mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-08 11:37:26 +00:00
Auto-Update: 2024-07-13T08:00:19.263677+00:00
This commit is contained in:
parent
24691064d0
commit
60aec2f838
21
CVE-2024/CVE-2024-28xx/CVE-2024-2870.json
Normal file
21
CVE-2024/CVE-2024-28xx/CVE-2024-2870.json
Normal file
@ -0,0 +1,21 @@
|
||||
{
|
||||
"id": "CVE-2024-2870",
|
||||
"sourceIdentifier": "contact@wpscan.com",
|
||||
"published": "2024-07-13T06:15:02.310",
|
||||
"lastModified": "2024-07-13T06:15:02.310",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The socialdriver-framework WordPress plugin before 2024.04.30 does not sanitise and escape a parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting which could be used against high privilege users such as admin"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://wpscan.com/vulnerability/688522d2-ee28-44f8-828d-352f06e43885/",
|
||||
"source": "contact@wpscan.com"
|
||||
}
|
||||
]
|
||||
}
|
21
CVE-2024/CVE-2024-30xx/CVE-2024-3026.json
Normal file
21
CVE-2024/CVE-2024-30xx/CVE-2024-3026.json
Normal file
@ -0,0 +1,21 @@
|
||||
{
|
||||
"id": "CVE-2024-3026",
|
||||
"sourceIdentifier": "contact@wpscan.com",
|
||||
"published": "2024-07-13T06:15:02.547",
|
||||
"lastModified": "2024-07-13T06:15:02.547",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The WordPress Button Plugin MaxButtons WordPress plugin before 9.7.8 does not sanitise and escape some parameters, which could allow users with a role as low as editor to perform Cross-Site Scripting attacks"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://wpscan.com/vulnerability/aba9d8a5-20a7-49e5-841c-9cfcb9bc6144/",
|
||||
"source": "contact@wpscan.com"
|
||||
}
|
||||
]
|
||||
}
|
21
CVE-2024/CVE-2024-36xx/CVE-2024-3632.json
Normal file
21
CVE-2024/CVE-2024-36xx/CVE-2024-3632.json
Normal file
@ -0,0 +1,21 @@
|
||||
{
|
||||
"id": "CVE-2024-3632",
|
||||
"sourceIdentifier": "contact@wpscan.com",
|
||||
"published": "2024-07-13T06:15:02.617",
|
||||
"lastModified": "2024-07-13T06:15:02.617",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The Smart Image Gallery WordPress plugin before 1.0.19 does not have CSRF check in place when updating its settings, which could allow attackers to make a logged in admin change them via a CSRF attack"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://wpscan.com/vulnerability/9b11682d-4705-4595-943f-0fa093d0b644/",
|
||||
"source": "contact@wpscan.com"
|
||||
}
|
||||
]
|
||||
}
|
21
CVE-2024/CVE-2024-37xx/CVE-2024-3710.json
Normal file
21
CVE-2024/CVE-2024-37xx/CVE-2024-3710.json
Normal file
@ -0,0 +1,21 @@
|
||||
{
|
||||
"id": "CVE-2024-3710",
|
||||
"sourceIdentifier": "contact@wpscan.com",
|
||||
"published": "2024-07-13T06:15:02.700",
|
||||
"lastModified": "2024-07-13T06:15:02.700",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The Image Photo Gallery Final Tiles Grid WordPress plugin before 3.6.0 does not validate and escape some of its shortcode attributes before outputting them back in the page, which could allow users with a role as low as contributor to perform Stored Cross-Site Scripting attacks which could be used against high privilege users such as admin"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://wpscan.com/vulnerability/bde10913-4f7e-4590-86eb-33bfa904f95f/",
|
||||
"source": "contact@wpscan.com"
|
||||
}
|
||||
]
|
||||
}
|
21
CVE-2024/CVE-2024-37xx/CVE-2024-3751.json
Normal file
21
CVE-2024/CVE-2024-37xx/CVE-2024-3751.json
Normal file
@ -0,0 +1,21 @@
|
||||
{
|
||||
"id": "CVE-2024-3751",
|
||||
"sourceIdentifier": "contact@wpscan.com",
|
||||
"published": "2024-07-13T06:15:02.773",
|
||||
"lastModified": "2024-07-13T06:15:02.773",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The Seriously Simple Podcasting WordPress plugin before 3.3.0 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup)"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://wpscan.com/vulnerability/1c684b05-2545-4fa5-ba9e-91d8b8f725ac/",
|
||||
"source": "contact@wpscan.com"
|
||||
}
|
||||
]
|
||||
}
|
21
CVE-2024/CVE-2024-37xx/CVE-2024-3753.json
Normal file
21
CVE-2024/CVE-2024-37xx/CVE-2024-3753.json
Normal file
@ -0,0 +1,21 @@
|
||||
{
|
||||
"id": "CVE-2024-3753",
|
||||
"sourceIdentifier": "contact@wpscan.com",
|
||||
"published": "2024-07-13T06:15:02.840",
|
||||
"lastModified": "2024-07-13T06:15:02.840",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The Hostel WordPress plugin before 1.1.5.3 does not sanitise and escape a parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting which could be used against high privilege users such as admin"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://wpscan.com/vulnerability/e140e109-4176-4b26-bf63-198262a31409/",
|
||||
"source": "contact@wpscan.com"
|
||||
}
|
||||
]
|
||||
}
|
21
CVE-2024/CVE-2024-39xx/CVE-2024-3919.json
Normal file
21
CVE-2024/CVE-2024-39xx/CVE-2024-3919.json
Normal file
@ -0,0 +1,21 @@
|
||||
{
|
||||
"id": "CVE-2024-3919",
|
||||
"sourceIdentifier": "contact@wpscan.com",
|
||||
"published": "2024-07-13T06:15:02.900",
|
||||
"lastModified": "2024-07-13T06:15:02.900",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The OpenPGP Form Encryption for WordPress plugin before 1.5.1 does not validate and escape some of its shortcode attributes before outputting them back in a page/post where the shortcode is embed, which could allow users with the contributor role and above to perform Stored Cross-Site Scripting attacks."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://wpscan.com/vulnerability/4e38c7d9-5b6a-4dfc-8f22-3ff30565ce43/",
|
||||
"source": "contact@wpscan.com"
|
||||
}
|
||||
]
|
||||
}
|
21
CVE-2024/CVE-2024-39xx/CVE-2024-3963.json
Normal file
21
CVE-2024/CVE-2024-39xx/CVE-2024-3963.json
Normal file
@ -0,0 +1,21 @@
|
||||
{
|
||||
"id": "CVE-2024-3963",
|
||||
"sourceIdentifier": "contact@wpscan.com",
|
||||
"published": "2024-07-13T06:15:02.967",
|
||||
"lastModified": "2024-07-13T06:15:02.967",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The Giveaways and Contests by RafflePress WordPress plugin before 1.12.14 does not sanitise and escape some parameters, which could allow users with a role as low as editor to perform Cross-Site Scripting attacks"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://wpscan.com/vulnerability/827d738e-5369-431e-8438-b5c4d8c1f8f1/",
|
||||
"source": "contact@wpscan.com"
|
||||
}
|
||||
]
|
||||
}
|
21
CVE-2024/CVE-2024-39xx/CVE-2024-3964.json
Normal file
21
CVE-2024/CVE-2024-39xx/CVE-2024-3964.json
Normal file
@ -0,0 +1,21 @@
|
||||
{
|
||||
"id": "CVE-2024-3964",
|
||||
"sourceIdentifier": "contact@wpscan.com",
|
||||
"published": "2024-07-13T06:15:03.030",
|
||||
"lastModified": "2024-07-13T06:15:03.030",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The Product Enquiry for WooCommerce WordPress plugin before 3.1.8 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup)"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://wpscan.com/vulnerability/ff468772-3e6a-439c-a4d7-94bd2ce1a964/",
|
||||
"source": "contact@wpscan.com"
|
||||
}
|
||||
]
|
||||
}
|
21
CVE-2024/CVE-2024-42xx/CVE-2024-4217.json
Normal file
21
CVE-2024/CVE-2024-42xx/CVE-2024-4217.json
Normal file
@ -0,0 +1,21 @@
|
||||
{
|
||||
"id": "CVE-2024-4217",
|
||||
"sourceIdentifier": "contact@wpscan.com",
|
||||
"published": "2024-07-13T06:15:03.097",
|
||||
"lastModified": "2024-07-13T06:15:03.097",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The shortcodes-ultimate-pro WordPress plugin before 7.1.5 does not properly escape some of its shortcodes' settings, making it possible for attackers with a Contributor account to conduct Stored XSS attacks."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://wpscan.com/vulnerability/55cb43bf-7c8f-4df7-b4de-bf2bb1c2766d/",
|
||||
"source": "contact@wpscan.com"
|
||||
}
|
||||
]
|
||||
}
|
21
CVE-2024/CVE-2024-42xx/CVE-2024-4269.json
Normal file
21
CVE-2024/CVE-2024-42xx/CVE-2024-4269.json
Normal file
@ -0,0 +1,21 @@
|
||||
{
|
||||
"id": "CVE-2024-4269",
|
||||
"sourceIdentifier": "contact@wpscan.com",
|
||||
"published": "2024-07-13T06:15:03.170",
|
||||
"lastModified": "2024-07-13T06:15:03.170",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The SVG Block WordPress plugin before 1.1.20 does not sanitize SVG file contents, which enables users with at least the author role to SVG with malicious JavaScript to conduct Stored XSS attacks."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://wpscan.com/vulnerability/8aae7aa1-6170-45d8-903f-8520913276da/",
|
||||
"source": "contact@wpscan.com"
