diff --git a/CVE-2023/CVE-2023-63xx/CVE-2023-6325.json b/CVE-2023/CVE-2023-63xx/CVE-2023-6325.json new file mode 100644 index 00000000000..22f491ac197 --- /dev/null +++ b/CVE-2023/CVE-2023-63xx/CVE-2023-6325.json @@ -0,0 +1,51 @@ +{ + "id": "CVE-2023-6325", + "sourceIdentifier": "security@wordfence.com", + "published": "2024-05-23T05:15:48.773", + "lastModified": "2024-05-23T05:15:48.773", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "The RomethemeForm For Elementor plugin for WordPress is vulnerable to unauthorized access and modification of data due to a missing capability check on the export_entries, rtformnewform, and rtformupdate functions in all versions up to, and including, 1.1.5. This makes it possible for unauthenticated attackers to export arbitrary form submissions, create new forms, or update any post title or certain metadata." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security@wordfence.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 5.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 + } + ] + }, + "references": [ + { + "url": "https://plugins.trac.wordpress.org/browser/romethemeform/tags/1.1.2/modules/form/form.php", + "source": "security@wordfence.com" + }, + { + "url": "https://plugins.trac.wordpress.org/changeset/3090708/romethemeform/trunk?contextall=1&old=3079080&old_path=%2Fromethemeform%2Ftrunk", + "source": "security@wordfence.com" + }, + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/81a293ea-abda-4c90-a109-791ca5ba89a4?source=cve", + "source": "security@wordfence.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-44xx/CVE-2024-4431.json b/CVE-2024/CVE-2024-44xx/CVE-2024-4431.json new file mode 100644 index 00000000000..d8d3e472601 --- /dev/null +++ b/CVE-2024/CVE-2024-44xx/CVE-2024-4431.json @@ -0,0 +1,79 @@ +{ + "id": "CVE-2024-4431", + "sourceIdentifier": "security@wordfence.com", + "published": "2024-05-23T04:15:09.023", + "lastModified": "2024-05-23T04:15:09.023", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "The LA-Studio Element Kit for Elementor plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the \u2018id\u2019 parameter in all versions up to, and including, 1.3.7.6 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security@wordfence.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 6.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 3.1, + "impactScore": 2.7 + } + ] + }, + "references": [ + { + "url": "https://plugins.trac.wordpress.org/browser/lastudio-element-kit/trunk/templates/advanced-carousel/global/simple/items-loop-end.php#L7", + "source": "security@wordfence.com" + }, + { + "url": "https://plugins.trac.wordpress.org/browser/lastudio-element-kit/trunk/templates/banner-list/global/index.php#L75", + "source": "security@wordfence.com" + }, + { + "url": "https://plugins.trac.wordpress.org/browser/lastudio-element-kit/trunk/templates/images-layout/global/index.php#L75", + "source": "security@wordfence.com" + }, + { + "url": "https://plugins.trac.wordpress.org/browser/lastudio-element-kit/trunk/templates/instagram-feed/global/index.php#L75", + "source": "security@wordfence.com" + }, + { + "url": "https://plugins.trac.wordpress.org/browser/lastudio-element-kit/trunk/templates/posts/global/index.php#L116", + "source": "security@wordfence.com" + }, + { + "url": "https://plugins.trac.wordpress.org/browser/lastudio-element-kit/trunk/templates/team-