Auto-Update: 2024-06-25T04:00:18.889033+00:00

This commit is contained in:
cad-safe-bot 2024-06-25 04:03:11 +00:00
parent 4420b9938d
commit 13309a45d3
24 changed files with 777 additions and 30 deletions

View File

@ -2,7 +2,7 @@
"id": "CVE-2019-14861",
"sourceIdentifier": "secalert@redhat.com",
"published": "2019-12-10T23:15:10.360",
"lastModified": "2023-11-07T03:05:20.643",
"lastModified": "2024-06-25T02:15:09.860",
"vulnStatus": "Modified",
"descriptions": [
{
@ -234,6 +234,10 @@
"Third Party Advisory"
]
},
{
"url": "http://www.openwall.com/lists/oss-security/2024/06/24/3",
"source": "secalert@redhat.com"
},
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14861",
"source": "secalert@redhat.com",

View File

@ -2,14 +2,31 @@
"id": "CVE-2023-5037",
"sourceIdentifier": "fc9afe74-3f80-4fb7-a313-e6f036a89882",
"published": "2023-11-13T08:15:26.107",
"lastModified": "2023-11-13T08:15:26.107",
"vulnStatus": "Rejected",
"lastModified": "2024-06-25T02:15:10.183",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Rejected reason: CVE number will be reassigned."
"value": "badmonkey, a Security Researcher has found a flaw that allows for a authenticated command injection on the camera. An attacker could inject malicious into request packets to execute command. The manufacturer has released patch firmware for the flaw, please refer to the manufacturer's report for details and workarounds."
}
],
"metrics": {},
"references": []
"weaknesses": [
{
"source": "fc9afe74-3f80-4fb7-a313-e6f036a89882",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-78"
}
]
}
],
"references": [
{
"url": "https://www.hanwhavision.com/wp-content/uploads/2024/06/Camera-Vulnerability-Report-CVE-2023-5037-5038.pdf",
"source": "fc9afe74-3f80-4fb7-a313-e6f036a89882"
}
]
}

View File

@ -0,0 +1,36 @@
{
"id": "CVE-2023-5038",
"sourceIdentifier": "fc9afe74-3f80-4fb7-a313-e6f036a89882",
"published": "2024-06-25T03:15:09.737",
"lastModified": "2024-06-25T03:15:09.737",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "badmonkey, a Security Researcher has found a flaw that allows for a unauthenticated DoS attack on the camera. An attacker runs a crafted URL, nobody can access the web management page of the camera. and must manually restart the device or re-power it. The manufacturer has released patch firmware for the flaw, please refer to the manufacturer's report for details and workarounds."
}
],
"metrics": {},
"weaknesses": [
{
"source": "fc9afe74-3f80-4fb7-a313-e6f036a89882",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-248"
},
{
"lang": "en",
"value": "CWE-703"
}
]
}
],
"references": [
{
"url": "https://www.hanwhavision.com/wp-content/uploads/2024/06/Camera-Vulnerability-Report-CVE-2023-5037-5038.pdf",
"source": "fc9afe74-3f80-4fb7-a313-e6f036a89882"
}
]
}

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2023-6198",
"sourceIdentifier": "security@baicells.com",
"published": "2024-06-25T02:15:10.347",
"lastModified": "2024-06-25T02:15:10.347",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Use of Hard-coded Credentials vulnerability in Baicells Snap Router BaiCE_BMI on EP3011 (User Passwords modules) allows unauthorized access to the device."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security@baicells.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:H/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"availabilityImpact": "LOW",
"baseScore": 9.3,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 4.7
}
]
},
"weaknesses": [
{
"source": "security@baicells.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-798"
}
]
}
],
"references": [
{
"url": "https://www.baicells.com",
"source": "security@baicells.com"
}
]
}

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2024-22385",
"sourceIdentifier": "hirt@hitachi.co.jp",
"published": "2024-06-25T02:15:10.583",
"lastModified": "2024-06-25T02:15:10.583",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Incorrect Default Permissions vulnerability in Hitachi Storage Provider for VMware vCenter allows local users to read and write specific files.This issue affects Hitachi Storage Provider for VMware vCenter: from 3.1.0 before 3.7.4."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "hirt@hitachi.co.jp",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "LOW",
"baseScore": 4.4,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.8,
"impactScore": 2.5
}
]
},
"weaknesses": [
{
"source": "hirt@hitachi.co.jp",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-276"
}
]
}
],
"references": [
{
"url": "https://www.hitachi.com/products/it/software/security/info/vuls/hitachi-sec-2024-129/index.html",
"source": "hirt@hitachi.co.jp"
}
]
}

View File

@ -2,12 +2,12 @@
"id": "CVE-2024-23131",
"sourceIdentifier": "psirt@autodesk.com",
"published": "2024-02-22T04:15:08.797",
"lastModified": "2024-03-18T00:15:07.247",
"lastModified": "2024-06-25T02:15:10.807",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "A maliciously crafted STP file in ASMKERN228A.dll or ASMDATAX228A.dll when parsed through Autodesk AutoCAD could lead to a memory corruption vulnerability by write access violation. This vulnerability in conjunction with other vulnerabilities could lead to code execution in the context of the current process.\n"
"value": "A maliciously crafted STP file, when parsed in ASMIMPORT229A.dll, ASMKERN228A.dll, ASMkern229A.dll or ASMDATAX228A.dll through Autodesk applications, can lead to a memory corruption vulnerability by write access violation. This vulnerability, in conjunction with other vulnerabilities, can lead to code execution in the context of the current process."
},
{
"lang": "es",
@ -35,6 +35,10 @@
{
"url": "https://www.autodesk.com/trust/security-advisories/adsk-sa-2024-0004",
"source": "psirt@autodesk.com"
},
{
"url": "https://www.autodesk.com/trust/security-advisories/adsk-sa-2024-0009",
"source": "psirt@autodesk.com"
}
]
}

