diff --git a/CVE-2024/CVE-2024-273xx/CVE-2024-27314.json b/CVE-2024/CVE-2024-273xx/CVE-2024-27314.json index 05941a9c443..c3959bbadfa 100644 --- a/CVE-2024/CVE-2024-273xx/CVE-2024-27314.json +++ b/CVE-2024/CVE-2024-273xx/CVE-2024-27314.json @@ -2,12 +2,12 @@ "id": "CVE-2024-27314", "sourceIdentifier": "0fc0942c-577d-436f-ae8e-945763c79b02", "published": "2024-05-27T07:15:09.297", - "lastModified": "2024-05-28T12:39:28.377", + "lastModified": "2024-05-30T06:15:08.810", "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", - "value": "Zoho ManageEngine\u00a0ServiceDesk Plus versions below\u00a014730,\u00a0ServiceDesk Plus MSP below 14720 and\u00a0SupportCenter Plus below\u00a014730 are vulnerable to\u00a0stored XSS in the Custom Actions menu on the request details. This vulnerability can be exploited only by the SDAdmin role users." + "value": "Zoho ManageEngine\u00a0ServiceDesk Plus versions below\u00a014730,\u00a0ServiceDesk Plus MSP below 14720 and\u00a0SupportCenter Plus below\u00a014720 are vulnerable to\u00a0stored XSS in the Custom Actions menu on the request details. This vulnerability can be exploited only by the SDAdmin role users." }, { "lang": "es", diff --git a/CVE-2024/CVE-2024-362xx/CVE-2024-36267.json b/CVE-2024/CVE-2024-362xx/CVE-2024-36267.json new file mode 100644 index 00000000000..dd66d43fcd5 --- /dev/null +++ b/CVE-2024/CVE-2024-362xx/CVE-2024-36267.json @@ -0,0 +1,24 @@ +{ + "id": "CVE-2024-36267", + "sourceIdentifier": "vultures@jpcert.or.jp", + "published": "2024-05-30T06:15:09.067", + "lastModified": "2024-05-30T06:15:09.067", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Path traversal vulnerability exists in Redmine DMSF Plugin versions prior to 3.1.4. If this vulnerability is exploited, a logged-in user may obtain or delete arbitrary files on the server (within the privilege of the Redmine process)." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/danmunn/redmine_dmsf", + "source": "vultures@jpcert.or.jp" + }, + { + "url": "https://jvn.jp/en/jp/JVN22182715/", + "source": "vultures@jpcert.or.jp" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-50xx/CVE-2024-5073.json b/CVE-2024/CVE-2024-50xx/CVE-2024-5073.json new file mode 100644 index 00000000000..82904b794b0 --- /dev/null +++ b/CVE-2024/CVE-2024-50xx/CVE-2024-5073.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2024-5073", + "sourceIdentifier": "security@wordfence.com", + "published": "2024-05-30T07:15:39.997", + "lastModified": "2024-05-30T07:15:39.997", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "The Essential Addons for Elementor \u2013 Best Elementor Templates, Widgets, Kits & WooCommerce Builders plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the Twitter Feed component in all versions up to, and including, 5.9.21 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security@wordfence.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 6.