diff --git a/CVE-2024/CVE-2024-19xx/CVE-2024-1988.json b/CVE-2024/CVE-2024-19xx/CVE-2024-1988.json new file mode 100644 index 00000000000..4fff8d89c0a --- /dev/null +++ b/CVE-2024/CVE-2024-19xx/CVE-2024-1988.json @@ -0,0 +1,47 @@ +{ + "id": "CVE-2024-1988", + "sourceIdentifier": "security@wordfence.com", + "published": "2024-06-07T04:15:25.850", + "lastModified": "2024-06-07T04:15:25.850", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "The Post Grid, Form Maker, Popup Maker, WooCommerce Blocks, Post Blocks, Post Carousel \u2013 Combo Blocks plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'tag' attribute in blocks in all versions up to, and including, 2.2.80 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security@wordfence.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 6.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 3.1, + "impactScore": 2.7 + } + ] + }, + "references": [ + { + "url": "https://plugins.trac.wordpress.org/changeset/3084503/post-grid/tags/2.2.81/includes/blocks/accordion-nested-item/index.php", + "source": "security@wordfence.com" + }, + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/e49da9e7-26a1-442b-b5d0-1da3bcf0e8c9?source=cve", + "source": "security@wordfence.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-360xx/CVE-2024-36082.json b/CVE-2024/CVE-2024-360xx/CVE-2024-36082.json new file mode 100644 index 00000000000..ff905bad852 --- /dev/null +++ b/CVE-2024/CVE-2024-360xx/CVE-2024-36082.json @@ -0,0 +1,28 @@ +{ + "id": "CVE-2024-36082", + "sourceIdentifier": "vultures@jpcert.or.jp", + "published": "2024-06-07T04:15:30.357", + "lastModified": "2024-06-07T04:15:30.357", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "SQL injection vulnerability in Music Store - WordPress eCommerce versions prior to 1.1.14 allows a remote authenticated attacker with an administrative privilege to execute arbitrary SQL commands. Information stored in the database may be obtained or altered by the attacker." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://jvn.jp/en/jp/JVN79213252/", + "source": "vultures@jpcert.or.jp" + }, + { + "url": "https://plugins.trac.wordpress.org/changeset?new=3085975%40music-store%2Ftrunk%2Fmusic-store.php&old=3079647%40music-store%2Ftrunk%2Fmusic-store.php", + "source": "vultures@jpcert.or.jp" + }, + { + "url": "https://wordpress.org/plugins/music-store/", + "source": "vultures@jpcert.or.jp" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-373xx/CVE-2024-37383.json b/CVE-2024/CVE-2024-373xx/CVE-2024-37383.json new file mode 100644 index 00000000000..b326fbd52d9 --- /dev/null +++ b/CVE-2024/CVE-2024-373xx/CVE-2024-37383.json @@ -0,0 +1,28 @@ +{ + "id": "CVE-2024-37383", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-06-07T04:15:30.463", + "lastModified": "2024-06-07T04:15:30.463", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Roundcube Webmail before 1.5.7 and 1.6.x before 1.6.7 allows XSS via SVG animate attributes." