From 6b56aca921506d7616b8d695af58fb7145405b08 Mon Sep 17 00:00:00 2001 From: cad-safe-bot Date: Tue, 4 Jun 2024 14:03:33 +0000 Subject: [PATCH] Auto-Update: 2024-06-04T14:00:38.127097+00:00 --- CVE-2023/CVE-2023-497xx/CVE-2023-49774.json | 55 ++++++++++++++ CVE-2023/CVE-2023-498xx/CVE-2023-49822.json | 55 ++++++++++++++ CVE-2023/CVE-2023-498xx/CVE-2023-49852.json | 55 ++++++++++++++ CVE-2023/CVE-2023-515xx/CVE-2023-51511.json | 55 ++++++++++++++ CVE-2023/CVE-2023-515xx/CVE-2023-51542.json | 55 ++++++++++++++ CVE-2023/CVE-2023-515xx/CVE-2023-51543.json | 55 ++++++++++++++ CVE-2023/CVE-2023-515xx/CVE-2023-51544.json | 55 ++++++++++++++ CVE-2023/CVE-2023-516xx/CVE-2023-51667.json | 55 ++++++++++++++ CVE-2023/CVE-2023-521xx/CVE-2023-52147.json | 55 ++++++++++++++ CVE-2023/CVE-2023-521xx/CVE-2023-52176.json | 55 ++++++++++++++ CVE-2024/CVE-2024-256xx/CVE-2024-25600.json | 71 ++++++++++++++++++ CVE-2024/CVE-2024-291xx/CVE-2024-29170.json | 55 ++++++++++++++ CVE-2024/CVE-2024-335xx/CVE-2024-33541.json | 55 ++++++++++++++ CVE-2024/CVE-2024-335xx/CVE-2024-33557.json | 55 ++++++++++++++ CVE-2024/CVE-2024-335xx/CVE-2024-33560.json | 55 ++++++++++++++ CVE-2024/CVE-2024-358xx/CVE-2024-35812.json | 77 +------------------ CVE-2024/CVE-2024-359xx/CVE-2024-35941.json | 29 +------- CVE-2024/CVE-2024-368xx/CVE-2024-36800.json | 20 +++++ CVE-2024/CVE-2024-368xx/CVE-2024-36801.json | 20 +++++ CVE-2024/CVE-2024-370xx/CVE-2024-37052.json | 55 ++++++++++++++ CVE-2024/CVE-2024-370xx/CVE-2024-37053.json | 55 ++++++++++++++ CVE-2024/CVE-2024-370xx/CVE-2024-37054.json | 55 ++++++++++++++ CVE-2024/CVE-2024-370xx/CVE-2024-37055.json | 55 ++++++++++++++ CVE-2024/CVE-2024-370xx/CVE-2024-37056.json | 55 ++++++++++++++ CVE-2024/CVE-2024-370xx/CVE-2024-37057.json | 55 ++++++++++++++ CVE-2024/CVE-2024-370xx/CVE-2024-37058.json | 55 ++++++++++++++ CVE-2024/CVE-2024-370xx/CVE-2024-37059.json | 55 ++++++++++++++ CVE-2024/CVE-2024-370xx/CVE-2024-37060.json | 55 ++++++++++++++ CVE-2024/CVE-2024-370xx/CVE-2024-37061.json | 55 ++++++++++++++ CVE-2024/CVE-2024-370xx/CVE-2024-37062.json | 55 ++++++++++++++ CVE-2024/CVE-2024-370xx/CVE-2024-37063.json | 55 ++++++++++++++ CVE-2024/CVE-2024-370xx/CVE-2024-37064.json | 55 ++++++++++++++ CVE-2024/CVE-2024-370xx/CVE-2024-37065.json | 55 ++++++++++++++ CVE-2024/CVE-2024-42xx/CVE-2024-4254.json | 59 +++++++++++++++ README.md | 60 ++++++++------- _state.csv | 82 ++++++++++++++------- 36 files changed, 1807 insertions(+), 151 deletions(-) create mode 100644 CVE-2023/CVE-2023-497xx/CVE-2023-49774.json create mode 100644 CVE-2023/CVE-2023-498xx/CVE-2023-49822.json create mode 100644 CVE-2023/CVE-2023-498xx/CVE-2023-49852.json create mode 100644 CVE-2023/CVE-2023-515xx/CVE-2023-51511.json create mode 100644 CVE-2023/CVE-2023-515xx/CVE-2023-51542.json create mode 100644 CVE-2023/CVE-2023-515xx/CVE-2023-51543.json create mode 100644 CVE-2023/CVE-2023-515xx/CVE-2023-51544.json create mode 100644 CVE-2023/CVE-2023-516xx/CVE-2023-51667.json create mode 100644 CVE-2023/CVE-2023-521xx/CVE-2023-52147.json create mode 100644 CVE-2023/CVE-2023-521xx/CVE-2023-52176.json create mode 100644 CVE-2024/CVE-2024-256xx/CVE-2024-25600.json create mode 100644 CVE-2024/CVE-2024-291xx/CVE-2024-29170.json create mode 100644 CVE-2024/CVE-2024-335xx/CVE-2024-33541.json create mode 100644 CVE-2024/CVE-2024-335xx/CVE-2024-33557.json create mode 100644 CVE-2024/CVE-2024-335xx/CVE-2024-33560.json create mode 100644 CVE-2024/CVE-2024-368xx/CVE-2024-36800.json create mode 100644 CVE-2024/CVE-2024-368xx/CVE-2024-36801.json create mode 100644 CVE-2024/CVE-2024-370xx/CVE-2024-37052.json create mode 100644 CVE-2024/CVE-2024-370xx/CVE-2024-37053.json create mode 100644 CVE-2024/CVE-2024-370xx/CVE-2024-37054.json create mode 100644 CVE-2024/CVE-2024-370xx/CVE-2024-37055.json create mode 100644 CVE-2024/CVE-2024-370xx/CVE-2024-37056.json create mode 100644 CVE-2024/CVE-2024-370xx/CVE-2024-37057.json create mode 100644 CVE-2024/CVE-2024-370xx/CVE-2024-37058.json create mode 100644 CVE-2024/CVE-2024-370xx/CVE-2024-37059.json create mode 100644 CVE-2024/CVE-2024-370xx/CVE-2024-37060.json create mode 100644 CVE-2024/CVE-2024-370xx/CVE-2024-37061.json create mode 100644 CVE-2024/CVE-2024-370xx/CVE-2024-37062.json create mode 100644 CVE-2024/CVE-2024-370xx/CVE-2024-37063.json create mode 100644 CVE-2024/CVE-2024-370xx/CVE-2024-37064.json create mode 100644 CVE-2024/CVE-2024-370xx/CVE-2024-37065.json create mode 100644 CVE-2024/CVE-2024-42xx/CVE-2024-4254.json diff --git a/CVE-2023/CVE-2023-497xx/CVE-2023-49774.json b/CVE-2023/CVE-2023-497xx/CVE-2023-49774.json new file mode 100644 index 00000000000..6cfeb2b4951 --- /dev/null +++ b/CVE-2023/CVE-2023-497xx/CVE-2023-49774.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2023-49774", + "sourceIdentifier": "audit@patchstack.com", + "published": "2024-06-04T12:15:09.700", + "lastModified": "2024-06-04T12:15:09.700", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Exposure of Sensitive Information to an Unauthorized Actor vulnerability in J.N. Breetvelt a.K.A. OpaJaap WP Photo Album Plus allows Accessing Functionality Not Properly Constrained by ACLs.This issue affects WP Photo Album Plus: from n/a through 8.5.02.005." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-200" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/vulnerability/wp-photo-album-plus/wordpress-wp-photo-album-plus-plugin-8-5-02-005-ip-bypass-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-498xx/CVE-2023-49822.json b/CVE-2023/CVE-2023-498xx/CVE-2023-49822.json new file mode 100644 index 00000000000..4fa23b0a2d2 --- /dev/null +++ b/CVE-2023/CVE-2023-498xx/CVE-2023-49822.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2023-49822", + "sourceIdentifier": "audit@patchstack.com", + "published": "2024-06-04T12:15:09.933", + "lastModified": "2024-06-04T12:15:09.933", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Exposure of Sensitive Information to an Unauthorized Actor vulnerability in David Vongries Ultimate Dashboard allows Accessing Functionality Not Properly Constrained by ACLs.This issue affects Ultimate Dashboard: from n/a through 3.7.10." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 3.7, + "baseSeverity": "LOW" + }, + "exploitabilityScore": 2.2, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-200" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/vulnerability/ultimate-dashboard/wordpress-ultimate-dashboard-plugin-3-7-10-secret-login-page-location-disclosure-on-multisites-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-498xx/CVE-2023-49852.json b/CVE-2023/CVE-2023-498xx/CVE-2023-49852.json new file mode 100644 index 00000000000..7c2ce05e464 --- /dev/null +++ b/CVE-2023/CVE-2023-498xx/CVE-2023-49852.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2023-49852", + "sourceIdentifier": "audit@patchstack.com", + "published": "2024-06-04T12:15:10.153", + "lastModified": "2024-06-04T12:15:10.153", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS) vulnerability in Vsourz Digital Responsive Slick Slider WordPress allows Code Injection.This issue affects Responsive Slick Slider WordPress: from n/a through 1.4." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 6.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 3.9, + "impactScore": 2.5 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-80" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/vulnerability/responsive-slick-slider/wordpress-responsive-slick-slider-wordpress-plugin-1-4-content-injection-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-515xx/CVE-2023-51511.json b/CVE-2023/CVE-2023-515xx/CVE-2023-51511.json new file mode 100644 index 00000000000..dcfe61601ed --- /dev/null +++ b/CVE-2023/CVE-2023-515xx/CVE-2023-51511.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2023-51511", + "sourceIdentifier": "audit@patchstack.com", + "published": "2024-06-04T13:15:49.430", + "lastModified": "2024-06-04T13:15:49.430", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Improper Authentication vulnerability in Pluggabl LLC Booster Elite for WooCommerce allows Accessing Functionality Not Properly Constrained by ACLs.This issue affects Booster Elite for WooCommerce: from n/a before 7.1.3." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 6.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-287" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/vulnerability/booster-elite-for-woocommerce/wordpress-booster-elite-for-woocommerce-plugin-7-1-3-authenticated-production-creation-modification-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-515xx/CVE-2023-51542.json b/CVE-2023/CVE-2023-515xx/CVE-2023-51542.json new file mode 100644 index 00000000000..dbbf047f2b8 --- /dev/null +++ b/CVE-2023/CVE-2023-515xx/CVE-2023-51542.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2023-51542", + "sourceIdentifier": "audit@patchstack.com", + "published": "2024-06-04T13:15:49.820", + "lastModified": "2024-06-04T13:15:49.820", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Authentication Bypass by Spoofing vulnerability in WPMU DEV Branda allows Accessing Functionality Not Properly Constrained by ACLs.This issue affects Branda: from n/a through 3.4.14." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-290" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/vulnerability/branda-white-labeling/wordpress-branda-plugin-3-4-14-ip-restriction-bypass-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-515xx/CVE-2023-51543.json b/CVE-2023/CVE-2023-515xx/CVE-2023-51543.json new file mode 100644 index 00000000000..f11970bd428 --- /dev/null +++ b/CVE-2023/CVE-2023-515xx/CVE-2023-51543.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2023-51543", + "sourceIdentifier": "audit@patchstack.com", + "published": "2024-06-04T13:15:50.047", + "lastModified": "2024-06-04T13:15:50.047", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Authentication Bypass by Spoofing vulnerability in Metagauss RegistrationMagic allows Accessing Functionality Not Properly Constrained by ACLs.This issue affects RegistrationMagic: from n/a through 5.2.5.0." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-290" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/vulnerability/custom-registration-form-builder-with-submission-manager/wordpress-registrationmagic-plugin-5-2-5-0-ip-limit-bypass-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-515xx/CVE-2023-51544.json b/CVE-2023/CVE-2023-515xx/CVE-2023-51544.json new file mode 100644 index 00000000000..95653dd7960 --- /dev/null +++ b/CVE-2023/CVE-2023-515xx/CVE-2023-51544.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2023-51544", + "sourceIdentifier": "audit@patchstack.com", + "published": "2024-06-04T13:15:50.277", + "lastModified": "2024-06-04T13:15:50.277", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Improper Control of Interaction Frequency vulnerability in Metagauss RegistrationMagic allows Functionality Misuse.This issue affects RegistrationMagic: from n/a through 5.2.5.0." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-799" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/vulnerability/custom-registration-form-builder-with-submission-manager/wordpress-registrationmagic-plugin-5-2-5-0-form-submission-limit-bypass-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-516xx/CVE-2023-51667.json b/CVE-2023/CVE-2023-516xx/CVE-2023-51667.json new file mode 100644 index 00000000000..876a0b1db74 --- /dev/null +++ b/CVE-2023/CVE-2023-516xx/CVE-2023-51667.