diff --git a/CVE-2024/CVE-2024-09xx/CVE-2024-0985.json b/CVE-2024/CVE-2024-09xx/CVE-2024-0985.json index ebea800dce3..c2389e4e233 100644 --- a/CVE-2024/CVE-2024-09xx/CVE-2024-0985.json +++ b/CVE-2024/CVE-2024-09xx/CVE-2024-0985.json @@ -2,12 +2,12 @@ "id": "CVE-2024-0985", "sourceIdentifier": "f86ef6dc-4d3a-42ad-8f28-e6d5547a5007", "published": "2024-02-08T13:15:08.927", - "lastModified": "2024-03-18T17:15:06.070", + "lastModified": "2024-06-20T00:15:09.260", "vulnStatus": "Modified", "descriptions": [ { "lang": "en", - "value": "Late privilege drop in REFRESH MATERIALIZED VIEW CONCURRENTLY in PostgreSQL allows an object creator to execute arbitrary SQL functions as the command issuer. The command intends to run SQL functions as the owner of the materialized view, enabling safe refresh of untrusted materialized views. The victim is a superuser or member of one of the attacker's roles. The attack requires luring the victim into running REFRESH MATERIALIZED VIEW CONCURRENTLY on the attacker's materialized view. As part of exploiting this vulnerability, the attacker creates functions that use CREATE RULE to convert the internally-built temporary table to a view. Versions before PostgreSQL 15.6, 14.11, 13.14, and 12.18 are affected. The only known exploit does not work in PostgreSQL 16 and later. For defense in depth, PostgreSQL 16.2 adds the protections that older branches are using to fix their vulnerability." + "value": "Late privilege drop in REFRESH MATERIALIZED VIEW CONCURRENTLY in PostgreSQL allows an object creator to execute arbitrary SQL functions as the command issuer. The command intends to run SQL functions as the owner of the materialized view, enabling safe refresh of untrusted materialized views. The victim is a superuser or member of one of the attacker's roles. The attack requires luring the victim into running REFRESH MATERIALIZED VIEW CONCURRENTLY on the attacker's materialized view. Versions before PostgreSQL 16.2, 15.6, 14.11, 13.14, and 12.18 are affected." }, { "lang": "es", diff --git a/CVE-2024/CVE-2024-51xx/CVE-2024-5182.json b/CVE-2024/CVE-2024-51xx/CVE-2024-5182.json new file mode 100644 index 00000000000..80efa1cec2e --- /dev/null +++ b/CVE-2024/CVE-2024-51xx/CVE-2024-5182.json @@ -0,0 +1,59 @@ +{ + "id": "CVE-2024-5182", + "sourceIdentifier": "security@huntr.dev", + "published": "2024-06-20T00:15:09.487", + "lastModified": "2024-06-20T00:15:09.487", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "A path traversal vulnerability exists in mudler/localai version 2.14.0, where an attacker can exploit the `model` parameter during the model deletion process to delete arbitrary files. Specifically, by crafting a request with a manipulated `model` parameter, an attacker can traverse the