|
||||
}
|
||||
]
|
||||
}
|
21
CVE-2024/CVE-2024-42xx/CVE-2024-4272.json
Normal file
21
CVE-2024/CVE-2024-42xx/CVE-2024-4272.json
Normal file
@ -0,0 +1,21 @@
|
||||
{
|
||||
"id": "CVE-2024-4272",
|
||||
"sourceIdentifier": "contact@wpscan.com",
|
||||
"published": "2024-07-13T06:15:03.230",
|
||||
"lastModified": "2024-07-13T06:15:03.230",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The Support SVG WordPress plugin before 1.1.0 does not sanitize SVG file contents, which enables users with at least the author role to SVG with malicious JavaScript to conduct Stored XSS attacks."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://wpscan.com/vulnerability/ed1b1540-a0e2-434e-8769-9532c3ed5e31/",
|
||||
"source": "contact@wpscan.com"
|
||||
}
|
||||
]
|
||||
}
|
21
CVE-2024/CVE-2024-46xx/CVE-2024-4602.json
Normal file
21
CVE-2024/CVE-2024-46xx/CVE-2024-4602.json
Normal file
@ -0,0 +1,21 @@
|
||||
{
|
||||
"id": "CVE-2024-4602",
|
||||
"sourceIdentifier": "contact@wpscan.com",
|
||||
"published": "2024-07-13T06:15:03.297",
|
||||
"lastModified": "2024-07-13T06:15:03.297",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The Embed Peertube Playlist WordPress plugin before 1.10 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup)"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://wpscan.com/vulnerability/bc15bac7-8241-472a-a7c1-58070714501d/",
|
||||
"source": "contact@wpscan.com"
|
||||
}
|
||||
]
|
||||
}
|
21
CVE-2024/CVE-2024-47xx/CVE-2024-4752.json
Normal file
21
CVE-2024/CVE-2024-47xx/CVE-2024-4752.json
Normal file
@ -0,0 +1,21 @@
|
||||
{
|
||||
"id": "CVE-2024-4752",
|
||||
"sourceIdentifier": "contact@wpscan.com",
|
||||
"published": "2024-07-13T06:15:03.370",
|
||||
"lastModified": "2024-07-13T06:15:03.370",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The EventON WordPress plugin before 2.2.15 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup)"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://wpscan.com/vulnerability/70d1f5d5-1a96-494b-9203-96a7780026da/",
|
||||
"source": "contact@wpscan.com"
|
||||
}
|
||||
]
|
||||
}
|
21
CVE-2024/CVE-2024-49xx/CVE-2024-4977.json
Normal file
21
CVE-2024/CVE-2024-49xx/CVE-2024-4977.json
Normal file
@ -0,0 +1,21 @@
|
||||
{
|
||||
"id": "CVE-2024-4977",
|
||||
"sourceIdentifier": "contact@wpscan.com",
|
||||
"published": "2024-07-13T06:15:03.440",
|
||||
"lastModified": "2024-07-13T06:15:03.440",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The Index WP MySQL For Speed WordPress plugin before 1.4.18 does not sanitise and escape a parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting which could be used against high privilege users such as admin"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://wpscan.com/vulnerability/89791a80-5cff-4a1a-8163-94b5be4081a5/",
|
||||
"source": "contact@wpscan.com"
|
||||
}
|
||||
]
|
||||
}
|
21
CVE-2024/CVE-2024-50xx/CVE-2024-5002.json
Normal file
21
CVE-2024/CVE-2024-50xx/CVE-2024-5002.json
Normal file
@ -0,0 +1,21 @@
|
||||
{
|
||||
"id": "CVE-2024-5002",
|
||||
"sourceIdentifier": "contact@wpscan.com",
|
||||
"published": "2024-07-13T06:15:03.500",
|
||||
"lastModified": "2024-07-13T06:15:03.500",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The User Submitted Posts WordPress plugin before 20240516 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup)"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://wpscan.com/vulnerability/da09b99a-fa40-428f-80b4-0af764fd2f4f/",
|
||||
"source": "contact@wpscan.com"
|
||||
}
|
||||
]
|
||||
}
|
21
CVE-2024/CVE-2024-50xx/CVE-2024-5028.json
Normal file
21
CVE-2024/CVE-2024-50xx/CVE-2024-5028.json
Normal file
@ -0,0 +1,21 @@
|
||||
{
|
||||
"id": "CVE-2024-5028",
|
||||
"sourceIdentifier": "contact@wpscan.com",
|
||||
"published": "2024-07-13T06:15:03.563",
|
||||
"lastModified": "2024-07-13T06:15:03.563",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The CM WordPress Search And Replace Plugin WordPress plugin before 1.3.9 does not have CSRF checks in some places, which could allow attackers to make logged in users perform unwanted actions via CSRF attacks"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://wpscan.com/vulnerability/0bae8494-7b01-4203-a4f7-ccc60efbdda7/",
|
||||
"source": "contact@wpscan.com"
|
||||
}
|
||||
]
|
||||
}
|
21
CVE-2024/CVE-2024-50xx/CVE-2024-5032.json
Normal file
21
CVE-2024/CVE-2024-50xx/CVE-2024-5032.json
Normal file
@ -0,0 +1,21 @@
|
||||
{
|
||||
"id": "CVE-2024-5032",
|
||||
"sourceIdentifier": "contact@wpscan.com",
|
||||
"published": "2024-07-13T06:15:03.633",
|
||||
"lastModified": "2024-07-13T06:15:03.633",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The SULly WordPress plugin before 4.3.1 does not sanitise and escape a parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting which could be used against high privilege users such as admin"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://wpscan.com/vulnerability/4bb92693-23b3-4250-baee-af38b7e615e0/",
|
||||
"source": "contact@wpscan.com"
|
||||
}
|
||||
]
|
||||
}
|
21
CVE-2024/CVE-2024-50xx/CVE-2024-5033.json
Normal file
21
CVE-2024/CVE-2024-50xx/CVE-2024-5033.json
Normal file
@ -0,0 +1,21 @@
|
||||
{
|
||||
"id": "CVE-2024-5033",
|
||||
"sourceIdentifier": "contact@wpscan.com",
|
||||
"published": "2024-07-13T06:15:03.707",
|
||||
"lastModified": "2024-07-13T06:15:03.707",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The SULly WordPress plugin before 4.3.1 does not have CSRF check in some places, and is missing sanitisation as well as escaping, which could allow attackers to make logged in admin add Stored XSS payloads via a CSRF attack"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://wpscan.com/vulnerability/dd42765a-1300-453f-9835-6e646c87e496/",
|
||||
"source": "contact@wpscan.com"
|
||||
}
|
||||
]
|
||||
}
|
21
CVE-2024/CVE-2024-50xx/CVE-2024-5034.json
Normal file
21
CVE-2024/CVE-2024-50xx/CVE-2024-5034.json
Normal file
@ -0,0 +1,21 @@
|
||||
{
|
||||
"id": "CVE-2024-5034",
|
||||
"sourceIdentifier": "contact@wpscan.com",
|
||||
"published": "2024-07-13T06:15:03.780",
|
||||
"lastModified": "2024-07-13T06:15:03.780",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The SULly WordPress plugin before 4.3.1 does not have CSRF checks in some places, which could allow attackers to make logged in users perform unwanted actions via CSRF attacks"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://wpscan.com/vulnerability/31f3a3b5-07bf-4cb3-b358-8488808733e0/",
|
||||
"source": "contact@wpscan.com"
|
||||
}
|
||||
]
|
||||
}
|
21
CVE-2024/CVE-2024-50xx/CVE-2024-5074.json
Normal file
21
CVE-2024/CVE-2024-50xx/CVE-2024-5074.json
Normal file
@ -0,0 +1,21 @@
|
||||
{
|
||||
"id": "CVE-2024-5074",
|
||||
"sourceIdentifier": "contact@wpscan.com",
|
||||
"published": "2024-07-13T06:15:03.840",
|
||||
"lastModified": "2024-07-13T06:15:03.840",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The wp-eMember WordPress plugin before 10.6.6 does not sanitise and escape a parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting which could be used against high privilege users such as admin"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://wpscan.com/vulnerability/174a2ba8-0215-480f-93ec-83ebc4a3200e/",
|
||||
"source": "contact@wpscan.com"
|
||||
}
|
||||
]
|
||||
}
|
21
CVE-2024/CVE-2024-50xx/CVE-2024-5075.json
Normal file
21
CVE-2024/CVE-2024-50xx/CVE-2024-5075.json
Normal file
@ -0,0 +1,21 @@
|
||||
{
|
||||
"id": "CVE-2024-5075",
|
||||
"sourceIdentifier": "contact@wpscan.com",
|
||||
"published": "2024-07-13T06:15:03.910",
|
||||
"lastModified": "2024-07-13T06:15:03.910",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The wp-eMember WordPress plugin before 10.6.6 does not sanitise and escape a parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting which could be used against high privilege users such as admin"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://wpscan.com/vulnerability/b47d93d6-5511-451a-853f-c8b0fba20969/",
|
||||
"source": "contact@wpscan.com"
|
||||
}
|
||||
]
|
||||
}
|
21
CVE-2024/CVE-2024-50xx/CVE-2024-5076.json
Normal file
21
CVE-2024/CVE-2024-50xx/CVE-2024-5076.json
Normal file
@ -0,0 +1,21 @@
|
||||
{
|
||||
"id": "CVE-2024-5076",
|
||||
"sourceIdentifier": "contact@wpscan.com",
|
||||
"published": "2024-07-13T06:15:03.970",
|
||||
"lastModified": "2024-07-13T06:15:03.970",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The wp-eMember WordPress plugin before 10.6.6 does not have CSRF checks in some places, which could allow attackers to make logged in users perform unwanted actions via CSRF attacks"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://wpscan.com/vulnerability/01cbc841-a30f-4df5-ab7f-0c2c7469657b/",
