diff --git a/CVE-2023/CVE-2023-435xx/CVE-2023-43537.json b/CVE-2023/CVE-2023-435xx/CVE-2023-43537.json new file mode 100644 index 00000000000..bd0cadd9f90 --- /dev/null +++ b/CVE-2023/CVE-2023-435xx/CVE-2023-43537.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2023-43537", + "sourceIdentifier": "product-security@qualcomm.com", + "published": "2024-06-03T10:15:09.063", + "lastModified": "2024-06-03T10:15:09.063", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Information disclosure while handling T2LM Action Frame in WLAN Host." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "product-security@qualcomm.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "LOW", + "baseScore": 6.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 3.9, + "impactScore": 2.5 + } + ] + }, + "weaknesses": [ + { + "source": "product-security@qualcomm.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-126" + } + ] + } + ], + "references": [ + { + "url": "https://docs.qualcomm.com/product/publicresources/securitybulletin/june-2024-bulletin.html", + "source": "product-security@qualcomm.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-435xx/CVE-2023-43538.json b/CVE-2023/CVE-2023-435xx/CVE-2023-43538.json new file mode 100644 index 00000000000..a67767ffeb2 --- /dev/null +++ b/CVE-2023/CVE-2023-435xx/CVE-2023-43538.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2023-43538", + "sourceIdentifier": "product-security@qualcomm.com", + "published": "2024-06-03T10:15:09.937", + "lastModified": "2024-06-03T10:15:09.937", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Memory corruption in TZ Secure OS while Tunnel Invoke Manager initialization." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "product-security@qualcomm.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.3, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 2.5, + "impactScore": 6.0 + } + ] + }, + "weaknesses": [ + { + "source": "product-security@qualcomm.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-120" + } + ] + } + ], + "references": [ + { + "url": "https://docs.qualcomm.com/product/publicresources/securitybulletin/june-2024-bulletin.html", + "source": "product-security@qualcomm.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-435xx/CVE-2023-43542.json b/CVE-2023/CVE-2023-435xx/CVE-2023-43542.json new file mode 100644 index 00000000000..d914850145f --- /dev/null +++ b/CVE-2023/CVE-2023-435xx/CVE-2023-43542.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2023-43542", + "sourceIdentifier": "product-security@qualcomm.com", + "published": "2024-06-03T10:15:10.220", + "lastModified": "2024-06-03T10:15:10.220", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Memory corruption while copying a keyblob`s material when the key material`s size is not accurately checked." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "product-security@qualcomm.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "product-security@qualcomm.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-120" + } + ] + } + ], + "references": [ + { + "url": "https://docs.qualcomm.com/product/publicresources/securitybulletin/june-2024-bulletin.html", + "source": "product-security@qualcomm.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-435xx/CVE-2023-43543.json b/CVE-2023/CVE-2023-435xx/CVE-2023-43543.json new file mode 100644 index 00000000000..2f5c67e15bf --- /dev/null +++ b/CVE-2023/CVE-2023-435xx/CVE-2023-43543.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2023-43543", + "sourceIdentifier": "product-security@qualcomm.com", + "published": "2024-06-03T10:15:10.467", + "lastModified": "2024-06-03T10:15:10.467", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Memory corruption in Audio during a playback or a recording due to race condition between allocation and deallocation of graph object." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "product-security@qualcomm.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 6.7, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 0.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "product-security@qualcomm.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-416" + } + ] + } + ], + "references": [ + { + "url": "https://docs.qualcomm.com/product/publicresources/securitybulletin/june-2024-bulletin.html", + "source": "product-security@qualcomm.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-435xx/CVE-2023-43544.json b/CVE-2023/CVE-2023-435xx/CVE-2023-43544.json new file mode 100644 index 00000000000..f312681afa2 --- /dev/null +++ b/CVE-2023/CVE-2023-435xx/CVE-2023-43544.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2023-43544", + "sourceIdentifier": "product-security@qualcomm.com", + "published": "2024-06-03T10:15:10.700", + "lastModified": "2024-06-03T10:15:10.700", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Memory corruption when IPC callback handle is used after it has been released during register callback by another thread." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "product-security@qualcomm.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 6.7, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 0.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "product-security@qualcomm.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-416" + } + ] + } + ], + "references": [ + { + "url": "https://docs.qualcomm.com/product/publicresources/securitybulletin/june-2024-bulletin.html", + "source": "product-security@qualcomm.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-435xx/CVE-2023-43545.json b/CVE-2023/CVE-2023-435xx/CVE-2023-43545.json new file mode 100644 index 00000000000..2867a57a50f --- /dev/null +++ b/CVE-2023/CVE-2023-435xx/CVE-2023-43545.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2023-43545", + "sourceIdentifier": "product-security@qualcomm.com", + "published": "2024-06-03T10:15:10.907", + "lastModified": "2024-06-03T10:15:10.907", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Memory corruption when more scan frequency list or channels are sent from the user space." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "product-security@qualcomm.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 6.7, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 0.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "product-security@qualcomm.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-190" + } + ] + } + ], + "references": [ + { + "url": "https://docs.qualcomm.com/product/publicresources/securitybulletin/june-2024-bulletin.html", + "source": "product-security@qualcomm.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-435xx/CVE-2023-43551.json b/CVE-2023/CVE-2023-435xx/CVE-2023-43551.json new file mode 100644 index 00000000000..8ff7553d3a6 --- /dev/null +++ b/CVE-2023/CVE-2023-435xx/CVE-2023-43551.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2023-43551", + "sourceIdentifier": "product-security@qualcomm.com", + "published": "2024-06-03T10:15:11.147", + "lastModified": "2024-06-03T10:15:11.147", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Cryptographic issue while performing attach with a LTE network, a rogue base station can skip the authentication phase and immediately send the Security Mode Command." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "product-security@qualcomm.