mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-08 11:37:26 +00:00
Auto-Update: 2024-06-07T12:00:18.162631+00:00
This commit is contained in:
parent
cd597742e6
commit
a2e6e6f143
51
CVE-2023/CVE-2023-54xx/CVE-2023-5424.json
Normal file
51
CVE-2023/CVE-2023-54xx/CVE-2023-5424.json
Normal file
@ -0,0 +1,51 @@
|
||||
{
|
||||
"id": "CVE-2023-5424",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2024-06-07T10:15:10.150",
|
||||
"lastModified": "2024-06-07T10:15:10.150",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The WS Form LITE plugin for WordPress is vulnerable to CSV Injection in versions up to, and including, 1.9.217. This allows unauthenticated attackers to embed untrusted input into exported CSV files, which can result in code execution when these files are downloaded and opened on a local system with a vulnerable configuration."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "HIGH",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 4.7,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 1.6,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3098265%40ws-form&new=3098265%40ws-form&sfp_email=&sfph_mail=",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
{
|
||||
"url": "https://wsform.com/changelog/?utm_source=wp_plugins&utm_medium=readme",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/38ccaa81-77ec-46f2-9bec-d74fa2e093f3?source=cve",
|
||||
"source": "security@wordfence.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,58 +2,14 @@
|
||||
"id": "CVE-2024-1599",
|
||||
"sourceIdentifier": "security@huntr.dev",
|
||||
"published": "2024-04-10T17:15:52.120",
|
||||
"lastModified": "2024-04-10T19:49:51.183",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-06-07T11:15:53.177",
|
||||
"vulnStatus": "Rejected",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "lunary-ai/lunary version 0.3.0 is vulnerable to unauthorized project creation due to insufficient server-side validation of user account types during project creation. In the free account tier, users are limited to creating only two projects. However, this restriction is enforced only in the web UI and not on the server side, allowing users to bypass the limitation and create an unlimited number of projects without upgrading their account or incurring additional charges. This vulnerability is due to the lack of checks in the project creation endpoint."
|
||||
"value": "Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV30": [
|
||||
{
|
||||
"source": "security@huntr.dev",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.0",
|
||||
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 5.3,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security@huntr.dev",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-770"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/lunary-ai/lunary/commit/48d66a3deef8788fda7621e88f0e3a8a4a1ddeb9",
|
||||
"source": "security@huntr.dev"
|
||||
},
|
||||
{
|
||||
"url": "https://huntr.com/bounties/f1f9e9d6-de5f-48c4-b4f4-fbd192370417",
|
||||
"source": "security@huntr.dev"
|
||||
}
|
||||
]
|
||||
"metrics": {},
|
||||
"references": []
|
||||
}
|
55
CVE-2024/CVE-2024-54xx/CVE-2024-5426.json
Normal file
55
CVE-2024/CVE-2024-54xx/CVE-2024-5426.json
Normal file
@ -0,0 +1,55 @@
|
||||
