From 485cf9ab3c2668419ebf4b9ed9079acecbe0140c Mon Sep 17 00:00:00 2001 From: cad-safe-bot Date: Thu, 16 May 2024 02:03:21 +0000 Subject: [PATCH] Auto-Update: 2024-05-16T02:00:30.323989+00:00 --- CVE-2021/CVE-2021-18xx/CVE-2021-1870.json | 4 +- CVE-2021/CVE-2021-18xx/CVE-2021-1871.json | 4 +- CVE-2021/CVE-2021-18xx/CVE-2021-1879.json | 4 +- CVE-2021/CVE-2021-306xx/CVE-2021-30661.json | 4 +- CVE-2021/CVE-2021-306xx/CVE-2021-30663.json | 4 +- CVE-2021/CVE-2021-306xx/CVE-2021-30665.json | 4 +- CVE-2021/CVE-2021-306xx/CVE-2021-30666.json | 4 +- CVE-2021/CVE-2021-307xx/CVE-2021-30761.json | 4 +- CVE-2021/CVE-2021-307xx/CVE-2021-30762.json | 4 +- CVE-2022/CVE-2022-226xx/CVE-2022-22620.json | 4 +- CVE-2024/CVE-2024-223xx/CVE-2024-22353.json | 8 +- CVE-2024/CVE-2024-232xx/CVE-2024-23222.json | 4 +- CVE-2024/CVE-2024-272xx/CVE-2024-27268.json | 8 +- CVE-2024/CVE-2024-49xx/CVE-2024-4919.json | 92 +++++++++++++++++++++ CVE-2024/CVE-2024-49xx/CVE-2024-4920.json | 92 +++++++++++++++++++++ CVE-2024/CVE-2024-49xx/CVE-2024-4921.json | 92 +++++++++++++++++++++ CVE-2024/CVE-2024-49xx/CVE-2024-4922.json | 92 +++++++++++++++++++++ README.md | 37 +++++---- _state.csv | 46 ++++++----- 19 files changed, 446 insertions(+), 65 deletions(-) create mode 100644 CVE-2024/CVE-2024-49xx/CVE-2024-4919.json create mode 100644 CVE-2024/CVE-2024-49xx/CVE-2024-4920.json create mode 100644 CVE-2024/CVE-2024-49xx/CVE-2024-4921.json create mode 100644 CVE-2024/CVE-2024-49xx/CVE-2024-4922.json diff --git a/CVE-2021/CVE-2021-18xx/CVE-2021-1870.json b/CVE-2021/CVE-2021-18xx/CVE-2021-1870.json index dc2454cd674..9a982847da1 100644 --- a/CVE-2021/CVE-2021-18xx/CVE-2021-1870.json +++ b/CVE-2021/CVE-2021-18xx/CVE-2021-1870.json @@ -2,12 +2,12 @@ "id": "CVE-2021-1870", "sourceIdentifier": "product-security@apple.com", "published": "2021-04-02T19:15:20.567", - "lastModified": "2023-11-07T03:28:52.360", + "lastModified": "2024-05-16T01:00:02.197", "vulnStatus": "Modified", "cisaExploitAdd": "2021-11-03", "cisaActionDue": "2021-11-17", "cisaRequiredAction": "Apply updates per vendor instructions.", - "cisaVulnerabilityName": "Apple iOS, iPadOS, and macOS Remote Code Execution Vulnerability", + "cisaVulnerabilityName": "Apple iOS, iPadOS, and macOS WebKit Remote Code Execution Vulnerability", "descriptions": [ { "lang": "en", diff --git a/CVE-2021/CVE-2021-18xx/CVE-2021-1871.json b/CVE-2021/CVE-2021-18xx/CVE-2021-1871.json index b855980c79c..3a378eb48df 100644 --- a/CVE-2021/CVE-2021-18xx/CVE-2021-1871.json +++ b/CVE-2021/CVE-2021-18xx/CVE-2021-1871.json @@ -2,12 +2,12 @@ "id": "CVE-2021-1871", "sourceIdentifier": "product-security@apple.com", "published": "2021-04-02T19:15:20.663", - "lastModified": "2023-11-07T03:28:52.430", + "lastModified": "2024-05-16T01:00:02.197", "vulnStatus": "Modified", "cisaExploitAdd": "2021-11-03", "cisaActionDue": "2021-11-17", "cisaRequiredAction": "Apply updates per vendor instructions.", - "cisaVulnerabilityName": "Apple iOS, iPadOS, and macOS Remote Code Execution Vulnerability", + "cisaVulnerabilityName": "Apple iOS, iPadOS, and macOS WebKit Remote Code Execution Vulnerability", "descriptions": [ { "lang": "en", diff --git a/CVE-2021/CVE-2021-18xx/CVE-2021-1879.json b/CVE-2021/CVE-2021-18xx/CVE-2021-1879.json index 1e19829c37c..7d1e88f5900 100644 --- a/CVE-2021/CVE-2021-18xx/CVE-2021-1879.json +++ b/CVE-2021/CVE-2021-18xx/CVE-2021-1879.json @@ -2,12 +2,12 @@ "id": "CVE-2021-1879", "sourceIdentifier": "product-security@apple.com", "published": "2021-04-02T19:15:20.770", - "lastModified": "2023-01-09T16:41:59.350", + "lastModified": "2024-05-16T01:00:02.197", "vulnStatus": "Analyzed", "cisaExploitAdd": "2021-11-03", "cisaActionDue": "2021-11-17", "cisaRequiredAction": "Apply updates per vendor instructions.", - "cisaVulnerabilityName": "Apple iOS, iPadOS, and watchOS Cross-Site Scripting (XSS) Vulnerability", + "cisaVulnerabilityName": "Apple iOS, iPadOS, and watchOS WebKit Cross-Site Scripting (XSS) Vulnerability", "descriptions": [ { "lang": "en", diff --git a/CVE-2021/CVE-2021-306xx/CVE-2021-30661.json b/CVE-2021/CVE-2021-306xx/CVE-2021-30661.json index 2299f458d5d..d576bb75443 100644 --- a/CVE-2021/CVE-2021-306xx/CVE-2021-30661.json +++ b/CVE-2021/CVE-2021-306xx/CVE-2021-30661.json @@ -2,12 +2,12 @@ "id": "CVE-2021-30661", "sourceIdentifier": "product-security@apple.com", "published": "2021-09-08T15:15:13.320", - "lastModified": "2021-09-20T12:26:22.673", + "lastModified": "2024-05-16T01:00:02.197", "vulnStatus": "Analyzed", "cisaExploitAdd": "2021-11-03", "cisaActionDue": "2021-11-17", "cisaRequiredAction": "Apply