Auto-Update: 2024-06-07T12:00:18.162631+00:00

This commit is contained in:
cad-safe-bot 2024-06-07 12:03:09 +00:00
parent cd597742e6
commit a2e6e6f143
9 changed files with 401 additions and 75 deletions

View File

@ -0,0 +1,51 @@
{
"id": "CVE-2023-5424",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-06-07T10:15:10.150",
"lastModified": "2024-06-07T10:15:10.150",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "The WS Form LITE plugin for WordPress is vulnerable to CSV Injection in versions up to, and including, 1.9.217. This allows unauthenticated attackers to embed untrusted input into exported CSV files, which can result in code execution when these files are downloaded and opened on a local system with a vulnerable configuration."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security@wordfence.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 4.7,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.6,
"impactScore": 2.7
}
]
},
"references": [
{
"url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3098265%40ws-form&new=3098265%40ws-form&sfp_email=&sfph_mail=",
"source": "security@wordfence.com"
},
{
"url": "https://wsform.com/changelog/?utm_source=wp_plugins&utm_medium=readme",
"source": "security@wordfence.com"
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/38ccaa81-77ec-46f2-9bec-d74fa2e093f3?source=cve",
"source": "security@wordfence.com"
}
]
}

View File

@ -2,58 +2,14 @@
"id": "CVE-2024-1599",
"sourceIdentifier": "security@huntr.dev",
"published": "2024-04-10T17:15:52.120",
"lastModified": "2024-04-10T19:49:51.183",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-06-07T11:15:53.177",
"vulnStatus": "Rejected",
"descriptions": [
{
"lang": "en",
"value": "lunary-ai/lunary version 0.3.0 is vulnerable to unauthorized project creation due to insufficient server-side validation of user account types during project creation. In the free account tier, users are limited to creating only two projects. However, this restriction is enforced only in the web UI and not on the server side, allowing users to bypass the limitation and create an unlimited number of projects without upgrading their account or incurring additional charges. This vulnerability is due to the lack of checks in the project creation endpoint."
"value": "Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority."
}
],
"metrics": {
"cvssMetricV30": [
{
"source": "security@huntr.dev",
"type": "Secondary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 5.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 3.9,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "security@huntr.dev",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-770"
}
]
}
],
"references": [
{
"url": "https://github.com/lunary-ai/lunary/commit/48d66a3deef8788fda7621e88f0e3a8a4a1ddeb9",
"source": "security@huntr.dev"
},
{
"url": "https://huntr.com/bounties/f1f9e9d6-de5f-48c4-b4f4-fbd192370417",
"source": "security@huntr.dev"
}
]
"metrics": {},
"references": []
}

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2024-5426",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-06-07T10:15:11.627",
"lastModified": "2024-06-07T10:15:11.627",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "The Photo Gallery by 10Web \u2013 Mobile-Friendly Image Gallery plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the \u2018svg\u2019 parameter in all versions up to, and including, 1.8.23 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. By default, this can only be exploited by administrators, but the ability to use and configure Photo Gallery can be extended to contributors on pro versions of the plugin."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security@wordfence.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 6.4,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 3.1,
"impactScore": 2.7
}
]
},
"references": [
{
"url": "https://plugins.trac.wordpress.org/browser/photo-gallery/trunk/filemanager/UploadHandler.php#L521",
"source": "security@wordfence.com"
},
{
"url": "https://plugins.trac.wordpress.org/browser/photo-gallery/trunk/filemanager/UploadHandler.php#L542",
"source": "security@wordfence.com"
},
{
"url": "https://plugins.trac.wordpress.org/changeset/3098798/",
"source": "security@wordfence.com"
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/13436238-f14a-445b-9a9b-fbcf23b7b498?source=cve",
"source": "security@wordfence.com"
}
]
}

