Auto-Update: 2024-06-18T16:00:18.327202+00:00

This commit is contained in:
cad-safe-bot 2024-06-18 16:03:10 +00:00
parent 03dac253c9
commit 6aac2c86cd
23 changed files with 446 additions and 157 deletions

View File

@ -2,30 +2,30 @@
"id": "CVE-2018-25103",
"sourceIdentifier": "cret@cert.org",
"published": "2024-06-17T18:15:12.650",
"lastModified": "2024-06-17T18:15:12.650",
"lastModified": "2024-06-18T15:15:51.310",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "There exists a use-after-free-vulnerability in lighttpd <= 1.4.50 that can allow access to do a case-insensitive comparison against the reused pointer."
"value": "There exists use-after-free vulnerabilities in lighttpd <= 1.4.50 request parsing which might read from invalid pointers to memory used in the same request, not from other requests."
},
{
"lang": "es",
"value": "Existe una vulnerabilidad de use-after-free en lighttpd &lt;= 1.4.50 que puede permitir el acceso para realizar una comparaci\u00f3n que no distinga entre may\u00fasculas y min\u00fasculas con el puntero reutilizado."
}
],
"metrics": {},
"references": [
{
"url": "https://9443417.fs1.hubspotusercontent-na1.net/hubfs/9443417/Security%20Advisories/2024/AMI-SA-2024002.pdf",
"source": "cret@cert.org"
},
{
"url": "https://blogvdoo.wordpress.com/2018/11/06/giving-back-securing-open-source-iot-projects/#more-736",
"source": "cret@cert.org"
},
{
"url": "https://github.com/lighttpd/lighttpd1.4/commit/df8e4f95614e476276a55e34da2aa8b00b1148e9",
"url": "https://github.com/lighttpd/lighttpd1.4/commit/d161f53de04bc826ce1bdaeb3dce2c72ca50a3f8",
"source": "cret@cert.org"
},
{
"url": "https://www.binarly.io/blog/lighttpd-gains-new-life",
"url": "https://github.com/lighttpd/lighttpd1.4/commit/df8e4f95614e476276a55e34da2aa8b00b1148e9",
"source": "cret@cert.org"
},
{

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-30332",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-01-10T21:15:11.520",
"lastModified": "2024-06-05T05:15:49.087",
"vulnStatus": "Modified",
"lastModified": "2024-06-18T14:01:34.683",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -65,7 +65,7 @@
"description": [
{
"lang": "en",
"value": "CWE-640"
"value": "CWE-203"
}
]
}
@ -90,7 +90,10 @@
"references": [
{
"url": "https://cwe.mitre.org/data/definitions/204.html",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Technical Description"
]
},
{
"url": "https://excellium-services.com/cert-xlm-advisory/CVE-2022-30332",
@ -103,6 +106,7 @@
"url": "https://help.talend.com/r/62tbPt7y~tPTxAB7y7KpeQ/H45WqEF32geNEZiGJnRwmw",
"source": "cve@mitre.org",
"tags": [
"Broken Link",
"Release Notes",
"Vendor Advisory"
]

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-38430",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-07-18T00:15:09.663",
"lastModified": "2023-12-22T21:33:45.797",
"lastModified": "2024-06-18T15:10:09.290",
"vulnStatus": "Analyzed",
"descriptions": [
{
@ -57,8 +57,15 @@
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.15",
"versionEndExcluding": "5.15.145",
"matchCriteriaId": "6943BD04-722B-4B0F-810D-A5086EA877BB"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.16",
"versionEndExcluding": "6.1.35",
"matchCriteriaId": "6442A7ED-1F45-4D16-8B82-9D9364C0809B"
"matchCriteriaId": "05A707A2-83A7-4FED-8BE0-DBB381F97694"
},
{
"vulnerable": true,

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-38431",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-07-18T00:15:09.707",
"lastModified": "2023-12-15T15:46:35.903",
"lastModified": "2024-06-18T15:10:03.177",
"vulnStatus": "Analyzed",
"descriptions": [
{
@ -57,8 +57,15 @@
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.15",
"versionEndExcluding": "5.15.145",
"matchCriteriaId": "6943BD04-722B-4B0F-810D-A5086EA877BB"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.16",
"versionEndExcluding": "6.1.34",
"matchCriteriaId": "4F5A5D4B-4F1F-455D-8917-7785595FACF7"
"matchCriteriaId": "827DE634-7B30-489B-8DA2-F753BE881D9B"
},
{
"vulnerable": true,

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-39331",
"sourceIdentifier": "support@hackerone.com",
"published": "2023-10-18T04:15:11.257",
"lastModified": "2023-11-17T19:10:41.253",
"lastModified": "2024-06-18T15:09:45.857",
"vulnStatus": "Analyzed",
"descriptions": [
{
@ -83,8 +83,8 @@
"vulnerable": true,
"criteria": "cpe:2.3:a:nodejs:node.js:*:*:*:*:-:*:*:*",
"versionStartIncluding": "20.0.0",
"versionEndExcluding": "20.8.0",
"matchCriteriaId": "6BD3775B-9921-452D-ACF2-626A96B781F0"
"versionEndExcluding": "20.8.1",
"matchCriteriaId": "AF062340-A490-41E3-8A34-2C07644402DE"
}
]
}

View File

@ -0,0 +1,59 @@
{
"id": "CVE-2023-47726",
"sourceIdentifier": "psirt@us.ibm.com",
"published": "2024-06-18T14:15:10.317",
"lastModified": "2024-06-18T14:15:10.317",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "IBM QRadar Suite Software 1.10.12.0 through 1.10.21.0 and IBM Cloud Pak for Security 1.10.12.0 through 1.10.21.0 could allow an authenticated user to execute certain arbitrary commands due to improper input validation. IBM X-Force ID: 272087."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "psirt@us.ibm.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 7.1,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 4.2
}
]
},
"weaknesses": [
{
"source": "psirt@us.ibm.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-1287"
}
]
}
],
"references": [
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/272087",
"source": "psirt@us.ibm.com"
},
{
"url": "https://https://www.ibm.com/support/pages/node/7157750",
"source": "psirt@us.ibm.com"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-5157",
"sourceIdentifier": "secalert@redhat.com",
"published": "2023-09-27T15:19:41.807",
"lastModified": "2023-12-22T19:25:31.627",
"lastModified": "2024-06-18T15:09:32.553",
"vulnStatus": "Analyzed",
"descriptions": [
{
@ -90,8 +90,15 @@
{
"vulnerable": true,
"criteria": "cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.3.36",
"matchCriteriaId": "6E5DE46B-7DD6-4FA2-830A-D559AB2CC70E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*",
"versionStartIncluding": "10.4.0",
"versionEndExcluding": "10.4.26",
"matchCriteriaId": "FB28D8FF-695D-44AE-80BF-42AC6AA65081"
"matchCriteriaId": "76F49D8B-E293-475B-A190-E55F2586EB74"
},
{
"vulnerable": true,