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/roundcube/roundcubemail/commit/43aaaa528646877789ec028d87924ba1accf5242", + "source": "cve@mitre.org" + }, + { + "url": "https://github.com/roundcube/roundcubemail/releases/tag/1.5.7", + "source": "cve@mitre.org" + }, + { + "url": "https://github.com/roundcube/roundcubemail/releases/tag/1.6.7", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-373xx/CVE-2024-37384.json b/CVE-2024/CVE-2024-373xx/CVE-2024-37384.json new file mode 100644 index 00000000000..32a3fcbd180 --- /dev/null +++ b/CVE-2024/CVE-2024-373xx/CVE-2024-37384.json @@ -0,0 +1,28 @@ +{ + "id": "CVE-2024-37384", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-06-07T04:15:30.597", + "lastModified": "2024-06-07T04:15:30.597", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Roundcube Webmail before 1.5.7 and 1.6.x before 1.6.7 allows XSS via list columns from user preferences." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/roundcube/roundcubemail/commit/cde4522c5c95f13c6aeeb1600ab17e5067a536f7", + "source": "cve@mitre.org" + }, + { + "url": "https://github.com/roundcube/roundcubemail/releases/tag/1.5.7", + "source": "cve@mitre.org" + }, + { + "url": "https://github.com/roundcube/roundcubemail/releases/tag/1.6.7", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-373xx/CVE-2024-37385.json b/CVE-2024/CVE-2024-373xx/CVE-2024-37385.json new file mode 100644 index 00000000000..ebee0f85013 --- /dev/null +++ b/CVE-2024/CVE-2024-373xx/CVE-2024-37385.json @@ -0,0 +1,28 @@ +{ + "id": "CVE-2024-37385", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-06-07T04:15:30.720", + "lastModified": "2024-06-07T04:15:30.720", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Roundcube Webmail before 1.5.7 and 1.6.x before 1.6.7 on Windows allows command injection via im_convert_path and im_identify_path. NOTE: this issue exists because of an incomplete fix for CVE-2020-12641." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/roundcube/roundcubemail/commit/5ea9f37ce39374b6124586c0590fec7015d35d7f", + "source": "cve@mitre.org" + }, + { + "url": "https://github.com/roundcube/roundcubemail/releases/tag/1.5.7", + "source": "cve@mitre.org" + }, + { + "url": "https://github.com/roundcube/roundcubemail/releases/tag/1.6.7", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-48xx/CVE-2024-4887.json b/CVE-2024/CVE-2024-48xx/CVE-2024-4887.json new file mode 100644 index 00000000000..9676a28b742 --- /dev/null +++ b/CVE-2024/CVE-2024-48xx/CVE-2024-4887.json @@ -0,0 +1,47 @@ +{ + "id": "CVE-2024-4887", + "sourceIdentifier": "security@wordfence.com", + "published": "2024-06-07T04:15:31.777", + "lastModified": "2024-06-07T04:15:31.777", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "The Qi Addons For Elementor plugin for WordPress is vulnerable to Remote File Inclusion in all versions up to, and including, 1.7.2 via the 'behavior' attributes found in the qi_addons_for_elementor_blog_list shortcode. This makes it possible for authenticated attackers, with Contributor-level access and above, to include remote files on the server, resulting in code execution. Please note that this requires an attacker to create a non-existent directory or target an instance where file_exists won't return false with a non-existent directory in the path, in order to successfully exploit." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security@wordfence.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.6, + "impactScore": 5.9 + } + ] + }, + "references": [ + { + "url": "https://plugins.trac.wordpress.org/changeset/3096634/qi-addons-for-elementor/trunk/inc/admin/helpers/helper.php", + "source": "security@wordfence.com" + }, + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/284daad9-d31e-4d29-ac15-ba293ba9640d?source=cve", + "source": "security@wordfence.