{
|
||||
"id": "CVE-2024-5426",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2024-06-07T10:15:11.627",
|
||||
"lastModified": "2024-06-07T10:15:11.627",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The Photo Gallery by 10Web \u2013 Mobile-Friendly Image Gallery plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the \u2018svg\u2019 parameter in all versions up to, and including, 1.8.23 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. By default, this can only be exploited by administrators, but the ability to use and configure Photo Gallery can be extended to contributors on pro versions of the plugin."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 6.4,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 3.1,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/browser/photo-gallery/trunk/filemanager/UploadHandler.php#L521",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/browser/photo-gallery/trunk/filemanager/UploadHandler.php#L542",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/changeset/3098798/",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/13436238-f14a-445b-9a9b-fbcf23b7b498?source=cve",
|
||||
"source": "security@wordfence.com"
|
||||
}
|
||||
]
|
||||
}
|
63
CVE-2024/CVE-2024-54xx/CVE-2024-5481.json
Normal file
63
CVE-2024/CVE-2024-54xx/CVE-2024-5481.json
Normal file
@ -0,0 +1,63 @@
|
||||
{
|
||||
"id": "CVE-2024-5481",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2024-06-07T10:15:11.827",
|
||||
"lastModified": "2024-06-07T10:15:11.827",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The Photo Gallery by 10Web \u2013 Mobile-Friendly Image Gallery plugin for WordPress is vulnerable to Path Traversal in all versions up to, and including, 1.8.23 via the esc_dir function. This makes it possible for authenticated attackers to cut and paste (copy) the contents of arbitrary files on the server, which can contain sensitive information, and to cut (delete) arbitrary directories, including the root WordPress directory. By default this can be exploited by administrators only. In the premium version of the plugin, administrators can give gallery edit permissions to lower level users, which might make this exploitable by users as low as contributors."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "HIGH",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 6.8,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 1.6,
|
||||
"impactScore": 5.2
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/browser/photo-gallery/trunk/filemanager/controller.php#L178",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/browser/photo-gallery/trunk/filemanager/controller.php#L436",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/browser/photo-gallery/trunk/filemanager/controller.php#L512",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/changeset/3098798/",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
{
|
||||
"url": "https://wordpress.org/plugins/photo-gallery/#developers",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/76c38826-4d49-4204-b6b6-b01d01373fa9?source=cve",
|
||||
"source": "security@wordfence.com"
|
||||
}
|
||||
]
|
||||
}
|
51
CVE-2024/CVE-2024-56xx/CVE-2024-5637.json
Normal file
51
CVE-2024/CVE-2024-56xx/CVE-2024-5637.json
Normal file
