mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-08 03:27:17 +00:00
Auto-Update: 2024-06-05T14:00:46.105225+00:00
This commit is contained in:
parent
70962546b2
commit
af00c1b7ff
@ -2,12 +2,16 @@
|
||||
"id": "CVE-2022-28652",
|
||||
"sourceIdentifier": "security@ubuntu.com",
|
||||
"published": "2024-06-04T22:15:09.780",
|
||||
"lastModified": "2024-06-04T22:15:09.780",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-06-05T12:53:50.240",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "~/.config/apport/settings parsing is vulnerable to \"billion laughs\" attack"
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "~/.config/apport/settings el an\u00e1lisis es vulnerable al ataque de \"billion laughs\""
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
|
@ -2,12 +2,16 @@
|
||||
"id": "CVE-2022-28654",
|
||||
"sourceIdentifier": "security@ubuntu.com",
|
||||
"published": "2024-06-04T22:15:09.870",
|
||||
"lastModified": "2024-06-04T22:15:09.870",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-06-05T12:53:50.240",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "is_closing_session() allows users to fill up apport.log"
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "is_closing_session() permite a los usuarios completar apport.log"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
|
@ -2,12 +2,16 @@
|
||||
"id": "CVE-2022-28655",
|
||||
"sourceIdentifier": "security@ubuntu.com",
|
||||
"published": "2024-06-04T22:15:09.940",
|
||||
"lastModified": "2024-06-04T22:15:09.940",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-06-05T12:53:50.240",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "is_closing_session() allows users to create arbitrary tcp dbus connections"
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "is_closing_session() permite a los usuarios crear conexiones tcp dbus arbitrarias"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
|
@ -2,12 +2,16 @@
|
||||
"id": "CVE-2022-28656",
|
||||
"sourceIdentifier": "security@ubuntu.com",
|
||||
"published": "2024-06-04T22:15:10.007",
|
||||
"lastModified": "2024-06-04T22:15:10.007",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-06-05T12:53:50.240",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "is_closing_session() allows users to consume RAM in the Apport process"
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "is_closing_session() permite a los usuarios consumir RAM en el proceso de Apport"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
|
@ -2,12 +2,16 @@
|
||||
"id": "CVE-2022-28657",
|
||||
"sourceIdentifier": "security@ubuntu.com",
|
||||
"published": "2024-06-04T22:15:10.087",
|
||||
"lastModified": "2024-06-04T22:15:10.087",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-06-05T12:53:50.240",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Apport does not disable python crash handler before entering chroot"
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Apport no desactiva el controlador de fallos de Python antes de ingresar a chroot"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
|
@ -2,12 +2,16 @@
|
||||
"id": "CVE-2022-28658",
|
||||
"sourceIdentifier": "security@ubuntu.com",
|
||||
"published": "2024-06-04T22:15:10.153",
|
||||
"lastModified": "2024-06-04T22:15:10.153",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-06-05T12:53:50.240",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Apport argument parsing mishandles filename splitting on older kernels resulting in argument spoofing"
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "El an\u00e1lisis de argumentos de Apport maneja mal la divisi\u00f3n de nombres de archivos en n\u00facleos m\u00e1s antiguos, lo que resulta en suplantaci\u00f3n de argumentos"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
|
@ -2,12 +2,16 @@
|
||||
"id": "CVE-2024-1161",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2024-06-05T06:15:09.010",
|
||||
"lastModified": "2024-06-05T06:15:09.010",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-06-05T12:53:50.240",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The Brizy \u2013 Page Builder plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's Custom Attributes for blocks in all versions up to, and including, 2.4.43 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers with contributor-level and above permissions to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "El complemento Brizy \u2013 Page Builder para WordPress es vulnerable a Cross-Site Scripting Almacenado a trav\u00e9s de los atributos personalizados del complemento para bloques en todas las versiones hasta la 2.4.43 incluida debido a una sanitizaci\u00f3n de entrada y un escape de salida insuficientes. Esto hace posible que atacantes autenticados con permisos de nivel de colaborador y superiores inyecten scripts web arbitrarios en p\u00e1ginas que se ejecutar\u00e1n cada vez que un usuario acceda a una p\u00e1gina inyectada."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
|
@ -2,12 +2,16 @@
|
||||
"id": "CVE-2024-1164",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2024-06-05T07:15:45.310",
|
||||
"lastModified": "2024-06-05T07:15:45.310",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-06-05T12:53:50.240",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The Brizy \u2013 Page Builder plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's contact form widget error message and redirect URL in all versions up to, and including, 2.4.43 due to insufficient input sanitization and output escaping on user supplied error messages. This makes it possible for authenticated attackers with contributor-level and above permissions to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "El complemento Brizy \u2013 Page Builder para WordPress es vulnerable a Cross-Site Scripting Almacenado a trav\u00e9s del mensaje de error del widget del formulario de contacto del complemento y la URL de redireccionamiento en todas las versiones hasta la 2.4.43 incluida debido a una sanitizaci\u00f3n insuficiente de la entrada y a que la salida se escape en los mensajes de error proporcionados por el usuario. Esto hace posible que atacantes autenticados con permisos de nivel de colaborador y superiores inyecten scripts web arbitrarios en p\u00e1ginas que se ejecutar\u00e1n cada vez que un usuario acceda a una p\u00e1gina inyectada."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
|
@ -2,12 +2,16 @@
|
||||
"id": "CVE-2024-1272",
|
||||
"sourceIdentifier": "iletisim@usom.gov.tr",
|
||||
"published": "2024-06-05T09:15:09.620",
|
||||
"lastModified": "2024-06-05T09:15:09.620",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-06-05T12:53:50.240",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Inclusion of Sensitive Information in Source Code vulnerability in TNB Mobile Solutions Cockpit Software allows Retrieve Embedded Sensitive Data.This issue affects Cockpit Software: before v0.251.1."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "La inclusi\u00f3n de informaci\u00f3n confidencial en la vulnerabilidad del c\u00f3digo fuente en TNB Mobile Solutions Cockpit Software permite recuperar datos confidenciales incrustados. Este problema afecta a Cockpit Software: anterior a v0.251.1."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
|
59
CVE-2024/CVE-2024-16xx/CVE-2024-1662.json
Normal file
59
CVE-2024/CVE-2024-16xx/CVE-2024-1662.json
Normal file
@ -0,0 +1,59 @@
|
||||
{
|
||||
"id": "CVE-2024-1662",
|
||||
"sourceIdentifier": "iletisim@usom.gov.tr",
|
||||
"published": "2024-06-05T12:15:10.213",
|
||||
"lastModified": "2024-06-05T12:53:50.240",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Exposure of Sensitive Information to an Unauthorized Actor vulnerability in PORTY Smart Tech Technology Joint Stock Company PowerBank Application allows Retrieve Embedded Sensitive Data.This issue affects PowerBank Application: before 2.02."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Exposici\u00f3n de informaci\u00f3n confidencial a una vulnerabilidad de actor no autorizado en la aplicaci\u00f3n PowerBank de la sociedad an\u00f3nima PORTY Smart Tech Technology permite recuperar datos confidenciales incrustados. Este problema afecta la aplicaci\u00f3n PowerBank: antes de 2.02."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "iletisim@usom.gov.tr",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 7.2,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "iletisim@usom.gov.tr",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-200"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.usom.gov.tr/bildirim/tr-24-0602",
|
||||
"source": "iletisim@usom.gov.tr"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,12 +2,16 @@
|
||||
"id": "CVE-2024-1940",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2024-06-05T06:15:09.780",
|
||||
"lastModified": "2024-06-05T06:15:09.780",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-06-05T12:53:50.240",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The Brizy \u2013 Page Builder plugin for WordPress is vulnerable to Stored Cross-Site Scripting via post content in all versions up to, and including, 2.4.41 due to insufficient input sanitization performed only on the client side and insufficient output escaping. This makes it possible for authenticated attackers, with contributor access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "El complemento Brizy \u2013 Page Builder para WordPress es vulnerable a Cross-Site Scripting Almacenado a trav\u00e9s del contenido de la publicaci\u00f3n en todas las versiones hasta la 2.4.41 incluida debido a una sanitizaci\u00f3n de entrada insuficiente realizada solo en el lado del cliente y un escape de salida insuficiente. Esto hace posible que atacantes autenticados, con acceso de colaborador y superior, inyecten scripts web arbitrarios en p\u00e1ginas que se ejecutar\u00e1n cada vez que un usuario acceda a una p\u00e1gina inyectada."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
|
@ -2,12 +2,16 @@
|
||||
"id": "CVE-2024-2087",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2024-06-05T06:15:10.833",
|
||||
"lastModified": "2024-06-05T06:15:10.833",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-06-05T12:53:50.240",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The Brizy \u2013 Page Builder plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the form name values in all versions up to, and including, 2.4.43 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "El complemento Brizy \u2013 Page Builder para WordPress es vulnerable a Cross-Site Scripting Almacenado a trav\u00e9s de los valores de nombre del formulario en todas las versiones hasta la 2.4.43 incluida debido a una sanitizaci\u00f3n de entrada y un escape de salida insuficientes. Esto hace posible que atacantes no autenticados inyecten scripts web arbitrarios en p\u00e1ginas que se ejecutar\u00e1n cada vez que un usuario acceda a una p\u00e1gina inyectada."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-2257",
|
||||
"sourceIdentifier": "vdisclose@cert-in.org.in",
|
||||
"published": "2024-05-14T15:18:35.380",
|
||||
"lastModified": "2024-05-14T16:13:02.773",
|
||||
"lastModified": "2024-06-05T13:15:12.557",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -15,6 +15,18 @@
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "vdisclose@cert-in.org.in",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-20"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.cert-in.org.in/s2cMainServlet?pageid=PUBVLNOTES01&VLCODE=CIVN-2024-0158",
|
||||
|
@ -2,12 +2,16 @@
|
||||
"id": "CVE-2024-23326",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2024-06-04T21:15:33.440",
|
||||
"lastModified": "2024-06-04T21:15:33.440",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-06-05T12:53:50.240",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Envoy is a cloud-native, open source edge and service proxy. A theoretical request smuggling vulnerability exists through Envoy if a server can be tricked into adding an upgrade header into a response. Per RFC https://www.rfc-editor.org/rfc/rfc7230#section-6.7 a server sends 101 when switching protocols. Envoy incorrectly accepts a 200 response from a server when requesting a protocol upgrade, but 200 does not indicate protocol switch. This opens up the possibility of request smuggling through Envoy if the server can be tricked into adding the upgrade header to the response.\n\n"
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Envoy es un proxy de servicio y borde de c\u00f3digo abierto, nativo de la nube. Existe una vulnerabilidad te\u00f3rica de contrabando de solicitudes a trav\u00e9s de Envoy si se puede enga\u00f1ar a un servidor para que agregue un encabezado de actualizaci\u00f3n en una respuesta. Seg\u00fan RFC https://www.rfc-editor.org/rfc/rfc7230#section-6.7, un servidor env\u00eda 101 al cambiar de protocolo. Envoy acepta incorrectamente una respuesta 200 de un servidor cuando solicita una actualizaci\u00f3n de protocolo, pero 200 no indica un cambio de protocolo. Esto abre la posibilidad de contrabando de solicitudes a trav\u00e9s de Envoy si se puede enga\u00f1ar al servidor para que agregue el encabezado de actualizaci\u00f3n a la respuesta."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
|
@ -2,12 +2,16 @@
|
||||
"id": "CVE-2024-23669",
|
||||
"sourceIdentifier": "psirt@fortinet.com",
|
||||
"published": "2024-06-05T08:15:09.537",
|
||||
"lastModified": "2024-06-05T08:15:09.537",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-06-05T12:53:50.240",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An improper authorization in Fortinet FortiWebManager version 7.2.0 and 7.0.0 through 7.0.4 and 6.3.0 and 6.2.3 through 6.2.4 and 6.0.2 allows attacker to execute unauthorized code or commands via HTTP requests or CLI."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Una autorizaci\u00f3n inadecuada en Fortinet FortiWebManager versi\u00f3n 7.2.0 y 7.0.0 hasta 7.0.4 y 6.3.0 y 6.2.3 hasta 6.2.4 y 6.0.2 permite al atacante ejecutar c\u00f3digo o comandos no autorizados a trav\u00e9s de solicitudes HTTP o CLI."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
|
@ -2,12 +2,16 @@
|
||||
"id": "CVE-2024-2368",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2024-06-05T07:15:45.690",
|
||||
"lastModified": "2024-06-05T07:15:45.690",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-06-05T12:53:50.240",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The Mollie Forms plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 2.6.13. This is due to missing or incorrect nonce validation on the duplicateForm() function. This makes it possible for unauthenticated attackers to duplicate forms via a forged request granted they can trick a site administrator into performing an action such as clicking on a link."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "El complemento Mollie Forms para WordPress es vulnerable a Cross-Site Request Forgery en todas las versiones hasta la 2.6.13 incluida. Esto se debe a una validaci\u00f3n nonce faltante o incorrecta en la funci\u00f3n duplicadaForm(). Esto hace posible que atacantes no autenticados dupliquen formularios a trav\u00e9s de una solicitud falsificada, siempre que puedan enga\u00f1ar al administrador del sitio para que realice una acci\u00f3n como hacer clic en un enlace."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
|
@ -2,12 +2,16 @@
|
||||
"id": "CVE-2024-25095",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2024-06-04T19:18:45.170",
|
||||
"lastModified": "2024-06-04T19:18:45.170",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-06-05T12:53:50.240",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Insertion of Sensitive Information into Log File vulnerability in Code Parrots Easy Forms for Mailchimp.This issue affects Easy Forms for Mailchimp: from n/a through 6.9.0."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Vulnerabilidad de inserci\u00f3n de informaci\u00f3n confidencial en un archivo de registro en Code Parrots Easy Forms para Mailchimp. Este problema afecta a Easy Forms para Mailchimp: desde n/a hasta 6.9.0."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
|
@ -2,12 +2,16 @@
|
||||
"id": "CVE-2024-28103",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2024-06-04T20:15:10.237",
|
||||
"lastModified": "2024-06-04T20:15:10.237",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-06-05T12:53:50.240",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Action Pack is a framework for handling and responding to web requests. Since 6.1.0, the application configurable Permissions-Policy is only served on responses with an HTML related Content-Type. This vulnerability is fixed in 6.1.7.8, 7.0.8.2, and 7.1.3.3."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Action Pack es un framework para manejar y responder a solicitudes web. Desde 6.1.0, la Pol\u00edtica de permisos configurable de la aplicaci\u00f3n solo se ofrece en respuestas con un tipo de contenido relacionado con HTML. Esta vulnerabilidad se solucion\u00f3 en 6.1.7.8, 7.0.8.2 y 7.1.3.3."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
|
@ -2,12 +2,16 @@
|
||||
"id": "CVE-2024-29152",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-06-04T19:19:07.620",
|
||||
"lastModified": "2024-06-04T19:19:07.620",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-06-05T12:53:50.240",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An issue was discovered in Samsung Mobile Processor, Wearable Processor, Automotive Processor, and Modem Exynos 980, 990, 850, 1080, 2100, 2200, 1280, 1380, 1330, 2400, 9110, W920, W930, Modem 5123, Modem 5300, and Auto T5123. The baseband software does not properly check states specified by the RRC (Radio Resource Control) Reconfiguration message. This can lead to disclosure of sensitive information."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Se descubri\u00f3 un problema en el procesador m\u00f3vil, el procesador port\u00e1til, el procesador automotriz y el m\u00f3dem Samsung Exynos 980, 990, 850, 1080, 2100, 2200, 1280, 1380, 1330, 2400, 9110, W920, W930, M\u00f3dem 5123, M\u00f3dem 5300, y Auto T5123. El software de banda base no verifica adecuadamente los estados especificados en el mensaje de reconfiguraci\u00f3n de RRC (control de recursos de radio). Esto puede dar lugar a la divulgaci\u00f3n de informaci\u00f3n confidencial."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-29975",
|
||||
"sourceIdentifier": "security@zyxel.com.tw",
|
||||
"published": "2024-06-04T02:15:48.760",
|
||||
"lastModified": "2024-06-05T04:15:11.617",
|
||||
"lastModified": "2024-06-05T13:15:12.107",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
|
@ -2,12 +2,16 @@
|
||||
"id": "CVE-2024-30484",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2024-06-04T19:19:24.800",
|
||||
"lastModified": "2024-06-04T19:19:24.800",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-06-05T12:53:50.240",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Missing Authorization vulnerability in RT Easy Builder \u2013 Advanced addons for Elementor.This issue affects RT Easy Builder \u2013 Advanced addons for Elementor: from n/a through 2.0."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Vulnerabilidad de autorizaci\u00f3n faltante en RT Easy Builder \u2013 Advanced addons for Elementor. Este problema afecta a RT Easy Builder \u2013 Advanced addons for Elementor: desde n/a hasta 2.0."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
|
@ -2,12 +2,16 @@
|
||||
"id": "CVE-2024-30525",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2024-06-04T20:15:10.780",
|
||||
"lastModified": "2024-06-04T20:15:10.780",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-06-05T12:53:50.240",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Missing Authorization vulnerability in moveaddons Move Addons for Elementor.This issue affects Move Addons for Elementor: from n/a through 1.2.9."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Vulnerabilidad de autorizaci\u00f3n faltante en moveaddons Move Addons para Elementor. Este problema afecta a Move Addons para Elementor: desde n/a hasta 1.2.9."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
|
@ -2,12 +2,16 @@
|
||||
"id": "CVE-2024-30528",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2024-06-04T20:15:11.010",
|
||||
"lastModified": "2024-06-04T20:15:11.010",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-06-05T12:53:50.240",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Missing Authorization vulnerability in Spiffy Plugins Spiffy Calendar.This issue affects Spiffy Calendar: from n/a through 4.9.10."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Vulnerabilidad de autorizaci\u00f3n faltante en los complementos de Spiffy Spiffy Calendar. Este problema afecta a Spiffy Calendar: desde n/a hasta 4.9.10."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
|
@ -2,12 +2,16 @@
|
||||
"id": "CVE-2024-30889",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-06-04T22:15:10.243",
|
||||
"lastModified": "2024-06-04T22:15:10.243",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-06-05T12:53:50.240",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Cross Site Scripting vulnerability in audimex audimexEE v.15.1.2 and fixed in 15.1.3.9 allows a remote attacker to execute arbitrary code via the service, method, widget_type, request_id, payload parameters."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Vulnerabilidad de cross-site scripting en audimex audimexEE v.15.1.2 y corregida en 15.1.3.9 permite a un atacante remoto ejecutar c\u00f3digo arbitrario a trav\u00e9s de los par\u00e1metros servicio, m\u00e9todo, widget_type, request_id y payload."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
|
@ -2,12 +2,16 @@
|
||||
"id": "CVE-2024-32464",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2024-06-04T20:15:11.247",
|
||||
"lastModified": "2024-06-04T20:15:11.247",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-06-05T12:53:50.240",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Action Text brings rich text content and editing to Rails. Instances of ActionText::Attachable::ContentAttachment included within a rich_text_area tag could potentially contain unsanitized HTML. This vulnerability is fixed in 7.1.3.4 and 7.2.0.beta2."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Action Text trae contenido de texto enriquecido y edici\u00f3n a Rails. Las instancias de ActionText::Attachable::ContentAttachment incluidas dentro de una etiqueta rich_text_area podr\u00edan contener HTML no sanitizado. Esta vulnerabilidad se solucion\u00f3 en 7.1.3.4 y 7.2.0.beta2."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
|
@ -2,12 +2,16 @@
|
||||
"id": "CVE-2024-32974",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2024-06-04T21:15:33.773",
|
||||
"lastModified": "2024-06-04T21:15:33.773",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-06-05T12:53:50.240",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Envoy is a cloud-native, open source edge and service proxy. A crash was observed in `EnvoyQuicServerStream::OnInitialHeadersComplete()` with following call stack. It is a use-after-free caused by QUICHE continuing push request headers after `StopReading()` being called on the stream. As after `StopReading()`, the HCM's `ActiveStream` might have already be destroyed and any up calls from QUICHE could potentially cause use after free. \n"