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-49xx/CVE-2024-4902.json b/CVE-2024/CVE-2024-49xx/CVE-2024-4902.json new file mode 100644 index 00000000000..60e77a1d8b1 --- /dev/null +++ b/CVE-2024/CVE-2024-49xx/CVE-2024-4902.json @@ -0,0 +1,51 @@ +{ + "id": "CVE-2024-4902", + "sourceIdentifier": "security@wordfence.com", + "published": "2024-06-07T05:15:49.740", + "lastModified": "2024-06-07T05:15:49.740", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "The Tutor LMS \u2013 eLearning and online course solution plugin for WordPress is vulnerable to time-based SQL Injection via the \u2018course_id\u2019 parameter in all versions up to, and including, 2.7.1 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for authenticated attackers, with admin access and above, to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security@wordfence.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.2, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.2, + "impactScore": 5.9 + } + ] + }, + "references": [ + { + "url": "https://plugins.trac.wordpress.org/browser/tutor/tags/2.7.0/classes/Utils.php#L1936", + "source": "security@wordfence.com" + }, + { + "url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&new=3098465%40tutor%2Ftrunk&old=3086489%40tutor%2Ftrunk&sfp_email=&sfph_mail=#file8", + "source": "security@wordfence.com" + }, + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/f00e8169-3b8f-44a0-9af2-e81777a913f8?source=cve", + "source": "security@wordfence.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-54xx/CVE-2024-5425.json b/CVE-2024/CVE-2024-54xx/CVE-2024-5425.json new file mode 100644 index 00000000000..6622c3d7307 --- /dev/null +++ b/CVE-2024/CVE-2024-54xx/CVE-2024-5425.json @@ -0,0 +1,59 @@ +{ + "id": "CVE-2024-5425", + "sourceIdentifier": "security@wordfence.com", + "published": "2024-06-07T04:15:32.597", + "lastModified": "2024-06-07T04:15:32.597", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "The WP jQuery Lightbox plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the \u2018title\u2019 attribute in all versions up to, and including, 1.5.4 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security@wordfence.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 6.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 3.1, + "impactScore": 2.7 + } + ] + }, + "references": [ + { + "url": "https://github.com/lokesh/lightbox2/blob/dev/src/js/lightbox.js#L57", + "source": "security@wordfence.com" + }, + { + "url": "https://plugins.trac.wordpress.org/browser/wp-jquery-lightbox/trunk/jquery.lightbox.js", + "source": "security@wordfence.com" + }, + { + "url": "https://plugins.trac.wordpress.org/changeset/3097604/#file8", + "source": "security@wordfence.com" + }, + { + "url": "https://wordpress.org/plugins/wp-jquery-lightbox/#developers", + "source": "security@wordfence.com" + }, + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/b3439710-1159-4677-93c9-14bacfbf0b55?source=cve", + "source": "security@wordfence.