View File

@ -0,0 +1,63 @@
{
"id": "CVE-2024-5481",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-06-07T10:15:11.827",
"lastModified": "2024-06-07T10:15:11.827",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "The Photo Gallery by 10Web \u2013 Mobile-Friendly Image Gallery plugin for WordPress is vulnerable to Path Traversal in all versions up to, and including, 1.8.23 via the esc_dir function. This makes it possible for authenticated attackers to cut and paste (copy) the contents of arbitrary files on the server, which can contain sensitive information, and to cut (delete) arbitrary directories, including the root WordPress directory. By default this can be exploited by administrators only. In the premium version of the plugin, administrators can give gallery edit permissions to lower level users, which might make this exploitable by users as low as contributors."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security@wordfence.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 6.8,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.6,
"impactScore": 5.2
}
]
},
"references": [
{
"url": "https://plugins.trac.wordpress.org/browser/photo-gallery/trunk/filemanager/controller.php#L178",
"source": "security@wordfence.com"
},
{
"url": "https://plugins.trac.wordpress.org/browser/photo-gallery/trunk/filemanager/controller.php#L436",
"source": "security@wordfence.com"
},
{
"url": "https://plugins.trac.wordpress.org/browser/photo-gallery/trunk/filemanager/controller.php#L512",
"source": "security@wordfence.com"
},
{
"url": "https://plugins.trac.wordpress.org/changeset/3098798/",
"source": "security@wordfence.com"
},
{
"url": "https://wordpress.org/plugins/photo-gallery/#developers",
"source": "security@wordfence.com"
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/76c38826-4d49-4204-b6b6-b01d01373fa9?source=cve",
"source": "security@wordfence.com"
}
]
}

View File

@ -0,0 +1,51 @@
{
"id": "CVE-2024-5637",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-06-07T11:15:53.353",
"lastModified": "2024-06-07T11:15:53.353",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "The Market Exporter plugin for WordPress is vulnerable to unauthorized loss of data due to a missing capability check on the 'remove_files' function in all versions up to, and including, 2.0.19. This makes it possible for authenticated attackers, with Subscriber-level access and above, to use path traversal to delete arbitrary files on the server."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security@wordfence.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
]
},
"references": [
{
"url": "https://plugins.trac.wordpress.org/browser/market-exporter/trunk/includes/class-restapi.php#L427",
"source": "security@wordfence.com"
},
{
"url": "https://plugins.trac.wordpress.org/changeset/3098360/market-exporter/trunk/includes/class-restapi.php",
"source": "security@wordfence.com"
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/c3ea4bf9-e109-465e-890a-c2923089fb66?source=cve",
"source": "security@wordfence.com"
}
]
}

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2024-5645",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-06-07T10:15:12.090",
"lastModified": "2024-06-07T10:15:12.090",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "The Envo Extra plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the \u2018button_css_id\u2019 parameter within the Button widget in all versions up to, and including, 1.8.23 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security@wordfence.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 6.4,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 3.1,
"impactScore": 2.7
}
]
},
"references": [
{
"url": "https://plugins.trac.wordpress.org/browser/envo-extra/tags/1.8.22/lib/elementor/widgets/button/button.php#L676",
"source": "security@wordfence.com"
},
{
"url": "https://plugins.trac.wordpress.org/changeset/3098500/",
"source": "security@wordfence.com"
},
{
"url": "https://wordpress.org/plugins/envo-extra/#developers",
"source": "security@wordfence.com"
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/dbe53b09-84c6-4fb6-9a79-1e4987678129?source=cve",
"source": "security@wordfence.com"
}
]
}

View File

@ -0,0 +1,92 @@
{
"id": "CVE-2024-5732",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-06-07T10:15:12.293",
"lastModified": "2024-06-07T10:15:12.293",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was found in Clash up to 0.20.1 on Windows. It has been declared as critical. This vulnerability affects unknown code of the component Proxy Port. The manipulation leads to improper authentication. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. It is recommended to change the configuration settings. VDB-267406 is the identifier assigned to this vulnerability."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW",
"baseScore": 7.3,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.4
}
],
"cvssMetricV2": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5
},
"baseSeverity": "HIGH",
"exploitabilityScore": 10.0,
"impactScore": 6.4,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-287"
}
]
}
],
"references": [
{
"url": "https://github.com/GTA12138/vul/blob/main/clash%20for%20windows.md",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?ctiid.267406",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?id.267406",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?submit.345469",
"source": "cna@vuldb.com"
}
]
}