|
||||
"source": "contact@wpscan.com"
|
||||
}
|
||||
]
|
||||
}
|
21
CVE-2024/CVE-2024-50xx/CVE-2024-5077.json
Normal file
21
CVE-2024/CVE-2024-50xx/CVE-2024-5077.json
Normal file
@ -0,0 +1,21 @@
|
||||
{
|
||||
"id": "CVE-2024-5077",
|
||||
"sourceIdentifier": "contact@wpscan.com",
|
||||
"published": "2024-07-13T06:15:04.033",
|
||||
"lastModified": "2024-07-13T06:15:04.033",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The wp-eMember WordPress plugin before 10.6.6 does not have CSRF check in some places, and is missing sanitisation as well as escaping, which could allow attackers to make logged in admin add Stored XSS payloads via a CSRF attack"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://wpscan.com/vulnerability/00fcbcf3-41ee-45e7-a0a9-0d46cb7ef859/",
|
||||
"source": "contact@wpscan.com"
|
||||
}
|
||||
]
|
||||
}
|
21
CVE-2024/CVE-2024-50xx/CVE-2024-5079.json
Normal file
21
CVE-2024/CVE-2024-50xx/CVE-2024-5079.json
Normal file
@ -0,0 +1,21 @@
|
||||
{
|
||||
"id": "CVE-2024-5079",
|
||||
"sourceIdentifier": "contact@wpscan.com",
|
||||
"published": "2024-07-13T06:15:04.097",
|
||||
"lastModified": "2024-07-13T06:15:04.097",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The wp-eMember WordPress plugin before 10.6.7 does not sanitise and escape some of the fields when members register, which allows unauthenticated users to perform Stored Cross-Site Scripting attacks"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://wpscan.com/vulnerability/bdb5509e-80ab-4e47-83a4-9347796eec40/",
|
||||
"source": "contact@wpscan.com"
|
||||
}
|
||||
]
|
||||
}
|
21
CVE-2024/CVE-2024-50xx/CVE-2024-5080.json
Normal file
21
CVE-2024/CVE-2024-50xx/CVE-2024-5080.json
Normal file
@ -0,0 +1,21 @@
|
||||
{
|
||||
"id": "CVE-2024-5080",
|
||||
"sourceIdentifier": "contact@wpscan.com",
|
||||
"published": "2024-07-13T06:15:04.163",
|
||||
"lastModified": "2024-07-13T06:15:04.163",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The wp-eMember WordPress plugin before 10.6.6 does not validate files to be uploaded, which could allow admins to upload arbitrary files such as PHP on the server"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://wpscan.com/vulnerability/15f78aad-001c-4219-aa7e-46537e1357a2/",
|
||||
"source": "contact@wpscan.com"
|
||||
}
|
||||
]
|
||||
}
|
21
CVE-2024/CVE-2024-51xx/CVE-2024-5151.json
Normal file
21
CVE-2024/CVE-2024-51xx/CVE-2024-5151.json
Normal file
@ -0,0 +1,21 @@
|
||||
{
|
||||
"id": "CVE-2024-5151",
|
||||
"sourceIdentifier": "contact@wpscan.com",
|
||||
"published": "2024-07-13T06:15:04.237",
|
||||
"lastModified": "2024-07-13T06:15:04.237",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The SULly WordPress plugin before 4.3.1 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup)"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://wpscan.com/vulnerability/1ede4c66-9932-4ba6-bba1-0ba13f5a2f8f/",
|
||||
"source": "contact@wpscan.com"
|
||||
}
|
||||
]
|
||||
}
|
21
CVE-2024/CVE-2024-51xx/CVE-2024-5167.json
Normal file
21
CVE-2024/CVE-2024-51xx/CVE-2024-5167.json
Normal file
@ -0,0 +1,21 @@
|
||||
{
|
||||
"id": "CVE-2024-5167",
|
||||
"sourceIdentifier": "contact@wpscan.com",
|
||||
"published": "2024-07-13T06:15:04.303",
|
||||
"lastModified": "2024-07-13T06:15:04.303",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The CM Email Registration Blacklist and Whitelist WordPress plugin before 1.4.9 does not have CSRF check when adding or deleting an item from the blacklist or whitelist, which could allow attackers to make a logged in admin add or delete settings from the blacklist or whitelist menu via a CSRF attack"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://wpscan.com/vulnerability/67bb5ab8-4493-4f5b-a989-41576675b61a/",
|
||||
"source": "contact@wpscan.com"
|
||||
}
|
||||
]
|
||||
}
|
21
CVE-2024/CVE-2024-52xx/CVE-2024-5280.json
Normal file
21
CVE-2024/CVE-2024-52xx/CVE-2024-5280.json
Normal file
@ -0,0 +1,21 @@
|
||||
{
|
||||
"id": "CVE-2024-5280",
|
||||
"sourceIdentifier": "contact@wpscan.com",
|
||||
"published": "2024-07-13T06:15:04.360",
|
||||
"lastModified": "2024-07-13T06:15:04.360",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The wp-affiliate-platform WordPress plugin before 6.5.1 does not have CSRF check in some places, and is missing sanitisation as well as escaping, which could allow attackers to make non-logged in users execute an XSS payload via a CSRF attack"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://wpscan.com/vulnerability/bbc214ba-4e97-4b3a-a21b-2931a9e36973/",
|
||||
"source": "contact@wpscan.com"
|
||||
}
|
||||
]
|
||||
}
|
21
CVE-2024/CVE-2024-52xx/CVE-2024-5281.json
Normal file
21
CVE-2024/CVE-2024-52xx/CVE-2024-5281.json
Normal file
@ -0,0 +1,21 @@
|
||||
{
|
||||
"id": "CVE-2024-5281",
|
||||
"sourceIdentifier": "contact@wpscan.com",
|
||||
"published": "2024-07-13T06:15:04.430",
|
||||
"lastModified": "2024-07-13T06:15:04.430",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The wp-affiliate-platform WordPress plugin before 6.5.1 does not sanitise and escape a parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting which could be used against high privilege users such as admin"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://wpscan.com/vulnerability/3c0bdb0f-a06a-47a8-9198-a2bf2678b8f1/",
|
||||
"source": "contact@wpscan.com"
|
||||
}
|
||||
]
|
||||
}
|
21
CVE-2024/CVE-2024-52xx/CVE-2024-5282.json
Normal file
21
CVE-2024/CVE-2024-52xx/CVE-2024-5282.json
Normal file
@ -0,0 +1,21 @@
|
||||
{
|
||||
"id": "CVE-2024-5282",
|
||||
"sourceIdentifier": "contact@wpscan.com",
|
||||
"published": "2024-07-13T06:15:04.490",
|
||||
"lastModified": "2024-07-13T06:15:04.490",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The wp-affiliate-platform WordPress plugin before 6.5.1 does not sanitise and escape a parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting which could be used against high privilege users such as admin"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://wpscan.com/vulnerability/bf3fb97e-12fa-4b37-b28b-1771ddb5ceb1/",
|
||||
"source": "contact@wpscan.com"
|
||||
}
|
||||
]
|
||||
}
|
21
CVE-2024/CVE-2024-52xx/CVE-2024-5283.json
Normal file
21
CVE-2024/CVE-2024-52xx/CVE-2024-5283.json
Normal file
@ -0,0 +1,21 @@
|
||||
{
|
||||
"id": "CVE-2024-5283",
|
||||
"sourceIdentifier": "contact@wpscan.com",
|
||||
"published": "2024-07-13T06:15:04.553",
|
||||
"lastModified": "2024-07-13T06:15:04.553",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The wp-affiliate-platform WordPress plugin before 6.5.1 does not sanitise and escape a parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting which could be used against high privilege users such as admin"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://wpscan.com/vulnerability/3e1adcd3-7c46-45e8-9e2b-2ede0d79c943/",
|
||||
"source": "contact@wpscan.com"
|
||||
}
|
||||
]
|
||||
}
|
21
CVE-2024/CVE-2024-52xx/CVE-2024-5284.json
Normal file
21
CVE-2024/CVE-2024-52xx/CVE-2024-5284.json
Normal file
@ -0,0 +1,21 @@
|
||||
{
|
||||
"id": "CVE-2024-5284",
|
||||
"sourceIdentifier": "contact@wpscan.com",
|
||||
"published": "2024-07-13T06:15:04.617",
|
||||
"lastModified": "2024-07-13T06:15:04.617",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The wp-affiliate-platform WordPress plugin before 6.5.1 does not have CSRF check in some places, and is missing sanitisation as well as escaping, which could allow attackers to make logged in admin add Stored XSS payloads via a CSRF attack"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://wpscan.com/vulnerability/a601a267-e781-439f-9c76-b4c841e819e5/",
|
||||
"source": "contact@wpscan.com"
|
||||
}
|
||||
]
|
||||
}
|
21
CVE-2024/CVE-2024-52xx/CVE-2024-5286.json
Normal file
21
CVE-2024/CVE-2024-52xx/CVE-2024-5286.json
Normal file
@ -0,0 +1,21 @@
|
||||
{
|
||||
"id": "CVE-2024-5286",
|
||||
"sourceIdentifier": "contact@wpscan.com",
|
||||
"published": "2024-07-13T06:15:04.700",
|
||||
"lastModified": "2024-07-13T06:15:04.700",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The wp-affiliate-platform WordPress plugin before 6.5.1 does not sanitise and escape a parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting which could be used against high privilege users such as admin"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://wpscan.com/vulnerability/a0b3069c-59d3-41ea-9b48-f5a4cf9ca45f/",