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-56xx/CVE-2024-5612.json b/CVE-2024/CVE-2024-56xx/CVE-2024-5612.json new file mode 100644 index 00000000000..1dbd4b322f5 --- /dev/null +++ b/CVE-2024/CVE-2024-56xx/CVE-2024-5612.json @@ -0,0 +1,47 @@ +{ + "id": "CVE-2024-5612", + "sourceIdentifier": "security@wordfence.com", + "published": "2024-06-07T05:15:50.523", + "lastModified": "2024-06-07T05:15:50.523", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "The Essential Addons for Elementor Pro plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the \u2018eael_lightbox_open_btn_icon\u2019 parameter within the Lightbox & Modal widget in all versions up to, and including, 5.8.15 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security@wordfence.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 6.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 3.1, + "impactScore": 2.7 + } + ] + }, + "references": [ + { + "url": "https://essential-addons.com/changelog/", + "source": "security@wordfence.com" + }, + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/8dbe4104-b7d1-484f-a843-a3d1fc02999d?source=cve", + "source": "security@wordfence.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-56xx/CVE-2024-5640.json b/CVE-2024/CVE-2024-56xx/CVE-2024-5640.json new file mode 100644 index 00000000000..e191f51dfa1 --- /dev/null +++ b/CVE-2024/CVE-2024-56xx/CVE-2024-5640.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2024-5640", + "sourceIdentifier": "security@wordfence.com", + "published": "2024-06-07T05:15:50.730", + "lastModified": "2024-06-07T05:15:50.730", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "The Prime Slider \u2013 Addons For Elementor (Revolution of a slider, Hero Slider, Ecommerce Slider) plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the \u2018id\u2019 attribute within the Pacific widget in all versions up to, and including, 3.14.7 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security@wordfence.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 6.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 3.1, + "impactScore": 2.7 + } + ] + }, + "references": [ + { + "url": "https://plugins.trac.wordpress.org/browser/bdthemes-prime-slider-lite/tags/3.14.7/modules/pacific/widgets/pacific.php#L1462", + "source": "security@wordfence.com" + }, + { + "url": "https://plugins.trac.wordpress.org/changeset/3097891/#file372", + "source": "security@wordfence.com" + }, + { + "url": "https://wordpress.org/plugins/bdthemes-prime-slider-lite/#developers", + "source": "security@wordfence.com" + }, + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/9820b52b-540a-47e8-9e5f-274ef1720ffa?source=cve", + "source": "security@wordfence.com" + } + ] +} \ No newline at end of file diff --git a/README.md b/README.md index 6b5004150ac..f902cd97c20 100644 --- a/README.md +++ b/README.md @@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2024-06-07T04:00:17.978415+00:00 +2024-06-07T06:00:18.650686+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2024-06-07T03:15:09.630000+00:00 +2024-06-07T05:15:50.730000+00:00 ``` ### Last Data Feed Release @@ -33,19 +33,23 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### Total Number of included CVEs ```plain -252949 +252959 ``` ### CVEs added in the last Commit -Recently added CVEs: `6` +Recently added CVEs: `10` -- [CVE-2023-32475](CVE-2023/CVE-2023-324xx/CVE-2023-32475.json) (`2024-06-07T03:15:08.950`) -- [CVE-2023-6876](CVE-2023/CVE-2023-68xx/CVE-2023-6876.json) (`2024-06-07T02:15:08.933`) -- [CVE-2024-1689](CVE-2024/CVE-2024-16xx/CVE-2024-1689.json) (`2024-06-07T02:15:09.203`) -- [CVE-2024-1768](CVE-2024/CVE-2024-17xx/CVE-2024-1768.json) (`2024-06-07T03:15:09.237`) -- [CVE-2024-3987](CVE-2024/CVE-2024-39xx/CVE-2024-3987.json) (`2024-06-07T03:15:09.440`) -- [CVE-2024-5607](CVE-2024/CVE-2024-56xx/CVE-2024-5607.json) (`2024-06-07T03:15:09.630`) +- [CVE-2024-1988](CVE-2024/CVE-2024-19xx/CVE-2024-1988.json) (`2024-06-07T04:15:25.850`) +- [CVE-2024-36082](CVE-2024/CVE-2024-360xx/CVE-2024-36082.json) (`2024-06-07T04:15:30.357`) +- [CVE-2024-37383](CVE-2024/CVE-2024-373xx/CVE-2024-37383.json) (`2024-06-07T04:15:30.463`) +- [CVE-2024-37384](CVE-2024/CVE-2024-373xx/CVE-2024-37384.json) (`2024-06-07T04:15:30.597`) +- [CVE-2024-37385](CVE-2024/CVE-2024-373xx/CVE-2024-37385.json) (`2024-06-07T04:15:30.720`) +- [CVE-2024-4887](CVE-2024/CVE-2024-48xx/CVE-2024-4887.json) (`2024-06-07T04:15:31.777`) +- [CVE-2024-4902](CVE-2024/CVE-2024-49xx/CVE-2024-4902.json) (`2024-06-07T05:15:49.740`) +- [CVE-2024-5425](CVE-2024/CVE-2024-54xx/CVE-2024-5425.json) (`2024-06-07T04:15:32.597`) +- [CVE-2024-5612](CVE-2024/CVE-2024-56xx/CVE-2024-5612.json) (`2024-06-07T05:15:50.523`) +- [CVE-2024-5640](CVE-2024/CVE-2024-56xx/CVE-2024-5640.json) (`2024-06-07T05:15:50.730`) ### CVEs modified in the last Commit diff --git a/_state.csv b/_state.csv index c490ba3e4a4..641b405380e 100644 --- a/_state.csv +++ b/_state.csv @@ -223960,7 +223960,7 @@ CVE-2023-32469,0,0,c64f718d771da097b11fa482f724641a50f58bd141ecdac8ef1bd9ca3a93b CVE-2023-3247,0,0,944c7a9512d0302f40ba18a4d82c1511a534aceb1c4dea9f4a52b787f5bc6104,2023-08-01T16:38:09.033000 CVE-2023-32470,0,0,cf1fb93bb33344b250fa425962be9282d4e9421bfa05744d38e6fb334ebf28ff,2023-09-13T14:37:24.530000 CVE-2023-32474,0,0,14a7699c96745d2416031df6a87cf303ba86dd81dec884626035282f55099052,2024-02-12T21:37:18.687000 -CVE-2023-32475,1,1,f865531aabb7a749b97b40a09c1fabc6b408138b7171f1063f2c9735185792f5,2024-06-07T03:15:08.950000 +CVE-2023-32475,0,0,f865531aabb7a749b97b40a09c1fabc6b408138b7171f1063f2c9735185792f5,2024-06-07T03:15:08.950000 CVE-2023-32476,0,0,f67bfea26297a4cf8c38d5da9786d71b4b8bf1feb4789219a97bb09d5d395732,2023-07-31T17:05:59.917000 CVE-2023-32477,0,0,c6c53e53bb15cc4bb1e010bc91b9bd9b6aeeeac451ae42307ec3c88df745781c,2023-10-03T15:57:15.073000 CVE-2023-32478,0,0,0a9e3e2ada95dec3b888569322d70937b16477be7b01831c757a4021ed4b299f,2023-07-31T15:08:44.263000 @@ -239937,7 +239937,7 @@ CVE-2023-6872,0,0,d1c5b3fc1b3bfefd87d9dad8a9622927485875cb234fe331fefad2ca7b68f5 CVE-2023-6873,0,0,8c787d6e899bda0014371f2611891a291dd7e798bedb926309aeaa78c7003d1a,2024-02-02T02:29:27.507000 CVE-2023-6874,0,0,20d55c881c8740c1c9c245c80d2419e8fd6fe7a8ac50e023c72f933e5bdbc8a7,2024-02-10T04:08:53.127000 CVE-2023-6875,0,0,fa50f826ef562493657259922f0d672e1042b5b70e3533a566fc049edbe41c1f,2024-01-18T16:11:25.827000 -CVE-2023-6876,1,1,e659290321848fd1c3ee46b510935c7093662cece1b15a68bc6881338c3d07bf,2024-06-07T02:15:08.933000 +CVE-2023-6876,0,0,e659290321848fd1c3ee46b510935c7093662cece1b15a68bc6881338c3d07bf,2024-06-07T02:15:08.933000 CVE-2023-6877,0,0,584d67ded4d169f0ddd54eb7b0729da99776ef4f5bf8697e2f8dfbb6685f9320,2024-04-08T18:48:40.217000 CVE-2023-6878,0,0,c06c28c6ac809dd95b68d213aef696c4411990fd4045334f25f507941978e9dc,2024-01-18T16:34:53.617000 CVE-2023-6879,0,0,c08e575832036ecb7220ddc25f6a81feccb5763236592178949cea3294fefa99,2024-02-02T02:27:15.863000 @@ -241711,7 +241711,7 @@ CVE-2024-1685,0,0,8445feed0f23c24c027406dbf274ee8e68366861af592aeb58da42b6e55054 