Auto-Update: 2024-06-12T20:00:18.835817+00:00

This commit is contained in:
cad-safe-bot 2024-06-12 20:03:11 +00:00
parent 1df53dfc1e
commit 74ab3a091b
38 changed files with 1964 additions and 277 deletions

View File

@ -2,19 +2,80 @@
"id": "CVE-2022-32897",
"sourceIdentifier": "product-security@apple.com",
"published": "2024-06-10T20:15:12.440",
"lastModified": "2024-06-10T20:54:18.443",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-06-12T18:08:05.860",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "A memory corruption issue was addressed with improved validation. This issue is fixed in macOS Monterey 12.5. Processing a maliciously crafted tiff file may lead to arbitrary code execution."
},
{
"lang": "es",
"value": "Se solucion\u00f3 un problema de corrupci\u00f3n de memoria con una validaci\u00f3n mejorada. Este problema se solucion\u00f3 en macOS Monterey 12.5. El procesamiento de un archivo tiff creado con fines malintencionados puede provocar la ejecuci\u00f3n de c\u00f3digo arbitrario."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-787"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*",
"versionEndExcluding": "12.5",
"matchCriteriaId": "F8EE7558-B3A3-40EC-AB95-70FDD5C4E1CB"
}
]
}
]
}
],
"metrics": {},
"references": [
{
"url": "https://support.apple.com/en-us/HT213345",
"source": "product-security@apple.com"
"source": "product-security@apple.com",
"tags": [
"Release Notes",
"Vendor Advisory"
]
}
]
}

View File

@ -2,19 +2,79 @@
"id": "CVE-2022-32933",
"sourceIdentifier": "product-security@apple.com",
"published": "2024-06-10T20:15:12.533",
"lastModified": "2024-06-10T20:54:18.443",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-06-12T18:07:08.790",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "An information disclosure issue was addressed by removing the vulnerable code. This issue is fixed in macOS Monterey 12.5. A website may be able to track the websites a user visited in Safari private browsing mode."
},
{
"lang": "es",
"value": "Se solucion\u00f3 un problema de divulgaci\u00f3n de informaci\u00f3n eliminando el c\u00f3digo vulnerable. Este problema se solucion\u00f3 en macOS Monterey 12.5. Un sitio web puede rastrear los sitios web que visit\u00f3 un usuario en el modo de navegaci\u00f3n privada de Safari."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 3.9,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*",
"versionEndExcluding": "12.5",
"matchCriteriaId": "F8EE7558-B3A3-40EC-AB95-70FDD5C4E1CB"
}
]
}
]
}
],
"metrics": {},
"references": [
{
"url": "https://support.apple.com/en-us/HT213345",
"source": "product-security@apple.com"
"source": "product-security@apple.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,19 +2,79 @@
"id": "CVE-2022-48578",
"sourceIdentifier": "product-security@apple.com",
"published": "2024-06-10T20:15:12.600",
"lastModified": "2024-06-10T20:54:18.443",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-06-12T18:07:41.117",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "An out-of-bounds read was addressed with improved bounds checking. This issue is fixed in macOS Monterey 12.5. Processing an AppleScript may result in unexpected termination or disclosure of process memory."
},
{
"lang": "es",
"value": "Se solucion\u00f3 una lectura fuera de los l\u00edmites con una verificaci\u00f3n de los l\u00edmites mejorada. Este problema se solucion\u00f3 en macOS Monterey 12.5. El procesamiento de un AppleScript puede provocar una terminaci\u00f3n inesperada o la divulgaci\u00f3n de la memoria del proceso."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 7.1,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.2
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-125"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*",
"versionEndExcluding": "12.5",
"matchCriteriaId": "F8EE7558-B3A3-40EC-AB95-70FDD5C4E1CB"
}
]
}
]
}
],
"metrics": {},
"references": [
{
"url": "https://support.apple.com/en-us/HT213345",
"source": "product-security@apple.com"
"source": "product-security@apple.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,19 +2,79 @@
"id": "CVE-2022-48683",
"sourceIdentifier": "product-security@apple.com",
"published": "2024-06-10T20:15:12.677",
"lastModified": "2024-06-10T20:54:18.443",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-06-12T18:05:40.943",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "An access issue was addressed with additional sandbox restrictions. This issue is fixed in macOS Ventura 13. An app may be able to break out of its sandbox."
},
{
"lang": "es",
"value": "Se solucion\u00f3 un problema de acceso con restricciones adicionales de la zona de pruebas. Este problema se solucion\u00f3 en macOS Ventura 13. Es posible que una aplicaci\u00f3n pueda salir de su zona de pruebas."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*",
"versionEndExcluding": "13.0",
"matchCriteriaId": "71E032AD-F827-4944-9699-BB1E6D4233FC"
}
]
}
]
}
],
"metrics": {},
"references": [
{
"url": "https://support.apple.com/en-us/HT213488",
"source": "product-security@apple.com"
"source": "product-security@apple.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -0,0 +1,59 @@
{
"id": "CVE-2023-29267",
"sourceIdentifier": "psirt@us.ibm.com",
"published": "2024-06-12T19:15:50.020",
"lastModified": "2024-06-12T19:15:50.020",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "IBM Db2 for Linux, UNIX and Windows (includes Db2 Connect Server) 10.5, 11.1, and 11.5is vulnerable to a denial of service, under specific configurations, as the server may crash when using a specially crafted SQL statement by an authenticated user. IBM X-Force ID: 287612."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "psirt@us.ibm.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 5.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.6,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "psirt@us.ibm.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-399"
}
]
}
],
"references": [
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/287612",
"source": "psirt@us.ibm.com"
},
{
"url": "https://www.ibm.com/support/pages/node/7156851",
"source": "psirt@us.ibm.com"
}
]
}

View File

@ -2,23 +2,93 @@
"id": "CVE-2023-40389",
"sourceIdentifier": "product-security@apple.com",
"published": "2024-06-10T20:15:12.753",
"lastModified": "2024-06-10T20:54:18.443",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-06-12T18:05:20.887",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "The issue was addressed with improved restriction of data container access. This issue is fixed in macOS Ventura 13.6.5, macOS Monterey 12.7.4. An app may be able to access sensitive user data."
},
{
"lang": "es",
"value": "El problema se solucion\u00f3 mejorando la restricci\u00f3n del acceso a los contenedores de datos. Este problema se solucion\u00f3 en macOS Ventura 13.6.5, macOS Monterey 12.7.4. Es posible que una aplicaci\u00f3n pueda acceder a datos confidenciales del usuario."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*",
"versionEndExcluding": "12.7.4",
"matchCriteriaId": "80A8C181-92A9-459F-8DF5-466763A8FF1A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*",
"versionStartIncluding": "13.0",
"versionEndExcluding": "13.6.5",
"matchCriteriaId": "69C4F06A-061F-46B3-8BB7-5C9B47C00956"
}
]
}
]
}
],
"metrics": {},
"references": [
{
"url": "https://support.apple.com/en-us/HT214083",
"source": "product-security@apple.com"
"source": "product-security@apple.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://support.apple.com/en-us/HT214085",
"source": "product-security@apple.com"
"source": "product-security@apple.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2024-0865",
"sourceIdentifier": "cybersecurity@se.com",
"published": "2024-06-12T18:15:10.620",
"lastModified": "2024-06-12T18:15:10.620",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "CWE-798: Use of hard-coded credentials vulnerability exists that could cause local privilege\nescalation when logged in as a non-administrative user."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "cybersecurity@se.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "cybersecurity@se.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-798"
}
]
}
],
"references": [
{
"url": "https://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2024-044-03&p_enDocType=Security+and+Safety+Notice&p_File_Name=SEVD-2024-044-03.pdf",
"source": "cybersecurity@se.com"
}
]
}

View File

@ -2,16 +2,40 @@
"id": "CVE-2024-22279",
"sourceIdentifier": "security@vmware.com",
"published": "2024-06-10T20:15:12.880",
"lastModified": "2024-06-10T20:54:18.443",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-06-12T18:04:20.147",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "Improper handling of requests in Routing Release > v0.273.0 and <= v0.297.0 allows an unauthenticated attacker to degrade\n the service availability of the Cloud Foundry deployment if performed at scale."
},
{
"lang": "es",
"value": "El manejo inadecuado de las solicitudes en Routing Release &gt; v0.273.0 y &lt;= v0.297.0 permite que un atacante no autenticado degrade la disponibilidad del servicio de la implementaci\u00f3n de Cloud Foundry si se realiza a escala."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
},
{
"source": "security@vmware.com",
"type": "Secondary",
@ -35,6 +59,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-444"
}
]
},
{
"source": "security@vmware.com",
"type": "Secondary",
@ -46,10 +80,39 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cloudfoundry:cf-deployment:*:*:*:*:*:*:*:*",
"versionStartIncluding": "30.9.0",
"versionEndIncluding": "40.13.0",
"matchCriteriaId": "3640FEAC-74E5-4F8B-A9DA-E223EC46407D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cloudfoundry:routing_release:*:*:*:*:*:*:*:*",
"versionStartIncluding": "0.273.0",
"versionEndIncluding": "0.297.0",
"matchCriteriaId": "D6C45B8F-FE7E-4FE7-9F42-644548DC7DC1"
}
]
}
]
}
],
"references": [
{
"url": "https://www.cloudfoundry.org/blog/cve-2024-22279-gorouter-denial-of-service-attack/",
"source": "security@vmware.com"
"source": "security@vmware.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,54 +2,14 @@
"id": "CVE-2024-2230",
"sourceIdentifier": "cybersecurity@se.com",
"published": "2024-06-12T17:15:50.140",
"lastModified": "2024-06-12T17:15:50.140",
"vulnStatus": "Received",
"lastModified": "2024-06-12T18:15:11.593",
"vulnStatus": "Rejected",
"descriptions": [
{
"lang": "en",
"value": "CWE-798: Use of hard-coded credentials vulnerability exists that could cause local privilege\nescalation when logged in as a non-administrative user."
"value": "Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "cybersecurity@se.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "cybersecurity@se.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-798"
}
]
}
],
"references": [
{
"url": "https://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2024-044-03&p_enDocType=Security+and+Safety+Notice&p_File_Name=SEVD-2024-044-03.pdf",
"source": "cybersecurity@se.com"
}
]
"metrics": {},
"references": []
}

View File

@ -2,27 +2,107 @@
"id": "CVE-2024-23299",
"sourceIdentifier": "product-security@apple.com",
"published": "2024-06-10T20:15:13.107",
"lastModified": "2024-06-10T20:54:18.443",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-06-12T18:03:36.960",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "The issue was addressed with improved checks. This issue is fixed in macOS Sonoma 14.4, macOS Ventura 13.6.5, macOS Monterey 12.7.4. An app may be able to break out of its sandbox."
},
{
"lang": "es",
"value": "El problema se solucion\u00f3 con controles mejorados. Este problema se solucion\u00f3 en macOS Sonoma 14.4, macOS Ventura 13.6.5, macOS Monterey 12.7.4. Es posible que una aplicaci\u00f3n pueda salir de su zona de pruebas."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.6,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 6.0
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*",
"versionEndExcluding": "12.7.4",
"matchCriteriaId": "80A8C181-92A9-459F-8DF5-466763A8FF1A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*",
"versionStartIncluding": "13.0",
"versionEndExcluding": "13.6.5",
"matchCriteriaId": "69C4F06A-061F-46B3-8BB7-5C9B47C00956"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*",
"versionStartIncluding": "14.0",
"versionEndExcluding": "14.4",
"matchCriteriaId": "73160D1F-755B-46D2-969F-DF8E43BB1099"
}
]
}
]
}
],
"metrics": {},
"references": [
{
"url": "https://support.apple.com/en-us/HT214083",
"source": "product-security@apple.com"
"source": "product-security@apple.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://support.apple.com/en-us/HT214084",
"source": "product-security@apple.com"
"source": "product-security@apple.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://support.apple.com/en-us/HT214085",
"source": "product-security@apple.com"
"source": "product-security@apple.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2024-24051",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-06-12T18:15:10.920",
"lastModified": "2024-06-12T18:15:10.920",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Improper input validation of printing files in Monoprice Select Mini V2 V37.115.32 allows attackers to instruct the device's movable parts to destinations that exceed the devices' maximum coordinates via the printing of a malicious .gcode file."
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/tkruppert/Reported_Vulnerabilities/blob/main/CVE-2024-24051.md",
"source": "cve@mitre.org"
}
]
}

View File

@ -2,19 +2,79 @@
"id": "CVE-2024-27792",
"sourceIdentifier": "product-security@apple.com",
"published": "2024-06-10T20:15:13.210",
"lastModified": "2024-06-10T20:54:18.443",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-06-12T18:02:45.480",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "This issue was addressed by adding an additional prompt for user consent. This issue is fixed in macOS Sonoma 14.4. An app may be able to access user-sensitive data."
},
{
"lang": "es",
"value": "Este problema se solucion\u00f3 agregando una solicitud adicional de consentimiento del usuario. Este problema se solucion\u00f3 en macOS Sonoma 14.4. Es posible que una aplicaci\u00f3n pueda acceder a datos confidenciales del usuario."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*",
"versionEndExcluding": "14.4",
"matchCriteriaId": "58227FD1-0619-45F6-AD19-25831899376A"
}
]
}
]
}
],
"metrics": {},
"references": [
{
"url": "https://support.apple.com/en-us/HT214084",
"source": "product-security@apple.com"
"source": "product-security@apple.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2024-2747",
"sourceIdentifier": "cybersecurity@se.com",
"published": "2024-06-12T18:15:11.680",
"lastModified": "2024-06-12T18:15:11.680",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "CWE-428: Unquoted search path or element vulnerability exists in Easergy Studio, which could\ncause privilege escalation when a valid user replaces a trusted file name on the system and\nreboots the machine."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "cybersecurity@se.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "cybersecurity@se.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-428"
}
]
}
],
"references": [
{
"url": "https://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2024-100-01&p_enDocType=Security+and+Safety+Notice&p_File_Name=SEVD-2024-100-01.pdf",
"source": "cybersecurity@se.com"
}
]
}

View File

@ -0,0 +1,59 @@
{
"id": "CVE-2024-28762",
"sourceIdentifier": "psirt@us.ibm.com",
"published": "2024-06-12T18:15:11.267",
"lastModified": "2024-06-12T18:15:11.267",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "IBM Db2 for Linux, UNIX and Windows (includes DB2 Connect Server) 10.5, 11.1, and 11.5 is vulnerable to denial of service with a specially crafted query under certain conditions. IBM X-Force ID: 285246."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "psirt@us.ibm.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 5.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.6,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "psirt@us.ibm.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-770"
}
]
}
],
"references": [
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/285246",
"source": "psirt@us.ibm.com"
},
{
"url": "https://www.ibm.com/support/pages/node/7156847",
"source": "psirt@us.ibm.com"
}
]
}

View File

@ -2,19 +2,79 @@
"id": "CVE-2024-31612",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-06-10T18:15:31.513",
"lastModified": "2024-06-10T20:54:18.443",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-06-12T18:10:30.587",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "Emlog pro2.3 is vulnerable to Cross Site Request Forgery (CSRF) via twitter.php which can be used with a XSS vulnerability to access administrator information."
},
{
"lang": "es",
"value": "Emlog pro2.3 es vulnerable a Cross-Site Request Forgery (CSRF) a trav\u00e9s de twitter.php, que puede usarse con una vulnerabilidad XSS para acceder a la informaci\u00f3n del administrador."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-352"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:emlog:emlog:2.3.0:*:*:*:pro:*:*:*",
"matchCriteriaId": "D51AF99B-7574-4222-A2A2-C1ECC9BE8E51"
}
]
}
]
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/ss122-0ss/cms/blob/main/emlog-csrf.md",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
]
}
]
}

View File

@ -0,0 +1,59 @@
{
"id": "CVE-2024-31881",
"sourceIdentifier": "psirt@us.ibm.com",
"published": "2024-06-12T19:15:50.710",
"lastModified": "2024-06-12T19:15:50.710",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "IBM Db2 for Linux, UNIX and Windows (includes Db2 Connect Server) 10.5, 11.1, and 11.5 is vulnerable to a denial of service as the server may crash when using a specially crafted query on certain columnar tables by an authenticated user. IBM X-Force ID: 287613."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "psirt@us.ibm.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "psirt@us.ibm.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-770"
}
]
}
],
"references": [
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/287613",
"source": "psirt@us.ibm.com"
},
{
"url": "https://www.ibm.com/support/pages/node/7156852",
"source": "psirt@us.ibm.com"
}
]
}

