diff --git a/CVE-2022/CVE-2022-328xx/CVE-2022-32897.json b/CVE-2022/CVE-2022-328xx/CVE-2022-32897.json index 924033071a6..a89d4ab9037 100644 --- a/CVE-2022/CVE-2022-328xx/CVE-2022-32897.json +++ b/CVE-2022/CVE-2022-328xx/CVE-2022-32897.json @@ -2,19 +2,80 @@ "id": "CVE-2022-32897", "sourceIdentifier": "product-security@apple.com", "published": "2024-06-10T20:15:12.440", - "lastModified": "2024-06-10T20:54:18.443", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-06-12T18:08:05.860", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "A memory corruption issue was addressed with improved validation. This issue is fixed in macOS Monterey 12.5. Processing a maliciously crafted tiff file may lead to arbitrary code execution." + }, + { + "lang": "es", + "value": "Se solucion\u00f3 un problema de corrupci\u00f3n de memoria con una validaci\u00f3n mejorada. Este problema se solucion\u00f3 en macOS Monterey 12.5. El procesamiento de un archivo tiff creado con fines malintencionados puede provocar la ejecuci\u00f3n de c\u00f3digo arbitrario." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*", + "versionEndExcluding": "12.5", + "matchCriteriaId": "F8EE7558-B3A3-40EC-AB95-70FDD5C4E1CB" + } + ] + } + ] } ], - "metrics": {}, "references": [ { "url": "https://support.apple.com/en-us/HT213345", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Release Notes", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2022/CVE-2022-329xx/CVE-2022-32933.json b/CVE-2022/CVE-2022-329xx/CVE-2022-32933.json index 73acaab90f3..826f0efe13b 100644 --- a/CVE-2022/CVE-2022-329xx/CVE-2022-32933.json +++ b/CVE-2022/CVE-2022-329xx/CVE-2022-32933.json @@ -2,19 +2,79 @@ "id": "CVE-2022-32933", "sourceIdentifier": "product-security@apple.com", "published": "2024-06-10T20:15:12.533", - "lastModified": "2024-06-10T20:54:18.443", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-06-12T18:07:08.790", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "An information disclosure issue was addressed by removing the vulnerable code. This issue is fixed in macOS Monterey 12.5. A website may be able to track the websites a user visited in Safari private browsing mode." + }, + { + "lang": "es", + "value": "Se solucion\u00f3 un problema de divulgaci\u00f3n de informaci\u00f3n eliminando el c\u00f3digo vulnerable. Este problema se solucion\u00f3 en macOS Monterey 12.5. Un sitio web puede rastrear los sitios web que visit\u00f3 un usuario en el modo de navegaci\u00f3n privada de Safari." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 5.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*", + "versionEndExcluding": "12.5", + "matchCriteriaId": "F8EE7558-B3A3-40EC-AB95-70FDD5C4E1CB" + } + ] + } + ] } ], - "metrics": {}, "references": [ { "url": "https://support.apple.com/en-us/HT213345", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2022/CVE-2022-485xx/CVE-2022-48578.json b/CVE-2022/CVE-2022-485xx/CVE-2022-48578.json index c9b4836eee0..b5beb91d7be 100644 --- a/CVE-2022/CVE-2022-485xx/CVE-2022-48578.json +++ b/CVE-2022/CVE-2022-485xx/CVE-2022-48578.json @@ -2,19 +2,79 @@ "id": "CVE-2022-48578", "sourceIdentifier": "product-security@apple.com", "published": "2024-06-10T20:15:12.600", - "lastModified": "2024-06-10T20:54:18.443", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-06-12T18:07:41.117", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "An out-of-bounds read was addressed with improved bounds checking. This issue is fixed in macOS Monterey 12.5. Processing an AppleScript may result in unexpected termination or disclosure of process memory." + }, + { + "lang": "es", + "value": "Se solucion\u00f3 una lectura fuera de los l\u00edmites con una verificaci\u00f3n de los l\u00edmites mejorada. Este problema se solucion\u00f3 en macOS Monterey 12.5. El procesamiento de un AppleScript puede provocar una terminaci\u00f3n inesperada o la divulgaci\u00f3n de la memoria del proceso." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 7.1, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.2 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-125" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*", + "versionEndExcluding": "12.5", + "matchCriteriaId": "F8EE7558-B3A3-40EC-AB95-70FDD5C4E1CB" + } + ] + } + ] } ], - "metrics": {}, "references": [ { "url": "https://support.apple.com/en-us/HT213345", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2022/CVE-2022-486xx/CVE-2022-48683.json b/CVE-2022/CVE-2022-486xx/CVE-2022-48683.json index 5b216c1df70..0ec346e74e3 100644 --- a/CVE-2022/CVE-2022-486xx/CVE-2022-48683.json +++ b/CVE-2022/CVE-2022-486xx/CVE-2022-48683.json @@ -2,19 +2,79 @@ "id": "CVE-2022-48683", "sourceIdentifier": "product-security@apple.com", "published": "2024-06-10T20:15:12.677", - "lastModified": "2024-06-10T20:54:18.443", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-06-12T18:05:40.943", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "An access issue was addressed with additional sandbox restrictions. This issue is fixed in macOS Ventura 13. An app may be able to break out of its sandbox." + }, + { + "lang": "es", + "value": "Se solucion\u00f3 un problema de acceso con restricciones adicionales de la zona de pruebas. Este problema se solucion\u00f3 en macOS Ventura 13. Es posible que una aplicaci\u00f3n pueda salir de su zona de pruebas." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*", + "versionEndExcluding": "13.0", + "matchCriteriaId": "71E032AD-F827-4944-9699-BB1E6D4233FC" + } + ] + } + ] } ], - "metrics": {}, "references": [ { "url": "https://support.apple.com/en-us/HT213488", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-292xx/CVE-2023-29267.json b/CVE-2023/CVE-2023-292xx/CVE-2023-29267.json new file mode 100644 index 00000000000..bcd059a3f0b --- /dev/null +++ b/CVE-2023/CVE-2023-292xx/CVE-2023-29267.json @@ -0,0 +1,59 @@ +{ + "id": "CVE-2023-29267", + "sourceIdentifier": "psirt@us.ibm.com", + "published": "2024-06-12T19:15:50.020", + "lastModified": "2024-06-12T19:15:50.020", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "IBM Db2 for Linux, UNIX and Windows (includes Db2 Connect Server) 10.5, 11.1, and 11.5is vulnerable to a denial of service, under specific configurations, as the server may crash when using a specially crafted SQL statement by an authenticated user. IBM X-Force ID: 287612." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@us.ibm.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 5.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.6, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@us.ibm.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-399" + } + ] + } + ], + "references": [ + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/287612", + "source": "psirt@us.ibm.com" + }, + { + "url": "https://www.ibm.com/support/pages/node/7156851", + "source": "psirt@us.ibm.