diff --git a/CVE-2024/CVE-2024-262xx/CVE-2024-26289.json b/CVE-2024/CVE-2024-262xx/CVE-2024-26289.json new file mode 100644 index 00000000000..1f198449b3d --- /dev/null +++ b/CVE-2024/CVE-2024-262xx/CVE-2024-26289.json @@ -0,0 +1,59 @@ +{ + "id": "CVE-2024-26289", + "sourceIdentifier": "a6d3dc9e-0591-4a13-bce7-0f5b31ff6158", + "published": "2024-05-27T07:15:08.807", + "lastModified": "2024-05-27T07:15:08.807", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Deserialization of Untrusted Data vulnerability in PMB Services PMB allows Remote Code Inclusion.This issue affects PMB: from 7.5.1 before 7.5.6-2, from 7.4.1 before 7.4.9, from 7.3.1 before 7.3.18." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "a6d3dc9e-0591-4a13-bce7-0f5b31ff6158", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "a6d3dc9e-0591-4a13-bce7-0f5b31ff6158", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-502" + } + ] + } + ], + "references": [ + { + "url": "https://forge.sigb.net/projects/pmb/files", + "source": "a6d3dc9e-0591-4a13-bce7-0f5b31ff6158" + }, + { + "url": "https://github.com/enisaeu/CNW/blob/main/advisories/2024/CNW-2024-A-12.md", + "source": "a6d3dc9e-0591-4a13-bce7-0f5b31ff6158" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-273xx/CVE-2024-27314.json b/CVE-2024/CVE-2024-273xx/CVE-2024-27314.json new file mode 100644 index 00000000000..83aa071099e --- /dev/null +++ b/CVE-2024/CVE-2024-273xx/CVE-2024-27314.json @@ -0,0 +1,43 @@ +{ + "id": "CVE-2024-27314", + "sourceIdentifier": "0fc0942c-577d-436f-ae8e-945763c79b02", + "published": "2024-05-27T07:15:09.297", + "lastModified": "2024-05-27T07:15:09.297", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Zoho ManageEngine\u00a0ServiceDesk Plus versions below\u00a014730,\u00a0ServiceDesk Plus MSP below 14720 and\u00a0SupportCenter Plus below\u00a014730 are vulnerable to\u00a0stored XSS in the Custom Actions menu on the request details. This vulnerability can be exploited only by the SDAdmin role users." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "0fc0942c-577d-436f-ae8e-945763c79b02", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:N/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 2.4, + "baseSeverity": "LOW" + }, + "exploitabilityScore": 0.9, + "impactScore": 1.4 + } + ] + }, + "references": [ + { + "url": "https://www.manageengine.com/products/service-desk/cve-2024-27314.html", + "source": "0fc0942c-577d-436f-ae8e-945763c79b02" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-39xx/CVE-2024-3933.json b/CVE-2024/CVE-2024-39xx/CVE-2024-3933.json new file mode 100644 index 00000000000..28235ef1cf8 --- /dev/null +++ b/CVE-2024/CVE-2024-39xx/CVE-2024-3933.json @@ -0,0 +1,67 @@ +{ + "id": "CVE-2024-3933", + "sourceIdentifier": "emo@eclipse.org", + "published": "2024-05-27T06:15:09.367", + "lastModified": "2024-05-27T06:15:09.367", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "In Eclipse OpenJ9 release versions prior to 0.44.0 and after 0.13.0, when running with JVM option -Xgc:concurrentScavenge, the sequence generated for System.arrayCopy on the IBM Z platform with hardware and software support for guarded storage [1], could allow access to a buffer with an incorrect length value when executing an arraycopy sequence while the Concurrent Scavenge Garbage Collection cycle is active and the source and destination memory regions for arraycopy overlap. This allows read and write to addresses beyond the end of the array range." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "emo@eclipse.org", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:L", + "attackVector": "LOCAL", + "attackComplexity": "HIGH", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "availabilityImpact": "LOW", + "baseScore": 5.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.0, + "impactScore": 4.2 + } + ] + }, + "weaknesses": [ + { + "source": "emo@eclipse.org", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-125" + }, + { + "lang": "en", + "value": "CWE-787" + }, + { + "lang": "en", + "value": "CWE-805" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/eclipse/omr/pull/7275", + "source": "emo@eclipse.org" + }, + { + "url": "https://gitlab.eclipse.org/security/cve-assignement/-/issues/21", + "source": "emo@eclipse.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-39xx/CVE-2024-3939.json b/CVE-2024/CVE-2024-39xx/CVE-2024-3939.json new file mode 100644 index 00000000000..9d7e8c03aff --- /dev/null +++ b/CVE-2024/CVE-2024-39xx/CVE-2024-3939.json @@ -0,0 +1,20 @@ +{ + "id": "CVE-2024-3939", + "sourceIdentifier": "contact@wpscan.com", + "published": "2024-05-27T06:15:09.733", + "lastModified": "2024-05-27T06:15:09.733", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "The Ditty WordPress plugin before 3.1.36 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup)" + } + ], + "metrics": {}, + "references": [ + { + "url": "https://wpscan.com/vulnerability/80a9eb3a-2cb1-4844-9004-ba2554b2d46c/", + "source": "contact@wpscan.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-45xx/CVE-2024-4529.json b/CVE-2024/CVE-2024-45xx/CVE-2024-4529.json new file mode 100644 index 00000000000..5c2f63327ad --- /dev/null +++ b/CVE-2024/CVE-2024-45xx/CVE-2024-4529.json @@ -0,0 +1,20 @@ +{ + "id": "CVE-2024-4529", + "sourceIdentifier": "contact@wpscan.com", + "published": "2024-05-27T06:15:09.840", + "lastModified": "2024-05-27T06:15:09.840", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "The Business Card WordPress plugin through 1.0.0 does not have CSRF checks in some places, which could allow attackers to make logged in users perform unwanted actions such as deleting card categories via CSRF attacks" + } + ], + "metrics": {}, + "references": [ + { + "url": "https://wpscan.com/vulnerability/082ff0b8-2ecd-4292-832d-0a79e1ba8cb3/", + "source": "contact@wpscan.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-45xx/CVE-2024-4530.json b/CVE-2024/CVE-2024-45xx/CVE-2024-4530.json new file mode 100644 index 00000000000..52d1eef1399 --- /dev/null +++ b/CVE-2024/CVE-2024-45xx/CVE-2024-4530.json @@ -0,0 +1,20 @@ +{ + "id": "CVE-2024-4530", + "sourceIdentifier": "contact@wpscan.com", + "published": "2024-05-27T06:15:09.927", + "lastModified": "2024-05-27T06:15:09.927", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "The Business Card WordPress plugin through 1.0.0 does not have CSRF checks in some places, which could allow attackers to make logged in users perform unwanted actions such as editing card categories via CSRF attacks" + } + ], + "metrics": {}, + "references": [ + { + "url": "https://wpscan.com/vulnerability/952f6b5c-7728-4c87-8826-6b493f51a979/", + "source": "contact@wpscan.