Auto-Update: 2024-06-06T06:00:38.604034+00:00

This commit is contained in:
cad-safe-bot 2024-06-06 06:03:31 +00:00
parent b2d6aa2755
commit ef5e5c12bb
20 changed files with 916 additions and 38 deletions

View File

@ -0,0 +1,47 @@
{
"id": "CVE-2024-0972",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-06-06T04:15:10.923",
"lastModified": "2024-06-06T04:15:10.923",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "The BuddyPress Members Only plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 3.3.5 via the REST API. This makes it possible for unauthenticated attackers to bypass the plugin's \"All Other Sections On Your Site Will be Opened to Guest\" feature (when unset) and view restricted page and post content."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security@wordfence.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 3.9,
"impactScore": 1.4
}
]
},
"references": [
{
"url": "https://plugins.trac.wordpress.org/browser/buddypress-members-only/trunk/buddypress-members-only.php#L682",
"source": "security@wordfence.com"
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/dcfead67-d75d-46ae-ac68-a34643ac2f52?source=cve",
"source": "security@wordfence.com"
}
]
}

View File

@ -0,0 +1,47 @@
{
"id": "CVE-2024-1175",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-06-06T04:15:11.230",
"lastModified": "2024-06-06T04:15:11.230",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "The WP-Recall \u2013 Registration, Profile, Commerce & More plugin for WordPress is vulnerable to unauthorized loss of data due to a missing capability check on the 'delete_payment' function in all versions up to, and including, 16.26.6. This makes it possible for unauthenticated attackers to delete arbitrary payments."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security@wordfence.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "LOW",
"baseScore": 5.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 3.9,
"impactScore": 1.4
}
]
},
"references": [
{
"url": "https://wordpress.org/plugins/wp-recall/",
"source": "security@wordfence.com"
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/6b84b13a-b46c-48fc-a7a8-de32c575d576?source=cve",
"source": "security@wordfence.com"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-29976",
"sourceIdentifier": "security@zyxel.com.tw",
"published": "2024-06-04T02:15:49.050",
"lastModified": "2024-06-04T20:15:10.677",
"lastModified": "2024-06-06T04:15:11.497",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{

View File

@ -0,0 +1,47 @@
{
"id": "CVE-2024-2922",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-06-06T04:15:11.673",
"lastModified": "2024-06-06T04:15:11.673",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "The Themesflat Addons For Elementor plugin for WordPress is vulnerable to Stored Cross-Site Scripting via widget tags in all versions up to, and including, 2.1.1 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security@wordfence.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 6.4,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 3.1,
"impactScore": 2.7
}
]
},
"references": [
{
"url": "https://wordpress.org/plugins/themesflat-addons-for-elementor/",
"source": "security@wordfence.com"
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/1516280e-796e-4011-b15f-b754860ad414?source=cve",
"source": "security@wordfence.com"
}
]
}

View File

@ -0,0 +1,75 @@
{
"id": "CVE-2024-4212",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-06-06T04:15:11.970",
"lastModified": "2024-06-06T04:15:11.970",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "The Themesflat Addons For Elementor plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's TF Group Image, TF Nav Menu, TF Posts, TF Woo Product Grid, TF Accordion, and TF Image Box widgets in all versions up to, and including, 2.1.1 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security@wordfence.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 6.4,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 3.1,
"impactScore": 2.7
}
]
},
"references": [
{
"url": "https://plugins.trac.wordpress.org/browser/themesflat-addons-for-elementor/trunk/widgets/widget-accordion.php#L1158",
"source": "security@wordfence.com"
},
{
"url": "https://plugins.trac.wordpress.org/browser/themesflat-addons-for-elementor/trunk/widgets/widget-clipping-mask.php#L619",
"source": "security@wordfence.com"
},
{
"url": "https://plugins.trac.wordpress.org/browser/themesflat-addons-for-elementor/trunk/widgets/widget-imagebox.php#L1313",
"source": "security@wordfence.com"
},
{
"url": "https://plugins.trac.wordpress.org/browser/themesflat-addons-for-elementor/trunk/widgets/widget-navmenu.php#L1843",
"source": "security@wordfence.com"
},
{
"url": "https://plugins.trac.wordpress.org/browser/themesflat-addons-for-elementor/trunk/widgets/widget-posts.php#L3350",
"source": "security@wordfence.com"
},
{
"url": "https://plugins.trac.wordpress.org/browser/themesflat-addons-for-elementor/trunk/widgets/widget-tfgroupimage.php#L423",
"source": "security@wordfence.com"
},
{
"url": "https://plugins.trac.wordpress.org/browser/themesflat-addons-for-elementor/trunk/widgets/widget-woo-product-grid.php#L3646",
"source": "security@wordfence.com"
},
{
"url": "https://wordpress.org/plugins/themesflat-addons-for-elementor/",
"source": "security@wordfence.com"
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/dc686a35-4ce3-4359-a7d3-e6459e2f5dfe?source=cve",
"source": "security@wordfence.com"
}
]
}

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2024-4364",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-06-06T04:15:12.220",
"lastModified": "2024-06-06T04:15:12.220",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "The Qi Addons For Elementor plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's button widgets in all versions up to, and including, 1.7.2 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security@wordfence.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 6.4,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 3.1,
"impactScore": 2.7
}
]
},
"references": [
{
"url": "https://plugins.trac.wordpress.org/browser/qi-addons-for-elementor/tags/1.7.0/inc/shortcodes/button/class-qiaddonsforelementor-button-shortcode.php#L1253",
"source": "security@wordfence.com"
},
{
"url": "https://plugins.trac.wordpress.org/browser/qi-addons-for-elementor/tags/1.7.0/inc/shortcodes/info-button/class-qiaddonsforelementor-info-button-shortcode.php#L696",
"source": "security@wordfence.com"
},
{
"url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&new=3096634%40qi-addons-for-elementor%2Ftrunk&old=3092106%40qi-addons-for-elementor%2Ftrunk&sfp_email=&sfph_mail=#file21",
"source": "security@wordfence.com"
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/061ada09-932f-4d2c-aa9e-c53f1d711c85?source=cve",
"source": "security@wordfence.com"
}
]
}

View File

@ -0,0 +1,47 @@
{
"id": "CVE-2024-4458",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-06-06T04:15:12.483",
"lastModified": "2024-06-06T04:15:12.483",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "The Themesflat Addons For Elementor plugin for WordPress is vulnerable to Stored Cross-Site Scripting in several widgets via URL parameters in all versions up to, and including, 2.1.1 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with contributor access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security@wordfence.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 6.4,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 3.1,
"impactScore": 2.7
}
]
},
"references": [
{
"url": "https://wordpress.org/plugins/themesflat-addons-for-elementor/",
"source": "security@wordfence.com"
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/f0ff03ab-eeb9-4445-92c8-326783d4b10e?source=cve",
"source": "security@wordfence.com"
}
]
}

View File

@ -0,0 +1,47 @@
{
"id": "CVE-2024-4459",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-06-06T04:15:12.717",
"lastModified": "2024-06-06T04:15:12.717",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "The Themesflat Addons For Elementor plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's widget's titles in all versions up to, and including, 2.1.1 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security@wordfence.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 6.4,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 3.1,
"impactScore": 2.7
}
]
},
"references": [
{
"url": "https://plugins.trac.wordpress.org/browser/themesflat-addons-for-elementor/trunk/widgets/widget-simple-slide.php#L1117",
"source": "security@wordfence.com"
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/ce7c2f30-188a-4ae7-976f-c7f0aaf96eee?source=cve",
"source": "security@wordfence.com"
}
]
}

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2024-4608",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-06-06T04:15:12.953",
"lastModified": "2024-06-06T04:15:12.953",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "The SellKit \u2013 Funnel builder and checkout optimizer for WooCommerce to sell more, faster plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'id' parameter in all versions up to, and including, 1.9.8 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security@wordfence.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 6.4,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 3.1,
"impactScore": 2.7
}
]
},
"references": [
{
"url": "https://plugins.trac.wordpress.org/browser/sellkit/trunk/includes/elementor/modules/optin/fields/acceptance.php#L31",
"source": "security@wordfence.com"
},
{
"url": "https://plugins.trac.wordpress.org/browser/sellkit/trunk/includes/elementor/modules/optin/fields/field-base.php#L304",
"source": "security@wordfence.com"
},
{
"url": "https://plugins.trac.wordpress.org/browser/sellkit/trunk/includes/elementor/modules/optin/widgets/optin.php#L48",
"source": "security@wordfence.com"
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/9fbb31a5-9ed2-445a-b309-a9835128eb44?source=cve",
"source": "security@wordfence.com"
}
]
}