CVE-2024-1686,0,0,513b8933def64d694b65e22b1395645ba43c1774153040be97c24d03679a5263,2024-02-27T14:20:06.637000 CVE-2024-1687,0,0,2c139dd7a4cd5eb96b19cf20743fdcf2a4372838670ad53c30ef28a6668ce9e0,2024-02-27T14:20:06.637000 CVE-2024-1688,0,0,00b4663231fd4363af58c5c1074d228a7c964744d2f38e0ca153752afc0e6216,2024-05-02T18:00:37.360000 -CVE-2024-1689,1,1,d07a3205c6ad81eb865662554c83592e9b340bde5cfc192dc0028c959970fb03,2024-06-07T02:15:09.203000 +CVE-2024-1689,0,0,d07a3205c6ad81eb865662554c83592e9b340bde5cfc192dc0028c959970fb03,2024-06-07T02:15:09.203000 CVE-2024-1690,0,0,f64df43faf81ef2a8a790a9c7a5603e22ee6007009a611d7b1688df810896620,2024-03-13T18:15:58.530000 CVE-2024-1691,0,0,f122d989b2d57485de350b354a899ca74c01df04d45a49a682097dfa29b4d980,2024-03-13T18:15:58.530000 CVE-2024-1692,0,0,ef8c2f206aee0606f4bca6d6f966b02bdbb84047340b5cc369611d2c6473005f,2024-04-01T01:12:59.077000 @@ -241779,7 +241779,7 @@ CVE-2024-1763,0,0,405c885dcc4adbf16a17f7b66d8be03ca446d597a243846c9d27588a2fd0ac CVE-2024-1764,0,0,c434e7eb3867d4e9c121215628110f61b78b54be2a078e3d4abbb0d2595e2437,2024-03-06T15:18:08.093000 CVE-2024-1765,0,0,9393650a3716a95a879e579180f18ed4907e1cef3b587b0e572b47942072153d,2024-03-13T12:33:51.697000 CVE-2024-1767,0,0,44a1b3e1abe3115036290e03cd73084f6f589982886166b1120c38962e210b6c,2024-03-11T01:32:39.697000 -CVE-2024-1768,1,1,800943f9c3d42539592b2145e9277b4b49b75eb62044406ca874414c13d9fd7f,2024-06-07T03:15:09.237000 +CVE-2024-1768,0,0,800943f9c3d42539592b2145e9277b4b49b75eb62044406ca874414c13d9fd7f,2024-06-07T03:15:09.237000 CVE-2024-1769,0,0,c8ffc3f95047b836c5cc91dc3d0971a1ad3cd68218c48289a6e49b8c5f51f807,2024-03-05T13:41:01.900000 CVE-2024-1770,0,0,333904774d9a4f3dfdb80debed66f75e1822143539d08bcc59c6ad7076c3f64d,2024-03-28T12:42:56.150000 CVE-2024-1771,0,0,cc7280a085dd6f03eb9687c2eff5425926f2bc0e4a81dde799379b7786c7a87e,2024-03-06T15:18:08.093000 @@ -241977,6 +241977,7 @@ CVE-2024-1984,0,0,465cc0e2e1f58fc8492061094a8536c47636769a8f8e9054141eb83f9d971f CVE-2024-1985,0,0,f4d22aa67ab0779a241527c882b8b9cfdde337f2865b4bc4e809350f7d4a661e,2024-03-13T18:15:58.530000 CVE-2024-1986,0,0,3573e34f135546ed04633bd0d17cea080212de55551e8ab04d2e00c52e1a5093,2024-03-08T14:02:57.420000 CVE-2024-1987,0,0,51b6353c7487197fcf85dba32dd0017998b1425a36ba707e32269bf4afb531af,2024-03-08T14:02:57.420000 +CVE-2024-1988,1,1,feb9fd92c0aef8888f13b4fbd3bf7701aa3333e64857f9199318b419fa5cc462,2024-06-07T04:15:25.850000 CVE-2024-1989,0,0,e603d4bdfbac73448a418c09b573178507e96a797a5be54fa1a78504bbf887da,2024-03-06T15:18:08.093000 CVE-2024-1990,0,0,18962fc675767ec36941dde216e2cdde20628da130363efb991b1aaf982f61a8,2024-04-10T13:23:38.787000 CVE-2024-1991,0,0,6ed6543aa2fe028ae9875088171a10ff91252f94ba37ee2f5600210d331d8c90,2024-04-10T13:23:38.787000 @@ -251425,6 +251426,7 @@ CVE-2024-36078,0,0,c51f0267c8f676ff86e885fc858add33b498be4bce4ced499be9c0d55f68f CVE-2024-36079,0,0,fdb9a00040976f09fbaf93ec1c9cec0113756b033e4d68b6334fa44aebe9f8d5,2024-05-28T12:39:42.673000 CVE-2024-36080,0,0,de5551202af1794b77e1032fd6ee35ba7df3ef2929b44077b5dc18aee0b886df,2024-05-20T13:00:04.957000 CVE-2024-36081,0,0,d4f0cf242ca757b4f303ae5368ae2b4579e3452ad04759648a40396f5d2c3712,2024-05-20T13:00:04.957000 +CVE-2024-36082,1,1,3b3a14fb7adc835c096bd48dcbbcf73aad4370c235f3bf04b1feeb19026a9ae2,2024-06-07T04:15:30.357000 CVE-2024-3609,0,0,ed7edf68142e8387ad834c19a7338682e57310d52666dd6c703556dcd2e4f649,2024-05-17T18:36:05.263000 