From 0272b6bcc7379f8971520803e464aca262e3abcf Mon Sep 17 00:00:00 2001 From: cad-safe-bot Date: Tue, 11 Jun 2024 10:03:11 +0000 Subject: [PATCH] Auto-Update: 2024-06-11T10:00:19.384593+00:00 --- CVE-2020/CVE-2020-118xx/CVE-2020-11843.json | 59 ++++++++++ CVE-2020/CVE-2020-284xx/CVE-2020-28400.json | 26 ++++- CVE-2022/CVE-2022-256xx/CVE-2022-25622.json | 4 +- CVE-2022/CVE-2022-387xx/CVE-2022-38773.json | 8 +- CVE-2022/CVE-2022-437xx/CVE-2022-43716.json | 12 +- CVE-2022/CVE-2022-437xx/CVE-2022-43767.json | 12 +- CVE-2022/CVE-2022-437xx/CVE-2022-43768.json | 12 +- CVE-2022/CVE-2022-461xx/CVE-2022-46144.json | 12 +- CVE-2023/CVE-2023-386xx/CVE-2023-38640.json | 8 +- CVE-2023/CVE-2023-443xx/CVE-2023-44317.json | 6 +- CVE-2023/CVE-2023-443xx/CVE-2023-44318.json | 6 +- CVE-2023/CVE-2023-443xx/CVE-2023-44319.json | 6 +- CVE-2023/CVE-2023-443xx/CVE-2023-44373.json | 6 +- CVE-2023/CVE-2023-443xx/CVE-2023-44374.json | 6 +- CVE-2023/CVE-2023-452xx/CVE-2023-45205.json | 8 +- CVE-2023/CVE-2023-496xx/CVE-2023-49691.json | 8 +- CVE-2024/CVE-2024-232xx/CVE-2024-23251.json | 18 ++- CVE-2024/CVE-2024-232xx/CVE-2024-23282.json | 18 ++- CVE-2024/CVE-2024-277xx/CVE-2024-27796.json | 14 ++- CVE-2024/CVE-2024-277xx/CVE-2024-27798.json | 10 +- CVE-2024/CVE-2024-277xx/CVE-2024-27799.json | 18 ++- CVE-2024/CVE-2024-278xx/CVE-2024-27800.json | 30 ++++- CVE-2024/CVE-2024-278xx/CVE-2024-27801.json | 18 ++- CVE-2024/CVE-2024-278xx/CVE-2024-27802.json | 26 ++++- CVE-2024/CVE-2024-278xx/CVE-2024-27805.json | 30 ++++- CVE-2024/CVE-2024-278xx/CVE-2024-27806.json | 30 ++++- CVE-2024/CVE-2024-278xx/CVE-2024-27807.json | 10 +- CVE-2024/CVE-2024-278xx/CVE-2024-27810.json | 10 +- CVE-2024/CVE-2024-278xx/CVE-2024-27811.json | 18 ++- CVE-2024/CVE-2024-278xx/CVE-2024-27814.json | 6 +- CVE-2024/CVE-2024-278xx/CVE-2024-27815.json | 18 ++- CVE-2024/CVE-2024-278xx/CVE-2024-27817.json | 26 ++++- CVE-2024/CVE-2024-278xx/CVE-2024-27818.json | 6 +- CVE-2024/CVE-2024-278xx/CVE-2024-27819.json | 6 +- CVE-2024/CVE-2024-278xx/CVE-2024-27824.json | 10 +- CVE-2024/CVE-2024-278xx/CVE-2024-27827.json | 6 +- CVE-2024/CVE-2024-278xx/CVE-2024-27828.json | 14 ++- CVE-2024/CVE-2024-278xx/CVE-2024-27831.json | 26 ++++- CVE-2024/CVE-2024-278xx/CVE-2024-27832.json | 18 ++- CVE-2024/CVE-2024-278xx/CVE-2024-27836.json | 10 +- CVE-2024/CVE-2024-278xx/CVE-2024-27840.json | 26 ++++- CVE-2024/CVE-2024-278xx/CVE-2024-27843.json | 10 +- CVE-2024/CVE-2024-278xx/CVE-2024-27844.json | 6 +- CVE-2024/CVE-2024-278xx/CVE-2024-27845.json | 6 +- CVE-2024/CVE-2024-278xx/CVE-2024-27847.json | 14 ++- CVE-2024/CVE-2024-278xx/CVE-2024-27848.json | 10 +- CVE-2024/CVE-2024-278xx/CVE-2024-27855.json | 18 ++- CVE-2024/CVE-2024-278xx/CVE-2024-27857.json | 14 ++- CVE-2024/CVE-2024-278xx/CVE-2024-27885.json | 14 ++- CVE-2024/CVE-2024-42xx/CVE-2024-4266.json | 51 +++++++++ CVE-2024/CVE-2024-55xx/CVE-2024-5531.json | 47 ++++++++ README.md | 46 +++++--- _state.csv | 115 ++++++++++---------- 53 files changed, 846 insertions(+), 126 deletions(-) create mode 100644 CVE-2020/CVE-2020-118xx/CVE-2020-11843.json create mode 100644 CVE-2024/CVE-2024-42xx/CVE-2024-4266.json create mode 100644 CVE-2024/CVE-2024-55xx/CVE-2024-5531.json diff --git a/CVE-2020/CVE-2020-118xx/CVE-2020-11843.json b/CVE-2020/CVE-2020-118xx/CVE-2020-11843.json new file mode 100644 index 00000000000..fb541df6538 --- /dev/null +++ b/CVE-2020/CVE-2020-118xx/CVE-2020-11843.json @@ -0,0 +1,59 @@ +{ + "id": "CVE-2020-11843", + "sourceIdentifier": "security@opentext.com", + "published": "2024-06-11T08:15:48.213", + "lastModified": "2024-06-11T08:15:48.213", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "This allows the information exposure to unauthorized users.\u00a0This issue affects NetIQ Access Manager using version 4.5 or before" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security@opentext.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 6.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "security@opentext.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-200" + } + ] + } + ], + "references": [ + { + "url": "https://www.netiq.com/documentation/access-manager-44/accessmanager444-hf3-release-notes/data/accessmanager444-hf3-release-notes.html", + "source": "security@opentext.com" + }, + { + "url": "https://www.netiq.com/documentation/access-manager-45/accessmanager452-hf1-release-notes/data/accessmanager452-hf1-release-notes.html", + "source": "security@opentext.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2020/CVE-2020-284xx/CVE-2020-28400.json b/CVE-2020/CVE-2020-284xx/CVE-2020-28400.json index 2decdac2988..8e3812c4a1e 100644 --- a/CVE-2020/CVE-2020-284xx/CVE-2020-28400.json +++ b/CVE-2020/CVE-2020-284xx/CVE-2020-28400.json @@ -2,7 +2,7 @@ "id": "CVE-2020-28400", "sourceIdentifier": "productcert@siemens.com", "published": "2021-07-13T11:15:08.960", - "lastModified": "2022-04-12T09:15:10.397", + "lastModified": "2024-06-11T09:15:09.487", "vulnStatus": "Modified", "descriptions": [ { @@ -35,6 +35,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 3.6 + }, + { + "source": "productcert@siemens.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 } ], "cvssMetricV2": [ @@ -2256,6 +2276,10 @@ } ], "references": [ + { + "url": "https://cert-portal.siemens.com/productcert/html/ssa-599968.html", + "source": "productcert@siemens.com" + }, { "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-599968.pdf", "source": "productcert@siemens.com", diff --git a/CVE-2022/CVE-2022-256xx/CVE-2022-25622.json b/CVE-2022/CVE-2022-256xx/CVE-2022-25622.json index 6c267e9a895..524ff1e3833 100644 --- a/CVE-2022/CVE-2022-256xx/CVE-2022-25622.json +++ b/CVE-2022/CVE-2022-256xx/CVE-2022-25622.json @@ -2,12 +2,12 @@ "id": "CVE-2022-25622", "sourceIdentifier": "productcert@siemens.com", "published": "2022-04-12T09:15:14.483", - "lastModified": "2024-05-14T16:15:23.660", + "lastModified": "2024-06-11T09:15:10.623", "vulnStatus": "Modified", "descriptions": [ { "lang": "en", - "value": "A vulnerability has been identified in SIMATIC CFU DIQ (6ES7655-5PX31-1XX0), SIMATIC CFU PA (6ES7655-5PX11-0XX0), SIMATIC ET 200pro IM154-8 PN/DP CPU (6ES7154-8AB01-0AB0), SIMATIC ET 200pro IM154-8F PN/DP CPU (6ES7154-8FB01-0AB0), SIMATIC ET 200pro IM154-8FX PN/DP CPU (6ES7154-8FX00-0AB0), SIMATIC ET 200S IM151-8 PN/DP CPU (6ES7151-8AB01-0AB0), SIMATIC ET 200S IM151-8F PN/DP CPU (6ES7151-8FB01-0AB0), SIMATIC ET200AL IM157-1 PN, SIMATIC ET200ecoPN, AI 8xRTD/TC, M12-L (6ES7144-6JF00-0BB0), SIMATIC ET200ecoPN, CM 4x IO-Link, M12-L (6ES7148-6JE00-0BB0), SIMATIC ET200ecoPN, CM 8x IO-Link, M12-L (6ES7148-6JG00-0BB0), SIMATIC ET200ecoPN, CM 8x IO-Link, M12-L (6ES7148-6JJ00-0BB0), SIMATIC ET200ecoPN, DI 16x24VDC, M12-L (6ES7141-6BH00-0BB0), SIMATIC ET200ecoPN, DI 8x24VDC, M12-L (6ES7141-6BG00-0BB0), SIMATIC ET200ecoPN, DIQ 16x24VDC/2A, M12-L (6ES7143-6BH00-0BB0), SIMATIC ET200ecoPN, DQ 8x24VDC/0,5A, M12-L (6ES7142-6BG00-0BB0), SIMATIC ET200ecoPN, DQ 8x24VDC/2A, M12-L (6ES7142-6BR00-0BB0), SIMATIC ET200MP IM155-5 PN HF (incl. SIPLUS variants), SIMATIC ET200SP IM155-6 MF HF, SIMATIC ET200SP IM155-6 PN HA (incl. SIPLUS variants), SIMATIC ET200SP IM155-6 PN HF (incl. SIPLUS variants), SIMATIC ET200SP IM155-6 PN/2 HF (incl. SIPLUS variants), SIMATIC ET200SP IM155-6 PN/3 HF (incl. SIPLUS variants), SIMATIC PN/MF Coupler (6ES7158-3MU10-0XA0), SIMATIC PN/PN Coupler (6ES7158-3AD10-0XA0), SIMATIC S7-1500 CPU family (incl. related ET200 CPUs and SIPLUS variants), SIMATIC S7-300 CPU 314C-2 PN/DP (6ES7314-6EH04-0AB0), SIMATIC S7-300 CPU 315-2 PN/DP (6ES7315-2EH14-0AB0), SIMATIC S7-300 CPU 315F-2 PN/DP (6ES7315-2FJ14-0AB0), SIMATIC S7-300 CPU 315T-3 PN/DP (6ES7315-7TJ10-0AB0), SIMATIC S7-300 CPU 317-2 PN/DP (6ES7317-2EK14-0AB0), SIMATIC S7-300 CPU 317F-2 PN/DP (6ES7317-2FK14-0AB0), SIMATIC S7-300 CPU 317T-3 PN/DP (6ES7317-7TK10-0AB0), SIMATIC S7-300 CPU 317TF-3 PN/DP (6ES7317-7UL10-0AB0), SIMATIC S7-300 CPU 319-3 PN/DP (6ES7318-3EL01-0AB0), SIMATIC S7-300 CPU 319F-3 PN/DP (6ES7318-3FL01-0AB0), SIMATIC S7-400 CPU 412-2 PN V7 (6ES7412-2EK07-0AB0), SIMATIC S7-400 CPU 414-3 PN/DP V7 (6ES7414-3EM07-0AB0), SIMATIC S7-400 CPU 414F-3 PN/DP V7 (6ES7414-3FM07-0AB0), SIMATIC S7-400 CPU 416-3 PN/DP V7 (6ES7416-3ES07-0AB0), SIMATIC S7-400 CPU 416F-3 PN/DP V7 (6ES7416-3FS07-0AB0), SIMATIC S7-400 H V6 CPU family (incl. SIPLUS variants), SIMATIC S7-410 V10 CPU family (incl. SIPLUS variants), SIMATIC S7-410 V8 CPU family (incl. SIPLUS variants), SIMATIC TDC CP51M1, SIMATIC TDC CPU555, SIMATIC WinAC RTX 2010 (6ES7671-0RC08-0YA0), SIMATIC WinAC RTX F 2010 (6ES7671-1RC08-0YA0), SINAMICS DCM, SINAMICS G110M, SINAMICS G115D, SINAMICS G120 (incl. SIPLUS variants), SINAMICS G130, SINAMICS G150, SINAMICS S110, SINAMICS S120 (incl. SIPLUS variants), SINAMICS S150, SINAMICS S210 (6SL5...), SINAMICS V90, SIPLUS ET 200S IM151-8 PN/DP CPU (6AG1151-8AB01-7AB0), SIPLUS ET 200S IM151-8F PN/DP CPU (6AG1151-8FB01-2AB0), SIPLUS HCS4200 CIM4210 (6BK1942-1AA00-0AA0), SIPLUS HCS4200 CIM4210C (6BK1942-1AA00-0AA1), SIPLUS HCS4300 CIM4310 (6BK1943-1AA00-0AA0), SIPLUS NET PN/PN Coupler (6AG2158-3AD10-4XA0), SIPLUS S7-300 CPU 314C-2 PN/DP (6AG1314-6EH04-7AB0), SIPLUS S7-300 CPU 315-2 PN/DP (6AG1315-2EH14-7AB0), SIPLUS S7-300 CPU 315F-2 PN/DP (6AG1315-2FJ14-2AB0), SIPLUS S7-300 CPU 317-2 PN/DP (6AG1317-2EK14-7AB0), SIPLUS S7-300 CPU 317F-2 PN/DP (6AG1317-2FK14-2AB0), SIPLUS S7-400 CPU 414-3 PN/DP V7 (6AG1414-3EM07-7AB0), SIPLUS S7-400 CPU 416-3 PN/DP V7 (6AG1416-3ES07-7AB0). The PROFINET (PNIO) stack, when integrated with the Interniche IP stack, improperly handles internal resources for TCP segments where the minimum TCP-Header length is less than defined.\n\nThis could allow an attacker to create a denial of service condition for TCP services on affected devices by sending specially crafted TCP segments." + "value": "A vulnerability has been identified in SIMATIC CFU DIQ (6ES7655-5PX31-1XX0), SIMATIC CFU PA (6ES7655-5PX11-0XX0), SIMATIC ET 200AL IM 157-1 PN (6ES7157-1AB00-0AB0), SIMATIC ET 200pro IM154-8 PN/DP CPU (6ES7154-8AB01-0AB0), SIMATIC ET 200pro IM154-8F PN/DP CPU (6ES7154-8FB01-0AB0), SIMATIC ET 200pro IM154-8FX PN/DP CPU (6ES7154-8FX00-0AB0), SIMATIC ET 200S IM151-8 PN/DP CPU (6ES7151-8AB01-0AB0), SIMATIC ET 200S IM151-8F PN/DP CPU (6ES7151-8FB01-0AB0), SIMATIC ET200ecoPN, AI 8xRTD/TC, M12-L (6ES7144-6JF00-0BB0), SIMATIC ET200ecoPN, CM 4x IO-Link, M12-L (6ES7148-6JE00-0BB0), SIMATIC ET200ecoPN, CM 8x IO-Link, M12-L (6ES7148-6JG00-0BB0), SIMATIC ET200ecoPN, CM 8x IO-Link, M12-L (6ES7148-6JJ00-0BB0), SIMATIC ET200ecoPN, DI 16x24VDC, M12-L (6ES7141-6BH00-0BB0), SIMATIC ET200ecoPN, DI 8x24VDC, M12-L (6ES7141-6BG00-0BB0), SIMATIC ET200ecoPN, DIQ 16x24VDC/2A, M12-L (6ES7143-6BH00-0BB0), SIMATIC ET200ecoPN, DQ 8x24VDC/0,5A, M12-L (6ES7142-6BG00-0BB0), SIMATIC ET200ecoPN, DQ 8x24VDC/2A, M12-L (6ES7142-6BR00-0BB0), SIMATIC ET200MP IM155-5 PN HF (incl. SIPLUS variants), SIMATIC ET200SP IM155-6 MF HF, SIMATIC ET200SP IM155-6 PN HA (incl. SIPLUS variants), SIMATIC ET200SP IM155-6 PN HF (incl. SIPLUS variants), SIMATIC ET200SP IM155-6 PN/2 HF (incl. SIPLUS variants), SIMATIC ET200SP IM155-6 PN/3 HF (incl. SIPLUS variants), SIMATIC PN/MF Coupler (6ES7158-3MU10-0XA0), SIMATIC PN/PN Coupler (6ES7158-3AD10-0XA0), SIMATIC S7-1500 CPU family (incl. related ET200 CPUs and SIPLUS variants), SIMATIC S7-300 CPU 314C-2 PN/DP (6ES7314-6EH04-0AB0), SIMATIC S7-300 CPU 315-2 PN/DP (6ES7315-2EH14-0AB0), SIMATIC S7-300 CPU 315F-2 PN/DP (6ES7315-2FJ14-0AB0), SIMATIC S7-300 CPU 315T-3 PN/DP (6ES7315-7TJ10-0AB0), SIMATIC S7-300 CPU 317-2 PN/DP (6ES7317-2EK14-0AB0), SIMATIC S7-300 CPU 317F-2 PN/DP (6ES7317-2FK14-0AB0), SIMATIC S7-300 CPU 317T-3 PN/DP (6ES7317-7TK10-0AB0), SIMATIC S7-300 CPU 317TF-3 PN/DP (6ES7317-7UL10-0AB0), SIMATIC S7-300 CPU 319-3 PN/DP (6ES7318-3EL01-0AB0), SIMATIC S7-300 CPU 319F-3 PN/DP (6ES7318-3FL01-0AB0), SIMATIC S7-400 CPU 412-2 PN V7 (6ES7412-2EK07-0AB0), SIMATIC S7-400 CPU 414-3 PN/DP V7 (6ES7414-3EM07-0AB0), SIMATIC S7-400 CPU 414F-3 PN/DP V7 (6ES7414-3FM07-0AB0), SIMATIC S7-400 CPU 416-3 PN/DP V7 (6ES7416-3ES07-0AB0), SIMATIC S7-400 CPU 416F-3 PN/DP V7 (6ES7416-3FS07-0AB0), SIMATIC S7-400 H V6 CPU family (incl. SIPLUS variants), SIMATIC S7-410 V10 CPU family (incl. SIPLUS variants), SIMATIC S7-410 V8 CPU family (incl. SIPLUS variants), SIMATIC TDC CP51M1, SIMATIC TDC CPU555, SIMATIC WinAC RTX 2010 (6ES7671-0RC08-0YA0), SIMATIC WinAC RTX F 2010 (6ES7671-1RC08-0YA0), SINAMICS DCM, SINAMICS G110M, SINAMICS G115D, SINAMICS G120 (incl. SIPLUS variants), SINAMICS G130, SINAMICS G150, SINAMICS S110, SINAMICS S120 (incl. SIPLUS variants), SINAMICS S150, SINAMICS S210 (6SL5...), SINAMICS V90, SIPLUS ET 200S IM151-8 PN/DP CPU (6AG1151-8AB01-7AB0), SIPLUS ET 200S IM151-8F PN/DP CPU (6AG1151-8FB01-2AB0), SIPLUS HCS4200 CIM4210 (6BK1942-1AA00-0AA0), SIPLUS HCS4200 CIM4210C (6BK1942-1AA00-0AA1), SIPLUS HCS4300 CIM4310 (6BK1943-1AA00-0AA0), SIPLUS NET PN/PN Coupler (6AG2158-3AD10-4XA0), SIPLUS S7-300 CPU 314C-2 PN/DP (6AG1314-6EH04-7AB0), SIPLUS S7-300 CPU 315-2 PN/DP (6AG1315-2EH14-7AB0), SIPLUS S7-300 CPU 315F-2 PN/DP (6AG1315-2FJ14-2AB0), SIPLUS S7-300 CPU 317-2 PN/DP (6AG1317-2EK14-7AB0), SIPLUS S7-300 CPU 317F-2 PN/DP (6AG1317-2FK14-2AB0), SIPLUS S7-400 CPU 414-3 PN/DP V7 (6AG1414-3EM07-7AB0), SIPLUS S7-400 CPU 416-3 PN/DP V7 (6AG1416-3ES07-7AB0). The PROFINET (PNIO) stack, when integrated with the Interniche IP stack, improperly handles internal resources for TCP segments where the minimum TCP-Header length is less than defined.