mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-08 19:47:09 +00:00
Auto-Update: 2024-06-19T06:00:18.712215+00:00
This commit is contained in:
parent
0d6080d5fd
commit
ce5ecb51d3
@ -2,12 +2,12 @@
|
||||
"id": "CVE-2023-30312",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-05-28T22:15:11.247",
|
||||
"lastModified": "2024-05-29T13:02:09.280",
|
||||
"lastModified": "2024-06-19T04:15:10.477",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An issue discovered in routers running Openwrt 18.06, 19.07, 21.02, 22.03 and beyond allows attackers to hijack TCP sessions which could lead to a denial of service."
|
||||
"value": "An issue discovered in OpenWrt 18.06, 19.07, 21.02, 22.03, and beyond allows off-path attackers to hijack TCP sessions, which could lead to a denial of service, impersonating the client to the server (e.g., for access to files over FTP), and impersonating the server to the client (e.g., to deliver false information from a finance website). This occurs because nf_conntrack_tcp_no_window_check is true by default."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
@ -16,6 +16,18 @@
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://blog.apnic.net/2024/06/18/off-path-tcp-hijacking-in-nat-enabled-wi-fi-networks/",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://news.ycombinator.com/item?id=40723150",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://openwrt.org/docs/guide-developer/security",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://www.ndss-symposium.org/ndss-paper/exploiting-sequence-number-leakage-tcp-hijacking-in-nat-enabled-wi-fi-networks/",
|
||||
"source": "cve@mitre.org"
|
||||
|
47
CVE-2024/CVE-2024-23xx/CVE-2024-2381.json
Normal file
47
CVE-2024/CVE-2024-23xx/CVE-2024-2381.json
Normal file
@ -0,0 +1,47 @@
|
||||
{
|
||||
"id": "CVE-2024-2381",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2024-06-19T04:15:10.753",
|
||||
"lastModified": "2024-06-19T04:15:10.753",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The AliExpress Dropshipping with AliNext Lite plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the ajax_save_image function in all versions up to, and including, 3.3.5. This makes it possible for authenticated attackers, with subscriber-level access and above, to upload arbitrary files on the affected site's server which may make remote code execution possible."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/browser/ali2woo-lite/trunk//includes/classes/controller/WooCommerceProductEditController.php#L108",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/c3248327-6e10-420e-83cf-a23296eb2e6f?source=cve",
|
||||
"source": "security@wordfence.com"
|
||||
}
|
||||
]
|
||||
}
|
47
CVE-2024/CVE-2024-32xx/CVE-2024-3229.json
Normal file
47
CVE-2024/CVE-2024-32xx/CVE-2024-3229.json
Normal file
@ -0,0 +1,47 @@
|
||||
{
|
||||
"id": "CVE-2024-3229",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2024-06-19T05:15:52.067",
|
||||
"lastModified": "2024-06-19T05:15:52.067",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The Salon booking system plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the SLN_Action_Ajax_ImportAssistants function along with missing authorization checks in all versions up to, and including, 10.2. This makes it possible for unauthenticated attackers to upload arbitrary files on the affected site's server which may make remote code execution possible."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/changeset/3103584/salon-booking-system/trunk/src/SLN/Action/Ajax/ImportAssistants.php",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/3bbbf5be-5c0a-4514-88ac-003083c0bba3?source=cve",
|
||||
"source": "security@wordfence.com"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2024/CVE-2024-352xx/CVE-2024-35298.json
Normal file
20
CVE-2024/CVE-2024-352xx/CVE-2024-35298.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2024-35298",
|
||||
"sourceIdentifier": "vultures@jpcert.or.jp",
|
||||
"published": "2024-06-19T05:15:51.907",
|
||||
"lastModified": "2024-06-19T05:15:51.907",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Improper authorization in handler for custom URL scheme issue in 'ZOZOTOWN' App for Android versions prior to 7.39.6 allows an attacker to lead a user to access an arbitrary website via another application installed on the user's device. As a result, the user may become a victim of a phishing attack."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://jvn.jp/en/jp/JVN37818611/",
|
||||
"source": "vultures@jpcert.or.jp"
|
||||
}
|
||||
]
|
||||
