Auto-Update: 2024-05-30T12:00:38.282572+00:00

This commit is contained in:
cad-safe-bot 2024-05-30 12:03:30 +00:00
parent 9a395d60ac
commit d400fce651
9 changed files with 297 additions and 104 deletions

View File

@ -2,12 +2,12 @@
"id": "CVE-2022-33324",
"sourceIdentifier": "Mitsubishielectric.Psirt@yd.MitsubishiElectric.co.jp",
"published": "2022-12-23T03:15:08.723",
"lastModified": "2023-12-13T05:15:07.773",
"lastModified": "2024-05-30T10:15:08.703",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "Improper Resource Shutdown or Release vulnerability in Mitsubishi Electric Corporation MELSEC iQ-R Series R00/01/02CPU Firmware versions \"32\" and prior, Mitsubishi Electric Corporation MELSEC iQ-R Series R04/08/16/32/120(EN)CPU Firmware versions \"65\" and prior, Mitsubishi Electric Corporation MELSEC iQ-R Series R08/16/32/120SFCPU Firmware versions \"29\" and prior, Mitsubishi Electric Corporation MELSEC iQ-R Series R12CCPU-V Firmware versions \"17\" and prior, Mitsubishi Electric Corporation MELSEC iQ-L Series L04/08/16/32HCPU all versions and Mitsubishi Electric Corporation MELIPC Series MI5122-VW all versions allows a remote unauthenticated attacker to cause a Denial of Service condition in Ethernet communication on the module by sending specially crafted packets. A system reset of the module is required for recovery."
"value": "Improper Resource Shutdown or Release vulnerability in Mitsubishi Electric Corporation MELSEC iQ-R Series R00/01/02CPU Firmware versions \"32\" and prior, Mitsubishi Electric Corporation MELSEC iQ-R Series R04/08/16/32/120(EN)CPU Firmware versions \"65\" and prior, Mitsubishi Electric Corporation MELSEC iQ-R Series R08/16/32/120SFCPU Firmware versions \"29\" and prior, Mitsubishi Electric Corporation MELSEC iQ-R Series R12CCPU-V Firmware versions \"17\" and prior, Mitsubishi Electric Corporation MELSEC iQ-L Series L04/08/16/32HCPU all versions and Mitsubishi Electric Corporation MELIPC Series MI5122-VW Firmware versions \"07\" and prior allows a remote unauthenticated attacker to cause a Denial of Service condition in Ethernet communication on the module by sending specially crafted packets. A system reset of the module is required for recovery."
},
{
"lang": "es",
@ -89,10 +89,9 @@
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:mitsubishi:melsec_iq-r_r00_cpu_firmware:*:*:*:*:*:*:*:*",
"versionEndExcluding": "33.0",
"matchCriteriaId": "EFC979CD-10C3-400C-A7EA-9E9B3637E1D7"
"vulnerable": false,
"criteria": "cpe:2.3:h:mitsubishi:melsec_iq-r_r00_cpu:-:*:*:*:*:*:*:*",
"matchCriteriaId": "FC6B7E9C-C56C-4452-9A8A-3E8BF51ED354"
}
]
},
@ -101,9 +100,10 @@
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:mitsubishi:melsec_iq-r_r00_cpu:-:*:*:*:*:*:*:*",
"matchCriteriaId": "FC6B7E9C-C56C-4452-9A8A-3E8BF51ED354"
"vulnerable": true,
"criteria": "cpe:2.3:o:mitsubishi:melsec_iq-r_r00_cpu_firmware:*:*:*:*:*:*:*:*",
"versionEndExcluding": "33.0",
"matchCriteriaId": "EFC979CD-10C3-400C-A7EA-9E9B3637E1D7"
}
]
}
@ -112,6 +112,17 @@
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:mitsubishi:melsec_iq-r_r01_cpu:-:*:*:*:*:*:*:*",
"matchCriteriaId": "560D6AFE-4CDC-40D0-8C35-6749375B9B3C"
}
]
},
{
"operator": "OR",
"negate": false,
@ -123,23 +134,23 @@