View File

@ -2,19 +2,79 @@
"id": "CVE-2024-32167",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-06-10T20:15:13.367",
"lastModified": "2024-06-10T20:54:18.443",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-06-12T18:00:30.120",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "Sourcecodester Online Medicine Ordering System 1.0 is vulnerable to Arbitrary file deletion vulnerability as the backend settings have the function of deleting pictures to delete any files."
},
{
"lang": "es",
"value": "Sourcecodester Online Medicine Ordering System 1.0 es afectado por una vulnerabilidad de eliminaci\u00f3n arbitraria de archivos ya que la configuraci\u00f3n del backend tiene la funci\u00f3n de eliminar im\u00e1genes para eliminar cualquier archivo."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.1,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.2
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:oretnom23:online_medicine_ordering_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "5BA8DED5-CD2F-4667-A647-F56E5E0E5FC7"
}
]
}
]
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/ss122-0ss/cms/blob/main/omos.md",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-35742",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-06-10T08:15:51.507",
"lastModified": "2024-06-10T12:40:41.360",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-06-12T19:32:19.827",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -16,6 +16,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW",
"baseScore": 7.3,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.4
},
{
"source": "audit@patchstack.com",
"type": "Secondary",
@ -50,10 +70,31 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:codeparrots:easy_forms_for_mailchimp:*:*:*:*:*:wordpress:*:*",
"versionEndIncluding": "6.9.0",
"matchCriteriaId": "0D22135E-A1C8-4889-94E5-63749B16560A"
}
]
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/yikes-inc-easy-mailchimp-extender/wordpress-easy-forms-for-mailchimp-plugin-6-9-0-broken-access-control-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
"source": "audit@patchstack.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,16 +2,40 @@
"id": "CVE-2024-35749",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-06-10T17:16:31.187",
"lastModified": "2024-06-10T18:06:22.600",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-06-12T18:19:55.050",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "Authentication Bypass by Spoofing vulnerability in Acurax Under Construction / Maintenance Mode from Acurax allows Authentication Bypass.This issue affects Under Construction / Maintenance Mode from Acurax: from n/a through 2.6."
},
{
"lang": "es",
"value": "La vulnerabilidad de omisi\u00f3n de autenticaci\u00f3n mediante suplantaci\u00f3n de identidad en Acurax Under Construction / Maintenance Mode from Acurax permite la omisi\u00f3n de autenticaci\u00f3n. Este problema afecta a Under Construction / Maintenance Mode from Acurax: desde n/a hasta 2.6."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 5.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 3.9,
"impactScore": 1.4
},
{
"source": "audit@patchstack.com",
"type": "Secondary",
@ -46,10 +70,31 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:acurax:under_construction_\\/_maintenance_mode:*:*:*:*:*:wordpress:*:*",
"versionEndIncluding": "2.6",
"matchCriteriaId": "6C7D3084-18DA-4ABD-A2EB-2D0CC7B79A77"
}
]
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/coming-soon-maintenance-mode-from-acurax/wordpress-under-construction-maintenance-mode-from-acurax-plugin-2-6-ip-bypass-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
"source": "audit@patchstack.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,16 +2,40 @@
"id": "CVE-2024-35754",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-06-10T17:16:31.430",
"lastModified": "2024-06-10T18:06:22.600",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-06-12T18:19:06.043",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in Ovic Team Ovic Importer allows Path Traversal.This issue affects Ovic Importer: from n/a through 1.6.3."
},
{
"lang": "es",
"value": "Limitaci\u00f3n inadecuada de una vulnerabilidad de nombre de ruta a un directorio restringido (\"Path Traversal\") en Ovic Team Ovic Importer permite el Path Traversal. Este problema afecta a Ovic Importer: desde n/a hasta 1.6.3."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 3.6
},
{
"source": "audit@patchstack.com",
"type": "Secondary",
@ -46,10 +70,31 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ovic_importer_project:ovic_importer:*:*:*:*:*:wordpress:*:*",
"versionEndIncluding": "1.6.3",
"matchCriteriaId": "603DA4B5-A29F-4AE4-A0D5-C30C1C754580"
}
]
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/ovic-import-demo/wordpress-ovic-importer-plugin-1-6-3-arbitrary-file-download-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
"source": "audit@patchstack.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,16 +2,40 @@
"id": "CVE-2024-36407",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-06-10T17:16:32.253",
"lastModified": "2024-06-10T18:06:22.600",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-06-12T18:17:38.777",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "SuiteCRM is an open-source Customer Relationship Management (CRM) software application. In versions prior to 7.14.4 and 8.6.1, a user password can be reset from an unauthenticated attacker. The attacker does not get access to the new password. But this can be annoying for the user. This attack is also dependent on some password reset functionalities being enabled. It also requires the system using php 7, which is not an officially supported version. Versions 7.14.4 and 8.6.1 contain a fix for this issue."
},
{
"lang": "es",
"value": "SuiteCRM es una aplicaci\u00f3n de software de gesti\u00f3n de relaciones con el cliente (CRM) de c\u00f3digo abierto. En versiones anteriores a la 7.14.4 y 8.6.1, un atacante no autenticado puede restablecer la contrase\u00f1a de un usuario. El atacante no obtiene acceso a la nueva contrase\u00f1a. Pero esto puede resultar molesto para el usuario. Este ataque tambi\u00e9n depende de que se habiliten algunas funciones de restablecimiento de contrase\u00f1a. Tambi\u00e9n requiere que el sistema utilice php 7, que no es una versi\u00f3n oficialmente compatible. Las versiones 7.14.4 y 8.6.1 contienen una soluci\u00f3n para este problema."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "LOW",
"baseScore": 6.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 3.9,
"impactScore": 2.5
},
{
"source": "security-advisories@github.com",
"type": "Secondary",
@ -35,6 +59,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-640"
}
]
},
{
"source": "security-advisories@github.com",
"type": "Secondary",
@ -46,10 +80,38 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:salesagility:suitecrm:*:*:*:*:*:*:*:*",
"versionEndExcluding": "7.14.4",
"matchCriteriaId": "176C4E20-B96D-4391-986F-3314663983AC"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:salesagility:suitecrm:*:*:*:*:*:*:*:*",
"versionStartIncluding": "8.0.0",
"versionEndExcluding": "8.6.1",
"matchCriteriaId": "5249169E-5516-4705-A2C8-DE1BA56497D0"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/salesagility/SuiteCRM/security/advisories/GHSA-6p2f-wwx9-952r",
"source": "security-advisories@github.com"
"source": "security-advisories@github.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,16 +2,40 @@
"id": "CVE-2024-36408",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-06-10T17:16:32.503",
"lastModified": "2024-06-10T18:06:22.600",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-06-12T18:13:58.627",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "SuiteCRM is an open-source Customer Relationship Management (CRM) software application. In versions prior to 7.14.4 and 8.6.1, poor input validation allows for SQL Injection in the `Alerts` controller. Versions 7.14.4 and 8.6.1 contain a fix for this issue."
},
{
"lang": "es",
"value": "SuiteCRM es una aplicaci\u00f3n de software de gesti\u00f3n de relaciones con el cliente (CRM) de c\u00f3digo abierto. En versiones anteriores a 7.14.4 y 8.6.1, una validaci\u00f3n de entrada deficiente permite la inyecci\u00f3n de SQL en el controlador \"Alertas\". Las versiones 7.14.4 y 8.6.1 contienen una soluci\u00f3n para este problema."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
},
{
"source": "security-advisories@github.com",
"type": "Secondary",
@ -35,6 +59,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
},
{
"source": "security-advisories@github.com",
"type": "Secondary",
@ -46,10 +80,38 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:salesagility:suitecrm:*:*:*:*:*:*:*:*",
"versionEndExcluding": "7.14.4",
"matchCriteriaId": "176C4E20-B96D-4391-986F-3314663983AC"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:salesagility:suitecrm:*:*:*:*:*:*:*:*",
"versionStartIncluding": "8.0.0",
"versionEndExcluding": "8.6.1",
"matchCriteriaId": "5249169E-5516-4705-A2C8-DE1BA56497D0"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/salesagility/SuiteCRM/security/advisories/GHSA-2g8f-gjrr-x5cg",
"source": "security-advisories@github.com"
"source": "security-advisories@github.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,16 +2,40 @@
"id": "CVE-2024-36409",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-06-10T18:15:35.620",
"lastModified": "2024-06-10T20:54:18.443",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-06-12T18:09:19.450",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "SuiteCRM is an open-source Customer Relationship Management (CRM) software application. In versions prior to 7.14.4 and 8.6.1, poor input validation allows for SQL Injection in Tree data entry point. Versions 7.14.4 and 8.6.1 contain a fix for this issue."
},
{
"lang": "es",
"value": "SuiteCRM es una aplicaci\u00f3n de software de gesti\u00f3n de relaciones con el cliente (CRM) de c\u00f3digo abierto. En versiones anteriores a 7.14.4 y 8.6.1, una validaci\u00f3n de entrada deficiente permite la inyecci\u00f3n SQL en el punto de entrada de datos del Tree. Las versiones 7.14.4 y 8.6.1 contienen una soluci\u00f3n para este problema."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
},
{
"source": "security-advisories@github.com",
"type": "Secondary",
@ -35,6 +59,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
},
{
"source": "security-advisories@github.com",
"type": "Secondary",
@ -46,10 +80,38 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:salesagility:suitecrm:*:*:*:*:*:*:*:*",
"versionEndExcluding": "7.14.4",
"matchCriteriaId": "176C4E20-B96D-4391-986F-3314663983AC"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:salesagility:suitecrm:*:*:*:*:*:*:*:*",
"versionStartIncluding": "8.0.0",
"versionEndExcluding": "8.6.1",
"matchCriteriaId": "5249169E-5516-4705-A2C8-DE1BA56497D0"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/salesagility/SuiteCRM/security/advisories/GHSA-pxq4-vw23-v73f",
"source": "security-advisories@github.com"
"source": "security-advisories@github.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,16 +2,40 @@
"id": "CVE-2024-36410",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-06-10T18:15:35.830",
"lastModified": "2024-06-10T20:54:18.443",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-06-12T18:09:04.930",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "SuiteCRM is an open-source Customer Relationship Management (CRM) software application. In versions prior to 7.14.4 and 8.6.1, poor input validation allows for SQL Injection in EmailUIAjax messages count controller. Versions 7.14.4 and 8.6.1 contain a fix for this issue."
},
{
"lang": "es",
"value": "SuiteCRM es una aplicaci\u00f3n de software de gesti\u00f3n de relaciones con el cliente (CRM) de c\u00f3digo abierto. En versiones anteriores a 7.14.4 y 8.6.1, una validaci\u00f3n de entrada deficiente permite la inyecci\u00f3n de SQL en el controlador de recuento de mensajes EmailUIAjax. Las versiones 7.14.4 y 8.6.1 contienen una soluci\u00f3n para este problema."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
},
{
"source": "security-advisories@github.com",
"type": "Secondary",
@ -35,6 +59,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
},
{
"source": "security-advisories@github.com",
"type": "Secondary",
@ -46,10 +80,38 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:salesagility:suitecrm:*:*:*:*:*:*:*:*",
"versionEndExcluding": "7.14.4",
"matchCriteriaId": "176C4E20-B96D-4391-986F-3314663983AC"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:salesagility:suitecrm:*:*:*:*:*:*:*:*",
"versionStartIncluding": "8.0.0",
"versionEndExcluding": "8.6.1",
"matchCriteriaId": "5249169E-5516-4705-A2C8-DE1BA56497D0"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/salesagility/SuiteCRM/security/advisories/GHSA-7jj8-m2wj-m6xq",
"source": "security-advisories@github.com"
"source": "security-advisories@github.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,16 +2,40 @@
"id": "CVE-2024-36411",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-06-10T20:15:13.593",
"lastModified": "2024-06-10T20:54:18.443",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-06-12T18:00:13.937",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "SuiteCRM is an open-source Customer Relationship Management (CRM) software application. In versions prior to 7.14.4 and 8.6.1, poor input validation allows for SQL Injection in EmailUIAjax displayView controller. Versions 7.14.4 and 8.6.1 contain a fix for this issue."
},
{
"lang": "es",
"value": "SuiteCRM es una aplicaci\u00f3n de software de gesti\u00f3n de relaciones con el cliente (CRM) de c\u00f3digo abierto. En versiones anteriores a 7.14.4 y 8.6.1, una validaci\u00f3n de entrada deficiente permite la inyecci\u00f3n de SQL en el controlador DisplayView de EmailUIAjax. Las versiones 7.14.4 y 8.6.1 contienen una soluci\u00f3n para este problema."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
},
{
"source": "security-advisories@github.com",
"type": "Secondary",
@ -35,6 +59,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
},
{
"source": "security-advisories@github.com",
"type": "Secondary",
@ -46,10 +80,38 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:salesagility:suitecrm:*:*:*:*:*:*:*:*",
"versionEndExcluding": "7.14.4",
"matchCriteriaId": "176C4E20-B96D-4391-986F-3314663983AC"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:salesagility:suitecrm:*:*:*:*:*:*:*:*",
"versionStartIncluding": "8.0.0",
"versionEndExcluding": "8.6.1",
"matchCriteriaId": "5249169E-5516-4705-A2C8-DE1BA56497D0"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/salesagility/SuiteCRM/security/advisories/GHSA-9rvr-mcrf-p4p7",
"source": "security-advisories@github.com"
"source": "security-advisories@github.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -0,0 +1,24 @@
{
"id": "CVE-2024-37629",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-06-12T18:15:12.293",
"lastModified": "2024-06-12T18:15:12.293",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "SummerNote 0.8.18 is vulnerable to Cross Site Scripting (XSS) via the Code View Function."
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/summernote/summernote/issues/4642",
"source": "cve@mitre.org"
},
{
"url": "https://grumpz.net/cve-2024-37629-simple-xss-payload-exploits-0day-vulnerability-in-10000-web-apps",
"source": "cve@mitre.org"
}
]
}

View File

@ -2,16 +2,40 @@
"id": "CVE-2024-3850",
"sourceIdentifier": "ics-cert@hq.dhs.gov",
"published": "2024-06-10T17:16:33.080",
"lastModified": "2024-06-10T18:06:22.600",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-06-12T18:12:56.413",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "Uniview NVR301-04S2-P4 is vulnerable to reflected cross-site scripting attack (XSS). An attacker could send a user a URL that if clicked on could execute malicious JavaScript in their browser. This vulnerability also requires authentication before it can be exploited, so the scope and severity is limited. Also, even if JavaScript is executed, no additional benefits are obtained."
},
{
"lang": "es",
"value": "Uniview NVR301-04S2-P4 es vulnerable al ataque de Cross-Site Scripting (XSS) reflejado. Un atacante podr\u00eda enviar a un usuario una URL que, si se hace clic en ella, podr\u00eda ejecutar JavaScript malicioso en su navegador. Esta vulnerabilidad tambi\u00e9n requiere autenticaci\u00f3n antes de poder explotarse, por lo que el alcance y la gravedad son limitados. Adem\u00e1s, aunque se ejecute JavaScript no se obtienen beneficios adicionales."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
},
{
"source": "ics-cert@hq.dhs.gov",
"type": "Secondary",
@ -46,10 +70,44 @@
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:uniview:nvr301-04s2-p4_firmware:*:*:*:*:*:*:*:*",
"versionEndExcluding": "nvr-b3801.20.17.240507",
"matchCriteriaId": "087BD43C-9237-4C7D-923E-0CFAA2A5E976"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:uniview:nvr301-04s2-p4:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5CD63D99-65D2-4E52-BFD4-10D317D941D9"
}
]
}
]
}
],
"references": [
{
"url": "https://www.cisa.gov/news-events/ics-advisories/icsa-24-156-01",
"source": "ics-cert@hq.dhs.gov"
"source": "ics-cert@hq.dhs.gov",
"tags": [
"Third Party Advisory",
"US Government Resource"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-4328",
"sourceIdentifier": "security@huntr.dev",
"published": "2024-06-10T08:15:51.730",
"lastModified": "2024-06-10T12:40:41.360",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-06-12T19:33:00.527",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -15,6 +15,28 @@
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.1,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.2
}
],
"cvssMetricV30": [
{
"source": "security@huntr.dev",
@ -50,10 +72,30 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:parisneo:lollms_web_ui:9.6:*:*:*:*:*:*:*",
"matchCriteriaId": "525C477F-F133-44B9-A0BC-43C1080D35F1"
}
]
}
]
}
],
"references": [
{
"url": "https://huntr.com/bounties/0f4faadf-ebca-4ef8-9d8a-66dbd849c0f8",
"source": "security@huntr.dev"
"source": "security@huntr.dev",
"tags": [
"Exploit"
]
}
]
}

View File

@ -2,16 +2,53 @@
"id": "CVE-2024-5102",
"sourceIdentifier": "security@nortonlifelock.com",
"published": "2024-06-10T17:16:34.133",
"lastModified": "2024-06-10T18:06:22.600",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-06-12T18:12:01.453",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "A sym-linked file accessed via the repair function in Avast Antivirus <24.2 on Windows may allow user to elevate privilege to delete arbitrary files or run processes as NT AUTHORITY\\SYSTEM.\u00a0The vulnerability exists within the \"Repair\" (settings -> troubleshooting -> repair) feature, which attempts to delete a file in the current user's AppData directory as NT AUTHORITY\\SYSTEM. A\u00a0low-privileged user can make a pseudo-symlink and a junction folder and point to a file on the system. This can provide a low-privileged user an Elevation of Privilege to win a race-condition which will re-create the system files and make Windows callback to a specially-crafted file which could be used to launch a privileged shell instance.\n\nThis issue affects Avast Antivirus prior to 24.2."
},
{
"lang": "es",
"value": "Un archivo con enlace simb\u00f3lico al que se accede a trav\u00e9s de la funci\u00f3n de reparaci\u00f3n en Avast Antivirus &lt;24.2 en Windows puede permitir al usuario elevar privilegios para eliminar archivos arbitrarios o ejecutar procesos como NT AUTHORITY\\SYSTEM. La vulnerabilidad existe dentro de la funci\u00f3n \"Reparaci\u00f3n\" (configuraci\u00f3n -&gt; soluci\u00f3n de problemas -&gt; reparaci\u00f3n), que intenta eliminar un archivo en el directorio AppData del usuario actual como NT AUTHORITY\\SYSTEM. Un usuario con pocos privilegios puede crear un pseudoenlace simb\u00f3lico y una carpeta de uni\u00f3n y apuntar a un archivo en el sistema. Esto puede proporcionar a un usuario con pocos privilegios una elevaci\u00f3n de permisos para ganar una condici\u00f3n de ejecuci\u00f3n que recrear\u00e1 los archivos del sistema y realizar\u00e1 una devoluci\u00f3n de llamada de Windows a un archivo especialmente manipulado que podr\u00eda usarse para iniciar una instancia de shell privilegiada. Este problema afecta a Avast Antivirus antes de la versi\u00f3n 24.2."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "HIGH",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.0,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-59"
}
]
},
{
"source": "security@nortonlifelock.com",
"type": "Secondary",
@ -23,10 +60,43 @@
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:avast:antivirus:*:*:*:*:*:*:*:*",
"versionEndExcluding": "24.2",
"matchCriteriaId": "E14E4791-47A8-4E8C-96E1-1E4A7F2D2F43"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA"
}
]
}
]
}
],
"references": [
{
"url": "https://support.norton.com/sp/static/external/tools/security-advisories.html",
"source": "security@nortonlifelock.com"
"source": "security@nortonlifelock.com",
"tags": [
"Not Applicable"
]
}
]
}

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2024-5559",
"sourceIdentifier": "cybersecurity@se.com",
"published": "2024-06-12T18:15:12.493",
"lastModified": "2024-06-12T18:15:12.493",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "CWE-327: Use of a Broken or Risky Cryptographic Algorithm vulnerability exists that could\ncause denial of service, device reboot, or an attacker gaining full control of the relay when a\nspecially crafted reset token is entered into the front panel of the device."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "cybersecurity@se.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H",
"attackVector": "PHYSICAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 6.1,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 0.9,
"impactScore": 5.2
}
]
},
"weaknesses": [
{
"source": "cybersecurity@se.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-327"
}
]
}
],
"references": [
{
"url": "https://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2024-163-02&p_enDocType=Security+and+Safety+Notice&p_File_Name=SEVD-2024-163-02.pdf",
"source": "cybersecurity@se.com"
}
]
}

View File

@ -2,16 +2,40 @@
"id": "CVE-2024-5597",
"sourceIdentifier": "ics-cert@hq.dhs.gov",
"published": "2024-06-10T17:16:35.180",
"lastModified": "2024-06-10T18:06:22.600",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-06-12T18:10:47.080",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "Fuji Electric Monitouch V-SFT\u00a0is vulnerable to a type confusion, which could cause a crash or code execution."
},
{
"lang": "es",
"value": "Fuji Electric Monitouch V-SFT es vulnerable a una confusi\u00f3n de tipos, lo que podr\u00eda provocar un bloqueo o la ejecuci\u00f3n del c\u00f3digo."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
},
{
"source": "ics-cert@hq.dhs.gov",
"type": "Secondary",
@ -46,10 +70,32 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:fujielectric:monitouch_v-sft:*:*:*:*:*:*:*:*",
"versionEndExcluding": "6.2.3.0",
"matchCriteriaId": "0EBA0347-109B-4079-998F-1B3A5C3E8D9E"
}
]
}
]
}
],
"references": [
{
"url": "https://www.cisa.gov/news-events/ics-advisories/icsa-24-151-02",
"source": "ics-cert@hq.dhs.gov"
"source": "ics-cert@hq.dhs.gov",
"tags": [
"Third Party Advisory",
"US Government Resource"
]
}
]
}