member/global/custom.php#L157", + "source": "security@wordfence.com" + }, + { + "url": "https://plugins.trac.wordpress.org/browser/lastudio-element-kit/trunk/templates/testimonials/global/index.php#L71", + "source": "security@wordfence.com" + }, + { + "url": "https://plugins.trac.wordpress.org/changeset/3090513/", + "source": "security@wordfence.com" + }, + { + "url": "https://wordpress.org/plugins/lastudio-element-kit/#developers", + "source": "security@wordfence.com" + }, + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/6c87204d-6697-4d06-aad2-279fa95f503a?source=cve", + "source": "security@wordfence.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-46xx/CVE-2024-4662.json b/CVE-2024/CVE-2024-46xx/CVE-2024-4662.json new file mode 100644 index 00000000000..43ad514a057 --- /dev/null +++ b/CVE-2024/CVE-2024-46xx/CVE-2024-4662.json @@ -0,0 +1,47 @@ +{ + "id": "CVE-2024-4662", + "sourceIdentifier": "security@wordfence.com", + "published": "2024-05-23T05:15:49.140", + "lastModified": "2024-05-23T05:15:49.140", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "The Oxygen Builder plugin for WordPress is vulnerable to Remote Code Execution in all versions up to, and including, 4.8.2 via post metadata. This is due to the plugin storing custom data in post metadata without an underscore prefix. This makes it possible for lower privileged users, such as contributors, to inject arbitrary PHP code via the WordPress user interface and gain elevated privileges." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security@wordfence.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, + "references": [ + { + "url": "https://oxygenbuilder.com/oxygen-4-8-3-now-available-security-update/", + "source": "security@wordfence.com" + }, + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/8706c3f6-64e0-440e-a802-5c80d9cc3643?source=cve", + "source": "security@wordfence.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-52xx/CVE-2024-5232.json b/CVE-2024/CVE-2024-52xx/CVE-2024-5232.json new file mode 100644 index 00000000000..26bd53e5b2e --- /dev/null +++ b/CVE-2024/CVE-2024-52xx/CVE-2024-5232.json @@ -0,0 +1,92 @@ +{ + "id": "CVE-2024-5232", + "sourceIdentifier": "cna@vuldb.com", + "published": "2024-05-23T04:15:09.410", + "lastModified": "2024-05-23T04:15:09.410", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability was found in Campcodes Complete Web-Based School Management System 1.0. It has been classified as critical. This affects an unknown part of the file /view/teacher_salary_details2.php. The manipulation of the argument index leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-265983." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 6.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "SINGLE", + "confidentialityImpact": "PARTIAL", + "integrityImpact": "PARTIAL", + "availabilityImpact": "PARTIAL", + "baseScore": 6.5 + }, + "baseSeverity": "MEDIUM", + "exploitabilityScore": 8.0, + "impactScore": 6.4, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/E1CHO/cve_hub/blob/main/Complete%20Web-Based%20School%20Management%20System%20-%20sql/Complete%20Web-Based%20School%20Management%20System%20-%20vuln%2022.pdf", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.265983", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.265983", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.339808", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-52xx/CVE-2024-5233.json