Auto-Update: 2024-06-07T08:00:18.668765+00:00

This commit is contained in:
cad-safe-bot 2024-06-07 08:03:12 +00:00
parent a7181d1bb3
commit 3bbf7aefd2
14 changed files with 487 additions and 24 deletions

View File

@ -0,0 +1,47 @@
{
"id": "CVE-2023-6491",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-06-07T06:15:09.320",
"lastModified": "2024-06-07T06:15:09.320",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "The Strong Testimonials plugin for WordPress is vulnerable to unauthorized modification of data due to an improper capability check on the wpmtst_save_view_sticky function in all versions up to, and including, 3.1.12. This makes it possible for authenticated attackers, with contributor access and above, to modify favorite views."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security@wordfence.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 1.4
}
]
},
"references": [
{
"url": "https://plugins.trac.wordpress.org/changeset/3097409/strong-testimonials/tags/3.1.13/admin/views.php",
"source": "security@wordfence.com"
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/c3277d93-4f47-445b-a193-ff990b55d054?source=cve",
"source": "security@wordfence.com"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2024-3288",
"sourceIdentifier": "contact@wpscan.com",
"published": "2024-06-07T06:15:10.837",
"lastModified": "2024-06-07T06:15:10.837",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "The Logo Slider WordPress plugin before 4.0.0 does not validate and escape some of its Slider Settings before outputting them back in attributes, which could allow users with the contributor role and above to perform Stored Cross-Site Scripting attacks"
}
],
"metrics": {},
"references": [
{
"url": "https://wpscan.com/vulnerability/4ef99f54-68df-4353-8fc0-9b09ac0df7ba/",
"source": "contact@wpscan.com"
}
]
}

View File

@ -0,0 +1,47 @@
{
"id": "CVE-2024-3592",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-06-07T06:15:10.960",
"lastModified": "2024-06-07T06:15:10.960",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "The Quiz And Survey Master \u2013 Best Quiz, Exam and Survey Plugin for WordPress plugin for WordPress is vulnerable to SQL Injection via the 'question_id' parameter in all versions up to, and including, 9.0.1 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for authenticated attackers, with contributor-level access and above, to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security@wordfence.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.9,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.1,
"impactScore": 6.0
}
]
},
"references": [
{
"url": "https://plugins.trac.wordpress.org/changeset/3097878/quiz-master-next/trunk/php/admin/options-page-questions-tab.php",
"source": "security@wordfence.com"
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/fc085413-db43-43e3-9b60-aeb341eed4e1?source=cve",
"source": "security@wordfence.com"
}
]
}

View File

@ -0,0 +1,47 @@
{
"id": "CVE-2024-4042",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-06-07T06:15:11.240",
"lastModified": "2024-06-07T06:15:11.240",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "The Post Grid, Form Maker, Popup Maker, WooCommerce Blocks, Post Blocks, Post Carousel \u2013 Combo Blocks plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'class' attribute of the menu-wrap-item block in all versions up to, and including, 2.2.80 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security@wordfence.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 6.4,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 3.1,
"impactScore": 2.7
}
]
},
"references": [
{
"url": "https://plugins.trac.wordpress.org/changeset/3084503/post-grid/tags/2.2.81/includes/blocks/menu-wrap-item/index.php",
"source": "security@wordfence.com"
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/55e6eb58-79e2-4404-887a-0392ce7914aa?source=cve",
"source": "security@wordfence.com"
}
]
}

View File

@ -0,0 +1,59 @@
{
"id": "CVE-2024-4354",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-06-07T06:15:11.500",
"lastModified": "2024-06-07T06:15:11.500",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "The TablePress \u2013 Tables in WordPress made easy plugin for WordPress is vulnerable to Server-Side Request Forgery in all versions up to, and including, 2.3 via the get_files_to_import() function. This makes it possible for authenticated attackers, with author-level access and above, to make web requests to arbitrary locations originating from the web application and can be used to query and modify information from internal services. Due to the complex nature of protecting against DNS rebind attacks in WordPress software, we settled on the developer simply restricting the usage of the URL import functionality to just administrators. While this is not optimal, we feel this poses a minimal risk to most site owners and ideally WordPress core would correct this issue in wp_safe_remote_get() and other functions."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security@wordfence.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 6.4,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 3.1,
"impactScore": 2.7
}
]
},
"references": [
{
"url": "https://plugins.trac.wordpress.org/browser/tablepress/trunk/classes/class-import.php#L125",
"source": "security@wordfence.com"
},
{
"url": "https://plugins.trac.wordpress.org/browser/tablepress/trunk/classes/class-import.php#L141",
"source": "security@wordfence.com"
},
{
"url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3097113%40tablepress&new=3097113%40tablepress&sfp_email=&sfph_mail=",
"source": "security@wordfence.com"
},
{
"url": "https://www.clear-gate.com/blog/ssrf-with-dns-rebinding-2/",
"source": "security@wordfence.com"
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/879384eb-bfea-4667-a7de-9f723dbea74b?source=cve",
"source": "security@wordfence.com"
}
]
}