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-403xx/CVE-2023-40389.json b/CVE-2023/CVE-2023-403xx/CVE-2023-40389.json index d83bc89d40c..05013ce5cce 100644 --- a/CVE-2023/CVE-2023-403xx/CVE-2023-40389.json +++ b/CVE-2023/CVE-2023-403xx/CVE-2023-40389.json @@ -2,23 +2,93 @@ "id": "CVE-2023-40389", "sourceIdentifier": "product-security@apple.com", "published": "2024-06-10T20:15:12.753", - "lastModified": "2024-06-10T20:54:18.443", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-06-12T18:05:20.887", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "The issue was addressed with improved restriction of data container access. This issue is fixed in macOS Ventura 13.6.5, macOS Monterey 12.7.4. An app may be able to access sensitive user data." + }, + { + "lang": "es", + "value": "El problema se solucion\u00f3 mejorando la restricci\u00f3n del acceso a los contenedores de datos. Este problema se solucion\u00f3 en macOS Ventura 13.6.5, macOS Monterey 12.7.4. Es posible que una aplicaci\u00f3n pueda acceder a datos confidenciales del usuario." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*", + "versionEndExcluding": "12.7.4", + "matchCriteriaId": "80A8C181-92A9-459F-8DF5-466763A8FF1A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*", + "versionStartIncluding": "13.0", + "versionEndExcluding": "13.6.5", + "matchCriteriaId": "69C4F06A-061F-46B3-8BB7-5C9B47C00956" + } + ] + } + ] } ], - "metrics": {}, "references": [ { "url": "https://support.apple.com/en-us/HT214083", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://support.apple.com/en-us/HT214085", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-08xx/CVE-2024-0865.json b/CVE-2024/CVE-2024-08xx/CVE-2024-0865.json new file mode 100644 index 00000000000..75d34f722d6 --- /dev/null +++ b/CVE-2024/CVE-2024-08xx/CVE-2024-0865.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2024-0865", + "sourceIdentifier": "cybersecurity@se.com", + "published": "2024-06-12T18:15:10.620", + "lastModified": "2024-06-12T18:15:10.620", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "CWE-798: Use of hard-coded credentials vulnerability exists that could cause local privilege\nescalation when logged in as a non-administrative user." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "cybersecurity@se.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "cybersecurity@se.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-798" + } + ] + } + ], + "references": [ + { + "url": "https://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2024-044-03&p_enDocType=Security+and+Safety+Notice&p_File_Name=SEVD-2024-044-03.pdf", + "source": "cybersecurity@se.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-222xx/CVE-2024-22279.json b/CVE-2024/CVE-2024-222xx/CVE-2024-22279.json index f99a7875260..712a55c0820 100644 --- a/CVE-2024/CVE-2024-222xx/CVE-2024-22279.json +++ b/CVE-2024/CVE-2024-222xx/CVE-2024-22279.json @@ -2,16 +2,40 @@ "id": "CVE-2024-22279", "sourceIdentifier": "security@vmware.com", "published": "2024-06-10T20:15:12.880", - "lastModified": "2024-06-10T20:54:18.443", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-06-12T18:04:20.147", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "Improper handling of requests in Routing Release > v0.273.0 and <= v0.297.0 allows an unauthenticated attacker to degrade\n the service availability of the Cloud Foundry deployment if performed at scale." + }, + { + "lang": "es", + "value": "El manejo inadecuado de las solicitudes en Routing Release > v0.273.0 y <= v0.297.0 permite que un atacante no autenticado degrade la disponibilidad del servicio de la implementaci\u00f3n de Cloud Foundry si se realiza a escala." } ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + }, { "source": "security@vmware.com", "type": "Secondary", @@ -35,6 +59,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-444" + } + ] + }, { "source": "security@vmware.com", "type": "Secondary", @@ -46,10 +80,39 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cloudfoundry:cf-deployment:*:*:*:*:*:*:*:*", + "versionStartIncluding": "30.9.0", + "versionEndIncluding": "40.13.0", + "matchCriteriaId": "3640FEAC-74E5-4F8B-A9DA-E223EC46407D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cloudfoundry:routing_release:*:*:*:*:*:*:*:*", + "versionStartIncluding": "0.273.0", + "versionEndIncluding": "0.297.0", + "matchCriteriaId": "D6C45B8F-FE7E-4FE7-9F42-644548DC7DC1" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.cloudfoundry.org/blog/cve-2024-22279-gorouter-denial-of-service-attack/", - "source": "security@vmware.com" + "source": "security@vmware.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-22xx/CVE-2024-2230.json b/CVE-2024/CVE-2024-22xx/CVE-2024-2230.json index 6f1d7aae09a..5557afbcda4 100644 --- a/CVE-2024/CVE-2024-22xx/CVE-2024-2230.json +++ b/CVE-2024/CVE-2024-22xx/CVE-2024-2230.json @@ -2,54 +2,14 @@ "id": "CVE-2024-2230", "sourceIdentifier": "cybersecurity@se.com", "published": "2024-06-12T17:15:50.140", - "lastModified": "2024-06-12T17:15:50.140", - "vulnStatus": "Received", + "lastModified": "2024-06-12T18:15:11.593", + "vulnStatus": "Rejected", "descriptions": [ { "lang": "en", - "value": "CWE-798: Use of hard-coded credentials vulnerability exists that could cause local privilege\nescalation when logged in as a non-administrative user." + "value": "Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority." } ], - "metrics": { - "cvssMetricV31": [ - { - "source": "cybersecurity@se.com", - "type": "Secondary", - "cvssData": { - "version": "3.1", - "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", - "attackVector": "LOCAL", - "attackComplexity": "LOW", - "privilegesRequired": "LOW", - "userInteraction": "NONE", - "scope": "UNCHANGED", - "confidentialityImpact": "HIGH", - "integrityImpact": "HIGH", - "availabilityImpact": "HIGH", - "baseScore": 7.8, - "baseSeverity": "HIGH" - }, - "exploitabilityScore": 1.8, - "impactScore": 5.9 - } - ] - }, - "weaknesses": [ - { - "source": "cybersecurity@se.com", - "type": "Primary", - "description": [ - { - "lang": "en", - "value": "CWE-798" - } - ] - } - ], - "references": [ - { - "url": "https://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2024-044-03&p_enDocType=Security+and+Safety+Notice&p_File_Name=SEVD-2024-044-03.pdf", - "source": "cybersecurity@se.com" - } - ] + "metrics": {}, + "references": [] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-232xx/CVE-2024-23299.json b/CVE-2024/CVE-2024-232xx/CVE-2024-23299.json index a9f0b7cfee2..83b6816b6e6 100644 --- a/CVE-2024/CVE-2024-232xx/CVE-2024-23299.json +++ b/CVE-2024/CVE-2024-232xx/CVE-2024-23299.json @@ -2,27 +2,107 @@ "id": "CVE-2024-23299", "sourceIdentifier": "product-security@apple.com", "published": "2024-06-10T20:15:13.107", - "lastModified": "2024-06-10T20:54:18.443", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-06-12T18:03:36.960", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "The issue was addressed with improved checks. This issue is fixed in macOS Sonoma 14.4, macOS Ventura 13.6.5, macOS Monterey 12.7.4. An app may be able to break out of its sandbox." + }, + { + "lang": "es", + "value": "El problema se solucion\u00f3 con controles mejorados. Este problema se solucion\u00f3 en macOS Sonoma 14.4, macOS Ventura 13.6.5, macOS Monterey 12.7.4. Es posible que una aplicaci\u00f3n pueda salir de su zona de pruebas." