Auto-Update: 2024-06-04T08:00:38.256761+00:00

This commit is contained in:
cad-safe-bot 2024-06-04 08:03:31 +00:00
parent 3985b4ea5d
commit 97b2341cf2
42 changed files with 1714 additions and 6 deletions

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2023-28494",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-06-04T07:15:41.913",
"lastModified": "2024-06-04T07:15:41.913",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Missing Authorization vulnerability in CodePeople Contact Form Email allows Functionality Misuse.This issue affects Contact Form Email: from n/a through 1.3.31."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-862"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/contact-form-to-email/wordpress-contact-form-email-plugin-1-3-31-missing-authorization-leading-to-feedback-submission-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2023-33930",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-06-04T07:15:42.433",
"lastModified": "2024-06-04T07:15:42.433",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Unrestricted Upload of File with Dangerous Type vulnerability in Unlimited Elements Unlimited Elements For Elementor (Free Widgets, Addons, Templates) allows Code Injection.This issue affects Unlimited Elements For Elementor (Free Widgets, Addons, Templates): from n/a through 1.5.66."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.1,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 2.3,
"impactScore": 6.0
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-434"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/unlimited-elements-for-elementor/wordpress-unlimited-elements-for-elementor-plugin-1-5-66-unrestricted-zip-extraction-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2023-34001",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-06-04T07:15:42.770",
"lastModified": "2024-06-04T07:15:42.770",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Improper Restriction of Excessive Authentication Attempts vulnerability in WPPlugins \u2013 WordPress Security Plugins Hide My WP Ghost allows Functionality Bypass.This issue affects Hide My WP Ghost: from n/a through 5.0.25."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 5.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 3.9,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-307"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/hide-my-wp/wordpress-hide-my-wp-ghost-security-plugin-plugin-5-0-24-captcha-bypass-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2023-37865",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-06-04T07:15:43.127",
"lastModified": "2024-06-04T07:15:43.127",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Authentication Bypass by Spoofing vulnerability in IP2Location Download IP2Location Country Blocker allows Accessing Functionality Not Properly Constrained by ACLs.This issue affects Download IP2Location Country Blocker: from n/a through 2.29.1."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 5.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 3.9,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-290"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/ip2location-country-blocker/wordpress-ip2location-country-blocker-plugin-2-29-1-ip-bypass-vulnerability-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2024-0757",
"sourceIdentifier": "contact@wpscan.com",
"published": "2024-06-04T06:15:08.707",
"lastModified": "2024-06-04T06:15:08.707",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "The Insert or Embed Articulate Content into WordPress plugin through 4.3000000023 is not properly filtering which file extensions are allowed to be imported on the server, allowing the uploading of malicious code within zip files"
}
],
"metrics": {},
"references": [
{
"url": "https://wpscan.com/vulnerability/eccd017c-e442-46b6-b5e6-aec7bbd5f836/",
"source": "contact@wpscan.com"
}
]
}

View File

@ -0,0 +1,47 @@
{
"id": "CVE-2024-1717",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-06-04T06:15:08.880",
"lastModified": "2024-06-04T06:15:08.880",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "The Admin Notices Manager plugin for WordPress is vulnerable to unauthorized access of data due to a missing capability check on the handle_ajax_call() function in all versions up to, and including, 1.4.0. This makes it possible for authenticated attackers, with subscriber-level access and above, to retrieve a list of registered user emails."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security@wordfence.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 1.4
}
]
},
"references": [
{
"url": "https://plugins.trac.wordpress.org/browser/admin-notices-manager/trunk/vendor/wpwhitesecurity/select2-wpwhitesecurity/load.php#L58",
"source": "security@wordfence.com"
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/0849d86b-5cf1-4346-a9e9-a54768837969?source=cve",
"source": "security@wordfence.com"
}
]
}

View File

@ -0,0 +1,47 @@
{
"id": "CVE-2024-1718",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-06-04T06:15:09.180",
"lastModified": "2024-06-04T06:15:09.180",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "The Claudio Sanches \u2013 Checkout Cielo for WooCommerce plugin for WordPress is vulnerable to unauthorized modification of data due to insufficient payment validation in the update_order_status() function in all versions up to, and including, 1.1.0. This makes it possible for unauthenticated attackers to update the status of orders to paid bypassing payment."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security@wordfence.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 5.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 3.9,
"impactScore": 1.4
}
]
},
"references": [
{
"url": "https://plugins.trac.wordpress.org/browser/woocommerce-checkout-cielo/trunk/includes/class-wc-checkout-cielo-gateway.php#L296",
"source": "security@wordfence.com"
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/40cb3214-a11b-4bee-9422-256d12303460?source=cve",
"source": "security@wordfence.com"
}
]
}

View File

@ -0,0 +1,43 @@
{
"id": "CVE-2024-20873",
"sourceIdentifier": "mobile.security@samsung.com",
"published": "2024-06-04T07:15:43.480",
"lastModified": "2024-06-04T07:15:43.480",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Improper input validation vulnerability in caminfo driver prior to SMR Jun-2024 Release 1 allows local privileged attackers to write out-of-bounds memory."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "mobile.security@samsung.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW",
"baseScore": 4.2,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 0.8,
"impactScore": 3.4
}
]
},
"references": [
{
"url": "https://security.samsungmobile.com/securityUpdate.smsb?year=2024&month=06",
"source": "mobile.security@samsung.com"
}
]
}

View File

@ -0,0 +1,43 @@
{
"id": "CVE-2024-20874",
"sourceIdentifier": "mobile.security@samsung.com",
"published": "2024-06-04T07:15:43.770",
"lastModified": "2024-06-04T07:15:43.770",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Improper access control vulnerability in SmartManagerCN prior to SMR Jun-2024 Release 1 allows local attackers to launch privileged activities."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "mobile.security@samsung.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:H/A:L",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"availabilityImpact": "LOW",
"baseScore": 7.9,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.5,
"impactScore": 4.7
}
]
},
"references": [
{
"url": "https://security.samsungmobile.com/securityUpdate.smsb?year=2024&month=06",
"source": "mobile.security@samsung.com"
}
]
}

View File

@ -0,0 +1,43 @@
{
"id": "CVE-2024-20875",
"sourceIdentifier": "mobile.security@samsung.com",
"published": "2024-06-04T07:15:44.047",
"lastModified": "2024-06-04T07:15:44.047",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Improper caller verification vulnerability in SemClipboard prior to SMR June-2024 Release 1 allows local attackers to access arbitrary files."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "mobile.security@samsung.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.0,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.5,
"impactScore": 1.4
}
]
},
"references": [
{
"url": "https://security.samsungmobile.com/securityUpdate.smsb?year=2024&month=06",
"source": "mobile.security@samsung.com"
}
]
}

View File

@ -0,0 +1,43 @@
{
"id": "CVE-2024-20876",
"sourceIdentifier": "mobile.security@samsung.com",
"published": "2024-06-04T07:15:44.313",
"lastModified": "2024-06-04T07:15:44.313",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Improper input validation in libsheifdecadapter.so prior to SMR Jun-2024 Release 1 allows local attackers to lead to memory corruption."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "mobile.security@samsung.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "HIGH",
"baseScore": 6.1,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.8,
"impactScore": 4.2
}
]
},
"references": [
{
"url": "https://security.samsungmobile.com/securityUpdate.smsb?year=2024&month=06",
"source": "mobile.security@samsung.com"
}
]
}

View File

@ -0,0 +1,43 @@
{
"id": "CVE-2024-20877",
"sourceIdentifier": "mobile.security@samsung.com",
"published": "2024-06-04T07:15:44.583",
"lastModified": "2024-06-04T07:15:44.583",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Heap out-of-bound write vulnerability in parsing grid image header in libsavscmn.so prior to SMR Jun-2024 Release 1 allows local attackers to execute arbitrary code."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "mobile.security@samsung.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:L",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "HIGH",
"availabilityImpact": "LOW",
"baseScore": 7.3,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.5,
"impactScore": 4.7
}
]
},
"references": [
{
"url": "https://security.samsungmobile.com/securityUpdate.smsb?year=2024&month=06",
"source": "mobile.security@samsung.com"
}
]
}

View File

@ -0,0 +1,43 @@
{
"id": "CVE-2024-20878",
"sourceIdentifier": "mobile.security@samsung.com",
"published": "2024-06-04T07:15:44.857",
"lastModified": "2024-06-04T07:15:44.857",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Heap out-of-bound write vulnerability in parsing grid image in libsavscmn.so prior to SMR June-2024 Release 1 allows local attackers to execute arbitrary code."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "mobile.security@samsung.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:L",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "HIGH",
"availabilityImpact": "LOW",
"baseScore": 7.3,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.5,
"impactScore": 4.7
}
]
},
"references": [
{
"url": "https://security.samsungmobile.com/securityUpdate.smsb?year=2024&month=06",
"source": "mobile.security@samsung.com"
}
]
}