}
|
47
CVE-2024/CVE-2024-39xx/CVE-2024-3984.json
Normal file
47
CVE-2024/CVE-2024-39xx/CVE-2024-3984.json
Normal file
@ -0,0 +1,47 @@
|
||||
{
|
||||
"id": "CVE-2024-3984",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2024-06-19T04:15:11.213",
|
||||
"lastModified": "2024-06-19T04:15:11.213",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The EmbedSocial \u2013 Social Media Feeds, Reviews and Galleries plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'embedsocial_reviews' shortcode in all versions up to, and including, 1.1.29 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 6.4,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 3.1,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/browser/embedalbum-pro/trunk/embedalbum_pro.php#L194",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/6593b0de-db7a-4b7e-bd74-cc2b1e36ac60?source=cve",
|
||||
"source": "security@wordfence.com"
|
||||
}
|
||||
]
|
||||
}
|
47
CVE-2024/CVE-2024-44xx/CVE-2024-4450.json
Normal file
47
CVE-2024/CVE-2024-44xx/CVE-2024-4450.json
Normal file
@ -0,0 +1,47 @@
|
||||
{
|
||||
"id": "CVE-2024-4450",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2024-06-19T04:15:11.497",
|
||||
"lastModified": "2024-06-19T04:15:11.497",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The AliExpress Dropshipping with AliNext Lite plugin for WordPress is vulnerable to unauthorized access due to a missing capability check on several functions in the ImportAjaxController.php file in all versions up to, and including, 3.3.5. This makes it possible for authenticated attackers, with subscriber-level access and above, to perform several actions like importing and modifying products."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW",
|
||||
"baseScore": 6.3,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/browser/ali2woo-lite/trunk/includes/classes/controller/ImportAjaxController.php",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/01836c2c-0976-493e-8b13-1c7c702d1d2c?source=cve",
|
||||
"source": "security@wordfence.com"
|
||||
}
|
||||
]
|
||||
}
|
47
CVE-2024/CVE-2024-45xx/CVE-2024-4541.json
Normal file
47
CVE-2024/CVE-2024-45xx/CVE-2024-4541.json
Normal file
@ -0,0 +1,47 @@
|
||||
{
|
||||
"id": "CVE-2024-4541",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2024-06-19T04:15:11.793",
|
||||
"lastModified": "2024-06-19T04:15:11.793",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The Custom Product List Table plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 3.0.0. This is due to missing or incorrect nonce validation when modifying products. This makes it possible for unauthenticated attackers to add, delete, bulk edit, approve or cancel products via a forged request granted they can trick a site administrator into performing an action such as clicking on a link."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 4.3,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://wordpress.org/plugins/custom-product-list-table/#description",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/4c046e0c-32d2-47d1-9890-d05d69217161?source=cve",
|
||||
"source": "security@wordfence.com"
|
||||
}
|
||||
]
|
||||
}
|
47
CVE-2024/CVE-2024-46xx/CVE-2024-4623.json
Normal file
47
CVE-2024/CVE-2024-46xx/CVE-2024-4623.json
Normal file
@ -0,0 +1,47 @@
|
||||
{
|
||||
"id": "CVE-2024-4623",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2024-06-19T04:15:12.107",
|
||||
"lastModified": "2024-06-19T04:15:12.107",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The Blogmentor \u2013 Blog Layouts for Elementor plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the \u2018pagination_style\u2019 parameter in all versions up to, and including, 1.5 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 6.4,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 3.1,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/browser/blogmentor/trunk/includes/elements/blogmentor-blog-posts.php#L977",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/b0925ceb-581c-4748-abfb-9962e53b7db9?source=cve",
|
||||
"source": "security@wordfence.com"
|
||||
}
|
||||
]
|
||||
}
|
47
CVE-2024/CVE-2024-46xx/CVE-2024-4663.json
Normal file
47
CVE-2024/CVE-2024-46xx/CVE-2024-4663.json
Normal file
@ -0,0 +1,47 @@
|
||||
{
|
||||
"id": "CVE-2024-4663",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2024-06-19T04:15:12.403",
|
||||
