Auto-Update: 2024-06-05T14:00:46.105225+00:00

This commit is contained in:
cad-safe-bot 2024-06-05 14:03:39 +00:00
parent 70962546b2
commit af00c1b7ff
72 changed files with 742 additions and 204 deletions

View File

@ -2,12 +2,16 @@
"id": "CVE-2022-28652",
"sourceIdentifier": "security@ubuntu.com",
"published": "2024-06-04T22:15:09.780",
"lastModified": "2024-06-04T22:15:09.780",
"vulnStatus": "Received",
"lastModified": "2024-06-05T12:53:50.240",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "~/.config/apport/settings parsing is vulnerable to \"billion laughs\" attack"
},
{
"lang": "es",
"value": "~/.config/apport/settings el an\u00e1lisis es vulnerable al ataque de \"billion laughs\""
}
],
"metrics": {},

View File

@ -2,12 +2,16 @@
"id": "CVE-2022-28654",
"sourceIdentifier": "security@ubuntu.com",
"published": "2024-06-04T22:15:09.870",
"lastModified": "2024-06-04T22:15:09.870",
"vulnStatus": "Received",
"lastModified": "2024-06-05T12:53:50.240",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "is_closing_session() allows users to fill up apport.log"
},
{
"lang": "es",
"value": "is_closing_session() permite a los usuarios completar apport.log"
}
],
"metrics": {},

View File

@ -2,12 +2,16 @@
"id": "CVE-2022-28655",
"sourceIdentifier": "security@ubuntu.com",
"published": "2024-06-04T22:15:09.940",
"lastModified": "2024-06-04T22:15:09.940",
"vulnStatus": "Received",
"lastModified": "2024-06-05T12:53:50.240",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "is_closing_session() allows users to create arbitrary tcp dbus connections"
},
{
"lang": "es",
"value": "is_closing_session() permite a los usuarios crear conexiones tcp dbus arbitrarias"
}
],
"metrics": {},

View File

@ -2,12 +2,16 @@
"id": "CVE-2022-28656",
"sourceIdentifier": "security@ubuntu.com",
"published": "2024-06-04T22:15:10.007",
"lastModified": "2024-06-04T22:15:10.007",
"vulnStatus": "Received",
"lastModified": "2024-06-05T12:53:50.240",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "is_closing_session() allows users to consume RAM in the Apport process"
},
{
"lang": "es",
"value": "is_closing_session() permite a los usuarios consumir RAM en el proceso de Apport"
}
],
"metrics": {},

View File

@ -2,12 +2,16 @@
"id": "CVE-2022-28657",
"sourceIdentifier": "security@ubuntu.com",
"published": "2024-06-04T22:15:10.087",
"lastModified": "2024-06-04T22:15:10.087",
"vulnStatus": "Received",
"lastModified": "2024-06-05T12:53:50.240",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "Apport does not disable python crash handler before entering chroot"
},
{
"lang": "es",
"value": "Apport no desactiva el controlador de fallos de Python antes de ingresar a chroot"
}
],
"metrics": {},

View File

@ -2,12 +2,16 @@
"id": "CVE-2022-28658",
"sourceIdentifier": "security@ubuntu.com",
"published": "2024-06-04T22:15:10.153",
"lastModified": "2024-06-04T22:15:10.153",
"vulnStatus": "Received",
"lastModified": "2024-06-05T12:53:50.240",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "Apport argument parsing mishandles filename splitting on older kernels resulting in argument spoofing"
},
{
"lang": "es",
"value": "El an\u00e1lisis de argumentos de Apport maneja mal la divisi\u00f3n de nombres de archivos en n\u00facleos m\u00e1s antiguos, lo que resulta en suplantaci\u00f3n de argumentos"
}
],
"metrics": {},

View File

@ -2,12 +2,16 @@
"id": "CVE-2024-1161",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-06-05T06:15:09.010",
"lastModified": "2024-06-05T06:15:09.010",
"vulnStatus": "Received",
"lastModified": "2024-06-05T12:53:50.240",
"vulnStatus": "Undergoing Analysis",
"descriptions": [
{
"lang": "en",
"value": "The Brizy \u2013 Page Builder plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's Custom Attributes for blocks in all versions up to, and including, 2.4.43 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers with contributor-level and above permissions to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page."
},
{
"lang": "es",
"value": "El complemento Brizy \u2013 Page Builder para WordPress es vulnerable a Cross-Site Scripting Almacenado a trav\u00e9s de los atributos personalizados del complemento para bloques en todas las versiones hasta la 2.4.43 incluida debido a una sanitizaci\u00f3n de entrada y un escape de salida insuficientes. Esto hace posible que atacantes autenticados con permisos de nivel de colaborador y superiores inyecten scripts web arbitrarios en p\u00e1ginas que se ejecutar\u00e1n cada vez que un usuario acceda a una p\u00e1gina inyectada."
}
],
"metrics": {

View File

@ -2,12 +2,16 @@
"id": "CVE-2024-1164",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-06-05T07:15:45.310",
"lastModified": "2024-06-05T07:15:45.310",
"vulnStatus": "Received",
"lastModified": "2024-06-05T12:53:50.240",
"vulnStatus": "Undergoing Analysis",
"descriptions": [
{
"lang": "en",
"value": "The Brizy \u2013 Page Builder plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's contact form widget error message and redirect URL in all versions up to, and including, 2.4.43 due to insufficient input sanitization and output escaping on user supplied error messages. This makes it possible for authenticated attackers with contributor-level and above permissions to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page."
},
{
"lang": "es",
"value": "El complemento Brizy \u2013 Page Builder para WordPress es vulnerable a Cross-Site Scripting Almacenado a trav\u00e9s del mensaje de error del widget del formulario de contacto del complemento y la URL de redireccionamiento en todas las versiones hasta la 2.4.43 incluida debido a una sanitizaci\u00f3n insuficiente de la entrada y a que la salida se escape en los mensajes de error proporcionados por el usuario. Esto hace posible que atacantes autenticados con permisos de nivel de colaborador y superiores inyecten scripts web arbitrarios en p\u00e1ginas que se ejecutar\u00e1n cada vez que un usuario acceda a una p\u00e1gina inyectada."
}
],
"metrics": {

View File

@ -2,12 +2,16 @@
"id": "CVE-2024-1272",
"sourceIdentifier": "iletisim@usom.gov.tr",
"published": "2024-06-05T09:15:09.620",
"lastModified": "2024-06-05T09:15:09.620",
"vulnStatus": "Received",
"lastModified": "2024-06-05T12:53:50.240",
"vulnStatus": "Undergoing Analysis",
"descriptions": [
{
"lang": "en",
"value": "Inclusion of Sensitive Information in Source Code vulnerability in TNB Mobile Solutions Cockpit Software allows Retrieve Embedded Sensitive Data.This issue affects Cockpit Software: before v0.251.1."
},
{
"lang": "es",
"value": "La inclusi\u00f3n de informaci\u00f3n confidencial en la vulnerabilidad del c\u00f3digo fuente en TNB Mobile Solutions Cockpit Software permite recuperar datos confidenciales incrustados. Este problema afecta a Cockpit Software: anterior a v0.251.1."
}
],
"metrics": {

View File

@ -0,0 +1,59 @@
{
"id": "CVE-2024-1662",
"sourceIdentifier": "iletisim@usom.gov.tr",
"published": "2024-06-05T12:15:10.213",
"lastModified": "2024-06-05T12:53:50.240",
"vulnStatus": "Undergoing Analysis",
"descriptions": [
{
"lang": "en",
"value": "Exposure of Sensitive Information to an Unauthorized Actor vulnerability in PORTY Smart Tech Technology Joint Stock Company PowerBank Application allows Retrieve Embedded Sensitive Data.This issue affects PowerBank Application: before 2.02."
},
{
"lang": "es",
"value": "Exposici\u00f3n de informaci\u00f3n confidencial a una vulnerabilidad de actor no autorizado en la aplicaci\u00f3n PowerBank de la sociedad an\u00f3nima PORTY Smart Tech Technology permite recuperar datos confidenciales incrustados. Este problema afecta la aplicaci\u00f3n PowerBank: antes de 2.02."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "iletisim@usom.gov.tr",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 7.2,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 2.7
}
]
},
"weaknesses": [
{
"source": "iletisim@usom.gov.tr",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-200"
}
]
}
],
"references": [
{
"url": "https://www.usom.gov.tr/bildirim/tr-24-0602",
"source": "iletisim@usom.gov.tr"
}
]
}

View File

@ -2,12 +2,16 @@
"id": "CVE-2024-1940",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-06-05T06:15:09.780",
"lastModified": "2024-06-05T06:15:09.780",
"vulnStatus": "Received",
"lastModified": "2024-06-05T12:53:50.240",
"vulnStatus": "Undergoing Analysis",
"descriptions": [
{
"lang": "en",
"value": "The Brizy \u2013 Page Builder plugin for WordPress is vulnerable to Stored Cross-Site Scripting via post content in all versions up to, and including, 2.4.41 due to insufficient input sanitization performed only on the client side and insufficient output escaping. This makes it possible for authenticated attackers, with contributor access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page."
},
{
"lang": "es",
"value": "El complemento Brizy \u2013 Page Builder para WordPress es vulnerable a Cross-Site Scripting Almacenado a trav\u00e9s del contenido de la publicaci\u00f3n en todas las versiones hasta la 2.4.41 incluida debido a una sanitizaci\u00f3n de entrada insuficiente realizada solo en el lado del cliente y un escape de salida insuficiente. Esto hace posible que atacantes autenticados, con acceso de colaborador y superior, inyecten scripts web arbitrarios en p\u00e1ginas que se ejecutar\u00e1n cada vez que un usuario acceda a una p\u00e1gina inyectada."
}
],
"metrics": {

View File

@ -2,12 +2,16 @@
"id": "CVE-2024-2087",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-06-05T06:15:10.833",
"lastModified": "2024-06-05T06:15:10.833",
"vulnStatus": "Received",
"lastModified": "2024-06-05T12:53:50.240",
"vulnStatus": "Undergoing Analysis",
"descriptions": [
{
"lang": "en",
"value": "The Brizy \u2013 Page Builder plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the form name values in all versions up to, and including, 2.4.43 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page."
},
{
"lang": "es",
"value": "El complemento Brizy \u2013 Page Builder para WordPress es vulnerable a Cross-Site Scripting Almacenado a trav\u00e9s de los valores de nombre del formulario en todas las versiones hasta la 2.4.43 incluida debido a una sanitizaci\u00f3n de entrada y un escape de salida insuficientes. Esto hace posible que atacantes no autenticados inyecten scripts web arbitrarios en p\u00e1ginas que se ejecutar\u00e1n cada vez que un usuario acceda a una p\u00e1gina inyectada."
}
],
"metrics": {

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-2257",
"sourceIdentifier": "vdisclose@cert-in.org.in",
"published": "2024-05-14T15:18:35.380",
"lastModified": "2024-05-14T16:13:02.773",
"lastModified": "2024-06-05T13:15:12.557",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
@ -15,6 +15,18 @@
}
],
"metrics": {},
"weaknesses": [
{
"source": "vdisclose@cert-in.org.in",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-20"
}
]
}
],
"references": [
{
"url": "https://www.cert-in.org.in/s2cMainServlet?pageid=PUBVLNOTES01&VLCODE=CIVN-2024-0158",

View File

@ -2,12 +2,16 @@
"id": "CVE-2024-23326",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-06-04T21:15:33.440",
"lastModified": "2024-06-04T21:15:33.440",
"vulnStatus": "Received",
"lastModified": "2024-06-05T12:53:50.240",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "Envoy is a cloud-native, open source edge and service proxy. A theoretical request smuggling vulnerability exists through Envoy if a server can be tricked into adding an upgrade header into a response. Per RFC https://www.rfc-editor.org/rfc/rfc7230#section-6.7 a server sends 101 when switching protocols. Envoy incorrectly accepts a 200 response from a server when requesting a protocol upgrade, but 200 does not indicate protocol switch. This opens up the possibility of request smuggling through Envoy if the server can be tricked into adding the upgrade header to the response.\n\n"
},
{
"lang": "es",
"value": "Envoy es un proxy de servicio y borde de c\u00f3digo abierto, nativo de la nube. Existe una vulnerabilidad te\u00f3rica de contrabando de solicitudes a trav\u00e9s de Envoy si se puede enga\u00f1ar a un servidor para que agregue un encabezado de actualizaci\u00f3n en una respuesta. Seg\u00fan RFC https://www.rfc-editor.org/rfc/rfc7230#section-6.7, un servidor env\u00eda 101 al cambiar de protocolo. Envoy acepta incorrectamente una respuesta 200 de un servidor cuando solicita una actualizaci\u00f3n de protocolo, pero 200 no indica un cambio de protocolo. Esto abre la posibilidad de contrabando de solicitudes a trav\u00e9s de Envoy si se puede enga\u00f1ar al servidor para que agregue el encabezado de actualizaci\u00f3n a la respuesta."
}
],
"metrics": {

View File

@ -2,12 +2,16 @@
"id": "CVE-2024-23669",
"sourceIdentifier": "psirt@fortinet.com",
"published": "2024-06-05T08:15:09.537",
"lastModified": "2024-06-05T08:15:09.537",
"vulnStatus": "Received",
"lastModified": "2024-06-05T12:53:50.240",
"vulnStatus": "Undergoing Analysis",
"descriptions": [
{
"lang": "en",
"value": "An improper authorization in Fortinet FortiWebManager version 7.2.0 and 7.0.0 through 7.0.4 and 6.3.0 and 6.2.3 through 6.2.4 and 6.0.2 allows attacker to execute unauthorized code or commands via HTTP requests or CLI."
},
{
"lang": "es",
"value": "Una autorizaci\u00f3n inadecuada en Fortinet FortiWebManager versi\u00f3n 7.2.0 y 7.0.0 hasta 7.0.4 y 6.3.0 y 6.2.3 hasta 6.2.4 y 6.0.2 permite al atacante ejecutar c\u00f3digo o comandos no autorizados a trav\u00e9s de solicitudes HTTP o CLI."
}
],
"metrics": {

View File

@ -2,12 +2,16 @@
"id": "CVE-2024-2368",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-06-05T07:15:45.690",
"lastModified": "2024-06-05T07:15:45.690",
"vulnStatus": "Received",
"lastModified": "2024-06-05T12:53:50.240",
"vulnStatus": "Undergoing Analysis",
"descriptions": [
{
"lang": "en",
"value": "The Mollie Forms plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 2.6.13. This is due to missing or incorrect nonce validation on the duplicateForm() function. This makes it possible for unauthenticated attackers to duplicate forms via a forged request granted they can trick a site administrator into performing an action such as clicking on a link."
},
{
"lang": "es",
"value": "El complemento Mollie Forms para WordPress es vulnerable a Cross-Site Request Forgery en todas las versiones hasta la 2.6.13 incluida. Esto se debe a una validaci\u00f3n nonce faltante o incorrecta en la funci\u00f3n duplicadaForm(). Esto hace posible que atacantes no autenticados dupliquen formularios a trav\u00e9s de una solicitud falsificada, siempre que puedan enga\u00f1ar al administrador del sitio para que realice una acci\u00f3n como hacer clic en un enlace."
}
],
"metrics": {

View File

@ -2,12 +2,16 @@
"id": "CVE-2024-25095",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-06-04T19:18:45.170",
"lastModified": "2024-06-04T19:18:45.170",
"vulnStatus": "Received",
"lastModified": "2024-06-05T12:53:50.240",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "Insertion of Sensitive Information into Log File vulnerability in Code Parrots Easy Forms for Mailchimp.This issue affects Easy Forms for Mailchimp: from n/a through 6.9.0."
},
{
"lang": "es",
"value": "Vulnerabilidad de inserci\u00f3n de informaci\u00f3n confidencial en un archivo de registro en Code Parrots Easy Forms para Mailchimp. Este problema afecta a Easy Forms para Mailchimp: desde n/a hasta 6.9.0."
}
],
"metrics": {

View File

@ -2,12 +2,16 @@
"id": "CVE-2024-28103",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-06-04T20:15:10.237",
"lastModified": "2024-06-04T20:15:10.237",
"vulnStatus": "Received",
"lastModified": "2024-06-05T12:53:50.240",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "Action Pack is a framework for handling and responding to web requests. Since 6.1.0, the application configurable Permissions-Policy is only served on responses with an HTML related Content-Type. This vulnerability is fixed in 6.1.7.8, 7.0.8.2, and 7.1.3.3."
},
{
"lang": "es",
"value": "Action Pack es un framework para manejar y responder a solicitudes web. Desde 6.1.0, la Pol\u00edtica de permisos configurable de la aplicaci\u00f3n solo se ofrece en respuestas con un tipo de contenido relacionado con HTML. Esta vulnerabilidad se solucion\u00f3 en 6.1.7.8, 7.0.8.2 y 7.1.3.3."
}
],
"metrics": {

View File

@ -2,12 +2,16 @@
"id": "CVE-2024-29152",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-06-04T19:19:07.620",
"lastModified": "2024-06-04T19:19:07.620",
"vulnStatus": "Received",
"lastModified": "2024-06-05T12:53:50.240",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "An issue was discovered in Samsung Mobile Processor, Wearable Processor, Automotive Processor, and Modem Exynos 980, 990, 850, 1080, 2100, 2200, 1280, 1380, 1330, 2400, 9110, W920, W930, Modem 5123, Modem 5300, and Auto T5123. The baseband software does not properly check states specified by the RRC (Radio Resource Control) Reconfiguration message. This can lead to disclosure of sensitive information."
},
{
"lang": "es",
"value": "Se descubri\u00f3 un problema en el procesador m\u00f3vil, el procesador port\u00e1til, el procesador automotriz y el m\u00f3dem Samsung Exynos 980, 990, 850, 1080, 2100, 2200, 1280, 1380, 1330, 2400, 9110, W920, W930, M\u00f3dem 5123, M\u00f3dem 5300, y Auto T5123. El software de banda base no verifica adecuadamente los estados especificados en el mensaje de reconfiguraci\u00f3n de RRC (control de recursos de radio). Esto puede dar lugar a la divulgaci\u00f3n de informaci\u00f3n confidencial."
}
],
"metrics": {

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-29975",
"sourceIdentifier": "security@zyxel.com.tw",
"published": "2024-06-04T02:15:48.760",
"lastModified": "2024-06-05T04:15:11.617",
"lastModified": "2024-06-05T13:15:12.107",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{

View File

@ -2,12 +2,16 @@
"id": "CVE-2024-30484",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-06-04T19:19:24.800",
"lastModified": "2024-06-04T19:19:24.800",
"vulnStatus": "Received",
"lastModified": "2024-06-05T12:53:50.240",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "Missing Authorization vulnerability in RT Easy Builder \u2013 Advanced addons for Elementor.This issue affects RT Easy Builder \u2013 Advanced addons for Elementor: from n/a through 2.0."
},
{
"lang": "es",
"value": "Vulnerabilidad de autorizaci\u00f3n faltante en RT Easy Builder \u2013 Advanced addons for Elementor. Este problema afecta a RT Easy Builder \u2013 Advanced addons for Elementor: desde n/a hasta 2.0."
}
],
"metrics": {

View File

@ -2,12 +2,16 @@
"id": "CVE-2024-30525",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-06-04T20:15:10.780",
"lastModified": "2024-06-04T20:15:10.780",
"vulnStatus": "Received",
"lastModified": "2024-06-05T12:53:50.240",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "Missing Authorization vulnerability in moveaddons Move Addons for Elementor.This issue affects Move Addons for Elementor: from n/a through 1.2.9."
},
{
"lang": "es",
"value": "Vulnerabilidad de autorizaci\u00f3n faltante en moveaddons Move Addons para Elementor. Este problema afecta a Move Addons para Elementor: desde n/a hasta 1.2.9."
}
],
"metrics": {