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 3.1, + "impactScore": 2.7 + } + ] + }, + "references": [ + { + "url": "https://plugins.trac.wordpress.org/browser/essential-addons-for-elementor-lite/trunk/includes/Traits/Twitter_Feed.php#L210", + "source": "security@wordfence.com" + }, + { + "url": "https://plugins.trac.wordpress.org/changeset/3090746/", + "source": "security@wordfence.com" + }, + { + "url": "https://wordpress.org/plugins/essential-addons-for-elementor-lite/#developers", + "source": "security@wordfence.com" + }, + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/c8db80ef-5863-41dd-b33f-850984a72ee6?source=cve", + "source": "security@wordfence.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-52xx/CVE-2024-5207.json b/CVE-2024/CVE-2024-52xx/CVE-2024-5207.json new file mode 100644 index 00000000000..b62e55842d3 --- /dev/null +++ b/CVE-2024/CVE-2024-52xx/CVE-2024-5207.json @@ -0,0 +1,51 @@ +{ + "id": "CVE-2024-5207", + "sourceIdentifier": "security@wordfence.com", + "published": "2024-05-30T06:15:09.197", + "lastModified": "2024-05-30T06:15:09.197", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "The POST SMTP \u2013 The #1 WordPress SMTP Plugin with Advanced Email Logging and Delivery Failure Notifications plugin for WordPress is vulnerable to time-based SQL Injection via the selected parameter in all versions up to, and including, 2.9.3 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for authenticated attackers with administrator access or higher to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security@wordfence.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.2, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.2, + "impactScore": 5.9 + } + ] + }, + "references": [ + { + "url": "https://plugins.trac.wordpress.org/browser/post-smtp/trunk/Postman/Postman-Email-Log/PostmanEmailQueryLog.php?rev=2974258#L262", + "source": "security@wordfence.com" + }, + { + "url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&new=3094453%40post-smtp%2Ftrunk&old=3090744%40post-smtp%2Ftrunk&sfp_email=&sfph_mail=", + "source": "security@wordfence.com" + }, + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/103db583-9399-4a45-a316-808b55fc6a6c?source=cve", + "source": "security@wordfence.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-53xx/CVE-2024-5327.json b/CVE-2024/CVE-2024-53xx/CVE-2024-5327.json new file mode 100644 index 00000000000..6d8f2739a52 --- /dev/null +++ b/CVE-2024/CVE-2024-53xx/CVE-2024-5327.json @@ -0,0 +1,51 @@ +{ + "id": "CVE-2024-5327", + "sourceIdentifier": "security@wordfence.com", + "published": "2024-05-30T07:15:40.407", + "lastModified": "2024-05-30T07:15:40.407", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "The PowerPack Addons for Elementor (Free Widgets, Extensions and Templates) plugin for WordPress is vulnerable to DOM-Based Stored Cross-Site Scripting via the \u2018pp_animated_gradient_bg_color\u2019 parameter in all versions up to, and including, 2.7.19 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security@wordfence.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 6.