mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-07 19:16:29 +00:00
Auto-Update: 2024-06-04T14:00:38.127097+00:00
This commit is contained in:
parent
7af11aff7a
commit
6b56aca921
55
CVE-2023/CVE-2023-497xx/CVE-2023-49774.json
Normal file
55
CVE-2023/CVE-2023-497xx/CVE-2023-49774.json
Normal file
@ -0,0 +1,55 @@
|
||||
{
|
||||
"id": "CVE-2023-49774",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2024-06-04T12:15:09.700",
|
||||
"lastModified": "2024-06-04T12:15:09.700",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Exposure of Sensitive Information to an Unauthorized Actor vulnerability in J.N. Breetvelt a.K.A. OpaJaap WP Photo Album Plus allows Accessing Functionality Not Properly Constrained by ACLs.This issue affects WP Photo Album Plus: from n/a through 8.5.02.005."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 5.3,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-200"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/vulnerability/wp-photo-album-plus/wordpress-wp-photo-album-plus-plugin-8-5-02-005-ip-bypass-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
}
|
||||
]
|
||||
}
|
55
CVE-2023/CVE-2023-498xx/CVE-2023-49822.json
Normal file
55
CVE-2023/CVE-2023-498xx/CVE-2023-49822.json
Normal file
@ -0,0 +1,55 @@
|
||||
{
|
||||
"id": "CVE-2023-49822",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2024-06-04T12:15:09.933",
|
||||
"lastModified": "2024-06-04T12:15:09.933",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Exposure of Sensitive Information to an Unauthorized Actor vulnerability in David Vongries Ultimate Dashboard allows Accessing Functionality Not Properly Constrained by ACLs.This issue affects Ultimate Dashboard: from n/a through 3.7.10."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "HIGH",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 3.7,
|
||||
"baseSeverity": "LOW"
|
||||
},
|
||||
"exploitabilityScore": 2.2,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-200"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/vulnerability/ultimate-dashboard/wordpress-ultimate-dashboard-plugin-3-7-10-secret-login-page-location-disclosure-on-multisites-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
}
|
||||
]
|
||||
}
|
55
CVE-2023/CVE-2023-498xx/CVE-2023-49852.json
Normal file
55
CVE-2023/CVE-2023-498xx/CVE-2023-49852.json
Normal file
@ -0,0 +1,55 @@
|
||||
{
|
||||
"id": "CVE-2023-49852",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2024-06-04T12:15:10.153",
|
||||
"lastModified": "2024-06-04T12:15:10.153",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS) vulnerability in Vsourz Digital Responsive Slick Slider WordPress allows Code Injection.This issue affects Responsive Slick Slider WordPress: from n/a through 1.4."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW",
|
||||
"baseScore": 6.5,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 2.5
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-80"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/vulnerability/responsive-slick-slider/wordpress-responsive-slick-slider-wordpress-plugin-1-4-content-injection-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
}
|
||||
]
|
||||
}
|
55
CVE-2023/CVE-2023-515xx/CVE-2023-51511.json
Normal file
55
CVE-2023/CVE-2023-515xx/CVE-2023-51511.json
Normal file
@ -0,0 +1,55 @@
|
||||
{
|
||||
"id": "CVE-2023-51511",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2024-06-04T13:15:49.430",
|
||||
"lastModified": "2024-06-04T13:15:49.430",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Improper Authentication vulnerability in Pluggabl LLC Booster Elite for WooCommerce allows Accessing Functionality Not Properly Constrained by ACLs.This issue affects Booster Elite for WooCommerce: from n/a before 7.1.3."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 6.5,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-287"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/vulnerability/booster-elite-for-woocommerce/wordpress-booster-elite-for-woocommerce-plugin-7-1-3-authenticated-production-creation-modification-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
}
|
||||
]
|
||||
}
|
55
CVE-2023/CVE-2023-515xx/CVE-2023-51542.json
Normal file
55
CVE-2023/CVE-2023-515xx/CVE-2023-51542.json
Normal file
@ -0,0 +1,55 @@
|
||||
{
|
||||
"id": "CVE-2023-51542",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2024-06-04T13:15:49.820",
|
||||
"lastModified": "2024-06-04T13:15:49.820",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Authentication Bypass by Spoofing vulnerability in WPMU DEV Branda allows Accessing Functionality Not Properly Constrained by ACLs.This issue affects Branda: from n/a through 3.4.14."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 5.3,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-290"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/vulnerability/branda-white-labeling/wordpress-branda-plugin-3-4-14-ip-restriction-bypass-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
}
|
||||
]
|
||||
}
|
55
CVE-2023/CVE-2023-515xx/CVE-2023-51543.json
Normal file
55
CVE-2023/CVE-2023-515xx/CVE-2023-51543.json
Normal file
@ -0,0 +1,55 @@
|
||||
{
|
||||
"id": "CVE-2023-51543",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2024-06-04T13:15:50.047",
|
||||
"lastModified": "2024-06-04T13:15:50.047",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Authentication Bypass by Spoofing vulnerability in Metagauss RegistrationMagic allows Accessing Functionality Not Properly Constrained by ACLs.This issue affects RegistrationMagic: from n/a through 5.2.5.0."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 5.3,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-290"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/vulnerability/custom-registration-form-builder-with-submission-manager/wordpress-registrationmagic-plugin-5-2-5-0-ip-limit-bypass-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
}
|
||||
]
|
||||
}
|
55
CVE-2023/CVE-2023-515xx/CVE-2023-51544.json
Normal file
55
CVE-2023/CVE-2023-515xx/CVE-2023-51544.json
Normal file
@ -0,0 +1,55 @@
|
||||
{
|
||||
"id": "CVE-2023-51544",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2024-06-04T13:15:50.277",
|
||||
"lastModified": "2024-06-04T13:15:50.277",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Improper Control of Interaction Frequency vulnerability in Metagauss RegistrationMagic allows Functionality Misuse.This issue affects RegistrationMagic: from n/a through 5.2.5.0."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 5.3,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-799"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/vulnerability/custom-registration-form-builder-with-submission-manager/wordpress-registrationmagic-plugin-5-2-5-0-form-submission-limit-bypass-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
}
|
||||
]
|
||||
}
|
55
CVE-2023/CVE-2023-516xx/CVE-2023-51667.json
Normal file
55
CVE-2023/CVE-2023-516xx/CVE-2023-51667.json
Normal file
@ -0,0 +1,55 @@
|
||||
{
|
||||
"id": "CVE-2023-51667",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2024-06-04T13:15:50.500",
|
||||
"lastModified": "2024-06-04T13:15:50.500",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Authentication Bypass by Spoofing vulnerability in FeedbackWP Rate my Post \u2013 WP Rating System allows Accessing Functionality Not Properly Constrained by ACLs.This issue affects Rate my Post \u2013 WP Rating System: from n/a through 3.4.2."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 5.3,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-290"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/vulnerability/rate-my-post/wordpress-rate-my-post-wp-rating-system-plugin-3-4-2-broken-access-control-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
}
|
||||
]
|
||||
}
|
55
CVE-2023/CVE-2023-521xx/CVE-2023-52147.json
Normal file
55
CVE-2023/CVE-2023-521xx/CVE-2023-52147.json
Normal file
@ -0,0 +1,55 @@
|
||||
{
|
||||
"id": "CVE-2023-52147",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2024-06-04T13:15:50.730",
|
||||
"lastModified": "2024-06-04T13:15:50.730",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Exposure of Sensitive Information to an Unauthorized Actor vulnerability in All In One WP Security & Firewall Team All In One WP Security & Firewall allows Accessing Functionality Not Properly Constrained by ACLs.This issue affects All In One WP Security & Firewall: from n/a through 5.2.4."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "HIGH",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 3.7,
|
||||
"baseSeverity": "LOW"
|
||||
},
|
||||
"exploitabilityScore": 2.2,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-200"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/vulnerability/all-in-one-wp-security-and-firewall/wordpress-all-in-one-security-aios-plugin-5-2-4-secret-login-page-location-disclosure-on-multisites-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
}
|
||||
]
|
||||
}
|
55
CVE-2023/CVE-2023-521xx/CVE-2023-52176.json
Normal file
55
CVE-2023/CVE-2023-521xx/CVE-2023-52176.json
Normal file
@ -0,0 +1,55 @@
|
||||
{
|
||||
"id": "CVE-2023-52176",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2024-06-04T13:15:50.960",
|
||||
"lastModified": "2024-06-04T13:15:50.960",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Authentication Bypass by Spoofing vulnerability in miniorange Malware Scanner allows Accessing Functionality Not Properly Constrained by ACLs.This issue affects Malware Scanner: from n/a through 4.7.1."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 5.3,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-290"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/vulnerability/miniorange-malware-protection/wordpress-malware-scanner-plugin-4-7-1-ip-restriction-bypass-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
}
|
||||
]
|
||||
}
|
71
CVE-2024/CVE-2024-256xx/CVE-2024-25600.json
Normal file
71
CVE-2024/CVE-2024-256xx/CVE-2024-25600.json
Normal file
@ -0,0 +1,71 @@
|
||||
{
|
||||
"id": "CVE-2024-25600",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2024-06-04T13:15:51.183",
|
||||
"lastModified": "2024-06-04T13:15:51.183",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Improper Control of Generation of Code ('Code Injection') vulnerability in Codeer Limited Bricks Builder allows Code Injection.This issue affects Bricks Builder: from n/a through 1.9.6."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 10.0,
|
||||
"baseSeverity": "CRITICAL"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 6.0
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-94"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/Chocapikk/CVE-2024-25600",
|
||||
"source": "audit@patchstack.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/K3ysTr0K3R/CVE-2024-25600-EXPLOIT",
|
||||
"source": "audit@patchstack.com"
|
||||
},
|
||||
{
|
||||
"url": "https://patchstack.com/articles/critical-rce-patched-in-bricks-builder-theme?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
},
|
||||
{
|
||||
"url": "https://patchstack.com/database/vulnerability/bricks/wordpress-bricks-theme-1-9-6-unauthenticated-remote-code-execution-rce-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
},
|
||||
{
|
||||
"url": "https://snicco.io/vulnerability-disclosure/bricks/unauthenticated-rce-in-bricks-1-9-6",
|
||||
"source": "audit@patchstack.com"
|
||||
}
|
||||
]
|
||||
}
|
55
CVE-2024/CVE-2024-291xx/CVE-2024-29170.json
Normal file
55
CVE-2024/CVE-2024-291xx/CVE-2024-29170.json
Normal file
@ -0,0 +1,55 @@
|
||||
{
|
||||
"id": "CVE-2024-29170",
|
||||
"sourceIdentifier": "security_alert@emc.com",
|
||||
"published": "2024-06-04T13:15:51.460",
|
||||
"lastModified": "2024-06-04T13:15:51.460",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Dell PowerScale OneFS versions 8.2.x through 9.8.0.x contain a use of hard coded credentials vulnerability. An adjacent network unauthenticated attacker could potentially exploit this vulnerability, leading to information disclosure of network traffic and denial of service."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security_alert@emc.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H",
|
||||
"attackVector": "ADJACENT_NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 8.1,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.2
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security_alert@emc.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-798"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.dell.com/support/kbdoc/en-us/000225667/dsa-2024-210-security-update-for-dell-powerscale-onefs-for-multiple-security-vulnerabilities",
|
||||
"source": "security_alert@emc.com"
|
||||
}
|
||||
]
|
||||
}
|
55
CVE-2024/CVE-2024-335xx/CVE-2024-33541.json
Normal file
55
CVE-2024/CVE-2024-335xx/CVE-2024-33541.json
Normal file
@ -0,0 +1,55 @@
|
||||
{
|
||||
"id": "CVE-2024-33541",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2024-06-04T13:15:51.717",
|
||||
"lastModified": "2024-06-04T13:15:51.717",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in BetterAddons Better Elementor Addons allows PHP Local File Inclusion.This issue affects Better Elementor Addons: from n/a through 1.4.1."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 6.5,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-22"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/vulnerability/better-elementor-addons/wordpress-better-elementor-addons-plugin-1-4-1-local-file-inclusion-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
}
|
||||
]
|
||||
}
|
55
CVE-2024/CVE-2024-335xx/CVE-2024-33557.json
Normal file
55
CVE-2024/CVE-2024-335xx/CVE-2024-33557.json
Normal file
@ -0,0 +1,55 @@
|
||||
{
|
||||
"id": "CVE-2024-33557",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2024-06-04T13:15:51.943",
|
||||
"lastModified": "2024-06-04T13:15:51.943",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in 8theme XStore Core allows PHP Local File Inclusion.This issue affects XStore Core: from n/a through 5.3.8."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "HIGH",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 8.5,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 6.0
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-22"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/vulnerability/et-core-plugin/wordpress-xstore-core-plugin-5-3-5-local-file-inclusion-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
}
|
||||
]
|
||||
}
|
55
CVE-2024/CVE-2024-335xx/CVE-2024-33560.json
Normal file
55
CVE-2024/CVE-2024-335xx/CVE-2024-33560.json
Normal file
@ -0,0 +1,55 @@
|
||||
{
|
||||
"id": "CVE-2024-33560",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2024-06-04T13:15:52.177",
|
||||
"lastModified": "2024-06-04T13:15:52.177",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in 8theme XStore allows PHP Local File Inclusion.This issue affects XStore: from n/a through 9.3.8."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "HIGH",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 9.0,
|
||||
"baseSeverity": "CRITICAL"
|
||||
},
|
||||
"exploitabilityScore": 2.2,
|
||||
"impactScore": 6.0
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-22"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/vulnerability/xstore/wordpress-xstore-theme-9-3-5-unauthenticated-local-file-inclusion-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,83 +2,14 @@
|
||||
"id": "CVE-2024-35812",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2024-05-17T14:15:15.360",
|
||||
"lastModified": "2024-05-17T18:35:35.070",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-06-04T13:15:52.390",
|
||||
"vulnStatus": "Rejected",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nusb: cdc-wdm: close race between read and workqueue\n\nwdm_read() cannot race with itself. However, in\nservice_outstanding_interrupt() it can race with the\nworkqueue, which can be triggered by error handling.\n\nHence we need to make sure that the WDM_RESPONDING\nflag is not just only set but tested."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": " En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: usb: cdc-wdm: ejecuci\u00f3n cercana entre lectura y cola de trabajo wdm_read() no puede ejecutarse consigo mismo. Sin embargo, en service_outstanding_interrupt() puede competir con la cola de trabajo, lo que puede desencadenarse mediante el manejo de errores. Por lo tanto, debemos asegurarnos de que el indicador WDM_RESPONDING no s\u00f3lo est\u00e9 configurado sino tambi\u00e9n probado."
