From 4710913ce343714e2918e78eaef697e01f0333ad Mon Sep 17 00:00:00 2001 From: cad-safe-bot Date: Thu, 27 Jun 2024 02:03:11 +0000 Subject: [PATCH] Auto-Update: 2024-06-27T02:00:19.251168+00:00 --- CVE-2020/CVE-2020-139xx/CVE-2020-13965.json | 6 ++- CVE-2022/CVE-2022-248xx/CVE-2022-24816.json | 6 ++- CVE-2022/CVE-2022-25xx/CVE-2022-2586.json | 6 ++- CVE-2024/CVE-2024-14xx/CVE-2024-1493.json | 59 +++++++++++++++++++++ CVE-2024/CVE-2024-18xx/CVE-2024-1816.json | 59 +++++++++++++++++++++ CVE-2024/CVE-2024-21xx/CVE-2024-2191.json | 59 +++++++++++++++++++++ CVE-2024/CVE-2024-31xx/CVE-2024-3115.json | 59 +++++++++++++++++++++ CVE-2024/CVE-2024-39xx/CVE-2024-3959.json | 59 +++++++++++++++++++++ CVE-2024/CVE-2024-40xx/CVE-2024-4011.json | 59 +++++++++++++++++++++ CVE-2024/CVE-2024-45xx/CVE-2024-4557.json | 59 +++++++++++++++++++++ CVE-2024/CVE-2024-49xx/CVE-2024-4901.json | 59 +++++++++++++++++++++ CVE-2024/CVE-2024-54xx/CVE-2024-5430.json | 59 +++++++++++++++++++++ CVE-2024/CVE-2024-56xx/CVE-2024-5655.json | 59 +++++++++++++++++++++ CVE-2024/CVE-2024-63xx/CVE-2024-6323.json | 55 +++++++++++++++++++ CVE-2024/CVE-2024-63xx/CVE-2024-6344.json | 2 +- README.md | 34 +++++++----- _state.csv | 33 ++++++++---- 17 files changed, 704 insertions(+), 28 deletions(-) create mode 100644 CVE-2024/CVE-2024-14xx/CVE-2024-1493.json create mode 100644 CVE-2024/CVE-2024-18xx/CVE-2024-1816.json create mode 100644 CVE-2024/CVE-2024-21xx/CVE-2024-2191.json create mode 100644 CVE-2024/CVE-2024-31xx/CVE-2024-3115.json create mode 100644 CVE-2024/CVE-2024-39xx/CVE-2024-3959.json create mode 100644 CVE-2024/CVE-2024-40xx/CVE-2024-4011.json create mode 100644 CVE-2024/CVE-2024-45xx/CVE-2024-4557.json create mode 100644 CVE-2024/CVE-2024-49xx/CVE-2024-4901.json create mode 100644 CVE-2024/CVE-2024-54xx/CVE-2024-5430.json create mode 100644 CVE-2024/CVE-2024-56xx/CVE-2024-5655.json create mode 100644 CVE-2024/CVE-2024-63xx/CVE-2024-6323.json diff --git a/CVE-2020/CVE-2020-139xx/CVE-2020-13965.json b/CVE-2020/CVE-2020-139xx/CVE-2020-13965.json index 2030d988cdb..66ba802e8ab 100644 --- a/CVE-2020/CVE-2020-139xx/CVE-2020-13965.json +++ b/CVE-2020/CVE-2020-139xx/CVE-2020-13965.json @@ -2,8 +2,12 @@ "id": "CVE-2020-13965", "sourceIdentifier": "cve@mitre.org", "published": "2020-06-09T03:15:11.250", - "lastModified": "2023-11-07T03:17:04.467", + "lastModified": "2024-06-27T01:00:01.260", "vulnStatus": "Modified", + "cisaExploitAdd": "2024-06-26", + "cisaActionDue": "2024-07-17", + "cisaRequiredAction": "Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.", + "cisaVulnerabilityName": "Roundcube Webmail Cross-Site Scripting (XSS) Vulnerability", "descriptions": [ { "lang": "en", diff --git a/CVE-2022/CVE-2022-248xx/CVE-2022-24816.json b/CVE-2022/CVE-2022-248xx/CVE-2022-24816.json index 6ad526f6859..b9b204c5b48 100644 --- a/CVE-2022/CVE-2022-248xx/CVE-2022-24816.json +++ b/CVE-2022/CVE-2022-248xx/CVE-2022-24816.json @@ -2,8 +2,12 @@ "id": "CVE-2022-24816", "sourceIdentifier": "security-advisories@github.com", "published": "2022-04-13T21:15:07.683", - "lastModified": "2023-02-16T19:08:35.947", + "lastModified": "2024-06-27T01:00:01.260", "vulnStatus": "Analyzed", + "cisaExploitAdd": "2024-06-26", + "cisaActionDue": "2024-07-17", + "cisaRequiredAction": "Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.", + "cisaVulnerabilityName": "GeoSolutionsGroup JAI-EXT Code Injection Vulnerability", "descriptions": [ { "lang": "en", diff --git a/CVE-2022/CVE-2022-25xx/CVE-2022-2586.json b/CVE-2022/CVE-2022-25xx/CVE-2022-2586.json index 5b3ffb403a8..e3d7d82f6cd 100644 --- a/CVE-2022/CVE-2022-25xx/CVE-2022-2586.json +++ b/CVE-2022/CVE-2022-25xx/CVE-2022-2586.json @@ -2,8 +2,12 @@ "id": "CVE-2022-2586", "sourceIdentifier": "security@ubuntu.com", "published": "2024-01-08T18:15:44.620", - "lastModified": "2024-01-12T16:21:26.710", + "lastModified": "2024-06-27T01:00:01.260", "vulnStatus": "Analyzed", + "cisaExploitAdd": "2024-06-26", + "cisaActionDue": "2024-07-17", + "cisaRequiredAction": "Apply updates per vendor instructions or discontinue use of the product if updates are unavailable.", + "cisaVulnerabilityName": "Linux Kernel Use-After-Free Vulnerability", "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-14xx/CVE-2024-1493.json b/CVE-2024/CVE-2024-14xx/CVE-2024-1493.json new file mode 100644 index 00000000000..8e620d6f4f4 --- /dev/null +++ b/CVE-2024/CVE-2024-14xx/CVE-2024-1493.json @@ -0,0 +1,59 @@ +{ + "id": "CVE-2024-1493", + "sourceIdentifier": "cve@gitlab.com", + "published": "2024-06-27T00:15:10.283", + "lastModified": "2024-06-27T00:15:10.283", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "An issue was discovered in GitLab CE/EE affecting all versions starting from 9.2 prior to 16.11.5, starting from 17.0 prior to 17.0.3, and starting from 17.1 prior to 17.1.1, with the processing logic for generating link in dependency files can lead to a regular expression DoS attack on the server" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "cve@gitlab.