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 3.1, + "impactScore": 2.7 + } + ] + }, + "references": [ + { + "url": "https://plugins.trac.wordpress.org/browser/powerpack-lite-for-elementor/tags/2.7.19/extensions/animated-gradient-background.php#L322", + "source": "security@wordfence.com" + }, + { + "url": "https://plugins.trac.wordpress.org/changeset/3094253/", + "source": "security@wordfence.com" + }, + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/5618fdfc-636f-452b-80e1-5182b068d1c6?source=cve", + "source": "security@wordfence.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-53xx/CVE-2024-5341.json b/CVE-2024/CVE-2024-53xx/CVE-2024-5341.json new file mode 100644 index 00000000000..3e300c304cd --- /dev/null +++ b/CVE-2024/CVE-2024-53xx/CVE-2024-5341.json @@ -0,0 +1,47 @@ +{ + "id": "CVE-2024-5341", + "sourceIdentifier": "security@wordfence.com", + "published": "2024-05-30T06:15:09.490", + "lastModified": "2024-05-30T06:15:09.490", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "The The Plus Addons for Elementor Page Builder plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'size' attribute of the Heading Title widget in all versions up to, and including, 5.5.4 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security@wordfence.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 6.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 3.1, + "impactScore": 2.7 + } + ] + }, + "references": [ + { + "url": "https://roadmap.theplusaddons.com/updates/", + "source": "security@wordfence.com" + }, + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/39c8e951-8e8c-4a72-9ecf-1dd96392105d?source=cve", + "source": "security@wordfence.com" + } + ] +} \ No newline at end of file diff --git a/README.md b/README.md index 39e616f2a5e..a005ae70c8b 100644 --- a/README.md +++ b/README.md @@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2024-05-30T06:00:38.769395+00:00 +2024-05-30T08:00:38.213624+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2024-05-30T05:15:56.540000+00:00 +2024-05-30T07:15:40.407000+00:00 ``` ### Last Data Feed Release @@ -33,31 +33,25 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### Total Number of included CVEs ```plain -252093 +252098 ``` ### CVEs added in the last Commit -Recently added CVEs: `12` +Recently added CVEs: `5` -- [CVE-2024-2253](CVE-2024/CVE-2024-22xx/CVE-2024-2253.json) (`2024-05-30T04:15:09.793`) -- [CVE-2024-3063](CVE-2024/CVE-2024-30xx/CVE-2024-3063.json) (`2024-05-30T04:15:10.140`) -- [CVE-2024-3190](CVE-2024/CVE-2024-31xx/CVE-2024-3190.json) (`2024-05-30T04:15:10.417`) -- [CVE-2024-3269](CVE-2024/CVE-2024-32xx/CVE-2024-3269.json) (`2024-05-30T04:15:10.697`) -- [CVE-2024-3277](CVE-2024/CVE-2024-32xx/CVE-2024-3277.json) (`2024-05-30T05:15:55.073`) -- [CVE-2024-3943](CVE-2024/CVE-2024-39xx/CVE-2024-3943.json) (`2024-05-30T05:15:55.373`) -- [CVE-2024-3945](CVE-2024/CVE-2024-39xx/CVE-2024-3945.json) (`2024-05-30T05:15:55.590`) -- [CVE-2024-3946](CVE-2024/CVE-2024-39xx/CVE-2024-3946.json) (`2024-05-30T05:15:55.800`) -- [CVE-2024-3947](CVE-2024/CVE-2024-39xx/CVE-2024-3947.json) (`2024-05-30T05:15:55.993