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 9.1, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.2 + } + ] + }, + "weaknesses": [ + { + "source": "product-security@qualcomm.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-287" + } + ] + } + ], + "references": [ + { + "url": "https://docs.qualcomm.com/product/publicresources/securitybulletin/june-2024-bulletin.html", + "source": "product-security@qualcomm.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-435xx/CVE-2023-43555.json b/CVE-2023/CVE-2023-435xx/CVE-2023-43555.json new file mode 100644 index 00000000000..952e32ccdb5 --- /dev/null +++ b/CVE-2023/CVE-2023-435xx/CVE-2023-43555.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2023-43555", + "sourceIdentifier": "product-security@qualcomm.com", + "published": "2024-06-03T10:15:11.420", + "lastModified": "2024-06-03T10:15:11.420", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Information disclosure in Video while parsing mp2 clip with invalid section length." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "product-security@qualcomm.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "LOW", + "baseScore": 8.2, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 4.2 + } + ] + }, + "weaknesses": [ + { + "source": "product-security@qualcomm.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-126" + } + ] + } + ], + "references": [ + { + "url": "https://docs.qualcomm.com/product/publicresources/securitybulletin/june-2024-bulletin.html", + "source": "product-security@qualcomm.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-435xx/CVE-2023-43556.json b/CVE-2023/CVE-2023-435xx/CVE-2023-43556.json new file mode 100644 index 00000000000..c87d85d1f61 --- /dev/null +++ b/CVE-2023/CVE-2023-435xx/CVE-2023-43556.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2023-43556", + "sourceIdentifier": "product-security@qualcomm.com", + "published": "2024-06-03T10:15:11.673", + "lastModified": "2024-06-03T10:15:11.673", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Memory corruption in Hypervisor when platform information mentioned is not aligned." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "product-security@qualcomm.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.3, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 2.5, + "impactScore": 6.0 + } + ] + }, + "weaknesses": [ + { + "source": "product-security@qualcomm.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-120" + } + ] + } + ], + "references": [ + { + "url": "https://docs.qualcomm.com/product/publicresources/securitybulletin/june-2024-bulletin.html", + "source": "product-security@qualcomm.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-214xx/CVE-2024-21478.json b/CVE-2024/CVE-2024-214xx/CVE-2024-21478.json new file mode 100644 index 00000000000..67c8dcf786c --- /dev/null +++ b/CVE-2024/CVE-2024-214xx/CVE-2024-21478.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2024-21478", + "sourceIdentifier": "product-security@qualcomm.com", + "published": "2024-06-03T10:15:11.907", + "lastModified": "2024-06-03T10:15:11.907", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "transient DOS when setting up a fence callback to free a KGSL memory entry object during DMA." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "product-security@qualcomm.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 6.2, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.5, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "product-security@qualcomm.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-704" + } + ] + } + ], + "references": [ + { + "url": "https://docs.qualcomm.com/product/publicresources/securitybulletin/june-2024-bulletin.html", + "source": "product-security@qualcomm.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-233xx/CVE-2024-23360.json b/CVE-2024/CVE-2024-233xx/CVE-2024-23360.json new file mode 100644 index 00000000000..07797cb9fd0 --- /dev/null +++ b/CVE-2024/CVE-2024-233xx/CVE-2024-23360.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2024-23360", + "sourceIdentifier": "product-security@qualcomm.com", + "published": "2024-06-03T10:15:12.130", + "lastModified": "2024-06-03T10:15:12.130", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Memory corruption while creating a LPAC client as LPAC engine was allowed to access GPU registers." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "product-security@qualcomm.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.4, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.5, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "product-security@qualcomm.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-284" + } + ] + } + ], + "references": [ + { + "url": "https://docs.qualcomm.com/product/publicresources/securitybulletin/june-2024-bulletin.html", + "source": "product-security@qualcomm.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-233xx/CVE-2024-23363.json b/CVE-2024/CVE-2024-233xx/CVE-2024-23363.json new file mode 100644 index 00000000000..cd3ebd65ef7 --- /dev/null +++ b/CVE-2024/CVE-2024-233xx/CVE-2024-23363.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2024-23363", + "sourceIdentifier": "product-security@qualcomm.com", + "published": "2024-06-03T10:15:12.377", + "lastModified": "2024-06-03T10:15:12.377", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Transient DOS while processing an improperly formatted Fine Time Measurement (FTM) management frame." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "product-security@qualcomm.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "product-security@qualcomm.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-126" + } + ] + } + ], + "references": [ + { + "url": "https://docs.qualcomm.com/product/publicresources/securitybulletin/june-2024-bulletin.html", + "source": "product-security@qualcomm.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-236xx/CVE-2024-23664.json b/CVE-2024/CVE-2024-236xx/CVE-2024-23664.json new file mode 100644 index 00000000000..65c1cad8b84 --- /dev/null +++ b/CVE-2024/CVE-2024-236xx/CVE-2024-23664.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2024-23664", + "sourceIdentifier": "psirt@fortinet.com", + "published": "2024-06-03T10:15:12.620", + "lastModified": "2024-06-03T10:15:12.620", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "A URL redirection to untrusted site ('open redirect') in Fortinet FortiAuthenticator version 6.6.0, version 6.5.3 and below, version 6.4.9 and below may allow an attacker to to redirect users to an arbitrary website via a crafted URL." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@fortinet.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 6.1, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@fortinet.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-601" + } + ] + } + ], + "references": [ + { + "url": "https://fortiguard.fortinet.com/psirt/FG-IR-23-465", + "source": "psirt@fortinet.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-236xx/CVE-2024-23665.json b/CVE-2024/CVE-2024-236xx/CVE-2024-23665.json new file mode 100644 index 00000000000..12e77f9af42 --- /dev/null +++ b/CVE-2024/CVE-2024-236xx/CVE-2024-23665.