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.6, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 6.0 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*", + "versionEndExcluding": "12.7.4", + "matchCriteriaId": "80A8C181-92A9-459F-8DF5-466763A8FF1A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*", + "versionStartIncluding": "13.0", + "versionEndExcluding": "13.6.5", + "matchCriteriaId": "69C4F06A-061F-46B3-8BB7-5C9B47C00956" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*", + "versionStartIncluding": "14.0", + "versionEndExcluding": "14.4", + "matchCriteriaId": "73160D1F-755B-46D2-969F-DF8E43BB1099" + } + ] + } + ] } ], - "metrics": {}, "references": [ { "url": "https://support.apple.com/en-us/HT214083", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://support.apple.com/en-us/HT214084", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://support.apple.com/en-us/HT214085", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-240xx/CVE-2024-24051.json b/CVE-2024/CVE-2024-240xx/CVE-2024-24051.json new file mode 100644 index 00000000000..c38717b8e3f --- /dev/null +++ b/CVE-2024/CVE-2024-240xx/CVE-2024-24051.json @@ -0,0 +1,20 @@ +{ + "id": "CVE-2024-24051", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-06-12T18:15:10.920", + "lastModified": "2024-06-12T18:15:10.920", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Improper input validation of printing files in Monoprice Select Mini V2 V37.115.32 allows attackers to instruct the device's movable parts to destinations that exceed the devices' maximum coordinates via the printing of a malicious .gcode file." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/tkruppert/Reported_Vulnerabilities/blob/main/CVE-2024-24051.md", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-277xx/CVE-2024-27792.json b/CVE-2024/CVE-2024-277xx/CVE-2024-27792.json index e3d3bcf4aef..33eee1c943a 100644 --- a/CVE-2024/CVE-2024-277xx/CVE-2024-27792.json +++ b/CVE-2024/CVE-2024-277xx/CVE-2024-27792.json @@ -2,19 +2,79 @@ "id": "CVE-2024-27792", "sourceIdentifier": "product-security@apple.com", "published": "2024-06-10T20:15:13.210", - "lastModified": "2024-06-10T20:54:18.443", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-06-12T18:02:45.480", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "This issue was addressed by adding an additional prompt for user consent. This issue is fixed in macOS Sonoma 14.4. An app may be able to access user-sensitive data." + }, + { + "lang": "es", + "value": "Este problema se solucion\u00f3 agregando una solicitud adicional de consentimiento del usuario. Este problema se solucion\u00f3 en macOS Sonoma 14.4. Es posible que una aplicaci\u00f3n pueda acceder a datos confidenciales del usuario." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*", + "versionEndExcluding": "14.4", + "matchCriteriaId": "58227FD1-0619-45F6-AD19-25831899376A" + } + ] + } + ] } ], - "metrics": {}, "references": [ { "url": "https://support.apple.com/en-us/HT214084", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-27xx/CVE-2024-2747.json b/CVE-2024/CVE-2024-27xx/CVE-2024-2747.json new file mode 100644 index 00000000000..84a5a55c0dd --- /dev/null +++ b/CVE-2024/CVE-2024-27xx/CVE-2024-2747.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2024-2747", + "sourceIdentifier": "cybersecurity@se.com", + "published": "2024-06-12T18:15:11.680", + "lastModified": "2024-06-12T18:15:11.680", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "CWE-428: Unquoted search path or element vulnerability exists in Easergy Studio, which could\ncause privilege escalation when a valid user replaces a trusted file name on the system and\nreboots the machine." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "cybersecurity@se.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "cybersecurity@se.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-428" + } + ] + } + ], + "references": [ + { + "url": "https://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2024-100-01&p_enDocType=Security+and+Safety+Notice&p_File_Name=SEVD-2024-100-01.pdf", + "source": "cybersecurity@se.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-287xx/CVE-2024-28762.json b/CVE-2024/CVE-2024-287xx/CVE-2024-28762.json new file mode 100644 index 00000000000..8973fbdc0c9 --- /dev/null +++ b/CVE-2024/CVE-2024-287xx/CVE-2024-28762.json @@ -0,0 +1,59 @@ +{ + "id": "CVE-2024-28762", + "sourceIdentifier": "psirt@us.ibm.com", + "published": "2024-06-12T18:15:11.267", + "lastModified": "2024-06-12T18:15:11.267", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "IBM Db2 for Linux, UNIX and Windows (includes DB2 Connect Server) 10.5, 11.1, and 11.5 is vulnerable to denial of service with a specially crafted query under certain conditions. IBM X-Force ID: 285246." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@us.ibm.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 5.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.6, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@us.ibm.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-770" + } + ] + } + ], + "references": [ + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/285246", + "source": "psirt@us.ibm.com" + }, + { + "url": "https://www.ibm.com/support/pages/node/7156847", + "source": "psirt@us.ibm.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-316xx/CVE-2024-31612.json b/CVE-2024/CVE-2024-316xx/CVE-2024-31612.json index 48373a4d3df..4b90a47d838 100644 --- a/CVE-2024/CVE-2024-316xx/CVE-2024-31612.json +++ b/CVE-2024/CVE-2024-316xx/CVE-2024-31612.json @@ -2,19 +2,79 @@ "id": "CVE-2024-31612", "sourceIdentifier": "cve@mitre.org", "published": "2024-06-10T18:15:31.513", - "lastModified": "2024-06-10T20:54:18.443", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-06-12T18:10:30.587", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "Emlog pro2.3 is vulnerable to Cross Site Request Forgery (CSRF) via twitter.php which can be used with a XSS vulnerability to access administrator information." + }, + { + "lang": "es", + "value": "Emlog pro2.3 es vulnerable a Cross-Site Request Forgery (CSRF) a trav\u00e9s de twitter.php, que puede usarse con una vulnerabilidad XSS para acceder a la informaci\u00f3n del administrador." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 6.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:emlog:emlog:2.3.0:*:*:*:pro:*:*:*", + "matchCriteriaId": "D51AF99B-7574-4222-A2A2-C1ECC9BE8E51" + } + ] + } + ] } ], - "metrics": {}, "references": [ { "url": "https://github.com/ss122-0ss/cms/blob/main/emlog-csrf.md", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-318xx/CVE-2024-31881.json b/CVE-2024/CVE-2024-318xx/CVE-2024-31881.json new file mode 100644 index 00000000000..278bd988e4c --- /dev/null +++ b/CVE-2024/CVE-2024-318xx/CVE-2024-31881.json @@ -0,0 +1,59 @@ +{ + "id": "CVE-2024-31881", + "sourceIdentifier": "psirt@us.ibm.com", + "published": "2024-06-12T19:15:50.710", + "lastModified": "2024-06-12T19:15:50.710", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "IBM Db2 for Linux, UNIX and Windows (includes Db2 Connect Server) 10.5, 11.1, and 11.5 is vulnerable to a denial of service as the server may crash when using a specially crafted query on certain columnar tables by an authenticated user. IBM X-Force ID: 287613." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@us.ibm.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 6.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@us.ibm.