|
||||
"value": "Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/164be0a824387301312689bb29b2be92ab2cd39d",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/19f955ad9437a6859a529af34e2eafd903d5e7c1",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/2ff436b6399859e06539a2b9c667897d3cc85ad5",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/339f83612f3a569b194680768b22bf113c26a29d",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/347cca11bb78b9f3c29b45a9c52e70258bd008bf",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/3afdcc4e1a00facad210f5c5891bb2fbc026067f",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/5904411219601127ffdbd2d622bb5d67f9d8d16c",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/7182175f565ffffa2ba1911726c5656bfc7a1bae",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/8672ad663a22d0e4a325bb7d817b36ec412b967c",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/916cd2fcbc1e344bcabf4b2a834cdf5a0417d30c",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/9723602387217caa71d623ffcce314dc39e84a09",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/9b319f4a88094b2e020e6db6e819c808d890098d",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/a86e54a345139f1a7668c9f83bdc7ac6f91b6f78",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/ab92e11b73b48b79f144421430891f3aa6242656",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/da3b75931bb737be74d6b4341e0080f233ed1409",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/e4e47e406d74cab601b2ab21ba5e3add811e05ae",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
}
|
||||
]
|
||||
"references": []
|
||||
}
|
@ -2,35 +2,14 @@
|
||||
"id": "CVE-2024-35941",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2024-05-19T11:15:49.823",
|
||||
"lastModified": "2024-05-20T13:00:04.957",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-06-04T13:15:52.613",
|
||||
"vulnStatus": "Rejected",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: skbuff: add overflow debug check to pull/push helpers\n\nsyzbot managed to trigger following splat:\nBUG: KASAN: use-after-free in __skb_flow_dissect+0x4a3b/0x5e50\nRead of size 1 at addr ffff888208a4000e by task a.out/2313\n[..]\n __skb_flow_dissect+0x4a3b/0x5e50\n __skb_get_hash+0xb4/0x400\n ip_tunnel_xmit+0x77e/0x26f0\n ipip_tunnel_xmit+0x298/0x410\n ..\n\nAnalysis shows that the skb has a valid ->head, but bogus ->data\npointer.\n\nskb->data gets its bogus value via the neigh layer, which does:\n\n1556 __skb_pull(skb, skb_network_offset(skb));\n\n... and the skb was already dodgy at this point:\n\nskb_network_offset(skb) returns a negative value due to an\nearlier overflow of skb->network_header (u16). __skb_pull thus\n\"adjusts\" skb->data by a huge offset, pointing outside skb->head\narea.\n\nAllow debug builds to splat when we try to pull/push more than\nINT_MAX bytes.\n\nAfter this, the syzkaller reproducer yields a more precise splat\nbefore the flow dissector attempts to read off skb->data memory:\n\nWARNING: CPU: 5 PID: 2313 at include/linux/skbuff.h:2653 neigh_connected_output+0x28e/0x400\n ip_finish_output2+0xb25/0xed0\n iptunnel_xmit+0x4ff/0x870\n ipgre_xmit+0x78e/0xbb0"
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: net: skbuff: agregar verificaci\u00f3n de depuraci\u00f3n de desbordamiento a los asistentes de extracci\u00f3n/empuje syzbot logr\u00f3 activar el siguiente s\u00edmbolo: BUG: KASAN: use after free en __skb_flow_dissect+0x4a3b/0x5e50 Lectura de tama\u00f1o 1 en la direcci\u00f3n ffff888208a4000e por tarea a.out/2313 [..] __skb_flow_dissect+0x4a3b/0x5e50 __skb_get_hash+0xb4/0x400 ip_tunnel_xmit+0x77e/0x26f0 ipip_tunnel_xmit+0x298/0x410 .. El an\u00e1lisis muestra que el skb tiene un ->head v\u00e1lido, pero falso ->puntero de datos. skb->data obtiene su valor falso a trav\u00e9s de la capa vecina, que hace: 1556 __skb_pull(skb, skb_network_offset(skb)); ... y el skb ya era dudoso en este punto: skb_network_offset(skb) devuelve un valor negativo debido a un desbordamiento anterior de skb->network_header (u16). __skb_pull por lo tanto \"ajusta\" los datos skb-> con un desplazamiento enorme, apuntando fuera del \u00e1rea principal de skb->. Permitir que las compilaciones de depuraci\u00f3n se ejecuten cuando intentamos extraer/enviar m\u00e1s de INT_MAX bytes. Despu\u00e9s de esto, el reproductor syzkaller produce un sonido m\u00e1s preciso antes de que el disector de flujo intente leer skb->memoria de datos: ADVERTENCIA: CPU: 5 PID: 2313 en include/linux/skbuff.h:2653 neigh_connected_output+0x28e/0x400 ip_finish_output2+ 0xb25/0xed0 iptunnel_xmit+0x4ff/0x870 ipgre_xmit+0x78e/0xbb0"
|
||||
"value": "Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/1b2b26595bb09febf14c5444c873ac4ec90a5a77",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/219eee9c0d16f1b754a8b85275854ab17df0850a",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/8af60bb2b215f478b886f1d6d302fefa7f0b917d",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/fff05b2b004d9a8a2416d08647f3dc9068e357c8",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
}
|
||||
]
|
||||
"references": []
|
||||
}
|
20
CVE-2024/CVE-2024-368xx/CVE-2024-36800.json
Normal file
20
CVE-2024/CVE-2024-368xx/CVE-2024-36800.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2024-36800",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-06-04T13:15:52.740",
|
||||
"lastModified": "2024-06-04T13:15:52.740",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A SQL injection vulnerability in SEMCMS v.4.8, allows a remote attacker to obtain sensitive information via the ID parameter in Download.php."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/want1997/SEMCMS_VUL/blob/main/Download_sql_vul.md",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2024/CVE-2024-368xx/CVE-2024-36801.json
Normal file
20
CVE-2024/CVE-2024-368xx/CVE-2024-36801.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2024-36801",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-06-04T13:15:52.857",
|
||||
"lastModified": "2024-06-04T13:15:52.857",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A SQL injection vulnerability in SEMCMS v.4.8, allows a remote attacker to obtain sensitive information via the lgid parameter in Download.php."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/want1997/SEMCMS_VUL/blob/main/Download_sql_vul_2.md",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
55
CVE-2024/CVE-2024-370xx/CVE-2024-37052.json
Normal file
55
CVE-2024/CVE-2024-370xx/CVE-2024-37052.json
Normal file
@ -0,0 +1,55 @@
|
||||
{
|
||||
"id": "CVE-2024-37052",
|
||||
"sourceIdentifier": "6f8de1f0-f67e-45a6-b68f-98777fdb759c",
|
||||
"published": "2024-06-04T12:15:10.413",
|
||||
"lastModified": "2024-06-04T12:15:10.413",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Deserialization of untrusted data can occur in versions of the MLflow platform running version 1.1.0 or newer, enabling a maliciously uploaded scikit-learn model to run arbitrary code on an end user\u2019s system when interacted with."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "6f8de1f0-f67e-45a6-b68f-98777fdb759c",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "6f8de1f0-f67e-45a6-b68f-98777fdb759c",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-502"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://hiddenlayer.com/sai-security-advisory/mlflow-june2024",
|
||||
"source": "6f8de1f0-f67e-45a6-b68f-98777fdb759c"
|
||||
}
|
||||
]
|
||||
}
|
55
CVE-2024/CVE-2024-370xx/CVE-2024-37053.json
Normal file
55
CVE-2024/CVE-2024-370xx/CVE-2024-37053.json
Normal file
@ -0,0 +1,55 @@
|
||||
{
|
||||
"id": "CVE-2024-37053",
|
||||
"sourceIdentifier": "6f8de1f0-f67e-45a6-b68f-98777fdb759c",
|
||||
"published": "2024-06-04T12:15:10.957",
|
||||
"lastModified": "2024-06-04T12:15:10.957",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Deserialization of untrusted data can occur in versions of the MLflow platform running version 1.1.0 or newer, enabling a maliciously uploaded scikit-learn model to run arbitrary code on an end user\u2019s system when interacted with."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "6f8de1f0-f67e-45a6-b68f-98777fdb759c",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "6f8de1f0-f67e-45a6-b68f-98777fdb759c",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-502"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://hiddenlayer.com/sai-security-advisory/mlflow-june2024",
|
||||
"source": "6f8de1f0-f67e-45a6-b68f-98777fdb759c"
|
||||
}
|
||||
]
|
||||
}
|
55
CVE-2024/CVE-2024-370xx/CVE-2024-37054.json
Normal file
55
CVE-2024/CVE-2024-370xx/CVE-2024-37054.json
Normal file
@ -0,0 +1,55 @@
|
||||
{
|
||||
"id": "CVE-2024-37054",
|
||||
"sourceIdentifier": "6f8de1f0-f67e-45a6-b68f-98777fdb759c",
|
||||
"published": "2024-06-04T12:15:11.190",
|
||||
"lastModified": "2024-06-04T12:15:11.190",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Deserialization of untrusted data can occur in versions of the MLflow platform running version 0.9.0 or newer, enabling a maliciously uploaded PyFunc model to run arbitrary code on an end user\u2019s system when interacted with."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "6f8de1f0-f67e-45a6-b68f-98777fdb759c",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "6f8de1f0-f67e-45a6-b68f-98777fdb759c",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-502"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://hiddenlayer.com/sai-security-advisory/mlflow-june2024",
|
||||
"source": "6f8de1f0-f67e-45a6-b68f-98777fdb759c"
|
||||
}
|
||||
]
|
||||
}
|
55
CVE-2024/CVE-2024-370xx/CVE-2024-37055.json
Normal file
55
CVE-2024/CVE-2024-370xx/CVE-2024-37055.json
Normal file
@ -0,0 +1,55 @@
|
||||
{
|
||||
"id": "CVE-2024-37055",
|
||||
"sourceIdentifier": "6f8de1f0-f67e-45a6-b68f-98777fdb759c",
|
||||
"published": "2024-06-04T12:15:11.397",
|
||||
