From 02fd38e17ef24793fb11cfe7f335df9d65fce610 Mon Sep 17 00:00:00 2001 From: cad-safe-bot Date: Wed, 22 May 2024 18:03:22 +0000 Subject: [PATCH] Auto-Update: 2024-05-22T18:00:31.735085+00:00 --- CVE-2023/CVE-2023-202xx/CVE-2023-20239.json | 55 +++++++ CVE-2023/CVE-2023-32xx/CVE-2023-3255.json | 6 +- CVE-2023/CVE-2023-35xx/CVE-2023-3567.json | 10 +- CVE-2023/CVE-2023-391xx/CVE-2023-39189.json | 10 +- CVE-2023/CVE-2023-391xx/CVE-2023-39192.json | 10 +- CVE-2023/CVE-2023-391xx/CVE-2023-39193.json | 10 +- CVE-2023/CVE-2023-391xx/CVE-2023-39194.json | 10 +- CVE-2023/CVE-2023-391xx/CVE-2023-39198.json | 10 +- CVE-2023/CVE-2023-41xx/CVE-2023-4133.json | 10 +- CVE-2023/CVE-2023-427xx/CVE-2023-42754.json | 10 +- CVE-2023/CVE-2023-427xx/CVE-2023-42755.json | 10 +- CVE-2023/CVE-2023-437xx/CVE-2023-43785.json | 6 +- CVE-2023/CVE-2023-437xx/CVE-2023-43786.json | 6 +- CVE-2023/CVE-2023-437xx/CVE-2023-43787.json | 6 +- CVE-2023/CVE-2023-437xx/CVE-2023-43788.json | 10 +- CVE-2023/CVE-2023-437xx/CVE-2023-43789.json | 10 +- CVE-2023/CVE-2023-46xx/CVE-2023-4692.json | 6 +- CVE-2023/CVE-2023-46xx/CVE-2023-4693.json | 6 +- CVE-2023/CVE-2023-470xx/CVE-2023-47038.json | 6 +- CVE-2023/CVE-2023-50xx/CVE-2023-5088.json | 6 +- CVE-2023/CVE-2023-53xx/CVE-2023-5367.json | 10 +- CVE-2023/CVE-2023-53xx/CVE-2023-5380.json | 10 +- CVE-2023/CVE-2023-60xx/CVE-2023-6004.json | 6 +- CVE-2023/CVE-2023-61xx/CVE-2023-6121.json | 10 +- CVE-2023/CVE-2023-61xx/CVE-2023-6176.json | 10 +- CVE-2023/CVE-2023-63xx/CVE-2023-6377.json | 10 +- CVE-2023/CVE-2023-64xx/CVE-2023-6478.json | 10 +- CVE-2023/CVE-2023-66xx/CVE-2023-6622.json | 10 +- CVE-2023/CVE-2023-66xx/CVE-2023-6681.json | 6 +- CVE-2023/CVE-2023-66xx/CVE-2023-6683.json | 6 +- CVE-2023/CVE-2023-66xx/CVE-2023-6693.json | 8 +- CVE-2023/CVE-2023-68xx/CVE-2023-6816.json | 6 +- CVE-2023/CVE-2023-69xx/CVE-2023-6915.json | 10 +- CVE-2023/CVE-2023-69xx/CVE-2023-6918.json | 6 +- CVE-2023/CVE-2023-70xx/CVE-2023-7008.json | 6 +- CVE-2024/CVE-2024-02xx/CVE-2024-0229.json | 10 +- CVE-2024/CVE-2024-04xx/CVE-2024-0408.json | 10 +- CVE-2024/CVE-2024-04xx/CVE-2024-0409.json | 10 +- CVE-2024/CVE-2024-06xx/CVE-2024-0690.json | 6 +- CVE-2024/CVE-2024-08xx/CVE-2024-0841.json | 10 +- CVE-2024/CVE-2024-10xx/CVE-2024-1048.json | 6 +- CVE-2024/CVE-2024-10xx/CVE-2024-1062.json | 6 +- CVE-2024/CVE-2024-13xx/CVE-2024-1394.json | 6 +- CVE-2024/CVE-2024-14xx/CVE-2024-1481.json | 6 +- CVE-2024/CVE-2024-17xx/CVE-2024-1753.json | 6 +- CVE-2024/CVE-2024-202xx/CVE-2024-20261.json | 55 +++++++ CVE-2024/CVE-2024-202xx/CVE-2024-20293.json | 55 +++++++ CVE-2024/CVE-2024-203xx/CVE-2024-20355.json | 55 +++++++ CVE-2024/CVE-2024-203xx/CVE-2024-20361.json | 55 +++++++ CVE-2024/CVE-2024-203xx/CVE-2024-20363.json | 55 +++++++ CVE-2024/CVE-2024-218xx/CVE-2024-21885.json | 10 +- CVE-2024/CVE-2024-218xx/CVE-2024-21886.json | 10 +- CVE-2024/CVE-2024-23xx/CVE-2024-2307.json | 6 +- CVE-2024/CVE-2024-24xx/CVE-2024-2494.json | 6 +- CVE-2024/CVE-2024-293xx/CVE-2024-29392.json | 20 +++ CVE-2024/CVE-2024-29xx/CVE-2024-2912.json | 14 +- CVE-2024/CVE-2024-30xx/CVE-2024-3019.json | 6 +- CVE-2024/CVE-2024-310xx/CVE-2024-31080.json | 10 +- CVE-2024/CVE-2024-310xx/CVE-2024-31081.json | 10 +- CVE-2024/CVE-2024-310xx/CVE-2024-31083.json | 10 +- CVE-2024/CVE-2024-332xx/CVE-2024-33222.json | 20 +++ CVE-2024/CVE-2024-332xx/CVE-2024-33223.json | 20 +++ CVE-2024/CVE-2024-332xx/CVE-2024-33224.json | 20 +++ CVE-2024/CVE-2024-332xx/CVE-2024-33225.json | 20 +++ CVE-2024/CVE-2024-332xx/CVE-2024-33226.json | 20 +++ CVE-2024/CVE-2024-332xx/CVE-2024-33227.json | 20 +++ CVE-2024/CVE-2024-332xx/CVE-2024-33228.json | 20 +++ CVE-2024/CVE-2024-344xx/CVE-2024-34448.json | 20 +++ CVE-2024/CVE-2024-353xx/CVE-2024-35362.json | 20 +++ CVE-2024/CVE-2024-360xx/CVE-2024-36050.json | 10 +- CVE-2024/CVE-2024-360xx/CVE-2024-36077.json | 43 +++++ CVE-2024/CVE-2024-45xx/CVE-2024-4563.json | 59 +++++++ CVE-2024/CVE-2024-51xx/CVE-2024-5157.json | 24 +++ CVE-2024/CVE-2024-51xx/CVE-2024-5158.json | 24 +++ CVE-2024/CVE-2024-51xx/CVE-2024-5159.json | 24 +++ CVE-2024/CVE-2024-51xx/CVE-2024-5160.json | 24 +++ CVE-2024/CVE-2024-51xx/CVE-2024-5166.json | 55 +++++++ README.md | 78 ++++++--- _state.csv | 171 +++++++++++--------- 79 files changed, 1322 insertions(+), 160 deletions(-) create mode 100644 CVE-2023/CVE-2023-202xx/CVE-2023-20239.json create mode 100644 CVE-2024/CVE-2024-202xx/CVE-2024-20261.json create mode 100644 CVE-2024/CVE-2024-202xx/CVE-2024-20293.json create mode 100644 CVE-2024/CVE-2024-203xx/CVE-2024-20355.json create mode 100644 CVE-2024/CVE-2024-203xx/CVE-2024-20361.json create mode 100644 CVE-2024/CVE-2024-203xx/CVE-2024-20363.json create mode 100644 CVE-2024/CVE-2024-293xx/CVE-2024-29392.json create mode 100644 CVE-2024/CVE-2024-332xx/CVE-2024-33222.json create mode 100644 CVE-2024/CVE-2024-332xx/CVE-2024-33223.json create mode 100644 CVE-2024/CVE-2024-332xx/CVE-2024-33224.json create mode 100644 CVE-2024/CVE-2024-332xx/CVE-2024-33225.json create mode 100644 CVE-2024/CVE-2024-332xx/CVE-2024-33226.json create mode 100644 CVE-2024/CVE-2024-332xx/CVE-2024-33227.json create mode 100644 CVE-2024/CVE-2024-332xx/CVE-2024-33228.json create mode 100644 CVE-2024/CVE-2024-344xx/CVE-2024-34448.json create mode 100644 CVE-2024/CVE-2024-353xx/CVE-2024-35362.json create mode 100644 CVE-2024/CVE-2024-360xx/CVE-2024-36077.json create mode 100644 CVE-2024/CVE-2024-45xx/CVE-2024-4563.json create mode 100644 CVE-2024/CVE-2024-51xx/CVE-2024-5157.json create mode 100644 CVE-2024/CVE-2024-51xx/CVE-2024-5158.json create mode 100644 CVE-2024/CVE-2024-51xx/CVE-2024-5159.json create mode 100644 CVE-2024/CVE-2024-51xx/CVE-2024-5160.json create mode 100644 CVE-2024/CVE-2024-51xx/CVE-2024-5166.json diff --git a/CVE-2023/CVE-2023-202xx/CVE-2023-20239.json b/CVE-2023/CVE-2023-202xx/CVE-2023-20239.json new file mode 100644 index 00000000000..31ad9b820d5 --- /dev/null +++ b/CVE-2023/CVE-2023-202xx/CVE-2023-20239.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2023-20239", + "sourceIdentifier": "ykramarz@cisco.com", + "published": "2024-05-22T17:16:02.760", + "lastModified": "2024-05-22T17:16:02.760", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability in the web-based management interface of Cisco Firepower Management Center (FMC) Software could allow an authenticated, remote attacker to conduct SQL injection attacks on an affected system. This vulnerability exists because the web-based management interface does not adequately validate user input. An attacker could exploit this vulnerability by authenticating to the application and sending crafted SQL queries to an affected system. A successful exploit could allow the attacker to obtain any data from the database, execute arbitrary commands on the underlying operating system, and elevate privileges to root. To exploit this vulnerability, an attacker would need at least Read Only user credentials." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "ykramarz@cisco.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "ykramarz@cisco.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "references": [ + { + "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-sqli-WFFDnNOs", + "source": "ykramarz@cisco.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-32xx/CVE-2023-3255.json b/CVE-2023/CVE-2023-32xx/CVE-2023-3255.json index 81b18b0edf7..428efb48ca8 100644 --- a/CVE-2023/CVE-2023-32xx/CVE-2023-3255.json +++ b/CVE-2023/CVE-2023-32xx/CVE-2023-3255.json @@ -2,7 +2,7 @@ "id": "CVE-2023-3255", "sourceIdentifier": "secalert@redhat.com", "published": "2023-09-13T17:15:09.877", - "lastModified": "2024-04-30T14:15:08.737", + "lastModified": "2024-05-22T17:16:03.847", "vulnStatus": "Modified", "descriptions": [ { @@ -138,6 +138,10 @@ "url": "https://access.redhat.com/errata/RHSA-2024:2135", "source": "secalert@redhat.com" }, + { + "url": "https://access.redhat.com/errata/RHSA-2024:2962", + "source": "secalert@redhat.com" + }, { "url": "https://access.redhat.com/security/cve/CVE-2023-3255", "source": "secalert@redhat.com", diff --git a/CVE-2023/CVE-2023-35xx/CVE-2023-3567.json b/CVE-2023/CVE-2023-35xx/CVE-2023-3567.json index a13df53aef9..51c7ea940ad 100644 --- a/CVE-2023/CVE-2023-35xx/CVE-2023-3567.json +++ b/CVE-2023/CVE-2023-35xx/CVE-2023-3567.json @@ -2,7 +2,7 @@ "id": "CVE-2023-3567", "sourceIdentifier": "secalert@redhat.com", "published": "2023-07-24T16:15:12.990", - "lastModified": "2024-04-30T14:15:08.910", + "lastModified": "2024-05-22T17:16:04.100", "vulnStatus": "Modified", "descriptions": [ { @@ -220,6 +220,14 @@ "url": "https://access.redhat.com/errata/RHSA-2024:2394", "source": "secalert@redhat.com" }, + { + "url": "https://access.redhat.com/errata/RHSA-2024:2950", + "source": "secalert@redhat.com" + }, + { + "url": "https://access.redhat.com/errata/RHSA-2024:3138", + "source": "secalert@redhat.com" + }, { "url": "https://access.redhat.com/security/cve/CVE-2023-3567", "source": "secalert@redhat.com", diff --git a/CVE-2023/CVE-2023-391xx/CVE-2023-39189.json b/CVE-2023/CVE-2023-391xx/CVE-2023-39189.json index c3d37b1dc90..2f1c96a24c8 100644 --- a/CVE-2023/CVE-2023-391xx/CVE-2023-39189.json +++ b/CVE-2023/CVE-2023-391xx/CVE-2023-39189.json @@ -2,7 +2,7 @@ "id": "CVE-2023-39189", "sourceIdentifier": "secalert@redhat.com", "published": "2023-10-09T18:15:10.160", - "lastModified": "2024-04-30T14:15:07.967", + "lastModified": "2024-05-22T17:16:03.030", "vulnStatus": "Modified", "descriptions": [ { @@ -138,6 +138,14 @@ "url": "https://access.redhat.com/errata/RHSA-2024:2394", "source": "secalert@redhat.com" }, + { + "url": "https://access.redhat.com/errata/RHSA-2024:2950", + "source": "secalert@redhat.com" + }, + { + "url": "https://access.redhat.com/errata/RHSA-2024:3138", + "source": "secalert@redhat.com" + }, { "url": "https://access.redhat.com/security/cve/CVE-2023-39189", "source": "secalert@redhat.com", diff --git a/CVE-2023/CVE-2023-391xx/CVE-2023-39192.json b/CVE-2023/CVE-2023-391xx/CVE-2023-39192.json index 2ca586f5605..dd42c6d3ee2 100644 --- a/CVE-2023/CVE-2023-391xx/CVE-2023-39192.json +++ b/CVE-2023/CVE-2023-391xx/CVE-2023-39192.json @@ -2,7 +2,7 @@ "id": "CVE-2023-39192", "sourceIdentifier": "secalert@redhat.com", "published": "2023-10-09T18:15:10.233", - "lastModified": "2024-01-11T19:15:09.757", + "lastModified": "2024-05-22T17:16:03.250", "vulnStatus": "Modified", "descriptions": [ { @@ -129,6 +129,14 @@ } ], "references": [ + { + "url": "https://access.redhat.com/errata/RHSA-2024:2950", + "source": "secalert@redhat.com" + }, + { + "url": "https://access.redhat.com/errata/RHSA-2024:3138", + "source": "secalert@redhat.com" + }, { "url": "https://access.redhat.com/security/cve/CVE-2023-39192", "source": "secalert@redhat.com", diff --git a/CVE-2023/CVE-2023-391xx/CVE-2023-39193.json b/CVE-2023/CVE-2023-391xx/CVE-2023-39193.json index 4edef87ec5e..dd257ccdebd 100644 --- a/CVE-2023/CVE-2023-391xx/CVE-2023-39193.json +++ b/CVE-2023/CVE-2023-391xx/CVE-2023-39193.json @@ -2,7 +2,7 @@ "id": "CVE-2023-39193", "sourceIdentifier": "secalert@redhat.com", "published": "2023-10-09T18:15:10.303", - "lastModified": "2024-04-30T14:15:08.127", + "lastModified": "2024-05-22T17:16:03.400", "vulnStatus": "Modified", "descriptions": [ { @@ -138,6 +138,14 @@ "url": "https://access.redhat.com/errata/RHSA-2024:2394", "source": "secalert@redhat.com" }, + { + "url": "https://access.redhat.com/errata/RHSA-2024:2950", + "source": "secalert@redhat.com" + }, + { + "url": "https://access.redhat.com/errata/RHSA-2024:3138", + "source": "secalert@redhat.com" + }, { "url": "https://access.redhat.com/security/cve/CVE-2023-39193", "source": "secalert@redhat.com", diff --git a/CVE-2023/CVE-2023-391xx/CVE-2023-39194.json b/CVE-2023/CVE-2023-391xx/CVE-2023-39194.json index c8273f06d3e..3d1bf5e91d8 100644 --- a/CVE-2023/CVE-2023-391xx/CVE-2023-39194.json +++ b/CVE-2023/CVE-2023-391xx/CVE-2023-39194.json @@ -2,7 +2,7 @@ "id": "CVE-2023-39194", "sourceIdentifier": "secalert@redhat.com", "published": "2023-10-09T18:15:10.367", - "lastModified": "2024-04-30T14:15:08.267", + "lastModified": "2024-05-22T17:16:03.547", "vulnStatus": "Modified", "descriptions": [ { @@ -168,6 +168,14 @@ "url": "https://access.redhat.com/errata/RHSA-2024:2394", "source": "secalert@redhat.com" }, + { + "url": "https://access.redhat.com/errata/RHSA-2024:2950", + "source": "secalert@redhat.com" + }, + { + "url": "https://access.redhat.com/errata/RHSA-2024:3138", + "source": "secalert@redhat.com" + }, { "url": "https://access.redhat.com/security/cve/CVE-2023-39194", "source": "secalert@redhat.com", diff --git a/CVE-2023/CVE-2023-391xx/CVE-2023-39198.json b/CVE-2023/CVE-2023-391xx/CVE-2023-39198.json index 789bcbb148c..c35c0ec0fdb 100644 --- a/CVE-2023/CVE-2023-391xx/CVE-2023-39198.json +++ b/CVE-2023/CVE-2023-391xx/CVE-2023-39198.json @@ -2,7 +2,7 @@ "id": "CVE-2023-39198", "sourceIdentifier": "secalert@redhat.com", "published": "2023-11-09T20:15:08.730", - "lastModified": "2024-04-30T14:15:08.383", + "lastModified": "2024-05-22T17:16:03.690", "vulnStatus": "Modified", "descriptions": [ { @@ -168,6 +168,14 @@ "url": "https://access.redhat.com/errata/RHSA-2024:2394", "source": "secalert@redhat.com" }, + { + "url": "https://access.redhat.com/errata/RHSA-2024:2950", + "source": "secalert@redhat.com" + }, + { + "url": "https://access.redhat.com/errata/RHSA-2024:3138", + "source": "secalert@redhat.com" + }, { "url": "https://access.redhat.com/security/cve/CVE-2023-39198", "source": "secalert@redhat.com", diff --git a/CVE-2023/CVE-2023-41xx/CVE-2023-4133.json b/CVE-2023/CVE-2023-41xx/CVE-2023-4133.json index 0d0f4712755..7621586ff15 100644 --- a/CVE-2023/CVE-2023-41xx/CVE-2023-4133.json +++ b/CVE-2023/CVE-2023-41xx/CVE-2023-4133.json @@ -2,7 +2,7 @@ "id": "CVE-2023-4133", "sourceIdentifier": "secalert@redhat.com", "published": "2023-08-03T15:15:33.940", - "lastModified": "2024-04-30T14:15:10.420", + "lastModified": "2024-05-22T17:16:05.990", "vulnStatus": "Modified", "descriptions": [ { @@ -134,6 +134,14 @@ "url": "https://access.redhat.com/errata/RHSA-2024:2394", "source": "secalert@redhat.com" }, + { + "url": "https://access.redhat.com/errata/RHSA-2024:2950", + "source": "secalert@redhat.com" + }, + { + "url": "https://access.redhat.com/errata/RHSA-2024:3138", + "source": "secalert@redhat.com" + }, { "url": "https://access.redhat.com/security/cve/CVE-2023-4133", "source": "secalert@redhat.com", diff --git a/CVE-2023/CVE-2023-427xx/CVE-2023-42754.json b/CVE-2023/CVE-2023-427xx/CVE-2023-42754.json index b5331ffaa0c..8b5adde75c6 100644 --- a/CVE-2023/CVE-2023-427xx/CVE-2023-42754.json +++ b/CVE-2023/CVE-2023-427xx/CVE-2023-42754.json @@ -2,7 +2,7 @@ "id": "CVE-2023-42754", "sourceIdentifier": "secalert@redhat.com", "published": "2023-10-05T19:15:11.413", - "lastModified": "2024-04-30T14:15:09.100", + "lastModified": "2024-05-22T17:16:04.360", "vulnStatus": "Modified", "descriptions": [ { @@ -158,6 +158,14 @@ "url": "https://access.redhat.com/errata/RHSA-2024:2394", "source": "secalert@redhat.com" }, + { + "url": "https://access.redhat.com/errata/RHSA-2024:2950", + "source": "secalert@redhat.com" + }, + { + "url": "https://access.redhat.com/errata/RHSA-2024:3138", + "source": "secalert@redhat.com" + }, { "url": "https://access.redhat.com/security/cve/CVE-2023-42754", "source": "secalert@redhat.com", diff --git a/CVE-2023/CVE-2023-427xx/CVE-2023-42755.json b/CVE-2023/CVE-2023-427xx/CVE-2023-42755.json index 54bea361e68..947d60cbf98 100644 --- a/CVE-2023/CVE-2023-427xx/CVE-2023-42755.json +++ b/CVE-2023/CVE-2023-427xx/CVE-2023-42755.json @@ -2,7 +2,7 @@ "id": "CVE-2023-42755", "sourceIdentifier": "secalert@redhat.com", "published": "2023-10-05T19:15:11.497", - "lastModified": "2024-01-11T19:15:11.317", + "lastModified": "2024-05-22T17:16:04.537", "vulnStatus": "Modified", "descriptions": [ { @@ -129,6 +129,14 @@ } ], "references": [ + { + "url": "https://access.redhat.com/errata/RHSA-2024:2950", + "source": "secalert@redhat.com" + }, + { + "url": "https://access.redhat.com/errata/RHSA-2024:3138", + "source": "secalert@redhat.com" + }, { "url": "https://access.redhat.com/security/cve/CVE-2023-42755", "source": "secalert@redhat.com", diff --git a/CVE-2023/CVE-2023-437xx/CVE-2023-43785.json b/CVE-2023/CVE-2023-437xx/CVE-2023-43785.json index bb5d113ce93..ce670193471 100644 --- a/CVE-2023/CVE-2023-437xx/CVE-2023-43785.json +++ b/CVE-2023/CVE-2023-437xx/CVE-2023-43785.json @@ -2,7 +2,7 @@ "id": "CVE-2023-43785", "sourceIdentifier": "secalert@redhat.com", "published": "2023-10-10T13:15:21.877", - "lastModified": "2024-04-30T14:15:09.453", + "lastModified": "2024-05-22T17:16:04.760", "vulnStatus": "Modified", "descriptions": [ { @@ -138,6 +138,10 @@ "url": "https://access.redhat.com/errata/RHSA-2024:2145", "source": "secalert@redhat.com" }, + { + "url": "https://access.redhat.com/errata/RHSA-2024:2973", + "source": "secalert@redhat.com" + }, { "url": "https://access.redhat.com/security/cve/CVE-2023-43785", "source": "secalert@redhat.com", diff --git a/CVE-2023/CVE-2023-437xx/CVE-2023-43786.json b/CVE-2023/CVE-2023-437xx/CVE-2023-43786.json index 4ae7af51630..5b7dba25dc3 100644 --- a/CVE-2023/CVE-2023-437xx/CVE-2023-43786.json +++ b/CVE-2023/CVE-2023-437xx/CVE-2023-43786.json @@ -2,7 +2,7 @@ "id": "CVE-2023-43786", "sourceIdentifier": "secalert@redhat.com", "published": "2023-10-10T13:15:22.023", - "lastModified": "2024-04-30T14:15:09.613", + "lastModified": "2024-05-22T17:16:04.927", "vulnStatus": "Modified", "descriptions": [ { @@ -142,6 +142,10 @@ "url": "https://access.redhat.com/errata/RHSA-2024:2145", "source": "secalert@redhat.com" }, + { + "url": "https://access.redhat.com/errata/RHSA-2024:2973", + "source": "secalert@redhat.com" + }, { "url": "https://access.redhat.com/security/cve/CVE-2023-43786", "source": "secalert@redhat.com", diff --git a/CVE-2023/CVE-2023-437xx/CVE-2023-43787.json b/CVE-2023/CVE-2023-437xx/CVE-2023-43787.json index 8e2f38dd179..56e0898e12c 100644 --- a/CVE-2023/CVE-2023-437xx/CVE-2023-43787.json +++ b/CVE-2023/CVE-2023-437xx/CVE-2023-43787.json @@ -2,7 +2,7 @@ "id": "CVE-2023-43787", "sourceIdentifier": "secalert@redhat.com", "published": "2023-10-10T13:15:22.083", - "lastModified": "2024-04-30T14:15:09.810", + "lastModified": "2024-05-22T17:16:05.057", "vulnStatus": "Modified", "descriptions": [ { @@ -142,6 +142,10 @@ "url": "https://access.redhat.com/errata/RHSA-2024:2145", "source": "secalert@redhat.com" }, + { + "url": "https://access.redhat.com/errata/RHSA-2024:2973", + "source": "secalert@redhat.com" + }, { "url": "https://access.redhat.com/security/cve/CVE-2023-43787", "source": "secalert@redhat.com", diff --git a/CVE-2023/CVE-2023-437xx/CVE-2023-43788.json b/CVE-2023/CVE-2023-437xx/CVE-2023-43788.json index 94bf0021bfa..3d8d68ffd4d 100644 --- a/CVE-2023/CVE-2023-437xx/CVE-2023-43788.json +++ b/CVE-2023/CVE-2023-437xx/CVE-2023-43788.json @@ -2,7 +2,7 @@ "id": "CVE-2023-43788", "sourceIdentifier": "secalert@redhat.com", "published": "2023-10-10T13:15:22.137", - "lastModified": "2024-04-30T14:15:09.963", + "lastModified": "2024-05-22T17:16:05.223", "vulnStatus": "Modified", "descriptions": [ { @@ -152,6 +152,14 @@ "url": "https://access.redhat.com/errata/RHSA-2024:2217", "source": "secalert@redhat.com" }, + { + "url": "https://access.redhat.com/errata/RHSA-2024:2974", + "source": "secalert@redhat.com" + }, + { + "url": "https://access.redhat.com/errata/RHSA-2024:3022", + "source": "secalert@redhat.com" + }, { "url": "https://access.redhat.com/security/cve/CVE-2023-43788", "source": "secalert@redhat.com", diff --git a/CVE-2023/CVE-2023-437xx/CVE-2023-43789.json b/CVE-2023/CVE-2023-437xx/CVE-2023-43789.json index 018fced3e1a..6bfea358191 100644 --- a/CVE-2023/CVE-2023-437xx/CVE-2023-43789.json +++ b/CVE-2023/CVE-2023-437xx/CVE-2023-43789.json @@ -2,7 +2,7 @@ "id": "CVE-2023-43789", "sourceIdentifier": "secalert@redhat.com", "published": "2023-10-12T12:15:10.710", - "lastModified": "2024-04-30T14:15:10.103", + "lastModified": "2024-05-22T17:16:05.443", "vulnStatus": "Modified", "descriptions": [ { @@ -142,6 +142,14 @@ "url": "https://access.redhat.com/errata/RHSA-2024:2217", "source": "secalert@redhat.com" }, + { + "url": "https://access.redhat.com/errata/RHSA-2024:2974", + "source": "secalert@redhat.com" + }, + { + "url": "https://access.redhat.com/errata/RHSA-2024:3022", + "source": "secalert@redhat.com" + }, { "url": "https://access.redhat.com/security/cve/CVE-2023-43789", "source": "secalert@redhat.com", diff --git a/CVE-2023/CVE-2023-46xx/CVE-2023-4692.json b/CVE-2023/CVE-2023-46xx/CVE-2023-4692.json index a6ca6e5842f..4f53751e0c9 100644 --- a/CVE-2023/CVE-2023-46xx/CVE-2023-4692.json +++ b/CVE-2023/CVE-2023-46xx/CVE-2023-4692.json @@ -2,7 +2,7 @@ "id": "CVE-2023-4692", "sourceIdentifier": "secalert@redhat.com", "published": "2023-10-25T18:17:41.743", - "lastModified": "2024-05-03T03:16:02.210", + "lastModified": "2024-05-22T17:16:06.140", "vulnStatus": "Modified", "descriptions": [ { @@ -123,6 +123,10 @@ "url": "https://access.redhat.com/errata/RHSA-2024:2456", "source": "secalert@redhat.com" }, + { + "url": "https://access.redhat.com/errata/RHSA-2024:3184", + "source": "secalert@redhat.com" + }, { "url": "https://access.redhat.com/security/cve/CVE-2023-4692", "source": "secalert@redhat.com", diff --git a/CVE-2023/CVE-2023-46xx/CVE-2023-4693.json b/CVE-2023/CVE-2023-46xx/CVE-2023-4693.json index 38a715c7f07..d6bb3ed80ce 100644 --- a/CVE-2023/CVE-2023-46xx/CVE-2023-4693.json +++ b/CVE-2023/CVE-2023-46xx/CVE-2023-4693.json @@ -2,7 +2,7 @@ "id": "CVE-2023-4693", "sourceIdentifier": "secalert@redhat.com", "published": "2023-10-25T18:17:41.817", - "lastModified": "2024-05-03T03:16:02.370", + "lastModified": "2024-05-22T17:16:06.530", "vulnStatus": "Modified", "descriptions": [ { @@ -123,6 +123,10 @@ "url": "https://access.redhat.com/errata/RHSA-2024:2456", "source": "secalert@redhat.com" }, + { + "url": "https://access.redhat.com/errata/RHSA-2024:3184", + "source": "secalert@redhat.com" + }, { "url": "https://access.redhat.com/security/cve/CVE-2023-4693", "source": "secalert@redhat.com", diff --git a/CVE-2023/CVE-2023-470xx/CVE-2023-47038.json b/CVE-2023/CVE-2023-470xx/CVE-2023-47038.json index 67ba6cea911..8312cb2df6f 100644 --- a/CVE-2023/CVE-2023-470xx/CVE-2023-47038.json +++ b/CVE-2023/CVE-2023-470xx/CVE-2023-47038.json @@ -2,7 +2,7 @@ "id": "CVE-2023-47038", "sourceIdentifier": "secalert@redhat.com", "published": "2023-12-18T14:15:08.933", - "lastModified": "2024-04-30T14:15:10.257", + "lastModified": "2024-05-22T17:16:05.677", "vulnStatus": "Modified", "descriptions": [ { @@ -119,6 +119,10 @@ "url": "https://access.redhat.com/errata/RHSA-2024:2228", "source": "secalert@redhat.com" }, + { + "url": "https://access.redhat.com/errata/RHSA-2024:3128", + "source": "secalert@redhat.com" + }, { "url": "https://access.redhat.com/security/cve/CVE-2023-47038", "source": "secalert@redhat.com", diff --git a/CVE-2023/CVE-2023-50xx/CVE-2023-5088.json b/CVE-2023/CVE-2023-50xx/CVE-2023-5088.json index aa2f3a1699b..376d4ffa82d 100644 --- a/CVE-2023/CVE-2023-50xx/CVE-2023-5088.json +++ b/CVE-2023/CVE-2023-50xx/CVE-2023-5088.json @@ -2,7 +2,7 @@ "id": "CVE-2023-5088", "sourceIdentifier": "secalert@redhat.com", "published": "2023-11-03T14:15:08.560", - "lastModified": "2024-04-30T14:15:10.953", + "lastModified": "2024-05-22T17:16:06.710", "vulnStatus": "Modified", "descriptions": [ { @@ -128,6 +128,10 @@ "url": "https://access.redhat.com/errata/RHSA-2024:2135", "source": "secalert@redhat.com" }, + { + "url": "https://access.redhat.com/errata/RHSA-2024:2962", + "source": "secalert@redhat.com" + }, { "url": "https://access.redhat.com/security/cve/CVE-2023-5088", "source": "secalert@redhat.com", diff --git a/CVE-2023/CVE-2023-53xx/CVE-2023-5367.json b/CVE-2023/CVE-2023-53xx/CVE-2023-5367.json index 13d7b520171..39ac643d711 100644 --- a/CVE-2023/CVE-2023-53xx/CVE-2023-5367.json +++ b/CVE-2023/CVE-2023-53xx/CVE-2023-5367.json @@ -2,7 +2,7 @@ "id": "CVE-2023-5367", "sourceIdentifier": "secalert@redhat.com", "published": "2023-10-25T20:15:18.323", - "lastModified": "2024-04-30T14:15:11.280", + "lastModified": "2024-05-22T17:16:07.050", "vulnStatus": "Modified", "descriptions": [ { @@ -295,6 +295,14 @@ "url": "https://access.redhat.com/errata/RHSA-2024:2170", "source": "secalert@redhat.com" }, + { + "url": "https://access.redhat.com/errata/RHSA-2024:2995", + "source": "secalert@redhat.com" + }, + { + "url": "https://access.redhat.com/errata/RHSA-2024:2996", + "source": "secalert@redhat.com" + }, { "url": "https://access.redhat.com/security/cve/CVE-2023-5367", "source": "secalert@redhat.com", diff --git a/CVE-2023/CVE-2023-53xx/CVE-2023-5380.json b/CVE-2023/CVE-2023-53xx/CVE-2023-5380.json index 121089760a8..2ad1043c8db 100644 --- a/CVE-2023/CVE-2023-53xx/CVE-2023-5380.json +++ b/CVE-2023/CVE-2023-53xx/CVE-2023-5380.json @@ -2,7 +2,7 @@ "id": "CVE-2023-5380", "sourceIdentifier": "secalert@redhat.com", "published": "2023-10-25T20:15:18.503", - "lastModified": "2024-04-30T14:15:11.513", + "lastModified": "2024-05-22T17:16:07.540", "vulnStatus": "Modified", "descriptions": [ { @@ -190,6 +190,14 @@ "url": "https://access.redhat.com/errata/RHSA-2024:2298", "source": "secalert@redhat.com" }, + { + "url": "https://access.redhat.com/errata/RHSA-2024:2995", + "source": "secalert@redhat.com" + }, + { + "url": "https://access.redhat.com/errata/RHSA-2024:3067", + "source": "secalert@redhat.com" + }, { "url": "https://access.redhat.com/security/cve/CVE-2023-5380", "source": "secalert@redhat.com", diff --git a/CVE-2023/CVE-2023-60xx/CVE-2023-6004.json b/CVE-2023/CVE-2023-60xx/CVE-2023-6004.json index 15dfd91263c..671099dbd5e 100644 --- a/CVE-2023/CVE-2023-60xx/CVE-2023-6004.json +++ b/CVE-2023/CVE-2023-60xx/CVE-2023-6004.json @@ -2,7 +2,7 @@ "id": "CVE-2023-6004", "sourceIdentifier": "secalert@redhat.com", "published": "2024-01-03T17:15:11.623", - "lastModified": "2024-04-30T15:15:51.593", + "lastModified": "2024-05-22T17:16:07.773", "vulnStatus": "Modified", "descriptions": [ { @@ -136,6 +136,10 @@ "url": "https://access.redhat.com/errata/RHSA-2024:2504", "source": "secalert@redhat.com" }, + { + "url": "https://access.redhat.com/errata/RHSA-2024:3233", + "source": "secalert@redhat.com" + }, { "url": "https://access.redhat.com/security/cve/CVE-2023-6004", "source": "secalert@redhat.com", diff --git a/CVE-2023/CVE-2023-61xx/CVE-2023-6121.json b/CVE-2023/CVE-2023-61xx/CVE-2023-6121.json index 0b6e916d1c6..33ab3a9953c 100644 --- a/CVE-2023/CVE-2023-61xx/CVE-2023-6121.json +++ b/CVE-2023/CVE-2023-61xx/CVE-2023-6121.json @@ -2,7 +2,7 @@ "id": "CVE-2023-6121", "sourceIdentifier": "secalert@redhat.com", "published": "2023-11-16T15:15:11.197", - "lastModified": "2024-04-30T14:15:11.823", + "lastModified": "2024-05-22T17:16:08.007", "vulnStatus": "Modified", "descriptions": [ { @@ -117,6 +117,14 @@ "url": "https://access.redhat.com/errata/RHSA-2024:2394", "source": "secalert@redhat.com" }, + { + "url": "https://access.redhat.com/errata/RHSA-2024:2950", + "source": "secalert@redhat.com" + }, + { + "url": "https://access.redhat.com/errata/RHSA-2024:3138", + "source": "secalert@redhat.com" + }, { "url": "https://access.redhat.com/security/cve/CVE-2023-6121", "source": "secalert@redhat.com", diff --git a/CVE-2023/CVE-2023-61xx/CVE-2023-6176.json b/CVE-2023/CVE-2023-61xx/CVE-2023-6176.json index 89aa2620482..95d10d2937f 100644 --- a/CVE-2023/CVE-2023-61xx/CVE-2023-6176.json +++ b/CVE-2023/CVE-2023-61xx/CVE-2023-6176.json @@ -2,7 +2,7 @@ "id": "CVE-2023-6176", "sourceIdentifier": "secalert@redhat.com", "published": "2023-11-16T18:15:07.483", - "lastModified": "2024-04-30T14:15:11.960", + "lastModified": "2024-05-22T17:16:08.200", "vulnStatus": "Modified", "descriptions": [ { @@ -116,6 +116,14 @@ "url": "https://access.redhat.com/errata/RHSA-2024:2394", "source": "secalert@redhat.com" }, + { + "url": "https://access.redhat.com/errata/RHSA-2024:2950", + "source": "secalert@redhat.com" + }, + { + "url": "https://access.redhat.com/errata/RHSA-2024:3138", + "source": "secalert@redhat.com" + }, { "url": "https://access.redhat.com/security/cve/CVE-2023-6176", "source": "secalert@redhat.com", diff --git a/CVE-2023/CVE-2023-63xx/CVE-2023-6377.json b/CVE-2023/CVE-2023-63xx/CVE-2023-6377.json index 8e81e07f891..f51401c2458 100644 --- a/CVE-2023/CVE-2023-63xx/CVE-2023-6377.json +++ b/CVE-2023/CVE-2023-63xx/CVE-2023-6377.json @@ -2,7 +2,7 @@ "id": "CVE-2023-6377", "sourceIdentifier": "secalert@redhat.com", "published": "2023-12-13T07:15:30.030", - "lastModified": "2024-04-30T14:15:12.063", + "lastModified": "2024-05-22T17:16:08.530", "vulnStatus": "Modified", "descriptions": [ { @@ -299,6 +299,14 @@ "url": "https://access.redhat.com/errata/RHSA-2024:2170", "source": "secalert@redhat.com" }, + { + "url": "https://access.redhat.com/errata/RHSA-2024:2995", + "source": "secalert@redhat.com" + }, + { + "url": "https://access.redhat.com/errata/RHSA-2024:2996", + "source": "secalert@redhat.com" + }, { "url": "https://access.redhat.com/security/cve/CVE-2023-6377", "source": "secalert@redhat.com", diff --git a/CVE-2023/CVE-2023-64xx/CVE-2023-6478.json b/CVE-2023/CVE-2023-64xx/CVE-2023-6478.json index b13c28c2131..103343f4ba4 100644 --- a/CVE-2023/CVE-2023-64xx/CVE-2023-6478.json +++ b/CVE-2023/CVE-2023-64xx/CVE-2023-6478.json @@ -2,7 +2,7 @@ "id": "CVE-2023-6478", "sourceIdentifier": "secalert@redhat.com", "published": "2023-12-13T07:15:31.213", - "lastModified": "2024-04-30T14:15:12.263", + "lastModified": "2024-05-22T17:16:08.797", "vulnStatus": "Modified", "descriptions": [ { @@ -299,6 +299,14 @@ "url": "https://access.redhat.com/errata/RHSA-2024:2170", "source": "secalert@redhat.com" }, + { + "url": "https://access.redhat.com/errata/RHSA-2024:2995", + "source": "secalert@redhat.com" + }, + { + "url": "https://access.redhat.com/errata/RHSA-2024:2996", + "source": "secalert@redhat.com" + }, { "url": "https://access.redhat.com/security/cve/CVE-2023-6478", "source": "secalert@redhat.com", diff --git a/CVE-2023/CVE-2023-66xx/CVE-2023-6622.json b/CVE-2023/CVE-2023-66xx/CVE-2023-6622.json index 2b7e233ad92..168af3a274b 100644 --- a/CVE-2023/CVE-2023-66xx/CVE-2023-6622.json +++ b/CVE-2023/CVE-2023-66xx/CVE-2023-6622.json @@ -2,7 +2,7 @@ "id": "CVE-2023-6622", "sourceIdentifier": "secalert@redhat.com", "published": "2023-12-08T18:15:07.163", - "lastModified": "2024-04-30T14:15:12.790", + "lastModified": "2024-05-22T17:16:09.020", "vulnStatus": "Modified", "descriptions": [ { @@ -143,6 +143,14 @@ "url": "https://access.redhat.com/errata/RHSA-2024:2394", "source": "secalert@redhat.com" }, + { + "url": "https://access.redhat.com/errata/RHSA-2024:2950", + "source": "secalert@redhat.com" + }, + { + "url": "https://access.redhat.com/errata/RHSA-2024:3138", + "source": "secalert@redhat.com" + }, { "url": "https://access.redhat.com/security/cve/CVE-2023-6622", "source": "secalert@redhat.com", diff --git a/CVE-2023/CVE-2023-66xx/CVE-2023-6681.json b/CVE-2023/CVE-2023-66xx/CVE-2023-6681.json index a309a666777..eb63566f901 100644 --- a/CVE-2023/CVE-2023-66xx/CVE-2023-6681.json +++ b/CVE-2023/CVE-2023-66xx/CVE-2023-6681.json @@ -2,7 +2,7 @@ "id": "CVE-2023-6681", "sourceIdentifier": "secalert@redhat.com", "published": "2024-02-12T14:15:08.003", - "lastModified": "2024-04-18T18:15:08.993", + "lastModified": "2024-05-22T17:16:09.207", "vulnStatus": "Awaiting Analysis", "descriptions": [ { @@ -51,6 +51,10 @@ } ], "references": [ + { + "url": "https://access.redhat.com/errata/RHSA-2024:3267", + "source": "secalert@redhat.com" + }, { "url": "https://access.redhat.com/security/cve/CVE-2023-6681", "source": "secalert@redhat.com" diff --git a/CVE-2023/CVE-2023-66xx/CVE-2023-6683.json b/CVE-2023/CVE-2023-66xx/CVE-2023-6683.json index d5128823c9c..d298c7aa95f 100644 --- a/CVE-2023/CVE-2023-66xx/CVE-2023-6683.json +++ b/CVE-2023/CVE-2023-66xx/CVE-2023-6683.json @@ -2,7 +2,7 @@ "id": "CVE-2023-6683", "sourceIdentifier": "secalert@redhat.com", "published": "2024-01-12T19:15:11.480", - "lastModified": "2024-04-30T14:15:12.930", + "lastModified": "2024-05-22T17:16:09.600", "vulnStatus": "Modified", "descriptions": [ { @@ -124,6 +124,10 @@ "url": "https://access.redhat.com/errata/RHSA-2024:2135", "source": "secalert@redhat.com" }, + { + "url": "https://access.redhat.com/errata/RHSA-2024:2962", + "source": "secalert@redhat.com" + }, { "url": "https://access.redhat.com/security/cve/CVE-2023-6683", "source": "secalert@redhat.com", diff --git a/CVE-2023/CVE-2023-66xx/CVE-2023-6693.json b/CVE-2023/CVE-2023-66xx/CVE-2023-6693.json index cf86a7014ff..e2f41c9ae64 100644 --- a/CVE-2023/CVE-2023-66xx/CVE-2023-6693.json +++ b/CVE-2023/CVE-2023-66xx/CVE-2023-6693.json @@ -2,8 +2,8 @@ "id": "CVE-2023-6693", "sourceIdentifier": "secalert@redhat.com", "published": "2024-01-02T10:15:08.930", - "lastModified": "2024-03-08T17:57:54.067", - "vulnStatus": "Analyzed", + "lastModified": "2024-05-22T17:16:09.817", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -139,6 +139,10 @@ } ], "references": [ + { + "url": "https://access.redhat.com/errata/RHSA-2024:2962", + "source": "secalert@redhat.com" + }, { "url": "https://access.redhat.com/security/cve/CVE-2023-6693", "source": "secalert@redhat.com", diff --git a/CVE-2023/CVE-2023-68xx/CVE-2023-6816.json b/CVE-2023/CVE-2023-68xx/CVE-2023-6816.json index 3c7041bf23f..fcf0483c6c5 100644 --- a/CVE-2023/CVE-2023-68xx/CVE-2023-6816.json +++ b/CVE-2023/CVE-2023-68xx/CVE-2023-6816.json @@ -2,7 +2,7 @@ "id": "CVE-2023-6816", "sourceIdentifier": "secalert@redhat.com", "published": "2024-01-18T05:15:08.607", - "lastModified": "2024-04-30T14:15:13.080", + "lastModified": "2024-05-22T17:16:09.970", "vulnStatus": "Modified", "descriptions": [ { @@ -219,6 +219,10 @@ "url": "https://access.redhat.com/errata/RHSA-2024:2170", "source": "secalert@redhat.com" }, + { + "url": "https://access.redhat.com/errata/RHSA-2024:2996", + "source": "secalert@redhat.com" + }, { "url": "https://access.redhat.com/security/cve/CVE-2023-6816", "source": "secalert@redhat.com", diff --git a/CVE-2023/CVE-2023-69xx/CVE-2023-6915.json b/CVE-2023/CVE-2023-69xx/CVE-2023-6915.json index 4ee96fc7d7e..2eba2f3081e 100644 --- a/CVE-2023/CVE-2023-69xx/CVE-2023-6915.json +++ b/CVE-2023/CVE-2023-69xx/CVE-2023-6915.json @@ -2,7 +2,7 @@ "id": "CVE-2023-6915", "sourceIdentifier": "secalert@redhat.com", "published": "2024-01-15T10:15:26.627", - "lastModified": "2024-04-30T14:15:13.277", + "lastModified": "2024-05-22T17:16:10.197", "vulnStatus": "Modified", "descriptions": [ { @@ -133,6 +133,14 @@ "url": "https://access.redhat.com/errata/RHSA-2024:2394", "source": "secalert@redhat.com" }, + { + "url": "https://access.redhat.com/errata/RHSA-2024:2950", + "source": "secalert@redhat.com" + }, + { + "url": "https://access.redhat.com/errata/RHSA-2024:3138", + "source": "secalert@redhat.com" + }, { "url": "https://access.redhat.com/security/cve/CVE-2023-6915", "source": "secalert@redhat.com", diff --git a/CVE-2023/CVE-2023-69xx/CVE-2023-6918.json b/CVE-2023/CVE-2023-69xx/CVE-2023-6918.json index 474ecae24ce..88a5186347c 100644 --- a/CVE-2023/CVE-2023-69xx/CVE-2023-6918.json +++ b/CVE-2023/CVE-2023-69xx/CVE-2023-6918.json @@ -2,7 +2,7 @@ "id": "CVE-2023-6918", "sourceIdentifier": "secalert@redhat.com", "published": "2023-12-19T00:15:08.460", - "lastModified": "2024-04-30T15:15:51.930", + "lastModified": "2024-05-22T17:16:10.383", "vulnStatus": "Modified", "descriptions": [ { @@ -141,6 +141,10 @@ "url": "https://access.redhat.com/errata/RHSA-2024:2504", "source": "secalert@redhat.com" }, + { + "url": "https://access.redhat.com/errata/RHSA-2024:3233", + "source": "secalert@redhat.com" + }, { "url": "https://access.redhat.com/security/cve/CVE-2023-6918", "source": "secalert@redhat.com", diff --git a/CVE-2023/CVE-2023-70xx/CVE-2023-7008.json b/CVE-2023/CVE-2023-70xx/CVE-2023-7008.json index 44bc8cb4793..a19692d0855 100644 --- a/CVE-2023/CVE-2023-70xx/CVE-2023-7008.json +++ b/CVE-2023/CVE-2023-70xx/CVE-2023-7008.json @@ -2,7 +2,7 @@ "id": "CVE-2023-7008", "sourceIdentifier": "secalert@redhat.com", "published": "2023-12-23T13:15:07.573", - "lastModified": "2024-04-30T14:15:13.513", + "lastModified": "2024-05-22T17:16:10.830", "vulnStatus": "Modified", "descriptions": [ { @@ -119,6 +119,10 @@ "url": "https://access.redhat.com/errata/RHSA-2024:2463", "source": "secalert@redhat.com" }, + { + "url": "https://access.redhat.com/errata/RHSA-2024:3203", + "source": "secalert@redhat.com" + }, { "url": "https://access.redhat.com/security/cve/CVE-2023-7008", "source": "secalert@redhat.com", diff --git a/CVE-2024/CVE-2024-02xx/CVE-2024-0229.json b/CVE-2024/CVE-2024-02xx/CVE-2024-0229.json index d3065abffbe..b2193124367 100644 --- a/CVE-2024/CVE-2024-02xx/CVE-2024-0229.json +++ b/CVE-2024/CVE-2024-02xx/CVE-2024-0229.json @@ -2,7 +2,7 @@ "id": "CVE-2024-0229", "sourceIdentifier": "secalert@redhat.com", "published": "2024-02-09T07:16:00.107", - "lastModified": "2024-04-30T14:15:13.677", + "lastModified": "2024-05-22T17:16:11.003", "vulnStatus": "Awaiting