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-770" + } + ] + } + ], + "references": [ + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/287613", + "source": "psirt@us.ibm.com" + }, + { + "url": "https://www.ibm.com/support/pages/node/7156852", + "source": "psirt@us.ibm.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-321xx/CVE-2024-32167.json b/CVE-2024/CVE-2024-321xx/CVE-2024-32167.json index 464c26b23d6..c0ce9dcd99e 100644 --- a/CVE-2024/CVE-2024-321xx/CVE-2024-32167.json +++ b/CVE-2024/CVE-2024-321xx/CVE-2024-32167.json @@ -2,19 +2,79 @@ "id": "CVE-2024-32167", "sourceIdentifier": "cve@mitre.org", "published": "2024-06-10T20:15:13.367", - "lastModified": "2024-06-10T20:54:18.443", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-06-12T18:00:30.120", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "Sourcecodester Online Medicine Ordering System 1.0 is vulnerable to Arbitrary file deletion vulnerability as the backend settings have the function of deleting pictures to delete any files." + }, + { + "lang": "es", + "value": "Sourcecodester Online Medicine Ordering System 1.0 es afectado por una vulnerabilidad de eliminaci\u00f3n arbitraria de archivos ya que la configuraci\u00f3n del backend tiene la funci\u00f3n de eliminar im\u00e1genes para eliminar cualquier archivo." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.1, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.2 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:oretnom23:online_medicine_ordering_system:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "5BA8DED5-CD2F-4667-A647-F56E5E0E5FC7" + } + ] + } + ] } ], - "metrics": {}, "references": [ { "url": "https://github.com/ss122-0ss/cms/blob/main/omos.md", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-357xx/CVE-2024-35742.json b/CVE-2024/CVE-2024-357xx/CVE-2024-35742.json index 71f66507dcc..408629b30b3 100644 --- a/CVE-2024/CVE-2024-357xx/CVE-2024-35742.json +++ b/CVE-2024/CVE-2024-357xx/CVE-2024-35742.json @@ -2,8 +2,8 @@ "id": "CVE-2024-35742", "sourceIdentifier": "audit@patchstack.com", "published": "2024-06-10T08:15:51.507", - "lastModified": "2024-06-10T12:40:41.360", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-06-12T19:32:19.827", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -16,6 +16,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 7.3, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.4 + }, { "source": "audit@patchstack.com", "type": "Secondary", @@ -50,10 +70,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:codeparrots:easy_forms_for_mailchimp:*:*:*:*:*:wordpress:*:*", + "versionEndIncluding": "6.9.0", + "matchCriteriaId": "0D22135E-A1C8-4889-94E5-63749B16560A" + } + ] + } + ] + } + ], "references": [ { "url": "https://patchstack.com/database/vulnerability/yikes-inc-easy-mailchimp-extender/wordpress-easy-forms-for-mailchimp-plugin-6-9-0-broken-access-control-vulnerability?_s_id=cve", - "source": "audit@patchstack.com" + "source": "audit@patchstack.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-357xx/CVE-2024-35749.json b/CVE-2024/CVE-2024-357xx/CVE-2024-35749.json index 90bf123b0b5..32bf8f4e0b4 100644 --- a/CVE-2024/CVE-2024-357xx/CVE-2024-35749.json +++ b/CVE-2024/CVE-2024-357xx/CVE-2024-35749.json @@ -2,16 +2,40 @@ "id": "CVE-2024-35749", "sourceIdentifier": "audit@patchstack.com", "published": "2024-06-10T17:16:31.187", - "lastModified": "2024-06-10T18:06:22.600", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-06-12T18:19:55.050", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "Authentication Bypass by Spoofing vulnerability in Acurax Under Construction / Maintenance Mode from Acurax allows Authentication Bypass.This issue affects Under Construction / Maintenance Mode from Acurax: from n/a through 2.6." + }, + { + "lang": "es", + "value": "La vulnerabilidad de omisi\u00f3n de autenticaci\u00f3n mediante suplantaci\u00f3n de identidad en Acurax Under Construction / Maintenance Mode from Acurax permite la omisi\u00f3n de autenticaci\u00f3n. Este problema afecta a Under Construction / Maintenance Mode from Acurax: desde n/a hasta 2.6." } ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 + }, { "source": "audit@patchstack.com", "type": "Secondary", @@ -46,10 +70,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:acurax:under_construction_\\/_maintenance_mode:*:*:*:*:*:wordpress:*:*", + "versionEndIncluding": "2.6", + "matchCriteriaId": "6C7D3084-18DA-4ABD-A2EB-2D0CC7B79A77" + } + ] + } + ] + } + ], "references": [ { "url": "https://patchstack.com/database/vulnerability/coming-soon-maintenance-mode-from-acurax/wordpress-under-construction-maintenance-mode-from-acurax-plugin-2-6-ip-bypass-vulnerability?_s_id=cve", - "source": "audit@patchstack.com" + "source": "audit@patchstack.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-357xx/CVE-2024-35754.json b/CVE-2024/CVE-2024-357xx/CVE-2024-35754.json index aa4e5cfa534..9ac3678a3d7 100644 --- a/CVE-2024/CVE-2024-357xx/CVE-2024-35754.json +++ b/CVE-2024/CVE-2024-357xx/CVE-2024-35754.json @@ -2,16 +2,40 @@ "id": "CVE-2024-35754", "sourceIdentifier": "audit@patchstack.com", "published": "2024-06-10T17:16:31.430", - "lastModified": "2024-06-10T18:06:22.600", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-06-12T18:19:06.043", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in Ovic Team Ovic Importer allows Path Traversal.This issue affects Ovic Importer: from n/a through 1.6.3." + }, + { + "lang": "es", + "value": "Limitaci\u00f3n inadecuada de una vulnerabilidad de nombre de ruta a un directorio restringido (\"Path Traversal\") en Ovic Team Ovic Importer permite el Path Traversal. Este problema afecta a Ovic Importer: desde n/a hasta 1.6.3." } ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 6.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 + }, { "source": "audit@patchstack.com", "type": "Secondary", @@ -46,10 +70,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ovic_importer_project:ovic_importer:*:*:*:*:*:wordpress:*:*", + "versionEndIncluding": "1.6.3", + "matchCriteriaId": "603DA4B5-A29F-4AE4-A0D5-C30C1C754580" + } + ] + } + ] + } + ], "references": [ { "url": "https://patchstack.com/database/vulnerability/ovic-import-demo/wordpress-ovic-importer-plugin-1-6-3-arbitrary-file-download-vulnerability?_s_id=cve", - "source": "audit@patchstack.com" + "source": "audit@patchstack.