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Envoy es un proxy de servicio y borde de c\u00f3digo abierto, nativo de la nube. Se observ\u00f3 un bloqueo en `EnvoyQuicServerStream::OnInitialHeadersComplete()` con la siguiente pila de llamadas. Es un use-after-free causado porque QUICHE contin\u00faa enviando encabezados de solicitud despu\u00e9s de que se llama a `StopReading()` en la secuencia. Al igual que despu\u00e9s de `StopReading()`, es posible que el `ActiveStream` del HCM ya se haya destruido y cualquier llamada desde QUICHE podr\u00eda provocar su use after free."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
|
@ -2,12 +2,16 @@
|
||||
"id": "CVE-2024-32975",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2024-06-04T21:15:33.987",
|
||||
"lastModified": "2024-06-04T21:15:33.987",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-06-05T12:53:50.240",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Envoy is a cloud-native, open source edge and service proxy. There is a crash at `QuicheDataReader::PeekVarInt62Length()`. It is caused by integer underflow in the `QuicStreamSequencerBuffer::PeekRegion()` implementation."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Envoy es un proxy de servicio y borde de c\u00f3digo abierto, nativo de la nube. Hay un bloqueo en `QuicheDataReader::PeekVarInt62Length()`. Se debe a un desbordamiento insuficiente de enteros en la implementaci\u00f3n de `QuicStreamSequencerBuffer::PeekRegion()`."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
|
@ -2,12 +2,16 @@
|
||||
"id": "CVE-2024-32976",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2024-06-04T21:15:34.220",
|
||||
"lastModified": "2024-06-04T21:15:34.220",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-06-05T12:53:50.240",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Envoy is a cloud-native, open source edge and service proxy. Envoyproxy with a Brotli filter can get into an endless loop during decompression of Brotli data with extra input."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Envoy es un proxy de servicio y borde de c\u00f3digo abierto, nativo de la nube. Envoyproxy con un filtro Brotli puede entrar en un bucle sin fin durante la descompresi\u00f3n de datos Brotli con entrada adicional."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
|
@ -2,12 +2,16 @@
|
||||
"id": "CVE-2024-34055",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-06-05T05:15:49.950",
|
||||
"lastModified": "2024-06-05T05:15:49.950",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-06-05T12:53:50.240",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Cyrus IMAP before 3.8.3 and 3.10.x before 3.10.0-rc1 allows authenticated attackers to cause unbounded memory allocation by sending many LITERALs in a single command."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Cyrus IMAP anterior a 3.8.3 y 3.10.x anterior a 3.10.0-rc1 permite a atacantes autenticados provocar una asignaci\u00f3n de memoria ilimitada enviando muchos LITERAL en un solo comando."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
|
@ -2,12 +2,16 @@
|
||||
"id": "CVE-2024-34362",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2024-06-04T21:15:34.530",
|
||||
"lastModified": "2024-06-04T21:15:34.530",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-06-05T12:53:50.240",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Envoy is a cloud-native, open source edge and service proxy. There is a use-after-free in `HttpConnectionManager` (HCM) with `EnvoyQuicServerStream` that can crash Envoy. An attacker can exploit this vulnerability by sending a request without `FIN`, then a `RESET_STREAM` frame, and then after receiving the response, closing the connection."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Envoy es un proxy de servicio y borde de c\u00f3digo abierto, nativo de la nube. Hay un use-after-free en `HttpConnectionManager` (HCM) con `EnvoyQuicServerStream` que puede bloquear Envoy. Un atacante puede explotar esta vulnerabilidad enviando una solicitud sin `FIN`, luego un framework `RESET_STREAM` y luego, despu\u00e9s de recibir la respuesta, cerrando la conexi\u00f3n."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
|
@ -2,12 +2,16 @@
|
||||
"id": "CVE-2024-34363",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2024-06-04T21:15:34.743",
|
||||
"lastModified": "2024-06-04T21:15:34.743",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-06-05T12:53:50.240",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Envoy is a cloud-native, open source edge and service proxy. Due to how Envoy invoked the nlohmann JSON library, the library could throw an uncaught exception from downstream data if incomplete UTF-8 strings were serialized. The uncaught exception would cause Envoy to crash."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Envoy es un proxy de servicio y borde de c\u00f3digo abierto, nativo de la nube. Debido a c\u00f3mo Envoy invoc\u00f3 la librer\u00eda JSON de nlohmann, la librer\u00eda podr\u00eda generar una excepci\u00f3n no detectada de los datos posteriores si se serializaran cadenas UTF-8 incompletas. La excepci\u00f3n no detectada provocar\u00eda que Envoy fallara."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
|
@ -2,12 +2,16 @@
|
||||
"id": "CVE-2024-34364",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2024-06-04T21:15:34.977",
|
||||
"lastModified": "2024-06-04T21:15:34.977",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-06-05T12:53:50.240",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Envoy is a cloud-native, open source edge and service proxy. Envoy exposed an out-of-memory (OOM) vector from the mirror response, since async HTTP client will buffer the response with an unbounded buffer."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Envoy es un proxy de servicio y borde de c\u00f3digo abierto, nativo de la nube. Envoy expuso un vector de falta de memoria (OOM) de la respuesta reflejada, ya que el cliente HTTP as\u00edncrono almacenar\u00e1 la respuesta en un b\u00fafer ilimitado."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
|
@ -2,12 +2,16 @@
|
||||
"id": "CVE-2024-34759",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2024-06-04T19:20:03.167",
|
||||
"lastModified": "2024-06-04T19:20:03.167",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-06-05T12:53:50.240",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in VideoWhisper Picture Gallery allows Stored XSS.This issue affects Picture Gallery: from n/a through 1.5.11."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "La vulnerabilidad de neutralizaci\u00f3n inadecuada de la entrada durante la generaci\u00f3n de p\u00e1ginas web (XSS o 'Cross-site Scripting') en VideoWhisper Picture Gallery permite XSS Almacenado. Este problema afecta a Picture Gallery: desde n/a hasta 1.5.11."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
|
47
CVE-2024/CVE-2024-34xx/CVE-2024-3469.json
Normal file
47
CVE-2024/CVE-2024-34xx/CVE-2024-3469.json
Normal file
@ -0,0 +1,47 @@
|
||||
{
|
||||
"id": "CVE-2024-3469",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2024-06-05T13:15:12.707",
|
||||
"lastModified": "2024-06-05T13:15:12.707",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The GP Premium plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the message parameter in all versions up to, and including, 2.4.0 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 6.1,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://generatepress.com/category/changelog/",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/1a697391-f30d-403f-9046-8fa219a49302?source=cve",
|
||||
"source": "security@wordfence.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,12 +2,16 @@
|
||||
"id": "CVE-2024-35670",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2024-06-04T19:20:08.777",
|
||||
"lastModified": "2024-06-04T19:20:08.777",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-06-05T12:53:50.240",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Broken Authentication vulnerability in SoftLab Integrate Google Drive.This issue affects Integrate Google Drive: from n/a through 1.3.93."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Vulnerabilidad de autenticaci\u00f3n rota en SoftLab Integrate Google Drive. Este problema afecta a Integrate Google Drive: desde n/a hasta 1.3.93."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
|
@ -2,12 +2,16 @@
|
||||
"id": "CVE-2024-35672",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2024-06-04T19:20:08.967",
|
||||
"lastModified": "2024-06-04T19:20:08.967",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-06-05T12:53:50.240",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Missing Authorization vulnerability in Netgsm.This issue affects Netgsm: from n/a through 2.9.16."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Vulnerabilidad de autorizaci\u00f3n faltante en Netgsm. Este problema afecta a Netgsm: desde n/a hasta 2.9.16."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
|
@ -2,12 +2,16 @@
|
||||
"id": "CVE-2024-36121",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2024-06-04T22:15:10.490",
|
||||
"lastModified": "2024-06-04T22:15:10.490",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-06-05T12:53:50.240",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": " netty-incubator-codec-ohttp is the OHTTP implementation for netty. BoringSSLAEADContext keeps track of how many OHTTP responses have been sent and uses this sequence number to calculate the appropriate nonce to use with the encryption algorithm. Unfortunately, two separate errors combine which would allow an attacker to cause the sequence number to overflow and thus the nonce to repeat."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "netty-incubator-codec-ohttp es la implementaci\u00f3n OHTTP para netty. BoringSSLAEADContext realiza un seguimiento de cu\u00e1ntas respuestas OHTTP se han enviado y utiliza este n\u00famero de secuencia para calcular el nonce apropiado para usar con el algoritmo de cifrado. Desafortunadamente, se combinan dos errores separados que permitir\u00edan a un atacante provocar que el n\u00famero de secuencia se desborde y, por lo tanto, que se repita el nonce."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
|
@ -2,12 +2,16 @@
|
||||
"id": "CVE-2024-36604",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-06-04T19:20:13.927",
|
||||
"lastModified": "2024-06-04T19:20:13.927",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-06-05T12:53:50.240",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Tenda O3V2 v1.0.0.12(3880) was discovered to contain a Blind Command Injection via stpEn parameter in the SetStp function. This vulnerability allows attackers to execute arbitrary commands with root privileges."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Se descubri\u00f3 que Tenda O3V2 v1.0.0.12(3880) conten\u00eda una inyecci\u00f3n de comando ciego a trav\u00e9s del par\u00e1metro stpEn en la funci\u00f3n SetStp. Esta vulnerabilidad permite a los atacantes ejecutar comandos arbitrarios con privilegios de root."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
|
@ -2,12 +2,16 @@
|
||||
"id": "CVE-2024-36675",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-06-04T22:15:10.740",
|
||||
"lastModified": "2024-06-04T22:15:10.740",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-06-05T12:53:50.240",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "LyLme_spage v1.9.5 is vulnerable to Server-Side Request Forgery (SSRF) via the get_head function."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "LyLme_spage v1.9.5 es vulnerable a server-side request forgery (SSRF) a trav\u00e9s de la funci\u00f3n get_head."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
|
@ -2,12 +2,16 @@
|
||||
"id": "CVE-2024-36857",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-06-04T19:20:14.060",
|
||||
"lastModified": "2024-06-04T19:20:14.060",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-06-05T12:53:50.240",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Jan v0.4.12 was discovered to contain an arbitrary file read vulnerability via the /v1/app/readFileSync interface."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Se descubri\u00f3 que Jan v0.4.12 conten\u00eda una vulnerabilidad de lectura de archivos arbitraria a trav\u00e9s de la interfaz /v1/app/readFileSync."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
|
@ -2,12 +2,16 @@
|
||||
"id": "CVE-2024-36858",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-06-04T19:20:14.150",
|
||||
"lastModified": "2024-06-04T19:20:14.150",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-06-05T12:53:50.240",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An arbitrary file upload vulnerability in the /v1/app/writeFileSync interface of Jan v0.4.12 allows attackers to execute arbitrary code via uploading a crafted file."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Una vulnerabilidad de carga de archivos arbitrarios en la interfaz /v1/app/writeFileSync de Jan v0.4.12 permite a los atacantes ejecutar c\u00f3digo arbitrario cargando un archivo manipulado."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
|
@ -2,12 +2,16 @@
|
||||
"id": "CVE-2024-3667",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2024-06-05T06:15:11.590",
|
||||
"lastModified": "2024-06-05T06:15:11.590",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-06-05T12:53:50.240",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The Brizy \u2013 Page Builder plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'Link To' field of multiple widgets in all versions up to, and including, 2.4.43 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "El complemento Brizy \u2013 Page Builder para WordPress es vulnerable a Cross-Site Scripting Almacenado a trav\u00e9s del campo 'Enlace a' de m\u00faltiples widgets en todas las versiones hasta la 2.4.43 incluida debido a una sanitizaci\u00f3n de entrada insuficiente y a un escape de salida en los atributos proporcionados por el usuario. Esto hace posible que atacantes autenticados, con acceso de nivel de colaborador y superior, inyecten scripts web arbitrarios en p\u00e1ginas que se ejecutar\u00e1n cada vez que un usuario acceda a una p\u00e1gina inyectada."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
|
@ -2,12 +2,16 @@
|
||||
"id": "CVE-2024-37273",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-06-04T19:20:15.363",
|
||||
"lastModified": "2024-06-04T19:20:15.363",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-06-05T12:53:50.240",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An arbitrary file upload vulnerability in the /v1/app/appendFileSync interface of Jan v0.4.12 allows attackers to execute arbitrary code via uploading a crafted file."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Una vulnerabilidad de carga de archivos arbitrarios en la interfaz /v1/app/appendFileSync de Jan v0.4.12 permite a los atacantes ejecutar c\u00f3digo arbitrario cargando un archivo manipulado."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
|
@ -2,12 +2,16 @@
|
||||
"id": "CVE-2024-4001",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2024-06-05T11:15:08.490",
|
||||
"lastModified": "2024-06-05T11:15:08.490",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-06-05T12:53:50.240",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The Download Manager plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'wpdm_modal_login_form' shortcode in all versions up to, and including, 3.2.93 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "El complemento Download Manager para WordPress es vulnerable a Cross-Site Scripting Almacenado a trav\u00e9s del c\u00f3digo corto 'wpdm_modal_login_form' del complemento en todas las versiones hasta la 3.2.93 incluida debido a una sanitizaci\u00f3n de entrada insuficiente y a un escape de salida en los atributos proporcionados por el usuario. Esto hace posible que atacantes autenticados, con acceso de nivel de colaborador y superior, inyecten scripts web arbitrarios en p\u00e1ginas que se ejecutar\u00e1n cada vez que un usuario acceda a una p\u00e1gina inyectada."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
|
@ -2,12 +2,16 @@
|
||||
"id": "CVE-2024-4084",
|
||||
"sourceIdentifier": "security@huntr.dev",
|
||||
"published": "2024-06-05T00:15:09.840",
|
||||
"lastModified": "2024-06-05T00:15:09.840",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-06-05T12:53:50.240",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A Server-Side Request Forgery (SSRF) vulnerability exists in the latest version of mintplex-labs/anything-llm, allowing attackers to bypass the official fix intended to restrict access to intranet IP addresses and protocols. Despite efforts to filter out intranet IP addresses starting with 192, 172, 10, and 127 through regular expressions and limit access protocols to HTTP and HTTPS, attackers can still bypass these restrictions using alternative representations of IP addresses and accessing other ports running on localhost. This vulnerability enables attackers to access any asset on the internal network, attack web services on the internal network, scan hosts on the internal network, and potentially access AWS metadata endpoints. The vulnerability is due to insufficient validation of user-supplied URLs, which can be exploited to perform SSRF attacks."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Existe una vulnerabilidad de server-side request forgery (SSRF) en la \u00faltima versi\u00f3n de mintplex-labs/anything-llm, lo que permite a los atacantes eludir la soluci\u00f3n oficial destinada a restringir el acceso a las direcciones IP y protocolos de la intranet. A pesar de los esfuerzos por filtrar las direcciones IP de la intranet que comienzan con 192, 172, 10 y 127 mediante expresiones regulares y limitar los protocolos de acceso a HTTP y HTTPS, los atacantes a\u00fan pueden eludir estas restricciones utilizando representaciones alternativas de direcciones IP y accediendo a otros puertos que se ejecutan en localhost. Esta vulnerabilidad permite a los atacantes acceder a cualquier activo en la red interna, atacar servicios web en la red interna, escanear hosts en la red interna y potencialmente acceder a puntos finales de metadatos de AWS. La vulnerabilidad se debe a una validaci\u00f3n insuficiente de las URL proporcionadas por el usuario, que pueden explotarse para realizar ataques SSRF."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
|
@ -2,12 +2,16 @@
|
||||
"id": "CVE-2024-4088",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2024-06-05T07:15:45.910",
|
||||
"lastModified": "2024-06-05T07:15:45.910",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-06-05T12:53:50.240",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The Gutenberg Blocks and Page Layouts \u2013 Attire Blocks plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the disable_fe_assets function in all versions up to, and including, 1.9.2. This makes it possible for authenticated attackers, with subscriber access or above, to change the plugin's settings. Additionally, no nonce check is performed resulting in a CSRF vulnerability."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "El complemento Gutenberg Blocks and Page Layouts \u2013 Attire Blocks para WordPress es vulnerable a modificaciones no autorizadas de datos debido a una falta de verificaci\u00f3n de capacidad en la funci\u00f3n enable_fe_assets en todas las versiones hasta la 1.9.2 incluida. Esto hace posible que atacantes autenticados, con acceso de suscriptor o superior, cambien la configuraci\u00f3n del complemento. Adem\u00e1s, no se realiza ninguna verificaci\u00f3n nonce, lo que genera una vulnerabilidad CSRF."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
|
@ -2,12 +2,16 @@
|
||||
"id": "CVE-2024-4219",
|
||||
"sourceIdentifier": "13061848-ea10-403d-bd75-c83a022c2891",
|
||||
"published": "2024-06-04T21:15:35.277",
|
||||
"lastModified": "2024-06-04T21:15:35.277",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-06-05T12:53:50.240",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Prior to 23.2, it is possible to perform arbitrary Server-Side requests via HTTP-based connectors within BeyondInsight, resulting in a server-side request forgery vulnerability."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Antes de la versi\u00f3n 23.2, era posible realizar solicitudes arbitrarias del lado del servidor a trav\u00e9s de conectores basados en HTTP dentro de BeyondInsight, lo que generaba una vulnerabilidad de server-side request forgery."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
|
@ -2,12 +2,16 @@
|
||||
"id": "CVE-2024-4220",
|
||||
"sourceIdentifier": "13061848-ea10-403d-bd75-c83a022c2891",
|
||||
"published": "2024-06-04T21:15:35.530",
|
||||
"lastModified": "2024-06-04T21:15:35.530",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-06-05T12:53:50.240",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Prior to 23.1, an information disclosure vulnerability exists within BeyondInsight which can allow an attacker to enumerate usernames."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Antes de la versi\u00f3n 23.1, exist\u00eda una vulnerabilidad de divulgaci\u00f3n de informaci\u00f3n dentro de BeyondInsight que pod\u00eda permitir a un atacante enumerar nombres de usuarios."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-4231",
|
||||
"sourceIdentifier": "vdisclose@cert-in.org.in",
|
||||
"published": "2024-05-14T15:43:08.323",
|
||||
"lastModified": "2024-05-14T16:11:39.510",
|
||||
"lastModified": "2024-06-05T13:15:12.980",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -15,6 +15,18 @@
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "vdisclose@cert-in.org.in",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-1191"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.cert-in.org.in/s2cMainServlet?pageid=PUBVLNOTES01&VLCODE=CIVN-2024-0158",
|
||||
|
@ -2,12 +2,12 @@
|
||||
"id": "CVE-2024-4232",
|
||||
"sourceIdentifier": "vdisclose@cert-in.org.in",
|
||||
"published": "2024-05-14T15:43:08.453",
|
||||
"lastModified": "2024-05-14T16:11:39.510",
|
||||
"lastModified": "2024-06-05T13:15:13.190",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "This vulnerability exists in Digisol Router (DG-GR1321: Hardware version 3.7L; Firmware version : v3.2.02) due to presence of root terminal access on a serial interface without proper access control. An\u00a0attacker\u00a0with\u00a0physical\u00a0access\u00a0could exploit this by identifying UART pins and accessing the root shell on the vulnerable system.\n\nSuccessful exploitation of this vulnerability could allow the attacker to access the sensitive information on the targeted system.This vulnerability exists in Digisol Router (DG-GR1321: Hardware version 3.7L; Firmware version : v3.2.02) due to lack of encryption or hashing in storing of passwords within the router's firmware/ database. An\u00a0attacker\u00a0with\u00a0physical\u00a0access\u00a0could exploit this by extracting the firmware and reverse engineer the binary data to access the plaintext passwords on the vulnerable system.\n\nSuccessful exploitation of this vulnerability could allow the attacker to gain unauthorized access to the targeted system."