Analysis", "descriptions": [ { @@ -99,6 +99,14 @@ "url": "https://access.redhat.com/errata/RHSA-2024:2170", "source": "secalert@redhat.com" }, + { + "url": "https://access.redhat.com/errata/RHSA-2024:2995", + "source": "secalert@redhat.com" + }, + { + "url": "https://access.redhat.com/errata/RHSA-2024:2996", + "source": "secalert@redhat.com" + }, { "url": "https://access.redhat.com/security/cve/CVE-2024-0229", "source": "secalert@redhat.com" diff --git a/CVE-2024/CVE-2024-04xx/CVE-2024-0408.json b/CVE-2024/CVE-2024-04xx/CVE-2024-0408.json index 7ec5394fe37..6da405d37d0 100644 --- a/CVE-2024/CVE-2024-04xx/CVE-2024-0408.json +++ b/CVE-2024/CVE-2024-04xx/CVE-2024-0408.json @@ -2,7 +2,7 @@ "id": "CVE-2024-0408", "sourceIdentifier": "secalert@redhat.com", "published": "2024-01-18T16:15:08.380", - "lastModified": "2024-04-30T14:15:13.800", + "lastModified": "2024-05-22T17:16:11.160", "vulnStatus": "Modified", "descriptions": [ { @@ -196,6 +196,14 @@ "url": "https://access.redhat.com/errata/RHSA-2024:2170", "source": "secalert@redhat.com" }, + { + "url": "https://access.redhat.com/errata/RHSA-2024:2995", + "source": "secalert@redhat.com" + }, + { + "url": "https://access.redhat.com/errata/RHSA-2024:2996", + "source": "secalert@redhat.com" + }, { "url": "https://access.redhat.com/security/cve/CVE-2024-0408", "source": "secalert@redhat.com", diff --git a/CVE-2024/CVE-2024-04xx/CVE-2024-0409.json b/CVE-2024/CVE-2024-04xx/CVE-2024-0409.json index d5ebde64aa1..57320df2b0b 100644 --- a/CVE-2024/CVE-2024-04xx/CVE-2024-0409.json +++ b/CVE-2024/CVE-2024-04xx/CVE-2024-0409.json @@ -2,7 +2,7 @@ "id": "CVE-2024-0409", "sourceIdentifier": "secalert@redhat.com", "published": "2024-01-18T16:15:08.593", - "lastModified": "2024-04-30T14:15:13.917", + "lastModified": "2024-05-22T17:16:11.320", "vulnStatus": "Modified", "descriptions": [ { @@ -196,6 +196,14 @@ "url": "https://access.redhat.com/errata/RHSA-2024:2170", "source": "secalert@redhat.com" }, + { + "url": "https://access.redhat.com/errata/RHSA-2024:2995", + "source": "secalert@redhat.com" + }, + { + "url": "https://access.redhat.com/errata/RHSA-2024:2996", + "source": "secalert@redhat.com" + }, { "url": "https://access.redhat.com/security/cve/CVE-2024-0409", "source": "secalert@redhat.com", diff --git a/CVE-2024/CVE-2024-06xx/CVE-2024-0690.json b/CVE-2024/CVE-2024-06xx/CVE-2024-0690.json index 177b971aa01..26a8a39faee 100644 --- a/CVE-2024/CVE-2024-06xx/CVE-2024-0690.json +++ b/CVE-2024/CVE-2024-06xx/CVE-2024-0690.json @@ -2,7 +2,7 @@ "id": "CVE-2024-0690", "sourceIdentifier": "secalert@redhat.com", "published": "2024-02-06T12:15:55.530", - "lastModified": "2024-04-30T14:15:14.177", + "lastModified": "2024-05-22T17:16:11.487", "vulnStatus": "Modified", "descriptions": [ { @@ -196,6 +196,10 @@ "url": "https://access.redhat.com/errata/RHSA-2024:2246", "source": "secalert@redhat.com" }, + { + "url": "https://access.redhat.com/errata/RHSA-2024:3043", + "source": "secalert@redhat.com" + }, { "url": "https://access.redhat.com/security/cve/CVE-2024-0690", "source": "secalert@redhat.com", diff --git a/CVE-2024/CVE-2024-08xx/CVE-2024-0841.json b/CVE-2024/CVE-2024-08xx/CVE-2024-0841.json index 6ba4a1ddcf1..7b3f1acaba3 100644 --- a/CVE-2024/CVE-2024-08xx/CVE-2024-0841.json +++ b/CVE-2024/CVE-2024-08xx/CVE-2024-0841.json @@ -2,7 +2,7 @@ "id": "CVE-2024-0841", "sourceIdentifier": "secalert@redhat.com", "published": "2024-01-28T12:15:52.737", - "lastModified": "2024-04-30T14:15:14.350", + "lastModified": "2024-05-22T17:16:11.667", "vulnStatus": "Modified", "descriptions": [ { @@ -112,6 +112,14 @@ "url": "https://access.redhat.com/errata/RHSA-2024:2394", "source": "secalert@redhat.com" }, + { + "url": "https://access.redhat.com/errata/RHSA-2024:2950", + "source": "secalert@redhat.com" + }, + { + "url": "https://access.redhat.com/errata/RHSA-2024:3138", + "source": "secalert@redhat.com" + }, { "url": "https://access.redhat.com/security/cve/CVE-2024-0841", "source": "secalert@redhat.com", diff --git a/CVE-2024/CVE-2024-10xx/CVE-2024-1048.json b/CVE-2024/CVE-2024-10xx/CVE-2024-1048.json index 3ca34eee88a..d9bef876f15 100644 --- a/CVE-2024/CVE-2024-10xx/CVE-2024-1048.json +++ b/CVE-2024/CVE-2024-10xx/CVE-2024-1048.json @@ -2,7 +2,7 @@ "id": "CVE-2024-1048", "sourceIdentifier": "secalert@redhat.com", "published": "2024-02-06T18:15:59.250", - "lastModified": "2024-04-30T14:15:14.463", + "lastModified": "2024-05-22T17:16:11.850", "vulnStatus": "Modified", "descriptions": [ { @@ -145,6 +145,10 @@ "url": "https://access.redhat.com/errata/RHSA-2024:2456", "source": "secalert@redhat.com" }, + { + "url": "https://access.redhat.com/errata/RHSA-2024:3184", + "source": "secalert@redhat.com" + }, { "url": "https://access.redhat.com/security/cve/CVE-2024-1048", "source": "secalert@redhat.com", diff --git a/CVE-2024/CVE-2024-10xx/CVE-2024-1062.json b/CVE-2024/CVE-2024-10xx/CVE-2024-1062.json index 3704be265c1..1cc93799cec 100644 --- a/CVE-2024/CVE-2024-10xx/CVE-2024-1062.json +++ b/CVE-2024/CVE-2024-10xx/CVE-2024-1062.json @@ -2,7 +2,7 @@ "id": "CVE-2024-1062", "sourceIdentifier": "secalert@redhat.com", "published": "2024-02-12T13:15:09.210", - "lastModified": "2024-03-19T17:15:09.707", + "lastModified": "2024-05-22T17:16:12.023", "vulnStatus": "Awaiting Analysis", "descriptions": [ { @@ -59,6 +59,10 @@ "url": "https://access.redhat.com/errata/RHSA-2024:1372", "source": "secalert@redhat.com" }, + { + "url": "https://access.redhat.com/errata/RHSA-2024:3047", + "source": "secalert@redhat.com" + }, { "url": "https://access.redhat.com/security/cve/CVE-2024-1062", "source": "secalert@redhat.com" diff --git a/CVE-2024/CVE-2024-13xx/CVE-2024-1394.json b/CVE-2024/CVE-2024-13xx/CVE-2024-1394.json index 702d3bb077d..f4ddc69b19a 100644 --- a/CVE-2024/CVE-2024-13xx/CVE-2024-1394.json +++ b/CVE-2024/CVE-2024-13xx/CVE-2024-1394.json @@ -2,7 +2,7 @@ "id": "CVE-2024-1394", "sourceIdentifier": "secalert@redhat.com", "published": "2024-03-21T13:00:08.037", - "lastModified": "2024-04-30T20:15:07.090", + "lastModified": "2024-05-22T17:16:12.157", "vulnStatus": "Awaiting Analysis", "descriptions": [ { @@ -123,6 +123,10 @@ "url": "https://access.redhat.com/errata/RHSA-2024:2569", "source": "secalert@redhat.com" }, + { + "url": "https://access.redhat.com/errata/RHSA-2024:3265", + "source": "secalert@redhat.com" + }, { "url": "https://access.redhat.com/security/cve/CVE-2024-1394", "source": "secalert@redhat.com" diff --git a/CVE-2024/CVE-2024-14xx/CVE-2024-1481.json b/CVE-2024/CVE-2024-14xx/CVE-2024-1481.json index 904c7e227dc..c21919cf826 100644 --- a/CVE-2024/CVE-2024-14xx/CVE-2024-1481.json +++ b/CVE-2024/CVE-2024-14xx/CVE-2024-1481.json @@ -2,7 +2,7 @@ "id": "CVE-2024-1481", "sourceIdentifier": "secalert@redhat.com", "published": "2024-04-10T21:15:06.313", - "lastModified": "2024-04-30T14:15:14.617", + "lastModified": "2024-05-22T17:16:12.480", "vulnStatus": "Awaiting Analysis", "descriptions": [ { @@ -55,6 +55,10 @@ "url": "https://access.redhat.com/errata/RHSA-2024:2147", "source": "secalert@redhat.com" }, + { + "url": "https://access.redhat.com/errata/RHSA-2024:3044", + "source": "secalert@redhat.com" + }, { "url": "https://access.redhat.com/security/cve/CVE-2024-1481", "source": "secalert@redhat.com" diff --git a/CVE-2024/CVE-2024-17xx/CVE-2024-1753.json b/CVE-2024/CVE-2024-17xx/CVE-2024-1753.json index 65051ce24bc..6846212933e 100644 --- a/CVE-2024/CVE-2024-17xx/CVE-2024-1753.json +++ b/CVE-2024/CVE-2024-17xx/CVE-2024-1753.json @@ -2,7 +2,7 @@ "id": "CVE-2024-1753", "sourceIdentifier": "secalert@redhat.com", "published": "2024-03-18T15:15:41.170", - "lastModified": "2024-05-16T23:15:47.573", + "lastModified": "2024-05-22T17:16:12.620", "vulnStatus": "Awaiting Analysis", "descriptions": [ { @@ -111,6 +111,10 @@ "url": "https://access.redhat.com/errata/RHSA-2024:2784", "source": "secalert@redhat.com" }, + { + "url": "https://access.redhat.com/errata/RHSA-2024:3254", + "source": "secalert@redhat.com" + }, { "url": "https://access.redhat.com/security/cve/CVE-2024-1753", "source": "secalert@redhat.com" diff --git a/CVE-2024/CVE-2024-202xx/CVE-2024-20261.json b/CVE-2024/CVE-2024-202xx/CVE-2024-20261.json new file mode 100644 index 00000000000..a6ff260a5d6 --- /dev/null +++ b/CVE-2024/CVE-2024-202xx/CVE-2024-20261.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2024-20261", + "sourceIdentifier": "ykramarz@cisco.com", + "published": "2024-05-22T17:16:12.873", + "lastModified": "2024-05-22T17:16:12.873", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability in the file policy feature that is used to inspect encrypted archive files of Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to bypass a configured file policy to block an encrypted archive file. This vulnerability exists because of a logic error when a specific class of encrypted archive files is inspected. An attacker could exploit this vulnerability by sending a crafted, encrypted archive file through the affected device. A successful exploit could allow the attacker to send an encrypted archive file, which could contain malware and should have been blocked and dropped at the Cisco FTD device." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "ykramarz@cisco.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.8, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "ykramarz@cisco.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-284" + } + ] + } + ], + "references": [ + { + "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ftd-archive-bypass-z4wQjwcN", + "source": "ykramarz@cisco.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-202xx/CVE-2024-20293.json b/CVE-2024/CVE-2024-202xx/CVE-2024-20293.json new file mode 100644 index 00000000000..635b512c93d --- /dev/null +++ b/CVE-2024/CVE-2024-202xx/CVE-2024-20293.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2024-20293", + "sourceIdentifier": "ykramarz@cisco.com", + "published": "2024-05-22T17:16:13.167", + "lastModified": "2024-05-22T17:16:13.167", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability in the activation of an access control list (ACL) on Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to bypass the protection that is offered by a configured ACL on an affected device. This vulnerability is due to a logic error that occurs when an ACL changes from inactive to active in the running configuration of an affected device. An attacker could exploit this vulnerability by sending traffic through the affected device that should be denied by the configured ACL. The reverse condition is also true\u2014traffic that should be permitted could be denied by the configured ACL. A successful exploit could allow the attacker to bypass configured ACL protections on the affected device, allowing the attacker to access trusted networks that the device might be protecting. Note: This vulnerability applies to both IPv4 and IPv6 traffic as well as dual-stack ACL configurations in which both IPv4 and IPv6 ACLs are configured on an interface." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "ykramarz@cisco.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.8, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "ykramarz@cisco.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-436" + } + ] + } + ], + "references": [ + { + "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asaftd-ogsnsg-aclbyp-3XB8q6jX", + "source": "ykramarz@cisco.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-203xx/CVE-2024-20355.json b/CVE-2024/CVE-2024-203xx/CVE-2024-20355.json new file mode 100644 index 00000000000..905de6dffa6 --- /dev/null +++ b/CVE-2024/CVE-2024-203xx/CVE-2024-20355.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2024-20355", + "sourceIdentifier": "ykramarz@cisco.com", + "published": "2024-05-22T17:16:13.477", + "lastModified": "2024-05-22T17:16:13.477", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability in the implementation of SAML 2.0 single sign-on (SSO) for remote access VPN services in Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense (FTD) Software could allow an authenticated, remote attacker to successfully establish a VPN session on an affected device. This vulnerability is due to improper separation of authorization domains when using SAML authentication. An attacker could exploit this vulnerability by using valid credentials to successfully authenticate using their designated connection profile (tunnel group), intercepting the SAML SSO token that is sent back from the Cisco ASA device, and then submitting the same SAML SSO token to a different tunnel group for authentication. A successful exploit could allow the attacker to establish a remote access VPN session using a connection profile that they are not authorized to use and connect to secured networks behind the affected device that they are not authorized to access. For successful exploitation, the attacker must have valid remote access VPN user credentials." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "ykramarz@cisco.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.0, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 3.1, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "ykramarz@cisco.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] + } + ], + "references": [ + { + "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asaftd-saml-bypass-KkNvXyKW", + "source": "ykramarz@cisco.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-203xx/CVE-2024-20361.json b/CVE-2024/CVE-2024-203xx/CVE-2024-20361.json new file mode 100644 index 00000000000..eebe6cb18d8 --- /dev/null +++ b/CVE-2024/CVE-2024-203xx/CVE-2024-20361.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2024-20361", + "sourceIdentifier": "ykramarz@cisco.com", + "published": "2024-05-22T17:16:13.733", + "lastModified": "2024-05-22T17:16:13.733", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability in the Object Groups for Access Control Lists (ACLs) feature of Cisco Firepower Management Center (FMC) Software could allow an unauthenticated, remote attacker to bypass configured access controls on managed devices that are running Cisco Firepower Threat Defense (FTD) Software. This vulnerability is due to the incorrect deployment of the Object Groups for ACLs feature from Cisco FMC Software to managed FTD devices in high-availability setups. After an affected device is rebooted following Object Groups for ACLs deployment, an attacker can exploit this vulnerability by sending traffic through the affected device. A successful exploit could allow the attacker to bypass configured access controls and successfully send traffic to devices that are expected to be protected by the affected device." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "ykramarz@cisco.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.8, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "ykramarz@cisco.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-264" + } + ] + } + ], + "references": [ + { + "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-object-bypass-fTH8tDjq", + "source": "ykramarz@cisco.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-203xx/CVE-2024-20363.json b/CVE-2024/CVE-2024-203xx/CVE-2024-20363.json new file mode 100644 index 00000000000..3963a8bab8c --- /dev/null +++ b/CVE-2024/CVE-2024-203xx/CVE-2024-20363.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2024-20363", + "sourceIdentifier": "ykramarz@cisco.com", + "published": "2024-05-22T17:16:13.950", + "lastModified": "2024-05-22T17:16:13.950", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Multiple Cisco products are affected by a vulnerability in the Snort Intrusion Prevention System (IPS) rule engine that could allow an unauthenticated, remote attacker to bypass the configured rules on an affected system. This vulnerability is due to incorrect HTTP packet handling. An attacker could exploit this vulnerability by sending crafted HTTP packets through an affected device. A successful exploit could allow the attacker to bypass configured IPS rules and allow uninspected traffic onto the network." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "ykramarz@cisco.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.8, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "ykramarz@cisco.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-290" + } + ] + } + ], + "references": [ + { + "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-snort3-ips-bypass-uE69KBMd", + "source": "ykramarz@cisco.