Auto-Update: 2024-06-03T12:00:38.593869+00:00

This commit is contained in:
cad-safe-bot 2024-06-03 12:03:30 +00:00
parent 29492ebd1d
commit 65ff53e3d4
37 changed files with 1956 additions and 32 deletions

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2023-43537",
"sourceIdentifier": "product-security@qualcomm.com",
"published": "2024-06-03T10:15:09.063",
"lastModified": "2024-06-03T10:15:09.063",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Information disclosure while handling T2LM Action Frame in WLAN Host."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "product-security@qualcomm.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "LOW",
"baseScore": 6.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 3.9,
"impactScore": 2.5
}
]
},
"weaknesses": [
{
"source": "product-security@qualcomm.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-126"
}
]
}
],
"references": [
{
"url": "https://docs.qualcomm.com/product/publicresources/securitybulletin/june-2024-bulletin.html",
"source": "product-security@qualcomm.com"
}
]
}

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2023-43538",
"sourceIdentifier": "product-security@qualcomm.com",
"published": "2024-06-03T10:15:09.937",
"lastModified": "2024-06-03T10:15:09.937",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Memory corruption in TZ Secure OS while Tunnel Invoke Manager initialization."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "product-security@qualcomm.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.3,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 2.5,
"impactScore": 6.0
}
]
},
"weaknesses": [
{
"source": "product-security@qualcomm.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-120"
}
]
}
],
"references": [
{
"url": "https://docs.qualcomm.com/product/publicresources/securitybulletin/june-2024-bulletin.html",
"source": "product-security@qualcomm.com"
}
]
}

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2023-43542",
"sourceIdentifier": "product-security@qualcomm.com",
"published": "2024-06-03T10:15:10.220",
"lastModified": "2024-06-03T10:15:10.220",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Memory corruption while copying a keyblob`s material when the key material`s size is not accurately checked."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "product-security@qualcomm.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "product-security@qualcomm.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-120"
}
]
}
],
"references": [
{
"url": "https://docs.qualcomm.com/product/publicresources/securitybulletin/june-2024-bulletin.html",
"source": "product-security@qualcomm.com"
}
]
}

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2023-43543",
"sourceIdentifier": "product-security@qualcomm.com",
"published": "2024-06-03T10:15:10.467",
"lastModified": "2024-06-03T10:15:10.467",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Memory corruption in Audio during a playback or a recording due to race condition between allocation and deallocation of graph object."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "product-security@qualcomm.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 6.7,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 0.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "product-security@qualcomm.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-416"
}
]
}
],
"references": [
{
"url": "https://docs.qualcomm.com/product/publicresources/securitybulletin/june-2024-bulletin.html",
"source": "product-security@qualcomm.com"
}
]
}

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2023-43544",
"sourceIdentifier": "product-security@qualcomm.com",
"published": "2024-06-03T10:15:10.700",
"lastModified": "2024-06-03T10:15:10.700",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Memory corruption when IPC callback handle is used after it has been released during register callback by another thread."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "product-security@qualcomm.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 6.7,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 0.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "product-security@qualcomm.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-416"
}
]
}
],
"references": [
{
"url": "https://docs.qualcomm.com/product/publicresources/securitybulletin/june-2024-bulletin.html",
"source": "product-security@qualcomm.com"
}
]
}

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2023-43545",
"sourceIdentifier": "product-security@qualcomm.com",
"published": "2024-06-03T10:15:10.907",
"lastModified": "2024-06-03T10:15:10.907",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Memory corruption when more scan frequency list or channels are sent from the user space."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "product-security@qualcomm.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 6.7,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 0.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "product-security@qualcomm.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-190"
}
]
}
],
"references": [
{
"url": "https://docs.qualcomm.com/product/publicresources/securitybulletin/june-2024-bulletin.html",
"source": "product-security@qualcomm.com"
}
]
}

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2023-43551",
"sourceIdentifier": "product-security@qualcomm.com",
"published": "2024-06-03T10:15:11.147",
"lastModified": "2024-06-03T10:15:11.147",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Cryptographic issue while performing attach with a LTE network, a rogue base station can skip the authentication phase and immediately send the Security Mode Command."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "product-security@qualcomm.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "NONE",
"baseScore": 9.1,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.2
}
]
},
"weaknesses": [
{
"source": "product-security@qualcomm.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-287"
}
]
}
],
"references": [
{
"url": "https://docs.qualcomm.com/product/publicresources/securitybulletin/june-2024-bulletin.html",
"source": "product-security@qualcomm.com"
}
]
}

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2023-43555",
"sourceIdentifier": "product-security@qualcomm.com",
"published": "2024-06-03T10:15:11.420",
"lastModified": "2024-06-03T10:15:11.420",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Information disclosure in Video while parsing mp2 clip with invalid section length."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "product-security@qualcomm.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "LOW",
"baseScore": 8.2,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 4.2
}
]
},
"weaknesses": [
{
"source": "product-security@qualcomm.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-126"
}
]
}
],
"references": [
{
"url": "https://docs.qualcomm.com/product/publicresources/securitybulletin/june-2024-bulletin.html",
"source": "product-security@qualcomm.com"
}
]
}

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2023-43556",
"sourceIdentifier": "product-security@qualcomm.com",
"published": "2024-06-03T10:15:11.673",
"lastModified": "2024-06-03T10:15:11.673",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Memory corruption in Hypervisor when platform information mentioned is not aligned."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "product-security@qualcomm.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.3,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 2.5,
"impactScore": 6.0
}
]
},
"weaknesses": [
{
"source": "product-security@qualcomm.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-120"
}
]
}
],
"references": [
{
"url": "https://docs.qualcomm.com/product/publicresources/securitybulletin/june-2024-bulletin.html",
"source": "product-security@qualcomm.com"
}
]
}

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2024-21478",
"sourceIdentifier": "product-security@qualcomm.com",
"published": "2024-06-03T10:15:11.907",
"lastModified": "2024-06-03T10:15:11.907",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "transient DOS when setting up a fence callback to free a KGSL memory entry object during DMA."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "product-security@qualcomm.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 6.2,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.5,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "product-security@qualcomm.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-704"
}
]
}
],
"references": [
{
"url": "https://docs.qualcomm.com/product/publicresources/securitybulletin/june-2024-bulletin.html",
"source": "product-security@qualcomm.com"
}
]
}

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2024-23360",
"sourceIdentifier": "product-security@qualcomm.com",
"published": "2024-06-03T10:15:12.130",
"lastModified": "2024-06-03T10:15:12.130",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Memory corruption while creating a LPAC client as LPAC engine was allowed to access GPU registers."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "product-security@qualcomm.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.4,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.5,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "product-security@qualcomm.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-284"
}
]
}
],
"references": [
{
"url": "https://docs.qualcomm.com/product/publicresources/securitybulletin/june-2024-bulletin.html",
"source": "product-security@qualcomm.com"
}
]
}

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2024-23363",
"sourceIdentifier": "product-security@qualcomm.com",
"published": "2024-06-03T10:15:12.377",
"lastModified": "2024-06-03T10:15:12.377",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Transient DOS while processing an improperly formatted Fine Time Measurement (FTM) management frame."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "product-security@qualcomm.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "product-security@qualcomm.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-126"
}
]
}
],
"references": [
{
"url": "https://docs.qualcomm.com/product/publicresources/securitybulletin/june-2024-bulletin.html",
"source": "product-security@qualcomm.com"
}
]
}