@ -0,0 +1,51 @@
|
||||
{
|
||||
"id": "CVE-2024-5637",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2024-06-07T11:15:53.353",
|
||||
"lastModified": "2024-06-07T11:15:53.353",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The Market Exporter plugin for WordPress is vulnerable to unauthorized loss of data due to a missing capability check on the 'remove_files' function in all versions up to, and including, 2.0.19. This makes it possible for authenticated attackers, with Subscriber-level access and above, to use path traversal to delete arbitrary files on the server."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 7.5,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/browser/market-exporter/trunk/includes/class-restapi.php#L427",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/changeset/3098360/market-exporter/trunk/includes/class-restapi.php",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/c3ea4bf9-e109-465e-890a-c2923089fb66?source=cve",
|
||||
"source": "security@wordfence.com"
|
||||
}
|
||||
]
|
||||
}
|
55
CVE-2024/CVE-2024-56xx/CVE-2024-5645.json
Normal file
55
CVE-2024/CVE-2024-56xx/CVE-2024-5645.json
Normal file
@ -0,0 +1,55 @@
|
||||
{
|
||||
"id": "CVE-2024-5645",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2024-06-07T10:15:12.090",
|
||||
"lastModified": "2024-06-07T10:15:12.090",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The Envo Extra plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the \u2018button_css_id\u2019 parameter within the Button widget in all versions up to, and including, 1.8.23 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 6.4,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 3.1,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/browser/envo-extra/tags/1.8.22/lib/elementor/widgets/button/button.php#L676",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/changeset/3098500/",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
{
|
||||
"url": "https://wordpress.org/plugins/envo-extra/#developers",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/dbe53b09-84c6-4fb6-9a79-1e4987678129?source=cve",
|
||||
"source": "security@wordfence.com"
|
||||
}
|
||||
]
|
||||
}
|
92
CVE-2024/CVE-2024-57xx/CVE-2024-5732.json
Normal file
92
CVE-2024/CVE-2024-57xx/CVE-2024-5732.json
Normal file
@ -0,0 +1,92 @@
|
||||
{
|
||||
"id": "CVE-2024-5732",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-06-07T10:15:12.293",
|
||||
"lastModified": "2024-06-07T10:15:12.293",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability was found in Clash up to 0.20.1 on Windows. It has been declared as critical. This vulnerability affects unknown code of the component Proxy Port. The manipulation leads to improper authentication. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. It is recommended to change the configuration settings. VDB-267406 is the identifier assigned to this vulnerability."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW",
|
||||
"baseScore": 7.3,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.4
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "2.0",
|
||||
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
|
||||
"accessVector": "NETWORK",
|
||||
"accessComplexity": "LOW",
|
||||
"authentication": "NONE",