View File

@ -0,0 +1,43 @@
{
"id": "CVE-2024-20879",
"sourceIdentifier": "mobile.security@samsung.com",
"published": "2024-06-04T07:15:45.160",
"lastModified": "2024-06-04T07:15:45.160",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Improper input validation vulnerability in libsavscmn.so prior to SMR Jun-2024 Release 1 allows local attackers to write out-of-bounds memory."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "mobile.security@samsung.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "LOW",
"baseScore": 4.0,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.5,
"impactScore": 1.4
}
]
},
"references": [
{
"url": "https://security.samsungmobile.com/securityUpdate.smsb?year=2024&month=06",
"source": "mobile.security@samsung.com"
}
]
}

View File

@ -0,0 +1,43 @@
{
"id": "CVE-2024-20880",
"sourceIdentifier": "mobile.security@samsung.com",
"published": "2024-06-04T07:15:45.453",
"lastModified": "2024-06-04T07:15:45.453",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Stack-based buffer overflow vulnerability in bootloader prior to SMR Jun-2024 Release 1 allows physical attackers to overwrite memory."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "mobile.security@samsung.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:L",
"attackVector": "PHYSICAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "LOW",
"baseScore": 6.4,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 0.9,
"impactScore": 5.5
}
]
},
"references": [
{
"url": "https://security.samsungmobile.com/securityUpdate.smsb?year=2024&month=06",
"source": "mobile.security@samsung.com"
}
]
}

View File

@ -0,0 +1,43 @@
{
"id": "CVE-2024-20881",
"sourceIdentifier": "mobile.security@samsung.com",
"published": "2024-06-04T07:15:45.743",
"lastModified": "2024-06-04T07:15:45.743",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Improper input validation vulnerability in chnactiv TA prior to SMR Jun-2024 Release 1 allows local privileged attackers lead to potential arbitrary code execution."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "mobile.security@samsung.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "HIGH",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 6.4,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 0.5,
"impactScore": 5.9
}
]
},
"references": [
{
"url": "https://security.samsungmobile.com/securityUpdate.smsb?year=2024&month=06",
"source": "mobile.security@samsung.com"
}
]
}

View File

@ -0,0 +1,43 @@
{
"id": "CVE-2024-20882",
"sourceIdentifier": "mobile.security@samsung.com",
"published": "2024-06-04T07:15:46.010",
"lastModified": "2024-06-04T07:15:46.010",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Out-of-bounds read vulnerability in bootloader prior to SMR June-2024 Release 1 allows physical attackers to arbitrary data access."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "mobile.security@samsung.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"attackVector": "PHYSICAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.6,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 0.9,
"impactScore": 3.6
}
]
},
"references": [
{
"url": "https://security.samsungmobile.com/securityUpdate.smsb?year=2024&month=06",
"source": "mobile.security@samsung.com"
}
]
}

View File

@ -0,0 +1,43 @@
{
"id": "CVE-2024-20883",
"sourceIdentifier": "mobile.security@samsung.com",
"published": "2024-06-04T07:15:46.290",
"lastModified": "2024-06-04T07:15:46.290",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Incorrect use of privileged API vulnerability in registerBatteryStatsCallback in BatteryStatsService prior to SMR Jun-2024 Release 1 allows local attackers to use privileged API."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "mobile.security@samsung.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 6.2,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.5,
"impactScore": 3.6
}
]
},
"references": [
{
"url": "https://security.samsungmobile.com/securityUpdate.smsb?year=2024&month=06",
"source": "mobile.security@samsung.com"
}
]
}

View File

@ -0,0 +1,43 @@
{
"id": "CVE-2024-20884",
"sourceIdentifier": "mobile.security@samsung.com",
"published": "2024-06-04T07:15:46.567",
"lastModified": "2024-06-04T07:15:46.567",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Incorrect use of privileged API vulnerability in getSemBatteryUsageStats in BatteryStatsService prior to SMR Jun-2024 Release 1 allows local attackers to use privileged API."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "mobile.security@samsung.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 6.2,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.5,
"impactScore": 3.6
}
]
},
"references": [
{
"url": "https://security.samsungmobile.com/securityUpdate.smsb?year=2024&month=06",
"source": "mobile.security@samsung.com"
}
]
}

View File

@ -0,0 +1,43 @@
{
"id": "CVE-2024-20885",
"sourceIdentifier": "mobile.security@samsung.com",
"published": "2024-06-04T07:15:46.837",
"lastModified": "2024-06-04T07:15:46.837",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Improper component protection vulnerability in Samsung Dialer prior to SMR May-2024 Release 1 allows local attackers to make a call without proper permission."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "mobile.security@samsung.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "LOW",
"baseScore": 5.1,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.5,
"impactScore": 2.5
}
]
},
"references": [
{
"url": "https://security.samsungmobile.com/securityUpdate.smsb?year=2024&month=06",
"source": "mobile.security@samsung.com"
}
]
}

View File

@ -0,0 +1,43 @@
{
"id": "CVE-2024-20886",
"sourceIdentifier": "mobile.security@samsung.com",
"published": "2024-06-04T07:15:47.120",
"lastModified": "2024-06-04T07:15:47.120",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Arbitrary directory creation in Samsung Live Wallpaper PC prior to version 3.3.8.0 allows attacker to create arbitrary directory."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "mobile.security@samsung.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 6.2,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.5,
"impactScore": 3.6
}
]
},
"references": [
{
"url": "https://security.samsungmobile.com/serviceWeb.smsb?year=2024&month=06",
"source": "mobile.security@samsung.com"
}
]
}

View File

@ -0,0 +1,43 @@
{
"id": "CVE-2024-20887",
"sourceIdentifier": "mobile.security@samsung.com",
"published": "2024-06-04T07:15:47.413",
"lastModified": "2024-06-04T07:15:47.413",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Arbitrary directory creation in GalaxyBudsManager PC prior to version 2.1.240315.51 allows attacker to create arbitrary directory."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "mobile.security@samsung.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 6.2,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.5,
"impactScore": 3.6
}
]
},
"references": [
{
"url": "https://security.samsungmobile.com/serviceWeb.smsb?year=2024&month=06",
"source": "mobile.security@samsung.com"
}
]
}

View File

@ -0,0 +1,47 @@
{
"id": "CVE-2024-2019",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-06-04T06:15:09.430",
"lastModified": "2024-06-04T06:15:09.430",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "The WP-DB-Table-Editor plugin for WordPress is vulnerable to unauthorized access of data, modification of data, and loss of data due to lack of a default capability requirement on the 'dbte_render' function in all versions up to, and including, 1.8.4. This makes it possible for authenticated attackers, with contributor access and above, to modify database tables that the theme has been configured to use the plugin to edit."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security@wordfence.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.6,
"impactScore": 5.9
}
]
},
"references": [
{
"url": "https://plugins.trac.wordpress.org/browser/wp-db-table-editor/trunk/db-table-editor.php",
"source": "security@wordfence.com"
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/2d044e0a-a956-4319-985d-6a9a276daf49?source=cve",
"source": "security@wordfence.com"
}
]
}

View File

@ -0,0 +1,47 @@
{
"id": "CVE-2024-2382",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-06-04T06:15:09.677",
"lastModified": "2024-06-04T06:15:09.677",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "The Authorize.net Payment Gateway For WooCommerce plugin for WordPress is vulnerable to payment bypass in all versions up to, and including, 8.0. This is due to the plugin not properly verifying the authenticity of the request that updates a orders payment status. This makes it possible for unauthenticated attackers to update order payment statuses to paid bypassing any payment."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security@wordfence.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 5.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 3.9,
"impactScore": 1.4
}
]
},
"references": [
{
"url": "https://plugins.trac.wordpress.org/browser/authorizenet-payment-gateway-for-woocommerce/trunk/index.php#L205",
"source": "security@wordfence.com"
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/4ab71d24-0409-421b-8abf-f4d5390a32a1?source=cve",
"source": "security@wordfence.com"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2024-2470",
"sourceIdentifier": "contact@wpscan.com",
"published": "2024-06-04T06:15:09.937",
"lastModified": "2024-06-04T06:15:09.937",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "The Simple Ajax Chat WordPress plugin before 20240412 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup)"
}
],
"metrics": {},
"references": [
{
"url": "https://wpscan.com/vulnerability/8514b8ce-ff23-4aba-b2f1-fd36beb7d2ff/",
"source": "contact@wpscan.com"
}
]
}