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2024-23664",
"sourceIdentifier": "psirt@fortinet.com",
"published": "2024-06-03T10:15:12.620",
"lastModified": "2024-06-03T10:15:12.620",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "A URL redirection to untrusted site ('open redirect') in Fortinet FortiAuthenticator version 6.6.0, version 6.5.3 and below, version 6.4.9 and below may allow an attacker to to redirect users to an arbitrary website via a crafted URL."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "psirt@fortinet.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7
}
]
},
"weaknesses": [
{
"source": "psirt@fortinet.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-601"
}
]
}
],
"references": [
{
"url": "https://fortiguard.fortinet.com/psirt/FG-IR-23-465",
"source": "psirt@fortinet.com"
}
]
}

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2024-23665",
"sourceIdentifier": "psirt@fortinet.com",
"published": "2024-06-03T10:15:12.870",
"lastModified": "2024-06-03T10:15:12.870",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Multiple improper authorization vulnerabilities [CWE-285] in FortiWeb version 7.4.2 and below, version 7.2.7 and below, version 7.0.10 and below, version 6.4.3 and below, version 6.3.23 and below may allow an authenticated attacker to perform unauthorized ADOM operations via crafted requests."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "psirt@fortinet.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 5.9,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.6,
"impactScore": 4.2
}
]
},
"weaknesses": [
{
"source": "psirt@fortinet.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-285"
}
]
}
],
"references": [
{
"url": "https://fortiguard.fortinet.com/psirt/FG-IR-23-474",
"source": "psirt@fortinet.com"
}
]
}

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2024-23667",
"sourceIdentifier": "psirt@fortinet.com",
"published": "2024-06-03T10:15:13.100",
"lastModified": "2024-06-03T10:15:13.100",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "An improper authorization in Fortinet FortiWebManager version 7.2.0 and 7.0.0 through 7.0.4 and 6.3.0 and 6.2.3 through 6.2.4 and 6.0.2 allows attacker to execute unauthorized code or commands via HTTP requests or CLI."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "psirt@fortinet.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "psirt@fortinet.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-285"
}
]
}
],
"references": [
{
"url": "https://fortiguard.fortinet.com/psirt/FG-IR-23-222",
"source": "psirt@fortinet.com"
}
]
}

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2024-23668",
"sourceIdentifier": "psirt@fortinet.com",
"published": "2024-06-03T10:15:13.320",
"lastModified": "2024-06-03T10:15:13.320",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "An improper authorization in Fortinet FortiWebManager version 7.2.0 and 7.0.0 through 7.0.4 and 6.3.0 and 6.2.3 through 6.2.4 and 6.0.2 allows attacker to execute unauthorized code or commands via HTTP requests or CLI."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "psirt@fortinet.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "psirt@fortinet.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-20"
}
]
}
],
"references": [
{
"url": "https://fortiguard.fortinet.com/psirt/FG-IR-23-222",
"source": "psirt@fortinet.com"
}
]
}

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2024-23670",
"sourceIdentifier": "psirt@fortinet.com",
"published": "2024-06-03T10:15:13.523",
"lastModified": "2024-06-03T10:15:13.523",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "An improper authorization in Fortinet FortiWebManager version 7.2.0 and 7.0.0 through 7.0.4 and 6.3.0 and 6.2.3 through 6.2.4 and 6.0.2 allows attacker to execute unauthorized code or commands via HTTP requests or CLI."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "psirt@fortinet.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "psirt@fortinet.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-285"
}
]
}
],
"references": [
{
"url": "https://fortiguard.fortinet.com/psirt/FG-IR-23-222",
"source": "psirt@fortinet.com"
}
]
}

