From 707a9dcc9d0e04c3e7b5f0102c47fe87f22d0015 Mon Sep 17 00:00:00 2001 From: cad-safe-bot Date: Tue, 11 Jun 2024 18:03:11 +0000 Subject: [PATCH] Auto-Update: 2024-06-11T18:00:18.524852+00:00 --- CVE-2020/CVE-2020-159xx/CVE-2020-15912.json | 2 +- CVE-2020/CVE-2020-161xx/CVE-2020-16139.json | 2 +- CVE-2020/CVE-2020-259xx/CVE-2020-25966.json | 2 +- CVE-2020/CVE-2020-352xx/CVE-2020-35235.json | 2 +- CVE-2021/CVE-2021-372xx/CVE-2021-37253.json | 2 +- CVE-2021/CVE-2021-425xx/CVE-2021-42574.json | 2 +- CVE-2021/CVE-2021-459xx/CVE-2021-45955.json | 2 +- CVE-2022/CVE-2022-286xx/CVE-2022-28652.json | 99 ++++- CVE-2022/CVE-2022-286xx/CVE-2022-28654.json | 99 ++++- CVE-2022/CVE-2022-286xx/CVE-2022-28655.json | 99 ++++- CVE-2022/CVE-2022-286xx/CVE-2022-28656.json | 99 ++++- CVE-2022/CVE-2022-286xx/CVE-2022-28657.json | 99 ++++- CVE-2022/CVE-2022-286xx/CVE-2022-28658.json | 99 ++++- CVE-2023/CVE-2023-482xx/CVE-2023-48273.json | 55 +++ CVE-2023/CVE-2023-515xx/CVE-2023-51519.json | 55 +++ CVE-2023/CVE-2023-516xx/CVE-2023-51682.json | 55 +++ CVE-2023/CVE-2023-522xx/CVE-2023-52224.json | 55 +++ CVE-2023/CVE-2023-522xx/CVE-2023-52227.json | 55 +++ CVE-2023/CVE-2023-522xx/CVE-2023-52233.json | 55 +++ CVE-2024/CVE-2024-11xx/CVE-2024-1164.json | 66 +++- CVE-2024/CVE-2024-12xx/CVE-2024-1272.json | 59 ++- CVE-2024/CVE-2024-16xx/CVE-2024-1662.json | 61 ++- CVE-2024/CVE-2024-206xx/CVE-2024-20671.json | 14 +- CVE-2024/CVE-2024-214xx/CVE-2024-21408.json | 14 +- CVE-2024/CVE-2024-214xx/CVE-2024-21411.json | 14 +- CVE-2024/CVE-2024-214xx/CVE-2024-21431.json | 14 +- CVE-2024/CVE-2024-214xx/CVE-2024-21433.json | 14 +- CVE-2024/CVE-2024-235xx/CVE-2024-23503.json | 55 +++ CVE-2024/CVE-2024-235xx/CVE-2024-23518.json | 55 +++ CVE-2024/CVE-2024-235xx/CVE-2024-23521.json | 55 +++ CVE-2024/CVE-2024-236xx/CVE-2024-23669.json | 82 ++++- CVE-2024/CVE-2024-23xx/CVE-2024-2368.json | 44 ++- CVE-2024/CVE-2024-261xx/CVE-2024-26163.json | 14 +- CVE-2024/CVE-2024-261xx/CVE-2024-26165.json | 14 +- CVE-2024/CVE-2024-261xx/CVE-2024-26167.json | 14 +- CVE-2024/CVE-2024-261xx/CVE-2024-26173.json | 14 +- CVE-2024/CVE-2024-261xx/CVE-2024-26181.json | 14 +- CVE-2024/CVE-2024-262xx/CVE-2024-26246.json | 14 +- CVE-2024/CVE-2024-262xx/CVE-2024-26247.json | 14 +- CVE-2024/CVE-2024-263xx/CVE-2024-26330.json | 20 + CVE-2024/CVE-2024-289xx/CVE-2024-28995.json | 59 ++- CVE-2024/CVE-2024-290xx/CVE-2024-29057.json | 14 +- CVE-2024/CVE-2024-290xx/CVE-2024-29060.json | 55 +++ CVE-2024/CVE-2024-299xx/CVE-2024-29987.json | 14 +- CVE-2024/CVE-2024-300xx/CVE-2024-30050.json | 14 +- CVE-2024/CVE-2024-300xx/CVE-2024-30052.json | 55 +++ CVE-2024/CVE-2024-300xx/CVE-2024-30062.json | 55 +++ CVE-2024/CVE-2024-300xx/CVE-2024-30063.json | 55 +++ CVE-2024/CVE-2024-300xx/CVE-2024-30064.json | 55 +++ CVE-2024/CVE-2024-300xx/CVE-2024-30065.json | 55 +++ CVE-2024/CVE-2024-300xx/CVE-2024-30066.json | 55 +++ CVE-2024/CVE-2024-300xx/CVE-2024-30067.json | 55 +++ CVE-2024/CVE-2024-300xx/CVE-2024-30068.json | 55 +++ CVE-2024/CVE-2024-300xx/CVE-2024-30069.json | 55 +++ CVE-2024/CVE-2024-300xx/CVE-2024-30070.json | 55 +++ CVE-2024/CVE-2024-300xx/CVE-2024-30072.json | 55 +++ CVE-2024/CVE-2024-300xx/CVE-2024-30074.json | 55 +++ CVE-2024/CVE-2024-300xx/CVE-2024-30075.json | 55 +++ CVE-2024/CVE-2024-300xx/CVE-2024-30076.json | 55 +++ CVE-2024/CVE-2024-300xx/CVE-2024-30077.json | 55 +++ CVE-2024/CVE-2024-300xx/CVE-2024-30078.json | 55 +++ CVE-2024/CVE-2024-300xx/CVE-2024-30080.json | 55 +++ CVE-2024/CVE-2024-300xx/CVE-2024-30082.json | 55 +++ CVE-2024/CVE-2024-300xx/CVE-2024-30083.json | 55 +++ CVE-2024/CVE-2024-300xx/CVE-2024-30084.json | 55 +++ CVE-2024/CVE-2024-300xx/CVE-2024-30085.json | 55 +++ CVE-2024/CVE-2024-300xx/CVE-2024-30086.json | 55 +++ CVE-2024/CVE-2024-300xx/CVE-2024-30087.json | 55 +++ CVE-2024/CVE-2024-300xx/CVE-2024-30088.json | 55 +++ CVE-2024/CVE-2024-300xx/CVE-2024-30089.json | 55 +++ CVE-2024/CVE-2024-300xx/CVE-2024-30090.json | 55 +++ CVE-2024/CVE-2024-300xx/CVE-2024-30091.json | 55 +++ CVE-2024/CVE-2024-300xx/CVE-2024-30093.json | 55 +++ CVE-2024/CVE-2024-300xx/CVE-2024-30094.json | 55 +++ CVE-2024/CVE-2024-300xx/CVE-2024-30095.json | 55 +++ CVE-2024/CVE-2024-300xx/CVE-2024-30096.json | 55 +++ CVE-2024/CVE-2024-300xx/CVE-2024-30097.json | 55 +++ CVE-2024/CVE-2024-300xx/CVE-2024-30099.json | 55 +++ CVE-2024/CVE-2024-301xx/CVE-2024-30100.json | 55 +++ CVE-2024/CVE-2024-301xx/CVE-2024-30101.json | 55 +++ CVE-2024/CVE-2024-301xx/CVE-2024-30102.json | 55 +++ CVE-2024/CVE-2024-301xx/CVE-2024-30103.json | 55 +++ CVE-2024/CVE-2024-301xx/CVE-2024-30104.json | 55 +++ CVE-2024/CVE-2024-30xx/CVE-2024-3049.json | 187 +++++++++- CVE-2024/CVE-2024-321xx/CVE-2024-32143.json | 55 +++ CVE-2024/CVE-2024-321xx/CVE-2024-32144.json | 55 +++ CVE-2024/CVE-2024-321xx/CVE-2024-32146.json | 55 +++ CVE-2024/CVE-2024-340xx/CVE-2024-34055.json | 90 ++++- CVE-2024/CVE-2024-343xx/CVE-2024-34363.json | 73 +++- CVE-2024/CVE-2024-343xx/CVE-2024-34364.json | 79 +++- CVE-2024/CVE-2024-347xx/CVE-2024-34753.json | 55 +++ CVE-2024/CVE-2024-347xx/CVE-2024-34758.json | 55 +++ CVE-2024/CVE-2024-347xx/CVE-2024-34763.json | 55 +++ CVE-2024/CVE-2024-347xx/CVE-2024-34768.json | 55 +++ CVE-2024/CVE-2024-347xx/CVE-2024-34799.json | 55 +++ CVE-2024/CVE-2024-348xx/CVE-2024-34804.json | 55 +++ CVE-2024/CVE-2024-348xx/CVE-2024-34815.json | 55 +++ CVE-2024/CVE-2024-348xx/CVE-2024-34819.json | 55 +++ CVE-2024/CVE-2024-348xx/CVE-2024-34821.json | 55 +++ CVE-2024/CVE-2024-348xx/CVE-2024-34822.json | 55 +++ CVE-2024/CVE-2024-352xx/CVE-2024-35248.json | 55 +++ CVE-2024/CVE-2024-352xx/CVE-2024-35249.json | 55 +++ CVE-2024/CVE-2024-352xx/CVE-2024-35250.json | 55 +++ CVE-2024/CVE-2024-352xx/CVE-2024-35252.json | 55 +++ CVE-2024/CVE-2024-352xx/CVE-2024-35253.json | 55 +++ CVE-2024/CVE-2024-352xx/CVE-2024-35254.json | 55 +++ CVE-2024/CVE-2024-352xx/CVE-2024-35255.json | 55 +++ CVE-2024/CVE-2024-352xx/CVE-2024-35263.json | 55 +++ CVE-2024/CVE-2024-352xx/CVE-2024-35265.json | 55 +++ CVE-2024/CVE-2024-356xx/CVE-2024-35684.json | 8 +- CVE-2024/CVE-2024-361xx/CVE-2024-36121.json | 64 +++- CVE-2024/CVE-2024-363xx/CVE-2024-36393.json | 47 ++- CVE-2024/CVE-2024-363xx/CVE-2024-36394.json | 47 ++- CVE-2024/CVE-2024-366xx/CVE-2024-36650.json | 20 + CVE-2024/CVE-2024-366xx/CVE-2024-36675.json | 64 +++- CVE-2024/CVE-2024-372xx/CVE-2024-37293.json | 67 ++++ CVE-2024/CVE-2024-373xx/CVE-2024-37325.json | 55 +++ CVE-2024/CVE-2024-40xx/CVE-2024-4001.json | 66 +++- CVE-2024/CVE-2024-40xx/CVE-2024-4084.json | 50 ++- CVE-2024/CVE-2024-40xx/CVE-2024-4088.json | 66 +++- CVE-2024/CVE-2024-41xx/CVE-2024-4177.json | 66 +++- CVE-2024/CVE-2024-42xx/CVE-2024-4219.json | 57 ++- CVE-2024/CVE-2024-42xx/CVE-2024-4220.json | 57 ++- CVE-2024/CVE-2024-42xx/CVE-2024-4295.json | 64 +++- CVE-2024/CVE-2024-45xx/CVE-2024-4520.json | 62 +++- CVE-2024/CVE-2024-47xx/CVE-2024-4743.json | 66 +++- CVE-2024/CVE-2024-48xx/CVE-2024-4821.json | 71 +++- CVE-2024/CVE-2024-48xx/CVE-2024-4886.json | 65 +++- CVE-2024/CVE-2024-49xx/CVE-2024-4939.json | 66 +++- CVE-2024/CVE-2024-50xx/CVE-2024-5006.json | 81 +++- CVE-2024/CVE-2024-50xx/CVE-2024-5038.json | 71 +++- CVE-2024/CVE-2024-51xx/CVE-2024-5188.json | 71 +++- CVE-2024/CVE-2024-52xx/CVE-2024-5221.json | 66 +++- CVE-2024/CVE-2024-52xx/CVE-2024-5222.json | 76 +++- CVE-2024/CVE-2024-52xx/CVE-2024-5259.json | 77 +++- CVE-2024/CVE-2024-52xx/CVE-2024-5262.json | 68 +++- CVE-2024/CVE-2024-53xx/CVE-2024-5317.json | 66 +++- CVE-2024/CVE-2024-53xx/CVE-2024-5329.json | 55 ++- CVE-2024/CVE-2024-54xx/CVE-2024-5439.json | 66 +++- CVE-2024/CVE-2024-54xx/CVE-2024-5453.json | 74 +++- CVE-2024/CVE-2024-54xx/CVE-2024-5483.json | 44 ++- CVE-2024/CVE-2024-55xx/CVE-2024-5526.json | 58 ++- CVE-2024/CVE-2024-55xx/CVE-2024-5536.json | 66 +++- CVE-2024/CVE-2024-55xx/CVE-2024-5571.json | 71 +++- CVE-2024/CVE-2024-56xx/CVE-2024-5615.json | 49 ++- CVE-2024/CVE-2024-56xx/CVE-2024-5635.json | 75 +++- CVE-2024/CVE-2024-56xx/CVE-2024-5636.json | 65 +++- CVE-2024/CVE-2024-56xx/CVE-2024-5645.json | 75 +++- CVE-2024/CVE-2024-56xx/CVE-2024-5656.json | 66 +++- CVE-2024/CVE-2024-56xx/CVE-2024-5657.json | 76 +++- CVE-2024/CVE-2024-56xx/CVE-2024-5665.json | 70 +++- CVE-2024/CVE-2024-57xx/CVE-2024-5732.json | 68 +++- CVE-2024/CVE-2024-58xx/CVE-2024-5812.json | 55 +++ CVE-2024/CVE-2024-58xx/CVE-2024-5813.json | 55 +++ README.md | 110 +++--- _state.csv | 388 ++++++++++++-------- 156 files changed, 8267 insertions(+), 511 deletions(-) create mode 100644 CVE-2023/CVE-2023-482xx/CVE-2023-48273.json create mode 100644 CVE-2023/CVE-2023-515xx/CVE-2023-51519.json create mode 100644 CVE-2023/CVE-2023-516xx/CVE-2023-51682.json create mode 100644 CVE-2023/CVE-2023-522xx/CVE-2023-52224.json create mode 100644 CVE-2023/CVE-2023-522xx/CVE-2023-52227.json create mode 100644 CVE-2023/CVE-2023-522xx/CVE-2023-52233.json create mode 100644 CVE-2024/CVE-2024-235xx/CVE-2024-23503.json create mode 100644 CVE-2024/CVE-2024-235xx/CVE-2024-23518.json create mode 100644 CVE-2024/CVE-2024-235xx/CVE-2024-23521.json create mode 100644 CVE-2024/CVE-2024-263xx/CVE-2024-26330.json create mode 100644 CVE-2024/CVE-2024-290xx/CVE-2024-29060.json create mode 100644 CVE-2024/CVE-2024-300xx/CVE-2024-30052.json create mode 100644 CVE-2024/CVE-2024-300xx/CVE-2024-30062.json create mode 100644 CVE-2024/CVE-2024-300xx/CVE-2024-30063.json create mode 100644 CVE-2024/CVE-2024-300xx/CVE-2024-30064.json create mode 100644 CVE-2024/CVE-2024-300xx/CVE-2024-30065.json create mode 100644 CVE-2024/CVE-2024-300xx/CVE-2024-30066.json create mode 100644 CVE-2024/CVE-2024-300xx/CVE-2024-30067.json create mode 100644 CVE-2024/CVE-2024-300xx/CVE-2024-30068.json create mode 100644 CVE-2024/CVE-2024-300xx/CVE-2024-30069.json create mode 100644 CVE-2024/CVE-2024-300xx/CVE-2024-30070.json create mode 100644 CVE-2024/CVE-2024-300xx/CVE-2024-30072.json create mode 100644 CVE-2024/CVE-2024-300xx/CVE-2024-30074.json create mode 100644 CVE-2024/CVE-2024-300xx/CVE-2024-30075.json create mode 100644 CVE-2024/CVE-2024-300xx/CVE-2024-30076.json create mode 100644 CVE-2024/CVE-2024-300xx/CVE-2024-30077.json create mode 100644 CVE-2024/CVE-2024-300xx/CVE-2024-30078.json create mode 100644 CVE-2024/CVE-2024-300xx/CVE-2024-30080.json create mode 100644 CVE-2024/CVE-2024-300xx/CVE-2024-30082.json create mode 100644 CVE-2024/CVE-2024-300xx/CVE-2024-30083.json create mode 100644 CVE-2024/CVE-2024-300xx/CVE-2024-30084.json create mode 100644 CVE-2024/CVE-2024-300xx/CVE-2024-30085.json create mode 100644 CVE-2024/CVE-2024-300xx/CVE-2024-30086.json create mode 100644 CVE-2024/CVE-2024-300xx/CVE-2024-30087.json create mode 100644 CVE-2024/CVE-2024-300xx/CVE-2024-30088.json create mode 100644 CVE-2024/CVE-2024-300xx/CVE-2024-30089.json create mode 100644 CVE-2024/CVE-2024-300xx/CVE-2024-30090.json create mode 100644 CVE-2024/CVE-2024-300xx/CVE-2024-30091.json create mode 100644 CVE-2024/CVE-2024-300xx/CVE-2024-30093.json create mode 100644 CVE-2024/CVE-2024-300xx/CVE-2024-30094.json create mode 100644 CVE-2024/CVE-2024-300xx/CVE-2024-30095.json create mode 100644 CVE-2024/CVE-2024-300xx/CVE-2024-30096.json create mode 100644 CVE-2024/CVE-2024-300xx/CVE-2024-30097.json create mode 100644 CVE-2024/CVE-2024-300xx/CVE-2024-30099.json create mode 100644 CVE-2024/CVE-2024-301xx/CVE-2024-30100.json create mode 100644 CVE-2024/CVE-2024-301xx/CVE-2024-30101.json create mode 100644 CVE-2024/CVE-2024-301xx/CVE-2024-30102.json create mode 100644 CVE-2024/CVE-2024-301xx/CVE-2024-30103.json create mode 100644 CVE-2024/CVE-2024-301xx/CVE-2024-30104.json create mode 100644 CVE-2024/CVE-2024-321xx/CVE-2024-32143.json create mode 100644 CVE-2024/CVE-2024-321xx/CVE-2024-32144.json create mode 100644 CVE-2024/CVE-2024-321xx/CVE-2024-32146.json create mode 100644 CVE-2024/CVE-2024-347xx/CVE-2024-34753.json create mode 100644 CVE-2024/CVE-2024-347xx/CVE-2024-34758.json create mode 100644 CVE-2024/CVE-2024-347xx/CVE-2024-34763.json create mode 100644 CVE-2024/CVE-2024-347xx/CVE-2024-34768.json create mode 100644 CVE-2024/CVE-2024-347xx/CVE-2024-34799.json create mode 100644 CVE-2024/CVE-2024-348xx/CVE-2024-34804.json create mode 100644 CVE-2024/CVE-2024-348xx/CVE-2024-34815.json create mode 100644 CVE-2024/CVE-2024-348xx/CVE-2024-34819.json create mode 100644 CVE-2024/CVE-2024-348xx/CVE-2024-34821.json create mode 100644 CVE-2024/CVE-2024-348xx/CVE-2024-34822.json create mode 100644 CVE-2024/CVE-2024-352xx/CVE-2024-35248.json create mode 100644 CVE-2024/CVE-2024-352xx/CVE-2024-35249.json create mode 100644 CVE-2024/CVE-2024-352xx/CVE-2024-35250.json create mode 100644 CVE-2024/CVE-2024-352xx/CVE-2024-35252.json create mode 100644 CVE-2024/CVE-2024-352xx/CVE-2024-35253.json create mode 100644 CVE-2024/CVE-2024-352xx/CVE-2024-35254.json create mode 100644 CVE-2024/CVE-2024-352xx/CVE-2024-35255.json create mode 100644 CVE-2024/CVE-2024-352xx/CVE-2024-35263.json create mode 100644 CVE-2024/CVE-2024-352xx/CVE-2024-35265.json create mode 100644 CVE-2024/CVE-2024-366xx/CVE-2024-36650.json create mode 100644 CVE-2024/CVE-2024-372xx/CVE-2024-37293.json create mode 100644 CVE-2024/CVE-2024-373xx/CVE-2024-37325.json create mode 100644 CVE-2024/CVE-2024-58xx/CVE-2024-5812.json create mode 100644 CVE-2024/CVE-2024-58xx/CVE-2024-5813.json diff --git a/CVE-2020/CVE-2020-159xx/CVE-2020-15912.json b/CVE-2020/CVE-2020-159xx/CVE-2020-15912.json index f65ec958972..d645fc495af 100644 --- a/CVE-2020/CVE-2020-159xx/CVE-2020-15912.json +++ b/CVE-2020/CVE-2020-159xx/CVE-2020-15912.json @@ -2,7 +2,7 @@ "id": "CVE-2020-15912", "sourceIdentifier": "cve@mitre.org", "published": "2020-07-23T15:15:12.040", - "lastModified": "2024-05-17T01:43:37.570", + "lastModified": "2024-06-11T17:15:49.737", "vulnStatus": "Modified", "descriptions": [ { diff --git a/CVE-2020/CVE-2020-161xx/CVE-2020-16139.json b/CVE-2020/CVE-2020-161xx/CVE-2020-16139.json index 4cda948d152..f96cad0d544 100644 --- a/CVE-2020/CVE-2020-161xx/CVE-2020-16139.json +++ b/CVE-2020/CVE-2020-161xx/CVE-2020-16139.json @@ -2,7 +2,7 @@ "id": "CVE-2020-16139", "sourceIdentifier": "cve@mitre.org", "published": "2020-08-12T21:15:12.140", - "lastModified": "2024-05-17T01:43:44.770", + "lastModified": "2024-06-11T17:15:49.877", "vulnStatus": "Modified", "descriptions": [ { diff --git a/CVE-2020/CVE-2020-259xx/CVE-2020-25966.json b/CVE-2020/CVE-2020-259xx/CVE-2020-25966.json index 2bfa6fec4c1..5d52a2a5684 100644 --- a/CVE-2020/CVE-2020-259xx/CVE-2020-25966.json +++ b/CVE-2020/CVE-2020-259xx/CVE-2020-25966.json @@ -2,7 +2,7 @@ "id": "CVE-2020-25966", "sourceIdentifier": "cve@mitre.org", "published": "2020-10-28T18:15:13.413", - "lastModified": "2024-05-17T01:46:27.317", + "lastModified": "2024-06-11T16:15:15.417", "vulnStatus": "Modified", "descriptions": [ { diff --git a/CVE-2020/CVE-2020-352xx/CVE-2020-35235.json b/CVE-2020/CVE-2020-352xx/CVE-2020-35235.json index 27e10ca03e4..310fb6b0b87 100644 --- a/CVE-2020/CVE-2020-352xx/CVE-2020-35235.json +++ b/CVE-2020/CVE-2020-352xx/CVE-2020-35235.json @@ -2,7 +2,7 @@ "id": "CVE-2020-35235", "sourceIdentifier": "cve@mitre.org", "published": "2020-12-14T03:15:13.370", - "lastModified": "2024-05-17T01:48:15.023", + "lastModified": "2024-06-11T16:15:15.590", "vulnStatus": "Modified", "descriptions": [ { diff --git a/CVE-2021/CVE-2021-372xx/CVE-2021-37253.json b/CVE-2021/CVE-2021-372xx/CVE-2021-37253.json index 4e8d5023d22..ef3a05760cd 100644 --- a/CVE-2021/CVE-2021-372xx/CVE-2021-37253.json +++ b/CVE-2021/CVE-2021-372xx/CVE-2021-37253.json @@ -2,7 +2,7 @@ "id": "CVE-2021-37253", "sourceIdentifier": "cve@mitre.org", "published": "2021-12-05T21:15:07.753", - "lastModified": "2024-05-17T01:59:10.427", + "lastModified": "2024-06-11T16:15:15.727", "vulnStatus": "Modified", "descriptions": [ { diff --git a/CVE-2021/CVE-2021-425xx/CVE-2021-42574.json b/CVE-2021/CVE-2021-425xx/CVE-2021-42574.json index bd9d7feb16e..0d70ba88c1a 100644 --- a/CVE-2021/CVE-2021-425xx/CVE-2021-42574.json +++ b/CVE-2021/CVE-2021-425xx/CVE-2021-42574.json @@ -2,7 +2,7 @@ "id": "CVE-2021-42574", "sourceIdentifier": "cve@mitre.org", "published": "2021-11-01T04:15:07.970", - "lastModified": "2024-05-17T02:01:34.483", + "lastModified": "2024-06-11T16:15:15.880", "vulnStatus": "Modified", "descriptions": [ { diff --git a/CVE-2021/CVE-2021-459xx/CVE-2021-45955.json b/CVE-2021/CVE-2021-459xx/CVE-2021-45955.json index 031265884bf..7853c73a720 100644 --- a/CVE-2021/CVE-2021-459xx/CVE-2021-45955.json +++ b/CVE-2021/CVE-2021-459xx/CVE-2021-45955.json @@ -2,7 +2,7 @@ "id": "CVE-2021-45955", "sourceIdentifier": "cve@mitre.org", "published": "2022-01-01T00:15:08.677", - "lastModified": "2024-05-17T02:02:52.777", + "lastModified": "2024-06-11T16:15:16.080", "vulnStatus": "Modified", "descriptions": [ { diff --git a/CVE-2022/CVE-2022-286xx/CVE-2022-28652.json b/CVE-2022/CVE-2022-286xx/CVE-2022-28652.json index d502589fd0f..44ba1f33a88 100644 --- a/CVE-2022/CVE-2022-286xx/CVE-2022-28652.json +++ b/CVE-2022/CVE-2022-286xx/CVE-2022-28652.json @@ -2,8 +2,8 @@ "id": "CVE-2022-28652", "sourceIdentifier": "security@ubuntu.com", "published": "2024-06-04T22:15:09.780", - "lastModified": "2024-06-05T12:53:50.240", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-06-11T17:05:08.087", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -14,15 +14,104 @@ "value": "~/.config/apport/settings el an\u00e1lisis es vulnerable al ataque de \"billion laughs\"" } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-776" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:apport_project:apport:*:*:*:*:*:*:*:*", + "versionEndExcluding": "2.21.0", + "matchCriteriaId": "AD92D087-0439-48BE-9B32-5156B335A145" + } + ] + } + ] + }, + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:esm:*:*:*", + "matchCriteriaId": "B3293E55-5506-4587-A318-D1734F781C09" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:canonical:ubuntu_linux:20.04:*:*:*:lts:*:*:*", + "matchCriteriaId": "902B8056-9E37-443B-8905-8AA93E2447FB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:canonical:ubuntu_linux:21.10:*:*:*:*:*:*:*", + "matchCriteriaId": "AAE4D2D0-CEEB-416F-8BC5-A7987DF56190" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:canonical:ubuntu_linux:22.04:*:*:*:lts:*:*:*", + "matchCriteriaId": "359012F1-2C63-415A-88B8-6726A87830DE" + } + ] + } + ] + } + ], "references": [ { "url": "https://ubuntu.com/security/notices/USN-5427-1", - "source": "security@ubuntu.com" + "source": "security@ubuntu.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://www.cve.org/CVERecord?id=CVE-2022-28652", - "source": "security@ubuntu.com" + "source": "security@ubuntu.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2022/CVE-2022-286xx/CVE-2022-28654.json b/CVE-2022/CVE-2022-286xx/CVE-2022-28654.json index 4514c6c187c..6a9f31d1e31 100644 --- a/CVE-2022/CVE-2022-286xx/CVE-2022-28654.json +++ b/CVE-2022/CVE-2022-286xx/CVE-2022-28654.json @@ -2,8 +2,8 @@ "id": "CVE-2022-28654", "sourceIdentifier": "security@ubuntu.com", "published": "2024-06-04T22:15:09.870", - "lastModified": "2024-06-05T12:53:50.240", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-06-11T17:04:47.620", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -14,15 +14,104 @@ "value": "is_closing_session() permite a los usuarios completar apport.log" } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-770" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:apport_project:apport:*:*:*:*:*:*:*:*", + "versionEndExcluding": "2.21.0", + "matchCriteriaId": "AD92D087-0439-48BE-9B32-5156B335A145" + } + ] + } + ] + }, + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:esm:*:*:*", + "matchCriteriaId": "B3293E55-5506-4587-A318-D1734F781C09" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:canonical:ubuntu_linux:20.04:*:*:*:lts:*:*:*", + "matchCriteriaId": "902B8056-9E37-443B-8905-8AA93E2447FB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:canonical:ubuntu_linux:21.10:*:*:*:-:*:*:*", + "matchCriteriaId": "3D94DA3B-FA74-4526-A0A0-A872684598C6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:canonical:ubuntu_linux:22.04:*:*:*:lts:*:*:*", + "matchCriteriaId": "359012F1-2C63-415A-88B8-6726A87830DE" + } + ] + } + ] + } + ], "references": [ { "url": "https://ubuntu.com/security/notices/USN-5427-1", - "source": "security@ubuntu.com" + "source": "security@ubuntu.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://www.cve.org/CVERecord?id=CVE-2022-28654", - "source": "security@ubuntu.com" + "source": "security@ubuntu.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2022/CVE-2022-286xx/CVE-2022-28655.json b/CVE-2022/CVE-2022-286xx/CVE-2022-28655.json index 393e560a7d0..84546a21fa4 100644 --- a/CVE-2022/CVE-2022-286xx/CVE-2022-28655.json +++ b/CVE-2022/CVE-2022-286xx/CVE-2022-28655.json @@ -2,8 +2,8 @@ "id": "CVE-2022-28655", "sourceIdentifier": "security@ubuntu.com", "published": "2024-06-04T22:15:09.940", - "lastModified": "2024-06-05T12:53:50.240", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-06-11T17:04:20.947", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -14,15 +14,104 @@ "value": "is_closing_session() permite a los usuarios crear conexiones tcp dbus arbitrarias" } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.1, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.2 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-770" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:apport_project:apport:*:*:*:*:*:*:*:*", + "versionEndExcluding": "2.21.0", + "matchCriteriaId": "AD92D087-0439-48BE-9B32-5156B335A145" + } + ] + } + ] + }, + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:esm:*:*:*", + "matchCriteriaId": "B3293E55-5506-4587-A318-D1734F781C09" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:canonical:ubuntu_linux:20.04:*:*:*:lts:*:*:*", + "matchCriteriaId": "902B8056-9E37-443B-8905-8AA93E2447FB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:canonical:ubuntu_linux:21.10:*:*:*:-:*:*:*", + "matchCriteriaId": "3D94DA3B-FA74-4526-A0A0-A872684598C6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:canonical:ubuntu_linux:22.04:*:*:*:lts:*:*:*", + "matchCriteriaId": "359012F1-2C63-415A-88B8-6726A87830DE" + } + ] + } + ] + } + ], "references": [ { "url": "https://ubuntu.com/security/notices/USN-5427-1", - "source": "security@ubuntu.com" + "source": "security@ubuntu.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://www.cve.org/CVERecord?id=CVE-2022-28655", - "source": "security@ubuntu.com" + "source": "security@ubuntu.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2022/CVE-2022-286xx/CVE-2022-28656.json b/CVE-2022/CVE-2022-286xx/CVE-2022-28656.json index b3eae97730c..f8905f6b6ca 100644 --- a/CVE-2022/CVE-2022-286xx/CVE-2022-28656.json +++ b/CVE-2022/CVE-2022-286xx/CVE-2022-28656.json @@ -2,8 +2,8 @@ "id": "CVE-2022-28656", "sourceIdentifier": "security@ubuntu.com", "published": "2024-06-04T22:15:10.007", - "lastModified": "2024-06-05T12:53:50.240", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-06-11T17:02:46.767", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -14,15 +14,104 @@ "value": "is_closing_session() permite a los usuarios consumir RAM en el proceso de Apport" } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-770" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:apport_project:apport:*:*:*:*:*:*:*:*", + "versionEndExcluding": "2.21.0", + "matchCriteriaId": "AD92D087-0439-48BE-9B32-5156B335A145" + } + ] + } + ] + }, + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:esm:*:*:*", + "matchCriteriaId": "B3293E55-5506-4587-A318-D1734F781C09" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:canonical:ubuntu_linux:20.04:*:*:*:lts:*:*:*", + "matchCriteriaId": "902B8056-9E37-443B-8905-8AA93E2447FB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:canonical:ubuntu_linux:21.10:*:*:*:-:*:*:*", + "matchCriteriaId": "3D94DA3B-FA74-4526-A0A0-A872684598C6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:canonical:ubuntu_linux:22.04:*:*:*:lts:*:*:*", + "matchCriteriaId": "359012F1-2C63-415A-88B8-6726A87830DE" + } + ] + } + ] + } + ], "references": [ { "url": "https://ubuntu.com/security/notices/USN-5427-1", - "source": "security@ubuntu.com" + "source": "security@ubuntu.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://www.cve.org/CVERecord?id=CVE-2022-28656", - "source": "security@ubuntu.com" + "source": "security@ubuntu.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2022/CVE-2022-286xx/CVE-2022-28657.json b/CVE-2022/CVE-2022-286xx/CVE-2022-28657.json index 890de5217eb..8849b2b50ac 100644 --- a/CVE-2022/CVE-2022-286xx/CVE-2022-28657.json +++ b/CVE-2022/CVE-2022-286xx/CVE-2022-28657.json @@ -2,8 +2,8 @@ "id": "CVE-2022-28657", "sourceIdentifier": "security@ubuntu.com", "published": "2024-06-04T22:15:10.087", - "lastModified": "2024-06-05T12:53:50.240", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-06-11T17:02:05.497", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -14,15 +14,104 @@ "value": "Apport no desactiva el controlador de fallos de Python antes de ingresar a chroot" } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:apport_project:apport:*:*:*:*:*:*:*:*", + "versionEndExcluding": "2.21.0", + "matchCriteriaId": "AD92D087-0439-48BE-9B32-5156B335A145" + } + ] + } + ] + }, + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:esm:*:*:*", + "matchCriteriaId": "B3293E55-5506-4587-A318-D1734F781C09" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:canonical:ubuntu_linux:20.04:*:*:*:lts:*:*:*", + "matchCriteriaId": "902B8056-9E37-443B-8905-8AA93E2447FB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:canonical:ubuntu_linux:21.10:*:*:*:-:*:*:*", + "matchCriteriaId": "3D94DA3B-FA74-4526-A0A0-A872684598C6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:canonical:ubuntu_linux:22.04:*:*:*:lts:*:*:*", + "matchCriteriaId": "359012F1-2C63-415A-88B8-6726A87830DE" + } + ] + } + ] + } + ], "references": [ { "url": "https://ubuntu.com/security/notices/USN-5427-1", - "source": "security@ubuntu.com" + "source": "security@ubuntu.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://www.cve.org/CVERecord?id=CVE-2022-28657", - "source": "security@ubuntu.com" + "source": "security@ubuntu.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2022/CVE-2022-286xx/CVE-2022-28658.json b/CVE-2022/CVE-2022-286xx/CVE-2022-28658.json index 3ca5c4d7dd1..224cece3488 100644 --- a/CVE-2022/CVE-2022-286xx/CVE-2022-28658.json +++ b/CVE-2022/CVE-2022-286xx/CVE-2022-28658.json @@ -2,8 +2,8 @@ "id": "CVE-2022-28658", "sourceIdentifier": "security@ubuntu.com", "published": "2024-06-04T22:15:10.153", - "lastModified": "2024-06-05T12:53:50.240", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-06-11T16:56:43.970", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -14,15 +14,104 @@ "value": "El an\u00e1lisis de argumentos de Apport maneja mal la divisi\u00f3n de nombres de archivos en n\u00facleos m\u00e1s antiguos, lo que resulta en suplantaci\u00f3n de argumentos" } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:apport_project:apport:*:*:*:*:*:*:*:*", + "versionEndExcluding": "2.21.0", + "matchCriteriaId": "AD92D087-0439-48BE-9B32-5156B335A145" + } + ] + } + ] + }, + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:esm:*:*:*", + "matchCriteriaId": "B3293E55-5506-4587-A318-D1734F781C09" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:canonical:ubuntu_linux:20.04:*:*:*:lts:*:*:*", + "matchCriteriaId": "902B8056-9E37-443B-8905-8AA93E2447FB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:canonical:ubuntu_linux:21.10:*:*:*:-:*:*:*", + "matchCriteriaId": "3D94DA3B-FA74-4526-A0A0-A872684598C6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:canonical:ubuntu_linux:22.04:*:*:*:lts:*:*:*", + "matchCriteriaId": "359012F1-2C63-415A-88B8-6726A87830DE" + } + ] + } + ] + } + ], "references": [ { "url": "https://ubuntu.com/security/notices/USN-5427-1", - "source": "security@ubuntu.com" + "source": "security@ubuntu.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://www.cve.org/CVERecord?id=CVE-2022-28658", - "source": "security@ubuntu.com" + "source": "security@ubuntu.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-482xx/CVE-2023-48273.json b/CVE-2023/CVE-2023-482xx/CVE-2023-48273.json new file mode 100644 index 00000000000..473cc437d41 --- /dev/null +++ b/CVE-2023/CVE-2023-482xx/CVE-2023-48273.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2023-48273", + "sourceIdentifier": "audit@patchstack.com", + "published": "2024-06-11T17:15:50.087", + "lastModified": "2024-06-11T17:15:50.087", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Missing Authorization vulnerability in WP OnlineSupport, Essential Plugin Preloader for Website.This issue affects Preloader for Website: from n/a through 1.2.2." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/vulnerability/preloader-for-website/wordpress-preloader-for-website-plugin-1-2-2-unauthenticated-broken-access-control-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-515xx/CVE-2023-51519.json b/CVE-2023/CVE-2023-515xx/CVE-2023-51519.json new file mode 100644 index 00000000000..aec3d090174 --- /dev/null +++ b/CVE-2023/CVE-2023-515xx/CVE-2023-51519.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2023-51519", + "sourceIdentifier": "audit@patchstack.com", + "published": "2024-06-11T16:15:16.277", + "lastModified": "2024-06-11T16:15:16.277", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Missing Authorization vulnerability in Soliloquy Team Slider by Soliloquy.This issue affects Slider by Soliloquy: from n/a through 2.7.2." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 4.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/vulnerability/soliloquy-lite/wordpress-slider-by-soliloquy-responsive-image-slider-for-wordpress-plugin-2-7-2-broken-access-control-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-516xx/CVE-2023-51682.json b/CVE-2023/CVE-2023-516xx/CVE-2023-51682.json new file mode 100644 index 00000000000..34f2296c5a3 --- /dev/null +++ b/CVE-2023/CVE-2023-516xx/CVE-2023-51682.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2023-51682", + "sourceIdentifier": "audit@patchstack.com", + "published": "2024-06-11T16:15:16.510", + "lastModified": "2024-06-11T16:15:16.510", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Missing Authorization vulnerability in ibericode MC4WP.This issue affects MC4WP: from n/a through 4.9.9." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 5.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/vulnerability/mailchimp-for-wp/wordpress-mc4wp-plugin-4-9-9-broken-access-control-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-522xx/CVE-2023-52224.json b/CVE-2023/CVE-2023-522xx/CVE-2023-52224.json new file mode 100644 index 00000000000..8fce96e33ea --- /dev/null +++ b/CVE-2023/CVE-2023-522xx/CVE-2023-52224.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2023-52224", + "sourceIdentifier": "audit@patchstack.com", + "published": "2024-06-11T17:15:50.363", + "lastModified": "2024-06-11T17:15:50.363", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Missing Authorization vulnerability in Revolut Revolut Gateway for WooCommerce.This issue affects Revolut Gateway for WooCommerce: from n/a through 4.9.7." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "LOW", + "baseScore": 4.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/vulnerability/revolut-gateway-for-woocommerce/wordpress-revolut-gateway-for-woocommerce-plugin-4-9-5-broken-access-control-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-522xx/CVE-2023-52227.json b/CVE-2023/CVE-2023-522xx/CVE-2023-52227.json new file mode 100644 index 00000000000..f0e198416a6 --- /dev/null +++ b/CVE-2023/CVE-2023-522xx/CVE-2023-52227.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2023-52227", + "sourceIdentifier": "audit@patchstack.com", + "published": "2024-06-11T17:15:50.583", + "lastModified": "2024-06-11T17:15:50.583", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Missing Authorization vulnerability in MailerLite MailerLite \u2013 WooCommerce integration.This issue affects MailerLite \u2013 WooCommerce integration: from n/a through 2.0.8." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 4.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/vulnerability/woo-mailerlite/wordpress-mailerlite-woocommerce-integration-plugin-2-0-7-broken-access-control-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-522xx/CVE-2023-52233.json b/CVE-2023/CVE-2023-522xx/CVE-2023-52233.json new file mode 100644 index 00000000000..8ef980a7652 --- /dev/null +++ b/CVE-2023/CVE-2023-522xx/CVE-2023-52233.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2023-52233", + "sourceIdentifier": "audit@patchstack.com", + "published": "2024-06-11T16:15:16.757", + "lastModified": "2024-06-11T16:15:16.757", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Missing Authorization vulnerability in Post SMTP Post SMTP Mailer/Email Log.This issue affects Post SMTP Mailer/Email Log: from n/a through 2.8.6." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "HIGH", + "availabilityImpact": "LOW", + "baseScore": 8.6, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 4.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/vulnerability/post-smtp/wordpress-post-smtp-mailer-plugin-2-8-6-broken-access-control-on-api-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-11xx/CVE-2024-1164.json b/CVE-2024/CVE-2024-11xx/CVE-2024-1164.json index 9c1c9cb1e27..698c84a527f 100644 --- a/CVE-2024/CVE-2024-11xx/CVE-2024-1164.json +++ b/CVE-2024/CVE-2024-11xx/CVE-2024-1164.json @@ -2,8 +2,8 @@ "id": "CVE-2024-1164", "sourceIdentifier": "security@wordfence.com", "published": "2024-06-05T07:15:45.310", - "lastModified": "2024-06-05T12:53:50.240", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-06-11T17:14:02.340", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -17,8 +17,28 @@ "metrics": { "cvssMetricV31": [ { - "source": "security@wordfence.com", + "source": "nvd@nist.gov", "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 + }, + { + "source": "security@wordfence.com", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N", @@ -38,14 +58,50 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:brizy:brizy-page_builder:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "2.4.44", + "matchCriteriaId": "0E89EC06-A340-4DE2-B625-4AC05E3C42F6" + } + ] + } + ] + } + ], "references": [ { "url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&new=3086506%40brizy%2Ftrunk&old=3058896%40brizy%2Ftrunk&sfp_email=&sfph_mail=", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Patch" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/9746cd9f-afb2-41b2-9e31-7c77222d9cfd?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-12xx/CVE-2024-1272.json b/CVE-2024/CVE-2024-12xx/CVE-2024-1272.json index 1e7f528b994..52ca468fdd3 100644 --- a/CVE-2024/CVE-2024-12xx/CVE-2024-1272.json +++ b/CVE-2024/CVE-2024-12xx/CVE-2024-1272.json @@ -2,8 +2,8 @@ "id": "CVE-2024-1272", "sourceIdentifier": "iletisim@usom.gov.tr", "published": "2024-06-05T09:15:09.620", - "lastModified": "2024-06-05T12:53:50.240", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-06-11T17:34:25.347", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -17,8 +17,28 @@ "metrics": { "cvssMetricV31": [ { - "source": "iletisim@usom.gov.tr", + "source": "nvd@nist.gov", "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + }, + { + "source": "iletisim@usom.gov.tr", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", @@ -39,6 +59,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-Other" + } + ] + }, { "source": "iletisim@usom.gov.tr", "type": "Secondary", @@ -50,10 +80,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:tnbmobil:cockpit:*:*:*:*:*:*:*:*", + "versionEndExcluding": "0.251.1", + "matchCriteriaId": "DD0B9EF1-1C4D-4A5F-AB09-943514CDDBAB" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.usom.gov.tr/bildirim/tr-24-0601", - "source": "iletisim@usom.gov.tr" + "source": "iletisim@usom.gov.tr", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-16xx/CVE-2024-1662.json b/CVE-2024/CVE-2024-16xx/CVE-2024-1662.json index 5c5cb307082..0492dd4eaaa 100644 --- a/CVE-2024/CVE-2024-16xx/CVE-2024-1662.json +++ b/CVE-2024/CVE-2024-16xx/CVE-2024-1662.json @@ -2,8 +2,8 @@ "id": "CVE-2024-1662", "sourceIdentifier": "iletisim@usom.gov.tr", "published": "2024-06-05T12:15:10.213", - "lastModified": "2024-06-05T12:53:50.240", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-06-11T17:27:19.127", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -17,8 +17,28 @@ "metrics": { "cvssMetricV31": [ { - "source": "iletisim@usom.gov.tr", + "source": "nvd@nist.gov", "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + }, + { + "source": "iletisim@usom.gov.tr", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N", @@ -40,8 +60,18 @@ }, "weaknesses": [ { - "source": "iletisim@usom.gov.tr", + "source": "nvd@nist.gov", "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + }, + { + "source": "iletisim@usom.gov.tr", + "type": "Secondary", "description": [ { "lang": "en", @@ -50,10 +80,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:porty:powerbank:*:*:*:*:*:*:*:*", + "versionEndExcluding": "2.02", + "matchCriteriaId": "F1AA3CA3-6C96-4619-8691-F6BD65B7FCD8" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.usom.gov.tr/bildirim/tr-24-0602", - "source": "iletisim@usom.gov.tr" + "source": "iletisim@usom.gov.tr", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-206xx/CVE-2024-20671.json b/CVE-2024/CVE-2024-206xx/CVE-2024-20671.json index 175a94943a4..9f816580206 100644 --- a/CVE-2024/CVE-2024-206xx/CVE-2024-20671.json +++ b/CVE-2024/CVE-2024-206xx/CVE-2024-20671.json @@ -2,7 +2,7 @@ "id": "CVE-2024-20671", "sourceIdentifier": "secure@microsoft.com", "published": "2024-03-12T17:15:48.963", - "lastModified": "2024-03-12T17:46:17.273", + "lastModified": "2024-06-11T16:15:17.183", "vulnStatus": "Awaiting Analysis", "descriptions": [ { @@ -38,6 +38,18 @@ } ] }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-276" + } + ] + } + ], "references": [ { "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-20671", diff --git a/CVE-2024/CVE-2024-214xx/CVE-2024-21408.json b/CVE-2024/CVE-2024-214xx/CVE-2024-21408.json index 44fe590cee1..dce550d6636 100644 --- a/CVE-2024/CVE-2024-214xx/CVE-2024-21408.json +++ b/CVE-2024/CVE-2024-214xx/CVE-2024-21408.json @@ -2,8 +2,8 @@ "id": "CVE-2024-21408", "sourceIdentifier": "secure@microsoft.com", "published": "2024-03-12T17:15:50.127", - "lastModified": "2024-03-21T21:06:09.543", - "vulnStatus": "Analyzed", + "lastModified": "2024-06-11T16:15:17.727", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -48,6 +48,16 @@ "value": "NVD-CWE-noinfo" } ] + }, + { + "source": "secure@microsoft.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-835" + } + ] } ], "configurations": [ diff --git a/CVE-2024/CVE-2024-214xx/CVE-2024-21411.json b/CVE-2024/CVE-2024-214xx/CVE-2024-21411.json index 52b09d94a81..1dea766269f 100644 --- a/CVE-2024/CVE-2024-214xx/CVE-2024-21411.json +++ b/CVE-2024/CVE-2024-214xx/CVE-2024-21411.json @@ -2,7 +2,7 @@ "id": "CVE-2024-21411", "sourceIdentifier": "secure@microsoft.com", "published": "2024-03-12T17:15:50.290", - "lastModified": "2024-03-12T17:46:17.273", + "lastModified": "2024-06-11T16:15:17.890", "vulnStatus": "Awaiting Analysis", "descriptions": [ { @@ -38,6 +38,18 @@ } ] }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-453" + } + ] + } + ], "references": [ { "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21411", diff --git a/CVE-2024/CVE-2024-214xx/CVE-2024-21431.json b/CVE-2024/CVE-2024-214xx/CVE-2024-21431.json index 9b7ca6b99f0..684495340d2 100644 --- a/CVE-2024/CVE-2024-214xx/CVE-2024-21431.json +++ b/CVE-2024/CVE-2024-214xx/CVE-2024-21431.json @@ -2,7 +2,7 @@ "id": "CVE-2024-21431", "sourceIdentifier": "secure@microsoft.com", "published": "2024-03-12T17:15:51.743", - "lastModified": "2024-03-12T17:46:17.273", + "lastModified": "2024-06-11T16:15:18.230", "vulnStatus": "Awaiting Analysis", "descriptions": [ { @@ -38,6 +38,18 @@ } ] }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-732" + } + ] + } + ], "references": [ { "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21431", diff --git a/CVE-2024/CVE-2024-214xx/CVE-2024-21433.json b/CVE-2024/CVE-2024-214xx/CVE-2024-21433.json index 94abc04228e..f9fb524640c 100644 --- a/CVE-2024/CVE-2024-214xx/CVE-2024-21433.json +++ b/CVE-2024/CVE-2024-214xx/CVE-2024-21433.json @@ -2,7 +2,7 @@ "id": "CVE-2024-21433", "sourceIdentifier": "secure@microsoft.com", "published": "2024-03-12T17:15:52.063", - "lastModified": "2024-03-12T17:46:17.273", + "lastModified": "2024-06-11T16:15:18.377", "vulnStatus": "Awaiting Analysis", "descriptions": [ { @@ -38,6 +38,18 @@ } ] }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-367" + } + ] + } + ], "references": [ { "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21433", diff --git a/CVE-2024/CVE-2024-235xx/CVE-2024-23503.json b/CVE-2024/CVE-2024-235xx/CVE-2024-23503.json new file mode 100644 index 00000000000..498a5947b58 --- /dev/null +++ b/CVE-2024/CVE-2024-235xx/CVE-2024-23503.