|
||||
"source": "contact@wpscan.com"
|
||||
}
|
||||
]
|
||||
}
|
21
CVE-2024/CVE-2024-52xx/CVE-2024-5287.json
Normal file
21
CVE-2024/CVE-2024-52xx/CVE-2024-5287.json
Normal file
@ -0,0 +1,21 @@
|
||||
{
|
||||
"id": "CVE-2024-5287",
|
||||
"sourceIdentifier": "contact@wpscan.com",
|
||||
"published": "2024-07-13T06:15:04.780",
|
||||
"lastModified": "2024-07-13T06:15:04.780",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The wp-affiliate-platform WordPress plugin before 6.5.1 does not have CSRF check in place when updating its settings, which could allow attackers to make a logged in user change them via a CSRF attack"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://wpscan.com/vulnerability/b4fd535c-a273-419d-9e2e-be1cbd822793/",
|
||||
"source": "contact@wpscan.com"
|
||||
}
|
||||
]
|
||||
}
|
21
CVE-2024/CVE-2024-54xx/CVE-2024-5442.json
Normal file
21
CVE-2024/CVE-2024-54xx/CVE-2024-5442.json
Normal file
@ -0,0 +1,21 @@
|
||||
{
|
||||
"id": "CVE-2024-5442",
|
||||
"sourceIdentifier": "contact@wpscan.com",
|
||||
"published": "2024-07-13T06:15:04.847",
|
||||
"lastModified": "2024-07-13T06:15:04.847",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The Photo Gallery, Sliders, Proofing and WordPress plugin before 3.59.3 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup)."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://wpscan.com/vulnerability/4f1fa417-f760-4132-95c2-a38d0b631263/",
|
||||
"source": "contact@wpscan.com"
|
||||
}
|
||||
]
|
||||
}
|
21
CVE-2024/CVE-2024-54xx/CVE-2024-5450.json
Normal file
21
CVE-2024/CVE-2024-54xx/CVE-2024-5450.json
Normal file
@ -0,0 +1,21 @@
|
||||
{
|
||||
"id": "CVE-2024-5450",
|
||||
"sourceIdentifier": "contact@wpscan.com",
|
||||
"published": "2024-07-13T06:15:04.927",
|
||||
"lastModified": "2024-07-13T06:15:04.927",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The Bug Library WordPress plugin before 2.1.1 does not check the file type on user-submitted bug reports, allowing an unauthenticated user to upload PHP files"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://wpscan.com/vulnerability/d91217bc-9f8f-4971-885e-89edc45b2a4d/",
|
||||
"source": "contact@wpscan.com"
|
||||
}
|
||||
]
|
||||
}
|
21
CVE-2024/CVE-2024-54xx/CVE-2024-5472.json
Normal file
21
CVE-2024/CVE-2024-54xx/CVE-2024-5472.json
Normal file
@ -0,0 +1,21 @@
|
||||
{
|
||||
"id": "CVE-2024-5472",
|
||||
"sourceIdentifier": "contact@wpscan.com",
|
||||
"published": "2024-07-13T06:15:05.000",
|
||||
"lastModified": "2024-07-13T06:15:05.000",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The WP QuickLaTeX WordPress plugin before 3.8.7 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup)."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://wpscan.com/vulnerability/dcddc2de-c32c-4f8c-8490-f3d980b05822/",
|
||||
"source": "contact@wpscan.com"
|
||||
}
|
||||
]
|
||||
}
|
21
CVE-2024/CVE-2024-55xx/CVE-2024-5575.json
Normal file
21
CVE-2024/CVE-2024-55xx/CVE-2024-5575.json
Normal file
@ -0,0 +1,21 @@
|
||||
{
|
||||
"id": "CVE-2024-5575",
|
||||
"sourceIdentifier": "contact@wpscan.com",
|
||||
"published": "2024-07-13T06:15:05.070",
|
||||
"lastModified": "2024-07-13T06:15:05.070",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The Ditty WordPress plugin before 3.1.43 does not sanitise and escape some of its blocks' settings, which could allow high privilege users such as authors to perform Cross-Site Scripting attacks even when unfiltered_html is disallowed"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://wpscan.com/vulnerability/65d1abb7-92e9-4cc4-a1d0-84985b484af3/",
|
||||
"source": "contact@wpscan.com"
|
||||
}
|
||||
]
|
||||
}
|
21
CVE-2024/CVE-2024-56xx/CVE-2024-5627.json
Normal file
21
CVE-2024/CVE-2024-56xx/CVE-2024-5627.json
Normal file
@ -0,0 +1,21 @@
|
||||
{
|
||||
"id": "CVE-2024-5627",
|
||||
"sourceIdentifier": "contact@wpscan.com",
|
||||
"published": "2024-07-13T06:15:05.170",
|
||||
"lastModified": "2024-07-13T06:15:05.170",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The Tournamatch WordPress plugin before 4.6.1 does not sanitise and escape some parameters, which could allow users with a role as low as subscriber to perform Cross-Site Scripting attacks."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://wpscan.com/vulnerability/5b18dc3d-0d5f-44e9-b22f-48ea0a9c9193/",
|
||||
"source": "contact@wpscan.com"
|
||||
}
|
||||
]
|
||||
}
|
21
CVE-2024/CVE-2024-56xx/CVE-2024-5644.json
Normal file
21
CVE-2024/CVE-2024-56xx/CVE-2024-5644.json
Normal file
@ -0,0 +1,21 @@
|
||||
{
|
||||
"id": "CVE-2024-5644",
|
||||
"sourceIdentifier": "contact@wpscan.com",
|
||||
"published": "2024-07-13T06:15:05.243",
|
||||
"lastModified": "2024-07-13T06:15:05.243",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The Tournamatch WordPress plugin before 4.6.1 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup)"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://wpscan.com/vulnerability/afe14c7a-95b2-4d3f-901a-e53ecef70d49/",
|
||||
"source": "contact@wpscan.com"
|
||||
}
|
||||
]
|
||||
}
|
21
CVE-2024/CVE-2024-57xx/CVE-2024-5713.json
Normal file
21
CVE-2024/CVE-2024-57xx/CVE-2024-5713.json
Normal file
@ -0,0 +1,21 @@
|
||||
{
|
||||
"id": "CVE-2024-5713",
|
||||
"sourceIdentifier": "contact@wpscan.com",
|
||||
"published": "2024-07-13T06:15:05.313",
|
||||
"lastModified": "2024-07-13T06:15:05.313",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The If-So Dynamic Content Personalization WordPress plugin before 1.8.0.4 does not escape the $_SERVER['REQUEST_URI'] parameter before outputting it back in an attribute, which could lead to Reflected Cross-Site Scripting in old web browsers"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://wpscan.com/vulnerability/eb3f24a7-3171-42c3-9016-e29da4f384fa/",
|
||||
"source": "contact@wpscan.com"
|
||||
}
|
||||
]
|
||||
}
|
21
CVE-2024/CVE-2024-57xx/CVE-2024-5715.json
Normal file
21
CVE-2024/CVE-2024-57xx/CVE-2024-5715.json
Normal file
@ -0,0 +1,21 @@
|
||||
{
|
||||
"id": "CVE-2024-5715",
|
||||
"sourceIdentifier": "contact@wpscan.com",
|
||||
"published": "2024-07-13T06:15:05.393",
|
||||
"lastModified": "2024-07-13T06:15:05.393",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The wp-eMember WordPress plugin before 10.6.7 does not sanitise and escape a parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting which could be used against high privilege users such as admin"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://wpscan.com/vulnerability/d86bc001-51ae-4dcc-869b-80c91251cc2e/",
|
||||
"source": "contact@wpscan.com"
|
||||
}
|
||||
]
|
||||
}
|
21
CVE-2024/CVE-2024-57xx/CVE-2024-5744.json
Normal file
21
CVE-2024/CVE-2024-57xx/CVE-2024-5744.json
Normal file
@ -0,0 +1,21 @@
|
||||
{
|
||||
"id": "CVE-2024-5744",
|
||||
"sourceIdentifier": "contact@wpscan.com",
|
||||
"published": "2024-07-13T06:15:05.457",
|
||||
"lastModified": "2024-07-13T06:15:05.457",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The wp-eMember WordPress plugin before 10.6.7 does not escape the $_SERVER['REQUEST_URI'] parameter before outputting it back in an attribute, which could lead to Reflected Cross-Site Scripting in old web browsers"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://wpscan.com/vulnerability/ba50e25c-7250-4025-a72f-74f8eb756246/",
|
||||
"source": "contact@wpscan.com"
|
||||
}
|
||||
]
|
||||
}
|
21
CVE-2024/CVE-2024-60xx/CVE-2024-6070.json
Normal file
21
CVE-2024/CVE-2024-60xx/CVE-2024-6070.json
Normal file
@ -0,0 +1,21 @@
|
||||
{
|
||||
"id": "CVE-2024-6070",
|
||||
"sourceIdentifier": "contact@wpscan.com",
|
||||
"published": "2024-07-13T06:15:05.520",
|
||||
"lastModified": "2024-07-13T06:15:05.520",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The If-So Dynamic Content Personalization WordPress plugin before 1.8.0.4 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup)"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://wpscan.com/vulnerability/97bab6cf-011c-4df4-976c-1f3252082f8f/",
|
||||
"source": "contact@wpscan.com"
|
||||
}
|
||||
]
|
||||
}
|
48
CVE-2024/CVE-2024-65xx/CVE-2024-6574.json
Normal file
48
CVE-2024/CVE-2024-65xx/CVE-2024-6574.json
Normal file
@ -0,0 +1,48 @@
|
||||
{
|
||||
"id": "CVE-2024-6574",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2024-07-13T06:15:05.587",
|
||||
