From 60aec2f83811ccfb5c6655a088605aa8b865ef36 Mon Sep 17 00:00:00 2001 From: cad-safe-bot Date: Sat, 13 Jul 2024 08:03:14 +0000 Subject: [PATCH] Auto-Update: 2024-07-13T08:00:19.263677+00:00 --- CVE-2024/CVE-2024-28xx/CVE-2024-2870.json | 21 ++++++++++ CVE-2024/CVE-2024-30xx/CVE-2024-3026.json | 21 ++++++++++ CVE-2024/CVE-2024-36xx/CVE-2024-3632.json | 21 ++++++++++ CVE-2024/CVE-2024-37xx/CVE-2024-3710.json | 21 ++++++++++ CVE-2024/CVE-2024-37xx/CVE-2024-3751.json | 21 ++++++++++ CVE-2024/CVE-2024-37xx/CVE-2024-3753.json | 21 ++++++++++ CVE-2024/CVE-2024-39xx/CVE-2024-3919.json | 21 ++++++++++ CVE-2024/CVE-2024-39xx/CVE-2024-3963.json | 21 ++++++++++ CVE-2024/CVE-2024-39xx/CVE-2024-3964.json | 21 ++++++++++ CVE-2024/CVE-2024-42xx/CVE-2024-4217.json | 21 ++++++++++ CVE-2024/CVE-2024-42xx/CVE-2024-4269.json | 21 ++++++++++ CVE-2024/CVE-2024-42xx/CVE-2024-4272.json | 21 ++++++++++ CVE-2024/CVE-2024-46xx/CVE-2024-4602.json | 21 ++++++++++ CVE-2024/CVE-2024-47xx/CVE-2024-4752.json | 21 ++++++++++ CVE-2024/CVE-2024-49xx/CVE-2024-4977.json | 21 ++++++++++ CVE-2024/CVE-2024-50xx/CVE-2024-5002.json | 21 ++++++++++ CVE-2024/CVE-2024-50xx/CVE-2024-5028.json | 21 ++++++++++ CVE-2024/CVE-2024-50xx/CVE-2024-5032.json | 21 ++++++++++ CVE-2024/CVE-2024-50xx/CVE-2024-5033.json | 21 ++++++++++ CVE-2024/CVE-2024-50xx/CVE-2024-5034.json | 21 ++++++++++ CVE-2024/CVE-2024-50xx/CVE-2024-5074.json | 21 ++++++++++ CVE-2024/CVE-2024-50xx/CVE-2024-5075.json | 21 ++++++++++ CVE-2024/CVE-2024-50xx/CVE-2024-5076.json | 21 ++++++++++ CVE-2024/CVE-2024-50xx/CVE-2024-5077.json | 21 ++++++++++ CVE-2024/CVE-2024-50xx/CVE-2024-5079.json | 21 ++++++++++ CVE-2024/CVE-2024-50xx/CVE-2024-5080.json | 21 ++++++++++ CVE-2024/CVE-2024-51xx/CVE-2024-5151.json | 21 ++++++++++ CVE-2024/CVE-2024-51xx/CVE-2024-5167.json | 21 ++++++++++ CVE-2024/CVE-2024-52xx/CVE-2024-5280.json | 21 ++++++++++ CVE-2024/CVE-2024-52xx/CVE-2024-5281.json | 21 ++++++++++ CVE-2024/CVE-2024-52xx/CVE-2024-5282.json | 21 ++++++++++ CVE-2024/CVE-2024-52xx/CVE-2024-5283.json | 21 ++++++++++ CVE-2024/CVE-2024-52xx/CVE-2024-5284.json | 21 ++++++++++ CVE-2024/CVE-2024-52xx/CVE-2024-5286.json | 21 ++++++++++ CVE-2024/CVE-2024-52xx/CVE-2024-5287.json | 21 ++++++++++ CVE-2024/CVE-2024-54xx/CVE-2024-5442.json | 21 ++++++++++ CVE-2024/CVE-2024-54xx/CVE-2024-5450.json | 21 ++++++++++ CVE-2024/CVE-2024-54xx/CVE-2024-5472.json | 21 ++++++++++ CVE-2024/CVE-2024-55xx/CVE-2024-5575.json | 21 ++++++++++ CVE-2024/CVE-2024-56xx/CVE-2024-5627.json | 21 ++++++++++ CVE-2024/CVE-2024-56xx/CVE-2024-5644.json | 21 ++++++++++ CVE-2024/CVE-2024-57xx/CVE-2024-5713.json | 21 ++++++++++ CVE-2024/CVE-2024-57xx/CVE-2024-5715.json | 21 ++++++++++ CVE-2024/CVE-2024-57xx/CVE-2024-5744.json | 21 ++++++++++ CVE-2024/CVE-2024-60xx/CVE-2024-6070.json | 21 ++++++++++ CVE-2024/CVE-2024-65xx/CVE-2024-6574.json | 48 +++++++++++++++++++++++ README.md | 36 ++++++++++++++--- _state.csv | 48 ++++++++++++++++++++++- 48 files changed, 1070 insertions(+), 7 deletions(-) create mode 100644 CVE-2024/CVE-2024-28xx/CVE-2024-2870.json create mode 100644 CVE-2024/CVE-2024-30xx/CVE-2024-3026.json create mode 100644 CVE-2024/CVE-2024-36xx/CVE-2024-3632.json create mode 100644 CVE-2024/CVE-2024-37xx/CVE-2024-3710.json create mode 100644 CVE-2024/CVE-2024-37xx/CVE-2024-3751.json create mode 100644 CVE-2024/CVE-2024-37xx/CVE-2024-3753.json create mode 100644 CVE-2024/CVE-2024-39xx/CVE-2024-3919.json create mode 100644 CVE-2024/CVE-2024-39xx/CVE-2024-3963.json create mode 100644 CVE-2024/CVE-2024-39xx/CVE-2024-3964.json create mode 100644 CVE-2024/CVE-2024-42xx/CVE-2024-4217.json create mode 100644 CVE-2024/CVE-2024-42xx/CVE-2024-4269.json create mode 100644 CVE-2024/CVE-2024-42xx/CVE-2024-4272.json create mode 100644 CVE-2024/CVE-2024-46xx/CVE-2024-4602.json create mode 100644 CVE-2024/CVE-2024-47xx/CVE-2024-4752.json create mode 100644 CVE-2024/CVE-2024-49xx/CVE-2024-4977.json create mode 100644 CVE-2024/CVE-2024-50xx/CVE-2024-5002.json create mode 100644 CVE-2024/CVE-2024-50xx/CVE-2024-5028.json create mode 100644 CVE-2024/CVE-2024-50xx/CVE-2024-5032.json create mode 100644 CVE-2024/CVE-2024-50xx/CVE-2024-5033.json create mode 100644 CVE-2024/CVE-2024-50xx/CVE-2024-5034.json create mode 100644 CVE-2024/CVE-2024-50xx/CVE-2024-5074.json create mode 100644 CVE-2024/CVE-2024-50xx/CVE-2024-5075.json create mode 100644 CVE-2024/CVE-2024-50xx/CVE-2024-5076.json create mode 100644 CVE-2024/CVE-2024-50xx/CVE-2024-5077.json create mode 100644 CVE-2024/CVE-2024-50xx/CVE-2024-5079.json create mode 100644 CVE-2024/CVE-2024-50xx/CVE-2024-5080.json create mode 100644 CVE-2024/CVE-2024-51xx/CVE-2024-5151.json create mode 100644 CVE-2024/CVE-2024-51xx/CVE-2024-5167.json create mode 100644 CVE-2024/CVE-2024-52xx/CVE-2024-5280.json create mode 100644 CVE-2024/CVE-2024-52xx/CVE-2024-5281.json create mode 100644 CVE-2024/CVE-2024-52xx/CVE-2024-5282.json create mode 100644 CVE-2024/CVE-2024-52xx/CVE-2024-5283.json create mode 100644 CVE-2024/CVE-2024-52xx/CVE-2024-5284.json create mode 100644 CVE-2024/CVE-2024-52xx/CVE-2024-5286.json create mode 100644 CVE-2024/CVE-2024-52xx/CVE-2024-5287.json create mode 100644 CVE-2024/CVE-2024-54xx/CVE-2024-5442.json create mode 100644 CVE-2024/CVE-2024-54xx/CVE-2024-5450.json create mode 100644 CVE-2024/CVE-2024-54xx/CVE-2024-5472.json create mode 100644 CVE-2024/CVE-2024-55xx/CVE-2024-5575.json create mode 100644 CVE-2024/CVE-2024-56xx/CVE-2024-5627.json create mode 100644 CVE-2024/CVE-2024-56xx/CVE-2024-5644.json create mode 100644 CVE-2024/CVE-2024-57xx/CVE-2024-5713.json create mode 100644 CVE-2024/CVE-2024-57xx/CVE-2024-5715.json create mode 100644 CVE-2024/CVE-2024-57xx/CVE-2024-5744.json create mode 100644 CVE-2024/CVE-2024-60xx/CVE-2024-6070.json create mode 100644 CVE-2024/CVE-2024-65xx/CVE-2024-6574.json diff --git a/CVE-2024/CVE-2024-28xx/CVE-2024-2870.json b/CVE-2024/CVE-2024-28xx/CVE-2024-2870.json new file mode 100644 index 00000000000..98e0f004a92 --- /dev/null +++ b/CVE-2024/CVE-2024-28xx/CVE-2024-2870.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2024-2870", + "sourceIdentifier": "contact@wpscan.com", + "published": "2024-07-13T06:15:02.310", + "lastModified": "2024-07-13T06:15:02.310", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "The socialdriver-framework WordPress plugin before 2024.04.30 does not sanitise and escape a parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting which could be used against high privilege users such as admin" + } + ], + "metrics": {}, + "references": [ + { + "url": "https://wpscan.com/vulnerability/688522d2-ee28-44f8-828d-352f06e43885/", + "source": "contact@wpscan.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-30xx/CVE-2024-3026.json b/CVE-2024/CVE-2024-30xx/CVE-2024-3026.json new file mode 100644 index 00000000000..c0e054c205c --- /dev/null +++ b/CVE-2024/CVE-2024-30xx/CVE-2024-3026.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2024-3026", + "sourceIdentifier": "contact@wpscan.com", + "published": "2024-07-13T06:15:02.547", + "lastModified": "2024-07-13T06:15:02.547", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "The WordPress Button Plugin MaxButtons WordPress plugin before 9.7.8 does not sanitise and escape some parameters, which could allow users with a role as low as editor to perform Cross-Site Scripting attacks" + } + ], + "metrics": {}, + "references": [ + { + "url": "https://wpscan.com/vulnerability/aba9d8a5-20a7-49e5-841c-9cfcb9bc6144/", + "source": "contact@wpscan.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-36xx/CVE-2024-3632.json b/CVE-2024/CVE-2024-36xx/CVE-2024-3632.json new file mode 100644 index 00000000000..beb66b5a4af --- /dev/null +++ b/CVE-2024/CVE-2024-36xx/CVE-2024-3632.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2024-3632", + "sourceIdentifier": "contact@wpscan.com", + "published": "2024-07-13T06:15:02.617", + "lastModified": "2024-07-13T06:15:02.617", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "The Smart Image Gallery WordPress plugin before 1.0.19 does not have CSRF check in place when updating its settings, which could allow attackers to make a logged in admin change them via a CSRF attack" + } + ], + "metrics": {}, + "references": [ + { + "url": "https://wpscan.com/vulnerability/9b11682d-4705-4595-943f-0fa093d0b644/", + "source": "contact@wpscan.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-37xx/CVE-2024-3710.json b/CVE-2024/CVE-2024-37xx/CVE-2024-3710.json new file mode 100644 index 00000000000..ca79a919c7d --- /dev/null +++ b/CVE-2024/CVE-2024-37xx/CVE-2024-3710.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2024-3710", + "sourceIdentifier": "contact@wpscan.com", + "published": "2024-07-13T06:15:02.700", + "lastModified": "2024-07-13T06:15:02.700", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "The Image Photo Gallery Final Tiles Grid WordPress plugin before 3.6.0 does not validate and escape some of its shortcode attributes before outputting them back in the page, which could allow users with a role as low as contributor to perform Stored Cross-Site Scripting attacks which could be used against high privilege users such as admin" + } + ], + "metrics": {}, + "references": [ + { + "url": "https://wpscan.com/vulnerability/bde10913-4f7e-4590-86eb-33bfa904f95f/", + "source": "contact@wpscan.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-37xx/CVE-2024-3751.json b/CVE-2024/CVE-2024-37xx/CVE-2024-3751.json new file mode 100644 index 00000000000..86ca06e6479 --- /dev/null +++ b/CVE-2024/CVE-2024-37xx/CVE-2024-3751.