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2023-51667", + "sourceIdentifier": "audit@patchstack.com", + "published": "2024-06-04T13:15:50.500", + "lastModified": "2024-06-04T13:15:50.500", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Authentication Bypass by Spoofing vulnerability in FeedbackWP Rate my Post \u2013 WP Rating System allows Accessing Functionality Not Properly Constrained by ACLs.This issue affects Rate my Post \u2013 WP Rating System: from n/a through 3.4.2." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 5.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-290" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/vulnerability/rate-my-post/wordpress-rate-my-post-wp-rating-system-plugin-3-4-2-broken-access-control-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-521xx/CVE-2023-52147.json b/CVE-2023/CVE-2023-521xx/CVE-2023-52147.json new file mode 100644 index 00000000000..3d136eb0da1 --- /dev/null +++ b/CVE-2023/CVE-2023-521xx/CVE-2023-52147.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2023-52147", + "sourceIdentifier": "audit@patchstack.com", + "published": "2024-06-04T13:15:50.730", + "lastModified": "2024-06-04T13:15:50.730", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Exposure of Sensitive Information to an Unauthorized Actor vulnerability in All In One WP Security & Firewall Team All In One WP Security & Firewall allows Accessing Functionality Not Properly Constrained by ACLs.This issue affects All In One WP Security & Firewall: from n/a through 5.2.4." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 3.7, + "baseSeverity": "LOW" + }, + "exploitabilityScore": 2.2, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-200" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/vulnerability/all-in-one-wp-security-and-firewall/wordpress-all-in-one-security-aios-plugin-5-2-4-secret-login-page-location-disclosure-on-multisites-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-521xx/CVE-2023-52176.json b/CVE-2023/CVE-2023-521xx/CVE-2023-52176.json new file mode 100644 index 00000000000..7dde8a01c26 --- /dev/null +++ b/CVE-2023/CVE-2023-521xx/CVE-2023-52176.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2023-52176", + "sourceIdentifier": "audit@patchstack.com", + "published": "2024-06-04T13:15:50.960", + "lastModified": "2024-06-04T13:15:50.960", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Authentication Bypass by Spoofing vulnerability in miniorange Malware Scanner allows Accessing Functionality Not Properly Constrained by ACLs.This issue affects Malware Scanner: from n/a through 4.7.1." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 5.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-290" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/vulnerability/miniorange-malware-protection/wordpress-malware-scanner-plugin-4-7-1-ip-restriction-bypass-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-256xx/CVE-2024-25600.json b/CVE-2024/CVE-2024-256xx/CVE-2024-25600.json new file mode 100644 index 00000000000..f4c497bb070 --- /dev/null +++ b/CVE-2024/CVE-2024-256xx/CVE-2024-25600.json @@ -0,0 +1,71 @@ +{ + "id": "CVE-2024-25600", + "sourceIdentifier": "audit@patchstack.com", + "published": "2024-06-04T13:15:51.183", + "lastModified": "2024-06-04T13:15:51.183", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Improper Control of Generation of Code ('Code Injection') vulnerability in Codeer Limited Bricks Builder allows Code Injection.This issue affects Bricks Builder: from n/a through 1.9.6." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 10.0, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 6.0 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-94" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/Chocapikk/CVE-2024-25600", + "source": "audit@patchstack.com" + }, + { + "url": "https://github.com/K3ysTr0K3R/CVE-2024-25600-EXPLOIT", + "source": "audit@patchstack.com" + }, + { + "url": "https://patchstack.com/articles/critical-rce-patched-in-bricks-builder-theme?_s_id=cve", + "source": "audit@patchstack.com" + }, + { + "url": "https://patchstack.com/database/vulnerability/bricks/wordpress-bricks-theme-1-9-6-unauthenticated-remote-code-execution-rce-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + }, + { + "url": "https://snicco.io/vulnerability-disclosure/bricks/unauthenticated-rce-in-bricks-1-9-6", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-291xx/CVE-2024-29170.json b/CVE-2024/CVE-2024-291xx/CVE-2024-29170.json new file mode 100644 index 00000000000..fa15f211b44 --- /dev/null +++ b/CVE-2024/CVE-2024-291xx/CVE-2024-29170.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2024-29170", + "sourceIdentifier": "security_alert@emc.com", + "published": "2024-06-04T13:15:51.460", + "lastModified": "2024-06-04T13:15:51.460", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Dell PowerScale OneFS versions 8.2.x through 9.8.0.x contain a use of hard coded credentials vulnerability. An adjacent network unauthenticated attacker could potentially exploit this vulnerability, leading to information disclosure of network traffic and denial of service." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security_alert@emc.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 8.1, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.2 + } + ] + }, + "weaknesses": [ + { + "source": "security_alert@emc.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-798" + } + ] + } + ], + "references": [ + { + "url": "https://www.dell.com/support/kbdoc/en-us/000225667/dsa-2024-210-security-update-for-dell-powerscale-onefs-for-multiple-security-vulnerabilities", + "source": "security_alert@emc.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-335xx/CVE-2024-33541.json b/CVE-2024/CVE-2024-335xx/CVE-2024-33541.json new file mode 100644 index 00000000000..65a3bb54eb9 --- /dev/null +++ b/CVE-2024/CVE-2024-335xx/CVE-2024-33541.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2024-33541", + "sourceIdentifier": "audit@patchstack.com", + "published": "2024-06-04T13:15:51.717", + "lastModified": "2024-06-04T13:15:51.717", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in BetterAddons Better Elementor Addons allows PHP Local File Inclusion.This issue affects Better Elementor Addons: from n/a through 1.4.1." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 6.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-22" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/vulnerability/better-elementor-addons/wordpress-better-elementor-addons-plugin-1-4-1-local-file-inclusion-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-335xx/CVE-2024-33557.json b/CVE-2024/CVE-2024-335xx/CVE-2024-33557.json new file mode 100644 index 00000000000..f852b399086 --- /dev/null +++ b/CVE-2024/CVE-2024-335xx/CVE-2024-33557.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2024-33557", + "sourceIdentifier": "audit@patchstack.com", + "published": "2024-06-04T13:15:51.943", + "lastModified": "2024-06-04T13:15:51.943", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in 8theme XStore Core allows PHP Local File Inclusion.This issue affects XStore Core: from n/a through 5.3.8." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 6.0 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-22" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/vulnerability/et-core-plugin/wordpress-xstore-core-plugin-5-3-5-local-file-inclusion-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-335xx/CVE-2024-33560.json b/CVE-2024/CVE-2024-335xx/CVE-2024-33560.json new file mode 100644 index 00000000000..82012f0fd01 --- /dev/null +++ b/CVE-2024/CVE-2024-335xx/CVE-2024-33560.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2024-33560", + "sourceIdentifier": "audit@patchstack.com", + "published": "2024-06-04T13:15:52.177", + "lastModified": "2024-06-04T13:15:52.177", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in 8theme XStore allows PHP Local File Inclusion.This issue affects XStore: from n/a through 9.3.8." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.0, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 2.2, + "impactScore": 6.0 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-22" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/vulnerability/xstore/wordpress-xstore-theme-9-3-5-unauthenticated-local-file-inclusion-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-358xx/CVE-2024-35812.json b/CVE-2024/CVE-2024-358xx/CVE-2024-35812.json index c7c1cb01a20..553e8fa4625 100644 --- a/CVE-2024/CVE-2024-358xx/CVE-2024-35812.json +++ b/CVE-2024/CVE-2024-358xx/CVE-2024-35812.json @@ -2,83 +2,14 @@ "id": "CVE-2024-35812", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-05-17T14:15:15.360", - "lastModified": "2024-05-17T18:35:35.070", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-06-04T13:15:52.390", + "vulnStatus": "Rejected", "descriptions": [ { "lang": "en", - "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nusb: cdc-wdm: close race between read and workqueue\n\nwdm_read() cannot race with itself. However, in\nservice_outstanding_interrupt() it can race with the\nworkqueue, which can be triggered by error handling.\n\nHence we need to make sure that the WDM_RESPONDING\nflag is not just only set but tested." - }, - { - "lang": "es", - "value": " En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: usb: cdc-wdm: ejecuci\u00f3n cercana entre lectura y cola de trabajo wdm_read() no puede ejecutarse consigo mismo. Sin embargo, en service_outstanding_interrupt() puede competir con la cola de trabajo, lo que puede desencadenarse mediante el manejo de errores. Por lo tanto, debemos asegurarnos de que el indicador WDM_RESPONDING no s\u00f3lo est\u00e9 configurado sino tambi\u00e9n probado." + "value": "Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority." } ], "metrics": {}, - "references": [ - { - "url": "https://git.kernel.org/stable/c/164be0a824387301312689bb29b2be92ab2cd39d", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" - }, - { - "url": "https://git.kernel.org/stable/c/19f955ad9437a6859a529af34e2eafd903d5e7c1", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" - }, - { - "url": "https://git.kernel.org/stable/c/2ff436b6399859e06539a2b9c667897d3cc85ad5", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" - }, - { - "url": "https://git.kernel.org/stable/c/339f83612f3a569b194680768b22bf113c26a29d", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" - }, - { - "url": "https://git.kernel.org/stable/c/347cca11bb78b9f3c29b45a9c52e70258bd008bf", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" - }, - { - "url": "https://git.kernel.org/stable/c/3afdcc4e1a00facad210f5c5891bb2fbc026067f", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" - }, - { - "url": "https://git.kernel.org/stable/c/5904411219601127ffdbd2d622bb5d67f9d8d16c", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" - }, - { - "url": "https://git.kernel.org/stable/c/7182175f565ffffa2ba1911726c5656bfc7a1bae", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" - }, - { - "url": "https://git.kernel.org/stable/c/8672ad663a22d0e4a325bb7d817b36ec412b967c", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" - }, - { - "url": "https://git.kernel.org/stable/c/916cd2fcbc1e344bcabf4b2a834cdf5a0417d30c", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" - }, - { - "url": "https://git.kernel.org/stable/c/9723602387217caa71d623ffcce314dc39e84a09", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" - }, - { - "url": "https://git.kernel.org/stable/c/9b319f4a88094b2e020e6db6e819c808d890098d", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" - }, - { - "url": "https://git.kernel.org/stable/c/a86e54a345139f1a7668c9f83bdc7ac6f91b6f78", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" - }, - { - "url": "https://git.kernel.org/stable/c/ab92e11b73b48b79f144421430891f3aa6242656", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" - }, - { - "url": "https://git.kernel.org/stable/c/da3b75931bb737be74d6b4341e0080f233ed1409", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" - }, - { - "url": "https://git.kernel.org/stable/c/e4e47e406d74cab601b2ab21ba5e3add811e05ae", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" - } - ] + "references": [] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-359xx/CVE-2024-35941.json