From 6aac2c86cd432a364061918a8016d22e21f5887a Mon Sep 17 00:00:00 2001 From: cad-safe-bot Date: Tue, 18 Jun 2024 16:03:10 +0000 Subject: [PATCH] Auto-Update: 2024-06-18T16:00:18.327202+00:00 --- CVE-2018/CVE-2018-251xx/CVE-2018-25103.json | 16 +-- CVE-2022/CVE-2022-303xx/CVE-2022-30332.json | 12 +- CVE-2023/CVE-2023-384xx/CVE-2023-38430.json | 11 +- CVE-2023/CVE-2023-384xx/CVE-2023-38431.json | 11 +- CVE-2023/CVE-2023-393xx/CVE-2023-39331.json | 6 +- CVE-2023/CVE-2023-477xx/CVE-2023-47726.json | 59 ++++++++++ CVE-2023/CVE-2023-51xx/CVE-2023-5157.json | 11 +- CVE-2023/CVE-2023-51xx/CVE-2023-5178.json | 116 +++++++++++++------- CVE-2023/CVE-2023-526xx/CVE-2023-52685.json | 45 +------- CVE-2024/CVE-2024-52xx/CVE-2024-5275.json | 59 ++++++++++ CVE-2024/CVE-2024-57xx/CVE-2024-5750.json | 15 +++ CVE-2024/CVE-2024-60xx/CVE-2024-6061.json | 6 +- CVE-2024/CVE-2024-60xx/CVE-2024-6062.json | 6 +- CVE-2024/CVE-2024-60xx/CVE-2024-6063.json | 6 +- CVE-2024/CVE-2024-60xx/CVE-2024-6064.json | 6 +- CVE-2024/CVE-2024-60xx/CVE-2024-6065.json | 6 +- CVE-2024/CVE-2024-60xx/CVE-2024-6066.json | 6 +- CVE-2024/CVE-2024-60xx/CVE-2024-6084.json | 6 +- CVE-2024/CVE-2024-61xx/CVE-2024-6111.json | 2 +- CVE-2024/CVE-2024-61xx/CVE-2024-6112.json | 2 +- CVE-2024/CVE-2024-61xx/CVE-2024-6116.json | 92 ++++++++++++++++ README.md | 44 +++++--- _state.csv | 60 +++++----- 23 files changed, 446 insertions(+), 157 deletions(-) create mode 100644 CVE-2023/CVE-2023-477xx/CVE-2023-47726.json create mode 100644 CVE-2024/CVE-2024-52xx/CVE-2024-5275.json create mode 100644 CVE-2024/CVE-2024-57xx/CVE-2024-5750.json create mode 100644 CVE-2024/CVE-2024-61xx/CVE-2024-6116.json diff --git a/CVE-2018/CVE-2018-251xx/CVE-2018-25103.json b/CVE-2018/CVE-2018-251xx/CVE-2018-25103.json index 7de2b94f2b7..590b10483ed 100644 --- a/CVE-2018/CVE-2018-251xx/CVE-2018-25103.json +++ b/CVE-2018/CVE-2018-251xx/CVE-2018-25103.json @@ -2,30 +2,30 @@ "id": "CVE-2018-25103", "sourceIdentifier": "cret@cert.org", "published": "2024-06-17T18:15:12.650", - "lastModified": "2024-06-17T18:15:12.650", + "lastModified": "2024-06-18T15:15:51.310", "vulnStatus": "Received", "descriptions": [ { "lang": "en", - "value": "There exists a use-after-free-vulnerability in lighttpd <= 1.4.50 that can allow access to do a case-insensitive comparison against the reused pointer." + "value": "There exists use-after-free vulnerabilities in lighttpd <= 1.4.50 request parsing which might read from invalid pointers to memory used in the same request, not from other requests." + }, + { + "lang": "es", + "value": "Existe una vulnerabilidad de use-after-free en lighttpd <= 1.4.50 que puede permitir el acceso para realizar una comparaci\u00f3n que no distinga entre may\u00fasculas y min\u00fasculas con el puntero reutilizado." } ], "metrics": {}, "references": [ - { - "url": "https://9443417.fs1.hubspotusercontent-na1.net/hubfs/9443417/Security%20Advisories/2024/AMI-SA-2024002.pdf", - "source": "cret@cert.org" - }, { "url": "https://blogvdoo.wordpress.com/2018/11/06/giving-back-securing-open-source-iot-projects/#more-736", "source": "cret@cert.org" }, { - "url": "https://github.com/lighttpd/lighttpd1.4/commit/df8e4f95614e476276a55e34da2aa8b00b1148e9", + "url": "https://github.com/lighttpd/lighttpd1.4/commit/d161f53de04bc826ce1bdaeb3dce2c72ca50a3f8", "source": "cret@cert.org" }, { - "url": "https://www.binarly.io/blog/lighttpd-gains-new-life", + "url": "https://github.com/lighttpd/lighttpd1.4/commit/df8e4f95614e476276a55e34da2aa8b00b1148e9", "source": "cret@cert.org" }, { diff --git a/CVE-2022/CVE-2022-303xx/CVE-2022-30332.json b/CVE-2022/CVE-2022-303xx/CVE-2022-30332.json index 05f64524340..406db7911e8 100644 --- a/CVE-2022/CVE-2022-303xx/CVE-2022-30332.json +++ b/CVE-2022/CVE-2022-303xx/CVE-2022-30332.json @@ -2,8 +2,8 @@ "id": "CVE-2022-30332", "sourceIdentifier": "cve@mitre.org", "published": "2023-01-10T21:15:11.520", - "lastModified": "2024-06-05T05:15:49.087", - "vulnStatus": "Modified", + "lastModified": "2024-06-18T14:01:34.683", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -65,7 +65,7 @@ "description": [ { "lang": "en", - "value": "CWE-640" + "value": "CWE-203" } ] } @@ -90,7 +90,10 @@ "references": [ { "url": "https://cwe.mitre.org/data/definitions/204.html", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Technical Description" + ] }, { "url": "https://excellium-services.com/cert-xlm-advisory/CVE-2022-30332", @@ -103,6 +106,7 @@ "url": "https://help.talend.com/r/62tbPt7y~tPTxAB7y7KpeQ/H45WqEF32geNEZiGJnRwmw", "source": "cve@mitre.org", "tags": [ + "Broken Link", "Release Notes", "Vendor Advisory" ] diff --git a/CVE-2023/CVE-2023-384xx/CVE-2023-38430.json b/CVE-2023/CVE-2023-384xx/CVE-2023-38430.json index 3b4a461a352..f58caa3685d 100644 --- a/CVE-2023/CVE-2023-384xx/CVE-2023-38430.json +++ b/CVE-2023/CVE-2023-384xx/CVE-2023-38430.json @@ -2,7 +2,7 @@ "id": "CVE-2023-38430", "sourceIdentifier": "cve@mitre.org", "published": "2023-07-18T00:15:09.663", - "lastModified": "2023-12-22T21:33:45.797", + "lastModified": "2024-06-18T15:10:09.290", "vulnStatus": "Analyzed", "descriptions": [ { @@ -57,8 +57,15 @@ "vulnerable": true, "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "versionStartIncluding": "5.15", + "versionEndExcluding": "5.15.145", + "matchCriteriaId": "6943BD04-722B-4B0F-810D-A5086EA877BB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.16", "versionEndExcluding": "6.1.35", - "matchCriteriaId": "6442A7ED-1F45-4D16-8B82-9D9364C0809B" + "matchCriteriaId": "05A707A2-83A7-4FED-8BE0-DBB381F97694" }, { "vulnerable": true, diff --git a/CVE-2023/CVE-2023-384xx/CVE-2023-38431.json b/CVE-2023/CVE-2023-384xx/CVE-2023-38431.json index 578ec6e1d0b..a72330e0685 100644 --- a/CVE-2023/CVE-2023-384xx/CVE-2023-38431.json +++ b/CVE-2023/CVE-2023-384xx/CVE-2023-38431.json @@ -2,7 +2,7 @@ "id": "CVE-2023-38431", "sourceIdentifier": "cve@mitre.org", "published": "2023-07-18T00:15:09.707", - "lastModified": "2023-12-15T15:46:35.903", + "lastModified": "2024-06-18T15:10:03.177", "vulnStatus": "Analyzed", "descriptions": [ { @@ -57,8 +57,15 @@ "vulnerable": true, "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "versionStartIncluding": "5.15", + "versionEndExcluding": "5.15.145", + "matchCriteriaId": "6943BD04-722B-4B0F-810D-A5086EA877BB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.16", "versionEndExcluding": "6.1.34", - "matchCriteriaId": "4F5A5D4B-4F1F-455D-8917-7785595FACF7" + "matchCriteriaId": "827DE634-7B30-489B-8DA2-F753BE881D9B" }, { "vulnerable": true, diff --git a/CVE-2023/CVE-2023-393xx/CVE-2023-39331.json b/CVE-2023/CVE-2023-393xx/CVE-2023-39331.json index 69caaf1c62d..77f5eefe3cd 100644 --- a/CVE-2023/CVE-2023-393xx/CVE-2023-39331.json +++ b/CVE-2023/CVE-2023-393xx/CVE-2023-39331.json @@ -2,7 +2,7 @@ "id": "CVE-2023-39331", "sourceIdentifier": "support@hackerone.com", "published": "2023-10-18T04:15:11.257", - "lastModified": "2023-11-17T19:10:41.253", + "lastModified": "2024-06-18T15:09:45.857", "vulnStatus": "Analyzed", "descriptions": [ { @@ -83,8 +83,8 @@ "vulnerable": true, "criteria": "cpe:2.3:a:nodejs:node.js:*:*:*:*:-:*:*:*", "versionStartIncluding": "20.0.0", - "versionEndExcluding": "20.8.0", - "matchCriteriaId": "6BD3775B-9921-452D-ACF2-626A96B781F0" + "versionEndExcluding": "20.8.1", + "matchCriteriaId": "AF062340-A490-41E3-8A34-2C07644402DE" } ] } diff --git a/CVE-2023/CVE-2023-477xx/CVE-2023-47726.json b/CVE-2023/CVE-2023-477xx/CVE-2023-47726.json new file mode 100644 index 00000000000..9183be7e758 --- /dev/null +++ b/CVE-2023/CVE-2023-477xx/CVE-2023-47726.json @@ -0,0 +1,59 @@ +{ + "id": "CVE-2023-47726", + "sourceIdentifier": "psirt@us.ibm.com", + "published": "2024-06-18T14:15:10.317", + "lastModified": "2024-06-18T14:15:10.317", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "IBM QRadar Suite Software 1.10.12.0 through 1.10.21.0 and IBM Cloud Pak for Security 1.10.12.0 through 1.10.21.0 could allow an authenticated user to execute certain arbitrary commands due to improper input validation. IBM X-Force ID: 272087." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@us.ibm.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 7.1, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 4.2 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@us.ibm.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-1287" + } + ] + } + ], + "references": [ + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/272087", + "source": "psirt@us.ibm.com" + }, + { + "url": "https://https://www.ibm.com/support/pages/node/7157750", + "source": "psirt@us.ibm.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-51xx/CVE-2023-5157.json b/CVE-2023/CVE-2023-51xx/CVE-2023-5157.json index 7da07b4eb43..4a5af2d50e2 100644 --- a/CVE-2023/CVE-2023-51xx/CVE-2023-5157.json +++ b/CVE-2023/CVE-2023-51xx/CVE-2023-5157.json @@ -2,7 +2,7 @@ "id": "CVE-2023-5157", "sourceIdentifier": "secalert@redhat.com", "published": "2023-09-27T15:19:41.807", - "lastModified": "2023-12-22T19:25:31.627", + "lastModified": "2024-06-18T15:09:32.553", "vulnStatus": "Analyzed", "descriptions": [ { @@ -90,8 +90,15 @@ { "vulnerable": true, "criteria": "cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.3.36", + "matchCriteriaId": "6E5DE46B-7DD6-4FA2-830A-D559AB2CC70E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*", + "versionStartIncluding": "10.4.0", "versionEndExcluding": "10.4.26", - "matchCriteriaId": "FB28D8FF-695D-44AE-80BF-42AC6AA65081" + "matchCriteriaId": "76F49D8B-E293-475B-A190-E55F2586EB74" }, { "vulnerable": true, diff --git a/CVE-2023/CVE-2023-51xx/CVE-2023-5178.json b/CVE-2023/CVE-2023-51xx/CVE-2023-5178.json index c5738eb3d2a..f7ee78248f6 100644 --- a/CVE-2023/CVE-2023-51xx/CVE-2023-5178.json +++ b/CVE-2023/CVE-2023-51xx/CVE-2023-5178.json @@ -2,8 +2,8 @@ "id": "CVE-2023-5178", "sourceIdentifier": "secalert@redhat.com", "published": "2023-11-01T17:15:11.920", - "lastModified": "2024-04-03T14:15:11.910", - "vulnStatus": "Modified", + "lastModified": "2024-06-18T15:10:41.817", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -21,19 +21,19 @@ "type": "Primary", "cvssData": { "version": "3.1", - "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "attackVector": "NETWORK", "attackComplexity": "LOW", - "privilegesRequired": "NONE", + "privilegesRequired": "LOW", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "availabilityImpact": "HIGH", - "baseScore": 9.8, - "baseSeverity": "CRITICAL" + "baseScore": 8.8, + "baseSeverity": "HIGH" }, - "exploitabilityScore": 3.9, + "exploitabilityScore": 2.8, "impactScore": 5.9 }, { @@ -90,38 +90,37 @@ { "vulnerable": true, "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", - "versionEndExcluding": "6.6", - "matchCriteriaId": "9D42A7C6-CE38-4D73-B7AC-615F6D53F783" + "versionStartIncluding": "5.0", + "versionEndExcluding": "5.4.260", + "matchCriteriaId": "4359ECA1-563C-4CC2-86E9-EF11AA522B66" }, { "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:6.6:rc1:*:*:*:*:*:*", - "matchCriteriaId": "84267A4F-DBC2-444F-B41D-69E15E1BEC97" + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.5", + "versionEndExcluding": "5.10.199", + "matchCriteriaId": "8D886A8D-A6CD-44FA-ACF5-DD260ECA7A1B" }, { "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:6.6:rc2:*:*:*:*:*:*", - "matchCriteriaId": "FB440208-241C-4246-9A83-C1715C0DAA6C" + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.11", + "versionEndExcluding": "5.15.137", + "matchCriteriaId": "ED031B8B-BFA9-4475-A6D1-1419BDE46E7D" }, { "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:6.6:rc3:*:*:*:*:*:*", - "matchCriteriaId": "0DC421F1-3D5A-4BEF-BF76-4E468985D20B" + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.16", + "versionEndExcluding": "6.1.60", + "matchCriteriaId": "E8DBCAF5-D3B4-4DBB-A86B-26B0A6F7B805" }, { "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:6.6:rc4:*:*:*:*:*:*", - "matchCriteriaId": "00AB783B-BE05-40E8-9A55-6AA457D95031" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:6.6:rc5:*:*:*:*:*:*", - "matchCriteriaId": "E7C78D0A-C4A2-4D41-B726-8979E33AD0F9" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:6.6:rc6:*:*:*:*:*:*", - "matchCriteriaId": "E114E9DD-F7E1-40CC-AAD5-F14E586CB2E6" + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.2", + "versionEndExcluding": "6.5.9", + "matchCriteriaId": "7530F3AE-8FCB-4E55-B216-62CE4E1CEDA3" } ] } @@ -239,51 +238,87 @@ }, { "url": "https://access.redhat.com/errata/RHSA-2024:0340", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://access.redhat.com/errata/RHSA-2024:0378", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://access.redhat.com/errata/RHSA-2024:0386", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://access.redhat.com/errata/RHSA-2024:0412", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://access.redhat.com/errata/RHSA-2024:0431", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://access.redhat.com/errata/RHSA-2024:0432", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://access.redhat.com/errata/RHSA-2024:0461", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://access.redhat.com/errata/RHSA-2024:0554", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://access.redhat.com/errata/RHSA-2024:0575", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://access.redhat.com/errata/RHSA-2024:1268", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://access.redhat.com/errata/RHSA-2024:1269", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://access.redhat.com/errata/RHSA-2024:1278", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://access.redhat.com/security/cve/CVE-2023-5178", @@ -313,7 +348,8 @@ "source": "secalert@redhat.com", "tags": [ "Mailing List", - "Patch" + "Patch", + "Vendor Advisory" ] }, { diff --git a/CVE-2023/CVE-2023-526xx/CVE-2023-52685.json b/CVE-2023/CVE-2023-526xx/CVE-2023-52685.json index 6dafe686e98..9d9576505e4 100644 --- a/CVE-2023/CVE-2023-526xx/CVE-2023-52685.json +++ b/CVE-2023/CVE-2023-526xx/CVE-2023-52685.json @@ -2,51 +2,14 @@ "id": "CVE-2023-52685", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-05-17T15:15:19.653", - "lastModified": "2024-05-17T18:35:35.070", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-06-18T14:15:10.603", + "vulnStatus": "Rejected", "descriptions": [ { "lang": "en", - "value": "In the Linux kernel, the following vulnerability has been resolved:\n\npstore: ram_core: fix possible overflow in persistent_ram_init_ecc()\n\nIn persistent_ram_init_ecc(), on 64-bit arches DIV_ROUND_UP() will return\n64-bit value since persistent_ram_zone::buffer_size has type size_t which\nis derived from the 64-bit *unsigned long*, while the ecc_blocks variable\nthis value gets assigned to has (always 32-bit) *int* type. Even if that\nvalue fits into *int* type, an overflow is still possible when calculating\nthe size_t typed ecc_total variable further below since there's no cast to\nany 64-bit type before multiplication. Declaring the ecc_blocks variable\nas *size_t* should fix this mess...