"lastModified": "2024-06-19T04:15:12.403",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The OSM Map Widget for Elementor plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the \u2018id\u2019 parameter in all versions up to, and including, 1.2.2 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 6.4,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 3.1,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/browser/osm-map-elementor/trunk/osm-map.php#L1478",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/402d0399-bc48-4740-86a4-8bf3424fb035?source=cve",
|
||||
"source": "security@wordfence.com"
|
||||
}
|
||||
]
|
||||
}
|
47
CVE-2024/CVE-2024-47xx/CVE-2024-4787.json
Normal file
47
CVE-2024/CVE-2024-47xx/CVE-2024-4787.json
Normal file
@ -0,0 +1,47 @@
|
||||
{
|
||||
"id": "CVE-2024-4787",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2024-06-19T04:15:12.730",
|
||||
"lastModified": "2024-06-19T04:15:12.730",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The Cost Calculator Builder PRO for WordPress is vulnerable to arbitrary email sending vulnerability in versions up to, and including, 3.1.75. This is due to insufficient limitations on the email recipient and the content in the 'send_pdf' and the 'send_pdf_front' functions which are reachable via AJAX. This makes it possible for unauthenticated attackers to send emails with any content to any recipient."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 5.8,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://docs.stylemixthemes.com/cost-calculator-builder/changelog-1/changelog-pro-version",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/035ada56-541d-47b3-8348-3401d94bb509?source=cve",
|
||||
"source": "security@wordfence.com"
|
||||
}
|
||||
]
|
||||
}
|
47
CVE-2024/CVE-2024-48xx/CVE-2024-4873.json
Normal file
47
CVE-2024/CVE-2024-48xx/CVE-2024-4873.json
Normal file
@ -0,0 +1,47 @@
|
||||
{
|
||||
"id": "CVE-2024-4873",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2024-06-19T04:15:12.990",
|
||||
"lastModified": "2024-06-19T04:15:12.990",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The Replace Image plugin for WordPress is vulnerable to Insecure Direct Object Reference in all versions up to, and including, 1.1.10 via the image replacement functionality due to missing validation on a user controlled key. This makes it possible for authenticated attackers, with Author-level access and above, to replace images uploaded by higher level users such as admins."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 4.3,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://wordpress.org/plugins/replace-image/",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/5a5d3a62-f7e5-4776-bed9-7ff3f81da452?source=cve",
|
||||
"source": "security@wordfence.com"
|
||||
}
|
||||
]
|
||||
}
|
47
CVE-2024/CVE-2024-50xx/CVE-2024-5021.json
Normal file
47
CVE-2024/CVE-2024-50xx/CVE-2024-5021.json
Normal file
@ -0,0 +1,47 @@
|
||||
{
|
||||
"id": "CVE-2024-5021",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2024-06-19T04:15:13.310",
|
||||
"lastModified": "2024-06-19T04:15:13.310",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The WordPress Picture / Portfolio / Media Gallery plugin for WordPress is vulnerable to Server-Side Request Forgery in all versions up to, and including, 3.0.1 via the 'file_get_contents' function. This makes it possible for unauthenticated attackers to make web requests to arbitrary locations originating from the web application and can be used to query and modify information from internal services."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 9.3,
|
||||
"baseSeverity": "CRITICAL"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 4.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/browser/nimble-portfolio/trunk/includes/prettyphoto/download-image.php#L17",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/224a2d6d-7fdc-43a8-a8c9-26213b604433?source=cve",
|
||||
"source": "security@wordfence.com"
|
||||
}
|
||||
]
|
||||
}
|
47
CVE-2024/CVE-2024-56xx/CVE-2024-5649.json
Normal file
47
CVE-2024/CVE-2024-56xx/CVE-2024-5649.json
Normal file
@ -0,0 +1,47 @@
|
||||
{
|
||||
"id": "CVE-2024-5649",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2024-06-19T04:15:13.583",
|
||||
"lastModified": "2024-06-19T04:15:13.583",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The Universal Slider plugin for WordPress is vulnerable to PHP Object Injection in all versions up to, and including, 1.6.5 via deserialization of untrusted input 'fsl_get_gallery_value' function. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject a PHP Object. No known POP chain is present in the vulnerable software. If a POP chain is present via an additional plugin or theme installed on the target system, it could allow the attacker to delete arbitrary files, retrieve sensitive data, or execute code."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 5.4,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 2.5
