From 13309a45d34fc8a98d2f2be589f3a051998d68c8 Mon Sep 17 00:00:00 2001 From: cad-safe-bot Date: Tue, 25 Jun 2024 04:03:11 +0000 Subject: [PATCH] Auto-Update: 2024-06-25T04:00:18.889033+00:00 --- CVE-2019/CVE-2019-148xx/CVE-2019-14861.json | 6 ++- CVE-2023/CVE-2023-50xx/CVE-2023-5037.json | 25 +++++++-- CVE-2023/CVE-2023-50xx/CVE-2023-5038.json | 36 +++++++++++++ CVE-2023/CVE-2023-61xx/CVE-2023-6198.json | 55 +++++++++++++++++++ CVE-2024/CVE-2024-223xx/CVE-2024-22385.json | 55 +++++++++++++++++++ CVE-2024/CVE-2024-231xx/CVE-2024-23131.json | 8 ++- CVE-2024/CVE-2024-231xx/CVE-2024-23137.json | 8 ++- CVE-2024/CVE-2024-231xx/CVE-2024-23140.json | 32 +++++++++++ CVE-2024/CVE-2024-231xx/CVE-2024-23141.json | 32 +++++++++++ CVE-2024/CVE-2024-231xx/CVE-2024-23142.json | 32 +++++++++++ CVE-2024/CVE-2024-231xx/CVE-2024-23143.json | 36 +++++++++++++ CVE-2024/CVE-2024-231xx/CVE-2024-23144.json | 32 +++++++++++ CVE-2024/CVE-2024-231xx/CVE-2024-23145.json | 32 +++++++++++ CVE-2024/CVE-2024-231xx/CVE-2024-23146.json | 32 +++++++++++ CVE-2024/CVE-2024-231xx/CVE-2024-23147.json | 32 +++++++++++ CVE-2024/CVE-2024-231xx/CVE-2024-23148.json | 32 +++++++++++ CVE-2024/CVE-2024-231xx/CVE-2024-23149.json | 32 +++++++++++ CVE-2024/CVE-2024-370xx/CVE-2024-37000.json | 32 +++++++++++ CVE-2024/CVE-2024-370xx/CVE-2024-37001.json | 32 +++++++++++ CVE-2024/CVE-2024-370xx/CVE-2024-37002.json | 32 +++++++++++ CVE-2024/CVE-2024-62xx/CVE-2024-6294.json | 59 +++++++++++++++++++++ CVE-2024/CVE-2024-62xx/CVE-2024-6295.json | 59 +++++++++++++++++++++ README.md | 38 +++++++++---- _state.csv | 38 +++++++++---- 24 files changed, 777 insertions(+), 30 deletions(-) create mode 100644 CVE-2023/CVE-2023-50xx/CVE-2023-5038.json create mode 100644 CVE-2023/CVE-2023-61xx/CVE-2023-6198.json create mode 100644 CVE-2024/CVE-2024-223xx/CVE-2024-22385.json create mode 100644 CVE-2024/CVE-2024-231xx/CVE-2024-23140.json create mode 100644 CVE-2024/CVE-2024-231xx/CVE-2024-23141.json create mode 100644 CVE-2024/CVE-2024-231xx/CVE-2024-23142.json create mode 100644 CVE-2024/CVE-2024-231xx/CVE-2024-23143.json create mode 100644 CVE-2024/CVE-2024-231xx/CVE-2024-23144.json create mode 100644 CVE-2024/CVE-2024-231xx/CVE-2024-23145.json create mode 100644 CVE-2024/CVE-2024-231xx/CVE-2024-23146.json create mode 100644 CVE-2024/CVE-2024-231xx/CVE-2024-23147.json create mode 100644 CVE-2024/CVE-2024-231xx/CVE-2024-23148.json create mode 100644 CVE-2024/CVE-2024-231xx/CVE-2024-23149.json create mode 100644 CVE-2024/CVE-2024-370xx/CVE-2024-37000.json create mode 100644 CVE-2024/CVE-2024-370xx/CVE-2024-37001.json create mode 100644 CVE-2024/CVE-2024-370xx/CVE-2024-37002.json create mode 100644 CVE-2024/CVE-2024-62xx/CVE-2024-6294.json create mode 100644 CVE-2024/CVE-2024-62xx/CVE-2024-6295.json diff --git a/CVE-2019/CVE-2019-148xx/CVE-2019-14861.json b/CVE-2019/CVE-2019-148xx/CVE-2019-14861.json index 9d3ce0a9f3c..ad869b55c21 100644 --- a/CVE-2019/CVE-2019-148xx/CVE-2019-14861.json +++ b/CVE-2019/CVE-2019-148xx/CVE-2019-14861.json @@ -2,7 +2,7 @@ "id": "CVE-2019-14861", "sourceIdentifier": "secalert@redhat.com", "published": "2019-12-10T23:15:10.360", - "lastModified": "2023-11-07T03:05:20.643", + "lastModified": "2024-06-25T02:15:09.860", "vulnStatus": "Modified", "descriptions": [ { @@ -234,6 +234,10 @@ "Third Party Advisory" ] }, + { + "url": "http://www.openwall.com/lists/oss-security/2024/06/24/3", + "source": "secalert@redhat.com" + }, { "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14861", "source": "secalert@redhat.com", diff --git a/CVE-2023/CVE-2023-50xx/CVE-2023-5037.json b/CVE-2023/CVE-2023-50xx/CVE-2023-5037.json index 51e80a2fa7a..b387b704fe3 100644 --- a/CVE-2023/CVE-2023-50xx/CVE-2023-5037.json +++ b/CVE-2023/CVE-2023-50xx/CVE-2023-5037.json @@ -2,14 +2,31 @@ "id": "CVE-2023-5037", "sourceIdentifier": "fc9afe74-3f80-4fb7-a313-e6f036a89882", "published": "2023-11-13T08:15:26.107", - "lastModified": "2023-11-13T08:15:26.107", - "vulnStatus": "Rejected", + "lastModified": "2024-06-25T02:15:10.183", + "vulnStatus": "Received", "descriptions": [ { "lang": "en", - "value": "Rejected reason: CVE number will be reassigned." + "value": "badmonkey, a Security Researcher has found a flaw that allows for a authenticated command injection on the camera. An attacker could inject malicious into request packets to execute command. The manufacturer has released patch firmware for the flaw, please refer to the manufacturer's report for details and workarounds." } ], "metrics": {}, - "references": [] + "weaknesses": [ + { + "source": "fc9afe74-3f80-4fb7-a313-e6f036a89882", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-78" + } + ] + } + ], + "references": [ + { + "url": "https://www.hanwhavision.com/wp-content/uploads/2024/06/Camera-Vulnerability-Report-CVE-2023-5037-5038.pdf", + "source": "fc9afe74-3f80-4fb7-a313-e6f036a89882" + } + ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-50xx/CVE-2023-5038.json b/CVE-2023/CVE-2023-50xx/CVE-2023-5038.json new file mode 100644 index 00000000000..2bdf1b0f0b8 --- /dev/null +++ b/CVE-2023/CVE-2023-50xx/CVE-2023-5038.json @@ -0,0 +1,36 @@ +{ + "id": "CVE-2023-5038", + "sourceIdentifier": "fc9afe74-3f80-4fb7-a313-e6f036a89882", + "published": "2024-06-25T03:15:09.737", + "lastModified": "2024-06-25T03:15:09.737", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "badmonkey, a