\n\nFound by Linux Verification Center (linuxtesting.org) with the SVACE static\nanalysis tool." - }, - { - "lang": "es", - "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: pstore: ram_core: corrige posible desbordamiento en persistent_ram_init_ecc() En persistent_ram_init_ecc(), en arcos de 64 bits DIV_ROUND_UP() devolver\u00e1 un valor de 64 bits ya que persistent_ram_zone::buffer_size tiene el tipo size_t que se deriva del *unsigned long* de 64 bits, mientras que la variable ecc_blocks a la que se asigna este valor tiene (siempre 32 bits) el tipo *int*. Incluso si ese valor encaja en el tipo *int*, a\u00fan es posible un desbordamiento al calcular la variable ecc_total escrita size_t m\u00e1s abajo, ya que no hay conversi\u00f3n a ning\u00fan tipo de 64 bits antes de la multiplicaci\u00f3n. Declarar la variable ecc_blocks como *size_t* deber\u00eda solucionar este problema... Encontrado por el Centro de verificaci\u00f3n de Linux (linuxtesting.org) con la herramienta de an\u00e1lisis est\u00e1tico SVACE." + "value": "Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority." } ], "metrics": {}, - "references": [ - { - "url": "https://git.kernel.org/stable/c/3b333cded94fbe5ce30d699b316c4715151268ae", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" - }, - { - "url": "https://git.kernel.org/stable/c/48dcfc42ce705b652c0619cb99846afc43029de9", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" - }, - { - "url": "https://git.kernel.org/stable/c/86222a8fc16ec517de8da2604d904c9df3a08e5d", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" - }, - { - "url": "https://git.kernel.org/stable/c/8fb12524c86bdd542a54857d5d076b1b6778c78c", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" - }, - { - "url": "https://git.kernel.org/stable/c/a34946ec3de88a16cc3a87fdab50aad06255a22b", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" - }, - { - "url": "https://git.kernel.org/stable/c/acd413da3e1f37582207cd6078a41d57c9011918", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" - }, - { - "url": "https://git.kernel.org/stable/c/d1fe1aede684bd014714dacfdc75586a9ad38657", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" - }, - { - "url": "https://git.kernel.org/stable/c/f9b891a7e8fcf83901f8507241e23e7420103b61", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" - } - ] + "references": [] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-52xx/CVE-2024-5275.json b/CVE-2024/CVE-2024-52xx/CVE-2024-5275.json new file mode 100644 index 00000000000..6a5965f8670 --- /dev/null +++ b/CVE-2024/CVE-2024-52xx/CVE-2024-5275.json @@ -0,0 +1,59 @@ +{ + "id": "CVE-2024-5275", + "sourceIdentifier": "df4dee71-de3a-4139-9588-11b62fe6c0ff", + "published": "2024-06-18T15:15:52.493", + "lastModified": "2024-06-18T15:15:52.493", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "A hard-coded password in the FileCatalyst TransferAgent can be found which can be used to unlock the keystore from which contents may be read out, for example, the private key for certificates. Exploit of this vulnerability could lead to a machine-in-the-middle (MiTM) attack against users of the agent. This issue affects all versions of FileCatalyst Direct from 3.8.10 Build 138 and earlier and all versions of\u00a0FileCatalyst Workflow from 5.1.6 Build 130 and earlier." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "df4dee71-de3a-4139-9588-11b62fe6c0ff", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "df4dee71-de3a-4139-9588-11b62fe6c0ff", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-259" + } + ] + } + ], + "references": [ + { + "url": "https://support.fortra.com/filecatalyst/kb-articles/action-required-by-june-18th-2024-filecatalyst-transferagent-ssl-and-localhost-changes-MWQwYjI3ZGItZmQyMS1lZjExLTg0MGItMDAyMjQ4MGE0MDNm", + "source": "df4dee71-de3a-4139-9588-11b62fe6c0ff" + }, + { + "url": "https://www.fortra.com/security/advisory/fi-2024-007", + "source": "df4dee71-de3a-4139-9588-11b62fe6c0ff" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-57xx/CVE-2024-5750.json b/CVE-2024/CVE-2024-57xx/CVE-2024-5750.json new file mode 100644 index 00000000000..880c164144a --- /dev/null +++ b/CVE-2024/CVE-2024-57xx/CVE-2024-5750.json @@ -0,0 +1,15 @@ +{ + "id": "CVE-2024-5750", + "sourceIdentifier": "security@wordfence.com", + "published": "2024-06-18T14:15:11.383", + "lastModified": "2024-06-18T14:15:11.383", + "vulnStatus": "Rejected", + "descriptions": [ + { + "lang": "en", + "value": "Rejected reason: ** REJECT ** Not a valid security issue." + } + ], + "metrics": {}, + "references": [] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-60xx/CVE-2024-6061.json b/CVE-2024/CVE-2024-60xx/CVE-2024-6061.json index b24a404932a..2f6e4506a81 100644 --- a/CVE-2024/CVE-2024-60xx/CVE-2024-6061.json +++ b/CVE-2024/CVE-2024-60xx/CVE-2024-6061.json @@ -2,12 +2,16 @@ "id": "CVE-2024-6061", "sourceIdentifier": "cna@vuldb.com", "published": "2024-06-17T20:15:14.850", - "lastModified": "2024-06-17T20:15:14.850", + "lastModified": "2024-06-18T14:15:11.533", "vulnStatus": "Received", "descriptions": [ { "lang": "en", "value": "A vulnerability has been found in GPAC 2.5-DEV-rev228-g11067ea92-master and classified as problematic. Affected by this vulnerability is the function isoffin_process of the file src/filters/isoffin_read.c of the component MP4Box. The manipulation leads to infinite loop. It is possible to launch the attack on the local host. The exploit has been disclosed to the public and may be used. The identifier of the patch is 20c0f29139a82779b86453ce7f68d0681ec7624c. It is recommended to apply a patch to fix this issue. The identifier VDB-268789 was assigned to this vulnerability." + }, + { + "lang": "es", + "value": "Una vulnerabilidad ha sido encontrada en GPAC 2.5-DEV-rev228-g11067ea92-master y clasificada como problem\u00e1tica. La funci\u00f3n isoffin_process del archivo src/filters/isoffin_read.c del componente MP4Box es afectada por esta vulnerabilidad. La manipulaci\u00f3n conduce a un bucle infinito. Es posible lanzar el ataque al servidor local. El exploit ha sido divulgado al p\u00fablico y puede utilizarse. El identificador del parche es 20c0f29139a82779b86453ce7f68d0681ec7624c. Se recomienda aplicar un parche para solucionar este problema. A esta vulnerabilidad se le asign\u00f3 el identificador VDB-268789." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-60xx/CVE-2024-6062.json b/CVE-2024/CVE-2024-60xx/CVE-2024-6062.json index a74aabd29f5..16900528111 100644 --- a/CVE-2024/CVE-2024-60xx/CVE-2024-6062.json +++ b/CVE-2024/CVE-2024-60xx/CVE-2024-6062.json @@ -2,12 +2,16 @@ "id": "CVE-2024-6062", "sourceIdentifier": "cna@vuldb.com", "published": "2024-06-17T20:15:15.170", - "lastModified": "2024-06-17T20:15:15.170", + "lastModified": "2024-06-18T14:15:11.670", "vulnStatus": "Received", "descriptions": [ { "lang": "en", "value": "A vulnerability was found in GPAC 2.5-DEV-rev228-g11067ea92-master and classified as problematic. Affected by this issue is the function swf_svg_add_iso_sample of the file src/filters/load_text.c of the component MP4Box. The manipulation leads to null pointer dereference. The attack needs to be approached locally. The exploit has been disclosed to the public and may be used. The patch is identified as 31e499d310a48bd17c8b055a0bfe0fe35887a7cd. It is recommended to apply a patch to fix this issue. VDB-268790 is the identifier assigned to this vulnerability." + }, + { + "lang": "es", + "value": "Una vulnerabilidad fue encontrada en GPAC 2.5-DEV-rev228-g11067ea92-master y clasificada como problem\u00e1tica. La funci\u00f3n swf_svg_add_iso_sample del archivo src/filters/load_text.c del componente MP4Box es afectada por esta vulnerabilidad. La manipulaci\u00f3n conduce a la desreferencia del puntero nulo. El ataque debe abordarse localmente. El exploit ha sido divulgado al p\u00fablico y puede utilizarse. El parche se identifica como 31e499d310a48bd17c8b055a0bfe0fe35887a7cd. Se recomienda aplicar un parche para solucionar este problema. VDB-268790 es el identificador asignado a esta vulnerabilidad." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-60xx/CVE-2024-6063.json b/CVE-2024/CVE-2024-60xx/CVE-2024-6063.json index 2170b18edf6..4f892272809 100644 --- a/CVE-2024/CVE-2024-60xx/CVE-2024-6063.json +++ b/CVE-2024/CVE-2024-60xx/CVE-2024-6063.json @@ -2,12 +2,16 @@ "id": "CVE-2024-6063", "sourceIdentifier": "cna@vuldb.com", "published": "2024-06-17T21:15:51.443", - "lastModified": "2024-06-17T21:15:51.443", + "lastModified": "2024-06-18T14:15:11.787", "vulnStatus": "Received", "descriptions": [ { "lang": "en", "value": "A vulnerability was found in GPAC 2.5-DEV-rev228-g11067ea92-master. It has been classified as problematic. This affects the function m2tsdmx_on_event of the file src/filters/dmx_m2ts.c of the component MP4Box. The manipulation leads to null pointer dereference. An attack has to be approached locally. The exploit has been disclosed to the public and may be used. The patch is named 8767ed0a77c4b02287db3723e92c2169f67c85d5. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-268791." + }, + { + "lang": "es", + "value": "Se encontr\u00f3 una vulnerabilidad en GPAC 2.5-DEV-rev228-g11067ea92-master. Ha sido clasificada como problem\u00e1tica. Esto afecta a la funci\u00f3n m2tsdmx_on_event del archivo src/filters/dmx_m2ts.c del componente MP4Box. La manipulaci\u00f3n conduce a la desreferencia del puntero nulo. Un ataque debe abordarse localmente. El exploit ha sido divulgado al p\u00fablico y puede utilizarse. El parche se llama 8767ed0a77c4b02287db3723e92c2169f67c85d5. Se recomienda aplicar un parche para solucionar este problema. El identificador asociado de esta vulnerabilidad es VDB-268791." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-60xx/CVE-2024-6064.json b/CVE-2024/CVE-2024-60xx/CVE-2024-6064.json index 1b2ebdd6ce8..303b52bad55 100644 --- a/CVE-2024/CVE-2024-60xx/CVE-2024-6064.json +++ b/CVE-2024/CVE-2024-60xx/CVE-2024-6064.json @@ -2,12 +2,16 @@ "id": "CVE-2024-6064", "sourceIdentifier": "cna@vuldb.com", "published": "2024-06-17T21:15:51.727", - "lastModified": "2024-06-17T21:15:51.727", + "lastModified": "2024-06-18T14:15:11.917", "vulnStatus": "Received", "descriptions": [ { "lang": "en", "value": "A vulnerability was found in GPAC 2.5-DEV-rev228-g11067ea92-master. It has been declared as problematic. This vulnerability affects the function xmt_node_end of the file src/scene_manager/loader_xmt.c of the component MP4Box. The manipulation leads to use after free. Local access is required to approach this attack. The exploit has been disclosed to the public and may be used. The name of the patch is f4b3e4d2f91bc1749e7a924a8ab171af03a355a8/c1b9c794bad8f262c56f3cf690567980d96662f5. It is recommended to apply a patch to fix this issue. The identifier of this vulnerability is VDB-268792." + }, + { + "lang": "es", + "value": "Se encontr\u00f3 una vulnerabilidad en GPAC 2.5-DEV-rev228-g11067ea92-master. Ha sido declarada problem\u00e1tica. Esta vulnerabilidad afecta a la funci\u00f3n xmt_node_end del archivo src/scene_manager/loader_xmt.c del componente MP4Box. La manipulaci\u00f3n conduce al use after free. Se requiere acceso local para abordar este ataque. El exploit ha sido divulgado al p\u00fablico y puede utilizarse. El nombre del parche es f4b3e4d2f91bc1749e7a924a8ab171af03a355a8/c1b9c794bad8f262c56f3cf690567980d96662f5. Se recomienda aplicar un parche para solucionar este problema. El identificador de esta vulnerabilidad es VDB-268792." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-60xx/CVE-2024-6065.json b/CVE-2024/CVE-2024-60xx/CVE-2024-6065.json index 5e7cb98eec2..df66faa6b55 100644 --- a/CVE-2024/CVE-2024-60xx/CVE-2024-6065.json +++ b/CVE-2024/CVE-2024-60xx/CVE-2024-6065.json @@ -2,12 +2,16 @@ "id": "CVE-2024-6065", "sourceIdentifier": "cna@vuldb.com", "published": "2024-06-17T21:15:52.007", - "lastModified": "2024-06-17T21:15:52.007", + "lastModified": "2024-06-18T14:15:12.040", "vulnStatus": "Received", "descriptions": [ { "lang": "en", "value": "A vulnerability was found in itsourcecode Bakery Online Ordering System 1.0. It has been rated as critical. This issue affects some unknown processing of the file index.php. The manipulation of the argument user_email leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-268793 was assigned to this vulnerability." + }, + { + "lang": "es", + "value": "Se encontr\u00f3 una vulnerabilidad en itsourcecode Bakery Online Ordering System 1.0. Ha sido calificada como cr\u00edtica. Este problema afecta un procesamiento desconocido del archivo index.php. La manipulaci\u00f3n del argumento user_email conduce a la inyecci\u00f3n de SQL. El ataque puede iniciarse de forma remota. El exploit ha sido divulgado al p\u00fablico y puede utilizarse. A esta vulnerabilidad se le asign\u00f3 el identificador VDB-268793." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-60xx/CVE-2024-6066.json b/CVE-2024/CVE-2024-60xx/CVE-2024-6066.json index 4a5dc8810f5..1af3b3dc4c6 100644 --- a/CVE-2024/CVE-2024-60xx/CVE-2024-6066.json +++ b/CVE-2024/CVE-2024-60xx/CVE-2024-6066.json @@ -2,12 +2,16 @@ "id": "CVE-2024-6066", "sourceIdentifier": "cna@vuldb.com", "published": "2024-06-17T21:15:52.283", - "lastModified": "2024-06-17T21:15:52.283", + "lastModified": "2024-06-18T14:15:12.183", "vulnStatus": "Received", "descriptions": [ { "lang": "en", "value": "A vulnerability classified as critical has been found in SourceCodester Best House Rental Management System 1.0. Affected is an unknown function of the file payment_report.php. The manipulation of the argument month_of leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. VDB-268794 is the identifier assigned to this vulnerability." + }, + { + "lang": "es", + "value": "Una vulnerabilidad ha sido encontrada en SourceCodester Best House Rental Management System 1.0 y clasificada como cr\u00edtica. Una funci\u00f3n desconocida del archivo Payment_report.php es afectada por esta vulnerabilidad. La manipulaci\u00f3n del argumento mes_de conduce a la inyecci\u00f3n de SQL. Es posible lanzar el ataque de forma remota. El exploit ha sido divulgado al p\u00fablico y puede utilizarse. VDB-268794 es el identificador asignado a esta vulnerabilidad." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-60xx/CVE-2024-6084.json b/CVE-2024/CVE-2024-60xx/CVE-2024-6084.json index ffeb3cb577d..85660ca8865 100644 --- a/CVE-2024/CVE-2024-60xx/CVE-2024-6084.json +++ b/CVE-2024/CVE-2024-60xx/CVE-2024-6084.json @@ -2,12 +2,16 @@ "id": "CVE-2024-6084", "sourceIdentifier": "cna@vuldb.com", "published": "2024-06-18T01:15:20.333", - "lastModified": "2024-06-18T05:15:52.453", + "lastModified": "2024-06-18T14:15:12.317", "vulnStatus": "Received", "descriptions": [ { "lang": "en", "value": "A vulnerability has been found in itsourcecode Pool of Bethesda Online Reservation System up to 1.0 and classified as critical. Affected by this vulnerability is the function uploadImage of the file /admin/mod_room/controller.php?action=add. The manipulation of the argument image leads to unrestricted upload. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-268825 was assigned to this vulnerability." + }, + { + "lang": "es", + "value": "Una vulnerabilidad ha sido encontrada en itsourcecode Pool of Bethesda Online Reservation System hasta 1.0 y clasificada como cr\u00edtica. La funci\u00f3n uploadImage del archivo /admin/mod_room/controller.php?action=add es afectada por esta vulnerabilidad. La manipulaci\u00f3n de la imagen del argumento conduce a una carga sin restricciones. El ataque se puede lanzar de forma remota. El exploit ha sido divulgado al p\u00fablico y puede utilizarse. A esta vulnerabilidad se le asign\u00f3 el identificador VDB-268825." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-61xx/CVE-2024-6111.json b/CVE-2024/CVE-2024-61xx/CVE-2024-6111.json index 388a9fa34a2..878eaf1dce1 100644 --- a/CVE-2024/CVE-2024-61xx/CVE-2024-6111.json +++ b/CVE-2024/CVE-2024-61xx/CVE-2024-6111.json @@ -2,7 +2,7 @@ "id": "CVE-2024-6111", "sourceIdentifier": "cna@vuldb.com", "published": "2024-06-18T13:15:52.193", - "lastModified": "2024-06-18T13:15:52.193", + "lastModified": "2024-06-18T15:15:52.873", "vulnStatus": "Received", "descriptions": [ { diff --git a/CVE-2024/CVE-2024-61xx/CVE-2024-6112.json b/CVE-2024/CVE-2024-61xx/CVE-2024-6112.json index fb6e917a3f9..8f51ad9fcc8 100644 --- a/CVE-2024/CVE-2024-61xx/CVE-2024-6112.json +++ b/CVE-2024/CVE-2024-61xx/CVE-2024-6112.json @@ -2,7 +2,7 @@ "id": "CVE-2024-6112", "sourceIdentifier": "cna@vuldb.com", "published": "2024-06-18T13:15:52.550", - "lastModified": "2024-06-18T13:15:52.550", + "lastModified": "2024-06-18T15:15:52.993", "vulnStatus": "Received", "descriptions": [ { diff --git a/CVE-2024/CVE-2024-61xx/CVE-2024-6116.json b/CVE-2024/CVE-2024-61xx/CVE-2024-6116.json new file mode 100644 index 00000000000..0498d6dd59e --- /dev/null +++ b/CVE-2024/CVE-2024-61xx/CVE-2024-6116.json @@ -0,0 +1,92 @@ +{ + "id": "CVE-2024-6116", + "sourceIdentifier": "cna@vuldb.com", + "published": "2024-06-18T14:15:12.440", + "lastModified": "2024-06-18T14:15:12.440", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability, which was classified as critical, has been found in itsourcecode Simple Online Hotel Reservation System 1.0. Affected by this issue is some unknown functionality of the file edit_room.php. The manipulation of the argument photo leads to unrestricted upload. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-268868." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 7.3, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "NONE", + "confidentialityImpact": "PARTIAL", + "integrityImpact": "PARTIAL", + "availabilityImpact": "PARTIAL", + "baseScore": 7.5 + }, + "baseSeverity": "HIGH", + "exploitabilityScore": 10.0, + "impactScore": 6.4, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-434" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/wangyuan-ui/CVE/issues/6", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.268868", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.268868", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.359002", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/README.md b/README.md index 809ae89d753..c32b209b983 100644 --- a/README.md +++ b/README.md @@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2024-06-18T14:00:30.447401+00:00 +2024-06-18T16:00:18.327202+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2024-06-18T13:21:42.383000+00:00 +2024-06-18T15:15:52.993000+00:00 ``` ### Last Data Feed Release @@ -33,32 +33,40 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### Total Number of included CVEs ```plain -254355 +254359 ``` ### CVEs added in the last Commit -Recently added CVEs: `7` +Recently added CVEs: `4` -- [CVE-2024-5967](CVE-2024/CVE-2024-59xx/CVE-2024-5967.json) (`2024-06-18T12:15:12.707`) -- [CVE-2024-6109](CVE-2024/CVE-2024-61xx/CVE-2024-6109.json) (`2024-06-18T12:15:12.987`) -- [CVE-2024-6110](CVE-2024/CVE-2024-61xx/CVE-2024-6110.json) (`2024-06-18T12:15:13.290`) -- [CVE-2024-6111](CVE-2024/CVE-2024-61xx/CVE-2024-6111.json) (`2024-06-18T13:15:52.193`) -- [CVE-2024-6112](CVE-2024/CVE-2024-61xx/CVE-2024-6112.json) (`2024-06-18T13:15:52.550`) -- [CVE-2024-6114](CVE-2024/CVE-2024-61xx/CVE-2024-6114.json) (`2024-06-18T13:15:52.897`) -- [CVE-2024-6115](CVE-2024/CVE-2024-61xx/CVE-2024-6115.json) (`2024-06-18T13:15:53.267`) +- [CVE-2023-47726](CVE-2023/CVE-2023-477xx/CVE-2023-47726.json) (`2024-06-18T14:15:10.317`) +- [CVE-2024-5275](CVE-2024/CVE-2024-52xx/CVE-2024-5275.json) (`2024-06-18T15:15:52.493`) +- [CVE-2024-5750](CVE-2024/CVE-2024-57xx/CVE-2024-5750.json) (`2024-06-18T14:15:11.383`) +- [CVE-2024-6116](CVE-2024/CVE-2024-61xx/CVE-2024-6116.json) (`2024-06-18T14:15:12.440`) ### CVEs modified in the last Commit -Recently modified CVEs: `6` +Recently modified CVEs: `17` -- [CVE-2023-6236](CVE-2023/CVE-2023-62xx/CVE-2023-6236.json) (`2024-06-18T13:15:51.123`) -- [CVE-2024-0569](CVE-2024/CVE-2024-05xx/CVE-2024-0569.json) (`2024-06-18T13:21:16.393`) -- [CVE-2024-0570](CVE-2024/CVE-2024-05xx/CVE-2024-0570.json) (`2024-06-18T13:21:42.383`) -- [CVE-2024-1132](CVE-2024/CVE-2024-11xx/CVE-2024-1132.json) (`2024-06-18T12:15:12.470`) -- [CVE-2024-1577](CVE-2024/CVE-2024-15xx/CVE-2024-1577.json) (`2024-06-18T13:15:51.627`) -- [CVE-2024-3049](CVE-2024/CVE-2024-30xx/CVE-2024-3049.json) (`2024-06-18T13:15:51.780`) +- [CVE-2018-25103](CVE-2018/CVE-2018-251xx/CVE-2018-25103.json) (`2024-06-18T15:15:51.310`) +- [CVE-2022-30332](CVE-2022/CVE-2022-303xx/CVE-2022-30332.json) (`2024-06-18T14:01:34.683`) +- [CVE-2023-38430](CVE-2023/CVE-2023-384xx/CVE-2023-38430.json) (`2024-06-18T15:10:09.290`) +- [CVE-2023-38431](CVE-2023/CVE-2023-384xx/CVE-2023-38431.json) (`2024-06-18T15:10:03.177`) +- [CVE-2023-39331](CVE-2023/CVE-2023-393xx/CVE-2023-39331.json) (`2024-06-18T15:09:45.857`) +- [CVE-2023-5157](CVE-2023/CVE-2023-51xx/CVE-2023-5157.json) (`2024-06-18T15:09:32.553`) +- [CVE-2023-5178](CVE-2023/CVE-2023-51xx/CVE-2023-5178.json) (`2024-06-18T15:10:41.817`) +- [CVE-2023-52685](CVE-2023/CVE-2023-526xx/CVE-2023-52685.json) (`2024-06-18T14:15:10.603`) +- [CVE-2024-6061](CVE-2024/CVE-2024-60xx/CVE-2024-6061.json) (`2024-06-18T14:15:11.533`) +- [CVE-2024-6062](CVE-2024/CVE-2024-60xx/CVE-2024-6062.json) (`2024-06-18T14:15:11.670`) +- [CVE-2024-6063](CVE-2024/CVE-2024-60xx/CVE-2024-6063.json) (`2024-06-18T14:15:11.787`) +- [CVE-2024-6064](CVE-2024/CVE-2024-60xx/CVE-2024-6064.json) (`2024-06-18T14:15:11.917`) +- [CVE-2024-6065](CVE-2024/CVE-2024-60xx/CVE-2024-6065.json) (`2024-06-18T14:15:12.040`) +- [CVE-2024-6066](CVE-2024/CVE-2024-60xx/CVE-2024-6066.json) (`2024-06-18T14:15:12.183`) +- [CVE-2024-6084](CVE-2024/CVE-2024-60xx/CVE-2024-6084.json) (`2024-06-18T14:15:12.317`) +- [CVE-2024-6111](CVE-2024/CVE-2024-61xx/CVE-2024-6111.json) (`2024-06-18T15:15:52.873`) +- [CVE-2024-6112](CVE-2024/CVE-2024-61xx/CVE-2024-6112.json) (`2024-06-18T15:15:52.993`) ## Download and Usage diff --git a/_state.csv b/_state.csv index 1956e96c8f2..a2e936c5987 100644 --- a/_state.csv +++ b/_state.csv @@ -121379,7 +121379,7 @@ CVE-2018-25098,0,0,fcae82fd425e45c0b5170e1d16175026afcc4282c8c2d036ab7934ed74d6d CVE-2018-25099,0,0,4477c16cb5a3503e957873dbddbd3b50ffb7092ffd27acf2a352c93f686dfb7f,2024-03-18T12:38:25.490000 CVE-2018-25100,0,0,26375a09020100e722ed36e37b25c669512cdaa2d61a780ec73480ee78db5d6b,2024-03-25T01:51:01.223000 CVE-2018-25101,0,0,b04dde640afba29853f504e83596fe419f66817bb46aeb488be7718ce77d287c,2024-06-04T19:16:57.060000 -CVE-2018-25103,0,0,122206d0dffed87e661f65dbda0c75ede3d4cb0caf0ebcb77979d91738119961,2024-06-17T18:15:12.650000 +CVE-2018-25103,0,1,1c9793e149655d3528332820a08b1745b5751a38cb908688b2059c830f89f510,2024-06-18T15:15:51.310000 CVE-2018-2515,0,0,158f882e4275a7485a2b9ce17e7e57c4ea22cf74c55a78a9900c73a4caa327c0,2023-11-07T02:57:57.887000 CVE-2018-2560,0,0,0bb1a26d6c05fddeb488697adb0bbe667a3dd77c1a5bc7af495c8721df5b1197,2020-08-24T17:37:01.140000 CVE-2018-2561,0,0,b76feaa260e2f54fc8eeb8d50d578ffdd22b603f486ac4f8f5b3bc42df22fa45,2018-01-25T13:53:15.120000 @@ -198206,7 +198206,7 @@ CVE-2022-30329,0,0,1e4dd5a55573e7e5a013b63f922cccbee97ab466e2a60437c8ca4ae025888 CVE-2022-3033,0,0,04d6f731ac8bfa74ecd44970b9b4139094e5c3f9a2dccd741e7f3aaf386e9788,2023-08-08T14:22:24.967000 CVE-2022-30330,0,0,876c82068abdcf186aa7b3e8a5f8616f863cc3d82cca821d376d16d4b07af7ee,2023-08-08T14:22:24.967000 CVE-2022-30331,0,0,b59f313d8f3ba3a246834807358e04b85d223642f4ad3f5d1588020d00fc8d4a,2024-05-17T02:09:04.580000 -CVE-2022-30332,0,0,b38dd0016e3686f9267a0939fa3ceb08c800b32abe3524b6a5899fec0a03e9e4,2024-06-05T05:15:49.087000 +CVE-2022-30332,0,1,44a853d0f21cb54a3d6e8f1ab62da33b469752869a0e0ad135055671589c3583,2024-06-18T14:01:34.683000 CVE-2022-30333,0,0,cff77551eb0bbaa9d935030139b5ed47ef9bba58afc5c97e359911b34416e453,2023-09-17T07:15:08.007000 CVE-2022-30334,0,0,cd25538698a372e38cded8a3faa0ddac856c8de83bfb793bc0c3db012023959f,2023-08-08T14:22:24.967000 CVE-2022-30335,0,0,f793ef292c40aa9629afac7f2d724bbe8c9406a4419beea8dad8af24e5cd174a,2022-05-17T19:15:34.883000 @@ -228399,8 +228399,8 @@ CVE-2023-38427,0,0,75ab9c629c577dd690eef30687b5ce6b24edeebaf66a5c91af823117fb95d CVE-2023-38428,0,0,15a6b1356ed09a8c8415d9f703bdf9bc6b627dff267632402a1eefef63ff353a,2023-12-15T15:47:05.687000 CVE-2023-38429,0,0,068d2cd228d1bf53adf50323f53a93f3ac149550136632f36a5f3188e0aad049,2023-12-22T21:34:39.870000 CVE-2023-3843,0,0,1816e2a24b2446f8b8dd3e059ffe34185263b94cf5514d38384b5a9b3d313d8f,2024-05-17T02:27:52.767000 -CVE-2023-38430,0,0,7c939f3199334689eb9a9121bba9ea205beab5c0341def1591c47b9ee9a42044,2023-12-22T21:33:45.797000 -CVE-2023-38431,0,0,95cba1809b1cc5dee7f8d53f000f61aa82301181a5a7266dfe8b58ae32e54ba3,2023-12-15T15:46:35.903000 +CVE-2023-38430,0,1,63fb66be455e95fb0e00d902660bb1391580e90ed160b351fe2166b10cd3f6a9,2024-06-18T15:10:09.290000 +CVE-2023-38431,0,1,9848027ba774a0512d03e18eec541cd4fce8c301a4801f30fc2f2850e905530e,2024-06-18T15:10:03.177000 CVE-2023-38432,0,0,ca886ca55aa271f057b4717e9935bf05005b33779fb096159198db28e568bd63,2023-12-22T17:05:07.243000 CVE-2023-38433,0,0,543bebccbe8eb80378175360474e1f98448833d9539acf8c8ea7635438c73a56,2023-11-07T04:17:18.610000 CVE-2023-38434,0,0,4f27d3a8b161c31bbf32f7970313210b522dd8462e4980fa0ee98a268a6a3d53,2023-07-27T04:03:48.217000 @@ -229104,7 +229104,7 @@ CVE-2023-39323,0,0,d2da5a246500965f999a8d84c29008728f75c547f230a13d2193b126917ed CVE-2023-39325,0,0,58abd083daa7fb16a442cdfaef715883a0fb11da9a8652276862d7d26f2ab493,2024-04-28T04:15:09.877000 CVE-2023-39326,0,0,90a833293ecdbd92e4a1c1828cadca50fa959e82465478bc6c6b2b71065dacac,2024-01-20T04:15:07.890000 CVE-2023-3933,0,0,2d784fa3bad269d318314e0780fb5ab15203b6d9670481cab4bae609ef1ad2b5,2023-11-07T04:20:00.337000 -CVE-2023-39331,0,0,eb26ffeb716619d2f45aa1a28ea18d12c56b83c2867ee803c4d4520e487f4050,2023-11-17T19:10:41.253000 +CVE-2023-39331,0,1,0b3bb94930c7b603cf2498545fe912acbbb259488d38f9dc6f4da6943004dbbd,2024-06-18T15:09:45.857000 CVE-2023-39332,0,0,8b910ceea29382c3501406376a4083bac4d69f69380af431d3b75bb270bf2e58,2023-11-17T19:08:58.170000 CVE-2023-39335,0,0,de59ab60bb008cb37e35574265db4c70c7230619b6903b4fa71f9b7575236eac,2023-11-22T15:06:41.970000 CVE-2023-39336,0,0,b977d6f2b7c9b0fd92c0a178a796d6d1f323429aaee5398b0e65e7fe7b72e509,2024-01-12T18:56:43.137000 @@ -235013,6 +235013,7 @@ CVE-2023-47717,0,0,27c384bb2da2247b75e1e97dd81158a4a3f5ec676660f195bcf845b18701a CVE-2023-47718,0,0,c741441681738efc3979d67da4409868f353d29cc92314f5037f92d0809304bd,2024-01-24T21:23:15.540000 CVE-2023-4772,0,0,2771ff64adbe1ba6f7dfdd5d8e8af50d5674985cd4bd14f9ff6d841da9878bd5,2023-11-07T04:22:57.827000 CVE-2023-47722,0,0,5f2ccb67ee0472008868026b0561431d013bb25eb62913fd40686172191b4bbe,2023-12-12T21:04:18.177000 +CVE-2023-47726,1,1,79f6b824922e6bea28adef2f4c43e3eeb3e5389d93758235f1c785aa2fea7522,2024-06-18T14:15:10.317000 CVE-2023-47727,0,0,93638cf13767af0fd87f1a8887a0e85470c71bd37710b8f5a091f8483530bff2,2024-05-02T18:00:37.360000 CVE-2023-4773,0,0,46809a7c239cdb033db621dca5a458d470c07362dae46adc2ff34854ee8e494c,2023-11-07T04:22:57.903000 CVE-2023-47731,0,0,590a1016c4a04e7897213078a5a094bed41ef8ae124e51eb0de721543408fccd,2024-04-24T13:39:42.883000 @@ -237526,7 +237527,7 @@ CVE-2023-51566,0,0,94e1aaadce08b01f75bc79ea1c6d391e993527b1b951cc0217a31453244f6 CVE-2023-51567,0,0,ab2dc96677935d703dceb14c524834b502173a141aa7c9126aeebf5a3764973c,2024-05-03T12:48:41.067000 CVE-2023-51568,0,0,16692d2b87817fbf46cac77c30af426e9651464b8cbcaf5a9804306231c1986b,2024-05-03T12:48:41.067000 CVE-2023-51569,0,0,1a0ed883e0414d31878661d0c953a3391d2a8ab4694abdea778e891710d7c0da,2024-05-03T12:48:41.067000 -CVE-2023-5157,0,0,1d0186e67e733b7b84da791fca027f69e033934cc5992086125652a51ae820a4,2023-12-22T19:25:31.627000 +CVE-2023-5157,0,1,54aa531933036169a2fd181857b0bd4b2ec819cbc887141e2946e61acce52d45,2024-06-18T15:09:32.553000 