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-45xx/CVE-2024-4531.json b/CVE-2024/CVE-2024-45xx/CVE-2024-4531.json new file mode 100644 index 00000000000..3b052775f24 --- /dev/null +++ b/CVE-2024/CVE-2024-45xx/CVE-2024-4531.json @@ -0,0 +1,20 @@ +{ + "id": "CVE-2024-4531", + "sourceIdentifier": "contact@wpscan.com", + "published": "2024-05-27T06:15:10.017", + "lastModified": "2024-05-27T06:15:10.017", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "The Business Card WordPress plugin through 1.0.0 does not have CSRF checks in some places, which could allow attackers to make logged in users perform unwanted actions such as editing cards via CSRF attacks" + } + ], + "metrics": {}, + "references": [ + { + "url": "https://wpscan.com/vulnerability/18c1b3bb-9998-416f-a972-c4a51643579c/", + "source": "contact@wpscan.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-45xx/CVE-2024-4532.json b/CVE-2024/CVE-2024-45xx/CVE-2024-4532.json new file mode 100644 index 00000000000..4cbd0d10d39 --- /dev/null +++ b/CVE-2024/CVE-2024-45xx/CVE-2024-4532.json @@ -0,0 +1,20 @@ +{ + "id": "CVE-2024-4532", + "sourceIdentifier": "contact@wpscan.com", + "published": "2024-05-27T06:15:10.100", + "lastModified": "2024-05-27T06:15:10.100", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "The Business Card WordPress plugin through 1.0.0 does not have CSRF checks in some places, which could allow attackers to make logged in users perform unwanted actions such as deleting cards via CSRF attacks" + } + ], + "metrics": {}, + "references": [ + { + "url": "https://wpscan.com/vulnerability/64cf5f95-bbf0-4c5f-867b-62f1b7f6a42e/", + "source": "contact@wpscan.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-45xx/CVE-2024-4533.json b/CVE-2024/CVE-2024-45xx/CVE-2024-4533.json new file mode 100644 index 00000000000..8b71c2d06be --- /dev/null +++ b/CVE-2024/CVE-2024-45xx/CVE-2024-4533.json @@ -0,0 +1,20 @@ +{ + "id": "CVE-2024-4533", + "sourceIdentifier": "contact@wpscan.com", + "published": "2024-05-27T06:15:10.283", + "lastModified": "2024-05-27T06:15:10.283", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "The KKProgressbar2 Free WordPress plugin through 1.1.4.2 does not sanitize and escape a parameter before using it in a SQL statement, allowing admin users to perform SQL injection attacks" + } + ], + "metrics": {}, + "references": [ + { + "url": "https://wpscan.com/vulnerability/c3406236-aaee-480a-8931-79c867252f11/", + "source": "contact@wpscan.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-45xx/CVE-2024-4534.json b/CVE-2024/CVE-2024-45xx/CVE-2024-4534.json new file mode 100644 index 00000000000..3730384d07a --- /dev/null +++ b/CVE-2024/CVE-2024-45xx/CVE-2024-4534.json @@ -0,0 +1,20 @@ +{ + "id": "CVE-2024-4534", + "sourceIdentifier": "contact@wpscan.com", + "published": "2024-05-27T06:15:10.423", + "lastModified": "2024-05-27T06:15:10.423", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "The KKProgressbar2 Free WordPress plugin through 1.1.4.2 does not have CSRF check in some places, and is missing sanitisation as well as escaping, which could allow attackers to make logged in admin add Stored XSS payloads via a CSRF attack" + } + ], + "metrics": {}, + "references": [ + { + "url": "https://wpscan.com/vulnerability/7b0046d4-cf95-4307-95a5-9b823f2daaaa/", + "source": "contact@wpscan.