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2024-3751", + "sourceIdentifier": "contact@wpscan.com", + "published": "2024-07-13T06:15:02.773", + "lastModified": "2024-07-13T06:15:02.773", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "The Seriously Simple Podcasting WordPress plugin before 3.3.0 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup)" + } + ], + "metrics": {}, + "references": [ + { + "url": "https://wpscan.com/vulnerability/1c684b05-2545-4fa5-ba9e-91d8b8f725ac/", + "source": "contact@wpscan.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-37xx/CVE-2024-3753.json b/CVE-2024/CVE-2024-37xx/CVE-2024-3753.json new file mode 100644 index 00000000000..df1c9193cc5 --- /dev/null +++ b/CVE-2024/CVE-2024-37xx/CVE-2024-3753.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2024-3753", + "sourceIdentifier": "contact@wpscan.com", + "published": "2024-07-13T06:15:02.840", + "lastModified": "2024-07-13T06:15:02.840", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "The Hostel WordPress plugin before 1.1.5.3 does not sanitise and escape a parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting which could be used against high privilege users such as admin" + } + ], + "metrics": {}, + "references": [ + { + "url": "https://wpscan.com/vulnerability/e140e109-4176-4b26-bf63-198262a31409/", + "source": "contact@wpscan.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-39xx/CVE-2024-3919.json b/CVE-2024/CVE-2024-39xx/CVE-2024-3919.json new file mode 100644 index 00000000000..85a8411eecb --- /dev/null +++ b/CVE-2024/CVE-2024-39xx/CVE-2024-3919.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2024-3919", + "sourceIdentifier": "contact@wpscan.com", + "published": "2024-07-13T06:15:02.900", + "lastModified": "2024-07-13T06:15:02.900", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "The OpenPGP Form Encryption for WordPress plugin before 1.5.1 does not validate and escape some of its shortcode attributes before outputting them back in a page/post where the shortcode is embed, which could allow users with the contributor role and above to perform Stored Cross-Site Scripting attacks." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://wpscan.com/vulnerability/4e38c7d9-5b6a-4dfc-8f22-3ff30565ce43/", + "source": "contact@wpscan.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-39xx/CVE-2024-3963.json b/CVE-2024/CVE-2024-39xx/CVE-2024-3963.json new file mode 100644 index 00000000000..2fad10d6e57 --- /dev/null +++ b/CVE-2024/CVE-2024-39xx/CVE-2024-3963.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2024-3963", + "sourceIdentifier": "contact@wpscan.com", + "published": "2024-07-13T06:15:02.967", + "lastModified": "2024-07-13T06:15:02.967", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "The Giveaways and Contests by RafflePress WordPress plugin before 1.12.14 does not sanitise and escape some parameters, which could allow users with a role as low as editor to perform Cross-Site Scripting attacks" + } + ], + "metrics": {}, + "references": [ + { + "url": "https://wpscan.com/vulnerability/827d738e-5369-431e-8438-b5c4d8c1f8f1/", + "source": "contact@wpscan.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-39xx/CVE-2024-3964.json b/CVE-2024/CVE-2024-39xx/CVE-2024-3964.json new file mode 100644 index 00000000000..2cc23af6e8e --- /dev/null +++ b/CVE-2024/CVE-2024-39xx/CVE-2024-3964.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2024-3964", + "sourceIdentifier": "contact@wpscan.com", + "published": "2024-07-13T06:15:03.030", + "lastModified": "2024-07-13T06:15:03.030", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "The Product Enquiry for WooCommerce WordPress plugin before 3.1.8 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup)" + } + ], + "metrics": {}, + "references": [ + { + "url": "https://wpscan.com/vulnerability/ff468772-3e6a-439c-a4d7-94bd2ce1a964/", + "source": "contact@wpscan.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-42xx/CVE-2024-4217.json b/CVE-2024/CVE-2024-42xx/CVE-2024-4217.json new file mode 100644 index 00000000000..c1f1ad86dc2 --- /dev/null +++ b/CVE-2024/CVE-2024-42xx/CVE-2024-4217.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2024-4217", + "sourceIdentifier": "contact@wpscan.com", + "published": "2024-07-13T06:15:03.097", + "lastModified": "2024-07-13T06:15:03.097", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "The shortcodes-ultimate-pro WordPress plugin before 7.1.5 does not properly escape some of its shortcodes' settings, making it possible for attackers with a Contributor account to conduct Stored XSS attacks." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://wpscan.com/vulnerability/55cb43bf-7c8f-4df7-b4de-bf2bb1c2766d/", + "source": "contact@wpscan.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-42xx/CVE-2024-4269.json b/CVE-2024/CVE-2024-42xx/CVE-2024-4269.json new file mode 100644 index 00000000000..797d22cafef --- /dev/null +++ b/CVE-2024/CVE-2024-42xx/CVE-2024-4269.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2024-4269", + "sourceIdentifier": "contact@wpscan.com", + "published": "2024-07-13T06:15:03.170", + "lastModified": "2024-07-13T06:15:03.170", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "The SVG Block WordPress plugin before 1.1.20 does not sanitize SVG file contents, which enables users with at least the author role to SVG with malicious JavaScript to conduct Stored XSS attacks." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://wpscan.com/vulnerability/8aae7aa1-6170-45d8-903f-8520913276da/", + "source": "contact@wpscan.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-42xx/CVE-2024-4272.json b/CVE-2024/CVE-2024-42xx/CVE-2024-4272.json new file mode 100644 index 00000000000..3a968ea22ef --- /dev/null +++ b/CVE-2024/CVE-2024-42xx/CVE-2024-4272.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2024-4272", + "sourceIdentifier": "contact@wpscan.com", + "published": "2024-07-13T06:15:03.230", + "lastModified": "2024-07-13T06:15:03.230", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "The Support SVG WordPress plugin before 1.1.0 does not sanitize SVG file contents, which enables users with at least the author role to SVG with malicious JavaScript to conduct Stored XSS attacks." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://wpscan.com/vulnerability/ed1b1540-a0e2-434e-8769-9532c3ed5e31/", + "source": "contact@wpscan.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-46xx/CVE-2024-4602.json b/CVE-2024/CVE-2024-46xx/CVE-2024-4602.json new file mode 100644 index 00000000000..7373cce3fcf --- /dev/null +++ b/CVE-2024/CVE-2024-46xx/CVE-2024-4602.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2024-4602", + "sourceIdentifier": "contact@wpscan.com", + "published": "2024-07-13T06:15:03.297", + "lastModified": "2024-07-13T06:15:03.297", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "The Embed Peertube Playlist WordPress plugin before 1.10 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup)" + } + ], + "metrics": {}, + "references": [ + { + "url": "https://wpscan.com/vulnerability/bc15bac7-8241-472a-a7c1-58070714501d/", + "source": "contact@wpscan.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-47xx/CVE-2024-4752.json b/CVE-2024/CVE-2024-47xx/CVE-2024-4752.json new file mode 100644 index 00000000000..5fab8690ba9 --- /dev/null +++ b/CVE-2024/CVE-2024-47xx/CVE-2024-4752.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2024-4752", + "sourceIdentifier": "contact@wpscan.com", + "published": "2024-07-13T06:15:03.370", + "lastModified": "2024-07-13T06:15:03.370", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "The EventON WordPress plugin before 2.2.15 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup)" + } + ], + "metrics": {}, + "references": [ + { + "url": "https://wpscan.com/vulnerability/70d1f5d5-1a96-494b-9203-96a7780026da/", + "source": "contact@wpscan.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-49xx/CVE-2024-4977.json b/CVE-2024/CVE-2024-49xx/CVE-2024-4977.json new file mode 100644 index 00000000000..44b305ab437 --- /dev/null +++ b/CVE-2024/CVE-2024-49xx/CVE-2024-4977.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2024-4977", + "sourceIdentifier": "contact@wpscan.com", + "published": "2024-07-13T06:15:03.440", + "lastModified": "2024-07-13T06:15:03.440", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "The Index WP MySQL For Speed WordPress plugin before 1.4.18 does not sanitise and escape a parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting which could be used against high privilege users such as admin" + } + ], + "metrics": {}, + "references": [ + { + "url": "https://wpscan.com/vulnerability/89791a80-5cff-4a1a-8163-94b5be4081a5/", + "source": "contact@wpscan.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-50xx/CVE-2024-5002.json b/CVE-2024/CVE-2024-50xx/CVE-2024-5002.json new file mode 100644 index 00000000000..85ef08fc601 --- /dev/null +++ b/CVE-2024/CVE-2024-50xx/CVE-2024-5002.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2024-5002", + "sourceIdentifier": "contact@wpscan.com", + "published": "2024-07-13T06:15:03.500", + "lastModified": "2024-07-13T06:15:03.500", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "The User Submitted Posts WordPress plugin before 20240516 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup)" + } + ], + "metrics": {}, + "references": [ + { + "url": "https://wpscan.com/vulnerability/da09b99a-fa40-428f-80b4-0af764fd2f4f/", + "source": "contact@wpscan.