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2024-5798",
"sourceIdentifier": "security@hashicorp.com",
"published": "2024-06-12T19:15:51.413",
"lastModified": "2024-06-12T19:15:51.413",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Vault and Vault Enterprise did not properly validate the JSON Web Token (JWT) role-bound audience claim when using the Vault JWT auth method. This may have resulted in Vault validating a JWT the audience and role-bound claims do not match, allowing an invalid login to succeed when it should have been rejected.\n\nThis vulnerability, CVE-2024-5798, was fixed in Vault and Vault Enterprise 1.17.0, 1.16.3, and 1.15.9"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security@hashicorp.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:C/C:L/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "HIGH",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 2.6,
"baseSeverity": "LOW"
},
"exploitabilityScore": 1.0,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "security@hashicorp.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-285"
}
]
}
],
"references": [
{
"url": "https://discuss.hashicorp.com/t/hcsec-2024-11-vault-incorrectly-validated-json-web-tokens-jwt-audience-claims/67770",
"source": "security@hashicorp.com"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-5893",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-06-12T15:15:53.393",
"lastModified": "2024-06-12T15:15:53.393",
"lastModified": "2024-06-12T19:15:51.630",
"vulnStatus": "Received",
"descriptions": [
{

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-5894",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-06-12T15:15:53.693",
"lastModified": "2024-06-12T15:15:53.693",
"lastModified": "2024-06-12T19:15:51.733",
"vulnStatus": "Received",
"descriptions": [
{

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-5895",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-06-12T15:15:53.970",
"lastModified": "2024-06-12T15:15:53.970",
"lastModified": "2024-06-12T18:15:12.850",
"vulnStatus": "Received",
"descriptions": [
{

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-5896",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-06-12T16:15:12.813",
"lastModified": "2024-06-12T16:15:12.813",
"lastModified": "2024-06-12T19:15:51.847",
"vulnStatus": "Received",
"descriptions": [
{

View File

@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update
```plain
2024-06-12T18:00:19.039330+00:00
2024-06-12T20:00:18.835817+00:00
```
### Most recent CVE Modification Timestamp synchronized with NVD
```plain
2024-06-12T18:00:00.317000+00:00
2024-06-12T19:33:00.527000+00:00
```
### Last Data Feed Release
@ -33,67 +33,53 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
### Total Number of included CVEs
```plain
253688
253697
```
### CVEs added in the last Commit
Recently added CVEs: `23`
Recently added CVEs: `9`
- [CVE-2024-1891](CVE-2024/CVE-2024-18xx/CVE-2024-1891.json) (`2024-06-12T16:15:10.887`)
- [CVE-2024-2230](CVE-2024/CVE-2024-22xx/CVE-2024-2230.json) (`2024-06-12T17:15:50.140`)
- [CVE-2024-22855](CVE-2024/CVE-2024-228xx/CVE-2024-22855.json) (`2024-06-12T17:15:49.913`)
- [CVE-2024-36761](CVE-2024/CVE-2024-367xx/CVE-2024-36761.json) (`2024-06-12T16:15:11.983`)
- [CVE-2024-37036](CVE-2024/CVE-2024-370xx/CVE-2024-37036.json) (`2024-06-12T17:15:50.637`)
- [CVE-2024-37037](CVE-2024/CVE-2024-370xx/CVE-2024-37037.json) (`2024-06-12T17:15:50.853`)
- [CVE-2024-37038](CVE-2024/CVE-2024-370xx/CVE-2024-37038.json) (`2024-06-12T17:15:51.080`)
- [CVE-2024-37039](CVE-2024/CVE-2024-370xx/CVE-2024-37039.json) (`2024-06-12T17:15:51.313`)
- [CVE-2024-37040](CVE-2024/CVE-2024-370xx/CVE-2024-37040.json) (`2024-06-12T17:15:51.540`)
- [CVE-2024-37300](CVE-2024/CVE-2024-373xx/CVE-2024-37300.json) (`2024-06-12T16:15:12.097`)
- [CVE-2024-37878](CVE-2024/CVE-2024-378xx/CVE-2024-37878.json) (`2024-06-12T17:15:51.803`)
- [CVE-2024-5557](CVE-2024/CVE-2024-55xx/CVE-2024-5557.json) (`2024-06-12T17:15:51.943`)
- [CVE-2024-5558](CVE-2024/CVE-2024-55xx/CVE-2024-5558.json) (`2024-06-12T17:15:52.160`)
- [CVE-2024-5560](CVE-2024/CVE-2024-55xx/CVE-2024-5560.json) (`2024-06-12T17:15:52.357`)
- [CVE-2024-5759](CVE-2024/CVE-2024-57xx/CVE-2024-5759.json) (`2024-06-12T16:15:12.550`)
- [CVE-2024-5896](CVE-2024/CVE-2024-58xx/CVE-2024-5896.json) (`2024-06-12T16:15:12.813`)
- [CVE-2024-5897](CVE-2024/CVE-2024-58xx/CVE-2024-5897.json) (`2024-06-12T16:15:13.100`)
- [CVE-2024-5898](CVE-2024/CVE-2024-58xx/CVE-2024-5898.json) (`2024-06-12T17:15:52.577`)
- [CVE-2024-5905](CVE-2024/CVE-2024-59xx/CVE-2024-5905.json) (`2024-06-12T17:15:52.847`)
- [CVE-2024-5906](CVE-2024/CVE-2024-59xx/CVE-2024-5906.json) (`2024-06-12T17:15:53.000`)
- [CVE-2024-5907](CVE-2024/CVE-2024-59xx/CVE-2024-5907.json) (`2024-06-12T17:15:53.127`)
- [CVE-2024-5908](CVE-2024/CVE-2024-59xx/CVE-2024-5908.json) (`2024-06-12T17:15:53.253`)
- [CVE-2024-5909](CVE-2024/CVE-2024-59xx/CVE-2024-5909.json) (`2024-06-12T17:15:53.370`)
- [CVE-2023-29267](CVE-2023/CVE-2023-292xx/CVE-2023-29267.json) (`2024-06-12T19:15:50.020`)
- [CVE-2024-0865](CVE-2024/CVE-2024-08xx/CVE-2024-0865.json) (`2024-06-12T18:15:10.620`)
- [CVE-2024-24051](CVE-2024/CVE-2024-240xx/CVE-2024-24051.json) (`2024-06-12T18:15:10.920`)
- [CVE-2024-2747](CVE-2024/CVE-2024-27xx/CVE-2024-2747.json) (`2024-06-12T18:15:11.680`)
- [CVE-2024-28762](CVE-2024/CVE-2024-287xx/CVE-2024-28762.json) (`2024-06-12T18:15:11.267`)
- [CVE-2024-31881](CVE-2024/CVE-2024-318xx/CVE-2024-31881.json) (`2024-06-12T19:15:50.710`)
- [CVE-2024-37629](CVE-2024/CVE-2024-376xx/CVE-2024-37629.json) (`2024-06-12T18:15:12.293`)
- [CVE-2024-5559](CVE-2024/CVE-2024-55xx/CVE-2024-5559.json) (`2024-06-12T18:15:12.493`)
- [CVE-2024-5798](CVE-2024/CVE-2024-57xx/CVE-2024-5798.json) (`2024-06-12T19:15:51.413`)
### CVEs modified in the last Commit
Recently modified CVEs: `48`
Recently modified CVEs: `27`
- [CVE-2024-35745](CVE-2024/CVE-2024-357xx/CVE-2024-35745.json) (`2024-06-12T17:36:32.763`)
- [CVE-2024-35746](CVE-2024/CVE-2024-357xx/CVE-2024-35746.json) (`2024-06-12T17:36:02.087`)
- [CVE-2024-35747](CVE-2024/CVE-2024-357xx/CVE-2024-35747.json) (`2024-06-12T17:32:52.343`)
- [CVE-2024-36263](CVE-2024/CVE-2024-362xx/CVE-2024-36263.json) (`2024-06-12T17:15:50.363`)
- [CVE-2024-36264](CVE-2024/CVE-2024-362xx/CVE-2024-36264.json) (`2024-06-12T17:15:50.447`)
- [CVE-2024-36265](CVE-2024/CVE-2024-362xx/CVE-2024-36265.json) (`2024-06-12T17:15:50.520`)
- [CVE-2024-36412](CVE-2024/CVE-2024-364xx/CVE-2024-36412.json) (`2024-06-12T18:00:00.317`)
- [CVE-2024-36413](CVE-2024/CVE-2024-364xx/CVE-2024-36413.json) (`2024-06-12T17:59:44.673`)
- [CVE-2024-36414](CVE-2024/CVE-2024-364xx/CVE-2024-36414.json) (`2024-06-12T17:59:14.353`)
- [CVE-2024-36415](CVE-2024/CVE-2024-364xx/CVE-2024-36415.json) (`2024-06-12T17:58:53.497`)
- [CVE-2024-36416](CVE-2024/CVE-2024-364xx/CVE-2024-36416.json) (`2024-06-12T17:58:19.570`)
- [CVE-2024-36417](CVE-2024/CVE-2024-364xx/CVE-2024-36417.json) (`2024-06-12T17:58:04.477`)
- [CVE-2024-3699](CVE-2024/CVE-2024-36xx/CVE-2024-3699.json) (`2024-06-12T17:53:09.130`)
- [CVE-2024-3700](CVE-2024/CVE-2024-37xx/CVE-2024-3700.json) (`2024-06-12T17:51:52.710`)
- [CVE-2024-37014](CVE-2024/CVE-2024-370xx/CVE-2024-37014.json) (`2024-06-12T17:57:01.660`)
- [CVE-2024-37051](CVE-2024/CVE-2024-370xx/CVE-2024-37051.json) (`2024-06-12T17:49:04.017`)
- [CVE-2024-37393](CVE-2024/CVE-2024-373xx/CVE-2024-37393.json) (`2024-06-12T17:56:23.390`)
- [CVE-2024-37569](CVE-2024/CVE-2024-375xx/CVE-2024-37569.json) (`2024-06-12T16:32:56.203`)
- [CVE-2024-37570](CVE-2024/CVE-2024-375xx/CVE-2024-37570.json) (`2024-06-12T16:32:34.513`)
- [CVE-2024-37880](CVE-2024/CVE-2024-378xx/CVE-2024-37880.json) (`2024-06-12T16:30:15.053`)
- [CVE-2024-4744](CVE-2024/CVE-2024-47xx/CVE-2024-4744.json) (`2024-06-12T16:44:12.157`)
- [CVE-2024-4745](CVE-2024/CVE-2024-47xx/CVE-2024-4745.json) (`2024-06-12T16:23:34.197`)
- [CVE-2024-4746](CVE-2024/CVE-2024-47xx/CVE-2024-4746.json) (`2024-06-12T16:17:42.223`)
- [CVE-2024-5389](CVE-2024/CVE-2024-53xx/CVE-2024-5389.json) (`2024-06-12T16:31:30.577`)
- [CVE-2024-5585](CVE-2024/CVE-2024-55xx/CVE-2024-5585.json) (`2024-06-12T17:15:04.083`)
- [CVE-2022-48578](CVE-2022/CVE-2022-485xx/CVE-2022-48578.json) (`2024-06-12T18:07:41.117`)
- [CVE-2022-48683](CVE-2022/CVE-2022-486xx/CVE-2022-48683.json) (`2024-06-12T18:05:40.943`)
- [CVE-2023-40389](CVE-2023/CVE-2023-403xx/CVE-2023-40389.json) (`2024-06-12T18:05:20.887`)
- [CVE-2024-22279](CVE-2024/CVE-2024-222xx/CVE-2024-22279.json) (`2024-06-12T18:04:20.147`)
- [CVE-2024-2230](CVE-2024/CVE-2024-22xx/CVE-2024-2230.json) (`2024-06-12T18:15:11.593`)
- [CVE-2024-23299](CVE-2024/CVE-2024-232xx/CVE-2024-23299.json) (`2024-06-12T18:03:36.960`)
- [CVE-2024-27792](CVE-2024/CVE-2024-277xx/CVE-2024-27792.json) (`2024-06-12T18:02:45.480`)
- [CVE-2024-31612](CVE-2024/CVE-2024-316xx/CVE-2024-31612.json) (`2024-06-12T18:10:30.587`)
- [CVE-2024-32167](CVE-2024/CVE-2024-321xx/CVE-2024-32167.json) (`2024-06-12T18:00:30.120`)
- [CVE-2024-35742](CVE-2024/CVE-2024-357xx/CVE-2024-35742.json) (`2024-06-12T19:32:19.827`)
- [CVE-2024-35749](CVE-2024/CVE-2024-357xx/CVE-2024-35749.json) (`2024-06-12T18:19:55.050`)
- [CVE-2024-35754](CVE-2024/CVE-2024-357xx/CVE-2024-35754.json) (`2024-06-12T18:19:06.043`)
- [CVE-2024-36407](CVE-2024/CVE-2024-364xx/CVE-2024-36407.json) (`2024-06-12T18:17:38.777`)
- [CVE-2024-36408](CVE-2024/CVE-2024-364xx/CVE-2024-36408.json) (`2024-06-12T18:13:58.627`)
- [CVE-2024-36409](CVE-2024/CVE-2024-364xx/CVE-2024-36409.json) (`2024-06-12T18:09:19.450`)
- [CVE-2024-36410](CVE-2024/CVE-2024-364xx/CVE-2024-36410.json) (`2024-06-12T18:09:04.930`)
- [CVE-2024-36411](CVE-2024/CVE-2024-364xx/CVE-2024-36411.json) (`2024-06-12T18:00:13.937`)
- [CVE-2024-3850](CVE-2024/CVE-2024-38xx/CVE-2024-3850.json) (`2024-06-12T18:12:56.413`)
- [CVE-2024-4328](CVE-2024/CVE-2024-43xx/CVE-2024-4328.json) (`2024-06-12T19:33:00.527`)
- [CVE-2024-5102](CVE-2024/CVE-2024-51xx/CVE-2024-5102.json) (`2024-06-12T18:12:01.453`)
- [CVE-2024-5597](CVE-2024/CVE-2024-55xx/CVE-2024-5597.json) (`2024-06-12T18:10:47.080`)
- [CVE-2024-5893](CVE-2024/CVE-2024-58xx/CVE-2024-5893.json) (`2024-06-12T19:15:51.630`)
- [CVE-2024-5894](CVE-2024/CVE-2024-58xx/CVE-2024-5894.json) (`2024-06-12T19:15:51.733`)
- [CVE-2024-5895](CVE-2024/CVE-2024-58xx/CVE-2024-5895.json) (`2024-06-12T18:15:12.850`)
- [CVE-2024-5896](CVE-2024/CVE-2024-58xx/CVE-2024-5896.json) (`2024-06-12T19:15:51.847`)
## Download and Usage