"lastModified": "2024-06-04T12:15:11.397",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Deserialization of untrusted data can occur in versions of the MLflow platform running version 1.24.0 or newer, enabling a maliciously uploaded pmdarima model to run arbitrary code on an end user\u2019s system when interacted with."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "6f8de1f0-f67e-45a6-b68f-98777fdb759c",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "6f8de1f0-f67e-45a6-b68f-98777fdb759c",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-502"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://hiddenlayer.com/sai-security-advisory/mlflow-june2024",
|
||||
"source": "6f8de1f0-f67e-45a6-b68f-98777fdb759c"
|
||||
}
|
||||
]
|
||||
}
|
55
CVE-2024/CVE-2024-370xx/CVE-2024-37056.json
Normal file
55
CVE-2024/CVE-2024-370xx/CVE-2024-37056.json
Normal file
@ -0,0 +1,55 @@
|
||||
{
|
||||
"id": "CVE-2024-37056",
|
||||
"sourceIdentifier": "6f8de1f0-f67e-45a6-b68f-98777fdb759c",
|
||||
"published": "2024-06-04T12:15:11.593",
|
||||
"lastModified": "2024-06-04T12:15:11.593",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Deserialization of untrusted data can occur in versions of the MLflow platform running version 1.23.0 or newer, enabling a maliciously uploaded LightGBM scikit-learn model to run arbitrary code on an end user\u2019s system when interacted with."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "6f8de1f0-f67e-45a6-b68f-98777fdb759c",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "6f8de1f0-f67e-45a6-b68f-98777fdb759c",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-502"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://hiddenlayer.com/sai-security-advisory/mlflow-june2024",
|
||||
"source": "6f8de1f0-f67e-45a6-b68f-98777fdb759c"
|
||||
}
|
||||
]
|
||||
}
|
55
CVE-2024/CVE-2024-370xx/CVE-2024-37057.json
Normal file
55
CVE-2024/CVE-2024-370xx/CVE-2024-37057.json
Normal file
@ -0,0 +1,55 @@
|
||||
{
|
||||
"id": "CVE-2024-37057",
|
||||
"sourceIdentifier": "6f8de1f0-f67e-45a6-b68f-98777fdb759c",
|
||||
"published": "2024-06-04T12:15:11.800",
|
||||
"lastModified": "2024-06-04T12:15:11.800",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Deserialization of untrusted data can occur in versions of the MLflow platform running version 2.0.0rc0 or newer, enabling a maliciously uploaded Tensorflow model to run arbitrary code on an end user\u2019s system when interacted with."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "6f8de1f0-f67e-45a6-b68f-98777fdb759c",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "6f8de1f0-f67e-45a6-b68f-98777fdb759c",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-502"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://hiddenlayer.com/sai-security-advisory/mlflow-june2024",
|
||||
"source": "6f8de1f0-f67e-45a6-b68f-98777fdb759c"
|
||||
}
|
||||
]
|
||||
}
|
55
CVE-2024/CVE-2024-370xx/CVE-2024-37058.json
Normal file
55
CVE-2024/CVE-2024-370xx/CVE-2024-37058.json
Normal file
@ -0,0 +1,55 @@
|
||||
{
|
||||
"id": "CVE-2024-37058",
|
||||
"sourceIdentifier": "6f8de1f0-f67e-45a6-b68f-98777fdb759c",
|
||||
"published": "2024-06-04T12:15:12.023",
|
||||
"lastModified": "2024-06-04T12:15:12.023",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Deserialization of untrusted data can occur in versions of the MLflow platform running version 2.5.0 or newer, enabling a maliciously uploaded Langchain AgentExecutor model to run arbitrary code on an end user\u2019s system when interacted with."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "6f8de1f0-f67e-45a6-b68f-98777fdb759c",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "6f8de1f0-f67e-45a6-b68f-98777fdb759c",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-502"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://hiddenlayer.com/sai-security-advisory/mlflow-june2024",
|
||||
"source": "6f8de1f0-f67e-45a6-b68f-98777fdb759c"
|
||||
}
|
||||
]
|
||||
}
|
55
CVE-2024/CVE-2024-370xx/CVE-2024-37059.json
Normal file
55
CVE-2024/CVE-2024-370xx/CVE-2024-37059.json
Normal file
@ -0,0 +1,55 @@
|
||||
{
|
||||
"id": "CVE-2024-37059",
|
||||
"sourceIdentifier": "6f8de1f0-f67e-45a6-b68f-98777fdb759c",
|
||||
"published": "2024-06-04T12:15:12.227",
|
||||
"lastModified": "2024-06-04T12:15:12.227",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Deserialization of untrusted data can occur in versions of the MLflow platform running version 0.5.0 or newer, enabling a maliciously uploaded PyTorch model to run arbitrary code on an end user\u2019s system when interacted with."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "6f8de1f0-f67e-45a6-b68f-98777fdb759c",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "6f8de1f0-f67e-45a6-b68f-98777fdb759c",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-502"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://hiddenlayer.com/sai-security-advisory/mlflow-june2024",
|
||||
"source": "6f8de1f0-f67e-45a6-b68f-98777fdb759c"
|
||||
}
|
||||
]
|
||||
}
|
55
CVE-2024/CVE-2024-370xx/CVE-2024-37060.json
Normal file
55
CVE-2024/CVE-2024-370xx/CVE-2024-37060.json
Normal file
@ -0,0 +1,55 @@
|
||||
{
|
||||
"id": "CVE-2024-37060",
|
||||
"sourceIdentifier": "6f8de1f0-f67e-45a6-b68f-98777fdb759c",
|
||||
"published": "2024-06-04T12:15:12.463",
|
||||
"lastModified": "2024-06-04T12:15:12.463",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Deserialization of untrusted data can occur in versions of the MLflow platform running version 1.27.0 or newer, enabling a maliciously crafted Recipe to execute arbitrary code on an end user\u2019s system when run."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "6f8de1f0-f67e-45a6-b68f-98777fdb759c",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "6f8de1f0-f67e-45a6-b68f-98777fdb759c",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-502"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://hiddenlayer.com/sai-security-advisory/mlflow-june2024",
|
||||
"source": "6f8de1f0-f67e-45a6-b68f-98777fdb759c"
|
||||
}
|
||||
]
|
||||
}
|
55
CVE-2024/CVE-2024-370xx/CVE-2024-37061.json
Normal file
55
CVE-2024/CVE-2024-370xx/CVE-2024-37061.json
Normal file
@ -0,0 +1,55 @@
|
||||
{
|
||||
"id": "CVE-2024-37061",
|
||||
"sourceIdentifier": "6f8de1f0-f67e-45a6-b68f-98777fdb759c",
|
||||
"published": "2024-06-04T12:15:12.703",
|
||||
"lastModified": "2024-06-04T12:15:12.703",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Remote Code Execution can occur in versions of the MLflow platform running version 1.11.0 or newer, enabling a maliciously crafted MLproject to execute arbitrary code on an end user\u2019s system when run."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "6f8de1f0-f67e-45a6-b68f-98777fdb759c",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "6f8de1f0-f67e-45a6-b68f-98777fdb759c",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-94"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://hiddenlayer.com/sai-security-advisory/mlflow-june2024",
|
||||
"source": "6f8de1f0-f67e-45a6-b68f-98777fdb759c"
|
||||
}
|
||||
]
|
||||
}
|
55
CVE-2024/CVE-2024-370xx/CVE-2024-37062.json
Normal file
55
CVE-2024/CVE-2024-370xx/CVE-2024-37062.json
Normal file
@ -0,0 +1,55 @@
|
||||
{
|
||||
"id": "CVE-2024-37062",
|
||||
"sourceIdentifier": "6f8de1f0-f67e-45a6-b68f-98777fdb759c",
|
||||
"published": "2024-06-04T12:15:12.907",
|
||||
"lastModified": "2024-06-04T12:15:12.907",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Deserialization of untrusted data can occur in versions 3.7.0 or newer of Ydata's ydata-profiling open-source library, enabling a malicously crafted report to run arbitrary code on an end user's system when loaded."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "6f8de1f0-f67e-45a6-b68f-98777fdb759c",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 7.8,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "6f8de1f0-f67e-45a6-b68f-98777fdb759c",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-502"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://hiddenlayer.com/sai-security-advisory/ydata-june2024",
|
||||
"source": "6f8de1f0-f67e-45a6-b68f-98777fdb759c"
|
||||
}
|
||||
]
|
||||
}
|
55
CVE-2024/CVE-2024-370xx/CVE-2024-37063.json
Normal file
55
CVE-2024/CVE-2024-370xx/CVE-2024-37063.json
Normal file
@ -0,0 +1,55 @@
|
||||
{
|
||||
"id": "CVE-2024-37063",
|
||||
"sourceIdentifier": "6f8de1f0-f67e-45a6-b68f-98777fdb759c",
|
||||
"published": "2024-06-04T12:15:13.110",
|
||||
"lastModified": "2024-06-04T12:15:13.110",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A cross-site scripting (XSS) vulnerability in versions 3.7.0 or newer of Ydata's ydata-profiling open-source library allows for payloads to be run when a maliocusly crafted report is viewed in the browser."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "6f8de1f0-f67e-45a6-b68f-98777fdb759c",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 7.8,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "6f8de1f0-f67e-45a6-b68f-98777fdb759c",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://hiddenlayer.com/sai-security-advisory/ydata-june2024",
|
||||
"source": "6f8de1f0-f67e-45a6-b68f-98777fdb759c"
|
||||
}
|
||||
]
|
||||
}
|
55
CVE-2024/CVE-2024-370xx/CVE-2024-37064.json
Normal file
55
CVE-2024/CVE-2024-370xx/CVE-2024-37064.json
Normal file
@ -0,0 +1,55 @@
|
||||
{
|
||||
"id": "CVE-2024-37064",
|
||||
"sourceIdentifier": "6f8de1f0-f67e-45a6-b68f-98777fdb759c",
|
||||
"published": "2024-06-04T12:15:13.313",
|
||||
"lastModified": "2024-06-04T12:15:13.313",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Deseriliazation of untrusted data can occur in versions 3.7.0 or newer of Ydata's ydata-profiling open-source library, enabling a maliciously crafted dataset to run arbitrary code on an end user's system when loaded."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "6f8de1f0-f67e-45a6-b68f-98777fdb759c",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 7.8,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "6f8de1f0-f67e-45a6-b68f-98777fdb759c",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-502"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://hiddenlayer.com/sai-security-advisory/ydata-june2024",
