diff --git a/CVE-2021/CVE-2021-413xx/CVE-2021-41320.json b/CVE-2021/CVE-2021-413xx/CVE-2021-41320.json index 904841ba1c2..8a858cb634e 100644 --- a/CVE-2021/CVE-2021-413xx/CVE-2021-41320.json +++ b/CVE-2021/CVE-2021-413xx/CVE-2021-41320.json @@ -2,12 +2,12 @@ "id": "CVE-2021-41320", "sourceIdentifier": "cve@mitre.org", "published": "2021-10-15T16:15:07.493", - "lastModified": "2021-10-21T14:13:48.200", - "vulnStatus": "Analyzed", + "lastModified": "2024-05-27T14:15:09.100", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", - "value": "A technical user has hardcoded credentials in Wallstreet Suite TRM 7.4.83 (64-bit edition) with higher privilege than the average authenticated user." + "value": "A technical user has hardcoded credentials in Wallstreet Suite TRM 7.4.83 (64-bit edition) with higher privilege than the average authenticated user. NOTE: the vendor disputes this because the password is not hardcoded (it can be changed during installation or at any later time)." }, { "lang": "es", @@ -113,6 +113,10 @@ } ], "references": [ + { + "url": "https://client-connect.iongroup.com/library/content/treasury-management/wallstreet-suite/security/suite-7-4-83/user-passwords/", + "source": "cve@mitre.org" + }, { "url": "https://excellium-services.com/cert-xlm-advisory/CVE-2021-41320", "source": "cve@mitre.org", diff --git a/CVE-2023/CVE-2023-509xx/CVE-2023-50977.json b/CVE-2023/CVE-2023-509xx/CVE-2023-50977.json new file mode 100644 index 00000000000..7c4cc7fbdce --- /dev/null +++ b/CVE-2023/CVE-2023-509xx/CVE-2023-50977.json @@ -0,0 +1,24 @@ +{ + "id": "CVE-2023-50977", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-05-27T14:15:09.380", + "lastModified": "2024-05-27T14:15:09.380", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "In GNOME Shell through 45.2, unauthenticated remote code execution can be achieved by intercepting two DNS requests (GNOME Network Manager and GNOME Shell Portal Helper connectivity checks), and responding with attacker-specific IP addresses. This DNS hijacking causes GNOME Captive Portal to be launched via a WebKitGTK browser, by default, on the victim system; this can run JavaScript code inside a sandbox. NOTE: the vendor's position is that this is not a vulnerability because running JavaScript code inside a sandbox is the intended behavior." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://gitlab.gnome.org/GNOME/gnome-shell/-/blob/ceed3e07e44f2cd1bfdbf273523abc0bb4bbd8c1/js/portalHelper/main.js", + "source": "cve@mitre.org" + }, + { + "url": "https://gitlab.gnome.org/GNOME/gnome-shell/-/issues/7666", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-08xx/CVE-2024-0851.json b/CVE-2024/CVE-2024-08xx/CVE-2024-0851.json new file mode 100644 index 00000000000..53cb1e89bbe --- /dev/null +++ b/CVE-2024/CVE-2024-08xx/CVE-2024-0851.json @@ -0,0 +1,32 @@ +{ + "id": "CVE-2024-0851", + "sourceIdentifier": "iletisim@usom.gov.tr", + "published": "2024-05-27T15:15:08.780", + "lastModified": "2024-05-27T15:15:08.780", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Grup