View File

@ -2,12 +2,16 @@
"id": "CVE-2024-30528",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-06-04T20:15:11.010",
"lastModified": "2024-06-04T20:15:11.010",
"vulnStatus": "Received",
"lastModified": "2024-06-05T12:53:50.240",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "Missing Authorization vulnerability in Spiffy Plugins Spiffy Calendar.This issue affects Spiffy Calendar: from n/a through 4.9.10."
},
{
"lang": "es",
"value": "Vulnerabilidad de autorizaci\u00f3n faltante en los complementos de Spiffy Spiffy Calendar. Este problema afecta a Spiffy Calendar: desde n/a hasta 4.9.10."
}
],
"metrics": {

View File

@ -2,12 +2,16 @@
"id": "CVE-2024-30889",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-06-04T22:15:10.243",
"lastModified": "2024-06-04T22:15:10.243",
"vulnStatus": "Received",
"lastModified": "2024-06-05T12:53:50.240",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "Cross Site Scripting vulnerability in audimex audimexEE v.15.1.2 and fixed in 15.1.3.9 allows a remote attacker to execute arbitrary code via the service, method, widget_type, request_id, payload parameters."
},
{
"lang": "es",
"value": "Vulnerabilidad de cross-site scripting en audimex audimexEE v.15.1.2 y corregida en 15.1.3.9 permite a un atacante remoto ejecutar c\u00f3digo arbitrario a trav\u00e9s de los par\u00e1metros servicio, m\u00e9todo, widget_type, request_id y payload."
}
],
"metrics": {},

View File

@ -2,12 +2,16 @@
"id": "CVE-2024-32464",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-06-04T20:15:11.247",
"lastModified": "2024-06-04T20:15:11.247",
"vulnStatus": "Received",
"lastModified": "2024-06-05T12:53:50.240",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "Action Text brings rich text content and editing to Rails. Instances of ActionText::Attachable::ContentAttachment included within a rich_text_area tag could potentially contain unsanitized HTML. This vulnerability is fixed in 7.1.3.4 and 7.2.0.beta2."
},
{
"lang": "es",
"value": "Action Text trae contenido de texto enriquecido y edici\u00f3n a Rails. Las instancias de ActionText::Attachable::ContentAttachment incluidas dentro de una etiqueta rich_text_area podr\u00edan contener HTML no sanitizado. Esta vulnerabilidad se solucion\u00f3 en 7.1.3.4 y 7.2.0.beta2."
}
],
"metrics": {

View File

@ -2,12 +2,16 @@
"id": "CVE-2024-32974",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-06-04T21:15:33.773",
"lastModified": "2024-06-04T21:15:33.773",
"vulnStatus": "Received",
"lastModified": "2024-06-05T12:53:50.240",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "Envoy is a cloud-native, open source edge and service proxy. A crash was observed in `EnvoyQuicServerStream::OnInitialHeadersComplete()` with following call stack. It is a use-after-free caused by QUICHE continuing push request headers after `StopReading()` being called on the stream. As after `StopReading()`, the HCM's `ActiveStream` might have already be destroyed and any up calls from QUICHE could potentially cause use after free. \n"
},
{
"lang": "es",
"value": "Envoy es un proxy de servicio y borde de c\u00f3digo abierto, nativo de la nube. Se observ\u00f3 un bloqueo en `EnvoyQuicServerStream::OnInitialHeadersComplete()` con la siguiente pila de llamadas. Es un use-after-free causado porque QUICHE contin\u00faa enviando encabezados de solicitud despu\u00e9s de que se llama a `StopReading()` en la secuencia. Al igual que despu\u00e9s de `StopReading()`, es posible que el `ActiveStream` del HCM ya se haya destruido y cualquier llamada desde QUICHE podr\u00eda provocar su use after free."
}
],
"metrics": {

View File

@ -2,12 +2,16 @@
"id": "CVE-2024-32975",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-06-04T21:15:33.987",
"lastModified": "2024-06-04T21:15:33.987",
"vulnStatus": "Received",
"lastModified": "2024-06-05T12:53:50.240",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "Envoy is a cloud-native, open source edge and service proxy. There is a crash at `QuicheDataReader::PeekVarInt62Length()`. It is caused by integer underflow in the `QuicStreamSequencerBuffer::PeekRegion()` implementation."
},
{
"lang": "es",
"value": "Envoy es un proxy de servicio y borde de c\u00f3digo abierto, nativo de la nube. Hay un bloqueo en `QuicheDataReader::PeekVarInt62Length()`. Se debe a un desbordamiento insuficiente de enteros en la implementaci\u00f3n de `QuicStreamSequencerBuffer::PeekRegion()`."
}
],
"metrics": {

View File

@ -2,12 +2,16 @@
"id": "CVE-2024-32976",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-06-04T21:15:34.220",
"lastModified": "2024-06-04T21:15:34.220",
"vulnStatus": "Received",
"lastModified": "2024-06-05T12:53:50.240",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "Envoy is a cloud-native, open source edge and service proxy. Envoyproxy with a Brotli filter can get into an endless loop during decompression of Brotli data with extra input."
},
{
"lang": "es",
"value": "Envoy es un proxy de servicio y borde de c\u00f3digo abierto, nativo de la nube. Envoyproxy con un filtro Brotli puede entrar en un bucle sin fin durante la descompresi\u00f3n de datos Brotli con entrada adicional."
}
],
"metrics": {

View File

@ -2,12 +2,16 @@
"id": "CVE-2024-34055",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-06-05T05:15:49.950",
"lastModified": "2024-06-05T05:15:49.950",
"vulnStatus": "Received",
"lastModified": "2024-06-05T12:53:50.240",
"vulnStatus": "Undergoing Analysis",
"descriptions": [
{
"lang": "en",
"value": "Cyrus IMAP before 3.8.3 and 3.10.x before 3.10.0-rc1 allows authenticated attackers to cause unbounded memory allocation by sending many LITERALs in a single command."
},
{
"lang": "es",
"value": "Cyrus IMAP anterior a 3.8.3 y 3.10.x anterior a 3.10.0-rc1 permite a atacantes autenticados provocar una asignaci\u00f3n de memoria ilimitada enviando muchos LITERAL en un solo comando."
}
],
"metrics": {},

View File

@ -2,12 +2,16 @@
"id": "CVE-2024-34362",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-06-04T21:15:34.530",
"lastModified": "2024-06-04T21:15:34.530",
"vulnStatus": "Received",
"lastModified": "2024-06-05T12:53:50.240",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "Envoy is a cloud-native, open source edge and service proxy. There is a use-after-free in `HttpConnectionManager` (HCM) with `EnvoyQuicServerStream` that can crash Envoy. An attacker can exploit this vulnerability by sending a request without `FIN`, then a `RESET_STREAM` frame, and then after receiving the response, closing the connection."
},
{
"lang": "es",
"value": "Envoy es un proxy de servicio y borde de c\u00f3digo abierto, nativo de la nube. Hay un use-after-free en `HttpConnectionManager` (HCM) con `EnvoyQuicServerStream` que puede bloquear Envoy. Un atacante puede explotar esta vulnerabilidad enviando una solicitud sin `FIN`, luego un framework `RESET_STREAM` y luego, despu\u00e9s de recibir la respuesta, cerrando la conexi\u00f3n."
}
],
"metrics": {

View File

@ -2,12 +2,16 @@
"id": "CVE-2024-34363",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-06-04T21:15:34.743",
"lastModified": "2024-06-04T21:15:34.743",
"vulnStatus": "Received",
"lastModified": "2024-06-05T12:53:50.240",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "Envoy is a cloud-native, open source edge and service proxy. Due to how Envoy invoked the nlohmann JSON library, the library could throw an uncaught exception from downstream data if incomplete UTF-8 strings were serialized. The uncaught exception would cause Envoy to crash."
},
{
"lang": "es",
"value": "Envoy es un proxy de servicio y borde de c\u00f3digo abierto, nativo de la nube. Debido a c\u00f3mo Envoy invoc\u00f3 la librer\u00eda JSON de nlohmann, la librer\u00eda podr\u00eda generar una excepci\u00f3n no detectada de los datos posteriores si se serializaran cadenas UTF-8 incompletas. La excepci\u00f3n no detectada provocar\u00eda que Envoy fallara."
}
],
"metrics": {

View File

@ -2,12 +2,16 @@
"id": "CVE-2024-34364",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-06-04T21:15:34.977",
"lastModified": "2024-06-04T21:15:34.977",
"vulnStatus": "Received",
"lastModified": "2024-06-05T12:53:50.240",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "Envoy is a cloud-native, open source edge and service proxy. Envoy exposed an out-of-memory (OOM) vector from the mirror response, since async HTTP client will buffer the response with an unbounded buffer."
},
{
"lang": "es",
"value": "Envoy es un proxy de servicio y borde de c\u00f3digo abierto, nativo de la nube. Envoy expuso un vector de falta de memoria (OOM) de la respuesta reflejada, ya que el cliente HTTP as\u00edncrono almacenar\u00e1 la respuesta en un b\u00fafer ilimitado."
}
],
"metrics": {

View File

@ -2,12 +2,16 @@
"id": "CVE-2024-34759",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-06-04T19:20:03.167",
"lastModified": "2024-06-04T19:20:03.167",
"vulnStatus": "Received",
"lastModified": "2024-06-05T12:53:50.240",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in VideoWhisper Picture Gallery allows Stored XSS.This issue affects Picture Gallery: from n/a through 1.5.11."
},
{
"lang": "es",
"value": "La vulnerabilidad de neutralizaci\u00f3n inadecuada de la entrada durante la generaci\u00f3n de p\u00e1ginas web (XSS o 'Cross-site Scripting') en VideoWhisper Picture Gallery permite XSS Almacenado. Este problema afecta a Picture Gallery: desde n/a hasta 1.5.11."
}
],
"metrics": {

View File

@ -0,0 +1,47 @@
{
"id": "CVE-2024-3469",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-06-05T13:15:12.707",
"lastModified": "2024-06-05T13:15:12.707",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "The GP Premium plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the message parameter in all versions up to, and including, 2.4.0 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security@wordfence.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7
}
]
},
"references": [
{
"url": "https://generatepress.com/category/changelog/",
"source": "security@wordfence.com"
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/1a697391-f30d-403f-9046-8fa219a49302?source=cve",
"source": "security@wordfence.com"
}
]
}

View File

@ -2,12 +2,16 @@
"id": "CVE-2024-35670",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-06-04T19:20:08.777",
"lastModified": "2024-06-04T19:20:08.777",
"vulnStatus": "Received",
"lastModified": "2024-06-05T12:53:50.240",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "Broken Authentication vulnerability in SoftLab Integrate Google Drive.This issue affects Integrate Google Drive: from n/a through 1.3.93."
},
{
"lang": "es",
"value": "Vulnerabilidad de autenticaci\u00f3n rota en SoftLab Integrate Google Drive. Este problema afecta a Integrate Google Drive: desde n/a hasta 1.3.93."
}
],
"metrics": {

View File

@ -2,12 +2,16 @@
"id": "CVE-2024-35672",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-06-04T19:20:08.967",
"lastModified": "2024-06-04T19:20:08.967",
"vulnStatus": "Received",
"lastModified": "2024-06-05T12:53:50.240",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "Missing Authorization vulnerability in Netgsm.This issue affects Netgsm: from n/a through 2.9.16."
},
{
"lang": "es",
"value": "Vulnerabilidad de autorizaci\u00f3n faltante en Netgsm. Este problema afecta a Netgsm: desde n/a hasta 2.9.16."
}
],
"metrics": {

View File

@ -2,12 +2,16 @@
"id": "CVE-2024-36121",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-06-04T22:15:10.490",
"lastModified": "2024-06-04T22:15:10.490",
"vulnStatus": "Received",
"lastModified": "2024-06-05T12:53:50.240",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": " netty-incubator-codec-ohttp is the OHTTP implementation for netty. BoringSSLAEADContext keeps track of how many OHTTP responses have been sent and uses this sequence number to calculate the appropriate nonce to use with the encryption algorithm. Unfortunately, two separate errors combine which would allow an attacker to cause the sequence number to overflow and thus the nonce to repeat."
},
{
"lang": "es",
"value": "netty-incubator-codec-ohttp es la implementaci\u00f3n OHTTP para netty. BoringSSLAEADContext realiza un seguimiento de cu\u00e1ntas respuestas OHTTP se han enviado y utiliza este n\u00famero de secuencia para calcular el nonce apropiado para usar con el algoritmo de cifrado. Desafortunadamente, se combinan dos errores separados que permitir\u00edan a un atacante provocar que el n\u00famero de secuencia se desborde y, por lo tanto, que se repita el nonce."
}
],
"metrics": {

View File

@ -2,12 +2,16 @@
"id": "CVE-2024-36604",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-06-04T19:20:13.927",
"lastModified": "2024-06-04T19:20:13.927",
"vulnStatus": "Received",
"lastModified": "2024-06-05T12:53:50.240",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "Tenda O3V2 v1.0.0.12(3880) was discovered to contain a Blind Command Injection via stpEn parameter in the SetStp function. This vulnerability allows attackers to execute arbitrary commands with root privileges."
},
{
"lang": "es",
"value": "Se descubri\u00f3 que Tenda O3V2 v1.0.0.12(3880) conten\u00eda una inyecci\u00f3n de comando ciego a trav\u00e9s del par\u00e1metro stpEn en la funci\u00f3n SetStp. Esta vulnerabilidad permite a los atacantes ejecutar comandos arbitrarios con privilegios de root."
}
],
"metrics": {},

View File

@ -2,12 +2,16 @@
"id": "CVE-2024-36675",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-06-04T22:15:10.740",
"lastModified": "2024-06-04T22:15:10.740",
"vulnStatus": "Received",
"lastModified": "2024-06-05T12:53:50.240",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "LyLme_spage v1.9.5 is vulnerable to Server-Side Request Forgery (SSRF) via the get_head function."
},
{
"lang": "es",
"value": "LyLme_spage v1.9.5 es vulnerable a server-side request forgery (SSRF) a trav\u00e9s de la funci\u00f3n get_head."
}
],
"metrics": {},

View File

@ -2,12 +2,16 @@
"id": "CVE-2024-36857",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-06-04T19:20:14.060",
"lastModified": "2024-06-04T19:20:14.060",
"vulnStatus": "Received",
"lastModified": "2024-06-05T12:53:50.240",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "Jan v0.4.12 was discovered to contain an arbitrary file read vulnerability via the /v1/app/readFileSync interface."
},
{
"lang": "es",
"value": "Se descubri\u00f3 que Jan v0.4.12 conten\u00eda una vulnerabilidad de lectura de archivos arbitraria a trav\u00e9s de la interfaz /v1/app/readFileSync."
}
],
"metrics": {},

View File

@ -2,12 +2,16 @@
"id": "CVE-2024-36858",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-06-04T19:20:14.150",
"lastModified": "2024-06-04T19:20:14.150",
"vulnStatus": "Received",
"lastModified": "2024-06-05T12:53:50.240",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "An arbitrary file upload vulnerability in the /v1/app/writeFileSync interface of Jan v0.4.12 allows attackers to execute arbitrary code via uploading a crafted file."
},
{
"lang": "es",
"value": "Una vulnerabilidad de carga de archivos arbitrarios en la interfaz /v1/app/writeFileSync de Jan v0.4.12 permite a los atacantes ejecutar c\u00f3digo arbitrario cargando un archivo manipulado."
}
],
"metrics": {},

View File

@ -2,12 +2,16 @@
"id": "CVE-2024-3667",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-06-05T06:15:11.590",
"lastModified": "2024-06-05T06:15:11.590",
"vulnStatus": "Received",
"lastModified": "2024-06-05T12:53:50.240",
"vulnStatus": "Undergoing Analysis",
"descriptions": [
{
"lang": "en",
"value": "The Brizy \u2013 Page Builder plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'Link To' field of multiple widgets in all versions up to, and including, 2.4.43 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page."
},
{
"lang": "es",
"value": "El complemento Brizy \u2013 Page Builder para WordPress es vulnerable a Cross-Site Scripting Almacenado a trav\u00e9s del campo 'Enlace a' de m\u00faltiples widgets en todas las versiones hasta la 2.4.43 incluida debido a una sanitizaci\u00f3n de entrada insuficiente y a un escape de salida en los atributos proporcionados por el usuario. Esto hace posible que atacantes autenticados, con acceso de nivel de colaborador y superior, inyecten scripts web arbitrarios en p\u00e1ginas que se ejecutar\u00e1n cada vez que un usuario acceda a una p\u00e1gina inyectada."
}
],
"metrics": {

View File

@ -2,12 +2,16 @@
"id": "CVE-2024-37273",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-06-04T19:20:15.363",
"lastModified": "2024-06-04T19:20:15.363",
"vulnStatus": "Received",
"lastModified": "2024-06-05T12:53:50.240",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "An arbitrary file upload vulnerability in the /v1/app/appendFileSync interface of Jan v0.4.12 allows attackers to execute arbitrary code via uploading a crafted file."
},
{
"lang": "es",
"value": "Una vulnerabilidad de carga de archivos arbitrarios en la interfaz /v1/app/appendFileSync de Jan v0.4.12 permite a los atacantes ejecutar c\u00f3digo arbitrario cargando un archivo manipulado."
}
],
"metrics": {},

View File

@ -2,12 +2,16 @@
"id": "CVE-2024-4001",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-06-05T11:15:08.490",
"lastModified": "2024-06-05T11:15:08.490",
"vulnStatus": "Received",
"lastModified": "2024-06-05T12:53:50.240",
"vulnStatus": "Undergoing Analysis",
"descriptions": [
{
"lang": "en",
"value": "The Download Manager plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'wpdm_modal_login_form' shortcode in all versions up to, and including, 3.2.93 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page."
},
{
"lang": "es",
"value": "El complemento Download Manager para WordPress es vulnerable a Cross-Site Scripting Almacenado a trav\u00e9s del c\u00f3digo corto 'wpdm_modal_login_form' del complemento en todas las versiones hasta la 3.2.93 incluida debido a una sanitizaci\u00f3n de entrada insuficiente y a un escape de salida en los atributos proporcionados por el usuario. Esto hace posible que atacantes autenticados, con acceso de nivel de colaborador y superior, inyecten scripts web arbitrarios en p\u00e1ginas que se ejecutar\u00e1n cada vez que un usuario acceda a una p\u00e1gina inyectada."
}
],
"metrics": {

View File

@ -2,12 +2,16 @@
"id": "CVE-2024-4084",
"sourceIdentifier": "security@huntr.dev",
"published": "2024-06-05T00:15:09.840",
"lastModified": "2024-06-05T00:15:09.840",
"vulnStatus": "Received",
"lastModified": "2024-06-05T12:53:50.240",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "A Server-Side Request Forgery (SSRF) vulnerability exists in the latest version of mintplex-labs/anything-llm, allowing attackers to bypass the official fix intended to restrict access to intranet IP addresses and protocols. Despite efforts to filter out intranet IP addresses starting with 192, 172, 10, and 127 through regular expressions and limit access protocols to HTTP and HTTPS, attackers can still bypass these restrictions using alternative representations of IP addresses and accessing other ports running on localhost. This vulnerability enables attackers to access any asset on the internal network, attack web services on the internal network, scan hosts on the internal network, and potentially access AWS metadata endpoints. The vulnerability is due to insufficient validation of user-supplied URLs, which can be exploited to perform SSRF attacks."
},
{
"lang": "es",
"value": "Existe una vulnerabilidad de server-side request forgery (SSRF) en la \u00faltima versi\u00f3n de mintplex-labs/anything-llm, lo que permite a los atacantes eludir la soluci\u00f3n oficial destinada a restringir el acceso a las direcciones IP y protocolos de la intranet. A pesar de los esfuerzos por filtrar las direcciones IP de la intranet que comienzan con 192, 172, 10 y 127 mediante expresiones regulares y limitar los protocolos de acceso a HTTP y HTTPS, los atacantes a\u00fan pueden eludir estas restricciones utilizando representaciones alternativas de direcciones IP y accediendo a otros puertos que se ejecutan en localhost. Esta vulnerabilidad permite a los atacantes acceder a cualquier activo en la red interna, atacar servicios web en la red interna, escanear hosts en la red interna y potencialmente acceder a puntos finales de metadatos de AWS. La vulnerabilidad se debe a una validaci\u00f3n insuficiente de las URL proporcionadas por el usuario, que pueden explotarse para realizar ataques SSRF."
}
],
"metrics": {