"matchCriteriaId": "7E13BF4F-3D5A-4FAD-BCD8-7261920AE06F"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:mitsubishi:melsec_iq-r_r01_cpu:-:*:*:*:*:*:*:*",
"matchCriteriaId": "560D6AFE-4CDC-40D0-8C35-6749375B9B3C"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:mitsubishi:melsec_iq-r_r02_cpu:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E4D5746A-B9BC-4A4C-AF09-D2B16D54BF4D"
}
]
},
{
"operator": "OR",
"negate": false,
@ -151,23 +162,23 @@
"matchCriteriaId": "60BEF351-E337-4302-8D82-E90B2834370F"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:mitsubishi:melsec_iq-r_r02_cpu:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E4D5746A-B9BC-4A4C-AF09-D2B16D54BF4D"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:mitsubishi:melsec_iq-r_r04_cpu:-:*:*:*:*:*:*:*",
"matchCriteriaId": "DA6B52DA-0EF4-46BF-A36D-92F717F70987"
}
]
},
{
"operator": "OR",
"negate": false,
@ -179,23 +190,23 @@
"matchCriteriaId": "0B733AD2-E857-47F4-89D5-A8F8B45F4A52"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:mitsubishi:melsec_iq-r_r04_cpu:-:*:*:*:*:*:*:*",
"matchCriteriaId": "DA6B52DA-0EF4-46BF-A36D-92F717F70987"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:mitsubishi:melsec_iq-r_r08_cpu:-:*:*:*:*:*:*:*",
"matchCriteriaId": "CF4496AD-1EFC-4B1D-8122-799FA34B40CB"
}
]
},
{
"operator": "OR",
"negate": false,
@ -207,23 +218,23 @@
"matchCriteriaId": "94D88549-B35E-4E27-84D1-3A828604BAED"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:mitsubishi:melsec_iq-r_r08_cpu:-:*:*:*:*:*:*:*",
"matchCriteriaId": "CF4496AD-1EFC-4B1D-8122-799FA34B40CB"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:mitsubishi:melsec_iq-r_r16_cpu:-:*:*:*:*:*:*:*",
"matchCriteriaId": "CA42D2F8-7856-4983-8FA9-0421E039AE8C"
}
]
},
{
"operator": "OR",
"negate": false,
@ -235,23 +246,23 @@
"matchCriteriaId": "64A9C5A6-401D-4E28-A0DB-0BCD84B4E62B"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:mitsubishi:melsec_iq-r_r16_cpu:-:*:*:*:*:*:*:*",
"matchCriteriaId": "CA42D2F8-7856-4983-8FA9-0421E039AE8C"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:mitsubishi:melsec_iq-r_r32_cpu:-:*:*:*:*:*:*:*",
"matchCriteriaId": "46D73C1A-3B81-4E81-A56D-0A75CEA4F92C"
}
]
},
{
"operator": "OR",
"negate": false,
@ -263,17 +274,6 @@
"matchCriteriaId": "3F397671-FF15-45B0-8CEE-BC807B402019"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:mitsubishi:melsec_iq-r_r32_cpu:-:*:*:*:*:*:*:*",
"matchCriteriaId": "46D73C1A-3B81-4E81-A56D-0A75CEA4F92C"
}
]
}
]
},
@ -285,10 +285,9 @@
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:mitsubishi:melsec_iq-r_r120_cpu_firmware:*:*:*:*:*:*:*:*",
"versionEndExcluding": "66.0",
"matchCriteriaId": "4F2250E2-BDB4-4D12-BE4A-9BFBE83736D6"
"vulnerable": false,
"criteria": "cpe:2.3:h:mitsubishi:melsec_iq-r_r120_cpu:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3EB4326B-B4F4-40DD-8220-204D490FFB38"
}
]
},
@ -297,9 +296,10 @@
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:mitsubishi:melsec_iq-r_r120_cpu:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3EB4326B-B4F4-40DD-8220-204D490FFB38"
"vulnerable": true,
"criteria": "cpe:2.3:o:mitsubishi:melsec_iq-r_r120_cpu_firmware:*:*:*:*:*:*:*:*",
"versionEndExcluding": "66.0",
"matchCriteriaId": "4F2250E2-BDB4-4D12-BE4A-9BFBE83736D6"
}
]
}