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/browser/fusion-slider/trunk/fusion-slider.php#L692",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/8f8bd107-5459-4093-8593-deedec6ffcd6?source=cve",
|
||||
"source": "security@wordfence.com"
|
||||
}
|
||||
]
|
||||
}
|
47
CVE-2024/CVE-2024-57xx/CVE-2024-5724.json
Normal file
47
CVE-2024/CVE-2024-57xx/CVE-2024-5724.json
Normal file
@ -0,0 +1,47 @@
|
||||
{
|
||||
"id": "CVE-2024-5724",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2024-06-19T04:15:13.860",
|
||||
"lastModified": "2024-06-19T04:15:13.860",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The Photo Video Gallery Master plugin for WordPress is vulnerable to PHP Object Injection in all versions up to, and including, 1.5.3 via deserialization of untrusted input 'PVGM_all_photos_details' parameter. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject a PHP Object. No known POP chain is present in the vulnerable software. If a POP chain is present via an additional plugin or theme installed on the target system, it could allow the attacker to delete arbitrary files, retrieve sensitive data, or execute code."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/browser/photo-video-gallery-master/trunk/photo-video-gallery-master.php#L301",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/8376556e-ed78-4a0e-a23f-9b2a39db94d9?source=cve",
|
||||
"source": "security@wordfence.com"
|
||||
}
|
||||
]
|
||||
}
|
47
CVE-2024/CVE-2024-57xx/CVE-2024-5768.json
Normal file
47
CVE-2024/CVE-2024-57xx/CVE-2024-5768.json
Normal file
@ -0,0 +1,47 @@
|
||||
{
|
||||
"id": "CVE-2024-5768",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2024-06-19T04:15:14.160",
|
||||
"lastModified": "2024-06-19T04:15:14.160",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The MIMO Woocommerce Order Tracking plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the 'mimo_update_provider' function in all versions up to, and including, 1.0.2. This makes it possible for authenticated attackers, with Subscriber-level access and above, to update shipping provider information, including adding stored cross-site scripting."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 6.4,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 3.1,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/browser/mimo-woocommerce-order-tracking/tags/1.0.2/mimo-woocommerce-order-tracking.php#L304",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/aa26e595-947c-4327-bbe1-c347688f1209?source=cve",
|
||||
"source": "security@wordfence.com"
|
||||
}
|
||||
]
|
||||
}
|
28
README.md
28
README.md
@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
|
||||
### Last Repository Update
|
||||
|
||||
```plain
|
||||
2024-06-19T04:00:18.946701+00:00
|
||||
2024-06-19T06:00:18.712215+00:00
|
||||
```
|
||||
|
||||
### Most recent CVE Modification Timestamp synchronized with NVD
|
||||
|
||||
```plain
|
||||
2024-06-19T03:15:09.317000+00:00
|
||||
2024-06-19T05:15:52.067000+00:00
|
||||
```
|
||||
|
||||
### Last Data Feed Release
|
||||
@ -33,22 +33,34 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
|
||||
### Total Number of included CVEs
|
||||
|
||||
```plain
|
||||
254390
|
||||
254404
|
||||
```
|
||||
|
||||
### CVEs added in the last Commit
|
||||
|
||||
Recently added CVEs: `1`
|
||||
Recently added CVEs: `14`
|
||||
|
||||
- [CVE-2024-6125](CVE-2024/CVE-2024-61xx/CVE-2024-6125.json) (`2024-06-19T02:15:09.873`)
|
||||
- [CVE-2024-2381](CVE-2024/CVE-2024-23xx/CVE-2024-2381.json) (`2024-06-19T04:15:10.753`)
|
||||
- [CVE-2024-3229](CVE-2024/CVE-2024-32xx/CVE-2024-3229.json) (`2024-06-19T05:15:52.067`)
|
||||
- [CVE-2024-35298](CVE-2024/CVE-2024-352xx/CVE-2024-35298.json) (`2024-06-19T05:15:51.907`)
|
||||
- [CVE-2024-3984](CVE-2024/CVE-2024-39xx/CVE-2024-3984.json) (`2024-06-19T04:15:11.213`)
|
||||
- [CVE-2024-4450](CVE-2024/CVE-2024-44xx/CVE-2024-4450.json) (`2024-06-19T04:15:11.497`)
|
||||
- [CVE-2024-4541](CVE-2024/CVE-2024-45xx/CVE-2024-4541.json) (`2024-06-19T04:15:11.793`)
|
||||
- [CVE-2024-4623](CVE-2024/CVE-2024-46xx/CVE-2024-4623.json) (`2024-06-19T04:15:12.107`)
|
||||
- [CVE-2024-4663](CVE-2024/CVE-2024-46xx/CVE-2024-4663.json) (`2024-06-19T04:15:12.403`)
|
||||
- [CVE-2024-4787](CVE-2024/CVE-2024-47xx/CVE-2024-4787.json) (`2024-06-19T04:15:12.730`)
|
||||