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 6.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "cve@gitlab.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-400" + } + ] + } + ], + "references": [ + { + "url": "https://gitlab.com/gitlab-org/gitlab/-/issues/441806", + "source": "cve@gitlab.com" + }, + { + "url": "https://hackerone.com/reports/2370084", + "source": "cve@gitlab.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-18xx/CVE-2024-1816.json b/CVE-2024/CVE-2024-18xx/CVE-2024-1816.json new file mode 100644 index 00000000000..b44cb00e5dd --- /dev/null +++ b/CVE-2024/CVE-2024-18xx/CVE-2024-1816.json @@ -0,0 +1,59 @@ +{ + "id": "CVE-2024-1816", + "sourceIdentifier": "cve@gitlab.com", + "published": "2024-06-27T00:15:10.523", + "lastModified": "2024-06-27T00:15:10.523", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "An issue was discovered in GitLab CE/EE affecting all versions starting from 12.0 prior to 16.11.5, starting from 17.0 prior to 17.0.3, and starting from 17.1 prior to 17.1.1, which allows for an attacker to cause a denial of service using a crafted OpenAPI file." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "cve@gitlab.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 5.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.6, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "cve@gitlab.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-400" + } + ] + } + ], + "references": [ + { + "url": "https://gitlab.com/gitlab-org/gitlab/-/issues/442852", + "source": "cve@gitlab.com" + }, + { + "url": "https://hackerone.com/reports/2370737", + "source": "cve@gitlab.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-21xx/CVE-2024-2191.json b/CVE-2024/CVE-2024-21xx/CVE-2024-2191.json new file mode 100644 index 00000000000..b90a9b09e35 --- /dev/null +++ b/CVE-2024/CVE-2024-21xx/CVE-2024-2191.json @@ -0,0 +1,59 @@ +{ + "id": "CVE-2024-2191", + "sourceIdentifier": "cve@gitlab.com", + "published": "2024-06-27T00:15:10.790", + "lastModified": "2024-06-27T00:15:10.790", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "An issue was discovered in GitLab CE/EE affecting all versions starting from 16.9 prior to 16.11.5, starting from 17.0 prior to 17.0.3, and starting from 17.1 prior to 17.1.1, which allows merge request title to be visible publicly despite being set as project members only." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "cve@gitlab.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 5.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "cve@gitlab.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-284" + } + ] + } + ], + "references": [ + { + "url": "https://gitlab.com/gitlab-org/gitlab/-/issues/444655", + "source": "cve@gitlab.com" + }, + { + "url": "https://hackerone.com/reports/2357370", + "source": "cve@gitlab.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-31xx/CVE-2024-3115.json b/CVE-2024/CVE-2024-31xx/CVE-2024-3115.json new file mode 100644 index 00000000000..c97cd105c0c --- /dev/null +++ b/CVE-2024/CVE-2024-31xx/CVE-2024-3115.json @@ -0,0 +1,59 @@ +{ + "id": "CVE-2024-3115", + "sourceIdentifier": "cve@gitlab.com", + "published": "2024-06-27T00:15:11.190", + "lastModified": "2024-06-27T00:15:11.190", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "An issue was discovered in GitLab EE affecting all versions starting from 16.0 prior to 16.11.5, starting from 17.0 prior to 17.0.3, and starting from 17.1 prior to 17.1.1, which allows an attacker to access issues and epics without having an SSO session using Duo Chat." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "cve@gitlab.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 4.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "cve@gitlab.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-200" + } + ] + } + ], + "references": [ + { + "url": "https://gitlab.com/gitlab-org/gitlab/-/issues/452548", + "source": "cve@gitlab.com" + }, + { + "url": "https://hackerone.com/reports/2417868", + "source": "cve@gitlab.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-39xx/CVE-2024-3959.json b/CVE-2024/CVE-2024-39xx/CVE-2024-3959.json new file mode 100644 index 00000000000..408ba155fa9 --- /dev/null +++ b/CVE-2024/CVE-2024-39xx/CVE-2024-3959.json @@ -0,0 +1,59 @@ +{ + "id": "CVE-2024-3959", + "sourceIdentifier": "cve@gitlab.com", + "published": "2024-06-27T00:15:11.420", + "lastModified": "2024-06-27T00:15:11.420", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "An issue was discovered in GitLab CE/EE affecting all versions starting from 16.7 prior to 16.11.5, starting from 17.0 prior to 17.0.3, and starting from 17.1 prior to 17.1.1, which allows private job artifacts can be accessed by any user." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "cve@gitlab.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 6.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "cve@gitlab.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-285" + } + ] + } + ], + "references": [ + { + "url": "https://gitlab.com/gitlab-org/gitlab/-/issues/456989", + "source": "cve@gitlab.com" + }, + { + "url": "https://hackerone.com/reports/2456845", + "source": "cve@gitlab.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-40xx/CVE-2024-4011.json b/CVE-2024/CVE-2024-40xx/CVE-2024-4011.json new file mode 100644 index 00000000000..7b805afd4e4 --- /dev/null +++ b/CVE-2024/CVE-2024-40xx/CVE-2024-4011.json @@ -0,0 +1,59 @@ +{ + "id": "CVE-2024-4011", + "sourceIdentifier": "cve@gitlab.com", + "published": "2024-06-27T00:15:11.643", + "lastModified": "2024-06-27T00:15:11.643", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "An issue was discovered in GitLab CE/EE affecting all versions starting from 16.1 prior to 16.11.5, starting from 17.0 prior to 17.0.3, and starting from 17.1 prior to 17.1.1, which allows non-project member to promote key results to objectives." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "cve@gitlab.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 3.1, + "baseSeverity": "LOW" + }, + "exploitabilityScore": 1.6, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "cve@gitlab.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-284" + } + ] + } + ], + "references": [ + { + "url": "https://gitlab.com/gitlab-org/gitlab/-/issues/457235", + "source": "cve@gitlab.com" + }, + { + "url": "https://hackerone.com/reports/2456186", + "source": "cve@gitlab.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-45xx/CVE-2024-4557.json b/CVE-2024/CVE-2024-45xx/CVE-2024-4557.json new file mode 100644 index 00000000000..cd2d63ee6de --- /dev/null +++ b/CVE-2024/CVE-2024-45xx/CVE-2024-4557.json @@ -0,0 +1,59 @@ +{ + "id": "CVE-2024-4557", + "sourceIdentifier": "cve@gitlab.com", + "published": "2024-06-27T00:15:11.863", + "lastModified": "2024-06-27T00:15:11.863", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Multiple Denial of Service (DoS) conditions has been discovered in GitLab CE/EE affecting all versions starting from 1.0 prior to 16.11.5, starting from 17.0 prior to 17.0.3, and starting from 17.1 prior to 17.1.1 which allowed an attacker to cause resource exhaustion via banzai pipeline." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "cve@gitlab.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 6.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "cve@gitlab.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-400" + } + ] + } + ], + "references": [ + { + "url": "https://gitlab.com/gitlab-org/gitlab/-/issues/460517", + "source": "cve@gitlab.com" + }, + { + "url": "https://hackerone.com/reports/2485172", + "source": "cve@gitlab.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-49xx/CVE-2024-4901.json b/CVE-2024/CVE-2024-49xx/CVE-2024-4901.json new file mode 100644 index 00000000000..430b4981fad --- /dev/null +++ b/CVE-2024/CVE-2024-49xx/CVE-2024-4901.json @@ -0,0 +1,59 @@ +{ + "id": "CVE-2024-4901", + "sourceIdentifier": "cve@gitlab.com", + "published": "2024-06-27T00:15:12.263", + "lastModified": "2024-06-27T00:15:12.263", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "An issue was discovered in GitLab CE/EE affecting all versions starting from 16.9 prior to 16.11.5, starting from 17.0 prior to 17.0.3, and starting from 17.1 prior to 17.1.1, where a stored XSS vulnerability could be imported from a project with malicious commit notes." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "cve@gitlab.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 8.7, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.3, + "impactScore": 5.8 + } + ] + }, + "weaknesses": [ + { + "source": "cve@gitlab.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://gitlab.com/gitlab-org/gitlab/-/issues/461773", + "source": "cve@gitlab.com" + }, + { + "url": "https://hackerone.com/reports/2500163", + "source": "cve@gitlab.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-54xx/CVE-2024-5430.json b/CVE-2024/CVE-2024-54xx/CVE-2024-5430.json new file mode 100644 index 00000000000..c9d53fa8af7 --- /dev/null +++ b/CVE-2024/CVE-2024-54xx/CVE-2024-5430.json @@ -0,0 +1,59 @@ +{ + "id": "CVE-2024-5430", + "sourceIdentifier": "cve@gitlab.com", + "published": "2024-06-27T00:15:12.650", + "lastModified": "2024-06-27T00:15:12.650", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "An issue was discovered in GitLab CE/EE affecting all versions starting from 16.10 prior to 16.11.5, starting from 17.0 prior to 17.0.3, and starting from 17.1 prior to 17.1.1, which allows a project maintainer can delete the merge request approval policy via graphQL." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "cve@gitlab.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:N/I:H/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 6.8, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.3, + "impactScore": 4.0 + } + ] + }, + "weaknesses": [ + { + "source": "cve@gitlab.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-284" + } + ] + } + ], + "references": [ + { + "url": "https://gitlab.com/gitlab-org/gitlab/-/issues/464017", + "source": "cve@gitlab.com" + }, + { + "url": "https://hackerone.com/reports/2520947", + "source": "cve@gitlab.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-56xx/CVE-2024-5655.json b/CVE-2024/CVE-2024-56xx/CVE-2024-5655.json new file mode 100644 index 00000000000..1f87d78568b --- /dev/null +++ b/CVE-2024/CVE-2024-56xx/CVE-2024-5655.json @@ -0,0 +1,59 @@ +{ + "id": "CVE-2024-5655", + "sourceIdentifier": "cve@gitlab.com", + "published": "2024-06-27T00:15:12.887", + "lastModified": "2024-06-27T00:15:12.887", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "An issue was discovered in GitLab CE/EE affecting all versions starting from 15.8 prior to 16.11.5, starting from 17.0 prior to 17.0.3, and starting from 17.1 prior to 17.1.1, which allows an attacker to trigger a pipeline as another user under certain circumstances." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "cve@gitlab.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 9.6, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.1, + "impactScore": 5.8 + } + ] + }, + "weaknesses": [ + { + "source": "cve@gitlab.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-284" + } + ] + } + ], + "references": [ + { + "url": "https://gitlab.com/gitlab-org/gitlab/-/issues/465862", + "source": "cve@gitlab.com" + }, + { + "url": "https://hackerone.com/reports/2536320", + "source": "cve@gitlab.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-63xx/CVE-2024-6323.json b/CVE-2024/CVE-2024-63xx/CVE-2024-6323.json new file mode 100644 index 00000000000..69fbcc036ce --- /dev/null +++ b/CVE-2024/CVE-2024-63xx/CVE-2024-6323.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2024-6323", + "sourceIdentifier": "cve@gitlab.com", + "published": "2024-06-27T00:15:13.130", + "lastModified": "2024-06-27T00:15:13.130", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Improper authorization in global search in GitLab EE affecting all versions from 16.11 prior to 16.11.5 and 17.0 prior to 17.0.3 and 17.1 prior to 17.1.1 allows an attacker leak content of a private repository in a public project." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "cve@gitlab.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "cve@gitlab.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-653" + } + ] + } + ], + "references": [ + { + "url": "https://gitlab.com/gitlab-org/gitlab/-/issues/457912", + "source": "cve@gitlab.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-63xx/CVE-2024-6344.json b/CVE-2024/CVE-2024-63xx/CVE-2024-6344.json index eec0f1276c2..e6e1964b6ea 100644 --- a/CVE-2024/CVE-2024-63xx/CVE-2024-6344.json +++ b/CVE-2024/CVE-2024-63xx/CVE-2024-6344.json @@ -2,7 +2,7 @@ "id": "CVE-2024-6344", "sourceIdentifier": "cna@vuldb.com", "published": "2024-06-26T11:15:52.073", - "lastModified": "2024-06-26T12:44:29.693", + "lastModified": "2024-06-27T00:15:13.360", "vulnStatus": "Awaiting Analysis", "descriptions": [ { diff --git a/README.md b/README.md index b316206004c..b61662fce4d 100644 --- a/README.md +++ b/README.md @@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2024-06-26T23:55:17.875424+00:00 +2024-06-27T02:00:19.251168+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2024-06-26T23:15:19.800000+00:00 +2024-06-27T01:00:01.260000+00:00 ``` ### Last Data Feed Release @@ -27,32 +27,40 @@ Repository synchronizes with the NVD every 2 hours. Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/releases/latest) ```plain -2024-06-26T00:00:08.662795+00:00 +2024-06-27T00:00:08.641951+00:00 ``` ### Total Number of included CVEs ```plain -255278 +255289 ``` ### CVEs added in the last Commit -Recently added CVEs: `7` +Recently added CVEs: `11` -- [CVE-2024-28982](CVE-2024/CVE-2024-289xx/CVE-2024-28982.json) (`2024-06-26T23:15:19.287`) -- [CVE-2024-28983](CVE-2024/CVE-2024-289xx/CVE-2024-28983.json) (`2024-06-26T23:15:19.597`) -- [CVE-2024-28984](CVE-2024/CVE-2024-289xx/CVE-2024-28984.json) (`2024-06-26T23:15:19.800`) -- [CVE-2024-37247](CVE-2024/CVE-2024-372xx/CVE-2024-37247.json) (`2024-06-26T22:15:10.000`) -- [CVE-2024-37248](CVE-2024/CVE-2024-372xx/CVE-2024-37248.json) (`2024-06-26T22:15:10.223`) -- [CVE-2024-37571](CVE-2024/CVE-2024-375xx/CVE-2024-37571.json) (`2024-06-26T22:15:10.450`) -- [CVE-2024-37734](CVE-2024/CVE-2024-377xx/CVE-2024-37734.json) (`2024-06-26T22:15:10.533`) +- [CVE-2024-1493](CVE-2024/CVE-2024-14xx/CVE-2024-1493.json) (`2024-06-27T00:15:10.283`) +- [CVE-2024-1816](CVE-2024/CVE-2024-18xx/CVE-2024-1816.json) (`2024-06-27T00:15:10.523`) +- [CVE-2024-2191](CVE-2024/CVE-2024-21xx/CVE-2024-2191.json) (`2024-06-27T00:15:10.790`) +- [CVE-2024-3115](CVE-2024/CVE-2024-31xx/CVE-2024-3115.json) (`2024-06-27T00:15:11.190`) +- [CVE-2024-3959](CVE-2024/CVE-2024-39xx/CVE-2024-3959.json) (`2024-06-27T00:15:11.420`) +- [CVE-2024-4011](CVE-2024/CVE-2024-40xx/CVE-2024-4011.json) (`2024-06-27T00:15:11.643`) +- [CVE-2024-4557](CVE-2024/CVE-2024-45xx/CVE-2024-4557.json) (`2024-06-27T00:15:11.863`) +- [CVE-2024-4901](CVE-2024/CVE-2024-49xx/CVE-2024-4901.json) (`2024-06-27T00:15:12.263`) +- [CVE-2024-5430](CVE-2024/CVE-2024-54xx/CVE-2024-5430.json) (`2024-06-27T00:15:12.650`) +- [CVE-2024-5655](CVE-2024/CVE-2024-56xx/CVE-2024-5655.json) (`2024-06-27T00:15:12.887`) +- [CVE-2024-6323](CVE-2024/CVE-2024-63xx/CVE-2024-6323.json) (`2024-06-27T00:15:13.130`) ### CVEs modified in the last Commit -Recently modified CVEs: `0` +Recently modified CVEs: `4` +- [CVE-2020-13965](CVE-2020/CVE-2020-139xx/CVE-2020-13965.json) (`2024-06-27T01:00:01.260`) +- [CVE-2022-24816](CVE-2022/CVE-2022-248xx/CVE-2022-24816.json) (`2024-06-27T01:00:01.260`) +- [CVE-2022-2586](CVE-2022/CVE-2022-25xx/CVE-2022-2586.json) (`2024-06-27T01:00:01.260`) +- [CVE-2024-6344](CVE-2024/CVE-2024-63xx/CVE-2024-6344.json) (`2024-06-27T00:15:13.360`) ## Download and Usage diff --git a/_state.csv b/_state.csv index 29774507435..92e975623b4 100644 --- a/_state.csv +++ b/_state.csv @@ -148741,7 +148741,7 @@ CVE-2020-13961,0,0,1fe463453099b23513150647de34a505435c3e49bfb1bd37008a666a6fd18 CVE-2020-13962,0,0,73efb252eadcc56a142d208d0445dc25a58d319b90a52e53e0c7ef8825dcf6b3,2023-11-07T03:17:04.313000 CVE-2020-13963,0,0,5a2208f871acab2397f31e74f10b59d9b44e43f17a6c3a1b3c64f29aa547891c,2022-11-05T02:04:33.607000 CVE-2020-13964,0,0,4164273b77e227c4c8f846f5383d7c8a507930d52d88ee08b556d2b4408e2e82,2023-11-07T03:17:04.400000 -CVE-2020-13965,0,0,977d24811079e80afc6db4a1ba194be5ce7759f031b22b9db7dd4b8bb50f31e8,2023-11-07T03:17:04.467000 +CVE-2020-13965,0,1,ea7699876a196ccf4eabb2c6537170d56966c6d66c99bab1ad9ae45581cfba34,2024-06-27T01:00:01.260000 CVE-2020-13968,0,0,31f2705e5110608578328547025f665cb791c3bf95647fd72cce63dd0efb9c76,2020-12-23T19:23:28.590000 CVE-2020-13969,0,0,ef7ada27dc8f94a96c31abd823098e38b638d6e725d18bf5b8b998ea32c4422f,2020-12-23T19:21:31.573000 CVE-2020-1397,0,0,e79ab87fef1aa5c692c9714693118d984c5317843a4a8b70d569e39bb4504ccc,2021-07-21T11:39:23.747000 @@ -193792,7 +193792,7 @@ CVE-2022-24812,0,0,ce008f94aa10997bc97e737f1581229f965621f271cc46721cdafe11260a1 CVE-2022-24813,0,0,21ba8ed56728391b9f4068642fe209902ce9d4668995613066f13664d2737d7c,2023-06-23T19:01:44.610000 CVE-2022-24814,0,0,c34269b3916e111edfece9930cd1dcecd024d367fe722288b09584af9d301a09,2022-04-12T09:32:46.507000 CVE-2022-24815,0,0,e6146cbd0495acf0ea87773ccf591074d71af7a634fde01c1f689ee043ed10c5,2022-04-19T17:34:41.830000 -CVE-2022-24816,0,0,391fda4a44f870e2b39268e1556d3627a5a74c4fc8384c68814fd868e7ac557c,2023-02-16T19:08:35.947000 +CVE-2022-24816,0,1,22407f64e0ad67908b13509712c5fc03d31b81b2225b25775f668e6e4a0f04ec,2024-06-27T01:00:01.260000 CVE-2022-24817,0,0,5c0c5c45813ea6d9f608d52968c0a40a7a526a447160224b62aec34fdea32535,2022-05-16T19:07:10.690000 CVE-2022-24818,0,0,9ac843ce1b2caadc3021e7ef5ee2cc200c22cc2ae89c33012a9b4ee118517641,2023-06-23T19:10:04.380000 CVE-2022-24819,0,0,2d4d291a72285b3b2dfb5c3a7b80b4adeca73083862020d2f3576c636e356ae1,2022-04-15T14:21:46.140000 @@ -194680,7 +194680,7 @@ CVE-2022-25855,0,0,56d19463dbc3e146d1994bbdf063d0858d63b634a17f60ae1c26014ec39d0 CVE-2022-25856,0,0,07f5ad3fb091bafe0bb4df4d564e59807dadbd3447c334e19c4d70e416433646,2023-08-08T14:21:49.707000 CVE-2022-25857,0,0,9de37fa5a541e6e6e55304f8c732e3976dc46c326424d33bff1dc7faed3d8df8,2024-03-15T11:15:07.750000 CVE-2022-25858,0,0,fe9f7aeb783b3bb633367010deb14b348155b3c3454f10b072ec54fab20b4c3d,2023-08-08T14:22:24.967000 -CVE-2022-2586,0,0,20643e91afc20570c916bb6f4219909d0ce99bb9aa7d8e4034056546f7bc44e8,2024-01-12T16:21:26.710000 +CVE-2022-2586,0,1,4873c76f72cabcc57d433ec15b0219fd6ba19a76d3da8a5823728b390d6012cf,2024-06-27T01:00:01.260000 CVE-2022-25860,0,0,7cc8aecf55d643d11a461f2461575fe6f2165d6ec5e1cb329d0bc452ff684856,2023-11-07T03:44:51.413000 CVE-2022-25862,0,0,fcb1188af140419d0300cfd89d71bb4b2670945a962ceb9b622edde4c7622489,2022-05-24T15:12:18.177000 CVE-2022-25863,0,0,4e8b9a01c94e8650103c7fdc293fd554bbda909c958e0e820c97a335b2eef85e,2022-06-17T18:40:18.720000 @@ -241893,6 +241893,7 @@ CVE-2024-1488,0,0,03e683b77c18e258ada6411156a13c686c4496eec0687a6c9cafd2107fba5d