View File

@ -2,12 +2,16 @@
"id": "CVE-2024-4088",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-06-05T07:15:45.910",
"lastModified": "2024-06-05T07:15:45.910",
"vulnStatus": "Received",
"lastModified": "2024-06-05T12:53:50.240",
"vulnStatus": "Undergoing Analysis",
"descriptions": [
{
"lang": "en",
"value": "The Gutenberg Blocks and Page Layouts \u2013 Attire Blocks plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the disable_fe_assets function in all versions up to, and including, 1.9.2. This makes it possible for authenticated attackers, with subscriber access or above, to change the plugin's settings. Additionally, no nonce check is performed resulting in a CSRF vulnerability."
},
{
"lang": "es",
"value": "El complemento Gutenberg Blocks and Page Layouts \u2013 Attire Blocks para WordPress es vulnerable a modificaciones no autorizadas de datos debido a una falta de verificaci\u00f3n de capacidad en la funci\u00f3n enable_fe_assets en todas las versiones hasta la 1.9.2 incluida. Esto hace posible que atacantes autenticados, con acceso de suscriptor o superior, cambien la configuraci\u00f3n del complemento. Adem\u00e1s, no se realiza ninguna verificaci\u00f3n nonce, lo que genera una vulnerabilidad CSRF."
}
],
"metrics": {

View File

@ -2,12 +2,16 @@
"id": "CVE-2024-4219",
"sourceIdentifier": "13061848-ea10-403d-bd75-c83a022c2891",
"published": "2024-06-04T21:15:35.277",
"lastModified": "2024-06-04T21:15:35.277",
"vulnStatus": "Received",
"lastModified": "2024-06-05T12:53:50.240",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "Prior to 23.2, it is possible to perform arbitrary Server-Side requests via HTTP-based connectors within BeyondInsight, resulting in a server-side request forgery vulnerability."
},
{
"lang": "es",
"value": "Antes de la versi\u00f3n 23.2, era posible realizar solicitudes arbitrarias del lado del servidor a trav\u00e9s de conectores basados en HTTP dentro de BeyondInsight, lo que generaba una vulnerabilidad de server-side request forgery."
}
],
"metrics": {

View File

@ -2,12 +2,16 @@
"id": "CVE-2024-4220",
"sourceIdentifier": "13061848-ea10-403d-bd75-c83a022c2891",
"published": "2024-06-04T21:15:35.530",
"lastModified": "2024-06-04T21:15:35.530",
"vulnStatus": "Received",
"lastModified": "2024-06-05T12:53:50.240",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "Prior to 23.1, an information disclosure vulnerability exists within BeyondInsight which can allow an attacker to enumerate usernames."
},
{
"lang": "es",
"value": "Antes de la versi\u00f3n 23.1, exist\u00eda una vulnerabilidad de divulgaci\u00f3n de informaci\u00f3n dentro de BeyondInsight que pod\u00eda permitir a un atacante enumerar nombres de usuarios."
}
],
"metrics": {

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-4231",
"sourceIdentifier": "vdisclose@cert-in.org.in",
"published": "2024-05-14T15:43:08.323",
"lastModified": "2024-05-14T16:11:39.510",
"lastModified": "2024-06-05T13:15:12.980",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
@ -15,6 +15,18 @@
}
],
"metrics": {},
"weaknesses": [
{
"source": "vdisclose@cert-in.org.in",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-1191"
}
]
}
],
"references": [
{
"url": "https://www.cert-in.org.in/s2cMainServlet?pageid=PUBVLNOTES01&VLCODE=CIVN-2024-0158",

View File

@ -2,12 +2,12 @@
"id": "CVE-2024-4232",
"sourceIdentifier": "vdisclose@cert-in.org.in",
"published": "2024-05-14T15:43:08.453",
"lastModified": "2024-05-14T16:11:39.510",
"lastModified": "2024-06-05T13:15:13.190",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "This vulnerability exists in Digisol Router (DG-GR1321: Hardware version 3.7L; Firmware version : v3.2.02) due to presence of root terminal access on a serial interface without proper access control. An\u00a0attacker\u00a0with\u00a0physical\u00a0access\u00a0could exploit this by identifying UART pins and accessing the root shell on the vulnerable system.\n\nSuccessful exploitation of this vulnerability could allow the attacker to access the sensitive information on the targeted system.This vulnerability exists in Digisol Router (DG-GR1321: Hardware version 3.7L; Firmware version : v3.2.02) due to lack of encryption or hashing in storing of passwords within the router's firmware/ database. An\u00a0attacker\u00a0with\u00a0physical\u00a0access\u00a0could exploit this by extracting the firmware and reverse engineer the binary data to access the plaintext passwords on the vulnerable system.\n\nSuccessful exploitation of this vulnerability could allow the attacker to gain unauthorized access to the targeted system."
"value": "This vulnerability exists in Digisol Router (DG-GR1321: Hardware version 3.7L; Firmware version : v3.2.02) due to lack of encryption or hashing in storing of passwords within the router's firmware/ database. An attacker with physical access could exploit this by extracting the firmware and reverse engineer the binary data to access the plaintext passwords on the vulnerable system.\n\nSuccessful exploitation of this vulnerability could allow the attacker to gain unauthorized access to the targeted system."
},
{
"lang": "es",
@ -15,6 +15,18 @@
}
],
"metrics": {},
"weaknesses": [
{
"source": "vdisclose@cert-in.org.in",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-256"
}
]
}
],
"references": [
{
"url": "https://www.cert-in.org.in/s2cMainServlet?pageid=PUBVLNOTES01&VLCODE=CIVN-2024-0158",

View File

@ -2,12 +2,16 @@
"id": "CVE-2024-4295",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-06-05T06:15:12.007",
"lastModified": "2024-06-05T06:15:12.007",
"vulnStatus": "Received",
"lastModified": "2024-06-05T12:53:50.240",
"vulnStatus": "Undergoing Analysis",
"descriptions": [
{
"lang": "en",
"value": "The Email Subscribers by Icegram Express plugin for WordPress is vulnerable to SQL Injection via the \u2018hash\u2019 parameter in all versions up to, and including, 5.7.20 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database."
},
{
"lang": "es",
"value": "El complemento Email Subscribers by Icegram Express para WordPress es vulnerable a la inyecci\u00f3n SQL a trav\u00e9s del par\u00e1metro 'hash' en todas las versiones hasta la 5.7.20 incluida debido a un escape insuficiente en el par\u00e1metro proporcionado por el usuario y a la falta de preparaci\u00f3n suficiente en la consulta SQL existente. Esto hace posible que atacantes no autenticados agreguen consultas SQL adicionales a consultas ya existentes que pueden usarse para extraer informaci\u00f3n confidencial de la base de datos."
}
],
"metrics": {

View File

@ -2,12 +2,16 @@
"id": "CVE-2024-4520",
"sourceIdentifier": "security@huntr.dev",
"published": "2024-06-04T20:15:11.690",
"lastModified": "2024-06-04T20:15:11.690",
"vulnStatus": "Received",
"lastModified": "2024-06-05T12:53:50.240",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "An improper access control vulnerability exists in the gaizhenbiao/chuanhuchatgpt application, specifically in version 20240410. This vulnerability allows any user on the server to access the chat history of any other user without requiring any form of interaction between the users. Exploitation of this vulnerability could lead to data breaches, including the exposure of sensitive personal details, financial data, or confidential conversations. Additionally, it could facilitate identity theft and manipulation or fraud through the unauthorized access to users' chat histories. This issue is due to insufficient access control mechanisms in the application's handling of chat history data."
},
{
"lang": "es",
"value": "Existe una vulnerabilidad de control de acceso inadecuado en la aplicaci\u00f3n gaizhenbiao/chuanhuchatgpt, espec\u00edficamente en la versi\u00f3n 20240410. Esta vulnerabilidad permite a cualquier usuario del servidor acceder al historial de chat de cualquier otro usuario sin requerir ning\u00fan tipo de interacci\u00f3n entre los usuarios. La explotaci\u00f3n de esta vulnerabilidad podr\u00eda dar lugar a violaciones de datos, incluida la exposici\u00f3n de datos personales sensibles, datos financieros o conversaciones confidenciales. Adem\u00e1s, podr\u00eda facilitar el robo y la manipulaci\u00f3n o fraude de identidad mediante el acceso no autorizado a los historiales de chat de los usuarios. Este problema se debe a mecanismos de control de acceso insuficientes en el manejo de los datos del historial de chat por parte de la aplicaci\u00f3n."
}
],
"metrics": {

View File

@ -2,12 +2,16 @@
"id": "CVE-2024-4743",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-06-05T09:15:10.030",
"lastModified": "2024-06-05T09:15:10.030",
"vulnStatus": "Received",
"lastModified": "2024-06-05T12:53:50.240",
"vulnStatus": "Undergoing Analysis",
"descriptions": [
{
"lang": "en",
"value": "The LifterLMS \u2013 WordPress LMS Plugin for eLearning plugin for WordPress is vulnerable to SQL Injection via the orderBy attribute of the lifterlms_favorites shortcode in all versions up to, and including, 7.6.2 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for authenticated attackers, with Contributor-level access and above, to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database."
},
{
"lang": "es",
"value": "El complemento LifterLMS \u2013 WordPress LMS para eLearning para WordPress es vulnerable a la inyecci\u00f3n SQL a trav\u00e9s del atributo orderBy del shortcode lifterlms_favorites en todas las versiones hasta la 7.6.2 incluida debido a un escape insuficiente en el par\u00e1metro proporcionado por el usuario y a la falta de preparaci\u00f3n suficiente. en la consulta SQL existente. Esto hace posible que los atacantes autenticados, con acceso de nivel de colaborador y superior, agreguen consultas SQL adicionales a consultas ya existentes que pueden usarse para extraer informaci\u00f3n confidencial de la base de datos."
}
],
"metrics": {

View File

@ -2,12 +2,16 @@
"id": "CVE-2024-4821",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-06-05T09:15:10.260",
"lastModified": "2024-06-05T09:15:10.260",
"vulnStatus": "Received",
"lastModified": "2024-06-05T12:53:50.240",
"vulnStatus": "Undergoing Analysis",
"descriptions": [
{
"lang": "en",
"value": "The WP Shortcodes Plugin \u2014 Shortcodes Ultimate plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's su_lightbox shortcode in all versions up to, and including, 7.1.6 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page."
},
{
"lang": "es",
"value": "El complemento WP Shortcodes Plugin \u2014 Shortcodes Ultimate para WordPress es vulnerable a Cross-Site Scripting Almacenado a trav\u00e9s del c\u00f3digo abreviado su_lightbox del complemento en todas las versiones hasta la 7.1.6 incluida debido a una sanitizaci\u00f3n de entrada insuficiente y a un escape de salida en los atributos proporcionados por el usuario. Esto hace posible que atacantes autenticados, con acceso de nivel de colaborador y superior, inyecten scripts web arbitrarios en p\u00e1ginas que se ejecutar\u00e1n cada vez que un usuario acceda a una p\u00e1gina inyectada."
}
],
"metrics": {

View File

@ -2,12 +2,16 @@
"id": "CVE-2024-4886",
"sourceIdentifier": "contact@wpscan.com",
"published": "2024-06-05T06:15:12.443",
"lastModified": "2024-06-05T06:15:12.443",
"vulnStatus": "Received",
"lastModified": "2024-06-05T12:53:50.240",
"vulnStatus": "Undergoing Analysis",
"descriptions": [
{
"lang": "en",
"value": "The contains an IDOR vulnerability that allows a user to comment on a private post by manipulating the ID included in the request"
},
{
"lang": "es",
"value": "Contiene una vulnerabilidad IDOR que permite a un usuario comentar una publicaci\u00f3n privada manipulando la ID incluida en la solicitud."
}
],
"metrics": {},

View File

@ -2,12 +2,16 @@
"id": "CVE-2024-4939",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-06-05T08:15:09.787",
"lastModified": "2024-06-05T08:15:09.787",
"vulnStatus": "Received",
"lastModified": "2024-06-05T12:53:50.240",
"vulnStatus": "Undergoing Analysis",
"descriptions": [
{
"lang": "en",
"value": "The Weaver Xtreme Theme Support plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's div shortcode in all versions up to, and including, 6.4 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page."
},
{
"lang": "es",
"value": "El complemento Weaver Xtreme Theme Support para WordPress es vulnerable a Cross-Site Scripting Almacenado a trav\u00e9s del c\u00f3digo corto div del complemento en todas las versiones hasta la 6.4 incluida debido a una sanitizaci\u00f3n de entrada insuficiente y a un escape de salida en los atributos proporcionados por el usuario. Esto hace posible que atacantes autenticados, con acceso de nivel de colaborador y superior, inyecten scripts web arbitrarios en p\u00e1ginas que se ejecutar\u00e1n cada vez que un usuario acceda a una p\u00e1gina inyectada."
}
],
"metrics": {

View File

@ -2,12 +2,16 @@
"id": "CVE-2024-5006",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-06-05T08:15:09.983",
"lastModified": "2024-06-05T08:15:09.983",
"vulnStatus": "Received",
"lastModified": "2024-06-05T12:53:50.240",
"vulnStatus": "Undergoing Analysis",
"descriptions": [
{
"lang": "en",
"value": "The Boostify Header Footer Builder for Elementor plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the \u2018size\u2019 parameter in all versions up to, and including, 1.3.2 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page."
},
{
"lang": "es",
"value": "El complemento Boostify Header Footer Builder para Elementor para WordPress es vulnerable a Cross-Site Scripting Almacenado a trav\u00e9s del par\u00e1metro 'tama\u00f1o' en todas las versiones hasta la 1.3.2 incluida debido a una sanitizaci\u00f3n de entrada y un escape de salida insuficientes. Esto hace posible que atacantes autenticados, con acceso de nivel de Colaborador y superior, inyecten scripts web arbitrarios en p\u00e1ginas que se ejecutar\u00e1n cada vez que un usuario acceda a una p\u00e1gina inyectada."
}
],
"metrics": {

View File

@ -2,12 +2,16 @@
"id": "CVE-2024-5149",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-06-05T05:15:50.260",
"lastModified": "2024-06-05T05:15:50.260",
"vulnStatus": "Received",
"lastModified": "2024-06-05T12:53:50.240",
"vulnStatus": "Undergoing Analysis",
"descriptions": [
{
"lang": "en",
"value": "The BuddyForms plugin for WordPress is vulnerable to Email Verification Bypass in all versions up to, and including, 2.8.9 via the use of an insufficiently random activation code. This makes it possible for unauthenticated attackers to bypass the email verification."
},
{
"lang": "es",
"value": "El complemento BuddyForms para WordPress es vulnerable a la omisi\u00f3n de verificaci\u00f3n de correo electr\u00f3nico en todas las versiones hasta la 2.8.9 incluida mediante el uso de un c\u00f3digo de activaci\u00f3n insuficientemente aleatorio. Esto hace posible que atacantes no autenticados omitan la verificaci\u00f3n por correo electr\u00f3nico."
}
],
"metrics": {

View File

@ -2,12 +2,16 @@
"id": "CVE-2024-5222",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-06-05T07:15:46.127",
"lastModified": "2024-06-05T07:15:46.127",
"vulnStatus": "Received",
"lastModified": "2024-06-05T12:53:50.240",
"vulnStatus": "Undergoing Analysis",
"descriptions": [
{
"lang": "en",
"value": "The Responsive Addons \u2013 Starter Templates, Advanced Features and Customizer Settings for Responsive Theme. plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's file uploader in all versions up to, and including, 3.0.5 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Author-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page."
},
{
"lang": "es",
"value": "Los complementos Responsive Addons \u2013 Starter Templates, Advanced Features and Customizer Settings for Responsive Theme para WordPress es vulnerable a Cross-Site Scripting Almacenado a trav\u00e9s del cargador de archivos del complemento en todas las versiones hasta la 3.0.5 incluida debido a una sanitizaci\u00f3n de entrada y un escape de salida insuficientes. Esto hace posible que atacantes autenticados, con acceso de nivel de autor y superior, inyecten scripts web arbitrarios en p\u00e1ginas que se ejecutar\u00e1n cada vez que un usuario acceda a una p\u00e1gina inyectada."
}
],
"metrics": {

View File

@ -2,12 +2,16 @@
"id": "CVE-2024-5262",
"sourceIdentifier": "ART@zuso.ai",
"published": "2024-06-05T04:15:11.807",
"lastModified": "2024-06-05T04:15:11.807",
"vulnStatus": "Received",
"lastModified": "2024-06-05T12:53:50.240",
"vulnStatus": "Undergoing Analysis",
"descriptions": [
{
"lang": "en",
"value": "Files or Directories Accessible to External Parties vulnerability in smb server in ProjectDiscovery Interactsh allows remote attackers to read/write any files in the directory and subdirectories of where the victim runs interactsh-server via anonymous login."
},
{
"lang": "es",
"value": "Vulnerabilidad de archivos o directorios accesibles a partes externas en el servidor smb en ProjectDiscovery Interactsh permite a atacantes remotos leer/escribir cualquier archivo en el directorio y subdirectorios donde la v\u00edctima ejecuta interactsh-server mediante un inicio de sesi\u00f3n an\u00f3nimo."
}
],
"metrics": {},

View File

@ -2,12 +2,16 @@
"id": "CVE-2024-5317",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-06-05T02:15:10.163",
"lastModified": "2024-06-05T02:15:10.163",
"vulnStatus": "Received",
"lastModified": "2024-06-05T12:53:50.240",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "The Newsletter plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'np1' parameter in all versions up to, and including, 8.3.4 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page."
},
{
"lang": "es",
"value": "El complemento Newsletter para WordPress es vulnerable a Cross-Site Scripting Almacenado a trav\u00e9s del par\u00e1metro 'np1' en todas las versiones hasta la 8.3.4 incluida debido a una sanitizaci\u00f3n de entrada y un escape de salida insuficientes. Esto hace posible que atacantes no autenticados inyecten scripts web arbitrarios en p\u00e1ginas que se ejecutar\u00e1n cada vez que un usuario acceda a una p\u00e1gina inyectada."
}
],
"metrics": {

View File

@ -2,12 +2,16 @@
"id": "CVE-2024-5439",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-06-05T08:15:10.210",
"lastModified": "2024-06-05T08:15:10.210",
"vulnStatus": "Received",
"lastModified": "2024-06-05T12:53:50.240",
"vulnStatus": "Undergoing Analysis",
"descriptions": [
{
"lang": "en",
"value": "The Blocksy theme for WordPress is vulnerable to Reflected Cross-Site Scripting via the custom_url parameter in all versions up to, and including, 2.0.50 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link."
},
{
"lang": "es",
"value": "El tema Blocksy para WordPress es vulnerable a Cross-Site Scripting Reflejado a trav\u00e9s del par\u00e1metro custom_url en todas las versiones hasta la 2.0.50 incluida debido a una sanitizaci\u00f3n de entrada y un escape de salida insuficientes. Esto hace posible que atacantes no autenticados inyecten scripts web arbitrarios en p\u00e1ginas que se ejecutan si logran enga\u00f1ar a un usuario para que realice una acci\u00f3n como hacer clic en un enlace."
}
],
"metrics": {

