diff --git a/CVE-2023/CVE-2023-254xx/CVE-2023-25457.json b/CVE-2023/CVE-2023-254xx/CVE-2023-25457.json new file mode 100644 index 00000000000..57f2e8f1630 --- /dev/null +++ b/CVE-2023/CVE-2023-254xx/CVE-2023-25457.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2023-25457", + "sourceIdentifier": "audit@patchstack.com", + "published": "2024-05-03T08:15:06.603", + "lastModified": "2024-05-03T08:15:06.603", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Missing Authorization vulnerability in Richteam Slider Carousel \u2013 Responsive Image Slider.This issue affects Slider Carousel \u2013 Responsive Image Slider: from n/a through 1.5.1.\n\n" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "LOW", + "baseScore": 5.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/vulnerability/slider-images/wordpress-slider-carousel-responsive-image-slider-plugin-1-5-0-broken-access-control-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-312xx/CVE-2023-31211.json b/CVE-2023/CVE-2023-312xx/CVE-2023-31211.json index 0cc9b3e41e2..0817f49542e 100644 --- a/CVE-2023/CVE-2023-312xx/CVE-2023-31211.json +++ b/CVE-2023/CVE-2023-312xx/CVE-2023-31211.json @@ -2,8 +2,8 @@ "id": "CVE-2023-31211", "sourceIdentifier": "security@checkmk.com", "published": "2024-01-12T08:15:43.137", - "lastModified": "2024-01-19T02:09:26.650", - "vulnStatus": "Analyzed", + "lastModified": "2024-05-03T09:15:07.230", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -41,20 +41,20 @@ "type": "Secondary", "cvssData": { "version": "3.1", - "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H", - "attackVector": "LOCAL", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "LOW", "userInteraction": "NONE", - "scope": "CHANGED", + "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH" }, - "exploitabilityScore": 2.0, - "impactScore": 6.0 + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ] }, diff --git a/CVE-2023/CVE-2023-357xx/CVE-2023-35701.json b/CVE-2023/CVE-2023-357xx/CVE-2023-35701.json new file mode 100644 index 00000000000..0e231f67662 --- /dev/null +++ b/CVE-2023/CVE-2023-357xx/CVE-2023-35701.json @@ -0,0 +1,32 @@ +{ + "id": "CVE-2023-35701", + "sourceIdentifier": "security@apache.org", + "published": "2024-05-03T09:15:07.587", + "lastModified": "2024-05-03T09:15:07.587", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Improper Control of Generation of Code ('Code Injection') vulnerability in Apache Hive.\n\nThe vulnerability affects the Hive JDBC driver component and it can potentially lead to arbitrary code execution on the machine/endpoint that the JDBC driver (client) is running. The malicious user must have sufficient permissions to specify/edit JDBC URL(s) in an endpoint relying on the Hive JDBC driver and the JDBC client process must run under a privileged user to fully exploit the vulnerability.\u00a0\n\nThe attacker can setup a malicious HTTP server and specify a JDBC URL pointing towards this server. When a JDBC connection is attempted, the malicious HTTP server can provide a special response with customized payload that can trigger the execution of certain commands in the JDBC client.This issue affects Apache Hive: from 4.0.0-alpha-1 before 4.0.0.\n\nUsers are recommended to upgrade to version 4.0.0, which fixes the issue.\n\n" + } + ], + "metrics": {}, + "weaknesses": [ + { + "source": "security@apache.org", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-94" + } + ] + } + ], + "references": [ + { + "url": "https://lists.apache.org/thread/7zcv6l63spl4r66xwz5jv9rtrg2opx81", + "source": "security@apache.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-444xx/CVE-2023-44472.json b/CVE-2023/CVE-2023-444xx/CVE-2023-44472.json new file mode 100644 index 00000000000..e073790426a --- /dev/null +++ b/CVE-2023/CVE-2023-444xx/CVE-2023-44472.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2023-44472", + "sourceIdentifier": "audit@patchstack.com", + "published": "2024-05-03T08:15:06.850", + "lastModified": "2024-05-03T08:15:06.850", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Missing Authorization vulnerability in ThemeFuse Unyson.This issue affects Unyson: from n/a through 2.7.28.\n\n" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 4.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/vulnerability/unyson/wordpress-unyson-plugin-2-7-28-broken-access-control-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-239xx/CVE-2024-23912.json b/CVE-2024/CVE-2024-239xx/CVE-2024-23912.json new file mode 100644 index 00000000000..b7f5886c1c1 --- /dev/null +++ b/CVE-2024/CVE-2024-239xx/CVE-2024-23912.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2024-23912", + "sourceIdentifier": "prodsec@nozominetworks.com", + "published": "2024-05-03T09:15:07.737", + "lastModified": "2024-05-03T09:15:07.737", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Out-of-bounds Read vulnerability in Merge DICOM Toolkit C/C++ on Windows.\n\nWhen MC_Open_File() function is used to read a malformed DICOM data, it might result in over-reading memory buffer and could cause memory access violation." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "prodsec@nozominetworks.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "LOW", + "baseScore": 4.0, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.5, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "prodsec@nozominetworks.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-125" + } + ] + } + ], + "references": [ + { + "url": "https://www.nozominetworks.com/labs/vulnerability-advisories-cve-2024-23912", + "source": "prodsec@nozominetworks.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-239xx/CVE-2024-23913.json b/CVE-2024/CVE-2024-239xx/CVE-2024-23913.json new file mode 100644 index 00000000000..eef81dbf8f9 --- /dev/null +++ b/CVE-2024/CVE-2024-239xx/CVE-2024-23913.json @@ -0,0 +1,43 @@ +{ + "id": "CVE-2024-23913", + "sourceIdentifier": "prodsec@nozominetworks.com", + "published": "2024-05-03T09:15:07.920", + "lastModified": "2024-05-03T09:15:07.920", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Use of Out-of-range Pointer Offset vulnerability in Merge DICOM Toolkit C/C++ on Windows.\n\nWhen deprecated MC_XML_To_Message() function is used to read a malformed DICOM XML file, it might result in memory access violation." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "prodsec@nozominetworks.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "LOW", + "baseScore": 4.0, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.5, + "impactScore": 1.4 + } + ] + }, + "references": [ + { + "url": "https://www.nozominetworks.com/labs/vulnerability-advisories-cve-2024-23913", + "source": "prodsec@nozominetworks.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-239xx/CVE-2024-23914.json b/CVE-2024/CVE-2024-239xx/CVE-2024-23914.json new file mode 100644 index 00000000000..13090337bb3 --- /dev/null +++ b/CVE-2024/CVE-2024-239xx/CVE-2024-23914.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2024-23914", + "sourceIdentifier": "prodsec@nozominetworks.com", + "published": "2024-05-03T09:15:08.090", + "lastModified": "2024-05-03T09:15:08.090", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Use of Externally-Controlled Format String vulnerability in Merge DICOM Toolkit C/C++ on Windows.\n\nWhen MC_Open_Association() function is used to open DICOM Association and gets DICOM Application Context Name with illegal characters, it might result in an unhandled exception." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "prodsec@nozominetworks.