Auto-Update: 2024-05-24T08:00:38.339540+00:00

This commit is contained in:
cad-safe-bot 2024-05-24 08:03:29 +00:00
parent 834c89d796
commit 533a259f8f
16 changed files with 833 additions and 15 deletions

View File

@ -0,0 +1,96 @@
{
"id": "CVE-2023-1001",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-05-24T06:15:07.797",
"lastModified": "2024-05-24T06:15:07.797",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability, which was classified as problematic, has been found in xuliangzhan vxe-table up to 3.7.9. This issue affects the function export of the file packages/textarea/src/textarea.js of the component vxe-textarea. The manipulation of the argument inputValue leads to cross site scripting. The attack may be initiated remotely. Upgrading to version 3.7.10 is able to address this issue. The patch is named d70b0e089740b65a22c89c106ebc4627ac48a22d. It is recommended to upgrade the affected component. The associated identifier of this vulnerability is VDB-266123."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 3.5,
"baseSeverity": "LOW"
},
"exploitabilityScore": 2.1,
"impactScore": 1.4
}
],
"cvssMetricV2": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:S/C:N/I:P/A:N",
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "SINGLE",
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"availabilityImpact": "NONE",
"baseScore": 4.0
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 8.0,
"impactScore": 2.9,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://gitee.com/xuliangzhan_admin/vxe-table/commit/d70b0e089740b65a22c89c106ebc4627ac48a22d",
"source": "cna@vuldb.com"
},
{
"url": "https://gitee.com/xuliangzhan_admin/vxe-table/issues/I8O21R",
"source": "cna@vuldb.com"
},
{
"url": "https://gitee.com/xuliangzhan_admin/vxe-table/tree/3.7.10",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?ctiid.266123",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?id.266123",
"source": "cna@vuldb.com"
}
]
}

View File

@ -0,0 +1,88 @@
{
"id": "CVE-2023-1111",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-05-24T07:15:08.213",
"lastModified": "2024-05-24T07:15:08.213",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was found in FastCMS up to 0.1.5 and classified as problematic. Affected by this issue is some unknown functionality of the component New Article Tab. The manipulation of the argument Title leads to cross site scripting. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB-266126 is the identifier assigned to this vulnerability."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:N/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 2.4,
"baseSeverity": "LOW"
},
"exploitabilityScore": 0.9,
"impactScore": 1.4
}
],
"cvssMetricV2": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:M/C:N/I:P/A:N",
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "MULTIPLE",
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"availabilityImpact": "NONE",
"baseScore": 3.3
},
"baseSeverity": "LOW",
"exploitabilityScore": 6.4,
"impactScore": 2.9,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://gitee.com/dianbuapp_admin/fastcms/issues/I8ERNV",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?ctiid.266126",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?id.266126",
"source": "cna@vuldb.com"
}
]
}

View File

@ -0,0 +1,88 @@
{
"id": "CVE-2023-7259",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-05-24T07:15:08.930",
"lastModified": "2024-05-24T07:15:08.930",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "** DISPUTED ** A vulnerability was found in zzdevelop lenosp up to 20230831. It has been classified as problematic. This affects an unknown part of the component Adduser Page. The manipulation of the argument username with the input <script>alert(1)</script> leads to cross site scripting. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The real existence of this vulnerability is still doubted at the moment. The associated identifier of this vulnerability is VDB-266127. NOTE: The vendor rejected the issue because he claims that XSS which require administrative privileges are not of any use for attackers."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:N/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 2.4,
"baseSeverity": "LOW"
},
"exploitabilityScore": 0.9,
"impactScore": 1.4
}
],
"cvssMetricV2": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:M/C:N/I:P/A:N",
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "MULTIPLE",
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"availabilityImpact": "NONE",
"baseScore": 3.3
},
"baseSeverity": "LOW",
"exploitabilityScore": 6.4,
"impactScore": 2.9,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://gitee.com/zzdevelop/lenosp/issues/I7XC2Y",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?ctiid.266127",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?id.266127",
"source": "cna@vuldb.com"
}
]
}

View File

@ -0,0 +1,51 @@
{
"id": "CVE-2024-0867",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-05-24T06:15:08.380",
"lastModified": "2024-05-24T06:15:08.380",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "The Email Log plugin for WordPress is vulnerable to Unauthenticated Hook Injection in all versions up to, and including, 2.4.8 via the check_nonce function. This makes it possible for unauthenticated attackers to execute actions with hooks in WordPress under certain circumstances. The action the attacker wishes to execute needs to have a nonce check, and the nonce needs to be known to the attacker. Furthermore, the absence of a capability check is a requirement."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security@wordfence.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.1,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.2,
"impactScore": 5.9
}
]
},
"references": [
{
"url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3027872%40email-log&new=3027872%40email-log&sfp_email=&sfph_mail=",
"source": "security@wordfence.com"
},
{
"url": "https://wordpress.org/plugins/email-log/",
"source": "security@wordfence.com"
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/fd15268f-7e06-4e0d-baaf-f27348af61ce?source=cve",
"source": "security@wordfence.com"
}
]
}

View File

@ -0,0 +1,47 @@
{
"id": "CVE-2024-0893",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-05-24T07:15:09.387",
"lastModified": "2024-05-24T07:15:09.387",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "The Schema App Structured Data plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the MarkupUpdate function in all versions up to, and including, 2.1.0. This makes it possible for authenticated attackers, with subscriber access or higher, to update or delete post metadata."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security@wordfence.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 1.4
}
]
},
"references": [
{
"url": "https://plugins.trac.wordpress.org/browser/schema-app-structured-data-for-schemaorg/trunk/lib/SchemaEditor.php#L327",
"source": "security@wordfence.com"
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/1089ab17-b780-4840-8dcd-c50258513634?source=cve",
"source": "security@wordfence.com"
}
]
}

