From e4fa4f849f0f3b1acaf033b5e000f696debd4ab8 Mon Sep 17 00:00:00 2001 From: cad-safe-bot Date: Fri, 26 Apr 2024 06:03:27 +0000 Subject: [PATCH] Auto-Update: 2024-04-26T06:00:37.570677+00:00 --- CVE-2024/CVE-2024-09xx/CVE-2024-0905.json | 20 ++++++ CVE-2024/CVE-2024-21xx/CVE-2024-2159.json | 20 ++++++ CVE-2024/CVE-2024-226xx/CVE-2024-22632.json | 20 ++++++ CVE-2024/CVE-2024-226xx/CVE-2024-22633.json | 20 ++++++ CVE-2024/CVE-2024-23xx/CVE-2024-2310.json | 20 ++++++ CVE-2024/CVE-2024-24xx/CVE-2024-2429.json | 20 ++++++ CVE-2024/CVE-2024-24xx/CVE-2024-2439.json | 20 ++++++ CVE-2024/CVE-2024-26xx/CVE-2024-2603.json | 20 ++++++ CVE-2024/CVE-2024-28xx/CVE-2024-2837.json | 20 ++++++ CVE-2024/CVE-2024-29xx/CVE-2024-2908.json | 20 ++++++ CVE-2024/CVE-2024-305xx/CVE-2024-30564.json | 10 +-- CVE-2024/CVE-2024-30xx/CVE-2024-3048.json | 20 ++++++ CVE-2024/CVE-2024-30xx/CVE-2024-3058.json | 20 ++++++ CVE-2024/CVE-2024-30xx/CVE-2024-3059.json | 20 ++++++ CVE-2024/CVE-2024-30xx/CVE-2024-3060.json | 20 ++++++ CVE-2024/CVE-2024-30xx/CVE-2024-3075.json | 20 ++++++ CVE-2024/CVE-2024-31xx/CVE-2024-3154.json | 71 +++++++++++++++++++++ CVE-2024/CVE-2024-31xx/CVE-2024-3188.json | 20 ++++++ CVE-2024/CVE-2024-324xx/CVE-2024-32404.json | 20 ++++++ CVE-2024/CVE-2024-324xx/CVE-2024-32406.json | 20 ++++++ README.md | 38 +++++++---- _state.csv | 37 ++++++++--- 22 files changed, 489 insertions(+), 27 deletions(-) create mode 100644 CVE-2024/CVE-2024-09xx/CVE-2024-0905.json create mode 100644 CVE-2024/CVE-2024-21xx/CVE-2024-2159.json create mode 100644 CVE-2024/CVE-2024-226xx/CVE-2024-22632.json create mode 100644 CVE-2024/CVE-2024-226xx/CVE-2024-22633.json create mode 100644 CVE-2024/CVE-2024-23xx/CVE-2024-2310.json create mode 100644 CVE-2024/CVE-2024-24xx/CVE-2024-2429.json create mode 100644 CVE-2024/CVE-2024-24xx/CVE-2024-2439.json create mode 100644 CVE-2024/CVE-2024-26xx/CVE-2024-2603.json create mode 100644 CVE-2024/CVE-2024-28xx/CVE-2024-2837.json create mode 100644 CVE-2024/CVE-2024-29xx/CVE-2024-2908.json create mode 100644 CVE-2024/CVE-2024-30xx/CVE-2024-3048.json create mode 100644 CVE-2024/CVE-2024-30xx/CVE-2024-3058.json create mode 100644 CVE-2024/CVE-2024-30xx/CVE-2024-3059.json create mode 100644 CVE-2024/CVE-2024-30xx/CVE-2024-3060.json create mode 100644 CVE-2024/CVE-2024-30xx/CVE-2024-3075.json create mode 100644 CVE-2024/CVE-2024-31xx/CVE-2024-3154.json create mode 100644 CVE-2024/CVE-2024-31xx/CVE-2024-3188.json create mode 100644 CVE-2024/CVE-2024-324xx/CVE-2024-32404.json create mode 100644 CVE-2024/CVE-2024-324xx/CVE-2024-32406.json diff --git a/CVE-2024/CVE-2024-09xx/CVE-2024-0905.json b/CVE-2024/CVE-2024-09xx/CVE-2024-0905.json new file mode 100644 index 00000000000..1151f9a64b3 --- /dev/null +++ b/CVE-2024/CVE-2024-09xx/CVE-2024-0905.json @@ -0,0 +1,20 @@ +{ + "id": "CVE-2024-0905", + "sourceIdentifier": "contact@wpscan.com", + "published": "2024-04-26T05:15:49.907", + "lastModified": "2024-04-26T05:15:49.907", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "The Fancy Product Designer WordPress plugin before 6.1.8 does not sanitise and escape a parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting which could be used against unauthenticated and admin-level users" + } + ], + "metrics": {}, + "references": [ + { + "url": "https://wpscan.com/vulnerability/3b9eba0d-29aa-47e4-b17f-4cf4bbf8b690/", + "source": "contact@wpscan.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-21xx/CVE-2024-2159.json b/CVE-2024/CVE-2024-21xx/CVE-2024-2159.json new file mode 100644 index 00000000000..7264278982a --- /dev/null +++ b/CVE-2024/CVE-2024-21xx/CVE-2024-2159.json @@ -0,0 +1,20 @@ +{ + "id": "CVE-2024-2159", + "sourceIdentifier": "contact@wpscan.com", + "published": "2024-04-26T05:15:50.000", + "lastModified": "2024-04-26T05:15:50.000", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "The Social Sharing Plugin WordPress plugin before 3.3.61 does not validate and escape some of its shortcode attributes before outputting them back in a page/post where the shortcode is embed, which could allow users with the contributor role and above to perform Stored Cross-Site Scripting attacks" + } + ], + "metrics": {}, + "references": [ + { + "url": "https://wpscan.com/vulnerability/d7fa9849-c82a-4efd-84b6-9245053975ba/", + "source": "contact@wpscan.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-226xx/CVE-2024-22632.json b/CVE-2024/CVE-2024-226xx/CVE-2024-22632.json new file mode 100644 index 00000000000..15df55fd79e --- /dev/null +++ b/CVE-2024/CVE-2024-226xx/CVE-2024-22632.json @@ -0,0 +1,20 @@ +{ + "id": "CVE-2024-22632", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-04-26T04:15:08.830", + "lastModified": "2024-04-26T04:15:08.830", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Setor Informatica Sistema Inteligente para Laboratorios (S.I.L.) 388 was discovered to contain a remote code execution (RCE) vulnerability via the hmsg parameter. This vulnerability is triggered via a crafted POST request." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://tomiodarim.io/posts/cve-2024-22632-3/", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-226xx/CVE-2024-22633.json b/CVE-2024/CVE-2024-226xx/CVE-2024-22633.json new file mode 100644 index 00000000000..806ee11b761 --- /dev/null +++ b/CVE-2024/CVE-2024-226xx/CVE-2024-22633.json @@ -0,0 +1,20 @@ +{ + "id": "CVE-2024-22633", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-04-26T04:15:08.910", + "lastModified": "2024-04-26T04:15:08.910", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Setor Informatica Sistema Inteligente para Laboratorios (S.I.L.) 388 was discovered to contain a remote code execution (RCE) vulnerability via the hprinter parameter. This vulnerability is triggered via a crafted POST request." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://tomiodarim.io/posts/cve-2024-22632-3/", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-23xx/CVE-2024-2310.json b/CVE-2024/CVE-2024-23xx/CVE-2024-2310.json new file mode 100644 index 00000000000..43da9b29694 --- /dev/null +++ b/CVE-2024/CVE-2024-23xx/CVE-2024-2310.json @@ -0,0 +1,20 @@ +{ + "id": "CVE-2024-2310", + "sourceIdentifier": "contact@wpscan.com", + "published": "2024-04-26T05:15:50.040", + "lastModified": "2024-04-26T05:15:50.040", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "The WP Google Review Slider WordPress plugin before 13.6 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup)" + } + ], + "metrics": {}, + "references": [ + { + "url": "https://wpscan.com/vulnerability/7a2c173c-19e3-4f48-b3af-14790b5b8e94/", + "source": "contact@wpscan.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-24xx/CVE-2024-2429.json b/CVE-2024/CVE-2024-24xx/CVE-2024-2429.json new file mode 100644 index 00000000000..5d8307e2c88 --- /dev/null +++ b/CVE-2024/CVE-2024-24xx/CVE-2024-2429.json @@ -0,0 +1,20 @@ +{ + "id": "CVE-2024-2429", + "sourceIdentifier": "contact@wpscan.com", + "published": "2024-04-26T05:15:50.083", + "lastModified": "2024-04-26T05:15:50.083", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "The Salon booking system WordPress plugin through 9.6.5 does not have CSRF check in place when updating its settings, which could allow attackers to make a logged in admin change them via a CSRF attack" + } + ], + "metrics": {}, + "references": [ + { + "url": "https://wpscan.com/vulnerability/1c6812d8-a218-4c15-9e2d-d43f3f3b0e78/", + "source": "contact@wpscan.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-24xx/CVE-2024-2439.json b/CVE-2024/CVE-2024-24xx/CVE-2024-2439.json new file mode 100644 index 00000000000..657165b309f --- /dev/null +++ b/CVE-2024/CVE-2024-24xx/CVE-2024-2439.json @@ -0,0 +1,20 @@ +{ + "id": "CVE-2024-2439", + "sourceIdentifier": "contact@wpscan.com", + "published": "2024-04-26T05:15:50.127", + "lastModified": "2024-04-26T05:15:50.127", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "The Salon booking system WordPress plugin through 9.6.5 does not sanitise and escape some of its settings, which could allow high privilege users such as Editor to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup)" + } + ], + "metrics": {}, + "references": [ + { + "url": "https://wpscan.com/vulnerability/7a375077-fc70-4389-b109-28fce3db2aef/", + "source": "contact@wpscan.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-26xx/CVE-2024-2603.json b/CVE-2024/CVE-2024-26xx/CVE-2024-2603.json new file mode 100644 index 00000000000..a0f21d91e6d --- /dev/null +++ b/CVE-2024/CVE-2024-26xx/CVE-2024-2603.json @@ -0,0 +1,20 @@ +{ + "id": "CVE-2024-2603", + "sourceIdentifier": "contact@wpscan.com", + "published": "2024-04-26T05:15:50.163", + "lastModified": "2024-04-26T05:15:50.163", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "The Salon booking system WordPress plugin through 9.6.5 does not sanitise and escape some of its settings, which could allow high privilege users such as admin (or editor depending on Salon booking system WordPress plugin through 9.6.5 configuration) to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup)" + } + ], + "metrics": {}, + "references": [ + { + "url": "https://wpscan.com/vulnerability/b4186c03-99ee-4297-85c0-83b7053afc1c/", + "source": "contact@wpscan.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-28xx/CVE-2024-2837.json b/CVE-2024/CVE-2024-28xx/CVE-2024-2837.json new file mode 100644 index 00000000000..6945339147b --- /dev/null +++ b/CVE-2024/CVE-2024-28xx/CVE-2024-2837.json @@ -0,0 +1,20 @@ +{ + "id": "CVE-2024-2837", + "sourceIdentifier": "contact@wpscan.com", + "published": "2024-04-26T05:15:50.200", + "lastModified": "2024-04-26T05:15:50.200", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "The WP Chat App WordPress plugin before 3.6.4 does not sanitise and escape some of its settings, which could allow high privilege users such as admins to perform Cross-Site Scripting attacks even when unfiltered_html is disallowed" + } + ], + "metrics": {}, + "references": [ + { + "url": "https://wpscan.com/vulnerability/91058c48-f262-4fcc-9390-472d59d61115/", + "source": "contact@wpscan.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-29xx/CVE-2024-2908.json b/CVE-2024/CVE-2024-29xx/CVE-2024-2908.json new file mode 100644 index 00000000000..f752f272aac --- /dev/null +++ b/CVE-2024/CVE-2024-29xx/CVE-2024-2908.json @@ -0,0 +1,20 @@ +{ + "id": "CVE-2024-2908", + "sourceIdentifier": "contact@wpscan.com", + "published": "2024-04-26T05:15:50.240", + "lastModified": "2024-04-26T05:15:50.240", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "The Call Now Button WordPress plugin before 1.4.7 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup)." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://wpscan.com/vulnerability/58c9e088-ed74-461a-b305-e217679f26c1/", + "source": "contact@wpscan.