View File

@ -0,0 +1,47 @@
{
"id": "CVE-2024-3031",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-06-04T06:15:10.023",
"lastModified": "2024-06-04T06:15:10.023",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "The Fluid Notification Bar plugin for WordPress is vulnerable to Stored Cross-Site Scripting via admin settings in all versions up to, and including, 3.2.3 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with administrator-level permissions and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. This only affects multi-site installations and installations where unfiltered_html has been disabled."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security@wordfence.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 4.4,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.3,
"impactScore": 2.7
}
]
},
"references": [
{
"url": "https://wordpress.org/plugins/fluid-notification-bar/",
"source": "security@wordfence.com"
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/451ca8a1-9354-462a-a110-c0c813cf0725?source=cve",
"source": "security@wordfence.com"
}
]
}

View File

@ -0,0 +1,47 @@
{
"id": "CVE-2024-3230",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-06-04T06:15:10.270",
"lastModified": "2024-06-04T06:15:10.270",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "The Download Attachments plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'download-attachments' shortcode in all versions up to, and including, 1.3 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security@wordfence.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 6.4,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 3.1,
"impactScore": 2.7
}
]
},
"references": [
{
"url": "https://wordpress.org/plugins/download-attachments/",
"source": "security@wordfence.com"
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/62475d8f-a0f6-45ab-abd0-ad24e1887c91?source=cve",
"source": "security@wordfence.com"
}
]
}

View File

@ -0,0 +1,47 @@
{
"id": "CVE-2024-3555",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-06-04T06:15:10.493",
"lastModified": "2024-06-04T06:15:10.493",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "The Social Link Pages: link-in-bio landing pages for your social media profiles plugin for WordPress is vulnerable to unauthorized access due to a missing capability check on the import_link_pages() function in all versions up to, and including, 1.6.9. This makes it possible for unauthenticated attackers to inject arbitrary pages and malicious web scripts."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security@wordfence.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 7.2,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 2.7
}
]
},
"references": [
{
"url": "https://plugins.trac.wordpress.org/browser/social-link-pages/trunk/inc/Admin.php#L462",
"source": "security@wordfence.com"
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/1c025fc0-5dac-4a18-8338-fefb2a1fca5a?source=cve",
"source": "security@wordfence.com"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2024-4057",
"sourceIdentifier": "contact@wpscan.com",
"published": "2024-06-04T06:15:10.737",
"lastModified": "2024-06-04T06:15:10.737",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "The Gutenberg Blocks with AI by Kadence WP WordPress plugin before 3.2.37 does not validate and escape some of its block attributes before outputting them back in a page/post where the block is embed, which could allow users with the contributor role and above to perform Stored Cross-Site Scripting attacks"
}
],
"metrics": {},
"references": [
{
"url": "https://wpscan.com/vulnerability/da4d4d87-07b3-4f7d-bcbd-d29968a30b4f/",
"source": "contact@wpscan.com"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2024-4180",
"sourceIdentifier": "contact@wpscan.com",
"published": "2024-06-04T06:15:10.820",
"lastModified": "2024-06-04T06:15:10.820",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "The Events Calendar WordPress plugin before 6.4.0.1 does not properly sanitize user-submitted content when rendering some views via AJAX."
}
],
"metrics": {},
"references": [
{
"url": "https://wpscan.com/vulnerability/b2a92316-e404-4a5e-8426-f88df6e87550/",
"source": "contact@wpscan.com"
}
]
}

View File

@ -0,0 +1,47 @@
{
"id": "CVE-2024-4273",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-06-04T06:15:10.903",
"lastModified": "2024-06-04T06:15:10.903",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "The Essential Real Estate plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'ere_property_map' shortcode in all versions up to, and including, 4.4.2 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security@wordfence.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 6.4,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 3.1,
"impactScore": 2.7
}
]
},
"references": [
{
"url": "https://wordpress.org/plugins/essential-real-estate/",
"source": "security@wordfence.com"
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/c62ec31a-55e9-4404-b860-fa9a51ba3d3f?source=cve",
"source": "security@wordfence.com"
}
]
}

View File

@ -0,0 +1,47 @@
{
"id": "CVE-2024-4274",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-06-04T06:15:11.133",
"lastModified": "2024-06-04T06:15:11.133",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "The Essential Real Estate plugin for WordPress is vulnerable to unauthorized loss of data due to insufficient validation on the remove_property_attachment_ajax() function in all versions up to, and including, 4.4.2. This makes it possible for authenticated attackers, with subscriber-level access and above, to delete arbitrary attachments."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security@wordfence.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "LOW",
"baseScore": 4.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 1.4
}
]
},
"references": [
{
"url": "https://plugins.trac.wordpress.org/browser/essential-real-estate/trunk/public/partials/property/class-ere-property.php#L28",
"source": "security@wordfence.com"
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/7dc41eb7-5c9a-4a67-902d-9a855840668b?source=cve",
"source": "security@wordfence.com"
}
]
}

View File

@ -0,0 +1,47 @@
{
"id": "CVE-2024-4462",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-06-04T06:15:11.380",
"lastModified": "2024-06-04T06:15:11.380",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "The Nafeza Prayer Time plugin for WordPress is vulnerable to Stored Cross-Site Scripting via admin settings in all versions up to, and including, 1.2.9 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with administrator-level permissions and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. This only affects multi-site installations and installations where unfiltered_html has been disabled."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security@wordfence.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 4.4,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.3,
"impactScore": 2.7
}
]
},
"references": [
{
"url": "https://wordpress.org/plugins/nafeza-prayer-time/",
"source": "security@wordfence.com"
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/efbf83d9-ce5e-4139-ba12-b00df4d9ad89?source=cve",
"source": "security@wordfence.com"
}
]
}

View File

@ -0,0 +1,51 @@
{
"id": "CVE-2024-4697",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-06-04T06:15:11.650",
"lastModified": "2024-06-04T06:15:11.650",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "The Cowidgets \u2013 Elementor Addons plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the \u2018heading_tag\u2019 parameter in all versions up to, and including, 1.1.1 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security@wordfence.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 6.4,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 3.1,
"impactScore": 2.7
}
]
},
"references": [
{
"url": "https://plugins.trac.wordpress.org/browser/cowidgets-elementor-addons/trunk/inc/widgets-manager/widgets/header/class-page-title.php#L418",
"source": "security@wordfence.com"
},
{
"url": "https://plugins.trac.wordpress.org/browser/cowidgets-elementor-addons/trunk/inc/widgets-manager/widgets/header/class-site-title.php#L423",
"source": "security@wordfence.com"
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/beb28e9e-bf6a-4eed-afbc-ca85ec489df7?source=cve",
"source": "security@wordfence.com"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2024-4749",
"sourceIdentifier": "contact@wpscan.com",
"published": "2024-06-04T06:15:11.877",
"lastModified": "2024-06-04T06:15:11.877",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "The wp-eMember WordPress plugin before 10.3.9 does not sanitize and escape the \"fieldId\" parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting."
}
],
"metrics": {},
"references": [
{
"url": "https://wpscan.com/vulnerability/6cc05a33-6592-4d35-8e66-9b6a9884df7e/",
"source": "contact@wpscan.com"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2024-4750",
"sourceIdentifier": "contact@wpscan.com",
"published": "2024-06-04T06:15:11.960",
"lastModified": "2024-06-04T06:15:11.960",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "The buddyboss-platform WordPress plugin before 2.6.0 contains an IDOR vulnerability that allows a user to like a private post by manipulating the ID included in the request"
}
],
"metrics": {},
"references": [
{
"url": "https://wpscan.com/vulnerability/ffbe4034-842b-43b0-97d1-208811376dea/",
"source": "contact@wpscan.com"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2024-4856",
"sourceIdentifier": "contact@wpscan.com",
"published": "2024-06-04T06:15:12.047",
"lastModified": "2024-06-04T06:15:12.047",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "The FS Product Inquiry WordPress plugin through 1.1.1 does not sanitise and escape a parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting which could be used against high privilege users such as admin or unauthenticated users"
}
],
"metrics": {},
"references": [
{
"url": "https://wpscan.com/vulnerability/6cf90a27-55e2-4b2c-9df1-5fa34c1bd9d1/",
"source": "contact@wpscan.com"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2024-4857",
"sourceIdentifier": "contact@wpscan.com",
"published": "2024-06-04T06:15:12.127",
"lastModified": "2024-06-04T06:15:12.127",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "The FS Product Inquiry WordPress plugin through 1.1.1 does not sanitise and escape some form submissions, which could allow unauthenticated users to perform Stored Cross-Site Scripting attacks"
}
],
"metrics": {},
"references": [
{
"url": "https://wpscan.com/vulnerability/bf1b8434-b361-4666-9058-d9f08c09d083/",
"source": "contact@wpscan.com"
}
]
}