View File

@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update
```plain
2024-06-07T10:00:43.668141+00:00
2024-06-07T12:00:18.162631+00:00
```
### Most recent CVE Modification Timestamp synchronized with NVD
```plain
2024-06-07T09:15:12.277000+00:00
2024-06-07T11:15:53.353000+00:00
```
### Last Data Feed Release
@ -33,29 +33,26 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
### Total Number of included CVEs
```plain
252972
252978
```
### CVEs added in the last Commit
Recently added CVEs: `1`
Recently added CVEs: `6`
- [CVE-2024-4703](CVE-2024/CVE-2024-47xx/CVE-2024-4703.json) (`2024-06-07T08:15:32.413`)
- [CVE-2023-5424](CVE-2023/CVE-2023-54xx/CVE-2023-5424.json) (`2024-06-07T10:15:10.150`)
- [CVE-2024-5426](CVE-2024/CVE-2024-54xx/CVE-2024-5426.json) (`2024-06-07T10:15:11.627`)
- [CVE-2024-5481](CVE-2024/CVE-2024-54xx/CVE-2024-5481.json) (`2024-06-07T10:15:11.827`)
- [CVE-2024-5637](CVE-2024/CVE-2024-56xx/CVE-2024-5637.json) (`2024-06-07T11:15:53.353`)
- [CVE-2024-5645](CVE-2024/CVE-2024-56xx/CVE-2024-5645.json) (`2024-06-07T10:15:12.090`)
- [CVE-2024-5732](CVE-2024/CVE-2024-57xx/CVE-2024-5732.json) (`2024-06-07T10:15:12.293`)
### CVEs modified in the last Commit
Recently modified CVEs: `9`
Recently modified CVEs: `1`
- [CVE-2024-0252](CVE-2024/CVE-2024-02xx/CVE-2024-0252.json) (`2024-06-07T09:15:09.347`)
- [CVE-2024-0253](CVE-2024/CVE-2024-02xx/CVE-2024-0253.json) (`2024-06-07T09:15:09.830`)
- [CVE-2024-0269](CVE-2024/CVE-2024-02xx/CVE-2024-0269.json) (`2024-06-07T09:15:10.160`)
- [CVE-2024-21775](CVE-2024/CVE-2024-217xx/CVE-2024-21775.json) (`2024-06-07T09:15:10.467`)
- [CVE-2024-21791](CVE-2024/CVE-2024-217xx/CVE-2024-21791.json) (`2024-06-07T09:15:10.820`)
- [CVE-2024-27310](CVE-2024/CVE-2024-273xx/CVE-2024-27310.json) (`2024-06-07T09:15:11.247`)
- [CVE-2024-27312](CVE-2024/CVE-2024-273xx/CVE-2024-27312.json) (`2024-06-07T09:15:11.640`)
- [CVE-2024-27313](CVE-2024/CVE-2024-273xx/CVE-2024-27313.json) (`2024-06-07T09:15:11.917`)
- [CVE-2024-27314](CVE-2024/CVE-2024-273xx/CVE-2024-27314.json) (`2024-06-07T09:15:12.277`)
- [CVE-2024-1599](CVE-2024/CVE-2024-15xx/CVE-2024-1599.json) (`2024-06-07T11:15:53.177`)
## Download and Usage