Arge Energy and Control Systems Smartpower allows SQL Injection.This issue affects Smartpower: through V24.05.27." + } + ], + "metrics": {}, + "weaknesses": [ + { + "source": "iletisim@usom.gov.tr", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "references": [ + { + "url": "https://www.usom.gov.tr/bildirim/tr-24-0556", + "source": "iletisim@usom.gov.tr" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-32xx/CVE-2024-3205.json b/CVE-2024/CVE-2024-32xx/CVE-2024-3205.json index 7a2dd4714dd..8da3a607acb 100644 --- a/CVE-2024/CVE-2024-32xx/CVE-2024-3205.json +++ b/CVE-2024/CVE-2024-32xx/CVE-2024-3205.json @@ -2,95 +2,14 @@ "id": "CVE-2024-3205", "sourceIdentifier": "cna@vuldb.com", "published": "2024-04-02T23:15:54.627", - "lastModified": "2024-05-17T02:39:46.847", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-05-27T15:15:08.930", + "vulnStatus": "Rejected", "descriptions": [ { "lang": "en", - "value": "A vulnerability was found in yaml libyaml up to 0.2.5 and classified as critical. Affected by this issue is the function yaml_emitter_emit_flow_sequence_item of the file /src/libyaml/src/emitter.c. The manipulation leads to heap-based buffer overflow. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-259052. NOTE: The vendor was contacted early about this disclosure but did not respond in any way." - }, - { - "lang": "es", - "value": "Una vulnerabilidad fue encontrada en yaml libyaml hasta 0.2.5 y clasificada como cr\u00edtica. La funci\u00f3n yaml_emitter_emit_flow_sequence_item del archivo /src/libyaml/src/emitter.c es afectada por esta vulnerabilidad. La manipulaci\u00f3n conduce a un desbordamiento de b\u00fafer de almacenamiento din\u00e1mico. El ataque puede lanzarse de forma remota. El exploit ha sido divulgado al p\u00fablico y puede utilizarse. El identificador de esta vulnerabilidad es VDB-259052. NOTA: Se contact\u00f3 primeramente al proveedor sobre esta divulgaci\u00f3n, pero no respondi\u00f3 de ninguna manera." + "value": "Rejected reason: ** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: The maintainer identified an error in the libyaml fuzzers. It is not possible to reproduce nor exploit the issue." } ], - "metrics": { - "cvssMetricV31": [ - { - "source": "cna@vuldb.com", - "type": "Secondary", - "cvssData": { - "version": "3.1", - "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", - "attackVector": "NETWORK", - "attackComplexity": "LOW", - "privilegesRequired": "NONE", - "userInteraction": "NONE", - "scope": "UNCHANGED", - "confidentialityImpact": "LOW", - "integrityImpact": "LOW", - "availabilityImpact": "LOW", - "baseScore": 7.3, - "baseSeverity": "HIGH" - }, - "exploitabilityScore": 3.9, - "impactScore": 3.4 - } - ], - "cvssMetricV2": [ - { - "source": "cna@vuldb.com", - "type": "Secondary", - "cvssData": { - "version": "2.0", - "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", - "accessVector": "NETWORK", - "accessComplexity": "LOW", - "authentication": "NONE", - "confidentialityImpact": "PARTIAL", - "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 - }, - "baseSeverity": "HIGH", - "exploitabilityScore": 10.0, - "impactScore": 6.4, - "acInsufInfo": false, - "obtainAllPrivilege": false, - "obtainUserPrivilege": false, - "obtainOtherPrivilege": false, - "userInteractionRequired": false - } - ] - }, - "weaknesses": [ - { - "source": "cna@vuldb.com", - "type": "Primary", - "description": [ - { - "lang": "en", - "value": "CWE-122" - } - ] - } - ], - "references": [ - { - "url": "https://drive.google.com/drive/folders/1lwNEs8wqwkUV52f3uQNYMPrxRuXPtGQs?usp=sharing", - "source": "cna@vuldb.com" - }, - { - "url": "https://vuldb.com/?ctiid.259052", - "source": "cna@vuldb.com" - }, - { - "url": "https://vuldb.com/?id.259052", - "source": "cna@vuldb.com" - }, - { - "url": "https://vuldb.com/?submit.304561", - "source": "cna@vuldb.com" - } - ] + "metrics": {}, + "references": [] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-344xx/CVE-2024-34477.json b/CVE-2024/CVE-2024-344xx/CVE-2024-34477.json new file mode 100644 index 00000000000..f09a1935889 --- /dev/null +++ b/CVE-2024/CVE-2024-344xx/CVE-2024-34477.json @@ -0,0 +1,24 @@ +{ + "id": "CVE-2024-34477", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-05-27T14:15:09.470", + "lastModified": "2024-05-27T14:15:09.470", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "configureNFS in lib/common/functions.sh in FOG through 1.5.10 allows local users to gain privileges by mounting a crafted NFS share (because of no_root_squash and insecure). In order to exploit the vulnerability, someone needs to mount an NFS share in order to add an executable file as root. In addition, the SUID bit must be added to this file." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://forums.fogproject.org/topic/17486/fog-1-5-10-and-earlier-nfs-privilege-escalation-vulnerability", + "source": "cve@mitre.org" + }, + { + "url": "https://github.com/FOGProject/fogproject/blob/a4bb1bf39ac53c3cbe623576915fbc3b5c80a00f/lib/common/functions.sh#L1360", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/README.md b/README.md index 27a9909777f..6722278672f 100644 --- a/README.md +++ b/README.md @@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2024-05-27T14:01:09.648917+00:00 +2024-05-27T16:00:30.174150+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2024-05-27T13:15:09.040000+00:00 +2024-05-27T15:15:08.930000+00:00 ``` ### Last Data Feed Release @@ -33,26 +33,24 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### Total Number of included CVEs ```plain -251864 +251867 ``` ### CVEs added in the last Commit -Recently added CVEs: `7` +Recently added CVEs: `3` -- [CVE-2023-6349](CVE-2023/CVE-2023-63xx/CVE-2023-6349.json) (`2024-05-27T12:15:08.810`) -- [CVE-2024-3381](CVE-2024/CVE-2024-33xx/CVE-2024-3381.json) (`2024-05-27T13:15:08.490`) -- [CVE-2024-5405](CVE-2024/CVE-2024-54xx/CVE-2024-5405.json) (`2024-05-27T12:15:09.067`) -- [CVE-2024-5406](CVE-2024/CVE-2024-54xx/CVE-2024-5406.json) (`2024-05-27T12:15:09.333`) -- [CVE-2024-5407](CVE-2024/CVE-2024-54xx/CVE-2024-5407.json) (`2024-05-27T13:15:08.573`) -- [CVE-2024-5408](CVE-2024/CVE-2024-54xx/CVE-2024-5408.json) (`2024-05-27T13:15:08.817`) -- [CVE-2024-5409](CVE-2024/CVE-2024-54xx/CVE-2024-5409.json) (`2024-05-27T13:15:09.040`) +- [CVE-2023-50977](CVE-2023/CVE-2023-509xx/CVE-2023-50977.json) (`2024-05-27T14:15:09.380`) +- [CVE-2024-0851](CVE-2024/CVE-2024-08xx/CVE-2024-0851.json) (`2024-05-27T15:15:08.780`) +- [CVE-2024-34477](CVE-2024/CVE-2024-344xx/CVE-2024-34477.json) (`2024-05-27T14:15:09.470`) ### CVEs modified in the last Commit -Recently modified CVEs: `0` +Recently modified CVEs: `2` +- [CVE-2021-41320](CVE-2021/CVE-2021-413xx/CVE-2021-41320.json) (`2024-05-27T14:15:09.100`) +- [CVE-2024-3205](CVE-2024/CVE-2024-32xx/CVE-2024-3205.json) (`2024-05-27T15:15:08.930`) ## Download and Usage diff --git a/_state.csv b/_state.csv index aac6ae72180..377ee525cf1 100644 --- a/_state.csv +++ b/_state.csv @@ -182895,7 +182895,7 @@ CVE-2021-41316,0,0,9451f6e2182248f381d8312075b70cc52b7b28fd6f398b0906a9d6af744cf CVE-2021-41317,0,0,1e30c3a3cdc2d93da5d5ec7a73c27bdb779d243cf4ebf81d79f9cc20888caecd,2021-09-28T16:01:14.137000 CVE-2021-41318,0,0,3cbda06907c12914b33017e7fd86178d4f26c2bb4744fdb95b60f4d5407af421,2021-10-07T12:45:46.713000 CVE-2021-4132,0,0,05e8a46a6069ed38408d6cc58c95941cc9ad669d41a089a85eac0a259c9e89fb,2021-12-21T15:07:42.040000 -CVE-2021-41320,0,0,46f79cb3d0faeb83fa6bdf03a6aaf7f7fadecc2775ce2bf8777b4b6dd0df1cdc,2021-10-21T14:13:48.200000 +CVE-2021-41320,0,1,f5ef8c03ed0f3faf0ed201b0b87a38bd86c2a51aeb107ef1559ccfcfe1f2021a,2024-05-27T14:15:09.100000 CVE-2021-41322,0,0,b703288a0976ae25b7f3e242b48042b91c5deb005d49f387e230e92f847be568,2023-08-08T14:22:24.967000 CVE-2021-41323,0,0,d9ad37356690fe59a2f00da0b55e317d864104ab9f4bfaf6cfa10064bdf0afa1,2021-10-07T03:00:37.570000 CVE-2021-41324,0,0,8db7a914b5d2aab764a489b67f58f13404a8e9bbafef8419f38e4aea8e975234,2021-10-07T21:56:24.883000 @@ -236979,6 +236979,7 @@ CVE-2023-5097,0,0,0f86cc372d2c26b6541ac3ec5ba289a39a168bf65c355711efa9e745857fe3 CVE-2023-50974,0,0,64121c933f739d8b35ccb2b018adc49dbc3ecd37fb638c0ca9261e8aa268c1c8,2024-01-12T20:25:04.120000 CVE-2023-50975,0,0,a3c387351b5cb3112ae57eb6decd6048c7e5563bc70bcc034afc09ab81c61e0e,2024-02-22T19:07:27.197000 CVE-2023-50976,0,0,b4013c170504d7533d23aee05010a848cbe499012767fb0ca51aae1561e21e35,2023-12-22T21:23:23.067000 +CVE-2023-50977,1,1,830fcc975f7a0f322641c0eeec4b2a9affa4b537e1db455e6df64c1a6d75d785,2024-05-27T14:15:09.380000 CVE-2023-50979,0,0,db30250302fec4fba765b6baf7a0d8d9d9cc8fd12a61cfeda28a01f641ae78e8,2023-12-27T18:59:12.027000 CVE-2023-5098,0,0,b1f60952efad14350a7dcf5b932f9846957c48bb7b9f485b0d1c0be187395d0b,2023-11-08T18:33:48.503000 CVE-2023-50980,0,0,51bd43ebed75455dbf4f815998127cca51023596397489e47e4540205169564f,2023-12-27T19:04:11.283000 @@ -239364,7 +239365,7 @@ CVE-2023-6345,0,0,a9d7fbb37b5bedc60cc374c5aba487da97d8bafd2dd093fe7949f604d257b7 CVE-2023-6346,0,0,c40bf8c265a92108ff97f9d05c1f66ae31d46069c960237aa0eb79c96f65109d,2024-01-31T17:15:23.213000 