View File

@ -0,0 +1,47 @@
{
"id": "CVE-2024-4997",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-06-04T06:15:12.207",
"lastModified": "2024-06-04T06:15:12.207",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "The WPUpper Share Buttons plugin for WordPress is vulnerable to unauthorized access of data when preparing sharing links for posts and pages in all versions up to, and including, 3.43. This makes it possible for unauthenticated attackers to obtain the contents of password protected posts and pages."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security@wordfence.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 3.9,
"impactScore": 1.4
}
]
},
"references": [
{
"url": "https://wordpress.org/plugins/wpupper-share-buttons/",
"source": "security@wordfence.com"
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/c68ec00c-20a5-461d-bf72-c3190d29c9cf?source=cve",
"source": "security@wordfence.com"
}
]
}

View File

@ -0,0 +1,51 @@
{
"id": "CVE-2024-5485",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-06-04T07:15:47.700",
"lastModified": "2024-06-04T07:15:47.700",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "The SureTriggers \u2013 Connect All Your Plugins, Apps, Tools & Automate Everything! plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's Trigger Link shortcode in all versions up to, and including, 1.0.47 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security@wordfence.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 6.4,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 3.1,
"impactScore": 2.7
}
]
},
"references": [
{
"url": "https://plugins.trac.wordpress.org/changeset/3096816/",
"source": "security@wordfence.com"
},
{
"url": "https://wordpress.org/plugins/suretriggers/#developers",
"source": "security@wordfence.com"
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/ab19f7b1-2b1e-43bc-9843-ddee0fc74f50?source=cve",
"source": "security@wordfence.com"
}
]
}

View File

@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update
```plain
2024-06-04T06:00:38.010804+00:00
2024-06-04T08:00:38.256761+00:00
```
### Most recent CVE Modification Timestamp synchronized with NVD
```plain
2024-06-04T05:15:49.330000+00:00
2024-06-04T07:15:47.700000+00:00
```
### Last Data Feed Release
@ -33,14 +33,38 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
### Total Number of included CVEs
```plain
252496
252536
```
### CVEs added in the last Commit
Recently added CVEs: `1`
Recently added CVEs: `40`
- [CVE-2024-3888](CVE-2024/CVE-2024-38xx/CVE-2024-3888.json) (`2024-06-04T05:15:49.330`)
- [CVE-2024-20880](CVE-2024/CVE-2024-208xx/CVE-2024-20880.json) (`2024-06-04T07:15:45.453`)
- [CVE-2024-20881](CVE-2024/CVE-2024-208xx/CVE-2024-20881.json) (`2024-06-04T07:15:45.743`)
- [CVE-2024-20882](CVE-2024/CVE-2024-208xx/CVE-2024-20882.json) (`2024-06-04T07:15:46.010`)
- [CVE-2024-20883](CVE-2024/CVE-2024-208xx/CVE-2024-20883.json) (`2024-06-04T07:15:46.290`)
- [CVE-2024-20884](CVE-2024/CVE-2024-208xx/CVE-2024-20884.json) (`2024-06-04T07:15:46.567`)
- [CVE-2024-20885](CVE-2024/CVE-2024-208xx/CVE-2024-20885.json) (`2024-06-04T07:15:46.837`)
- [CVE-2024-20886](CVE-2024/CVE-2024-208xx/CVE-2024-20886.json) (`2024-06-04T07:15:47.120`)
- [CVE-2024-20887](CVE-2024/CVE-2024-208xx/CVE-2024-20887.json) (`2024-06-04T07:15:47.413`)
- [CVE-2024-2382](CVE-2024/CVE-2024-23xx/CVE-2024-2382.json) (`2024-06-04T06:15:09.677`)
- [CVE-2024-2470](CVE-2024/CVE-2024-24xx/CVE-2024-2470.json) (`2024-06-04T06:15:09.937`)
- [CVE-2024-3031](CVE-2024/CVE-2024-30xx/CVE-2024-3031.json) (`2024-06-04T06:15:10.023`)
- [CVE-2024-3230](CVE-2024/CVE-2024-32xx/CVE-2024-3230.json) (`2024-06-04T06:15:10.270`)
- [CVE-2024-3555](CVE-2024/CVE-2024-35xx/CVE-2024-3555.json) (`2024-06-04T06:15:10.493`)
- [CVE-2024-4057](CVE-2024/CVE-2024-40xx/CVE-2024-4057.json) (`2024-06-04T06:15:10.737`)
- [CVE-2024-4180](CVE-2024/CVE-2024-41xx/CVE-2024-4180.json) (`2024-06-04T06:15:10.820`)
- [CVE-2024-4273](CVE-2024/CVE-2024-42xx/CVE-2024-4273.json) (`2024-06-04T06:15:10.903`)
- [CVE-2024-4274](CVE-2024/CVE-2024-42xx/CVE-2024-4274.json) (`2024-06-04T06:15:11.133`)
- [CVE-2024-4462](CVE-2024/CVE-2024-44xx/CVE-2024-4462.json) (`2024-06-04T06:15:11.380`)
- [CVE-2024-4697](CVE-2024/CVE-2024-46xx/CVE-2024-4697.json) (`2024-06-04T06:15:11.650`)
- [CVE-2024-4749](CVE-2024/CVE-2024-47xx/CVE-2024-4749.json) (`2024-06-04T06:15:11.877`)
- [CVE-2024-4750](CVE-2024/CVE-2024-47xx/CVE-2024-4750.json) (`2024-06-04T06:15:11.960`)
- [CVE-2024-4856](CVE-2024/CVE-2024-48xx/CVE-2024-4856.json) (`2024-06-04T06:15:12.047`)
- [CVE-2024-4857](CVE-2024/CVE-2024-48xx/CVE-2024-4857.json) (`2024-06-04T06:15:12.127`)
- [CVE-2024-4997](CVE-2024/CVE-2024-49xx/CVE-2024-4997.json) (`2024-06-04T06:15:12.207`)
- [CVE-2024-5485](CVE-2024/CVE-2024-54xx/CVE-2024-5485.json) (`2024-06-04T07:15:47.700`)
### CVEs modified in the last Commit