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-5178",
"sourceIdentifier": "secalert@redhat.com",
"published": "2023-11-01T17:15:11.920",
"lastModified": "2024-04-03T14:15:11.910",
"vulnStatus": "Modified",
"lastModified": "2024-06-18T15:10:41.817",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -21,19 +21,19 @@
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"exploitabilityScore": 2.8,
"impactScore": 5.9
},
{
@ -90,38 +90,37 @@
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionEndExcluding": "6.6",
"matchCriteriaId": "9D42A7C6-CE38-4D73-B7AC-615F6D53F783"
"versionStartIncluding": "5.0",
"versionEndExcluding": "5.4.260",
"matchCriteriaId": "4359ECA1-563C-4CC2-86E9-EF11AA522B66"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.6:rc1:*:*:*:*:*:*",
"matchCriteriaId": "84267A4F-DBC2-444F-B41D-69E15E1BEC97"
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.5",
"versionEndExcluding": "5.10.199",
"matchCriteriaId": "8D886A8D-A6CD-44FA-ACF5-DD260ECA7A1B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.6:rc2:*:*:*:*:*:*",
"matchCriteriaId": "FB440208-241C-4246-9A83-C1715C0DAA6C"
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.11",
"versionEndExcluding": "5.15.137",
"matchCriteriaId": "ED031B8B-BFA9-4475-A6D1-1419BDE46E7D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.6:rc3:*:*:*:*:*:*",
"matchCriteriaId": "0DC421F1-3D5A-4BEF-BF76-4E468985D20B"
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.16",
"versionEndExcluding": "6.1.60",
"matchCriteriaId": "E8DBCAF5-D3B4-4DBB-A86B-26B0A6F7B805"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.6:rc4:*:*:*:*:*:*",
"matchCriteriaId": "00AB783B-BE05-40E8-9A55-6AA457D95031"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.6:rc5:*:*:*:*:*:*",
"matchCriteriaId": "E7C78D0A-C4A2-4D41-B726-8979E33AD0F9"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.6:rc6:*:*:*:*:*:*",
"matchCriteriaId": "E114E9DD-F7E1-40CC-AAD5-F14E586CB2E6"
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.2",
"versionEndExcluding": "6.5.9",
"matchCriteriaId": "7530F3AE-8FCB-4E55-B216-62CE4E1CEDA3"
}
]
}
@ -239,51 +238,87 @@
},
{
"url": "https://access.redhat.com/errata/RHSA-2024:0340",
"source": "secalert@redhat.com"
"source": "secalert@redhat.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://access.redhat.com/errata/RHSA-2024:0378",
"source": "secalert@redhat.com"
"source": "secalert@redhat.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://access.redhat.com/errata/RHSA-2024:0386",
"source": "secalert@redhat.com"
"source": "secalert@redhat.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://access.redhat.com/errata/RHSA-2024:0412",
"source": "secalert@redhat.com"
"source": "secalert@redhat.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://access.redhat.com/errata/RHSA-2024:0431",
"source": "secalert@redhat.com"
"source": "secalert@redhat.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://access.redhat.com/errata/RHSA-2024:0432",
"source": "secalert@redhat.com"
"source": "secalert@redhat.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://access.redhat.com/errata/RHSA-2024:0461",
"source": "secalert@redhat.com"
"source": "secalert@redhat.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://access.redhat.com/errata/RHSA-2024:0554",
"source": "secalert@redhat.com"
"source": "secalert@redhat.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://access.redhat.com/errata/RHSA-2024:0575",
"source": "secalert@redhat.com"
"source": "secalert@redhat.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://access.redhat.com/errata/RHSA-2024:1268",
"source": "secalert@redhat.com"
"source": "secalert@redhat.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://access.redhat.com/errata/RHSA-2024:1269",
"source": "secalert@redhat.com"
"source": "secalert@redhat.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://access.redhat.com/errata/RHSA-2024:1278",
"source": "secalert@redhat.com"
"source": "secalert@redhat.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://access.redhat.com/security/cve/CVE-2023-5178",
@ -313,7 +348,8 @@
"source": "secalert@redhat.com",
"tags": [
"Mailing List",
"Patch"
"Patch",
"Vendor Advisory"
]
},
{

View File

@ -2,51 +2,14 @@
"id": "CVE-2023-52685",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-05-17T15:15:19.653",
"lastModified": "2024-05-17T18:35:35.070",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-06-18T14:15:10.603",
"vulnStatus": "Rejected",
"descriptions": [
{
"lang": "en",
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\npstore: ram_core: fix possible overflow in persistent_ram_init_ecc()\n\nIn persistent_ram_init_ecc(), on 64-bit arches DIV_ROUND_UP() will return\n64-bit value since persistent_ram_zone::buffer_size has type size_t which\nis derived from the 64-bit *unsigned long*, while the ecc_blocks variable\nthis value gets assigned to has (always 32-bit) *int* type. Even if that\nvalue fits into *int* type, an overflow is still possible when calculating\nthe size_t typed ecc_total variable further below since there's no cast to\nany 64-bit type before multiplication. Declaring the ecc_blocks variable\nas *size_t* should fix this mess...\n\nFound by Linux Verification Center (linuxtesting.org) with the SVACE static\nanalysis tool."
},
{
"lang": "es",
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: pstore: ram_core: corrige posible desbordamiento en persistent_ram_init_ecc() En persistent_ram_init_ecc(), en arcos de 64 bits DIV_ROUND_UP() devolver\u00e1 un valor de 64 bits ya que persistent_ram_zone::buffer_size tiene el tipo size_t que se deriva del *unsigned long* de 64 bits, mientras que la variable ecc_blocks a la que se asigna este valor tiene (siempre 32 bits) el tipo *int*. Incluso si ese valor encaja en el tipo *int*, a\u00fan es posible un desbordamiento al calcular la variable ecc_total escrita size_t m\u00e1s abajo, ya que no hay conversi\u00f3n a ning\u00fan tipo de 64 bits antes de la multiplicaci\u00f3n. Declarar la variable ecc_blocks como *size_t* deber\u00eda solucionar este problema... Encontrado por el Centro de verificaci\u00f3n de Linux (linuxtesting.org) con la herramienta de an\u00e1lisis est\u00e1tico SVACE."
"value": "Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority."
}
],
"metrics": {},
"references": [
{
"url": "https://git.kernel.org/stable/c/3b333cded94fbe5ce30d699b316c4715151268ae",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/48dcfc42ce705b652c0619cb99846afc43029de9",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/86222a8fc16ec517de8da2604d904c9df3a08e5d",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/8fb12524c86bdd542a54857d5d076b1b6778c78c",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/a34946ec3de88a16cc3a87fdab50aad06255a22b",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/acd413da3e1f37582207cd6078a41d57c9011918",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/d1fe1aede684bd014714dacfdc75586a9ad38657",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/f9b891a7e8fcf83901f8507241e23e7420103b61",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
}
]
"references": []
}

View File

@ -0,0 +1,59 @@
{
"id": "CVE-2024-5275",
"sourceIdentifier": "df4dee71-de3a-4139-9588-11b62fe6c0ff",
"published": "2024-06-18T15:15:52.493",
"lastModified": "2024-06-18T15:15:52.493",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "A hard-coded password in the FileCatalyst TransferAgent can be found which can be used to unlock the keystore from which contents may be read out, for example, the private key for certificates. Exploit of this vulnerability could lead to a machine-in-the-middle (MiTM) attack against users of the agent. This issue affects all versions of FileCatalyst Direct from 3.8.10 Build 138 and earlier and all versions of\u00a0FileCatalyst Workflow from 5.1.6 Build 130 and earlier."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "df4dee71-de3a-4139-9588-11b62fe6c0ff",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "df4dee71-de3a-4139-9588-11b62fe6c0ff",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-259"
}
]
}
],
"references": [
{
"url": "https://support.fortra.com/filecatalyst/kb-articles/action-required-by-june-18th-2024-filecatalyst-transferagent-ssl-and-localhost-changes-MWQwYjI3ZGItZmQyMS1lZjExLTg0MGItMDAyMjQ4MGE0MDNm",
"source": "df4dee71-de3a-4139-9588-11b62fe6c0ff"
},
{
"url": "https://www.fortra.com/security/advisory/fi-2024-007",
"source": "df4dee71-de3a-4139-9588-11b62fe6c0ff"
}
]
}

View File

@ -0,0 +1,15 @@
{
"id": "CVE-2024-5750",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-06-18T14:15:11.383",
"lastModified": "2024-06-18T14:15:11.383",
"vulnStatus": "Rejected",
"descriptions": [
{
"lang": "en",
"value": "Rejected reason: ** REJECT ** Not a valid security issue."
}
],
"metrics": {},
"references": []
}