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 5.7, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.1, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "prodsec@nozominetworks.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-134" + } + ] + } + ], + "references": [ + { + "url": "https://www.nozominetworks.com/labs/vulnerability-advisories-cve-2024-23914", + "source": "prodsec@nozominetworks.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-247xx/CVE-2024-24710.json b/CVE-2024/CVE-2024-247xx/CVE-2024-24710.json new file mode 100644 index 00000000000..9b2ec0b23bc --- /dev/null +++ b/CVE-2024/CVE-2024-247xx/CVE-2024-24710.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2024-24710", + "sourceIdentifier": "audit@patchstack.com", + "published": "2024-05-03T08:15:07.033", + "lastModified": "2024-05-03T08:15:07.033", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Missing Authorization vulnerability in SlickRemix Feed Them Social.This issue affects Feed Them Social: from n/a through 4.2.0.\n\n" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 4.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/vulnerability/feed-them-social/wordpress-feed-them-social-plugin-4-2-0-broken-access-control-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-280xx/CVE-2024-28072.json b/CVE-2024/CVE-2024-280xx/CVE-2024-28072.json new file mode 100644 index 00000000000..5991378abcd --- /dev/null +++ b/CVE-2024/CVE-2024-280xx/CVE-2024-28072.json @@ -0,0 +1,59 @@ +{ + "id": "CVE-2024-28072", + "sourceIdentifier": "psirt@solarwinds.com", + "published": "2024-05-03T08:15:07.217", + "lastModified": "2024-05-03T08:15:07.217", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "A highly privileged account can overwrite arbitrary files on the system with log output. The log file path tags were not sanitized properly. \n\n\n\n\n\n\n" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@solarwinds.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:H/UI:N/S:U/C:L/I:H/A:L", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "HIGH", + "availabilityImpact": "LOW", + "baseScore": 5.7, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 0.9, + "impactScore": 4.7 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@solarwinds.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-532" + } + ] + } + ], + "references": [ + { + "url": "https://solarwindscore.my.site.com/SuccessCenter/s/article/Serv-U-15-4-2-Hotfix-1-Release-Notes?language=en_US", + "source": "psirt@solarwinds.com" + }, + { + "url": "https://www.solarwinds.com/trust-center/security-advisories/CVE-2024-28072", + "source": "psirt@solarwinds.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-328xx/CVE-2024-32810.json b/CVE-2024/CVE-2024-328xx/CVE-2024-32810.json new file mode 100644 index 00000000000..3183d229047 --- /dev/null +++ b/CVE-2024/CVE-2024-328xx/CVE-2024-32810.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2024-32810", + "sourceIdentifier": "audit@patchstack.com", + "published": "2024-05-03T08:15:07.430", + "lastModified": "2024-05-03T08:15:07.430", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Missing Authorization vulnerability in ShortPixel ShortPixel Critical CSS.This issue affects ShortPixel Critical CSS: from n/a through 1.0.2.\n\n" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "HIGH", + "availabilityImpact": "LOW", + "baseScore": 7.6, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 4.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/vulnerability/shortpixel-critical-css/wordpress-shortpixel-critical-css-plugin-1-0-2-broken-access-control-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-328xx/CVE-2024-32831.json b/CVE-2024/CVE-2024-328xx/CVE-2024-32831.json new file mode 100644 index 00000000000..2c3052bd924 --- /dev/null +++ b/CVE-2024/CVE-2024-328xx/CVE-2024-32831.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2024-32831", + "sourceIdentifier": "audit@patchstack.com", + "published": "2024-05-03T08:15:07.713", + "lastModified": "2024-05-03T08:15:07.713", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Lorna Timbah (webgrrrl) Accessibility Widget allows Stored XSS.This issue affects Accessibility Widget: from n/a through 2.2.\n\n" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 6.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.3, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/vulnerability/accessibility-widget/wordpress-accessibility-widget-plugin-2-2-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-339xx/CVE-2024-33914.json b/CVE-2024/CVE-2024-339xx/CVE-2024-33914.json new file mode 100644 index 00000000000..30bcea6e99e --- /dev/null +++ b/CVE-2024/CVE-2024-339xx/CVE-2024-33914.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2024-33914", + "sourceIdentifier": "audit@patchstack.com", + "published": "2024-05-03T09:15:08.257", + "lastModified": "2024-05-03T09:15:08.257", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Missing Authorization vulnerability in Exclusive Addons Exclusive Addons Elementor.This issue affects Exclusive Addons Elementor: from n/a through 2.6.9.1.\n\n" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 4.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/vulnerability/exclusive-addons-for-elementor/wordpress-exclusive-addons-for-elementor-plugin-2-6-9-1-broken-access-control-on-post-duplication-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-339xx/CVE-2024-33915.json b/CVE-2024/CVE-2024-339xx/CVE-2024-33915.json new file mode 100644 index 00000000000..8a2239f648e --- /dev/null +++ b/CVE-2024/CVE-2024-339xx/CVE-2024-33915.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2024-33915", + "sourceIdentifier": "audit@patchstack.com", + "published": "2024-05-03T09:15:08.443", + "lastModified": "2024-05-03T09:15:08.443", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Missing Authorization vulnerability in Bowo Debug Log Manager.This issue affects Debug Log Manager: from n/a through 2.3.1.\n\n" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 4.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/vulnerability/debug-log-manager/wordpress-debug-log-manager-plugin-2-3-1-broken-access-control-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-339xx/CVE-2024-33916.json b/CVE-2024/CVE-2024-339xx/CVE-2024-33916.json new file mode 100644 index 00000000000..0a1ae09a60d --- /dev/null +++ b/CVE-2024/CVE-2024-339xx/CVE-2024-33916.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2024-33916", + "sourceIdentifier": "audit@patchstack.com", + "published": "2024-05-03T08:15:07.930", + "lastModified": "2024-05-03T08:15:07.930", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in MachoThemes CPO Companion allows Stored XSS.This issue affects CPO Companion: from n/a through 1.1.0.\n\n" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 6.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.3, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/vulnerability/cpo-companion/wordpress-cpo-companion-plugin-1-1-0-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-339xx/CVE-2024-33918.json b/CVE-2024/CVE-2024-339xx/CVE-2024-33918.json new file mode 100644 index 00000000000..d2ed877a3c8 --- /dev/null +++ b/CVE-2024/CVE-2024-339xx/CVE-2024-33918.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2024-33918", + "sourceIdentifier": "audit@patchstack.com", + "published": "2024-05-03T08:15:08.113", + "lastModified": "2024-05-03T08:15:08.113", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Maxim K AJAX Login and Registration modal popup + inline form allows Stored XSS.This issue affects AJAX Login and Registration modal popup + inline form: from n/a through 2.23.