View File

@ -0,0 +1,47 @@
{
"id": "CVE-2024-3583",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-05-30T11:15:30.753",
"lastModified": "2024-05-30T11:15:30.753",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "The Simple Like Page Plugin plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's shortcode(s) in all versions up to, and including, 1.5.2 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security@wordfence.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 6.4,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 3.1,
"impactScore": 2.7
}
]
},
"references": [
{
"url": "https://plugins.trac.wordpress.org/changeset/3092346/simple-facebook-plugin/trunk?contextall=1&old=3051436&old_path=%2Fsimple-facebook-plugin%2Ftrunk",
"source": "security@wordfence.com"
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/070f6820-e70c-4325-b5cb-d2010da34dce?source=cve",
"source": "security@wordfence.com"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-36014",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-05-29T07:15:10.177",
"lastModified": "2024-05-29T13:02:09.280",
"lastModified": "2024-05-30T10:15:09.933",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
@ -16,9 +16,17 @@
],
"metrics": {},
"references": [
{
"url": "https://git.kernel.org/stable/c/93f76ec1eddce60dbb5885cbc0d7df54adee4639",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/a1f95aede6285dba6dd036d907196f35ae3a11ea",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/b77620730f614059db2470e8ebab3e725280fc6d",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
}
]
}

View File

@ -2,12 +2,16 @@
"id": "CVE-2024-36016",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-05-29T19:15:48.297",
"lastModified": "2024-05-29T19:50:25.303",
"lastModified": "2024-05-30T10:15:10.097",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\ntty: n_gsm: fix possible out-of-bounds in gsm0_receive()\n\nAssuming the following:\n- side A configures the n_gsm in basic option mode\n- side B sends the header of a basic option mode frame with data length 1\n- side A switches to advanced option mode\n- side B sends 2 data bytes which exceeds gsm->len\n Reason: gsm->len is not used in advanced option mode.\n- side A switches to basic option mode\n- side B keeps sending until gsm0_receive() writes past gsm->buf\n Reason: Neither gsm->state nor gsm->len have been reset after\n reconfiguration.\n\nFix this by changing gsm->count to gsm->len comparison from equal to less\nthan. Also add upper limit checks against the constant MAX_MRU in\ngsm0_receive() and gsm1_receive() to harden against memory corruption of\ngsm->len and gsm->mru.\n\nAll other checks remain as we still need to limit the data according to the\nuser configuration and actual payload size."
},
{
"lang": "es",
"value": "En el kernel de Linux se ha resuelto la siguiente vulnerabilidad: tty: n_gsm: corrige posibles fuera de los l\u00edmites en gsm0_receive() Suponiendo lo siguiente: - el lado A configura el n_gsm en modo de opci\u00f3n b\u00e1sica - el lado B env\u00eda el encabezado de un mensaje b\u00e1sico trama del modo de opci\u00f3n con longitud de datos 1 - el lado A cambia al modo de opci\u00f3n avanzada - el lado B env\u00eda 2 bytes de datos que exceden gsm->len Motivo: gsm->len no se usa en el modo de opci\u00f3n avanzada. - el lado A cambia al modo de opci\u00f3n b\u00e1sica - el lado B contin\u00faa enviando hasta que gsm0_receive() escribe m\u00e1s all\u00e1 de gsm->buf Motivo: Ni gsm->state ni gsm->len se han restablecido despu\u00e9s de la reconfiguraci\u00f3n. Solucione este problema cambiando gsm->count a gsm->len comparaci\u00f3n de igual a menor que. Tambi\u00e9n agregue comprobaciones de l\u00edmite superior contra la constante MAX_MRU en gsm0_receive() y gsm1_receive() para proteger contra la corrupci\u00f3n de memoria de gsm->len y gsm->mru. Todas las dem\u00e1s comprobaciones permanecen, ya que todav\u00eda necesitamos limitar los datos seg\u00fan la configuraci\u00f3n del usuario y el tama\u00f1o real del payload."
}
],
"metrics": {},
@ -15,6 +19,14 @@
{
"url": "https://git.kernel.org/stable/c/47388e807f85948eefc403a8a5fdc5b406a65d5a",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/b890d45aaf02b564e6cae2d2a590f9649330857d",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/f126ce7305fe88f49cdabc6db4168b9318898ea3",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
}
]
}

View File

@ -8,6 +8,10 @@
{
"lang": "en",
"value": "The Comparison Slider plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on several AJAX actions in all versions up to, and including, 1.0.5. This makes it possible for authenticated attackers, with subscriber access or above, to change plugin settings and perform other actions such deleting sliders."
},
{
"lang": "es",
"value": "El complemento Comparison Slider para WordPress es vulnerable a modificaciones no autorizadas de datos debido a una falta de verificaci\u00f3n de capacidad en varias acciones AJAX en todas las versiones hasta la 1.0.5 incluida. Esto hace posible que atacantes autenticados, con acceso de suscriptor o superior, cambien la configuraci\u00f3n del complemento y realicen otras acciones, como eliminar controles deslizantes."
}
],
"metrics": {