View File

@ -220980,6 +220980,7 @@ CVE-2023-28490,0,0,108aced128ba57b33896892df69d77e28a60c60c67601ae61d638d2e1a8c4
CVE-2023-28491,0,0,6e337af6e458481ee8311dee44b37518e89b1c2303e781c3cf9fc710168baea7,2023-12-27T15:04:11.497000
CVE-2023-28492,0,0,5378b78a367c510b3439162721008a8b8d6cab7aa36e83014a336ed64bb51efa,2024-06-03T23:15:08.520000
CVE-2023-28493,0,0,3a5ed340e9e4bb40ef5a54cb7ae6172421b158a98ffc7511f003ebf7200d4bd8,2023-05-11T18:59:41.717000
CVE-2023-28494,1,1,9940c64501493bbaea027ba7bffc68a779204dff9213e7a23cb755695cf76d84,2024-06-04T07:15:41.913000
CVE-2023-28495,0,0,1444820a098c5678cd2e5627ac78f3c4ba3a4be7ec28df71945625f86552ed7f,2023-11-15T19:05:14.223000
CVE-2023-28496,0,0,37d18012568fe535a82f6a340da9740acc3f7661bc3d3b01084231082050aa6b,2023-06-28T07:08:43.353000
CVE-2023-28497,0,0,0a0da7add51d8c58b847b93673782936ea8cfc6f9a20d734d14a91f9c516224b,2023-11-15T19:06:34.483000
@ -225092,6 +225093,7 @@ CVE-2023-33926,0,0,95717b1510de11119d7fa549f015717a62c4a2bbf02b810120ef1f15efe90
CVE-2023-33927,0,0,74a313515a185e46b99718ebf4f6accd12807183623c92e17f7b6819022f14ef,2023-11-08T18:47:41.490000
CVE-2023-33929,0,0,84b05e803910fb9a563925c347a52d46b577a0228bbc5e09da4eac158c34e068,2023-08-31T18:40:58.783000
CVE-2023-3393,0,0,73ea2d565c2d1836ca8ce462baf77ac212912a6179f97bebd6b552a04374f548,2023-06-30T07:33:35.807000
CVE-2023-33930,1,1,678242c76ebfd4d462b834bd5a6b3940e6042e5291d15e82440658662d5ec2ce,2024-06-04T07:15:42.433000
CVE-2023-33931,0,0,9708a5b7d2b52c3c8aa77d03595aeacfd094545149b9166305ddd4b93034b51c,2023-06-02T01:31:13.207000
CVE-2023-33933,0,0,6cb0d294990f6f1b916034620051b67f40cfd545c58945d5665bf57b2668ac5b,2023-06-30T02:15:09.060000
CVE-2023-33934,0,0,ed034e74b8359677eb7eb5d83ab254cb456e0615a0dbd8c497262150966d3450,2023-11-06T03:15:11.870000
@ -225157,6 +225159,7 @@ CVE-2023-33992,0,0,92c24ac27eac24140a51c3ffdf9f526bf2f81acb8477ac78b9a0714749c14
CVE-2023-33993,0,0,d81e230c2b2585b43291518c791a97b3ad85dac8351e71e604f4f1f55466344f,2023-08-15T15:09:12.373000
CVE-2023-33997,0,0,68dd4190c70b14c4557b252b9672976a4b57dd4068e65f19bccdddfd2e2476be,2023-06-28T07:21:19.443000
CVE-2023-34000,0,0,202e4e8a5d21f847f5e161a832a00d2166e7c29a0e7c605b6d72b86a1ff9b158,2023-06-21T21:06:14.600000
CVE-2023-34001,1,1,af813cddec045e3e2f05debecc65096722d9e72b5f39fe2237e74381bdaf2fce,2024-06-04T07:15:42.770000
CVE-2023-34002,0,0,a47dd36f741977aade219b203ed7ad7d9c459d1a42f8b92c4e19e2e9c9c34d35,2023-11-15T02:26:37.500000
CVE-2023-34004,0,0,6e3a7aae2809a7c82c8dd6119a8862bf9c46939f51ba3871b787b6424edcbe60,2023-09-01T12:20:23.520000
CVE-2023-34005,0,0,4ad211f818e3675ad21909ccb555e25640cf8a91940dba183772f650ed6b9abe,2023-07-26T00:37:17.753000
@ -227834,6 +227837,7 @@ CVE-2023-37861,0,0,4a33e8222962eee87515dd22ec9a257ccf93ba421e2855e648dfe003db01a
CVE-2023-37862,0,0,f60d472a451c9b44a88d6b2485b54b56bae279a5c8eab4f491b55167da3db83c,2023-08-15T16:46:25.997000
CVE-2023-37863,0,0,8a7fa1deb5a962430c7082ec4eb9e6e7f9eb5c561ff479547b27f40e0af4f15e,2023-08-15T16:11:56.730000
CVE-2023-37864,0,0,11d0ee1b67b9001ed7f779cbca765513e031fb473756ce535644ab55ef69a615,2023-08-15T16:11:32.840000
CVE-2023-37865,1,1,586b949f3b4eb21fdeff581756e97403c5664cbd1d845d472e98e5cca31b21f0,2024-06-04T07:15:43.127000
CVE-2023-37866,0,0,426d941681477d72dba31cb1af5d0017cbfdc7b4ed2b5bcac4188ace27277b6b,2024-05-17T18:36:05.263000
CVE-2023-37867,0,0,5b40f88535a21a5fc1741e0bf848180b66100f4c8511a8360b3352760b2647b2,2023-12-05T19:42:52.137000
CVE-2023-37868,0,0,3dca24f48f5ab0c03afb5b3ef0954996b6ef75d5ce37dfa7001aa80a5f36ec9f,2023-12-05T22:24:37.173000
@ -240821,6 +240825,7 @@ CVE-2024-0752,0,0,99d3411755367e54e33a0f3db060849ff7791e775f10eca247cd8201e3c202
CVE-2024-0753,0,0,0e86371506142e235f75d26b0f2da956d78087e144cf55adecdde2de675d9772,2024-02-02T17:14:13.963000
CVE-2024-0754,0,0,7cbda288a2f0b208c9ee8035f009620e5b4d4881ba50c452bf2aea35397f4a2e,2024-01-30T15:55:28.450000
CVE-2024-0755,0,0,79f5343dbd82c3d66eff6e1263d156dfb21ba7c6cd4d48a55bb0fdeb4e3e1402,2024-02-02T17:14:09.140000
CVE-2024-0757,1,1,6200812f10459eafd4d6f3c206074ca5de6d00cdb6c2e909e1a63ed092a0e8d5,2024-06-04T06:15:08.707000
CVE-2024-0758,0,0,3dc3e5a65509158eb452cd8b4d1662059e5a042f2f6d218a0c63b4f960d21800,2024-01-26T17:00:10.607000
CVE-2024-0759,0,0,7993c829506412b80b755e704d944eadb64c159c4c08fd9169d5d3b92f86eaf2,2024-03-07T20:15:50.480000
CVE-2024-0761,0,0,ab87c285fc55c933f4e9bbe42703fd344ef19fbeaef5ee6855043f478750d897,2024-02-13T17:16:46.780000
@ -241654,6 +241659,8 @@ CVE-2024-1712,0,0,a1a016a203560ea09b2318f81d11f708fd27d08a77fc04b87f71f57f56add0
CVE-2024-1713,0,0,8a03b45f44dad04c9639518acb933e815ce8e4a9a592434fb82c65e1bd2372ea,2024-03-15T12:53:06.423000
CVE-2024-1714,0,0,cde41c6a2aa18a8bfa33b8db52b27ce3242324a84d0d679aff15a20c8a8d0968,2024-03-07T13:52:27.110000
CVE-2024-1716,0,0,9fea5b16f40c3265c9008dec0c6cbc55e6f00e1ae2c04da12238468540201928,2024-05-02T18:00:37.360000
CVE-2024-1717,1,1,b7b8a6dd300bb057c4560110ddf8277e6fbf956417ab409d32158d45097987c7,2024-06-04T06:15:08.880000
CVE-2024-1718,1,1,6e5b95382bf6746043aa6cebf1d0d172e619f84767629f8f5cd2db0a6d5ea6e8,2024-06-04T06:15:09.180000
CVE-2024-1719,0,0,bd92ffe7c3f4bf124004e532d326d3643bc62f549595f2a7817efea0dc7c188f,2024-02-28T14:06:45.783000
CVE-2024-1720,0,0,5a5ae92be6fac7e3fb5aac9fbad05927fd3add77d067fc4c0b5a11a75c8da7c7,2024-03-07T13:52:27.110000
CVE-2024-1721,0,0,c8a27ef12d28926e6d37238403c5c2c2ecf19f2c3767f5b7848db8e5aca3058c,2024-05-21T16:53:56.550000
@ -241980,6 +241987,7 @@ CVE-2024-2014,0,0,5960248fb8bbf5de40f54070e9a0bf6ae1851c3dbf1c40767a4c730aca696f
CVE-2024-2015,0,0,4f254a79e909247754188d5f89a636bda7a9c29066bee89e20a1544caa513b84,2024-05-17T02:37:59.517000