View File

@ -2,12 +2,16 @@
"id": "CVE-2024-6061",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-06-17T20:15:14.850",
"lastModified": "2024-06-17T20:15:14.850",
"lastModified": "2024-06-18T14:15:11.533",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability has been found in GPAC 2.5-DEV-rev228-g11067ea92-master and classified as problematic. Affected by this vulnerability is the function isoffin_process of the file src/filters/isoffin_read.c of the component MP4Box. The manipulation leads to infinite loop. It is possible to launch the attack on the local host. The exploit has been disclosed to the public and may be used. The identifier of the patch is 20c0f29139a82779b86453ce7f68d0681ec7624c. It is recommended to apply a patch to fix this issue. The identifier VDB-268789 was assigned to this vulnerability."
},
{
"lang": "es",
"value": "Una vulnerabilidad ha sido encontrada en GPAC 2.5-DEV-rev228-g11067ea92-master y clasificada como problem\u00e1tica. La funci\u00f3n isoffin_process del archivo src/filters/isoffin_read.c del componente MP4Box es afectada por esta vulnerabilidad. La manipulaci\u00f3n conduce a un bucle infinito. Es posible lanzar el ataque al servidor local. El exploit ha sido divulgado al p\u00fablico y puede utilizarse. El identificador del parche es 20c0f29139a82779b86453ce7f68d0681ec7624c. Se recomienda aplicar un parche para solucionar este problema. A esta vulnerabilidad se le asign\u00f3 el identificador VDB-268789."
}
],
"metrics": {

View File

@ -2,12 +2,16 @@
"id": "CVE-2024-6062",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-06-17T20:15:15.170",
"lastModified": "2024-06-17T20:15:15.170",
"lastModified": "2024-06-18T14:15:11.670",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was found in GPAC 2.5-DEV-rev228-g11067ea92-master and classified as problematic. Affected by this issue is the function swf_svg_add_iso_sample of the file src/filters/load_text.c of the component MP4Box. The manipulation leads to null pointer dereference. The attack needs to be approached locally. The exploit has been disclosed to the public and may be used. The patch is identified as 31e499d310a48bd17c8b055a0bfe0fe35887a7cd. It is recommended to apply a patch to fix this issue. VDB-268790 is the identifier assigned to this vulnerability."
},
{
"lang": "es",
"value": "Una vulnerabilidad fue encontrada en GPAC 2.5-DEV-rev228-g11067ea92-master y clasificada como problem\u00e1tica. La funci\u00f3n swf_svg_add_iso_sample del archivo src/filters/load_text.c del componente MP4Box es afectada por esta vulnerabilidad. La manipulaci\u00f3n conduce a la desreferencia del puntero nulo. El ataque debe abordarse localmente. El exploit ha sido divulgado al p\u00fablico y puede utilizarse. El parche se identifica como 31e499d310a48bd17c8b055a0bfe0fe35887a7cd. Se recomienda aplicar un parche para solucionar este problema. VDB-268790 es el identificador asignado a esta vulnerabilidad."
}
],
"metrics": {

View File

@ -2,12 +2,16 @@
"id": "CVE-2024-6063",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-06-17T21:15:51.443",
"lastModified": "2024-06-17T21:15:51.443",
"lastModified": "2024-06-18T14:15:11.787",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was found in GPAC 2.5-DEV-rev228-g11067ea92-master. It has been classified as problematic. This affects the function m2tsdmx_on_event of the file src/filters/dmx_m2ts.c of the component MP4Box. The manipulation leads to null pointer dereference. An attack has to be approached locally. The exploit has been disclosed to the public and may be used. The patch is named 8767ed0a77c4b02287db3723e92c2169f67c85d5. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-268791."
},
{
"lang": "es",
"value": "Se encontr\u00f3 una vulnerabilidad en GPAC 2.5-DEV-rev228-g11067ea92-master. Ha sido clasificada como problem\u00e1tica. Esto afecta a la funci\u00f3n m2tsdmx_on_event del archivo src/filters/dmx_m2ts.c del componente MP4Box. La manipulaci\u00f3n conduce a la desreferencia del puntero nulo. Un ataque debe abordarse localmente. El exploit ha sido divulgado al p\u00fablico y puede utilizarse. El parche se llama 8767ed0a77c4b02287db3723e92c2169f67c85d5. Se recomienda aplicar un parche para solucionar este problema. El identificador asociado de esta vulnerabilidad es VDB-268791."
}
],
"metrics": {

View File

@ -2,12 +2,16 @@
"id": "CVE-2024-6064",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-06-17T21:15:51.727",
"lastModified": "2024-06-17T21:15:51.727",
"lastModified": "2024-06-18T14:15:11.917",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was found in GPAC 2.5-DEV-rev228-g11067ea92-master. It has been declared as problematic. This vulnerability affects the function xmt_node_end of the file src/scene_manager/loader_xmt.c of the component MP4Box. The manipulation leads to use after free. Local access is required to approach this attack. The exploit has been disclosed to the public and may be used. The name of the patch is f4b3e4d2f91bc1749e7a924a8ab171af03a355a8/c1b9c794bad8f262c56f3cf690567980d96662f5. It is recommended to apply a patch to fix this issue. The identifier of this vulnerability is VDB-268792."
},
{
"lang": "es",
"value": "Se encontr\u00f3 una vulnerabilidad en GPAC 2.5-DEV-rev228-g11067ea92-master. Ha sido declarada problem\u00e1tica. Esta vulnerabilidad afecta a la funci\u00f3n xmt_node_end del archivo src/scene_manager/loader_xmt.c del componente MP4Box. La manipulaci\u00f3n conduce al use after free. Se requiere acceso local para abordar este ataque. El exploit ha sido divulgado al p\u00fablico y puede utilizarse. El nombre del parche es f4b3e4d2f91bc1749e7a924a8ab171af03a355a8/c1b9c794bad8f262c56f3cf690567980d96662f5. Se recomienda aplicar un parche para solucionar este problema. El identificador de esta vulnerabilidad es VDB-268792."
}
],
"metrics": {

View File

@ -2,12 +2,16 @@
"id": "CVE-2024-6065",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-06-17T21:15:52.007",
"lastModified": "2024-06-17T21:15:52.007",
"lastModified": "2024-06-18T14:15:12.040",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was found in itsourcecode Bakery Online Ordering System 1.0. It has been rated as critical. This issue affects some unknown processing of the file index.php. The manipulation of the argument user_email leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-268793 was assigned to this vulnerability."
},
{
"lang": "es",
"value": "Se encontr\u00f3 una vulnerabilidad en itsourcecode Bakery Online Ordering System 1.0. Ha sido calificada como cr\u00edtica. Este problema afecta un procesamiento desconocido del archivo index.php. La manipulaci\u00f3n del argumento user_email conduce a la inyecci\u00f3n de SQL. El ataque puede iniciarse de forma remota. El exploit ha sido divulgado al p\u00fablico y puede utilizarse. A esta vulnerabilidad se le asign\u00f3 el identificador VDB-268793."
}
],
"metrics": {

View File

@ -2,12 +2,16 @@
"id": "CVE-2024-6066",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-06-17T21:15:52.283",
"lastModified": "2024-06-17T21:15:52.283",
"lastModified": "2024-06-18T14:15:12.183",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability classified as critical has been found in SourceCodester Best House Rental Management System 1.0. Affected is an unknown function of the file payment_report.php. The manipulation of the argument month_of leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. VDB-268794 is the identifier assigned to this vulnerability."
},
{
"lang": "es",
"value": "Una vulnerabilidad ha sido encontrada en SourceCodester Best House Rental Management System 1.0 y clasificada como cr\u00edtica. Una funci\u00f3n desconocida del archivo Payment_report.php es afectada por esta vulnerabilidad. La manipulaci\u00f3n del argumento mes_de conduce a la inyecci\u00f3n de SQL. Es posible lanzar el ataque de forma remota. El exploit ha sido divulgado al p\u00fablico y puede utilizarse. VDB-268794 es el identificador asignado a esta vulnerabilidad."
}
],
"metrics": {

