diff --git a/CVE-2024/CVE-2024-345xx/CVE-2024-34524.json b/CVE-2024/CVE-2024-345xx/CVE-2024-34524.json new file mode 100644 index 00000000000..342594c4085 --- /dev/null +++ b/CVE-2024/CVE-2024-345xx/CVE-2024-34524.json @@ -0,0 +1,24 @@ +{ + "id": "CVE-2024-34524", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-05-06T00:15:10.073", + "lastModified": "2024-05-06T00:15:10.073", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "In XLANG OpenAgents through fe73ac4, the allowed_file protection mechanism can be bypassed by using an incorrect file extension for the nature of the file content." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/xlang-ai/OpenAgents/blob/880e26adfe380e999962fc645fc8fc80bd72f103/backend/utils/utils.py#L31", + "source": "cve@mitre.org" + }, + { + "url": "https://github.com/xlang-ai/OpenAgents/issues/112", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-345xx/CVE-2024-34525.json b/CVE-2024/CVE-2024-345xx/CVE-2024-34525.json new file mode 100644 index 00000000000..b94d78e6a31 --- /dev/null +++ b/CVE-2024/CVE-2024-345xx/CVE-2024-34525.json @@ -0,0 +1,20 @@ +{ + "id": "CVE-2024-34525", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-05-06T00:15:10.143", + "lastModified": "2024-05-06T00:15:10.143", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "FileCodeBox 2.0 stores a OneDrive password and AWS key in a cleartext env file." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/vastsa/FileCodeBox/issues/133", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-345xx/CVE-2024-34527.json b/CVE-2024/CVE-2024-345xx/CVE-2024-34527.json new file mode 100644 index 00000000000..d466554ce53 --- /dev/null +++ b/CVE-2024/CVE-2024-345xx/CVE-2024-34527.json @@ -0,0 +1,24 @@ +{ + "id": "CVE-2024-34527", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-05-06T00:15:10.207", + "lastModified": "2024-05-06T00:15:10.207", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "spaces_plugin/app.py in SolidUI 0.4.0 has an unnecessary print statement for an OpenAI key. The printed string might be logged." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/CloudOrc/SolidUI/blob/00d96b53bd0acf082996cef45b0f292eaba22fb7/solidui/spaces_plugin/app.py#L77", + "source": "cve@mitre.org" + }, + { + "url": "https://github.com/CloudOrc/SolidUI/issues/279", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-345xx/CVE-2024-34528.json b/CVE-2024/CVE-2024-345xx/CVE-2024-34528.json new file mode 100644 index 00000000000..3095dd1da21 --- /dev/null +++ b/CVE-2024/CVE-2024-345xx/CVE-2024-34528.json @@ -0,0 +1,24 @@ +{ + "id": "CVE-2024-34528", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-05-06T00:15:10.263", + "lastModified": "2024-05-06T00:15:10.263", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "WordOps through 3.20.0 has a wo/cli/plugins/stack_pref.py TOCTOU race condition because the conf_path os.open does not use a mode parameter during file creation." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/WordOps/WordOps/blob/ecf20192c7853925e2cb3f8c8378cd0d86ca0d62/wo/cli/plugins/stack_pref.py#L77", + "source": "cve@mitre.org" + }, + { + "url": "https://github.com/WordOps/WordOps/issues/611", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-345xx/CVE-2024-34529.json b/CVE-2024/CVE-2024-345xx/CVE-2024-34529.json new file mode 100644 index 00000000000..e518ce4432b --- /dev/null +++ b/CVE-2024/CVE-2024-345xx/CVE-2024-34529.json @@ -0,0 +1,24 @@ +{ + "id": "CVE-2024-34529", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-05-06T00:15:10.320", + "lastModified": "2024-05-06T00:15:10.320", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Nebari through 2024.4.1 prints the temporary Keycloak root password." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/nebari-dev/nebari/blob/5463e8df9e8d53a266a7b9d3d4e27353ec43c40b/src/_nebari/deploy.py#L71", + "source": "cve@mitre.org" + }, + { + "url": "https://github.com/nebari-dev/nebari/issues/2282", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-45xx/CVE-2024-4507.json b/CVE-2024/CVE-2024-45xx/CVE-2024-4507.json new file mode 100644 index 00000000000..c3cf24aa1e2 --- /dev/null +++ b/CVE-2024/CVE-2024-45xx/CVE-2024-4507.json @@ -0,0 +1,92 @@ +{ + "id": "CVE-2024-4507", + "sourceIdentifier": "cna@vuldb.com", + "published": "2024-05-06T00:15:10.387", + "lastModified": "2024-05-06T00:15:10.387", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability was found in Ruijie RG-UAC up to 20240428 and classified as critical. This issue affects some unknown processing of the file /view/IPV6/ipv6StaticRoute/static_route_add_ipv6.php. The manipulation of the argument text_prefixlen/text_gateway/devname leads to os command injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-263111. NOTE: The vendor was contacted early about this disclosure but did not respond in any way." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 4.7, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.2, + "impactScore": 3.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:M/C:P/I:P/A:P", + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "MULTIPLE", + "confidentialityImpact": "PARTIAL", + "integrityImpact": "PARTIAL", + "availabilityImpact": "PARTIAL", + "baseScore": 5.8 + }, + "baseSeverity": "MEDIUM", + "exploitabilityScore": 6.4, + "impactScore": 6.4, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-78" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/h0e4a0r1t/-2x3J-1rPc-1-0-/blob/main/Ruijie%20RG-UAC%20Unified%20Internet%20Behavior%20Management%20Audit%20System%20Backend%20RCE%20Vulnerability-static_route_add_ipv6.php.pdf", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.263111", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.263111", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.323817", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-45xx/CVE-2024-4508.json b/CVE-2024/CVE-2024-45xx/CVE-2024-4508.json new file mode 100644 index 00000000000..b2dd7ad2bfb --- /dev/null +++ b/CVE-2024/CVE-2024-45xx/CVE-2024-4508.json @@ -0,0 +1,92 @@ +{ + "id": "CVE-2024-4508", + "sourceIdentifier": "cna@vuldb.com", + "published": "2024-05-06T01:15:48.057", + "lastModified": "2024-05-06T01:15:48.057", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability was found in Ruijie RG-UAC up to 20240428. It has been classified as critical. Affected is an unknown function of the file /view/IPV6/ipv6StaticRoute/static_route_edit_ipv6.php. The manipulation of the argument oldipmask/oldgateway/olddevname leads to os command injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-263112. NOTE: The vendor was contacted early about this disclosure but did not respond in any way." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 4.7, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.2, + "impactScore": 3.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:M/C:P/I:P/A:P", + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "MULTIPLE", + "confidentialityImpact": "PARTIAL", + "integrityImpact": "PARTIAL", + "availabilityImpact": "PARTIAL", + "baseScore": 5.8 + }, + "baseSeverity": "MEDIUM", + "exploitabilityScore": 6.4, + "impactScore": 6.4, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-78" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/h0e4a0r1t/-2x3J-1rPc-1-0-/blob/main/Ruijie%20RG-UAC%20Unified%20Internet%20Behavior%20Management%20Audit%20System%20Backend%20RCE%20Vulnerability-static_route_edit_ipv6.php.pdf", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.263112", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.263112", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.323818", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-45xx/CVE-2024-4509.json b/CVE-2024/CVE-2024-45xx/CVE-2024-4509.json new file mode 100644 index 00000000000..6c9996454d5 --- /dev/null +++ b/CVE-2024/CVE-2024-45xx/CVE-2024-4509.json @@ -0,0 +1,92 @@ +{ + "id": "CVE-2024-4509", + "sourceIdentifier": "cna@vuldb.com", + "published": "2024-05-06T01:15:48.353", + "lastModified": "2024-05-06T01:15:48.353", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability was found in Ruijie RG-UAC up to 20240428. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file /view/IPV6/naborTable/add_commit.php. The manipulation of the argument ip_addr/mac_addr leads to os command injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-263113 was assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 4.7, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.2, + "impactScore": 3.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:M/C:P/I:P/A:P", + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "MULTIPLE", + "confidentialityImpact": "PARTIAL", + "integrityImpact": "PARTIAL", + "availabilityImpact": "PARTIAL", + "baseScore": 5.8 + }, + "baseSeverity": "MEDIUM", + "exploitabilityScore": 6.4, + "impactScore": 6.4, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-78" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/h0e4a0r1t/-2x3J-1rPc-1-0-/blob/main/Ruijie%20RG-UAC%20Unified%20Internet%20Behavior%20Management%20Audit%20System%20Backend%20RCE%20Vulnerability-add_commit.php.pdf", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.263113", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.263113", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.323819", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-45xx/CVE-2024-4510.json b/CVE-2024/CVE-2024-45xx/CVE-2024-4510.json new file mode 100644 index 00000000000..d90667ad32c --- /dev/null +++ b/CVE-2024/CVE-2024-45xx/CVE-2024-4510.json @@ -0,0 +1,92 @@ +{ + "id": "CVE-2024-4510", + "sourceIdentifier": "cna@vuldb.com", + "published": "2024-05-06T01:15:48.643", + "lastModified": "2024-05-06T01:15:48.643", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability was found in Ruijie RG-UAC up to 20240428. It has been rated as critical. Affected by this issue is some unknown functionality of the file /view/networkConfig/ArpTable/arp_add_commit.php. The manipulation of the argument text_ip_addr/text_mac_addr leads to os command injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB-263114 is the identifier assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 4.7, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.2, + "impactScore": 3.