|
||||
"source": "6f8de1f0-f67e-45a6-b68f-98777fdb759c"
|
||||
}
|
||||
]
|
||||
}
|
55
CVE-2024/CVE-2024-370xx/CVE-2024-37065.json
Normal file
55
CVE-2024/CVE-2024-370xx/CVE-2024-37065.json
Normal file
@ -0,0 +1,55 @@
|
||||
{
|
||||
"id": "CVE-2024-37065",
|
||||
"sourceIdentifier": "6f8de1f0-f67e-45a6-b68f-98777fdb759c",
|
||||
"published": "2024-06-04T12:15:13.507",
|
||||
"lastModified": "2024-06-04T12:15:13.507",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Deserialization of untrusted data can occur in versions 0.6 or newer of the skops python library, enabling a maliciously crafted model to run arbitrary code on an end user's system when loaded."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "6f8de1f0-f67e-45a6-b68f-98777fdb759c",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 7.8,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "6f8de1f0-f67e-45a6-b68f-98777fdb759c",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-502"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://hiddenlayer.com/sai-security-advisory/skops-june2024",
|
||||
"source": "6f8de1f0-f67e-45a6-b68f-98777fdb759c"
|
||||
}
|
||||
]
|
||||
}
|
59
CVE-2024/CVE-2024-42xx/CVE-2024-4254.json
Normal file
59
CVE-2024/CVE-2024-42xx/CVE-2024-4254.json
Normal file
@ -0,0 +1,59 @@
|
||||
{
|
||||
"id": "CVE-2024-4254",
|
||||
"sourceIdentifier": "security@huntr.dev",
|
||||
"published": "2024-06-04T12:15:13.710",
|
||||
"lastModified": "2024-06-04T12:15:13.710",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The 'deploy-website.yml' workflow in the gradio-app/gradio repository, specifically in the 'main' branch, is vulnerable to secrets exfiltration due to improper authorization. The vulnerability arises from the workflow's explicit checkout and execution of code from a fork, which is unsafe as it allows the running of untrusted code in an environment with access to push to the base repository and access secrets. This flaw could lead to the exfiltration of sensitive secrets such as GITHUB_TOKEN, HF_TOKEN, VERCEL_ORG_ID, VERCEL_PROJECT_ID, COMMENT_TOKEN, AWSACCESSKEYID, AWSSECRETKEY, and VERCEL_TOKEN. The vulnerability is present in the workflow file located at https://github.com/gradio-app/gradio/blob/72f4ca88ab569aae47941b3fb0609e57f2e13a27/.github/workflows/deploy-website.yml."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "La neutralizaci\u00f3n inadecuada de etiquetas HTML relacionadas con scripts en una vulnerabilidad de p\u00e1gina web (XSS b\u00e1sico) en PickPlugins Tabs & Accordion permite la inyecci\u00f3n de c\u00f3digo. Este problema afecta a Tabs & Accordion: desde n/a hasta 1.3.10."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV30": [
|
||||
{
|
||||
"source": "security@huntr.dev",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.0",
|
||||
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 7.1,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 4.2
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security@huntr.dev",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-285"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://huntr.com/bounties/59873fbd-5698-4ec3-87f9-5d70c6055d01",
|
||||
"source": "security@huntr.dev"
|
||||
}
|
||||
]
|
||||
}
|
60
README.md
60
README.md
@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
|
||||
### Last Repository Update
|
||||
|
||||
```plain
|
||||
2024-06-04T12:00:30.469610+00:00
|
||||
2024-06-04T14:00:38.127097+00:00
|
||||
```
|
||||
|
||||
### Most recent CVE Modification Timestamp synchronized with NVD
|
||||
|
||||
```plain
|
||||
2024-06-04T11:15:51.010000+00:00
|
||||
2024-06-04T13:15:52.857000+00:00
|
||||
```
|
||||
|
||||
### Last Data Feed Release
|
||||
@ -33,42 +33,46 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
|
||||
### Total Number of included CVEs
|
||||
|
||||
```plain
|
||||
252575
|
||||
252607
|
||||
```
|
||||
|
||||
### CVEs added in the last Commit
|
||||
|
||||
Recently added CVEs: `23`
|
||||
Recently added CVEs: `32`
|
||||
|
||||
- [CVE-2023-45053](CVE-2023/CVE-2023-450xx/CVE-2023-45053.json) (`2024-06-04T10:15:08.910`)
|
||||
- [CVE-2023-45635](CVE-2023/CVE-2023-456xx/CVE-2023-45635.json) (`2024-06-04T10:15:10.230`)
|
||||
- [CVE-2023-46310](CVE-2023/CVE-2023-463xx/CVE-2023-46310.json) (`2024-06-04T10:15:10.503`)
|
||||
- [CVE-2023-46630](CVE-2023/CVE-2023-466xx/CVE-2023-46630.json) (`2024-06-04T10:15:10.763`)
|
||||
- [CVE-2023-47189](CVE-2023/CVE-2023-471xx/CVE-2023-47189.json) (`2024-06-04T10:15:11.010`)
|
||||
- [CVE-2023-47513](CVE-2023/CVE-2023-475xx/CVE-2023-47513.json) (`2024-06-04T10:15:11.250`)
|
||||
- [CVE-2023-47663](CVE-2023/CVE-2023-476xx/CVE-2023-47663.json) (`2024-06-04T10:15:11.483`)
|
||||
- [CVE-2023-47769](CVE-2023/CVE-2023-477xx/CVE-2023-47769.json) (`2024-06-04T10:15:11.733`)
|
||||
- [CVE-2023-47818](CVE-2023/CVE-2023-478xx/CVE-2023-47818.json) (`2024-06-04T10:15:11.997`)
|
||||
- [CVE-2023-47837](CVE-2023/CVE-2023-478xx/CVE-2023-47837.json) (`2024-06-04T10:15:12.237`)
|
||||
- [CVE-2023-48271](CVE-2023/CVE-2023-482xx/CVE-2023-48271.json) (`2024-06-04T11:15:48.110`)
|
||||
- [CVE-2023-48276](CVE-2023/CVE-2023-482xx/CVE-2023-48276.json) (`2024-06-04T11:15:48.360`)
|
||||
- [CVE-2023-48285](CVE-2023/CVE-2023-482xx/CVE-2023-48285.json) (`2024-06-04T11:15:48.580`)
|
||||
- [CVE-2023-48290](CVE-2023/CVE-2023-482xx/CVE-2023-48290.json) (`2024-06-04T11:15:48.830`)
|
||||
- [CVE-2023-48318](CVE-2023/CVE-2023-483xx/CVE-2023-48318.json) (`2024-06-04T11:15:49.053`)
|
||||
- [CVE-2023-48335](CVE-2023/CVE-2023-483xx/CVE-2023-48335.json) (`2024-06-04T11:15:49.897`)
|
||||
- [CVE-2023-48745](CVE-2023/CVE-2023-487xx/CVE-2023-48745.json) (`2024-06-04T11:15:50.123`)
|
||||
- [CVE-2023-48747](CVE-2023/CVE-2023-487xx/CVE-2023-48747.json) (`2024-06-04T11:15:50.347`)
|
||||
- [CVE-2023-48753](CVE-2023/CVE-2023-487xx/CVE-2023-48753.json) (`2024-06-04T11:15:50.563`)
|
||||
- [CVE-2023-49741](CVE-2023/CVE-2023-497xx/CVE-2023-49741.json) (`2024-06-04T11:15:50.783`)
|
||||
- [CVE-2023-49748](CVE-2023/CVE-2023-497xx/CVE-2023-49748.json) (`2024-06-04T11:15:51.010`)
|
||||
- [CVE-2024-4637](CVE-2024/CVE-2024-46xx/CVE-2024-4637.json) (`2024-06-04T10:15:12.503`)
|
||||
- [CVE-2024-5463](CVE-2024/CVE-2024-54xx/CVE-2024-5463.json) (`2024-06-04T10:15:12.747`)
|
||||
- [CVE-2023-51667](CVE-2023/CVE-2023-516xx/CVE-2023-51667.json) (`2024-06-04T13:15:50.500`)
|
||||
- [CVE-2023-52147](CVE-2023/CVE-2023-521xx/CVE-2023-52147.json) (`2024-06-04T13:15:50.730`)
|
||||
- [CVE-2023-52176](CVE-2023/CVE-2023-521xx/CVE-2023-52176.json) (`2024-06-04T13:15:50.960`)
|
||||
- [CVE-2024-25600](CVE-2024/CVE-2024-256xx/CVE-2024-25600.json) (`2024-06-04T13:15:51.183`)
|
||||
- [CVE-2024-29170](CVE-2024/CVE-2024-291xx/CVE-2024-29170.json) (`2024-06-04T13:15:51.460`)
|
||||
- [CVE-2024-33541](CVE-2024/CVE-2024-335xx/CVE-2024-33541.json) (`2024-06-04T13:15:51.717`)
|
||||
- [CVE-2024-33557](CVE-2024/CVE-2024-335xx/CVE-2024-33557.json) (`2024-06-04T13:15:51.943`)
|
||||
- [CVE-2024-33560](CVE-2024/CVE-2024-335xx/CVE-2024-33560.json) (`2024-06-04T13:15:52.177`)
|
||||
- [CVE-2024-36800](CVE-2024/CVE-2024-368xx/CVE-2024-36800.json) (`2024-06-04T13:15:52.740`)
|
||||
- [CVE-2024-36801](CVE-2024/CVE-2024-368xx/CVE-2024-36801.json) (`2024-06-04T13:15:52.857`)
|
||||
- [CVE-2024-37052](CVE-2024/CVE-2024-370xx/CVE-2024-37052.json) (`2024-06-04T12:15:10.413`)
|
||||
- [CVE-2024-37053](CVE-2024/CVE-2024-370xx/CVE-2024-37053.json) (`2024-06-04T12:15:10.957`)
|
||||
- [CVE-2024-37054](CVE-2024/CVE-2024-370xx/CVE-2024-37054.json) (`2024-06-04T12:15:11.190`)
|
||||
- [CVE-2024-37055](CVE-2024/CVE-2024-370xx/CVE-2024-37055.json) (`2024-06-04T12:15:11.397`)
|
||||
- [CVE-2024-37056](CVE-2024/CVE-2024-370xx/CVE-2024-37056.json) (`2024-06-04T12:15:11.593`)
|
||||
- [CVE-2024-37057](CVE-2024/CVE-2024-370xx/CVE-2024-37057.json) (`2024-06-04T12:15:11.800`)
|
||||
- [CVE-2024-37058](CVE-2024/CVE-2024-370xx/CVE-2024-37058.json) (`2024-06-04T12:15:12.023`)
|
||||
- [CVE-2024-37059](CVE-2024/CVE-2024-370xx/CVE-2024-37059.json) (`2024-06-04T12:15:12.227`)
|
||||
- [CVE-2024-37060](CVE-2024/CVE-2024-370xx/CVE-2024-37060.json) (`2024-06-04T12:15:12.463`)
|
||||
- [CVE-2024-37061](CVE-2024/CVE-2024-370xx/CVE-2024-37061.json) (`2024-06-04T12:15:12.703`)
|
||||
- [CVE-2024-37062](CVE-2024/CVE-2024-370xx/CVE-2024-37062.json) (`2024-06-04T12:15:12.907`)
|
||||
- [CVE-2024-37063](CVE-2024/CVE-2024-370xx/CVE-2024-37063.json) (`2024-06-04T12:15:13.110`)
|
||||
- [CVE-2024-37064](CVE-2024/CVE-2024-370xx/CVE-2024-37064.json) (`2024-06-04T12:15:13.313`)
|
||||
- [CVE-2024-37065](CVE-2024/CVE-2024-370xx/CVE-2024-37065.json) (`2024-06-04T12:15:13.507`)
|
||||
- [CVE-2024-4254](CVE-2024/CVE-2024-42xx/CVE-2024-4254.json) (`2024-06-04T12:15:13.710`)
|
||||
|
||||
|
||||
### CVEs modified in the last Commit
|
||||
|
||||
Recently modified CVEs: `0`
|
||||
Recently modified CVEs: `2`
|
||||
|
||||
- [CVE-2024-35812](CVE-2024/CVE-2024-358xx/CVE-2024-35812.json) (`2024-06-04T13:15:52.390`)
|
||||
- [CVE-2024-35941](CVE-2024/CVE-2024-359xx/CVE-2024-35941.json) (`2024-06-04T13:15:52.613`)
|
||||
|
||||
|
||||
## Download and Usage
|
||||
|
82
_state.csv
82
_state.csv
@ -233023,7 +233023,7 @@ CVE-2023-4505,0,0,08b70dab223e070448e8024455ddb0f539257ee2b24cfc38a707e72f793349
|
||||
CVE-2023-45050,0,0,8f8aaf9978e1f6b51424180837903cefeda602198ba3442bade325d037556925,2023-12-06T01:35:40.773000
|
||||
CVE-2023-45051,0,0,98c1234cd2915993eece196edbe810f57ef1b010cf2ce9dd18b13e4b80b75999,2023-10-25T17:38:21.743000
|
||||
CVE-2023-45052,0,0,77eae12b4fa2c0060b640686cdc1b66acb79dc74365b8ea6d1b0f525f1ee5cd3,2023-10-17T18:46:40.420000
|
||||
CVE-2023-45053,1,1,5d5291c2be05a1a0d3d29941ccec77b140bce37622b0ae0a5dcaedb27d06d603,2024-06-04T10:15:08.910000
|
||||
CVE-2023-45053,0,0,5d5291c2be05a1a0d3d29941ccec77b140bce37622b0ae0a5dcaedb27d06d603,2024-06-04T10:15:08.910000
|
||||