CVE-2024-2016,0,0,23aad844e019aaeb66175f32c1a170643afa2ed96a91c574be994007ea69acb8,2024-05-17T02:37:59.610000
CVE-2024-2018,0,0,d35c240fd39d286b27481a94e4954ccbe09b47d7acc7f4c0e9843003d15978e5,2024-04-10T13:23:38.787000
CVE-2024-2019,1,1,d826d757d124448c93f067bd5038603a6aae40d6ae34061167a5c63aeff50824,2024-06-04T06:15:09.430000
CVE-2024-2020,0,0,fae0c240b0782069c1e4908f1890c1c955952a86e3799d8e37b19bbdb6902437,2024-03-13T18:15:58.530000
CVE-2024-2021,0,0,da5cf8d1d1d13c13f628141a4e6f31dc91ec6a4e23b304a269c5151a02a6f766,2024-05-17T02:37:59.750000
CVE-2024-2022,0,0,6d7459708234da76ef22fdc8215b0ea48bee86d29d41845cf4d0d24b619526df,2024-05-17T02:37:59.843000
@ -242322,7 +242330,22 @@ CVE-2024-20869,0,0,205bcfae207f01cfe9e76e25dfb8358434940d02212d78ea178f2e739e243
CVE-2024-20870,0,0,247de2e7cb6c1589f56f1a1780b91fbe4feee02648b4f01650496931882d0b24,2024-05-07T13:39:32.710000
CVE-2024-20871,0,0,4b5019addc2549a143f67a36860f5a0576db2a31268cf1be920df7487aeaeae8,2024-05-07T13:39:32.710000
CVE-2024-20872,0,0,f057840a1e0e70ef07c9af92e3c53b5e58e8fd31ea1c15cdb3fe23cd840da357,2024-05-07T13:39:32.710000
CVE-2024-20873,1,1,db678b78495c3c7a9458e5b9b12548c2452004636a0b5b28d963614a073eb118,2024-06-04T07:15:43.480000
CVE-2024-20874,1,1,6cc1d827671c65b41ed7c75ddab3e3bf573b791e99451d90375444154ce36b4c,2024-06-04T07:15:43.770000
CVE-2024-20875,1,1,65db75773395ae5e2738f5ea369901fc1f7877404758527d4cd2a3e784110f2d,2024-06-04T07:15:44.047000
CVE-2024-20876,1,1,50c92c571b67133295c934c7e967283fb0ab4d1a4e7ffdbfbfb5f792ddfae567,2024-06-04T07:15:44.313000
CVE-2024-20877,1,1,b66e1d79591890c59267f27efda3d482af0f73cb1f95c1c26c15ba14ec95fab5,2024-06-04T07:15:44.583000
CVE-2024-20878,1,1,b9b99af66ebc59e00231502fcfd9bf1751a46627390b0428b6883c52e82fd99f,2024-06-04T07:15:44.857000
CVE-2024-20879,1,1,11ecb1e67458e63c9e35d30d6ff20d4b918ec4e379ad5aee513ee49288fcf30b,2024-06-04T07:15:45.160000
CVE-2024-2088,0,0,f74da5d889e7e80f73938a7b2b74d368f377afb5dd4c7ba942f0bc91c7b57a42,2024-05-22T12:46:53.887000
CVE-2024-20880,1,1,d297e42d39acd66e21be06107a0bc2af9cb3a97a4894e92d96c416807671f996,2024-06-04T07:15:45.453000
CVE-2024-20881,1,1,caadfad455543644957696937142023fbd20055fdb5967efeb5c2267250f6698,2024-06-04T07:15:45.743000
CVE-2024-20882,1,1,abfac6566ad3a64957063a3256356fb04d51a02e75b5efcf7f712d1cb34043d4,2024-06-04T07:15:46.010000
CVE-2024-20883,1,1,44feccc1d32f9fa5021ee760c72a8d640825fcb34e8cee36d2806aa275e0e2da,2024-06-04T07:15:46.290000
CVE-2024-20884,1,1,991fe46897a96ed4d2dbfda5e2f79052806029a49a5abdb60138fb33313c3f3e,2024-06-04T07:15:46.567000
CVE-2024-20885,1,1,f1a15d8b34dbf5bfed5a22158c72588770611e56055a34ffd41e8c78ce77fb64,2024-06-04T07:15:46.837000
CVE-2024-20886,1,1,500f3425e78ac1f5a9125b691a615eecd30202d34772e436d93854a279e10ab8,2024-06-04T07:15:47.120000
CVE-2024-20887,1,1,82c894cf210014dc8f1e318504627e629dd07244a3f9d391a17e10c6971ddedd,2024-06-04T07:15:47.413000
CVE-2024-2089,0,0,96f25c0b661864f2faa4ebe0c7639379fe17dd1bd7ce5242853acf390f1ca579,2024-05-30T13:15:41.297000
CVE-2024-20903,0,0,c3900fb8b8bb00a3ce86bfd5ca527fde9099622f71073bff3bcad70680bf3f2d,2024-02-20T19:51:05.510000
CVE-2024-20904,0,0,75011684a257ea742330251f679f71917299c125d35b4c6d39df6fddd4b69f37,2024-01-20T18:42:09.760000
@ -244104,6 +244127,7 @@ CVE-2024-23816,0,0,d90e5d8a8add5ddfd05a35b38827bbf40e25d6527af0702c0c8e1c123914c
CVE-2024-23817,0,0,a70426b20150e0a7b98c4c327bfe7d7342f724a77b354818b56d50a9014ba9a4,2024-05-09T15:23:24.053000
CVE-2024-23818,0,0,ec61f7c15bd208662757981a2767d65d7e7465d4099687f165e151a10e577bad,2024-03-21T12:58:51.093000
CVE-2024-23819,0,0,d9df6022d2e5c5dff876fb35cae1bac9dbc5de6e8140a67bf69310f9eb69a24e,2024-03-21T12:58:51.093000
CVE-2024-2382,1,1,56a50c4062ab79b50d818f0245670802f1f31bf499aa7426508e81ee464420ad,2024-06-04T06:15:09.677000
CVE-2024-23820,0,0,442ce87b6d4e7462abae5349c52b49ec11bd5e7b4d5da07ccb8943cf3cab70fb,2024-02-01T16:30:14.907000
CVE-2024-23821,0,0,444107c128639301a12dca6552fa1c596d1df8e574fbeb7e6ac530a559e40315,2024-03-21T12:58:51.093000
CVE-2024-23822,0,0,ff7d5a10be6620b6d28dd41c7c7d2b88b037de8ed8da0a94d9353eebadc89386,2024-02-05T18:04:52.843000
@ -244499,6 +244523,7 @@ CVE-2024-24696,0,0,576100c87aabfd2cc5b0639b848a7910d803f378a6ee205e48b9f5fdb10e1
CVE-2024-24697,0,0,28ddea48b1f88de42c49f013244848535d125d1e05c0c1f34faaf6ee6851bc2d,2024-02-14T13:59:35.580000
CVE-2024-24698,0,0,817a0b61f97f230de6599b3735ed090bc085c5165672f6f961bb45bde5920e3a,2024-02-14T13:59:35.580000
CVE-2024-24699,0,0,ebfa9c3613ca81afee5b31324a44998993ef39a7f5a2a62c039b0dc12448ffff,2024-02-14T13:59:35.580000
CVE-2024-2470,1,1,c7a314c8587f71d53fc24b17a89f9020c54599cb8c26091e9c213c211829e20f,2024-06-04T06:15:09.937000
CVE-2024-24700,0,0,722efb6615dc1dea12ab2ef8d5ec262b410d1f9df67edaa76cb1e0c47573b1f8,2024-03-27T12:29:30.307000
CVE-2024-24701,0,0,cad696bd31db968a1beda509b4d070e8072c708e3a95c6538ec2b30342527797,2024-02-29T13:49:29.390000
CVE-2024-24702,0,0,1009c0fb54a0e4a4119b63f5a2588872c60d2c936085dfd7c83b13ca41bf148b,2024-02-29T13:49:47.277000
@ -248110,6 +248135,7 @@ CVE-2024-30306,0,0,3d0be5fa22f6a17837661930cea95c4e979049e02e29ef28995e28fef468b
CVE-2024-30307,0,0,6e7406a4fee3c149832c8723729925e94f09d6dc076fc2ca51727bd677880d55,2024-05-16T13:03:05.353000
CVE-2024-30308,0,0,f3c5be7d3593e31136ef89f2d31bd59ace724f63e9e028bd0ea1801ed0623fb5,2024-05-16T13:03:05.353000
CVE-2024-30309,0,0,b045cc13c21fbf23773bc2a57f1ac3e04d9d6fedb3a00268af23b72213c07cc5,2024-05-16T13:03:05.353000
CVE-2024-3031,1,1,6231612fd91e33a8a4c1fbc63472bf212f4c53fd404313076c829d86c981b6e0,2024-06-04T06:15:10.023000
CVE-2024-30310,0,0,83f49301bae9d9ce1f4f10baaa19cd19c5d8338561e896cd48c650144ecc0173,2024-05-15T16:40:19.330000