View File

@ -2,12 +2,16 @@
"id": "CVE-2024-6084",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-06-18T01:15:20.333",
"lastModified": "2024-06-18T05:15:52.453",
"lastModified": "2024-06-18T14:15:12.317",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability has been found in itsourcecode Pool of Bethesda Online Reservation System up to 1.0 and classified as critical. Affected by this vulnerability is the function uploadImage of the file /admin/mod_room/controller.php?action=add. The manipulation of the argument image leads to unrestricted upload. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-268825 was assigned to this vulnerability."
},
{
"lang": "es",
"value": "Una vulnerabilidad ha sido encontrada en itsourcecode Pool of Bethesda Online Reservation System hasta 1.0 y clasificada como cr\u00edtica. La funci\u00f3n uploadImage del archivo /admin/mod_room/controller.php?action=add es afectada por esta vulnerabilidad. La manipulaci\u00f3n de la imagen del argumento conduce a una carga sin restricciones. El ataque se puede lanzar de forma remota. El exploit ha sido divulgado al p\u00fablico y puede utilizarse. A esta vulnerabilidad se le asign\u00f3 el identificador VDB-268825."
}
],
"metrics": {

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-6111",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-06-18T13:15:52.193",
"lastModified": "2024-06-18T13:15:52.193",
"lastModified": "2024-06-18T15:15:52.873",
"vulnStatus": "Received",
"descriptions": [
{

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-6112",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-06-18T13:15:52.550",
"lastModified": "2024-06-18T13:15:52.550",
"lastModified": "2024-06-18T15:15:52.993",
"vulnStatus": "Received",
"descriptions": [
{

View File

@ -0,0 +1,92 @@
{
"id": "CVE-2024-6116",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-06-18T14:15:12.440",
"lastModified": "2024-06-18T14:15:12.440",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability, which was classified as critical, has been found in itsourcecode Simple Online Hotel Reservation System 1.0. Affected by this issue is some unknown functionality of the file edit_room.php. The manipulation of the argument photo leads to unrestricted upload. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-268868."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW",
"baseScore": 7.3,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.4
}
],
"cvssMetricV2": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5
},
"baseSeverity": "HIGH",
"exploitabilityScore": 10.0,
"impactScore": 6.4,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-434"
}
]
}
],
"references": [
{
"url": "https://github.com/wangyuan-ui/CVE/issues/6",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?ctiid.268868",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?id.268868",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?submit.359002",
"source": "cna@vuldb.com"
}
]
}

View File

@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update
```plain
2024-06-18T14:00:30.447401+00:00
2024-06-18T16:00:18.327202+00:00
```
### Most recent CVE Modification Timestamp synchronized with NVD
```plain
2024-06-18T13:21:42.383000+00:00
2024-06-18T15:15:52.993000+00:00
```
### Last Data Feed Release
@ -33,32 +33,40 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
### Total Number of included CVEs
```plain
254355
254359
```
### CVEs added in the last Commit
Recently added CVEs: `7`
Recently added CVEs: `4`
- [CVE-2024-5967](CVE-2024/CVE-2024-59xx/CVE-2024-5967.json) (`2024-06-18T12:15:12.707`)
- [CVE-2024-6109](CVE-2024/CVE-2024-61xx/CVE-2024-6109.json) (`2024-06-18T12:15:12.987`)
- [CVE-2024-6110](CVE-2024/CVE-2024-61xx/CVE-2024-6110.json) (`2024-06-18T12:15:13.290`)
- [CVE-2024-6111](CVE-2024/CVE-2024-61xx/CVE-2024-6111.json) (`2024-06-18T13:15:52.193`)
- [CVE-2024-6112](CVE-2024/CVE-2024-61xx/CVE-2024-6112.json) (`2024-06-18T13:15:52.550`)
- [CVE-2024-6114](CVE-2024/CVE-2024-61xx/CVE-2024-6114.json) (`2024-06-18T13:15:52.897`)
- [CVE-2024-6115](CVE-2024/CVE-2024-61xx/CVE-2024-6115.json) (`2024-06-18T13:15:53.267`)
- [CVE-2023-47726](CVE-2023/CVE-2023-477xx/CVE-2023-47726.json) (`2024-06-18T14:15:10.317`)
- [CVE-2024-5275](CVE-2024/CVE-2024-52xx/CVE-2024-5275.json) (`2024-06-18T15:15:52.493`)
- [CVE-2024-5750](CVE-2024/CVE-2024-57xx/CVE-2024-5750.json) (`2024-06-18T14:15:11.383`)
- [CVE-2024-6116](CVE-2024/CVE-2024-61xx/CVE-2024-6116.json) (`2024-06-18T14:15:12.440`)
### CVEs modified in the last Commit
Recently modified CVEs: `6`
Recently modified CVEs: `17`
- [CVE-2023-6236](CVE-2023/CVE-2023-62xx/CVE-2023-6236.json) (`2024-06-18T13:15:51.123`)
- [CVE-2024-0569](CVE-2024/CVE-2024-05xx/CVE-2024-0569.json) (`2024-06-18T13:21:16.393`)
- [CVE-2024-0570](CVE-2024/CVE-2024-05xx/CVE-2024-0570.json) (`2024-06-18T13:21:42.383`)
- [CVE-2024-1132](CVE-2024/CVE-2024-11xx/CVE-2024-1132.json) (`2024-06-18T12:15:12.470`)
- [CVE-2024-1577](CVE-2024/CVE-2024-15xx/CVE-2024-1577.json) (`2024-06-18T13:15:51.627`)
- [CVE-2024-3049](CVE-2024/CVE-2024-30xx/CVE-2024-3049.json) (`2024-06-18T13:15:51.780`)
- [CVE-2018-25103](CVE-2018/CVE-2018-251xx/CVE-2018-25103.json) (`2024-06-18T15:15:51.310`)
- [CVE-2022-30332](CVE-2022/CVE-2022-303xx/CVE-2022-30332.json) (`2024-06-18T14:01:34.683`)
- [CVE-2023-38430](CVE-2023/CVE-2023-384xx/CVE-2023-38430.json) (`2024-06-18T15:10:09.290`)
- [CVE-2023-38431](CVE-2023/CVE-2023-384xx/CVE-2023-38431.json) (`2024-06-18T15:10:03.177`)
- [CVE-2023-39331](CVE-2023/CVE-2023-393xx/CVE-2023-39331.json) (`2024-06-18T15:09:45.857`)
- [CVE-2023-5157](CVE-2023/CVE-2023-51xx/CVE-2023-5157.json) (`2024-06-18T15:09:32.553`)
- [CVE-2023-5178](CVE-2023/CVE-2023-51xx/CVE-2023-5178.json) (`2024-06-18T15:10:41.817`)
- [CVE-2023-52685](CVE-2023/CVE-2023-526xx/CVE-2023-52685.json) (`2024-06-18T14:15:10.603`)
- [CVE-2024-6061](CVE-2024/CVE-2024-60xx/CVE-2024-6061.json) (`2024-06-18T14:15:11.533`)
- [CVE-2024-6062](CVE-2024/CVE-2024-60xx/CVE-2024-6062.json) (`2024-06-18T14:15:11.670`)
- [CVE-2024-6063](CVE-2024/CVE-2024-60xx/CVE-2024-6063.json) (`2024-06-18T14:15:11.787`)
- [CVE-2024-6064](CVE-2024/CVE-2024-60xx/CVE-2024-6064.json) (`2024-06-18T14:15:11.917`)
- [CVE-2024-6065](CVE-2024/CVE-2024-60xx/CVE-2024-6065.json) (`2024-06-18T14:15:12.040`)
- [CVE-2024-6066](CVE-2024/CVE-2024-60xx/CVE-2024-6066.json) (`2024-06-18T14:15:12.183`)
- [CVE-2024-6084](CVE-2024/CVE-2024-60xx/CVE-2024-6084.json) (`2024-06-18T14:15:12.317`)
- [CVE-2024-6111](CVE-2024/CVE-2024-61xx/CVE-2024-6111.json) (`2024-06-18T15:15:52.873`)
- [CVE-2024-6112](CVE-2024/CVE-2024-61xx/CVE-2024-6112.json) (`2024-06-18T15:15:52.993`)
## Download and Usage

