From 22d96ce05b9f48b026d8aeb88f8c4b71d539dc52 Mon Sep 17 00:00:00 2001 From: cad-safe-bot Date: Mon, 22 Apr 2024 12:03:29 +0000 Subject: [PATCH] Auto-Update: 2024-04-22T12:00:37.480482+00:00 --- CVE-2024/CVE-2024-26xx/CVE-2024-2609.json | 6 ++- CVE-2024/CVE-2024-326xx/CVE-2024-32681.json | 55 +++++++++++++++++++++ CVE-2024/CVE-2024-326xx/CVE-2024-32682.json | 55 +++++++++++++++++++++ CVE-2024/CVE-2024-326xx/CVE-2024-32684.json | 55 +++++++++++++++++++++ CVE-2024/CVE-2024-326xx/CVE-2024-32687.json | 55 +++++++++++++++++++++ CVE-2024/CVE-2024-326xx/CVE-2024-32688.json | 55 +++++++++++++++++++++ CVE-2024/CVE-2024-326xx/CVE-2024-32691.json | 55 +++++++++++++++++++++ CVE-2024/CVE-2024-326xx/CVE-2024-32698.json | 4 ++ CVE-2024/CVE-2024-33xx/CVE-2024-3302.json | 6 ++- CVE-2024/CVE-2024-38xx/CVE-2024-3852.json | 6 ++- CVE-2024/CVE-2024-38xx/CVE-2024-3854.json | 6 ++- CVE-2024/CVE-2024-38xx/CVE-2024-3857.json | 6 ++- CVE-2024/CVE-2024-38xx/CVE-2024-3859.json | 6 ++- CVE-2024/CVE-2024-38xx/CVE-2024-3861.json | 6 ++- CVE-2024/CVE-2024-38xx/CVE-2024-3864.json | 6 ++- README.md | 32 +++++++----- _state.csv | 36 ++++++++------ 17 files changed, 415 insertions(+), 35 deletions(-) create mode 100644 CVE-2024/CVE-2024-326xx/CVE-2024-32681.json create mode 100644 CVE-2024/CVE-2024-326xx/CVE-2024-32682.json create mode 100644 CVE-2024/CVE-2024-326xx/CVE-2024-32684.json create mode 100644 CVE-2024/CVE-2024-326xx/CVE-2024-32687.json create mode 100644 CVE-2024/CVE-2024-326xx/CVE-2024-32688.json create mode 100644 CVE-2024/CVE-2024-326xx/CVE-2024-32691.json diff --git a/CVE-2024/CVE-2024-26xx/CVE-2024-2609.json b/CVE-2024/CVE-2024-26xx/CVE-2024-2609.json index 5f9df651aa1..63d1c03e186 100644 --- a/CVE-2024/CVE-2024-26xx/CVE-2024-2609.json +++ b/CVE-2024/CVE-2024-26xx/CVE-2024-2609.json @@ -2,7 +2,7 @@ "id": "CVE-2024-2609", "sourceIdentifier": "security@mozilla.org", "published": "2024-03-19T12:15:08.910", - "lastModified": "2024-04-19T17:15:54.660", + "lastModified": "2024-04-22T10:15:06.997", "vulnStatus": "Awaiting Analysis", "descriptions": [ { @@ -24,6 +24,10 @@ "url": "https://lists.debian.org/debian-lts-announce/2024/04/msg00012.html", "source": "security@mozilla.org" }, + { + "url": "https://lists.debian.org/debian-lts-announce/2024/04/msg00013.html", + "source": "security@mozilla.org" + }, { "url": "https://www.mozilla.org/security/advisories/mfsa2024-12/", "source": "security@mozilla.org" diff --git a/CVE-2024/CVE-2024-326xx/CVE-2024-32681.json b/CVE-2024/CVE-2024-326xx/CVE-2024-32681.json new file mode 100644 index 00000000000..97293314954 --- /dev/null +++ b/CVE-2024/CVE-2024-326xx/CVE-2024-32681.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2024-32681", + "sourceIdentifier": "audit@patchstack.com", + "published": "2024-04-22T11:15:46.287", + "lastModified": "2024-04-22T11:15:46.287", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Missing Authorization vulnerability in BdThemes Prime Slider \u2013 Addons For Elementor.This issue affects Prime Slider \u2013 Addons For Elementor: from n/a through 3.13.2.\n\n" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 4.