|
||||
"confidentialityImpact": "PARTIAL",
|
||||
"integrityImpact": "PARTIAL",
|
||||
"availabilityImpact": "PARTIAL",
|
||||
"baseScore": 7.5
|
||||
},
|
||||
"baseSeverity": "HIGH",
|
||||
"exploitabilityScore": 10.0,
|
||||
"impactScore": 6.4,
|
||||
"acInsufInfo": false,
|
||||
"obtainAllPrivilege": false,
|
||||
"obtainUserPrivilege": false,
|
||||
"obtainOtherPrivilege": false,
|
||||
"userInteractionRequired": false
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-287"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/GTA12138/vul/blob/main/clash%20for%20windows.md",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.267406",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.267406",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.345469",
|
||||
"source": "cna@vuldb.com"
|
||||
}
|
||||
]
|
||||
}
|
27
README.md
27
README.md
@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
|
||||
### Last Repository Update
|
||||
|
||||
```plain
|
||||
2024-06-07T10:00:43.668141+00:00
|
||||
2024-06-07T12:00:18.162631+00:00
|
||||
```
|
||||
|
||||
### Most recent CVE Modification Timestamp synchronized with NVD
|
||||
|
||||
```plain
|
||||
2024-06-07T09:15:12.277000+00:00
|
||||
2024-06-07T11:15:53.353000+00:00
|
||||
```
|
||||
|
||||
### Last Data Feed Release
|
||||
@ -33,29 +33,26 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
|
||||
### Total Number of included CVEs
|
||||
|
||||
```plain
|
||||
252972
|
||||
252978
|
||||
```
|
||||
|
||||
### CVEs added in the last Commit
|
||||
|
||||
Recently added CVEs: `1`
|
||||
Recently added CVEs: `6`
|
||||
|
||||
- [CVE-2024-4703](CVE-2024/CVE-2024-47xx/CVE-2024-4703.json) (`2024-06-07T08:15:32.413`)
|
||||
- [CVE-2023-5424](CVE-2023/CVE-2023-54xx/CVE-2023-5424.json) (`2024-06-07T10:15:10.150`)
|
||||
- [CVE-2024-5426](CVE-2024/CVE-2024-54xx/CVE-2024-5426.json) (`2024-06-07T10:15:11.627`)
|
||||
- [CVE-2024-5481](CVE-2024/CVE-2024-54xx/CVE-2024-5481.json) (`2024-06-07T10:15:11.827`)
|
||||
- [CVE-2024-5637](CVE-2024/CVE-2024-56xx/CVE-2024-5637.json) (`2024-06-07T11:15:53.353`)
|
||||
- [CVE-2024-5645](CVE-2024/CVE-2024-56xx/CVE-2024-5645.json) (`2024-06-07T10:15:12.090`)
|
||||
- [CVE-2024-5732](CVE-2024/CVE-2024-57xx/CVE-2024-5732.json) (`2024-06-07T10:15:12.293`)
|
||||
|
||||
|
||||
### CVEs modified in the last Commit
|
||||
|
||||
Recently modified CVEs: `9`
|
||||
Recently modified CVEs: `1`
|
||||
|
||||
- [CVE-2024-0252](CVE-2024/CVE-2024-02xx/CVE-2024-0252.json) (`2024-06-07T09:15:09.347`)
|
||||
- [CVE-2024-0253](CVE-2024/CVE-2024-02xx/CVE-2024-0253.json) (`2024-06-07T09:15:09.830`)
|
||||
- [CVE-2024-0269](CVE-2024/CVE-2024-02xx/CVE-2024-0269.json) (`2024-06-07T09:15:10.160`)
|
||||
- [CVE-2024-21775](CVE-2024/CVE-2024-217xx/CVE-2024-21775.json) (`2024-06-07T09:15:10.467`)
|
||||
- [CVE-2024-21791](CVE-2024/CVE-2024-217xx/CVE-2024-21791.json) (`2024-06-07T09:15:10.820`)
|
||||
- [CVE-2024-27310](CVE-2024/CVE-2024-273xx/CVE-2024-27310.json) (`2024-06-07T09:15:11.247`)
|
||||
- [CVE-2024-27312](CVE-2024/CVE-2024-273xx/CVE-2024-27312.json) (`2024-06-07T09:15:11.640`)
|
||||
- [CVE-2024-27313](CVE-2024/CVE-2024-273xx/CVE-2024-27313.json) (`2024-06-07T09:15:11.917`)
|
||||
- [CVE-2024-27314](CVE-2024/CVE-2024-273xx/CVE-2024-27314.json) (`2024-06-07T09:15:12.277`)