View File

@ -2,12 +2,16 @@
"id": "CVE-2024-5453",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-06-05T08:15:10.410",
"lastModified": "2024-06-05T08:15:10.410",
"vulnStatus": "Received",
"lastModified": "2024-06-05T12:53:50.240",
"vulnStatus": "Undergoing Analysis",
"descriptions": [
{
"lang": "en",
"value": "The ProfileGrid \u2013 User Profiles, Groups and Communities plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the pm_dismissible_notice and pm_wizard_update_group_icon functions in all versions up to, and including, 5.8.6. This makes it possible for authenticated attackers, with Subscriber-level access and above, to change arbitrary options to the value '1' or change group icons."
},
{
"lang": "es",
"value": "El complemento ProfileGrid \u2013 User Profiles, Groups and Communities para WordPress es vulnerable a modificaciones no autorizadas de datos debido a una falta de verificaci\u00f3n de capacidad en las funciones pm_dismissible_notice y pm_wizard_update_group_icon en todas las versiones hasta la 5.8.6 incluida. Esto hace posible que atacantes autenticados, con acceso de nivel de suscriptor y superior, cambien opciones arbitrarias al valor '1' o cambien \u00edconos de grupo."
}
],
"metrics": {

View File

@ -0,0 +1,63 @@
{
"id": "CVE-2024-5459",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-06-05T13:15:13.437",
"lastModified": "2024-06-05T13:15:13.437",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "The Restaurant Menu and Food Ordering plugin for WordPress is vulnerable to unauthorized creation of data due to a missing capability check on 'add_section', 'add_menu', 'add_menu_item', and 'add_menu_page' functions in all versions up to, and including, 2.4.16. This makes it possible for authenticated attackers, with Subscriber-level access and above, to create menu sections, menus, food items, and new menu pages."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security@wordfence.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 1.4
}
]
},
"references": [
{
"url": "https://plugins.trac.wordpress.org/browser/food-and-drink-menu/trunk/includes/class-installation-walkthrough.php#L111",
"source": "security@wordfence.com"
},
{
"url": "https://plugins.trac.wordpress.org/browser/food-and-drink-menu/trunk/includes/class-installation-walkthrough.php#L144",
"source": "security@wordfence.com"
},
{
"url": "https://plugins.trac.wordpress.org/browser/food-and-drink-menu/trunk/includes/class-installation-walkthrough.php#L62",
"source": "security@wordfence.com"
},
{
"url": "https://plugins.trac.wordpress.org/browser/food-and-drink-menu/trunk/includes/class-installation-walkthrough.php#L80",
"source": "security@wordfence.com"
},
{
"url": "https://plugins.trac.wordpress.org/changeset/3097599/",
"source": "security@wordfence.com"
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/03f9d9bb-6a87-4da9-bbb0-65203d7250e9?source=cve",
"source": "security@wordfence.com"
}
]
}

View File

@ -2,12 +2,16 @@
"id": "CVE-2024-5483",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-06-05T03:15:08.810",
"lastModified": "2024-06-05T03:15:08.810",
"vulnStatus": "Received",
"lastModified": "2024-06-05T12:53:50.240",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "The LearnPress \u2013 WordPress LMS Plugin plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 4.2.6.8 due to incorrect implementation of get_items_permissions_check function. This makes it possible for unauthenticated attackers to extract basic information about website users, including their emails"
},
{
"lang": "es",
"value": "El complemento LearnPress \u2013 WordPress LMS Plugin para WordPress es vulnerable a la exposici\u00f3n de informaci\u00f3n confidencial en todas las versiones hasta la 4.2.6.8 incluida debido a la implementaci\u00f3n incorrecta de la funci\u00f3n get_items_permissions_check. Esto hace posible que atacantes no autenticados extraigan informaci\u00f3n b\u00e1sica sobre los usuarios del sitio web, incluidos sus correos electr\u00f3nicos."
}
],
"metrics": {

View File

@ -0,0 +1,59 @@
{
"id": "CVE-2024-5526",
"sourceIdentifier": "security@grafana.com",
"published": "2024-06-05T12:15:10.553",
"lastModified": "2024-06-05T12:53:50.240",
"vulnStatus": "Undergoing Analysis",
"descriptions": [
{
"lang": "en",
"value": "Grafana OnCall is an easy-to-use on-call management tool that will help reduce toil in on-call management through simpler workflows and interfaces that are tailored specifically for engineers.\n\nGrafana OnCall, from version 1.1.37 before 1.5.2 are vulnerable to a Server Side Request Forgery (SSRF) vulnerability in the webhook functionallity. \n\nThis issue was fixed in version 1.5.2"
},
{
"lang": "es",
"value": "Grafana OnCall es una herramienta de gesti\u00f3n de guardias f\u00e1cil de usar que ayudar\u00e1 a reducir el trabajo duro en la gesti\u00f3n de guardias a trav\u00e9s de flujos de trabajo e interfaces m\u00e1s simples dise\u00f1ados espec\u00edficamente para ingenieros. Grafana OnCall, desde la versi\u00f3n 1.1.37 anterior a la 1.5.2, es vulnerable a una vulnerabilidad de Server Side Request Forgery (SSRF) en la funcionalidad del webhook. Este problema se solucion\u00f3 en la versi\u00f3n 1.5.2."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security@grafana.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 7.7,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.1,
"impactScore": 4.0
}
]
},
"weaknesses": [
{
"source": "security@grafana.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-918"
}
]
}
],
"references": [
{
"url": "https://grafana.com/security/security-advisories/cve-2024-5526/",
"source": "security@grafana.com"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-5536",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-06-05T10:15:09.170",
"lastModified": "2024-06-05T10:15:09.170",
"vulnStatus": "Received",
"lastModified": "2024-06-05T12:53:50.240",
"vulnStatus": "Undergoing Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,12 +2,16 @@
"id": "CVE-2024-5571",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-06-05T09:15:10.463",
"lastModified": "2024-06-05T09:15:10.463",
"vulnStatus": "Received",
"lastModified": "2024-06-05T12:53:50.240",
"vulnStatus": "Undergoing Analysis",
"descriptions": [
{
"lang": "en",
"value": "The EmbedPress \u2013 Embed PDF, Google Docs, Vimeo, Wistia, Embed YouTube Videos, Audios, Maps & Embed Any Documents in Gutenberg & Elementor plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'url' attribute within the plugin's EmbedPress PDF widget in all versions up to, and including, 4.0.1 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page."
},
{
"lang": "es",
"value": "El complemento EmbedPress \u2013 Embed PDF, Google Docs, Vimeo, Wistia, Embed YouTube Videos, Audios, Maps & Embed Any Documents in Gutenberg & Elementor para WordPress es vulnerable a Cross-Site Scripting Almacenado a trav\u00e9s del atributo 'url' dentro del widget EmbedPress PDF del complemento en todas las versiones hasta la 4.0.1 incluida debido a una sanitizaci\u00f3n de entrada insuficiente y a un escape de salida en los atributos proporcionados por el usuario. Esto hace posible que atacantes autenticados, con acceso de nivel de colaborador y superior, inyecten scripts web arbitrarios en p\u00e1ginas que se ejecutar\u00e1n cada vez que un usuario acceda a una p\u00e1gina inyectada."
}
],
"metrics": {

View File

@ -2,12 +2,16 @@
"id": "CVE-2024-5635",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-06-04T22:15:10.833",
"lastModified": "2024-06-04T22:15:10.833",
"vulnStatus": "Received",
"lastModified": "2024-06-05T12:53:50.240",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was found in itsourcecode Bakery Online Ordering System 1.0. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file index.php. The manipulation of the argument txtsearch leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-267091."
},
{
"lang": "es",
"value": "Se encontr\u00f3 una vulnerabilidad en el c\u00f3digo fuente Bakery Online Ordering System 1.0. Ha sido declarada cr\u00edtica. Una funci\u00f3n desconocida del archivo index.php es afectada por esta vulnerabilidad. La manipulaci\u00f3n del argumento txtsearch conduce a la inyecci\u00f3n de SQL. El ataque se puede lanzar de forma remota. El exploit ha sido divulgado al p\u00fablico y puede utilizarse. El identificador asociado de esta vulnerabilidad es VDB-267091."
}
],
"metrics": {

View File

@ -2,12 +2,16 @@
"id": "CVE-2024-5636",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-06-05T01:15:11.470",
"lastModified": "2024-06-05T01:15:11.470",
"vulnStatus": "Received",
"lastModified": "2024-06-05T12:53:50.240",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was found in itsourcecode Bakery Online Ordering System 1.0. It has been rated as critical. Affected by this issue is some unknown functionality of the file report/index.php. The manipulation of the argument procduct leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-267092."
},
{
"lang": "es",
"value": "Se encontr\u00f3 una vulnerabilidad en itsourcecode Bakery Online Ordering System 1.0. Ha sido calificada como cr\u00edtica. Una funci\u00f3n desconocida del archivo report/index.php es afectada por esta vulnerabilidad. La manipulaci\u00f3n del argumento producto conduce a la inyecci\u00f3n de SQL. El ataque puede lanzarse de forma remota. El exploit ha sido divulgado al p\u00fablico y puede utilizarse. El identificador de esta vulnerabilidad es VDB-267092."
}
],
"metrics": {

View File

@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update
```plain
2024-06-05T12:01:14.370310+00:00
2024-06-05T14:00:46.105225+00:00
```
### Most recent CVE Modification Timestamp synchronized with NVD
```plain
2024-06-05T11:15:08.490000+00:00
2024-06-05T13:15:13.437000+00:00
```
### Last Data Feed Release
@ -33,22 +33,48 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
### Total Number of included CVEs
```plain
252704
252708
```
### CVEs added in the last Commit
Recently added CVEs: `2`
Recently added CVEs: `4`
- [CVE-2024-4001](CVE-2024/CVE-2024-40xx/CVE-2024-4001.json) (`2024-06-05T11:15:08.490`)
- [CVE-2024-5536](CVE-2024/CVE-2024-55xx/CVE-2024-5536.json) (`2024-06-05T10:15:09.170`)
- [CVE-2024-1662](CVE-2024/CVE-2024-16xx/CVE-2024-1662.json) (`2024-06-05T12:15:10.213`)
- [CVE-2024-3469](CVE-2024/CVE-2024-34xx/CVE-2024-3469.json) (`2024-06-05T13:15:12.707`)
- [CVE-2024-5459](CVE-2024/CVE-2024-54xx/CVE-2024-5459.json) (`2024-06-05T13:15:13.437`)
- [CVE-2024-5526](CVE-2024/CVE-2024-55xx/CVE-2024-5526.json) (`2024-06-05T12:15:10.553`)
### CVEs modified in the last Commit
Recently modified CVEs: `1`
Recently modified CVEs: `66`
- [CVE-2024-31380](CVE-2024/CVE-2024-313xx/CVE-2024-31380.json) (`2024-06-05T11:15:08.230`)
- [CVE-2024-4001](CVE-2024/CVE-2024-40xx/CVE-2024-4001.json) (`2024-06-05T12:53:50.240`)
- [CVE-2024-4084](CVE-2024/CVE-2024-40xx/CVE-2024-4084.json) (`2024-06-05T12:53:50.240`)
- [CVE-2024-4088](CVE-2024/CVE-2024-40xx/CVE-2024-4088.json) (`2024-06-05T12:53:50.240`)
- [CVE-2024-4219](CVE-2024/CVE-2024-42xx/CVE-2024-4219.json) (`2024-06-05T12:53:50.240`)
- [CVE-2024-4220](CVE-2024/CVE-2024-42xx/CVE-2024-4220.json) (`2024-06-05T12:53:50.240`)
- [CVE-2024-4231](CVE-2024/CVE-2024-42xx/CVE-2024-4231.json) (`2024-06-05T13:15:12.980`)
- [CVE-2024-4232](CVE-2024/CVE-2024-42xx/CVE-2024-4232.json) (`2024-06-05T13:15:13.190`)
- [CVE-2024-4295](CVE-2024/CVE-2024-42xx/CVE-2024-4295.json) (`2024-06-05T12:53:50.240`)
- [CVE-2024-4520](CVE-2024/CVE-2024-45xx/CVE-2024-4520.json) (`2024-06-05T12:53:50.240`)
- [CVE-2024-4743](CVE-2024/CVE-2024-47xx/CVE-2024-4743.json) (`2024-06-05T12:53:50.240`)
- [CVE-2024-4821](CVE-2024/CVE-2024-48xx/CVE-2024-4821.json) (`2024-06-05T12:53:50.240`)
- [CVE-2024-4886](CVE-2024/CVE-2024-48xx/CVE-2024-4886.json) (`2024-06-05T12:53:50.240`)
- [CVE-2024-4939](CVE-2024/CVE-2024-49xx/CVE-2024-4939.json) (`2024-06-05T12:53:50.240`)
- [CVE-2024-5006](CVE-2024/CVE-2024-50xx/CVE-2024-5006.json) (`2024-06-05T12:53:50.240`)
- [CVE-2024-5149](CVE-2024/CVE-2024-51xx/CVE-2024-5149.json) (`2024-06-05T12:53:50.240`)
- [CVE-2024-5222](CVE-2024/CVE-2024-52xx/CVE-2024-5222.json) (`2024-06-05T12:53:50.240`)
- [CVE-2024-5262](CVE-2024/CVE-2024-52xx/CVE-2024-5262.json) (`2024-06-05T12:53:50.240`)
- [CVE-2024-5317](CVE-2024/CVE-2024-53xx/CVE-2024-5317.json) (`2024-06-05T12:53:50.240`)
- [CVE-2024-5439](CVE-2024/CVE-2024-54xx/CVE-2024-5439.json) (`2024-06-05T12:53:50.240`)
- [CVE-2024-5453](CVE-2024/CVE-2024-54xx/CVE-2024-5453.json) (`2024-06-05T12:53:50.240`)
- [CVE-2024-5483](CVE-2024/CVE-2024-54xx/CVE-2024-5483.json) (`2024-06-05T12:53:50.240`)
- [CVE-2024-5536](CVE-2024/CVE-2024-55xx/CVE-2024-5536.json) (`2024-06-05T12:53:50.240`)
- [CVE-2024-5571](CVE-2024/CVE-2024-55xx/CVE-2024-5571.json) (`2024-06-05T12:53:50.240`)
- [CVE-2024-5635](CVE-2024/CVE-2024-56xx/CVE-2024-5635.json) (`2024-06-05T12:53:50.240`)
- [CVE-2024-5636](CVE-2024/CVE-2024-56xx/CVE-2024-5636.json) (`2024-06-05T12:53:50.240`)
## Download and Usage