\n\n" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 5.9, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.7, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/vulnerability/ajax-login-and-registration-modal-popup/wordpress-ajax-login-and-registration-modal-popup-inline-form-plugin-2-23-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-339xx/CVE-2024-33919.json b/CVE-2024/CVE-2024-339xx/CVE-2024-33919.json new file mode 100644 index 00000000000..c2401ed5d68 --- /dev/null +++ b/CVE-2024/CVE-2024-339xx/CVE-2024-33919.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2024-33919", + "sourceIdentifier": "audit@patchstack.com", + "published": "2024-05-03T09:15:08.633", + "lastModified": "2024-05-03T09:15:08.633", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Missing Authorization vulnerability in Rometheme RomethemeKit For Elementor.This issue affects RomethemeKit For Elementor: from n/a through 1.4.1.\n\n" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 6.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 3.9, + "impactScore": 2.5 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/vulnerability/rometheme-for-elementor/wordpress-romethemekit-for-elementor-plugin-1-4-1-broken-access-control-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-339xx/CVE-2024-33920.json b/CVE-2024/CVE-2024-339xx/CVE-2024-33920.json new file mode 100644 index 00000000000..3419639f868 --- /dev/null +++ b/CVE-2024/CVE-2024-339xx/CVE-2024-33920.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2024-33920", + "sourceIdentifier": "audit@patchstack.com", + "published": "2024-05-03T09:15:08.827", + "lastModified": "2024-05-03T09:15:08.827", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Missing Authorization vulnerability in Kama Democracy Poll.This issue affects Democracy Poll: from n/a through 6.0.3.\n\n" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/vulnerability/democracy-poll/wordpress-democracy-poll-plugin-6-0-3-broken-access-control-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-339xx/CVE-2024-33921.json b/CVE-2024/CVE-2024-339xx/CVE-2024-33921.json new file mode 100644 index 00000000000..f6ab088976b --- /dev/null +++ b/CVE-2024/CVE-2024-339xx/CVE-2024-33921.json @@ -0,0 +1,43 @@ +{ + "id": "CVE-2024-33921", + "sourceIdentifier": "audit@patchstack.com", + "published": "2024-05-03T09:15:09.020", + "lastModified": "2024-05-03T09:15:09.020", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Broken Access Control vulnerability in ReviewX.This issue affects ReviewX: from n/a through 1.6.21.\n\n" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 4.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ] + }, + "references": [ + { + "url": "https://patchstack.com/database/vulnerability/reviewx/wordpress-reviewx-plugin-1-6-21-broken-access-control-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-339xx/CVE-2024-33923.json b/CVE-2024/CVE-2024-339xx/CVE-2024-33923.json new file mode 100644 index 00000000000..f574013460f --- /dev/null +++ b/CVE-2024/CVE-2024-339xx/CVE-2024-33923.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2024-33923", + "sourceIdentifier": "audit@patchstack.com", + "published": "2024-05-03T09:15:09.183", + "lastModified": "2024-05-03T09:15:09.183", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Missing Authorization vulnerability in Smartypants SP Project & Document Manager.This issue affects SP Project & Document Manager : from n/a through 4.69.\n\n" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 6.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.4 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/vulnerability/sp-client-document-manager/wordpress-sp-project-document-manager-plugin-4-69-broken-access-control-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-339xx/CVE-2024-33924.json b/CVE-2024/CVE-2024-339xx/CVE-2024-33924.json new file mode 100644 index 00000000000..9cdd30a9dee --- /dev/null +++ b/CVE-2024/CVE-2024-339xx/CVE-2024-33924.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2024-33924", + "sourceIdentifier": "audit@patchstack.com", + "published": "2024-05-03T08:15:08.303", + "lastModified": "2024-05-03T08:15:08.303", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Realtyna Realtyna Organic IDX plugin allows Reflected XSS.This issue affects Realtyna Organic IDX plugin: from n/a through 4.14.4.\n\n" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 7.1, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/vulnerability/real-estate-listing-realtyna-wpl/wordpress-realtyna-organic-idx-plugin-wpl-real-estate-plugin-4-14-4-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-339xx/CVE-2024-33925.json b/CVE-2024/CVE-2024-339xx/CVE-2024-33925.json new file mode 100644 index 00000000000..4457092cb5a --- /dev/null +++ b/CVE-2024/CVE-2024-339xx/CVE-2024-33925.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2024-33925", + "sourceIdentifier": "audit@patchstack.com", + "published": "2024-05-03T09:15:09.387", + "lastModified": "2024-05-03T09:15:09.387", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Missing Authorization vulnerability in Adrian M\u00f6rchen Embed Google Fonts.This issue affects Embed Google Fonts: from n/a through 3.1.0.\n\n" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 4.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/vulnerability/embed-google-fonts/wordpress-embed-google-fonts-plugin-3-1-0-broken-access-control-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-339xx/CVE-2024-33926.json b/CVE-2024/CVE-2024-339xx/CVE-2024-33926.json new file mode 100644 index 00000000000..2553bdecf29 --- /dev/null +++ b/CVE-2024/CVE-2024-339xx/CVE-2024-33926.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2024-33926", + "sourceIdentifier": "audit@patchstack.com", + "published": "2024-05-03T08:15:08.490", + "lastModified": "2024-05-03T08:15:08.490", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Karl Kiesinger GWP-Histats allows Stored XSS.This issue affects GWP-Histats: from n/a through 1.0.\n\n" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 6.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.3, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/vulnerability/gwp-histats/wordpress-gwp-histats-plugin-1-0-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-339xx/CVE-2024-33927.json b/CVE-2024/CVE-2024-339xx/CVE-2024-33927.json new file mode 100644 index 00000000000..ca5615004fd --- /dev/null +++ b/CVE-2024/CVE-2024-339xx/CVE-2024-33927.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2024-33927", + "sourceIdentifier": "audit@patchstack.com", + "published": "2024-05-03T08:15:08.673", + "lastModified": "2024-05-03T08:15:08.673", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Team GIPHY Giphypress allows Stored XSS.This issue affects Giphypress: from n/a through 1.6.2.\n\n" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 6.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.3, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/vulnerability/giphypress/wordpress-giphypress-plugin-1-6-2-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-339xx/CVE-2024-33929.json b/CVE-2024/CVE-2024-339xx/CVE-2024-33929.json new file mode 100644 index 00000000000..f6ef941410d --- /dev/null +++ b/CVE-2024/CVE-2024-339xx/CVE-2024-33929.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2024-33929", + "sourceIdentifier": "audit@patchstack.com", + "published": "2024-05-03T09:15:09.580", + "lastModified": "2024-05-03T09:15:09.580", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Missing Authorization vulnerability in wpWax Directorist.This issue affects Directorist: from n/a through 7.8.6.