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2024-34754",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-06-03T11:15:08.743",
"lastModified": "2024-06-03T11:15:08.743",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Exposure of Sensitive Information to an Unauthorized Actor vulnerability in A WP Life Contact Form Widget.This issue affects Contact Form Widget: from n/a through 1.3.9."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 3.9,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-200"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/new-contact-form-widget/wordpress-contact-form-widget-plugin-1-3-9-sensitive-data-exposure-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2024-34789",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-06-03T11:15:09.003",
"lastModified": "2024-06-03T11:15:09.003",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in WP Hait Post Grid Elementor Addon allows Stored XSS.This issue affects Post Grid Elementor Addon: from n/a through 2.0.16."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW",
"baseScore": 6.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.3,
"impactScore": 3.7
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/post-grid-elementor-addon/wordpress-post-grid-elementor-addon-plugin-2-0-16-cross-site-scripting-xss-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2024-34790",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-06-03T11:15:09.233",
"lastModified": "2024-06-03T11:15:09.233",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Hans van Eijsden,niwreg ImageMagick Sharpen Resized Images allows Stored XSS.This issue affects ImageMagick Sharpen Resized Images: from n/a through 1.1.7."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW",
"baseScore": 5.9,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.7,
"impactScore": 3.7
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/imagemagick-sharpen-resized-images/wordpress-download-imagemagick-sharpen-resized-images-plugin-1-1-7-cross-site-scripting-xss-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2024-34791",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-06-03T11:15:09.467",
"lastModified": "2024-06-03T11:15:09.467",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in wpbean WPB Elementor Addons allows Stored XSS.This issue affects WPB Elementor Addons: from n/a through 1.0.9."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW",
"baseScore": 6.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.3,
"impactScore": 3.7
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/wpb-elementor-addons/wordpress-wpb-elementor-addons-plugin-1-0-9-cross-site-scripting-xss-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2024-34793",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-06-03T11:15:09.687",
"lastModified": "2024-06-03T11:15:09.687",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Kharim Tomlinson WP Next Post Navi allows Stored XSS.This issue affects WP Next Post Navi: from n/a through 1.8.3."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW",
"baseScore": 5.9,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.7,
"impactScore": 3.7
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/wp-next-post-navi/wordpress-wp-next-post-navi-plugin-1-8-3-cross-site-scripting-xss-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2024-34794",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-06-03T11:15:09.917",
"lastModified": "2024-06-03T11:15:09.917",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Tainacan.Org Tainacan allows Reflected XSS.This issue affects Tainacan: from n/a through 0.21.3."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW",
"baseScore": 7.1,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 3.7
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/tainacan/wordpress-tainacan-plugin-0-21-3-cross-site-scripting-xss-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2024-34795",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-06-03T11:15:10.133",
"lastModified": "2024-06-03T11:15:10.133",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Tainacan.Org Tainacan allows Stored XSS.This issue affects Tainacan: from n/a through 0.21.3."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW",
"baseScore": 6.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.3,
"impactScore": 3.7
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/tainacan/wordpress-tainacan-plugin-0-21-3-cross-site-scripting-xss-vulnerability-2?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2024-34796",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-06-03T11:15:10.360",
"lastModified": "2024-06-03T11:15:10.360",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in AccessAlly PopupAlly allows Stored XSS.This issue affects PopupAlly: from n/a through 2.1.1."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW",
"baseScore": 5.9,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.7,
"impactScore": 3.7
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/popupally/wordpress-popupally-plugin-2-1-1-cross-site-scripting-xss-vulnerability-2?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2024-34797",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-06-03T11:15:10.580",
"lastModified": "2024-06-03T11:15:10.580",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Benoit Mercusot Simple Popup Manager allows Stored XSS.This issue affects Simple Popup Manager: from n/a through 1.3.5."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW",
"baseScore": 5.9,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.7,
"impactScore": 3.7
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/simple-popup-manager/wordpress-simple-popup-manager-plugin-1-3-5-cross-site-scripting-xss-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2024-34798",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-06-03T11:15:10.813",
"lastModified": "2024-06-03T11:15:10.813",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Insertion of Sensitive Information into Log File vulnerability in Lukman Nakib Debug Log \u2013 Manger Tool.This issue affects Debug Log \u2013 Manger Tool: from n/a through 1.4.5."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 3.9,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-532"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/debug-log-config-tool/wordpress-debug-log-manger-tool-plugin-1-4-5-sensitive-data-exposure-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2024-34801",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-06-03T11:15:11.040",
"lastModified": "2024-06-03T11:15:11.040",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Mervin Praison Praison SEO WordPress allows Stored XSS.This issue affects Praison SEO WordPress: from n/a through 4.0.15."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW",
"baseScore": 6.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.3,
"impactScore": 3.7
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/seo-wordpress/wordpress-praison-seo-wordpress-plugin-4-0-15-cross-site-scripting-xss-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2024-34803",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-06-03T11:15:11.270",
"lastModified": "2024-06-03T11:15:11.270",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Missing Authorization vulnerability in Fastly.This issue affects Fastly: from n/a through 1.2.25."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-862"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/fastly/wordpress-fastly-plugin-1-2-25-broken-access-control-vulnerability-2?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2024-35630",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-06-03T11:15:11.520",
"lastModified": "2024-06-03T11:15:11.520",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in LJ Apps WP TripAdvisor Review Slider allows Blind SQL Injection.This issue affects WP TripAdvisor Review Slider: from n/a through 12.6."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "LOW",
"baseScore": 7.6,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.3,
"impactScore": 4.7
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/wp-tripadvisor-review-slider/wordpress-wp-tripadvisor-review-slider-plugin-12-6-sql-injection-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2024-35631",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-06-03T11:15:11.740",
"lastModified": "2024-06-03T11:15:11.740",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Foliovision FV Flowplayer Video Player allows Reflected XSS.This issue affects FV Flowplayer Video Player: from n/a through 7.5.45.7212."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW",
"baseScore": 7.1,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 3.7
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/fv-wordpress-flowplayer/wordpress-fv-flowplayer-video-player-plugin-7-5-45-7212-cross-site-scripting-xss-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2024-35633",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-06-03T10:15:13.720",
"lastModified": "2024-06-03T10:15:13.720",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Server-Side Request Forgery (SSRF) vulnerability in CreativeThemes Blocksy Companion.This issue affects Blocksy Companion: from n/a through 2.0.42."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 4.4,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.3,
"impactScore": 2.7
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-918"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/blocksy-companion/wordpress-blocksy-companion-plugin-2-0-42-server-side-request-forgery-ssrf-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2024-35635",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-06-03T10:15:14.050",
"lastModified": "2024-06-03T10:15:14.050",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Server-Side Request Forgery (SSRF) vulnerability in WPManageNinja LLC Ninja Tables.This issue affects Ninja Tables: from n/a through 5.0.9."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 4.4,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.3,
"impactScore": 2.7
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-918"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/ninja-tables/wordpress-ninja-tables-plugin-5-0-9-server-side-request-forgery-ssrf-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -0,0 +1,59 @@
{
"id": "CVE-2024-3829",
"sourceIdentifier": "security@huntr.dev",
"published": "2024-06-03T10:15:14.267",
"lastModified": "2024-06-03T10:15:14.267",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "qdrant/qdrant version 1.9.0-dev is vulnerable to arbitrary file read and write during the snapshot recovery process. Attackers can exploit this vulnerability by manipulating snapshot files to include symlinks, leading to arbitrary file read by adding a symlink that points to a desired file on the filesystem and arbitrary file write by including a symlink and a payload file in the snapshot's directory structure. This vulnerability allows for the reading and writing of arbitrary files on the server, which could potentially lead to a full takeover of the system. The issue is fixed in version v1.9.0."
}
],
"metrics": {
"cvssMetricV30": [
{
"source": "security@huntr.dev",
"type": "Secondary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "security@huntr.dev",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-20"
}
]
}
],
"references": [
{
"url": "https://github.com/qdrant/qdrant/commit/ee7a31ec3459a6a4219200234615c1817ab82260",
"source": "security@huntr.dev"
},
{
"url": "https://huntr.com/bounties/abd9c906-75ee-4d84-b76d-ce1386401e08",
"source": "security@huntr.dev"
}
]
}

View File

@ -8,6 +8,10 @@
{
"lang": "en",
"value": "An unauthenticated remote attacker\u00a0can change the admin password in a\u00a0moneo appliance due to weak password recovery mechanism.\n"
},
{
"lang": "es",
"value": "Un atacante remoto no autenticado puede cambiar la contrase\u00f1a de administrador en un dispositivo moneo debido a un mecanismo de recuperaci\u00f3n de contrase\u00f1a d\u00e9bil."
}
],
"metrics": {