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-50xx/CVE-2024-5028.json b/CVE-2024/CVE-2024-50xx/CVE-2024-5028.json new file mode 100644 index 00000000000..fa2e315c534 --- /dev/null +++ b/CVE-2024/CVE-2024-50xx/CVE-2024-5028.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2024-5028", + "sourceIdentifier": "contact@wpscan.com", + "published": "2024-07-13T06:15:03.563", + "lastModified": "2024-07-13T06:15:03.563", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "The CM WordPress Search And Replace Plugin WordPress plugin before 1.3.9 does not have CSRF checks in some places, which could allow attackers to make logged in users perform unwanted actions via CSRF attacks" + } + ], + "metrics": {}, + "references": [ + { + "url": "https://wpscan.com/vulnerability/0bae8494-7b01-4203-a4f7-ccc60efbdda7/", + "source": "contact@wpscan.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-50xx/CVE-2024-5032.json b/CVE-2024/CVE-2024-50xx/CVE-2024-5032.json new file mode 100644 index 00000000000..5e50fb49975 --- /dev/null +++ b/CVE-2024/CVE-2024-50xx/CVE-2024-5032.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2024-5032", + "sourceIdentifier": "contact@wpscan.com", + "published": "2024-07-13T06:15:03.633", + "lastModified": "2024-07-13T06:15:03.633", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "The SULly WordPress plugin before 4.3.1 does not sanitise and escape a parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting which could be used against high privilege users such as admin" + } + ], + "metrics": {}, + "references": [ + { + "url": "https://wpscan.com/vulnerability/4bb92693-23b3-4250-baee-af38b7e615e0/", + "source": "contact@wpscan.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-50xx/CVE-2024-5033.json b/CVE-2024/CVE-2024-50xx/CVE-2024-5033.json new file mode 100644 index 00000000000..044887abfa9 --- /dev/null +++ b/CVE-2024/CVE-2024-50xx/CVE-2024-5033.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2024-5033", + "sourceIdentifier": "contact@wpscan.com", + "published": "2024-07-13T06:15:03.707", + "lastModified": "2024-07-13T06:15:03.707", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "The SULly WordPress plugin before 4.3.1 does not have CSRF check in some places, and is missing sanitisation as well as escaping, which could allow attackers to make logged in admin add Stored XSS payloads via a CSRF attack" + } + ], + "metrics": {}, + "references": [ + { + "url": "https://wpscan.com/vulnerability/dd42765a-1300-453f-9835-6e646c87e496/", + "source": "contact@wpscan.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-50xx/CVE-2024-5034.json b/CVE-2024/CVE-2024-50xx/CVE-2024-5034.json new file mode 100644 index 00000000000..556bfa3f1f9 --- /dev/null +++ b/CVE-2024/CVE-2024-50xx/CVE-2024-5034.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2024-5034", + "sourceIdentifier": "contact@wpscan.com", + "published": "2024-07-13T06:15:03.780", + "lastModified": "2024-07-13T06:15:03.780", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "The SULly WordPress plugin before 4.3.1 does not have CSRF checks in some places, which could allow attackers to make logged in users perform unwanted actions via CSRF attacks" + } + ], + "metrics": {}, + "references": [ + { + "url": "https://wpscan.com/vulnerability/31f3a3b5-07bf-4cb3-b358-8488808733e0/", + "source": "contact@wpscan.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-50xx/CVE-2024-5074.json b/CVE-2024/CVE-2024-50xx/CVE-2024-5074.json new file mode 100644 index 00000000000..d133065a248 --- /dev/null +++ b/CVE-2024/CVE-2024-50xx/CVE-2024-5074.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2024-5074", + "sourceIdentifier": "contact@wpscan.com", + "published": "2024-07-13T06:15:03.840", + "lastModified": "2024-07-13T06:15:03.840", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "The wp-eMember WordPress plugin before 10.6.6 does not sanitise and escape a parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting which could be used against high privilege users such as admin" + } + ], + "metrics": {}, + "references": [ + { + "url": "https://wpscan.com/vulnerability/174a2ba8-0215-480f-93ec-83ebc4a3200e/", + "source": "contact@wpscan.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-50xx/CVE-2024-5075.json b/CVE-2024/CVE-2024-50xx/CVE-2024-5075.json new file mode 100644 index 00000000000..685e72dcca4 --- /dev/null +++ b/CVE-2024/CVE-2024-50xx/CVE-2024-5075.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2024-5075", + "sourceIdentifier": "contact@wpscan.com", + "published": "2024-07-13T06:15:03.910", + "lastModified": "2024-07-13T06:15:03.910", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "The wp-eMember WordPress plugin before 10.6.6 does not sanitise and escape a parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting which could be used against high privilege users such as admin" + } + ], + "metrics": {}, + "references": [ + { + "url": "https://wpscan.com/vulnerability/b47d93d6-5511-451a-853f-c8b0fba20969/", + "source": "contact@wpscan.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-50xx/CVE-2024-5076.json b/CVE-2024/CVE-2024-50xx/CVE-2024-5076.json new file mode 100644 index 00000000000..f491f9d92b8 --- /dev/null +++ b/CVE-2024/CVE-2024-50xx/CVE-2024-5076.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2024-5076", + "sourceIdentifier": "contact@wpscan.com", + "published": "2024-07-13T06:15:03.970", + "lastModified": "2024-07-13T06:15:03.970", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "The wp-eMember WordPress plugin before 10.6.6 does not have CSRF checks in some places, which could allow attackers to make logged in users perform unwanted actions via CSRF attacks" + } + ], + "metrics": {}, + "references": [ + { + "url": "https://wpscan.com/vulnerability/01cbc841-a30f-4df5-ab7f-0c2c7469657b/", + "source": "contact@wpscan.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-50xx/CVE-2024-5077.json b/CVE-2024/CVE-2024-50xx/CVE-2024-5077.json new file mode 100644 index 00000000000..c65e1c3c36a --- /dev/null +++ b/CVE-2024/CVE-2024-50xx/CVE-2024-5077.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2024-5077", + "sourceIdentifier": "contact@wpscan.com", + "published": "2024-07-13T06:15:04.033", + "lastModified": "2024-07-13T06:15:04.033", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "The wp-eMember WordPress plugin before 10.6.6 does not have CSRF check in some places, and is missing sanitisation as well as escaping, which could allow attackers to make logged in admin add Stored XSS payloads via a CSRF attack" + } + ], + "metrics": {}, + "references": [ + { + "url": "https://wpscan.com/vulnerability/00fcbcf3-41ee-45e7-a0a9-0d46cb7ef859/", + "source": "contact@wpscan.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-50xx/CVE-2024-5079.json b/CVE-2024/CVE-2024-50xx/CVE-2024-5079.json new file mode 100644 index 00000000000..0c711abdab3 --- /dev/null +++ b/CVE-2024/CVE-2024-50xx/CVE-2024-5079.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2024-5079", + "sourceIdentifier": "contact@wpscan.com", + "published": "2024-07-13T06:15:04.097", + "lastModified": "2024-07-13T06:15:04.097", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "The wp-eMember WordPress plugin before 10.6.7 does not sanitise and escape some of the fields when members register, which allows unauthenticated users to perform Stored Cross-Site Scripting attacks" + } + ], + "metrics": {}, + "references": [ + { + "url": "https://wpscan.com/vulnerability/bdb5509e-80ab-4e47-83a4-9347796eec40/", + "source": "contact@wpscan.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-50xx/CVE-2024-5080.json b/CVE-2024/CVE-2024-50xx/CVE-2024-5080.json new file mode 100644 index 00000000000..30f02236df8 --- /dev/null +++ b/CVE-2024/CVE-2024-50xx/CVE-2024-5080.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2024-5080", + "sourceIdentifier": "contact@wpscan.com", + "published": "2024-07-13T06:15:04.163", + "lastModified": "2024-07-13T06:15:04.163", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "The wp-eMember WordPress plugin before 10.6.6 does not validate files to be uploaded, which could allow admins to upload arbitrary files such as PHP on the server" + } + ], + "metrics": {}, + "references": [ + { + "url": "https://wpscan.com/vulnerability/15f78aad-001c-4219-aa7e-46537e1357a2/", + "source": "contact@wpscan.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-51xx/CVE-2024-5151.json b/CVE-2024/CVE-2024-51xx/CVE-2024-5151.json new file mode 100644 index 00000000000..cbc1a69d415 --- /dev/null +++ b/CVE-2024/CVE-2024-51xx/CVE-2024-5151.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2024-5151", + "sourceIdentifier": "contact@wpscan.com", + "published": "2024-07-13T06:15:04.237", + "lastModified": "2024-07-13T06:15:04.237", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "The SULly WordPress plugin before 4.3.1 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup)" + } + ], + "metrics": {}, + "references": [ + { + "url": "https://wpscan.com/vulnerability/1ede4c66-9932-4ba6-bba1-0ba13f5a2f8f/", + "source": "contact@wpscan.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-51xx/CVE-2024-5167.json b/CVE-2024/CVE-2024-51xx/CVE-2024-5167.json new file mode 100644 index 00000000000..a6323dcf3d4 --- /dev/null +++ b/CVE-2024/CVE-2024-51xx/CVE-2024-5167.