View File

@ -0,0 +1,51 @@
{
"id": "CVE-2024-4707",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-06-06T04:15:13.213",
"lastModified": "2024-06-06T04:15:13.213",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "The Materialis Companion plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's materialis_contact_form shortcode in all versions up to, and including, 1.3.41 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security@wordfence.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 6.4,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 3.1,
"impactScore": 2.7
}
]
},
"references": [
{
"url": "https://plugins.trac.wordpress.org/browser/materialis-companion/trunk/theme-data/materialis/functions.php#L90",
"source": "security@wordfence.com"
},
{
"url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3097691%40materialis-companion&new=3097691%40materialis-companion&sfp_email=&sfph_mail=",
"source": "security@wordfence.com"
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/6ca4dff0-ca3a-44cf-a30b-36b31d2848ab?source=cve",
"source": "security@wordfence.com"
}
]
}

View File

@ -0,0 +1,47 @@
{
"id": "CVE-2024-5141",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-06-06T04:15:13.467",
"lastModified": "2024-06-06T04:15:13.467",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "The Rotating Tweets (Twitter widget and shortcode) plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's' 'rotatingtweets' in all versions up to, and including, 1.9.10 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security@wordfence.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 6.4,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 3.1,
"impactScore": 2.7
}
]
},
"references": [
{
"url": "https://plugins.trac.wordpress.org/browser/rotatingtweets/tags/1.9.10/rotatingtweets.php#L2267",
"source": "security@wordfence.com"
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/02cff893-4f41-4bb0-9fb0-344a3a8afa0b?source=cve",
"source": "security@wordfence.com"
}
]
}

View File

@ -0,0 +1,47 @@
{
"id": "CVE-2024-5152",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-06-06T04:15:13.720",
"lastModified": "2024-06-06T04:15:13.720",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "The ElementsReady Addons for Elementor plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the \u2018_id\u2019 parameter in all versions up to, and including, 6.1.0 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security@wordfence.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 6.4,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 3.1,
"impactScore": 2.7
}
]
},
"references": [
{
"url": "https://plugins.trac.wordpress.org/browser/element-ready-lite/trunk/inc/Widgets/info_box/Element_Ready_Info_Box_Widget.php#L742",
"source": "security@wordfence.com"
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/d2cffdc3-bd74-42ab-befd-8a396c5d990d?source=cve",
"source": "security@wordfence.com"
}
]
}

View File

@ -0,0 +1,47 @@
{
"id": "CVE-2024-5153",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-06-06T04:15:13.950",
"lastModified": "2024-06-06T04:15:13.950",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "The Startklar Elementor Addons plugin for WordPress is vulnerable to Directory Traversal in all versions up to, and including, 1.7.15 via the 'dropzone_hash' parameter. This makes it possible for unauthenticated attackers to copy the contents of arbitrary files on the server, which can contain sensitive information, and to delete arbitrary directories, including the root WordPress directory."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security@wordfence.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 9.1,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.2
}
]
},
"references": [
{
"url": "https://plugins.trac.wordpress.org/browser/startklar-elmentor-forms-extwidgets/trunk/widgets/dropzone_form_field.php#L334",
"source": "security@wordfence.com"
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/baa20290-9c01-4f8d-adeb-fbfb15b9d6a9?source=cve",
"source": "security@wordfence.com"
}
]
}

View File

@ -0,0 +1,51 @@
{
"id": "CVE-2024-5161",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-06-06T04:15:14.217",
"lastModified": "2024-06-06T04:15:14.217",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "The Magical Addons For Elementor ( Header Footer Builder, Free Elementor Widgets, Elementor Templates Library ) plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the \u2018_id\u2019 parameter in all versions up to, and including, 1.1.39 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security@wordfence.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 6.4,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 3.1,
"impactScore": 2.7
}
]
},
"references": [
{
"url": "https://plugins.trac.wordpress.org/browser/magical-addons-for-elementor/trunk/includes/widgets/advance-skill-bars.php#L502",
"source": "security@wordfence.com"
},
{
"url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3098054%40magical-addons-for-elementor&new=3098054%40magical-addons-for-elementor&sfp_email=&sfph_mail=#file9",
"source": "security@wordfence.com"
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/cb64952e-170e-47c5-87fd-d2ec60192b65?source=cve",
"source": "security@wordfence.com"
}
]
}

View File

@ -0,0 +1,47 @@
{
"id": "CVE-2024-5162",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-06-06T04:15:14.463",
"lastModified": "2024-06-06T04:15:14.463",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "The WordPress prettyPhoto plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the \u2018url\u2019 parameter in all versions up to, and including, 1.2.3 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security@wordfence.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 6.4,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 3.1,
"impactScore": 2.7
}
]
},
"references": [
{
"url": "https://plugins.trac.wordpress.org/browser/prettyphoto/trunk/addon/jltma-wpf-addon.php#L96",
"source": "security@wordfence.com"
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/c581616d-c9e7-46f2-9c2f-5e082a13fd0b?source=cve",
"source": "security@wordfence.com"
}
]
}

View File

@ -0,0 +1,51 @@
{
"id": "CVE-2024-5449",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-06-06T04:15:14.720",
"lastModified": "2024-06-06T04:15:14.720",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "The WP Dark Mode \u2013 WordPress Dark Mode Plugin for Improved Accessibility, Dark Theme, Night Mode, and Social Sharing plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the wpdm_social_share_save_options function in all versions up to, and including, 5.0.4. This makes it possible for authenticated attackers, with Subscriber-level access and above, to update the plugin's settings."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security@wordfence.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 1.4
}
]
},
"references": [
{
"url": "https://plugins.trac.wordpress.org/browser/wp-dark-mode/trunk/includes/modules/social-share/class-social-share.php#L581",
"source": "security@wordfence.com"
},
{
"url": "https://plugins.trac.wordpress.org/changeset/3096290/wp-dark-mode/trunk?contextall=1&old=3073245&old_path=%2Fwp-dark-mode%2Ftrunk",
"source": "security@wordfence.com"
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/d7d20733-d61b-4b2f-8597-528644f0bc26?source=cve",
"source": "security@wordfence.com"
}
]
}

View File

@ -0,0 +1,51 @@
{
"id": "CVE-2024-5615",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-06-06T04:15:15.010",
"lastModified": "2024-06-06T04:15:15.010",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "The Open Graph plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 1.11.2 via the 'opengraph_default_description' function. This makes it possible for unauthenticated attackers to extract sensitive data including partial content of password-protected blog posts."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security@wordfence.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 3.9,
"impactScore": 1.4
}
]
},
"references": [
{
"url": "https://plugins.trac.wordpress.org/browser/opengraph/trunk/opengraph.php#L369",
"source": "security@wordfence.com"
},
{
"url": "https://plugins.trac.wordpress.org/changeset/3097574/",
"source": "security@wordfence.com"
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/f57dc0fe-07f3-457e-8080-fe530f6a9f01?source=cve",
"source": "security@wordfence.com"
}
]
}

View File

@ -0,0 +1,47 @@
{
"id": "CVE-2024-5656",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-06-06T05:15:49.377",
"lastModified": "2024-06-06T05:15:49.377",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "The Google CSE plugin for WordPress is vulnerable to Stored Cross-Site Scripting via admin settings in all versions up to, and including, 1.0.7 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with administrator-level permissions and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. This only affects multi-site installations and installations where unfiltered_html has been disabled."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security@wordfence.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 4.4,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.3,
"impactScore": 2.7
}
]
},
"references": [
{
"url": "https://wpscan.com/vulnerability/adc6ea6d-29d8-4ad0-b0db-2540e8b3f9a9/",
"source": "security@wordfence.com"
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/37cf63e3-9301-441d-9852-b2de83078b51?source=cve",
"source": "security@wordfence.com"
}
]
}