View File

@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update
```plain
2024-06-03T10:00:37.862736+00:00
2024-06-03T12:00:38.593869+00:00
```
### Most recent CVE Modification Timestamp synchronized with NVD
```plain
2024-06-03T09:15:10.193000+00:00
2024-06-03T11:15:11.740000+00:00
```
### Last Data Feed Release
@ -33,33 +33,45 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
### Total Number of included CVEs
```plain
252409
252443
```
### CVEs added in the last Commit
Recently added CVEs: `13`
Recently added CVEs: `34`
- [CVE-2023-48789](CVE-2023/CVE-2023-487xx/CVE-2023-48789.json) (`2024-06-03T08:15:08.507`)
- [CVE-2024-23107](CVE-2024/CVE-2024-231xx/CVE-2024-23107.json) (`2024-06-03T08:15:08.837`)
- [CVE-2024-31493](CVE-2024/CVE-2024-314xx/CVE-2024-31493.json) (`2024-06-03T08:15:09.097`)
- [CVE-2024-35637](CVE-2024/CVE-2024-356xx/CVE-2024-35637.json) (`2024-06-03T09:15:09.390`)
- [CVE-2024-35638](CVE-2024/CVE-2024-356xx/CVE-2024-35638.json) (`2024-06-03T09:15:09.703`)
- [CVE-2024-35639](CVE-2024/CVE-2024-356xx/CVE-2024-35639.json) (`2024-06-03T09:15:09.947`)
- [CVE-2024-35640](CVE-2024/CVE-2024-356xx/CVE-2024-35640.json) (`2024-06-03T08:15:09.330`)
- [CVE-2024-36960](CVE-2024/CVE-2024-369xx/CVE-2024-36960.json) (`2024-06-03T08:15:09.557`)
- [CVE-2024-36961](CVE-2024/CVE-2024-369xx/CVE-2024-36961.json) (`2024-06-03T08:15:09.660`)
- [CVE-2024-36962](CVE-2024/CVE-2024-369xx/CVE-2024-36962.json) (`2024-06-03T08:15:09.740`)
- [CVE-2024-36963](CVE-2024/CVE-2024-369xx/CVE-2024-36963.json) (`2024-06-03T08:15:09.820`)
- [CVE-2024-36964](CVE-2024/CVE-2024-369xx/CVE-2024-36964.json) (`2024-06-03T08:15:09.903`)
- [CVE-2024-5404](CVE-2024/CVE-2024-54xx/CVE-2024-5404.json) (`2024-06-03T09:15:10.193`)
- [CVE-2024-21478](CVE-2024/CVE-2024-214xx/CVE-2024-21478.json) (`2024-06-03T10:15:11.907`)
- [CVE-2024-23360](CVE-2024/CVE-2024-233xx/CVE-2024-23360.json) (`2024-06-03T10:15:12.130`)
- [CVE-2024-23363](CVE-2024/CVE-2024-233xx/CVE-2024-23363.json) (`2024-06-03T10:15:12.377`)
- [CVE-2024-23664](CVE-2024/CVE-2024-236xx/CVE-2024-23664.json) (`2024-06-03T10:15:12.620`)
- [CVE-2024-23665](CVE-2024/CVE-2024-236xx/CVE-2024-23665.json) (`2024-06-03T10:15:12.870`)
- [CVE-2024-23667](CVE-2024/CVE-2024-236xx/CVE-2024-23667.json) (`2024-06-03T10:15:13.100`)
- [CVE-2024-23668](CVE-2024/CVE-2024-236xx/CVE-2024-23668.json) (`2024-06-03T10:15:13.320`)
- [CVE-2024-23670](CVE-2024/CVE-2024-236xx/CVE-2024-23670.json) (`2024-06-03T10:15:13.523`)
- [CVE-2024-34754](CVE-2024/CVE-2024-347xx/CVE-2024-34754.json) (`2024-06-03T11:15:08.743`)
- [CVE-2024-34789](CVE-2024/CVE-2024-347xx/CVE-2024-34789.json) (`2024-06-03T11:15:09.003`)
- [CVE-2024-34790](CVE-2024/CVE-2024-347xx/CVE-2024-34790.json) (`2024-06-03T11:15:09.233`)
- [CVE-2024-34791](CVE-2024/CVE-2024-347xx/CVE-2024-34791.json) (`2024-06-03T11:15:09.467`)
- [CVE-2024-34793](CVE-2024/CVE-2024-347xx/CVE-2024-34793.json) (`2024-06-03T11:15:09.687`)
- [CVE-2024-34794](CVE-2024/CVE-2024-347xx/CVE-2024-34794.json) (`2024-06-03T11:15:09.917`)
- [CVE-2024-34795](CVE-2024/CVE-2024-347xx/CVE-2024-34795.json) (`2024-06-03T11:15:10.133`)
- [CVE-2024-34796](CVE-2024/CVE-2024-347xx/CVE-2024-34796.json) (`2024-06-03T11:15:10.360`)
- [CVE-2024-34797](CVE-2024/CVE-2024-347xx/CVE-2024-34797.json) (`2024-06-03T11:15:10.580`)
- [CVE-2024-34798](CVE-2024/CVE-2024-347xx/CVE-2024-34798.json) (`2024-06-03T11:15:10.813`)
- [CVE-2024-34801](CVE-2024/CVE-2024-348xx/CVE-2024-34801.json) (`2024-06-03T11:15:11.040`)
- [CVE-2024-34803](CVE-2024/CVE-2024-348xx/CVE-2024-34803.json) (`2024-06-03T11:15:11.270`)
- [CVE-2024-35630](CVE-2024/CVE-2024-356xx/CVE-2024-35630.json) (`2024-06-03T11:15:11.520`)
- [CVE-2024-35631](CVE-2024/CVE-2024-356xx/CVE-2024-35631.json) (`2024-06-03T11:15:11.740`)
- [CVE-2024-35633](CVE-2024/CVE-2024-356xx/CVE-2024-35633.json) (`2024-06-03T10:15:13.720`)
- [CVE-2024-35635](CVE-2024/CVE-2024-356xx/CVE-2024-35635.json) (`2024-06-03T10:15:14.050`)
- [CVE-2024-3829](CVE-2024/CVE-2024-38xx/CVE-2024-3829.json) (`2024-06-03T10:15:14.267`)
### CVEs modified in the last Commit
Recently modified CVEs: `1`
- [CVE-2024-5311](CVE-2024/CVE-2024-53xx/CVE-2024-5311.json) (`2024-06-03T07:15:10.163`)
- [CVE-2024-5404](CVE-2024/CVE-2024-54xx/CVE-2024-5404.json) (`2024-06-03T09:15:10.193`)
## Download and Usage