b/CVE-2024/CVE-2024-359xx/CVE-2024-35941.json index e4b71d691eb..7e93e11e876 100644 --- a/CVE-2024/CVE-2024-359xx/CVE-2024-35941.json +++ b/CVE-2024/CVE-2024-359xx/CVE-2024-35941.json @@ -2,35 +2,14 @@ "id": "CVE-2024-35941", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-05-19T11:15:49.823", - "lastModified": "2024-05-20T13:00:04.957", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-06-04T13:15:52.613", + "vulnStatus": "Rejected", "descriptions": [ { "lang": "en", - "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: skbuff: add overflow debug check to pull/push helpers\n\nsyzbot managed to trigger following splat:\nBUG: KASAN: use-after-free in __skb_flow_dissect+0x4a3b/0x5e50\nRead of size 1 at addr ffff888208a4000e by task a.out/2313\n[..]\n __skb_flow_dissect+0x4a3b/0x5e50\n __skb_get_hash+0xb4/0x400\n ip_tunnel_xmit+0x77e/0x26f0\n ipip_tunnel_xmit+0x298/0x410\n ..\n\nAnalysis shows that the skb has a valid ->head, but bogus ->data\npointer.\n\nskb->data gets its bogus value via the neigh layer, which does:\n\n1556 __skb_pull(skb, skb_network_offset(skb));\n\n... and the skb was already dodgy at this point:\n\nskb_network_offset(skb) returns a negative value due to an\nearlier overflow of skb->network_header (u16). __skb_pull thus\n\"adjusts\" skb->data by a huge offset, pointing outside skb->head\narea.\n\nAllow debug builds to splat when we try to pull/push more than\nINT_MAX bytes.\n\nAfter this, the syzkaller reproducer yields a more precise splat\nbefore the flow dissector attempts to read off skb->data memory:\n\nWARNING: CPU: 5 PID: 2313 at include/linux/skbuff.h:2653 neigh_connected_output+0x28e/0x400\n ip_finish_output2+0xb25/0xed0\n iptunnel_xmit+0x4ff/0x870\n ipgre_xmit+0x78e/0xbb0" - }, - { - "lang": "es", - "value": "En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: net: skbuff: agregar verificaci\u00f3n de depuraci\u00f3n de desbordamiento a los asistentes de extracci\u00f3n/empuje syzbot logr\u00f3 activar el siguiente s\u00edmbolo: BUG: KASAN: use after free en __skb_flow_dissect+0x4a3b/0x5e50 Lectura de tama\u00f1o 1 en la direcci\u00f3n ffff888208a4000e por tarea a.out/2313 [..] __skb_flow_dissect+0x4a3b/0x5e50 __skb_get_hash+0xb4/0x400 ip_tunnel_xmit+0x77e/0x26f0 ipip_tunnel_xmit+0x298/0x410 .. El an\u00e1lisis muestra que el skb tiene un ->head v\u00e1lido, pero falso ->puntero de datos. skb->data obtiene su valor falso a trav\u00e9s de la capa vecina, que hace: 1556 __skb_pull(skb, skb_network_offset(skb)); ... y el skb ya era dudoso en este punto: skb_network_offset(skb) devuelve un valor negativo debido a un desbordamiento anterior de skb->network_header (u16). __skb_pull por lo tanto \"ajusta\" los datos skb-> con un desplazamiento enorme, apuntando fuera del \u00e1rea principal de skb->. Permitir que las compilaciones de depuraci\u00f3n se ejecuten cuando intentamos extraer/enviar m\u00e1s de INT_MAX bytes. Despu\u00e9s de esto, el reproductor syzkaller produce un sonido m\u00e1s preciso antes de que el disector de flujo intente leer skb->memoria de datos: ADVERTENCIA: CPU: 5 PID: 2313 en include/linux/skbuff.h:2653 neigh_connected_output+0x28e/0x400 ip_finish_output2+ 0xb25/0xed0 iptunnel_xmit+0x4ff/0x870 ipgre_xmit+0x78e/0xbb0" + "value": "Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority." } ], "metrics": {}, - "references": [ - { - "url": "https://git.kernel.org/stable/c/1b2b26595bb09febf14c5444c873ac4ec90a5a77", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" - }, - { - "url": "https://git.kernel.org/stable/c/219eee9c0d16f1b754a8b85275854ab17df0850a", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" - }, - { - "url": "https://git.kernel.org/stable/c/8af60bb2b215f478b886f1d6d302fefa7f0b917d", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" - }, - { - "url": "https://git.kernel.org/stable/c/fff05b2b004d9a8a2416d08647f3dc9068e357c8", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" - } - ] + "references": [] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-368xx/CVE-2024-36800.json b/CVE-2024/CVE-2024-368xx/CVE-2024-36800.json new file mode 100644 index 00000000000..5c27c0f06ee --- /dev/null +++ b/CVE-2024/CVE-2024-368xx/CVE-2024-36800.json @@ -0,0 +1,20 @@ +{ + "id": "CVE-2024-36800", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-06-04T13:15:52.740", + "lastModified": "2024-06-04T13:15:52.740", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "A SQL injection vulnerability in SEMCMS v.4.8, allows a remote attacker to obtain sensitive information via the ID parameter in Download.php." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/want1997/SEMCMS_VUL/blob/main/Download_sql_vul.md", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-368xx/CVE-2024-36801.json b/CVE-2024/CVE-2024-368xx/CVE-2024-36801.json new file mode 100644 index 00000000000..0fa1a581d84 --- /dev/null +++ b/CVE-2024/CVE-2024-368xx/CVE-2024-36801.json @@ -0,0 +1,20 @@ +{ + "id": "CVE-2024-36801", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-06-04T13:15:52.857", + "lastModified": "2024-06-04T13:15:52.857", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "A SQL injection vulnerability in SEMCMS v.4.8, allows a remote attacker to obtain sensitive information via the lgid parameter in Download.php." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/want1997/SEMCMS_VUL/blob/main/Download_sql_vul_2.md", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-370xx/CVE-2024-37052.json b/CVE-2024/CVE-2024-370xx/CVE-2024-37052.json new file mode 100644 index 00000000000..27c791786ae --- /dev/null +++ b/CVE-2024/CVE-2024-370xx/CVE-2024-37052.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2024-37052", + "sourceIdentifier": "6f8de1f0-f67e-45a6-b68f-98777fdb759c", + "published": "2024-06-04T12:15:10.413", + "lastModified": "2024-06-04T12:15:10.413", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Deserialization of untrusted data can occur in versions of the MLflow platform running version 1.1.0 or newer, enabling a maliciously uploaded scikit-learn model to run arbitrary code on an end user\u2019s system when interacted with." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "6f8de1f0-f67e-45a6-b68f-98777fdb759c", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "6f8de1f0-f67e-45a6-b68f-98777fdb759c", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-502" + } + ] + } + ], + "references": [ + { + "url": "https://hiddenlayer.com/sai-security-advisory/mlflow-june2024", + "source": "6f8de1f0-f67e-45a6-b68f-98777fdb759c" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-370xx/CVE-2024-37053.json b/CVE-2024/CVE-2024-370xx/CVE-2024-37053.json new file mode 100644 index 00000000000..8ebc471686e --- /dev/null +++ b/CVE-2024/CVE-2024-370xx/CVE-2024-37053.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2024-37053", + "sourceIdentifier": "6f8de1f0-f67e-45a6-b68f-98777fdb759c", + "published": "2024-06-04T12:15:10.957", + "lastModified": "2024-06-04T12:15:10.957", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Deserialization of untrusted data can occur in versions of the MLflow platform running version 1.1.0 or newer, enabling a maliciously uploaded scikit-learn model to run arbitrary code on an end user\u2019s system when interacted with." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "6f8de1f0-f67e-45a6-b68f-98777fdb759c", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "6f8de1f0-f67e-45a6-b68f-98777fdb759c", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-502" + } + ] + } + ], + "references": [ + { + "url": "https://hiddenlayer.com/sai-security-advisory/mlflow-june2024", + "source": "6f8de1f0-f67e-45a6-b68f-98777fdb759c" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-370xx/CVE-2024-37054.json b/CVE-2024/CVE-2024-370xx/CVE-2024-37054.json new file mode 100644 index 00000000000..f78e3a862b2 --- /dev/null +++ b/CVE-2024/CVE-2024-370xx/CVE-2024-37054.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2024-37054", + "sourceIdentifier": "6f8de1f0-f67e-45a6-b68f-98777fdb759c", + "published": "2024-06-04T12:15:11.190", + "lastModified": "2024-06-04T12:15:11.190", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Deserialization of untrusted data can occur in versions of the MLflow platform running version 0.9.0 or newer, enabling a maliciously uploaded PyFunc model to run arbitrary code on an end user\u2019s system when interacted with." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "6f8de1f0-f67e-45a6-b68f-98777fdb759c", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "6f8de1f0-f67e-45a6-b68f-98777fdb759c", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-502" + } + ] + } + ], + "references": [ + { + "url": "https://hiddenlayer.com/sai-security-advisory/mlflow-june2024", + "source": "6f8de1f0-f67e-45a6-b68f-98777fdb759c" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-370xx/CVE-2024-37055.json b/CVE-2024/CVE-2024-370xx/CVE-2024-37055.json new file mode 100644 index 00000000000..8432b3b99c3 --- /dev/null +++ b/CVE-2024/CVE-2024-370xx/CVE-2024-37055.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2024-37055", + "sourceIdentifier": "6f8de1f0-f67e-45a6-b68f-98777fdb759c", + "published": "2024-06-04T12:15:11.397", + "lastModified": "2024-06-04T12:15:11.397", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Deserialization of untrusted data can occur in versions of the MLflow platform running version 1.24.0 or newer, enabling a maliciously uploaded pmdarima model to run arbitrary code on an end user\u2019s system when interacted with." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "6f8de1f0-f67e-45a6-b68f-98777fdb759c", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "6f8de1f0-f67e-45a6-b68f-98777fdb759c", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-502" + } + ] + } + ], + "references": [ + { + "url": "https://hiddenlayer.com/sai-security-advisory/mlflow-june2024", + "source": "6f8de1f0-f67e-45a6-b68f-98777fdb759c" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-370xx/CVE-2024-37056.json b/CVE-2024/CVE-2024-370xx/CVE-2024-37056.json new file mode 100644 index 00000000000..eb317e44707 --- /dev/null +++ b/CVE-2024/CVE-2024-370xx/CVE-2024-37056.