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:M/C:P/I:P/A:P", + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "MULTIPLE", + "confidentialityImpact": "PARTIAL", + "integrityImpact": "PARTIAL", + "availabilityImpact": "PARTIAL", + "baseScore": 5.8 + }, + "baseSeverity": "MEDIUM", + "exploitabilityScore": 6.4, + "impactScore": 6.4, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-78" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/h0e4a0r1t/-2x3J-1rPc-1-0-/blob/main/Ruijie%20RG-UAC%20Unified%20Internet%20Behavior%20Management%20Audit%20System%20Backend%20RCE%20Vulnerability-arp_add_commit.php.pdf", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.263114", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.263114", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.323820", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-45xx/CVE-2024-4511.json b/CVE-2024/CVE-2024-45xx/CVE-2024-4511.json new file mode 100644 index 00000000000..b6fece12dd0 --- /dev/null +++ b/CVE-2024/CVE-2024-45xx/CVE-2024-4511.json @@ -0,0 +1,96 @@ +{ + "id": "CVE-2024-4511", + "sourceIdentifier": "cna@vuldb.com", + "published": "2024-05-06T01:15:48.940", + "lastModified": "2024-05-06T01:15:48.940", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability classified as critical has been found in Shanghai Sunfull Automation BACnet Server HMI1002-ARM 2.0.4. This affects an unknown part of the component Message Handler. The manipulation leads to buffer overflow. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-263115. NOTE: The vendor was contacted early about this disclosure but did not respond in any way." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 6.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:A/AC:L/Au:N/C:P/I:P/A:P", + "accessVector": "ADJACENT_NETWORK", + "accessComplexity": "LOW", + "authentication": "NONE", + "confidentialityImpact": "PARTIAL", + "integrityImpact": "PARTIAL", + "availabilityImpact": "PARTIAL", + "baseScore": 5.8 + }, + "baseSeverity": "MEDIUM", + "exploitabilityScore": 6.5, + "impactScore": 6.4, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-120" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/isZzzz/HMI1002-ARM-Gateway-Document/blob/main/HMI1002-ARM%20apply.pdf", + "source": "cna@vuldb.com" + }, + { + "url": "https://github.com/isZzzz/HMI1002-ARM-Gateway-Document/blob/main/sunfull_bug.pcapng", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.263115", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.263115", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.323832", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/README.md b/README.md index 320542190c0..fff990a7376 100644 --- a/README.md +++ b/README.md @@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2024-05-05T23:55:30.245075+00:00 +2024-05-06T02:00:30.468329+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2024-05-05T23:15:30.673000+00:00 +2024-05-06T01:15:48.940000+00:00 ``` ### Last Data Feed Release @@ -27,32 +27,35 @@ Repository synchronizes with the NVD every 2 hours. Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/releases/latest) ```plain -2024-05-05T00:00:20.255542+00:00 +2024-05-06T00:00:20.275707+00:00 ``` ### Total Number of included CVEs ```plain -248635 +248645 ``` ### CVEs added in the last Commit -Recently added CVEs: `6` +Recently added CVEs: `10` -- [CVE-2024-34519](CVE-2024/CVE-2024-345xx/CVE-2024-34519.json) (`2024-05-05T22:15:07.563`) -- [CVE-2024-4502](CVE-2024/CVE-2024-45xx/CVE-2024-4502.json) (`2024-05-05T22:15:07.623`) -- [CVE-2024-4503](CVE-2024/CVE-2024-45xx/CVE-2024-4503.json) (`2024-05-05T22:15:07.927`) -- [CVE-2024-4504](CVE-2024/CVE-2024-45xx/CVE-2024-4504.json) (`2024-05-05T23:15:30.083`) -- [CVE-2024-4505](CVE-2024/CVE-2024-45xx/CVE-2024-4505.json) (`2024-05-05T23:15:30.377`) -- [CVE-2024-4506](CVE-2024/CVE-2024-45xx/CVE-2024-4506.json) (`2024-05-05T23:15:30.673`) +- [CVE-2024-34524](CVE-2024/CVE-2024-345xx/CVE-2024-34524.json) (`2024-05-06T00:15:10.073`) +- [CVE-2024-34525](CVE-2024/CVE-2024-345xx/CVE-2024-34525.json) (`2024-05-06T00:15:10.143`) +- [CVE-2024-34527](CVE-2024/CVE-2024-345xx/CVE-2024-34527.json) (`2024-05-06T00:15:10.207`) +- [CVE-2024-34528](CVE-2024/CVE-2024-345xx/CVE-2024-34528.json) (`2024-05-06T00:15:10.263`) +- [CVE-2024-34529](CVE-2024/CVE-2024-345xx/CVE-2024-34529.json) (`2024-05-06T00:15:10.320`) +- [CVE-2024-4507](CVE-2024/CVE-2024-45xx/CVE-2024-4507.json) (`2024-05-06T00:15:10.387`) +- [CVE-2024-4508](CVE-2024/CVE-2024-45xx/CVE-2024-4508.json) (`2024-05-06T01:15:48.057`) +- [CVE-2024-4509](CVE-2024/CVE-2024-45xx/CVE-2024-4509.json) (`2024-05-06T01:15:48.353`) +- [CVE-2024-4510](CVE-2024/CVE-2024-45xx/CVE-2024-4510.json) (`2024-05-06T01:15:48.643`) +- [CVE-2024-4511](CVE-2024/CVE-2024-45xx/CVE-2024-4511.json) (`2024-05-06T01:15:48.940`) ### CVEs modified in the last Commit -Recently modified CVEs: `1` +Recently modified CVEs: `0` -- [CVE-2023-52723](CVE-2023/CVE-2023-527xx/CVE-2023-52723.json) (`2024-05-05T22:15:07.487`) ## Download and Usage diff --git a/_state.csv b/_state.csv index 8b7d5722819..cae729b032a 100644 --- a/_state.csv +++ b/_state.csv @@ -237539,7 +237539,7 @@ CVE-2023-52716,0,0,fac095701883d01d5f92e56c70701dc066b3ae8f92d0c5921c5cf0aa2fbb0 CVE-2023-52717,0,0,e713315d9fcc50e6cbb98e0dd380e2c86ba52b63a35d352b23f2645ee0f83a24,2024-04-08T18:48:40.217000 CVE-2023-5272,0,0,e188ff056a72e73c412c109b97d5eb37c41b2dbce71d285e9dfeb205fc3a7064,2024-04-11T01:22:56.733000 CVE-2023-52722,0,0,98127abf72f40ccdfd330396916afd82fb054ba100d5c84d9a9427744af0fae8,2024-04-29T12:42:03.667000 -CVE-2023-52723,0,1,583a4c96a7b28499ddb7ff561365e6e19aba033c74ad8d268661d6153971a1dd,2024-05-05T22:15:07.487000 +CVE-2023-52723,0,0,583a4c96a7b28499ddb7ff561365e6e19aba033c74ad8d268661d6153971a1dd,2024-05-05T22:15:07.487000 CVE-2023-52724,0,0,e4f95bcab1195f846dc270610c1bdc3ac2e4854ca9278c47b39a202d9f9600b6,2024-04-30T13:11:16.690000 CVE-2023-52725,0,0,88d4f88411bb4be959efdeb51d80e463c208ec56315d110e44fcff8343b01a06,2024-04-30T13:11:16.690000 CVE-2023-52726,0,0,5e306dbe5f156c9416e227d0fff184c45bfebf2f1e4b91c9c4b65ae3bc844b98,2024-04-30T13:11:16.690000 @@ -248201,7 +248201,12 @@ CVE-2024-34509,0,0,6bf2150b2596626c514845d30540487bb1d950ccdf706219c76a6afbc5cfd CVE-2024-34510,0,0,70c105ba345d0fa8609a9db9459099b788908b71b0b900afc0747ce8d55f49a3,2024-05-05T20:15:07.417000 CVE-2024-34511,0,0,4e86e2a278a7abc19602c23a8e6582af1482bd970eb4f4e0c89a29dca169ee47,2024-05-05T20:15:07.627000 