View File

@ -232067,18 +232067,27 @@ CVE-2023-43533,0,0,cec1346ee365b50af03fb7e0ce641c9f914a9a51fe3e4e72d4a1c1a0cbf8c
CVE-2023-43534,0,0,dba7439cea4cfc2b29f72af250575fb4036c5493c63694f3d269d919ecc92250,2024-04-12T16:15:35.230000
CVE-2023-43535,0,0,e1269d8d312a2ceaa4b0553616412d9d494e38e4a6f1965a466dad52b8ea60f6,2024-04-12T16:15:35.560000
CVE-2023-43536,0,0,76e2708fa3e9111d6523fd70d0293d879b927b408b44f21ef24c6fb42c1f6097,2024-04-12T16:15:35.820000
CVE-2023-43537,1,1,1e51cbaadb4db61c51a04b49147eb517e1d05c253892920587cccccbdea42475,2024-06-03T10:15:09.063000
CVE-2023-43538,1,1,7efd06eefef8a0ae3dc4431e092e96470a555317fa943b6556de5331cda560e8,2024-06-03T10:15:09.937000
CVE-2023-43539,0,0,a0d10ac25ff0d0f37bc7234eb89facc9efab87ef1fcabd6c86ec9bbddc79c96c,2024-04-12T15:15:21.433000
CVE-2023-4354,0,0,b3a04d1006e2f4eb94ee005944358fcae0c2bb0f216ffa6497c71e2291933a60,2024-01-31T17:15:14.710000
CVE-2023-43540,0,0,efd650e6595c39c8362f88b761fdae11642adf9b9bde5b2fe188649abb18f8e1,2024-04-12T15:15:21.530000
CVE-2023-43541,0,0,dfd1eb041ceb949b871d4f726bdc740a09a5ddb58d3ab0fafb1e00d5a19881d9,2024-04-12T15:15:21.620000
CVE-2023-43542,1,1,2241cd6b97d978010e5cc33b5d5efcadb49989ec603305757a8cf384b9888e5a,2024-06-03T10:15:10.220000
CVE-2023-43543,1,1,3f18f59589c3c54ba389cca8e8a40a8684d0aac7c81e50f686a026025fd43b89,2024-06-03T10:15:10.467000
CVE-2023-43544,1,1,a10b94476746a2b405891b3e8f7bf4692399157f962f6383603ebe3b3840a6ad,2024-06-03T10:15:10.700000
CVE-2023-43545,1,1,dbbc8faca15dc2c1118283e9db3106032cc58c2467ff147307803df401dedaa9,2024-06-03T10:15:10.907000
CVE-2023-43546,0,0,89e5afff2dc3b88b31894eab3ce43642da3b283fc6cb7d2e88a199d429ebcad3,2024-04-12T15:15:21.713000
CVE-2023-43547,0,0,450a59a4b4e1770738d3c56ace390dc05069b1396f6d86001db3ed0a662fe9c5,2024-04-12T15:15:21.810000
CVE-2023-43548,0,0,08de2551449157c1420de1efb291b07e659743dfd8e0661fd70a491331034253,2024-04-12T15:15:21.907000
CVE-2023-43549,0,0,f1de5fa849a4658fa863c5a64278b564558b0de4b9f2143d5edf8ce7fec403b4,2024-04-12T15:15:22.003000
CVE-2023-4355,0,0,c361aa021bb0626a0e307b5cf33dd51fde9986638cf0f3a141e01925b83f1585,2024-01-31T17:15:14.840000
CVE-2023-43550,0,0,1355e44b0bdef7fc02eec66c7d8c4c8822fa31e3406d0ce44b05faf4ddcb0384,2024-04-12T15:15:22.110000
CVE-2023-43551,1,1,8189c89b3908130b9d13005d0d874bbcd3f8ede7ba2818c6f346aa0df6e68155,2024-06-03T10:15:11.147000
CVE-2023-43552,0,0,219a820f0d74d0eccbb21dd32fa4737b1fbff83065edd3c67c682afa52aaf7a9,2024-04-12T15:15:22.210000
CVE-2023-43553,0,0,3824e0ea8ed5ad8dde20da11270e38123e4d2d966d89aa1a0e668fc6b193a630,2024-04-12T15:15:22.310000
CVE-2023-43555,1,1,242eeb2fd5c965c2fd5393936cc73afa54815744d6510c886d351ef16ac0441e,2024-06-03T10:15:11.420000
CVE-2023-43556,1,1,c8ad3699c541fdfeb7ce585844fcacf6cae91cc37b184913313012644c269d41,2024-06-03T10:15:11.673000
CVE-2023-4356,0,0,51f331be3605818c8ee40c6a87e55b57af1424a9aa9525f64ed6c38dd6cd0ef5,2024-01-31T17:15:14.917000
CVE-2023-43566,0,0,efdf21754c3a0ae7401b084dc8cb36a979c1eb2760f721e694f6e12bacd4880b,2023-09-21T20:01:48.277000
CVE-2023-43567,0,0,9c0ac93c4f06b0c8e85604350b7bccc39b0ec28259b140e4614d9cc5a5c35bf7,2023-11-16T14:27:01.117000
@ -235698,7 +235707,7 @@ CVE-2023-48782,0,0,88145c135f3d36dc2324e589083cb79dceef7bf357c73c33782a57f9910e4
CVE-2023-48783,0,0,ebc0e9b096de11f5bb2feb6ecedfda87f1114290b6bb005e0f4f19fb8a6d2ef6,2024-01-17T18:24:38.617000
CVE-2023-48784,0,0,2c8c9b5cd73fccd6bf717ce3db3d03b76214161101a0e621003f928d07a57cf5,2024-04-17T12:15:07.353000
CVE-2023-48788,0,0,a76225488769211eb3f82baf06e8c2fdae1734ff7e897a76c118d8a783dbc141,2024-05-23T18:00:08.207000
CVE-2023-48789,1,1,0571bd4a37f3c97e6d8e9b10601719eec33455abb7eb3af2a2662d718dd67176,2024-06-03T08:15:08.507000
CVE-2023-48789,0,0,0571bd4a37f3c97e6d8e9b10601719eec33455abb7eb3af2a2662d718dd67176,2024-06-03T08:15:08.507000
CVE-2023-4879,0,0,8ff2f4fac231edfb0e8e6c6042e670dbdf0da9230931b634f3b1ed60cbdab258,2023-09-18T18:58:43.767000
CVE-2023-48791,0,0,4e7d2cae3ad6ba11c4e276624bedca77887a0ee315b409ddadb10bd81db3bb45,2023-12-15T20:09:24.010000
CVE-2023-48792,0,0,a3c17617afe01ace18242f14c2f591f70a09281fccef1129ab04ab7743ac5ed0,2024-02-09T19:41:33.093000
@ -242707,6 +242716,7 @@ CVE-2024-21474,0,0,f2a0bb0689e81550825d1ea2ff18872b7ed9732f71b1df2a783fa00cbbba9
CVE-2024-21475,0,0,08ca02671a08696ba0c7516ccba2f78b5a25c25f05d4d934fd4396db32490a97,2024-05-06T16:00:59.253000
CVE-2024-21476,0,0,f7f3a41ab53efd1329a1fcafe8a5c0bf5a6daefaebcf82c3ccffee4519748663,2024-05-06T16:00:59.253000
CVE-2024-21477,0,0,2dfc1d466e14269455d623dbe436a1e6d9dccf3c01b4aaeec3bd9b9f104b4ac3,2024-05-06T16:00:59.253000
CVE-2024-21478,1,1,8f23a8cef733da9e745bc6f343469dcb38f73d49eb0921f3eacf7ed7e631023e,2024-06-03T10:15:11.907000
CVE-2024-2148,0,0,f9ad2f00527f5c10697ce47ba63c57e584aab0240fc88e91a15c3572a9aa5790,2024-05-17T02:38:04.387000
CVE-2024-21480,0,0,8440778e45413c0e24db83877880d3ede6fda18ff0fea3fa59c66be00cec51d0,2024-05-06T16:00:59.253000