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2024-23665", + "sourceIdentifier": "psirt@fortinet.com", + "published": "2024-06-03T10:15:12.870", + "lastModified": "2024-06-03T10:15:12.870", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Multiple improper authorization vulnerabilities [CWE-285] in FortiWeb version 7.4.2 and below, version 7.2.7 and below, version 7.0.10 and below, version 6.4.3 and below, version 6.3.23 and below may allow an authenticated attacker to perform unauthorized ADOM operations via crafted requests." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@fortinet.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.9, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.6, + "impactScore": 4.2 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@fortinet.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-285" + } + ] + } + ], + "references": [ + { + "url": "https://fortiguard.fortinet.com/psirt/FG-IR-23-474", + "source": "psirt@fortinet.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-236xx/CVE-2024-23667.json b/CVE-2024/CVE-2024-236xx/CVE-2024-23667.json new file mode 100644 index 00000000000..0cb4a130193 --- /dev/null +++ b/CVE-2024/CVE-2024-236xx/CVE-2024-23667.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2024-23667", + "sourceIdentifier": "psirt@fortinet.com", + "published": "2024-06-03T10:15:13.100", + "lastModified": "2024-06-03T10:15:13.100", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "An improper authorization in Fortinet FortiWebManager version 7.2.0 and 7.0.0 through 7.0.4 and 6.3.0 and 6.2.3 through 6.2.4 and 6.0.2 allows attacker to execute unauthorized code or commands via HTTP requests or CLI." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@fortinet.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@fortinet.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-285" + } + ] + } + ], + "references": [ + { + "url": "https://fortiguard.fortinet.com/psirt/FG-IR-23-222", + "source": "psirt@fortinet.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-236xx/CVE-2024-23668.json b/CVE-2024/CVE-2024-236xx/CVE-2024-23668.json new file mode 100644 index 00000000000..752f32ceaf5 --- /dev/null +++ b/CVE-2024/CVE-2024-236xx/CVE-2024-23668.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2024-23668", + "sourceIdentifier": "psirt@fortinet.com", + "published": "2024-06-03T10:15:13.320", + "lastModified": "2024-06-03T10:15:13.320", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "An improper authorization in Fortinet FortiWebManager version 7.2.0 and 7.0.0 through 7.0.4 and 6.3.0 and 6.2.3 through 6.2.4 and 6.0.2 allows attacker to execute unauthorized code or commands via HTTP requests or CLI." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@fortinet.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@fortinet.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-20" + } + ] + } + ], + "references": [ + { + "url": "https://fortiguard.fortinet.com/psirt/FG-IR-23-222", + "source": "psirt@fortinet.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-236xx/CVE-2024-23670.json b/CVE-2024/CVE-2024-236xx/CVE-2024-23670.json new file mode 100644 index 00000000000..5d3f4830943 --- /dev/null +++ b/CVE-2024/CVE-2024-236xx/CVE-2024-23670.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2024-23670", + "sourceIdentifier": "psirt@fortinet.com", + "published": "2024-06-03T10:15:13.523", + "lastModified": "2024-06-03T10:15:13.523", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "An improper authorization in Fortinet FortiWebManager version 7.2.0 and 7.0.0 through 7.0.4 and 6.3.0 and 6.2.3 through 6.2.4 and 6.0.2 allows attacker to execute unauthorized code or commands via HTTP requests or CLI." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@fortinet.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@fortinet.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-285" + } + ] + } + ], + "references": [ + { + "url": "https://fortiguard.fortinet.com/psirt/FG-IR-23-222", + "source": "psirt@fortinet.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-347xx/CVE-2024-34754.json b/CVE-2024/CVE-2024-347xx/CVE-2024-34754.json new file mode 100644 index 00000000000..afcf0feda23 --- /dev/null +++ b/CVE-2024/CVE-2024-347xx/CVE-2024-34754.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2024-34754", + "sourceIdentifier": "audit@patchstack.com", + "published": "2024-06-03T11:15:08.743", + "lastModified": "2024-06-03T11:15:08.743", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Exposure of Sensitive Information to an Unauthorized Actor vulnerability in A WP Life Contact Form Widget.This issue affects Contact Form Widget: from n/a through 1.3.9." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 5.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-200" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/vulnerability/new-contact-form-widget/wordpress-contact-form-widget-plugin-1-3-9-sensitive-data-exposure-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-347xx/CVE-2024-34789.json b/CVE-2024/CVE-2024-347xx/CVE-2024-34789.json new file mode 100644 index 00000000000..182b64c3fc6 --- /dev/null +++ b/CVE-2024/CVE-2024-347xx/CVE-2024-34789.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2024-34789", + "sourceIdentifier": "audit@patchstack.com", + "published": "2024-06-03T11:15:09.003", + "lastModified": "2024-06-03T11:15:09.003", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in WP Hait Post Grid Elementor Addon allows Stored XSS.This issue affects Post Grid Elementor Addon: from n/a through 2.0.16." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 6.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.3, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/vulnerability/post-grid-elementor-addon/wordpress-post-grid-elementor-addon-plugin-2-0-16-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-347xx/CVE-2024-34790.json b/CVE-2024/CVE-2024-347xx/CVE-2024-34790.json new file mode 100644 index 00000000000..e95c742ff82 --- /dev/null +++ b/CVE-2024/CVE-2024-347xx/CVE-2024-34790.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2024-34790", + "sourceIdentifier": "audit@patchstack.com", + "published": "2024-06-03T11:15:09.233", + "lastModified": "2024-06-03T11:15:09.233", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Hans van Eijsden,niwreg ImageMagick Sharpen Resized Images allows Stored XSS.This issue affects ImageMagick Sharpen Resized Images: from n/a through 1.1.7." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 5.9, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.7, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/vulnerability/imagemagick-sharpen-resized-images/wordpress-download-imagemagick-sharpen-resized-images-plugin-1-1-7-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-347xx/CVE-2024-34791.json b/CVE-2024/CVE-2024-347xx/CVE-2024-34791.json new file mode 100644 index 00000000000..aa4bd1d01f2 --- /dev/null +++ b/CVE-2024/CVE-2024-347xx/CVE-2024-34791.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2024-34791", + "sourceIdentifier": "audit@patchstack.com", + "published": "2024-06-03T11:15:09.467", + "lastModified": "2024-06-03T11:15:09.467", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in wpbean WPB Elementor Addons allows Stored XSS.This issue affects WPB Elementor Addons: from n/a through 1.0.9." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 6.