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-218xx/CVE-2024-21885.json b/CVE-2024/CVE-2024-218xx/CVE-2024-21885.json index 223698b927d..c7c1e70b7c8 100644 --- a/CVE-2024/CVE-2024-218xx/CVE-2024-21885.json +++ b/CVE-2024/CVE-2024-218xx/CVE-2024-21885.json @@ -2,7 +2,7 @@ "id": "CVE-2024-21885", "sourceIdentifier": "secalert@redhat.com", "published": "2024-02-28T13:15:08.197", - "lastModified": "2024-05-03T13:15:21.410", + "lastModified": "2024-05-22T17:16:14.187", "vulnStatus": "Awaiting Analysis", "descriptions": [ { @@ -99,6 +99,14 @@ "url": "https://access.redhat.com/errata/RHSA-2024:2170", "source": "secalert@redhat.com" }, + { + "url": "https://access.redhat.com/errata/RHSA-2024:2995", + "source": "secalert@redhat.com" + }, + { + "url": "https://access.redhat.com/errata/RHSA-2024:2996", + "source": "secalert@redhat.com" + }, { "url": "https://access.redhat.com/security/cve/CVE-2024-21885", "source": "secalert@redhat.com" diff --git a/CVE-2024/CVE-2024-218xx/CVE-2024-21886.json b/CVE-2024/CVE-2024-218xx/CVE-2024-21886.json index c9c012dabd7..0f19bfac7cc 100644 --- a/CVE-2024/CVE-2024-218xx/CVE-2024-21886.json +++ b/CVE-2024/CVE-2024-218xx/CVE-2024-21886.json @@ -2,7 +2,7 @@ "id": "CVE-2024-21886", "sourceIdentifier": "secalert@redhat.com", "published": "2024-02-28T13:15:08.440", - "lastModified": "2024-04-30T14:15:14.867", + "lastModified": "2024-05-22T17:16:14.343", "vulnStatus": "Awaiting Analysis", "descriptions": [ { @@ -99,6 +99,14 @@ "url": "https://access.redhat.com/errata/RHSA-2024:2170", "source": "secalert@redhat.com" }, + { + "url": "https://access.redhat.com/errata/RHSA-2024:2995", + "source": "secalert@redhat.com" + }, + { + "url": "https://access.redhat.com/errata/RHSA-2024:2996", + "source": "secalert@redhat.com" + }, { "url": "https://access.redhat.com/security/cve/CVE-2024-21886", "source": "secalert@redhat.com" diff --git a/CVE-2024/CVE-2024-23xx/CVE-2024-2307.json b/CVE-2024/CVE-2024-23xx/CVE-2024-2307.json index 3056c66dab4..348ed95d041 100644 --- a/CVE-2024/CVE-2024-23xx/CVE-2024-2307.json +++ b/CVE-2024/CVE-2024-23xx/CVE-2024-2307.json @@ -2,7 +2,7 @@ "id": "CVE-2024-2307", "sourceIdentifier": "secalert@redhat.com", "published": "2024-03-19T17:15:12.520", - "lastModified": "2024-04-30T14:15:15.160", + "lastModified": "2024-05-22T17:16:14.610", "vulnStatus": "Awaiting Analysis", "descriptions": [ { @@ -55,6 +55,10 @@ "url": "https://access.redhat.com/errata/RHSA-2024:2119", "source": "secalert@redhat.com" }, + { + "url": "https://access.redhat.com/errata/RHSA-2024:2961", + "source": "secalert@redhat.com" + }, { "url": "https://access.redhat.com/security/cve/CVE-2024-2307", "source": "secalert@redhat.com" diff --git a/CVE-2024/CVE-2024-24xx/CVE-2024-2494.json b/CVE-2024/CVE-2024-24xx/CVE-2024-2494.json index 91d010f663a..6c6e41452ce 100644 --- a/CVE-2024/CVE-2024-24xx/CVE-2024-2494.json +++ b/CVE-2024/CVE-2024-24xx/CVE-2024-2494.json @@ -2,7 +2,7 @@ "id": "CVE-2024-2494", "sourceIdentifier": "secalert@redhat.com", "published": "2024-03-21T14:15:10.350", - "lastModified": "2024-04-30T20:15:08.067", + "lastModified": "2024-05-22T17:16:14.740", "vulnStatus": "Awaiting Analysis", "descriptions": [ { @@ -55,6 +55,10 @@ "url": "https://access.redhat.com/errata/RHSA-2024:2560", "source": "secalert@redhat.com" }, + { + "url": "https://access.redhat.com/errata/RHSA-2024:3253", + "source": "secalert@redhat.com" + }, { "url": "https://access.redhat.com/security/cve/CVE-2024-2494", "source": "secalert@redhat.com" diff --git a/CVE-2024/CVE-2024-293xx/CVE-2024-29392.json b/CVE-2024/CVE-2024-293xx/CVE-2024-29392.json new file mode 100644 index 00000000000..cb9c83b644e --- /dev/null +++ b/CVE-2024/CVE-2024-293xx/CVE-2024-29392.json @@ -0,0 +1,20 @@ +{ + "id": "CVE-2024-29392", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-05-22T16:15:09.590", + "lastModified": "2024-05-22T16:15:09.590", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Silverpeas Core 6.3 is vulnerable to Cross Site Scripting (XSS) via ClipboardSessionController." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://gist.github.com/phulelouch/48ee63a7c46078574f3b3dc9a739052c", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-29xx/CVE-2024-2912.json b/CVE-2024/CVE-2024-29xx/CVE-2024-2912.json index a1ea842f69b..a5ce34593f3 100644 --- a/CVE-2024/CVE-2024-29xx/CVE-2024-2912.json +++ b/CVE-2024/CVE-2024-29xx/CVE-2024-2912.json @@ -2,7 +2,7 @@ "id": "CVE-2024-2912", "sourceIdentifier": "security@huntr.dev", "published": "2024-04-16T00:15:11.427", - "lastModified": "2024-04-16T13:24:07.103", + "lastModified": "2024-05-22T16:15:09.713", "vulnStatus": "Awaiting Analysis", "descriptions": [ { @@ -15,26 +15,26 @@ } ], "metrics": { - "cvssMetricV30": [ + "cvssMetricV31": [ { "source": "security@huntr.dev", "type": "Secondary", "cvssData": { - "version": "3.0", - "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "NONE", - "scope": "UNCHANGED", + "scope": "CHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "availabilityImpact": "HIGH", - "baseScore": 9.8, + "baseScore": 10.0, "baseSeverity": "CRITICAL" }, "exploitabilityScore": 3.9, - "impactScore": 5.9 + "impactScore": 6.0 } ] }, diff --git a/CVE-2024/CVE-2024-30xx/CVE-2024-3019.json b/CVE-2024/CVE-2024-30xx/CVE-2024-3019.json index 62fca7ff017..a95f0ba8a07 100644 --- a/CVE-2024/CVE-2024-30xx/CVE-2024-3019.json +++ b/CVE-2024/CVE-2024-30xx/CVE-2024-3019.json @@ -2,7 +2,7 @@ "id": "CVE-2024-3019", "sourceIdentifier": "secalert@redhat.com", "published": "2024-03-28T19:15:49.160", - "lastModified": "2024-04-30T20:15:08.733", + "lastModified": "2024-05-22T17:16:15.600", "vulnStatus": "Awaiting Analysis", "descriptions": [ { @@ -55,6 +55,10 @@ "url": "https://access.redhat.com/errata/RHSA-2024:2566", "source": "secalert@redhat.com" }, + { + "url": "https://access.redhat.com/errata/RHSA-2024:3264", + "source": "secalert@redhat.com" + }, { "url": "https://access.redhat.com/security/cve/CVE-2024-3019", "source": "secalert@redhat.com" diff --git a/CVE-2024/CVE-2024-310xx/CVE-2024-31080.json b/CVE-2024/CVE-2024-310xx/CVE-2024-31080.json index dc8df726c4e..e23de36e14c 100644 --- a/CVE-2024/CVE-2024-310xx/CVE-2024-31080.json +++ b/CVE-2024/CVE-2024-310xx/CVE-2024-31080.json @@ -2,7 +2,7 @@ "id": "CVE-2024-31080", "sourceIdentifier": "secalert@redhat.com", "published": "2024-04-04T14:15:10.330", - "lastModified": "2024-05-01T18:15:22.810", + "lastModified": "2024-05-22T17:16:14.877", "vulnStatus": "Awaiting Analysis", "descriptions": [ { @@ -99,6 +99,14 @@ "url": "https://access.redhat.com/errata/RHSA-2024:2616", "source": "secalert@redhat.com" }, + { + "url": "https://access.redhat.com/errata/RHSA-2024:3258", + "source": "secalert@redhat.com" + }, + { + "url": "https://access.redhat.com/errata/RHSA-2024:3261", + "source": "secalert@redhat.com" + }, { "url": "https://access.redhat.com/security/cve/CVE-2024-31080", "source": "secalert@redhat.com" diff --git a/CVE-2024/CVE-2024-310xx/CVE-2024-31081.json b/CVE-2024/CVE-2024-310xx/CVE-2024-31081.json index a7458041c80..5dc6b8cbe85 100644 --- a/CVE-2024/CVE-2024-310xx/CVE-2024-31081.json +++ b/CVE-2024/CVE-2024-310xx/CVE-2024-31081.json @@ -2,7 +2,7 @@ "id": "CVE-2024-31081", "sourceIdentifier": "secalert@redhat.com", "published": "2024-04-04T14:15:10.593", - "lastModified": "2024-05-01T18:15:22.920", + "lastModified": "2024-05-22T17:16:15.070", "vulnStatus": "Awaiting Analysis", "descriptions": [ { @@ -99,6 +99,14 @@ "url": "https://access.redhat.com/errata/RHSA-2024:2616", "source": "secalert@redhat.com" }, + { + "url": "https://access.redhat.com/errata/RHSA-2024:3258", + "source": "secalert@redhat.com" + }, + { + "url": "https://access.redhat.com/errata/RHSA-2024:3261", + "source": "secalert@redhat.com" + }, { "url": "https://access.redhat.com/security/cve/CVE-2024-31081", "source": "secalert@redhat.com" diff --git a/CVE-2024/CVE-2024-310xx/CVE-2024-31083.json b/CVE-2024/CVE-2024-310xx/CVE-2024-31083.json index 6c4124974f6..6e08aa35b8c 100644 --- a/CVE-2024/CVE-2024-310xx/CVE-2024-31083.json +++ b/CVE-2024/CVE-2024-310xx/CVE-2024-31083.json @@ -2,7 +2,7 @@ "id": "CVE-2024-31083", "sourceIdentifier": "secalert@redhat.com", "published": "2024-04-05T12:15:37.577", - "lastModified": "2024-05-01T18:15:23.127", + "lastModified": "2024-05-22T17:16:15.223", "vulnStatus": "Awaiting Analysis", "descriptions": [ { @@ -99,6 +99,14 @@ "url": "https://access.redhat.com/errata/RHSA-2024:2616", "source": "secalert@redhat.com" }, + { + "url": "https://access.redhat.com/errata/RHSA-2024:3258", + "source": "secalert@redhat.com" + }, + { + "url": "https://access.redhat.com/errata/RHSA-2024:3261", + "source": "secalert@redhat.com" + }, { "url": "https://access.redhat.com/security/cve/CVE-2024-31083", "source": "secalert@redhat.com" diff --git a/CVE-2024/CVE-2024-332xx/CVE-2024-33222.json b/CVE-2024/CVE-2024-332xx/CVE-2024-33222.json new file mode 100644 index 00000000000..6c3755d8018 --- /dev/null +++ b/CVE-2024/CVE-2024-332xx/CVE-2024-33222.json @@ -0,0 +1,20 @@ +{ + "id": "CVE-2024-33222", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-05-22T16:15:09.960", + "lastModified": "2024-05-22T16:15:09.960", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "An issue in the component ATSZIO64.sys of ASUSTeK Computer Inc ASUS ATSZIO Driver v0.2.1.7 allows attackers to escalate privileges and execute arbitrary code via sending crafted IOCTL requests." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/DriverHunter/Win-Driver-EXP/tree/main/CVE-2024-33222", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-332xx/CVE-2024-33223.json b/CVE-2024/CVE-2024-332xx/CVE-2024-33223.json new file mode 100644 index 00000000000..50514e72fba --- /dev/null +++ b/CVE-2024/CVE-2024-332xx/CVE-2024-33223.json @@ -0,0 +1,20 @@ +{ + "id": "CVE-2024-33223", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-05-22T16:15:10.043", + "lastModified": "2024-05-22T16:15:10.043", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "An issue in the component IOMap64.sys of ASUSTeK Computer Inc ASUS GPU TweakII v1.4.5.2 allows attackers to escalate privileges and execute arbitrary code via sending crafted IOCTL requests." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/DriverHunter/Win-Driver-EXP/tree/main/CVE-2024-33223", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-332xx/CVE-2024-33224.json b/CVE-2024/CVE-2024-332xx/CVE-2024-33224.json new file mode 100644 index 00000000000..9970ec68911 --- /dev/null +++ b/CVE-2024/CVE-2024-332xx/CVE-2024-33224.json @@ -0,0 +1,20 @@ +{ + "id": "CVE-2024-33224", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-05-22T16:15:10.140", + "lastModified": "2024-05-22T16:15:10.140", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "An issue in the component rtkio64.sys of Realtek Semiconductor Corp Realtek lO Driver v1.008.0823.2017 allows attackers to escalate privileges and execute arbitrary code via sending crafted IOCTL requests." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/DriverHunter/Win-Driver-EXP/tree/main/CVE-2024-33224", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-332xx/CVE-2024-33225.json b/CVE-2024/CVE-2024-332xx/CVE-2024-33225.json new file mode 100644 index 00000000000..3d5cafbfa4b --- /dev/null +++ b/CVE-2024/CVE-2024-332xx/CVE-2024-33225.json @@ -0,0 +1,20 @@ +{ + "id": "CVE-2024-33225", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-05-22T16:15:10.220", + "lastModified": "2024-05-22T16:15:10.220", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "An issue in the component RTKVHD64.sys of Realtek Semiconductor Corp Realtek(r) High Definition Audio Function Driver v6.0.9549.1 allows attackers to escalate privileges and execute arbitrary code via sending crafted IOCTL requests." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/DriverHunter/Win-Driver-EXP/tree/main/CVE-2024-33225", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-332xx/CVE-2024-33226.json b/CVE-2024/CVE-2024-332xx/CVE-2024-33226.json new file mode 100644 index 00000000000..d95a65625a5 --- /dev/null +++ b/CVE-2024/CVE-2024-332xx/CVE-2024-33226.json @@ -0,0 +1,20 @@ +{ + "id": "CVE-2024-33226", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-05-22T16:15:10.317", + "lastModified": "2024-05-22T16:15:10.317", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "An issue in the component Access64.sys of Wistron Corporation TBT Force Power Control v1.0.0.0 allows attackers to escalate privileges and execute arbitrary code via sending crafted IOCTL requests." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/DriverHunter/Win-Driver-EXP/tree/main/CVE-2024-33226", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-332xx/CVE-2024-33227.json b/CVE-2024/CVE-2024-332xx/CVE-2024-33227.json new file mode 100644 index 00000000000..b1cf0f50be3 --- /dev/null +++ b/CVE-2024/CVE-2024-332xx/CVE-2024-33227.json @@ -0,0 +1,20 @@ +{ + "id": "CVE-2024-33227", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-05-22T16:15:10.403", + "lastModified": "2024-05-22T16:15:10.403", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "An issue in the component ddcdrv.sys of Nicomsoft WinI2C/DDC v3.7.4.0 allows attackers to escalate privileges and execute arbitrary code via sending crafted IOCTL requests." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/DriverHunter/Win-Driver-EXP/tree/main/CVE-2024-33227", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-332xx/CVE-2024-33228.json b/CVE-2024/CVE-2024-332xx/CVE-2024-33228.json new file mode 100644 index 00000000000..9b0f527ed60 --- /dev/null +++ b/CVE-2024/CVE-2024-332xx/CVE-2024-33228.json @@ -0,0 +1,20 @@ +{ + "id": "CVE-2024-33228", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-05-22T16:15:10.490", + "lastModified": "2024-05-22T16:15:10.490", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "An issue in the component segwindrvx64.sys of Insyde Software Corp SEG Windows Driver v100.00.07.02 allows attackers to escalate privileges and execute arbitrary code via sending crafted IOCTL requests." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/DriverHunter/Win-Driver-EXP/tree/main/CVE-2024-33228", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-344xx/CVE-2024-34448.json b/CVE-2024/CVE-2024-344xx/CVE-2024-34448.json new file mode 100644 index 00000000000..dedefbc6852 --- /dev/null +++ b/CVE-2024/CVE-2024-344xx/CVE-2024-34448.json @@ -0,0 +1,20 @@ +{ + "id": "CVE-2024-34448", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-05-22T16:15:10.580", + "lastModified": "2024-05-22T16:15:10.580", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Ghost before 5.82.0 allows CSV Injection during a member CSV export." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/phulelouch/CVEs/blob/main/CVE-2024-34448.md", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-353xx/CVE-2024-35362.json b/CVE-2024/CVE-2024-353xx/CVE-2024-35362.json new file mode 100644 index 00000000000..10ed8c2c8f6 --- /dev/null +++ b/CVE-2024/CVE-2024-353xx/CVE-2024-35362.json @@ -0,0 +1,20 @@ +{ + "id": "CVE-2024-35362", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-05-22T16:15:10.687", + "lastModified": "2024-05-22T16:15:10.687", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Ecshop 3.6 is vulnerable to Cross Site Scripting (XSS) via ecshop/article_cat.php." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/shopex/ecshop/issues/6", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-360xx/CVE-2024-36050.json b/CVE-2024/CVE-2024-360xx/CVE-2024-36050.json index cf8aeb62e62..af9e2426368 100644 --- a/CVE-2024/CVE-2024-360xx/CVE-2024-36050.json +++ b/CVE-2024/CVE-2024-360xx/CVE-2024-36050.json @@ -2,16 +2,24 @@ "id": "CVE-2024-36050", "sourceIdentifier": "cve@mitre.org", "published": "2024-05-18T22:15:07.460", - "lastModified": "2024-05-20T13:00:04.957", + "lastModified": "2024-05-22T16:15:10.777", "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", "value": "Nix through 2.22.1 mishandles certain usage of hash caches, which makes it easier for attackers to replace current source code with attacker-controlled source code by luring a maintainer into accepting a malicious pull request." + }, + { + "lang": "es", + "value": "Nix hasta 2.22.1 maneja mal cierto uso de cach\u00e9s hash, lo que facilita que los atacantes reemplacen el c\u00f3digo fuente actual con c\u00f3digo fuente controlado por el atacante al atraer a un mantenedor para que acepte una solicitud de extracci\u00f3n maliciosa." } ], "metrics": {}, "references": [ + { + "url": "https://discourse.nixos.org/t/nixpkgs-supply-chain-security-project/34345", + "source": "cve@mitre.org" + }, { "url": "https://github.com/NixOS/nix/issues/969", "source": "cve@mitre.org" diff --git a/CVE-2024/CVE-2024-360xx/CVE-2024-36077.json b/CVE-2024/CVE-2024-360xx/CVE-2024-36077.json new file mode 100644 index 00000000000..2b4329ebf8d --- /dev/null +++ b/CVE-2024/CVE-2024-360xx/CVE-2024-36077.json @@ -0,0 +1,43 @@ +{ + "id": "CVE-2024-36077", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-05-22T17:16:15.377", + "lastModified": "2024-05-22T17:16:15.377", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Qlik Sense Enterprise for Windows before 14.187.4 allows a remote attacker to elevate their privilege due to improper validation. The attacker can elevate their privilege to the internal system role, which allows them to execute commands on the server. This affects February 2024 Patch 3 (14.173.3 through 14.173.7), November 2023 Patch 8 (14.159.4 through 14.159.13), August 2023 Patch 13 (14.139.3 through 14.139.20), May 2023 Patch 15 (14.129.3 through 14.129.22), February 2023 Patch 13 (14.113.1 through 14.113.18), November 2022 Patch 13 (14.97.2 through 14.97.18), August 2022 Patch 16 (14.78.3 through 14.78.23), and May 2022 Patch 17 (14.67.7 through 14.67.31). This has been fixed in May 2024 (14.187.4), February 2024 Patch 4 (14.173.8), November 2023 Patch 9 (14.159.14), August 2023 Patch 14 (14.139.21), May 2023 Patch 16 (14.129.23), February 2023 Patch 14 (14.113.19), November 2022 Patch 14 (14.97.19), August 2022 Patch 17 (14.78.25), and May 2022 Patch 18 (14.67.34)." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "cve@mitre.org", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, + "references": [ + { + "url": "https://community.qlik.com/t5/Official-Support-Articles/High-Severity-Security-fixes-for-Qlik-Sense-Enterprise-for/ta-p/2452509", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-45xx/CVE-2024-4563.json b/CVE-2024/CVE-2024-45xx/CVE-2024-4563.json new file mode 100644 index 00000000000..71566bdd8cd --- /dev/null +++ b/CVE-2024/CVE-2024-45xx/CVE-2024-4563.json @@ -0,0 +1,59 @@ +{ + "id": "CVE-2024-4563", + "sourceIdentifier": "security@progress.com", + "published": "2024-05-22T17:16:15.730", + "lastModified": "2024-05-22T17:16:15.730", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "The Progress MOVEit Automation configuration export function prior to 2024.0.1 uses a cryptographic method with insufficient bit length." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security@progress.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 6.1, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.6, + "impactScore": 4.0 + } + ] + }, + "weaknesses": [ + { + "source": "security@progress.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-327" + } + ] + } + ], + "references": [ + { + "url": "https://community.progress.com/s/article/MOVEit-Automation-Vulnerability-CVE-2024-4563-May-22-2024", + "source": "security@progress.com" + }, + { + "url": "https://www.progress.com/moveit", + "source": "security@progress.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-51xx/CVE-2024-5157.json b/CVE-2024/CVE-2024-51xx/CVE-2024-5157.json new file mode 100644 index 00000000000..92fb7668c21 --- /dev/null +++ b/CVE-2024/CVE-2024-51xx/CVE-2024-5157.json @@ -0,0 +1,24 @@ +{ + "id": "CVE-2024-5157", + "sourceIdentifier": "chrome-cve-admin@google.com", + "published": "2024-05-22T16:15:10.863", + "lastModified": "2024-05-22T16:15:10.863", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Use after free in Scheduling in Google Chrome prior to 125.0.6422.76 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page. (Chromium security severity: High)" + } + ], + "metrics": {}, + "references": [ + { + "url": "https://chromereleases.googleblog.com/2024/05/stable-channel-update-for-desktop_21.html", + "source": "chrome-cve-admin@google.com" + }, + { + "url": "https://issues.chromium.org/issues/336012573", + "source": "chrome-cve-admin@google.