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2024-23503", + "sourceIdentifier": "audit@patchstack.com", + "published": "2024-06-11T16:15:18.990", + "lastModified": "2024-06-11T16:15:18.990", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Missing Authorization vulnerability in WPManageNinja LLC Ninja Tables.This issue affects Ninja Tables: from n/a through 5.0.6." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 4.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/vulnerability/ninja-tables/wordpress-ninja-tables-plugin-5-0-5-broken-access-control-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-235xx/CVE-2024-23518.json b/CVE-2024/CVE-2024-235xx/CVE-2024-23518.json new file mode 100644 index 00000000000..d1bfe1a0110 --- /dev/null +++ b/CVE-2024/CVE-2024-235xx/CVE-2024-23518.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2024-23518", + "sourceIdentifier": "audit@patchstack.com", + "published": "2024-06-11T17:15:50.973", + "lastModified": "2024-06-11T17:15:50.973", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Missing Authorization vulnerability in Navneil Naicker ACF Photo Gallery Field.This issue affects ACF Photo Gallery Field: from n/a through 2.6." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 4.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/vulnerability/navz-photo-gallery/wordpress-acf-photo-gallery-field-plugin-2-5-broken-access-control-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-235xx/CVE-2024-23521.json b/CVE-2024/CVE-2024-235xx/CVE-2024-23521.json new file mode 100644 index 00000000000..7952aa0b011 --- /dev/null +++ b/CVE-2024/CVE-2024-235xx/CVE-2024-23521.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2024-23521", + "sourceIdentifier": "audit@patchstack.com", + "published": "2024-06-11T16:15:19.223", + "lastModified": "2024-06-11T16:15:19.223", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Missing Authorization vulnerability in Happyforms.This issue affects Happyforms: from n/a through 1.25.10." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/vulnerability/happyforms/wordpress-happyforms-plugin-1-25-10-broken-access-control-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-236xx/CVE-2024-23669.json b/CVE-2024/CVE-2024-236xx/CVE-2024-23669.json index a9a3c6cb1f6..11855868d13 100644 --- a/CVE-2024/CVE-2024-236xx/CVE-2024-23669.json +++ b/CVE-2024/CVE-2024-236xx/CVE-2024-23669.json @@ -2,8 +2,8 @@ "id": "CVE-2024-23669", "sourceIdentifier": "psirt@fortinet.com", "published": "2024-06-05T08:15:09.537", - "lastModified": "2024-06-05T12:53:50.240", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-06-11T17:09:43.840", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -16,6 +16,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + }, { "source": "psirt@fortinet.com", "type": "Secondary", @@ -40,8 +60,18 @@ }, "weaknesses": [ { - "source": "psirt@fortinet.com", + "source": "nvd@nist.gov", "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-863" + } + ] + }, + { + "source": "psirt@fortinet.com", + "type": "Secondary", "description": [ { "lang": "en", @@ -50,10 +80,54 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:fortinet:fortiwebmanager:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.2.3", + "versionEndExcluding": "6.2.5", + "matchCriteriaId": "C00F44FF-9533-4354-9060-A74E8F43E747" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:fortinet:fortiwebmanager:*:*:*:*:*:*:*:*", + "versionStartIncluding": "7.0.0", + "versionEndExcluding": "7.0.5", + "matchCriteriaId": "403F07C3-8D48-4403-B9EE-0076F8639CB1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:fortinet:fortiwebmanager:6.0.2:*:*:*:*:*:*:*", + "matchCriteriaId": "6AB742D6-5B08-4FF7-A366-F4CE1E91C9A0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:fortinet:fortiwebmanager:6.3.0:*:*:*:*:*:*:*", + "matchCriteriaId": "A921BEEB-D912-471E-8176-8804F5CD5118" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:fortinet:fortiwebmanager:7.2.0:*:*:*:*:*:*:*", + "matchCriteriaId": "1C7475A8-52EB-413E-A196-6F43137B545F" + } + ] + } + ] + } + ], "references": [ { "url": "https://fortiguard.fortinet.com/psirt/FG-IR-23-222", - "source": "psirt@fortinet.com" + "source": "psirt@fortinet.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-23xx/CVE-2024-2368.json b/CVE-2024/CVE-2024-23xx/CVE-2024-2368.json index 2a6dda4652f..16186b298c4 100644 --- a/CVE-2024/CVE-2024-23xx/CVE-2024-2368.json +++ b/CVE-2024/CVE-2024-23xx/CVE-2024-2368.json @@ -2,8 +2,8 @@ "id": "CVE-2024-2368", "sourceIdentifier": "security@wordfence.com", "published": "2024-06-05T07:15:45.690", - "lastModified": "2024-06-05T12:53:50.240", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-06-11T17:13:40.087", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -38,14 +38,50 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:wobbie:mollie_forms:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "2.6.14", + "matchCriteriaId": "78F6242C-5EC6-4BC9-9F62-D2E3E86A2BE2" + } + ] + } + ] + } + ], "references": [ { "url": "https://plugins.trac.wordpress.org/changeset/3097426/mollie-forms", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Patch" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/51ff10f2-4a5b-42ab-9ee2-95b036ac1c9a?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-261xx/CVE-2024-26163.json b/CVE-2024/CVE-2024-261xx/CVE-2024-26163.json index efec82d1336..339b0528bc3 100644 --- a/CVE-2024/CVE-2024-261xx/CVE-2024-26163.json +++ b/CVE-2024/CVE-2024-261xx/CVE-2024-26163.json @@ -2,8 +2,8 @@ "id": "CVE-2024-26163", "sourceIdentifier": "secure@microsoft.com", "published": "2024-03-14T23:15:45.813", - "lastModified": "2024-03-19T17:03:03.383", - "vulnStatus": "Analyzed", + "lastModified": "2024-06-11T16:15:19.610", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -48,6 +48,16 @@ "value": "NVD-CWE-noinfo" } ] + }, + { + "source": "secure@microsoft.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-693" + } + ] } ], "configurations": [ diff --git a/CVE-2024/CVE-2024-261xx/CVE-2024-26165.json b/CVE-2024/CVE-2024-261xx/CVE-2024-26165.json index dc4b3f8d7ef..2e8767fb336 100644 --- a/CVE-2024/CVE-2024-261xx/CVE-2024-26165.json +++ b/CVE-2024/CVE-2024-261xx/CVE-2024-26165.json @@ -2,7 +2,7 @@ "id": "CVE-2024-26165", "sourceIdentifier": "secure@microsoft.com", "published": "2024-03-12T17:15:55.817", - "lastModified": "2024-03-12T17:46:17.273", + "lastModified": "2024-06-11T16:15:19.780", "vulnStatus": "Awaiting Analysis", "descriptions": [ { @@ -38,6 +38,18 @@ } ] }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-256" + } + ] + } + ], "references": [ { "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-26165", diff --git a/CVE-2024/CVE-2024-261xx/CVE-2024-26167.json b/CVE-2024/CVE-2024-261xx/CVE-2024-26167.json index 7819b3b0c57..e33187850b2 100644 --- a/CVE-2024/CVE-2024-261xx/CVE-2024-26167.json +++ b/CVE-2024/CVE-2024-261xx/CVE-2024-26167.json @@ -2,7 +2,7 @@ "id": "CVE-2024-26167", "sourceIdentifier": "secure@microsoft.com", "published": "2024-03-07T21:15:08.273", - "lastModified": "2024-03-08T14:02:57.420", + "lastModified": "2024-06-11T16:15:19.920", "vulnStatus": "Awaiting Analysis", "descriptions": [ { @@ -38,6 +38,18 @@ } ] }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-1021" + } + ] + } + ], "references": [ { "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-26167", diff --git a/CVE-2024/CVE-2024-261xx/CVE-2024-26173.json b/CVE-2024/CVE-2024-261xx/CVE-2024-26173.json index b62324c6a38..8ba0620412c 100644 --- a/CVE-2024/CVE-2024-261xx/CVE-2024-26173.json +++ b/CVE-2024/CVE-2024-261xx/CVE-2024-26173.json @@ -2,7 +2,7 @@ "id": "CVE-2024-26173", "sourceIdentifier": "secure@microsoft.com", "published": "2024-03-12T17:15:56.543", - "lastModified": "2024-03-12T17:46:17.273", + "lastModified": "2024-06-11T16:15:20.190", "vulnStatus": "Awaiting Analysis", "descriptions": [ { @@ -38,6 +38,18 @@ } ] }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-20" + } + ] + } + ], "references": [ { "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-26173", diff --git a/CVE-2024/CVE-2024-261xx/CVE-2024-26181.json b/CVE-2024/CVE-2024-261xx/CVE-2024-26181.json index e7013a1e4c2..5da8599f831 100644 --- a/CVE-2024/CVE-2024-261xx/CVE-2024-26181.json +++ b/CVE-2024/CVE-2024-261xx/CVE-2024-26181.json @@ -2,7 +2,7 @@ "id": "CVE-2024-26181", "sourceIdentifier": "secure@microsoft.com", "published": "2024-03-12T17:15:57.380", - "lastModified": "2024-03-12T17:46:17.273", + "lastModified": "2024-06-11T16:15:20.530", "vulnStatus": "Awaiting Analysis", "descriptions": [ { @@ -38,6 +38,18 @@ } ] }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-20" + } + ] + } + ], "references": [ { "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-26181", diff --git a/CVE-2024/CVE-2024-262xx/CVE-2024-26246.json b/CVE-2024/CVE-2024-262xx/CVE-2024-26246.json index c0cbc1fd33c..b7a718ab53f 100644 --- a/CVE-2024/CVE-2024-262xx/CVE-2024-26246.json +++ b/CVE-2024/CVE-2024-262xx/CVE-2024-26246.json @@ -2,8 +2,8 @@ "id": "CVE-2024-26246", "sourceIdentifier": "secure@microsoft.com", "published": "2024-03-14T23:15:46.230", - "lastModified": "2024-03-19T17:05:45.193", - "vulnStatus": "Analyzed", + "lastModified": "2024-06-11T16:15:22.197", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -68,6 +68,16 @@ "value": "NVD-CWE-noinfo" } ] + }, + { + "source": "secure@microsoft.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-1220" + } + ] } ], "configurations": [ diff --git a/CVE-2024/CVE-2024-262xx/CVE-2024-26247.json b/CVE-2024/CVE-2024-262xx/CVE-2024-26247.json index 681a5235dc4..fafe8d88961 100644 --- a/CVE-2024/CVE-2024-262xx/CVE-2024-26247.json +++ b/CVE-2024/CVE-2024-262xx/CVE-2024-26247.json @@ -2,8 +2,8 @@ "id": "CVE-2024-26247", "sourceIdentifier": "secure@microsoft.com", "published": "2024-03-22T22:15:50.247", - "lastModified": "2024-03-26T03:18:26.197", - "vulnStatus": "Analyzed", + "lastModified": "2024-06-11T16:15:22.333", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -48,6 +48,16 @@ "value": "NVD-CWE-noinfo" } ] + }, + { + "source": "secure@microsoft.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-269" + } + ] } ], "configurations": [ diff --git a/CVE-2024/CVE-2024-263xx/CVE-2024-26330.json b/CVE-2024/CVE-2024-263xx/CVE-2024-26330.json new file mode 100644 index 00000000000..0de0b97c4e9 --- /dev/null +++ b/CVE-2024/CVE-2024-263xx/CVE-2024-26330.json @@ -0,0 +1,20 @@ +{ + "id": "CVE-2024-26330", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-06-11T17:15:51.260", + "lastModified": "2024-06-11T17:15:51.260", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "An issue was discovered in Kape CyberGhostVPN 8.4.3.12823 on Windows. After a successful logout, user credentials remain in memory while the process is still open, and can be obtained by dumping the process memory and parsing it." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://www.secuvera.de/advisories/secuvera-SA-2024-04.txt", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-289xx/CVE-2024-28995.json b/CVE-2024/CVE-2024-289xx/CVE-2024-28995.json index f3ecc63cd71..fb1b02add60 100644 --- a/CVE-2024/CVE-2024-289xx/CVE-2024-28995.json +++ b/CVE-2024/CVE-2024-289xx/CVE-2024-28995.json @@ -2,8 +2,8 @@ "id": "CVE-2024-28995", "sourceIdentifier": "psirt@solarwinds.com", "published": "2024-06-06T09:15:14.167", - "lastModified": "2024-06-06T14:17:35.017", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-06-11T17:47:22.867", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -17,8 +17,28 @@ "metrics": { "cvssMetricV31": [ { - "source": "psirt@solarwinds.com", + "source": "nvd@nist.gov", "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + }, + { + "source": "psirt@solarwinds.com", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N", @@ -50,10 +70,41 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:solarwinds:serv-u:*:*:*:*:*:*:*:*", + "versionEndExcluding": "15.4.2", + "matchCriteriaId": "F4075BBF-2BC5-494C-81ED-AC85AD8D30CF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:solarwinds:serv-u:15.4.2:-:*:*:*:*:*:*", + "matchCriteriaId": "60A6B282-872E-4228-A884-5DC5B44046BB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:solarwinds:serv-u:15.4.2:hotfix1:*:*:*:*:*:*", + "matchCriteriaId": "EBDF03FF-C508-42BD-9B70-9F972A14087B" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.solarwinds.com/trust-center/security-advisories/CVE-2024-28995", - "source": "psirt@solarwinds.com" + "source": "psirt@solarwinds.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-290xx/CVE-2024-29057.json b/CVE-2024/CVE-2024-290xx/CVE-2024-29057.json index bbf713217a6..6eb8ac2ebbb 100644 --- a/CVE-2024/CVE-2024-290xx/CVE-2024-29057.json +++ b/CVE-2024/CVE-2024-290xx/CVE-2024-29057.json @@ -2,8 +2,8 @@ "id": "CVE-2024-29057", "sourceIdentifier": "secure@microsoft.com", "published": "2024-03-22T22:15:50.450", - "lastModified": "2024-03-26T03:18:48.760", - "vulnStatus": "Analyzed", + "lastModified": "2024-06-11T16:15:24.533", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -68,6 +68,16 @@ "value": "NVD-CWE-noinfo" } ] + }, + { + "source": "secure@microsoft.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-357" + } + ] } ], "configurations": [ diff --git a/CVE-2024/CVE-2024-290xx/CVE-2024-29060.json b/CVE-2024/CVE-2024-290xx/CVE-2024-29060.json new file mode 100644 index 00000000000..dcd894fb6af --- /dev/null +++ b/CVE-2024/CVE-2024-290xx/CVE-2024-29060.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2024-29060", + "sourceIdentifier": "secure@microsoft.com", + "published": "2024-06-11T17:15:51.383", + "lastModified": "2024-06-11T17:15:51.383", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Visual Studio Elevation of Privilege Vulnerability" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:L", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "LOW", + "baseScore": 6.7, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.2, + "impactScore": 5.5 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-284" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-29060", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-299xx/CVE-2024-29987.json b/CVE-2024/CVE-2024-299xx/CVE-2024-29987.json index e49a279dd77..277b81b3f81 100644 --- a/CVE-2024/CVE-2024-299xx/CVE-2024-29987.json +++ b/CVE-2024/CVE-2024-299xx/CVE-2024-29987.json @@ -2,7 +2,7 @@ "id": "CVE-2024-29987", "sourceIdentifier": "secure@microsoft.com", "published": "2024-04-18T19:15:11.403", - "lastModified": "2024-04-19T13:10:25.637", + "lastModified": "2024-06-11T16:15:25.047", "vulnStatus": "Awaiting Analysis", "descriptions": [ { @@ -38,6 +38,18 @@ } ] }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-359" + } + ] + } + ], "references": [ { "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-29987", diff --git a/CVE-2024/CVE-2024-300xx/CVE-2024-30050.json b/CVE-2024/CVE-2024-300xx/CVE-2024-30050.json index f0ce0788819..8d892025409 100644 --- a/CVE-2024/CVE-2024-300xx/CVE-2024-30050.json +++ b/CVE-2024/CVE-2024-300xx/CVE-2024-30050.json @@ -2,7 +2,7 @@ "id": "CVE-2024-30050", "sourceIdentifier": "secure@microsoft.com", "published": "2024-05-14T17:17:21.443", - "lastModified": "2024-05-14T19:17:55.627", + "lastModified": "2024-06-11T16:15:27.137", "vulnStatus": "Awaiting Analysis", "descriptions": [ { @@ -38,6 +38,18 @@ } ] }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-693" + } + ] + } + ], "references": [ { "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30050", diff --git a/CVE-2024/CVE-2024-300xx/CVE-2024-30052.json b/CVE-2024/CVE-2024-300xx/CVE-2024-30052.json new file mode 100644 index 00000000000..c77b2f13f42 --- /dev/null +++ b/CVE-2024/CVE-2024-300xx/CVE-2024-30052.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2024-30052", + "sourceIdentifier": "secure@microsoft.com", + "published": "2024-06-11T17:15:51.600", + "lastModified": "2024-06-11T17:15:51.600", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Visual Studio Remote Code Execution Vulnerability" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N", + "attackVector": "LOCAL", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 4.7, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.0, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-693" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30052", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-300xx/CVE-2024-30062.json b/CVE-2024/CVE-2024-300xx/CVE-2024-30062.json new file mode 100644 index 00000000000..40465fb3860 --- /dev/null +++ b/CVE-2024/CVE-2024-300xx/CVE-2024-30062.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2024-30062", + "sourceIdentifier": "secure@microsoft.com", + "published": "2024-06-11T17:15:51.840", + "lastModified": "2024-06-11T17:15:51.840", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Windows Standards-Based Storage Management Service Remote Code Execution Vulnerability" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-416" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30062", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-300xx/CVE-2024-30063.json b/CVE-2024/CVE-2024-300xx/CVE-2024-30063.json new file mode 100644 index 00000000000..43b34a442ec --- /dev/null +++ b/CVE-2024/CVE-2024-300xx/CVE-2024-30063.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2024-30063", + "sourceIdentifier": "secure@microsoft.com", + "published": "2024-06-11T17:15:52.040", + "lastModified": "2024-06-11T17:15:52.040", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Windows Distributed File System (DFS) Remote Code Execution Vulnerability" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:N", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 6.7, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.5, + "impactScore": 5.2 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-641" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30063", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-300xx/CVE-2024-30064.json b/CVE-2024/CVE-2024-300xx/CVE-2024-30064.json new file mode 100644 index 00000000000..dc040b98805 --- /dev/null +++ b/CVE-2024/CVE-2024-300xx/CVE-2024-30064.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2024-30064", + "sourceIdentifier": "secure@microsoft.com", + "published": "2024-06-11T17:15:52.267", + "lastModified": "2024-06-11T17:15:52.267", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Windows Kernel Elevation of Privilege Vulnerability" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.0, + "impactScore": 6.0 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-190" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30064", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-300xx/CVE-2024-30065.json b/CVE-2024/CVE-2024-300xx/CVE-2024-30065.json new file mode 100644 index 00000000000..73bd06643ee --- /dev/null +++ b/CVE-2024/CVE-2024-300xx/CVE-2024-30065.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2024-30065", + "sourceIdentifier": "secure@microsoft.com", + "published": "2024-06-11T17:15:52.507", + "lastModified": "2024-06-11T17:15:52.507", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Windows Themes Denial of Service Vulnerability" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-59" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30065", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-300xx/CVE-2024-30066.json b/CVE-2024/CVE-2024-300xx/CVE-2024-30066.json new file mode 100644 index 00000000000..48d7c27b4ca --- /dev/null +++ b/CVE-2024/CVE-2024-300xx/CVE-2024-30066.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2024-30066", + "sourceIdentifier": "secure@microsoft.com", + "published": "2024-06-11T17:15:52.723", + "lastModified": "2024-06-11T17:15:52.723", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Winlogon Elevation of Privilege Vulnerability" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-122" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30066", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-300xx/CVE-2024-30067.json b/CVE-2024/CVE-2024-300xx/CVE-2024-30067.json new file mode 100644 index 00000000000..cda5710e057 --- /dev/null +++ b/CVE-2024/CVE-2024-300xx/CVE-2024-30067.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2024-30067", + "sourceIdentifier": "secure@microsoft.com", + "published": "2024-06-11T17:15:52.943", + "lastModified": "2024-06-11T17:15:52.943", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Winlogon Elevation of Privilege Vulnerability" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-190" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30067", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-300xx/CVE-2024-30068.json b/CVE-2024/CVE-2024-300xx/CVE-2024-30068.json new file mode 100644 index 00000000000..d55e5b508e7 --- /dev/null +++ b/CVE-2024/CVE-2024-300xx/CVE-2024-30068.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2024-30068", + "sourceIdentifier": "secure@microsoft.com", + "published": "2024-06-11T17:15:53.157", + "lastModified": "2024-06-11T17:15:53.157", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Windows Kernel Elevation of Privilege Vulnerability" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.0, + "impactScore": 6.0 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-125" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30068", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-300xx/CVE-2024-30069.json b/CVE-2024/CVE-2024-300xx/CVE-2024-30069.json new file mode 100644 index 00000000000..1d131a219d3 --- /dev/null +++ b/CVE-2024/CVE-2024-300xx/CVE-2024-30069.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2024-30069", + "sourceIdentifier": "secure@microsoft.com", + "published": "2024-06-11T17:15:53.373", + "lastModified": "2024-06-11T17:15:53.373", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Windows Remote Access Connection Manager Information Disclosure Vulnerability" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "LOCAL", + "attackComplexity": "HIGH", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 4.7, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.0, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-126" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30069", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-300xx/CVE-2024-30070.json b/CVE-2024/CVE-2024-300xx/CVE-2024-30070.json new file mode 100644 index 00000000000..7d6d133cb1a --- /dev/null +++ b/CVE-2024/CVE-2024-300xx/CVE-2024-30070.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2024-30070", + "sourceIdentifier": "secure@microsoft.com", + "published": "2024-06-11T17:15:53.593", + "lastModified": "2024-06-11T17:15:53.593", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "DHCP Server Service Denial of Service Vulnerability" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-191" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30070", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-300xx/CVE-2024-30072.json b/CVE-2024/CVE-2024-300xx/CVE-2024-30072.json new file mode 100644 index 00000000000..6b865063b56 --- /dev/null +++ b/CVE-2024/CVE-2024-300xx/CVE-2024-30072.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2024-30072", + "sourceIdentifier": "secure@microsoft.com", + "published": "2024-06-11T17:15:53.910", + "lastModified": "2024-06-11T17:15:53.910", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Microsoft Event Trace Log File Parsing Remote Code Execution Vulnerability" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-190" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30072", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-300xx/CVE-2024-30074.json b/CVE-2024/CVE-2024-300xx/CVE-2024-30074.json new file mode 100644 index 00000000000..a3ab80e61a2 --- /dev/null +++ b/CVE-2024/CVE-2024-300xx/CVE-2024-30074.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2024-30074", + "sourceIdentifier": "secure@microsoft.com", + "published": "2024-06-11T17:15:54.110", + "lastModified": "2024-06-11T17:15:54.110", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Windows Link Layer Topology Discovery Protocol Remote Code Execution Vulnerability" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.0, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.1, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-122" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30074", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-300xx/CVE-2024-30075.json b/CVE-2024/CVE-2024-300xx/CVE-2024-30075.json new file mode 100644 index 00000000000..e24297b3a7c --- /dev/null +++ b/CVE-2024/CVE-2024-300xx/CVE-2024-30075.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2024-30075", + "sourceIdentifier": "secure@microsoft.com", + "published": "2024-06-11T17:15:54.307", + "lastModified": "2024-06-11T17:15:54.307", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Windows Link Layer Topology Discovery Protocol Remote Code Execution Vulnerability" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.0, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.1, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-122" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30075", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-300xx/CVE-2024-30076.json b/CVE-2024/CVE-2024-300xx/CVE-2024-30076.json new file mode 100644 index 00000000000..3b2d1ca4009 --- /dev/null +++ b/CVE-2024/CVE-2024-300xx/CVE-2024-30076.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2024-30076", + "sourceIdentifier": "secure@microsoft.com", + "published": "2024-06-11T17:15:54.513", + "lastModified": "2024-06-11T17:15:54.513", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Windows Container Manager Service Elevation of Privilege Vulnerability" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 6.8, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.6, + "impactScore": 5.2 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-59" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30076", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-300xx/CVE-2024-30077.json b/CVE-2024/CVE-2024-300xx/CVE-2024-30077.json new file mode 100644 index 00000000000..5dc43a90c31 --- /dev/null +++ b/CVE-2024/CVE-2024-300xx/CVE-2024-30077.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2024-30077", + "sourceIdentifier": "secure@microsoft.com", + "published": "2024-06-11T17:15:54.737", + "lastModified": "2024-06-11T17:15:54.737", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Windows OLE Remote Code Execution Vulnerability" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.0, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.1, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-122" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30077", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-300xx/CVE-2024-30078.json b/CVE-2024/CVE-2024-300xx/CVE-2024-30078.json new file mode 100644 index 00000000000..dccbf98b9e4 --- /dev/null +++ b/CVE-2024/CVE-2024-300xx/CVE-2024-30078.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2024-30078", + "sourceIdentifier": "secure@microsoft.com", + "published": "2024-06-11T17:15:54.977", + "lastModified": "2024-06-11T17:15:54.977", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Windows Wi-Fi Driver Remote Code Execution Vulnerability" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-20" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30078", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-300xx/CVE-2024-30080.json b/CVE-2024/CVE-2024-300xx/CVE-2024-30080.json new file mode 100644 index 00000000000..a63e9de8eeb --- /dev/null +++ b/CVE-2024/CVE-2024-300xx/CVE-2024-30080.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2024-30080", + "sourceIdentifier": "secure@microsoft.com", + "published": "2024-06-11T17:15:55.207", + "lastModified": "2024-06-11T17:15:55.207", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Microsoft Message Queuing (MSMQ) Remote Code Execution Vulnerability" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-416" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30080", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-300xx/CVE-2024-30082.json b/CVE-2024/CVE-2024-300xx/CVE-2024-30082.json new file mode 100644 index 00000000000..e1efd3cb02f --- /dev/null +++ b/CVE-2024/CVE-2024-300xx/CVE-2024-30082.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2024-30082", + "sourceIdentifier": "secure@microsoft.com", + "published": "2024-06-11T17:15:55.443", + "lastModified": "2024-06-11T17:15:55.443", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Win32k Elevation of Privilege Vulnerability" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-416" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30082", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-300xx/CVE-2024-30083.json b/CVE-2024/CVE-2024-300xx/CVE-2024-30083.json new file mode 100644 index 00000000000..3adb750bdc7 --- /dev/null +++ b/CVE-2024/CVE-2024-300xx/CVE-2024-30083.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2024-30083", + "sourceIdentifier": "secure@microsoft.com", + "published": "2024-06-11T17:15:55.677", + "lastModified": "2024-06-11T17:15:55.677", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Windows Standards-Based Storage Management Service Denial of Service Vulnerability" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-121" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30083", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-300xx/CVE-2024-30084.json b/CVE-2024/CVE-2024-300xx/CVE-2024-30084.json new file mode 100644 index 00000000000..9f536db3a5e --- /dev/null +++ b/CVE-2024/CVE-2024-300xx/CVE-2024-30084.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2024-30084", + "sourceIdentifier": "secure@microsoft.com", + "published": "2024-06-11T17:15:55.893", + "lastModified": "2024-06-11T17:15:55.893", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Windows Kernel-Mode Driver Elevation of Privilege Vulnerability" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "HIGH", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.0, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.0, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-367" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30084", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-300xx/CVE-2024-30085.json b/CVE-2024/CVE-2024-300xx/CVE-2024-30085.json new file mode 100644 index 00000000000..cb4ba1978c9 --- /dev/null +++ b/CVE-2024/CVE-2024-300xx/CVE-2024-30085.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2024-30085", + "sourceIdentifier": "secure@microsoft.com", + "published": "2024-06-11T17:15:56.123", + "lastModified": "2024-06-11T17:15:56.123", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Windows Cloud Files Mini Filter Driver Elevation of Privilege Vulnerability" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-122" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30085", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-300xx/CVE-2024-30086.json b/CVE-2024/CVE-2024-300xx/CVE-2024-30086.json new file mode 100644 index 00000000000..631aff12a4f --- /dev/null +++ b/CVE-2024/CVE-2024-300xx/CVE-2024-30086.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2024-30086", + "sourceIdentifier": "secure@microsoft.com", + "published": "2024-06-11T17:15:56.343", + "lastModified": "2024-06-11T17:15:56.343", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Windows Win32 Kernel Subsystem Elevation of Privilege Vulnerability" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-416" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30086", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-300xx/CVE-2024-30087.json b/CVE-2024/CVE-2024-300xx/CVE-2024-30087.json new file mode 100644 index 00000000000..e59c69574d0 --- /dev/null +++ b/CVE-2024/CVE-2024-300xx/CVE-2024-30087.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2024-30087", + "sourceIdentifier": "secure@microsoft.com", + "published": "2024-06-11T17:15:56.583", + "lastModified": "2024-06-11T17:15:56.583", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Win32k Elevation of Privilege Vulnerability" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-20" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30087", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-300xx/CVE-2024-30088.json b/CVE-2024/CVE-2024-300xx/CVE-2024-30088.json new file mode 100644 index 00000000000..ae1ae3eb8b6 --- /dev/null +++ b/CVE-2024/CVE-2024-300xx/CVE-2024-30088.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2024-30088", + "sourceIdentifier": "secure@microsoft.com", + "published": "2024-06-11T17:15:56.810", + "lastModified": "2024-06-11T17:15:56.810", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Windows Kernel Elevation of Privilege Vulnerability" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "HIGH", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.0, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.0, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-367" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30088", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-300xx/CVE-2024-30089.json b/CVE-2024/CVE-2024-300xx/CVE-2024-30089.json new file mode 100644 index 00000000000..3c362d984a2 --- /dev/null +++ b/CVE-2024/CVE-2024-300xx/CVE-2024-30089.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2024-30089", + "sourceIdentifier": "secure@microsoft.com", + "published": "2024-06-11T17:15:57.023", + "lastModified": "2024-06-11T17:15:57.023", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Microsoft Streaming Service Elevation of Privilege Vulnerability" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-416" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30089", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-300xx/CVE-2024-30090.json b/CVE-2024/CVE-2024-300xx/CVE-2024-30090.json new file mode 100644 index 00000000000..55bcc405b37 --- /dev/null +++ b/CVE-2024/CVE-2024-300xx/CVE-2024-30090.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2024-30090", + "sourceIdentifier": "secure@microsoft.com", + "published": "2024-06-11T17:15:57.240", + "lastModified": "2024-06-11T17:15:57.240", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Microsoft Streaming Service Elevation of Privilege Vulnerability" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "HIGH", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.0, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.0, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-822" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30090", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-300xx/CVE-2024-30091.json b/CVE-2024/CVE-2024-300xx/CVE-2024-30091.json new file mode 100644 index 00000000000..08748270114 --- /dev/null +++ b/CVE-2024/CVE-2024-300xx/CVE-2024-30091.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2024-30091", + "sourceIdentifier": "secure@microsoft.com", + "published": "2024-06-11T17:15:57.457", + "lastModified": "2024-06-11T17:15:57.457", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Win32k Elevation of Privilege Vulnerability" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-122" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30091", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-300xx/CVE-2024-30093.json b/CVE-2024/CVE-2024-300xx/CVE-2024-30093.json new file mode 100644 index 00000000000..0d162c66d7a --- /dev/null +++ b/CVE-2024/CVE-2024-300xx/CVE-2024-30093.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2024-30093", + "sourceIdentifier": "secure@microsoft.com", + "published": "2024-06-11T17:15:57.680", + "lastModified": "2024-06-11T17:15:57.680", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Windows Storage Elevation of Privilege Vulnerability" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.3, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.3, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-59" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30093", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-300xx/CVE-2024-30094.json b/CVE-2024/CVE-2024-300xx/CVE-2024-30094.json new file mode 100644 index 00000000000..fb6128082f9 --- /dev/null +++ b/CVE-2024/CVE-2024-300xx/CVE-2024-30094.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2024-30094", + "sourceIdentifier": "secure@microsoft.com", + "published": "2024-06-11T17:15:57.917", + "lastModified": "2024-06-11T17:15:57.917", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-122" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30094", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-300xx/CVE-2024-30095.json b/CVE-2024/CVE-2024-300xx/CVE-2024-30095.json new file mode 100644 index 00000000000..d1041c095dd --- /dev/null +++ b/CVE-2024/CVE-2024-300xx/CVE-2024-30095.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2024-30095", + "sourceIdentifier": "secure@microsoft.com", + "published": "2024-06-11T17:15:58.150", + "lastModified": "2024-06-11T17:15:58.150", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-122" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30095", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-300xx/CVE-2024-30096.json b/CVE-2024/CVE-2024-300xx/CVE-2024-30096.json new file mode 100644 index 00000000000..f8be0f426a5 --- /dev/null +++ b/CVE-2024/CVE-2024-300xx/CVE-2024-30096.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2024-30096", + "sourceIdentifier": "secure@microsoft.com", + "published": "2024-06-11T17:15:58.497", + "lastModified": "2024-06-11T17:15:58.497", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Windows Cryptographic Services Information Disclosure Vulnerability" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-200" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30096", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-300xx/CVE-2024-30097.json b/CVE-2024/CVE-2024-300xx/CVE-2024-30097.json new file mode 100644 index 00000000000..2025d5a0d98 --- /dev/null +++ b/CVE-2024/CVE-2024-300xx/CVE-2024-30097.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2024-30097", + "sourceIdentifier": "secure@microsoft.com", + "published": "2024-06-11T17:15:58.700", + "lastModified": "2024-06-11T17:15:58.700", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Microsoft Speech Application Programming Interface (SAPI) Remote Code Execution Vulnerability" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-415" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30097", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-300xx/CVE-2024-30099.json b/CVE-2024/CVE-2024-300xx/CVE-2024-30099.json new file mode 100644 index 00000000000..fda3eb114f1 --- /dev/null +++ b/CVE-2024/CVE-2024-300xx/CVE-2024-30099.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2024-30099", + "sourceIdentifier": "secure@microsoft.com", + "published": "2024-06-11T17:15:58.927", + "lastModified": "2024-06-11T17:15:58.927", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Windows Kernel Elevation of Privilege Vulnerability" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "HIGH", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.0, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.0, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-367" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30099", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-301xx/CVE-2024-30100.json b/CVE-2024/CVE-2024-301xx/CVE-2024-30100.json new file mode 100644 index 00000000000..0a57afaf776 --- /dev/null +++ b/CVE-2024/CVE-2024-301xx/CVE-2024-30100.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2024-30100", + "sourceIdentifier": "secure@microsoft.com", + "published": "2024-06-11T17:15:59.140", + "lastModified": "2024-06-11T17:15:59.140", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Microsoft SharePoint Server Remote Code Execution Vulnerability" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-426" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30100", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-301xx/CVE-2024-30101.json b/CVE-2024/CVE-2024-301xx/CVE-2024-30101.json new file mode 100644 index 00000000000..76833f59e30 --- /dev/null +++ b/CVE-2024/CVE-2024-301xx/CVE-2024-30101.