CVE-2024-21483,0,0,9151aea81f4a61f57a2b42ef8dafe022eeea7af379bf181ee6a30f8665567492,2024-03-12T12:40:13.500000
@ -243587,7 +243597,7 @@ CVE-2024-2309,0,0,5e7d16d6f71f2f007544bcbcc47dd8107c18e2714e36b52143e4572bbdc634
CVE-2024-23094,0,0,8b7fd2c37601b9f636934db44ed8e567ef20eff4d921df465afdbb6ef925a041,2024-02-22T19:07:27.197000
CVE-2024-2310,0,0,0edce614ca737c9f4f6f172b9fca4020b1a932854b13e864a7ef93ffce2dc5e8,2024-04-26T12:58:17.720000
CVE-2024-23105,0,0,4f4ecfc1737be07823bcaafc96e8879d6b5c3ae1db58c428ada8e62f19153579,2024-05-23T15:52:39.123000
CVE-2024-23107,1,1,f95c78068a77be131b17b383b5dedbee5d41921bd626de291cf3de54dc105567,2024-06-03T08:15:08.837000
CVE-2024-23107,0,0,f95c78068a77be131b17b383b5dedbee5d41921bd626de291cf3de54dc105567,2024-06-03T08:15:08.837000
CVE-2024-23108,0,0,4bd66ae4e2150cd9c3073e095bacf489de77af9a273b611e130c3e3fa4edf7ea,2024-02-07T15:02:00.203000
CVE-2024-23109,0,0,c2686a38cd2651bfef8ab0e98ee0dbcce98e98fd7c1f1805290cb9df9c03fe78,2024-02-07T15:04:28.237000
CVE-2024-2311,0,0,738ffcbe7f411809b0dd04835f3243a6f3350cd455230e0887015d402141b408,2024-04-10T13:23:38.787000
@ -243794,6 +243804,8 @@ CVE-2024-2335,0,0,efe1e2a5a88779dcaa56517f16fc8862179b5ee96c6455caf55add5931f2e1
CVE-2024-23351,0,0,55afa2a1096cf0aa167ae828427ca9b1e7daf36842c51c8fe0621b3f0ec14617,2024-05-06T16:00:59.253000
CVE-2024-23354,0,0,524905b4df533efbcae0403dea5cdcdf4f507ec96e09f870f5c27c0b03f65fe6,2024-05-06T16:00:59.253000
CVE-2024-2336,0,0,858071e914ebaea9fbe161c5ef8e540e29b84f9d635c439141db287421da0568,2024-04-10T13:23:38.787000
CVE-2024-23360,1,1,f4d7ebb62940d9b72d8217b342fc2cced03dc772827b2c8f674afdd4c3507cbf,2024-06-03T10:15:12.130000
CVE-2024-23363,1,1,cb81ab11c9be5032cf51438c8bb838acdabdbdf9d75fbd6f58c3f689a12af21a,2024-06-03T10:15:12.377000
CVE-2024-2338,0,0,2d543a556e65d2c959c15e10c3e9a74031d18693370229ae5e1770e5ef380b4c,2024-03-08T21:19:43.127000
CVE-2024-23387,0,0,651b9110a70ec6d8150b78d412ab0c449da5b24d5059a74c85bc0d06b6759568,2024-01-25T02:00:29.210000
CVE-2024-23388,0,0,d9ef291f69bac73e9b23ebc37df19469f57319d5ff49c901cd1cd709d40899ff,2024-02-05T15:18:21.920000
@ -243959,6 +243971,11 @@ CVE-2024-23659,0,0,236290b059375e8b7040b3505591889202adcca1fe58c9cff8e0844cbcf32
CVE-2024-2366,0,0,561eca4f7d46892009230ef936eca60ce1d593865f21bb5667643256074aa468,2024-05-16T13:03:05.353000
CVE-2024-23660,0,0,1b2c29c1f9877409e81cc31263cb621728177876460bb697b8348507998614a6,2024-02-15T16:01:29.370000
CVE-2024-23662,0,0,878b23e10c46382d5166f21a5ce8b15ca491a34151aa70377e6758a415cbb56d,2024-04-10T13:24:22.187000
CVE-2024-23664,1,1,8d13f5909d1e04bfe76cf46330cbbcfd5a4af39ba418f383f73a06f325faf92d,2024-06-03T10:15:12.620000
CVE-2024-23665,1,1,fce25590082d66baca226d442317a35953cf3b4cc205d6acdf98115c98799274,2024-06-03T10:15:12.870000
CVE-2024-23667,1,1,94a6dbe54c65e75f8fb555e6711753fed006ebd88cbbc6984c1189cb31f1ec8f,2024-06-03T10:15:13.100000
CVE-2024-23668,1,1,4fec4864cea612333f7d910f8fefddcc9af0defe95285c4ca6a47c3696cc11fe,2024-06-03T10:15:13.320000
CVE-2024-23670,1,1,402f6750bcbc5d007fc1f77fcfb835cf819ac6b21f9a302b79af91b4b28ce95d,2024-06-03T10:15:13.523000
CVE-2024-23671,0,0,108c61a6aa74a9b71687a2e3aa153a422c4a0c3adcd258415c5b065e1ef21ae7,2024-04-10T13:24:22.187000
CVE-2024-23672,0,0,ecf21cf6fef0fb9a72fe820ee02e2854b5a2d1575ce42cd766c4a52761cff3de,2024-05-01T18:15:14.357000
CVE-2024-23673,0,0,11a42dc617628e4138314e2a3d8d0f02b60cec9315a80bc3284ec5f1547fd09f,2024-02-14T00:26:41.517000
@ -248821,7 +248838,7 @@ CVE-2024-31487,0,0,ffef7fcdc05bb476a1f2c02c71de4a76075ea7f0301d6a8889db629ce9b19
CVE-2024-31488,0,0,8fd4ea2d7a10d03e6cc8df9fdf21315abd98246cc112d9626a2dc74747d004e0,2024-05-14T19:17:55.627000
CVE-2024-31491,0,0,5f002356f8390a8ec883fdc05cbd199fbc913871302dee308e6ee0aa04c7ac67,2024-05-14T19:17:55.627000
CVE-2024-31492,0,0,a251126d380ad734bdcae40155276c0c8cd0f78c057d6c232814179759c90bf9,2024-04-10T19:49:51.183000
CVE-2024-31493,1,1,eb92f9f4c4feadf3b90c327ee2008f971dfc30631ea4767017e0b0d47be4af71,2024-06-03T08:15:09.097000
CVE-2024-31493,0,0,eb92f9f4c4feadf3b90c327ee2008f971dfc30631ea4767017e0b0d47be4af71,2024-06-03T08:15:09.097000
CVE-2024-31497,0,0,4e1eafb2dcb4144981ef085a5b8158282c3a0977a083d73fc04d3f981acbd1e7,2024-05-10T14:33:55.323000
CVE-2024-31498,0,0,db3c4e2337e3fccc66e084ef6016d8532925f451bef4124b0c2782f0c54d90b6,2024-04-08T00:15:08
CVE-2024-31502,0,0,52fc3984aab146fd5296bbc2584fa31ec06529d852df83c020a3abdb54510354,2024-04-29T12:42:03.667000
@ -250494,6 +250511,7 @@ CVE-2024-34749,0,0,a26a9cdaa6b9cdd859ea0f8895bc1e27a45773d0dd4321619e9dcf295b3f2
CVE-2024-3475,0,0,e528ec7d5c8727ea0d98d659186b040308d5844df7467319e5b573505cdc6e7c,2024-05-02T13:27:25.103000
CVE-2024-34751,0,0,3bc824c76b005bef3c5502f774f511888cffc942b3953fc4e78f3f0d8ad9e615,2024-05-17T18:36:31.297000
CVE-2024-34752,0,0,242ab90c6a96e91b737168caac935dedcfed36964913472cce8df4bff8adef50,2024-05-17T18:36:05.263000