View File

@ -200379,7 +200379,7 @@ CVE-2022-32893,0,0,161d6fd84dbdb4a87bb5e4ac023d648e449b6c5e4d831863311dfb7b40ce9
CVE-2022-32894,0,0,258579e09971ddea3b4815a13f4b228f09b463853438998782e99d4d4a74b2e8,2022-12-07T03:02:55.287000
CVE-2022-32895,0,0,a866a4ecd54090d59826e47060c2fe31da4fd60afa522dd3d88fdd6339a97c2f,2022-11-03T14:38:33.867000
CVE-2022-32896,0,0,17fd28355dac713cc35d13c78c58dc3e1c8b430c0015f022b283eda11acef2f1,2023-08-08T14:22:24.967000
CVE-2022-32897,0,0,48db8f055f8661448f1c41e1ab91769e27b9ae62f41e7cf89869272a1f89eec2,2024-06-10T20:54:18.443000
CVE-2022-32897,0,1,ad1349fe5eaed63ccba0146dc0974a0d84416447755751e4c227e8c842cc303f,2024-06-12T18:08:05.860000
CVE-2022-32898,0,0,dc4c5dc9a5f3f10252df3b48ee72cd91d41244a4d9e1d63ef2e7b84b757e902a,2023-01-09T16:41:59.350000
CVE-2022-32899,0,0,afe99f73cfd08bcbacadec410d0fe2bcc62f7d2c73f75e55f14d8746d172f152,2023-01-09T16:41:59.350000
CVE-2022-3290,0,0,2598192fd9d11269a3309ca73acf9adcc0a3e7182df9deebc35808ec4cc8523b,2022-09-28T13:54:11.263000
@ -200419,7 +200419,7 @@ CVE-2022-3293,0,0,208cfce2b7ac354931f31ba8ea1e649c7f7a231f08e040e01e241d29aeb0fd
CVE-2022-32930,0,0,6501f43eaef797598ee4ea282914eb15c1d9750dfe72ba94881d039525715665,2023-11-07T03:48:16.257000
CVE-2022-32931,0,0,b2251f5ad956fc927b536b3edee597d7793373efa2a8dd080f2c08cca5dc1379,2024-01-17T18:10:19.543000
CVE-2022-32932,0,0,1102c22e0851c3c424b28e7faaf3ff8745362f1417acc4f535a4ba257afb88f6,2023-01-09T16:44:23.987000
CVE-2022-32933,0,0,ba6b70c60e891771d5d7c3b6512527b24ded69541010144e676f4b6f6804ccf6,2024-06-10T20:54:18.443000
CVE-2022-32933,0,1,daa9b33dae16c49c1712cbaa019d4a1c6803394a17d9727f584a4c99692fb414,2024-06-12T18:07:08.790000
CVE-2022-32934,0,0,ae7a364db30ef26af0d462dba138265a2bbe9c4ff428ec3d06f101a71957f722,2022-11-02T17:22:05.340000
CVE-2022-32935,0,0,fcbe24cdd5e1de76f7985c93ff5640c642de4bc9cd70af024775d480ee0ec42e,2023-01-09T16:44:23.987000
CVE-2022-32936,0,0,827192a61577f10a55507a90c27c1195c504d60d2f40870f66ce48b9e1468487,2022-11-02T17:21:19.290000
@ -211906,7 +211906,7 @@ CVE-2022-4857,0,0,0e5a9df166a6eb7599c22f7c627a657c342565b8697f901467ea9955281c8d
CVE-2022-48570,0,0,a91d2cb19cd784e6a11ff6550eb2743f29999f59e85a364a5102b2983792442e,2023-08-26T02:21:54.680000
CVE-2022-48571,0,0,ae3b3af5bbcfecab9b669dd32fc253aeba667281f87e0ebbda13e170727190e2,2023-09-08T01:15:07.393000
CVE-2022-48577,0,0,77e1543c35f1ee06c24e8e2e11a8c7c83f489e8b77e54c3bff4963e766ab9a70,2024-01-17T17:59:46.343000
CVE-2022-48578,0,0,c45dcd91ec674b8483c6ae373271fa1f7aaf30516772a0aef2bfceebdcb6e376,2024-06-10T20:54:18.443000
CVE-2022-48578,0,1,399afee58cb1e4b9287588770d7eae8c93875e19f24711d9d13327076529da38,2024-06-12T18:07:41.117000
CVE-2022-48579,0,0,3f957510457b8c9d6b8e34337fb22ab5e2a1209fd6d659c23c825189fcc68a6f,2023-08-17T19:15:09.937000
CVE-2022-4858,0,0,7cbd4a78421d8f6168ed44172d43a8ab3e262629f6948b0a13b370cce3410e79,2023-01-06T20:37:55.853000
CVE-2022-48580,0,0,261d9c5a3bcaba84f16de37444029b1303b556b114bd7507c2e162886d8b9278,2023-08-11T17:39:26.760000
@ -212012,7 +212012,7 @@ CVE-2022-48675,0,0,ffdc7ff07043ff8d904f74a8a1b71fad7bff2a559dea9c5bb178531131fc3
CVE-2022-4868,0,0,49bc3762269009af54870f2860cabd5c2f0372571503d002526079fe993a74bc,2023-01-06T21:20:41.477000
CVE-2022-48681,0,0,87ea3536a125ead12bc84931d58f6cdc8b01f80a07f5daca9e8b795750274574,2024-05-28T12:39:28.377000
CVE-2022-48682,0,0,a9e8566df4d423615eab0842eba8f88c67d4de5de15c1876586d34ed294d4bbf,2024-04-26T12:58:17.720000
CVE-2022-48683,0,0,336a3d9bbc084f5aa551c45c5ba0fbe2c70ee2785073a11630635b5b6ccc9518,2024-06-10T20:54:18.443000
CVE-2022-48683,0,1,231318f64008f2f3695ffe0b49c56b82eb9076a10e27c878281bb8e00293e71f,2024-06-12T18:05:40.943000
CVE-2022-48684,0,0,183793e4ba2f09101fce115e434fee8cb8ff9c6a4ec46d5771edf2b59c69d11d,2024-04-29T12:42:03.667000
CVE-2022-48685,0,0,ffa3e1d85b1e2d4bd3c19f046cb04890a395016777f2401ecc051ad5f33c92b4,2024-04-29T12:42:03.667000
CVE-2022-48686,0,0,ee162749a361db1a0b6a353b0eb61f9a34a852517c7d84ecd41264480ae7864b,2024-05-23T20:33:45.640000
@ -221678,6 +221678,7 @@ CVE-2023-29259,0,0,b86e126bd91cd2fc20c170d4f39f31827fd202b01354ff37791ad5ad49481
CVE-2023-2926,0,0,10860d33149a75b831927a885d3ab775fd881867d8c964f302679da502e6d89c,2024-05-17T02:23:22.407000
CVE-2023-29260,0,0,5a5f942789887b0f00e6d89e31eb06b1ed453ac44ac5fb54eed356da6e5c5bd8,2023-07-28T15:59:39.313000
CVE-2023-29261,0,0,4d3b9821bc373c399912471c4b813ae9ccb7003d9bd9e446133385ea0c68b84f,2023-09-08T17:10:21.577000
CVE-2023-29267,1,1,b34415562c5d4a4d3c2254caa52c76bdde1ef499dd6288e35af142d321098d81,2024-06-12T19:15:50.020000
CVE-2023-29268,0,0,5fe2469b2003acd64e34ff0465d8f32ca97075c18139a460519bfe903d98eaba,2023-05-09T01:31:28.760000
CVE-2023-2927,0,0,1ef4bcc434ab7cd7f2eb4bc31df3dba4427c9caeaa1a3b69dd65ea29252b330a,2024-05-17T02:23:22.513000
CVE-2023-29273,0,0,62ec26a776677e38edd34e5cfa86acb0290941f7f08123c59bbfd0438413920e,2023-05-17T12:50:17.923000
@ -229893,7 +229894,7 @@ CVE-2023-40384,0,0,b43d991ba538e8f493daab5fb3410f6f256194586a5e5378eafe23521539b
CVE-2023-40385,0,0,d87186e65fbe11c963d9f2ac49a37bea6de8f4a87feb525e072522d577fee61f,2024-01-18T14:32:30.730000
CVE-2023-40386,0,0,98b5b9164e51a67fec2b119151c92fd2d9bb1d8d51de82443b681e79ce2c9a34,2023-10-12T01:59:56.563000
CVE-2023-40388,0,0,0669c38434b1494ed261fd2860ebba321deabd42233fd11611759d0565888e20,2023-10-12T01:59:05.793000
CVE-2023-40389,0,0,0e5d597fd284ef871235fda779b9f0d46c10ac1ec6ce6f60f41ff8dad9aef6c3,2024-06-10T20:54:18.443000
CVE-2023-40389,0,1,b193787b70f32e4c09ae93f27d418d82b25a00d1d832a208e6e4bfa799ec5d30,2024-06-12T18:05:20.887000
CVE-2023-4039,0,0,0accd3adc8756cc7a927b7c908e91237d32e08c68f471a1067012290c829eea2,2024-02-19T23:15:07.680000
CVE-2023-40390,0,0,dcc08f1579a2804bdfa75d3a1e4b64bbe4a6a3affb5757b1219cc9eb8124a134,2024-04-08T22:42:58.650000
CVE-2023-40391,0,0,674710606efc5e20f3b4d034fd6151d2f994f0410f8a773be4faafb0e10f357d,2023-11-07T04:20:12.943000
@ -241062,6 +241063,7 @@ CVE-2024-0860,0,0,084e48b2c8a82b5fc9ff07cd8cf26129d61baf73b83c11537e5ca2016cdef4
CVE-2024-0861,0,0,896e71725cbfb614341352655e0b66e7def84c2617b58556401d4278cc8b74b9,2024-03-04T20:26:41.663000
CVE-2024-0862,0,0,8d5bc8312d1d93cf3fbc9bc4464ee1ea50ba5434e84839c1491be95817a91a77,2024-05-14T19:17:55.627000
CVE-2024-0864,0,0,d89dcae43b5200797b81bcd0ad7b3b6e3cba6f54866805aee9a386996fe0fcfc,2024-02-29T13:49:29.390000
CVE-2024-0865,1,1,370365c7ed475e058b0d9ad0f5915d4aa0796c5015b2d90186d4112b32287694,2024-06-12T18:15:10.620000
CVE-2024-0866,0,0,2315ea7233a9f152b45c2f2db1db04866f3fbf8a4d5b6e4bad65f402d240f082,2024-03-26T12:55:05.010000
CVE-2024-0867,0,0,bff6dce5de81ae7891647493682c1a4a2fb7bb408cce62ce65d5462da59ac834,2024-05-24T13:03:11.993000
CVE-2024-0868,0,0,50dc470faec27f67202fe3c6b32f6e0e6b35686ae887e56f6aa6e0525b6a38ff,2024-04-17T12:48:07.510000
@ -241392,7 +241394,7 @@ CVE-2024-1224,0,0,6671b720f58aa0150d14676a615208ff783ead72a8a766227d501b4f2f840d
CVE-2024-1225,0,0,0b68eae0ee984524ebb2df359b44e58b9ba84a615ada907a65e017a24d65ff7a,2024-05-17T02:35:19.560000
CVE-2024-1226,0,0,14a580d4b3eab4674d6ae40acd0cb53f118cafa2e8004e611e071913cd041fe6,2024-03-12T16:02:33.900000
CVE-2024-1227,0,0,94dce1bd607b6903e23d54a7d6b05a85e9dc37b645ba64935d33bd38f11890aa,2024-03-12T16:02:33.900000
CVE-2024-1228,0,1,32605b1907163ad08b6f7354355ad82a69536fce794750addc55c0f4867cda18,2024-06-12T17:54:10.157000
CVE-2024-1228,0,0,32605b1907163ad08b6f7354355ad82a69536fce794750addc55c0f4867cda18,2024-06-12T17:54:10.157000
CVE-2024-1229,0,0,2de2ced35127929201da3cc9dd41aa7d4097d2d61f9931ef1592526b3e0b7dfa,2024-05-14T16:13:02.773000
CVE-2024-1230,0,0,8bd1dd7f8fd55f9189a6ea53392185485a1a6386a5bf97397fc7d3598cb5fb14,2024-05-14T16:13:02.773000
CVE-2024-1231,0,0,3fff2a2694f3a2890eda32488c438fe0ab80785883b0aefb67199c2eabc0d967,2024-03-25T13:47:14.087000
@ -241972,7 +241974,7 @@ CVE-2024-1887,0,0,c4ea1f30b4ee64401ec471c46007c0919b3d087c3cc77ec486ec75f252891a
CVE-2024-1888,0,0,5c48c7ef8072bebc640799142c34dfeb37124cccb7d60f3f8c8d95bce0e2f85b,2024-02-29T13:49:29.390000
CVE-2024-1889,0,0,34f0990ceccd75a569863a77fd268eb539c7d5ec488f2446cd3288ee4234f41c,2024-05-17T02:35:40.333000
CVE-2024-1890,0,0,7900533f7cd4681e9cd51c85aaf38899f8710ddf980029322947b07f23ce149a,2024-05-17T02:35:40.430000
CVE-2024-1891,1,1,9802320e49bf94f684ebc24df2bdd7287205d192242bfac06185b4199b96884b,2024-06-12T16:15:10.887000
CVE-2024-1891,0,0,9802320e49bf94f684ebc24df2bdd7287205d192242bfac06185b4199b96884b,2024-06-12T16:15:10.887000
CVE-2024-1892,0,0,496f86c779f360256e1e190fecff75b396ebefe831fecdca264ec166e984ab7e,2024-04-16T12:15:10.050000
CVE-2024-1893,0,0,678e936c89e4c4b6fa8874f1c864b24cc93a2715a395ba59ed61dfe9d57d4f11,2024-04-10T13:23:38.787000
CVE-2024-1894,0,0,9ac2447d78b1be48d8de07fcf9beac6b1c3a9f0af4ea5741b3b2d6e9b7f97eab,2024-03-13T18:15:58.530000
@ -243433,7 +243435,7 @@ CVE-2024-22270,0,0,6ddec6950380375d517eada92585a48899328ef96a9cd5eb66f2637f566ac
CVE-2024-22273,0,0,16868e6e004c6ea2c682b722d1af123cd0ac6fcfe5ea535614be88cbaef5ca1b,2024-05-22T12:46:53.887000
CVE-2024-22274,0,0,da89bea76d6b538861a6666c1640acb76ac100e4dc1f77b4f4f466724f6cc406,2024-05-22T12:46:53.887000
CVE-2024-22275,0,0,d091ffc8d821e68d75dc2e136f38c753791a1420e1604ca18001c3ee3e374585,2024-05-22T12:46:53.887000
CVE-2024-22279,0,0,bac65a965c7743587c4ba47458bb580df11725b735e8b42e4c63142bb5a95e31,2024-06-10T20:54:18.443000
CVE-2024-22279,0,1,ff0edd9c060816dc238726f665fb413b790bba614b84113a6241bd5b06ac695f,2024-06-12T18:04:20.147000
CVE-2024-2228,0,0,9da409d4c88fb5c41c04e34c5096b8810f55668a8720e19e0dcad976dea69ce5,2024-03-22T19:02:10.300000
CVE-2024-22282,0,0,53d62e993d25bddde67f64a9b7b05dfd45a21e7eb7c9bf0be8fb90ec2911d888,2024-02-06T16:55:19.983000
CVE-2024-22283,0,0,f9f0bb31955cdc5efe0fe68bd93a1968461b937d4826bd6ada9de29ff0f15691,2024-02-01T04:13:41.033000
@ -243454,7 +243456,7 @@ CVE-2024-22296,0,0,26497821bdd6523c6ffa82c8932df21c7375a0b75c6b4829fe7611d85fa93
CVE-2024-22297,0,0,577fc11ad5b0d749376591ad16a375dfa540e32ffa2e1012a2392bbaefc0287d,2024-02-06T15:38:07.050000
CVE-2024-22298,0,0,eb4e5161d1233abda8028026a5fd3bc810ac81a8912963670187ebce3b0787a2,2024-06-10T12:40:41.360000
CVE-2024-22299,0,0,80a4882f4c9ab5eec2fd5d8b16ede08da3f188bafea457394bae184bfdc470b7,2024-03-27T12:29:30.307000
CVE-2024-2230,1,1,e82ed198b5ea9197ae8c82fa57588e9a9ab058667665b30035da7ff4601497f5,2024-06-12T17:15:50.140000
CVE-2024-2230,0,1,e699fdb43b6adb8abf534c5ade2071cb0bd60e369ba4e4e395321daf7afb33f9,2024-06-12T18:15:11.593000
CVE-2024-22300,0,0,6a2ac22ff64061be14a64819ed6b0717dea7f94ee6239bf636e871d8862b7a4e,2024-03-27T12:29:30.307000
CVE-2024-22301,0,0,5c83b0c07edb476e78cc7de384bddf72fcd86e319684689177ab1f8ee28c611d,2024-01-30T17:44:59.847000
CVE-2024-22302,0,0,18ed1122bd0976f0a4301ea9eae7070b9d3278277ba02d3b706dc015d0fd056d,2024-02-06T15:03:44.550000
@ -243736,7 +243738,7 @@ CVE-2024-22851,0,0,e3b3a4173f66bde18bcde8b4d6e07ed058612b81ace293aa36efd8837ff83
CVE-2024-22852,0,0,fba9226bfac500a19dd8b91a9788eed1682675a652e0b6dd1f0ee08e7df876f5,2024-02-13T18:16:51.790000
CVE-2024-22853,0,0,ec6a06bd931391a16658f5323e2bffe5ddc884df4aacc34598a685bd3979b258,2024-02-12T17:50:31.950000
CVE-2024-22854,0,0,8b8b90cd6c1c9786e2fb5396ca19284ddab9c4ff42eae4bf034495afa4860075,2024-02-16T13:37:51.433000
CVE-2024-22855,1,1,cfcf005f31b5547d2fa8c00cc5f7f6b8e097a82610a7ccea6c31a0a094af8224,2024-06-12T17:15:49.913000
CVE-2024-22855,0,0,cfcf005f31b5547d2fa8c00cc5f7f6b8e097a82610a7ccea6c31a0a094af8224,2024-06-12T17:15:49.913000
CVE-2024-22856,0,0,1db436dd1cb2a23310320ff23e9771e20af5e9762fcab5bed6358a83124247e2,2024-04-22T13:28:34.007000
CVE-2024-22857,0,0,dc8c498662e053f2e9a39f301d349f3ad8950912cf2843180c278fecc58efab5,2024-04-19T01:15:06.297000
CVE-2024-22859,0,0,b948ee8fe798cbf01c18cac852f304ecb9e81e6d367124ad19db38465396c137,2024-05-17T02:36:25.953000
@ -243993,7 +243995,7 @@ CVE-2024-23295,0,0,743f5eabb2b6d4f98b7103afe617defce53a2964c31cc5fb435d1e716a86d
CVE-2024-23296,0,0,f2d241411bbf170ca53882111e52dbdb186cee03e035f81f8ca923817c8ecb80,2024-06-10T18:15:26.090000
CVE-2024-23297,0,0,11090791f72ea9d35b8fb354b91b4b823c54cb3e7511d3c9883ee2b46d74ae89,2024-03-13T22:15:11.520000
CVE-2024-23298,0,0,0db74819ed2b222cfa97f4a2ff3293f59c3a4c8235378608525d7e46421fc5d7,2024-03-17T22:38:29.433000
CVE-2024-23299,0,0,1c88330fb8522b94766109d1dd2397174dba448896d7bc71434e322a1473fa49,2024-06-10T20:54:18.443000