View File

@ -238666,6 +238666,7 @@ CVE-2023-5419,0,0,10a57f40b7aa09ec8fee8e0290b35dcaeabec556901f48cd7c53cde048a9a4
CVE-2023-5421,0,0,9bb4dab1dacd00462260a3ab6642406f066d48e0d197022fde21a9cdd703b6da,2023-10-19T20:19:21.313000
CVE-2023-5422,0,0,a7118324d22c6136fa62d39d957abd68310aa0bb8b0f6398b0e7e6d41dfb2bf3,2023-10-20T18:30:38.187000
CVE-2023-5423,0,0,a7079f98fb4c6da8a0096f14e04a54b73b6abccf8b590fe8b0580e02c1d7dbd2,2024-06-04T19:18:10.780000
CVE-2023-5424,1,1,adfe567e12f9b728db734539b11fd6df037f4db1a3c33e173c5fa6dc5b372d62,2024-06-07T10:15:10.150000
CVE-2023-5425,0,0,f81796d8b9e07f2eefee9bd5546198d643d8c9f01af0f76e9f36bbcaae9c2b38,2023-11-07T21:05:34.097000
CVE-2023-5426,0,0,0da4f609138f14c3a07954c76ddd311b67fd914e8a361e4e4a87642b36ebc0b0,2023-11-08T00:48:02.973000
CVE-2023-5427,0,0,67f98f3d95537ffc7229ab21eff0bcfb85ceb61e0bccfc759c24879683352ef7,2023-12-06T20:56:58.567000
@ -240424,8 +240425,8 @@ CVE-2024-0247,0,0,62eb0631a8f7a8ccde345e9572174c1c005bf9e3d2f6fe4b24e57aaa9c8313
CVE-2024-0248,0,0,2c37da61220f65b312245a2221cad9ad4877aec90b17ba5c2a3e9d6be35f7868,2024-02-12T17:31:21.670000
CVE-2024-0250,0,0,1024a1aee8c07f43ea895a2e7847039d1e10efacdd7ad8bb0a19e5b1e9b5ffab,2024-02-12T17:31:21.670000
CVE-2024-0251,0,0,14956aba5a33632df721b3e529915eceaf50c3d32f322e21763f782642d137c0,2024-01-19T19:55:23.980000
CVE-2024-0252,0,1,0742069b1e41d825214331d01ce9e201ec5268e0275b0cee132c0981d24a8c51,2024-06-07T09:15:09.347000
CVE-2024-0253,0,1,17245b937e0c32fe975e23111ffc2a6d705cdcda6f929faed8ec43bbc42ed144,2024-06-07T09:15:09.830000
CVE-2024-0252,0,0,0742069b1e41d825214331d01ce9e201ec5268e0275b0cee132c0981d24a8c51,2024-06-07T09:15:09.347000
CVE-2024-0253,0,0,17245b937e0c32fe975e23111ffc2a6d705cdcda6f929faed8ec43bbc42ed144,2024-06-07T09:15:09.830000
CVE-2024-0254,0,0,e5eae8b11bfbdda0720ecba88e72e29efdd7b42117ba1a4582cfd62b02acbde8,2024-02-12T20:53:02.440000
CVE-2024-0255,0,0,541867be2e415931a41832092b931a9f6ed85b86ce138a5f77d6aa8f5909e5ad,2024-02-07T23:31:10.567000
CVE-2024-0256,0,0,49de163342e5ba45f12c2cbfe0a11fce418d24b9f8f242901a15605875a38ffa,2024-02-14T19:17:28.387000
@ -240441,7 +240442,7 @@ CVE-2024-0265,0,0,c92e53ad11d8cc92e384202f84ffb84ebc3a003d44078864509b06cf66d723
CVE-2024-0266,0,0,1f93978b4f9e67732f5b15c0c12c46f0abc642ad41cceb231dfc5cf1f4dd3db0,2024-05-17T02:34:26.760000
CVE-2024-0267,0,0,7bfa7e3e2406c91814fcd34290ef18f2d24d1589bf4eec596441d1f5524f71fb,2024-05-17T02:34:26.867000