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-45xx/CVE-2024-4535.json b/CVE-2024/CVE-2024-45xx/CVE-2024-4535.json new file mode 100644 index 00000000000..bcff9bc42d0 --- /dev/null +++ b/CVE-2024/CVE-2024-45xx/CVE-2024-4535.json @@ -0,0 +1,20 @@ +{ + "id": "CVE-2024-4535", + "sourceIdentifier": "contact@wpscan.com", + "published": "2024-05-27T06:15:10.520", + "lastModified": "2024-05-27T06:15:10.520", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "The KKProgressbar2 Free WordPress plugin through 1.1.4.2 does not have CSRF checks in some places, which could allow attackers to make logged in users perform unwanted actions via CSRF attacks" + } + ], + "metrics": {}, + "references": [ + { + "url": "https://wpscan.com/vulnerability/d4980886-da10-4bbc-a84a-fe071ab3b755/", + "source": "contact@wpscan.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-54xx/CVE-2024-5400.json b/CVE-2024/CVE-2024-54xx/CVE-2024-5400.json new file mode 100644 index 00000000000..60b1a0f8761 --- /dev/null +++ b/CVE-2024/CVE-2024-54xx/CVE-2024-5400.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2024-5400", + "sourceIdentifier": "twcert@cert.org.tw", + "published": "2024-05-27T06:15:10.620", + "lastModified": "2024-05-27T06:15:10.620", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Openfind Mail2000 does not properly filter parameters of specific CGI. Remote attackers with regular privileges can exploit this vulnerability to execute arbitrary system commands on the remote server." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "twcert@cert.org.tw", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "twcert@cert.org.tw", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-78" + } + ] + } + ], + "references": [ + { + "url": "https://www.twcert.org.tw/tw/cp-132-7819-9661a-1.html", + "source": "twcert@cert.org.tw" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-54xx/CVE-2024-5403.json b/CVE-2024/CVE-2024-54xx/CVE-2024-5403.json new file mode 100644 index 00000000000..351cdaecd6b --- /dev/null +++ b/CVE-2024/CVE-2024-54xx/CVE-2024-5403.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2024-5403", + "sourceIdentifier": "twcert@cert.org.tw", + "published": "2024-05-27T07:15:09.530", + "lastModified": "2024-05-27T07:15:09.530", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "ASKEY 5G NR Small Cell fails to properly filter user input for certain functionality, allowing remote attackers with administrator privilege to execute arbitrary system commands on the remote server." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "twcert@cert.org.tw", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.2, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.2, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "twcert@cert.org.tw", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-78" + } + ] + } + ], + "references": [ + { + "url": "https://www.twcert.org.tw/tw/cp-132-7821-87e38-1.html", + "source": "twcert@cert.org.tw" + } + ] +} \ No newline at end of file diff --git a/README.md b/README.md index f3f8fe6b7fd..cf4abb28a4a 100644 --- a/README.md +++ b/README.md @@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2024-05-27T06:00:31.312532+00:00 +2024-05-27T08:00:38.218387+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2024-05-27T05:15:09.617000+00:00 +2024-05-27T07:15:09.530000+00:00 ``` ### Last Data Feed Release @@ -33,17 +33,26 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### Total Number of included CVEs ```plain -251842 +251855 ``` ### CVEs added in the last Commit -Recently added CVEs: `4` +Recently added CVEs: `13` -- [CVE-2024-35291](CVE-2024/CVE-2024-352xx/CVE-2024-35291.json) (`2024-05-27T05:15:08.750`) -- [CVE-2024-35297](CVE-2024/CVE-2024-352xx/CVE-2024-35297.json) (`2024-05-27T05:15:09.617`) -- [CVE-2024-36384](CVE-2024/CVE-2024-363xx/CVE-2024-36384.json) (`2024-05-27T04:15:09.143`) -- [CVE-2024-5399](CVE-2024/CVE-2024-53xx/CVE-2024-5399.json) (`2024-05-27T04:15:09.300`) +- [CVE-2024-26289](CVE-2024/CVE-2024-262xx/CVE-2024-26289.json) (`2024-05-27T07:15:08.807`) +- [CVE-2024-27314](CVE-2024/CVE-2024-273xx/CVE-2024-27314.json) (`2024-05-27T07:15:09.297`) +- [CVE-2024-3933](CVE-2024/CVE-2024-39xx/CVE-2024-3933.json) (`2024-05-27T06:15:09.367`) +- [CVE-2024-3939](CVE-2024/CVE-2024-39xx/CVE-2024-3939.json) (`2024-05-27T06:15:09.733`) +- [CVE-2024-4529](CVE-2024/CVE-2024-45xx/CVE-2024-4529.json) (`2024-05-27T06:15:09.840`) +- [CVE-2024-4530](CVE-2024/CVE-2024-45xx/CVE-2024-4530.json) (`2024-05-27T06:15:09.927`) +- [CVE-2024-4531](CVE-2024/CVE-2024-45xx/CVE-2024-4531.json) (`2024-05-27T06:15:10.017`) +- [CVE-2024-4532](CVE-2024/CVE-2024-45xx/CVE-2024-4532.json) (`2024-05-27T06:15:10.100`) +- [CVE-2024-4533](CVE-2024/CVE-2024-45xx/CVE-2024-4533.json) (`2024-05-27T06:15:10.283`) +- [CVE-2024-4534](CVE-2024/CVE-2024-45xx/CVE-2024-4534.json) (`2024-05-27T06:15:10.423`) +- [CVE-2024-4535](CVE-2024/CVE-2024-45xx/CVE-2024-4535.json) (`2024-05-27T06:15:10.520`) +- [CVE-2024-5400](CVE-2024/CVE-2024-54xx/CVE-2024-5400.json) (`2024-05-27T06:15:10.620`) +- [CVE-2024-5403](CVE-2024/CVE-2024-54xx/CVE-2024-5403.json) (`2024-05-27T07:15:09.530`) ### CVEs modified in the last Commit diff --git a/_state.csv b/_state.csv index 353fb97ba25..2e61773e386 100644 --- a/_state.csv +++ b/_state.csv @@ -245428,6 +245428,7 @@ CVE-2024-26283,0,0,c7426af4f72de6bd8169b87f55aaf0821db59807c5f80e4d23e5063ce2590 CVE-2024-26284,0,0,f79dc1c634537120e378ab4b0514a9846d07e853714505b28d8ffc47ff6035fc,2024-02-22T19:07:27.197000 CVE-2024-26287,0,0,c39408b47e386d860866dbaf91481bf6cc5c7b2fdab909e591b6b072220a00ce,2024-02-22T12:15:46.420000 CVE-2024-26288,0,0,d09d5769f2845cca860d6607c437523a6856a9ad896646c33e831fd58d53d7c6,2024-03-12T12:40:13.500000 +CVE-2024-26289,1,1,8f5a75fca4d7dd9cde27b895beee3de29dbe3741928bd7153c68659165c1f576,2024-05-27T07:15:08.807000 CVE-2024-2629,0,0,4b7ef148c53e03230aadc0d4dc17e5a892bccf176cf56d9e83cf2cfc553954c2,2024-04-01T15:23:21.117000 CVE-2024-26294,0,0,8f2653a28865ca804b8370948c9e7d3e637353d4b46577fce92b2448c794af47,2024-02-28T14:06:45.783000 CVE-2024-26295,0,0,65ee85dc804537ea0b26ffe740c08dea57534a215c648fbb89367faf852ebc5e,2024-02-28T14:06:45.783000 @@ -246234,6 +246235,7 @@ CVE-2024-27308,0,0,2c1853ceb0d45fb092e9c133d6553571b7b9f8a855fc6b4950edbdaad5952 