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/vulnerability/bdthemes-prime-slider-lite/wordpress-prime-slider-plugin-3-13-2-broken-access-control-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-326xx/CVE-2024-32682.json b/CVE-2024/CVE-2024-326xx/CVE-2024-32682.json new file mode 100644 index 00000000000..74094a78866 --- /dev/null +++ b/CVE-2024/CVE-2024-326xx/CVE-2024-32682.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2024-32682", + "sourceIdentifier": "audit@patchstack.com", + "published": "2024-04-22T11:15:46.630", + "lastModified": "2024-04-22T11:15:46.630", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Missing Authorization vulnerability in BdThemes Prime Slider \u2013 Addons For Elementor.This issue affects Prime Slider \u2013 Addons For Elementor: from n/a through 3.13.2.\n\n" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "availabilityImpact": "LOW", + "baseScore": 7.1, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 4.2 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/vulnerability/bdthemes-prime-slider-lite/wordpress-prime-slider-plugin-3-13-2-broken-access-control-vulnerability-2?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-326xx/CVE-2024-32684.json b/CVE-2024/CVE-2024-326xx/CVE-2024-32684.json new file mode 100644 index 00000000000..568170ccf7f --- /dev/null +++ b/CVE-2024/CVE-2024-326xx/CVE-2024-32684.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2024-32684", + "sourceIdentifier": "audit@patchstack.com", + "published": "2024-04-22T11:15:46.810", + "lastModified": "2024-04-22T11:15:46.810", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Missing Authorization vulnerability in Wpmet Wp Ultimate Review.This issue affects Wp Ultimate Review: from n/a through 2.2.5.\n\n" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/vulnerability/wp-ultimate-review/wordpress-wp-ultimate-review-plugin-2-2-5-broken-access-control-on-review-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-326xx/CVE-2024-32687.json b/CVE-2024/CVE-2024-326xx/CVE-2024-32687.json new file mode 100644 index 00000000000..bcf9a3a70d3 --- /dev/null +++ b/CVE-2024/CVE-2024-326xx/CVE-2024-32687.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2024-32687", + "sourceIdentifier": "audit@patchstack.com", + "published": "2024-04-22T11:15:47.000", + "lastModified": "2024-04-22T11:15:47.000", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Missing Authorization vulnerability in WPClever WPC Frequently Bought Together for WooCommerce.This issue affects WPC Frequently Bought Together for WooCommerce: from n/a through 7.0.3.\n\n" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 4.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/vulnerability/woo-bought-together/wordpress-wpc-frequently-bought-together-for-woocommerce-plugin-7-0-3-broken-access-control-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-326xx/CVE-2024-32688.json b/CVE-2024/CVE-2024-326xx/CVE-2024-32688.json new file mode 100644 index 00000000000..7d34a4716c4 --- /dev/null +++ b/CVE-2024/CVE-2024-326xx/CVE-2024-32688.