|
||||
"value": "This vulnerability exists in Digisol Router (DG-GR1321: Hardware version 3.7L; Firmware version : v3.2.02) due to lack of encryption or hashing in storing of passwords within the router's firmware/ database. An attacker with physical access could exploit this by extracting the firmware and reverse engineer the binary data to access the plaintext passwords on the vulnerable system.\n\nSuccessful exploitation of this vulnerability could allow the attacker to gain unauthorized access to the targeted system."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
@ -15,6 +15,18 @@
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "vdisclose@cert-in.org.in",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-256"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.cert-in.org.in/s2cMainServlet?pageid=PUBVLNOTES01&VLCODE=CIVN-2024-0158",
|
||||
|
@ -2,12 +2,16 @@
|
||||
"id": "CVE-2024-4295",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2024-06-05T06:15:12.007",
|
||||
"lastModified": "2024-06-05T06:15:12.007",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-06-05T12:53:50.240",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The Email Subscribers by Icegram Express plugin for WordPress is vulnerable to SQL Injection via the \u2018hash\u2019 parameter in all versions up to, and including, 5.7.20 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "El complemento Email Subscribers by Icegram Express para WordPress es vulnerable a la inyecci\u00f3n SQL a trav\u00e9s del par\u00e1metro 'hash' en todas las versiones hasta la 5.7.20 incluida debido a un escape insuficiente en el par\u00e1metro proporcionado por el usuario y a la falta de preparaci\u00f3n suficiente en la consulta SQL existente. Esto hace posible que atacantes no autenticados agreguen consultas SQL adicionales a consultas ya existentes que pueden usarse para extraer informaci\u00f3n confidencial de la base de datos."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
|
@ -2,12 +2,16 @@
|
||||
"id": "CVE-2024-4520",
|
||||
"sourceIdentifier": "security@huntr.dev",
|
||||
"published": "2024-06-04T20:15:11.690",
|
||||
"lastModified": "2024-06-04T20:15:11.690",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-06-05T12:53:50.240",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An improper access control vulnerability exists in the gaizhenbiao/chuanhuchatgpt application, specifically in version 20240410. This vulnerability allows any user on the server to access the chat history of any other user without requiring any form of interaction between the users. Exploitation of this vulnerability could lead to data breaches, including the exposure of sensitive personal details, financial data, or confidential conversations. Additionally, it could facilitate identity theft and manipulation or fraud through the unauthorized access to users' chat histories. This issue is due to insufficient access control mechanisms in the application's handling of chat history data."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Existe una vulnerabilidad de control de acceso inadecuado en la aplicaci\u00f3n gaizhenbiao/chuanhuchatgpt, espec\u00edficamente en la versi\u00f3n 20240410. Esta vulnerabilidad permite a cualquier usuario del servidor acceder al historial de chat de cualquier otro usuario sin requerir ning\u00fan tipo de interacci\u00f3n entre los usuarios. La explotaci\u00f3n de esta vulnerabilidad podr\u00eda dar lugar a violaciones de datos, incluida la exposici\u00f3n de datos personales sensibles, datos financieros o conversaciones confidenciales. Adem\u00e1s, podr\u00eda facilitar el robo y la manipulaci\u00f3n o fraude de identidad mediante el acceso no autorizado a los historiales de chat de los usuarios. Este problema se debe a mecanismos de control de acceso insuficientes en el manejo de los datos del historial de chat por parte de la aplicaci\u00f3n."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
|
@ -2,12 +2,16 @@
|
||||
"id": "CVE-2024-4743",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2024-06-05T09:15:10.030",
|
||||
"lastModified": "2024-06-05T09:15:10.030",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-06-05T12:53:50.240",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The LifterLMS \u2013 WordPress LMS Plugin for eLearning plugin for WordPress is vulnerable to SQL Injection via the orderBy attribute of the lifterlms_favorites shortcode in all versions up to, and including, 7.6.2 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for authenticated attackers, with Contributor-level access and above, to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "El complemento LifterLMS \u2013 WordPress LMS para eLearning para WordPress es vulnerable a la inyecci\u00f3n SQL a trav\u00e9s del atributo orderBy del shortcode lifterlms_favorites en todas las versiones hasta la 7.6.2 incluida debido a un escape insuficiente en el par\u00e1metro proporcionado por el usuario y a la falta de preparaci\u00f3n suficiente. en la consulta SQL existente. Esto hace posible que los atacantes autenticados, con acceso de nivel de colaborador y superior, agreguen consultas SQL adicionales a consultas ya existentes que pueden usarse para extraer informaci\u00f3n confidencial de la base de datos."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
|
@ -2,12 +2,16 @@
|
||||
"id": "CVE-2024-4821",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2024-06-05T09:15:10.260",
|
||||
"lastModified": "2024-06-05T09:15:10.260",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-06-05T12:53:50.240",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The WP Shortcodes Plugin \u2014 Shortcodes Ultimate plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's su_lightbox shortcode in all versions up to, and including, 7.1.6 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "El complemento WP Shortcodes Plugin \u2014 Shortcodes Ultimate para WordPress es vulnerable a Cross-Site Scripting Almacenado a trav\u00e9s del c\u00f3digo abreviado su_lightbox del complemento en todas las versiones hasta la 7.1.6 incluida debido a una sanitizaci\u00f3n de entrada insuficiente y a un escape de salida en los atributos proporcionados por el usuario. Esto hace posible que atacantes autenticados, con acceso de nivel de colaborador y superior, inyecten scripts web arbitrarios en p\u00e1ginas que se ejecutar\u00e1n cada vez que un usuario acceda a una p\u00e1gina inyectada."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
|
@ -2,12 +2,16 @@
|
||||
"id": "CVE-2024-4886",
|
||||
"sourceIdentifier": "contact@wpscan.com",
|
||||
"published": "2024-06-05T06:15:12.443",
|
||||
"lastModified": "2024-06-05T06:15:12.443",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-06-05T12:53:50.240",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The contains an IDOR vulnerability that allows a user to comment on a private post by manipulating the ID included in the request"
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Contiene una vulnerabilidad IDOR que permite a un usuario comentar una publicaci\u00f3n privada manipulando la ID incluida en la solicitud."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
|
@ -2,12 +2,16 @@
|
||||
"id": "CVE-2024-4939",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2024-06-05T08:15:09.787",
|
||||
"lastModified": "2024-06-05T08:15:09.787",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-06-05T12:53:50.240",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The Weaver Xtreme Theme Support plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's div shortcode in all versions up to, and including, 6.4 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "El complemento Weaver Xtreme Theme Support para WordPress es vulnerable a Cross-Site Scripting Almacenado a trav\u00e9s del c\u00f3digo corto div del complemento en todas las versiones hasta la 6.4 incluida debido a una sanitizaci\u00f3n de entrada insuficiente y a un escape de salida en los atributos proporcionados por el usuario. Esto hace posible que atacantes autenticados, con acceso de nivel de colaborador y superior, inyecten scripts web arbitrarios en p\u00e1ginas que se ejecutar\u00e1n cada vez que un usuario acceda a una p\u00e1gina inyectada."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
|
@ -2,12 +2,16 @@
|
||||
"id": "CVE-2024-5006",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2024-06-05T08:15:09.983",
|
||||
"lastModified": "2024-06-05T08:15:09.983",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-06-05T12:53:50.240",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The Boostify Header Footer Builder for Elementor plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the \u2018size\u2019 parameter in all versions up to, and including, 1.3.2 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "El complemento Boostify Header Footer Builder para Elementor para WordPress es vulnerable a Cross-Site Scripting Almacenado a trav\u00e9s del par\u00e1metro 'tama\u00f1o' en todas las versiones hasta la 1.3.2 incluida debido a una sanitizaci\u00f3n de entrada y un escape de salida insuficientes. Esto hace posible que atacantes autenticados, con acceso de nivel de Colaborador y superior, inyecten scripts web arbitrarios en p\u00e1ginas que se ejecutar\u00e1n cada vez que un usuario acceda a una p\u00e1gina inyectada."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
|
@ -2,12 +2,16 @@
|
||||
"id": "CVE-2024-5149",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2024-06-05T05:15:50.260",
|
||||
"lastModified": "2024-06-05T05:15:50.260",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-06-05T12:53:50.240",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The BuddyForms plugin for WordPress is vulnerable to Email Verification Bypass in all versions up to, and including, 2.8.9 via the use of an insufficiently random activation code. This makes it possible for unauthenticated attackers to bypass the email verification."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "El complemento BuddyForms para WordPress es vulnerable a la omisi\u00f3n de verificaci\u00f3n de correo electr\u00f3nico en todas las versiones hasta la 2.8.9 incluida mediante el uso de un c\u00f3digo de activaci\u00f3n insuficientemente aleatorio. Esto hace posible que atacantes no autenticados omitan la verificaci\u00f3n por correo electr\u00f3nico."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
|
@ -2,12 +2,16 @@
|
||||
"id": "CVE-2024-5222",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2024-06-05T07:15:46.127",
|
||||
"lastModified": "2024-06-05T07:15:46.127",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-06-05T12:53:50.240",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The Responsive Addons \u2013 Starter Templates, Advanced Features and Customizer Settings for Responsive Theme. plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's file uploader in all versions up to, and including, 3.0.5 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Author-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Los complementos Responsive Addons \u2013 Starter Templates, Advanced Features and Customizer Settings for Responsive Theme para WordPress es vulnerable a Cross-Site Scripting Almacenado a trav\u00e9s del cargador de archivos del complemento en todas las versiones hasta la 3.0.5 incluida debido a una sanitizaci\u00f3n de entrada y un escape de salida insuficientes. Esto hace posible que atacantes autenticados, con acceso de nivel de autor y superior, inyecten scripts web arbitrarios en p\u00e1ginas que se ejecutar\u00e1n cada vez que un usuario acceda a una p\u00e1gina inyectada."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
|
@ -2,12 +2,16 @@
|
||||
"id": "CVE-2024-5262",
|
||||
"sourceIdentifier": "ART@zuso.ai",
|
||||
"published": "2024-06-05T04:15:11.807",
|
||||
"lastModified": "2024-06-05T04:15:11.807",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-06-05T12:53:50.240",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Files or Directories Accessible to External Parties vulnerability in smb server in ProjectDiscovery Interactsh allows remote attackers to read/write any files in the directory and subdirectories of where the victim runs interactsh-server via anonymous login."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Vulnerabilidad de archivos o directorios accesibles a partes externas en el servidor smb en ProjectDiscovery Interactsh permite a atacantes remotos leer/escribir cualquier archivo en el directorio y subdirectorios donde la v\u00edctima ejecuta interactsh-server mediante un inicio de sesi\u00f3n an\u00f3nimo."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
|
@ -2,12 +2,16 @@
|
||||
"id": "CVE-2024-5317",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2024-06-05T02:15:10.163",
|
||||
"lastModified": "2024-06-05T02:15:10.163",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-06-05T12:53:50.240",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The Newsletter plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'np1' parameter in all versions up to, and including, 8.3.4 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "El complemento Newsletter para WordPress es vulnerable a Cross-Site Scripting Almacenado a trav\u00e9s del par\u00e1metro 'np1' en todas las versiones hasta la 8.3.4 incluida debido a una sanitizaci\u00f3n de entrada y un escape de salida insuficientes. Esto hace posible que atacantes no autenticados inyecten scripts web arbitrarios en p\u00e1ginas que se ejecutar\u00e1n cada vez que un usuario acceda a una p\u00e1gina inyectada."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
|
@ -2,12 +2,16 @@
|
||||
"id": "CVE-2024-5439",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2024-06-05T08:15:10.210",
|
||||