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2024-5167", + "sourceIdentifier": "contact@wpscan.com", + "published": "2024-07-13T06:15:04.303", + "lastModified": "2024-07-13T06:15:04.303", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "The CM Email Registration Blacklist and Whitelist WordPress plugin before 1.4.9 does not have CSRF check when adding or deleting an item from the blacklist or whitelist, which could allow attackers to make a logged in admin add or delete settings from the blacklist or whitelist menu via a CSRF attack" + } + ], + "metrics": {}, + "references": [ + { + "url": "https://wpscan.com/vulnerability/67bb5ab8-4493-4f5b-a989-41576675b61a/", + "source": "contact@wpscan.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-52xx/CVE-2024-5280.json b/CVE-2024/CVE-2024-52xx/CVE-2024-5280.json new file mode 100644 index 00000000000..916bf73ba58 --- /dev/null +++ b/CVE-2024/CVE-2024-52xx/CVE-2024-5280.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2024-5280", + "sourceIdentifier": "contact@wpscan.com", + "published": "2024-07-13T06:15:04.360", + "lastModified": "2024-07-13T06:15:04.360", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "The wp-affiliate-platform WordPress plugin before 6.5.1 does not have CSRF check in some places, and is missing sanitisation as well as escaping, which could allow attackers to make non-logged in users execute an XSS payload via a CSRF attack" + } + ], + "metrics": {}, + "references": [ + { + "url": "https://wpscan.com/vulnerability/bbc214ba-4e97-4b3a-a21b-2931a9e36973/", + "source": "contact@wpscan.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-52xx/CVE-2024-5281.json b/CVE-2024/CVE-2024-52xx/CVE-2024-5281.json new file mode 100644 index 00000000000..c61b79b075a --- /dev/null +++ b/CVE-2024/CVE-2024-52xx/CVE-2024-5281.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2024-5281", + "sourceIdentifier": "contact@wpscan.com", + "published": "2024-07-13T06:15:04.430", + "lastModified": "2024-07-13T06:15:04.430", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "The wp-affiliate-platform WordPress plugin before 6.5.1 does not sanitise and escape a parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting which could be used against high privilege users such as admin" + } + ], + "metrics": {}, + "references": [ + { + "url": "https://wpscan.com/vulnerability/3c0bdb0f-a06a-47a8-9198-a2bf2678b8f1/", + "source": "contact@wpscan.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-52xx/CVE-2024-5282.json b/CVE-2024/CVE-2024-52xx/CVE-2024-5282.json new file mode 100644 index 00000000000..57bd4b1a285 --- /dev/null +++ b/CVE-2024/CVE-2024-52xx/CVE-2024-5282.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2024-5282", + "sourceIdentifier": "contact@wpscan.com", + "published": "2024-07-13T06:15:04.490", + "lastModified": "2024-07-13T06:15:04.490", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "The wp-affiliate-platform WordPress plugin before 6.5.1 does not sanitise and escape a parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting which could be used against high privilege users such as admin" + } + ], + "metrics": {}, + "references": [ + { + "url": "https://wpscan.com/vulnerability/bf3fb97e-12fa-4b37-b28b-1771ddb5ceb1/", + "source": "contact@wpscan.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-52xx/CVE-2024-5283.json b/CVE-2024/CVE-2024-52xx/CVE-2024-5283.json new file mode 100644 index 00000000000..153fb54612e --- /dev/null +++ b/CVE-2024/CVE-2024-52xx/CVE-2024-5283.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2024-5283", + "sourceIdentifier": "contact@wpscan.com", + "published": "2024-07-13T06:15:04.553", + "lastModified": "2024-07-13T06:15:04.553", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "The wp-affiliate-platform WordPress plugin before 6.5.1 does not sanitise and escape a parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting which could be used against high privilege users such as admin" + } + ], + "metrics": {}, + "references": [ + { + "url": "https://wpscan.com/vulnerability/3e1adcd3-7c46-45e8-9e2b-2ede0d79c943/", + "source": "contact@wpscan.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-52xx/CVE-2024-5284.json b/CVE-2024/CVE-2024-52xx/CVE-2024-5284.json new file mode 100644 index 00000000000..5dd645249e9 --- /dev/null +++ b/CVE-2024/CVE-2024-52xx/CVE-2024-5284.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2024-5284", + "sourceIdentifier": "contact@wpscan.com", + "published": "2024-07-13T06:15:04.617", + "lastModified": "2024-07-13T06:15:04.617", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "The wp-affiliate-platform WordPress plugin before 6.5.1 does not have CSRF check in some places, and is missing sanitisation as well as escaping, which could allow attackers to make logged in admin add Stored XSS payloads via a CSRF attack" + } + ], + "metrics": {}, + "references": [ + { + "url": "https://wpscan.com/vulnerability/a601a267-e781-439f-9c76-b4c841e819e5/", + "source": "contact@wpscan.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-52xx/CVE-2024-5286.json b/CVE-2024/CVE-2024-52xx/CVE-2024-5286.json new file mode 100644 index 00000000000..73733c1001d --- /dev/null +++ b/CVE-2024/CVE-2024-52xx/CVE-2024-5286.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2024-5286", + "sourceIdentifier": "contact@wpscan.com", + "published": "2024-07-13T06:15:04.700", + "lastModified": "2024-07-13T06:15:04.700", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "The wp-affiliate-platform WordPress plugin before 6.5.1 does not sanitise and escape a parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting which could be used against high privilege users such as admin" + } + ], + "metrics": {}, + "references": [ + { + "url": "https://wpscan.com/vulnerability/a0b3069c-59d3-41ea-9b48-f5a4cf9ca45f/", + "source": "contact@wpscan.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-52xx/CVE-2024-5287.json b/CVE-2024/CVE-2024-52xx/CVE-2024-5287.json new file mode 100644 index 00000000000..5e4f0f0e4a5 --- /dev/null +++ b/CVE-2024/CVE-2024-52xx/CVE-2024-5287.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2024-5287", + "sourceIdentifier": "contact@wpscan.com", + "published": "2024-07-13T06:15:04.780", + "lastModified": "2024-07-13T06:15:04.780", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "The wp-affiliate-platform WordPress plugin before 6.5.1 does not have CSRF check in place when updating its settings, which could allow attackers to make a logged in user change them via a CSRF attack" + } + ], + "metrics": {}, + "references": [ + { + "url": "https://wpscan.com/vulnerability/b4fd535c-a273-419d-9e2e-be1cbd822793/", + "source": "contact@wpscan.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-54xx/CVE-2024-5442.json b/CVE-2024/CVE-2024-54xx/CVE-2024-5442.json new file mode 100644 index 00000000000..79611f0a524 --- /dev/null +++ b/CVE-2024/CVE-2024-54xx/CVE-2024-5442.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2024-5442", + "sourceIdentifier": "contact@wpscan.com", + "published": "2024-07-13T06:15:04.847", + "lastModified": "2024-07-13T06:15:04.847", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "The Photo Gallery, Sliders, Proofing and WordPress plugin before 3.59.3 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup)." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://wpscan.com/vulnerability/4f1fa417-f760-4132-95c2-a38d0b631263/", + "source": "contact@wpscan.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-54xx/CVE-2024-5450.json b/CVE-2024/CVE-2024-54xx/CVE-2024-5450.json new file mode 100644 index 00000000000..0f7f9051ef7 --- /dev/null +++ b/CVE-2024/CVE-2024-54xx/CVE-2024-5450.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2024-5450", + "sourceIdentifier": "contact@wpscan.com", + "published": "2024-07-13T06:15:04.927", + "lastModified": "2024-07-13T06:15:04.927", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "The Bug Library WordPress plugin before 2.1.1 does not check the file type on user-submitted bug reports, allowing an unauthenticated user to upload PHP files" + } + ], + "metrics": {}, + "references": [ + { + "url": "https://wpscan.com/vulnerability/d91217bc-9f8f-4971-885e-89edc45b2a4d/", + "source": "contact@wpscan.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-54xx/CVE-2024-5472.json b/CVE-2024/CVE-2024-54xx/CVE-2024-5472.json new file mode 100644 index 00000000000..753672733a2 --- /dev/null +++ b/CVE-2024/CVE-2024-54xx/CVE-2024-5472.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2024-5472", + "sourceIdentifier": "contact@wpscan.com", + "published": "2024-07-13T06:15:05.000", + "lastModified": "2024-07-13T06:15:05.000", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "The WP QuickLaTeX WordPress plugin before 3.8.7 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup)." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://wpscan.com/vulnerability/dcddc2de-c32c-4f8c-8490-f3d980b05822/", + "source": "contact@wpscan.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-55xx/CVE-2024-5575.json b/CVE-2024/CVE-2024-55xx/CVE-2024-5575.json new file mode 100644 index 00000000000..cad21343868 --- /dev/null +++ b/CVE-2024/CVE-2024-55xx/CVE-2024-5575.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2024-5575", + "sourceIdentifier": "contact@wpscan.com", + "published": "2024-07-13T06:15:05.070", + "lastModified": "2024-07-13T06:15:05.070", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "The Ditty WordPress plugin before 3.1.43 does not sanitise and escape some of its blocks' settings, which could allow high privilege users such as authors to perform Cross-Site Scripting attacks even when unfiltered_html is disallowed" + } + ], + "metrics": {}, + "references": [ + { + "url": "https://wpscan.com/vulnerability/65d1abb7-92e9-4cc4-a1d0-84985b484af3/", + "source": "contact@wpscan.