- [CVE-2024-4873](CVE-2024/CVE-2024-48xx/CVE-2024-4873.json) (`2024-06-19T04:15:12.990`)
|
||||
- [CVE-2024-5021](CVE-2024/CVE-2024-50xx/CVE-2024-5021.json) (`2024-06-19T04:15:13.310`)
|
||||
- [CVE-2024-5649](CVE-2024/CVE-2024-56xx/CVE-2024-5649.json) (`2024-06-19T04:15:13.583`)
|
||||
- [CVE-2024-5724](CVE-2024/CVE-2024-57xx/CVE-2024-5724.json) (`2024-06-19T04:15:13.860`)
|
||||
- [CVE-2024-5768](CVE-2024/CVE-2024-57xx/CVE-2024-5768.json) (`2024-06-19T04:15:14.160`)
|
||||
|
||||
|
||||
### CVEs modified in the last Commit
|
||||
|
||||
Recently modified CVEs: `2`
|
||||
Recently modified CVEs: `1`
|
||||
|
||||
- [CVE-2024-24789](CVE-2024/CVE-2024-247xx/CVE-2024-24789.json) (`2024-06-19T03:15:09.183`)
|
||||
- [CVE-2024-27834](CVE-2024/CVE-2024-278xx/CVE-2024-27834.json) (`2024-06-19T03:15:09.317`)
|
||||
- [CVE-2023-30312](CVE-2023/CVE-2023-303xx/CVE-2023-30312.json) (`2024-06-19T04:15:10.477`)
|
||||
|
||||
|
||||
## Download and Usage
|
||||
|
22
_state.csv
22
_state.csv
@ -222327,7 +222327,7 @@ CVE-2023-30309,0,0,f6c35f1b3659dd85852c650ee4c2885b8b81eeeeb014710a5cce3eeaa7928
|
||||
CVE-2023-3031,0,0,e4921201f258ae4d3f18fd35b5c84803c33cafc04f7248b843047361a651cfb4,2023-06-12T16:48:57.833000
|
||||
CVE-2023-30310,0,0,9f32ce3966a9974c29e53e674bbbe7cd75f7bf67267bfce59cafeee645ced7bd,2024-05-29T13:02:09.280000
|
||||
CVE-2023-30311,0,0,6f161ea4afdbf1c1e6379b8e6719712c27aa95a5be3374c04e4be7dfbbb6c193,2024-05-29T13:02:09.280000
|
||||
CVE-2023-30312,0,0,6af2d9b46db43bbcd32be96471fd4a751ab5e7c631b88b19cb34e7500ee61499,2024-05-29T13:02:09.280000
|
||||
CVE-2023-30312,0,1,c94eba8bbeb1b613b24598838e5acb6ffd5c45a38d78b813b6627a4e79ace684,2024-06-19T04:15:10.477000
|
||||
CVE-2023-30313,0,0,702281230db167f684b154adfd80908d6c1bb76b48d2cf5c27e75abbe8365dba,2024-05-29T13:02:09.280000
|
||||
CVE-2023-30314,0,0,27d1af23f818dc82ec03fac89f0b1d5a530a0cf5e1365c90462921489bdcfd47,2024-05-29T13:02:09.280000
|
||||
CVE-2023-30319,0,0,6b9a305549b0e70f092ec22a94d0b22f5bc078f11075f00fc62c946b1553c0d7,2023-07-12T23:03:07.083000
|
||||
@ -244406,6 +244406,7 @@ CVE-2024-23806,0,0,3c7dd05f0d84cb4b37bdcdbac4571706a903d21147ebee955315287ef797b
|
||||
CVE-2024-23807,0,0,df12edcc395b0843ea97d6f3fbf434aff9cef06784aae4873fcae58a24a3d141,2024-02-29T13:49:29.390000
|
||||
CVE-2024-23808,0,0,5be188e2ed229b6d1c42bb6f499af717d633f551dde12260911eb0c8cbdc2703,2024-05-07T13:39:32.710000
|
||||
CVE-2024-23809,0,0,e4465b9152c477fa0b8b9ba353cffba5c3ae3843ad0f849fa715a6b77d4c4ae7,2024-04-02T15:15:53.217000
|
||||
CVE-2024-2381,1,1,5b4f25b2819bc5e7db1eda51927485116ef40752aa9c15fb49d606d5004c1828,2024-06-19T04:15:10.753000
|
||||
CVE-2024-23810,0,0,fcc523095813c9aa174bae9d5d18aa598f3c0429a0b756712e53ba2ee896842a,2024-02-13T14:01:00.987000
|
||||
CVE-2024-23811,0,0,626bc7786e498ad37af14e3917801ad7d39c61c22419a48d031d889eeb5a7ea3,2024-02-13T14:01:00.987000
|
||||
CVE-2024-23812,0,0,33a1b186208ff08c53ff4ffae26bc7a3ad9f21f666e95388037d51e55c6fc5f0,2024-02-13T14:01:00.987000
|
||||
@ -244896,7 +244897,7 @@ CVE-2024-24785,0,0,cc84396d420fdc7cd1eec42a211ce9d46ae1b3fd12a46276acc97b91955cf
|
||||
CVE-2024-24786,0,0,0112d36d75e12362b0246061d23e3880906a29463bfdcb239d077b99ff2f9c0b,2024-06-10T18:15:26.830000
|
||||
CVE-2024-24787,0,0,b3bcd0df2f6c744ccf50ca5da0f1801b01a261f7e49cf2f9e75dcde0c510eeda,2024-06-10T17:16:20.237000
|
||||
CVE-2024-24788,0,0,ec3a0e2bb85b04f6091132ce0b358d8c88079508c68a38db8ec47a1c1ba68f35,2024-06-14T13:15:50.670000
|
||||
CVE-2024-24789,0,1,43ea651f3b7312a155a6d6c3aa916c2fcdbd8bd472319341c3d7874a3e55bb9b,2024-06-19T03:15:09.183000
|
||||
CVE-2024-24789,0,0,43ea651f3b7312a155a6d6c3aa916c2fcdbd8bd472319341c3d7874a3e55bb9b,2024-06-19T03:15:09.183000
|
||||
CVE-2024-2479,0,0,62ab2572f43d54e062a6ec9f07869b63a0bdfad1924b8c09404f39717bdfbd77,2024-05-17T02:38:14.640000
|
||||
CVE-2024-24790,0,0,eea6958e81d73afbece6bae935d256b81d43a28af6bfcc689fa474522b0325d6,2024-06-18T17:59:12.547000
|
||||
CVE-2024-24793,0,0,c02d48f5d574325816298b4b1d2848ca92f5dc7aa67a2fd30978e3885630bc1b,2024-02-20T19:50:53.960000
|
||||
@ -247127,7 +247128,7 @@ CVE-2024-27830,0,0,717b3ee72b31f02e41119efea5f35822a1efa548278881e1425afb0d78eb2
|
||||
CVE-2024-27831,0,0,ca216bc5721077968a6d2a1f89ea202c751376303f2ab60e3e9660283fa6f023,2024-06-12T04:15:11.857000
|
||||
CVE-2024-27832,0,0,2334e6a1d5eaa1494e8cbbaecc65a9a00dab1b896df110deba8ca97ab4050020,2024-06-12T04:15:11.957000
|
||||
CVE-2024-27833,0,0,6bff5968eec0bf8ae50bd7fca5c52c266596a452b7b2728012915f3b8f981972,2024-06-12T04:15:12.053000
|
||||
CVE-2024-27834,0,1,eabfe0fdaf9b8330cd1557b0f84fe6857b5c97fc3f3d0ef71095c0ac3720b463,2024-06-19T03:15:09.317000