View File

@ -0,0 +1,63 @@
{
"id": "CVE-2024-4668",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-05-30T10:15:10.180",
"lastModified": "2024-05-30T10:15:10.180",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "The Gum Elementor Addon plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the Price Table and Post Slider widgets in all versions up to, and including, 1.3.4 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page."
},
{
"lang": "es",
"value": "El complemento Gum Elementor Addon para WordPress es vulnerable a Cross-Site Scripting Almacenado a trav\u00e9s de los widgets de tabla de precios y control deslizante de publicaciones en todas las versiones hasta la 1.3.4 incluida debido a una sanitizaci\u00f3n de entrada insuficiente y a un escape de salida en los atributos proporcionados por el usuario. Esto hace posible que atacantes autenticados, con acceso de nivel de colaborador y superior, inyecten scripts web arbitrarios en p\u00e1ginas que se ejecutar\u00e1n cada vez que un usuario acceda a una p\u00e1gina inyectada."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security@wordfence.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 6.4,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 3.1,
"impactScore": 2.7
}
]
},
"references": [
{
"url": "https://plugins.trac.wordpress.org/browser/gum-elementor-addon/trunk/widgets/post_slider.php#L2353",
"source": "security@wordfence.com"
},
{
"url": "https://plugins.trac.wordpress.org/browser/gum-elementor-addon/trunk/widgets/pricetable.php#L2013",
"source": "security@wordfence.com"
},
{
"url": "https://plugins.trac.wordpress.org/changeset/3093511/#file48",
"source": "security@wordfence.com"
},
{
"url": "https://wordpress.org/plugins/gum-elementor-addon/#developers",
"source": "security@wordfence.com"
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/8b4effc8-7b24-4a6c-a161-176a22de6d6a?source=cve",
"source": "security@wordfence.com"
}
]
}

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2024-5326",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-05-30T11:15:30.970",
"lastModified": "2024-05-30T11:15:30.970",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "The Post Grid Gutenberg Blocks and WordPress Blog Plugin \u2013 PostX plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the 'postx_presets_callback' function in all versions up to, and including, 4.1.2. This makes it possible for authenticated attackers, with Contributor-level access and above, to change arbitrary options on affected sites. This can be used to enable new user registration and set the default role for new users to Administrator."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security@wordfence.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
]
},
"references": [
{
"url": "https://plugins.trac.wordpress.org/browser/ultimate-post/trunk/classes/Styles.php#L160",
"source": "security@wordfence.com"
},
{
"url": "https://plugins.trac.wordpress.org/browser/ultimate-post/trunk/classes/Styles.php#L177",
"source": "security@wordfence.com"
},
{
"url": "https://plugins.trac.wordpress.org/changeset/3093815/",
"source": "security@wordfence.com"
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/07a3db33-3787-4b63-835d-8e3026206842?source=cve",
"source": "security@wordfence.com"
}
]
}