View File

@ -2,12 +2,12 @@
"id": "CVE-2024-23137",
"sourceIdentifier": "psirt@autodesk.com",
"published": "2024-02-22T05:15:09.640",
"lastModified": "2024-03-18T00:15:07.537",
"lastModified": "2024-06-25T02:15:10.873",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "A maliciously crafted STP or SLDPRT file in ODXSW_DLL.dll when parsed through Autodesk AutoCAD can be used to uninitialized variable. This vulnerability, along with other vulnerabilities, could lead to code execution in the current process.\n"
"value": "A maliciously crafted STP or SLDPRT file, when parsed in ODXSW_DLL.dll through Autodesk applications, can be used to uninitialized variables. This vulnerability, along with other vulnerabilities, can lead to code execution in the current process."
},
{
"lang": "es",
@ -35,6 +35,10 @@
{
"url": "https://www.autodesk.com/trust/security-advisories/adsk-sa-2024-0004",
"source": "psirt@autodesk.com"
},
{
"url": "https://www.autodesk.com/trust/security-advisories/adsk-sa-2024-0009",
"source": "psirt@autodesk.com"
}
]
}

View File

@ -0,0 +1,32 @@
{
"id": "CVE-2024-23140",
"sourceIdentifier": "psirt@autodesk.com",
"published": "2024-06-25T02:15:10.940",
"lastModified": "2024-06-25T02:15:10.940",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "A maliciously crafted 3DM and MODEL file, when parsed in opennurbs.dll and atf_api.dll through Autodesk applications, can force an Out-of-Bound Read. A malicious actor can leverage this vulnerability to cause a crash, read sensitive data, or execute arbitrary code in the context of the current process."
}
],
"metrics": {},
"weaknesses": [
{
"source": "psirt@autodesk.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-125"
}
]
}
],
"references": [
{
"url": "https://www.autodesk.com/trust/security-advisories/adsk-sa-2024-0009",
"source": "psirt@autodesk.com"
}
]
}

View File

@ -0,0 +1,32 @@
{
"id": "CVE-2024-23141",
"sourceIdentifier": "psirt@autodesk.com",
"published": "2024-06-25T02:15:11.030",
"lastModified": "2024-06-25T02:15:11.030",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "A maliciously crafted MODEL file, when parsed in libodxdll through Autodesk applications, can cause a double free. This vulnerability, along with other vulnerabilities, can lead to code execution in the current process."
}
],
"metrics": {},
"weaknesses": [
{
"source": "psirt@autodesk.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-415"
}
]
}
],
"references": [
{
"url": "https://www.autodesk.com/trust/security-advisories/adsk-sa-2024-0009",
"source": "psirt@autodesk.com"
}
]
}

View File

@ -0,0 +1,32 @@
{
"id": "CVE-2024-23142",
"sourceIdentifier": "psirt@autodesk.com",
"published": "2024-06-25T02:15:11.123",
"lastModified": "2024-06-25T02:15:11.123",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "A maliciously crafted CATPART, STP, and MODEL file, when parsed in atf_dwg_consumer.dll, rose_x64_vc15.dll and libodxdll through Autodesk applications, can cause a use-after-free vulnerability. This vulnerability, along with other vulnerabilities, can lead to code execution in the current process."
}
],
"metrics": {},
"weaknesses": [
{
"source": "psirt@autodesk.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-416"
}
]
}
],
"references": [
{
"url": "https://www.autodesk.com/trust/security-advisories/adsk-sa-2024-0009",
"source": "psirt@autodesk.com"
}
]
}

View File

@ -0,0 +1,36 @@
{
"id": "CVE-2024-23143",
"sourceIdentifier": "psirt@autodesk.com",
"published": "2024-06-25T02:15:11.203",
"lastModified": "2024-06-25T02:15:11.203",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "A maliciously crafted 3DM, MODEL and X_B file, when parsed in ASMkern229A.dll and ASMBASE229A.dll through Autodesk applications, can force an Out-of-Bound Read and/or Out-of-Bound Write. A malicious actor can leverage this vulnerability to cause a crash, read sensitive data, or execute arbitrary code in the context of the current process."
}
],
"metrics": {},
"weaknesses": [
{
"source": "psirt@autodesk.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-125"
},
{
"lang": "en",
"value": "CWE-787"
}
]
}
],
"references": [
{
"url": "https://www.autodesk.com/trust/security-advisories/adsk-sa-2024-0009",
"source": "psirt@autodesk.com"
}
]
}

View File

@ -0,0 +1,32 @@
{
"id": "CVE-2024-23144",
"sourceIdentifier": "psirt@autodesk.com",
"published": "2024-06-25T02:15:11.293",
"lastModified": "2024-06-25T02:15:11.293",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "A maliciously crafted CATPART file, when parsed in CC5Dll.dll and ASMBASE228A.dll through Autodesk applications, can force an Out-of-Bound Write. A malicious actor can leverage this vulnerability to cause a crash, read sensitive data, or execute arbitrary code in the context of the current process."
}
],
"metrics": {},
"weaknesses": [
{
"source": "psirt@autodesk.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-787"
}
]
}
],
"references": [
{
"url": "https://www.autodesk.com/trust/security-advisories/adsk-sa-2024-0009",
"source": "psirt@autodesk.com"
}
]
}