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.3, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/vulnerability/wpb-elementor-addons/wordpress-wpb-elementor-addons-plugin-1-0-9-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-347xx/CVE-2024-34793.json b/CVE-2024/CVE-2024-347xx/CVE-2024-34793.json new file mode 100644 index 00000000000..7e1442b6390 --- /dev/null +++ b/CVE-2024/CVE-2024-347xx/CVE-2024-34793.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2024-34793", + "sourceIdentifier": "audit@patchstack.com", + "published": "2024-06-03T11:15:09.687", + "lastModified": "2024-06-03T11:15:09.687", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Kharim Tomlinson WP Next Post Navi allows Stored XSS.This issue affects WP Next Post Navi: from n/a through 1.8.3." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 5.9, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.7, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/vulnerability/wp-next-post-navi/wordpress-wp-next-post-navi-plugin-1-8-3-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-347xx/CVE-2024-34794.json b/CVE-2024/CVE-2024-347xx/CVE-2024-34794.json new file mode 100644 index 00000000000..9e6bcea63c5 --- /dev/null +++ b/CVE-2024/CVE-2024-347xx/CVE-2024-34794.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2024-34794", + "sourceIdentifier": "audit@patchstack.com", + "published": "2024-06-03T11:15:09.917", + "lastModified": "2024-06-03T11:15:09.917", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Tainacan.Org Tainacan allows Reflected XSS.This issue affects Tainacan: from n/a through 0.21.3." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 7.1, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/vulnerability/tainacan/wordpress-tainacan-plugin-0-21-3-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-347xx/CVE-2024-34795.json b/CVE-2024/CVE-2024-347xx/CVE-2024-34795.json new file mode 100644 index 00000000000..882510f98b0 --- /dev/null +++ b/CVE-2024/CVE-2024-347xx/CVE-2024-34795.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2024-34795", + "sourceIdentifier": "audit@patchstack.com", + "published": "2024-06-03T11:15:10.133", + "lastModified": "2024-06-03T11:15:10.133", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Tainacan.Org Tainacan allows Stored XSS.This issue affects Tainacan: from n/a through 0.21.3." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 6.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.3, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/vulnerability/tainacan/wordpress-tainacan-plugin-0-21-3-cross-site-scripting-xss-vulnerability-2?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-347xx/CVE-2024-34796.json b/CVE-2024/CVE-2024-347xx/CVE-2024-34796.json new file mode 100644 index 00000000000..6c77b1db817 --- /dev/null +++ b/CVE-2024/CVE-2024-347xx/CVE-2024-34796.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2024-34796", + "sourceIdentifier": "audit@patchstack.com", + "published": "2024-06-03T11:15:10.360", + "lastModified": "2024-06-03T11:15:10.360", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in AccessAlly PopupAlly allows Stored XSS.This issue affects PopupAlly: from n/a through 2.1.1." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 5.9, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.7, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/vulnerability/popupally/wordpress-popupally-plugin-2-1-1-cross-site-scripting-xss-vulnerability-2?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-347xx/CVE-2024-34797.json b/CVE-2024/CVE-2024-347xx/CVE-2024-34797.json new file mode 100644 index 00000000000..71ac29689b5 --- /dev/null +++ b/CVE-2024/CVE-2024-347xx/CVE-2024-34797.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2024-34797", + "sourceIdentifier": "audit@patchstack.com", + "published": "2024-06-03T11:15:10.580", + "lastModified": "2024-06-03T11:15:10.580", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Benoit Mercusot Simple Popup Manager allows Stored XSS.This issue affects Simple Popup Manager: from n/a through 1.3.5." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 5.9, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.7, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/vulnerability/simple-popup-manager/wordpress-simple-popup-manager-plugin-1-3-5-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-347xx/CVE-2024-34798.json b/CVE-2024/CVE-2024-347xx/CVE-2024-34798.json new file mode 100644 index 00000000000..fac5ee39fe8 --- /dev/null +++ b/CVE-2024/CVE-2024-347xx/CVE-2024-34798.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2024-34798", + "sourceIdentifier": "audit@patchstack.com", + "published": "2024-06-03T11:15:10.813", + "lastModified": "2024-06-03T11:15:10.813", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Insertion of Sensitive Information into Log File vulnerability in Lukman Nakib Debug Log \u2013 Manger Tool.This issue affects Debug Log \u2013 Manger Tool: from n/a through 1.4.5." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 5.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-532" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/vulnerability/debug-log-config-tool/wordpress-debug-log-manger-tool-plugin-1-4-5-sensitive-data-exposure-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-348xx/CVE-2024-34801.json b/CVE-2024/CVE-2024-348xx/CVE-2024-34801.json new file mode 100644 index 00000000000..9f6e3fd8ce2 --- /dev/null +++ b/CVE-2024/CVE-2024-348xx/CVE-2024-34801.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2024-34801", + "sourceIdentifier": "audit@patchstack.com", + "published": "2024-06-03T11:15:11.040", + "lastModified": "2024-06-03T11:15:11.040", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Mervin Praison Praison SEO WordPress allows Stored XSS.This issue affects Praison SEO WordPress: from n/a through 4.0.15." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 6.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.3, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/vulnerability/seo-wordpress/wordpress-praison-seo-wordpress-plugin-4-0-15-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-348xx/CVE-2024-34803.json b/CVE-2024/CVE-2024-348xx/CVE-2024-34803.json new file mode 100644 index 00000000000..2f6c962d3b5 --- /dev/null +++ b/CVE-2024/CVE-2024-348xx/CVE-2024-34803.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2024-34803", + "sourceIdentifier": "audit@patchstack.com", + "published": "2024-06-03T11:15:11.270", + "lastModified": "2024-06-03T11:15:11.270", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Missing Authorization vulnerability in Fastly.This issue affects Fastly: from n/a through 1.2.25." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 4.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/vulnerability/fastly/wordpress-fastly-plugin-1-2-25-broken-access-control-vulnerability-2?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-356xx/CVE-2024-35630.json b/CVE-2024/CVE-2024-356xx/CVE-2024-35630.json new file mode 100644 index 00000000000..55a5609e53c --- /dev/null +++ b/CVE-2024/CVE-2024-356xx/CVE-2024-35630.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2024-35630", + "sourceIdentifier": "audit@patchstack.com", + "published": "2024-06-03T11:15:11.520", + "lastModified": "2024-06-03T11:15:11.520", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in LJ Apps WP TripAdvisor Review Slider allows Blind SQL Injection.This issue affects WP TripAdvisor Review Slider: from n/a through 12.6." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "LOW", + "baseScore": 7.6, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.3, + "impactScore": 4.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/vulnerability/wp-tripadvisor-review-slider/wordpress-wp-tripadvisor-review-slider-plugin-12-6-sql-injection-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-356xx/CVE-2024-35631.json b/CVE-2024/CVE-2024-356xx/CVE-2024-35631.json new file mode 100644 index 00000000000..61ea705c0b8 --- /dev/null +++ b/CVE-2024/CVE-2024-356xx/CVE-2024-35631.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2024-35631", + "sourceIdentifier": "audit@patchstack.com", + "published": "2024-06-03T11:15:11.740", + "lastModified": "2024-06-03T11:15:11.740", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Foliovision FV Flowplayer Video Player allows Reflected XSS.This issue affects FV Flowplayer Video Player: from n/a through 7.5.45.7212." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 7.1, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/vulnerability/fv-wordpress-flowplayer/wordpress-fv-flowplayer-video-player-plugin-7-5-45-7212-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-356xx/CVE-2024-35633.json b/CVE-2024/CVE-2024-356xx/CVE-2024-35633.json new file mode 100644 index 00000000000..b81ecf7131e --- /dev/null +++ b/CVE-2024/CVE-2024-356xx/CVE-2024-35633.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2024-35633", + "sourceIdentifier": "audit@patchstack.com", + "published": "2024-06-03T10:15:13.720", + "lastModified": "2024-06-03T10:15:13.720", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Server-Side Request Forgery (SSRF) vulnerability in CreativeThemes Blocksy Companion.This issue affects Blocksy Companion: from n/a through 2.0.42." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 4.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.3, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-918" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/vulnerability/blocksy-companion/wordpress-blocksy-companion-plugin-2-0-42-server-side-request-forgery-ssrf-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-356xx/CVE-2024-35635.json b/CVE-2024/CVE-2024-356xx/CVE-2024-35635.json new file mode 100644 index 00000000000..b4c602a66e5 --- /dev/null +++ b/CVE-2024/CVE-2024-356xx/CVE-2024-35635.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2024-35635", + "sourceIdentifier": "audit@patchstack.com", + "published": "2024-06-03T10:15:14.050", + "lastModified": "2024-06-03T10:15:14.050", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Server-Side Request Forgery (SSRF) vulnerability in WPManageNinja LLC Ninja Tables.This issue affects Ninja Tables: from n/a through 5.0.9." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 4.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.3, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-918" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/vulnerability/ninja-tables/wordpress-ninja-tables-plugin-5-0-9-server-side-request-forgery-ssrf-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-38xx/CVE-2024-3829.json b/CVE-2024/CVE-2024-38xx/CVE-2024-3829.json new file mode 100644 index 00000000000..f295ad559e0 --- /dev/null +++ b/CVE-2024/CVE-2024-38xx/CVE-2024-3829.json @@ -0,0 +1,59 @@ +{ + "id": "CVE-2024-3829", + "sourceIdentifier": "security@huntr.dev", + "published": "2024-06-03T10:15:14.267", + "lastModified": "2024-06-03T10:15:14.267", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "qdrant/qdrant version 1.9.0-dev is vulnerable to arbitrary file read and write during the snapshot recovery process. Attackers can exploit this vulnerability by manipulating snapshot files to include symlinks, leading to arbitrary file read by adding a symlink that points to a desired file on the filesystem and arbitrary file write by including a symlink and a payload file in the snapshot's directory structure. This vulnerability allows for the reading and writing of arbitrary files on the server, which could potentially lead to a full takeover of the system. The issue is fixed in version v1.9.0." + } + ], + "metrics": { + "cvssMetricV30": [ + { + "source": "security@huntr.dev", + "type": "Secondary", + "cvssData": { + "version": "3.0", + "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "security@huntr.dev", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-20" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/qdrant/qdrant/commit/ee7a31ec3459a6a4219200234615c1817ab82260", + "source": "security@huntr.dev" + }, + { + "url": "https://huntr.com/bounties/abd9c906-75ee-4d84-b76d-ce1386401e08", + "source": "security@huntr.dev" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-54xx/CVE-2024-5404.json b/CVE-2024/CVE-2024-54xx/CVE-2024-5404.json index bd8a193eb0a..ac21ea22603 100644 --- a/CVE-2024/CVE-2024-54xx/CVE-2024-5404.json +++ b/CVE-2024/CVE-2024-54xx/CVE-2024-5404.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "An unauthenticated remote attacker\u00a0can change the admin password in a\u00a0moneo appliance due to weak password recovery mechanism.\n" + }, + { + "lang": "es", + "value": "Un atacante remoto no autenticado puede cambiar la contrase\u00f1a de administrador en un dispositivo moneo debido a un mecanismo de recuperaci\u00f3n de contrase\u00f1a d\u00e9bil." } ], "metrics": { diff --git a/README.md b/README.md index 78c1a807979..9b71ff2b6d7 100644 --- a/README.md +++ b/README.md @@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2024-06-03T10:00:37.862736+00:00 +2024-06-03T12:00:38.593869+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2024-06-03T09:15:10.193000+00:00 +2024-06-03T11:15:11.740000+00:00 ``` ### Last Data Feed Release @@ -33,33 +33,45 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### Total Number of included CVEs ```plain -252409 +252443 ``` ### CVEs added in the last Commit -Recently added CVEs: `13` +Recently added CVEs: `34` -- [CVE-2023-48789](CVE-2023/CVE-2023-487xx/CVE-2023-48789.json) (`2024-06-03T08:15:08.507`) -- [CVE-2024-23107](CVE-2024/CVE-2024-231xx/CVE-2024-23107.json) (`2024-06-03T08:15:08.837`) -- [CVE-2024-31493](CVE-2024/CVE-2024-314xx/CVE-2024-31493.json) (`2024-06-03T08:15:09.097`) -- [CVE-2024-35637](CVE-2024/CVE-2024-356xx/CVE-2024-35637.json) (`2024-06-03T09:15:09.390`) -- [CVE-2024-35638](CVE-2024/CVE-2024-356xx/CVE-2024-35638.json) (`2024-06-03T09:15:09.703`) -- [CVE-2024-35639](CVE-2024/CVE-2024-356xx/CVE-2024-35639.json) (`2024-06-03T09:15:09.947`) -- [CVE-2024-35640](CVE-2024/CVE-2024-356xx/CVE-2024-35640.json) (`2024-06-03T08:15:09.330`) -- [CVE-2024-36960](CVE-2024/CVE-2024-369xx/CVE-2024-36960.json) (`2024-06-03T08:15:09.557`) -- [CVE-2024-36961](CVE-2024/CVE-2024-369xx/CVE-2024-36961.json) (`2024-06-03T08:15:09.660`) -- [CVE-2024-36962](CVE-2024/CVE-2024-369xx/CVE-2024-36962.json) (`2024-06-03T08:15:09.740`) -- [CVE-2024-36963](CVE-2024/CVE-2024-369xx/CVE-2024-36963.json) (`2024-06-03T08:15:09.820`) -- [CVE-2024-36964](CVE-2024/CVE-2024-369xx/CVE-2024-36964.json) (`2024-06-03T08:15:09.903`) -- [CVE-2024-5404](CVE-2024/CVE-2024-54xx/CVE-2024-5404.json) (`2024-06-03T09:15:10.193`) +- [CVE-2024-21478](CVE-2024/CVE-2024-214xx/CVE-2024-21478.json) (`2024-06-03T10:15:11.907`) +- [CVE-2024-23360](CVE-2024/CVE-2024-233xx/CVE-2024-23360.json) (`2024-06-03T10:15:12.130`) +- [CVE-2024-23363](CVE-2024/CVE-2024-233xx/CVE-2024-23363.json) (`2024-06-03T10:15:12.377`) +- [CVE-2024-23664](CVE-2024/CVE-2024-236xx/CVE-2024-23664.json) (`2024-06-03T10:15:12.620`) +- [CVE-2024-23665](CVE-2024/CVE-2024-236xx/CVE-2024-23665.json) (`2024-06-03T10:15:12.870`) +- [CVE-2024-23667](CVE-2024/CVE-2024-236xx/CVE-2024-23667.json) (`2024-06-03T10:15:13.100`) +- [CVE-2024-23668](CVE-2024/CVE-2024-236xx/CVE-2024-23668.json) (`2024-06-03T10:15:13.320`) +- [CVE-2024-23670](CVE-2024/CVE-2024-236xx/CVE-2024-23670.json) (`2024-06-03T10:15:13.523`) +- [CVE-2024-34754](CVE-2024/CVE-2024-347xx/CVE-2024-34754.json) (`2024-06-03T11:15:08.743`) +- [CVE-2024-34789](CVE-2024/CVE-2024-347xx/CVE-2024-34789.json) (`2024-06-03T11:15:09.003`) +- [CVE-2024-34790](CVE-2024/CVE-2024-347xx/CVE-2024-34790.json) (`2024-06-03T11:15:09.233`) +- [CVE-2024-34791](CVE-2024/CVE-2024-347xx/CVE-2024-34791.json) (`2024-06-03T11:15:09.467`) +- [CVE-2024-34793](CVE-2024/CVE-2024-347xx/CVE-2024-34793.json) (`2024-06-03T11:15:09.687`) +- [CVE-2024-34794](CVE-2024/CVE-2024-347xx/CVE-2024-34794.json) (`2024-06-03T11:15:09.917`) +- [CVE-2024-34795](CVE-2024/CVE-2024-347xx/CVE-2024-34795.json) (`2024-06-03T11:15:10.133`) +- [CVE-2024-34796](CVE-2024/CVE-2024-347xx/CVE-2024-34796.json) (`2024-06-03T11:15:10.360`) +- [CVE-2024-34797](CVE-2024/CVE-2024-347xx/CVE-2024-34797.json) (`2024-06-03T11:15:10.580`) +- [CVE-2024-34798](CVE-2024/CVE-2024-347xx/CVE-2024-34798.json) (`2024-06-03T11:15:10.813`) +- [CVE-2024-34801](CVE-2024/CVE-2024-348xx/CVE-2024-34801.json) (`2024-06-03T11:15:11.040`) +- [CVE-2024-34803](CVE-2024/CVE-2024-348xx/CVE-2024-34803.json) (`2024-06-03T11:15:11.270`) +- [CVE-2024-35630](CVE-2024/CVE-2024-356xx/CVE-2024-35630.json) (`2024-06-03T11:15:11.520`) +- [CVE-2024-35631](CVE-2024/CVE-2024-356xx/CVE-2024-35631.json) (`2024-06-03T11:15:11.740`) +- [CVE-2024-35633](CVE-2024/CVE-2024-356xx/CVE-2024-35633.json) (`2024-06-03T10:15:13.720`) +- [CVE-2024-35635](CVE-2024/CVE-2024-356xx/CVE-2024-35635.json) (`2024-06-03T10:15:14.050`) +- [CVE-2024-3829](CVE-2024/CVE-2024-38xx/CVE-2024-3829.json) (`2024-06-03T10:15:14.267`) ### CVEs modified in the last Commit Recently modified CVEs: `1` -- [CVE-2024-5311](CVE-2024/CVE-2024-53xx/CVE-2024-5311.json) (`2024-06-03T07:15:10.163`) +- [CVE-2024-5404](CVE-2024/CVE-2024-54xx/CVE-2024-5404.json) (`2024-06-03T09:15:10.193`) ## Download and Usage diff --git a/_state.csv b/_state.csv index 73f9323befd..3cc0dea7587 100644 --- a/_state.csv +++ b/_state.csv @@ -232067,18 +232067,27 @@ CVE-2023-43533,0,0,cec1346ee365b50af03fb7e0ce641c9f914a9a51fe3e4e72d4a1c1a0cbf8c CVE-2023-43534,0,0,dba7439cea4cfc2b29f72af250575fb4036c5493c63694f3d269d919ecc92250,2024-04-12T16:15:35.230000 CVE-2023-43535,0,0,e1269d8d312a2ceaa4b0553616412d9d494e38e4a6f1965a466dad52b8ea60f6,2024-04-12T16:15:35.560000 CVE-2023-43536,0,0,76e2708fa3e9111d6523fd70d0293d879b927b408b44f21ef24c6fb42c1f6097,2024-04-12T16:15:35.820000 +CVE-2023-43537,1,1,1e51cbaadb4db61c51a04b49147eb517e1d05c253892920587cccccbdea42475,2024-06-03T10:15:09.063000 +CVE-2023-43538,1,1,7efd06eefef8a0ae3dc4431e092e96470a555317fa943b6556de5331cda560e8,2024-06-03T10:15:09.937000 CVE-2023-43539,0,0,a0d10ac25ff0d0f37bc7234eb89facc9efab87ef1fcabd6c86ec9bbddc79c96c,2024-04-12T15:15:21.433000 CVE-2023-4354,0,0,b3a04d1006e2f4eb94ee005944358fcae0c2bb0f216ffa6497c71e2291933a60,2024-01-31T17:15:14.710000 CVE-2023-43540,0,0,efd650e6595c39c8362f88b761fdae11642adf9b9bde5b2fe188649abb18f8e1,2024-04-12T15:15:21.530000 CVE-2023-43541,0,0,dfd1eb041ceb949b871d4f726bdc740a09a5ddb58d3ab0fafb1e00d5a19881d9,2024-04-12T15:15:21.620000 +CVE-2023-43542,1,1,2241cd6b97d978010e5cc33b5d5efcadb49989ec603305757a8cf384b9888e5a,2024-06-03T10:15:10.220000 +CVE-2023-43543,1,1,3f18f59589c3c54ba389cca8e8a40a8684d0aac7c81e50f686a026025fd43b89,2024-06-03T10:15:10.467000 +CVE-2023-43544,1,1,a10b94476746a2b405891b3e8f7bf4692399157f962f6383603ebe3b3840a6ad,2024-06-03T10:15:10.700000 +CVE-2023-43545,1,1,dbbc8faca15dc2c1118283e9db3106032cc58c2467ff147307803df401dedaa9,2024-06-03T10:15:10.907000 CVE-2023-43546,0,0,89e5afff2dc3b88b31894eab3ce43642da3b283fc6cb7d2e88a199d429ebcad3,2024-04-12T15:15:21.713000 CVE-2023-43547,0,0,450a59a4b4e1770738d3c56ace390dc05069b1396f6d86001db3ed0a662fe9c5,2024-04-12T15:15:21.810000 CVE-2023-43548,0,0,08de2551449157c1420de1efb291b07e659743dfd8e0661fd70a491331034253,2024-04-12T15:15:21.907000 CVE-2023-43549,0,0,f1de5fa849a4658fa863c5a64278b564558b0de4b9f2143d5edf8ce7fec403b4,2024-04-12T15:15:22.003000 CVE-2023-4355,0,0,c361aa021bb0626a0e307b5cf33dd51fde9986638cf0f3a141e01925b83f1585,2024-01-31T17:15:14.840000 CVE-2023-43550,0,0,1355e44b0bdef7fc02eec66c7d8c4c8822fa31e3406d0ce44b05faf4ddcb0384,2024-04-12T15:15:22.110000 +CVE-2023-43551,1,1,8189c89b3908130b9d13005d0d874bbcd3f8ede7ba2818c6f346aa0df6e68155,2024-06-03T10:15:11.147000 CVE-2023-43552,0,0,219a820f0d74d0eccbb21dd32fa4737b1fbff83065edd3c67c682afa52aaf7a9,2024-04-12T15:15:22.210000 CVE-2023-43553,0,0,3824e0ea8ed5ad8dde20da11270e38123e4d2d966d89aa1a0e668fc6b193a630,2024-04-12T15:15:22.310000 +CVE-2023-43555,1,1,242eeb2fd5c965c2fd5393936cc73afa54815744d6510c886d351ef16ac0441e,2024-06-03T10:15:11.420000 +CVE-2023-43556,1,1,c8ad3699c541fdfeb7ce585844fcacf6cae91cc37b184913313012644c269d41,2024-06-03T10:15:11.673000 CVE-2023-4356,0,0,51f331be3605818c8ee40c6a87e55b57af1424a9aa9525f64ed6c38dd6cd0ef5,2024-01-31T17:15:14.917000 CVE-2023-43566,0,0,efdf21754c3a0ae7401b084dc8cb36a979c1eb2760f721e694f6e12bacd4880b,2023-09-21T20:01:48.277000 CVE-2023-43567,0,0,9c0ac93c4f06b0c8e85604350b7bccc39b0ec28259b140e4614d9cc5a5c35bf7,2023-11-16T14:27:01.117000 @@ -235698,7 +235707,7 @@ CVE-2023-48782,0,0,88145c135f3d36dc2324e589083cb79dceef7bf357c73c33782a57f9910e4 CVE-2023-48783,0,0,ebc0e9b096de11f5bb2feb6ecedfda87f1114290b6bb005e0f4f19fb8a6d2ef6,2024-01-17T18:24:38.617000 CVE-2023-48784,0,0,2c8c9b5cd73fccd6bf717ce3db3d03b76214161101a0e621003f928d07a57cf5,2024-04-17T12:15:07.353000 CVE-2023-48788,0,0,a76225488769211eb3f82baf06e8c2fdae1734ff7e897a76c118d8a783dbc141,2024-05-23T18:00:08.207000 -CVE-2023-48789,1,1,0571bd4a37f3c97e6d8e9b10601719eec33455abb7eb3af2a2662d718dd67176,2024-06-03T08:15:08.507000 +CVE-2023-48789,0,0,0571bd4a37f3c97e6d8e9b10601719eec33455abb7eb3af2a2662d718dd67176,2024-06-03T08:15:08.507000 CVE-2023-4879,0,0,8ff2f4fac231edfb0e8e6c6042e670dbdf0da9230931b634f3b1ed60cbdab258,2023-09-18T18:58:43.767000 CVE-2023-48791,0,0,4e7d2cae3ad6ba11c4e276624bedca77887a0ee315b409ddadb10bd81db3bb45,2023-12-15T20:09:24.010000 CVE-2023-48792,0,0,a3c17617afe01ace18242f14c2f591f70a09281fccef1129ab04ab7743ac5ed0,2024-02-09T19:41:33.093000 @@ -242707,6 +242716,7 @@ CVE-2024-21474,0,0,f2a0bb0689e81550825d1ea2ff18872b7ed9732f71b1df2a783fa00cbbba9 CVE-2024-21475,0,0,08ca02671a08696ba0c7516ccba2f78b5a25c25f05d4d934fd4396db32490a97,2024-05-06T16:00:59.253000 CVE-2024-21476,0,0,f7f3a41ab53efd1329a1fcafe8a5c0bf5a6daefaebcf82c3ccffee4519748663,2024-05-06T16:00:59.253000 CVE-2024-21477,0,0,2dfc1d466e14269455d623dbe436a1e6d9dccf3c01b4aaeec3bd9b9f104b4ac3,2024-05-06T16:00:59.253000 +CVE-2024-21478,1,1,8f23a8cef733da9e745bc6f343469dcb38f73d49eb0921f3eacf7ed7e631023e,2024-06-03T10:15:11.907000 CVE-2024-2148,0,0,f9ad2f00527f5c10697ce47ba63c57e584aab0240fc88e91a15c3572a9aa5790,2024-05-17T02:38:04.387000 