directory structure and target files outside of the intended directory, leading to the deletion of sensitive data. This vulnerability is due to insufficient input validation and sanitization of the `model` parameter." + } + ], + "metrics": { + "cvssMetricV30": [ + { + "source": "security@huntr.dev", + "type": "Secondary", + "cvssData": { + "version": "3.0", + "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "security@huntr.dev", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-22" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/mudler/localai/commit/1a3dedece06cab1acc3332055d285ac540a47f0e", + "source": "security@huntr.dev" + }, + { + "url": "https://huntr.com/bounties/f7a87f29-c22a-48e8-9fce-b6d5a273e545", + "source": "security@huntr.dev" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-61xx/CVE-2024-6100.json b/CVE-2024/CVE-2024-61xx/CVE-2024-6100.json new file mode 100644 index 00000000000..248e58a9734 --- /dev/null +++ b/CVE-2024/CVE-2024-61xx/CVE-2024-6100.json @@ -0,0 +1,36 @@ +{ + "id": "CVE-2024-6100", + "sourceIdentifier": "chrome-cve-admin@google.com", + "published": "2024-06-20T00:15:09.810", + "lastModified": "2024-06-20T00:15:09.810", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Type Confusion in V8 in Google Chrome prior to 126.0.6478.114 allowed a remote attacker to execute arbitrary code via a crafted HTML page. (Chromium security severity: High)" + } + ], + "metrics": {}, + "weaknesses": [ + { + "source": "chrome-cve-admin@google.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-843" + } + ] + } + ], + "references": [ + { + "url": "https://chromereleases.googleblog.com/2024/06/stable-channel-update-for-desktop_18.html", + "source": "chrome-cve-admin@google.com" + }, + { + "url": "https://issues.chromium.org/issues/344608204", + "source": "chrome-cve-admin@google.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-61xx/CVE-2024-6101.json b/CVE-2024/CVE-2024-61xx/CVE-2024-6101.json new file mode 100644 index 00000000000..05f15cee00f --- /dev/null +++ b/CVE-2024/CVE-2024-61xx/CVE-2024-6101.json @@ -0,0 +1,24 @@ +{ + "id": "CVE-2024-6101", + "sourceIdentifier": "chrome-cve-admin@google.com", + "published": "2024-06-20T00:15:09.967", + "lastModified": "2024-06-20T00:15:09.967", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Inappropriate implementation in V8 in Google Chrome prior to 126.0.6478.114 allowed a remote attacker to perform out of bounds memory access via a crafted HTML page. (Chromium security severity: High)" + } + ], + "metrics": {}, + "references": [ + { + "url": "https://chromereleases.googleblog.com/2024/06/stable-channel-update-for-desktop_18.html", + "source": "chrome-cve-admin@google.com" + }, + { + "url": "https://issues.chromium.org/issues/343748812", + "source": "chrome-cve-admin@google.