CVE-2024-0268,0,0,47456ea67f83d497b23ab66d4eb26e09b3a02ce26d0ebba5362ab64458aec1d3,2024-05-17T02:34:26.973000
CVE-2024-0269,0,1,bc92809fbef56177c2266a465311f680c4061e34f4603b208a36bf6fc6a1e8a0,2024-06-07T09:15:10.160000
CVE-2024-0269,0,0,bc92809fbef56177c2266a465311f680c4061e34f4603b208a36bf6fc6a1e8a0,2024-06-07T09:15:10.160000
CVE-2024-0270,0,0,149ad3058bdac0775166c4ada5886140d2ef7911f78d4ac8cfd20bed2c2a09cf,2024-05-17T02:34:27.107000
CVE-2024-0271,0,0,0babf6d710da9e84fe5f2931459a4e7abc266edc03bc1f216288ddf6b7abe814,2024-05-17T02:34:27.210000
CVE-2024-0272,0,0,7e654e469550a6946514d4b9e4f195a2cdceebadef5efa3588d6ac1e48606e73,2024-05-17T02:34:27.317000
@ -241642,7 +241643,7 @@ CVE-2024-1594,0,0,1d62f8d55fb3a974435872bb233738098cc7a319efe1e15acb72ee1c1daae7
CVE-2024-1595,0,0,0ac9aed2c4ed6b9e7bc181d6ab55412b8033a5bfcbc541a4a4b602392614e428,2024-03-01T14:04:26.010000
CVE-2024-1597,0,0,98089061f0cdbe74e1216b4d0bdbc732e4b70ff9e9921a5809eedb6f5d4538ee,2024-05-01T18:15:13.333000
CVE-2024-1598,0,0,1c541f665599324783f98e8e7828494708c01619833bec5586e6a8d892dd2c89,2024-05-14T19:18:31.490000
CVE-2024-1599,0,0,b311d4a0dc15f34db1bbc87ad8dd7c897ec570363d8bc742044c2c93d7c9f5bd,2024-04-10T19:49:51.183000
CVE-2024-1599,0,1,2f7770422da9bff7bed3eef076e29376c9b42774c7fc9bda69a503fd449e3156,2024-06-07T11:15:53.177000
CVE-2024-1600,0,0,a1cf7c20c4c53ecd0ddc2601c3f6df39efaefde9047db784f0058d6905cd6130,2024-04-10T19:49:51.183000
CVE-2024-1601,0,0,5de9e18b0c5a4daa146100818a9ac068a88d159e30320cca5c3c0caf368ddd5c,2024-04-16T13:24:07.103000
CVE-2024-1602,0,0,76aec42ffd2b96054ed086070f4eccb3306dfc781bb48ef20d91a6a2f0a7ff04,2024-04-10T19:49:51.183000
@ -243015,7 +243016,7 @@ CVE-2024-21771,0,0,ff0afef9e42e6fb9c23e4d4386a81c0240bde8524a0a8802ae4c44d51c80a
CVE-2024-21772,0,0,f8e42b69b99cf9d844db5f683999682647c8799992e8b6c4015423ebac9e6e9d,2024-05-17T18:36:05.263000
CVE-2024-21773,0,0,345c45cc46b4a2bc7fbfc453c1eb1fa6c31eadeab4db3115f257eaa510affea6,2024-01-18T17:08:43.260000
CVE-2024-21774,0,0,1a683c4386593938143db88bd83b2bc14ad5e978ab332a4ec1c1701b534f41d6,2024-05-17T18:36:05.263000
CVE-2024-21775,0,1,2f16842bbda9918b4d7f1a6bf73bd7ee820e77b1f7db2f51cb1f9c6ad1d501ef,2024-06-07T09:15:10.467000
CVE-2024-21775,0,0,2f16842bbda9918b4d7f1a6bf73bd7ee820e77b1f7db2f51cb1f9c6ad1d501ef,2024-06-07T09:15:10.467000
CVE-2024-21777,0,0,44618f6eca8c187e802d1fb8a5513e5c3f7a7b0ff0972cb292dc18c9e5673eb1,2024-05-17T18:36:05.263000