View File

@ -0,0 +1,47 @@
{
"id": "CVE-2024-1134",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-05-24T06:15:08.667",
"lastModified": "2024-05-24T06:15:08.667",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "The SEOPress \u2013 On-site SEO plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the SEO title and description parameters as well as others in all versions up to, and including, 7.5.2.1 due to insufficient input sanitization and output escaping. This makes it possible for attackers, with contributor access or higher, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security@wordfence.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 6.4,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 3.1,
"impactScore": 2.7
}
]
},
"references": [
{
"url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&new=3056025%40wp-seopress%2Ftrunk&old=3047913%40wp-seopress%2Ftrunk&sfp_email=&sfph_mail=",
"source": "security@wordfence.com"
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/bc3910e4-649f-45ab-876a-a4b04afac8d2?source=cve",
"source": "security@wordfence.com"
}
]
}

View File

@ -0,0 +1,47 @@
{
"id": "CVE-2024-1332",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-05-24T07:15:09.733",
"lastModified": "2024-05-24T07:15:09.733",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "The Custom Fonts \u2013 Host Your Fonts Locally plugin for WordPress is vulnerable to Stored Cross-Site Scripting via svg file upload in all versions up to, and including, 2.1.4 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with author level or higher, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security@wordfence.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 6.4,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 3.1,
"impactScore": 2.7
}
]
},
"references": [
{
"url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&new=3074871%40custom-fonts%2Ftrunk&old=3062686%40custom-fonts%2Ftrunk&sfp_email=&sfph_mail=#file4",
"source": "security@wordfence.com"
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/98536242-64c7-4e02-aa00-a3efbf5c90d8?source=cve",
"source": "security@wordfence.com"
}
]
}

View File

@ -0,0 +1,47 @@
{
"id": "CVE-2024-1376",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-05-24T07:15:10.057",
"lastModified": "2024-05-24T07:15:10.057",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "The Event post plugin for WordPress is vulnerable to unauthorized bulk metadata update due to a missing capability check on the save_bulkdatas function in all versions up to, and including, 5.9.4. This makes it possible for authenticated attackers, with subscriber access or higher, to update post_meta_data."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security@wordfence.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 1.4
}
]
},
"references": [
{
"url": "https://plugins.trac.wordpress.org/changeset/3086840/event-post/trunk/eventpost.php?old=3060317&old_path=event-post%2Ftrunk%2Feventpost.php",
"source": "security@wordfence.com"
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/926c09d5-3824-4745-99f6-50d9c945d252?source=cve",
"source": "security@wordfence.com"
}
]
}

View File

@ -0,0 +1,24 @@
{
"id": "CVE-2024-36361",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-05-24T06:15:08.947",
"lastModified": "2024-05-24T06:15:08.947",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Pug through 3.0.2 allows JavaScript code execution if an application accepts untrusted input for the name option of the compileClient, compileFileClient, or compileClientWithDependenciesTracked function. NOTE: these functions are for compiling Pug templates into JavaScript, and there would typically be no reason to allow untrusted callers."
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/pugjs/pug/pull/3428",
"source": "cve@mitre.org"
},
{
"url": "https://pugjs.org/api/reference.html",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,75 @@
{
"id": "CVE-2024-3718",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-05-24T06:15:09.100",
"lastModified": "2024-05-24T06:15:09.100",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "The The Plus Addons for Elementor plugin for WordPress is vulnerable to Stored Cross-Site Scripting via several of the plugin's widgets all versions up to, and including, 5.5.4 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security@wordfence.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 6.4,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 3.1,
"impactScore": 2.7
}
]
},
"references": [
{
"url": "https://plugins.trac.wordpress.org/browser/the-plus-addons-for-elementor-page-builder/tags/5.4.2/modules/widgets/tp_age_gate.php#L2304",
"source": "security@wordfence.com"
},
{
"url": "https://plugins.trac.wordpress.org/browser/the-plus-addons-for-elementor-page-builder/tags/5.4.2/modules/widgets/tp_flip_box.php#L2349",
"source": "security@wordfence.com"
},
{
"url": "https://plugins.trac.wordpress.org/browser/the-plus-addons-for-elementor-page-builder/tags/5.4.2/modules/widgets/tp_header_extras.php#L2757",
"source": "security@wordfence.com"
},
{
"url": "https://plugins.trac.wordpress.org/browser/the-plus-addons-for-elementor-page-builder/tags/5.4.2/modules/widgets/tp_hovercard.php#L2648",
"source": "security@wordfence.com"
},
{
"url": "https://plugins.trac.wordpress.org/browser/the-plus-addons-for-elementor-page-builder/tags/5.4.2/modules/widgets/tp_pricing_table.php#L2869",
"source": "security@wordfence.com"
},
{
"url": "https://plugins.trac.wordpress.org/browser/the-plus-addons-for-elementor-page-builder/tags/5.4.2/modules/widgets/tp_progress_bar.php#L1161",
"source": "security@wordfence.com"
},
{
"url": "https://plugins.trac.wordpress.org/browser/the-plus-addons-for-elementor-page-builder/tags/5.4.2/modules/widgets/tp_scroll_navigation.php#L1143",
"source": "security@wordfence.com"
},
{
"url": "https://plugins.trac.wordpress.org/changeset/3090866/",
"source": "security@wordfence.com"
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/1b73402b-444c-47ad-9c05-7be6e6440123?source=cve",
"source": "security@wordfence.com"
}
]
}