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2024-32688", + "sourceIdentifier": "audit@patchstack.com", + "published": "2024-04-22T11:15:47.177", + "lastModified": "2024-04-22T11:15:47.177", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Missing Authorization vulnerability in Long Watch Studio MyRewards.This issue affects MyRewards: from n/a through 5.3.0.\n\n" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 6.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/vulnerability/woorewards/wordpress-myrewards-plugin-5-3-0-broken-access-control-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-326xx/CVE-2024-32691.json b/CVE-2024/CVE-2024-326xx/CVE-2024-32691.json new file mode 100644 index 00000000000..e9f0bef8bf3 --- /dev/null +++ b/CVE-2024/CVE-2024-326xx/CVE-2024-32691.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2024-32691", + "sourceIdentifier": "audit@patchstack.com", + "published": "2024-04-22T11:15:47.363", + "lastModified": "2024-04-22T11:15:47.363", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Missing Authorization vulnerability in realmag777 Active Products Tables for WooCommerce.This issue affects Active Products Tables for WooCommerce: from n/a through 1.0.6.2.\n\n" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 5.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/vulnerability/profit-products-tables-for-woocommerce/wordpress-active-products-tables-for-woocommerce-plugin-1-0-6-2-broken-access-control-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-326xx/CVE-2024-32698.json b/CVE-2024/CVE-2024-326xx/CVE-2024-32698.json index f5a07febb0f..af227704ae2 100644 --- a/CVE-2024/CVE-2024-326xx/CVE-2024-32698.json +++ b/CVE-2024/CVE-2024-326xx/CVE-2024-32698.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Leevio Happy Addons for Elementor allows Stored XSS.This issue affects Happy Addons for Elementor: from n/a through 3.10.4.\n\n" + }, + { + "lang": "es", + "value": "La vulnerabilidad de neutralizaci\u00f3n inadecuada de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en Leevio Happy Addons para Elementor permite almacenar XSS. Este problema afecta a Happy Addons para Elementor: desde n/a hasta 3.10.4." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-33xx/CVE-2024-3302.json b/CVE-2024/CVE-2024-33xx/CVE-2024-3302.json index 454ee053445..fdcc8a2ba83 100644 --- a/CVE-2024/CVE-2024-33xx/CVE-2024-3302.json +++ b/CVE-2024/CVE-2024-33xx/CVE-2024-3302.json @@ -2,7 +2,7 @@ "id": "CVE-2024-3302", "sourceIdentifier": "security@mozilla.org", "published": "2024-04-16T16:15:08.310", - "lastModified": "2024-04-19T11:15:44.510", + "lastModified": "2024-04-22T10:15:07.367", "vulnStatus": "Awaiting Analysis", "descriptions": [ { @@ -28,6 +28,10 @@ "url": "https://lists.debian.org/debian-lts-announce/2024/04/msg00012.html", "source": "security@mozilla.org" }, + { + "url": "https://lists.debian.org/debian-lts-announce/2024/04/msg00013.html", + "source": "security@mozilla.org" + }, { "url": "https://www.mozilla.org/security/advisories/mfsa2024-18/", "source": "security@mozilla.org" diff --git a/CVE-2024/CVE-2024-38xx/CVE-2024-3852.json b/CVE-2024/CVE-2024-38xx/CVE-2024-3852.json index 2a241a830c7..edc228441e1 100644 --- a/CVE-2024/CVE-2024-38xx/CVE-2024-3852.json +++ b/CVE-2024/CVE-2024-38xx/CVE-2024-3852.json @@ -2,7 +2,7 @@ "id": "CVE-2024-3852", "sourceIdentifier": "security@mozilla.org", "published": "2024-04-16T16:15:08.357", - "lastModified": "2024-04-19T17:15:55.047", + "lastModified": "2024-04-22T10:15:07.430", "vulnStatus": "Awaiting Analysis", "descriptions": [ { @@ -24,6 +24,10 @@ "url": "https://lists.debian.org/debian-lts-announce/2024/04/msg00012.html", "source": "security@mozilla.org" }, + { + "url": "https://lists.debian.org/debian-lts-announce/2024/04/msg00013.html", + "source": "security@mozilla.org" + }, { "url": "https://www.mozilla.org/security/advisories/mfsa2024-18/", "source": "security@mozilla.org" diff --git a/CVE-2024/CVE-2024-38xx/CVE-2024-3854.json b/CVE-2024/CVE-2024-38xx/CVE-2024-3854.json index 67d8b4bccea..0149c467d63 100644 --- a/CVE-2024/CVE-2024-38xx/CVE-2024-3854.json +++ b/CVE-2024/CVE-2024-38xx/CVE-2024-3854.json @@ -2,7 +2,7 @@ "id": "CVE-2024-3854", "sourceIdentifier": "security@mozilla.org", "published": "2024-04-16T16:15:08.440", - "lastModified": "2024-04-19T17:15:55.087", + "lastModified": "2024-04-22T10:15:07.470", "vulnStatus": "Awaiting Analysis", "descriptions": [ { @@ -24,6 +24,10 @@ "url": "https://lists.debian.org/debian-lts-announce/2024/04/msg00012.html", "source": "security@mozilla.org" }, + { + "url": "https://lists.debian.org/debian-lts-announce/2024/04/msg00013.html", + "source": "security@mozilla.org" + }, { "url": "https://www.mozilla.org/security/advisories/mfsa2024-18/", "source": "security@mozilla.org" diff --git a/CVE-2024/CVE-2024-38xx/CVE-2024-3857.json b/CVE-2024/CVE-2024-38xx/CVE-2024-3857.json index 490cba9798c..fd88a11a044 100644 --- a/CVE-2024/CVE-2024-38xx/CVE-2024-3857.json +++ b/CVE-2024/CVE-2024-38xx/CVE-2024-3857.json @@ -2,7 +2,7 @@ "id": "CVE-2024-3857", "sourceIdentifier": "security@mozilla.org", "published": "2024-04-16T16:15:08.573", - "lastModified": "2024-04-19T17:15:55.130", + "lastModified": "2024-04-22T10:15:07.520", "vulnStatus": "Awaiting Analysis", "descriptions": [ { @@ -24,6 +24,10 @@ "url": "https://lists.debian.org/debian-lts-announce/2024/04/msg00012.html", "source": "security@mozilla.org" }, + { + "url": "https://lists.debian.org/debian-lts-announce/2024/04/msg00013.html", + "source": "security@mozilla.org" + }, { "url": "https://www.mozilla.org/security/advisories/mfsa2024-18/", "source": "security@mozilla.org" diff --git a/CVE-2024/CVE-2024-38xx/CVE-2024-3859.json b/CVE-2024/CVE-2024-38xx/CVE-2024-3859.json index 8edd98cb624..2ade698f910 100644 --- a/CVE-2024/CVE-2024-38xx/CVE-2024-3859.json +++ b/CVE-2024/CVE-2024-38xx/CVE-2024-3859.json @@ -2,7 +2,7 @@ "id": "CVE-2024-3859", "sourceIdentifier": "security@mozilla.org", "published": "2024-04-16T16:15:08.663", - "lastModified": "2024-04-19T17:15:55.200", + "lastModified": "2024-04-22T10:15:07.573", "vulnStatus": "Awaiting Analysis", "descriptions": [ { @@ -24,6 +24,10 @@ "url": "https://lists.debian.org/debian-lts-announce/2024/04/msg00012.html", "source": "security@mozilla.org" }, + { + "url": "https://lists.debian.org/debian-lts-announce/2024/04/msg00013.html", + "source": "security@mozilla.org" + }, { "url": "https://www.mozilla.org/security/advisories/mfsa2024-18/", "source": "security@mozilla.org" diff --git