View File

@ -0,0 +1,47 @@
{
"id": "CVE-2024-4451",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-06-07T07:15:46.437",
"lastModified": "2024-06-07T07:15:46.437",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "The Colibri Page Builder plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's colibri_video_player shortcode in all versions up to, and including, 1.0.276 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security@wordfence.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 6.4,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 3.1,
"impactScore": 2.7
}
]
},
"references": [
{
"url": "https://plugins.trac.wordpress.org/changeset/3097694/colibri-page-builder/trunk/extend-builder/shortcodes/video.php",
"source": "security@wordfence.com"
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/0afd981e-3ae8-4450-9750-23ff6fe612dc?source=cve",
"source": "security@wordfence.com"
}
]
}

View File

@ -0,0 +1,51 @@
{
"id": "CVE-2024-4488",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-06-07T07:15:47.707",
"lastModified": "2024-06-07T07:15:47.707",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "The Royal Elementor Addons and Templates for WordPress is vulnerable to Stored Cross-Site Scripting via the \u2018inline_list\u2019 parameter in versions up to, and including, 1.3.976 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with contributor-level permissions and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security@wordfence.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 6.4,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 3.1,
"impactScore": 2.7
}
]
},
"references": [
{
"url": "https://plugins.trac.wordpress.org/browser/royal-elementor-addons/trunk/modules/form-builder/widgets/wpr-form-builder.php#L3238",
"source": "security@wordfence.com"
},
{
"url": "https://plugins.trac.wordpress.org/changeset/3097775/",
"source": "security@wordfence.com"
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/cb0ac434-7e85-44d4-b21e-df462f63cd9c?source=cve",
"source": "security@wordfence.com"
}
]
}

View File

@ -0,0 +1,51 @@
{
"id": "CVE-2024-4489",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-06-07T07:15:47.970",
"lastModified": "2024-06-07T07:15:47.970",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "The Royal Elementor Addons and Templates plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the \u2018custom_upload_mimes\u2019 function in versions up to, and including, 1.3.976 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with contributor-level permissions and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security@wordfence.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 6.4,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 3.1,
"impactScore": 2.7
}
]
},
"references": [
{
"url": "https://plugins.trac.wordpress.org/browser/royal-elementor-addons/tags/1.3.973/admin/templates-kit.php#L896",
"source": "security@wordfence.com"
},
{
"url": "https://plugins.trac.wordpress.org/changeset/3097775/",
"source": "security@wordfence.com"
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/57bf222b-5f49-46e2-be84-3e6444807096?source=cve",
"source": "security@wordfence.com"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2024-4620",
"sourceIdentifier": "contact@wpscan.com",
"published": "2024-06-07T06:15:11.763",
"lastModified": "2024-06-07T06:15:11.763",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "The ARForms - Premium WordPress Form Builder Plugin WordPress plugin before 6.6 allows unauthenticated users to modify uploaded files in such a way that PHP code can be uploaded when an upload file input is included on a form"
}
],
"metrics": {},
"references": [
{
"url": "https://wpscan.com/vulnerability/dc34dc2d-d5a1-4e28-8507-33f659ead647/",
"source": "contact@wpscan.com"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2024-4621",
"sourceIdentifier": "contact@wpscan.com",
"published": "2024-06-07T06:15:11.840",
"lastModified": "2024-06-07T06:15:11.840",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "The ARForms - Premium WordPress Form Builder Plugin WordPress plugin before 6.6 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup)"
}
],
"metrics": {},
"references": [
{
"url": "https://wpscan.com/vulnerability/33a366d9-6c81-4957-a101-768487aae735/",
"source": "contact@wpscan.com"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2024-4756",
"sourceIdentifier": "contact@wpscan.com",
"published": "2024-06-07T06:15:11.920",
"lastModified": "2024-06-07T06:15:11.920",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "The WP Backpack WordPress plugin through 2.1 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup)"
}
],
"metrics": {},
"references": [
{
"url": "https://wpscan.com/vulnerability/ce4688b6-6713-43b5-aa63-8a3b036bd332/",
"source": "contact@wpscan.com"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2024-5003",
"sourceIdentifier": "contact@wpscan.com",
"published": "2024-06-07T06:15:12.000",
"lastModified": "2024-06-07T06:15:12.000",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "The WP Stacker WordPress plugin through 1.8.5 does not have CSRF check in some places, and is missing sanitisation as well as escaping, which could allow attackers to make logged in admin add Stored XSS payloads via a CSRF attack"
}
],
"metrics": {},
"references": [
{
"url": "https://wpscan.com/vulnerability/1d7d0372-bbc5-40b2-a668-253c819415c4/",
"source": "contact@wpscan.com"
}
]
}