CVE-2024-30311,0,0,fb349d5ceed5a7cba0e799d3c128e851a64c5766dc3d345b76389dfa8f8216d4,2024-05-15T16:40:19.330000
CVE-2024-30312,0,0,9ac108e7201bfbe47657882780e1de8cd9cfb7d1e6c7eed7b60f2c9ebfe5bcdb,2024-05-15T16:40:19.330000
@ -249225,6 +249251,7 @@ CVE-2024-32291,0,0,b7153c4f84f4dcdc9674c2de97a60dfcb3c6ccd76dc3087e39499a1f30a82
CVE-2024-32292,0,0,28e836ab012ba26ce6370aa637128c082a6104370d01202934f29fd84d4444bd,2024-04-17T15:31:50.160000
CVE-2024-32293,0,0,d16611fb15c081131f616e89cbae49c999e1669d1f3ba96273f94493581ea532,2024-04-17T15:31:50.160000
CVE-2024-32299,0,0,fca46a7d533ca57179a1ec9db58160bbbed09496ab26c6e2bbf71176feb8d379,2024-04-17T15:31:50.160000
CVE-2024-3230,1,1,a0507f8b56ea6732f97107f56603a1841c8d882ea8799b9298da79fe7f900bf2,2024-06-04T06:15:10.270000
CVE-2024-32301,0,0,96ee0b54df7a4f78b7d9427348511b154552dc59b2071b47f5d0ddac60dad82e,2024-04-17T15:31:50.160000
CVE-2024-32302,0,0,856590d673eb02e246223aef7a9d9a79aa445cadb1ccbcb1f59c17c7bcefe824,2024-04-17T15:31:50.160000
CVE-2024-32303,0,0,f5183e57e6da8ebbb9ebe6e641e50d0eb754fcf17fc9e8be859d54b89499237b,2024-04-17T16:51:07.347000
@ -250826,6 +250853,7 @@ CVE-2024-35512,0,0,c9d23c736120f04931cbbc7470489190e83340be8d46b2f2d0f2c886a0a46
CVE-2024-3553,0,0,35fab26edb78f51246dfea40a1da2d2c641df3766aad72a071763d4720020731,2024-05-02T18:00:37.360000
CVE-2024-3554,0,0,b4c32859301bcc314e2dd2301d5e454826bca59cac4e6957d0f808d223349460,2024-05-02T18:00:37.360000
CVE-2024-35548,0,0,d8ef06df5ce64125bab3cdde256f258e1c87cbfe4cc6bfbb1a4d7595969f62d9,2024-05-29T13:02:09.280000
CVE-2024-3555,1,1,bbe0a2563644dd8ab3c544f0b5031b95c962edd5b2266edd28b2871d2cc86809,2024-06-04T06:15:10.493000
CVE-2024-35550,0,0,b3c85fa0d88560018d8c46302ba1cba82a3adc9c9d9315f8092c405b1f662d91,2024-05-22T14:30:41.953000
CVE-2024-35551,0,0,bced5ed716b8a6cde6b8827aca76efe4aa3a304eed485f9c2d1140453267c787,2024-05-22T14:30:41.953000
CVE-2024-35552,0,0,f6913d712c73cbd84cae10dae0421fd278caa25b1bc3c8cb3704337f3de4daaa,2024-05-22T14:30:41.953000
@ -251547,7 +251575,7 @@ CVE-2024-3882,0,0,43bad73eafa6ac43c909cb529fe3ba674146baf41b9d3a5b4ece14285f4557
CVE-2024-3883,0,0,c0ee3c129d03d9b7803729c6b8ba3c3dbf4ee4f2b39f81dd559f9f8568fb1be9,2024-05-02T13:27:25.103000
CVE-2024-3885,0,0,18d5fcf15976a3d948a4584d141049e724e0352960b62e33e0645d8a5c391224,2024-05-02T18:00:37.360000
CVE-2024-3887,0,0,798d7748b1074258e6c6a927f8fccffc602325526aac11c704efaf0a6ac77dca,2024-05-16T13:03:05.353000
CVE-2024-3888,1,1,b85ecaa3b85ed34250738d8d4a33d3d115e06af7f28b55da528dced7cee3d022,2024-06-04T05:15:49.330000
CVE-2024-3888,0,0,b85ecaa3b85ed34250738d8d4a33d3d115e06af7f28b55da528dced7cee3d022,2024-06-04T05:15:49.330000
CVE-2024-3889,0,0,c4039354ee4d81ce5faec2ce618c8f0af30c97c1ad1feeb689836cb585b438a6,2024-04-23T12:52:09.397000
CVE-2024-3890,0,0,167befe3a418fe829a07bf47548aa5d5c5fe13f91b75a3184f188bef038919b6,2024-04-26T12:58:17.720000
CVE-2024-3891,0,0,8daff08d10085680eb7790a9a2c0ef842bf636f7de8dcdfbf7cd60ad81535ead,2024-05-02T18:00:37.360000
@ -251641,6 +251669,7 @@ CVE-2024-4044,0,0,24332ace72d4390c16ec3b8977440043e797db2d7d42445b64fa06b462f426
CVE-2024-4045,0,0,2973487eda1b15ccbfcf50557eac1a48f731099aa75396cca0be0624bea7de1b,2024-05-28T12:39:42.673000
CVE-2024-4046,0,0,a540b586e4490c5aa35243f10fb42fe8c42d9288228be6b989b109661bfcf7e0,2024-05-14T16:11:39.510000
CVE-2024-4056,0,0,8d2872a63b61af99b314442fa34c585e616ec707e8d3b58da8a6d93a2f4a4848,2024-04-26T12:58:17.720000
CVE-2024-4057,1,1,da98280cffc10bff55f5ab8db61232a9d8ddd6735a41e66046bb134207f095f6,2024-06-04T06:15:10.737000
CVE-2024-4058,0,0,89d601f0a6556a83c3f1ddb11302d59200b53d35574245a735ec02b677ca6a2a,2024-05-03T03:16:29.387000
CVE-2024-4059,0,0,f7356d83fe5fccf2c54f421bb90f2c15bd9bf33edb756392f4236a5836d7af45,2024-05-03T03:16:29.430000
CVE-2024-4060,0,0,e73d48dba8d4867b445df561ca35c4a253ea1abc6b1746f05e1e8b87e0d0ee8e,2024-05-03T04:15:09.620000
@ -251724,6 +251753,7 @@ CVE-2024-4172,0,0,48ff80923e2bd7f279079d51cd3ce30c9b5f73f86e9d26d332dbc7e36c9816
CVE-2024-4173,0,0,806a08191dc2b624e0ee02a7be11ce6c5ceee33617f7b3eb9464afb5420bb62b,2024-04-25T23:15:47.240000
CVE-2024-4174,0,0,c142274bead27dee8f65c018633c5143a8f9b64dc6c6d83b389a2c439d2fca3c,2024-04-25T13:18:02.660000
CVE-2024-4175,0,0,60706a95032c3b7b71280c12c10b7cdce6a73ddf5468ef6a0d21aafa3328ee4a,2024-04-25T13:18:02.660000
CVE-2024-4180,1,1,f5517070efaac23260a098a9276d59a23ded8564706936bb2c546be9bb273404,2024-06-04T06:15:10.820000
CVE-2024-4181,0,0,ae08963d7323466f42108cc4145b2377e0c682d334302c4a8213f2b0fcb1ee61,2024-05-16T13:03:05.353000
CVE-2024-4182,0,0,e7bfd5d03ac4e50248987fdc4c50fca364e9bca2384ff17427febaa9cba5bb33,2024-04-26T12:58:17.720000
CVE-2024-4183,0,0,ccc399a2445bf78d9e7d0cacf88ee6d06233217c2d933caf866c50fd88c63c71,2024-04-26T12:58:17.720000
@ -251781,6 +251811,8 @@ CVE-2024-4263,0,0,b1f2b30077721ef2ca6e11fb6bda0f0973b13bae19df9c4c6804c151ec0ef6
CVE-2024-4264,0,0,fb86e94ce42096b29068bc1af12f8df8e421d67d4a541250a03ae9bd98f16258,2024-05-20T13:00:34.807000
CVE-2024-4265,0,0,91d38fbd7b9c4ea0cd26c0f2028b5e1f8ee8c7d7e1c2c632d6b17cd2b7b69603,2024-05-02T18:00:37.360000
CVE-2024-4267,0,0,ce2653255d43ae5f4599b240b7efe5c0da7fc5b70a5363cdc03dcce3fe58b4ed,2024-05-24T01:15:30.977000
CVE-2024-4273,1,1,a35f5d312251ac1b4c3ad8cb3e929d6d75701a38ab9f8518319a36b6f4ebc7e4,2024-06-04T06:15:10.903000
CVE-2024-4274,1,1,93162028b6a02039b2bb57d86292d708334e651f460824c4bd5c12c1bd14d221,2024-06-04T06:15:11.133000
CVE-2024-4275,0,0,70e1a00c60419d92634d3a56b566530d560ae59bb86d2c5a8041fd963d9db39d,2024-05-14T16:11:39.510000
CVE-2024-4277,0,0,0e2597ca58054c89bbcbec7f866e9744f2b63f46782c4e0a7d31ae57f9529329,2024-05-14T16:11:39.510000