CVE-2024-2178,0,0,9dc28451a90e8f509a9a1b870b1413dd7a56d7478bbeb05656b49782563314d4,2024-06-03T14:46:24.250000
CVE-2024-21780,0,0,206894ce9dfe6d8af29d8349b60ae2b1f1c1e4c0d8fd3377294811d2785206a2,2024-05-17T02:36:10.020000
@ -243024,7 +243025,7 @@ CVE-2024-21785,0,0,7e1dfc062139302ac105f55cd17f3473b4f4084526bd40a9261ab82293585
CVE-2024-21788,0,0,38da0f632cd1fea2a38481fa5d82800cc79d63e45addfec9f74ba1417b51ce70,2024-05-17T18:36:05.263000
CVE-2024-21789,0,0,065592bcd8c720a7bd60596f25729aa5b68a77a3a9f40afcc7521d9d3e39931f,2024-02-14T18:04:45.380000
CVE-2024-2179,0,0,ae7ec0d777d4f092532ca994d6b0860fc5ecc6f92bb84e39b0499b0a5cdf3be6,2024-03-06T15:18:08.093000
CVE-2024-21791,0,1,e0cab86533dc35defdd008ab5decdd482c50ec9b66bd24a606c6deb59577e8d1,2024-06-07T09:15:10.820000
CVE-2024-21791,0,0,e0cab86533dc35defdd008ab5decdd482c50ec9b66bd24a606c6deb59577e8d1,2024-06-07T09:15:10.820000
CVE-2024-21792,0,0,f0ad507f0eb84dd7d85ebb6df20be3f06e6ebf8ecfb2115a3ca7d7445f51f11c,2024-05-17T18:36:05.263000
CVE-2024-21793,0,0,b55902d470d37a2479e376b66a185ed8b4afdd3b18a61089b937f4c3059f5d26,2024-05-08T17:05:24.083000
CVE-2024-21794,0,0,5140601c591fc7e01c922f6b4426d49907b4278c42a623419c59c4c96fa7afa6,2024-02-07T17:15:44.653000
@ -246538,10 +246539,10 @@ CVE-2024-27307,0,0,0637b05d2a36e47d121bc1fe1beac809e09e2be90d0aa4c4cb901114110f3
CVE-2024-27308,0,0,2c1853ceb0d45fb092e9c133d6553571b7b9f8a855fc6b4950edbdaad595214f,2024-03-06T21:42:48.053000
CVE-2024-27309,0,0,4ff276f1fa3a42e9cba86006da159d603e23baa66b2db98c085aa5a6c3adaee2,2024-05-01T18:15:15.967000
CVE-2024-2731,0,0,7242593ba3e5c5b48a25383d38b7647a4613c0186c7dc999e27ef7b770a540e3,2024-04-10T19:49:51.183000
CVE-2024-27310,0,1,b45f8a5f5df268ee7d6f50eae8157f5ceefa5fce0c8c6b70a667f82c7c056cd0,2024-06-07T09:15:11.247000
CVE-2024-27312,0,1,9f35cba247fedea3f548006ffd04728d6c9e275ad8e782791ca1754778b6d39d,2024-06-07T09:15:11.640000
CVE-2024-27313,0,1,abfc55e858edef62cf245a012f5c8675eea16323079fcd802a4ef8e6ddc5d69c,2024-06-07T09:15:11.917000
CVE-2024-27314,0,1,6298273c443ed75c3ff6a9720e799c95ed2e5c3d14076aff1cbea4fe45a2368e,2024-06-07T09:15:12.277000
CVE-2024-27310,0,0,b45f8a5f5df268ee7d6f50eae8157f5ceefa5fce0c8c6b70a667f82c7c056cd0,2024-06-07T09:15:11.247000
CVE-2024-27312,0,0,9f35cba247fedea3f548006ffd04728d6c9e275ad8e782791ca1754778b6d39d,2024-06-07T09:15:11.640000
CVE-2024-27313,0,0,abfc55e858edef62cf245a012f5c8675eea16323079fcd802a4ef8e6ddc5d69c,2024-06-07T09:15:11.917000