View File

@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update
```plain
2024-06-07T06:00:18.650686+00:00
2024-06-07T08:00:18.668765+00:00
```
### Most recent CVE Modification Timestamp synchronized with NVD
```plain
2024-06-07T05:15:50.730000+00:00
2024-06-07T07:15:47.970000+00:00
```
### Last Data Feed Release
@ -33,23 +33,25 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
### Total Number of included CVEs
```plain
252959
252971
```
### CVEs added in the last Commit
Recently added CVEs: `10`
Recently added CVEs: `12`
- [CVE-2024-1988](CVE-2024/CVE-2024-19xx/CVE-2024-1988.json) (`2024-06-07T04:15:25.850`)
- [CVE-2024-36082](CVE-2024/CVE-2024-360xx/CVE-2024-36082.json) (`2024-06-07T04:15:30.357`)
- [CVE-2024-37383](CVE-2024/CVE-2024-373xx/CVE-2024-37383.json) (`2024-06-07T04:15:30.463`)
- [CVE-2024-37384](CVE-2024/CVE-2024-373xx/CVE-2024-37384.json) (`2024-06-07T04:15:30.597`)
- [CVE-2024-37385](CVE-2024/CVE-2024-373xx/CVE-2024-37385.json) (`2024-06-07T04:15:30.720`)
- [CVE-2024-4887](CVE-2024/CVE-2024-48xx/CVE-2024-4887.json) (`2024-06-07T04:15:31.777`)
- [CVE-2024-4902](CVE-2024/CVE-2024-49xx/CVE-2024-4902.json) (`2024-06-07T05:15:49.740`)
- [CVE-2024-5425](CVE-2024/CVE-2024-54xx/CVE-2024-5425.json) (`2024-06-07T04:15:32.597`)
- [CVE-2024-5612](CVE-2024/CVE-2024-56xx/CVE-2024-5612.json) (`2024-06-07T05:15:50.523`)
- [CVE-2024-5640](CVE-2024/CVE-2024-56xx/CVE-2024-5640.json) (`2024-06-07T05:15:50.730`)
- [CVE-2023-6491](CVE-2023/CVE-2023-64xx/CVE-2023-6491.json) (`2024-06-07T06:15:09.320`)
- [CVE-2024-3288](CVE-2024/CVE-2024-32xx/CVE-2024-3288.json) (`2024-06-07T06:15:10.837`)
- [CVE-2024-3592](CVE-2024/CVE-2024-35xx/CVE-2024-3592.json) (`2024-06-07T06:15:10.960`)
- [CVE-2024-4042](CVE-2024/CVE-2024-40xx/CVE-2024-4042.json) (`2024-06-07T06:15:11.240`)
- [CVE-2024-4354](CVE-2024/CVE-2024-43xx/CVE-2024-4354.json) (`2024-06-07T06:15:11.500`)
- [CVE-2024-4451](CVE-2024/CVE-2024-44xx/CVE-2024-4451.json) (`2024-06-07T07:15:46.437`)
- [CVE-2024-4488](CVE-2024/CVE-2024-44xx/CVE-2024-4488.json) (`2024-06-07T07:15:47.707`)
- [CVE-2024-4489](CVE-2024/CVE-2024-44xx/CVE-2024-4489.json) (`2024-06-07T07:15:47.970`)
- [CVE-2024-4620](CVE-2024/CVE-2024-46xx/CVE-2024-4620.json) (`2024-06-07T06:15:11.763`)
- [CVE-2024-4621](CVE-2024/CVE-2024-46xx/CVE-2024-4621.json) (`2024-06-07T06:15:11.840`)
- [CVE-2024-4756](CVE-2024/CVE-2024-47xx/CVE-2024-4756.json) (`2024-06-07T06:15:11.920`)
- [CVE-2024-5003](CVE-2024/CVE-2024-50xx/CVE-2024-5003.json) (`2024-06-07T06:15:12.000`)
### CVEs modified in the last Commit