CVE-2023-45054,0,0,5cf4f35927445900a23289b0d29f26559cbb68153e91dcb6f028b8c7bffa42f5,2023-10-25T17:38:17.183000
|
||||
CVE-2023-45055,0,0,29d2114299b4c74ef616613f44aa4a41e7c344a77a335209ab301aa44eec913d,2023-11-10T04:17:47.710000
|
||||
CVE-2023-45056,0,0,604dfc916b43be62f3fa1decb2fd0cdd1a0e154ba3f074058bd7b87bd6fc06af,2023-10-25T17:38:11.073000
|
||||
@ -233412,7 +233412,7 @@ CVE-2023-4563,0,0,412b1f6b2f76e9ab4f58110f6336496ea198dfd1f5fe1f2104578419cf6b7d
|
||||
CVE-2023-45630,0,0,9fc893dbea1d675c98e712ff9836a3725b1d9f0d2e711bc0435b7b8c3484f136,2023-10-25T01:25:54.793000
|
||||
CVE-2023-45632,0,0,88e1fbb02ed73f35a312972f995f300ebe519b50b83ad604758f398fd3076f01,2023-10-25T01:25:40.933000
|
||||
CVE-2023-45634,0,0,222c7ba9ec90c1b83fd757865960ed1c5030304592c085cf10febdc47ea7b650,2023-10-27T21:58:08.617000
|
||||
CVE-2023-45635,1,1,8b30674cfea1649c0e4c539bc42c7beae8cfb0be774152d3e3da09df26a34b31,2024-06-04T10:15:10.230000
|
||||
CVE-2023-45635,0,0,8b30674cfea1649c0e4c539bc42c7beae8cfb0be774152d3e3da09df26a34b31,2024-06-04T10:15:10.230000
|
||||
CVE-2023-45637,0,0,ce351731ba0a8610cbad237c54fb040fc139e08d0e54bb0f87f52fa3c2b38441,2023-10-27T21:56:43.497000
|
||||
CVE-2023-45638,0,0,f34ee74ed9686647b6878a8dbcb2dcdc1cb7815775b0d609411d36d8b03bee09,2023-10-18T22:46:07.233000
|
||||
CVE-2023-45639,0,0,d05428ded578d92aae600cdf5ba945b03825316ce06495020814900fe8c77295,2023-10-19T17:44:02.860000
|
||||
@ -233941,7 +233941,7 @@ CVE-2023-46306,0,0,3cc3c3abc132825b0de5e5713618461432ca75d34cf5d6314908b068992c1
|
||||
CVE-2023-46307,0,0,70b1e7b39477592163424a81cdcac5736b174b2b3ef677dc9db177c5b5ec12cc,2023-12-12T17:06:02.260000
|
||||
CVE-2023-46308,0,0,93fc954f3a128690a25cd4b8d8fc47afecd3303f2e318c0a2f0696550f2b4f76,2024-01-09T17:47:09.937000
|
||||
CVE-2023-4631,0,0,f9a75b3fa9259593f2eb56bbd324a3965971ccf8066af6586ae560be6a935dcc,2023-11-07T04:22:48.020000
|
||||
CVE-2023-46310,1,1,697ca4ef4362b8d3acea8b057f97868ca23a1d6027a886ae69340c819919f451,2024-06-04T10:15:10.503000
|
||||
CVE-2023-46310,0,0,697ca4ef4362b8d3acea8b057f97868ca23a1d6027a886ae69340c819919f451,2024-06-04T10:15:10.503000
|
||||
CVE-2023-46311,0,0,0e5573500a39b307b2c60ac16805905b2aa525dda4cdcdcb4966393d238681d6,2023-12-28T20:06:13.850000
|
||||
CVE-2023-46312,0,0,d9900d295c00c4481ba9b90bea85e05da8631659306e5a8ba168f098d658bd0c,2023-11-08T02:24:43.287000
|
||||
CVE-2023-46313,0,0,26bdfe7606548277b659acc13ea81113d83bd485148153f8e6f1479f3453c4b8,2023-11-08T02:24:23.733000
|
||||
@ -234162,7 +234162,7 @@ CVE-2023-46626,0,0,0b0beadc63340a6291f32184a96243409d2f154e401306ac5354c2b1c4a6a
|
||||
CVE-2023-46627,0,0,7f16ed5dc70512013a689d7944b262d15c359a886dfc5e808745660f4609f404,2023-11-14T21:37:36.790000
|
||||
CVE-2023-46629,0,0,5503221f06ac5332965ebc5158075320ae19f6baca95ee3c98fed08ac83638f2,2023-11-16T23:43:08.647000
|
||||
CVE-2023-4663,0,0,cb622107dd10fb47dae31471f695667bb4b847cab355f5a2ad5655a20b6c6ab1,2023-09-20T15:13:47.473000
|
||||
CVE-2023-46630,1,1,96512019659de34a7264860eb952668dd8e608ba653a8728f3562b0fd195a886,2024-06-04T10:15:10.763000
|
||||
CVE-2023-46630,0,0,96512019659de34a7264860eb952668dd8e608ba653a8728f3562b0fd195a886,2024-06-04T10:15:10.763000
|
||||
CVE-2023-46634,0,0,26b30da45e705e737045cedcde5ac25dcf6d1d8f3125169488fe7ac5dfacf289,2023-11-16T18:16:13.293000
|
||||
CVE-2023-46636,0,0,76f23cc9dc7d46435807ed86a5b91b8788ee4db7afc6a3de8bbb87d83d51b54e,2023-11-16T23:43:01.907000
|
||||
CVE-2023-46638,0,0,3b1109a32586059e441b0a97ccdf0f6ba9d2e5b5fd1cdbeed38bc39f535c3e34,2023-11-16T23:42:55.590000
|
||||
@ -234584,7 +234584,7 @@ CVE-2023-47182,0,0,eee2b9dfe6778e43d4732644b2e34d2afd4c49bd2f627bf97c8e8b049e269
|
||||
CVE-2023-47184,0,0,006726597518e035c83402b563d90ce82bbd4e93b3d7bff5677ac8e71b1804be,2023-11-14T17:04:27.783000
|
||||
CVE-2023-47185,0,0,ac03a4a2ac5445aa1c0a5599ec1cdcab29877cde46f4b0a2c7ea0971295ff8b2,2023-11-14T17:04:12.320000
|
||||
CVE-2023-47186,0,0,a6af3e99b206f650a389e2a8494459f846190c40032cb975dfcfe476c602b082,2023-11-14T16:23:05.433000
|
||||
CVE-2023-47189,1,1,c164f4fb23212fe24e6dbdc9124ae3764e9471c2aea778ee152a86ac10f51d2d,2024-06-04T10:15:11.010000
|
||||
CVE-2023-47189,0,0,c164f4fb23212fe24e6dbdc9124ae3764e9471c2aea778ee152a86ac10f51d2d,2024-06-04T10:15:11.010000
|
||||
CVE-2023-4719,0,0,9d704bdac1249c1a3cf0b1f88156a66fb03186a2a8754fabc0ad1e260ab11edd,2023-11-07T04:22:53.820000
|
||||
CVE-2023-47190,0,0,e27cf06847b50fbed203c73f80d55aba75b4ca0cd31399718ceaccb76d2c2842,2023-11-14T21:11:29.610000
|
||||
CVE-2023-47191,0,0,796a13ca4fd3a2989a78f73cb74e0c925cce0a5be713b993f15a19097a7de4e9,2023-12-30T03:20:37.497000
|
||||
@ -234775,7 +234775,7 @@ CVE-2023-4751,0,0,b474afbd68a51ccc03983fb09d5bc361aa5e9bd679ddad99f0eb8301553cba
|
||||
CVE-2023-47510,0,0,71e4b62dfe2ca075ffc368295060ad4f08e446acff4b59a4de0732b86e57af88,2023-11-14T20:56:50.343000
|
||||
CVE-2023-47511,0,0,dc9ad40d182dd905b0efd3c019af8e1021f2bf27961092c32bd1879259c14169,2023-11-22T18:23:46.350000
|
||||
CVE-2023-47512,0,0,6a66c2385408c365d0ff6a8ea66cc9e3cb01fa3d0449aa00aa5c2aed8f58da63,2023-11-21T01:05:27.800000
|
||||
CVE-2023-47513,1,1,ef0f7402d042d768b876c444e1f50e8441924c964fd91afced37d11e13e0bb6a,2024-06-04T10:15:11.250000
|
||||
CVE-2023-47513,0,0,ef0f7402d042d768b876c444e1f50e8441924c964fd91afced37d11e13e0bb6a,2024-06-04T10:15:11.250000
|
||||
CVE-2023-47514,0,0,a8e90cce931ded77e76cd956d1561635883b69077cf7fbb5fd3d59a8e4382686,2023-11-22T18:31:02.543000
|
||||
CVE-2023-47516,0,0,5e1e7faad407b03f5aedd6d01043b5471f45260b07b691d1aea5a2815ab05971,2023-11-16T18:16:05.383000
|
||||
CVE-2023-47517,0,0,af418bf6e062ac43a7ba3a8a7bd4b86a8406757faed0cee97fddcbbf9b7f27ea,2023-11-21T00:45:47.997000
|
||||
@ -234899,7 +234899,7 @@ CVE-2023-47659,0,0,8be60f9ac5ea724d3de91bba3a133532ccfd93b448ae5f662e01779b71fc1
|
||||
CVE-2023-4766,0,0,45c5b495c455d2e827148893303d53ee4181ef288443d797f74c2953a841cc0a,2023-09-19T02:26:50.013000
|
||||
CVE-2023-47660,0,0,223305f40be65b9cd91149bb778c4d946d32d4a22823fbb8b304b1f867c082de,2023-11-20T16:56:01.590000
|
||||
CVE-2023-47662,0,0,54da8b7441f7ec7d21dd4df05a98b5af1e7fc05632dc959a9adff5e987eba44b,2023-11-21T17:01:11.083000
|
||||
CVE-2023-47663,1,1,d978480323dfa79cf2cb95eff29b69070c43e007b7cb9ad4dc0ed7a818785933,2024-06-04T10:15:11.483000
|
||||
CVE-2023-47663,0,0,d978480323dfa79cf2cb95eff29b69070c43e007b7cb9ad4dc0ed7a818785933,2024-06-04T10:15:11.483000
|
||||
CVE-2023-47664,0,0,36cf2c33ba3fa94d975d1f76be3a2e8972d58018edf6c33a7ab266f2bdb50ced,2023-11-24T22:48:31.267000
|
||||
CVE-2023-47665,0,0,d831123b04a54e61afcecac29d93ba42a3fdfb5ad3ac75aa9ca009babd761374,2023-11-16T23:44:26.317000
|
||||
CVE-2023-47666,0,0,f0e686f55dddcc71b3497b4ac6b93dd63942c388eb21336b70c919030c9772e7,2023-11-24T22:48:09.573000
|
||||
@ -234972,7 +234972,7 @@ CVE-2023-47765,0,0,3251ed3fd28a6fec07ac7cb9a8062141687a024f352fd8ca51a5261474100
|
||||
CVE-2023-47766,0,0,7899cca13e1385e375f32ebb1b3937b93c65cd574d277550bab56e26b7a4da55,2023-11-28T19:18:00.713000
|
||||
CVE-2023-47767,0,0,d83e27c39cbb312ccf0217c3b2c5d4f56f6e2b810766abaf5e7fcfbee9251a94,2023-11-28T19:19:35.667000
|
||||
CVE-2023-47768,0,0,9cefbe9c9b382b54c5ee099fb76d85e1fd42d31125fbe85625df2f10a347f516,2023-11-28T19:22:41.277000
|
||||
CVE-2023-47769,1,1,eccf1058d1edd338fb4f0de8019ef7933459516585ba4f07210404762e4fe061,2024-06-04T10:15:11.733000
|
||||
CVE-2023-47769,0,0,eccf1058d1edd338fb4f0de8019ef7933459516585ba4f07210404762e4fe061,2024-06-04T10:15:11.733000
|
||||
CVE-2023-4777,0,0,2285f3b3937f1b6ee7b5013a1072c08eed965f2b904b03b7b4184647f26697b4,2023-09-13T12:54:59.283000
|
||||
CVE-2023-47772,0,0,7713bada3e93d580185e7757a00736557df9fbba8e32d5584ac0aaf5b9527567,2023-11-27T20:23:44.047000
|
||||
CVE-2023-47773,0,0,298e58c18c603d342f120209e3a04b3e42e7e1fc100c9336741efc054d287705,2023-11-30T04:55:31.483000
|
||||
@ -235011,7 +235011,7 @@ CVE-2023-47814,0,0,4856a6025149093aa5ff1e806dfe9fc38a6ab4027dcdee287805bc3052d1f
|
||||
CVE-2023-47815,0,0,14ce2eef99bc2d9086139a275a9b134de7a4f7b6cb6c448a8a7e25edfd1efa90,2023-11-28T20:05:31.977000
|
||||
CVE-2023-47816,0,0,e082edd53a6a4eed5960f7ab77c59be8833c6ec71604cf00765311a3b449101b,2023-11-28T20:07:47.730000
|
||||
CVE-2023-47817,0,0,c7f6e34a92682e0578e30cc5b35895d83c1350af99047d963ddb37699701bf08,2023-11-28T20:23:25.427000
|
||||
CVE-2023-47818,1,1,18ca272b54a0147dc671e257ee3463ad43770ea986245527463f858af9b66b50,2024-06-04T10:15:11.997000
|
||||
CVE-2023-47818,0,0,18ca272b54a0147dc671e257ee3463ad43770ea986245527463f858af9b66b50,2024-06-04T10:15:11.997000
|
||||
CVE-2023-47819,0,0,3ac1dddd9619f10e6a99e054670d02ef9e97893f1f3f4906281325d948991a94,2023-11-29T02:29:33
|
||||
CVE-2023-4782,0,0,a08a89cf905ee8629cef1fe4ebfdaf2e3f2cfe374d0c88eaa92a133223524295,2023-09-12T18:34:45.990000
|
||||
CVE-2023-47821,0,0,dac8e9ebeae5e88fc92354391c4f187a5fe46b91ec13faf3e8bb2be9422c5e19,2023-11-28T20:23:38.657000
|
||||
@ -235024,7 +235024,7 @@ CVE-2023-47831,0,0,4ffecae7c979e98c1749b725e6bb7e9e2e4e58e21f7a0369a7e31a101a513
|
||||
CVE-2023-47833,0,0,f7236df431372004a0d559bf44f7c2f8b84efc80bec2779f11bc374cd0c0ad16,2023-11-28T20:25:42.100000
|
||||
CVE-2023-47834,0,0,920967a055b2bc21ff0798aa9e7d238eed9616b66b2486f71c8817a9616735ed,2023-11-28T20:24:06.653000
|
||||
CVE-2023-47835,0,0,7a712355ce5c48eadcb9e26f4f27778335f03b4bfa9861aa3fd9d0cda8b8d8fa,2023-11-28T20:21:32.220000
|
||||
CVE-2023-47837,1,1,33f52880a7c61768be04c7c57e1a848f73ef1b73ab6050bceb722ef8a3b3f93a,2024-06-04T10:15:12.237000
|
||||
CVE-2023-47837,0,0,33f52880a7c61768be04c7c57e1a848f73ef1b73ab6050bceb722ef8a3b3f93a,2024-06-04T10:15:12.237000
|
||||
CVE-2023-47839,0,0,7480547339b9b3ac3798f9c06e00c706f49ca35ebe73ec8189117729e422f769,2023-11-28T21:07:29.180000
|
||||
CVE-2023-47840,0,0,7e24f7bfe5242765e69f6a2a237de2196af9eb411219ff1fe89053605cf27eb0,2024-01-04T21:27:45.337000
|
||||
CVE-2023-47842,0,0,f440905c307b5610d2cfc83060eabc85c90c284cc9c17dab2bd938d9d5409ffb,2024-03-27T12:29:30.307000
|
||||
@ -235233,10 +235233,10 @@ CVE-2023-48265,0,0,b17021609fe4e77772f01fb0192ebb95b1219206f6043e8cd864d7b0ca321
|
||||
CVE-2023-48266,0,0,d6f171231beb0ee1180aa8d7b71e94eefc1322fbdfbaea0d577085088643877b,2024-01-16T20:31:40.710000
|
||||