CVE-2024-36104,0,0,d791090d63e65d841ba8ee5d3ad2141bb986481787582de2f23200ce4780a74f,2024-06-04T16:57:41.053000 CVE-2024-36105,0,0,4b0fed9ed2485549411fb1c0dd5b530df11ef2b63c1b154f3cb43f2c66dea72a,2024-05-28T12:39:28.377000 @@ -251734,6 +251736,9 @@ CVE-2024-3736,0,0,8212a13db4363d6279d1d8c19924659c1f0cf224cf46584ea7e82cad3d6da3 CVE-2024-37364,0,0,3eb7ac1ae1d4ccfc84dd9fb416453798b3e571372669c090d9ca048f78636528,2024-06-06T19:15:58.900000 CVE-2024-3737,0,0,e288f29127240d626de190f33aa5cc85cc615dc26f102a0c00221aa9708716e3,2024-05-17T02:40:05.887000 CVE-2024-3738,0,0,0968d9618a10c036b25eaa390531466819e491a5c992bcf4c715af4b591b9121,2024-05-17T02:40:05.977000 +CVE-2024-37383,1,1,db495e12281b46654ea3c15d28602c931d728295a758b8489765c1057a45ec06,2024-06-07T04:15:30.463000 +CVE-2024-37384,1,1,5dac19b22ce324d995735a0a8cc7982c6b5de909be174974cde5275245626f89,2024-06-07T04:15:30.597000 +CVE-2024-37385,1,1,bc9150caa0bb6a3a2c953194330140f9505dbf1f8d7ab275b9fc8362638f2c31,2024-06-07T04:15:30.720000 CVE-2024-3739,0,0,18ca969c974b63c6d16494fbcc2d63756747cacc5947332fefb20d9c592537e4,2024-05-17T02:40:06.067000 CVE-2024-3740,0,0,1025f598f3437296a5a18526d2723c88eb3b5b46ea06c50b765dc694c6a0bd1a,2024-05-17T02:40:06.170000 CVE-2024-3741,0,0,a12bddc029cd8ca7f24831417695630babe629dc15b981c15e3d0a9ffa405fdc,2024-05-28T17:15:11.327000 @@ -251916,7 +251921,7 @@ CVE-2024-3970,0,0,a6d2ad116e736372d8ee0cd28cd0cbfef25f3ce953ea92bdb2b1ac922e65ee CVE-2024-3974,0,0,30b94b89b01dd2c6057362330f67dc78937f3f3edffa0c5a57e7602f711f919a,2024-05-14T16:11:39.510000 CVE-2024-3979,0,0,4ac2126fe63098861061c1ed3772b0712449f42e64a5481492de94fd61a5b947,2024-06-06T20:15:14.127000 CVE-2024-3985,0,0,73586f1cedc99952324792e19f078c055584e6e606f6222ac3907090ad395ced,2024-05-02T18:00:37.360000 -CVE-2024-3987,1,1,2ba800c075c8898e9535a892de09f9f8e1c9994e81e8f9dea003439ba3a3320b,2024-06-07T03:15:09.440000 +CVE-2024-3987,0,0,2ba800c075c8898e9535a892de09f9f8e1c9994e81e8f9dea003439ba3a3320b,2024-06-07T03:15:09.440000 CVE-2024-3988,0,0,ed49ad0e503298ba2fe40c90a665a86dcb918b5087ac61c1edfd746c2ca95d24,2024-04-25T13:18:13.537000 CVE-2024-3989,0,0,41a6b1dcae0354fb8cba40366dc7ed1eeb84d6a6a33689c35123198fe63c8f01,2024-05-14T16:11:39.510000 CVE-2024-3990,0,0,7879115af68e1891db08bd2dafc44fb55db15680f59885de2ed87fd5c16d9492,2024-05-14T16:11:39.510000 @@ -252532,6 +252537,7 @@ CVE-2024-4875,0,0,aa35cb89fee530b58aa987ffc67ea97738c0ba567903bf01429a1a1259923d CVE-2024-4876,0,0,02aac8d1be489833aa2e07f8be8ce083249ac7dc2fcc33fd144386b8d365fef2,2024-05-21T12:37:59.687000 CVE-2024-4881,0,0,e94ef2b7a30de46b5b085946210161ddf96a8fad133990a564855b6e96560941,2024-06-06T19:16:03.063000 CVE-2024-4886,0,0,85721324d8c885a233247da6b42e2a33cd86be9ab4caebe3f5bcde7804348df2,2024-06-05T12:53:50.240000 +CVE-2024-4887,1,1,a389078118311f926c5968043d435de83d09b7eefbfaf5f3fa89b6f3ecbc8a21,2024-06-07T04:15:31.777000 CVE-2024-4888,0,0,0f9ee5c823f93b1822181f266acae334db882fefffed9faa78d8a4f6efa4c493,2024-06-06T19:16:03.397000 CVE-2024-4889,0,0,9252b1f295e1c91a6ad913b56379218937d10764f340f97a691fc0c5103aa211,2024-06-06T18:15:18.577000 CVE-2024-4890,0,0,0b482ebf975063cb8be0c21e015578642277be48392b6a7c06b7ab0e86f7b4bc,2024-06-06T19:16:03.630000 @@ -252540,6 +252546,7 @@ CVE-2024-4893,0,0,d5ebc2dfcb13b74b4f1951a124d2e638a95f79aa05d19e6fadfe65b7ad1c4f