View File

@ -0,0 +1,51 @@
{
"id": "CVE-2024-4484",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-05-24T07:15:10.397",
"lastModified": "2024-05-24T07:15:10.397",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "The The Plus Addons for Elementor \u2013 Elementor Addons, Page Templates, Widgets, Mega Menu, WooCommerce plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the \u2018xai_username\u2019 parameter in versions up to, and including, 5.5.2 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with contributor-level permissions and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security@wordfence.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 6.4,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 3.1,
"impactScore": 2.7
}
]
},
"references": [
{
"url": "https://plugins.trac.wordpress.org/browser/the-plus-addons-for-elementor-page-builder/tags/5.5.2/modules/widgets/tp_meeting_scheduler.php#L549",
"source": "security@wordfence.com"
},
{
"url": "https://plugins.trac.wordpress.org/changeset/3083932",
"source": "security@wordfence.com"
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/f36c785f-9b8c-43c4-b12f-6fb4c0c67eff?source=cve",
"source": "security@wordfence.com"
}
]
}

View File

@ -0,0 +1,51 @@
{
"id": "CVE-2024-4485",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-05-24T07:15:10.700",
"lastModified": "2024-05-24T07:15:10.700",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "The The Plus Addons for Elementor \u2013 Elementor Addons, Page Templates, Widgets, Mega Menu, WooCommerce plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the \u2018button_custom_attributes\u2019 parameter in versions up to, and including, 5.5.2 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with contributor-level permissions and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security@wordfence.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 6.4,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 3.1,
"impactScore": 2.7
}
]
},
"references": [
{
"url": "https://plugins.trac.wordpress.org/browser/the-plus-addons-for-elementor-page-builder/tags/5.5.2/modules/widgets/tp_button.php#L1538",
"source": "security@wordfence.com"
},
{
"url": "https://plugins.trac.wordpress.org/changeset/3083932",
"source": "security@wordfence.com"
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/4890cd48-a448-4af1-ae1e-6456300434e5?source=cve",
"source": "security@wordfence.com"
}
]
}

View File

@ -0,0 +1,51 @@
{
"id": "CVE-2024-5060",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-05-24T07:15:10.967",
"lastModified": "2024-05-24T07:15:10.967",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "The LottieFiles \u2013 JSON Based Animation Lottie & Bodymovin for Elementor plugin for WordPress is vulnerable to Stored Cross-Site Scripting in all versions up to, and including, 1.10.9 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security@wordfence.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 6.4,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 3.1,
"impactScore": 2.7
}
]
},
"references": [
{
"url": "https://plugins.trac.wordpress.org/browser/include-lottie-animation-for-elementor/tags/1.10.9/include/jbafe-json-anim-widget.php#L1180",
"source": "security@wordfence.com"
},
{
"url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3089058%40include-lottie-animation-for-elementor%2Ftags%2F1.10.9&new=3089058%40include-lottie-animation-for-elementor%2Ftags%2F1.10.10",
"source": "security@wordfence.com"
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/74f59ee0-19dd-4cc9-ab24-22f26d71d248?source=cve",
"source": "security@wordfence.com"
}
]
}

View File

@ -0,0 +1,32 @@
{
"id": "CVE-2024-5142",
"sourceIdentifier": "security@m-files.com",
"published": "2024-05-24T06:15:09.360",
"lastModified": "2024-05-24T06:15:09.360",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Stored Cross-Site Scripting vulnerability in Social Module in M-Files Hubshare before version 5.0.3.8 allows authenticated attacker to run scripts in other users browser"
}
],
"metrics": {},
"weaknesses": [
{
"source": "security@m-files.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://www.m-files.com/about/trust-center/security-advisories/cve-2024-5142/",
"source": "security@m-files.com"
}
]
}

View File

@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update
```plain
2024-05-24T06:00:30.065008+00:00
2024-05-24T08:00:38.339540+00:00
```
### Most recent CVE Modification Timestamp synchronized with NVD
```plain
2024-05-24T05:15:09.833000+00:00
2024-05-24T07:15:10.967000+00:00
```
### Last Data Feed Release
@ -33,24 +33,33 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
### Total Number of included CVEs
```plain
251641
251655
```
### CVEs added in the last Commit
Recently added CVEs: `4`
Recently added CVEs: `14`
- [CVE-2024-2618](CVE-2024/CVE-2024-26xx/CVE-2024-2618.json) (`2024-05-24T05:15:09.297`)
- [CVE-2024-2784](CVE-2024/CVE-2024-27xx/CVE-2024-2784.json) (`2024-05-24T05:15:09.620`)
- [CVE-2024-3557](CVE-2024/CVE-2024-35xx/CVE-2024-3557.json) (`2024-05-24T05:15:09.833`)
- [CVE-2024-4544](CVE-2024/CVE-2024-45xx/CVE-2024-4544.json) (`2024-05-24T04:15:08.670`)
- [CVE-2023-1001](CVE-2023/CVE-2023-10xx/CVE-2023-1001.json) (`2024-05-24T06:15:07.797`)
- [CVE-2023-1111](CVE-2023/CVE-2023-11xx/CVE-2023-1111.json) (`2024-05-24T07:15:08.213`)
- [CVE-2023-7259](CVE-2023/CVE-2023-72xx/CVE-2023-7259.json) (`2024-05-24T07:15:08.930`)
- [CVE-2024-0867](CVE-2024/CVE-2024-08xx/CVE-2024-0867.json) (`2024-05-24T06:15:08.380`)
- [CVE-2024-0893](CVE-2024/CVE-2024-08xx/CVE-2024-0893.json) (`2024-05-24T07:15:09.387`)
- [CVE-2024-1134](CVE-2024/CVE-2024-11xx/CVE-2024-1134.json) (`2024-05-24T06:15:08.667`)
- [CVE-2024-1332](CVE-2024/CVE-2024-13xx/CVE-2024-1332.json) (`2024-05-24T07:15:09.733`)
- [CVE-2024-1376](CVE-2024/CVE-2024-13xx/CVE-2024-1376.json) (`2024-05-24T07:15:10.057`)
- [CVE-2024-36361](CVE-2024/CVE-2024-363xx/CVE-2024-36361.json) (`2024-05-24T06:15:08.947`)
- [CVE-2024-3718](CVE-2024/CVE-2024-37xx/CVE-2024-3718.json) (`2024-05-24T06:15:09.100`)
- [CVE-2024-4484](CVE-2024/CVE-2024-44xx/CVE-2024-4484.json) (`2024-05-24T07:15:10.397`)
- [CVE-2024-4485](CVE-2024/CVE-2024-44xx/CVE-2024-4485.json) (`2024-05-24T07:15:10.700`)
- [CVE-2024-5060](CVE-2024/CVE-2024-50xx/CVE-2024-5060.json) (`2024-05-24T07:15:10.967`)
- [CVE-2024-5142](CVE-2024/CVE-2024-51xx/CVE-2024-5142.json) (`2024-05-24T06:15:09.360`)
### CVEs modified in the last Commit
Recently modified CVEs: `1`
Recently modified CVEs: `0`
- [CVE-2023-52793](CVE-2023/CVE-2023-527xx/CVE-2023-52793.json) (`2024-05-24T05:15:08.403`)
## Download and Usage