CVE-2024-21480,0,0,8440778e45413c0e24db83877880d3ede6fda18ff0fea3fa59c66be00cec51d0,2024-05-06T16:00:59.253000 CVE-2024-21483,0,0,9151aea81f4a61f57a2b42ef8dafe022eeea7af379bf181ee6a30f8665567492,2024-03-12T12:40:13.500000 @@ -243587,7 +243597,7 @@ CVE-2024-2309,0,0,5e7d16d6f71f2f007544bcbcc47dd8107c18e2714e36b52143e4572bbdc634 CVE-2024-23094,0,0,8b7fd2c37601b9f636934db44ed8e567ef20eff4d921df465afdbb6ef925a041,2024-02-22T19:07:27.197000 CVE-2024-2310,0,0,0edce614ca737c9f4f6f172b9fca4020b1a932854b13e864a7ef93ffce2dc5e8,2024-04-26T12:58:17.720000 CVE-2024-23105,0,0,4f4ecfc1737be07823bcaafc96e8879d6b5c3ae1db58c428ada8e62f19153579,2024-05-23T15:52:39.123000 -CVE-2024-23107,1,1,f95c78068a77be131b17b383b5dedbee5d41921bd626de291cf3de54dc105567,2024-06-03T08:15:08.837000 +CVE-2024-23107,0,0,f95c78068a77be131b17b383b5dedbee5d41921bd626de291cf3de54dc105567,2024-06-03T08:15:08.837000 CVE-2024-23108,0,0,4bd66ae4e2150cd9c3073e095bacf489de77af9a273b611e130c3e3fa4edf7ea,2024-02-07T15:02:00.203000 CVE-2024-23109,0,0,c2686a38cd2651bfef8ab0e98ee0dbcce98e98fd7c1f1805290cb9df9c03fe78,2024-02-07T15:04:28.237000 CVE-2024-2311,0,0,738ffcbe7f411809b0dd04835f3243a6f3350cd455230e0887015d402141b408,2024-04-10T13:23:38.787000 @@ -243794,6 +243804,8 @@ CVE-2024-2335,0,0,efe1e2a5a88779dcaa56517f16fc8862179b5ee96c6455caf55add5931f2e1 CVE-2024-23351,0,0,55afa2a1096cf0aa167ae828427ca9b1e7daf36842c51c8fe0621b3f0ec14617,2024-05-06T16:00:59.253000 CVE-2024-23354,0,0,524905b4df533efbcae0403dea5cdcdf4f507ec96e09f870f5c27c0b03f65fe6,2024-05-06T16:00:59.253000 CVE-2024-2336,0,0,858071e914ebaea9fbe161c5ef8e540e29b84f9d635c439141db287421da0568,2024-04-10T13:23:38.787000 +CVE-2024-23360,1,1,f4d7ebb62940d9b72d8217b342fc2cced03dc772827b2c8f674afdd4c3507cbf,2024-06-03T10:15:12.130000 +CVE-2024-23363,1,1,cb81ab11c9be5032cf51438c8bb838acdabdbdf9d75fbd6f58c3f689a12af21a,2024-06-03T10:15:12.377000 CVE-2024-2338,0,0,2d543a556e65d2c959c15e10c3e9a74031d18693370229ae5e1770e5ef380b4c,2024-03-08T21:19:43.127000 CVE-2024-23387,0,0,651b9110a70ec6d8150b78d412ab0c449da5b24d5059a74c85bc0d06b6759568,2024-01-25T02:00:29.210000 CVE-2024-23388,0,0,d9ef291f69bac73e9b23ebc37df19469f57319d5ff49c901cd1cd709d40899ff,2024-02-05T15:18:21.920000 @@ -243959,6 +243971,11 @@ CVE-2024-23659,0,0,236290b059375e8b7040b3505591889202adcca1fe58c9cff8e0844cbcf32 CVE-2024-2366,0,0,561eca4f7d46892009230ef936eca60ce1d593865f21bb5667643256074aa468,2024-05-16T13:03:05.353000 CVE-2024-23660,0,0,1b2c29c1f9877409e81cc31263cb621728177876460bb697b8348507998614a6,2024-02-15T16:01:29.370000 CVE-2024-23662,0,0,878b23e10c46382d5166f21a5ce8b15ca491a34151aa70377e6758a415cbb56d,2024-04-10T13:24:22.187000 +CVE-2024-23664,1,1,8d13f5909d1e04bfe76cf46330cbbcfd5a4af39ba418f383f73a06f325faf92d,2024-06-03T10:15:12.620000 +CVE-2024-23665,1,1,fce25590082d66baca226d442317a35953cf3b4cc205d6acdf98115c98799274,2024-06-03T10:15:12.870000 +CVE-2024-23667,1,1,94a6dbe54c65e75f8fb555e6711753fed006ebd88cbbc6984c1189cb31f1ec8f,2024-06-03T10:15:13.100000 +CVE-2024-23668,1,1,4fec4864cea612333f7d910f8fefddcc9af0defe95285c4ca6a47c3696cc11fe,2024-06-03T10:15:13.320000 +CVE-2024-23670,1,1,402f6750bcbc5d007fc1f77fcfb835cf819ac6b21f9a302b79af91b4b28ce95d,2024-06-03T10:15:13.523000 CVE-2024-23671,0,0,108c61a6aa74a9b71687a2e3aa153a422c4a0c3adcd258415c5b065e1ef21ae7,2024-04-10T13:24:22.187000 CVE-2024-23672,0,0,ecf21cf6fef0fb9a72fe820ee02e2854b5a2d1575ce42cd766c4a52761cff3de,2024-05-01T18:15:14.357000 CVE-2024-23673,0,0,11a42dc617628e4138314e2a3d8d0f02b60cec9315a80bc3284ec5f1547fd09f,2024-02-14T00:26:41.517000 @@ -248821,7 +248838,7 @@ CVE-2024-31487,0,0,ffef7fcdc05bb476a1f2c02c71de4a76075ea7f0301d6a8889db629ce9b19 CVE-2024-31488,0,0,8fd4ea2d7a10d03e6cc8df9fdf21315abd98246cc112d9626a2dc74747d004e0,2024-05-14T19:17:55.627000 CVE-2024-31491,0,0,5f002356f8390a8ec883fdc05cbd199fbc913871302dee308e6ee0aa04c7ac67,2024-05-14T19:17:55.627000 CVE-2024-31492,0,0,a251126d380ad734bdcae40155276c0c8cd0f78c057d6c232814179759c90bf9,2024-04-10T19:49:51.183000 -CVE-2024-31493,1,1,eb92f9f4c4feadf3b90c327ee2008f971dfc30631ea4767017e0b0d47be4af71,2024-06-03T08:15:09.097000 +CVE-2024-31493,0,0,eb92f9f4c4feadf3b90c327ee2008f971dfc30631ea4767017e0b0d47be4af71,2024-06-03T08:15:09.097000 CVE-2024-31497,0,0,4e1eafb2dcb4144981ef085a5b8158282c3a0977a083d73fc04d3f981acbd1e7,2024-05-10T14:33:55.323000 CVE-2024-31498,0,0,db3c4e2337e3fccc66e084ef6016d8532925f451bef4124b0c2782f0c54d90b6,2024-04-08T00:15:08 CVE-2024-31502,0,0,52fc3984aab146fd5296bbc2584fa31ec06529d852df83c020a3abdb54510354,2024-04-29T12:42:03.667000 @@ -250494,6 +250511,7 @@ CVE-2024-34749,0,0,a26a9cdaa6b9cdd859ea0f8895bc1e27a45773d0dd4321619e9dcf295b3f2 CVE-2024-3475,0,0,e528ec7d5c8727ea0d98d659186b040308d5844df7467319e5b573505cdc6e7c,2024-05-02T13:27:25.103000 CVE-2024-34751,0,0,3bc824c76b005bef3c5502f774f511888cffc942b3953fc4e78f3f0d8ad9e615,2024-05-17T18:36:31.297000 CVE-2024-34752,0,0,242ab90c6a96e91b737168caac935dedcfed36964913472cce8df4bff8adef50,2024-05-17T18:36:05.263000 +CVE-2024-34754,1,1,9d58b9d4cf84f7418dbd746b56c4062b86032da2cb5552e8ea4fc0d14e34509b,2024-06-03T11:15:08.743000 CVE-2024-34755,0,0,d9d093e244bdb9881814a581fcf0cceddc50257ae74dd4a27a2c1f59b6cdc217,2024-05-17T18:35:35.070000 CVE-2024-34756,0,0,c1f51cb5304487e29b0a4c8a67e9d115a4f2b56ac322e60a8774a285c457e7c0,2024-05-17T18:35:35.070000 CVE-2024-34757,0,0,57042a3bb13f31e69b5b7fd23a19541f4fa2fb8db07ba9037fc775417523a9d1,2024-05-17T18:36:05.263000 @@ -250504,8 +250522,19 @@ CVE-2024-34771,0,0,deaa281b48d1539fc4d88a99f2c542da7d2f97b319dd410ab53213b70ec8b CVE-2024-34772,0,0,635f5a0bcdcc084928ed60d40a3f5691181a54a2efa05b50e13ad7462247110c,2024-05-14T19:17:55.627000 CVE-2024-34773,0,0,8d4786b71411a201832db647dece110e046d5ed6169dce1446e93616263bacee,2024-05-14T19:17:55.627000 CVE-2024-3478,0,0,ae882595ac6fe06ab517c1e505d55eeeed4b5c0450cbd6b83825ab78d9e88f1e,2024-05-02T13:27:25.103000 +CVE-2024-34789,1,1,3cd55374ddb45727555a4ddc1e9ad766353350411961927b16c82b2a4be3dee3,2024-06-03T11:15:09.003000 CVE-2024-3479,0,0,fd58a9eee7829eb22d6cfb17d87e6b7652b13a6666535069e70c5a2768e8dce6,2024-05-03T15:32:19.637000 +CVE-2024-34790,1,1,1a5b8cee6aa93ad10ba303666024e363953d81c8116b01a1921ab0986e5235bc,2024-06-03T11:15:09.233000 +CVE-2024-34791,1,1,63a167b6d65428b715bdce7830adbd5f9dda5b5651667d6a0e8be0e00a3b3049,2024-06-03T11:15:09.467000 +CVE-2024-34793,1,1,483b50b8734b95527b8ec11dcfbaa161ab6a0bd04df0a0d4291542559e572729,2024-06-03T11:15:09.687000 +CVE-2024-34794,1,1,0fcea07d90a264c294804f910b6665efeed9385e5e6d56e31aace0afd80a626f,2024-06-03T11:15:09.917000 +CVE-2024-34795,1,1,91c02cf1e7eeb8503093139ca6f3dd4b5cf591a85079d787fe17433b511dba1f,2024-06-03T11:15:10.133000 +CVE-2024-34796,1,1,7b63d24ad2f15c716a204e2f40ba9d35a88899031da8a8b5ad2feece0a7da066,2024-06-03T11:15:10.360000 +CVE-2024-34797,1,1,5bb1f3ddf9562d7678b22979eec373c838cdffa4417e576318c8b9ceb77a0b66,2024-06-03T11:15:10.580000 +CVE-2024-34798,1,1,55a30b7aba14ebe802fee14a3141374d5bfd8987e086cdcb9c3412887a74ed08,2024-06-03T11:15:10.813000 CVE-2024-3480,0,0,efd268116762f9a268444b69dedc6b75682706697867d3d93c2c71f376810267,2024-05-03T15:32:19.637000 +CVE-2024-34801,1,1,5c05e9df68c6a2706d41abfa0924db6473ada533efd49d9bc853a3238dd441f6,2024-06-03T11:15:11.040000 +CVE-2024-34803,1,1,e941f12dd43c66f0a30013889c22ee9ae6cb29ead6e0b509b8f398783df82990,2024-06-03T11:15:11.270000 CVE-2024-34805,0,0,4db06c40a60d0ea9fc68ae0b74b3d16b7df09b33205e3b40409d2383df796279,2024-05-17T18:36:31.297000 