|
||||
- [CVE-2024-1599](CVE-2024/CVE-2024-15xx/CVE-2024-1599.json) (`2024-06-07T11:15:53.177`)
|
||||
|
||||
|
||||
## Download and Usage
|
||||
|
28
_state.csv
28
_state.csv
@ -238666,6 +238666,7 @@ CVE-2023-5419,0,0,10a57f40b7aa09ec8fee8e0290b35dcaeabec556901f48cd7c53cde048a9a4
|
||||
CVE-2023-5421,0,0,9bb4dab1dacd00462260a3ab6642406f066d48e0d197022fde21a9cdd703b6da,2023-10-19T20:19:21.313000
|
||||
CVE-2023-5422,0,0,a7118324d22c6136fa62d39d957abd68310aa0bb8b0f6398b0e7e6d41dfb2bf3,2023-10-20T18:30:38.187000
|
||||
CVE-2023-5423,0,0,a7079f98fb4c6da8a0096f14e04a54b73b6abccf8b590fe8b0580e02c1d7dbd2,2024-06-04T19:18:10.780000
|
||||
CVE-2023-5424,1,1,adfe567e12f9b728db734539b11fd6df037f4db1a3c33e173c5fa6dc5b372d62,2024-06-07T10:15:10.150000
|
||||
CVE-2023-5425,0,0,f81796d8b9e07f2eefee9bd5546198d643d8c9f01af0f76e9f36bbcaae9c2b38,2023-11-07T21:05:34.097000
|
||||
CVE-2023-5426,0,0,0da4f609138f14c3a07954c76ddd311b67fd914e8a361e4e4a87642b36ebc0b0,2023-11-08T00:48:02.973000
|
||||
CVE-2023-5427,0,0,67f98f3d95537ffc7229ab21eff0bcfb85ceb61e0bccfc759c24879683352ef7,2023-12-06T20:56:58.567000
|
||||
@ -240424,8 +240425,8 @@ CVE-2024-0247,0,0,62eb0631a8f7a8ccde345e9572174c1c005bf9e3d2f6fe4b24e57aaa9c8313
|
||||
CVE-2024-0248,0,0,2c37da61220f65b312245a2221cad9ad4877aec90b17ba5c2a3e9d6be35f7868,2024-02-12T17:31:21.670000
|
||||
CVE-2024-0250,0,0,1024a1aee8c07f43ea895a2e7847039d1e10efacdd7ad8bb0a19e5b1e9b5ffab,2024-02-12T17:31:21.670000
|
||||
CVE-2024-0251,0,0,14956aba5a33632df721b3e529915eceaf50c3d32f322e21763f782642d137c0,2024-01-19T19:55:23.980000
|
||||
CVE-2024-0252,0,1,0742069b1e41d825214331d01ce9e201ec5268e0275b0cee132c0981d24a8c51,2024-06-07T09:15:09.347000
|
||||
CVE-2024-0253,0,1,17245b937e0c32fe975e23111ffc2a6d705cdcda6f929faed8ec43bbc42ed144,2024-06-07T09:15:09.830000
|
||||
CVE-2024-0252,0,0,0742069b1e41d825214331d01ce9e201ec5268e0275b0cee132c0981d24a8c51,2024-06-07T09:15:09.347000
|
||||
CVE-2024-0253,0,0,17245b937e0c32fe975e23111ffc2a6d705cdcda6f929faed8ec43bbc42ed144,2024-06-07T09:15:09.830000
|
||||
CVE-2024-0254,0,0,e5eae8b11bfbdda0720ecba88e72e29efdd7b42117ba1a4582cfd62b02acbde8,2024-02-12T20:53:02.440000
|
||||
CVE-2024-0255,0,0,541867be2e415931a41832092b931a9f6ed85b86ce138a5f77d6aa8f5909e5ad,2024-02-07T23:31:10.567000
|
||||
CVE-2024-0256,0,0,49de163342e5ba45f12c2cbfe0a11fce418d24b9f8f242901a15605875a38ffa,2024-02-14T19:17:28.387000
|
||||
@ -240441,7 +240442,7 @@ CVE-2024-0265,0,0,c92e53ad11d8cc92e384202f84ffb84ebc3a003d44078864509b06cf66d723
|
||||
CVE-2024-0266,0,0,1f93978b4f9e67732f5b15c0c12c46f0abc642ad41cceb231dfc5cf1f4dd3db0,2024-05-17T02:34:26.760000
|
||||
CVE-2024-0267,0,0,7bfa7e3e2406c91814fcd34290ef18f2d24d1589bf4eec596441d1f5524f71fb,2024-05-17T02:34:26.867000
|
||||
CVE-2024-0268,0,0,47456ea67f83d497b23ab66d4eb26e09b3a02ce26d0ebba5362ab64458aec1d3,2024-05-17T02:34:26.973000
|
||||
CVE-2024-0269,0,1,bc92809fbef56177c2266a465311f680c4061e34f4603b208a36bf6fc6a1e8a0,2024-06-07T09:15:10.160000
|
||||
CVE-2024-0269,0,0,bc92809fbef56177c2266a465311f680c4061e34f4603b208a36bf6fc6a1e8a0,2024-06-07T09:15:10.160000
|
||||
CVE-2024-0270,0,0,149ad3058bdac0775166c4ada5886140d2ef7911f78d4ac8cfd20bed2c2a09cf,2024-05-17T02:34:27.107000
|
||||
CVE-2024-0271,0,0,0babf6d710da9e84fe5f2931459a4e7abc266edc03bc1f216288ddf6b7abe814,2024-05-17T02:34:27.210000