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-51xx/CVE-2024-5158.json b/CVE-2024/CVE-2024-51xx/CVE-2024-5158.json new file mode 100644 index 00000000000..6018dcbb3a2 --- /dev/null +++ b/CVE-2024/CVE-2024-51xx/CVE-2024-5158.json @@ -0,0 +1,24 @@ +{ + "id": "CVE-2024-5158", + "sourceIdentifier": "chrome-cve-admin@google.com", + "published": "2024-05-22T16:15:10.947", + "lastModified": "2024-05-22T16:15:10.947", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Type Confusion in V8 in Google Chrome prior to 125.0.6422.76 allowed a remote attacker to potentially perform arbitrary read/write via a crafted HTML page. (Chromium security severity: High)" + } + ], + "metrics": {}, + "references": [ + { + "url": "https://chromereleases.googleblog.com/2024/05/stable-channel-update-for-desktop_21.html", + "source": "chrome-cve-admin@google.com" + }, + { + "url": "https://issues.chromium.org/issues/338908243", + "source": "chrome-cve-admin@google.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-51xx/CVE-2024-5159.json b/CVE-2024/CVE-2024-51xx/CVE-2024-5159.json new file mode 100644 index 00000000000..6b2339fb8e6 --- /dev/null +++ b/CVE-2024/CVE-2024-51xx/CVE-2024-5159.json @@ -0,0 +1,24 @@ +{ + "id": "CVE-2024-5159", + "sourceIdentifier": "chrome-cve-admin@google.com", + "published": "2024-05-22T16:15:11.013", + "lastModified": "2024-05-22T16:15:11.013", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Heap buffer overflow in ANGLE in Google Chrome prior to 125.0.6422.76 allowed a remote attacker to perform an out of bounds memory read via a crafted HTML page. (Chromium security severity: High)" + } + ], + "metrics": {}, + "references": [ + { + "url": "https://chromereleases.googleblog.com/2024/05/stable-channel-update-for-desktop_21.html", + "source": "chrome-cve-admin@google.com" + }, + { + "url": "https://issues.chromium.org/issues/335613092", + "source": "chrome-cve-admin@google.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-51xx/CVE-2024-5160.json b/CVE-2024/CVE-2024-51xx/CVE-2024-5160.json new file mode 100644 index 00000000000..6c1360b7683 --- /dev/null +++ b/CVE-2024/CVE-2024-51xx/CVE-2024-5160.json @@ -0,0 +1,24 @@ +{ + "id": "CVE-2024-5160", + "sourceIdentifier": "chrome-cve-admin@google.com", + "published": "2024-05-22T16:15:11.087", + "lastModified": "2024-05-22T16:15:11.087", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Heap buffer overflow in Dawn in Google Chrome prior to 125.0.6422.76 allowed a remote attacker to perform an out of bounds memory write via a crafted HTML page. (Chromium security severity: High)" + } + ], + "metrics": {}, + "references": [ + { + "url": "https://chromereleases.googleblog.com/2024/05/stable-channel-update-for-desktop_21.html", + "source": "chrome-cve-admin@google.com" + }, + { + "url": "https://issues.chromium.org/issues/338161969", + "source": "chrome-cve-admin@google.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-51xx/CVE-2024-5166.json b/CVE-2024/CVE-2024-51xx/CVE-2024-5166.json new file mode 100644 index 00000000000..fed5ba48e13 --- /dev/null +++ b/CVE-2024/CVE-2024-51xx/CVE-2024-5166.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2024-5166", + "sourceIdentifier": "cve-coordination@google.com", + "published": "2024-05-22T17:16:15.957", + "lastModified": "2024-05-22T17:16:15.957", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "An Insecure Direct Object Reference in Google Cloud's Looker allowed metadata exposure across authenticated Looker users sharing the same LookML model." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "cve-coordination@google.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 6.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "cve-coordination@google.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-639" + } + ] + } + ], + "references": [ + { + "url": "https://cloud.google.com/looker/docs/best-practices/query-id-update-instructions", + "source": "cve-coordination@google.com" + } + ] +} \ No newline at end of file diff --git a/README.md b/README.md index 8e1c2f5751e..b33791c186f 100644 --- a/README.md +++ b/README.md @@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2024-05-22T16:00:48.870660+00:00 +2024-05-22T18:00:31.735085+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2024-05-22T15:15:28.967000+00:00 +2024-05-22T17:16:15.957000+00:00 ``` ### Last Data Feed Release @@ -33,39 +33,67 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### Total Number of included CVEs ```plain -251467 +251490 ``` ### CVEs added in the last Commit -Recently added CVEs: `19` +Recently added CVEs: `23` -- [CVE-2024-33218](CVE-2024/CVE-2024-332xx/CVE-2024-33218.json) (`2024-05-22T15:15:28.550`) -- [CVE-2024-33219](CVE-2024/CVE-2024-332xx/CVE-2024-33219.json) (`2024-05-22T15:15:28.680`) -- [CVE-2024-33220](CVE-2024/CVE-2024-332xx/CVE-2024-33220.json) (`2024-05-22T15:15:28.780`) -- [CVE-2024-33221](CVE-2024/CVE-2024-332xx/CVE-2024-33221.json) (`2024-05-22T15:15:28.870`) -- [CVE-2024-35409](CVE-2024/CVE-2024-354xx/CVE-2024-35409.json) (`2024-05-22T14:15:08.760`) -- [CVE-2024-35475](CVE-2024/CVE-2024-354xx/CVE-2024-35475.json) (`2024-05-22T14:15:08.860`) -- [CVE-2024-35550](CVE-2024/CVE-2024-355xx/CVE-2024-35550.json) (`2024-05-22T14:15:08.947`) -- [CVE-2024-35551](CVE-2024/CVE-2024-355xx/CVE-2024-35551.json) (`2024-05-22T14:15:09.040`) -- [CVE-2024-35552](CVE-2024/CVE-2024-355xx/CVE-2024-35552.json) (`2024-05-22T14:15:09.133`) -- [CVE-2024-35553](CVE-2024/CVE-2024-355xx/CVE-2024-35553.json) (`2024-05-22T14:15:09.223`) -- [CVE-2024-35554](CVE-2024/CVE-2024-355xx/CVE-2024-35554.json) (`2024-05-22T14:15:09.307`) -- [CVE-2024-35555](CVE-2024/CVE-2024-355xx/CVE-2024-35555.json) (`2024-05-22T14:15:09.390`) -- [CVE-2024-35556](CVE-2024/CVE-2024-355xx/CVE-2024-35556.json) (`2024-05-22T14:15:09.467`) -- [CVE-2024-35557](CVE-2024/CVE-2024-355xx/CVE-2024-35557.json) (`2024-05-22T14:15:09.563`) -- [CVE-2024-35558](CVE-2024/CVE-2024-355xx/CVE-2024-35558.json) (`2024-05-22T14:15:09.653`) -- [CVE-2024-35559](CVE-2024/CVE-2024-355xx/CVE-2024-35559.json) (`2024-05-22T14:15:09.750`) -- [CVE-2024-35560](CVE-2024/CVE-2024-355xx/CVE-2024-35560.json) (`2024-05-22T14:15:09.833`) -- [CVE-2024-35561](CVE-2024/CVE-2024-355xx/CVE-2024-35561.json) (`2024-05-22T14:15:09.917`) -- [CVE-2024-3926](CVE-2024/CVE-2024-39xx/CVE-2024-3926.json) (`2024-05-22T15:15:28.967`) +- [CVE-2023-20239](CVE-2023/CVE-2023-202xx/CVE-2023-20239.json) (`2024-05-22T17:16:02.760`) +- [CVE-2024-20261](CVE-2024/CVE-2024-202xx/CVE-2024-20261.json) (`2024-05-22T17:16:12.873`) +- [CVE-2024-20293](CVE-2024/CVE-2024-202xx/CVE-2024-20293.json) (`2024-05-22T17:16:13.167`) +- [CVE-2024-20355](CVE-2024/CVE-2024-203xx/CVE-2024-20355.json) (`2024-05-22T17:16:13.477`) +- [CVE-2024-20361](CVE-2024/CVE-2024-203xx/CVE-2024-20361.json) (`2024-05-22T17:16:13.733`) +- [CVE-2024-20363](CVE-2024/CVE-2024-203xx/CVE-2024-20363.json) (`2024-05-22T17:16:13.950`) +- [CVE-2024-29392](CVE-2024/CVE-2024-293xx/CVE-2024-29392.json) (`2024-05-22T16:15:09.590`) +- [CVE-2024-33222](CVE-2024/CVE-2024-332xx/CVE-2024-33222.json) (`2024-05-22T16:15:09.960`) +- [CVE-2024-33223](CVE-2024/CVE-2024-332xx/CVE-2024-33223.json) (`2024-05-22T16:15:10.043`) +- [CVE-2024-33224](CVE-2024/CVE-2024-332xx/CVE-2024-33224.json) (`2024-05-22T16:15:10.140`) +- [CVE-2024-33225](CVE-2024/CVE-2024-332xx/CVE-2024-33225.json) (`2024-05-22T16:15:10.220`) +- [CVE-2024-33226](CVE-2024/CVE-2024-332xx/CVE-2024-33226.json) (`2024-05-22T16:15:10.317`) +- [CVE-2024-33227](CVE-2024/CVE-2024-332xx/CVE-2024-33227.json) (`2024-05-22T16:15:10.403`) +- [CVE-2024-33228](CVE-2024/CVE-2024-332xx/CVE-2024-33228.json) (`2024-05-22T16:15:10.490`) +- [CVE-2024-34448](CVE-2024/CVE-2024-344xx/CVE-2024-34448.json) (`2024-05-22T16:15:10.580`) +- [CVE-2024-35362](CVE-2024/CVE-2024-353xx/CVE-2024-35362.json) (`2024-05-22T16:15:10.687`) +- [CVE-2024-36077](CVE-2024/CVE-2024-360xx/CVE-2024-36077.json) (`2024-05-22T17:16:15.377`) +- [CVE-2024-4563](CVE-2024/CVE-2024-45xx/CVE-2024-4563.json) (`2024-05-22T17:16:15.730`) +- [CVE-2024-5157](CVE-2024/CVE-2024-51xx/CVE-2024-5157.json) (`2024-05-22T16:15:10.863`) +- [CVE-2024-5158](CVE-2024/CVE-2024-51xx/CVE-2024-5158.json) (`2024-05-22T16:15:10.947`) +- [CVE-2024-5159](CVE-2024/CVE-2024-51xx/CVE-2024-5159.json) (`2024-05-22T16:15:11.013`) +- [CVE-2024-5160](CVE-2024/CVE-2024-51xx/CVE-2024-5160.json) (`2024-05-22T16:15:11.087`) +- [CVE-2024-5166](CVE-2024/CVE-2024-51xx/CVE-2024-5166.json) (`2024-05-22T17:16:15.957`) ### CVEs modified in the last Commit -Recently modified CVEs: `1` +Recently modified CVEs: `54` -- [CVE-2024-4261](CVE-2024/CVE-2024-42xx/CVE-2024-4261.json) (`2024-05-22T14:30:41.953`) +- [CVE-2023-6693](CVE-2023/CVE-2023-66xx/CVE-2023-6693.json) (`2024-05-22T17:16:09.817`) +- [CVE-2023-6816](CVE-2023/CVE-2023-68xx/CVE-2023-6816.json) (`2024-05-22T17:16:09.970`) +- [CVE-2023-6915](CVE-2023/CVE-2023-69xx/CVE-2023-6915.json) (`2024-05-22T17:16:10.197`) +- [CVE-2023-6918](CVE-2023/CVE-2023-69xx/CVE-2023-6918.json) (`2024-05-22T17:16:10.383`) +- [CVE-2023-7008](CVE-2023/CVE-2023-70xx/CVE-2023-7008.json) (`2024-05-22T17:16:10.830`) +- [CVE-2024-0229](CVE-2024/CVE-2024-02xx/CVE-2024-0229.json) (`2024-05-22T17:16:11.003`) +- [CVE-2024-0408](CVE-2024/CVE-2024-04xx/CVE-2024-0408.json) (`2024-05-22T17:16:11.160`) +- [CVE-2024-0409](CVE-2024/CVE-2024-04xx/CVE-2024-0409.json) (`2024-05-22T17:16:11.320`) +- [CVE-2024-0690](CVE-2024/CVE-2024-06xx/CVE-2024-0690.json) (`2024-05-22T17:16:11.487`) +- [CVE-2024-0841](CVE-2024/CVE-2024-08xx/CVE-2024-0841.json) (`2024-05-22T17:16:11.667`) +- [CVE-2024-1048](CVE-2024/CVE-2024-10xx/CVE-2024-1048.json) (`2024-05-22T17:16:11.850`) +- [CVE-2024-1062](CVE-2024/CVE-2024-10xx/CVE-2024-1062.json) (`2024-05-22T17:16:12.023`) +- [CVE-2024-1394](CVE-2024/CVE-2024-13xx/CVE-2024-1394.json) (`2024-05-22T17:16:12.157`) +- [CVE-2024-1481](CVE-2024/CVE-2024-14xx/CVE-2024-1481.json) (`2024-05-22T17:16:12.480`) +- [CVE-2024-1753](CVE-2024/CVE-2024-17xx/CVE-2024-1753.json) (`2024-05-22T17:16:12.620`) +- [CVE-2024-21885](CVE-2024/CVE-2024-218xx/CVE-2024-21885.json) (`2024-05-22T17:16:14.187`) +- [CVE-2024-21886](CVE-2024/CVE-2024-218xx/CVE-2024-21886.json) (`2024-05-22T17:16:14.343`) +- [CVE-2024-2307](CVE-2024/CVE-2024-23xx/CVE-2024-2307.json) (`2024-05-22T17:16:14.610`) +- [CVE-2024-2494](CVE-2024/CVE-2024-24xx/CVE-2024-2494.json) (`2024-05-22T17:16:14.740`) +- [CVE-2024-2912](CVE-2024/CVE-2024-29xx/CVE-2024-2912.json) (`2024-05-22T16:15:09.713`) +- [CVE-2024-3019](CVE-2024/CVE-2024-30xx/CVE-2024-3019.json) (`2024-05-22T17:16:15.600`) +- [CVE-2024-31080](CVE-2024/CVE-2024-310xx/CVE-2024-31080.json) (`2024-05-22T17:16:14.877`) +- [CVE-2024-31081](CVE-2024/CVE-2024-310xx/CVE-2024-31081.json) (`2024-05-22T17:16:15.070`) +- [CVE-2024-31083](CVE-2024/CVE-2024-310xx/CVE-2024-31083.json) (`2024-05-22T17:16:15.223`) +- [CVE-2024-36050](CVE-2024/CVE-2024-360xx/CVE-2024-36050.json) (`2024-05-22T16:15:10.777`) ## Download and Usage diff --git a/_state.csv b/_state.csv index 1e633698574..6ae50c82127 100644 --- a/_state.csv +++ b/_state.csv @@ -214169,6 +214169,7 @@ CVE-2023-20235,0,0,5dba974f1c210cf2a03787c3d3e9c441feee75819526969b64e2f4a80cd00 CVE-2023-20236,0,0,c6a29bb276fa53045a1d5dbdcd5f535a774cb8c2b4a2da6d6d6378ae41d08dd7,2024-01-25T17:15:39.850000 CVE-2023-20237,0,0,f975d459d3015a3f408e596ac215a6d75cfb23fa7b1171a2fa054590faa43dfe,2024-01-25T17:15:39.970000 CVE-2023-20238,0,0,79a23b4efc590566cd58d4cbff45d13d4f3db09516083d401270e6b9d775efcf,2024-01-25T17:15:40.067000 +CVE-2023-20239,1,1,10e4a140a3ffae749ab815dfde5493ff244c0f4f1fc28bfae49c110261f5f26c,2024-05-22T17:16:02.760000 CVE-2023-2024,0,0,a3df09772ebf731a0c1b5b6db5674d9bb51b9794a600088bf32d2d3c6a061d68,2023-05-25T18:10:24.590000 CVE-2023-20240,0,0,015a0e0281847d8e48d2582559aafcb4c3d1269bf49b1b0162dcef443724c650,2024-01-25T17:15:40.187000 CVE-2023-20241,0,0,96357ec1544a3578befd4c4e9e8f2d0182f6d55009c374e33215ccb07ff2801f,2024-01-25T17:15:40.280000 @@ -223915,7 +223916,7 @@ CVE-2023-32546,0,0,665d9129e0e347a36e749da4b8d53e8bebd7d18c176bac364a888746ede56 CVE-2023-32547,0,0,06f6f48ba9323f321263234c84a342e6bff123cf62eb73f242befaa147422a4d,2023-11-07T04:14:35.013000 CVE-2023-32548,0,0,a16e449d1f0bab46f0011d17490cd9aa4edd258373182d8bc0003ead78f7cd26,2023-06-21T18:01:26.320000 CVE-2023-32549,0,0,86a621d5357840ed31a1d879e4de53834177e0a1427934485b2e0348417930c0,2023-06-16T18:03:12.987000 -CVE-2023-3255,0,0,85a054c3b8635aa99adcfd54182dba30b288bc91cb3f459bac6bec6bd79db216,2024-04-30T14:15:08.737000 +CVE-2023-3255,0,1,41fbcfb37dfa4c3b0834a65b73f30ce055a932467de10dca9baf3922a75dd346,2024-05-22T17:16:03.847000 CVE-2023-32550,0,0,47b738e17a288cb4c22f721e6228054b9c9ae5787190e4fdd06eabb94672e12c,2023-06-15T12:17:00.833000 CVE-2023-32551,0,0,443d57cf76d9105e4d639feced6c3947a5914e87298af0ebd678126fc0260ea5,2023-06-14T19:58:43.870000 CVE-2023-32552,0,0,c3efda43b57ed64d2444cdff522a34d5bf3dff3337343cab12c1ac5e1f55bad5,2023-06-30T14:36:57.970000 @@ -226065,7 +226066,7 @@ CVE-2023-35666,0,0,53fa5681a0ffd4f59577e321c9410c7e5c2bb36ad17096381f39ddae0e721 CVE-2023-35667,0,0,1c033222b158ae4bfaf73076cfaae21a04b2d6372df4adf4783a5885d7c2cd7a,2023-09-14T01:46:29.760000 CVE-2023-35668,0,0,152170c25c110ac8137118a45ed07c046e2b901f1120a358bb320b69ac5d58c3,2023-12-22T01:15:09.230000 CVE-2023-35669,0,0,68be5bf79f120c4e9467b3b3c6e735f50946ac3e32ea6ef719c6fcc01bdb09c1,2023-09-14T01:44:54.843000 -CVE-2023-3567,0,0,b2e879bb0f24ad81ed20956c07c02005b8d19b19b423307ee5a97c28b160dd15,2024-04-30T14:15:08.910000 +CVE-2023-3567,0,1,8090a8eff6f1a2b13664851d268d60669adfce2de258f4fe81539ec3e2ac0fba,2024-05-22T17:16:04.100000 CVE-2023-35670,0,0,a042d6a6876adc683c79cb8f4e4baa9db950394328ac85f0895d8df7979da623,2023-09-14T01:41:38.713000 CVE-2023-35671,0,0,2a653a31122a5fd2273cb2f89fde48d9318d783ed7eccb38896aca4325dd9a45,2023-09-14T01:31:36.297000 CVE-2023-35673,0,0,20cb8331c4dc96079ba50ec513083126d41fdfb7ad25179cd0b222550fb1546d,2023-09-14T01:30:16.627000 @@ -228814,16 +228815,16 @@ CVE-2023-39185,0,0,28d9e19d33b0612e6e1ec860671c81ccf79cecce7e8d83a122e0416b3cd59 CVE-2023-39186,0,0,6065cf87db3e22b7d63940f29e199d5ffb7c987544541ffdfe424581268b20c3,2023-08-10T15:48:42.793000 CVE-2023-39187,0,0,b5d43a8b88bfca7a0386931fe0fbd6997124e465c659e19e6be7d838ab432971,2023-08-10T15:49:15.690000 CVE-2023-39188,0,0,6c54311338150c35e8e9bbe4de9d416872b6c20b983f4fb43db032f2228b72f7,2023-08-10T15:29:47.423000 -CVE-2023-39189,0,0,36b25b5f042a6cf9b10b3df62fefb4381e4a3a1fe925929d83f8c42c6e7d7bf2,2024-04-30T14:15:07.967000 +CVE-2023-39189,0,1,08c1f7cbbdfaaafd2374ad1e0100aa4022a7403887c406ee4a8c094d0c907639,2024-05-22T17:16:03.030000 CVE-2023-39190,0,0,294ec25d0875a3dc3b2be951374f197676d2ecfd582a852fc6d89c14f47ac2cf,2023-11-07T04:17:27.090000 CVE-2023-39191,0,0,6115a8c9d2bca67a2486507ff6d08b348ac5e483b67aa16f1430f7016afeb1f0,2024-01-25T20:15:35.643000 -CVE-2023-39192,0,0,43217c2ceb0e9133c22b5b41f8bb6a3be2ed3d580e8d02984da5ccbef3390e09,2024-01-11T19:15:09.757000 -CVE-2023-39193,0,0,59db87b0f35cd6bbc002d970cb0ba2fda30655a430412baf33c9defad87e9749,2024-04-30T14:15:08.127000 -CVE-2023-39194,0,0,b2a8c28b690e3e596e73be645e903f93575fa45d284d374293bd985509886fbd,2024-04-30T14:15:08.267000 +CVE-2023-39192,0,1,024ff39f9d9a082d0c25019b1b63ff49c348e031750b1f252085df0be02d5e64,2024-05-22T17:16:03.250000 +CVE-2023-39193,0,1,a342d09c4bc351116ad140347816f1de166b79176f83d46c0a3c10a84696a5e9,2024-05-22T17:16:03.400000 +CVE-2023-39194,0,1,5bd71bcc43d5a18446b2c8475ade560918e51fe04217df7c819715e3184500d5,2024-05-22T17:16:03.547000 CVE-2023-39195,0,0,4a74042bbdfee1d1806bd136f49fea407a5d6b8e84816d9c0bba20d1497cb759,2023-11-07T04:17:28.610000 CVE-2023-39196,0,0,68bbbd4377c1be11a1c6c168945f806a14a0dfdc03d45e7c3e29dc9a97520981,2024-02-16T20:57:44.050000 CVE-2023-39197,0,0,1fe5a41b58a85dec6897f2c2856cad21fa2e9ce5c3de4464f2368602c9bb1aa3,2024-01-30T02:04:00.813000 -CVE-2023-39198,0,0,688247c3fe5f5029a2937bd18f6f3c54f3745b201593447970f54a5a28414b71,2024-04-30T14:15:08.383000 +CVE-2023-39198,0,1,6e5b71713839f1451686518c674aecaed911a1660a48c60681cf79fd0a871ea7,2024-05-22T17:16:03.690000 CVE-2023-39199,0,0,2d2727d51815e553bcc0363fb5a0705ccae7e19da005921e4129350986854a00,2023-11-21T00:57:16.017000 CVE-2023-3920,0,0,802d09a48e99b7fd43b4d09849bcf63441a04816985afadad5eef2e398755686,2023-10-03T15:30:56.607000 CVE-2023-39201,0,0,7fa2fd39c17c958ad3684904f1a83422d3def8637c069ef0c43ac43dc5c81b9e,2023-09-16T03:30:00.390000 @@ -230520,7 +230521,7 @@ CVE-2023-41326,0,0,0366fd5abfad6a21e7da8ab609017977ce06de2576b71d33c63535b8ca179 CVE-2023-41327,0,0,99db21f154eb5db0a0673ca028174d03c88c66524a4462372f7777970c610fbf,2023-09-12T20:43:26.803000 CVE-2023-41328,0,0,18b6cfdc74ca9eb9a3f78be9ddb8bc0c9971d1a077f6093def0f6bafe4bd8440,2023-09-11T18:05:46.093000 CVE-2023-41329,0,0,3aebc6795d938340fcd444469c8e391c4475b21ea62437d69534aa5dae912778,2023-09-12T20:45:24.907000 -CVE-2023-4133,0,0,0fe02618fdada417879c2c77ad2f4aa7b36b4ba7cbb151920dfdf9f8b34e3b3e,2024-04-30T14:15:10.420000 +CVE-2023-4133,0,1,dce221d6cb627b18ff3a90431ca50c41c9d83f3c03cc3f4b6b4ae4c9a5dea8e1,2024-05-22T17:16:05.990000 CVE-2023-41330,0,0,f332845bb46bf60c5a51a58c63deb892b1ee20e8a7a566efc0e1f98c975395d0,2023-09-12T20:42:58.853000 CVE-2023-41331,0,0,4735e7f30e6fa00bc81696af0475448ee644526a281445e4ab89b736a63ff67e,2023-09-15T19:23:35.937000 CVE-2023-41332,0,0,90f32252cb99e05a0041ea0bbe80c1e2a16936a5a3ae314976c52461cd57ec5d,2023-09-29T13:56:15.203000 @@ -231486,8 +231487,8 @@ CVE-2023-42750,0,0,70915e69cb60a6858dbd84484c73098e7c4a56bec317368a9d9f671192cfc CVE-2023-42751,0,0,3edf2721c6602bf3ab2e99be75103e77d59adc53efacaff628c3139c2459824f,2023-12-07T16:22:08.860000 CVE-2023-42752,0,0,e64b1ff8733ea3c590d85e1bd2ff7516a242f750086dca7dc68d90d5f7b28fc9,2023-11-29T15:15:08.590000 CVE-2023-42753,0,0,3e5b4cb61c42d83c57e20f29810d886d9cfc778a0d313ec6b46dde1aeec06f64,2024-02-27T21:15:46.810000 -CVE-2023-42754,0,0,385ac85e8b9e34a6e29bf6651c886452a8d94e9325c94492288863b633585dc4,2024-04-30T14:15:09.100000 -CVE-2023-42755,0,0,f9f274dd994494562ece75367509a2592bb162c3b24a6866560b893bf0ab5cbe,2024-01-11T19:15:11.317000 +CVE-2023-42754,0,1,55476c044cc3bb964d92c3897c4c72eb7de4aedaa6aa8e5cfb35de27f7eeb8f6,2024-05-22T17:16:04.360000 +CVE-2023-42755,0,1,7a86f3a569c70622ae1cea891d915eb97bfc9f08632fef0a949a20ea6e7e2546,2024-05-22T17:16:04.537000 CVE-2023-42756,0,0,1791119cd49d1f819b757c7a73ec49ac86914ba524bc67f6888a58dd72ac15ca,2024-04-30T14:15:09.243000 CVE-2023-42757,0,0,f46e3894d2e12ec0442a7829f3dc5951255bcdedeca7dc7903e2fea24af4c1ee,2024-05-07T20:07:58.737000 CVE-2023-4276,0,0,ba81376334b317afdb94ddec1b24db97dd7a21c1b03cf9fb7c1f4917c56320c0,2023-11-07T04:22:23.843000 @@ -232149,11 +232150,11 @@ CVE-2023-4378,0,0,1073659ca12d39c66816d534ddaec9f9afb571d44ac0a2a97ba27debcccfeb CVE-2023-43782,0,0,ceecdefb3ca0fa2d3f555f17dcd4461d1d6a6b2e2eb0dd0b222c507700c8d6ed,2023-10-26T17:59:42.910000 CVE-2023-43783,0,0,1999ee6518be9435805a19a243ead15c7aec42c5c117bb8151815611a70cb1d8,2023-10-26T17:59:35.273000 CVE-2023-43784,0,0,a08390a02a39d1b29ca1473845b2bbe8e79091cfdebbdcf12f74ac23833789ba,2024-05-17T02:29:18.553000 -CVE-2023-43785,0,0,c3c740475b222f7f401d798dfb6f881e7ce396ed8b0da3b660ddbb2326a0ee7d,2024-04-30T14:15:09.453000 -CVE-2023-43786,0,0,bb210225a172ec5af5061cf8ac20f217a3da3f5b41b280a0b56d53d0996f8cd0,2024-04-30T14:15:09.613000 -CVE-2023-43787,0,0,8f5f21b4dfde77b9d00ffc1687ef1a08d5b72420d017ee615a045a7db3cc2274,2024-04-30T14:15:09.810000 -CVE-2023-43788,0,0,06e87cff6152bbd2138ac03e422b76e850cb56aaaee00ca936f33cd976e58c7f,2024-04-30T14:15:09.963000 -CVE-2023-43789,0,0,4dc05e537d4a85f2b2d85151f0d008604abd5e7c625167b31c437c2de767823b,2024-04-30T14:15:10.103000 +CVE-2023-43785,0,1,ee401c5908628458a72a22ef0af239eeaa6bc534ec2e7f00d91e1aff38c5e247,2024-05-22T17:16:04.760000 +CVE-2023-43786,0,1,de094cb131460e5dce39655dda5f4504f4f0197ffaddd16f977162909c255603,2024-05-22T17:16:04.927000 +CVE-2023-43787,0,1,c40c610c8759339734d3d0ab6c267d05e37180423f144ab867dd6e1c63e9cbb4,2024-05-22T17:16:05.057000 +CVE-2023-43788,0,1,7523a25a418d85513c2ff533b1634921643f4ce23beb7312f140b34cd5392ff9,2024-05-22T17:16:05.223000 +CVE-2023-43789,0,1,32d727641a99e39dc6456e53621b96cea1e3b49b48912290b25ab4575db872d7,2024-05-22T17:16:05.443000 CVE-2023-4379,0,0,3d7c1a3a693facbb427b84d3e31f361b0100f9358df2eb8e78c0a3c9e7722a70,2023-11-16T19:24:36.240000 CVE-2023-43790,0,0,dc04c69ad573fbcc9e2e3e500057f73f594b156236e9d8ba0d308d312b307e03,2024-04-15T19:12:25.887000 CVE-2023-43791,0,0,026e86f342b4cfcebc1170b1da4308bc54a73c5fddb94d2ae0a580f5d845ba9b,2023-11-18T00:55:15.610000 @@ -234232,12 +234233,12 @@ CVE-2023-46914,0,0,c59adb74e4c80e2986f7cbf12bded831271a227b08fb4bcf358c8a2151c16 CVE-2023-46916,0,0,807dec74b0b6302aa78a9b1a564deb8dae9da79985c10fc5f40f549edd1dd100,2023-12-12T17:03:51.163000 CVE-2023-46918,0,0,778a5b7a17f93ea048ea10d26e5870dcbb0e2ebfe6cf90309ef7420272b8cd33,2024-01-05T17:24:42.153000 CVE-2023-46919,0,0,483dbc1ac50d3d8abd2c60ae86d8ddee9660e752ace819201c59dbd8b27520f8,2024-01-05T18:35:20.857000 -CVE-2023-4692,0,0,5fe0f1b3701f9245403ba0991d040ff9c2b81873476829d82e1af8caba46db7c,2024-05-03T03:16:02.210000 +CVE-2023-4692,0,1,31eb32079b6ff912ee9cb4d2b7756fa0b45c3687150e4e20d0c89e236ddae406,2024-05-22T17:16:06.140000 CVE-2023-46925,0,0,474049e6d20eb13bc575b65561ef84204e608a738f0064cb996ff655202f4db6,2023-11-09T17:46:52.517000 CVE-2023-46927,0,0,456f3b68c111783341a61120a7d7e73c89200952dbed58aeb4bf5bca9eb4478b,2023-11-08T19:35:56.783000 CVE-2023-46928,0,0,dbfacac533f97d8c2bde499ce6922d40d78d9f3b0bb57ad0be92dbe4894d1239,2023-11-08T19:31:58.797000 CVE-2023-46929,0,0,4b9a36b63210b5bf3fec4e65cc498ed3b2577a322d91bc8ef6e07cb6de32caa5,2024-01-10T19:26:28.647000 -CVE-2023-4693,0,0,1d877dfa1477bc1ba7b828f43272ca1ef3f2fcafdee7965063c431702783487e,2024-05-03T03:16:02.370000 +CVE-2023-4693,0,1,414c8cdd83714eaa108372a5c0d90154090147f2cfd4e257bcd63e424303a8e5,2024-05-22T17:16:06.530000 CVE-2023-46930,0,0,443982cf4f9c9d9211b72c7a5eeec2189c4d88d6928a4ab3098294f9b9d79991,2023-11-08T19:41:01.493000 CVE-2023-46931,0,0,dc0c5aeb658231ecdb137544de7e966d78b050885917a9eabad5feda7e19db03,2023-11-08T19:36:49.673000 CVE-2023-46932,0,0,1e42f5d6f78dc1da5f70ec6553388859dad53ed5da3358f8c3a1cfe520573e36,2023-12-12T22:32:26.197000 @@ -234296,7 +234297,7 @@ CVE-2023-47033,0,0,9f64afaaad6656e35f51a7e5c20ba55e9da6ae915e60dc5ef4045963b8f11 CVE-2023-47034,0,0,5e669df5a7ad32eb8b097886efddff48819f84fb4b955cc5aca9e920a6102637,2024-01-30T16:48:28.163000 CVE-2023-47035,0,0,770b2e98d600ebf26f2028e8928b35898574cd25900dfff88aadc984966168b6,2024-01-30T14:46:19.023000 CVE-2023-47037,0,0,7537eb40b8d544ac01e36c22cc628ccdde46b3e4b0580bdd6819812169448211,2023-11-20T19:31:24.707000 -CVE-2023-47038,0,0,24c45b876ed53c2439709907e519110e04feb22ef7725a116f0d4cb205d987fe,2024-04-30T14:15:10.257000 +CVE-2023-47038,0,1,7241a4674a31ffc7cebc9c4aa252e73560ae18af5f7f46bdf04801cf3560314c,2024-05-22T17:16:05.677000 CVE-2023-47039,0,0,437d789d3a627731735caace9623309c9997b0d4bbe85d9712e8d1e5008fe7f0,2024-03-28T14:15:13.467000 CVE-2023-4704,0,0,ef1dffcc0f22d52fa11eb133e9bcccdda232bc0ffa1c621782c23e03920914ca,2023-09-07T17:36:22.737000 CVE-2023-47040,0,0,5b7ddb0234f2c1ae36901d0eadf5328e97fc25f2ac070aca211e4b7da01950d1,2023-11-22T15:19:16.977000 @@ -236824,7 +236825,7 @@ CVE-2023-50874,0,0,bcacd6fc18a6a7384f9e3410fc219a27fd51425023bb3ea76f15234acd5bd CVE-2023-50875,0,0,1106938097fb18960ed1f89813982d05ff2f39c25d4530bc17f1d69fd9b36d68,2024-02-16T19:28:59.943000 CVE-2023-50878,0,0,09d9775c521beb2bdbe6a10e9cce75ea90abd897c23ddc9c0ed036fdb98e2785,2024-01-05T16:21:46.253000 CVE-2023-50879,0,0,e7f635ec835f8af6e68324c638f96c217e373f3a3af9c80d6a7d36cc1662f020,2024-01-05T17:35:04.347000 -CVE-2023-5088,0,0,949602bb613cda52cd3d8706067d7ac77f9553f85e8c12e9aa40646017d4d698,2024-04-30T14:15:10.953000 +CVE-2023-5088,0,1,692ebf645f02e064fac01cf45ee953588a13ff0d56000f2ae18bc74dad40523a,2024-05-22T17:16:06.710000 CVE-2023-50880,0,0,45dfc20edf873b6f54c033b90d8b745bc998db6f75a866db44cd1e8a384e14b7,2024-01-05T17:36:02.743000 CVE-2023-50881,0,0,21fc9e5f06f2216fa2395fe2689d924b63b36b0b4cdf8b0f9c5260d788c328af,2024-01-05T17:37:29.017000 CVE-2023-50885,0,0,17f409a54bfb2cee48d72ca19d76c6e56cca390a1fd7e5561bf19af5236e5f64,2024-04-18T13:04:28.900000 @@ -238383,7 +238384,7 @@ CVE-2023-5362,0,0,6cd099dc73752b5bcdc030e8564f8c4aba80acdf0fb96fce3d91c9ff3f5d2f CVE-2023-5363,0,0,6a84e1ed87b432e258be5e3ec9a32c477ec3bb340639f5c743fbe72c8b18eea9,2024-02-01T17:15:08.743000 CVE-2023-5365,0,0,577825a78eb7d4bb43b379c489e9f14e156cfa284569015c1587d1a539aba1f0,2023-10-13T18:13:11.037000 CVE-2023-5366,0,0,f32b6bbb139ec2cd1c647ce9b082b43ba44af0c55e8725ca09746158629457d8,2024-03-23T03:15:10.327000 -CVE-2023-5367,0,0,c1ad203899f553a03f705fa4893432dd66e16bf0fe906443f1e13e8deb2acf51,2024-04-30T14:15:11.280000 +CVE-2023-5367,0,1,4d81f740eaccdc48ec446af211733bec69ab6a08511baebde2fb40381b63d6f4,2024-05-22T17:16:07.050000 CVE-2023-5368,0,0,593db1a54f590a459e9c1c53282073288a9ea58f12b3af280fa3c63997ab333f,2023-11-29T21:15:07.940000 CVE-2023-5369,0,0,bc2976d0fb3797202330d53bdd93d5704730b182a0590b9be7094369289431c7,2023-11-24T09:15:09.607000 CVE-2023-5370,0,0,0b8bae34575fb174114a0e06ac582228a49abd871a52b1621f872fe44bc92ee8,2023-11-24T09:15:09.677000 @@ -238396,7 +238397,7 @@ CVE-2023-5376,0,0,d25adbf13134c0f536650c34727c0a90e481346ff93626806c106fdb8d3cb2 CVE-2023-5377,0,0,8010d6fe5a92d90535c9f3d1843bbe6dab5b2e1f13255a074cdcfd35cd5284d3,2023-10-05T17:07:40.813000 CVE-2023-5378,0,0,45892ac35553604338d229afb6d2f05944b5562bd675022643b73b5d5512fb1d,2024-02-19T12:15:43.980000 CVE-2023-5379,0,0,0034d7dc633bdb9d87977a5f843846a9f44bd21275dc1f4e4d2e9917e83b93f0,2023-12-20T18:39:19.120000 -CVE-2023-5380,0,0,373a2571a6c29c7d5b85c9d0d1564dc8ff1cf8686447cddb350009574acaac63,2024-04-30T14:15:11.513000 +CVE-2023-5380,0,1,1f65028cbd0908a06fb194fb255c3b9682548b8122ba91198ecaeffae13570c1,2024-05-22T17:16:07.540000 CVE-2023-5381,0,0,3040b0b8dc0beb606dbd7fc1a2584e032c76067b2e99361a9eafb184c22c46aa,2023-11-21T02:45:00.847000 CVE-2023-5382,0,0,4ac4fb28dfaf2bd508d6b1747b3034fa74511f17b7c43f28ba39ba9d8efd9058,2023-11-27T20:11:42.213000 CVE-2023-5383,0,0,2ea2edb67bde66ba9622c0ceef1e79a842adcb3e1623c297ceb8cace44689a78,2023-11-27T20:12:46.017000 @@ -238974,7 +238975,7 @@ CVE-2023-5999,0,0,cc3f84b8a121613045dcc518b5ffbe450102082afadb4f9fe390442e821198 CVE-2023-6000,0,0,3aa74437938a42933034b068e628b90507b17eb642603203f20688873749410b,2024-01-08T15:14:56.640000 CVE-2023-6001,0,0,0004a90ef8f8e6fad0ab4cc41788654ec826936eb050cdfff2de6feb3bfa7f8e,2023-11-16T16:15:23.077000 CVE-2023-6002,0,0,c3b9bdc640ae3682cef47895b9f5d6946ff8267a3110d3bffaa44f0a504f48cc,2023-11-15T15:16:24.487000 -CVE-2023-6004,0,0,86f825cda40d825e1e7b13f060d02113e69e321f4c59dd420b61b5aba9543fbb,2024-04-30T15:15:51.593000 +CVE-2023-6004,0,1,2ae037f82039fddc9236fe2dee50364527d943ca3f81f5de6f95d488bbd167b7,2024-05-22T17:16:07.773000 CVE-2023-6005,0,0,00888b4dc87d6058c5028522956f7d9e46995f7cc9c2c82d660558853b9c1656,2024-01-19T14:27:45.383000 CVE-2023-6006,0,0,be4e5abcc056403ed35b668305e316c0b5aef75563c8b172a30640a88309631a,2023-11-21T16:12:34.167000 CVE-2023-6007,0,0,2e6620a06aa2e6960845c6b171034cdf81bbf52a94cdbf5952cfa44bfe66101e,2023-11-29T19:01:54.823000 @@ -239077,7 +239078,7 @@ CVE-2023-6117,0,0,23ffc5f4c90a279ac244adcf67ed121b77f5bce3b75efa2fc7c1f1221d790e CVE-2023-6118,0,0,185b02f0f82d3669ee7d955ce632c2e7e3f4b765df0085b453c9c70d7373b586,2023-11-30T21:03:09.543000 CVE-2023-6119,0,0,6fa8c2bdfe58774c0eadb834ea8a4a17c61f17e55241a9e2b26790316447df0e,2023-11-29T19:32:07.657000 CVE-2023-6120,0,0,0785d4897c202d5f2b347af27cbafc0a0d08d1e19422e6fe1e80f9bcb520d992,2023-12-12T22:33:35.077000 -CVE-2023-6121,0,0,3341803019ea381f906b75dd6784dfcbd0ab23c775263043d0c749c1b68299ad,2024-04-30T14:15:11.823000 +CVE-2023-6121,0,1,38c6196fcfe238ace1965f28fe108d3e81c64c99cf763a79cc1022679e26bd86,2024-05-22T17:16:08.007000 CVE-2023-6122,0,0,fdb1bbd36685ab367ece39630fa32b987ab22a57945287b655756d875986b449,2024-02-29T01:42:33.153000 CVE-2023-6123,0,0,e991291cd701d4dfdcf4ef1fc4f630d1e850086076bcf3c7627a88aee80a1c5a,2024-02-16T13:38:00.047000 CVE-2023-6124,0,0,664f05c4fc3295964d19e1f2a73fe5f7112fa0b432430271a916027b76a6d242,2023-11-17T18:11:01.837000 @@ -239125,7 +239126,7 @@ CVE-2023-6166,0,0,2fd4bf06e126a4915eb1ab58cebba98130a30b69f07d42815f1b2e81d82c3c CVE-2023-6173,0,0,242a0bd36c1e795d0aad7af13a95461d2bfc7a072b05e504d57ab20bea7dde21,2024-03-27T12:29:30.307000 CVE-2023-6174,0,0,928079b5ea0b0accaee0b058dd1e51b2239c85cbf846cb8e8f6e42d77fa72bf4,2024-02-11T06:15:11.437000 CVE-2023-6175,0,0,2b124284380d6ffe6e5a9191b487503d085349de86f7dce936d08d6c075067fc,2024-03-26T12:55:05.010000 -CVE-2023-6176,0,0,6312ab0755307f0091dcd2480de5f036847b0b9a79ef19d05bac9b1047c3bdc2,2024-04-30T14:15:11.960000 +CVE-2023-6176,0,1,81332f975e9c0f773631a30e5d38b90c704362c9e9210b77ffe0d99ee808cfa9,2024-05-22T17:16:08.200000 CVE-2023-6178,0,0,bc2dd876d4e2450fc2e4921925d21f55e35f2d54fd22329e9e9989f0337a5274,2023-11-29T18:01:19.947000 CVE-2023-6179,0,0,67fdae7ef2e90483db8da897354f3ca786f508d0b8b5db8b16163ed452bd226b,2023-11-25T02:13:16.920000 CVE-2023-6180,0,0,d0542d25835b09da9849c6c849c3b120a5a7798d30dff1391e0aa703c583ed17,2023-12-12T15:49:29.317000 @@ -239296,7 +239297,7 @@ CVE-2023-6373,0,0,a10fe1678f097b67682eb6e67a72a1021bf42a53e82b8bb51a4ee66761c5f0 CVE-2023-6374,0,0,3df87b1115878a0fbaf2d96e786890a09b465249bc2a8a350e3f2e465a22bfca,2024-02-06T18:50:48.063000 CVE-2023-6375,0,0,9bccfab4c5b2344bb3b0f32e66ed1fda00e58ee8ec3197ae7b64885c17c939ec,2023-12-06T17:11:21.693000 CVE-2023-6376,0,0,6685af42b31cc5beddc512cc60689ce87ba925566f36538c57a368005120e095,2023-12-11T15:12:41.477000 -CVE-2023-6377,0,0,b1bc5f38ac5b9db8c543e8c179214789f2da5120a3471db19e815fe5edfadc11,2024-04-30T14:15:12.063000 +CVE-2023-6377,0,1,337e9143b65cbfbb0651232e7741e740bbdad26680256d9edd8b430a27c494c8,2024-05-22T17:16:08.530000 CVE-2023-6378,0,0,4e5c95a250705e0dd6a8bbc06b93d64ed77669aa10d8e08cf26322a24f2351d4,2023-12-05T21:00:10.557000 CVE-2023-6379,0,0,b7a577bc70f83785aa29bf1c30ba879dfd82bc67d666c7986d31270d7af1419f,2023-12-15T20:33:49.850000 CVE-2023-6380,0,0,392e06acbd089517e78f47acec46283d5c2952e9063d6ec241117f7f2010ba21,2023-12-15T20:22:40.343000 @@ -239379,7 +239380,7 @@ CVE-2023-6473,0,0,a4a550bbe30c352e142ae34ea4ba451637f31051baf6f097a159f1a1cf6b90 CVE-2023-6474,0,0,9d3a7a55078375b81a96c9feef4df32b7d5b88345f09d3d8c481615db5d42fc4,2024-05-17T02:33:44.370000 CVE-2023-6476,0,0,57308171427109f5ee78843a9c1ee207dddbd4e402603c66ed9179abaced4ebe,2024-02-04T20:15:46.327000 CVE-2023-6477,0,0,30e717357969ce1a3d7c54ee50b2f4eea236fbdd42e3aefd85764f8f4b0bf0eb,2024-03-04T20:25:04.490000 -CVE-2023-6478,0,0,96e23fdb0a5be1fbb58e45e442baf11e970a8c7e14720b2a4a345f2a894ba750,2024-04-30T14:15:12.263000 +CVE-2023-6478,0,1,fde3d8c9214a6e680946c69a80a38349bf8d40ea03c4322cb420daffd335313e,2024-05-22T17:16:08.797000 CVE-2023-6481,0,0,7bf3f957b787a6827701226e0ca3372c64cd44f2ab0cfcaeb6091c2fdc472edd,2023-12-07T19:57:46.020000 CVE-2023-6482,0,0,4d9c5a1788fe7dfbaf4eca53c69fe7a1ffbc45cd5b295a4cce9c5f95cb7c7755,2024-02-01T04:14:20.480000 CVE-2023-6483,0,0,4d97a6b64ab24b94d49daa44a79554fbeead9ae7d46cd7c731ffa4efefc4885f,2023-12-22T20:23:00.340000 @@ -239500,7 +239501,7 @@ CVE-2023-6618,0,0,9193a13bda46e6f2f96e9aec2ce94a36a4e687c4c90b1bb0d5df487eeb40d4 CVE-2023-6619,0,0,a5b75610a82bb8b562cc8db9bca6c72c82215b3c894dcb77669b75fe51f2b888,2024-05-17T02:33:49.277000 CVE-2023-6620,0,0,bf62d55272d0e4ae1790760873f5b282ec1f6dc35b3d222e88e2e51bcc6144fc,2024-01-19T18:30:31.280000 CVE-2023-6621,0,0,e7ba8fa0053a52555cc28777e20191f84d428674efb2a150ff053fd62ca17b8a,2024-01-09T18:47:39.187000 -CVE-2023-6622,0,0,3a2720f61be18ae45f1a5ce867e34a2518acf9557925c363ea2d40c9ed0737c4,2024-04-30T14:15:12.790000 +CVE-2023-6622,0,1,52b25e1bb39cbf05e4d82eb7dd801bf6b128762b3177d49b48fe33d5df6adf3f,2024-05-22T17:16:09.020000 CVE-2023-6623,0,0,442e364c6248e0d8a48d3ff5e9e4f9e011eed522a4ac57fef79d2e649dc595cf,2024-01-19T18:33:55.500000 CVE-2023-6624,0,0,4ce3823144bd1928535c6c397482e9986264d8bd9d2ab1741fa88186f7a3ff71,2024-01-17T21:20:31.500000 CVE-2023-6625,0,0,3a2eb9baff2b129c466df66193517b7d682f051468b4a2e9d2189d029f714585,2024-01-26T19:47:43.497000 @@ -239542,16 +239543,16 @@ CVE-2023-6677,0,0,744a169fed7afef9bc3172a4dc3cf72705f47913c3dd4cf21ecc0bce335262 CVE-2023-6678,0,0,ffe600c6920a412c0c5bee4f237e93b3d55c2795b206acbd920087166a0b3a61,2024-04-12T12:43:57.400000 CVE-2023-6679,0,0,bae6ec8bc351030c039d4ccc17068a0f99c26b2fae4af82d5e4c0f67264c3cff,2024-02-06T15:15:08.397000 CVE-2023-6680,0,0,a016be60c670891f603e4cb6a7d1db9323a658919f6e5464005acbd77a09d39e,2023-12-19T20:51:03.237000 -CVE-2023-6681,0,0,1e81bac5d4abde6b2d2aa3cac2e26b8c260fd0d2cc649b18b690f3f83d9c312f,2024-04-18T18:15:08.993000 +CVE-2023-6681,0,1,d15aa67412474232bfb8e3a5b87ad8bbd618499aee386c53d7448b7be7aa82b9,2024-05-22T17:16:09.207000 CVE-2023-6682,0,0,90940cb62c4c46886bb788e061b6553ac12f0ac5a6c8c09c3082acd9ca7c8bb1,2024-05-14T16:13:02.773000 -CVE-2023-6683,0,0,6399c52717426ffadc7c348d85ecd2e981ff00d98029a8d3303cd8ed5a962d2c,2024-04-30T14:15:12.930000 +CVE-2023-6683,0,1,4f24afc48059e357c68edeedf92bd9da8f320a705126436e9bd3b6f9189b2385,2024-05-22T17:16:09.600000 CVE-2023-6684,0,0,c1525cadf00c690a98e25ddc5cec16c0dbf4d4d58e3765f415661e1c07ec88e8,2024-01-17T20:41:05.143000 CVE-2023-6687,0,0,815f0c1fb11575859202e4f8339ba0c892dff8a36cd30b831f453e8fce3948dd,2023-12-19T15:20:04.910000 CVE-2023-6688,0,0,d261de4de637dc0e80af432f70bd6cacdd348e8805fcc1ab5b8afb55a49ce527,2024-05-14T16:13:02.773000 CVE-2023-6689,0,0,94832909555ff59b567516253441b2d84f7ab3411369d6764bc6cdff465466c7,2023-12-29T19:29:33.807000 CVE-2023-6690,0,0,4a0a71b1ead07e18f281fc4661b8ad9c1c5894485cf3fc449f0f62ac342ca884,2023-12-29T19:21:45.180000 CVE-2023-6691,0,0,a11890938c81fde945a58f158b8b20210e60d65408972177cf95e97613dae836,2023-12-28T18:28:00.493000 -CVE-2023-6693,0,0,6873a264484b094c8ce71cc1218181d85ec7b1708eb4e4c0806f70e884fa33d8,2024-03-08T17:57:54.067000 +CVE-2023-6693,0,1,cf628307c1964a00995a1e6a5134d1eb338281166ebf99b3dd57917a16a1b948,2024-05-22T17:16:09.817000 CVE-2023-6694,0,0,74888c6061f5995c1ece9e256c949c745db7a28c9fae546822fe2bdd37077360,2024-04-10T13:24:00.070000 CVE-2023-6695,0,0,c350585c288709484fa2c4ed5afca55376ce388211fecd421637a541eb8ceb4d,2024-04-10T13:24:00.070000 CVE-2023-6697,0,0,e4339138bfdad4a40ac5f595e1eff8e88fb25ea1f60bcfd83302475d5a5a44cb,2024-01-30T20:25:21.367000 @@ -239650,7 +239651,7 @@ CVE-2023-6811,0,0,0ae434dca3175548a9ca9dc42c6f8d10f94870a185713460da5dc58ca1a03a CVE-2023-6812,0,0,1361f65d99954b70532606b17569527f5effc0868c2105952fcff6b7c6c97e71,2024-05-14T19:18:31.490000 CVE-2023-6814,0,0,f914980738323f0d89710adfa1af6d51adf8e3bc868f5019d57b30c5b4448cc4,2024-04-16T03:15:06.230000 CVE-2023-6815,0,0,2907a8b4ff24102c477c46109fb1fabfce42d3c6fd03f18fcb9bbd39f14ee3a0,2024-02-14T04:15:08.497000 -CVE-2023-6816,0,0,34622146e83120c2a6e5886baba87406860404acf36665dbf4cdde0b5533c8f3,2024-04-30T14:15:13.080000 +CVE-2023-6816,0,1,cca41eda4debf1a60ab4b1843bc845963914c04ca252d62c2bb38527b5d55418,2024-05-22T17:16:09.970000 CVE-2023-6817,0,0,15a873d76f1c7613f3959855e73f950459b6718d3731740781c6b052a6a56c9a,2024-02-08T16:15:47.270000 CVE-2023-6821,0,0,7a1488e17f3bfb388d3613a98d9caa7a07e3ab101b584211d6f51caaa11e140f,2024-03-18T19:40:00.173000 CVE-2023-6824,0,0,8c6e875229d872169eb2bfb9390a02ca75cb4bc4bc222093fdb4ebb6a0125835,2024-01-23T15:35:27.123000 @@ -239738,10 +239739,10 @@ CVE-2023-6910,0,0,f842ee2aa98f61ed47c83f356656747bb82d09c00eb8f1511f9921c454b7dc CVE-2023-6911,0,0,e60f5f34dfc2f467e48316efdd3e3f3dabe3cbdb000a0094576ed3c7945a3ae4,2023-12-22T17:31:09.707000 CVE-2023-6912,0,0,6d27b9ffaa85f66eac0058ecbe841883376c17e80f5cbeb4cb4c650bca6a8ec4,2023-12-28T20:21:13.940000 CVE-2023-6913,0,0,d3f21b5758e8702bf2289fbf7ccbf480d8685a2dc08808c8b8d18a35c8d7aa6f,2023-12-28T19:03:17.600000 -CVE-2023-6915,0,0,b308f64fde2669288909ec1ea67b3a4e7bc1b4a483b46e740172957000744aec,2024-04-30T14:15:13.277000 +CVE-2023-6915,0,1,e2a0fd6c734a851fd4dd14eed7cde737b91291892d875d0d01460616139a79ea,2024-05-22T17:16:10.197000 CVE-2023-6916,0,0,506ca081fad9ad2394374425c07440832a4ee51e583bf2ac63a805b332c6f8e2,2024-04-10T19:49:51.183000 CVE-2023-6917,0,0,72d90b1b285b224e730badbaf26efca581ab8f0fadb041219fbe00e64a1f30f3,2024-04-30T14:15:13.417000 -CVE-2023-6918,0,0,ae87a3d3e74bd1765210025bc8667dfda168868b6be3fd723f2501409ee3e6cf,2024-04-30T15:15:51.930000 +CVE-2023-6918,0,1,9bbb2594fd736e6da65a527ce557bc623488cf0972d935e5571ffede28de719b,2024-05-22T17:16:10.383000 CVE-2023-6919,0,0,c5861db2cdf00a205a7573e7dcea32f254a23d6c543064294759efd099a2276c,2024-02-01T19:43:35.653000 CVE-2023-6920,0,0,9f1e69d2c13cb07d8d718e2d591d2015a72911331b809e4164229c0e420474c9,2023-12-18T17:15:11.673000 CVE-2023-6921,0,0,952e34754f9ce702fb33c80800b749aad8c05be68472bdb7c7764fc8d1184437,2024-01-11T20:57:37.320000 @@ -239818,7 +239819,7 @@ CVE-2023-7003,0,0,c2f67685caafc56100d1d2a37ad4d98cbab0dde58c7d186a42f1e45043a47a CVE-2023-7004,0,0,3e9a2bc9909d36e2af7dddeb28517498d215f6e0ede14782acb4def06a55a403,2024-03-17T22:38:29.433000 CVE-2023-7006,0,0,803fcc04a45419c90766afaee3cae76aa704c03c33dcaa6fab9236b4ab6e6263,2024-03-17T22:38:29.433000 CVE-2023-7007,0,0,16031198d1127e86f366c2cd57986c69c3bb40bfa4438638842fed7a5553573e,2024-03-17T22:38:29.433000 -CVE-2023-7008,0,0,b87c7b587b46f66e5930354ca9f0ce2eb368c8a4d89a7615d01a0f72cc109d10,2024-04-30T14:15:13.513000 +CVE-2023-7008,0,1,3723c9b4e7479d9407a1d934d913d3e89f8965e4cf019a3479ec067a6c1dcc17,2024-05-22T17:16:10.830000 CVE-2023-7009,0,0,3cd9b260095619f078d9124475c918cdfab00bed93a7d74ee3b33c22a302d112,2024-03-17T22:38:29.433000 CVE-2023-7014,0,0,873dd0a51ae8f440703328d4c3435a1c07218aebd2ebb2d1a46bc2ca046b3736,2024-02-15T15:07:55.347000 CVE-2023-7015,0,0,b1ea9995d91ca9bed0782a3b0caa0e63e46b6b6bfabb58f27c829fc5fb5c037e,2024-03-13T18:16:18.563000 @@ -240161,7 +240162,7 @@ CVE-2024-0225,0,0,7271e667ef495355eff72b02b9b3b74f5c9ea735115ad03036da50eae85eb1 CVE-2024-0226,0,0,e9fe0cef48b7ede56b193a37200026b8d590ab7a37bf0c9ba820a5fea0cd07ab,2024-01-12T20:04:24.130000 CVE-2024-0227,0,0,46001c131f6e8b3e1b6b2c76df780095dc7e34f8a17e1dac19dc23c36182f6ba,2024-03-18T14:15:07.283000 CVE-2024-0228,0,0,ce6c89afac41f61c47db4c38fe10e22e0a81a5c45ffdb1b44ab12c9bd9185c4b,2024-01-09T17:15:12.223000 -CVE-2024-0229,0,0,c872cfc01e16de0c17d02d79bbe3246d5506272d9dced8383625cc948a537d44,2024-04-30T14:15:13.677000 +CVE-2024-0229,0,1,4457c758ddf442382824bb53b61fed0f7dd055c53cd4bbbc3d9366c86171c5a3,2024-05-22T17:16:11.003000 CVE-2024-0230,0,0,945645e249458ee7c8becb91fae6787497b42be1a583180fc0e4b622c782d77e,2024-01-19T18:35:52.493000 CVE-2024-0232,0,0,cc0880bd0343b8160892da7b4e37c3089d940d3ddc268fdf06f6a8f527fd9f25,2024-03-15T11:15:08.560000 CVE-2024-0233,0,0,5dc41a8872508ea2109cbef39ae4ca35aea786fff68fbcd8d1e30c28d52ef8b5,2024-01-19T14:28:14.077000 @@ -240320,8 +240321,8 @@ CVE-2024-0404,0,0,f66e4aae55250898f4ea41fe8e33c7b9d8158214afcab6aefc212b1ddf85c6 CVE-2024-0405,0,0,efdadcc35fc4ed87224ff4e930a96f9ee86e8b4ccb1a79f084616e91b90070e3,2024-01-24T17:23:09.773000 CVE-2024-0406,0,0,4de5d4ab88b41346d6a48c20921cbb8ae5c4852e44406dfa1d2b986bdcdbe033,2024-04-08T18:48:40.217000 CVE-2024-0407,0,0,f3bc2895be8ea5b6951b82e45fc670b2af282e8da3ab8846004c7a5f8a8e92ad,2024-02-22T19:07:37.840000 -CVE-2024-0408,0,0,bb6d1500ff3596585f953ce252c6dfe4e10a0245b14476b838bc8ad553ae28d3,2024-04-30T14:15:13.800000 -CVE-2024-0409,0,0,22d6e01aa2a0997b1086a1ca5fcc52f1aed794aa6d5be41b8e2c31b4135d7c6c,2024-04-30T14:15:13.917000 +CVE-2024-0408,0,1,566f3b27a0af7215a34bebb59fe952f1b05be3006da62f1ed2407d7d550e58f5,2024-05-22T17:16:11.160000 +CVE-2024-0409,0,1,d11a853014e56a17bbbc94ae61d9700c29e195812007c8f7e92f480335c21163,2024-05-22T17:16:11.320000 CVE-2024-0410,0,0,b7c9980392b1e84c96745fa2196deb8831d9dc73822058dbf4e5c03728818e2f,2024-03-04T20:25:41.347000 CVE-2024-0411,0,0,b124578bc64e3555db57a9cc4a7d10fd91900a5de3600d2f9b7c0efe01bd4565,2024-05-17T02:34:35.600000 CVE-2024-0412,0,0,f2f651f5c48df8c4b00d7ebc32ee15d85c647bcb6d664f8f90955c06e9091783,2024-05-17T02:34:35.707000 @@ -240581,7 +240582,7 @@ CVE-2024-0686,0,0,e2395a9a6bfad8e6b532409ed23be32a655dbdc8b37702eb0b5a7e38bca816 CVE-2024-0687,0,0,df138584ca0880cf283cf7783484df0698f216eaf6db4efcf6d87ab38b28d9b5,2024-03-13T18:16:18.563000 CVE-2024-0688,0,0,7eaac9a2de6d69f1cb58283e226002ce225f7b8e6f1ac3cc910e6b5444d44cb9,2024-01-31T19:13:36.847000 CVE-2024-0689,0,0,2e2dc6df22a148b6e72d6ddc61b9cb1042dff6b3ef7d504351e9a82631b4aadc,2024-02-29T13:49:29.390000 -CVE-2024-0690,0,0,350157446ad1c5d50c15f5ba2aaa6bba919bc19e8799837ac4957e1722324b30,2024-04-30T14:15:14.177000 +CVE-2024-0690,0,1,c68ef23a51c870b6b01e0fdac214117af8c481c5d952691677a8abe9a91430ed,2024-05-22T17:16:11.487000 CVE-2024-0691,0,0,dcd6fedff2b7131fa30fddfeac5357e44b78288895a283e8a3b6f80a3ec21a38,2024-02-13T16:57:26.083000 CVE-2024-0692,0,0,14598c1e40058a86803764efa3f5d8d09586eecd49ec73a2131e7c9f7e9d8a44,2024-03-01T14:04:04.827000 CVE-2024-0693,0,0,f2fab4a8027c22282623dcc0a555346eaec8137ad55f32053d7be57aa124dd8a,2024-05-17T02:34:52.010000 @@ -240722,7 +240723,7 @@ CVE-2024-0837,0,0,08ea2858b44c859160b5e7601679d5f88e4bcd7ba45fb013205c71e5573704 CVE-2024-0838,0,0,b1a45d9214599736981fe661bf6957238c139cf88032a3f72350936cbbc3a303,2024-02-29T13:49:29.390000 CVE-2024-0839,0,0,bd365bbcd47eb1d5ecdb6b882d6ba9cbc257ff82a5c7f036954df4f3dba15f0d,2024-03-13T18:16:18.563000 CVE-2024-0840,0,0,a29fd729ffdb30a11acea1b506301229e907e8ea6ce7fdfdd44e196863c8988c,2024-04-30T13:11:16.690000 -CVE-2024-0841,0,0,c873f2f7ddc6bf0b13c3e6edbafb1ae0c24e3e5de6b1efc6df07580302b91e04,2024-04-30T14:15:14.350000 +CVE-2024-0841,0,1,9e65cbfff7725abca8b3bb8d47238fadc1759ba27b260df301bbf9206f25aa46,2024-05-22T17:16:11.667000 CVE-2024-0842,0,0,2d4febcc0a5bd3f6b5f6eeeb222e1bdadfd7499df5c95fd0f9cc7e2a10a87dbd,2024-02-15T19:11:14.253000 CVE-2024-0844,0,0,9b0ede7ee0379ed34aa516e6f2cba464e96d05ae45278d47c03f7b0b4baaf7d5,2024-02-08T16:15:39.903000 CVE-2024-0847,0,0,2423a45a83c68ee77ea1657795a6b4f742f1b905ef7ab47fbb7c37fbc6c3b67d,2024-05-02T18:00:37.360000 @@ -240896,7 +240897,7 @@ CVE-2024-1043,0,0,b25ebe81211528c764a166d703b4d746eaf91f405ce1938d3f2e7d17971a1c CVE-2024-1044,0,0,6f7b0e82deadcfa67f18486b93a7911031cae5b34d2ea63a1991d5191d89e6fc,2024-02-29T13:49:29.390000 CVE-2024-1046,0,0,04593d809e4dc181ec893504bde5771d15890d7d13ac640142c747dade4cf5a5,2024-02-13T19:44:34.880000 CVE-2024-1047,0,0,e96e7a026577614e85a9cd48b2c7dde028c96bb69e07a747ad9c4e24f36cb0c3,2024-02-08T14:20:23.387000 -CVE-2024-1048,0,0,495c8467c0a7d4a693fb459e641fac11f8ccad823f21cf005924b6f372488011,2024-04-30T14:15:14.463000 +CVE-2024-1048,0,1,f73cea99c8fda6a6b57abc1276e87f2844d1da4dcbf068c5b028189b4a8564e3,2024-05-22T17:16:11.850000 CVE-2024-1049,0,0,702f1183a27878b714f97a3e0cfdf1563c3306eb8a17f785c7b1a1586e029403,2024-03-25T01:51:01.223000 CVE-2024-1050,0,0,4afeff68cbf1ca8e080c4ee497287425ecde98ece0d1d057779f329dd8bcb3de,2024-05-06T12:44:56.377000 CVE-2024-1051,0,0,9345c0a6e775599660e2c0fec1004a4350e5763beb3848cc0939db67ee25aa7d,2024-04-01T01:12:59.077000 @@ -240909,7 +240910,7 @@ CVE-2024-1058,0,0,80a5d2ee91b8c3ada73727957fcd82a05a735762aa11fd58991ea78d55e340 CVE-2024-1059,0,0,3ce9662c746bf2f12465a0b043cc52736ac7f03a00d65ac500ff02babc948f48,2024-02-05T20:50:26.783000 CVE-2024-1060,0,0,947f187e18fc5925a95a10d5904537b397d57987c304e13aa92944e395ef1895,2024-02-05T20:49:55.413000 CVE-2024-1061,0,0,947e75b14694e9a11f0f1cc99c5910bdfa7e7bd5faa6e5b7b033897e8f48ab9f,2024-02-05T18:21:08.577000 -CVE-2024-1062,0,0,8960ea5ac871ec4d88d885a3ffdbce0b097548ed5c3a8f8769fb85ac78cfe9aa,2024-03-19T17:15:09.707000 +CVE-2024-1062,0,1,02b7eee677925718e322bbbd376cd672a91efd1f797ed6768b4fd3bca3bf4bd8,2024-05-22T17:16:12.023000 CVE-2024-1063,0,0,9f783a34601f62d19b147f2fe9fbb48179f2e91e414b112cc308b0e641d38b87,2024-02-05T18:25:57.167000 CVE-2024-1064,0,0,54ebccd3b0484c776a35abc0a579ad4dfe5016d375ba9d7ccf7a7253f76d1013,2024-02-12T18:42:14.777000 CVE-2024-1065,0,0,07c6b023634593680b772042b06337ebc58e33ca2032ca3f9810f92b441f4c8b,2024-04-19T13:10:25.637000 @@ -241201,7 +241202,7 @@ CVE-2024-1390,0,0,71eb0c49e1915160a890c9df4d2040fa529dd6e699ca4bdcf3f6829a9c0e60 CVE-2024-1391,0,0,95159e2513e9127a66f6050cbc2679326245e87281e8aee9653919649cc97f74,2024-03-13T18:15:58.530000 CVE-2024-1392,0,0,0948736f211221c32ddb432668205bccae67223b950d877ef11c76bff68a1c8f,2024-03-13T18:15:58.530000 CVE-2024-1393,0,0,d7662d0cf4655f5dc37cac1727274e85c0d695350e85be99fa06d400366cbddc,2024-03-13T18:15:58.530000 -CVE-2024-1394,0,0,3c65d3e8fd0844435ba6ceeb902629f5b980dfa76bac2c50d4bc4f04ebd6ba76,2024-04-30T20:15:07.090000 +CVE-2024-1394,0,1,b9291470de8f5430a0efce828f0fb93d2fbd512feaf0ea4e95de91da35c98bc3,2024-05-22T17:16:12.157000 CVE-2024-1395,0,0,bc906c24f3b97a1f76fb28d9eb27a1438a7ca78483d0c0a7452e9b7efa2da958,2024-05-03T14:17:53.690000 CVE-2024-1396,0,0,c2c7f8124754e0c20b02f3a3637cca1d95a3c2b253208efd7a2814f2d0550bd5,2024-05-02T18:00:37.360000 CVE-2024-1397,0,0,e6d8c9c2beca75d3fdc5f918cb423cf21913a9c807f46126d5b49c29c7bd60f0,2024-03-13T12:33:51.697000 @@ -241282,7 +241283,7 @@ CVE-2024-1477,0,0,b1175a71510fd842138862374f281c1bda7457d7b234a1bf81a7a2fcce39bd CVE-2024-1478,0,0,54fc4d2d1af2d772e45f440cc01a56a5078a7b4f242f25febd2c561b4b9b409a,2024-03-05T13:41:01.900000 CVE-2024-1479,0,0,75eecf66dbf69c578ea2f09e6e564cdf3b04311a1ae51ea49bee3724800fe960,2024-03-13T18:15:58.530000 CVE-2024-1480,0,0,e3c7fd19d7fe5ff43bf6f873c1d14cb0985599390e4107b8a61532a5f296336d,2024-04-22T13:28:43.747000 -CVE-2024-1481,0,0,dfbcc219e64e2cbb0745363bf8c9204c02d7e807eb078f031b2f2a7f7a785820,2024-04-30T14:15:14.617000 +CVE-2024-1481,0,1,39658db33ff193649ef5bddea8422c536fa95b98350c448c159b5f17a6e66544,2024-05-22T17:16:12.480000 CVE-2024-1482,0,0,61f1933d97f430ea5062371f54d100c6fb03c771024804bcdad5092bc2efbfc7,2024-02-15T06:23:39.303000 CVE-2024-1483,0,0,1ba808cb1c0d1fdcf5723092c3904b20d4561fdb7083f3ee67b919f5196c5851,2024-04-16T13:24:07.103000 CVE-2024-1484,0,0,2816ffb064ebf87ebca44e6afd6928df4e130e61997f3bc50802157887bafe8f,2024-03-13T18:15:58.530000 @@ -241497,7 +241498,7 @@ CVE-2024-1749,0,0,60848b9fe8e314552386aa9c14aa482bff9335de768784b14d1a7df50a1f35 CVE-2024-1750,0,0,656fce037334c637bfbad9d662c7e3d3e09717bfd06a6312eb238663a446265a,2024-05-17T02:35:35.177000 CVE-2024-1751,0,0,7aa616bef5e27ed13b371ce9dacd4080fc5ffa6154b1e45a0ce11f0de1f1df9e,2024-03-13T18:15:58.530000 CVE-2024-1752,0,0,3b691eb63c202be2eb926d4c3601a8229a1e699fd5812dcaec474adfd9c6bd05,2024-04-08T18:48:40.217000 -CVE-2024-1753,0,0,03949c1a6b1a0dad16ccddc50c7e4944b804b505fae960542a96b1291eeb1ac2,2024-05-16T23:15:47.573000 +CVE-2024-1753,0,1,ef4b9715950b3021ed511bd76fe4b78f8b6797003f2bf756a74c31daed59be5e,2024-05-22T17:16:12.620000 CVE-2024-1754,0,0,bb1af71458eba5bdfb6b90e382cbcddd60b96fb9bcb7aef4fa5483aa2a532c8d,2024-04-15T13:15:31.997000 CVE-2024-1755,0,0,c4c00c2e9213cda2dc6708362bc52ae20ba1dfc3c894f2897c9375b229ad840b,2024-04-15T13:15:31.997000 CVE-2024-1756,0,0,62e52d79aae78b309e4cd5e4ccf86fb8ee93e230c568d1d0b7a63a1cf36aba4f,2024-04-24T13:39:42.883000 @@ -241792,6 +241793,7 @@ CVE-2024-20257,0,0,76ffe9a92c93a06325edca86ddf0d31564fbc213598c5ddb9861c39151597 CVE-2024-20258,0,0,86668eb2a14f93ae58cca9d4779b12b7223791a7316a5480eeeb82e1669b4fc2,2024-05-15T18:35:11.453000 CVE-2024-20259,0,0,73ab78da8d0a510423d7dde4580b3cd86ea36933046212658a9baf6cc1c10b54,2024-03-27T17:48:21.140000 CVE-2024-2026,0,0,5071705b646dd74094af5cbedc0c8f83ed6481f03743c4a8c8e638254d8625b5,2024-04-10T13:23:38.787000 +CVE-2024-20261,1,1,48ef452ac044106281a7157af492d1d508fb44dad40ce930c4c28c1d602801ea,2024-05-22T17:16:12.873000 CVE-2024-20262,0,0,0f454f18496ee5ef2600ffeec90b1f623047ba774ff76b9352de48c47d8ed167,2024-03-13T18:15:58.530000 CVE-2024-20263,0,0,e2b898d887c646815ae9f81fc2d94bb44bf5048bae0bf50a4ca3ec5baeb42436,2024-02-06T19:23:20.600000 CVE-2024-20265,0,0,fbaf861e98006a5b6737fd0e8bab7fd09d0628199afba5baf3a37aa186d05d2d,2024-03-27T17:48:21.140000 @@ -241813,6 +241815,7 @@ CVE-2024-2029,0,0,8373bec1763a4514bbbcb69ac2f237a035a9f03f21660a36f059b41030fd51 CVE-2024-20290,0,0,057d5dfa7ca9ea45e2cb423f9faaf6e87f8f428206a3f34ecdd5587406e21147,2024-02-15T15:43:27.240000 CVE-2024-20291,0,0,8b3a799684ad77921390bf93ffe13565898bd7b11a64255da0ed7a22936da619,2024-02-29T13:49:29.390000 CVE-2024-20292,0,0,487f367f547f807e9f94987f5696131d7f2dbcf85eef97db7117ebc922f8f0a8,2024-03-07T13:52:27.110000 +CVE-2024-20293,1,1,bf21d9271df2af8efbbae220a61329f6a685cdce31afe6ee8b1d6fe8ee8aee6d,2024-05-22T17:16:13.167000 CVE-2024-20294,0,0,4fadb13db160be71a050b8cad86cc6a11a54187dbc8f5c1f128a04f8688febd3,2024-02-29T13:49:29.390000 CVE-2024-20295,0,0,15daf48dd7dc82ddbbc6711ac40fe791a25c5cf42c57f7cb10c68c2d97bee3a8,2024-04-25T13:18:20.370000 CVE-2024-2030,0,0,d28975d328a4fff677c165e5077b942b01b9ea45f41d0c27e4794a5e9083ea52,2024-03-13T18:15:58.530000 @@ -241858,12 +241861,15 @@ CVE-2024-20348,0,0,0302f1e9485b44e49fee557bce04f55ca5d1a83abb8a531d325f6a707ff9d CVE-2024-20352,0,0,0a21aaf855f5e2dfa6cf8a0de7df15d8d9ce0063ea679dcbc607b17583312064,2024-04-03T17:24:18.150000 CVE-2024-20353,0,0,0ad32ee557f52a7b8ada270f35945efb8e6756e485c22be736fc9eb0d9c4e4e0,2024-04-26T15:22:27.803000 CVE-2024-20354,0,0,77dad3524fb09cfda3488dd6cb6801d1cbef489cb4a9c5ad1ce0cd080b146730,2024-03-27T17:48:21.140000 +CVE-2024-20355,1,1,44466ec396582e1f3a9585aa71dff26a978b89a875459857e13c0bbb7c429824,2024-05-22T17:16:13.477000 CVE-2024-20356,0,0,520a5229b5523a4caebc12a2a13fabbd3ee32baa429880796f24d4f599838cb8,2024-04-25T13:18:20.370000 CVE-2024-20357,0,0,3a1d2757f67674d091902d27d845115a7046a8d266fe0b3daa6615e60c820655,2024-05-01T19:50:25.633000 CVE-2024-20358,0,0,a08433ecd9375b9385be343adba44e1b907ae2f57b9c630ccf362a5c87517062,2024-04-30T14:47:57.753000 CVE-2024-20359,0,0,103c2bc1c6783d5aa055ed80504c27ea24cb5bf5556deb17c85950666ec17e99,2024-04-26T15:25:02.773000 CVE-2024-2036,0,0,bcfdbdd174510ba0864b0e6171969e1a6500d4f97dc7bcf3ab34f7b2bf61efef,2024-05-22T12:46:53.887000 +CVE-2024-20361,1,1,70dc72c8f7d2d61dc04fbd568188c6f9ef922857e920758d364e06dc87658d88,2024-05-22T17:16:13.733000 CVE-2024-20362,0,0,0e125a5f57daca09b3a31c24c5285918bb46201f033defe636102ce0379b9ecc,2024-04-03T17:24:18.150000 +CVE-2024-20363,1,1,8e842516d76724c4b0573dd67e87756c7fc165b87ee350684f942f23c9cd928a,2024-05-22T17:16:13.950000 CVE-2024-20366,0,0,847482c81cd89b351ccec66c9f3c8d8074954a0de68a5d98d408eebff09cee32,2024-05-15T18:35:11.453000 CVE-2024-20367,0,0,e44fa9dcd83189ac4bb0284b57ce6be9f7d161e3fd46e74e477fe5fd623ca1b7,2024-04-03T17:24:18.150000 CVE-2024-20368,0,0,4814a8127430faf4ae61ecb30b9f4c874f54598057d22bcc8b2ca14f1fefa88a,2024-04-03T17:24:18.150000 @@ -242753,8 +242759,8 @@ CVE-2024-21870,0,0,eb93ddaf02bbc4698ce65f000ac66cf4bffe10c9c37f8f4faeecaca1a0400 CVE-2024-21872,0,0,1f8fabf09d1871ce9f5dba61318c59e087780cfd147e9342fc379104db212e44,2024-04-19T13:10:25.637000 CVE-2024-21875,0,0,d88c7fa028650d8c38c644c89741f5c8883fbb1f9fa5219cf2c447a4b53bf374,2024-04-12T07:15:08.283000 CVE-2024-2188,0,0,50073fcb971d8d943a63e1f3e232811ec9a11d1acf3f48e9da561ed8964c30e8,2024-03-05T13:41:01.900000 -CVE-2024-21885,0,0,3a8555aba848a763891301ea45be2dc447cf6e91c8980c7f8fb662d07f448edc,2024-05-03T13:15:21.410000 -CVE-2024-21886,0,0,51c64b750a7fa30c4151f47347eefcb19a07d8afc937f6dd2165654f59623a1b,2024-04-30T14:15:14.867000 +CVE-2024-21885,0,1,4c0a37c40fd97a6227c8ac231d63d8978b27ea4cc3663dac441d0237ba7c4585,2024-05-22T17:16:14.187000 +CVE-2024-21886,0,1,9d88c691c44df7e3c56c69da8cca3e89baff037b02f5cb7b18f748891d376c22,2024-05-22T17:16:14.343000 CVE-2024-21887,0,0,27308d07d43795d3f4289d79a64af5933e89a71cf679d41be9d0c5a30a308379,2024-01-22T17:15:09.523000 CVE-2024-21888,0,0,9de3f75608c2ffa998f0bcfa0dcc7f6af68bb755862afa34798392c7baa192b3,2024-01-31T19:53:06.303000 CVE-2024-2189,0,0,c2544e4d9801646df1c7503255caee5a562299b04680b76ea4290b2d833dec2f,2024-05-21T12:37:59.687000 @@ -243365,7 +243371,7 @@ CVE-2024-23059,0,0,1ae620a0d7759193ae34540a4455aa9c0a81f947f508fbecbd634aa926d83 CVE-2024-2306,0,0,9f487c2d8209218621d1d76cdabca18f6ed784cc183269f450c7ace110fb436e,2024-04-10T13:23:38.787000 CVE-2024-23060,0,0,293f3db63669f513fdf6243d872feab4a40014b3abd2eff3b8edca7a0ed1b3d3,2024-01-18T15:17:35.587000 CVE-2024-23061,0,0,d40b225d92d8f0f0d47201622b24e50bc3550ed3e56a2682a133a8aeae5027e3,2024-01-18T15:18:14.357000 -CVE-2024-2307,0,0,af89ad04cf757177709a8494eb4cf8523c94e75b3454852ae90f53cf97a082fb,2024-04-30T14:15:15.160000 +CVE-2024-2307,0,1,8e3ae62c96d50ac8e1cef763d15987fd4edb9ca5fef913572175d621539da2cb,2024-05-22T17:16:14.610000 CVE-2024-23076,0,0,c0204d5498e830636e4b113382f28f47ea760047509babca48525e6995d1e1c9,2024-05-17T02:36:28.137000 CVE-2024-23077,0,0,9d92319df99a412231f2dd25ec714f431ff32a6a426769436bcb54fe968b9903,2024-05-17T02:36:28.210000 CVE-2024-23078,0,0,ff5c34647fdff037d6fa3258c1a93b17acbceacd56eb90daf6eaba129c204052,2024-05-17T02:36:28.270000 @@ -244451,7 +244457,7 @@ CVE-2024-24936,0,0,b40cba45486310464826445db58797cda9708090ef629993d6b65c1322a94 CVE-2024-24937,0,0,c158a1376665515fcdd077ebbbc61196266e17dfca3642cdd3f2b284922e7576,2024-02-09T01:05:30.783000 CVE-2024-24938,0,0,919f0844348072e68674027ea0a3644c0c8fc392a786b352b8f3abde920f1f60,2024-02-09T01:05:13.527000 CVE-2024-24939,0,0,b2b5d03f9e7db36f290b4e039454a0e87440b3b4044776d74739544bb234180a,2024-02-09T01:04:16.577000 -CVE-2024-2494,0,0,ca619baa8fd230df6a39fee3cda8883da0fdecdca74c197bc27d803e06927aaa,2024-04-30T20:15:08.067000 +CVE-2024-2494,0,1,fbbd0a69b53835f4959f3652f703a2e6217baf25e1862ffc8b789880958ffe4f,2024-05-22T17:16:14.740000 CVE-2024-24940,0,0,3b807f9711835fcb1381b61d94808660dccf6fdaaa44b568b18928314f306783,2024-02-07T23:45:31.493000 CVE-2024-24941,0,0,3ce7539cc2c00ca21eaf8843bb8dfa494f8daac6c677d25fe85a072b680aec63,2024-02-09T01:05:05.250000 CVE-2024-24942,0,0,98967e5f253d2f0e2d6c9adde01d5feb324664bac3fce3b7b875de585c5550eb,2024-02-09T01:03:13.453000 @@ -247105,7 +247111,7 @@ CVE-2024-29115,0,0,142414ad4545b27307ef892525e38d2bb8c83878ba7d3b929a558d2d8f461 CVE-2024-29116,0,0,22312ff0fec960bf6bd22c8e8f459c2262200779b53186c3b1d0f522ebc154df,2024-03-19T16:33:58.680000 CVE-2024-29117,0,0,4796a230809f99a49ee05655b5187418907ba301781386f31aa5927b23559ddb,2024-03-19T16:33:58.680000 CVE-2024-29118,0,0,6ac5e6cd6ee7b43d8431dc316e005ede5cf4637a65ec75ca3c6a90cc83910dc3,2024-03-19T16:33:58.680000 -CVE-2024-2912,0,0,7853e1850da1df1a9d27e654a4679904ce21be5712661c93d1293795d88290f3,2024-04-16T13:24:07.103000 +CVE-2024-2912,0,1,6be4a48f5007324ba127b8d48e301648067c3d0d8e25731ab08452810c4247ef,2024-05-22T16:15:09.713000 CVE-2024-29121,0,0,93c4eed4f19d6c35e5794bebf3078da12779b20c5796aea61af6820f2f1f0547,2024-03-19T16:33:58.680000 CVE-2024-29122,0,0,354c54b8c87b5aa75aed35dae5dd6c47ba1694327d8aa600a98403368348e018,2024-03-19T16:33:58.680000 CVE-2024-29123,0,0,e3fdcac69f03cdf2056f95a7639e6d970705398d9baf4f730c7daff4391b483c,2024-03-19T16:33:58.680000 @@ -247245,6 +247251,7 @@ CVE-2024-29385,0,0,8759a5732499ce248301d7321fb10ac2a0ff45ccfb82ec638dc2ec07b2660 CVE-2024-29386,0,0,46150b3636ce7f0c25cb166967d8e2ffb59b578767fa72331e04f23b7ba93e5f,2024-04-05T12:40:52.763000 CVE-2024-29387,0,0,64dc77a900c3b36a10f003711c44947a360d31708081f08c65915c82f4e2f15d,2024-04-05T12:40:52.763000 CVE-2024-2939,0,0,8d288c5421907c18561d6a467f0e78e7e78afcae942dcb9d7c160f3050babf32,2024-05-17T02:38:38.230000 +CVE-2024-29392,1,1,da1ab179d03c780bc51413a8ae8bb5096c375b6f62863f42bd442249cbf7be0a,2024-05-22T16:15:09.590000 