"lastModified": "2024-06-05T08:15:10.210",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-06-05T12:53:50.240",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The Blocksy theme for WordPress is vulnerable to Reflected Cross-Site Scripting via the custom_url parameter in all versions up to, and including, 2.0.50 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "El tema Blocksy para WordPress es vulnerable a Cross-Site Scripting Reflejado a trav\u00e9s del par\u00e1metro custom_url en todas las versiones hasta la 2.0.50 incluida debido a una sanitizaci\u00f3n de entrada y un escape de salida insuficientes. Esto hace posible que atacantes no autenticados inyecten scripts web arbitrarios en p\u00e1ginas que se ejecutan si logran enga\u00f1ar a un usuario para que realice una acci\u00f3n como hacer clic en un enlace."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
|
@ -2,12 +2,16 @@
|
||||
"id": "CVE-2024-5453",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2024-06-05T08:15:10.410",
|
||||
"lastModified": "2024-06-05T08:15:10.410",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-06-05T12:53:50.240",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The ProfileGrid \u2013 User Profiles, Groups and Communities plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the pm_dismissible_notice and pm_wizard_update_group_icon functions in all versions up to, and including, 5.8.6. This makes it possible for authenticated attackers, with Subscriber-level access and above, to change arbitrary options to the value '1' or change group icons."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "El complemento ProfileGrid \u2013 User Profiles, Groups and Communities para WordPress es vulnerable a modificaciones no autorizadas de datos debido a una falta de verificaci\u00f3n de capacidad en las funciones pm_dismissible_notice y pm_wizard_update_group_icon en todas las versiones hasta la 5.8.6 incluida. Esto hace posible que atacantes autenticados, con acceso de nivel de suscriptor y superior, cambien opciones arbitrarias al valor '1' o cambien \u00edconos de grupo."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
|
63
CVE-2024/CVE-2024-54xx/CVE-2024-5459.json
Normal file
63
CVE-2024/CVE-2024-54xx/CVE-2024-5459.json
Normal file
@ -0,0 +1,63 @@
|
||||
{
|
||||
"id": "CVE-2024-5459",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2024-06-05T13:15:13.437",
|
||||
"lastModified": "2024-06-05T13:15:13.437",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The Restaurant Menu and Food Ordering plugin for WordPress is vulnerable to unauthorized creation of data due to a missing capability check on 'add_section', 'add_menu', 'add_menu_item', and 'add_menu_page' functions in all versions up to, and including, 2.4.16. This makes it possible for authenticated attackers, with Subscriber-level access and above, to create menu sections, menus, food items, and new menu pages."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 4.3,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/browser/food-and-drink-menu/trunk/includes/class-installation-walkthrough.php#L111",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/browser/food-and-drink-menu/trunk/includes/class-installation-walkthrough.php#L144",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/browser/food-and-drink-menu/trunk/includes/class-installation-walkthrough.php#L62",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/browser/food-and-drink-menu/trunk/includes/class-installation-walkthrough.php#L80",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/changeset/3097599/",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/03f9d9bb-6a87-4da9-bbb0-65203d7250e9?source=cve",
|
||||
"source": "security@wordfence.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,12 +2,16 @@
|
||||
"id": "CVE-2024-5483",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2024-06-05T03:15:08.810",
|
||||
"lastModified": "2024-06-05T03:15:08.810",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-06-05T12:53:50.240",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The LearnPress \u2013 WordPress LMS Plugin plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 4.2.6.8 due to incorrect implementation of get_items_permissions_check function. This makes it possible for unauthenticated attackers to extract basic information about website users, including their emails"
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "El complemento LearnPress \u2013 WordPress LMS Plugin para WordPress es vulnerable a la exposici\u00f3n de informaci\u00f3n confidencial en todas las versiones hasta la 4.2.6.8 incluida debido a la implementaci\u00f3n incorrecta de la funci\u00f3n get_items_permissions_check. Esto hace posible que atacantes no autenticados extraigan informaci\u00f3n b\u00e1sica sobre los usuarios del sitio web, incluidos sus correos electr\u00f3nicos."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
|
59
CVE-2024/CVE-2024-55xx/CVE-2024-5526.json
Normal file
59
CVE-2024/CVE-2024-55xx/CVE-2024-5526.json
Normal file
@ -0,0 +1,59 @@
|
||||
{
|
||||
"id": "CVE-2024-5526",
|
||||
"sourceIdentifier": "security@grafana.com",
|
||||
"published": "2024-06-05T12:15:10.553",
|
||||
"lastModified": "2024-06-05T12:53:50.240",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Grafana OnCall is an easy-to-use on-call management tool that will help reduce toil in on-call management through simpler workflows and interfaces that are tailored specifically for engineers.\n\nGrafana OnCall, from version 1.1.37 before 1.5.2 are vulnerable to a Server Side Request Forgery (SSRF) vulnerability in the webhook functionallity. \n\nThis issue was fixed in version 1.5.2"
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Grafana OnCall es una herramienta de gesti\u00f3n de guardias f\u00e1cil de usar que ayudar\u00e1 a reducir el trabajo duro en la gesti\u00f3n de guardias a trav\u00e9s de flujos de trabajo e interfaces m\u00e1s simples dise\u00f1ados espec\u00edficamente para ingenieros. Grafana OnCall, desde la versi\u00f3n 1.1.37 anterior a la 1.5.2, es vulnerable a una vulnerabilidad de Server Side Request Forgery (SSRF) en la funcionalidad del webhook. Este problema se solucion\u00f3 en la versi\u00f3n 1.5.2."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security@grafana.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 7.7,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.1,
|
||||
"impactScore": 4.0
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security@grafana.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-918"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://grafana.com/security/security-advisories/cve-2024-5526/",
|
||||
"source": "security@grafana.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-5536",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2024-06-05T10:15:09.170",
|
||||
"lastModified": "2024-06-05T10:15:09.170",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-06-05T12:53:50.240",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,12 +2,16 @@
|
||||
"id": "CVE-2024-5571",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2024-06-05T09:15:10.463",
|
||||
"lastModified": "2024-06-05T09:15:10.463",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-06-05T12:53:50.240",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The EmbedPress \u2013 Embed PDF, Google Docs, Vimeo, Wistia, Embed YouTube Videos, Audios, Maps & Embed Any Documents in Gutenberg & Elementor plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'url' attribute within the plugin's EmbedPress PDF widget in all versions up to, and including, 4.0.1 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "El complemento EmbedPress \u2013 Embed PDF, Google Docs, Vimeo, Wistia, Embed YouTube Videos, Audios, Maps & Embed Any Documents in Gutenberg & Elementor para WordPress es vulnerable a Cross-Site Scripting Almacenado a trav\u00e9s del atributo 'url' dentro del widget EmbedPress PDF del complemento en todas las versiones hasta la 4.0.1 incluida debido a una sanitizaci\u00f3n de entrada insuficiente y a un escape de salida en los atributos proporcionados por el usuario. Esto hace posible que atacantes autenticados, con acceso de nivel de colaborador y superior, inyecten scripts web arbitrarios en p\u00e1ginas que se ejecutar\u00e1n cada vez que un usuario acceda a una p\u00e1gina inyectada."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
|
@ -2,12 +2,16 @@
|
||||
"id": "CVE-2024-5635",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-06-04T22:15:10.833",
|
||||
"lastModified": "2024-06-04T22:15:10.833",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-06-05T12:53:50.240",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability was found in itsourcecode Bakery Online Ordering System 1.0. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file index.php. The manipulation of the argument txtsearch leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-267091."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Se encontr\u00f3 una vulnerabilidad en el c\u00f3digo fuente Bakery Online Ordering System 1.0. Ha sido declarada cr\u00edtica. Una funci\u00f3n desconocida del archivo index.php es afectada por esta vulnerabilidad. La manipulaci\u00f3n del argumento txtsearch conduce a la inyecci\u00f3n de SQL. El ataque se puede lanzar de forma remota. El exploit ha sido divulgado al p\u00fablico y puede utilizarse. El identificador asociado de esta vulnerabilidad es VDB-267091."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
|
@ -2,12 +2,16 @@
|
||||
"id": "CVE-2024-5636",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-06-05T01:15:11.470",
|
||||
"lastModified": "2024-06-05T01:15:11.470",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-06-05T12:53:50.240",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability was found in itsourcecode Bakery Online Ordering System 1.0. It has been rated as critical. Affected by this issue is some unknown functionality of the file report/index.php. The manipulation of the argument procduct leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-267092."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Se encontr\u00f3 una vulnerabilidad en itsourcecode Bakery Online Ordering System 1.0. Ha sido calificada como cr\u00edtica. Una funci\u00f3n desconocida del archivo report/index.php es afectada por esta vulnerabilidad. La manipulaci\u00f3n del argumento producto conduce a la inyecci\u00f3n de SQL. El ataque puede lanzarse de forma remota. El exploit ha sido divulgado al p\u00fablico y puede utilizarse. El identificador de esta vulnerabilidad es VDB-267092."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
|
42
README.md
42
README.md
@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
|
||||
### Last Repository Update
|
||||
|
||||
```plain
|
||||
2024-06-05T12:01:14.370310+00:00
|
||||
2024-06-05T14:00:46.105225+00:00
|
||||
```
|
||||
|
||||
### Most recent CVE Modification Timestamp synchronized with NVD
|
||||
|
||||
```plain
|
||||
2024-06-05T11:15:08.490000+00:00
|
||||
2024-06-05T13:15:13.437000+00:00
|
||||
```
|
||||
|
||||
### Last Data Feed Release
|
||||
@ -33,22 +33,48 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
|
||||
### Total Number of included CVEs
|
||||
|
||||
```plain
|
||||
252704
|
||||
252708
|
||||
```
|
||||
|
||||
### CVEs added in the last Commit
|
||||
|
||||
Recently added CVEs: `2`
|
||||
Recently added CVEs: `4`
|
||||
|
||||
- [CVE-2024-4001](CVE-2024/CVE-2024-40xx/CVE-2024-4001.json) (`2024-06-05T11:15:08.490`)
|
||||
- [CVE-2024-5536](CVE-2024/CVE-2024-55xx/CVE-2024-5536.json) (`2024-06-05T10:15:09.170`)
|
||||
- [CVE-2024-1662](CVE-2024/CVE-2024-16xx/CVE-2024-1662.json) (`2024-06-05T12:15:10.213`)
|
||||
- [CVE-2024-3469](CVE-2024/CVE-2024-34xx/CVE-2024-3469.json) (`2024-06-05T13:15:12.707`)
|
||||
- [CVE-2024-5459](CVE-2024/CVE-2024-54xx/CVE-2024-5459.json) (`2024-06-05T13:15:13.437`)
|
||||
- [CVE-2024-5526](CVE-2024/CVE-2024-55xx/CVE-2024-5526.json) (`2024-06-05T12:15:10.553`)
|
||||
|
||||
|
||||
### CVEs modified in the last Commit
|
||||
|
||||
Recently modified CVEs: `1`
|
||||
Recently modified CVEs: `66`
|
||||
|
||||
- [CVE-2024-31380](CVE-2024/CVE-2024-313xx/CVE-2024-31380.json) (`2024-06-05T11:15:08.230`)
|
||||
- [CVE-2024-4001](CVE-2024/CVE-2024-40xx/CVE-2024-4001.json) (`2024-06-05T12:53:50.240`)
|
||||
- [CVE-2024-4084](CVE-2024/CVE-2024-40xx/CVE-2024-4084.json) (`2024-06-05T12:53:50.240`)
|
||||
- [CVE-2024-4088](CVE-2024/CVE-2024-40xx/CVE-2024-4088.json) (`2024-06-05T12:53:50.240`)
|
||||
- [CVE-2024-4219](CVE-2024/CVE-2024-42xx/CVE-2024-4219.json) (`2024-06-05T12:53:50.240`)
|
||||
- [CVE-2024-4220](CVE-2024/CVE-2024-42xx/CVE-2024-4220.json) (`2024-06-05T12:53:50.240`)
|
||||
- [CVE-2024-4231](CVE-2024/CVE-2024-42xx/CVE-2024-4231.json) (`2024-06-05T13:15:12.980`)
|
||||
- [CVE-2024-4232](CVE-2024/CVE-2024-42xx/CVE-2024-4232.json) (`2024-06-05T13:15:13.190`)
|
||||
- [CVE-2024-4295](CVE-2024/CVE-2024-42xx/CVE-2024-4295.json) (`2024-06-05T12:53:50.240`)
|
||||
- [CVE-2024-4520](CVE-2024/CVE-2024-45xx/CVE-2024-4520.json) (`2024-06-05T12:53:50.240`)
|
||||
- [CVE-2024-4743](CVE-2024/CVE-2024-47xx/CVE-2024-4743.json) (`2024-06-05T12:53:50.240`)
|
||||
- [CVE-2024-4821](CVE-2024/CVE-2024-48xx/CVE-2024-4821.json) (`2024-06-05T12:53:50.240`)
|
||||
- [CVE-2024-4886](CVE-2024/CVE-2024-48xx/CVE-2024-4886.json) (`2024-06-05T12:53:50.240`)
|
||||
- [CVE-2024-4939](CVE-2024/CVE-2024-49xx/CVE-2024-4939.json) (`2024-06-05T12:53:50.240`)
|
||||
- [CVE-2024-5006](CVE-2024/CVE-2024-50xx/CVE-2024-5006.json) (`2024-06-05T12:53:50.240`)
|
||||
- [CVE-2024-5149](CVE-2024/CVE-2024-51xx/CVE-2024-5149.json) (`2024-06-05T12:53:50.240`)
|
||||
- [CVE-2024-5222](CVE-2024/CVE-2024-52xx/CVE-2024-5222.json) (`2024-06-05T12:53:50.240`)
|
||||
- [CVE-2024-5262](CVE-2024/CVE-2024-52xx/CVE-2024-5262.json) (`2024-06-05T12:53:50.240`)
|
||||
- [CVE-2024-5317](CVE-2024/CVE-2024-53xx/CVE-2024-5317.json) (`2024-06-05T12:53:50.240`)
|
||||
- [CVE-2024-5439](CVE-2024/CVE-2024-54xx/CVE-2024-5439.json) (`2024-06-05T12:53:50.240`)
|
||||
- [CVE-2024-5453](CVE-2024/CVE-2024-54xx/CVE-2024-5453.json) (`2024-06-05T12:53:50.240`)
|
||||
- [CVE-2024-5483](CVE-2024/CVE-2024-54xx/CVE-2024-5483.json) (`2024-06-05T12:53:50.240`)