CVE-2023-6347,0,0,d95524d2c228513203a102be0e94cb621b285684af6da72197460b84ebeb516d,2024-01-31T17:15:23.647000 CVE-2023-6348,0,0,706b82708bceb6844e727704576bb420554258a8d74eede78820e3034fd2985c,2024-01-31T17:15:23.980000 -CVE-2023-6349,1,1,339d13717e8ecfab2196bb13c6a4404b7b127f771b20585d94508cfec3aacc82,2024-05-27T12:15:08.810000 +CVE-2023-6349,0,0,339d13717e8ecfab2196bb13c6a4404b7b127f771b20585d94508cfec3aacc82,2024-05-27T12:15:08.810000 CVE-2023-6350,0,0,9d7ad504737b94d45fc95132d0bdf31e98f4b10c438be5a55687a8cc1730d327,2024-01-31T17:15:24.350000 CVE-2023-6351,0,0,b642b9477c499dc985ed242dcc1430092dc5faffae820429036d91341cf9907b,2024-01-31T17:15:24.673000 CVE-2023-6352,0,0,a7c9f6deee309d44509b6c9208a201145230316f41723e551e729328a3c70e36,2023-12-11T14:40:41.233000 @@ -240823,6 +240824,7 @@ CVE-2024-0844,0,0,9b0ede7ee0379ed34aa516e6f2cba464e96d05ae45278d47c03f7b0b4baaf7 CVE-2024-0847,0,0,2423a45a83c68ee77ea1657795a6b4f742f1b905ef7ab47fbb7c37fbc6c3b67d,2024-05-02T18:00:37.360000 CVE-2024-0848,0,0,31e58640f306446653f67bc78198fcff39c93c6b22a4398146342d7991ad8c6a,2024-05-02T18:00:37.360000 CVE-2024-0849,0,0,ab143b9a0b5d37d266faac9cd54f50fee666b57f962e8e1bec5db73357a455f9,2024-02-13T19:16:30.810000 +CVE-2024-0851,1,1,e64047998fdc7127744d767cf997e0a60484a135cf88b67269b94715d365c945,2024-05-27T15:15:08.780000 CVE-2024-0853,0,0,48741ff766ade9b023961bbceceaafd7a1985d06925636a8fc9f27ee5d25b1a6,2024-05-03T13:15:21.320000 CVE-2024-0854,0,0,b2a19a635a88b4ff68549abb31f11c392c07f9e329d9704350bbb3ee75810c41,2024-01-30T17:01:37.127000 CVE-2024-0855,0,0,fee06b61accc977f963cdb2b2ef743d4f7ee62d05033c371692bc8e3d7ebf823,2024-02-27T14:20:06.637000 @@ -248899,7 +248901,7 @@ CVE-2024-32045,0,0,3757a773847b5ed6c32fb24905f0b5c02d842b84e0e51fc3b349b201665bf CVE-2024-32046,0,0,3771b70436f95435fc521db21da6fd859bb3ed607b3e6e7edd188445267746f3,2024-04-26T12:58:17.720000 CVE-2024-32047,0,0,f009d59be96ce9fa193a4aa9724cc4cc41ffb33bc61e4f05b98fbbfa91a9068b,2024-05-16T13:03:05.353000 CVE-2024-32049,0,0,d9cad06fbf5a30eecb78b22409f73f445b96767def965004d9fc51455fda8ca6,2024-05-08T17:05:24.083000 -CVE-2024-3205,0,0,c3a9ce84fafed58ce2fc8a240f386de0c3cae4edd5893ee1ae56b7013f99ec1a,2024-05-17T02:39:46.847000 +CVE-2024-3205,0,1,94de9427276f5133bdfe91db56cbfc9958b517e8a2bb181bf6c470a918feb832,2024-05-27T15:15:08.930000 CVE-2024-32051,0,0,6b68078466255ceca82525e73c2bf321431fb4aeacd1939a9b40ac3cfa9637f8,2024-04-24T13:39:42.883000 CVE-2024-32053,0,0,c49f1ec019a03a55c7a246c2938dce6b00883e32de7837d58b7e2304f1b45b97,2024-05-16T13:03:05.353000 CVE-2024-32055,0,0,6f2d1e2b794c469fc60e21d2252e9f5df7bf8f202c22d166d778068242a50bff,2024-05-14T19:17:55.627000 @@ -249842,7 +249844,7 @@ CVE-2024-33791,0,0,2786e7a8195c6ad972434c0d7a30a33f957fdd2fdd91aaac75f6ce3fbef54 CVE-2024-33792,0,0,7e8694e2bb2a659e8d08c902362d29026ff1c04595111f0bccc0fd7b0663e1e1,2024-05-07T05:15:51.893000 CVE-2024-33793,0,0,1bdbd66edb6a4ee81475ab628b3dbabe390dd8c440854dad95c22ae762967d37,2024-05-07T06:15:08.720000 CVE-2024-33809,0,0,a9244b7bac7a01a848ecf7adc4839dcc7ecaf56436a02182e43d1bf648cb6641,2024-05-24T18:09:20.027000 -CVE-2024-3381,1,1,2675878f918c9740671fc065cc6afea6b859e07b3f755ce74555424e09b49f5d,2024-05-27T13:15:08.490000 +CVE-2024-3381,0,0,2675878f918c9740671fc065cc6afea6b859e07b3f755ce74555424e09b49f5d,2024-05-27T13:15:08.490000 CVE-2024-33818,0,0,fcf08ee825495c7c9196412d6a7ac485908da9a914b001b572e82e64bc2af5f7,2024-05-14T16:12:23.490000 CVE-2024-33819,0,0,27ebf543bf09f96d296185f9994673eb8c5aa230fac1ef1d22da8e6b7ccd2158,2024-05-14T16:12:23.490000 CVE-2024-3382,0,0,359ee56c09e0a2a64315ebc823efc4b55ab60390ccbf48a0550f896cf550e0d4,2024-04-10T19:49:51.183000 @@ -250188,6 +250190,7 @@ CVE-2024-34473,0,0,a0e81d4e65e4f59fc6788a67ab9abe6ae8169dfe1411246b36c4680fde1af CVE-2024-34474,0,0,3df656c76dccd5c0b812eaec7b5241dc606cf859dfb7b55dfdb0e2ac6d92fbbf,2024-05-06T12:44:56.377000 CVE-2024-34475,0,0,bc3b000674e2f5e5d8987a5a03c7029744124543abeafbfeb540e90342057172,2024-05-06T12:44:56.377000 CVE-2024-34476,0,0,f460d7b07cd8e1102230047a90895024b7118c0a722ec4264bd02b84a90ba448,2024-05-06T12:44:56.377000 +CVE-2024-34477,1,1,1c3916da72fe70175c33b76d785b0a9c82c863ba75e4d8ef95c22a1137f829de,2024-05-27T14:15:09.470000 CVE-2024-34478,0,0,e041b25b36e3062d0ab338fb8a5bf2a23de65e7f383d14a7d54f9bd405368aa0,2024-05-06T12:44:56.377000 CVE-2024-3448,0,0,38511310080ef6cbfb33c1721e41ad41c6df0877e6ffcdbf14f478fa1ea7a673,2024-04-10T19:49:51.183000 CVE-2024-34483,0,0,df92e60b2a063249d7c7eb5d2fcb2d7b0c92f9a83d882b5d628cf9e21e289c65,2024-05-06T12:44:56.377000 @@ -251858,8 +251861,8 @@ CVE-2024-5397,0,0,127f0e4aebb20af982b9f8f3c5e3c610f094604b0e4dbcdf747a9ca9a9d17d CVE-2024-5399,0,0,11939ed21acc3c5ec586746ddde14b797a390e121836283682232169079970b5,2024-05-27T04:15:09.300000 CVE-2024-5400,0,0,3934e126a75210a22708febe3829ce6c46f46cc7e12a3a7182ec01f8e6ac35ad,2024-05-27T06:15:10.620000 CVE-2024-5403,0,0,ed1d166ca6bf87c091bd718e3e0b00502f1d612d8d3d042e4dc422513dd0bdef,2024-05-27T07:15:09.530000 -CVE-2024-5405,1,1,49942e4a68a09244f074abab0118a3e725704e492551d35caf34af31201462e6,2024-05-27T12:15:09.067000 -CVE-2024-5406,1,1,8388cdb5206a2260ff3ef4be55e5195b9526275a7722f69924ed74fee613c514,2024-05-27T12:15:09.333000 -CVE-2024-5407,1,1,f6f018cb73591d5951317cf6cb9418428e5bc3ae925c84689b3ce2d5c483f30a,2024-05-27T13:15:08.573000 -CVE-2024-5408,1,1,219da37207b714ce9e3524b5c58f50d48db58bc623cbb609140a8131f93b7a65,2024-05-27T13:15:08.817000 -CVE-2024-5409,1,1,dc5f7da4fafab5ffa6fcbfdf146c0d675a15daf5a8580fc3a389221d5de44817,2024-05-27T13:15:09.040000 +CVE-2024-5405,0,0,49942e4a68a09244f074abab0118a3e725704e492551d35caf34af31201462e6,2024-05-27T12:15:09.067000 +CVE-2024-5406,0,0,8388cdb5206a2260ff3ef4be55e5195b9526275a7722f69924ed74fee613c514,2024-05-27T12:15:09.333000 +CVE-2024-5407,0,0,f6f018cb73591d5951317cf6cb9418428e5bc3ae925c84689b3ce2d5c483f30a,2024-05-27T13:15:08.573000 +CVE-2024-5408,0,0,219da37207b714ce9e3524b5c58f50d48db58bc623cbb609140a8131f93b7a65,2024-05-27T13:15:08.817000 +CVE-2024-5409,0,0,dc5f7da4fafab5ffa6fcbfdf146c0d675a15daf5a8580fc3a389221d5de44817,2024-05-27T13:15:09.040000