View File

@ -212986,6 +212986,7 @@ CVE-2023-0997,0,0,9d867f728bb348fa4696e97c8e4b017968a3b3bb8b47c0b8301db5c6498f4e
CVE-2023-0998,0,0,ba5f68f8590fb13504e5e9b2fcbd34380148b745a4b26a6bbaa9c9aacfd35a55,2024-05-17T02:17:43.290000
CVE-2023-0999,0,0,b1e7884f1d1818453ea32891517ca75a4f407be2a70ee70a439e634db86a737f,2024-05-17T02:17:43.410000
CVE-2023-1000,0,0,4aa58533c5dbb24f12efb55a44fc3e6b226f201aaeb3adf708f655b46d5885d5,2024-05-17T02:17:43.510000
CVE-2023-1001,1,1,c503ff5fcef2b722339d35b124404a82040640bc157044fe4326554acd2fde3f,2024-05-24T06:15:07.797000
CVE-2023-1002,0,0,131af00873ba3d719d248a3d55c1c0fedb7d4a756c10d98fe624675155b70314,2024-05-17T02:17:43.627000
CVE-2023-1003,0,0,8bf836cf081253b3290c22b088bb9f1d5e02d957313468642ff89c27911f506d,2024-05-17T02:17:43.750000
CVE-2023-1004,0,0,058d27fdff044a808f27ea337ecac6b052290a8dbc6d2048e8b9947a523130a1,2024-05-17T02:17:43.863000
@ -213090,6 +213091,7 @@ CVE-2023-1107,0,0,9a52bef9a1ca429be140a10c84bc12a629590b53316a867749752072c0b261
CVE-2023-1108,0,0,aeacf9d513f2b7dab05d3e517bca24fd3b051615c399a2a076f95c7e59be4ff3,2024-05-03T16:15:10.140000
CVE-2023-1109,0,0,2509c662afdb3f0a0ec45035471a3248ff9a739f276b59dc8726839849d40390,2023-04-26T23:00:01.937000
CVE-2023-1110,0,0,1f7300cb8eef018806d7e6dafa6e92f63d8af6d27f8e22d3167347856cbbc3a7,2023-11-07T04:02:31.253000
CVE-2023-1111,1,1,0aa3127d5099c7e18746393b094731b974e27286ebd8f18b9df86905760ba727,2024-05-24T07:15:08.213000
CVE-2023-1112,0,0,c2c9f1db857cae7a09406557a787eabf2708a23b13791e35059196c8811a0094,2024-05-17T02:17:49.600000
CVE-2023-1113,0,0,7f797892ab35c630cc5504c64a0bd7915415118eb8247b006d6445eec8741408,2024-05-17T02:17:49.707000
CVE-2023-1114,0,0,4ec36f3280ef61f0749c18afea2bb24b982915597e6f1fee380d9a87d5ca57c4,2024-02-01T16:56:59.573000
@ -238219,7 +238221,7 @@ CVE-2023-5279,0,0,df05cce92cc13a0bf4f5c68bbccb1ab030152a407ac16a620bc6d8a41bd20b
CVE-2023-52790,0,0,37fc416a2b6d20160fa9015d43d9a88a2b16d86e88dd5f7286710ce75d875d9d,2024-05-21T16:53:56.550000
CVE-2023-52791,0,0,bbc66a5e7af3e1e47c7c52f5d902e8af47e36ca13f7509de398a0add99c004b0,2024-05-21T16:53:56.550000
CVE-2023-52792,0,0,0eb780bc2bfc4f71f538874a0ac177e3775aa0e1e06b8167ae97997680dba388,2024-05-21T16:53:56.550000
CVE-2023-52793,0,1,d5ed96d5917d46a5d5e3fde34ce62f5eda54f721ae03abe3254d90a7ee366f66,2024-05-24T05:15:08.403000
CVE-2023-52793,0,0,d5ed96d5917d46a5d5e3fde34ce62f5eda54f721ae03abe3254d90a7ee366f66,2024-05-24T05:15:08.403000
CVE-2023-52794,0,0,50e09c28d543f2ff642a903ec08d6a3208323c1c266bdc9d4488b09e269602cd,2024-05-21T16:53:56.550000
CVE-2023-52795,0,0,5980075440aac081a647bc3432f79e2f882d151b5770f11920c70f4d75b18b3f,2024-05-21T16:53:56.550000
CVE-2023-52796,0,0,df7ab14122484d8ef6b830e96457bfb312159bc171f7e054cdc3d5585dd58d32,2024-05-21T16:53:56.550000
@ -240039,6 +240041,7 @@ CVE-2023-7251,0,0,73fa31f7b11a2c8f7785ccd98b3beff89a3869cfbe5b74910fb2dd13412671
CVE-2023-7252,0,0,2392d7e3f3e585dc7390c0e965b0650ef11fa8ae2796aaf6e5db491d8ab57d29,2024-04-22T13:28:43.747000
CVE-2023-7253,0,0,6000cb96a7cdff75b79b770b4fe76bc65674b2e521cea85c3d83d19816bdddbc,2024-04-24T13:39:42.883000
CVE-2023-7258,0,0,5ff9fbb18c87cd79eeba5bdac9e20b834be684e2899fd63fb3e107422ede555b,2024-05-15T18:35:11.453000
CVE-2023-7259,1,1,430343a1f0907dd4ce6fd174419c90c3307c14955cd3c6e119afc73602557521,2024-05-24T07:15:08.930000