View File

@ -196779,12 +196779,12 @@ CVE-2022-28649,0,0,f1459dfcb8d006a8f7ecef3336d09e104d10b7fce2a7a8ef406316352eedb
CVE-2022-2865,0,0,4baeb1e634cb2824a8e6db64787dc59bab5ddddbf1e7d2ee665afc57eae430ce,2022-10-19T17:31:13.797000
CVE-2022-28650,0,0,2160d92107c00a756980b3b7a89911e4bb9f67416ebf601fbedcb107ca0aa1a9,2022-04-18T10:18:20.503000
CVE-2022-28651,0,0,20c1a1809984744c3b6c3b6baf1e1de5df12ea0b4352779e2e1135a354356771,2022-04-18T18:34:31.143000
CVE-2022-28652,0,0,f6160795f0a537e2441fd9f3240b1a4247a909563f95d2ae6910b6624f114486,2024-06-04T22:15:09.780000
CVE-2022-28654,0,0,caf59093a9449f227e5848da136d7233e039f13f61a5744cc464209c811daba2,2024-06-04T22:15:09.870000
CVE-2022-28655,0,0,58e2d2f2317f48af5f129fc6df32d422db4c1b9774373f8ee9273f2ed7edeee8,2024-06-04T22:15:09.940000
CVE-2022-28656,0,0,b914f71d03565982025df33710ace2ca066fea9bdf8c37342e8ac0e0d0dccbe0,2024-06-04T22:15:10.007000
CVE-2022-28657,0,0,01def96f461d049845a9bbc150bd4eea197cb660ef61313211aa92210ef916cd,2024-06-04T22:15:10.087000
CVE-2022-28658,0,0,3be2b49a096088250a1185bc79abc3c9e29544ff6ef1f107bca27d30da675357,2024-06-04T22:15:10.153000
CVE-2022-28652,0,1,9418d40161244d69ffed3263449a0ca0a621472c0ed9870ca4a97141094f9a31,2024-06-05T12:53:50.240000
CVE-2022-28654,0,1,2729ca223915e6b98798a6e9b0b9b2f54681df2904099f1cb8621e9ee00d5a88,2024-06-05T12:53:50.240000
CVE-2022-28655,0,1,482320c0f20baa25e1925a87250292dec2effad26ed392d220ba6923856acfd2,2024-06-05T12:53:50.240000
CVE-2022-28656,0,1,e2aa6838c286aecb2f7fe9d229c37aceb3d43b8da7c52fba105f38c9044db5a7,2024-06-05T12:53:50.240000
CVE-2022-28657,0,1,531749e83b4dd1173943b93b02164dee7b801df070ebf7e25af69306bf97b764,2024-06-05T12:53:50.240000
CVE-2022-28658,0,1,52748d0f77b44f8652390140b7ed4a8ad4b2bcb515ef06f9e00ba4e6ebb75c79,2024-06-05T12:53:50.240000
CVE-2022-2866,0,0,39936636c7b18b74703b9b6f9b14aacde95244838843f9eb43e74857aedd50d3,2022-09-02T22:02:57.273000
CVE-2022-28660,0,0,56c6ace0e4d9c9af155b31cd3cc2403dccde1c6848618344b9372c4d85c50f7f,2022-10-07T15:45:37.153000
CVE-2022-28661,0,0,bbfe8460bffe6f8fc9b166d47e50b1e6f91f964c6534918a6a23dce6596730e9,2022-04-19T18:36:54.557000
@ -241234,10 +241234,10 @@ CVE-2024-1157,0,0,c47361e1397b03eed535508c9ec506a27255415c46de202eb894db1bcf5cb3
CVE-2024-1158,0,0,995dea25d678a81957450018def2710d810650928efacbe0a4cd027592c45fcd,2024-03-13T18:16:18.563000
CVE-2024-1159,0,0,d0250faef462038e0120055a7c1a6779f3d892d3b8c2c1aaf5ccce9550779728,2024-02-13T14:01:00.987000
CVE-2024-1160,0,0,c82942832f2bf6c3ff41a88402b9dca5a934aaf9eae2920b01f254b593b20d40,2024-02-13T14:01:00.987000
CVE-2024-1161,0,0,6b91af3e18b1f072d7f4cc8031e43b42cedc6d4b6c6ab109f49637b951916a4f,2024-06-05T06:15:09.010000
CVE-2024-1161,0,1,60b5901c5858c281718f94c511bd0cfd8f84179eca326424451e3ec1cc125a4f,2024-06-05T12:53:50.240000
CVE-2024-1162,0,0,5f2954147a2ad0bfda8f51ea41ff0a374d1e4a1c83a2e06e1e47465f3c5f70b8,2024-02-08T14:22:37.180000
CVE-2024-1163,0,0,c0817c91ae84923184209dc3c71e6209d979097a49b0e341f691fe7193cd2db3,2024-02-29T15:15:07.473000
CVE-2024-1164,0,0,26046e2b3dd096eefbcd5b8dcc8d04e8411fb9142e8a1e4c5de30439e6e80651,2024-06-05T07:15:45.310000
CVE-2024-1164,0,1,24df03029a70153116b0af902b93010b8aee882bf45630401f0cc4dfe70c3da9,2024-06-05T12:53:50.240000
CVE-2024-1165,0,0,09d0c48437e50305f6b70b9aab3bb8805a9bc240d0fb341de398e33a6ad98f02,2024-02-26T16:32:25.577000
CVE-2024-1166,0,0,cbc50c0645991c69523344b23f8a84819598bdfdeb24c5f4ba7570f86b9c6398,2024-05-14T16:13:02.773000
CVE-2024-1167,0,0,646f860ad24a5198d530bba39bcdba3b9fb385431091cfa90a0190891cfad025,2024-02-09T20:20:51.900000
@ -241334,7 +241334,7 @@ CVE-2024-1266,0,0,5dd53fa554a7634e1c048a8f95923aa3088a9a992e77cce161d6c3e73b044c
CVE-2024-1267,0,0,e1baf417ea5b1200261bbe0e762e7d306442092cb87ea0c0daf956e73a64be41,2024-05-17T02:35:21.940000
CVE-2024-1268,0,0,a71f6831ef4e801110d9a785c473764d7dc4eb42bf088dcd5198930cf6d73f8c,2024-05-17T02:35:22.040000
CVE-2024-1269,0,0,c0e96ce08aa8cc4b0c5c9b01a4dfe6413b6a1aa0ecfba529b99ff41ed595060e,2024-05-17T02:35:22.143000
CVE-2024-1272,0,0,2db590adf1e128bc28ed4e0057f0348cac0353dc56ffd935e6fae1513e6e3ba0,2024-06-05T09:15:09.620000
CVE-2024-1272,0,1,7ca3476db09a816981caa2aad90cdfaad8ea4a4f66acd8ca384bb00dac3bc5a5,2024-06-05T12:53:50.240000
CVE-2024-1273,0,0,0a310035a5b694469d93d82e5859918e80208ec594b8c8228e8be9ae18ebdda5,2024-03-12T12:40:13.500000
CVE-2024-1274,0,0,e620aeced049d61f6d382460fbf5059a46434714ff81966b55927aa96a1401ee,2024-04-02T12:50:42.233000
CVE-2024-1275,0,0,bf26cd5e632f2b0f1b86a7cb8d63ebc17497163a682c8c1239e0557cf3b49995,2024-05-31T19:14:47.793000
@ -241667,6 +241667,7 @@ CVE-2024-1657,0,0,a497f7c000aaae813c345480c074db7bfac8435097b4ea8536600de4b426af
CVE-2024-1658,0,0,bd2757c2314dc2f8bd52ce15b18a6ca41069d2e3f9ff401d7a725ad82b1db09d,2024-03-18T19:40:00.173000
CVE-2024-1660,0,0,068c83f9afc694d855bcbb99610bd3ca5f918af7baf81b6ceb2a3be3520f6bf7,2024-04-15T13:15:31.997000
CVE-2024-1661,0,0,b7671ba7b0cc968bc464682e512c319d5a4f7189c60b340cf16a0b0c1d49a626,2024-05-17T02:35:32.207000
CVE-2024-1662,1,1,d2466e5ce29cf8919b6d4113bb6dbefd23ad12a1cb22023d3c42bec7a5a67e67,2024-06-05T12:53:50.240000
CVE-2024-1664,0,0,c240cf09d136b8ae3766d60b95066ae5935a6052d7cd59ed400a537e65636ac2,2024-04-09T12:48:04.090000
CVE-2024-1665,0,0,85850268afa8f45cb216640500e9f9bf4c397be3fcaf3ba3d1fb4051141bde34,2024-04-16T13:24:07.103000
CVE-2024-1666,0,0,a40e8fc9293cfb1145d3e1e7f135accc0146030f08ee21589fc7baafb865977a,2024-04-16T13:24:07.103000
@ -241909,7 +241910,7 @@ CVE-2024-1935,0,0,a7f7eb7b74a22681adc4071f1d8733546534bbce79c7b6b4b422bbf2e64105
CVE-2024-1936,0,0,7b3792457d5905a49db010db7b736af0c923e8894b5bdd1a854744f20603a17d,2024-03-23T12:15:08.453000
CVE-2024-1938,0,0,24dc90499c61d902708c3560ef4b72bc4a3172c10dbf5b005bb9075fcee4ff4b,2024-03-07T23:15:07.177000
CVE-2024-1939,0,0,862ed503c4cd6a96fea863f557f2290de2baf913d152cc1cb93720d0bf768f1c,2024-03-07T23:15:07.250000
CVE-2024-1940,0,0,2fe903c72b21b896e9f0b18cd7302ecb17306bdcf8cd11dcb83068a71594d5cd,2024-06-05T06:15:09.780000
CVE-2024-1940,0,1,94d085d56322d2a310dbe1e68a5979b594a65e347820bea0716a77c1d9ab272c,2024-06-05T12:53:50.240000
CVE-2024-1941,0,0,2deee38d49f655dc85a14e0f9cc0860e5fd72126cfed04ebe024762ac27ab897,2024-03-01T14:04:26.010000
CVE-2024-1942,0,0,980efc55f5eab41cf2c4f30738d9bba260cb2905950fe4e94d5f18fcbaafef3e,2024-02-29T13:49:29.390000
CVE-2024-1943,0,0,12241ffd50e07c2810c1836c3e8f27c317becac2e0f94ec708a8bb306904594f,2024-02-28T14:06:45.783000
@ -242383,7 +242384,7 @@ CVE-2024-20866,0,0,58d3db3c436cd4edcfbee612570f2e77cc32989fe5de8d87bea6a0e56551a
CVE-2024-20867,0,0,0e6b5e18a9f86247a6a1090b01cf596581daded4155bfbc09972d6cdc5714d2a,2024-05-07T13:39:32.710000
CVE-2024-20868,0,0,23d1ca1dba7a2ad9810a7b603f4dc59801094aa235b5516b22a3aa3c056e5066,2024-05-07T13:39:32.710000
CVE-2024-20869,0,0,205bcfae207f01cfe9e76e25dfb8358434940d02212d78ea178f2e739e243546,2024-05-07T13:39:32.710000
CVE-2024-2087,0,0,0d62a549ffc6556068b093343ad599a4ca1ecc0c53b01f7c29946b57d38406fe,2024-06-05T06:15:10.833000
CVE-2024-2087,0,1,4bfa6b5320d599c49c5c3edd2f0d2e3ebb8b69d42b842cd5b758a35acbe93a6b,2024-06-05T12:53:50.240000
CVE-2024-20870,0,0,247de2e7cb6c1589f56f1a1780b91fbe4feee02648b4f01650496931882d0b24,2024-05-07T13:39:32.710000
CVE-2024-20871,0,0,4b5019addc2549a143f67a36860f5a0576db2a31268cf1be920df7487aeaeae8,2024-05-07T13:39:32.710000
CVE-2024-20872,0,0,f057840a1e0e70ef07c9af92e3c53b5e58e8fd31ea1c15cdb3fe23cd840da357,2024-05-07T13:39:32.710000
@ -243495,7 +243496,7 @@ CVE-2024-22563,0,0,e68d7fb0548f09a5ec2c02ea3bc2e400b99a4a7ece951a19b220371a41585
CVE-2024-22567,0,0,37499b14fc95be5de51f415505f023a34c878497b34bd94665d0d5d9fc0f3959,2024-02-14T19:54:19.663000
CVE-2024-22568,0,0,b7d805911224b1ae0c1c8858ee61b49b9c11cc28a75ce32a84caadcf77d4e108,2024-01-20T18:49:52.490000
CVE-2024-22569,0,0,bee3ca02120bb4729d62660d17afd0816ef9535b004ff125be13883d678f5fb9,2024-02-06T18:07:39.733000
CVE-2024-2257,0,0,5bfec26c749f56d8963d8059c1e9ffd15006f3253fd98b65d0a3a5ea4c6fa7f8,2024-05-14T16:13:02.773000
CVE-2024-2257,0,1,e0de8fd35bb16723a00e051e40382b6adae8db85ef6ac2955ba0b6721d22478a,2024-06-05T13:15:12.557000
CVE-2024-22570,0,0,c41ee5b58f7f6a9dd8b89c3af365a9d60dc2b413d2b344b295ffdf6e10d67e91,2024-02-02T23:32:46.897000
CVE-2024-2258,0,0,0a2d974520f3aded55b51d15a5993f56250b1aed189d20a50869de8aedadc1c1,2024-04-29T12:42:03.667000
CVE-2024-22588,0,0,a2c6cd05590470f0279e75fb12dad64f1e0ed398a983cfaa98608323ce35b7b6,2024-05-24T18:09:20.027000
@ -243873,7 +243874,7 @@ CVE-2024-23322,0,0,efdd5208c12e6ab610c84f708ac54206d4a8e094359274c8f3041236f4686
CVE-2024-23323,0,0,9ef57ef11998f55bee596cb29f1fbe7dc637ddbdf2aa13fe046f9f2eea8d8f88,2024-02-15T04:48:09.937000
CVE-2024-23324,0,0,35720c684b54e965146363a2e121313965ffb87bf31cdf01edc9c60f19b814c6,2024-02-15T04:46:33.747000
CVE-2024-23325,0,0,70301add03c2e2278861270a456ddd507fac1caa8f238d4654fa7a889c0634df,2024-02-15T04:46:07.523000
CVE-2024-23326,0,0,659097eb51545241961f039332840059ad67d2f369db66b13e2bd8ce5e7b4906,2024-06-04T21:15:33.440000
CVE-2024-23326,0,1,cbb16a6886794de53901feff38e5eb60c6f098492f246badd6bdbbc1e4996e60,2024-06-05T12:53:50.240000
CVE-2024-23327,0,0,23e7e171aa9435048ef128fcb499e07e85d88191467319d42823b5790591ee1c,2024-02-15T04:45:57.207000
CVE-2024-23328,0,0,c6365a32f3e08f9ae9322d77197538e35765bb36247196fdd4549570c228c068,2024-02-29T13:49:29.390000
CVE-2024-23329,0,0,0872cee4434cd36ea6d6e070e0df43a79e4470fecf3359a8aa00c845af990886,2024-01-26T20:19:59.393000
@ -244071,7 +244072,7 @@ CVE-2024-23664,0,0,fef7b517001d2c9ded36e59d6e6f76dd4dad49d2f1a97c16a9e2d13b88233
CVE-2024-23665,0,0,9b721572a9eab0f097d40ba2bb4435bfadacb0c946c8971f2e8262fe3a7027b8,2024-06-03T14:46:24.250000
CVE-2024-23667,0,0,56789b6d65cfb24cf53469fc30bd1ef9ec2c55d090fed01acd87410507e26bb2,2024-06-03T14:46:24.250000
CVE-2024-23668,0,0,f824ecc20d8a28779421def62b365e05c131b29e7f5f1b0a1c4c94219889443e,2024-06-03T14:46:24.250000
CVE-2024-23669,0,0,0cc7f72a8491d01671d47f311e81b6a2db9eec3e950a816995bcbfb67b5c5fa0,2024-06-05T08:15:09.537000
CVE-2024-23669,0,1,b451250ce634cd7ae9d86a4a9aea45aef5b8abb759a627e8325592b3a9deecc5,2024-06-05T12:53:50.240000
CVE-2024-23670,0,0,4d67c08986dae2f7effe1d794f6cb5ef791bdddbdc24c82df7382f96f5b8f09b,2024-06-03T14:46:24.250000
CVE-2024-23671,0,0,108c61a6aa74a9b71687a2e3aa153a422c4a0c3adcd258415c5b065e1ef21ae7,2024-04-10T13:24:22.187000
CVE-2024-23672,0,0,ecf21cf6fef0fb9a72fe820ee02e2854b5a2d1575ce42cd766c4a52761cff3de,2024-05-01T18:15:14.357000
@ -244082,7 +244083,7 @@ CVE-2024-23676,0,0,56ef125eb2696d6a370cb1fcee9cbf4c70187c994325783ccd00cee906067
CVE-2024-23677,0,0,5002fb89610cfd38f5d468dc18f3c5331733998bb74f1ff07d319dde587b2882,2024-04-10T01:15:18.390000
CVE-2024-23678,0,0,5d448947bf54ec004c72c54b20b24d8bf3a971bcebd8f73c5e7293fdadfe4a1b,2024-04-10T01:15:18.543000
CVE-2024-23679,0,0,640c7c61fdad62898ad4f1df55f17c5c64134e2dc64c7047206373e2ec219dcc,2024-01-26T19:12:45.117000
CVE-2024-2368,0,0,6d8fd48fa8d3f24a2a0e5985f428af6c1c9ac3d702fa6817f3892fa1d7924b80,2024-06-05T07:15:45.690000
CVE-2024-2368,0,1,7de27d6c3df4c6eb86124ff3122bfe8eca34e7e15a20b125486fdfcde52ccee8,2024-06-05T12:53:50.240000
CVE-2024-23680,0,0,65bdb0a5f8b9a48a1100a0dc9afd500ed5d0157f9effc3b8f1a9f7c133b834bf,2024-01-26T19:08:47.817000
CVE-2024-23681,0,0,5784aa8d00dbad48397c875e3410cbaf00b669b08aed5acdb560ab01d2b57314,2024-01-26T15:08:04.263000
CVE-2024-23682,0,0,051b25f120cad0cdd9a52c659e33751066e3fa9d41bbdc9f8e31ffa7e2662331,2024-01-26T15:08:33.007000
@ -244876,7 +244877,7 @@ CVE-2024-2509,0,0,d87071763c3f045575858adf9ceada540509d3a47b1787f91e2dde65a00443
CVE-2024-25091,0,0,01b357047b564e780ed13b7e87b2fb8ec79ae12ad4e744cc9437e3dc74a94964,2024-03-01T14:04:04.827000
CVE-2024-25093,0,0,c29d732f68144a1dd5d537415c8d51940073ac1e6ff114431aa6a52d78b263f0,2024-02-29T13:49:29.390000
CVE-2024-25094,0,0,6ba9f5c53aa4aac51446efc522144ae35e985d8a070a664685b43e0df39aa007,2024-02-29T13:49:29.390000
CVE-2024-25095,0,0,0a1cef49311fad3aae9197630beb4a9ab85fac520fe73f83aff35e5dc3200b12,2024-06-04T19:18:45.170000
CVE-2024-25095,0,1,1e7be9a94516641641f1871a857f01f88977c81cd208dddda622d6726fd6d72e,2024-06-05T12:53:50.240000
CVE-2024-25096,0,0,197459782cea6a70dfd744624d830ac31075b0aba6f9593eca13f5ad0ec0cbd0,2024-04-03T17:24:18.150000
CVE-2024-25097,0,0,b09bd692195a6af2bdcd0c616f06807fc50a89e84d1ede17ca925d89de84c8a4,2024-03-13T18:15:58.530000
CVE-2024-25098,0,0,028b98ef9a2084a8173d1d38eecdc4136ac8af6138dca7ba8312806912dc26e0,2024-02-29T13:49:29.390000
@ -246939,7 +246940,7 @@ CVE-2024-28099,0,0,73e4b6f4e302601dee04aa1fa8e82b6137bc81ff22a37186241bc9bd72ade
CVE-2024-2810,0,0,2c3ff0e8ac5c36f768fa31b8f69ccb9e5f88ff34163ac424caf94fb3a746b419,2024-05-17T02:38:31.447000
CVE-2024-28101,0,0,01541a2740ce2ffbd34e7de916ee530e34d9051f1ee53f417345ced9c3bece74,2024-03-21T12:58:51.093000
CVE-2024-28102,0,0,dd908b176fa8700f78af6b8a5980e30508069b806d1be433d10a42940d9f6918,2024-03-21T12:58:51.093000
CVE-2024-28103,0,0,1430a1051129bbc98000c90a22d2239b01eb76c97d25df9cf328d0b33a6e7271,2024-06-04T20:15:10.237000
CVE-2024-28103,0,1,8aae0bdb3d509ae6298eb3762f72fa38efed7e172de055435aaa7ecaf408470d,2024-06-05T12:53:50.240000
CVE-2024-28105,0,0,fcc764ac1e5fa24a7cdc91807ca008992de501a32669f46e1eff534ca8e7d49a,2024-03-26T12:55:05.010000