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-305xx/CVE-2024-30564.json b/CVE-2024/CVE-2024-305xx/CVE-2024-30564.json index 1b3b90f1d36..f71962a56f9 100644 --- a/CVE-2024/CVE-2024-305xx/CVE-2024-30564.json +++ b/CVE-2024/CVE-2024-305xx/CVE-2024-30564.json @@ -2,12 +2,16 @@ "id": "CVE-2024-30564", "sourceIdentifier": "cve@mitre.org", "published": "2024-04-18T15:15:30.220", - "lastModified": "2024-04-18T18:25:55.267", + "lastModified": "2024-04-26T04:15:09.020", "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", "value": "An issue inandrei-tatar nora-firebase-common between v.1.0.41 and v.1.12.2 allows a remote attacker to execute arbitrary code via a crafted script to the updateState parameter of the updateStateInternal method." + }, + { + "lang": "es", + "value": "Un problema en andrei-tatar nora-firebase-common entre v.1.0.41 y v.1.12.2 permite a un atacante remoto ejecutar c\u00f3digo arbitrario a trav\u00e9s de un script manipulado en el par\u00e1metro updateState del m\u00e9todo updateStateInternal." } ], "metrics": {}, @@ -19,10 +23,6 @@ { "url": "https://github.com/andrei-tatar/nora-firebase-common/commit/bf30b75d51be04f6c1f884561a223226c890f01b", "source": "cve@mitre.org" - }, - { - "url": "https://github.com/andrei-tatar/nora-firebase-common/issues/9", - "source": "cve@mitre.org" } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-30xx/CVE-2024-3048.json b/CVE-2024/CVE-2024-30xx/CVE-2024-3048.json new file mode 100644 index 00000000000..ec95a2ec70b --- /dev/null +++ b/CVE-2024/CVE-2024-30xx/CVE-2024-3048.json @@ -0,0 +1,20 @@ +{ + "id": "CVE-2024-3048", + "sourceIdentifier": "contact@wpscan.com", + "published": "2024-04-26T05:15:50.280", + "lastModified": "2024-04-26T05:15:50.280", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "The Bannerlid WordPress plugin through 1.1.0 does not escape generated URLs before outputting them in attributes, leading to Reflected Cross-Site Scripting which could be used against high privilege users such as administrators" + } + ], + "metrics": {}, + "references": [ + { + "url": "https://wpscan.com/vulnerability/e179ff7d-137c-48bf-8b18-e874e3f876f4/", + "source": "contact@wpscan.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-30xx/CVE-2024-3058.json b/CVE-2024/CVE-2024-30xx/CVE-2024-3058.json new file mode 100644 index 00000000000..601b82a8c38 --- /dev/null +++ b/CVE-2024/CVE-2024-30xx/CVE-2024-3058.json @@ -0,0 +1,20 @@ +{ + "id": "CVE-2024-3058", + "sourceIdentifier": "contact@wpscan.com", + "published": "2024-04-26T05:15:50.320", + "lastModified": "2024-04-26T05:15:50.320", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "The ENL Newsletter WordPress plugin through 1.0.1 does not have CSRF check in some places, and is missing sanitisation as well as escaping, which could allow attackers to make logged in admin add Stored XSS payloads via a CSRF attack" + } + ], + "metrics": {}, + "references": [ + { + "url": "https://wpscan.com/vulnerability/fc33c79d-ad24-4d55-973a-25280995a2ab/", + "source": "contact@wpscan.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-30xx/CVE-2024-3059.json b/CVE-2024/CVE-2024-30xx/CVE-2024-3059.json new file mode 100644 index 00000000000..dfbedd94f84 --- /dev/null +++ b/CVE-2024/CVE-2024-30xx/CVE-2024-3059.json @@ -0,0 +1,20 @@ +{ + "id": "CVE-2024-3059", + "sourceIdentifier": "contact@wpscan.com", + "published": "2024-04-26T05:15:50.360", + "lastModified": "2024-04-26T05:15:50.360", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "The ENL Newsletter WordPress plugin through 1.0.1 does not have CSRF checks in some places, which could allow attackers to make logged in admins delete arbitrary Campaigns via a CSRF attack" + } + ], + "metrics": {}, + "references": [ + { + "url": "https://wpscan.com/vulnerability/e154096d-e9b7-43ba-9a34-81a6c431025c/", + "source": "contact@wpscan.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-30xx/CVE-2024-3060.json b/CVE-2024/CVE-2024-30xx/CVE-2024-3060.json new file mode 100644 index 00000000000..52cff96b04e --- /dev/null +++ b/CVE-2024/CVE-2024-30xx/CVE-2024-3060.json @@ -0,0 +1,20 @@ +{ + "id": "CVE-2024-3060", + "sourceIdentifier": "contact@wpscan.com", + "published": "2024-04-26T05:15:50.397", + "lastModified": "2024-04-26T05:15:50.397", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "The ENL Newsletter WordPress plugin through 1.0.1 does not sanitize and escape a parameter before using it in a SQL statement, allowing admin+ to perform SQL injection attacks" + } + ], + "metrics": {}, + "references": [ + { + "url": "https://wpscan.com/vulnerability/7740646d-f3ea-4fc7-b35e-8b4a6821e178/", + "source": "contact@wpscan.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-30xx/CVE-2024-3075.json b/CVE-2024/CVE-2024-30xx/CVE-2024-3075.json new file mode 100644 index 00000000000..e2b8093c4ad --- /dev/null +++ b/CVE-2024/CVE-2024-30xx/CVE-2024-3075.json @@ -0,0 +1,20 @@ +{ + "id": "CVE-2024-3075", + "sourceIdentifier": "contact@wpscan.com", + "published": "2024-04-26T05:15:50.433", + "lastModified": "2024-04-26T05:15:50.433", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "The MM-email2image WordPress plugin through 0.2.5 does not validate and escape some of its shortcode attributes before outputting them back in a page/post where the shortcode is embed, which could allow users with the contributor role and above to perform Stored Cross-Site Scripting attacks" + } + ], + "metrics": {}, + "references": [ + { + "url": "https://wpscan.com/vulnerability/450375f6-a9d4-49f6-8bab-867774372795/", + "source": "contact@wpscan.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-31xx/CVE-2024-3154.json b/CVE-2024/CVE-2024-31xx/CVE-2024-3154.json new file mode 100644 index 00000000000..d19ab21e6f0 --- /dev/null +++ b/CVE-2024/CVE-2024-31xx/CVE-2024-3154.json @@ -0,0 +1,71 @@ +{ + "id": "CVE-2024-3154", + "sourceIdentifier": "secalert@redhat.com", + "published": "2024-04-26T04:15:09.217", + "lastModified": "2024-04-26T04:15:09.217", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "A flaw was found in cri-o, where an arbitrary systemd property can be injected via a Pod annotation. Any user who can create a pod with an arbitrary annotation may perform an arbitrary action on the host system." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secalert@redhat.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.2, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.2, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "secalert@redhat.