`) -- [CVE-2024-4218](CVE-2024/CVE-2024-42xx/CVE-2024-4218.json) (`2024-05-30T05:15:56.183`) -- [CVE-2024-4356](CVE-2024/CVE-2024-43xx/CVE-2024-4356.json) (`2024-05-30T05:15:56.540`) -- [CVE-2024-5223](CVE-2024/CVE-2024-52xx/CVE-2024-5223.json) (`2024-05-30T04:15:10.963`) +- [CVE-2024-36267](CVE-2024/CVE-2024-362xx/CVE-2024-36267.json) (`2024-05-30T06:15:09.067`) +- [CVE-2024-5073](CVE-2024/CVE-2024-50xx/CVE-2024-5073.json) (`2024-05-30T07:15:39.997`) +- [CVE-2024-5207](CVE-2024/CVE-2024-52xx/CVE-2024-5207.json) (`2024-05-30T06:15:09.197`) +- [CVE-2024-5327](CVE-2024/CVE-2024-53xx/CVE-2024-5327.json) (`2024-05-30T07:15:40.407`) +- [CVE-2024-5341](CVE-2024/CVE-2024-53xx/CVE-2024-5341.json) (`2024-05-30T06:15:09.490`) ### CVEs modified in the last Commit -Recently modified CVEs: `0` +Recently modified CVEs: `1` +- [CVE-2024-27314](CVE-2024/CVE-2024-273xx/CVE-2024-27314.json) (`2024-05-30T06:15:08.810`) ## Download and Usage diff --git a/_state.csv b/_state.csv index 28f698929db..f46bfaf0fca 100644 --- a/_state.csv +++ b/_state.csv @@ -243333,7 +243333,7 @@ CVE-2024-22520,0,0,9b6223a53e180c3295f59e3aa1be5500dd113bead8df3efd63052e10ac314 CVE-2024-22523,0,0,c46fa576c9efc04bfa68e9b9b048feb02140ef1745b4ca662893a1dcd1fc7e20,2024-02-05T18:45:22.323000 CVE-2024-22526,0,0,75ace6c927ced5f7ea482234fce681438e4968b2221e8e0044ae8bc44e2d2849,2024-04-12T12:43:46.210000 CVE-2024-22529,0,0,f41d09d708d73657afdb982e616544d0858f64a9413ba7f1cfbd6a4f36b177fc,2024-01-31T18:42:44.573000 -CVE-2024-2253,1,1,df4c554be86698eb39eee9cf06e3eda86d2d89b582ab8c1a1f8cd2700a16feeb,2024-05-30T04:15:09.793000 +CVE-2024-2253,0,0,df4c554be86698eb39eee9cf06e3eda86d2d89b582ab8c1a1f8cd2700a16feeb,2024-05-30T04:15:09.793000 CVE-2024-22532,0,0,6fad183b739b464d3003075e09f3da32b728992a253a18db27cbf8640f312c28,2024-02-29T13:49:47.277000 CVE-2024-22533,0,0,84ada03ee37935d281b6ef02f8758f6d805bf66c7cac8fad1d52934fdf1b61ec,2024-02-10T04:09:13.303000 CVE-2024-22543,0,0,4bbc43f5b3e2685d1c9696fcc6499264d266d040456549b4c4eb8710fde430af,2024-02-27T14:20:06.637000 @@ -246319,7 +246319,7 @@ CVE-2024-2731,0,0,7242593ba3e5c5b48a25383d38b7647a4613c0186c7dc999e27ef7b770a540 CVE-2024-27310,0,0,79d1d0c49ef808c7c2c7acd66e6a81dc21e768a3629985168cfa9b8adc74b0f6,2024-05-28T12:39:28.377000 CVE-2024-27312,0,0,03b9c1d615c7eea419258607ab4327a45a73e24a5e571b82ecc5b8d0b7dc264a,2024-05-20T15:17:54.513000 CVE-2024-27313,0,0,391cd46d2547aef22abbed3e45cc67372aaf2ab0a46a6c1181ebce516dafbc3a,2024-05-29T13:02:09.280000 -CVE-2024-27314,0,0,3232e01935b0c20d15f6c848e09b9a2eb6945c0f8c0429e6c4a1887e0664e3db,2024-05-28T12:39:28.377000 +CVE-2024-27314,0,1,e88b753374442c2b25bec662f0d40ad30ed27564c3e1746c58d963972ca9fa21,2024-05-30T06:15:08.810000 CVE-2024-27315,0,0,1b06bd54abb4ee7969c3aca53e6bed402762ed42c4492d0ee8674e3fa0b42312,2024-02-28T15:15:09.670000 CVE-2024-27316,0,0,42d27b12e519cd2645cf692e286d8fde89efcbae83d79644c67975e4ec7fea81,2024-05-01T18:15:16.023000 CVE-2024-27317,0,0,c3dded617afb79b595cc5394bc34fa2395e63ed9fe33b66ba0cb8f90b0b09bad,2024-05-01T18:15:16.097000 @@ -248273,7 +248273,7 @@ CVE-2024-30626,0,0,dd61e51a8ba5f6151ec2012c267de9a8f4363b4511aa2015e23176fa696a1 CVE-2024-30627,0,0,24e44b422d8dfb4f461acd1e40ed917b1185c728791e5ef89a24408fed2d5d20,2024-03-29T13:28:22.880000 CVE-2024-30628,0,0,c1cfcec997f2b440177dbb4bb1c457eafabcb3c3a8d68d5d2db04b4e94344284,2024-03-29T13:28:22.880000 CVE-2024-30629,0,0,7117658aa143fa0c45ef2d66dbdbe5496577b3ed8e4e0a0ce7de2a66765ffd4a,2024-03-29T13:28:22.880000 -CVE-2024-3063,1,1,d23297bd0d8ddb2e558677f2ee2e38122d2f7e72c29e7063ab1ce233afc0b67c,2024-05-30T04:15:10.140000 +CVE-2024-3063,0,0,d23297bd0d8ddb2e558677f2ee2e38122d2f7e72c29e7063ab1ce233afc0b67c,2024-05-30T04:15:10.140000 CVE-2024-30630,0,0,a78dc6e5837056dc63e94f8b90ccdcfb900ec6350574c1ab0600191f9de26eb6,2024-03-29T13:28:22.880000 CVE-2024-30631,0,0,428fc47458d23d355f563629d61eef5861a5f604ce69860222a6765139b17b6a,2024-03-29T13:28:22.880000 CVE-2024-30632,0,0,a817d09d9ada60d9737215466a32bcc347282a2f0fd24eb4b23a6745cca6615e,2024-03-29T13:28:22.880000 @@ -248896,7 +248896,7 @@ CVE-2024-3189,0,0,1214acc8d4ffdbc5da1a7913ab352a27b53d04d94b5a178d0c09d285be9bf4 CVE-2024-31893,0,0,12d01c628fd750c0cbf441575efefbf394d1654280d687a3cb134821594970b6,2024-05-24T01:15:30.977000 CVE-2024-31894,0,0,5d58af989adc88e1f21decb4e4b73370061e14ed54479d7579f2f2b5b7332e1e,2024-05-24T01:15:30.977000 CVE-2024-31895,0,0,38db7df97417d61bcac3e1b48b52fd0d409c4088497b5231955dcf460bac575b,2024-05-24T01:15:30.977000 -CVE-2024-3190,1,1,09d4d21d853bdb5ff73ac7c6548b793584785b7dca93ba5fbe15daa6506cb897,2024-05-30T04:15:10.417000 +CVE-2024-3190,0,0,09d4d21d853bdb5ff73ac7c6548b793584785b7dca93ba5fbe15daa6506cb897,2024-05-30T04:15:10.417000 CVE-2024-31904,0,0,f581f8d898f5db4b0367557c06fa4b666380cc23610e816c03e35138e889ca3c,2024-05-24T01:15:30.977000 CVE-2024-3191,0,0,8cf962bd9b56831bd79ade84a34de9b023bb925809cd58e4b9fc80c44fe6835a,2024-05-17T02:39:45.973000 CVE-2024-3192,0,0,e3aebeb6cd86739531dd732871b7a29e3a45f5c2393a43be256648b47f7f7a36,2024-05-17T02:39:46.077000 @@ -249422,7 +249422,7 @@ CVE-2024-32686,0,0,852c454a1d3bbf27e69c45ac3a82e5061f231ff76a794447de0366c288490 CVE-2024-32687,0,0,a086d5b324c1fb3e15319d9ade5180576e51b429460cf8b16542df9ee987dffc,2024-04-22T13:28:34.007000 CVE-2024-32688,0,0,7f41951b1eb13319bfb8b893fa89901a983c98497ebd74b7a49d01c4670e5fb3,2024-04-22T13:28:34.007000 CVE-2024-32689,0,0,16874a71c9e632f769995766bf2f4ed6e183b5fc555d1d7f129ab5a8c673df33,2024-04-18T13:04:28.900000 -CVE-2024-3269,1,1,08f07170e761faa11ef1843c2c2f7880f1510deeacbc594f95cdb5748f9f5911,2024-05-30T04:15:10.697000 +CVE-2024-3269,0,0,08f07170e761faa11ef1843c2c2f7880f1510deeacbc594f95cdb5748f9f5911,2024-05-30T04:15:10.697000 CVE-2024-32690,0,0,a5c3efbe443cf42b8bcd8044eca65a720a8f83179f73ad11a935d5b1da69e0fc,2024-04-22T13:28:43.747000 CVE-2024-32691,0,0,6bf77f40ecd5cf4c30ab2ae6de9b94e9df1ad90bb17dd1fa390b1b8ff8545003,2024-04-22T13:28:34.007000 CVE-2024-32692,0,0,21de28715efe09392228fa104a5dd680f47fa0b3c5f64f2e6c643d84e747cf6b,2024-05-17T18:35:35.070000 @@ -249478,7 +249478,7 @@ CVE-2024-32760,0,0,79cdaca9f99e33e6636cdff5c81a457807cc422bf4e494e3ee57e4eb5dee5 