View File

@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update
```plain
2024-05-30T10:00:38.053384+00:00
2024-05-30T12:00:38.282572+00:00
```
### Most recent CVE Modification Timestamp synchronized with NVD
```plain
2024-05-30T09:15:10.453000+00:00
2024-05-30T11:15:30.970000+00:00
```
### Last Data Feed Release
@ -33,25 +33,26 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
### Total Number of included CVEs
```plain
252104
252107
```
### CVEs added in the last Commit
Recently added CVEs: `6`
Recently added CVEs: `3`
- [CVE-2024-2089](CVE-2024/CVE-2024-20xx/CVE-2024-2089.json) (`2024-05-30T09:15:09.360`)
- [CVE-2024-2657](CVE-2024/CVE-2024-26xx/CVE-2024-2657.json) (`2024-05-30T09:15:09.583`)
- [CVE-2024-4355](CVE-2024/CVE-2024-43xx/CVE-2024-4355.json) (`2024-05-30T09:15:09.790`)
- [CVE-2024-4422](CVE-2024/CVE-2024-44xx/CVE-2024-4422.json) (`2024-05-30T09:15:10.020`)
- [CVE-2024-4426](CVE-2024/CVE-2024-44xx/CVE-2024-4426.json) (`2024-05-30T09:15:10.230`)
- [CVE-2024-4427](CVE-2024/CVE-2024-44xx/CVE-2024-4427.json) (`2024-05-30T09:15:10.453`)
- [CVE-2024-3583](CVE-2024/CVE-2024-35xx/CVE-2024-3583.json) (`2024-05-30T11:15:30.753`)
- [CVE-2024-4668](CVE-2024/CVE-2024-46xx/CVE-2024-4668.json) (`2024-05-30T10:15:10.180`)
- [CVE-2024-5326](CVE-2024/CVE-2024-53xx/CVE-2024-5326.json) (`2024-05-30T11:15:30.970`)
### CVEs modified in the last Commit
Recently modified CVEs: `0`
Recently modified CVEs: `4`
- [CVE-2022-33324](CVE-2022/CVE-2022-333xx/CVE-2022-33324.json) (`2024-05-30T10:15:08.703`)
- [CVE-2024-36014](CVE-2024/CVE-2024-360xx/CVE-2024-36014.json) (`2024-05-30T10:15:09.933`)
- [CVE-2024-36016](CVE-2024/CVE-2024-360xx/CVE-2024-36016.json) (`2024-05-30T10:15:10.097`)
- [CVE-2024-4427](CVE-2024/CVE-2024-44xx/CVE-2024-4427.json) (`2024-05-30T09:15:10.453`)
## Download and Usage