CVE-2024-34806,0,0,3b1b6563ba887546de6e8afcda84fbe0c4e88d6cd4a9afa2164171d94fd3a99a,2024-05-17T18:35:35.070000 CVE-2024-34807,0,0,1b210e8fbd98db6886fdf7153f61122f9d59a5653f7e82ad43004bb026f58b60,2024-05-17T18:35:35.070000 @@ -250798,12 +250827,16 @@ CVE-2024-3560,0,0,66c1a96b1f1d19ab8c2a91f30bb939a8ccde028ecd6951f27029cb1628de4d CVE-2024-35618,0,0,fc2572e9e8823eb6313bf2bb54c527fc11c4117d0d0837dc8f8794515acd3b77,2024-05-24T18:09:20.027000 CVE-2024-35621,0,0,eff37f6109cc46dfb019de6bac1c1e4ffe46087d96bb684a690c4e1a8342c7d1,2024-05-28T17:11:47.007000 CVE-2024-35627,0,0,152f6a140367536a1e62d9a33b0213a3c0edb39ccbba33db112f0915411e954b,2024-05-24T01:15:30.977000 +CVE-2024-35630,1,1,89264cd1a4afa71b588d04af1510e9f5fa30a567bc8836139f915a641c8706ca,2024-06-03T11:15:11.520000 +CVE-2024-35631,1,1,7cbcaa0d94470af5584922933479b84fa5109af34d8b31d9b44346e9e0480e51,2024-06-03T11:15:11.740000 +CVE-2024-35633,1,1,d1b53e557a63ad400682b1f460ac520a7a728625610b8f88b299e9e3a666395f,2024-06-03T10:15:13.720000 +CVE-2024-35635,1,1,a6648ac54f661e5b4a9c3c92e46de6c4e3ce5718e4b099218271b0d9ff75cc45,2024-06-03T10:15:14.050000 CVE-2024-35636,0,0,50355c13300a6ac082e1c483b1ab0ef66d8d81a837d0b58fd86ac7bbb9fe7982,2024-06-01T09:15:08.983000 -CVE-2024-35637,1,1,a3bbaca3340add97b05922e5f3b6c323a82a11ee28efa6dacd9faac985e017af,2024-06-03T09:15:09.390000 -CVE-2024-35638,1,1,d40f8eb039698819fa66f21f9769dac9687415417efb672407b31b270ecc7aa0,2024-06-03T09:15:09.703000 -CVE-2024-35639,1,1,a9f6ceacf0b15e8d73d02a0e44ba7f868caccb9abf6430e27ee988ea745ef246,2024-06-03T09:15:09.947000 +CVE-2024-35637,0,0,a3bbaca3340add97b05922e5f3b6c323a82a11ee28efa6dacd9faac985e017af,2024-06-03T09:15:09.390000 +CVE-2024-35638,0,0,d40f8eb039698819fa66f21f9769dac9687415417efb672407b31b270ecc7aa0,2024-06-03T09:15:09.703000 +CVE-2024-35639,0,0,a9f6ceacf0b15e8d73d02a0e44ba7f868caccb9abf6430e27ee988ea745ef246,2024-06-03T09:15:09.947000 CVE-2024-3564,0,0,126b0ad745c05ac2b6e0879d574d7c57b3c5395a16548c8e712a48ce4bee21ab,2024-06-01T04:15:08.743000 -CVE-2024-35640,1,1,358aecfa6522bfb60c0852d09cc5e4f8adc292000e1c5dc1db7c810f50935a8d,2024-06-03T08:15:09.330000 +CVE-2024-35640,0,0,358aecfa6522bfb60c0852d09cc5e4f8adc292000e1c5dc1db7c810f50935a8d,2024-06-03T08:15:09.330000 CVE-2024-35641,0,0,ad916927f4dc66b26e37a696884d9ea1315a0f444182d47bd127409ab7975d3a,2024-06-03T07:15:09.100000 CVE-2024-35642,0,0,5f0cf1abc8073c52dfacad8fd9b2a937ae549d5addf8a17283021c02e90c70af,2024-06-03T07:15:09.560000 CVE-2024-35643,0,0,c2e75a738c426c54e453512f0b08e3b439606dd23983e8834340678e0539f0e2,2024-06-03T07:15:09.850000 @@ -251304,11 +251337,11 @@ CVE-2024-36957,0,0,14a25382151b1945f300cd0f690fdd6ed21995daebf481bf33bcbc3cfcf88 CVE-2024-36958,0,0,27ba702862686ffcbfc7435dcc4011c841c4be08d6d6bff774be51941829ca30,2024-05-30T18:18:58.870000 CVE-2024-36959,0,0,d6bbacbe3376b8ea605862991764d4131cc35403035f548e6498def7a4bbd69c,2024-05-30T18:18:58.870000 CVE-2024-3696,0,0,54c8c42492f1c31e1d0d081b12ae9fb101d447905039b557dcc4372130239b90,2024-05-17T02:40:04.613000 -CVE-2024-36960,1,1,acf3c6f441eac5469a9c25fd1ebfdd6f1cf461c1d844318f9c119d13aa112a81,2024-06-03T08:15:09.557000 -CVE-2024-36961,1,1,f6fb90cc986c6069fd23d1d9888817e08e921f71b08213bf2b70aa68a6c4297d,2024-06-03T08:15:09.660000 -CVE-2024-36962,1,1,0786e9d15d91a5bfc2f5fd63a100e44f0f095cc32cc0a7e91d3e96757091e975,2024-06-03T08:15:09.740000 -CVE-2024-36963,1,1,6783d7e9cad5d6855f4047fc4da40186696c7d06fdbfcf7e02f88b8f9412d9ad,2024-06-03T08:15:09.820000 -CVE-2024-36964,1,1,ab7328b637a6af08291107a29c8eba501cdb343a15c8c594a58247f3b8e08077,2024-06-03T08:15:09.903000 +CVE-2024-36960,0,0,acf3c6f441eac5469a9c25fd1ebfdd6f1cf461c1d844318f9c119d13aa112a81,2024-06-03T08:15:09.557000 +CVE-2024-36961,0,0,f6fb90cc986c6069fd23d1d9888817e08e921f71b08213bf2b70aa68a6c4297d,2024-06-03T08:15:09.660000 +CVE-2024-36962,0,0,0786e9d15d91a5bfc2f5fd63a100e44f0f095cc32cc0a7e91d3e96757091e975,2024-06-03T08:15:09.740000 +CVE-2024-36963,0,0,6783d7e9cad5d6855f4047fc4da40186696c7d06fdbfcf7e02f88b8f9412d9ad,2024-06-03T08:15:09.820000 +CVE-2024-36964,0,0,ab7328b637a6af08291107a29c8eba501cdb343a15c8c594a58247f3b8e08077,2024-06-03T08:15:09.903000 CVE-2024-3697,0,0,cc8cf5a7af305c88ebdfa6655aacb4fa5ec406664965d679a29a0cbf17ffb930,2024-05-17T02:40:04.710000 CVE-2024-3698,0,0,13b4029eb6179dbe788598788e16556a1995d850ddfc4af1ee0c4e86961a3a21,2024-05-17T02:40:04.800000 CVE-2024-3701,0,0,d78f52a76181001272debccb095fb5971bb478ebc111313d9ff2994f4ec0598f,2024-04-15T13:15:31.997000 @@ -251419,6 +251452,7 @@ CVE-2024-3823,0,0,cd28ea160a68276fdd70271b0ec926d19fdc3598e922bafa9bf05d9fdd41ea CVE-2024-3824,0,0,8545575d3e734e1433cd4d7c91c77cd29907e6f5ee87d4739239efdf13c20f26,2024-05-15T16:40:19.330000 CVE-2024-3825,0,0,f398f78dcc905612b8b1fff020bcc62d405b80ffdf3a9053d9f90f163c40baa7,2024-04-17T15:31:50.160000 CVE-2024-3828,0,0,57a9b409ca1cac39bc20af9eb7a4e7dcc3bae1882e9b3a8ca25cdf22dad097ef,2024-05-14T16:11:39.510000 +CVE-2024-3829,1,1,119f47ebf6538814f476e14f1daa8260cc404e5b9a6cfc3dc44621c320ff0d3e,2024-06-03T10:15:14.267000 CVE-2024-3831,0,0,28fa4e2fb2524144138a610966fa5501c7b19e1083bb04e4062bd6679bbd2a31,2024-05-14T16:11:39.510000 CVE-2024-3832,0,0,1075b96952121645fbb81b228e0c3813e39db7e21c4c9aa1fc24c30b61618c13,2024-04-23T18:15:15.187000 CVE-2024-3833,0,0,ba630503495cf2aaf1fce7ce704a30930ed35eb1665a53e19102e8c18f607a36,2024-05-03T03:16:28.940000 @@ -252300,7 +252334,7 @@ CVE-2024-5297,0,0,00a87902d7cb688c5f453a52360105eb024acff7ed2743a841cec085f6c70d CVE-2024-5298,0,0,06eb32cfed51faae03040e262c135cd2456565f192a3fa9c39d1028a133d926f,2024-05-24T01:15:30.977000 CVE-2024-5299,0,0,ae65325eb08b6dc79f15a33a7800bb0b9af221d170dea70dbcb229fe698b5075,2024-05-24T01:15:30.977000 CVE-2024-5310,0,0,aff5601be87ae3c08dc3ce041153e17c3e7a6faa41ba6b44778c9142e5941031,2024-05-24T13:03:05.093000 -CVE-2024-5311,0,1,bc0dd8fe2c9b76c0164439ed50a0a9214ee8a9c28beab0c44f8ee299d96c6945,2024-06-03T07:15:10.163000 +CVE-2024-5311,0,0,bc0dd8fe2c9b76c0164439ed50a0a9214ee8a9c28beab0c44f8ee299d96c6945,2024-06-03T07:15:10.163000 CVE-2024-5312,0,0,3a9d8301087c1d7edb8976207e286d0d247ebf6ccf4b5edb4137e81b02e5ec2b,2024-05-24T13:03:05.093000 CVE-2024-5314,0,0,fb6304ffb5d50ce8724d643a46fad25ba80695f7c0c0eb4ec33a07d41bc4980a,2024-05-24T13:03:05.093000 CVE-2024-5315,0,0,e1b0baaf93d62cf125eea53091da57c404cdf61d625ae810529ebef84e73357d,2024-05-24T13:03:05.093000 @@ -252362,7 +252396,7 @@ CVE-2024-5397,0,0,3fa492ac656a0dc8b44c0c2439095185551e47b9b3d1d85bd44fafa325950b CVE-2024-5399,0,0,fa7eef6bbf34e07faf1acdcbb967da16ac637ca3df72c0acc1bd2e0f60228b23,2024-05-28T12:39:28.377000 CVE-2024-5400,0,0,d3c501060bf431388a2cf50edbec679a7265e7c25a2addcb59a0d9057b8884e3,2024-05-28T12:39:28.377000 CVE-2024-5403,0,0,21ef2036234b077bc1f129f4d78aa7befab02d334c0d4840a63d95ad54da2b3d,2024-05-28T12:39:28.377000 -CVE-2024-5404,1,1,2f2c39786498ab4718cdc5931c7e32f2881d2453b1870cf774e75a751aeadd2e,2024-06-03T09:15:10.193000 +CVE-2024-5404,0,1,42c1d4f54ccd945d042e8c46560bbcfa89e4a0b2f053599bf0821dd3b72846fe,2024-06-03T09:15:10.193000 CVE-2024-5405,0,0,0726f3329c87a86f8903abd8a0efb034839b1c4fb01bb69fa1c55fb7fdc0b2ce,2024-05-28T12:39:28.377000 CVE-2024-5406,0,0,128407d22b74a56625ebded67c527f89f63de550e972932c839965bdff9c4612,2024-05-28T12:39:28.377000 CVE-2024-5407,0,0,2fcd76e27db1c908eadad490ca75346b74b5c01495e67a00eb793a48de914bb1,2024-05-28T12:39:28.377000