a/CVE-2024/CVE-2024-38xx/CVE-2024-3861.json b/CVE-2024/CVE-2024-38xx/CVE-2024-3861.json index 5272830af2a..2417f3a4d2d 100644 --- a/CVE-2024/CVE-2024-38xx/CVE-2024-3861.json +++ b/CVE-2024/CVE-2024-38xx/CVE-2024-3861.json @@ -2,7 +2,7 @@ "id": "CVE-2024-3861", "sourceIdentifier": "security@mozilla.org", "published": "2024-04-16T16:15:08.770", - "lastModified": "2024-04-19T17:15:55.287", + "lastModified": "2024-04-22T10:15:07.620", "vulnStatus": "Awaiting Analysis", "descriptions": [ { @@ -24,6 +24,10 @@ "url": "https://lists.debian.org/debian-lts-announce/2024/04/msg00012.html", "source": "security@mozilla.org" }, + { + "url": "https://lists.debian.org/debian-lts-announce/2024/04/msg00013.html", + "source": "security@mozilla.org" + }, { "url": "https://www.mozilla.org/security/advisories/mfsa2024-18/", "source": "security@mozilla.org" diff --git a/CVE-2024/CVE-2024-38xx/CVE-2024-3864.json b/CVE-2024/CVE-2024-38xx/CVE-2024-3864.json index d336892d75b..bf62f9fe838 100644 --- a/CVE-2024/CVE-2024-38xx/CVE-2024-3864.json +++ b/CVE-2024/CVE-2024-38xx/CVE-2024-3864.json @@ -2,7 +2,7 @@ "id": "CVE-2024-3864", "sourceIdentifier": "security@mozilla.org", "published": "2024-04-16T16:15:08.913", - "lastModified": "2024-04-19T11:15:44.777", + "lastModified": "2024-04-22T10:15:07.670", "vulnStatus": "Awaiting Analysis", "descriptions": [ { @@ -24,6 +24,10 @@ "url": "https://lists.debian.org/debian-lts-announce/2024/04/msg00012.html", "source": "security@mozilla.org" }, + { + "url": "https://lists.debian.org/debian-lts-announce/2024/04/msg00013.html", + "source": "security@mozilla.org" + }, { "url": "https://www.mozilla.org/security/advisories/mfsa2024-18/", "source": "security@mozilla.org" diff --git a/README.md b/README.md index 073976b8018..fb1628396b9 100644 --- a/README.md +++ b/README.md @@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2024-04-22T10:00:40.790112+00:00 +2024-04-22T12:00:37.480482+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2024-04-22T08:15:39.240000+00:00 +2024-04-22T11:15:47.363000+00:00 ``` ### Last Data Feed Release @@ -33,26 +33,34 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### Total Number of included CVEs ```plain -246452 +246458 ``` ### CVEs added in the last Commit -Recently added CVEs: `7` +Recently added CVEs: `6` -- [CVE-2024-32690](CVE-2024/CVE-2024-326xx/CVE-2024-32690.json) (`2024-04-22T08:15:37.917`) -- [CVE-2024-32693](CVE-2024/CVE-2024-326xx/CVE-2024-32693.json) (`2024-04-22T08:15:38.253`) -- [CVE-2024-32694](CVE-2024/CVE-2024-326xx/CVE-2024-32694.json) (`2024-04-22T08:15:38.463`) -- [CVE-2024-32695](CVE-2024/CVE-2024-326xx/CVE-2024-32695.json) (`2024-04-22T08:15:38.653`) -- [CVE-2024-32696](CVE-2024/CVE-2024-326xx/CVE-2024-32696.json) (`2024-04-22T08:15:38.850`) -- [CVE-2024-32697](CVE-2024/CVE-2024-326xx/CVE-2024-32697.json) (`2024-04-22T08:15:39.040`) -- [CVE-2024-32698](CVE-2024/CVE-2024-326xx/CVE-2024-32698.json) (`2024-04-22T08:15:39.240`) +- [CVE-2024-32681](CVE-2024/CVE-2024-326xx/CVE-2024-32681.json) (`2024-04-22T11:15:46.287`) +- [CVE-2024-32682](CVE-2024/CVE-2024-326xx/CVE-2024-32682.json) (`2024-04-22T11:15:46.630`) +- [CVE-2024-32684](CVE-2024/CVE-2024-326xx/CVE-2024-32684.json) (`2024-04-22T11:15:46.810`) +- [CVE-2024-32687](CVE-2024/CVE-2024-326xx/CVE-2024-32687.json) (`2024-04-22T11:15:47.000`) +- [CVE-2024-32688](CVE-2024/CVE-2024-326xx/CVE-2024-32688.json) (`2024-04-22T11:15:47.177`) +- [CVE-2024-32691](CVE-2024/CVE-2024-326xx/CVE-2024-32691.json) (`2024-04-22T11:15:47.363`) ### CVEs