CVE-2024-23299,0,1,9cbedc1b6c106d21c23b83013b85bcc3f46b28eda4f03d0872450db614ec5b11,2024-06-12T18:03:36.960000
CVE-2024-2330,0,0,89039a53a73072e3c8dbbafcac630d622765f67693433d6946597b6c23ca98bb,2024-05-17T02:38:10.540000
CVE-2024-23300,0,0,9e732c262847100dbcf579b4c37b4c875c53e2f23045a19a85b558ff38956aa4,2024-03-13T22:15:11.643000
CVE-2024-23301,0,0,95f1c4c0d3c3f56beb5ca2f43c481bd416943d89ac106cdf8ea6bddea7fc220a,2024-02-21T03:15:08.950000
@ -244490,12 +244492,13 @@ CVE-2024-24042,0,0,4a4e7ea160d5d0244b906cb4642841160ba9374fd30aaa87521360ed2e8ec
CVE-2024-24043,0,0,8fe33813863354c4eead332dc6243b19fd5b77f5e3a94ddd813814cf68659374,2024-03-19T13:26:46
CVE-2024-2405,0,0,6fadbb3a08e48e4daaf715605940677b2a23272062986f3b1cf2a8081644718f,2024-05-02T13:27:25.103000
CVE-2024-24050,0,0,ccdf8a4463bf6582ad99a29c76e6e3640436eaa4075881cd577d9e7450feacb8,2024-03-21T12:58:51.093000
CVE-2024-24051,1,1,346a02fadb0538e24f23dd10c7092da8c40a788203ea517636d36f00d4f890d5,2024-06-12T18:15:10.920000
CVE-2024-24059,0,0,3da8cffbcfd869f14b04835347f156c5cf1a6025fa9627a3ec1ec79a41a9d0be,2024-02-03T00:40:43.793000
CVE-2024-2406,0,0,bce1950aa0ba3247257e0f9798cc049e12ff07a8e21e9064eb763cce3e8229ea,2024-05-17T02:38:12.963000
CVE-2024-24060,0,0,3a6250076b98d97024da5e52a26f1f0c29807ef38de327e60f431783e4f1deaa,2024-02-03T00:40:48.600000
CVE-2024-24061,0,0,3ae0e78c2ecb0941fa62f48d1dc7792d4436b76ec841f1dbf3bf2317943894c3,2024-02-03T00:40:50.623000
CVE-2024-24062,0,0,ce51fb5fa7f08b3262a47fca149a06dc25ea5ca7c584b3ae7210563fa9fd54c1,2024-02-03T00:40:52.877000
CVE-2024-2408,0,1,79608ac2b73485aa622d02d7fd2cdce295f0e378608808ccee920b0119f98fdd,2024-06-12T17:07:00.770000
CVE-2024-2408,0,0,79608ac2b73485aa622d02d7fd2cdce295f0e378608808ccee920b0119f98fdd,2024-06-12T17:07:00.770000
CVE-2024-2409,0,0,ba586e1c6181b06c3ede339eac17164a8a25d5149e65ad7809000b9e6c808051,2024-03-29T12:45:02.937000
CVE-2024-24091,0,0,6258a73a312c8c072d234b916137958d60ec77d8bc24aab7428a6677fc85f73a,2024-02-08T13:44:21.670000
CVE-2024-24092,0,0,d4ab4cc918de723ea385c13013f3b5223c8222e6f58b4c0135bd83322e27d646,2024-03-13T12:33:51.697000
@ -246393,7 +246396,7 @@ CVE-2024-26975,0,0,8f19cd721adbc3dd7c661f9a8d550ab97e4f94e7a1b3b7e5ff34954db774d
CVE-2024-26976,0,0,7f3160fd993055d2d086205203ac721ed6cf29a59d28518fd22c6db2c5d69b1f,2024-05-01T13:02:20.750000
CVE-2024-26977,0,0,7f4303ba7265fe68f47a9d9801d011f3d78c2b9c80b2b80c869116171921f0d6,2024-05-01T13:02:20.750000
CVE-2024-26978,0,0,8d561a460191ee18f3c0a08c6e5356905628e7e52b101255033d5d975d400ae1,2024-05-23T19:14:12.637000
CVE-2024-26979,0,1,54694270d008c20297a5341208d33ae44a9e8eec55dc5d4e396d03aaba5d47ac,2024-06-12T16:15:11.147000
CVE-2024-26979,0,0,54694270d008c20297a5341208d33ae44a9e8eec55dc5d4e396d03aaba5d47ac,2024-06-12T16:15:11.147000
CVE-2024-2698,0,0,a1683e28c7d60c58b4273f4c288780d16aef9c7ec236a8f1e9da79ec4d3513a9,2024-06-12T08:15:50.250000
CVE-2024-26980,0,0,ec5b812a8dbedf3c6e27cceb9a929403fd6e62291ad747f9f2a67748a6189d95,2024-05-17T11:15:08.357000
CVE-2024-26981,0,0,3038c3174fa5069e42a0db4274374d74c2b5066ad475e921f47c4589915379cd,2024-05-03T06:15:10.663000
@ -246793,6 +246796,7 @@ CVE-2024-27456,0,0,3292722b93148b4ab52923fa8e4498babe5b306f79794afb1b6b9f9d803c4
CVE-2024-2746,0,0,1b5368899c557a576ffe86c7e7b79d4b6baeb106e8e490e5cd11b765b982c384,2024-05-08T13:15:00.690000
CVE-2024-27460,0,0,df535e4d58c862090dbd04ef172ea8290b582d97a5936fdd9d6a3f9c58e5f496,2024-05-14T16:13:02.773000
CVE-2024-27462,0,0,ffc1613a8162349f9e85ee9ce86cbdc5073a2092a76bc9fd14c2d891290e403c,2024-04-14T23:15:45.830000
CVE-2024-2747,1,1,d231d87af296adb45ba5b75984d43826bc5440ff69aaeceb9a13932d550f539a,2024-06-12T18:15:11.680000
CVE-2024-27474,0,0,eedd7f52a8e754286d0994212e940bbab5a78ce0f631ba173f8be2320f55c67f,2024-04-10T19:49:51.183000
CVE-2024-27476,0,0,8cccfbd88a289b73ae2a82f1969e7e11b3256be620bf6a323e970ad5fee54963,2024-04-10T19:49:51.183000
CVE-2024-27477,0,0,475b0780b17016d259d91214e57785f69e50a4f85e3c7b3b34cb0c00dc852aa4,2024-04-10T19:49:51.183000
@ -246920,7 +246924,7 @@ CVE-2024-27789,0,0,e8af3b8395ebfe2a50ae6a05a1719125fcf49e2fa7ab9962ec195038f09bf
CVE-2024-2779,0,0,7d93945d439dc1c56122930b3da6852f346b5a9c5c7e988befb1c7629d43acd9,2024-05-17T02:38:30.057000
CVE-2024-27790,0,0,bcfd5001fb1cf915dabaeb0b530ecc91785155cc1894eb908f37345e8fae816d,2024-05-14T16:13:02.773000
CVE-2024-27791,0,0,44e295d56ae82c935e7837aa163b1c182c6b8efd5ceb84b892de3324ac96937b,2024-04-24T17:16:50.397000
CVE-2024-27792,0,0,f4c93ffbcf0fa2b69a394e4f8043e5a055ca57351625146acb468cc524a0cb16,2024-06-10T20:54:18.443000
CVE-2024-27792,0,1,b95a839f6d92f70e579e6fb1f69e78add1d64a83552f4a2c177f2ea0f9d25269,2024-06-12T18:02:45.480000
CVE-2024-27793,0,0,353572505ffd41c49c8a655c8653c3aeaf93e2259f3ba926c49eca056984adca,2024-06-10T18:15:28.523000
CVE-2024-27794,0,0,f83311c8ff012592a70730809fe5cac1d0e670b37674538bd8092c8ae8d69027,2024-04-16T13:24:07.103000
CVE-2024-27796,0,0,0f6294260561edcbf030914cbfc2e2f9112190409fca9765281ce7a127290cce,2024-06-11T08:15:48.723000
@ -247501,6 +247505,7 @@ CVE-2024-28759,0,0,9f826e767eccb501c83d9e0b4aea57892e4b6d1fc39ae786236211b2b03c1
CVE-2024-2876,0,0,ca929cd772004ee45ba4bf2b2f3e651133fec067e1337478e97408d02da509b9,2024-05-02T18:00:37.360000
CVE-2024-28760,0,0,f13dfa1f12a43504927ac2719a8e853cfb1151dffa495fbc407992956485e6d1,2024-05-14T16:13:02.773000
CVE-2024-28761,0,0,7d0ebbc762dcfe4cf5ec12d421c004fe6c0994634dae34cb15afa5ced3227b1e,2024-05-14T16:13:02.773000
CVE-2024-28762,1,1,58b7c410be5d6b16aaff58116b8227723446494cec6adb1809ab2e56d458285d,2024-06-12T18:15:11.267000
CVE-2024-28764,0,0,1ff18eb0d7a0a34d2666a7ea9874b7a9f6fab70460b6927de1a30c6bfac1d347,2024-05-01T19:50:25.633000
CVE-2024-2877,0,0,4ebb9fffce04288aa8e0eb4ee39122211107975df336085ff4049d2ca6b5d666,2024-04-30T17:52:35.057000
CVE-2024-28775,0,0,d8ae5eae8edfcef0453722d74b23437224b101c661ce9b595bcef1d2255b4529,2024-05-01T19:50:25.633000
@ -247518,7 +247523,7 @@ CVE-2024-28824,0,0,5a9476ae0fdb0520e3a986c832f5f9e27a50da5cb3aa11e06910544296f0e
CVE-2024-28825,0,0,9e6f2228e06896e59bb560ffc81c60a9a09c25eeaded2122eaaaf9d670949d13,2024-04-24T13:39:42.883000
CVE-2024-28826,0,0,af714d67b245e2002324726263b60e676423e9fa16954adb4190fa57b660a93f,2024-05-29T13:02:09.280000
CVE-2024-2883,0,0,e66be81816608580e2e81ffcb02cca4ae9a2aa5cbea60907cc2e1d80cffbaf4a,2024-03-29T04:15:08.743000
CVE-2024-28833,0,1,c28d0621123671b94853f5763fc92ce8098ea4f6621d0443f950677dd9d3b57a,2024-06-12T17:53:57.103000
CVE-2024-28833,0,0,c28d0621123671b94853f5763fc92ce8098ea4f6621d0443f950677dd9d3b57a,2024-06-12T17:53:57.103000
CVE-2024-28834,0,0,af4d9c1dfe16b4591e02664fd7ad00b6706b6af449eca3208820bfc8e9b376f7,2024-06-10T17:16:24.560000
CVE-2024-28835,0,0,7ffb3867ffb469cae5c61eed57191c292b3344e17f215833454f077170fed24a,2024-05-16T23:15:47.883000
CVE-2024-28836,0,0,ef9665bb9a0895616f82c07b3b8f93ecbb9dcd318a88906096e3fd29af01d6df,2024-04-03T12:38:04.840000
@ -249340,8 +249345,8 @@ CVE-2024-31601,0,0,77cac7e969e7044d11a270a83972e4e2e2dc079687b9a26234b27560790da
CVE-2024-31609,0,0,a5493714821f0e0bdf3fb4b62cbe59dc9498aefc0ac9439c259bc304a5043f24,2024-04-26T12:58:17.720000
CVE-2024-3161,0,0,fb0275ae00c4597a14b8da67383742a33ef20f00a5c359deab992b83c03fa869,2024-05-02T18:00:37.360000
CVE-2024-31610,0,0,25f0fe7dce01b290d07505f210ca0196ceaddb3229e43445c402c10f0654acf3,2024-04-26T12:58:17.720000
CVE-2024-31611,0,1,5f9e3922a5a892423d1bcf4416bca54c649670eb4a86ab19022e098b2dd1541f,2024-06-12T17:44:20.730000
CVE-2024-31612,0,0,49b396f89a743014e777c696cbe0e8a08f9d50db5428a29b14912920ed331742,2024-06-10T20:54:18.443000
CVE-2024-31611,0,0,5f9e3922a5a892423d1bcf4416bca54c649670eb4a86ab19022e098b2dd1541f,2024-06-12T17:44:20.730000
CVE-2024-31612,0,1,113b62286ae368abe151f1276422ede5a17bbddf3e1084cf1b1f49c898ddb8c7,2024-06-12T18:10:30.587000
CVE-2024-31613,0,0,b22e0ead922262609ccd5adc643348b5359bd4a3d7fad40a103e18586e9e197b,2024-06-10T18:06:22.600000
CVE-2024-31615,0,0,fec656de044fff01992f2ac4c2d789e80286f56b4ff6f28fca891fbe026d80d2,2024-04-26T12:58:17.720000
CVE-2024-31616,0,0,0d01710e8c157f0d32189692d849b27951e2db80c68fce9b88dd89c45379117e,2024-04-24T13:39:42.883000
@ -249455,6 +249460,7 @@ CVE-2024-31874,0,0,1770e58d0ae5591eb931a8cdfdb054fb4d854f81849d14af250c71db6caf5
CVE-2024-31878,0,0,7b937c0e504c94aa96f40006d95fdcb5515eaac5bd841ea5891290c2bc5b3971,2024-06-11T18:23:27.153000
CVE-2024-31879,0,0,9e400de08d7e3b57ea9b7110f44ae1b22a7e387f9dc2f33f777f519f045dfc82,2024-05-20T13:00:34.807000
CVE-2024-3188,0,0,5d70d4884e37e1862c5503e8662fdd8be316d1df7ecad77f44114699c1426b8a,2024-04-26T12:58:17.720000
CVE-2024-31881,1,1,e82b7acd09518d9c4f6495f1056ca401dd472b764741964d8e891eecafa9c574,2024-06-12T19:15:50.710000
CVE-2024-31887,0,0,e951c215b0e12b882bcc7244c98d7631ee4f4b7a3271b5f24e369f1a635cd3e5,2024-04-17T12:48:07.510000
CVE-2024-31889,0,0,ed866bc797e966623ecbd3af70c76d899ae08cc5d44be77f88a15f5367e891f4,2024-05-31T19:14:47.793000
CVE-2024-3189,0,0,1214acc8d4ffdbc5da1a7913ab352a27b53d04d94b5a178d0c09d285be9bf460,2024-05-15T16:40:19.330000
@ -249659,7 +249665,7 @@ CVE-2024-32161,0,0,60a9978d35673eb48d5015a016115c1964e22e158d92ca4de7447769c2bc7
CVE-2024-32162,0,0,118ad76854c7f44c6eff111c13a9015a5b3feb6620bf58d40eff2d6cbdaa766c,2024-04-17T20:08:21.887000
CVE-2024-32163,0,0,2a0e3e31a356cd8bdaedc62aa40103c9838a070e53ea091fe0aa567b9d0934a1,2024-04-17T20:08:21.887000
CVE-2024-32166,0,0,8c8680ec923ae3bed8a58326054c7f7280f0a44a3f507a43055bc183eecf3164,2024-04-19T16:19:49.043000
CVE-2024-32167,0,0,05e1cbd308ff706078b16b665b5965a1c0bcfad89648107c18560821495d1800,2024-06-10T20:54:18.443000
CVE-2024-32167,0,1,e1b908973391122461e7829a2d79d03ca6868b1699a22ea149cc482b5749c2dc,2024-06-12T18:00:30.120000
CVE-2024-3217,0,0,3ac42247ba2d685c0a6f4de738ef771d2778cce367312f144d0326551965dbb5,2024-04-05T12:40:52.763000
CVE-2024-3218,0,0,15d13fdbdfb7c920bd4937754941efbbf6a0874233b44e802f3c54e2e1e5f44b,2024-05-17T02:39:47.357000
CVE-2024-32205,0,0,3b6122f4454c6189a285ee435770c5e0b5d0cb175cbe04dd262a3757da1f87c2,2024-04-22T20:15:07.210000
@ -251494,14 +251500,14 @@ CVE-2024-35646,0,0,0e09ad267a508b8a536900d74395f7d6fd0b87a4648f067a40bf0167f0c61
CVE-2024-35647,0,0,dd07a9e9a3804b0b3fdbbe9e6cdd58e439fe4bcd9c7b53cb07e789eae1ef1bd7,2024-06-03T14:46:24.250000
CVE-2024-35649,0,0,d2b425bcfde98a2966defe9ae6862e0c80d81675a5706c35a1abbc9f35d7c710,2024-06-06T13:26:46.537000
CVE-2024-3565,0,0,a4b6a30a1c15667775d02efa34a8d23be7f17c664853400b6c8d4dfd523ae02d,2024-06-03T14:46:24.250000
CVE-2024-35650,0,1,88f71076c8da2d896db64a869bec9bd7a99a8aa038f8111659743d5eada46f6e,2024-06-12T17:51:20.710000
CVE-2024-35650,0,0,88f71076c8da2d896db64a869bec9bd7a99a8aa038f8111659743d5eada46f6e,2024-06-12T17:51:20.710000
CVE-2024-35651,0,0,c7cb64a650c120e950c2ebdd125d00702e2f5a45bd11dc5dcd4c353649900947,2024-06-06T13:31:03.307000
CVE-2024-35652,0,0,9510ec3ad0224331e475c18e35d7d417da7a9c92aa8f4cfe1b6338dfa113c106,2024-06-06T13:36:05.853000
CVE-2024-35653,0,0,4b4970e5c1ab1eb20df6ebb598ecfea858a4722a1a783fe88469bdbb9ecad5dd,2024-06-06T13:37:21.420000
CVE-2024-35654,0,0,403af0bf2fa4d57830f12a96c5ed9dd1e0545db0132e87e50cac0f148d9af859,2024-06-10T20:24:17.467000
CVE-2024-35655,0,0,1a8db850dc208775392ef9c5c3a34b4b09a3268c6e51da6a685217112000f91b,2024-06-12T10:15:30.750000
CVE-2024-35657,0,0,ec3d4a59ee1d38b4a1682b94b858ea40acc94a4e2de21f7ce8d2cd2eed427722,2024-06-10T02:52:08.267000
CVE-2024-35658,0,1,3cb3bd435b1fac14fe5eaac53d9db5d29070b97d8c6a9cdf7abd4efbfc625cc2,2024-06-12T17:50:55.227000
CVE-2024-35658,0,0,3cb3bd435b1fac14fe5eaac53d9db5d29070b97d8c6a9cdf7abd4efbfc625cc2,2024-06-12T17:50:55.227000
CVE-2024-35659,0,0,f212e44ec6c22c0baf538b4517ba7b487235e2fde0f9df0b7a9af518af224687,2024-06-10T02:52:08.267000
CVE-2024-3566,0,0,e417ef1ceca67d3a9a8ba800520d4a9974bcf4eba2e3e6325dafdfbfe6af8d6b,2024-04-10T19:49:51.183000
CVE-2024-35660,0,0,2144517a38c7b64dced7262d27a94b4362008ce987204b48e77a7c0e29f52214,2024-06-10T02:52:08.267000
@ -251522,11 +251528,11 @@ CVE-2024-35673,0,0,b2fbe24f0db2be82a21d56e6af9fa939a75372c8c56128cfd1a449a3505ad
CVE-2024-35674,0,0,61cb77c7b559c0aea326b97e0a24dca407c217fd649698447cd12a1a2e660866,2024-06-06T14:17:35.017000
CVE-2024-35675,0,0,d7aba91d6e03b6f23f94998b1bbf8b95344e8e8bd8d66158e67ae8b5f0f9b824,2024-06-10T02:52:08.267000
CVE-2024-35676,0,0,166eba80edb14795a5db8d246b6f75a63e949d50aa6c3420d82832ddae687bce,2024-06-10T02:52:08.267000