CVE-2024-1489,0,0,601abc5a034fbcf389e475f712bdb62e609e01342eb7a5cc6cdf4f20f6ce0143,2024-03-13T18:15:58.530000 CVE-2024-1491,0,0,5bd5c8d4823c76c59f53c9f7559e7fec7b518fd1a891195d4c1b847086d33147,2024-05-28T17:15:09.103000 CVE-2024-1492,0,0,ac491e1ac05085ffca5a01bc169673ef656902c869bec5c48f97ccc7785388e6,2024-02-29T13:49:29.390000 +CVE-2024-1493,1,1,ed503cc06ad939a1d9dbb6375b9daa56d6b2d30c68a9894a25193f62712566c4,2024-06-27T00:15:10.283000 CVE-2024-1495,0,0,fb62d81a04863e1feb1aaf54e194ce1d2be35e43a2717c4349592d976859a74a,2024-06-13T18:36:09.010000 CVE-2024-1496,0,0,cb4e1e2b66486c1532bf5fd9642c761fbe286057f303a98e25c71b95ed8fd1ee,2024-02-29T13:49:29.390000 CVE-2024-1497,0,0,84c0cad6cfa5eb0a51311cf784383979e7b18f97e3410e261be2597241b19a2b,2024-03-13T18:15:58.530000 @@ -242170,6 +242171,7 @@ CVE-2024-1812,0,0,1a6f9eeab96c73268af7052134c8cf1c44932ad69fbc301edf8d35b130e7f4 CVE-2024-1813,0,0,7221461b551b49805924c88f7a02ee625bae550432e647062e4543b6083025c7,2024-04-10T13:23:38.787000 CVE-2024-1814,0,0,0b1e2db7106be181c074b53f672647c26a1befc789f8a090beaccc8e7ce1a1ab,2024-05-24T01:15:30.977000 CVE-2024-1815,0,0,9977db768a350aa8d7588584513fe0dfb6e464418c1beb6188f5eecf3642f719,2024-05-24T01:15:30.977000 +CVE-2024-1816,1,1,c9ca140216970a839889bf1f648f550a96ab8fc5d68c8e2439834c69ab1e3f2f,2024-06-27T00:15:10.523000 CVE-2024-1817,0,0,d22678ba5046366220ff2f5ee22240282d315c7945fb2fd131031a18112a5a4a,2024-05-17T02:35:37.207000 CVE-2024-1818,0,0,160ee525d5ff48a751a727de0287a62c274d8c7c0090e0c76c9649776d3b8ac7,2024-05-17T02:35:37.310000 CVE-2024-1819,0,0,200100b2029b16af7aba6a64011b8f852960cff67c1c8b594d8a140448c1f883,2024-05-17T02:35:37.403000 @@ -243477,6 +243479,7 @@ CVE-2024-21905,0,0,adf99f19af2fd4f47febc9f1430872cfbd6f08389bdadd5f441acb45fc9c4 CVE-2024-21907,0,0,e97acedaa5fff8f35a2639917d8b0e8affd6b5d126dc549f4b2d35936c62833b,2024-01-17T15:24:07.360000 CVE-2024-21908,0,0,329abb805b48ea46c40d9625a0e5a18857ae42d6b89a82f5c3cf797095821263,2024-01-08T19:46:41.157000 CVE-2024-21909,0,0,1862a33cb8cb7c096543042cface003ed2658c185ec7603674a262510a57f13e,2024-02-08T02:15:40.883000 +CVE-2024-2191,1,1,8d9a95569a5fa799cfa236e5e6b2d19c45440bfa63ce92c49a633517743d1edb,2024-06-27T00:15:10.790000 CVE-2024-21910,0,0,43ca7fc1e52b2bce376dbad269237609f1115a9e3e85611002acd3d35f8eee88,2024-01-08T19:46:25.757000 CVE-2024-21911,0,0,30b0952621022b198f37c9fc7c47e2aaa3233be56e7cd5684ca7f588e4860d48,2024-01-08T19:46:14.513000 CVE-2024-21912,0,0,e55852665e09c5ab48cbae6c65a3f0dbff3703123b8a6aa762360ad6e81dcd4e,2024-03-26T17:09:53.043000 @@ -248068,9 +248071,9 @@ CVE-2024-28977,0,0,10444a4b4519bac5d968aeb163eaf3f249ecc5460e5b7c0067db957ce6a37 CVE-2024-28978,0,0,c1808ba5cc7d394021a34c4436b18922fdfd0f689f028622205841f891e3f4cf,2024-05-23T19:05:13.353000 CVE-2024-28979,0,0,1e8150fa51d059ee46f9ef1bfb23a0a517c44eb200b6531263fa54ebf9d48ec5,2024-05-23T19:05:51.923000 CVE-2024-2898,0,0,76a38588eeca70ecb25472849eb8998ee4d4f74eb5e3aa36fdb6d66de01eda42,2024-05-17T02:38:36.130000 -CVE-2024-28982,1,1,601804d1b7e1b4ed7885e7cf09bdfefb082dab0c0fd96f246e03d1c2e2012e1d,2024-06-26T23:15:19.287000 -CVE-2024-28983,1,1,4fbcf479ba5c237ec856893da16ba677568af179b571d3959c84a9f68c3f5066,2024-06-26T23:15:19.597000 -CVE-2024-28984,1,1,a41765e88d788d62f9df5822538642f7767edfb537e29409a710106dff33613d,2024-06-26T23:15:19.800000 +CVE-2024-28982,0,0,601804d1b7e1b4ed7885e7cf09bdfefb082dab0c0fd96f246e03d1c2e2012e1d,2024-06-26T23:15:19.287000 +CVE-2024-28983,0,0,4fbcf479ba5c237ec856893da16ba677568af179b571d3959c84a9f68c3f5066,2024-06-26T23:15:19.597000 +CVE-2024-28984,0,0,a41765e88d788d62f9df5822538642f7767edfb537e29409a710106dff33613d,2024-06-26T23:15:19.800000 CVE-2024-2899,0,0,4aa5ec01ca1d3b835467a231d9836714c4e4cef27dea7210f2a97d49ae8b91f5,2024-05-17T02:38:36.220000 CVE-2024-28995,0,0,7f6bfacc6577e5540c3ea3c9fa39d7440addd0797be30b15d88a9d1a10d16e9d,2024-06-11T17:47:22.867000 CVE-2024-28996,0,0,5733b25206f61033b9bade6885819d3353d454454ea3290c2e7bb4df83194bba,2024-06-06T16:23:24.377000 @@ -249515,6 +249518,7 @@ CVE-2024-31138,0,0,80619d8b23ffb923a4bb521ee1877f29e2a086a5161850672cdc2424af6c6 CVE-2024-31139,0,0,6254efb24474a93bf19fb224a952376f20b94666e671b313ffb9fb5d6ba4e123,2024-03-28T16:07:30.893000 CVE-2024-31140,0,0,8ac72cdd6b5f7f56e71e87459ff46ad8714fcc8b963def523c845a786f9f62ca,2024-03-28T16:07:30.893000 CVE-2024-31142,0,0,1e729ac327535cc35260a14a69a0b20eeb370b6701c117105871d2595322a9f3,2024-05-16T15:44:44.683000 +CVE-2024-3115,1,1,66272355aec891e166d1da44d334e8e97f1c422ac3867b7e081440eebd9562af,2024-06-27T00:15:11.190000 CVE-2024-31156,0,0,da4c4994c24daaccd314311728d10a4342bd95e8cf67e2b87207a10f13558958,2024-05-08T17:05:24.083000 CVE-2024-31159,0,0,8f2140422377394a9df40aab7654ea68717fd5b1399ff91747ee6c2dd96f3205,2024-06-17T12:42:04.623000 