|
||||
CVE-2024-0272,0,0,7e654e469550a6946514d4b9e4f195a2cdceebadef5efa3588d6ac1e48606e73,2024-05-17T02:34:27.317000
|
||||
@ -241642,7 +241643,7 @@ CVE-2024-1594,0,0,1d62f8d55fb3a974435872bb233738098cc7a319efe1e15acb72ee1c1daae7
|
||||
CVE-2024-1595,0,0,0ac9aed2c4ed6b9e7bc181d6ab55412b8033a5bfcbc541a4a4b602392614e428,2024-03-01T14:04:26.010000
|
||||
CVE-2024-1597,0,0,98089061f0cdbe74e1216b4d0bdbc732e4b70ff9e9921a5809eedb6f5d4538ee,2024-05-01T18:15:13.333000
|
||||
CVE-2024-1598,0,0,1c541f665599324783f98e8e7828494708c01619833bec5586e6a8d892dd2c89,2024-05-14T19:18:31.490000
|
||||
CVE-2024-1599,0,0,b311d4a0dc15f34db1bbc87ad8dd7c897ec570363d8bc742044c2c93d7c9f5bd,2024-04-10T19:49:51.183000
|
||||
CVE-2024-1599,0,1,2f7770422da9bff7bed3eef076e29376c9b42774c7fc9bda69a503fd449e3156,2024-06-07T11:15:53.177000
|
||||
CVE-2024-1600,0,0,a1cf7c20c4c53ecd0ddc2601c3f6df39efaefde9047db784f0058d6905cd6130,2024-04-10T19:49:51.183000
|
||||
CVE-2024-1601,0,0,5de9e18b0c5a4daa146100818a9ac068a88d159e30320cca5c3c0caf368ddd5c,2024-04-16T13:24:07.103000
|
||||
CVE-2024-1602,0,0,76aec42ffd2b96054ed086070f4eccb3306dfc781bb48ef20d91a6a2f0a7ff04,2024-04-10T19:49:51.183000
|
||||
@ -243015,7 +243016,7 @@ CVE-2024-21771,0,0,ff0afef9e42e6fb9c23e4d4386a81c0240bde8524a0a8802ae4c44d51c80a
|
||||
CVE-2024-21772,0,0,f8e42b69b99cf9d844db5f683999682647c8799992e8b6c4015423ebac9e6e9d,2024-05-17T18:36:05.263000
|
||||
CVE-2024-21773,0,0,345c45cc46b4a2bc7fbfc453c1eb1fa6c31eadeab4db3115f257eaa510affea6,2024-01-18T17:08:43.260000
|
||||
CVE-2024-21774,0,0,1a683c4386593938143db88bd83b2bc14ad5e978ab332a4ec1c1701b534f41d6,2024-05-17T18:36:05.263000
|
||||
CVE-2024-21775,0,1,2f16842bbda9918b4d7f1a6bf73bd7ee820e77b1f7db2f51cb1f9c6ad1d501ef,2024-06-07T09:15:10.467000
|
||||
CVE-2024-21775,0,0,2f16842bbda9918b4d7f1a6bf73bd7ee820e77b1f7db2f51cb1f9c6ad1d501ef,2024-06-07T09:15:10.467000
|
||||
CVE-2024-21777,0,0,44618f6eca8c187e802d1fb8a5513e5c3f7a7b0ff0972cb292dc18c9e5673eb1,2024-05-17T18:36:05.263000
|
||||
CVE-2024-2178,0,0,9dc28451a90e8f509a9a1b870b1413dd7a56d7478bbeb05656b49782563314d4,2024-06-03T14:46:24.250000
|
||||
CVE-2024-21780,0,0,206894ce9dfe6d8af29d8349b60ae2b1f1c1e4c0d8fd3377294811d2785206a2,2024-05-17T02:36:10.020000
|
||||
@ -243024,7 +243025,7 @@ CVE-2024-21785,0,0,7e1dfc062139302ac105f55cd17f3473b4f4084526bd40a9261ab82293585
|
||||
CVE-2024-21788,0,0,38da0f632cd1fea2a38481fa5d82800cc79d63e45addfec9f74ba1417b51ce70,2024-05-17T18:36:05.263000
|
||||
CVE-2024-21789,0,0,065592bcd8c720a7bd60596f25729aa5b68a77a3a9f40afcc7521d9d3e39931f,2024-02-14T18:04:45.380000
|
||||
CVE-2024-2179,0,0,ae7ec0d777d4f092532ca994d6b0860fc5ecc6f92bb84e39b0499b0a5cdf3be6,2024-03-06T15:18:08.093000
|
||||
CVE-2024-21791,0,1,e0cab86533dc35defdd008ab5decdd482c50ec9b66bd24a606c6deb59577e8d1,2024-06-07T09:15:10.820000
|
||||
CVE-2024-21791,0,0,e0cab86533dc35defdd008ab5decdd482c50ec9b66bd24a606c6deb59577e8d1,2024-06-07T09:15:10.820000
|
||||
CVE-2024-21792,0,0,f0ad507f0eb84dd7d85ebb6df20be3f06e6ebf8ecfb2115a3ca7d7445f51f11c,2024-05-17T18:36:05.263000
|
||||
CVE-2024-21793,0,0,b55902d470d37a2479e376b66a185ed8b4afdd3b18a61089b937f4c3059f5d26,2024-05-08T17:05:24.083000
|
||||
CVE-2024-21794,0,0,5140601c591fc7e01c922f6b4426d49907b4278c42a623419c59c4c96fa7afa6,2024-02-07T17:15:44.653000