View File

@ -0,0 +1,32 @@
{
"id": "CVE-2024-23145",
"sourceIdentifier": "psirt@autodesk.com",
"published": "2024-06-25T03:15:10.000",
"lastModified": "2024-06-25T03:15:10.000",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "A maliciously crafted PRT file, when parsed in opennurbs.dll through Autodesk applications, can force an Out-of-Bound Read. A malicious actor can leverage this vulnerability to cause a crash, read sensitive data, or execute arbitrary code in the context of the current process."
}
],
"metrics": {},
"weaknesses": [
{
"source": "psirt@autodesk.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-125"
}
]
}
],
"references": [
{
"url": "https://www.autodesk.com/trust/security-advisories/adsk-sa-2024-0009",
"source": "psirt@autodesk.com"
}
]
}

View File

@ -0,0 +1,32 @@
{
"id": "CVE-2024-23146",
"sourceIdentifier": "psirt@autodesk.com",
"published": "2024-06-25T03:15:10.093",
"lastModified": "2024-06-25T03:15:10.093",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "A maliciously crafted X_B and X_T file, when parsed in pskernel.DLL through Autodesk applications, can force an Out-of-Bound Write. A malicious actor can leverage this vulnerability to cause a crash, read sensitive data, or execute arbitrary code in the context of the current process."
}
],
"metrics": {},
"weaknesses": [
{
"source": "psirt@autodesk.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-787"
}
]
}
],
"references": [
{
"url": "https://www.autodesk.com/trust/security-advisories/adsk-sa-2024-0009",
"source": "psirt@autodesk.com"
}
]
}

View File

@ -0,0 +1,32 @@
{
"id": "CVE-2024-23147",
"sourceIdentifier": "psirt@autodesk.com",
"published": "2024-06-25T03:15:10.190",
"lastModified": "2024-06-25T03:15:10.190",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "A maliciously crafted CATPART, X_B and STEP, when parsed in ASMKERN228A.dll and ASMKERN229A.dll through Autodesk applications, can lead to a memory corruption vulnerability by write access violation. This vulnerability, in conjunction with other vulnerabilities, can lead to code execution in the context of the current process."
}
],
"metrics": {},
"weaknesses": [
{
"source": "psirt@autodesk.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-119"
}
]
}
],
"references": [
{
"url": "https://www.autodesk.com/trust/security-advisories/adsk-sa-2024-0009",
"source": "psirt@autodesk.com"
}
]
}

View File

@ -0,0 +1,32 @@
{
"id": "CVE-2024-23148",
"sourceIdentifier": "psirt@autodesk.com",
"published": "2024-06-25T03:15:10.283",
"lastModified": "2024-06-25T03:15:10.283",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "A maliciously crafted CATPRODUCT file, when parsed in CC5Dll.dll through Autodesk applications, can lead to a memory corruption vulnerability by write access violation. This vulnerability, in conjunction with other vulnerabilities, can lead to code execution in the context of the current process."
}
],
"metrics": {},
"weaknesses": [
{
"source": "psirt@autodesk.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-119"
}
]
}
],
"references": [
{
"url": "https://www.autodesk.com/trust/security-advisories/adsk-sa-2024-0009",
"source": "psirt@autodesk.com"
}
]
}

View File

@ -0,0 +1,32 @@
{
"id": "CVE-2024-23149",
"sourceIdentifier": "psirt@autodesk.com",
"published": "2024-06-25T03:15:10.370",
"lastModified": "2024-06-25T03:15:10.370",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "A maliciously crafted SLDDRW file, when parsed in ODXSW_DLL.dll through Autodesk applications, can force an Out-of-Bound Read. A malicious actor can leverage this vulnerability to cause a crash, read sensitive data, or execute arbitrary code in the context of the current process."
}
],
"metrics": {},
"weaknesses": [
{
"source": "psirt@autodesk.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-125"
}
]
}
],
"references": [
{
"url": "https://www.autodesk.com/trust/security-advisories/adsk-sa-2024-0009",
"source": "psirt@autodesk.com"
}
]
}

View File

@ -0,0 +1,32 @@
{
"id": "CVE-2024-37000",
"sourceIdentifier": "psirt@autodesk.com",
"published": "2024-06-25T03:15:10.463",
"lastModified": "2024-06-25T03:15:10.463",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "A maliciously crafted X_B file, when parsed in pskernel.DLL through Autodesk applications, can lead to a memory corruption vulnerability by write access violation. This vulnerability, in conjunction with other vulnerabilities, can lead to code execution in the context of the current process."
}
],
"metrics": {},
"weaknesses": [
{
"source": "psirt@autodesk.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-119"
}
]
}
],
"references": [
{
"url": "https://www.autodesk.com/trust/security-advisories/adsk-sa-2024-0009",
"source": "psirt@autodesk.com"
}
]
}