modified in the last Commit -Recently modified CVEs: `0` +Recently modified CVEs: `9` +- [CVE-2024-2609](CVE-2024/CVE-2024-26xx/CVE-2024-2609.json) (`2024-04-22T10:15:06.997`) +- [CVE-2024-32698](CVE-2024/CVE-2024-326xx/CVE-2024-32698.json) (`2024-04-22T08:15:39.240`) +- [CVE-2024-3302](CVE-2024/CVE-2024-33xx/CVE-2024-3302.json) (`2024-04-22T10:15:07.367`) +- [CVE-2024-3852](CVE-2024/CVE-2024-38xx/CVE-2024-3852.json) (`2024-04-22T10:15:07.430`) +- [CVE-2024-3854](CVE-2024/CVE-2024-38xx/CVE-2024-3854.json) (`2024-04-22T10:15:07.470`) +- [CVE-2024-3857](CVE-2024/CVE-2024-38xx/CVE-2024-3857.json) (`2024-04-22T10:15:07.520`) +- [CVE-2024-3859](CVE-2024/CVE-2024-38xx/CVE-2024-3859.json) (`2024-04-22T10:15:07.573`) +- [CVE-2024-3861](CVE-2024/CVE-2024-38xx/CVE-2024-3861.json) (`2024-04-22T10:15:07.620`) +- [CVE-2024-3864](CVE-2024/CVE-2024-38xx/CVE-2024-3864.json) (`2024-04-22T10:15:07.670`) ## Download and Usage diff --git a/_state.csv b/_state.csv index c63e80d016d..ca523879c0c 100644 --- a/_state.csv +++ b/_state.csv @@ -242999,7 +242999,7 @@ CVE-2024-2608,0,0,ae6bcd3c34b2e2d2990ddd5b5011c47bd45b71daefa72e13093360a8fd3053 CVE-2024-26080,0,0,985369cd20039768ffb9e0a343ef3ec94259ec110458f9976172d6fbd3da993c,2024-03-18T19:40:00.173000 CVE-2024-26084,0,0,4198569d9b83e7c17fa91f0baf1eeab883647801d84066753aca49311c01beec,2024-04-10T13:23:38.787000 CVE-2024-26087,0,0,79a90816bd0d6064ff1c3bd6bcc349fec6b5af43993ed0a4b50116beb1f7cb07,2024-04-10T13:23:38.787000 -CVE-2024-2609,0,0,077e48c9b0f397765360962ff44a50b5b0c9c1f344762deba454a7617c1235e9,2024-04-19T17:15:54.660000 +CVE-2024-2609,0,1,83064762a74f6161c1cfeba80ebf0a1f3d5b6f495cab56554bc8ddee3a9a5e31,2024-04-22T10:15:06.997000 CVE-2024-26094,0,0,115591706a1991dd063241a84e1b5d445de4b8fd9fdb36186da6ec8b646a848b,2024-03-18T19:40:00.173000 CVE-2024-26096,0,0,84e4ab51865319a31a25e45dde90a75fe091e9b10c864322c7ee514e973d84e6,2024-03-18T19:40:00.173000 CVE-2024-26097,0,0,7ae84bcb4f2242da5f1cb9c97a939f17dfa4e935e4c482bd4227896c976f6e45,2024-04-10T13:23:38.787000 @@ -246160,16 +246160,22 @@ CVE-2024-32650,0,0,3ec938fa621d2b09851dc7c9c4a0bab9e06500eb12a687bac8f1323156efc CVE-2024-32652,0,0,7068d001c4d69765b29e932b33765d55255f044d5a61efb3e29beac03eeb565d,2024-04-19T19:15:07.067000 CVE-2024-3266,0,0,254a5ba127b10ac48f062b62dbe4c90ef51eaba1ed741161e5a22416cbb32240,2024-04-10T13:23:38.787000 CVE-2024-3267,0,0,00a210ede7a73ca33b64d3b8a0e382509d5bafa34ae84022125b180763aee2bd,2024-04-10T13:23:38.787000 +CVE-2024-32681,1,1,692e5ff68d950d2330bb485731c195d29d822b606a56ace8e102c62c4006ea11,2024-04-22T11:15:46.287000 +CVE-2024-32682,1,1,96eafe957fadc439d540e333666d358d177d18c367688eef35fcd4b62ac28318,2024-04-22T11:15:46.630000 CVE-2024-32683,0,0,a0b9622e54426858713ec284b3b35f1e3398d7792b7ab5de8a29a6635c271abc,2024-04-19T13:10:25.637000 +CVE-2024-32684,1,1,74e462c9e6be38f4f61d57c21c2a9e1607c4910d3b3fd1c5b891068c1c81a2c7,2024-04-22T11:15:46.810000 CVE-2024-32686,0,0,852c454a1d3bbf27e69c45ac3a82e5061f231ff76a794447de0366c288490e9f,2024-04-18T13:04:28.900000 +CVE-2024-32687,1,1,68855780b915f3daaf50107838dab8f6c58aed7821bc54ca29aa7863f8f55291,2024-04-22T11:15:47 +CVE-2024-32688,1,1,87014a4420f0c59360578605d573a6f54cc824b07c3f167a464f395019bd4227,2024-04-22T11:15:47.177000 CVE-2024-32689,0,0,16874a71c9e632f769995766bf2f4ed6e183b5fc555d1d7f129ab5a8c673df33,2024-04-18T13:04:28.900000 -CVE-2024-32690,1,1,2d7b66c91588b0610b15bd4872587007030e3c0a592b43d5b4f549237f015312,2024-04-22T08:15:37.917000 -CVE-2024-32693,1,1,2e8e6d69a3a515021dba5dde4d73cff52e851f5a82cc8541af1e98c1793f3600,2024-04-22T08:15:38.253000 -CVE-2024-32694,1,1,8bbe643ec4146bde8071b1885d91b6f0cb6a66917f2f2d216223a37e1d3513e9,2024-04-22T08:15:38.463000 -CVE-2024-32695,1,1,c3ae6b0de22e3a2dddcffd1c73193ffecc06b87ea8d0683d7a98e9346747f4cc,2024-04-22T08:15:38.653000 -CVE-2024-32696,1,1,fd941c2eace70a3d3ef2bb8b59a8be8acc6b289cfe8bfb04c9bf65e3b90d7950,2024-04-22T08:15:38.850000 -CVE-2024-32697,1,1,413cc7db3d097b72d130d4234ec7e29fae77ce70b27415d341e385ebdc80a246,2024-04-22T08:15:39.040000 -CVE-2024-32698,1,1,181d3592940ea81367ae811a91b0d6ca399bcd50e1397f8d7087d5be8e932cc0,2024-04-22T08:15:39.240000 +CVE-2024-32690,0,0,2d7b66c91588b0610b15bd4872587007030e3c0a592b43d5b4f549237f015312,2024-04-22T08:15:37.917000 +CVE-2024-32691,1,1,50c9b095119d47186b0465e563edb073f89a87f162155a896ef5cfde5d0c5495,2024-04-22T11:15:47.363000 +CVE-2024-32693,0,0,2e8e6d69a3a515021dba5dde4d73cff52e851f5a82cc8541af1e98c1793f3600,2024-04-22T08:15:38.253000 +CVE-2024-32694,0,0,8bbe643ec4146bde8071b1885d91b6f0cb6a66917f2f2d216223a37e1d3513e9,2024-04-22T08:15:38.463000 +CVE-2024-32695,0,0,c3ae6b0de22e3a2dddcffd1c73193ffecc06b87ea8d0683d7a98e9346747f4cc,2024-04-22T08:15:38.653000 +CVE-2024-32696,0,0,fd941c2eace70a3d3ef2bb8b59a8be8acc6b289cfe8bfb04c9bf65e3b90d7950,2024-04-22T08:15:38.850000 +CVE-2024-32697,0,0,413cc7db3d097b72d130d4234ec7e29fae77ce70b27415d341e385ebdc80a246,2024-04-22T08:15:39.040000 +CVE-2024-32698,0,1,168f5eb8ebe3902e13dd853b294dd08e58c7d982e4f5b268dbe29804961aaeed,2024-04-22T08:15:39.240000 CVE-2024-3270,0,0,6f3801d6fa573f4a130c8a1ad393f7345008a6cf48547c2d9608d260a00cb3bb,2024-04-11T01:25:57.753000 CVE-2024-3271,0,0,427448d66ebe59002a93ad233a5fbd2b2253db3687d924fc6f5652a183f66ed0,2024-04-16T13:24:07.103000 CVE-2024-3272,0,0,ef44e7e2e0d0ab3ec436a6ccc174b0a90f543a9a2cfa65f7a6d262da6c5446ee,2024-04-15T20:14:55.570000 @@ -246185,7 +246191,7 @@ CVE-2024-3285,0,0,ea17e16acaa3172cbcc052cf9bfb1b3e7ee2b004434b062b8e67c1c1ed8bff CVE-2024-3296,0,0,bcc39314c1e9f6d53aa0ccc8e7e7cac7c279f7f6ee5a27f19287b128ea2ed6c7,2024-04-05T12:15:37.777000 CVE-2024-3298,0,0,35145d829af4d19541380a93e6723503e514b69e11aa4b007b05099610c37f21,2024-04-04T16:33:06.610000 CVE-2024-3299,0,0,f60f2a80accdd6f345a6a9cd66637eda180121596f90c2e7d75707c9fce20eb6,2024-04-04T16:33:06.610000 -CVE-2024-3302,0,0,a05675422539d62ac553d221a6c2c70ee479358f2682ffa220ccd58ac1724947,2024-04-19T11:15:44.510000 +CVE-2024-3302,0,1,9fa291fbf8baefbe777a43fb8539cbd0fa114b40bff368370225174c90d1f4b4,2024-04-22T10:15:07.367000 