CVE-2024-4894,0,0,d68130303d356c053d0f6768d0ee08506e206d16216142c952b9b56af8835d24,2024-05-15T16:40:19.330000 CVE-2024-4895,0,0,be42ef886a64c01ec9437b4cfbce4dfdf0b902fbee0c6083bfc71de776f15b0e,2024-05-24T01:15:30.977000 CVE-2024-4896,0,0,6456cc9b22aff68532bfeeb7637d5235216630d84771d1ec52d84fa467e4b7a6,2024-05-22T12:46:53.887000 +CVE-2024-4902,1,1,b9c0f0a1aa54e5da971ac72706b59b8f32f93c778b6bfceb521dd1ce6c3d6fc1,2024-06-07T05:15:49.740000 CVE-2024-4903,0,0,422702316cad5ffa3b808ee432ae74ee6cfe10ab31dd2fa04b70f5cce86e3c3a,2024-05-17T02:40:40.423000 CVE-2024-4904,0,0,44558a4b32290e2f940be10d0a83b859aa6fae2c01ef1c881d37a435bb46f91d,2024-06-04T19:20:52.380000 CVE-2024-4905,0,0,4d48951e7b7cf79f9190550a03c32ee936be1c12de421cb217aeb522ad401862,2024-06-04T19:20:52.480000 @@ -252878,6 +252885,7 @@ CVE-2024-5418,0,0,2256a9e2dd23df3cf1b1192c58484a92d936d5218e6c5eda868cde380ba142 CVE-2024-5420,0,0,a73d8f6d4dfc82a2a2c0b4ab3cbb373ed67379d75299be1a27f6ef6c455a38e1,2024-06-04T16:57:41.053000 CVE-2024-5421,0,0,79ca1971e275d0efebd28f5347a8ca150a1bd7e69deb239fcb0cd29979a5cc8c,2024-06-04T16:57:41.053000 CVE-2024-5422,0,0,22b69754062c7145c382eca03e4d53f86a6d68d1fbe6295548fe29968bcde31c,2024-06-04T16:57:41.053000 +CVE-2024-5425,1,1,6092e19396deba213e85ae08bbcc12bed3d27afd586c83d01af99efa1b8182c3,2024-06-07T04:15:32.597000 CVE-2024-5427,0,0,42975a4514a9d913e780b5e6c34dc14580ffe2cdca703f885481d0f432a70e28,2024-05-31T13:01:46.727000 CVE-2024-5428,0,0,febfd9b4f977de4c3dc04e5fc8e71b9454e3ad809e74595cd325ad9561a295a7,2024-05-28T14:59:09.827000 CVE-2024-5433,0,0,d0946774ada383b4af0e78f23b9c449d05f83a7124810af4e383f90b0cdbda75,2024-05-29T13:02:09.280000 @@ -252934,12 +252942,14 @@ CVE-2024-5587,0,0,9180b0762a5a5a7a17ce70cd861bdf25e955d88caf903bee442f7c48a0a2a2 CVE-2024-5588,0,0,21589c4423d1fee081cb695dd8009f3bd5a36bd74dae1713c28449f0da1cd8d1,2024-06-04T19:21:10.267000 CVE-2024-5589,0,0,dc63c38434ce5bb089af0d0f8aa09f6a46f1fae34dd45c15f4542741dea047b7,2024-06-03T14:46:24.250000 CVE-2024-5590,0,0,ca60332ff9933405c7b9b37e93d2404b53274b9ec741b4065c0c1eadbd60da94,2024-06-03T14:46:24.250000 -CVE-2024-5607,1,1,8b06d468a789bf21a5887ce32c4b351ff2f13075122362c1fae85c795fb5346a,2024-06-07T03:15:09.630000 +CVE-2024-5607,0,0,8b06d468a789bf21a5887ce32c4b351ff2f13075122362c1fae85c795fb5346a,2024-06-07T03:15:09.630000 CVE-2024-5609,0,0,f28c83e3e9d04345913d36de3bfdbd0d644d73b3d20045d9399b3368319c8d47,2024-06-06T19:16:09.920000 +CVE-2024-5612,1,1,e8a0b0cebc6090829ad560ec9543d9f4ddc54548118aadc3bd76e2acffa1644e,2024-06-07T05:15:50.523000 CVE-2024-5615,0,0,2b9f4fbf88dd4ea6ff55678ac9c0762fd6b29ae2ea4765ff6af29ac25e53e3d4,2024-06-06T14:17:35.017000 CVE-2024-5629,0,0,2b19d175fd80b16aa424307957676ae3dd964a506cce5329fc9e2ea04d26ec96,2024-06-06T14:17:35.017000 CVE-2024-5635,0,0,2f4fd95f40cb43c9475682f37f78b479557c0ba40bc4b87c84bd3a410bdbca2c,2024-06-05T12:53:50.240000 CVE-2024-5636,0,0,ae2ff24a8e15c0ed795cb405ff4b68943ed8f15194eed9e4ca4bf581e03cae2a,2024-06-05T12:53:50.240000 +CVE-2024-5640,1,1,785e2574eb7b079aab076db7f0229c04a13e86681b300342f00e17b399aeb615,2024-06-07T05:15:50.730000 CVE-2024-5653,0,0,283076b6ccce08ae3d1ddf9d7f5983a839d66c80929543a8a527d0bfdf86a2f9,2024-06-06T14:17:35.017000 CVE-2024-5656,0,0,adabf37f78545832b9e31783c044d8f042bfbaaca432946aa95ed82eb518777b,2024-06-06T14:17:35.017000 CVE-2024-5657,0,0,b9899ab9d953b5e4a78b96db0691f3e8b536e92241286e49b6931592afb0dbef,2024-06-06T14:17:35.017000