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-364xx/CVE-2024-36407.json b/CVE-2024/CVE-2024-364xx/CVE-2024-36407.json index abab933fe18..acd1bae9d70 100644 --- a/CVE-2024/CVE-2024-364xx/CVE-2024-36407.json +++ b/CVE-2024/CVE-2024-364xx/CVE-2024-36407.json @@ -2,16 +2,40 @@ "id": "CVE-2024-36407", "sourceIdentifier": "security-advisories@github.com", "published": "2024-06-10T17:16:32.253", - "lastModified": "2024-06-10T18:06:22.600", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-06-12T18:17:38.777", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "SuiteCRM is an open-source Customer Relationship Management (CRM) software application. In versions prior to 7.14.4 and 8.6.1, a user password can be reset from an unauthenticated attacker. The attacker does not get access to the new password. But this can be annoying for the user. This attack is also dependent on some password reset functionalities being enabled. It also requires the system using php 7, which is not an officially supported version. Versions 7.14.4 and 8.6.1 contain a fix for this issue." + }, + { + "lang": "es", + "value": "SuiteCRM es una aplicaci\u00f3n de software de gesti\u00f3n de relaciones con el cliente (CRM) de c\u00f3digo abierto. En versiones anteriores a la 7.14.4 y 8.6.1, un atacante no autenticado puede restablecer la contrase\u00f1a de un usuario. El atacante no obtiene acceso a la nueva contrase\u00f1a. Pero esto puede resultar molesto para el usuario. Este ataque tambi\u00e9n depende de que se habiliten algunas funciones de restablecimiento de contrase\u00f1a. Tambi\u00e9n requiere que el sistema utilice php 7, que no es una versi\u00f3n oficialmente compatible. Las versiones 7.14.4 y 8.6.1 contienen una soluci\u00f3n para este problema." } ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 6.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 3.9, + "impactScore": 2.5 + }, { "source": "security-advisories@github.com", "type": "Secondary", @@ -35,6 +59,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-640" + } + ] + }, { "source": "security-advisories@github.com", "type": "Secondary", @@ -46,10 +80,38 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:salesagility:suitecrm:*:*:*:*:*:*:*:*", + "versionEndExcluding": "7.14.4", + "matchCriteriaId": "176C4E20-B96D-4391-986F-3314663983AC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:salesagility:suitecrm:*:*:*:*:*:*:*:*", + "versionStartIncluding": "8.0.0", + "versionEndExcluding": "8.6.1", + "matchCriteriaId": "5249169E-5516-4705-A2C8-DE1BA56497D0" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/salesagility/SuiteCRM/security/advisories/GHSA-6p2f-wwx9-952r", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-364xx/CVE-2024-36408.json b/CVE-2024/CVE-2024-364xx/CVE-2024-36408.json index 53315c13421..806091bf777 100644 --- a/CVE-2024/CVE-2024-364xx/CVE-2024-36408.json +++ b/CVE-2024/CVE-2024-364xx/CVE-2024-36408.json @@ -2,16 +2,40 @@ "id": "CVE-2024-36408", "sourceIdentifier": "security-advisories@github.com", "published": "2024-06-10T17:16:32.503", - "lastModified": "2024-06-10T18:06:22.600", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-06-12T18:13:58.627", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "SuiteCRM is an open-source Customer Relationship Management (CRM) software application. In versions prior to 7.14.4 and 8.6.1, poor input validation allows for SQL Injection in the `Alerts` controller. Versions 7.14.4 and 8.6.1 contain a fix for this issue." + }, + { + "lang": "es", + "value": "SuiteCRM es una aplicaci\u00f3n de software de gesti\u00f3n de relaciones con el cliente (CRM) de c\u00f3digo abierto. En versiones anteriores a 7.14.4 y 8.6.1, una validaci\u00f3n de entrada deficiente permite la inyecci\u00f3n de SQL en el controlador \"Alertas\". Las versiones 7.14.4 y 8.6.1 contienen una soluci\u00f3n para este problema." } ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + }, { "source": "security-advisories@github.com", "type": "Secondary", @@ -35,6 +59,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + }, { "source": "security-advisories@github.com", "type": "Secondary", @@ -46,10 +80,38 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:salesagility:suitecrm:*:*:*:*:*:*:*:*", + "versionEndExcluding": "7.14.4", + "matchCriteriaId": "176C4E20-B96D-4391-986F-3314663983AC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:salesagility:suitecrm:*:*:*:*:*:*:*:*", + "versionStartIncluding": "8.0.0", + "versionEndExcluding": "8.6.1", + "matchCriteriaId": "5249169E-5516-4705-A2C8-DE1BA56497D0" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/salesagility/SuiteCRM/security/advisories/GHSA-2g8f-gjrr-x5cg", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-364xx/CVE-2024-36409.json b/CVE-2024/CVE-2024-364xx/CVE-2024-36409.json index ef7c34efbf4..32f69442f2a 100644 --- a/CVE-2024/CVE-2024-364xx/CVE-2024-36409.json +++ b/CVE-2024/CVE-2024-364xx/CVE-2024-36409.json @@ -2,16 +2,40 @@ "id": "CVE-2024-36409", "sourceIdentifier": "security-advisories@github.com", "published": "2024-06-10T18:15:35.620", - "lastModified": "2024-06-10T20:54:18.443", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-06-12T18:09:19.450", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "SuiteCRM is an open-source Customer Relationship Management (CRM) software application. In versions prior to 7.14.4 and 8.6.1, poor input validation allows for SQL Injection in Tree data entry point. Versions 7.14.4 and 8.6.1 contain a fix for this issue." + }, + { + "lang": "es", + "value": "SuiteCRM es una aplicaci\u00f3n de software de gesti\u00f3n de relaciones con el cliente (CRM) de c\u00f3digo abierto. En versiones anteriores a 7.14.4 y 8.6.1, una validaci\u00f3n de entrada deficiente permite la inyecci\u00f3n SQL en el punto de entrada de datos del Tree. Las versiones 7.14.4 y 8.6.1 contienen una soluci\u00f3n para este problema." } ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + }, { "source": "security-advisories@github.com", "type": "Secondary", @@ -35,6 +59,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + }, { "source": "security-advisories@github.com", "type": "Secondary", @@ -46,10 +80,38 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:salesagility:suitecrm:*:*:*:*:*:*:*:*", + "versionEndExcluding": "7.14.4", + "matchCriteriaId": "176C4E20-B96D-4391-986F-3314663983AC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:salesagility:suitecrm:*:*:*:*:*:*:*:*", + "versionStartIncluding": "8.0.0", + "versionEndExcluding": "8.6.1", + "matchCriteriaId": "5249169E-5516-4705-A2C8-DE1BA56497D0" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/salesagility/SuiteCRM/security/advisories/GHSA-pxq4-vw23-v73f", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-364xx/CVE-2024-36410.json b/CVE-2024/CVE-2024-364xx/CVE-2024-36410.json index ec695629521..f10c5383d8a 100644 --- a/CVE-2024/CVE-2024-364xx/CVE-2024-36410.json +++ b/CVE-2024/CVE-2024-364xx/CVE-2024-36410.json @@ -2,16 +2,40 @@ "id": "CVE-2024-36410", "sourceIdentifier": "security-advisories@github.com", "published": "2024-06-10T18:15:35.830", - "lastModified": "2024-06-10T20:54:18.443", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-06-12T18:09:04.930", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "SuiteCRM is an open-source Customer Relationship Management (CRM) software application. In versions prior to 7.14.4 and 8.6.1, poor input validation allows for SQL Injection in EmailUIAjax messages count controller. Versions 7.14.4 and 8.6.1 contain a fix for this issue." + }, + { + "lang": "es", + "value": "SuiteCRM es una aplicaci\u00f3n de software de gesti\u00f3n de relaciones con el cliente (CRM) de c\u00f3digo abierto. En versiones anteriores a 7.14.4 y 8.6.1, una validaci\u00f3n de entrada deficiente permite la inyecci\u00f3n de SQL en el controlador de recuento de mensajes EmailUIAjax. Las versiones 7.14.4 y 8.6.1 contienen una soluci\u00f3n para este problema." } ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + }, { "source": "security-advisories@github.com", "type": "Secondary", @@ -35,6 +59,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + }, { "source": "security-advisories@github.com", "type": "Secondary", @@ -46,10 +80,38 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:salesagility:suitecrm:*:*:*:*:*:*:*:*", + "versionEndExcluding": "7.14.4", + "matchCriteriaId": "176C4E20-B96D-4391-986F-3314663983AC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:salesagility:suitecrm:*:*:*:*:*:*:*:*", + "versionStartIncluding": "8.0.0", + "versionEndExcluding": "8.6.1", + "matchCriteriaId": "5249169E-5516-4705-A2C8-DE1BA56497D0" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/salesagility/SuiteCRM/security/advisories/GHSA-7jj8-m2wj-m6xq", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-364xx/CVE-2024-36411.json b/CVE-2024/CVE-2024-364xx/CVE-2024-36411.json index 157501c3ed9..8c7e276ad36 100644 --- a/CVE-2024/CVE-2024-364xx/CVE-2024-36411.json +++ b/CVE-2024/CVE-2024-364xx/CVE-2024-36411.json @@ -2,16 +2,40 @@ "id": "CVE-2024-36411", "sourceIdentifier": "security-advisories@github.com", "published": "2024-06-10T20:15:13.593", - "lastModified": "2024-06-10T20:54:18.443", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-06-12T18:00:13.937", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "SuiteCRM is an open-source Customer Relationship Management (CRM) software application. In versions prior to 7.14.4 and 8.6.1, poor input validation allows for SQL Injection in EmailUIAjax displayView controller. Versions 7.14.4 and 8.6.1 contain a fix for this issue." + }, + { + "lang": "es", + "value": "SuiteCRM es una aplicaci\u00f3n de software de gesti\u00f3n de relaciones con el cliente (CRM) de c\u00f3digo abierto. En versiones anteriores a 7.14.4 y 8.6.1, una validaci\u00f3n de entrada deficiente permite la inyecci\u00f3n de SQL en el controlador DisplayView de EmailUIAjax. Las versiones 7.14.4 y 8.6.1 contienen una soluci\u00f3n para este problema." } ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + }, { "source": "security-advisories@github.com", "type": "Secondary", @@ -35,6 +59,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + }, { "source": "security-advisories@github.com", "type": "Secondary", @@ -46,10 +80,38 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:salesagility:suitecrm:*:*:*:*:*:*:*:*", + "versionEndExcluding": "7.14.4", + "matchCriteriaId": "176C4E20-B96D-4391-986F-3314663983AC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:salesagility:suitecrm:*:*:*:*:*:*:*:*", + "versionStartIncluding": "8.0.0", + "versionEndExcluding": "8.6.1", + "matchCriteriaId": "5249169E-5516-4705-A2C8-DE1BA56497D0" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/salesagility/SuiteCRM/security/advisories/GHSA-9rvr-mcrf-p4p7", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-376xx/CVE-2024-37629.json b/CVE-2024/CVE-2024-376xx/CVE-2024-37629.json new file mode 100644 index 00000000000..d864a9e38f0 --- /dev/null +++ b/CVE-2024/CVE-2024-376xx/CVE-2024-37629.json @@ -0,0 +1,24 @@ +{ + "id": "CVE-2024-37629", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-06-12T18:15:12.293", + "lastModified": "2024-06-12T18:15:12.293", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "SummerNote 0.8.18 is vulnerable to Cross Site Scripting (XSS) via the Code View Function." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/summernote/summernote/issues/4642", + "source": "cve@mitre.org" + }, + { + "url": "https://grumpz.net/cve-2024-37629-simple-xss-payload-exploits-0day-vulnerability-in-10000-web-apps", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-38xx/CVE-2024-3850.json b/CVE-2024/CVE-2024-38xx/CVE-2024-3850.json index e373b554ec3..0a4b6e52f58 100644 --- a/CVE-2024/CVE-2024-38xx/CVE-2024-3850.json +++ b/CVE-2024/CVE-2024-38xx/CVE-2024-3850.json @@ -2,16 +2,40 @@ "id": "CVE-2024-3850", "sourceIdentifier": "ics-cert@hq.dhs.gov", "published": "2024-06-10T17:16:33.080", - "lastModified": "2024-06-10T18:06:22.600", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-06-12T18:12:56.413", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "Uniview NVR301-04S2-P4 is vulnerable to reflected cross-site scripting attack (XSS). An attacker could send a user a URL that if clicked on could execute malicious JavaScript in their browser. This vulnerability also requires authentication before it can be exploited, so the scope and severity is limited. Also, even if JavaScript is executed, no additional benefits are obtained." + }, + { + "lang": "es", + "value": "Uniview NVR301-04S2-P4 es vulnerable al ataque de Cross-Site Scripting (XSS) reflejado. Un atacante podr\u00eda enviar a un usuario una URL que, si se hace clic en ella, podr\u00eda ejecutar JavaScript malicioso en su navegador. Esta vulnerabilidad tambi\u00e9n requiere autenticaci\u00f3n antes de poder explotarse, por lo que el alcance y la gravedad son limitados. Adem\u00e1s, aunque se ejecute JavaScript no se obtienen beneficios adicionales." } ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 + }, { "source": "ics-cert@hq.dhs.gov", "type": "Secondary", @@ -46,10 +70,44 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:uniview:nvr301-04s2-p4_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "nvr-b3801.20.17.240507", + "matchCriteriaId": "087BD43C-9237-4C7D-923E-0CFAA2A5E976" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:uniview:nvr301-04s2-p4:-:*:*:*:*:*:*:*", + "matchCriteriaId": "5CD63D99-65D2-4E52-BFD4-10D317D941D9" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-24-156-01", - "source": "ics-cert@hq.dhs.gov" + "source": "ics-cert@hq.dhs.gov", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-43xx/CVE-2024-4328.json b/CVE-2024/CVE-2024-43xx/CVE-2024-4328.json index 4d42547dbcc..96a0acf61e5 100644 --- a/CVE-2024/CVE-2024-43xx/CVE-2024-4328.json +++ b/CVE-2024/CVE-2024-43xx/CVE-2024-4328.json @@ -2,8 +2,8 @@ "id": "CVE-2024-4328", "sourceIdentifier": "security@huntr.dev", "published": "2024-06-10T08:15:51.730", - "lastModified": "2024-06-10T12:40:41.360", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-06-12T19:33:00.527", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -15,6 +15,28 @@ } ], "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.1, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.2 + } + ], "cvssMetricV30": [ { "source": "security@huntr.dev", @@ -50,10 +72,30 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:parisneo:lollms_web_ui:9.6:*:*:*:*:*:*:*", + "matchCriteriaId": "525C477F-F133-44B9-A0BC-43C1080D35F1" + } + ] + } + ] + } + ], "references": [ { "url": "https://huntr.com/bounties/0f4faadf-ebca-4ef8-9d8a-66dbd849c0f8", - "source": "security@huntr.dev" + "source": "security@huntr.dev", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-51xx/CVE-2024-5102.json b/CVE-2024/CVE-2024-51xx/CVE-2024-5102.json index 425dcb91a6a..d5ac174ddc4 100644 --- a/CVE-2024/CVE-2024-51xx/CVE-2024-5102.json +++ b/CVE-2024/CVE-2024-51xx/CVE-2024-5102.json @@ -2,16 +2,53 @@ "id": "CVE-2024-5102", "sourceIdentifier": "security@nortonlifelock.com", "published": "2024-06-10T17:16:34.133", - "lastModified": "2024-06-10T18:06:22.600", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-06-12T18:12:01.453", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "A sym-linked file accessed via the repair function in Avast Antivirus <24.2 on Windows may allow user to elevate privilege to delete arbitrary files or run processes as NT AUTHORITY\\SYSTEM.