View File

@ -121379,7 +121379,7 @@ CVE-2018-25098,0,0,fcae82fd425e45c0b5170e1d16175026afcc4282c8c2d036ab7934ed74d6d
CVE-2018-25099,0,0,4477c16cb5a3503e957873dbddbd3b50ffb7092ffd27acf2a352c93f686dfb7f,2024-03-18T12:38:25.490000
CVE-2018-25100,0,0,26375a09020100e722ed36e37b25c669512cdaa2d61a780ec73480ee78db5d6b,2024-03-25T01:51:01.223000
CVE-2018-25101,0,0,b04dde640afba29853f504e83596fe419f66817bb46aeb488be7718ce77d287c,2024-06-04T19:16:57.060000
CVE-2018-25103,0,0,122206d0dffed87e661f65dbda0c75ede3d4cb0caf0ebcb77979d91738119961,2024-06-17T18:15:12.650000
CVE-2018-25103,0,1,1c9793e149655d3528332820a08b1745b5751a38cb908688b2059c830f89f510,2024-06-18T15:15:51.310000
CVE-2018-2515,0,0,158f882e4275a7485a2b9ce17e7e57c4ea22cf74c55a78a9900c73a4caa327c0,2023-11-07T02:57:57.887000
CVE-2018-2560,0,0,0bb1a26d6c05fddeb488697adb0bbe667a3dd77c1a5bc7af495c8721df5b1197,2020-08-24T17:37:01.140000
CVE-2018-2561,0,0,b76feaa260e2f54fc8eeb8d50d578ffdd22b603f486ac4f8f5b3bc42df22fa45,2018-01-25T13:53:15.120000
@ -198206,7 +198206,7 @@ CVE-2022-30329,0,0,1e4dd5a55573e7e5a013b63f922cccbee97ab466e2a60437c8ca4ae025888
CVE-2022-3033,0,0,04d6f731ac8bfa74ecd44970b9b4139094e5c3f9a2dccd741e7f3aaf386e9788,2023-08-08T14:22:24.967000
CVE-2022-30330,0,0,876c82068abdcf186aa7b3e8a5f8616f863cc3d82cca821d376d16d4b07af7ee,2023-08-08T14:22:24.967000
CVE-2022-30331,0,0,b59f313d8f3ba3a246834807358e04b85d223642f4ad3f5d1588020d00fc8d4a,2024-05-17T02:09:04.580000
CVE-2022-30332,0,0,b38dd0016e3686f9267a0939fa3ceb08c800b32abe3524b6a5899fec0a03e9e4,2024-06-05T05:15:49.087000
CVE-2022-30332,0,1,44a853d0f21cb54a3d6e8f1ab62da33b469752869a0e0ad135055671589c3583,2024-06-18T14:01:34.683000
CVE-2022-30333,0,0,cff77551eb0bbaa9d935030139b5ed47ef9bba58afc5c97e359911b34416e453,2023-09-17T07:15:08.007000
CVE-2022-30334,0,0,cd25538698a372e38cded8a3faa0ddac856c8de83bfb793bc0c3db012023959f,2023-08-08T14:22:24.967000
CVE-2022-30335,0,0,f793ef292c40aa9629afac7f2d724bbe8c9406a4419beea8dad8af24e5cd174a,2022-05-17T19:15:34.883000
@ -228399,8 +228399,8 @@ CVE-2023-38427,0,0,75ab9c629c577dd690eef30687b5ce6b24edeebaf66a5c91af823117fb95d
CVE-2023-38428,0,0,15a6b1356ed09a8c8415d9f703bdf9bc6b627dff267632402a1eefef63ff353a,2023-12-15T15:47:05.687000
CVE-2023-38429,0,0,068d2cd228d1bf53adf50323f53a93f3ac149550136632f36a5f3188e0aad049,2023-12-22T21:34:39.870000
CVE-2023-3843,0,0,1816e2a24b2446f8b8dd3e059ffe34185263b94cf5514d38384b5a9b3d313d8f,2024-05-17T02:27:52.767000
CVE-2023-38430,0,0,7c939f3199334689eb9a9121bba9ea205beab5c0341def1591c47b9ee9a42044,2023-12-22T21:33:45.797000
CVE-2023-38431,0,0,95cba1809b1cc5dee7f8d53f000f61aa82301181a5a7266dfe8b58ae32e54ba3,2023-12-15T15:46:35.903000
CVE-2023-38430,0,1,63fb66be455e95fb0e00d902660bb1391580e90ed160b351fe2166b10cd3f6a9,2024-06-18T15:10:09.290000
CVE-2023-38431,0,1,9848027ba774a0512d03e18eec541cd4fce8c301a4801f30fc2f2850e905530e,2024-06-18T15:10:03.177000
CVE-2023-38432,0,0,ca886ca55aa271f057b4717e9935bf05005b33779fb096159198db28e568bd63,2023-12-22T17:05:07.243000
CVE-2023-38433,0,0,543bebccbe8eb80378175360474e1f98448833d9539acf8c8ea7635438c73a56,2023-11-07T04:17:18.610000
CVE-2023-38434,0,0,4f27d3a8b161c31bbf32f7970313210b522dd8462e4980fa0ee98a268a6a3d53,2023-07-27T04:03:48.217000
@ -229104,7 +229104,7 @@ CVE-2023-39323,0,0,d2da5a246500965f999a8d84c29008728f75c547f230a13d2193b126917ed
CVE-2023-39325,0,0,58abd083daa7fb16a442cdfaef715883a0fb11da9a8652276862d7d26f2ab493,2024-04-28T04:15:09.877000
CVE-2023-39326,0,0,90a833293ecdbd92e4a1c1828cadca50fa959e82465478bc6c6b2b71065dacac,2024-01-20T04:15:07.890000
CVE-2023-3933,0,0,2d784fa3bad269d318314e0780fb5ab15203b6d9670481cab4bae609ef1ad2b5,2023-11-07T04:20:00.337000
CVE-2023-39331,0,0,eb26ffeb716619d2f45aa1a28ea18d12c56b83c2867ee803c4d4520e487f4050,2023-11-17T19:10:41.253000
CVE-2023-39331,0,1,0b3bb94930c7b603cf2498545fe912acbbb259488d38f9dc6f4da6943004dbbd,2024-06-18T15:09:45.857000
CVE-2023-39332,0,0,8b910ceea29382c3501406376a4083bac4d69f69380af431d3b75bb270bf2e58,2023-11-17T19:08:58.170000
CVE-2023-39335,0,0,de59ab60bb008cb37e35574265db4c70c7230619b6903b4fa71f9b7575236eac,2023-11-22T15:06:41.970000
CVE-2023-39336,0,0,b977d6f2b7c9b0fd92c0a178a796d6d1f323429aaee5398b0e65e7fe7b72e509,2024-01-12T18:56:43.137000
@ -235013,6 +235013,7 @@ CVE-2023-47717,0,0,27c384bb2da2247b75e1e97dd81158a4a3f5ec676660f195bcf845b18701a
CVE-2023-47718,0,0,c741441681738efc3979d67da4409868f353d29cc92314f5037f92d0809304bd,2024-01-24T21:23:15.540000
CVE-2023-4772,0,0,2771ff64adbe1ba6f7dfdd5d8e8af50d5674985cd4bd14f9ff6d841da9878bd5,2023-11-07T04:22:57.827000
CVE-2023-47722,0,0,5f2ccb67ee0472008868026b0561431d013bb25eb62913fd40686172191b4bbe,2023-12-12T21:04:18.177000
CVE-2023-47726,1,1,79f6b824922e6bea28adef2f4c43e3eeb3e5389d93758235f1c785aa2fea7522,2024-06-18T14:15:10.317000
CVE-2023-47727,0,0,93638cf13767af0fd87f1a8887a0e85470c71bd37710b8f5a091f8483530bff2,2024-05-02T18:00:37.360000
CVE-2023-4773,0,0,46809a7c239cdb033db621dca5a458d470c07362dae46adc2ff34854ee8e494c,2023-11-07T04:22:57.903000