CVE-2024-35677,0,1,a3d618a3c7c44c9a2d5f73466c7858c8d9d95222181b688c0b22353d99594014,2024-06-12T17:50:33.367000
CVE-2024-35677,0,0,a3d618a3c7c44c9a2d5f73466c7858c8d9d95222181b688c0b22353d99594014,2024-06-12T17:50:33.367000
CVE-2024-35678,0,0,6bc2c5c60f113bbad24188332113cc6602fdbe13d58e8cdb7dadac89ed3cab7f,2024-06-10T02:52:08.267000
CVE-2024-35679,0,0,dc8fe3cbba8d2dc64f92808386423d05749489681fc72acff538a223b0a0ce77,2024-06-10T02:52:08.267000
CVE-2024-3568,0,0,573133d2a7191a46b0975280ef7162f7787321191e0ad33f2c4c70c7e8d9c3f5,2024-04-10T19:49:51.183000
CVE-2024-35680,0,1,abcc5f0eeb10e717c7a703c1bfe0ea4283e28aa8c32eb264f3894dee0391af2a,2024-06-12T17:49:56.670000
CVE-2024-35680,0,0,abcc5f0eeb10e717c7a703c1bfe0ea4283e28aa8c32eb264f3894dee0391af2a,2024-06-12T17:49:56.670000
CVE-2024-35681,0,0,525bdaafae75f5bf5cf51a1834d939c20d16bf8cdef623f1824a094f964d2f1e,2024-06-10T02:52:08.267000
CVE-2024-35682,0,0,d5d2707642803696da8586799f5705a4682d89a42a48773cd9ba1156a6a65a23,2024-06-10T02:52:08.267000
CVE-2024-35683,0,0,543ee45c55cfe4df71023cbc2ca445f0891a26383910f017400d4b92d415a6a8,2024-06-11T14:15:12.453000
@ -251559,7 +251565,7 @@ CVE-2024-35709,0,0,6e0a619a531b0e86e830f3c2f5f94e3f83db0d1d14cf3f0af71428a6ad96e
CVE-2024-3571,0,0,69cf6aaba9ed550ce2e1f492d0ecd149e8d5cd4d3ef343f36ac06a714698dced,2024-04-16T13:24:07.103000
CVE-2024-35710,0,0,2821683de41fa3eeb51b9282bc176211774b4c3042581edf1e5d173ac55f1b1a,2024-06-10T02:52:08.267000
CVE-2024-35711,0,0,abde08774d127ad0db34965655a4de5b5dad73c102e868a4d0f8c3582ef01c98,2024-06-10T02:52:08.267000
CVE-2024-35712,0,1,8f4bb9399a50a51194e79d6df3895aca303c8f418f373df47beb5d65f20c7133,2024-06-12T17:49:29.547000
CVE-2024-35712,0,0,8f4bb9399a50a51194e79d6df3895aca303c8f418f373df47beb5d65f20c7133,2024-06-12T17:49:29.547000
CVE-2024-35713,0,0,67f12030ef9ae03f21eeefc61a2db714e1cd54b5976a2138aaa81f95299ca1f4,2024-06-10T02:52:08.267000
CVE-2024-35714,0,0,fda77c484f1be31559583b8ce420a09ac05ec40a4cbe01b6366029636befebbf,2024-06-10T02:52:08.267000
CVE-2024-35715,0,0,a8feb3a0e36b1ed746ea7b8db0d283a4e527ecef045188b4e311eb2de1d8e60b,2024-06-10T02:52:08.267000
@ -251569,43 +251575,43 @@ CVE-2024-35718,0,0,88ba8367c19f7a9dbc9e6ec292607ddba06c8c0ffe199e953febc26814251
CVE-2024-35719,0,0,dd1d7bca8ae8cde9f9e3f2600aa39b26178c0f1f411f5a0803d6eedab9a3d37c,2024-06-10T02:52:08.267000
CVE-2024-3572,0,0,fac7085e464e1d98d017bfc9635e53b969d9f55d28ae04030a557f0ab1b04301,2024-04-16T13:24:07.103000
CVE-2024-35720,0,0,0f164f8f9b670114152a0f88625e47d291e06bcc76a25b980fca9f1df0718e97,2024-06-10T12:40:41.360000
CVE-2024-35721,0,1,1807f30f29f0ac6b48d19063b461698322580402ce67e1233fa1480e571b35ca,2024-06-12T16:29:34.530000
CVE-2024-35722,0,1,2e6d40e808b87f9cc3afd3fe92f67b7f9b679f9fc483d9a2a452a3933a833b76,2024-06-12T16:29:22.497000
CVE-2024-35723,0,1,d21aa2ceb958c34983036417b55927b69725a1c80082efddfb006619febf87fb,2024-06-12T16:28:51.920000
CVE-2024-35724,0,1,3dcf56a5238fff86e0902a51c35aa1bbf1d6e4243c4c748bcdbe9328ad3cb3d6,2024-06-12T16:28:10.463000
CVE-2024-35725,0,1,276f09c680172cbb9c625bbd562e9e55d8cb15c0ae19e5da74ceb507e318f9d8,2024-06-12T16:27:55.390000
CVE-2024-35726,0,1,923fc98f297ebc14a7cd4aa382f37d2dbb48b57a67365e8f6804065b2625ca49,2024-06-12T16:27:05.920000
CVE-2024-35727,0,1,cd1bc1c7642d589d608eb5fbc76d5f9982b1e35e7746c63331eae50d9790b9bc,2024-06-12T16:26:55.247000
CVE-2024-35728,0,1,306fd0fcb80558a8a58d3e182d1bc6fcb13b5e686d98a23fefefa9b2415e6d65,2024-06-12T17:43:24.173000
CVE-2024-35729,0,1,0ea27869f1ce9b6503e333de597369ca39c33950492540d653a43ac76950edcb,2024-06-12T16:26:45.633000
CVE-2024-35721,0,0,1807f30f29f0ac6b48d19063b461698322580402ce67e1233fa1480e571b35ca,2024-06-12T16:29:34.530000
CVE-2024-35722,0,0,2e6d40e808b87f9cc3afd3fe92f67b7f9b679f9fc483d9a2a452a3933a833b76,2024-06-12T16:29:22.497000
CVE-2024-35723,0,0,d21aa2ceb958c34983036417b55927b69725a1c80082efddfb006619febf87fb,2024-06-12T16:28:51.920000
CVE-2024-35724,0,0,3dcf56a5238fff86e0902a51c35aa1bbf1d6e4243c4c748bcdbe9328ad3cb3d6,2024-06-12T16:28:10.463000
CVE-2024-35725,0,0,276f09c680172cbb9c625bbd562e9e55d8cb15c0ae19e5da74ceb507e318f9d8,2024-06-12T16:27:55.390000
CVE-2024-35726,0,0,923fc98f297ebc14a7cd4aa382f37d2dbb48b57a67365e8f6804065b2625ca49,2024-06-12T16:27:05.920000
CVE-2024-35727,0,0,cd1bc1c7642d589d608eb5fbc76d5f9982b1e35e7746c63331eae50d9790b9bc,2024-06-12T16:26:55.247000
CVE-2024-35728,0,0,306fd0fcb80558a8a58d3e182d1bc6fcb13b5e686d98a23fefefa9b2415e6d65,2024-06-12T17:43:24.173000
CVE-2024-35729,0,0,0ea27869f1ce9b6503e333de597369ca39c33950492540d653a43ac76950edcb,2024-06-12T16:26:45.633000
CVE-2024-3573,0,0,f978306925f93ca64332932b6f5a09fb648fa8e8ad9d4b00bd427fd81ec82478,2024-04-16T13:24:07.103000
CVE-2024-35730,0,0,49335cae17539a2ff75d573d2c355a9e96d242f541f9939e3a5e291d5780cbb8,2024-06-10T02:52:08.267000
CVE-2024-35731,0,0,143fbc50e8cef612366366b66d67424075ebe4c9c1a8d543f78a4729c1a58e2a,2024-06-10T02:52:08.267000
CVE-2024-35732,0,0,7fdcba0fd7fddef85feb7e6673a8f96d3154b7974fa22b232cf3fd801d3f54de,2024-06-10T02:52:08.267000
CVE-2024-35733,0,0,a1ae2286f7bc76a6978fa6bf1b5fce5a756320de3c88f0e64dedfe42b522a5d8,2024-06-10T02:52:08.267000
CVE-2024-35734,0,0,4db4068d084716e23e2c716612575cf1c31577ae6452883821d760d3b2973e48,2024-06-10T02:52:08.267000
CVE-2024-35735,0,1,255e899388da84f45c210958c5d8702fbaa1352b1af6a25a9e4c37e262562a2e,2024-06-12T16:26:08.450000
CVE-2024-35735,0,0,255e899388da84f45c210958c5d8702fbaa1352b1af6a25a9e4c37e262562a2e,2024-06-12T16:26:08.450000
CVE-2024-35736,0,0,ce53c5603569b56b066418efe2441dcc3ec4daf52569cea931f378aa336fd127,2024-06-10T02:52:08.267000
CVE-2024-35737,0,0,68b854bcf8f4224101727c49f7d231c73d532ff04fc75a01e1d9fe383907d041,2024-06-10T02:52:08.267000
CVE-2024-35738,0,0,b35b0370c2dd956489606373203db0f27e1293b12d9ab83c9b53ee18df600402,2024-06-10T02:52:08.267000
CVE-2024-35739,0,0,b4f70001f5f669ef8233f6bfef832af600079b2d34c768ea99133be9875bdb3d,2024-06-10T02:52:08.267000
CVE-2024-3574,0,0,a6cc99c8a389ea7db1c37fe05b40106752b73810cdac85caab18aeb26d6bc576,2024-04-16T13:24:07.103000
CVE-2024-35740,0,0,cd3c4df653c403e3da38132e6a2e32e99932f9e5ed5f1383de768204108321b2,2024-06-10T02:52:08.267000
CVE-2024-35741,0,1,2398aa682188cccc3380c9f03f79a94b0e61bedb784ddc6bf6525e6c832a8362,2024-06-12T17:54:46.150000
CVE-2024-35742,0,0,fe154a3e8fa530687ef00116cc4be8a04e7fc1ca3143f50ff0ea0f84f7dba929,2024-06-10T12:40:41.360000
CVE-2024-35743,0,1,cdf57129513ee1ed4c8cf3c1eadcafc386204e60f908e5a57b98299bfc433ed5,2024-06-12T17:42:56.900000
CVE-2024-35744,0,1,9e54541e70135d5f75d1822350da3a752ee91afb0b56b1661f0c8acd6c0af81b,2024-06-12T17:42:12.707000
CVE-2024-35745,0,1,07997091a8cd648631b3f4b65df28a3ac2b2bc0c62bc29345dc307bf6450bbbe,2024-06-12T17:36:32.763000
CVE-2024-35746,0,1,6bfd0656dae71d387fa12929060a524c27e2e27454d60b936c90b1042e33379d,2024-06-12T17:36:02.087000
CVE-2024-35747,0,1,ccfdca49cb01bd94b0d2ef1d42ed69046774e7d23d14b1ca7e95e0cc185aa883,2024-06-12T17:32:52.343000
CVE-2024-35741,0,0,2398aa682188cccc3380c9f03f79a94b0e61bedb784ddc6bf6525e6c832a8362,2024-06-12T17:54:46.150000
CVE-2024-35742,0,1,109cb5c630ede3bd19739135ead54896a05f10954ba59141c5c759e7d1be0f38,2024-06-12T19:32:19.827000
CVE-2024-35743,0,0,cdf57129513ee1ed4c8cf3c1eadcafc386204e60f908e5a57b98299bfc433ed5,2024-06-12T17:42:56.900000
CVE-2024-35744,0,0,9e54541e70135d5f75d1822350da3a752ee91afb0b56b1661f0c8acd6c0af81b,2024-06-12T17:42:12.707000
CVE-2024-35745,0,0,07997091a8cd648631b3f4b65df28a3ac2b2bc0c62bc29345dc307bf6450bbbe,2024-06-12T17:36:32.763000
CVE-2024-35746,0,0,6bfd0656dae71d387fa12929060a524c27e2e27454d60b936c90b1042e33379d,2024-06-12T17:36:02.087000
CVE-2024-35747,0,0,ccfdca49cb01bd94b0d2ef1d42ed69046774e7d23d14b1ca7e95e0cc185aa883,2024-06-12T17:32:52.343000
CVE-2024-35748,0,0,ab07387e8cbceeb936ade78e834c5c15ec3b5a2cc852cd848f3fc4076b8b7a4e,2024-06-12T13:30:18.963000
CVE-2024-35749,0,0,1d4109865cdef92c2876bf85af6a2839448c5bccd0ef1b4a023a36e807df8057,2024-06-10T18:06:22.600000
CVE-2024-35749,0,1,b90dff04274c0424523c1c1e2079a645a94a67dc6ef398d3ad98a0d07ae5ab2d,2024-06-12T18:19:55.050000
CVE-2024-3575,0,0,59be73eca5c53cbbcf99414bd65c6b74b4dff22ff5983c2d091439c46f610b22,2024-04-16T13:24:07.103000
CVE-2024-35750,0,0,a560006c880afd12dcbd61cea07fe78f3a899ebabbef8546711e97bace611fe5,2024-06-10T02:52:08.267000
CVE-2024-35751,0,0,ae55742e6cee89fc362370a5e03b369783af57035c3e4ca39074ba46844c49ff,2024-06-10T02:52:08.267000
CVE-2024-35752,0,0,667b82b619d6af887c0f82748c01ea49704108d98bd8dc42d16eeda994071a5d,2024-06-10T02:52:08.267000
CVE-2024-35753,0,0,e87a673ccbe7b6c1f7094568180d993726bbfee58647b46671132ae9e6160269,2024-06-10T02:52:08.267000
CVE-2024-35754,0,0,80aafb73d69d6f935233e8c3d3cbc1c30cfff9933d76149cad332b8773d950d1,2024-06-10T18:06:22.600000
CVE-2024-35754,0,1,aa65be108fb30993f3885ae8163c97598c773dba7e2b2fc6fa84875158e744b3,2024-06-12T18:19:06.043000
CVE-2024-35755,0,0,7d42522fcd02f3fe60a2c6974d4d632d3f98569d74d8e6608400a19743cd1c98,2024-06-10T02:52:08.267000
CVE-2024-35756,0,0,f38d018d09d60bf027caad7794c192ca3356d81e050aa30cf2a44d5b7e716fda,2024-06-10T02:52:08.267000
CVE-2024-3576,0,0,da3479f65547a923ac9b6fc5d4e01aab352d357f2ab0f89f14bd434e8562f642,2024-05-07T09:15:38.747000
@ -251939,9 +251945,9 @@ CVE-2024-36246,0,0,50338f85842e71924c1397e2b0a309f647146226696bf59a5411ba0e6e468
CVE-2024-3625,0,0,bb7fa72c43d725aef9f66641f31c3359a614ed8ba414acf9f05b8e44148cef81,2024-04-26T12:58:17.720000
CVE-2024-36255,0,0,22b21684452ad4563618ad5cee66dc719af723b04c8a1647fe9cf6d970347f9a,2024-05-28T12:39:28.377000
CVE-2024-3626,0,0,668faec6d18ac8a7c33197af94901aaf7ddac1dec4c77c1d646fba224d5f8541,2024-05-24T01:15:30.977000
CVE-2024-36263,0,1,04ea6f141e5e9883d4c0410a515e19097ad4d5fc98cc6380d6fe8513b8b1aa09,2024-06-12T17:15:50.363000
CVE-2024-36264,0,1,9ef31114da021eb9789083f1ed78ae2fc93afdf41a8bb695140a634b5b37f930,2024-06-12T17:15:50.447000
CVE-2024-36265,0,1,0079a3aa5b78f3732cbbe3adb7417ca40923c1032ca8fa54976ab501576b0297,2024-06-12T17:15:50.520000
CVE-2024-36263,0,0,04ea6f141e5e9883d4c0410a515e19097ad4d5fc98cc6380d6fe8513b8b1aa09,2024-06-12T17:15:50.363000
CVE-2024-36264,0,0,9ef31114da021eb9789083f1ed78ae2fc93afdf41a8bb695140a634b5b37f930,2024-06-12T17:15:50.447000
CVE-2024-36265,0,0,0079a3aa5b78f3732cbbe3adb7417ca40923c1032ca8fa54976ab501576b0297,2024-06-12T17:15:50.520000
CVE-2024-36266,0,0,83df454a9d264cabc9c075046ae12e249cd453c24f6de612ee1d9f73df0ef774,2024-06-11T13:54:12.057000
CVE-2024-36267,0,0,5b402628b4c430b8eab614a5b3330f6f2d186537f83ff9a60bb1a91e4b3c3cac,2024-05-30T13:15:41.297000
CVE-2024-3628,0,0,ad2a38a3d431944b5239dd67ace3bcd2603e3057c8d0a04d847db45516b0c9ea,2024-05-07T13:39:32.710000
@ -251991,18 +251997,18 @@ CVE-2024-3640,0,0,abbf5a33cbca708fe19710dda7a796491ae1d1614e9cd03f43d6cddef8b095
CVE-2024-36400,0,0,6b10ab1f058055da0b7f6513936a46e66d6922b94171c5e956b85881f675cf7c,2024-06-10T19:39:21.660000
CVE-2024-36405,0,0,4b4347959a84cfd87daa4c611c67a41c72e3e0c399bcb3b81e58f7587d8de794,2024-06-10T18:06:22.600000
CVE-2024-36406,0,0,ae1e0beb0e761fd5661143be47855f0b61a65c6cc86fd6099339034686f4a643,2024-06-10T18:06:22.600000
CVE-2024-36407,0,0,741ad29a7cdcbf05bfc2cd2a875d09c28750ff4396926bb53d2fe2a5df4158bd,2024-06-10T18:06:22.600000
CVE-2024-36408,0,0,5cd8a75ba24079c1009c3729ba7de6130c049fa9b19c282e27fad279a2949b25,2024-06-10T18:06:22.600000
CVE-2024-36409,0,0,9cd16a7e24bd8394d1f0c2721003efcbffc242645298d2d4538f59e84a64ede5,2024-06-10T20:54:18.443000
CVE-2024-36407,0,1,3fa9b8688b87bb89923ff6af2953ac9e3c3d75823a9915954eac5e78dc625b42,2024-06-12T18:17:38.777000
CVE-2024-36408,0,1,11f21869c76c432e26407d306c96488f7ba971b6993fdb685c1f024c80c342a3,2024-06-12T18:13:58.627000
CVE-2024-36409,0,1,2c3b215af6bbe6fa84592adf67b9957ea251df2e6964e1fe5d6f74050de42541,2024-06-12T18:09:19.450000
CVE-2024-3641,0,0,c281de95cce057acff2793609e8f843aad579a2f0257c0c2e0b6442733e87b14,2024-05-16T13:03:05.353000
CVE-2024-36410,0,0,fac35f9377acbd5e62bae482d6b26ac497ea92f83ead8605ae0a4d55fc9e3cbf,2024-06-10T20:54:18.443000
CVE-2024-36411,0,0,aa7544310bc332364ee37edb0f84d400824d961008ffebd8db7c1ce2dc3e5b05,2024-06-10T20:54:18.443000
CVE-2024-36412,0,1,548544c4ffb106ae4459efe54787516f7a8b91038e9bd99db46c682309c7b7b1,2024-06-12T18:00:00.317000
CVE-2024-36413,0,1,4069f61c28f83942cd6f32b01d400d2c9b955950d9c25442379f797d94d57edc,2024-06-12T17:59:44.673000
CVE-2024-36414,0,1,0b668116227fd5781118170b1cdfe9c95e50c019e2f7cf5a2f38009ed0ae2db9,2024-06-12T17:59:14.353000