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-61xx/CVE-2024-6102.json b/CVE-2024/CVE-2024-61xx/CVE-2024-6102.json new file mode 100644 index 00000000000..a6c8c890171 --- /dev/null +++ b/CVE-2024/CVE-2024-61xx/CVE-2024-6102.json @@ -0,0 +1,24 @@ +{ + "id": "CVE-2024-6102", + "sourceIdentifier": "chrome-cve-admin@google.com", + "published": "2024-06-20T00:15:10.053", + "lastModified": "2024-06-20T00:15:10.053", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Out of bounds memory access in Dawn in Google Chrome prior to 126.0.6478.114 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)" + } + ], + "metrics": {}, + "references": [ + { + "url": "https://chromereleases.googleblog.com/2024/06/stable-channel-update-for-desktop_18.html", + "source": "chrome-cve-admin@google.com" + }, + { + "url": "https://issues.chromium.org/issues/339169163", + "source": "chrome-cve-admin@google.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-61xx/CVE-2024-6103.json b/CVE-2024/CVE-2024-61xx/CVE-2024-6103.json new file mode 100644 index 00000000000..2343ee57906 --- /dev/null +++ b/CVE-2024/CVE-2024-61xx/CVE-2024-6103.json @@ -0,0 +1,36 @@ +{ + "id": "CVE-2024-6103", + "sourceIdentifier": "chrome-cve-admin@google.com", + "published": "2024-06-20T00:15:10.133", + "lastModified": "2024-06-20T00:15:10.133", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Use after free in Dawn in Google Chrome prior to 126.0.6478.114 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)" + } + ], + "metrics": {}, + "weaknesses": [ + { + "source": "chrome-cve-admin@google.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-416" + } + ] + } + ], + "references": [ + { + "url": "https://chromereleases.googleblog.com/2024/06/stable-channel-update-for-desktop_18.html", + "source": "chrome-cve-admin@google.com" + }, + { + "url": "https://issues.chromium.org/issues/344639860", + "source": "chrome-cve-admin@google.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-61xx/CVE-2024-6176.json b/CVE-2024/CVE-2024-61xx/CVE-2024-6176.json new file mode 100644 index 00000000000..9cd9c8d0974 --- /dev/null +++ b/CVE-2024/CVE-2024-61xx/CVE-2024-6176.json @@ -0,0 +1,32 @@ +{ + "id": "CVE-2024-6176", + "sourceIdentifier": "product.security@lge.com", + "published": "2024-06-20T01:15:49.023", + "lastModified": "2024-06-20T01:15:49.023", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Allocation of Resources Without Limits or Throttling vulnerability in LG Electronics LG SuperSign CMS allows Port Scanning.This issue affects LG SuperSign CMS: from 4.1.3 before < 4.3.1." + } + ], + "metrics": {}, + "weaknesses": [ + { + "source": "product.security@lge.