|
||||
- [CVE-2024-5536](CVE-2024/CVE-2024-55xx/CVE-2024-5536.json) (`2024-06-05T12:53:50.240`)
|
||||
- [CVE-2024-5571](CVE-2024/CVE-2024-55xx/CVE-2024-5571.json) (`2024-06-05T12:53:50.240`)
|
||||
- [CVE-2024-5635](CVE-2024/CVE-2024-56xx/CVE-2024-5635.json) (`2024-06-05T12:53:50.240`)
|
||||
- [CVE-2024-5636](CVE-2024/CVE-2024-56xx/CVE-2024-5636.json) (`2024-06-05T12:53:50.240`)
|
||||
|
||||
|
||||
## Download and Usage
|
||||
|
138
_state.csv
138
_state.csv
@ -196779,12 +196779,12 @@ CVE-2022-28649,0,0,f1459dfcb8d006a8f7ecef3336d09e104d10b7fce2a7a8ef406316352eedb
|
||||
CVE-2022-2865,0,0,4baeb1e634cb2824a8e6db64787dc59bab5ddddbf1e7d2ee665afc57eae430ce,2022-10-19T17:31:13.797000
|
||||
CVE-2022-28650,0,0,2160d92107c00a756980b3b7a89911e4bb9f67416ebf601fbedcb107ca0aa1a9,2022-04-18T10:18:20.503000
|
||||
CVE-2022-28651,0,0,20c1a1809984744c3b6c3b6baf1e1de5df12ea0b4352779e2e1135a354356771,2022-04-18T18:34:31.143000
|
||||
CVE-2022-28652,0,0,f6160795f0a537e2441fd9f3240b1a4247a909563f95d2ae6910b6624f114486,2024-06-04T22:15:09.780000
|
||||
CVE-2022-28654,0,0,caf59093a9449f227e5848da136d7233e039f13f61a5744cc464209c811daba2,2024-06-04T22:15:09.870000
|
||||
CVE-2022-28655,0,0,58e2d2f2317f48af5f129fc6df32d422db4c1b9774373f8ee9273f2ed7edeee8,2024-06-04T22:15:09.940000
|
||||
CVE-2022-28656,0,0,b914f71d03565982025df33710ace2ca066fea9bdf8c37342e8ac0e0d0dccbe0,2024-06-04T22:15:10.007000
|
||||
CVE-2022-28657,0,0,01def96f461d049845a9bbc150bd4eea197cb660ef61313211aa92210ef916cd,2024-06-04T22:15:10.087000
|
||||
CVE-2022-28658,0,0,3be2b49a096088250a1185bc79abc3c9e29544ff6ef1f107bca27d30da675357,2024-06-04T22:15:10.153000
|
||||
CVE-2022-28652,0,1,9418d40161244d69ffed3263449a0ca0a621472c0ed9870ca4a97141094f9a31,2024-06-05T12:53:50.240000
|
||||
CVE-2022-28654,0,1,2729ca223915e6b98798a6e9b0b9b2f54681df2904099f1cb8621e9ee00d5a88,2024-06-05T12:53:50.240000
|
||||
CVE-2022-28655,0,1,482320c0f20baa25e1925a87250292dec2effad26ed392d220ba6923856acfd2,2024-06-05T12:53:50.240000
|
||||
CVE-2022-28656,0,1,e2aa6838c286aecb2f7fe9d229c37aceb3d43b8da7c52fba105f38c9044db5a7,2024-06-05T12:53:50.240000
|
||||
CVE-2022-28657,0,1,531749e83b4dd1173943b93b02164dee7b801df070ebf7e25af69306bf97b764,2024-06-05T12:53:50.240000
|
||||
CVE-2022-28658,0,1,52748d0f77b44f8652390140b7ed4a8ad4b2bcb515ef06f9e00ba4e6ebb75c79,2024-06-05T12:53:50.240000
|
||||
CVE-2022-2866,0,0,39936636c7b18b74703b9b6f9b14aacde95244838843f9eb43e74857aedd50d3,2022-09-02T22:02:57.273000
|
||||
CVE-2022-28660,0,0,56c6ace0e4d9c9af155b31cd3cc2403dccde1c6848618344b9372c4d85c50f7f,2022-10-07T15:45:37.153000
|
||||
CVE-2022-28661,0,0,bbfe8460bffe6f8fc9b166d47e50b1e6f91f964c6534918a6a23dce6596730e9,2022-04-19T18:36:54.557000
|
||||
@ -241234,10 +241234,10 @@ CVE-2024-1157,0,0,c47361e1397b03eed535508c9ec506a27255415c46de202eb894db1bcf5cb3
|
||||
CVE-2024-1158,0,0,995dea25d678a81957450018def2710d810650928efacbe0a4cd027592c45fcd,2024-03-13T18:16:18.563000
|
||||
CVE-2024-1159,0,0,d0250faef462038e0120055a7c1a6779f3d892d3b8c2c1aaf5ccce9550779728,2024-02-13T14:01:00.987000
|
||||
CVE-2024-1160,0,0,c82942832f2bf6c3ff41a88402b9dca5a934aaf9eae2920b01f254b593b20d40,2024-02-13T14:01:00.987000
|
||||
CVE-2024-1161,0,0,6b91af3e18b1f072d7f4cc8031e43b42cedc6d4b6c6ab109f49637b951916a4f,2024-06-05T06:15:09.010000
|
||||
CVE-2024-1161,0,1,60b5901c5858c281718f94c511bd0cfd8f84179eca326424451e3ec1cc125a4f,2024-06-05T12:53:50.240000
|
||||
CVE-2024-1162,0,0,5f2954147a2ad0bfda8f51ea41ff0a374d1e4a1c83a2e06e1e47465f3c5f70b8,2024-02-08T14:22:37.180000
|
||||
CVE-2024-1163,0,0,c0817c91ae84923184209dc3c71e6209d979097a49b0e341f691fe7193cd2db3,2024-02-29T15:15:07.473000
|
||||
CVE-2024-1164,0,0,26046e2b3dd096eefbcd5b8dcc8d04e8411fb9142e8a1e4c5de30439e6e80651,2024-06-05T07:15:45.310000
|
||||
CVE-2024-1164,0,1,24df03029a70153116b0af902b93010b8aee882bf45630401f0cc4dfe70c3da9,2024-06-05T12:53:50.240000
|
||||
CVE-2024-1165,0,0,09d0c48437e50305f6b70b9aab3bb8805a9bc240d0fb341de398e33a6ad98f02,2024-02-26T16:32:25.577000
|
||||
CVE-2024-1166,0,0,cbc50c0645991c69523344b23f8a84819598bdfdeb24c5f4ba7570f86b9c6398,2024-05-14T16:13:02.773000
|
||||
CVE-2024-1167,0,0,646f860ad24a5198d530bba39bcdba3b9fb385431091cfa90a0190891cfad025,2024-02-09T20:20:51.900000
|
||||
@ -241334,7 +241334,7 @@ CVE-2024-1266,0,0,5dd53fa554a7634e1c048a8f95923aa3088a9a992e77cce161d6c3e73b044c
|
||||
CVE-2024-1267,0,0,e1baf417ea5b1200261bbe0e762e7d306442092cb87ea0c0daf956e73a64be41,2024-05-17T02:35:21.940000
|
||||
CVE-2024-1268,0,0,a71f6831ef4e801110d9a785c473764d7dc4eb42bf088dcd5198930cf6d73f8c,2024-05-17T02:35:22.040000
|
||||
CVE-2024-1269,0,0,c0e96ce08aa8cc4b0c5c9b01a4dfe6413b6a1aa0ecfba529b99ff41ed595060e,2024-05-17T02:35:22.143000
|
||||
CVE-2024-1272,0,0,2db590adf1e128bc28ed4e0057f0348cac0353dc56ffd935e6fae1513e6e3ba0,2024-06-05T09:15:09.620000
|
||||
CVE-2024-1272,0,1,7ca3476db09a816981caa2aad90cdfaad8ea4a4f66acd8ca384bb00dac3bc5a5,2024-06-05T12:53:50.240000
|
||||
CVE-2024-1273,0,0,0a310035a5b694469d93d82e5859918e80208ec594b8c8228e8be9ae18ebdda5,2024-03-12T12:40:13.500000
|
||||
CVE-2024-1274,0,0,e620aeced049d61f6d382460fbf5059a46434714ff81966b55927aa96a1401ee,2024-04-02T12:50:42.233000
|
||||
CVE-2024-1275,0,0,bf26cd5e632f2b0f1b86a7cb8d63ebc17497163a682c8c1239e0557cf3b49995,2024-05-31T19:14:47.793000
|
||||
@ -241667,6 +241667,7 @@ CVE-2024-1657,0,0,a497f7c000aaae813c345480c074db7bfac8435097b4ea8536600de4b426af
|
||||
CVE-2024-1658,0,0,bd2757c2314dc2f8bd52ce15b18a6ca41069d2e3f9ff401d7a725ad82b1db09d,2024-03-18T19:40:00.173000
|
||||
CVE-2024-1660,0,0,068c83f9afc694d855bcbb99610bd3ca5f918af7baf81b6ceb2a3be3520f6bf7,2024-04-15T13:15:31.997000
|
||||
CVE-2024-1661,0,0,b7671ba7b0cc968bc464682e512c319d5a4f7189c60b340cf16a0b0c1d49a626,2024-05-17T02:35:32.207000
|
||||
CVE-2024-1662,1,1,d2466e5ce29cf8919b6d4113bb6dbefd23ad12a1cb22023d3c42bec7a5a67e67,2024-06-05T12:53:50.240000
|
||||
CVE-2024-1664,0,0,c240cf09d136b8ae3766d60b95066ae5935a6052d7cd59ed400a537e65636ac2,2024-04-09T12:48:04.090000
|
||||
CVE-2024-1665,0,0,85850268afa8f45cb216640500e9f9bf4c397be3fcaf3ba3d1fb4051141bde34,2024-04-16T13:24:07.103000
|
||||
CVE-2024-1666,0,0,a40e8fc9293cfb1145d3e1e7f135accc0146030f08ee21589fc7baafb865977a,2024-04-16T13:24:07.103000
|
||||
@ -241909,7 +241910,7 @@ CVE-2024-1935,0,0,a7f7eb7b74a22681adc4071f1d8733546534bbce79c7b6b4b422bbf2e64105
|
||||
CVE-2024-1936,0,0,7b3792457d5905a49db010db7b736af0c923e8894b5bdd1a854744f20603a17d,2024-03-23T12:15:08.453000
|
||||
CVE-2024-1938,0,0,24dc90499c61d902708c3560ef4b72bc4a3172c10dbf5b005bb9075fcee4ff4b,2024-03-07T23:15:07.177000
|
||||
CVE-2024-1939,0,0,862ed503c4cd6a96fea863f557f2290de2baf913d152cc1cb93720d0bf768f1c,2024-03-07T23:15:07.250000
|
||||
CVE-2024-1940,0,0,2fe903c72b21b896e9f0b18cd7302ecb17306bdcf8cd11dcb83068a71594d5cd,2024-06-05T06:15:09.780000
|
||||
CVE-2024-1940,0,1,94d085d56322d2a310dbe1e68a5979b594a65e347820bea0716a77c1d9ab272c,2024-06-05T12:53:50.240000
|
||||
CVE-2024-1941,0,0,2deee38d49f655dc85a14e0f9cc0860e5fd72126cfed04ebe024762ac27ab897,2024-03-01T14:04:26.010000
|
||||
CVE-2024-1942,0,0,980efc55f5eab41cf2c4f30738d9bba260cb2905950fe4e94d5f18fcbaafef3e,2024-02-29T13:49:29.390000
|
||||
CVE-2024-1943,0,0,12241ffd50e07c2810c1836c3e8f27c317becac2e0f94ec708a8bb306904594f,2024-02-28T14:06:45.783000
|
||||
@ -242383,7 +242384,7 @@ CVE-2024-20866,0,0,58d3db3c436cd4edcfbee612570f2e77cc32989fe5de8d87bea6a0e56551a
|
||||
CVE-2024-20867,0,0,0e6b5e18a9f86247a6a1090b01cf596581daded4155bfbc09972d6cdc5714d2a,2024-05-07T13:39:32.710000
|
||||
CVE-2024-20868,0,0,23d1ca1dba7a2ad9810a7b603f4dc59801094aa235b5516b22a3aa3c056e5066,2024-05-07T13:39:32.710000
|
||||
CVE-2024-20869,0,0,205bcfae207f01cfe9e76e25dfb8358434940d02212d78ea178f2e739e243546,2024-05-07T13:39:32.710000
|
||||
CVE-2024-2087,0,0,0d62a549ffc6556068b093343ad599a4ca1ecc0c53b01f7c29946b57d38406fe,2024-06-05T06:15:10.833000
|
||||
CVE-2024-2087,0,1,4bfa6b5320d599c49c5c3edd2f0d2e3ebb8b69d42b842cd5b758a35acbe93a6b,2024-06-05T12:53:50.240000
|
||||
CVE-2024-20870,0,0,247de2e7cb6c1589f56f1a1780b91fbe4feee02648b4f01650496931882d0b24,2024-05-07T13:39:32.710000
|
||||
CVE-2024-20871,0,0,4b5019addc2549a143f67a36860f5a0576db2a31268cf1be920df7487aeaeae8,2024-05-07T13:39:32.710000
|
||||
CVE-2024-20872,0,0,f057840a1e0e70ef07c9af92e3c53b5e58e8fd31ea1c15cdb3fe23cd840da357,2024-05-07T13:39:32.710000
|
||||
@ -243495,7 +243496,7 @@ CVE-2024-22563,0,0,e68d7fb0548f09a5ec2c02ea3bc2e400b99a4a7ece951a19b220371a41585
|
||||
CVE-2024-22567,0,0,37499b14fc95be5de51f415505f023a34c878497b34bd94665d0d5d9fc0f3959,2024-02-14T19:54:19.663000
|
||||
CVE-2024-22568,0,0,b7d805911224b1ae0c1c8858ee61b49b9c11cc28a75ce32a84caadcf77d4e108,2024-01-20T18:49:52.490000
|
||||
CVE-2024-22569,0,0,bee3ca02120bb4729d62660d17afd0816ef9535b004ff125be13883d678f5fb9,2024-02-06T18:07:39.733000
|
||||
CVE-2024-2257,0,0,5bfec26c749f56d8963d8059c1e9ffd15006f3253fd98b65d0a3a5ea4c6fa7f8,2024-05-14T16:13:02.773000
|
||||
CVE-2024-2257,0,1,e0de8fd35bb16723a00e051e40382b6adae8db85ef6ac2955ba0b6721d22478a,2024-06-05T13:15:12.557000
|
||||
CVE-2024-22570,0,0,c41ee5b58f7f6a9dd8b89c3af365a9d60dc2b413d2b344b295ffdf6e10d67e91,2024-02-02T23:32:46.897000
|
||||
CVE-2024-2258,0,0,0a2d974520f3aded55b51d15a5993f56250b1aed189d20a50869de8aedadc1c1,2024-04-29T12:42:03.667000
|
||||
CVE-2024-22588,0,0,a2c6cd05590470f0279e75fb12dad64f1e0ed398a983cfaa98608323ce35b7b6,2024-05-24T18:09:20.027000
|
||||
@ -243873,7 +243874,7 @@ CVE-2024-23322,0,0,efdd5208c12e6ab610c84f708ac54206d4a8e094359274c8f3041236f4686
|
||||
CVE-2024-23323,0,0,9ef57ef11998f55bee596cb29f1fbe7dc637ddbdf2aa13fe046f9f2eea8d8f88,2024-02-15T04:48:09.937000
|
||||
CVE-2024-23324,0,0,35720c684b54e965146363a2e121313965ffb87bf31cdf01edc9c60f19b814c6,2024-02-15T04:46:33.747000
|
||||
CVE-2024-23325,0,0,70301add03c2e2278861270a456ddd507fac1caa8f238d4654fa7a889c0634df,2024-02-15T04:46:07.523000
|
||||
CVE-2024-23326,0,0,659097eb51545241961f039332840059ad67d2f369db66b13e2bd8ce5e7b4906,2024-06-04T21:15:33.440000
|
||||
CVE-2024-23326,0,1,cbb16a6886794de53901feff38e5eb60c6f098492f246badd6bdbbc1e4996e60,2024-06-05T12:53:50.240000
|
||||
CVE-2024-23327,0,0,23e7e171aa9435048ef128fcb499e07e85d88191467319d42823b5790591ee1c,2024-02-15T04:45:57.207000
|
||||
CVE-2024-23328,0,0,c6365a32f3e08f9ae9322d77197538e35765bb36247196fdd4549570c228c068,2024-02-29T13:49:29.390000
|
||||
CVE-2024-23329,0,0,0872cee4434cd36ea6d6e070e0df43a79e4470fecf3359a8aa00c845af990886,2024-01-26T20:19:59.393000
|
||||
@ -244071,7 +244072,7 @@ CVE-2024-23664,0,0,fef7b517001d2c9ded36e59d6e6f76dd4dad49d2f1a97c16a9e2d13b88233
|
||||
CVE-2024-23665,0,0,9b721572a9eab0f097d40ba2bb4435bfadacb0c946c8971f2e8262fe3a7027b8,2024-06-03T14:46:24.250000
|
||||
CVE-2024-23667,0,0,56789b6d65cfb24cf53469fc30bd1ef9ec2c55d090fed01acd87410507e26bb2,2024-06-03T14:46:24.250000
|
||||
CVE-2024-23668,0,0,f824ecc20d8a28779421def62b365e05c131b29e7f5f1b0a1c4c94219889443e,2024-06-03T14:46:24.250000
|
||||
CVE-2024-23669,0,0,0cc7f72a8491d01671d47f311e81b6a2db9eec3e950a816995bcbfb67b5c5fa0,2024-06-05T08:15:09.537000
|
||||
CVE-2024-23669,0,1,b451250ce634cd7ae9d86a4a9aea45aef5b8abb759a627e8325592b3a9deecc5,2024-06-05T12:53:50.240000
|
||||
CVE-2024-23670,0,0,4d67c08986dae2f7effe1d794f6cb5ef791bdddbdc24c82df7382f96f5b8f09b,2024-06-03T14:46:24.250000
|
||||
CVE-2024-23671,0,0,108c61a6aa74a9b71687a2e3aa153a422c4a0c3adcd258415c5b065e1ef21ae7,2024-04-10T13:24:22.187000
|
||||
CVE-2024-23672,0,0,ecf21cf6fef0fb9a72fe820ee02e2854b5a2d1575ce42cd766c4a52761cff3de,2024-05-01T18:15:14.357000
|
||||
@ -244082,7 +244083,7 @@ CVE-2024-23676,0,0,56ef125eb2696d6a370cb1fcee9cbf4c70187c994325783ccd00cee906067
|
||||
CVE-2024-23677,0,0,5002fb89610cfd38f5d468dc18f3c5331733998bb74f1ff07d319dde587b2882,2024-04-10T01:15:18.390000
|
||||
CVE-2024-23678,0,0,5d448947bf54ec004c72c54b20b24d8bf3a971bcebd8f73c5e7293fdadfe4a1b,2024-04-10T01:15:18.543000
|
||||
CVE-2024-23679,0,0,640c7c61fdad62898ad4f1df55f17c5c64134e2dc64c7047206373e2ec219dcc,2024-01-26T19:12:45.117000
|
||||
CVE-2024-2368,0,0,6d8fd48fa8d3f24a2a0e5985f428af6c1c9ac3d702fa6817f3892fa1d7924b80,2024-06-05T07:15:45.690000
|
||||
CVE-2024-2368,0,1,7de27d6c3df4c6eb86124ff3122bfe8eca34e7e15a20b125486fdfcde52ccee8,2024-06-05T12:53:50.240000
|
||||
CVE-2024-23680,0,0,65bdb0a5f8b9a48a1100a0dc9afd500ed5d0157f9effc3b8f1a9f7c133b834bf,2024-01-26T19:08:47.817000
|
||||
CVE-2024-23681,0,0,5784aa8d00dbad48397c875e3410cbaf00b669b08aed5acdb560ab01d2b57314,2024-01-26T15:08:04.263000
|
||||
CVE-2024-23682,0,0,051b25f120cad0cdd9a52c659e33751066e3fa9d41bbdc9f8e31ffa7e2662331,2024-01-26T15:08:33.007000
|
||||
@ -244876,7 +244877,7 @@ CVE-2024-2509,0,0,d87071763c3f045575858adf9ceada540509d3a47b1787f91e2dde65a00443
|
||||
CVE-2024-25091,0,0,01b357047b564e780ed13b7e87b2fb8ec79ae12ad4e744cc9437e3dc74a94964,2024-03-01T14:04:04.827000
|
||||
CVE-2024-25093,0,0,c29d732f68144a1dd5d537415c8d51940073ac1e6ff114431aa6a52d78b263f0,2024-02-29T13:49:29.390000
|
||||
CVE-2024-25094,0,0,6ba9f5c53aa4aac51446efc522144ae35e985d8a070a664685b43e0df39aa007,2024-02-29T13:49:29.390000
|
||||
CVE-2024-25095,0,0,0a1cef49311fad3aae9197630beb4a9ab85fac520fe73f83aff35e5dc3200b12,2024-06-04T19:18:45.170000
|
||||
CVE-2024-25095,0,1,1e7be9a94516641641f1871a857f01f88977c81cd208dddda622d6726fd6d72e,2024-06-05T12:53:50.240000
|
||||
CVE-2024-25096,0,0,197459782cea6a70dfd744624d830ac31075b0aba6f9593eca13f5ad0ec0cbd0,2024-04-03T17:24:18.150000
|
||||
CVE-2024-25097,0,0,b09bd692195a6af2bdcd0c616f06807fc50a89e84d1ede17ca925d89de84c8a4,2024-03-13T18:15:58.530000
|
||||
CVE-2024-25098,0,0,028b98ef9a2084a8173d1d38eecdc4136ac8af6138dca7ba8312806912dc26e0,2024-02-29T13:49:29.390000
|
||||
@ -246939,7 +246940,7 @@ CVE-2024-28099,0,0,73e4b6f4e302601dee04aa1fa8e82b6137bc81ff22a37186241bc9bd72ade
|
||||
CVE-2024-2810,0,0,2c3ff0e8ac5c36f768fa31b8f69ccb9e5f88ff34163ac424caf94fb3a746b419,2024-05-17T02:38:31.447000
|
||||
CVE-2024-28101,0,0,01541a2740ce2ffbd34e7de916ee530e34d9051f1ee53f417345ced9c3bece74,2024-03-21T12:58:51.093000
|
||||
CVE-2024-28102,0,0,dd908b176fa8700f78af6b8a5980e30508069b806d1be433d10a42940d9f6918,2024-03-21T12:58:51.093000
|
||||