View File

@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update
```plain
2024-06-06T04:00:40.747814+00:00
2024-06-06T06:00:38.604034+00:00
```
### Most recent CVE Modification Timestamp synchronized with NVD
```plain
2024-06-06T03:15:08.847000+00:00
2024-06-06T05:15:49.377000+00:00
```
### Last Data Feed Release
@ -33,35 +33,37 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
### Total Number of included CVEs
```plain
252774
252791
```
### CVEs added in the last Commit
Recently added CVEs: `15`
Recently added CVEs: `17`
- [CVE-2023-6956](CVE-2023/CVE-2023-69xx/CVE-2023-6956.json) (`2024-06-06T02:15:52.377`)
- [CVE-2023-6966](CVE-2023/CVE-2023-69xx/CVE-2023-6966.json) (`2024-06-06T02:15:52.607`)
- [CVE-2023-6968](CVE-2023/CVE-2023-69xx/CVE-2023-6968.json) (`2024-06-06T02:15:52.810`)
- [CVE-2024-0910](CVE-2024/CVE-2024-09xx/CVE-2024-0910.json) (`2024-06-06T02:15:53.010`)
- [CVE-2024-2017](CVE-2024/CVE-2024-20xx/CVE-2024-2017.json) (`2024-06-06T03:15:08.847`)
- [CVE-2024-2350](CVE-2024/CVE-2024-23xx/CVE-2024-2350.json) (`2024-06-06T02:15:53.237`)
- [CVE-2024-4194](CVE-2024/CVE-2024-41xx/CVE-2024-4194.json) (`2024-06-06T02:15:53.453`)
- [CVE-2024-4705](CVE-2024/CVE-2024-47xx/CVE-2024-4705.json) (`2024-06-06T02:15:53.663`)
- [CVE-2024-4788](CVE-2024/CVE-2024-47xx/CVE-2024-4788.json) (`2024-06-06T02:15:53.860`)
- [CVE-2024-4942](CVE-2024/CVE-2024-49xx/CVE-2024-4942.json) (`2024-06-06T02:15:54.080`)
- [CVE-2024-5001](CVE-2024/CVE-2024-50xx/CVE-2024-5001.json) (`2024-06-06T02:15:54.283`)
- [CVE-2024-5179](CVE-2024/CVE-2024-51xx/CVE-2024-5179.json) (`2024-06-06T02:15:54.487`)
- [CVE-2024-5224](CVE-2024/CVE-2024-52xx/CVE-2024-5224.json) (`2024-06-06T02:15:54.690`)
- [CVE-2024-5324](CVE-2024/CVE-2024-53xx/CVE-2024-5324.json) (`2024-06-06T02:15:54.890`)
- [CVE-2024-5342](CVE-2024/CVE-2024-53xx/CVE-2024-5342.json) (`2024-06-06T02:15:55.087`)
- [CVE-2024-0972](CVE-2024/CVE-2024-09xx/CVE-2024-0972.json) (`2024-06-06T04:15:10.923`)
- [CVE-2024-1175](CVE-2024/CVE-2024-11xx/CVE-2024-1175.json) (`2024-06-06T04:15:11.230`)
- [CVE-2024-2922](CVE-2024/CVE-2024-29xx/CVE-2024-2922.json) (`2024-06-06T04:15:11.673`)
- [CVE-2024-4212](CVE-2024/CVE-2024-42xx/CVE-2024-4212.json) (`2024-06-06T04:15:11.970`)
- [CVE-2024-4364](CVE-2024/CVE-2024-43xx/CVE-2024-4364.json) (`2024-06-06T04:15:12.220`)
- [CVE-2024-4458](CVE-2024/CVE-2024-44xx/CVE-2024-4458.json) (`2024-06-06T04:15:12.483`)
- [CVE-2024-4459](CVE-2024/CVE-2024-44xx/CVE-2024-4459.json) (`2024-06-06T04:15:12.717`)
- [CVE-2024-4608](CVE-2024/CVE-2024-46xx/CVE-2024-4608.json) (`2024-06-06T04:15:12.953`)
- [CVE-2024-4707](CVE-2024/CVE-2024-47xx/CVE-2024-4707.json) (`2024-06-06T04:15:13.213`)
- [CVE-2024-5141](CVE-2024/CVE-2024-51xx/CVE-2024-5141.json) (`2024-06-06T04:15:13.467`)
- [CVE-2024-5152](CVE-2024/CVE-2024-51xx/CVE-2024-5152.json) (`2024-06-06T04:15:13.720`)
- [CVE-2024-5153](CVE-2024/CVE-2024-51xx/CVE-2024-5153.json) (`2024-06-06T04:15:13.950`)
- [CVE-2024-5161](CVE-2024/CVE-2024-51xx/CVE-2024-5161.json) (`2024-06-06T04:15:14.217`)
- [CVE-2024-5162](CVE-2024/CVE-2024-51xx/CVE-2024-5162.json) (`2024-06-06T04:15:14.463`)
- [CVE-2024-5449](CVE-2024/CVE-2024-54xx/CVE-2024-5449.json) (`2024-06-06T04:15:14.720`)
- [CVE-2024-5615](CVE-2024/CVE-2024-56xx/CVE-2024-5615.json) (`2024-06-06T04:15:15.010`)
- [CVE-2024-5656](CVE-2024/CVE-2024-56xx/CVE-2024-5656.json) (`2024-06-06T05:15:49.377`)
### CVEs modified in the last Commit
Recently modified CVEs: `1`
- [CVE-2024-20069](CVE-2024/CVE-2024-200xx/CVE-2024-20069.json) (`2024-06-06T03:15:08.747`)
- [CVE-2024-29976](CVE-2024/CVE-2024-299xx/CVE-2024-29976.json) (`2024-06-06T04:15:11.497`)
## Download and Usage