"lastModified": "2024-07-13T06:15:05.587",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The Laposta plugin for WordPress is vulnerable to Full Path Disclosure in all versions up to, and including, 1.12. This is due to the plugin not preventing direct access to several test files. This makes it possible for unauthenticated attackers to retrieve the full path of the web application, which can be used to aid other attacks. The information displayed is not useful on its own, and requires another vulnerability to be present for damage to an affected website. This plugin is no longer being maintained and has been closed for downloads."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 5.3,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/browser/laposta/trunk/includes/laposta-php-1.2/examples/member/all.php",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/7632fe73-4011-4e6e-8ce7-38a9359ac259?source=cve",
|
||||
"source": "security@wordfence.com"
|
||||
}
|
||||
]
|
||||
}
|
36
README.md
36
README.md
@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
|
||||
### Last Repository Update
|
||||
|
||||
```plain
|
||||
2024-07-13T06:00:18.559644+00:00
|
||||
2024-07-13T08:00:19.263677+00:00
|
||||
```
|
||||
|
||||
### Most recent CVE Modification Timestamp synchronized with NVD
|
||||
|
||||
```plain
|
||||
2024-07-13T04:15:14.207000+00:00
|
||||
2024-07-13T06:15:05.587000+00:00
|
||||
```
|
||||
|
||||
### Last Data Feed Release
|
||||
@ -33,20 +33,44 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
|
||||
### Total Number of included CVEs
|
||||
|
||||
```plain
|
||||
256929
|
||||
256975
|
||||
```
|
||||
|
||||
### CVEs added in the last Commit
|
||||
|
||||
Recently added CVEs: `0`
|
||||
Recently added CVEs: `46`
|
||||
|
||||
- [CVE-2024-5075](CVE-2024/CVE-2024-50xx/CVE-2024-5075.json) (`2024-07-13T06:15:03.910`)
|
||||
- [CVE-2024-5076](CVE-2024/CVE-2024-50xx/CVE-2024-5076.json) (`2024-07-13T06:15:03.970`)
|
||||
- [CVE-2024-5077](CVE-2024/CVE-2024-50xx/CVE-2024-5077.json) (`2024-07-13T06:15:04.033`)
|
||||
- [CVE-2024-5079](CVE-2024/CVE-2024-50xx/CVE-2024-5079.json) (`2024-07-13T06:15:04.097`)
|
||||
- [CVE-2024-5080](CVE-2024/CVE-2024-50xx/CVE-2024-5080.json) (`2024-07-13T06:15:04.163`)
|
||||
- [CVE-2024-5151](CVE-2024/CVE-2024-51xx/CVE-2024-5151.json) (`2024-07-13T06:15:04.237`)
|
||||
- [CVE-2024-5167](CVE-2024/CVE-2024-51xx/CVE-2024-5167.json) (`2024-07-13T06:15:04.303`)
|
||||
- [CVE-2024-5280](CVE-2024/CVE-2024-52xx/CVE-2024-5280.json) (`2024-07-13T06:15:04.360`)
|
||||
- [CVE-2024-5281](CVE-2024/CVE-2024-52xx/CVE-2024-5281.json) (`2024-07-13T06:15:04.430`)
|
||||
- [CVE-2024-5282](CVE-2024/CVE-2024-52xx/CVE-2024-5282.json) (`2024-07-13T06:15:04.490`)
|
||||
- [CVE-2024-5283](CVE-2024/CVE-2024-52xx/CVE-2024-5283.json) (`2024-07-13T06:15:04.553`)
|
||||
- [CVE-2024-5284](CVE-2024/CVE-2024-52xx/CVE-2024-5284.json) (`2024-07-13T06:15:04.617`)
|
||||
- [CVE-2024-5286](CVE-2024/CVE-2024-52xx/CVE-2024-5286.json) (`2024-07-13T06:15:04.700`)
|
||||
- [CVE-2024-5287](CVE-2024/CVE-2024-52xx/CVE-2024-5287.json) (`2024-07-13T06:15:04.780`)
|
||||
- [CVE-2024-5442](CVE-2024/CVE-2024-54xx/CVE-2024-5442.json) (`2024-07-13T06:15:04.847`)
|
||||
- [CVE-2024-5450](CVE-2024/CVE-2024-54xx/CVE-2024-5450.json) (`2024-07-13T06:15:04.927`)
|
||||
- [CVE-2024-5472](CVE-2024/CVE-2024-54xx/CVE-2024-5472.json) (`2024-07-13T06:15:05.000`)
|
||||
- [CVE-2024-5575](CVE-2024/CVE-2024-55xx/CVE-2024-5575.json) (`2024-07-13T06:15:05.070`)
|
||||
- [CVE-2024-5627](CVE-2024/CVE-2024-56xx/CVE-2024-5627.json) (`2024-07-13T06:15:05.170`)
|
||||
- [CVE-2024-5644](CVE-2024/CVE-2024-56xx/CVE-2024-5644.json) (`2024-07-13T06:15:05.243`)
|
||||
- [CVE-2024-5713](CVE-2024/CVE-2024-57xx/CVE-2024-5713.json) (`2024-07-13T06:15:05.313`)
|
||||
- [CVE-2024-5715](CVE-2024/CVE-2024-57xx/CVE-2024-5715.json) (`2024-07-13T06:15:05.393`)
|
||||
- [CVE-2024-5744](CVE-2024/CVE-2024-57xx/CVE-2024-5744.json) (`2024-07-13T06:15:05.457`)
|
||||
- [CVE-2024-6070](CVE-2024/CVE-2024-60xx/CVE-2024-6070.json) (`2024-07-13T06:15:05.520`)
|
||||
- [CVE-2024-6574](CVE-2024/CVE-2024-65xx/CVE-2024-6574.json) (`2024-07-13T06:15:05.587`)
|
||||
|
||||
|
||||
### CVEs modified in the last Commit
|
||||
|
||||
Recently modified CVEs: `1`
|
||||
Recently modified CVEs: `0`
|
||||
|
||||
- [CVE-2024-6409](CVE-2024/CVE-2024-64xx/CVE-2024-6409.json) (`2024-07-13T04:15:14.207`)
|
||||
|
||||
|
||||
## Download and Usage
|
||||
|
48
_state.csv
48
_state.csv
@ -248206,6 +248206,7 @@ CVE-2024-28682,0,0,5152c6a3d71ef9256a4c100c1d46f03254aeda535ba4c982fc323d50132c0
|
||||
CVE-2024-28683,0,0,5e05ced0c6e7903250735aacec4ea0453b4627030ef2e380ed47238db8bee0a9,2024-03-13T18:15:58.530000
|
||||
CVE-2024-28684,0,0,5e8cf612c51178ce0b7db285e9479c0e753c1929aaa4babe1afc56000a57a8d5,2024-03-13T14:28:45.217000
|
||||
CVE-2024-28699,0,0,0b9a4e0b313e8b2e6ec1b9d8b9287e8c737e0019e26671b77c33fd8106965c4d,2024-07-03T01:51:45.310000
|
||||
CVE-2024-2870,1,1,2b3e07b087f226c36131af36e60237e95ea9c66e47ca2ba4875baa9a673dfca7,2024-07-13T06:15:02.310000
|
||||
CVE-2024-2871,0,0,e9558decb3cc4c54584df3eb06fe6d1bb0c12954fd3dc0d6fb0a6933455338ba,2024-04-10T13:23:38.787000
|
||||
CVE-2024-28713,0,0,beab16cae2dae6cd08028a095390b29624a6437ed474d84784c32091c71ece60,2024-03-28T20:53:20.813000
|
||||
CVE-2024-28714,0,0,05d12d8ac80645ded00d1ead25c51baa98cf4af4d5a078fc724fffec6f7925ec,2024-03-29T12:45:02.937000
|
||||
@ -249256,6 +249257,7 @@ CVE-2024-30256,0,0,a37c28d8d8386eb524a9902aeb2d5e5078617fcd2b83be17321a99057fcfd
|
||||
CVE-2024-30257,0,0,2377f0bce8e6743e82f9e83d4d3fe6517fe5f2bc87edd16371a41958f86c07f7,2024-04-18T18:25:55.267000
|
||||
CVE-2024-30258,0,0,7bff6b47870b75dcd80d7a446e9a5c2be083f8abe8fe5039c821edc8d0308500,2024-05-14T16:13:02.773000
|
||||
CVE-2024-30259,0,0,cfb184088d670901d2f79f004b40a728484e26bf4f42494ddc110d6d1831c75a,2024-05-14T16:13:02.773000
|
||||
CVE-2024-3026,1,1,985db4e6ec70b53c3e02affbdcd87ffe9009e7b8270b26cc5e8cb3f5bad5c29c,2024-07-13T06:15:02.547000
|
||||
CVE-2024-30260,0,0,82274cf73c39f8e2b6363f86535dd2dccf59e33d072f43ef5512b41a2b8a43c1,2024-04-19T23:15:11.047000
|
||||
CVE-2024-30261,0,0,166fe7ca1c2db8755b6f93e08c72588a072cb06e59fb2e806092ba03f1e2a3f5,2024-04-19T23:15:11.137000
|
||||
CVE-2024-30262,0,0,1fa25a25356aeafdd2a6a2236d1119dec7ce89cccfc2e5ccf2d342cf39a19bd5,2024-04-10T13:24:00.070000
|
||||
@ -253233,6 +253235,7 @@ CVE-2024-36305,0,0,25c6009804152d7b9979d9821e9e70f3611f20519825a820152254cf8944c
|
||||
CVE-2024-36306,0,0,b7a506dff1a266cee79d9db49c2ffc0e2570931464b091df5cbe92fde0600ec5,2024-06-11T13:54:12.057000
|
||||
CVE-2024-36307,0,0,a7967d17a652c5cbc0d13d93e7f7b355b3ac34f8807bd56af098c714342692d4,2024-07-03T02:03:05.420000
|
||||
CVE-2024-3631,0,0,52e896a80c9b063fda6224c04771bbd75f72f78e3d3636ccff4bb724fd16615d,2024-05-15T16:40:19.330000
|
||||
CVE-2024-3632,1,1,a580525ecfd3a33868f2160de373b5e50662154b29005e43e9662d0d36ac67c1,2024-07-13T06:15:02.617000
|
||||
CVE-2024-3633,0,0,56839b289684cefae86bb3dbba78c89cd0cc4141e4ff321380a2afe97575b1d3,2024-07-03T02:06:26
|
||||
CVE-2024-3634,0,0,940ae4dd6e92f9452379e49ccdcd29aa6fe6e9bda25faf9f7045c78090371ae8,2024-05-15T16:40:19.330000
|
||||
CVE-2024-36358,0,0,0b6d0d7e847e5e80626827024fae1ecc3aa20949dc775e143afeabadd5937bd0,2024-06-11T13:54:12.057000
|
||||
@ -253650,6 +253653,7 @@ CVE-2024-37090,0,0,c9337b1c06176564880c76e8afe6a14b4c2c49859c9816b2ce1bd95c9844b
|
||||
CVE-2024-37091,0,0,70ef4cb5aa59df22f5d9bec3c45f39a3b926dd43e7416671f8860a54328745e5,2024-06-24T12:57:36.513000
|
||||
CVE-2024-37092,0,0,ddf8bb50ed996f71f2c9e3e9b63faabe2c52ea8cb34e6f0fcdb53b1c55be2132,2024-06-24T19:26:54.367000
|
||||
CVE-2024-37098,0,0,e259cf517a4b26891930426aed13a9c53ee339a8d724318e920ba4b291cc4d99,2024-06-26T12:44:29.693000
|
||||
CVE-2024-3710,1,1,791fd7712f631951c6899e8403ca73c192fe073ab4f2f17c7ea866b4b51721bf,2024-07-13T06:15:02.700000
|
||||
CVE-2024-37107,0,0,e1e665b99eff19349add9836ced9fe988bed019b20e4b821ff990f5cecaee417,2024-06-28T13:15:02.503000
|
||||
CVE-2024-37109,0,0,db0889e1d7d2a1ef5dcc67a2d3dfbd32c0e2f4e2cbde02826f15e64ccae72227,2024-06-28T13:15:02.650000
|
||||
CVE-2024-3711,0,0,00ee502ae0ae8bdc802cd38eb1ec1e1356c10e1c18d766a4effd20297a066f55,2024-05-24T01:15:30.977000
|
||||
@ -253866,10 +253870,12 @@ CVE-2024-3750,0,0,803f7e301e80982b4e00371ccc1f410724a29d03fdd424fb4c54aeb0b034ff
|
||||
CVE-2024-37501,0,0,b78cf79ca308008e9008944af9630d58467f84a62f039c6a1e72ef46a8059faa,2024-07-09T18:19:14.047000
|
||||
CVE-2024-37502,0,0,d47167ecc1dd174282378f6124abb3b4511994970b4449ae0fee9b8869d0d91f,2024-07-09T18:19:14.047000
|
||||
CVE-2024-37504,0,0,2a3faccc5709d6d76660e0c6665b85f6d694f97e133b19d81d3b770a0ec3dd08,2024-07-11T13:05:54.930000
|
||||
CVE-2024-3751,1,1,dc747642c95c9bb313d20dcbc56ee4a5d8663bf9a1eb83f8fb20e39f108b0020,2024-07-13T06:15:02.773000
|
||||