CVE-2024-3116,0,0,398207d2760952c7d30e8a692022e3a890986df7c49b38076f15d6ef6a9e4edb,2024-04-23T02:15:48.310000 @@ -253156,8 +253160,8 @@ CVE-2024-37230,0,0,c056784fe1461835022ae4387a349a1e9e9676537a6bd83c972fd23b96229 CVE-2024-37231,0,0,2975c060fd817766775d3e3ec5265250dfcb406eb3856b3f2d8635478d7fc4db,2024-06-24T19:26:47.037000 CVE-2024-37233,0,0,dcdb23af544a8046a4ecb68f34b48a3a15207d5a73bdc6182df1b28a0bb5e19c,2024-06-24T19:26:47.037000 CVE-2024-3724,0,0,a2f08bb0a2e36a5c374b862fb3e4beff315b3d6672953c5eeabe10290b435e2c,2024-05-02T18:00:37.360000 -CVE-2024-37247,1,1,39799302f14a72cae7273eb39cf8a4da93a251d9d3251b7915227c3a8addfb7c,2024-06-26T22:15:10 -CVE-2024-37248,1,1,a514882bf58b655d6f3adffbf4a2946682aefbe8602430af2556e89235c968c3,2024-06-26T22:15:10.223000 +CVE-2024-37247,0,0,39799302f14a72cae7273eb39cf8a4da93a251d9d3251b7915227c3a8addfb7c,2024-06-26T22:15:10 +CVE-2024-37248,0,0,a514882bf58b655d6f3adffbf4a2946682aefbe8602430af2556e89235c968c3,2024-06-26T22:15:10.223000 CVE-2024-3725,0,0,dd194c190207038aca40dcc17eaac7bd7c6f9f34e04d00c016e0de6cd9837da0,2024-05-02T18:00:37.360000 CVE-2024-37252,0,0,faf33ef7b8f72660b3f71af61d55db3b928cbbfdda8d6a6c03b3fcf0d979da09,2024-06-26T12:44:29.693000 CVE-2024-3726,0,0,5d13f10d5b73efb7ab7c6448eee56ee5b7f1a739226807fb6eef2a4ab850d2f7,2024-05-30T13:15:41.297000 @@ -253244,7 +253248,7 @@ CVE-2024-37568,0,0,e54134c743ff1c9089094584276cdc79416cb675a0fc4a7177e49bc6dbf3b CVE-2024-37569,0,0,748406cd7b0e731a2b9037b16c6d1dde7e8c81aa1003e1ce6c82275ceb288683,2024-06-12T16:32:56.203000 CVE-2024-3757,0,0,62301a2775fcbfb9e8b5b1aa90b79aa074cd639699f2863765d338333af4b798,2024-05-07T13:39:32.710000 CVE-2024-37570,0,0,a374041c2622c9ba66d2048315fc9e015af6a8717cce4f8beb5b59800398626a,2024-06-12T16:32:34.513000 -CVE-2024-37571,1,1,40ce128b41b9e1b1159c87948720a9755b00a31509a7fa89c376c163b75d3a6d,2024-06-26T22:15:10.450000 +CVE-2024-37571,0,0,40ce128b41b9e1b1159c87948720a9755b00a31509a7fa89c376c163b75d3a6d,2024-06-26T22:15:10.450000 CVE-2024-3758,0,0,3ea9ecbea279ca1eb1159e542db09b1cab2d2435be79c6a6a563dc4d73ca4285,2024-05-07T13:39:32.710000 CVE-2024-3759,0,0,20211226ea875c33805e71e9c0afa18c7ce1ad112702c8859afd48ee84347f62,2024-05-07T13:39:32.710000 CVE-2024-3761,0,0,c0af44e486388b5bef077e784125f415f33c54c3c3a8677d0ab80af1f3e8df6c,2024-05-20T13:00:04.957000 @@ -253302,7 +253306,7 @@ CVE-2024-3770,0,0,8954a3ad0db5fc9b48d9243a1de01e444d03084d0f8b5d5da9ebc562e8f0e6 CVE-2024-3771,0,0,1bf22922ed0657906343b6368a2362d22a78a1ff9d5272db064e582b3b0855d4,2024-05-17T02:40:07.477000 CVE-2024-3772,0,0,184d29c2faf230c27e7c42ad45c478e7862cbffdde795ec4220824e36861b510,2024-04-26T02:15:06.983000 CVE-2024-37732,0,0,c4e29c0f7175fe60ae396c5841d69538b22a36865a0b8a792362db7866454fcc,2024-06-26T17:49:36.837000 -CVE-2024-37734,1,1,14e40f6b7a0c3e90f8f320e0513e6c1e49b4c97e16cc04e3b13842f04dbbb369,2024-06-26T22:15:10.533000 +CVE-2024-37734,0,0,14e40f6b7a0c3e90f8f320e0513e6c1e49b4c97e16cc04e3b13842f04dbbb369,2024-06-26T22:15:10.533000 CVE-2024-3774,0,0,430454733381ff5a96eb00158d8d932d4c087496720223836bce2968611b5152,2024-04-15T13:15:31.997000 CVE-2024-37742,0,0,82d0f7bd796b50c91f2398edb7b6a7a5b24c344e32d17491fc5d315bfb23b371,2024-06-26T20:15:15.917000 CVE-2024-3775,0,0,a79253f4f0c7633f40fa5e33903553d0137ff03b4a2d8425a028bb5ddf1c6b0a,2024-04-15T13:15:31.997000 @@ -253727,6 +253731,7 @@ CVE-2024-3954,0,0,45f1b348fcace6f84e3157e2d0f8a54fc4228bb396d26e03c9556cd235947f CVE-2024-3955,0,0,bba90f25cff74c274e08a67a3936bf55505a38180fc074269167b54bd0903537,2024-05-02T13:27:25.103000 CVE-2024-3956,0,0,84c84e343f731479baad188521c68e2e10d428da5ee4bd61443cf640ccedc17a,2024-05-14T16:11:39.510000 CVE-2024-3957,0,0,6e4e327328ad5c18e880466a103b162c10591051d90490bf0a67f6889d728425,2024-05-02T18:00:37.360000 +CVE-2024-3959,1,1,80a9d69e211db946a79ce1293fee1a985ceb27e08a867b47f88832b6cabd73ee,2024-06-27T00:15:11.420000 CVE-2024-3961,0,0,6646adb167e87c94860ebd5d8d983b1f971f6dc9fb8c86a5eaff8de194f86033,2024-06-21T11:22:01.687000 CVE-2024-3962,0,0,9de964d29f43823164300439a0e71453bbca4a5c1f5767eca51db600267798cd,2024-04-26T12:58:17.720000 CVE-2024-3965,0,0,6a2d24a56808a8dbb9160c44f3b8ea17e074c89928316addbe1fa0ca0aaeb11f,2024-06-17T12:42:04.623000 @@ -253760,6 +253765,7 @@ CVE-2024-4006,0,0,cea97555ee62217aaca46943155964ba917aa17a210befae3806ab46c66060 CVE-2024-4008,0,0,d029b79ac31ad712a3b682c30b4ebfe0bc85fbedb677b90d81d7c6af81a5600e,2024-06-18T17:00:01.570000 CVE-2024-4009,0,0,82f6778b19e61d18cb6bad03fb43730c90019cd4ed3dad3648b480d1adbe3427,2024-06-18T17:01:19.897000 CVE-2024-4010,0,0,b0efc140530d7080bd135b9c9b54b60a51a2a7dd68cfd5652cea86eef30822c4,2024-05-15T16:40:19.330000 +CVE-2024-4011,1,1,0928c50e2d80f152c9b9e77de4f093296246b7047a5b64859da921dea63c465f,2024-06-27T00:15:11.643000 CVE-2024-4013,0,0,0bcb784021209931ac496a163310ba1a6e977841cc5a1bcc570cbfa4732ae6ef,2024-06-07T14:56:05.647000 