\n\nThis could allow an attacker to create a denial of service condition for TCP services on affected devices by sending specially crafted TCP segments." }, { "lang": "es", diff --git a/CVE-2022/CVE-2022-387xx/CVE-2022-38773.json b/CVE-2022/CVE-2022-387xx/CVE-2022-38773.json index 251679e761a..470b0175c98 100644 --- a/CVE-2022/CVE-2022-387xx/CVE-2022-38773.json +++ b/CVE-2022/CVE-2022-387xx/CVE-2022-38773.json @@ -2,8 +2,8 @@ "id": "CVE-2022-38773", "sourceIdentifier": "productcert@siemens.com", "published": "2023-01-10T12:15:23.103", - "lastModified": "2023-01-13T20:33:20.213", - "vulnStatus": "Analyzed", + "lastModified": "2024-06-11T09:15:11.087", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -1969,6 +1969,10 @@ } ], "references": [ + { + "url": "https://cert-portal.siemens.com/productcert/html/ssa-482757.html", + "source": "productcert@siemens.com" + }, { "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-482757.pdf", "source": "productcert@siemens.com", diff --git a/CVE-2022/CVE-2022-437xx/CVE-2022-43716.json b/CVE-2022/CVE-2022-437xx/CVE-2022-43716.json index c132bdbff39..a4b2c932d2e 100644 --- a/CVE-2022/CVE-2022-437xx/CVE-2022-43716.json +++ b/CVE-2022/CVE-2022-437xx/CVE-2022-43716.json @@ -2,12 +2,12 @@ "id": "CVE-2022-43716", "sourceIdentifier": "productcert@siemens.com", "published": "2023-04-11T10:15:17.467", - "lastModified": "2023-05-09T13:15:15.390", + "lastModified": "2024-06-11T09:15:11.587", "vulnStatus": "Modified", "descriptions": [ { "lang": "en", - "value": "A vulnerability has been identified in SIMATIC CP 1242-7 V2 (All versions), SIMATIC CP 1243-1 (All versions), SIMATIC CP 1243-1 DNP3 (incl. SIPLUS variants) (All versions), SIMATIC CP 1243-1 IEC (incl. SIPLUS variants) (All versions), SIMATIC CP 1243-7 LTE EU (All versions), SIMATIC CP 1243-7 LTE US (All versions), SIMATIC CP 1243-8 IRC (All versions), SIMATIC CP 1542SP-1 (All versions), SIMATIC CP 1542SP-1 IRC (All versions), SIMATIC CP 1543SP-1 (All versions), SIMATIC CP 443-1 (All versions < V3.3), SIMATIC CP 443-1 (All versions < V3.3), SIMATIC CP 443-1 Advanced (All versions < V3.3), SIPLUS ET 200SP CP 1542SP-1 IRC TX RAIL (All versions), SIPLUS ET 200SP CP 1543SP-1 ISEC (All versions), SIPLUS ET 200SP CP 1543SP-1 ISEC TX RAIL (All versions), SIPLUS NET CP 1242-7 V2 (All versions), SIPLUS NET CP 443-1 (All versions < V3.3), SIPLUS NET CP 443-1 Advanced (All versions < V3.3), SIPLUS S7-1200 CP 1243-1 (All versions), SIPLUS S7-1200 CP 1243-1 RAIL (All versions), SIPLUS TIM 1531 IRC (All versions < V2.3.6), TIM 1531 IRC (All versions < V2.3.6). The webserver of the affected products contains a vulnerability that may lead to a denial of service condition. An attacker may cause a denial of service situation which leads to a restart of the webserver of the affected product." + "value": "A vulnerability has been identified in SIMATIC CP 1242-7 V2 (6GK7242-7KX31-0XE0) (All versions), SIMATIC CP 1243-1 (6GK7243-1BX30-0XE0) (All versions), SIMATIC CP 1243-1 DNP3 (incl. SIPLUS variants) (All versions), SIMATIC CP 1243-1 IEC (incl. SIPLUS variants) (All versions), SIMATIC CP 1243-7 LTE EU (6GK7243-7KX30-0XE0) (All versions), SIMATIC CP 1243-7 LTE US (6GK7243-7SX30-0XE0) (All versions), SIMATIC CP 1243-8 IRC (6GK7243-8RX30-0XE0) (All versions), SIMATIC CP 1542SP-1 (6GK7542-6UX00-0XE0) (All versions < V2.3), SIMATIC CP 1542SP-1 IRC (6GK7542-6VX00-0XE0) (All versions < V2.3), SIMATIC CP 1543SP-1 (6GK7543-6WX00-0XE0) (All versions < V2.3), SIMATIC CP 443-1 (6GK7443-1EX30-0XE0) (All versions < V3.3), SIMATIC CP 443-1 (6GK7443-1EX30-0XE1) (All versions < V3.3), SIMATIC CP 443-1 Advanced (6GK7443-1GX30-0XE0) (All versions < V3.3), SIPLUS ET 200SP CP 1542SP-1 IRC TX RAIL (6AG2542-6VX00-4XE0) (All versions < V2.3), SIPLUS ET 200SP CP 1543SP-1 ISEC (6AG1543-6WX00-7XE0) (All versions < V2.3), SIPLUS ET 200SP CP 1543SP-1 ISEC TX RAIL (6AG2543-6WX00-4XE0) (All versions < V2.3), SIPLUS NET CP 1242-7 V2 (6AG1242-7KX31-7XE0) (All versions), SIPLUS NET CP 443-1 (6AG1443-1EX30-4XE0) (All versions < V3.3), SIPLUS NET CP 443-1 Advanced (6AG1443-1GX30-4XE0) (All versions < V3.3), SIPLUS S7-1200 CP 1243-1 (6AG1243-1BX30-2AX0) (All versions), SIPLUS S7-1200 CP 1243-1 RAIL (6AG2243-1BX30-1XE0) (All versions), SIPLUS TIM 1531 IRC (6AG1543-1MX00-7XE0) (All versions < V2.3.6), TIM 1531 IRC (6GK7543-1MX00-0XE0) (All versions < V2.3.6). The webserver of the affected products contains a vulnerability that may lead to a denial of service condition. An attacker may cause a denial of service situation which leads to a restart of the webserver of the affected product." } ], "metrics": { @@ -723,6 +723,14 @@ } ], "references": [ + { + "url": "https://cert-portal.siemens.com/productcert/html/ssa-139628.html", + "source": "productcert@siemens.com" + }, + { + "url": "https://cert-portal.siemens.com/productcert/html/ssa-566905.html", + "source": "productcert@siemens.com" + }, { "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-566905.pdf", "source": "productcert@siemens.com", diff --git a/CVE-2022/CVE-2022-437xx/CVE-2022-43767.json b/CVE-2022/CVE-2022-437xx/CVE-2022-43767.json index a536c249a68..f4816e1d889 100644 --- a/CVE-2022/CVE-2022-437xx/CVE-2022-43767.json +++ b/CVE-2022/CVE-2022-437xx/CVE-2022-43767.json @@ -2,12 +2,12 @@ "id": "CVE-2022-43767", "sourceIdentifier": "productcert@siemens.com", "published": "2023-04-11T10:15:17.540", - "lastModified": "2023-05-09T13:15:15.557", + "lastModified": "2024-06-11T09:15:11.907", "vulnStatus": "Modified", "descriptions": [ { "lang": "en", - "value": "A vulnerability has been identified in SIMATIC CP 1242-7 V2 (All versions), SIMATIC CP 1243-1 (All versions), SIMATIC CP 1243-1 DNP3 (incl. SIPLUS variants) (All versions), SIMATIC CP 1243-1 IEC (incl. SIPLUS variants) (All versions), SIMATIC CP 1243-7 LTE EU (All versions), SIMATIC CP 1243-7 LTE US (All versions), SIMATIC CP 1243-8 IRC (All versions), SIMATIC CP 1542SP-1 (All versions), SIMATIC CP 1542SP-1 IRC (All versions), SIMATIC CP 1543SP-1 (All versions), SIMATIC CP 443-1 (All versions < V3.3), SIMATIC CP 443-1 (All versions < V3.3), SIMATIC CP 443-1 Advanced (All versions < V3.3), SIPLUS ET 200SP CP 1542SP-1 IRC TX RAIL (All versions), SIPLUS ET 200SP CP 1543SP-1 ISEC (All versions), SIPLUS ET 200SP CP 1543SP-1 ISEC TX RAIL (All versions), SIPLUS NET CP 1242-7 V2 (All versions), SIPLUS NET CP 443-1 (All versions < V3.3), SIPLUS NET CP 443-1 Advanced (All versions < V3.3), SIPLUS S7-1200 CP 1243-1 (All versions), SIPLUS S7-1200 CP 1243-1 RAIL (All versions), SIPLUS TIM 1531 IRC (All versions < V2.3.6), TIM 1531 IRC (All versions < V2.3.6). The webserver of the affected products contains a vulnerability that may lead to a denial of service condition. An attacker may cause a denial of service situation of the webserver of the affected product." + "value": "A vulnerability has been identified in SIMATIC CP 1242-7 V2 (6GK7242-7KX31-0XE0) (All versions), SIMATIC CP 1243-1 (6GK7243-1BX30-0XE0) (All versions), SIMATIC CP 1243-1 DNP3 (incl. SIPLUS variants) (All versions), SIMATIC CP 1243-1 IEC (incl. SIPLUS variants) (All versions), SIMATIC CP 1243-7 LTE EU (6GK7243-7KX30-0XE0) (All versions), SIMATIC CP 1243-7 LTE US (6GK7243-7SX30-0XE0) (All versions), SIMATIC CP 1243-8 IRC (6GK7243-8RX30-0XE0) (All versions), SIMATIC CP 1542SP-1 (6GK7542-6UX00-0XE0) (All versions < V2.3), SIMATIC CP 1542SP-1 IRC (6GK7542-6VX00-0XE0) (All versions < V2.3), SIMATIC CP 1543SP-1 (6GK7543-6WX00-0XE0) (All versions < V2.3), SIMATIC CP 443-1 (6GK7443-1EX30-0XE0) (All versions < V3.3), SIMATIC CP 443-1 (6GK7443-1EX30-0XE1) (All versions < V3.3), SIMATIC CP 443-1 Advanced (6GK7443-1GX30-0XE0) (All versions < V3.3), SIPLUS ET 200SP CP 1542SP-1 IRC TX RAIL (6AG2542-6VX00-4XE0) (All versions < V2.3), SIPLUS ET 200SP CP 1543SP-1 ISEC (6AG1543-6WX00-7XE0) (All versions < V2.3), SIPLUS ET 200SP CP 1543SP-1 ISEC TX RAIL (6AG2543-6WX00-4XE0) (All versions < V2.3), SIPLUS NET CP 1242-7 V2 (6AG1242-7KX31-7XE0) (All versions), SIPLUS NET CP 443-1 (6AG1443-1EX30-4XE0) (All versions < V3.3), SIPLUS NET CP 443-1 Advanced (6AG1443-1GX30-4XE0) (All versions < V3.3), SIPLUS S7-1200 CP 1243-1 (6AG1243-1BX30-2AX0) (All versions), SIPLUS S7-1200 CP 1243-1 RAIL (6AG2243-1BX30-1XE0) (All versions), SIPLUS TIM 1531 IRC (6AG1543-1MX00-7XE0) (All versions < V2.3.6), TIM 1531 IRC (6GK7543-1MX00-0XE0) (All versions < V2.3.6). The webserver of the affected products contains a vulnerability that may lead to a denial of service condition. An attacker may cause a denial of service situation of the webserver of the affected product." } ], "metrics": { @@ -713,6 +713,14 @@ } ], "references": [ + { + "url": "https://cert-portal.siemens.com/productcert/html/ssa-139628.html", + "source": "productcert@siemens.com" + }, + { + "url": "https://cert-portal.siemens.com/productcert/html/ssa-566905.html", + "source": "productcert@siemens.com" + }, { "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-566905.pdf", "source": "productcert@siemens.com", diff --git a/CVE-2022/CVE-2022-437xx/CVE-2022-43768.json b/CVE-2022/CVE-2022-437xx/CVE-2022-43768.json index 17ea12886ff..db1ebee8891 100644 --- a/CVE-2022/CVE-2022-437xx/CVE-2022-43768.json +++ b/CVE-2022/CVE-2022-437xx/CVE-2022-43768.json @@ -2,12 +2,12 @@ "id": "CVE-2022-43768", "sourceIdentifier": "productcert@siemens.com", "published": "2023-04-11T10:15:17.617", - "lastModified": "2023-05-09T13:15:15.713", + "lastModified": "2024-06-11T09:15:12.230", "vulnStatus": "Modified", "descriptions": [ { "lang": "en", - "value": "A vulnerability has been identified in SIMATIC CP 1242-7 V2 (All versions), SIMATIC CP 1243-1 (All versions), SIMATIC CP 1243-1 DNP3 (incl. SIPLUS variants) (All versions), SIMATIC CP 1243-1 IEC (incl. SIPLUS variants) (All versions), SIMATIC CP 1243-7 LTE EU (All versions), SIMATIC CP 1243-7 LTE US (All versions), SIMATIC CP 1243-8 IRC (All versions), SIMATIC CP 1542SP-1 (All versions), SIMATIC CP 1542SP-1 IRC (All versions), SIMATIC CP 1543SP-1 (All versions), SIMATIC CP 443-1 (All versions < V3.3), SIMATIC CP 443-1 (All versions < V3.3), SIMATIC CP 443-1 Advanced (All versions < V3.3), SIPLUS ET 200SP CP 1542SP-1 IRC TX RAIL (All versions), SIPLUS ET 200SP CP 1543SP-1 ISEC (All versions), SIPLUS ET 200SP CP 1543SP-1 ISEC TX RAIL (All versions), SIPLUS NET CP 1242-7 V2 (All versions), SIPLUS NET CP 443-1 (All versions < V3.3), SIPLUS NET CP 443-1 Advanced (All versions < V3.3), SIPLUS S7-1200 CP 1243-1 (All versions), SIPLUS S7-1200 CP 1243-1 RAIL (All versions), SIPLUS TIM 1531 IRC (All versions < V2.3.6), TIM 1531 IRC (All versions < V2.3.6). The webserver of the affected products contains a vulnerability that may lead to a denial of service condition. An attacker may cause a denial of service situation of the webserver of the affected product." + "value": "A vulnerability has been identified in SIMATIC CP 1242-7 V2 (6GK7242-7KX31-0XE0) (All versions), SIMATIC CP 1243-1 (6GK7243-1BX30-0XE0) (All versions), SIMATIC CP 1243-1 DNP3 (incl. SIPLUS variants) (All versions), SIMATIC CP 1243-1 IEC (incl. SIPLUS variants) (All versions), SIMATIC CP 1243-7 LTE EU (6GK7243-7KX30-0XE0) (All versions), SIMATIC CP 1243-7 LTE US (6GK7243-7SX30-0XE0) (All versions), SIMATIC CP 1243-8 IRC (6GK7243-8RX30-0XE0) (All versions), SIMATIC CP 1542SP-1 (6GK7542-6UX00-0XE0) (All versions < V2.3), SIMATIC CP 1542SP-1 IRC (6GK7542-6VX00-0XE0) (All versions < V2.3), SIMATIC CP 1543SP-1 (6GK7543-6WX00-0XE0) (All versions < V2.3), SIMATIC CP 443-1 (6GK7443-1EX30-0XE0) (All versions < V3.3), SIMATIC CP 443-1 (6GK7443-1EX30-0XE1) (All versions < V3.3), SIMATIC CP 443-1 Advanced (6GK7443-1GX30-0XE0) (All versions < V3.3), SIPLUS ET 200SP CP 1542SP-1 IRC TX RAIL (6AG2542-6VX00-4XE0) (All versions < V2.3), SIPLUS ET 200SP CP 1543SP-1 ISEC (6AG1543-6WX00-7XE0) (All versions < V2.3), SIPLUS ET 200SP CP 1543SP-1 ISEC TX RAIL (6AG2543-6WX00-4XE0) (All versions < V2.3), SIPLUS NET CP 1242-7 V2 (6AG1242-7KX31-7XE0) (All versions), SIPLUS NET CP 443-1 (6AG1443-1EX30-4XE0) (All versions < V3.3), SIPLUS NET CP 443-1 Advanced (6AG1443-1GX30-4XE0) (All versions < V3.3), SIPLUS S7-1200 CP 1243-1 (6AG1243-1BX30-2AX0) (All versions), SIPLUS S7-1200 CP 1243-1 RAIL (6AG2243-1BX30-1XE0) (All versions), SIPLUS TIM 1531 IRC (6AG1543-1MX00-7XE0) (All versions < V2.3.6), TIM 1531 IRC (6GK7543-1MX00-0XE0) (All versions < V2.3.6). The webserver of the affected products contains a vulnerability that may lead to a denial of service condition. An attacker may cause a denial of service situation of the webserver of the affected product." } ], "metrics": { @@ -703,6 +703,14 @@ } ], "references": [ + { + "url": "https://cert-portal.siemens.com/productcert/html/ssa-139628.html", + "source": "productcert@siemens.com" + }, + { + "url": "https://cert-portal.siemens.com/productcert/html/ssa-566905.html", + "source": "productcert@siemens.com" + }, { "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-566905.pdf", "source": "productcert@siemens.com", diff --git a/CVE-2022/CVE-2022-461xx/CVE-2022-46144.json b/CVE-2022/CVE-2022-461xx/CVE-2022-46144.json index 0729b13e4d4..15c59b8d1f2 100644 --- a/CVE-2022/CVE-2022-461xx/CVE-2022-46144.json +++ b/CVE-2022/CVE-2022-461xx/CVE-2022-46144.json @@ -2,12 +2,12 @@ "id": "CVE-2022-46144", "sourceIdentifier": "productcert@siemens.com", "published": "2022-12-13T16:15:25.200", - "lastModified": "2023-10-10T11:15:10.987", + "lastModified": "2024-06-11T09:15:12.590", "vulnStatus": "Modified", "descriptions": [ { "lang": "en", - "value": "A vulnerability has been identified in SCALANCE SC622-2C (All versions < V2.3), SCALANCE SC622-2C (All versions >= V2.3 < V3.0), SCALANCE SC626-2C (All versions < V2.3), SCALANCE SC626-2C (All versions >= V2.3 < V3.0), SCALANCE SC632-2C (All versions < V2.3), SCALANCE SC632-2C (All versions >= V2.3 < V3.0), SCALANCE SC636-2C (All versions < V2.3), SCALANCE SC636-2C (All versions >= V2.3 < V3.0), SCALANCE SC642-2C (All versions < V2.3), SCALANCE SC642-2C (All versions >= V2.3 < V3.0), SCALANCE SC646-2C (All versions < V2.3), SCALANCE SC646-2C (All versions >= V2.3 < V3.0). Affected devices do not properly process CLI commands after a user forcefully quitted the SSH connection. This could allow an authenticated attacker to make the CLI via SSH or serial interface irresponsive." + "value": "A vulnerability has been identified in SCALANCE SC622-2C (6GK5622-2GS00-2AC2) (All versions < V2.3), SCALANCE SC622-2C (6GK5622-2GS00-2AC2) (All versions >= V2.3 < V3.0), SCALANCE SC626-2C (6GK5626-2GS00-2AC2) (All versions < V2.3), SCALANCE SC626-2C (6GK5626-2GS00-2AC2) (All versions >= V2.3 < V3.0), SCALANCE SC632-2C (6GK5632-2GS00-2AC2) (All versions < V2.3), SCALANCE SC632-2C (6GK5632-2GS00-2AC2) (All versions >= V2.3 < V3.0), SCALANCE SC636-2C (6GK5636-2GS00-2AC2) (All versions < V2.3), SCALANCE SC636-2C (6GK5636-2GS00-2AC2) (All versions >= V2.3 < V3.0), SCALANCE SC642-2C (6GK5642-2GS00-2AC2) (All versions < V2.3), SCALANCE SC642-2C (6GK5642-2GS00-2AC2) (All versions >= V2.3 < V3.0), SCALANCE SC646-2C (6GK5646-2GS00-2AC2) (All versions < V2.3), SCALANCE SC646-2C (6GK5646-2GS00-2AC2) (All versions >= V2.3 < V3.0), SCALANCE WAM763-1 (6GK5763-1AL00-7DA0) (All versions), SCALANCE WAM763-1 (ME) (6GK5763-1AL00-7DC0) (All versions), SCALANCE WAM763-1 (US) (6GK5763-1AL00-7DB0) (All versions), SCALANCE WAM766-1 (EU) (6GK5766-1GE00-7DA0) (All versions), SCALANCE WAM766-1 (ME) (6GK5766-1GE00-7DC0) (All versions), SCALANCE WAM766-1 (US) (6GK5766-1GE00-7DB0) (All versions), SCALANCE WAM766-1 EEC (EU) (6GK5766-1GE00-7TA0) (All versions), SCALANCE WAM766-1 EEC (ME) (6GK5766-1GE00-7TC0) (All versions), SCALANCE WAM766-1 EEC (US) (6GK5766-1GE00-7TB0) (All versions), SCALANCE WUM763-1 (6GK5763-1AL00-3AA0) (All versions), SCALANCE WUM763-1 (6GK5763-1AL00-3DA0) (All versions), SCALANCE WUM763-1 (US) (6GK5763-1AL00-3AB0) (All versions), SCALANCE WUM763-1 (US) (6GK5763-1AL00-3DB0) (All versions), SCALANCE WUM766-1 (EU) (6GK5766-1GE00-3DA0) (All versions), SCALANCE WUM766-1 (ME) (6GK5766-1GE00-3DC0) (All versions), SCALANCE WUM766-1 (US) (6GK5766-1GE00-3DB0) (All versions). Affected devices do not properly process CLI commands after a user forcefully quitted the SSH connection. This could allow an authenticated attacker to make the CLI via SSH or serial interface irresponsive." }, { "lang": "es", @@ -425,6 +425,14 @@ } ], "references": [ + { + "url": "https://cert-portal.siemens.com/productcert/html/ssa-413565.html", + "source": "productcert@siemens.com" + }, + { + "url": "https://cert-portal.siemens.com/productcert/html/ssa-690517.html", + "source": "productcert@siemens.com" + }, { "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-413565.pdf", "source": "productcert@siemens.com", diff --git a/CVE-2023/CVE-2023-386xx/CVE-2023-38640.json b/CVE-2023/CVE-2023-386xx/CVE-2023-38640.json index 37f59445f52..15eac7ca603 100644 --- a/CVE-2023/CVE-2023-386xx/CVE-2023-38640.json +++ b/CVE-2023/CVE-2023-386xx/CVE-2023-38640.json @@ -2,8 +2,8 @@ "id": "CVE-2023-38640", "sourceIdentifier": "productcert@siemens.com", "published": "2023-10-10T11:15:12.063", - "lastModified": "2023-10-14T02:43:46.027", - "vulnStatus": "Analyzed", + "lastModified": "2024-06-11T09:15:13.423", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -90,6 +90,10 @@ } ], "references": [ + { + "url": "https://cert-portal.siemens.com/productcert/html/ssa-035466.html", + "source": "productcert@siemens.com" + }, { "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-035466.pdf", "source": "productcert@siemens.com", diff --git a/CVE-2023/CVE-2023-443xx/CVE-2023-44317.json b/CVE-2023/CVE-2023-443xx/CVE-2023-44317.json index f6ebfbb18a1..24d02988dde 100644 --- a/CVE-2023/CVE-2023-443xx/CVE-2023-44317.json +++ b/CVE-2023/CVE-2023-443xx/CVE-2023-44317.json @@ -2,7 +2,7 @@ "id": "CVE-2023-44317", "sourceIdentifier": "productcert@siemens.com", "published": "2023-11-14T11:15:12.067", - "lastModified": "2024-02-13T09:15:43.880", + "lastModified": "2024-06-11T09:15:13.730", "vulnStatus": "Modified", "descriptions": [ { @@ -1924,6 +1924,10 @@ "url": "https://cert-portal.siemens.com/productcert/html/ssa-602936.html", "source": "productcert@siemens.com" }, + { + "url": "https://cert-portal.siemens.com/productcert/html/ssa-690517.html", + "source": "productcert@siemens.com" + }, { "url": "https://cert-portal.siemens.com/productcert/html/ssa-699386.html", "source": "productcert@siemens.com" diff --git a/CVE-2023/CVE-2023-443xx/CVE-2023-44318.json b/CVE-2023/CVE-2023-443xx/CVE-2023-44318.json index fdfdc28efac..19e1dd51377 100644 --- a/CVE-2023/CVE-2023-443xx/CVE-2023-44318.json +++ b/CVE-2023/CVE-2023-443xx/CVE-2023-44318.json @@ -2,7 +2,7 @@ "id": "CVE-2023-44318", "sourceIdentifier": "productcert@siemens.com", "published": "2023-11-14T11:15:12.287", - "lastModified": "2024-03-12T11:15:46.620", + "lastModified": "2024-06-11T09:15:14.333", "vulnStatus": "Modified", "descriptions": [ { @@ -2069,6 +2069,10 @@ "url": "https://cert-portal.siemens.com/productcert/html/ssa-353002.html", "source": "productcert@siemens.com" }, + { + "url": "https://cert-portal.siemens.com/productcert/html/ssa-690517.html", + "source": "productcert@siemens.com" + }, { "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-180704.pdf", "source": "productcert@siemens.com" diff --git a/CVE-2023/CVE-2023-443xx/CVE-2023-44319.json b/CVE-2023/CVE-2023-443xx/CVE-2023-44319.json index b1cfb0b8dc1..a0308ddc21d 100644 --- a/CVE-2023/CVE-2023-443xx/CVE-2023-44319.json +++ b/CVE-2023/CVE-2023-443xx/CVE-2023-44319.json @@ -2,7 +2,7 @@ "id": "CVE-2023-44319", "sourceIdentifier": "productcert@siemens.com", "published": "2023-11-14T11:15:12.510", - "lastModified": "2024-02-13T09:15:44.103", + "lastModified": "2024-06-11T09:15:14.940", "vulnStatus": "Modified", "descriptions": [ { @@ -2069,6 +2069,10 @@ "url": "https://cert-portal.siemens.com/productcert/html/ssa-602936.html", "source": "productcert@siemens.com" }, + { + "url": "https://cert-portal.siemens.com/productcert/html/ssa-690517.html", + "source": "productcert@siemens.com" + }, { "url": "https://cert-portal.siemens.com/productcert/html/ssa-699386.html", "source": "productcert@siemens.com" diff --git a/CVE-2023/CVE-2023-443xx/CVE-2023-44373.json b/CVE-2023/CVE-2023-443xx/CVE-2023-44373.json index c465c6dc8d4..72cfe2dfde4 100644 --- a/CVE-2023/CVE-2023-443xx/CVE-2023-44373.json +++ b/CVE-2023/CVE-2023-443xx/CVE-2023-44373.json @@ -2,7 +2,7 @@ "id": "CVE-2023-44373", "sourceIdentifier": "productcert@siemens.com", "published": "2023-11-14T11:15:13.417", - "lastModified": "2024-02-13T09:15:44.957", + "lastModified": "2024-06-11T09:15:15.377", "vulnStatus": "Modified", "descriptions": [ { @@ -2049,6 +2049,10 @@ "url": "https://cert-portal.siemens.com/productcert/html/ssa-602936.html", "source": "productcert@siemens.com" }, + { + "url": "https://cert-portal.siemens.com/productcert/html/ssa-690517.html", + "source": "productcert@siemens.com" + }, { "url": "https://cert-portal.siemens.com/productcert/html/ssa-699386.html", "source": "productcert@siemens.com" diff --git a/CVE-2023/CVE-2023-443xx/CVE-2023-44374.json b/CVE-2023/CVE-2023-443xx/CVE-2023-44374.json index 4d9bf281685..70b223c7bc6 100644 --- a/CVE-2023/CVE-2023-443xx/CVE-2023-44374.json +++ b/CVE-2023/CVE-2023-443xx/CVE-2023-44374.json @@ -2,7 +2,7 @@ "id": "CVE-2023-44374", "sourceIdentifier": "productcert@siemens.com", "published": "2023-11-14T11:15:13.753", - "lastModified": "2024-03-12T11:15:47.267", + "lastModified": "2024-06-11T09:15:15.990", "vulnStatus": "Modified", "descriptions": [ { @@ -2065,6 +2065,10 @@ "url": "https://cert-portal.siemens.com/productcert/html/ssa-180704.html", "source": "productcert@siemens.com" }, + { + "url": "https://cert-portal.siemens.com/productcert/html/ssa-690517.html", + "source": "productcert@siemens.com" + }, { "url": "https://cert-portal.siemens.com/productcert/html/ssa-699386.html", "source": "productcert@siemens.com" diff --git a/CVE-2023/CVE-2023-452xx/CVE-2023-45205.json b/CVE-2023/CVE-2023-452xx/CVE-2023-45205.json index 1d984073467..0ebdca04b2b 100644 --- a/CVE-2023/CVE-2023-452xx/CVE-2023-45205.json +++ b/CVE-2023/CVE-2023-452xx/CVE-2023-45205.json @@ -2,8 +2,8 @@ "id": "CVE-2023-45205", "sourceIdentifier": "productcert@siemens.com", "published": "2023-10-10T11:15:13.163", - "lastModified": "2023-10-14T02:24:01.100", - "vulnStatus": "Analyzed", + "lastModified": "2024-06-11T09:15:16.577", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -70,6 +70,10 @@ } ], "references": [ + { + "url": "https://cert-portal.siemens.com/productcert/html/ssa-035466.html", + "source": "productcert@siemens.com" + }, { "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-035466.pdf", "source": "productcert@siemens.com", diff --git a/CVE-2023/CVE-2023-496xx/CVE-2023-49691.json b/CVE-2023/CVE-2023-496xx/CVE-2023-49691.json index 1199b066f24..b7bcf99000c 100644 --- a/CVE-2023/CVE-2023-496xx/CVE-2023-49691.json +++ b/CVE-2023/CVE-2023-496xx/CVE-2023-49691.json @@ -2,12 +2,12 @@ "id": "CVE-2023-49691", "sourceIdentifier": "productcert@siemens.com", "published": "2023-12-12T12:15:15.990", - "lastModified": "2024-02-13T09:15:46.373", + "lastModified": "2024-06-11T09:15:16.840", "vulnStatus": "Modified", "descriptions": [ { "lang": "en", - "value": "A vulnerability has been identified in RUGGEDCOM RM1224 LTE(4G) EU (6GK6108-4AM00-2BA2) (All versions < V8.0), RUGGEDCOM RM1224 LTE(4G) NAM (6GK6108-4AM00-2DA2) (All versions < V8.0), SCALANCE M804PB (6GK5804-0AP00-2AA2) (All versions < V8.0), SCALANCE M812-1 ADSL-Router (Annex A) (6GK5812-1AA00-2AA2) (All versions < V8.0), SCALANCE M812-1 ADSL-Router (Annex B) (6GK5812-1BA00-2AA2) (All versions < V8.0), SCALANCE M816-1 ADSL-Router (Annex A) (6GK5816-1AA00-2AA2) (All versions < V8.0), SCALANCE M816-1 ADSL-Router (Annex B) (6GK5816-1BA00-2AA2) (All versions < V8.0), SCALANCE M826-2 SHDSL-Router (6GK5826-2AB00-2AB2) (All versions < V8.0), SCALANCE M874-2 (6GK5874-2AA00-2AA2) (All versions < V8.0), SCALANCE M874-3 (6GK5874-3AA00-2AA2) (All versions < V8.0), SCALANCE M876-3 (EVDO) (6GK5876-3AA02-2BA2) (All versions < V8.0), SCALANCE M876-3 (ROK) (6GK5876-3AA02-2EA2) (All versions < V8.0), SCALANCE M876-4 (6GK5876-4AA10-2BA2) (All versions < V8.0), SCALANCE M876-4 (EU) (6GK5876-4AA00-2BA2) (All versions < V8.0), SCALANCE M876-4 (NAM) (6GK5876-4AA00-2DA2) (All versions < V8.0), SCALANCE MUM853-1 (EU) (6GK5853-2EA00-2DA1) (All versions < V8.0), SCALANCE MUM856-1 (EU) (6GK5856-2EA00-3DA1) (All versions < V8.0), SCALANCE MUM856-1 (RoW) (6GK5856-2EA00-3AA1) (All versions < V8.0), SCALANCE S615 (6GK5615-0AA00-2AA2) (All versions < V8.0), SCALANCE S615 EEC (6GK5615-0AA01-2AA2) (All versions < V8.0), SCALANCE SC622-2C (6GK5622-2GS00-2AC2) (All versions < V3.0.2), SCALANCE SC626-2C (6GK5626-2GS00-2AC2) (All versions < V3.0.2), SCALANCE SC632-2C (6GK5632-2GS00-2AC2) (All versions < V3.0.2), SCALANCE SC636-2C (6GK5636-2GS00-2AC2) (All versions < V3.0.2), SCALANCE SC642-2C (6GK5642-2GS00-2AC2) (All versions < V3.0.2), SCALANCE SC646-2C (6GK5646-2GS00-2AC2) (All versions < V3.0.2). An Improper Neutralization of Special Elements used in an OS Command with root privileges vulnerability exists in the handling of the DDNS configuration. This could allow malicious local administrators to issue commands on system level after a successful IP address update." + "value": "A vulnerability has been identified in RUGGEDCOM RM1224 LTE(4G) EU (6GK6108-4AM00-2BA2) (All versions < V8.0), RUGGEDCOM RM1224 LTE(4G) NAM (6GK6108-4AM00-2DA2) (All versions < V8.0), SCALANCE M804PB (6GK5804-0AP00-2AA2) (All versions < V8.0), SCALANCE M812-1 ADSL-Router (Annex A) (6GK5812-1AA00-2AA2) (All versions < V8.0), SCALANCE M812-1 ADSL-Router (Annex B) (6GK5812-1BA00-2AA2) (All versions < V8.0), SCALANCE M816-1 ADSL-Router (Annex A) (6GK5816-1AA00-2AA2) (All versions < V8.0), SCALANCE M816-1 ADSL-Router (Annex B) (6GK5816-1BA00-2AA2) (All versions < V8.0), SCALANCE M826-2 SHDSL-Router (6GK5826-2AB00-2AB2) (All versions < V8.0), SCALANCE M874-2 (6GK5874-2AA00-2AA2) (All versions < V8.0), SCALANCE M874-3 (6GK5874-3AA00-2AA2) (All versions < V8.0), SCALANCE M876-3 (EVDO) (6GK5876-3AA02-2BA2) (All versions < V8.0), SCALANCE M876-3 (ROK) (6GK5876-3AA02-2EA2) (All versions < V8.0), SCALANCE M876-4 (6GK5876-4AA10-2BA2) (All versions < V8.0), SCALANCE M876-4 (EU) (6GK5876-4AA00-2BA2) (All versions < V8.0), SCALANCE M876-4 (NAM) (6GK5876-4AA00-2DA2) (All versions < V8.0), SCALANCE MUM853-1 (EU) (6GK5853-2EA00-2DA1) (All versions < V8.0), SCALANCE MUM856-1 (EU) (6GK5856-2EA00-3DA1) (All versions < V8.0), SCALANCE MUM856-1 (RoW) (6GK5856-2EA00-3AA1) (All versions < V8.0), SCALANCE S615 (6GK5615-0AA00-2AA2) (All versions < V8.0), SCALANCE S615 EEC (6GK5615-0AA01-2AA2) (All versions < V8.0), SCALANCE SC622-2C (6GK5622-2GS00-2AC2) (All versions < V3.0.2), SCALANCE SC626-2C (6GK5626-2GS00-2AC2) (All versions < V3.0.2), SCALANCE SC632-2C (6GK5632-2GS00-2AC2) (All versions < V3.0.2), SCALANCE SC636-2C (6GK5636-2GS00-2AC2) (All versions < V3.0.2), SCALANCE SC642-2C (6GK5642-2GS00-2AC2) (All versions < V3.0.2), SCALANCE SC646-2C (6GK5646-2GS00-2AC2) (All versions < V3.0.2), SCALANCE WAM763-1 (6GK5763-1AL00-7DA0) (All versions), SCALANCE WAM763-1 (ME) (6GK5763-1AL00-7DC0) (All versions), SCALANCE WAM763-1 (US) (6GK5763-1AL00-7DB0) (All versions), SCALANCE WAM766-1 (EU) (6GK5766-1GE00-7DA0) (All versions), SCALANCE WAM766-1 (ME) (6GK5766-1GE00-7DC0) (All versions), SCALANCE WAM766-1 (US) (6GK5766-1GE00-7DB0) (All versions), SCALANCE WAM766-1 EEC (EU) (6GK5766-1GE00-7TA0) (All versions), SCALANCE WAM766-1 EEC (ME) (6GK5766-1GE00-7TC0) (All versions), SCALANCE WAM766-1 EEC (US) (6GK5766-1GE00-7TB0) (All versions), SCALANCE WUM763-1 (6GK5763-1AL00-3AA0) (All versions), SCALANCE WUM763-1 (6GK5763-1AL00-3DA0) (All versions), SCALANCE WUM763-1 (US) (6GK5763-1AL00-3AB0) (All versions), SCALANCE WUM763-1 (US) (6GK5763-1AL00-3DB0) (All versions), SCALANCE WUM766-1 (EU) (6GK5766-1GE00-3DA0) (All versions), SCALANCE WUM766-1 (ME) (6GK5766-1GE00-3DC0) (All versions), SCALANCE WUM766-1 (US) (6GK5766-1GE00-3DB0) (All versions). An Improper Neutralization of Special Elements used in an OS Command with root privileges vulnerability exists in the handling of the DDNS configuration. This could allow malicious local administrators to issue commands on system level after a successful IP address update." }, { "lang": "es", @@ -641,6 +641,10 @@ "url": "https://cert-portal.siemens.com/productcert/html/ssa-602936.html", "source": "productcert@siemens.com" }, + { + "url": "https://cert-portal.siemens.com/productcert/html/ssa-690517.html", + "source": "productcert@siemens.com" + }, { "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-180704.pdf", "source": "productcert@siemens.com", diff --git a/CVE-2024/CVE-2024-232xx/CVE-2024-23251.json b/CVE-2024/CVE-2024-232xx/CVE-2024-23251.json index ee16552d564..f9062b1c9c5 100644 --- a/CVE-2024/CVE-2024-232xx/CVE-2024-23251.json +++ b/CVE-2024/CVE-2024-232xx/CVE-2024-23251.json @@ -2,7 +2,7 @@ "id": "CVE-2024-23251", "sourceIdentifier": "product-security@apple.com", "published": "2024-06-10T21:15:49.430", - "lastModified": "2024-06-10T21:15:49.430", + "lastModified": "2024-06-11T08:15:48.553", "vulnStatus": "Received", "descriptions": [ { @@ -27,6 +27,22 @@ { "url": "https://support.apple.com/en-us/HT214106", "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/kb/HT214100", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/kb/HT214101", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/kb/HT214104", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/kb/HT214106", + "source": "product-security@apple.com" } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-232xx/CVE-2024-23282.json b/CVE-2024/CVE-2024-232xx/CVE-2024-23282.json index c7a5238f272..ce07ecaa560 100644 --- a/CVE-2024/CVE-2024-232xx/CVE-2024-23282.json +++ b/CVE-2024/CVE-2024-232xx/CVE-2024-23282.json @@ -2,7 +2,7 @@ "id": "CVE-2024-23282", "sourceIdentifier": "product-security@apple.com", "published": "2024-06-10T21:15:49.503", - "lastModified": "2024-06-10T21:15:49.503", + "lastModified": "2024-06-11T08:15:48.650", "vulnStatus": "Received", "descriptions": [ { @@ -27,6 +27,22 @@ { "url": "https://support.apple.com/en-us/HT214106", "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/kb/HT214100", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/kb/HT214101", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/kb/HT214104", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/kb/HT214106", + "source": "product-security@apple.com" } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-277xx/CVE-2024-27796.json b/CVE-2024/CVE-2024-277xx/CVE-2024-27796.json index 059411428b5..47c89c08668 100644 --- a/CVE-2024/CVE-2024-277xx/CVE-2024-27796.json +++ b/CVE-2024/CVE-2024-277xx/CVE-2024-27796.json @@ -2,7 +2,7 @@ "id": "CVE-2024-27796", "sourceIdentifier": "product-security@apple.com", "published": "2024-05-14T15:13:03.243", - "lastModified": "2024-06-10T18:15:28.577", + "lastModified": "2024-06-11T08:15:48.723", "vulnStatus": "Awaiting Analysis", "descriptions": [ { @@ -32,13 +32,25 @@ "url": "https://support.apple.com/en-us/HT214106", "source": "product-security@apple.com" }, + { + "url": "https://support.apple.com/kb/HT214100", + "source": "product-security@apple.com" + }, { "url": "https://support.apple.com/kb/HT214101", "source": "product-security@apple.com" }, + { + "url": "https://support.apple.com/kb/HT214105", + "source": "product-security@apple.com" + }, { "url": "https://support.apple.com/kb/HT214106", "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/kb/HT214107", + "source": "product-security@apple.com" } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-277xx/CVE-2024-27798.json b/CVE-2024/CVE-2024-277xx/CVE-2024-27798.json index ea9d1f0af08..7f25122d4d2 100644 --- a/CVE-2024/CVE-2024-277xx/CVE-2024-27798.json +++ b/CVE-2024/CVE-2024-277xx/CVE-2024-27798.json @@ -2,7 +2,7 @@ "id": "CVE-2024-27798", "sourceIdentifier": "product-security@apple.com", "published": "2024-05-14T15:13:03.593", - "lastModified": "2024-06-10T18:15:28.640", + "lastModified": "2024-06-11T08:15:48.807", "vulnStatus": "Awaiting Analysis", "descriptions": [ { @@ -24,9 +24,17 @@ "url": "https://support.apple.com/en-us/HT214106", "source": "product-security@apple.com" }, + { + "url": "https://support.apple.com/kb/HT214105", + "source": "product-security@apple.com" + }, { "url": "https://support.apple.com/kb/HT214106", "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/kb/HT214107", + "source": "product-security@apple.com" } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-277xx/CVE-2024-27799.json b/CVE-2024/CVE-2024-277xx/CVE-2024-27799.json index a47d2436f19..2ece241b398 100644 --- a/CVE-2024/CVE-2024-277xx/CVE-2024-27799.json +++ b/CVE-2024/CVE-2024-277xx/CVE-2024-27799.json @@ -2,7 +2,7 @@ "id": "CVE-2024-27799", "sourceIdentifier": "product-security@apple.com", "published": "2024-06-10T21:15:49.607", - "lastModified": "2024-06-10T21:15:49.607", + "lastModified": "2024-06-11T08:15:48.860", "vulnStatus": "Received", "descriptions": [ { @@ -27,6 +27,22 @@ { "url": "https://support.apple.com/en-us/HT214107", "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/kb/HT214100", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/kb/HT214105", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/kb/HT214106", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/kb/HT214107", + "source": "product-security@apple.com" } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-278xx/CVE-2024-27800.json b/CVE-2024/CVE-2024-278xx/CVE-2024-27800.json index fc611bfb4ef..cf74297eb41 100644 --- a/CVE-2024/CVE-2024-278xx/CVE-2024-27800.json +++ b/CVE-2024/CVE-2024-278xx/CVE-2024-27800.json @@ -2,7 +2,7 @@ "id": "CVE-2024-27800", "sourceIdentifier": "product-security@apple.com", "published": "2024-06-10T21:15:49.683", - "lastModified": "2024-06-10T21:15:49.683", + "lastModified": "2024-06-11T08:15:48.930", "vulnStatus": "Received", "descriptions": [ { @@ -44,6 +44,34 @@ "url": "https://support.apple.com/en-us/HT214108", "source": "product-security@apple.com" }, + { + "url": "https://support.apple.com/kb/HT214100", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/kb/HT214101", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/kb/HT214102", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/kb/HT214104", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/kb/HT214105", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/kb/HT214106", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/kb/HT214107", + "source": "product-security@apple.com" + }, { "url": "https://support.apple.com/kb/HT214108", "source": "product-security@apple.com" diff --git a/CVE-2024/CVE-2024-278xx/CVE-2024-27801.json b/CVE-2024/CVE-2024-278xx/CVE-2024-27801.json index 524e8f0e0d0..a212f2c9010 100644 --- a/CVE-2024/CVE-2024-278xx/CVE-2024-27801.json +++ b/CVE-2024/CVE-2024-278xx/CVE-2024-27801.json @@ -2,7 +2,7 @@ "id": "CVE-2024-27801", "sourceIdentifier": "product-security@apple.com", "published": "2024-06-10T21:15:49.770", - "lastModified": "2024-06-10T21:15:49.770", + "lastModified": "2024-06-11T08:15:49.007", "vulnStatus": "Received", "descriptions": [ { @@ -32,6 +32,22 @@ "url": "https://support.apple.com/en-us/HT214108", "source": "product-security@apple.com" }, + { + "url": "https://support.apple.com/kb/HT214101", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/kb/HT214102", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/kb/HT214104", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/kb/HT214106", + "source": "product-security@apple.com" + }, { "url": "https://support.apple.com/kb/HT214108", "source": "product-security@apple.com" diff --git a/CVE-2024/CVE-2024-278xx/CVE-2024-27802.json b/CVE-2024/CVE-2024-278xx/CVE-2024-27802.json index 6f0839ea95d..c111d15f390 100644 --- a/CVE-2024/CVE-2024-278xx/CVE-2024-27802.json +++ b/CVE-2024/CVE-2024-278xx/CVE-2024-27802.json @@ -2,7 +2,7 @@ "id": "CVE-2024-27802", "sourceIdentifier": "product-security@apple.com", "published": "2024-06-10T21:15:49.860", - "lastModified": "2024-06-10T21:15:49.860", + "lastModified": "2024-06-11T08:15:49.077", "vulnStatus": "Received", "descriptions": [ { @@ -40,6 +40,30 @@ "url": "https://support.apple.com/en-us/HT214108", "source": "product-security@apple.com" }, + { + "url": "https://support.apple.com/kb/HT214100", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/kb/HT214101", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/kb/HT214102", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/kb/HT214105", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/kb/HT214106", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/kb/HT214107", + "source": "product-security@apple.com" + }, { "url": "https://support.apple.com/kb/HT214108", "source": "product-security@apple.com" diff --git a/CVE-2024/CVE-2024-278xx/CVE-2024-27805.json b/CVE-2024/CVE-2024-278xx/CVE-2024-27805.json index 2f78ce84f01..7a63c055c75 100644 --- a/CVE-2024/CVE-2024-278xx/CVE-2024-27805.json +++ b/CVE-2024/CVE-2024-278xx/CVE-2024-27805.json @@ -2,7 +2,7 @@ "id": "CVE-2024-27805", "sourceIdentifier": "product-security@apple.com", "published": "2024-06-10T21:15:49.943", - "lastModified": "2024-06-10T21:15:49.943", + "lastModified": "2024-06-11T08:15:49.147", "vulnStatus": "Received", "descriptions": [ { @@ -39,6 +39,34 @@ { "url": "https://support.apple.com/en-us/HT214107", "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/kb/HT214100", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/kb/HT214101", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/kb/HT214102", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/kb/HT214104", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/kb/HT214105", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/kb/HT214106", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/kb/HT214107", + "source": "product-security@apple.com" } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-278xx/CVE-2024-27806.json b/CVE-2024/CVE-2024-278xx/CVE-2024-27806.json index b35619dbb1d..74dfb628457 100644 --- a/CVE-2024/CVE-2024-278xx/CVE-2024-27806.json +++ b/CVE-2024/CVE-2024-278xx/CVE-2024-27806.json @@ -2,7 +2,7 @@ "id": "CVE-2024-27806", "sourceIdentifier": "product-security@apple.com", "published": "2024-06-10T21:15:50.020", - "lastModified": "2024-06-10T21:15:50.020", + "lastModified": "2024-06-11T08:15:49.217", "vulnStatus": "Received", "descriptions": [ { @@ -39,6 +39,34 @@ { "url": "https://support.apple.com/en-us/HT214107", "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/kb/HT214100", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/kb/HT214101", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/kb/HT214102", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/kb/HT214104", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/kb/HT214105", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/kb/HT214106", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/kb/HT214107", + "source": "product-security@apple.com" } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-278xx/CVE-2024-27807.json b/CVE-2024/CVE-2024-278xx/CVE-2024-27807.json index ea77fee1493..d1f3e2461eb 100644 --- a/CVE-2024/CVE-2024-278xx/CVE-2024-27807.json +++ b/CVE-2024/CVE-2024-278xx/CVE-2024-27807.json @@ -2,7 +2,7 @@ "id": "CVE-2024-27807", "sourceIdentifier": "product-security@apple.com", "published": "2024-06-10T21:15:50.093", - "lastModified": "2024-06-10T21:15:50.093", + "lastModified": "2024-06-11T08:15:49.287", "vulnStatus": "Received", "descriptions": [ { @@ -19,6 +19,14 @@ { "url": "https://support.apple.com/en-us/HT214101", "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/kb/HT214100", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/kb/HT214101", + "source": "product-security@apple.com" } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-278xx/CVE-2024-27810.json b/CVE-2024/CVE-2024-278xx/CVE-2024-27810.json index 64f42ace617..ad87afc49d5 100644 --- a/CVE-2024/CVE-2024-278xx/CVE-2024-27810.json +++ b/CVE-2024/CVE-2024-278xx/CVE-2024-27810.json @@ -2,7 +2,7 @@ "id": "CVE-2024-27810", "sourceIdentifier": "product-security@apple.com", "published": "2024-05-14T15:13:04.267", - "lastModified": "2024-06-10T18:15:28.843", + "lastModified": "2024-06-11T08:15:49.350", "vulnStatus": "Awaiting Analysis", "descriptions": [ { @@ -60,9 +60,17 @@ "url": "https://support.apple.com/kb/HT214104", "source": "product-security@apple.com" }, + { + "url": "https://support.apple.com/kb/HT214105", + "source": "product-security@apple.com" + }, { "url": "https://support.apple.com/kb/HT214106", "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/kb/HT214107", + "source": "product-security@apple.com" } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-278xx/CVE-2024-27811.json b/CVE-2024/CVE-2024-278xx/CVE-2024-27811.json index 78d86ae66bd..b3852b8f626 100644 --- a/CVE-2024/CVE-2024-278xx/CVE-2024-27811.json +++ b/CVE-2024/CVE-2024-278xx/CVE-2024-27811.json @@ -2,7 +2,7 @@ "id": "CVE-2024-27811", "sourceIdentifier": "product-security@apple.com", "published": "2024-06-10T21:15:50.230", - "lastModified": "2024-06-10T21:15:50.230", + "lastModified": "2024-06-11T08:15:49.427", "vulnStatus": "Received", "descriptions": [ { @@ -32,6 +32,22 @@ "url": "https://support.apple.com/en-us/HT214108", "source": "product-security@apple.com" }, + { + "url": "https://support.apple.com/kb/HT214101", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/kb/HT214102", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/kb/HT214104", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/kb/HT214106", + "source": "product-security@apple.com" + }, { "url": "https://support.apple.com/kb/HT214108", "source": "product-security@apple.com" diff --git a/CVE-2024/CVE-2024-278xx/CVE-2024-27814.json b/CVE-2024/CVE-2024-278xx/CVE-2024-27814.json index 31819e1977e..e10f634adc9 100644 --- a/CVE-2024/CVE-2024-278xx/CVE-2024-27814.json +++ b/CVE-2024/CVE-2024-278xx/CVE-2024-27814.json @@ -2,7 +2,7 @@ "id": "CVE-2024-27814", "sourceIdentifier": "product-security@apple.com", "published": "2024-06-10T21:15:50.373", - "lastModified": "2024-06-10T21:15:50.373", + "lastModified": "2024-06-11T08:15:49.493", "vulnStatus": "Received", "descriptions": [ { @@ -15,6 +15,10 @@ { "url": "https://support.apple.com/en-us/HT214104", "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/kb/HT214104", + "source": "product-security@apple.com" } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-278xx/CVE-2024-27815.json b/CVE-2024/CVE-2024-278xx/CVE-2024-27815.json index 8386ef2417d..b052c2d3ab0 100644 --- a/CVE-2024/CVE-2024-278xx/CVE-2024-27815.json +++ b/CVE-2024/CVE-2024-278xx/CVE-2024-27815.json @@ -2,7 +2,7 @@ "id": "CVE-2024-27815", "sourceIdentifier": "product-security@apple.com", "published": "2024-06-10T21:15:50.440", - "lastModified": "2024-06-10T21:15:50.440", + "lastModified": "2024-06-11T08:15:49.553", "vulnStatus": "Received", "descriptions": [ { @@ -32,6 +32,22 @@ "url": "https://support.apple.com/en-us/HT214108", "source": "product-security@apple.com" }, + { + "url": "https://support.apple.com/kb/HT214101", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/kb/HT214102", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/kb/HT214104", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/kb/HT214106", + "source": "product-security@apple.com" + }, { "url": "https://support.apple.com/kb/HT214108", "source": "product-security@apple.com" diff --git a/CVE-2024/CVE-2024-278xx/CVE-2024-27817.json b/CVE-2024/CVE-2024-278xx/CVE-2024-27817.json index 705ec0d973c..74047522709 100644 --- a/CVE-2024/CVE-2024-278xx/CVE-2024-27817.json +++ b/CVE-2024/CVE-2024-278xx/CVE-2024-27817.json @@ -2,7 +2,7 @@ "id": "CVE-2024-27817", "sourceIdentifier": "product-security@apple.com", "published": "2024-06-10T21:15:50.547", - "lastModified": "2024-06-10T21:15:50.547", + "lastModified": "2024-06-11T08:15:49.630", "vulnStatus": "Received", "descriptions": [ { @@ -40,6 +40,30 @@ "url": "https://support.apple.com/en-us/HT214108", "source": "product-security@apple.com" }, + { + "url": "https://support.apple.com/kb/HT214100", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/kb/HT214101", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/kb/HT214102", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/kb/HT214105", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/kb/HT214106", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/kb/HT214107", + "source": "product-security@apple.com" + }, { "url": "https://support.apple.com/kb/HT214108", "source": "product-security@apple.com" diff --git a/CVE-2024/CVE-2024-278xx/CVE-2024-27818.json b/CVE-2024/CVE-2024-278xx/CVE-2024-27818.json index 59fb897cc0b..7e6e0ddf0f4 100644 --- a/CVE-2024/CVE-2024-278xx/CVE-2024-27818.json +++ b/CVE-2024/CVE-2024-278xx/CVE-2024-27818.json @@ -2,7 +2,7 @@ "id": "CVE-2024-27818", "sourceIdentifier": "product-security@apple.com", "published": "2024-05-14T15:13:05.047", - "lastModified": "2024-06-10T18:15:29.033", + "lastModified": "2024-06-11T08:15:49.700", "vulnStatus": "Awaiting Analysis", "descriptions": [ { @@ -32,6 +32,10 @@ "url": "https://support.apple.com/en-us/HT214106", "source": "product-security@apple.com" }, + { + "url": "https://support.apple.com/kb/HT214100", + "source": "product-security@apple.com" + }, { "url": "https://support.apple.com/kb/HT214101", "source": "product-security@apple.com" diff --git a/CVE-2024/CVE-2024-278xx/CVE-2024-27819.json b/CVE-2024/CVE-2024-278xx/CVE-2024-27819.json index d40abe765a4..1735aba68bf 100644 --- a/CVE-2024/CVE-2024-278xx/CVE-2024-27819.json +++ b/CVE-2024/CVE-2024-278xx/CVE-2024-27819.json @@ -2,7 +2,7 @@ "id": "CVE-2024-27819", "sourceIdentifier": "product-security@apple.com", "published": "2024-06-10T21:15:50.623", - "lastModified": "2024-06-10T21:15:50.623", + "lastModified": "2024-06-11T08:15:49.770", "vulnStatus": "Received", "descriptions": [ { @@ -15,6 +15,10 @@ { "url": "https://support.apple.com/en-us/HT214101", "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/kb/HT214101", + "source": "product-security@apple.com" } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-278xx/CVE-2024-27824.json b/CVE-2024/CVE-2024-278xx/CVE-2024-27824.json index 88478343781..0c8ce6b5d21 100644 --- a/CVE-2024/CVE-2024-278xx/CVE-2024-27824.json +++ b/CVE-2024/CVE-2024-278xx/CVE-2024-27824.json @@ -2,7 +2,7 @@ "id": "CVE-2024-27824", "sourceIdentifier": "product-security@apple.com", "published": "2024-05-14T15:13:05.807", - "lastModified": "2024-06-10T18:15:29.213", + "lastModified": "2024-06-11T08:15:49.830", "vulnStatus": "Awaiting Analysis", "descriptions": [ { @@ -24,9 +24,17 @@ "url": "https://support.apple.com/en-us/HT214106", "source": "product-security@apple.com" }, + { + "url": "https://support.apple.com/kb/HT214105", + "source": "product-security@apple.com" + }, { "url": "https://support.apple.com/kb/HT214106", "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/kb/HT214107", + "source": "product-security@apple.com" } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-278xx/CVE-2024-27827.json b/CVE-2024/CVE-2024-278xx/CVE-2024-27827.json index ce1498ed89a..3a1bd5a6b48 100644 --- a/CVE-2024/CVE-2024-278xx/CVE-2024-27827.json +++ b/CVE-2024/CVE-2024-278xx/CVE-2024-27827.json @@ -2,7 +2,7 @@ "id": "CVE-2024-27827", "sourceIdentifier": "product-security@apple.com", "published": "2024-05-14T15:13:06.363", - "lastModified": "2024-06-10T18:15:29.320", + "lastModified": "2024-06-11T08:15:49.890", "vulnStatus": "Awaiting Analysis", "descriptions": [ { @@ -27,6 +27,10 @@ { "url": "https://support.apple.com/kb/HT214106", "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/kb/HT214107", + "source": "product-security@apple.com" } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-278xx/CVE-2024-27828.json b/CVE-2024/CVE-2024-278xx/CVE-2024-27828.json index 13f33b4fc8c..1db8984c2f5 100644 --- a/CVE-2024/CVE-2024-278xx/CVE-2024-27828.json +++ b/CVE-2024/CVE-2024-278xx/CVE-2024-27828.json @@ -2,7 +2,7 @@ "id": "CVE-2024-27828", "sourceIdentifier": "product-security@apple.com", "published": "2024-06-10T21:15:50.773", - "lastModified": "2024-06-10T21:15:50.773", + "lastModified": "2024-06-11T08:15:49.950", "vulnStatus": "Received", "descriptions": [ { @@ -28,6 +28,18 @@ "url": "https://support.apple.com/en-us/HT214108", "source": "product-security@apple.com" }, + { + "url": "https://support.apple.com/kb/HT214101", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/kb/HT214102", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/kb/HT214104", + "source": "product-security@apple.com" + }, { "url": "https://support.apple.com/kb/HT214108", "source": "product-security@apple.com" diff --git a/CVE-2024/CVE-2024-278xx/CVE-2024-27831.json b/CVE-2024/CVE-2024-278xx/CVE-2024-27831.json index f08734ff3a3..68bd5e27793 100644 --- a/CVE-2024/CVE-2024-278xx/CVE-2024-27831.json +++ b/CVE-2024/CVE-2024-278xx/CVE-2024-27831.json @@ -2,7 +2,7 @@ "id": "CVE-2024-27831", "sourceIdentifier": "product-security@apple.com", "published": "2024-06-10T21:15:50.927", - "lastModified": "2024-06-10T21:15:50.927", + "lastModified": "2024-06-11T08:15:50.017", "vulnStatus": "Received", "descriptions": [ { @@ -40,6 +40,30 @@ "url": "https://support.apple.com/en-us/HT214108", "source": "product-security@apple.com" }, + { + "url": "https://support.apple.com/kb/HT214100", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/kb/HT214101", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/kb/HT214102", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/kb/HT214105", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/kb/HT214106", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/kb/HT214107", + "source": "product-security@apple.com" + }, { "url": "https://support.apple.com/kb/HT214108", "source": "product-security@apple.com" diff --git a/CVE-2024/CVE-2024-278xx/CVE-2024-27832.json b/CVE-2024/CVE-2024-278xx/CVE-2024-27832.json index 335610f99d4..9dc657bea2b 100644 --- a/CVE-2024/CVE-2024-278xx/CVE-2024-27832.json +++ b/CVE-2024/CVE-2024-278xx/CVE-2024-27832.json @@ -2,7 +2,7 @@ "id": "CVE-2024-27832", "sourceIdentifier": "product-security@apple.com", "published": "2024-06-10T21:15:51.007", - "lastModified": "2024-06-10T21:15:51.007", + "lastModified": "2024-06-11T08:15:50.127", "vulnStatus": "Received", "descriptions": [ { @@ -32,6 +32,22 @@ "url": "https://support.apple.com/en-us/HT214108", "source": "product-security@apple.com" }, + { + "url": "https://support.apple.com/kb/HT214101", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/kb/HT214102", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/kb/HT214104", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/kb/HT214106", + "source": "product-security@apple.com" + }, { "url": "https://support.apple.com/kb/HT214108", "source": "product-security@apple.com" diff --git a/CVE-2024/CVE-2024-278xx/CVE-2024-27836.json b/CVE-2024/CVE-2024-278xx/CVE-2024-27836.json index 7dcca1a39e9..79620cb5319 100644 --- a/CVE-2024/CVE-2024-278xx/CVE-2024-27836.json +++ b/CVE-2024/CVE-2024-278xx/CVE-2024-27836.json @@ -2,7 +2,7 @@ "id": "CVE-2024-27836", "sourceIdentifier": "product-security@apple.com", "published": "2024-06-10T21:15:51.167", - "lastModified": "2024-06-10T21:15:51.167", + "lastModified": "2024-06-11T08:15:50.193", "vulnStatus": "Received", "descriptions": [ { @@ -24,6 +24,14 @@ "url": "https://support.apple.com/en-us/HT214108", "source": "product-security@apple.com" }, + { + "url": "https://support.apple.com/kb/HT214101", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/kb/HT214106", + "source": "product-security@apple.com" + }, { "url": "https://support.apple.com/kb/HT214108", "source": "product-security@apple.com" diff --git a/CVE-2024/CVE-2024-278xx/CVE-2024-27840.json b/CVE-2024/CVE-2024-278xx/CVE-2024-27840.json index 2bff8db99e3..209c8967ff1 100644 --- a/CVE-2024/CVE-2024-278xx/CVE-2024-27840.json +++ b/CVE-2024/CVE-2024-278xx/CVE-2024-27840.json @@ -2,7 +2,7 @@ "id": "CVE-2024-27840", "sourceIdentifier": "product-security@apple.com", "published": "2024-06-10T21:15:51.313", - "lastModified": "2024-06-10T21:15:51.313", + "lastModified": "2024-06-11T08:15:50.260", "vulnStatus": "Received", "descriptions": [ { @@ -40,6 +40,30 @@ "url": "https://support.apple.com/en-us/HT214108", "source": "product-security@apple.com" }, + { + "url": "https://support.apple.com/kb/HT214100", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/kb/HT214101", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/kb/HT214102", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/kb/HT214104", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/kb/HT214105", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/kb/HT214107", + "source": "product-security@apple.com" + }, { "url": "https://support.apple.com/kb/HT214108", "source": "product-security@apple.com" diff --git a/CVE-2024/CVE-2024-278xx/CVE-2024-27843.json b/CVE-2024/CVE-2024-278xx/CVE-2024-27843.json index 4e0b0d08c34..0acf706ec40 100644 --- a/CVE-2024/CVE-2024-278xx/CVE-2024-27843.json +++ b/CVE-2024/CVE-2024-278xx/CVE-2024-27843.json @@ -2,7 +2,7 @@ "id": "CVE-2024-27843", "sourceIdentifier": "product-security@apple.com", "published": "2024-05-14T15:13:08.437", - "lastModified": "2024-06-10T18:15:29.790", + "lastModified": "2024-06-11T08:15:50.327", "vulnStatus": "Awaiting Analysis", "descriptions": [ { @@ -24,9 +24,17 @@ "url": "https://support.apple.com/en-us/HT214106", "source": "product-security@apple.com" }, + { + "url": "https://support.apple.com/kb/HT214105", + "source": "product-security@apple.com" + }, { "url": "https://support.apple.com/kb/HT214106", "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/kb/HT214107", + "source": "product-security@apple.com" } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-278xx/CVE-2024-27844.json b/CVE-2024/CVE-2024-278xx/CVE-2024-27844.json index b8be4d43714..8ab809e63e7 100644 --- a/CVE-2024/CVE-2024-278xx/CVE-2024-27844.json +++ b/CVE-2024/CVE-2024-278xx/CVE-2024-27844.json @@ -2,7 +2,7 @@ "id": "CVE-2024-27844", "sourceIdentifier": "product-security@apple.com", "published": "2024-06-10T21:15:51.390", - "lastModified": "2024-06-10T21:15:51.390", + "lastModified": "2024-06-11T08:15:50.390", "vulnStatus": "Received", "descriptions": [ { @@ -24,6 +24,10 @@ "url": "https://support.apple.com/en-us/HT214108", "source": "product-security@apple.com" }, + { + "url": "https://support.apple.com/kb/HT214106", + "source": "product-security@apple.com" + }, { "url": "https://support.apple.com/kb/HT214108", "source": "product-security@apple.com" diff --git a/CVE-2024/CVE-2024-278xx/CVE-2024-27845.json b/CVE-2024/CVE-2024-278xx/CVE-2024-27845.json index 529121207df..abbe6b0e3f0 100644 --- a/CVE-2024/CVE-2024-278xx/CVE-2024-27845.json +++ b/CVE-2024/CVE-2024-278xx/CVE-2024-27845.json @@ -2,7 +2,7 @@ "id": "CVE-2024-27845", "sourceIdentifier": "product-security@apple.com", "published": "2024-06-10T21:15:51.467", - "lastModified": "2024-06-10T21:15:51.467", + "lastModified": "2024-06-11T08:15:50.457", "vulnStatus": "Received", "descriptions": [ { @@ -15,6 +15,10 @@ { "url": "https://support.apple.com/en-us/HT214101", "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/kb/HT214101", + "source": "product-security@apple.com" } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-278xx/CVE-2024-27847.json b/CVE-2024/CVE-2024-278xx/CVE-2024-27847.json index 493a278d077..58725f1ab2a 100644 --- a/CVE-2024/CVE-2024-278xx/CVE-2024-27847.json +++ b/CVE-2024/CVE-2024-278xx/CVE-2024-27847.json @@ -2,7 +2,7 @@ "id": "CVE-2024-27847", "sourceIdentifier": "product-security@apple.com", "published": "2024-05-14T15:13:08.743", - "lastModified": "2024-06-10T18:15:29.840", + "lastModified": "2024-06-11T08:15:50.523", "vulnStatus": "Awaiting Analysis", "descriptions": [ { @@ -32,13 +32,25 @@ "url": "https://support.apple.com/en-us/HT214106", "source": "product-security@apple.com" }, + { + "url": "https://support.apple.com/kb/HT214100", + "source": "product-security@apple.com" + }, { "url": "https://support.apple.com/kb/HT214101", "source": "product-security@apple.com" }, + { + "url": "https://support.apple.com/kb/HT214105", + "source": "product-security@apple.com" + }, { "url": "https://support.apple.com/kb/HT214106", "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/kb/HT214107", + "source": "product-security@apple.com" } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-278xx/CVE-2024-27848.json b/CVE-2024/CVE-2024-278xx/CVE-2024-27848.json index b877bde9cee..dbc6d7ee4f5 100644 --- a/CVE-2024/CVE-2024-278xx/CVE-2024-27848.json +++ b/CVE-2024/CVE-2024-278xx/CVE-2024-27848.json @@ -2,7 +2,7 @@ "id": "CVE-2024-27848", "sourceIdentifier": "product-security@apple.com", "published": "2024-06-10T21:15:51.530", - "lastModified": "2024-06-10T21:15:51.530", + "lastModified": "2024-06-11T08:15:50.593", "vulnStatus": "Received", "descriptions": [ { @@ -19,6 +19,14 @@ { "url": "https://support.apple.com/en-us/HT214106", "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/kb/HT214101", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/kb/HT214106", + "source": "product-security@apple.com" } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-278xx/CVE-2024-27855.json b/CVE-2024/CVE-2024-278xx/CVE-2024-27855.json index 3992ddd4e49..f788f7d5139 100644 --- a/CVE-2024/CVE-2024-278xx/CVE-2024-27855.json +++ b/CVE-2024/CVE-2024-278xx/CVE-2024-27855.json @@ -2,7 +2,7 @@ "id": "CVE-2024-27855", "sourceIdentifier": "product-security@apple.com", "published": "2024-06-10T21:15:51.753", - "lastModified": "2024-06-10T21:15:51.753", + "lastModified": "2024-06-11T08:15:50.653", "vulnStatus": "Received", "descriptions": [ { @@ -27,6 +27,22 @@ { "url": "https://support.apple.com/en-us/HT214107", "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/kb/HT214100", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/kb/HT214101", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/kb/HT214106", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/kb/HT214107", + "source": "product-security@apple.com" } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-278xx/CVE-2024-27857.json b/CVE-2024/CVE-2024-278xx/CVE-2024-27857.json index 6cda89932e8..e57f41a15da 100644 --- a/CVE-2024/CVE-2024-278xx/CVE-2024-27857.json +++ b/CVE-2024/CVE-2024-278xx/CVE-2024-27857.json @@ -2,7 +2,7 @@ "id": "CVE-2024-27857", "sourceIdentifier": "product-security@apple.com", "published": "2024-06-10T21:15:51.833", - "lastModified": "2024-06-10T21:15:51.833", + "lastModified": "2024-06-11T08:15:50.720", "vulnStatus": "Received", "descriptions": [ { @@ -28,6 +28,18 @@ "url": "https://support.apple.com/en-us/HT214108", "source": "product-security@apple.com" }, + { + "url": "https://support.apple.com/kb/HT214101", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/kb/HT214102", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/kb/HT214106", + "source": "product-security@apple.com" + }, { "url": "https://support.apple.com/kb/HT214108", "source": "product-security@apple.com" diff --git a/CVE-2024/CVE-2024-278xx/CVE-2024-27885.json b/CVE-2024/CVE-2024-278xx/CVE-2024-27885.json index 7c19d25bab7..c9ff724f16c 100644 --- a/CVE-2024/CVE-2024-278xx/CVE-2024-27885.json +++ b/CVE-2024/CVE-2024-278xx/CVE-2024-27885.json @@ -2,7 +2,7 @@ "id": "CVE-2024-27885", "sourceIdentifier": "product-security@apple.com", "published": "2024-06-10T21:15:51.903", - "lastModified": "2024-06-10T21:15:51.903", + "lastModified": "2024-06-11T08:15:50.787", "vulnStatus": "Received", "descriptions": [ { @@ -23,6 +23,18 @@ { "url": "https://support.apple.com/en-us/HT214107", "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/kb/HT214105", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/kb/HT214106", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/kb/HT214107", + "source": "product-security@apple.com" } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-42xx/CVE-2024-4266.json b/CVE-2024/CVE-2024-42xx/CVE-2024-4266.json new file mode 100644 index 00000000000..4535897dd6f --- /dev/null +++ b/CVE-2024/CVE-2024-42xx/CVE-2024-4266.json @@ -0,0 +1,51 @@ +{ + "id": "CVE-2024-4266", + "sourceIdentifier": "security@wordfence.com", + "published": "2024-06-11T08:15:50.850", + "lastModified": "2024-06-11T08:15:50.850", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "The MetForm \u2013 Contact Form, Survey, Quiz, & Custom Form Builder for Elementor plugin for WordPress is vulnerable to Sensitive Information Exposure in versions up to, and including, 3.8.8 via the 'handle_file' function. This can allow unauthenticated attackers to extract sensitive data, such as Personally Identifiable Information, from files uploaded by users." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security@wordfence.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 5.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 + } + ] + }, + "references": [ + { + "url": "https://plugins.trac.wordpress.org/browser/metform/trunk/core/entries/action.php#L1019", + "source": "security@wordfence.com" + }, + { + "url": "https://plugins.trac.wordpress.org/changeset/3099977/", + "source": "security@wordfence.com" + }, + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/8edb72f5-dda3-4c59-ba7a-7a460cb59c03?source=cve", + "source": "security@wordfence.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-55xx/CVE-2024-5531.json b/CVE-2024/CVE-2024-55xx/CVE-2024-5531.json new file mode 100644 index 00000000000..e399f2491a0 --- /dev/null +++ b/CVE-2024/CVE-2024-55xx/CVE-2024-5531.json @@ -0,0 +1,47 @@ +{ + "id": "CVE-2024-5531", + "sourceIdentifier": "security@wordfence.com", + "published": "2024-06-11T09:15:17.273", + "lastModified": "2024-06-11T09:15:17.273", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "The Ocean Extra plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the Flickr widget in all versions up to, and including, 2.2.8 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security@wordfence.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 6.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 3.1, + "impactScore": 2.7 + } + ] + }, + "references": [ + { + "url": "https://plugins.trac.wordpress.org/browser/ocean-extra/tags/2.2.8/includes/widgets/flickr.php#L59", + "source": "security@wordfence.com" + }, + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/b39e17c5-711f-4229-90f4-213ea65a190d?source=cve", + "source": "security@wordfence.com" + } + ] +} \ No newline at end of file diff --git a/README.md b/README.md index fa33ab94614..c7736dd75f9 100644 --- a/README.md +++ b/README.md @@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2024-06-11T08:00:25.665847+00:00 +2024-06-11T10:00:19.384593+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2024-06-11T07:15:41.017000+00:00 +2024-06-11T09:15:17.273000+00:00 ``` ### Last Data Feed Release @@ -33,27 +33,47 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### Total Number of included CVEs ```plain -253385 +253388 ``` ### CVEs added in the last Commit -Recently added CVEs: `7` +Recently added CVEs: `3` -- [CVE-2024-31397](CVE-2024/CVE-2024-313xx/CVE-2024-31397.json) (`2024-06-11T06:15:10.057`) -- [CVE-2024-31398](CVE-2024/CVE-2024-313xx/CVE-2024-31398.json) (`2024-06-11T06:15:10.347`) -- [CVE-2024-31399](CVE-2024/CVE-2024-313xx/CVE-2024-31399.json) (`2024-06-11T06:15:10.490`) -- [CVE-2024-31402](CVE-2024/CVE-2024-314xx/CVE-2024-31402.json) (`2024-06-11T06:15:10.650`) -- [CVE-2024-3549](CVE-2024/CVE-2024-35xx/CVE-2024-3549.json) (`2024-06-11T07:15:41.017`) -- [CVE-2024-3723](CVE-2024/CVE-2024-37xx/CVE-2024-3723.json) (`2024-06-11T06:15:10.793`) -- [CVE-2024-4319](CVE-2024/CVE-2024-43xx/CVE-2024-4319.json) (`2024-06-11T06:15:11.407`) +- [CVE-2020-11843](CVE-2020/CVE-2020-118xx/CVE-2020-11843.json) (`2024-06-11T08:15:48.213`) +- [CVE-2024-4266](CVE-2024/CVE-2024-42xx/CVE-2024-4266.json) (`2024-06-11T08:15:50.850`) +- [CVE-2024-5531](CVE-2024/CVE-2024-55xx/CVE-2024-5531.json) (`2024-06-11T09:15:17.273`) ### CVEs modified in the last Commit -Recently modified CVEs: `1` +Recently modified CVEs: `48` -- [CVE-2014-0808](CVE-2014/CVE-2014-08xx/CVE-2014-0808.json) (`2024-06-11T06:15:08.923`) +- [CVE-2024-27805](CVE-2024/CVE-2024-278xx/CVE-2024-27805.json) (`2024-06-11T08:15:49.147`) +- [CVE-2024-27806](CVE-2024/CVE-2024-278xx/CVE-2024-27806.json) (`2024-06-11T08:15:49.217`) +- [CVE-2024-27807](CVE-2024/CVE-2024-278xx/CVE-2024-27807.json) (`2024-06-11T08:15:49.287`) +- [CVE-2024-27810](CVE-2024/CVE-2024-278xx/CVE-2024-27810.json) (`2024-06-11T08:15:49.350`) +- [CVE-2024-27811](CVE-2024/CVE-2024-278xx/CVE-2024-27811.json) (`2024-06-11T08:15:49.427`) +- [CVE-2024-27814](CVE-2024/CVE-2024-278xx/CVE-2024-27814.json) (`2024-06-11T08:15:49.493`) +- [CVE-2024-27815](CVE-2024/CVE-2024-278xx/CVE-2024-27815.json) (`2024-06-11T08:15:49.553`) +- [CVE-2024-27817](CVE-2024/CVE-2024-278xx/CVE-2024-27817.json) (`2024-06-11T08:15:49.630`) +- [CVE-2024-27818](CVE-2024/CVE-2024-278xx/CVE-2024-27818.json) (`2024-06-11T08:15:49.700`) +- [CVE-2024-27819](CVE-2024/CVE-2024-278xx/CVE-2024-27819.json) (`2024-06-11T08:15:49.770`) +- [CVE-2024-27824](CVE-2024/CVE-2024-278xx/CVE-2024-27824.json) (`2024-06-11T08:15:49.830`) +- [CVE-2024-27827](CVE-2024/CVE-2024-278xx/CVE-2024-27827.json) (`2024-06-11T08:15:49.890`) +- [CVE-2024-27828](CVE-2024/CVE-2024-278xx/CVE-2024-27828.json) (`2024-06-11T08:15:49.950`) +- [CVE-2024-27831](CVE-2024/CVE-2024-278xx/CVE-2024-27831.json) (`2024-06-11T08:15:50.017`) +- [CVE-2024-27832](CVE-2024/CVE-2024-278xx/CVE-2024-27832.json) (`2024-06-11T08:15:50.127`) +- [CVE-2024-27836](CVE-2024/CVE-2024-278xx/CVE-2024-27836.json) (`2024-06-11T08:15:50.193`) +- [CVE-2024-27840](CVE-2024/CVE-2024-278xx/CVE-2024-27840.json) (`2024-06-11T08:15:50.260`) +- [CVE-2024-27843](CVE-2024/CVE-2024-278xx/CVE-2024-27843.json) (`2024-06-11T08:15:50.327`) +- [CVE-2024-27844](CVE-2024/CVE-2024-278xx/CVE-2024-27844.json) (`2024-06-11T08:15:50.390`) +- [CVE-2024-27845](CVE-2024/CVE-2024-278xx/CVE-2024-27845.json) (`2024-06-11T08:15:50.457`) +- [CVE-2024-27847](CVE-2024/CVE-2024-278xx/CVE-2024-27847.json) (`2024-06-11T08:15:50.523`) +- [CVE-2024-27848](CVE-2024/CVE-2024-278xx/CVE-2024-27848.json) (`2024-06-11T08:15:50.593`) +- [CVE-2024-27855](CVE-2024/CVE-2024-278xx/CVE-2024-27855.json) (`2024-06-11T08:15:50.653`) +- [CVE-2024-27857](CVE-2024/CVE-2024-278xx/CVE-2024-27857.json) (`2024-06-11T08:15:50.720`) +- [CVE-2024-27885](CVE-2024/CVE-2024-278xx/CVE-2024-27885.json) (`2024-06-11T08:15:50.787`) ## Download and Usage diff --git a/_state.csv b/_state.csv index b80498eb413..2c24694619b 100644 --- a/_state.csv +++ b/_state.csv @@ -65251,7 +65251,7 @@ CVE-2014-0804,0,0,64f7bcd62c09feae210ed04317dd3c363bf64429ff0d6cc82e25aa05b441d8 CVE-2014-0805,0,0,64ffdc7602e5834fa9b3519c18d42dd7b07d229d431db1ea7d9952fad9ee621e,2014-01-14T04:49:19.543000 CVE-2014-0806,0,0,0f5d623ba97d2afe2377f45b01521ed33883dbba85dc359bb516719da4f3d8f9,2014-08-11T15:04:43.700000 CVE-2014-0807,0,0,f009d972ec55433ad7f1cd0b29e7cbdba3753adab49339cad8b728a428899860,2014-01-23T18:10:13.500000 -CVE-2014-0808,0,1,ec99d11a59fc6ca90e8d2cfd9ce2503b6ff4dde6ec03b45442c931798a2a1bed,2024-06-11T06:15:08.923000 +CVE-2014-0808,0,0,ec99d11a59fc6ca90e8d2cfd9ce2503b6ff4dde6ec03b45442c931798a2a1bed,2024-06-11T06:15:08.923000 CVE-2014-0809,0,0,ea31d36adc72e3733e28eeb6bfacf81b8f998d70f553d482caf7c863538e6e07,2017-08-29T01:34:15.467000 CVE-2014-0810,0,0,45fb5c84f4f5cfdebd55044c843a5258a6f94a800107fdc85390866929ef99a4,2014-01-29T18:39:45.720000 CVE-2014-0811,0,0,c0c381561c327e70759153bf230a2a174504949fe49060ef9f4430788889edad,2015-08-13T17:50:46.333000 @@ -146788,6 +146788,7 @@ CVE-2020-1184,0,0,2bc611a049543db6bf0bf6b96fb01e882395cf50149fc8430568f81ad02bb3 CVE-2020-11840,0,0,f3a363f26a4f911ac51cb1707b94aa62c107f076a8e95eb031d6eb4904733f2d,2023-11-07T03:15:09.850000 CVE-2020-11841,0,0,8ed95a170c9554b00d02309e64bcb52d542e966a9b063d6e4530481dd3a5aac4,2023-11-07T03:15:10.113000 CVE-2020-11842,0,0,72986a84d6a13f089beb2b0b7979170abc0ca672832fd4005a2aa7168ec789ef,2023-11-07T03:15:10.373000 +CVE-2020-11843,1,1,a9698ab044740d81bbdb07ebecb737de7eaff6808aacccdc260ccb87fd4fa1b7,2024-06-11T08:15:48.213000 CVE-2020-11844,0,0,2522e5538ec7480ee226b0b6b7f39f0a9c65066bf96b2574f3941300e05c8cb6,2023-11-07T03:15:10.640000 CVE-2020-11845,0,0,248133b82b72daffe3c97edaa56bab2fb3dc4f4a3d2b02763eb41b58be878066,2023-11-07T03:15:10.940000 CVE-2020-11848,0,0,fa9c8ea36c6832e28ebc6d0ff933981179cafe85deb16d55c96ce604549714e1,2023-11-07T03:15:11.227000 @@ -156799,7 +156800,7 @@ CVE-2020-28395,0,0,bf6970e5d86a5d3341e7e5a9e017673589cd780ee8d139ed41e40a0bd56c9 CVE-2020-28396,0,0,4b8b9560196be43b294881c51a0b380c35f875f9a7f487f8bbb3792ea4489b92,2022-08-06T03:53:39.417000 CVE-2020-28397,0,0,e16106c9ec02a7959bf2e08ae23f8ce25434d9b912ddaa06302608cb3837b077,2021-12-10T19:57:38.487000 CVE-2020-2840,0,0,4c2f7977fe993cf5eae0640b19f693d0670ed59a101cda8990b81da6f52fa632,2020-04-16T15:04:15.507000 -CVE-2020-28400,0,0,0ac0ca5003bcb961cec3e5a71f2796c9610254e83a62276d8d20a28226cd560f,2022-04-12T09:15:10.397000 +CVE-2020-28400,0,1,44e48fcd1984e09e94e3816766c0a8a381a97641d8772c06c4b4244fcc37a65f,2024-06-11T09:15:09.487000 CVE-2020-28401,0,0,6b7ac2bed4789ade3936183e46203e95f2c8d1218251a425bc12f3a2d16c511b,2021-07-21T11:39:23.747000 CVE-2020-28402,0,0,ff1548c2d2cecd1ccd3eefdafddd80189d711f75d327b7ee849e8196cbc98609,2021-07-21T11:39:23.747000 CVE-2020-28403,0,0,71c248a6d058491bec967509722e848af762d9caca5a00ae18e5842de83e9ac4,2021-02-01T14:14:32.147000 @@ -194383,7 +194384,7 @@ CVE-2022-25618,0,0,1f3a8ca8e036fd291b26ce5388418ac1728826c0e9d08b58010dfe34122a4 CVE-2022-25619,0,0,26361509613cfcf315308898948e430abce5baed7495d48b763def148b21870b,2022-04-07T16:28:26.127000 CVE-2022-25620,0,0,15d831c37121985148682e30d5a696db0ec3ddf5afb51bc183b13bda8f418817,2022-04-07T16:25:41.173000 CVE-2022-25621,0,0,0ac0ec39de03543274d1cb6db5c55a310b0d92391145960bc53b5ccb8642cd70,2022-03-22T17:53:02.347000 -CVE-2022-25622,0,0,4db8ab8f3c4ec5425dd31970947784f6a9e8ddb46c2425aae8cdfc46eb3911b1,2024-05-14T16:15:23.660000 +CVE-2022-25622,0,1,e5fcc34526af5764fe60dbf0d6c3cd9c05316ba3ac3378f6debcd9d363cb2e2e,2024-06-11T09:15:10.623000 CVE-2022-25623,0,0,1dd6be5e3e5a796b51e4d4440e3e1c4ff8505b9300f2c5e3ad4e41625fd9eed8,2023-08-08T14:22:24.967000 CVE-2022-25625,0,0,6ab345f8b324c27f406bd9ee308869f36718f1c391dd3a10b73d5814fa8b4f63,2022-09-01T15:45:15.450000 CVE-2022-25626,0,0,1916dc07d7f5e7cb2f4150889e0dbfab5ec7786293c3740bcad93e80788d9c67,2023-08-08T14:21:49.707000 @@ -204920,7 +204921,7 @@ CVE-2022-3877,0,0,d65e8a1f9affac4976bd5180163445a89b7661212631d7cf576af85548b054 CVE-2022-38770,0,0,bd9c0e8e17b45f06af971695e320abb2384dfedcae8d6837468f38c2c5691991,2023-08-08T14:22:24.967000 CVE-2022-38771,0,0,76dd818bb4c1ad151962d43e6df64bf4172052cf0668c8b9a38a1e85c2584372,2022-09-17T02:01:04.943000 CVE-2022-38772,0,0,a4b0277f2a7d6d70e1ada097174bbf5352079655a1f2663c4a242ef1daf0df75,2022-09-02T19:47:50.700000 -CVE-2022-38773,0,0,c049b7245bfee58c356a28d9863f8194380106be9153fbc6419d9ed099f9730d,2023-01-13T20:33:20.213000 +CVE-2022-38773,0,1,8812a9864c0475ef35dc6c8a55dd451c901f29ce84d8a82ad0ae4a9fcd4e18aa,2024-06-11T09:15:11.087000 CVE-2022-38774,0,0,de65ca0b4a9ddf6e32e5f34286b19068840e71c50caff19d783c63f38a87554b,2023-02-03T18:21:15.267000 CVE-2022-38775,0,0,e75c1256533c7daad13049b00955d44cc8f43acb01643b91b8c284bdb345179d,2023-02-03T18:24:06.557000 CVE-2022-38777,0,0,09801cfbe2f6708683f64c0e409f40a70dd8d7738870fa23b4b9dc79e9d6e451,2023-02-21T15:59:24.733000 @@ -208715,7 +208716,7 @@ CVE-2022-43710,0,0,e0cf8bd85031d3c1a813c0e782bf9366f4ec4c8d74a6425791b57de1608f2 CVE-2022-43711,0,0,8acbf3db43baa9a9cdb4dbb0558bbc15a144fd59123ef84ac80195c32fc1ac4a,2023-08-04T15:37:18.857000 CVE-2022-43712,0,0,f890b6c77a5af2e0f078c1fd1fd6ef0498129f9c34dbd9e8d521f43b9fd151cc,2023-08-04T19:39:49.167000 