CVE-2024-27309,0,0,4ff276f1fa3a42e9cba86006da159d603e23baa66b2db98c085aa5a6c3adaee2,2024-05-01T18:15:15.967000 CVE-2024-2731,0,0,7242593ba3e5c5b48a25383d38b7647a4613c0186c7dc999e27ef7b770a540e3,2024-04-10T19:49:51.183000 CVE-2024-27312,0,0,03b9c1d615c7eea419258607ab4327a45a73e24a5e571b82ecc5b8d0b7dc264a,2024-05-20T15:17:54.513000 +CVE-2024-27314,1,1,ac1493e462403a46c12e85e6796125c8ed735dacb926ca788dd0b7320e8a9447,2024-05-27T07:15:09.297000 CVE-2024-27315,0,0,1b06bd54abb4ee7969c3aca53e6bed402762ed42c4492d0ee8674e3fa0b42312,2024-02-28T15:15:09.670000 CVE-2024-27316,0,0,42d27b12e519cd2645cf692e286d8fde89efcbae83d79644c67975e4ec7fea81,2024-05-01T18:15:16.023000 CVE-2024-27317,0,0,c3dded617afb79b595cc5394bc34fa2395e63ed9fe33b66ba0cb8f90b0b09bad,2024-05-01T18:15:16.097000 @@ -250442,8 +250444,8 @@ CVE-2024-3525,0,0,d160b9aacf64da3afa7deea3824b335adab6f10a287b9b570340cfda8c91ff CVE-2024-3526,0,0,7aa053534daa29503e740ad77b77cb47be1c8cd5e2a6b1d98f33dcb689c14e4e,2024-05-17T02:39:59.067000 CVE-2024-3528,0,0,12c1cd3d931c23013d321f77d84374875132cb3a519f997e82936b57d5eb40c0,2024-05-17T02:39:59.157000 CVE-2024-3529,0,0,a5064dfdb29cc291d331e7cb349f1ad4d7941de74c2bc68b73712d362eb35016,2024-05-17T02:39:59.247000 -CVE-2024-35291,1,1,a3d5b12307b63ea94946a3e2606f8b88d1d11c12b2225a7b8a5ddfab5295e490,2024-05-27T05:15:08.750000 -CVE-2024-35297,1,1,e360861fe1667d91be7d69a5bb5a77bf18c59a0b9349b049c420eca76e721d5d,2024-05-27T05:15:09.617000 +CVE-2024-35291,0,0,a3d5b12307b63ea94946a3e2606f8b88d1d11c12b2225a7b8a5ddfab5295e490,2024-05-27T05:15:08.750000 +CVE-2024-35297,0,0,e360861fe1667d91be7d69a5bb5a77bf18c59a0b9349b049c420eca76e721d5d,2024-05-27T05:15:09.617000 CVE-2024-35299,0,0,3e4e645ea2334a2d70a8ac0e5a235ab378675ad9f04d95540b17d9c98a4ac10a,2024-05-16T13:03:05.353000 CVE-2024-3530,0,0,e12d930d34076470c73bc5005c248ade707b9149f13bae62cf727f0aa959148f,2024-05-17T02:39:59.340000 CVE-2024-35300,0,0,c9948d6a23b607dc905f5cedb43ddb5e762c784721f0ec88d5b26fbba2ccfab0,2024-05-16T13:03:05.353000 @@ -250816,7 +250818,7 @@ CVE-2024-3631,0,0,52e896a80c9b063fda6224c04771bbd75f72f78e3d3636ccff4bb724fd1661 CVE-2024-3634,0,0,940ae4dd6e92f9452379e49ccdcd29aa6fe6e9bda25faf9f7045c78090371ae8,2024-05-15T16:40:19.330000 CVE-2024-36361,0,0,f38f7877ee2fdf122f5bc8d2352bd0aed642365f6f8794612d7f1076f7aeed30,2024-05-24T13:03:05.093000 CVE-2024-3637,0,0,e0d8ef5f7498633f88592f7b832da01e95be5d925cdaa67450761833b0152a3c,2024-05-03T12:48:41.067000 -CVE-2024-36384,1,1,a0d79da3fdcabd7b9bb7cff9348fa87578adddb020086454394ad176d2bb39e2,2024-05-27T04:15:09.143000 +CVE-2024-36384,0,0,a0d79da3fdcabd7b9bb7cff9348fa87578adddb020086454394ad176d2bb39e2,2024-05-27T04:15:09.143000 CVE-2024-3640,0,0,abbf5a33cbca708fe19710dda7a796491ae1d1614e9cd03f43d6cddef8b09500,2024-05-17T18:36:31.297000 CVE-2024-3641,0,0,c281de95cce057acff2793609e8f843aad579a2f0257c0c2e0b6442733e87b14,2024-05-16T13:03:05.353000 CVE-2024-3642,0,0,bbed1ee941355da6f32a6eba37e95a843dd7913c7dd227d8da7f65dcb683674b,2024-05-16T13:03:05.353000 @@ -251042,7 +251044,9 @@ CVE-2024-3928,0,0,537f117f8c3572d036e1aa43e9ee1a226723d4a5980268ff58c8876839ea31 CVE-2024-3929,0,0,31d0a734bfd88727a2a61deb7a29595ac9c8ac4a930ee35c31639990489d025d,2024-04-25T13:18:13.537000 