CVE-2024-36415,0,1,97f30d08c26bffa9b2c4d6a7a9001234ed7c9da30e93e3ea400c7ad232ab473d,2024-06-12T17:58:53.497000
CVE-2024-36416,0,1,9328a3d2121fa2da1a29b5be1b12cf7cf7ba857605f6afc42d167fd6f6079815,2024-06-12T17:58:19.570000
CVE-2024-36417,0,1,7f72be2da88bd03f2618a97d909b76dab66b1196af11257e6aa2fac632513220,2024-06-12T17:58:04.477000
CVE-2024-36410,0,1,8d9a5395f64acdec4b478c9c3580ee593a1a452bf5e57093379f25fe695ba0ad,2024-06-12T18:09:04.930000
CVE-2024-36411,0,1,dfdbb970f60ea0bdf492b35e05557ba185c5648db47b8910ef4842a663e7c71b,2024-06-12T18:00:13.937000
CVE-2024-36412,0,0,548544c4ffb106ae4459efe54787516f7a8b91038e9bd99db46c682309c7b7b1,2024-06-12T18:00:00.317000
CVE-2024-36413,0,0,4069f61c28f83942cd6f32b01d400d2c9b955950d9c25442379f797d94d57edc,2024-06-12T17:59:44.673000
CVE-2024-36414,0,0,0b668116227fd5781118170b1cdfe9c95e50c019e2f7cf5a2f38009ed0ae2db9,2024-06-12T17:59:14.353000
CVE-2024-36415,0,0,97f30d08c26bffa9b2c4d6a7a9001234ed7c9da30e93e3ea400c7ad232ab473d,2024-06-12T17:58:53.497000
CVE-2024-36416,0,0,9328a3d2121fa2da1a29b5be1b12cf7cf7ba857605f6afc42d167fd6f6079815,2024-06-12T17:58:19.570000
CVE-2024-36417,0,0,7f72be2da88bd03f2618a97d909b76dab66b1196af11257e6aa2fac632513220,2024-06-12T17:58:04.477000
CVE-2024-36418,0,0,52272dc570f5081df6975298e5712cf123b760ef720bb4951287c4366378282e,2024-06-11T13:54:12.057000
CVE-2024-36419,0,0,e561cf6fec966fa1d9dbaeadf6c1b7f0c1186aebf1fa6c9a3ce263fb312ad74d,2024-06-11T13:54:12.057000
CVE-2024-3642,0,0,bbed1ee941355da6f32a6eba37e95a843dd7913c7dd227d8da7f65dcb683674b,2024-05-16T13:03:05.353000
@ -252073,7 +252079,7 @@ CVE-2024-36743,0,0,947029ef079964db2f975300f543b502c98bef02b4c5f9f3d5de943b90d77
CVE-2024-36745,0,0,c21f6d498139c367702b2a5b310b830e45905feb661fd13e2ada12120c92ab59,2024-06-07T14:56:05.647000
CVE-2024-3675,0,0,00d1234baac079cf413c516618dd0fc3e7ad5eadaec0ab200df9e28f23d3ebe2,2024-05-02T18:00:37.360000
CVE-2024-3676,0,0,afffaa433a0219105ab8db2fc3cac72e262ac997e8b5329e1239c5388df90382,2024-05-14T19:17:55.627000
CVE-2024-36761,1,1,45e68de3caa2edbd8ec7e3d9314dfa2a85dcb79f20010465ff7c3f4953532c02,2024-06-12T16:15:11.983000
CVE-2024-36761,0,0,45e68de3caa2edbd8ec7e3d9314dfa2a85dcb79f20010465ff7c3f4953532c02,2024-06-12T16:15:11.983000
CVE-2024-3677,0,0,822256c91d31044a13b27ee319c8c0a4bbd148e7653d3ef44cb1c97299aa9fe7,2024-05-02T18:00:37.360000
CVE-2024-36773,0,0,be07270490997748ed5042323acf595cf65a4ec0fdf18429a47f38918783b6b9,2024-06-07T19:24:09.243000
CVE-2024-36774,0,0,2df072beaff79bc30583e2884ff43f38048f215ce893570cbe619b2c4b3ea848,2024-06-07T14:56:05.647000
@ -252211,24 +252217,24 @@ CVE-2024-36970,0,0,50083cf534f5df621aa7bead6ce71043c6360c6ed1cf8d6bd9cf7a1a7b652
CVE-2024-36971,0,0,82b8b9fbabc6d1a263f871b2e3cf77e6c0d2c9b2290e695c225e46a96ddc8130,2024-06-12T15:43:28.280000
CVE-2024-36972,0,0,639469afbfc3c8e61ad1446aeb28d8bbb041cd80eb7cb8c17f6c32ebdf799618,2024-06-12T10:15:31.347000
CVE-2024-3698,0,0,13b4029eb6179dbe788598788e16556a1995d850ddfc4af1ee0c4e86961a3a21,2024-05-17T02:40:04.800000
CVE-2024-3699,0,1,6e64dedcb1ec83e842b9c3ed18b374381a62ef4f7982a43d9405eeb95e55d0fc,2024-06-12T17:53:09.130000
CVE-2024-3700,0,1,f1913b84964a9a87ca4f78bbad55a262819a35385e2c066c91eaa7c4a1891262,2024-06-12T17:51:52.710000
CVE-2024-3699,0,0,6e64dedcb1ec83e842b9c3ed18b374381a62ef4f7982a43d9405eeb95e55d0fc,2024-06-12T17:53:09.130000
CVE-2024-3700,0,0,f1913b84964a9a87ca4f78bbad55a262819a35385e2c066c91eaa7c4a1891262,2024-06-12T17:51:52.710000
CVE-2024-3701,0,0,d78f52a76181001272debccb095fb5971bb478ebc111313d9ff2994f4ec0598f,2024-04-15T13:15:31.997000
CVE-2024-37014,0,1,c47c2b09802b94267a83a7981860e8f6f71032b8440b3dd55d1a2f768ec7199d,2024-06-12T17:57:01.660000
CVE-2024-37014,0,0,c47c2b09802b94267a83a7981860e8f6f71032b8440b3dd55d1a2f768ec7199d,2024-06-12T17:57:01.660000
CVE-2024-37017,0,0,fd4284c5a2195342d9622b5d20527d4d58db85192e227730c5a741287dc835e4,2024-05-31T13:01:46.727000
CVE-2024-37018,0,0,92b8b0fbc5eb3b3ff9e996cdb38184b7cd381c3e78fdf37e960ede7860319106,2024-05-31T13:01:46.727000
CVE-2024-37019,0,0,c7b7779ae7837bd324c73dde7cb1a43454b31469d3554588beff0fd2aed9bc3d,2024-06-03T19:23:17.807000
CVE-2024-3703,0,0,46d289814974ee20b6160fe56cc828277066d832a1c60ccf5d9c1a62d06c47e2,2024-05-03T12:48:41.067000
CVE-2024-37031,0,0,967b2a62510a1f35de5969f18efe9a7e1918d9bc4c74d0011148e6a904de3800,2024-06-03T14:46:24.250000
CVE-2024-37032,0,0,2fd16d835b1a2cd56c97d409a29d6a495e6793f4206084713a4efe57de2f2107,2024-05-31T13:01:46.727000
CVE-2024-37036,1,1,419b32893b7c15b1ad5886eee490ad49f9f76afce4dc71f5feadde311f406369,2024-06-12T17:15:50.637000
CVE-2024-37037,1,1,9717fa38c618eabcfe1f3f2a1df3fd72894a992126d0ee2e1290f2219868f934,2024-06-12T17:15:50.853000
CVE-2024-37038,1,1,2adaf850c80e6bddd36fbdba564518a6090262b1b15eac3d2f8554f70811ee8b,2024-06-12T17:15:51.080000
CVE-2024-37039,1,1,871fbad7e4cd60608e22285ba1036c660d58782590c4808c122d51a46c8029de,2024-06-12T17:15:51.313000
CVE-2024-37036,0,0,419b32893b7c15b1ad5886eee490ad49f9f76afce4dc71f5feadde311f406369,2024-06-12T17:15:50.637000
CVE-2024-37037,0,0,9717fa38c618eabcfe1f3f2a1df3fd72894a992126d0ee2e1290f2219868f934,2024-06-12T17:15:50.853000
CVE-2024-37038,0,0,2adaf850c80e6bddd36fbdba564518a6090262b1b15eac3d2f8554f70811ee8b,2024-06-12T17:15:51.080000
CVE-2024-37039,0,0,871fbad7e4cd60608e22285ba1036c660d58782590c4808c122d51a46c8029de,2024-06-12T17:15:51.313000
CVE-2024-3704,0,0,ad7f205e31bc442943bbd584692b194a3485d815654eeb83e4eefef6a6eff393,2024-04-15T13:15:51.577000
CVE-2024-37040,1,1,2e4e3e051164ccd059ed47f35e3875e946b2ab9f4ffaa3045c5f164c197e72b8,2024-06-12T17:15:51.540000
CVE-2024-37040,0,0,2e4e3e051164ccd059ed47f35e3875e946b2ab9f4ffaa3045c5f164c197e72b8,2024-06-12T17:15:51.540000
CVE-2024-3705,0,0,44f1c76d2f6cd8dab882ddfdbdbe908a4e3a8f22d6a90f31f0279b7faf87a669,2024-04-15T13:15:51.577000
CVE-2024-37051,0,1,0d2e5970f87c8d9c22ba6507f170a3b81c5f970d2e6b258a94c4dded4fd0590b,2024-06-12T17:49:04.017000
CVE-2024-37051,0,0,0d2e5970f87c8d9c22ba6507f170a3b81c5f970d2e6b258a94c4dded4fd0590b,2024-06-12T17:49:04.017000
CVE-2024-37052,0,0,b5eb259457f95c1e8621c6844ccb575aa5920121a474c1c74037900643b492aa,2024-06-04T16:57:41.053000
CVE-2024-37053,0,0,1081c2339448dc4a976b760458c506e7c94aa413116003d5e0e73d2124757682,2024-06-04T16:57:41.053000
CVE-2024-37054,0,0,dd5e5c1cbe28a100cc6cbec6281d65acc5f0b582cd904acdbac1ca15040981ec,2024-06-04T16:57:41.053000
@ -252287,7 +252293,7 @@ CVE-2024-37295,0,0,489b7cf64c9161735dcc4e60b77f6320915669d39993b442952b536afb71d
CVE-2024-37296,0,0,2aaf9d94ef056cce09e0b5724aee7c4e629647a09dbe0d79a994991f97a3ce49,2024-06-11T15:16:09.963000
CVE-2024-37297,0,0,577a76783d232067279e3b65b1d0e5486f1ee5085aad4d7376d7ace51c240070,2024-06-12T15:15:52.677000
CVE-2024-3730,0,0,a30960de1676c855ee35b61976bc4581959cd1a98a7ba3127a461fb7fc955146,2024-04-25T13:18:02.660000
CVE-2024-37300,1,1,e695bf813c4b2c9ac897c60297973f24cdf1699ac80492d5b5ef8d3561eea312,2024-06-12T16:15:12.097000
CVE-2024-37300,0,0,e695bf813c4b2c9ac897c60297973f24cdf1699ac80492d5b5ef8d3561eea312,2024-06-12T16:15:12.097000
CVE-2024-37301,0,0,1426a850b241ee3963e992e98f12d9875eb125b26184e9013bd9eaf89532808e,2024-06-11T19:16:07.890000
CVE-2024-37304,0,0,a0d53a238603c7b00022def6bac211f79e2e4865ec26e30c72b3c7b78c9449ba,2024-06-12T15:15:52.910000
CVE-2024-3731,0,0,bdcc8f677627b7b108ec8e839a01e7cc6ba34354d6004394dff79046d7838f40,2024-04-19T13:10:25.637000
@ -252305,7 +252311,7 @@ CVE-2024-37384,0,0,60b664762f9333df5975c65ab9b722a03bcb9e931609f92fdae7cd1cf2f9f
CVE-2024-37385,0,0,ab67b8a0f073ce7f5c28ca11584627dbf70b59e11b1337a1068ce1887aeb0943,2024-06-07T14:56:05.647000
CVE-2024-37388,0,0,4bb786bca42a11ef8edd07a6799bb4caedfa95038e4371ae55f637f2792eab26,2024-06-07T19:24:09.243000
CVE-2024-3739,0,0,18ca969c974b63c6d16494fbcc2d63756747cacc5947332fefb20d9c592537e4,2024-05-17T02:40:06.067000
CVE-2024-37393,0,1,adb4710ef8d4e8e5b898aa80bff6a41a92b599e232f1db44a8b62c91938837ef,2024-06-12T17:56:23.390000
CVE-2024-37393,0,0,adb4710ef8d4e8e5b898aa80bff6a41a92b599e232f1db44a8b62c91938837ef,2024-06-12T17:56:23.390000
CVE-2024-3740,0,0,1025f598f3437296a5a18526d2723c88eb3b5b46ea06c50b765dc694c6a0bd1a,2024-05-17T02:40:06.170000
CVE-2024-37407,0,0,aec5c198a3463e3996afdb2b87dcd156119620da199d8e9853297e329cd2e74b,2024-06-10T02:52:08.267000
CVE-2024-37408,0,0,43de84338ac833cd78092ec836ae8beffbac830f1aa1a52e6c8ca816bfb77c27,2024-06-10T02:52:08.267000
@ -252324,13 +252330,14 @@ CVE-2024-37535,0,0,07f7d930de9d2427116ed26f9657c7962aa8122c29cd0ba965c2b1ee75b9b
CVE-2024-3755,0,0,255cc63bdc34aca663119fb8f6757a7da5a9acef7ecda034d88dc05babf4b05b,2024-05-06T12:44:56.377000
CVE-2024-3756,0,0,978b8204ea279199334a4c8c549150dc6420f24480b5effb717e8509749d66aa,2024-05-06T12:44:56.377000
CVE-2024-37568,0,0,c31dda2ce4e2cf1c14da8896dd1ff7847e88710326c3ff8a35f20f8d9a2e2a98,2024-06-12T13:29:13.877000
CVE-2024-37569,0,1,748406cd7b0e731a2b9037b16c6d1dde7e8c81aa1003e1ce6c82275ceb288683,2024-06-12T16:32:56.203000
CVE-2024-37569,0,0,748406cd7b0e731a2b9037b16c6d1dde7e8c81aa1003e1ce6c82275ceb288683,2024-06-12T16:32:56.203000
CVE-2024-3757,0,0,62301a2775fcbfb9e8b5b1aa90b79aa074cd639699f2863765d338333af4b798,2024-05-07T13:39:32.710000
CVE-2024-37570,0,1,a374041c2622c9ba66d2048315fc9e015af6a8717cce4f8beb5b59800398626a,2024-06-12T16:32:34.513000
CVE-2024-37570,0,0,a374041c2622c9ba66d2048315fc9e015af6a8717cce4f8beb5b59800398626a,2024-06-12T16:32:34.513000
CVE-2024-3758,0,0,3ea9ecbea279ca1eb1159e542db09b1cab2d2435be79c6a6a563dc4d73ca4285,2024-05-07T13:39:32.710000
CVE-2024-3759,0,0,20211226ea875c33805e71e9c0afa18c7ce1ad112702c8859afd48ee84347f62,2024-05-07T13:39:32.710000
CVE-2024-3761,0,0,c0af44e486388b5bef077e784125f415f33c54c3c3a8677d0ab80af1f3e8df6c,2024-05-20T13:00:04.957000
CVE-2024-3762,0,0,3a4d7121b46153c733feea020bbdc2b15c8dd6dac7706d18d5d6cc6fdd5731da,2024-05-17T02:40:06.647000
CVE-2024-37629,1,1,3a410850af244f6f643a3d12a3e26aa1669009a9d1cb133440ab8e99ef0c8d27,2024-06-12T18:15:12.293000
CVE-2024-3763,0,0,d4a43b988d4f5ccf2146c95730aa308ab303229339c58dc3a72b2fdabbe91a36,2024-06-05T20:15:13.530000
CVE-2024-3764,0,0,33410633d9dadf088a16c40fe902a036322ce93eb40b27ebad26eee187e78727,2024-05-17T02:40:06.823000
CVE-2024-3765,0,0,4fdba2eb80818b350bc57cc64ca06a70a8e5d2cec5cc9e99a6b5fff1df632742,2024-05-17T02:40:06.923000
@ -252354,9 +252361,9 @@ CVE-2024-3784,0,0,c3548262a5dd94ab612636409a3bf8cd74017da9deb24debb2f77536fe2746
CVE-2024-3785,0,0,fc93f2e321d044bf7a0ccc45f351722880d9f0bf94368b28b702ab59c5cb3144,2024-04-15T19:12:25.887000
CVE-2024-3786,0,0,e7dff42d10ea5f51aefb5b7728f1b7d65e7bf6f944a436f82b5cbbe6bdc82c9e,2024-04-15T19:12:25.887000
CVE-2024-3787,0,0,570870b6338590c353431fe2587b532b039679da85c30ab8bb196a257bca2d47,2024-05-14T16:11:39.510000
CVE-2024-37878,1,1,8f7712233494afef3eb7225c90d712354063c6005f7fa9f8e86929491655b1bd,2024-06-12T17:15:51.803000
CVE-2024-37878,0,0,8f7712233494afef3eb7225c90d712354063c6005f7fa9f8e86929491655b1bd,2024-06-12T17:15:51.803000
CVE-2024-3788,0,0,746d07fda684df68d3fb292ada95a2bfbbf82c49ef53e13b55d1c7f158f32ee7,2024-05-14T16:11:39.510000
CVE-2024-37880,0,1,8fc2a7037c003cd05c8204143fd08c5c781310cbac1dbb1e80c2c17a0b28d4e3,2024-06-12T16:30:15.053000
CVE-2024-37880,0,0,8fc2a7037c003cd05c8204143fd08c5c781310cbac1dbb1e80c2c17a0b28d4e3,2024-06-12T16:30:15.053000
CVE-2024-3789,0,0,63d455d46acf2815a86f3b9bf286e732f6c1d2d557d093772c64f0c37d315365,2024-05-14T16:11:39.510000
CVE-2024-3790,0,0,ea62135e66a6e7a74daddc8d443b8b9750f000d596c0e5f30e202f53e21ec40b,2024-05-14T16:11:39.510000
CVE-2024-3791,0,0,9bc6cec70e672f5f7f9ccdb1c0603c19b269c41965293930113b85d0de980142,2024-05-14T16:11:39.510000
@ -252403,7 +252410,7 @@ CVE-2024-3846,0,0,c48e0a8a684c17ee6ebfa3dd6ef492735a7e1f61d2741ebafccef32d97787c
CVE-2024-3847,0,0,a2146e655749d60cf9631f855db42a3d44cf07cd9a542fd1035e46bb9a6304c5,2024-05-03T03:16:29.293000
CVE-2024-3848,0,0,cff2d1cd97f0b1f2183f9bb4edcf4fc45d9e2b8ab251b9953f6af6105249c0ec,2024-05-16T13:03:05.353000
CVE-2024-3849,0,0,d4181d6192aab2f4a2b324451fbda7660fbd9621eb95f5f54a642a6a3d1e7d46,2024-05-02T18:00:37.360000
CVE-2024-3850,0,0,6ff7a91bef5f9d4e3f286db4debdf969a93090e3db07661b7aac4ed36b3fcbe3,2024-06-10T18:06:22.600000
CVE-2024-3850,0,1,bbe49076d39470df53cdf5186eea91a2b4a40256492f588a1ab86bd1ba5244b0,2024-06-12T18:12:56.413000
CVE-2024-3851,0,0,16bcb9f87255ebcf1aad2856af6894b1b0c36049b98621e173e693ad3a900330,2024-05-16T13:03:05.353000