CVE-2024-32761,0,0,ce6e18957362490cfabf91767930741349195476d374863f1eaf0c6108afcfd0,2024-05-08T17:05:24.083000 CVE-2024-32764,0,0,bc3d072b957e003e653de0b420ab306da82665736b4d7b512b364e6134049d7c,2024-04-26T15:32:22.523000 CVE-2024-32766,0,0,7119553a94fda386a48677f0171c3a85e12acf48042d943380d9db048f166a25,2024-04-26T15:32:22.523000 -CVE-2024-3277,1,1,37c84dfbe734af63638a00f5cd275238f8b1b8fc6bb014855278df04b310999c,2024-05-30T05:15:55.073000 +CVE-2024-3277,0,0,37c84dfbe734af63638a00f5cd275238f8b1b8fc6bb014855278df04b310999c,2024-05-30T05:15:55.073000 CVE-2024-32772,0,0,2d4fb680b13b3176b160b34c5ead370c8635624f7414f557ffce882457014cd9,2024-04-24T13:39:42.883000 CVE-2024-32773,0,0,cdf6d9113130bad9f64f16e6cbf7c73f3f39d2ec19b8de9aad6ed1b2402687f3,2024-04-24T17:16:50.397000 CVE-2024-32774,0,0,8dbbf5bd24cbc04a82b5688823250c2b5b1e045ea3a252123fcfbb63193a0806,2024-05-17T18:35:35.070000 @@ -250988,6 +250988,7 @@ CVE-2024-36241,0,0,ec13df73bdae0daae51b14875ab9159491333aae8ecd7b32e3b3849163ae2 CVE-2024-3625,0,0,bb7fa72c43d725aef9f66641f31c3359a614ed8ba414acf9f05b8e44148cef81,2024-04-26T12:58:17.720000 CVE-2024-36255,0,0,22b21684452ad4563618ad5cee66dc719af723b04c8a1647fe9cf6d970347f9a,2024-05-28T12:39:28.377000 CVE-2024-3626,0,0,668faec6d18ac8a7c33197af94901aaf7ddac1dec4c77c1d646fba224d5f8541,2024-05-24T01:15:30.977000 +CVE-2024-36267,1,1,4d28b3747e38a29779ec2f14dc79d5929bb89b5159bfc206167769208dd47b7b,2024-05-30T06:15:09.067000 CVE-2024-3628,0,0,ad2a38a3d431944b5239dd67ace3bcd2603e3057c8d0a04d847db45516b0c9ea,2024-05-07T13:39:32.710000 CVE-2024-3629,0,0,ed67d1a2dc82a6f7d8e47e5534a14b4493dd33c5e11e4c564b2ef763c111a4ba,2024-05-15T16:40:19.330000 CVE-2024-3630,0,0,1b4d82e848787accdc20ad3d430430e1a1fa399ad678a3e5fbc87f1ba9867411,2024-05-15T16:40:19.330000 @@ -251254,10 +251255,10 @@ CVE-2024-3939,0,0,8db4cbfcc78e197894431199cdad6af4ac1ac13ee2f1028e231ba1f9079317 CVE-2024-3940,0,0,52f7bf6d70193ddf6b45db8d32585f84af1f44b7487d20897766e34b437b8581,2024-05-14T16:11:39.510000 CVE-2024-3941,0,0,3315566f834adaa65bc779c72609390662785ebcc4aac50a6cb30731cb96d90c,2024-05-14T16:11:39.510000 CVE-2024-3942,0,0,e822d69f7c80cdc7914f6c6d228f749a2878411b19bb34f624a4ef0b72687edf,2024-05-02T18:00:37.360000 -CVE-2024-3943,1,1,5376aed73b535466effd58d9ba9a171e2bfa8b84e688c4f6429b0da950ea585b,2024-05-30T05:15:55.373000 -CVE-2024-3945,1,1,e228b0d7ca5bac4bb5fb249f739fdecdf15d09e710cf5233a43711b697e010d9,2024-05-30T05:15:55.590000 -CVE-2024-3946,1,1,743497247ee1d58560c3514e0a4bb75f36e68e51865022cb8ac1a80c8f1f9303,2024-05-30T05:15:55.800000 -CVE-2024-3947,1,1,265159863051d3de6dbcb092f0fc64fb0c3f5f11f56a705efdd63f83c154c9d7,2024-05-30T05:15:55.993000 +CVE-2024-3943,0,0,5376aed73b535466effd58d9ba9a171e2bfa8b84e688c4f6429b0da950ea585b,2024-05-30T05:15:55.373000 +CVE-2024-3945,0,0,e228b0d7ca5bac4bb5fb249f739fdecdf15d09e710cf5233a43711b697e010d9,2024-05-30T05:15:55.590000 +CVE-2024-3946,0,0,743497247ee1d58560c3514e0a4bb75f36e68e51865022cb8ac1a80c8f1f9303,2024-05-30T05:15:55.800000 +CVE-2024-3947,0,0,265159863051d3de6dbcb092f0fc64fb0c3f5f11f56a705efdd63f83c154c9d7,2024-05-30T05:15:55.993000 CVE-2024-3948,0,0,376ea8906f03fda3c144927b149cbacf34b84dec1b654121329bc158cfe1d518,2024-05-17T02:40:12.107000 CVE-2024-3951,0,0,d1eb572088193a792816003caae4c8900ea1808fb70b3f34eb162771a0d73b1e,2024-05-08T17:05:24.083000 CVE-2024-3952,0,0,92f1da274771947c3cb4a43546670c1af8a997980dc361a71cd2fb07f162ad15,2024-05-14T16:11:39.510000 @@ -251409,7 +251410,7 @@ CVE-2024-4213,0,0,42ea90224045d73e2b0e3583ac57d426d05abb547b5044b93cb751055084fa CVE-2024-4214,0,0,20486a6e70da9590b0bf48d308272f5e2303dba1772619a1d43b68b5a571b06a,2024-05-17T18:35:35.070000 CVE-2024-4215,0,0,0d7dbfaf8275e9ff6c32259712a00cedd32b92104e92991d7893f67c59faf7d0,2024-05-03T12:50:34.250000 CVE-2024-4216,0,0,80b76898bbc4459141293c47297450a985b668060a3a6e72db0d9ef898a4d417,2024-05-03T12:50:34.250000 -CVE-2024-4218,1,1,2a0ba4a491eb1981ee1f36d2adb27b7e6b3925de58a975c4d7a3e3e2331a44c9,2024-05-30T05:15:56.183000 +CVE-2024-4218,0,0,2a0ba4a491eb1981ee1f36d2adb27b7e6b3925de58a975c4d7a3e3e2331a44c9,2024-05-30T05:15:56.183000 CVE-2024-4222,0,0,baaf2be5207361c5cdba494834d7fd0e14922c0bb0c21401ff4dac917c12e3a7,2024-05-16T13:03:05.353000 CVE-2024-4223,0,0,7874da25b7633a9d0c04e6bbae5b506aa967cf75a9b041fe171571206fd80286,2024-05-16T13:03:05.353000 CVE-2024-4225,0,0,ac71ef092dab43c080586d967efe31f36fc3673c6a3103eaf0a29ff9fdbbfa8b,2024-04-30T13:11:16.690000 @@ -251501,7 +251502,7 @@ CVE-2024-4348,0,0,22aaa400d6ceaa55fdbf2a61503102f340b638c070cbc3ffa22198dc497008 CVE-2024-4349,0,0,d7cb391ad6a3595c020e400bfefef3bf14b6d8b75d9701c79688eb2693bdea7a,2024-05-17T02:40:23.273000 CVE-2024-4351,0,0,84a993fcb461a8c61255d21736701361dc3f453bf42043de26320f65ada00121,2024-05-16T13:03:05.353000 CVE-2024-4352,0,0,ec2049b13794d7b7eea90d377463d8f5c3179de2c6e69d57554c5eced6269751,2024-05-16T13:03:05.353000 -CVE-2024-4356,1,1,665552b3e35c87b19e637f12854b443eebf7cafcbb889598a1c642b7847de2a5,2024-05-30T05:15:56.540000 +CVE-2024-4356,0,0,665552b3e35c87b19e637f12854b443eebf7cafcbb889598a1c642b7847de2a5,2024-05-30T05:15:56.540000 CVE-2024-4357,0,0,15f39a23a70c5acc3d08c2f81b16ef69b06f28ee37422807405e1ad546411072,2024-05-15T18:35:11.453000 CVE-2024-4358,0,0,c8f40930fe3c6733bdba3289823c127651958d0def91c99c5ae0c8d826a9824a,2024-05-29T15:18:26.427000 CVE-2024-4361,0,0,133909e17de135792173cf72624f64f1510a4ce9cc19a57a2e3a0686665955c8,2024-05-21T12:37:59.687000 @@ -251919,6 +251920,7 @@ CVE-2024-5065,0,0,c0a1875541e704032996f7cf2d66c73856c93755d38f44f8107ff5575a8e20 CVE-2024-5066,0,0,139b124858e7e99a1754c24fd2616eb6658e77af4be83fdcc1d993d51068360c,2024-05-20T13:00:34.807000 CVE-2024-5069,0,0,ba08e8e8bcbfda52deadb370fc7ea1815ec75d330a1a6cac8b3535eedbca52f7,2024-05-20T13:00:34.807000 CVE-2024-5072,0,0,eed82a97a0ee00f59db20864a50c358c267684d10361dc2c7c81171fccc96a9c,2024-05-17T18:35:35.070000 +CVE-2024-5073,1,1,145ed566499016a8eaeb75605aa9f98237a64192497df89771964266aae6cdd6,2024-05-30T07:15:39.997000 CVE-2024-5084,0,0,92d8976ac3f9e8cdb8733c073caf2586c8f5a42e4f2b053a805034733b1a3630,2024-05-24T01:15:30.977000 