CVE-2024-34754,1,1,9d58b9d4cf84f7418dbd746b56c4062b86032da2cb5552e8ea4fc0d14e34509b,2024-06-03T11:15:08.743000
CVE-2024-34755,0,0,d9d093e244bdb9881814a581fcf0cceddc50257ae74dd4a27a2c1f59b6cdc217,2024-05-17T18:35:35.070000
CVE-2024-34756,0,0,c1f51cb5304487e29b0a4c8a67e9d115a4f2b56ac322e60a8774a285c457e7c0,2024-05-17T18:35:35.070000
CVE-2024-34757,0,0,57042a3bb13f31e69b5b7fd23a19541f4fa2fb8db07ba9037fc775417523a9d1,2024-05-17T18:36:05.263000
@ -250504,8 +250522,19 @@ CVE-2024-34771,0,0,deaa281b48d1539fc4d88a99f2c542da7d2f97b319dd410ab53213b70ec8b
CVE-2024-34772,0,0,635f5a0bcdcc084928ed60d40a3f5691181a54a2efa05b50e13ad7462247110c,2024-05-14T19:17:55.627000
CVE-2024-34773,0,0,8d4786b71411a201832db647dece110e046d5ed6169dce1446e93616263bacee,2024-05-14T19:17:55.627000
CVE-2024-3478,0,0,ae882595ac6fe06ab517c1e505d55eeeed4b5c0450cbd6b83825ab78d9e88f1e,2024-05-02T13:27:25.103000
CVE-2024-34789,1,1,3cd55374ddb45727555a4ddc1e9ad766353350411961927b16c82b2a4be3dee3,2024-06-03T11:15:09.003000
CVE-2024-3479,0,0,fd58a9eee7829eb22d6cfb17d87e6b7652b13a6666535069e70c5a2768e8dce6,2024-05-03T15:32:19.637000
CVE-2024-34790,1,1,1a5b8cee6aa93ad10ba303666024e363953d81c8116b01a1921ab0986e5235bc,2024-06-03T11:15:09.233000
CVE-2024-34791,1,1,63a167b6d65428b715bdce7830adbd5f9dda5b5651667d6a0e8be0e00a3b3049,2024-06-03T11:15:09.467000
CVE-2024-34793,1,1,483b50b8734b95527b8ec11dcfbaa161ab6a0bd04df0a0d4291542559e572729,2024-06-03T11:15:09.687000
CVE-2024-34794,1,1,0fcea07d90a264c294804f910b6665efeed9385e5e6d56e31aace0afd80a626f,2024-06-03T11:15:09.917000
CVE-2024-34795,1,1,91c02cf1e7eeb8503093139ca6f3dd4b5cf591a85079d787fe17433b511dba1f,2024-06-03T11:15:10.133000
CVE-2024-34796,1,1,7b63d24ad2f15c716a204e2f40ba9d35a88899031da8a8b5ad2feece0a7da066,2024-06-03T11:15:10.360000
CVE-2024-34797,1,1,5bb1f3ddf9562d7678b22979eec373c838cdffa4417e576318c8b9ceb77a0b66,2024-06-03T11:15:10.580000
CVE-2024-34798,1,1,55a30b7aba14ebe802fee14a3141374d5bfd8987e086cdcb9c3412887a74ed08,2024-06-03T11:15:10.813000
CVE-2024-3480,0,0,efd268116762f9a268444b69dedc6b75682706697867d3d93c2c71f376810267,2024-05-03T15:32:19.637000
CVE-2024-34801,1,1,5c05e9df68c6a2706d41abfa0924db6473ada533efd49d9bc853a3238dd441f6,2024-06-03T11:15:11.040000
CVE-2024-34803,1,1,e941f12dd43c66f0a30013889c22ee9ae6cb29ead6e0b509b8f398783df82990,2024-06-03T11:15:11.270000
CVE-2024-34805,0,0,4db06c40a60d0ea9fc68ae0b74b3d16b7df09b33205e3b40409d2383df796279,2024-05-17T18:36:31.297000
CVE-2024-34806,0,0,3b1b6563ba887546de6e8afcda84fbe0c4e88d6cd4a9afa2164171d94fd3a99a,2024-05-17T18:35:35.070000
CVE-2024-34807,0,0,1b210e8fbd98db6886fdf7153f61122f9d59a5653f7e82ad43004bb026f58b60,2024-05-17T18:35:35.070000
@ -250798,12 +250827,16 @@ CVE-2024-3560,0,0,66c1a96b1f1d19ab8c2a91f30bb939a8ccde028ecd6951f27029cb1628de4d
CVE-2024-35618,0,0,fc2572e9e8823eb6313bf2bb54c527fc11c4117d0d0837dc8f8794515acd3b77,2024-05-24T18:09:20.027000
CVE-2024-35621,0,0,eff37f6109cc46dfb019de6bac1c1e4ffe46087d96bb684a690c4e1a8342c7d1,2024-05-28T17:11:47.007000
CVE-2024-35627,0,0,152f6a140367536a1e62d9a33b0213a3c0edb39ccbba33db112f0915411e954b,2024-05-24T01:15:30.977000
CVE-2024-35630,1,1,89264cd1a4afa71b588d04af1510e9f5fa30a567bc8836139f915a641c8706ca,2024-06-03T11:15:11.520000
CVE-2024-35631,1,1,7cbcaa0d94470af5584922933479b84fa5109af34d8b31d9b44346e9e0480e51,2024-06-03T11:15:11.740000
CVE-2024-35633,1,1,d1b53e557a63ad400682b1f460ac520a7a728625610b8f88b299e9e3a666395f,2024-06-03T10:15:13.720000
CVE-2024-35635,1,1,a6648ac54f661e5b4a9c3c92e46de6c4e3ce5718e4b099218271b0d9ff75cc45,2024-06-03T10:15:14.050000
CVE-2024-35636,0,0,50355c13300a6ac082e1c483b1ab0ef66d8d81a837d0b58fd86ac7bbb9fe7982,2024-06-01T09:15:08.983000
CVE-2024-35637,1,1,a3bbaca3340add97b05922e5f3b6c323a82a11ee28efa6dacd9faac985e017af,2024-06-03T09:15:09.390000
CVE-2024-35638,1,1,d40f8eb039698819fa66f21f9769dac9687415417efb672407b31b270ecc7aa0,2024-06-03T09:15:09.703000
CVE-2024-35639,1,1,a9f6ceacf0b15e8d73d02a0e44ba7f868caccb9abf6430e27ee988ea745ef246,2024-06-03T09:15:09.947000
CVE-2024-35637,0,0,a3bbaca3340add97b05922e5f3b6c323a82a11ee28efa6dacd9faac985e017af,2024-06-03T09:15:09.390000
CVE-2024-35638,0,0,d40f8eb039698819fa66f21f9769dac9687415417efb672407b31b270ecc7aa0,2024-06-03T09:15:09.703000
CVE-2024-35639,0,0,a9f6ceacf0b15e8d73d02a0e44ba7f868caccb9abf6430e27ee988ea745ef246,2024-06-03T09:15:09.947000
CVE-2024-3564,0,0,126b0ad745c05ac2b6e0879d574d7c57b3c5395a16548c8e712a48ce4bee21ab,2024-06-01T04:15:08.743000
CVE-2024-35640,1,1,358aecfa6522bfb60c0852d09cc5e4f8adc292000e1c5dc1db7c810f50935a8d,2024-06-03T08:15:09.330000
CVE-2024-35640,0,0,358aecfa6522bfb60c0852d09cc5e4f8adc292000e1c5dc1db7c810f50935a8d,2024-06-03T08:15:09.330000
CVE-2024-35641,0,0,ad916927f4dc66b26e37a696884d9ea1315a0f444182d47bd127409ab7975d3a,2024-06-03T07:15:09.100000
CVE-2024-35642,0,0,5f0cf1abc8073c52dfacad8fd9b2a937ae549d5addf8a17283021c02e90c70af,2024-06-03T07:15:09.560000