CVE-2024-0007,0,0,3bebeca11ed66b29340ad5b2f4a6fdda381d640f217ed7214dda7d3a471e9da1,2024-02-15T06:23:39.303000
CVE-2024-0008,0,0,db70626ccf03b2491d218a1d6d38cb10870a351e02a617fba1e6e23a0ac8502b,2024-02-15T06:23:39.303000
CVE-2024-0009,0,0,a481cbe6336f9e8c7286d10d3efcc3169667e3db231d83fec3fad506beda4652,2024-02-15T06:23:39.303000
@ -240749,6 +240752,7 @@ CVE-2024-0861,0,0,896e71725cbfb614341352655e0b66e7def84c2617b58556401d4278cc8b74
CVE-2024-0862,0,0,8d5bc8312d1d93cf3fbc9bc4464ee1ea50ba5434e84839c1491be95817a91a77,2024-05-14T19:17:55.627000
CVE-2024-0864,0,0,d89dcae43b5200797b81bcd0ad7b3b6e3cba6f54866805aee9a386996fe0fcfc,2024-02-29T13:49:29.390000
CVE-2024-0866,0,0,2315ea7233a9f152b45c2f2db1db04866f3fbf8a4d5b6e4bad65f402d240f082,2024-03-26T12:55:05.010000
CVE-2024-0867,1,1,1cc00ae0c7c78fd04c13abfc9a88ad7ae845577d6430c70a87f455a0689bcb45,2024-05-24T06:15:08.380000
CVE-2024-0868,0,0,50dc470faec27f67202fe3c6b32f6e0e6b35686ae887e56f6aa6e0525b6a38ff,2024-04-17T12:48:07.510000
CVE-2024-0869,0,0,39eb12d4def5ace38cccd71318a17cc1945f05a59b2d0897303b6745b871b84d,2024-02-13T19:45:09.783000
CVE-2024-0870,0,0,41ded14ab5c6dc5551576c156b8ab1e84832c7db1a7e8550e9e61978443b627a,2024-05-14T19:18:31.490000
@ -240769,6 +240773,7 @@ CVE-2024-0888,0,0,1251f1e0b57697e39ab302ac1708a8ac792e88534122258215da50974afe10
CVE-2024-0889,0,0,1af68ae8d1cfa13ae0eded53cf456b483512352e891d764583ded6c2ad78addd,2024-05-17T02:35:01.543000
CVE-2024-0890,0,0,e67541998dd7949997cc026684667cf6adf88f664c3932cae28e899dee3bafce,2024-05-17T02:35:01.833000
CVE-2024-0891,0,0,43d38de51f0536067727703a5bf8557870f5608362301ff29cf47c54bddd3a28,2024-05-17T02:35:02.087000
CVE-2024-0893,1,1,ce7ae2f3a462ac35875f9067831135d6cd7e06d31ea47ec53dc412ade7713a14,2024-05-24T07:15:09.387000
CVE-2024-0895,0,0,6a76c7f2f120789a65253031d7521e1f62411bd227b5e6c7a4bb77914289251e,2024-02-12T17:03:38.533000
CVE-2024-0896,0,0,5348557c7ea4ddb4fdb7fdcc9e92238aad12e82aa66cf5c51f44520b0ef95acb,2024-03-13T18:16:18.563000
CVE-2024-0897,0,0,54d1bf8163931c80ebde85ab8390c0fecedb390a8355fe15103e3a67a3a29cc9,2024-03-13T18:16:18.563000
@ -240984,6 +240989,7 @@ CVE-2024-1129,0,0,efcf801aad96aab23ddf4c5c1c7fe067759cd524a5f540fb4b3132cd808f2d
CVE-2024-1130,0,0,19b9a2e3e227bc6e3d85f9dd98bd15cfd41c18a2ee1bc79c328385d5148fea32,2024-02-29T13:49:29.390000
CVE-2024-1132,0,0,fb94aeb2e33ee06cb38818cec4589dec64951d860b9f9a67435a2701e6505b51,2024-05-21T18:15:08.657000
CVE-2024-1133,0,0,85f4bf6d861639f9431d20ab28a51d2af9f3a3ecb32590788260710816d3a125,2024-02-29T13:49:29.390000
CVE-2024-1134,1,1,cca4aca7610094a06b75f63f6e516c082b1da3319b5df5c587aebfa467f5ce8a,2024-05-24T06:15:08.667000
CVE-2024-1135,0,0,2f6bc90f330f2812b6ceb34e2fa1ad9c1c5eca9415bce0719ca3f92f74cd2497,2024-04-16T13:24:07.103000
CVE-2024-1136,0,0,609070256c4defa988e1113275bf8273fe15f50574e00ed3dcfde13143e471cc,2024-02-28T14:06:45.783000
CVE-2024-1137,0,0,9f8c1cf74ca4778ab709faeea998997368a7f042480977a7d6535f2dd892d7f7,2024-03-13T12:33:51.697000
@ -241153,6 +241159,7 @@ CVE-2024-1327,0,0,1b6e3f0296467e9f6b424925712e479dea0088dc2698e1adadd7f96bd6f1e8
CVE-2024-1328,0,0,1e360ec5f794b47c3c1949d058d4dcab1ca058a0302ffe54a63801cf38181f90,2024-03-12T12:40:13.500000
CVE-2024-1329,0,0,c251ab89131ed5db620ce7b9371daf5508a26377e3f0f0d0996003e3074e8cd1,2024-02-15T18:27:28.837000