CVE-2024-37513,0,0,7976ba8e13d80d009daa78a2652c36463c2f0e67f7f7a4f5972797a366211b7d,2024-07-09T18:19:14.047000
|
||||
CVE-2024-3752,0,0,06a3522f543993aef42f352f0c011207c560c2e5a1d63c9d8ccc34a87adab0ce,2024-05-06T12:44:56.377000
|
||||
CVE-2024-37520,0,0,3e7ac03ec07ed8765d851e3f933c883863d11b4c139c55a8abe614aadf329238,2024-07-09T18:19:14.047000
|
||||
CVE-2024-37528,0,0,9c6980ff0d1442c5b7fd4f5e3f8ba4ae579879f3db1ec83280b9bd21a4726381,2024-07-11T14:49:28.177000
|
||||
CVE-2024-3753,1,1,077114a2a8c8bcba915a2d740613dfcdb4108e5c720965ec726fb16edcd1a941,2024-07-13T06:15:02.840000
|
||||
CVE-2024-37532,0,0,e146e982646d7ada5c23ac27c75ae644abb706f6257f2f96ca13a6820b942f27,2024-06-20T16:07:50.417000
|
||||
CVE-2024-37535,0,0,062f7ebb43bb6d2a8ccb3332e5242404947b076c7894d1777e030e1c8e622113,2024-07-03T02:04:19.710000
|
||||
CVE-2024-37539,0,0,c1651edacf32c123789feecb68380de8605a889305b418dd39079ef654272593,2024-07-11T13:10:43.937000
|
||||
@ -254556,6 +254562,7 @@ CVE-2024-39178,0,0,941809397cc55551932a6950a6f2b95c443b08d8ccb5b2192a192df3dfe41
|
||||
CVE-2024-3918,0,0,f0312710b8f2207cc4daf3e960aa8906c7e8839f8babda55f2853fd4763a97f9,2024-05-24T01:15:30.977000
|
||||
CVE-2024-39181,0,0,6d0605e6817c6f93a8fbfbf6a2ec1902596f3fb21fee78811ca51bbb181e7fbb,2024-07-11T13:05:54.930000
|
||||
CVE-2024-39182,0,0,c4d16c6176ca0269b7678f6ff1967039bace8922a5879d34ffe12e1dd73c8773,2024-07-08T15:49:22.437000
|
||||
CVE-2024-3919,1,1,0907b484b5152b5ec0678a74ac604b9f28c921c564f31b28a301fc0f43b3cfed,2024-07-13T06:15:02.900000
|
||||
CVE-2024-3920,0,0,5dbee28fbacc5f4bbc65481ff7f645499d60469b501d304207882ca441f74491,2024-05-24T01:15:30.977000
|
||||
CVE-2024-39202,0,0,f670ff06733dd4c6d5c11488fabc4a1bb063378e53783f2f50ddc1a245b1d647,2024-07-11T16:13:13.487000
|
||||
CVE-2024-39203,0,0,18c47ac3dccac84f7f75ab68882aa989c3675ff79ff1b24a1d72e6e148699036,2024-07-09T15:00:49.997000
|
||||
@ -254771,6 +254778,8 @@ CVE-2024-39600,0,0,3f218b3b2797556a97f50f1b3db443b951be2a33b8f95e3d04ecb200803e8
|
||||
CVE-2024-3961,0,0,6646adb167e87c94860ebd5d8d983b1f971f6dc9fb8c86a5eaff8de194f86033,2024-06-21T11:22:01.687000
|
||||
CVE-2024-39614,0,0,26b2dcc9a6a6be274ddfdc54c9957bec272862e2ee62a7b674c4947a1cc7966c,2024-07-11T13:05:54.930000
|
||||
CVE-2024-3962,0,0,9de964d29f43823164300439a0e71453bbca4a5c1f5767eca51db600267798cd,2024-04-26T12:58:17.720000
|
||||
CVE-2024-3963,1,1,3b5fc63da38217b47320bc90d6e3a08d853a83e0d577bef871036cfc81678637,2024-07-13T06:15:02.967000
|
||||
CVE-2024-3964,1,1,fbfb54db29360ee1e7f21431c99e66fec89692ad8753ecb44306be0e4866f736,2024-07-13T06:15:03.030000
|
||||
CVE-2024-3965,0,0,ca98c8c8f38859cd31112b30cbcab1577d0379601171e9b943854dcc0ce8c1f6,2024-07-03T02:06:56.690000
|
||||
CVE-2024-3966,0,0,93926d7a5d68b811d92befd5d93f81a42e21603cd050116175f80a72afb025d8,2024-06-17T12:42:04.623000
|
||||
CVE-2024-39669,0,0,56d6b274e749be30b1ff4d12ff6c858882279f47b773d710e8ac61d1e37bcfa3,2024-07-03T02:05:50.580000
|
||||
@ -255217,6 +255226,7 @@ CVE-2024-4213,0,0,42ea90224045d73e2b0e3583ac57d426d05abb547b5044b93cb751055084fa
|
||||
CVE-2024-4214,0,0,20486a6e70da9590b0bf48d308272f5e2303dba1772619a1d43b68b5a571b06a,2024-05-17T18:35:35.070000
|
||||
CVE-2024-4215,0,0,2a43dd2effbd31681d2d452a71037398a8b05276042d39ca0d120b651bef66fd,2024-06-10T18:15:36.443000
|
||||
CVE-2024-4216,0,0,fba12328dbaabec1dc61fd9a4f006fbf116bfe15b54035daf7cebf0a0d91ce67,2024-07-03T02:07:14.290000
|
||||
CVE-2024-4217,1,1,25d881a713792e4ddccc015ee3946da1c3c97eef6d57d399ff21e957f4fd7764,2024-07-13T06:15:03.097000
|
||||
CVE-2024-4218,0,0,68377bf5bc219c5624001bda4aa985e5224f9f419836698a53a69f78bf595508,2024-05-30T13:15:41.297000
|
||||
CVE-2024-4219,0,0,c8079b758b715a1f50eab74fe10b87ff01903f1873291c49593cac5e499424d6,2024-06-11T17:06:50.963000
|
||||
CVE-2024-4220,0,0,d6aa05e427d916e0de9769fc4820e29f1f18a3c6387db1bee92ab09f1ecef44c,2024-06-11T17:05:35.203000
|
||||
@ -255261,8 +255271,10 @@ CVE-2024-4265,0,0,91d38fbd7b9c4ea0cd26c0f2028b5e1f8ee8c7d7e1c2c632d6b17cd2b7b696
|
||||
CVE-2024-4266,0,0,116b52a29fd0a6039b308734c72b0d2ae8aa871f2547c292da7232e2003a6f6b,2024-06-11T13:54:12.057000
|
||||
CVE-2024-4267,0,0,ce2653255d43ae5f4599b240b7efe5c0da7fc5b70a5363cdc03dcce3fe58b4ed,2024-05-24T01:15:30.977000
|
||||
CVE-2024-4268,0,0,4f824af91b8247c9f369d98ed14c3e2969490987896e9e03e4f753eb7f103f3a,2024-07-02T18:08:17.817000
|
||||
CVE-2024-4269,1,1,25ee5767be83f0ba0db68b2069bfe40cac41f446f3cd38218fb126682f3bea45,2024-07-13T06:15:03.170000
|
||||
CVE-2024-4270,0,0,dae68ba24abb4217ea4781a91ce52781cf47607cfd48397395ee3a58fe8e32d1,2024-06-17T12:42:04.623000
|
||||
CVE-2024-4271,0,0,264c116f07aa10a920ca78d5e9c58bba0fe1e2b31cb4f2cfd0a7a609be29751f,2024-07-03T02:07:19.577000
|
||||
CVE-2024-4272,1,1,13e36b2bf465861e52e28a1694322e608e3b339ad047904bb6a6566ab85281bd,2024-07-13T06:15:03.230000
|
||||
CVE-2024-4273,0,0,136233599d68a0536ba99c3313767218f535edf424c12fad350903aa42bf81fa,2024-06-04T16:57:41.053000
|
||||
CVE-2024-4274,0,0,f007ffa253f631296ec9b2caed7d1faf5b31c76fe42ca7e92fd5b40ffb00a28e,2024-06-04T16:57:41.053000
|
||||
CVE-2024-4275,0,0,70e1a00c60419d92634d3a56b566530d560ae59bb86d2c5a8041fd963d9db39d,2024-05-14T16:11:39.510000
|
||||
@ -255552,6 +255564,7 @@ CVE-2024-4597,0,0,49317a4ff12c60e573c38172dad46b390f6c4e67b3d1cb7027306fe91fd78a
|
||||
CVE-2024-4599,0,0,7a2dd9d366beb25d47b0c05043c7c832d7abfddbca078d457eae393ffc0c13b9,2024-05-07T13:39:32.710000
|
||||
CVE-2024-4600,0,0,34514a912341a00b4dd13ba9bc66d0fe1a7a1cb8661452904cea5e1c3463f08f,2024-05-07T13:39:32.710000
|
||||
CVE-2024-4601,0,0,9e1e1f008012e98662e601d1d10e65eeb89abb9d2b4ea828e06c076d042c7c66,2024-05-07T13:39:32.710000
|
||||
CVE-2024-4602,1,1,c1263cbebea4b27dbb386fa673c27b2e600a26eed9f3bd20ec3d4d48146d2495,2024-07-13T06:15:03.297000
|
||||
CVE-2024-4603,0,0,27343e0fec6f30d71575f590e2630163b637ba40d0bef4ac0d18b49a23bf2313,2024-06-21T19:15:30.783000
|
||||
CVE-2024-4604,0,0,460333a81166731e9c8a2645895ad13232c390b49b6668fbf47beefddf330f17,2024-06-27T12:47:19.847000
|
||||
CVE-2024-4605,0,0,953638d724b858b3af29d2158adc8bf0b3f03be99b297e319002baf558be51c5,2024-05-14T16:11:39.510000
|
||||
@ -255681,6 +255694,7 @@ CVE-2024-4748,0,0,0c715b5c19ebf413f66e32e0e846756d2092313152b17f8c4e7cf0a62355ae
|
||||
CVE-2024-4749,0,0,676e331864bc41907c4c80c44886e7dac480ef6dea2c29bc22838d992753d4da,2024-06-04T16:57:41.053000
|
||||
CVE-2024-4750,0,0,423585a3e250903ac62d761ecb0e0e6dc6b4649ccd4411b90275a4e6d2f87495,2024-06-04T16:57:41.053000
|
||||
CVE-2024-4751,0,0,980cee331660133759599aaa98eeae384de48fe7bcc98af4a2333b20d054b0b6,2024-06-17T12:42:04.623000
|
||||
CVE-2024-4752,1,1,9ed825881699c17bbd1615aca6091e200e12d4dbd13ebc5b5d9d42fef7786afb,2024-07-13T06:15:03.370000
|
||||
CVE-2024-4753,0,0,9f6ae95232954e10d46dcad409a1281e3c3ba7b0c7197bb1d94d6337d29a472b,2024-07-12T12:49:07.030000
|
||||
CVE-2024-4754,0,0,65f7d30a77e8c92b9ac1114b7ed7f43c32a5bfb34fe46cea0e558e1fff1e464e,2024-06-24T12:57:36.513000
|
||||
CVE-2024-4755,0,0,ca5306e45de4985a027d64d4740785092288eb6abbd1ab6d1fda3377d88d4e7e,2024-07-03T02:08:01.477000
|
||||
@ -255870,6 +255884,7 @@ CVE-2024-4973,0,0,9c5c282fbcc1cde26707e056c2d2e456f79201a7acdb54ffa8aecd59988530
|
||||
CVE-2024-4974,0,0,965d83914b39cb38aed9a7e631ff2568e898f453d4d7c747ae3461e191803c69,2024-06-04T19:20:56.237000
|
||||
CVE-2024-4975,0,0,4fcd809ef3c247b89e3904878b1809671315d1a438027411bf1e1fc09d5e8318,2024-06-04T19:20:56.337000
|
||||
CVE-2024-4976,0,0,cec1c528b9c81bb2353d630af7aeaeed80f8c396bb33272f9e3c075fa645e3ec,2024-05-16T13:03:05.353000
|
||||
CVE-2024-4977,1,1,69a8e2defb062292c9dc0a4f397f9b9f4f1c9756f1e1799054127e5d9156b068,2024-07-13T06:15:03.440000
|
||||
CVE-2024-4978,0,0,da55fe81f202b0e5309a26be3ab7a8c7197ff6f40533e0aebba1988f8f75f5d4,2024-05-31T16:03:52.247000
|
||||
CVE-2024-4980,0,0,b5b93d089fa3d245393b7cb268984100664e9544bf4ff7971c072bbdebb0992d,2024-05-22T12:46:53.887000
|
||||
CVE-2024-4983,0,0,49f1cb0f5f1d6955f366dda654a5436de910210a329601fe7472776ed46f30ec,2024-06-27T12:47:19.847000
|
||||
@ -255884,6 +255899,7 @@ CVE-2024-4998,0,0,e12f9512d41da053bcfd5626dd0ee21afd4da3e61146c4f0c8f9da42ca3dff
|
||||
CVE-2024-4999,0,0,1bac5cc77e7ceb1bce6c078fbd59e76f5556984ef2124d365e8638bfa6b6fdfa,2024-05-16T15:44:44.683000
|
||||
CVE-2024-5000,0,0,21f44bae275ca5e7f3a45da963612f2fb705c74e44c15e2681f54ff4506e6afb,2024-06-04T16:57:41.053000
|
||||
CVE-2024-5001,0,0,bac0073c23ed28e836068e8632acf1110bc49b73246f9cff53f5a706acc4a57d,2024-06-06T14:17:35.017000
|
||||
CVE-2024-5002,1,1,da41a6c3b1ade4706dc614636aec685153acb7e40aa1e8e4bd804f1058964a8f,2024-07-13T06:15:03.500000
|
||||
CVE-2024-5003,0,0,d7f0fc1b6b7797a26bbde28f3345c21309ee3aa5cb19350abdc4f1d0ca9ec31a,2024-06-07T14:56:05.647000