|
||||
CVE-2024-27834,0,0,eabfe0fdaf9b8330cd1557b0f84fe6857b5c97fc3f3d0ef71095c0ac3720b463,2024-06-19T03:15:09.317000
|
||||
CVE-2024-27835,0,0,c3d25dd6cfd2f797e5af53adbf0373a3dd203d6ad6e8d11af15dc203eb2402ab,2024-06-10T18:15:29.497000
|
||||
CVE-2024-27836,0,0,94804c3b4c63dbfc22e6899865a39975a715f2a285ca1ed8d65dfe50b63b25bb,2024-06-12T04:15:12.133000
|
||||
CVE-2024-27837,0,0,901f3c3a397896b090baa01f5e16b0462e9f3677320c7d083f0561d63284135d,2024-06-10T18:15:29.550000
|
||||
@ -249895,6 +249896,7 @@ CVE-2024-32285,0,0,9529431b83da151fb9b96ef61a6f52d78979021395b253d357cca57331ad8
|
||||
CVE-2024-32286,0,0,0446ae8cfeed3b6b428f38f3c2f4e35d46b31c54a9ccc231877126a8c050363b,2024-04-17T15:31:50.160000
|
||||
CVE-2024-32287,0,0,26a016a9b3c6a7e85e2e0f642b43856dadb05faacb97686d986a0222c93b67a8,2024-04-17T15:31:50.160000
|
||||
CVE-2024-32288,0,0,d6ad7a62d4bac5355131f6aa48a68ab7356e2aec6915f40a12433efb5f544350,2024-04-17T15:31:50.160000
|
||||
CVE-2024-3229,1,1,db852c9f4971c0df49e941b99aca10d64b9cfebf3e3dcfc895d6e72972f14531,2024-06-19T05:15:52.067000
|
||||
CVE-2024-32290,0,0,800e7992739d5b0400ed8c63993183d656650d0e339040a86ad028fc9cfdd76c,2024-04-17T15:31:50.160000
|
||||
CVE-2024-32291,0,0,b7153c4f84f4dcdc9674c2de97a60dfcb3c6ccd76dc3087e39499a1f30a8221c,2024-04-17T15:31:50.160000
|
||||
CVE-2024-32292,0,0,28e836ab012ba26ce6370aa637128c082a6104370d01202934f29fd84d4444bd,2024-04-17T15:31:50.160000
|
||||
@ -251632,6 +251634,7 @@ CVE-2024-3529,0,0,a5064dfdb29cc291d331e7cb349f1ad4d7941de74c2bc68b73712d362eb350
|
||||
CVE-2024-35291,0,0,0cd9908c687150a1cb92a20a0728ae0d78713e0c1f8545554484da4694fb3024,2024-05-28T12:39:28.377000
|
||||
CVE-2024-35292,0,0,d7611392c0d965ffc3c4722e15c98d7b6e4fb149df8eeccb24ddc9ca3fe05c9e,2024-06-11T13:54:12.057000
|
||||
CVE-2024-35297,0,0,77081ae230c63fb48dd5900682a9571bd14346ef9951f53b02ff7fc86a100e83,2024-05-28T12:39:28.377000
|
||||
CVE-2024-35298,1,1,c7dc34c21e5926904863afa75e79d893b4c1f54d8405029e7ad9b38d088d427c,2024-06-19T05:15:51.907000
|
||||
CVE-2024-35299,0,0,3e4e645ea2334a2d70a8ac0e5a235ab378675ad9f04d95540b17d9c98a4ac10a,2024-05-16T13:03:05.353000
|
||||
CVE-2024-3530,0,0,e12d930d34076470c73bc5005c248ade707b9149f13bae62cf727f0aa959148f,2024-05-17T02:39:59.340000
|
||||
CVE-2024-35300,0,0,c9948d6a23b607dc905f5cedb43ddb5e762c784721f0ec88d5b26fbba2ccfab0,2024-05-16T13:03:05.353000
|
||||
@ -253068,6 +253071,7 @@ CVE-2024-3974,0,0,30b94b89b01dd2c6057362330f67dc78937f3f3edffa0c5a57e7602f711f91
|
||||
CVE-2024-3977,0,0,e9f44416847592725fc2cd47ffed9c743bca75989a5c2d940c73903d22d68b79,2024-06-17T12:42:04.623000
|
||||
CVE-2024-3978,0,0,338ec55d360d0ecf1dfe595690a2d37e24aa4129fa5a75aae324bfa31cd2fe9a,2024-06-17T12:42:04.623000
|
||||
CVE-2024-3979,0,0,4ac2126fe63098861061c1ed3772b0712449f42e64a5481492de94fd61a5b947,2024-06-06T20:15:14.127000
|
||||
CVE-2024-3984,1,1,cb13d99fc80b6409a686317ff1e135ad2da1da6558955948ac3ee4d4625aa0a5,2024-06-19T04:15:11.213000
|
||||
CVE-2024-3985,0,0,73586f1cedc99952324792e19f078c055584e6e606f6222ac3907090ad395ced,2024-05-02T18:00:37.360000
|
||||
CVE-2024-3987,0,0,05499205f937534ee026fd5a41dcafd44deae059117eea743b5e3e3c53eaee01,2024-06-07T14:56:05.647000
|
||||
CVE-2024-3988,0,0,ed49ad0e503298ba2fe40c90a665a86dcb918b5087ac61c1edfd746c2ca95d24,2024-04-25T13:18:13.537000
|
||||
@ -253422,6 +253426,7 @@ CVE-2024-4445,0,0,42f5f65e0ec1a0527ed0ebe136ff3e505384e30728c0f33fdcc95acd928f2f
|
||||
CVE-2024-4446,0,0,c1a78a1d4c0d05d17b6cead174a683289ca018fac3b1c104ff2e5b23dbf06e48,2024-05-14T16:11:39.510000
|
||||
CVE-2024-4448,0,0,c0706d1927abee0ebde095d1bd8c9375ae579980372e3f8e4e4c3b77a255c913,2024-05-14T16:11:39.510000
|
||||
CVE-2024-4449,0,0,5f461a2e161ed0d547590d7983036c434e3239f67f76e9397bc8163418dcb335,2024-05-14T16:11:39.510000
|
||||
CVE-2024-4450,1,1,7a491d8042ff672f697b3ae9dc2b62d6e777c4d0cac1fa3342780217f3c4f06e,2024-06-19T04:15:11.497000
|
||||
CVE-2024-4451,0,0,f70e360fa3f5a5d6e18bdbe208091339d7cb5cb309615badd1f0a4ad058c1f13,2024-06-11T18:09:15.847000
|
||||
CVE-2024-4452,0,0,3d66d1a1960a575e299177a954e31a59092574d107ebd8033a3f44850e26c060,2024-05-21T16:54:26.047000
|
||||
CVE-2024-4453,0,0,707eb1eb10614c3d7f7f21e0ec15b9b3559f199dd400220131735a7028223558,2024-06-10T17:16:33.460000
|
||||
@ -253498,6 +253503,7 @@ CVE-2024-4537,0,0,bc82aa6954c5799b0476dc279149a81ab940e42aa35e918500f89f663af922
|
||||
CVE-2024-4538,0,0,dbb952ff57fc82a37e26bc4eac10a9f198285e190e0ce1d17eb40564657c4b33,2024-05-07T13:39:32.710000
|
||||
CVE-2024-4539,0,0,83e8dd6ad2ba7f5df744ac27f19ba7dd20f88687370090b4e13c20c65e81aa4f,2024-05-14T16:11:39.510000
|
||||