View File

@ -0,0 +1,32 @@
{
"id": "CVE-2024-37001",
"sourceIdentifier": "psirt@autodesk.com",
"published": "2024-06-25T03:15:10.553",
"lastModified": "2024-06-25T03:15:10.553",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "[A maliciously crafted 3DM file, when parsed in opennurbs.dll through Autodesk applications, can be used to cause a Heap-based Overflow. A malicious actor can leverage this vulnerability to cause a crash, read sensitive data, or execute arbitrary code in the context of the current process."
}
],
"metrics": {},
"weaknesses": [
{
"source": "psirt@autodesk.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-122"
}
]
}
],
"references": [
{
"url": "https://www.autodesk.com/trust/security-advisories/adsk-sa-2024-0009",
"source": "psirt@autodesk.com"
}
]
}

View File

@ -0,0 +1,32 @@
{
"id": "CVE-2024-37002",
"sourceIdentifier": "psirt@autodesk.com",
"published": "2024-06-25T03:15:10.647",
"lastModified": "2024-06-25T03:15:10.647",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "A maliciously crafted MODEL file, when parsed in ASMkern229A.dllthrough Autodesk applications, can be used to uninitialized variables. This vulnerability, along with other vulnerabilities, could lead to code execution in the current process."
}
],
"metrics": {},
"weaknesses": [
{
"source": "psirt@autodesk.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-457"
}
]
}
],
"references": [
{
"url": "https://www.autodesk.com/trust/security-advisories/adsk-sa-2024-0009",
"source": "psirt@autodesk.com"
}
]
}

View File

@ -0,0 +1,59 @@
{
"id": "CVE-2024-6294",
"sourceIdentifier": "twcert@cert.org.tw",
"published": "2024-06-25T02:15:11.657",
"lastModified": "2024-06-25T02:15:11.657",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "udn News Android APP stores the user session in logcat file when user log into the APP. A malicious APP or an attacker with physical access to the Android device can retrieve this session and use it to log into the news APP and other services provided by udn."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "twcert@cert.org.tw",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:P/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N",
"attackVector": "PHYSICAL",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 3.9,
"baseSeverity": "LOW"
},
"exploitabilityScore": 0.3,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "twcert@cert.org.tw",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-200"
}
]
}
],
"references": [
{
"url": "https://www.twcert.org.tw/en/cp-139-7893-43ecd-2.html",
"source": "twcert@cert.org.tw"
},
{
"url": "https://www.twcert.org.tw/tw/cp-132-7892-aafd2-1.html",
"source": "twcert@cert.org.tw"
}
]
}

View File

@ -0,0 +1,59 @@
{
"id": "CVE-2024-6295",
"sourceIdentifier": "twcert@cert.org.tw",
"published": "2024-06-25T03:15:10.740",
"lastModified": "2024-06-25T03:15:10.740",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "udn News Android APP stores the unencrypted user session in the local database when user log into the application. A malicious APP or an attacker with physical access to the Android device can retrieve this session and use it to log into the news APP and other services provided by udn."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "twcert@cert.org.tw",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:P/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N",
"attackVector": "PHYSICAL",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 3.9,
"baseSeverity": "LOW"
},
"exploitabilityScore": 0.3,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "twcert@cert.org.tw",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-922"
}
]
}
],
"references": [
{
"url": "https://www.twcert.org.tw/en/cp-139-7895-80dac-2.html",
"source": "twcert@cert.org.tw"
},
{
"url": "https://www.twcert.org.tw/tw/cp-132-7894-aebd8-1.html",
"source": "twcert@cert.org.tw"
}
]
}