b/CVE-2024/CVE-2024-52xx/CVE-2024-5233.json new file mode 100644 index 00000000000..a6ecea51c61 --- /dev/null +++ b/CVE-2024/CVE-2024-52xx/CVE-2024-5233.json @@ -0,0 +1,92 @@ +{ + "id": "CVE-2024-5233", + "sourceIdentifier": "cna@vuldb.com", + "published": "2024-05-23T05:15:49.360", + "lastModified": "2024-05-23T05:15:49.360", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability was found in Campcodes Complete Web-Based School Management System 1.0. It has been declared as critical. This vulnerability affects unknown code of the file /view/teacher_salary_details3.php. The manipulation of the argument index leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-265984." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 6.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "SINGLE", + "confidentialityImpact": "PARTIAL", + "integrityImpact": "PARTIAL", + "availabilityImpact": "PARTIAL", + "baseScore": 6.5 + }, + "baseSeverity": "MEDIUM", + "exploitabilityScore": 8.0, + "impactScore": 6.4, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/E1CHO/cve_hub/blob/main/Complete%20Web-Based%20School%20Management%20System%20-%20sql/Complete%20Web-Based%20School%20Management%20System%20-%20vuln%2023.pdf", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.265984", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.265984", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.339809", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-52xx/CVE-2024-5234.json b/CVE-2024/CVE-2024-52xx/CVE-2024-5234.json new file mode 100644 index 00000000000..1e0f46b4385 --- /dev/null +++ b/CVE-2024/CVE-2024-52xx/CVE-2024-5234.json @@ -0,0 +1,92 @@ +{ + "id": "CVE-2024-5234", + "sourceIdentifier": "cna@vuldb.com", + "published": "2024-05-23T05:15:49.693", + "lastModified": "2024-05-23T05:15:49.693", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability was found in Campcodes Complete Web-Based School Management System 1.0. It has been rated as critical. This issue affects some unknown processing of the file /view/teacher_salary_history1.php. The manipulation of the argument index leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-265985 was assigned to this vulnerability." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 6.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "SINGLE", + "confidentialityImpact": "PARTIAL", + "integrityImpact": "PARTIAL", + "availabilityImpact": "PARTIAL", + "baseScore": 6.5 + }, + "baseSeverity": "MEDIUM", + "exploitabilityScore": 8.0, + "impactScore": 6.4, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/E1CHO/cve_hub/blob/main/Complete%20Web-Based%20School%20Management%20System%20-%20sql/Complete%20Web-Based%20School%20Management%20System%20-%20vuln%2024.pdf", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.265985", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.265985", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.339810", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-52xx/CVE-2024-5235.json b/CVE-2024/CVE-2024-52xx/CVE-2024-5235.json new file mode 100644 index 00000000000..ffbf3be8c35 --- /dev/null +++ b/CVE-2024/CVE-2024-52xx/CVE-2024-5235.json @@ -0,0 +1,92 @@ +{ + "id": "CVE-2024-5235", + "sourceIdentifier": "cna@vuldb.com", + "published": "2024-05-23T05:15:49.947", + "lastModified": "2024-05-23T05:15:49.947", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability classified as critical has been found in Campcodes Complete Web-Based School Management System 1.0. Affected is an unknown function of the file /view/teacher_salary_invoice.php. The manipulation of the argument teacher_id leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. VDB-265986 is the identifier assigned to this vulnerability." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 6.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "SINGLE", + "confidentialityImpact": "PARTIAL", + "integrityImpact": "PARTIAL", + "availabilityImpact": "PARTIAL", + "baseScore": 6.5 + }, + "baseSeverity": "MEDIUM", + "exploitabilityScore": 8.0, + "impactScore": 6.4, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/E1CHO/cve_hub/blob/main/Complete%20Web-Based%20School%20Management%20System%20-%20sql/Complete%20Web-Based%20School%20Management%20System%20-%20vuln%2025.pdf", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.265986", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.265986", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.339811", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-52xx/CVE-2024-5236.json b/CVE-2024/CVE-2024-52xx/CVE-2024-5236.json new file mode 100644 index 00000000000..d970a878d40 --- /dev/null +++ b/CVE-2024/CVE-2024-52xx/CVE-2024-5236.json @@ -0,0 +1,92 @@ +{ + "id": "CVE-2024-5236", + "sourceIdentifier": "cna@vuldb.com", + "published": "2024-05-23T05:15:50.203", + "lastModified": "2024-05-23T05:15:50.203", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability classified as critical was found in Campcodes Complete Web-Based School Management System 1.0. Affected by this vulnerability is an unknown functionality of the file /view/teacher_salary_invoice1.php. The manipulation of the argument date leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-265987." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 6.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "SINGLE", + "confidentialityImpact": "PARTIAL", + "integrityImpact": "PARTIAL", + "availabilityImpact": "PARTIAL", + "baseScore": 6.5 + }, + "baseSeverity": "MEDIUM", + "exploitabilityScore": 8.0, + "impactScore": 6.4, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/E1CHO/cve_hub/blob/main/Complete%20Web-Based%20School%20Management%20System%20-%20sql/Complete%20Web-Based%20School%20Management%20System%20-%20vuln%2026.pdf", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.265987", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.265987", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.339812", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/README.md b/README.md index 3908cec7fa1..a7ce5b7deeb 100644 --- a/README.md +++ b/README.md @@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2024-05-23T04:00:38.869278+00:00 +2024-05-23T06:00:38.368184+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2024-05-23T03:15:08.307000+00:00 +2024-05-23T05:15:50.203000+00:00 ``` ### Last Data Feed Release @@ -33,23 +33,21 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### Total Number of included CVEs ```plain -251526 +251534 ``` ### CVEs added in the last Commit -Recently added CVEs: `10` +Recently added CVEs: `8` -- [CVE-2023-6844](CVE-2023/CVE-2023-68xx/CVE-2023-6844.json) (`2024-05-23T02:15:08.040`) -- [CVE-2024-1855](CVE-2024/CVE-2024-18xx/CVE-2024-1855.json) (`2024-05-23T02:15:08.277`) -- [CVE-2024-3065](CVE-2024/CVE-2024-30xx/CVE-2024-3065.json) (`2024-05-23T02:15:08.480`) -- [CVE-2024-3201](CVE-2024/CVE-2024-32xx/CVE-2024-3201.json) (`2024-05-23T02:15:08.673`) -- [CVE-2024-4486](CVE-2024/CVE-2024-44xx/CVE-2024-4486.json) (`2024-05-23T02:15:08.870`) -- [CVE-2024-4783](CVE-2024/CVE-2024-47xx/CVE-2024-4783.json) (`2024-05-23T02:15:09.070`) -- [CVE-2024-4895](CVE-2024/CVE-2024-48xx/CVE-2024-4895.json) (`2024-05-23T03:15:08.063`) -- [CVE-2024-4978](CVE-2024/CVE-2024-49xx/CVE-2024-4978.json) (`2024-05-23T02:15:09.257`) -- [CVE-2024-5230](CVE-2024/CVE-2024-52xx/CVE-2024-5230.json) (`2024-05-23T02:15:09.503`) -- [CVE-2024-5231](CVE-2024/CVE-2024-52xx/CVE-2024-5231.json) (`2024-05-23T03:15:08.307`) +- [CVE-2023-6325](CVE-2023/CVE-2023-63xx/CVE-2023-6325.json) (`2024-05-23T05:15:48.773`) +- [CVE-2024-4431](CVE-2024/CVE-2024-44xx/CVE-2024-4431.json) (`2024-05-23T04:15:09.023`) +- [CVE-2024-4662](CVE-2024/CVE-2024-46xx/CVE-2024-4662.json) (`2024-05-23T05:15:49.140`) +- [CVE-2024-5232](CVE-2024/CVE-2024-52xx/CVE-2024-5232.json) (`2024-05-23T04:15:09.410`) +- [CVE-2024-5233](CVE-2024/CVE-2024-52xx/CVE-2024-5233.json) (`2024-05-23T05:15:49.360`) +- [CVE-2024-5234](CVE-2024/CVE-2024-52xx/CVE-2024-5234.json) (`2024-05-23T05:15:49.693`) +- [CVE-2024-5235](CVE-2024/CVE-2024-52xx/CVE-2024-5235.json) (`2024-05-23T05:15:49.947`) +- [CVE-2024-5236](CVE-2024/CVE-2024-52xx/CVE-2024-5236.json) (`2024-05-23T05:15:50.203`) ### CVEs modified in the last Commit diff --git a/_state.csv b/_state.csv index 6c23a0cfced..8f406443333 100644 --- a/_state.csv +++ b/_state.csv @@ -239260,6 +239260,7 @@ CVE-2023-6321,0,0,509755c02a470a5d829c3a893f17ff948706cd53c9db9d967d7cd17e7b97d2 CVE-2023-6322,0,0,9f05e5977d3521ffd7afe57b9f2ae57ffc5ebb7610f5db42a1545fa9acd26971,2024-05-15T16:40:19.330000 CVE-2023-6323,0,0,e2b514a4590db3db3ed4caa431023ebd6885dd1205f91dead532cfbacb245489,2024-05-15T16:40:19.330000 CVE-2023-6324,0,0,97d7e0d3261f40387e1124e540d897e4b0010e3f654476e0aa675552b7dc7c1b,2024-05-15T16:40:19.330000 +CVE-2023-6325,1,1,3a228400cdec9f9faaa74217ddf63e06863fb187193bc3c9073581195a96ea30,2024-05-23T05:15:48.773000 CVE-2023-6326,0,0,da68435ec565f5478deb03e75227a685933d8e7699006844b61a2674d05885d6,2024-03-04T13:58:23.447000 CVE-2023-6327,0,0,817f802bb0d2f5d4139c38a9d84b35c90ff03f7e31bee94b575d5ba50e63ebd0,2024-05-14T16:13:02.773000 CVE-2023-6329,0,0,acb69acf796efdc21d3e11700a3115c7e39470c82b6e643969998bcd2e6b6d74,2023-12-01T20:50:45.717000 @@ -239675,7 +239676,7 @@ CVE-2023-6839,0,0,8807fec9c6525daa027947c43f6efc6745e2a71d884dfca25a093387609b37 CVE-2023-6840,0,0,f3e90530a8fdb37e8db2c5be55b74b905390253b9e9a28117ebf58c12b7d6599,2024-03-04T20:52:05.890000 CVE-2023-6842,0,0,fd352664a753beeee1da1e0c7b186fb8d6f51c73028cad0cf6ca2db0482ef010,2024-01-16T17:15:22.207000 CVE-2023-6843,0,0,5c319d42869a0026e9f202107450d0b8ffa48ae74093cce628f853fdfe644ede,2024-01-19T17:53:58.730000 -CVE-2023-6844,1,1,f0feb88aa8162578e8cb59319e2343437602c1052b1a8b44a3c5963136b5e6dd,2024-05-23T02:15:08.040000 +CVE-2023-6844,0,0,f0feb88aa8162578e8cb59319e2343437602c1052b1a8b44a3c5963136b5e6dd,2024-05-23T02:15:08.040000 CVE-2023-6845,0,0,731d1bd3631a1daee902267120e683edafdd00fe9b5cbc0c0fd9798c06818f11,2024-01-11T20:01:43.617000 CVE-2023-6846,0,0,1c711df48c681681a27e697b91eaf1c1879d45e51afb6a99949f93aa7233f3f5,2024-02-09T16:51:01.473000 