CVE-2024-35643,0,0,c2e75a738c426c54e453512f0b08e3b439606dd23983e8834340678e0539f0e2,2024-06-03T07:15:09.850000
@ -251304,11 +251337,11 @@ CVE-2024-36957,0,0,14a25382151b1945f300cd0f690fdd6ed21995daebf481bf33bcbc3cfcf88
CVE-2024-36958,0,0,27ba702862686ffcbfc7435dcc4011c841c4be08d6d6bff774be51941829ca30,2024-05-30T18:18:58.870000
CVE-2024-36959,0,0,d6bbacbe3376b8ea605862991764d4131cc35403035f548e6498def7a4bbd69c,2024-05-30T18:18:58.870000
CVE-2024-3696,0,0,54c8c42492f1c31e1d0d081b12ae9fb101d447905039b557dcc4372130239b90,2024-05-17T02:40:04.613000
CVE-2024-36960,1,1,acf3c6f441eac5469a9c25fd1ebfdd6f1cf461c1d844318f9c119d13aa112a81,2024-06-03T08:15:09.557000
CVE-2024-36961,1,1,f6fb90cc986c6069fd23d1d9888817e08e921f71b08213bf2b70aa68a6c4297d,2024-06-03T08:15:09.660000
CVE-2024-36962,1,1,0786e9d15d91a5bfc2f5fd63a100e44f0f095cc32cc0a7e91d3e96757091e975,2024-06-03T08:15:09.740000
CVE-2024-36963,1,1,6783d7e9cad5d6855f4047fc4da40186696c7d06fdbfcf7e02f88b8f9412d9ad,2024-06-03T08:15:09.820000
CVE-2024-36964,1,1,ab7328b637a6af08291107a29c8eba501cdb343a15c8c594a58247f3b8e08077,2024-06-03T08:15:09.903000
CVE-2024-36960,0,0,acf3c6f441eac5469a9c25fd1ebfdd6f1cf461c1d844318f9c119d13aa112a81,2024-06-03T08:15:09.557000
CVE-2024-36961,0,0,f6fb90cc986c6069fd23d1d9888817e08e921f71b08213bf2b70aa68a6c4297d,2024-06-03T08:15:09.660000
CVE-2024-36962,0,0,0786e9d15d91a5bfc2f5fd63a100e44f0f095cc32cc0a7e91d3e96757091e975,2024-06-03T08:15:09.740000
CVE-2024-36963,0,0,6783d7e9cad5d6855f4047fc4da40186696c7d06fdbfcf7e02f88b8f9412d9ad,2024-06-03T08:15:09.820000
CVE-2024-36964,0,0,ab7328b637a6af08291107a29c8eba501cdb343a15c8c594a58247f3b8e08077,2024-06-03T08:15:09.903000
CVE-2024-3697,0,0,cc8cf5a7af305c88ebdfa6655aacb4fa5ec406664965d679a29a0cbf17ffb930,2024-05-17T02:40:04.710000
CVE-2024-3698,0,0,13b4029eb6179dbe788598788e16556a1995d850ddfc4af1ee0c4e86961a3a21,2024-05-17T02:40:04.800000
CVE-2024-3701,0,0,d78f52a76181001272debccb095fb5971bb478ebc111313d9ff2994f4ec0598f,2024-04-15T13:15:31.997000
@ -251419,6 +251452,7 @@ CVE-2024-3823,0,0,cd28ea160a68276fdd70271b0ec926d19fdc3598e922bafa9bf05d9fdd41ea
CVE-2024-3824,0,0,8545575d3e734e1433cd4d7c91c77cd29907e6f5ee87d4739239efdf13c20f26,2024-05-15T16:40:19.330000
CVE-2024-3825,0,0,f398f78dcc905612b8b1fff020bcc62d405b80ffdf3a9053d9f90f163c40baa7,2024-04-17T15:31:50.160000
CVE-2024-3828,0,0,57a9b409ca1cac39bc20af9eb7a4e7dcc3bae1882e9b3a8ca25cdf22dad097ef,2024-05-14T16:11:39.510000
CVE-2024-3829,1,1,119f47ebf6538814f476e14f1daa8260cc404e5b9a6cfc3dc44621c320ff0d3e,2024-06-03T10:15:14.267000
CVE-2024-3831,0,0,28fa4e2fb2524144138a610966fa5501c7b19e1083bb04e4062bd6679bbd2a31,2024-05-14T16:11:39.510000
CVE-2024-3832,0,0,1075b96952121645fbb81b228e0c3813e39db7e21c4c9aa1fc24c30b61618c13,2024-04-23T18:15:15.187000
CVE-2024-3833,0,0,ba630503495cf2aaf1fce7ce704a30930ed35eb1665a53e19102e8c18f607a36,2024-05-03T03:16:28.940000
@ -252300,7 +252334,7 @@ CVE-2024-5297,0,0,00a87902d7cb688c5f453a52360105eb024acff7ed2743a841cec085f6c70d
CVE-2024-5298,0,0,06eb32cfed51faae03040e262c135cd2456565f192a3fa9c39d1028a133d926f,2024-05-24T01:15:30.977000
CVE-2024-5299,0,0,ae65325eb08b6dc79f15a33a7800bb0b9af221d170dea70dbcb229fe698b5075,2024-05-24T01:15:30.977000
CVE-2024-5310,0,0,aff5601be87ae3c08dc3ce041153e17c3e7a6faa41ba6b44778c9142e5941031,2024-05-24T13:03:05.093000
CVE-2024-5311,0,1,bc0dd8fe2c9b76c0164439ed50a0a9214ee8a9c28beab0c44f8ee299d96c6945,2024-06-03T07:15:10.163000
CVE-2024-5311,0,0,bc0dd8fe2c9b76c0164439ed50a0a9214ee8a9c28beab0c44f8ee299d96c6945,2024-06-03T07:15:10.163000
CVE-2024-5312,0,0,3a9d8301087c1d7edb8976207e286d0d247ebf6ccf4b5edb4137e81b02e5ec2b,2024-05-24T13:03:05.093000
CVE-2024-5314,0,0,fb6304ffb5d50ce8724d643a46fad25ba80695f7c0c0eb4ec33a07d41bc4980a,2024-05-24T13:03:05.093000
CVE-2024-5315,0,0,e1b0baaf93d62cf125eea53091da57c404cdf61d625ae810529ebef84e73357d,2024-05-24T13:03:05.093000
@ -252362,7 +252396,7 @@ CVE-2024-5397,0,0,3fa492ac656a0dc8b44c0c2439095185551e47b9b3d1d85bd44fafa325950b
CVE-2024-5399,0,0,fa7eef6bbf34e07faf1acdcbb967da16ac637ca3df72c0acc1bd2e0f60228b23,2024-05-28T12:39:28.377000
CVE-2024-5400,0,0,d3c501060bf431388a2cf50edbec679a7265e7c25a2addcb59a0d9057b8884e3,2024-05-28T12:39:28.377000
CVE-2024-5403,0,0,21ef2036234b077bc1f129f4d78aa7befab02d334c0d4840a63d95ad54da2b3d,2024-05-28T12:39:28.377000
CVE-2024-5404,1,1,2f2c39786498ab4718cdc5931c7e32f2881d2453b1870cf774e75a751aeadd2e,2024-06-03T09:15:10.193000
CVE-2024-5404,0,1,42c1d4f54ccd945d042e8c46560bbcfa89e4a0b2f053599bf0821dd3b72846fe,2024-06-03T09:15:10.193000
CVE-2024-5405,0,0,0726f3329c87a86f8903abd8a0efb034839b1c4fb01bb69fa1c55fb7fdc0b2ce,2024-05-28T12:39:28.377000
CVE-2024-5406,0,0,128407d22b74a56625ebded67c527f89f63de550e972932c839965bdff9c4612,2024-05-28T12:39:28.377000
CVE-2024-5407,0,0,2fcd76e27db1c908eadad490ca75346b74b5c01495e67a00eb793a48de914bb1,2024-05-28T12:39:28.377000

Can't render this file because it is too large.