CVE-2024-28106,0,0,a89dc0ca5c060b8348ae8f0c0d823137664e9265682cb4445ed694e0c7db5aff,2024-03-26T12:55:05.010000
CVE-2024-28107,0,0,67b11d5219b0b9f786e274d36c6219cc6a62e589b1f556fced90abc2232753f8,2024-03-26T12:55:05.010000
@ -247526,7 +247527,7 @@ CVE-2024-29149,0,0,0a051cd70f444c7f076a038ef5a239651e0124faf2741d58016b91f08f7da
CVE-2024-2915,0,0,964dabbde545b1ee227255a721578c284dc9872f1078b9295a9169d877ce4d6c,2024-03-26T17:09:53.043000
CVE-2024-29150,0,0,062126a35544b774d6fb58afd2d590a447c3aac593c727f888b79a1635063392,2024-05-07T20:07:58.737000
CVE-2024-29151,0,0,ef852a662e1eaee7e15d971ee7451f2c3e954b3d808a30cb9a36bbe68bb24c8f,2024-03-18T12:38:25.490000
CVE-2024-29152,0,0,4e1c39d4559145b7c5edb2e56399639ade0a619802f87efeab24b919fec96c6d,2024-06-04T19:19:07.620000
CVE-2024-29152,0,1,9d6136a21b141965839cf4cc13570f1c3ccdb4b96bbb96c7a7b88af6d40c4771,2024-06-05T12:53:50.240000
CVE-2024-29154,0,0,dab131c9ff393e828252009730d8617a5e1a4fb5cfb7f2db054056bc6f27c2ba,2024-03-18T12:38:25.490000
CVE-2024-29156,0,0,98cbc37d07cb77607ab83580cc50ba5a01141613b7a3bb770966a3d6831e2326,2024-03-18T12:38:25.490000
CVE-2024-29157,0,0,0ffca9c85400879d2350f7e41592fe36ba7fd13fff06f556ca5f1be60327b7a3,2024-05-14T16:13:02.773000
@ -247964,7 +247965,7 @@ CVE-2024-2997,0,0,3a578291c3b241bab600655a4ba011b593bae43f4bacaa35e28ecb654fca1f
CVE-2024-29972,0,0,6eb07d32580185ea51f927f67f2978b808addad4d830734cf44d0e61f642dd0c,2024-06-05T06:15:10.307000
CVE-2024-29973,0,0,fed305ac9bbfd8a3bcb05f4012099f51e000b0123ac4db28d9d3e1a93ebbff3b,2024-06-05T04:15:11.330000
CVE-2024-29974,0,0,0fabd0ed87d1a17e2d57c3925a4a991d1b1c401d215c10f3d80cab083de41ead,2024-06-05T06:15:10.657000
CVE-2024-29975,0,0,49c807a12409727c8a1afb2f2806b07c0d451dfb8359eeb78ceb9a9de79debef,2024-06-05T04:15:11.617000
CVE-2024-29975,0,1,e1854e5ca81cfeff5d0c1bda31c43cb66e4ccc1d3b700107211d85fe54797d4b,2024-06-05T13:15:12.107000
CVE-2024-29976,0,0,0fa1d772a8223241204b7c64472e90f5c1bb1a92000917507c17fda5770ef8d0,2024-06-04T20:15:10.677000
CVE-2024-2998,0,0,eefb5ffb4f4c69125c8918f19ada8e94baebaa500baf95dbd5f811afe3390da3,2024-05-17T02:38:41.883000
CVE-2024-29981,0,0,b762af1b8e0b46a6fed26152fe7346562730b9b9166ba9906ede0af07fe94bd1,2024-05-28T23:15:17.270000
@ -248348,7 +248349,7 @@ CVE-2024-3048,0,0,4dcedcaa78b591cdd60323c2fe1598a52cf4e06ae133e6cc58809008ef557e
CVE-2024-30480,0,0,9546cbc650c6f7e364bcf65bdd8137d4963e25a2443b4557916c31263a8a88d7,2024-05-17T18:36:05.263000
CVE-2024-30482,0,0,570bede6c16b4a7f5e8b36059aeda7f1a299c81f1153ac528a60791c716caf63,2024-04-01T01:12:59.077000
CVE-2024-30483,0,0,6c48131c3767e81f61ec34b0bc223a59e072c0c0b055c8c0e04f20b2876077ea,2024-03-29T13:28:22.880000
CVE-2024-30484,0,0,68ba10c9338d95a1a7cf42008526fd5e069ee563324c640cb441ac81197547e8,2024-06-04T19:19:24.800000
CVE-2024-30484,0,1,a6d4ccd88422e9dc714db6fda7522786213a0ebd9e4df5ddb2efd0acbc74f3d0,2024-06-05T12:53:50.240000
CVE-2024-30486,0,0,3b668ae931cda4b6a387bfa69ea17dffa696817ef5a0dd2b2ba0b8d1d89d01a9,2024-04-01T01:12:59.077000
CVE-2024-30487,0,0,8478a9894c02433324d52a7694bbe43e86c58bc36ce6feb0280d7b18225d7d5b,2024-04-01T01:12:59.077000
CVE-2024-30488,0,0,9fdeb2b805850984cf4d5d3f20362f356c5feecfdc17015a244efcf21ce430a4,2024-04-01T01:12:59.077000
@ -248387,10 +248388,10 @@ CVE-2024-30521,0,0,831f25d28a4eccbee0c9a477ea2d8542d4b6a09da45b2ed1bac270363725b
CVE-2024-30522,0,0,52231b69f26c5a58b4ea5de11a6776cc3a49889521ce951fb83a4aaa3cf9a331,2024-05-17T18:36:05.263000
CVE-2024-30523,0,0,0cef256089f66b1e0cf2f5994c8e2a08b4afb817483e2b78f98835367339d575,2024-04-01T01:12:59.077000
CVE-2024-30524,0,0,3f617e1e45b1122d6b1034d70f29ff7cb7551f904c4e8a57e14430a05ec497b2,2024-04-01T01:12:59.077000
CVE-2024-30525,0,0,6125ac81f6ceae8fa8ae9f228cabf653fddd6ab5e57397a03d19975cee8f9582,2024-06-04T20:15:10.780000
CVE-2024-30525,0,1,bd91a1a2dc55dc9a20965ef673718df7c4a5f3cacae3289c55697ded3055b159,2024-06-05T12:53:50.240000
CVE-2024-30526,0,0,104d793a66172acd99ba27a22d83ba8e2d51aa54cd9b15f3bc6afe8a835c5254,2024-04-01T01:12:59.077000
CVE-2024-30527,0,0,27e4c5629e352d9d487ea96a5699b7f5113e11cf1c874e376c67a5c6e270b939,2024-05-17T18:36:05.263000
CVE-2024-30528,0,0,c799df1f06701f30f9c1fd0ef914983eaebfa375f4b5cf9a8d7c4e107ca5aeba,2024-06-04T20:15:11.010000
CVE-2024-30528,0,1,e683302804752e93f523d2032e1d9ba602a774ed14638f85e6e1e44438fd8d98,2024-06-05T12:53:50.240000
CVE-2024-3053,0,0,229c354cd3a0cecb51dd999b0e615993d2b674b0536a00d5050bf9c52ceb3ac1,2024-04-10T13:23:38.787000
CVE-2024-30530,0,0,dbaedca63c2d0063e70329af2f2e13f2d8eb98748a64909895cfdcfc37f36d33,2024-04-01T01:12:59.077000
CVE-2024-30531,0,0,b09c54bc9b690b21f0b4a0d96b7e8e1d6291d5af0953063c3755ba446b38cd3e,2024-04-02T20:31:58.463000
@ -248594,7 +248595,7 @@ CVE-2024-30883,0,0,39bac2b059deaf000971e1bfbce5ce5c6c34180366ea55e22f11dd860abb7
CVE-2024-30884,0,0,f3a012fdbee7dcdfbc54fb994726741009310b51eecb5e393a9f37c21fbc6c9c,2024-04-11T12:47:44.137000
CVE-2024-30885,0,0,053b43f723add848d769270cc9eabce98f2bef07551ec399121d9cd8c29459b9,2024-04-11T12:47:44.137000
CVE-2024-30886,0,0,78e1ecd0ca2250189e977131b68a166fe34cee6c425475aee62ecd362250a877,2024-04-24T13:39:42.883000
CVE-2024-30889,0,0,209fdd077439e36605d91bb12a4f7a6bc42a9e1eef6122cba6dc0e6b77e08680,2024-06-04T22:15:10.243000
CVE-2024-30889,0,1,e9dccb28cc37bc675e6cef39396cfb568f138ce04eb5c42362029976c637cfd3,2024-06-05T12:53:50.240000
CVE-2024-3089,0,0,85eb6f9d43806eac03b625c9309bf03f829ae71d4cbf8ab12f4121971702a373,2024-05-17T02:39:42.963000
CVE-2024-30890,0,0,39acc6930e6d21119fa952336469013f3c94563e745def6de23d4ab6c1b58299,2024-04-25T17:24:59.967000
CVE-2024-30891,0,0,eaa8b86280359f3d73f2f1d8a4256591b68799e019aa5c9624f2214d6f01088e,2024-04-05T12:40:52.763000
@ -248861,7 +248862,7 @@ CVE-2024-31377,0,0,e02ff82e676ae79edbc072171f0dcb9a2546e0513cac1421dc24d4d1c0749
CVE-2024-31378,0,0,46b9b8732b642d44c5d384306dfbdf69a9115d6098ab0a36faa3f26c08690e37,2024-04-15T13:15:31.997000
CVE-2024-31379,0,0,24f2bdeb0f1fb4bdf974899fe3fab2725f6d89406a545ae15090a05eaf09429a,2024-04-15T13:15:31.997000
CVE-2024-3138,0,0,600414616133cf85e85595deae77f890dae22a94f93f9ce57499c9176145d096,2024-05-17T02:39:44.330000
CVE-2024-31380,0,1,54c7211a517e0ffc3632b06c809d952799bc0e8670e9172a1c47298aa79397d9,2024-06-05T11:15:08.230000
CVE-2024-31380,0,0,54c7211a517e0ffc3632b06c809d952799bc0e8670e9172a1c47298aa79397d9,2024-06-05T11:15:08.230000
CVE-2024-31381,0,0,c9f8b2a8bb43383a6d2b44f4c2bce621630063d464575918f98bc752cd934627,2024-04-15T13:15:31.997000
CVE-2024-31382,0,0,fdb9f25138a089e37ff91a85435d838e4c79e5961d1d783d123309eb6b480c40,2024-04-15T13:15:31.997000
CVE-2024-31383,0,0,969012fe96b80e550a1eee7edc6c8a1c541c828926b828c1a67fc199b91a261d,2024-04-15T13:15:31.997000
@ -249425,7 +249426,7 @@ CVE-2024-32460,0,0,fc58ca5ee1d47b6a3e46a6c825461997a8b177fb47b38edb8831274c3530e
CVE-2024-32461,0,0,3941d8bd271b020582637450c6381a991de4b9ffa39f4db030841834b9e2af51,2024-04-23T12:52:26.253000
CVE-2024-32462,0,0,5d7e199d9ef87a9ead0aaa6e45da944ead2c54f7c8bd33536b92a885a6b7e6b3,2024-05-01T18:15:24.140000
CVE-2024-32463,0,0,1671e195c4973ac11a31a2856358d6fb78fc6f39ffe0d1d851cfbba7a397b723,2024-04-17T16:51:07.347000
CVE-2024-32464,0,0,d6770afcc6e6b59df506bf59a747524406db5fb8656005ad89b30b22add67fe5,2024-06-04T20:15:11.247000
CVE-2024-32464,0,1,52634ddcf12f82ec61cf24dc495c221670ea1dbca50f28c4b31766439e35a405,2024-06-05T12:53:50.240000
CVE-2024-32465,0,0,a0f151efab7dbe52ec72f2cea78d78d28564bdc55afdc4d6b29ba2affb856cd8,2024-05-15T16:40:19.330000
CVE-2024-32466,0,0,db7f064bb346349536bc1029a9138c718e3a99de40435ac8076a2153a72d304b,2024-04-18T18:25:55.267000
CVE-2024-32467,0,0,c3595d52e60c3fa31f1ede27ca8549a3938c2ca59fe6ab3708d95e8b6d1a0b5d,2024-04-25T17:24:59.967000
@ -249792,9 +249793,9 @@ CVE-2024-32970,0,0,b126f2141510dcb54e926e47a7ca1df0de893436174ab5ed3374ec3e4a125
CVE-2024-32971,0,0,30a1ded880baa000b404a0581d7700fcba0993ad067bcadc9b70a0460e2724c7,2024-05-02T13:27:25.103000
CVE-2024-32972,0,0,849652650e04d2a2cf928beb303038daae9f4b88c338eff0619c140035b2effa,2024-05-06T16:00:59.253000
CVE-2024-32973,0,0,c022c9f4134f1adead82c1b269e30d0c14622c1fcaf8b6997a4d5a316715d39c,2024-05-01T13:01:51.263000
CVE-2024-32974,0,0,85f103c66367b72989b54e659e71823eed9a6aa0b36c7d7a55c2b000db0ee42f,2024-06-04T21:15:33.773000
CVE-2024-32975,0,0,3cc68504fcb45049a3d95f8100aee866601e52f37878c73620b124561fb915b7,2024-06-04T21:15:33.987000
CVE-2024-32976,0,0,0879568e7c4b68844d669bbf49de1c4bc4d5f2691b972be83f6e8dc8432ae718,2024-06-04T21:15:34.220000
CVE-2024-32974,0,1,8d4c7bdf9da40c6a16e47999b4d6ef8d221fd2e29bd96543e64accb17830a05c,2024-06-05T12:53:50.240000
CVE-2024-32975,0,1,b8d510deb81fb6dc7a6c3281ce9f4d98629d56c8eeeaa8151ecbbf0119506455,2024-06-05T12:53:50.240000
CVE-2024-32976,0,1,47cb1485a23e7407952bbc4d345712b78c63e965b92389753335389fc34ab3f5,2024-06-05T12:53:50.240000
CVE-2024-32977,0,0,0fe4b56f20a37baa6e6e483a47c7afc89bc0a54a6fef05fea67ddd1983a8007b,2024-05-14T19:17:55.627000
CVE-2024-32978,0,0,e90314d84ee19a910681cfee4518d999a937d25285c7a155e2e4880e35c0d5c6,2024-05-28T16:15:15.833000
CVE-2024-32979,0,0,415a3504af4253fb9330760c79feca97e4169fdf22dd7f9c2c9ff0e4f9c129df,2024-05-01T13:01:51.263000
@ -250306,7 +250307,7 @@ CVE-2024-34049,0,0,659b6c20c375fc6a98cdfe826f7b991bd781b69ca08f703cc4572e5c76f88
CVE-2024-3405,0,0,168ec7f9b410ce208cd59ad1ea840c83def6fd83f8512f3bb62051f5ec3a0bc0,2024-05-15T16:40:19.330000
CVE-2024-34050,0,0,12266ec53b888a39d080cf759ea4efcf86e297f4b6422a5e48e41cdfdabd201f,2024-04-30T13:11:16.690000
CVE-2024-34051,0,0,ac84f2fd7dd43d4574139c8cf26e6f74ad2fa41e2254272b15b5513f0e198e55,2024-06-04T16:57:41.057000
CVE-2024-34055,0,0,aee4de41f1cb7f9fa70400b8f1c82ab642ff4130d4ff1019fa21c198be543c66,2024-06-05T05:15:49.950000
CVE-2024-34055,0,1,342087935d71513f5f819d0b21bd3c15e0dd2d288e95ac6605bba0a0993cf3fa,2024-06-05T12:53:50.240000
CVE-2024-34058,0,0,b01ebbb7d1672855b5a5ddd33803983b1ef9d5ac78935e236c37fd3e1a1986a6,2024-05-17T18:35:35.070000
CVE-2024-3406,0,0,b05755db76fca4314b8e99a4179a31010371036c16427145226d1ec275309899,2024-05-15T16:40:19.330000
CVE-2024-34060,0,0,3a924f7009b7e35c5ed89c1ddd4a1ea338a526dc659a3f0f832e02177cf8d5cd,2024-05-24T01:15:30.977000
@ -250451,9 +250452,9 @@ CVE-2024-34358,0,0,751426ef9b4fc5b6aeba977e724e328b4dec3348b5998df62c4ac89704576
CVE-2024-34359,0,0,8124540499a05b0ae56417d92c95f2c1092a142d066f0a2c88754c29bb36d6af,2024-05-14T16:12:23.490000
CVE-2024-3436,0,0,47938f028efbd5a916031b117de2f518314782f5c4fcf16b7aa7adbb5fd17b59,2024-05-17T02:39:56.003000
CVE-2024-34360,0,0,0ad44819f037cf6808a009e3ee50b0cc9c0e6bc33d51dc0f0dc5cede981b49a2,2024-05-14T16:12:23.490000
CVE-2024-34362,0,0,a671d1110600846d93720abb0b0f26a840616d3d3aa7b20f4b27e66a290a0918,2024-06-04T21:15:34.530000
CVE-2024-34363,0,0,23561a1d91256cd46825628f705a848f9b85ba9860a39973a4cd63f760bb5d46,2024-06-04T21:15:34.743000
CVE-2024-34364,0,0,bd4f31256d23f88e3db282180f131f7f2f9d5e66e6e030f13c6e0cb107a7c7e9,2024-06-04T21:15:34.977000
CVE-2024-34362,0,1,a622a95f42218f48cbaa30200450d16a576f9e7dd167f42bb4dc42f6640e4856,2024-06-05T12:53:50.240000
CVE-2024-34363,0,1,1325b7f8773b24ddbad375c376b6f13584c4864b620e0f716c4ca10be26331a7,2024-06-05T12:53:50.240000
CVE-2024-34364,0,1,61fd1fc323f593af780f23e892ce5d5b82312f8382f20af2e4a09e321380a729,2024-06-05T12:53:50.240000
CVE-2024-34365,0,0,5ea21b7ba6cf132bd3860c49a8b2b4e7638ff5639773e60a184934a13fa21e75,2024-05-17T02:39:33.460000
CVE-2024-34366,0,0,25eb851eb2f231dff6589bef7d2a42ccb066a9937b2c8dd9550db97a42376bab,2024-05-06T19:53:38.797000
CVE-2024-34367,0,0,71d4be6198e4635d1e3c7d4a37f4152439ba7ccd61f31e7e76f4c81875c262d4,2024-05-06T19:53:38.797000
@ -250627,6 +250628,7 @@ CVE-2024-3464,0,0,e1a6a35891c3c38cf23929aa88b7dd55b7b7561b2b012478c752dccfb02717
CVE-2024-3465,0,0,cc7142bc1559aee30fd4240971422ac4fbc49f323b8e88820a6b582cede6d695,2024-05-17T02:39:57.623000
CVE-2024-3466,0,0,f437d504c2a4423db5fc4e7046f91c0c20332b67987c55770e18cacdf9497a6d,2024-05-17T02:39:57.717000
CVE-2024-34687,0,0,4ff76c42affc0861ee718b9e208e6eefdbf0a3ab639bfa3166f3943bc94075ba,2024-05-14T19:17:55.627000
CVE-2024-3469,1,1,34074f235b8e0115e4ea41ac7557fdaa2d21b81d3a703439a694c69f2ba03a04,2024-06-05T13:15:12.707000
CVE-2024-34695,0,0,d5ed5d99c8f0d08b73ea3cb249327295e787f14594542dd2f27279ab9312830c,2024-05-14T16:12:23.490000
CVE-2024-34697,0,0,95295a45851b4a50f600527e364638272a5d24a08a1ec02edb19abea712755b2,2024-05-14T16:12:23.490000
CVE-2024-34698,0,0,10e59d69dc4df1155204551f8483405755bab4be109bdea52b3a75e369d53b1b,2024-05-14T16:12:23.490000
@ -250657,7 +250659,7 @@ CVE-2024-34754,0,0,42e489b57bc9b4b6e4e4645a963b026cad3c386a1eedd7cee43baeec78600
CVE-2024-34755,0,0,d9d093e244bdb9881814a581fcf0cceddc50257ae74dd4a27a2c1f59b6cdc217,2024-05-17T18:35:35.070000
CVE-2024-34756,0,0,c1f51cb5304487e29b0a4c8a67e9d115a4f2b56ac322e60a8774a285c457e7c0,2024-05-17T18:35:35.070000
CVE-2024-34757,0,0,57042a3bb13f31e69b5b7fd23a19541f4fa2fb8db07ba9037fc775417523a9d1,2024-05-17T18:36:05.263000
CVE-2024-34759,0,0,5bc57f5b8698c46b4243742b0d02fa7b4c8610abfc92adca6213733babb7f5ce,2024-06-04T19:20:03.167000
CVE-2024-34759,0,1,1e0e2c67aeb37ee2fee8b44ea3cd39e479d17142c7e3b68f34ae10189749e56f,2024-06-05T12:53:50.240000
CVE-2024-3476,0,0,8d55e08f53225fd62245e2332fbccfcb740f72480e60e1d515618aab26b24582,2024-05-02T13:27:25.103000
