c78de4e86da4ff51cb3473e6f5cc4487a936043b29cff71664107009,2024-06-12T15:15:53.393000
CVE-2024-5894,0,0,7a3b9e35f82b06ba3832b29b7a4adfea2b9b21ad7b996e37db3c45efd09e4655,2024-06-12T15:15:53.693000
CVE-2024-5895,0,0,ef4becbdaae8731d4c9d3f6a2de4c570b3a9c61f102e39b10564fa421edd1d54,2024-06-12T15:15:53.970000
CVE-2024-5896,1,1,fcf5296c2788d50a4e3e3f6e2cb1498459d444e2a307e12bcb8876663fa70daa,2024-06-12T16:15:12.813000
CVE-2024-5897,1,1,f9281e8cf1c734c32c576230787d605b9edc06b2bbd66417230ea66875c948d1,2024-06-12T16:15:13.100000
CVE-2024-5898,1,1,a383de97f183d5da1095b93fb673284ec976562346d25b45514d64e83363d39b,2024-06-12T17:15:52.577000
CVE-2024-5905,1,1,77997da49aa614d8a0b29e43ca0c737b0ef385d8943e3b4311ac9b2cbaa7e5d7,2024-06-12T17:15:52.847000
CVE-2024-5906,1,1,8cc560f93bbe808a9ea853048fdaa00c673f479a1d2ddb7b71a9502e5a18ef3d,2024-06-12T17:15:53
CVE-2024-5907,1,1,b53d98cdcb442fa876a10088ac4c90e01e6ec348ba1c48bed7649b88fa30b261,2024-06-12T17:15:53.127000
CVE-2024-5908,1,1,d9b80954d4874d7eb96578d91cf708f9b239ec2d165443b371c1c3a363fdeeeb,2024-06-12T17:15:53.253000
CVE-2024-5909,1,1,44931b98792dc6a4c493e85b21256417760100cc9456bc7c70bd1873ae28f015,2024-06-12T17:15:53.370000

Can't render this file because it is too large.