View File

@ -239621,6 +239621,7 @@ CVE-2023-6486,0,0,c81210cab8dc9e396502360bc8e7405406f09e8235326da2aa05788514a550
CVE-2023-6487,0,0,558ab6bea6c82c03f825b7e35129bc25422ba8df0fed36970139750e652983db,2024-05-22T12:46:53.887000
CVE-2023-6488,0,0,a2d2155218f4cd12cbd7cf86a1d373ca9d8739c736f0c67e222296ebea42699d,2023-12-22T19:30:36.993000
CVE-2023-6489,0,0,8be5137422e44d9e775f7530defb6286a84af9abdf8da8a38a11072ad60f9cbc,2024-04-12T12:43:57.400000
CVE-2023-6491,1,1,fd3f44e542146312e0cded420d92caedc58376ca67b07269007c4405afdc9517,2024-06-07T06:15:09.320000
CVE-2023-6493,0,0,f1b44774d19dee2dde0db6057c1c8da6a9052c466b0c843005cf7e84e74e5bad,2024-01-10T15:10:40.807000
CVE-2023-6494,0,0,e84577867db064082c4fbb5b749302fb02213f52d6d8e07c0caef285009cb8e8,2024-04-15T13:15:31.997000
CVE-2023-6496,0,0,87b56518aaf4afd4545cd371dac346e93b19b056714958fa1a42154914cf88c5,2024-01-17T20:24:42.663000
@ -241977,7 +241978,7 @@ CVE-2024-1984,0,0,465cc0e2e1f58fc8492061094a8536c47636769a8f8e9054141eb83f9d971f
CVE-2024-1985,0,0,f4d22aa67ab0779a241527c882b8b9cfdde337f2865b4bc4e809350f7d4a661e,2024-03-13T18:15:58.530000
CVE-2024-1986,0,0,3573e34f135546ed04633bd0d17cea080212de55551e8ab04d2e00c52e1a5093,2024-03-08T14:02:57.420000
CVE-2024-1987,0,0,51b6353c7487197fcf85dba32dd0017998b1425a36ba707e32269bf4afb531af,2024-03-08T14:02:57.420000
CVE-2024-1988,1,1,feb9fd92c0aef8888f13b4fbd3bf7701aa3333e64857f9199318b419fa5cc462,2024-06-07T04:15:25.850000
CVE-2024-1988,0,0,feb9fd92c0aef8888f13b4fbd3bf7701aa3333e64857f9199318b419fa5cc462,2024-06-07T04:15:25.850000
CVE-2024-1989,0,0,e603d4bdfbac73448a418c09b573178507e96a797a5be54fa1a78504bbf887da,2024-03-06T15:18:08.093000
CVE-2024-1990,0,0,18962fc675767ec36941dde216e2cdde20628da130363efb991b1aaf982f61a8,2024-04-10T13:23:38.787000
CVE-2024-1991,0,0,6ed6543aa2fe028ae9875088171a10ff91252f94ba37ee2f5600210d331d8c90,2024-04-10T13:23:38.787000
@ -249855,6 +249856,7 @@ CVE-2024-32876,0,0,c51720e08df793268c8491a202557c242e904799fd1b8730970b223daed02
CVE-2024-32877,0,0,13f5020f551bae5d14609ce1c5cc9045330b07b54a09f287074495be0ab161bf,2024-05-31T13:01:46.727000
CVE-2024-32878,0,0,9824e8ca4092e36a8f9cb2ce3a2b816a546e1a8f5d394979f2c31fd3e27c353e,2024-04-29T12:42:03.667000
CVE-2024-32879,0,0,0b0046e51a12ad5b1f4492d6cff2d6482480cc94626283d2a6f79bd97479ab0a,2024-04-25T13:18:20.370000
CVE-2024-3288,1,1,203b1ff644ef8142f5156e08f9dcf2d7e879e2168ec0a1eb3c3895b23fc23d11,2024-06-07T06:15:10.837000
CVE-2024-32880,0,0,4e2d702b579ea68026e2f0825502a7a98e59935dc9a1b24f36b660439ba2f348,2024-04-26T19:59:19.793000
CVE-2024-32881,0,0,a69d7f9beb676365acef6aaf3810d23c9ee7ac916fc4e9b8b59f337998d4f5a5,2024-04-29T12:42:03.667000
CVE-2024-32882,0,0,5274fa89ec3421b5c11bab925ea13ca1712a5851453fd229685e139cad05710c,2024-05-02T13:27:25.103000
@ -251284,6 +251286,7 @@ CVE-2024-35916,0,0,eef0a98f14bc85cfcc41c2c9dbcad427449f316ed211b491f369093e02e70
CVE-2024-35917,0,0,b89394b74c7a8c75aec1871ad444a1de3b356465b990a17e25fbca62313f01c7,2024-05-20T13:00:04.957000
CVE-2024-35918,0,0,b2be0a765e82477c2ac9db950f51995c31889c3002199373637759e7724e2e90,2024-05-20T13:00:04.957000
CVE-2024-35919,0,0,27d82e9c37f0ef8108c9a890221a4e4df4c581ae1c83c8f84d3878b062b56455,2024-05-20T13:00:04.957000
CVE-2024-3592,1,1,f47a8159346289d13a00c85300e0e13713d8283dfff6f48a4d46e87c03c14c03,2024-06-07T06:15:10.960000
CVE-2024-35920,0,0,8a2843ee95e70c40090dfa8d23a18e67b6b0ca26e4c73366bc47c210b89fb0f9,2024-05-20T13:00:04.957000