CVE-2024-34760,0,0,82a83a3179457fac7a33034fd056c2efc13c1726662f893ecd6b003877ae591a,2024-05-17T18:36:31.297000
CVE-2024-34764,0,0,4a062b2d355bca216e61eea89a3143fd70d17f9d23f9dff7fe6c4cca332731a1,2024-06-03T14:46:24.250000
@ -251009,8 +251011,8 @@ CVE-2024-35664,0,0,d9077a10aee16c0d73af2c31947db772b761933145f3866cdad9f714ba27a
CVE-2024-35666,0,0,0a35f63aee3d8970cb6e541355b0ee018ccf4fa1bf3c0f83572775af3f920589,2024-06-04T16:57:41.053000
CVE-2024-35668,0,0,f884a8d3032db5562ec77e71fb33089cf547931af3f7c4fb09ab7f1cf8d360a8,2024-06-04T16:57:41.053000
CVE-2024-3567,0,0,20839fe5058050b88e3eab46e96c3f4983a4ed5d3b8a31d734ec6d77ca524853,2024-04-10T19:49:51.183000
CVE-2024-35670,0,0,c1029bee3f3374243941a66378a51419ba0a7dfcd0dc8884ebe900700c0124a7,2024-06-04T19:20:08.777000
CVE-2024-35672,0,0,ad812ce5fecce6041d56c76924522d1026f4a485431a8b29acac685bc5d1e9a3,2024-06-04T19:20:08.967000
CVE-2024-35670,0,1,73750f9851edcb4e69a614add6516a80303684a17d124f9c4de5d312adb907f3,2024-06-05T12:53:50.240000
CVE-2024-35672,0,1,55d6b261119374cd3faa4eaa39d96a050af2ec6d719a35d44d5d1508f743f033,2024-06-05T12:53:50.240000
CVE-2024-3568,0,0,573133d2a7191a46b0975280ef7162f7787321191e0ad33f2c4c70c7e8d9c3f5,2024-04-10T19:49:51.183000
CVE-2024-3569,0,0,1713859ca5226d02b2325e4195882c2c405d5fa4ce56952eae5e58bc3dad6bde,2024-04-10T19:49:51.183000
CVE-2024-3570,0,0,df44050a6262c2969e286478660750960763247b24187b06070fe7dd6b9e3002,2024-04-10T19:49:51.183000
@ -251324,7 +251326,7 @@ CVE-2024-36118,0,0,33d8fbf029e8489b5c9f0a8940761bdd6087754b4000c59931582a52c8a89
CVE-2024-36119,0,0,df322ac6443fcc8a013c93b7e5a35f3678792028e0c0bb1f44fa863251664f98,2024-05-31T13:01:46.727000
CVE-2024-3612,0,0,d6528427cbb589467c111cbd40a18dd09640d3302d8baf887860f351407e958e,2024-05-17T02:40:01.520000
CVE-2024-36120,0,0,12c175c12bdeb4293d9514b1beb0f27c807f78064a3798691100bae1fd82d8c0,2024-05-31T19:14:47.793000
CVE-2024-36121,0,0,67c2958b0f9072d4460a1a75e60866a0ed410fe7a00bb9225f51af5d5f26691e,2024-06-04T22:15:10.490000
CVE-2024-36121,0,1,92aabcbda4cf79eaa6d614c16fb9e5f82999ee36262fd6d62e15215450a76c8a,2024-06-05T12:53:50.240000
CVE-2024-36123,0,0,cf850cc9d9baa3221d632583c4ffa7e41c6f0a00f79ee46cdb95d9dd23563e4f,2024-06-03T19:23:17.807000
CVE-2024-36124,0,0,8957b645faef2eaa32b5248d8ccada6df58d8f1b93548954f7e7f9498df53590,2024-06-03T19:23:17.807000
CVE-2024-36127,0,0,1861d6cbc85f6c0cea91586022e6f94d8ab5dbffdf653d93e569c051e5a17664,2024-06-03T19:23:17.807000
@ -251406,16 +251408,16 @@ CVE-2024-36569,0,0,6cb2ef882f018dab4ea69f61d1bc370bfefe1380a18e6327825251eff3623
CVE-2024-3657,0,0,b3ddc632f51ff9b9080079d8b3c5a6b7a01651c0414e2741d5c53ebe23c9db3e,2024-05-28T14:59:09.827000
CVE-2024-3658,0,0,788a6c57a5cc1d17a8f73184ec3f2bfe6dae89c54b4197447e7e87a36bebe3cf,2024-05-28T15:15:09.703000
CVE-2024-3660,0,0,27de83d41a96740d974951cfc0f4ab32e626a768053ae4e7908802eefe823936,2024-04-17T12:48:31.863000
CVE-2024-36604,0,0,dea62cb72ef9b04874b771705eadbe14ea319341544d1d10de7fdbc3eab6dfdd,2024-06-04T19:20:13.927000
CVE-2024-36604,0,1,86751bb907fe31b74fa6ad1dda78c84c64307accf48d9c0da02d75bef12336e6,2024-06-05T12:53:50.240000
CVE-2024-3661,0,0,b665f3ebe2f700b6f4e02ebfa9bd2f64cd39c43e37b9374c2fdfbf4a8d208373,2024-05-08T22:15:49.103000
CVE-2024-3662,0,0,aac492e0cb08799a7f888c46af5bedb595fa2e9ad6dc15c21be50e9dae70066e,2024-04-15T13:15:31.997000
CVE-2024-3663,0,0,d70e03397b7b1ab439d27e0f0ba070e0cb9801b42863e8c396c4da4f0822fd7c,2024-05-22T12:46:53.887000
CVE-2024-3664,0,0,afb9452532a9b46276f3e123567931f2d9b14afd62c66b887c9d751f65c725bc,2024-04-23T12:52:09.397000
CVE-2024-3665,0,0,22dbbd6c0bec2b9f433688ae97b549cd541e7f2d387c3796dd32246c851476cf,2024-04-23T12:52:09.397000
CVE-2024-3666,0,0,07796934f1ac3c83f9027f055a741df04ffd0473d9b06f5fc0b3f20da9ef9091,2024-05-22T12:46:53.887000
CVE-2024-3667,0,0,f0f48fea7f3689737f64ee01165bcce60345c4b6a636bea81a0081340d56eed4,2024-06-05T06:15:11.590000
CVE-2024-3667,0,1,590dc761d35bdeb78cb60dee51d43d803446d23bf32a862973772b7155719968,2024-06-05T12:53:50.240000
CVE-2024-36674,0,0,64a41fc68368d9bae481254f7aef4332736d337353346af2d18107a9908d2826,2024-06-03T19:23:17.807000
CVE-2024-36675,0,0,8462bd5f50a70efb58434e8885819435358cf52e0610c9d2ea69d850af6c6e27,2024-06-04T22:15:10.740000
CVE-2024-36675,0,1,5c3f7593516cde09c4cffe5f588ba2d6bd558d4e765f212515d844554079cc61,2024-06-05T12:53:50.240000
CVE-2024-3670,0,0,c82d0130c8edc16344a78447d1514c5ffe18d421cd344e5799606a7730bedf8c,2024-05-02T18:00:37.360000
CVE-2024-3671,0,0,d4c07d059b6fad473ffadbf866eab2d0161459cafd3d5843ab40df0df4e33fe1,2024-05-22T12:46:53.887000
CVE-2024-3672,0,0,b7de207aaf40bb160711ae23312b83bd4f3d950fbf99cf282ee38b1e3854739f,2024-04-16T13:24:07.103000
@ -251438,8 +251440,8 @@ CVE-2024-36843,0,0,dffd8a9db459cea7141db065370811228354e9ed0a00ef7accb6e04cac039
CVE-2024-36844,0,0,e97265dff1b9c5c617aea3c1ed095692195c0e84c6f318663f5bdfc9ec429f88,2024-06-03T14:46:24.250000
CVE-2024-36845,0,0,4b9d7b96ab3c57fe0fa6236fc4a20ae85e48dc606d8eba3c5478623a05a01e27,2024-06-03T14:46:24.250000
CVE-2024-3685,0,0,f921a0a401f8b4f7737f6fde068e597ed9cc1b4c23e79252700a3c350a96640b,2024-05-17T02:40:03.840000
CVE-2024-36857,0,0,daa4beb0595b330ebc22ca686d12bffc150ac45702a8ba1fe39d87435f6ef25e,2024-06-04T19:20:14.060000
CVE-2024-36858,0,0,5e06cbab0e57d57b1b0428eb6bb20ddccbebb98bf0ae75295ccc7eb1330f3e66,2024-06-04T19:20:14.150000
CVE-2024-36857,0,1,b209e6e39ac0114d8cea1fc75780b803d79c02f64a8d7e00b228b4861105088f,2024-06-05T12:53:50.240000
CVE-2024-36858,0,1,b6f9496f87fbabab961365d1552694482b152972c55f312d7477cca1b269ab5d,2024-06-05T12:53:50.240000
CVE-2024-3686,0,0,48e96862a2931368fc7a73a6d531fce8d2b9c3a327baf97d691f2054e9208b18,2024-05-17T02:40:03.933000
CVE-2024-3687,0,0,a3a2ae712cd6c7057b4b6b211557af56d168f80a5b75c666d660903c58451d4c,2024-05-17T02:40:04.027000
CVE-2024-3688,0,0,b349be233f486be05eb488359e63176b80bab656f49706a0c8941ace2d96eaa9,2024-06-04T19:20:23.107000
@ -251575,7 +251577,7 @@ CVE-2024-3724,0,0,a2f08bb0a2e36a5c374b862fb3e4beff315b3d6672953c5eeabe10290b435e
CVE-2024-3725,0,0,dd194c190207038aca40dcc17eaac7bd7c6f9f34e04d00c016e0de6cd9837da0,2024-05-02T18:00:37.360000
CVE-2024-3726,0,0,5d13f10d5b73efb7ab7c6448eee56ee5b7f1a739226807fb6eef2a4ab850d2f7,2024-05-30T13:15:41.297000
CVE-2024-3727,0,0,6b54e6f77ad932a1228e2f32eb0944c54a5e699b6a62b1576b90d56350efe669,2024-05-14T16:11:39.510000
CVE-2024-37273,0,0,6d10a507a60cc5355ccb80c43505dcee4664931072a02f30cdef1fdcfe399984,2024-06-04T19:20:15.363000
CVE-2024-37273,0,1,cc7583515d0eb62d310ba3ad1f65e5705e27dce488e0ff3c1156c1a27bddeeb1,2024-06-05T12:53:50.240000
CVE-2024-3728,0,0,43844043222c66b8f700e8c46db9fa69a4e80d2868161363811005c77777bc69,2024-05-02T18:00:37.360000
CVE-2024-3729,0,0,fe9208be005903b27f9e982914c8adbe6ffd46f8d19d93e705d785ecc61de3fc,2024-05-02T18:00:37.360000
CVE-2024-3730,0,0,a30960de1676c855ee35b61976bc4581959cd1a98a7ba3127a461fb7fc955146,2024-04-25T13:18:02.660000
@ -251776,7 +251778,7 @@ CVE-2024-3991,0,0,f4b27e31b2ebe06401478accd9d85264142bf207d27ef139c240399354705c
CVE-2024-3994,0,0,292539249e741e7003c555a5d4fa2182b15a01b393fb04fa15e675750c01906e,2024-04-25T13:18:02.660000
CVE-2024-3997,0,0,507ae8762d75f9d68eda75aa3a6fbbaf1b3579404dfa0ecd9f2978d2aa87a55f,2024-05-24T01:15:30.977000
CVE-2024-4000,0,0,63e68b686bb1abbdcd2ddeab613f2e83d1883c904c164f21a1076ada49583fc9,2024-05-02T18:00:37.360000
CVE-2024-4001,1,1,9071953b2723811f4b07f2c042722fe15062530530c549c87f08a9602d3febcb,2024-06-05T11:15:08.490000
CVE-2024-4001,0,1,9087c824343a197f49253ec388f203b19bc7567114e0cb1c21c7da34a6a10aaf,2024-06-05T12:53:50.240000
CVE-2024-4003,0,0,9b9be828f15a04db891b79e7c6ebf75d000360176e249e61f2acbb014741196d,2024-05-02T18:00:37.360000
CVE-2024-4006,0,0,cea97555ee62217aaca46943155964ba917aa17a210befae3806ab46c6606005,2024-04-25T17:25:05.903000
CVE-2024-4010,0,0,b0efc140530d7080bd135b9c9b54b60a51a2a7dd68cfd5652cea86eef30822c4,2024-05-15T16:40:19.330000
@ -251829,11 +251831,11 @@ CVE-2024-4077,0,0,88c9fb35aec8dbee15c3169eb34c083d7cc8d7a290cdea9208a3041187ada8
CVE-2024-4078,0,0,f02a6c29d80f944755bef4fcac2904ebf0cf2a727c904e067874e25c2b43b0a2,2024-05-16T13:03:05.353000
CVE-2024-4082,0,0,9bcc679f7514b7d071aa621d11dbe3b6578d11cf65d1c2f18fedd0888ce997fc,2024-05-14T16:11:39.510000
CVE-2024-4083,0,0,90b3f0c23e53e5107774f39811ea28166caf07e02a51ec5c595625bec75a4f5e,2024-05-02T18:00:37.360000
CVE-2024-4084,0,0,cdd0df7919c28f881bd53cf1deb5b03087820977803cb8c9e5d4d4b8259a386f,2024-06-05T00:15:09.840000
CVE-2024-4084,0,1,2365eeda4dcbf737d6d6078a4bdd90d6c0312afb173990e5c6287974a14586ac,2024-06-05T12:53:50.240000
CVE-2024-4085,0,0,18b49aedef154a5f78284d7ff3699691fe3b4904260085a931cc6d08f4fb7ca8,2024-05-02T18:00:37.360000
CVE-2024-4086,0,0,c06eb3f0c2fbe1c42ce58a59441202866280214c07091170b4fb53c94814c994,2024-05-02T18:00:37.360000
CVE-2024-4087,0,0,c042d2a1de26e6b1fe0621a6edcac1fb8cab9f866d13a8bc2e77c06eafe2f2ff,2024-06-03T14:46:24.250000
CVE-2024-4088,0,0,6d34f566da56f9300211e5c50e40b9bb5af3a3441c80e89d7e45604cb2a100d6,2024-06-05T07:15:45.910000
CVE-2024-4088,0,1,fc64773d1c1daa05ab20e72297e067c7b9ce75644cf2c19686947f57b63d0583,2024-06-05T12:53:50.240000
CVE-2024-4092,0,0,4be02f9c67d30932bc0929e64c1c04dde83d92e769e6b30b60cbc598e8e37f4c,2024-05-02T18:00:37.360000
CVE-2024-4093,0,0,5d27408cc41c323f4b0e69479d9f46468fbd0106e510632bee156499f1d6b2eb,2024-05-17T02:40:15.433000
CVE-2024-4097,0,0,6a60177672bc62dbe43e4e7ccd78e74b9159babed54b0d3a303c5a9a6fcd009a,2024-05-02T18:00:37.360000
@ -251915,14 +251917,14 @@ CVE-2024-4214,0,0,20486a6e70da9590b0bf48d308272f5e2303dba1772619a1d43b68b5a571b0
CVE-2024-4215,0,0,0d7dbfaf8275e9ff6c32259712a00cedd32b92104e92991d7893f67c59faf7d0,2024-05-03T12:50:34.250000
CVE-2024-4216,0,0,80b76898bbc4459141293c47297450a985b668060a3a6e72db0d9ef898a4d417,2024-05-03T12:50:34.250000
CVE-2024-4218,0,0,68377bf5bc219c5624001bda4aa985e5224f9f419836698a53a69f78bf595508,2024-05-30T13:15:41.297000
CVE-2024-4219,0,0,f50d519d81ff0845cd24c5126d7eb60f7c06bc2c512abee9a71c70bbf03e0299,2024-06-04T21:15:35.277000
CVE-2024-4220,0,0,3401035d05ac06c473d428258c007edd5ae96a2068f45091dc19dbe4525f71df,2024-06-04T21:15:35.530000
CVE-2024-4219,0,1,12af38ff857465e946ec260ad752ffb6aa608e7743d4abb67825d44b545b28c6,2024-06-05T12:53:50.240000
CVE-2024-4220,0,1,ad135a3dbd8a94fabb5089f041c2a3d1777503eb6162c9d7f3e2f7d3bf707307,2024-06-05T12:53:50.240000
CVE-2024-4222,0,0,baaf2be5207361c5cdba494834d7fd0e14922c0bb0c21401ff4dac917c12e3a7,2024-05-16T13:03:05.353000
CVE-2024-4223,0,0,7874da25b7633a9d0c04e6bbae5b506aa967cf75a9b041fe171571206fd80286,2024-05-16T13:03:05.353000
CVE-2024-4225,0,0,ac71ef092dab43c080586d967efe31f36fc3673c6a3103eaf0a29ff9fdbbfa8b,2024-04-30T13:11:16.690000
CVE-2024-4226,0,0,71c8bf7eb5a4d3d3ec7c43ac428cd4d409488f8f04217410fc871554bd101d4e,2024-04-30T13:11:16.690000
CVE-2024-4231,0,0,0b3b0e96857637547377d6b0180f3ecedf8b25db6c9274215a399187375dacbf,2024-05-14T16:11:39.510000
CVE-2024-4232,0,0,49500799a473793a052eba8408d726bad83ab7a4500afac34efac4f69c266da0,2024-05-14T16:11:39.510000
CVE-2024-4231,0,1,b748cd0cba9f8ca987fa54497bf4f5e243fe33136b361691cb77cf6b95c81bb2,2024-06-05T13:15:12.980000
CVE-2024-4232,0,1,29a7149387c890d6a0d05202995edf38065cf1e9ded36e8c20e5c1fd1dd38377,2024-06-05T13:15:13.190000
CVE-2024-4233,0,0,ca4371c9e0f8794352ea7e9d8d1d33962fb848d5646d81ea1b681c81b408ae84,2024-05-08T17:05:24.083000
CVE-2024-4234,0,0,007b9b5f266bd1a230094439603af6b2584a9759013139ef15c8a83c147fb7e2,2024-04-26T15:32:22.523000
CVE-2024-4235,0,0,e5a2e61878721e122ae422f5b9bcfdc813963b072f29be0ed433dc9fbd200f5c,2024-06-04T19:20:32.857000
@ -251971,7 +251973,7 @@ CVE-2024-4291,0,0,6fb6b0e83a49b64a5565b2ca5f6437971dbeea9c5ab39460fc142df5bce327
CVE-2024-4292,0,0,f51ff84855f02b0bc4dd3e03d8351463229984e5d3c218f3331913e1b68e232f,2024-06-04T19:20:35.097000
CVE-2024-4293,0,0,631458ecd34e0e099a1efde23f32eb7981cbcf3111570b5f9cad2a4f0ec45cb7,2024-06-04T19:20:35.203000
CVE-2024-4294,0,0,97bd940eeda24c94b1982f85ff25718412e73b2bf939766f3f03c261351a8304,2024-06-04T19:20:35.300000
CVE-2024-4295,0,0,335930b49eb96e27b3d3c521fd8430c91e27a43abd039593bac00db44fbaf6da,2024-06-05T06:15:12.007000
CVE-2024-4295,0,1,5f5c77a664491012c7ab525ce855e50f63ef338faa130e20b060eb5c339a2bcc,2024-06-05T12:53:50.240000
CVE-2024-4296,0,0,7c8632bf90851b299a9885e1b23a1d23a32667f17280ec361546d21dc35de10e,2024-04-29T12:42:03.667000
CVE-2024-4297,0,0,92dc96fdab7f356cdc83f7d1d85286a03b04dbf93d10ca9e6efacd8b516bbae3,2024-04-29T12:42:03.667000
CVE-2024-4298,0,0,c30353f487462f14da90ba9761a3d280aecbb2b2af7a8a57b196c96d31910116,2024-04-29T12:42:03.667000
@ -252129,7 +252131,7 @@ CVE-2024-4516,0,0,10626e52c529e42a5320a520a08a85d986e2a25ffb5a3e13bfb1d264371f0f
CVE-2024-4517,0,0,dd846e367e5abb1933c37dd12b6595595141f802700f41ef0de89e37c9e7b10e,2024-06-04T19:20:41.030000
CVE-2024-4518,0,0,138810b344c2405de3b9eb6d39d2c472e619d29fa4332ad55091f5791e860c53,2024-05-17T02:40:27.187000
CVE-2024-4519,0,0,d907f2478d280b71f30ae8f544e468b0b92be8875bfbb966894eaebcf188a9c6,2024-06-04T19:20:41.127000
CVE-2024-4520,0,0,b0107e9d4197a7e937447c999209a5ce5d249cbe864eeb89555c3387d7f76c59,2024-06-04T20:15:11.690000
CVE-2024-4520,0,1,f8ed95d17022804f171b1a246342d9748a877c6a10d9fcc9734420aa2c19f8b2,2024-06-05T12:53:50.240000
CVE-2024-4521,0,0,d6cc5857fdfd7e080f861e131d288df35df975f65e1f792c47f6b677cf458c6d,2024-06-04T19:20:41.223000