View File

@ -240007,7 +240007,7 @@ CVE-2023-6951,0,0,57082808549e246805e8d818c1f0b361c71c67cf5af35497921bf2b2066177
CVE-2023-6953,0,0,a4eae60c09f86b37536b6072986cf2d081babcc1cdd107376a1ba9bb2012ddfc,2024-02-22T03:39:59.017000
CVE-2023-6954,0,0,ac4de842b7d6e02ca6bae2b19dfae50dd2ce8593b754802f4ea868ef889692b2,2024-03-13T18:16:18.563000
CVE-2023-6955,0,0,7a80cfe846d10fcea6780b4ae01cccd9684aeac6ad97c3a3415c4424a672be7e,2024-01-18T21:16:42.053000
CVE-2023-6956,1,1,76acfe238ba96655429066a44b1309fe6b07359501a9406d887b2a8878226c0a,2024-06-06T02:15:52.377000
CVE-2023-6956,0,0,76acfe238ba96655429066a44b1309fe6b07359501a9406d887b2a8878226c0a,2024-06-06T02:15:52.377000
CVE-2023-6957,0,0,37410c0850f39e84fec09030c05455cdb6b71566f4cc25e69cd2d10526403569,2024-03-13T18:16:18.563000
CVE-2023-6958,0,0,360585034baba3dde8bbd2b4edec3a36320e0765453af141d99ea526bd11ab61,2024-01-24T20:47:14.900000
CVE-2023-6959,0,0,3499bdabf9b48447bf05d447c84d13393f065f476750e301dd4268abb320735c,2024-02-14T17:01:57.227000
@ -240017,9 +240017,9 @@ CVE-2023-6962,0,0,7907abbc88b8cf8cf42e1839634495abd8a2527db0e75bbd7b44b875253217
CVE-2023-6963,0,0,231e665c342f619449883ebe35105e509b0377505f1217d0d32ee087d0bccd84,2024-02-14T17:05:16.533000
CVE-2023-6964,0,0,c0ad1bab867494413e0d294a1b4ba02b00c210ce5ff95683c4a7abe457ff5c04,2024-04-10T13:24:00.070000
CVE-2023-6965,0,0,3161cd0566c2f4cc68cf7da3dd5f4f40c9e680a32873d29dc93679331f60d2f6,2024-04-10T13:24:00.070000
CVE-2023-6966,1,1,02c0dc58b2465eceb4e2384647ce930ddb7198fe4f9eb8569de9c5930ab12885,2024-06-06T02:15:52.607000
CVE-2023-6966,0,0,02c0dc58b2465eceb4e2384647ce930ddb7198fe4f9eb8569de9c5930ab12885,2024-06-06T02:15:52.607000
CVE-2023-6967,0,0,e8d18a8c3855ee1871e469a1371a3b540ec58090306c27aae2cc4afa88f127e6,2024-04-10T13:24:00.070000
CVE-2023-6968,1,1,323d07943f1f9e6176dab362786c10a21d70625d554a5e57789a45afdb45501b,2024-06-06T02:15:52.810000
CVE-2023-6968,0,0,323d07943f1f9e6176dab362786c10a21d70625d554a5e57789a45afdb45501b,2024-06-06T02:15:52.810000
CVE-2023-6969,0,0,af7f1fac7c19184dd4a346dfa3002dd56ea8bf066ba1c7fbe000ae3b87995670,2024-03-13T18:16:18.563000
CVE-2023-6970,0,0,0f9239778a6c6425e613c8adeae37463c6bdd10b4d16dd22430636510b0bbc4a,2024-01-24T20:48:25.003000
CVE-2023-6971,0,0,87d9fb2fea287f164d59546a7daf008cb5ef4f3ea279e66acf661ea916f01d0f,2023-12-29T06:21:25.760000
@ -241017,7 +241017,7 @@ CVE-2024-0906,0,0,2cb73c39a2e6fe8ef5222442ed25db55924374576f26540dbc47cb2f830bdc
CVE-2024-0907,0,0,736d9a373e93547114922fac343df53c487c280e59648bef9a3cecc6379f908e,2024-02-29T13:49:29.390000
CVE-2024-0908,0,0,a7a4198c8ea4948ff50baff5b198d47526d6c715136e7f4dee3e5232dedc1252,2024-05-02T18:00:37.360000
CVE-2024-0909,0,0,7864e9d833556eb295eb67e87cebb39c8d9b11d41ed1f5327a80b30fe013438c,2024-02-08T20:07:51.410000
CVE-2024-0910,1,1,61a42a2e5daba771d4e4ca60017e22bda15ffd658049f7614b4fe8b3bcb17506,2024-06-06T02:15:53.010000
CVE-2024-0910,0,0,61a42a2e5daba771d4e4ca60017e22bda15ffd658049f7614b4fe8b3bcb17506,2024-06-06T02:15:53.010000
CVE-2024-0911,0,0,5f8186e1a077698fb2fa1e99d28cc6e32ac8b7b7afb205a3a02bc10c8ca698f0,2024-02-14T18:15:48.077000
CVE-2024-0912,0,0,2b04b96169ee6110d55472434e7f20f6c2bcb38bf7ba23a2f8e7630b42830ffb,2024-06-06T00:15:09.117000
CVE-2024-0913,0,0,cc9dbbd0e1eb40baf69d2dc96719798ae1dcba5ab6fc531754d7fd6a8c7e7f1d,2024-03-29T12:45:02.937000
@ -241072,6 +241072,7 @@ CVE-2024-0967,0,0,9fd29428758cc7103c27ff768899ac1f1027dfb29b99d14d825027787d9c2b
CVE-2024-0968,0,0,c1945b692689ad2f744c5e2d1d9cf9272687841f9bcfad2dcb0e3ca7e46c8c2d,2024-04-08T11:15:49.610000
CVE-2024-0969,0,0,b70a3e678841d5c3e905a1a4d78ee61bc51fd818aa668b1889827f06c393559b,2024-02-13T19:44:42.503000
CVE-2024-0971,0,0,10711fc5fd019982dab0af4d04cad68f7d925a8d90883facb336aae2462a64e3,2024-03-04T22:58:00.967000
CVE-2024-0972,1,1,cae7562b1044041c22dfbfcf666bd62e66e570bc3c86a1a1862fa131b7c4242f,2024-06-06T04:15:10.923000
CVE-2024-0973,0,0,87a64eeb8545d2aed4850999f1a0515438bc623727357d945a5399ed140bee41,2024-03-18T19:40:00.173000
CVE-2024-0975,0,0,727e762e9bf21cc79d41b3d973240a06501d145479fa8fca0d0cfdc6efc382cc,2024-02-28T14:06:45.783000
CVE-2024-0976,0,0,961ca83ff90147b357fdad21a4ce2284407f8f5fed2f5570590409615417a9e7,2024-03-13T18:16:18.563000
@ -241257,6 +241258,7 @@ CVE-2024-1171,0,0,6b87cc518b4ec22739c7ae66eda5d8c3cdf1db30d4dec8967ce2f3257f9601
CVE-2024-1172,0,0,3e0b781542e911cd26b4c5c68b4bb4de402a70910d88a0031456f626a8dc6655,2024-02-29T13:49:29.390000
CVE-2024-1173,0,0,e03ac25b63a360304a72a163d3a27c75f5a0143aea09b3c9bad3038f206cf778,2024-05-02T18:00:37.360000
CVE-2024-1174,0,0,8ef9d5cfead4490d51dff3523dd75d950803ab9cc5257ee13ff11b3323910199,2024-03-01T22:22:25.913000
CVE-2024-1175,1,1,405a4084bc224c4eb218cf684ed3a379acc9d9f6e52e76e4e05cbf445c433163,2024-06-06T04:15:11.230000
CVE-2024-1176,0,0,f15000f649fe2b7f5cd356cd32d8300de590418dbba27f06c6203f39d98cc334,2024-03-13T18:16:18.563000
CVE-2024-1177,0,0,2975630ef7f8a77b7876a87ad1120fd917ca4ca2d762e9d0ae54267a750cb012,2024-02-13T14:06:04.817000
CVE-2024-1178,0,0,1d79d2baf0c52babf00a18f14ce6291cb7fba70afba005e5722ced55b2d8af24,2024-03-05T13:41:01.900000
@ -242040,7 +242042,7 @@ CVE-2024-20065,0,0,8ab52ef99ec3cc5757b239673490a11d1ec0d860257f5b5d3dc656099140a
CVE-2024-20066,0,0,f48106ad7b4ca43e5987705fe9ab68bb5e05a7ed45f830ed2c0ed90706d533c8,2024-06-03T14:46:24.250000
CVE-2024-20067,0,0,8ca013ea49df42071de66561e1c22be3b5ac8f57cdfeaa22a3dddd5dfd181f38,2024-06-03T14:46:24.250000