updates per vendor instructions.", - "cisaVulnerabilityName": "Apple Multiple Products Use-After-Free Vulnerability", + "cisaVulnerabilityName": "Apple Multiple Products WebKit Storage Use-After-Free Vulnerability", "descriptions": [ { "lang": "en", diff --git a/CVE-2021/CVE-2021-306xx/CVE-2021-30663.json b/CVE-2021/CVE-2021-306xx/CVE-2021-30663.json index c00cebf5c7f..e2dfdd3bb62 100644 --- a/CVE-2021/CVE-2021-306xx/CVE-2021-30663.json +++ b/CVE-2021/CVE-2021-306xx/CVE-2021-30663.json @@ -2,12 +2,12 @@ "id": "CVE-2021-30663", "sourceIdentifier": "product-security@apple.com", "published": "2021-09-08T15:15:13.413", - "lastModified": "2024-02-02T03:08:37.943", + "lastModified": "2024-05-16T01:00:02.197", "vulnStatus": "Analyzed", "cisaExploitAdd": "2021-11-03", "cisaActionDue": "2021-11-17", "cisaRequiredAction": "Apply updates per vendor instructions.", - "cisaVulnerabilityName": "Apple Multiple Products Integer Overflow Vulnerability", + "cisaVulnerabilityName": "Apple Multiple Products WebKit Integer Overflow Vulnerability", "descriptions": [ { "lang": "en", diff --git a/CVE-2021/CVE-2021-306xx/CVE-2021-30665.json b/CVE-2021/CVE-2021-306xx/CVE-2021-30665.json index 6bebf94dbc8..32e4ec18c29 100644 --- a/CVE-2021/CVE-2021-306xx/CVE-2021-30665.json +++ b/CVE-2021/CVE-2021-306xx/CVE-2021-30665.json @@ -2,12 +2,12 @@ "id": "CVE-2021-30665", "sourceIdentifier": "product-security@apple.com", "published": "2021-09-08T15:15:13.507", - "lastModified": "2022-05-03T16:04:40.443", + "lastModified": "2024-05-16T01:00:02.197", "vulnStatus": "Analyzed", "cisaExploitAdd": "2021-11-03", "cisaActionDue": "2021-11-17", "cisaRequiredAction": "Apply updates per vendor instructions.", - "cisaVulnerabilityName": "Apple Multiple Products Memory Corruption Vulnerability", + "cisaVulnerabilityName": "Apple Multiple Products WebKit Memory Corruption Vulnerability", "descriptions": [ { "lang": "en", diff --git a/CVE-2021/CVE-2021-306xx/CVE-2021-30666.json b/CVE-2021/CVE-2021-306xx/CVE-2021-30666.json index a990993fcfd..de5aa106faa 100644 --- a/CVE-2021/CVE-2021-306xx/CVE-2021-30666.json +++ b/CVE-2021/CVE-2021-306xx/CVE-2021-30666.json @@ -2,12 +2,12 @@ "id": "CVE-2021-30666", "sourceIdentifier": "product-security@apple.com", "published": "2021-09-08T15:15:13.553", - "lastModified": "2022-07-12T17:42:04.277", + "lastModified": "2024-05-16T01:00:02.197", "vulnStatus": "Analyzed", "cisaExploitAdd": "2021-11-03", "cisaActionDue": "2021-11-17", "cisaRequiredAction": "Apply updates per vendor instructions.", - "cisaVulnerabilityName": "Apple iOS Buffer Overflow Vulnerability", + "cisaVulnerabilityName": "Apple iOS WebKit Buffer Overflow Vulnerability", "descriptions": [ { "lang": "en", diff --git a/CVE-2021/CVE-2021-307xx/CVE-2021-30761.json b/CVE-2021/CVE-2021-307xx/CVE-2021-30761.json index e12b3707203..afe8f2657dd 100644 --- a/CVE-2021/CVE-2021-307xx/CVE-2021-30761.json +++ b/CVE-2021/CVE-2021-307xx/CVE-2021-30761.json @@ -2,12 +2,12 @@ "id": "CVE-2021-30761", "sourceIdentifier": "product-security@apple.com", "published": "2021-09-08T14:15:10.257", - "lastModified": "2021-09-14T19:20:50.890", + "lastModified": "2024-05-16T01:00:02.197", "vulnStatus": "Analyzed", "cisaExploitAdd": "2021-11-03", "cisaActionDue": "2021-11-17", "cisaRequiredAction": "Apply updates per vendor instructions.", - "cisaVulnerabilityName": "Apple iOS Memory Corruption Vulnerability", + "cisaVulnerabilityName": "Apple iOS WebKit Memory Corruption Vulnerability", "descriptions": [ { "lang": "en", diff --git a/CVE-2021/CVE-2021-307xx/CVE-2021-30762.json b/CVE-2021/CVE-2021-307xx/CVE-2021-30762.json index ffe4518e449..3816f9080f6 100644 --- a/CVE-2021/CVE-2021-307xx/CVE-2021-30762.json +++ b/CVE-2021/CVE-2021-307xx/CVE-2021-30762.json @@ -2,12 +2,12 @@ "id": "CVE-2021-30762", "sourceIdentifier": "product-security@apple.com", "published": "2021-09-08T14:15:10.300", - "lastModified": "2021-09-14T19:29:08.017", + "lastModified": "2024-05-16T01:00:02.197", "vulnStatus": "Analyzed", "cisaExploitAdd": "2021-11-03", "cisaActionDue": "2021-11-17", "cisaRequiredAction": "Apply updates per vendor instructions.", - "cisaVulnerabilityName": "Apple iOS Use-After-Free Vulnerability", + "cisaVulnerabilityName": "Apple iOS WebKit Use-After-Free Vulnerability", "descriptions": [ { "lang": "en", diff --git a/CVE-2022/CVE-2022-226xx/CVE-2022-22620.json b/CVE-2022/CVE-2022-226xx/CVE-2022-22620.json