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2024-30101", + "sourceIdentifier": "secure@microsoft.com", + "published": "2024-06-11T17:15:59.353", + "lastModified": "2024-06-11T17:15:59.353", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Microsoft Office Remote Code Execution Vulnerability" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.6, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-416" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30101", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-301xx/CVE-2024-30102.json b/CVE-2024/CVE-2024-301xx/CVE-2024-30102.json new file mode 100644 index 00000000000..57f1bb367d5 --- /dev/null +++ b/CVE-2024/CVE-2024-301xx/CVE-2024-30102.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2024-30102", + "sourceIdentifier": "secure@microsoft.com", + "published": "2024-06-11T17:15:59.560", + "lastModified": "2024-06-11T17:15:59.560", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Microsoft Office Remote Code Execution Vulnerability" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.3, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.3, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-416" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30102", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-301xx/CVE-2024-30103.json b/CVE-2024/CVE-2024-301xx/CVE-2024-30103.json new file mode 100644 index 00000000000..b264784a9dd --- /dev/null +++ b/CVE-2024/CVE-2024-301xx/CVE-2024-30103.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2024-30103", + "sourceIdentifier": "secure@microsoft.com", + "published": "2024-06-11T17:15:59.800", + "lastModified": "2024-06-11T17:15:59.800", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Microsoft Outlook Remote Code Execution Vulnerability" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-184" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30103", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-301xx/CVE-2024-30104.json b/CVE-2024/CVE-2024-301xx/CVE-2024-30104.json new file mode 100644 index 00000000000..ce9e185296e --- /dev/null +++ b/CVE-2024/CVE-2024-301xx/CVE-2024-30104.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2024-30104", + "sourceIdentifier": "secure@microsoft.com", + "published": "2024-06-11T17:16:00.030", + "lastModified": "2024-06-11T17:16:00.030", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Microsoft Office Remote Code Execution Vulnerability" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-59" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30104", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-30xx/CVE-2024-3049.json b/CVE-2024/CVE-2024-30xx/CVE-2024-3049.json index 1fef4c0bc43..2805ef014ef 100644 --- a/CVE-2024/CVE-2024-30xx/CVE-2024-3049.json +++ b/CVE-2024/CVE-2024-30xx/CVE-2024-3049.json @@ -2,8 +2,8 @@ "id": "CVE-2024-3049", "sourceIdentifier": "secalert@redhat.com", "published": "2024-06-06T06:15:09.550", - "lastModified": "2024-06-06T14:17:35.017", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-06-11T17:54:22.763", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -16,6 +16,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 5.9, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.2, + "impactScore": 3.6 + }, { "source": "secalert@redhat.com", "type": "Secondary", @@ -50,34 +70,183 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:clusterlabs:booth:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.1", + "matchCriteriaId": "71757B74-23C1-428F-9A3D-7DC5086303A9" + } + ] + } + ] + }, + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*", + "matchCriteriaId": "142AD0DD-4CF3-4D74-9442-459CE3347E3A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*", + "matchCriteriaId": "F4CFF558-3C47-480D-A2F0-BABF26042943" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:redhat:enterprise_linux:9.0:*:*:*:*:*:*:*", + "matchCriteriaId": "7F6FB57C-2BC7-487C-96DD-132683AEB35D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:redhat:enterprise_linux_eus:8.4:*:*:*:*:*:*:*", + "matchCriteriaId": "0E3F09B5-569F-4C58-9FCA-3C0953D107B5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:redhat:enterprise_linux_eus:8.8:*:*:*:*:*:*:*", + "matchCriteriaId": "62C31522-0A17-4025-B269-855C7F4B45C2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:redhat:enterprise_linux_eus:9.2:*:*:*:*:*:*:*", + "matchCriteriaId": "3C74F6FA-FA6C-4648-9079-91446E45EE47" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:redhat:enterprise_linux_for_arm_64:8.0_aarch64:*:*:*:*:*:*:*", + "matchCriteriaId": "5A47EF78-A5B6-4B89-8B74-EEB0647C549F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:redhat:enterprise_linux_for_arm_64:8.8_aarch64:*:*:*:*:*:*:*", + "matchCriteriaId": "F7F8A347-0ACE-40E4-BF7B-656D66DDB425" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:redhat:enterprise_linux_for_arm_64:9.2_aarch64:*:*:*:*:*:*:*", + "matchCriteriaId": "D85E0DBA-A856-472A-8271-A4F37C35F952" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:redhat:enterprise_linux_for_arm_64:9.4_aarch64:*:*:*:*:*:*:*", + "matchCriteriaId": "DBF70805-7EBF-4731-83DB-D71F7A646B0F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems:8.0_s390x:*:*:*:*:*:*:*", + "matchCriteriaId": "32AF225E-94C0-4D07-900C-DD868C05F554" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems:9.2_s390x:*:*:*:*:*:*:*", + "matchCriteriaId": "2E068ABB-31C2-416E-974A-95E07A2BAB0A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems:9.4_s390x:*:*:*:*:*:*:*", + "matchCriteriaId": "069180B4-BA50-4AD0-8BA9-83F8005E58BE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_eus:8.8_s390x:*:*:*:*:*:*:*", + "matchCriteriaId": "22C65F53-D624-48A9-A9B7-4C78A31E19F9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian_eus:8.0_ppc64le:*:*:*:*:*:*:*", + "matchCriteriaId": "9AEC5D6F-097A-4DD3-BD12-76B6343E8C83" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian_eus:8.4_ppc64le:*:*:*:*:*:*:*", + "matchCriteriaId": "BB28CF82-799F-4A6E-B1DB-0AB423E6C05D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian_eus:8.8_ppc64le:*:*:*:*:*:*:*", + "matchCriteriaId": "F91F9255-4EE1-43C7-8831-D2B6C228BFD9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian_eus:9.2_ppc64le:*:*:*:*:*:*:*", + "matchCriteriaId": "99952557-C766-4B9E-8BF5-DBBA194349FF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian_eus:9.4_ppc64le:*:*:*:*:*:*:*", + "matchCriteriaId": "FC3CBA5D-9E5D-4C46-B37E-7BB35BE8DADB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:redhat:enterprise_linux_server_update_services_for_sap_solutions:8.4:*:*:*:*:*:*:*", + "matchCriteriaId": "BC6DD887-9744-43EA-8B3C-44C6B6339590" + } + ] + } + ] + } + ], "references": [ { "url": "https://access.redhat.com/errata/RHSA-2024:3657", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://access.redhat.com/errata/RHSA-2024:3658", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://access.redhat.com/errata/RHSA-2024:3659", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://access.redhat.com/errata/RHSA-2024:3660", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://access.redhat.com/errata/RHSA-2024:3661", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://access.redhat.com/security/cve/CVE-2024-3049", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2272082", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Issue Tracking" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-321xx/CVE-2024-32143.json b/CVE-2024/CVE-2024-321xx/CVE-2024-32143.json new file mode 100644 index 00000000000..be0877034a6 --- /dev/null +++ b/CVE-2024/CVE-2024-321xx/CVE-2024-32143.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2024-32143", + "sourceIdentifier": "audit@patchstack.com", + "published": "2024-06-11T17:16:00.257", + "lastModified": "2024-06-11T17:16:00.257", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Missing Authorization vulnerability in Podlove Podlove Podcast Publisher.This issue affects Podlove Podcast Publisher: from n/a through 4.1.0." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 4.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/vulnerability/podlove-podcasting-plugin-for-wordpress/wordpress-podlove-podcast-publisher-plugin-4-1-0-broken-access-control-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-321xx/CVE-2024-32144.json b/CVE-2024/CVE-2024-321xx/CVE-2024-32144.json new file mode 100644 index 00000000000..e39cd67525a --- /dev/null +++ b/CVE-2024/CVE-2024-321xx/CVE-2024-32144.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2024-32144", + "sourceIdentifier": "audit@patchstack.com", + "published": "2024-06-11T16:15:27.467", + "lastModified": "2024-06-11T16:15:27.467", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Missing Authorization vulnerability in Welcart Inc. Welcart e-Commerce.This issue affects Welcart e-Commerce: from n/a through 2.9.14." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 5.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.5 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/vulnerability/usc-e-shop/wordpress-welcart-e-commerce-plugin-2-9-14-broken-access-control-csrf-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-321xx/CVE-2024-32146.json b/CVE-2024/CVE-2024-321xx/CVE-2024-32146.json new file mode 100644 index 00000000000..79390e247e6 --- /dev/null +++ b/CVE-2024/CVE-2024-321xx/CVE-2024-32146.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2024-32146", + "sourceIdentifier": "audit@patchstack.com", + "published": "2024-06-11T17:16:00.490", + "lastModified": "2024-06-11T17:16:00.490", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Missing Authorization vulnerability in Aspose.Cloud Marketplace Aspose.Words Exporter.This issue affects Aspose.Words Exporter: from n/a through 6.3.1." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 4.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/vulnerability/aspose-doc-exporter/wordpress-aspose-words-import-and-export-word-documents-plugin-6-3-1-broken-access-control-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-340xx/CVE-2024-34055.json b/CVE-2024/CVE-2024-340xx/CVE-2024-34055.json index 32727293e27..bf0dcbe47fc 100644 --- a/CVE-2024/CVE-2024-340xx/CVE-2024-34055.json +++ b/CVE-2024/CVE-2024-340xx/CVE-2024-34055.json @@ -2,8 +2,8 @@ "id": "CVE-2024-34055", "sourceIdentifier": "cve@mitre.org", "published": "2024-06-05T05:15:49.950", - "lastModified": "2024-06-05T12:53:50.240", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-06-11T17:16:29.167", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -14,19 +14,97 @@ "value": "Cyrus IMAP anterior a 3.8.3 y 3.10.x anterior a 3.10.0-rc1 permite a atacantes autenticados provocar una asignaci\u00f3n de memoria ilimitada enviando muchos LITERAL en un solo comando." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 6.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-770" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cyrusimap:cyrus_imap:*:*:*:*:*:*:*:*", + "versionEndExcluding": "3.8.3", + "matchCriteriaId": "B51D8B39-A78E-4D0D-A72D-96E2BFBBDF62" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cyrusimap:cyrus_imap:3.10.0:alpha0:*:*:*:*:*:*", + "matchCriteriaId": "5068296F-B063-4170-AB93-DA3109615F2A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cyrusimap:cyrus_imap:3.10.0:beta1:*:*:*:*:*:*", + "matchCriteriaId": "6921C16E-C510-4DCD-9EB1-A3BA28F5CD37" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cyrusimap:cyrus_imap:3.10.0:beta2:*:*:*:*:*:*", + "matchCriteriaId": "ECBB18EC-0A31-483F-953C-E1F0F4701867" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/cyrusimap/cyrus-imapd/commit/ef9e4e8314d6a06f2269af0ccf606894cc3fe489", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Patch", + "Release Notes" + ] }, { "url": "https://www.cyrusimap.org/dev/imap/download/release-notes/3.10/x/3.10.0-rc1.html", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Release Notes" + ] }, { "url": "https://www.cyrusimap.org/imap/download/release-notes/3.8/x/3.8.3.html", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Release Notes" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-343xx/CVE-2024-34363.json b/CVE-2024/CVE-2024-343xx/CVE-2024-34363.json index 4dda5097568..264c98608ab 100644 --- a/CVE-2024/CVE-2024-343xx/CVE-2024-34363.json +++ b/CVE-2024/CVE-2024-343xx/CVE-2024-34363.json @@ -2,8 +2,8 @@ "id": "CVE-2024-34363", "sourceIdentifier": "security-advisories@github.com", "published": "2024-06-04T21:15:34.743", - "lastModified": "2024-06-05T12:53:50.240", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-06-11T17:44:14.347", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -16,6 +16,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + }, { "source": "security-advisories@github.com", "type": "Secondary", @@ -39,6 +59,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-Other" + } + ] + }, { "source": "security-advisories@github.com", "type": "Secondary", @@ -50,10 +80,47 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:envoyproxy:envoy:*:*:*:*:*:*:*:*", + "versionStartIncluding": "1.28.0", + "versionEndExcluding": "1.28.4", + "matchCriteriaId": "E5107DA5-4BC7-4AB8-8087-0DA20021D0B0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:envoyproxy:envoy:*:*:*:*:*:*:*:*", + "versionStartIncluding": "1.29.0", + "versionEndExcluding": "1.29.5", + "matchCriteriaId": "34583FBC-8B38-4BBB-9E3B-7731272C0A6F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:envoyproxy:envoy:*:*:*:*:*:*:*:*", + "versionStartIncluding": "1.30.0", + "versionEndExcluding": "1.30.2", + "matchCriteriaId": "65C0355B-7FAC-4417-B707-A3CA494C20A0" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/envoyproxy/envoy/security/advisories/GHSA-g979-ph9j-5gg4", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-343xx/CVE-2024-34364.json b/CVE-2024/CVE-2024-343xx/CVE-2024-34364.json index b75de30c093..0fbc640f955 100644 --- a/CVE-2024/CVE-2024-343xx/CVE-2024-34364.json +++ b/CVE-2024/CVE-2024-343xx/CVE-2024-34364.json @@ -2,8 +2,8 @@ "id": "CVE-2024-34364", "sourceIdentifier": "security-advisories@github.com", "published": "2024-06-04T21:15:34.977", - "lastModified": "2024-06-05T12:53:50.240", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-06-11T17:20:27.203", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -16,6 +16,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 6.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 + }, { "source": "security-advisories@github.com", "type": "Secondary", @@ -39,6 +59,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + }, { "source": "security-advisories@github.com", "type": "Secondary", @@ -50,10 +80,53 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:envoyproxy:envoy:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.27.6", + "matchCriteriaId": "1020E2E2-EDFA-4188-B17F-406904256EB1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:envoyproxy:envoy:*:*:*:*:*:*:*:*", + "versionStartIncluding": "1.28.0", + "versionEndExcluding": "1.28.4", + "matchCriteriaId": "E5107DA5-4BC7-4AB8-8087-0DA20021D0B0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:envoyproxy:envoy:*:*:*:*:*:*:*:*", + "versionStartIncluding": "1.29.0", + "versionEndExcluding": "1.29.5", + "matchCriteriaId": "34583FBC-8B38-4BBB-9E3B-7731272C0A6F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:envoyproxy:envoy:*:*:*:*:*:*:*:*", + "versionStartIncluding": "1.30.0", + "versionEndExcluding": "1.30.2", + "matchCriteriaId": "65C0355B-7FAC-4417-B707-A3CA494C20A0" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/envoyproxy/envoy/security/advisories/GHSA-xcj3-h7vf-fw26", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-347xx/CVE-2024-34753.json b/CVE-2024/CVE-2024-347xx/CVE-2024-34753.json new file mode 100644 index 00000000000..f064034baaf --- /dev/null +++ b/CVE-2024/CVE-2024-347xx/CVE-2024-34753.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2024-34753", + "sourceIdentifier": "audit@patchstack.com", + "published": "2024-06-11T16:15:27.760", + "lastModified": "2024-06-11T16:15:27.760", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Missing Authorization vulnerability in SoftLab Radio Player.This issue affects Radio Player: from n/a through 2.0.73." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 5.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/vulnerability/radio-player/wordpress-radio-player-plugin-2-0-73-broken-access-control-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-347xx/CVE-2024-34758.json b/CVE-2024/CVE-2024-347xx/CVE-2024-34758.json new file mode 100644 index 00000000000..1e25659d804 --- /dev/null +++ b/CVE-2024/CVE-2024-347xx/CVE-2024-34758.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2024-34758", + "sourceIdentifier": "audit@patchstack.com", + "published": "2024-06-11T17:16:00.717", + "lastModified": "2024-06-11T17:16:00.717", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Missing Authorization vulnerability in Wpmet WP Fundraising Donation and Crowdfunding Platform.This issue affects WP Fundraising Donation and Crowdfunding Platform: from n/a through 1.6.4." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 5.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/vulnerability/wp-fundraising-donation/wordpress-fundengine-donation-and-crowdfunding-platform-plugin-1-6-4-broken-access-control-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-347xx/CVE-2024-34763.json b/CVE-2024/CVE-2024-347xx/CVE-2024-34763.json new file mode 100644 index 00000000000..21ea8895cba --- /dev/null +++ b/CVE-2024/CVE-2024-347xx/CVE-2024-34763.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2024-34763", + "sourceIdentifier": "audit@patchstack.com", + "published": "2024-06-11T17:16:00.950", + "lastModified": "2024-06-11T17:16:00.950", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Missing Authorization vulnerability in Tobias Conrad Builder for WooCommerce reviews shortcodes \u2013 ReviewShort.This issue affects Builder for WooCommerce reviews shortcodes \u2013 ReviewShort: from n/a through 1.01.5." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/vulnerability/woo-product-reviews-shortcode/wordpress-builder-for-woocommerce-reviews-shortcodes-reviewshort-plugin-1-01-5-broken-access-control-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-347xx/CVE-2024-34768.json b/CVE-2024/CVE-2024-347xx/CVE-2024-34768.json new file mode 100644 index 00000000000..0cd0b405675 --- /dev/null +++ b/CVE-2024/CVE-2024-347xx/CVE-2024-34768.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2024-34768", + "sourceIdentifier": "audit@patchstack.com", + "published": "2024-06-11T17:16:01.187", + "lastModified": "2024-06-11T17:16:01.187", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Missing Authorization vulnerability in Fastly.This issue affects Fastly: from n/a through 1.2.25." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/vulnerability/fastly/wordpress-fastly-plugin-1-2-25-broken-access-control-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-347xx/CVE-2024-34799.json b/CVE-2024/CVE-2024-347xx/CVE-2024-34799.json new file mode 100644 index 00000000000..005957bc527 --- /dev/null +++ b/CVE-2024/CVE-2024-347xx/CVE-2024-34799.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2024-34799", + "sourceIdentifier": "audit@patchstack.com", + "published": "2024-06-11T17:16:01.430", + "lastModified": "2024-06-11T17:16:01.430", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Missing Authorization vulnerability in Repute Infosystems BookingPress.This issue affects BookingPress: from n/a through 1.0.82." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 6.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 3.9, + "impactScore": 2.5 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/vulnerability/bookingpress-appointment-booking/wordpress-bookingpress-plugin-1-0-82-appointment-duration-manipulation-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-348xx/CVE-2024-34804.json b/CVE-2024/CVE-2024-348xx/CVE-2024-34804.json new file mode 100644 index 00000000000..52ffd807dc4 --- /dev/null +++ b/CVE-2024/CVE-2024-348xx/CVE-2024-34804.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2024-34804", + "sourceIdentifier": "audit@patchstack.com", + "published": "2024-06-11T17:16:01.683", + "lastModified": "2024-06-11T17:16:01.683", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Missing Authorization vulnerability in Tagembed.This issue affects Tagembed: from n/a through 5.5." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 5.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.5 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/vulnerability/tagembed-widget/wordpress-tagembed-plugin-5-5-broken-access-control-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-348xx/CVE-2024-34815.json b/CVE-2024/CVE-2024-348xx/CVE-2024-34815.json new file mode 100644 index 00000000000..91b24e1555c --- /dev/null +++ b/CVE-2024/CVE-2024-348xx/CVE-2024-34815.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2024-34815", + "sourceIdentifier": "audit@patchstack.com", + "published": "2024-06-11T17:16:01.903", + "lastModified": "2024-06-11T17:16:01.903", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Missing Authorization vulnerability in Codection Import and export users and customers.This issue affects Import and export users and customers: from n/a through 1.26.5." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 5.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.5 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/vulnerability/import-users-from-csv-with-meta/wordpress-import-and-export-users-and-customers-plugin-1-26-5-broken-access-control-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-348xx/CVE-2024-34819.json b/CVE-2024/CVE-2024-348xx/CVE-2024-34819.json new file mode 100644 index 00000000000..f12b64f7c4e --- /dev/null +++ b/CVE-2024/CVE-2024-348xx/CVE-2024-34819.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2024-34819", + "sourceIdentifier": "audit@patchstack.com", + "published": "2024-06-11T16:15:28.010", + "lastModified": "2024-06-11T16:15:28.010", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Missing Authorization vulnerability in MoreConvert MC Woocommerce Wishlist.This issue affects MC Woocommerce Wishlist: from n/a through 1.7.2." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/vulnerability/smart-wishlist-for-more-convert/wordpress-mc-woocommerce-wishlist-plugin-1-7-2-broken-access-control-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-348xx/CVE-2024-34821.json b/CVE-2024/CVE-2024-348xx/CVE-2024-34821.json new file mode 100644 index 00000000000..cb5a8a535d5 --- /dev/null +++ b/CVE-2024/CVE-2024-348xx/CVE-2024-34821.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2024-34821", + "sourceIdentifier": "audit@patchstack.com", + "published": "2024-06-11T16:15:28.280", + "lastModified": "2024-06-11T16:15:28.280", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Missing Authorization vulnerability in Contact List PRO Contact List \u2013 Easy Business Directory, Staff Directory and Address Book Plugin.This issue affects Contact List \u2013 Easy Business Directory, Staff Directory and Address Book Plugin: from n/a through 2.9.87." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/vulnerability/contact-list/wordpress-contact-list-plugin-2-9-87-broken-access-control-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-348xx/CVE-2024-34822.json b/CVE-2024/CVE-2024-348xx/CVE-2024-34822.json new file mode 100644 index 00000000000..131325a7120 --- /dev/null +++ b/CVE-2024/CVE-2024-348xx/CVE-2024-34822.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2024-34822", + "sourceIdentifier": "audit@patchstack.com", + "published": "2024-06-11T16:15:28.563", + "lastModified": "2024-06-11T16:15:28.563", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Missing Authorization vulnerability in weDevs weMail.This issue affects weMail: from n/a through 1.14.2." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/vulnerability/wemail/wordpress-wemail-plugin-1-14-2-broken-access-control-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-352xx/CVE-2024-35248.json b/CVE-2024/CVE-2024-352xx/CVE-2024-35248.json new file mode 100644 index 00000000000..5b47dc103ff --- /dev/null +++ b/CVE-2024/CVE-2024-352xx/CVE-2024-35248.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2024-35248", + "sourceIdentifier": "secure@microsoft.com", + "published": "2024-06-11T17:16:02.180", + "lastModified": "2024-06-11T17:16:02.180", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Microsoft Dynamics 365 Business Central Elevation of Privilege Vulnerability" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 7.3, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.4 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-1390" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-35248", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-352xx/CVE-2024-35249.json b/CVE-2024/CVE-2024-352xx/CVE-2024-35249.json new file mode 100644 index 00000000000..2f32677f20c --- /dev/null +++ b/CVE-2024/CVE-2024-352xx/CVE-2024-35249.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2024-35249", + "sourceIdentifier": "secure@microsoft.com", + "published": "2024-06-11T17:16:02.417", + "lastModified": "2024-06-11T17:16:02.417", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Microsoft Dynamics 365 Business Central Remote Code Execution Vulnerability" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-502" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-35249", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-352xx/CVE-2024-35250.json b/CVE-2024/CVE-2024-352xx/CVE-2024-35250.json new file mode 100644 index 00000000000..8f329d7d193 --- /dev/null +++ b/CVE-2024/CVE-2024-352xx/CVE-2024-35250.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2024-35250", + "sourceIdentifier": "secure@microsoft.com", + "published": "2024-06-11T17:16:02.650", + "lastModified": "2024-06-11T17:16:02.650", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Windows Kernel-Mode Driver Elevation of Privilege Vulnerability" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-822" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-35250", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-352xx/CVE-2024-35252.json b/CVE-2024/CVE-2024-352xx/CVE-2024-35252.json new file mode 100644 index 00000000000..a448fa19090 --- /dev/null +++ b/CVE-2024/CVE-2024-352xx/CVE-2024-35252.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2024-35252", + "sourceIdentifier": "secure@microsoft.com", + "published": "2024-06-11T17:16:02.890", + "lastModified": "2024-06-11T17:16:02.890", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Azure Storage Movement Client Library Denial of Service Vulnerability" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-1104" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-35252", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-352xx/CVE-2024-35253.json b/CVE-2024/CVE-2024-352xx/CVE-2024-35253.json new file mode 100644 index 00000000000..0508ed11b15 --- /dev/null +++ b/CVE-2024/CVE-2024-352xx/CVE-2024-35253.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2024-35253", + "sourceIdentifier": "secure@microsoft.com", + "published": "2024-06-11T17:16:03.130", + "lastModified": "2024-06-11T17:16:03.130", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Microsoft Azure File Sync Elevation of Privilege Vulnerability" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:N/I:H/A:N", + "attackVector": "LOCAL", + "attackComplexity": "HIGH", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 4.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 0.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-59" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-35253", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-352xx/CVE-2024-35254.json b/CVE-2024/CVE-2024-352xx/CVE-2024-35254.json new file mode 100644 index 00000000000..6bbdadc96bd --- /dev/null +++ b/CVE-2024/CVE-2024-352xx/CVE-2024-35254.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2024-35254", + "sourceIdentifier": "secure@microsoft.com", + "published": "2024-06-11T17:16:03.347", + "lastModified": "2024-06-11T17:16:03.347", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Azure Monitor Agent Elevation of Privilege Vulnerability" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.1, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.2 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-59" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-35254", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-352xx/CVE-2024-35255.json b/CVE-2024/CVE-2024-352xx/CVE-2024-35255.json new file mode 100644 index 00000000000..2cb8757673a --- /dev/null +++ b/CVE-2024/CVE-2024-352xx/CVE-2024-35255.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2024-35255", + "sourceIdentifier": "secure@microsoft.com", + "published": "2024-06-11T17:16:03.550", + "lastModified": "2024-06-11T17:16:03.550", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Azure Identity Libraries and Microsoft Authentication Library Elevation of Privilege Vulnerability" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-362" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-35255", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-352xx/CVE-2024-35263.json b/CVE-2024/CVE-2024-352xx/CVE-2024-35263.json new file mode 100644 index 00000000000..22bb6be3e60 --- /dev/null +++ b/CVE-2024/CVE-2024-352xx/CVE-2024-35263.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2024-35263", + "sourceIdentifier": "secure@microsoft.com", + "published": "2024-06-11T17:16:03.773", + "lastModified": "2024-06-11T17:16:03.773", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Microsoft Dynamics 365 (On-Premises) Information Disclosure Vulnerability" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 5.7, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.1, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-200" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-35263", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-352xx/CVE-2024-35265.json b/CVE-2024/CVE-2024-352xx/CVE-2024-35265.json new file mode 100644 index 00000000000..5338db82a86 --- /dev/null +++ b/CVE-2024/CVE-2024-352xx/CVE-2024-35265.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2024-35265", + "sourceIdentifier": "secure@microsoft.com", + "published": "2024-06-11T17:16:03.997", + "lastModified": "2024-06-11T17:16:03.997", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Windows Perception Service Elevation of Privilege Vulnerability" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "HIGH", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.0, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.0, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-367" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-35265", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-356xx/CVE-2024-35684.json b/CVE-2024/CVE-2024-356xx/CVE-2024-35684.json index aa394724cf2..d67355f4f6d 100644 --- a/CVE-2024/CVE-2024-356xx/CVE-2024-35684.json +++ b/CVE-2024/CVE-2024-356xx/CVE-2024-35684.json @@ -2,12 +2,16 @@ "id": "CVE-2024-35684", "sourceIdentifier": "audit@patchstack.com", "published": "2024-06-08T15:15:50.773", - "lastModified": "2024-06-10T02:52:08.267", + "lastModified": "2024-06-11T16:15:28.850", "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", - "value": "Cross-Site Request Forgery (CSRF) vulnerability in 10up ElasticPress.This issue affects ElasticPress: from n/a through 5.1.0." + "value": "Cross-Site Request Forgery (CSRF) vulnerability in 10up ElasticPress.This issue affects ElasticPress: from n/a through 5.1.1." + }, + { + "lang": "es", + "value": "Vulnerabilidad de Cross-Site Request Forgery (CSRF) en 10up ElasticPress. Este problema afecta a ElasticPress: desde n/a hasta 5.1.0." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-361xx/CVE-2024-36121.json b/CVE-2024/CVE-2024-361xx/CVE-2024-36121.json index e4ae1bd3c3b..b99f50a80da 100644 --- a/CVE-2024/CVE-2024-361xx/CVE-2024-36121.json +++ b/CVE-2024/CVE-2024-361xx/CVE-2024-36121.json @@ -2,8 +2,8 @@ "id": "CVE-2024-36121", "sourceIdentifier": "security-advisories@github.com", "published": "2024-06-04T22:15:10.490", - "lastModified": "2024-06-05T12:53:50.240", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-06-11T16:52:25.983", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -16,6 +16,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 9.1, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.2 + }, { "source": "security-advisories@github.com", "type": "Secondary", @@ -39,6 +59,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-190" + } + ] + }, { "source": "security-advisories@github.com", "type": "Secondary", @@ -58,14 +88,40 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:netty:netty-incubator-codec-ohttp:*:*:*:*:*:*:*:*", + "versionStartIncluding": "0.0.3", + "versionEndExcluding": "0.0.11", + "matchCriteriaId": "FC8948ED-66B3-4565-9BE5-6CCC4B3084AB" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/netty/netty-incubator-codec-ohttp/blob/1ddadb6473cd3be5491d114431ed4c1a9f316001/codec-ohttp-hpke-classes-boringssl/src/main/java/io/netty/incubator/codec/hpke/boringssl/BoringSSLAEADContext.java#L112-L114", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Product" + ] }, { "url": "https://github.com/netty/netty-incubator-codec-ohttp/security/advisories/GHSA-g762-h86w-8749", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Exploit", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-363xx/CVE-2024-36393.json b/CVE-2024/CVE-2024-363xx/CVE-2024-36393.json index 58bbcd4151d..acc8671d468 100644 --- a/CVE-2024/CVE-2024-363xx/CVE-2024-36393.json +++ b/CVE-2024/CVE-2024-363xx/CVE-2024-36393.json @@ -2,8 +2,8 @@ "id": "CVE-2024-36393", "sourceIdentifier": "cna@cyber.gov.il", "published": "2024-06-06T09:15:14.420", - "lastModified": "2024-06-06T14:17:35.017", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-06-11T17:46:59.160", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -16,6 +16,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + }, { "source": "cna@cyber.gov.il", "type": "Secondary", @@ -50,10 +70,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:sysaid:sysaid:*:*:*:*:on-premises:*:*:*", + "versionEndIncluding": "23.3.38", + "matchCriteriaId": "860CE587-F45B-47BC-A88D-00B4B8C51C1F" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.gov.il/en/Departments/faq/cve_advisories", - "source": "cna@cyber.gov.il" + "source": "cna@cyber.gov.il", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-363xx/CVE-2024-36394.json b/CVE-2024/CVE-2024-363xx/CVE-2024-36394.json index 0dfa8bb4d7d..1b467083dca 100644 --- a/CVE-2024/CVE-2024-363xx/CVE-2024-36394.json +++ b/CVE-2024/CVE-2024-363xx/CVE-2024-36394.json @@ -2,8 +2,8 @@ "id": "CVE-2024-36394", "sourceIdentifier": "cna@cyber.gov.il", "published": "2024-06-06T09:15:14.660", - "lastModified": "2024-06-06T14:17:35.017", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-06-11T17:46:38.227", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -16,6 +16,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + }, { "source": "cna@cyber.gov.il", "type": "Secondary", @@ -50,10 +70,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:sysaid:sysaid:*:*:*:*:on-premises:*:*:*", + "versionEndIncluding": "23.3.38", + "matchCriteriaId": "860CE587-F45B-47BC-A88D-00B4B8C51C1F" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.gov.il/en/Departments/faq/cve_advisories", - "source": "cna@cyber.gov.il" + "source": "cna@cyber.gov.il", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-366xx/CVE-2024-36650.json b/CVE-2024/CVE-2024-366xx/CVE-2024-36650.json new file mode 100644 index 00000000000..b7d1ab245e4 --- /dev/null +++ b/CVE-2024/CVE-2024-366xx/CVE-2024-36650.json @@ -0,0 +1,20 @@ +{ + "id": "CVE-2024-36650", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-06-11T16:15:29.043", + "lastModified": "2024-06-11T16:15:29.043", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "TOTOLINK AC1200 Wireless Dual Band Gigabit Router firmware A3100R V4.1.2cu.5247_B20211129, in the cgi function `setNoticeCfg` of the file `/lib/cste_modules/system.so`, the length of the user input string `NoticeUrl` is not checked. This can lead to a buffer overflow, allowing attackers to construct malicious HTTP or MQTT requests to cause a denial-of-service attack." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://gist.github.com/Swind1er/f442fcac520a48c05c744c7b72362483", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-366xx/CVE-2024-36675.json b/CVE-2024/CVE-2024-366xx/CVE-2024-36675.json index cbc372e0cd3..dc340b9fdb6 100644 --- a/CVE-2024/CVE-2024-366xx/CVE-2024-36675.json +++ b/CVE-2024/CVE-2024-366xx/CVE-2024-36675.json @@ -2,8 +2,8 @@ "id": "CVE-2024-36675", "sourceIdentifier": "cve@mitre.org", "published": "2024-06-04T22:15:10.740", - "lastModified": "2024-06-05T12:53:50.240", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-06-11T16:49:10.457", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -14,11 +14,67 @@ "value": "LyLme_spage v1.9.5 es vulnerable a server-side request forgery (SSRF) a trav\u00e9s de la funci\u00f3n get_head." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 9.1, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.2 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-918" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:lylme:lylme_spage:1.9.5:*:*:*:*:*:*:*", + "matchCriteriaId": "2B5D86CA-58F2-4545-9D9D-0BA9967C9506" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/LyLme/lylme_spage/issues/92", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Issue Tracking" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-372xx/CVE-2024-37293.json b/CVE-2024/CVE-2024-372xx/CVE-2024-37293.json new file mode 100644 index 00000000000..2702b56f820 --- /dev/null +++ b/CVE-2024/CVE-2024-372xx/CVE-2024-37293.json @@ -0,0 +1,67 @@ +{ + "id": "CVE-2024-37293", + "sourceIdentifier": "security-advisories@github.com", + "published": "2024-06-11T17:16:04.237", + "lastModified": "2024-06-11T17:16:04.237", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "The AWS Deployment Framework (ADF) is a framework to manage and deploy resources across multiple AWS accounts and regions within an AWS Organization. ADF allows for staged, parallel, multi-account, cross-region deployments of applications or resources via the structure defined in AWS Organizations while taking advantage of services such as AWS CodePipeline, AWS CodeBuild, and AWS CodeCommit to alleviate the heavy lifting and management compared to a traditional CI/CD setup. ADF contains a bootstrap process that is responsible to deploy ADF's bootstrap stacks to facilitate multi-account cross-region deployments. The ADF bootstrap process relies on elevated privileges to perform this task. Two versions of the bootstrap process exist; a code-change driven pipeline using AWS CodeBuild and an event-driven state machine using AWS Lambda. If an actor has permissions to change the behavior of the CodeBuild project or the Lambda function, they would be able to escalate their privileges.\n\nPrior to version 4.0.0, the bootstrap CodeBuild role provides access to the `sts:AssumeRole` operation without further restrictions. Therefore, it is able to assume into any AWS Account in the AWS Organization with the elevated privileges provided by the cross-account access role. By default, this role is not restricted when it is created by AWS Organizations, providing Administrator level access to the AWS resources in the AWS Account. The patches for this issue are included in `aws-deployment-framework` version 4.0.0.\n\nAs a temporary mitigation, add a permissions boundary to the roles created by ADF in the management account. The permissions boundary should deny all IAM and STS actions. This permissions boundary should be in place until you upgrade ADF or bootstrap a new account. While the permissions boundary is in place, the account management and bootstrapping of accounts are unable to create, update, or assume into roles. This mitigates the privilege escalation risk, but also disables ADF's ability to create, manage, and bootstrap accounts." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "HIGH", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 0.8, + "impactScore": 6.0 + } + ] + }, + "weaknesses": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-266" + } + ] + } + ], + "references": [ + { + "url": "https://docs.aws.amazon.com/IAM/latest/UserGuide/access_policies_boundaries.html", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/awslabs/aws-deployment-framework/pull/732", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/awslabs/aws-deployment-framework/releases/tag/v4.0.0", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/awslabs/aws-deployment-framework/security/advisories/GHSA-mcj7-ppmv-h6jr", + "source": "security-advisories@github.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-373xx/CVE-2024-37325.json b/CVE-2024/CVE-2024-373xx/CVE-2024-37325.json new file mode 100644 index 00000000000..655e24deacf --- /dev/null +++ b/CVE-2024/CVE-2024-373xx/CVE-2024-37325.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2024-37325", + "sourceIdentifier": "secure@microsoft.com", + "published": "2024-06-11T17:16:04.477", + "lastModified": "2024-06-11T17:16:04.477", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Azure Science Virtual Machine (DSVM) Elevation of Privilege Vulnerability" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.1, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.2, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-200" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-37325", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-40xx/CVE-2024-4001.json b/CVE-2024/CVE-2024-40xx/CVE-2024-4001.json index 0e864e09207..8f02666dfff 100644 --- a/CVE-2024/CVE-2024-40xx/CVE-2024-4001.json +++ b/CVE-2024/CVE-2024-40xx/CVE-2024-4001.json @@ -2,8 +2,8 @@ "id": "CVE-2024-4001", "sourceIdentifier": "security@wordfence.com", "published": "2024-06-05T11:15:08.490", - "lastModified": "2024-06-05T12:53:50.240", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-06-11T17:27:53.637", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -17,8 +17,28 @@ "metrics": { "cvssMetricV31": [ { - "source": "security@wordfence.com", + "source": "nvd@nist.gov", "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 + }, + { + "source": "security@wordfence.com", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N", @@ -38,14 +58,50 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:wpdownloadmanager:download_manager:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "3.2.94", + "matchCriteriaId": "D0F5D7DB-6E99-4648-B166-6E65DB8096C4" + } + ] + } + ] + } + ], "references": [ { "url": "https://plugins.trac.wordpress.org/changeset/3096459/", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Patch" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/b478d88d-1423-4a33-b8ef-08b9e66a5d98?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-40xx/CVE-2024-4084.json b/CVE-2024/CVE-2024-40xx/CVE-2024-4084.json index 78ee18cca33..2ff87409622 100644 --- a/CVE-2024/CVE-2024-40xx/CVE-2024-4084.json +++ b/CVE-2024/CVE-2024-40xx/CVE-2024-4084.json @@ -2,8 +2,8 @@ "id": "CVE-2024-4084", "sourceIdentifier": "security@huntr.dev", "published": "2024-06-05T00:15:09.840", - "lastModified": "2024-06-05T12:53:50.240", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-06-11T16:44:49.090", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -15,6 +15,28 @@ } ], "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ], "cvssMetricV30": [ { "source": "security@huntr.dev", @@ -50,10 +72,32 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mintplexlabs:anythingllm:*:*:*:*:*:*:*:*", + "versionEndIncluding": "1.5.4", + "matchCriteriaId": "2150524B-91AA-4171-B8B0-B8207DB9C243" + } + ] + } + ] + } + ], "references": [ { "url": "https://huntr.com/bounties/bf44517e-a07d-4f54-89b4-3b05fca2a008", - "source": "security@huntr.dev" + "source": "security@huntr.dev", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-40xx/CVE-2024-4088.json b/CVE-2024/CVE-2024-40xx/CVE-2024-4088.json index 7778a6d80a8..5254ca1ce7d 100644 --- a/CVE-2024/CVE-2024-40xx/CVE-2024-4088.json +++ b/CVE-2024/CVE-2024-40xx/CVE-2024-4088.json @@ -2,8 +2,8 @@ "id": "CVE-2024-4088", "sourceIdentifier": "security@wordfence.com", "published": "2024-06-05T07:15:45.910", - "lastModified": "2024-06-05T12:53:50.240", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-06-11T17:11:30.193", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -17,7 +17,7 @@ "metrics": { "cvssMetricV31": [ { - "source": "security@wordfence.com", + "source": "nvd@nist.gov", "type": "Primary", "cvssData": { "version": "3.1", @@ -35,17 +35,73 @@ }, "exploitabilityScore": 2.8, "impactScore": 1.4 + }, + { + "source": "security@wordfence.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 4.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:wpattire:attire_blocks:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "1.9.3", + "matchCriteriaId": "DB9A1CC7-DD7D-469A-B483-43462293EEEA" + } + ] + } + ] + } + ], "references": [ { "url": "https://plugins.trac.wordpress.org/changeset/3085600/attire-blocks/trunk/admin/AttireBlocksSettings.php?old=2996841&old_path=attire-blocks%2Ftrunk%2Fadmin%2FAttireBlocksSettings.php", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Patch" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/ef47feb7-76fd-470d-ba48-55ba3c323c6d?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-41xx/CVE-2024-4177.json b/CVE-2024/CVE-2024-41xx/CVE-2024-4177.json index 16079639849..7686a9e4ff1 100644 --- a/CVE-2024/CVE-2024-41xx/CVE-2024-4177.json +++ b/CVE-2024/CVE-2024-41xx/CVE-2024-4177.json @@ -2,8 +2,8 @@ "id": "CVE-2024-4177", "sourceIdentifier": "cve-requests@bitdefender.com", "published": "2024-06-06T08:15:39.767", - "lastModified": "2024-06-06T14:17:35.017", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-06-11T17:53:13.710", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -16,6 +16,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + }, { "source": "cve-requests@bitdefender.com", "type": "Secondary", @@ -40,8 +60,18 @@ }, "weaknesses": [ { - "source": "cve-requests@bitdefender.com", + "source": "nvd@nist.gov", "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-918" + } + ] + }, + { + "source": "cve-requests@bitdefender.com", + "type": "Secondary", "description": [ { "lang": "en", @@ -50,10 +80,38 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:bitdefender:gravityzone:*:*:*:*:on-premise:*:*:*", + "versionEndExcluding": "6.38.1-2", + "matchCriteriaId": "297DEAC6-7C54-44E1-BEAC-86F47C7FB34E" + } + ] + } + ] + } + ], "references": [ { "url": "https://bitdefender.com/consumer/support/support/security-advisories/host-whitelist-parser-issue-in-gravityzone-console-on-premise-va-11554/", - "source": "cve-requests@bitdefender.com" + "source": "cve-requests@bitdefender.com", + "tags": [ + "Broken Link" + ] + }, + { + "url": "https://www.cve.org/CVERecord?id=CVE-2024-4177", + "source": "nvd@nist.gov", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-42xx/CVE-2024-4219.json b/CVE-2024/CVE-2024-42xx/CVE-2024-4219.json index 631edc0e4bf..89d7edc250b 100644 --- a/CVE-2024/CVE-2024-42xx/CVE-2024-4219.json +++ b/CVE-2024/CVE-2024-42xx/CVE-2024-4219.json @@ -2,8 +2,8 @@ "id": "CVE-2024-4219", "sourceIdentifier": "13061848-ea10-403d-bd75-c83a022c2891", "published": "2024-06-04T21:15:35.277", - "lastModified": "2024-06-05T12:53:50.240", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-06-11T17:06:50.963", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -16,6 +16,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 9.1, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.2 + }, { "source": "13061848-ea10-403d-bd75-c83a022c2891", "type": "Secondary", @@ -39,6 +59,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-918" + } + ] + }, { "source": "13061848-ea10-403d-bd75-c83a022c2891", "type": "Secondary", @@ -50,10 +80,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:beyondtrust:beyondinsight:*:*:*:*:*:*:*:*", + "versionEndExcluding": "23.2", + "matchCriteriaId": "07374D26-C69D-460E-AFBA-A5CEE9EBA6BA" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.beyondtrust.com/trust-center/security-advisories/BT24-05", - "source": "13061848-ea10-403d-bd75-c83a022c2891" + "source": "13061848-ea10-403d-bd75-c83a022c2891", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-42xx/CVE-2024-4220.json b/CVE-2024/CVE-2024-42xx/CVE-2024-4220.json index 89c3b7e4f02..edb6bf06bdf 100644 --- a/CVE-2024/CVE-2024-42xx/CVE-2024-4220.json +++ b/CVE-2024/CVE-2024-42xx/CVE-2024-4220.json @@ -2,8 +2,8 @@ "id": "CVE-2024-4220", "sourceIdentifier": "13061848-ea10-403d-bd75-c83a022c2891", "published": "2024-06-04T21:15:35.530", - "lastModified": "2024-06-05T12:53:50.240", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-06-11T17:05:35.203", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -16,6 +16,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 5.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 + }, { "source": "13061848-ea10-403d-bd75-c83a022c2891", "type": "Secondary", @@ -39,6 +59,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + }, { "source": "13061848-ea10-403d-bd75-c83a022c2891", "type": "Secondary", @@ -50,10 +80,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:beyondtrust:beyondinsight:*:*:*:*:*:*:*:*", + "versionEndExcluding": "23.1", + "matchCriteriaId": "A03AB13D-C49B-40A4-B63E-ECF79CC40711" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.beyondtrust.com/trust-center/security-advisories/BT24-06", - "source": "13061848-ea10-403d-bd75-c83a022c2891" + "source": "13061848-ea10-403d-bd75-c83a022c2891", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-42xx/CVE-2024-4295.json b/CVE-2024/CVE-2024-42xx/CVE-2024-4295.json index 0dc5b2b4e65..a61c56a4793 100644 --- a/CVE-2024/CVE-2024-42xx/CVE-2024-4295.json +++ b/CVE-2024/CVE-2024-42xx/CVE-2024-4295.json @@ -2,8 +2,8 @@ "id": "CVE-2024-4295", "sourceIdentifier": "security@wordfence.com", "published": "2024-06-05T06:15:12.007", - "lastModified": "2024-06-05T12:53:50.240", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-06-11T17:15:18.997", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -16,6 +16,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + }, { "source": "security@wordfence.com", "type": "Secondary", @@ -38,14 +58,50 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:icegram:email_subscribers_\\&_newsletters:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "5.7.21", + "matchCriteriaId": "035B7968-33CD-4431-9FB1-1900A497688F" + } + ] + } + ] + } + ], "references": [ { "url": "https://plugins.trac.wordpress.org/changeset/3090845/email-subscribers/trunk/lite/includes/db/class-es-db-lists-contacts.php", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Patch" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/641123af-1ec6-4549-a58c-0a08b4678f45?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-45xx/CVE-2024-4520.json b/CVE-2024/CVE-2024-45xx/CVE-2024-4520.json index b905d336853..d720ab11e3c 100644 --- a/CVE-2024/CVE-2024-45xx/CVE-2024-4520.json +++ b/CVE-2024/CVE-2024-45xx/CVE-2024-4520.json @@ -2,8 +2,8 @@ "id": "CVE-2024-4520", "sourceIdentifier": "security@huntr.dev", "published": "2024-06-04T20:15:11.690", - "lastModified": "2024-06-05T12:53:50.240", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-06-11T17:02:16.967", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -15,6 +15,28 @@ } ], "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ], "cvssMetricV30": [ { "source": "security@huntr.dev", @@ -40,8 +62,18 @@ }, "weaknesses": [ { - "source": "security@huntr.dev", + "source": "nvd@nist.gov", "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-Other" + } + ] + }, + { + "source": "security@huntr.dev", + "type": "Secondary", "description": [ { "lang": "en", @@ -50,10 +82,32 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:gaizhenbiao:chuanhuchatgpt:*:*:*:*:*:*:*:*", + "versionEndIncluding": "20240410", + "matchCriteriaId": "8641F081-9236-459F-AE24-DA245FE55E17" + } + ] + } + ] + } + ], "references": [ { "url": "https://huntr.com/bounties/0dd2da9f-998d-45aa-a646-97391f524000", - "source": "security@huntr.dev" + "source": "security@huntr.dev", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-47xx/CVE-2024-4743.json b/CVE-2024/CVE-2024-47xx/CVE-2024-4743.json index 912d84bfe43..909b3935636 100644 --- a/CVE-2024/CVE-2024-47xx/CVE-2024-4743.json +++ b/CVE-2024/CVE-2024-47xx/CVE-2024-4743.json @@ -2,8 +2,8 @@ "id": "CVE-2024-4743", "sourceIdentifier": "security@wordfence.com", "published": "2024-06-05T09:15:10.030", - "lastModified": "2024-06-05T12:53:50.240", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-06-11T17:32:50.367", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -17,8 +17,28 @@ "metrics": { "cvssMetricV31": [ { - "source": "security@wordfence.com", + "source": "nvd@nist.gov", "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 6.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 + }, + { + "source": "security@wordfence.com", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", @@ -38,14 +58,50 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:lifterlms:lifterlms:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "7.6.3", + "matchCriteriaId": "A46A165F-FF6C-407B-94DF-86E024BD4E9D" + } + ] + } + ] + } + ], "references": [ { "url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&new=3095706%40lifterlms%2Ftrunk&old=3094820%40lifterlms%2Ftrunk&sfp_email=&sfph_mail=", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Patch" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/7e3a1e3c-eba0-4ef4-bcb8-929799bb56a8?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-48xx/CVE-2024-4821.json b/CVE-2024/CVE-2024-48xx/CVE-2024-4821.json index ccaf3428b11..a85a184e671 100644 --- a/CVE-2024/CVE-2024-48xx/CVE-2024-4821.json +++ b/CVE-2024/CVE-2024-48xx/CVE-2024-4821.json @@ -2,8 +2,8 @@ "id": "CVE-2024-4821", "sourceIdentifier": "security@wordfence.com", "published": "2024-06-05T09:15:10.260", - "lastModified": "2024-06-05T12:53:50.240", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-06-11T17:29:33.213", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -17,8 +17,28 @@ "metrics": { "cvssMetricV31": [ { - "source": "security@wordfence.com", + "source": "nvd@nist.gov", "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 + }, + { + "source": "security@wordfence.com", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N", @@ -38,18 +58,57 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:getshortcodes:shortcodes_ultimate:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "7.1.7", + "matchCriteriaId": "B0C7F17C-E820-45D4-8452-F92863C6C556" + } + ] + } + ] + } + ], "references": [ { "url": "https://plugins.trac.wordpress.org/browser/shortcodes-ultimate/tags/7.1.5/includes/shortcodes/lightbox.php#L71", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product" + ] }, { "url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&new=3096024%40shortcodes-ultimate%2Ftrunk&old=3084162%40shortcodes-ultimate%2Ftrunk&sfp_email=&sfph_mail=#file1", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Patch" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/ec7649da-5358-4fe2-8706-b945bba02c93?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Broken Link" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-48xx/CVE-2024-4886.json b/CVE-2024/CVE-2024-48xx/CVE-2024-4886.json index b7752c05ea3..5a37d22f7c0 100644 --- a/CVE-2024/CVE-2024-48xx/CVE-2024-4886.json +++ b/CVE-2024/CVE-2024-48xx/CVE-2024-4886.json @@ -2,8 +2,8 @@ "id": "CVE-2024-4886", "sourceIdentifier": "contact@wpscan.com", "published": "2024-06-05T06:15:12.443", - "lastModified": "2024-06-05T12:53:50.240", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-06-11T17:14:56.323", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -14,11 +14,68 @@ "value": "Contiene una vulnerabilidad IDOR que permite a un usuario comentar una publicaci\u00f3n privada manipulando la ID incluida en la solicitud." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 4.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-639" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:buddyboss:buddyboss_platform:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "2.6.00", + "matchCriteriaId": "829D6036-1516-4A58-A017-2C491FD2347E" + } + ] + } + ] + } + ], "references": [ { "url": "https://wpscan.com/vulnerability/76e8591f-120c-4cd7-b9a2-79f8d4d98aa8/", - "source": "contact@wpscan.com" + "source": "contact@wpscan.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-49xx/CVE-2024-4939.json b/CVE-2024/CVE-2024-49xx/CVE-2024-4939.json index 17f3f7b1fe9..ce9a7b8ab58 100644 --- a/CVE-2024/CVE-2024-49xx/CVE-2024-4939.json +++ b/CVE-2024/CVE-2024-49xx/CVE-2024-4939.json @@ -2,8 +2,8 @@ "id": "CVE-2024-4939", "sourceIdentifier": "security@wordfence.com", "published": "2024-06-05T08:15:09.787", - "lastModified": "2024-06-05T12:53:50.240", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-06-11T17:08:33.350", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -17,8 +17,28 @@ "metrics": { "cvssMetricV31": [ { - "source": "security@wordfence.com", + "source": "nvd@nist.gov", "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 + }, + { + "source": "security@wordfence.com", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N", @@ -38,14 +58,50 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:weavertheme:weaver_xtreme_theme_support:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "6.5", + "matchCriteriaId": "51D49B80-37DA-4141-90D8-CFAF1ECB2FEE" + } + ] + } + ] + } + ], "references": [ { "url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&new=3095286%40weaverx-theme-support%2Ftrunk&old=3017943%40weaverx-theme-support%2Ftrunk&sfp_email=&sfph_mail=", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Patch" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/bc121ed0-4cb3-4ba4-b693-413b1c25e4ca?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-50xx/CVE-2024-5006.json b/CVE-2024/CVE-2024-50xx/CVE-2024-5006.json index a35de99976a..61a3173ad6b 100644 --- a/CVE-2024/CVE-2024-50xx/CVE-2024-5006.json +++ b/CVE-2024/CVE-2024-50xx/CVE-2024-5006.json @@ -2,8 +2,8 @@ "id": "CVE-2024-5006", "sourceIdentifier": "security@wordfence.com", "published": "2024-06-05T08:15:09.983", - "lastModified": "2024-06-05T12:53:50.240", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-06-11T17:36:24.000", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -17,8 +17,28 @@ "metrics": { "cvssMetricV31": [ { - "source": "security@wordfence.com", + "source": "nvd@nist.gov", "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 + }, + { + "source": "security@wordfence.com", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N", @@ -38,26 +58,71 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:woostify:boostify_header_footer_builder_for_elementor:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "1.3.3", + "matchCriteriaId": "747F5A60-BE92-4352-BC78-EF7D8B8CC6B7" + } + ] + } + ] + } + ], "references": [ { "url": "https://plugins.trac.wordpress.org/browser/boostify-header-footer-builder/trunk/inc/elementor/widgets/class-mega-menu-vertical.php#L393", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product" + ] }, { "url": "https://plugins.trac.wordpress.org/browser/boostify-header-footer-builder/trunk/inc/elementor/widgets/class-mega-menu.php#L525", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product" + ] }, { "url": "https://plugins.trac.wordpress.org/changeset/3097085/#file9", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Patch" + ] }, { "url": "https://wordpress.org/plugins/boostify-header-footer-builder/#developers", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/72c2a5d4-f201-4cc8-ac49-cde1160ca468?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-50xx/CVE-2024-5038.json b/CVE-2024/CVE-2024-50xx/CVE-2024-5038.json index 3c97a6719d6..2410c601c8e 100644 --- a/CVE-2024/CVE-2024-50xx/CVE-2024-5038.json +++ b/CVE-2024/CVE-2024-50xx/CVE-2024-5038.json @@ -2,8 +2,8 @@ "id": "CVE-2024-5038", "sourceIdentifier": "security@wordfence.com", "published": "2024-06-06T11:15:48.770", - "lastModified": "2024-06-06T14:17:35.017", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-06-11T17:41:37.883", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -17,8 +17,28 @@ "metrics": { "cvssMetricV31": [ { - "source": "security@wordfence.com", + "source": "nvd@nist.gov", "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 + }, + { + "source": "security@wordfence.com", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N", @@ -38,18 +58,57 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:extendthemes:colibri_page_builder:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "1.0.277", + "matchCriteriaId": "EDAED9CE-DBB3-441A-AB33-E330F4C4A00F" + } + ] + } + ] + } + ], "references": [ { "url": "https://plugins.trac.wordpress.org/browser/colibri-page-builder/trunk/extend-builder/shortcodes/blog/post-item.php#L132", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product" + ] }, { "url": "https://plugins.trac.wordpress.org/changeset/3097694/", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Patch" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/08159865-1411-4a07-b5db-f4ba5bf2d633?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-51xx/CVE-2024-5188.json b/CVE-2024/CVE-2024-51xx/CVE-2024-5188.json index df374a674e8..67dc3b81add 100644 --- a/CVE-2024/CVE-2024-51xx/CVE-2024-5188.json +++ b/CVE-2024/CVE-2024-51xx/CVE-2024-5188.json @@ -2,8 +2,8 @@ "id": "CVE-2024-5188", "sourceIdentifier": "security@wordfence.com", "published": "2024-06-06T11:15:49.057", - "lastModified": "2024-06-06T14:17:35.017", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-06-11T17:41:17.087", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -17,8 +17,28 @@ "metrics": { "cvssMetricV31": [ { - "source": "security@wordfence.com", + "source": "nvd@nist.gov", "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 + }, + { + "source": "security@wordfence.com", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N", @@ -38,18 +58,57 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:wpdeveloper:essential_addons_for_elementor:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "5.9.23", + "matchCriteriaId": "13DC6F93-972E-430E-9E01-9866E2E0172C" + } + ] + } + ] + } + ], "references": [ { "url": "https://plugins.trac.wordpress.org/browser/essential-addons-for-elementor-lite/trunk/includes/Elements/Event_Calendar.php#L3255", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product" + ] }, { "url": "https://plugins.trac.wordpress.org/changeset/3097900/", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Patch" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/5a1d5fd1-80b6-4d62-9837-59ee1e020373?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-52xx/CVE-2024-5221.json b/CVE-2024/CVE-2024-52xx/CVE-2024-5221.json index 03b92cd7792..949a87881bf 100644 --- a/CVE-2024/CVE-2024-52xx/CVE-2024-5221.json +++ b/CVE-2024/CVE-2024-52xx/CVE-2024-5221.json @@ -2,8 +2,8 @@ "id": "CVE-2024-5221", "sourceIdentifier": "security@wordfence.com", "published": "2024-06-06T09:15:14.977", - "lastModified": "2024-06-06T14:17:35.017", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-06-11T17:45:05.337", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -17,8 +17,28 @@ "metrics": { "cvssMetricV31": [ { - "source": "security@wordfence.com", + "source": "nvd@nist.gov", "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 + }, + { + "source": "security@wordfence.com", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N", @@ -38,14 +58,50 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:qodeinteractive:qi_blocks:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "1.3.0", + "matchCriteriaId": "487BCAA9-429D-445E-AFBC-587E7FFC182A" + } + ] + } + ] + } + ], "references": [ { "url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&new=3097241%40qi-blocks%2Ftrunk&old=3094374%40qi-blocks%2Ftrunk&sfp_email=&sfph_mail=", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Patch" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/bdf00861-e31e-485c-a562-12dba56af1c7?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-52xx/CVE-2024-5222.json b/CVE-2024/CVE-2024-52xx/CVE-2024-5222.json index ea433a3062a..0ce9100fb1b 100644 --- a/CVE-2024/CVE-2024-52xx/CVE-2024-5222.json +++ b/CVE-2024/CVE-2024-52xx/CVE-2024-5222.json @@ -2,8 +2,8 @@ "id": "CVE-2024-5222", "sourceIdentifier": "security@wordfence.com", "published": "2024-06-05T07:15:46.127", - "lastModified": "2024-06-05T12:53:50.240", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-06-11T17:10:40.303", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -17,8 +17,28 @@ "metrics": { "cvssMetricV31": [ { - "source": "security@wordfence.com", + "source": "nvd@nist.gov", "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 + }, + { + "source": "security@wordfence.com", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N", @@ -38,22 +58,64 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cyberchimps:responsive_addons:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "3.0.6", + "matchCriteriaId": "30C09099-BD98-4604-9B25-5EC42F2E85BF" + } + ] + } + ] + } + ], "references": [ { "url": "https://plugins.trac.wordpress.org/browser/responsive-add-ons/tags/3.0.4/includes/class-responsive-add-ons.php#L131", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product" + ] }, { "url": "https://plugins.trac.wordpress.org/browser/responsive-add-ons/tags/3.0.4/includes/importers/wxr-importer/class-responsive-ready-sites-wxr-importer.php#L57", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product" + ] }, { "url": "https://plugins.trac.wordpress.org/changeset/3094256/responsive-add-ons/trunk/includes/importers/wxr-importer/class-responsive-ready-sites-wxr-importer.php", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Patch" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/e1af37ed-fcc6-479c-8c53-25ccb9a8659f?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-52xx/CVE-2024-5259.json b/CVE-2024/CVE-2024-52xx/CVE-2024-5259.json index b2106d4a981..9d34c181a29 100644 --- a/CVE-2024/CVE-2024-52xx/CVE-2024-5259.json +++ b/CVE-2024/CVE-2024-52xx/CVE-2024-5259.json @@ -2,8 +2,8 @@ "id": "CVE-2024-5259", "sourceIdentifier": "security@wordfence.com", "published": "2024-06-06T10:15:09.557", - "lastModified": "2024-06-06T14:17:35.017", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-06-11T17:44:42.783", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -17,8 +17,28 @@ "metrics": { "cvssMetricV31": [ { - "source": "security@wordfence.com", + "source": "nvd@nist.gov", "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 + }, + { + "source": "security@wordfence.com", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N", @@ -38,22 +58,65 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:multivendorx:multivendorx:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "4.1.12", + "matchCriteriaId": "1E0E88F5-7475-4118-B5A3-23BD6F280BEA" + } + ] + } + ] + } + ], "references": [ { "url": "https://plugins.trac.wordpress.org/browser/dc-woocommerce-multi-vendor/trunk/packages/mvx-elementor/widgets/class-mvx-widget-storesocial.php#L150", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product" + ] }, { "url": "https://plugins.trac.wordpress.org/changeset/3097002/", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Patch" + ] }, { "url": "https://wordpress.org/plugins/dc-woocommerce-multi-vendor/#developers", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product", + "Release Notes" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/59a349f2-048d-49a5-92ea-c19f1d1cd45e?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-52xx/CVE-2024-5262.json b/CVE-2024/CVE-2024-52xx/CVE-2024-5262.json index 880dd9b4c8d..fd6c89513d1 100644 --- a/CVE-2024/CVE-2024-52xx/CVE-2024-5262.json +++ b/CVE-2024/CVE-2024-52xx/CVE-2024-5262.json @@ -2,8 +2,8 @@ "id": "CVE-2024-5262", "sourceIdentifier": "ART@zuso.ai", "published": "2024-06-05T04:15:11.807", - "lastModified": "2024-06-05T12:53:50.240", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-06-11T17:18:50.600", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -14,8 +14,41 @@ "value": "Vulnerabilidad de archivos o directorios accesibles a partes externas en el servidor smb en ProjectDiscovery Interactsh permite a atacantes remotos leer/escribir cualquier archivo en el directorio y subdirectorios donde la v\u00edctima ejecuta interactsh-server mediante un inicio de sesi\u00f3n an\u00f3nimo." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-552" + } + ] + }, { "source": "ART@zuso.ai", "type": "Secondary", @@ -27,14 +60,39 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:projectdiscovery:interactsh:*:*:*:*:*:*:*:*", + "versionStartIncluding": "0.0.6", + "versionEndExcluding": "1.2.0", + "matchCriteriaId": "5A02A4FA-9534-403D-92E9-B215FF7BF5C3" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/projectdiscovery/interactsh/pull/874", - "source": "ART@zuso.ai" + "source": "ART@zuso.ai", + "tags": [ + "Patch" + ] }, { "url": "https://zuso.ai/advisory/za-2024-01", - "source": "ART@zuso.ai" + "source": "ART@zuso.ai", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-53xx/CVE-2024-5317.json b/CVE-2024/CVE-2024-53xx/CVE-2024-5317.json index a9d9c34b880..2b2c2ca6dbf 100644 --- a/CVE-2024/CVE-2024-53xx/CVE-2024-5317.json +++ b/CVE-2024/CVE-2024-53xx/CVE-2024-5317.json @@ -2,8 +2,8 @@ "id": "CVE-2024-5317", "sourceIdentifier": "security@wordfence.com", "published": "2024-06-05T02:15:10.163", - "lastModified": "2024-06-05T12:53:50.240", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-06-11T17:22:08.007", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -17,8 +17,28 @@ "metrics": { "cvssMetricV31": [ { - "source": "security@wordfence.com", + "source": "nvd@nist.gov", "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 6.1, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 + }, + { + "source": "security@wordfence.com", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N", @@ -38,14 +58,50 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:thenewsletterplugin:newsletter:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "8.3.5", + "matchCriteriaId": "240B84F4-B2B6-49A2-8728-3D80A4DBC044" + } + ] + } + ] + } + ], "references": [ { "url": "https://plugins.trac.wordpress.org/changeset/3095002/newsletter", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Patch" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/4876e05e-efa6-46c6-832b-9ecc42934998?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-53xx/CVE-2024-5329.json b/CVE-2024/CVE-2024-53xx/CVE-2024-5329.json index 77eedda1ffa..83f70c0e93a 100644 --- a/CVE-2024/CVE-2024-53xx/CVE-2024-5329.json +++ b/CVE-2024/CVE-2024-53xx/CVE-2024-5329.json @@ -2,8 +2,8 @@ "id": "CVE-2024-5329", "sourceIdentifier": "security@wordfence.com", "published": "2024-06-06T10:15:10.493", - "lastModified": "2024-06-06T14:17:35.017", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-06-11T17:42:26.677", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -38,22 +38,65 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:unlimited-elements:unlimited_elements_for_elementor_\\(free_widgets\\,_addons\\,_templates\\):*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "1.5.110", + "matchCriteriaId": "BD42D6C3-56A2-41ED-BC21-798EB30D1526" + } + ] + } + ] + } + ], "references": [ { "url": "https://plugins.trac.wordpress.org/browser/unlimited-elements-for-elementor/trunk/inc_php/unitecreator_addons.class.php#L999", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product" + ] }, { "url": "https://plugins.trac.wordpress.org/changeset/3097249/#file6", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Patch" + ] }, { "url": "https://wordpress.org/plugins/unlimited-elements-for-elementor/#developers", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product", + "Release Notes" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/f33d77b7-5412-47bf-9bed-8617151723c9?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-54xx/CVE-2024-5439.json b/CVE-2024/CVE-2024-54xx/CVE-2024-5439.json index fdd9e518925..2e32f081dad 100644 --- a/CVE-2024/CVE-2024-54xx/CVE-2024-5439.json +++ b/CVE-2024/CVE-2024-54xx/CVE-2024-5439.json @@ -2,8 +2,8 @@ "id": "CVE-2024-5439", "sourceIdentifier": "security@wordfence.com", "published": "2024-06-05T08:15:10.210", - "lastModified": "2024-06-05T12:53:50.240", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-06-11T17:35:43.313", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -17,8 +17,28 @@ "metrics": { "cvssMetricV31": [ { - "source": "security@wordfence.com", + "source": "nvd@nist.gov", "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 + }, + { + "source": "security@wordfence.com", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N", @@ -38,14 +58,50 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:creativethemes:blocksy:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "2.0.51", + "matchCriteriaId": "3437D3E0-DD91-4497-9CBB-BF603B386200" + } + ] + } + ] + } + ], "references": [ { "url": "https://themes.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&new=229705%40blocksy%2F2.0.51&old=228990%40blocksy%2F2.0.50", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Patch" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/c05687f4-5ea2-4226-982f-c3499f204685?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-54xx/CVE-2024-5453.json b/CVE-2024/CVE-2024-54xx/CVE-2024-5453.json index bf087d5d7b2..3d5cd06ce54 100644 --- a/CVE-2024/CVE-2024-54xx/CVE-2024-5453.json +++ b/CVE-2024/CVE-2024-54xx/CVE-2024-5453.json @@ -2,8 +2,8 @@ "id": "CVE-2024-5453", "sourceIdentifier": "security@wordfence.com", "published": "2024-06-05T08:15:10.410", - "lastModified": "2024-06-05T12:53:50.240", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-06-11T17:34:52.263", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -16,6 +16,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 4.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + }, { "source": "security@wordfence.com", "type": "Secondary", @@ -38,22 +58,64 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:metagauss:profilegrid:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "5.8.7", + "matchCriteriaId": "EAC2B9C2-9EE3-4071-94BA-00DE2691485E" + } + ] + } + ] + } + ], "references": [ { "url": "https://plugins.trac.wordpress.org/browser/profilegrid-user-profiles-groups-and-communities/trunk/admin/class-profile-magic-admin.php#L1378", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product" + ] }, { "url": "https://plugins.trac.wordpress.org/browser/profilegrid-user-profiles-groups-and-communities/trunk/admin/class-profile-magic-admin.php#L2006", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product" + ] }, { "url": "https://plugins.trac.wordpress.org/changeset/3095503/profilegrid-user-profiles-groups-and-communities/trunk/admin/class-profile-magic-admin.php?contextall=1", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Patch" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/7a44d182-2a43-47c0-ab2e-36c0514c1d47?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-54xx/CVE-2024-5483.json b/CVE-2024/CVE-2024-54xx/CVE-2024-5483.json index 9807490ecda..80375e6a1f7 100644 --- a/CVE-2024/CVE-2024-54xx/CVE-2024-5483.json +++ b/CVE-2024/CVE-2024-54xx/CVE-2024-5483.json @@ -2,8 +2,8 @@ "id": "CVE-2024-5483", "sourceIdentifier": "security@wordfence.com", "published": "2024-06-05T03:15:08.810", - "lastModified": "2024-06-05T12:53:50.240", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-06-11T17:19:17.143", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -38,14 +38,50 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:thimpress:learnpress:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "4.2.6.8.1", + "matchCriteriaId": "75ACBE4E-FBE4-4AE6-94DA-C24DD3F48F07" + } + ] + } + ] + } + ], "references": [ { "url": "https://plugins.trac.wordpress.org/browser/learnpress/tags/4.2.6.8/inc/jwt/rest-api/version1/class-lp-rest-users-v1-controller.php#L130", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/122b75d2-e882-45b9-baf1-acf847f8d60a?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-55xx/CVE-2024-5526.json b/CVE-2024/CVE-2024-55xx/CVE-2024-5526.json index 7004f385606..728b75caccd 100644 --- a/CVE-2024/CVE-2024-55xx/CVE-2024-5526.json +++ b/CVE-2024/CVE-2024-55xx/CVE-2024-5526.json @@ -2,8 +2,8 @@ "id": "CVE-2024-5526", "sourceIdentifier": "security@grafana.com", "published": "2024-06-05T12:15:10.553", - "lastModified": "2024-06-05T12:53:50.240", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-06-11T17:25:55.677", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -16,6 +16,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 9.1, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.2 + }, { "source": "security@grafana.com", "type": "Secondary", @@ -39,6 +59,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-918" + } + ] + }, { "source": "security@grafana.com", "type": "Secondary", @@ -50,10 +80,32 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:grafana:oncall:*:*:*:*:*:*:*:*", + "versionStartIncluding": "1.1.37", + "versionEndExcluding": "1.5.2", + "matchCriteriaId": "8083357A-51B5-4D2F-9549-FE2782948856" + } + ] + } + ] + } + ], "references": [ { "url": "https://grafana.com/security/security-advisories/cve-2024-5526/", - "source": "security@grafana.com" + "source": "security@grafana.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-55xx/CVE-2024-5536.json b/CVE-2024/CVE-2024-55xx/CVE-2024-5536.json index ab049675216..bf19c1daa79 100644 --- a/CVE-2024/CVE-2024-55xx/CVE-2024-5536.json +++ b/CVE-2024/CVE-2024-55xx/CVE-2024-5536.json @@ -2,8 +2,8 @@ "id": "CVE-2024-5536", "sourceIdentifier": "security@wordfence.com", "published": "2024-06-05T10:15:09.170", - "lastModified": "2024-06-05T12:53:50.240", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-06-11T17:28:37.343", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -17,8 +17,28 @@ "metrics": { "cvssMetricV31": [ { - "source": "security@wordfence.com", + "source": "nvd@nist.gov", "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 + }, + { + "source": "security@wordfence.com", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N", @@ -38,14 +58,50 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:gamipress:gamipress_-_link:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "1.1.5", + "matchCriteriaId": "2DC76723-0430-4284-9CBE-CB9EF6681C5E" + } + ] + } + ] + } + ], "references": [ { "url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&new=3096646%40gamipress-link%2Ftrunk&old=2989725%40gamipress-link%2Ftrunk&sfp_email=&sfph_mail=", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Patch" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/6c3954af-f7db-495c-b6f0-49f24d6f4b18?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-55xx/CVE-2024-5571.json b/CVE-2024/CVE-2024-55xx/CVE-2024-5571.json index ffb0be1c887..0219df2a901 100644 --- a/CVE-2024/CVE-2024-55xx/CVE-2024-5571.json +++ b/CVE-2024/CVE-2024-55xx/CVE-2024-5571.json @@ -2,8 +2,8 @@ "id": "CVE-2024-5571", "sourceIdentifier": "security@wordfence.com", "published": "2024-06-05T09:15:10.463", - "lastModified": "2024-06-05T12:53:50.240", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-06-11T17:29:03.277", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -17,8 +17,28 @@ "metrics": { "cvssMetricV31": [ { - "source": "security@wordfence.com", + "source": "nvd@nist.gov", "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 + }, + { + "source": "security@wordfence.com", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N", @@ -38,18 +58,57 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:wpdeveloper:embedpress:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "4.0.2", + "matchCriteriaId": "AC2CE634-C1A0-40B6-B9A6-A9FD3D784CA4" + } + ] + } + ] + } + ], "references": [ { "url": "https://plugins.trac.wordpress.org/browser/embedpress/tags/4.0.0/EmbedPress/Elementor/Widgets/Embedpress_Pdf.php#L690", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product" + ] }, { "url": "https://plugins.trac.wordpress.org/changeset/3097114/", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Patch" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/7becdab6-f952-4649-8cea-4efadf841619?