CVE-2024-35921,0,0,84ce50a3d1bc0a485a80ec84c27ac1436f96be4789b7f8d91c7dd5db63d60278,2024-05-20T13:00:04.957000
CVE-2024-35922,0,0,c0262e365d228a168016ee16200d6f663423e9ed53093ea5f55b1b1fe3e37587,2024-05-20T13:00:04.957000
@ -251426,7 +251429,7 @@ CVE-2024-36078,0,0,c51f0267c8f676ff86e885fc858add33b498be4bce4ced499be9c0d55f68f
CVE-2024-36079,0,0,fdb9a00040976f09fbaf93ec1c9cec0113756b033e4d68b6334fa44aebe9f8d5,2024-05-28T12:39:42.673000
CVE-2024-36080,0,0,de5551202af1794b77e1032fd6ee35ba7df3ef2929b44077b5dc18aee0b886df,2024-05-20T13:00:04.957000
CVE-2024-36081,0,0,d4f0cf242ca757b4f303ae5368ae2b4579e3452ad04759648a40396f5d2c3712,2024-05-20T13:00:04.957000
CVE-2024-36082,1,1,3b3a14fb7adc835c096bd48dcbbcf73aad4370c235f3bf04b1feeb19026a9ae2,2024-06-07T04:15:30.357000
CVE-2024-36082,0,0,3b3a14fb7adc835c096bd48dcbbcf73aad4370c235f3bf04b1feeb19026a9ae2,2024-06-07T04:15:30.357000
CVE-2024-3609,0,0,ed7edf68142e8387ad834c19a7338682e57310d52666dd6c703556dcd2e4f649,2024-05-17T18:36:05.263000
CVE-2024-36104,0,0,d791090d63e65d841ba8ee5d3ad2141bb986481787582de2f23200ce4780a74f,2024-06-04T16:57:41.053000
CVE-2024-36105,0,0,4b0fed9ed2485549411fb1c0dd5b530df11ef2b63c1b154f3cb43f2c66dea72a,2024-05-28T12:39:28.377000
@ -251736,9 +251739,9 @@ CVE-2024-3736,0,0,8212a13db4363d6279d1d8c19924659c1f0cf224cf46584ea7e82cad3d6da3
CVE-2024-37364,0,0,3eb7ac1ae1d4ccfc84dd9fb416453798b3e571372669c090d9ca048f78636528,2024-06-06T19:15:58.900000
CVE-2024-3737,0,0,e288f29127240d626de190f33aa5cc85cc615dc26f102a0c00221aa9708716e3,2024-05-17T02:40:05.887000
CVE-2024-3738,0,0,0968d9618a10c036b25eaa390531466819e491a5c992bcf4c715af4b591b9121,2024-05-17T02:40:05.977000
CVE-2024-37383,1,1,db495e12281b46654ea3c15d28602c931d728295a758b8489765c1057a45ec06,2024-06-07T04:15:30.463000
CVE-2024-37384,1,1,5dac19b22ce324d995735a0a8cc7982c6b5de909be174974cde5275245626f89,2024-06-07T04:15:30.597000
CVE-2024-37385,1,1,bc9150caa0bb6a3a2c953194330140f9505dbf1f8d7ab275b9fc8362638f2c31,2024-06-07T04:15:30.720000
CVE-2024-37383,0,0,db495e12281b46654ea3c15d28602c931d728295a758b8489765c1057a45ec06,2024-06-07T04:15:30.463000
CVE-2024-37384,0,0,5dac19b22ce324d995735a0a8cc7982c6b5de909be174974cde5275245626f89,2024-06-07T04:15:30.597000
CVE-2024-37385,0,0,bc9150caa0bb6a3a2c953194330140f9505dbf1f8d7ab275b9fc8362638f2c31,2024-06-07T04:15:30.720000
CVE-2024-3739,0,0,18ca969c974b63c6d16494fbcc2d63756747cacc5947332fefb20d9c592537e4,2024-05-17T02:40:06.067000
CVE-2024-3740,0,0,1025f598f3437296a5a18526d2723c88eb3b5b46ea06c50b765dc694c6a0bd1a,2024-05-17T02:40:06.170000
CVE-2024-3741,0,0,a12bddc029cd8ca7f24831417695630babe629dc15b981c15e3d0a9ffa405fdc,2024-05-28T17:15:11.327000
@ -251957,6 +251960,7 @@ CVE-2024-4038,0,0,bcee2fa5b2489836af4ab9c65caafd6eced0b2bbd0ce06913efc5e02957c74
CVE-2024-4039,0,0,cfdce9a10bb12a92a3dc5b97194d2925027fafc434caeab17aac25e26b57811c,2024-05-14T16:11:39.510000
CVE-2024-4040,0,0,aaa64890b494cdcdee2557c76769096315107a08c599010f9c12f5edc2e86037,2024-04-26T15:25:47.270000
CVE-2024-4041,0,0,eb91b240ef125b96ca72e19c4e4b4f0865365edd07fdbe934106504507637e12,2024-05-14T16:11:39.510000
CVE-2024-4042,1,1,63201e8d75441fb298bf37eb8590f81e39113bbda1dfbe847e6fc2f1e2a7098c,2024-06-07T06:15:11.240000
CVE-2024-4043,0,0,6af9720af6118fb183f8125f22f9123aff9cbd64639b4a3b02a251bb0a5a463e,2024-05-24T01:15:30.977000
CVE-2024-4044,0,0,24332ace72d4390c16ec3b8977440043e797db2d7d42445b64fa06b462f42633,2024-05-14T16:11:39.510000