CVE-2024-28103,0,0,1430a1051129bbc98000c90a22d2239b01eb76c97d25df9cf328d0b33a6e7271,2024-06-04T20:15:10.237000
|
||||
CVE-2024-28103,0,1,8aae0bdb3d509ae6298eb3762f72fa38efed7e172de055435aaa7ecaf408470d,2024-06-05T12:53:50.240000
|
||||
CVE-2024-28105,0,0,fcc764ac1e5fa24a7cdc91807ca008992de501a32669f46e1eff534ca8e7d49a,2024-03-26T12:55:05.010000
|
||||
CVE-2024-28106,0,0,a89dc0ca5c060b8348ae8f0c0d823137664e9265682cb4445ed694e0c7db5aff,2024-03-26T12:55:05.010000
|
||||
CVE-2024-28107,0,0,67b11d5219b0b9f786e274d36c6219cc6a62e589b1f556fced90abc2232753f8,2024-03-26T12:55:05.010000
|
||||
@ -247526,7 +247527,7 @@ CVE-2024-29149,0,0,0a051cd70f444c7f076a038ef5a239651e0124faf2741d58016b91f08f7da
|
||||
CVE-2024-2915,0,0,964dabbde545b1ee227255a721578c284dc9872f1078b9295a9169d877ce4d6c,2024-03-26T17:09:53.043000
|
||||
CVE-2024-29150,0,0,062126a35544b774d6fb58afd2d590a447c3aac593c727f888b79a1635063392,2024-05-07T20:07:58.737000
|
||||
CVE-2024-29151,0,0,ef852a662e1eaee7e15d971ee7451f2c3e954b3d808a30cb9a36bbe68bb24c8f,2024-03-18T12:38:25.490000
|
||||
CVE-2024-29152,0,0,4e1c39d4559145b7c5edb2e56399639ade0a619802f87efeab24b919fec96c6d,2024-06-04T19:19:07.620000
|
||||
CVE-2024-29152,0,1,9d6136a21b141965839cf4cc13570f1c3ccdb4b96bbb96c7a7b88af6d40c4771,2024-06-05T12:53:50.240000
|
||||
CVE-2024-29154,0,0,dab131c9ff393e828252009730d8617a5e1a4fb5cfb7f2db054056bc6f27c2ba,2024-03-18T12:38:25.490000
|
||||
CVE-2024-29156,0,0,98cbc37d07cb77607ab83580cc50ba5a01141613b7a3bb770966a3d6831e2326,2024-03-18T12:38:25.490000
|
||||
CVE-2024-29157,0,0,0ffca9c85400879d2350f7e41592fe36ba7fd13fff06f556ca5f1be60327b7a3,2024-05-14T16:13:02.773000
|
||||
@ -247964,7 +247965,7 @@ CVE-2024-2997,0,0,3a578291c3b241bab600655a4ba011b593bae43f4bacaa35e28ecb654fca1f
|
||||
CVE-2024-29972,0,0,6eb07d32580185ea51f927f67f2978b808addad4d830734cf44d0e61f642dd0c,2024-06-05T06:15:10.307000
|
||||
CVE-2024-29973,0,0,fed305ac9bbfd8a3bcb05f4012099f51e000b0123ac4db28d9d3e1a93ebbff3b,2024-06-05T04:15:11.330000
|
||||
CVE-2024-29974,0,0,0fabd0ed87d1a17e2d57c3925a4a991d1b1c401d215c10f3d80cab083de41ead,2024-06-05T06:15:10.657000
|
||||
CVE-2024-29975,0,0,49c807a12409727c8a1afb2f2806b07c0d451dfb8359eeb78ceb9a9de79debef,2024-06-05T04:15:11.617000
|
||||
CVE-2024-29975,0,1,e1854e5ca81cfeff5d0c1bda31c43cb66e4ccc1d3b700107211d85fe54797d4b,2024-06-05T13:15:12.107000
|
||||
CVE-2024-29976,0,0,0fa1d772a8223241204b7c64472e90f5c1bb1a92000917507c17fda5770ef8d0,2024-06-04T20:15:10.677000
|
||||
CVE-2024-2998,0,0,eefb5ffb4f4c69125c8918f19ada8e94baebaa500baf95dbd5f811afe3390da3,2024-05-17T02:38:41.883000
|
||||
CVE-2024-29981,0,0,b762af1b8e0b46a6fed26152fe7346562730b9b9166ba9906ede0af07fe94bd1,2024-05-28T23:15:17.270000
|
||||
@ -248348,7 +248349,7 @@ CVE-2024-3048,0,0,4dcedcaa78b591cdd60323c2fe1598a52cf4e06ae133e6cc58809008ef557e
|
||||
CVE-2024-30480,0,0,9546cbc650c6f7e364bcf65bdd8137d4963e25a2443b4557916c31263a8a88d7,2024-05-17T18:36:05.263000
|
||||
CVE-2024-30482,0,0,570bede6c16b4a7f5e8b36059aeda7f1a299c81f1153ac528a60791c716caf63,2024-04-01T01:12:59.077000
|
||||
CVE-2024-30483,0,0,6c48131c3767e81f61ec34b0bc223a59e072c0c0b055c8c0e04f20b2876077ea,2024-03-29T13:28:22.880000
|
||||
CVE-2024-30484,0,0,68ba10c9338d95a1a7cf42008526fd5e069ee563324c640cb441ac81197547e8,2024-06-04T19:19:24.800000
|
||||
CVE-2024-30484,0,1,a6d4ccd88422e9dc714db6fda7522786213a0ebd9e4df5ddb2efd0acbc74f3d0,2024-06-05T12:53:50.240000
|
||||
CVE-2024-30486,0,0,3b668ae931cda4b6a387bfa69ea17dffa696817ef5a0dd2b2ba0b8d1d89d01a9,2024-04-01T01:12:59.077000
|
||||
CVE-2024-30487,0,0,8478a9894c02433324d52a7694bbe43e86c58bc36ce6feb0280d7b18225d7d5b,2024-04-01T01:12:59.077000
|
||||
CVE-2024-30488,0,0,9fdeb2b805850984cf4d5d3f20362f356c5feecfdc17015a244efcf21ce430a4,2024-04-01T01:12:59.077000
|
||||
@ -248387,10 +248388,10 @@ CVE-2024-30521,0,0,831f25d28a4eccbee0c9a477ea2d8542d4b6a09da45b2ed1bac270363725b
|
||||
CVE-2024-30522,0,0,52231b69f26c5a58b4ea5de11a6776cc3a49889521ce951fb83a4aaa3cf9a331,2024-05-17T18:36:05.263000
|
||||
CVE-2024-30523,0,0,0cef256089f66b1e0cf2f5994c8e2a08b4afb817483e2b78f98835367339d575,2024-04-01T01:12:59.077000
|
||||
CVE-2024-30524,0,0,3f617e1e45b1122d6b1034d70f29ff7cb7551f904c4e8a57e14430a05ec497b2,2024-04-01T01:12:59.077000
|
||||
CVE-2024-30525,0,0,6125ac81f6ceae8fa8ae9f228cabf653fddd6ab5e57397a03d19975cee8f9582,2024-06-04T20:15:10.780000
|
||||
CVE-2024-30525,0,1,bd91a1a2dc55dc9a20965ef673718df7c4a5f3cacae3289c55697ded3055b159,2024-06-05T12:53:50.240000
|
||||
CVE-2024-30526,0,0,104d793a66172acd99ba27a22d83ba8e2d51aa54cd9b15f3bc6afe8a835c5254,2024-04-01T01:12:59.077000
|
||||
CVE-2024-30527,0,0,27e4c5629e352d9d487ea96a5699b7f5113e11cf1c874e376c67a5c6e270b939,2024-05-17T18:36:05.263000
|
||||
CVE-2024-30528,0,0,c799df1f06701f30f9c1fd0ef914983eaebfa375f4b5cf9a8d7c4e107ca5aeba,2024-06-04T20:15:11.010000
|
||||
CVE-2024-30528,0,1,e683302804752e93f523d2032e1d9ba602a774ed14638f85e6e1e44438fd8d98,2024-06-05T12:53:50.240000
|
||||
CVE-2024-3053,0,0,229c354cd3a0cecb51dd999b0e615993d2b674b0536a00d5050bf9c52ceb3ac1,2024-04-10T13:23:38.787000
|
||||
CVE-2024-30530,0,0,dbaedca63c2d0063e70329af2f2e13f2d8eb98748a64909895cfdcfc37f36d33,2024-04-01T01:12:59.077000
|
||||
CVE-2024-30531,0,0,b09c54bc9b690b21f0b4a0d96b7e8e1d6291d5af0953063c3755ba446b38cd3e,2024-04-02T20:31:58.463000
|
||||
@ -248594,7 +248595,7 @@ CVE-2024-30883,0,0,39bac2b059deaf000971e1bfbce5ce5c6c34180366ea55e22f11dd860abb7
|
||||
CVE-2024-30884,0,0,f3a012fdbee7dcdfbc54fb994726741009310b51eecb5e393a9f37c21fbc6c9c,2024-04-11T12:47:44.137000
|
||||
CVE-2024-30885,0,0,053b43f723add848d769270cc9eabce98f2bef07551ec399121d9cd8c29459b9,2024-04-11T12:47:44.137000
|
||||
CVE-2024-30886,0,0,78e1ecd0ca2250189e977131b68a166fe34cee6c425475aee62ecd362250a877,2024-04-24T13:39:42.883000
|
||||
CVE-2024-30889,0,0,209fdd077439e36605d91bb12a4f7a6bc42a9e1eef6122cba6dc0e6b77e08680,2024-06-04T22:15:10.243000
|
||||
CVE-2024-30889,0,1,e9dccb28cc37bc675e6cef39396cfb568f138ce04eb5c42362029976c637cfd3,2024-06-05T12:53:50.240000
|
||||
CVE-2024-3089,0,0,85eb6f9d43806eac03b625c9309bf03f829ae71d4cbf8ab12f4121971702a373,2024-05-17T02:39:42.963000
|
||||
CVE-2024-30890,0,0,39acc6930e6d21119fa952336469013f3c94563e745def6de23d4ab6c1b58299,2024-04-25T17:24:59.967000
|
||||
CVE-2024-30891,0,0,eaa8b86280359f3d73f2f1d8a4256591b68799e019aa5c9624f2214d6f01088e,2024-04-05T12:40:52.763000
|
||||
@ -248861,7 +248862,7 @@ CVE-2024-31377,0,0,e02ff82e676ae79edbc072171f0dcb9a2546e0513cac1421dc24d4d1c0749
|
||||
CVE-2024-31378,0,0,46b9b8732b642d44c5d384306dfbdf69a9115d6098ab0a36faa3f26c08690e37,2024-04-15T13:15:31.997000
|
||||
CVE-2024-31379,0,0,24f2bdeb0f1fb4bdf974899fe3fab2725f6d89406a545ae15090a05eaf09429a,2024-04-15T13:15:31.997000
|
||||
CVE-2024-3138,0,0,600414616133cf85e85595deae77f890dae22a94f93f9ce57499c9176145d096,2024-05-17T02:39:44.330000
|
||||
CVE-2024-31380,0,1,54c7211a517e0ffc3632b06c809d952799bc0e8670e9172a1c47298aa79397d9,2024-06-05T11:15:08.230000
|
||||
CVE-2024-31380,0,0,54c7211a517e0ffc3632b06c809d952799bc0e8670e9172a1c47298aa79397d9,2024-06-05T11:15:08.230000
|
||||
CVE-2024-31381,0,0,c9f8b2a8bb43383a6d2b44f4c2bce621630063d464575918f98bc752cd934627,2024-04-15T13:15:31.997000
|
||||
CVE-2024-31382,0,0,fdb9f25138a089e37ff91a85435d838e4c79e5961d1d783d123309eb6b480c40,2024-04-15T13:15:31.997000
|
||||
CVE-2024-31383,0,0,969012fe96b80e550a1eee7edc6c8a1c541c828926b828c1a67fc199b91a261d,2024-04-15T13:15:31.997000
|
||||
@ -249425,7 +249426,7 @@ CVE-2024-32460,0,0,fc58ca5ee1d47b6a3e46a6c825461997a8b177fb47b38edb8831274c3530e
|
||||
CVE-2024-32461,0,0,3941d8bd271b020582637450c6381a991de4b9ffa39f4db030841834b9e2af51,2024-04-23T12:52:26.253000
|
||||
CVE-2024-32462,0,0,5d7e199d9ef87a9ead0aaa6e45da944ead2c54f7c8bd33536b92a885a6b7e6b3,2024-05-01T18:15:24.140000
|
||||
CVE-2024-32463,0,0,1671e195c4973ac11a31a2856358d6fb78fc6f39ffe0d1d851cfbba7a397b723,2024-04-17T16:51:07.347000
|
||||
CVE-2024-32464,0,0,d6770afcc6e6b59df506bf59a747524406db5fb8656005ad89b30b22add67fe5,2024-06-04T20:15:11.247000
|
||||
CVE-2024-32464,0,1,52634ddcf12f82ec61cf24dc495c221670ea1dbca50f28c4b31766439e35a405,2024-06-05T12:53:50.240000
|
||||
CVE-2024-32465,0,0,a0f151efab7dbe52ec72f2cea78d78d28564bdc55afdc4d6b29ba2affb856cd8,2024-05-15T16:40:19.330000
|
||||
CVE-2024-32466,0,0,db7f064bb346349536bc1029a9138c718e3a99de40435ac8076a2153a72d304b,2024-04-18T18:25:55.267000
|
||||
CVE-2024-32467,0,0,c3595d52e60c3fa31f1ede27ca8549a3938c2ca59fe6ab3708d95e8b6d1a0b5d,2024-04-25T17:24:59.967000
|
||||
@ -249792,9 +249793,9 @@ CVE-2024-32970,0,0,b126f2141510dcb54e926e47a7ca1df0de893436174ab5ed3374ec3e4a125
|
||||
CVE-2024-32971,0,0,30a1ded880baa000b404a0581d7700fcba0993ad067bcadc9b70a0460e2724c7,2024-05-02T13:27:25.103000
|
||||
CVE-2024-32972,0,0,849652650e04d2a2cf928beb303038daae9f4b88c338eff0619c140035b2effa,2024-05-06T16:00:59.253000
|
||||
CVE-2024-32973,0,0,c022c9f4134f1adead82c1b269e30d0c14622c1fcaf8b6997a4d5a316715d39c,2024-05-01T13:01:51.263000
|
||||
CVE-2024-32974,0,0,85f103c66367b72989b54e659e71823eed9a6aa0b36c7d7a55c2b000db0ee42f,2024-06-04T21:15:33.773000
|
||||
CVE-2024-32975,0,0,3cc68504fcb45049a3d95f8100aee866601e52f37878c73620b124561fb915b7,2024-06-04T21:15:33.987000
|
||||
CVE-2024-32976,0,0,0879568e7c4b68844d669bbf49de1c4bc4d5f2691b972be83f6e8dc8432ae718,2024-06-04T21:15:34.220000
|
||||
CVE-2024-32974,0,1,8d4c7bdf9da40c6a16e47999b4d6ef8d221fd2e29bd96543e64accb17830a05c,2024-06-05T12:53:50.240000
|
||||
CVE-2024-32975,0,1,b8d510deb81fb6dc7a6c3281ce9f4d98629d56c8eeeaa8151ecbbf0119506455,2024-06-05T12:53:50.240000
|
||||
CVE-2024-32976,0,1,47cb1485a23e7407952bbc4d345712b78c63e965b92389753335389fc34ab3f5,2024-06-05T12:53:50.240000
|
||||
CVE-2024-32977,0,0,0fe4b56f20a37baa6e6e483a47c7afc89bc0a54a6fef05fea67ddd1983a8007b,2024-05-14T19:17:55.627000
|
||||
CVE-2024-32978,0,0,e90314d84ee19a910681cfee4518d999a937d25285c7a155e2e4880e35c0d5c6,2024-05-28T16:15:15.833000
|
||||
CVE-2024-32979,0,0,415a3504af4253fb9330760c79feca97e4169fdf22dd7f9c2c9ff0e4f9c129df,2024-05-01T13:01:51.263000
|
||||
@ -250306,7 +250307,7 @@ CVE-2024-34049,0,0,659b6c20c375fc6a98cdfe826f7b991bd781b69ca08f703cc4572e5c76f88
|
||||
CVE-2024-3405,0,0,168ec7f9b410ce208cd59ad1ea840c83def6fd83f8512f3bb62051f5ec3a0bc0,2024-05-15T16:40:19.330000
|
||||
CVE-2024-34050,0,0,12266ec53b888a39d080cf759ea4efcf86e297f4b6422a5e48e41cdfdabd201f,2024-04-30T13:11:16.690000
|
||||
CVE-2024-34051,0,0,ac84f2fd7dd43d4574139c8cf26e6f74ad2fa41e2254272b15b5513f0e198e55,2024-06-04T16:57:41.057000
|
||||
CVE-2024-34055,0,0,aee4de41f1cb7f9fa70400b8f1c82ab642ff4130d4ff1019fa21c198be543c66,2024-06-05T05:15:49.950000
|
||||
CVE-2024-34055,0,1,342087935d71513f5f819d0b21bd3c15e0dd2d288e95ac6605bba0a0993cf3fa,2024-06-05T12:53:50.240000
|
||||
CVE-2024-34058,0,0,b01ebbb7d1672855b5a5ddd33803983b1ef9d5ac78935e236c37fd3e1a1986a6,2024-05-17T18:35:35.070000
|
||||
CVE-2024-3406,0,0,b05755db76fca4314b8e99a4179a31010371036c16427145226d1ec275309899,2024-05-15T16:40:19.330000
|
||||
CVE-2024-34060,0,0,3a924f7009b7e35c5ed89c1ddd4a1ea338a526dc659a3f0f832e02177cf8d5cd,2024-05-24T01:15:30.977000
|
||||
@ -250451,9 +250452,9 @@ CVE-2024-34358,0,0,751426ef9b4fc5b6aeba977e724e328b4dec3348b5998df62c4ac89704576
|
||||
CVE-2024-34359,0,0,8124540499a05b0ae56417d92c95f2c1092a142d066f0a2c88754c29bb36d6af,2024-05-14T16:12:23.490000
|
||||
CVE-2024-3436,0,0,47938f028efbd5a916031b117de2f518314782f5c4fcf16b7aa7adbb5fd17b59,2024-05-17T02:39:56.003000
|
||||
CVE-2024-34360,0,0,0ad44819f037cf6808a009e3ee50b0cc9c0e6bc33d51dc0f0dc5cede981b49a2,2024-05-14T16:12:23.490000
|
||||
CVE-2024-34362,0,0,a671d1110600846d93720abb0b0f26a840616d3d3aa7b20f4b27e66a290a0918,2024-06-04T21:15:34.530000
|
||||
CVE-2024-34363,0,0,23561a1d91256cd46825628f705a848f9b85ba9860a39973a4cd63f760bb5d46,2024-06-04T21:15:34.743000
|
||||
CVE-2024-34364,0,0,bd4f31256d23f88e3db282180f131f7f2f9d5e66e6e030f13c6e0cb107a7c7e9,2024-06-04T21:15:34.977000
|
||||
CVE-2024-34362,0,1,a622a95f42218f48cbaa30200450d16a576f9e7dd167f42bb4dc42f6640e4856,2024-06-05T12:53:50.240000
|
||||
CVE-2024-34363,0,1,1325b7f8773b24ddbad375c376b6f13584c4864b620e0f716c4ca10be26331a7,2024-06-05T12:53:50.240000
|
||||
CVE-2024-34364,0,1,61fd1fc323f593af780f23e892ce5d5b82312f8382f20af2e4a09e321380a729,2024-06-05T12:53:50.240000
|
||||
CVE-2024-34365,0,0,5ea21b7ba6cf132bd3860c49a8b2b4e7638ff5639773e60a184934a13fa21e75,2024-05-17T02:39:33.460000
|
||||
CVE-2024-34366,0,0,25eb851eb2f231dff6589bef7d2a42ccb066a9937b2c8dd9550db97a42376bab,2024-05-06T19:53:38.797000
|
||||
CVE-2024-34367,0,0,71d4be6198e4635d1e3c7d4a37f4152439ba7ccd61f31e7e76f4c81875c262d4,2024-05-06T19:53:38.797000
|
||||
@ -250627,6 +250628,7 @@ CVE-2024-3464,0,0,e1a6a35891c3c38cf23929aa88b7dd55b7b7561b2b012478c752dccfb02717
|
||||
CVE-2024-3465,0,0,cc7142bc1559aee30fd4240971422ac4fbc49f323b8e88820a6b582cede6d695,2024-05-17T02:39:57.623000
|
||||
CVE-2024-3466,0,0,f437d504c2a4423db5fc4e7046f91c0c20332b67987c55770e18cacdf9497a6d,2024-05-17T02:39:57.717000
|
||||
CVE-2024-34687,0,0,4ff76c42affc0861ee718b9e208e6eefdbf0a3ab639bfa3166f3943bc94075ba,2024-05-14T19:17:55.627000
|
||||
CVE-2024-3469,1,1,34074f235b8e0115e4ea41ac7557fdaa2d21b81d3a703439a694c69f2ba03a04,2024-06-05T13:15:12.707000
|
||||
CVE-2024-34695,0,0,d5ed5d99c8f0d08b73ea3cb249327295e787f14594542dd2f27279ab9312830c,2024-05-14T16:12:23.490000
|
||||
CVE-2024-34697,0,0,95295a45851b4a50f600527e364638272a5d24a08a1ec02edb19abea712755b2,2024-05-14T16:12:23.490000
|
||||
CVE-2024-34698,0,0,10e59d69dc4df1155204551f8483405755bab4be109bdea52b3a75e369d53b1b,2024-05-14T16:12:23.490000
|
||||
@ -250657,7 +250659,7 @@ CVE-2024-34754,0,0,42e489b57bc9b4b6e4e4645a963b026cad3c386a1eedd7cee43baeec78600
|
||||
CVE-2024-34755,0,0,d9d093e244bdb9881814a581fcf0cceddc50257ae74dd4a27a2c1f59b6cdc217,2024-05-17T18:35:35.070000
|
||||
CVE-2024-34756,0,0,c1f51cb5304487e29b0a4c8a67e9d115a4f2b56ac322e60a8774a285c457e7c0,2024-05-17T18:35:35.070000
|
||||
CVE-2024-34757,0,0,57042a3bb13f31e69b5b7fd23a19541f4fa2fb8db07ba9037fc775417523a9d1,2024-05-17T18:36:05.263000
|
||||
CVE-2024-34759,0,0,5bc57f5b8698c46b4243742b0d02fa7b4c8610abfc92adca6213733babb7f5ce,2024-06-04T19:20:03.167000
|
||||