\n\n" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/vulnerability/directorist/wordpress-directorist-plugin-7-8-6-broken-access-control-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-339xx/CVE-2024-33931.json b/CVE-2024/CVE-2024-339xx/CVE-2024-33931.json new file mode 100644 index 00000000000..5e609e3e893 --- /dev/null +++ b/CVE-2024/CVE-2024-339xx/CVE-2024-33931.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2024-33931", + "sourceIdentifier": "audit@patchstack.com", + "published": "2024-05-03T09:15:09.763", + "lastModified": "2024-05-03T09:15:09.763", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Missing Authorization vulnerability in ilGhera JW Player for WordPress.This issue affects JW Player for WordPress: from n/a through 2.3.3.\n\n" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 6.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 3.9, + "impactScore": 2.5 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/vulnerability/jw-player-7-for-wp/wordpress-jw-player-for-wordpress-plugin-2-3-3-broken-access-control-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-339xx/CVE-2024-33937.json b/CVE-2024/CVE-2024-339xx/CVE-2024-33937.json new file mode 100644 index 00000000000..75485c7740e --- /dev/null +++ b/CVE-2024/CVE-2024-339xx/CVE-2024-33937.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2024-33937", + "sourceIdentifier": "audit@patchstack.com", + "published": "2024-05-03T09:15:09.950", + "lastModified": "2024-05-03T09:15:09.950", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Missing Authorization vulnerability in Nico Martin Progressive WordPress (PWA).This issue affects Progressive WordPress (PWA): from n/a through 2.1.13.\n\n" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 4.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/vulnerability/progressive-wp/wordpress-progressive-wordpress-pwa-plugin-2-1-13-broken-access-control-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-339xx/CVE-2024-33941.json b/CVE-2024/CVE-2024-339xx/CVE-2024-33941.json new file mode 100644 index 00000000000..e46d63dd8f7 --- /dev/null +++ b/CVE-2024/CVE-2024-339xx/CVE-2024-33941.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2024-33941", + "sourceIdentifier": "audit@patchstack.com", + "published": "2024-05-03T08:15:08.863", + "lastModified": "2024-05-03T08:15:08.863", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Missing Authorization vulnerability in Avirtum iPanorama 360 WordPress Virtual Tour Builder.This issue affects iPanorama 360 WordPress Virtual Tour Builder: from n/a through 1.8.1.\n\n" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 5.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/vulnerability/ipanorama-360-virtual-tour-builder-lite/wordpress-ipanorama-360-plugin-1-8-1-broken-access-control-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/README.md b/README.md index b49c00ac3c5..b6d033cca5f 100644 --- a/README.md +++ b/README.md @@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2024-05-03T08:00:38.282086+00:00 +2024-05-03T10:00:38.143835+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2024-05-03T07:15:40.610000+00:00 +2024-05-03T09:15:09.950000+00:00 ``` ### Last Data Feed Release @@ -33,55 +33,45 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### Total Number of included CVEs ```plain -248471 +248497 ``` ### CVEs added in the last Commit -Recently added CVEs: `15` +Recently added CVEs: `26` -- [CVE-2024-33928](CVE-2024/CVE-2024-339xx/CVE-2024-33928.json) (`2024-05-03T07:15:38.507`) -- [CVE-2024-33932](CVE-2024/CVE-2024-339xx/CVE-2024-33932.json) (`2024-05-03T07:15:38.870`) -- [CVE-2024-33934](CVE-2024/CVE-2024-339xx/CVE-2024-33934.json) (`2024-05-03T07:15:39.073`) -- [CVE-2024-33935](CVE-2024/CVE-2024-339xx/CVE-2024-33935.json) (`2024-05-03T07:15:39.283`) -- [CVE-2024-33936](CVE-2024/CVE-2024-339xx/CVE-2024-33936.json) (`2024-05-03T07:15:39.510`) -- [CVE-2024-33940](CVE-2024/CVE-2024-339xx/CVE-2024-33940.json) (`2024-05-03T07:15:39.737`) -- [CVE-2024-33943](CVE-2024/CVE-2024-339xx/CVE-2024-33943.json) (`2024-05-03T07:15:39.960`) -- [CVE-2024-33945](CVE-2024/CVE-2024-339xx/CVE-2024-33945.json) (`2024-05-03T07:15:40.183`) -- [CVE-2024-33946](CVE-2024/CVE-2024-339xx/CVE-2024-33946.json) (`2024-05-03T07:15:40.390`) -- [CVE-2024-33947](CVE-2024/CVE-2024-339xx/CVE-2024-33947.json) (`2024-05-03T07:15:40.610`) -- [CVE-2024-34408](CVE-2024/CVE-2024-344xx/CVE-2024-34408.json) (`2024-05-03T06:15:13.883`) -- [CVE-2024-3637](CVE-2024/CVE-2024-36xx/CVE-2024-3637.json) (`2024-05-03T06:15:14.367`) -- [CVE-2024-3692](CVE-2024/CVE-2024-36xx/CVE-2024-3692.json) (`2024-05-03T06:15:14.590`) -- [CVE-2024-3703](CVE-2024/CVE-2024-37xx/CVE-2024-3703.json) (`2024-05-03T06:15:14.800`) -- [CVE-2024-4439](CVE-2024/CVE-2024-44xx/CVE-2024-4439.json) (`2024-05-03T06:15:14.947`) +- [CVE-2023-35701](CVE-2023/CVE-2023-357xx/CVE-2023-35701.json) (`2024-05-03T09:15:07.587`) +- [CVE-2023-44472](CVE-2023/CVE-2023-444xx/CVE-2023-44472.json) (`2024-05-03T08:15:06.850`) +- [CVE-2024-23912](CVE-2024/CVE-2024-239xx/CVE-2024-23912.json) (`2024-05-03T09:15:07.737`) +- [CVE-2024-23913](CVE-2024/CVE-2024-239xx/CVE-2024-23913.json) (`2024-05-03T09:15:07.920`) +- [CVE-2024-23914](CVE-2024/CVE-2024-239xx/CVE-2024-23914.json) (`2024-05-03T09:15:08.090`) +- [CVE-2024-24710](CVE-2024/CVE-2024-247xx/CVE-2024-24710.json) (`2024-05-03T08:15:07.033`) +- [CVE-2024-28072](CVE-2024/CVE-2024-280xx/CVE-2024-28072.json) (`2024-05-03T08:15:07.217`) +- [CVE-2024-32810](CVE-2024/CVE-2024-328xx/CVE-2024-32810.json) (`2024-05-03T08:15:07.430`) +- [CVE-2024-32831](CVE-2024/CVE-2024-328xx/CVE-2024-32831.json) (`2024-05-03T08:15:07.713`) +- [CVE-2024-33914](CVE-2024/CVE-2024-339xx/CVE-2024-33914.json) (`2024-05-03T09:15:08.257`) +- [CVE-2024-33915](CVE-2024/CVE-2024-339xx/CVE-2024-33915.json) (`2024-05-03T09:15:08.443`) +- [CVE-2024-33916](CVE-2024/CVE-2024-339xx/CVE-2024-33916.json) (`2024-05-03T08:15:07.930`) +- [CVE-2024-33918](CVE-2024/CVE-2024-339xx/CVE-2024-33918.json) (`2024-05-03T08:15:08.113`) +- [CVE-2024-33919](CVE-2024/CVE-2024-339xx/CVE-2024-33919.json) (`2024-05-03T09:15:08.633`) +- [CVE-2024-33920](CVE-2024/CVE-2024-339xx/CVE-2024-33920.json) (`2024-05-03T09:15:08.827`) +- [CVE-2024-33921](CVE-2024/CVE-2024-339xx/CVE-2024-33921.json) (`2024-05-03T09:15:09.020`) +- [CVE-2024-33923](CVE-2024/CVE-2024-339xx/CVE-2024-33923.json) (`2024-05-03T09:15:09.183`) +- [CVE-2024-33924](CVE-2024/CVE-2024-339xx/CVE-2024-33924.json) (`2024-05-03T08:15:08.303`) +- [CVE-2024-33925](CVE-2024/CVE-2024-339xx/CVE-2024-33925.json) (`2024-05-03T09:15:09.387`) +- [CVE-2024-33926](CVE-2024/CVE-2024-339xx/CVE-2024-33926.json) (`2024-05-03T08:15:08.490`) +- [CVE-2024-33927](CVE-2024/CVE-2024-339xx/CVE-2024-33927.json) (`2024-05-03T08:15:08.673`) +- [CVE-2024-33929](CVE-2024/CVE-2024-339xx/CVE-2024-33929.json) (`2024-05-03T09:15:09.580`) +- [CVE-2024-33931](CVE-2024/CVE-2024-339xx/CVE-2024-33931.json) (`2024-05-03T09:15:09.763`) +- [CVE-2024-33937](CVE-2024/CVE-2024-339xx/CVE-2024-33937.json) (`2024-05-03T09:15:09.950`) +- [CVE-2024-33941](CVE-2024/CVE-2024-339xx/CVE-2024-33941.json) (`2024-05-03T08:15:08.863`) ### CVEs modified in the last Commit -Recently modified CVEs: `21` +Recently modified CVEs: `1` -- [CVE-2023-52614](CVE-2023/CVE-2023-526xx/CVE-2023-52614.json) (`2024-05-03T06:15:08.503`) -- [CVE-2024-26920](CVE-2024/CVE-2024-269xx/CVE-2024-26920.json) (`2024-05-03T06:15:09.207`) -- [CVE-2024-26922](CVE-2024/CVE-2024-269xx/CVE-2024-26922.json) (`2024-05-03T06:15:09.570`) -- [CVE-2024-26923](CVE-2024/CVE-2024-269xx/CVE-2024-26923.json) (`2024-05-03T06:15:10.053`) -- [CVE-2024-26924](CVE-2024/CVE-2024-269xx/CVE-2024-26924.json) (`2024-05-03T06:15:10.280`) -- [CVE-2024-26926](CVE-2024/CVE-2024-269xx/CVE-2024-26926.json) (`2024-05-03T06:15:10.483`) -- [CVE-2024-26981](CVE-2024/CVE-2024-269xx/CVE-2024-26981.json) (`2024-05-03T06:15:10.663`) -- [CVE-2024-26982](CVE-2024/CVE-2024-269xx/CVE-2024-26982.json) (`2024-05-03T06:15:10.953`) -- [CVE-2024-26984](CVE-2024/CVE-2024-269xx/CVE-2024-26984.json) (`2024-05-03T06:15:11.130`) -- [CVE-2024-26988](CVE-2024/CVE-2024-269xx/CVE-2024-26988.json) (`2024-05-03T06:15:11.337`) -- [CVE-2024-26993](CVE-2024/CVE-2024-269xx/CVE-2024-26993.json) (`2024-05-03T06:15:11.530`) -- [CVE-2024-26994](CVE-2024/CVE-2024-269xx/CVE-2024-26994.json) (`2024-05-03T06:15:11.740`) -- [CVE-2024-26997](CVE-2024/CVE-2024-269xx/CVE-2024-26997.json) (`2024-05-03T06:15:11.950`) -- [CVE-2024-26999](CVE-2024/CVE-2024-269xx/CVE-2024-26999.json) (`2024-05-03T06:15:12.137`) -- [CVE-2024-27000](CVE-2024/CVE-2024-270xx/CVE-2024-27000.json) (`2024-05-03T06:15:12.350`) -- [CVE-2024-27001](CVE-2024/CVE-2024-270xx/CVE-2024-27001.json) (`2024-05-03T06:15:12.590`) -- [CVE-2024-27004](CVE-2024/CVE-2024-270xx/CVE-2024-27004.json) (`2024-05-03T06:15:12.800`) -- [CVE-2024-27008](CVE-2024/CVE-2024-270xx/CVE-2024-27008.json) (`2024-05-03T06:15:13.000`) -- [CVE-2024-27013](CVE-2024/CVE-2024-270xx/CVE-2024-27013.json) (`2024-05-03T06:15:13.277`) -- [CVE-2024-27020](CVE-2024/CVE-2024-270xx/CVE-2024-27020.json) (`2024-05-03T06:15:13.507`) -- [CVE-2024-27022](CVE-2024/CVE-2024-270xx/CVE-2024-27022.json) (`2024-05-03T06:15:13.697`) +- [CVE-2023-31211](CVE-2023/CVE-2023-312xx/CVE-2023-31211.json) (`2024-05-03T09:15:07.230`) ## Download and Usage diff --git a/_state.csv b/_state.csv index 01ed445d0e3..a0a88ab94ab 100644 --- a/_state.csv +++ b/_state.csv @@ -217992,6 +217992,7 @@ CVE-2023-25451,0,0,bf9f65354c0c14c6247ca4f7ffbc13c8f1c663eb328d83c64fc6ef4fc9f28 CVE-2023-25452,0,0,571ef3748c95bfbe0b203cdf3ffc5b7535ee70d82cfd72e88027c72ee00eeb46,2023-05-10T02:26:18.077000 CVE-2023-25453,0,0,60471186e0c170cee446cbaa0f4fe3eca3fe1a604dd5df7fc93e2fb25442b2c0,2023-09-01T12:09:39.707000 CVE-2023-25456,0,0,408499d865f2649a5a437b37da197fa52a399927aa162950e5bbd8727fe58d15,2023-11-07T04:08:58.840000 +CVE-2023-25457,1,1,c0229a4d30959c47c34eae5d740cf13de0563946cd3c7c0384fa985d436f62bb,2024-05-03T08:15:06.603000 CVE-2023-25458,0,0,1065fa2b79e67ae65d3a3be77e6869d78ed621dc83197f39f93d1f300f7d61c5,2023-05-08T13:38:48.890000 CVE-2023-25459,0,0,b452b828450505952fe00d6bb72761dbdbf71b667f1dd51cd4b90d57aea38cfd,2023-08-10T03:52:36.750000 CVE-2023-2546,0,0,0c9ab6d4260067a910f2654d5f4ba8d79079cf0fe265a6a584c483c68b3635ea,2023-11-07T04:12:51.690000 @@ -222531,7 +222532,7 @@ CVE-2023-31208,0,0,5734c51815db6b57a8026bf78fa2fd363219f3d8846acb63cc3b1fa2c8f74 CVE-2023-31209,0,0,265b69c6c647506d4027f23aaf619e8ae4ead2ce4ba1cf17fdeb126549adc09a,2023-08-17T18:46:11.130000 CVE-2023-3121,0,0,acc3ea9a35e95881e6fb1a32ac832e4e0495284aeb391e11d047b4fb76b05fbc,2024-04-11T01:21:03.627000 CVE-2023-31210,0,0,22db411452e4413b24810b6f87647cdbad1853694542f15e240cee8fe93fc316,2023-12-18T17:31:51.650000 -CVE-2023-31211,0,0,25b8616d1c09299eaeb19215263ab8a437b4688bd3d65f84a2c4134e75a29552,2024-01-19T02:09:26.650000 +CVE-2023-31211,0,1,bcf13972193b4b415b2d12adfbcf8d2f73fba1f0337b67e0fcd53d7d3aa27bd8,2024-05-03T09:15:07.230000 CVE-2023-31212,0,0,b3dca3f1049aeb20dc6f644e1d420b3cba3b924328724987f22ceb6add12b28e,2023-11-08T18:47:36.203000 CVE-2023-31213,0,0,aa93d62aa161bdef803d7fb4d1edfbba0517314ec0fd9cf94fe731d75469d683,2023-07-19T18:25:45.263000 CVE-2023-31215,0,0,b89fa5ca9251f56c11de8c448270940ecd6643a443f0f280749266a956d5de72,2023-12-28T13:32:56.443000 @@ -225664,6 +225665,7 @@ CVE-2023-35698,0,0,1a5f0de9e827e1f26d8ce1a23936779b2a92a9242596f2af26444c4d5f2f3 CVE-2023-35699,0,0,c06aba707c695839836dd82c54f55ca34badb20d57868cee747251dc69fa9bf6,2023-07-18T11:46:43.907000 CVE-2023-3570,0,0,12377f8f2531f9bb5228e4098a72207ca93d76b44354ff18076ee4d4cf633e78,2023-08-25T07:15:08.680000 CVE-2023-35700,0,0,d85439aec76d8ba3f8c755512b44f4a752c457c5d0362fdcaf7a45cdedd4d318,2023-11-07T04:15:57.173000 +CVE-2023-35701,1,1,e6dce6e08d5a6cc3d293e6cd63d2a5714872136194df65318be5a5281538d41d,2024-05-03T09:15:07.587000 CVE-2023-35702,0,0,43a538fd2a6551344790ddc23675ac41256cc49affe767c42203bb8af1f9d9f6,2024-04-09T21:15:08.687000 CVE-2023-35703,0,0,bd220da906e6173a01fcf88c08076bd5470744a21943fd30147c0383607c053a,2024-04-09T21:15:08.797000 CVE-2023-35704,0,0,9f7caa8dfb464038a77a6e4bcadca0149b6bc7207c34073f0385815b079c70e4,2024-04-09T21:15:08.890000 @@ -232174,6 +232176,7 @@ CVE-2023-44469,0,0,960da4dd20058cd7b4d769768e751d771f02293e397b85b243d1f37fdbb2c CVE-2023-4447,0,0,04feba11f7263b0d5ebcdb950df716fdf7ecaf06906bce3ab8c4a6b5740dbd87,2024-04-11T01:22:28.583000 CVE-2023-44470,0,0,20af9da7b19e16e3f751716ce6388203de2002045e4dd1b4757141898d21d736,2023-10-12T19:50:34.870000 CVE-2023-44471,0,0,789a6d719a2ecab868455dd65b3c31581b8eb5ef3909c19aa7f5e53cf830ab7f,2023-10-12T19:47:22.937000 +CVE-2023-44472,1,1,9fc2dc211aae777b11c8a71d5cd607751cc27d1aea020eca500662a619a692d0,2024-05-03T08:15:06.850000 CVE-2023-44473,0,0,3a9f0b2529589df722344951f86b13ba970a14c956936c368f28ca8952e1920d,2023-10-12T17:53:16.280000 CVE-2023-44474,0,0,906c16b458f6396badf347b8626690f11ce844c55596d85f29232e2ffaca4997,2023-10-04T02:15:06.293000 CVE-2023-44475,0,0,708b5c32369c471fc4e211ff1c1662f1ff9edd336e0cb60d14f1fa0bbbd0bda8,2023-10-12T19:42:15.347000 @@ -237427,7 +237430,7 @@ CVE-2023-52610,0,0,ebaaf65a540d2d00c4af03f0e9706e60a1009d9da7920c40e2c8ec7ab71ca CVE-2023-52611,0,0,adfea1110379d41eef258374943e124ecab67c2f114c78e000c2827978075fff,2024-03-18T12:38:25.490000 CVE-2023-52612,0,0,be8ed4f9689fee6a6f6e71f10685bce50996952b147db667defb3c11e0b94b65,2024-03-18T12:38:25.490000 CVE-2023-52613,0,0,2a6a775fa4fd80939ff842c405dbd6a4a567d8e153ce0381397d1e3184eb21ad,2024-03-18T12:38:25.490000 -CVE-2023-52614,0,1,5fa9392dab1a0ff2ef9ab069524da01ac5c70765327d5cf6ad2105a88f5860e1,2024-05-03T06:15:08.503000 +CVE-2023-52614,0,0,5fa9392dab1a0ff2ef9ab069524da01ac5c70765327d5cf6ad2105a88f5860e1,2024-05-03T06:15:08.503000 CVE-2023-52615,0,0,b03f1c20882d93ba4b42bf55c3ee735bb7dd825a67b076e419d8b9cf0c5ffa93,2024-03-18T12:38:25.490000 CVE-2023-52616,0,0,731b6afefc6a8d9bec529131375a0b58acf488391c57bbd120c7bdf51049fbac,2024-03-18T12:38:25.490000 CVE-2023-52617,0,0,0af55b403517bed7905346887f3a1061bb99bf76dd43932b8429b5d4200ff19c,2024-03-18T12:38:25.490000 @@ -242933,6 +242936,9 @@ CVE-2024-23905,0,0,2d8ebad5c05b335845d8a0c6b27832798a9c27087f41f1dd4daf5a7e2afef CVE-2024-2391,0,0,fd3c56d19cfdb51c26b65d074d54709719e794ba6c0db8c6b8b791a18f6fe3ca,2024-04-11T01:25:23.393000 CVE-2024-23910,0,0,e6adc416dd7b19484faa305c4e8491b3ff3f8809d94d53eb510d517290865995,2024-04-04T01:15:50.027000 CVE-2024-23911,0,0,f05e17f474751d92c0d0b7dd0326335d7f22fd7de41e1b09eac2c91ab043885f,2024-04-15T13:15:31.997000 +CVE-2024-23912,1,1,8b76a5e0353fd2e3399286fd1795cfde96165072137263962a5069d762fe6be6,2024-05-03T09:15:07.737000 +CVE-2024-23913,1,1,62a397291ca4ff6f894ba2b8fb788e66ab96f4372c15c5465e89848a8108a6f0,2024-05-03T09:15:07.920000 +CVE-2024-23914,1,1,481b78c97eba7946db4772e616ee8e8ae3f254b4a59e9894073706a7f542c37d,2024-05-03T09:15:08.090000 CVE-2024-23917,0,0,43acd2786eef775b4e5af3da03e8f628e79a58b917087bea0e9c91638665592f,2024-02-09T01:05:22.180000 