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-56xx/CVE-2024-5627.json b/CVE-2024/CVE-2024-56xx/CVE-2024-5627.json new file mode 100644 index 00000000000..43d634dea96 --- /dev/null +++ b/CVE-2024/CVE-2024-56xx/CVE-2024-5627.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2024-5627", + "sourceIdentifier": "contact@wpscan.com", + "published": "2024-07-13T06:15:05.170", + "lastModified": "2024-07-13T06:15:05.170", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "The Tournamatch WordPress plugin before 4.6.1 does not sanitise and escape some parameters, which could allow users with a role as low as subscriber to perform Cross-Site Scripting attacks." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://wpscan.com/vulnerability/5b18dc3d-0d5f-44e9-b22f-48ea0a9c9193/", + "source": "contact@wpscan.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-56xx/CVE-2024-5644.json b/CVE-2024/CVE-2024-56xx/CVE-2024-5644.json new file mode 100644 index 00000000000..8392bb2233f --- /dev/null +++ b/CVE-2024/CVE-2024-56xx/CVE-2024-5644.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2024-5644", + "sourceIdentifier": "contact@wpscan.com", + "published": "2024-07-13T06:15:05.243", + "lastModified": "2024-07-13T06:15:05.243", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "The Tournamatch WordPress plugin before 4.6.1 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup)" + } + ], + "metrics": {}, + "references": [ + { + "url": "https://wpscan.com/vulnerability/afe14c7a-95b2-4d3f-901a-e53ecef70d49/", + "source": "contact@wpscan.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-57xx/CVE-2024-5713.json b/CVE-2024/CVE-2024-57xx/CVE-2024-5713.json new file mode 100644 index 00000000000..139cf73f44c --- /dev/null +++ b/CVE-2024/CVE-2024-57xx/CVE-2024-5713.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2024-5713", + "sourceIdentifier": "contact@wpscan.com", + "published": "2024-07-13T06:15:05.313", + "lastModified": "2024-07-13T06:15:05.313", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "The If-So Dynamic Content Personalization WordPress plugin before 1.8.0.4 does not escape the $_SERVER['REQUEST_URI'] parameter before outputting it back in an attribute, which could lead to Reflected Cross-Site Scripting in old web browsers" + } + ], + "metrics": {}, + "references": [ + { + "url": "https://wpscan.com/vulnerability/eb3f24a7-3171-42c3-9016-e29da4f384fa/", + "source": "contact@wpscan.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-57xx/CVE-2024-5715.json b/CVE-2024/CVE-2024-57xx/CVE-2024-5715.json new file mode 100644 index 00000000000..870a7884239 --- /dev/null +++ b/CVE-2024/CVE-2024-57xx/CVE-2024-5715.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2024-5715", + "sourceIdentifier": "contact@wpscan.com", + "published": "2024-07-13T06:15:05.393", + "lastModified": "2024-07-13T06:15:05.393", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "The wp-eMember WordPress plugin before 10.6.7 does not sanitise and escape a parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting which could be used against high privilege users such as admin" + } + ], + "metrics": {}, + "references": [ + { + "url": "https://wpscan.com/vulnerability/d86bc001-51ae-4dcc-869b-80c91251cc2e/", + "source": "contact@wpscan.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-57xx/CVE-2024-5744.json b/CVE-2024/CVE-2024-57xx/CVE-2024-5744.json new file mode 100644 index 00000000000..3fd06e8f596 --- /dev/null +++ b/CVE-2024/CVE-2024-57xx/CVE-2024-5744.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2024-5744", + "sourceIdentifier": "contact@wpscan.com", + "published": "2024-07-13T06:15:05.457", + "lastModified": "2024-07-13T06:15:05.457", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "The wp-eMember WordPress plugin before 10.6.7 does not escape the $_SERVER['REQUEST_URI'] parameter before outputting it back in an attribute, which could lead to Reflected Cross-Site Scripting in old web browsers" + } + ], + "metrics": {}, + "references": [ + { + "url": "https://wpscan.com/vulnerability/ba50e25c-7250-4025-a72f-74f8eb756246/", + "source": "contact@wpscan.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-60xx/CVE-2024-6070.json b/CVE-2024/CVE-2024-60xx/CVE-2024-6070.json new file mode 100644 index 00000000000..6c9175b03ff --- /dev/null +++ b/CVE-2024/CVE-2024-60xx/CVE-2024-6070.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2024-6070", + "sourceIdentifier": "contact@wpscan.com", + "published": "2024-07-13T06:15:05.520", + "lastModified": "2024-07-13T06:15:05.520", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "The If-So Dynamic Content Personalization WordPress plugin before 1.8.0.4 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup)" + } + ], + "metrics": {}, + "references": [ + { + "url": "https://wpscan.com/vulnerability/97bab6cf-011c-4df4-976c-1f3252082f8f/", + "source": "contact@wpscan.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-65xx/CVE-2024-6574.json b/CVE-2024/CVE-2024-65xx/CVE-2024-6574.json new file mode 100644 index 00000000000..4c174058712 --- /dev/null +++ b/CVE-2024/CVE-2024-65xx/CVE-2024-6574.json @@ -0,0 +1,48 @@ +{ + "id": "CVE-2024-6574", + "sourceIdentifier": "security@wordfence.com", + "published": "2024-07-13T06:15:05.587", + "lastModified": "2024-07-13T06:15:05.587", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "The Laposta plugin for WordPress is vulnerable to Full Path Disclosure in all versions up to, and including, 1.12. This is due to the plugin not preventing direct access to several test files. This makes it possible for unauthenticated attackers to retrieve the full path of the web application, which can be used to aid other attacks. The information displayed is not useful on its own, and requires another vulnerability to be present for damage to an affected website. This plugin is no longer being maintained and has been closed for downloads." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security@wordfence.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 5.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 + } + ] + }, + "references": [ + { + "url": "https://plugins.trac.wordpress.org/browser/laposta/trunk/includes/laposta-php-1.2/examples/member/all.php", + "source": "security@wordfence.com" + }, + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/7632fe73-4011-4e6e-8ce7-38a9359ac259?source=cve", + "source": "security@wordfence.com" + } + ] +} \ No newline at end of file diff --git a/README.md b/README.md index aabb9b9005a..7c49090be02 100644 --- a/README.md +++ b/README.md @@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2024-07-13T06:00:18.559644+00:00 +2024-07-13T08:00:19.263677+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2024-07-13T04:15:14.207000+00:00 +2024-07-13T06:15:05.587000+00:00 ``` ### Last Data Feed Release @@ -33,20 +33,44 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### Total Number of included CVEs ```plain -256929 +256975 ``` ### CVEs added in the last Commit -Recently added CVEs: `0` +Recently added CVEs: `46` +- [CVE-2024-5075](CVE-2024/CVE-2024-50xx/CVE-2024-5075.json) (`2024-07-13T06:15:03.910`) +- [CVE-2024-5076](CVE-2024/CVE-2024-50xx/CVE-2024-5076.json) (`2024-07-13T06:15:03.970`) +- [CVE-2024-5077](CVE-2024/CVE-2024-50xx/CVE-2024-5077.json) (`2024-07-13T06:15:04.033`) +- [CVE-2024-5079](CVE-2024/CVE-2024-50xx/CVE-2024-5079.json) (`2024-07-13T06:15:04.097`) +- [CVE-2024-5080](CVE-2024/CVE-2024-50xx/CVE-2024-5080.json) (`2024-07-13T06:15:04.163`) +- [CVE-2024-5151](CVE-2024/CVE-2024-51xx/CVE-2024-5151.json) (`2024-07-13T06:15:04.237`) +- [CVE-2024-5167](CVE-2024/CVE-2024-51xx/CVE-2024-5167.json) (`2024-07-13T06:15:04.303`) +- [CVE-2024-5280](CVE-2024/CVE-2024-52xx/CVE-2024-5280.json) (`2024-07-13T06:15:04.360`) +- [CVE-2024-5281](CVE-2024/CVE-2024-52xx/CVE-2024-5281.json) (`2024-07-13T06:15:04.430`) +- [CVE-2024-5282](CVE-2024/CVE-2024-52xx/CVE-2024-5282.json) (`2024-07-13T06:15:04.490`) +- [CVE-2024-5283](CVE-2024/CVE-2024-52xx/CVE-2024-5283.json) (`2024-07-13T06:15:04.553`) +- [CVE-2024-5284](CVE-2024/CVE-2024-52xx/CVE-2024-5284.json) (`2024-07-13T06:15:04.617`) +- [CVE-2024-5286](CVE-2024/CVE-2024-52xx/CVE-2024-5286.json) (`2024-07-13T06:15:04.700`) +- [CVE-2024-5287](CVE-2024/CVE-2024-52xx/CVE-2024-5287.json) (`2024-07-13T06:15:04.780`) +- [CVE-2024-5442](CVE-2024/CVE-2024-54xx/CVE-2024-5442.json) (`2024-07-13T06:15:04.847`) +- [CVE-2024-5450](CVE-2024/CVE-2024-54xx/CVE-2024-5450.json) (`2024-07-13T06:15:04.927`) +- [CVE-2024-5472](CVE-2024/CVE-2024-54xx/CVE-2024-5472.json) (`2024-07-13T06:15:05.000`) +- [CVE-2024-5575](CVE-2024/CVE-2024-55xx/CVE-2024-5575.json) (`2024-07-13T06:15:05.070`) +- [CVE-2024-5627](CVE-2024/CVE-2024-56xx/CVE-2024-5627.json) (`2024-07-13T06:15:05.170`) +- [CVE-2024-5644](CVE-2024/CVE-2024-56xx/CVE-2024-5644.json) (`2024-07-13T06:15:05.243`) +- [CVE-2024-5713](CVE-2024/CVE-2024-57xx/CVE-2024-5713.json) (`2024-07-13T06:15:05.313`) +- [CVE-2024-5715](CVE-2024/CVE-2024-57xx/CVE-2024-5715.json) (`2024-07-13T06:15:05.393`) +- [CVE-2024-5744](CVE-2024/CVE-2024-57xx/CVE-2024-5744.json) (`2024-07-13T06:15:05.457`) +- [CVE-2024-6070](CVE-2024/CVE-2024-60xx/CVE-2024-6070.json) (`2024-07-13T06:15:05.520`) +- [CVE-2024-6574](CVE-2024/CVE-2024-65xx/CVE-2024-6574.json) (`2024-07-13T06:15:05.587`) ### CVEs