\u00a0The vulnerability exists within the \"Repair\" (settings -> troubleshooting -> repair) feature, which attempts to delete a file in the current user's AppData directory as NT AUTHORITY\\SYSTEM. A\u00a0low-privileged user can make a pseudo-symlink and a junction folder and point to a file on the system. This can provide a low-privileged user an Elevation of Privilege to win a race-condition which will re-create the system files and make Windows callback to a specially-crafted file which could be used to launch a privileged shell instance.\n\nThis issue affects Avast Antivirus prior to 24.2." + }, + { + "lang": "es", + "value": "Un archivo con enlace simb\u00f3lico al que se accede a trav\u00e9s de la funci\u00f3n de reparaci\u00f3n en Avast Antivirus <24.2 en Windows puede permitir al usuario elevar privilegios para eliminar archivos arbitrarios o ejecutar procesos como NT AUTHORITY\\SYSTEM. La vulnerabilidad existe dentro de la funci\u00f3n \"Reparaci\u00f3n\" (configuraci\u00f3n -> soluci\u00f3n de problemas -> reparaci\u00f3n), que intenta eliminar un archivo en el directorio AppData del usuario actual como NT AUTHORITY\\SYSTEM. Un usuario con pocos privilegios puede crear un pseudoenlace simb\u00f3lico y una carpeta de uni\u00f3n y apuntar a un archivo en el sistema. Esto puede proporcionar a un usuario con pocos privilegios una elevaci\u00f3n de permisos para ganar una condici\u00f3n de ejecuci\u00f3n que recrear\u00e1 los archivos del sistema y realizar\u00e1 una devoluci\u00f3n de llamada de Windows a un archivo especialmente manipulado que podr\u00eda usarse para iniciar una instancia de shell privilegiada. Este problema afecta a Avast Antivirus antes de la versi\u00f3n 24.2." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "HIGH", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.0, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.0, + "impactScore": 5.9 + } + ] + }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-59" + } + ] + }, { "source": "security@nortonlifelock.com", "type": "Secondary", @@ -23,10 +60,43 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:avast:antivirus:*:*:*:*:*:*:*:*", + "versionEndExcluding": "24.2", + "matchCriteriaId": "E14E4791-47A8-4E8C-96E1-1E4A7F2D2F43" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA" + } + ] + } + ] + } + ], "references": [ { "url": "https://support.norton.com/sp/static/external/tools/security-advisories.html", - "source": "security@nortonlifelock.com" + "source": "security@nortonlifelock.com", + "tags": [ + "Not Applicable" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-55xx/CVE-2024-5559.json b/CVE-2024/CVE-2024-55xx/CVE-2024-5559.json new file mode 100644 index 00000000000..e90e00c68dd --- /dev/null +++ b/CVE-2024/CVE-2024-55xx/CVE-2024-5559.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2024-5559", + "sourceIdentifier": "cybersecurity@se.com", + "published": "2024-06-12T18:15:12.493", + "lastModified": "2024-06-12T18:15:12.493", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "CWE-327: Use of a Broken or Risky Cryptographic Algorithm vulnerability exists that could\ncause denial of service, device reboot, or an attacker gaining full control of the relay when a\nspecially crafted reset token is entered into the front panel of the device." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "cybersecurity@se.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H", + "attackVector": "PHYSICAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 6.1, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 0.9, + "impactScore": 5.2 + } + ] + }, + "weaknesses": [ + { + "source": "cybersecurity@se.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-327" + } + ] + } + ], + "references": [ + { + "url": "https://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2024-163-02&p_enDocType=Security+and+Safety+Notice&p_File_Name=SEVD-2024-163-02.pdf", + "source": "cybersecurity@se.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-55xx/CVE-2024-5597.json b/CVE-2024/CVE-2024-55xx/CVE-2024-5597.json index 517d4560c50..ccfd3797103 100644 --- a/CVE-2024/CVE-2024-55xx/CVE-2024-5597.json +++ b/CVE-2024/CVE-2024-55xx/CVE-2024-5597.json @@ -2,16 +2,40 @@ "id": "CVE-2024-5597", "sourceIdentifier": "ics-cert@hq.dhs.gov", "published": "2024-06-10T17:16:35.180", - "lastModified": "2024-06-10T18:06:22.600", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-06-12T18:10:47.080", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "Fuji Electric Monitouch V-SFT\u00a0is vulnerable to a type confusion, which could cause a crash or code execution." + }, + { + "lang": "es", + "value": "Fuji Electric Monitouch V-SFT es vulnerable a una confusi\u00f3n de tipos, lo que podr\u00eda provocar un bloqueo o la ejecuci\u00f3n del c\u00f3digo." } ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + }, { "source": "ics-cert@hq.dhs.gov", "type": "Secondary", @@ -46,10 +70,32 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:fujielectric:monitouch_v-sft:*:*:*:*:*:*:*:*", + "versionEndExcluding": "6.2.3.0", + "matchCriteriaId": "0EBA0347-109B-4079-998F-1B3A5C3E8D9E" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-24-151-02", - "source": "ics-cert@hq.dhs.gov" + "source": "ics-cert@hq.dhs.gov", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-57xx/CVE-2024-5798.json b/CVE-2024/CVE-2024-57xx/CVE-2024-5798.json new file mode 100644 index 00000000000..b9f8ff93f69 --- /dev/null +++ b/CVE-2024/CVE-2024-57xx/CVE-2024-5798.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2024-5798", + "sourceIdentifier": "security@hashicorp.com", + "published": "2024-06-12T19:15:51.413", + "lastModified": "2024-06-12T19:15:51.413", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Vault and Vault Enterprise did not properly validate the JSON Web Token (JWT) role-bound audience claim when using the Vault JWT auth method. This may have resulted in Vault validating a JWT the audience and role-bound claims do not match, allowing an invalid login to succeed when it should have been rejected.\n\nThis vulnerability, CVE-2024-5798, was fixed in Vault and Vault Enterprise 1.17.0, 1.16.3, and 1.15.9" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security@hashicorp.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:C/C:L/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 2.6, + "baseSeverity": "LOW" + }, + "exploitabilityScore": 1.0, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "security@hashicorp.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-285" + } + ] + } + ], + "references": [ + { + "url": "https://discuss.hashicorp.com/t/hcsec-2024-11-vault-incorrectly-validated-json-web-tokens-jwt-audience-claims/67770", + "source": "security@hashicorp.