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-770" + } + ] + } + ], + "references": [ + { + "url": "https://lgsecurity.lge.com/bulletins/idproducts#updateDetails", + "source": "product.security@lge.com" + } + ] +} \ No newline at end of file diff --git a/README.md b/README.md index c9e00c88887..d1845fa22af 100644 --- a/README.md +++ b/README.md @@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2024-06-19T22:00:18.346906+00:00 +2024-06-20T02:00:17.916835+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2024-06-19T21:15:57.680000+00:00 +2024-06-20T01:15:49.023000+00:00 ``` ### Last Data Feed Release @@ -27,39 +27,32 @@ Repository synchronizes with the NVD every 2 hours. Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/releases/latest) ```plain -2024-06-19T00:00:08.664569+00:00 +2024-06-20T00:00:08.656720+00:00 ``` ### Total Number of included CVEs ```plain -254613 +254619 ``` ### CVEs added in the last Commit -Recently added CVEs: `13` +Recently added CVEs: `6` -- [CVE-2024-33836](CVE-2024/CVE-2024-338xx/CVE-2024-33836.json) (`2024-06-19T21:15:56.920`) -- [CVE-2024-34990](CVE-2024/CVE-2024-349xx/CVE-2024-34990.json) (`2024-06-19T21:15:57.023`) -- [CVE-2024-34993](CVE-2024/CVE-2024-349xx/CVE-2024-34993.json) (`2024-06-19T20:15:11.053`) -- [CVE-2024-34994](CVE-2024/CVE-2024-349xx/CVE-2024-34994.json) (`2024-06-19T21:15:57.130`) -- [CVE-2024-36677](CVE-2024/CVE-2024-366xx/CVE-2024-36677.json) (`2024-06-19T21:15:57.257`) -- [CVE-2024-36678](CVE-2024/CVE-2024-366xx/CVE-2024-36678.json) (`2024-06-19T21:15:57.363`) -- [CVE-2024-36679](CVE-2024/CVE-2024-366xx/CVE-2024-36679.json) (`2024-06-19T21:15:57.470`) -- [CVE-2024-36680](CVE-2024/CVE-2024-366xx/CVE-2024-36680.json) (`2024-06-19T21:15:57.577`) -- [CVE-2024-36684](CVE-2024/CVE-2024-366xx/CVE-2024-36684.json) (`2024-06-19T21:15:57.680`) -- [CVE-2024-38355](CVE-2024/CVE-2024-383xx/CVE-2024-38355.json) (`2024-06-19T20:15:11.180`) -- [CVE-2024-38356](CVE-2024/CVE-2024-383xx/CVE-2024-38356.json) (`2024-06-19T20:15:11.453`) -- [CVE-2024-38357](CVE-2024/CVE-2024-383xx/CVE-2024-38357.json) (`2024-06-19T20:15:11.727`) -- [CVE-2024-38358](CVE-2024/CVE-2024-383xx/CVE-2024-38358.json) (`2024-06-19T20:15:11.990`) +- [CVE-2024-5182](CVE-2024/CVE-2024-51xx/CVE-2024-5182.json) (`2024-06-20T00:15:09.487`) +- [CVE-2024-6100](CVE-2024/CVE-2024-61xx/CVE-2024-6100.json) (`2024-06-20T00:15:09.810`) +- [CVE-2024-6101](CVE-2024/CVE-2024-61xx/CVE-2024-6101.json) (`2024-06-20T00:15:09.967`) +- [CVE-2024-6102](CVE-2024/CVE-2024-61xx/CVE-2024-6102.json) (`2024-06-20T00:15:10.053`) +- [CVE-2024-6103](CVE-2024/CVE-2024-61xx/CVE-2024-6103.json) (`2024-06-20T00:15:10.133`) +- [CVE-2024-6176](CVE-2024/CVE-2024-61xx/CVE-2024-6176.json) (`2024-06-20T01:15:49.023`) ### CVEs modified in the last Commit Recently modified CVEs: `1` -- [CVE-2024-5564](CVE-2024/CVE-2024-55xx/CVE-2024-5564.json) (`2024-06-19T20:15:12.277`) +- [CVE-2024-0985](CVE-2024/CVE-2024-09xx/CVE-2024-0985.json) (`2024-06-20T00:15:09.260`) ## Download and Usage diff --git a/_state.csv b/_state.csv index 1e6c0122bb8..e1078129117 100644 --- a/_state.csv +++ b/_state.csv @@ -241300,7 +241300,7 @@ CVE-2024-0979,0,0,b84dcc09c9c8fc834250a86a7302df86cb5995ce3e7d4add546aea16fff0f1 CVE-2024-0980,0,0,f315f58bbc7d421e9e9b581f53566d3945bc347b1ca4f3f65618a1b592d8dba3,2024-03-28T02:01:13.303000 CVE-2024-0983,0,0,ae05daa2819fc42abf2cc0aed0ec977b40d58c31465549c2cfe7791e8c6cecae,2024-02-29T13:49:29.390000 CVE-2024-0984,0,0,32a53697d4c68794e0f7d534229f2199d1ec3163c027c80a4fc5f01ab0bb8955,2024-02-29T13:49:29.390000 -CVE-2024-0985,0,0,7f62d4f229f42e211d79e54ca95fbe4e7e170d1291d382df953b17f7c27d2355,2024-03-18T17:15:06.070000 +CVE-2024-0985,0,1,6abdc3a2e97e39786284b3bc77a2915cf97149b89c179d3872f3c6717cda4a06,2024-06-20T00:15:09.260000 CVE-2024-0986,0,0,72f9486968f11da33c6e63164349dbf0abedcbb9a3c9bf91066b1ee35c4270b8,2024-05-17T02:35:07.203000 CVE-2024-0987,0,0,5801414b82c7b2917af43c39141dfe1f1e7f0c982b0bef329ac6f9b0b28c20b8,2024-05-17T02:35:07.313000 CVE-2024-0988,0,0,68860901f1965c1c448789084d069aceca0887686a8256d545e41c2ea5ae82cd,2024-05-17T02:35:07.413000 @@ -250964,7 +250964,7 @@ CVE-2024-33830,0,0,4bec17a1ace431d40129f86a3decff5923e7758432d69e3320d95a816eb74 CVE-2024-33831,0,0,98c1e02fb52cc885fef491b04fbf31cf74b7566005400cd91ab0d4a14f98e6eb,2024-04-30T19:35:36.960000 CVE-2024-33832,0,0,e7d2cac687a99961b7eaca7437c17155c2c3f6529821c095b09e5161bda8425f,2024-04-30T19:35:36.960000 CVE-2024-33835,0,0,b7a1ddab44d53e7f09c5ad58cb148033d556cb74ed3d7a19809aa297e0382c78,2024-05-01T13:01:51.263000 -CVE-2024-33836,1,1,5e3480fa82212040508d6d08eb0e0a60833210b602c0a8e357d7b52cffc1e40d,2024-06-19T21:15:56.920000 +CVE-2024-33836,0,0,5e3480fa82212040508d6d08eb0e0a60833210b602c0a8e357d7b52cffc1e40d,2024-06-19T21:15:56.920000 CVE-2024-3384,0,0,f1db02aa38b819888be52a421a922174001b5f3c9e0abe3ab9082a168503f129,2024-04-10T19:49:51.183000 CVE-2024-33844,0,0,921cf446ac356d2881e6613aac60d162eae136862d065184d9b1201e02e62333,2024-06-10T18:45:09.903000 CVE-2024-33849,0,0,3b4368a52b5ddf8a3c305c2346a67c77b86eca45d334812e664f6d20b43a32e6,2024-05-28T17:11:47.007000 @@ -251597,9 +251597,9 @@ CVE-2024-3498,0,0,5a88bde38eadc03f84603569fdec38fe83a6606de78277714e78faa80a5569 CVE-2024-34982,0,0,ef460a32eb987949d8c2a373dc7919974bee9f6e2b2a3c53ead2e4138396cd2a,2024-05-17T18:35:35.070000 CVE-2024-34987,0,0,262d3ccca2f7e7df7be241d8326c4714ae2b44466572454690af1a110c26db06,2024-06-18T19:15:59.873000 CVE-2024-3499,0,0,38e1f3a6ce5aff826b19a73a4f796b980cc1161eaf58f8fada2f6f87e54573a4,2024-05-02T18:00:37.360000 -CVE-2024-34990,1,1,13ccab59c2424db60c7b433cf56fbf860b9c9b8e04719321b68e5b62c442f80f,2024-06-19T21:15:57.023000 -CVE-2024-34993,1,1,c85954a771357ba0ecc33a52666c32e422f90f8939758fd997c93a31f43d78c7,2024-06-19T20:15:11.053000 -CVE-2024-34994,1,1,f9367d66e327433fabf526300a6d5445a40e06ad7a614c7f91486a5c6960c652,2024-06-19T21:15:57.130000 +CVE-2024-34990,0,0,13ccab59c2424db60c7b433cf56fbf860b9c9b8e04719321b68e5b62c442f80f,2024-06-19T21:15:57.023000 +CVE-2024-34993,0,0,c85954a771357ba0ecc33a52666c32e422f90f8939758fd997c93a31f43d78c7,2024-06-19T20:15:11.053000 +CVE-2024-34994,0,0,f9367d66e327433fabf526300a6d5445a40e06ad7a614c7f91486a5c6960c652,2024-06-19T21:15:57.130000 CVE-2024-34995,0,0,ff7295f94bdc66d877986c97deb7981eb83c3e840f72ac7a8ee7543b9685ad7b,2024-05-24T18:09:20.027000 CVE-2024-34997,0,0,cee044c4ccffe504e44bd95724dd0befc01681debe6525e4c247f664c7f74ef5,2024-06-17T14:15:09.950000 CVE-2024-3500,0,0,bd83544d3c8c82359104dcd5b032a6095cbae3178ec9c9c56ddfe242d28462ee,2024-05-02T18:00:37.360000 @@ -252580,12 +252580,12 @@ CVE-2024-36670,0,0,fdafe9c66140e5a2018ce6b3a330b135107007226ee1c746bda0de7803753 CVE-2024-36673,0,0,c3fdb493385fd7349af8a7f0f647aa65a0c25320dc90b659d1425197d89ce5bd,2024-06-11T18:27:20.950000 CVE-2024-36674,0,0,80518ec37aaca3163e2f2a38f2de20c8dedbcb7f0e795fb382e532f1b66ca868,2024-06-03T19:23:17.807000 CVE-2024-36675,0,0,d8b3bb8705c0d8b166e699377141fb97d9735e483700819521a5fc1573c26a90,2024-06-11T16:49:10.457000 -CVE-2024-36677,1,1,93c22664235a2af49937c6fc169e3dce04c8914727d28c9438d6cea425acd789,2024-06-19T21:15:57.257000 -CVE-2024-36678,1,1,57eba006cdb8a72766df2b7b61cd7cd0ab7a4a69f11d5e1e237eda7b4e0b84a7,2024-06-19T21:15:57.363000 -CVE-2024-36679,1,1,58af4cab32f0095f9b3f92c7e0c895f2f34213c0eadfbb8fd8a338d56130861d,2024-06-19T21:15:57.470000 +CVE-2024-36677,0,0,93c22664235a2af49937c6fc169e3dce04c8914727d28c9438d6cea425acd789,2024-06-19T21:15:57.257000 +CVE-2024-36678,0,0,57eba006cdb8a72766df2b7b61cd7cd0ab7a4a69f11d5e1e237eda7b4e0b84a7,2024-06-19T21:15:57.363000 +CVE-2024-36679,0,0,58af4cab32f0095f9b3f92c7e0c895f2f34213c0eadfbb8fd8a338d56130861d,2024-06-19T21:15:57.470000 CVE-2024-3668,0,0,49d55bc0cfb418bcfc9437877f4056373badba24215047598ce2c0a1a6dfb761,2024-06-10T02:52:08.267000 -CVE-2024-36680,1,1,a2785cd07a34b06766cbf6cc40d21f8414f9fa61543ff95041c99981f6d966d4,2024-06-19T21:15:57.577000 -CVE-2024-36684,1,1,2cb04fa49b7499bc6667d7d1d4a5491f6ca6eda601e1477df9f1d513e4c0124f,2024-06-19T21:15:57.680000 +CVE-2024-36680,0,0,a2785cd07a34b06766cbf6cc40d21f8414f9fa61543ff95041c99981f6d966d4,2024-06-19T21:15:57.577000 +CVE-2024-36684,0,0,2cb04fa49b7499bc6667d7d1d4a5491f6ca6eda601e1477df9f1d513e4c0124f,2024-06-19T21:15:57.680000 CVE-2024-36691,0,0,eb8762b05fd0460b1321a45df3641c06640e12f5ae9e65b313352697eb6ff0d2,2024-06-13T18:36:09.010000 