CVE-2022-43713,0,0,7bede523d769d9903862c2f00e0386d3e90ecd7dd0dd7005e1776bfdd522c828,2023-08-04T15:49:03.637000 -CVE-2022-43716,0,0,f5ba55a2adf2d99b6155854978cfe9fa5898c8338a263dab43769eac31c2cdf2,2023-05-09T13:15:15.390000 +CVE-2022-43716,0,1,81ede852d360edf1dcc47980f26c3a6ed1751c7157f3f3ff31115c6e0fa8bc84,2024-06-11T09:15:11.587000 CVE-2022-43717,0,0,0b1bdad6065ba4b5a4687bbe12958df7a43e76d577613164f7d2c60e35068dd0,2023-11-07T03:54:02.080000 CVE-2022-43718,0,0,b327914e799d79a4e39e1c7e75a3c8876f615b40080f55667939a9d090ec5519,2023-11-07T03:54:02.147000 CVE-2022-43719,0,0,c1a32c477b92d31ca146ff82c860530e572c1eb415c13a7d01e50d71fdcadb94,2023-11-07T03:54:02.217000 @@ -208750,8 +208751,8 @@ CVE-2022-43763,0,0,2819a0527f85f117af2be739fba5822854d595a43f54286f54e3cd97dd814 CVE-2022-43764,0,0,2cb333eddc1790fa4d0a4c5e1c00f836f379d3bf0570dd365de5c4c3a1c01f4b,2023-11-07T03:54:03.047000 CVE-2022-43765,0,0,07c2f3d94d9131f5d90904fe42711365ee29194ab4927a4307ab215a76ed6f71,2023-11-07T03:54:03.167000 CVE-2022-43766,0,0,2eca4905d3c4104e0f60f5c7b952404cbe92b0bd333427cb69051843ce566240,2022-10-28T17:43:04.957000 -CVE-2022-43767,0,0,d81fbaa657c5bd3266e85e04ab3f13e41881ab654c6ceb0203d319b2315ccd35,2023-05-09T13:15:15.557000 -CVE-2022-43768,0,0,965ee1bf07e67a3114e034525c4f853534dd4760bdbfa21e8c19e22eb30bb406,2023-05-09T13:15:15.713000 +CVE-2022-43767,0,1,3d3ec72dcf504c485fb70768c983f8a61243177659a623eb61e366901d24c3fe,2024-06-11T09:15:11.907000 +CVE-2022-43768,0,1,ab30b6f76d5815d6fd266fc12ca2221697e084ee85a9caf1e7db58f67a88c8e9,2024-06-11T09:15:12.230000 CVE-2022-43769,0,0,7f3c480211c1e7c9e46e3c85da1177d1b727f52750ee51087f4349b585556af6,2023-05-11T18:15:10.847000 CVE-2022-4377,0,0,068b39f647ef8513d4837a4955b7179d563722e5feeb7420bcfdacaef8a5f70b,2023-11-07T03:57:41.830000 CVE-2022-43770,0,0,2c7d822d2b39aa8db7d054c66044721e02aaf0af20f996ddd6ad9840e9e750e3,2023-04-20T19:47:28.430000 @@ -210261,7 +210262,7 @@ CVE-2022-46140,0,0,645741dfd6ba50ed1ab18334a6e7d7c06d2c69f2b8945110b586603b9e9fa CVE-2022-46141,0,0,e01d3d8a7133425736470630c9db6ec87069dcef7521c7b7f3a7336cf5697936,2023-12-15T15:25:08.557000 CVE-2022-46142,0,0,076315d7ce7ace9ad3d082184a4fb7584cc27d952e90d963f508a0c544b9f024,2023-03-14T10:15:24.137000 CVE-2022-46143,0,0,858449c4d7caf505498265655801b59aa6f34f06ec95b2b0eaa00c933fd49697,2023-12-12T12:15:10.230000 -CVE-2022-46144,0,0,ee62f5b783f442e005903fc32870a8c543457e86686ec664396a1d61fdcc38b7,2023-10-10T11:15:10.987000 +CVE-2022-46144,0,1,aa28bd70336cb9942b9ebb71749dca87d898b6d746b093e92a69844cc9a1c7e3,2024-06-11T09:15:12.590000 CVE-2022-46145,0,0,f7a17de473415e11c551d16f15c5260c8ee64752eb46f684fb1404bda87ddf3e,2023-06-23T17:54:04.830000 CVE-2022-46146,0,0,7a5ffe545d9cb4038f871132d597e9e5352f001f7c95aef9377b7e878b358280,2024-01-12T12:15:45.110000 CVE-2022-46147,0,0,2ff856f5b41ff870879815c21b8d915e4f8a07316110cdf7163aa326244e2f46,2022-12-01T23:07:20.930000 @@ -228577,7 +228578,7 @@ CVE-2023-3863,0,0,b9398469eabeafe28d110e5ed08166075e260867358d34c16f6d758bda7974 CVE-2023-38632,0,0,9511e39a9a065f69ef6590f4695bd395dc1f846685d263a342e66909b4d3385a,2023-08-01T13:50:50.473000 CVE-2023-38633,0,0,93d522b98b95166863d6e1db822fb4bec8463aaedcdace73a72333b8179a6286,2024-01-24T16:41:49.187000 CVE-2023-3864,0,0,c71fc322d0eadebb373f88174f8897111d3a73534afa2ec5aff424e84a74f576,2023-08-18T14:16:40.163000 -CVE-2023-38640,0,0,041a83ddb46a4f91360a072d76ac97645dfd3e9710efd3cde51ef26af8ecd6c2,2023-10-14T02:43:46.027000 +CVE-2023-38640,0,1,f74a239073eb454eeba2e7eb2624151cfae8e00fe96120ee4486e703c4b78cd1,2024-06-11T09:15:13.423000 CVE-2023-38641,0,0,b60575b0d3d68fa6f4381a1a022575f08fd66d3ab2c0394a18e0afed821e12a9,2023-08-15T19:40:17.187000 CVE-2023-38646,0,0,4bb5025d5c4986c981ce9b63274763bcc9fcd029e72d06f3979bd475f7bc0fc6,2024-02-15T16:15:45.380000 CVE-2023-38647,0,0,b1798ac02686ab4440590c4462c5f4bb41f2d6ab8f482c447c92a4dd84485772,2023-08-03T15:10:55.947000 @@ -232715,9 +232716,9 @@ CVE-2023-44311,0,0,3b4b00ba8d688eaf03e44e6d9f4df7f84ca50bb2d53185d8873bb05e42aac CVE-2023-44312,0,0,ee8d773f5efbceb6f850ded169c146beea3bd8b91bc9e3c303a02273c4771831,2024-02-08T17:08:11.110000 CVE-2023-44313,0,0,2ccff3d184596dd97720cea6b7babed4736fcb869a5a89940fe69fc4c9b8c613,2024-02-08T17:13:28.083000 CVE-2023-44315,0,0,0474d89d9285949480273ea98d9b1bf4959fa5818eb5c7f76cff34da1fc2f13b,2023-10-12T00:43:38.827000 -CVE-2023-44317,0,0,5387b7dc0ff5b92662ae7ea69a2c003ac0c8d4fb73993639f6b2d67ba53051de,2024-02-13T09:15:43.880000 -CVE-2023-44318,0,0,2dbd1a50827db421fdc2c77ed3cc38f899410180b942c3c709f005a0dee8a8b4,2024-03-12T11:15:46.620000 -CVE-2023-44319,0,0,b8d3c5abe58f71d0a4f3dd8a91a3acdf30360e0e6a25d3f625c672af97e26aa1,2024-02-13T09:15:44.103000 +CVE-2023-44317,0,1,b56a158cebcf42d89e4d6901f5f3db2abc24725b5427dc8f59e4caad401ded6d,2024-06-11T09:15:13.730000 +CVE-2023-44318,0,1,124397ddc4bd28d20d0e815a4e5bc7d645755649711f0e671b73dbe68f5b4974,2024-06-11T09:15:14.333000 +CVE-2023-44319,0,1,d4ab95467abc686b0efd92bc5b303eec429d96421d44ba8a0c4b4c7e0a7432de,2024-06-11T09:15:14.940000 CVE-2023-4432,0,0,0d778df627f1547cab2b9fd64ba34616922fa04b58f2edee97863ee606119c57,2023-08-23T16:58:29.763000 CVE-2023-44320,0,0,d119006e47cce113b105ee2db4f38227825e3615f67d0fbdef4c97002aa08e68,2024-02-13T09:15:44.340000 CVE-2023-44321,0,0,911037adf08df4ffa2ffbbc7aa8653046518fe8ac83fe6fade98cb8847d28d1d,2024-03-12T11:15:46.980000 @@ -232770,8 +232771,8 @@ CVE-2023-44367,0,0,d5d89a02dec9cfaca291a0cd5b5f30d363c109814afa4ba2b94bec8f42118 CVE-2023-4437,0,0,b4cc863eb5ce47c4eb4268cc05a1191605221f95fca8656d56637b9502673d3e,2024-05-17T02:31:33.640000 CVE-2023-44371,0,0,2297c6fdf2afd389ea703848ed5d6c6ded312e9e67b0a76d69f5cda9f1a630ea,2023-11-22T16:58:39.573000 CVE-2023-44372,0,0,a86d107032e1559f3fd2ed4ee7f77c509710319a73a766e52fe64ffb44d5363d,2024-02-23T19:15:08.467000 -CVE-2023-44373,0,0,533dc92a5a8f084d62c03c48e789ce059c00552abdc3137692180affca5c571b,2024-02-13T09:15:44.957000 -CVE-2023-44374,0,0,0f4a17ac0b331ec6c4dac3f8af3d86a6479fc8368144856a4ac5600f3c153549,2024-03-12T11:15:47.267000 +CVE-2023-44373,0,1,e7f73e4a65821fb612f046bf847975072c678282df4ee59af12fc206c71283ac,2024-06-11T09:15:15.377000 +CVE-2023-44374,0,1,f8b8bce40b3e98d5a9f614bd74fe34bdc98e5151c1ec5d1c243152ccc4d26188,2024-06-11T09:15:15.990000 CVE-2023-44375,0,0,593d447900de38b504b8288066dba2aca1c23ca9dc2b8ebba581f03f2af8dcd2,2024-01-02T19:15:10.480000 CVE-2023-44376,0,0,bd7edf8426f6b9b5132878b896bbd83a87eb49b2089f52d618dfc7a966a2253c,2024-01-02T19:15:10.550000 CVE-2023-44377,0,0,82bf954347778e7128ea732c92275efada968563ffe465bc093d8a5741bbae62,2024-01-02T19:15:10.630000 @@ -233177,7 +233178,7 @@ CVE-2023-45201,0,0,96bdcec1d537035c823229fceb88418f9c3a764bbde63a305c2b0cbff3648 CVE-2023-45202,0,0,29317d3b7a63c177ae8a6e66af18ed7e8de578c5219fd14cc15471fc255f7962,2023-11-08T23:12:09.473000 CVE-2023-45203,0,0,f8305c62c2a5f3365003f7473f2dbd3802533af547048a30d7e86118234bc365,2023-11-08T23:12:20.497000 CVE-2023-45204,0,0,e27bb884505cc94f9fd049fb362f1443f0858ac07554f2d906a029439046e66e,2023-10-12T00:44:00.243000 -CVE-2023-45205,0,0,01ae041d020771a6f6713901ea60b3cb1f7174c5ec0ce9743705e5638d234132,2023-10-14T02:24:01.100000 +CVE-2023-45205,0,1,538ac842ceda74c0a4a47b684bb6eb451362d86539948b386d203a24f0acc2f3,2024-06-11T09:15:16.577000 CVE-2023-45206,0,0,75321b27d5416502901be19297200a9974474b77410916565ba2dd2ebaec049d,2024-02-13T18:23:02.393000 CVE-2023-45207,0,0,057c3e719ca21440d880e35b10a15238d3d7a6403a5bd988d596e65617eb7af1,2024-02-13T18:23:02.393000 CVE-2023-45208,0,0,ff62badeb6459007decf020f49ed097a135e3c004ce7c6b74e1a14172980ba87,2023-10-16T18:48:47.807000 @@ -236350,7 +236351,7 @@ CVE-2023-49688,0,0,93d52581ab97f4c4a9518955faef7856c63e32e254de3eaa71e57824efb8d CVE-2023-49689,0,0,87395a2c8c107313cbc041f315fca3f89094793710d9f420c661f91319a8c529,2023-12-27T20:49:07.780000 CVE-2023-4969,0,0,2c6655eaeb515e6f955488cf5c51d76ef097b0a3c7180e9f766cc6c3af3dbf92,2024-01-23T16:56:25.943000 CVE-2023-49690,0,0,2faeb1f020693f40c665ecb7eba1ffca8452cf62dc2d2ee04e65f4b99aa266ff,2024-01-02T20:15:09.933000 -CVE-2023-49691,0,0,cf4bc5b6e26cd2d050abb3e7f2c790c34bc1f3d2e02d4c61ee1bc9996dbbeaf8,2024-02-13T09:15:46.373000 +CVE-2023-49691,0,1,f14631c670ecaa48714a1fac29e19124304235e69ec8ba39a392e35063f534ed,2024-06-11T09:15:16.840000 CVE-2023-49692,0,0,dbcc49434d099080ae35750c4f056032c6b8a51c8987a0e4dc162d8e8804102a,2024-02-13T09:15:46.507000 CVE-2023-49693,0,0,5e2914754dd1f28fa5a23b08c704fc3892fe0278ea02f222ff8211fe8bf4b7d2,2023-12-05T01:54:46.047000 CVE-2023-49694,0,0,f3cad7b0aab60a0a0dd6b1a45bf578adab64adee5013001acf484fc03402cf40,2023-12-05T01:54:34.097000 @@ -243884,7 +243885,7 @@ CVE-2024-23248,0,0,3b100f3348e9ddca065d4f3fd478aec1907931fa96a4ed3377d05be33d175 CVE-2024-23249,0,0,e0d7f2aee237d26c7b0c8ad64668a6a03d87d4b0174d6e350f019a0b7d59e493,2024-03-13T21:15:56.730000 CVE-2024-2325,0,0,23b75df513c3c155a2acfcf2e34574fcebd08fb3e2a0b9207d1fa3d021e99412,2024-04-10T13:23:38.787000 CVE-2024-23250,0,0,23972341b564827ce5b9505c9a1f83d7e8d72dc9e37716cac001382a6c566edd,2024-03-13T22:15:10.157000 -CVE-2024-23251,0,0,0d35cd5a6c9310bd8afa52edb1ccc0600713cce6e35aec824b38ab3bd3fe95cf,2024-06-10T21:15:49.430000 +CVE-2024-23251,0,1,ebbd652d9390e8e5e2956f69b6c82faa8898ae4a9db1fad5d807879b937d33ff,2024-06-11T08:15:48.553000 CVE-2024-23252,0,0,0664eeb2c9608aca7ada566c98a3c55b1e928a3feb65097958db8fb31b3c0f73,2024-03-26T19:15:48.757000 CVE-2024-23253,0,0,236890f266aeb2a0ef621837a0a5e82d7bb89a3a03220dfe0920fc94f8f6fd50,2024-03-13T21:15:56.870000 CVE-2024-23254,0,0,f51bdaebdfa7043c82ce44968eb18a23393946054fa5c04d601cb0af5a7300fc,2024-05-07T06:15:07.777000 @@ -243917,7 +243918,7 @@ CVE-2024-23279,0,0,2f2a4da20a4912b04931b6c0ce417bc3b1be9e1a7b15c13f5c7903e852635 CVE-2024-2328,0,0,cc711e7491762a1ee61375ce4ed11bcc6b5385ac1da7fe6c68d22fc72362eb3d,2024-05-02T18:00:37.360000 CVE-2024-23280,0,0,c55716574063aa546cbe7741f1ce5061fce7685b12d62c9698138d2015ee1892,2024-05-07T06:15:08.307000 CVE-2024-23281,0,0,674de30f69505c52d01e5fe7880d69cb7b5b61a38fa5019ea24d9b4fefc1ec80,2024-03-13T21:15:58.150000 -CVE-2024-23282,0,0,306fcb0b47a3ea59501078c1d3943bc8e46796f3bf158b648330c6ca0bdee7ae,2024-06-10T21:15:49.503000 +CVE-2024-23282,0,1,4698c3707e2b2c3f9d85949d1c0ba3589b4f1d95ffb336cfbece2384dc7d6ce3,2024-06-11T08:15:48.650000 CVE-2024-23283,0,0,0202e856d9f25468386c96fd4038e5f441de45cb2a237c843486f3dc6e784c3a,2024-03-13T23:15:47.470000 CVE-2024-23284,0,0,d09aa0bfe274606474c4572bafdbf18831f3c38a9e756039727b5339544024ad,2024-05-07T06:15:08.473000 CVE-2024-23285,0,0,e5df014d4a83c708ed8a25bbbb190dde1bd7ec52fe6d53091bf0a994e268833e,2024-03-13T21:15:58.280000 @@ -246853,69 +246854,69 @@ CVE-2024-27791,0,0,44e295d56ae82c935e7837aa163b1c182c6b8efd5ceb84b892de3324ac969 CVE-2024-27792,0,0,f4c93ffbcf0fa2b69a394e4f8043e5a055ca57351625146acb468cc524a0cb16,2024-06-10T20:54:18.443000 CVE-2024-27793,0,0,353572505ffd41c49c8a655c8653c3aeaf93e2259f3ba926c49eca056984adca,2024-06-10T18:15:28.523000 CVE-2024-27794,0,0,f83311c8ff012592a70730809fe5cac1d0e670b37674538bd8092c8ae8d69027,2024-04-16T13:24:07.103000 -CVE-2024-27796,0,0,992144573d1e92050b8d1a885c008f1e1dbb47eb40e4c3600f436a4e8737bc49,2024-06-10T18:15:28.577000 -CVE-2024-27798,0,0,d7e6a4f8d8f638eecc2f4b89832612b5d34631f3d78207810c824e98e4bcf449,2024-06-10T18:15:28.640000 -CVE-2024-27799,0,0,9ba63a0adf2c1c42c78ef215c5d2409cce159a4d63d7392b9ac8758c548dd0cc,2024-06-10T21:15:49.607000 +CVE-2024-27796,0,1,0f6294260561edcbf030914cbfc2e2f9112190409fca9765281ce7a127290cce,2024-06-11T08:15:48.723000 +CVE-2024-27798,0,1,96770d0ca7d69538b21522ed5c1df64fc164bf06c1fda12cf5ffe66287c823eb,2024-06-11T08:15:48.807000 +CVE-2024-27799,0,1,6370a58731e78a9a5fd4820834a372b803e0e08b53f662528346d6f6fc04f7e0,2024-06-11T08:15:48.860000 CVE-2024-2780,0,0,ebb4d263bdb4979d90a73abab8050be4d34d6c520d6b3b8fff46d8c73490b44f,2024-05-17T02:38:30.160000 -CVE-2024-27800,0,0,c9023f2fc1a939c2b504d53cd7d0a6dcd64147c963504a98ec95d1c3930651a6,2024-06-10T21:15:49.683000 -CVE-2024-27801,0,0,22f4593a7f5fadd4f42d99784297ef76bc70f7586bcbfb3c48cb071ed073af81,2024-06-10T21:15:49.770000 -CVE-2024-27802,0,0,979361176e246fda5d4bbc54a25c1047c804c3066ef17e774011290fe55d2891,2024-06-10T21:15:49.860000 +CVE-2024-27800,0,1,3565476e7caa26b53ebc9a379a5107839c56a3599c85568f05ffd87486e8de9e,2024-06-11T08:15:48.930000 +CVE-2024-27801,0,1,d166120fb4ba1b6f905a86cb45d0a567fedc947c730fe9ae4e27dcc24c47d313,2024-06-11T08:15:49.007000 +CVE-2024-27802,0,1,d9f0f170303b1b115564771b5cc04b393ff158154b2540d185c00b349ac98951,2024-06-11T08:15:49.077000 CVE-2024-27803,0,0,53706579cbd6412d2f61db763826287c31c4944b996a096fc5d655cd875e9fe8,2024-06-10T18:15:28.727000 CVE-2024-27804,0,0,b62a48f9287009a5776ff73fff04f1a8014c48cf3784f3553bc30fd3fc9e5868,2024-06-10T18:15:28.780000 -CVE-2024-27805,0,0,f3e043f9edda28f318b570567bc863c6b8d38c40c7c886c279edbace9ebeea6e,2024-06-10T21:15:49.943000 -CVE-2024-27806,0,0,e676feeee72daeef2c626aae3ba8e890c1b971193584bc0ea4327d49167553d2,2024-06-10T21:15:50.020000 -CVE-2024-27807,0,0,38cab12dc4d1b20883788d28f72c3de7333331c9e5a04616d5a90a2425403886,2024-06-10T21:15:50.093000 +CVE-2024-27805,0,1,7d3d5392c3734bbb7ab3d1ddbe341bc7d3aef0cbee247c3e73f420a147ba42e3,2024-06-11T08:15:49.147000 +CVE-2024-27806,0,1,eee1f85b3b69863560b6c24b9b5f1bbcd80bd54fbc16bdef38dfe65ead269313,2024-06-11T08:15:49.217000 +CVE-2024-27807,0,1,8dc6b761352f08ba8ab4989a940b43ece8706688015ef9b5ecee22ef02a5775d,2024-06-11T08:15:49.287000 CVE-2024-27808,0,0,c5d6ad2da90adef91ca34b1dfe39cad84bfdf1003557cd00d472f4add705d97b,2024-06-10T21:15:50.160000 CVE-2024-2781,0,0,7440c381afc245ac61500f5670c7b774787526dc48ee470e168c2fa8882d9975,2024-03-27T12:29:30.307000 -CVE-2024-27810,0,0,16d32a3b215e9b0582e26e0a0c6f925a83804d78673849bf3b3aaacfe98ee515,2024-06-10T18:15:28.843000 -CVE-2024-27811,0,0,b76af7f791c9b967c1b99a366d75de5aa45bb642cb9d7bb0324b518b4e4514c5,2024-06-10T21:15:50.230000 +CVE-2024-27810,0,1,f36cf8877043b3c02a9350712f62c03fcb599625852fd9446ed0d3dcc7aa3a57,2024-06-11T08:15:49.350000 +CVE-2024-27811,0,1,6947c96cbb574595b4c8cbc58e2afce0f0eeeab7237cd40d0289795536ff0e21,2024-06-11T08:15:49.427000 CVE-2024-27812,0,0,7c1594f8a376157e9d4a293e3066e7a40135f2bee1f63f6588c9b0afb89aeff4,2024-06-10T21:15:50.300000 CVE-2024-27813,0,0,e5f2882c5f57de51fb8cbfdbe3d9f69786dda1b139d68761ff0d9306574aba8e,2024-06-10T18:15:28.920000 -CVE-2024-27814,0,0,0fff7cb9f482c678859fcb2e6ca8ec83aeca9aa6e9bb26ec7b2a039dff004630,2024-06-10T21:15:50.373000 -CVE-2024-27815,0,0,50ba975ebe503a983613f08758133d418519e46146afb2b007057bc519776db5,2024-06-10T21:15:50.440000 +CVE-2024-27814,0,1,eeaabcf0af43d2d2d437ac0c177d88ea91c177c69fd98cc72cde55b3a67c541b,2024-06-11T08:15:49.493000 +CVE-2024-27815,0,1,ca59586ae6c3ac36223850ab3941c64f95b81f012a5a3e198f89480616da55ab,2024-06-11T08:15:49.553000 CVE-2024-27816,0,0,796a750f65ffb329e29033d8bba60513b21bc14881ed71a1b811a2e04501ae1b,2024-06-10T18:15:28.970000 -CVE-2024-27817,0,0,37abe8d93777a734d085bafc860a69da1e63516262e7e8d8f3d3c70dbcc7d3ce,2024-06-10T21:15:50.547000 -CVE-2024-27818,0,0,1614df26ae8bcb22fdc1bdb7edc5385e3ab6e2bbd6920be5d393a8a30fdbd930,2024-06-10T18:15:29.033000 -CVE-2024-27819,0,0,2fdaf9da2ba1f05fc545029836a61bfd56378797adf535bb5248688e0a8ffbb7,2024-06-10T21:15:50.623000 +CVE-2024-27817,0,1,8e11d15bcd1ed7dba693b6af0a32b354b5ccd59d958a6ceaa498de2f9b9b77a3,2024-06-11T08:15:49.630000 +CVE-2024-27818,0,1,53d578e3a0a5c74afcd3cfe2146b5bdd30d3ee9cca34913d6e2df31ef7d7a6a4,2024-06-11T08:15:49.700000 +CVE-2024-27819,0,1,d8f471c4c2313791f1824fa7ed00bf3dda3c9686920e98f22d480b69e8f5fd8b,2024-06-11T08:15:49.770000 CVE-2024-2782,0,0,91d9b539aa31e7a5bf0be259f7ee77e02d3f24638d700db95962fd57c1db4b96,2024-05-20T13:00:34.807000 CVE-2024-27820,0,0,0b7e745f316a152e549d15cfc15186618e9c36d6031e23d8a35d2a44a0018f43,2024-06-10T21:15:50.693000 CVE-2024-27821,0,0,1de7b9a00e0f15ecd864890bdb004777a3be2018051ca91dd74315d450ee5849,2024-06-10T18:15:29.097000 CVE-2024-27822,0,0,523a0187399a43dcbb08e6d44e81c3f2dbc8fa1f2bc5926aeab19b9c97bd93b4,2024-06-10T18:15:29.157000 -CVE-2024-27824,0,0,5baa488a9d673064b6e6f95d574180ba96aab554685e92b6132d6835e438d5ff,2024-06-10T18:15:29.213000 +CVE-2024-27824,0,1,bac18298cb87bbf4437c3c19802ecf7c192a4b0487eb1723234b03d4506aa7e9,2024-06-11T08:15:49.830000 CVE-2024-27825,0,0,37ba7296b9e432dd36a2f579aa8aa6b1828ebb3ec4651f97514f9da1fedab657,2024-06-10T18:15:29.263000 -CVE-2024-27827,0,0,92b78016d4f01597714cf96e8c975248ece627f4697a35c55877f20dc7fafa53,2024-06-10T18:15:29.320000 -CVE-2024-27828,0,0,b950febc87bc7fd1bf4b29a498a41907a9e3780f3f0194e5d91555a9fdcfa7b7,2024-06-10T21:15:50.773000 +CVE-2024-27827,0,1,f606ee564bddcdd28f55aa4bba96bebbc2683729b049ba42feab41bc19daec3f,2024-06-11T08:15:49.890000 +CVE-2024-27828,0,1,0d2c594f1a6679da57e59e276ad50ba86d1e8db33161d1f5b6bc7419f4c3194a,2024-06-11T08:15:49.950000 CVE-2024-27829,0,0,24825b1ab4796019403a414c0e4a694a721b0ade700a310f7fa91966f0664d24,2024-06-10T18:15:29.377000 CVE-2024-2783,0,0,5e3d9294a74b759ac7450c1cf79e73d07c944f71ed4c195d3306f256a09a6879,2024-04-10T13:23:38.787000 CVE-2024-27830,0,0,643564c7c1a1b5c495e2090a8d9aa4d6159c1aa3fb2d2378c33917209433319e,2024-06-10T21:15:50.843000 -CVE-2024-27831,0,0,f779f3caaf9df9840f8886a4f61dce7cbc85c3ff532feee1ebb8228fe8ba57c6,2024-06-10T21:15:50.927000 -CVE-2024-27832,0,0,4f3ee586befd66c300bd0241ec0976b6f523dbc6756d9daa24f85e3cb4e21622,2024-06-10T21:15:51.007000 +CVE-2024-27831,0,1,bb8a237cc1f1f5a56ae007aea4b54664c00d0b6ef8f3f8e32a66b9e0bd37d563,2024-06-11T08:15:50.017000 +CVE-2024-27832,0,1,8a0f652705f4fb553dbbdc205b8b54cff9258ce9c187242762544beb74ae003d,2024-06-11T08:15:50.127000 CVE-2024-27833,0,0,189d6e5dcb44802cb4a822a4304c72d38a56f9c07c67ca79ba6a88b7b2a7bf0d,2024-06-10T21:15:51.090000 CVE-2024-27834,0,0,2d4186f2cb5cbe4f2f8f3e55a2545b1878bf5a77624083576b159f1d995ce82a,2024-06-10T18:15:29.430000 CVE-2024-27835,0,0,c3d25dd6cfd2f797e5af53adbf0373a3dd203d6ad6e8d11af15dc203eb2402ab,2024-06-10T18:15:29.497000 -CVE-2024-27836,0,0,58be76f35b76eaa63b11d542f791ed557217824a955720e8a98311f782567e76,2024-06-10T21:15:51.167000 +CVE-2024-27836,0,1,5a1200baf3acfd07d33e45e3c4d5995280335cd8ce65576b156979ede325bec3,2024-06-11T08:15:50.193000 CVE-2024-27837,0,0,901f3c3a397896b090baa01f5e16b0462e9f3677320c7d083f0561d63284135d,2024-06-10T18:15:29.550000 CVE-2024-27838,0,0,57089a9eb08f45ade2765a0cb9666d92674eb67f3917ced8cfddd01950a9d9ed,2024-06-10T21:15:51.240000 CVE-2024-27839,0,0,dc2551c161bade026d50a7722610913c7d6281d71628fa7705ad0b54f8ad144e,2024-06-10T18:15:29.607000 CVE-2024-2784,0,0,ba1190a588b039c20289ccfefd73f048dc164c370109c9a0315fb7e323728a74,2024-05-24T13:03:11.993000 -CVE-2024-27840,0,0,73811411fe8568e94c8a58fdc8e4f6a5bb632664acf9c04146fedc22f1c147ec,2024-06-10T21:15:51.313000 +CVE-2024-27840,0,1,0a2090bd3ecc65a08c6a1db35bc5638d75d7e365ac7ace65deb9c99a3c8fd162,2024-06-11T08:15:50.260000 CVE-2024-27841,0,0,160e608c0f194092a3d3fa2958525a7ea0dc3c80c71963835592dc22256a7e3a,2024-06-10T18:15:29.657000 CVE-2024-27842,0,0,c2f4ad1e4648fa9ae5110e6bcc4b9d3a34413349e7ab03cdd6ea669b8d6af4f4,2024-06-10T18:15:29.733000 -CVE-2024-27843,0,0,f04a611287e4c37cea29b8fc6d491a577bfba9574b575f57111029725539f40c,2024-06-10T18:15:29.790000 -CVE-2024-27844,0,0,656395c1ffb59a368b5cdda145522c2eab15f70feb9d69926b92dd383ecb3e41,2024-06-10T21:15:51.390000 -CVE-2024-27845,0,0,68dfb03f19709b33f86d86b34d4d70a6e93fc14312095d72a322215222b649ea,2024-06-10T21:15:51.467000 -CVE-2024-27847,0,0,afb0c107691a812d0828b454c97dccbae70291ac03525fa2ae723faad45e31db,2024-06-10T18:15:29.840000 -CVE-2024-27848,0,0,14fb9de4af35c5cd7ee210411e85a979154da98a16baa3c219b68be3860d1c53,2024-06-10T21:15:51.530000 +CVE-2024-27843,0,1,caaa2b70673c0fd7a60807026442c43e55ad72502b0f967bc1cef9c19a74b1af,2024-06-11T08:15:50.327000 +CVE-2024-27844,0,1,2fe77bd0ec7fc4a752768e59949964f476238b5da61a6b9eefbb6d842c089af4,2024-06-11T08:15:50.390000 +CVE-2024-27845,0,1,e4e364c0de4d5c163620e93f45806a9488521cdc85c26abc56d2337b9c26f0a4,2024-06-11T08:15:50.457000 +CVE-2024-27847,0,1,5b46b94da4559b57e8ec553aeceab469e79f3b10d85d6cbba1ed5528322d1b03,2024-06-11T08:15:50.523000 +CVE-2024-27848,0,1,e7e14b2cff9994fe57037ebd90ba8b65f783c0e9cff8cfa3d5e01f8fe7e70318,2024-06-11T08:15:50.593000 CVE-2024-2785,0,0,f421029e3ad60193115519ce84f2fb34a615c8431383b64062041ee6b872f244,2024-05-14T16:13:02.773000 CVE-2024-27850,0,0,b05f8f0af68e74bd0947e7946fb110526f99ba0d9891673f450eff3d2255e925,2024-06-10T21:15:51.607000 CVE-2024-27851,0,0,b7191311ac7712f457513c047ee5765686658cbbff76be1d645e02d5edd5b3a3,2024-06-10T21:15:51.680000 CVE-2024-27852,0,0,2264a1594190812a9b29fc0e3f886882ab3c63c917f94e71ed2dc96c8e6c2c94,2024-06-10T18:15:29.900000 -CVE-2024-27855,0,0,12948826eeab402c4e41686b446997191464ba8f13565e0cc3689bdc9910883e,2024-06-10T21:15:51.753000 -CVE-2024-27857,0,0,0a9e62fa2179edc33ac42f2faea2a0c4fdd8167f0c2cf54c68f7ad05d1c72cc3,2024-06-10T21:15:51.833000 +CVE-2024-27855,0,1,7404b31c96a3ea932f0a46bb5231457366939a39cf2ce33cc30f92b442b0c9f8,2024-06-11T08:15:50.653000 +CVE-2024-27857,0,1,dc3fb1b112a51d71fcff4b337dbb4f89a79ea2e2bcce46ef41e3ccdbb559becd,2024-06-11T08:15:50.720000 CVE-2024-2786,0,0,dcf647d15f4b220698a959a93f7a5cdfd4a7ecd495ee9aa1ef69052001df8b00,2024-04-10T13:23:38.787000 CVE-2024-2787,0,0,496195d9f69f32f0c6a6baaf1ee3e4e62db7dfd0c17c88d9010b922be319ee45,2024-04-10T13:23:38.787000 CVE-2024-2788,0,0,088d65d193232fcb72b866e8c41bac364578345792bee984e7ddfd9f7a9953b9,2024-04-10T13:23:38.787000 -CVE-2024-27885,0,0,5369596a9513daaef11920142ecca9cad44fa3efda5fa33a70f7e19d6add0979,2024-06-10T21:15:51.903000 +CVE-2024-27885,0,1,919b2fa70f309158c80cef6f773433c035d64bc9a0f261cecbcc346fe38429a6,2024-06-11T08:15:50.787000 CVE-2024-27889,0,0,fafa75eb559da0736cbe5f975005d2c6007c4614a71da5e60cbad40c6f594a2b,2024-03-05T13:41:01.900000 CVE-2024-2789,0,0,c1532315076419efcbf6da1ca657d2b247ea6915b4f0b97827f3803af3830f0d,2024-04-10T13:23:38.787000 CVE-2024-27894,0,0,b3f2bb1a7a3eca33b6d3782ab00745453be745ced11b5b6cc9ac93cd4156f4f3,2024-05-01T17:15:30.557000 @@ -249093,13 +249094,13 @@ CVE-2024-31393,0,0,37f7a5992221d6bde3095665f91d96a5b3c012db649e1c1c87f1a16619b63 CVE-2024-31394,0,0,37a6c6ef2bd7d41356078f2b3597ee7803c3d40e7ebe2f84759f8ace62500d88,2024-05-22T12:46:53.887000 CVE-2024-31395,0,0,b30f8ee229d1f4f2f6537c380ff54efa3e461a52badeb419e6445201c1a3b054,2024-05-22T12:46:53.887000 CVE-2024-31396,0,0,b9f3c7c1150f9fb33024855b15874b092964398220773ed5b63437613ca6402c,2024-05-22T12:46:53.887000 -CVE-2024-31397,1,1,fd410cefeafb68aee70c768f9a0fda48768a5c67d520d80a234ae6e9bcae192a,2024-06-11T06:15:10.057000 -CVE-2024-31398,1,1,0b7bcc6eac5b3d442ea96d7fbc07e94d4d970fa86b6bd5545a4f7457e770e669,2024-06-11T06:15:10.347000 -CVE-2024-31399,1,1,9676addf2a8b62136dd145546201de91c486a33b0acfad9893446c5d5b26efbe,2024-06-11T06:15:10.490000 +CVE-2024-31397,0,0,fd410cefeafb68aee70c768f9a0fda48768a5c67d520d80a234ae6e9bcae192a,2024-06-11T06:15:10.057000 +CVE-2024-31398,0,0,0b7bcc6eac5b3d442ea96d7fbc07e94d4d970fa86b6bd5545a4f7457e770e669,2024-06-11T06:15:10.347000 +CVE-2024-31399,0,0,9676addf2a8b62136dd145546201de91c486a33b0acfad9893446c5d5b26efbe,2024-06-11T06:15:10.490000 CVE-2024-3140,0,0,8b1da86666a037f64c40af1ea9ecd283309aabcaa13d249aa0e2a07593cba475,2024-05-17T02:39:44.507000 CVE-2024-31400,0,0,571e90c89c324436c61bfdc535dd35c740568bde75455a6e686590a23b323549,2024-06-11T05:15:53.130000 CVE-2024-31401,0,0,3439f58a4c3513eb4eeaf76a66cc8317220b63b0282fd7e7c3c063bc877be93f,2024-06-11T05:15:53.320000 -CVE-2024-31402,1,1,df70ad92e4bf5b7acecb90dc4cc7f9c125f36816b1e13caf761f8e730e132965,2024-06-11T06:15:10.650000 +CVE-2024-31402,0,0,df70ad92e4bf5b7acecb90dc4cc7f9c125f36816b1e13caf761f8e730e132965,2024-06-11T06:15:10.650000 CVE-2024-31403,0,0,92c5bd46e4ffc852724f2939861650a337e969f86fd5d8df93cf756dd6500f2f,2024-06-11T05:15:53.397000 CVE-2024-31404,0,0,146d7af636a9d18ee51e0529992d414c931054e16425a0f9134f7d7bbef93cce,2024-06-11T05:15:53.463000 CVE-2024-31406,0,0,21585692d302884cf3150faa716f097a2673ce3764bdf3b78bdfd36f438a0484,2024-04-24T13:39:42.883000 @@ -251259,7 +251260,7 @@ CVE-2024-3547,0,0,fedd03df736ec1706076663d75a5df99f3108b401b2cf8280bfcd344106c99 CVE-2024-35474,0,0,7337b8e2371c2dae27b970b8112f0f83bae7631b3b28e88457636e9df18bc231,2024-06-10T18:06:22.600000 CVE-2024-35475,0,0,53effa9dc5e8213551bbdbda32e2dfa4c153fd878258c89c9e91bb711c7a017e,2024-05-22T19:15:09.373000 CVE-2024-3548,0,0,e23424ba819983ac2599fe48852cbfc904a10db222c55ccac010f7ec55b39028,2024-05-15T16:40:19.330000 -CVE-2024-3549,1,1,9185676ce3b637fef9ff67fa9b3169f6a08a3458d42508cd676ea69204080879,2024-06-11T07:15:41.017000 +CVE-2024-3549,0,0,9185676ce3b637fef9ff67fa9b3169f6a08a3458d42508cd676ea69204080879,2024-06-11T07:15:41.017000 CVE-2024-35492,0,0,a02d0a80cf6795bdd8349f855d15db1b17890353f3564619ef911d889417eed6,2024-05-30T13:15:41.297000 CVE-2024-3550,0,0,be0f7ed1cc8c69e2fefc881c953115f1247b844866a37cfd3935f1cbe0fa2b81,2024-05-02T18:00:37.360000 CVE-2024-35504,0,0,0960d865c9f0a37450856438a4637b3494eda5adde12ce8eee871eda221f0ce9,2024-05-30T18:19:11.743000 @@ -252074,7 +252075,7 @@ CVE-2024-3719,0,0,d2320674d04cefde56a0b36b463f74328d6f18494803030bdfe9b0b1b4374a CVE-2024-3720,0,0,f4e69514093cc630aeda39d0a41fe705e0d9916a1077cef429b7dcf05a404308,2024-06-04T19:20:23.660000 CVE-2024-3721,0,0,ec8dc4b0ad5d1d9ba11acb18015142f7d1715fd653f7ca2987e266e9c9e8ef01,2024-05-17T02:40:05.290000 CVE-2024-3722,0,0,7c1b4fae7e86bf4c1bc76a0d39819ffc592a7b598c7675ac0628daa278671c4c,2024-05-14T16:11:39.510000 -CVE-2024-3723,1,1,ed62ac93f26978a1b6bc84a25049cd22e212eaa7409abbff64eb926817290616,2024-06-11T06:15:10.793000 +CVE-2024-3723,0,0,ed62ac93f26978a1b6bc84a25049cd22e212eaa7409abbff64eb926817290616,2024-06-11T06:15:10.793000 CVE-2024-3724,0,0,a2f08bb0a2e36a5c374b862fb3e4beff315b3d6672953c5eeabe10290b435e2c,2024-05-02T18:00:37.360000 CVE-2024-3725,0,0,dd194c190207038aca40dcc17eaac7bd7c6f9f34e04d00c016e0de6cd9837da0,2024-05-02T18:00:37.360000 CVE-2024-3726,0,0,5d13f10d5b73efb7ab7c6448eee56ee5b7f1a739226807fb6eef2a4ab850d2f7,2024-05-30T13:15:41.297000 @@ -252482,6 +252483,7 @@ CVE-2024-4262,0,0,5dd4ebbaf190f9915875ef48f9c729e5248c1328b2e326ae4c2d79cba9dffd CVE-2024-4263,0,0,b1f2b30077721ef2ca6e11fb6bda0f0973b13bae19df9c4c6804c151ec0ef6fb,2024-05-16T13:03:05.353000 CVE-2024-4264,0,0,fb86e94ce42096b29068bc1af12f8df8e421d67d4a541250a03ae9bd98f16258,2024-05-20T13:00:34.807000 CVE-2024-4265,0,0,91d38fbd7b9c4ea0cd26c0f2028b5e1f8ee8c7d7e1c2c632d6b17cd2b7b69603,2024-05-02T18:00:37.360000 +CVE-2024-4266,1,1,f2347437c79a02fc0944e43158b9e18e086ae2a7908c024eea47a01b4c7236af,2024-06-11T08:15:50.850000 CVE-2024-4267,0,0,ce2653255d43ae5f4599b240b7efe5c0da7fc5b70a5363cdc03dcce3fe58b4ed,2024-05-24T01:15:30.977000 CVE-2024-4273,0,0,136233599d68a0536ba99c3313767218f535edf424c12fad350903aa42bf81fa,2024-06-04T16:57:41.053000 CVE-2024-4274,0,0,f007ffa253f631296ec9b2caed7d1faf5b31c76fe42ca7e92fd5b40ffb00a28e,2024-06-04T16:57:41.053000 @@ -252520,7 +252522,7 @@ CVE-2024-4314,0,0,917e44d69c76fb7381314145ce5012ff94d63258309b3ec3d14bdf6a76c85d CVE-2024-4316,0,0,5a945ac0a4e5139fc35505b0ad29ed6f4f78dc21cf82c5a713e2fc10353001af,2024-05-14T16:11:39.510000 CVE-2024-4317,0,0,1cfa82abc1d175e3780dda1cd435053fb9f133c668ec60968879d020da51382a,2024-05-14T16:11:39.510000 CVE-2024-4318,0,0,239860e6603bb5bfa00e4ee1537bbc84372d89871f96aaff86d4c34891350e3a,2024-05-16T13:03:05.353000 -CVE-2024-4319,1,1,9e22a0eda79272a3e241790bf9bf980072ff35cf4cebe45f406786f622d30fc5,2024-06-11T06:15:11.407000 +CVE-2024-4319,0,0,9e22a0eda79272a3e241790bf9bf980072ff35cf4cebe45f406786f622d30fc5,2024-06-11T06:15:11.407000 CVE-2024-4320,0,0,e47f6067fb0d170ab8dbc0733b163211a60f027ef1254b440e10fe81fe453718,2024-06-07T14:56:05.647000 CVE-2024-4321,0,0,52291df02a369d9bb947287933b2cb70cdba5b6bd48fddb1c2e0073aed4231c4,2024-05-16T13:03:05.353000 CVE-2024-4322,0,0,26c76f88e5d4d6383f99407dee54ae56585f3dcb15c99e63b32362e726df8b5e,2024-05-16T13:03:05.353000 @@ -253331,6 +253333,7 @@ CVE-2024-5524,0,0,e7e0fe13822be5d672aca31e1ee31e0f364bc62cac379db56dfa86e4e6649c CVE-2024-5525,0,0,27d51e0f90117d5f6e29d565f6efd293c83de249201cb9426e9c70697dbb918d,2024-05-31T13:01:46.727000 CVE-2024-5526,0,0,ff5b1387d351b0ba676942fad975bab52e39b4bce1932efe40f06f69ab4492f7,2024-06-05T12:53:50.240000 CVE-2024-5530,0,0,c88c71d0fc4a469ec001167841485a2cedfa66755e447a724b42beedce8d6868,2024-06-11T05:15:53.680000 +CVE-2024-5531,1,1,3a6fe62957d942440ddea7e1702427c2602def8435558d50911e6cece6a7b47d,2024-06-11T09:15:17.273000 CVE-2024-5536,0,0,68edb52432771856b464d791aa7fccb8518cf1ab9cd2d253ae0bbced65da7ce5,2024-06-05T12:53:50.240000 CVE-2024-5537,0,0,071475eb8c0f92cc8ea9522d658283ad0e8213ba6740ff46ee05e5b24c18c3d8,2024-05-30T17:15:34.583000 CVE-2024-5538,0,0,183cea799fa9410e329e72f326a10b8369aedcea9a5b7583a44bf33ecc305070,2024-05-31T11:15:09.923000