CVE-2024-27314,0,0,6298273c443ed75c3ff6a9720e799c95ed2e5c3d14076aff1cbea4fe45a2368e,2024-06-07T09:15:12.277000
CVE-2024-27315,0,0,1b06bd54abb4ee7969c3aca53e6bed402762ed42c4492d0ee8674e3fa0b42312,2024-02-28T15:15:09.670000
CVE-2024-27316,0,0,19b8a6dda0ac9a0a2c45dcec3bb7aef1440f1bc238657e5ec83c599ba08266a1,2024-06-06T19:29:53.927000
CVE-2024-27317,0,0,c3dded617afb79b595cc5394bc34fa2395e63ed9fe33b66ba0cb8f90b0b09bad,2024-05-01T18:15:16.097000
@ -252428,7 +252429,7 @@ CVE-2024-4699,0,0,21634a770b960d22aa24dc1f0ea343763012f9507287610a68f53780612049
CVE-2024-4700,0,0,fd7d4a078191a1c31b5f2cfdfc5bd65709b727d250ddf2b831fd6aa84ec620ac,2024-05-21T12:37:59.687000
CVE-2024-4701,0,0,31c0f40927cc6a1a9aece611ec4491a5435df4e5c3a9daffc9dfb7710658ca96,2024-05-14T16:11:39.510000
CVE-2024-4702,0,0,391d02c5718dd442c026ca8f3973c4fe10894f8eeb54175158dc44cd7ef50d4a,2024-05-15T16:40:19.330000
CVE-2024-4703,1,1,ebf51d66342e973b0c5ded35fed37f77effd58dce944f9ec823f31879f8ec0e4,2024-06-07T08:15:32.413000
CVE-2024-4703,0,0,ebf51d66342e973b0c5ded35fed37f77effd58dce944f9ec823f31879f8ec0e4,2024-06-07T08:15:32.413000
CVE-2024-4705,0,0,b45f335ad46575e30510e82573f02b490faa16d9b6ee89b66a9844ff390b53aa,2024-06-06T14:17:35.017000
CVE-2024-4706,0,0,a959e13293b1a5966007eb60c79cb973f34e4d1d8bd1c12986cac54d81ac9a3d,2024-05-24T01:15:30.977000
CVE-2024-4707,0,0,d6a01a1a459dfd9ab21945d56af40919cce44b311e282118c993194b130db955,2024-06-06T14:17:35.017000
@ -252899,6 +252900,7 @@ CVE-2024-5420,0,0,a73d8f6d4dfc82a2a2c0b4ab3cbb373ed67379d75299be1a27f6ef6c455a38
CVE-2024-5421,0,0,79ca1971e275d0efebd28f5347a8ca150a1bd7e69deb239fcb0cd29979a5cc8c,2024-06-04T16:57:41.053000
CVE-2024-5422,0,0,22b69754062c7145c382eca03e4d53f86a6d68d1fbe6295548fe29968bcde31c,2024-06-04T16:57:41.053000
CVE-2024-5425,0,0,6092e19396deba213e85ae08bbcc12bed3d27afd586c83d01af99efa1b8182c3,2024-06-07T04:15:32.597000
CVE-2024-5426,1,1,f0ba7165774eb511a9428d5fa891e29ba886c75861e32ff30e1b730e5ef3d885,2024-06-07T10:15:11.627000
CVE-2024-5427,0,0,42975a4514a9d913e780b5e6c34dc14580ffe2cdca703f885481d0f432a70e28,2024-05-31T13:01:46.727000
CVE-2024-5428,0,0,febfd9b4f977de4c3dc04e5fc8e71b9454e3ad809e74595cd325ad9561a295a7,2024-05-28T14:59:09.827000
CVE-2024-5433,0,0,d0946774ada383b4af0e78f23b9c449d05f83a7124810af4e383f90b0cdbda75,2024-05-29T13:02:09.280000
@ -252913,6 +252915,7 @@ CVE-2024-5459,0,0,9ffec4e6ddf7de8eef808a13af7e4d67efb473b64a2ed4688c4272492e191c