CVE-2024-3852,0,0,3038e46972183e994310b2b410f139aaace8bd74e7e7e979d336a57b5feba459,2024-04-22T10:15:07.430000
CVE-2024-3853,0,0,da9bcb4a065926b49732a0dd79b2f07a12fd9777c9341906bc363e07df8725cf,2024-04-17T12:48:31.863000
@ -252743,7 +252750,7 @@ CVE-2024-4324,0,0,7ffaeab065d0c9a1857569b7bf1dcf908cb9c5c673c6c887858b7e3bb59f5d
CVE-2024-4325,0,0,9bdbfeadfcfe04a30cd4b788d23f4d3e0d4d7ac5ca53497b4f8e137c6cc841b9,2024-06-07T14:56:05.647000
CVE-2024-4326,0,0,8dbb64b51f21b806e292a7e05ea5c1051e35374391354831c3514fc08d15ec8e,2024-05-16T13:03:05.353000
CVE-2024-4327,0,0,4d82dd4709e731be065c0bf0ae9ef6780542dd816512537c908eaf4d566d4272,2024-05-17T02:40:22.673000
CVE-2024-4328,0,0,5c54a81eaca7a66f4f49f745eade926cbd2e59d834d210577cf1a36d3512686b,2024-06-10T12:40:41.360000
CVE-2024-4328,0,1,5c6dddabdbc801031ee77029aa4b0ff4de38533976485f2a04e98fdc9688c2d2,2024-06-12T19:33:00.527000
CVE-2024-4329,0,0,b4ac7e4961d4eb2bf8d3a768969ba81a7ecc8f8fe7d1f63dcc17b43bdf703463,2024-05-14T16:11:39.510000
CVE-2024-4330,0,0,27ed586df5d07858fa3cac91f5c86ff400dd30bbc2cec38947cbe22382636599,2024-05-30T18:19:11.743000
CVE-2024-4331,0,0,31d80071d9217fb084a6ad175ae7c8879003862f66041883ec06dc2da18f1116,2024-06-10T18:15:36.607000
@ -253054,9 +253061,9 @@ CVE-2024-4736,0,0,35e0fe51ccd6e16c666173722ffd72f471827cead112caeaf869dd95515427
CVE-2024-4737,0,0,0d605ad76fcca9d9a8748ea1570213b2a20be8e7af59e1490aa0de37640ee426,2024-06-04T19:20:48.597000
CVE-2024-4738,0,0,703597dd680fa7def2747a141a4237503bd7e8917e070a49546a7e715e951f69,2024-06-04T19:20:48.783000
CVE-2024-4743,0,0,e42c9380fd03fa2e7e8dd1d108eb6ee48e234f06ee604011f8e8a51de81bb3cb,2024-06-11T17:32:50.367000
CVE-2024-4744,0,1,00389d0f632a53abd6687abe1695ed0d94106b42a5446a5e1de91a20dcdffac8,2024-06-12T16:44:12.157000
CVE-2024-4745,0,1,52090afb58a281a3371ee6c6ad54ec80b0aac7a7ded5dbbe0e95b57b1a9dc746,2024-06-12T16:23:34.197000
CVE-2024-4746,0,1,f4f2ac85907c7b5b329cbda786b397a3fc954bb6f671df10eda8148346b3a114,2024-06-12T16:17:42.223000
CVE-2024-4744,0,0,00389d0f632a53abd6687abe1695ed0d94106b42a5446a5e1de91a20dcdffac8,2024-06-12T16:44:12.157000
CVE-2024-4745,0,0,52090afb58a281a3371ee6c6ad54ec80b0aac7a7ded5dbbe0e95b57b1a9dc746,2024-06-12T16:23:34.197000
CVE-2024-4746,0,0,f4f2ac85907c7b5b329cbda786b397a3fc954bb6f671df10eda8148346b3a114,2024-06-12T16:17:42.223000
CVE-2024-4747,0,0,99152f6494a1192f3bae59b436abcc51d11f811ed1e0a72c2e65c8381fda6054,2024-05-14T16:11:39.510000
CVE-2024-4749,0,0,676e331864bc41907c4c80c44886e7dac480ef6dea2c29bc22838d992753d4da,2024-06-04T16:57:41.053000
CVE-2024-4750,0,0,423585a3e250903ac62d761ecb0e0e6dc6b4649ccd4411b90275a4e6d2f87495,2024-06-04T16:57:41.053000
@ -253278,7 +253285,7 @@ CVE-2024-5098,0,0,4732d7cd15b56a86eb717df9a9d94eac42f29eaa5aa89b4d41ed392b988c2e
CVE-2024-5099,0,0,0aeca64f34b67ee8973c6e2be6cc11249d255bf1165c776c1356aec8eda36b33,2024-06-04T19:20:58.993000
CVE-2024-5100,0,0,66e888ccf61e6da617c762c0d029f3eaeb85bf9704e37410d6b9e52a0787c1e4,2024-06-04T19:20:59.100000
CVE-2024-5101,0,0,0e72680ac39859889a062f1df5b7c7337ebf9e0746a308ddcc1931ba6bc62983,2024-06-04T19:20:59.200000
CVE-2024-5102,0,0,76ad0693887b29a2fe187f5872893d8165cd04c179217103d68341726b466323,2024-06-10T18:06:22.600000
CVE-2024-5102,0,1,b70c6853e4988b98f71737835d02eb41cd98846f25e1a8a4c171c276cc5efa87,2024-06-12T18:12:01.453000
CVE-2024-5103,0,0,f3c12fc9604fe811051dfda71a50d275beaf07af4d2a570d8bf6b2fcd28eddc5,2024-06-04T19:20:59.297000
CVE-2024-5104,0,0,0e7a76518082b571f50c4371ee49632a85481d60762022d051097d3bc69f00d0,2024-06-04T19:20:59.397000
CVE-2024-5105,0,0,9239348abf3201edf5ca18df8022d8d9a87e261704a9d80f6c607a666b08c4e2,2024-06-04T19:20:59.500000
@ -253482,7 +253489,7 @@ CVE-2024-5384,0,0,fc8a760c5f8c6533d32783fcf44bb063e589b4e165b4e3e16391c3aeb9ec5e
CVE-2024-5385,0,0,bc3c0d01b2051e708e659a5c3590b7dd8cb9dd588e93f64ca3944fc804f9c929,2024-05-28T12:39:28.377000
CVE-2024-5387,0,0,857b2af9507e1fb781392f9f45599eb9ea380f1e8b91dd3c69ea7be187de1f2a,2024-06-03T19:15:09.500000
CVE-2024-5388,0,0,0c90149987e278137050d2b65080c43dd31aa72e74992bde244a30e0d49fbf46,2024-06-03T19:15:09.557000
CVE-2024-5389,0,1,b03364a2f4d6f0b56bedc45ec6b964cb0ed203a7d91090b995d6798f5653a980,2024-06-12T16:31:30.577000
CVE-2024-5389,0,0,b03364a2f4d6f0b56bedc45ec6b964cb0ed203a7d91090b995d6798f5653a980,2024-06-12T16:31:30.577000
CVE-2024-5390,0,0,7bbbc0fbbf0080c37ea508796076f5055d10a83119ccd7fea3223bbf180b1d73,2024-06-04T19:21:08.020000
CVE-2024-5391,0,0,00f61420375c40b8d29b33273a9abb170480b355b8f71230d76cd6238a9db4ff,2024-06-07T20:15:12.687000
CVE-2024-5392,0,0,f7219b2013d34cef28a688dbd5b89c3b8013dcb24b8103dca8d259a586db6696,2024-06-04T19:21:08.117000
@ -253570,19 +253577,20 @@ CVE-2024-5543,0,0,1f8dadf7ddfb1e1c1a8006df6622727e1de688b7f483cab717adee12c7f279
CVE-2024-5550,0,0,e4fc13aea5b719d7c555043aa9a8be47a59e2f4d5eac2e9fa0d5ff8a8edb892f,2024-06-07T14:56:05.647000
CVE-2024-5552,0,0,12abaaddd513e722275738643d6cd32f6bb9e257da98294dd5bedf4ad4cbf55d,2024-06-07T14:56:05.647000
CVE-2024-5553,0,0,3f2e6115738134af7d285604a77d6396ef9f781ed1953efa7c72f957ec883035,2024-06-12T04:15:13.127000
CVE-2024-5557,1,1,846a1b5724880eee14b60af63bb003aea0869123c1e447b716eab3576476cae9,2024-06-12T17:15:51.943000
CVE-2024-5558,1,1,8a2a6beaaea21cb5c7551abc76b759f246695b8ddd48af468f7d6b90b9bf0565,2024-06-12T17:15:52.160000
CVE-2024-5560,1,1,ef0761cc09cb2a3b612bdc0fa8d549dbc116ec36d61e23df3cadcf2b2b11eaf9,2024-06-12T17:15:52.357000
CVE-2024-5557,0,0,846a1b5724880eee14b60af63bb003aea0869123c1e447b716eab3576476cae9,2024-06-12T17:15:51.943000
CVE-2024-5558,0,0,8a2a6beaaea21cb5c7551abc76b759f246695b8ddd48af468f7d6b90b9bf0565,2024-06-12T17:15:52.160000
CVE-2024-5559,1,1,a64afea2412e0e18d1851d5510167a9f07c9d7e45028758f9ded45183719d465,2024-06-12T18:15:12.493000
CVE-2024-5560,0,0,ef0761cc09cb2a3b612bdc0fa8d549dbc116ec36d61e23df3cadcf2b2b11eaf9,2024-06-12T17:15:52.357000
CVE-2024-5564,0,0,cd961630c6982ea90916e9cc290067a2c4a02a79292d87af6b0ec76760478ca9,2024-06-03T14:46:24.250000
CVE-2024-5565,0,0,830316f5c713618fdad4a0eda5b7296c22d5d93c87a8813197db3ff9cf28c4ee,2024-05-31T19:14:47.793000
CVE-2024-5571,0,0,105c4e644019eeccf72c6e63813cdc36601b1b9a7e3cba5bc172df86631261e6,2024-06-11T17:29:03.277000
CVE-2024-5584,0,0,612eacfcf6c3fd3d6fdd0ff2c66e496cc817b02568ea9f69c40277bbc0300578,2024-06-11T13:54:12.057000
CVE-2024-5585,0,1,23f2e7b2ee30c2e56251fdffeaabd2833482d3483754dca28b1f5ab4921ddb38,2024-06-12T17:15:04.083000
CVE-2024-5585,0,0,23f2e7b2ee30c2e56251fdffeaabd2833482d3483754dca28b1f5ab4921ddb38,2024-06-12T17:15:04.083000
CVE-2024-5587,0,0,9180b0762a5a5a7a17ce70cd861bdf25e955d88caf903bee442f7c48a0a2a218,2024-06-03T14:46:24.250000
CVE-2024-5588,0,0,21589c4423d1fee081cb695dd8009f3bd5a36bd74dae1713c28449f0da1cd8d1,2024-06-04T19:21:10.267000
CVE-2024-5589,0,0,dc63c38434ce5bb089af0d0f8aa09f6a46f1fae34dd45c15f4542741dea047b7,2024-06-03T14:46:24.250000
CVE-2024-5590,0,0,ca60332ff9933405c7b9b37e93d2404b53274b9ec741b4065c0c1eadbd60da94,2024-06-03T14:46:24.250000
CVE-2024-5597,0,0,1a4662a4bad753ddfaeb71415fd7d7bbee7f1ef3c250c245871db0dcb1335584,2024-06-10T18:06:22.600000
CVE-2024-5597,0,1,652827ff26b80eabae5b3eddf519a61b0da7de181ce61fd257911ec48c45cdb0,2024-06-12T18:10:47.080000
CVE-2024-5599,0,0,e4d8d3217ca804a33354b51b54e1f3f41ce0e1fc1f554dedfe90ad1a46a87370,2024-06-11T18:24:39.057000
CVE-2024-5607,0,0,9601597658129a089207c1a0e7e7267aceda952302ad39754d738e7307549543,2024-06-07T14:56:05.647000
CVE-2024-5609,0,0,f28c83e3e9d04345913d36de3bfdbd0d644d73b3d20045d9399b3368319c8d47,2024-06-06T19:16:09.920000
@ -253631,7 +253639,7 @@ CVE-2024-5739,0,0,5773cc5124d6a6a0e954a481f5ce31fb721ea51c10912a509188eda9635d70
CVE-2024-5742,0,0,d09d1105fb5596a722b05fe43f0b05eb11b548e04093f54406c8e99009264b31,2024-06-12T09:15:23.037000
CVE-2024-5745,0,0,8788b99580d43fd9eb900afb700ee157c954d289b603d58451eabd57873852f0,2024-06-08T04:15:10.027000
CVE-2024-5758,0,0,60f3603833ce9f04e269788c1d2a3370191ec81ac34b615f7c4c140d7286ef3a,2024-06-10T02:52:08.267000
CVE-2024-5759,1,1,826729e04d02664132e22a6c7cc2d0756738f94f6ebbdeb3f8b7aba1ab3ed272,2024-06-12T16:15:12.550000
CVE-2024-5759,0,0,826729e04d02664132e22a6c7cc2d0756738f94f6ebbdeb3f8b7aba1ab3ed272,2024-06-12T16:15:12.550000
CVE-2024-5761,0,0,e0022a8d80317cd3941058bae14b514f68707790a5051038049a1d552ba8de69,2024-06-07T19:15:24.467000
CVE-2024-5766,0,0,86ed0bd8ec5f973a61dc526186a645f1ec84961008a0f608efabd599d39dbfeb,2024-06-10T02:52:08.267000
CVE-2024-5770,0,0,2161bc3bb7995521a02976cf67b0f5030935d13dcc8500f4bdfe07ad52c43c37,2024-06-10T02:52:08.267000
@ -253650,6 +253658,7 @@ CVE-2024-5782,0,0,1a8a2620a565d05a1a6c2c4c72d75648296e70bf5f89433612bbf40ebc42c7
CVE-2024-5783,0,0,e65b469aba92209e135f01d801ec2e7ebd41770aa11624b30224f43d98aec806,2024-06-12T08:15:51.480000
CVE-2024-5785,0,0,9826b5aaa33b29bbb943547624c099322eebf243c8fefca7bc1b316af4cf2a62,2024-06-10T18:06:22.600000
CVE-2024-5786,0,0,1f75ee06acd19f83f11a6972076ed1b01909c541516fb3c8be9392bde53f67b2,2024-06-10T18:06:22.600000
CVE-2024-5798,1,1,aa1945340d1a2bd8574699df8c7cfa4e55fa00a53bbb80a12adfe9c942c62599,2024-06-12T19:15:51.413000
CVE-2024-5812,0,0,d575f250532152186ae1730a95904983d1eeca8cedc4e48cf08c6f7cb36548d3,2024-06-11T16:15:29.207000
CVE-2024-5813,0,0,ce4a3354f5a4e16f73ac84191b89ae8910ac4de1cfa4c74cc4624e1e37872032,2024-06-11T16:15:29.480000
CVE-2024-5825,0,0,800930249192b4fb36871d2a50a6622621c6dfa5eae6376e2c2995741b4630b2,2024-06-11T10:15:13.960000
@ -253676,14 +253685,14 @@ CVE-2024-5851,0,0,812870dd68f694f8cb7317d5a8b0b798b4c33892ccc0a6c22c4a632bb6af25
CVE-2024-5873,0,0,4affe4b1f71505ca05298a33c7e23c3ae147869580237755bed2d180fbea1b8e,2024-06-12T08:15:51.550000
CVE-2024-5891,0,0,81d9f8b71bacc11f5dc360efb1b0d50499697611b49f365c1b4a23895b7163be,2024-06-12T14:15:12.460000
CVE-2024-5892,0,0,aedbf3b6ff4f72315e0710a5e0053eef0159f2cd6280fed23810bd46e4afaad4,2024-06-12T06:15:09.473000
CVE-2024-5893,0,0,75a17ab9c78de4e86da4ff51cb3473e6f5cc4487a936043b29cff71664107009,2024-06-12T15:15:53.393000
CVE-2024-5894,0,0,7a3b9e35f82b06ba3832b29b7a4adfea2b9b21ad7b996e37db3c45efd09e4655,2024-06-12T15:15:53.693000
CVE-2024-5895,0,0,ef4becbdaae8731d4c9d3f6a2de4c570b3a9c61f102e39b10564fa421edd1d54,2024-06-12T15:15:53.970000
CVE-2024-5896,1,1,fcf5296c2788d50a4e3e3f6e2cb1498459d444e2a307e12bcb8876663fa70daa,2024-06-12T16:15:12.813000
CVE-2024-5897,1,1,f9281e8cf1c734c32c576230787d605b9edc06b2bbd66417230ea66875c948d1,2024-06-12T16:15:13.100000
CVE-2024-5898,1,1,a383de97f183d5da1095b93fb673284ec976562346d25b45514d64e83363d39b,2024-06-12T17:15:52.577000
CVE-2024-5905,1,1,77997da49aa614d8a0b29e43ca0c737b0ef385d8943e3b4311ac9b2cbaa7e5d7,2024-06-12T17:15:52.847000
CVE-2024-5906,1,1,8cc560f93bbe808a9ea853048fdaa00c673f479a1d2ddb7b71a9502e5a18ef3d,2024-06-12T17:15:53
CVE-2024-5907,1,1,b53d98cdcb442fa876a10088ac4c90e01e6ec348ba1c48bed7649b88fa30b261,2024-06-12T17:15:53.127000
CVE-2024-5908,1,1,d9b80954d4874d7eb96578d91cf708f9b239ec2d165443b371c1c3a363fdeeeb,2024-06-12T17:15:53.253000
CVE-2024-5909,1,1,44931b98792dc6a4c493e85b21256417760100cc9456bc7c70bd1873ae28f015,2024-06-12T17:15:53.370000
CVE-2024-5893,0,1,cd1f2f9d3efdbd0714e6b0dba5c49856728a754e5fed4715d568602a6cc603d6,2024-06-12T19:15:51.630000
CVE-2024-5894,0,1,8f7ec1489337d411e2e28ce8b660f7843f4993f287b7fda9e6988c83d775a8d1,2024-06-12T19:15:51.733000
CVE-2024-5895,0,1,c8c8d0a698456f581dc50ddcae3df40710f596b434923fc8cb2c1d15b642163e,2024-06-12T18:15:12.850000
CVE-2024-5896,0,1,3ba518c4cbe886b53bc075aeb08f6187c1ef789e75ed11113a3676380d8f2841,2024-06-12T19:15:51.847000
CVE-2024-5897,0,0,f9281e8cf1c734c32c576230787d605b9edc06b2bbd66417230ea66875c948d1,2024-06-12T16:15:13.100000
CVE-2024-5898,0,0,a383de97f183d5da1095b93fb673284ec976562346d25b45514d64e83363d39b,2024-06-12T17:15:52.577000
CVE-2024-5905,0,0,77997da49aa614d8a0b29e43ca0c737b0ef385d8943e3b4311ac9b2cbaa7e5d7,2024-06-12T17:15:52.847000
CVE-2024-5906,0,0,8cc560f93bbe808a9ea853048fdaa00c673f479a1d2ddb7b71a9502e5a18ef3d,2024-06-12T17:15:53
CVE-2024-5907,0,0,b53d98cdcb442fa876a10088ac4c90e01e6ec348ba1c48bed7649b88fa30b261,2024-06-12T17:15:53.127000
CVE-2024-5908,0,0,d9b80954d4874d7eb96578d91cf708f9b239ec2d165443b371c1c3a363fdeeeb,2024-06-12T17:15:53.253000
CVE-2024-5909,0,0,44931b98792dc6a4c493e85b21256417760100cc9456bc7c70bd1873ae28f015,2024-06-12T17:15:53.370000

Can't render this file because it is too large.