View File

@ -200726,7 +200726,7 @@ CVE-2022-33320,0,0,499d71c29fcbb1dac93bce0266b9a510f343ff995df72ef6f04466f578337
CVE-2022-33321,0,0,28ded79bb837eabe6c9c9ff3c9367147e43b5edcf3e8d006a45278113ad8d9ea,2023-10-26T06:15:07.963000
CVE-2022-33322,0,0,1ffe7c5a4e541fb2cab5481ebf644de030cb88e02a602fb18674a12630d749e2,2023-10-26T06:15:09.297000
CVE-2022-33323,0,0,111449fd702099ac464ad28ad331b874fb3fd63b6b2fb7c864fdcc6f51ca1b11,2023-07-21T19:22:23.673000
CVE-2022-33324,0,0,7a954e465ea1d3bdff69c277d7b77a912583f3759887a790877bee5bb5891305,2023-12-13T05:15:07.773000
CVE-2022-33324,0,1,19a203fa2ea8850bb0c46cc638382e638f2609764a6d808a58bb1eda26e86f7d,2024-05-30T10:15:08.703000
CVE-2022-33325,0,0,254a6e510adf83bba23c99082d51ab17324c91f3b818947bff593316a6a19c04,2022-07-12T20:01:30.937000
CVE-2022-33326,0,0,ae4f390450a32f40e28e2996d0e5c3dd06238a1acc63627e6fca82012f548b75,2022-07-12T20:02:29.537000
CVE-2022-33327,0,0,2c7981e88e6bfda8de92bead49c92762ed970ac6c2474c1c957188173d84e437,2022-07-12T20:03:25.853000
@ -242268,7 +242268,7 @@ CVE-2024-20870,0,0,247de2e7cb6c1589f56f1a1780b91fbe4feee02648b4f01650496931882d0
CVE-2024-20871,0,0,4b5019addc2549a143f67a36860f5a0576db2a31268cf1be920df7487aeaeae8,2024-05-07T13:39:32.710000
CVE-2024-20872,0,0,f057840a1e0e70ef07c9af92e3c53b5e58e8fd31ea1c15cdb3fe23cd840da357,2024-05-07T13:39:32.710000
CVE-2024-2088,0,0,f74da5d889e7e80f73938a7b2b74d368f377afb5dd4c7ba942f0bc91c7b57a42,2024-05-22T12:46:53.887000
CVE-2024-2089,1,1,04303588d18a031cf1ce06bb4b4adaceaba7e8f80aebcb91a491ab3bfd9da3bd,2024-05-30T09:15:09.360000
CVE-2024-2089,0,0,04303588d18a031cf1ce06bb4b4adaceaba7e8f80aebcb91a491ab3bfd9da3bd,2024-05-30T09:15:09.360000
CVE-2024-20903,0,0,c3900fb8b8bb00a3ce86bfd5ca527fde9099622f71073bff3bcad70680bf3f2d,2024-02-20T19:51:05.510000
CVE-2024-20904,0,0,75011684a257ea742330251f679f71917299c125d35b4c6d39df6fddd4b69f37,2024-01-20T18:42:09.760000
CVE-2024-20905,0,0,9331a8e493544ea842bda306a367f01093664d68b881f6092eb05338afffb388,2024-02-20T19:51:05.510000
@ -245613,7 +245613,7 @@ CVE-2024-26557,0,0,413b34482d1eed582f272b955524fa71f7b68414d25ad46ae764ef2e2b341
CVE-2024-26559,0,0,32dd037e107446e11601c6ddb83598fc34f3ebdb48b667f29294eba708b9e4c1,2024-02-29T13:49:47.277000
CVE-2024-2656,0,0,4340d2751b5b936977156d3c9b66d1badc283b5d0363629845c954a91d88c161,2024-04-08T18:49:25.863000
CVE-2024-26566,0,0,e082212a38f258b5c22bdd7daa5a29191a5e851b4c959cb2f66848d27d20d8bb,2024-03-07T13:52:27.110000
CVE-2024-2657,1,1,43e31a0101d31e47d981996d8f58d262e31203e3c6d7fb9f0ccc7599d20872e4,2024-05-30T09:15:09.583000
CVE-2024-2657,0,0,43e31a0101d31e47d981996d8f58d262e31203e3c6d7fb9f0ccc7599d20872e4,2024-05-30T09:15:09.583000
CVE-2024-26574,0,0,dcbd7ef017b2c94376d84166225aa21f7faefc7d209424b74f38bdb42fbf0b3e,2024-04-08T18:48:40.217000
CVE-2024-26577,0,0,eb994672bf510d158b4978f43b0d7e0594f22405d228a7c909ba4da4498cc451,2024-03-27T12:29:30.307000
CVE-2024-26578,0,0,631d617cd0985d9923eed32b0cb4b9e9025809830b6a3ca2ef1a468d4f2a7124,2024-02-22T19:07:27.197000
@ -250747,6 +250747,7 @@ CVE-2024-35826,0,0,4c261153797f68de52fdcebcc39b483e62e8771137014b7942ef4517c0aad
CVE-2024-35827,0,0,00fd5dbd49fdc15bfa820083a1ec906c035d4389cda7bf080f47e1390b623c3b,2024-05-17T18:35:35.070000