CVE-2024-34759,0,1,1e0e2c67aeb37ee2fee8b44ea3cd39e479d17142c7e3b68f34ae10189749e56f,2024-06-05T12:53:50.240000
|
||||
CVE-2024-3476,0,0,8d55e08f53225fd62245e2332fbccfcb740f72480e60e1d515618aab26b24582,2024-05-02T13:27:25.103000
|
||||
CVE-2024-34760,0,0,82a83a3179457fac7a33034fd056c2efc13c1726662f893ecd6b003877ae591a,2024-05-17T18:36:31.297000
|
||||
CVE-2024-34764,0,0,4a062b2d355bca216e61eea89a3143fd70d17f9d23f9dff7fe6c4cca332731a1,2024-06-03T14:46:24.250000
|
||||
@ -251009,8 +251011,8 @@ CVE-2024-35664,0,0,d9077a10aee16c0d73af2c31947db772b761933145f3866cdad9f714ba27a
|
||||
CVE-2024-35666,0,0,0a35f63aee3d8970cb6e541355b0ee018ccf4fa1bf3c0f83572775af3f920589,2024-06-04T16:57:41.053000
|
||||
CVE-2024-35668,0,0,f884a8d3032db5562ec77e71fb33089cf547931af3f7c4fb09ab7f1cf8d360a8,2024-06-04T16:57:41.053000
|
||||
CVE-2024-3567,0,0,20839fe5058050b88e3eab46e96c3f4983a4ed5d3b8a31d734ec6d77ca524853,2024-04-10T19:49:51.183000
|
||||
CVE-2024-35670,0,0,c1029bee3f3374243941a66378a51419ba0a7dfcd0dc8884ebe900700c0124a7,2024-06-04T19:20:08.777000
|
||||
CVE-2024-35672,0,0,ad812ce5fecce6041d56c76924522d1026f4a485431a8b29acac685bc5d1e9a3,2024-06-04T19:20:08.967000
|
||||
CVE-2024-35670,0,1,73750f9851edcb4e69a614add6516a80303684a17d124f9c4de5d312adb907f3,2024-06-05T12:53:50.240000
|
||||
CVE-2024-35672,0,1,55d6b261119374cd3faa4eaa39d96a050af2ec6d719a35d44d5d1508f743f033,2024-06-05T12:53:50.240000
|
||||
CVE-2024-3568,0,0,573133d2a7191a46b0975280ef7162f7787321191e0ad33f2c4c70c7e8d9c3f5,2024-04-10T19:49:51.183000
|
||||
CVE-2024-3569,0,0,1713859ca5226d02b2325e4195882c2c405d5fa4ce56952eae5e58bc3dad6bde,2024-04-10T19:49:51.183000
|
||||
CVE-2024-3570,0,0,df44050a6262c2969e286478660750960763247b24187b06070fe7dd6b9e3002,2024-04-10T19:49:51.183000
|
||||
@ -251324,7 +251326,7 @@ CVE-2024-36118,0,0,33d8fbf029e8489b5c9f0a8940761bdd6087754b4000c59931582a52c8a89
|
||||
CVE-2024-36119,0,0,df322ac6443fcc8a013c93b7e5a35f3678792028e0c0bb1f44fa863251664f98,2024-05-31T13:01:46.727000
|
||||
CVE-2024-3612,0,0,d6528427cbb589467c111cbd40a18dd09640d3302d8baf887860f351407e958e,2024-05-17T02:40:01.520000
|
||||
CVE-2024-36120,0,0,12c175c12bdeb4293d9514b1beb0f27c807f78064a3798691100bae1fd82d8c0,2024-05-31T19:14:47.793000
|
||||
CVE-2024-36121,0,0,67c2958b0f9072d4460a1a75e60866a0ed410fe7a00bb9225f51af5d5f26691e,2024-06-04T22:15:10.490000
|
||||
CVE-2024-36121,0,1,92aabcbda4cf79eaa6d614c16fb9e5f82999ee36262fd6d62e15215450a76c8a,2024-06-05T12:53:50.240000
|
||||
CVE-2024-36123,0,0,cf850cc9d9baa3221d632583c4ffa7e41c6f0a00f79ee46cdb95d9dd23563e4f,2024-06-03T19:23:17.807000
|
||||
CVE-2024-36124,0,0,8957b645faef2eaa32b5248d8ccada6df58d8f1b93548954f7e7f9498df53590,2024-06-03T19:23:17.807000
|
||||
CVE-2024-36127,0,0,1861d6cbc85f6c0cea91586022e6f94d8ab5dbffdf653d93e569c051e5a17664,2024-06-03T19:23:17.807000
|
||||
@ -251406,16 +251408,16 @@ CVE-2024-36569,0,0,6cb2ef882f018dab4ea69f61d1bc370bfefe1380a18e6327825251eff3623
|
||||
CVE-2024-3657,0,0,b3ddc632f51ff9b9080079d8b3c5a6b7a01651c0414e2741d5c53ebe23c9db3e,2024-05-28T14:59:09.827000
|
||||
CVE-2024-3658,0,0,788a6c57a5cc1d17a8f73184ec3f2bfe6dae89c54b4197447e7e87a36bebe3cf,2024-05-28T15:15:09.703000
|
||||
CVE-2024-3660,0,0,27de83d41a96740d974951cfc0f4ab32e626a768053ae4e7908802eefe823936,2024-04-17T12:48:31.863000
|
||||
CVE-2024-36604,0,0,dea62cb72ef9b04874b771705eadbe14ea319341544d1d10de7fdbc3eab6dfdd,2024-06-04T19:20:13.927000
|
||||
CVE-2024-36604,0,1,86751bb907fe31b74fa6ad1dda78c84c64307accf48d9c0da02d75bef12336e6,2024-06-05T12:53:50.240000
|
||||
CVE-2024-3661,0,0,b665f3ebe2f700b6f4e02ebfa9bd2f64cd39c43e37b9374c2fdfbf4a8d208373,2024-05-08T22:15:49.103000
|
||||
CVE-2024-3662,0,0,aac492e0cb08799a7f888c46af5bedb595fa2e9ad6dc15c21be50e9dae70066e,2024-04-15T13:15:31.997000
|
||||
CVE-2024-3663,0,0,d70e03397b7b1ab439d27e0f0ba070e0cb9801b42863e8c396c4da4f0822fd7c,2024-05-22T12:46:53.887000
|
||||
CVE-2024-3664,0,0,afb9452532a9b46276f3e123567931f2d9b14afd62c66b887c9d751f65c725bc,2024-04-23T12:52:09.397000
|
||||
CVE-2024-3665,0,0,22dbbd6c0bec2b9f433688ae97b549cd541e7f2d387c3796dd32246c851476cf,2024-04-23T12:52:09.397000
|
||||
CVE-2024-3666,0,0,07796934f1ac3c83f9027f055a741df04ffd0473d9b06f5fc0b3f20da9ef9091,2024-05-22T12:46:53.887000
|
||||
CVE-2024-3667,0,0,f0f48fea7f3689737f64ee01165bcce60345c4b6a636bea81a0081340d56eed4,2024-06-05T06:15:11.590000
|
||||
CVE-2024-3667,0,1,590dc761d35bdeb78cb60dee51d43d803446d23bf32a862973772b7155719968,2024-06-05T12:53:50.240000
|
||||
CVE-2024-36674,0,0,64a41fc68368d9bae481254f7aef4332736d337353346af2d18107a9908d2826,2024-06-03T19:23:17.807000
|
||||
CVE-2024-36675,0,0,8462bd5f50a70efb58434e8885819435358cf52e0610c9d2ea69d850af6c6e27,2024-06-04T22:15:10.740000
|
||||
CVE-2024-36675,0,1,5c3f7593516cde09c4cffe5f588ba2d6bd558d4e765f212515d844554079cc61,2024-06-05T12:53:50.240000
|
||||
CVE-2024-3670,0,0,c82d0130c8edc16344a78447d1514c5ffe18d421cd344e5799606a7730bedf8c,2024-05-02T18:00:37.360000
|
||||
CVE-2024-3671,0,0,d4c07d059b6fad473ffadbf866eab2d0161459cafd3d5843ab40df0df4e33fe1,2024-05-22T12:46:53.887000
|
||||
CVE-2024-3672,0,0,b7de207aaf40bb160711ae23312b83bd4f3d950fbf99cf282ee38b1e3854739f,2024-04-16T13:24:07.103000
|
||||
@ -251438,8 +251440,8 @@ CVE-2024-36843,0,0,dffd8a9db459cea7141db065370811228354e9ed0a00ef7accb6e04cac039
|
||||
CVE-2024-36844,0,0,e97265dff1b9c5c617aea3c1ed095692195c0e84c6f318663f5bdfc9ec429f88,2024-06-03T14:46:24.250000
|
||||
CVE-2024-36845,0,0,4b9d7b96ab3c57fe0fa6236fc4a20ae85e48dc606d8eba3c5478623a05a01e27,2024-06-03T14:46:24.250000
|
||||
CVE-2024-3685,0,0,f921a0a401f8b4f7737f6fde068e597ed9cc1b4c23e79252700a3c350a96640b,2024-05-17T02:40:03.840000
|
||||
CVE-2024-36857,0,0,daa4beb0595b330ebc22ca686d12bffc150ac45702a8ba1fe39d87435f6ef25e,2024-06-04T19:20:14.060000
|
||||
CVE-2024-36858,0,0,5e06cbab0e57d57b1b0428eb6bb20ddccbebb98bf0ae75295ccc7eb1330f3e66,2024-06-04T19:20:14.150000
|
||||
CVE-2024-36857,0,1,b209e6e39ac0114d8cea1fc75780b803d79c02f64a8d7e00b228b4861105088f,2024-06-05T12:53:50.240000
|
||||
CVE-2024-36858,0,1,b6f9496f87fbabab961365d1552694482b152972c55f312d7477cca1b269ab5d,2024-06-05T12:53:50.240000
|
||||
CVE-2024-3686,0,0,48e96862a2931368fc7a73a6d531fce8d2b9c3a327baf97d691f2054e9208b18,2024-05-17T02:40:03.933000
|
||||
CVE-2024-3687,0,0,a3a2ae712cd6c7057b4b6b211557af56d168f80a5b75c666d660903c58451d4c,2024-05-17T02:40:04.027000
|
||||
CVE-2024-3688,0,0,b349be233f486be05eb488359e63176b80bab656f49706a0c8941ace2d96eaa9,2024-06-04T19:20:23.107000
|
||||
@ -251575,7 +251577,7 @@ CVE-2024-3724,0,0,a2f08bb0a2e36a5c374b862fb3e4beff315b3d6672953c5eeabe10290b435e
|
||||
CVE-2024-3725,0,0,dd194c190207038aca40dcc17eaac7bd7c6f9f34e04d00c016e0de6cd9837da0,2024-05-02T18:00:37.360000
|
||||
CVE-2024-3726,0,0,5d13f10d5b73efb7ab7c6448eee56ee5b7f1a739226807fb6eef2a4ab850d2f7,2024-05-30T13:15:41.297000
|
||||
CVE-2024-3727,0,0,6b54e6f77ad932a1228e2f32eb0944c54a5e699b6a62b1576b90d56350efe669,2024-05-14T16:11:39.510000
|
||||
CVE-2024-37273,0,0,6d10a507a60cc5355ccb80c43505dcee4664931072a02f30cdef1fdcfe399984,2024-06-04T19:20:15.363000
|
||||
CVE-2024-37273,0,1,cc7583515d0eb62d310ba3ad1f65e5705e27dce488e0ff3c1156c1a27bddeeb1,2024-06-05T12:53:50.240000
|
||||
CVE-2024-3728,0,0,43844043222c66b8f700e8c46db9fa69a4e80d2868161363811005c77777bc69,2024-05-02T18:00:37.360000
|
||||
CVE-2024-3729,0,0,fe9208be005903b27f9e982914c8adbe6ffd46f8d19d93e705d785ecc61de3fc,2024-05-02T18:00:37.360000
|
||||
CVE-2024-3730,0,0,a30960de1676c855ee35b61976bc4581959cd1a98a7ba3127a461fb7fc955146,2024-04-25T13:18:02.660000
|
||||
@ -251776,7 +251778,7 @@ CVE-2024-3991,0,0,f4b27e31b2ebe06401478accd9d85264142bf207d27ef139c240399354705c
|
||||
CVE-2024-3994,0,0,292539249e741e7003c555a5d4fa2182b15a01b393fb04fa15e675750c01906e,2024-04-25T13:18:02.660000
|
||||
CVE-2024-3997,0,0,507ae8762d75f9d68eda75aa3a6fbbaf1b3579404dfa0ecd9f2978d2aa87a55f,2024-05-24T01:15:30.977000
|
||||
CVE-2024-4000,0,0,63e68b686bb1abbdcd2ddeab613f2e83d1883c904c164f21a1076ada49583fc9,2024-05-02T18:00:37.360000
|
||||
CVE-2024-4001,1,1,9071953b2723811f4b07f2c042722fe15062530530c549c87f08a9602d3febcb,2024-06-05T11:15:08.490000
|
||||
CVE-2024-4001,0,1,9087c824343a197f49253ec388f203b19bc7567114e0cb1c21c7da34a6a10aaf,2024-06-05T12:53:50.240000
|
||||
CVE-2024-4003,0,0,9b9be828f15a04db891b79e7c6ebf75d000360176e249e61f2acbb014741196d,2024-05-02T18:00:37.360000
|
||||
CVE-2024-4006,0,0,cea97555ee62217aaca46943155964ba917aa17a210befae3806ab46c6606005,2024-04-25T17:25:05.903000
|
||||
CVE-2024-4010,0,0,b0efc140530d7080bd135b9c9b54b60a51a2a7dd68cfd5652cea86eef30822c4,2024-05-15T16:40:19.330000
|
||||
@ -251829,11 +251831,11 @@ CVE-2024-4077,0,0,88c9fb35aec8dbee15c3169eb34c083d7cc8d7a290cdea9208a3041187ada8
|
||||
CVE-2024-4078,0,0,f02a6c29d80f944755bef4fcac2904ebf0cf2a727c904e067874e25c2b43b0a2,2024-05-16T13:03:05.353000
|
||||
CVE-2024-4082,0,0,9bcc679f7514b7d071aa621d11dbe3b6578d11cf65d1c2f18fedd0888ce997fc,2024-05-14T16:11:39.510000
|
||||
CVE-2024-4083,0,0,90b3f0c23e53e5107774f39811ea28166caf07e02a51ec5c595625bec75a4f5e,2024-05-02T18:00:37.360000
|
||||
CVE-2024-4084,0,0,cdd0df7919c28f881bd53cf1deb5b03087820977803cb8c9e5d4d4b8259a386f,2024-06-05T00:15:09.840000
|
||||
CVE-2024-4084,0,1,2365eeda4dcbf737d6d6078a4bdd90d6c0312afb173990e5c6287974a14586ac,2024-06-05T12:53:50.240000
|
||||
CVE-2024-4085,0,0,18b49aedef154a5f78284d7ff3699691fe3b4904260085a931cc6d08f4fb7ca8,2024-05-02T18:00:37.360000
|
||||
CVE-2024-4086,0,0,c06eb3f0c2fbe1c42ce58a59441202866280214c07091170b4fb53c94814c994,2024-05-02T18:00:37.360000
|
||||
CVE-2024-4087,0,0,c042d2a1de26e6b1fe0621a6edcac1fb8cab9f866d13a8bc2e77c06eafe2f2ff,2024-06-03T14:46:24.250000
|
||||
CVE-2024-4088,0,0,6d34f566da56f9300211e5c50e40b9bb5af3a3441c80e89d7e45604cb2a100d6,2024-06-05T07:15:45.910000
|
||||
CVE-2024-4088,0,1,fc64773d1c1daa05ab20e72297e067c7b9ce75644cf2c19686947f57b63d0583,2024-06-05T12:53:50.240000
|
||||
CVE-2024-4092,0,0,4be02f9c67d30932bc0929e64c1c04dde83d92e769e6b30b60cbc598e8e37f4c,2024-05-02T18:00:37.360000
|
||||
CVE-2024-4093,0,0,5d27408cc41c323f4b0e69479d9f46468fbd0106e510632bee156499f1d6b2eb,2024-05-17T02:40:15.433000
|
||||
CVE-2024-4097,0,0,6a60177672bc62dbe43e4e7ccd78e74b9159babed54b0d3a303c5a9a6fcd009a,2024-05-02T18:00:37.360000
|
||||
@ -251915,14 +251917,14 @@ CVE-2024-4214,0,0,20486a6e70da9590b0bf48d308272f5e2303dba1772619a1d43b68b5a571b0
|
||||
CVE-2024-4215,0,0,0d7dbfaf8275e9ff6c32259712a00cedd32b92104e92991d7893f67c59faf7d0,2024-05-03T12:50:34.250000
|
||||
CVE-2024-4216,0,0,80b76898bbc4459141293c47297450a985b668060a3a6e72db0d9ef898a4d417,2024-05-03T12:50:34.250000
|
||||
CVE-2024-4218,0,0,68377bf5bc219c5624001bda4aa985e5224f9f419836698a53a69f78bf595508,2024-05-30T13:15:41.297000
|
||||
CVE-2024-4219,0,0,f50d519d81ff0845cd24c5126d7eb60f7c06bc2c512abee9a71c70bbf03e0299,2024-06-04T21:15:35.277000
|
||||
CVE-2024-4220,0,0,3401035d05ac06c473d428258c007edd5ae96a2068f45091dc19dbe4525f71df,2024-06-04T21:15:35.530000
|
||||
CVE-2024-4219,0,1,12af38ff857465e946ec260ad752ffb6aa608e7743d4abb67825d44b545b28c6,2024-06-05T12:53:50.240000
|
||||
CVE-2024-4220,0,1,ad135a3dbd8a94fabb5089f041c2a3d1777503eb6162c9d7f3e2f7d3bf707307,2024-06-05T12:53:50.240000
|
||||
CVE-2024-4222,0,0,baaf2be5207361c5cdba494834d7fd0e14922c0bb0c21401ff4dac917c12e3a7,2024-05-16T13:03:05.353000
|
||||
CVE-2024-4223,0,0,7874da25b7633a9d0c04e6bbae5b506aa967cf75a9b041fe171571206fd80286,2024-05-16T13:03:05.353000
|
||||
CVE-2024-4225,0,0,ac71ef092dab43c080586d967efe31f36fc3673c6a3103eaf0a29ff9fdbbfa8b,2024-04-30T13:11:16.690000
|
||||
CVE-2024-4226,0,0,71c8bf7eb5a4d3d3ec7c43ac428cd4d409488f8f04217410fc871554bd101d4e,2024-04-30T13:11:16.690000
|
||||
CVE-2024-4231,0,0,0b3b0e96857637547377d6b0180f3ecedf8b25db6c9274215a399187375dacbf,2024-05-14T16:11:39.510000
|
||||
CVE-2024-4232,0,0,49500799a473793a052eba8408d726bad83ab7a4500afac34efac4f69c266da0,2024-05-14T16:11:39.510000
|
||||
CVE-2024-4231,0,1,b748cd0cba9f8ca987fa54497bf4f5e243fe33136b361691cb77cf6b95c81bb2,2024-06-05T13:15:12.980000
|
||||
CVE-2024-4232,0,1,29a7149387c890d6a0d05202995edf38065cf1e9ded36e8c20e5c1fd1dd38377,2024-06-05T13:15:13.190000
|
||||
CVE-2024-4233,0,0,ca4371c9e0f8794352ea7e9d8d1d33962fb848d5646d81ea1b681c81b408ae84,2024-05-08T17:05:24.083000
|
||||
CVE-2024-4234,0,0,007b9b5f266bd1a230094439603af6b2584a9759013139ef15c8a83c147fb7e2,2024-04-26T15:32:22.523000
|
||||
CVE-2024-4235,0,0,e5a2e61878721e122ae422f5b9bcfdc813963b072f29be0ed433dc9fbd200f5c,2024-06-04T19:20:32.857000
|
||||
@ -251971,7 +251973,7 @@ CVE-2024-4291,0,0,6fb6b0e83a49b64a5565b2ca5f6437971dbeea9c5ab39460fc142df5bce327
|
||||
CVE-2024-4292,0,0,f51ff84855f02b0bc4dd3e03d8351463229984e5d3c218f3331913e1b68e232f,2024-06-04T19:20:35.097000
|
||||
CVE-2024-4293,0,0,631458ecd34e0e099a1efde23f32eb7981cbcf3111570b5f9cad2a4f0ec45cb7,2024-06-04T19:20:35.203000
|
||||
CVE-2024-4294,0,0,97bd940eeda24c94b1982f85ff25718412e73b2bf939766f3f03c261351a8304,2024-06-04T19:20:35.300000
|
||||
CVE-2024-4295,0,0,335930b49eb96e27b3d3c521fd8430c91e27a43abd039593bac00db44fbaf6da,2024-06-05T06:15:12.007000
|
||||
CVE-2024-4295,0,1,5f5c77a664491012c7ab525ce855e50f63ef338faa130e20b060eb5c339a2bcc,2024-06-05T12:53:50.240000
|
||||
CVE-2024-4296,0,0,7c8632bf90851b299a9885e1b23a1d23a32667f17280ec361546d21dc35de10e,2024-04-29T12:42:03.667000
|
||||
CVE-2024-4297,0,0,92dc96fdab7f356cdc83f7d1d85286a03b04dbf93d10ca9e6efacd8b516bbae3,2024-04-29T12:42:03.667000
|
||||
CVE-2024-4298,0,0,c30353f487462f14da90ba9761a3d280aecbb2b2af7a8a57b196c96d31910116,2024-04-29T12:42:03.667000
|
||||
@ -252129,7 +252131,7 @@ CVE-2024-4516,0,0,10626e52c529e42a5320a520a08a85d986e2a25ffb5a3e13bfb1d264371f0f
|
||||
CVE-2024-4517,0,0,dd846e367e5abb1933c37dd12b6595595141f802700f41ef0de89e37c9e7b10e,2024-06-04T19:20:41.030000
|
||||
CVE-2024-4518,0,0,138810b344c2405de3b9eb6d39d2c472e619d29fa4332ad55091f5791e860c53,2024-05-17T02:40:27.187000
|
||||
CVE-2024-4519,0,0,d907f2478d280b71f30ae8f544e468b0b92be8875bfbb966894eaebcf188a9c6,2024-06-04T19:20:41.127000
|
||||
CVE-2024-4520,0,0,b0107e9d4197a7e937447c999209a5ce5d249cbe864eeb89555c3387d7f76c59,2024-06-04T20:15:11.690000
|
||||
CVE-2024-4520,0,1,f8ed95d17022804f171b1a246342d9748a877c6a10d9fcc9734420aa2c19f8b2,2024-06-05T12:53:50.240000