CVE-2024-4014,0,0,321273114f78ac117c4f7a805b62a62926b23a5461c74b2705504b7b2e21d158,2024-04-22T13:28:43.747000 CVE-2024-4017,0,0,9cc899b07e49c20d1d42511c9c41a533c695fd74b1701843b26490566c6e33e3,2024-04-22T13:28:50.310000 @@ -254202,6 +254208,7 @@ CVE-2024-4549,0,0,6f08cdb7bdf1bc14a6d26c3a39b799558e43e67fec9cb01e1f3b74f80a87ac CVE-2024-4551,0,0,bde23bacf66d6a3da20cc3762eb00d7dfd03b874f5885e9a67eebb6780ae65b6,2024-06-17T12:42:04.623000 CVE-2024-4552,0,0,e23892055f41d68c57f1d172e5ea3d0a2ee46019e9d286872c115b7aad205614,2024-06-04T16:57:41.053000 CVE-2024-4553,0,0,8b88b932112e5db46be28f06635e2ec7d2585d5bcb10d64401d792f4b888b1c3,2024-05-21T12:37:59.687000 +CVE-2024-4557,1,1,257513c35e60e7548e5e9147b496a724c69101b2430b3df3e7137e1c8201ea87,2024-06-27T00:15:11.863000 CVE-2024-4558,0,0,fcb727202a9f43a9bf70ed6e025c63a0fd8208e4c1e99d83d4aee5cebbd5fae2,2024-06-10T18:15:36.760000 CVE-2024-4559,0,0,8380b9787705277bd83d6c6288181f3738a86c645934830c7e5c61a4edd855f6,2024-06-10T18:15:36.837000 CVE-2024-4560,0,0,01330bc30e6abf90cd0e894076fd4822775b90946ecfbbe71c3855f1f2c00212,2024-05-14T16:11:39.510000 @@ -254476,6 +254483,7 @@ CVE-2024-4896,0,0,6456cc9b22aff68532bfeeb7637d5235216630d84771d1ec52d84fa467e4b7 CVE-2024-4898,0,0,4ea5d2aea02f0385cebab454e7d6b2e480bf3eab8470b7157c155067bed66344,2024-06-13T18:36:09.010000 CVE-2024-4899,0,0,67b323357bb49d8a98f8aef30f13d75a082b23ba24ff9269116bd3a4e859e8a6,2024-06-24T12:57:36.513000 CVE-2024-4900,0,0,bf21c014329db3bdc252e0dfea038d8cc3dd03e7972d5bd787db3fb8215cd9e5,2024-06-24T12:57:36.513000 +CVE-2024-4901,1,1,7238018e624eed5d4a711b08e413688112d7a37593f314d4993be0dcc7616867,2024-06-27T00:15:12.263000 CVE-2024-4902,0,0,190ae6556b466a5228ce6680f8d8f4ba4789cfafa6765b2e868dc7feb28ee1e3,2024-06-07T14:56:05.647000 CVE-2024-4903,0,0,74f6793baa838082db19325ded8d53157feab60a90892d7bb13ebdea205ed94c,2024-06-07T20:15:11.967000 CVE-2024-4904,0,0,44558a4b32290e2f940be10d0a83b859aa6fae2c01ef1c881d37a435bb46f91d,2024-06-04T19:20:52.380000 @@ -254881,6 +254889,7 @@ CVE-2024-5425,0,0,198a56668ec12904be81f8cc7c88bdb7cf556c1b42bf2a53d8f10dc0d316d5 CVE-2024-5426,0,0,463afa72e5ec754a0d270917d456b87514b8458a939d0b61aeddc71dea0e191e,2024-06-11T18:03:58.213000 CVE-2024-5427,0,0,e86cc201b7d64d377c97e091606dc3804ebb54017d6aedd32a3c8a9e9f3ee33f,2024-05-31T13:01:46.727000 CVE-2024-5428,0,0,febfd9b4f977de4c3dc04e5fc8e71b9454e3ad809e74595cd325ad9561a295a7,2024-05-28T14:59:09.827000 +CVE-2024-5430,1,1,50d0358bd7a9dd3f7e75fbec60a9431ca513f04fff717ff8b392ca13bde9346f,2024-06-27T00:15:12.650000 CVE-2024-5431,0,0,42e70412ed260a519e4eab6a93ce97c65de39fa732f015eeb2fa3ed75a13dc72,2024-06-25T12:24:17.873000 CVE-2024-5432,0,0,ab9a775fb9b6438a5280e4ab8778e43fe4811f4ee641a114adeb9e5317236c9d,2024-06-20T12:43:25.663000 CVE-2024-5433,0,0,d0946774ada383b4af0e78f23b9c449d05f83a7124810af4e383f90b0cdbda75,2024-05-29T13:02:09.280000 @@ -254994,6 +255003,7 @@ CVE-2024-5649,0,0,dc95f59c6efdf5cedf3d7e0f6c5bd262dc96a14a6be79337241ad862a08882 CVE-2024-5650,0,0,65f855892c82055621a01afe5dfbac2eeb37ab3d50eb12f09dc0d9a40779b9ee,2024-06-17T12:42:04.623000 CVE-2024-5653,0,0,283076b6ccce08ae3d1ddf9d7f5983a839d66c80929543a8a527d0bfdf86a2f9,2024-06-06T14:17:35.017000 CVE-2024-5654,0,0,e22a0b433d38e113ff7c2fe935a2ac4a2eac96ee27b605312aa4a4c8d50d69a0,2024-06-10T02:52:08.267000 +CVE-2024-5655,1,1,d8a71b5d30b695a6efc14d9f636905eb2f41126b608ee8f05fb5f6cde0bb90a1,2024-06-27T00:15:12.887000 CVE-2024-5656,0,0,40c34e526e2032c59043b8834b1648291001d5e69a19326cbf74d918e6c8fbc1,2024-06-13T14:15:13.397000 CVE-2024-5657,0,0,223911cca93e713dc15810800584c4abe481e0e2143d3e3f3795c2d130280eb3,2024-06-11T17:40:47.823000 CVE-2024-5658,0,0,e420aa15660fefecd013eab0de4dee690ff0f155b141d8b1d4392a16606c7ad5,2024-06-11T18:21:52.377000 @@ -255273,7 +255283,8 @@ CVE-2024-6305,0,0,f99f0e2fe8305a118a77228b9078f8dc9ee1845d0c6e4aa828aaf18dadf372 CVE-2024-6306,0,0,711bff153bb36aca97259b9a58665f79686710d592de1aed3b99962d3c3067a2,2024-06-25T17:15:11.107000 CVE-2024-6307,0,0,8ab5a431e062520bb1ad7f310d46410dbbde3d3f7608d294c115bc975c016c27,2024-06-25T12:24:17.873000 CVE-2024-6308,0,0,483bab7c0040f40965fba497a0be9e45fef6974a263c54d39149185a218f4b43,2024-06-25T21:16:02.087000 -CVE-2024-6344,0,0,158fe8ce5a3890f545b2644b2bf88be098b9fb0d23e412b15a910b7a664aee59,2024-06-26T12:44:29.693000 +CVE-2024-6323,1,1,a13781b7b076a5a32737ff654fab9a311b721465dc2b074e3d948723fe795b77,2024-06-27T00:15:13.130000 +CVE-2024-6344,0,1,f8fe072181ab91a453822e0b523eb31f74817bc4efb68c7d2134a2d41a8e3557,2024-06-27T00:15:13.360000 CVE-2024-6349,0,0,f01d61e3475192c945ec3639c2eda3b231a23d2f279c2f15b4719385fb2bd065,2024-06-26T15:15:20.690000 CVE-2024-6354,0,0,7d18b67617b23c02d3a517e6ca456b4bc3978471ddff450d6c05c10b62c889de,2024-06-26T17:15:27.497000 CVE-2024-6355,0,0,2a4505c0394d23db4b3d3539af3feab878a09a04e5d76bc801d2e38c9653479e,2024-06-26T21:15:13.533000