CVE-2024-35828,0,0,0ea21dd7c35e46f8b0d57d6daa6e413a2e458755547c8c147cd86515e9182627,2024-05-17T18:35:35.070000
CVE-2024-35829,0,0,c44ba0936af3a1fe5f7f3010480ec8dc69b0eee81bd82ca1410c50c6b6f9be29,2024-05-17T18:35:35.070000
CVE-2024-3583,1,1,9a1377ec35dd49cc8e82f8778bef54a445c5b7fa0dc0b75b168f6ac24953cdaa,2024-05-30T11:15:30.753000
CVE-2024-35830,0,0,27720d3ad7228327ffbabcc4a70b76a4361939f13eb9a2c9b3ea225d096090a1,2024-05-17T18:35:35.070000
CVE-2024-35831,0,0,e476f255cbb35863c228cc39c24f005e09dc45755deb9bdbd505cd7895bb3e9a,2024-05-17T18:35:35.070000
CVE-2024-35832,0,0,709a0d9725aa8f275cb6f1989d983aa9dd4d602053632c653ca286db26420caa,2024-05-17T18:35:35.070000
@ -250941,9 +250942,9 @@ CVE-2024-36010,0,0,2843e205b9e9b17b5fb3357cdae71842164efb1f33700d0fc205102dad316
CVE-2024-36011,0,0,abd5638cc1cfdef36e14f7c96bf2fc845d42601d602cfe73690b22754ed47103,2024-05-24T01:15:30.977000
CVE-2024-36012,0,0,99a87dfc7b0fc5371c51d11442e2aebe0c642c881f6f8e57147716a4b47febdf,2024-05-24T01:15:30.977000
CVE-2024-36013,0,0,1251c8e9d1d9ec0619ca01193822062d3235b343811763ddc34f761263e594d9,2024-05-25T15:15:09.070000
CVE-2024-36014,0,0,b6dffe7dd5d49e6c455d61bd69e42c3b33c1276b626b1237429dc86dd78ceace,2024-05-29T13:02:09.280000
CVE-2024-36014,0,1,1922b965079a53cde5f717f7b1a8cb792e11164c2920130d615fa0dfe42bb30f,2024-05-30T10:15:09.933000
CVE-2024-36015,0,0,c676b04ddfbe829445e8e45bfa3044e066037deb72244113c6ca52d7d6f2368e,2024-05-29T13:02:09.280000
CVE-2024-36016,0,0,45b87cfc90b298e93c94b5bdecadfc7558dd74ffeb5098257ca61701c740b3ba,2024-05-29T19:50:25.303000
CVE-2024-36016,0,1,1684099a094b5c97320b576aebacd3ba01d417868148b89dbe3ba2098bbf6f94,2024-05-30T10:15:10.097000
CVE-2024-36036,0,0,399529c38d111e737eeb859298f0b12af936846a2a63555a4e1fd24103a1ae63,2024-05-28T12:39:28.377000
CVE-2024-36037,0,0,0f6f02ecbfa932c634fa472570a56c7201914f9b8fefa1f5fa9e003f7709a6de,2024-05-28T12:39:28.377000
CVE-2024-36039,0,0,a8363180f0299206d54e6558901cb5cddfc68c9874309661faf6b2f8a76377e4,2024-05-21T16:53:56.550000
@ -251504,7 +251505,7 @@ CVE-2024-4348,0,0,22aaa400d6ceaa55fdbf2a61503102f340b638c070cbc3ffa22198dc497008
CVE-2024-4349,0,0,d7cb391ad6a3595c020e400bfefef3bf14b6d8b75d9701c79688eb2693bdea7a,2024-05-17T02:40:23.273000
CVE-2024-4351,0,0,84a993fcb461a8c61255d21736701361dc3f453bf42043de26320f65ada00121,2024-05-16T13:03:05.353000
CVE-2024-4352,0,0,ec2049b13794d7b7eea90d377463d8f5c3179de2c6e69d57554c5eced6269751,2024-05-16T13:03:05.353000
CVE-2024-4355,1,1,d2fa6823bc87ebd0bba63bc6d2ca2e71e0e514f99427d4276bc7ca2f53406c1c,2024-05-30T09:15:09.790000
CVE-2024-4355,0,0,d2fa6823bc87ebd0bba63bc6d2ca2e71e0e514f99427d4276bc7ca2f53406c1c,2024-05-30T09:15:09.790000
CVE-2024-4356,0,0,665552b3e35c87b19e637f12854b443eebf7cafcbb889598a1c642b7847de2a5,2024-05-30T05:15:56.540000
CVE-2024-4357,0,0,15f39a23a70c5acc3d08c2f81b16ef69b06f28ee37422807405e1ad546411072,2024-05-15T18:35:11.453000
CVE-2024-4358,0,0,c8f40930fe3c6733bdba3289823c127651958d0def91c99c5ae0c8d826a9824a,2024-05-29T15:18:26.427000
@ -251541,12 +251542,12 @@ CVE-2024-4417,0,0,56d1a7db112c78a6a4f4098b6b92b23b4d7cd4e314ee26ae65a28dbbe4d864
CVE-2024-4418,0,0,b75df24fbcd879bc4a65285c93bd33dc1c31ae502a7b108d2ac08220fcbe0dd6,2024-05-08T13:15:00.690000
CVE-2024-4419,0,0,e2d8f545d71f8d9558ae0290474349668dafdd9730a778cdbbf911c6b4cf5157,2024-05-29T13:02:09.280000