View File

@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update
```plain
2024-06-25T02:00:17.609643+00:00
2024-06-25T04:00:18.889033+00:00
```
### Most recent CVE Modification Timestamp synchronized with NVD
```plain
2024-06-25T01:15:50.197000+00:00
2024-06-25T03:15:10.740000+00:00
```
### Last Data Feed Release
@ -33,25 +33,41 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
### Total Number of included CVEs
```plain
255059
255077
```
### CVEs added in the last Commit
Recently added CVEs: `0`
Recently added CVEs: `18`
- [CVE-2023-5038](CVE-2023/CVE-2023-50xx/CVE-2023-5038.json) (`2024-06-25T03:15:09.737`)
- [CVE-2023-6198](CVE-2023/CVE-2023-61xx/CVE-2023-6198.json) (`2024-06-25T02:15:10.347`)
- [CVE-2024-22385](CVE-2024/CVE-2024-223xx/CVE-2024-22385.json) (`2024-06-25T02:15:10.583`)
- [CVE-2024-23140](CVE-2024/CVE-2024-231xx/CVE-2024-23140.json) (`2024-06-25T02:15:10.940`)
- [CVE-2024-23141](CVE-2024/CVE-2024-231xx/CVE-2024-23141.json) (`2024-06-25T02:15:11.030`)
- [CVE-2024-23142](CVE-2024/CVE-2024-231xx/CVE-2024-23142.json) (`2024-06-25T02:15:11.123`)
- [CVE-2024-23143](CVE-2024/CVE-2024-231xx/CVE-2024-23143.json) (`2024-06-25T02:15:11.203`)
- [CVE-2024-23144](CVE-2024/CVE-2024-231xx/CVE-2024-23144.json) (`2024-06-25T02:15:11.293`)
- [CVE-2024-23145](CVE-2024/CVE-2024-231xx/CVE-2024-23145.json) (`2024-06-25T03:15:10.000`)
- [CVE-2024-23146](CVE-2024/CVE-2024-231xx/CVE-2024-23146.json) (`2024-06-25T03:15:10.093`)
- [CVE-2024-23147](CVE-2024/CVE-2024-231xx/CVE-2024-23147.json) (`2024-06-25T03:15:10.190`)
- [CVE-2024-23148](CVE-2024/CVE-2024-231xx/CVE-2024-23148.json) (`2024-06-25T03:15:10.283`)
- [CVE-2024-23149](CVE-2024/CVE-2024-231xx/CVE-2024-23149.json) (`2024-06-25T03:15:10.370`)
- [CVE-2024-37000](CVE-2024/CVE-2024-370xx/CVE-2024-37000.json) (`2024-06-25T03:15:10.463`)
- [CVE-2024-37001](CVE-2024/CVE-2024-370xx/CVE-2024-37001.json) (`2024-06-25T03:15:10.553`)
- [CVE-2024-37002](CVE-2024/CVE-2024-370xx/CVE-2024-37002.json) (`2024-06-25T03:15:10.647`)
- [CVE-2024-6294](CVE-2024/CVE-2024-62xx/CVE-2024-6294.json) (`2024-06-25T02:15:11.657`)
- [CVE-2024-6295](CVE-2024/CVE-2024-62xx/CVE-2024-6295.json) (`2024-06-25T03:15:10.740`)
### CVEs modified in the last Commit
Recently modified CVEs: `6`
Recently modified CVEs: `4`
- [CVE-2024-23122](CVE-2024/CVE-2024-231xx/CVE-2024-23122.json) (`2024-06-25T01:15:49.807`)
- [CVE-2024-23123](CVE-2024/CVE-2024-231xx/CVE-2024-23123.json) (`2024-06-25T01:15:49.923`)
- [CVE-2024-23127](CVE-2024/CVE-2024-231xx/CVE-2024-23127.json) (`2024-06-25T01:15:49.990`)
- [CVE-2024-23128](CVE-2024/CVE-2024-231xx/CVE-2024-23128.json) (`2024-06-25T01:15:50.063`)
- [CVE-2024-23129](CVE-2024/CVE-2024-231xx/CVE-2024-23129.json) (`2024-06-25T01:15:50.137`)
- [CVE-2024-23130](CVE-2024/CVE-2024-231xx/CVE-2024-23130.json) (`2024-06-25T01:15:50.197`)
- [CVE-2019-14861](CVE-2019/CVE-2019-148xx/CVE-2019-14861.json) (`2024-06-25T02:15:09.860`)
- [CVE-2023-5037](CVE-2023/CVE-2023-50xx/CVE-2023-5037.json) (`2024-06-25T02:15:10.183`)
- [CVE-2024-23131](CVE-2024/CVE-2024-231xx/CVE-2024-23131.json) (`2024-06-25T02:15:10.807`)
- [CVE-2024-23137](CVE-2024/CVE-2024-231xx/CVE-2024-23137.json) (`2024-06-25T02:15:10.873`)
## Download and Usage