modified in the last Commit -Recently modified CVEs: `1` +Recently modified CVEs: `0` -- [CVE-2024-6409](CVE-2024/CVE-2024-64xx/CVE-2024-6409.json) (`2024-07-13T04:15:14.207`) ## Download and Usage diff --git a/_state.csv b/_state.csv index cbc47989296..638208264d4 100644 --- a/_state.csv +++ b/_state.csv @@ -248206,6 +248206,7 @@ CVE-2024-28682,0,0,5152c6a3d71ef9256a4c100c1d46f03254aeda535ba4c982fc323d50132c0 CVE-2024-28683,0,0,5e05ced0c6e7903250735aacec4ea0453b4627030ef2e380ed47238db8bee0a9,2024-03-13T18:15:58.530000 CVE-2024-28684,0,0,5e8cf612c51178ce0b7db285e9479c0e753c1929aaa4babe1afc56000a57a8d5,2024-03-13T14:28:45.217000 CVE-2024-28699,0,0,0b9a4e0b313e8b2e6ec1b9d8b9287e8c737e0019e26671b77c33fd8106965c4d,2024-07-03T01:51:45.310000 +CVE-2024-2870,1,1,2b3e07b087f226c36131af36e60237e95ea9c66e47ca2ba4875baa9a673dfca7,2024-07-13T06:15:02.310000 CVE-2024-2871,0,0,e9558decb3cc4c54584df3eb06fe6d1bb0c12954fd3dc0d6fb0a6933455338ba,2024-04-10T13:23:38.787000 CVE-2024-28713,0,0,beab16cae2dae6cd08028a095390b29624a6437ed474d84784c32091c71ece60,2024-03-28T20:53:20.813000 CVE-2024-28714,0,0,05d12d8ac80645ded00d1ead25c51baa98cf4af4d5a078fc724fffec6f7925ec,2024-03-29T12:45:02.937000 @@ -249256,6 +249257,7 @@ CVE-2024-30256,0,0,a37c28d8d8386eb524a9902aeb2d5e5078617fcd2b83be17321a99057fcfd CVE-2024-30257,0,0,2377f0bce8e6743e82f9e83d4d3fe6517fe5f2bc87edd16371a41958f86c07f7,2024-04-18T18:25:55.267000 CVE-2024-30258,0,0,7bff6b47870b75dcd80d7a446e9a5c2be083f8abe8fe5039c821edc8d0308500,2024-05-14T16:13:02.773000 CVE-2024-30259,0,0,cfb184088d670901d2f79f004b40a728484e26bf4f42494ddc110d6d1831c75a,2024-05-14T16:13:02.773000 +CVE-2024-3026,1,1,985db4e6ec70b53c3e02affbdcd87ffe9009e7b8270b26cc5e8cb3f5bad5c29c,2024-07-13T06:15:02.547000 CVE-2024-30260,0,0,82274cf73c39f8e2b6363f86535dd2dccf59e33d072f43ef5512b41a2b8a43c1,2024-04-19T23:15:11.047000 CVE-2024-30261,0,0,166fe7ca1c2db8755b6f93e08c72588a072cb06e59fb2e806092ba03f1e2a3f5,2024-04-19T23:15:11.137000 CVE-2024-30262,0,0,1fa25a25356aeafdd2a6a2236d1119dec7ce89cccfc2e5ccf2d342cf39a19bd5,2024-04-10T13:24:00.070000 @@ -253233,6 +253235,7 @@ CVE-2024-36305,0,0,25c6009804152d7b9979d9821e9e70f3611f20519825a820152254cf8944c CVE-2024-36306,0,0,b7a506dff1a266cee79d9db49c2ffc0e2570931464b091df5cbe92fde0600ec5,2024-06-11T13:54:12.057000 CVE-2024-36307,0,0,a7967d17a652c5cbc0d13d93e7f7b355b3ac34f8807bd56af098c714342692d4,2024-07-03T02:03:05.420000 CVE-2024-3631,0,0,52e896a80c9b063fda6224c04771bbd75f72f78e3d3636ccff4bb724fd16615d,2024-05-15T16:40:19.330000 +CVE-2024-3632,1,1,a580525ecfd3a33868f2160de373b5e50662154b29005e43e9662d0d36ac67c1,2024-07-13T06:15:02.617000 CVE-2024-3633,0,0,56839b289684cefae86bb3dbba78c89cd0cc4141e4ff321380a2afe97575b1d3,2024-07-03T02:06:26 CVE-2024-3634,0,0,940ae4dd6e92f9452379e49ccdcd29aa6fe6e9bda25faf9f7045c78090371ae8,2024-05-15T16:40:19.330000 CVE-2024-36358,0,0,0b6d0d7e847e5e80626827024fae1ecc3aa20949dc775e143afeabadd5937bd0,2024-06-11T13:54:12.057000 @@ -253650,6 +253653,7 @@ CVE-2024-37090,0,0,c9337b1c06176564880c76e8afe6a14b4c2c49859c9816b2ce1bd95c9844b CVE-2024-37091,0,0,70ef4cb5aa59df22f5d9bec3c45f39a3b926dd43e7416671f8860a54328745e5,2024-06-24T12:57:36.513000 CVE-2024-37092,0,0,ddf8bb50ed996f71f2c9e3e9b63faabe2c52ea8cb34e6f0fcdb53b1c55be2132,2024-06-24T19:26:54.367000 CVE-2024-37098,0,0,e259cf517a4b26891930426aed13a9c53ee339a8d724318e920ba4b291cc4d99,2024-06-26T12:44:29.693000 +CVE-2024-3710,1,1,791fd7712f631951c6899e8403ca73c192fe073ab4f2f17c7ea866b4b51721bf,2024-07-13T06:15:02.700000 CVE-2024-37107,0,0,e1e665b99eff19349add9836ced9fe988bed019b20e4b821ff990f5cecaee417,2024-06-28T13:15:02.503000 CVE-2024-37109,0,0,db0889e1d7d2a1ef5dcc67a2d3dfbd32c0e2f4e2cbde02826f15e64ccae72227,2024-06-28T13:15:02.650000 CVE-2024-3711,0,0,00ee502ae0ae8bdc802cd38eb1ec1e1356c10e1c18d766a4effd20297a066f55,2024-05-24T01:15:30.977000 @@ -253866,10 +253870,12 @@ CVE-2024-3750,0,0,803f7e301e80982b4e00371ccc1f410724a29d03fdd424fb4c54aeb0b034ff CVE-2024-37501,0,0,b78cf79ca308008e9008944af9630d58467f84a62f039c6a1e72ef46a8059faa,2024-07-09T18:19:14.047000 CVE-2024-37502,0,0,d47167ecc1dd174282378f6124abb3b4511994970b4449ae0fee9b8869d0d91f,2024-07-09T18:19:14.047000 CVE-2024-37504,0,0,2a3faccc5709d6d76660e0c6665b85f6d694f97e133b19d81d3b770a0ec3dd08,2024-07-11T13:05:54.930000 +CVE-2024-3751,1,1,dc747642c95c9bb313d20dcbc56ee4a5d8663bf9a1eb83f8fb20e39f108b0020,2024-07-13T06:15:02.773000 CVE-2024-37513,0,0,7976ba8e13d80d009daa78a2652c36463c2f0e67f7f7a4f5972797a366211b7d,2024-07-09T18:19:14.047000 CVE-2024-3752,0,0,06a3522f543993aef42f352f0c011207c560c2e5a1d63c9d8ccc34a87adab0ce,2024-05-06T12:44:56.377000 CVE-2024-37520,0,0,3e7ac03ec07ed8765d851e3f933c883863d11b4c139c55a8abe614aadf329238,2024-07-09T18:19:14.047000 CVE-2024-37528,0,0,9c6980ff0d1442c5b7fd4f5e3f8ba4ae579879f3db1ec83280b9bd21a4726381,2024-07-11T14:49:28.177000 +CVE-2024-3753,1,1,077114a2a8c8bcba915a2d740613dfcdb4108e5c720965ec726fb16edcd1a941,2024-07-13T06:15:02.840000 CVE-2024-37532,0,0,e146e982646d7ada5c23ac27c75ae644abb706f6257f2f96ca13a6820b942f27,2024-06-20T16:07:50.417000 CVE-2024-37535,0,0,062f7ebb43bb6d2a8ccb3332e5242404947b076c7894d1777e030e1c8e622113,2024-07-03T02:04:19.710000 CVE-2024-37539,0,0,c1651edacf32c123789feecb68380de8605a889305b418dd39079ef654272593,2024-07-11T13:10:43.937000 @@ -254556,6 +254562,7 @@ CVE-2024-39178,0,0,941809397cc55551932a6950a6f2b95c443b08d8ccb5b2192a192df3dfe41 CVE-2024-3918,0,0,f0312710b8f2207cc4daf3e960aa8906c7e8839f8babda55f2853fd4763a97f9,2024-05-24T01:15:30.977000 CVE-2024-39181,0,0,6d0605e6817c6f93a8fbfbf6a2ec1902596f3fb21fee78811ca51bbb181e7fbb,2024-07-11T13:05:54.930000 CVE-2024-39182,0,0,c4d16c6176ca0269b7678f6ff1967039bace8922a5879d34ffe12e1dd73c8773,2024-07-08T15:49:22.437000 +CVE-2024-3919,1,1,0907b484b5152b5ec0678a74ac604b9f28c921c564f31b28a301fc0f43b3cfed,2024-07-13T06:15:02.900000 CVE-2024-3920,0,0,5dbee28fbacc5f4bbc65481ff7f645499d60469b501d304207882ca441f74491,2024-05-24T01:15:30.977000 CVE-2024-39202,0,0,f670ff06733dd4c6d5c11488fabc4a1bb063378e53783f2f50ddc1a245b1d647,2024-07-11T16:13:13.487000 CVE-2024-39203,0,0,18c47ac3dccac84f7f75ab68882aa989c3675ff79ff1b24a1d72e6e148699036,2024-07-09T15:00:49.997000 @@ -254771,6 +254778,8 @@ CVE-2024-39600,0,0,3f218b3b2797556a97f50f1b3db443b951be2a33b8f95e3d04ecb200803e8 CVE-2024-3961,0,0,6646adb167e87c94860ebd5d8d983b1f971f6dc9fb8c86a5eaff8de194f86033,2024-06-21T11:22:01.687000 CVE-2024-39614,0,0,26b2dcc9a6a6be274ddfdc54c9957bec272862e2ee62a7b674c4947a1cc7966c,2024-07-11T13:05:54.930000 CVE-2024-3962,0,0,9de964d29f43823164300439a0e71453bbca4a5c1f5767eca51db600267798cd,2024-04-26T12:58:17.720000 +CVE-2024-3963,1,1,3b5fc63da38217b47320bc90d6e3a08d853a83e0d577bef871036cfc81678637,2024-07-13T06:15:02.967000 +CVE-2024-3964,1,1,fbfb54db29360ee1e7f21431c99e66fec89692ad8753ecb44306be0e4866f736,2024-07-13T06:15:03.030000 CVE-2024-3965,0,0,ca98c8c8f38859cd31112b30cbcab1577d0379601171e9b943854dcc0ce8c1f6,2024-07-03T02:06:56.690000 CVE-2024-3966,0,0,93926d7a5d68b811d92befd5d93f81a42e21603cd050116175f80a72afb025d8,2024-06-17T12:42:04.623000 CVE-2024-39669,0,0,56d6b274e749be30b1ff4d12ff6c858882279f47b773d710e8ac61d1e37bcfa3,2024-07-03T02:05:50.580000 @@ -255217,6 +255226,7 @@ CVE-2024-4213,0,0,42ea90224045d73e2b0e3583ac57d426d05abb547b5044b93cb751055084fa CVE-2024-4214,0,0,20486a6e70da9590b0bf48d308272f5e2303dba1772619a1d43b68b5a571b06a,2024-05-17T18:35:35.070000 CVE-2024-4215,0,0,2a43dd2effbd31681d2d452a71037398a8b05276042d39ca0d120b651bef66fd,2024-06-10T18:15:36.443000 CVE-2024-4216,0,0,fba12328dbaabec1dc61fd9a4f006fbf116bfe15b54035daf7cebf0a0d91ce67,2024-07-03T02:07:14.290000 +CVE-2024-4217,1,1,25d881a713792e4ddccc015ee3946da1c3c97eef6d57d399ff21e957f4fd7764,2024-07-13T06:15:03.097000 CVE-2024-4218,0,0,68377bf5bc219c5624001bda4aa985e5224f9f419836698a53a69f78bf595508,2024-05-30T13:15:41.297000 CVE-2024-4219,0,0,c8079b758b715a1f50eab74fe10b87ff01903f1873291c49593cac5e499424d6,2024-06-11T17:06:50.963000 CVE-2024-4220,0,0,d6aa05e427d916e0de9769fc4820e29f1f18a3c6387db1bee92ab09f1ecef44c,2024-06-11T17:05:35.203000 @@ -255261,8 +255271,10 @@ CVE-2024-4265,0,0,91d38fbd7b9c4ea0cd26c0f2028b5e1f8ee8c7d7e1c2c632d6b17cd2b7b696 CVE-2024-4266,0,0,116b52a29fd0a6039b308734c72b0d2ae8aa871f2547c292da7232e2003a6f6b,2024-06-11T13:54:12.057000 CVE-2024-4267,0,0,ce2653255d43ae5f4599b240b7efe5c0da7fc5b70a5363cdc03dcce3fe58b4ed,2024-05-24T01:15:30.977000 CVE-2024-4268,0,0,4f824af91b8247c9f369d98ed14c3e2969490987896e9e03e4f753eb7f103f3a,2024-07-02T18:08:17.817000 +CVE-2024-4269,1,1,25ee5767be83f0ba0db68b2069bfe40cac41f446f3cd38218fb126682f3bea45,2024-07-13T06:15:03.170000 CVE-2024-4270,0,0,dae68ba24abb4217ea4781a91ce52781cf47607cfd48397395ee3a58fe8e32d1,2024-06-17T12:42:04.623000 CVE-2024-4271,0,0,264c116f07aa10a920ca78d5e9c58bba0fe1e2b31cb4f2cfd0a7a609be29751f,2024-07-03T02:07:19.577000 +CVE-2024-4272,1,1,13e36b2bf465861e52e28a1694322e608e3b339ad047904bb6a6566ab85281bd,2024-07-13T06:15:03.230000 CVE-2024-4273,0,0,136233599d68a0536ba99c3313767218f535edf424c12fad350903aa42bf81fa,2024-06-04T16:57:41.053000 CVE-2024-4274,0,0,f007ffa253f631296ec9b2caed7d1faf5b31c76fe42ca7e92fd5b40ffb00a28e,2024-06-04T16:57:41.053000 CVE-2024-4275,0,0,70e1a00c60419d92634d3a56b566530d560ae59bb86d2c5a8041fd963d9db39d,2024-05-14T16:11:39.510000 @@ -255552,6 +255564,7 @@ CVE-2024-4597,0,0,49317a4ff12c60e573c38172dad46b390f6c4e67b3d1cb7027306fe91fd78a CVE-2024-4599,0,0,7a2dd9d366beb25d47b0c05043c7c832d7abfddbca078d457eae393ffc0c13b9,2024-05-07T13:39:32.710000 CVE-2024-4600,0,0,34514a912341a00b4dd13ba9bc66d0fe1a7a1cb8661452904cea5e1c3463f08f,2024-05-07T13:39:32.710000 