Security Researcher has found a flaw that allows for a unauthenticated DoS attack on the camera. An attacker runs a crafted URL, nobody can access the web management page of the camera. and must manually restart the device or re-power it. The manufacturer has released patch firmware for the flaw, please refer to the manufacturer's report for details and workarounds." + } + ], + "metrics": {}, + "weaknesses": [ + { + "source": "fc9afe74-3f80-4fb7-a313-e6f036a89882", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-248" + }, + { + "lang": "en", + "value": "CWE-703" + } + ] + } + ], + "references": [ + { + "url": "https://www.hanwhavision.com/wp-content/uploads/2024/06/Camera-Vulnerability-Report-CVE-2023-5037-5038.pdf", + "source": "fc9afe74-3f80-4fb7-a313-e6f036a89882" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-61xx/CVE-2023-6198.json b/CVE-2023/CVE-2023-61xx/CVE-2023-6198.json new file mode 100644 index 00000000000..4af5503e7d8 --- /dev/null +++ b/CVE-2023/CVE-2023-61xx/CVE-2023-6198.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2023-6198", + "sourceIdentifier": "security@baicells.com", + "published": "2024-06-25T02:15:10.347", + "lastModified": "2024-06-25T02:15:10.347", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Use of Hard-coded Credentials vulnerability in Baicells Snap Router BaiCE_BMI on EP3011 (User Passwords modules) allows unauthorized access to the device." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security@baicells.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:H/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "availabilityImpact": "LOW", + "baseScore": 9.3, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 4.7 + } + ] + }, + "weaknesses": [ + { + "source": "security@baicells.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-798" + } + ] + } + ], + "references": [ + { + "url": "https://www.baicells.com", + "source": "security@baicells.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-223xx/CVE-2024-22385.json b/CVE-2024/CVE-2024-223xx/CVE-2024-22385.json new file mode 100644 index 00000000000..840ff8fda5b --- /dev/null +++ b/CVE-2024/CVE-2024-223xx/CVE-2024-22385.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2024-22385", + "sourceIdentifier": "hirt@hitachi.co.jp", + "published": "2024-06-25T02:15:10.583", + "lastModified": "2024-06-25T02:15:10.583", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Incorrect Default Permissions vulnerability in Hitachi Storage Provider for VMware vCenter allows local users to read and write specific files.This issue affects Hitachi Storage Provider for VMware vCenter: from 3.1.0 before 3.7.4." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "hirt@hitachi.co.jp", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 4.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 2.5 + } + ] + }, + "weaknesses": [ + { + "source": "hirt@hitachi.co.jp", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-276" + } + ] + } + ], + "references": [ + { + "url": "https://www.hitachi.com/products/it/software/security/info/vuls/hitachi-sec-2024-129/index.html", + "source": "hirt@hitachi.co.jp" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-231xx/CVE-2024-23131.json b/CVE-2024/CVE-2024-231xx/CVE-2024-23131.json index cd765fd3e5a..4d59bbc479f 100644 --- a/CVE-2024/CVE-2024-231xx/CVE-2024-23131.json +++ b/CVE-2024/CVE-2024-231xx/CVE-2024-23131.json @@ -2,12 +2,12 @@ "id": "CVE-2024-23131", "sourceIdentifier": "psirt@autodesk.com", "published": "2024-02-22T04:15:08.797", - "lastModified": "2024-03-18T00:15:07.247", + "lastModified": "2024-06-25T02:15:10.807", "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", - "value": "A maliciously crafted STP file in ASMKERN228A.dll or ASMDATAX228A.dll when parsed through Autodesk AutoCAD could lead to a memory corruption vulnerability by write access violation. This vulnerability in conjunction with other vulnerabilities could lead to code execution in the context of the current process.\n" + "value": "A maliciously crafted STP file, when parsed in ASMIMPORT229A.dll, ASMKERN228A.dll, ASMkern229A.dll or ASMDATAX228A.dll through Autodesk applications, can lead to a memory corruption vulnerability by write access violation. This vulnerability, in conjunction with other vulnerabilities, can lead to code execution in the context of the current process." }, { "lang": "es", @@ -35,6 +35,10 @@ { "url": "https://www.autodesk.com/trust/security-advisories/adsk-sa-2024-0004", "source": "psirt@autodesk.com" + }, + { + "url": "https://www.autodesk.com/trust/security-advisories/adsk-sa-2024-0009", + "source": "psirt@autodesk.com" } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-231xx/CVE-2024-23137.json b/CVE-2024/CVE-2024-231xx/CVE-2024-23137.json index 527f6c00485..50fe10f4c90 100644 --- a/CVE-2024/CVE-2024-231xx/CVE-2024-23137.json +++ b/CVE-2024/CVE-2024-231xx/CVE-2024-23137.json @@ -2,12 +2,12 @@ "id": "CVE-2024-23137", "sourceIdentifier": "psirt@autodesk.com", "published": "2024-02-22T05:15:09.640", - "lastModified": "2024-03-18T00:15:07.537", + "lastModified": "2024-06-25T02:15:10.873", "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", - "value": "A maliciously crafted STP or SLDPRT file in ODXSW_DLL.dll when parsed through Autodesk AutoCAD can be used to uninitialized variable. This vulnerability, along with other vulnerabilities, could lead to code execution in the current process.