CVE-2024-20068,0,0,2f2abfaa08cd0bdd6c93098c81d84704288eb5ba32b8fc9912c23932a1791695,2024-06-03T14:46:24.250000
CVE-2024-20069,0,1,78cbc94c051d996863509570fb7b0483c8280c3196e606c277f7b98186f4acdc,2024-06-06T03:15:08.747000
CVE-2024-20069,0,0,78cbc94c051d996863509570fb7b0483c8280c3196e606c277f7b98186f4acdc,2024-06-06T03:15:08.747000
CVE-2024-2007,0,0,eaadf0f3a9ed7b4e615e29ccca11af1a4d5565e9ea5b62f105dcbfa87f797ec4,2024-05-17T02:37:59.197000
CVE-2024-20070,0,0,c0742d62ad8c435485d2c646bc6e3664615e7c2cd94b9b30ac32d747aa095c1c,2024-06-03T14:46:24.250000
CVE-2024-20071,0,0,62d9d4142c30c139a3b27f6c0c1aa6c041b330e017e407121ef771b72105502e,2024-06-03T14:46:24.250000
@ -242053,7 +242055,7 @@ CVE-2024-2009,0,0,71459ca320e3ba6a6c331932225f22d43a50dc1f7bd5a77e40fa738dd949ae
CVE-2024-2014,0,0,5960248fb8bbf5de40f54070e9a0bf6ae1851c3dbf1c40767a4c730aca696f9f,2024-05-17T02:37:59.427000
CVE-2024-2015,0,0,4f254a79e909247754188d5f89a636bda7a9c29066bee89e20a1544caa513b84,2024-05-17T02:37:59.517000
CVE-2024-2016,0,0,3f768688e7f1c82234f5951f683936f2d0e621b5ebe8941365eb345dccd68eef,2024-06-04T19:19:12.807000
CVE-2024-2017,1,1,d6d6debe321bcd0c43e6b162f4f1a93fefdd94a6755ed72b1ac2b857513ad9d4,2024-06-06T03:15:08.847000
CVE-2024-2017,0,0,d6d6debe321bcd0c43e6b162f4f1a93fefdd94a6755ed72b1ac2b857513ad9d4,2024-06-06T03:15:08.847000
CVE-2024-2018,0,0,d35c240fd39d286b27481a94e4954ccbe09b47d7acc7f4c0e9843003d15978e5,2024-04-10T13:23:38.787000
CVE-2024-2019,0,0,45ce7201cd9ed050cffb9d1f4dffbf8f77a4772ac3549b7094702a3c37ca6cf3,2024-06-04T16:57:41.053000
CVE-2024-2020,0,0,fae0c240b0782069c1e4908f1890c1c955952a86e3799d8e37b19bbdb6902437,2024-03-13T18:15:58.530000
@ -243960,7 +243962,7 @@ CVE-2024-23492,0,0,91de285aeba2def4f51072f4040716a212510b247857fcd41eeb21376774f
CVE-2024-23493,0,0,91cbf193a715aa0c526237151c4d36164df1ccaf1f366a7cf8bdf551267e12ba,2024-02-29T13:49:29.390000
CVE-2024-23494,0,0,b0caf2085e392cc3bc68ca55116da91c21555e60e2c1de42e26200119e65e7a6,2024-03-22T12:45:36.130000
CVE-2024-23496,0,0,29fb5a470006604a7ccc20bd4735cbedfb46db27a6f8fed0f648af644e626e13,2024-02-26T18:15:07.580000
CVE-2024-2350,1,1,6c6c739916b3c0f2cf86a7c038db039e78be88c5c4e6e9d4f34144f5c45efec8,2024-06-06T02:15:53.237000
CVE-2024-2350,0,0,6c6c739916b3c0f2cf86a7c038db039e78be88c5c4e6e9d4f34144f5c45efec8,2024-06-06T02:15:53.237000
CVE-2024-23500,0,0,b6642b73aef2e4cdba157839c8fde9771818b399a7f64cf89ea1ee42a68c85c1,2024-03-28T12:42:56.150000
CVE-2024-23501,0,0,b3e85809586c989dd0a69f1f88e280acf334973e6408d57bc052ae66513752bd,2024-02-29T13:49:29.390000
CVE-2024-23502,0,0,8f894ed7c8e8f8359294a01d255055a873ed16e9a79e2948ed3ac6f5d8f8da9f,2024-02-09T14:46:17.743000
@ -247614,6 +247616,7 @@ CVE-2024-29216,0,0,59c06798795d05e391cdd301154441d31362295e800c3b46a2b7bd83a3e2d
CVE-2024-29217,0,0,692aac671426b5dcedcd56fb24933db6c5a96f7af1aee50fe065d75a9d19b5cb,2024-05-01T17:15:31.350000
CVE-2024-29218,0,0,671653d28334eb1b29de221436a2464edfec5acf42885adc45ca7b102375c361,2024-04-15T13:15:31.997000
CVE-2024-29219,0,0,4481109cba1c43e8c57c43af416b7ffd0dce43a288900ab9b937cea0ab69c2a2,2024-04-15T13:15:31.997000
CVE-2024-2922,1,1,69b366d29199463eabfeca4ec4865d003c6d5f3c30ef5f39afaaa5a61f259e0d,2024-06-06T04:15:11.673000
CVE-2024-29220,0,0,1b65a8d6c350605472de3d4a64b6e0ccc843853d705695d9c55dd012b24dc815,2024-04-11T12:47:44.137000
CVE-2024-29221,0,0,5b9bc923efd821827e4ccdc23f19bce61ce6bc08809d3d2c26ee85f72d1e2770,2024-04-05T12:40:52.763000
CVE-2024-29225,0,0,a6cc20b79c51246e02458e8af6d1ba48add09d07b0dc74d5ff710efa51c99a1a,2024-04-04T12:48:41.700000
@ -247996,7 +247999,7 @@ CVE-2024-29972,0,0,6eb07d32580185ea51f927f67f2978b808addad4d830734cf44d0e61f642d
CVE-2024-29973,0,0,fed305ac9bbfd8a3bcb05f4012099f51e000b0123ac4db28d9d3e1a93ebbff3b,2024-06-05T04:15:11.330000
CVE-2024-29974,0,0,0fabd0ed87d1a17e2d57c3925a4a991d1b1c401d215c10f3d80cab083de41ead,2024-06-05T06:15:10.657000
CVE-2024-29975,0,0,e1854e5ca81cfeff5d0c1bda31c43cb66e4ccc1d3b700107211d85fe54797d4b,2024-06-05T13:15:12.107000
CVE-2024-29976,0,0,0fa1d772a8223241204b7c64472e90f5c1bb1a92000917507c17fda5770ef8d0,2024-06-04T20:15:10.677000
CVE-2024-29976,0,1,646dcba99621b6f5a0143a0427ded000a4772c76b156357d223032fe7b5e4ddc,2024-06-06T04:15:11.497000
CVE-2024-2998,0,0,eefb5ffb4f4c69125c8918f19ada8e94baebaa500baf95dbd5f811afe3390da3,2024-05-17T02:38:41.883000
CVE-2024-29981,0,0,b762af1b8e0b46a6fed26152fe7346562730b9b9166ba9906ede0af07fe94bd1,2024-05-28T23:15:17.270000
CVE-2024-29982,0,0,64f04207a570cedc766e0c25e46008bcac3eae2a59a1b82cc7357dd602bc9510,2024-04-10T13:24:00.070000
@ -251953,7 +251956,7 @@ CVE-2024-4185,0,0,4997c26f83a14bd54a98f3da542941a3f7d6c6c6777c0f0d023281d709e1d8
CVE-2024-4186,0,0,c459d76d4346b2737077f5ae7b0a1b0ace4353328a79efd93c790decc23cc54f,2024-05-07T13:39:32.710000
CVE-2024-4192,0,0,d6751fa9142aaa91446de5baa4aa2b6db344761a0aff4ab695cf6603148e6a9a,2024-05-01T13:02:20.750000
CVE-2024-4193,0,0,34caa150e2a546168eedf60ed0041c1af9a5a97d1e635e24d38bfff73af8076d,2024-05-14T16:11:39.510000
CVE-2024-4194,1,1,b4a3d33dc3b16633aa216c7013b47f627cdf09898f4a51776aea0b398eb43053,2024-06-06T02:15:53.453000
CVE-2024-4194,0,0,b4a3d33dc3b16633aa216c7013b47f627cdf09898f4a51776aea0b398eb43053,2024-06-06T02:15:53.453000
CVE-2024-4195,0,0,320e8c641dbb71fd3a637ea44d2a1260b2aea61b9d12f44c9e97c80bff500815,2024-04-26T12:58:17.720000
CVE-2024-4198,0,0,845a410de3c7b102462b76b86fccfba72df0a0950e69dc55e9742bae00fec8d9,2024-04-26T12:58:17.720000