CVE-2023-47731,0,0,590a1016c4a04e7897213078a5a094bed41ef8ae124e51eb0de721543408fccd,2024-04-24T13:39:42.883000
@ -237526,7 +237527,7 @@ CVE-2023-51566,0,0,94e1aaadce08b01f75bc79ea1c6d391e993527b1b951cc0217a31453244f6
CVE-2023-51567,0,0,ab2dc96677935d703dceb14c524834b502173a141aa7c9126aeebf5a3764973c,2024-05-03T12:48:41.067000
CVE-2023-51568,0,0,16692d2b87817fbf46cac77c30af426e9651464b8cbcaf5a9804306231c1986b,2024-05-03T12:48:41.067000
CVE-2023-51569,0,0,1a0ed883e0414d31878661d0c953a3391d2a8ab4694abdea778e891710d7c0da,2024-05-03T12:48:41.067000
CVE-2023-5157,0,0,1d0186e67e733b7b84da791fca027f69e033934cc5992086125652a51ae820a4,2023-12-22T19:25:31.627000
CVE-2023-5157,0,1,54aa531933036169a2fd181857b0bd4b2ec819cbc887141e2946e61acce52d45,2024-06-18T15:09:32.553000
CVE-2023-51570,0,0,0c484c59d467ef1249fa67651beb8d29a13397de3e29d1b0c9b187c2904ffdce,2024-04-02T12:50:42.233000
CVE-2023-51571,0,0,589136173f756096c29316c51ca8b60231ecfc1b3a6cbbee177bb7ea995409a1,2024-04-02T12:50:42.233000
CVE-2023-51572,0,0,ec93729a9d339c9a51c7a45340e66219b2503c2b96b000a4205093f135398cb2,2024-04-02T12:50:42.233000
@ -237717,7 +237718,7 @@ CVE-2023-51773,0,0,3fca7856a212f205584315672e155b01f780bc641443cddede1df375397bb
CVE-2023-51774,0,0,fa7215009a889524612ddcab0550ac62988088568fe35ca16c3143d27b6818a6,2024-02-29T13:49:47.277000
CVE-2023-51775,0,0,56112969393cba50f3c02ebaa680b83b2f396c5e9abd491c608f39f2f1490f3b,2024-02-29T13:49:47.277000
CVE-2023-51779,0,0,3943f363f5143271e5cbd0ff64b8cc1423a57d413b76d5f71f207b2a469b120f,2024-02-29T13:49:47.277000
CVE-2023-5178,0,0,f06eb1d20f5d3c1e341a9033b7e72f097988ba079ae215a56b33bd5858bc4b15,2024-04-03T14:15:11.910000
CVE-2023-5178,0,1,90a10f9054feb0d5eb4d27e4016e7cb63b10b7b343054fea2022771f54b9e5f0,2024-06-18T15:10:41.817000
CVE-2023-51780,0,0,79cd6e92464f536e130fa2000a4063f5cd270067f2c2bbfecbf436eed213aec5,2024-04-19T07:15:08.857000
CVE-2023-51781,0,0,943dcd6bc9ca41b409437da8a4375ab31f17544ddbdf352ff447f72ff83a2193,2024-01-18T19:58:50.630000
CVE-2023-51782,0,0,4b4197672003cf4578a2bf0f31c16f034d56fceca2a499cb095add5bbd47b401,2024-01-18T19:31:37.630000
@ -238409,7 +238410,7 @@ CVE-2023-52681,0,0,509f45c2847d2260859f6ecad2b21e663945a88e3157b276da7898249775d
CVE-2023-52682,0,0,1fbf2e403d5cf76d28d0dadba77f6a33927da880c816f4db1175b9ba33cef465,2024-05-17T18:35:35.070000
CVE-2023-52683,0,0,d7cd8dc7fea5da9efc826866b4911473c47b91a91787dd229c9f65751f4dc1ed,2024-05-17T18:35:35.070000
CVE-2023-52684,0,0,07a09c1a8df932af204f32eebc29b7ace339bf81055f4f0d3696fcdc198be3c6,2024-05-17T18:35:35.070000
CVE-2023-52685,0,0,32eb18fdf06f58f10a755c94fb6db63cda5aaa0572e237f25e5db6996bf3d5f7,2024-05-17T18:35:35.070000
CVE-2023-52685,0,1,47e5ad6bb0418b1c76808b60c6f2122f54dd28457f9424eccb9bffefa631630a,2024-06-18T14:15:10.603000
CVE-2023-52686,0,0,1455af024106195f7d95a7abb44c6cf2c5dd15b77298475bf021463cc3003295,2024-05-17T18:35:35.070000
CVE-2023-52687,0,0,33bb33182e507cc495047887ed17171c9c7f03b909b6af0aede97bf01c2942db,2024-05-17T18:35:35.070000
CVE-2023-52688,0,0,bad57e985d74d38535bd2e4688483262734901d07b2e2f52a89461916ab4e758,2024-05-17T18:35:35.070000
@ -239495,7 +239496,7 @@ CVE-2023-6232,0,0,ba2cdf630fabf4bd0ac948405fb458e3ef453f28a2bd013f114fe7232f74f8
CVE-2023-6233,0,0,e141cf1ee67a50b45a6156c5de3dd9d7cbd091507ee25334f66900c013dc7478,2024-02-13T19:51:52.220000
CVE-2023-6234,0,0,fb4c5d8548f09d4802bfe5fd795c649c575252902f30a1d37160ae9689639b06,2024-02-13T19:51:46.740000
CVE-2023-6235,0,0,a6ac280c87945b3531740d074fb7f02bafe0fd764523c0dc65a87b2c28ffc24b,2023-11-29T16:59:51.970000
CVE-2023-6236,0,1,afde8ec155d90f171149803b527c8a7f0a301c44d40200664920570dede2b316,2024-06-18T13:15:51.123000
CVE-2023-6236,0,0,afde8ec155d90f171149803b527c8a7f0a301c44d40200664920570dede2b316,2024-06-18T13:15:51.123000
CVE-2023-6237,0,0,8a954ef3e558345567a59213727b6c04680fa3a4a506de71a2a2ca2943f4dec0,2024-06-10T17:16:16.797000
CVE-2023-6238,0,0,7332193d1454e7405dd3270d745aa7f762b874d0f84c51906784a637ceb0212d,2024-02-07T00:15:55.240000
CVE-2023-6239,0,0,6ce1b576ddd7c9169d0997e75fde3efd606153edbf61fba1116d733c98bbf90d,2023-12-04T19:06:20.213000
@ -240835,8 +240836,8 @@ CVE-2024-0565,0,0,503076b050ddf1b2f99cef249fd486ea99d201090173a6a51ed37366436ddf
CVE-2024-0566,0,0,f8107fe8a2fc77834b036d4572e367b8281b39b817bc15b2a6e1011abfda8c03,2024-02-12T17:31:21.670000
CVE-2024-0567,0,0,ce6269b29c71c4b439a81edabcded1234fbec8688220f445d60fe34366ae0a1c,2024-06-10T19:18:32.897000
CVE-2024-0568,0,0,d070da7d1a857e6b1d56c4fd13ea4081c8fab29f674e6572cdd113a3095522cd,2024-02-14T18:04:50.373000
CVE-2024-0569,0,1,ca265484291ad2089dca994102bd0a030fb990ef8e33cdc51d460d98e59ab566,2024-06-18T13:21:16.393000
CVE-2024-0570,0,1,98c6183854a59fe564eedd2f51571740271a3a8a9a1439468989a2d343a8ead8,2024-06-18T13:21:42.383000
CVE-2024-0569,0,0,ca265484291ad2089dca994102bd0a030fb990ef8e33cdc51d460d98e59ab566,2024-06-18T13:21:16.393000
CVE-2024-0570,0,0,98c6183854a59fe564eedd2f51571740271a3a8a9a1439468989a2d343a8ead8,2024-06-18T13:21:42.383000
CVE-2024-0571,0,0,5d87a98734ce1369321019b9c1c644e4f5f01134400cdf4659b101f82c8c48a8,2024-05-17T02:34:47.150000