CVE-2024-29399,0,0,1f0a560642c5bcb6053c3eb35cf9c158aa499897c937eeb4d73efac983ff0857,2024-04-11T12:47:44.137000 CVE-2024-2940,0,0,bdac3de755ddba1fc10ba9f0b54c2d288bf5bbaaa5fc7e8b4cdd60093fb3f65d,2024-05-17T02:38:38.323000 CVE-2024-29400,0,0,7c7ba10951f85314b8517e4af19bc97a8e02a4fb9c2ebd30adadcdfaed825d5b,2024-04-12T12:43:46.210000 @@ -247657,7 +247664,7 @@ CVE-2024-30185,0,0,a781b9014abd19a00a8d62f1c673ab43addf79eb808bed01ac8422942c39f CVE-2024-30186,0,0,fb11f40c5a3e049b4173bd5ffb37b55dd352f80bf009d46c6a7e0ed4bd19ac71,2024-03-27T12:29:30.307000 CVE-2024-30187,0,0,f8d37ff5304c8d102184c9586047a497264eab63488a1192b60bf85807ce2976,2024-03-25T13:47:14.087000 CVE-2024-30189,0,0,3f4990ace311ce3f5f501a6dcf406cbed1780f0c03c898c2001b2eab67f70f47,2024-04-09T12:48:04.090000 -CVE-2024-3019,0,0,26781c9df250110b6a509bf87d739e51c2ab01078faac5b13ae615535afe533e,2024-04-30T20:15:08.733000 +CVE-2024-3019,0,1,b85ad020b3d00262d0df2bb978c3f5361041e08453f8ee7c90ad1b47480644cc,2024-05-22T17:16:15.600000 CVE-2024-30190,0,0,51fa3b61b1a89cc1e5bfc291b48055ea6ae2c46214176899850afb7f6a1c269a,2024-04-09T12:48:04.090000 CVE-2024-30191,0,0,ebc6f15da39286087c5d03b22d2078cfcc767238c4f5e6e7ea4485533eac454d,2024-04-09T12:48:04.090000 CVE-2024-30192,0,0,c058935b45ae3c1c682d0c8091f1486b6546bc2f278e4ebfa792d597067b45ed,2024-03-27T12:29:30.307000 @@ -248235,10 +248242,10 @@ CVE-2024-3107,0,0,8567b8b8d2bb62063ead5812f7765e864af3f68fdbb051cf4e93b652388b31 CVE-2024-31077,0,0,cf1dae6bdc673263e7fd88f3fafa76996295a3cc4f001c878e21a09e0714f3a7,2024-04-23T12:52:09.397000 CVE-2024-31078,0,0,12059b4643db1f23db61cb234ce054c5e189af8320b848468c77237912b37117,2024-05-07T13:39:32.710000 CVE-2024-3108,0,0,070c476c8b05a00833385189351777843e2f39cc6aadaede33e4faa3018d9caf,2024-05-03T14:17:53.690000 -CVE-2024-31080,0,0,f054913239e9fff00b61da9bc96b207964c9acbdd383172b674082b38bf77b8e,2024-05-01T18:15:22.810000 -CVE-2024-31081,0,0,136635ec06154c204154356b9c36d8a3fc773c3e25bcb66a4a971f2dbdc8623f,2024-05-01T18:15:22.920000 +CVE-2024-31080,0,1,cdbc4f09eb8eac5cf25cb51d2f02f17c8ee5ca9bcdeaeaf63cd9cb2120b0eb17,2024-05-22T17:16:14.877000 +CVE-2024-31081,0,1,14003613401dae123802c908d5eb27168372470521f72dfb8c084b577a194f7b,2024-05-22T17:16:15.070000 CVE-2024-31082,0,0,bdfcb057f85f6187632044603f1e26424250c3da20937699f7c7969b7292b011,2024-05-01T18:15:23.040000 -CVE-2024-31083,0,0,76dc21ce06953d3a10e999f11f9dd01e726d5ca49ee8fc785c75cf3d6666d197,2024-05-01T18:15:23.127000 +CVE-2024-31083,0,1,16c7b028efca45ca344e47a88e4c970f46b0f17eb6e326dd5dae586cc2c8984e,2024-05-22T17:16:15.223000 CVE-2024-31084,0,0,7e7f6ad60462c421140a8806edcef098f25e94de0014c2ff06256ca8e21d3894,2024-04-01T01:12:59.077000 CVE-2024-31085,0,0,159d63f28600902a854d5dada2c0b5fba89225c71015785af44f46e211303b47,2024-04-01T01:12:59.077000 CVE-2024-31086,0,0,3a59132be6de96612b5e7dbc7323f59f175814cf3bfa0c8c82639a22898b6c14,2024-04-15T13:15:31.997000 @@ -249396,10 +249403,17 @@ CVE-2024-33213,0,0,b148497f8be1950a6fa46d58723de7904955cc78b66d2d908246ba324bd2f CVE-2024-33214,0,0,e8bb1a89ed9a6fe57462cf7839328d6243261c99698249abe128719bc3054c5f,2024-04-24T13:39:42.883000 CVE-2024-33215,0,0,c8be43358325b8e905d28304a9339956d17f1418e85498fcb8a7134416d3977f,2024-04-24T13:39:42.883000 CVE-2024-33217,0,0,4e1e2d2adceccdbe12f057aebeef0a19faff919f64d3f29d52997e302777a311,2024-04-24T13:39:42.883000 -CVE-2024-33218,1,1,7249c988adc5d92dff0cae553abb8648ded282aea872d62c483942008ba68f7b,2024-05-22T15:15:28.550000 -CVE-2024-33219,1,1,ab0239815682c3d07bc6e2f9c341ab35d7339d9c39a5b59852ebae318851b719,2024-05-22T15:15:28.680000 -CVE-2024-33220,1,1,e15e19deb9a14dd926f1035841a5ddba85c3924b031e6183c438d7c9103db44b,2024-05-22T15:15:28.780000 -CVE-2024-33221,1,1,2f03c69b304ebec2914274e33dde50ff262402355507b26c38535ee0c9666379,2024-05-22T15:15:28.870000 +CVE-2024-33218,0,0,7249c988adc5d92dff0cae553abb8648ded282aea872d62c483942008ba68f7b,2024-05-22T15:15:28.550000 +CVE-2024-33219,0,0,ab0239815682c3d07bc6e2f9c341ab35d7339d9c39a5b59852ebae318851b719,2024-05-22T15:15:28.680000 +CVE-2024-33220,0,0,e15e19deb9a14dd926f1035841a5ddba85c3924b031e6183c438d7c9103db44b,2024-05-22T15:15:28.780000 +CVE-2024-33221,0,0,2f03c69b304ebec2914274e33dde50ff262402355507b26c38535ee0c9666379,2024-05-22T15:15:28.870000 +CVE-2024-33222,1,1,0b1e03decf069da78d521b13cb17604ad1461c59294efb3488a032ea6d5df370,2024-05-22T16:15:09.960000 +CVE-2024-33223,1,1,d66245c069881d095af7ac33767a4b4f26a623e505ac53f8d4b37c47db3629e4,2024-05-22T16:15:10.043000 +CVE-2024-33224,1,1,bb54e90510527cddc3dcde5a789e80f669e8c6710c35e8756a3483226471f212,2024-05-22T16:15:10.140000 +CVE-2024-33225,1,1,c588d947ca5b888e51da8e331d68186d09171017d678e0d3fc50990ff4434328,2024-05-22T16:15:10.220000 +CVE-2024-33226,1,1,de05c51ab10fcf999afc9d39b1714e6a73d2505cf4e557762b4be78d32f49294,2024-05-22T16:15:10.317000 +CVE-2024-33227,1,1,03386191d710962d0e9e1e794a4f07c97fd992f81932fe29f94b8fcd9c76405d,2024-05-22T16:15:10.403000 +CVE-2024-33228,1,1,758a8de4a85b30b77f90b3d1ff313ad1ee08b1e76b2d5c0d5da2fa46cdb70c39,2024-05-22T16:15:10.490000 CVE-2024-3323,0,0,5322a19626f9d41fbc85f0f073b4efac313efc9902bda6b2387f115ed4ea09c7,2024-04-17T20:08:21.887000 CVE-2024-33247,0,0,66af889d7e6ada10bf314bd53454c582a1455dd661c7cb5b07f6d9cd6d1d400f,2024-04-25T13:18:02.660000 CVE-2024-33250,0,0,80f5075a1ccdf0bbe31bc42b408e98f86c2ee0faa43a99a4e3de76f2fa1f2732,2024-05-14T16:12:23.490000 @@ -249998,6 +250012,7 @@ CVE-2024-34441,0,0,30a4318e62907426b3ab700c3b20e4f834f59441ac7ba3bdfe737a2f99871 CVE-2024-34445,0,0,5ae9c8efe1aaf47848c5b15a6687968aa01604c93efb870985c96be2737d2fc7,2024-05-14T16:12:23.490000 CVE-2024-34446,0,0,b445bdbcee2357cb0b4db1ab10e64a435c89bc8ae1d2fa2a306f3117c07625d0,2024-05-03T15:32:19.637000 CVE-2024-34447,0,0,7d0c1160e9ad74b2f0d138c65d27109e83600e38ed8d60bf74a510fb61e6f980,2024-05-14T15:39:08.297000 +CVE-2024-34448,1,1,2a939ae96b37c4bc51d7e0f7c82396c53fdcec382109ead546212b66ef511612,2024-05-22T16:15:10.580000 CVE-2024-34449,0,0,28da5cfb8215143a3847fc37f7163047e3e2e183b8d6abcf511553c3cec5bb16,2024-05-17T02:39:35.457000 CVE-2024-3445,0,0,2031eee497e177f244890449ab10d2f196dd08d103f846fc9b20779b1f74d465,2024-05-17T02:39:56.830000 CVE-2024-34453,0,0,9363deaf6a5ec68194d671cadb0973a2ba23402d3e2800c4f9eea6dbd677c5cd,2024-05-06T12:44:56.377000 @@ -250263,6 +250278,7 @@ CVE-2024-3534,0,0,3f1920931444a20406a7f610b0b64ebb830986df38b69b0c0bee94b2ffa95f CVE-2024-3535,0,0,f574fcdaa266eb8da2fb53308d734bd66c33a13c49e8b4335f6bdaf83f11e9c6,2024-05-17T02:39:59.803000 CVE-2024-3536,0,0,b63dbc7abf49c7babee61877e5b2a8e70e35b7a32ec432c7d29371fbe78ff8a5,2024-05-17T02:39:59.897000 CVE-2024-35361,0,0,981fcbfd9f4303bd43de5df85c3e320402b0db2b2b55c36fbcead39aa2c6a55b,2024-05-21T16:54:35.880000 +CVE-2024-35362,1,1,ea2753e7639e7c52029775eee0f7bfe15bf7d0ef604ec552f722a78009a737ad,2024-05-22T16:15:10.687000 CVE-2024-3537,0,0,a991188dca9ef4640adf7a802695a0fa207bb0c024fcd7aac535d47c4720436f,2024-05-17T02:39:59.987000 CVE-2024-3538,0,0,f8cabe6328eaf87ba6d9a024b15cf0edff2e3f1ab108489ec3ba849f1bf7e980,2024-05-17T02:40:00.087000 CVE-2024-35384,0,0,d21dcb965b72196df94f0bb7eb7aa18a6c33135d9d1348ad106df5e9cb4ecf63,2024-05-21T16:54:26.047000 @@ -250270,7 +250286,7 @@ CVE-2024-35385,0,0,21597def780ca6884558067b51483acdca600d8be33898c67abdcdef1ba10 CVE-2024-35386,0,0,63a53517daf1d5aaac9a967daf19124c43ab7a94d47ed1840eb2a25a89bf0357,2024-05-21T16:54:26.047000 CVE-2024-3539,0,0,60c05123a1e373dc128a0b3a0504b80a20c5ae87d598ef1e28e77594da7f3a50,2024-05-17T02:40:00.187000 CVE-2024-3540,0,0,c58fda32eb76563ef2ccd0b9c389537d6cfae50422ab18b8dbb1bd1161d40701,2024-05-17T02:40:00.280000 -CVE-2024-35409,1,1,8f7fe211171092bc9f721e49d41c7d59a7f5ed33f974c0543542b2249ac93411,2024-05-22T14:30:41.953000 +CVE-2024-35409,0,0,8f7fe211171092bc9f721e49d41c7d59a7f5ed33f974c0543542b2249ac93411,2024-05-22T14:30:41.953000 CVE-2024-3541,0,0,4678afe637b96076af7a5175ea4b3f0b09c929a839eb19db5485fd9bba275844,2024-05-17T02:40:00.373000 CVE-2024-3542,0,0,51b6d50efd1b210d7db5947c3dd204f04f701b4bbaf819f3c8cb9ee3b17490e4,2024-05-17T02:40:00.463000 CVE-2024-3543,0,0,fcdce76ee9f664c4051d70ca4d8408961eb7768c8664bc2d390108d6130755df,2024-05-02T18:00:37.360000 @@ -250278,25 +250294,25 @@ CVE-2024-3544,0,0,9c89c629785658109b56b96c611d48bc2c812cfaf631fdfc3e653cecb7fc80 CVE-2024-3545,0,0,5bce2ec2b9cfe5866e6246067691b4f478da11354be249c7fe197f29a14875e8,2024-04-10T13:23:38.787000 CVE-2024-3546,0,0,b7d401512e71f405610f26682a516af89f926e43ff4e75a0c9aadb49aa034713,2024-05-02T18:00:37.360000 CVE-2024-3547,0,0,fedd03df736ec1706076663d75a5df99f3108b401b2cf8280bfcd344106c9920,2024-05-14T16:11:39.510000 -CVE-2024-35475,1,1,daed0b1c028d37a4b84db07ca0cfe64c43d18fffdfd6604041b14733e87830df,2024-05-22T14:30:41.953000 +CVE-2024-35475,0,0,daed0b1c028d37a4b84db07ca0cfe64c43d18fffdfd6604041b14733e87830df,2024-05-22T14:30:41.953000 CVE-2024-3548,0,0,e23424ba819983ac2599fe48852cbfc904a10db222c55ccac010f7ec55b39028,2024-05-15T16:40:19.330000 CVE-2024-3550,0,0,be0f7ed1cc8c69e2fefc881c953115f1247b844866a37cfd3935f1cbe0fa2b81,2024-05-02T18:00:37.360000 CVE-2024-3551,0,0,707951f769b10080ccfb0e7ec01d2b664cd8f0bbbe9c53d60fa858f7750b27d7,2024-05-17T18:36:05.263000 CVE-2024-3553,0,0,35fab26edb78f51246dfea40a1da2d2c641df3766aad72a071763d4720020731,2024-05-02T18:00:37.360000 CVE-2024-3554,0,0,b4c32859301bcc314e2dd2301d5e454826bca59cac4e6957d0f808d223349460,2024-05-02T18:00:37.360000 -CVE-2024-35550,1,1,37f092ffd3479b49a17a3f1e0b59c5eb78c37c7f630f220f7d9da2f87aa31c70,2024-05-22T14:30:41.953000 -CVE-2024-35551,1,1,55348e3e9b91019d2da6672295479fd69fa625e27aec5015db688469eae4d28b,2024-05-22T14:30:41.953000 -CVE-2024-35552,1,1,d29f0b3c09feb8f421981bd791ddf8677627e74d3b97b0e96f76b0caeb4eb522,2024-05-22T14:30:41.953000 -CVE-2024-35553,1,1,5cacc76057b5383052abf0edcc1ef075364591ebb50b0ebbfe4575a5f816f884,2024-05-22T14:30:41.953000 -CVE-2024-35554,1,1,c9fb199f520c9b3540bda40b78f438d49a82428657df7edaf25fab5788e959aa,2024-05-22T14:30:41.953000 -CVE-2024-35555,1,1,6fa171af592d3c23af2e31e5853d7ad35c26e1019a331f0ec65b474920644aa8,2024-05-22T14:30:41.953000 -CVE-2024-35556,1,1,5dab83cfcdff3e508077c4205f919095654014396a21c674bd4ae0c0aeda07cc,2024-05-22T14:30:41.953000 -CVE-2024-35557,1,1,8f0056946231aa3e1883a87ac4342cf756bc743823031d082d99bb86849e21f2,2024-05-22T14:30:41.953000 -CVE-2024-35558,1,1,ef2c6ac3d24a10327d510beae9693416f9c600012d96241e00bb733f56fd10da,2024-05-22T14:30:41.953000 -CVE-2024-35559,1,1,0e0ce300b73ed62ad8a51cb05e5d24371bbac77caf688feb79ef16ffd51847b1,2024-05-22T14:30:41.953000 +CVE-2024-35550,0,0,37f092ffd3479b49a17a3f1e0b59c5eb78c37c7f630f220f7d9da2f87aa31c70,2024-05-22T14:30:41.953000 +CVE-2024-35551,0,0,55348e3e9b91019d2da6672295479fd69fa625e27aec5015db688469eae4d28b,2024-05-22T14:30:41.953000 +CVE-2024-35552,0,0,d29f0b3c09feb8f421981bd791ddf8677627e74d3b97b0e96f76b0caeb4eb522,2024-05-22T14:30:41.953000 +CVE-2024-35553,0,0,5cacc76057b5383052abf0edcc1ef075364591ebb50b0ebbfe4575a5f816f884,2024-05-22T14:30:41.953000 +CVE-2024-35554,0,0,c9fb199f520c9b3540bda40b78f438d49a82428657df7edaf25fab5788e959aa,2024-05-22T14:30:41.953000 +CVE-2024-35555,0,0,6fa171af592d3c23af2e31e5853d7ad35c26e1019a331f0ec65b474920644aa8,2024-05-22T14:30:41.953000 +CVE-2024-35556,0,0,5dab83cfcdff3e508077c4205f919095654014396a21c674bd4ae0c0aeda07cc,2024-05-22T14:30:41.953000 +CVE-2024-35557,0,0,8f0056946231aa3e1883a87ac4342cf756bc743823031d082d99bb86849e21f2,2024-05-22T14:30:41.953000 +CVE-2024-35558,0,0,ef2c6ac3d24a10327d510beae9693416f9c600012d96241e00bb733f56fd10da,2024-05-22T14:30:41.953000 +CVE-2024-35559,0,0,0e0ce300b73ed62ad8a51cb05e5d24371bbac77caf688feb79ef16ffd51847b1,2024-05-22T14:30:41.953000 CVE-2024-3556,0,0,3585ee5c92a9c3d529b040dd670fbfee3d6182484f87bd29638348adaae5ce9a,2024-04-09T22:15:07.470000 -CVE-2024-35560,1,1,597dd8543549aa3918a7c198c5233aa0b7527be9ddf9110727da0897342b10aa,2024-05-22T14:30:41.953000 -CVE-2024-35561,1,1,8de74913deeb82bc0c13bc3d399d98340f8983a7e0aea38e829e82b55ca5ac91,2024-05-22T14:30:41.953000 +CVE-2024-35560,0,0,597dd8543549aa3918a7c198c5233aa0b7527be9ddf9110727da0897342b10aa,2024-05-22T14:30:41.953000 +CVE-2024-35561,0,0,8de74913deeb82bc0c13bc3d399d98340f8983a7e0aea38e829e82b55ca5ac91,2024-05-22T14:30:41.953000 CVE-2024-35571,0,0,67f76ae9f90c9f57899e4b508cc3f136e4d8caf290ab8a02ecec3dd8d722ed10,2024-05-20T19:34:58.277000 CVE-2024-35576,0,0,6cb958bfbb2aa8f28dc30b2057abfc4520624058806f8d23062e42f766a7e31c,2024-05-20T19:34:58.277000 CVE-2024-35578,0,0,9b6af24900c97b8c8fceb2460e2cf2035a5639481f86d7f4da562c9cc2c3932d,2024-05-20T19:34:58.277000 @@ -250557,13 +250573,14 @@ CVE-2024-36010,0,0,6f643d760193939acd403776f35d8094295a237f49299303e96b8a627d329 CVE-2024-36039,0,0,7819448caea04349894603b655b7a026f4a20175e41e6c559f30343634b66d20,2024-05-21T16:53:56.550000 CVE-2024-36043,0,0,8d68423d5fd19f184b1028d7213d8202af063db8832c1e9d8a6916cceea3f12f,2024-05-20T13:00:04.957000 CVE-2024-36048,0,0,b5cb97f8eb2dd5aaf745035f8a3442137591158895420be0c263c765fd00e4a2,2024-05-20T13:00:04.957000 -CVE-2024-36050,0,0,c79fc89a48ed89dcf4d15eeef3d834fb7c79d060d7834770c6d234944bbaaa4c,2024-05-20T13:00:04.957000 +CVE-2024-36050,0,1,4c307008c713c918a6e3b84da1e5e49b2b2247354b7102850872f2f1076c6edc,2024-05-22T16:15:10.777000 CVE-2024-36052,0,0,a63d7bb2074a4a528ba25d1f94374ebf75880c4428a5213e9c4d314234666c24,2024-05-22T12:46:53.887000 CVE-2024-36053,0,0,fef1cd5ec117c37d553d30976d7cdcb88e8779793eaefe814dd4e91dcea20b01,2024-05-20T13:00:04.957000 CVE-2024-3606,0,0,aad549bdf5ff1831d91b9701456650bb1ccc1938c3f938f0c7eb426394ab8356,2024-05-02T18:00:37.360000 CVE-2024-3607,0,0,af4721086df8378a380a0243b924575fce7196863af6b8319186a0a7c6039e9f,2024-05-02T18:00:37.360000 CVE-2024-36070,0,0,19c2fc8fdc41593f53c176f18e743efa8020d50d8ffdbcbf1475257d2bfa8428,2024-05-20T13:00:04.957000 CVE-2024-36076,0,0,7bd178b56b4ea91c0d10da16861cc8958caaaa1d0561d3821785629a0cb379df,2024-05-21T20:15:08.970000 +CVE-2024-36077,1,1,1e20afe8f11cd7adc739bc407caccf40ce84fa39af5192cb7db769a973dc0f52,2024-05-22T17:16:15.377000 CVE-2024-36078,0,0,033f7985523b33a9cd47ae7b39c65b68fc3ef0710dcf434d451eae182ed35127,2024-05-20T13:00:04.957000 CVE-2024-36080,0,0,57481f5a54f68f6f7f09dded26dd0588b050980d38ac9c78940318892c2197a1,2024-05-20T13:00:04.957000 CVE-2024-36081,0,0,0aabc3d5ec0a35d1482a2ee38b1087a1798092236c6b1a2ef029f3cd7c35526c,2024-05-20T13:00:04.957000 @@ -250801,7 +250818,7 @@ CVE-2024-3914,0,0,4e5bf7e4bbf357662295118acaf46c6e90e6b4b9830d6a3e29a74e49dd1420 CVE-2024-3915,0,0,a29a2abe3549638b7baa29d25d43b9e7f1e9b70435ac870f9f426e12fb2f2812,2024-05-14T16:11:39.510000 CVE-2024-3916,0,0,67c028ed5cffa81651cfdb7590d8583ba32a4964953feede869ed8c9f6426eef,2024-05-14T16:11:39.510000 CVE-2024-3923,0,0,dcd7a979944a34edd9f4dd960691916feb4f3b194c37e215c41a761a1e13cac2,2024-05-14T16:11:39.510000 -CVE-2024-3926,1,1,cb339a98e87185eb47ae9e44f7eb46b88833711568c7150447215eeb823999c4,2024-05-22T15:15:28.967000 +CVE-2024-3926,0,0,cb339a98e87185eb47ae9e44f7eb46b88833711568c7150447215eeb823999c4,2024-05-22T15:15:28.967000 CVE-2024-3927,0,0,7829cb310d77178b7eeb75814db111ab7836f1cd335248ee93c84ada4720d633,2024-05-22T12:46:53.887000 CVE-2024-3928,0,0,537f117f8c3572d036e1aa43e9ee1a226723d4a5980268ff58c8876839ea31b2,2024-05-17T02:40:11.687000 CVE-2024-3929,0,0,31d0a734bfd88727a2a61deb7a29595ac9c8ac4a930ee35c31639990489d025d,2024-04-25T13:18:13.537000 @@ -250986,7 +251003,7 @@ CVE-2024-4252,0,0,3896f5ee238bad3d7e0a938dc110cad0a34521ba589448d2dc895a14fc5112 CVE-2024-4255,0,0,fe667b23218914fa44fee4b4c2a7be125396fae9094659c59aa2ca90b0b1e450,2024-05-17T02:40:21.147000 CVE-2024-4256,0,0,f01b9b3012ce7ea24c9894def6f3f1cef49ac09bb4f57d3ed8f552e5b1070b71,2024-05-17T02:40:21.240000 CVE-2024-4257,0,0,0f6d2313bd719b89d901deefe2dc2f87463055c189b3c018795a055e61e9ea45,2024-05-17T02:40:21.330000 -CVE-2024-4261,0,1,c2224f2306443d2b306e68003a35b6477d4e0aa1b3074bee3268e0ea9deb3145,2024-05-22T14:30:41.953000 +CVE-2024-4261,0,0,c2224f2306443d2b306e68003a35b6477d4e0aa1b3074bee3268e0ea9deb3145,2024-05-22T14:30:41.953000 CVE-2024-4262,0,0,48de03b038c3a9950f1b2d36329d9f6a6297e28f8023eb3afff323d082fd07dd,2024-05-22T12:46:53.887000 CVE-2024-4263,0,0,b1f2b30077721ef2ca6e11fb6bda0f0973b13bae19df9c4c6804c151ec0ef6fb,2024-05-16T13:03:05.353000 CVE-2024-4264,0,0,900b6e21a73808decad0bbd9ff6caa01ca608bdbd52b2ff79e0e58d7828f5894,2024-05-20T13:00:34.807000 @@ -251155,6 +251172,7 @@ CVE-2024-4559,0,0,04253977f1b3aac9c2c8228f67b55a5d97f0f228a3fd1b3fdffeaf9dbbc176 CVE-2024-4560,0,0,01330bc30e6abf90cd0e894076fd4822775b90946ecfbbe71c3855f1f2c00212,2024-05-14T16:11:39.510000 CVE-2024-4561,0,0,419f075cb470fc0bcbe1e02ad47a96fd3735721568a3ea0b27d92242ea08e526,2024-05-15T16:40:19.330000 CVE-2024-4562,0,0,4b41dac3b3dc0160472fa769fd66d4820687adcd6a603b6680aeb5866557430b,2024-05-15T16:40:19.330000 +CVE-2024-4563,1,1,57acef1c5d1c9a053c99dc74be3ef8002736b576d71b424d5374b4ea0fbda9ef,2024-05-22T17:16:15.730000 CVE-2024-4566,0,0,56d6dff8001ced0ac379df1540d8c705e1cb0415cd6a569faf0604bdd4ed8dc7,2024-05-21T12:37:59.687000 CVE-2024-4567,0,0,bff521ec958712c348010a89da0e0aec519b6a717613a798e9a8fee426de5e74,2024-05-14T16:11:39.510000 CVE-2024-4568,0,0,79c6e65478e2e86d702896e792fead76bbebdb118f8c0f66e6390a241a22321a,2024-05-07T13:39:32.710000 @@ -251461,6 +251479,11 @@ CVE-2024-5136,0,0,7e1453b58a6b8cdb889318a17e467bc4887e911147f2bbd5898eefe5c0fc0f CVE-2024-5137,0,0,9ef636c571a0277ac03884ccb19a37de0ac2ceab7c0195ff8a91e587e734c012,2024-05-20T13:00:04.957000 CVE-2024-5145,0,0,779a53179978014855de22e41604c12feef2bb6901d36d253a629d55b7b44ab6,2024-05-21T12:37:59.687000 CVE-2024-5147,0,0,f786cdd04c7e64ee05dc3a502a4fef5436dd8390bfdc70803ca93e4405d481a0,2024-05-22T12:46:53.887000 +CVE-2024-5157,1,1,04ebc9442b1c80ffa0dc60d2577cbe7978be2624ce08688ce3f01b984bd25d6e,2024-05-22T16:15:10.863000 +CVE-2024-5158,1,1,a9c18c9b6c25698a66146c7b4d6323d152494bd2e2d9c667b0869e006f7d2fd0,2024-05-22T16:15:10.947000 +CVE-2024-5159,1,1,99c9971f3a1075bf94db8dcfabdb2b5e95a362d2273c1f3b36e7008161857ef6,2024-05-22T16:15:11.013000 +CVE-2024-5160,1,1,b69866da66290415d8426d0a84016d2481bc653e74865d8dd8f61b1fce439920,2024-05-22T16:15:11.087000 +CVE-2024-5166,1,1,c5647a6d803dd352ef54e3847221a913a10c8f1aa155cfee1c20c0eb77c72363,2024-05-22T17:16:15.957000 CVE-2024-5190,0,0,e11755e15485ad7d65ed59ac9abe5cac7f4b4c3e2591d1a6c69b4386ed9dea65,2024-05-22T03:15:08.273000 CVE-2024-5193,0,0,10c68e7444190b04603fe41121d5ca46f60a4a86754539b9aa3d12094e724599,2024-05-22T12:46:53.887000 CVE-2024-5194,0,0,449708a9669696a9d45dc12d62d0dd60618e438564c2c2163a0a40f19cb2695e,2024-05-22T12:46:53.887000