CVE-2024-5463,0,0,a83ead02d534db419d64d9a246adc999062f3a690f2d2cbba14bffeb9debf0f5,2024-06-04T16:57:41.053000
CVE-2024-5478,0,0,1ef0bb50a649d100e6b6e5867a32346dbaf702df776fd9ccf56584d5ac31685c,2024-06-06T19:16:08.933000
CVE-2024-5480,0,0,7acd9272dfc79491331c2743580d8bf7851e57b6d749beaee672d10d57699079,2024-06-06T19:16:09.177000
CVE-2024-5481,1,1,f4650e5a9e70e91e77d53046237c989c45ea8e4fb011dcec564220c3917625f1,2024-06-07T10:15:11.827000
CVE-2024-5482,0,0,e11c8a82377eae1fe2257fe2ef2320fbfa70a31638b38065c37bd2fe4d218241,2024-06-06T18:15:21.207000
CVE-2024-5483,0,0,88635ac2041f9699472eef4c51a5eb67a3fcf4378dec7f1a98452fd31b9eaa6a,2024-06-05T12:53:50.240000
CVE-2024-5484,0,0,7de35f8eee9232651ed147ec3168f6740617b1737ec3ff6913988b98b84f6ef1,2024-05-31T11:15:09.783000
@ -252962,7 +252965,9 @@ CVE-2024-5615,0,0,2b9f4fbf88dd4ea6ff55678ac9c0762fd6b29ae2ea4765ff6af29ac25e53e3
CVE-2024-5629,0,0,2b19d175fd80b16aa424307957676ae3dd964a506cce5329fc9e2ea04d26ec96,2024-06-06T14:17:35.017000
CVE-2024-5635,0,0,2f4fd95f40cb43c9475682f37f78b479557c0ba40bc4b87c84bd3a410bdbca2c,2024-06-05T12:53:50.240000
CVE-2024-5636,0,0,ae2ff24a8e15c0ed795cb405ff4b68943ed8f15194eed9e4ca4bf581e03cae2a,2024-06-05T12:53:50.240000
CVE-2024-5637,1,1,e07e931e7c62c0ad4dabf9bd2d6406ff9b88e8a72195cd3302eefb33f585445f,2024-06-07T11:15:53.353000
CVE-2024-5640,0,0,785e2574eb7b079aab076db7f0229c04a13e86681b300342f00e17b399aeb615,2024-06-07T05:15:50.730000
CVE-2024-5645,1,1,1277fbcf5a971876f13ccf037dda56ec4bd3121192c25c235de45aca7b607e2f,2024-06-07T10:15:12.090000
CVE-2024-5653,0,0,283076b6ccce08ae3d1ddf9d7f5983a839d66c80929543a8a527d0bfdf86a2f9,2024-06-06T14:17:35.017000
CVE-2024-5656,0,0,adabf37f78545832b9e31783c044d8f042bfbaaca432946aa95ed82eb518777b,2024-06-06T14:17:35.017000
CVE-2024-5657,0,0,b9899ab9d953b5e4a78b96db0691f3e8b536e92241286e49b6931592afb0dbef,2024-06-06T14:17:35.017000
@ -252971,3 +252976,4 @@ CVE-2024-5665,0,0,bd958d396bb4ad35b63d57ac1176d92cc2fe04cdc3b5189c4ab55e781e3023
CVE-2024-5673,0,0,b896d7e323904f9e987f87941609f4675d0746a7c5358db642d05671db0b87b4,2024-06-06T14:17:35.017000
CVE-2024-5675,0,0,38acd8263eeb8d1e4c48e0984f055dd4606319e26fa8928f4d3e5881bdfd6563,2024-06-06T14:17:35.017000
CVE-2024-5684,0,0,b2f8ad263f684025e461aeac45146ad505c13a2339a4851373464b5600c43386,2024-06-06T14:17:35.017000
CVE-2024-5732,1,1,fc923aa6728a25234fa6531e6345ccffb223cf9da524e30207a6e79495962e63,2024-06-07T10:15:12.293000

Can't render this file because it is too large.