CVE-2023-6847,0,0,cdcc4710c54412d28ccbb11fb3bee795734a0457425239dfdc6d0858011c26df,2023-12-29T19:13:35.857000 @@ -241590,7 +241591,7 @@ CVE-2024-1851,0,0,ac07ab34f3e596527407cf2fcb93e785fa1a213045982c8aadd05f9e543a11 CVE-2024-1852,0,0,9f92825b65e6bb9369c1037dcd50c43b1f7e5526ff6359d4256ca25ce4ba1079,2024-04-10T13:23:38.787000 CVE-2024-1853,0,0,88e46cdee904df65be156cae6d046ba1f9b383351c4ae2ffb721120e1de469e2,2024-03-15T12:53:06.423000 CVE-2024-1854,0,0,3a967413553da784783a186d6f1f68031ea1075d4f2cd23254325d37dfc46570,2024-03-13T18:15:58.530000 -CVE-2024-1855,1,1,f305bdfff5a173e9490a0ac6a981555af957170602a4e149c7a017f18f31c235,2024-05-23T02:15:08.277000 +CVE-2024-1855,0,0,f305bdfff5a173e9490a0ac6a981555af957170602a4e149c7a017f18f31c235,2024-05-23T02:15:08.277000 CVE-2024-1856,0,0,48e25a0a51ff59c36d550bf65bc3fc4ba5a1076a897470898ae662b3caa65413,2024-03-20T17:18:26.603000 CVE-2024-1857,0,0,164ffc9028ea8123e170b3133bd7028efed77d0a506ca5e23a7f1160b5525233,2024-03-17T22:38:29.433000 CVE-2024-1858,0,0,d329b4dad593adf10fc77a9347763d88761569a73a452b4e0bfbb9040ab7c169,2024-03-29T12:45:02.937000 @@ -248074,7 +248075,7 @@ CVE-2024-30638,0,0,476165b7ba1121567d55c67d54d9d40e3e29ea068ff3cb9f8e442a4ce4566 CVE-2024-30639,0,0,46b7c5471e103449855c9fbd2240c66d12c0c2b4b2c2dd58c9da71634c442509,2024-04-01T01:12:59.077000 CVE-2024-3064,0,0,150d2695d7eeb315cec549f12d6c6ef3f6e02daaf223b84571983b190cdbdba2,2024-04-10T13:23:38.787000 CVE-2024-30645,0,0,00b9821a66dbca80d2d2c9c63858e19e8817ea8f49dc6578caf9fd20dddfbebc,2024-04-01T01:12:59.077000 -CVE-2024-3065,1,1,5f9266cdecf636eb5ea3f51da0541b10e2125808cb45f7885ecbf721eb833e46,2024-05-23T02:15:08.480000 +CVE-2024-3065,0,0,5f9266cdecf636eb5ea3f51da0541b10e2125808cb45f7885ecbf721eb833e46,2024-05-23T02:15:08.480000 CVE-2024-30656,0,0,c800b352c15d86c6b7538edefbe50a56ea126bd7af414b5024084888358a8802,2024-04-16T13:24:07.103000 CVE-2024-30659,0,0,5ebf34ef5301500333f12d205c33075783bdc7dbc5af4530638bd854345f163a,2024-05-17T02:38:52.657000 CVE-2024-3066,0,0,9e39c1837a02fe45f60a2b47e49f27e1fbc5dc31dbbfb58a7f58eade8d944914,2024-05-22T12:46:53.887000 @@ -248753,7 +248754,7 @@ CVE-2024-32002,0,0,4b112f717b2a99383c626759f5cc1e661f6669171e8818b9856cf105765ed CVE-2024-32003,0,0,8e8c8d945f0ee0a518068e981d0cc584a07044ae728a9a77ce2d918bc43c232f,2024-04-15T13:15:31.997000 CVE-2024-32004,0,0,36c53e6b23ae4855264d40aff92ae0ce3b5701c2e0b937ef9fe8ca91ba7755d7,2024-05-14T19:17:55.627000 CVE-2024-32005,0,0,67300e4989f99e2e013d8397bc4806c53fe7ab524173b29e08f1814aa041fd14,2024-04-15T13:15:31.997000 -CVE-2024-3201,1,1,b879bbf3f151398a0e83d7e6d4801f5c6347cf5a50091d66bb5947b42b461ab4,2024-05-23T02:15:08.673000 +CVE-2024-3201,0,0,b879bbf3f151398a0e83d7e6d4801f5c6347cf5a50091d66bb5947b42b461ab4,2024-05-23T02:15:08.673000 CVE-2024-32017,0,0,c47f78232c4c3749a77898f284cf5dd751f8e553e59dc7410a9242dddea7ca2b,2024-05-07T12:15:09.593000 CVE-2024-32018,0,0,ed367d82895b9d9075702d5ab3b6c086d7325180d4e88bf52d874df7314b6c9a,2024-05-07T12:15:09.667000 CVE-2024-32019,0,0,7d17b262f48d84e5d46deb667dc18694c73147c4bad7ea42fd1b388af87a63d3,2024-04-15T13:15:31.997000 @@ -251121,6 +251122,7 @@ CVE-2024-4423,0,0,e0dbe4a46d2bfb02a06f5f6dd7941b892a0e354e08a517bf9732a9750b6168 CVE-2024-4424,0,0,620360b6d69d7e46500e9eab3db8f094f558ee3037a5afde7000ad6722a43c71,2024-05-14T16:11:39.510000 CVE-2024-4425,0,0,ae12578d88becb8c756d759ea5148419b194091165c0ac35427c779bf68bf797,2024-05-14T16:11:39.510000 