CVE-2024-0572,0,0,ce7c3cc5ac4a3bbd0ea2708c7608867891f1ebc706ead27ea2fd335ba782f8d4,2024-05-17T02:34:47.253000
CVE-2024-0573,0,0,8dfd74ef7624c33d2d91fd819255ac76fd91d1ed70aab08618bf824b7fdd3872,2024-05-17T02:34:47.360000
@ -241350,7 +241351,7 @@ CVE-2024-1127,0,0,d56eedcfadebd263336bcc9003136ee639f27dd6c46c9263fea0eb8ea044d7
CVE-2024-1128,0,0,a231b73c645395e365defb40ca5d41741520485dac9e62df464e6e1705f68d2e,2024-02-29T13:49:29.390000
CVE-2024-1129,0,0,efcf801aad96aab23ddf4c5c1c7fe067759cd524a5f540fb4b3132cd808f2d93,2024-02-29T13:49:29.390000
CVE-2024-1130,0,0,19b9a2e3e227bc6e3d85f9dd98bd15cfd41c18a2ee1bc79c328385d5148fea32,2024-02-29T13:49:29.390000
CVE-2024-1132,0,1,610debc5161dedd7792fe75050883b4202aa61b518e69f60309c71f8112df23a,2024-06-18T12:15:12.470000
CVE-2024-1132,0,0,610debc5161dedd7792fe75050883b4202aa61b518e69f60309c71f8112df23a,2024-06-18T12:15:12.470000
CVE-2024-1133,0,0,85f4bf6d861639f9431d20ab28a51d2af9f3a3ecb32590788260710816d3a125,2024-02-29T13:49:29.390000
CVE-2024-1134,0,0,2e7c5ee3a71225c7c6e3e9d595fec8d66565da1f8113a13a6b762c5258606aef,2024-05-24T13:03:05.093000
CVE-2024-1135,0,0,2f6bc90f330f2812b6ceb34e2fa1ad9c1c5eca9415bce0719ca3f92f74cd2497,2024-04-16T13:24:07.103000
@ -241754,7 +241755,7 @@ CVE-2024-1570,0,0,1629a1493afa93044df9f22af1e83d093e3e06db82a23b409138b92d94c2f5
CVE-2024-1571,0,0,b1806e0b2d46f5d2ef86ed95b11ec13eeefb63bf2736347df987f91692e6e418,2024-04-10T13:24:00.070000
CVE-2024-1572,0,0,4deddd16a8e62290b13f0cdb450608c505fd6cdf76365f1d944ed8337c4c95f6,2024-05-02T18:00:37.360000
CVE-2024-1576,0,0,6db392527516528e14eb0ea0191722707d0a406a5c4d32feed7275ee783f8c4b,2024-06-13T18:36:09.010000
CVE-2024-1577,0,1,ba33ce0c17d7a340b987ce63ee030c6e2edbd0f04d791d826fcf4cc55f2d4eae,2024-06-18T13:15:51.627000
CVE-2024-1577,0,0,ba33ce0c17d7a340b987ce63ee030c6e2edbd0f04d791d826fcf4cc55f2d4eae,2024-06-18T13:15:51.627000
CVE-2024-1579,0,0,b19774dd42578330a3da1ea9eac4803944dc51b8f7e2cc4d4d08fb40df600dc0,2024-04-30T13:11:16.690000
CVE-2024-1580,0,0,4a10e63fa95d49470234e2661449f906487822e0aeb3a95c53a88e84627958f0,2024-03-27T18:15:09.063000
CVE-2024-1582,0,0,5801086f12a7b25e0a24481309300eacfe3989ff6a37128452730610efa279b1,2024-03-13T12:33:51.697000
@ -248837,7 +248838,7 @@ CVE-2024-30486,0,0,3b668ae931cda4b6a387bfa69ea17dffa696817ef5a0dd2b2ba0b8d1d89d0
CVE-2024-30487,0,0,8478a9894c02433324d52a7694bbe43e86c58bc36ce6feb0280d7b18225d7d5b,2024-04-01T01:12:59.077000
CVE-2024-30488,0,0,9fdeb2b805850984cf4d5d3f20362f356c5feecfdc17015a244efcf21ce430a4,2024-04-01T01:12:59.077000
CVE-2024-30489,0,0,a540270477b853fde36fa10dfe995d2d2e2733bc4b87077bcb9c4c6ebae67f39,2024-04-01T01:12:59.077000
CVE-2024-3049,0,1,a6b3d832ab781727f9346e0de40312d4dd64d2e39cc54fe0dacf61184d1a56b0,2024-06-18T13:15:51.780000
CVE-2024-3049,0,0,a6b3d832ab781727f9346e0de40312d4dd64d2e39cc54fe0dacf61184d1a56b0,2024-06-18T13:15:51.780000
CVE-2024-30490,0,0,90b7ec0455290f5d2e36c376f09e8aa64ea00d396ba819e3726d0e96e7b15d7a,2024-04-01T01:12:59.077000
CVE-2024-30491,0,0,b49d75f845cb12239329721ac75b384e508f42c19c755d45b7137bd1b7ebec86,2024-04-01T01:12:59.077000
CVE-2024-30492,0,0,d40dabecb8ac11d6b8ece8b02edecd34ab567f2bff5c23fac9f75367d1b0fc90,2024-04-01T01:12:59.077000
@ -253982,6 +253983,7 @@ CVE-2024-5271,0,0,d3f4377983bdb14b36061f7826a2769c4b74dac3ab0fd218e99cb4bdcc673a
CVE-2024-5272,0,0,485554be89aaf429d625f742d41620b7105b55f3f82c1bd7e7c2afb7e9a676c6,2024-05-28T12:39:28.377000
CVE-2024-5273,0,0,f7b775afc6e46cbf2933f26022bd5d6a5054d80bf2d607df2ea5eeb06bc0b97e,2024-06-10T18:15:38.157000
CVE-2024-5274,0,0,815675421e4b9c2b34f2340865cc1ed903b3b9cc89dafcd7624436bba1c58088,2024-06-10T17:16:34.257000
CVE-2024-5275,1,1,3fb2b6e2f4f5581f7159d80c2786ba7ce437c9192c9875764b2c058bc3295bc8,2024-06-18T15:15:52.493000
CVE-2024-5277,0,0,08c2f56d5f9c6263336a67bd47c4fa52288bb09bcb2d8aeff245d6d39899edcf,2024-06-07T14:56:05.647000
CVE-2024-5278,0,0,ba4b6329b00a48ecb03cef9d2f0cd09adc7cfa79e9cd9e8eb891a1136335fb69,2024-06-07T14:56:05.647000
CVE-2024-5279,0,0,1f630d4d53c39cf2174e2a1edce8e1a5ead56a314739580d23644f8e4fedef07,2024-06-04T19:21:04.240000
@ -254226,6 +254228,7 @@ CVE-2024-5739,0,0,4e4cf687173db1796e93002e6527d7eafacb6ad9e3e1f9441d82638a10b1e4
CVE-2024-5741,0,0,dc190848ea36093e225eb493a7b699d45fcf50d2cd0656af367577937c3e765a,2024-06-17T12:42:04.623000
CVE-2024-5742,0,0,a52d500d47b6c5d306e493aed82844a67ba1ec935bd3dcc9d1575df0fba9dc97,2024-06-17T12:15:49.850000
CVE-2024-5745,0,0,e6d6a2ad17b4c76965d8e06659a07345c55e76c97ae26acd6c0df2c3c7c9c9e4,2024-06-08T04:15:10.027000
CVE-2024-5750,1,1,03159524f0152f136fbf677dd96b04f6ea701d7a55e178491af9632e52209686,2024-06-18T14:15:11.383000
CVE-2024-5757,0,0,2cb36649eaa1d48a108ca94d996085007ec3e42f656c65bc44e14eb0243a4f70,2024-06-13T18:36:09.010000
CVE-2024-5758,0,0,250b274bfcefb72defbd26103c82d5c8ed585b7571d3785565c3013fdb6e4a03,2024-06-13T21:15:57.543000
CVE-2024-5759,0,0,a8b20ed9df5a502bc1dbe4283a67eed19771ffb4a4f02a90724215ed5101a898,2024-06-13T18:36:09.010000