CVE-2024-4045,0,0,2973487eda1b15ccbfcf50557eac1a48f731099aa75396cca0be0624bea7de1b,2024-05-28T12:39:42.673000
@ -252178,6 +252182,7 @@ CVE-2024-4348,0,0,a14414a3181bc375d5436d2953c2764c9169e29e299a300bde58b776485f8e
CVE-2024-4349,0,0,638591efb62157d29fb4098c1fa599793c842a2c784378b78b41101a61478057,2024-06-04T19:20:36.340000
CVE-2024-4351,0,0,84a993fcb461a8c61255d21736701361dc3f453bf42043de26320f65ada00121,2024-05-16T13:03:05.353000
CVE-2024-4352,0,0,ec2049b13794d7b7eea90d377463d8f5c3179de2c6e69d57554c5eced6269751,2024-05-16T13:03:05.353000
CVE-2024-4354,1,1,79676823a0a1ebc8e72fd87cd48ad155f792eb02b978aa7e5c7ebbe1fa3c4cb5,2024-06-07T06:15:11.500000
CVE-2024-4355,0,0,3de336fc369bf51c3859d982619f8ebb357e0d7227b3dc4949c8a7981fdc524e,2024-05-30T13:15:41.297000
CVE-2024-4356,0,0,c1f48aced0f7eb8c7cd8dcf0330d605a6d5e376358212460a9e157795442734d,2024-05-30T13:15:41.297000
CVE-2024-4357,0,0,15f39a23a70c5acc3d08c2f81b16ef69b06f28ee37422807405e1ad546411072,2024-05-15T18:35:11.453000
@ -252244,6 +252249,7 @@ CVE-2024-4445,0,0,42f5f65e0ec1a0527ed0ebe136ff3e505384e30728c0f33fdcc95acd928f2f
CVE-2024-4446,0,0,c1a78a1d4c0d05d17b6cead174a683289ca018fac3b1c104ff2e5b23dbf06e48,2024-05-14T16:11:39.510000
CVE-2024-4448,0,0,c0706d1927abee0ebde095d1bd8c9375ae579980372e3f8e4e4c3b77a255c913,2024-05-14T16:11:39.510000
CVE-2024-4449,0,0,5f461a2e161ed0d547590d7983036c434e3239f67f76e9397bc8163418dcb335,2024-05-14T16:11:39.510000
CVE-2024-4451,1,1,4cc423a88e3b88fceb25cf5a2d1cabbe2c70fea43455c0888e6fd44229dc6894,2024-06-07T07:15:46.437000
CVE-2024-4452,0,0,3d66d1a1960a575e299177a954e31a59092574d107ebd8033a3f44850e26c060,2024-05-21T16:54:26.047000
CVE-2024-4453,0,0,839eb0feb1010733ba000fd27e8db769e9a1bbb03e913a1271e40ed1ca3d8211,2024-05-24T01:15:30.977000
CVE-2024-4454,0,0,914a7b9e833666c0b110fe9be947f5b60542326fbbcbbd52692d581f0fc5648b,2024-05-24T01:15:30.977000
@ -252265,6 +252271,8 @@ CVE-2024-4484,0,0,72c4859b8727b60eeb9f8012483883c0571b4cb8b1cb2ce9a8b1f5e495641e
CVE-2024-4485,0,0,856a7368e5f121163f839e4b6c92a8e77de213c5eccf98592455e970e028d37d,2024-05-24T13:03:05.093000
CVE-2024-4486,0,0,da9bfd47ef59b3a57d52a6c66bb31a65c305ed47bc1cc335b2b3ca5ab24769e0,2024-05-24T01:15:30.977000
CVE-2024-4487,0,0,50c826d9a63ca2cf478652fe406866ee1f801cabb050eb8635e58a006f7805c7,2024-05-14T16:11:39.510000
CVE-2024-4488,1,1,8fc45b4033394b541298d2e3089e83b1907e47973804b0f3ea86d218e96985a1,2024-06-07T07:15:47.707000
CVE-2024-4489,1,1,d55626c1df6a3f9ce70382c6f35136d6ee3e2be163a4b68cd301a99307c05f66,2024-06-07T07:15:47.970000
CVE-2024-4490,0,0,e9307362c9e30effa78a675ee98be99c8b3d9c66fa0a2fa85d2752ca1d5cbd01,2024-05-14T16:11:39.510000
CVE-2024-4491,0,0,6520e9c967bc59f2d53298ade0191bd776085dbd4b5abfb049e7df29ac89ed41,2024-06-04T19:20:38.950000
CVE-2024-4492,0,0,704e1a21b82bc4549693b0d7ad0b2f4f56ee0af92fdf15e72504325a92d55c59,2024-06-04T19:20:39.047000
@ -252368,6 +252376,8 @@ CVE-2024-4614,0,0,beb5630ff5db8a415fa4bf6f109dad49279ea5965bb91a1d7f892cd406978f
CVE-2024-4617,0,0,a9ac6f97f78093fda60c756da599c06372e99e21d7b1347de185ba0119cb6cca,2024-05-16T13:03:05.353000
CVE-2024-4618,0,0,60eca777456ce5379ff16ab59d0e8db1fff28f58a76fe14d606e7a27666b586b,2024-05-15T16:40:19.330000
CVE-2024-4619,0,0,e5a9884a731cd527eccadb69d8fea8c7f9c7a04a1fc119314f14a8f7a5fe1b15,2024-05-21T12:37:59.687000
CVE-2024-4620,1,1,66f8fd14d13271ede96f14a3ce7840142ee2c996656c7d1b032be93e0729811d,2024-06-07T06:15:11.763000