CVE-2024-4540,0,0,dc537153d649e10b7c874b04ae96fc2345a92f4b276e017e0d8b384efb35ed61,2024-06-03T23:15:08.930000
|
||||
CVE-2024-4541,1,1,8f81895621381934d510861cb3ed17efdd3ae5fc04fdbba54982b8a485cbc2bb,2024-06-19T04:15:11.793000
|
||||
CVE-2024-4542,0,0,d17f875757344f90ad0b6ea46d223a5444286908c9043b3fba1504d3883c4c6d,2024-05-16T14:15:08.980000
|
||||
CVE-2024-4544,0,0,5a154bb8f5362adfa7d1d9ca8e07fcce2012291bc3a87e95a1b546af1c241c8c,2024-05-24T13:03:11.993000
|
||||
CVE-2024-4545,0,0,6a8513e5f42227bdebff4b9eb7cd99ee2da82484e9d02165945026400c877f9c,2024-05-14T16:11:39.510000
|
||||
@ -253561,6 +253567,7 @@ CVE-2024-4619,0,0,e5a9884a731cd527eccadb69d8fea8c7f9c7a04a1fc119314f14a8f7a5fe1b
|
||||
CVE-2024-4620,0,0,aca290e81a01c9aa0297c2a2a6f363e13c691584f35f3993ff959e5f7ab27226,2024-06-07T14:56:05.647000
|
||||
CVE-2024-4621,0,0,0dcad97674134d7acc0f6a3b23542c7c7b4811503a20f42bfd18c3bed8fb5fba,2024-06-07T14:56:05.647000
|
||||
CVE-2024-4622,0,0,4b1992fe33b227c66e64bdd4cf1c71e31b73a98abda6bdd8e7687e0db4e86196,2024-05-15T18:35:11.453000
|
||||
CVE-2024-4623,1,1,cd721a04521d6e02c865f3b0b5d4fa5dafaaa0badffaa20fa9d718d9a931704d,2024-06-19T04:15:12.107000
|
||||
CVE-2024-4624,0,0,2a601b2b9934f4e4184c90fc3ba9cbddeec712a59701e0372ed6d18cfcc3b7c7,2024-05-14T19:17:55.627000
|
||||
CVE-2024-4630,0,0,f5808b44be131bdae6b6920228d425b0dd235ef4afe8685cc2ea30d538a619f5,2024-05-14T16:11:39.510000
|
||||
CVE-2024-4631,0,0,e8ed3d07eca49fd9ce5a62406bcf23da9793cbcc792a956665a267b4f25fd693,2024-05-14T15:44:13.487000
|
||||
@ -253583,6 +253590,7 @@ CVE-2024-4654,0,0,eca077048d127add67f133585649496d1af539c8d39e41b186d99947e2c0e5
|
||||
CVE-2024-4656,0,0,23093c7ec18a8f42da4c8fc1c86b9aa6984d979cf63954576e1d332548405180,2024-05-15T16:40:19.330000
|
||||
CVE-2024-4661,0,0,e86145aa3dfc1a1e846a3970af65d72463f2a51aba17ea6b9d5a34de37b2fc53,2024-06-10T02:52:08.267000
|
||||
CVE-2024-4662,0,0,271820e0248036cdcfeea2da470b958f93caba3600263b2df375c674d931507f,2024-05-24T01:15:30.977000
|
||||
CVE-2024-4663,1,1,5093a4590cc188b434b70527cead1f0677701d00c0a0a1f762d93a826b9c03ed,2024-06-19T04:15:12.403000
|
||||
CVE-2024-4666,0,0,dde8d66c76bdf850b898b9f95df0d92f0ac3da730c1f32826d61843a6ef06bf5,2024-05-15T16:40:19.330000
|
||||
CVE-2024-4668,0,0,3c2f34d91ee8c9aacf0f125fe94ffbbe9a611b8f1a54ab65e0473cea71baad6f,2024-05-30T13:15:41.297000
|
||||
CVE-2024-4669,0,0,cb3ea770e599714f2de5e50bc4195c130850e813b58882b88bfe234ded1dcd7f,2024-06-13T18:36:09.013000
|
||||
@ -253676,6 +253684,7 @@ CVE-2024-4777,0,0,463b2af71f8f2a9d1c562c36b6fb26878d601ac505a437b31aefb6540cc53c
|
||||
CVE-2024-4778,0,0,37531b60d89a44d35c14fde25587b4d8cbf891fd39da513ae2adbe2646535312,2024-05-14T19:17:55.627000
|
||||
CVE-2024-4779,0,0,e93e79f4a86fab8cb11a3f6a53c3afceec1606ec76ba934e81e552f2e4a9a244,2024-05-24T01:15:30.977000
|
||||
CVE-2024-4783,0,0,daba56adbc0652555be3afeccbdbe190fb7cbe9964b63627bf6508f75d28c65f,2024-05-24T01:15:30.977000
|
||||
CVE-2024-4787,1,1,0634b5ae623dc2a3f970d60256690d931423d37861b65ad1443a3e504a5b5c0b,2024-06-19T04:15:12.730000
|
||||
CVE-2024-4788,0,0,1c9a8fbf6bcaa04fd9a337cf6b1788c99808cca0f3735caac5c9d9e2c279004c,2024-06-06T14:17:35.017000
|
||||
CVE-2024-4789,0,0,c3ead1522386330c98ef03f50054b683a63e62c43c9e3867ea226ff37f2983a1,2024-05-17T18:35:35.070000
|
||||
CVE-2024-4790,0,0,9ca82e19e832a950283217f2bfd1db7efd6838c8a8bf54a7d78165e2752eb0b9,2024-05-17T02:40:36.990000
|
||||
@ -253737,6 +253746,7 @@ CVE-2024-4863,0,0,0f2a759d2230ea6d690206f8dcf95872d885a68184080990b57fd14696b638
|
||||
CVE-2024-4865,0,0,034a7c12f3d6f4bd5ac54ee1f34abd70a559c5b9a18ae852351f79db6d61b9c9,2024-05-20T13:00:34.807000
|
||||
CVE-2024-4870,0,0,789ccad79b53f3162faaa4d0c14e00ab550e7e413c46a4332529e5d35d1d0423,2024-06-04T16:57:41.053000
|
||||
CVE-2024-4871,0,0,089a89f3309c27433f20e3be4ef9a00379f9f19601c1c8029649846113aed43a,2024-05-14T19:17:55.627000
|
||||
CVE-2024-4873,1,1,b5297926ea8d8726afad8cdbe9f36c5996133b3dce2df8fcf7cd1919ebcb1e78,2024-06-19T04:15:12.990000
|
||||
CVE-2024-4875,0,0,aa35cb89fee530b58aa987ffc67ea97738c0ba567903bf01429a1a1259923db8,2024-05-21T12:37:59.687000
|
||||
CVE-2024-4876,0,0,02aac8d1be489833aa2e07f8be8ce083249ac7dc2fcc33fd144386b8d365fef2,2024-05-21T12:37:59.687000
|
||||
CVE-2024-4881,0,0,4f17be95dbf63ebb1e221e9270b941e4838c9b4d4b1f7c998cfbd25da7153e04,2024-06-07T14:56:05.647000
|
||||
@ -253827,6 +253837,7 @@ CVE-2024-5000,0,0,21f44bae275ca5e7f3a45da963612f2fb705c74e44c15e2681f54ff4506e6a
|
||||
CVE-2024-5001,0,0,bac0073c23ed28e836068e8632acf1110bc49b73246f9cff53f5a706acc4a57d,2024-06-06T14:17:35.017000
|
||||