CVE-2024-4279,0,0,d3b17e17d1b5650487c2ef2a762ae7d90400bd6e48ec29863d7d603500f64a36,2024-05-16T13:03:05.353000
@ -251912,6 +251944,7 @@ CVE-2024-4454,0,0,914a7b9e833666c0b110fe9be947f5b60542326fbbcbbd52692d581f0fc564
CVE-2024-4455,0,0,e18738afbef678c84ea567282093c6582d8247bf14c57fe724fa93ee096ec5c2,2024-05-24T13:03:05.093000
CVE-2024-4456,0,0,43bdd543de001702ca45614b4a3579c52bfa7b188e5cb3e6b81f25f610f74e45,2024-05-08T13:15:00.690000
CVE-2024-4461,0,0,ad05f4e37257e33f27f784f842f8dfa34f685ff06dd273bc6842a04c51c93bf6,2024-05-03T12:48:41.067000
CVE-2024-4462,1,1,6b145b7c250f9c6394ef188c44646c583e2a6ba594e74f114129d08c28141c51,2024-06-04T06:15:11.380000
CVE-2024-4463,0,0,aaa5b32073fcbc7160927d348961b4790302ca7b8c414e16cdb6cacefbfd98b3,2024-05-14T16:11:39.510000
CVE-2024-4466,0,0,d6c981370b54d7938faad670495d8ca5b736025a1a2ded921b62354a18385ccc,2024-05-03T12:48:41.067000
CVE-2024-4469,0,0,f3178a2eee38f00518ebe4258fe6dd45f453ef4ce408e801402017fce62c2cef,2024-05-31T13:01:46.727000
@ -252067,6 +252100,7 @@ CVE-2024-4688,0,0,5209c8e598df4232c95422a32cff4b63e70cf2beafa2b8b363e44607e8b05d
CVE-2024-4689,0,0,919eb1a71c5b4e5442293f605f96c1f22f0a9c83e181a6bfcbc236f37312a073,2024-05-14T16:11:39.510000
CVE-2024-4693,0,0,ae34b03d329f3bae3c71df865f5758cc1e5a9a82168c01009bca2e974c902cf9,2024-05-14T16:11:39.510000
CVE-2024-4695,0,0,bd371315886ce25f9ceb7120c3bda7e4abd083c2b0897636d7648a840eeb16f9,2024-05-21T12:37:59.687000
CVE-2024-4697,1,1,f87d6dd27e4024fd838b1092e9a53f420562caca9b531f64c4d6fd87a0015cd3,2024-06-04T06:15:11.650000
CVE-2024-4698,0,0,d639d98ee1104ee74d5714ee622c1edbac6965c7ee7b0c944d45cd1653d552a0,2024-05-20T13:00:34.807000
CVE-2024-4699,0,0,21634a770b960d22aa24dc1f0ea343763012f9507287610a68f5378061204954,2024-05-17T02:40:33.683000
CVE-2024-4700,0,0,fd7d4a078191a1c31b5f2cfdfc5bd65709b727d250ddf2b831fd6aa84ec620ac,2024-05-21T12:37:59.687000
@ -252104,6 +252138,8 @@ CVE-2024-4736,0,0,08f3ddf344d74e2e711170c29304771c32d4271af1b88103635b7b5854a28f
CVE-2024-4737,0,0,6b47106c8e4e467fe93f661d18fd2c8748e996259ee5ebdc2860bb0423c37a72,2024-05-17T02:40:36.283000
CVE-2024-4738,0,0,a433a0ababe3a5140e81fb002dd302d144dd5ac39a2822f0f1c34736f879eb89,2024-05-17T02:40:36.380000
CVE-2024-4747,0,0,99152f6494a1192f3bae59b436abcc51d11f811ed1e0a72c2e65c8381fda6054,2024-05-14T16:11:39.510000
CVE-2024-4749,1,1,941545e975c23b3b1fdf47c01ae6db6747aafd1ff5d1096690fece83282c02ec,2024-06-04T06:15:11.877000
CVE-2024-4750,1,1,3d9686a42a2d26a7797870bdb58802c4a220699b67e33ba583755720376983d7,2024-06-04T06:15:11.960000
CVE-2024-4760,0,0,8b9593f0d88cbd24a061db082c8cd5c20f19b8a61431542d1ce576639ef3bdc0,2024-05-16T15:44:44.683000
CVE-2024-4761,0,0,0bedb1c1472ecce0f990c4c56e3721a514c96a1f9ece8da9e0c811ef6689eeb4,2024-05-20T14:08:51.747000
CVE-2024-4764,0,0,9a13ff0309ce1e5420716f8085db95df94fd2bab38dc643251ec74d75f275fe3,2024-05-14T19:17:55.627000
@ -252170,6 +252206,8 @@ CVE-2024-4849,0,0,4cca6bf882fb6160af4b1080a2e76a5af3ab9a12c0263aee0523e12c17c0ba
CVE-2024-4853,0,0,ba76998b2322009a736dfabc746ba873162af9769c26f75eb36eb2d2f5455f10,2024-05-14T16:11:39.510000
CVE-2024-4854,0,0,1544f1fe7b518c3058bbfd199032e2a1672e1211474fa012cf98161e9eb1b9cb,2024-05-14T16:11:39.510000
CVE-2024-4855,0,0,853db3435d2b017e6592b5c0a241408d5ffcf3daf060fdd7c76e2352d5ddd617,2024-05-14T16:11:39.510000
CVE-2024-4856,1,1,8450fb15406cf7302d1bbc51fd74db7f35608a312773519fe5252068cfc9b6a9,2024-06-04T06:15:12.047000
CVE-2024-4857,1,1,69bf5bf7e54fe636ba87b0873b1810e434885653b5dd1298432bfaf22937d674,2024-06-04T06:15:12.127000
CVE-2024-4858,0,0,7e6f62031377207832745d7baec775cb8f5592ecc9e1490c12da872c1b62dd11,2024-05-28T12:39:42.673000
CVE-2024-4859,0,0,3de5434b35db9344c6a8c9ff1c0891dd93d801d8510e1a23be87da56d66078a2,2024-05-14T19:17:55.627000
CVE-2024-4860,0,0,078ece1acb5f59d15050f08de42942705925d025d9ef9dfb969c99e0b62152d4,2024-05-14T19:17:55.627000
@ -252245,6 +252283,7 @@ CVE-2024-4988,0,0,e3e46f66e9019adcefc7fde3cb6b9482628a866ff50189a1fb9c695c9d0611
CVE-2024-4991,0,0,180b9ed28c0cce46df550147eebf5773d3a2c46d3490c6ab8f019084050e5a01,2024-05-16T13:03:05.353000
CVE-2024-4992,0,0,504a91a45451c38d9b5beed8f2c88cac747dfe187af29754ed23c5e483929557,2024-05-16T13:03:05.353000
CVE-2024-4993,0,0,54558f9e3463a1500143cda3bf9ee67127625c6afa1872d34f1d786cf2569f73,2024-05-16T13:03:05.353000
CVE-2024-4997,1,1,e03f25253bbf71095cc737022e5503157fc8d784fea0854a0ab85839707f824b,2024-06-04T06:15:12.207000
CVE-2024-4998,0,0,e12f9512d41da053bcfd5626dd0ee21afd4da3e61146c4f0c8f9da42ca3dff98,2024-05-17T16:15:08.160000
CVE-2024-4999,0,0,1bac5cc77e7ceb1bce6c078fbd59e76f5556984ef2124d365e8638bfa6b6fdfa,2024-05-16T15:44:44.683000
CVE-2024-5022,0,0,106355f86b530d1586a5d339031de27a1a2312467a76eb449e8e9901150235d8,2024-05-20T13:00:34.807000
@ -252468,6 +252507,7 @@ CVE-2024-5434,0,0,dc2716eb218edba725ac85c17a2930de7a00b6563d0ca53040574106ea0b92
CVE-2024-5436,0,0,95eba267f429de080e9b35fcd14e1e1840b0308e404c32773ec35c18106c7cbc,2024-05-31T13:01:46.727000
CVE-2024-5437,0,0,557d2d92d351d0b9c718cc97d7a9d4fae40afc0a93c4cab84fee8196b51766e4,2024-05-29T13:02:09.280000
CVE-2024-5484,0,0,7de35f8eee9232651ed147ec3168f6740617b1737ec3ff6913988b98b84f6ef1,2024-05-31T11:15:09.783000
CVE-2024-5485,1,1,cd934d054521f90c46895e6b8fbe14d28fa1f85abdd6db3cb4bf3a673d266bae,2024-06-04T07:15:47.700000
CVE-2024-5493,0,0,8180f9c7c83a7ebab82ac7c00536ed64f553bc96cb8ba2cddb06ad7e2d969883,2024-05-31T13:01:46.727000
CVE-2024-5494,0,0,c5eb3025aebdd04b962a5f5eeebf34876e16a2b3c2469f3bb5a7dcb42288ba78,2024-05-31T13:01:46.727000
CVE-2024-5495,0,0,36f3f532052cc191b5d9fd702a2e672002fe219b200f260251098e8a64e9a2da,2024-05-31T13:01:46.727000

Can't render this file because it is too large.