CVE-2024-4621,1,1,ef5fd84db8d866e1af5884e67323ac48a4c1f9c33a7c618c56fe02a41191466b,2024-06-07T06:15:11.840000
CVE-2024-4622,0,0,4b1992fe33b227c66e64bdd4cf1c71e31b73a98abda6bdd8e7687e0db4e86196,2024-05-15T18:35:11.453000
CVE-2024-4624,0,0,2a601b2b9934f4e4184c90fc3ba9cbddeec712a59701e0372ed6d18cfcc3b7c7,2024-05-14T19:17:55.627000
CVE-2024-4630,0,0,f5808b44be131bdae6b6920228d425b0dd235ef4afe8685cc2ea30d538a619f5,2024-05-14T16:11:39.510000
@ -252455,6 +252465,7 @@ CVE-2024-4743,0,0,ca5ac146013ec9c5ade9488d4cfcf6d89cbed0fe780989436eef36b2f30572
CVE-2024-4747,0,0,99152f6494a1192f3bae59b436abcc51d11f811ed1e0a72c2e65c8381fda6054,2024-05-14T16:11:39.510000
CVE-2024-4749,0,0,676e331864bc41907c4c80c44886e7dac480ef6dea2c29bc22838d992753d4da,2024-06-04T16:57:41.053000
CVE-2024-4750,0,0,423585a3e250903ac62d761ecb0e0e6dc6b4649ccd4411b90275a4e6d2f87495,2024-06-04T16:57:41.053000
CVE-2024-4756,1,1,9623c4e6f0a1311484b291c029afba063bfdbc95988989c001e501c63c785991,2024-06-07T06:15:11.920000
CVE-2024-4760,0,0,8b9593f0d88cbd24a061db082c8cd5c20f19b8a61431542d1ce576639ef3bdc0,2024-05-16T15:44:44.683000
CVE-2024-4761,0,0,0bedb1c1472ecce0f990c4c56e3721a514c96a1f9ece8da9e0c811ef6689eeb4,2024-05-20T14:08:51.747000
CVE-2024-4764,0,0,9a13ff0309ce1e5420716f8085db95df94fd2bab38dc643251ec74d75f275fe3,2024-05-14T19:17:55.627000
@ -252537,7 +252548,7 @@ CVE-2024-4875,0,0,aa35cb89fee530b58aa987ffc67ea97738c0ba567903bf01429a1a1259923d
CVE-2024-4876,0,0,02aac8d1be489833aa2e07f8be8ce083249ac7dc2fcc33fd144386b8d365fef2,2024-05-21T12:37:59.687000
CVE-2024-4881,0,0,e94ef2b7a30de46b5b085946210161ddf96a8fad133990a564855b6e96560941,2024-06-06T19:16:03.063000
CVE-2024-4886,0,0,85721324d8c885a233247da6b42e2a33cd86be9ab4caebe3f5bcde7804348df2,2024-06-05T12:53:50.240000
CVE-2024-4887,1,1,a389078118311f926c5968043d435de83d09b7eefbfaf5f3fa89b6f3ecbc8a21,2024-06-07T04:15:31.777000
CVE-2024-4887,0,0,a389078118311f926c5968043d435de83d09b7eefbfaf5f3fa89b6f3ecbc8a21,2024-06-07T04:15:31.777000
CVE-2024-4888,0,0,0f9ee5c823f93b1822181f266acae334db882fefffed9faa78d8a4f6efa4c493,2024-06-06T19:16:03.397000
CVE-2024-4889,0,0,9252b1f295e1c91a6ad913b56379218937d10764f340f97a691fc0c5103aa211,2024-06-06T18:15:18.577000
CVE-2024-4890,0,0,0b482ebf975063cb8be0c21e015578642277be48392b6a7c06b7ab0e86f7b4bc,2024-06-06T19:16:03.630000
@ -252546,7 +252557,7 @@ CVE-2024-4893,0,0,d5ebc2dfcb13b74b4f1951a124d2e638a95f79aa05d19e6fadfe65b7ad1c4f
CVE-2024-4894,0,0,d68130303d356c053d0f6768d0ee08506e206d16216142c952b9b56af8835d24,2024-05-15T16:40:19.330000
CVE-2024-4895,0,0,be42ef886a64c01ec9437b4cfbce4dfdf0b902fbee0c6083bfc71de776f15b0e,2024-05-24T01:15:30.977000
CVE-2024-4896,0,0,6456cc9b22aff68532bfeeb7637d5235216630d84771d1ec52d84fa467e4b7a6,2024-05-22T12:46:53.887000
CVE-2024-4902,1,1,b9c0f0a1aa54e5da971ac72706b59b8f32f93c778b6bfceb521dd1ce6c3d6fc1,2024-06-07T05:15:49.740000
CVE-2024-4902,0,0,b9c0f0a1aa54e5da971ac72706b59b8f32f93c778b6bfceb521dd1ce6c3d6fc1,2024-06-07T05:15:49.740000
CVE-2024-4903,0,0,422702316cad5ffa3b808ee432ae74ee6cfe10ab31dd2fa04b70f5cce86e3c3a,2024-05-17T02:40:40.423000
CVE-2024-4904,0,0,44558a4b32290e2f940be10d0a83b859aa6fae2c01ef1c881d37a435bb46f91d,2024-06-04T19:20:52.380000
CVE-2024-4905,0,0,4d48951e7b7cf79f9190550a03c32ee936be1c12de421cb217aeb522ad401862,2024-06-04T19:20:52.480000
@ -252617,6 +252628,7 @@ CVE-2024-4998,0,0,e12f9512d41da053bcfd5626dd0ee21afd4da3e61146c4f0c8f9da42ca3dff