CVE-2024-5003,0,0,d7f0fc1b6b7797a26bbde28f3345c21309ee3aa5cb19350abdc4f1d0ca9ec31a,2024-06-07T14:56:05.647000
|
||||
CVE-2024-5006,0,0,982820e7e91a551bd12476d9f6731c77df87e69f9a4499c2643412449b7b2aa0,2024-06-11T17:36:24
|
||||
CVE-2024-5021,1,1,6741dd7fe6cfc37a6c6b7484b86a601d6466e88034b83883016a9a8e99345405,2024-06-19T04:15:13.310000
|
||||
CVE-2024-5022,0,0,106355f86b530d1586a5d339031de27a1a2312467a76eb449e8e9901150235d8,2024-05-20T13:00:34.807000
|
||||
CVE-2024-5023,0,0,974704283893df4cc9d8e0bcce8bb65ebf635268235f75f47c922033893214ce,2024-05-17T18:36:31.297000
|
||||
CVE-2024-5025,0,0,d287dc9bcba0fba1784ec3f3fe4bf65eea235ed5e6f91d741018beb442d992d7,2024-05-22T12:46:53.887000
|
||||
@ -254210,6 +254221,7 @@ CVE-2024-5638,0,0,ecd29107ace2c39372f8ad7d26b6d92a031cf986dc4e07d96162e8140ebd09
|
||||
CVE-2024-5640,0,0,86163b3d741cee0a4e50ef8553f0c82f1f0c15bd48d022d2d250ef0f55c23f10,2024-06-07T14:56:05.647000
|
||||
CVE-2024-5645,0,0,1faba0fd6e05694e3fff7011c206b3ecee3c45fddb7e6c575993af231224a181,2024-06-11T17:57:47.197000
|
||||
CVE-2024-5646,0,0,23240aeec5f40e46e6951e19eff4b72273567c29932f06ca0851d3144bb5ebaa,2024-06-13T18:36:09.013000
|
||||
CVE-2024-5649,1,1,f665abdaa2c1bd0ad8c015322d62e738c982959dc32c2a416c1178883f55387c,2024-06-19T04:15:13.583000
|
||||
CVE-2024-5650,0,0,65f855892c82055621a01afe5dfbac2eeb37ab3d50eb12f09dc0d9a40779b9ee,2024-06-17T12:42:04.623000
|
||||
CVE-2024-5653,0,0,283076b6ccce08ae3d1ddf9d7f5983a839d66c80929543a8a527d0bfdf86a2f9,2024-06-06T14:17:35.017000
|
||||
CVE-2024-5654,0,0,e22a0b433d38e113ff7c2fe935a2ac4a2eac96ee27b605312aa4a4c8d50d69a0,2024-06-10T02:52:08.267000
|
||||
@ -254242,6 +254254,7 @@ CVE-2024-5699,0,0,d1e1ab6a164c3c763187b9b9eaa5ede2a373113d6efcf901de284e7d644c77
|
||||
CVE-2024-5700,0,0,92d851a28dc6a0cf1e89dda1698a94af0728730fac9009e8ae23bc0d1685cbe9,2024-06-13T23:15:50.943000
|
||||
CVE-2024-5701,0,0,c0b77ae9f34889006ada566ff239d80e91c1e1e51e6239a509f45a6d387ce8ce,2024-06-11T13:54:12.057000
|
||||
CVE-2024-5702,0,0,132133584f2c8a8af63186716eb284a7e155bef1da08058dd33dd36afa50e8f2,2024-06-13T23:15:51.020000
|
||||
CVE-2024-5724,1,1,24dddb5050acc506e9e5eeb9f762d2a963da30de50c8c0e5d9cc8895166543d7,2024-06-19T04:15:13.860000
|
||||
CVE-2024-5731,0,0,f8f18711dc1e7684e37f428b0d6e39ca275690790dad9599ea32c8e89b131e02,2024-06-17T12:42:04.623000
|
||||
CVE-2024-5732,0,0,2b69cb5542c2f91e3e2021ac007049b3634a9137bdf0c325241236594abc7cc6,2024-06-11T17:57:13.767000
|
||||
CVE-2024-5733,0,0,78152e13cdabf162486c62849d39e4c95e26727ad5623fb603c3826108c4ab9b,2024-06-11T18:30:50.690000
|
||||
@ -254256,6 +254269,7 @@ CVE-2024-5758,0,0,250b274bfcefb72defbd26103c82d5c8ed585b7571d3785565c3013fdb6e4a
|
||||
CVE-2024-5759,0,0,a8b20ed9df5a502bc1dbe4283a67eed19771ffb4a4f02a90724215ed5101a898,2024-06-13T18:36:09.010000
|
||||
CVE-2024-5761,0,0,e0022a8d80317cd3941058bae14b514f68707790a5051038049a1d552ba8de69,2024-06-07T19:15:24.467000
|
||||
CVE-2024-5766,0,0,f4f0065e1ad74a475f6d00e1f328df39da374dfe97f7b4c54df1858a2ce42e5e,2024-06-10T02:52:08.267000
|
||||
CVE-2024-5768,1,1,883a7648b70c7db908481ffb4058973239dab8acdd6105dbbe5f540b4ae85522,2024-06-19T04:15:14.160000
|
||||
CVE-2024-5770,0,0,25b3f0241d69604556f37a6471fa9a6892ce290ef4b03f2d5525dd585c681fcd,2024-06-10T02:52:08.267000
|
||||
CVE-2024-5771,0,0,378b86ddb7266a39f3407b18465f75a96b2cb76a6e911ad726ef8ee0f827d15d,2024-06-10T02:52:08.267000
|
||||
CVE-2024-5772,0,0,5d02fcc48cc4ed4858aa4bf1d7006f9e16a6fd1e467e74217e74d7e97c0dddba,2024-06-10T02:52:08.267000
|
||||
@ -254381,7 +254395,7 @@ CVE-2024-6112,0,0,3793178079993987ba7bf7b37db89ff5b23660048ce424d2f0351839dfc7b7
|
||||
CVE-2024-6114,0,0,b861f686c72ead40271b9e15f5d48ada8c079a2c4c9ea1405ca71da7d3acf766,2024-06-18T13:15:52.897000
|
||||
CVE-2024-6115,0,0,8370727144c08f52daee8853cdc1c595dffde958a895699c94efac517eada338,2024-06-18T13:15:53.267000
|
||||
CVE-2024-6116,0,0,9c214becff49a599c0981aa0de917221cc0b2f05b538da5ededc03f464bf8356,2024-06-18T16:15:10.983000
|
||||
CVE-2024-6125,1,1,fa267cc2485605b04afb41f92061ceba58b846de96eed178a247c22981f2edf8,2024-06-19T02:15:09.873000
|
||||
CVE-2024-6125,0,0,fa267cc2485605b04afb41f92061ceba58b846de96eed178a247c22981f2edf8,2024-06-19T02:15:09.873000
|
||||
CVE-2024-6128,0,0,55dd86526ffc64aa22b4ae50ac75f79328093ce905e507fd46907528cb0d85a5,2024-06-18T21:15:56.877000
|
||||
CVE-2024-6129,0,0,2988cb8a677c36eeb9291aae9a3963f084f044e15211a677c78cefdb57c80496,2024-06-18T21:15:57.217000
|
||||
CVE-2024-6142,0,0,b72e1389b74690e00d255349d35caab25cc2db5a4c7637f27b1d47463c0fc348,2024-06-19T00:15:49.580000
|
||||
|
Can't render this file because it is too large.
|
Loading…
x
Reference in New Issue
Block a user