CVE-2024-1331,0,0,1deb1e21efa47891bffcfc0f7c5a5a4e56a2cce5d50551f8ec8837f30ffffb10,2024-03-18T19:40:00.173000
CVE-2024-1332,1,1,018ced21ef3250a9c45fda9c423096357256d7df8d96cfcde31205ec8c75fa36,2024-05-24T07:15:09.733000
CVE-2024-1333,0,0,258128469d54cc44538629ab13a661542f0353cc3076e7f49f79a63a3b1847c4,2024-03-18T19:40:00.173000
CVE-2024-1334,0,0,944ed42170a8df7f2e4c4a2f85c1c273c219b29edac392443c71fda9748dc88d,2024-02-29T13:49:29.390000
CVE-2024-1335,0,0,c84b322e1aa2f7dde321fa7adf9db9730c3948c96461d0bba36cb342c6cd701c,2024-02-29T13:49:29.390000
@ -241195,6 +241202,7 @@ CVE-2024-1371,0,0,93706cb3903d44813efe65388227c96437c2154d1873db13a512d53a3d1e58
CVE-2024-1372,0,0,fd6a0b0bdbecc63f56aef495458a3c5dd8f2e76f436e6cb5f113766b10bba4a3,2024-03-05T17:12:04.487000
CVE-2024-1373,0,0,6182eba24b857bc2b56524dd4b982074bd00b00d58fe9873ed20ec6b67a1b251,2024-03-11T10:15:49.383000
CVE-2024-1374,0,0,7fe6e2944b2df04d1912da5645567f3da2009d2f734eda817ead1dbb0beca205,2024-03-06T15:26:34.817000
CVE-2024-1376,1,1,a4797f01b6f1ccfcf92f9151a1f32d0bbf3d787e041847c4af137e800d478b6a,2024-05-24T07:15:10.057000
CVE-2024-1377,0,0,89ec0d3cfd7c9e3eb401e7d154a45976b7a536cce1245cff377347594bc84e11,2024-03-07T13:52:27.110000
CVE-2024-1378,0,0,861a3323ec8efaeb758681460069e84c3f0f238c20d369cc8b41f972b8f59fb9,2024-03-01T23:02:21.513000
CVE-2024-1379,0,0,a5dc4ff194b2081d660b7d1ebd72a79c6bfbea7bdeb0b3322f977151df1ae46c,2024-03-20T13:00:16.367000
@ -245235,7 +245243,7 @@ CVE-2024-26176,0,0,f59903f2631e58e79a3070c1f29430524476df93867e947d3ea24ca678f70
CVE-2024-26177,0,0,5e5591b51929988e6d47df6b283f8296af1e7f5e6dd74dff0a5dcb3d5b9bd2a6,2024-04-11T20:15:34.493000
CVE-2024-26178,0,0,0ea3ff59f80ecc740a7520fa54df65db9194a0e2f5b284e4a28108c6cdd7c32b,2024-04-11T20:15:34.590000
CVE-2024-26179,0,0,2c0e9c26edbe7391894ae0316bece6d7f0e00e30d0dd35ed10702d1f0851486d,2024-04-10T13:24:00.070000
CVE-2024-2618,1,1,fd31576c33993f719aeaf2b889819ad687d49e448baafc356e1fa2ce5662909d,2024-05-24T05:15:09.297000
CVE-2024-2618,0,0,fd31576c33993f719aeaf2b889819ad687d49e448baafc356e1fa2ce5662909d,2024-05-24T05:15:09.297000
CVE-2024-26180,0,0,2642e54652d0be099215ac2592071956276bb0b78149f1f8d9ba58e9dd3a0ce8,2024-04-10T13:24:00.070000
CVE-2024-26181,0,0,3a411991e2aecfef78fa22d696562d983ee0c725c3bcbac06e5fb980d6ae1993,2024-03-12T17:46:17.273000
CVE-2024-26182,0,0,485ae09810036858e090542cbab32de37612825a546d21a345f4c90039e51c49,2024-04-11T20:15:34.707000
@ -246410,7 +246418,7 @@ CVE-2024-27834,0,0,948524c0dc915de48f1a30f0f83847626c289c570280c228779565f014fee
CVE-2024-27835,0,0,c5b496e09974875402a7d06441907c8d5ea81f42dba79f32428e849dbc6472f0,2024-05-14T16:13:02.773000
CVE-2024-27837,0,0,8626be99cac1ae00bafee020dd05df66abeadfaec1fcc678d068c1e35de61db0,2024-05-14T16:13:02.773000
CVE-2024-27839,0,0,74675cf311db299675a03969100f02247b00aca595ece392255eaa46bf7427bf,2024-05-14T16:13:02.773000
CVE-2024-2784,1,1,b7629c0a6a4797a90210270ead1fd8b046015558c379db74b467baf1269bc9c5,2024-05-24T05:15:09.620000
CVE-2024-2784,0,0,b7629c0a6a4797a90210270ead1fd8b046015558c379db74b467baf1269bc9c5,2024-05-24T05:15:09.620000
CVE-2024-27841,0,0,b865fdab78cc8f48674a0c8e8cef06e953677f093a832a5849b168bd71ab3c3a,2024-05-14T16:13:02.773000
CVE-2024-27842,0,0,dfd659630e6d8c02d425306ac5fe92c5fdda89cde2357e956a1f302da3bf29f4,2024-05-14T16:13:02.773000