CVE-2024-4999,0,0,1bac5cc77e7ceb1bce6c078fbd59e76f5556984ef2124d365e8638bfa6b6fdfa,2024-05-16T15:44:44.683000
CVE-2024-5000,0,0,21f44bae275ca5e7f3a45da963612f2fb705c74e44c15e2681f54ff4506e6afb,2024-06-04T16:57:41.053000
CVE-2024-5001,0,0,bac0073c23ed28e836068e8632acf1110bc49b73246f9cff53f5a706acc4a57d,2024-06-06T14:17:35.017000
CVE-2024-5003,1,1,352b5639ebbf56cad5a110414cfacad1eed078f26b565d40a3053006514a00b1,2024-06-07T06:15:12
CVE-2024-5006,0,0,dd22c8e58768fd94bd48e3be3a4dc52cd3210392642ba6489895072643348644,2024-06-05T12:53:50.240000
CVE-2024-5022,0,0,106355f86b530d1586a5d339031de27a1a2312467a76eb449e8e9901150235d8,2024-05-20T13:00:34.807000
CVE-2024-5023,0,0,974704283893df4cc9d8e0bcce8bb65ebf635268235f75f47c922033893214ce,2024-05-17T18:36:31.297000
@ -252885,7 +252897,7 @@ CVE-2024-5418,0,0,2256a9e2dd23df3cf1b1192c58484a92d936d5218e6c5eda868cde380ba142
CVE-2024-5420,0,0,a73d8f6d4dfc82a2a2c0b4ab3cbb373ed67379d75299be1a27f6ef6c455a38e1,2024-06-04T16:57:41.053000
CVE-2024-5421,0,0,79ca1971e275d0efebd28f5347a8ca150a1bd7e69deb239fcb0cd29979a5cc8c,2024-06-04T16:57:41.053000
CVE-2024-5422,0,0,22b69754062c7145c382eca03e4d53f86a6d68d1fbe6295548fe29968bcde31c,2024-06-04T16:57:41.053000
CVE-2024-5425,1,1,6092e19396deba213e85ae08bbcc12bed3d27afd586c83d01af99efa1b8182c3,2024-06-07T04:15:32.597000
CVE-2024-5425,0,0,6092e19396deba213e85ae08bbcc12bed3d27afd586c83d01af99efa1b8182c3,2024-06-07T04:15:32.597000
CVE-2024-5427,0,0,42975a4514a9d913e780b5e6c34dc14580ffe2cdca703f885481d0f432a70e28,2024-05-31T13:01:46.727000
CVE-2024-5428,0,0,febfd9b4f977de4c3dc04e5fc8e71b9454e3ad809e74595cd325ad9561a295a7,2024-05-28T14:59:09.827000
CVE-2024-5433,0,0,d0946774ada383b4af0e78f23b9c449d05f83a7124810af4e383f90b0cdbda75,2024-05-29T13:02:09.280000
@ -252944,12 +252956,12 @@ CVE-2024-5589,0,0,dc63c38434ce5bb089af0d0f8aa09f6a46f1fae34dd45c15f4542741dea047
CVE-2024-5590,0,0,ca60332ff9933405c7b9b37e93d2404b53274b9ec741b4065c0c1eadbd60da94,2024-06-03T14:46:24.250000
CVE-2024-5607,0,0,8b06d468a789bf21a5887ce32c4b351ff2f13075122362c1fae85c795fb5346a,2024-06-07T03:15:09.630000
CVE-2024-5609,0,0,f28c83e3e9d04345913d36de3bfdbd0d644d73b3d20045d9399b3368319c8d47,2024-06-06T19:16:09.920000
CVE-2024-5612,1,1,e8a0b0cebc6090829ad560ec9543d9f4ddc54548118aadc3bd76e2acffa1644e,2024-06-07T05:15:50.523000
CVE-2024-5612,0,0,e8a0b0cebc6090829ad560ec9543d9f4ddc54548118aadc3bd76e2acffa1644e,2024-06-07T05:15:50.523000
CVE-2024-5615,0,0,2b9f4fbf88dd4ea6ff55678ac9c0762fd6b29ae2ea4765ff6af29ac25e53e3d4,2024-06-06T14:17:35.017000
CVE-2024-5629,0,0,2b19d175fd80b16aa424307957676ae3dd964a506cce5329fc9e2ea04d26ec96,2024-06-06T14:17:35.017000
CVE-2024-5635,0,0,2f4fd95f40cb43c9475682f37f78b479557c0ba40bc4b87c84bd3a410bdbca2c,2024-06-05T12:53:50.240000
CVE-2024-5636,0,0,ae2ff24a8e15c0ed795cb405ff4b68943ed8f15194eed9e4ca4bf581e03cae2a,2024-06-05T12:53:50.240000
CVE-2024-5640,1,1,785e2574eb7b079aab076db7f0229c04a13e86681b300342f00e17b399aeb615,2024-06-07T05:15:50.730000
CVE-2024-5640,0,0,785e2574eb7b079aab076db7f0229c04a13e86681b300342f00e17b399aeb615,2024-06-07T05:15:50.730000
CVE-2024-5653,0,0,283076b6ccce08ae3d1ddf9d7f5983a839d66c80929543a8a527d0bfdf86a2f9,2024-06-06T14:17:35.017000
CVE-2024-5656,0,0,adabf37f78545832b9e31783c044d8f042bfbaaca432946aa95ed82eb518777b,2024-06-06T14:17:35.017000
CVE-2024-5657,0,0,b9899ab9d953b5e4a78b96db0691f3e8b536e92241286e49b6931592afb0dbef,2024-06-06T14:17:35.017000

Can't render this file because it is too large.