index e8ad14cb23a..87549c33b4f 100644 --- a/CVE-2022/CVE-2022-226xx/CVE-2022-22620.json +++ b/CVE-2022/CVE-2022-226xx/CVE-2022-22620.json @@ -2,12 +2,12 @@ "id": "CVE-2022-22620", "sourceIdentifier": "product-security@apple.com", "published": "2022-03-18T18:15:13.787", - "lastModified": "2022-09-09T20:41:25.447", + "lastModified": "2024-05-16T01:00:02.197", "vulnStatus": "Analyzed", "cisaExploitAdd": "2022-02-11", "cisaActionDue": "2022-02-25", "cisaRequiredAction": "Apply updates per vendor instructions.", - "cisaVulnerabilityName": "Apple Webkit Remote Code Execution Vulnerability", + "cisaVulnerabilityName": "Apple iOS, iPadOS, and macOS Webkit Use-After-Free Vulnerability", "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-223xx/CVE-2024-22353.json b/CVE-2024/CVE-2024-223xx/CVE-2024-22353.json index a85a85e5c1c..2a588dd7439 100644 --- a/CVE-2024/CVE-2024-223xx/CVE-2024-22353.json +++ b/CVE-2024/CVE-2024-223xx/CVE-2024-22353.json @@ -2,12 +2,12 @@ "id": "CVE-2024-22353", "sourceIdentifier": "psirt@us.ibm.com", "published": "2024-03-31T12:15:50.430", - "lastModified": "2024-04-02T17:56:57.187", - "vulnStatus": "Analyzed", + "lastModified": "2024-05-16T00:15:08.057", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", - "value": "IBM WebSphere Application Server Liberty 17.0.0.3 through 24.0.0.3 is vulnerable to a denial of service, caused by sending a specially crafted request. A remote attacker could exploit this vulnerability to cause the server to consume memory resources. IBM X-Force ID: 280400." + "value": "IBM WebSphere Application Server Liberty 17.0.0.3 through 24.0.0.4 is vulnerable to a denial of service, caused by sending a specially crafted request. A remote attacker could exploit this vulnerability to cause the server to consume memory resources. IBM X-Force ID: 280400." }, { "lang": "es", @@ -65,7 +65,7 @@ "description": [ { "lang": "en", - "value": "CWE-400" + "value": "CWE-770" } ] } diff --git a/CVE-2024/CVE-2024-232xx/CVE-2024-23222.json b/CVE-2024/CVE-2024-232xx/CVE-2024-23222.json index 4a2c00d395a..39aaf407013 100644 --- a/CVE-2024/CVE-2024-232xx/CVE-2024-23222.json +++ b/CVE-2024/CVE-2024-232xx/CVE-2024-23222.json @@ -2,12 +2,12 @@ "id": "CVE-2024-23222", "sourceIdentifier": "product-security@apple.com", "published": "2024-01-23T01:15:11.500", - "lastModified": "2024-03-08T02:15:47.547", + "lastModified": "2024-05-16T01:00:02.200", "vulnStatus": "Modified", "cisaExploitAdd": "2024-01-23", "cisaActionDue": "2024-02-13", "cisaRequiredAction": "Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.", - "cisaVulnerabilityName": "Apple Multiple Products Type Confusion Vulnerability", + "cisaVulnerabilityName": "Apple Multiple Products WebKit Type Confusion Vulnerability", "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-272xx/CVE-2024-27268.json b/CVE-2024/CVE-2024-272xx/CVE-2024-27268.json index 70164b342f2..89166166551 100644 --- a/CVE-2024/CVE-2024-272xx/CVE-2024-27268.json +++ b/CVE-2024/CVE-2024-272xx/CVE-2024-27268.json @@ -2,12 +2,12 @@ "id": "CVE-2024-27268", "sourceIdentifier": "psirt@us.ibm.com", "published": "2024-04-04T18:15:13.823", - "lastModified": "2024-05-04T14:16:02.520", + "lastModified": "2024-05-16T01:15:07.370", "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", - "value": "IBM WebSphere Application Server Liberty 18.0.0.2 through 24.0.0.3 is vulnerable to a denial of service, caused by sending a specially crafted request. A remote attacker could exploit this vulnerability to cause the server to consume memory resources. IBM X-Force ID: 284574." + "value": "IBM WebSphere Application Server Liberty 18.0.0.2 through 24.0.0.4 is vulnerable to a denial of service, caused by sending a specially crafted request. A remote attacker could exploit this vulnerability to cause the server to consume memory resources. IBM X-Force ID: 284574." }, { "lang": "es", @@ -41,11 +41,11 @@ "weaknesses": [ { "source": "psirt@us.ibm.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", - "value": "CWE-400" + "value": "CWE-770" } ] } diff --git a/CVE-2024/CVE-2024-49xx/CVE-2024-4919.json b/CVE-2024/CVE-2024-49xx/CVE-2024-4919.json new file mode 100644 index 00000000000..7a1d7511a75 --- /dev/null +++ b/CVE-2024/CVE-2024-49xx/CVE-2024-4919.json @@ -0,0 +1,92 @@ +{ + "id": "CVE-2024-4919", + "sourceIdentifier": "cna@vuldb.com", + "published": "2024-05-16T00:15:08.280", + "lastModified": "2024-05-16T00:15:08.280", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability was found in Campcodes Online Examination System 1.0. It has been declared as critical. This vulnerability affects unknown code of the file /adminpanel/admin/query/addCourseExe.php. The manipulation of the argument course_name leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. VDB-264454 is the identifier assigned to this vulnerability." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 6.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "SINGLE", + "confidentialityImpact": "PARTIAL", + "integrityImpact": "PARTIAL", + "availabilityImpact": "PARTIAL", + "baseScore": 6.5 + }, + "baseSeverity": "MEDIUM", + "exploitabilityScore": 8.0, + "impactScore": 6.4, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/yylmm/CVE/blob/main/Online%20Examination%20System%20With%20Timer/SQL_addCourseExe.md", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.264454", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.264454", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.333416", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-49xx/CVE-2024-4920.json b/CVE-2024/CVE-2024-49xx/CVE-2024-4920.json new file mode 100644 index 00000000000..557be67c2dc --- /dev/null +++ b/CVE-2024/CVE-2024-49xx/CVE-2024-4920.json @@ -0,0 +1,92 @@ +{ + "id": "CVE-2024-4920", + "sourceIdentifier": "cna@vuldb.com", + "published": "2024-05-16T00:15:08.563", + "lastModified": "2024-05-16T00:15:08.563", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability was found in SourceCodester Online Discussion Forum Site 1.0. It has been rated as critical. This issue affects some unknown processing of the file registerH.php. The manipulation of the argument ima leads to unrestricted upload. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-264455." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 7.3, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "NONE", + "confidentialityImpact": "PARTIAL", + "integrityImpact": "PARTIAL", + "availabilityImpact": "PARTIAL", + "baseScore": 7.5 + }, + "baseSeverity": "HIGH", + "exploitabilityScore": 10.0, + "impactScore": 6.4, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-434" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/CveSecLook/cve/issues/27", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.264455", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.264455", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.333477", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-49xx/CVE-2024-4921.json b/CVE-2024/CVE-2024-49xx/CVE-2024-4921.json new file mode 100644 index 00000000000..961ee1282c6 --- /dev/null +++ b/CVE-2024/CVE-2024-49xx/CVE-2024-4921.json @@ -0,0 +1,92 @@ +{ + "id": "CVE-2024-4921", + "sourceIdentifier": "cna@vuldb.com", + "published": "2024-05-16T01:15:07.540", + "lastModified": "2024-05-16T01:15:07.540", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability classified as critical has been found in SourceCodester Employee and Visitor Gate Pass Logging System 1.0. Affected is an unknown function of the file /employee_gatepass/classes/Users.php?f=ssave. The manipulation of the argument img leads to unrestricted upload. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-264456." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 6.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "SINGLE", + "confidentialityImpact": "PARTIAL", + "integrityImpact": "PARTIAL", + "availabilityImpact": "PARTIAL", + "baseScore": 6.5 + }, + "baseSeverity": "MEDIUM", + "exploitabilityScore": 8.0, + "impactScore": 6.4, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-434" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/I-Schnee-I/cev/blob/main/upload.md", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.264456", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.264456", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.333662", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-49xx/CVE-2024-4922.json b/CVE-2024/CVE-2024-49xx/CVE-2024-4922.json new file mode 100644 index 00000000000..8f129af8c31 --- /dev/null +++ b/CVE-2024/CVE-2024-49xx/CVE-2024-4922.json @@ -0,0 +1,92 @@ +{ + "id": "CVE-2024-4922", + "sourceIdentifier": "cna@vuldb.com", + "published": "2024-05-16T01:15:07.813", + "lastModified": "2024-05-16T01:15:07.813", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability, which was classified as problematic, was found in SourceCodester Simple Image Stack Website 1.0. This affects an unknown part. The manipulation of the argument page leads to cross site scripting. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-264459." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 3.5, + "baseSeverity": "LOW" + }, + "exploitabilityScore": 2.1, + "impactScore": 1.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:S/C:N/I:P/A:N", + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "SINGLE", + "confidentialityImpact": "NONE", + "integrityImpact": "PARTIAL", + "availabilityImpact": "NONE", + "baseScore": 4.0 + }, + "baseSeverity": "MEDIUM", + "exploitabilityScore": 8.0, + "impactScore": 2.9, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/HuoMingZ/aoligei/blob/main/ceshi.md", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.264459", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.264459", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.333760", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/README.md b/README.md index e02cfe19218..4c322696538 100644 --- a/README.md +++ b/README.md @@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2024-05-15T23:55:30.228712+00:00 +2024-05-16T02:00:30.323989+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2024-05-15T23:15:08.210000+00:00 +2024-05-16T01:15:07.813000+00:00 ``` ### Last Data Feed Release @@ -27,33 +27,42 @@ Repository synchronizes with the NVD every 2 hours. Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/releases/latest) ```plain -2024-05-15T00:00:20.269004+00:00 +2024-05-16T00:00:20.245238+00:00 ``` ### Total Number of included CVEs ```plain -250058 +250062 ``` ### CVEs added in the last Commit -Recently added CVEs: `7` +Recently added CVEs: `4` -- [CVE-2024-35183](CVE-2024/CVE-2024-351xx/CVE-2024-35183.json) (`2024-05-15T22:15:08.580`) -- [CVE-2024-35184](CVE-2024/CVE-2024-351xx/CVE-2024-35184.json) (`2024-05-15T22:15:08.867`) -- [CVE-2024-4914](CVE-2024/CVE-2024-49xx/CVE-2024-4914.json) (`2024-05-15T22:15:09.153`) -- [CVE-2024-4915](CVE-2024/CVE-2024-49xx/CVE-2024-4915.json) (`2024-05-15T22:15:09.563`) -- [CVE-2024-4916](CVE-2024/CVE-2024-49xx/CVE-2024-4916.json) (`2024-05-15T23:15:07.607`) -- [CVE-2024-4917](CVE-2024/CVE-2024-49xx/CVE-2024-4917.json) (`2024-05-15T23:15:07.920`) -- [CVE-2024-4918](CVE-2024/CVE-2024-49xx/CVE-2024-4918.json) (`2024-05-15T23:15:08.210`) +- [CVE-2024-4919](CVE-2024/CVE-2024-49xx/CVE-2024-4919.json) (`2024-05-16T00:15:08.280`) +- [CVE-2024-4920](CVE-2024/CVE-2024-49xx/CVE-2024-4920.json) (`2024-05-16T00:15:08.563`) +- [CVE-2024-4921](CVE-2024/CVE-2024-49xx/CVE-2024-4921.json) (`2024-05-16T01:15:07.540`) +- [CVE-2024-4922](CVE-2024/CVE-2024-49xx/CVE-2024-4922.json) (`2024-05-16T01:15:07.813`) ### CVEs modified in the last Commit -Recently modified CVEs: `1` +Recently modified CVEs: `13` -- [CVE-2020-29312](CVE-2020/CVE-2020-293xx/CVE-2020-29312.json) (`2024-05-15T22:15:08.280`) +- [CVE-2021-1870](CVE-2021/CVE-2021-18xx/CVE-2021-1870.json) (`2024-05-16T01:00:02.197`) +- [CVE-2021-1871](CVE-2021/CVE-2021-18xx/CVE-2021-1871.json) (`2024-05-16T01:00:02.197`) +- [CVE-2021-1879](CVE-2021/CVE-2021-18xx/CVE-2021-1879.json) (`2024-05-16T01:00:02.197`) +- [CVE-2021-30661](CVE-2021/CVE-2021-306xx/CVE-2021-30661.json) (`2024-05-16T01:00:02.197`) +- [CVE-2021-30663](CVE-2021/CVE-2021-306xx/CVE-2021-30663.json) (`2024-05-16T01:00:02.197`) +- [CVE-2021-30665](CVE-2021/CVE-2021-306xx/CVE-2021-30665.json) (`2024-05-16T01:00:02.197`) +- [CVE-2021-30666](CVE-2021/CVE-2021-306xx/CVE-2021-30666.json) (`2024-05-16T01:00:02.197`) +- [CVE-2021-30761](CVE-2021/CVE-2021-307xx/CVE-2021-30761.json) (`2024-05-16T01:00:02.197`) +- [CVE-2021-30762](CVE-2021/CVE-2021-307xx/CVE-2021-30762.json) (`2024-05-16T01:00:02.197`) +- [CVE-2022-22620](CVE-2022/CVE-2022-226xx/CVE-2022-22620.json) (`2024-05-16T01:00:02.197`) +- [CVE-2024-22353](CVE-2024/CVE-2024-223xx/CVE-2024-22353.json) (`2024-05-16T00:15:08.057`) +- [CVE-2024-23222](CVE-2024/CVE-2024-232xx/CVE-2024-23222.json) (`2024-05-16T01:00:02.200`) +- [CVE-2024-27268](CVE-2024/CVE-2024-272xx/CVE-2024-27268.json) (`2024-05-16T01:15:07.370`) ## Download and Usage diff --git a/_state.csv b/_state.csv index 92ae4faa984..fa78cb91cbb 100644 --- a/_state.csv +++ b/_state.csv @@ -157299,7 +157299,7 @@ CVE-2020-29303,0,0,717655a3d9e225f97e23641b8f0dbd1d39e9de6907efdee1dbb270370c419 CVE-2020-29304,0,0,84975babe9f5ae6c0f0f0a51fa3e2512e1024340a2d783c5c20dedaa6297203f,2020-12-15T16:49:03.950000 CVE-2020-2931,0,0,03bf87fad374d78526f736b31005a9cc40eaee9c9e517b855e446310dbb59038,2020-04-16T20:01:45.827000 