CVE-2024-4601,0,0,9e1e1f008012e98662e601d1d10e65eeb89abb9d2b4ea828e06c076d042c7c66,2024-05-07T13:39:32.710000 +CVE-2024-4602,1,1,c1263cbebea4b27dbb386fa673c27b2e600a26eed9f3bd20ec3d4d48146d2495,2024-07-13T06:15:03.297000 CVE-2024-4603,0,0,27343e0fec6f30d71575f590e2630163b637ba40d0bef4ac0d18b49a23bf2313,2024-06-21T19:15:30.783000 CVE-2024-4604,0,0,460333a81166731e9c8a2645895ad13232c390b49b6668fbf47beefddf330f17,2024-06-27T12:47:19.847000 CVE-2024-4605,0,0,953638d724b858b3af29d2158adc8bf0b3f03be99b297e319002baf558be51c5,2024-05-14T16:11:39.510000 @@ -255681,6 +255694,7 @@ CVE-2024-4748,0,0,0c715b5c19ebf413f66e32e0e846756d2092313152b17f8c4e7cf0a62355ae CVE-2024-4749,0,0,676e331864bc41907c4c80c44886e7dac480ef6dea2c29bc22838d992753d4da,2024-06-04T16:57:41.053000 CVE-2024-4750,0,0,423585a3e250903ac62d761ecb0e0e6dc6b4649ccd4411b90275a4e6d2f87495,2024-06-04T16:57:41.053000 CVE-2024-4751,0,0,980cee331660133759599aaa98eeae384de48fe7bcc98af4a2333b20d054b0b6,2024-06-17T12:42:04.623000 +CVE-2024-4752,1,1,9ed825881699c17bbd1615aca6091e200e12d4dbd13ebc5b5d9d42fef7786afb,2024-07-13T06:15:03.370000 CVE-2024-4753,0,0,9f6ae95232954e10d46dcad409a1281e3c3ba7b0c7197bb1d94d6337d29a472b,2024-07-12T12:49:07.030000 CVE-2024-4754,0,0,65f7d30a77e8c92b9ac1114b7ed7f43c32a5bfb34fe46cea0e558e1fff1e464e,2024-06-24T12:57:36.513000 CVE-2024-4755,0,0,ca5306e45de4985a027d64d4740785092288eb6abbd1ab6d1fda3377d88d4e7e,2024-07-03T02:08:01.477000 @@ -255870,6 +255884,7 @@ CVE-2024-4973,0,0,9c5c282fbcc1cde26707e056c2d2e456f79201a7acdb54ffa8aecd59988530 CVE-2024-4974,0,0,965d83914b39cb38aed9a7e631ff2568e898f453d4d7c747ae3461e191803c69,2024-06-04T19:20:56.237000 CVE-2024-4975,0,0,4fcd809ef3c247b89e3904878b1809671315d1a438027411bf1e1fc09d5e8318,2024-06-04T19:20:56.337000 CVE-2024-4976,0,0,cec1c528b9c81bb2353d630af7aeaeed80f8c396bb33272f9e3c075fa645e3ec,2024-05-16T13:03:05.353000 +CVE-2024-4977,1,1,69a8e2defb062292c9dc0a4f397f9b9f4f1c9756f1e1799054127e5d9156b068,2024-07-13T06:15:03.440000 CVE-2024-4978,0,0,da55fe81f202b0e5309a26be3ab7a8c7197ff6f40533e0aebba1988f8f75f5d4,2024-05-31T16:03:52.247000 CVE-2024-4980,0,0,b5b93d089fa3d245393b7cb268984100664e9544bf4ff7971c072bbdebb0992d,2024-05-22T12:46:53.887000 CVE-2024-4983,0,0,49f1cb0f5f1d6955f366dda654a5436de910210a329601fe7472776ed46f30ec,2024-06-27T12:47:19.847000 @@ -255884,6 +255899,7 @@ CVE-2024-4998,0,0,e12f9512d41da053bcfd5626dd0ee21afd4da3e61146c4f0c8f9da42ca3dff CVE-2024-4999,0,0,1bac5cc77e7ceb1bce6c078fbd59e76f5556984ef2124d365e8638bfa6b6fdfa,2024-05-16T15:44:44.683000 CVE-2024-5000,0,0,21f44bae275ca5e7f3a45da963612f2fb705c74e44c15e2681f54ff4506e6afb,2024-06-04T16:57:41.053000 CVE-2024-5001,0,0,bac0073c23ed28e836068e8632acf1110bc49b73246f9cff53f5a706acc4a57d,2024-06-06T14:17:35.017000 +CVE-2024-5002,1,1,da41a6c3b1ade4706dc614636aec685153acb7e40aa1e8e4bd804f1058964a8f,2024-07-13T06:15:03.500000 CVE-2024-5003,0,0,d7f0fc1b6b7797a26bbde28f3345c21309ee3aa5cb19350abdc4f1d0ca9ec31a,2024-06-07T14:56:05.647000 CVE-2024-5006,0,0,982820e7e91a551bd12476d9f6731c77df87e69f9a4499c2643412449b7b2aa0,2024-06-11T17:36:24 CVE-2024-5008,0,0,2898dba519d9d217cfd3248b0ed35ab7edbdc176d5a083ab78d6d475e7126536,2024-06-26T12:44:29.693000 @@ -255902,7 +255918,11 @@ CVE-2024-5021,0,0,872edc6307495a559587b3d1d37e361f617cf9935ecc4133654cc9effee7c3 CVE-2024-5022,0,0,106355f86b530d1586a5d339031de27a1a2312467a76eb449e8e9901150235d8,2024-05-20T13:00:34.807000 CVE-2024-5023,0,0,974704283893df4cc9d8e0bcce8bb65ebf635268235f75f47c922033893214ce,2024-05-17T18:36:31.297000 CVE-2024-5025,0,0,d287dc9bcba0fba1784ec3f3fe4bf65eea235ed5e6f91d741018beb442d992d7,2024-05-22T12:46:53.887000 +CVE-2024-5028,1,1,c0a83f8d003a1fce4e24da3753a0cd5fb6375a83aaafea68317fd84d200a5c46,2024-07-13T06:15:03.563000 CVE-2024-5031,0,0,e598ebc5c9fa457f9bece560d72de6fc8851ac943a5e7908ec776eb9202f17df,2024-05-22T12:46:53.887000 +CVE-2024-5032,1,1,9b6823307734d5ffaf471cb54d738917f99101d5393108a1880028a38c5d0220,2024-07-13T06:15:03.633000 +CVE-2024-5033,1,1,23166929cf777fc2cf5f9fdd07a7c5a04c6a1161033dbdce84457b5705948ac3,2024-07-13T06:15:03.707000 +CVE-2024-5034,1,1,dab8cc3de2ab05c5dccde0e8009a648e0032610ed8cb55da0871b07f4291107b,2024-07-13T06:15:03.780000 CVE-2024-5035,0,0,04b94f66274e3d3d22c52a6f453c8b285ab22579cfad76ef028d6a110e1aa148,2024-05-29T05:16:08.793000 CVE-2024-5036,0,0,e3ae54d07fb41ce4fd356143d834c0744cccfcb0f7c15179bf5d5b0f79f65ca1,2024-06-20T12:43:25.663000 CVE-2024-5037,0,0,705e1e93e01a812de5bd25f4c44eac9c4c19c3899cd946f2591d29d1577d0267,2024-07-03T17:15:05.050000 @@ -255935,6 +255955,12 @@ CVE-2024-5069,0,0,3dc695c8b89e299df0488e9d65e83af5cf3b32a39325b6a3f19785e0f56f72 CVE-2024-5071,0,0,7523a9ad4bd89c0668c9224d08257b52394a4aa3d5c42354296fd45548ac40c6,2024-06-26T12:44:29.693000 CVE-2024-5072,0,0,eed82a97a0ee00f59db20864a50c358c267684d10361dc2c7c81171fccc96a9c,2024-05-17T18:35:35.070000 CVE-2024-5073,0,0,7de160448d11dc97e5a2a9338d2dd6c82b34c616c4ba587347e360e1f76b10e8,2024-05-30T13:15:41.297000 +CVE-2024-5074,1,1,dcd2f43b41606f53716d8e8198fa71008603d08f5ee0d2cd508ceb65f083d464,2024-07-13T06:15:03.840000 +CVE-2024-5075,1,1,95934ebb6e6a19db2898b46f8de4b5a456e37319a030b328e8115a4d43115400,2024-07-13T06:15:03.910000 +CVE-2024-5076,1,1,fc20a380f13c099c0bab55c99123f88f84c0c36bd86de2b17c6c3b81cc18d288,2024-07-13T06:15:03.970000 +CVE-2024-5077,1,1,3cc2daba1bfaa6791269453cb40e5fc4b93a16bff52d4b98064a50b83e8b8a26,2024-07-13T06:15:04.033000 +CVE-2024-5079,1,1,9b89547c193919ba4b174d788d5fbafcb229f2a9eba46da5ef589dcbba84e22b,2024-07-13T06:15:04.097000 +CVE-2024-5080,1,1,a95a41b43142627e234b862653a55ebd4e1c6bf3781a93cdf646a20dca28bfc9,2024-07-13T06:15:04.163000 CVE-2024-5084,0,0,92d8976ac3f9e8cdb8733c073caf2586c8f5a42e4f2b053a805034733b1a3630,2024-05-24T01:15:30.977000 CVE-2024-5085,0,0,e4f2e80bdbf4fc55d46c60837ef7c898ce9ad88d4ef317ea9d17542cafaf4d9d,2024-05-24T01:15:30.977000 CVE-2024-5086,0,0,931e0bac2fddd1d3017185ad2896bc6a71c950877469373fd8fb74c0da6b675a,2024-05-29T13:02:09.280000 @@ -255997,6 +256023,7 @@ CVE-2024-5145,0,0,0acb7691362a1bc72a9e4e71d498873a314e4674d3384b4bf3903540c5103a CVE-2024-5147,0,0,f4d57cc5a9319b417b98271562a6c18c09e411a2e24f5685a34653839c587f1d,2024-05-22T12:46:53.887000 CVE-2024-5149,0,0,e167f321a43176bbe51b79fcd0ea912cf6c260f7c91862b43f4c0c9d62cbbb1d,2024-06-06T14:15:01.960000 CVE-2024-5150,0,0,b6666c6d6ac9830dd3015f5fc02fd79f0a3b63d41ee2e14f8cd76da933186cb1,2024-05-29T13:02:09.280000 +CVE-2024-5151,1,1,575b70e7bfe5086920b22641f95acfd3710f73d3a299da068b627cc26bfb9c48,2024-07-13T06:15:04.237000 CVE-2024-5152,0,0,897a950e1a56cf66b3762a0b7d02348f108b131c1556072d1a2c46cab20012e4,2024-06-06T14:17:35.017000 CVE-2024-5153,0,0,828bf0d922f71aaeb9a620d2a28fca02e54e4a39590cf3792a194a4a5970d881,2024-06-06T14:17:35.017000 CVE-2024-5154,0,0,0900f3ffde48a737774e31da15c4bd85a62398198c843c819abf1f8f6c6973c9,2024-06-27T05:15:51.567000 @@ -256011,6 +256038,7 @@ CVE-2024-5162,0,0,d15fa704d37693972ec8048da97de07e102beeb78dcaeaa088ebcc9b6b634f CVE-2024-5163,0,0,bdc81db4ac58629f980356520760931bcc42aa23cfccd4fdeb3934ec7b891de9,2024-07-03T02:08:37.670000 CVE-2024-5165,0,0,1249b447729c1b58db4dd874ebf3238410613919325ce73c31963c57eb2e607f,2024-05-24T01:15:30.977000 CVE-2024-5166,0,0,acd04bdcb3927ae2fc6875213ce44649287d9e14ecc961e10fc982fe1f8beeeb,2024-05-22T18:59:20.240000 +CVE-2024-5167,1,1,c314f80b95f205b735f4654c3b8eb7f41d481722cd6e84bd5c3c512290d615a1,2024-07-13T06:15:04.303000 CVE-2024-5168,0,0,306ce12eec3dfa604048647f5d45c62ae3c9962c8122be3c41030f354ed300c2,2024-05-24T01:15:30.977000 CVE-2024-5169,0,0,b1ca0b7cc98949f62453afcab28e83911d364c4494efe1f6507425f7cbc51120,2024-06-26T12:44:29.693000 CVE-2024-5171,0,0,527a4a17adce934d1b4f4bf563487c5773fb7d5bb5e41f4824c0714e13ba1e90,2024-06-21T13:15:12.973000 @@ -256105,6 +256133,13 @@ CVE-2024-5276,0,0,d26b15babe17aac13cc613675e4c4ad8d9ecb0a2798444e0b74aa892858078 CVE-2024-5277,0,0,08c2f56d5f9c6263336a67bd47c4fa52288bb09bcb2d8aeff245d6d39899edcf,2024-06-07T14:56:05.647000 CVE-2024-5278,0,0,ba4b6329b00a48ecb03cef9d2f0cd09adc7cfa79e9cd9e8eb891a1136335fb69,2024-06-07T14:56:05.647000 CVE-2024-5279,0,0,1f630d4d53c39cf2174e2a1edce8e1a5ead56a314739580d23644f8e4fedef07,2024-06-04T19:21:04.240000 +CVE-2024-5280,1,1,d04713398c318d8f6f2743eb0b8be98fb79b4f4107a37c7b80b7a099871fd9cd,2024-07-13T06:15:04.360000 +CVE-2024-5281,1,1,2d914b20c8419d1e4141d831985d48a6766bb3ce13b135fd71d14caaf2d16332,2024-07-13T06:15:04.430000 +CVE-2024-5282,1,1,709866e1aad7666f7e530c99fa38093f0247abfb71abd228fdcb0bd86cb343e6,2024-07-13T06:15:04.490000 +CVE-2024-5283,1,1,14f6ef6eb599eef20ae25c736cb62de53bbd5886b5b2c028e7c85155f1dec868,2024-07-13T06:15:04.553000 +CVE-2024-5284,1,1,de28ea14ee234edd7f918c014920493f54f2a1f63a20c26817a44e4a237dd964,2024-07-13T06:15:04.617000 +CVE-2024-5286,1,1,043437eafc4cfcc9b332e36e963961e86fc5087d5a70ae79f06f52ac9f0d2b03,2024-07-13T06:15:04.700000 +CVE-2024-5287,1,1,beb0faf49c30ff920730a15a6d9dcbe58d0d9ca5abefaa5119dde828b4608b1d,2024-07-13T06:15:04.780000 CVE-2024-5289,0,0,a02da373ddf627c39a88f09ba37230dcf191b29c84a32613f97fcb834cd9c524,2024-06-28T13:13:36.980000 CVE-2024-5291,0,0,e2fc6f2196c0b027b818fde218df99cf43b38b5676cf49b77deeb1aa303d7e78,2024-05-24T01:15:30.977000 CVE-2024-5292,0,0,07f972c0f93c6f07c6e8e023cab22706ed8252620d55ba7ae2411117029231e5,2024-05-24T01:15:30.977000 @@ -256235,11 +256270,13 @@ CVE-2024-5437,0,0,551b020f0044e3ab584c14f08f0984900b4bc26534c92382eb6ac2bb660708 CVE-2024-5438,0,0,b27637930797cbba2af64a5218ab07d5b0a2d8c36c1ae10d453afe4fa1e1f2e0,2024-06-11T18:26:45.147000 