\n" + "value": "A maliciously crafted STP or SLDPRT file, when parsed in ODXSW_DLL.dll through Autodesk applications, can be used to uninitialized variables. This vulnerability, along with other vulnerabilities, can lead to code execution in the current process." }, { "lang": "es", @@ -35,6 +35,10 @@ { "url": "https://www.autodesk.com/trust/security-advisories/adsk-sa-2024-0004", "source": "psirt@autodesk.com" + }, + { + "url": "https://www.autodesk.com/trust/security-advisories/adsk-sa-2024-0009", + "source": "psirt@autodesk.com" } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-231xx/CVE-2024-23140.json b/CVE-2024/CVE-2024-231xx/CVE-2024-23140.json new file mode 100644 index 00000000000..d869e126bff --- /dev/null +++ b/CVE-2024/CVE-2024-231xx/CVE-2024-23140.json @@ -0,0 +1,32 @@ +{ + "id": "CVE-2024-23140", + "sourceIdentifier": "psirt@autodesk.com", + "published": "2024-06-25T02:15:10.940", + "lastModified": "2024-06-25T02:15:10.940", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "A maliciously crafted 3DM and MODEL file, when parsed in opennurbs.dll and atf_api.dll through Autodesk applications, can force an Out-of-Bound Read. A malicious actor can leverage this vulnerability to cause a crash, read sensitive data, or execute arbitrary code in the context of the current process." + } + ], + "metrics": {}, + "weaknesses": [ + { + "source": "psirt@autodesk.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-125" + } + ] + } + ], + "references": [ + { + "url": "https://www.autodesk.com/trust/security-advisories/adsk-sa-2024-0009", + "source": "psirt@autodesk.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-231xx/CVE-2024-23141.json b/CVE-2024/CVE-2024-231xx/CVE-2024-23141.json new file mode 100644 index 00000000000..8533eee6eb3 --- /dev/null +++ b/CVE-2024/CVE-2024-231xx/CVE-2024-23141.json @@ -0,0 +1,32 @@ +{ + "id": "CVE-2024-23141", + "sourceIdentifier": "psirt@autodesk.com", + "published": "2024-06-25T02:15:11.030", + "lastModified": "2024-06-25T02:15:11.030", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "A maliciously crafted MODEL file, when parsed in libodxdll through Autodesk applications, can cause a double free. This vulnerability, along with other vulnerabilities, can lead to code execution in the current process." + } + ], + "metrics": {}, + "weaknesses": [ + { + "source": "psirt@autodesk.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-415" + } + ] + } + ], + "references": [ + { + "url": "https://www.autodesk.com/trust/security-advisories/adsk-sa-2024-0009", + "source": "psirt@autodesk.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-231xx/CVE-2024-23142.json b/CVE-2024/CVE-2024-231xx/CVE-2024-23142.json new file mode 100644 index 00000000000..efdb7dc54a4 --- /dev/null +++ b/CVE-2024/CVE-2024-231xx/CVE-2024-23142.json @@ -0,0 +1,32 @@ +{ + "id": "CVE-2024-23142", + "sourceIdentifier": "psirt@autodesk.com", + "published": "2024-06-25T02:15:11.123", + "lastModified": "2024-06-25T02:15:11.123", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "A maliciously crafted CATPART, STP, and MODEL file, when parsed in atf_dwg_consumer.dll, rose_x64_vc15.dll and libodxdll through Autodesk applications, can cause a use-after-free vulnerability. This vulnerability, along with other vulnerabilities, can lead to code execution in the current process." + } + ], + "metrics": {}, + "weaknesses": [ + { + "source": "psirt@autodesk.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-416" + } + ] + } + ], + "references": [ + { + "url": "https://www.autodesk.com/trust/security-advisories/adsk-sa-2024-0009", + "source": "psirt@autodesk.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-231xx/CVE-2024-23143.json b/CVE-2024/CVE-2024-231xx/CVE-2024-23143.json new file mode 100644 index 00000000000..e814fe629e4 --- /dev/null +++ b/CVE-2024/CVE-2024-231xx/CVE-2024-23143.json @@ -0,0 +1,36 @@ +{ + "id": "CVE-2024-23143", + "sourceIdentifier": "psirt@autodesk.com", + "published": "2024-06-25T02:15:11.203", + "lastModified": "2024-06-25T02:15:11.203", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "A maliciously crafted 3DM, MODEL and X_B file, when parsed in ASMkern229A.dll and ASMBASE229A.dll through Autodesk applications, can force an Out-of-Bound Read and/or Out-of-Bound Write. A malicious actor can leverage this vulnerability to cause a crash, read sensitive data, or execute arbitrary code in the context of the current process." + } + ], + "metrics": {}, + "weaknesses": [ + { + "source": "psirt@autodesk.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-125" + }, + { + "lang": "en", + "value": "CWE-787" + } + ] + } + ], + "references": [ + { + "url": "https://www.autodesk.com/trust/security-advisories/adsk-sa-2024-0009", + "source": "psirt@autodesk.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-231xx/CVE-2024-23144.json b/CVE-2024/CVE-2024-231xx/CVE-2024-23144.json new file mode 100644 index 00000000000..4226e6c5db0 --- /dev/null +++ b/CVE-2024/CVE-2024-231xx/CVE-2024-23144.json @@ -0,0 +1,32 @@ +{ + "id": "CVE-2024-23144", + "sourceIdentifier": "psirt@autodesk.com", + "published": "2024-06-25T02:15:11.293", + "lastModified": "2024-06-25T02:15:11.293", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "A maliciously crafted CATPART file, when parsed in CC5Dll.dll and ASMBASE228A.dll through Autodesk applications, can force an Out-of-Bound Write. A malicious actor can leverage this vulnerability to cause a crash, read sensitive data, or execute arbitrary code in the context of the current process." + } + ], + "metrics": {}, + "weaknesses": [ + { + "source": "psirt@autodesk.