CVE-2020-29311,0,0,41b3e7e3a6200eb87718ee2c6728c703f47a995684bcbf17cb36161bed533b8e,2021-07-21T11:39:23.747000 -CVE-2020-29312,0,1,ccfcf5bd761bb5fd24d8577150bed1bd46bba3d9b3c846fbbef0bbb7959dc5d1,2024-05-15T22:15:08.280000 +CVE-2020-29312,0,0,ccfcf5bd761bb5fd24d8577150bed1bd46bba3d9b3c846fbbef0bbb7959dc5d1,2024-05-15T22:15:08.280000 CVE-2020-29315,0,0,abe7e86f34527c61d1d483d3a72cc22d790ff07cba0482a17d0c05481ea9b9c0,2023-12-07T14:22:18.950000 CVE-2020-2932,0,0,667f0eefde131418b1963e0b53fb3de15afa80260ba5051f3741b41d052cd116,2020-04-16T20:02:22.827000 CVE-2020-29321,0,0,17ccef2e8e7fab45b03c666e840bc4ddcd9bb69d6184715ab8017020b6df59de,2022-07-12T17:42:04.277000 @@ -166154,8 +166154,8 @@ CVE-2021-1864,0,0,8e26d91252a9b5e9e28835cfd3c0e453de998fc9314aa768e351caaca0b208 CVE-2021-1865,0,0,3d688b01054555a6cbdcaa16125ae13ad10e50f91be7adb0d081d1f16aeb8e57,2021-09-16T19:49:47.477000 CVE-2021-1867,0,0,288ed50e08496debd4c5e15dd0965819d65bccc069e18e9b4272f94ae014712d,2021-09-20T18:32:04.427000 CVE-2021-1868,0,0,1dfb254923e7afacac2616c3ca8c3a54ab36b820e1c2ac525988774c86085a4a,2021-09-20T12:39:19.897000 -CVE-2021-1870,0,0,e4ae500156f8ba460be5941bcc115316c06f1d8a2ce0f48a257ee4f614df68fd,2023-11-07T03:28:52.360000 -CVE-2021-1871,0,0,ee43eb7e823b28912ce82826b8fb8907bd383511f444b7bea13561c725915078,2023-11-07T03:28:52.430000 +CVE-2021-1870,0,1,01ec51930b8a65724e778ab0c99704b1858614987780d00d4c6053299333fdbc,2024-05-16T01:00:02.197000 +CVE-2021-1871,0,1,0a74a4ae952f89b48ede139d4612f9f015e7d55a380efee0a17ea786e6089713,2024-05-16T01:00:02.197000 CVE-2021-1872,0,0,c7f6d42de4fad056d615bed9f98ede1fdd9ba465bf505e23b3aed47cdcdb4007,2021-09-20T19:11:39.863000 CVE-2021-1873,0,0,0d434fa4bbf59afef33251394e5c365eb74741dbf21368fbc3b88782c6cb651a,2022-07-12T17:42:04.277000 CVE-2021-1874,0,0,01831726a4017e42ec0b903f9e783cee536f9423afb270804796af487a831b18,2021-09-20T19:05:43.507000 @@ -166163,7 +166163,7 @@ CVE-2021-1875,0,0,f596a58abc60fd8c3bde5f566700a3f292297b106975487a6677339c5274a9 CVE-2021-1876,0,0,d1104ce4d5570e3e2087d9039236244e45137fdc70fa3d634877356bd62e60b8,2021-09-20T14:23:56.827000 CVE-2021-1877,0,0,19711153a80cca58b6c12f071c4203853cbbbbcaa28d299d0d8966c129917af0,2021-09-20T12:09:40.643000 CVE-2021-1878,0,0,52e89cae37004f754af0a92634fb4c2279d1e6fe13edbd5b41106f8be37a4f61,2021-09-20T12:51:30.223000 -CVE-2021-1879,0,0,0c50c22df97ca3303cea9fe2b05018d705d511dde8acb899b610807b2cd91ee7,2023-01-09T16:41:59.350000 +CVE-2021-1879,0,1,6137e04831dfaef82d55fe53810f4a86f5158404bdecb0ccf3c13da1ce513cdd,2024-05-16T01:00:02.197000 CVE-2021-1880,0,0,780b5d0900b6009641f7b712523c9ba2e918f134af74f96d781fa87ec1ef635c,2021-09-20T12:14:00.740000 CVE-2021-1881,0,0,469063abe7dceee3bccdbd8354a0f91fc65a46a88ba7c04aa34b0ef4b1507656,2021-09-17T19:26:53.670000 CVE-2021-1882,0,0,279f64d385299ac85df920d5fffa8a2811465e56fc9975ae6e72309c1199d465,2021-09-20T18:04:33.287000 @@ -174652,12 +174652,12 @@ CVE-2021-30657,0,0,99ca1992fb3dfc6a541cb82d4aea250f3fcd656d9c777f83f05542a9a9cb4 CVE-2021-30658,0,0,df64bc4b043d06eb8f90a9c1bd5cebd4b041a71159d1a8aa513dc0c4f0a8485b,2021-09-21T15:29:33.150000 CVE-2021-30659,0,0,e530a8547e31c4a91777fde33c5b4c8d6766f06e448a762ad90b36b01951abc8,2021-09-17T14:26:26.420000 CVE-2021-30660,0,0,c2b33d647e4286b547415615a2b5ed54a22508246db81a1a1bda87aff173cee3,2021-09-20T13:15:02.383000 -CVE-2021-30661,0,0,6ee7bc9064f9ea4090da254810cd61da190b3bbb4388ed1086b5523ba8ed3013,2021-09-20T12:26:22.673000 +CVE-2021-30661,0,1,f6d9380b8d9f176346adaba4a073f2dc597f190fcd1925f474b20241edb51f16,2024-05-16T01:00:02.197000 CVE-2021-30662,0,0,fc2a2e73bbb70fc21b4631d1cbc668ad92a09b31502ed1667c5c53772f753d23,2021-09-20T12:26:52.893000 -CVE-2021-30663,0,0,859b787843d695bd666191907d2c8715dafed0e911d68de9f8e6dda6263ef0c0,2024-02-02T03:08:37.943000 +CVE-2021-30663,0,1,35069a740fdbc2d5c75571757b0eb0259708ec0e7c286bf59582dbded7368425,2024-05-16T01:00:02.197000 CVE-2021-30664,0,0,ff883536798ab1148dc2a1b1228cf4c81c4db706cd252b357d0ea4fa18eb75b6,2021-09-17T11:28:58.813000 -CVE-2021-30665,0,0,c102c87d1c7302e53628f5202f5871112ffe85723519f039b5839918222edf84,2022-05-03T16:04:40.443000 -CVE-2021-30666,0,0,98eba84490d8dcfcaec686e9bd2f5811a10213002b117113d82c1ea79b33bbc2,2022-07-12T17:42:04.277000 +CVE-2021-30665,0,1,e82ab10cdd5408fb4a5f0744f448e87cff64669abf6699ef90f4b75351d31e98,2024-05-16T01:00:02.197000 +CVE-2021-30666,0,1,f99d46c3a16fc1833642a06ca751a2463db538297089a1e57c962df8ac96bea9,2024-05-16T01:00:02.197000 CVE-2021-30667,0,0,b567a120dc2f62acc7835231ce7220e73d0df4014daf61e4fc499311275c32f1,2021-09-16T19:10:56.633000 