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2024-37056", + "sourceIdentifier": "6f8de1f0-f67e-45a6-b68f-98777fdb759c", + "published": "2024-06-04T12:15:11.593", + "lastModified": "2024-06-04T12:15:11.593", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Deserialization of untrusted data can occur in versions of the MLflow platform running version 1.23.0 or newer, enabling a maliciously uploaded LightGBM scikit-learn model to run arbitrary code on an end user\u2019s system when interacted with." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "6f8de1f0-f67e-45a6-b68f-98777fdb759c", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "6f8de1f0-f67e-45a6-b68f-98777fdb759c", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-502" + } + ] + } + ], + "references": [ + { + "url": "https://hiddenlayer.com/sai-security-advisory/mlflow-june2024", + "source": "6f8de1f0-f67e-45a6-b68f-98777fdb759c" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-370xx/CVE-2024-37057.json b/CVE-2024/CVE-2024-370xx/CVE-2024-37057.json new file mode 100644 index 00000000000..7def3367b48 --- /dev/null +++ b/CVE-2024/CVE-2024-370xx/CVE-2024-37057.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2024-37057", + "sourceIdentifier": "6f8de1f0-f67e-45a6-b68f-98777fdb759c", + "published": "2024-06-04T12:15:11.800", + "lastModified": "2024-06-04T12:15:11.800", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Deserialization of untrusted data can occur in versions of the MLflow platform running version 2.0.0rc0 or newer, enabling a maliciously uploaded Tensorflow model to run arbitrary code on an end user\u2019s system when interacted with." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "6f8de1f0-f67e-45a6-b68f-98777fdb759c", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "6f8de1f0-f67e-45a6-b68f-98777fdb759c", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-502" + } + ] + } + ], + "references": [ + { + "url": "https://hiddenlayer.com/sai-security-advisory/mlflow-june2024", + "source": "6f8de1f0-f67e-45a6-b68f-98777fdb759c" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-370xx/CVE-2024-37058.json b/CVE-2024/CVE-2024-370xx/CVE-2024-37058.json new file mode 100644 index 00000000000..15b13b030a9 --- /dev/null +++ b/CVE-2024/CVE-2024-370xx/CVE-2024-37058.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2024-37058", + "sourceIdentifier": "6f8de1f0-f67e-45a6-b68f-98777fdb759c", + "published": "2024-06-04T12:15:12.023", + "lastModified": "2024-06-04T12:15:12.023", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Deserialization of untrusted data can occur in versions of the MLflow platform running version 2.5.0 or newer, enabling a maliciously uploaded Langchain AgentExecutor model to run arbitrary code on an end user\u2019s system when interacted with." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "6f8de1f0-f67e-45a6-b68f-98777fdb759c", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "6f8de1f0-f67e-45a6-b68f-98777fdb759c", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-502" + } + ] + } + ], + "references": [ + { + "url": "https://hiddenlayer.com/sai-security-advisory/mlflow-june2024", + "source": "6f8de1f0-f67e-45a6-b68f-98777fdb759c" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-370xx/CVE-2024-37059.json b/CVE-2024/CVE-2024-370xx/CVE-2024-37059.json new file mode 100644 index 00000000000..392df8e6675 --- /dev/null +++ b/CVE-2024/CVE-2024-370xx/CVE-2024-37059.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2024-37059", + "sourceIdentifier": "6f8de1f0-f67e-45a6-b68f-98777fdb759c", + "published": "2024-06-04T12:15:12.227", + "lastModified": "2024-06-04T12:15:12.227", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Deserialization of untrusted data can occur in versions of the MLflow platform running version 0.5.0 or newer, enabling a maliciously uploaded PyTorch model to run arbitrary code on an end user\u2019s system when interacted with." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "6f8de1f0-f67e-45a6-b68f-98777fdb759c", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "6f8de1f0-f67e-45a6-b68f-98777fdb759c", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-502" + } + ] + } + ], + "references": [ + { + "url": "https://hiddenlayer.com/sai-security-advisory/mlflow-june2024", + "source": "6f8de1f0-f67e-45a6-b68f-98777fdb759c" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-370xx/CVE-2024-37060.json b/CVE-2024/CVE-2024-370xx/CVE-2024-37060.json new file mode 100644 index 00000000000..4da991033ab --- /dev/null +++ b/CVE-2024/CVE-2024-370xx/CVE-2024-37060.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2024-37060", + "sourceIdentifier": "6f8de1f0-f67e-45a6-b68f-98777fdb759c", + "published": "2024-06-04T12:15:12.463", + "lastModified": "2024-06-04T12:15:12.463", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Deserialization of untrusted data can occur in versions of the MLflow platform running version 1.27.0 or newer, enabling a maliciously crafted Recipe to execute arbitrary code on an end user\u2019s system when run." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "6f8de1f0-f67e-45a6-b68f-98777fdb759c", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "6f8de1f0-f67e-45a6-b68f-98777fdb759c", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-502" + } + ] + } + ], + "references": [ + { + "url": "https://hiddenlayer.com/sai-security-advisory/mlflow-june2024", + "source": "6f8de1f0-f67e-45a6-b68f-98777fdb759c" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-370xx/CVE-2024-37061.json b/CVE-2024/CVE-2024-370xx/CVE-2024-37061.json new file mode 100644 index 00000000000..a06f7dc5659 --- /dev/null +++ b/CVE-2024/CVE-2024-370xx/CVE-2024-37061.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2024-37061", + "sourceIdentifier": "6f8de1f0-f67e-45a6-b68f-98777fdb759c", + "published": "2024-06-04T12:15:12.703", + "lastModified": "2024-06-04T12:15:12.703", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Remote Code Execution can occur in versions of the MLflow platform running version 1.11.0 or newer, enabling a maliciously crafted MLproject to execute arbitrary code on an end user\u2019s system when run." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "6f8de1f0-f67e-45a6-b68f-98777fdb759c", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "6f8de1f0-f67e-45a6-b68f-98777fdb759c", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-94" + } + ] + } + ], + "references": [ + { + "url": "https://hiddenlayer.com/sai-security-advisory/mlflow-june2024", + "source": "6f8de1f0-f67e-45a6-b68f-98777fdb759c" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-370xx/CVE-2024-37062.json b/CVE-2024/CVE-2024-370xx/CVE-2024-37062.json new file mode 100644 index 00000000000..4cb9e2f3091 --- /dev/null +++ b/CVE-2024/CVE-2024-370xx/CVE-2024-37062.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2024-37062", + "sourceIdentifier": "6f8de1f0-f67e-45a6-b68f-98777fdb759c", + "published": "2024-06-04T12:15:12.907", + "lastModified": "2024-06-04T12:15:12.907", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Deserialization of untrusted data can occur in versions 3.7.0 or newer of Ydata's ydata-profiling open-source library, enabling a malicously crafted report to run arbitrary code on an end user's system when loaded." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "6f8de1f0-f67e-45a6-b68f-98777fdb759c", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "6f8de1f0-f67e-45a6-b68f-98777fdb759c", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-502" + } + ] + } + ], + "references": [ + { + "url": "https://hiddenlayer.com/sai-security-advisory/ydata-june2024", + "source": "6f8de1f0-f67e-45a6-b68f-98777fdb759c" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-370xx/CVE-2024-37063.json b/CVE-2024/CVE-2024-370xx/CVE-2024-37063.json new file mode 100644 index 00000000000..1971235d4a2 --- /dev/null +++ b/CVE-2024/CVE-2024-370xx/CVE-2024-37063.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2024-37063", + "sourceIdentifier": "6f8de1f0-f67e-45a6-b68f-98777fdb759c", + "published": "2024-06-04T12:15:13.110", + "lastModified": "2024-06-04T12:15:13.110", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "A cross-site scripting (XSS) vulnerability in versions 3.7.0 or newer of Ydata's ydata-profiling open-source library allows for payloads to be run when a maliocusly crafted report is viewed in the browser." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "6f8de1f0-f67e-45a6-b68f-98777fdb759c", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "6f8de1f0-f67e-45a6-b68f-98777fdb759c", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://hiddenlayer.com/sai-security-advisory/ydata-june2024", + "source": "6f8de1f0-f67e-45a6-b68f-98777fdb759c" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-370xx/CVE-2024-37064.json b/CVE-2024/CVE-2024-370xx/CVE-2024-37064.json new file mode 100644 index 00000000000..e9a1ad46d5d --- /dev/null +++ b/CVE-2024/CVE-2024-370xx/CVE-2024-37064.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2024-37064", + "sourceIdentifier": "6f8de1f0-f67e-45a6-b68f-98777fdb759c", + "published": "2024-06-04T12:15:13.313", + "lastModified": "2024-06-04T12:15:13.313", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Deseriliazation of untrusted data can occur in versions 3.7.0 or newer of Ydata's ydata-profiling open-source library, enabling a maliciously crafted dataset to run arbitrary code on an end user's system when loaded." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "6f8de1f0-f67e-45a6-b68f-98777fdb759c", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "6f8de1f0-f67e-45a6-b68f-98777fdb759c", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-502" + } + ] + } + ], + "references": [ + { + "url": "https://hiddenlayer.com/sai-security-advisory/ydata-june2024", + "source": "6f8de1f0-f67e-45a6-b68f-98777fdb759c" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-370xx/CVE-2024-37065.json b/CVE-2024/CVE-2024-370xx/CVE-2024-37065.json new file mode 100644 index 00000000000..e46b25a63cf --- /dev/null +++ b/CVE-2024/CVE-2024-370xx/CVE-2024-37065.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2024-37065", + "sourceIdentifier": "6f8de1f0-f67e-45a6-b68f-98777fdb759c", + "published": "2024-06-04T12:15:13.507", + "lastModified": "2024-06-04T12:15:13.507", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Deserialization of untrusted data can occur in versions 0.6 or newer of the skops python library, enabling a maliciously crafted model to run arbitrary code on an end user's system when loaded." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "6f8de1f0-f67e-45a6-b68f-98777fdb759c", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "6f8de1f0-f67e-45a6-b68f-98777fdb759c", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-502" + } + ] + } + ], + "references": [ + { + "url": "https://hiddenlayer.com/sai-security-advisory/skops-june2024", + "source": "6f8de1f0-f67e-45a6-b68f-98777fdb759c" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-42xx/CVE-2024-4254.json b/CVE-2024/CVE-2024-42xx/CVE-2024-4254.json new file mode 100644 index 00000000000..7fa76912294 --- /dev/null +++ b/CVE-2024/CVE-2024-42xx/CVE-2024-4254.json @@ -0,0 +1,59 @@ +{ + "id": "CVE-2024-4254", + "sourceIdentifier": "security@huntr.dev", + "published": "2024-06-04T12:15:13.710", + "lastModified": "2024-06-04T12:15:13.710", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "The 'deploy-website.yml' workflow in the gradio-app/gradio repository, specifically in the 'main' branch, is vulnerable to secrets exfiltration due to improper authorization. The vulnerability arises from the workflow's explicit checkout and execution of code from a fork, which is unsafe as it allows the running of untrusted code in an environment with access to push to the base repository and access secrets. This flaw could lead to the exfiltration of sensitive secrets such as GITHUB_TOKEN, HF_TOKEN, VERCEL_ORG_ID, VERCEL_PROJECT_ID, COMMENT_TOKEN, AWSACCESSKEYID, AWSSECRETKEY, and VERCEL_TOKEN. The vulnerability is present in the workflow file located at https://github.com/gradio-app/gradio/blob/72f4ca88ab569aae47941b3fb0609e57f2e13a27/.github/workflows/deploy-website.yml." + }, + { + "lang": "es", + "value": "La neutralizaci\u00f3n inadecuada de etiquetas HTML relacionadas con scripts en una vulnerabilidad de p\u00e1gina web (XSS b\u00e1sico) en PickPlugins Tabs & Accordion permite la inyecci\u00f3n de c\u00f3digo. Este problema afecta a Tabs & Accordion: desde n/a hasta 1.3.10." + } + ], + "metrics": { + "cvssMetricV30": [ + { + "source": "security@huntr.dev", + "type": "Secondary", + "cvssData": { + "version": "3.0", + "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 7.1, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 4.2 + } + ] + }, + "weaknesses": [ + { + "source": "security@huntr.dev", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-285" + } + ] + } + ], + "references": [ + { + "url": "https://huntr.com/bounties/59873fbd-5698-4ec3-87f9-5d70c6055d01", + "source": "security@huntr.dev" + } + ] +} \ No newline at end of file diff --git a/README.md b/README.md index 12ceca843fe..bf3f4a6a1f4 100644 --- a/README.md +++ b/README.md @@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2024-06-04T12:00:30.469610+00:00 +2024-06-04T14:00:38.127097+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2024-06-04T11:15:51.010000+00:00 +2024-06-04T13:15:52.857000+00:00 ``` ### Last Data Feed Release @@ -33,42 +33,46 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### Total Number of included CVEs ```plain -252575 +252607 ``` ### CVEs added in the last Commit -Recently added CVEs: `23` +Recently added CVEs: `32` -- [CVE-2023-45053](CVE-2023/CVE-2023-450xx/CVE-2023-45053.json) (`2024-06-04T10:15:08.910`) -- [CVE-2023-45635](CVE-2023/CVE-2023-456xx/CVE-2023-45635.json) (`2024-06-04T10:15:10.230`) -- [CVE-2023-46310](CVE-2023/CVE-2023-463xx/CVE-2023-46310.json) (`2024-06-04T10:15:10.503`) -- [CVE-2023-46630](CVE-2023/CVE-2023-466xx/CVE-2023-46630.json) (`2024-06-04T10:15:10.763`) -- [CVE-2023-47189](CVE-2023/CVE-2023-471xx/CVE-2023-47189.json) (`2024-06-04T10:15:11.010`) -- [CVE-2023-47513](CVE-2023/CVE-2023-475xx/CVE-2023-47513.json) (`2024-06-04T10:15:11.250`) -- [CVE-2023-47663](CVE-2023/CVE-2023-476xx/CVE-2023-47663.json) (`2024-06-04T10:15:11.483`) -- [CVE-2023-47769](CVE-2023/CVE-2023-477xx/CVE-2023-47769.json) (`2024-06-04T10:15:11.733`) -- [CVE-2023-47818](CVE-2023/CVE-2023-478xx/CVE-2023-47818.json) (`2024-06-04T10:15:11.997`) -- [CVE-2023-47837](CVE-2023/CVE-2023-478xx/CVE-2023-47837.json) (`2024-06-04T10:15:12.237`) -- [CVE-2023-48271](CVE-2023/CVE-2023-482xx/CVE-2023-48271.json) (`2024-06-04T11:15:48.110`) -- [CVE-2023-48276](CVE-2023/CVE-2023-482xx/CVE-2023-48276.json) (`2024-06-04T11:15:48.360`) -- [CVE-2023-48285](CVE-2023/CVE-2023-482xx/CVE-2023-48285.json) (`2024-06-04T11:15:48.580`) -- [CVE-2023-48290](CVE-2023/CVE-2023-482xx/CVE-2023-48290.json) (`2024-06-04T11:15:48.830`) -- [CVE-2023-48318](CVE-2023/CVE-2023-483xx/CVE-2023-48318.json) (`2024-06-04T11:15:49.053`) -- [CVE-2023-48335](CVE-2023/CVE-2023-483xx/CVE-2023-48335.json) (`2024-06-04T11:15:49.897`) -- [CVE-2023-48745](CVE-2023/CVE-2023-487xx/CVE-2023-48745.json) (`2024-06-04T11:15:50.123`) -- [CVE-2023-48747](CVE-2023/CVE-2023-487xx/CVE-2023-48747.json) (`2024-06-04T11:15:50.347`) -- [CVE-2023-48753](CVE-2023/CVE-2023-487xx/CVE-2023-48753.json) (`2024-06-04T11:15:50.563`) -- [CVE-2023-49741](CVE-2023/CVE-2023-497xx/CVE-2023-49741.json) (`2024-06-04T11:15:50.783`) -- [CVE-2023-49748](CVE-2023/CVE-2023-497xx/CVE-2023-49748.json) (`2024-06-04T11:15:51.010`) -- [CVE-2024-4637](CVE-2024/CVE-2024-46xx/CVE-2024-4637.json) (`2024-06-04T10:15:12.503`) -- [CVE-2024-5463](CVE-2024/CVE-2024-54xx/CVE-2024-5463.json) (`2024-06-04T10:15:12.747`) +- [CVE-2023-51667](CVE-2023/CVE-2023-516xx/CVE-2023-51667.json) (`2024-06-04T13:15:50.500`) +- [CVE-2023-52147](CVE-2023/CVE-2023-521xx/CVE-2023-52147.json) (`2024-06-04T13:15:50.730`) +- [CVE-2023-52176](CVE-2023/CVE-2023-521xx/CVE-2023-52176.json) (`2024-06-04T13:15:50.960`) +- [CVE-2024-25600](CVE-2024/CVE-2024-256xx/CVE-2024-25600.json) (`2024-06-04T13:15:51.183`) +- [CVE-2024-29170](CVE-2024/CVE-2024-291xx/CVE-2024-29170.json) (`2024-06-04T13:15:51.460`) +- [CVE-2024-33541](CVE-2024/CVE-2024-335xx/CVE-2024-33541.json) (`2024-06-04T13:15:51.717`) +- [CVE-2024-33557](CVE-2024/CVE-2024-335xx/CVE-2024-33557.json) (`2024-06-04T13:15:51.943`) +- [CVE-2024-33560](CVE-2024/CVE-2024-335xx/CVE-2024-33560.json) (`2024-06-04T13:15:52.177`) +- [CVE-2024-36800](CVE-2024/CVE-2024-368xx/CVE-2024-36800.json) (`2024-06-04T13:15:52.740`) +- [CVE-2024-36801](CVE-2024/CVE-2024-368xx/CVE-2024-36801.json) (`2024-06-04T13:15:52.857`) +- [CVE-2024-37052](CVE-2024/CVE-2024-370xx/CVE-2024-37052.json) (`2024-06-04T12:15:10.413`) +- [CVE-2024-37053](CVE-2024/CVE-2024-370xx/CVE-2024-37053.json) (`2024-06-04T12:15:10.957`) +- [CVE-2024-37054](CVE-2024/CVE-2024-370xx/CVE-2024-37054.json) (`2024-06-04T12:15:11.190`) +- [CVE-2024-37055](CVE-2024/CVE-2024-370xx/CVE-2024-37055.json) (`2024-06-04T12:15:11.397`) +- [CVE-2024-37056](CVE-2024/CVE-2024-370xx/CVE-2024-37056.json) (`2024-06-04T12:15:11.593`) +- [CVE-2024-37057](CVE-2024/CVE-2024-370xx/CVE-2024-37057.json) (`2024-06-04T12:15:11.800`) +- [CVE-2024-37058](CVE-2024/CVE-2024-370xx/CVE-2024-37058.json) (`2024-06-04T12:15:12.023`) +- [CVE-2024-37059](CVE-2024/CVE-2024-370xx/CVE-2024-37059.json) (`2024-06-04T12:15:12.227`) +- [CVE-2024-37060](CVE-2024/CVE-2024-370xx/CVE-2024-37060.json) (`2024-06-04T12:15:12.463`) +- [CVE-2024-37061](CVE-2024/CVE-2024-370xx/CVE-2024-37061.json) (`2024-06-04T12:15:12.703`) +- [CVE-2024-37062](CVE-2024/CVE-2024-370xx/CVE-2024-37062.json) (`2024-06-04T12:15:12.907`) +- [CVE-2024-37063](CVE-2024/CVE-2024-370xx/CVE-2024-37063.json) (`2024-06-04T12:15:13.110`) +- [CVE-2024-37064](CVE-2024/CVE-2024-370xx/CVE-2024-37064.json) (`2024-06-04T12:15:13.313`) +- [CVE-2024-37065](CVE-2024/CVE-2024-370xx/CVE-2024-37065.json) (`2024-06-04T12:15:13.507`) +- [CVE-2024-4254](CVE-2024/CVE-2024-42xx/CVE-2024-4254.json) (`2024-06-04T12:15:13.710`) ### CVEs modified in the last Commit -Recently modified CVEs: `0` +Recently modified CVEs: `2` +- [CVE-2024-35812](CVE-2024/CVE-2024-358xx/CVE-2024-35812.json) (`2024-06-04T13:15:52.390`) +- [CVE-2024-35941](CVE-2024/CVE-2024-359xx/CVE-2024-35941.json) (`2024-06-04T13:15:52.613`) ## Download and Usage diff --git a/_state.csv b/_state.csv index adca7e6e2b5..03c98774187 100644 --- a/_state.csv +++ b/_state.csv @@ -233023,7 +233023,7 @@ CVE-2023-4505,0,0,08b70dab223e070448e8024455ddb0f539257ee2b24cfc38a707e72f793349 CVE-2023-45050,0,0,8f8aaf9978e1f6b51424180837903cefeda602198ba3442bade325d037556925,2023-12-06T01:35:40.773000 CVE-2023-45051,0,0,98c1234cd2915993eece196edbe810f57ef1b010cf2ce9dd18b13e4b80b75999,2023-10-25T17:38:21.743000 CVE-2023-45052,0,0,77eae12b4fa2c0060b640686cdc1b66acb79dc74365b8ea6d1b0f525f1ee5cd3,2023-10-17T18:46:40.420000 -CVE-2023-45053,1,1,5d5291c2be05a1a0d3d29941ccec77b140bce37622b0ae0a5dcaedb27d06d603,2024-06-04T10:15:08.910000 +CVE-2023-45053,0,0,5d5291c2be05a1a0d3d29941ccec77b140bce37622b0ae0a5dcaedb27d06d603,2024-06-04T10:15:08.910000 CVE-2023-45054,0,0,5cf4f35927445900a23289b0d29f26559cbb68153e91dcb6f028b8c7bffa42f5,2023-10-25T17:38:17.183000 CVE-2023-45055,0,0,29d2114299b4c74ef616613f44aa4a41e7c344a77a335209ab301aa44eec913d,2023-11-10T04:17:47.710000 CVE-2023-45056,0,0,604dfc916b43be62f3fa1decb2fd0cdd1a0e154ba3f074058bd7b87bd6fc06af,2023-10-25T17:38:11.073000 @@ -233412,7 +233412,7 @@ CVE-2023-4563,0,0,412b1f6b2f76e9ab4f58110f6336496ea198dfd1f5fe1f2104578419cf6b7d CVE-2023-45630,0,0,9fc893dbea1d675c98e712ff9836a3725b1d9f0d2e711bc0435b7b8c3484f136,2023-10-25T01:25:54.793000 CVE-2023-45632,0,0,88e1fbb02ed73f35a312972f995f300ebe519b50b83ad604758f398fd3076f01,2023-10-25T01:25:40.933000 CVE-2023-45634,0,0,222c7ba9ec90c1b83fd757865960ed1c5030304592c085cf10febdc47ea7b650,2023-10-27T21:58:08.617000 -CVE-2023-45635,1,1,8b30674cfea1649c0e4c539bc42c7beae8cfb0be774152d3e3da09df26a34b31,2024-06-04T10:15:10.230000 +CVE-2023-45635,0,0,8b30674cfea1649c0e4c539bc42c7beae8cfb0be774152d3e3da09df26a34b31,2024-06-04T10:15:10.230000 CVE-2023-45637,0,0,ce351731ba0a8610cbad237c54fb040fc139e08d0e54bb0f87f52fa3c2b38441,2023-10-27T21:56:43.497000 CVE-2023-45638,0,0,f34ee74ed9686647b6878a8dbcb2dcdc1cb7815775b0d609411d36d8b03bee09,2023-10-18T22:46:07.233000 CVE-2023-45639,0,0,d05428ded578d92aae600cdf5ba945b03825316ce06495020814900fe8c77295,2023-10-19T17:44:02.860000 @@ -233941,7 +233941,7 @@ CVE-2023-46306,0,0,3cc3c3abc132825b0de5e5713618461432ca75d34cf5d6314908b068992c1 CVE-2023-46307,0,0,70b1e7b39477592163424a81cdcac5736b174b2b3ef677dc9db177c5b5ec12cc,2023-12-12T17:06:02.260000 CVE-2023-46308,0,0,93fc954f3a128690a25cd4b8d8fc47afecd3303f2e318c0a2f0696550f2b4f76,2024-01-09T17:47:09.937000 CVE-2023-4631,0,0,f9a75b3fa9259593f2eb56bbd324a3965971ccf8066af6586ae560be6a935dcc,2023-11-07T04:22:48.020000 -CVE-2023-46310,1,1,697ca4ef4362b8d3acea8b057f97868ca23a1d6027a886ae69340c819919f451,2024-06-04T10:15:10.503000 +CVE-2023-46310,0,0,697ca4ef4362b8d3acea8b057f97868ca23a1d6027a886ae69340c819919f451,2024-06-04T10:15:10.503000 CVE-2023-46311,0,0,0e5573500a39b307b2c60ac16805905b2aa525dda4cdcdcb4966393d238681d6,2023-12-28T20:06:13.850000 CVE-2023-46312,0,0,d9900d295c00c4481ba9b90bea85e05da8631659306e5a8ba168f098d658bd0c,2023-11-08T02:24:43.287000 CVE-2023-46313,0,0,26bdfe7606548277b659acc13ea81113d83bd485148153f8e6f1479f3453c4b8,2023-11-08T02:24:23.733000 @@ -234162,7 +234162,7 @@ CVE-2023-46626,0,0,0b0beadc63340a6291f32184a96243409d2f154e401306ac5354c2b1c4a6a CVE-2023-46627,0,0,7f16ed5dc70512013a689d7944b262d15c359a886dfc5e808745660f4609f404,2023-11-14T21:37:36.790000 CVE-2023-46629,0,0,5503221f06ac5332965ebc5158075320ae19f6baca95ee3c98fed08ac83638f2,2023-11-16T23:43:08.647000 CVE-2023-4663,0,0,cb622107dd10fb47dae31471f695667bb4b847cab355f5a2ad5655a20b6c6ab1,2023-09-20T15:13:47.473000 -CVE-2023-46630,1,1,96512019659de34a7264860eb952668dd8e608ba653a8728f3562b0fd195a886,2024-06-04T10:15:10.763000 +CVE-2023-46630,0,0,96512019659de34a7264860eb952668dd8e608ba653a8728f3562b0fd195a886,2024-06-04T10:15:10.763000 CVE-2023-46634,0,0,26b30da45e705e737045cedcde5ac25dcf6d1d8f3125169488fe7ac5dfacf289,2023-11-16T18:16:13.293000 CVE-2023-46636,0,0,76f23cc9dc7d46435807ed86a5b91b8788ee4db7afc6a3de8bbb87d83d51b54e,2023-11-16T23:43:01.907000 CVE-2023-46638,0,0,3b1109a32586059e441b0a97ccdf0f6ba9d2e5b5fd1cdbeed38bc39f535c3e34,2023-11-16T23:42:55.590000 @@ -234584,7 +234584,7 @@ CVE-2023-47182,0,0,eee2b9dfe6778e43d4732644b2e34d2afd4c49bd2f627bf97c8e8b049e269 CVE-2023-47184,0,0,006726597518e035c83402b563d90ce82bbd4e93b3d7bff5677ac8e71b1804be,2023-11-14T17:04:27.783000 CVE-2023-47185,0,0,ac03a4a2ac5445aa1c0a5599ec1cdcab29877cde46f4b0a2c7ea0971295ff8b2,2023-11-14T17:04:12.320000 