CVE-2024-5439,0,0,d933d33f15def11b210f94c43e434fbcbcedf874aa4bf1c51db16a3b591b2644,2024-06-11T17:35:43.313000 CVE-2024-5441,0,0,a7bb50aeb84e17ae0f6968b8ffc04aee2cb8a84b24c26594cbc0250db6319333,2024-07-09T18:19:14.047000 +CVE-2024-5442,1,1,afe1e5640210c90ad6da05924222da61a8bffbc08dadcf30e815cb17a780e98e,2024-07-13T06:15:04.847000 CVE-2024-5443,0,0,925856e128685c50d1cb7d9e876369e7979bded1a2c53610b230353ba1bb3f2d,2024-06-24T12:57:36.513000 CVE-2024-5444,0,0,df6c64937a0a680b450e4731b07b240fc0d70d09b5799de50b3fbc75e0e9e8e3,2024-07-12T16:12:04.690000 CVE-2024-5447,0,0,3cca7aa92fc6065f540e9581ce89048750b9301e8e5f09fe0c757aeff208842b,2024-07-03T02:08:56.630000 CVE-2024-5448,0,0,3b8c50d4d9750a6fd624a54dda421d4d7914d50ce40345ec2ba734a9201fe3ae,2024-07-03T02:08:56.850000 CVE-2024-5449,0,0,98f03fd41a859602711a787e6c6738ac5b4c6552335bab31c9f953ba2b79cc72,2024-06-06T14:17:35.017000 +CVE-2024-5450,1,1,a30067463da79743f04e83d4fd311e0aeac3440f8788fcaf72039c9d1a29e1ec,2024-07-13T06:15:04.927000 CVE-2024-5451,0,0,0dc9e04d41f05345ae465cb541cb585eb35309652e769d3d8446d539c07ab3f0,2024-06-25T18:50:42.040000 CVE-2024-5452,0,0,27a87c5d81b8c2c688ae4d039463a5b6ff5c5d7de26437cd334595b44d7597a4,2024-06-07T14:56:05.647000 CVE-2024-5453,0,0,f53a0f7c14e91f56fc73f4b75f7a3c7cc751f83b7f0078edb3a1d42587e45496,2024-06-11T17:34:52.263000 @@ -256255,6 +256292,7 @@ CVE-2024-5465,0,0,9b677e9ed42136d68b443cf9dc4afa859310d29bdd1dad1920c040ce3c57d3 CVE-2024-5468,0,0,2bc9c38a1a2994a4c4ceddf0376e8b3ff5412f95fe840378ab4577710a81e066,2024-06-13T18:36:09.010000 CVE-2024-5469,0,0,a6ac25b89021bcbe477171d4304d10733bc198409739b73a4d379d6ba636b5b0,2024-06-17T12:42:04.623000 CVE-2024-5470,0,0,6ad8fffdbc9fc3c2ca94bc381d3be223e310676e26148212c497e243b6c17473,2024-07-12T16:52:52.883000 +CVE-2024-5472,1,1,8fad43828e0bba901795ded0eb6372b4078fd8d176d43e12dda426d7b9b2d12e,2024-07-13T06:15:05 CVE-2024-5473,0,0,7a9289264d1a834c0b8e9151c353ddcb7a22a22f6b7d360897c02053aaaeb88c,2024-07-03T02:08:57.860000 CVE-2024-5475,0,0,e09a66bd4d026df38a62a9d0642b82f2a5b9bf49c6a2d9e0e1e141414790fdd3,2024-07-03T02:08:58.050000 CVE-2024-5478,0,0,cbce39d40f4102e26dfaf35e6a6b20bf349245ad3d94d864b4543f6f43a9d245,2024-06-07T14:56:05.647000 @@ -256327,6 +256365,7 @@ CVE-2024-5570,0,0,752c5aec7899d5cf3a8e3335b609e2b612878d2e224e641cf0205f3f8bec40 CVE-2024-5571,0,0,105c4e644019eeccf72c6e63813cdc36601b1b9a7e3cba5bc172df86631261e6,2024-06-11T17:29:03.277000 CVE-2024-5573,0,0,51a9ffd3da1267c4eef69596ac09c3dbea287270e0762cf7f98d2ed1f452fbf5,2024-06-26T12:44:29.693000 CVE-2024-5574,0,0,3e624f806d94dcff352fde1d5be73aa27a333a70d66ed500b1d4bd0c17214488,2024-06-20T12:44:01.637000 +CVE-2024-5575,1,1,15a319da6102433179cb7de936fb4ded42043cda3b3019c5c48a80ff2c9299f5,2024-07-13T06:15:05.070000 CVE-2024-5577,0,0,0394e112329dfafbe6884a2484f7873076e1a8201ddc51d40c9b2393b5d88276,2024-06-17T12:42:04.623000 CVE-2024-5584,0,0,612eacfcf6c3fd3d6fdd0ff2c66e496cc817b02568ea9f69c40277bbc0300578,2024-06-11T13:54:12.057000 CVE-2024-5585,0,0,7ca8acd7f48a83dc2f9c7f2dbf799bd4542c4abbbf9453c8a4fa401160a3a849,2024-06-13T04:15:17.407000 @@ -256350,6 +256389,7 @@ CVE-2024-5613,0,0,7e758f60ff4a249ae3d985d91b4f3417dc42ff70d8507f5e072b9cf0ad6144 CVE-2024-5615,0,0,d715351de069ee256cfd127ce22346136f76094dbd1f6f173b336f3c2cdc9c0f,2024-06-11T17:55:16.103000 CVE-2024-5616,0,0,5078c1aa917db98652cc6ffd2b310b244194da0fcbabfd9d4ed8ccf7b99de509,2024-07-08T15:49:22.437000 CVE-2024-5626,0,0,7932ffd73aaf78514b606728bf1a761d189d38c2a5a283b9b4110e01ed2b4d16,2024-07-12T12:49:07.030000 +CVE-2024-5627,1,1,66070f4345a89fbce91264e434553655270bf1e2ea5355263f1edcb80e716e1b,2024-07-13T06:15:05.170000 CVE-2024-5629,0,0,20478b62dd0cd666624f11f2e5a11c22a9915feb481805651583fe7db0518c7b,2024-06-18T18:31:05.663000 CVE-2024-5631,0,0,25836c7f267b9208b846f73ed3ce84976cc46a5e11e6627f730b2265da803c8d,2024-07-09T21:15:15.520000 CVE-2024-5632,0,0,18c64f64f8d77f06a181388a24f5be7d454b8919234aa93ebe8fa802fed4ac14,2024-07-10T17:15:12.517000 @@ -256363,6 +256403,7 @@ CVE-2024-5639,0,0,2322b8156dee01dfdab7b2069be6e0698e3a8613a841329b71822c874a14ae CVE-2024-5640,0,0,86163b3d741cee0a4e50ef8553f0c82f1f0c15bd48d022d2d250ef0f55c23f10,2024-06-07T14:56:05.647000 CVE-2024-5641,0,0,1f23612877686d6e5143238f62dc02125c3d0a0d8a2499e0ec524473edb424e6,2024-07-05T17:14:44.840000 CVE-2024-5642,0,0,473e29d44a01c1bd9d78a11628480be9d88df99635e7b451adc74e5ff8ecb62e,2024-07-01T14:15:05.807000 +CVE-2024-5644,1,1,c61b21cc8171b7dadeb3eededf18e8f87f0465dbeac22b33406f279577dd59af,2024-07-13T06:15:05.243000 CVE-2024-5645,0,0,1faba0fd6e05694e3fff7011c206b3ecee3c45fddb7e6c575993af231224a181,2024-06-11T17:57:47.197000 CVE-2024-5646,0,0,23240aeec5f40e46e6951e19eff4b72273567c29932f06ca0851d3144bb5ebaa,2024-06-13T18:36:09.013000 CVE-2024-5648,0,0,015c05f38e8cff192a455edd246e167c4bc53044f1d944054e7ecfcb7dfdfccb,2024-07-09T18:19:14.047000 @@ -256417,7 +256458,9 @@ CVE-2024-5704,0,0,be55689131fc57547da71e8726572a7a1a86cf57932558d33666ec0b15eef9 CVE-2024-5710,0,0,bbba5caf4cb4f465fb2a1f44424b7af778bd56d5f1b17eb3b38248b8a0397322,2024-07-01T10:15:30.183000 CVE-2024-5711,0,0,463604f6d6d272196433a5bb7494f0542e749e8811ac98ab1c08049581f8b425,2024-07-11T21:15:12.787000 CVE-2024-5712,0,0,6fe769ed08d1c07fa399695b2a73ebe92703dd256409ae365a8a0674e8c2dce4,2024-07-12T08:15:11.477000 +CVE-2024-5713,1,1,1bbf853429ffee7c04c67b772f8cb489adb7e09477bba9c63f4b74332264850e,2024-07-13T06:15:05.313000 CVE-2024-5714,0,0,d09606fe85d7a014a058870c51f9ff79e6af54534c316b686a2562e2d0e92e3e,2024-06-27T19:25:12.067000 +CVE-2024-5715,1,1,a78758a828ec1f632a981415558bbe60dcb2e8575a09bab3ad3974ef885b33c4,2024-07-13T06:15:05.393000 CVE-2024-5724,0,0,03384c71395c84af225b0ffa60ba9818c028df2b73c4ae064cd0a263a53e8317,2024-06-20T12:44:01.637000 CVE-2024-5727,0,0,040bfa497be860fd1871f63cb27032a120406323d19a196c7488cb84bed8cd86,2024-07-03T02:09:13.520000 CVE-2024-5728,0,0,970711b5fa2959720f2da02dc0abb41a56789d3063753f984448aaa0fb048438,2024-07-08T14:19:16.400000 @@ -256433,6 +256476,7 @@ CVE-2024-5737,0,0,d0320412366343a8bfdfa83f09ec33ad8bab76c39c727d4c2240c621c15a4f CVE-2024-5739,0,0,4e4cf687173db1796e93002e6527d7eafacb6ad9e3e1f9441d82638a10b1e4ca,2024-06-13T18:36:09.013000 CVE-2024-5741,0,0,d3e87c617441ebc91021d514ecbbaffa42c181f23db631a685b052a1b8e8e820,2024-06-17T12:42:04.623000 CVE-2024-5742,0,0,a52d500d47b6c5d306e493aed82844a67ba1ec935bd3dcc9d1575df0fba9dc97,2024-06-17T12:15:49.850000 +CVE-2024-5744,1,1,e32fae19fc4cf4faf9d51e9c38b2b538ad025c262b90c2bcc72891cbb7c8866a,2024-07-13T06:15:05.457000 CVE-2024-5745,0,0,e6d6a2ad17b4c76965d8e06659a07345c55e76c97ae26acd6c0df2c3c7c9c9e4,2024-06-08T04:15:10.027000 CVE-2024-5746,0,0,19c03e2378053068498e84f7ded06c9ed9f7f605893d4e6e1e00c733dd0cc75e,2024-06-21T11:22:01.687000 CVE-2024-5750,0,0,03159524f0152f136fbf677dd96b04f6ea701d7a55e178491af9632e52209686,2024-06-18T14:15:11.383000 @@ -256639,6 +256683,7 @@ CVE-2024-6065,0,0,8dd99f4d37f301246412681f45228fac07d3ea15c1391b550b52738ce1d9d0 CVE-2024-6066,0,0,bdecbe263c05a4772a78f07626fc1e3f9d1817cac413c3ff735f168ece871a97,2024-06-20T12:44:01.637000 CVE-2024-6067,0,0,6728784af54ae6b64b1bb52b7887afb1ba68c7ac0e5f2ef2339910430d39d127,2024-06-20T12:44:01.637000 CVE-2024-6069,0,0,262b48eb8c330c3b1dd3ca5015bcbc32f226a318c6d31e421e5580f86d9ea37b,2024-07-09T18:19:14.047000 +CVE-2024-6070,1,1,fda60aed20061941b31688889a84b677cfadb3b2a6748f421c0508f973978bab,2024-07-13T06:15:05.520000 CVE-2024-6071,0,0,10e78c82267f57981fcc90e3e22358a5c4cb7401eca3480df2296481e008838c,2024-06-28T10:27:00.920000 CVE-2024-6080,0,0,280d37fb165500fef7817a0477b29efc9416c53bd245603eb247ad266e840146,2024-06-20T20:15:20.583000 CVE-2024-6082,0,0,fb01e1189e5a394e265b664904a3543325f650fe09e01ea1f771a4558bb8508b,2024-06-20T19:15:50.437000 @@ -256832,7 +256877,7 @@ CVE-2024-6402,0,0,795485c4534407e246daec51c1daaa33b95f6651688fed743a8fb9054cdaed CVE-2024-6403,0,0,e44b9cfa8d9ae367e624a8cdf179ef52ea1e98c2115d7a956299d17747a6a56b,2024-07-01T12:37:24.220000 CVE-2024-6405,0,0,fdb62e3d2213e21f6cf3d269e158ee31cc07c01f1a5a460b466ccce5203f82ee,2024-07-01T12:37:24.220000 CVE-2024-6407,0,0,12314028e09ddfd135bb748e0530e9ce4aee25dcaa6c2bae62524650d54b655f,2024-07-12T16:36:34.747000 -CVE-2024-6409,0,1,8fa55f802f11c77e2275f285ff83d5eaaae068922e7ae02d6ce55866bda9f452,2024-07-13T04:15:14.207000 +CVE-2024-6409,0,0,8fa55f802f11c77e2275f285ff83d5eaaae068922e7ae02d6ce55866bda9f452,2024-07-13T04:15:14.207000 CVE-2024-6410,0,0,9db961a9e1824a35ea4ea0ac1b25800d120aafac2e5d4caf32d46e6051ad19d3,2024-07-11T13:05:54.930000 CVE-2024-6411,0,0,47c8df8c850420fccb0a9ac1089e4a10bdc49d8ecc38cd5ac33a449b2082a491,2024-07-11T13:05:54.930000 CVE-2024-6414,0,0,ae0d661be5f3239fdfe6f0d08030fef27c03212dc1e12675bcf532fd90369002,2024-07-01T12:37:24.220000 @@ -256888,6 +256933,7 @@ CVE-2024-6555,0,0,bf68ef8f1bd3876021fc33b504457daba53832080530806ef27f797ea5536a CVE-2024-6556,0,0,246920c1b32eb0a0369982110178f9a30464427865e75d42710950bf8d6bff6c,2024-07-11T13:05:54.930000 CVE-2024-6563,0,0,1b4d88909a8afd884220e1df693026407578c717bcca7ba5cdd4e0bbbf29fb3c,2024-07-09T14:19:19.300000 CVE-2024-6564,0,0,b381c943e4dc87d72df0560a8008d835d4542fba3e8b6a3b21a1beca0e3a3fa5,2024-07-09T14:19:14.760000 +CVE-2024-6574,1,1,d74f9bce07b499b253bd85b2f4475d81f4c23cee79d551526c81d23d427be1f1,2024-07-13T06:15:05.587000 CVE-2024-6580,0,0,d43dfa58651574c4447e8f323f3cb1f6a00d6bdef0613d5834aefccecf968c5d,2024-07-09T18:19:14.047000 CVE-2024-6588,0,0,67672e854c20766f2e15151fa1e111ec8310b7083a57f535c99159d2ce6e5af7,2024-07-12T12:49:07.030000 CVE-2024-6598,0,0,2f02553b1031751a689c5bf3f9b99ef5078ca790db273edd82a84af9b7d8dd36,2024-07-09T18:19:14.047000