@ -254302,7 +254305,7 @@ CVE-2024-5951,0,0,7ddd1cddf9a9fdc846148c5866e7aa3c8ed2def81486ca15d97d818d600ecb
CVE-2024-5952,0,0,a56b129ed0896e22b77ffae27056ae02e2ff1e28286e49f9b0ac6b9f084a57b2,2024-06-17T12:43:31.090000
CVE-2024-5953,0,0,9ea5135a8dda1dad51ca93f6728c4080a08758d993efcfa67e208f3eb48bc4e5,2024-06-18T10:15:11.170000
CVE-2024-5961,0,0,5b2a3ec0406c808b5387d2b9b0077c5bc424b1c4427d5cb7165a954efcfd8c0c,2024-06-17T12:42:04.623000
CVE-2024-5967,1,1,2e6937701802b31975daa50ca2c8947b1ca4041c2416c87363e635155af92998,2024-06-18T12:15:12.707000
CVE-2024-5967,0,0,2e6937701802b31975daa50ca2c8947b1ca4041c2416c87363e635155af92998,2024-06-18T12:15:12.707000
CVE-2024-5976,0,0,e855126a3e03657c0f9ccfb70e360e6531fe17aa442fb39ef6227c53616360fe,2024-06-17T12:43:31.090000
CVE-2024-5981,0,0,7870df79665c127e5a33d8fe67e56d8db296d9f7a121386a1275e14871265ba2,2024-06-17T12:43:31.090000
CVE-2024-5983,0,0,c879618580c4659b3410af89e8bf56c9d9f664bfd2edad2ed7d70a9157784269,2024-06-17T12:43:31.090000
@ -254336,21 +254339,22 @@ CVE-2024-6056,0,0,636228dd1a2c8f5c63676f25cc803d23af23082b986789068b58dd9fd2a57e
CVE-2024-6057,0,0,cfabce49b9db224e3720b6479e81ee1edcd2fcbaabb39bed0063a52236765ccd,2024-06-17T13:15:53.800000
CVE-2024-6058,0,0,3ee08d4ad26cf88da329a5e1271ed474432fcbd63bb5792a008ded1da8686681,2024-06-17T18:15:18.520000
CVE-2024-6059,0,0,8dc3785d03b4bbf495bb7b9e0db50afd358453b35356b7519dfcb40c8d9c6a71,2024-06-17T19:15:59.467000
CVE-2024-6061,0,0,e3994abe87d8171c8e3b6a2bfacb5133544b1c463e71028fb8ff174c440a1265,2024-06-17T20:15:14.850000
CVE-2024-6062,0,0,47cd221b4b8aabce9ad30cff9ce6a2ec0e7cd03e3e3078c16a8749b69ae8d8eb,2024-06-17T20:15:15.170000
CVE-2024-6063,0,0,b67d10210bed54ecb8364f0d64a24e8a9bb67fda8d7cdbfbf01d23eb1fcb1bb1,2024-06-17T21:15:51.443000
CVE-2024-6064,0,0,dfa0698ee8caf241b62eef71e2d604b23eb45d719d7bfffd9edd5b3eea92dc02,2024-06-17T21:15:51.727000
CVE-2024-6065,0,0,ec7d6c92bf7a949498dd9805836d3dc45c84184ec068d4330849b9f7c74e24ca,2024-06-17T21:15:52.007000
CVE-2024-6066,0,0,4be16afb26a67eeaa99325b278e1eb15007f8629556d5972406c66487d6fe7ae,2024-06-17T21:15:52.283000
CVE-2024-6061,0,1,39aa63f2908fac2ea5c6c93ac26be0cb4e028f86f6241c593e1bff1e191c4192,2024-06-18T14:15:11.533000
CVE-2024-6062,0,1,dadd6f95b83f87273cc3430212566c912259c48e3b6224cff1d8d43c9528602d,2024-06-18T14:15:11.670000
CVE-2024-6063,0,1,a884af0a7239f5992275086d49c24161d8ae303993e8264675b0420da667ecf0,2024-06-18T14:15:11.787000
CVE-2024-6064,0,1,a437d20d126de2e6302df618fc0fd61b6c1098a65016c7857130e623e34d608e,2024-06-18T14:15:11.917000
CVE-2024-6065,0,1,12bfac21a4497db8b2fae053bb336fb3006fa216a4f3adf1332cf2a8bbd53392,2024-06-18T14:15:12.040000
CVE-2024-6066,0,1,f38956b7531d73be2ff37e0312497b9f2b99af618ba528ef846e38c1b677fe14,2024-06-18T14:15:12.183000
CVE-2024-6067,0,0,917ec11acc59771cd289e02ed472e235338a36350e131e2242624c6b5a660576,2024-06-17T22:15:10.657000
CVE-2024-6080,0,0,ce117abbbf27c271f3b1c554aeba9f1090748517ce038abb4811acdf5fadb2ed,2024-06-17T23:15:51.583000
CVE-2024-6082,0,0,b34a8b9e9d7597c030b945a5724fac42f5803ca75f53728fefe9f424acf1cad3,2024-06-17T23:15:51.920000
CVE-2024-6083,0,0,6fddaebd6fd505529ccfd2377fbb90eb3ff967f1b7daa3e62aab60a1d99a55f2,2024-06-18T00:15:09.853000
CVE-2024-6084,0,0,c58d4bbed9965d0c5b3b3d3408fb3218484aa76898e857d18c4411d57b93b108,2024-06-18T05:15:52.453000
CVE-2024-6084,0,1,e83127a2367dfc14c5a74f105b11646fecd7f02b89d4abf85a631505a5590b54,2024-06-18T14:15:12.317000
CVE-2024-6108,0,0,629cb2a981568eef963fe0fd8730638a990cab0f00ba579fb1df944ef1acda4c,2024-06-18T10:15:11.653000
CVE-2024-6109,1,1,ac88b829202223826825501cf9791e4a037baf3e8842ea6d10b43cea56f9fb4c,2024-06-18T12:15:12.987000
CVE-2024-6110,1,1,a93edb70ebaea05e4db1d298919bf28b75b9891dd6a65a876e1ff434451eb3ce,2024-06-18T12:15:13.290000
CVE-2024-6111,1,1,bc873de4e889be7e6632456fd1a89d48a4304c5a7bdb8843bc0410a2f182bce5,2024-06-18T13:15:52.193000
CVE-2024-6112,1,1,da88edb1478698d60df0ecb0ee1f4342d71663ceba8a402c5714d3e3265c94a5,2024-06-18T13:15:52.550000
CVE-2024-6114,1,1,b861f686c72ead40271b9e15f5d48ada8c079a2c4c9ea1405ca71da7d3acf766,2024-06-18T13:15:52.897000
CVE-2024-6115,1,1,8370727144c08f52daee8853cdc1c595dffde958a895699c94efac517eada338,2024-06-18T13:15:53.267000
CVE-2024-6109,0,0,ac88b829202223826825501cf9791e4a037baf3e8842ea6d10b43cea56f9fb4c,2024-06-18T12:15:12.987000
CVE-2024-6110,0,0,a93edb70ebaea05e4db1d298919bf28b75b9891dd6a65a876e1ff434451eb3ce,2024-06-18T12:15:13.290000
CVE-2024-6111,0,1,88ff3438da2fa6dff09fb1e17ea9913d07168b3e37cac6ddb91200dd8cb971da,2024-06-18T15:15:52.873000
CVE-2024-6112,0,1,3793178079993987ba7bf7b37db89ff5b23660048ce424d2f0351839dfc7b7ff,2024-06-18T15:15:52.993000
CVE-2024-6114,0,0,b861f686c72ead40271b9e15f5d48ada8c079a2c4c9ea1405ca71da7d3acf766,2024-06-18T13:15:52.897000
CVE-2024-6115,0,0,8370727144c08f52daee8853cdc1c595dffde958a895699c94efac517eada338,2024-06-18T13:15:53.267000
CVE-2024-6116,1,1,a2793b73386932d7a864e25346b6e23f449b2a47357972e066a61098cb00943e,2024-06-18T14:15:12.440000

Can't render this file because it is too large.