|
||||
CVE-2024-5006,0,0,982820e7e91a551bd12476d9f6731c77df87e69f9a4499c2643412449b7b2aa0,2024-06-11T17:36:24
|
||||
CVE-2024-5008,0,0,2898dba519d9d217cfd3248b0ed35ab7edbdc176d5a083ab78d6d475e7126536,2024-06-26T12:44:29.693000
|
||||
@ -255902,7 +255918,11 @@ CVE-2024-5021,0,0,872edc6307495a559587b3d1d37e361f617cf9935ecc4133654cc9effee7c3
|
||||
CVE-2024-5022,0,0,106355f86b530d1586a5d339031de27a1a2312467a76eb449e8e9901150235d8,2024-05-20T13:00:34.807000
|
||||
CVE-2024-5023,0,0,974704283893df4cc9d8e0bcce8bb65ebf635268235f75f47c922033893214ce,2024-05-17T18:36:31.297000
|
||||
CVE-2024-5025,0,0,d287dc9bcba0fba1784ec3f3fe4bf65eea235ed5e6f91d741018beb442d992d7,2024-05-22T12:46:53.887000
|
||||
CVE-2024-5028,1,1,c0a83f8d003a1fce4e24da3753a0cd5fb6375a83aaafea68317fd84d200a5c46,2024-07-13T06:15:03.563000
|
||||
CVE-2024-5031,0,0,e598ebc5c9fa457f9bece560d72de6fc8851ac943a5e7908ec776eb9202f17df,2024-05-22T12:46:53.887000
|
||||
CVE-2024-5032,1,1,9b6823307734d5ffaf471cb54d738917f99101d5393108a1880028a38c5d0220,2024-07-13T06:15:03.633000
|
||||
CVE-2024-5033,1,1,23166929cf777fc2cf5f9fdd07a7c5a04c6a1161033dbdce84457b5705948ac3,2024-07-13T06:15:03.707000
|
||||
CVE-2024-5034,1,1,dab8cc3de2ab05c5dccde0e8009a648e0032610ed8cb55da0871b07f4291107b,2024-07-13T06:15:03.780000
|
||||
CVE-2024-5035,0,0,04b94f66274e3d3d22c52a6f453c8b285ab22579cfad76ef028d6a110e1aa148,2024-05-29T05:16:08.793000
|
||||
CVE-2024-5036,0,0,e3ae54d07fb41ce4fd356143d834c0744cccfcb0f7c15179bf5d5b0f79f65ca1,2024-06-20T12:43:25.663000
|
||||
CVE-2024-5037,0,0,705e1e93e01a812de5bd25f4c44eac9c4c19c3899cd946f2591d29d1577d0267,2024-07-03T17:15:05.050000
|
||||
@ -255935,6 +255955,12 @@ CVE-2024-5069,0,0,3dc695c8b89e299df0488e9d65e83af5cf3b32a39325b6a3f19785e0f56f72
|
||||
CVE-2024-5071,0,0,7523a9ad4bd89c0668c9224d08257b52394a4aa3d5c42354296fd45548ac40c6,2024-06-26T12:44:29.693000
|
||||
CVE-2024-5072,0,0,eed82a97a0ee00f59db20864a50c358c267684d10361dc2c7c81171fccc96a9c,2024-05-17T18:35:35.070000
|
||||
CVE-2024-5073,0,0,7de160448d11dc97e5a2a9338d2dd6c82b34c616c4ba587347e360e1f76b10e8,2024-05-30T13:15:41.297000
|
||||
CVE-2024-5074,1,1,dcd2f43b41606f53716d8e8198fa71008603d08f5ee0d2cd508ceb65f083d464,2024-07-13T06:15:03.840000
|
||||
CVE-2024-5075,1,1,95934ebb6e6a19db2898b46f8de4b5a456e37319a030b328e8115a4d43115400,2024-07-13T06:15:03.910000
|
||||
CVE-2024-5076,1,1,fc20a380f13c099c0bab55c99123f88f84c0c36bd86de2b17c6c3b81cc18d288,2024-07-13T06:15:03.970000
|
||||
CVE-2024-5077,1,1,3cc2daba1bfaa6791269453cb40e5fc4b93a16bff52d4b98064a50b83e8b8a26,2024-07-13T06:15:04.033000
|
||||
CVE-2024-5079,1,1,9b89547c193919ba4b174d788d5fbafcb229f2a9eba46da5ef589dcbba84e22b,2024-07-13T06:15:04.097000
|
||||
CVE-2024-5080,1,1,a95a41b43142627e234b862653a55ebd4e1c6bf3781a93cdf646a20dca28bfc9,2024-07-13T06:15:04.163000
|
||||
CVE-2024-5084,0,0,92d8976ac3f9e8cdb8733c073caf2586c8f5a42e4f2b053a805034733b1a3630,2024-05-24T01:15:30.977000
|
||||
CVE-2024-5085,0,0,e4f2e80bdbf4fc55d46c60837ef7c898ce9ad88d4ef317ea9d17542cafaf4d9d,2024-05-24T01:15:30.977000
|
||||
CVE-2024-5086,0,0,931e0bac2fddd1d3017185ad2896bc6a71c950877469373fd8fb74c0da6b675a,2024-05-29T13:02:09.280000
|
||||
@ -255997,6 +256023,7 @@ CVE-2024-5145,0,0,0acb7691362a1bc72a9e4e71d498873a314e4674d3384b4bf3903540c5103a
|
||||
CVE-2024-5147,0,0,f4d57cc5a9319b417b98271562a6c18c09e411a2e24f5685a34653839c587f1d,2024-05-22T12:46:53.887000
|
||||
CVE-2024-5149,0,0,e167f321a43176bbe51b79fcd0ea912cf6c260f7c91862b43f4c0c9d62cbbb1d,2024-06-06T14:15:01.960000
|
||||
CVE-2024-5150,0,0,b6666c6d6ac9830dd3015f5fc02fd79f0a3b63d41ee2e14f8cd76da933186cb1,2024-05-29T13:02:09.280000
|
||||
CVE-2024-5151,1,1,575b70e7bfe5086920b22641f95acfd3710f73d3a299da068b627cc26bfb9c48,2024-07-13T06:15:04.237000
|
||||
CVE-2024-5152,0,0,897a950e1a56cf66b3762a0b7d02348f108b131c1556072d1a2c46cab20012e4,2024-06-06T14:17:35.017000
|
||||
CVE-2024-5153,0,0,828bf0d922f71aaeb9a620d2a28fca02e54e4a39590cf3792a194a4a5970d881,2024-06-06T14:17:35.017000
|
||||
CVE-2024-5154,0,0,0900f3ffde48a737774e31da15c4bd85a62398198c843c819abf1f8f6c6973c9,2024-06-27T05:15:51.567000
|
||||
@ -256011,6 +256038,7 @@ CVE-2024-5162,0,0,d15fa704d37693972ec8048da97de07e102beeb78dcaeaa088ebcc9b6b634f
|
||||
CVE-2024-5163,0,0,bdc81db4ac58629f980356520760931bcc42aa23cfccd4fdeb3934ec7b891de9,2024-07-03T02:08:37.670000
|
||||
CVE-2024-5165,0,0,1249b447729c1b58db4dd874ebf3238410613919325ce73c31963c57eb2e607f,2024-05-24T01:15:30.977000
|
||||
CVE-2024-5166,0,0,acd04bdcb3927ae2fc6875213ce44649287d9e14ecc961e10fc982fe1f8beeeb,2024-05-22T18:59:20.240000
|
||||
CVE-2024-5167,1,1,c314f80b95f205b735f4654c3b8eb7f41d481722cd6e84bd5c3c512290d615a1,2024-07-13T06:15:04.303000
|
||||
CVE-2024-5168,0,0,306ce12eec3dfa604048647f5d45c62ae3c9962c8122be3c41030f354ed300c2,2024-05-24T01:15:30.977000
|
||||
CVE-2024-5169,0,0,b1ca0b7cc98949f62453afcab28e83911d364c4494efe1f6507425f7cbc51120,2024-06-26T12:44:29.693000
|
||||
CVE-2024-5171,0,0,527a4a17adce934d1b4f4bf563487c5773fb7d5bb5e41f4824c0714e13ba1e90,2024-06-21T13:15:12.973000
|
||||
@ -256105,6 +256133,13 @@ CVE-2024-5276,0,0,d26b15babe17aac13cc613675e4c4ad8d9ecb0a2798444e0b74aa892858078
|
||||
CVE-2024-5277,0,0,08c2f56d5f9c6263336a67bd47c4fa52288bb09bcb2d8aeff245d6d39899edcf,2024-06-07T14:56:05.647000
|
||||
CVE-2024-5278,0,0,ba4b6329b00a48ecb03cef9d2f0cd09adc7cfa79e9cd9e8eb891a1136335fb69,2024-06-07T14:56:05.647000
|
||||
CVE-2024-5279,0,0,1f630d4d53c39cf2174e2a1edce8e1a5ead56a314739580d23644f8e4fedef07,2024-06-04T19:21:04.240000
|
||||
CVE-2024-5280,1,1,d04713398c318d8f6f2743eb0b8be98fb79b4f4107a37c7b80b7a099871fd9cd,2024-07-13T06:15:04.360000
|
||||
CVE-2024-5281,1,1,2d914b20c8419d1e4141d831985d48a6766bb3ce13b135fd71d14caaf2d16332,2024-07-13T06:15:04.430000
|
||||
CVE-2024-5282,1,1,709866e1aad7666f7e530c99fa38093f0247abfb71abd228fdcb0bd86cb343e6,2024-07-13T06:15:04.490000
|
||||
CVE-2024-5283,1,1,14f6ef6eb599eef20ae25c736cb62de53bbd5886b5b2c028e7c85155f1dec868,2024-07-13T06:15:04.553000
|
||||
CVE-2024-5284,1,1,de28ea14ee234edd7f918c014920493f54f2a1f63a20c26817a44e4a237dd964,2024-07-13T06:15:04.617000
|
||||
CVE-2024-5286,1,1,043437eafc4cfcc9b332e36e963961e86fc5087d5a70ae79f06f52ac9f0d2b03,2024-07-13T06:15:04.700000
|
||||
CVE-2024-5287,1,1,beb0faf49c30ff920730a15a6d9dcbe58d0d9ca5abefaa5119dde828b4608b1d,2024-07-13T06:15:04.780000
|
||||
CVE-2024-5289,0,0,a02da373ddf627c39a88f09ba37230dcf191b29c84a32613f97fcb834cd9c524,2024-06-28T13:13:36.980000
|
||||
CVE-2024-5291,0,0,e2fc6f2196c0b027b818fde218df99cf43b38b5676cf49b77deeb1aa303d7e78,2024-05-24T01:15:30.977000
|
||||
CVE-2024-5292,0,0,07f972c0f93c6f07c6e8e023cab22706ed8252620d55ba7ae2411117029231e5,2024-05-24T01:15:30.977000
|
||||
@ -256235,11 +256270,13 @@ CVE-2024-5437,0,0,551b020f0044e3ab584c14f08f0984900b4bc26534c92382eb6ac2bb660708
|
||||
CVE-2024-5438,0,0,b27637930797cbba2af64a5218ab07d5b0a2d8c36c1ae10d453afe4fa1e1f2e0,2024-06-11T18:26:45.147000
|
||||
CVE-2024-5439,0,0,d933d33f15def11b210f94c43e434fbcbcedf874aa4bf1c51db16a3b591b2644,2024-06-11T17:35:43.313000
|
||||
CVE-2024-5441,0,0,a7bb50aeb84e17ae0f6968b8ffc04aee2cb8a84b24c26594cbc0250db6319333,2024-07-09T18:19:14.047000
|
||||
CVE-2024-5442,1,1,afe1e5640210c90ad6da05924222da61a8bffbc08dadcf30e815cb17a780e98e,2024-07-13T06:15:04.847000
|
||||
CVE-2024-5443,0,0,925856e128685c50d1cb7d9e876369e7979bded1a2c53610b230353ba1bb3f2d,2024-06-24T12:57:36.513000
|
||||
CVE-2024-5444,0,0,df6c64937a0a680b450e4731b07b240fc0d70d09b5799de50b3fbc75e0e9e8e3,2024-07-12T16:12:04.690000
|
||||
CVE-2024-5447,0,0,3cca7aa92fc6065f540e9581ce89048750b9301e8e5f09fe0c757aeff208842b,2024-07-03T02:08:56.630000
|
||||
CVE-2024-5448,0,0,3b8c50d4d9750a6fd624a54dda421d4d7914d50ce40345ec2ba734a9201fe3ae,2024-07-03T02:08:56.850000
|
||||
CVE-2024-5449,0,0,98f03fd41a859602711a787e6c6738ac5b4c6552335bab31c9f953ba2b79cc72,2024-06-06T14:17:35.017000
|
||||
CVE-2024-5450,1,1,a30067463da79743f04e83d4fd311e0aeac3440f8788fcaf72039c9d1a29e1ec,2024-07-13T06:15:04.927000
|
||||
CVE-2024-5451,0,0,0dc9e04d41f05345ae465cb541cb585eb35309652e769d3d8446d539c07ab3f0,2024-06-25T18:50:42.040000
|
||||
CVE-2024-5452,0,0,27a87c5d81b8c2c688ae4d039463a5b6ff5c5d7de26437cd334595b44d7597a4,2024-06-07T14:56:05.647000
|
||||
CVE-2024-5453,0,0,f53a0f7c14e91f56fc73f4b75f7a3c7cc751f83b7f0078edb3a1d42587e45496,2024-06-11T17:34:52.263000
|
||||
@ -256255,6 +256292,7 @@ CVE-2024-5465,0,0,9b677e9ed42136d68b443cf9dc4afa859310d29bdd1dad1920c040ce3c57d3
|
||||
CVE-2024-5468,0,0,2bc9c38a1a2994a4c4ceddf0376e8b3ff5412f95fe840378ab4577710a81e066,2024-06-13T18:36:09.010000
|
||||