View File

@ -132711,7 +132711,7 @@ CVE-2019-14858,0,0,40b5dad00c367331f4a6e4ac24e197aa0b3bdef1cf723a0aa7111a87e27e0
CVE-2019-14859,0,0,f7004b64d5d286af62f04d6fbad70e41cbb37b47af3d1e945dfb22cb1d8aa2a0,2021-08-04T17:15:13.067000
CVE-2019-1486,0,0,91313288c1edbff46cac4068c36983e18960349071863e5f4dc4ce78da97d763,2019-12-16T15:01:34.820000
CVE-2019-14860,0,0,28be410fe2f693b5d89ce801b96bfc8b9bd7f306c11afc75c2b6600eefe84de9,2020-10-09T13:06:03.770000
CVE-2019-14861,0,0,b86ecfcd3ceb1fb3fa14e4308c895af756ffc842efc66ea6ccc5c360812bd3b5,2023-11-07T03:05:20.643000
CVE-2019-14861,0,1,7de22da58777e5b29aa0cfc39e69f41d7f7fdab7406028ec4d6284bf7e36e1f6,2024-06-25T02:15:09.860000
CVE-2019-14862,0,0,364d5ab0d54480e0092515c02fb5935974c413d5f0f6919202d712c40a28ac8b,2022-06-07T18:41:46.360000
CVE-2019-14863,0,0,4fb68dbe6c2a880379769f2fbd59b3bdec90d22216c8ad78385c3bc20e796747,2020-01-09T19:57:38.913000
CVE-2019-14864,0,0,47eddd61aa012ac023f10cf6f0cf3ff0c167668f47e1ee83ddabbf9d69d1c1f6,2022-04-22T19:59:14.133000
@ -237031,7 +237031,7 @@ CVE-2023-50363,0,0,007beb9c9c826c8ff3ba07c2de46061e06937bd3e1177219f5c49a9bb2333
CVE-2023-50364,0,0,e47604eb43c17aadb72d581e49581bad4589eac6cac682ed1340e87038a754a0,2024-05-09T01:15:06.410000
CVE-2023-50368,0,0,822f875a462c17b899bc5907af8a90bdf88b03f70fa2a47891ff0cc8e05f7ab1,2023-12-18T18:51:37.847000
CVE-2023-50369,0,0,5473010ca0d536c23d0126860849245f23a6b5fb4418917816ad2a87231e17a3,2023-12-18T18:57:46.290000
CVE-2023-5037,0,0,d381335c4dd89e7bbab4901da66bd9ad6b80fcdcad234f2de4677ea0ef9d96ac,2023-11-13T08:15:26.107000
CVE-2023-5037,0,1,5372d8081c759eb4626917b975cb261976ef01669cf5f369ae947a61821bad5e,2024-06-25T02:15:10.183000
CVE-2023-50370,0,0,cb41cea2750640931e440868ffef0cc7f55b13bd1e4ad5828cdfccae735b6980,2023-12-18T19:02:02.957000
CVE-2023-50371,0,0,04d4e098cc36a4f0bfdfb2f80d9ef226cb1335fcf83d29c3ea30e956873d64b8,2023-12-18T20:14:34.887000
CVE-2023-50372,0,0,f1e1782fe08d93899978169515a94f6ddbf7dcded46e93a6577a24065511b513,2023-12-20T04:28:48.440000
@ -237040,6 +237040,7 @@ CVE-2023-50376,0,0,c951f73eaa1568ec16d7bbf28755aacf2580409c4a177851a557b18edbeae
CVE-2023-50377,0,0,3acd97ab69c2403c419288f2e19070989327aa6f1425e1a9c076820c259b93c2,2023-12-27T21:34:56.883000
CVE-2023-50378,0,0,0f4c193757a21745622df68ec0aa88b8a213c4603a70a54e94c4c05a8dadb60b,2024-05-01T18:15:11.097000
CVE-2023-50379,0,0,2ba768024158d3957bf97073914ab21cf6e76e13687c6569b9647fa3455e4c0b,2024-02-27T14:20:06.637000
CVE-2023-5038,1,1,09b2c38248dd744367e7b25aadbc8d15aa2524fee9d76b25dd96e2bf7a635071,2024-06-25T03:15:09.737000
CVE-2023-50380,0,0,b5737d428cd7d3280b11a55da8c282450fdebb25171b34cbfbfc4de989e3a9f5,2024-02-28T14:06:45.783000
CVE-2023-50386,0,0,eb9175c624998374fffbb8bbdcfbc3fcd759c84a0c5cafd0e6294c2d31318a7f,2024-02-15T18:40:48.837000
CVE-2023-50387,0,0,86a696af4d06d31d7c5b6089ba1f856732aed20b18c54efa9645210962ecc2d6,2024-06-10T17:16:15.963000
@ -239657,6 +239658,7 @@ CVE-2023-6193,0,0,b9900119542cd00ca545fa465375df17aaa2236304c15239a12e8730d3c671
CVE-2023-6194,0,0,adca1836721719b5860e52cb41398c44be6db56a1fe0603258d70cab514c2618,2023-12-13T22:02:56.613000
CVE-2023-6196,0,0,f56d61f9e2bd859b9d4b61f6a34e06caffb31a0f56e7eb46b17c194be4b8ce85,2023-11-25T02:20:08.637000
CVE-2023-6197,0,0,c4382b52f534913e65ee4b1feb523e73025e33dfe7d74d8aade2f3fac6e8f295,2023-11-25T02:19:51.733000
CVE-2023-6198,1,1,45eca860084b780ed70e6e788cc54b7b796a5da18d09c54d15468bff3626e3a9,2024-06-25T02:15:10.347000
CVE-2023-6199,0,0,12541221a80e0f3a78050b48fb01f9ad223a7ac2b781b75a0ff9d1a5e3de1cb1,2024-06-07T14:12:05.897000
CVE-2023-6200,0,0,6ad93b2827d0905ddada23ed9c26c8cd7cbada143bc86cea06b89b646e3f7634,2024-02-02T15:38:42.870000
CVE-2023-6201,0,0,e641a830aa857fff950829529f9d4b150c6030d683c3c3799f55892ea8553251,2023-12-05T07:15:11.860000
@ -243795,6 +243797,7 @@ CVE-2024-22380,0,0,fbb17e03b7392116b029e62cf5fc227ae3083f2acc9171774ca51468933ea