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-77" + } + ] + } + ], + "references": [ + { + "url": "https://access.redhat.com/security/cve/CVE-2024-3154", + "source": "secalert@redhat.com" + }, + { + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2272532", + "source": "secalert@redhat.com" + }, + { + "url": "https://github.com/cri-o/cri-o/security/advisories/GHSA-2cgq-h8xw-2v5j", + "source": "secalert@redhat.com" + }, + { + "url": "https://github.com/opencontainers/runc/pull/4217", + "source": "secalert@redhat.com" + }, + { + "url": "https://github.com/opencontainers/runtime-spec/blob/main/features.md#unsafe-annotations-in-configjson", + "source": "secalert@redhat.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-31xx/CVE-2024-3188.json b/CVE-2024/CVE-2024-31xx/CVE-2024-3188.json new file mode 100644 index 00000000000..8000f15d026 --- /dev/null +++ b/CVE-2024/CVE-2024-31xx/CVE-2024-3188.json @@ -0,0 +1,20 @@ +{ + "id": "CVE-2024-3188", + "sourceIdentifier": "contact@wpscan.com", + "published": "2024-04-26T05:15:50.477", + "lastModified": "2024-04-26T05:15:50.477", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "The WP Shortcodes Plugin \u2014 Shortcodes Ultimate WordPress plugin before 7.1.0 does not validate and escape some of its shortcode attributes before outputting them back in a page/post where the shortcode is embed, which could allow users with the contributor role and above to perform Stored Cross-Site Scripting attacks" + } + ], + "metrics": {}, + "references": [ + { + "url": "https://wpscan.com/vulnerability/bc273e75-7faf-4eaf-8ebd-efc5d6e9261f/", + "source": "contact@wpscan.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-324xx/CVE-2024-32404.json b/CVE-2024/CVE-2024-324xx/CVE-2024-32404.json new file mode 100644 index 00000000000..39274a78898 --- /dev/null +++ b/CVE-2024/CVE-2024-324xx/CVE-2024-32404.json @@ -0,0 +1,20 @@ +{ + "id": "CVE-2024-32404", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-04-26T04:15:09.107", + "lastModified": "2024-04-26T04:15:09.107", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Server-Side Template Injection (SSTI) vulnerability in inducer relate before v.2024.1, allows remote attackers to execute arbitrary code via a crafted payload to the Markup Sandbox feature." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://packetstormsecurity.com/2404-exploits/rlts-sstexec.txt", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-324xx/CVE-2024-32406.json b/CVE-2024/CVE-2024-324xx/CVE-2024-32406.json new file mode 100644 index 00000000000..584c2ec68b3 --- /dev/null +++ b/CVE-2024/CVE-2024-324xx/CVE-2024-32406.json @@ -0,0 +1,20 @@ +{ + "id": "CVE-2024-32406", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-04-26T04:15:09.163", + "lastModified": "2024-04-26T04:15:09.163", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Server-Side Template Injection (SSTI) vulnerability in inducer relate before v.2024.1 allows a remote attacker to execute arbitrary code via a crafted payload to the Batch-Issue Exam Tickets function." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://packetstormsecurity.com/files/178251/Relate-Learning-And-Teaching-System-SSTI-Remote-Code-Execution.html", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/README.md b/README.md index affc8a7bcac..d39cdddb95b 100644 --- a/README.md +++ b/README.md @@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2024-04-26T04:00:38.059778+00:00 +2024-04-26T06:00:37.570677+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2024-04-26T03:15:06.740000+00:00 +2024-04-26T05:15:50.477000+00:00 ``` ### Last Data Feed Release @@ -33,27 +33,39 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### Total Number of included CVEs ```plain -246824 +246843 ``` ### CVEs added in the last Commit -Recently added CVEs: `6` +Recently added CVEs: `19` -- [CVE-2023-47252](CVE-2023/CVE-2023-472xx/CVE-2023-47252.json) (`2024-04-26T03:15:06.617`) -- [CVE-2024-31755](CVE-2024/CVE-2024-317xx/CVE-2024-31755.json) (`2024-04-26T03:15:06.690`) -- [CVE-2024-33671](CVE-2024/CVE-2024-336xx/CVE-2024-33671.json) (`2024-04-26T02:15:06.410`) -- [CVE-2024-33672](CVE-2024/CVE-2024-336xx/CVE-2024-33672.json) (`2024-04-26T02:15:06.607`) -- [CVE-2024-33673](CVE-2024/CVE-2024-336xx/CVE-2024-33673.json) (`2024-04-26T02:15:06.790`) -- [CVE-2024-4163](CVE-2024/CVE-2024-41xx/CVE-2024-4163.json) (`2024-04-26T03:15:06.740`) +- [CVE-2024-0905](CVE-2024/CVE-2024-09xx/CVE-2024-0905.json) (`2024-04-26T05:15:49.907`) +- [CVE-2024-2159](CVE-2024/CVE-2024-21xx/CVE-2024-2159.json) (`2024-04-26T05:15:50.000`) +- [CVE-2024-22632](CVE-2024/CVE-2024-226xx/CVE-2024-22632.json) (`2024-04-26T04:15:08.830`) +- [CVE-2024-22633](CVE-2024/CVE-2024-226xx/CVE-2024-22633.json) (`2024-04-26T04:15:08.910`) +- [CVE-2024-2310](CVE-2024/CVE-2024-23xx/CVE-2024-2310.json) (`2024-04-26T05:15:50.040`) +- [CVE-2024-2429](CVE-2024/CVE-2024-24xx/CVE-2024-2429.json) (`2024-04-26T05:15:50.083`) +- [CVE-2024-2439](CVE-2024/CVE-2024-24xx/CVE-2024-2439.json) (`2024-04-26T05:15:50.127`) +- [CVE-2024-2603](CVE-2024/CVE-2024-26xx/CVE-2024-2603.json) (`2024-04-26T05:15:50.163`) +- [CVE-2024-2837](CVE-2024/CVE-2024-28xx/CVE-2024-2837.json) (`2024-04-26T05:15:50.200`) +- [CVE-2024-2908](CVE-2024/CVE-2024-29xx/CVE-2024-2908.json) (`2024-04-26T05:15:50.240`) +- [CVE-2024-3048](CVE-2024/CVE-2024-30xx/CVE-2024-3048.json) (`2024-04-26T05:15:50.280`) +- [CVE-2024-3058](CVE-2024/CVE-2024-30xx/CVE-2024-3058.json) (`2024-04-26T05:15:50.320`) +- [CVE-2024-3059](CVE-2024/CVE-2024-30xx/CVE-2024-3059.json) (`2024-04-26T05:15:50.360`) +- [CVE-2024-3060](CVE-2024/CVE-2024-30xx/CVE-2024-3060.json) (`2024-04-26T05:15:50.397`) +- [CVE-2024-3075](CVE-2024/CVE-2024-30xx/CVE-2024-3075.json) (`2024-04-26T05:15:50.433`) +- [CVE-2024-3154](CVE-2024/CVE-2024-31xx/CVE-2024-3154.json) (`2024-04-26T04:15:09.217`) +- [CVE-2024-3188](CVE-2024/CVE-2024-31xx/CVE-2024-3188.json) (`2024-04-26T05:15:50.477`) +- [CVE-2024-32404](CVE-2024/CVE-2024-324xx/CVE-2024-32404.json) (`2024-04-26T04:15:09.107`) +- [CVE-2024-32406](CVE-2024/CVE-2024-324xx/CVE-2024-32406.json) (`2024-04-26T04:15:09.163`) ### CVEs