CVE-2023-51570,0,0,0c484c59d467ef1249fa67651beb8d29a13397de3e29d1b0c9b187c2904ffdce,2024-04-02T12:50:42.233000 CVE-2023-51571,0,0,589136173f756096c29316c51ca8b60231ecfc1b3a6cbbee177bb7ea995409a1,2024-04-02T12:50:42.233000 CVE-2023-51572,0,0,ec93729a9d339c9a51c7a45340e66219b2503c2b96b000a4205093f135398cb2,2024-04-02T12:50:42.233000 @@ -237717,7 +237718,7 @@ CVE-2023-51773,0,0,3fca7856a212f205584315672e155b01f780bc641443cddede1df375397bb CVE-2023-51774,0,0,fa7215009a889524612ddcab0550ac62988088568fe35ca16c3143d27b6818a6,2024-02-29T13:49:47.277000 CVE-2023-51775,0,0,56112969393cba50f3c02ebaa680b83b2f396c5e9abd491c608f39f2f1490f3b,2024-02-29T13:49:47.277000 CVE-2023-51779,0,0,3943f363f5143271e5cbd0ff64b8cc1423a57d413b76d5f71f207b2a469b120f,2024-02-29T13:49:47.277000 -CVE-2023-5178,0,0,f06eb1d20f5d3c1e341a9033b7e72f097988ba079ae215a56b33bd5858bc4b15,2024-04-03T14:15:11.910000 +CVE-2023-5178,0,1,90a10f9054feb0d5eb4d27e4016e7cb63b10b7b343054fea2022771f54b9e5f0,2024-06-18T15:10:41.817000 CVE-2023-51780,0,0,79cd6e92464f536e130fa2000a4063f5cd270067f2c2bbfecbf436eed213aec5,2024-04-19T07:15:08.857000 CVE-2023-51781,0,0,943dcd6bc9ca41b409437da8a4375ab31f17544ddbdf352ff447f72ff83a2193,2024-01-18T19:58:50.630000 CVE-2023-51782,0,0,4b4197672003cf4578a2bf0f31c16f034d56fceca2a499cb095add5bbd47b401,2024-01-18T19:31:37.630000 @@ -238409,7 +238410,7 @@ CVE-2023-52681,0,0,509f45c2847d2260859f6ecad2b21e663945a88e3157b276da7898249775d CVE-2023-52682,0,0,1fbf2e403d5cf76d28d0dadba77f6a33927da880c816f4db1175b9ba33cef465,2024-05-17T18:35:35.070000 CVE-2023-52683,0,0,d7cd8dc7fea5da9efc826866b4911473c47b91a91787dd229c9f65751f4dc1ed,2024-05-17T18:35:35.070000 CVE-2023-52684,0,0,07a09c1a8df932af204f32eebc29b7ace339bf81055f4f0d3696fcdc198be3c6,2024-05-17T18:35:35.070000 -CVE-2023-52685,0,0,32eb18fdf06f58f10a755c94fb6db63cda5aaa0572e237f25e5db6996bf3d5f7,2024-05-17T18:35:35.070000 +CVE-2023-52685,0,1,47e5ad6bb0418b1c76808b60c6f2122f54dd28457f9424eccb9bffefa631630a,2024-06-18T14:15:10.603000 CVE-2023-52686,0,0,1455af024106195f7d95a7abb44c6cf2c5dd15b77298475bf021463cc3003295,2024-05-17T18:35:35.070000 CVE-2023-52687,0,0,33bb33182e507cc495047887ed17171c9c7f03b909b6af0aede97bf01c2942db,2024-05-17T18:35:35.070000 CVE-2023-52688,0,0,bad57e985d74d38535bd2e4688483262734901d07b2e2f52a89461916ab4e758,2024-05-17T18:35:35.070000 @@ -239495,7 +239496,7 @@ CVE-2023-6232,0,0,ba2cdf630fabf4bd0ac948405fb458e3ef453f28a2bd013f114fe7232f74f8 CVE-2023-6233,0,0,e141cf1ee67a50b45a6156c5de3dd9d7cbd091507ee25334f66900c013dc7478,2024-02-13T19:51:52.220000 CVE-2023-6234,0,0,fb4c5d8548f09d4802bfe5fd795c649c575252902f30a1d37160ae9689639b06,2024-02-13T19:51:46.740000 CVE-2023-6235,0,0,a6ac280c87945b3531740d074fb7f02bafe0fd764523c0dc65a87b2c28ffc24b,2023-11-29T16:59:51.970000 -CVE-2023-6236,0,1,afde8ec155d90f171149803b527c8a7f0a301c44d40200664920570dede2b316,2024-06-18T13:15:51.123000 +CVE-2023-6236,0,0,afde8ec155d90f171149803b527c8a7f0a301c44d40200664920570dede2b316,2024-06-18T13:15:51.123000 CVE-2023-6237,0,0,8a954ef3e558345567a59213727b6c04680fa3a4a506de71a2a2ca2943f4dec0,2024-06-10T17:16:16.797000 CVE-2023-6238,0,0,7332193d1454e7405dd3270d745aa7f762b874d0f84c51906784a637ceb0212d,2024-02-07T00:15:55.240000 CVE-2023-6239,0,0,6ce1b576ddd7c9169d0997e75fde3efd606153edbf61fba1116d733c98bbf90d,2023-12-04T19:06:20.213000 @@ -240835,8 +240836,8 @@ CVE-2024-0565,0,0,503076b050ddf1b2f99cef249fd486ea99d201090173a6a51ed37366436ddf CVE-2024-0566,0,0,f8107fe8a2fc77834b036d4572e367b8281b39b817bc15b2a6e1011abfda8c03,2024-02-12T17:31:21.670000 CVE-2024-0567,0,0,ce6269b29c71c4b439a81edabcded1234fbec8688220f445d60fe34366ae0a1c,2024-06-10T19:18:32.897000 CVE-2024-0568,0,0,d070da7d1a857e6b1d56c4fd13ea4081c8fab29f674e6572cdd113a3095522cd,2024-02-14T18:04:50.373000 -CVE-2024-0569,0,1,ca265484291ad2089dca994102bd0a030fb990ef8e33cdc51d460d98e59ab566,2024-06-18T13:21:16.393000 -CVE-2024-0570,0,1,98c6183854a59fe564eedd2f51571740271a3a8a9a1439468989a2d343a8ead8,2024-06-18T13:21:42.383000 +CVE-2024-0569,0,0,ca265484291ad2089dca994102bd0a030fb990ef8e33cdc51d460d98e59ab566,2024-06-18T13:21:16.393000 +CVE-2024-0570,0,0,98c6183854a59fe564eedd2f51571740271a3a8a9a1439468989a2d343a8ead8,2024-06-18T13:21:42.383000 CVE-2024-0571,0,0,5d87a98734ce1369321019b9c1c644e4f5f01134400cdf4659b101f82c8c48a8,2024-05-17T02:34:47.150000 CVE-2024-0572,0,0,ce7c3cc5ac4a3bbd0ea2708c7608867891f1ebc706ead27ea2fd335ba782f8d4,2024-05-17T02:34:47.253000 CVE-2024-0573,0,0,8dfd74ef7624c33d2d91fd819255ac76fd91d1ed70aab08618bf824b7fdd3872,2024-05-17T02:34:47.360000 @@ -241350,7 +241351,7 @@ CVE-2024-1127,0,0,d56eedcfadebd263336bcc9003136ee639f27dd6c46c9263fea0eb8ea044d7 CVE-2024-1128,0,0,a231b73c645395e365defb40ca5d41741520485dac9e62df464e6e1705f68d2e,2024-02-29T13:49:29.390000 CVE-2024-1129,0,0,efcf801aad96aab23ddf4c5c1c7fe067759cd524a5f540fb4b3132cd808f2d93,2024-02-29T13:49:29.390000 CVE-2024-1130,0,0,19b9a2e3e227bc6e3d85f9dd98bd15cfd41c18a2ee1bc79c328385d5148fea32,2024-02-29T13:49:29.390000 -CVE-2024-1132,0,1,610debc5161dedd7792fe75050883b4202aa61b518e69f60309c71f8112df23a,2024-06-18T12:15:12.470000 +CVE-2024-1132,0,0,610debc5161dedd7792fe75050883b4202aa61b518e69f60309c71f8112df23a,2024-06-18T12:15:12.470000 CVE-2024-1133,0,0,85f4bf6d861639f9431d20ab28a51d2af9f3a3ecb32590788260710816d3a125,2024-02-29T13:49:29.390000 CVE-2024-1134,0,0,2e7c5ee3a71225c7c6e3e9d595fec8d66565da1f8113a13a6b762c5258606aef,2024-05-24T13:03:05.093000 CVE-2024-1135,0,0,2f6bc90f330f2812b6ceb34e2fa1ad9c1c5eca9415bce0719ca3f92f74cd2497,2024-04-16T13:24:07.103000 @@ -241754,7 +241755,7 @@ CVE-2024-1570,0,0,1629a1493afa93044df9f22af1e83d093e3e06db82a23b409138b92d94c2f5 CVE-2024-1571,0,0,b1806e0b2d46f5d2ef86ed95b11ec13eeefb63bf2736347df987f91692e6e418,2024-04-10T13:24:00.070000 CVE-2024-1572,0,0,4deddd16a8e62290b13f0cdb450608c505fd6cdf76365f1d944ed8337c4c95f6,2024-05-02T18:00:37.360000 CVE-2024-1576,0,0,6db392527516528e14eb0ea0191722707d0a406a5c4d32feed7275ee783f8c4b,2024-06-13T18:36:09.010000 -CVE-2024-1577,0,1,ba33ce0c17d7a340b987ce63ee030c6e2edbd0f04d791d826fcf4cc55f2d4eae,2024-06-18T13:15:51.627000 +CVE-2024-1577,0,0,ba33ce0c17d7a340b987ce63ee030c6e2edbd0f04d791d826fcf4cc55f2d4eae,2024-06-18T13:15:51.627000 CVE-2024-1579,0,0,b19774dd42578330a3da1ea9eac4803944dc51b8f7e2cc4d4d08fb40df600dc0,2024-04-30T13:11:16.690000 CVE-2024-1580,0,0,4a10e63fa95d49470234e2661449f906487822e0aeb3a95c53a88e84627958f0,2024-03-27T18:15:09.063000 CVE-2024-1582,0,0,5801086f12a7b25e0a24481309300eacfe3989ff6a37128452730610efa279b1,2024-03-13T12:33:51.697000 @@ -248837,7 +248838,7 @@ CVE-2024-30486,0,0,3b668ae931cda4b6a387bfa69ea17dffa696817ef5a0dd2b2ba0b8d1d89d0 CVE-2024-30487,0,0,8478a9894c02433324d52a7694bbe43e86c58bc36ce6feb0280d7b18225d7d5b,2024-04-01T01:12:59.077000 CVE-2024-30488,0,0,9fdeb2b805850984cf4d5d3f20362f356c5feecfdc17015a244efcf21ce430a4,2024-04-01T01:12:59.077000 CVE-2024-30489,0,0,a540270477b853fde36fa10dfe995d2d2e2733bc4b87077bcb9c4c6ebae67f39,2024-04-01T01:12:59.077000 -CVE-2024-3049,0,1,a6b3d832ab781727f9346e0de40312d4dd64d2e39cc54fe0dacf61184d1a56b0,2024-06-18T13:15:51.780000 +CVE-2024-3049,0,0,a6b3d832ab781727f9346e0de40312d4dd64d2e39cc54fe0dacf61184d1a56b0,2024-06-18T13:15:51.780000 CVE-2024-30490,0,0,90b7ec0455290f5d2e36c376f09e8aa64ea00d396ba819e3726d0e96e7b15d7a,2024-04-01T01:12:59.077000 CVE-2024-30491,0,0,b49d75f845cb12239329721ac75b384e508f42c19c755d45b7137bd1b7ebec86,2024-04-01T01:12:59.077000 CVE-2024-30492,0,0,d40dabecb8ac11d6b8ece8b02edecd34ab567f2bff5c23fac9f75367d1b0fc90,2024-04-01T01:12:59.077000 @@ -253982,6 +253983,7 @@ CVE-2024-5271,0,0,d3f4377983bdb14b36061f7826a2769c4b74dac3ab0fd218e99cb4bdcc673a CVE-2024-5272,0,0,485554be89aaf429d625f742d41620b7105b55f3f82c1bd7e7c2afb7e9a676c6,2024-05-28T12:39:28.377000 CVE-2024-5273,0,0,f7b775afc6e46cbf2933f26022bd5d6a5054d80bf2d607df2ea5eeb06bc0b97e,2024-06-10T18:15:38.157000 CVE-2024-5274,0,0,815675421e4b9c2b34f2340865cc1ed903b3b9cc89dafcd7624436bba1c58088,2024-06-10T17:16:34.257000 +CVE-2024-5275,1,1,3fb2b6e2f4f5581f7159d80c2786ba7ce437c9192c9875764b2c058bc3295bc8,2024-06-18T15:15:52.493000 CVE-2024-5277,0,0,08c2f56d5f9c6263336a67bd47c4fa52288bb09bcb2d8aeff245d6d39899edcf,2024-06-07T14:56:05.647000 CVE-2024-5278,0,0,ba4b6329b00a48ecb03cef9d2f0cd09adc7cfa79e9cd9e8eb891a1136335fb69,2024-06-07T14:56:05.647000 CVE-2024-5279,0,0,1f630d4d53c39cf2174e2a1edce8e1a5ead56a314739580d23644f8e4fedef07,2024-06-04T19:21:04.240000 @@ -254226,6 +254228,7 @@ CVE-2024-5739,0,0,4e4cf687173db1796e93002e6527d7eafacb6ad9e3e1f9441d82638a10b1e4 CVE-2024-5741,0,0,dc190848ea36093e225eb493a7b699d45fcf50d2cd0656af367577937c3e765a,2024-06-17T12:42:04.623000 CVE-2024-5742,0,0,a52d500d47b6c5d306e493aed82844a67ba1ec935bd3dcc9d1575df0fba9dc97,2024-06-17T12:15:49.850000 CVE-2024-5745,0,0,e6d6a2ad17b4c76965d8e06659a07345c55e76c97ae26acd6c0df2c3c7c9c9e4,2024-06-08T04:15:10.027000 +CVE-2024-5750,1,1,03159524f0152f136fbf677dd96b04f6ea701d7a55e178491af9632e52209686,2024-06-18T14:15:11.383000 CVE-2024-5757,0,0,2cb36649eaa1d48a108ca94d996085007ec3e42f656c65bc44e14eb0243a4f70,2024-06-13T18:36:09.010000 CVE-2024-5758,0,0,250b274bfcefb72defbd26103c82d5c8ed585b7571d3785565c3013fdb6e4a03,2024-06-13T21:15:57.543000 CVE-2024-5759,0,0,a8b20ed9df5a502bc1dbe4283a67eed19771ffb4a4f02a90724215ed5101a898,2024-06-13T18:36:09.010000 @@ -254302,7 +254305,7 @@ CVE-2024-5951,0,0,7ddd1cddf9a9fdc846148c5866e7aa3c8ed2def81486ca15d97d818d600ecb CVE-2024-5952,0,0,a56b129ed0896e22b77ffae27056ae02e2ff1e28286e49f9b0ac6b9f084a57b2,2024-06-17T12:43:31.090000 CVE-2024-5953,0,0,9ea5135a8dda1dad51ca93f6728c4080a08758d993efcfa67e208f3eb48bc4e5,2024-06-18T10:15:11.170000 CVE-2024-5961,0,0,5b2a3ec0406c808b5387d2b9b0077c5bc424b1c4427d5cb7165a954efcfd8c0c,2024-06-17T12:42:04.623000 -CVE-2024-5967,1,1,2e6937701802b31975daa50ca2c8947b1ca4041c2416c87363e635155af92998,2024-06-18T12:15:12.707000 +CVE-2024-5967,0,0,2e6937701802b31975daa50ca2c8947b1ca4041c2416c87363e635155af92998,2024-06-18T12:15:12.707000 CVE-2024-5976,0,0,e855126a3e03657c0f9ccfb70e360e6531fe17aa442fb39ef6227c53616360fe,2024-06-17T12:43:31.090000 CVE-2024-5981,0,0,7870df79665c127e5a33d8fe67e56d8db296d9f7a121386a1275e14871265ba2,2024-06-17T12:43:31.090000 CVE-2024-5983,0,0,c879618580c4659b3410af89e8bf56c9d9f664bfd2edad2ed7d70a9157784269,2024-06-17T12:43:31.090000 @@ -254336,21 +254339,22 @@ CVE-2024-6056,0,0,636228dd1a2c8f5c63676f25cc803d23af23082b986789068b58dd9fd2a57e CVE-2024-6057,0,0,cfabce49b9db224e3720b6479e81ee1edcd2fcbaabb39bed0063a52236765ccd,2024-06-17T13:15:53.800000 CVE-2024-6058,0,0,3ee08d4ad26cf88da329a5e1271ed474432fcbd63bb5792a008ded1da8686681,2024-06-17T18:15:18.520000 CVE-2024-6059,0,0,8dc3785d03b4bbf495bb7b9e0db50afd358453b35356b7519dfcb40c8d9c6a71,2024-06-17T19:15:59.467000 -CVE-2024-6061,0,0,e3994abe87d8171c8e3b6a2bfacb5133544b1c463e71028fb8ff174c440a1265,2024-06-17T20:15:14.850000 -CVE-2024-6062,0,0,47cd221b4b8aabce9ad30cff9ce6a2ec0e7cd03e3e3078c16a8749b69ae8d8eb,2024-06-17T20:15:15.170000 -CVE-2024-6063,0,0,b67d10210bed54ecb8364f0d64a24e8a9bb67fda8d7cdbfbf01d23eb1fcb1bb1,2024-06-17T21:15:51.443000 -CVE-2024-6064,0,0,dfa0698ee8caf241b62eef71e2d604b23eb45d719d7bfffd9edd5b3eea92dc02,2024-06-17T21:15:51.727000 -CVE-2024-6065,0,0,ec7d6c92bf7a949498dd9805836d3dc45c84184ec068d4330849b9f7c74e24ca,2024-06-17T21:15:52.007000 -CVE-2024-6066,0,0,4be16afb26a67eeaa99325b278e1eb15007f8629556d5972406c66487d6fe7ae,2024-06-17T21:15:52.283000 +CVE-2024-6061,0,1,39aa63f2908fac2ea5c6c93ac26be0cb4e028f86f6241c593e1bff1e191c4192,2024-06-18T14:15:11.533000 +CVE-2024-6062,0,1,dadd6f95b83f87273cc3430212566c912259c48e3b6224cff1d8d43c9528602d,2024-06-18T14:15:11.670000 +CVE-2024-6063,0,1,a884af0a7239f5992275086d49c24161d8ae303993e8264675b0420da667ecf0,2024-06-18T14:15:11.787000 +CVE-2024-6064,0,1,a437d20d126de2e6302df618fc0fd61b6c1098a65016c7857130e623e34d608e,2024-06-18T14:15:11.917000 +CVE-2024-6065,0,1,12bfac21a4497db8b2fae053bb336fb3006fa216a4f3adf1332cf2a8bbd53392,2024-06-18T14:15:12.040000 +CVE-2024-6066,0,1,f38956b7531d73be2ff37e0312497b9f2b99af618ba528ef846e38c1b677fe14,2024-06-18T14:15:12.183000 CVE-2024-6067,0,0,917ec11acc59771cd289e02ed472e235338a36350e131e2242624c6b5a660576,2024-06-17T22:15:10.657000 CVE-2024-6080,0,0,ce117abbbf27c271f3b1c554aeba9f1090748517ce038abb4811acdf5fadb2ed,2024-06-17T23:15:51.583000 CVE-2024-6082,0,0,b34a8b9e9d7597c030b945a5724fac42f5803ca75f53728fefe9f424acf1cad3,2024-06-17T23:15:51.920000 CVE-2024-6083,0,0,6fddaebd6fd505529ccfd2377fbb90eb3ff967f1b7daa3e62aab60a1d99a55f2,2024-06-18T00:15:09.853000 -CVE-2024-6084,0,0,c58d4bbed9965d0c5b3b3d3408fb3218484aa76898e857d18c4411d57b93b108,2024-06-18T05:15:52.453000 +CVE-2024-6084,0,1,e83127a2367dfc14c5a74f105b11646fecd7f02b89d4abf85a631505a5590b54,2024-06-18T14:15:12.317000 CVE-2024-6108,0,0,629cb2a981568eef963fe0fd8730638a990cab0f00ba579fb1df944ef1acda4c,2024-06-18T10:15:11.653000 -CVE-2024-6109,1,1,ac88b829202223826825501cf9791e4a037baf3e8842ea6d10b43cea56f9fb4c,2024-06-18T12:15:12.987000 -CVE-2024-6110,1,1,a93edb70ebaea05e4db1d298919bf28b75b9891dd6a65a876e1ff434451eb3ce,2024-06-18T12:15:13.290000 -CVE-2024-6111,1,1,bc873de4e889be7e6632456fd1a89d48a4304c5a7bdb8843bc0410a2f182bce5,2024-06-18T13:15:52.193000 -CVE-2024-6112,1,1,da88edb1478698d60df0ecb0ee1f4342d71663ceba8a402c5714d3e3265c94a5,2024-06-18T13:15:52.550000 -CVE-2024-6114,1,1,b861f686c72ead40271b9e15f5d48ada8c079a2c4c9ea1405ca71da7d3acf766,2024-06-18T13:15:52.897000 -CVE-2024-6115,1,1,8370727144c08f52daee8853cdc1c595dffde958a895699c94efac517eada338,2024-06-18T13:15:53.267000 +CVE-2024-6109,0,0,ac88b829202223826825501cf9791e4a037baf3e8842ea6d10b43cea56f9fb4c,2024-06-18T12:15:12.987000 +CVE-2024-6110,0,0,a93edb70ebaea05e4db1d298919bf28b75b9891dd6a65a876e1ff434451eb3ce,2024-06-18T12:15:13.290000 +CVE-2024-6111,0,1,88ff3438da2fa6dff09fb1e17ea9913d07168b3e37cac6ddb91200dd8cb971da,2024-06-18T15:15:52.873000 +CVE-2024-6112,0,1,3793178079993987ba7bf7b37db89ff5b23660048ce424d2f0351839dfc7b7ff,2024-06-18T15:15:52.993000 +CVE-2024-6114,0,0,b861f686c72ead40271b9e15f5d48ada8c079a2c4c9ea1405ca71da7d3acf766,2024-06-18T13:15:52.897000 +CVE-2024-6115,0,0,8370727144c08f52daee8853cdc1c595dffde958a895699c94efac517eada338,2024-06-18T13:15:53.267000 +CVE-2024-6116,1,1,a2793b73386932d7a864e25346b6e23f449b2a47357972e066a61098cb00943e,2024-06-18T14:15:12.440000