CVE-2024-36699,0,0,4c8862d154ba42ed56a4ce8bf1e6f3cc34d74fcc619fdd49ec3e97bb2690a0fe,2024-06-14T15:15:50.967000 CVE-2024-3670,0,0,c82d0130c8edc16344a78447d1514c5ffe18d421cd344e5799606a7730bedf8c,2024-05-02T18:00:37.360000 @@ -253046,10 +253046,10 @@ CVE-2024-38347,0,0,1db5df6f7760b01b56d52993df383797c5f4798c0cdb9cb68f64a4daf6391 CVE-2024-38348,0,0,94cbfe55a7243d30de59c6d5a0b267d7b83aa88d8592807a6edbb2ea3d15f4b0,2024-06-18T17:15:52.677000 CVE-2024-38351,0,0,e713168365103b037ea0e97b0ff1c8370226a2ff3430694f8a53a77f591bce4f,2024-06-18T17:15:52.777000 CVE-2024-38352,0,0,13a6e81e4d4d40a0591843c161ee638c75aac348990bf4d2603a4c2fb8cf2a30,2024-06-19T18:15:11.507000 -CVE-2024-38355,1,1,278543c69fed17838c464fd75fdfae5cc583fde89bdf573040918981a86265a1,2024-06-19T20:15:11.180000 -CVE-2024-38356,1,1,b087ab52a4a6f9850eaa03fd1740cd30dbab7b1e2cef201f002582eaa58d07bf,2024-06-19T20:15:11.453000 -CVE-2024-38357,1,1,1e04483f65eff96a043cf58a7aa17669e01ba401e8032d34860eb347d04bc131,2024-06-19T20:15:11.727000 -CVE-2024-38358,1,1,4942d1e00758f0ba19862200c342e18c5bdd69c37ff3fc43be42b8eb75873261,2024-06-19T20:15:11.990000 +CVE-2024-38355,0,0,278543c69fed17838c464fd75fdfae5cc583fde89bdf573040918981a86265a1,2024-06-19T20:15:11.180000 +CVE-2024-38356,0,0,b087ab52a4a6f9850eaa03fd1740cd30dbab7b1e2cef201f002582eaa58d07bf,2024-06-19T20:15:11.453000 +CVE-2024-38357,0,0,1e04483f65eff96a043cf58a7aa17669e01ba401e8032d34860eb347d04bc131,2024-06-19T20:15:11.727000 +CVE-2024-38358,0,0,4942d1e00758f0ba19862200c342e18c5bdd69c37ff3fc43be42b8eb75873261,2024-06-19T20:15:11.990000 CVE-2024-3837,0,0,5046b04f6fff161407832d91f839d6c01f3dcf30bcf75f620bfd7221b5de1c27,2024-05-03T03:16:29.010000 CVE-2024-3838,0,0,bd55ca068ebe4472845bce1f3d037932d27279da54b129864c942318cbf6c399,2024-04-23T18:15:15.410000 CVE-2024-3839,0,0,5078cfd1c7c68c41b30fd8b0c9c6a095120ec81bc8166ccecb75ba3c8be530b5,2024-05-03T04:15:09.127000 @@ -254153,6 +254153,7 @@ CVE-2024-5172,0,0,6f81a674f5782cb8792fa5dd56ecc7e266f5bfc474a6989e555bcaf073124d CVE-2024-5176,0,0,d56ed998903dfaef1849b554412c043d7bedaec08a06683735e348a1e4cdd46d,2024-06-05T15:15:12.620000 CVE-2024-5177,0,0,754731e9b12ab9d5b8190add19111b94a5e340744a68664c6a765c48e93c422c,2024-05-24T01:15:30.977000 CVE-2024-5179,0,0,54358caa6e0360966d6f1b65f621cdbf9937e802ed8f2b5c2ee31999cdede484,2024-06-06T14:17:35.017000 +CVE-2024-5182,1,1,75843e136ff752684512fe999e6c26d863acb5df23a67529923a59ab0a6bd209,2024-06-20T00:15:09.487000 CVE-2024-5184,0,0,de97ef0558df300043d1123a6fe8d6e2df5444a09bff76f28ec8a01317d2d79c,2024-06-18T17:06:20.257000 CVE-2024-5185,0,0,b5caf3da810dd6351b96bbd5e231331a05f92e8956c63f18c155c13a8af19485,2024-05-29T15:18:26.427000 CVE-2024-5186,0,0,c6b2efdad9b4d04477e8bc0a562c3aef2ed32ffb2bffbc88ea5624073db9f4b8,2024-06-07T14:56:05.647000 @@ -254400,7 +254401,7 @@ CVE-2024-5557,0,0,d46453be6b66f76046381e0db014eed7a6e7aed2ef0e3daec4893bcd8fb5d2 CVE-2024-5558,0,0,09f3631381717b3ba9f6f331adbe19283ecf1ecf6408742eafb8b270343d373b,2024-06-13T18:36:09.010000 CVE-2024-5559,0,0,2783b17045adc6e83e5bf6acfe749e5c6489b786d017eb582b973704c839f44d,2024-06-13T18:36:09.010000 CVE-2024-5560,0,0,f1a6e79f857dcb0da00298e85540b2901c155f3f4e8e842ef291f9f993b61e1f,2024-06-13T18:36:09.010000 -CVE-2024-5564,0,1,dcea96840208d2ac663aaa4f0f3c3d4a29deb4a56217e3b064f75f0ccdd62128,2024-06-19T20:15:12.277000 +CVE-2024-5564,0,0,dcea96840208d2ac663aaa4f0f3c3d4a29deb4a56217e3b064f75f0ccdd62128,2024-06-19T20:15:12.277000 CVE-2024-5565,0,0,830316f5c713618fdad4a0eda5b7296c22d5d93c87a8813197db3ff9cf28c4ee,2024-05-31T19:14:47.793000 CVE-2024-5571,0,0,105c4e644019eeccf72c6e63813cdc36601b1b9a7e3cba5bc172df86631261e6,2024-06-11T17:29:03.277000 CVE-2024-5574,0,0,e61398b52e7e578c38514d99e1cd854ee3b9045f14e28a4d2db6de7566257631,2024-06-19T06:15:11.993000 @@ -254595,6 +254596,10 @@ CVE-2024-6080,0,0,ce117abbbf27c271f3b1c554aeba9f1090748517ce038abb4811acdf5fadb2 CVE-2024-6082,0,0,b34a8b9e9d7597c030b945a5724fac42f5803ca75f53728fefe9f424acf1cad3,2024-06-17T23:15:51.920000 CVE-2024-6083,0,0,6fddaebd6fd505529ccfd2377fbb90eb3ff967f1b7daa3e62aab60a1d99a55f2,2024-06-18T00:15:09.853000 CVE-2024-6084,0,0,e83127a2367dfc14c5a74f105b11646fecd7f02b89d4abf85a631505a5590b54,2024-06-18T14:15:12.317000 +CVE-2024-6100,1,1,54010ce6f238bde544fe7f7d259cdef651074d4c63d3f1e19c90005e63648320,2024-06-20T00:15:09.810000 +CVE-2024-6101,1,1,ef79fea232f05f9286b27581de6444f5cbf6f48ca26c4b4a071a7186f13e9abe,2024-06-20T00:15:09.967000 +CVE-2024-6102,1,1,0a75cd12056caf692bff4dd6d8b4e609f3c0d523976ccb9d5e105b14b81085b8,2024-06-20T00:15:10.053000 +CVE-2024-6103,1,1,3c22aa639787761a456bc2fa5de7b15f8c606a7657056ec8f8b4a112895ac4c2,2024-06-20T00:15:10.133000 CVE-2024-6108,0,0,629cb2a981568eef963fe0fd8730638a990cab0f00ba579fb1df944ef1acda4c,2024-06-18T10:15:11.653000 CVE-2024-6109,0,0,ac88b829202223826825501cf9791e4a037baf3e8842ea6d10b43cea56f9fb4c,2024-06-18T12:15:12.987000 CVE-2024-6110,0,0,a93edb70ebaea05e4db1d298919bf28b75b9891dd6a65a876e1ff434451eb3ce,2024-06-18T12:15:13.290000 @@ -254612,3 +254617,4 @@ CVE-2024-6143,0,0,9532ba45db565215853ddf49c1a0164531f9356075191c1044d52df4608053 CVE-2024-6144,0,0,7cec310494d62a62033523df063be2341004a6dea8160cb5bd0d55e2f0065cc2,2024-06-19T00:15:50.133000 CVE-2024-6145,0,0,16e7e12932fe3f6cc4edd6cd1b11782632ac16fbbec9fab4c39f453507b11bae,2024-06-19T00:15:50.413000 CVE-2024-6146,0,0,b20add1bacc42bc316876ff3352b5fc3b113cf054bc134b5a4212df29f6f9ae6,2024-06-19T00:15:50.703000 +CVE-2024-6176,1,1,bd660c0cde647fe1bccb04d647014bfeadeca873814685115b39e74c61c8f2a1,2024-06-20T01:15:49.023000