CVE-2024-4522,0,0,404121efa69a85bb1b7c4e2c43fef3f42a34d444ccf6b6b833a5214d4ac8192e,2024-06-04T19:20:41.320000
CVE-2024-4523,0,0,5723f30cb658cebf65e64dbb3502a21e055ee9a286cd39f3273d6981e4a848c1,2024-06-04T19:20:41.420000
@ -252284,7 +252286,7 @@ CVE-2024-4735,0,0,525831e83b784b99ed7ef48881d0a232b57485de376b3c68786c9225fdef83
CVE-2024-4736,0,0,35e0fe51ccd6e16c666173722ffd72f471827cead112caeaf869dd95515427ec,2024-06-04T19:20:48.497000
CVE-2024-4737,0,0,0d605ad76fcca9d9a8748ea1570213b2a20be8e7af59e1490aa0de37640ee426,2024-06-04T19:20:48.597000
CVE-2024-4738,0,0,703597dd680fa7def2747a141a4237503bd7e8917e070a49546a7e715e951f69,2024-06-04T19:20:48.783000
CVE-2024-4743,0,0,2f310e54344c8bede825f6134503d16f7553328fdad57e9a28f8c9b627c012e0,2024-06-05T09:15:10.030000
CVE-2024-4743,0,1,ca5ac146013ec9c5ade9488d4cfcf6d89cbed0fe780989436eef36b2f305727d,2024-06-05T12:53:50.240000
CVE-2024-4747,0,0,99152f6494a1192f3bae59b436abcc51d11f811ed1e0a72c2e65c8381fda6054,2024-05-14T16:11:39.510000
CVE-2024-4749,0,0,676e331864bc41907c4c80c44886e7dac480ef6dea2c29bc22838d992753d4da,2024-06-04T16:57:41.053000
CVE-2024-4750,0,0,423585a3e250903ac62d761ecb0e0e6dc6b4649ccd4411b90275a4e6d2f87495,2024-06-04T16:57:41.053000
@ -252337,7 +252339,7 @@ CVE-2024-4817,0,0,25f671d255c133539a14922245d93cb8e9f73263de30634add3e11638c71ff
CVE-2024-4818,0,0,b4281c0fc833ff67f25a4dec3c5716911b53a31935e38b0310baa3a499b478f8,2024-06-04T19:20:51.510000
CVE-2024-4819,0,0,e38245aea9a32f985ed2dae01aba40bf33a21f00080c8d20286bf8b00a9f57bf,2024-06-04T19:20:51.613000
CVE-2024-4820,0,0,402d6f18855ed225f564a1aa077cdcb508a467147f3c0e0905e2eb4030f9a1a9,2024-06-04T19:20:51.710000
CVE-2024-4821,0,0,57645af1e5819381d8d6a88aa08a0e4143555dc738e4f7883f2511b7271f62b0,2024-06-05T09:15:10.260000
CVE-2024-4821,0,1,4981f09cf0383706f9cea79fb9e9301470b91511f4b8dd53fd27a692ee8c14ba,2024-06-05T12:53:50.240000
CVE-2024-4822,0,0,2afc6a99d0a53e8f4d7991726996560d97ea71ce3c63aa067c8bb04f0c1c8bcf,2024-05-14T16:11:39.510000
CVE-2024-4823,0,0,544460ea4efbe18fdd003c94911529fa16ddf77347bca6256c2d97529bd3f076,2024-05-14T16:11:39.510000
CVE-2024-4824,0,0,18f5c845247adede0ddca9ae15329e658bfdaa618402437af47bcb2e661d694c,2024-05-14T16:11:39.510000
@ -252365,7 +252367,7 @@ CVE-2024-4870,0,0,789ccad79b53f3162faaa4d0c14e00ab550e7e413c46a4332529e5d35d1d04
CVE-2024-4871,0,0,089a89f3309c27433f20e3be4ef9a00379f9f19601c1c8029649846113aed43a,2024-05-14T19:17:55.627000
CVE-2024-4875,0,0,aa35cb89fee530b58aa987ffc67ea97738c0ba567903bf01429a1a1259923db8,2024-05-21T12:37:59.687000
CVE-2024-4876,0,0,02aac8d1be489833aa2e07f8be8ce083249ac7dc2fcc33fd144386b8d365fef2,2024-05-21T12:37:59.687000
CVE-2024-4886,0,0,9c9fb2520bf49e6dda512ddac94c860619ccafb0b5624e485434ec420368c9b8,2024-06-05T06:15:12.443000
CVE-2024-4886,0,1,85721324d8c885a233247da6b42e2a33cd86be9ab4caebe3f5bcde7804348df2,2024-06-05T12:53:50.240000
CVE-2024-4891,0,0,10c2ed4e0db3df7fca9d6075befed08f57db6578dbf3546fd28a3b8b6a103a31,2024-05-20T13:00:34.807000
CVE-2024-4893,0,0,d5ebc2dfcb13b74b4f1951a124d2e638a95f79aa05d19e6fadfe65b7ad1c4f46,2024-05-15T16:40:19.330000
CVE-2024-4894,0,0,d68130303d356c053d0f6768d0ee08506e206d16216142c952b9b56af8835d24,2024-05-15T16:40:19.330000
@ -252401,7 +252403,7 @@ CVE-2024-4930,0,0,6ff76d7aaffb879ad1ba04c82aee4d6862810bf82c41e96981364c74ee8131
CVE-2024-4931,0,0,83efd803f055d34e0373b998807732a66d1be28ff93405fe1ae45ba9ee6af2a3,2024-06-04T19:20:54.543000
CVE-2024-4932,0,0,2da4bffdf4d6e38ae009aae9065c7b2f8049c53fc8beaf73dfbb4354175c5b68,2024-05-17T02:40:43.357000
CVE-2024-4933,0,0,9fe90c4f8856bf6bdad48e78d639ea10366bef215c1d0d507cc52649860ab1b1,2024-06-04T19:20:54.643000
CVE-2024-4939,0,0,0f5da7c4f78ee1d4cfa142a2e38ccef8b824d364bf9fcc429715affa649dbe71,2024-06-05T08:15:09.787000
CVE-2024-4939,0,1,9b3d9056d0ef1d9ece33bf387a55f6ff5207b427eb3d8aa6eb326ad7a1f5fa3f,2024-06-05T12:53:50.240000
CVE-2024-4943,0,0,d9b88319a5992961df806c2aff168607709c5e19495e72269f7fd7790830e1d9,2024-05-21T12:37:59.687000
CVE-2024-4945,0,0,862ec6002e9c3369e40f6935606e597aac95fb1ef3a2f5a2c72d02ef723dafd2,2024-06-04T19:20:54.767000
CVE-2024-4946,0,0,de881559bc92412238785deff68c564cad0647963d61d3efd064c0cec6c4ee1e,2024-06-04T19:20:54.867000
@ -252438,7 +252440,7 @@ CVE-2024-4997,0,0,381fe62c0cd224246ea5324bab3cef489202298d3bb7b0d185aa70d1dc0d5b
CVE-2024-4998,0,0,e12f9512d41da053bcfd5626dd0ee21afd4da3e61146c4f0c8f9da42ca3dff98,2024-05-17T16:15:08.160000
CVE-2024-4999,0,0,1bac5cc77e7ceb1bce6c078fbd59e76f5556984ef2124d365e8638bfa6b6fdfa,2024-05-16T15:44:44.683000
CVE-2024-5000,0,0,21f44bae275ca5e7f3a45da963612f2fb705c74e44c15e2681f54ff4506e6afb,2024-06-04T16:57:41.053000
CVE-2024-5006,0,0,971ce3dd34f2161629a353f7a3094cac2074b284283e2226864e8f278e6d9956,2024-06-05T08:15:09.983000
CVE-2024-5006,0,1,dd22c8e58768fd94bd48e3be3a4dc52cd3210392642ba6489895072643348644,2024-06-05T12:53:50.240000
CVE-2024-5022,0,0,106355f86b530d1586a5d339031de27a1a2312467a76eb449e8e9901150235d8,2024-05-20T13:00:34.807000
CVE-2024-5023,0,0,974704283893df4cc9d8e0bcce8bb65ebf635268235f75f47c922033893214ce,2024-05-17T18:36:31.297000
CVE-2024-5025,0,0,d287dc9bcba0fba1784ec3f3fe4bf65eea235ed5e6f91d741018beb442d992d7,2024-05-22T12:46:53.887000
@ -252512,7 +252514,7 @@ CVE-2024-5143,0,0,85d2302aa16b15f892bf139ed2f510515c9c051290de1dbf060be25f391906
CVE-2024-5144,0,0,3682eb32ab74a69dce2a20f55af124165ad49665bd2dae692d6703bd4728c599,2024-05-31T18:15:13.217000
CVE-2024-5145,0,0,0acb7691362a1bc72a9e4e71d498873a314e4674d3384b4bf3903540c5103a68,2024-06-04T19:21:01.520000
CVE-2024-5147,0,0,f4d57cc5a9319b417b98271562a6c18c09e411a2e24f5685a34653839c587f1d,2024-05-22T12:46:53.887000
CVE-2024-5149,0,0,667ac8a93169fd4de23187d8b450c0dcf309b4fa3f5ee5c69a5251e6adc0dcd2,2024-06-05T05:15:50.260000
CVE-2024-5149,0,1,364802fa270d017fba6f416e3117d6dca3ad93a3eb767f3194b95ff1f96ff814,2024-06-05T12:53:50.240000
CVE-2024-5150,0,0,b6666c6d6ac9830dd3015f5fc02fd79f0a3b63d41ee2e14f8cd76da933186cb1,2024-05-29T13:02:09.280000
CVE-2024-5157,0,0,d1a998bf0d4dfb4fd055882979d4054df97060c8814d4ddde025533b9446aec3,2024-05-22T18:59:20.240000
CVE-2024-5158,0,0,977b7b5952131680dd428eb1410f2d0eff9e1337c54f1532a6f9419cdea73d4c,2024-05-22T18:59:20.240000
@ -252538,7 +252540,7 @@ CVE-2024-5207,0,0,837facf8fac5843bbf7aea1ce36fa00287f1ba077f8fbca1302b0ab4087ec5
CVE-2024-5214,0,0,77a86526714522a20940695733fe46b4562089752d3c663cf289b583b7c6bbda,2024-06-03T19:15:09.360000
CVE-2024-5218,0,0,928b5f8d4e08afc285c0cf6e370373ec87899b716b1cb4db68027907b01d2a82,2024-05-28T12:39:42.673000
CVE-2024-5220,0,0,f61a4e43424028e9a9336f6f6ed766295c86a8a5421f6ff87daa2be13ac80d02,2024-05-28T12:39:42.673000
CVE-2024-5222,0,0,85215479f7f09036f0035b7eca417d01a8a5da55290907af67715ef68160560a,2024-06-05T07:15:46.127000
CVE-2024-5222,0,1,e769bb480236b36cbba7fdebb79adf1189e90d39aec093b6e4e34002be122181,2024-06-05T12:53:50.240000
CVE-2024-5223,0,0,8366f6c6b4592ec30854ea2204a3ebdc0b5f6592483a6a57d3251ddc4233fcd1,2024-05-30T13:15:41.297000
CVE-2024-5227,0,0,9d34b575e4c4193bf3b7e2c70f772c52e473e90eee580d6cd20ca38df9886e09,2024-05-24T01:15:30.977000
CVE-2024-5228,0,0,0a0ae3d586a473bc70cb0721078887f2918e42e82919d39880ecf7432c31100c,2024-05-24T01:15:30.977000
@ -252562,7 +252564,7 @@ CVE-2024-5245,0,0,885af784a1c7b3c68788b03806b782abc316cb75da65e88871ee466ba1a204
CVE-2024-5246,0,0,a3caa78128bac4a72615dccb481ff335052f3377ab67fd694d7f5fc053234984,2024-05-24T01:15:30.977000
CVE-2024-5247,0,0,1e269e58ef46756e33578f4c5df34dcec3de646d04312bef41a8353e3fc1fce7,2024-05-24T01:15:30.977000
CVE-2024-5258,0,0,44dc29bb0ed4f47fbd56a17c4d4592048fc8f73fd8d93b1b1d7d82e5e8477ede,2024-05-24T01:15:30.977000
CVE-2024-5262,0,0,6246030f7551fff17f58cbe3c24340f5191be8d5f89fb664a054776b6c10b1ac,2024-06-05T04:15:11.807000
CVE-2024-5262,0,1,d3d11be98b1db30aa602921aa94b60a718be9a0bc4ccd1e4ef634546f525f9dd,2024-06-05T12:53:50.240000
CVE-2024-5264,0,0,8231398a0715961af60c236587d7e9f037c5bc092ccd3f5680c73ce92c6726b7,2024-05-24T01:15:30.977000
CVE-2024-5270,0,0,e200d6ed6ebdb84a917f949dcb40f0d98c76339d55f3b191cf4ff77238c630ff,2024-05-28T12:39:28.377000
CVE-2024-5271,0,0,d3f4377983bdb14b36061f7826a2769c4b74dac3ab0fd218e99cb4bdcc673a12,2024-05-31T13:01:46.727000
@ -252584,7 +252586,7 @@ CVE-2024-5311,0,0,254582b6f9bf67f7974ecb2d947c8ea8261db1fbcce62f651ad1dbc864d7bc
CVE-2024-5312,0,0,3a9d8301087c1d7edb8976207e286d0d247ebf6ccf4b5edb4137e81b02e5ec2b,2024-05-24T13:03:05.093000
CVE-2024-5314,0,0,fb6304ffb5d50ce8724d643a46fad25ba80695f7c0c0eb4ec33a07d41bc4980a,2024-05-24T13:03:05.093000
CVE-2024-5315,0,0,e1b0baaf93d62cf125eea53091da57c404cdf61d625ae810529ebef84e73357d,2024-05-24T13:03:05.093000
CVE-2024-5317,0,0,f1fa6ba8aaa2a89d1570b4f611a0322abd09601428c027c481c7e3f9fe671a30,2024-06-05T02:15:10.163000
CVE-2024-5317,0,1,0e4df649aa2081733cc8377041229cfce850d909b63f156a77d02d6d4c5141bb,2024-06-05T12:53:50.240000
CVE-2024-5318,0,0,812431b83287688611dc496217ea25ba5560744235da04dca7a35239cac1fe9a,2024-05-24T18:09:20.027000
CVE-2024-5326,0,0,9beaa1147d54b3ae536a6eb0023672ae377946ef8aec317bd58c5324df5850c7,2024-05-30T13:15:41.297000
CVE-2024-5327,0,0,84b1605ed9f8fbbcd152a70275bed021ec8172a393ec025e57c9733c6898763a,2024-05-30T13:15:41.297000
@ -252666,10 +252668,11 @@ CVE-2024-5433,0,0,d0946774ada383b4af0e78f23b9c449d05f83a7124810af4e383f90b0cdbda
CVE-2024-5434,0,0,dc2716eb218edba725ac85c17a2930de7a00b6563d0ca53040574106ea0b92ed,2024-05-29T13:02:09.280000
CVE-2024-5436,0,0,95eba267f429de080e9b35fcd14e1e1840b0308e404c32773ec35c18106c7cbc,2024-05-31T13:01:46.727000
CVE-2024-5437,0,0,551b020f0044e3ab584c14f08f0984900b4bc26534c92382eb6ac2bb660708ea,2024-06-04T19:21:09.363000
CVE-2024-5439,0,0,5cb5743566262a7db1dbc065eea81546f2260b27c4c57998688474e77a737137,2024-06-05T08:15:10.210000
CVE-2024-5453,0,0,2febbf1e341d103770d5518ca487e5210a458c994aa4096fa101457d87279f05,2024-06-05T08:15:10.410000
CVE-2024-5439,0,1,abaad0f03a42ef683e08fa0b9e3df38062d4c8e86744ed6e348d5f6378ac054e,2024-06-05T12:53:50.240000
CVE-2024-5453,0,1,7c8641ed8daae70878106ab21b3cb2696b56b68c7012b2cceeb0fd9522a96b5d,2024-06-05T12:53:50.240000
CVE-2024-5459,1,1,a6cce27e4bb0299dd2bb46d9d34dbfafbced52cf1ffe0ede9ae8efb94d391c96,2024-06-05T13:15:13.437000
CVE-2024-5463,0,0,a83ead02d534db419d64d9a246adc999062f3a690f2d2cbba14bffeb9debf0f5,2024-06-04T16:57:41.053000
CVE-2024-5483,0,0,5529c97278d3f25108282683906a92383dd2ca1a9ba0be070cd04ea84d856791,2024-06-05T03:15:08.810000
CVE-2024-5483,0,1,88635ac2041f9699472eef4c51a5eb67a3fcf4378dec7f1a98452fd31b9eaa6a,2024-06-05T12:53:50.240000
CVE-2024-5484,0,0,7de35f8eee9232651ed147ec3168f6740617b1737ec3ff6913988b98b84f6ef1,2024-05-31T11:15:09.783000
CVE-2024-5485,0,0,dca0cc3d797ec50003ec75de23195400e6c002137c330b8a6fe7501d852f23b7,2024-06-04T16:57:41.053000
CVE-2024-5493,0,0,8180f9c7c83a7ebab82ac7c00536ed64f553bc96cb8ba2cddb06ad7e2d969883,2024-05-31T13:01:46.727000
@ -252691,15 +252694,16 @@ CVE-2024-5521,0,0,ccb2ba49d7e4be9859a81cd0c950d08f47c4a44700fa46f5775af6da3418ab
CVE-2024-5523,0,0,489908bda9015339aace57c4216da7f1ba8be0b6b24c245bc618ef3d6f503a51,2024-05-31T13:01:46.727000
CVE-2024-5524,0,0,cae078246cb68e9db21efee85fd3858e79fb1203c0e063487740b9c1df1ad7c9,2024-05-31T13:01:46.727000
CVE-2024-5525,0,0,e6c5a1ee43ca8e6712f567b8cfbba1abaf5011df1fe231dde327e809aed6654f,2024-05-31T13:01:46.727000
CVE-2024-5536,1,1,e8d5369143d6c678027a8a32c4a9ead004061846b3c22379360541cf2f881ff0,2024-06-05T10:15:09.170000
CVE-2024-5526,1,1,ff5b1387d351b0ba676942fad975bab52e39b4bce1932efe40f06f69ab4492f7,2024-06-05T12:53:50.240000
CVE-2024-5536,0,1,68edb52432771856b464d791aa7fccb8518cf1ab9cd2d253ae0bbced65da7ce5,2024-06-05T12:53:50.240000
CVE-2024-5537,0,0,071475eb8c0f92cc8ea9522d658283ad0e8213ba6740ff46ee05e5b24c18c3d8,2024-05-30T17:15:34.583000
CVE-2024-5538,0,0,183cea799fa9410e329e72f326a10b8369aedcea9a5b7583a44bf33ecc305070,2024-05-31T11:15:09.923000
CVE-2024-5564,0,0,cd961630c6982ea90916e9cc290067a2c4a02a79292d87af6b0ec76760478ca9,2024-06-03T14:46:24.250000
CVE-2024-5565,0,0,ca2b275160a932f35493ef873c1e3b3376ac0de1d1f0359f5898f4a0c4303049,2024-05-31T19:14:47.793000
CVE-2024-5571,0,0,265798639a90035e137c4841b22621f20815ec8389fe53aa22fef8de63e7337c,2024-06-05T09:15:10.463000
CVE-2024-5571,0,1,5bd1fe120d21671f33dde8145e3554ed59688f09b1ce68450c982cea21578a28,2024-06-05T12:53:50.240000
CVE-2024-5587,0,0,9180b0762a5a5a7a17ce70cd861bdf25e955d88caf903bee442f7c48a0a2a218,2024-06-03T14:46:24.250000
CVE-2024-5588,0,0,21589c4423d1fee081cb695dd8009f3bd5a36bd74dae1713c28449f0da1cd8d1,2024-06-04T19:21:10.267000
CVE-2024-5589,0,0,dc63c38434ce5bb089af0d0f8aa09f6a46f1fae34dd45c15f4542741dea047b7,2024-06-03T14:46:24.250000
CVE-2024-5590,0,0,ca60332ff9933405c7b9b37e93d2404b53274b9ec741b4065c0c1eadbd60da94,2024-06-03T14:46:24.250000
CVE-2024-5635,0,0,d955bff05988108c4df31c650616da32aaf5ecbaf2b998d24bf49ab092bac321,2024-06-04T22:15:10.833000
CVE-2024-5636,0,0,5d0061b5ccc5b5cfaf69adce0bc201a464e1b4fa63384366df6d42f47c2a1a4a,2024-06-05T01:15:11.470000
CVE-2024-5635,0,1,2f4fd95f40cb43c9475682f37f78b479557c0ba40bc4b87c84bd3a410bdbca2c,2024-06-05T12:53:50.240000
CVE-2024-5636,0,1,ae2ff24a8e15c0ed795cb405ff4b68943ed8f15194eed9e4ca4bf581e03cae2a,2024-06-05T12:53:50.240000

Can't render this file because it is too large.