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-56xx/CVE-2024-5615.json b/CVE-2024/CVE-2024-56xx/CVE-2024-5615.json index 6871bbe90c9..55a6115994e 100644 --- a/CVE-2024/CVE-2024-56xx/CVE-2024-5615.json +++ b/CVE-2024/CVE-2024-56xx/CVE-2024-5615.json @@ -2,8 +2,8 @@ "id": "CVE-2024-5615", "sourceIdentifier": "security@wordfence.com", "published": "2024-06-06T04:15:15.010", - "lastModified": "2024-06-06T14:17:35.017", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-06-11T17:55:16.103", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -38,18 +38,57 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:willnorris:open_graph:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "1.11.3", + "matchCriteriaId": "17828EEF-6293-4773-8166-EAEECDAF47D9" + } + ] + } + ] + } + ], "references": [ { "url": "https://plugins.trac.wordpress.org/browser/opengraph/trunk/opengraph.php#L369", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product" + ] }, { "url": "https://plugins.trac.wordpress.org/changeset/3097574/", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Patch" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/f57dc0fe-07f3-457e-8080-fe530f6a9f01?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-56xx/CVE-2024-5635.json b/CVE-2024/CVE-2024-56xx/CVE-2024-5635.json index 97d79e2183a..3ce822a425d 100644 --- a/CVE-2024/CVE-2024-56xx/CVE-2024-5635.json +++ b/CVE-2024/CVE-2024-56xx/CVE-2024-5635.json @@ -2,8 +2,8 @@ "id": "CVE-2024-5635", "sourceIdentifier": "cna@vuldb.com", "published": "2024-06-04T22:15:10.833", - "lastModified": "2024-06-05T12:53:50.240", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-06-11T16:47:04.413", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -16,6 +16,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + }, { "source": "cna@vuldb.com", "type": "Secondary", @@ -64,6 +84,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + }, { "source": "cna@vuldb.com", "type": "Secondary", @@ -75,22 +105,55 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:bakery_online_ordering_system_project:bakery_online_ordering_system:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "203B0034-B8DE-4501-B2C6-F96FD74AB519" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/L1OudFd8cl09/CVE/blob/main/03_06_2024_a.md", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?ctiid.267091", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.267091", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.349244", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-56xx/CVE-2024-5636.json b/CVE-2024/CVE-2024-56xx/CVE-2024-5636.json index 3b5d5a15ee4..0caf26ebc16 100644 --- a/CVE-2024/CVE-2024-56xx/CVE-2024-5636.json +++ b/CVE-2024/CVE-2024-56xx/CVE-2024-5636.json @@ -2,8 +2,8 @@ "id": "CVE-2024-5636", "sourceIdentifier": "cna@vuldb.com", "published": "2024-06-05T01:15:11.470", - "lastModified": "2024-06-07T17:15:52.007", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-06-11T17:23:29.670", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -16,6 +16,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + }, { "source": "cna@vuldb.com", "type": "Secondary", @@ -75,22 +95,55 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:bakery_online_ordering_system_project:bakery_online_ordering_system:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "203B0034-B8DE-4501-B2C6-F96FD74AB519" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/L1OudFd8cl09/CVE/blob/main/03_06_2024_b.md", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?ctiid.267092", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.267092", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.349247", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-56xx/CVE-2024-5645.json b/CVE-2024/CVE-2024-56xx/CVE-2024-5645.json index 7ae29031f87..a4342bdd9b0 100644 --- a/CVE-2024/CVE-2024-56xx/CVE-2024-5645.json +++ b/CVE-2024/CVE-2024-56xx/CVE-2024-5645.json @@ -2,8 +2,8 @@ "id": "CVE-2024-5645", "sourceIdentifier": "security@wordfence.com", "published": "2024-06-07T10:15:12.090", - "lastModified": "2024-06-07T14:56:05.647", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-06-11T17:57:47.197", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -16,6 +16,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 + }, { "source": "security@wordfence.com", "type": "Secondary", @@ -38,22 +58,65 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:envothemes:envo_extra:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "1.8.25", + "matchCriteriaId": "872B788C-22DE-4A9D-BDC5-586E9B8FE58F" + } + ] + } + ] + } + ], "references": [ { "url": "https://plugins.trac.wordpress.org/browser/envo-extra/tags/1.8.22/lib/elementor/widgets/button/button.php#L676", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product" + ] }, { "url": "https://plugins.trac.wordpress.org/changeset/3098500/", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Patch" + ] }, { "url": "https://wordpress.org/plugins/envo-extra/#developers", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product", + "Release Notes" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/dbe53b09-84c6-4fb6-9a79-1e4987678129?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-56xx/CVE-2024-5656.json b/CVE-2024/CVE-2024-56xx/CVE-2024-5656.json index 56c25fb830e..960fb21351f 100644 --- a/CVE-2024/CVE-2024-56xx/CVE-2024-5656.json +++ b/CVE-2024/CVE-2024-56xx/CVE-2024-5656.json @@ -2,8 +2,8 @@ "id": "CVE-2024-5656", "sourceIdentifier": "security@wordfence.com", "published": "2024-06-06T05:15:49.377", - "lastModified": "2024-06-06T14:17:35.017", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-06-11T17:54:54.870", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -17,8 +17,28 @@ "metrics": { "cvssMetricV31": [ { - "source": "security@wordfence.com", + "source": "nvd@nist.gov", "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 4.8, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.7, + "impactScore": 2.7 + }, + { + "source": "security@wordfence.com", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:L/I:L/A:N", @@ -38,14 +58,50 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:erikeng:google_cse:*:*:*:*:*:wordpress:*:*", + "versionEndIncluding": "1.0.7", + "matchCriteriaId": "FFDB6E6C-5D13-47A8-9A87-EF3094CA1671" + } + ] + } + ] + } + ], "references": [ { "url": "https://wpscan.com/vulnerability/adc6ea6d-29d8-4ad0-b0db-2540e8b3f9a9/", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/37cf63e3-9301-441d-9852-b2de83078b51?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-56xx/CVE-2024-5657.json b/CVE-2024/CVE-2024-56xx/CVE-2024-5657.json index 9d2f219169c..cc32378ff14 100644 --- a/CVE-2024/CVE-2024-56xx/CVE-2024-5657.json +++ b/CVE-2024/CVE-2024-56xx/CVE-2024-5657.json @@ -2,8 +2,8 @@ "id": "CVE-2024-5657", "sourceIdentifier": "1e3a9e0f-5156-4bf8-b8a3-cc311bfc0f4a", "published": "2024-06-06T11:15:49.277", - "lastModified": "2024-06-10T17:16:35.420", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-06-11T17:40:47.823", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -16,6 +16,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.1, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.2, + "impactScore": 5.9 + }, { "source": "1e3a9e0f-5156-4bf8-b8a3-cc311bfc0f4a", "type": "Secondary", @@ -39,6 +59,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-522" + } + ] + }, { "source": "1e3a9e0f-5156-4bf8-b8a3-cc311bfc0f4a", "type": "Secondary", @@ -50,22 +80,56 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:born05:two-factor_authentication:*:*:*:*:*:craftcms:*:*", + "versionStartIncluding": "3.3.1", + "versionEndExcluding": "3.3.4", + "matchCriteriaId": "D650F748-210A-4894-BEAD-3EA2D7DDACE2" + } + ] + } + ] + } + ], "references": [ { "url": "http://www.openwall.com/lists/oss-security/2024/06/06/1", - "source": "1e3a9e0f-5156-4bf8-b8a3-cc311bfc0f4a" + "source": "1e3a9e0f-5156-4bf8-b8a3-cc311bfc0f4a", + "tags": [ + "Exploit", + "Mailing List", + "Third Party Advisory" + ] }, { "url": "https://github.com/born05/craft-twofactorauthentication/releases/tag/3.3.4", - "source": "1e3a9e0f-5156-4bf8-b8a3-cc311bfc0f4a" + "source": "1e3a9e0f-5156-4bf8-b8a3-cc311bfc0f4a", + "tags": [ + "Release Notes" + ] }, { "url": "https://github.com/sbaresearch/advisories/tree/public/2024/SBA-ADV-20240202-01_CraftCMS_Plugin_Two-Factor_Authentication_Password_Hash_Disclosure", - "source": "1e3a9e0f-5156-4bf8-b8a3-cc311bfc0f4a" + "source": "1e3a9e0f-5156-4bf8-b8a3-cc311bfc0f4a", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://plugins.craftcms.com/two-factor-authentication?craft4", - "source": "1e3a9e0f-5156-4bf8-b8a3-cc311bfc0f4a" + "source": "1e3a9e0f-5156-4bf8-b8a3-cc311bfc0f4a", + "tags": [ + "Product" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-56xx/CVE-2024-5665.json b/CVE-2024/CVE-2024-56xx/CVE-2024-5665.json index 77bc382abb1..745b933ae9f 100644 --- a/CVE-2024/CVE-2024-56xx/CVE-2024-5665.json +++ b/CVE-2024/CVE-2024-56xx/CVE-2024-5665.json @@ -2,8 +2,8 @@ "id": "CVE-2024-5665", "sourceIdentifier": "security@wordfence.com", "published": "2024-06-06T08:15:40.153", - "lastModified": "2024-06-06T14:17:35.017", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-06-11T17:47:45.033", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -16,6 +16,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 4.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + }, { "source": "security@wordfence.com", "type": "Secondary", @@ -38,18 +58,58 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:xootix:login\\/signup_popup:*:*:*:*:*:wordpress:*:*", + "versionStartIncluding": "2.7.1", + "versionEndExcluding": "2.7.3", + "matchCriteriaId": "A69A037D-0C5F-4EBB-B1FB-2068124742A9" + } + ] + } + ] + } + ], "references": [ { "url": "https://plugins.trac.wordpress.org/browser/easy-login-woocommerce/trunk/includes/xoo-framework/admin/class-xoo-admin-settings.php?rev=3084943#L69", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product" + ] }, { "url": "https://plugins.trac.wordpress.org/changeset/3093994/", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Patch" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/1a304e9a-9518-4a6a-b36a-963cb329f5c3?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-57xx/CVE-2024-5732.json b/CVE-2024/CVE-2024-57xx/CVE-2024-5732.json index d8e557072db..ce5bf83bd6f 100644 --- a/CVE-2024/CVE-2024-57xx/CVE-2024-5732.json +++ b/CVE-2024/CVE-2024-57xx/CVE-2024-5732.json @@ -2,8 +2,8 @@ "id": "CVE-2024-5732", "sourceIdentifier": "cna@vuldb.com", "published": "2024-06-07T10:15:12.293", - "lastModified": "2024-06-07T15:15:51.007", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-06-11T17:57:13.767", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -16,6 +16,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + }, { "source": "cna@vuldb.com", "type": "Secondary", @@ -75,22 +95,58 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:clashforwindows:clash:*:*:*:*:*:windows:*:*", + "versionStartIncluding": "0.1.0", + "versionEndIncluding": "0.20.1", + "matchCriteriaId": "329C7DB6-FE20-4BA7-ADFF-383019916ACC" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/GTA12138/vul/blob/main/clash%20for%20windows.md", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?ctiid.267406", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.267406", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.345469", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-58xx/CVE-2024-5812.json b/CVE-2024/CVE-2024-58xx/CVE-2024-5812.json new file mode 100644 index 00000000000..486826633db --- /dev/null +++ b/CVE-2024/CVE-2024-58xx/CVE-2024-5812.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2024-5812", + "sourceIdentifier": "13061848-ea10-403d-bd75-c83a022c2891", + "published": "2024-06-11T16:15:29.207", + "lastModified": "2024-06-11T16:15:29.207", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "A low severity vulnerability in BIPS has been identified where an attacker with high privileges or a compromised high privilege account can overwrite Read-Only smart rules via a specially crafted API request." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "13061848-ea10-403d-bd75-c83a022c2891", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 3.3, + "baseSeverity": "LOW" + }, + "exploitabilityScore": 0.7, + "impactScore": 2.5 + } + ] + }, + "weaknesses": [ + { + "source": "13061848-ea10-403d-bd75-c83a022c2891", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-290" + } + ] + } + ], + "references": [ + { + "url": "https://www.beyondtrust.com/trust-center/security-advisories/bt24-07", + "source": "13061848-ea10-403d-bd75-c83a022c2891" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-58xx/CVE-2024-5813.json b/CVE-2024/CVE-2024-58xx/CVE-2024-5813.json new file mode 100644 index 00000000000..b7bd12821f4 --- /dev/null +++ b/CVE-2024/CVE-2024-58xx/CVE-2024-5813.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2024-5813", + "sourceIdentifier": "13061848-ea10-403d-bd75-c83a022c2891", + "published": "2024-06-11T16:15:29.480", + "lastModified": "2024-06-11T16:15:29.480", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "A medium severity vulnerability in BIPS has been identified where an authenticated attacker with high privileges can access the SSH private keys via an information leak in the server response." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "13061848-ea10-403d-bd75-c83a022c2891", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:N", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 5.9, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 0.7, + "impactScore": 5.2 + } + ] + }, + "weaknesses": [ + { + "source": "13061848-ea10-403d-bd75-c83a022c2891", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-200" + } + ] + } + ], + "references": [ + { + "url": "https://www.beyondtrust.com/trust-center/security-advisories/bt24-08", + "source": "13061848-ea10-403d-bd75-c83a022c2891" + } + ] +} \ No newline at end of file diff --git a/README.md b/README.md index 68575803b33..145bf238192 100644 --- a/README.md +++ b/README.md @@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2024-06-11T16:00:23.615313+00:00 +2024-06-11T18:00:18.524852+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2024-06-11T15:27:55+00:00 +2024-06-11T17:57:47.197000+00:00 ``` ### Last Data Feed Release @@ -33,69 +33,69 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### Total Number of included CVEs ```plain -253471 +253547 ``` ### CVEs added in the last Commit -Recently added CVEs: `33` +Recently added CVEs: `76` -- [CVE-2024-21754](CVE-2024/CVE-2024-217xx/CVE-2024-21754.json) (`2024-06-11T15:16:03.433`) -- [CVE-2024-23110](CVE-2024/CVE-2024-231xx/CVE-2024-23110.json) (`2024-06-11T15:16:03.707`) -- [CVE-2024-23111](CVE-2024/CVE-2024-231xx/CVE-2024-23111.json) (`2024-06-11T15:16:03.957`) -- [CVE-2024-24703](CVE-2024/CVE-2024-247xx/CVE-2024-24703.json) (`2024-06-11T15:16:04.197`) -- [CVE-2024-26010](CVE-2024/CVE-2024-260xx/CVE-2024-26010.json) (`2024-06-11T15:16:04.473`) -- [CVE-2024-28021](CVE-2024/CVE-2024-280xx/CVE-2024-28021.json) (`2024-06-11T14:15:10.587`) -- [CVE-2024-28023](CVE-2024/CVE-2024-280xx/CVE-2024-28023.json) (`2024-06-11T14:15:10.803`) -- [CVE-2024-31495](CVE-2024/CVE-2024-314xx/CVE-2024-31495.json) (`2024-06-11T15:16:05.697`) -- [CVE-2024-32148](CVE-2024/CVE-2024-321xx/CVE-2024-32148.json) (`2024-06-11T15:16:05.933`) -- [CVE-2024-34442](CVE-2024/CVE-2024-344xx/CVE-2024-34442.json) (`2024-06-11T14:15:11.803`) -- [CVE-2024-34820](CVE-2024/CVE-2024-348xx/CVE-2024-34820.json) (`2024-06-11T15:16:06.550`) -- [CVE-2024-34826](CVE-2024/CVE-2024-348xx/CVE-2024-34826.json) (`2024-06-11T15:16:06.803`) -- [CVE-2024-35168](CVE-2024/CVE-2024-351xx/CVE-2024-35168.json) (`2024-06-11T15:16:07.043`) -- [CVE-2024-35235](CVE-2024/CVE-2024-352xx/CVE-2024-35235.json) (`2024-06-11T15:16:07.473`) -- [CVE-2024-35628](CVE-2024/CVE-2024-356xx/CVE-2024-35628.json) (`2024-06-11T15:16:07.840`) -- [CVE-2024-35663](CVE-2024/CVE-2024-356xx/CVE-2024-35663.json) (`2024-06-11T15:16:08.077`) -- [CVE-2024-35665](CVE-2024/CVE-2024-356xx/CVE-2024-35665.json) (`2024-06-11T15:16:08.350`) -- [CVE-2024-35667](CVE-2024/CVE-2024-356xx/CVE-2024-35667.json) (`2024-06-11T15:16:08.613`) -- [CVE-2024-35671](CVE-2024/CVE-2024-356xx/CVE-2024-35671.json) (`2024-06-11T14:15:12.223`) -- [CVE-2024-35683](CVE-2024/CVE-2024-356xx/CVE-2024-35683.json) (`2024-06-11T14:15:12.453`) -- [CVE-2024-37161](CVE-2024/CVE-2024-371xx/CVE-2024-37161.json) (`2024-06-11T15:16:09.153`) -- [CVE-2024-37294](CVE-2024/CVE-2024-372xx/CVE-2024-37294.json) (`2024-06-11T15:16:09.467`) -- [CVE-2024-37295](CVE-2024/CVE-2024-372xx/CVE-2024-37295.json) (`2024-06-11T15:16:09.710`) -- [CVE-2024-37296](CVE-2024/CVE-2024-372xx/CVE-2024-37296.json) (`2024-06-11T15:16:09.963`) -- [CVE-2024-5189](CVE-2024/CVE-2024-51xx/CVE-2024-5189.json) (`2024-06-11T14:15:12.847`) +- [CVE-2024-32146](CVE-2024/CVE-2024-321xx/CVE-2024-32146.json) (`2024-06-11T17:16:00.490`) +- [CVE-2024-34753](CVE-2024/CVE-2024-347xx/CVE-2024-34753.json) (`2024-06-11T16:15:27.760`) +- [CVE-2024-34758](CVE-2024/CVE-2024-347xx/CVE-2024-34758.json) (`2024-06-11T17:16:00.717`) +- [CVE-2024-34763](CVE-2024/CVE-2024-347xx/CVE-2024-34763.json) (`2024-06-11T17:16:00.950`) +- [CVE-2024-34768](CVE-2024/CVE-2024-347xx/CVE-2024-34768.json) (`2024-06-11T17:16:01.187`) +- [CVE-2024-34799](CVE-2024/CVE-2024-347xx/CVE-2024-34799.json) (`2024-06-11T17:16:01.430`) +- [CVE-2024-34804](CVE-2024/CVE-2024-348xx/CVE-2024-34804.json) (`2024-06-11T17:16:01.683`) +- [CVE-2024-34815](CVE-2024/CVE-2024-348xx/CVE-2024-34815.json) (`2024-06-11T17:16:01.903`) +- [CVE-2024-34819](CVE-2024/CVE-2024-348xx/CVE-2024-34819.json) (`2024-06-11T16:15:28.010`) +- [CVE-2024-34821](CVE-2024/CVE-2024-348xx/CVE-2024-34821.json) (`2024-06-11T16:15:28.280`) +- [CVE-2024-34822](CVE-2024/CVE-2024-348xx/CVE-2024-34822.json) (`2024-06-11T16:15:28.563`) +- [CVE-2024-35248](CVE-2024/CVE-2024-352xx/CVE-2024-35248.json) (`2024-06-11T17:16:02.180`) +- [CVE-2024-35249](CVE-2024/CVE-2024-352xx/CVE-2024-35249.json) (`2024-06-11T17:16:02.417`) +- [CVE-2024-35250](CVE-2024/CVE-2024-352xx/CVE-2024-35250.json) (`2024-06-11T17:16:02.650`) +- [CVE-2024-35252](CVE-2024/CVE-2024-352xx/CVE-2024-35252.json) (`2024-06-11T17:16:02.890`) +- [CVE-2024-35253](CVE-2024/CVE-2024-352xx/CVE-2024-35253.json) (`2024-06-11T17:16:03.130`) +- [CVE-2024-35254](CVE-2024/CVE-2024-352xx/CVE-2024-35254.json) (`2024-06-11T17:16:03.347`) +- [CVE-2024-35255](CVE-2024/CVE-2024-352xx/CVE-2024-35255.json) (`2024-06-11T17:16:03.550`) +- [CVE-2024-35263](CVE-2024/CVE-2024-352xx/CVE-2024-35263.json) (`2024-06-11T17:16:03.773`) +- [CVE-2024-35265](CVE-2024/CVE-2024-352xx/CVE-2024-35265.json) (`2024-06-11T17:16:03.997`) +- [CVE-2024-36650](CVE-2024/CVE-2024-366xx/CVE-2024-36650.json) (`2024-06-11T16:15:29.043`) +- [CVE-2024-37293](CVE-2024/CVE-2024-372xx/CVE-2024-37293.json) (`2024-06-11T17:16:04.237`) +- [CVE-2024-37325](CVE-2024/CVE-2024-373xx/CVE-2024-37325.json) (`2024-06-11T17:16:04.477`) +- [CVE-2024-5812](CVE-2024/CVE-2024-58xx/CVE-2024-5812.json) (`2024-06-11T16:15:29.207`) +- [CVE-2024-5813](CVE-2024/CVE-2024-58xx/CVE-2024-5813.json) (`2024-06-11T16:15:29.480`) ### CVEs modified in the last Commit -Recently modified CVEs: `45` +Recently modified CVEs: `78` -- [CVE-2024-21383](CVE-2024/CVE-2024-213xx/CVE-2024-21383.json) (`2024-06-11T15:16:01.720`) -- [CVE-2024-21385](CVE-2024/CVE-2024-213xx/CVE-2024-21385.json) (`2024-06-11T15:16:01.877`) -- [CVE-2024-21387](CVE-2024/CVE-2024-213xx/CVE-2024-21387.json) (`2024-06-11T15:16:02.047`) -- [CVE-2024-21388](CVE-2024/CVE-2024-213xx/CVE-2024-21388.json) (`2024-06-11T15:16:02.170`) -- [CVE-2024-21399](CVE-2024/CVE-2024-213xx/CVE-2024-21399.json) (`2024-06-11T15:16:02.503`) -- [CVE-2024-21412](CVE-2024/CVE-2024-214xx/CVE-2024-21412.json) (`2024-06-11T15:16:02.980`) -- [CVE-2024-21423](CVE-2024/CVE-2024-214xx/CVE-2024-21423.json) (`2024-06-11T15:16:03.297`) -- [CVE-2024-25095](CVE-2024/CVE-2024-250xx/CVE-2024-25095.json) (`2024-06-11T14:28:47.063`) -- [CVE-2024-26188](CVE-2024/CVE-2024-261xx/CVE-2024-26188.json) (`2024-06-11T15:16:04.713`) -- [CVE-2024-26192](CVE-2024/CVE-2024-261xx/CVE-2024-26192.json) (`2024-06-11T15:16:04.830`) -- [CVE-2024-26196](CVE-2024/CVE-2024-261xx/CVE-2024-26196.json) (`2024-06-11T15:16:04.943`) -- [CVE-2024-28103](CVE-2024/CVE-2024-281xx/CVE-2024-28103.json) (`2024-06-11T15:27:55.000`) -- [CVE-2024-29152](CVE-2024/CVE-2024-291xx/CVE-2024-29152.json) (`2024-06-11T15:14:57.847`) -- [CVE-2024-30484](CVE-2024/CVE-2024-304xx/CVE-2024-30484.json) (`2024-06-11T14:54:57.570`) -- [CVE-2024-30525](CVE-2024/CVE-2024-305xx/CVE-2024-30525.json) (`2024-06-11T15:22:30.403`) -- [CVE-2024-30528](CVE-2024/CVE-2024-305xx/CVE-2024-30528.json) (`2024-06-11T15:20:20.633`) -- [CVE-2024-32464](CVE-2024/CVE-2024-324xx/CVE-2024-32464.json) (`2024-06-11T15:24:13.467`) -- [CVE-2024-34759](CVE-2024/CVE-2024-347xx/CVE-2024-34759.json) (`2024-06-11T14:27:17.887`) -- [CVE-2024-35670](CVE-2024/CVE-2024-356xx/CVE-2024-35670.json) (`2024-06-11T14:32:50.147`) -- [CVE-2024-35672](CVE-2024/CVE-2024-356xx/CVE-2024-35672.json) (`2024-06-11T14:21:04.210`) -- [CVE-2024-36604](CVE-2024/CVE-2024-366xx/CVE-2024-36604.json) (`2024-06-11T14:24:17.413`) -- [CVE-2024-36857](CVE-2024/CVE-2024-368xx/CVE-2024-36857.json) (`2024-06-11T14:13:14.437`) -- [CVE-2024-36858](CVE-2024/CVE-2024-368xx/CVE-2024-36858.json) (`2024-06-11T14:12:39.667`) -- [CVE-2024-37273](CVE-2024/CVE-2024-372xx/CVE-2024-37273.json) (`2024-06-11T14:12:23.210`) -- [CVE-2024-5829](CVE-2024/CVE-2024-58xx/CVE-2024-5829.json) (`2024-06-11T14:15:13.150`) +- [CVE-2024-4886](CVE-2024/CVE-2024-48xx/CVE-2024-4886.json) (`2024-06-11T17:14:56.323`) +- [CVE-2024-4939](CVE-2024/CVE-2024-49xx/CVE-2024-4939.json) (`2024-06-11T17:08:33.350`) +- [CVE-2024-5006](CVE-2024/CVE-2024-50xx/CVE-2024-5006.json) (`2024-06-11T17:36:24.000`) +- [CVE-2024-5038](CVE-2024/CVE-2024-50xx/CVE-2024-5038.json) (`2024-06-11T17:41:37.883`) +- [CVE-2024-5188](CVE-2024/CVE-2024-51xx/CVE-2024-5188.json) (`2024-06-11T17:41:17.087`) +- [CVE-2024-5221](CVE-2024/CVE-2024-52xx/CVE-2024-5221.json) (`2024-06-11T17:45:05.337`) +- [CVE-2024-5222](CVE-2024/CVE-2024-52xx/CVE-2024-5222.json) (`2024-06-11T17:10:40.303`) +- [CVE-2024-5259](CVE-2024/CVE-2024-52xx/CVE-2024-5259.json) (`2024-06-11T17:44:42.783`) +- [CVE-2024-5262](CVE-2024/CVE-2024-52xx/CVE-2024-5262.json) (`2024-06-11T17:18:50.600`) +- [CVE-2024-5317](CVE-2024/CVE-2024-53xx/CVE-2024-5317.json) (`2024-06-11T17:22:08.007`) +- [CVE-2024-5329](CVE-2024/CVE-2024-53xx/CVE-2024-5329.json) (`2024-06-11T17:42:26.677`) +- [CVE-2024-5439](CVE-2024/CVE-2024-54xx/CVE-2024-5439.json) (`2024-06-11T17:35:43.313`) +- [CVE-2024-5453](CVE-2024/CVE-2024-54xx/CVE-2024-5453.json) (`2024-06-11T17:34:52.263`) +- [CVE-2024-5483](CVE-2024/CVE-2024-54xx/CVE-2024-5483.json) (`2024-06-11T17:19:17.143`) +- [CVE-2024-5526](CVE-2024/CVE-2024-55xx/CVE-2024-5526.json) (`2024-06-11T17:25:55.677`) +- [CVE-2024-5536](CVE-2024/CVE-2024-55xx/CVE-2024-5536.json) (`2024-06-11T17:28:37.343`) +- [CVE-2024-5571](CVE-2024/CVE-2024-55xx/CVE-2024-5571.json) (`2024-06-11T17:29:03.277`) +- [CVE-2024-5615](CVE-2024/CVE-2024-56xx/CVE-2024-5615.json) (`2024-06-11T17:55:16.103`) +- [CVE-2024-5635](CVE-2024/CVE-2024-56xx/CVE-2024-5635.json) (`2024-06-11T16:47:04.413`) +- [CVE-2024-5636](CVE-2024/CVE-2024-56xx/CVE-2024-5636.json) (`2024-06-11T17:23:29.670`) +- [CVE-2024-5645](CVE-2024/CVE-2024-56xx/CVE-2024-5645.json) (`2024-06-11T17:57:47.197`) +- [CVE-2024-5656](CVE-2024/CVE-2024-56xx/CVE-2024-5656.json) (`2024-06-11T17:54:54.870`) +- [CVE-2024-5657](CVE-2024/CVE-2024-56xx/CVE-2024-5657.json) (`2024-06-11T17:40:47.823`) +- [CVE-2024-5665](CVE-2024/CVE-2024-56xx/CVE-2024-5665.json) (`2024-06-11T17:47:45.033`) +- [CVE-2024-5732](CVE-2024/CVE-2024-57xx/CVE-2024-5732.json) (`2024-06-11T17:57:13.767`) ## Download and Usage diff --git a/_state.csv b/_state.csv index 807c03e85c1..f2c3484cc07 100644 --- a/_state.csv +++ b/_state.csv @@ -138264,7 +138264,7 @@ CVE-2019-25034,0,0,93d8b1c7bc76a8a254e5fbbec3793f6fd621b352538b8bfa7815c75a6d0a0 CVE-2019-25035,0,0,a6ab744e6e454ab8c476a9b101c52cc4a059a0c473696bc294d96deae1020c71,2024-05-17T01:36:38.320000 CVE-2019-25036,0,0,32ed6720fb7931ac646090eb637de3f22283048d995abd10fd91938f8bed8155,2024-05-17T01:36:38.403000 CVE-2019-25037,0,0,711aa9f338e33fbcee2ca6a77522530fc5117edac3a13837d528ddf9237d9d68,2024-05-17T01:36:38.483000 -CVE-2019-25038,0,1,d1d1fff07e0e19ccf1bb2708b9009d0814b73b96806b2096835bfcd867c3ff9e,2024-06-11T15:15:52.423000 +CVE-2019-25038,0,0,d1d1fff07e0e19ccf1bb2708b9009d0814b73b96806b2096835bfcd867c3ff9e,2024-06-11T15:15:52.423000 CVE-2019-25039,0,0,83b99cc313ab9d0551380025f304ae033b80c770826ee74047326efff548bc3e,2024-05-17T01:36:38.690000 CVE-2019-2504,0,0,d2aed17459d412361b9a239f1824bec67eea862d74128b9cac2d22083a4de6db,2020-08-24T17:37:01.140000 CVE-2019-25040,0,0,7ccd251a041bc11bd73b50a1777092c34ec702e2279526f7b793ed4664395aa9,2024-05-17T01:36:38.930000 @@ -150592,7 +150592,7 @@ CVE-2020-15908,0,0,7a81d300bc848f3460ab0e5117b1521203e8e75172ead215d4458a3380ea4 CVE-2020-15909,0,0,0e6d4465b9e89c54b88c9174c24010a650e43e4b0113f80aebb7af98835633e8,2020-10-29T22:14:15.537000 CVE-2020-1591,0,0,d2cd95de24105d499b19d67fbdda2e17cb502fc9b787079d4919157f351f9659,2024-01-19T00:15:20.377000 CVE-2020-15910,0,0,79aa60112774f5b0f0a211f52faff8119c3156f3d1c66ee79a1fcd0f79564d45,2020-10-29T22:16:19.100000 -CVE-2020-15912,0,0,993657bc6af687059b02b931c86d59ce330de99ab793ec545d3343573215b7c8,2024-05-17T01:43:37.570000 +CVE-2020-15912,0,1,fa6a454ebba7a2e71ef91e72cb012b20aa5a2d664f1c0beffb84f3d2ffc629b7,2024-06-11T17:15:49.737000 CVE-2020-15914,0,0,b003d86f5f9ebd2506a695b795d2ffa4f50682c661e89cc0bb4e2e1b7de3fdb1,2020-11-12T18:44:11.227000 CVE-2020-15916,0,0,240e8586355c0a3e6c33fabdb7401c67b09109b0b8916c21650e7baa9d893bb6,2020-07-27T16:06:16.737000 CVE-2020-15917,0,0,c612e77ccf4bcb0fef4f91e8f470f947f9bc36b80dac4de8b4664c492e33480a,2023-11-07T03:17:56.803000 @@ -150791,7 +150791,7 @@ CVE-2020-16135,0,0,8357a143fd6c407e98712c1d3cbe844d296700121c5ab7148c83699083690 CVE-2020-16136,0,0,f6a145a956b5d9fd415f8363874a88a72c3423503306dba689333224479c60ea,2021-07-21T11:39:23.747000 CVE-2020-16137,0,0,767fd2b02dd104145fc0faf2829665ac3c0593170117c0a8953f380e4de3c2de,2024-05-17T01:43:44.567000 CVE-2020-16138,0,0,b5db70f3caa72e8b781b6fe16e152f752a14e924319eaa3c943a7474998aca31,2024-05-17T01:43:44.680000 -CVE-2020-16139,0,0,dc05c092bc0757bccb4f1d9debb699b8b3b5c5b6389834fac2a25a4310f00ebc,2024-05-17T01:43:44.770000 +CVE-2020-16139,0,1,29ff5a3db68cf99cfe366ad9370ec7cf254a8614956d3788dcfe6bdb13a8e648,2024-06-11T17:15:49.877000 CVE-2020-1614,0,0,16a263d7d6f9bcf5be3d313bc3a1ea56c7947b762ef581b9ece26b619fb72b83,2020-07-29T19:40:48.550000 CVE-2020-16140,0,0,e4c0aa5b8b17413ee0ebe2da2ae2cadca33e17f49a38a22df6c62a7e99b114a3,2020-10-30T15:57:49.360000 CVE-2020-16142,0,0,77255042a5e6aceed7164c2abee6ab151be28f92a8bc598bb7f99ab4d45bd6bc,2023-11-07T03:18:12.530000 @@ -152871,7 +152871,7 @@ CVE-2020-2144,0,0,2fcd08fe5df76dd689fb9e94bf1b0e3488ccdafeb8aff2e510b04725f14e2f CVE-2020-2145,0,0,0c0af673a65c02dd94d822a9d9c8cc25c7fff5116e1b45b4aafbd66b2ae54bfe,2023-10-25T18:16:32.183000 CVE-2020-21452,0,0,4bec7661379ca1515a9b8127a7407b5534cb32700b47a1e179803397171c9795,2021-05-10T19:24:02.207000 CVE-2020-2146,0,0,b50bae4e7f1d99203e16cc493350a6897969b9fa9372e68b54e18f2962e0730d,2023-10-25T18:16:32.253000 -CVE-2020-21468,0,1,89418bfc8795536247a5dda6c054d8368e80e6f6737b72bac18ca2691c4ef740,2024-06-11T15:15:52.617000 +CVE-2020-21468,0,0,89418bfc8795536247a5dda6c054d8368e80e6f6737b72bac18ca2691c4ef740,2024-06-11T15:15:52.617000 CVE-2020-21469,0,0,2157bfc43052e1e0893a43e55a0dec21fecec2e449e00c4d66b16614b422b815,2024-05-17T01:45:12.153000 CVE-2020-2147,0,0,63fb705e560f374abd0c77df49219c2ccbd42c3ad60d665902036ecfd14bc442,2023-10-25T18:16:32.317000 CVE-2020-21474,0,0,363d9ee94dd8c3a68093b517b6eb7b9f4259e2d7d7b768fdb61787428b3d0ff2,2023-06-27T18:25:16.550000 @@ -155053,7 +155053,7 @@ CVE-2020-25950,0,0,76a56a20722c8b0f69db5871dfcdcd3050ba2778bef7b2c3140bae6902af3 CVE-2020-25952,0,0,6dcaf7fb8625e60eb6a3cc2b141df6748ba96c05f30ddbb211721ea10842bd48,2021-04-23T12:46:18.737000 CVE-2020-25955,0,0,09e51e691bad3bb85ea1316498ae42cebc615fe6906e5c0019bee9182f3aa0cd,2022-08-12T18:27:40.293000 CVE-2020-2596,0,0,091b154c569d8c56a5e7b1ffae4970faf4359f8d9f95a932c46a8b1b60d134c3,2022-07-08T20:24:28.517000 -CVE-2020-25966,0,0,08d7ac269e0120643effe5077dbf17f6390bae7ecc2562bfd240fcb0dce31e2d,2024-05-17T01:46:27.317000 +CVE-2020-25966,0,1,cd251ad9b94e44346230a938b55dd5dd133131de41f2674f2a94c41cf299e8c5,2024-06-11T16:15:15.417000 CVE-2020-25967,0,0,dd6168a16aa80e1d96b8a0f3c24529467982733c2578aa4cf7ab3f68a6a69853,2021-07-21T11:39:23.747000 CVE-2020-25969,0,0,fa8f5a47d7b840bcfc4e3d417ae01264bafe6c720c95ca1fbc4ca21688810425,2023-07-11T17:54:58.410000 CVE-2020-2597,0,0,f4dad55df5ab3e50ffbc8ded310d5df6543de69e8deb308c25b1bf73429910ca,2022-07-08T20:24:33.503000 @@ -158043,7 +158043,7 @@ CVE-2020-35231,0,0,a63c5a6142548394a28456e45f8f16c7da812c770ace72451b2d548a2ee00 CVE-2020-35232,0,0,95ef22c6f2b22534e40138857382e5694a16827a892478b74e22d9d494fb14c9,2023-11-07T03:21:53.700000 CVE-2020-35233,0,0,f4b4b3380d42cc7eff563f0f97d2fa8cefc10aff2caf803e8f0d857296a043f1,2021-03-16T13:29:10.053000 CVE-2020-35234,0,0,1b7b058d9bdf3d60582f36eeacc3d3860985f95dafa11b45c93f9c7512a65e19,2020-12-15T23:45:39.147000 -CVE-2020-35235,0,0,9db16301b57e02eb4b92bb5ed4b107b86c3e3eb76e83602e48e9641834ec11e8,2024-05-17T01:48:15.023000 +CVE-2020-35235,0,1,b847d5cc2ec0a7ad6998b2cabf588cb8882cf35576d947ca9e5bd50ba86fb331,2024-06-11T16:15:15.590000 CVE-2020-35236,0,0,145413b4837574279e90e5b0a26649e82a338f04e97d7bd9de20f50b14e3ff64,2021-07-21T11:39:23.747000 CVE-2020-35239,0,0,f3cfab06a1a0ed9485b521144335dfc279e218f8bcfe040e38d69bde293bb282,2021-02-02T17:47:39.250000 CVE-2020-3524,0,0,dfed3bb359016038fd0382c625d6a2f382e0056fdb1c27043b2587a8eeb2ae1e,2023-05-22T18:57:24.750000 @@ -176908,7 +176908,7 @@ CVE-2021-33485,0,0,9171634f925ef39bb8c408891aab6973f1f688c224a981c90cf578f2490b1 CVE-2021-33486,0,0,0f2d9ed6e6902b1364a91f8e44bd6290d68881971887f0e2f63482765f96f3cd,2021-08-17T14:32:00.150000 CVE-2021-33488,0,0,b232b8d468fb28ec7a0016c5eaef3d73f5a1199ae21d40a31037b68acd95caaa,2021-11-23T19:33:04.687000 CVE-2021-33489,0,0,f380b3c20721b51823b2cb5fc99775165319ef542c5074be4584d333017d0fc9,2021-11-22T21:33:12.210000 -CVE-2021-3349,0,1,fcff6adf512cc22545024aadfa462c2a8490761a9fc822e12f1c91b231958369,2024-06-11T15:15:52.970000 +CVE-2021-3349,0,0,fcff6adf512cc22545024aadfa462c2a8490761a9fc822e12f1c91b231958369,2024-06-11T15:15:52.970000 CVE-2021-33490,0,0,966b4170f8b5f16ccd47228215bdff6a5a13a399dfbc4334ba467fd7af940365,2021-11-22T21:34:46.757000 CVE-2021-33491,0,0,f9c0efd1b2c80ca941eb4ffffeaa3a4aa44de5801a216b8c3a4982f90ca0b602,2021-11-23T20:22:56.337000 CVE-2021-33492,0,0,3cb3a711f65e86dfa98fe633be2ac4521a209f963ec8109572607c0d672f23a1,2021-11-23T19:43:07.257000 @@ -176973,7 +176973,7 @@ CVE-2021-33553,0,0,8219024b6316121dd48e31cdacadeb044ddc4126177ec4fbc00fab7da771d CVE-2021-33554,0,0,8994688cb6ffff71c0275bf0d3aa42633d5ca10f2bc6df7df72c74cd255f5d23,2023-11-07T03:35:52.423000 CVE-2021-33555,0,0,f5829cad2b94ce4b70227edf89d8a3e12339b15cfb57c7e63bf1670fc679ce60,2021-09-08T15:15:32.290000 CVE-2021-33557,0,0,55f4e53efd5226c8cd628cd652f7d079790e02543ee97cf7f793047146375bf3,2021-06-21T13:27:28.850000 -CVE-2021-33558,0,1,53ee348eb5b26fe700747b966364b08e5199bad712bbbf14d538316872df1fe8,2024-06-11T15:15:52.823000 +CVE-2021-33558,0,0,53ee348eb5b26fe700747b966364b08e5199bad712bbbf14d538316872df1fe8,2024-06-11T15:15:52.823000 CVE-2021-33560,0,0,506a30966a6dba985ca5ce48d1bb22352cd603cf7f746730a5fdc02747a9a46b,2023-11-07T03:35:52.620000 CVE-2021-33561,0,0,1022537dcd2674eb7b8e1e005b3576e80379ecc33cd64334a409bfa28be9d1c2,2021-05-27T22:10:17.830000 CVE-2021-33562,0,0,17a44a205e48547ce1f22e5f04a7e7802d1d3919e1f25990b074c597f271b546,2021-05-27T22:10:03.673000 @@ -179664,7 +179664,7 @@ CVE-2021-37232,0,0,2554c63a173f9d2b202597bfc79cba4ad51e147b73620ce72b36612e37169 CVE-2021-37234,0,0,f2e8b440299f32a825037e9c35f8404cbdfb87e2ad12c576105546429264730e,2023-08-08T14:22:24.967000 CVE-2021-3724,0,0,43e08cae2a8642a1c29fd4a91faa77cc043fc2aec3de6ac8b0cf5d0108c70d9e,2023-11-07T03:38:13.433000 CVE-2021-3725,0,0,2479d0f1530d6ae2c63b96d523bbbabd738146e303492d2fcd25295f250c9f62,2022-08-09T14:42:33.290000 -CVE-2021-37253,0,0,3cfa28af1061153d5af92385b1cb4a97e4bccf391033af9d3448d9058b498d95,2024-05-17T01:59:10.427000 +CVE-2021-37253,0,1,24e96d7706f2f597162768b123ef387b11e9688a601981e080c349557f918c12,2024-06-11T16:15:15.727000 CVE-2021-37254,0,0,19dce56867971add6142cf52bb19fd3bdb48f7416b2eda102acd1d9a1a4e222f,2022-07-12T17:42:04.277000 CVE-2021-3726,0,0,153714a7ae86df9be0077a836187596711989b0ded67a0aa7a975edc66771713,2021-11-30T20:49:42.140000 CVE-2021-37262,0,0,2402cf4c29d4b49fc953c6886aca5532383355389769b4ec49038977d6110416,2021-12-20T21:02:03.247000 @@ -183754,7 +183754,7 @@ CVE-2021-42566,0,0,14196320eba22aecefa147d3cf3174f8bf99afc68b7240d526d645595768c CVE-2021-42567,0,0,276617e561ca3b8a5051a3c8cfe37b7e22e3ce0fb56c9dd8d1cf07cfdac0081f,2021-12-09T19:04:38.347000 CVE-2021-42568,0,0,618deb71b663119abbdd729338d53da91bf38cb3953b9fe0695f5efdd18fd9fc,2022-06-28T14:11:45.273000 CVE-2021-4257,0,0,4f5649d72bfe76d9ef42f54b19582802a59766f5ef47794eec7a993175fbc77e,2024-01-25T20:40:48.797000 -CVE-2021-42574,0,0,1badfe66bd8fcf4e03b3c17fde243b2e3385a4224023ebda1ad650497e87d8f5,2024-05-17T02:01:34.483000 +CVE-2021-42574,0,1,3e0ba113975e727cf22f6e3e35b857c2b5fead27c088ae069204f5086e836b83,2024-06-11T16:15:15.880000 CVE-2021-42575,0,0,3ba064585996f415f6b30d32008dcc7e13fedbfb5c9576b101dd5d0f28088a31,2023-02-24T17:34:46.700000 CVE-2021-42576,0,0,912deccbb4f37f6800696132420fefa1cfbab81c15e85cbd25b21f5085098521,2023-08-08T14:22:24.967000 CVE-2021-42577,0,0,463b3d226906f467c32200a42a7e01aab621816691ae20e72e9faaac73d4877d,2022-03-18T20:41:04.867000 @@ -186076,7 +186076,7 @@ CVE-2021-45951,0,0,8ad0edf2f740aca93c1c42b357fb6d1fa1849c9ba550d6bd195565cdf0570 CVE-2021-45952,0,0,bb803f650690da0731294f1da0e429ddead03c9fc320d478e1059f6709a9a496,2024-05-17T02:02:52.533000 CVE-2021-45953,0,0,1b95c9ece70fbfe4bdcc319bf8f26e71d575de2f9d9237efaec7f4f2ceb02bd2,2024-05-17T02:02:52.617000 CVE-2021-45954,0,0,42bf16816a22914661974a1ddfef604acc4d319ec833dae86e66a79af326cd3b,2024-05-17T02:02:52.697000 -CVE-2021-45955,0,0,610045702fc3c06dddbfd5d935a538724dab56a27b009ca55c0cf2d57d422efb,2024-05-17T02:02:52.777000 +CVE-2021-45955,0,1,f7dd2eecfd1949ab9909f8157e5116f1df7dca0fb9b6479ed1ea09b210d066be,2024-06-11T16:15:16.080000 CVE-2021-45956,0,0,bcbdc61eef2f1ed244f991e6713a14787fc7a0606e28a452c8057b7e9ca101a1,2024-05-17T02:02:52.867000 CVE-2021-45957,0,0,93a52d218ac6770034398cf1fcc0d7a1c13babe4473de814ffd28491fe1085b5,2024-05-17T02:02:52.953000 CVE-2021-45958,0,0,b90c05ef6bfd3ccd3950f7ec28b2eeddf37b34b895efd3c87dbbbbf870fe30ef,2023-11-07T03:39:57.137000 @@ -196780,12 +196780,12 @@ CVE-2022-28649,0,0,f1459dfcb8d006a8f7ecef3336d09e104d10b7fce2a7a8ef406316352eedb CVE-2022-2865,0,0,4baeb1e634cb2824a8e6db64787dc59bab5ddddbf1e7d2ee665afc57eae430ce,2022-10-19T17:31:13.797000 CVE-2022-28650,0,0,2160d92107c00a756980b3b7a89911e4bb9f67416ebf601fbedcb107ca0aa1a9,2022-04-18T10:18:20.503000 CVE-2022-28651,0,0,20c1a1809984744c3b6c3b6baf1e1de5df12ea0b4352779e2e1135a354356771,2022-04-18T18:34:31.143000 -CVE-2022-28652,0,0,d6d5af882795e1369f57eeb73ee1e88370d12948f6a5424f2ea2cfc6bcc1761f,2024-06-05T12:53:50.240000 -CVE-2022-28654,0,0,b040f6e47964db7210908c684f22bcbb2cb9c8cccb74446de8994eb5c3bbac67,2024-06-05T12:53:50.240000 -CVE-2022-28655,0,0,b6b562d6ec94fcafed4389a8411dd5ebd2f3a7d94e40e7e8383d7fea4a307011,2024-06-05T12:53:50.240000 -CVE-2022-28656,0,0,da9332b2b1bfeb826020ea19d5602709dd3ffff2dd2e9bfa4d5748e3eba81a72,2024-06-05T12:53:50.240000 -CVE-2022-28657,0,0,0c1cd4214b9101b57af44af81bcd6f25b98fc567e3450e8f4e97919ec6b2fc3a,2024-06-05T12:53:50.240000 -CVE-2022-28658,0,0,7327cbebd12425badecaae7409594388bc8513be8b1d9b42b7985f25d7e3b653,2024-06-05T12:53:50.240000 +CVE-2022-28652,0,1,175f00525a87dceb7a234c5311850586afb57155f0eba4be3b8fca1c044bcf16,2024-06-11T17:05:08.087000 +CVE-2022-28654,0,1,bd5b11f0530d7b1f2f227dc48086186c6ed13ebed1cd8a9485ef386ed1c85e82,2024-06-11T17:04:47.620000 +CVE-2022-28655,0,1,69c04d36f6023b198a9f94ddaa234c34c62ba3c3283b0e3c84b5ec96a611a116,2024-06-11T17:04:20.947000 +CVE-2022-28656,0,1,10ed4078111225055fc73e8d5c93bacba765e9be1bd5927b0ca5a032ed105fa9,2024-06-11T17:02:46.767000 +CVE-2022-28657,0,1,87affe5ad5a71bb7203f20998766d987a4f1cd002bb891c78e6bc9e411a1f862,2024-06-11T17:02:05.497000 +CVE-2022-28658,0,1,0e63e959545e5e1f31bf991eb041fb7c708844e024447417ac0d2441a507b62e,2024-06-11T16:56:43.970000 CVE-2022-2866,0,0,39936636c7b18b74703b9b6f9b14aacde95244838843f9eb43e74857aedd50d3,2022-09-02T22:02:57.273000 CVE-2022-28660,0,0,56c6ace0e4d9c9af155b31cd3cc2403dccde1c6848618344b9372c4d85c50f7f,2022-10-07T15:45:37.153000 CVE-2022-28661,0,0,bbfe8460bffe6f8fc9b166d47e50b1e6f91f964c6534918a6a23dce6596730e9,2022-04-19T18:36:54.557000 @@ -205916,7 +205916,7 @@ CVE-2022-40220,0,0,aefda2ad93fea5ab1d1535bfff5d1f23f6fd7af321bf1bee60f4c9e3c1e95 CVE-2022-40222,0,0,5ab224ae53d2b4f8180f691cbea2f22b6d330386a6dae7483221a7be6a09008d,2023-02-02T17:20:17.927000 CVE-2022-40223,0,0,cc0b4541544eebf640bad6fa884fd3efb62b7f9e566ca8618f623b9d4df4105a,2022-11-09T13:56:53.960000 CVE-2022-40224,0,0,091d730508c9310c1498c98fb8cd46b581ad4f666bc2b29ec73e5422af938607,2023-02-15T18:31:40.247000 -CVE-2022-40225,0,1,a5494ab34f601f8f571d48672c1eec603aff596fac6340eb38e1f742562ccaf2,2024-06-11T15:15:53.253000 +CVE-2022-40225,0,0,a5494ab34f601f8f571d48672c1eec603aff596fac6340eb38e1f742562ccaf2,2024-06-11T15:15:53.253000 CVE-2022-40226,0,0,4d6bdfc2e9674da3208324a1b5aef055677630fe458708c1d79a0740a7470963,2023-06-13T09:15:14.680000 CVE-2022-40227,0,0,567ded49e93a8d6b02e9454a80fead1de8dc5d0aa69d182b6888af619f780d6b,2022-10-14T17:07:23.703000 CVE-2022-40228,0,0,2eb10163e713ae5211bb284b907430dd8f57ef6073ca911b27cf392a78818ce1,2023-11-07T03:52:13.373000 @@ -217196,7 +217196,7 @@ CVE-2023-23771,0,0,129bc8133064c2640b4d9e22ebf6da9a1057496992ca3d129f1bc8c57be15 CVE-2023-23772,0,0,a484af274fac181bdbc83a18977992ab9d2a6fe4aa49dd94979a443088198426,2023-11-07T04:07:56.007000 CVE-2023-23773,0,0,4dfcf71264d027873eadada7ce823cb1c2a7796a45a2201119699821136f78b2,2023-11-07T04:07:56.260000 CVE-2023-23774,0,0,6a791c2de6c1c2b757b5221053e2e4cf54a4527356acf38175ddb645d76fb649,2023-11-07T04:07:56.483000 -CVE-2023-23775,1,1,a31132d97b65337c8cb13164a296284d1b3362cacc39a83d60a144e78bccd0ea,2024-06-11T15:15:53.723000 +CVE-2023-23775,0,0,a31132d97b65337c8cb13164a296284d1b3362cacc39a83d60a144e78bccd0ea,2024-06-11T15:15:53.723000 CVE-2023-23776,0,0,8fcc5ad5fd93926448380be84bd198c2b6e8311d8d14c10ac923e94aad36eb70,2023-11-07T04:07:56.713000 CVE-2023-23777,0,0,ca1fc97a3c9cbf4ed872fbf1eab8a61f82273cd1a9009aa793d042b889fd8e78,2023-11-07T04:07:56.950000 CVE-2023-23778,0,0,7f66dd10ed45d9d0c0cd437c6c5765e29706a8981370d0d60794071e8c24c264,2023-11-07T04:07:57.183000 @@ -219711,7 +219711,7 @@ CVE-2023-26976,0,0,e2a967c719154115bec58a5ae213309161f95adbb9fcb274cde8e64d94b7f CVE-2023-26978,0,0,c9cf0b63f9c9528c24bb3bf60ef5e621d85bc5277ef3bc50dda1eda08292ff2a,2023-04-13T18:04:16.177000 CVE-2023-26979,0,0,f827429c02c3b37e686bf75b3752976062219988a6cd06964b8f1b0247e0d444,2023-08-05T03:48:53.883000 CVE-2023-2698,0,0,9bd59e365ae030f82809da973fdd43f97c995d8362bdbdbdd5b2aa0a13b68152,2024-05-17T02:23:12.023000 -CVE-2023-26980,0,1,13d6444557a8ad0a2cbdef3f3c1a52c758e78f4edfccef90068a7442ed93689e,2024-06-11T15:15:53.983000 +CVE-2023-26980,0,0,13d6444557a8ad0a2cbdef3f3c1a52c758e78f4edfccef90068a7442ed93689e,2024-06-11T15:15:53.983000 CVE-2023-26982,0,0,e812ea0b723249ef3a5f3b623d42409ef1dff3cff299551ca32172324a837eef,2023-04-01T01:40:47.500000 CVE-2023-26984,0,0,0e17352d487dedf8cc89b1c3189702a88e4e2f60499c1426cadd7ead5b89f9cb,2023-04-05T14:38:21.783000 CVE-2023-26986,0,0,48891faa7691147e11916ff93cbecac64566f5da17ac2f41b66807470ec3a044,2023-04-14T16:39:28.957000 @@ -233760,7 +233760,7 @@ CVE-2023-46049,0,0,8d2d4eec72395a955d71c0995d19fdcdc7b7bb225656a0d7cc0eb02278fa7 CVE-2023-4605,0,0,790ab9f044323742e438e24a09a58928a6a7282d46f9a64e7befe043c9074a17,2024-04-08T18:49:25.863000 CVE-2023-46050,0,0,6ff5ea8f1dc5991c203b0679fc5f46c04b4a3ef6ae70c787c24e6bec0c9c29e6,2024-01-29T09:15:42.640000 CVE-2023-46051,0,0,2ed99f3b30a52e46800afb27cd76129f2863f4d5cf9647e072519c0607ce34de,2024-05-17T02:29:59.447000 -CVE-2023-46052,0,1,45e81c1edbc525d1e27229b1a41f2a380919959a3e25a66d4bf80fd400a60ebe,2024-06-11T15:15:54.980000 +CVE-2023-46052,0,0,45e81c1edbc525d1e27229b1a41f2a380919959a3e25a66d4bf80fd400a60ebe,2024-06-11T15:15:54.980000 CVE-2023-46054,0,0,dabfd66e957ad3f5f26c5e95b90dc66ccfb7ef09c807c244e2a9055c36c0030b,2023-10-27T19:35:22.627000 CVE-2023-46055,0,0,fdf1d245240a975fe0c288b57f8a59d44c9d185d042258dbbbcef27fafed4558,2023-10-28T03:35:48.520000 CVE-2023-46058,0,0,60caa10856250aa45ff6a614c1529ac57a3c57157cecbc316e05d8e91d2dc6dc,2023-10-30T11:37:02.710000 @@ -234271,7 +234271,7 @@ CVE-2023-46713,0,0,651ba252a50beb076dbcd77eed9416207ba8847f69703fbd84a4801e460be CVE-2023-46714,0,0,86197f93886e9ae5ced0ada357f3600f3edd22b0fbf08fcca860f0ab2ed48159,2024-05-23T16:03:21.917000 CVE-2023-46717,0,0,aa258f839ea40a78ca0a10de84d911caccb021bd36a6a7345f56d9a2b06d9ab0,2024-03-21T21:04:18.200000 CVE-2023-4672,0,0,e7f018e5b00d8caa2cd6326fde538c208ac0fc901cdb1bcffceb003eeac57c07,2024-01-04T20:09:31.050000 -CVE-2023-46720,1,1,55b06950d661643f06fcc5d7aa75bd900a0b5cadc4ff33732c1f2cc71230e984,2024-06-11T15:15:55.087000 +CVE-2023-46720,0,0,55b06950d661643f06fcc5d7aa75bd900a0b5cadc4ff33732c1f2cc71230e984,2024-06-11T15:15:55.087000 CVE-2023-46722,0,0,ee1e20585c3fd0a1d9c68641566f4a09ec3ae4d7392bafc4c6a7ed95aa18cb3f,2023-11-08T17:53:25.937000 CVE-2023-46723,0,0,9c1b68305de266ad60fde647a9c434b64a6cf34ec6368f51178a40235644e6a3,2023-11-08T17:54:38.240000 CVE-2023-46724,0,0,8031cd0d023734a6b1f408cc44ac08f1dad915c7671532078117b26cc1fc5550,2023-12-29T03:15:10.793000 @@ -235272,6 +235272,7 @@ CVE-2023-48268,0,0,7fbc38e1f3021e6f57ddbb59802c5c032dea61c9b04627258986c5e024d76 CVE-2023-4827,0,0,660cb613242cf8fb9cab965004afed839f4beeb124259e7181eab5017ac3219d,2023-11-07T04:23:00.800000 CVE-2023-48271,0,0,29b89ce15ecff722fb5dce9e2958196e4fdba463d344d0ec924d39e2e3f70c2b,2024-06-04T16:57:41.053000 CVE-2023-48272,0,0,6b4df1e347c87fa206b94499a385869f076cd0e708e56b463683f8e1d53c3c9b,2023-12-06T03:01:23.517000 +CVE-2023-48273,1,1,b02b2699c312ba7685e011396a9501af7164395206edbc32bb0dc9cb667924a9,2024-06-11T17:15:50.087000 CVE-2023-48275,0,0,21d3cdc7ae6f4754c5c550b6018b42b200823b5664b8a35a50e38d3b76fa2a9c,2024-03-27T12:29:30.307000 CVE-2023-48276,0,0,30f6f79bd5a1248869ba36afe53ad2e1b88657614fd748dfd090a4fb6ca14d3c,2024-06-04T16:57:41.053000 CVE-2023-48278,0,0,b8b615ff398a78f2adcd1913a459812b30de22df732a4689ed336a4365900549,2023-12-06T03:09:04.530000 @@ -237413,7 +237414,7 @@ CVE-2023-51491,0,0,9a630e61b90ae68231ccba63898cc12e25e82adc34d74019316f737ba08d8 CVE-2023-51492,0,0,0d58b27a14611c109e89a3494fa756a640689ff79517444f7259a888456dbe6f,2024-02-15T06:26:42.423000 CVE-2023-51493,0,0,f83cd3e9ef3ea1708a4f0f0755e074e9ad1d27d8d5ae20aecf4ecfd903ab0733,2024-02-15T06:26:48.450000 CVE-2023-51494,0,0,cdbe694111a067a670940f1f6937175f6a61a9c39ae4f116bd5e17bad447b32c,2024-06-10T02:52:08.267000 -CVE-2023-51498,1,1,da9ef478117dab4c45d8d9e731d5c1237cadae3afed1aceca85d6a949f4efd95,2024-06-11T15:15:55.470000 +CVE-2023-51498,0,0,da9ef478117dab4c45d8d9e731d5c1237cadae3afed1aceca85d6a949f4efd95,2024-06-11T15:15:55.470000 CVE-2023-51499,0,0,b9b7f0cb79987f6473d87d127fe53323a00f8ae64e5778981713c6a91fb94ca1,2024-04-15T13:15:51.577000 CVE-2023-5150,0,0,2f5e1e90547bd29c8e7cd2b67cb1157d0145916e107fb086f39413bd0ac1897a,2024-05-17T02:32:51.870000 CVE-2023-51500,0,0,82db7ddf130eebd20c9e1d0dc704a5c643e0e5d73482cc7fd8e56f0d34164c19,2024-04-17T12:48:07.510000 @@ -237433,6 +237434,7 @@ CVE-2023-51514,0,0,44a388f30c139a4590a3bf56e00fe693595a163e9cef7869b048530195c7b CVE-2023-51515,0,0,3422ae4f26a23a247945a7b0cf74e34e46aa8f9a141eed6440357fa69f923e4b,2024-04-15T13:15:51.577000 CVE-2023-51517,0,0,1a69e7a8868bb57fe23881af905a555a81020cb04edb85fe9a748430c692e5c8,2024-01-05T18:14:06.130000 CVE-2023-51518,0,0,82d2f1d17566273e3d96a161b87d4f3f7567388d39e7cb79eb1a426bdc54e536,2024-02-27T14:20:06.637000 +CVE-2023-51519,1,1,fdbee2bbbacbef1c760fea0477832bd274ccb72aef9e38da97b42a90ff8f8c75,2024-06-11T16:15:16.277000 CVE-2023-5152,0,0,4d274ae25ae7ea9b786d87658afd070d56510cc3779979a5d6b4972e0e0d6a37,2024-05-17T02:32:52.100000 CVE-2023-51520,0,0,278d7a72857b486e9b0b31b11c49041fe1beb2c693b353f7760792bf09c1e90d,2024-02-06T20:20:11.330000 CVE-2023-51521,0,0,4043678b5c752fdce26eb856e0355d2e992a01ceb0d8bef6c886294149b1fa75,2024-03-17T22:38:29.433000 @@ -237586,6 +237588,7 @@ CVE-2023-51677,0,0,82d0135d6d5f914745485db23dadb2b4facc62b30cf92d9211abe02ed947c CVE-2023-51678,0,0,68c113cc5ee813879cad425b6c7bc838c9a7f93aa3175747b2a6ad8105e36faa,2024-01-10T04:02:59.790000 CVE-2023-5168,0,0,18acce90f69e2356c765f60aaf77c22caf3725db6d121f0dc4d4b38364bd480f,2023-10-10T15:15:10.773000 CVE-2023-51681,0,0,c841a4727a516b65d4f78ea4c83295f9cbeb1408f804ff4d737b8ecd2a59457d,2024-02-29T13:49:47.277000 +CVE-2023-51682,1,1,0199cbb2cdc86a93ffac2965e9728de14b9dcaeabe5311fb02cf67cbfbe83114,2024-06-11T16:15:16.510000 CVE-2023-51683,0,0,66cf5c01547871eb3f45aff96e231f8ca1ecdef29ac10eb2f91218695693c8e4,2024-02-29T13:49:47.277000 CVE-2023-51684,0,0,0a6595e7905826b5ae4bddc7adf9a6dacde9874c60a8b0d3395bde6aa33cdb91,2024-02-06T01:03:20.777000 CVE-2023-51685,0,0,5a23a2b81984c8268ef45a2c629b46f5e21c706b4df6e2b2b92f3018474e26a5,2024-02-06T01:03:15.713000 @@ -237903,7 +237906,7 @@ CVE-2023-5218,0,0,5d39c307a229ebb116959b5d798682370d3d430565ab1c1feb7036208e28c8 CVE-2023-52180,0,0,8b413e2e8c63ed1227bc9cbfc39a312c2260cfa648393fc28b71bda1979be008,2024-01-08T14:46:37.220000 CVE-2023-52181,0,0,83ed372b562065b80a1f6f7544e7fe5f228212ad2aaa2784adf63a18a4135fd2,2024-01-05T22:05:24.617000 CVE-2023-52182,0,0,4383a26b799aba3a2a1943240b263851b70bda25b1e9695856afe4ea99e60d68,2024-01-05T22:05:15.113000 -CVE-2023-52183,1,1,18218b3ef6321a3941ed65547e55f63a8385d4b270e3c11b03a6341dae8c4dcb,2024-06-11T14:15:10.227000 +CVE-2023-52183,0,0,18218b3ef6321a3941ed65547e55f63a8385d4b270e3c11b03a6341dae8c4dcb,2024-06-11T14:15:10.227000 CVE-2023-52184,0,0,db476f2a4b680944ea43c27c8448f5052fe09bc0646934f2a4a8c3a520e9dbb3,2024-01-11T14:19:23.967000 CVE-2023-52185,0,0,b554b6f74a75ac75bb6e0d9503ec573b555af70e3f9b72aefbc8aa32bc5179a8,2024-01-05T22:20:28.577000 CVE-2023-52186,0,0,ac73c6bf7e025ba8e6fbfd7a02dc6e656b3ec130b5289c8b3a9fb3038e3307eb,2024-06-11T13:54:12.057000 @@ -237919,7 +237922,7 @@ CVE-2023-52195,0,0,3909cc4c50765fa40bc4381e7d0fabc6d1e07313499327f887c0d147f1a45 CVE-2023-52196,0,0,02edb3a9b313aac6a4743b04a8b75ae2b47a70381a541cdd9d11151b0ad86e33,2024-01-11T20:29:45.240000 CVE-2023-52197,0,0,0683831e53d5b5704212d0c49e72e53e3b4dcddd616b4b66c104f3a62f625543,2024-01-11T20:07:32.690000 CVE-2023-52198,0,0,816f9a3238fe68c062dfe90a75cd8a36eb7a07dc9da9795618812439848d8921,2024-01-11T20:07:27.050000 -CVE-2023-52199,1,1,11d86df9cc3ec8a4ea6013b1652bc949cb44d4c1e1f7585c5dca04ebfd887fde,2024-06-11T15:15:55.737000 +CVE-2023-52199,0,0,11d86df9cc3ec8a4ea6013b1652bc949cb44d4c1e1f7585c5dca04ebfd887fde,2024-06-11T15:15:55.737000 CVE-2023-52200,0,0,fa45503d11f61b615c8e459efe586fedf872745e2a62d22613a19edc8e34daf4,2024-01-11T19:58:01.357000 CVE-2023-52201,0,0,aa196a3180516c4fc7bb5930d7dc7729aea07051262d60b984994f264dd2e640,2024-01-11T20:07:16.220000 CVE-2023-52202,0,0,d13452e400eb167c604b132e19ffceddc694c287bbaff5426a1265501c37750a,2024-01-11T20:07:05.607000 @@ -237943,14 +237946,17 @@ CVE-2023-52220,0,0,2de68141c1c6e38f1fadcb701aef6131650d9e366cb63e6350beda77aeec6 CVE-2023-52221,0,0,6c853580c221f82c51262bc0fe815c852a280cf9888ed2875fd663a1fd304e49,2024-01-30T17:01:51.733000 CVE-2023-52222,0,0,1142f590e1a21aeacceaabe68ed8ad5f9063502f197fc05ff7c0c8e41c0a95cb,2024-01-11T19:01:03.343000 CVE-2023-52223,0,0,3daf999840f1c944c0431f78081f2c2548ca4a0fcff350348e23cd8c51c83648,2024-02-29T13:49:47.277000 +CVE-2023-52224,1,1,fb8db8fbb5f716c7d920327a93935a683ac44286edfa70b39fda4c90a9b70a42,2024-06-11T17:15:50.363000 CVE-2023-52225,0,0,2ca194296b25b1b3395926084606e130dfcad223288ee55b43b2e07e117eca23,2024-01-11T18:42:30.967000 CVE-2023-52226,0,0,f18226e9f27e785dfc61eeb3839db907e0408d3f53462fb7658d2c7baa33d004,2024-02-29T13:49:47.277000 +CVE-2023-52227,1,1,a42223b24c71e165a8920098fe58ea1f93704f03c1a051af64ca20d40c85266b,2024-06-11T17:15:50.583000 CVE-2023-52228,0,0,5aacc2f976942dff5645893eeeee67eaac9a951bc74387f5e36df9c19354987f,2024-03-27T12:29:30.307000 CVE-2023-52229,0,0,ea00ad4e0597affd30c31fe4f98a420e37e7ad7335b14877a8e6dc8a42c24daa,2024-03-20T13:00:16.367000 CVE-2023-5223,0,0,e77b2364283941b08ebd4aa250d136179627e0b7bfa72051c5a974c89d8a0c03,2024-05-17T02:32:54.503000 CVE-2023-52230,0,0,8abd0035bd6d878ca3f463c7cf4dd4614f5aa58b5241ad1c3b5c8f40ce6ce684,2024-06-10T02:52:08.267000 CVE-2023-52231,0,0,b5d4f82f731fe2c9cd0c678c3b61a598c79c626b8e6400879ca4a307d29966f3,2024-03-28T12:42:56.150000 CVE-2023-52232,0,0,a30c51f1f902efa3bad0d9c7197ebbd39174705ab5dda6a2766f087b052911b8,2024-06-10T02:52:08.267000 +CVE-2023-52233,1,1,d53e6fa7baf9f42af377ec5dc768b3f69ea045cbfa17b5b8feae1cd78e695363,2024-06-11T16:15:16.757000 CVE-2023-52234,0,0,1fff4c9561934a3ed1e9215004c9ee935ccd38ea2e79cd4cda085a56cc775bc1,2024-03-28T12:42:56.150000 CVE-2023-52235,0,0,cd0fd933ddc53865fa09d8b56f84ffa70ea224ae48315dee51674d5a7a8efbaa,2024-04-05T12:40:52.763000 CVE-2023-52239,0,0,53232ab6cc2fc288fa443c530cf5456f2ca2ee6e47506bdc07862ff96f4b1242,2024-02-13T22:50:50.313000 @@ -241302,7 +241308,7 @@ CVE-2024-1160,0,0,c82942832f2bf6c3ff41a88402b9dca5a934aaf9eae2920b01f254b593b20d CVE-2024-1161,0,0,47735b834fdf9e1182a0273ccf52648b0626c5df5fdee235dd1c80bdc67cf573,2024-06-06T13:57:52.483000 CVE-2024-1162,0,0,5f2954147a2ad0bfda8f51ea41ff0a374d1e4a1c83a2e06e1e47465f3c5f70b8,2024-02-08T14:22:37.180000 CVE-2024-1163,0,0,c0817c91ae84923184209dc3c71e6209d979097a49b0e341f691fe7193cd2db3,2024-02-29T15:15:07.473000 -CVE-2024-1164,0,0,24df03029a70153116b0af902b93010b8aee882bf45630401f0cc4dfe70c3da9,2024-06-05T12:53:50.240000 +CVE-2024-1164,0,1,8ceb95fcba553c0447a63d8e5e80c1481416a7a28be670b34d68b7bc77538c43,2024-06-11T17:14:02.340000 CVE-2024-1165,0,0,09d0c48437e50305f6b70b9aab3bb8805a9bc240d0fb341de398e33a6ad98f02,2024-02-26T16:32:25.577000 CVE-2024-1166,0,0,cbc50c0645991c69523344b23f8a84819598bdfdeb24c5f4ba7570f86b9c6398,2024-05-14T16:13:02.773000 CVE-2024-1167,0,0,646f860ad24a5198d530bba39bcdba3b9fb385431091cfa90a0190891cfad025,2024-02-09T20:20:51.900000 @@ -241401,7 +241407,7 @@ CVE-2024-1266,0,0,5dd53fa554a7634e1c048a8f95923aa3088a9a992e77cce161d6c3e73b044c CVE-2024-1267,0,0,e1baf417ea5b1200261bbe0e762e7d306442092cb87ea0c0daf956e73a64be41,2024-05-17T02:35:21.940000 CVE-2024-1268,0,0,a71f6831ef4e801110d9a785c473764d7dc4eb42bf088dcd5198930cf6d73f8c,2024-05-17T02:35:22.040000 CVE-2024-1269,0,0,c0e96ce08aa8cc4b0c5c9b01a4dfe6413b6a1aa0ecfba529b99ff41ed595060e,2024-05-17T02:35:22.143000 -CVE-2024-1272,0,0,7ca3476db09a816981caa2aad90cdfaad8ea4a4f66acd8ca384bb00dac3bc5a5,2024-06-05T12:53:50.240000 +CVE-2024-1272,0,1,b52b739f9c81030077087cf3fe199b5b174adf1c5be91943299f2648faf56bcf,2024-06-11T17:34:25.347000 CVE-2024-1273,0,0,0a310035a5b694469d93d82e5859918e80208ec594b8c8228e8be9ae18ebdda5,2024-03-12T12:40:13.500000 CVE-2024-1274,0,0,e620aeced049d61f6d382460fbf5059a46434714ff81966b55927aa96a1401ee,2024-04-02T12:50:42.233000 CVE-2024-1275,0,0,c6025f352dd287cc2e7372b97c14829d8c0e2fca834fce15704d3f175128a63b,2024-06-05T15:15:10.990000 @@ -241734,7 +241740,7 @@ CVE-2024-1657,0,0,a497f7c000aaae813c345480c074db7bfac8435097b4ea8536600de4b426af CVE-2024-1658,0,0,bd2757c2314dc2f8bd52ce15b18a6ca41069d2e3f9ff401d7a725ad82b1db09d,2024-03-18T19:40:00.173000 CVE-2024-1660,0,0,068c83f9afc694d855bcbb99610bd3ca5f918af7baf81b6ceb2a3be3520f6bf7,2024-04-15T13:15:31.997000 CVE-2024-1661,0,0,b7671ba7b0cc968bc464682e512c319d5a4f7189c60b340cf16a0b0c1d49a626,2024-05-17T02:35:32.207000 -CVE-2024-1662,0,0,d2466e5ce29cf8919b6d4113bb6dbefd23ad12a1cb22023d3c42bec7a5a67e67,2024-06-05T12:53:50.240000 +CVE-2024-1662,0,1,5e3f0bbaa835f83ed5b390ba0fde3c07f4c25fb4b3918d631b6b1d14a1fb5ba4,2024-06-11T17:27:19.127000 CVE-2024-1664,0,0,c240cf09d136b8ae3766d60b95066ae5935a6052d7cd59ed400a537e65636ac2,2024-04-09T12:48:04.090000 CVE-2024-1665,0,0,de4a287d71bc31e803a653e2db1b6ae7ec8129b57b157a68949eb275f7134bbb,2024-06-07T17:15:49.850000 CVE-2024-1666,0,0,a40e8fc9293cfb1145d3e1e7f135accc0146030f08ee21589fc7baafb865977a,2024-04-16T13:24:07.103000 @@ -242115,9 +242121,9 @@ CVE-2024-20074,0,0,ae8ea4f1aeb95c2db6d96bbffc4725f4aeeca344255405cba91589fc79862 CVE-2024-20075,0,0,c25b515a91dbc89ebe595fac548aad128c5354b0efe2add6f43a7dd87e7c74de,2024-06-03T14:46:24.250000 CVE-2024-2008,0,0,89351e3b3909d90b71f2b464baa5c1531110f0fc183853e9b068b202a6597011,2024-04-04T12:48:41.700000 CVE-2024-2009,0,0,71459ca320e3ba6a6c331932225f22d43a50dc1f7bd5a77e40fa738dd949aeca,2024-05-17T02:37:59.337000 -CVE-2024-2011,1,1,705799d1c6a1fbe2e6805b9eefb27d8519cc6e6514d5980ad5835aa5ecc0b1ef,2024-06-11T14:15:11.050000 -CVE-2024-2012,1,1,6ebe3b4e6f4f3c194a81a730282b18e9ffaf91c32fe2654a92d21a8291ac1b5e,2024-06-11T14:15:11.273000 -CVE-2024-2013,1,1,68de8f3e9b2500ca0079f1b3e191111f2bf9b053cf92590b86b85311047d589d,2024-06-11T14:15:11.503000 +CVE-2024-2011,0,0,705799d1c6a1fbe2e6805b9eefb27d8519cc6e6514d5980ad5835aa5ecc0b1ef,2024-06-11T14:15:11.050000 +CVE-2024-2012,0,0,6ebe3b4e6f4f3c194a81a730282b18e9ffaf91c32fe2654a92d21a8291ac1b5e,2024-06-11T14:15:11.273000 +CVE-2024-2013,0,0,68de8f3e9b2500ca0079f1b3e191111f2bf9b053cf92590b86b85311047d589d,2024-06-11T14:15:11.503000 CVE-2024-2014,0,0,5960248fb8bbf5de40f54070e9a0bf6ae1851c3dbf1c40767a4c730aca696f9f,2024-05-17T02:37:59.427000 CVE-2024-2015,0,0,4f254a79e909247754188d5f89a636bda7a9c29066bee89e20a1544caa513b84,2024-05-17T02:37:59.517000 CVE-2024-2016,0,0,3f768688e7f1c82234f5951f683936f2d0e621b5ebe8941365eb345dccd68eef,2024-06-04T19:19:12.807000 @@ -242272,16 +242278,16 @@ CVE-2024-20662,0,0,211133ff87347e7a6c60ddc539413e2730b9e4ee9bdb0f09194ee5ce9afd7 CVE-2024-20663,0,0,e4e28c5c1486de563764220606e3f51239c2e12f1a36384505f473953dd43e3a,2024-05-29T00:15:12.947000 CVE-2024-20664,0,0,4df490ba226fbc983325394264a884947b7bf802902fe3b48c7c518ef66a692d,2024-05-29T00:15:13.120000 CVE-2024-20665,0,0,4152fd7eaf2940d1fdc6ee00834b7770ce5f7d170d2355b78c7d9b17727ed02a,2024-04-10T13:24:22.187000 -CVE-2024-20666,0,1,c253ce0ac30b41340b3683ca92c035bd60bbdc1b78e693df06b2e1b4663abc8e,2024-06-11T15:15:56.487000 +CVE-2024-20666,0,0,c253ce0ac30b41340b3683ca92c035bd60bbdc1b78e693df06b2e1b4663abc8e,2024-06-11T15:15:56.487000 CVE-2024-20667,0,0,dadf3bc4eb3726ed5a95dd3233aed8922cc6eef58af7e33fd5cc7641b28d6ba9,2024-05-29T00:15:13.400000 CVE-2024-20669,0,0,c87d9eddd238e7c1bf6f8169ecddfe1f5ddd555dcc652ae52d503a72c11f769a,2024-04-10T13:24:22.187000 CVE-2024-2067,0,0,56b71fd98c1a2a30ffe7d997c7cf2b15c5d4114e4afbbf44c838c37ac8e6305c,2024-05-17T02:38:01.493000 CVE-2024-20670,0,0,b2d78e35bd2bb5eb43de8422bcd00b05d3a190f76c85f548849b89780a039253,2024-04-10T13:24:22.187000 -CVE-2024-20671,0,0,a909e7542a4f27bac7b3c8922bc1dcc8da9c04f9b5256ff72be51b705a438f9c,2024-03-12T17:46:17.273000 -CVE-2024-20672,0,1,0890590e5068cdd92819c9025e89bd52de505da65616366ec0c41e768f7a1a67,2024-06-11T15:15:56.723000 -CVE-2024-20673,0,1,0fbfb2f534717dd1a1f2e5abb6355451c6cfa49c7e6fd4b85e4ed81b0d0bcfb2,2024-06-11T15:15:56.927000 -CVE-2024-20674,0,1,4d1b3a12013c50e8e546c1f02dc4dcdc6957dd781cc0859a408bf2a0d6c0ed5f,2024-06-11T15:15:57.087000 -CVE-2024-20675,0,1,dc50706533e118aec443dae8e9768f3f491ab19e3d8981ada3c692779f9d424a,2024-06-11T15:15:57.287000 +CVE-2024-20671,0,1,807f9f3c90b2bde1711298962fe9904366e31128a18764a02501ca56f98eae10,2024-06-11T16:15:17.183000 +CVE-2024-20672,0,0,0890590e5068cdd92819c9025e89bd52de505da65616366ec0c41e768f7a1a67,2024-06-11T15:15:56.723000 +CVE-2024-20673,0,0,0fbfb2f534717dd1a1f2e5abb6355451c6cfa49c7e6fd4b85e4ed81b0d0bcfb2,2024-06-11T15:15:56.927000 +CVE-2024-20674,0,0,4d1b3a12013c50e8e546c1f02dc4dcdc6957dd781cc0859a408bf2a0d6c0ed5f,2024-06-11T15:15:57.087000 +CVE-2024-20675,0,0,dc50706533e118aec443dae8e9768f3f491ab19e3d8981ada3c692779f9d424a,2024-06-11T15:15:57.287000 CVE-2024-20676,0,0,dbc35176deb77a5a2db5143eca2bd2e7832ac87ea2c5d117e15044ab77769433,2024-05-29T00:15:13.680000 CVE-2024-20677,0,0,65c13b3f4f0a656e6bc34332506df768c73daa7e3c82eaaf6bc9a96f67ec12ff,2024-05-29T00:15:13.797000 CVE-2024-20678,0,0,e9b30213a4906c726048109d23c7adc0ebb9c2ee5b671b495b1c257542c66e9b,2024-04-10T13:24:22.187000 @@ -242307,7 +242313,7 @@ CVE-2024-20695,0,0,3140b865165e7a1476184c26b052bdb37f127b446790c95987e7bbb86f6ca CVE-2024-20696,0,0,d1cacd6fe0ea80f1a077841d88f8ad5ef184f1bf8e5f953666653fe05e6d5ae3,2024-06-08T13:15:54.193000 CVE-2024-20697,0,0,9b711905e49f6b2dc310defccda03258f1669ff0c0de67d856fa75e395bfea11,2024-06-10T18:15:25.050000 CVE-2024-20698,0,0,c87681a712debff74de386c4bd26867a56e17e9c3f279b52fd0c11e97aa17c64,2024-05-29T00:15:16.343000 -CVE-2024-20699,0,1,16035529e1f89acac6dd906f3756567d60913215788d2b420f2919b673f4ec9f,2024-06-11T15:15:58.073000 +CVE-2024-20699,0,0,16035529e1f89acac6dd906f3756567d60913215788d2b420f2919b673f4ec9f,2024-06-11T15:15:58.073000 CVE-2024-2070,0,0,96e6b267a155e30e7af56a9cf12a74717d1ea58df3f9d2000eda21f3b659ea73,2024-05-17T02:38:01.770000 CVE-2024-20700,0,0,bdd7adac55de226187f694d70def9099b3862d1bc15e802ad84e017f5b86f31e,2024-05-29T00:15:16.493000 CVE-2024-20709,0,0,cca85717bb81539781e203bb4477bf37d13c8f3ae6be35c0f26cc1afde064b64,2024-01-23T19:28:38.997000 @@ -242734,9 +242740,9 @@ CVE-2024-2127,0,0,7e732da9362123c901ed00a29dfcc3ca896b81c43d152f47d3b17084697855 CVE-2024-2128,0,0,b758ae1e45bbf3f98be89f21520e72433f96873d6cb56cc91a1f688f1fc159ac,2024-03-08T14:02:57.420000 CVE-2024-2129,0,0,4c524f74551adbc3e342fac213dfeb618fea121bbe870db2406c689593d206fa,2024-03-20T13:00:16.367000 CVE-2024-2130,0,0,9fe340e5e07df3d99bdc5083493ea2da904eddf69629b14325c6709a09efc300,2024-03-13T12:33:51.697000 -CVE-2024-21304,0,1,48660d83007d38e725ddce429eba147b85486376e1b6bde8cb2bd6a761916ff5,2024-06-11T15:15:58.253000 -CVE-2024-21305,0,1,2696cc75e112bc4774a2b69e6ca1b817f313e6ea3da86ac6f29334ec63cbad49,2024-06-11T15:15:58.433000 -CVE-2024-21306,0,1,eb25dd2807ab63fff934bdad07499e9a81e5baec44b0234b3784546077747195,2024-06-11T15:15:58.640000 +CVE-2024-21304,0,0,48660d83007d38e725ddce429eba147b85486376e1b6bde8cb2bd6a761916ff5,2024-06-11T15:15:58.253000 +CVE-2024-21305,0,0,2696cc75e112bc4774a2b69e6ca1b817f313e6ea3da86ac6f29334ec63cbad49,2024-06-11T15:15:58.433000 +CVE-2024-21306,0,0,eb25dd2807ab63fff934bdad07499e9a81e5baec44b0234b3784546077747195,2024-06-11T15:15:58.640000 CVE-2024-21307,0,0,ccdfa4ae2a3b06e3a02bc4796352165e8bc92e2c3f838c4b6749bf658f69f994,2024-05-29T00:15:16.713000 CVE-2024-21309,0,0,d7ffbc8ab1c8ac7bc0a68a4720605c60123e348b5ddfc1cdab66e1de069b9c0e,2024-05-29T00:15:16.833000 CVE-2024-2131,0,0,70fa52fd2d9e098897a89d6196b4c5236c8b9500caeb1e1d6701bc972bd847ca,2024-03-25T01:51:01.223000 @@ -242755,14 +242761,14 @@ CVE-2024-21322,0,0,f65cb2d74d732ec5e441ae2d8c3e24b5a347300176d88019078d888617e33 CVE-2024-21323,0,0,5c1e11db15c2fb474e51109729d0492105f3164a790d1f2c00bb372aaf5dd1ff,2024-04-10T13:24:00.070000 CVE-2024-21324,0,0,42fbf44b38bcd35ad5b80521d333e069a665fc05171fc616d9a5cd82c840cf47,2024-04-10T13:24:00.070000 CVE-2024-21325,0,0,b8a9691c9146a7329f4947869b656b122aa6c092231a2004b44790124fd3301a,2024-05-29T00:15:19.370000 -CVE-2024-21326,0,1,6bdb20342538439821f7ddaa5ada5b3fc4117a27bf2ebdfb1d8a3635a439769b,2024-06-11T15:15:59.227000 +CVE-2024-21326,0,0,6bdb20342538439821f7ddaa5ada5b3fc4117a27bf2ebdfb1d8a3635a439769b,2024-06-11T15:15:59.227000 CVE-2024-21327,0,0,642490e1d2f1b99ad0251adc86a032ff054b7aaa465907684f4cba41c6b6fb76,2024-05-29T00:15:19.510000 CVE-2024-21328,0,0,ed5d7139f8495eda1c158abf4ab359c21fe43913846e7f1330660b86357ca423,2024-05-29T00:15:19.623000 CVE-2024-21329,0,0,1419a7bfbcce89566b2649311f2716242df9b9c7bcb5ef1a2f14e4af10081df3,2024-05-29T00:15:19.753000 CVE-2024-2133,0,0,28ecf87ba5fce4375715e36bbbf63dab11890409e85d1d59b752a403b0d62fb9,2024-05-17T02:38:03.570000 CVE-2024-21330,0,0,f8e1d655b992c9b28959c726d5c177eae02671429ab63d013da267aad4ee4341,2024-05-29T00:15:20.273000 CVE-2024-21334,0,0,b712325e53c35442a2869799d740fe10eaf18b936a15203b80075d9ee5c9dcda,2024-05-29T00:15:20.560000 -CVE-2024-21336,0,1,afeafd17cabd942527cf2b3cf161e0f0e38edabbdf5ba27b5e43b4c018d8b128,2024-06-11T15:15:59.553000 +CVE-2024-21336,0,0,afeafd17cabd942527cf2b3cf161e0f0e38edabbdf5ba27b5e43b4c018d8b128,2024-06-11T15:15:59.553000 CVE-2024-21337,0,0,897194f99f22c4db5366a3b2e1ad388ecbf6548d8e4a64185144cbd2db0e3a5c,2024-05-29T00:15:20.793000 CVE-2024-21338,0,0,94bf44baa60f3b870d9f5f460ebbf915fa2a062d3e885201c5ca65e215b68833,2024-06-10T15:42:53.913000 CVE-2024-21339,0,0,5d403d1b36e88ab418bb8b80dda96693f9ba0c20e2d7dea0936541a36bc1a1df,2024-05-29T00:15:21.830000 @@ -242779,7 +242785,7 @@ CVE-2024-21348,0,0,1bdbb1c8e780739451bb1c7eb63ae5f384a3716641132ffe8542a4f12fa5c CVE-2024-21349,0,0,54c075c2bcf52bbf75f899df4848427ab193383158e357fba44c445c206890e8,2024-05-29T00:15:25.707000 CVE-2024-2135,0,0,2ea30e154df2996b1705b27aad5c83a767cc365a27c87a2e82f8abb1ecd656b0,2024-05-17T02:38:03.763000 CVE-2024-21350,0,0,2fd9f74afd9e90f43702557eb45f20d3baad94fe18c70060bfc69ff3c9997e08,2024-05-29T00:15:25.863000 -CVE-2024-21351,0,1,6856c7eae611246feaeab56c4b605a662eedc7ac1b9e410e8f21638868f9fa8b,2024-06-11T15:16:00.303000 +CVE-2024-21351,0,0,6856c7eae611246feaeab56c4b605a662eedc7ac1b9e410e8f21638868f9fa8b,2024-06-11T15:16:00.303000 CVE-2024-21352,0,0,24e1962848c801b79d975de997dcafcfd1bc456fd65a539a5e8e7d70b42bcec0,2024-05-29T00:15:26.060000 CVE-2024-21353,0,0,f8333eb30302ff3b806a9d6fcf159a5449599cc346b9b88f09669eaa05f4c267,2024-05-29T00:15:26.197000 CVE-2024-21354,0,0,63b1a927ead7b2abeed0886dd5002831eb6bfc36e3193812269d82de4bcc3eee,2024-05-29T00:15:26.367000 @@ -242812,13 +242818,13 @@ CVE-2024-21379,0,0,4f71bcf54acd29a767a8afb0773f1ca3c56f3ef45499bdf57cbb6447d6596 CVE-2024-2138,0,0,cf3f05655a7738d410f944dbc1ee03b2694fdebe182279bc579f64336326598c,2024-04-10T13:23:38.787000 CVE-2024-21380,0,0,a2a03ec8d92cc1ae3fd24117a281a7ae96405bde56458f1eef609bc79ff3082d,2024-05-29T00:15:31.397000 CVE-2024-21381,0,0,e9025d90a132703ffa2705920858de61cb7f282507716bf46a75f0f0ae0dd245,2024-05-29T00:15:31.513000 -CVE-2024-21382,0,1,b4c96e1f41426633d71302bf1fb8ae1b0f803cc4339c090041ea7c59e794291e,2024-06-11T15:16:01.580000 -CVE-2024-21383,0,1,0b7ab6ffc2735fb324ca432100ab1b029cba246e67b5efb21eed92dea38479b8,2024-06-11T15:16:01.720000 +CVE-2024-21382,0,0,b4c96e1f41426633d71302bf1fb8ae1b0f803cc4339c090041ea7c59e794291e,2024-06-11T15:16:01.580000 +CVE-2024-21383,0,0,0b7ab6ffc2735fb324ca432100ab1b029cba246e67b5efb21eed92dea38479b8,2024-06-11T15:16:01.720000 CVE-2024-21384,0,0,e0668cc8b8dcd3fcfa1df278e2f3b69c64384d4f98f2f7d980d005369c43489d,2024-05-29T00:15:31.690000 -CVE-2024-21385,0,1,f13b085383388c80e4baf34878b21d0b01f25a911244e457931827fdbb89dacb,2024-06-11T15:16:01.877000 +CVE-2024-21385,0,0,f13b085383388c80e4baf34878b21d0b01f25a911244e457931827fdbb89dacb,2024-06-11T15:16:01.877000 CVE-2024-21386,0,0,ca8a19a37d271fcdb2627d898470ae3412a449c701d62328fd58ec0435f034e7,2024-05-29T00:15:31.847000 -CVE-2024-21387,0,1,209b957c0532ae1b09525122f574f5afe7b19d5eeaca03917f089aabe3b9ecc9,2024-06-11T15:16:02.047000 -CVE-2024-21388,0,1,fc3e9f2087ccced6dcc6af38bb589433e7c70e30da80d8124bcccc32164c2012,2024-06-11T15:16:02.170000 +CVE-2024-21387,0,0,209b957c0532ae1b09525122f574f5afe7b19d5eeaca03917f089aabe3b9ecc9,2024-06-11T15:16:02.047000 +CVE-2024-21388,0,0,fc3e9f2087ccced6dcc6af38bb589433e7c70e30da80d8124bcccc32164c2012,2024-06-11T15:16:02.170000 CVE-2024-21389,0,0,7da2f04b37b1bb7bfd30ec83bb94e135a5e79db0054d734292fc854186807f2c,2024-05-29T00:15:32.050000 CVE-2024-2139,0,0,97ba9b10c61030c67599abea7bf176e22d401e42a8c4bff1191d3bc82bb4e639,2024-03-27T12:29:30.307000 CVE-2024-21390,0,0,e51acd5ddb864e8d08b725a509cd146f80ac73c10fb192e2f766991eff2f8d43,2024-04-11T20:15:28.173000 @@ -242829,7 +242835,7 @@ CVE-2024-21394,0,0,6cfd4876668dd175ef5ca9ffff0475c0d39c80a77bb04245928bdf73717f6 CVE-2024-21395,0,0,04395b0981a90c2d3ecc58e065f3a6c33b5b184711c6a8743a07ed6414739441,2024-05-29T00:15:32.827000 CVE-2024-21396,0,0,81a2d5347cc77ca8aea04d77b1e85a9d929445dc02b06d831c7e095216461466,2024-05-29T00:15:32.933000 CVE-2024-21397,0,0,53a989ede4b1b39b863102885a630e084cd05821e4b8f0825a6dd1f5be39f7f2,2024-05-29T00:15:33.057000 -CVE-2024-21399,0,1,e5c8d58198b559ca6d390e2e3becb3b2c4d248d2c9d01827f36d03e49f9708d3,2024-06-11T15:16:02.503000 +CVE-2024-21399,0,0,e5c8d58198b559ca6d390e2e3becb3b2c4d248d2c9d01827f36d03e49f9708d3,2024-06-11T15:16:02.503000 CVE-2024-2140,0,0,9f1ac854258e2288aad3aaa52a4b67f533aa64897ccc17bb2319dd5a69e301b8,2024-04-01T01:12:59.077000 CVE-2024-21400,0,0,713cbf56ba709632de02c74ae4c9e138b9e20d5678c3c35efc0349a02e9ee990,2024-04-11T20:15:29.170000 CVE-2024-21401,0,0,46ba258632a7f252f835f68917e3722b29150cb9fab67b196cb62f4aa2e1b512,2024-05-29T00:15:33.247000 @@ -242839,28 +242845,28 @@ CVE-2024-21404,0,0,6a0a3a2a16e56c0d92421a411f0f8baae8c6c61ebbba0b6968a203716cfcf CVE-2024-21405,0,0,0e5fe214085503ef8879e2dd38da128602380764b8016870b9a7827e3064c082,2024-05-29T00:15:33.737000 CVE-2024-21406,0,0,730b781bcb398f066d1793ec5035a8ce7a738ed4f5d38b7ee32eff121ea100b9,2024-05-29T00:15:33.883000 CVE-2024-21407,0,0,a0945b4eb1c0c273d7daed0103820faa552557a315ebb12e1a01467c72e099b6,2024-05-29T00:15:34.237000 -CVE-2024-21408,0,0,5325218009ff3c8f10a3b9269e4b1c5ec312eb3ea56b73f6a728479c1bad3635,2024-03-21T21:06:09.543000 +CVE-2024-21408,0,1,116270eeb9e18dd26aeef7ba69d01ec328a49f953c83d73fdec18fbddbe368d4,2024-06-11T16:15:17.727000 CVE-2024-21409,0,0,3252b9c8091d5332a3bc773a89fdbd086af57e3bd078c5be3485ae52c4af326c,2024-04-10T13:24:00.070000 CVE-2024-2141,0,0,e26109b8e99283bdb62d5043bdd1f401aa59fc85bb3806b759e44b62f049717a,2024-04-01T01:12:59.077000 CVE-2024-21410,0,0,6addc6653de64a6b0554d5f8d6a0d94bdac5f716a62299ea818fbbe1f6029bf5,2024-06-10T16:05:10.343000 -CVE-2024-21411,0,0,8d8f952d2011bbfdff19ef0bb365756eff0dc13d4fce72dca6529e4e1e68205f,2024-03-12T17:46:17.273000 -CVE-2024-21412,0,1,15fcbc84e561d705d3329fe36d52ac6f3132d8a4e1421d2eae50dca16c535dfe,2024-06-11T15:16:02.980000 +CVE-2024-21411,0,1,87dccb8fc188cfe3dd96c9c3a93a6159b152683f9953935417cd93cdf7f34285,2024-06-11T16:15:17.890000 +CVE-2024-21412,0,0,15fcbc84e561d705d3329fe36d52ac6f3132d8a4e1421d2eae50dca16c535dfe,2024-06-11T15:16:02.980000 CVE-2024-21413,0,0,947151b0ad9489675859c46209ccae83bb837b04e5bbe77ba7b528af79662a39,2024-05-29T00:15:34.720000 CVE-2024-21418,0,0,6fbe65289f7d87b34991c17b12db87eb2d8f0ad5b10086c98e42aa516bf11cfa,2024-05-29T00:15:34.853000 CVE-2024-21419,0,0,029987aebbeea99b8cf3ad95df60d5cac83c3ab05805c0fcb8848b83a1e3ed9f,2024-04-11T20:15:30.777000 CVE-2024-2142,0,0,775c587e23838eccc1f05d84b61c4d1b983fbea738158d2b5672ec0ee3392f88,2024-04-01T01:12:59.077000 CVE-2024-21420,0,0,8095c54f6c7cd893643c034872b759e526649a725cfe824be1e4663665371f5f,2024-05-29T00:15:34.997000 CVE-2024-21421,0,0,ba8423a9f096c86c4c4746df3fafea597a8042e8f3a3594375e861377c5bff3a,2024-03-12T17:46:17.273000 -CVE-2024-21423,0,1,f52403af5305ff40cf2946571813d8044bbe56c3a138a7bd1d30bf8943af6d3e,2024-06-11T15:16:03.297000 +CVE-2024-21423,0,0,f52403af5305ff40cf2946571813d8044bbe56c3a138a7bd1d30bf8943af6d3e,2024-06-11T15:16:03.297000 CVE-2024-21424,0,0,f0ac6080e8acf8658a413c6a67f4f2883d669628ac20bb6a474371ff2a84db21,2024-04-10T13:24:00.070000 CVE-2024-21426,0,0,d73f06f12d99d30e170a8845254495fcb51b744c06092c5db75fc55896f16dfb,2024-05-29T00:15:35.200000 CVE-2024-21427,0,0,9302735195689e19167f4b48a00821853ffdb5f4d6cfa8cfd79901c61e1635c3,2024-04-11T20:15:31.130000 CVE-2024-21429,0,0,936a9aa46e49cbebb2c3804bcc2938038e830db3c07baa7251bfd252a42b98e4,2024-04-11T20:15:31.223000 CVE-2024-2143,0,0,14deb819eb321e1741ed1d544a86b00db6ae553f92875625000d80c03b8e5cbd,2024-04-01T01:12:59.077000 CVE-2024-21430,0,0,e24ed282c1ab918b0f674e60e1e3e08542daac8026b8e9edebd51a7f0fb4a753,2024-04-11T20:15:31.333000 -CVE-2024-21431,0,0,476e57663296b7fb788c691569a2fac6745669a54bd64b944812b993d7319fcd,2024-03-12T17:46:17.273000 +CVE-2024-21431,0,1,ab67ccbdeea9d7ca615a8a50751d806365cfbf1dc13a6ba9985b2900173461b9,2024-06-11T16:15:18.230000 CVE-2024-21432,0,0,f1b7acec3ab0dca00d75eb32dd4cad0d657a20560c2dc03f3867b8b4723d7986,2024-05-29T00:15:35.527000 -CVE-2024-21433,0,0,ee472236afe644f07f9b492db268685fe166d891db74b91e0eabb37e1c8e1651,2024-03-12T17:46:17.273000 +CVE-2024-21433,0,1,ff40b05f876ef90ba75701b626d89397c8338935bab1df1d76f81f5226b54cd6,2024-06-11T16:15:18.377000 CVE-2024-21434,0,0,74a884107be1d7f8219269b928b96f1f52bb7ee78e5dd405455bd708b3b80dff,2024-04-11T20:15:31.620000 CVE-2024-21435,0,0,7b9e2e5900b6f2a7f2e9bdeaee2bea9a2155c6156b51f2f160a700c482b48358,2024-05-29T00:15:35.713000 CVE-2024-21436,0,0,8c5537e40d0a0daada675593a3b855dfbe00c2b64cb08ca8aa54cd571a338ed3,2024-05-29T00:15:35.830000 @@ -243054,7 +243060,7 @@ CVE-2024-21749,0,0,977e78c03c745b3f2715cc5017eb627860eddebef9d26895b59c2bc8df042 CVE-2024-21750,0,0,3e8fbe0cb62c8e56d68418bdaca88bd6a5a9359bd561d57e9822bcdabaea5468,2024-02-03T00:41:15.460000 CVE-2024-21751,0,0,b64fb613f54cec3fdbdc63d0d3501a7b32b5e5f92890894205961027ed2c4f96,2024-06-10T12:40:41.360000 CVE-2024-21752,0,0,80a5a3aff28e680d194d956f222c96b3f36d11392adc2ff7fd485136323ef565,2024-02-29T13:49:29.390000 -CVE-2024-21754,1,1,ae519b69596b7b6c1ea31f3e793c3182599175861398bbbbb58a08f93aeb6326,2024-06-11T15:16:03.433000 +CVE-2024-21754,0,0,ae519b69596b7b6c1ea31f3e793c3182599175861398bbbbb58a08f93aeb6326,2024-06-11T15:16:03.433000 CVE-2024-21755,0,0,3649ad429f456b06338c76a7773a7effa9162638dba6b0cd829505e767eab517,2024-04-10T13:24:22.187000 CVE-2024-21756,0,0,7e40cab71c47f1a51d786a1ac8dd4278e504d9e4172c58909f1d2b21a6d9e3a6,2024-04-10T13:24:22.187000 CVE-2024-2176,0,0,0b1ad65e2de8a26d446910c44762983b7c0d3648d9404f5b09d2ef1eb4a5dde1,2024-03-23T03:15:12.287000 @@ -243796,8 +243802,8 @@ CVE-2024-23107,0,0,322e47dd821fc1fd2d2c1cca77300d8b32f4ff697feaa94db5e3454edd458 CVE-2024-23108,0,0,4bd66ae4e2150cd9c3073e095bacf489de77af9a273b611e130c3e3fa4edf7ea,2024-02-07T15:02:00.203000 CVE-2024-23109,0,0,c2686a38cd2651bfef8ab0e98ee0dbcce98e98fd7c1f1805290cb9df9c03fe78,2024-02-07T15:04:28.237000 CVE-2024-2311,0,0,738ffcbe7f411809b0dd04835f3243a6f3350cd455230e0887015d402141b408,2024-04-10T13:23:38.787000 -CVE-2024-23110,1,1,938f6f07b9fdbdedf19dbc68876253324e1330682230f848fee0f55dec098f8e,2024-06-11T15:16:03.707000 -CVE-2024-23111,1,1,867686128d4304c54d82cd157b561f2da8c964cccfdc63d4fa3a204770996513,2024-06-11T15:16:03.957000 +CVE-2024-23110,0,0,938f6f07b9fdbdedf19dbc68876253324e1330682230f848fee0f55dec098f8e,2024-06-11T15:16:03.707000 +CVE-2024-23111,0,0,867686128d4304c54d82cd157b561f2da8c964cccfdc63d4fa3a204770996513,2024-06-11T15:16:03.957000 CVE-2024-23112,0,0,db97de9e46492b481e52ee1e1883233ddfe5123c1ba448f0e59ac92baa6de68f,2024-03-15T14:51:58.497000 CVE-2024-23113,0,0,29903cf0008dd4023f7698dfe9b07a61d8c5e19cfdea1fb0ce14ef659e7383ed,2024-02-22T15:33:00.970000 CVE-2024-23114,0,0,184fa653e4551a8698139895eb4d05d830e4b2d2a73606f2e94ea8d7330a5675,2024-02-20T19:50:53.960000 @@ -244055,6 +244061,7 @@ CVE-2024-2350,0,0,16bc9ead74e715fa72070f0cc0d88701bdb9f0cbc698622077c44670fc69d8 CVE-2024-23500,0,0,b6642b73aef2e4cdba157839c8fde9771818b399a7f64cf89ea1ee42a68c85c1,2024-03-28T12:42:56.150000 CVE-2024-23501,0,0,b3e85809586c989dd0a69f1f88e280acf334973e6408d57bc052ae66513752bd,2024-02-29T13:49:29.390000 CVE-2024-23502,0,0,8f894ed7c8e8f8359294a01d255055a873ed16e9a79e2948ed3ac6f5d8f8da9f,2024-02-09T14:46:17.743000 +CVE-2024-23503,1,1,49adf9dbf6f1bf42fac3d2fa4e0a33c00b9019a09889c1120eab2e22244debb8,2024-06-11T16:15:18.990000 CVE-2024-23505,0,0,1c1e95102de07fb5891297ba209ce274fdd1b187d013f9d2d61a7cdf81f20a18,2024-02-05T20:27:44.793000 CVE-2024-23506,0,0,1374ac637ee795ef76e472829586ea10162cf799e7f8facdf1ae775daa957ca7,2024-02-01T04:14:07.073000 CVE-2024-23507,0,0,5e40ce7b11a8b26bc0a529a8393436247da9b21902b7ceeec2a950c934f8cd05,2024-02-05T20:42:09.590000 @@ -244067,9 +244074,11 @@ CVE-2024-23514,0,0,d7e3c284194c6ceaffde4175d0b48a010f01f7192801918385ee65be56400 CVE-2024-23515,0,0,9b3019b1da03057d41a7c6e89ecb38b2748c5a51cdf0834f8b10325e87cbc5fe,2024-03-27T15:49:41.437000 CVE-2024-23516,0,0,f908beaf0aef3ecf8a8819fae23d2c4559de7dc9d2df85df41316958d107a5e0,2024-02-16T13:41:48.350000 CVE-2024-23517,0,0,e4bbedbc00468997609a0c9179822a4e7c082017c830cbf85558e35c31daa8f6,2024-02-16T13:41:33.563000 +CVE-2024-23518,1,1,f1d959d5cefac3bb50d99f43a262347e9cb9f2e81f2ffaebbfe13c7de18cbbfb,2024-06-11T17:15:50.973000 CVE-2024-23519,0,0,4d28ec0c6447c5e765bfd28438ace7e6750c3a1e16dfeea04dd8418971fdb577,2024-02-29T13:49:29.390000 CVE-2024-2352,0,0,57630273c197eaed8b3c3f6d93ff32d48d806b15015e610cf5486ce468752335,2024-05-17T02:38:11.410000 CVE-2024-23520,0,0,6231203085a20b2d4cba5048549458f88829476b5e6533d86ed85baf0d8a6576,2024-03-26T12:55:05.010000 +CVE-2024-23521,1,1,c0f2ef2598b75049771122e0f2fca7be45eec402db613855e308f432575bcf16,2024-06-11T16:15:19.223000 CVE-2024-23522,0,0,7c088d2b09cc2e5e477c07b1d4ef807535495454f574963a9dafd17ab8e9681b,2024-05-17T18:36:05.263000 CVE-2024-23523,0,0,13316361d7846e6bf749bdea54d907de9d96954e12edb4899346015be33f686c,2024-03-17T22:38:29.433000 CVE-2024-23524,0,0,b4e07bfebc676f16e7c9cc5e0a5f2262c8872797e5d06800ed4ab67d5fef487e,2024-06-10T12:40:41.360000 @@ -244182,7 +244191,7 @@ CVE-2024-23664,0,0,223da0146b6b94ab9cb0566d6cdd05e60bfe84534772354c328f4fdd10e63 CVE-2024-23665,0,0,d0ae5dc4c21e463a036872a51bba24eb7c6c68e90a0a4df19a2801982726f049,2024-06-03T14:46:24.250000 CVE-2024-23667,0,0,305ff047de3815ba4f0d799b8bcc54e25aba76f554642635f5afc53c27ff4025,2024-06-03T14:46:24.250000 CVE-2024-23668,0,0,51d21722f600a8d7c6853c0f9ea388475489e90712fe45fa3fcf586695ca58c7,2024-06-03T14:46:24.250000 -CVE-2024-23669,0,0,b451250ce634cd7ae9d86a4a9aea45aef5b8abb759a627e8325592b3a9deecc5,2024-06-05T12:53:50.240000 +CVE-2024-23669,0,1,c56d067fc5952db5d2fb92a9d35150e47a4b10ceefda3afe1a73049170c1c1ae,2024-06-11T17:09:43.840000 CVE-2024-23670,0,0,4d8614a9f46c8880393dda5ce774ce29db3e4f2f75a2a9e9b14a9ec00baa1b4c,2024-06-03T14:46:24.250000 CVE-2024-23671,0,0,108c61a6aa74a9b71687a2e3aa153a422c4a0c3adcd258415c5b065e1ef21ae7,2024-04-10T13:24:22.187000 CVE-2024-23672,0,0,ecf21cf6fef0fb9a72fe820ee02e2854b5a2d1575ce42cd766c4a52761cff3de,2024-05-01T18:15:14.357000 @@ -244193,7 +244202,7 @@ CVE-2024-23676,0,0,56ef125eb2696d6a370cb1fcee9cbf4c70187c994325783ccd00cee906067 CVE-2024-23677,0,0,5002fb89610cfd38f5d468dc18f3c5331733998bb74f1ff07d319dde587b2882,2024-04-10T01:15:18.390000 CVE-2024-23678,0,0,5d448947bf54ec004c72c54b20b24d8bf3a971bcebd8f73c5e7293fdadfe4a1b,2024-04-10T01:15:18.543000 CVE-2024-23679,0,0,640c7c61fdad62898ad4f1df55f17c5c64134e2dc64c7047206373e2ec219dcc,2024-01-26T19:12:45.117000 -CVE-2024-2368,0,0,7de27d6c3df4c6eb86124ff3122bfe8eca34e7e15a20b125486fdfcde52ccee8,2024-06-05T12:53:50.240000 +CVE-2024-2368,0,1,68b9afb7e16c741dfe4db289d2a994180fbbb1159178ea9c53ca33c6e2b5c198,2024-06-11T17:13:40.087000 CVE-2024-23680,0,0,65bdb0a5f8b9a48a1100a0dc9afd500ed5d0157f9effc3b8f1a9f7c133b834bf,2024-01-26T19:08:47.817000 CVE-2024-23681,0,0,5784aa8d00dbad48397c875e3410cbaf00b669b08aed5acdb560ab01d2b57314,2024-01-26T15:08:04.263000 CVE-2024-23682,0,0,051b25f120cad0cdd9a52c659e33751066e3fa9d41bbdc9f8e31ffa7e2662331,2024-01-26T15:08:33.007000 @@ -244708,7 +244717,7 @@ CVE-2024-2470,0,0,a427d1f5bc46913e76a508b62b03206e73e6a818f918f011f09bc505bcbb22 CVE-2024-24700,0,0,722efb6615dc1dea12ab2ef8d5ec262b410d1f9df67edaa76cb1e0c47573b1f8,2024-03-27T12:29:30.307000 CVE-2024-24701,0,0,cad696bd31db968a1beda509b4d070e8072c708e3a95c6538ec2b30342527797,2024-02-29T13:49:29.390000 CVE-2024-24702,0,0,1009c0fb54a0e4a4119b63f5a2588872c60d2c936085dfd7c83b13ca41bf148b,2024-02-29T13:49:47.277000 -CVE-2024-24703,1,1,06617cdd0a9a8d38517fc97d2d816b5baca4830dc04e9f754eb6ef72123a662f,2024-06-11T15:16:04.197000 +CVE-2024-24703,0,0,06617cdd0a9a8d38517fc97d2d816b5baca4830dc04e9f754eb6ef72123a662f,2024-06-11T15:16:04.197000 CVE-2024-24704,0,0,89e85a410438d847d4e31aa0fba94a3314c237ebcba8999c2d1e341a7bb1f28b,2024-06-11T13:54:12.057000 CVE-2024-24705,0,0,fa7603570485ff5e2532a1aa05b32e5c0f5434f5146edb6c736525118ca768dd,2024-02-29T13:49:47.277000 CVE-2024-24706,0,0,4d433b03a4c26ebc6bd4b9712c01509648b3f2cecc7341b14e252b0e38dfa793,2024-02-15T02:09:50.480000 @@ -245004,7 +245013,7 @@ CVE-2024-25091,0,0,01b357047b564e780ed13b7e87b2fb8ec79ae12ad4e744cc9437e3dc74a94 CVE-2024-25092,0,0,c1cf9debea65a0efd9e23e017b3c523a7b0720976f45508646a33d86cfcaeb68,2024-06-10T02:52:08.267000 CVE-2024-25093,0,0,c29d732f68144a1dd5d537415c8d51940073ac1e6ff114431aa6a52d78b263f0,2024-02-29T13:49:29.390000 CVE-2024-25094,0,0,6ba9f5c53aa4aac51446efc522144ae35e985d8a070a664685b43e0df39aa007,2024-02-29T13:49:29.390000 -CVE-2024-25095,0,1,b7d69408d0ea458631b0d37238f341d1f0d721d8e65e7687bd1e453de5ab0fc3,2024-06-11T14:28:47.063000 +CVE-2024-25095,0,0,b7d69408d0ea458631b0d37238f341d1f0d721d8e65e7687bd1e453de5ab0fc3,2024-06-11T14:28:47.063000 CVE-2024-25096,0,0,197459782cea6a70dfd744624d830ac31075b0aba6f9593eca13f5ad0ec0cbd0,2024-04-03T17:24:18.150000 CVE-2024-25097,0,0,b09bd692195a6af2bdcd0c616f06807fc50a89e84d1ede17ca925d89de84c8a4,2024-03-13T18:15:58.530000 CVE-2024-25098,0,0,028b98ef9a2084a8173d1d38eecdc4136ac8af6138dca7ba8312806912dc26e0,2024-02-29T13:49:29.390000 @@ -245584,7 +245593,7 @@ CVE-2024-26003,0,0,fa8874de1288018456c2c5e60f788d74da5e6a9794ed476433e2f3d611980 CVE-2024-26004,0,0,246387e032da3fec432fd431d962194949239cd6f63c6608ded252f81c7603e5,2024-03-12T12:40:13.500000 CVE-2024-26005,0,0,21f5813ff10f50303a70abaad99d1a58bb1553a9ae84175693ea090d825991d5,2024-03-12T12:40:13.500000 CVE-2024-26007,0,0,7138fd3af890dadd804713b56a1647c12755a4de384c07dd51c6253ec0018804,2024-05-14T19:17:55.627000 -CVE-2024-26010,1,1,c4adc6802efd64e6f2c889f5e08a672d42b9ae6ad9b7425b7d062c45a0f01bd4,2024-06-11T15:16:04.473000 +CVE-2024-26010,0,0,c4adc6802efd64e6f2c889f5e08a672d42b9ae6ad9b7425b7d062c45a0f01bd4,2024-06-11T15:16:04.473000 CVE-2024-26016,0,0,225df2de732dbe1aa65450d758c74d9fd62d1571f14eb88fac267d40c0b495b0,2024-02-28T15:15:09.320000 CVE-2024-26018,0,0,f0a23aadd063ff7c7efa65bdfb2fba637cb4053fe19b3da7278a7f893beabdc7,2024-03-26T12:55:05.010000 CVE-2024-26019,0,0,fbe6a7f77deb15cc085d52bc5fe2b39474b81c363a3a1755ab2818a8be2623e5,2024-04-11T12:47:44.137000 @@ -245685,18 +245694,18 @@ CVE-2024-2616,0,0,e3c92b3b9aca00a51c867346d68b83b884e699ab07afe2070061dd49cd767a CVE-2024-26160,0,0,2e19f2c7dab7afb91a923d594992305a7558f77f9ea9335822daf8a46b4a5b9b,2024-04-11T20:15:33.553000 CVE-2024-26161,0,0,7aa88a4ca9915df748fb7a6a0a10f873fe3240c630a4d1623587346362cebb04,2024-04-11T20:15:33.647000 CVE-2024-26162,0,0,e930a537d9f1f96e4f30458d0e40032d5b49bdf8a0f82610eef0b9ca76e4ebbc,2024-04-11T20:15:33.750000 -CVE-2024-26163,0,0,c5a5adf8bc5ad0b4a7faa7a4744724eb002088ce5cbe4b840f8995db81df8585,2024-03-19T17:03:03.383000 +CVE-2024-26163,0,1,19a72ce9e00fd065337b8348b22bf8bbbc50ac56496f253bbca623157be51d80,2024-06-11T16:15:19.610000 CVE-2024-26164,0,0,7a5a47325a52b9d58c705dc706d735c42c05e49e17dbe17668afd9c66b85ee5c,2024-04-11T20:15:33.877000 -CVE-2024-26165,0,0,a1425dd3ba6a9256a35ea0d63f285ba1e05f8153f9e51034a0497747fbc27ee4,2024-03-12T17:46:17.273000 +CVE-2024-26165,0,1,792572cb07406ab81127d72d06c0ecf3b7711c4a86d4c35cf21d2ebce3939f8b,2024-06-11T16:15:19.780000 CVE-2024-26166,0,0,f391c4b0db733d40148db48047d4241707d804226a4057e01c2cdc7ed3c4af9e,2024-04-11T20:15:33.987000 -CVE-2024-26167,0,0,c7ef30deac9cc168daf190a6134ba584248b8a1ef0f1584bf395b9e88fcd8841,2024-03-08T14:02:57.420000 +CVE-2024-26167,0,1,df41d27f07d121d47403423e03cb5d0669d0be17e49911f76c8b08032270ca64,2024-06-11T16:15:19.920000 CVE-2024-26168,0,0,949af59ee3b8c1baa60afaabce6faf5f018a8b72d7b8397412fa4ad69b2f274a,2024-04-10T13:24:00.070000 CVE-2024-26169,0,0,fdbdf6dab2c6d5e26a936e3aa533cb934f507b6706458cc21136d8d105aa27d4,2024-05-29T00:15:36.933000 CVE-2024-2617,0,0,babf715e658d886f2044bd63c306bf0aff0a68888d1930a63deb9a40a6ed8a17,2024-04-30T17:52:35.057000 CVE-2024-26170,0,0,f2c772370ea374610349e86e1f764806e1b8901d9cb2b50e74b95ca0709a0820,2024-05-29T00:15:37.043000 CVE-2024-26171,0,0,9585df40c5f7289258f98464992d6f7b36d924236a4b679b88371a3376d72c9d,2024-04-10T13:24:00.070000 CVE-2024-26172,0,0,c6f278d7e7fafad9e920f5166d13c7edaac3efa6dc535e1f3334920cb3dd37e9,2024-04-10T13:24:00.070000 -CVE-2024-26173,0,0,e33d1fd736b59f657ec387d7529ba1e1cde39fd167abf346a667f8ac2153b5c3,2024-03-12T17:46:17.273000 +CVE-2024-26173,0,1,28ef56842a8aa5e7d4e4afccea6072c54ac5f7d45a5f497cae19a5d3f2ba5d97,2024-06-11T16:15:20.190000 CVE-2024-26174,0,0,9e513d57e50b9338000cd9327d30b626c06fb8e9c0ed4bbca1a259e4ec582ab2,2024-04-11T20:15:34.313000 CVE-2024-26175,0,0,9502ef7a505e9bc3ab50fe796acaf120e3ddae048baffc4a254a12810263040f,2024-04-10T13:24:00.070000 CVE-2024-26176,0,0,f59903f2631e58e79a3070c1f29430524476df93867e947d3ea24ca678f70e53,2024-04-11T20:15:34.400000 @@ -245705,19 +245714,19 @@ CVE-2024-26178,0,0,0ea3ff59f80ecc740a7520fa54df65db9194a0e2f5b284e4a28108c6cdd7c CVE-2024-26179,0,0,2c0e9c26edbe7391894ae0316bece6d7f0e00e30d0dd35ed10702d1f0851486d,2024-04-10T13:24:00.070000 CVE-2024-2618,0,0,4f0bf0b0dc9c6915a48b034c1474a3201e87a6008c756895fbaf294b9390d39b,2024-05-24T13:03:11.993000 CVE-2024-26180,0,0,2642e54652d0be099215ac2592071956276bb0b78149f1f8d9ba58e9dd3a0ce8,2024-04-10T13:24:00.070000 -CVE-2024-26181,0,0,3a411991e2aecfef78fa22d696562d983ee0c725c3bcbac06e5fb980d6ae1993,2024-03-12T17:46:17.273000 +CVE-2024-26181,0,1,2a579a51eea04f794c563f527c40239ff7a5f8b6ab08f5fcec0f641fc0002559,2024-06-11T16:15:20.530000 CVE-2024-26182,0,0,485ae09810036858e090542cbab32de37612825a546d21a345f4c90039e51c49,2024-04-11T20:15:34.707000 CVE-2024-26183,0,0,28caf9fc957a2961602c26f17ce14c17950995b5ed55b7d5cdd2976488235c63,2024-04-10T13:24:00.070000 CVE-2024-26185,0,0,130b8669a79bb3c03d063ec6d023bc21cdb8bceab7308616143e2d46571b0503,2024-05-29T00:15:37.420000 -CVE-2024-26188,0,1,4b7ecd3e893c25c5940f1f83e6c6503e0577c00b972acf0cadf444960172e146,2024-06-11T15:16:04.713000 +CVE-2024-26188,0,0,4b7ecd3e893c25c5940f1f83e6c6503e0577c00b972acf0cadf444960172e146,2024-06-11T15:16:04.713000 CVE-2024-26189,0,0,1f95108b705e718e6e21af2a68b22c3ad95b6094387a864e506ddc314b4c700d,2024-04-10T13:24:00.070000 CVE-2024-2619,0,0,1b172eb304c7e7d423e571a7d59901f8a7ae789ab716da67d3b61c030d644211,2024-05-17T18:36:05.263000 CVE-2024-26190,0,0,402b3f5c7b919092e557248b5e4187f305d4c04d79c2e54ca6a571f020cb681a,2024-05-29T00:15:37.597000 -CVE-2024-26192,0,1,a6baae196149278d94462fa728ddde52b3f0d4c4c80496ff2e50d03b2448d744,2024-06-11T15:16:04.830000 +CVE-2024-26192,0,0,a6baae196149278d94462fa728ddde52b3f0d4c4c80496ff2e50d03b2448d744,2024-06-11T15:16:04.830000 CVE-2024-26193,0,0,11dc10de408e0eeac89e7f5c9f988e275d3b49f10a7e40608511a2378684373d,2024-04-10T13:24:00.070000 CVE-2024-26194,0,0,1178b3d1cceea5f3af742d5f3341232cb85468232559f83781b4bab6643439dc,2024-04-10T13:24:00.070000 CVE-2024-26195,0,0,ffdd20db71cd126f38d1f4852c3772c9faa8ab4ba22fae9502cb6db4ea07270f,2024-04-10T13:24:00.070000 -CVE-2024-26196,0,1,3dd58983a66045a7a55633dcdecba8998cdb630474e882ede559c07a44a84949,2024-06-11T15:16:04.943000 +CVE-2024-26196,0,0,3dd58983a66045a7a55633dcdecba8998cdb630474e882ede559c07a44a84949,2024-06-11T15:16:04.943000 CVE-2024-26197,0,0,d2427241bd7a7514eb5dd09d72f4dbbe122c7dae85c0aacf9d871c0db998fa60,2024-04-11T20:15:35.027000 CVE-2024-26198,0,0,a0cd5acb9c46837da78f8bac7df28db63da5d6731490b2b073d4299cafc2f0fb,2024-05-29T00:15:37.817000 CVE-2024-26199,0,0,ff056b057a77aff081dc1078c78faf362e1b4f9a91d79ba55a420abd686291ea,2024-05-29T00:15:37.927000 @@ -245770,8 +245779,8 @@ CVE-2024-26242,0,0,7b46b68ffb6bd3037fda8a1661ba25f0b24271ae089c085bad211104dd85c CVE-2024-26243,0,0,d4b7eb815650962abefd8cc9c475c165d83f93e67fbe55f7f1d7f675eaed5dc2,2024-04-10T13:24:00.070000 CVE-2024-26244,0,0,8b04d16b3d5d5f3c648828bbc30588c7b90f336fbf7c83fb8ed1f9e51b26d8ea,2024-04-10T13:24:00.070000 CVE-2024-26245,0,0,d5695bd1946c16edd59d50975f824fe1e2978fe12fd0c13dbf0b752647d7d40b,2024-04-10T13:24:00.070000 -CVE-2024-26246,0,0,6c174a39b8e16966075834fa377a33ef3e5c5829eb1a43647414103e1222a0e5,2024-03-19T17:05:45.193000 -CVE-2024-26247,0,0,ed304d3168190e2757b85fd85fc0b38856926e8e4ca6b0df56c71d50554fa5bc,2024-03-26T03:18:26.197000 +CVE-2024-26246,0,1,872e13676301b607e619bc93d22ce860ccf5392e6af363e6a6c57f1070fac9ae,2024-06-11T16:15:22.197000 +CVE-2024-26247,0,1,25791ae214d7a33b6a0f68a09b1750391e9012591475b7c7bd45df9a08e0d1da,2024-06-11T16:15:22.333000 CVE-2024-26248,0,0,6ae330f1e55408ec4dd52dd06effc5327b4b346eca0b13e84863b9f73c26f72c,2024-04-10T13:24:00.070000 CVE-2024-2625,0,0,176202763572967bdd2403d6220b5ef3a0eeae1c4e7f0e46612d30bfb12e4570,2024-04-01T15:32:17.010000 CVE-2024-26250,0,0,ecedab60b29c43c07ee17ab13d711a3aa7e304497760670e923cdaafca978755,2024-04-10T13:24:00.070000 @@ -245837,6 +245846,7 @@ CVE-2024-26327,0,0,cdb018804c204ef80ecdc8daa637463eea9f06e211b3135332b7863d1171c CVE-2024-26328,0,0,70bb62dee22bd65978afbda4aa44a7dcc2acba975045b0300cec412005d5eda5,2024-04-19T07:15:09.770000 CVE-2024-26329,0,0,6eec7b644c4867f186846a122998b4350a4dc0459882c3ea663ee6d77c6e1117,2024-04-05T12:40:52.763000 CVE-2024-2633,0,0,d6d619ede14eb7136c8ee12cb2cd0efea8cc18b4fa44aa46ef5af23251d75954,2024-03-19T13:26:46 +CVE-2024-26330,1,1,0da8f999fcb70bdfe68331dd65d932bb399ce9bda95598eb9e75212c0dce34dc,2024-06-11T17:15:51.260000 CVE-2024-26331,0,0,30722a696c8e362be0b5214b6f32e39c8576cec54281765ffa53a29fae5741ea,2024-04-30T19:35:36.960000 CVE-2024-26333,0,0,72ddcf1e5079d4095fb63f71d350456e693bb97135c81208eeffa24430bb0b2f,2024-03-05T13:41:01.900000 CVE-2024-26334,0,0,561e27fe6d2eae55228bd8cfd4e061bf762c84a8f4fc571dc41629b9250a54d4,2024-03-05T13:41:01.900000 @@ -247068,8 +247078,8 @@ CVE-2024-28014,0,0,3a299a3911922a2699c2e7e5fdfb42faed104f072041d974b9a9ce991993d CVE-2024-28015,0,0,c36a569e47a8cc25a559aa19a480d47088d8456072eb6e8c9e0575d3988b3dc3,2024-04-02T06:15:15.527000 CVE-2024-28016,0,0,fe85c1f239b1cebe9726ce271c3f5722bfdbb4bcff9b0aba329f58c6fcbf12b8,2024-04-02T06:15:15.603000 CVE-2024-2802,0,0,3b7ed9aefbc68681b0633b6ab16c0b3db6db844ee4c655f6c7e6863ac6e1f543,2024-03-26T15:15:49.677000 -CVE-2024-28021,1,1,dea46ed632fa845c712f6ceae1554f5b9d05a3b4f826031846d8d15591daf201,2024-06-11T14:15:10.587000 -CVE-2024-28023,1,1,daebf91b4ac74474b66c6b165aa1ff271600bf0fd93c7cadb348fd108e73c5c5,2024-06-11T14:15:10.803000 +CVE-2024-28021,0,0,dea46ed632fa845c712f6ceae1554f5b9d05a3b4f826031846d8d15591daf201,2024-06-11T14:15:10.587000 +CVE-2024-28023,0,0,daebf91b4ac74474b66c6b165aa1ff271600bf0fd93c7cadb348fd108e73c5c5,2024-06-11T14:15:10.803000 CVE-2024-28029,0,0,ccc7402fca90b7f3950f1059a1d69e89046b1f9e52fa792eb9ddd9a398189f20,2024-03-25T16:06:44.403000 CVE-2024-2803,0,0,ce930c4e9bc9258ecb2ab0c912abdd19cc32c8e899acb9b2ec454e5acd9e0ebd,2024-04-04T12:48:41.700000 CVE-2024-28033,0,0,d380f707343e80ca8a48383d7130e8455ae81fc182e0d67c36374f1eb571652f,2024-03-26T12:55:05.010000 @@ -247119,7 +247129,7 @@ CVE-2024-28099,0,0,73e4b6f4e302601dee04aa1fa8e82b6137bc81ff22a37186241bc9bd72ade CVE-2024-2810,0,0,2c3ff0e8ac5c36f768fa31b8f69ccb9e5f88ff34163ac424caf94fb3a746b419,2024-05-17T02:38:31.447000 CVE-2024-28101,0,0,01541a2740ce2ffbd34e7de916ee530e34d9051f1ee53f417345ced9c3bece74,2024-03-21T12:58:51.093000 CVE-2024-28102,0,0,dd908b176fa8700f78af6b8a5980e30508069b806d1be433d10a42940d9f6918,2024-03-21T12:58:51.093000 -CVE-2024-28103,0,1,e78699e6d4ad79599d8a0b0447c708d3ed1c2b0a6a9e161b4939a2e1a4eb0df1,2024-06-11T15:27:55 +CVE-2024-28103,0,0,e78699e6d4ad79599d8a0b0447c708d3ed1c2b0a6a9e161b4939a2e1a4eb0df1,2024-06-11T15:27:55 CVE-2024-28105,0,0,fcc764ac1e5fa24a7cdc91807ca008992de501a32669f46e1eff534ca8e7d49a,2024-03-26T12:55:05.010000 CVE-2024-28106,0,0,a89dc0ca5c060b8348ae8f0c0d823137664e9265682cb4445ed694e0c7db5aff,2024-03-26T12:55:05.010000 CVE-2024-28107,0,0,67b11d5219b0b9f786e274d36c6219cc6a62e589b1f556fced90abc2232753f8,2024-03-26T12:55:05.010000 @@ -247580,7 +247590,7 @@ CVE-2024-28978,0,0,c1808ba5cc7d394021a34c4436b18922fdfd0f689f028622205841f891e3f CVE-2024-28979,0,0,1e8150fa51d059ee46f9ef1bfb23a0a517c44eb200b6531263fa54ebf9d48ec5,2024-05-23T19:05:51.923000 CVE-2024-2898,0,0,76a38588eeca70ecb25472849eb8998ee4d4f74eb5e3aa36fdb6d66de01eda42,2024-05-17T02:38:36.130000 CVE-2024-2899,0,0,4aa5ec01ca1d3b835467a231d9836714c4e4cef27dea7210f2a97d49ae8b91f5,2024-05-17T02:38:36.220000 -CVE-2024-28995,0,0,8f0116c860e033bcbb3e2a3653014e4a0916145b8229fc4407fad2807a3aecb2,2024-06-06T14:17:35.017000 +CVE-2024-28995,0,1,7f6bfacc6577e5540c3ea3c9fa39d7440addd0797be30b15d88a9d1a10d16e9d,2024-06-11T17:47:22.867000 CVE-2024-28996,0,0,5733b25206f61033b9bade6885819d3353d454454ea3290c2e7bb4df83194bba,2024-06-06T16:23:24.377000 CVE-2024-28999,0,0,8142c25b2df2d4f55e39892799d51906cb31dd92ce22593b3f501719bcfc487f,2024-06-06T19:06:50.923000 CVE-2024-2900,0,0,a407b1858236d84c8f3b34f7314a68104abd6fc43c858c1e78b5ff160bd6a726,2024-05-17T02:38:36.333000 @@ -247634,9 +247644,10 @@ CVE-2024-29053,0,0,05b2ced48c9a73ee3ddfa76fc2da3cb9383fdb4866ec428f8606faa625ca9 CVE-2024-29054,0,0,7b9fa4160b35e493f166fbab02079f8b7309b07e480b54a2b83db4c52d24e22f,2024-04-26T15:59:00.880000 CVE-2024-29055,0,0,808635aa5b8e36d546a48cffb1a289dd060093a103ade4d8f54d7fc09e4cd121,2024-04-26T15:58:48.473000 CVE-2024-29056,0,0,82c4eeb84f591e37e38e666909386b7e618d15d7e5328d971904ca4eca3d8112,2024-04-26T15:58:19.617000 -CVE-2024-29057,0,0,1a7d236424310c38bf79fff65250ee548fa2fb68d692d6ba086f9244a484a161,2024-03-26T03:18:48.760000 +CVE-2024-29057,0,1,e3fa93bf6a4b50918bd06f45579666036581b79b8850f2791ac4719e113d2b62,2024-06-11T16:15:24.533000 CVE-2024-29059,0,0,d93ec606be992e55fa01c28ef1ad5d3cf38a06f675d6b6e016fe3fa040aeab38,2024-04-04T22:15:09.033000 CVE-2024-2906,0,0,7907d5a5cd3460f6f133374b708901f61c1d81fd1b49c6a2c33ea92916afc2fe,2024-03-26T17:09:53.043000 +CVE-2024-29060,1,1,4d6e85722a3f2af4978a9ed5fafafb1c1e90a8457be9ff28b1cb528ab21e095b,2024-06-11T17:15:51.383000 CVE-2024-29061,0,0,a31dff802cf963e2879fb3cc29c95735e93be72849d5c1e87c5d3416671642f5,2024-04-26T15:57:55.730000 CVE-2024-29062,0,0,1d53838ab94a7d925862a1a5153e7725a52f2346542bc98f0648bd0406cc991a,2024-04-26T15:57:33.763000 CVE-2024-29063,0,0,9dd92692e86c18107436ef4a5c609dee7af8a065ae51bf02187ee7cc8285048a,2024-04-10T13:24:00.070000 @@ -247711,7 +247722,7 @@ CVE-2024-29149,0,0,0a051cd70f444c7f076a038ef5a239651e0124faf2741d58016b91f08f7da CVE-2024-2915,0,0,964dabbde545b1ee227255a721578c284dc9872f1078b9295a9169d877ce4d6c,2024-03-26T17:09:53.043000 CVE-2024-29150,0,0,062126a35544b774d6fb58afd2d590a447c3aac593c727f888b79a1635063392,2024-05-07T20:07:58.737000 CVE-2024-29151,0,0,ef852a662e1eaee7e15d971ee7451f2c3e954b3d808a30cb9a36bbe68bb24c8f,2024-03-18T12:38:25.490000 -CVE-2024-29152,0,1,189b86c93f2fe93053ba0630a27ff8b98a57684ecb9af8b920838f7be73330a4,2024-06-11T15:14:57.847000 +CVE-2024-29152,0,0,189b86c93f2fe93053ba0630a27ff8b98a57684ecb9af8b920838f7be73330a4,2024-06-11T15:14:57.847000 CVE-2024-29154,0,0,dab131c9ff393e828252009730d8617a5e1a4fb5cfb7f2db054056bc6f27c2ba,2024-03-18T12:38:25.490000 CVE-2024-29156,0,0,98cbc37d07cb77607ab83580cc50ba5a01141613b7a3bb770966a3d6831e2326,2024-03-18T12:38:25.490000 CVE-2024-29157,0,0,0ffca9c85400879d2350f7e41592fe36ba7fd13fff06f556ca5f1be60327b7a3,2024-05-14T16:13:02.773000 @@ -248162,7 +248173,7 @@ CVE-2024-29983,0,0,fcb26f8ef908d69f46c133d47f6fa7f3c86c8dbeb0e9e8f0c2b6960da90e3 CVE-2024-29984,0,0,c8eb19615edacf6092478fb2ad2d94260f928e0cc536a406011e5f52cd4d7b56,2024-04-10T13:24:00.070000 CVE-2024-29985,0,0,2e01df5251c981f52737c67be1729569718fa94485a3bfe706db8d88b47a628b,2024-04-10T13:24:00.070000 CVE-2024-29986,0,0,17685573c9412982552fc59dab43c7536712413b6d2f8f6b1273fa11c65f6435,2024-04-19T13:10:25.637000 -CVE-2024-29987,0,0,adba20360691580b8958ecc80367473d11e02ecf451d89a259de346ffeb4490a,2024-04-19T13:10:25.637000 +CVE-2024-29987,0,1,3573627c2ff244f2cb9e4bdad8b63accfe51c2fb4ec9a275c0c75f01626ac532,2024-06-11T16:15:25.047000 CVE-2024-29988,0,0,eaf2d772ec94145334adcb8db67ab7a5bf7b2094338217b8f25aa965ef678736,2024-05-03T16:13:41.277000 CVE-2024-29989,0,0,8f06390ede228924078f3e71f278dc13caa7b29bc7a43dd5671d47700d642746,2024-04-10T13:24:00.070000 CVE-2024-2999,0,0,66188d89d7d084310719b745c980d492c6cc053998ad2cc3ef073d46cef269ec,2024-05-17T02:38:41.973000 @@ -248229,8 +248240,9 @@ CVE-2024-30047,0,0,a16ad63d5d65e979e4fb3136a9b2924c691cb9bb342b22f13bb2e77735d03 CVE-2024-30048,0,0,19454ae52a49c8972e004882e04340414e10f4c7350c7410cb4f6b5255ae0558,2024-05-14T19:17:55.627000 CVE-2024-30049,0,0,c9b68946c51550d1d84d266d8b5652717f9d8c71c9ece7fbafddfc1dbcf97fbc,2024-05-14T19:17:55.627000 CVE-2024-3005,0,0,3c8eaaa1feab3a9dd15a4bb7ad0f233dba19b722fe013443779e312c69c376cf,2024-05-02T13:27:25.103000 -CVE-2024-30050,0,0,4406318bb6d48968dc268ecc819d76d72c3b7116d509d76ef49b84e453f6ae42,2024-05-14T19:17:55.627000 +CVE-2024-30050,0,1,046221e4f9bbadd6d8ff30d6621a0c15596646e6a7436f074bd91a44ad741c8d,2024-06-11T16:15:27.137000 CVE-2024-30051,0,0,4ac4285f8006cbbd83ffbb55080b4ef3b305ba722d6583b382438526b24254f0,2024-05-16T20:27:22.830000 +CVE-2024-30052,1,1,80ee0422a9d8a8d2a52a2f06a47e7e41e7afdfed676d1ac6b2d67c84146a434e,2024-06-11T17:15:51.600000 CVE-2024-30053,0,0,de0d3887ecd8088140dfe95e3f9311cc6a39bee41667e1f60a9fd1f03b4a7c20,2024-05-14T19:17:55.627000 CVE-2024-30054,0,0,4bef1769b874d4ff9047765ac17cb428233424000152b0497aba8ed1ea3cade9,2024-05-14T19:17:55.627000 CVE-2024-30055,0,0,3c1bf54fd3fe6c5ab3703162f359c88c3cd7915d8f1fdb651cdd28bec89280a6,2024-05-15T20:15:11.047000 @@ -248238,10 +248250,47 @@ CVE-2024-30056,0,0,9eabc96ede995114869bb3aef4380d7f915e132e425ada2ef8ddea79edd8b CVE-2024-30059,0,0,0e87263445f5c97fb9a9f1ad7d5045c3390ca52e934287a08ee2b0f2dd5a42eb,2024-05-14T19:17:55.627000 CVE-2024-3006,0,0,a3349f2fae283580197c9d70e5010e27f73c2425a5df8de3e4af5a848c49e4b6,2024-05-17T02:39:40.117000 CVE-2024-30060,0,0,2d2a2a35846e7a2325ed3d83fd6e93b127058a9b2ed174c7bcd985716e44cfaf,2024-05-17T18:36:05.263000 +CVE-2024-30062,1,1,df5270fa3dd55c38f11802b191914199987faa9610fcf86214a29fd61d317806,2024-06-11T17:15:51.840000 +CVE-2024-30063,1,1,cc6d8961268d43b5670a500810218a86ebc3629c6a377f572d548799195871d6,2024-06-11T17:15:52.040000 +CVE-2024-30064,1,1,91f5badde37bc04ac87fe7327c61b49bccb4ca7ce9db09b4d198cb3cb2c7e92f,2024-06-11T17:15:52.267000 +CVE-2024-30065,1,1,8bdf01e2e3780bc4beec6c23e7caf670d656790bbcd8f70b37ec7249fe6350b8,2024-06-11T17:15:52.507000 +CVE-2024-30066,1,1,1ae861e13a0a694dfcc1c90cba2a490b240d05e57085cb661c5f8584cec7f9fd,2024-06-11T17:15:52.723000 +CVE-2024-30067,1,1,14535797fcdb090790d7d94daa500373f9b86c9855d43573d56cfbfccca14205,2024-06-11T17:15:52.943000 +CVE-2024-30068,1,1,5b8bd663bac8d80d33bca8a0203d854836ee4a19771f2f0b8f74df7fb7baaa85,2024-06-11T17:15:53.157000 +CVE-2024-30069,1,1,f76e2472a3a805dfaaf31b0dd31df3fc5a92e77e0a3cd538f838151ce3d63b9a,2024-06-11T17:15:53.373000 CVE-2024-3007,0,0,b6f0abc8e1c348ee9d7c4f6997a6bd9bf4e4e4454fbab31e6ee3487fc6b69651,2024-05-17T02:39:40.200000 +CVE-2024-30070,1,1,1853745903aa0d5ac9f3c7a79bc8f6a5451dc613dd2aed05db7d0dad94365ef7,2024-06-11T17:15:53.593000 +CVE-2024-30072,1,1,00d30009f3f1fc226e94779ca93c0f15c1e2d0c4baaa70eb44e1d907a27f4d4b,2024-06-11T17:15:53.910000 +CVE-2024-30074,1,1,78974e40fa6649f7aa6116d93fbb2d6829c68f1130e07f84c6c29ea2e54f69e7,2024-06-11T17:15:54.110000 +CVE-2024-30075,1,1,cb45b1f032f0bda62247b7231b8c8b659b330fcb22cfeb078c2f19caa5f46c60,2024-06-11T17:15:54.307000 +CVE-2024-30076,1,1,dcaba5bc065683f80b98a1989c72a6cea051efe0b468b8f12449e12f18073038,2024-06-11T17:15:54.513000 +CVE-2024-30077,1,1,fd561c7c339b8655ae079619734ef41eff442ab84aaa628dbda914b9919b3b04,2024-06-11T17:15:54.737000 +CVE-2024-30078,1,1,39aa12ef4dd0c17c5fc61ff8c43512e7d441bd50efc833f8c9513df8fce5a010,2024-06-11T17:15:54.977000 CVE-2024-3008,0,0,38114235bd0d847f323f6f6f0b2b45ba228af3f4b3b2140fd5d29a91c2eeeb7d,2024-05-17T02:39:40.280000 +CVE-2024-30080,1,1,6bc33ec6b9862ef6ffa6cf25738c82967d35e659ebf80961f3c8e483611b9279,2024-06-11T17:15:55.207000 +CVE-2024-30082,1,1,0cedf0f69f90844b0d119e4edcdbc3e8db68173e9c3b80b0a0605f6f1978e75c,2024-06-11T17:15:55.443000 +CVE-2024-30083,1,1,29560d17dab386c9c8ee0d6ad7d018c640e5a77611c188ce312aab346412692e,2024-06-11T17:15:55.677000 +CVE-2024-30084,1,1,93d591981c733e062582bc321e6a2423220e12b6fb3619ee884c971110f77287,2024-06-11T17:15:55.893000 +CVE-2024-30085,1,1,c5b54d55938115547f0869a5f1deece3d66cc9167a1504846d45b8baaf7851ac,2024-06-11T17:15:56.123000 +CVE-2024-30086,1,1,4f52dc640342e035b04b709869047d951c77ebc62e88d448162b3d52d73a79f7,2024-06-11T17:15:56.343000 +CVE-2024-30087,1,1,47b531ddf5b324369c89a22a40bfff72c26c1c24f2f72dcc44b9f9cd0c749081,2024-06-11T17:15:56.583000 +CVE-2024-30088,1,1,53a6c3579763b8c4bb5bcc1a48ea4b0332e5124cd5e91447aaf4675d78b4965b,2024-06-11T17:15:56.810000 +CVE-2024-30089,1,1,0c394ecf4b13595e9b41c5d7e17fb29780d94dfc342e2389d5f6e5fb28806b23,2024-06-11T17:15:57.023000 CVE-2024-3009,0,0,45cbb233e1060c020b98cbac0489f2f2b66b5aca9f357b84710ff55551dcc79e,2024-05-17T02:39:40.367000 +CVE-2024-30090,1,1,7252510d0523a5ae7ede869d846d5aa015eb7a1c7b0766e7fce443eca7734629,2024-06-11T17:15:57.240000 +CVE-2024-30091,1,1,b7aa0e7696b3a226420337620b2f206e636fe2712f8dd52978959c87a4569c8f,2024-06-11T17:15:57.457000 +CVE-2024-30093,1,1,164477db43fc0c61bbd7f5427729851a2026b981870a0301cab2487109d37b97,2024-06-11T17:15:57.680000 +CVE-2024-30094,1,1,667e953dda9264fdd063ed19a3c37288dd299e4e6bc8416a211a926cff4922ab,2024-06-11T17:15:57.917000 +CVE-2024-30095,1,1,7f8ae9df6a224b6eca5c388af7eceb5c9b9f89bb43248ddd1fe3451191e3b6ea,2024-06-11T17:15:58.150000 +CVE-2024-30096,1,1,1264bcf9d479c4e04fb329e281133b424e8dbbde4aa87ca9e5e1955db7be4540,2024-06-11T17:15:58.497000 +CVE-2024-30097,1,1,888cc2aadc8c49bd9b8689dc0c8753871763c0187de7a97af688bb44fbd16070,2024-06-11T17:15:58.700000 +CVE-2024-30099,1,1,1c270f8dce7629d1e6b1bc3b6cf4c9e010685c5c30bd05234584aa863dfc3d3a,2024-06-11T17:15:58.927000 CVE-2024-3010,0,0,27666e8ead6e529570139216617bb06d1f8e2b7e342f568fb8736cb62dcd604b,2024-05-17T02:39:40.450000 +CVE-2024-30100,1,1,23eee7d53fdfcd7d4cc119ab7da123d27169b97ffacb063067f2cdedf5e92854,2024-06-11T17:15:59.140000 +CVE-2024-30101,1,1,669f0380397317ad17d0c0807e594ba1811bd49de45e7c24a48f20e56b6c191c,2024-06-11T17:15:59.353000 +CVE-2024-30102,1,1,55981075248d5c10532dc9c13c7fe57d123438ad59eecc336f56b57ceda977c3,2024-06-11T17:15:59.560000 +CVE-2024-30103,1,1,21c371fb9b851e9e2adcca0e2245be24a5156e7ef1cd776f2856210b4f332e34,2024-06-11T17:15:59.800000 +CVE-2024-30104,1,1,03cf59f07c0375686ecb69b3e00e6b33ecd553036677aefd45a95e731ed0479b,2024-06-11T17:16:00.030000 CVE-2024-30107,0,0,7e9f39013645f69ffc09f932047c5fded8481e31de256075b8ab56490f9048bd,2024-04-19T13:10:25.637000 CVE-2024-3011,0,0,1567706f33ba4a3729190a5acfa17d903c76e23445fbf38d371926fb70a5af71,2024-05-17T02:39:40.533000 CVE-2024-3012,0,0,3d13067eee5369169a098d5c023f7c1a68bff1bb4361076791d74ce86fdf610f,2024-05-17T02:39:40.620000 @@ -248551,13 +248600,13 @@ CVE-2024-30480,0,0,9546cbc650c6f7e364bcf65bdd8137d4963e25a2443b4557916c31263a8a8 CVE-2024-30481,0,0,94a32d18bfbbc823703f6bfdf5456a1b5f213d70b5fac58c90292ad00564a9d4,2024-06-10T02:52:08.267000 CVE-2024-30482,0,0,570bede6c16b4a7f5e8b36059aeda7f1a299c81f1153ac528a60791c716caf63,2024-04-01T01:12:59.077000 CVE-2024-30483,0,0,6c48131c3767e81f61ec34b0bc223a59e072c0c0b055c8c0e04f20b2876077ea,2024-03-29T13:28:22.880000 -CVE-2024-30484,0,1,8291879eb926915aa71fe733bc77c6027c18003994727f0663525276fb78a312,2024-06-11T14:54:57.570000 +CVE-2024-30484,0,0,8291879eb926915aa71fe733bc77c6027c18003994727f0663525276fb78a312,2024-06-11T14:54:57.570000 CVE-2024-30485,0,0,c2006605946b1e6a92b45dfc249c3ac3f859dad44d4c16bbd57e01d7474a3daf,2024-06-10T02:52:08.267000 CVE-2024-30486,0,0,3b668ae931cda4b6a387bfa69ea17dffa696817ef5a0dd2b2ba0b8d1d89d01a9,2024-04-01T01:12:59.077000 CVE-2024-30487,0,0,8478a9894c02433324d52a7694bbe43e86c58bc36ce6feb0280d7b18225d7d5b,2024-04-01T01:12:59.077000 CVE-2024-30488,0,0,9fdeb2b805850984cf4d5d3f20362f356c5feecfdc17015a244efcf21ce430a4,2024-04-01T01:12:59.077000 CVE-2024-30489,0,0,a540270477b853fde36fa10dfe995d2d2e2733bc4b87077bcb9c4c6ebae67f39,2024-04-01T01:12:59.077000 -CVE-2024-3049,0,0,025617a1626944000745aec6009532be5e379a27ceb64af19932029bfac70692,2024-06-06T14:17:35.017000 +CVE-2024-3049,0,1,e78ee8e728ebc6db4ff3551761c6705ac7295b18b31f4af59a800726c857dd98,2024-06-11T17:54:22.763000 CVE-2024-30490,0,0,90b7ec0455290f5d2e36c376f09e8aa64ea00d396ba819e3726d0e96e7b15d7a,2024-04-01T01:12:59.077000 CVE-2024-30491,0,0,b49d75f845cb12239329721ac75b384e508f42c19c755d45b7137bd1b7ebec86,2024-04-01T01:12:59.077000 CVE-2024-30492,0,0,d40dabecb8ac11d6b8ece8b02edecd34ab567f2bff5c23fac9f75367d1b0fc90,2024-04-01T01:12:59.077000 @@ -248595,10 +248644,10 @@ CVE-2024-30521,0,0,831f25d28a4eccbee0c9a477ea2d8542d4b6a09da45b2ed1bac270363725b CVE-2024-30522,0,0,52231b69f26c5a58b4ea5de11a6776cc3a49889521ce951fb83a4aaa3cf9a331,2024-05-17T18:36:05.263000 CVE-2024-30523,0,0,0cef256089f66b1e0cf2f5994c8e2a08b4afb817483e2b78f98835367339d575,2024-04-01T01:12:59.077000 CVE-2024-30524,0,0,3f617e1e45b1122d6b1034d70f29ff7cb7551f904c4e8a57e14430a05ec497b2,2024-04-01T01:12:59.077000 -CVE-2024-30525,0,1,be9f5e16a92e02200b399854cdc7fa9e1eaff058cf4f293bcf54d3db66cebc6f,2024-06-11T15:22:30.403000 +CVE-2024-30525,0,0,be9f5e16a92e02200b399854cdc7fa9e1eaff058cf4f293bcf54d3db66cebc6f,2024-06-11T15:22:30.403000 CVE-2024-30526,0,0,104d793a66172acd99ba27a22d83ba8e2d51aa54cd9b15f3bc6afe8a835c5254,2024-04-01T01:12:59.077000 CVE-2024-30527,0,0,27e4c5629e352d9d487ea96a5699b7f5113e11cf1c874e376c67a5c6e270b939,2024-05-17T18:36:05.263000 -CVE-2024-30528,0,1,e14611b6d427b0866568e10b700821c9f3e6cf209895d65314dbd01463890752,2024-06-11T15:20:20.633000 +CVE-2024-30528,0,0,e14611b6d427b0866568e10b700821c9f3e6cf209895d65314dbd01463890752,2024-06-11T15:20:20.633000 CVE-2024-30529,0,0,cbd35703b5d49df168c27bc72c69a9792d2c9ba8d3afe3079b688a8091f8a5f7,2024-06-10T02:52:08.267000 CVE-2024-3053,0,0,229c354cd3a0cecb51dd999b0e615993d2b674b0536a00d5050bf9c52ceb3ac1,2024-04-10T13:23:38.787000 CVE-2024-30530,0,0,dbaedca63c2d0063e70329af2f2e13f2d8eb98748a64909895cfdcfc37f36d33,2024-04-01T01:12:59.077000 @@ -249208,7 +249257,7 @@ CVE-2024-3149,0,0,1cacbb29f9ddcc59e6c60c0392e5807353110e97934b561ed3eff00ed3bff6 CVE-2024-31491,0,0,5f002356f8390a8ec883fdc05cbd199fbc913871302dee308e6ee0aa04c7ac67,2024-05-14T19:17:55.627000 CVE-2024-31492,0,0,a251126d380ad734bdcae40155276c0c8cd0f78c057d6c232814179759c90bf9,2024-04-10T19:49:51.183000 CVE-2024-31493,0,0,eb75479adef565517a6f58901095a4369c3b19ffe56c2adb7b05f607202960e9,2024-06-03T14:46:24.250000 -CVE-2024-31495,1,1,65bee0964c82fe42ab91ea314716f922a35b1d4836c1b06c26fe44a1f7fe0d23,2024-06-11T15:16:05.697000 +CVE-2024-31495,0,0,65bee0964c82fe42ab91ea314716f922a35b1d4836c1b06c26fe44a1f7fe0d23,2024-06-11T15:16:05.697000 CVE-2024-31497,0,0,4e1eafb2dcb4144981ef085a5b8158282c3a0977a083d73fc04d3f981acbd1e7,2024-05-10T14:33:55.323000 CVE-2024-31498,0,0,db3c4e2337e3fccc66e084ef6016d8532925f451bef4124b0c2782f0c54d90b6,2024-04-08T00:15:08 CVE-2024-3150,0,0,04068d35bd188e4cc82c8fa2f28c620f46e70084f017d1c4b8736ac9a757cf54,2024-06-07T14:56:05.647000 @@ -249553,9 +249602,12 @@ CVE-2024-3214,0,0,d9b62addfa853a8ede1a8dcf4e065081d1f9021a8cffa0357e41cb2e91733c CVE-2024-32140,0,0,25ce82707bac814bfa60dbd042d77eeb2e77d40673480a75309bcbecca8ba7aa,2024-04-15T13:15:31.997000 CVE-2024-32141,0,0,d919f1f06e8f9dddc68864df4d4cc49a38b5318983c1cd8a09580919ead44629,2024-04-15T13:15:31.997000 CVE-2024-32142,0,0,6527294419dba4441d202eb43f0e9b5783b62406846adb69f607b9707a7db2e7,2024-04-18T13:04:28.900000 +CVE-2024-32143,1,1,778a24bc41f4944562851ff8ccc8454ee664a4bf31b2fb78f2739ca3e8e859c2,2024-06-11T17:16:00.257000 +CVE-2024-32144,1,1,3ed68f42f22994c46f66a83e342fb2e14018e7117dcf10490a3bc8d62304b5d6,2024-06-11T16:15:27.467000 CVE-2024-32145,0,0,46f82be3b79b18ba25f2a9e0fa1663c301fc655d81936963a35db2da93921f80,2024-04-15T13:15:31.997000 +CVE-2024-32146,1,1,cdd76316823e445cc2cc3d785ca5acb3f7ad5a6a5a594070d6dcfe0d1ad2a85c,2024-06-11T17:16:00.490000 CVE-2024-32147,0,0,221f8d37c746fb10439627f9391d23954c77e6687fd4a296059e2d8c0758881a,2024-04-15T13:15:31.997000 -CVE-2024-32148,1,1,fb62b018e93b800fda68f12b26797fd49ef836357cabed9261301de5da79828b,2024-06-11T15:16:05.933000 +CVE-2024-32148,0,0,fb62b018e93b800fda68f12b26797fd49ef836357cabed9261301de5da79828b,2024-06-11T15:16:05.933000 CVE-2024-32149,0,0,12d107e3c0999cbcd27b2d933b885433c81cf0faba3d46ab08b4e66fab365309,2024-04-15T13:15:31.997000 CVE-2024-3215,0,0,87550ed88317242f35b56ee440b2ef3ddf4431fdfdb3fabb22af72583d7166cd,2024-05-02T18:00:37.360000 CVE-2024-3216,0,0,aac88e798ffbdaddd62ae90ecbece12fc58351de061defd8cac2a138eea1c35f,2024-04-08T18:49:25.863000 @@ -249701,7 +249753,7 @@ CVE-2024-32460,0,0,20552f6de71f0b398e9222f76782f99f03ea9e79ba57eb14011e06f97425f CVE-2024-32461,0,0,3941d8bd271b020582637450c6381a991de4b9ffa39f4db030841834b9e2af51,2024-04-23T12:52:26.253000 CVE-2024-32462,0,0,5d7e199d9ef87a9ead0aaa6e45da944ead2c54f7c8bd33536b92a885a6b7e6b3,2024-05-01T18:15:24.140000 CVE-2024-32463,0,0,1671e195c4973ac11a31a2856358d6fb78fc6f39ffe0d1d851cfbba7a397b723,2024-04-17T16:51:07.347000 -CVE-2024-32464,0,1,d64afe641f7795bed40e9f07611c1dfe8212b69350ddb9db2c6c76fe5f6eb6dc,2024-06-11T15:24:13.467000 +CVE-2024-32464,0,0,d64afe641f7795bed40e9f07611c1dfe8212b69350ddb9db2c6c76fe5f6eb6dc,2024-06-11T15:24:13.467000 CVE-2024-32465,0,0,72368e2fced251b24ad6ac0b54ac8e4fa0f17b4b9b17bd69f79401711f40cae6,2024-06-10T19:15:53.607000 CVE-2024-32466,0,0,db7f064bb346349536bc1029a9138c718e3a99de40435ac8076a2153a72d304b,2024-04-18T18:25:55.267000 CVE-2024-32467,0,0,c3595d52e60c3fa31f1ede27ca8549a3938c2ca59fe6ab3708d95e8b6d1a0b5d,2024-04-25T17:24:59.967000 @@ -250633,7 +250685,7 @@ CVE-2024-34049,0,0,659b6c20c375fc6a98cdfe826f7b991bd781b69ca08f703cc4572e5c76f88 CVE-2024-3405,0,0,168ec7f9b410ce208cd59ad1ea840c83def6fd83f8512f3bb62051f5ec3a0bc0,2024-05-15T16:40:19.330000 CVE-2024-34050,0,0,12266ec53b888a39d080cf759ea4efcf86e297f4b6422a5e48e41cdfdabd201f,2024-04-30T13:11:16.690000 CVE-2024-34051,0,0,ac84f2fd7dd43d4574139c8cf26e6f74ad2fa41e2254272b15b5513f0e198e55,2024-06-04T16:57:41.057000 -CVE-2024-34055,0,0,342087935d71513f5f819d0b21bd3c15e0dd2d288e95ac6605bba0a0993cf3fa,2024-06-05T12:53:50.240000 +CVE-2024-34055,0,1,5a626d4bb045489bd8f4f2bbeb28cb895c012d3fca56272f22aa82965f9dc7c4,2024-06-11T17:16:29.167000 CVE-2024-34058,0,0,859a5867c3261cbc3116f378e08c5280a9474e2ad72a0c908fe3c9d61944df2b,2024-06-10T17:16:28.297000 CVE-2024-3406,0,0,b05755db76fca4314b8e99a4179a31010371036c16427145226d1ec275309899,2024-05-15T16:40:19.330000 CVE-2024-34060,0,0,3a924f7009b7e35c5ed89c1ddd4a1ea338a526dc659a3f0f832e02177cf8d5cd,2024-05-24T01:15:30.977000 @@ -250782,8 +250834,8 @@ CVE-2024-34359,0,0,8124540499a05b0ae56417d92c95f2c1092a142d066f0a2c88754c29bb36d CVE-2024-3436,0,0,47938f028efbd5a916031b117de2f518314782f5c4fcf16b7aa7adbb5fd17b59,2024-05-17T02:39:56.003000 CVE-2024-34360,0,0,0ad44819f037cf6808a009e3ee50b0cc9c0e6bc33d51dc0f0dc5cede981b49a2,2024-05-14T16:12:23.490000 CVE-2024-34362,0,0,73b224c14c2ee2692dca9efe0755d685cb7c38293ca04c5290c25f3b48c998d4,2024-06-05T12:53:50.240000 -CVE-2024-34363,0,0,f4565e1faf4a046be5fcdaa5536b0925068fc5c3e6e022635b235fdde035c441,2024-06-05T12:53:50.240000 -CVE-2024-34364,0,0,b1ddffdea6c2fd2391771a4147b7ed73c4e2ab935ca310c3f597f6c1aa014abb,2024-06-05T12:53:50.240000 +CVE-2024-34363,0,1,e424d02198ba81afecdf7473d64fd90fdca7a84cb332545f43974e5deb2cea51,2024-06-11T17:44:14.347000 +CVE-2024-34364,0,1,a28d726279ae5238a51ba6bff74af368e2bacccb011592d49886d31f372fa74b,2024-06-11T17:20:27.203000 CVE-2024-34365,0,0,a2986f726c0f5985b77185811a7bea47c5a4328309ca8dddd21c0a9f0542328c,2024-06-10T17:16:28.927000 CVE-2024-34366,0,0,25eb851eb2f231dff6589bef7d2a42ccb066a9937b2c8dd9550db97a42376bab,2024-05-06T19:53:38.797000 CVE-2024-34367,0,0,71d4be6198e4635d1e3c7d4a37f4152439ba7ccd61f31e7e76f4c81875c262d4,2024-05-06T19:53:38.797000 @@ -250858,7 +250910,7 @@ CVE-2024-34439,0,0,067793c2d3fa6bd001f4f073ac72cf3c1db18509629ca30b4b6ad7370a6d6 CVE-2024-3444,0,0,3fed8f12f167e44fb217920a0e1abb084d18b4e359c74e2e2177b70a7af8a275,2024-05-17T02:39:56.740000 CVE-2024-34440,0,0,b35781b3e55750c4237f59d181884e306cdb8e92ede962cf40ae2ebd986a22e4,2024-05-14T16:12:23.490000 CVE-2024-34441,0,0,30a4318e62907426b3ab700c3b20e4f834f59441ac7ba3bdfe737a2f9987193b,2024-05-14T16:12:23.490000 -CVE-2024-34442,1,1,5d8e2c9cd3b314beef313145e20113d1444aba602fe8ba21c518697fcfcd519e,2024-06-11T14:15:11.803000 +CVE-2024-34442,0,0,5d8e2c9cd3b314beef313145e20113d1444aba602fe8ba21c518697fcfcd519e,2024-06-11T14:15:11.803000 CVE-2024-34445,0,0,5ae9c8efe1aaf47848c5b15a6687968aa01604c93efb870985c96be2737d2fc7,2024-05-14T16:12:23.490000 CVE-2024-34446,0,0,b445bdbcee2357cb0b4db1ab10e64a435c89bc8ae1d2fa2a306f3117c07625d0,2024-05-03T15:32:19.637000 CVE-2024-34447,0,0,7d0c1160e9ad74b2f0d138c65d27109e83600e38ed8d60bf74a510fb61e6f980,2024-05-14T15:39:08.297000 @@ -250992,19 +251044,23 @@ CVE-2024-34749,0,0,fe5f41bd42e695276d38161b9a2d636fec6ebfca2120aa0bc8cb065f0e443 CVE-2024-3475,0,0,e528ec7d5c8727ea0d98d659186b040308d5844df7467319e5b573505cdc6e7c,2024-05-02T13:27:25.103000 CVE-2024-34751,0,0,3bc824c76b005bef3c5502f774f511888cffc942b3953fc4e78f3f0d8ad9e615,2024-05-17T18:36:31.297000 CVE-2024-34752,0,0,242ab90c6a96e91b737168caac935dedcfed36964913472cce8df4bff8adef50,2024-05-17T18:36:05.263000 +CVE-2024-34753,1,1,2a124c7359ea38889077c0f5457490688ac5e22393a2f4470fe574cc1574e0f9,2024-06-11T16:15:27.760000 CVE-2024-34754,0,0,7a231a59dc0569fe66ac3d86d36f598d4a2502916798badd2d696d6fce4a6867,2024-06-03T14:46:24.250000 CVE-2024-34755,0,0,d9d093e244bdb9881814a581fcf0cceddc50257ae74dd4a27a2c1f59b6cdc217,2024-05-17T18:35:35.070000 CVE-2024-34756,0,0,c1f51cb5304487e29b0a4c8a67e9d115a4f2b56ac322e60a8774a285c457e7c0,2024-05-17T18:35:35.070000 CVE-2024-34757,0,0,57042a3bb13f31e69b5b7fd23a19541f4fa2fb8db07ba9037fc775417523a9d1,2024-05-17T18:36:05.263000 -CVE-2024-34759,0,1,94a06dd6ce653ef742fada2672e8f87bbf61dec16c170a7d5b4cb0e5f3eb26a5,2024-06-11T14:27:17.887000 +CVE-2024-34758,1,1,1aa29b7ee0068abe6bccc4a7760d405084795ad5b27eb421ebd9a84acef30dcc,2024-06-11T17:16:00.717000 +CVE-2024-34759,0,0,94a06dd6ce653ef742fada2672e8f87bbf61dec16c170a7d5b4cb0e5f3eb26a5,2024-06-11T14:27:17.887000 CVE-2024-3476,0,0,8d55e08f53225fd62245e2332fbccfcb740f72480e60e1d515618aab26b24582,2024-05-02T13:27:25.103000 CVE-2024-34760,0,0,82a83a3179457fac7a33034fd056c2efc13c1726662f893ecd6b003877ae591a,2024-05-17T18:36:31.297000 CVE-2024-34761,0,0,f8fe8d5517922dbedfd67ce7277c0e037983bd37144d5472b324497a04122fe2,2024-06-10T18:06:22.600000 CVE-2024-34762,0,0,5b1580eac007c2e73cf3215315fbf31688e1e3c2ba9bd07823ae2a4b321bdd45,2024-06-10T18:06:22.600000 +CVE-2024-34763,1,1,92c768a77dc262abb172601fc06e3aeff8dde713c58c7b46545450305cf69cef,2024-06-11T17:16:00.950000 CVE-2024-34764,0,0,e24f3b86b2bc8be28aa6321af67be0d45469b15d3915cbb46bc5e281003ca46b,2024-06-03T14:46:24.250000 CVE-2024-34765,0,0,aaa76ac78fe08a5eee829cb412c29f68e4c65defd4b658e8f2b647298abd2d5a,2024-06-10T02:52:08.267000 CVE-2024-34766,0,0,2293ffac3449ef1ecabec995fb5414490a2b1124424c491c241ec0595015be64,2024-06-03T14:46:24.250000 CVE-2024-34767,0,0,7caf2eae117eacc9dee625f4ea1574868d5ff2da675294817d495e2702767bac,2024-06-03T14:46:24.250000 +CVE-2024-34768,1,1,c20e77ac1be8334f1eedebb0e8131358e4e59142321d65098f28218e3d040702,2024-06-11T17:16:01.187000 CVE-2024-34769,0,0,73ed99df82f39db71ecd24a6c897586450bea956229a7b82e516212429882112,2024-06-03T14:46:24.250000 CVE-2024-3477,0,0,06132a9cebdd48f3a85c9e2194776daa64e508210471c8ba503616346531ad67,2024-05-02T13:27:25.103000 CVE-2024-34770,0,0,629ed46c37fcd7d6e4f87bae171dde215c1619cb09f814f13b0c4304a96ec3db,2024-06-03T14:46:24.250000 @@ -251023,11 +251079,13 @@ CVE-2024-34795,0,0,818859fc7bb28095954c5208c0ae6ed7cead72123bec978fb6ba7fba28213 CVE-2024-34796,0,0,5f82fed8dbb53d40c51e6e81e35d990c0d96b1ce34696991135e3c960e1b6ae6,2024-06-03T14:46:24.250000 CVE-2024-34797,0,0,cf396b1b8577b4bd0c748175260c813f43f5827b156e3d0f0af7ad04e63707b0,2024-06-03T14:46:24.250000 CVE-2024-34798,0,0,6d770a55bfc357f6f232a0f0b39ad44e4cb20dea0c406817afd6955b6b153194,2024-06-03T14:46:24.250000 +CVE-2024-34799,1,1,1971757cc9f4882bd9ded26fb2ebf46c18b5e2e360d9416027b67def4556bcbb,2024-06-11T17:16:01.430000 CVE-2024-3480,0,0,efd268116762f9a268444b69dedc6b75682706697867d3d93c2c71f376810267,2024-05-03T15:32:19.637000 CVE-2024-34800,0,0,5829b683a722e44a01fe99f869c746d7a1b0aed64287538c19b8b7ce8283c125,2024-06-10T18:06:22.600000 CVE-2024-34801,0,0,0b1a4ab0468bb98a950b8edf087ff2c536030eeba11e5be47337600f37c39c40,2024-06-03T14:46:24.250000 CVE-2024-34802,0,0,80dde3def1c54a8becd61c4c4637dae0f32c8e664aae233049a3e23fcf0bc2c0,2024-06-10T02:52:08.267000 CVE-2024-34803,0,0,3bacd90aafced0596a908c7bddcf15434c904fd7688d7a7dfb5d78f5281cf184,2024-06-03T14:46:24.250000 +CVE-2024-34804,1,1,d85337307a889744c6ddd3427fd6abf5fb6183e204f7743d57a36c0b34b445fc,2024-06-11T17:16:01.683000 CVE-2024-34805,0,0,4db06c40a60d0ea9fc68ae0b74b3d16b7df09b33205e3b40409d2383df796279,2024-05-17T18:36:31.297000 CVE-2024-34806,0,0,3b1b6563ba887546de6e8afcda84fbe0c4e88d6cd4a9afa2164171d94fd3a99a,2024-05-17T18:35:35.070000 CVE-2024-34807,0,0,1b210e8fbd98db6886fdf7153f61122f9d59a5653f7e82ad43004bb026f58b60,2024-05-17T18:35:35.070000 @@ -251038,15 +251096,19 @@ CVE-2024-34811,0,0,6afba0d787dbcfbbd66965f2fd829a9e346c05027e62405f08f4e435218ea CVE-2024-34812,0,0,7332a043c47768e371dccefcc80daf8c8275382c0e6daacd34a29bf101c857a9,2024-05-14T16:12:23.490000 CVE-2024-34813,0,0,70564b11bb7588eaedc70ac81e58caae5b31e82d0793dc0d9b9453776028b2e4,2024-06-11T13:54:12.057000 CVE-2024-34814,0,0,34cbbae6aeb01a772f60554504bc6e01ce847a8db4ad2b42166fcd225be8327b,2024-05-14T16:12:23.490000 +CVE-2024-34815,1,1,d96ef6a55cc1b07f9c71008a23d80d5d579b621a5076df64bebcf4a6af89a838,2024-06-11T17:16:01.903000 CVE-2024-34816,0,0,c86f09f5b6df0ab5767a3540a3d509e837dd58e2a13c7b355c2063ae6628c327,2024-05-14T16:12:23.490000 CVE-2024-34817,0,0,e72a990c38a2dfbe11c6e9d962ed0b70897729a9cf87938bc1fef897bc3b6f5d,2024-05-14T16:12:23.490000 CVE-2024-34818,0,0,e3376b6555a288bbdad3b49fe0178ef6ca800cc1c1be6b7e8df95cf87a9eaa72,2024-05-14T16:12:23.490000 +CVE-2024-34819,1,1,a9879f74bfa97e9b54689f8e3b17fa10a9a5fd4b7856811e62d861cc80e9e50e,2024-06-11T16:15:28.010000 CVE-2024-3482,0,0,38625f37a4fd1aa25281614b562f89afdf99640d1ed501b93fb9d4443ca4f1ff,2024-05-20T15:17:54.513000 -CVE-2024-34820,1,1,6995830c542d9cd56b07357d78ad2ccbd069ddb7af940ab7cecbdd8145d72046,2024-06-11T15:16:06.550000 +CVE-2024-34820,0,0,6995830c542d9cd56b07357d78ad2ccbd069ddb7af940ab7cecbdd8145d72046,2024-06-11T15:16:06.550000 +CVE-2024-34821,1,1,9543535b6c6b7f9cd2446c71cc1a9fa4ce2553ccd96b9fa1451f54cfef54cb2d,2024-06-11T16:15:28.280000 +CVE-2024-34822,1,1,e6a611e657c4511cc68579728fbea4376c127bfe2ecc853676e4c866ebd08a10,2024-06-11T16:15:28.563000 CVE-2024-34823,0,0,d929c848218322d618bf8ede9d3d9fcf901afa85d8a738309847a91bc4855249,2024-05-14T16:12:23.490000 CVE-2024-34824,0,0,e4146409127ec2d0a7cdf5f761d3161eec22b8748ae2dbbf102caca037dfbe44,2024-06-11T13:54:12.057000 CVE-2024-34825,0,0,da4c9ce510f00e0a854bf235f0a803bebe7336aa5abd8cd7cbf31f6e4dc546a5,2024-05-14T16:12:23.490000 -CVE-2024-34826,1,1,d63eca80cdb0a7714d5c0f264ac17d37311934f0f7fc99b45b1f08aaa11f01cc,2024-06-11T15:16:06.803000 +CVE-2024-34826,0,0,d63eca80cdb0a7714d5c0f264ac17d37311934f0f7fc99b45b1f08aaa11f01cc,2024-06-11T15:16:06.803000 CVE-2024-34827,0,0,967f2d32afb0b2dfaa20d1f45e0df3e21389d96466bc0e3abad227fc206b40cd,2024-05-14T16:12:23.490000 CVE-2024-34828,0,0,7605aa3bedb5fc5d707a6b481c1cc91c79f17545427a53b88cbe66a14822c076,2024-05-14T16:12:23.490000 CVE-2024-3483,0,0,f497cc0f9f7ed97ac693fa9f9e6ee9a3d8c1c00c57913a6c4140ae3ca9834d87,2024-05-15T18:35:11.453000 @@ -251149,7 +251211,7 @@ CVE-2024-35162,0,0,096de883de595ba1679c139890301da91a94c85a87a466687ddcd8baf8fe1 CVE-2024-35165,0,0,caf63944f08ce101dd14e275b41e5ef9dcf2b386ad9b4bb6b8d83ed28c45d5eb,2024-05-14T16:11:39.510000 CVE-2024-35166,0,0,8ef2b403e9c48e4a4c024d735641311b572c06042563d6935a498ffc36d354df,2024-05-14T16:11:39.510000 CVE-2024-35167,0,0,707fca1965b4ac023356c4298b7124cda01865ae652da18c57d0faf52468a1cc,2024-05-14T16:11:39.510000 -CVE-2024-35168,1,1,d8d0899a19476c528a6ef6d92e01e2e38542d43aad7a2a3544d4d92d9ae52e07,2024-06-11T15:16:07.043000 +CVE-2024-35168,0,0,d8d0899a19476c528a6ef6d92e01e2e38542d43aad7a2a3544d4d92d9ae52e07,2024-06-11T15:16:07.043000 CVE-2024-35169,0,0,a8e2b418ddd45c8ef87d52708bd14417c553f59d07f681be2460149df02332d0,2024-05-14T16:11:39.510000 CVE-2024-3517,0,0,0f60638f190828e04eaf5395050e0e077de3e2fcadeb116eb7a438acde5d1056,2024-05-02T18:00:37.360000 CVE-2024-35170,0,0,7df42f4aa7c011fe44b77890f5ab9d839a7068d8e3779c58faf7c34da95f67b3,2024-05-14T16:11:39.510000 @@ -251205,7 +251267,7 @@ CVE-2024-35229,0,0,5ee88facfa68247ca9de07dbd334e85c15f8a3e466794415d20f2550dc151 CVE-2024-3523,0,0,154d27d1d83a25b71ff1e934ce7ae9d9233e3d50ef1f8829c89abcc116ac6a21,2024-05-17T02:39:58.793000 CVE-2024-35231,0,0,f8530b660fb5fe1a3f6068301d0584388b48db3deb576b79e05a1ef5783b526b,2024-05-28T12:39:28.377000 CVE-2024-35232,0,0,e11d112dbb50bd6ac52fe1023c1686a96b37e3a0e6e89d4fb71dc8ea03458586,2024-05-28T12:39:42.673000 -CVE-2024-35235,1,1,e26cf08ae88d24a343d5b02e202f0f8b8bd1cd023138525214f40b80fa42b030,2024-06-11T15:16:07.473000 +CVE-2024-35235,0,0,e26cf08ae88d24a343d5b02e202f0f8b8bd1cd023138525214f40b80fa42b030,2024-06-11T15:16:07.473000 CVE-2024-35236,0,0,9c23a184eb48860f429493171a4c62809168210276bc2ebf0f78566d7ec88f75,2024-05-28T12:39:28.377000 CVE-2024-35237,0,0,27687b26a7b23ba1ab2f1369afb101a3e55bbdfed6512210bc15966acab9b92b,2024-05-28T12:39:28.377000 CVE-2024-35238,0,0,90b2bf17c4613df420698bab76b724ca8e351da1091b572382c658446aa99656,2024-05-28T12:39:28.377000 @@ -251214,8 +251276,17 @@ CVE-2024-3524,0,0,3956193ca7114f5710505c19e3a759f29fdc99e35e3e85d2dfaab62815660b CVE-2024-35240,0,0,acfeed6c530b591057353f6a14e986e7e3beca50f19145cd1d7655529729bf12,2024-05-29T13:02:09.280000 CVE-2024-35241,0,0,4810aeff51a7623d77d5675ec66c73269bbbb900db035cd38c0f932297ba47af,2024-06-11T13:54:12.057000 CVE-2024-35242,0,0,9f0317e01427764a67e461556ac3faec3aae4104927f9fa57c236a975ae32b17,2024-06-11T13:54:12.057000 +CVE-2024-35248,1,1,a657fe402edea6cd2261539d1c1ed525d6981210e6683ea084d0f099efbde24c,2024-06-11T17:16:02.180000 +CVE-2024-35249,1,1,50fc3b6f72aa0f10a53c7697bf908a8b6ed7d4a35ebf72440f490dae374fca88,2024-06-11T17:16:02.417000 CVE-2024-3525,0,0,d160b9aacf64da3afa7deea3824b335adab6f10a287b9b570340cfda8c91ffed,2024-05-17T02:39:58.983000 +CVE-2024-35250,1,1,6b6b5e00e3c66543c0f8e44e068d0e1696490bb28fb2400c72671330591a8b91,2024-06-11T17:16:02.650000 +CVE-2024-35252,1,1,4eabcc2c7a355aa524146e63b902d88710f6ef5804f567f6c797609456623dae,2024-06-11T17:16:02.890000 +CVE-2024-35253,1,1,7ced7342c03eeaea3d2d11b94ddbdb444c1b02c134235b10f6c86fb7481f798a,2024-06-11T17:16:03.130000 +CVE-2024-35254,1,1,61d5f896fec6aeae12377c03738f333e00d4d01e254cda34d12f99594807b478,2024-06-11T17:16:03.347000 +CVE-2024-35255,1,1,e2d7bb11ca096e8fdaada80a1b8c55c16db190e19e86f059341c81fec8237f99,2024-06-11T17:16:03.550000 CVE-2024-3526,0,0,7aa053534daa29503e740ad77b77cb47be1c8cd5e2a6b1d98f33dcb689c14e4e,2024-05-17T02:39:59.067000 +CVE-2024-35263,1,1,08f542ed0f02b9fc6f6ddc53f190f2466a756fa8763b472deefc143319d0065f,2024-06-11T17:16:03.773000 +CVE-2024-35265,1,1,ae227881ea5f72d98a4ad1d7f60734830c1097fbd75479e040b53a6b50fe0ba8,2024-06-11T17:16:03.997000 CVE-2024-3528,0,0,12c1cd3d931c23013d321f77d84374875132cb3a519f997e82936b57d5eb40c0,2024-05-17T02:39:59.157000 CVE-2024-35283,0,0,80c087b52accf20db1ec4ad086b8699369207093a56ca1d349d7c5f6028bda2d,2024-05-29T19:50:25.303000 CVE-2024-35284,0,0,ee24a2e7de9810383b7ae424a9dbbfe06080409833dff0969376cd49b76d4dd0,2024-05-29T19:50:25.303000 @@ -251349,7 +251420,7 @@ CVE-2024-3560,0,0,66c1a96b1f1d19ab8c2a91f30bb939a8ccde028ecd6951f27029cb1628de4d CVE-2024-35618,0,0,fc2572e9e8823eb6313bf2bb54c527fc11c4117d0d0837dc8f8794515acd3b77,2024-05-24T18:09:20.027000 CVE-2024-35621,0,0,eff37f6109cc46dfb019de6bac1c1e4ffe46087d96bb684a690c4e1a8342c7d1,2024-05-28T17:11:47.007000 CVE-2024-35627,0,0,152f6a140367536a1e62d9a33b0213a3c0edb39ccbba33db112f0915411e954b,2024-05-24T01:15:30.977000 -CVE-2024-35628,1,1,5f5b0545a2a368d4b799cf987612ae3f66aaef5174ebe8a1ef92d1c4b497e4f1,2024-06-11T15:16:07.840000 +CVE-2024-35628,0,0,5f5b0545a2a368d4b799cf987612ae3f66aaef5174ebe8a1ef92d1c4b497e4f1,2024-06-11T15:16:07.840000 CVE-2024-35629,0,0,5e80f8e30b8e7ad09d457f272fe181427a56dad2c38472133e9c4c9c94534324,2024-06-10T21:06:02.157000 CVE-2024-35630,0,0,d2b99481e1d25785f899feae2f2b2deb084dac85df61f77063521999b38c24e3,2024-06-03T14:46:24.250000 CVE-2024-35631,0,0,76aaafff73e321cf015be139fbb8c4627ee4855e04e086f9bf89874f24967daa,2024-06-03T14:46:24.250000 @@ -251384,17 +251455,17 @@ CVE-2024-3566,0,0,e417ef1ceca67d3a9a8ba800520d4a9974bcf4eba2e3e6325dafdfbfe6af8d CVE-2024-35660,0,0,2144517a38c7b64dced7262d27a94b4362008ce987204b48e77a7c0e29f52214,2024-06-10T02:52:08.267000 CVE-2024-35661,0,0,2d422b501b9a5975234a609e4047eae646422cd61bc1fca287004b23581d607e,2024-06-10T02:52:08.267000 CVE-2024-35662,0,0,b238a3b98294aa9e1660b0c0a491615d175586a4d473f0eed4027d86a5a232bd,2024-06-10T02:52:08.267000 -CVE-2024-35663,1,1,252a21e7903380b55959b2e38177bd84fe5a7f660e82496ff15e73033d955bc8,2024-06-11T15:16:08.077000 +CVE-2024-35663,0,0,252a21e7903380b55959b2e38177bd84fe5a7f660e82496ff15e73033d955bc8,2024-06-11T15:16:08.077000 CVE-2024-35664,0,0,d0ccb41b020f67bf412b857dae6270e1516e989b566d9599ae1771894ea37eb6,2024-06-05T20:24:24.730000 -CVE-2024-35665,1,1,3833e796bed2462ee1fb2bb6433c9217c85af5df1c5a8d96ac9f82d882be1981,2024-06-11T15:16:08.350000 +CVE-2024-35665,0,0,3833e796bed2462ee1fb2bb6433c9217c85af5df1c5a8d96ac9f82d882be1981,2024-06-11T15:16:08.350000 