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + } + ], + "references": [ + { + "url": "https://www.autodesk.com/trust/security-advisories/adsk-sa-2024-0009", + "source": "psirt@autodesk.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-231xx/CVE-2024-23145.json b/CVE-2024/CVE-2024-231xx/CVE-2024-23145.json new file mode 100644 index 00000000000..4dde491bc55 --- /dev/null +++ b/CVE-2024/CVE-2024-231xx/CVE-2024-23145.json @@ -0,0 +1,32 @@ +{ + "id": "CVE-2024-23145", + "sourceIdentifier": "psirt@autodesk.com", + "published": "2024-06-25T03:15:10.000", + "lastModified": "2024-06-25T03:15:10.000", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "A maliciously crafted PRT file, when parsed in opennurbs.dll through Autodesk applications, can force an Out-of-Bound Read. A malicious actor can leverage this vulnerability to cause a crash, read sensitive data, or execute arbitrary code in the context of the current process." + } + ], + "metrics": {}, + "weaknesses": [ + { + "source": "psirt@autodesk.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-125" + } + ] + } + ], + "references": [ + { + "url": "https://www.autodesk.com/trust/security-advisories/adsk-sa-2024-0009", + "source": "psirt@autodesk.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-231xx/CVE-2024-23146.json b/CVE-2024/CVE-2024-231xx/CVE-2024-23146.json new file mode 100644 index 00000000000..b085709d27d --- /dev/null +++ b/CVE-2024/CVE-2024-231xx/CVE-2024-23146.json @@ -0,0 +1,32 @@ +{ + "id": "CVE-2024-23146", + "sourceIdentifier": "psirt@autodesk.com", + "published": "2024-06-25T03:15:10.093", + "lastModified": "2024-06-25T03:15:10.093", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "A maliciously crafted X_B and X_T file, when parsed in pskernel.DLL through Autodesk applications, can force an Out-of-Bound Write. A malicious actor can leverage this vulnerability to cause a crash, read sensitive data, or execute arbitrary code in the context of the current process." + } + ], + "metrics": {}, + "weaknesses": [ + { + "source": "psirt@autodesk.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + } + ], + "references": [ + { + "url": "https://www.autodesk.com/trust/security-advisories/adsk-sa-2024-0009", + "source": "psirt@autodesk.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-231xx/CVE-2024-23147.json b/CVE-2024/CVE-2024-231xx/CVE-2024-23147.json new file mode 100644 index 00000000000..418dfae082d --- /dev/null +++ b/CVE-2024/CVE-2024-231xx/CVE-2024-23147.json @@ -0,0 +1,32 @@ +{ + "id": "CVE-2024-23147", + "sourceIdentifier": "psirt@autodesk.com", + "published": "2024-06-25T03:15:10.190", + "lastModified": "2024-06-25T03:15:10.190", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "A maliciously crafted CATPART, X_B and STEP, when parsed in ASMKERN228A.dll and ASMKERN229A.dll through Autodesk applications, can lead to a memory corruption vulnerability by write access violation. This vulnerability, in conjunction with other vulnerabilities, can lead to code execution in the context of the current process." + } + ], + "metrics": {}, + "weaknesses": [ + { + "source": "psirt@autodesk.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-119" + } + ] + } + ], + "references": [ + { + "url": "https://www.autodesk.com/trust/security-advisories/adsk-sa-2024-0009", + "source": "psirt@autodesk.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-231xx/CVE-2024-23148.json b/CVE-2024/CVE-2024-231xx/CVE-2024-23148.json new file mode 100644 index 00000000000..9af770ab128 --- /dev/null +++ b/CVE-2024/CVE-2024-231xx/CVE-2024-23148.json @@ -0,0 +1,32 @@ +{ + "id": "CVE-2024-23148", + "sourceIdentifier": "psirt@autodesk.com", + "published": "2024-06-25T03:15:10.283", + "lastModified": "2024-06-25T03:15:10.283", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "A maliciously crafted CATPRODUCT file, when parsed in CC5Dll.dll through Autodesk applications, can lead to a memory corruption vulnerability by write access violation. This vulnerability, in conjunction with other vulnerabilities, can lead to code execution in the context of the current process." + } + ], + "metrics": {}, + "weaknesses": [ + { + "source": "psirt@autodesk.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-119" + } + ] + } + ], + "references": [ + { + "url": "https://www.autodesk.com/trust/security-advisories/adsk-sa-2024-0009", + "source": "psirt@autodesk.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-231xx/CVE-2024-23149.json b/CVE-2024/CVE-2024-231xx/CVE-2024-23149.json new file mode 100644 index 00000000000..011bf9eb37c --- /dev/null +++ b/CVE-2024/CVE-2024-231xx/CVE-2024-23149.json @@ -0,0 +1,32 @@ +{ + "id": "CVE-2024-23149", + "sourceIdentifier": "psirt@autodesk.com", + "published": "2024-06-25T03:15:10.370", + "lastModified": "2024-06-25T03:15:10.370", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "A maliciously crafted SLDDRW file, when parsed in ODXSW_DLL.dll through Autodesk applications, can force an Out-of-Bound Read. A malicious actor can leverage this vulnerability to cause a crash, read sensitive data, or execute arbitrary code in the context of the current process." + } + ], + "metrics": {}, + "weaknesses": [ + { + "source": "psirt@autodesk.