CVE-2024-5469,0,0,a6ac25b89021bcbe477171d4304d10733bc198409739b73a4d379d6ba636b5b0,2024-06-17T12:42:04.623000
|
||||
CVE-2024-5470,0,0,6ad8fffdbc9fc3c2ca94bc381d3be223e310676e26148212c497e243b6c17473,2024-07-12T16:52:52.883000
|
||||
CVE-2024-5472,1,1,8fad43828e0bba901795ded0eb6372b4078fd8d176d43e12dda426d7b9b2d12e,2024-07-13T06:15:05
|
||||
CVE-2024-5473,0,0,7a9289264d1a834c0b8e9151c353ddcb7a22a22f6b7d360897c02053aaaeb88c,2024-07-03T02:08:57.860000
|
||||
CVE-2024-5475,0,0,e09a66bd4d026df38a62a9d0642b82f2a5b9bf49c6a2d9e0e1e141414790fdd3,2024-07-03T02:08:58.050000
|
||||
CVE-2024-5478,0,0,cbce39d40f4102e26dfaf35e6a6b20bf349245ad3d94d864b4543f6f43a9d245,2024-06-07T14:56:05.647000
|
||||
@ -256327,6 +256365,7 @@ CVE-2024-5570,0,0,752c5aec7899d5cf3a8e3335b609e2b612878d2e224e641cf0205f3f8bec40
|
||||
CVE-2024-5571,0,0,105c4e644019eeccf72c6e63813cdc36601b1b9a7e3cba5bc172df86631261e6,2024-06-11T17:29:03.277000
|
||||
CVE-2024-5573,0,0,51a9ffd3da1267c4eef69596ac09c3dbea287270e0762cf7f98d2ed1f452fbf5,2024-06-26T12:44:29.693000
|
||||
CVE-2024-5574,0,0,3e624f806d94dcff352fde1d5be73aa27a333a70d66ed500b1d4bd0c17214488,2024-06-20T12:44:01.637000
|
||||
CVE-2024-5575,1,1,15a319da6102433179cb7de936fb4ded42043cda3b3019c5c48a80ff2c9299f5,2024-07-13T06:15:05.070000
|
||||
CVE-2024-5577,0,0,0394e112329dfafbe6884a2484f7873076e1a8201ddc51d40c9b2393b5d88276,2024-06-17T12:42:04.623000
|
||||
CVE-2024-5584,0,0,612eacfcf6c3fd3d6fdd0ff2c66e496cc817b02568ea9f69c40277bbc0300578,2024-06-11T13:54:12.057000
|
||||
CVE-2024-5585,0,0,7ca8acd7f48a83dc2f9c7f2dbf799bd4542c4abbbf9453c8a4fa401160a3a849,2024-06-13T04:15:17.407000
|
||||
@ -256350,6 +256389,7 @@ CVE-2024-5613,0,0,7e758f60ff4a249ae3d985d91b4f3417dc42ff70d8507f5e072b9cf0ad6144
|
||||
CVE-2024-5615,0,0,d715351de069ee256cfd127ce22346136f76094dbd1f6f173b336f3c2cdc9c0f,2024-06-11T17:55:16.103000
|
||||
CVE-2024-5616,0,0,5078c1aa917db98652cc6ffd2b310b244194da0fcbabfd9d4ed8ccf7b99de509,2024-07-08T15:49:22.437000
|
||||
CVE-2024-5626,0,0,7932ffd73aaf78514b606728bf1a761d189d38c2a5a283b9b4110e01ed2b4d16,2024-07-12T12:49:07.030000
|
||||
CVE-2024-5627,1,1,66070f4345a89fbce91264e434553655270bf1e2ea5355263f1edcb80e716e1b,2024-07-13T06:15:05.170000
|
||||
CVE-2024-5629,0,0,20478b62dd0cd666624f11f2e5a11c22a9915feb481805651583fe7db0518c7b,2024-06-18T18:31:05.663000
|
||||
CVE-2024-5631,0,0,25836c7f267b9208b846f73ed3ce84976cc46a5e11e6627f730b2265da803c8d,2024-07-09T21:15:15.520000
|
||||
CVE-2024-5632,0,0,18c64f64f8d77f06a181388a24f5be7d454b8919234aa93ebe8fa802fed4ac14,2024-07-10T17:15:12.517000
|
||||
@ -256363,6 +256403,7 @@ CVE-2024-5639,0,0,2322b8156dee01dfdab7b2069be6e0698e3a8613a841329b71822c874a14ae
|
||||
CVE-2024-5640,0,0,86163b3d741cee0a4e50ef8553f0c82f1f0c15bd48d022d2d250ef0f55c23f10,2024-06-07T14:56:05.647000
|
||||
CVE-2024-5641,0,0,1f23612877686d6e5143238f62dc02125c3d0a0d8a2499e0ec524473edb424e6,2024-07-05T17:14:44.840000
|
||||
CVE-2024-5642,0,0,473e29d44a01c1bd9d78a11628480be9d88df99635e7b451adc74e5ff8ecb62e,2024-07-01T14:15:05.807000
|
||||
CVE-2024-5644,1,1,c61b21cc8171b7dadeb3eededf18e8f87f0465dbeac22b33406f279577dd59af,2024-07-13T06:15:05.243000
|
||||
CVE-2024-5645,0,0,1faba0fd6e05694e3fff7011c206b3ecee3c45fddb7e6c575993af231224a181,2024-06-11T17:57:47.197000
|
||||
CVE-2024-5646,0,0,23240aeec5f40e46e6951e19eff4b72273567c29932f06ca0851d3144bb5ebaa,2024-06-13T18:36:09.013000
|
||||
CVE-2024-5648,0,0,015c05f38e8cff192a455edd246e167c4bc53044f1d944054e7ecfcb7dfdfccb,2024-07-09T18:19:14.047000
|
||||
@ -256417,7 +256458,9 @@ CVE-2024-5704,0,0,be55689131fc57547da71e8726572a7a1a86cf57932558d33666ec0b15eef9
|
||||
CVE-2024-5710,0,0,bbba5caf4cb4f465fb2a1f44424b7af778bd56d5f1b17eb3b38248b8a0397322,2024-07-01T10:15:30.183000
|
||||
CVE-2024-5711,0,0,463604f6d6d272196433a5bb7494f0542e749e8811ac98ab1c08049581f8b425,2024-07-11T21:15:12.787000
|
||||
CVE-2024-5712,0,0,6fe769ed08d1c07fa399695b2a73ebe92703dd256409ae365a8a0674e8c2dce4,2024-07-12T08:15:11.477000
|
||||
CVE-2024-5713,1,1,1bbf853429ffee7c04c67b772f8cb489adb7e09477bba9c63f4b74332264850e,2024-07-13T06:15:05.313000
|
||||
CVE-2024-5714,0,0,d09606fe85d7a014a058870c51f9ff79e6af54534c316b686a2562e2d0e92e3e,2024-06-27T19:25:12.067000
|
||||
CVE-2024-5715,1,1,a78758a828ec1f632a981415558bbe60dcb2e8575a09bab3ad3974ef885b33c4,2024-07-13T06:15:05.393000
|
||||
CVE-2024-5724,0,0,03384c71395c84af225b0ffa60ba9818c028df2b73c4ae064cd0a263a53e8317,2024-06-20T12:44:01.637000
|
||||
CVE-2024-5727,0,0,040bfa497be860fd1871f63cb27032a120406323d19a196c7488cb84bed8cd86,2024-07-03T02:09:13.520000
|
||||
CVE-2024-5728,0,0,970711b5fa2959720f2da02dc0abb41a56789d3063753f984448aaa0fb048438,2024-07-08T14:19:16.400000
|
||||
@ -256433,6 +256476,7 @@ CVE-2024-5737,0,0,d0320412366343a8bfdfa83f09ec33ad8bab76c39c727d4c2240c621c15a4f
|
||||
CVE-2024-5739,0,0,4e4cf687173db1796e93002e6527d7eafacb6ad9e3e1f9441d82638a10b1e4ca,2024-06-13T18:36:09.013000
|
||||
CVE-2024-5741,0,0,d3e87c617441ebc91021d514ecbbaffa42c181f23db631a685b052a1b8e8e820,2024-06-17T12:42:04.623000
|
||||
CVE-2024-5742,0,0,a52d500d47b6c5d306e493aed82844a67ba1ec935bd3dcc9d1575df0fba9dc97,2024-06-17T12:15:49.850000
|
||||
CVE-2024-5744,1,1,e32fae19fc4cf4faf9d51e9c38b2b538ad025c262b90c2bcc72891cbb7c8866a,2024-07-13T06:15:05.457000
|
||||
CVE-2024-5745,0,0,e6d6a2ad17b4c76965d8e06659a07345c55e76c97ae26acd6c0df2c3c7c9c9e4,2024-06-08T04:15:10.027000
|
||||
CVE-2024-5746,0,0,19c03e2378053068498e84f7ded06c9ed9f7f605893d4e6e1e00c733dd0cc75e,2024-06-21T11:22:01.687000
|
||||
CVE-2024-5750,0,0,03159524f0152f136fbf677dd96b04f6ea701d7a55e178491af9632e52209686,2024-06-18T14:15:11.383000
|
||||
@ -256639,6 +256683,7 @@ CVE-2024-6065,0,0,8dd99f4d37f301246412681f45228fac07d3ea15c1391b550b52738ce1d9d0
|
||||
CVE-2024-6066,0,0,bdecbe263c05a4772a78f07626fc1e3f9d1817cac413c3ff735f168ece871a97,2024-06-20T12:44:01.637000
|
||||
CVE-2024-6067,0,0,6728784af54ae6b64b1bb52b7887afb1ba68c7ac0e5f2ef2339910430d39d127,2024-06-20T12:44:01.637000
|
||||
CVE-2024-6069,0,0,262b48eb8c330c3b1dd3ca5015bcbc32f226a318c6d31e421e5580f86d9ea37b,2024-07-09T18:19:14.047000
|
||||
CVE-2024-6070,1,1,fda60aed20061941b31688889a84b677cfadb3b2a6748f421c0508f973978bab,2024-07-13T06:15:05.520000
|
||||
CVE-2024-6071,0,0,10e78c82267f57981fcc90e3e22358a5c4cb7401eca3480df2296481e008838c,2024-06-28T10:27:00.920000
|
||||
CVE-2024-6080,0,0,280d37fb165500fef7817a0477b29efc9416c53bd245603eb247ad266e840146,2024-06-20T20:15:20.583000
|
||||
CVE-2024-6082,0,0,fb01e1189e5a394e265b664904a3543325f650fe09e01ea1f771a4558bb8508b,2024-06-20T19:15:50.437000
|
||||
@ -256832,7 +256877,7 @@ CVE-2024-6402,0,0,795485c4534407e246daec51c1daaa33b95f6651688fed743a8fb9054cdaed
|
||||
CVE-2024-6403,0,0,e44b9cfa8d9ae367e624a8cdf179ef52ea1e98c2115d7a956299d17747a6a56b,2024-07-01T12:37:24.220000
|
||||
CVE-2024-6405,0,0,fdb62e3d2213e21f6cf3d269e158ee31cc07c01f1a5a460b466ccce5203f82ee,2024-07-01T12:37:24.220000
|
||||
CVE-2024-6407,0,0,12314028e09ddfd135bb748e0530e9ce4aee25dcaa6c2bae62524650d54b655f,2024-07-12T16:36:34.747000
|
||||
CVE-2024-6409,0,1,8fa55f802f11c77e2275f285ff83d5eaaae068922e7ae02d6ce55866bda9f452,2024-07-13T04:15:14.207000
|
||||
CVE-2024-6409,0,0,8fa55f802f11c77e2275f285ff83d5eaaae068922e7ae02d6ce55866bda9f452,2024-07-13T04:15:14.207000
|
||||
CVE-2024-6410,0,0,9db961a9e1824a35ea4ea0ac1b25800d120aafac2e5d4caf32d46e6051ad19d3,2024-07-11T13:05:54.930000
|
||||
CVE-2024-6411,0,0,47c8df8c850420fccb0a9ac1089e4a10bdc49d8ecc38cd5ac33a449b2082a491,2024-07-11T13:05:54.930000
|
||||
CVE-2024-6414,0,0,ae0d661be5f3239fdfe6f0d08030fef27c03212dc1e12675bcf532fd90369002,2024-07-01T12:37:24.220000
|
||||
@ -256888,6 +256933,7 @@ CVE-2024-6555,0,0,bf68ef8f1bd3876021fc33b504457daba53832080530806ef27f797ea5536a
|
||||
CVE-2024-6556,0,0,246920c1b32eb0a0369982110178f9a30464427865e75d42710950bf8d6bff6c,2024-07-11T13:05:54.930000
|
||||
CVE-2024-6563,0,0,1b4d88909a8afd884220e1df693026407578c717bcca7ba5cdd4e0bbbf29fb3c,2024-07-09T14:19:19.300000
|
||||
CVE-2024-6564,0,0,b381c943e4dc87d72df0560a8008d835d4542fba3e8b6a3b21a1beca0e3a3fa5,2024-07-09T14:19:14.760000
|
||||
CVE-2024-6574,1,1,d74f9bce07b499b253bd85b2f4475d81f4c23cee79d551526c81d23d427be1f1,2024-07-13T06:15:05.587000
|
||||
CVE-2024-6580,0,0,d43dfa58651574c4447e8f323f3cb1f6a00d6bdef0613d5834aefccecf968c5d,2024-07-09T18:19:14.047000
|
||||
CVE-2024-6588,0,0,67672e854c20766f2e15151fa1e111ec8310b7083a57f535c99159d2ce6e5af7,2024-07-12T12:49:07.030000
|
||||
CVE-2024-6598,0,0,2f02553b1031751a689c5bf3f9b99ef5078ca790db273edd82a84af9b7d8dd36,2024-07-09T18:19:14.047000
|
||||
|
Can't render this file because it is too large.
|
Loading…
x
Reference in New Issue
Block a user