CVE-2023-47186,0,0,a6af3e99b206f650a389e2a8494459f846190c40032cb975dfcfe476c602b082,2023-11-14T16:23:05.433000 -CVE-2023-47189,1,1,c164f4fb23212fe24e6dbdc9124ae3764e9471c2aea778ee152a86ac10f51d2d,2024-06-04T10:15:11.010000 +CVE-2023-47189,0,0,c164f4fb23212fe24e6dbdc9124ae3764e9471c2aea778ee152a86ac10f51d2d,2024-06-04T10:15:11.010000 CVE-2023-4719,0,0,9d704bdac1249c1a3cf0b1f88156a66fb03186a2a8754fabc0ad1e260ab11edd,2023-11-07T04:22:53.820000 CVE-2023-47190,0,0,e27cf06847b50fbed203c73f80d55aba75b4ca0cd31399718ceaccb76d2c2842,2023-11-14T21:11:29.610000 CVE-2023-47191,0,0,796a13ca4fd3a2989a78f73cb74e0c925cce0a5be713b993f15a19097a7de4e9,2023-12-30T03:20:37.497000 @@ -234775,7 +234775,7 @@ CVE-2023-4751,0,0,b474afbd68a51ccc03983fb09d5bc361aa5e9bd679ddad99f0eb8301553cba CVE-2023-47510,0,0,71e4b62dfe2ca075ffc368295060ad4f08e446acff4b59a4de0732b86e57af88,2023-11-14T20:56:50.343000 CVE-2023-47511,0,0,dc9ad40d182dd905b0efd3c019af8e1021f2bf27961092c32bd1879259c14169,2023-11-22T18:23:46.350000 CVE-2023-47512,0,0,6a66c2385408c365d0ff6a8ea66cc9e3cb01fa3d0449aa00aa5c2aed8f58da63,2023-11-21T01:05:27.800000 -CVE-2023-47513,1,1,ef0f7402d042d768b876c444e1f50e8441924c964fd91afced37d11e13e0bb6a,2024-06-04T10:15:11.250000 +CVE-2023-47513,0,0,ef0f7402d042d768b876c444e1f50e8441924c964fd91afced37d11e13e0bb6a,2024-06-04T10:15:11.250000 CVE-2023-47514,0,0,a8e90cce931ded77e76cd956d1561635883b69077cf7fbb5fd3d59a8e4382686,2023-11-22T18:31:02.543000 CVE-2023-47516,0,0,5e1e7faad407b03f5aedd6d01043b5471f45260b07b691d1aea5a2815ab05971,2023-11-16T18:16:05.383000 CVE-2023-47517,0,0,af418bf6e062ac43a7ba3a8a7bd4b86a8406757faed0cee97fddcbbf9b7f27ea,2023-11-21T00:45:47.997000 @@ -234899,7 +234899,7 @@ CVE-2023-47659,0,0,8be60f9ac5ea724d3de91bba3a133532ccfd93b448ae5f662e01779b71fc1 CVE-2023-4766,0,0,45c5b495c455d2e827148893303d53ee4181ef288443d797f74c2953a841cc0a,2023-09-19T02:26:50.013000 CVE-2023-47660,0,0,223305f40be65b9cd91149bb778c4d946d32d4a22823fbb8b304b1f867c082de,2023-11-20T16:56:01.590000 CVE-2023-47662,0,0,54da8b7441f7ec7d21dd4df05a98b5af1e7fc05632dc959a9adff5e987eba44b,2023-11-21T17:01:11.083000 -CVE-2023-47663,1,1,d978480323dfa79cf2cb95eff29b69070c43e007b7cb9ad4dc0ed7a818785933,2024-06-04T10:15:11.483000 +CVE-2023-47663,0,0,d978480323dfa79cf2cb95eff29b69070c43e007b7cb9ad4dc0ed7a818785933,2024-06-04T10:15:11.483000 CVE-2023-47664,0,0,36cf2c33ba3fa94d975d1f76be3a2e8972d58018edf6c33a7ab266f2bdb50ced,2023-11-24T22:48:31.267000 CVE-2023-47665,0,0,d831123b04a54e61afcecac29d93ba42a3fdfb5ad3ac75aa9ca009babd761374,2023-11-16T23:44:26.317000 CVE-2023-47666,0,0,f0e686f55dddcc71b3497b4ac6b93dd63942c388eb21336b70c919030c9772e7,2023-11-24T22:48:09.573000 @@ -234972,7 +234972,7 @@ CVE-2023-47765,0,0,3251ed3fd28a6fec07ac7cb9a8062141687a024f352fd8ca51a5261474100 CVE-2023-47766,0,0,7899cca13e1385e375f32ebb1b3937b93c65cd574d277550bab56e26b7a4da55,2023-11-28T19:18:00.713000 CVE-2023-47767,0,0,d83e27c39cbb312ccf0217c3b2c5d4f56f6e2b810766abaf5e7fcfbee9251a94,2023-11-28T19:19:35.667000 CVE-2023-47768,0,0,9cefbe9c9b382b54c5ee099fb76d85e1fd42d31125fbe85625df2f10a347f516,2023-11-28T19:22:41.277000 -CVE-2023-47769,1,1,eccf1058d1edd338fb4f0de8019ef7933459516585ba4f07210404762e4fe061,2024-06-04T10:15:11.733000 +CVE-2023-47769,0,0,eccf1058d1edd338fb4f0de8019ef7933459516585ba4f07210404762e4fe061,2024-06-04T10:15:11.733000 CVE-2023-4777,0,0,2285f3b3937f1b6ee7b5013a1072c08eed965f2b904b03b7b4184647f26697b4,2023-09-13T12:54:59.283000 CVE-2023-47772,0,0,7713bada3e93d580185e7757a00736557df9fbba8e32d5584ac0aaf5b9527567,2023-11-27T20:23:44.047000 CVE-2023-47773,0,0,298e58c18c603d342f120209e3a04b3e42e7e1fc100c9336741efc054d287705,2023-11-30T04:55:31.483000 @@ -235011,7 +235011,7 @@ CVE-2023-47814,0,0,4856a6025149093aa5ff1e806dfe9fc38a6ab4027dcdee287805bc3052d1f CVE-2023-47815,0,0,14ce2eef99bc2d9086139a275a9b134de7a4f7b6cb6c448a8a7e25edfd1efa90,2023-11-28T20:05:31.977000 CVE-2023-47816,0,0,e082edd53a6a4eed5960f7ab77c59be8833c6ec71604cf00765311a3b449101b,2023-11-28T20:07:47.730000 CVE-2023-47817,0,0,c7f6e34a92682e0578e30cc5b35895d83c1350af99047d963ddb37699701bf08,2023-11-28T20:23:25.427000 -CVE-2023-47818,1,1,18ca272b54a0147dc671e257ee3463ad43770ea986245527463f858af9b66b50,2024-06-04T10:15:11.997000 +CVE-2023-47818,0,0,18ca272b54a0147dc671e257ee3463ad43770ea986245527463f858af9b66b50,2024-06-04T10:15:11.997000 CVE-2023-47819,0,0,3ac1dddd9619f10e6a99e054670d02ef9e97893f1f3f4906281325d948991a94,2023-11-29T02:29:33 CVE-2023-4782,0,0,a08a89cf905ee8629cef1fe4ebfdaf2e3f2cfe374d0c88eaa92a133223524295,2023-09-12T18:34:45.990000 CVE-2023-47821,0,0,dac8e9ebeae5e88fc92354391c4f187a5fe46b91ec13faf3e8bb2be9422c5e19,2023-11-28T20:23:38.657000 @@ -235024,7 +235024,7 @@ CVE-2023-47831,0,0,4ffecae7c979e98c1749b725e6bb7e9e2e4e58e21f7a0369a7e31a101a513 CVE-2023-47833,0,0,f7236df431372004a0d559bf44f7c2f8b84efc80bec2779f11bc374cd0c0ad16,2023-11-28T20:25:42.100000 CVE-2023-47834,0,0,920967a055b2bc21ff0798aa9e7d238eed9616b66b2486f71c8817a9616735ed,2023-11-28T20:24:06.653000 CVE-2023-47835,0,0,7a712355ce5c48eadcb9e26f4f27778335f03b4bfa9861aa3fd9d0cda8b8d8fa,2023-11-28T20:21:32.220000 -CVE-2023-47837,1,1,33f52880a7c61768be04c7c57e1a848f73ef1b73ab6050bceb722ef8a3b3f93a,2024-06-04T10:15:12.237000 +CVE-2023-47837,0,0,33f52880a7c61768be04c7c57e1a848f73ef1b73ab6050bceb722ef8a3b3f93a,2024-06-04T10:15:12.237000 CVE-2023-47839,0,0,7480547339b9b3ac3798f9c06e00c706f49ca35ebe73ec8189117729e422f769,2023-11-28T21:07:29.180000 CVE-2023-47840,0,0,7e24f7bfe5242765e69f6a2a237de2196af9eb411219ff1fe89053605cf27eb0,2024-01-04T21:27:45.337000 CVE-2023-47842,0,0,f440905c307b5610d2cfc83060eabc85c90c284cc9c17dab2bd938d9d5409ffb,2024-03-27T12:29:30.307000 @@ -235233,10 +235233,10 @@ CVE-2023-48265,0,0,b17021609fe4e77772f01fb0192ebb95b1219206f6043e8cd864d7b0ca321 CVE-2023-48266,0,0,d6f171231beb0ee1180aa8d7b71e94eefc1322fbdfbaea0d577085088643877b,2024-01-16T20:31:40.710000 CVE-2023-48268,0,0,7fbc38e1f3021e6f57ddbb59802c5c032dea61c9b04627258986c5e024d76a9e,2023-12-01T21:30:14.497000 CVE-2023-4827,0,0,660cb613242cf8fb9cab965004afed839f4beeb124259e7181eab5017ac3219d,2023-11-07T04:23:00.800000 -CVE-2023-48271,1,1,e198b5fcc18c6acd50fcc74a52358b75b0f4bb3d7f5d0c3de02bfc704ca71c88,2024-06-04T11:15:48.110000 +CVE-2023-48271,0,0,e198b5fcc18c6acd50fcc74a52358b75b0f4bb3d7f5d0c3de02bfc704ca71c88,2024-06-04T11:15:48.110000 CVE-2023-48272,0,0,6b4df1e347c87fa206b94499a385869f076cd0e708e56b463683f8e1d53c3c9b,2023-12-06T03:01:23.517000 CVE-2023-48275,0,0,21d3cdc7ae6f4754c5c550b6018b42b200823b5664b8a35a50e38d3b76fa2a9c,2024-03-27T12:29:30.307000 -CVE-2023-48276,1,1,bad73fc5cc054e9eae25b42b78cfe9155a3d57077a37b2e9742a40a863a5ea1c,2024-06-04T11:15:48.360000 +CVE-2023-48276,0,0,bad73fc5cc054e9eae25b42b78cfe9155a3d57077a37b2e9742a40a863a5ea1c,2024-06-04T11:15:48.360000 CVE-2023-48278,0,0,b8b615ff398a78f2adcd1913a459812b30de22df732a4689ed336a4365900549,2023-12-06T03:09:04.530000 CVE-2023-48279,0,0,677bb12e80f04b87e5ac81a35a4d9bd35cc895da5798b0a5048d841cd32d97ee,2023-12-05T20:02:01.297000 CVE-2023-4828,0,0,24b41979bedd35424b37496bcb2f184802754cdeb975ef549331a7b6a0081487,2023-10-13T22:15:10.717000 @@ -235244,11 +235244,11 @@ CVE-2023-48281,0,0,78bb75864e8c316aa8b5f84c9c0f28b82743f6997d5689af36c482f028e2d CVE-2023-48282,0,0,ee3f545b59bd799e6b5f304fecb83dbf55a1929c520ea20b716dec4f6a6eff71,2023-12-05T01:59:29.907000 CVE-2023-48283,0,0,83cf0ca71c7297ce8678051d1511978415ac96314858b5a75a8f14c4ce5a7132,2023-12-05T02:00:00.967000 CVE-2023-48284,0,0,707a63c06b80a67b3edfbd0b32b7920d7daf4bc225624c51ea3cda01f05f1c20,2023-12-05T02:00:11.640000 -CVE-2023-48285,1,1,2589b932e1f372cc09b55a9fe98aaa4ee06515d7a55d9d5f1f59af36cd4c8fe3,2024-06-04T11:15:48.580000 +CVE-2023-48285,0,0,2589b932e1f372cc09b55a9fe98aaa4ee06515d7a55d9d5f1f59af36cd4c8fe3,2024-06-04T11:15:48.580000 CVE-2023-48288,0,0,19ac24ac88dcab5b08a8c9544462ea918482f622a54e6ba82de96a12c2a282a6,2023-12-29T03:27:57.107000 CVE-2023-48289,0,0,d07d661ce1e3569a469e3ecdc2654b4ce8846c7807e0b2fb1419505629ae39ee,2023-12-05T19:24:11.607000 CVE-2023-4829,0,0,d207290f9e2022e9bf7ed5126f661135ba76d996e11407f54a0a92ba9b964dd1,2023-10-17T16:10:31.727000 -CVE-2023-48290,1,1,8b6c0e67ff8875f134bad31ffe29f2d1b73e00eb622e7abfb7d449464c836c8e,2024-06-04T11:15:48.830000 +CVE-2023-48290,0,0,8b6c0e67ff8875f134bad31ffe29f2d1b73e00eb622e7abfb7d449464c836c8e,2024-06-04T11:15:48.830000 CVE-2023-48291,0,0,f9f5f2eb0ee5639697b41278ba7a983f05d86493bd5557765f2336f6bf74d216,2023-12-28T13:52:59.233000 CVE-2023-48292,0,0,ce3417881b0a91671ae0501e6e6066ed9d24b7b451a210ac59f07a3bb04fedda,2023-11-29T20:44:39.200000 CVE-2023-48293,0,0,8b35a584f0bf90d96e4cf0e61badd1f4868f960a52dc86a9d33b7fb2539e9f7c,2023-11-29T18:02:07.070000 @@ -235278,7 +235278,7 @@ CVE-2023-48314,0,0,9faec629ee42cb2d239fc27af92843fe8286afd13377596097cb188be12b6 CVE-2023-48315,0,0,b5df8c75d4323e7134f44169a32c9df27b1253f0ff5a8201e03343cd29e61c28,2023-12-08T19:04:07.240000 CVE-2023-48316,0,0,857bf20f41fa7a3be7807df7bb8e38c1def4778751697190e5b9f3a21242ff65,2023-12-08T19:11:52.763000 CVE-2023-48317,0,0,7792e8cbc097ce577ab5b895a0b0f250d15b4f382f87fdd999ddce58d5d46587,2023-12-06T03:11:49.693000 -CVE-2023-48318,1,1,6eeecba77be61a056a2739dffad13829d0c8359b90c9921283361f36e52d4aad,2024-06-04T11:15:49.053000 +CVE-2023-48318,0,0,6eeecba77be61a056a2739dffad13829d0c8359b90c9921283361f36e52d4aad,2024-06-04T11:15:49.053000 CVE-2023-48319,0,0,6f307cc1d3fe5a52a026e29c7ed597400875aab92dc03ab360104b504ec086ab,2024-05-17T18:36:05.263000 CVE-2023-4832,0,0,94f20a83da1f90d8e1573598745a404568d383a7c6bb0d697ca18c3852df9ac1,2023-09-19T02:20:05.197000 CVE-2023-48320,0,0,3a6fc5517ddbc74cc8db16fff59b8cf108a7136e6d86351f82a35efe62af93be,2023-12-06T03:16:01.150000 @@ -235295,7 +235295,7 @@ CVE-2023-48330,0,0,dbc01d30bd987a885da2abf85c259b7eafb32a598c6492f0d6ac884ee4432 CVE-2023-48331,0,0,90599aae60a7de59bbff07d3db2722ed871e44e71153a5cea792d198ebc8ecdf,2023-12-05T02:00:32.513000 CVE-2023-48333,0,0,aff8a1f751c328260becb0872b2d13f301390b582cd5ade313bcca2bbf616602,2023-12-06T17:25:08.207000 CVE-2023-48334,0,0,6c4983b648ff0cc4af8a2fc83d49f8205652fd2c9aff677b7fc762cd680a8807,2023-12-05T02:00:37.353000 -CVE-2023-48335,1,1,61b5f7033f164cb2481607d543c464519186923441d0880cb42294b6d6bbb6a6,2024-06-04T11:15:49.897000 +CVE-2023-48335,0,0,61b5f7033f164cb2481607d543c464519186923441d0880cb42294b6d6bbb6a6,2024-06-04T11:15:49.897000 CVE-2023-48336,0,0,0500b8d2c9b08c2545fc053ed48c8b3dd50e78c44ecbc2baa7b08208fc134e3a,2023-12-05T19:35:59.777000 CVE-2023-48339,0,0,54b580af57f5c06ac8bbaf90202520b9bf64e5db8bbec32ab8b76ceee04983cd,2024-01-25T02:12:20.037000 CVE-2023-4834,0,0,1aad50d674b08296d5b986a72b4429e47fba418a23c5c6f2bbe28c922123bb70,2023-10-24T14:52:35.443000 @@ -235714,15 +235714,15 @@ CVE-2023-48741,0,0,a92c2da5cebe16780e28f133edac9861605b0d925126e08e6df09f76e8f6f CVE-2023-48742,0,0,f211d26a39684bbc82397688428859c96ab63447077c12eb49e1380e6817d650,2023-12-05T20:10:51.070000 CVE-2023-48743,0,0,7b8ec35a78dea18972ab266a206481f6371ca390074dfd6538358cd75b0f4147,2023-12-05T20:44:29.720000 CVE-2023-48744,0,0,25a26f9835da4908a5c5aefd541c33d57f99b04f95414d164a291a09a158ed7f,2023-12-05T02:00:43.043000 -CVE-2023-48745,1,1,9b5e5a5d545943a39781323d90eb43a3f450a94fb9dbb4800f1c542c947f2b72,2024-06-04T11:15:50.123000 +CVE-2023-48745,0,0,9b5e5a5d545943a39781323d90eb43a3f450a94fb9dbb4800f1c542c947f2b72,2024-06-04T11:15:50.123000 CVE-2023-48746,0,0,db79a88b883fab98d8d2f19205a2ffe39fb095bd0d059dac263e60576f54eca9,2023-12-06T13:22:43.777000 -CVE-2023-48747,1,1,cbc7a34b81842e11d57df1dfbff383a92142f4141ae108e99770ba30164913ce,2024-06-04T11:15:50.347000 +CVE-2023-48747,0,0,cbc7a34b81842e11d57df1dfbff383a92142f4141ae108e99770ba30164913ce,2024-06-04T11:15:50.347000 CVE-2023-48748,0,0,e27240c4bb25988cb0190927138af5aff6a5e96fe21a6d72f9fae4e348f442bc,2023-12-06T13:15:14.420000 CVE-2023-48749,0,0,7c695c40b2bc6fb4ed546b0695996ab1cd706a664727f360b733f720631c34e8,2023-12-06T13:07:08.697000 CVE-2023-4875,0,0,4b1b5c484a012ff1b28a7f0dc51210addb30740757cbd9468800a3ba3f8e9ac5,2023-10-15T01:55:18.347000 CVE-2023-48751,0,0,fb75af98554e00c7cdc3ce2660694f94aa9646c4fa85eb2252007edf922741d4,2023-12-22T19:32:34.560000 CVE-2023-48752,0,0,6617438a452311d1c3b3c4464f90889ea0bbee28b49f83519f60c00eab92683b,2023-12-06T13:29:00.633000 -CVE-2023-48753,1,1,abd24014c7570f4f03cdfbbb79d7834d5bee2d37875be12b849d4eb11701156e,2024-06-04T11:15:50.563000 +CVE-2023-48753,0,0,abd24014c7570f4f03cdfbbb79d7834d5bee2d37875be12b849d4eb11701156e,2024-06-04T11:15:50.563000 CVE-2023-48754,0,0,0569193cd78a4efadd60bf838471661ca63bd091c9aeb68b7a8fe14fbc81daf8,2023-12-06T00:38:46.417000 CVE-2023-48755,0,0,89f1a2b9527257064e17a247159ee4cc7befcc939c8ab5a8c446ef85da2287a4,2023-12-20T21:09:32.063000 CVE-2023-48756,0,0,8c30dc5020c654f585a0d5dd735951cb2629fc1084a1290d46751808b441b84a,2023-12-18T19:06:14.257000 @@ -236345,14 +236345,14 @@ CVE-2023-49738,0,0,5c4f6ee44efbee607c5172901fe24b0e1c0f9924fd7d48aa8f7d198bbcf99 CVE-2023-49739,0,0,ed7af1af7b29da09287b9796692740d5a8f67a583e414c6ddb16b5263abbb30d,2023-12-19T18:06:46.643000 CVE-2023-4974,0,0,c4bd83e1a1fa436b6dfdd7a5ef085fb02d99f77a4587e2924b09b7a6db31a622,2024-05-17T02:31:54.310000 CVE-2023-49740,0,0,3b57b466e1f923eaa7ef022a2f7c4ea812dd859f4964babb0a9a182102c6b49e,2023-12-18T18:29:26.233000 -CVE-2023-49741,1,1,6b611525c8b073f615443d94018d2c2732d21203a58aba597ee75a13322020a0,2024-06-04T11:15:50.783000 +CVE-2023-49741,0,0,6b611525c8b073f615443d94018d2c2732d21203a58aba597ee75a13322020a0,2024-06-04T11:15:50.783000 CVE-2023-49742,0,0,62d3d5e2d89e9ccd812d34cbd7497ba402f194b446f9b240dbcc0a1df068be93,2024-04-18T13:04:28.900000 CVE-2023-49743,0,0,13f5af3ccb1e4b324e598e3022c0f930ec45448d3679021de25381951c590aa0,2023-12-18T18:39:56.250000 CVE-2023-49744,0,0,62713799f09c53108f2fff9617764ffd422292e0d6304d7c901d420c7eef25ca,2023-12-21T17:29:00.677000 CVE-2023-49745,0,0,fffe20c1d784d2b7c929f594f59c7d620c018b6b1ac8213ab25365d0b1ce526d,2023-12-18T18:40:10.603000 CVE-2023-49746,0,0,7086509a0a0c71fbe6be2d29719e82b965414157929156963d5040af0551b492,2023-12-12T16:56:40.860000 CVE-2023-49747,0,0,21a210db97f34b7bf95b947fb2b54bbde2fb7bfd23ca7325bb5d718084ed2eba,2023-12-21T17:35:43.413000 -CVE-2023-49748,1,1,bbdccad53f9cbcf17dbd24c4803f84db4f01fafb605cc6da67255d93ce80b947,2024-06-04T11:15:51.010000 +CVE-2023-49748,0,0,bbdccad53f9cbcf17dbd24c4803f84db4f01fafb605cc6da67255d93ce80b947,2024-06-04T11:15:51.010000 CVE-2023-49749,0,0,54d721a1f8919dabe6c9453544384d6d3d957df342128d6b5aecbaa6f328df38,2023-12-21T17:43:48.513000 CVE-2023-4975,0,0,8746de5a5b3e758d2eb01465a0483347d84f3de15eb42458491766dbe13375a2,2023-11-07T04:23:15.203000 CVE-2023-49750,0,0,d8056be5916469b0d9e94f40417ace5cb8a17b4b964d872989008fc697c814a7,2023-12-22T12:14:32.417000 @@ -236375,6 +236375,7 @@ CVE-2023-49770,0,0,0a27ec81e7d2882781700f3f05263aa58179bb03e78b71006e6b846b4d551 CVE-2023-49771,0,0,25464d73165426744b02c9f49706298b0ff1f4a9711ed66b34eb497db89f9d7a,2023-12-18T19:48:00.757000 CVE-2023-49772,0,0,a9c6d356989d18cbdf75cc99aa7292cd305b1269f1734c9284be97b44edfd318,2023-12-29T06:51:44.587000 CVE-2023-49773,0,0,a29c82b68c38b870b413fd21f673ae686821be0c9914c1dbad6cd5a31f2164d6,2024-01-05T12:07:52.007000 +CVE-2023-49774,1,1,d87eec6c937071ed390422c146a471f625251b48bb973e62c93290badc718e3b,2024-06-04T12:15:09.700000 CVE-2023-49775,0,0,40c822889bf4000ae32008f8ef3937292cf731d4ad1dad7389d0d22508b83295,2024-02-22T03:40:18.307000 CVE-2023-49776,0,0,1a7a5f372e14f3c9fad3450d1c48237fd9788b252ad2be1ba464bd51debd7e73,2023-12-29T16:55:58.180000 CVE-2023-49777,0,0,07d0b44c4bf3b90fa1fb298960b918af48834842fa08093065f9437c7c73af76,2024-01-08T17:32:52.710000 @@ -236419,6 +236420,7 @@ CVE-2023-49819,0,0,547af230d15dfd9c5dd18465c1156e2cd30992e5bd1e74e9c3b0138634a11 CVE-2023-4982,0,0,41bf569dca1252afc469aa49798e49aceff83425feac1cab042002f01a9fbb29,2023-09-20T13:13:16.680000 CVE-2023-49820,0,0,cc65d3c16a2ed6a78a8dc44a38f48d2d659c8d8dc6d13d0c7f0f31e620dc95b1,2023-12-18T19:47:40.197000 CVE-2023-49821,0,0,ea958c3a5356314f5ebd8da019a3638d7ee7d98170762858f9b87732987da0f5,2023-12-27T14:40:34.053000 +CVE-2023-49822,1,1,210f290b7589629b96c13ccb5934320741a8d110551b75a63233a62682430343,2024-06-04T12:15:09.933000 CVE-2023-49823,0,0,8f2fc02f1bb3df69cf426805af6c0c29004c9c376f2fc1b3cdee732e682a2a1f,2023-12-21T17:48:09.407000 CVE-2023-49824,0,0,d656c2942fa1d9047823eeaf8be29fe598a8e3bce63744a39ef17792669626af,2023-12-20T04:21:23.460000 CVE-2023-49825,0,0,564d625cac80c8dd44c72e2b8977f13c7ccf226b197a9d82a51ee60081d03869,2023-12-26T21:33:58.223000 @@ -236443,6 +236445,7 @@ CVE-2023-49844,0,0,f2868caf273e3497c015d6733bece2f3f8af42caa378ba666fe51e3cb2e80 CVE-2023-49846,0,0,e2e1045a2d57e3d1aaac660179893a2dc5c48927dc834c27f1c9d97c6b8ed287,2023-12-18T18:20:32.197000 CVE-2023-49847,0,0,57ad2c297ed98561b1b6ae8e6341166fa7a927823adeb102e61d4eedfe017a39,2023-12-18T18:21:09.460000 CVE-2023-4985,0,0,d6d14f319e2bc2661748ecc56a5fd5f644c6eac7bc3510996570baa1839c3227,2024-05-17T02:31:54.817000 +CVE-2023-49852,1,1,53d932a7b3600e5f1bfd3d9acd4f8b6b81737c2c607394811290ef32857eba15,2024-06-04T12:15:10.153000 CVE-2023-49853,0,0,df9c497ec180b0ea27bb19dc1ec5d9bf2dd7d8f1a8f86c93a2259f3f2ff71482,2024-02-29T01:41:39.820000 CVE-2023-49854,0,0,9c2a3b81b76198670284c219165421a8ef4dfb208eeb34f7864c56e36865d11a,2023-12-20T04:29:09.497000 CVE-2023-49855,0,0,71b807144c6de240eef9dab96b3d99b0ad27634e5a9757aeed24c9dc84513bb2,2023-12-20T04:29:01.180000 @@ -237375,6 +237378,7 @@ CVE-2023-51508,0,0,099af3ff1b9f679effb5120ee494202dac60ab65a92678cc7e6be069d589f CVE-2023-51509,0,0,aca08ca21768d303c35e41d15b9bbe6af6c7742abca074387d9b454c0c3c1bfc,2024-02-06T01:02:16.330000 CVE-2023-5151,0,0,1b68d8ee874e236cbdc70956d4d3baa8dfa247178722cc1fc700d4d7c992bbf0,2024-05-17T02:32:51.987000 CVE-2023-51510,0,0,1353ad84455c49924d2f2d254540a7ae311db5ead3a69fa8532e229874af65a0,2024-03-17T22:38:29.433000 +CVE-2023-51511,1,1,042b8e47f2b821b02bf4f7824ba766a19e245eba9bd1eb1020bc3f40dfabead2,2024-06-04T13:15:49.430000 CVE-2023-51512,0,0,b503b131cbc4230950d7fc98e64892f0904a9f3b2b59ccf4a240d2b4fe53e2d1,2024-03-17T22:38:29.433000 CVE-2023-51514,0,0,44a388f30c139a4590a3bf56e00fe693595a163e9cef7869b048530195c7b7e1,2024-02-06T01:02:10.990000 CVE-2023-51515,0,0,3422ae4f26a23a247945a7b0cf74e34e46aa8f9a141eed6440357fa69f923e4b,2024-04-15T13:15:51.577000 @@ -237401,6 +237405,9 @@ CVE-2023-51539,0,0,bdb4b88364881927645b78ec47bf86f0a85efb3eff25f2564bb75c3725083 CVE-2023-5154,0,0,a99c59508426987620982876617160c47179b836a93c4355f648aeed6078c463,2024-05-17T02:32:52.320000 CVE-2023-51540,0,0,4fb8cacaaec655ca39d5ac85ca2324b1623f919eb27ed5943f1e12c52d59db00,2024-02-07T17:05:59.580000 CVE-2023-51541,0,0,cf9fd5251982ae34f9d1a6c7ef7137712140adac1b14b66e98b30f5cf2d4cd8e,2024-02-29T01:42:04.593000 +CVE-2023-51542,1,1,1771922fd3484598e40baa54b054b8bdea7b32ec3763a0875ced67628c53b9e5,2024-06-04T13:15:49.820000 +CVE-2023-51543,1,1,fbd491baaf7fcf6e74371f364724907217f6b5e90af51db95dd93552dc9a512e,2024-06-04T13:15:50.047000 +CVE-2023-51544,1,1,8d6401d7505902ff136f9423094cec411f84918880925bb458970b00c9fa3d3e,2024-06-04T13:15:50.277000 CVE-2023-51545,0,0,a4142e2ca4ce5852b08d515f5a62a78fc16a002d435f2b6b5d7f079a888f8b26,2024-01-05T18:05:04.407000 CVE-2023-51546,0,0,26733dcf79d4f473dab932b27fb2a2b7a3d3d4f7a3911c5af91f1e6b8bc34ece,2024-05-17T18:36:05.263000 CVE-2023-51547,0,0,c982f4b046496a731b5048a632534aea5fe458955a1b974571191fb8d5f7c885,2024-01-05T20:49:25.943000 @@ -237517,6 +237524,7 @@ CVE-2023-51663,0,0,d83a7d32fbb7435bcb58f5bdc28a62b2d33e29b22cfaddf45ebd3b75bac9f CVE-2023-51664,0,0,b0d24350338011662545bfc012cfe08d4b6a10d0b7b21df88520461376c5490b,2024-01-04T16:57:12.717000 CVE-2023-51665,0,0,8c54347d2c48708098279dbf3ec2f0230cb0c4a2e65ee8666de19a799abdd62d,2024-01-05T15:02:21.103000 CVE-2023-51666,0,0,d01488de41e6bcc8e1d26db42f71396fa97f6f13c18ef4f0fc4b1c0b568d6404,2024-02-07T17:06:35.410000 +CVE-2023-51667,1,1,2f3ac86e61a526f622f2323a646b7b9e8d3209faee82adab403ec6357b34130a,2024-06-04T13:15:50.500000 CVE-2023-51668,0,0,1605f66809b9c96416733ec8082d6eaac2861c71b77512691b688d40edaed58d,2024-01-09T14:27:16.827000 CVE-2023-51669,0,0,ecdca3dab41c8a74480f540b0cebb63f42a6ac98e701e7aab8001a68e4335dc0,2024-02-07T17:06:50.843000 CVE-2023-5167,0,0,cc354b4f412e0824e85932f819009ad505168825905c48c26b3fe18753ae9969,2023-11-07T04:23:34.800000 @@ -237820,6 +237828,7 @@ CVE-2023-52143,0,0,711faec443a2eceed610aa81a0c2fce4bb20cec3fd1831b74c7a26cbff4d3 CVE-2023-52144,0,0,f3e06f44687c2af6d25f760f06e0239c02c3db680ee09c9d59e0d01da4248947,2024-04-15T13:15:31.997000 CVE-2023-52145,0,0,7a4b86956bd2ef9e4b16ef2a82e6462f9219f9e13f0ae66de84a4e79d421a16c,2024-01-12T14:39:24.130000 CVE-2023-52146,0,0,a01692a3acbd9936f1f4912ddff572a9839d99c6f5ecef64634d55ed19972c47,2024-02-06T11:15:08.657000 +CVE-2023-52147,1,1,a7e0e57795124e1ebd09e5759142657a8bd03b4d277d1dbb4ee511f3c64cdd69,2024-06-04T13:15:50.730000 CVE-2023-52148,0,0,716b87f6e18a732ca60d290639cb79893e0331604cbc045eda29dee1d4212aa5,2024-01-10T04:02:08.553000 CVE-2023-52149,0,0,0bd5a11707677d04ec1d347e3774371d4331c358a0588dd55ae4cf33b96f538e,2024-01-09T15:32:14.667000 CVE-2023-5215,0,0,13126b2cecc0981cc34463918545b3414c046ccc056278c34b43595cc3474eef,2024-04-30T14:15:11.137000 @@ -237837,6 +237846,7 @@ CVE-2023-5217,0,0,7ba5b927181a714978a513b1447492d30b9204770bc875e02b0ddf7485f511 CVE-2023-52173,0,0,653751d06808116187d115997433d85c759b866ee7527f311b397336366ebb4c,2024-01-04T23:34:46.453000 CVE-2023-52174,0,0,79e20d77a07605a892f972d0d5b1fee1a2293c3b3ed991923dbc5981d1985ef0,2024-01-04T23:35:08.563000 CVE-2023-52175,0,0,dc148159de02306a075c5c5a9359ae7fb04b3bcbdbd59c15cb123213aa494f1c,2024-02-06T20:46:18.473000 +CVE-2023-52176,1,1,60b4bca549b28d34a700f5f03601ae624af8ad7a2f4a2ac1a316d4c5023c3f21,2024-06-04T13:15:50.960000 CVE-2023-52178,0,0,c09e49f81eb32d843010688fb3f1a4cc63da60711f94d2031dcf5162594c7cfa,2024-01-11T14:17:42.607000 CVE-2023-5218,0,0,5d39c307a229ebb116959b5d798682370d3d430565ab1c1feb7036208e28c8da,2024-01-31T17:15:18.423000 CVE-2023-52180,0,0,8b413e2e8c63ed1227bc9cbfc39a312c2260cfa648393fc28b71bda1979be008,2024-01-08T14:46:37.220000 @@ -245135,6 +245145,7 @@ CVE-2024-25597,0,0,995a42bb5448cb09cb985e0b42e6cccd2cae6222c241291d138853f854550 CVE-2024-25598,0,0,43981dc647595567427079648c996df524b855802acc767a53f000d4ab2b6b3f,2024-03-15T16:26:49.320000 CVE-2024-25599,0,0,032448a69971fef9ee741a14b966aa271b8012f133cb0ca23a0dce51bf94426e,2024-03-28T12:42:56.150000 CVE-2024-2560,0,0,809d62945ef2e3d90fbf469b99de295e3fded702b00ce1ccb1e2ea6f85a4ab6a,2024-05-17T02:38:19.143000 +CVE-2024-25600,1,1,9728ea83eff5cc16eb40a7f851f99566d3f8a03981b26f312619d45f01c05cb0,2024-06-04T13:15:51.183000 CVE-2024-25601,0,0,81f4fdae91c2e2979380ffdf7201132bd42db70ea50ec659a221655da6bb1b91,2024-02-22T19:07:37.840000 CVE-2024-25602,0,0,6a0412f9e3d86cacfb35a934a8fd793128a0f85212ec26797b187230b94df26a,2024-02-22T19:07:37.840000 CVE-2024-25603,0,0,863f490c7ea22d0d3c701bfeb2e8a36747268d73fdd29bb24261158009a35432,2024-02-22T19:07:37.840000 @@ -247505,6 +247516,7 @@ CVE-2024-29165,0,0,56d636407e1bb4b0ac449c45605f98b67e37c82a870441216999fc8912fdf CVE-2024-29166,0,0,b13dfaf0c8e4ea3bbd358bd8614d1947c156835fe22c5095fd83f7cd95ae4bba,2024-05-14T16:13:02.773000 CVE-2024-29167,0,0,bf34fde11ddaf885eca651982ced409116d0263648d1d196b5990bfa9a0517fe,2024-05-17T02:37:49.993000 CVE-2024-2917,0,0,738b9419e321262581cbcbc36e60bc25c85f82bd40a8ab12d5b727ad6cc0972c,2024-05-17T02:38:37.297000 +CVE-2024-29170,1,1,bf425dc43dbbce8ec07b471a39b9166b4abc9f24b393471e7948f4e337b6d71b,2024-06-04T13:15:51.460000 CVE-2024-29179,0,0,f19d4d0a9f8b6dc85e6e021ab22950c73dd30b1b16e940f3cfc8d8b6deab42d4,2024-03-26T12:55:05.010000 CVE-2024-2918,0,0,ce50c7c24dc6b969578ed47f388645920a5e5c8ad0b49917ec2e7ecd8d9606ee,2024-04-10T13:23:38.787000 CVE-2024-29180,0,0,41debf5c02b25447b090e1fe17310ae2918a3e33749dbf7033ce058b1311f912,2024-03-21T19:47:03.943000 @@ -249966,6 +249978,7 @@ CVE-2024-33538,0,0,e7d86585abc433df63c34994a7b1a015734175492b100326db14778bb8d1f CVE-2024-33539,0,0,87f154978a987e28cf100a131c9fad421daff9a6f4f5e6dbc40640de68db94cd,2024-04-29T12:42:03.667000 CVE-2024-3354,0,0,5aae79cede7291e1765a3e1fa18184af5eeaede0f0b8f7a4b3c7ba1d02dd5fd5,2024-05-17T02:39:51.963000 CVE-2024-33540,0,0,1e814a0ea27748156363c52e26bb77b4bb9ce63c0961730b17ad99865f2d78c6,2024-04-29T12:42:03.667000 +CVE-2024-33541,1,1,a61e990affe83985122586c91f6ad3d92feb633a02d52b64fc38eee6bc8a69ce,2024-06-04T13:15:51.717000 CVE-2024-33542,0,0,5cebfa7c22f12a6aa2675dd4ec6e19e1966575adb9d6e6e73c2f3dcae54dbf8b,2024-04-29T12:42:03.667000 CVE-2024-33544,0,0,6e4ff4d9102a5d0f999b74773217097beffc904dc7d907863d8222867af3d336,2024-04-29T12:42:03.667000 CVE-2024-33546,0,0,b169a469c02b39c7428e1081bafd0bce76a92a565897fda0bd0e3619ddaf047f,2024-04-29T12:42:03.667000 @@ -249978,9 +249991,11 @@ CVE-2024-33552,0,0,fde617a71e53ba17ca9f10ac03296324c4dbf70e1400c675507bd26b68dc4 CVE-2024-33553,0,0,a63cd25e668e51ecdb575a6c39c2fdd900060fbc8acd7ddcf7e42aae11fc033a,2024-04-29T12:42:03.667000 CVE-2024-33554,0,0,2fa44634a105abf41bf64ae29b253ae6fabbadcb928bf62199eae71c375589ab,2024-04-29T12:42:03.667000 CVE-2024-33556,0,0,bf8553efa7bbc1b53671beaaba018dbbf4557a86527dffcc557df95897680dab,2024-05-17T18:36:05.263000 +CVE-2024-33557,1,1,42cbf8fc34dea1ad453bb3d2e23e10183cebceee26581826255fb0494e61e154,2024-06-04T13:15:51.943000 CVE-2024-33558,0,0,cf1181c3a097a2fb7b0482529266f16182741fa48852985dd7469f08bd1e4d39,2024-04-29T12:42:03.667000 CVE-2024-33559,0,0,7cbd898a0eece080f97fc20fdacdba598f6fa88c2c0ecdd34006e14d646ba964,2024-04-29T12:42:03.667000 CVE-2024-3356,0,0,cd18273ede30de9828727c0da7510b9e37ba44a42d6203a51ac948e77f776d06,2024-05-17T02:39:52.150000 +CVE-2024-33560,1,1,5ef739de84b42583b231c5b739be0d6b3fb9f1233b52b0423556c9a8ef411bbe,2024-06-04T13:15:52.177000 CVE-2024-33562,0,0,27fac541d1d64e11476c3268a849af55b6413283c20341e42235e842aff36652,2024-04-29T12:42:03.667000 CVE-2024-33566,0,0,46d17e7fcf76ea9cc29b76ef68ee9038fd04b7d980a772b2f399515ebb8e8216,2024-04-29T12:42:03.667000 CVE-2024-33567,0,0,dbf0f06551a8f63fcd89d5d4c2980276f319d41b21ef5e34182332a6cf0b6381,2024-05-17T18:36:05.263000 @@ -250976,7 +250991,7 @@ CVE-2024-35809,0,0,a20abd752ca7263fa57e17381fdf662c622b2b6d7c563548527c7d46a06a4 CVE-2024-3581,0,0,a1d8e06f506128ffd15dfdbfe16c45cbeda8736a3df4c463fa4b80646e4712e7,2024-05-02T18:00:37.360000 CVE-2024-35810,0,0,be2abeea367f182a6b1ad511a953cc5bc3876003e09c08bacbcea430ee5fe141,2024-05-17T18:35:35.070000 CVE-2024-35811,0,0,27b4a06cce495c0252bdb484475751deb9bef827ca7f31a4d89a8659cbc66076,2024-05-17T18:35:35.070000 -CVE-2024-35812,0,0,f13f173d6de0c30473a98a382eed04b265d2b463e58ba0ce3e6936a82c1dce11,2024-05-17T18:35:35.070000 +CVE-2024-35812,0,1,7d0d1a60f242229a3825673001282d0446ce7ae166b119c0e506a39221a4e148,2024-06-04T13:15:52.390000 CVE-2024-35813,0,0,7f0801adafe019d639700d85a9fa220ec1f0b3c66e04320a29bcb7624d670e5a,2024-05-17T18:35:35.070000 CVE-2024-35814,0,0,18619d6cf722935daa54c4a2017ed9cd3b4228dac5f23c34be01df98692cef75,2024-05-17T18:35:35.070000 CVE-2024-35815,0,0,1d00d6fdf4115b14510d7465a283171c0668b0395473dd9063745f95bf83afd8,2024-05-17T18:35:35.070000 @@ -251113,7 +251128,7 @@ CVE-2024-35938,0,0,0a97241552b0a2279900378439f264fc85d4dadf028946adfbf927738a4e8 CVE-2024-35939,0,0,20c3dbeef818d9aa28443d6cf86dac7a5d6a50e673e76146dc31fd6948dfac55,2024-05-20T13:00:04.957000 CVE-2024-3594,0,0,209dc6f01ccd5e1ecec06375c2725f4b71324d4b1d9a6775144228e87cb1819d,2024-05-24T01:15:30.977000 CVE-2024-35940,0,0,ff44bf313ea93cfd1f39b3e086ab02419b832b3abdb6b56cf686dfe8c2dd1d2b,2024-05-20T13:00:04.957000 -CVE-2024-35941,0,0,797c49d7896742bdeec32c59cc1111415415a7dcb18ab809dc56475f10c88702,2024-05-20T13:00:04.957000 +CVE-2024-35941,0,1,cdd45b79cac38121859bfcfe5c975cf81ee19a43fc4a3c73b0bb3e31cf6dffb4,2024-06-04T13:15:52.613000 CVE-2024-35942,0,0,9db86445e57f0ae9bd7c5c221f0b1ea58d46a866af07a30b8b6df3d6360c4681,2024-05-20T13:00:04.957000 CVE-2024-35943,0,0,6d5a179a77a7d5fbfc1a09ae3c18a0804de9a0f865d9e440ccce732b214ab68b,2024-05-20T13:00:04.957000 CVE-2024-35944,0,0,03e78dc0d2dba5cd5703c6b70b572bff837a7d117c07064ba4587d2453d9da68,2024-05-20T13:00:04.957000 @@ -251343,6 +251358,8 @@ CVE-2024-3678,0,0,d720397e0ff5aed34935621b66252dd502ae3dd7e987e20f2aefa29510c090 CVE-2024-36782,0,0,b125b3a72d1ca291a6285f37e0bf5c6002ab42e2c44720275654f49004fa59e7,2024-06-03T21:15:08.453000 CVE-2024-36783,0,0,9429685fad0c5f6ef563b0834ac6de6fd1a76a909464a9f869ec3bc63d22200e,2024-06-03T20:15:09.370000 CVE-2024-3680,0,0,b1ed78ba2c31e060c65591b1b4aa0e0cdd627bc790583f352919e473d1394bc8,2024-05-14T16:11:39.510000 +CVE-2024-36800,1,1,0ef8068eb66e203a29f33ae72b6609698d839354f5120eaa85406c000d7fda7f,2024-06-04T13:15:52.740000 +CVE-2024-36801,1,1,bde29bd91f0ea2b17756cf39c0023fc8cf0d38db1955cca314b84697fedaf84f,2024-06-04T13:15:52.857000 CVE-2024-3681,0,0,4cc6e1e77320458af0f4beee59a38c9a663fe20b962b28f234c099bc7c23ab32,2024-05-02T18:00:37.360000 CVE-2024-3682,0,0,a140f5eb71acf183c1e80e0d2f5a14a5c7d8a92c7cf9dd3ea5250a20e3cb490f,2024-04-26T12:58:17.720000 CVE-2024-3684,0,0,e7edf7d6bce31b480b46d692afd4304c988268ba4618e87da8566dc118f2be92,2024-04-19T16:19:49.043000 @@ -251455,7 +251472,21 @@ CVE-2024-37031,0,0,967b2a62510a1f35de5969f18efe9a7e1918d9bc4c74d0011148e6a904de3 CVE-2024-37032,0,0,2685d1c2a61b0baf7e7faa92d5cf7d5d7556f92ff89a923043de9b45c0417821,2024-05-31T13:01:46.727000 CVE-2024-3704,0,0,ad7f205e31bc442943bbd584692b194a3485d815654eeb83e4eefef6a6eff393,2024-04-15T13:15:51.577000 CVE-2024-3705,0,0,44f1c76d2f6cd8dab882ddfdbdbe908a4e3a8f22d6a90f31f0279b7faf87a669,2024-04-15T13:15:51.577000 +CVE-2024-37052,1,1,3f5dbb8279abb63e329080724732187fc9f99ad501f149512a1c7e8e700a5b5f,2024-06-04T12:15:10.413000 +CVE-2024-37053,1,1,06b14decaca586b1a1f96c116b9f8676964806f8e8a9c20ec7e3dbfd0fec766c,2024-06-04T12:15:10.957000 +CVE-2024-37054,1,1,57448177ce71e9f56b05c697cb4673d16b29d6e153f2c2e962ca0027372bb9b4,2024-06-04T12:15:11.190000 +CVE-2024-37055,1,1,8c0eb9eff684d7865d587e04b6bdc7d688269b03387be1a776c35a49dde5e71a,2024-06-04T12:15:11.397000 +CVE-2024-37056,1,1,9287ec26e966b7115e7aaf90bacd0db24c904322d02e7e19db805676003ae906,2024-06-04T12:15:11.593000 +CVE-2024-37057,1,1,be37f1a17287222d62db0a9c6e595917b58461a2c6e9f49801079ad506331f26,2024-06-04T12:15:11.800000 +CVE-2024-37058,1,1,9d697419d978d0964970869c524cfc70dad406c081a5667b762d19e7e5310d7b,2024-06-04T12:15:12.023000 +CVE-2024-37059,1,1,03b47b4ebe2e5e1032a2f0b2a9d620d3b5632604a674dce4406017b56267f0d7,2024-06-04T12:15:12.227000 CVE-2024-3706,0,0,93b27543775cdce8e7b256b8d014ea258e7a61f0ddb1cca03581da1a85330700,2024-04-15T13:15:51.577000 +CVE-2024-37060,1,1,661eba28447dfad4d9ccc377c33f78f29646d134c2785f7c0a91f9ea3edcd552,2024-06-04T12:15:12.463000 +CVE-2024-37061,1,1,9e56eb047fd6a9bfdb96b5456491054b4b30d574a06065e25ab99d482d4d1aef,2024-06-04T12:15:12.703000 +CVE-2024-37062,1,1,af2a31045e6a2bb6b86be7ee8f84bff534ad3fe7ba658b72c1e279e59df9bbbc,2024-06-04T12:15:12.907000 +CVE-2024-37063,1,1,c36321c284258a858f2e761d8bc93fd058f2479d01ee0d17d4414dc878be5b32,2024-06-04T12:15:13.110000 +CVE-2024-37064,1,1,c1846da256912416f57b22cac34f81d6cba7e772bf4878b3b976ec712e871da4,2024-06-04T12:15:13.313000 +CVE-2024-37065,1,1,d0e09f8ff65ce62f3f9761336170e1df68ac6860fc59f9faeca2497dcfedce51,2024-06-04T12:15:13.507000 CVE-2024-3707,0,0,cb892298714e8d1628bf09ece0bc00ef0a1a1429034ce83bb3286f4d822c160d,2024-04-15T13:15:51.577000 CVE-2024-3708,0,0,09132fb1644ebf0c808002aa8ac15b19f13ae71d0beb378f7a9664a5ae685f9a,2024-05-24T01:15:30.977000 CVE-2024-3711,0,0,00ee502ae0ae8bdc802cd38eb1ec1e1356c10e1c18d766a4effd20297a066f55,2024-05-24T01:15:30.977000 @@ -251834,6 +251865,7 @@ CVE-2024-4250,0,0,b54487ffa8dc260b8a713e1b78312dec0b498701946f695ae48ef053246603 CVE-2024-4251,0,0,704c5045f34e20b238053203ffa6ddaa27c0f1f93911f12090c1ee9114f5097d,2024-05-17T02:40:20.940000 CVE-2024-4252,0,0,3896f5ee238bad3d7e0a938dc110cad0a34521ba589448d2dc895a14fc511275,2024-05-17T02:40:21.053000 CVE-2024-4253,0,0,de2ab3010fb03c983c55ebf995f5dbb83eb08b82e01721b3c66a29011336f26b,2024-06-04T08:15:10.863000 +CVE-2024-4254,1,1,06ffe91e2ddfc00c3065cea3e4124d1316c753ab6132ef0f7c3b9e309588ba4c,2024-06-04T12:15:13.710000 CVE-2024-4255,0,0,fe667b23218914fa44fee4b4c2a7be125396fae9094659c59aa2ca90b0b1e450,2024-05-17T02:40:21.147000 CVE-2024-4256,0,0,f01b9b3012ce7ea24c9894def6f3f1cef49ac09bb4f57d3ed8f552e5b1070b71,2024-05-17T02:40:21.240000 CVE-2024-4257,0,0,0f6d2313bd719b89d901deefe2dc2f87463055c189b3c018795a055e61e9ea45,2024-05-17T02:40:21.330000 @@ -252097,7 +252129,7 @@ CVE-2024-4631,0,0,e8ed3d07eca49fd9ce5a62406bcf23da9793cbcc792a956665a267b4f25fd6 CVE-2024-4634,0,0,26305cc83de7193b57243a5cab6ca5caf74694a0d7bbca15218a554118aa8eb8,2024-05-16T13:03:05.353000 CVE-2024-4635,0,0,39b2c6bf6977107b11329776563f920ebcfe13f250d063c0984d8282a28a8353,2024-05-16T13:03:05.353000 CVE-2024-4636,0,0,408131d6e6f7a1de019141a0a08ced7ddc9316cec6084c2dbfd44b2d5b664bc5,2024-05-15T16:40:19.330000 -CVE-2024-4637,1,1,a605a04484b96e3a6a910efe0a6e265dcf432bd7a6e2f2cd212d05a85cc08f14,2024-06-04T10:15:12.503000 +CVE-2024-4637,0,0,a605a04484b96e3a6a910efe0a6e265dcf432bd7a6e2f2cd212d05a85cc08f14,2024-06-04T10:15:12.503000 CVE-2024-4642,0,0,af413e9c39a7a95f4fad15629993388538023a0a54f7d3f1141388f9a4b404f9,2024-05-20T17:15:09.667000 CVE-2024-4644,0,0,b69c44e7031d29361edbff8c9258531bdbfd599edff21b6fb592b731a3a8f1d3,2024-05-17T02:40:30.603000 CVE-2024-4645,0,0,029fc657c20e99e63c4a0896df7eaed00c7e95079c841983238fcd27dbc9082f,2024-05-29T20:15:13.240000 @@ -252544,7 +252576,7 @@ CVE-2024-5433,0,0,d0946774ada383b4af0e78f23b9c449d05f83a7124810af4e383f90b0cdbda CVE-2024-5434,0,0,dc2716eb218edba725ac85c17a2930de7a00b6563d0ca53040574106ea0b92ed,2024-05-29T13:02:09.280000 CVE-2024-5436,0,0,95eba267f429de080e9b35fcd14e1e1840b0308e404c32773ec35c18106c7cbc,2024-05-31T13:01:46.727000 CVE-2024-5437,0,0,557d2d92d351d0b9c718cc97d7a9d4fae40afc0a93c4cab84fee8196b51766e4,2024-05-29T13:02:09.280000 -CVE-2024-5463,1,1,fe017f987e6e38031b776f174b46d000a6764b4fc1c9858754e10d32745d4ce1,2024-06-04T10:15:12.747000 +CVE-2024-5463,0,0,fe017f987e6e38031b776f174b46d000a6764b4fc1c9858754e10d32745d4ce1,2024-06-04T10:15:12.747000 CVE-2024-5484,0,0,7de35f8eee9232651ed147ec3168f6740617b1737ec3ff6913988b98b84f6ef1,2024-05-31T11:15:09.783000 CVE-2024-5485,0,0,cd934d054521f90c46895e6b8fbe14d28fa1f85abdd6db3cb4bf3a673d266bae,2024-06-04T07:15:47.700000 CVE-2024-5493,0,0,8180f9c7c83a7ebab82ac7c00536ed64f553bc96cb8ba2cddb06ad7e2d969883,2024-05-31T13:01:46.727000