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-125" + } + ] + } + ], + "references": [ + { + "url": "https://www.autodesk.com/trust/security-advisories/adsk-sa-2024-0009", + "source": "psirt@autodesk.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-370xx/CVE-2024-37000.json b/CVE-2024/CVE-2024-370xx/CVE-2024-37000.json new file mode 100644 index 00000000000..1526ce75bf7 --- /dev/null +++ b/CVE-2024/CVE-2024-370xx/CVE-2024-37000.json @@ -0,0 +1,32 @@ +{ + "id": "CVE-2024-37000", + "sourceIdentifier": "psirt@autodesk.com", + "published": "2024-06-25T03:15:10.463", + "lastModified": "2024-06-25T03:15:10.463", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "A maliciously crafted X_B file, when parsed in pskernel.DLL through Autodesk applications, can lead to a memory corruption vulnerability by write access violation. This vulnerability, in conjunction with other vulnerabilities, can lead to code execution in the context of the current process." + } + ], + "metrics": {}, + "weaknesses": [ + { + "source": "psirt@autodesk.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-119" + } + ] + } + ], + "references": [ + { + "url": "https://www.autodesk.com/trust/security-advisories/adsk-sa-2024-0009", + "source": "psirt@autodesk.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-370xx/CVE-2024-37001.json b/CVE-2024/CVE-2024-370xx/CVE-2024-37001.json new file mode 100644 index 00000000000..0ca37b606bb --- /dev/null +++ b/CVE-2024/CVE-2024-370xx/CVE-2024-37001.json @@ -0,0 +1,32 @@ +{ + "id": "CVE-2024-37001", + "sourceIdentifier": "psirt@autodesk.com", + "published": "2024-06-25T03:15:10.553", + "lastModified": "2024-06-25T03:15:10.553", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "[A maliciously crafted 3DM file, when parsed in opennurbs.dll through Autodesk applications, can be used to cause a Heap-based Overflow. A malicious actor can leverage this vulnerability to cause a crash, read sensitive data, or execute arbitrary code in the context of the current process." + } + ], + "metrics": {}, + "weaknesses": [ + { + "source": "psirt@autodesk.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-122" + } + ] + } + ], + "references": [ + { + "url": "https://www.autodesk.com/trust/security-advisories/adsk-sa-2024-0009", + "source": "psirt@autodesk.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-370xx/CVE-2024-37002.json b/CVE-2024/CVE-2024-370xx/CVE-2024-37002.json new file mode 100644 index 00000000000..14bbf8552f1 --- /dev/null +++ b/CVE-2024/CVE-2024-370xx/CVE-2024-37002.json @@ -0,0 +1,32 @@ +{ + "id": "CVE-2024-37002", + "sourceIdentifier": "psirt@autodesk.com", + "published": "2024-06-25T03:15:10.647", + "lastModified": "2024-06-25T03:15:10.647", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "A maliciously crafted MODEL file, when parsed in ASMkern229A.dllthrough Autodesk applications, can be used to uninitialized variables. This vulnerability, along with other vulnerabilities, could lead to code execution in the current process." + } + ], + "metrics": {}, + "weaknesses": [ + { + "source": "psirt@autodesk.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-457" + } + ] + } + ], + "references": [ + { + "url": "https://www.autodesk.com/trust/security-advisories/adsk-sa-2024-0009", + "source": "psirt@autodesk.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-62xx/CVE-2024-6294.json b/CVE-2024/CVE-2024-62xx/CVE-2024-6294.json new file mode 100644 index 00000000000..64243c8aaa6 --- /dev/null +++ b/CVE-2024/CVE-2024-62xx/CVE-2024-6294.json @@ -0,0 +1,59 @@ +{ + "id": "CVE-2024-6294", + "sourceIdentifier": "twcert@cert.org.tw", + "published": "2024-06-25T02:15:11.657", + "lastModified": "2024-06-25T02:15:11.657", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "udn News Android APP stores the user session in logcat file when user log into the APP. A malicious APP or an attacker with physical access to the Android device can retrieve this session and use it to log into the news APP and other services provided by udn." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "twcert@cert.org.tw", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:P/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "PHYSICAL", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 3.9, + "baseSeverity": "LOW" + }, + "exploitabilityScore": 0.3, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "twcert@cert.org.tw", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-200" + } + ] + } + ], + "references": [ + { + "url": "https://www.twcert.org.tw/en/cp-139-7893-43ecd-2.html", + "source": "twcert@cert.org.tw" + }, + { + "url": "https://www.twcert.org.tw/tw/cp-132-7892-aafd2-1.html", + "source": "twcert@cert.org.tw" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-62xx/CVE-2024-6295.json b/CVE-2024/CVE-2024-62xx/CVE-2024-6295.json new file mode 100644 index 00000000000..08c429a0f8a --- /dev/null +++ b/CVE-2024/CVE-2024-62xx/CVE-2024-6295.json @@ -0,0 +1,59 @@ +{ + "id": "CVE-2024-6295", + "sourceIdentifier": "twcert@cert.org.tw", + "published": "2024-06-25T03:15:10.740", + "lastModified": "2024-06-25T03:15:10.740", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "udn News Android APP stores the unencrypted user session in the local database when user log into the application. A malicious APP or an attacker with physical access to the Android device can retrieve this session and use it to log into the news APP and other services provided by udn." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "twcert@cert.org.tw", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:P/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "PHYSICAL", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 3.9, + "baseSeverity": "LOW" + }, + "exploitabilityScore": 0.3, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "twcert@cert.org.tw", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-922" + } + ] + } + ], + "references": [ + { + "url": "https://www.twcert.org.tw/en/cp-139-7895-80dac-2.html", + "source": "twcert@cert.org.tw" + }, + { + "url": "https://www.twcert.org.tw/tw/cp-132-7894-aebd8-1.html", + "source": "twcert@cert.org.tw" + } + ] +} \ No newline at end of file diff --git a/README.md b/README.md index e29a7f3d042..674897f027c 100644 --- a/README.md +++ b/README.md @@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2024-06-25T02:00:17.609643+00:00 +2024-06-25T04:00:18.889033+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2024-06-25T01:15:50.197000+00:00 +2024-06-25T03:15:10.740000+00:00 ``` ### Last Data Feed Release @@ -33,25 +33,41 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### Total Number of included CVEs ```plain -255059 +255077 ``` ### CVEs added in the last Commit -Recently added CVEs: `0` +Recently added CVEs: `18` +- [CVE-2023-5038](CVE-2023/CVE-2023-50xx/CVE-2023-5038.json) (`2024-06-25T03:15:09.737`) +- [CVE-2023-6198](CVE-2023/CVE-2023-61xx/CVE-2023-6198.json) (`2024-06-25T02:15:10.347`) +- [CVE-2024-22385](CVE-2024/CVE-2024-223xx/CVE-2024-22385.json) (`2024-06-25T02:15:10.583`) +- [CVE-2024-23140](CVE-2024/CVE-2024-231xx/CVE-2024-23140.json) (`2024-06-25T02:15:10.940`) +- [CVE-2024-23141](CVE-2024/CVE-2024-231xx/CVE-2024-23141.json) (`2024-06-25T02:15:11.030`) +- [CVE-2024-23142](CVE-2024/CVE-2024-231xx/CVE-2024-23142.json) (`2024-06-25T02:15:11.123`) +- [CVE-2024-23143](CVE-2024/CVE-2024-231xx/CVE-2024-23143.json) (`2024-06-25T02:15:11.203`) +- [CVE-2024-23144](CVE-2024/CVE-2024-231xx/CVE-2024-23144.json) (`2024-06-25T02:15:11.293`) +- [CVE-2024-23145](CVE-2024/CVE-2024-231xx/CVE-2024-23145.json) (`2024-06-25T03:15:10.000`) +- [CVE-2024-23146](CVE-2024/CVE-2024-231xx/CVE-2024-23146.json) (`2024-06-25T03:15:10.093`) +- [CVE-2024-23147](CVE-2024/CVE-2024-231xx/CVE-2024-23147.json) (`2024-06-25T03:15:10.190`) +- [CVE-2024-23148](CVE-2024/CVE-2024-231xx/CVE-2024-23148.json) (`2024-06-25T03:15:10.283`) +- [CVE-2024-23149](CVE-2024/CVE-2024-231xx/CVE-2024-23149.json) (`2024-06-25T03:15:10.370`) +- [CVE-2024-37000](CVE-2024/CVE-2024-370xx/CVE-2024-37000.json) (`2024-06-25T03:15:10.463`) +- [CVE-2024-37001](CVE-2024/CVE-2024-370xx/CVE-2024-37001.json) (`2024-06-25T03:15:10.553`) +- [CVE-2024-37002](CVE-2024/CVE-2024-370xx/CVE-2024-37002.json) (`2024-06-25T03:15:10.647`) +- [CVE-2024-6294](CVE-2024/CVE-2024-62xx/CVE-2024-6294.json) (`2024-06-25T02:15:11.657`) +- [CVE-2024-6295](CVE-2024/CVE-2024-62xx/CVE-2024-6295.json) (`2024-06-25T03:15:10.740`) ### CVEs modified in the last Commit -Recently modified CVEs: `6` +Recently modified CVEs: `4` -- [CVE-2024-23122](CVE-2024/CVE-2024-231xx/CVE-2024-23122.json) (`2024-06-25T01:15:49.807`) -- [CVE-2024-23123](CVE-2024/CVE-2024-231xx/CVE-2024-23123.json) (`2024-06-25T01:15:49.923`) -- [CVE-2024-23127](CVE-2024/CVE-2024-231xx/CVE-2024-23127.json) (`2024-06-25T01:15:49.990`) -- [CVE-2024-23128](CVE-2024/CVE-2024-231xx/CVE-2024-23128.json) (`2024-06-25T01:15:50.063`) -- [CVE-2024-23129](CVE-2024/CVE-2024-231xx/CVE-2024-23129.json) (`2024-06-25T01:15:50.137`) -- [CVE-2024-23130](CVE-2024/CVE-2024-231xx/CVE-2024-23130.json) (`2024-06-25T01:15:50.197`) +- [CVE-2019-14861](CVE-2019/CVE-2019-148xx/CVE-2019-14861.json) (`2024-06-25T02:15:09.860`) +- [CVE-2023-5037](CVE-2023/CVE-2023-50xx/CVE-2023-5037.json) (`2024-06-25T02:15:10.183`) +- [CVE-2024-23131](CVE-2024/CVE-2024-231xx/CVE-2024-23131.json) (`2024-06-25T02:15:10.807`) +- [CVE-2024-23137](CVE-2024/CVE-2024-231xx/CVE-2024-23137.json) (`2024-06-25T02:15:10.873`) ## Download and Usage diff --git a/_state.csv b/_state.csv index 6086bba952a..2a686d1b983 100644 --- a/_state.csv +++ b/_state.csv @@ -132711,7 +132711,7 @@ CVE-2019-14858,0,0,40b5dad00c367331f4a6e4ac24e197aa0b3bdef1cf723a0aa7111a87e27e0 CVE-2019-14859,0,0,f7004b64d5d286af62f04d6fbad70e41cbb37b47af3d1e945dfb22cb1d8aa2a0,2021-08-04T17:15:13.067000 CVE-2019-1486,0,0,91313288c1edbff46cac4068c36983e18960349071863e5f4dc4ce78da97d763,2019-12-16T15:01:34.820000 CVE-2019-14860,0,0,28be410fe2f693b5d89ce801b96bfc8b9bd7f306c11afc75c2b6600eefe84de9,2020-10-09T13:06:03.770000 -CVE-2019-14861,0,0,b86ecfcd3ceb1fb3fa14e4308c895af756ffc842efc66ea6ccc5c360812bd3b5,2023-11-07T03:05:20.643000 +CVE-2019-14861,0,1,7de22da58777e5b29aa0cfc39e69f41d7f7fdab7406028ec4d6284bf7e36e1f6,2024-06-25T02:15:09.860000 CVE-2019-14862,0,0,364d5ab0d54480e0092515c02fb5935974c413d5f0f6919202d712c40a28ac8b,2022-06-07T18:41:46.360000 