CVE-2024-3931,0,0,e22ac9b330de34ffd0826895a71fc25f4c0d9f18776ea985f00f3d672117685b,2024-05-17T02:40:11.813000 CVE-2024-3932,0,0,c0d9a67b2c517f2563118cc1f9a01d2e8e41cb18884f915915898eddf3b5dc57,2024-05-17T02:40:11.913000 +CVE-2024-3933,1,1,608bf955e7e3afdfd756e7d44d97ddce9b13554752f96d8cc087de14653bf09f,2024-05-27T06:15:09.367000 CVE-2024-3936,0,0,1a9ebdb5653b792bdb8abb0138184d539d6d0e0c9af8da519de630a92cc0aee0,2024-05-02T18:00:37.360000 +CVE-2024-3939,1,1,1004bf05e633d82b8a6f77e8ce101817a3c5f89effd6fa890cec55ae112b10ad,2024-05-27T06:15:09.733000 CVE-2024-3940,0,0,52f7bf6d70193ddf6b45db8d32585f84af1f44b7487d20897766e34b437b8581,2024-05-14T16:11:39.510000 CVE-2024-3941,0,0,3315566f834adaa65bc779c72609390662785ebcc4aac50a6cb30731cb96d90c,2024-05-14T16:11:39.510000 CVE-2024-3942,0,0,e822d69f7c80cdc7914f6c6d228f749a2878411b19bb34f624a4ef0b72687edf,2024-05-02T18:00:37.360000 @@ -251395,6 +251399,13 @@ CVE-2024-4525,0,0,81bd3a31a3c4a81aa703e7d72da0991ec9963fc2a8e8ef88d231cff9f6e1a6 CVE-2024-4526,0,0,ee6465488f566257f8056f9d367cdaf90969462b9cc42af44c48f971f9f329ef,2024-05-17T02:40:27.837000 CVE-2024-4527,0,0,40c2edc0e3fc8765d50aab05ebe93e0491c6359e480ffebabfe9415feba30234,2024-05-17T02:40:27.927000 CVE-2024-4528,0,0,4c65481daa9c96787216a8b3f047a2879ace4bcfe57b75dc61cc4f940018d649,2024-05-17T02:40:28.020000 +CVE-2024-4529,1,1,e49ba15798dd8b824b0a7d792cccb4816c7e8f5c9ff64bdb3790e8bebf225c13,2024-05-27T06:15:09.840000 +CVE-2024-4530,1,1,d7163540f5fcb4a1695fd4125b056fb2456dc62fddf701bf3ebf3d2284945ec8,2024-05-27T06:15:09.927000 +CVE-2024-4531,1,1,1ed7aa241d5c809c947f2029a4e7ba549d86a295d139ac83d7b027c5d7559e82,2024-05-27T06:15:10.017000 +CVE-2024-4532,1,1,79b4cdc6d7f3c5d544e8ed5f8ced908d39fe88eb79c668592ba0ac7322cf638f,2024-05-27T06:15:10.100000 +CVE-2024-4533,1,1,bab2beec0846103019a97fa614a0e6e2fdb9949357ed4e5e2eb3a7c3012b03fc,2024-05-27T06:15:10.283000 +CVE-2024-4534,1,1,5291f105d670796a5e740275bf99c356379be737eb16b81f04f22f20a1f7edba,2024-05-27T06:15:10.423000 +CVE-2024-4535,1,1,d445951b0e53dd340fb4505b31c23d298c6010f0cde71cc5f7ea1252bbff88dd,2024-05-27T06:15:10.520000 CVE-2024-4536,0,0,6d02ed0759b0f2029154ac1e9fa623fe4e250972d7d12c9e4f8d0247100613d5,2024-05-07T13:39:32.710000 CVE-2024-4537,0,0,bc82aa6954c5799b0476dc279149a81ab940e42aa35e918500f89f663af922c5,2024-05-07T13:39:32.710000 CVE-2024-4538,0,0,dbb952ff57fc82a37e26bc4eac10a9f198285e190e0ce1d17eb40564657c4b33,2024-05-07T13:39:32.710000 @@ -251840,4 +251851,6 @@ CVE-2024-5394,0,0,537bb898c77df0519c24f9f1263831287dc2feb6fe05007fed2482e0ced321 CVE-2024-5395,0,0,f154f3c924c46a245ea427b3f229e3a073afff7418f39b61c0609f592714797a,2024-05-27T03:15:08.370000 CVE-2024-5396,0,0,e9f88811caa549baff5b3a6d103ce0530ca526bf72b174c586ccd5552f6e4a10,2024-05-27T03:15:08.650000 CVE-2024-5397,0,0,127f0e4aebb20af982b9f8f3c5e3c610f094604b0e4dbcdf747a9ca9a9d17d0c,2024-05-27T03:15:08.923000 -CVE-2024-5399,1,1,11939ed21acc3c5ec586746ddde14b797a390e121836283682232169079970b5,2024-05-27T04:15:09.300000 +CVE-2024-5399,0,0,11939ed21acc3c5ec586746ddde14b797a390e121836283682232169079970b5,2024-05-27T04:15:09.300000 +CVE-2024-5400,1,1,3934e126a75210a22708febe3829ce6c46f46cc7e12a3a7182ec01f8e6ac35ad,2024-05-27T06:15:10.620000 +CVE-2024-5403,1,1,ed1d166ca6bf87c091bd718e3e0b00502f1d612d8d3d042e4dc422513dd0bdef,2024-05-27T07:15:09.530000