CVE-2024-5085,0,0,e4f2e80bdbf4fc55d46c60837ef7c898ce9ad88d4ef317ea9d17542cafaf4d9d,2024-05-24T01:15:30.977000 CVE-2024-5086,0,0,931e0bac2fddd1d3017185ad2896bc6a71c950877469373fd8fb74c0da6b675a,2024-05-29T13:02:09.280000 @@ -251981,9 +251983,10 @@ CVE-2024-5201,0,0,bf1f4d37f88403bb38854e126758e4f0ff9b7f5c32e7a6f763dbd9ae66e356 CVE-2024-5202,0,0,b978a5507939d8449bc120b0c8b4b839304f46efdad98898b1b0c13e65a259b1,2024-05-24T01:15:30.977000 CVE-2024-5204,0,0,f5f46d30f5f5fcefc4a351787eb0bfde8706d10be20e1d771d5abcd1008399a0,2024-05-29T13:02:09.280000 CVE-2024-5205,0,0,cb36ec671fed104039900e6835467ad487e54c052bb39844cd3bc6979a6fc551,2024-05-24T13:03:11.993000 +CVE-2024-5207,1,1,709fa9d673c5553b0028647a59bce61704d2b713129354eb177efabb155df597,2024-05-30T06:15:09.197000 CVE-2024-5218,0,0,928b5f8d4e08afc285c0cf6e370373ec87899b716b1cb4db68027907b01d2a82,2024-05-28T12:39:42.673000 CVE-2024-5220,0,0,f61a4e43424028e9a9336f6f6ed766295c86a8a5421f6ff87daa2be13ac80d02,2024-05-28T12:39:42.673000 -CVE-2024-5223,1,1,0164c70f6539c9e33a94fcc48bc789cc2a7c554ed40320875d77a0c8873b0ae3,2024-05-30T04:15:10.963000 +CVE-2024-5223,0,0,0164c70f6539c9e33a94fcc48bc789cc2a7c554ed40320875d77a0c8873b0ae3,2024-05-30T04:15:10.963000 CVE-2024-5227,0,0,9d34b575e4c4193bf3b7e2c70f772c52e473e90eee580d6cd20ca38df9886e09,2024-05-24T01:15:30.977000 CVE-2024-5228,0,0,0a0ae3d586a473bc70cb0721078887f2918e42e82919d39880ecf7432c31100c,2024-05-24T01:15:30.977000 CVE-2024-5229,0,0,5591fcb6917655cbf3944dcd6615ff3ff9ee2f54b68a25aab97dceee478c25ea,2024-05-28T12:39:42.673000 @@ -252026,11 +252029,13 @@ CVE-2024-5312,0,0,082c9ac2393cf8e57fdd7df5653c9ea7402a5c66b3a64380a6e8455af1865a CVE-2024-5314,0,0,a78e716fa392b8cb9869f7797ea197c1011e46ba4bc9c8c5da0073e7e12b93dd,2024-05-24T13:03:05.093000 CVE-2024-5315,0,0,17a737dcad42e55d9b51354513bcf6a79d52e58b0565b3a7bb2bcb2078a35d4b,2024-05-24T13:03:05.093000 CVE-2024-5318,0,0,23557c413419809da6545b8c1445586f3837718f3430ace9eed52e7e734c5a9b,2024-05-24T18:09:20.027000 +CVE-2024-5327,1,1,00d56bc9d4ad85aecc0ab640e3a0c1afad43fc63f05e8690a0f43c9e0f453796,2024-05-30T07:15:40.407000 CVE-2024-5336,0,0,c2865217e75958fb009c852cd174a4631a299d08f765ad6d61b3f77297c545fa,2024-05-28T12:39:42.673000 CVE-2024-5337,0,0,f2b800f7e84a00dbe58660ee27a5a6405784fadf3fae9f57a88589dda95cf166,2024-05-28T12:39:42.673000 CVE-2024-5338,0,0,f1fc65a7b53696dcb1b22f7cb4a402d175011424b23786711e5e263fd7ec2e8f,2024-05-28T12:39:42.673000 CVE-2024-5339,0,0,06454cd858966bd04fe11523962adaa26a10dc55f1781c23c279a6bf8e0f1118,2024-05-28T12:39:42.673000 CVE-2024-5340,0,0,c66c0c9e55de3c725084d3080da1dc604d47daf703d95b2c548541ec6a382225,2024-05-28T12:39:42.673000 +CVE-2024-5341,1,1,1239e438affc09644741f81178a5b08fdd792d2a0cae0a8fd5a566a5d9d94075,2024-05-30T06:15:09.490000 CVE-2024-5350,0,0,60bbd22831ddecb115d40713a9dc768f9983e70563a63aa9f7486c68fbd4f9e1,2024-05-28T12:39:42.673000 CVE-2024-5351,0,0,75936f9a30b9b2678d667660507da4226e150a018add31c316ae6f6c8d9a34b8,2024-05-28T12:39:42.673000 CVE-2024-5352,0,0,436cc86ab2a56db91a02662bc69df77d88892fce705caf803e28ba33694f3f1c,2024-05-28T12:39:42.673000