CVE-2024-34515,0,0,3c778723bf571e048a4b56610d5bfcf3e49a1dece61fe69668baa7b58396004a,2024-05-05T21:15:55.650000 -CVE-2024-34519,1,1,ff08f781b18880538cd447086482a9c2019e6851e3e318f99fcac49c6db575d1,2024-05-05T22:15:07.563000 +CVE-2024-34519,0,0,ff08f781b18880538cd447086482a9c2019e6851e3e318f99fcac49c6db575d1,2024-05-05T22:15:07.563000 +CVE-2024-34524,1,1,4380f7e0f0bd9f9b63e2f71e6794da210447c38caf2cee08a0e9818cdecb284a,2024-05-06T00:15:10.073000 +CVE-2024-34525,1,1,7a2a3960e7fb056dc4ee24385f8da723ad5f4722b55d5d503e20c5e721f029b4,2024-05-06T00:15:10.143000 +CVE-2024-34527,1,1,233ce244623e758c8a2a41d86e12ad7b7917f1e61355124595316fba0fb2dff9,2024-05-06T00:15:10.207000 +CVE-2024-34528,1,1,85844f4e301aa48e36dac7455ba8ffb633e75b91da27d6c61177d3ddd34fc81a,2024-05-06T00:15:10.263000 +CVE-2024-34529,1,1,24813c101f8f4e4784573065570db3ab64ef3a50b95e6e4568340ad437f5f38c,2024-05-06T00:15:10.320000 CVE-2024-3455,0,0,18e948f1ff2182718852b2ba697f0fa9a8598811bb1c2e87509c3bd543b90a57,2024-04-11T01:26:03.233000 CVE-2024-3456,0,0,944b33373fddc7621692e3fce6708723c7abc962139d88da65ad0c4ce610f104,2024-04-11T01:26:03.310000 CVE-2024-3457,0,0,eda30bdfb17395ab91987b75a43f4990cc086dc3cfa77a90fc0cb388efd5e793,2024-04-11T01:26:03.387000 @@ -248629,8 +248634,13 @@ CVE-2024-4496,0,0,e1fcc45b1034f985f4823efe20fe933874806e2d2221fef290013797f50d09 CVE-2024-4497,0,0,ccd8c07caa7e538c008422f1f8d5b32bba85ed00504a43d05b15927b41ba1488,2024-05-05T07:15:06.463000 CVE-2024-4500,0,0,ff5efd9f33021e890cd375fe167f7344647ce437a4cb036a2626992a1c802eda,2024-05-05T18:15:27.753000 CVE-2024-4501,0,0,7d84c8624ffa9e467ffa6080915f7901ab1d1e830d9f877fb7181460457121f5,2024-05-05T20:15:07.923000 -CVE-2024-4502,1,1,ce4ff076eb826a8aa73ad98b8d4795ac10b199c57e413ecdab0d4827e4b779f1,2024-05-05T22:15:07.623000 -CVE-2024-4503,1,1,ea57e2e9f66eb184b782d41149d1f80f1c84bb5e1ae57a71494c64f4e742f47e,2024-05-05T22:15:07.927000 -CVE-2024-4504,1,1,24932f91fc45aefa51c7342937d4549ac6f96aee8afc0012b20f7eaec2bd5660,2024-05-05T23:15:30.083000 -CVE-2024-4505,1,1,8fd7784498ae958779a4f7bbbffa4f2fba67e7c4d2b175ce3313d0d38efef96a,2024-05-05T23:15:30.377000 -CVE-2024-4506,1,1,08b373214d4a28df4e063caeee7262d68425f0368b4960fe913f6afb094bc0a8,2024-05-05T23:15:30.673000 +CVE-2024-4502,0,0,ce4ff076eb826a8aa73ad98b8d4795ac10b199c57e413ecdab0d4827e4b779f1,2024-05-05T22:15:07.623000 +CVE-2024-4503,0,0,ea57e2e9f66eb184b782d41149d1f80f1c84bb5e1ae57a71494c64f4e742f47e,2024-05-05T22:15:07.927000 +CVE-2024-4504,0,0,24932f91fc45aefa51c7342937d4549ac6f96aee8afc0012b20f7eaec2bd5660,2024-05-05T23:15:30.083000 +CVE-2024-4505,0,0,8fd7784498ae958779a4f7bbbffa4f2fba67e7c4d2b175ce3313d0d38efef96a,2024-05-05T23:15:30.377000 +CVE-2024-4506,0,0,08b373214d4a28df4e063caeee7262d68425f0368b4960fe913f6afb094bc0a8,2024-05-05T23:15:30.673000 +CVE-2024-4507,1,1,234e48b623e7067e4a226d34964b814cf978b5e4b1bbaff4af6974b0e6002fb9,2024-05-06T00:15:10.387000 +CVE-2024-4508,1,1,a16352f43bb1c05613e650d355256adce31de71ad69bfdde52fb2f51f53b6702,2024-05-06T01:15:48.057000 +CVE-2024-4509,1,1,ac078b9c4d73a8fac444f70d9872c5ac45fcd501a78cc0e4b13317d6a0341cae,2024-05-06T01:15:48.353000 +CVE-2024-4510,1,1,181227f06a102aa0a19b4f3de8426a191fa4d65b15ad5d5e90ba15cdbab92f1e,2024-05-06T01:15:48.643000 +CVE-2024-4511,1,1,1f4b35a0d5ce5c5f15b32a51c1d626c5577abf1a3c35a116f1a7ba7cc5725841,2024-05-06T01:15:48.940000