CVE-2024-22382,0,0,794bb38486bda8b27dc8f67ecedfc3d38e34616c9029ee0f738dfbf4c6312f15,2024-05-17T18:36:05.263000
CVE-2024-22383,0,0,810a6e86f28ef493260b232f9a886a5828bc2cb5687e22ad7a4e8bfc9a3765be,2024-03-05T13:41:01.900000
CVE-2024-22384,0,0,22d927b3eda23e776929f3eee7e12761fd0a5866a79fd2edf20febc4242f7c70,2024-05-17T18:36:05.263000
CVE-2024-22385,1,1,9b2c87cd5fc67c9ea7c1c832da5530902c499d45e2ba44b469576122cc1019ca,2024-06-25T02:15:10.583000
CVE-2024-22386,0,0,9bb868760c88683007f1f54485a980666afe5aeeb8bc008d8d811fea3dbfe22d,2024-02-10T04:05:26.383000
CVE-2024-22388,0,0,c4d155a1650cf8d6f3af35aa33a3624b01d880288d632870cec483f12be1e88c,2024-02-14T20:59:09.660000
CVE-2024-22389,0,0,96781b551653662b24bed6c6167841567f0e5e4776b3fb44064036280367773a,2024-02-14T18:04:45.380000
@ -244128,26 +244131,36 @@ CVE-2024-23119,0,0,dc7a02dfe6c2319112aa9c9c7ba24d29c0a54406c32b5bc7828bc06ecc1e5
CVE-2024-2312,0,0,b61108ae65321d61a758b0c732ce308a7e62bd5c3710897745a7af4ce6324077,2024-04-26T09:15:12.073000
CVE-2024-23120,0,0,0bde07239643990ce52a2b119406a2fe2b75980d605c54ab173fa281d186044a,2024-06-15T03:15:09.170000
CVE-2024-23121,0,0,63c89d44d13ff73da2a5ca3921fdf1d827a06f578facd9c0fce9fcd43ca51479,2024-06-15T04:15:12.550000
CVE-2024-23122,0,1,60092102602996214ff712620897909baadba742aef72982d6f1adaf07705dbc,2024-06-25T01:15:49.807000
CVE-2024-23123,0,1,7fa00e67eeec1cb2a8afde0ed3fcaf14a3ea1af0c35140e30c666a9385075c59,2024-06-25T01:15:49.923000
CVE-2024-23122,0,0,60092102602996214ff712620897909baadba742aef72982d6f1adaf07705dbc,2024-06-25T01:15:49.807000
CVE-2024-23123,0,0,7fa00e67eeec1cb2a8afde0ed3fcaf14a3ea1af0c35140e30c666a9385075c59,2024-06-25T01:15:49.923000
CVE-2024-23124,0,0,310e8c4cd574e0a0147b3ffefdbfe36a36709549adc5926c84549e0d2e3d6fc7,2024-03-13T15:15:50.783000
CVE-2024-23125,0,0,f0886c546f6144b586ec7d77c24ce27baa331af9d054edd3d089f488c8104eca,2024-02-22T19:07:27.197000
CVE-2024-23126,0,0,e927ab071d122c627451a22694d4cf2dac082404401648a3f86014242e68a50a,2024-03-18T00:15:06.947000
CVE-2024-23127,0,1,a277049adf2a4c55c0070915e4c776496275a527a0c8359aab0fe639c6b68297,2024-06-25T01:15:49.990000
CVE-2024-23128,0,1,613c777689be49b17e508c7025b66a802f8cc9a24fa089fab3f23219d47c2f2c,2024-06-25T01:15:50.063000
CVE-2024-23129,0,1,36c375ef01e43df755a3ca3cbb6f28ca0e1cdceeeaf16b4115bf46d1edb99480,2024-06-25T01:15:50.137000
CVE-2024-23127,0,0,a277049adf2a4c55c0070915e4c776496275a527a0c8359aab0fe639c6b68297,2024-06-25T01:15:49.990000
CVE-2024-23128,0,0,613c777689be49b17e508c7025b66a802f8cc9a24fa089fab3f23219d47c2f2c,2024-06-25T01:15:50.063000
CVE-2024-23129,0,0,36c375ef01e43df755a3ca3cbb6f28ca0e1cdceeeaf16b4115bf46d1edb99480,2024-06-25T01:15:50.137000
CVE-2024-2313,0,0,fbc50aedf7351262416b6c5ccc0b90b77cb5c1e03078e87fd29f82257bb6f296,2024-03-11T01:32:29.610000
CVE-2024-23130,0,1,89b2c036b2646421f53f48c7761fbb714aefb2ba6f8a32aee42be62c78ce3b21,2024-06-25T01:15:50.197000
CVE-2024-23131,0,0,c427ee94f7c61adaf0716529d63f7a538f863e445e4db249885a3e64e551be88,2024-03-18T00:15:07.247000
CVE-2024-23130,0,0,89b2c036b2646421f53f48c7761fbb714aefb2ba6f8a32aee42be62c78ce3b21,2024-06-25T01:15:50.197000
CVE-2024-23131,0,1,4f1ec7c1278992eabe64d7f82d23c1ae51a8719fda4178c8fed2c3acca0c0af3,2024-06-25T02:15:10.807000
CVE-2024-23132,0,0,f22a2bdc1f997a36d13f6c22afab4983451c9373205a8ec6621cdd27061b8266,2024-03-18T00:15:07.297000
CVE-2024-23133,0,0,e86482bc439e59c6d3cf72bc6bb19d1a229eba94c9abdd88aed6d4ca00d35e18,2024-03-18T00:15:07.340000
CVE-2024-23134,0,0,7bcfdd789809a85dcb3d8c1b9ffa0666d172be0747695b354e86aa69e00d8a04,2024-06-17T17:15:51.443000
CVE-2024-23135,0,0,4ba3ef7d8b86192f3be9f608d250b59255f9c0272b793b5a67accf11746a7c49,2024-03-18T00:15:07.437000
CVE-2024-23136,0,0,2b90dcbe6397ed8c7559581d051fafe64c4814ea200ea96c2ab2b35870ef1cba,2024-03-18T00:15:07.490000