CVE-2024-3311,0,0,cc24f0e110212be66e02c71f4e3192ea09f47ae5e9090cac74e341e472a33c23,2024-04-11T01:25:58.140000 CVE-2024-3313,0,0,a1f61d968ea3c59507e97f1859e014460ea34c753cfc0814a5308608cf321984,2024-04-10T13:23:38.787000 CVE-2024-3314,0,0,78c785cb5b32bdf0baed853861c5d6771b22fff72a031a5ec21a411cf5a4d670,2024-04-11T01:25:58.237000 @@ -246403,19 +246409,19 @@ CVE-2024-3844,0,0,30915d3a2a34ebc041887d7d2c465c4092bf28e77eb1ab682b15caeba3bfc3 CVE-2024-3845,0,0,57fb8aa498132f27c019cfcc712d0c16fae2279ed2f76ade01972d4054d6f5ae,2024-04-21T04:15:11.347000 CVE-2024-3846,0,0,0782f4785fce6830900b4cbaa713c770a169097900d5939085f596e2f2b18dac,2024-04-21T04:15:11.527000 CVE-2024-3847,0,0,5db281bbcf37ee4f3bb816d92cc8f3a143da3688544c4b1d005f638bf892788b,2024-04-21T04:15:11.763000 -CVE-2024-3852,0,0,59b3071909fe1c6ae34c0a7ef180fded1c8b756f43fc4b941ae1f8d30ff88e37,2024-04-19T17:15:55.047000 +CVE-2024-3852,0,1,3038e46972183e994310b2b410f139aaace8bd74e7e7e979d336a57b5feba459,2024-04-22T10:15:07.430000 CVE-2024-3853,0,0,da9bcb4a065926b49732a0dd79b2f07a12fd9777c9341906bc363e07df8725cf,2024-04-17T12:48:31.863000 -CVE-2024-3854,0,0,36f1f30595921610e6d67ec09203a7c8bf67efc0cdea3e4a01f210010fc3cd61,2024-04-19T17:15:55.087000 +CVE-2024-3854,0,1,1fc25728bc86cd277ba270d144040c69a89e438f315d3ebf85291cac5fb28ebb,2024-04-22T10:15:07.470000 CVE-2024-3855,0,0,72f9965b46480d1ef50ed2a1799389235938182cc86dc8ecd73fd2cc29210cf3,2024-04-17T12:48:31.863000 CVE-2024-3856,0,0,b4145bd7b493b073ad7b7090cd52428765d0c24799c3bf5af1fe7594a342c2dd,2024-04-17T12:48:31.863000 -CVE-2024-3857,0,0,bee17f561393f8898209c81ffacb21e38501b4b84e65c8d8b44ca61e07644790,2024-04-19T17:15:55.130000 +CVE-2024-3857,0,1,759e3e6356edbe4b757e6defb2865ff9079af79daa39f4b5313863a09852808f,2024-04-22T10:15:07.520000 CVE-2024-3858,0,0,7909cba96f3e3d206ccbb308cd394c2dd55ea5480740c25fa8316d0bc5650abe,2024-04-17T12:48:31.863000 -CVE-2024-3859,0,0,118c4f8fc648b8c328ad3dad3164afb2d74cab57a5f9eab2e1a862573ef36ba3,2024-04-19T17:15:55.200000 +CVE-2024-3859,0,1,3065404677b844c907170ea43348d98daf159eda29192d0f8b013c98cba7e7cc,2024-04-22T10:15:07.573000 CVE-2024-3860,0,0,c33e8c657cfe3956cd70903ab7912357e9142226690438c85322ce7b941ed7f2,2024-04-17T12:48:31.863000 -CVE-2024-3861,0,0,b45586ba24386e04abb5420b7ced73edaed09a9f6c945b71c363c5b840e749cc,2024-04-19T17:15:55.287000 +CVE-2024-3861,0,1,891d68faecae715fa9ed74917dcc8c6b8466167516a2b34c2f3aaf1667ff2bc5,2024-04-22T10:15:07.620000 CVE-2024-3862,0,0,d892c55e37e2ad71ebd3e4aade996aff767de8739f62e2d71c93704431b2b09c,2024-04-17T12:48:31.863000 CVE-2024-3863,0,0,2bcd7aff2d943e7ab42e23b79c60d375ad9e243a307a827bee502e9df179514c,2024-04-19T17:15:55.333000 -CVE-2024-3864,0,0,ae6c36ac7c4d7698312395d82a80672d1a4dde90cb29f905347043dcebcbb850,2024-04-19T11:15:44.777000 +CVE-2024-3864,0,1,499a763f800962fc06fbb7957c79a2cd0421be864f67f8063b5224ce9c7991b3,2024-04-22T10:15:07.670000 CVE-2024-3865,0,0,8b230c3d643bf4def0090616d3b729148802c45f8b0915e5522b00babc710a03,2024-04-17T12:48:31.863000 CVE-2024-3867,0,0,1b62d18c2024e05920e3c0687ff0e24e4f942ae67e75e66374d57866a8214187,2024-04-16T17:15:11.113000 CVE-2024-3869,0,0,5fe681dc14d2de5e9dd5b2f66bac58fa145bb31944427d754a663b3ce277c72c,2024-04-16T13:24:07.103000