CVE-2024-4430,0,0,2977ce5eb55d4b32781acd64cf46e940cc709041a97d7f6a7071a523a104ede8,2024-05-14T16:11:39.510000 +CVE-2024-4431,1,1,c8188bbc035cfbea95aca00537f79b96aab573ab65c92896d260bd6e1f93cdfa,2024-05-23T04:15:09.023000 CVE-2024-4432,0,0,49cbcbf0ecc1a7e8dd4f4005003d4bbbad6f242752f497dfddb04e7d67e86aa4,2024-05-20T13:00:34.807000 CVE-2024-4433,0,0,a671ce2518271e49fdeb5cf5eaca489e751e352fe28902a9e3a1500395ee9006,2024-05-02T18:00:37.360000 CVE-2024-4434,0,0,cde9fa120977e75c0573204952d5b71ccbd57bef4f0e70a5b7f5a93b9a0c5d06,2024-05-14T16:11:39.510000 @@ -251149,7 +251151,7 @@ CVE-2024-4470,0,0,f0fba350e729f8feed66d9240267f117660bcf2139730ecc32d391638246d5 CVE-2024-4473,0,0,be8deb42c9d1905b301c3bfbae608b1551ce9395ac2fbbb337038c3a7eb347fa,2024-05-14T19:17:55.627000 CVE-2024-4478,0,0,31a4a4c48861c0c170c939e3aa0b10661ec97e9653465707919926dbd3595183,2024-05-16T13:03:05.353000 CVE-2024-4481,0,0,7ecf88f2a22a659849266bdc0bd40c464d195e3dafdf490c58869a301c87572b,2024-05-14T16:11:39.510000 -CVE-2024-4486,1,1,287cbf1c38738e27cc60bfb6efc5c8e685dbce48639a2d00ddabceb3ceb215bc,2024-05-23T02:15:08.870000 +CVE-2024-4486,0,0,287cbf1c38738e27cc60bfb6efc5c8e685dbce48639a2d00ddabceb3ceb215bc,2024-05-23T02:15:08.870000 CVE-2024-4487,0,0,50c826d9a63ca2cf478652fe406866ee1f801cabb050eb8635e58a006f7805c7,2024-05-14T16:11:39.510000 CVE-2024-4490,0,0,e9307362c9e30effa78a675ee98be99c8b3d9c66fa0a2fa85d2752ca1d5cbd01,2024-05-14T16:11:39.510000 CVE-2024-4491,0,0,190d33e9615cd5e358f556ed01f8347aea5b370679d05434a810920d72ca6c97,2024-05-17T02:40:24.800000 @@ -251259,6 +251261,7 @@ CVE-2024-4652,0,0,616f716bd811dc325f7782651f0342b151e87ef32c6f90a69a10d285e4c4f3 CVE-2024-4653,0,0,c2ea65160cd3b040a8dbab6687713dde7934b70f3cf2d1743c09f4a4fddff0c0,2024-05-17T02:40:31.467000 CVE-2024-4654,0,0,79c00c0975ddb372bdc6401f0d780fdd389e77368b958736ad029c8bb8c90cfb,2024-05-17T02:40:31.580000 CVE-2024-4656,0,0,23093c7ec18a8f42da4c8fc1c86b9aa6984d979cf63954576e1d332548405180,2024-05-15T16:40:19.330000 +CVE-2024-4662,1,1,cc70a0c3706f8611d9741029a9717c2daf5b3ed0f99a19408c88d43d7e439a1b,2024-05-23T05:15:49.140000 CVE-2024-4666,0,0,dde8d66c76bdf850b898b9f95df0d92f0ac3da730c1f32826d61843a6ef06bf5,2024-05-15T16:40:19.330000 CVE-2024-4670,0,0,438b57b9006ea70a278767dc5849ca5e16eeaf7f43c9f1acf2c1dcf72f3e2983,2024-05-15T16:40:19.330000 CVE-2024-4671,0,0,911983d752f60a8558bde05d718b618b7e43132134b2e0d17f9ccefbfadcbebf,2024-05-16T20:27:10.670000 @@ -251332,7 +251335,7 @@ CVE-2024-4775,0,0,757972c70170e347b2c51d2e2498d128ecd7ff8f77339f6d2f4b77d366af97 CVE-2024-4776,0,0,64dd8268145f408ad7d61272729ea601365b30d5997216da96d560825c4fd0a6,2024-05-14T19:17:55.627000 CVE-2024-4777,0,0,871c0aa9bb9189afc5f5526abead12f9f754ed9ce1a10923259013af7abd7d06,2024-05-14T19:17:55.627000 CVE-2024-4778,0,0,37531b60d89a44d35c14fde25587b4d8cbf891fd39da513ae2adbe2646535312,2024-05-14T19:17:55.627000 -CVE-2024-4783,1,1,50a34812bb489c1e29faa5e7d01f999517b3b3f303f3febab98067b6fc927dbe,2024-05-23T02:15:09.070000 +CVE-2024-4783,0,0,50a34812bb489c1e29faa5e7d01f999517b3b3f303f3febab98067b6fc927dbe,2024-05-23T02:15:09.070000 CVE-2024-4789,0,0,76a34ff55f02f4fdd71bc209763f0c4ed9b869d8ff89c5fc6a1a936b72db812c,2024-05-17T18:35:35.070000 CVE-2024-4790,0,0,9ca82e19e832a950283217f2bfd1db7efd6838c8a8bf54a7d78165e2752eb0b9,2024-05-17T02:40:36.990000 CVE-2024-4791,0,0,bc4ba581266356fcb662bc273060193bcd7412d6015907e518b3ebb2854be230,2024-05-17T02:40:37.090000 @@ -251387,7 +251390,7 @@ CVE-2024-4876,0,0,9001a39aab22b409ed584cd8d039f27b1e6b747a96583eefc2888b2c10c762 CVE-2024-4891,0,0,e74bd5bb85af020930d6b90474dcbd5a7bb8df3f51cfa57310da23b320714b43,2024-05-20T13:00:34.807000 CVE-2024-4893,0,0,d5ebc2dfcb13b74b4f1951a124d2e638a95f79aa05d19e6fadfe65b7ad1c4f46,2024-05-15T16:40:19.330000 CVE-2024-4894,0,0,d68130303d356c053d0f6768d0ee08506e206d16216142c952b9b56af8835d24,2024-05-15T16:40:19.330000 -CVE-2024-4895,1,1,ca47e9a880d615991518777911d21cd25e835db6515f90e24fb08e57e6f756a8,2024-05-23T03:15:08.063000 +CVE-2024-4895,0,0,ca47e9a880d615991518777911d21cd25e835db6515f90e24fb08e57e6f756a8,2024-05-23T03:15:08.063000 CVE-2024-4896,0,0,3b4886ba9dbcbd85f320cc34951c4d380c3a427ae383c882b64cfe15748a2c5b,2024-05-22T12:46:53.887000 CVE-2024-4903,0,0,9a411d9f215d13d2c422791efc5893252c00fbd9ad8c56cc74522677d5819e4f,2024-05-17T02:40:40.423000 CVE-2024-4904,0,0,6b2e400045aa483c1c0238ef1875b5106ef715ac4df10d8cb60a7ffbc3253def,2024-05-17T02:40:40.593000 @@ -251442,7 +251445,7 @@ CVE-2024-4973,0,0,ad7c577ee4f5c4118bca59729635919eaea613eef16c91713940397f35ef51 CVE-2024-4974,0,0,30c18840d61a7da1f6d082016a110f1f3e155cb69a321c5f3011e04a781acecd,2024-05-17T02:40:44.973000 CVE-2024-4975,0,0,09924b0fbe93d87fd37542372e09ae669637640cc2222ca882fa05e7d37dfb27,2024-05-17T02:40:45.073000 CVE-2024-4976,0,0,cec1c528b9c81bb2353d630af7aeaeed80f8c396bb33272f9e3c075fa645e3ec,2024-05-16T13:03:05.353000 -CVE-2024-4978,1,1,6aea9a2193ddedd3c50cdcb631099577c4e8e5dee89bf2f1d82709591ceea1be,2024-05-23T02:15:09.257000 +CVE-2024-4978,0,0,6aea9a2193ddedd3c50cdcb631099577c4e8e5dee89bf2f1d82709591ceea1be,2024-05-23T02:15:09.257000 CVE-2024-4980,0,0,d20f2ef35ef0f1f8e96465b1028eec7a5f2d3c74ffe21053744b8fa063677175,2024-05-22T12:46:53.887000 CVE-2024-4984,0,0,c181b2792419ab292757f17fa7ed54efe54e64b1f0d7a8e32f201040654607f4,2024-05-16T13:03:05.353000 CVE-2024-4985,0,0,b81bff980fe085b1791160496ce934ae0ce49626339c7659d52666ce349dace5,2024-05-21T12:37:59.687000 @@ -251523,5 +251526,10 @@ CVE-2024-5193,0,0,10c68e7444190b04603fe41121d5ca46f60a4a86754539b9aa3d12094e7245 CVE-2024-5194,0,0,449708a9669696a9d45dc12d62d0dd60618e438564c2c2163a0a40f19cb2695e,2024-05-22T12:46:53.887000 CVE-2024-5195,0,0,6f936c1a350f3aa4241c2485aebe122e7725b90fcb612ab0345f361f301112f3,2024-05-22T12:46:53.887000 CVE-2024-5196,0,0,5d3f231a43c31999680087469716ad4f3327a52b153d985ebb2cb490ce1591bb,2024-05-22T12:46:53.887000 -CVE-2024-5230,1,1,cf2becfcaf10c991a6e891134ca15d918b17a419b24de9a99e4b60c016014c40,2024-05-23T02:15:09.503000 -CVE-2024-5231,1,1,2fc06f277cf3b2ccd9f8bef63c31f29dbbc25b6622a63bce2a1973925c5571e0,2024-05-23T03:15:08.307000 +CVE-2024-5230,0,0,cf2becfcaf10c991a6e891134ca15d918b17a419b24de9a99e4b60c016014c40,2024-05-23T02:15:09.503000 +CVE-2024-5231,0,0,2fc06f277cf3b2ccd9f8bef63c31f29dbbc25b6622a63bce2a1973925c5571e0,2024-05-23T03:15:08.307000 +CVE-2024-5232,1,1,ed53713218d3c3309d574d9b93cb7335aa67af33785bf9d72a3f19c8a0aa9151,2024-05-23T04:15:09.410000 +CVE-2024-5233,1,1,3de6ad414d4f1ffc2971559a36291a6ff087806fcf464825e1a87ea195c89eb8,2024-05-23T05:15:49.360000 +CVE-2024-5234,1,1,6dd4bb65d18138cca06d297b59f55dbd804ad1a665718b16ac1c63e38aebb76f,2024-05-23T05:15:49.693000 +CVE-2024-5235,1,1,cffd2e703223d1afc686422f828e0d822cc4ee996cdeefe9b0bdaae7ba81d98e,2024-05-23T05:15:49.947000 +CVE-2024-5236,1,1,170569d29d286189561dcf87f184e11323ada3eefb3d1277bfe6294a4041b2bd,2024-05-23T05:15:50.203000