CVE-2024-35666,0,0,5e133046a1ca74936bb3d36f8c7ff239458fb6b767b78411013c1064b6040b1e,2024-06-05T19:56:00.610000 -CVE-2024-35667,1,1,ca17ba4fdae51016e7bc165954fc6b38544d5b2d7bbf28311cbf5fdf633e8de2,2024-06-11T15:16:08.613000 +CVE-2024-35667,0,0,ca17ba4fdae51016e7bc165954fc6b38544d5b2d7bbf28311cbf5fdf633e8de2,2024-06-11T15:16:08.613000 CVE-2024-35668,0,0,e28d20c2d98d1a373b031e13d9cabba896a6e448df914921afbea8281107f77c,2024-06-05T19:55:05.997000 CVE-2024-35669,0,0,f0506f0b3191aa4f7e754e3ad0d8d6fd24dc968a926d0dca5fd5554a5200cca9,2024-06-10T02:52:08.267000 CVE-2024-3567,0,0,6c98824b61fbf01fa2e17d4630ab262f6d678625fc1c8f56ac29573cad1df238,2024-06-10T18:39:52.067000 -CVE-2024-35670,0,1,b47b6d86ae05a8cb55f18ead8897a2d59e2d4fe072a8348cc9c3af0c4830540f,2024-06-11T14:32:50.147000 -CVE-2024-35671,1,1,f8a282bb755f9a6b6de902fe49bed1bbe21630fb6ad32126023788a332f2e7a3,2024-06-11T14:15:12.223000 -CVE-2024-35672,0,1,f5cde77be8b977a403dcc5da9d3170558a42d1cdb8b3dd29d71d6133c17991f5,2024-06-11T14:21:04.210000 +CVE-2024-35670,0,0,b47b6d86ae05a8cb55f18ead8897a2d59e2d4fe072a8348cc9c3af0c4830540f,2024-06-11T14:32:50.147000 +CVE-2024-35671,0,0,f8a282bb755f9a6b6de902fe49bed1bbe21630fb6ad32126023788a332f2e7a3,2024-06-11T14:15:12.223000 +CVE-2024-35672,0,0,f5cde77be8b977a403dcc5da9d3170558a42d1cdb8b3dd29d71d6133c17991f5,2024-06-11T14:21:04.210000 CVE-2024-35673,0,0,b2fbe24f0db2be82a21d56e6af9fa939a75372c8c56128cfd1a449a3505ad62c,2024-06-06T14:17:35.017000 CVE-2024-35674,0,0,61cb77c7b559c0aea326b97e0a24dca407c217fd649698447cd12a1a2e660866,2024-06-06T14:17:35.017000 CVE-2024-35675,0,0,d7aba91d6e03b6f23f94998b1bbf8b95344e8e8bd8d66158e67ae8b5f0f9b824,2024-06-10T02:52:08.267000 @@ -251406,8 +251477,8 @@ CVE-2024-3568,0,0,573133d2a7191a46b0975280ef7162f7787321191e0ad33f2c4c70c7e8d9c3 CVE-2024-35680,0,0,7c6a0c434a989f035385e4f510042e999925f24da6b6ec85caba055ac9e0cec4,2024-06-10T18:06:22.600000 CVE-2024-35681,0,0,525bdaafae75f5bf5cf51a1834d939c20d16bf8cdef623f1824a094f964d2f1e,2024-06-10T02:52:08.267000 CVE-2024-35682,0,0,d5d2707642803696da8586799f5705a4682d89a42a48773cd9ba1156a6a65a23,2024-06-10T02:52:08.267000 -CVE-2024-35683,1,1,543ee45c55cfe4df71023cbc2ca445f0891a26383910f017400d4b92d415a6a8,2024-06-11T14:15:12.453000 -CVE-2024-35684,0,0,24596b6e260fdc56f7e5ab3c43801c490bc674a5e362cd94170aeb0c953239a8,2024-06-10T02:52:08.267000 +CVE-2024-35683,0,0,543ee45c55cfe4df71023cbc2ca445f0891a26383910f017400d4b92d415a6a8,2024-06-11T14:15:12.453000 +CVE-2024-35684,0,1,b093c9aebec5528c90ef3063669507d165767da12a6f5358f42cb3465d1cf70f,2024-06-11T16:15:28.850000 CVE-2024-35685,0,0,4c6a12fd17624c7674a673acf54719c33b20af7239f6e7fa5f9feb44bef8a76e,2024-06-11T13:54:12.057000 CVE-2024-35687,0,0,01afe3da447c61f63f16149e1a22231cd7dca6af836ac67c12ee8b4603138ba5,2024-06-10T02:52:08.267000 CVE-2024-35688,0,0,9f5eccfed24a369229ad90559fe3652afd2151e07e2ca32da725f1e52effa8c0,2024-06-10T02:52:08.267000 @@ -251792,7 +251863,7 @@ CVE-2024-36118,0,0,33d8fbf029e8489b5c9f0a8940761bdd6087754b4000c59931582a52c8a89 CVE-2024-36119,0,0,df322ac6443fcc8a013c93b7e5a35f3678792028e0c0bb1f44fa863251664f98,2024-05-31T13:01:46.727000 CVE-2024-3612,0,0,d6528427cbb589467c111cbd40a18dd09640d3302d8baf887860f351407e958e,2024-05-17T02:40:01.520000 CVE-2024-36120,0,0,d6de35a0bdb1441913aa45c8dadb8567e272754631072af8c3289b871150a80f,2024-05-31T19:14:47.793000 -CVE-2024-36121,0,0,27b4d8c577e6cae9a80d4d8e059d174dbc775f3455b83779cc7783e791b167bd,2024-06-05T12:53:50.240000 +CVE-2024-36121,0,1,fdf09384b033e024bfe67d677de37264ad647c63e7ff5d783b888ce07d576c39,2024-06-11T16:52:25.983000 CVE-2024-36123,0,0,54ff4b2a948263bc3042e06104bbe78141cfc1fc04b64e76b4f700b1160a6071,2024-06-03T19:23:17.807000 CVE-2024-36124,0,0,02ab0ca4dd55764a9605e8ca3f36784e22d340464f1eec28161498c1ab10d63d,2024-06-03T19:23:17.807000 CVE-2024-36127,0,0,d5f316eacc38e61e7610196c167ec4d7bd505105a6fb22c8a97d979403a0c7f5,2024-06-03T19:23:17.807000 @@ -251857,8 +251928,8 @@ CVE-2024-36389,0,0,b7f3ae9ec80f48852fb2df638815a295e32fee22ddec84c26d88db15c966c CVE-2024-36390,0,0,b28e05065e61bd7a9bb35d69c3db1c5b9fc640899f1d11e151111ef78e00d787,2024-06-03T14:46:24.250000 CVE-2024-36391,0,0,912b7ffb7dfb6dfb15f70d7bea2f2a5105573bbf43d36923ced033abcc265d3d,2024-06-03T14:46:24.250000 CVE-2024-36392,0,0,7b41af317d30bf0386ed81503024aa5664470441af94b00ab8ae6362055ee697,2024-06-03T14:46:24.250000 -CVE-2024-36393,0,0,ca4ab2c12c1c61f4c492639b1dd5e6cb1324f6d0c2621bdcb60158dd83b27b26,2024-06-06T14:17:35.017000 -CVE-2024-36394,0,0,ccd18b82bd5a08a305c1555f5cc47e2752966fbf6a2087d2a218509e3ed38669,2024-06-06T14:17:35.017000 +CVE-2024-36393,0,1,8111ed2281966f4170aff551bd133080ffc760cf03f5f0b24324e3c88d4a777d,2024-06-11T17:46:59.160000 +CVE-2024-36394,0,1,b5c8d1d810533bb5d434ed5dfd8bd001259ea24041137e185276724fa51e1258,2024-06-11T17:46:38.227000 CVE-2024-36399,0,0,32a084399fffaab7b007a4925030bc8dfc9c8bbd3d7f25f567b275cd72694397,2024-06-07T14:56:05.647000 CVE-2024-3640,0,0,abbf5a33cbca708fe19710dda7a796491ae1d1614e9cd03f43d6cddef8b09500,2024-05-17T18:36:31.297000 CVE-2024-36400,0,0,6b10ab1f058055da0b7f6513936a46e66d6922b94171c5e956b85881f675cf7c,2024-06-10T19:39:21.660000 @@ -251907,12 +251978,13 @@ CVE-2024-36569,0,0,cc62a3b4fb5fe5cf7891883c6e12ba14de517f9765eb42867751af3c3e50f CVE-2024-3657,0,0,b3ddc632f51ff9b9080079d8b3c5a6b7a01651c0414e2741d5c53ebe23c9db3e,2024-05-28T14:59:09.827000 CVE-2024-3658,0,0,788a6c57a5cc1d17a8f73184ec3f2bfe6dae89c54b4197447e7e87a36bebe3cf,2024-05-28T15:15:09.703000 CVE-2024-3660,0,0,27de83d41a96740d974951cfc0f4ab32e626a768053ae4e7908802eefe823936,2024-04-17T12:48:31.863000 -CVE-2024-36604,0,1,38f77f753935bc42c015eb31deee2068198d6e188158d2d88cd9ce30dd28f28e,2024-06-11T14:24:17.413000 +CVE-2024-36604,0,0,38f77f753935bc42c015eb31deee2068198d6e188158d2d88cd9ce30dd28f28e,2024-06-11T14:24:17.413000 CVE-2024-3661,0,0,b665f3ebe2f700b6f4e02ebfa9bd2f64cd39c43e37b9374c2fdfbf4a8d208373,2024-05-08T22:15:49.103000 CVE-2024-3662,0,0,aac492e0cb08799a7f888c46af5bedb595fa2e9ad6dc15c21be50e9dae70066e,2024-04-15T13:15:31.997000 CVE-2024-3663,0,0,d70e03397b7b1ab439d27e0f0ba070e0cb9801b42863e8c396c4da4f0822fd7c,2024-05-22T12:46:53.887000 CVE-2024-3664,0,0,afb9452532a9b46276f3e123567931f2d9b14afd62c66b887c9d751f65c725bc,2024-04-23T12:52:09.397000 CVE-2024-3665,0,0,22dbbd6c0bec2b9f433688ae97b549cd541e7f2d387c3796dd32246c851476cf,2024-04-23T12:52:09.397000 +CVE-2024-36650,1,1,905a1c23c206dd1b966b1776e5b4ad56249bf6f36f1e62ba9435846589fd9c7f,2024-06-11T16:15:29.043000 CVE-2024-3666,0,0,07796934f1ac3c83f9027f055a741df04ffd0473d9b06f5fc0b3f20da9ef9091,2024-05-22T12:46:53.887000 CVE-2024-36667,0,0,f633a9fdea8a298fa142bef239ca89fb8be18cac4ae9173c3d76b2a6be44183b,2024-06-06T14:17:35.017000 CVE-2024-36668,0,0,4cedc166eb0bd391c040c5196589bbd754cdd7e90f4a579e8e01dedf42e83ad7,2024-06-06T14:17:35.017000 @@ -251921,7 +251993,7 @@ CVE-2024-3667,0,0,b8aaa7837b9708a00cf0b0659c0d909767a8ae9572c9d0bb67e828adada10c CVE-2024-36670,0,0,fdafe9c66140e5a2018ce6b3a330b135107007226ee1c746bda0de7803753e50,2024-06-06T14:17:35.017000 CVE-2024-36673,0,0,0bdedcf3cd9e0ddf0f56dd3b2d8e8284bb34474f2aa544a628d0d470af49742d,2024-06-07T14:56:05.647000 CVE-2024-36674,0,0,80518ec37aaca3163e2f2a38f2de20c8dedbcb7f0e795fb382e532f1b66ca868,2024-06-03T19:23:17.807000 -CVE-2024-36675,0,0,9cc73525aaa2b79aef5743d304c82061ba0cd5810e72cd111a6f119f739e2d26,2024-06-05T12:53:50.240000 +CVE-2024-36675,0,1,d8b3bb8705c0d8b166e699377141fb97d9735e483700819521a5fc1573c26a90,2024-06-11T16:49:10.457000 CVE-2024-3668,0,0,e416ac04a22e7361e1b734c255fae55a76bf75713df9c7a40bea0ebc10271344,2024-06-10T02:52:08.267000 CVE-2024-3670,0,0,c82d0130c8edc16344a78447d1514c5ffe18d421cd344e5799606a7730bedf8c,2024-05-02T18:00:37.360000 CVE-2024-3671,0,0,d4c07d059b6fad473ffadbf866eab2d0161459cafd3d5843ab40df0df4e33fe1,2024-05-22T12:46:53.887000 @@ -251969,8 +252041,8 @@ CVE-2024-36843,0,0,dffd8a9db459cea7141db065370811228354e9ed0a00ef7accb6e04cac039 CVE-2024-36844,0,0,e97265dff1b9c5c617aea3c1ed095692195c0e84c6f318663f5bdfc9ec429f88,2024-06-03T14:46:24.250000 CVE-2024-36845,0,0,4b9d7b96ab3c57fe0fa6236fc4a20ae85e48dc606d8eba3c5478623a05a01e27,2024-06-03T14:46:24.250000 CVE-2024-3685,0,0,f921a0a401f8b4f7737f6fde068e597ed9cc1b4c23e79252700a3c350a96640b,2024-05-17T02:40:03.840000 -CVE-2024-36857,0,1,6ca6782e9ef9e00253d513b24ebf4bc1e4911443d20a0960a90d34bf61a682ab,2024-06-11T14:13:14.437000 -CVE-2024-36858,0,1,1cf1840b9f00db7011961fe1c834c8267c49050fc663b9810359d8ec827df2d3,2024-06-11T14:12:39.667000 +CVE-2024-36857,0,0,6ca6782e9ef9e00253d513b24ebf4bc1e4911443d20a0960a90d34bf61a682ab,2024-06-11T14:13:14.437000 +CVE-2024-36858,0,0,1cf1840b9f00db7011961fe1c834c8267c49050fc663b9810359d8ec827df2d3,2024-06-11T14:12:39.667000 CVE-2024-3686,0,0,48e96862a2931368fc7a73a6d531fce8d2b9c3a327baf97d691f2054e9208b18,2024-05-17T02:40:03.933000 CVE-2024-3687,0,0,a3a2ae712cd6c7057b4b6b211557af56d168f80a5b75c666d660903c58451d4c,2024-05-17T02:40:04.027000 CVE-2024-3688,0,0,b349be233f486be05eb488359e63176b80bab656f49706a0c8941ace2d96eaa9,2024-06-04T19:20:23.107000 @@ -252116,7 +252188,7 @@ CVE-2024-37154,0,0,58669c60bd370ee58122b9f7af67de36a61a42702559484c7a8e000321217 CVE-2024-37156,0,0,7e333f2d85e8aebcd8a0c3a0c10b32f6169582c9ae7ef770c4979e919256c1f4,2024-06-07T14:56:05.647000 CVE-2024-3716,0,0,bdf7b94eaf3a61f5d833423267272b016419fd984cbc8abd8ff807268a3875f7,2024-06-06T14:17:35.017000 CVE-2024-37160,0,0,fcce8714fd6eb9d5cfcd3a6766aa7f897f876324a339916bfcf72210a29f3e95,2024-06-07T14:56:05.647000 -CVE-2024-37161,1,1,d7e37c245dc6ecd190b54dcfd004b6792adbedf293162bb01ff86c1f200b4eb5,2024-06-11T15:16:09.153000 +CVE-2024-37161,0,0,d7e37c245dc6ecd190b54dcfd004b6792adbedf293162bb01ff86c1f200b4eb5,2024-06-11T15:16:09.153000 CVE-2024-37162,0,0,20f04eed2509be4edd020dc29545cba95e046369c759b4274ae948e43afa70f4,2024-06-07T19:24:09.243000 CVE-2024-37163,0,0,4e1e81ba9ae53508c75950c330feaa4e8374728a41f93d075890eaf8b687bb29,2024-06-07T19:24:09.243000 CVE-2024-37166,0,0,1196d2402680f5c0ea35c25969f98c6e42a601c8b7f166b15d39fc6d2b783ecf,2024-06-11T13:54:12.057000 @@ -252136,16 +252208,18 @@ CVE-2024-3724,0,0,a2f08bb0a2e36a5c374b862fb3e4beff315b3d6672953c5eeabe10290b435e CVE-2024-3725,0,0,dd194c190207038aca40dcc17eaac7bd7c6f9f34e04d00c016e0de6cd9837da0,2024-05-02T18:00:37.360000 CVE-2024-3726,0,0,5d13f10d5b73efb7ab7c6448eee56ee5b7f1a739226807fb6eef2a4ab850d2f7,2024-05-30T13:15:41.297000 CVE-2024-3727,0,0,6edac4103d7932b3951e03146eae4bf096e2d18a2b4f814f8f7920458398b953,2024-06-11T04:15:13.247000 -CVE-2024-37273,0,1,8e9dee449ebc3c902c8a48603bfb19c8ba061254dd865164dc4adc81e57806ef,2024-06-11T14:12:23.210000 +CVE-2024-37273,0,0,8e9dee449ebc3c902c8a48603bfb19c8ba061254dd865164dc4adc81e57806ef,2024-06-11T14:12:23.210000 CVE-2024-3728,0,0,43844043222c66b8f700e8c46db9fa69a4e80d2868161363811005c77777bc69,2024-05-02T18:00:37.360000 CVE-2024-37289,0,0,2fb00f90d13443feb2f6a7f1e7d138e51b10efb8192c90ecef8306ef2b5c5360,2024-06-11T13:54:12.057000 CVE-2024-3729,0,0,fe9208be005903b27f9e982914c8adbe6ffd46f8d19d93e705d785ecc61de3fc,2024-05-02T18:00:37.360000 -CVE-2024-37294,1,1,6bccada75d840bb27019cce9f7bf25d38e77606963a80a01cd808306aef03266,2024-06-11T15:16:09.467000 -CVE-2024-37295,1,1,489b7cf64c9161735dcc4e60b77f6320915669d39993b442952b536afb71d58f,2024-06-11T15:16:09.710000 -CVE-2024-37296,1,1,2aaf9d94ef056cce09e0b5724aee7c4e629647a09dbe0d79a994991f97a3ce49,2024-06-11T15:16:09.963000 +CVE-2024-37293,1,1,129a6721f34b93e77a75c2bc87f624b2823628bad71e52c3afb55c8517a9e0d1,2024-06-11T17:16:04.237000 +CVE-2024-37294,0,0,6bccada75d840bb27019cce9f7bf25d38e77606963a80a01cd808306aef03266,2024-06-11T15:16:09.467000 +CVE-2024-37295,0,0,489b7cf64c9161735dcc4e60b77f6320915669d39993b442952b536afb71d58f,2024-06-11T15:16:09.710000 +CVE-2024-37296,0,0,2aaf9d94ef056cce09e0b5724aee7c4e629647a09dbe0d79a994991f97a3ce49,2024-06-11T15:16:09.963000 CVE-2024-3730,0,0,a30960de1676c855ee35b61976bc4581959cd1a98a7ba3127a461fb7fc955146,2024-04-25T13:18:02.660000 CVE-2024-3731,0,0,bdcc8f677627b7b108ec8e839a01e7cc6ba34354d6004394dff79046d7838f40,2024-04-19T13:10:25.637000 CVE-2024-3732,0,0,47b10b9e83ea0bac70990c3295c25b56cc73657af82bc6f5c1f4fd37930f5edb,2024-04-23T12:52:09.397000 +CVE-2024-37325,1,1,7aad069d9af71aa89b0a02f611badaa27cd28b4488184423f704e55afa4d20d1,2024-06-11T17:16:04.477000 CVE-2024-3733,0,0,a4296992076c9e80c22dc80bc25acdd9a6af961376871659e0386f3449f48613,2024-04-25T13:18:13.537000 CVE-2024-3734,0,0,b86ed30811a3326be0f0dac4d727bf041d17d1a4d696b5825133800b3e1e6da3,2024-05-02T18:00:37.360000 CVE-2024-3735,0,0,5ddf2e7f4a48d9adc915c53e5374d23792eebb62d6ec39c5c6eab645f0c5ac5e,2024-05-17T02:40:05.693000 @@ -252356,7 +252430,7 @@ CVE-2024-3991,0,0,f4b27e31b2ebe06401478accd9d85264142bf207d27ef139c240399354705c CVE-2024-3994,0,0,292539249e741e7003c555a5d4fa2182b15a01b393fb04fa15e675750c01906e,2024-04-25T13:18:02.660000 CVE-2024-3997,0,0,507ae8762d75f9d68eda75aa3a6fbbaf1b3579404dfa0ecd9f2978d2aa87a55f,2024-05-24T01:15:30.977000 CVE-2024-4000,0,0,63e68b686bb1abbdcd2ddeab613f2e83d1883c904c164f21a1076ada49583fc9,2024-05-02T18:00:37.360000 -CVE-2024-4001,0,0,9087c824343a197f49253ec388f203b19bc7567114e0cb1c21c7da34a6a10aaf,2024-06-05T12:53:50.240000 +CVE-2024-4001,0,1,01ff67c0d3df1be38408b913fb09a0fa8e839c64a815c3de41b48a61aa2ae8cb,2024-06-11T17:27:53.637000 CVE-2024-4003,0,0,9b9be828f15a04db891b79e7c6ebf75d000360176e249e61f2acbb014741196d,2024-05-02T18:00:37.360000 CVE-2024-4006,0,0,cea97555ee62217aaca46943155964ba917aa17a210befae3806ab46c6606005,2024-04-25T17:25:05.903000 CVE-2024-4008,0,0,ab88da5f03295a5c82b2b02d767da89d9d5f6b64be017927f79b2a477f07ce81,2024-06-06T14:17:35.017000 @@ -252413,11 +252487,11 @@ CVE-2024-4077,0,0,88c9fb35aec8dbee15c3169eb34c083d7cc8d7a290cdea9208a3041187ada8 CVE-2024-4078,0,0,f02a6c29d80f944755bef4fcac2904ebf0cf2a727c904e067874e25c2b43b0a2,2024-05-16T13:03:05.353000 CVE-2024-4082,0,0,9bcc679f7514b7d071aa621d11dbe3b6578d11cf65d1c2f18fedd0888ce997fc,2024-05-14T16:11:39.510000 CVE-2024-4083,0,0,90b3f0c23e53e5107774f39811ea28166caf07e02a51ec5c595625bec75a4f5e,2024-05-02T18:00:37.360000 -CVE-2024-4084,0,0,bd40d9c7f27ec86c65566b40e464ab6ba58a2be1b68d61678150d6028c6d7666,2024-06-05T12:53:50.240000 +CVE-2024-4084,0,1,0bff7fdf8249f415bfa8e3e687a8030d2e1833959c85eb9c876b4c822d101dfe,2024-06-11T16:44:49.090000 CVE-2024-4085,0,0,18b49aedef154a5f78284d7ff3699691fe3b4904260085a931cc6d08f4fb7ca8,2024-05-02T18:00:37.360000 CVE-2024-4086,0,0,c06eb3f0c2fbe1c42ce58a59441202866280214c07091170b4fb53c94814c994,2024-05-02T18:00:37.360000 CVE-2024-4087,0,0,c042d2a1de26e6b1fe0621a6edcac1fb8cab9f866d13a8bc2e77c06eafe2f2ff,2024-06-03T14:46:24.250000 -CVE-2024-4088,0,0,fc64773d1c1daa05ab20e72297e067c7b9ce75644cf2c19686947f57b63d0583,2024-06-05T12:53:50.240000 +CVE-2024-4088,0,1,c8ca3e8553223ece7fd626b7957017d2d8aae2ed445db80654c73542bf17135f,2024-06-11T17:11:30.193000 CVE-2024-4092,0,0,4be02f9c67d30932bc0929e64c1c04dde83d92e769e6b30b60cbc598e8e37f4c,2024-05-02T18:00:37.360000 CVE-2024-4093,0,0,5d27408cc41c323f4b0e69479d9f46468fbd0106e510632bee156499f1d6b2eb,2024-05-17T02:40:15.433000 CVE-2024-4097,0,0,6a60177672bc62dbe43e4e7ccd78e74b9159babed54b0d3a303c5a9a6fcd009a,2024-05-02T18:00:37.360000 @@ -252479,7 +252553,7 @@ CVE-2024-4172,0,0,451a98bc37a8913689c170fa50248cd8ea0889d257d9eb9d44eb4ecc18ef5d CVE-2024-4173,0,0,806a08191dc2b624e0ee02a7be11ce6c5ceee33617f7b3eb9464afb5420bb62b,2024-04-25T23:15:47.240000 CVE-2024-4174,0,0,c142274bead27dee8f65c018633c5143a8f9b64dc6c6d83b389a2c439d2fca3c,2024-04-25T13:18:02.660000 CVE-2024-4175,0,0,60706a95032c3b7b71280c12c10b7cdce6a73ddf5468ef6a0d21aafa3328ee4a,2024-04-25T13:18:02.660000 -CVE-2024-4177,0,0,a26f0c01dd7533b519b4fa7602739602d1059a3d29e2f8252e3819dfe4627009,2024-06-06T14:17:35.017000 +CVE-2024-4177,0,1,a43ba9f8c56c5c4c0bdd6faae10bbd3483fc80a61dd030ad2066a0bb3df9e636,2024-06-11T17:53:13.710000 CVE-2024-4180,0,0,9058921b947f24d8b0a5b1b796b2d37085ddebacdef82bce4988d1eb0672ae93,2024-06-04T16:57:41.053000 CVE-2024-4181,0,0,ae08963d7323466f42108cc4145b2377e0c682d334302c4a8213f2b0fcb1ee61,2024-05-16T13:03:05.353000 CVE-2024-4182,0,0,e7bfd5d03ac4e50248987fdc4c50fca364e9bca2384ff17427febaa9cba5bb33,2024-04-26T12:58:17.720000 @@ -252506,8 +252580,8 @@ CVE-2024-4214,0,0,20486a6e70da9590b0bf48d308272f5e2303dba1772619a1d43b68b5a571b0 CVE-2024-4215,0,0,2a43dd2effbd31681d2d452a71037398a8b05276042d39ca0d120b651bef66fd,2024-06-10T18:15:36.443000 CVE-2024-4216,0,0,b64899f98d1df93de8af859424e606a0b54f03649eab8c4a6696dbffde3f9ec7,2024-06-10T18:15:36.523000 CVE-2024-4218,0,0,68377bf5bc219c5624001bda4aa985e5224f9f419836698a53a69f78bf595508,2024-05-30T13:15:41.297000 -CVE-2024-4219,0,0,2ceede384886379723d456362babe0cfaacae0a2721f969b7f049e218efc38f7,2024-06-05T12:53:50.240000 -CVE-2024-4220,0,0,7328dd2e5611d2a771a4e5781a934ab445bfa1eae9bba3c02f358f61fbba9079,2024-06-05T12:53:50.240000 +CVE-2024-4219,0,1,c8079b758b715a1f50eab74fe10b87ff01903f1873291c49593cac5e499424d6,2024-06-11T17:06:50.963000 +CVE-2024-4220,0,1,d6aa05e427d916e0de9769fc4820e29f1f18a3c6387db1bee92ab09f1ecef44c,2024-06-11T17:05:35.203000 CVE-2024-4222,0,0,baaf2be5207361c5cdba494834d7fd0e14922c0bb0c21401ff4dac917c12e3a7,2024-05-16T13:03:05.353000 CVE-2024-4223,0,0,7874da25b7633a9d0c04e6bbae5b506aa967cf75a9b041fe171571206fd80286,2024-05-16T13:03:05.353000 CVE-2024-4225,0,0,ac71ef092dab43c080586d967efe31f36fc3673c6a3103eaf0a29ff9fdbbfa8b,2024-04-30T13:11:16.690000 @@ -252563,7 +252637,7 @@ CVE-2024-4291,0,0,6fb6b0e83a49b64a5565b2ca5f6437971dbeea9c5ab39460fc142df5bce327 CVE-2024-4292,0,0,f51ff84855f02b0bc4dd3e03d8351463229984e5d3c218f3331913e1b68e232f,2024-06-04T19:20:35.097000 CVE-2024-4293,0,0,631458ecd34e0e099a1efde23f32eb7981cbcf3111570b5f9cad2a4f0ec45cb7,2024-06-04T19:20:35.203000 CVE-2024-4294,0,0,97bd940eeda24c94b1982f85ff25718412e73b2bf939766f3f03c261351a8304,2024-06-04T19:20:35.300000 -CVE-2024-4295,0,0,5f5c77a664491012c7ab525ce855e50f63ef338faa130e20b060eb5c339a2bcc,2024-06-05T12:53:50.240000 +CVE-2024-4295,0,1,045ed8aa8b3379fdec3c5ebf5d740aa21061414fd5461d5ee30e1284c0cfd724,2024-06-11T17:15:18.997000 CVE-2024-4296,0,0,7c8632bf90851b299a9885e1b23a1d23a32667f17280ec361546d21dc35de10e,2024-04-29T12:42:03.667000 CVE-2024-4297,0,0,92dc96fdab7f356cdc83f7d1d85286a03b04dbf93d10ca9e6efacd8b516bbae3,2024-04-29T12:42:03.667000 CVE-2024-4298,0,0,c30353f487462f14da90ba9761a3d280aecbb2b2af7a8a57b196c96d31910116,2024-04-29T12:42:03.667000 @@ -252735,7 +252809,7 @@ CVE-2024-4516,0,0,10626e52c529e42a5320a520a08a85d986e2a25ffb5a3e13bfb1d264371f0f CVE-2024-4517,0,0,dd846e367e5abb1933c37dd12b6595595141f802700f41ef0de89e37c9e7b10e,2024-06-04T19:20:41.030000 CVE-2024-4518,0,0,138810b344c2405de3b9eb6d39d2c472e619d29fa4332ad55091f5791e860c53,2024-05-17T02:40:27.187000 CVE-2024-4519,0,0,d907f2478d280b71f30ae8f544e468b0b92be8875bfbb966894eaebcf188a9c6,2024-06-04T19:20:41.127000 -CVE-2024-4520,0,0,fcf222f2ec16286724f605e70194b9b682d90ee4ce0df8c6268cb8e5688c8440,2024-06-05T12:53:50.240000 +CVE-2024-4520,0,1,74b04a3088faaa9a3253b32a16f9c8de736b157002721bad6a5e861b76f49e61,2024-06-11T17:02:16.967000 CVE-2024-4521,0,0,d6cc5857fdfd7e080f861e131d288df35df975f65e1f792c47f6b677cf458c6d,2024-06-04T19:20:41.223000 CVE-2024-4522,0,0,404121efa69a85bb1b7c4e2c43fef3f42a34d444ccf6b6b833a5214d4ac8192e,2024-06-04T19:20:41.320000 CVE-2024-4523,0,0,5723f30cb658cebf65e64dbb3502a21e055ee9a286cd39f3273d6981e4a848c1,2024-06-04T19:20:41.420000 @@ -252900,7 +252974,7 @@ CVE-2024-4735,0,0,525831e83b784b99ed7ef48881d0a232b57485de376b3c68786c9225fdef83 CVE-2024-4736,0,0,35e0fe51ccd6e16c666173722ffd72f471827cead112caeaf869dd95515427ec,2024-06-04T19:20:48.497000 CVE-2024-4737,0,0,0d605ad76fcca9d9a8748ea1570213b2a20be8e7af59e1490aa0de37640ee426,2024-06-04T19:20:48.597000 CVE-2024-4738,0,0,703597dd680fa7def2747a141a4237503bd7e8917e070a49546a7e715e951f69,2024-06-04T19:20:48.783000 -CVE-2024-4743,0,0,ca5ac146013ec9c5ade9488d4cfcf6d89cbed0fe780989436eef36b2f305727d,2024-06-05T12:53:50.240000 +CVE-2024-4743,0,1,e42c9380fd03fa2e7e8dd1d108eb6ee48e234f06ee604011f8e8a51de81bb3cb,2024-06-11T17:32:50.367000 CVE-2024-4744,0,0,58a292f0991440815bda1982c64fa673d2647379e91b7d563512a421e417b184,2024-06-10T12:40:41.360000 CVE-2024-4745,0,0,f9dc606a5e4c521176fdcdd05c5bf69502f1d4e2e04b134cfd3bcdd72aba1b32,2024-06-10T12:40:41.360000 CVE-2024-4746,0,0,106a7251b4a60a86c21027852f1ca8deee3cf7597b635fb1229b8aa4a30a0153,2024-06-10T12:40:41.360000 @@ -252959,7 +253033,7 @@ CVE-2024-4817,0,0,25f671d255c133539a14922245d93cb8e9f73263de30634add3e11638c71ff CVE-2024-4818,0,0,b4281c0fc833ff67f25a4dec3c5716911b53a31935e38b0310baa3a499b478f8,2024-06-04T19:20:51.510000 CVE-2024-4819,0,0,e38245aea9a32f985ed2dae01aba40bf33a21f00080c8d20286bf8b00a9f57bf,2024-06-04T19:20:51.613000 CVE-2024-4820,0,0,402d6f18855ed225f564a1aa077cdcb508a467147f3c0e0905e2eb4030f9a1a9,2024-06-04T19:20:51.710000 -CVE-2024-4821,0,0,4981f09cf0383706f9cea79fb9e9301470b91511f4b8dd53fd27a692ee8c14ba,2024-06-05T12:53:50.240000 +CVE-2024-4821,0,1,845a65398f7cad48337601cafecc4a4709c13cb81f52a66c16f8dd083b7b755e,2024-06-11T17:29:33.213000 CVE-2024-4822,0,0,2afc6a99d0a53e8f4d7991726996560d97ea71ce3c63aa067c8bb04f0c1c8bcf,2024-05-14T16:11:39.510000 CVE-2024-4823,0,0,544460ea4efbe18fdd003c94911529fa16ddf77347bca6256c2d97529bd3f076,2024-05-14T16:11:39.510000 CVE-2024-4824,0,0,18f5c845247adede0ddca9ae15329e658bfdaa618402437af47bcb2e661d694c,2024-05-14T16:11:39.510000 @@ -252989,7 +253063,7 @@ CVE-2024-4871,0,0,089a89f3309c27433f20e3be4ef9a00379f9f19601c1c8029649846113aed4 CVE-2024-4875,0,0,aa35cb89fee530b58aa987ffc67ea97738c0ba567903bf01429a1a1259923db8,2024-05-21T12:37:59.687000 CVE-2024-4876,0,0,02aac8d1be489833aa2e07f8be8ce083249ac7dc2fcc33fd144386b8d365fef2,2024-05-21T12:37:59.687000 CVE-2024-4881,0,0,4f17be95dbf63ebb1e221e9270b941e4838c9b4d4b1f7c998cfbd25da7153e04,2024-06-07T14:56:05.647000 -CVE-2024-4886,0,0,85721324d8c885a233247da6b42e2a33cd86be9ab4caebe3f5bcde7804348df2,2024-06-05T12:53:50.240000 +CVE-2024-4886,0,1,70a2658e30fa136039b1e074a6e8be9bdcf194b1162566fded2b24f4cbe33ef9,2024-06-11T17:14:56.323000 CVE-2024-4887,0,0,7853500fd866e5198bb0d09f7fd788dadd2992f92f7258c295ddbf77fcf1dda2,2024-06-07T14:56:05.647000 CVE-2024-4888,0,0,82b52d1bb0607490ca6395bb78af4ea4a91988192867806f2568c515e849d6fa,2024-06-07T14:56:05.647000 CVE-2024-4889,0,0,870a2a9781b3ef15fc72db76ff0dd5c2eae6b9a04e5f14b509163b640aac98bd,2024-06-07T14:56:05.647000 @@ -253030,7 +253104,7 @@ CVE-2024-4930,0,0,6ff76d7aaffb879ad1ba04c82aee4d6862810bf82c41e96981364c74ee8131 CVE-2024-4931,0,0,83efd803f055d34e0373b998807732a66d1be28ff93405fe1ae45ba9ee6af2a3,2024-06-04T19:20:54.543000 CVE-2024-4932,0,0,2da4bffdf4d6e38ae009aae9065c7b2f8049c53fc8beaf73dfbb4354175c5b68,2024-05-17T02:40:43.357000 CVE-2024-4933,0,0,9fe90c4f8856bf6bdad48e78d639ea10366bef215c1d0d507cc52649860ab1b1,2024-06-04T19:20:54.643000 -CVE-2024-4939,0,0,9b3d9056d0ef1d9ece33bf387a55f6ff5207b427eb3d8aa6eb326ad7a1f5fa3f,2024-06-05T12:53:50.240000 +CVE-2024-4939,0,1,6859feec38f69c636602db339fa7ab03b302bd67a24dc957bb8f045d97aede0c,2024-06-11T17:08:33.350000 CVE-2024-4941,0,0,04ed79d9b1e3032260e31cb6cd2ea8a25db6821440182f4cb50592b145bee1e2,2024-06-07T14:56:05.647000 CVE-2024-4942,0,0,157240698edb46a5deca9943c90e89d5c268795c03f1dadbb4d2f6e28d77068b,2024-06-06T14:17:35.017000 CVE-2024-4943,0,0,d9b88319a5992961df806c2aff168607709c5e19495e72269f7fd7790830e1d9,2024-05-21T12:37:59.687000 @@ -253071,14 +253145,14 @@ CVE-2024-4999,0,0,1bac5cc77e7ceb1bce6c078fbd59e76f5556984ef2124d365e8638bfa6b6fd CVE-2024-5000,0,0,21f44bae275ca5e7f3a45da963612f2fb705c74e44c15e2681f54ff4506e6afb,2024-06-04T16:57:41.053000 CVE-2024-5001,0,0,bac0073c23ed28e836068e8632acf1110bc49b73246f9cff53f5a706acc4a57d,2024-06-06T14:17:35.017000 CVE-2024-5003,0,0,d7f0fc1b6b7797a26bbde28f3345c21309ee3aa5cb19350abdc4f1d0ca9ec31a,2024-06-07T14:56:05.647000 -CVE-2024-5006,0,0,dd22c8e58768fd94bd48e3be3a4dc52cd3210392642ba6489895072643348644,2024-06-05T12:53:50.240000 +CVE-2024-5006,0,1,982820e7e91a551bd12476d9f6731c77df87e69f9a4499c2643412449b7b2aa0,2024-06-11T17:36:24 CVE-2024-5022,0,0,106355f86b530d1586a5d339031de27a1a2312467a76eb449e8e9901150235d8,2024-05-20T13:00:34.807000 CVE-2024-5023,0,0,974704283893df4cc9d8e0bcce8bb65ebf635268235f75f47c922033893214ce,2024-05-17T18:36:31.297000 CVE-2024-5025,0,0,d287dc9bcba0fba1784ec3f3fe4bf65eea235ed5e6f91d741018beb442d992d7,2024-05-22T12:46:53.887000 CVE-2024-5031,0,0,e598ebc5c9fa457f9bece560d72de6fc8851ac943a5e7908ec776eb9202f17df,2024-05-22T12:46:53.887000 CVE-2024-5035,0,0,04b94f66274e3d3d22c52a6f453c8b285ab22579cfad76ef028d6a110e1aa148,2024-05-29T05:16:08.793000 CVE-2024-5037,0,0,10d28aafa9e9bd8dcd65c435579824df0f7216429d2845d4410a8a8948579200,2024-06-06T14:17:35.017000 -CVE-2024-5038,0,0,01568dea5f164d9a4e3992ec030763a9891525771681a4e26f0d0673ebbb5ea2,2024-06-06T14:17:35.017000 +CVE-2024-5038,0,1,06b42bf2f2d8413cc0f40932a00eaaea0786a8ef2cd369c2d799d355c720323a,2024-06-11T17:41:37.883000 CVE-2024-5039,0,0,42959b486bf28971702f84d5d970f64301a550626d1348beb35b7505e0fa75c5,2024-05-29T15:18:26.427000 CVE-2024-5040,0,0,0ff887bafdff8fcd61409221ff18cf1da08d6038e0047c0178293c334ec34d62,2024-05-22T12:46:53.887000 CVE-2024-5041,0,0,e9e0ce07c8fb7a79144dcad51f781b7cf6fc269ca74850bc387c8b67fa03885b,2024-05-31T13:01:46.727000 @@ -253183,8 +253257,8 @@ CVE-2024-5184,0,0,469ae4b4101ce70838982062b92b16e6c320dc3a978486babbbd116acc562e CVE-2024-5185,0,0,b5caf3da810dd6351b96bbd5e231331a05f92e8956c63f18c155c13a8af19485,2024-05-29T15:18:26.427000 CVE-2024-5186,0,0,c6b2efdad9b4d04477e8bc0a562c3aef2ed32ffb2bffbc88ea5624073db9f4b8,2024-06-07T14:56:05.647000 CVE-2024-5187,0,0,1fe873e60b2e6adcd0abe3ac4869c60f90268e921debc1e658e1b84cf932fa3f,2024-06-07T14:56:05.647000 -CVE-2024-5188,0,0,7bcd4e763e878ffb0a5784b9da092f4388475544545fdf05a84918304f43c342,2024-06-06T14:17:35.017000 -CVE-2024-5189,1,1,80de79c5a0bfa51f9fd184ed9dc8a94cafc5f149ec72a65e4615d751cd5e3a99,2024-06-11T14:15:12.847000 +CVE-2024-5188,0,1,f341cd733a67fef7a36812a8f7aa63c3db307a7b91bf1e7665add6435f19830a,2024-06-11T17:41:17.087000 +CVE-2024-5189,0,0,80de79c5a0bfa51f9fd184ed9dc8a94cafc5f149ec72a65e4615d751cd5e3a99,2024-06-11T14:15:12.847000 CVE-2024-5190,0,0,e11755e15485ad7d65ed59ac9abe5cac7f4b4c3e2591d1a6c69b4386ed9dea65,2024-05-22T03:15:08.273000 CVE-2024-5193,0,0,4619a3332fd1de828c7e949279cabe4a2b063d71a4e227126d8bf6d303fb6eb4,2024-06-04T19:21:01.867000 CVE-2024-5194,0,0,2277a7390d0159b3dc2e5dfd100175220ffc5f5725f8c88a7a9344e62a79d516,2024-06-04T19:21:01.977000 @@ -253200,8 +253274,8 @@ CVE-2024-5207,0,0,837facf8fac5843bbf7aea1ce36fa00287f1ba077f8fbca1302b0ab4087ec5 CVE-2024-5214,0,0,77a86526714522a20940695733fe46b4562089752d3c663cf289b583b7c6bbda,2024-06-03T19:15:09.360000 CVE-2024-5218,0,0,928b5f8d4e08afc285c0cf6e370373ec87899b716b1cb4db68027907b01d2a82,2024-05-28T12:39:42.673000 CVE-2024-5220,0,0,f61a4e43424028e9a9336f6f6ed766295c86a8a5421f6ff87daa2be13ac80d02,2024-05-28T12:39:42.673000 -CVE-2024-5221,0,0,5f8f6a2dfef06a37f135e2b85929c0a96bcf83a536ea124456b536c9b2694707,2024-06-06T14:17:35.017000 -CVE-2024-5222,0,0,e769bb480236b36cbba7fdebb79adf1189e90d39aec093b6e4e34002be122181,2024-06-05T12:53:50.240000 +CVE-2024-5221,0,1,6f51797e5b3c0557a37760dbd03fa62a550b475fd63c18dbeda417440e82bc1e,2024-06-11T17:45:05.337000 +CVE-2024-5222,0,1,9cd621b08cb54b50b47cb4a9273cbece7a7137c6658b676a1e89f8c7b1f01084,2024-06-11T17:10:40.303000 CVE-2024-5223,0,0,8366f6c6b4592ec30854ea2204a3ebdc0b5f6592483a6a57d3251ddc4233fcd1,2024-05-30T13:15:41.297000 CVE-2024-5224,0,0,60b1bcb89040b5c3e85ac5131fd112ccc87db84d011046ada6bfcb3cc04495bd,2024-06-06T14:17:35.017000 CVE-2024-5225,0,0,7881c429f87388fcca6782bea681345deddb79fb7655466f82539aaf4c1c91ef,2024-06-07T14:56:05.647000 @@ -253229,8 +253303,8 @@ CVE-2024-5247,0,0,1e269e58ef46756e33578f4c5df34dcec3de646d04312bef41a8353e3fc1fc CVE-2024-5248,0,0,b78352407aadb212f93e70af46347d9b26fbbca7606ce8cffa82c8de6328191e,2024-06-07T14:56:05.647000 CVE-2024-5256,0,0,aef556d8e7eef39a9e473d71cb0baaf9ddd8441bfdba9b715777a96b312eec3d,2024-06-07T14:56:05.647000 CVE-2024-5258,0,0,44dc29bb0ed4f47fbd56a17c4d4592048fc8f73fd8d93b1b1d7d82e5e8477ede,2024-05-24T01:15:30.977000 -CVE-2024-5259,0,0,bdbf7108e8e8869e0bd01a5125a0710703b4d2d25752bab647419f62bde4d575,2024-06-06T14:17:35.017000 -CVE-2024-5262,0,0,d3d11be98b1db30aa602921aa94b60a718be9a0bc4ccd1e4ef634546f525f9dd,2024-06-05T12:53:50.240000 +CVE-2024-5259,0,1,1133f2690684f5fa329a88cb6129c4f77126359850c2cd2c69369073dabe319e,2024-06-11T17:44:42.783000 +CVE-2024-5262,0,1,9ac0e56dcac973bc4b8e5b6fa9933e9dd09a608d6b80fb71c1aa4404fea36f64,2024-06-11T17:18:50.600000 CVE-2024-5264,0,0,8231398a0715961af60c236587d7e9f037c5bc092ccd3f5680c73ce92c6726b7,2024-05-24T01:15:30.977000 CVE-2024-5267,0,0,56a46198c3e1065879dc87513ff3136ec5650c767fa2a117d737d28ecae53cf4,2024-06-07T14:56:05.647000 CVE-2024-5268,0,0,6c62d2c4f5ec7f076ad3a77daef4a605562ab9ff106410d5ae35773de78d45b5,2024-06-07T14:56:05.647000 @@ -253264,13 +253338,13 @@ CVE-2024-5311,0,0,254582b6f9bf67f7974ecb2d947c8ea8261db1fbcce62f651ad1dbc864d7bc CVE-2024-5312,0,0,3a9d8301087c1d7edb8976207e286d0d247ebf6ccf4b5edb4137e81b02e5ec2b,2024-05-24T13:03:05.093000 CVE-2024-5314,0,0,fb6304ffb5d50ce8724d643a46fad25ba80695f7c0c0eb4ec33a07d41bc4980a,2024-05-24T13:03:05.093000 CVE-2024-5315,0,0,e1b0baaf93d62cf125eea53091da57c404cdf61d625ae810529ebef84e73357d,2024-05-24T13:03:05.093000 -CVE-2024-5317,0,0,70fad21bb6d055acd43b4c51b75c518640ac7d33076d66f0fe600a0c6284d486,2024-06-05T12:53:50.240000 +CVE-2024-5317,0,1,f1a52a6a9c8c0e0ec33c800078b387ceb900e9c5541b8549c2aff9d1fff22088,2024-06-11T17:22:08.007000 CVE-2024-5318,0,0,812431b83287688611dc496217ea25ba5560744235da04dca7a35239cac1fe9a,2024-05-24T18:09:20.027000 CVE-2024-5324,0,0,239b526476b291cf58ac1a7ce87454c70f83a8964e6e304d358d59b9fc037786,2024-06-06T14:17:35.017000 CVE-2024-5326,0,0,9beaa1147d54b3ae536a6eb0023672ae377946ef8aec317bd58c5324df5850c7,2024-05-30T13:15:41.297000 CVE-2024-5327,0,0,84b1605ed9f8fbbcd152a70275bed021ec8172a393ec025e57c9733c6898763a,2024-05-30T13:15:41.297000 CVE-2024-5328,0,0,eccd57558969f598d341de2d66a168d40aa825b298603b31d124c5c65bd99501,2024-06-07T14:56:05.647000 -CVE-2024-5329,0,0,00b4b09406549d99adc36f6ab743a8eb34b12eda4c72c4ca40085e57fb272994,2024-06-06T14:17:35.017000 +CVE-2024-5329,0,1,d0611aba519e3b4dd99e1f039e6e2f0eb2cd7ab02594b1f6812432d5e7c027f4,2024-06-11T17:42:26.677000 CVE-2024-5336,0,0,c369166950e96ac23803f815e7b4d2b11cfe953eea9e75568f6bd3a698e57d70,2024-06-04T19:21:04.947000 CVE-2024-5337,0,0,c248444f5c3efb36aad99df75367002d79331c50b5d3f0b33d4749de26828e2b,2024-06-04T19:21:05.063000 CVE-2024-5338,0,0,89168a7f7dbda5d5f11c938f5cea67ca543a537a0633e07e1ea1ce3fb43d8fd7,2024-06-04T19:21:05.170000 @@ -253356,10 +253430,10 @@ CVE-2024-5434,0,0,dc2716eb218edba725ac85c17a2930de7a00b6563d0ca53040574106ea0b92 CVE-2024-5436,0,0,512ff808a53596bd19353e26c03602bd4b39921efe131952ebcd76460c505fa6,2024-05-31T13:01:46.727000 CVE-2024-5437,0,0,551b020f0044e3ab584c14f08f0984900b4bc26534c92382eb6ac2bb660708ea,2024-06-04T19:21:09.363000 CVE-2024-5438,0,0,d92c50b08d359bc997c1324c03e4556946075ec11f8d28ecff08d4d211fb2a09,2024-06-07T14:56:05.647000 -CVE-2024-5439,0,0,abaad0f03a42ef683e08fa0b9e3df38062d4c8e86744ed6e348d5f6378ac054e,2024-06-05T12:53:50.240000 +CVE-2024-5439,0,1,d933d33f15def11b210f94c43e434fbcbcedf874aa4bf1c51db16a3b591b2644,2024-06-11T17:35:43.313000 CVE-2024-5449,0,0,98f03fd41a859602711a787e6c6738ac5b4c6552335bab31c9f953ba2b79cc72,2024-06-06T14:17:35.017000 CVE-2024-5452,0,0,27a87c5d81b8c2c688ae4d039463a5b6ff5c5d7de26437cd334595b44d7597a4,2024-06-07T14:56:05.647000 -CVE-2024-5453,0,0,7c8641ed8daae70878106ab21b3cb2696b56b68c7012b2cceeb0fd9522a96b5d,2024-06-05T12:53:50.240000 +CVE-2024-5453,0,1,f53a0f7c14e91f56fc73f4b75f7a3c7cc751f83b7f0078edb3a1d42587e45496,2024-06-11T17:34:52.263000 CVE-2024-5458,0,0,40e07ec7f0555b7f2ee25e02ecbcc9ff1409522ffaf4f910e17d22ad5d5d2e2a,2024-06-10T17:16:34.510000 CVE-2024-5459,0,0,9ffec4e6ddf7de8eef808a13af7e4d67efb473b64a2ed4688c4272492e191c2e,2024-06-06T14:17:35.017000 CVE-2024-5463,0,0,a83ead02d534db419d64d9a246adc999062f3a690f2d2cbba14bffeb9debf0f5,2024-06-04T16:57:41.053000 @@ -253367,7 +253441,7 @@ CVE-2024-5478,0,0,cbce39d40f4102e26dfaf35e6a6b20bf349245ad3d94d864b4543f6f43a9d2 CVE-2024-5480,0,0,0c96379cb76c4f8b6d9852cdcc0f60ebab5e5f97f64e4439ef99fbfb3e3714ee,2024-06-07T14:56:05.647000 CVE-2024-5481,0,0,406f172e59ecbac276ccfc58dfa6ee22450498ce91b1e77470bfac4fdae1bff2,2024-06-07T14:56:05.647000 CVE-2024-5482,0,0,deb4cff32cf3f87f89ff2e26ffd7a2390ad03b8acd8adef3ed5769f2b5cc7acd,2024-06-07T14:56:05.647000 -CVE-2024-5483,0,0,7f43560d00d9c5c79b2c3d019ce75e11de51c4cc4b985eafef8f739c765c5aa5,2024-06-05T12:53:50.240000 +CVE-2024-5483,0,1,50ef873fd9ba2b134eb7743380749d7bf41a18a6183eddc44371799e9b77b44b,2024-06-11T17:19:17.143000 CVE-2024-5484,0,0,7de35f8eee9232651ed147ec3168f6740617b1737ec3ff6913988b98b84f6ef1,2024-05-31T11:15:09.783000 CVE-2024-5485,0,0,dca0cc3d797ec50003ec75de23195400e6c002137c330b8a6fe7501d852f23b7,2024-06-04T16:57:41.053000 CVE-2024-5489,0,0,36c38eaf68f0e1fbcb987a22c4dc0779b4f06e08871c80a8344ad8028be969a7,2024-06-06T14:17:35.017000 @@ -253395,10 +253469,10 @@ CVE-2024-5521,0,0,ccb2ba49d7e4be9859a81cd0c950d08f47c4a44700fa46f5775af6da3418ab CVE-2024-5523,0,0,047cc71fb1f4320881d428c79c80679ee2da549498da604407797261c69d069c,2024-05-31T13:01:46.727000 CVE-2024-5524,0,0,e7e0fe13822be5d672aca31e1ee31e0f364bc62cac379db56dfa86e4e6649c5d,2024-05-31T13:01:46.727000 CVE-2024-5525,0,0,27d51e0f90117d5f6e29d565f6efd293c83de249201cb9426e9c70697dbb918d,2024-05-31T13:01:46.727000 -CVE-2024-5526,0,0,ff5b1387d351b0ba676942fad975bab52e39b4bce1932efe40f06f69ab4492f7,2024-06-05T12:53:50.240000 +CVE-2024-5526,0,1,e88e82e62b5e4c5aebe68213504a5aa190a1c186279f7068714569f91c3de73e,2024-06-11T17:25:55.677000 CVE-2024-5530,0,0,a1a0702e27e4a4e3934db43cd9ea561e00ac905016f120852abcc67a37fa7a55,2024-06-11T13:54:12.057000 CVE-2024-5531,0,0,aff596c4345d9e9649e4107c993c40fc7416a56fa205089ee8692b6e8ba6cecf,2024-06-11T13:54:12.057000 -CVE-2024-5536,0,0,68edb52432771856b464d791aa7fccb8518cf1ab9cd2d253ae0bbced65da7ce5,2024-06-05T12:53:50.240000 +CVE-2024-5536,0,1,d892d63cd79e6d462fe4485ce154b4e3b14e14d416b8b4d67114661d27280a01,2024-06-11T17:28:37.343000 CVE-2024-5537,0,0,071475eb8c0f92cc8ea9522d658283ad0e8213ba6740ff46ee05e5b24c18c3d8,2024-05-30T17:15:34.583000 CVE-2024-5538,0,0,183cea799fa9410e329e72f326a10b8369aedcea9a5b7583a44bf33ecc305070,2024-05-31T11:15:09.923000 CVE-2024-5542,0,0,8ccc4287bba5600d74ad82166ef7f79930f1e9599cd69c87e841ee0b8a07d91e,2024-06-07T14:56:05.647000 @@ -253406,7 +253480,7 @@ CVE-2024-5550,0,0,e4fc13aea5b719d7c555043aa9a8be47a59e2f4d5eac2e9fa0d5ff8a8edb89 CVE-2024-5552,0,0,12abaaddd513e722275738643d6cd32f6bb9e257da98294dd5bedf4ad4cbf55d,2024-06-07T14:56:05.647000 CVE-2024-5564,0,0,cd961630c6982ea90916e9cc290067a2c4a02a79292d87af6b0ec76760478ca9,2024-06-03T14:46:24.250000 CVE-2024-5565,0,0,830316f5c713618fdad4a0eda5b7296c22d5d93c87a8813197db3ff9cf28c4ee,2024-05-31T19:14:47.793000 -CVE-2024-5571,0,0,5bd1fe120d21671f33dde8145e3554ed59688f09b1ce68450c982cea21578a28,2024-06-05T12:53:50.240000 +CVE-2024-5571,0,1,105c4e644019eeccf72c6e63813cdc36601b1b9a7e3cba5bc172df86631261e6,2024-06-11T17:29:03.277000 CVE-2024-5584,0,0,612eacfcf6c3fd3d6fdd0ff2c66e496cc817b02568ea9f69c40277bbc0300578,2024-06-11T13:54:12.057000 CVE-2024-5585,0,0,1487df8744fe8ecf0253c67a66b56f57202f3afba3c94d1b8cf69e336fd86374,2024-06-10T17:16:35.090000 CVE-2024-5587,0,0,9180b0762a5a5a7a17ce70cd861bdf25e955d88caf903bee442f7c48a0a2a218,2024-06-03T14:46:24.250000 @@ -253419,21 +253493,21 @@ CVE-2024-5607,0,0,9601597658129a089207c1a0e7e7267aceda952302ad39754d738e73075495 CVE-2024-5609,0,0,f28c83e3e9d04345913d36de3bfdbd0d644d73b3d20045d9399b3368319c8d47,2024-06-06T19:16:09.920000 CVE-2024-5612,0,0,24bfbb6efa391db3014703335fcf10e8f670f2b2b154031d8b7a312f92d36720,2024-06-07T14:56:05.647000 CVE-2024-5613,0,0,a70312e72946dc01e5773bf362f264fbeea974e5d21fd832d78ed858e17fda2e,2024-06-10T02:52:08.267000 -CVE-2024-5615,0,0,dfdd8083e38658aefaebc7b5807785dd5d1a6f267edc336d05736e15dd676d2d,2024-06-06T14:17:35.017000 +CVE-2024-5615,0,1,d715351de069ee256cfd127ce22346136f76094dbd1f6f173b336f3c2cdc9c0f,2024-06-11T17:55:16.103000 CVE-2024-5629,0,0,2b19d175fd80b16aa424307957676ae3dd964a506cce5329fc9e2ea04d26ec96,2024-06-06T14:17:35.017000 -CVE-2024-5635,0,0,52659e2d01d778304e15ab37045c46022c4069a3c8731467e974321467b4e93f,2024-06-05T12:53:50.240000 -CVE-2024-5636,0,0,91c7633063fc0e25ae4bc27fef13e1ae046fa9e0ed07eb7f70c8dff04b8a3d61,2024-06-07T17:15:52.007000 +CVE-2024-5635,0,1,2463dd00def60296c968660a2ba7a3c25845ea097c4cd305a7e3f2bd55658946,2024-06-11T16:47:04.413000 +CVE-2024-5636,0,1,82666e4630526d7fc8211dab0f89e7e17d4e982c91e038f44b209ae67bb471f3,2024-06-11T17:23:29.670000 CVE-2024-5637,0,0,ac3ce2f387cb57c22df0353acef752a2e3012aca45064cc36768fafeb33c665e,2024-06-07T14:56:05.647000 CVE-2024-5638,0,0,3e31d9a9cda5176311ba2573f14f1f6c24c4b311b85aba4406aff443862dd909,2024-06-10T02:52:08.267000 CVE-2024-5640,0,0,86163b3d741cee0a4e50ef8553f0c82f1f0c15bd48d022d2d250ef0f55c23f10,2024-06-07T14:56:05.647000 -CVE-2024-5645,0,0,c14f368d8ed33123f2e6f42b798410915cfa25d6cf41b8a76db4e578eb499f6a,2024-06-07T14:56:05.647000 +CVE-2024-5645,0,1,1faba0fd6e05694e3fff7011c206b3ecee3c45fddb7e6c575993af231224a181,2024-06-11T17:57:47.197000 CVE-2024-5653,0,0,283076b6ccce08ae3d1ddf9d7f5983a839d66c80929543a8a527d0bfdf86a2f9,2024-06-06T14:17:35.017000 CVE-2024-5654,0,0,07028f57aa6f824ef41630c48d024ed50edc65108f484063deba6656af8c1bd9,2024-06-10T02:52:08.267000 -CVE-2024-5656,0,0,a7559160060af60960775b59fcf9a889a9050ca35072283d48725aad9216d700,2024-06-06T14:17:35.017000 -CVE-2024-5657,0,0,12569736b65811760c104ffe44c005a90563f6ead899ef24284cb301d2b20013,2024-06-10T17:16:35.420000 +CVE-2024-5656,0,1,e083352e0dae5ffd1e0b85e17866af8879714e6bce96a19b052b700442d7f3a1,2024-06-11T17:54:54.870000 +CVE-2024-5657,0,1,223911cca93e713dc15810800584c4abe481e0e2143d3e3f3795c2d130280eb3,2024-06-11T17:40:47.823000 CVE-2024-5658,0,0,98dd1791aba772a78bc10961f613bb7fded77b86f43fee3005b5c11f1c0e8ff6,2024-06-10T18:15:38.597000 CVE-2024-5663,0,0,4219cddf3fa8452b2da186321633b0e4bfa4880ecae3dd0c2b13763943bd6e8e,2024-06-10T02:52:08.267000 -CVE-2024-5665,0,0,5e4ababc90a2e39b3d4d1e203020eb8969830364f7a48b1d58377c93970fb194,2024-06-06T14:17:35.017000 +CVE-2024-5665,0,1,cf98b8118d31a45b868938fcf4b0239a4be77d7cb3995f06e552251067a9cecd,2024-06-11T17:47:45.033000 CVE-2024-5673,0,0,2b97c4aa0854e874e2152f641b9e26d552d0e281c707d28d1559950d147e9b20,2024-06-06T14:17:35.017000 CVE-2024-5675,0,0,23df96502157a8a1b8ed8dc77efae91035ae89bac32a8d72d161dd897c3ed9b3,2024-06-06T14:17:35.017000 CVE-2024-5684,0,0,e3eb7824adca991e2b321db0e873b5ea845af748697fb0478fc397665f2692e1,2024-06-06T14:17:35.017000 @@ -253453,7 +253527,7 @@ CVE-2024-5699,0,0,b949f850e4c4079b463e32e2cd58b076e8b8024713a9727b47244a67dc641b CVE-2024-5700,0,0,d0dff9fde4bfb8d1879210f429c6601d85947aa0e560285b11bc2d0922bea700,2024-06-11T13:54:12.057000 CVE-2024-5701,0,0,d4e32e5841fb5c694dbc3b06ee89abb2a6307fcc124dd00bcd8ff23789ef2aca,2024-06-11T13:54:12.057000 CVE-2024-5702,0,0,0e924b3a52f427331bb1d92b1d224a35ba53d302ce0ec2c35d0cd344b115e5f1,2024-06-11T13:54:12.057000 -CVE-2024-5732,0,0,164b158659f154321408f970302d5931abbeea5b0cb278b288a24fa0afd832a5,2024-06-07T15:15:51.007000 +CVE-2024-5732,0,1,2b69cb5542c2f91e3e2021ac007049b3634a9137bdf0c325241236594abc7cc6,2024-06-11T17:57:13.767000 CVE-2024-5733,0,0,912af201a333601d8ad85caf06bb206334f6fa2fa638d7d63d5571cfacf454d4,2024-06-07T14:56:05.647000 CVE-2024-5734,0,0,6c2e32afe9f36cd041d920f75c3584a92a72063480e933c9394a66845b572658,2024-06-07T17:15:52.140000 CVE-2024-5745,0,0,8788b99580d43fd9eb900afb700ee157c954d289b603d58451eabd57873852f0,2024-06-08T04:15:10.027000 @@ -253468,5 +253542,7 @@ CVE-2024-5774,0,0,e971b384347a7cc0930e1395d23c05a358789e404b21920ddd898b3d929aff CVE-2024-5775,0,0,b9b29144baa0c961ebc0dbd2fb84e489ca3d89ccfbfe0ff78eaf8a4e3245c00b,2024-06-10T11:15:49.933000 CVE-2024-5785,0,0,9826b5aaa33b29bbb943547624c099322eebf243c8fefca7bc1b316af4cf2a62,2024-06-10T18:06:22.600000 CVE-2024-5786,0,0,1f75ee06acd19f83f11a6972076ed1b01909c541516fb3c8be9392bde53f67b2,2024-06-10T18:06:22.600000 +CVE-2024-5812,1,1,d575f250532152186ae1730a95904983d1eeca8cedc4e48cf08c6f7cb36548d3,2024-06-11T16:15:29.207000 +CVE-2024-5813,1,1,ce4a3354f5a4e16f73ac84191b89ae8910ac4de1cfa4c74cc4624e1e37872032,2024-06-11T16:15:29.480000 CVE-2024-5825,0,0,800930249192b4fb36871d2a50a6622621c6dfa5eae6376e2c2995741b4630b2,2024-06-11T10:15:13.960000 -CVE-2024-5829,0,1,ece2333b3f7675cb0340d51c6d538163a9e25ac5d3d71e718ed0157d499370ee,2024-06-11T14:15:13.150000 +CVE-2024-5829,0,0,ece2333b3f7675cb0340d51c6d538163a9e25ac5d3d71e718ed0157d499370ee,2024-06-11T14:15:13.150000