CVE-2023-48268,0,0,7fbc38e1f3021e6f57ddbb59802c5c032dea61c9b04627258986c5e024d76a9e,2023-12-01T21:30:14.497000
|
||||
CVE-2023-4827,0,0,660cb613242cf8fb9cab965004afed839f4beeb124259e7181eab5017ac3219d,2023-11-07T04:23:00.800000
|
||||
CVE-2023-48271,1,1,e198b5fcc18c6acd50fcc74a52358b75b0f4bb3d7f5d0c3de02bfc704ca71c88,2024-06-04T11:15:48.110000
|
||||
CVE-2023-48271,0,0,e198b5fcc18c6acd50fcc74a52358b75b0f4bb3d7f5d0c3de02bfc704ca71c88,2024-06-04T11:15:48.110000
|
||||
CVE-2023-48272,0,0,6b4df1e347c87fa206b94499a385869f076cd0e708e56b463683f8e1d53c3c9b,2023-12-06T03:01:23.517000
|
||||
CVE-2023-48275,0,0,21d3cdc7ae6f4754c5c550b6018b42b200823b5664b8a35a50e38d3b76fa2a9c,2024-03-27T12:29:30.307000
|
||||
CVE-2023-48276,1,1,bad73fc5cc054e9eae25b42b78cfe9155a3d57077a37b2e9742a40a863a5ea1c,2024-06-04T11:15:48.360000
|
||||
CVE-2023-48276,0,0,bad73fc5cc054e9eae25b42b78cfe9155a3d57077a37b2e9742a40a863a5ea1c,2024-06-04T11:15:48.360000
|
||||
CVE-2023-48278,0,0,b8b615ff398a78f2adcd1913a459812b30de22df732a4689ed336a4365900549,2023-12-06T03:09:04.530000
|
||||
CVE-2023-48279,0,0,677bb12e80f04b87e5ac81a35a4d9bd35cc895da5798b0a5048d841cd32d97ee,2023-12-05T20:02:01.297000
|
||||
CVE-2023-4828,0,0,24b41979bedd35424b37496bcb2f184802754cdeb975ef549331a7b6a0081487,2023-10-13T22:15:10.717000
|
||||
@ -235244,11 +235244,11 @@ CVE-2023-48281,0,0,78bb75864e8c316aa8b5f84c9c0f28b82743f6997d5689af36c482f028e2d
|
||||
CVE-2023-48282,0,0,ee3f545b59bd799e6b5f304fecb83dbf55a1929c520ea20b716dec4f6a6eff71,2023-12-05T01:59:29.907000
|
||||
CVE-2023-48283,0,0,83cf0ca71c7297ce8678051d1511978415ac96314858b5a75a8f14c4ce5a7132,2023-12-05T02:00:00.967000
|
||||
CVE-2023-48284,0,0,707a63c06b80a67b3edfbd0b32b7920d7daf4bc225624c51ea3cda01f05f1c20,2023-12-05T02:00:11.640000
|
||||
CVE-2023-48285,1,1,2589b932e1f372cc09b55a9fe98aaa4ee06515d7a55d9d5f1f59af36cd4c8fe3,2024-06-04T11:15:48.580000
|
||||
CVE-2023-48285,0,0,2589b932e1f372cc09b55a9fe98aaa4ee06515d7a55d9d5f1f59af36cd4c8fe3,2024-06-04T11:15:48.580000
|
||||
CVE-2023-48288,0,0,19ac24ac88dcab5b08a8c9544462ea918482f622a54e6ba82de96a12c2a282a6,2023-12-29T03:27:57.107000
|
||||
CVE-2023-48289,0,0,d07d661ce1e3569a469e3ecdc2654b4ce8846c7807e0b2fb1419505629ae39ee,2023-12-05T19:24:11.607000
|
||||
CVE-2023-4829,0,0,d207290f9e2022e9bf7ed5126f661135ba76d996e11407f54a0a92ba9b964dd1,2023-10-17T16:10:31.727000
|
||||
CVE-2023-48290,1,1,8b6c0e67ff8875f134bad31ffe29f2d1b73e00eb622e7abfb7d449464c836c8e,2024-06-04T11:15:48.830000
|
||||
CVE-2023-48290,0,0,8b6c0e67ff8875f134bad31ffe29f2d1b73e00eb622e7abfb7d449464c836c8e,2024-06-04T11:15:48.830000
|
||||
CVE-2023-48291,0,0,f9f5f2eb0ee5639697b41278ba7a983f05d86493bd5557765f2336f6bf74d216,2023-12-28T13:52:59.233000
|
||||
CVE-2023-48292,0,0,ce3417881b0a91671ae0501e6e6066ed9d24b7b451a210ac59f07a3bb04fedda,2023-11-29T20:44:39.200000
|
||||
CVE-2023-48293,0,0,8b35a584f0bf90d96e4cf0e61badd1f4868f960a52dc86a9d33b7fb2539e9f7c,2023-11-29T18:02:07.070000
|
||||
@ -235278,7 +235278,7 @@ CVE-2023-48314,0,0,9faec629ee42cb2d239fc27af92843fe8286afd13377596097cb188be12b6
|
||||
CVE-2023-48315,0,0,b5df8c75d4323e7134f44169a32c9df27b1253f0ff5a8201e03343cd29e61c28,2023-12-08T19:04:07.240000
|
||||
CVE-2023-48316,0,0,857bf20f41fa7a3be7807df7bb8e38c1def4778751697190e5b9f3a21242ff65,2023-12-08T19:11:52.763000
|
||||
CVE-2023-48317,0,0,7792e8cbc097ce577ab5b895a0b0f250d15b4f382f87fdd999ddce58d5d46587,2023-12-06T03:11:49.693000
|
||||
CVE-2023-48318,1,1,6eeecba77be61a056a2739dffad13829d0c8359b90c9921283361f36e52d4aad,2024-06-04T11:15:49.053000
|
||||
CVE-2023-48318,0,0,6eeecba77be61a056a2739dffad13829d0c8359b90c9921283361f36e52d4aad,2024-06-04T11:15:49.053000
|
||||
CVE-2023-48319,0,0,6f307cc1d3fe5a52a026e29c7ed597400875aab92dc03ab360104b504ec086ab,2024-05-17T18:36:05.263000
|
||||
CVE-2023-4832,0,0,94f20a83da1f90d8e1573598745a404568d383a7c6bb0d697ca18c3852df9ac1,2023-09-19T02:20:05.197000
|
||||
CVE-2023-48320,0,0,3a6fc5517ddbc74cc8db16fff59b8cf108a7136e6d86351f82a35efe62af93be,2023-12-06T03:16:01.150000
|
||||
@ -235295,7 +235295,7 @@ CVE-2023-48330,0,0,dbc01d30bd987a885da2abf85c259b7eafb32a598c6492f0d6ac884ee4432
|
||||
CVE-2023-48331,0,0,90599aae60a7de59bbff07d3db2722ed871e44e71153a5cea792d198ebc8ecdf,2023-12-05T02:00:32.513000
|
||||
CVE-2023-48333,0,0,aff8a1f751c328260becb0872b2d13f301390b582cd5ade313bcca2bbf616602,2023-12-06T17:25:08.207000
|
||||
CVE-2023-48334,0,0,6c4983b648ff0cc4af8a2fc83d49f8205652fd2c9aff677b7fc762cd680a8807,2023-12-05T02:00:37.353000
|
||||
CVE-2023-48335,1,1,61b5f7033f164cb2481607d543c464519186923441d0880cb42294b6d6bbb6a6,2024-06-04T11:15:49.897000
|
||||
CVE-2023-48335,0,0,61b5f7033f164cb2481607d543c464519186923441d0880cb42294b6d6bbb6a6,2024-06-04T11:15:49.897000
|
||||
CVE-2023-48336,0,0,0500b8d2c9b08c2545fc053ed48c8b3dd50e78c44ecbc2baa7b08208fc134e3a,2023-12-05T19:35:59.777000
|
||||
CVE-2023-48339,0,0,54b580af57f5c06ac8bbaf90202520b9bf64e5db8bbec32ab8b76ceee04983cd,2024-01-25T02:12:20.037000
|
||||
CVE-2023-4834,0,0,1aad50d674b08296d5b986a72b4429e47fba418a23c5c6f2bbe28c922123bb70,2023-10-24T14:52:35.443000
|
||||
@ -235714,15 +235714,15 @@ CVE-2023-48741,0,0,a92c2da5cebe16780e28f133edac9861605b0d925126e08e6df09f76e8f6f
|
||||
CVE-2023-48742,0,0,f211d26a39684bbc82397688428859c96ab63447077c12eb49e1380e6817d650,2023-12-05T20:10:51.070000
|
||||
CVE-2023-48743,0,0,7b8ec35a78dea18972ab266a206481f6371ca390074dfd6538358cd75b0f4147,2023-12-05T20:44:29.720000
|
||||
CVE-2023-48744,0,0,25a26f9835da4908a5c5aefd541c33d57f99b04f95414d164a291a09a158ed7f,2023-12-05T02:00:43.043000
|
||||
CVE-2023-48745,1,1,9b5e5a5d545943a39781323d90eb43a3f450a94fb9dbb4800f1c542c947f2b72,2024-06-04T11:15:50.123000
|
||||
CVE-2023-48745,0,0,9b5e5a5d545943a39781323d90eb43a3f450a94fb9dbb4800f1c542c947f2b72,2024-06-04T11:15:50.123000
|
||||
CVE-2023-48746,0,0,db79a88b883fab98d8d2f19205a2ffe39fb095bd0d059dac263e60576f54eca9,2023-12-06T13:22:43.777000
|
||||
CVE-2023-48747,1,1,cbc7a34b81842e11d57df1dfbff383a92142f4141ae108e99770ba30164913ce,2024-06-04T11:15:50.347000
|
||||
CVE-2023-48747,0,0,cbc7a34b81842e11d57df1dfbff383a92142f4141ae108e99770ba30164913ce,2024-06-04T11:15:50.347000
|
||||
CVE-2023-48748,0,0,e27240c4bb25988cb0190927138af5aff6a5e96fe21a6d72f9fae4e348f442bc,2023-12-06T13:15:14.420000
|
||||
CVE-2023-48749,0,0,7c695c40b2bc6fb4ed546b0695996ab1cd706a664727f360b733f720631c34e8,2023-12-06T13:07:08.697000
|
||||
CVE-2023-4875,0,0,4b1b5c484a012ff1b28a7f0dc51210addb30740757cbd9468800a3ba3f8e9ac5,2023-10-15T01:55:18.347000
|
||||
CVE-2023-48751,0,0,fb75af98554e00c7cdc3ce2660694f94aa9646c4fa85eb2252007edf922741d4,2023-12-22T19:32:34.560000
|
||||
CVE-2023-48752,0,0,6617438a452311d1c3b3c4464f90889ea0bbee28b49f83519f60c00eab92683b,2023-12-06T13:29:00.633000
|
||||
CVE-2023-48753,1,1,abd24014c7570f4f03cdfbbb79d7834d5bee2d37875be12b849d4eb11701156e,2024-06-04T11:15:50.563000
|
||||
CVE-2023-48753,0,0,abd24014c7570f4f03cdfbbb79d7834d5bee2d37875be12b849d4eb11701156e,2024-06-04T11:15:50.563000
|
||||
CVE-2023-48754,0,0,0569193cd78a4efadd60bf838471661ca63bd091c9aeb68b7a8fe14fbc81daf8,2023-12-06T00:38:46.417000
|
||||
CVE-2023-48755,0,0,89f1a2b9527257064e17a247159ee4cc7befcc939c8ab5a8c446ef85da2287a4,2023-12-20T21:09:32.063000
|
||||
CVE-2023-48756,0,0,8c30dc5020c654f585a0d5dd735951cb2629fc1084a1290d46751808b441b84a,2023-12-18T19:06:14.257000
|
||||
@ -236345,14 +236345,14 @@ CVE-2023-49738,0,0,5c4f6ee44efbee607c5172901fe24b0e1c0f9924fd7d48aa8f7d198bbcf99
|
||||
CVE-2023-49739,0,0,ed7af1af7b29da09287b9796692740d5a8f67a583e414c6ddb16b5263abbb30d,2023-12-19T18:06:46.643000
|
||||
CVE-2023-4974,0,0,c4bd83e1a1fa436b6dfdd7a5ef085fb02d99f77a4587e2924b09b7a6db31a622,2024-05-17T02:31:54.310000
|
||||
CVE-2023-49740,0,0,3b57b466e1f923eaa7ef022a2f7c4ea812dd859f4964babb0a9a182102c6b49e,2023-12-18T18:29:26.233000
|
||||
CVE-2023-49741,1,1,6b611525c8b073f615443d94018d2c2732d21203a58aba597ee75a13322020a0,2024-06-04T11:15:50.783000
|
||||
CVE-2023-49741,0,0,6b611525c8b073f615443d94018d2c2732d21203a58aba597ee75a13322020a0,2024-06-04T11:15:50.783000
|
||||
CVE-2023-49742,0,0,62d3d5e2d89e9ccd812d34cbd7497ba402f194b446f9b240dbcc0a1df068be93,2024-04-18T13:04:28.900000
|
||||
CVE-2023-49743,0,0,13f5af3ccb1e4b324e598e3022c0f930ec45448d3679021de25381951c590aa0,2023-12-18T18:39:56.250000
|
||||
CVE-2023-49744,0,0,62713799f09c53108f2fff9617764ffd422292e0d6304d7c901d420c7eef25ca,2023-12-21T17:29:00.677000
|
||||
CVE-2023-49745,0,0,fffe20c1d784d2b7c929f594f59c7d620c018b6b1ac8213ab25365d0b1ce526d,2023-12-18T18:40:10.603000
|
||||
CVE-2023-49746,0,0,7086509a0a0c71fbe6be2d29719e82b965414157929156963d5040af0551b492,2023-12-12T16:56:40.860000
|
||||
CVE-2023-49747,0,0,21a210db97f34b7bf95b947fb2b54bbde2fb7bfd23ca7325bb5d718084ed2eba,2023-12-21T17:35:43.413000
|
||||
CVE-2023-49748,1,1,bbdccad53f9cbcf17dbd24c4803f84db4f01fafb605cc6da67255d93ce80b947,2024-06-04T11:15:51.010000
|
||||
CVE-2023-49748,0,0,bbdccad53f9cbcf17dbd24c4803f84db4f01fafb605cc6da67255d93ce80b947,2024-06-04T11:15:51.010000
|
||||
CVE-2023-49749,0,0,54d721a1f8919dabe6c9453544384d6d3d957df342128d6b5aecbaa6f328df38,2023-12-21T17:43:48.513000
|
||||
CVE-2023-4975,0,0,8746de5a5b3e758d2eb01465a0483347d84f3de15eb42458491766dbe13375a2,2023-11-07T04:23:15.203000
|
||||
CVE-2023-49750,0,0,d8056be5916469b0d9e94f40417ace5cb8a17b4b964d872989008fc697c814a7,2023-12-22T12:14:32.417000
|
||||
@ -236375,6 +236375,7 @@ CVE-2023-49770,0,0,0a27ec81e7d2882781700f3f05263aa58179bb03e78b71006e6b846b4d551
|
||||
CVE-2023-49771,0,0,25464d73165426744b02c9f49706298b0ff1f4a9711ed66b34eb497db89f9d7a,2023-12-18T19:48:00.757000
|
||||
CVE-2023-49772,0,0,a9c6d356989d18cbdf75cc99aa7292cd305b1269f1734c9284be97b44edfd318,2023-12-29T06:51:44.587000
|
||||
CVE-2023-49773,0,0,a29c82b68c38b870b413fd21f673ae686821be0c9914c1dbad6cd5a31f2164d6,2024-01-05T12:07:52.007000
|
||||
CVE-2023-49774,1,1,d87eec6c937071ed390422c146a471f625251b48bb973e62c93290badc718e3b,2024-06-04T12:15:09.700000
|
||||
CVE-2023-49775,0,0,40c822889bf4000ae32008f8ef3937292cf731d4ad1dad7389d0d22508b83295,2024-02-22T03:40:18.307000
|
||||
CVE-2023-49776,0,0,1a7a5f372e14f3c9fad3450d1c48237fd9788b252ad2be1ba464bd51debd7e73,2023-12-29T16:55:58.180000