CVE-2024-4199,0,0,afdafa31ddacec6eea606de503a440282409912f425fdd165997fbd1146b1fe5,2024-05-15T16:40:19.330000
@ -251964,6 +251967,7 @@ CVE-2024-4204,0,0,b5b0e814a1a205542e0eb5276440679954b3096492a66b2515974ebf51e239
CVE-2024-4205,0,0,3f129ec0db23b7af1da57407fcaa887a58d3c53b22aa7a77bbb6b2ea890345d4,2024-05-31T13:01:46.727000
CVE-2024-4208,0,0,46b12305041a8c6139eb3938f17acbaea3df190f99e69b7dbe6da0ff971df44f,2024-05-15T16:40:19.330000
CVE-2024-4209,0,0,173d5cb49108fafb4e6ca62fca16c9db9e3ef928b93b1435472365368476864c,2024-05-14T16:11:39.510000
CVE-2024-4212,1,1,dfc70e08cc25a2b3b1f74302297ff4f7bbb3b2c413a3c8d4fc2661bca81a9269,2024-06-06T04:15:11.970000
CVE-2024-4213,0,0,42ea90224045d73e2b0e3583ac57d426d05abb547b5044b93cb751055084fa1f,2024-05-14T16:11:39.510000
CVE-2024-4214,0,0,20486a6e70da9590b0bf48d308272f5e2303dba1772619a1d43b68b5a571b06a,2024-05-17T18:35:35.070000
CVE-2024-4215,0,0,0d7dbfaf8275e9ff6c32259712a00cedd32b92104e92991d7893f67c59faf7d0,2024-05-03T12:50:34.250000
@ -252078,6 +252082,7 @@ CVE-2024-4358,0,0,8bbd537c5ea875d2c5ecdfbb7633e029c613e3b42b156894ae15f8f10f6e5a
CVE-2024-4361,0,0,133909e17de135792173cf72624f64f1510a4ce9cc19a57a2e3a0686665955c8,2024-05-21T12:37:59.687000
CVE-2024-4362,0,0,af0fb88b473869224d001344dee6aa8815e25580824ec25d2696d475519ed716,2024-05-22T12:46:53.887000
CVE-2024-4363,0,0,d30828b887305e475a68737a9c01556f9e261cb37bd7c595ea12b948125a2ae0,2024-05-15T16:40:19.330000
CVE-2024-4364,1,1,0c324bc9787091b25c432ca5344d5441452afb79eb240ee348e0ef7f3534b38f,2024-06-06T04:15:12.220000
CVE-2024-4365,0,0,9806433296206bcec148d9648ab2fc91142327d17ef07e64e0ad9e5ff3907a52,2024-05-24T01:15:30.977000
CVE-2024-4366,0,0,c04cea9d73579a737d5c3d200547b1e50e3a1d3ac8e5c0e3a1d88c878c2e9d6a,2024-05-24T13:03:05.093000
CVE-2024-4367,0,0,10c9ba4e2375d81f02eb3145704f99e298b4c446473517eea4810baa65f2c650,2024-05-14T19:17:55.627000
@ -252141,6 +252146,8 @@ CVE-2024-4453,0,0,839eb0feb1010733ba000fd27e8db769e9a1bbb03e913a1271e40ed1ca3d82
CVE-2024-4454,0,0,914a7b9e833666c0b110fe9be947f5b60542326fbbcbbd52692d581f0fc5648b,2024-05-24T01:15:30.977000
CVE-2024-4455,0,0,e18738afbef678c84ea567282093c6582d8247bf14c57fe724fa93ee096ec5c2,2024-05-24T13:03:05.093000
CVE-2024-4456,0,0,43bdd543de001702ca45614b4a3579c52bfa7b188e5cb3e6b81f25f610f74e45,2024-05-08T13:15:00.690000
CVE-2024-4458,1,1,f67bc7a208d418552d927207547249c7bba34258ccf901e515311bb76aa96372,2024-06-06T04:15:12.483000
CVE-2024-4459,1,1,415ba84c8435c056ccb8661bf0ea8f68711ce4ad81557e1ae181cf200d9d545d,2024-06-06T04:15:12.717000
CVE-2024-4461,0,0,ad05f4e37257e33f27f784f842f8dfa34f685ff06dd273bc6842a04c51c93bf6,2024-05-03T12:48:41.067000
CVE-2024-4462,0,0,c8f7490df4b9ef7118fdef5b7ade6db6ae196f6576f8cec5720233f982c7a0b4,2024-06-04T16:57:41.053000
CVE-2024-4463,0,0,aaa5b32073fcbc7160927d348961b4790302ca7b8c414e16cdb6cacefbfd98b3,2024-05-14T16:11:39.510000
@ -252251,6 +252258,7 @@ CVE-2024-4601,0,0,9e1e1f008012e98662e601d1d10e65eeb89abb9d2b4ea828e06c076d042c7c
CVE-2024-4603,0,0,593187637c7acfa4eac78a8706fc86467f2576f06aa1b8b54ad4501e31abefee,2024-05-17T18:36:31.297000
CVE-2024-4605,0,0,953638d724b858b3af29d2158adc8bf0b3f03be99b297e319002baf558be51c5,2024-05-14T16:11:39.510000
CVE-2024-4606,0,0,6a0f9aa1de71c84cf915c091fa2bebebead3ebb4c4bdbaf5b5bc091e1c955edc,2024-05-14T16:11:39.510000
CVE-2024-4608,1,1,4c27578928dd71b2c65a4996258b117429000b043383a87c4b9461c1fe0588f9,2024-06-06T04:15:12.953000
CVE-2024-4609,0,0,c23c3de39dc98d86dc6853d31c2bc52148fecec26ec42d14e3cca3645de4f823,2024-05-17T18:36:31.297000
CVE-2024-4611,0,0,0152495de6f2454e6b1280dd3d20184c586b399950947591d94dfb5475ea0272,2024-05-29T13:02:09.280000
CVE-2024-4614,0,0,beb5630ff5db8a415fa4bf6f109dad49279ea5965bb91a1d7f892cd406978f05,2024-05-14T15:44:12.883000
@ -252307,8 +252315,9 @@ CVE-2024-4699,0,0,21634a770b960d22aa24dc1f0ea343763012f9507287610a68f53780612049
CVE-2024-4700,0,0,fd7d4a078191a1c31b5f2cfdfc5bd65709b727d250ddf2b831fd6aa84ec620ac,2024-05-21T12:37:59.687000
CVE-2024-4701,0,0,31c0f40927cc6a1a9aece611ec4491a5435df4e5c3a9daffc9dfb7710658ca96,2024-05-14T16:11:39.510000
CVE-2024-4702,0,0,391d02c5718dd442c026ca8f3973c4fe10894f8eeb54175158dc44cd7ef50d4a,2024-05-15T16:40:19.330000
CVE-2024-4705,1,1,d25cf3ef7cfb8bf5dc4e954c9ac6e781ccafc588a38781584280ab4510a3f381,2024-06-06T02:15:53.663000
CVE-2024-4705,0,0,d25cf3ef7cfb8bf5dc4e954c9ac6e781ccafc588a38781584280ab4510a3f381,2024-06-06T02:15:53.663000
CVE-2024-4706,0,0,a959e13293b1a5966007eb60c79cb973f34e4d1d8bd1c12986cac54d81ac9a3d,2024-05-24T01:15:30.977000
CVE-2024-4707,1,1,421aba3d9d15a5ac7f14377031ac87bab219e6bcffdc649a6419e5e62801caf8,2024-06-06T04:15:13.213000
CVE-2024-4709,0,0,c27b22c30c2569acd5c758eb82bd584c5ae09da5862ed28e288bc8b8f592259a,2024-05-20T13:00:34.807000
CVE-2024-4710,0,0,500a7d3af356181a474ebd9523b50fd3ae653f9a07ad01e5b7699589bd4ccc5d,2024-05-21T12:37:59.687000
CVE-2024-4711,0,0,5c0c1fdafdfc7c3555551e67a6280882d1277b637b3ccb31a4bc6994c2c7441c,2024-06-03T14:46:24.250000
@ -252362,7 +252371,7 @@ CVE-2024-4777,0,0,871c0aa9bb9189afc5f5526abead12f9f754ed9ce1a10923259013af7abd7d
CVE-2024-4778,0,0,37531b60d89a44d35c14fde25587b4d8cbf891fd39da513ae2adbe2646535312,2024-05-14T19:17:55.627000
CVE-2024-4779,0,0,e93e79f4a86fab8cb11a3f6a53c3afceec1606ec76ba934e81e552f2e4a9a244,2024-05-24T01:15:30.977000
CVE-2024-4783,0,0,daba56adbc0652555be3afeccbdbe190fb7cbe9964b63627bf6508f75d28c65f,2024-05-24T01:15:30.977000
CVE-2024-4788,1,1,e76544cfd4773a2d4539c370c11a6f901454e574d92ff055b281e01009d7ba6f,2024-06-06T02:15:53.860000