|
||||
CVE-2024-4521,0,0,d6cc5857fdfd7e080f861e131d288df35df975f65e1f792c47f6b677cf458c6d,2024-06-04T19:20:41.223000
|
||||
CVE-2024-4522,0,0,404121efa69a85bb1b7c4e2c43fef3f42a34d444ccf6b6b833a5214d4ac8192e,2024-06-04T19:20:41.320000
|
||||
CVE-2024-4523,0,0,5723f30cb658cebf65e64dbb3502a21e055ee9a286cd39f3273d6981e4a848c1,2024-06-04T19:20:41.420000
|
||||
@ -252284,7 +252286,7 @@ CVE-2024-4735,0,0,525831e83b784b99ed7ef48881d0a232b57485de376b3c68786c9225fdef83
|
||||
CVE-2024-4736,0,0,35e0fe51ccd6e16c666173722ffd72f471827cead112caeaf869dd95515427ec,2024-06-04T19:20:48.497000
|
||||
CVE-2024-4737,0,0,0d605ad76fcca9d9a8748ea1570213b2a20be8e7af59e1490aa0de37640ee426,2024-06-04T19:20:48.597000
|
||||
CVE-2024-4738,0,0,703597dd680fa7def2747a141a4237503bd7e8917e070a49546a7e715e951f69,2024-06-04T19:20:48.783000
|
||||
CVE-2024-4743,0,0,2f310e54344c8bede825f6134503d16f7553328fdad57e9a28f8c9b627c012e0,2024-06-05T09:15:10.030000
|
||||
CVE-2024-4743,0,1,ca5ac146013ec9c5ade9488d4cfcf6d89cbed0fe780989436eef36b2f305727d,2024-06-05T12:53:50.240000
|
||||
CVE-2024-4747,0,0,99152f6494a1192f3bae59b436abcc51d11f811ed1e0a72c2e65c8381fda6054,2024-05-14T16:11:39.510000
|
||||
CVE-2024-4749,0,0,676e331864bc41907c4c80c44886e7dac480ef6dea2c29bc22838d992753d4da,2024-06-04T16:57:41.053000
|
||||
CVE-2024-4750,0,0,423585a3e250903ac62d761ecb0e0e6dc6b4649ccd4411b90275a4e6d2f87495,2024-06-04T16:57:41.053000
|
||||
@ -252337,7 +252339,7 @@ CVE-2024-4817,0,0,25f671d255c133539a14922245d93cb8e9f73263de30634add3e11638c71ff
|
||||
CVE-2024-4818,0,0,b4281c0fc833ff67f25a4dec3c5716911b53a31935e38b0310baa3a499b478f8,2024-06-04T19:20:51.510000
|
||||
CVE-2024-4819,0,0,e38245aea9a32f985ed2dae01aba40bf33a21f00080c8d20286bf8b00a9f57bf,2024-06-04T19:20:51.613000
|
||||
CVE-2024-4820,0,0,402d6f18855ed225f564a1aa077cdcb508a467147f3c0e0905e2eb4030f9a1a9,2024-06-04T19:20:51.710000
|
||||
CVE-2024-4821,0,0,57645af1e5819381d8d6a88aa08a0e4143555dc738e4f7883f2511b7271f62b0,2024-06-05T09:15:10.260000
|
||||
CVE-2024-4821,0,1,4981f09cf0383706f9cea79fb9e9301470b91511f4b8dd53fd27a692ee8c14ba,2024-06-05T12:53:50.240000
|
||||
CVE-2024-4822,0,0,2afc6a99d0a53e8f4d7991726996560d97ea71ce3c63aa067c8bb04f0c1c8bcf,2024-05-14T16:11:39.510000
|
||||
CVE-2024-4823,0,0,544460ea4efbe18fdd003c94911529fa16ddf77347bca6256c2d97529bd3f076,2024-05-14T16:11:39.510000
|
||||
CVE-2024-4824,0,0,18f5c845247adede0ddca9ae15329e658bfdaa618402437af47bcb2e661d694c,2024-05-14T16:11:39.510000
|
||||
@ -252365,7 +252367,7 @@ CVE-2024-4870,0,0,789ccad79b53f3162faaa4d0c14e00ab550e7e413c46a4332529e5d35d1d04
|
||||
CVE-2024-4871,0,0,089a89f3309c27433f20e3be4ef9a00379f9f19601c1c8029649846113aed43a,2024-05-14T19:17:55.627000
|
||||
CVE-2024-4875,0,0,aa35cb89fee530b58aa987ffc67ea97738c0ba567903bf01429a1a1259923db8,2024-05-21T12:37:59.687000
|
||||
CVE-2024-4876,0,0,02aac8d1be489833aa2e07f8be8ce083249ac7dc2fcc33fd144386b8d365fef2,2024-05-21T12:37:59.687000
|
||||
CVE-2024-4886,0,0,9c9fb2520bf49e6dda512ddac94c860619ccafb0b5624e485434ec420368c9b8,2024-06-05T06:15:12.443000
|
||||
CVE-2024-4886,0,1,85721324d8c885a233247da6b42e2a33cd86be9ab4caebe3f5bcde7804348df2,2024-06-05T12:53:50.240000
|
||||
CVE-2024-4891,0,0,10c2ed4e0db3df7fca9d6075befed08f57db6578dbf3546fd28a3b8b6a103a31,2024-05-20T13:00:34.807000
|
||||
CVE-2024-4893,0,0,d5ebc2dfcb13b74b4f1951a124d2e638a95f79aa05d19e6fadfe65b7ad1c4f46,2024-05-15T16:40:19.330000
|
||||
CVE-2024-4894,0,0,d68130303d356c053d0f6768d0ee08506e206d16216142c952b9b56af8835d24,2024-05-15T16:40:19.330000
|
||||
@ -252401,7 +252403,7 @@ CVE-2024-4930,0,0,6ff76d7aaffb879ad1ba04c82aee4d6862810bf82c41e96981364c74ee8131
|
||||
CVE-2024-4931,0,0,83efd803f055d34e0373b998807732a66d1be28ff93405fe1ae45ba9ee6af2a3,2024-06-04T19:20:54.543000
|
||||
CVE-2024-4932,0,0,2da4bffdf4d6e38ae009aae9065c7b2f8049c53fc8beaf73dfbb4354175c5b68,2024-05-17T02:40:43.357000
|
||||
CVE-2024-4933,0,0,9fe90c4f8856bf6bdad48e78d639ea10366bef215c1d0d507cc52649860ab1b1,2024-06-04T19:20:54.643000
|
||||
CVE-2024-4939,0,0,0f5da7c4f78ee1d4cfa142a2e38ccef8b824d364bf9fcc429715affa649dbe71,2024-06-05T08:15:09.787000
|
||||
CVE-2024-4939,0,1,9b3d9056d0ef1d9ece33bf387a55f6ff5207b427eb3d8aa6eb326ad7a1f5fa3f,2024-06-05T12:53:50.240000
|
||||
CVE-2024-4943,0,0,d9b88319a5992961df806c2aff168607709c5e19495e72269f7fd7790830e1d9,2024-05-21T12:37:59.687000
|
||||
CVE-2024-4945,0,0,862ec6002e9c3369e40f6935606e597aac95fb1ef3a2f5a2c72d02ef723dafd2,2024-06-04T19:20:54.767000
|
||||
CVE-2024-4946,0,0,de881559bc92412238785deff68c564cad0647963d61d3efd064c0cec6c4ee1e,2024-06-04T19:20:54.867000
|
||||
@ -252438,7 +252440,7 @@ CVE-2024-4997,0,0,381fe62c0cd224246ea5324bab3cef489202298d3bb7b0d185aa70d1dc0d5b
|
||||
CVE-2024-4998,0,0,e12f9512d41da053bcfd5626dd0ee21afd4da3e61146c4f0c8f9da42ca3dff98,2024-05-17T16:15:08.160000
|
||||
CVE-2024-4999,0,0,1bac5cc77e7ceb1bce6c078fbd59e76f5556984ef2124d365e8638bfa6b6fdfa,2024-05-16T15:44:44.683000
|
||||
CVE-2024-5000,0,0,21f44bae275ca5e7f3a45da963612f2fb705c74e44c15e2681f54ff4506e6afb,2024-06-04T16:57:41.053000
|
||||
CVE-2024-5006,0,0,971ce3dd34f2161629a353f7a3094cac2074b284283e2226864e8f278e6d9956,2024-06-05T08:15:09.983000
|
||||
CVE-2024-5006,0,1,dd22c8e58768fd94bd48e3be3a4dc52cd3210392642ba6489895072643348644,2024-06-05T12:53:50.240000
|
||||
CVE-2024-5022,0,0,106355f86b530d1586a5d339031de27a1a2312467a76eb449e8e9901150235d8,2024-05-20T13:00:34.807000
|
||||
CVE-2024-5023,0,0,974704283893df4cc9d8e0bcce8bb65ebf635268235f75f47c922033893214ce,2024-05-17T18:36:31.297000
|
||||
CVE-2024-5025,0,0,d287dc9bcba0fba1784ec3f3fe4bf65eea235ed5e6f91d741018beb442d992d7,2024-05-22T12:46:53.887000
|
||||
@ -252512,7 +252514,7 @@ CVE-2024-5143,0,0,85d2302aa16b15f892bf139ed2f510515c9c051290de1dbf060be25f391906
|
||||
CVE-2024-5144,0,0,3682eb32ab74a69dce2a20f55af124165ad49665bd2dae692d6703bd4728c599,2024-05-31T18:15:13.217000
|
||||
CVE-2024-5145,0,0,0acb7691362a1bc72a9e4e71d498873a314e4674d3384b4bf3903540c5103a68,2024-06-04T19:21:01.520000
|
||||
CVE-2024-5147,0,0,f4d57cc5a9319b417b98271562a6c18c09e411a2e24f5685a34653839c587f1d,2024-05-22T12:46:53.887000
|
||||
CVE-2024-5149,0,0,667ac8a93169fd4de23187d8b450c0dcf309b4fa3f5ee5c69a5251e6adc0dcd2,2024-06-05T05:15:50.260000
|
||||
CVE-2024-5149,0,1,364802fa270d017fba6f416e3117d6dca3ad93a3eb767f3194b95ff1f96ff814,2024-06-05T12:53:50.240000
|
||||
CVE-2024-5150,0,0,b6666c6d6ac9830dd3015f5fc02fd79f0a3b63d41ee2e14f8cd76da933186cb1,2024-05-29T13:02:09.280000
|
||||
CVE-2024-5157,0,0,d1a998bf0d4dfb4fd055882979d4054df97060c8814d4ddde025533b9446aec3,2024-05-22T18:59:20.240000
|
||||
CVE-2024-5158,0,0,977b7b5952131680dd428eb1410f2d0eff9e1337c54f1532a6f9419cdea73d4c,2024-05-22T18:59:20.240000
|
||||
@ -252538,7 +252540,7 @@ CVE-2024-5207,0,0,837facf8fac5843bbf7aea1ce36fa00287f1ba077f8fbca1302b0ab4087ec5
|
||||
CVE-2024-5214,0,0,77a86526714522a20940695733fe46b4562089752d3c663cf289b583b7c6bbda,2024-06-03T19:15:09.360000
|
||||
CVE-2024-5218,0,0,928b5f8d4e08afc285c0cf6e370373ec87899b716b1cb4db68027907b01d2a82,2024-05-28T12:39:42.673000
|
||||
CVE-2024-5220,0,0,f61a4e43424028e9a9336f6f6ed766295c86a8a5421f6ff87daa2be13ac80d02,2024-05-28T12:39:42.673000
|
||||
CVE-2024-5222,0,0,85215479f7f09036f0035b7eca417d01a8a5da55290907af67715ef68160560a,2024-06-05T07:15:46.127000
|
||||
CVE-2024-5222,0,1,e769bb480236b36cbba7fdebb79adf1189e90d39aec093b6e4e34002be122181,2024-06-05T12:53:50.240000
|
||||
CVE-2024-5223,0,0,8366f6c6b4592ec30854ea2204a3ebdc0b5f6592483a6a57d3251ddc4233fcd1,2024-05-30T13:15:41.297000
|
||||
CVE-2024-5227,0,0,9d34b575e4c4193bf3b7e2c70f772c52e473e90eee580d6cd20ca38df9886e09,2024-05-24T01:15:30.977000
|
||||
CVE-2024-5228,0,0,0a0ae3d586a473bc70cb0721078887f2918e42e82919d39880ecf7432c31100c,2024-05-24T01:15:30.977000
|
||||
@ -252562,7 +252564,7 @@ CVE-2024-5245,0,0,885af784a1c7b3c68788b03806b782abc316cb75da65e88871ee466ba1a204
|
||||
CVE-2024-5246,0,0,a3caa78128bac4a72615dccb481ff335052f3377ab67fd694d7f5fc053234984,2024-05-24T01:15:30.977000
|
||||
CVE-2024-5247,0,0,1e269e58ef46756e33578f4c5df34dcec3de646d04312bef41a8353e3fc1fce7,2024-05-24T01:15:30.977000
|
||||
CVE-2024-5258,0,0,44dc29bb0ed4f47fbd56a17c4d4592048fc8f73fd8d93b1b1d7d82e5e8477ede,2024-05-24T01:15:30.977000
|
||||
CVE-2024-5262,0,0,6246030f7551fff17f58cbe3c24340f5191be8d5f89fb664a054776b6c10b1ac,2024-06-05T04:15:11.807000
|
||||
CVE-2024-5262,0,1,d3d11be98b1db30aa602921aa94b60a718be9a0bc4ccd1e4ef634546f525f9dd,2024-06-05T12:53:50.240000
|
||||
CVE-2024-5264,0,0,8231398a0715961af60c236587d7e9f037c5bc092ccd3f5680c73ce92c6726b7,2024-05-24T01:15:30.977000
|
||||
CVE-2024-5270,0,0,e200d6ed6ebdb84a917f949dcb40f0d98c76339d55f3b191cf4ff77238c630ff,2024-05-28T12:39:28.377000
|
||||
CVE-2024-5271,0,0,d3f4377983bdb14b36061f7826a2769c4b74dac3ab0fd218e99cb4bdcc673a12,2024-05-31T13:01:46.727000
|
||||
@ -252584,7 +252586,7 @@ CVE-2024-5311,0,0,254582b6f9bf67f7974ecb2d947c8ea8261db1fbcce62f651ad1dbc864d7bc
|
||||
CVE-2024-5312,0,0,3a9d8301087c1d7edb8976207e286d0d247ebf6ccf4b5edb4137e81b02e5ec2b,2024-05-24T13:03:05.093000
|
||||
CVE-2024-5314,0,0,fb6304ffb5d50ce8724d643a46fad25ba80695f7c0c0eb4ec33a07d41bc4980a,2024-05-24T13:03:05.093000
|
||||
CVE-2024-5315,0,0,e1b0baaf93d62cf125eea53091da57c404cdf61d625ae810529ebef84e73357d,2024-05-24T13:03:05.093000
|
||||
CVE-2024-5317,0,0,f1fa6ba8aaa2a89d1570b4f611a0322abd09601428c027c481c7e3f9fe671a30,2024-06-05T02:15:10.163000
|
||||
CVE-2024-5317,0,1,0e4df649aa2081733cc8377041229cfce850d909b63f156a77d02d6d4c5141bb,2024-06-05T12:53:50.240000
|
||||
CVE-2024-5318,0,0,812431b83287688611dc496217ea25ba5560744235da04dca7a35239cac1fe9a,2024-05-24T18:09:20.027000
|
||||
CVE-2024-5326,0,0,9beaa1147d54b3ae536a6eb0023672ae377946ef8aec317bd58c5324df5850c7,2024-05-30T13:15:41.297000
|
||||
CVE-2024-5327,0,0,84b1605ed9f8fbbcd152a70275bed021ec8172a393ec025e57c9733c6898763a,2024-05-30T13:15:41.297000
|
||||
@ -252666,10 +252668,11 @@ CVE-2024-5433,0,0,d0946774ada383b4af0e78f23b9c449d05f83a7124810af4e383f90b0cdbda
|
||||
CVE-2024-5434,0,0,dc2716eb218edba725ac85c17a2930de7a00b6563d0ca53040574106ea0b92ed,2024-05-29T13:02:09.280000
|
||||
CVE-2024-5436,0,0,95eba267f429de080e9b35fcd14e1e1840b0308e404c32773ec35c18106c7cbc,2024-05-31T13:01:46.727000
|
||||
CVE-2024-5437,0,0,551b020f0044e3ab584c14f08f0984900b4bc26534c92382eb6ac2bb660708ea,2024-06-04T19:21:09.363000
|
||||
CVE-2024-5439,0,0,5cb5743566262a7db1dbc065eea81546f2260b27c4c57998688474e77a737137,2024-06-05T08:15:10.210000
|
||||
CVE-2024-5453,0,0,2febbf1e341d103770d5518ca487e5210a458c994aa4096fa101457d87279f05,2024-06-05T08:15:10.410000
|
||||
CVE-2024-5439,0,1,abaad0f03a42ef683e08fa0b9e3df38062d4c8e86744ed6e348d5f6378ac054e,2024-06-05T12:53:50.240000
|
||||
CVE-2024-5453,0,1,7c8641ed8daae70878106ab21b3cb2696b56b68c7012b2cceeb0fd9522a96b5d,2024-06-05T12:53:50.240000
|
||||
CVE-2024-5459,1,1,a6cce27e4bb0299dd2bb46d9d34dbfafbced52cf1ffe0ede9ae8efb94d391c96,2024-06-05T13:15:13.437000
|
||||
CVE-2024-5463,0,0,a83ead02d534db419d64d9a246adc999062f3a690f2d2cbba14bffeb9debf0f5,2024-06-04T16:57:41.053000
|
||||
CVE-2024-5483,0,0,5529c97278d3f25108282683906a92383dd2ca1a9ba0be070cd04ea84d856791,2024-06-05T03:15:08.810000
|
||||
CVE-2024-5483,0,1,88635ac2041f9699472eef4c51a5eb67a3fcf4378dec7f1a98452fd31b9eaa6a,2024-06-05T12:53:50.240000
|
||||
CVE-2024-5484,0,0,7de35f8eee9232651ed147ec3168f6740617b1737ec3ff6913988b98b84f6ef1,2024-05-31T11:15:09.783000
|
||||
CVE-2024-5485,0,0,dca0cc3d797ec50003ec75de23195400e6c002137c330b8a6fe7501d852f23b7,2024-06-04T16:57:41.053000
|
||||
CVE-2024-5493,0,0,8180f9c7c83a7ebab82ac7c00536ed64f553bc96cb8ba2cddb06ad7e2d969883,2024-05-31T13:01:46.727000
|
||||
@ -252691,15 +252694,16 @@ CVE-2024-5521,0,0,ccb2ba49d7e4be9859a81cd0c950d08f47c4a44700fa46f5775af6da3418ab
|
||||
CVE-2024-5523,0,0,489908bda9015339aace57c4216da7f1ba8be0b6b24c245bc618ef3d6f503a51,2024-05-31T13:01:46.727000
|
||||
CVE-2024-5524,0,0,cae078246cb68e9db21efee85fd3858e79fb1203c0e063487740b9c1df1ad7c9,2024-05-31T13:01:46.727000
|
||||
CVE-2024-5525,0,0,e6c5a1ee43ca8e6712f567b8cfbba1abaf5011df1fe231dde327e809aed6654f,2024-05-31T13:01:46.727000
|
||||
CVE-2024-5536,1,1,e8d5369143d6c678027a8a32c4a9ead004061846b3c22379360541cf2f881ff0,2024-06-05T10:15:09.170000
|
||||
CVE-2024-5526,1,1,ff5b1387d351b0ba676942fad975bab52e39b4bce1932efe40f06f69ab4492f7,2024-06-05T12:53:50.240000
|
||||
CVE-2024-5536,0,1,68edb52432771856b464d791aa7fccb8518cf1ab9cd2d253ae0bbced65da7ce5,2024-06-05T12:53:50.240000
|
||||
CVE-2024-5537,0,0,071475eb8c0f92cc8ea9522d658283ad0e8213ba6740ff46ee05e5b24c18c3d8,2024-05-30T17:15:34.583000
|
||||
CVE-2024-5538,0,0,183cea799fa9410e329e72f326a10b8369aedcea9a5b7583a44bf33ecc305070,2024-05-31T11:15:09.923000
|
||||
CVE-2024-5564,0,0,cd961630c6982ea90916e9cc290067a2c4a02a79292d87af6b0ec76760478ca9,2024-06-03T14:46:24.250000
|
||||
CVE-2024-5565,0,0,ca2b275160a932f35493ef873c1e3b3376ac0de1d1f0359f5898f4a0c4303049,2024-05-31T19:14:47.793000
|
||||
CVE-2024-5571,0,0,265798639a90035e137c4841b22621f20815ec8389fe53aa22fef8de63e7337c,2024-06-05T09:15:10.463000
|
||||
CVE-2024-5571,0,1,5bd1fe120d21671f33dde8145e3554ed59688f09b1ce68450c982cea21578a28,2024-06-05T12:53:50.240000
|
||||
CVE-2024-5587,0,0,9180b0762a5a5a7a17ce70cd861bdf25e955d88caf903bee442f7c48a0a2a218,2024-06-03T14:46:24.250000
|
||||
CVE-2024-5588,0,0,21589c4423d1fee081cb695dd8009f3bd5a36bd74dae1713c28449f0da1cd8d1,2024-06-04T19:21:10.267000
|
||||
CVE-2024-5589,0,0,dc63c38434ce5bb089af0d0f8aa09f6a46f1fae34dd45c15f4542741dea047b7,2024-06-03T14:46:24.250000
|
||||
CVE-2024-5590,0,0,ca60332ff9933405c7b9b37e93d2404b53274b9ec741b4065c0c1eadbd60da94,2024-06-03T14:46:24.250000
|
||||
CVE-2024-5635,0,0,d955bff05988108c4df31c650616da32aaf5ecbaf2b998d24bf49ab092bac321,2024-06-04T22:15:10.833000
|
||||
CVE-2024-5636,0,0,5d0061b5ccc5b5cfaf69adce0bc201a464e1b4fa63384366df6d42f47c2a1a4a,2024-06-05T01:15:11.470000
|
||||
CVE-2024-5635,0,1,2f4fd95f40cb43c9475682f37f78b479557c0ba40bc4b87c84bd3a410bdbca2c,2024-06-05T12:53:50.240000
|
||||
CVE-2024-5636,0,1,ae2ff24a8e15c0ed795cb405ff4b68943ed8f15194eed9e4ca4bf581e03cae2a,2024-06-05T12:53:50.240000
|
||||
|
Can't render this file because it is too large.
|
Loading…
x
Reference in New Issue
Block a user