|
||||
CVE-2023-49777,0,0,07d0b44c4bf3b90fa1fb298960b918af48834842fa08093065f9437c7c73af76,2024-01-08T17:32:52.710000
|
||||
@ -236419,6 +236420,7 @@ CVE-2023-49819,0,0,547af230d15dfd9c5dd18465c1156e2cd30992e5bd1e74e9c3b0138634a11
|
||||
CVE-2023-4982,0,0,41bf569dca1252afc469aa49798e49aceff83425feac1cab042002f01a9fbb29,2023-09-20T13:13:16.680000
|
||||
CVE-2023-49820,0,0,cc65d3c16a2ed6a78a8dc44a38f48d2d659c8d8dc6d13d0c7f0f31e620dc95b1,2023-12-18T19:47:40.197000
|
||||
CVE-2023-49821,0,0,ea958c3a5356314f5ebd8da019a3638d7ee7d98170762858f9b87732987da0f5,2023-12-27T14:40:34.053000
|
||||
CVE-2023-49822,1,1,210f290b7589629b96c13ccb5934320741a8d110551b75a63233a62682430343,2024-06-04T12:15:09.933000
|
||||
CVE-2023-49823,0,0,8f2fc02f1bb3df69cf426805af6c0c29004c9c376f2fc1b3cdee732e682a2a1f,2023-12-21T17:48:09.407000
|
||||
CVE-2023-49824,0,0,d656c2942fa1d9047823eeaf8be29fe598a8e3bce63744a39ef17792669626af,2023-12-20T04:21:23.460000
|
||||
CVE-2023-49825,0,0,564d625cac80c8dd44c72e2b8977f13c7ccf226b197a9d82a51ee60081d03869,2023-12-26T21:33:58.223000
|
||||
@ -236443,6 +236445,7 @@ CVE-2023-49844,0,0,f2868caf273e3497c015d6733bece2f3f8af42caa378ba666fe51e3cb2e80
|
||||
CVE-2023-49846,0,0,e2e1045a2d57e3d1aaac660179893a2dc5c48927dc834c27f1c9d97c6b8ed287,2023-12-18T18:20:32.197000
|
||||
CVE-2023-49847,0,0,57ad2c297ed98561b1b6ae8e6341166fa7a927823adeb102e61d4eedfe017a39,2023-12-18T18:21:09.460000
|
||||
CVE-2023-4985,0,0,d6d14f319e2bc2661748ecc56a5fd5f644c6eac7bc3510996570baa1839c3227,2024-05-17T02:31:54.817000
|
||||
CVE-2023-49852,1,1,53d932a7b3600e5f1bfd3d9acd4f8b6b81737c2c607394811290ef32857eba15,2024-06-04T12:15:10.153000
|
||||
CVE-2023-49853,0,0,df9c497ec180b0ea27bb19dc1ec5d9bf2dd7d8f1a8f86c93a2259f3f2ff71482,2024-02-29T01:41:39.820000
|
||||
CVE-2023-49854,0,0,9c2a3b81b76198670284c219165421a8ef4dfb208eeb34f7864c56e36865d11a,2023-12-20T04:29:09.497000
|
||||
CVE-2023-49855,0,0,71b807144c6de240eef9dab96b3d99b0ad27634e5a9757aeed24c9dc84513bb2,2023-12-20T04:29:01.180000
|
||||
@ -237375,6 +237378,7 @@ CVE-2023-51508,0,0,099af3ff1b9f679effb5120ee494202dac60ab65a92678cc7e6be069d589f
|
||||
CVE-2023-51509,0,0,aca08ca21768d303c35e41d15b9bbe6af6c7742abca074387d9b454c0c3c1bfc,2024-02-06T01:02:16.330000
|
||||
CVE-2023-5151,0,0,1b68d8ee874e236cbdc70956d4d3baa8dfa247178722cc1fc700d4d7c992bbf0,2024-05-17T02:32:51.987000
|
||||
CVE-2023-51510,0,0,1353ad84455c49924d2f2d254540a7ae311db5ead3a69fa8532e229874af65a0,2024-03-17T22:38:29.433000
|
||||
CVE-2023-51511,1,1,042b8e47f2b821b02bf4f7824ba766a19e245eba9bd1eb1020bc3f40dfabead2,2024-06-04T13:15:49.430000
|
||||
CVE-2023-51512,0,0,b503b131cbc4230950d7fc98e64892f0904a9f3b2b59ccf4a240d2b4fe53e2d1,2024-03-17T22:38:29.433000
|
||||
CVE-2023-51514,0,0,44a388f30c139a4590a3bf56e00fe693595a163e9cef7869b048530195c7b7e1,2024-02-06T01:02:10.990000
|
||||
CVE-2023-51515,0,0,3422ae4f26a23a247945a7b0cf74e34e46aa8f9a141eed6440357fa69f923e4b,2024-04-15T13:15:51.577000
|
||||
@ -237401,6 +237405,9 @@ CVE-2023-51539,0,0,bdb4b88364881927645b78ec47bf86f0a85efb3eff25f2564bb75c3725083
|
||||
CVE-2023-5154,0,0,a99c59508426987620982876617160c47179b836a93c4355f648aeed6078c463,2024-05-17T02:32:52.320000
|
||||
CVE-2023-51540,0,0,4fb8cacaaec655ca39d5ac85ca2324b1623f919eb27ed5943f1e12c52d59db00,2024-02-07T17:05:59.580000
|
||||
CVE-2023-51541,0,0,cf9fd5251982ae34f9d1a6c7ef7137712140adac1b14b66e98b30f5cf2d4cd8e,2024-02-29T01:42:04.593000
|
||||
CVE-2023-51542,1,1,1771922fd3484598e40baa54b054b8bdea7b32ec3763a0875ced67628c53b9e5,2024-06-04T13:15:49.820000
|
||||
CVE-2023-51543,1,1,fbd491baaf7fcf6e74371f364724907217f6b5e90af51db95dd93552dc9a512e,2024-06-04T13:15:50.047000
|
||||
CVE-2023-51544,1,1,8d6401d7505902ff136f9423094cec411f84918880925bb458970b00c9fa3d3e,2024-06-04T13:15:50.277000
|
||||
CVE-2023-51545,0,0,a4142e2ca4ce5852b08d515f5a62a78fc16a002d435f2b6b5d7f079a888f8b26,2024-01-05T18:05:04.407000
|
||||
CVE-2023-51546,0,0,26733dcf79d4f473dab932b27fb2a2b7a3d3d4f7a3911c5af91f1e6b8bc34ece,2024-05-17T18:36:05.263000
|
||||
CVE-2023-51547,0,0,c982f4b046496a731b5048a632534aea5fe458955a1b974571191fb8d5f7c885,2024-01-05T20:49:25.943000
|
||||
@ -237517,6 +237524,7 @@ CVE-2023-51663,0,0,d83a7d32fbb7435bcb58f5bdc28a62b2d33e29b22cfaddf45ebd3b75bac9f
|
||||
CVE-2023-51664,0,0,b0d24350338011662545bfc012cfe08d4b6a10d0b7b21df88520461376c5490b,2024-01-04T16:57:12.717000
|
||||
CVE-2023-51665,0,0,8c54347d2c48708098279dbf3ec2f0230cb0c4a2e65ee8666de19a799abdd62d,2024-01-05T15:02:21.103000
|
||||
CVE-2023-51666,0,0,d01488de41e6bcc8e1d26db42f71396fa97f6f13c18ef4f0fc4b1c0b568d6404,2024-02-07T17:06:35.410000
|
||||
CVE-2023-51667,1,1,2f3ac86e61a526f622f2323a646b7b9e8d3209faee82adab403ec6357b34130a,2024-06-04T13:15:50.500000
|
||||
CVE-2023-51668,0,0,1605f66809b9c96416733ec8082d6eaac2861c71b77512691b688d40edaed58d,2024-01-09T14:27:16.827000
|
||||
CVE-2023-51669,0,0,ecdca3dab41c8a74480f540b0cebb63f42a6ac98e701e7aab8001a68e4335dc0,2024-02-07T17:06:50.843000
|
||||
CVE-2023-5167,0,0,cc354b4f412e0824e85932f819009ad505168825905c48c26b3fe18753ae9969,2023-11-07T04:23:34.800000
|
||||
@ -237820,6 +237828,7 @@ CVE-2023-52143,0,0,711faec443a2eceed610aa81a0c2fce4bb20cec3fd1831b74c7a26cbff4d3
|
||||
CVE-2023-52144,0,0,f3e06f44687c2af6d25f760f06e0239c02c3db680ee09c9d59e0d01da4248947,2024-04-15T13:15:31.997000
|
||||
CVE-2023-52145,0,0,7a4b86956bd2ef9e4b16ef2a82e6462f9219f9e13f0ae66de84a4e79d421a16c,2024-01-12T14:39:24.130000
|
||||
CVE-2023-52146,0,0,a01692a3acbd9936f1f4912ddff572a9839d99c6f5ecef64634d55ed19972c47,2024-02-06T11:15:08.657000
|
||||
CVE-2023-52147,1,1,a7e0e57795124e1ebd09e5759142657a8bd03b4d277d1dbb4ee511f3c64cdd69,2024-06-04T13:15:50.730000
|
||||
CVE-2023-52148,0,0,716b87f6e18a732ca60d290639cb79893e0331604cbc045eda29dee1d4212aa5,2024-01-10T04:02:08.553000
|
||||
CVE-2023-52149,0,0,0bd5a11707677d04ec1d347e3774371d4331c358a0588dd55ae4cf33b96f538e,2024-01-09T15:32:14.667000
|
||||
CVE-2023-5215,0,0,13126b2cecc0981cc34463918545b3414c046ccc056278c34b43595cc3474eef,2024-04-30T14:15:11.137000
|
||||
@ -237837,6 +237846,7 @@ CVE-2023-5217,0,0,7ba5b927181a714978a513b1447492d30b9204770bc875e02b0ddf7485f511
|
||||
CVE-2023-52173,0,0,653751d06808116187d115997433d85c759b866ee7527f311b397336366ebb4c,2024-01-04T23:34:46.453000
|
||||
CVE-2023-52174,0,0,79e20d77a07605a892f972d0d5b1fee1a2293c3b3ed991923dbc5981d1985ef0,2024-01-04T23:35:08.563000
|
||||
CVE-2023-52175,0,0,dc148159de02306a075c5c5a9359ae7fb04b3bcbdbd59c15cb123213aa494f1c,2024-02-06T20:46:18.473000
|
||||
CVE-2023-52176,1,1,60b4bca549b28d34a700f5f03601ae624af8ad7a2f4a2ac1a316d4c5023c3f21,2024-06-04T13:15:50.960000
|
||||
CVE-2023-52178,0,0,c09e49f81eb32d843010688fb3f1a4cc63da60711f94d2031dcf5162594c7cfa,2024-01-11T14:17:42.607000
|
||||
CVE-2023-5218,0,0,5d39c307a229ebb116959b5d798682370d3d430565ab1c1feb7036208e28c8da,2024-01-31T17:15:18.423000
|
||||
CVE-2023-52180,0,0,8b413e2e8c63ed1227bc9cbfc39a312c2260cfa648393fc28b71bda1979be008,2024-01-08T14:46:37.220000
|
||||
@ -245135,6 +245145,7 @@ CVE-2024-25597,0,0,995a42bb5448cb09cb985e0b42e6cccd2cae6222c241291d138853f854550
|
||||
CVE-2024-25598,0,0,43981dc647595567427079648c996df524b855802acc767a53f000d4ab2b6b3f,2024-03-15T16:26:49.320000
|
||||
CVE-2024-25599,0,0,032448a69971fef9ee741a14b966aa271b8012f133cb0ca23a0dce51bf94426e,2024-03-28T12:42:56.150000
|
||||
CVE-2024-2560,0,0,809d62945ef2e3d90fbf469b99de295e3fded702b00ce1ccb1e2ea6f85a4ab6a,2024-05-17T02:38:19.143000
|
||||
CVE-2024-25600,1,1,9728ea83eff5cc16eb40a7f851f99566d3f8a03981b26f312619d45f01c05cb0,2024-06-04T13:15:51.183000
|
||||
CVE-2024-25601,0,0,81f4fdae91c2e2979380ffdf7201132bd42db70ea50ec659a221655da6bb1b91,2024-02-22T19:07:37.840000
|
||||
CVE-2024-25602,0,0,6a0412f9e3d86cacfb35a934a8fd793128a0f85212ec26797b187230b94df26a,2024-02-22T19:07:37.840000
|
||||
CVE-2024-25603,0,0,863f490c7ea22d0d3c701bfeb2e8a36747268d73fdd29bb24261158009a35432,2024-02-22T19:07:37.840000
|
||||
@ -247505,6 +247516,7 @@ CVE-2024-29165,0,0,56d636407e1bb4b0ac449c45605f98b67e37c82a870441216999fc8912fdf
|
||||
CVE-2024-29166,0,0,b13dfaf0c8e4ea3bbd358bd8614d1947c156835fe22c5095fd83f7cd95ae4bba,2024-05-14T16:13:02.773000
|
||||
CVE-2024-29167,0,0,bf34fde11ddaf885eca651982ced409116d0263648d1d196b5990bfa9a0517fe,2024-05-17T02:37:49.993000
|
||||
CVE-2024-2917,0,0,738b9419e321262581cbcbc36e60bc25c85f82bd40a8ab12d5b727ad6cc0972c,2024-05-17T02:38:37.297000
|
||||
CVE-2024-29170,1,1,bf425dc43dbbce8ec07b471a39b9166b4abc9f24b393471e7948f4e337b6d71b,2024-06-04T13:15:51.460000
|
||||
CVE-2024-29179,0,0,f19d4d0a9f8b6dc85e6e021ab22950c73dd30b1b16e940f3cfc8d8b6deab42d4,2024-03-26T12:55:05.010000
|
||||
CVE-2024-2918,0,0,ce50c7c24dc6b969578ed47f388645920a5e5c8ad0b49917ec2e7ecd8d9606ee,2024-04-10T13:23:38.787000
|
||||
CVE-2024-29180,0,0,41debf5c02b25447b090e1fe17310ae2918a3e33749dbf7033ce058b1311f912,2024-03-21T19:47:03.943000
|
||||
@ -249966,6 +249978,7 @@ CVE-2024-33538,0,0,e7d86585abc433df63c34994a7b1a015734175492b100326db14778bb8d1f
|
||||
CVE-2024-33539,0,0,87f154978a987e28cf100a131c9fad421daff9a6f4f5e6dbc40640de68db94cd,2024-04-29T12:42:03.667000
|
||||
CVE-2024-3354,0,0,5aae79cede7291e1765a3e1fa18184af5eeaede0f0b8f7a4b3c7ba1d02dd5fd5,2024-05-17T02:39:51.963000
|
||||
CVE-2024-33540,0,0,1e814a0ea27748156363c52e26bb77b4bb9ce63c0961730b17ad99865f2d78c6,2024-04-29T12:42:03.667000
|
||||
CVE-2024-33541,1,1,a61e990affe83985122586c91f6ad3d92feb633a02d52b64fc38eee6bc8a69ce,2024-06-04T13:15:51.717000
|
||||
CVE-2024-33542,0,0,5cebfa7c22f12a6aa2675dd4ec6e19e1966575adb9d6e6e73c2f3dcae54dbf8b,2024-04-29T12:42:03.667000
|
||||
CVE-2024-33544,0,0,6e4ff4d9102a5d0f999b74773217097beffc904dc7d907863d8222867af3d336,2024-04-29T12:42:03.667000
|
||||
CVE-2024-33546,0,0,b169a469c02b39c7428e1081bafd0bce76a92a565897fda0bd0e3619ddaf047f,2024-04-29T12:42:03.667000
|
||||
@ -249978,9 +249991,11 @@ CVE-2024-33552,0,0,fde617a71e53ba17ca9f10ac03296324c4dbf70e1400c675507bd26b68dc4
|
||||
CVE-2024-33553,0,0,a63cd25e668e51ecdb575a6c39c2fdd900060fbc8acd7ddcf7e42aae11fc033a,2024-04-29T12:42:03.667000
|
||||