CVE-2019-14863,0,0,4fb68dbe6c2a880379769f2fbd59b3bdec90d22216c8ad78385c3bc20e796747,2020-01-09T19:57:38.913000 CVE-2019-14864,0,0,47eddd61aa012ac023f10cf6f0cf3ff0c167668f47e1ee83ddabbf9d69d1c1f6,2022-04-22T19:59:14.133000 @@ -237031,7 +237031,7 @@ CVE-2023-50363,0,0,007beb9c9c826c8ff3ba07c2de46061e06937bd3e1177219f5c49a9bb2333 CVE-2023-50364,0,0,e47604eb43c17aadb72d581e49581bad4589eac6cac682ed1340e87038a754a0,2024-05-09T01:15:06.410000 CVE-2023-50368,0,0,822f875a462c17b899bc5907af8a90bdf88b03f70fa2a47891ff0cc8e05f7ab1,2023-12-18T18:51:37.847000 CVE-2023-50369,0,0,5473010ca0d536c23d0126860849245f23a6b5fb4418917816ad2a87231e17a3,2023-12-18T18:57:46.290000 -CVE-2023-5037,0,0,d381335c4dd89e7bbab4901da66bd9ad6b80fcdcad234f2de4677ea0ef9d96ac,2023-11-13T08:15:26.107000 +CVE-2023-5037,0,1,5372d8081c759eb4626917b975cb261976ef01669cf5f369ae947a61821bad5e,2024-06-25T02:15:10.183000 CVE-2023-50370,0,0,cb41cea2750640931e440868ffef0cc7f55b13bd1e4ad5828cdfccae735b6980,2023-12-18T19:02:02.957000 CVE-2023-50371,0,0,04d4e098cc36a4f0bfdfb2f80d9ef226cb1335fcf83d29c3ea30e956873d64b8,2023-12-18T20:14:34.887000 CVE-2023-50372,0,0,f1e1782fe08d93899978169515a94f6ddbf7dcded46e93a6577a24065511b513,2023-12-20T04:28:48.440000 @@ -237040,6 +237040,7 @@ CVE-2023-50376,0,0,c951f73eaa1568ec16d7bbf28755aacf2580409c4a177851a557b18edbeae CVE-2023-50377,0,0,3acd97ab69c2403c419288f2e19070989327aa6f1425e1a9c076820c259b93c2,2023-12-27T21:34:56.883000 CVE-2023-50378,0,0,0f4c193757a21745622df68ec0aa88b8a213c4603a70a54e94c4c05a8dadb60b,2024-05-01T18:15:11.097000 CVE-2023-50379,0,0,2ba768024158d3957bf97073914ab21cf6e76e13687c6569b9647fa3455e4c0b,2024-02-27T14:20:06.637000 +CVE-2023-5038,1,1,09b2c38248dd744367e7b25aadbc8d15aa2524fee9d76b25dd96e2bf7a635071,2024-06-25T03:15:09.737000 CVE-2023-50380,0,0,b5737d428cd7d3280b11a55da8c282450fdebb25171b34cbfbfc4de989e3a9f5,2024-02-28T14:06:45.783000 CVE-2023-50386,0,0,eb9175c624998374fffbb8bbdcfbc3fcd759c84a0c5cafd0e6294c2d31318a7f,2024-02-15T18:40:48.837000 CVE-2023-50387,0,0,86a696af4d06d31d7c5b6089ba1f856732aed20b18c54efa9645210962ecc2d6,2024-06-10T17:16:15.963000 @@ -239657,6 +239658,7 @@ CVE-2023-6193,0,0,b9900119542cd00ca545fa465375df17aaa2236304c15239a12e8730d3c671 CVE-2023-6194,0,0,adca1836721719b5860e52cb41398c44be6db56a1fe0603258d70cab514c2618,2023-12-13T22:02:56.613000 CVE-2023-6196,0,0,f56d61f9e2bd859b9d4b61f6a34e06caffb31a0f56e7eb46b17c194be4b8ce85,2023-11-25T02:20:08.637000 CVE-2023-6197,0,0,c4382b52f534913e65ee4b1feb523e73025e33dfe7d74d8aade2f3fac6e8f295,2023-11-25T02:19:51.733000 +CVE-2023-6198,1,1,45eca860084b780ed70e6e788cc54b7b796a5da18d09c54d15468bff3626e3a9,2024-06-25T02:15:10.347000 CVE-2023-6199,0,0,12541221a80e0f3a78050b48fb01f9ad223a7ac2b781b75a0ff9d1a5e3de1cb1,2024-06-07T14:12:05.897000 CVE-2023-6200,0,0,6ad93b2827d0905ddada23ed9c26c8cd7cbada143bc86cea06b89b646e3f7634,2024-02-02T15:38:42.870000 CVE-2023-6201,0,0,e641a830aa857fff950829529f9d4b150c6030d683c3c3799f55892ea8553251,2023-12-05T07:15:11.860000 @@ -243795,6 +243797,7 @@ CVE-2024-22380,0,0,fbb17e03b7392116b029e62cf5fc227ae3083f2acc9171774ca51468933ea CVE-2024-22382,0,0,794bb38486bda8b27dc8f67ecedfc3d38e34616c9029ee0f738dfbf4c6312f15,2024-05-17T18:36:05.263000 CVE-2024-22383,0,0,810a6e86f28ef493260b232f9a886a5828bc2cb5687e22ad7a4e8bfc9a3765be,2024-03-05T13:41:01.900000 CVE-2024-22384,0,0,22d927b3eda23e776929f3eee7e12761fd0a5866a79fd2edf20febc4242f7c70,2024-05-17T18:36:05.263000 +CVE-2024-22385,1,1,9b2c87cd5fc67c9ea7c1c832da5530902c499d45e2ba44b469576122cc1019ca,2024-06-25T02:15:10.583000 CVE-2024-22386,0,0,9bb868760c88683007f1f54485a980666afe5aeeb8bc008d8d811fea3dbfe22d,2024-02-10T04:05:26.383000 CVE-2024-22388,0,0,c4d155a1650cf8d6f3af35aa33a3624b01d880288d632870cec483f12be1e88c,2024-02-14T20:59:09.660000 CVE-2024-22389,0,0,96781b551653662b24bed6c6167841567f0e5e4776b3fb44064036280367773a,2024-02-14T18:04:45.380000 @@ -244128,26 +244131,36 @@ CVE-2024-23119,0,0,dc7a02dfe6c2319112aa9c9c7ba24d29c0a54406c32b5bc7828bc06ecc1e5 CVE-2024-2312,0,0,b61108ae65321d61a758b0c732ce308a7e62bd5c3710897745a7af4ce6324077,2024-04-26T09:15:12.073000 CVE-2024-23120,0,0,0bde07239643990ce52a2b119406a2fe2b75980d605c54ab173fa281d186044a,2024-06-15T03:15:09.170000 CVE-2024-23121,0,0,63c89d44d13ff73da2a5ca3921fdf1d827a06f578facd9c0fce9fcd43ca51479,2024-06-15T04:15:12.550000 -CVE-2024-23122,0,1,60092102602996214ff712620897909baadba742aef72982d6f1adaf07705dbc,2024-06-25T01:15:49.807000 -CVE-2024-23123,0,1,7fa00e67eeec1cb2a8afde0ed3fcaf14a3ea1af0c35140e30c666a9385075c59,2024-06-25T01:15:49.923000 +CVE-2024-23122,0,0,60092102602996214ff712620897909baadba742aef72982d6f1adaf07705dbc,2024-06-25T01:15:49.807000 +CVE-2024-23123,0,0,7fa00e67eeec1cb2a8afde0ed3fcaf14a3ea1af0c35140e30c666a9385075c59,2024-06-25T01:15:49.923000 CVE-2024-23124,0,0,310e8c4cd574e0a0147b3ffefdbfe36a36709549adc5926c84549e0d2e3d6fc7,2024-03-13T15:15:50.783000 CVE-2024-23125,0,0,f0886c546f6144b586ec7d77c24ce27baa331af9d054edd3d089f488c8104eca,2024-02-22T19:07:27.197000 CVE-2024-23126,0,0,e927ab071d122c627451a22694d4cf2dac082404401648a3f86014242e68a50a,2024-03-18T00:15:06.947000 -CVE-2024-23127,0,1,a277049adf2a4c55c0070915e4c776496275a527a0c8359aab0fe639c6b68297,2024-06-25T01:15:49.990000 -CVE-2024-23128,0,1,613c777689be49b17e508c7025b66a802f8cc9a24fa089fab3f23219d47c2f2c,2024-06-25T01:15:50.063000 -CVE-2024-23129,0,1,36c375ef01e43df755a3ca3cbb6f28ca0e1cdceeeaf16b4115bf46d1edb99480,2024-06-25T01:15:50.137000 +CVE-2024-23127,0,0,a277049adf2a4c55c0070915e4c776496275a527a0c8359aab0fe639c6b68297,2024-06-25T01:15:49.990000 +CVE-2024-23128,0,0,613c777689be49b17e508c7025b66a802f8cc9a24fa089fab3f23219d47c2f2c,2024-06-25T01:15:50.063000 +CVE-2024-23129,0,0,36c375ef01e43df755a3ca3cbb6f28ca0e1cdceeeaf16b4115bf46d1edb99480,2024-06-25T01:15:50.137000 CVE-2024-2313,0,0,fbc50aedf7351262416b6c5ccc0b90b77cb5c1e03078e87fd29f82257bb6f296,2024-03-11T01:32:29.610000 -CVE-2024-23130,0,1,89b2c036b2646421f53f48c7761fbb714aefb2ba6f8a32aee42be62c78ce3b21,2024-06-25T01:15:50.197000 -CVE-2024-23131,0,0,c427ee94f7c61adaf0716529d63f7a538f863e445e4db249885a3e64e551be88,2024-03-18T00:15:07.247000 +CVE-2024-23130,0,0,89b2c036b2646421f53f48c7761fbb714aefb2ba6f8a32aee42be62c78ce3b21,2024-06-25T01:15:50.197000 +CVE-2024-23131,0,1,4f1ec7c1278992eabe64d7f82d23c1ae51a8719fda4178c8fed2c3acca0c0af3,2024-06-25T02:15:10.807000 CVE-2024-23132,0,0,f22a2bdc1f997a36d13f6c22afab4983451c9373205a8ec6621cdd27061b8266,2024-03-18T00:15:07.297000 CVE-2024-23133,0,0,e86482bc439e59c6d3cf72bc6bb19d1a229eba94c9abdd88aed6d4ca00d35e18,2024-03-18T00:15:07.340000 CVE-2024-23134,0,0,7bcfdd789809a85dcb3d8c1b9ffa0666d172be0747695b354e86aa69e00d8a04,2024-06-17T17:15:51.443000 CVE-2024-23135,0,0,4ba3ef7d8b86192f3be9f608d250b59255f9c0272b793b5a67accf11746a7c49,2024-03-18T00:15:07.437000 CVE-2024-23136,0,0,2b90dcbe6397ed8c7559581d051fafe64c4814ea200ea96c2ab2b35870ef1cba,2024-03-18T00:15:07.490000 -CVE-2024-23137,0,0,b73ac1a3962b6dd849e09860e5fbdd306ad601f2f1d6396ea6c594ab1cd8349c,2024-03-18T00:15:07.537000 +CVE-2024-23137,0,1,a3dfbd98c2dc1ba45435d76ef85744b5c19037c4a2624aa7d2b0ff334bf9c28b,2024-06-25T02:15:10.873000 CVE-2024-23138,0,0,6b090492cd013e3e650e24e59443f58d52996df0034c406247881d7acc03e3d0,2024-03-18T01:13:31.203000 CVE-2024-23139,0,0,3d593be31839f5d86966b7965df31cd04e51b507bda09669a8893d4214cfafec,2024-03-18T01:13:31.203000 CVE-2024-2314,0,0,ed96f7e1946840e93c2198da1169aca1bfa11c5d8065acfea02e9fe912a3e6df,2024-03-11T01:32:29.610000 +CVE-2024-23140,1,1,c8f7ad257e64b2a7face122972611fe849abbe2a9c1d4a17a82a22adc78fc625,2024-06-25T02:15:10.940000 +CVE-2024-23141,1,1,7495c93b42553a9204f416fa7d692104daa1ba1b322b4fbac4ac983cb9d94b77,2024-06-25T02:15:11.030000 +CVE-2024-23142,1,1,bf8e814d02f7af8faf6ba4fc737fd10940ffd6e1ec4548262b96ec3908bb5715,2024-06-25T02:15:11.123000 +CVE-2024-23143,1,1,8466a5985c56481c8a05d04f0a81b4e8393edc2de9229f056f02360a344eb72c,2024-06-25T02:15:11.203000 +CVE-2024-23144,1,1,8a365e276c0bf3b25799cd6f306dac7f423c9d0d7be7d3c6806b8a1da693a624,2024-06-25T02:15:11.293000 +CVE-2024-23145,1,1,877788e1dac7df0897ddc85c5486f58d6a880830db4618461185460ded6bd4c4,2024-06-25T03:15:10 +CVE-2024-23146,1,1,3a09c6dd2b0592a4522a558664d4ddd3d5abee3172cdf114c21bcd397d0aa18f,2024-06-25T03:15:10.093000 +CVE-2024-23147,1,1,027d397c4e37fb2753404d1cca3c84693566870866d0300d85bf2d92d3d12128,2024-06-25T03:15:10.190000 +CVE-2024-23148,1,1,a45b4c3cc87018bdde3e8028824dfa959326e289ab5c2e92d7dd6f5b650f0cc3,2024-06-25T03:15:10.283000 +CVE-2024-23149,1,1,3aab941677d4372e3d7d536b8fd65f98ba8725f54e8745162dae237c722f2093,2024-06-25T03:15:10.370000 CVE-2024-2316,0,0,b19568c74ff3303e21c6f779d3f7251e97a598ce30370572128b37d7e3b8336b,2024-05-17T02:38:09.927000 CVE-2024-2317,0,0,a696c117ae514f4e733f3f16d6619ea5748142dccfe9e4a63d423b5b3c8772c3,2024-05-17T02:38:10.027000 CVE-2024-23170,0,0,13146081a2acee1dfc9938d9131a35ea909e72090f99ea62e52485862035b1b1,2024-02-22T03:15:08.297000 @@ -252971,6 +252984,9 @@ CVE-2024-36979,0,0,b5c86fe1e151f03cc7911f2db726f75e908559d8b3402d6614d6fdbd11ceb CVE-2024-3698,0,0,13b4029eb6179dbe788598788e16556a1995d850ddfc4af1ee0c4e86961a3a21,2024-05-17T02:40:04.800000 CVE-2024-3699,0,0,6e64dedcb1ec83e842b9c3ed18b374381a62ef4f7982a43d9405eeb95e55d0fc,2024-06-12T17:53:09.130000 CVE-2024-3700,0,0,f1913b84964a9a87ca4f78bbad55a262819a35385e2c066c91eaa7c4a1891262,2024-06-12T17:51:52.710000 +CVE-2024-37000,1,1,7e81dddc8ce31ffcfab2213be2607016266ce5c43f9de4614465f92323a28ad3,2024-06-25T03:15:10.463000 +CVE-2024-37001,1,1,932e4a881cd0ccddbe0000d0d999146cd4b1ff5fa64d96f3ae5fd7f2865d89d4,2024-06-25T03:15:10.553000 +CVE-2024-37002,1,1,5b29caaf49fecaa210a784b838f48f14a80a72843161a1e528a558d70bfe388c,2024-06-25T03:15:10.647000 CVE-2024-3701,0,0,d78f52a76181001272debccb095fb5971bb478ebc111313d9ff2994f4ec0598f,2024-04-15T13:15:31.997000 CVE-2024-37014,0,0,c47c2b09802b94267a83a7981860e8f6f71032b8440b3dd55d1a2f768ec7199d,2024-06-12T17:57:01.660000 CVE-2024-37017,0,0,fd4284c5a2195342d9622b5d20527d4d58db85192e227730c5a741287dc835e4,2024-05-31T13:01:46.727000 @@ -255058,3 +255074,5 @@ CVE-2024-6290,0,0,5d4b92359b64e77ba61c2c2fb8b337777d12a0124ea317fc382effce72051e CVE-2024-6291,0,0,b46430ebcd111d47076f0660eeac0e8e5ae17e44995f6e1aa566b78d007a4df6,2024-06-24T22:15:10.577000 CVE-2024-6292,0,0,8b4b29d9fd8b6deb605531b3c158c1db86c8e941502e889b33cb0f8943cb5102,2024-06-24T22:15:10.660000 CVE-2024-6293,0,0,eeaffba53fb5f9eeff42362f9e68ced969d50fc1ed573bd27cb47a275de983a8,2024-06-24T22:15:10.740000 +CVE-2024-6294,1,1,3041bcbf3b0b5ad6bbf3a9834cf50b133cb108f81018300675ffbfbc44672946,2024-06-25T02:15:11.657000 +CVE-2024-6295,1,1,1fff3f0ba280af9323e3d1eb1c5da3207fda9e71741085aa72d53fdeb44054eb,2024-06-25T03:15:10.740000