CVE-2024-27843,0,0,6f00e50e144ffd155eb02d09b582c344ba6cc9bd465b8d628b0a2a26ea39a90c,2024-05-14T16:13:02.773000
@ -250386,7 +250394,7 @@ CVE-2024-35559,0,0,0e0ce300b73ed62ad8a51cb05e5d24371bbac77caf688feb79ef16ffd5184
CVE-2024-3556,0,0,3585ee5c92a9c3d529b040dd670fbfee3d6182484f87bd29638348adaae5ce9a,2024-04-09T22:15:07.470000
CVE-2024-35560,0,0,597dd8543549aa3918a7c198c5233aa0b7527be9ddf9110727da0897342b10aa,2024-05-22T14:30:41.953000
CVE-2024-35561,0,0,8de74913deeb82bc0c13bc3d399d98340f8983a7e0aea38e829e82b55ca5ac91,2024-05-22T14:30:41.953000
CVE-2024-3557,1,1,6384e09f2b0861df209b78cf9037d44063de5d04caa08149eec83e046f79228b,2024-05-24T05:15:09.833000
CVE-2024-3557,0,0,6384e09f2b0861df209b78cf9037d44063de5d04caa08149eec83e046f79228b,2024-05-24T05:15:09.833000
CVE-2024-35570,0,0,28e94b3751ac99658b6b5e14fdb2c13c8c8e708c1afff9f925a1cc500050b2b3,2024-05-24T01:15:30.977000
CVE-2024-35571,0,0,67f76ae9f90c9f57899e4b508cc3f136e4d8caf290ab8a02ecec3dd8d722ed10,2024-05-20T19:34:58.277000
CVE-2024-35576,0,0,6cb958bfbb2aa8f28dc30b2057abfc4520624058806f8d23062e42f766a7e31c,2024-05-20T19:34:58.277000
@ -250686,6 +250694,7 @@ CVE-2024-3629,0,0,ed67d1a2dc82a6f7d8e47e5534a14b4493dd33c5e11e4c564b2ef763c111a4
CVE-2024-3630,0,0,1b4d82e848787accdc20ad3d430430e1a1fa399ad678a3e5fbc87f1ba9867411,2024-05-15T16:40:19.330000
CVE-2024-3631,0,0,52e896a80c9b063fda6224c04771bbd75f72f78e3d3636ccff4bb724fd16615d,2024-05-15T16:40:19.330000
CVE-2024-3634,0,0,940ae4dd6e92f9452379e49ccdcd29aa6fe6e9bda25faf9f7045c78090371ae8,2024-05-15T16:40:19.330000
CVE-2024-36361,1,1,d42eb303b2cacb7d0470c3408aff6b176d967b0f036c129e7bcef840cc548caf,2024-05-24T06:15:08.947000
CVE-2024-3637,0,0,e0d8ef5f7498633f88592f7b832da01e95be5d925cdaa67450761833b0152a3c,2024-05-03T12:48:41.067000
CVE-2024-3640,0,0,2c53ddbb0d3c9f63f5ef9575482e63f0bb81ae3ef5b4d53a76dd016e62e8657a,2024-05-17T18:36:31.297000
CVE-2024-3641,0,0,c281de95cce057acff2793609e8f843aad579a2f0257c0c2e0b6442733e87b14,2024-05-16T13:03:05.353000
@ -250743,6 +250752,7 @@ CVE-2024-3711,0,0,b2ab182a6cd64f6398e71b1acf256dc2d496d129302aa4acbb7a9cb3b9f832
CVE-2024-3714,0,0,67d2f256f515fc7fb7a12633af83387395a2a6015e3786015a9a5a4420323bea,2024-05-20T13:00:34.807000
CVE-2024-3715,0,0,902861be5261e2c029ed83a5c6920fde180817c53e05bb93208dc31c820658c5,2024-05-02T18:00:37.360000
CVE-2024-3717,0,0,f925293668cd733410cea58d8de3d8ac1f08ce4fec8b5812651df64ea2fd428a,2024-05-02T18:00:37.360000
CVE-2024-3718,1,1,16168547faa11f93ed45be23709c887a11ecba67c1899866d6c5595e9bc921ce,2024-05-24T06:15:09.100000
CVE-2024-3719,0,0,98817b00c300460b7ee17e28b90d655bc3286869de6cea5831a06059286a41a5,2024-05-17T02:40:05.100000
CVE-2024-3720,0,0,e90b9112f0b556a63557eff3929848b7a3fd36c353e364ec4c7371f42a8b366d,2024-05-17T02:40:05.197000
CVE-2024-3721,0,0,ec8dc4b0ad5d1d9ba11acb18015142f7d1715fd653f7ca2987e266e9c9e8ef01,2024-05-17T02:40:05.290000
@ -251219,6 +251229,8 @@ CVE-2024-4471,0,0,6c9bd6420a05ba387ffb41670e602f56b02ca7f7dc377deece8093fdfb2625
CVE-2024-4473,0,0,be8deb42c9d1905b301c3bfbae608b1551ce9395ac2fbbb337038c3a7eb347fa,2024-05-14T19:17:55.627000
CVE-2024-4478,0,0,31a4a4c48861c0c170c939e3aa0b10661ec97e9653465707919926dbd3595183,2024-05-16T13:03:05.353000
CVE-2024-4481,0,0,7ecf88f2a22a659849266bdc0bd40c464d195e3dafdf490c58869a301c87572b,2024-05-14T16:11:39.510000