|
||||
@ -246538,10 +246539,10 @@ CVE-2024-27307,0,0,0637b05d2a36e47d121bc1fe1beac809e09e2be90d0aa4c4cb901114110f3
|
||||
CVE-2024-27308,0,0,2c1853ceb0d45fb092e9c133d6553571b7b9f8a855fc6b4950edbdaad595214f,2024-03-06T21:42:48.053000
|
||||
CVE-2024-27309,0,0,4ff276f1fa3a42e9cba86006da159d603e23baa66b2db98c085aa5a6c3adaee2,2024-05-01T18:15:15.967000
|
||||
CVE-2024-2731,0,0,7242593ba3e5c5b48a25383d38b7647a4613c0186c7dc999e27ef7b770a540e3,2024-04-10T19:49:51.183000
|
||||
CVE-2024-27310,0,1,b45f8a5f5df268ee7d6f50eae8157f5ceefa5fce0c8c6b70a667f82c7c056cd0,2024-06-07T09:15:11.247000
|
||||
CVE-2024-27312,0,1,9f35cba247fedea3f548006ffd04728d6c9e275ad8e782791ca1754778b6d39d,2024-06-07T09:15:11.640000
|
||||
CVE-2024-27313,0,1,abfc55e858edef62cf245a012f5c8675eea16323079fcd802a4ef8e6ddc5d69c,2024-06-07T09:15:11.917000
|
||||
CVE-2024-27314,0,1,6298273c443ed75c3ff6a9720e799c95ed2e5c3d14076aff1cbea4fe45a2368e,2024-06-07T09:15:12.277000
|
||||
CVE-2024-27310,0,0,b45f8a5f5df268ee7d6f50eae8157f5ceefa5fce0c8c6b70a667f82c7c056cd0,2024-06-07T09:15:11.247000
|
||||
CVE-2024-27312,0,0,9f35cba247fedea3f548006ffd04728d6c9e275ad8e782791ca1754778b6d39d,2024-06-07T09:15:11.640000
|
||||
CVE-2024-27313,0,0,abfc55e858edef62cf245a012f5c8675eea16323079fcd802a4ef8e6ddc5d69c,2024-06-07T09:15:11.917000
|
||||
CVE-2024-27314,0,0,6298273c443ed75c3ff6a9720e799c95ed2e5c3d14076aff1cbea4fe45a2368e,2024-06-07T09:15:12.277000
|
||||
CVE-2024-27315,0,0,1b06bd54abb4ee7969c3aca53e6bed402762ed42c4492d0ee8674e3fa0b42312,2024-02-28T15:15:09.670000
|
||||
CVE-2024-27316,0,0,19b8a6dda0ac9a0a2c45dcec3bb7aef1440f1bc238657e5ec83c599ba08266a1,2024-06-06T19:29:53.927000
|
||||
CVE-2024-27317,0,0,c3dded617afb79b595cc5394bc34fa2395e63ed9fe33b66ba0cb8f90b0b09bad,2024-05-01T18:15:16.097000
|
||||
@ -252428,7 +252429,7 @@ CVE-2024-4699,0,0,21634a770b960d22aa24dc1f0ea343763012f9507287610a68f53780612049
|
||||
CVE-2024-4700,0,0,fd7d4a078191a1c31b5f2cfdfc5bd65709b727d250ddf2b831fd6aa84ec620ac,2024-05-21T12:37:59.687000
|
||||
CVE-2024-4701,0,0,31c0f40927cc6a1a9aece611ec4491a5435df4e5c3a9daffc9dfb7710658ca96,2024-05-14T16:11:39.510000
|
||||
CVE-2024-4702,0,0,391d02c5718dd442c026ca8f3973c4fe10894f8eeb54175158dc44cd7ef50d4a,2024-05-15T16:40:19.330000
|
||||
CVE-2024-4703,1,1,ebf51d66342e973b0c5ded35fed37f77effd58dce944f9ec823f31879f8ec0e4,2024-06-07T08:15:32.413000
|
||||
CVE-2024-4703,0,0,ebf51d66342e973b0c5ded35fed37f77effd58dce944f9ec823f31879f8ec0e4,2024-06-07T08:15:32.413000
|
||||
CVE-2024-4705,0,0,b45f335ad46575e30510e82573f02b490faa16d9b6ee89b66a9844ff390b53aa,2024-06-06T14:17:35.017000
|
||||
CVE-2024-4706,0,0,a959e13293b1a5966007eb60c79cb973f34e4d1d8bd1c12986cac54d81ac9a3d,2024-05-24T01:15:30.977000
|
||||
CVE-2024-4707,0,0,d6a01a1a459dfd9ab21945d56af40919cce44b311e282118c993194b130db955,2024-06-06T14:17:35.017000
|
||||
@ -252899,6 +252900,7 @@ CVE-2024-5420,0,0,a73d8f6d4dfc82a2a2c0b4ab3cbb373ed67379d75299be1a27f6ef6c455a38
|
||||
CVE-2024-5421,0,0,79ca1971e275d0efebd28f5347a8ca150a1bd7e69deb239fcb0cd29979a5cc8c,2024-06-04T16:57:41.053000
|
||||
CVE-2024-5422,0,0,22b69754062c7145c382eca03e4d53f86a6d68d1fbe6295548fe29968bcde31c,2024-06-04T16:57:41.053000
|
||||
CVE-2024-5425,0,0,6092e19396deba213e85ae08bbcc12bed3d27afd586c83d01af99efa1b8182c3,2024-06-07T04:15:32.597000