modified in the last Commit -Recently modified CVEs: `2` +Recently modified CVEs: `1` -- [CVE-2024-31497](CVE-2024/CVE-2024-314xx/CVE-2024-31497.json) (`2024-04-26T02:15:06.197`) -- [CVE-2024-3772](CVE-2024/CVE-2024-37xx/CVE-2024-3772.json) (`2024-04-26T02:15:06.983`) +- [CVE-2024-30564](CVE-2024/CVE-2024-305xx/CVE-2024-30564.json) (`2024-04-26T04:15:09.020`) ## Download and Usage diff --git a/_state.csv b/_state.csv index 2a738b4fed6..2f0a6d1860b 100644 --- a/_state.csv +++ b/_state.csv @@ -233275,7 +233275,7 @@ CVE-2023-47249,0,0,588609ccc6bec02a404ce20559ef14e4186adae4632c04e95b8afe3f76e9f CVE-2023-4725,0,0,04164ede04550b9698eb48a780e218da3cc662c0ab120fa603ad1bfd469e0c8d,2023-11-07T04:22:54.047000 CVE-2023-47250,0,0,797794357be142015cae6ecf62d3ef166201b7faf38b79ac29c86b5211586e03,2023-11-30T20:55:39.480000 CVE-2023-47251,0,0,334ed573018069c019e1a512b4215ed53ff35e3afe580c8dea578498d7671511,2023-11-30T20:49:57.593000 -CVE-2023-47252,1,1,cf1020f0dcb2dbe11a4582076d2c7eaa7051168d2cdbb1d0025f59a97ebc0365,2024-04-26T03:15:06.617000 +CVE-2023-47252,0,0,cf1020f0dcb2dbe11a4582076d2c7eaa7051168d2cdbb1d0025f59a97ebc0365,2024-04-26T03:15:06.617000 CVE-2023-47253,0,0,ba8811cc3b5e7eeab51338b3370421a30d297b58dee68080760ae2c3fe084981,2023-11-14T20:03:09.900000 CVE-2023-47254,0,0,2ceaabea8b552c825ee67e0a4275d459a09167965723aa94a10b6aef1023ef84,2023-12-12T22:33:48.820000 CVE-2023-47256,0,0,135dc3a37d912e8d13804a14befd28f178538ec0146ffeff245bc9a355e0e147,2024-02-15T07:15:08.250000 @@ -239069,6 +239069,7 @@ CVE-2024-0900,0,0,0df16b48e073462cef0a451a68261119942789edbcc049ef43c079272fea0e CVE-2024-0901,0,0,8395d055c39a2ded7a6676d9f91e364a6c601b11f066a458c7ff4909044d580a,2024-03-26T12:55:05.010000 CVE-2024-0902,0,0,c022af4b73cd366b52a576af13eecfefbd72fc877962e0376aba015f72537ab5,2024-04-15T13:15:31.997000 CVE-2024-0903,0,0,4e5a944405938a6def0adf008001af709d311e38e0572265081d65abf85ff9fb,2024-02-22T19:07:27.197000 +CVE-2024-0905,1,1,ab0f00ace4634cf46546f03ef2187eb2efee78d0c9c6991d1f77098256ca3ee6,2024-04-26T05:15:49.907000 CVE-2024-0906,0,0,2cb73c39a2e6fe8ef5222442ed25db55924374576f26540dbc47cb2f830bdc5d,2024-03-12T12:40:13.500000 CVE-2024-0907,0,0,736d9a373e93547114922fac343df53c487c280e59648bef9a3cecc6379f908e,2024-02-29T13:49:29.390000 CVE-2024-0909,0,0,7864e9d833556eb295eb67e87cebb39c8d9b11d41ed1f5327a80b30fe013438c,2024-02-08T20:07:51.410000 @@ -240741,6 +240742,7 @@ CVE-2024-21584,0,0,d66fedfad76e69bf70f964d573fe608d89f94eedd1312d57b206120486115 CVE-2024-21585,0,0,6e8206f1fdf94b37b9dcf7444e5790dcbe04c3a87e39f8bb6c4b0625dfa3058a,2024-01-31T00:15:45.920000 CVE-2024-21587,0,0,00caf8e0dd355879f913af1e174cfaccf48910da74261d4402cf2eff2334cffc,2024-01-19T17:44:35.830000 CVE-2024-21589,0,0,68b0ee433e5dc2a6e0c5986e659a2299beb8087cc670f80d46b90c5ac3b4a35f,2024-01-19T17:41:50.160000 +CVE-2024-2159,1,1,883cc321624467b2747138051422660297556524b31fdcbd1e60e9defa30d5dc,2024-04-26T05:15:50 CVE-2024-21590,0,0,1a5cfa0442f6700627b14500caafe3edf870ae95e41f632c8a8e9b6ad0acd506,2024-04-15T13:15:51.577000 CVE-2024-21591,0,0,77ced40d9ea71de7e0f4aa61db192f300bee1246d7e33e78b4e3a0dcf328f916,2024-02-10T00:15:07.937000 CVE-2024-21593,0,0,21335c213d77ca1dd069c4b30e9c76b53a2abbe3782fa324a2bf1c217bae5a20,2024-04-15T13:15:51.577000 @@ -241327,6 +241329,8 @@ CVE-2024-22626,0,0,fc707ee8f5c412b901c3f24bd4c3662a5fd9b8a23f261dbe38ea261f2f9fa CVE-2024-22627,0,0,946da3d0fb3c8b21c74e447c6bf66b7afc411456e784a137e7dc02c86f83a2ae,2024-01-19T14:38:53.237000 CVE-2024-22628,0,0,788480fa6919f601646c68f9f25325c618d05969ba2c7889243829bc40d9ae3f,2024-01-19T14:33:00.143000 CVE-2024-2263,0,0,df8d6f616c06d7efbf230a22645526f71cba2b5d98ac7477968fae54aee3855c,2024-04-01T12:49:00.877000 +CVE-2024-22632,1,1,7e26945b84870bf44d673d88ce129d6d5f1547560fd517b5854ed3288bd7b804,2024-04-26T04:15:08.830000 +CVE-2024-22633,1,1,f2ba128eb9e1780c0fa52511b259b429c5eba6314d087c1365fb504e978d6069,2024-04-26T04:15:08.910000 CVE-2024-22635,0,0,4862506d4e37fbac04654e9c145033c5c19772547553e0905cdb496418310552,2024-01-29T15:57:23.770000 CVE-2024-22636,0,0,d2329967243db7b2d90664e4db5aafab2eefb2c63c9125405da2b73ddd46c40f,2024-01-29T15:57:32.540000 CVE-2024-22637,0,0,26b297452537f73426f9b1e1c51d8375cdf08e35ab6ae3bee9824c37bc50f94b,2024-02-15T15:19:44.187000 @@ -241493,6 +241497,7 @@ CVE-2024-23085,0,0,27d0f44875030ba128821d0a5604f24565f110d196fa9a9783c10c633bc8b CVE-2024-23086,0,0,84287977eab241265f69ad39dd1efe49fbc488d3bee216c68604fc835c00c346,2024-04-11T19:15:16.670000 CVE-2024-2309,0,0,5e7d16d6f71f2f007544bcbcc47dd8107c18e2714e36b52143e4572bbdc63440,2024-04-17T12:48:07.510000 CVE-2024-23094,0,0,8b7fd2c37601b9f636934db44ed8e567ef20eff4d921df465afdbb6ef925a041,2024-02-22T19:07:27.197000 +CVE-2024-2310,1,1,e3ae48c0cf9cfa7bc858090bd42f98b62df334575b3a7f45d9324f7ca852b5db,2024-04-26T05:15:50.040000 CVE-2024-23108,0,0,4bd66ae4e2150cd9c3073e095bacf489de77af9a273b611e130c3e3fa4edf7ea,2024-02-07T15:02:00.203000 CVE-2024-23109,0,0,c2686a38cd2651bfef8ab0e98ee0dbcce98e98fd7c1f1805290cb9df9c03fe78,2024-02-07T15:04:28.237000 CVE-2024-2311,0,0,738ffcbe7f411809b0dd04835f3243a6f3350cd455230e0887015d402141b408,2024-04-10T13:23:38.787000 @@ -242137,6 +242142,7 @@ CVE-2024-24276,0,0,c0b996f05c041cdec9f97004ccc67bd94d1c66cbf22b8df3dba73751978ab CVE-2024-24278,0,0,3f7eb60b847e1971c5f65cb683e6174dee6547147c3195ceb2f7499f12bdbd36,2024-03-06T15:18:08.093000 CVE-2024-24279,0,0,d350732cc4ca29b60cc89e1436f10a4364ab08631ecd4190bd1db7c1d3d102d3,2024-04-09T12:48:04.090000 CVE-2024-2428,0,0,a12acd196e6489491150ab75ad9922280151d93b658bfb481d4c1c66079cd163,2024-04-10T13:23:38.787000 +CVE-2024-2429,1,1,a8ae1602d0825f267a3efaaa88009eadee829935b7f4a78d1649807b21ba88f7,2024-04-26T05:15:50.083000 CVE-2024-24291,0,0,ed81ca1f7d07ab5682e5dc3e12510be85bd8028a8e8a8fb1a80b96c7b9ae97e4,2024-02-13T20:13:26.593000 CVE-2024-24300,0,0,a8dc475a562e17ac269ab87541d5cc3de5e8b25ad6f69c16a9e202ce4fe0a524,2024-02-15T06:23:39.303000 CVE-2024-24301,0,0,eea9ef656f8457ca391649537e978f0d3e4722722df26eae84433b0c4b119a98,2024-02-15T06:23:39.303000 @@ -242178,6 +242184,7 @@ CVE-2024-2438,0,0,c00f0172cf7ab8467da2d5d83a23b794d6f6a7817b3440d3b686b7132bf26b CVE-2024-24386,0,0,7f40633635579a6e57b93f4e362e7ec6b3a2af9b3c5c8050723583bf6d085ce4,2024-02-15T14:28:31.380000 CVE-2024-24388,0,0,3f3d5731a0be4e881fd82d2a190d75a64cc3a7cfd8c995358dcecccf32a929bb,2024-02-08T20:04:04.027000 CVE-2024-24389,0,0,fc2f959521db6beb1a64904c90b55c43557e2fa9885e5140ef9962701e570aba,2024-03-07T13:52:27.110000 +CVE-2024-2439,1,1,26e7ef28c5038284b9838e609ebacc969e3c2c2e7fccdfb99fde0bb1edc80470,2024-04-26T05:15:50.127000 CVE-2024-24393,0,0,90dfcf43d684735b8235a3326fe419899f2f2a761b862d82b04f2c974933d9fe,2024-02-15T18:13:59.327000 CVE-2024-24396,0,0,490bf819c482001abd1dcba25c4c319f8da0b154dd54e7da19b5736b32d31753,2024-02-14T17:58:05.850000 CVE-2024-24397,0,0,c42f6e3d95ec1079046817a9a19cbab9b7268b0d74721cd48822bbfd3065325f,2024-02-22T03:39:02.803000 @@ -243066,6 +243073,7 @@ CVE-2024-26018,0,0,f0a23aadd063ff7c7efa65bdfb2fba637cb4053fe19b3da7278a7f893beab CVE-2024-26019,0,0,fbe6a7f77deb15cc085d52bc5fe2b39474b81c363a3a1755ab2818a8be2623e5,2024-04-11T12:47:44.137000 CVE-2024-26023,0,0,03df4473c85ab0c8247169f36cdaabb6d0ade251a86d2a476e4dede57424f28c,2024-04-15T13:15:31.997000 CVE-2024-26028,0,0,f0eeab6f00388b393e9761660fb13451fd75e54f8248c45c23f5d18cc79809b2,2024-03-18T19:40:00.173000 +CVE-2024-2603,1,1,1e8d89cc2521a0c4429de58f66d903edaef0e2256285ff6550acdda1c55699ba,2024-04-26T05:15:50.163000 CVE-2024-26030,0,0,6e3023416b037dd092fe7b5e942072e3533649d1b2cfd157142cc39338fedbad,2024-03-18T19:40:00.173000 CVE-2024-26031,0,0,ed002faaad586ba4ca84a6198e87a403fdacf5cc79e96297a7527ff0ace203b7,2024-03-18T19:40:00.173000 CVE-2024-26032,0,0,d12b1deafb7f503f2da2b6f08ed3ffc2b0c3783c86e2506252b03bfbb01459b8,2024-03-18T19:40:00.173000 @@ -244364,6 +244372,7 @@ CVE-2024-28345,0,0,9f53096e64fde0bd9e67c2ba1058971494111a4dba7285ed04f98db5747f2 CVE-2024-28353,0,0,f5d0b12a1e8a931f5519e51563d18b142745d332ff192847a7afb495f17e2dd3,2024-03-15T12:53:06.423000 CVE-2024-28354,0,0,b6680336ce24c3665bbea7456a49c23f2010021d3a256de9fa063452e0cf7d3a,2024-03-15T12:53:06.423000 CVE-2024-2836,0,0,9acd34fc60cb65ba9cd271e5ec35a02f0cd82360d653d80e871f78f2c63ee537,2024-04-15T13:15:31.997000 +CVE-2024-2837,1,1,3d167bd22657690bed669dc6a1f5948fad53db1d85da4f5a1dc02a945d281e16,2024-04-26T05:15:50.200000 CVE-2024-28383,0,0,4ebb5b688ac785b11132be45898bb9d7934c49dcd0ae78bf745a27cbe4cf3c09,2024-03-14T14:21:20.217000 CVE-2024-28386,0,0,babe8ca097e0c09213bc5c6af798d9ab75b1906fe65d8568532f7dfbcdf59f5c,2024-03-25T16:43:06.137000 CVE-2024-28387,0,0,50317bd50b8bed7df4714df1431ccc5e21589c7d6b48de3eead147adffba9438,2024-03-25T16:43:06.137000 @@ -244678,6 +244687,7 @@ CVE-2024-29066,0,0,b033dec16249c47216f72affbb210c8ed478f17a804b8c831619777a2cc5b CVE-2024-2907,0,0,0de4eaf582874a4e5ac2ae24af0fa8e609e58802e166fffc037ff11637779bab,2024-04-25T13:18:13.537000 CVE-2024-29071,0,0,5ff903755374c23b025a98d3cc2b0f06ea188aa4151e3658c02fd385bc8b4fa8,2024-03-25T13:47:14.087000 CVE-2024-29074,0,0,9e8f322269475ed9cf88d107d6401cb08d7756267afe6b14bb883cfb51c03588,2024-04-02T12:50:42.233000 +CVE-2024-2908,1,1,d718b42a8221eb5044b0ae58c8139cc5d0bade869224164c9bfe63e40dcbe081,2024-04-26T05:15:50.240000 CVE-2024-29086,0,0,1ba59cf7e266064553649d504d13e7bbef5ec69a70b08610439516755a245119,2024-04-02T12:50:42.233000 CVE-2024-29089,0,0,d048736b15469f0b39e3b876166869fc2f8a5b0a20328918b1229acf18e4ac1f,2024-03-20T13:00:16.367000 CVE-2024-2909,0,0,59396b4bac4e29599b0f55c9fd39d8de81b55a6d460fef5a9da71e54c2be2d49,2024-04-11T01:25:40.947000 @@ -245368,6 +245378,7 @@ CVE-2024-30468,0,0,97a9b2808fcc8915cd24bfaf7f54deaceab99abf59bf935a157c8b40f4b70 CVE-2024-30469,0,0,27281734a967c544466176225d5b748c65afaa34ac64dbc81f344b0ba4360d31,2024-04-01T01:12:59.077000 CVE-2024-30477,0,0,e57a5e6fa510ec9057ebfdd86316546dd94e1dabae4fad5cc81ff907e6cfb50c,2024-04-01T01:12:59.077000 CVE-2024-30478,0,0,7d7533c1a9dedc51f4ca6100785aae3de1530d7d091146af0639adfb42b6a065,2024-04-01T01:12:59.077000 +CVE-2024-3048,1,1,5d30fdc6436314adb2b70e805f6b11714943f230c89053322061b1887b39feb9,2024-04-26T05:15:50.280000 CVE-2024-30482,0,0,570bede6c16b4a7f5e8b36059aeda7f1a299c81f1153ac528a60791c716caf63,2024-04-01T01:12:59.077000 CVE-2024-30483,0,0,6c48131c3767e81f61ec34b0bc223a59e072c0c0b055c8c0e04f20b2876077ea,2024-03-29T13:28:22.880000 CVE-2024-30486,0,0,3b668ae931cda4b6a387bfa69ea17dffa696817ef5a0dd2b2ba0b8d1d89d01a9,2024-04-01T01:12:59.077000 @@ -245430,7 +245441,7 @@ CVE-2024-30558,0,0,c487b7e520828364fad2b07b74e7c881d68876bac73b13b5c83e0dfd99fed CVE-2024-30559,0,0,30881b502a00e1f0b4af436d9e17ecd66ddff7c4f60889245892c374e2f0a5b2,2024-04-01T01:12:59.077000 CVE-2024-30560,0,0,ccfcb6a4f1b36743251fe438eda9434abbf3461c0ab9481afa870f06016b12e2,2024-04-25T13:18:13.537000 CVE-2024-30561,0,0,03bc43de8aff9caae9f72d908884b596acdfb45cf5a607bf3a61d00b78d408af,2024-04-01T01:12:59.077000 -CVE-2024-30564,0,0,5f976284dee8adc6f867c668cd15b1659935b33cf9e4e2c130b09997500e7317,2024-04-18T18:25:55.267000 +CVE-2024-30564,0,1,16170f1b4edbcf40cdf248a17b71e43d461e76a64078b4672c7fb05d4886d5dc,2024-04-26T04:15:09.020000 CVE-2024-30565,0,0,3c10663ebaef8c263e29a3b4fcd5ce9f26a98e5c4788e4f23a40d6624f566f6b,2024-04-04T12:48:41.700000 CVE-2024-30567,0,0,447b4353e8045b75e32e568c5da0f40429816963a76cd7c63967e8f0beeca893,2024-04-16T13:24:07.103000 CVE-2024-30568,0,0,31ce5d7ef83a345bc485099d3705d8788459cf828ab7d0b94885f7bc40a70cff,2024-04-03T17:24:18.150000 @@ -245438,6 +245449,7 @@ CVE-2024-30569,0,0,d548955a85cf80696d15b1d4c46cd6662c11d8d9f149868bdc5b584ae206e CVE-2024-30570,0,0,47165afd2a0337ae9b15921264ed392e129dcb0a5824d82a2839f88c9ccbe5b6,2024-04-03T17:24:18.150000 CVE-2024-30571,0,0,c50a42ed59a362d8828984df3d937cebc0fc1cd6656b81bbcd45275d74d7547a,2024-04-03T17:24:18.150000 CVE-2024-30572,0,0,57e1fe75a16162fb8db4aa9b45ee46c9d7b33cf4be8983bf1e85c221316c95ba,2024-04-03T17:24:18.150000 +CVE-2024-3058,1,1,3416b567a1e7f348f139f1351dcf9f2f0c9d4a564d2f273dc57b385c6d53cd9f,2024-04-26T05:15:50.320000 CVE-2024-30583,0,0,8d4c098fc02cad68349435331fb2990e298cb57ef90e4427b47a624cfd49c5b8,2024-03-28T16:07:30.893000 CVE-2024-30584,0,0,62ee47c2440175729b0276209a6459be7534b11d3abd207c43def002781888ca,2024-03-28T16:07:30.893000 CVE-2024-30585,0,0,a40a5c456ca36791f55ae1311c37edecc8f5c126bc2ac7d2154551e2396c6dc1,2024-03-28T16:07:30.893000 @@ -245445,6 +245457,7 @@ CVE-2024-30586,0,0,a186fb979ed65c88ce62a290e6f855128163c9fa77c5355abfb2bb731e824 CVE-2024-30587,0,0,23c200ae4001630b29710efdd8698d85648712273d7372a752920032f4d947e3,2024-03-28T16:07:30.893000 CVE-2024-30588,0,0,a78cc1e723dc7738ea3aa122a4b45c10693faddfd2183ab3270fc6b1c4499964,2024-03-28T16:07:30.893000 CVE-2024-30589,0,0,7f3bd7ec901fe014af7dcf666935ddd3d39c0fc2ff28ac8eaf8d31eadbb90b80,2024-03-28T16:07:30.893000 +CVE-2024-3059,1,1,5382269796faa9d6a68738ae10b82000a96a7b3b805c7966a93d46edac15d983,2024-04-26T05:15:50.360000 CVE-2024-30590,0,0,b29e37400568bf3ef1858eef7769bf083a47c61a106f27df4b8173fc1d40814d,2024-03-28T16:07:30.893000 CVE-2024-30591,0,0,fccd0ace4239a30fa0ef4b9ee775d5e196ef1d9d76c1e5f2b5d345c8f64facf1,2024-03-28T16:07:30.893000 CVE-2024-30592,0,0,a707460e8e70159424b4543df18a9eb4f29ee9778a40f23b0bd8a216605d05a0,2024-03-28T16:07:30.893000 @@ -245455,6 +245468,7 @@ CVE-2024-30596,0,0,7cd0dbe59c07e524347269d6ad600edbf2ce3681f61fcb58b1ea4be53950c CVE-2024-30597,0,0,c2c4d6014cd4a690dc2be3f521581455ed497747d3319329dc997bfbd14251ff,2024-03-28T16:07:30.893000 CVE-2024-30598,0,0,3455a65bcba40de15b293f4cbe7609b01a090d4c25ed20ab971f6a106299dc77,2024-03-28T16:07:30.893000 CVE-2024-30599,0,0,45a9c2ef0bb4943ce0d3dab897bfaa7a787bb1701760e2b34a4aad8235e0de1c,2024-03-28T16:07:30.893000 +CVE-2024-3060,1,1,ca226a008152d4708b553d73b83f69895eb2387b6bb2cd368f27a5288134552d,2024-04-26T05:15:50.397000 CVE-2024-30600,0,0,07f8767eef19dd08d9e1cc3d0874edfb6bacf2e635173b62a3bbb7f77a1747c3,2024-03-28T16:07:30.893000 CVE-2024-30601,0,0,0a2e428cbc485c5623cbc301ff44e1cd676c3b7c2d6d8ce0571a55030f7e4cf8,2024-03-28T16:07:30.893000 CVE-2024-30602,0,0,2727b743b2e56903f7e801a28994556ef283545dd501da199ae6f2fa143c24cf,2024-03-28T16:07:30.893000 @@ -245546,6 +245560,7 @@ CVE-2024-30733,0,0,c5f2692725b7484d3295bdbcc0eb2f4284901a52625827130c32bc53d3159 CVE-2024-30735,0,0,31045ca311cf80431efdddff43e24e114183e9ef2bff5c33a722b80a956aa850,2024-04-17T02:15:12 CVE-2024-30736,0,0,c9d1cbf13e640c6d0aad30d5b12c1d8e9eb4c675776ee84065ff7ca937010735,2024-04-17T02:15:12.057000 CVE-2024-30737,0,0,1c036a16278ee8ea2e333e89f0d66457a587f7e2e9da86fd57591a8972289c80,2024-04-17T02:15:12.117000 +CVE-2024-3075,1,1,b5fbb609dfe8cbb6c3d81c044aae2d0872f56fc2acec51133419c1556ceda4b7,2024-04-26T05:15:50.433000 CVE-2024-3077,0,0,df42d4a62ceb1c6a6275b9b1d36ac8da42c0ae3505d0e07beac8238605b5504b,2024-03-29T12:45:02.937000 CVE-2024-3078,0,0,de9e294582cbb558bf2417239a323549d99f034f1b581828b43e34b1ad1f5683,2024-04-11T01:25:52.940000 CVE-2024-30799,0,0,eae5bca102ad0c1fe3f236f7e51af89eca892740403953a6086f43b81ad7d92b,2024-04-22T13:28:43.747000 @@ -245880,12 +245895,13 @@ CVE-2024-3147,0,0,f05061e9d718b866336ceef3f83885c168403f8d387cf11dbe00ac736df358 CVE-2024-3148,0,0,12b6e15e00d964ce79c059c99a6c4df70691a740ad2056657f2d4843c78fc654,2024-04-11T01:25:55.337000 CVE-2024-31487,0,0,ffef7fcdc05bb476a1f2c02c71de4a76075ea7f0301d6a8889db629ce9b194c6,2024-04-10T13:24:22.187000 CVE-2024-31492,0,0,a251126d380ad734bdcae40155276c0c8cd0f78c057d6c232814179759c90bf9,2024-04-10T19:49:51.183000 -CVE-2024-31497,0,1,d90ff9b470753606034a89c278aa6cbdbffa031df39311cca8f7c7aaa4f69cec,2024-04-26T02:15:06.197000 +CVE-2024-31497,0,0,d90ff9b470753606034a89c278aa6cbdbffa031df39311cca8f7c7aaa4f69cec,2024-04-26T02:15:06.197000 CVE-2024-31498,0,0,db3c4e2337e3fccc66e084ef6016d8532925f451bef4124b0c2782f0c54d90b6,2024-04-08T00:15:08 CVE-2024-31503,0,0,a2a7c8d9eaf4775895950c76302a02326a8d6e67bb7d5ec85d9e8a8516e17053,2024-04-17T12:48:07.510000 CVE-2024-31506,0,0,8be7ef5b3e9d65e4bba9dd63e2b7475f0658a4b183369094a98038d4eee40099,2024-04-10T13:24:00.070000 CVE-2024-31507,0,0,8a4d05957463fb55563022c4622a2463374ff774a0631f4c63214875a7c78bee,2024-04-10T13:24:00.070000 CVE-2024-3151,0,0,2dd1cf236cf7e4dbb7d9720cf950d856f9b652cd7c08d701ecc784bea1322bb1,2024-04-11T01:25:55.410000 +CVE-2024-3154,1,1,fe05a185b3092b9d5ad3b4e9b1bd6e4a6ce72927c50f51e292982d2607e4f773,2024-04-26T04:15:09.217000 CVE-2024-31544,0,0,bc835e0f71240df22cec22617fbfab2cab4d97b1f555eabe4ef7c23231d6357c,2024-04-10T13:24:22.187000 CVE-2024-31545,0,0,8e5326bf13231003bc10db7b31c44d418956837c538cbd6727e4f72cee368bee,2024-04-22T19:24:06.727000 CVE-2024-31546,0,0,a44eabd912524c4138628ddf21812907bc4989788589b1a0788ce24b3eac282c,2024-04-19T18:29:53.040000 @@ -245926,7 +245942,7 @@ CVE-2024-31680,0,0,9cd3893ac983fae5e4213584fc439ab2d2b21e3e6bebab8790c0104ed80c7 CVE-2024-31744,0,0,7de9e0ac4d1881e8e6a1c9cabea807c4b59ffea44a7ce9a28f0f69a4b5f1eba8,2024-04-19T16:19:49.043000 CVE-2024-31745,0,0,a3bdd0cf6c191f4f752a70ac6769fb5b2d5c89636eeffe60e00827ad5ab48d32,2024-04-25T16:15:11.227000 CVE-2024-31750,0,0,ef2fe441e5dcedf0cb2da823df8fe57e9b7ada67d4a5ac9a3c649524c0ed2fa2,2024-04-19T13:10:25.637000 -CVE-2024-31755,1,1,d287be4f9d10515dbc056d5fe33489659b0c55b002e962bb9d63b119136d9bda,2024-04-26T03:15:06.690000 +CVE-2024-31755,0,0,d287be4f9d10515dbc056d5fe33489659b0c55b002e962bb9d63b119136d9bda,2024-04-26T03:15:06.690000 CVE-2024-31759,0,0,7081cd22df5b9e4148ecc914176fc1f6cc04366073f8b1e4eccd8dfe4f2b7d73,2024-04-17T12:48:07.510000 CVE-2024-31760,0,0,7b1e0b53a94a63e7f108110799c5f85524efc23136fc5608e680b8482e690959,2024-04-17T12:48:07.510000 CVE-2024-3177,0,0,7ac29b234ae819e7e031e3cd5f5b542db573e269bf19234225624f7ae92277ac,2024-04-25T06:16:00.237000 @@ -245975,6 +245991,7 @@ CVE-2024-31871,0,0,2e9cb20a8839296f42d6bc6aa4eee6ec286fed065eef42e4971f116c0f81a CVE-2024-31872,0,0,7d09da772d85c1598253bebf81c543077ef995af0f84d1cf088132605a2400f9,2024-04-10T19:49:51.183000 CVE-2024-31873,0,0,30397559953deb34a9ae192149473632dc6b2334245e920787a4c5e14fc76375,2024-04-10T19:49:51.183000 CVE-2024-31874,0,0,1770e58d0ae5591eb931a8cdfdb054fb4d854f81849d14af250c71db6caf553c,2024-04-10T19:49:51.183000 +CVE-2024-3188,1,1,a3e78b53dd736aee67f7e5fd889e7ce08a213c37b0eac8860bcc5d9ece31430a,2024-04-26T05:15:50.477000 CVE-2024-31887,0,0,e951c215b0e12b882bcc7244c98d7631ee4f4b7a3271b5f24e369f1a635cd3e5,2024-04-17T12:48:07.510000 CVE-2024-31920,0,0,3c0045dbbecad7d78d5b9eb044589c2fc290e421e2d5accb9391890092efc90f,2024-04-15T13:15:31.997000 CVE-2024-31921,0,0,732b3dfcff7f3c38928ece374bd7708cd93eb00a4dc0a7d5ac8e2f115b9d7217,2024-04-15T13:15:31.997000 @@ -246177,7 +246194,9 @@ CVE-2024-32391,0,0,b9d2ada2509e9e002fcf7fc50c30e5fa24f6bd077b7f0fab83dbe519d7675 CVE-2024-32392,0,0,e9dc77721f231608117a79f151c9f1e6be5cd7530989658bd3dd67ce41889ce5,2024-04-22T13:28:50.310000 CVE-2024-32394,0,0,5f3cc70e4b86c8028147d2489cef40fa6c9285878a28bdb0855878990e97443a,2024-04-23T12:52:26.253000 CVE-2024-32399,0,0,881ee2dd975bc6f828957c741f38d2e9a20065eb3fba67ea84e4e0b7e3e06627,2024-04-23T12:52:30.940000 +CVE-2024-32404,1,1,379eeeb7ce0150ce8ed5e5178eabfcd140f9bcf91f2f9768fb2acb41633837ca,2024-04-26T04:15:09.107000 CVE-2024-32405,0,0,3981342fdb5111e1ad684c404fe5fa643bf161596abde4f7fd085ddcbb79a5d7,2024-04-23T12:52:26.253000 +CVE-2024-32406,1,1,d7cdd496727b7ce774d9810e2af1f89527b4b5f33c65c9cea0d253695a92e30e,2024-04-26T04:15:09.163000 CVE-2024-32407,0,0,04bdb1c21d2d45016e5f7565a6490533ba649bcc5c4dc99b7e34c030532cab3a,2024-04-22T19:24:06.727000 CVE-2024-32409,0,0,2cc0bf26ecd8938fd89992a98bae2541af2d19072f0bc8cdc919759b6ea980aa,2024-04-19T16:19:49.043000 CVE-2024-32418,0,0,95e561b293359ffe96c6d53d8bd7aa5dba172944f2d114b653ec1a760700c5d9,2024-04-22T13:28:43.747000 @@ -246516,9 +246535,9 @@ CVE-2024-33668,0,0,8da888c6401255c0c4958767ca43922f13e05cfeec1c5c848466d82307049 CVE-2024-33669,0,0,1522cc0a6c328fb054da83ef1ecb8c08791177bf581ecdfbfa103e01e97a15cf,2024-04-26T01:15:46.383000 CVE-2024-3367,0,0,960603a26ef6b142509321d49e151f94a19b335f6f238fbeac2ae8c02d482fbe,2024-04-24T12:15:07.093000 CVE-2024-33670,0,0,1ae33a04b0d72eb2f80de09211415dcfdc89470e3b8eb1ca2da5bd532883aa7f,2024-04-26T01:15:46.573000 -CVE-2024-33671,1,1,94c5ba868729f131bbe6616f303ecfe5a326f0d8ec8c18320b1f0ed76e51fcb0,2024-04-26T02:15:06.410000 -CVE-2024-33672,1,1,0597d74eb088ac66173d2fa177cfb99da233fb0f2e857f3ff4ab477ed1e8a4f8,2024-04-26T02:15:06.607000 -CVE-2024-33673,1,1,7599bff580786a855ff11051fe3633c9ad802f6c36361c12bc5e5401e22f1d4b,2024-04-26T02:15:06.790000 +CVE-2024-33671,0,0,94c5ba868729f131bbe6616f303ecfe5a326f0d8ec8c18320b1f0ed76e51fcb0,2024-04-26T02:15:06.410000 +CVE-2024-33672,0,0,0597d74eb088ac66173d2fa177cfb99da233fb0f2e857f3ff4ab477ed1e8a4f8,2024-04-26T02:15:06.607000 +CVE-2024-33673,0,0,7599bff580786a855ff11051fe3633c9ad802f6c36361c12bc5e5401e22f1d4b,2024-04-26T02:15:06.790000 CVE-2024-3369,0,0,943fbc9826beb11428b980e60e48ec152ecf5fda97b5d1c26bb0e96c030079eb,2024-04-11T01:26:00.317000 CVE-2024-3371,0,0,ae16aca12e0ef96a1d50fe21e3e29226b9c681d9170bad90bc7de166f5de9586,2024-04-24T17:16:50.397000 CVE-2024-3376,0,0,f944ee3af49afac066405b13bcc14ad1a3aba304f57c015d653c31ce71a21bf1,2024-04-11T01:26:00.397000 @@ -246683,7 +246702,7 @@ CVE-2024-3768,0,0,d4b4a9423503f9d3968bacedbc99e37436f81a4617cd5e1bab83d119b6df54 CVE-2024-3769,0,0,0ad881f8596d4990c3771ff9a5d54d312e61117735de979ba399c5ec741a2429,2024-04-15T13:15:31.997000 CVE-2024-3770,0,0,a0e70333c7522428b816fd36d13aa498a9e0d573335af8812ebdec4541bca04d,2024-04-15T13:15:31.997000 CVE-2024-3771,0,0,f1b61f13329d2e1b043d30b1afc5857f95e3c932a47e6f6f675e3698c5c90d95,2024-04-15T13:15:31.997000 -CVE-2024-3772,0,1,184d29c2faf230c27e7c42ad45c478e7862cbffdde795ec4220824e36861b510,2024-04-26T02:15:06.983000 +CVE-2024-3772,0,0,184d29c2faf230c27e7c42ad45c478e7862cbffdde795ec4220824e36861b510,2024-04-26T02:15:06.983000 CVE-2024-3774,0,0,430454733381ff5a96eb00158d8d932d4c087496720223836bce2968611b5152,2024-04-15T13:15:31.997000 CVE-2024-3775,0,0,a79253f4f0c7633f40fa5e33903553d0137ff03b4a2d8425a028bb5ddf1c6b0a,2024-04-15T13:15:31.997000 CVE-2024-3776,0,0,55056178a3d988ca6f5c349416a81e65818f1f748e962aa89ca62657bc61cdbb,2024-04-15T13:15:31.997000 @@ -246810,7 +246829,7 @@ CVE-2024-4127,0,0,4364ebf3636399a6b862124e1d4818af14c41cdffb5c73435c8a8f0aa84db1 CVE-2024-4141,0,0,cc9e710826c489d0ee22d4c7d9dd610e35e7eaed543a00c568b5470b560db2a2,2024-04-24T19:58:40.710000 CVE-2024-4159,0,0,cf0daf8ecd317ce4288e8a4812364c59b3b10d10c0c5945533667d40be8a71fc,2024-04-25T23:15:47.087000 CVE-2024-4161,0,0,8c35858b76cabcd8cf78ed758e4c9d58e5dffa2b20a32ec25b41a43a372b2218,2024-04-25T13:18:13.537000 -CVE-2024-4163,1,1,aa6e311ebc165b43efa8b0a4c994abdb6e44a83bd22443b60ae5371da4ee97d9,2024-04-26T03:15:06.740000 +CVE-2024-4163,0,0,aa6e311ebc165b43efa8b0a4c994abdb6e44a83bd22443b60ae5371da4ee97d9,2024-04-26T03:15:06.740000 CVE-2024-4164,0,0,7b7ecf5ffdac8e07bc810bf656b6cf192bcaa27389ac9c35a4c16da54cd22ade,2024-04-25T13:18:02.660000 CVE-2024-4165,0,0,a68d30c2f16ca15cad9feb895c57b9da5fa63a2685b199108e4aaf56d8ac6f56,2024-04-25T13:18:02.660000 CVE-2024-4166,0,0,1d36f4647aa764fd2919ea2db750b25d40ec10634804f6daa695a02c9b64475c,2024-04-25T13:18:02.660000