CVE-2024-33554,0,0,2fa44634a105abf41bf64ae29b253ae6fabbadcb928bf62199eae71c375589ab,2024-04-29T12:42:03.667000
|
||||
CVE-2024-33556,0,0,bf8553efa7bbc1b53671beaaba018dbbf4557a86527dffcc557df95897680dab,2024-05-17T18:36:05.263000
|
||||
CVE-2024-33557,1,1,42cbf8fc34dea1ad453bb3d2e23e10183cebceee26581826255fb0494e61e154,2024-06-04T13:15:51.943000
|
||||
CVE-2024-33558,0,0,cf1181c3a097a2fb7b0482529266f16182741fa48852985dd7469f08bd1e4d39,2024-04-29T12:42:03.667000
|
||||
CVE-2024-33559,0,0,7cbd898a0eece080f97fc20fdacdba598f6fa88c2c0ecdd34006e14d646ba964,2024-04-29T12:42:03.667000
|
||||
CVE-2024-3356,0,0,cd18273ede30de9828727c0da7510b9e37ba44a42d6203a51ac948e77f776d06,2024-05-17T02:39:52.150000
|
||||
CVE-2024-33560,1,1,5ef739de84b42583b231c5b739be0d6b3fb9f1233b52b0423556c9a8ef411bbe,2024-06-04T13:15:52.177000
|
||||
CVE-2024-33562,0,0,27fac541d1d64e11476c3268a849af55b6413283c20341e42235e842aff36652,2024-04-29T12:42:03.667000
|
||||
CVE-2024-33566,0,0,46d17e7fcf76ea9cc29b76ef68ee9038fd04b7d980a772b2f399515ebb8e8216,2024-04-29T12:42:03.667000
|
||||
CVE-2024-33567,0,0,dbf0f06551a8f63fcd89d5d4c2980276f319d41b21ef5e34182332a6cf0b6381,2024-05-17T18:36:05.263000
|
||||
@ -250976,7 +250991,7 @@ CVE-2024-35809,0,0,a20abd752ca7263fa57e17381fdf662c622b2b6d7c563548527c7d46a06a4
|
||||
CVE-2024-3581,0,0,a1d8e06f506128ffd15dfdbfe16c45cbeda8736a3df4c463fa4b80646e4712e7,2024-05-02T18:00:37.360000
|
||||
CVE-2024-35810,0,0,be2abeea367f182a6b1ad511a953cc5bc3876003e09c08bacbcea430ee5fe141,2024-05-17T18:35:35.070000
|
||||
CVE-2024-35811,0,0,27b4a06cce495c0252bdb484475751deb9bef827ca7f31a4d89a8659cbc66076,2024-05-17T18:35:35.070000
|
||||
CVE-2024-35812,0,0,f13f173d6de0c30473a98a382eed04b265d2b463e58ba0ce3e6936a82c1dce11,2024-05-17T18:35:35.070000
|
||||
CVE-2024-35812,0,1,7d0d1a60f242229a3825673001282d0446ce7ae166b119c0e506a39221a4e148,2024-06-04T13:15:52.390000
|
||||
CVE-2024-35813,0,0,7f0801adafe019d639700d85a9fa220ec1f0b3c66e04320a29bcb7624d670e5a,2024-05-17T18:35:35.070000
|
||||
CVE-2024-35814,0,0,18619d6cf722935daa54c4a2017ed9cd3b4228dac5f23c34be01df98692cef75,2024-05-17T18:35:35.070000
|
||||
CVE-2024-35815,0,0,1d00d6fdf4115b14510d7465a283171c0668b0395473dd9063745f95bf83afd8,2024-05-17T18:35:35.070000
|
||||
@ -251113,7 +251128,7 @@ CVE-2024-35938,0,0,0a97241552b0a2279900378439f264fc85d4dadf028946adfbf927738a4e8
|
||||
CVE-2024-35939,0,0,20c3dbeef818d9aa28443d6cf86dac7a5d6a50e673e76146dc31fd6948dfac55,2024-05-20T13:00:04.957000
|
||||
CVE-2024-3594,0,0,209dc6f01ccd5e1ecec06375c2725f4b71324d4b1d9a6775144228e87cb1819d,2024-05-24T01:15:30.977000
|
||||
CVE-2024-35940,0,0,ff44bf313ea93cfd1f39b3e086ab02419b832b3abdb6b56cf686dfe8c2dd1d2b,2024-05-20T13:00:04.957000
|
||||
CVE-2024-35941,0,0,797c49d7896742bdeec32c59cc1111415415a7dcb18ab809dc56475f10c88702,2024-05-20T13:00:04.957000
|
||||
CVE-2024-35941,0,1,cdd45b79cac38121859bfcfe5c975cf81ee19a43fc4a3c73b0bb3e31cf6dffb4,2024-06-04T13:15:52.613000
|
||||
CVE-2024-35942,0,0,9db86445e57f0ae9bd7c5c221f0b1ea58d46a866af07a30b8b6df3d6360c4681,2024-05-20T13:00:04.957000
|
||||
CVE-2024-35943,0,0,6d5a179a77a7d5fbfc1a09ae3c18a0804de9a0f865d9e440ccce732b214ab68b,2024-05-20T13:00:04.957000
|
||||
CVE-2024-35944,0,0,03e78dc0d2dba5cd5703c6b70b572bff837a7d117c07064ba4587d2453d9da68,2024-05-20T13:00:04.957000
|
||||
@ -251343,6 +251358,8 @@ CVE-2024-3678,0,0,d720397e0ff5aed34935621b66252dd502ae3dd7e987e20f2aefa29510c090
|
||||
CVE-2024-36782,0,0,b125b3a72d1ca291a6285f37e0bf5c6002ab42e2c44720275654f49004fa59e7,2024-06-03T21:15:08.453000
|
||||
CVE-2024-36783,0,0,9429685fad0c5f6ef563b0834ac6de6fd1a76a909464a9f869ec3bc63d22200e,2024-06-03T20:15:09.370000
|
||||
CVE-2024-3680,0,0,b1ed78ba2c31e060c65591b1b4aa0e0cdd627bc790583f352919e473d1394bc8,2024-05-14T16:11:39.510000
|
||||
CVE-2024-36800,1,1,0ef8068eb66e203a29f33ae72b6609698d839354f5120eaa85406c000d7fda7f,2024-06-04T13:15:52.740000
|
||||
CVE-2024-36801,1,1,bde29bd91f0ea2b17756cf39c0023fc8cf0d38db1955cca314b84697fedaf84f,2024-06-04T13:15:52.857000
|
||||
CVE-2024-3681,0,0,4cc6e1e77320458af0f4beee59a38c9a663fe20b962b28f234c099bc7c23ab32,2024-05-02T18:00:37.360000
|
||||
CVE-2024-3682,0,0,a140f5eb71acf183c1e80e0d2f5a14a5c7d8a92c7cf9dd3ea5250a20e3cb490f,2024-04-26T12:58:17.720000
|
||||
CVE-2024-3684,0,0,e7edf7d6bce31b480b46d692afd4304c988268ba4618e87da8566dc118f2be92,2024-04-19T16:19:49.043000
|
||||
@ -251455,7 +251472,21 @@ CVE-2024-37031,0,0,967b2a62510a1f35de5969f18efe9a7e1918d9bc4c74d0011148e6a904de3
|
||||
CVE-2024-37032,0,0,2685d1c2a61b0baf7e7faa92d5cf7d5d7556f92ff89a923043de9b45c0417821,2024-05-31T13:01:46.727000
|
||||
CVE-2024-3704,0,0,ad7f205e31bc442943bbd584692b194a3485d815654eeb83e4eefef6a6eff393,2024-04-15T13:15:51.577000
|
||||
CVE-2024-3705,0,0,44f1c76d2f6cd8dab882ddfdbdbe908a4e3a8f22d6a90f31f0279b7faf87a669,2024-04-15T13:15:51.577000
|
||||
CVE-2024-37052,1,1,3f5dbb8279abb63e329080724732187fc9f99ad501f149512a1c7e8e700a5b5f,2024-06-04T12:15:10.413000
|
||||
CVE-2024-37053,1,1,06b14decaca586b1a1f96c116b9f8676964806f8e8a9c20ec7e3dbfd0fec766c,2024-06-04T12:15:10.957000
|
||||
CVE-2024-37054,1,1,57448177ce71e9f56b05c697cb4673d16b29d6e153f2c2e962ca0027372bb9b4,2024-06-04T12:15:11.190000
|
||||
CVE-2024-37055,1,1,8c0eb9eff684d7865d587e04b6bdc7d688269b03387be1a776c35a49dde5e71a,2024-06-04T12:15:11.397000
|
||||
CVE-2024-37056,1,1,9287ec26e966b7115e7aaf90bacd0db24c904322d02e7e19db805676003ae906,2024-06-04T12:15:11.593000
|
||||
CVE-2024-37057,1,1,be37f1a17287222d62db0a9c6e595917b58461a2c6e9f49801079ad506331f26,2024-06-04T12:15:11.800000
|
||||
CVE-2024-37058,1,1,9d697419d978d0964970869c524cfc70dad406c081a5667b762d19e7e5310d7b,2024-06-04T12:15:12.023000
|
||||
CVE-2024-37059,1,1,03b47b4ebe2e5e1032a2f0b2a9d620d3b5632604a674dce4406017b56267f0d7,2024-06-04T12:15:12.227000
|
||||
CVE-2024-3706,0,0,93b27543775cdce8e7b256b8d014ea258e7a61f0ddb1cca03581da1a85330700,2024-04-15T13:15:51.577000
|
||||
CVE-2024-37060,1,1,661eba28447dfad4d9ccc377c33f78f29646d134c2785f7c0a91f9ea3edcd552,2024-06-04T12:15:12.463000
|
||||
CVE-2024-37061,1,1,9e56eb047fd6a9bfdb96b5456491054b4b30d574a06065e25ab99d482d4d1aef,2024-06-04T12:15:12.703000
|
||||
CVE-2024-37062,1,1,af2a31045e6a2bb6b86be7ee8f84bff534ad3fe7ba658b72c1e279e59df9bbbc,2024-06-04T12:15:12.907000
|
||||
CVE-2024-37063,1,1,c36321c284258a858f2e761d8bc93fd058f2479d01ee0d17d4414dc878be5b32,2024-06-04T12:15:13.110000
|
||||
CVE-2024-37064,1,1,c1846da256912416f57b22cac34f81d6cba7e772bf4878b3b976ec712e871da4,2024-06-04T12:15:13.313000
|
||||
CVE-2024-37065,1,1,d0e09f8ff65ce62f3f9761336170e1df68ac6860fc59f9faeca2497dcfedce51,2024-06-04T12:15:13.507000
|
||||
CVE-2024-3707,0,0,cb892298714e8d1628bf09ece0bc00ef0a1a1429034ce83bb3286f4d822c160d,2024-04-15T13:15:51.577000
|
||||
CVE-2024-3708,0,0,09132fb1644ebf0c808002aa8ac15b19f13ae71d0beb378f7a9664a5ae685f9a,2024-05-24T01:15:30.977000
|
||||
CVE-2024-3711,0,0,00ee502ae0ae8bdc802cd38eb1ec1e1356c10e1c18d766a4effd20297a066f55,2024-05-24T01:15:30.977000
|
||||
@ -251834,6 +251865,7 @@ CVE-2024-4250,0,0,b54487ffa8dc260b8a713e1b78312dec0b498701946f695ae48ef053246603
|
||||
CVE-2024-4251,0,0,704c5045f34e20b238053203ffa6ddaa27c0f1f93911f12090c1ee9114f5097d,2024-05-17T02:40:20.940000
|
||||
CVE-2024-4252,0,0,3896f5ee238bad3d7e0a938dc110cad0a34521ba589448d2dc895a14fc511275,2024-05-17T02:40:21.053000
|
||||
CVE-2024-4253,0,0,de2ab3010fb03c983c55ebf995f5dbb83eb08b82e01721b3c66a29011336f26b,2024-06-04T08:15:10.863000
|
||||
CVE-2024-4254,1,1,06ffe91e2ddfc00c3065cea3e4124d1316c753ab6132ef0f7c3b9e309588ba4c,2024-06-04T12:15:13.710000
|
||||
CVE-2024-4255,0,0,fe667b23218914fa44fee4b4c2a7be125396fae9094659c59aa2ca90b0b1e450,2024-05-17T02:40:21.147000
|
||||
CVE-2024-4256,0,0,f01b9b3012ce7ea24c9894def6f3f1cef49ac09bb4f57d3ed8f552e5b1070b71,2024-05-17T02:40:21.240000
|
||||
CVE-2024-4257,0,0,0f6d2313bd719b89d901deefe2dc2f87463055c189b3c018795a055e61e9ea45,2024-05-17T02:40:21.330000
|
||||
@ -252097,7 +252129,7 @@ CVE-2024-4631,0,0,e8ed3d07eca49fd9ce5a62406bcf23da9793cbcc792a956665a267b4f25fd6
|
||||
CVE-2024-4634,0,0,26305cc83de7193b57243a5cab6ca5caf74694a0d7bbca15218a554118aa8eb8,2024-05-16T13:03:05.353000
|
||||
CVE-2024-4635,0,0,39b2c6bf6977107b11329776563f920ebcfe13f250d063c0984d8282a28a8353,2024-05-16T13:03:05.353000
|
||||
CVE-2024-4636,0,0,408131d6e6f7a1de019141a0a08ced7ddc9316cec6084c2dbfd44b2d5b664bc5,2024-05-15T16:40:19.330000
|
||||
CVE-2024-4637,1,1,a605a04484b96e3a6a910efe0a6e265dcf432bd7a6e2f2cd212d05a85cc08f14,2024-06-04T10:15:12.503000
|
||||
CVE-2024-4637,0,0,a605a04484b96e3a6a910efe0a6e265dcf432bd7a6e2f2cd212d05a85cc08f14,2024-06-04T10:15:12.503000
|
||||
CVE-2024-4642,0,0,af413e9c39a7a95f4fad15629993388538023a0a54f7d3f1141388f9a4b404f9,2024-05-20T17:15:09.667000
|
||||
CVE-2024-4644,0,0,b69c44e7031d29361edbff8c9258531bdbfd599edff21b6fb592b731a3a8f1d3,2024-05-17T02:40:30.603000
|
||||
CVE-2024-4645,0,0,029fc657c20e99e63c4a0896df7eaed00c7e95079c841983238fcd27dbc9082f,2024-05-29T20:15:13.240000
|
||||
@ -252544,7 +252576,7 @@ CVE-2024-5433,0,0,d0946774ada383b4af0e78f23b9c449d05f83a7124810af4e383f90b0cdbda
|
||||
CVE-2024-5434,0,0,dc2716eb218edba725ac85c17a2930de7a00b6563d0ca53040574106ea0b92ed,2024-05-29T13:02:09.280000
|
||||
CVE-2024-5436,0,0,95eba267f429de080e9b35fcd14e1e1840b0308e404c32773ec35c18106c7cbc,2024-05-31T13:01:46.727000
|
||||
CVE-2024-5437,0,0,557d2d92d351d0b9c718cc97d7a9d4fae40afc0a93c4cab84fee8196b51766e4,2024-05-29T13:02:09.280000
|
||||
CVE-2024-5463,1,1,fe017f987e6e38031b776f174b46d000a6764b4fc1c9858754e10d32745d4ce1,2024-06-04T10:15:12.747000
|
||||
CVE-2024-5463,0,0,fe017f987e6e38031b776f174b46d000a6764b4fc1c9858754e10d32745d4ce1,2024-06-04T10:15:12.747000
|
||||
CVE-2024-5484,0,0,7de35f8eee9232651ed147ec3168f6740617b1737ec3ff6913988b98b84f6ef1,2024-05-31T11:15:09.783000
|
||||
CVE-2024-5485,0,0,cd934d054521f90c46895e6b8fbe14d28fa1f85abdd6db3cb4bf3a673d266bae,2024-06-04T07:15:47.700000
|
||||
CVE-2024-5493,0,0,8180f9c7c83a7ebab82ac7c00536ed64f553bc96cb8ba2cddb06ad7e2d969883,2024-05-31T13:01:46.727000
|
||||
|
Can't render this file because it is too large.
|
Loading…
x
Reference in New Issue
Block a user