CVE-2024-4788,0,0,e76544cfd4773a2d4539c370c11a6f901454e574d92ff055b281e01009d7ba6f,2024-06-06T02:15:53.860000
CVE-2024-4789,0,0,c3ead1522386330c98ef03f50054b683a63e62c43c9e3867ea226ff37f2983a1,2024-05-17T18:35:35.070000
CVE-2024-4790,0,0,9ca82e19e832a950283217f2bfd1db7efd6838c8a8bf54a7d78165e2752eb0b9,2024-05-17T02:40:36.990000
CVE-2024-4791,0,0,bc4ba581266356fcb662bc273060193bcd7412d6015907e518b3ebb2854be230,2024-05-17T02:40:37.090000
@ -252459,7 +252468,7 @@ CVE-2024-4931,0,0,83efd803f055d34e0373b998807732a66d1be28ff93405fe1ae45ba9ee6af2
CVE-2024-4932,0,0,2da4bffdf4d6e38ae009aae9065c7b2f8049c53fc8beaf73dfbb4354175c5b68,2024-05-17T02:40:43.357000
CVE-2024-4933,0,0,9fe90c4f8856bf6bdad48e78d639ea10366bef215c1d0d507cc52649860ab1b1,2024-06-04T19:20:54.643000
CVE-2024-4939,0,0,9b3d9056d0ef1d9ece33bf387a55f6ff5207b427eb3d8aa6eb326ad7a1f5fa3f,2024-06-05T12:53:50.240000
CVE-2024-4942,1,1,6c116bfdb49462d803f56006d3ca8142d185a99abba926032abdc43f497c0f4a,2024-06-06T02:15:54.080000
CVE-2024-4942,0,0,6c116bfdb49462d803f56006d3ca8142d185a99abba926032abdc43f497c0f4a,2024-06-06T02:15:54.080000
CVE-2024-4943,0,0,d9b88319a5992961df806c2aff168607709c5e19495e72269f7fd7790830e1d9,2024-05-21T12:37:59.687000
CVE-2024-4945,0,0,862ec6002e9c3369e40f6935606e597aac95fb1ef3a2f5a2c72d02ef723dafd2,2024-06-04T19:20:54.767000
CVE-2024-4946,0,0,de881559bc92412238785deff68c564cad0647963d61d3efd064c0cec6c4ee1e,2024-06-04T19:20:54.867000
@ -252496,7 +252505,7 @@ CVE-2024-4997,0,0,381fe62c0cd224246ea5324bab3cef489202298d3bb7b0d185aa70d1dc0d5b
CVE-2024-4998,0,0,e12f9512d41da053bcfd5626dd0ee21afd4da3e61146c4f0c8f9da42ca3dff98,2024-05-17T16:15:08.160000
CVE-2024-4999,0,0,1bac5cc77e7ceb1bce6c078fbd59e76f5556984ef2124d365e8638bfa6b6fdfa,2024-05-16T15:44:44.683000
CVE-2024-5000,0,0,21f44bae275ca5e7f3a45da963612f2fb705c74e44c15e2681f54ff4506e6afb,2024-06-04T16:57:41.053000
CVE-2024-5001,1,1,8e0cc1ea37be2b7771e69c694fb0ebecc5c3c0cedfd5a988941255955a03fd8d,2024-06-06T02:15:54.283000
CVE-2024-5001,0,0,8e0cc1ea37be2b7771e69c694fb0ebecc5c3c0cedfd5a988941255955a03fd8d,2024-06-06T02:15:54.283000
CVE-2024-5006,0,0,dd22c8e58768fd94bd48e3be3a4dc52cd3210392642ba6489895072643348644,2024-06-05T12:53:50.240000
CVE-2024-5022,0,0,106355f86b530d1586a5d339031de27a1a2312467a76eb449e8e9901150235d8,2024-05-20T13:00:34.807000
CVE-2024-5023,0,0,974704283893df4cc9d8e0bcce8bb65ebf635268235f75f47c922033893214ce,2024-05-17T18:36:31.297000
@ -252567,6 +252576,7 @@ CVE-2024-5135,0,0,a74f6a753fe0dfdbe9ef14fb62e3c1e241b2d21757276b9c7925f9871c2f34
CVE-2024-5136,0,0,54496e679f22e87b39775a5e450097ff5331534eeddd241fc9a4272c74b45ed9,2024-06-04T19:21:01.267000
CVE-2024-5137,0,0,76e7ce146465303f25f551e768907426737dd0ce95d882fbebb638efe3e073bc,2024-06-04T19:21:01.370000
CVE-2024-5138,0,0,3ed46b06696d079a65e133c6fd95dc6d08f3963b56086a9a24fa821689266527,2024-06-03T14:46:24.250000
CVE-2024-5141,1,1,68fc1d64a8fd2e204fe817c1cd740c801ff7a9f1c8241761944802e94557be3d,2024-06-06T04:15:13.467000
CVE-2024-5142,0,0,9a7d794c7ee50b5ecd06d952c402fab37c046b0a6bb4d29e0c6b11e7df538957,2024-05-24T13:03:05.093000
CVE-2024-5143,0,0,85d2302aa16b15f892bf139ed2f510515c9c051290de1dbf060be25f39190615,2024-05-24T01:15:30.977000
CVE-2024-5144,0,0,3682eb32ab74a69dce2a20f55af124165ad49665bd2dae692d6703bd4728c599,2024-05-31T18:15:13.217000
@ -252574,17 +252584,21 @@ CVE-2024-5145,0,0,0acb7691362a1bc72a9e4e71d498873a314e4674d3384b4bf3903540c5103a
CVE-2024-5147,0,0,f4d57cc5a9319b417b98271562a6c18c09e411a2e24f5685a34653839c587f1d,2024-05-22T12:46:53.887000
CVE-2024-5149,0,0,364802fa270d017fba6f416e3117d6dca3ad93a3eb767f3194b95ff1f96ff814,2024-06-05T12:53:50.240000
CVE-2024-5150,0,0,b6666c6d6ac9830dd3015f5fc02fd79f0a3b63d41ee2e14f8cd76da933186cb1,2024-05-29T13:02:09.280000
CVE-2024-5152,1,1,e6a0cdb7239e1bf1dce12f6af04b749a740b2aa4816cb5875c4d75dc49cc455f,2024-06-06T04:15:13.720000
CVE-2024-5153,1,1,aba940d98129b45e4e759a45de139cd1dcd5b21369749804602fc5af9b4cb397,2024-06-06T04:15:13.950000
CVE-2024-5157,0,0,d1a998bf0d4dfb4fd055882979d4054df97060c8814d4ddde025533b9446aec3,2024-05-22T18:59:20.240000
CVE-2024-5158,0,0,977b7b5952131680dd428eb1410f2d0eff9e1337c54f1532a6f9419cdea73d4c,2024-05-22T18:59:20.240000
CVE-2024-5159,0,0,e38cab9897bbe28b3147c92a1de2a98f85909f9a825751a118b622eb7ce3cc9b,2024-05-22T18:59:20.240000
CVE-2024-5160,0,0,186682202af617fcd5fde94e1dccd429b6dae548d190fed969fd472f14ae0ac3,2024-05-22T18:59:20.240000
CVE-2024-5161,1,1,f66ba2be25090780051aaa038aa572f9ebd28aa1e418771b392666dc4c1c91b5,2024-06-06T04:15:14.217000
CVE-2024-5162,1,1,cce95534386eca768ad34947a7e643d499f7a01f383bb59395357c64f929c70a,2024-06-06T04:15:14.463000
CVE-2024-5165,0,0,1249b447729c1b58db4dd874ebf3238410613919325ce73c31963c57eb2e607f,2024-05-24T01:15:30.977000
CVE-2024-5166,0,0,acd04bdcb3927ae2fc6875213ce44649287d9e14ecc961e10fc982fe1f8beeeb,2024-05-22T18:59:20.240000
CVE-2024-5168,0,0,306ce12eec3dfa604048647f5d45c62ae3c9962c8122be3c41030f354ed300c2,2024-05-24T01:15:30.977000
CVE-2024-5171,0,0,a3da81d81f7a3c483dfcf905163f287af857f8aad3b9fafc4db97a697d360548,2024-06-05T20:15:13.800000
CVE-2024-5176,0,0,d56ed998903dfaef1849b554412c043d7bedaec08a06683735e348a1e4cdd46d,2024-06-05T15:15:12.620000
CVE-2024-5177,0,0,754731e9b12ab9d5b8190add19111b94a5e340744a68664c6a765c48e93c422c,2024-05-24T01:15:30.977000
CVE-2024-5179,1,1,1b58a2732f8a8d8fa6e628942784cc1379ed7149a4b7d5fb2243a48800512c05,2024-06-06T02:15:54.487000