CVE-2024-4484,1,1,0e6d10ae60614bbe98513fc8ca09aa4acd80a1ee39e1ccb1def452f2e785ea28,2024-05-24T07:15:10.397000
CVE-2024-4485,1,1,684f04eef081e68d4088066c89d7d1f89bd3d0ab1025bb3d7b0e383ba48cecfb,2024-05-24T07:15:10.700000
CVE-2024-4486,0,0,a73f1b43309f4975525156a3992ab83bea82776aa822ddaaf973001731263834,2024-05-24T01:15:30.977000
CVE-2024-4487,0,0,50c826d9a63ca2cf478652fe406866ee1f801cabb050eb8635e58a006f7805c7,2024-05-14T16:11:39.510000
CVE-2024-4490,0,0,e9307362c9e30effa78a675ee98be99c8b3d9c66fa0a2fa85d2752ca1d5cbd01,2024-05-14T16:11:39.510000
@ -251262,7 +251274,7 @@ CVE-2024-4537,0,0,bc82aa6954c5799b0476dc279149a81ab940e42aa35e918500f89f663af922
CVE-2024-4538,0,0,dbb952ff57fc82a37e26bc4eac10a9f198285e190e0ce1d17eb40564657c4b33,2024-05-07T13:39:32.710000
CVE-2024-4539,0,0,83e8dd6ad2ba7f5df744ac27f19ba7dd20f88687370090b4e13c20c65e81aa4f,2024-05-14T16:11:39.510000
CVE-2024-4542,0,0,d17f875757344f90ad0b6ea46d223a5444286908c9043b3fba1504d3883c4c6d,2024-05-16T14:15:08.980000
CVE-2024-4544,1,1,ced6cb69757f5ba8c45427e412ecd77e6a83109cb40aff3fbe1a625845cbca2c,2024-05-24T04:15:08.670000
CVE-2024-4544,0,0,ced6cb69757f5ba8c45427e412ecd77e6a83109cb40aff3fbe1a625845cbca2c,2024-05-24T04:15:08.670000
CVE-2024-4545,0,0,6a8513e5f42227bdebff4b9eb7cd99ee2da82484e9d02165945026400c877f9c,2024-05-14T16:11:39.510000
CVE-2024-4546,0,0,3d8214b19328ce0698128d2541020c31eac589ba32f1eccefac58acec39f32be,2024-05-16T13:03:05.353000
CVE-2024-4547,0,0,6b600f363e41b63ee43a4b2365298fb38de96fd61b910d0724ca38ee29a8a8df,2024-05-06T16:00:59.253000
@ -251545,6 +251557,7 @@ CVE-2024-5050,0,0,be8f3852fc1ee0c7c6f3d9ea8e9de609d6b3106a1d1264936ecc028a9ffecb
CVE-2024-5051,0,0,05278087a2e45b7f804d2ac5ded899aaa080da1c72c5fd177e38e1c11ec82cf6,2024-05-17T18:35:35.070000
CVE-2024-5052,0,0,e91d117e4e1be9076555bb5304fe1acddd9d3634cfedff3f9a612b7def3416c1,2024-05-17T18:35:35.070000
CVE-2024-5055,0,0,2c441c6b199abc8bb09d755706b6b6e6a0c1c1abcfa9df3dac57cd2dcc6091d3,2024-05-17T18:35:35.070000
CVE-2024-5060,1,1,a684a8b33e246e735d1eac127a5350340720acb8fcdad824f275c19f4a0fe67a,2024-05-24T07:15:10.967000
CVE-2024-5063,0,0,58a3e73736caa423017f4765a458f0556a3988aff53fbc778cde0be207e8f3c0,2024-05-20T13:00:34.807000
CVE-2024-5064,0,0,278ab368b63cb29376cafc56d50f76e64a52eec9e724980377f85cc060f2e4ed,2024-05-20T13:00:34.807000
CVE-2024-5065,0,0,61cda3c56538a884bedac0a7dbf902fc270042a859c82155c18493f3425ff365,2024-05-20T13:00:34.807000
@ -251589,6 +251602,7 @@ CVE-2024-5134,0,0,44a789f42f5a3c13ba63d82e5081c6abc6a3d25c1481cb7c53cfc6c6e78700
CVE-2024-5135,0,0,68cf9bdf9dec0a96d7d353e92a3ea23735e4dfab71f12aba03f45faad350b446,2024-05-20T13:00:04.957000
CVE-2024-5136,0,0,7e1453b58a6b8cdb889318a17e467bc4887e911147f2bbd5898eefe5c0fc0fa9,2024-05-20T13:00:04.957000
CVE-2024-5137,0,0,9ef636c571a0277ac03884ccb19a37de0ac2ceab7c0195ff8a91e587e734c012,2024-05-20T13:00:04.957000
CVE-2024-5142,1,1,6cd1c095f50ef180f4b85f460cd1e80771396e1628f588562f607669516a5f66,2024-05-24T06:15:09.360000
CVE-2024-5143,0,0,6fb867f42f8c3ca7c9111a79dd4a6f4f194bf553f9063ef95dc380f05caaf7ce,2024-05-24T01:15:30.977000
CVE-2024-5145,0,0,779a53179978014855de22e41604c12feef2bb6901d36d253a629d55b7b44ab6,2024-05-21T12:37:59.687000
CVE-2024-5147,0,0,f786cdd04c7e64ee05dc3a502a4fef5436dd8390bfdc70803ca93e4405d481a0,2024-05-22T12:46:53.887000

Can't render this file because it is too large.