|
||||
CVE-2024-5426,1,1,f0ba7165774eb511a9428d5fa891e29ba886c75861e32ff30e1b730e5ef3d885,2024-06-07T10:15:11.627000
|
||||
CVE-2024-5427,0,0,42975a4514a9d913e780b5e6c34dc14580ffe2cdca703f885481d0f432a70e28,2024-05-31T13:01:46.727000
|
||||
CVE-2024-5428,0,0,febfd9b4f977de4c3dc04e5fc8e71b9454e3ad809e74595cd325ad9561a295a7,2024-05-28T14:59:09.827000
|
||||
CVE-2024-5433,0,0,d0946774ada383b4af0e78f23b9c449d05f83a7124810af4e383f90b0cdbda75,2024-05-29T13:02:09.280000
|
||||
@ -252913,6 +252915,7 @@ CVE-2024-5459,0,0,9ffec4e6ddf7de8eef808a13af7e4d67efb473b64a2ed4688c4272492e191c
|
||||
CVE-2024-5463,0,0,a83ead02d534db419d64d9a246adc999062f3a690f2d2cbba14bffeb9debf0f5,2024-06-04T16:57:41.053000
|
||||
CVE-2024-5478,0,0,1ef0bb50a649d100e6b6e5867a32346dbaf702df776fd9ccf56584d5ac31685c,2024-06-06T19:16:08.933000
|
||||
CVE-2024-5480,0,0,7acd9272dfc79491331c2743580d8bf7851e57b6d749beaee672d10d57699079,2024-06-06T19:16:09.177000
|
||||
CVE-2024-5481,1,1,f4650e5a9e70e91e77d53046237c989c45ea8e4fb011dcec564220c3917625f1,2024-06-07T10:15:11.827000
|
||||
CVE-2024-5482,0,0,e11c8a82377eae1fe2257fe2ef2320fbfa70a31638b38065c37bd2fe4d218241,2024-06-06T18:15:21.207000
|
||||
CVE-2024-5483,0,0,88635ac2041f9699472eef4c51a5eb67a3fcf4378dec7f1a98452fd31b9eaa6a,2024-06-05T12:53:50.240000
|
||||
CVE-2024-5484,0,0,7de35f8eee9232651ed147ec3168f6740617b1737ec3ff6913988b98b84f6ef1,2024-05-31T11:15:09.783000
|
||||
@ -252962,7 +252965,9 @@ CVE-2024-5615,0,0,2b9f4fbf88dd4ea6ff55678ac9c0762fd6b29ae2ea4765ff6af29ac25e53e3
|
||||
CVE-2024-5629,0,0,2b19d175fd80b16aa424307957676ae3dd964a506cce5329fc9e2ea04d26ec96,2024-06-06T14:17:35.017000
|
||||
CVE-2024-5635,0,0,2f4fd95f40cb43c9475682f37f78b479557c0ba40bc4b87c84bd3a410bdbca2c,2024-06-05T12:53:50.240000
|
||||
CVE-2024-5636,0,0,ae2ff24a8e15c0ed795cb405ff4b68943ed8f15194eed9e4ca4bf581e03cae2a,2024-06-05T12:53:50.240000
|
||||
CVE-2024-5637,1,1,e07e931e7c62c0ad4dabf9bd2d6406ff9b88e8a72195cd3302eefb33f585445f,2024-06-07T11:15:53.353000
|
||||
CVE-2024-5640,0,0,785e2574eb7b079aab076db7f0229c04a13e86681b300342f00e17b399aeb615,2024-06-07T05:15:50.730000
|
||||
CVE-2024-5645,1,1,1277fbcf5a971876f13ccf037dda56ec4bd3121192c25c235de45aca7b607e2f,2024-06-07T10:15:12.090000
|
||||
CVE-2024-5653,0,0,283076b6ccce08ae3d1ddf9d7f5983a839d66c80929543a8a527d0bfdf86a2f9,2024-06-06T14:17:35.017000
|
||||
CVE-2024-5656,0,0,adabf37f78545832b9e31783c044d8f042bfbaaca432946aa95ed82eb518777b,2024-06-06T14:17:35.017000
|
||||
CVE-2024-5657,0,0,b9899ab9d953b5e4a78b96db0691f3e8b536e92241286e49b6931592afb0dbef,2024-06-06T14:17:35.017000
|
||||
@ -252971,3 +252976,4 @@ CVE-2024-5665,0,0,bd958d396bb4ad35b63d57ac1176d92cc2fe04cdc3b5189c4ab55e781e3023
|
||||
CVE-2024-5673,0,0,b896d7e323904f9e987f87941609f4675d0746a7c5358db642d05671db0b87b4,2024-06-06T14:17:35.017000
|
||||
CVE-2024-5675,0,0,38acd8263eeb8d1e4c48e0984f055dd4606319e26fa8928f4d3e5881bdfd6563,2024-06-06T14:17:35.017000
|
||||
CVE-2024-5684,0,0,b2f8ad263f684025e461aeac45146ad505c13a2339a4851373464b5600c43386,2024-06-06T14:17:35.017000
|
||||
CVE-2024-5732,1,1,fc923aa6728a25234fa6531e6345ccffb223cf9da524e30207a6e79495962e63,2024-06-07T10:15:12.293000
|
||||
|
Can't render this file because it is too large.
|
Loading…
x
Reference in New Issue
Block a user