CVE-2024-5179,0,0,1b58a2732f8a8d8fa6e628942784cc1379ed7149a4b7d5fb2243a48800512c05,2024-06-06T02:15:54.487000
CVE-2024-5184,0,0,8b2f6c9a378252db9318617634b3c5d9d6b37c2d0152582d3972dd63de17906b,2024-06-05T18:15:11.993000
CVE-2024-5185,0,0,b5caf3da810dd6351b96bbd5e231331a05f92e8956c63f18c155c13a8af19485,2024-05-29T15:18:26.427000
CVE-2024-5190,0,0,e11755e15485ad7d65ed59ac9abe5cac7f4b4c3e2591d1a6c69b4386ed9dea65,2024-05-22T03:15:08.273000
@ -252603,7 +252617,7 @@ CVE-2024-5218,0,0,928b5f8d4e08afc285c0cf6e370373ec87899b716b1cb4db68027907b01d2a
CVE-2024-5220,0,0,f61a4e43424028e9a9336f6f6ed766295c86a8a5421f6ff87daa2be13ac80d02,2024-05-28T12:39:42.673000
CVE-2024-5222,0,0,e769bb480236b36cbba7fdebb79adf1189e90d39aec093b6e4e34002be122181,2024-06-05T12:53:50.240000
CVE-2024-5223,0,0,8366f6c6b4592ec30854ea2204a3ebdc0b5f6592483a6a57d3251ddc4233fcd1,2024-05-30T13:15:41.297000
CVE-2024-5224,1,1,053d9cb953df4cca5c1d480fd26fabd5416b4fb54774fd7bbc419b94872e1a64,2024-06-06T02:15:54.690000
CVE-2024-5224,0,0,053d9cb953df4cca5c1d480fd26fabd5416b4fb54774fd7bbc419b94872e1a64,2024-06-06T02:15:54.690000
CVE-2024-5227,0,0,9d34b575e4c4193bf3b7e2c70f772c52e473e90eee580d6cd20ca38df9886e09,2024-05-24T01:15:30.977000
CVE-2024-5228,0,0,0a0ae3d586a473bc70cb0721078887f2918e42e82919d39880ecf7432c31100c,2024-05-24T01:15:30.977000
CVE-2024-5229,0,0,5591fcb6917655cbf3944dcd6615ff3ff9ee2f54b68a25aab97dceee478c25ea,2024-05-28T12:39:42.673000
@ -252650,7 +252664,7 @@ CVE-2024-5314,0,0,fb6304ffb5d50ce8724d643a46fad25ba80695f7c0c0eb4ec33a07d41bc498
CVE-2024-5315,0,0,e1b0baaf93d62cf125eea53091da57c404cdf61d625ae810529ebef84e73357d,2024-05-24T13:03:05.093000
CVE-2024-5317,0,0,0e4df649aa2081733cc8377041229cfce850d909b63f156a77d02d6d4c5141bb,2024-06-05T12:53:50.240000
CVE-2024-5318,0,0,812431b83287688611dc496217ea25ba5560744235da04dca7a35239cac1fe9a,2024-05-24T18:09:20.027000
CVE-2024-5324,1,1,d26cf1e929818d3cdca421e9ed490c63699ddd1398c18367847dbcc9acab6063,2024-06-06T02:15:54.890000
CVE-2024-5324,0,0,d26cf1e929818d3cdca421e9ed490c63699ddd1398c18367847dbcc9acab6063,2024-06-06T02:15:54.890000
CVE-2024-5326,0,0,9beaa1147d54b3ae536a6eb0023672ae377946ef8aec317bd58c5324df5850c7,2024-05-30T13:15:41.297000
CVE-2024-5327,0,0,84b1605ed9f8fbbcd152a70275bed021ec8172a393ec025e57c9733c6898763a,2024-05-30T13:15:41.297000
CVE-2024-5336,0,0,c369166950e96ac23803f815e7b4d2b11cfe953eea9e75568f6bd3a698e57d70,2024-06-04T19:21:04.947000
@ -252659,7 +252673,7 @@ CVE-2024-5338,0,0,89168a7f7dbda5d5f11c938f5cea67ca543a537a0633e07e1ea1ce3fb43d8f
CVE-2024-5339,0,0,dff314e9f4c01abbc68b16981f5aeded8be46345bf871723981d333f3ae3b583,2024-06-04T19:21:05.273000
CVE-2024-5340,0,0,b7957b42011f8f774e1db1ddaec566846336d3063a4d70dd9b49754c316b8f99,2024-06-04T19:21:05.373000
CVE-2024-5341,0,0,2b72dd4ef57e598a2469a1d6786a4762ce0fcb8187c35f2f4bd1ff39b4044b7e,2024-05-30T13:15:41.297000
CVE-2024-5342,1,1,26e0706b5dd53df24341fd3c9dfd9d8f4ed189b150edd1e8c5efca7bc950fd4e,2024-06-06T02:15:55.087000
CVE-2024-5342,0,0,26e0706b5dd53df24341fd3c9dfd9d8f4ed189b150edd1e8c5efca7bc950fd4e,2024-06-06T02:15:55.087000
CVE-2024-5345,0,0,4ef09b351c74f9d110d594e3f259309be3bb624b771ff16733d9a7bb289d18d1,2024-05-31T13:01:46.727000
CVE-2024-5347,0,0,9a2a71210aaa051d4636ad0136ca45d374f37b52e66a2ab59e561ff84b7f7ab3,2024-05-31T13:01:46.727000
CVE-2024-5348,0,0,cdabb7de233f48a7127c4333bb3ba86c3b13ada38da5d506ab1226337e3a511b,2024-06-03T14:46:24.250000
@ -252733,6 +252747,7 @@ CVE-2024-5434,0,0,dc2716eb218edba725ac85c17a2930de7a00b6563d0ca53040574106ea0b92
CVE-2024-5436,0,0,95eba267f429de080e9b35fcd14e1e1840b0308e404c32773ec35c18106c7cbc,2024-05-31T13:01:46.727000
CVE-2024-5437,0,0,551b020f0044e3ab584c14f08f0984900b4bc26534c92382eb6ac2bb660708ea,2024-06-04T19:21:09.363000
CVE-2024-5439,0,0,abaad0f03a42ef683e08fa0b9e3df38062d4c8e86744ed6e348d5f6378ac054e,2024-06-05T12:53:50.240000
CVE-2024-5449,1,1,773627a4e9b7ce7854da3a1bdab1a87cb1217791ee4741b55a70b3e9119f77e8,2024-06-06T04:15:14.720000
CVE-2024-5453,0,0,7c8641ed8daae70878106ab21b3cb2696b56b68c7012b2cceeb0fd9522a96b5d,2024-06-05T12:53:50.240000
CVE-2024-5459,0,0,a6cce27e4bb0299dd2bb46d9d34dbfafbced52cf1ffe0ede9ae8efb94d391c96,2024-06-05T13:15:13.437000
CVE-2024-5463,0,0,a83ead02d534db419d64d9a246adc999062f3a690f2d2cbba14bffeb9debf0f5,2024-06-04T16:57:41.053000
@ -252769,7 +252784,9 @@ CVE-2024-5587,0,0,9180b0762a5a5a7a17ce70cd861bdf25e955d88caf903bee442f7c48a0a2a2
CVE-2024-5588,0,0,21589c4423d1fee081cb695dd8009f3bd5a36bd74dae1713c28449f0da1cd8d1,2024-06-04T19:21:10.267000
CVE-2024-5589,0,0,dc63c38434ce5bb089af0d0f8aa09f6a46f1fae34dd45c15f4542741dea047b7,2024-06-03T14:46:24.250000
CVE-2024-5590,0,0,ca60332ff9933405c7b9b37e93d2404b53274b9ec741b4065c0c1eadbd60da94,2024-06-03T14:46:24.250000
CVE-2024-5615,1,1,a6d0e34867dfc41954e48e4a2f34ad9f5238236f85dff6d1cdf3635185a9f202,2024-06-06T04:15:15.010000
CVE-2024-5629,0,0,0300d7d81a2aecc3520dff4d6859e271dcddc80452b174865e98e97ce1d81452,2024-06-05T15:15:12.737000
CVE-2024-5635,0,0,2f4fd95f40cb43c9475682f37f78b479557c0ba40bc4b87c84bd3a410bdbca2c,2024-06-05T12:53:50.240000
CVE-2024-5636,0,0,ae2ff24a8e15c0ed795cb405ff4b68943ed8f15194eed9e4ca4bf581e03cae2a,2024-06-05T12:53:50.240000
CVE-2024-5653,0,0,bda90fa1e35f426f58289868154624d48472d54436ea542dc77fcd4496e1f495,2024-06-05T21:15:15.247000
CVE-2024-5656,1,1,725676261217df265b5d16c4df407014fb560c0237032897a4b92d5811c7ace6,2024-06-06T05:15:49.377000

Can't render this file because it is too large.