CVE-2024-23137,0,0,b73ac1a3962b6dd849e09860e5fbdd306ad601f2f1d6396ea6c594ab1cd8349c,2024-03-18T00:15:07.537000
CVE-2024-23137,0,1,a3dfbd98c2dc1ba45435d76ef85744b5c19037c4a2624aa7d2b0ff334bf9c28b,2024-06-25T02:15:10.873000
CVE-2024-23138,0,0,6b090492cd013e3e650e24e59443f58d52996df0034c406247881d7acc03e3d0,2024-03-18T01:13:31.203000
CVE-2024-23139,0,0,3d593be31839f5d86966b7965df31cd04e51b507bda09669a8893d4214cfafec,2024-03-18T01:13:31.203000
CVE-2024-2314,0,0,ed96f7e1946840e93c2198da1169aca1bfa11c5d8065acfea02e9fe912a3e6df,2024-03-11T01:32:29.610000
CVE-2024-23140,1,1,c8f7ad257e64b2a7face122972611fe849abbe2a9c1d4a17a82a22adc78fc625,2024-06-25T02:15:10.940000
CVE-2024-23141,1,1,7495c93b42553a9204f416fa7d692104daa1ba1b322b4fbac4ac983cb9d94b77,2024-06-25T02:15:11.030000
CVE-2024-23142,1,1,bf8e814d02f7af8faf6ba4fc737fd10940ffd6e1ec4548262b96ec3908bb5715,2024-06-25T02:15:11.123000
CVE-2024-23143,1,1,8466a5985c56481c8a05d04f0a81b4e8393edc2de9229f056f02360a344eb72c,2024-06-25T02:15:11.203000
CVE-2024-23144,1,1,8a365e276c0bf3b25799cd6f306dac7f423c9d0d7be7d3c6806b8a1da693a624,2024-06-25T02:15:11.293000
CVE-2024-23145,1,1,877788e1dac7df0897ddc85c5486f58d6a880830db4618461185460ded6bd4c4,2024-06-25T03:15:10
CVE-2024-23146,1,1,3a09c6dd2b0592a4522a558664d4ddd3d5abee3172cdf114c21bcd397d0aa18f,2024-06-25T03:15:10.093000
CVE-2024-23147,1,1,027d397c4e37fb2753404d1cca3c84693566870866d0300d85bf2d92d3d12128,2024-06-25T03:15:10.190000
CVE-2024-23148,1,1,a45b4c3cc87018bdde3e8028824dfa959326e289ab5c2e92d7dd6f5b650f0cc3,2024-06-25T03:15:10.283000
CVE-2024-23149,1,1,3aab941677d4372e3d7d536b8fd65f98ba8725f54e8745162dae237c722f2093,2024-06-25T03:15:10.370000
CVE-2024-2316,0,0,b19568c74ff3303e21c6f779d3f7251e97a598ce30370572128b37d7e3b8336b,2024-05-17T02:38:09.927000
CVE-2024-2317,0,0,a696c117ae514f4e733f3f16d6619ea5748142dccfe9e4a63d423b5b3c8772c3,2024-05-17T02:38:10.027000
CVE-2024-23170,0,0,13146081a2acee1dfc9938d9131a35ea909e72090f99ea62e52485862035b1b1,2024-02-22T03:15:08.297000
@ -252971,6 +252984,9 @@ CVE-2024-36979,0,0,b5c86fe1e151f03cc7911f2db726f75e908559d8b3402d6614d6fdbd11ceb
CVE-2024-3698,0,0,13b4029eb6179dbe788598788e16556a1995d850ddfc4af1ee0c4e86961a3a21,2024-05-17T02:40:04.800000
CVE-2024-3699,0,0,6e64dedcb1ec83e842b9c3ed18b374381a62ef4f7982a43d9405eeb95e55d0fc,2024-06-12T17:53:09.130000
CVE-2024-3700,0,0,f1913b84964a9a87ca4f78bbad55a262819a35385e2c066c91eaa7c4a1891262,2024-06-12T17:51:52.710000
CVE-2024-37000,1,1,7e81dddc8ce31ffcfab2213be2607016266ce5c43f9de4614465f92323a28ad3,2024-06-25T03:15:10.463000
CVE-2024-37001,1,1,932e4a881cd0ccddbe0000d0d999146cd4b1ff5fa64d96f3ae5fd7f2865d89d4,2024-06-25T03:15:10.553000
CVE-2024-37002,1,1,5b29caaf49fecaa210a784b838f48f14a80a72843161a1e528a558d70bfe388c,2024-06-25T03:15:10.647000
CVE-2024-3701,0,0,d78f52a76181001272debccb095fb5971bb478ebc111313d9ff2994f4ec0598f,2024-04-15T13:15:31.997000
CVE-2024-37014,0,0,c47c2b09802b94267a83a7981860e8f6f71032b8440b3dd55d1a2f768ec7199d,2024-06-12T17:57:01.660000
CVE-2024-37017,0,0,fd4284c5a2195342d9622b5d20527d4d58db85192e227730c5a741287dc835e4,2024-05-31T13:01:46.727000
@ -255058,3 +255074,5 @@ CVE-2024-6290,0,0,5d4b92359b64e77ba61c2c2fb8b337777d12a0124ea317fc382effce72051e
CVE-2024-6291,0,0,b46430ebcd111d47076f0660eeac0e8e5ae17e44995f6e1aa566b78d007a4df6,2024-06-24T22:15:10.577000
CVE-2024-6292,0,0,8b4b29d9fd8b6deb605531b3c158c1db86c8e941502e889b33cb0f8943cb5102,2024-06-24T22:15:10.660000
CVE-2024-6293,0,0,eeaffba53fb5f9eeff42362f9e68ced969d50fc1ed573bd27cb47a275de983a8,2024-06-24T22:15:10.740000
CVE-2024-6294,1,1,3041bcbf3b0b5ad6bbf3a9834cf50b133cb108f81018300675ffbfbc44672946,2024-06-25T02:15:11.657000
CVE-2024-6295,1,1,1fff3f0ba280af9323e3d1eb1c5da3207fda9e71741085aa72d53fdeb44054eb,2024-06-25T03:15:10.740000

Can't render this file because it is too large.