CVE-2024-4420,0,0,9b75921df8e16106b48e4c0d4f1fc07ba699b6ee751657d557cf95a2815ddc11,2024-05-21T12:37:59.687000
CVE-2024-4422,1,1,6dc84d656f1dddcd846bcb6b7e7dc21ff255771c2496923c559756e482fcde32,2024-05-30T09:15:10.020000
CVE-2024-4422,0,0,6dc84d656f1dddcd846bcb6b7e7dc21ff255771c2496923c559756e482fcde32,2024-05-30T09:15:10.020000
CVE-2024-4423,0,0,e0dbe4a46d2bfb02a06f5f6dd7941b892a0e354e08a517bf9732a9750b61686d,2024-05-14T16:11:39.510000
CVE-2024-4424,0,0,620360b6d69d7e46500e9eab3db8f094f558ee3037a5afde7000ad6722a43c71,2024-05-14T16:11:39.510000
CVE-2024-4425,0,0,ae12578d88becb8c756d759ea5148419b194091165c0ac35427c779bf68bf797,2024-05-14T16:11:39.510000
CVE-2024-4426,1,1,fcdabd2a44cd47a056797b86f61b706edababe03d7e01f46cb584c5d92b373a2,2024-05-30T09:15:10.230000
CVE-2024-4427,1,1,666449d0e69c513e659e625aa0c074e59cf1a29b8c07dafbf424b20bb727a6a2,2024-05-30T09:15:10.453000
CVE-2024-4426,0,0,fcdabd2a44cd47a056797b86f61b706edababe03d7e01f46cb584c5d92b373a2,2024-05-30T09:15:10.230000
CVE-2024-4427,0,1,b24dcf472d949ad92d547910b797fae1140147d6a78b3842e040b04dcfe02d40,2024-05-30T09:15:10.453000
CVE-2024-4429,0,0,c2c646b9e15928853bc45aa0c15bbb4594d023a25cef856d5c18ec0fc8bd1d8f,2024-05-28T17:11:55.903000
CVE-2024-4430,0,0,2977ce5eb55d4b32781acd64cf46e940cc709041a97d7f6a7071a523a104ede8,2024-05-14T16:11:39.510000
CVE-2024-4431,0,0,ac230214291f155ef417504dc1776264b583b1a9c2c18f1ea02407d51c3acd6f,2024-05-24T01:15:30.977000
@ -251704,6 +251705,7 @@ CVE-2024-4654,0,0,79c00c0975ddb372bdc6401f0d780fdd389e77368b958736ad029c8bb8c90c
CVE-2024-4656,0,0,23093c7ec18a8f42da4c8fc1c86b9aa6984d979cf63954576e1d332548405180,2024-05-15T16:40:19.330000
CVE-2024-4662,0,0,271820e0248036cdcfeea2da470b958f93caba3600263b2df375c674d931507f,2024-05-24T01:15:30.977000
CVE-2024-4666,0,0,dde8d66c76bdf850b898b9f95df0d92f0ac3da730c1f32826d61843a6ef06bf5,2024-05-15T16:40:19.330000
CVE-2024-4668,1,1,1a6133fbf8e2b8f25d9bc2a9a22d569b4e3e3c94cbb500fc65282177e0462add,2024-05-30T10:15:10.180000
CVE-2024-4670,0,0,438b57b9006ea70a278767dc5849ca5e16eeaf7f43c9f1acf2c1dcf72f3e2983,2024-05-15T16:40:19.330000
CVE-2024-4671,0,0,911983d752f60a8558bde05d718b618b7e43132134b2e0d17f9ccefbfadcbebf,2024-05-16T20:27:10.670000
CVE-2024-4672,0,0,c471dbfc1b0841d64dcc099aa43b51219c9984a8f5787ce700ee05c1f63d9961,2024-05-17T02:40:31.847000
@ -252035,6 +252037,7 @@ CVE-2024-5312,0,0,082c9ac2393cf8e57fdd7df5653c9ea7402a5c66b3a64380a6e8455af1865a
CVE-2024-5314,0,0,a78e716fa392b8cb9869f7797ea197c1011e46ba4bc9c8c5da0073e7e12b93dd,2024-05-24T13:03:05.093000
CVE-2024-5315,0,0,17a737dcad42e55d9b51354513bcf6a79d52e58b0565b3a7bb2bcb2078a35d4b,2024-05-24T13:03:05.093000
CVE-2024-5318,0,0,23557c413419809da6545b8c1445586f3837718f3430ace9eed52e7e734c5a9b,2024-05-24T18:09:20.027000
CVE-2024-5326,1,1,d90b791e097e13f323e766827d1e97683942ce06e790d34f9150e110bd7bc6fb,2024-05-30T11:15:30.970000
CVE-2024-5327,0,0,00d56bc9d4ad85aecc0ab640e3a0c1afad43fc63f05e8690a0f43c9e0f453796,2024-05-30T07:15:40.407000
CVE-2024-5336,0,0,c2865217e75958fb009c852cd174a4631a299d08f765ad6d61b3f77297c545fa,2024-05-28T12:39:42.673000
CVE-2024-5337,0,0,f2b800f7e84a00dbe58660ee27a5a6405784fadf3fae9f57a88589dda95cf166,2024-05-28T12:39:42.673000

Can't render this file because it is too large.