CVE-2021-30668,0,0,ccac2a70ffd9d0df113a711da4967f9fba721b92218118bce12b4b7e6cb09ff6,2021-09-16T19:12:19.280000 CVE-2021-30669,0,0,0a8875c08687e95ea3a81fc22decd8281df8e208d9126c3af121b6e2510fde15,2021-09-16T16:47:43.090000 @@ -174745,8 +174745,8 @@ CVE-2021-30757,0,0,d3d56c6906b27240f0f9e387c7d17f692b7b562e6a2e2f0574def3255013e CVE-2021-30758,0,0,4a50cbb866560b9225c1187afb1bf1fff4d82a0b6c36471da0454f1c109ca12e,2021-09-14T20:00:04.913000 CVE-2021-30759,0,0,4bebe4566e6a97dd14bf02022046da6da5254b76fabde080882241d7a837174b,2021-09-14T20:20:14.083000 CVE-2021-30760,0,0,f0f67da202ffc51c91cc0e5bd3fc7cc95eafadb5c8d84ba6a4d3f7a5cb640335,2023-01-09T16:41:59.350000 -CVE-2021-30761,0,0,d7c864e51e02932798103d8a73d80364fc5c7b8debd3fad12394f3e54b9edffa,2021-09-14T19:20:50.890000 -CVE-2021-30762,0,0,a995c102ea66094c1e3e847919e6aac466cecdaeabb321f2b5be3edc213ea254,2021-09-14T19:29:08.017000 +CVE-2021-30761,0,1,f98edd3b4a073ad4d47e92596e3ccc783db1cda5a162147c9c1707c601010336,2024-05-16T01:00:02.197000 +CVE-2021-30762,0,1,b0a03d3c1a0855dda28fecbe75352154bb97d64278f5c92ab9052bc780472d2c,2024-05-16T01:00:02.197000 CVE-2021-30763,0,0,20d365012a73f2a57642ebb55f579b2a260a2e7232d04bc939481e11e0ec4bf5,2021-09-14T19:35:20.543000 CVE-2021-30764,0,0,eba5c09f8a49766c9f0ea77c6b7f32eb11b844f03685ee600eada4ebada74ba2,2021-09-14T19:38:39.237000 CVE-2021-30765,0,0,dbea043c2b9960ce9d4d176284418c295d1d5598315341df5fb67c714afaca1e,2021-09-16T13:39:36.783000 @@ -191400,7 +191400,7 @@ CVE-2022-22616,0,0,52c1c954cce76263c8e305f0639bb0be1380dcc3f40bc1e8be8645ada7408 CVE-2022-22617,0,0,13da63862a1b54b6a9abaa860bfb892ed6fa580a6c0fcbf6132240a70f1d00da,2023-08-08T14:21:49.707000 CVE-2022-22618,0,0,65d9bde8794565ffbd1d22a82eef5e5b23fb726a1f26218cb87cf8606c2d2e06,2023-08-08T14:22:24.967000 CVE-2022-2262,0,0,ba1d526772c19e170f1ec434ae572dba94ebd9dbb639bab2f18e588731137ba9,2022-07-19T12:49:09.400000 -CVE-2022-22620,0,0,d8e8c2bfd644e966d0ccc0cf3fa2e4edffbe011c6b40e6cc62f61d9aff98a844,2022-09-09T20:41:25.447000 +CVE-2022-22620,0,1,322c49c3dd47969c25d6a7f0bcf3d95437a5691820f12fc841cc9379c8eb8e70,2024-05-16T01:00:02.197000 CVE-2022-22621,0,0,8bf47d44500d948b0bafacc9346537e8655e8be363255215c97d8714dcd15e40,2023-08-08T14:22:24.967000 CVE-2022-22622,0,0,5b564b910094c45b9fad430373bc3a40599bb4a01383004951f11ae9e83a94e8,2023-08-08T14:22:24.967000 CVE-2022-22623,0,0,dad3c00e07f4763ff3e9fd56be0d83d903337d6c160f53fea522b08823551a66,2023-11-07T03:43:56.890000 @@ -242374,7 +242374,7 @@ CVE-2024-22344,0,0,d45fd6fc8ab9fa39eaa3f858727d1a3351c9b5e65218b1d4466a8f0fb66dd CVE-2024-22345,0,0,d014aa3562325035b774e2fe45385508f179170d4ff82ff6e601139eae8cffc0,2024-05-14T16:13:02.773000 CVE-2024-22346,0,0,638ee4e9687c7c28032b432c317662713c057110b08b4b27024e81eb8453bf9e,2024-03-19T16:50:10.570000 CVE-2024-22352,0,0,8ad74f9c108b142191e10d9f1af5800c7055fc5b8e79f7a9a2cf40171c06b8cd,2024-04-01T15:23:54.530000 -CVE-2024-22353,0,0,dcde4e1942667b685d2979f87ac00f95d42a8fc5d16f7dbd8bc9f66a2b78dfbb,2024-04-02T17:56:57.187000 +CVE-2024-22353,0,1,ad692a077e5b804e1764ffb4f197bc72c54e38388ae47b5f805ac59827db6799,2024-05-16T00:15:08.057000 CVE-2024-22354,0,0,ad4c87b82596e233d2cc875f8c78b0beaca39f3f0e9b6f00e8ce2d52a80db805,2024-04-17T12:48:07.510000 CVE-2024-22355,0,0,d5e1a0b55aa53f554235616979c7aa7e85f01ce7f183bc4e8573dd18cbbe1419,2024-03-04T13:58:23.447000 CVE-2024-22356,0,0,d81d64e63fe9b642cced3e4c94acc5e30f0113b5fdf3bed9ebc6028d04aab3ff,2024-03-26T17:09:53.043000 @@ -242778,7 +242778,7 @@ CVE-2024-23218,0,0,f9c63856068e91ff9b0c8acaa8fa5ee60b89ba853d892da3a1b57a30a48d4 CVE-2024-23219,0,0,6138a00dd33e643c6da7ab985c8bb39139630ef127b2b12e557a72994a3a6de9,2024-01-30T14:36:42.017000 CVE-2024-2322,0,0,60b35ad3bf9bd02d33facbaf1ddda5c64733f8e2d54364bad1f80ec56ba91bbf,2024-04-03T12:38:04.840000 CVE-2024-23220,0,0,8ac5f8ea712aad989eb58875485617fa914d9322cd1efd90091219b5c7412925,2024-03-13T23:15:46.087000 -CVE-2024-23222,0,0,61f0a7f2953909b2da411f5647bebd2574cadd0ed79ad62454a1a9b27d6b5ecc,2024-03-08T02:15:47.547000 +CVE-2024-23222,0,1,dbdfbb94ef7853af981ed6ff730267427ee1f33c1e3020606b19021bcf93c66d,2024-05-16T01:00:02.200000 CVE-2024-23223,0,0,d780b4d6e2ed4fd16bbb8e5d6b950b4f66cdf843fe3ec44eff85a2bd755e98e1,2024-01-27T03:48:24.797000 CVE-2024-23224,0,0,8c8e9af636b106e202b7f940d165666567457368baa4cae37acc93fd6c8a64d2,2024-01-27T03:45:02.100000 CVE-2024-23225,0,0,b045b8ce14b47c6046eb6998b70f65c4f611bc2259e19505fa6d0ddd8c29f039,2024-03-19T01:00:01.577000 @@ -245359,7 +245359,7 @@ CVE-2024-2726,0,0,86fe8b0d397a8074a2c940021570750a55036cbee3d4d8f0a542dcc682e4af CVE-2024-27261,0,0,bbed66d7d6087a4518d3eea41ca0d4f2f5d3d3e2b2ec24c87084c9ef60c5b4e2,2024-04-15T13:15:51.577000 CVE-2024-27265,0,0,caf2cbef481f9d0206d06f75a38ca052c5291ba0582e91875cea8f52e6d86a34,2024-03-19T16:52:02.767000 CVE-2024-27266,0,0,f3ab0f27c5fbbc81843b4329fa53134d5b91174cad9bacbbc5dbf01cfacc3864,2024-03-19T16:52:35.400000 -CVE-2024-27268,0,0,5ee3875e7ce23e0a22f3973d639f8ec37762f6a4d7ebf553d0b8d456239df178,2024-05-04T14:16:02.520000 +CVE-2024-27268,0,1,3c687588a19276e5b44431496d7af7239b9640f9b0218bde7d09fb0845bffcbc,2024-05-16T01:15:07.370000 CVE-2024-27269,0,0,9bbdf45cadb4233d15ddc0419941140b89c76def4ec46746de3b531c556735b5,2024-05-14T16:13:02.773000 CVE-2024-2727,0,0,958214357d5cfc59c51fd0300fa3ab5e09b0479b417a5156cb98159538007f76,2024-03-22T15:34:43.663000 CVE-2024-27270,0,0,90fac36f214c0b31b291ee9cc7c1398845637888710e65e72962c5636284122e,2024-03-27T15:49:51.300000 @@ -249298,8 +249298,8 @@ CVE-2024-35171,0,0,4de8630e1bf094fb4a1152804e48c3dc58f770e96c7438fb408daec36dac0 CVE-2024-35172,0,0,618cb47da87cf9e4af4d56e1768459895814dd5f5800a2fcf0693eda1c64c373,2024-05-14T16:11:39.510000 CVE-2024-35175,0,0,30316f8adabe4b77ff55cf2c3104d884482b10f6e8ef0ea78ba2a92e169ff280,2024-05-15T16:40:19.330000 CVE-2024-35179,0,0,4433fc22ade8274a4e17f50ac56484b62a8701a589dbfa040c3c094fd870b93d,2024-05-15T16:40:19.330000 -CVE-2024-35183,1,1,3bc58caec8e861e4c67d574c2532e9277af9566aecefebff3724908265352406,2024-05-15T22:15:08.580000 -CVE-2024-35184,1,1,bbff83b52521abc9a3a25807a99b5f7723792594d4eda6aba812faba9de6f8db,2024-05-15T22:15:08.867000 +CVE-2024-35183,0,0,3bc58caec8e861e4c67d574c2532e9277af9566aecefebff3724908265352406,2024-05-15T22:15:08.580000 +CVE-2024-35184,0,0,bbff83b52521abc9a3a25807a99b5f7723792594d4eda6aba812faba9de6f8db,2024-05-15T22:15:08.867000 CVE-2024-3520,0,0,f6428e86e9ec472cba9c3c5754043cb34202461d79bcb1fa1b6a365d8347f93e,2024-05-02T18:00:37.360000 CVE-2024-35204,0,0,8d3cad343b73c9eacef2ac3c1c032cedd053b4ea3c17c07fa5f2f20d60725516,2024-05-14T16:11:39.510000 CVE-2024-35205,0,0,6c3c195f1e9ea6788d75f2fe16efcfbee96980b75a7c4536e4d4b7d48d63c4ae,2024-05-14T16:11:39.510000 @@ -250047,11 +250047,15 @@ CVE-2024-4910,0,0,a82052dfa103200f3b9fc39482e4d4d960a5e5de9c8e240b89074cee62e90b CVE-2024-4911,0,0,8d1608f0fa29a13cf0a21881c2ede6ff746ff4b49cb14c00be575f111b962149,2024-05-15T21:15:08.447000 CVE-2024-4912,0,0,959608c998df40105cb04722815b6866fe50f22984a019f9f852ebbd393b327c,2024-05-15T21:15:08.720000 CVE-2024-4913,0,0,ef1882efdbb97e7e5b3a9f1d624c71c7c6ca83c593dde5ac79d713777664dae8,2024-05-15T21:15:09 -CVE-2024-4914,1,1,2c82d1f8833393182c7867bf3bb498ed1d9ac6e0ccf458fc6dc3c29f504ace8f,2024-05-15T22:15:09.153000 -CVE-2024-4915,1,1,0ece382b6ad5961ea1f2edb3cd24a800ebe8e5db24cb03b1f9abd44792ca8d5f,2024-05-15T22:15:09.563000 -CVE-2024-4916,1,1,0808d53e0c2ee3a5d56a480b41f4985f5cdba47f133d6974d9f06deb8a299632,2024-05-15T23:15:07.607000 -CVE-2024-4917,1,1,cab3cd911fdb0d4da4d66130acff84648f1d28dedce375cf5a31196d5a50c5c1,2024-05-15T23:15:07.920000 -CVE-2024-4918,1,1,d6e8570ed4f149bc4f85c05376cdadd0aae166933b8875d11496f633fdca44d0,2024-05-15T23:15:08.210000 +CVE-2024-4914,0,0,2c82d1f8833393182c7867bf3bb498ed1d9ac6e0ccf458fc6dc3c29f504ace8f,2024-05-15T22:15:09.153000 +CVE-2024-4915,0,0,0ece382b6ad5961ea1f2edb3cd24a800ebe8e5db24cb03b1f9abd44792ca8d5f,2024-05-15T22:15:09.563000 +CVE-2024-4916,0,0,0808d53e0c2ee3a5d56a480b41f4985f5cdba47f133d6974d9f06deb8a299632,2024-05-15T23:15:07.607000 +CVE-2024-4917,0,0,cab3cd911fdb0d4da4d66130acff84648f1d28dedce375cf5a31196d5a50c5c1,2024-05-15T23:15:07.920000 +CVE-2024-4918,0,0,d6e8570ed4f149bc4f85c05376cdadd0aae166933b8875d11496f633fdca44d0,2024-05-15T23:15:08.210000 +CVE-2024-4919,1,1,9395e269c4d639503899daba02f8f8ef3e889bf0a909530d3bcbde59080f90c7,2024-05-16T00:15:08.280000 +CVE-2024-4920,1,1,7d4fbcd3c2333b8cd5d13050df57570cc73655912e9f0607ef2981105e7b4eff,2024-05-16T00:15:08.563000 +CVE-2024-4921,1,1,74bf965278d37dd3b4a08b96a0a79c85e131f73322be52ee99eaef8e8fd7e138,2024-05-16T01:15:07.540000 +CVE-2024-4922,1,1,107d8830fcd4c6b9ffa0f0768c22eb2d976c5b1746e34d23ce3bb57a1b3c122b,2024-05-16T01:15:07.813000 CVE-2024-4947,0,0,f706014ab5e494173f189b6b147bc73eaca2bb6d431298f9b49d098b14ff5782,2024-05-15T21:15:09.273000 CVE-2024-4948,0,0,bdd7cd38392862513bf6cf6f69f8c528e08e359340031d01daba548f07be3f14,2024-05-15T21:15:09.347000 CVE-2024-4949,0,0,7a7f679654eca12ebf0c1d1d6ac210b4148b3d26ab259c26b5f77d48b40c4cf5,2024-05-15T21:15:09.430000