CVE-2024-2392,0,0,42336a48d6bafcd50dc6522fe24a4d56dee45c4fa6295037e9d4d2226834e64c,2024-03-22T12:45:36.130000 CVE-2024-2393,0,0,a735f579c8d8282e2e770bb2e57ba455b9e1d053a4e15dfbb3b2c5e4432a6f37,2024-04-11T01:25:23.490000 @@ -243225,6 +243231,7 @@ CVE-2024-24706,0,0,4d433b03a4c26ebc6bd4b9712c01509648b3f2cecc7341b14e252b0e38dfa CVE-2024-24707,0,0,23a49dd490264be4d0f1f787e396daad28e9b33e6cecae6e6ede109ea8372e70,2024-04-03T17:24:18.150000 CVE-2024-24708,0,0,f693d4f4acd95516c93eac11f2cab76ea0d55ea86fcf1b386fdcecddbfc9bf86,2024-02-29T13:49:29.390000 CVE-2024-2471,0,0,c433bac72e984da7ddd7f5d293078fb939e9f74235bc4818486a5edc71f6f4a6,2024-04-08T18:48:40.217000 +CVE-2024-24710,1,1,302749c2c1ec57ae8197be467cd5499b82b7cfef1d6d9bf6afcb026b279a5b1f,2024-05-03T08:15:07.033000 CVE-2024-24711,0,0,0d048c3822039d008612960507a20bcb0af4972abb0e8757f981885d0a5986fc,2024-03-26T12:55:05.010000 CVE-2024-24712,0,0,3eb883409ceb5cd8ab7cfb2c23165937e7138a0fdba93206148a8d8c39991d81,2024-02-16T14:48:04.207000 CVE-2024-24713,0,0,016796105eec4ced1aaab79578ed2b6dc8b6c4a64b21f9341804bb78b76a15f2,2024-02-16T15:48:04.237000 @@ -244696,13 +244703,13 @@ CVE-2024-26917,0,0,76ac629e9c8e03234b1cc0f2056c3a72474e19f6de790dc934c6f9ce7aac4 CVE-2024-26918,0,0,856369cd1dea2e2c11af16942fbef9a6c4bc54310e835905719eaafb6e04f03b,2024-04-17T16:51:07.347000 CVE-2024-26919,0,0,8ce229e6f304423499a3d2dbc331713eb1fbfa99e3cc0b71da0db8b8b65f091c,2024-04-17T16:51:07.347000 CVE-2024-2692,0,0,aefc05ddca23ffc90de039367cc7fed9a06f50bd32c460cfe2bbf1c8645c8f06,2024-04-04T12:48:41.700000 -CVE-2024-26920,0,1,21e54f7cffce25f076f12e61f0ebb2408a05fa58f844d6d62f7a9b8a454f9f45,2024-05-03T06:15:09.207000 +CVE-2024-26920,0,0,21e54f7cffce25f076f12e61f0ebb2408a05fa58f844d6d62f7a9b8a454f9f45,2024-05-03T06:15:09.207000 CVE-2024-26921,0,0,76d623900726b55efb66263c05dcf2e665a9ce9fb4f9ecc19bf3b35e90cf98c7,2024-04-18T13:04:28.900000 -CVE-2024-26922,0,1,af76b1b0f3ab9ee10956791f730bd4870f5c1e7911748c677fba653e48abc0dc,2024-05-03T06:15:09.570000 -CVE-2024-26923,0,1,da4573b83844f36cbecbdc77d107c82583a707415e7aff11d2f41c3052c0b580,2024-05-03T06:15:10.053000 -CVE-2024-26924,0,1,f1745d5b13e99b2b6fe2577e278513d3ec9c9776eb98248608246c98329d345c,2024-05-03T06:15:10.280000 +CVE-2024-26922,0,0,af76b1b0f3ab9ee10956791f730bd4870f5c1e7911748c677fba653e48abc0dc,2024-05-03T06:15:09.570000 +CVE-2024-26923,0,0,da4573b83844f36cbecbdc77d107c82583a707415e7aff11d2f41c3052c0b580,2024-05-03T06:15:10.053000 +CVE-2024-26924,0,0,f1745d5b13e99b2b6fe2577e278513d3ec9c9776eb98248608246c98329d345c,2024-05-03T06:15:10.280000 CVE-2024-26925,0,0,205e70a4a50c2237fc125a81400662661ac0821c29e77dd6328c788eab96e62d,2024-04-25T13:18:20.370000 -CVE-2024-26926,0,1,a92f86f9d106171e65901edda1c9fe34c87217de61e4b80a80c2e7bdcc5c3e47,2024-05-03T06:15:10.483000 +CVE-2024-26926,0,0,a92f86f9d106171e65901edda1c9fe34c87217de61e4b80a80c2e7bdcc5c3e47,2024-05-03T06:15:10.483000 CVE-2024-26927,0,0,28230e8b97d6569ef237a255c6a2e0072a98bc7d1c93aa8cc80d54b6a5ee9b90,2024-04-29T12:42:03.667000 CVE-2024-26928,0,0,53acf010395ad47667d15ddc661fbb74b301d2b8a0a815cafc528a88f313f269,2024-04-29T12:42:03.667000 CVE-2024-26929,0,0,210a45e065d81016f9f4302ea5eeb9d3cefda708dec3da96a9abae5328ec9000,2024-05-01T13:02:20.750000 @@ -244758,40 +244765,40 @@ CVE-2024-26977,0,0,59fbfe9ac1b848fdb83996742e166e4603a5bfea7240a7586e65048734931 CVE-2024-26978,0,0,257555735a82f0f0efd2e94ab4b0ebf9c131fcff18bc7c75ac3a99b0b6b5f572,2024-05-01T13:02:20.750000 CVE-2024-26979,0,0,08c2e9d864acb753e6fde04699b98be30568e3e09397d447207596d52a0e4221,2024-05-01T13:02:20.750000 CVE-2024-26980,0,0,76e4503c5881b9716dec0fa482a2044db22902d212dbbb181fd17d260a1362d1,2024-05-03T03:16:26.907000 -CVE-2024-26981,0,1,3038c3174fa5069e42a0db4274374d74c2b5066ad475e921f47c4589915379cd,2024-05-03T06:15:10.663000 -CVE-2024-26982,0,1,71a4b88e652ac72451ef2b1c06677d2a8721eacfd6194887bc3cbe1ed1aa0fda,2024-05-03T06:15:10.953000 +CVE-2024-26981,0,0,3038c3174fa5069e42a0db4274374d74c2b5066ad475e921f47c4589915379cd,2024-05-03T06:15:10.663000 +CVE-2024-26982,0,0,71a4b88e652ac72451ef2b1c06677d2a8721eacfd6194887bc3cbe1ed1aa0fda,2024-05-03T06:15:10.953000 CVE-2024-26983,0,0,ccd819c1ec21baac0e82aceb812621bf7a6f5600a1aad568a7abc52c10f314e2,2024-05-03T03:16:27.040000 -CVE-2024-26984,0,1,51fd78b3299a4f7fe92b2972cdef3a37b9d7ca38e2666df6b4d0952e7bd0b097,2024-05-03T06:15:11.130000 +CVE-2024-26984,0,0,51fd78b3299a4f7fe92b2972cdef3a37b9d7ca38e2666df6b4d0952e7bd0b097,2024-05-03T06:15:11.130000 CVE-2024-26985,0,0,ce7ffde23e660a23826c5fcfbdd5ad4846c5aa4f0b4b6f75087a6ed63926e72a,2024-05-03T03:16:27.140000 CVE-2024-26986,0,0,0e86af409a08ebe8b054bd624b96ed0e828f392c169b319d54501b325508aadd,2024-05-03T03:16:27.180000 CVE-2024-26987,0,0,265a594118bd17bd2c87735bf4fa037cf64a099e7646ca58a130053e3ef0c2de,2024-05-03T03:16:27.223000 -CVE-2024-26988,0,1,20a9c0c0c1e4b746621fc27fde9b93d36608a168e68af7fd64c18a89981d9bc7,2024-05-03T06:15:11.337000 +CVE-2024-26988,0,0,20a9c0c0c1e4b746621fc27fde9b93d36608a168e68af7fd64c18a89981d9bc7,2024-05-03T06:15:11.337000 CVE-2024-26989,0,0,d7f79764735bb4bdca04432cc868232052eb8d9179b27315b8e08d4922b9686a,2024-05-03T03:16:27.310000 CVE-2024-26990,0,0,c2b48f7cac4e7058728495aeb50489a6af7fceca948a9ba35a0bfe9cf11f80df,2024-05-03T03:16:27.360000 CVE-2024-26991,0,0,92aca6f670fd950bfe8e8d7689a5b2dcc7fdd95b5fa52a077f4602d6da9ab552,2024-05-03T03:16:27.407000 CVE-2024-26992,0,0,d7559e1aed92214c24aa61e94393eb033d4d8c74c8b1c622d267c4c8db1a1879,2024-05-03T03:16:27.453000 -CVE-2024-26993,0,1,4c5086a6b5387518cd4e4c2b518527fd853d25c2e06829ce9a9cb9a4e269dcf7,2024-05-03T06:15:11.530000 -CVE-2024-26994,0,1,c0b1a2d204b67af1b29d2f01286a4399fab92fd0c89afdec263b4c615c8875fe,2024-05-03T06:15:11.740000 +CVE-2024-26993,0,0,4c5086a6b5387518cd4e4c2b518527fd853d25c2e06829ce9a9cb9a4e269dcf7,2024-05-03T06:15:11.530000 +CVE-2024-26994,0,0,c0b1a2d204b67af1b29d2f01286a4399fab92fd0c89afdec263b4c615c8875fe,2024-05-03T06:15:11.740000 CVE-2024-26995,0,0,2146327fe9ef53c3bea971f53925b0d81cb30e2aa49b7f2fcad91b5a54abf9f9,2024-05-03T03:16:27.580000 CVE-2024-26996,0,0,20e9ce694108d42f9ed143bd1ce7355d03895129e220e05953a671dfaa83faab,2024-05-03T03:16:27.623000 -CVE-2024-26997,0,1,bdfca562d47f9e5d3fc1098c4dacc21d61a7ba014b51a9e792d5f847f7afb48b,2024-05-03T06:15:11.950000 +CVE-2024-26997,0,0,bdfca562d47f9e5d3fc1098c4dacc21d61a7ba014b51a9e792d5f847f7afb48b,2024-05-03T06:15:11.950000 CVE-2024-26998,0,0,48b4ca2a741e8d6d024f95381b4079f893db1ee6d4448ad105243249c86303ae,2024-05-03T03:16:27.673000 -CVE-2024-26999,0,1,9ac4807c2521e1d8db890c0527b001317552b4ac44ce0b01702365258c787f45,2024-05-03T06:15:12.137000 +CVE-2024-26999,0,0,9ac4807c2521e1d8db890c0527b001317552b4ac44ce0b01702365258c787f45,2024-05-03T06:15:12.137000 CVE-2024-2700,0,0,ec51b942504a96d4888f64f81c70906fd44973b0d1ace8e2f862241f82ce29e0,2024-04-17T20:15:08.240000 -CVE-2024-27000,0,1,ad2ef5bdd7c2f9d77d1b6346a92f926b0e0114b79caa616e96d2bb2c427a8aac,2024-05-03T06:15:12.350000 -CVE-2024-27001,0,1,f4defde5af84e6133600f9028ad4a44c6061db86e7d3ca3705bde065e8cf1441,2024-05-03T06:15:12.590000 +CVE-2024-27000,0,0,ad2ef5bdd7c2f9d77d1b6346a92f926b0e0114b79caa616e96d2bb2c427a8aac,2024-05-03T06:15:12.350000 +CVE-2024-27001,0,0,f4defde5af84e6133600f9028ad4a44c6061db86e7d3ca3705bde065e8cf1441,2024-05-03T06:15:12.590000 CVE-2024-27002,0,0,4cebae80cd053089254650a19e4cdf93233e79968b6c0483f943fbf8eb0cf543,2024-05-03T03:16:27.847000 CVE-2024-27003,0,0,20d6474febb33d1d9738664aa924171cff621ef4d42b96c379bbc7ca17910189,2024-05-03T03:16:27.890000 -CVE-2024-27004,0,1,5ee749957714436a863b1829cedb06effa94ab50e8e0d157eedbc8feaa729442,2024-05-03T06:15:12.800000 +CVE-2024-27004,0,0,5ee749957714436a863b1829cedb06effa94ab50e8e0d157eedbc8feaa729442,2024-05-03T06:15:12.800000 CVE-2024-27005,0,0,0c7a4c5a8a302385907f4d9c54b83be92049a557d43dc801da14311e4ea3f7a4,2024-05-03T03:16:27.987000 CVE-2024-27006,0,0,9900a00aac2a484a183478a545d94e3424532992b67d5cfee8fd40ed3f7546e8,2024-05-03T03:16:28.030000 CVE-2024-27007,0,0,de7399fdc0b28ed2c42071d5017655949f209978d39881d9334f8ddef84470c7,2024-05-03T03:16:28.070000 -CVE-2024-27008,0,1,7c531cd27599bc8e765bc8b2bcfe3367556b19229be46bca53a9aed7b180470f,2024-05-03T06:15:13 +CVE-2024-27008,0,0,7c531cd27599bc8e765bc8b2bcfe3367556b19229be46bca53a9aed7b180470f,2024-05-03T06:15:13 CVE-2024-27009,0,0,082aadf95ded16775ba368e9fa1e3bc06e75ebc1b513c777a07e1478cf4c616b,2024-05-03T03:16:28.153000 CVE-2024-27010,0,0,a6b226a3d7862570b3a5f1461f3ecf1560912a7fcca01d922620078fb22bf622,2024-05-03T03:16:28.203000 CVE-2024-27011,0,0,db70e071dff497d63faa562953c0d7c3853f1610192f278ddda0161d961a984c,2024-05-03T03:16:28.243000 CVE-2024-27012,0,0,b8e156e06c82d793b237dbde50ffe6b624c2b1835a7cba57a14fe890f6110d04,2024-05-03T03:16:28.290000 -CVE-2024-27013,0,1,2cb52126af3572c7b5f55dc10a3eca31ff3fe95965d644de25764971ca372951,2024-05-03T06:15:13.277000 +CVE-2024-27013,0,0,2cb52126af3572c7b5f55dc10a3eca31ff3fe95965d644de25764971ca372951,2024-05-03T06:15:13.277000 CVE-2024-27014,0,0,3bc710ae26afc6886d8e44039274f51c5633db31a76486b47eb838367827ccb0,2024-05-03T03:16:28.390000 CVE-2024-27015,0,0,865c903fbd1b927b928209eb7b4c7715de07a45a86f79d252af767bda9c897a4,2024-05-03T03:16:28.440000 CVE-2024-27016,0,0,b2331bdd993764cb67ade407248d33cc3fb586a90e9566cbcc5899af3f716753,2024-05-03T03:16:28.483000 @@ -244799,9 +244806,9 @@ CVE-2024-27017,0,0,392c3e259be6fc543be409181e8df13c7334fad3361f061cae96ba4f88846 CVE-2024-27018,0,0,b13a811b60b2f25c3befd7c81c629dbd75dc7217b56740e51cd33ae5baaebae5,2024-05-03T03:16:28.567000 CVE-2024-27019,0,0,8449fc532c456110a7b37562bd69b32b830596967c204f5dcc1f236b208ecec6,2024-05-03T03:16:28.623000 CVE-2024-2702,0,0,d714950951d2438da53d97b453b8470335efdb106b4a3aaafe4c816e98d263df,2024-03-20T13:00:16.367000 -CVE-2024-27020,0,1,92e449b5dfa875d0c65fac42a6b907353432a5a01260d217191fb3e39711aefc,2024-05-03T06:15:13.507000 +CVE-2024-27020,0,0,92e449b5dfa875d0c65fac42a6b907353432a5a01260d217191fb3e39711aefc,2024-05-03T06:15:13.507000 CVE-2024-27021,0,0,7629e8b536a7370126b5401755d0979503442514581afaecdca94d05ca6a3a8e,2024-05-03T03:16:28.710000 -CVE-2024-27022,0,1,181d1b8331ba17e558fecd3c8e3cefddaa774350612d20cdd672dcecfa940b03,2024-05-03T06:15:13.697000 +CVE-2024-27022,0,0,181d1b8331ba17e558fecd3c8e3cefddaa774350612d20cdd672dcecfa940b03,2024-05-03T06:15:13.697000 CVE-2024-27023,0,0,bfdbebf8e04e0e157abeb9fd87665eab36c5df352f61196601859b27ac3c2ee3,2024-05-01T19:50:25.633000 CVE-2024-27024,0,0,96efa799e2ac56fadc351826798dc36d316169ab611d5986673fe6d683b41700,2024-05-01T19:50:25.633000 CVE-2024-27025,0,0,82ff3eddcb89598ee39fb858ceee867459deeb1b4ff43367b3380d9fbdbba60e,2024-05-01T19:50:25.633000 @@ -245328,6 +245335,7 @@ CVE-2024-28066,0,0,8d264de635ae9c8dc6d41b6ed16f7f85828f585eea298ce9fb065b16c3368 CVE-2024-28069,0,0,99a57a9955c5ed5463e7c560b95e0a17dfa2789ec3c024f2825003d476d4b80d,2024-03-17T22:38:29.433000 CVE-2024-2807,0,0,389dec77d863d88d0729c3b21a13c4f638dbaad2d7ffdf5a3bec6019fd1a7b1b,2024-04-11T01:25:36.783000 CVE-2024-28070,0,0,c8eeec88fa6e3b91036a4eadc63dd921f090ad52309176e7af22a570b911aeac,2024-03-17T22:38:29.433000 +CVE-2024-28072,1,1,6596801048e07b80a6611c70d3d9bcb61d1ca69e1e839f899621c9e0d90f7e27,2024-05-03T08:15:07.217000 CVE-2024-28073,0,0,cdb5d61cc6a19952dccba6c20cc81a1525eeb0c1fc701ee23bfbd240d2d310cb,2024-04-17T20:08:21.887000 CVE-2024-28076,0,0,573150dd6c1cd2ebee3e74b864dba3fbe351c8f7cfb57fda1c213b0f2a3aeb0c,2024-04-19T14:15:11.080000 CVE-2024-2808,0,0,c3ed3b9e68948cd880b53f1e926f321cf4b47941f31cc49bbad2cbe5e609284b,2024-04-11T01:25:36.883000 @@ -247678,6 +247686,7 @@ CVE-2024-32803,0,0,87ef628ed36a01981de6b24a9a46f4b15174f60f02a3679855347999c2d8f CVE-2024-32806,0,0,d8037ba4bbb861d02087bc0e815d7d332fc801a9609bcadd59a9397c35ec5a94,2024-04-24T17:16:50.397000 CVE-2024-32808,0,0,4a82bef92c296d86caf3ed2592cda4e11078b8b017423c1d319584391f5d5ff2,2024-04-24T13:39:42.883000 CVE-2024-3281,0,0,b3c51db3aca3b371ad4faa3c1c4537d2c54d8323123f7ae9b26414cd9ee432a6,2024-04-10T13:24:22.187000 +CVE-2024-32810,1,1,c173dd59fdda872fb4ca533b772f6e53231f1a4fcade1e500868c541949d68e3,2024-05-03T08:15:07.430000 CVE-2024-32812,0,0,a6c0140cb5875c5619d43acc5c77a24a0f3ff7202fb936829a583061f4a5590b,2024-04-24T13:39:42.883000 CVE-2024-32815,0,0,fdfcf6bbe35deb9ef34763a17ff64d385e838875d5c0ab731c71e0463aa8a48a,2024-04-24T13:39:42.883000 CVE-2024-32816,0,0,2fa63efd4ad7910d44e8053cdc5b80901495c5148f9f0b492de6d141c5af6f05,2024-04-24T13:39:42.883000 @@ -247690,6 +247699,7 @@ CVE-2024-32826,0,0,0d7c35c38998736930e8124de26137dd3edb154046638c71583ab2454604a CVE-2024-32828,0,0,e98a289b3626e9e97ee2c25450e252107ac1631ec54c8e821ef6379945d6166a,2024-04-26T12:58:17.720000 CVE-2024-32829,0,0,af974fc6efe469e422423920d456ebe47e66f08b752628aef0bab2a184975ddc,2024-04-26T12:58:17.720000 CVE-2024-3283,0,0,8b1939d21df3d4399a3bf874e70470053c1a0ae20421841ad51c79aca5727c56,2024-04-10T19:49:51.183000 +CVE-2024-32831,1,1,d49d650149fd5e16e13712d2e2e041eb3e0fdad6c40d10c333d65e676beb8060,2024-05-03T08:15:07.713000 CVE-2024-32833,0,0,75a734274df361ea9a3f6b3015d66d3525b2c570f6f2524ded71781e2b6ac99a,2024-04-24T13:39:42.883000 CVE-2024-32834,0,0,d2ed9ea40163afd5f111e44be27b5edfb4cb8a8dd0234c49fdc13943a21fbf2d,2024-04-24T13:39:42.883000 CVE-2024-32835,0,0,a55a936ce932c192bddb52ecc7ef5c50500f7aaee0689f590c1aa942fe932618,2024-04-24T13:39:42.883000 @@ -247976,19 +247986,35 @@ CVE-2024-33904,0,0,94e3a98c0463f8acd176e3df60de225e1631e2e1dbcd1a948aa64ab2e616e CVE-2024-33905,0,0,4f2af541fd9603df50f92dd094e460dd4dcee3f568c1f2af9533e6ef2f5fb1b0,2024-05-01T18:15:24.390000 CVE-2024-33911,0,0,3aecc9c6853b34c79146d922a590e2ff56a9634dc21e6f2275a777f672ad645b,2024-05-02T13:27:25.103000 CVE-2024-33913,0,0,fdcdfb506731b7f26c0d67c69dc8ed8c4bfdff71029b6b2f6e847f10e09b4905,2024-05-02T13:27:25.103000 +CVE-2024-33914,1,1,d122138be1a4fa8f27f9a0154da62d95ee81352feb2e1f626c2b2720e3403478,2024-05-03T09:15:08.257000 +CVE-2024-33915,1,1,7c97997ce00e2d31c63289dc1e9746492eef885457e2bab723cd9319b57ba16f,2024-05-03T09:15:08.443000 +CVE-2024-33916,1,1,ddd81f51d78ff782f4665a4ee9d333f86d813d4bcccec8ffdac234592aabb001,2024-05-03T08:15:07.930000 +CVE-2024-33918,1,1,ba35302d59b1f228115eeac250b715e051bd909d507675eba6b357f166b006e0,2024-05-03T08:15:08.113000 +CVE-2024-33919,1,1,7570d4fc7a2e8b3576ff733bced3ede576f448bf3de61a243b932998bf7c9cfc,2024-05-03T09:15:08.633000 +CVE-2024-33920,1,1,382fce48f7cf5efd062e4ed4411b3d4fd03d6495b1dddc1fcc58d48f4c3f1134,2024-05-03T09:15:08.827000 +CVE-2024-33921,1,1,3e9250cf923f5f8f392eda3aa5efd0f95f852ae8dee59bbffa2326e66a8927bb,2024-05-03T09:15:09.020000 CVE-2024-33922,0,0,581070d9342f09fc7f3ba266aca2e54acec3a9f423037ff85b1ca1eb7af20122,2024-05-02T13:27:25.103000 -CVE-2024-33928,1,1,37e17338656e9b82882ce5a5575a68963bdf87b4947c48e4b26d76ff5fc32cc9,2024-05-03T07:15:38.507000 +CVE-2024-33923,1,1,d0d8882dc254b1dcabb14b1df2e1b07735ce639cb0a50e662607c8688e0f97e0,2024-05-03T09:15:09.183000 +CVE-2024-33924,1,1,c02dc11273085260cc198f1ebd137c9b0764a090b5b9cf33d2498355cfaf7699,2024-05-03T08:15:08.303000 +CVE-2024-33925,1,1,6888fe843484e9b81477479a204796f7c7a51535f6e24af1459fa8ee19ffd0a0,2024-05-03T09:15:09.387000 +CVE-2024-33926,1,1,5dccccae30fe1c23daacb6f298ed41edbf09405611ee109b3ef629696835fed5,2024-05-03T08:15:08.490000 +CVE-2024-33927,1,1,5086b925ed192a5a3cd38aeac2295c3ce6c4ec549de3f122558161961985c3ee,2024-05-03T08:15:08.673000 +CVE-2024-33928,0,0,37e17338656e9b82882ce5a5575a68963bdf87b4947c48e4b26d76ff5fc32cc9,2024-05-03T07:15:38.507000 +CVE-2024-33929,1,1,0aca218489f58414054b89a88071ccd0d02935eac4a07478a9646fce00efdfde,2024-05-03T09:15:09.580000 CVE-2024-33930,0,0,d4854365518648983f110687642324ab33baba9fea77b8107ff83d4e8904d188,2024-05-02T13:27:25.103000 -CVE-2024-33932,1,1,7914dfec4aa92667bc194a1419455363ed058990262d7d04ea185f47de84ebe0,2024-05-03T07:15:38.870000 -CVE-2024-33934,1,1,03f4279a02f160865e001cc3fbf5c3b2df6b3e7680a55c79cf854ef137560caa,2024-05-03T07:15:39.073000 -CVE-2024-33935,1,1,436e9a7e0496167e6737047ce6da521178a6b9ea215919af8b8c47e7f3f44db3,2024-05-03T07:15:39.283000 -CVE-2024-33936,1,1,57c60904b917bc2363b0f4e62d2bc144fa23a459366819d356164d1c0fc67f33,2024-05-03T07:15:39.510000 -CVE-2024-33940,1,1,d916933a371eec0e6c276877f59092e5f502eed100e4b352e50f04737f83ce33,2024-05-03T07:15:39.737000 -CVE-2024-33943,1,1,4003668220f55a0b39406712e9a49dee067bde2efbe0782460513424b1eec6a1,2024-05-03T07:15:39.960000 +CVE-2024-33931,1,1,1dcb86ce59e2bbe2442d913840b204a26a61261b4e27f6ae256bf1d0926993aa,2024-05-03T09:15:09.763000 +CVE-2024-33932,0,0,7914dfec4aa92667bc194a1419455363ed058990262d7d04ea185f47de84ebe0,2024-05-03T07:15:38.870000 +CVE-2024-33934,0,0,03f4279a02f160865e001cc3fbf5c3b2df6b3e7680a55c79cf854ef137560caa,2024-05-03T07:15:39.073000 +CVE-2024-33935,0,0,436e9a7e0496167e6737047ce6da521178a6b9ea215919af8b8c47e7f3f44db3,2024-05-03T07:15:39.283000 +CVE-2024-33936,0,0,57c60904b917bc2363b0f4e62d2bc144fa23a459366819d356164d1c0fc67f33,2024-05-03T07:15:39.510000 +CVE-2024-33937,1,1,2b2f5f3899102cebc3eb08181d91585bb923176ca2570954e37dd77f42f2811c,2024-05-03T09:15:09.950000 +CVE-2024-33940,0,0,d916933a371eec0e6c276877f59092e5f502eed100e4b352e50f04737f83ce33,2024-05-03T07:15:39.737000 +CVE-2024-33941,1,1,c23d6d664b6e586d7cbfe565b596f55ce703d669b0d8c8e1f468764b7f0499f0,2024-05-03T08:15:08.863000 +CVE-2024-33943,0,0,4003668220f55a0b39406712e9a49dee067bde2efbe0782460513424b1eec6a1,2024-05-03T07:15:39.960000 CVE-2024-33944,0,0,4cc781cd62cbbf938c7006c765253cd67313b7791b0366c8f2092cb45b8a99dc,2024-05-02T13:27:25.103000 -CVE-2024-33945,1,1,1f8ed9e30fbf665a8f89e5c2ed08da58ea4f4a4d8aac43703bea3cdd0d82f183,2024-05-03T07:15:40.183000 -CVE-2024-33946,1,1,7749bc95bb44b6b3399654fc1acfa67a1aa736677e6f671389a5a081f68ebe0f,2024-05-03T07:15:40.390000 -CVE-2024-33947,1,1,a4152554225f2e5b535d459a8d349f7815ed1971de50ee606ff773d00d6ba544,2024-05-03T07:15:40.610000 +CVE-2024-33945,0,0,1f8ed9e30fbf665a8f89e5c2ed08da58ea4f4a4d8aac43703bea3cdd0d82f183,2024-05-03T07:15:40.183000 +CVE-2024-33946,0,0,7749bc95bb44b6b3399654fc1acfa67a1aa736677e6f671389a5a081f68ebe0f,2024-05-03T07:15:40.390000 +CVE-2024-33947,0,0,a4152554225f2e5b535d459a8d349f7815ed1971de50ee606ff773d00d6ba544,2024-05-03T07:15:40.610000 CVE-2024-33948,0,0,2bb7b1a0fe53ad644dd8a2c603bf2dadaa4b303b20f5403ca2602ecee7c6317d,2024-05-02T18:00:37.360000 CVE-2024-33949,0,0,9d0ce2c159023e8535673165a86e327dfd4d2416dece4753f569198bb9736d90,2024-05-02T18:00:37.360000 CVE-2024-3400,0,0,5bb68c1f741d7492d6e3e08b6f1711eb6e28a4a827bd2f3f354ccd1b7a47a1fe,2024-04-23T19:57:25.207000 @@ -248049,7 +248075,7 @@ CVE-2024-34401,0,0,d39980a44b57d8fe0020ed0bdce81702e281b86c7f9454dc35849d8e484fd CVE-2024-34402,0,0,0d3847bdfd4bfbe9f122b3fcf7acc95f3a8de36e7abc3044a43566cbb28e2d12,2024-05-03T01:15:48.633000 CVE-2024-34403,0,0,b7c7a64d817fd02e8957eb2d5226e2560fb04b07c2a754376240d5d9a61b4f6f,2024-05-03T01:15:48.693000 CVE-2024-34404,0,0,588c33f3a39dbf54a6a30da6c4efbef4f6b568a9b48e3960d118c2011f0523bd,2024-05-03T01:15:48.753000 -CVE-2024-34408,1,1,9674e37790921a6412ccb1ad00a4c7e299039ac9af39ad200e5276e5bd5862bc,2024-05-03T06:15:13.883000 +CVE-2024-34408,0,0,9674e37790921a6412ccb1ad00a4c7e299039ac9af39ad200e5276e5bd5862bc,2024-05-03T06:15:13.883000 CVE-2024-3441,0,0,657e15d08a05c85e0f4e982fae7cec49fd4b8dda898982a18c454ae2db45f222,2024-04-11T01:26:02.813000 CVE-2024-3442,0,0,756156f7de62e4a3ae69e9bbc13d8b798986428892e90d3991a24b2c8375a976,2024-04-11T01:26:02.893000 CVE-2024-3443,0,0,05006967bda17a889e39c8ccda497403cb2b35584eb895b86d4c8dd8b79230c6,2024-04-11T01:26:02.973000 @@ -248153,7 +248179,7 @@ CVE-2024-3622,0,0,8a36012169667d948c0b90aa74b5439b232e5ac011c2df4d1ba7f1e8b3410d CVE-2024-3623,0,0,9044a03f32811b426f24d5347da98fbfdb67f97317f2e90baed487a2da0b464c,2024-04-26T12:58:17.720000 CVE-2024-3624,0,0,e0ac19607b4c8d1214127703973418b820b7283270ffca198194137ef8f4191a,2024-04-26T12:58:17.720000 CVE-2024-3625,0,0,bb7fa72c43d725aef9f66641f31c3359a614ed8ba414acf9f05b8e44148cef81,2024-04-26T12:58:17.720000 -CVE-2024-3637,1,1,a862d2c5cd0cacf30f8cf772ed0aa1e62601ac9ac72ada5ce414ffd1ac3478ed,2024-05-03T06:15:14.367000 +CVE-2024-3637,0,0,a862d2c5cd0cacf30f8cf772ed0aa1e62601ac9ac72ada5ce414ffd1ac3478ed,2024-05-03T06:15:14.367000 CVE-2024-3645,0,0,9bfaa42192c6fa49951fba1d7645fb7975d3a2b4cd9bcc55a7dd9ceef33e077c,2024-04-22T19:24:12.920000 CVE-2024-3646,0,0,f1ba7615d07aeacaca9371aa5a68bf3033db9a231eaf2716a6cbfd3f340bcd58,2024-04-19T16:19:49.043000 CVE-2024-3647,0,0,9a58c5cd1724db67ae31d7fcb82614e13b94745ce70e2f631b6a89fd4209e534,2024-05-02T18:00:37.360000 @@ -248181,13 +248207,13 @@ CVE-2024-3688,0,0,3c3da89dff2f70e57f08c91100cb9c86b1a450e1376976b3915fc6db73e441 CVE-2024-3689,0,0,ca03c96614779955212f56af1bfe396d14767fb4e42684be0d25e5a13ee997ef,2024-04-15T13:15:51.577000 CVE-2024-3690,0,0,45ec985edc29a1318bd4462496029f540b76442d39a99652ea154ad9b947ac31,2024-04-15T13:15:51.577000 CVE-2024-3691,0,0,50a4350944100a4a70bc8a429651ad99366d63f29ce56edffa6a7e21ea9072d9,2024-04-15T13:15:51.577000 -CVE-2024-3692,1,1,73b00bb45ab9f367e8f05b791b33fa9be05cd13d0f8ae9132ec2f390fa44c71e,2024-05-03T06:15:14.590000 +CVE-2024-3692,0,0,73b00bb45ab9f367e8f05b791b33fa9be05cd13d0f8ae9132ec2f390fa44c71e,2024-05-03T06:15:14.590000 CVE-2024-3695,0,0,0a43ca9cb7c9ed3b42a0a2ca78fb1a22450722e79069ea4af175196569fb25d2,2024-04-15T13:15:51.577000 CVE-2024-3696,0,0,76b6c8c2c1c888d8dbcd35fa3dca1be5fd86a30262a9814ac950ae6f81231ade,2024-04-15T13:15:51.577000 CVE-2024-3697,0,0,e4b1bcbf89b8a1942985523bcb445f6ad3c80d5c75b882ffd7ee4a29710123b3,2024-04-15T13:15:31.997000 CVE-2024-3698,0,0,fa933a41a7207cccf1114c08f1063dd5ca2a9eed2da27e37cd95d87db2808078,2024-04-15T13:15:31.997000 CVE-2024-3701,0,0,d78f52a76181001272debccb095fb5971bb478ebc111313d9ff2994f4ec0598f,2024-04-15T13:15:31.997000 -CVE-2024-3703,1,1,5474bf3418205b5be3a5cf5d423333337e108efebac07931feb7c2c558316d32,2024-05-03T06:15:14.800000 +CVE-2024-3703,0,0,5474bf3418205b5be3a5cf5d423333337e108efebac07931feb7c2c558316d32,2024-05-03T06:15:14.800000 CVE-2024-3704,0,0,ad7f205e31bc442943bbd584692b194a3485d815654eeb83e4eefef6a6eff393,2024-04-15T13:15:51.577000 CVE-2024-3705,0,0,44f1c76d2f6cd8dab882ddfdbdbe908a4e3a8f22d6a90f31f0279b7faf87a669,2024-04-15T13:15:51.577000 CVE-2024-3706,0,0,93b27543775cdce8e7b256b8d014ea258e7a61f0ddb1cca03581da1a85330700,2024-04-15T13:15:51.577000 @@ -248469,4 +248495,4 @@ CVE-2024-4369,0,0,352391da6a6ef399397c7f9abf94d5a6fda2875f0f06f0b38dacd9a1a940e5 CVE-2024-4405,0,0,ae0f4db23c6909c7d74c90a9689be79a58cad53d93c458fbc8aa608abe2f0377,2024-05-02T18:00:37.360000 CVE-2024-4406,0,0,e1c30f2212dcad9d546e3af047be1a2ed8c32271936aca83f8eb5fa48d87e35c,2024-05-02T18:00:37.360000 CVE-2024-4433,0,0,57fa2b8bf7e34ebce0673dcb40cbc1cb3d930cfbe754fed569c751398fdf1c6b,2024-05-02T18:00:37.360000 -CVE-2024-4439,1,1,1a2ab1ea900fe1258f90808166f3d7d377ba90d092c402bdfc5c7c6496b9b12b,2024-05-03T06:15:14.947000 +CVE-2024-4439,0,0,1a2ab1ea900fe1258f90808166f3d7d377ba90d092c402bdfc5c7c6496b9b12b,2024-05-03T06:15:14.947000