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-58xx/CVE-2024-5893.json b/CVE-2024/CVE-2024-58xx/CVE-2024-5893.json index 30b076756fa..dbb517ef401 100644 --- a/CVE-2024/CVE-2024-58xx/CVE-2024-5893.json +++ b/CVE-2024/CVE-2024-58xx/CVE-2024-5893.json @@ -2,7 +2,7 @@ "id": "CVE-2024-5893", "sourceIdentifier": "cna@vuldb.com", "published": "2024-06-12T15:15:53.393", - "lastModified": "2024-06-12T15:15:53.393", + "lastModified": "2024-06-12T19:15:51.630", "vulnStatus": "Received", "descriptions": [ { diff --git a/CVE-2024/CVE-2024-58xx/CVE-2024-5894.json b/CVE-2024/CVE-2024-58xx/CVE-2024-5894.json index 2680ab75019..f42467a8a4b 100644 --- a/CVE-2024/CVE-2024-58xx/CVE-2024-5894.json +++ b/CVE-2024/CVE-2024-58xx/CVE-2024-5894.json @@ -2,7 +2,7 @@ "id": "CVE-2024-5894", "sourceIdentifier": "cna@vuldb.com", "published": "2024-06-12T15:15:53.693", - "lastModified": "2024-06-12T15:15:53.693", + "lastModified": "2024-06-12T19:15:51.733", "vulnStatus": "Received", "descriptions": [ { diff --git a/CVE-2024/CVE-2024-58xx/CVE-2024-5895.json b/CVE-2024/CVE-2024-58xx/CVE-2024-5895.json index 9ee8ae2ac44..d9ae2d26fca 100644 --- a/CVE-2024/CVE-2024-58xx/CVE-2024-5895.json +++ b/CVE-2024/CVE-2024-58xx/CVE-2024-5895.json @@ -2,7 +2,7 @@ "id": "CVE-2024-5895", "sourceIdentifier": "cna@vuldb.com", "published": "2024-06-12T15:15:53.970", - "lastModified": "2024-06-12T15:15:53.970", + "lastModified": "2024-06-12T18:15:12.850", "vulnStatus": "Received", "descriptions": [ { diff --git a/CVE-2024/CVE-2024-58xx/CVE-2024-5896.json b/CVE-2024/CVE-2024-58xx/CVE-2024-5896.json index 297f9873434..7e992dee61f 100644 --- a/CVE-2024/CVE-2024-58xx/CVE-2024-5896.json +++ b/CVE-2024/CVE-2024-58xx/CVE-2024-5896.json @@ -2,7 +2,7 @@ "id": "CVE-2024-5896", "sourceIdentifier": "cna@vuldb.com", "published": "2024-06-12T16:15:12.813", - "lastModified": "2024-06-12T16:15:12.813", + "lastModified": "2024-06-12T19:15:51.847", "vulnStatus": "Received", "descriptions": [ { diff --git a/README.md b/README.md index ee40d58f471..9d3dcc49095 100644 --- a/README.md +++ b/README.md @@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2024-06-12T18:00:19.039330+00:00 +2024-06-12T20:00:18.835817+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2024-06-12T18:00:00.317000+00:00 +2024-06-12T19:33:00.527000+00:00 ``` ### Last Data Feed Release @@ -33,67 +33,53 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### Total Number of included CVEs ```plain -253688 +253697 ``` ### CVEs added in the last Commit -Recently added CVEs: `23` +Recently added CVEs: `9` -- [CVE-2024-1891](CVE-2024/CVE-2024-18xx/CVE-2024-1891.json) (`2024-06-12T16:15:10.887`) -- [CVE-2024-2230](CVE-2024/CVE-2024-22xx/CVE-2024-2230.json) (`2024-06-12T17:15:50.140`) -- [CVE-2024-22855](CVE-2024/CVE-2024-228xx/CVE-2024-22855.json) (`2024-06-12T17:15:49.913`) -- [CVE-2024-36761](CVE-2024/CVE-2024-367xx/CVE-2024-36761.json) (`2024-06-12T16:15:11.983`) -- [CVE-2024-37036](CVE-2024/CVE-2024-370xx/CVE-2024-37036.json) (`2024-06-12T17:15:50.637`) -- [CVE-2024-37037](CVE-2024/CVE-2024-370xx/CVE-2024-37037.json) (`2024-06-12T17:15:50.853`) -- [CVE-2024-37038](CVE-2024/CVE-2024-370xx/CVE-2024-37038.json) (`2024-06-12T17:15:51.080`) -- [CVE-2024-37039](CVE-2024/CVE-2024-370xx/CVE-2024-37039.json) (`2024-06-12T17:15:51.313`) -- [CVE-2024-37040](CVE-2024/CVE-2024-370xx/CVE-2024-37040.json) (`2024-06-12T17:15:51.540`) -- [CVE-2024-37300](CVE-2024/CVE-2024-373xx/CVE-2024-37300.json) (`2024-06-12T16:15:12.097`) -- [CVE-2024-37878](CVE-2024/CVE-2024-378xx/CVE-2024-37878.json) (`2024-06-12T17:15:51.803`) -- [CVE-2024-5557](CVE-2024/CVE-2024-55xx/CVE-2024-5557.json) (`2024-06-12T17:15:51.943`) -- [CVE-2024-5558](CVE-2024/CVE-2024-55xx/CVE-2024-5558.json) (`2024-06-12T17:15:52.160`) -- [CVE-2024-5560](CVE-2024/CVE-2024-55xx/CVE-2024-5560.json) (`2024-06-12T17:15:52.357`) -- [CVE-2024-5759](CVE-2024/CVE-2024-57xx/CVE-2024-5759.json) (`2024-06-12T16:15:12.550`) -- [CVE-2024-5896](CVE-2024/CVE-2024-58xx/CVE-2024-5896.json) (`2024-06-12T16:15:12.813`) -- [CVE-2024-5897](CVE-2024/CVE-2024-58xx/CVE-2024-5897.json) (`2024-06-12T16:15:13.100`) -- [CVE-2024-5898](CVE-2024/CVE-2024-58xx/CVE-2024-5898.json) (`2024-06-12T17:15:52.577`) -- [CVE-2024-5905](CVE-2024/CVE-2024-59xx/CVE-2024-5905.json) (`2024-06-12T17:15:52.847`) -- [CVE-2024-5906](CVE-2024/CVE-2024-59xx/CVE-2024-5906.json) (`2024-06-12T17:15:53.000`) -- [CVE-2024-5907](CVE-2024/CVE-2024-59xx/CVE-2024-5907.json) (`2024-06-12T17:15:53.127`) -- [CVE-2024-5908](CVE-2024/CVE-2024-59xx/CVE-2024-5908.json) (`2024-06-12T17:15:53.253`) -- [CVE-2024-5909](CVE-2024/CVE-2024-59xx/CVE-2024-5909.json) (`2024-06-12T17:15:53.370`) +- [CVE-2023-29267](CVE-2023/CVE-2023-292xx/CVE-2023-29267.json) (`2024-06-12T19:15:50.020`) +- [CVE-2024-0865](CVE-2024/CVE-2024-08xx/CVE-2024-0865.json) (`2024-06-12T18:15:10.620`) +- [CVE-2024-24051](CVE-2024/CVE-2024-240xx/CVE-2024-24051.json) (`2024-06-12T18:15:10.920`) +- [CVE-2024-2747](CVE-2024/CVE-2024-27xx/CVE-2024-2747.json) (`2024-06-12T18:15:11.680`) +- [CVE-2024-28762](CVE-2024/CVE-2024-287xx/CVE-2024-28762.json) (`2024-06-12T18:15:11.267`) +- [CVE-2024-31881](CVE-2024/CVE-2024-318xx/CVE-2024-31881.json) (`2024-06-12T19:15:50.710`) +- [CVE-2024-37629](CVE-2024/CVE-2024-376xx/CVE-2024-37629.json) (`2024-06-12T18:15:12.293`) +- [CVE-2024-5559](CVE-2024/CVE-2024-55xx/CVE-2024-5559.json) (`2024-06-12T18:15:12.493`) +- [CVE-2024-5798](CVE-2024/CVE-2024-57xx/CVE-2024-5798.json) (`2024-06-12T19:15:51.413`) ### CVEs modified in the last Commit -Recently modified CVEs: `48` +Recently modified CVEs: `27` -- [CVE-2024-35745](CVE-2024/CVE-2024-357xx/CVE-2024-35745.json) (`2024-06-12T17:36:32.763`) -- [CVE-2024-35746](CVE-2024/CVE-2024-357xx/CVE-2024-35746.json) (`2024-06-12T17:36:02.087`) -- [CVE-2024-35747](CVE-2024/CVE-2024-357xx/CVE-2024-35747.json) (`2024-06-12T17:32:52.343`) -- [CVE-2024-36263](CVE-2024/CVE-2024-362xx/CVE-2024-36263.json) (`2024-06-12T17:15:50.363`) -- [CVE-2024-36264](CVE-2024/CVE-2024-362xx/CVE-2024-36264.json) (`2024-06-12T17:15:50.447`) -- [CVE-2024-36265](CVE-2024/CVE-2024-362xx/CVE-2024-36265.json) (`2024-06-12T17:15:50.520`) -- [CVE-2024-36412](CVE-2024/CVE-2024-364xx/CVE-2024-36412.json) (`2024-06-12T18:00:00.317`) -- [CVE-2024-36413](CVE-2024/CVE-2024-364xx/CVE-2024-36413.json) (`2024-06-12T17:59:44.673`) -- [CVE-2024-36414](CVE-2024/CVE-2024-364xx/CVE-2024-36414.json) (`2024-06-12T17:59:14.353`) -- [CVE-2024-36415](CVE-2024/CVE-2024-364xx/CVE-2024-36415.json) (`2024-06-12T17:58:53.497`) -- [CVE-2024-36416](CVE-2024/CVE-2024-364xx/CVE-2024-36416.json) (`2024-06-12T17:58:19.570`) -- [CVE-2024-36417](CVE-2024/CVE-2024-364xx/CVE-2024-36417.json) (`2024-06-12T17:58:04.477`) -- [CVE-2024-3699](CVE-2024/CVE-2024-36xx/CVE-2024-3699.json) (`2024-06-12T17:53:09.130`) -- [CVE-2024-3700](CVE-2024/CVE-2024-37xx/CVE-2024-3700.json) (`2024-06-12T17:51:52.710`) -- [CVE-2024-37014](CVE-2024/CVE-2024-370xx/CVE-2024-37014.json) (`2024-06-12T17:57:01.660`) -- [CVE-2024-37051](CVE-2024/CVE-2024-370xx/CVE-2024-37051.json) (`2024-06-12T17:49:04.017`) -- [CVE-2024-37393](CVE-2024/CVE-2024-373xx/CVE-2024-37393.json) (`2024-06-12T17:56:23.390`) -- [CVE-2024-37569](CVE-2024/CVE-2024-375xx/CVE-2024-37569.json) (`2024-06-12T16:32:56.203`) -- [CVE-2024-37570](CVE-2024/CVE-2024-375xx/CVE-2024-37570.json) (`2024-06-12T16:32:34.513`) -- [CVE-2024-37880](CVE-2024/CVE-2024-378xx/CVE-2024-37880.json) (`2024-06-12T16:30:15.053`) -- [CVE-2024-4744](CVE-2024/CVE-2024-47xx/CVE-2024-4744.json) (`2024-06-12T16:44:12.157`) -- [CVE-2024-4745](CVE-2024/CVE-2024-47xx/CVE-2024-4745.json) (`2024-06-12T16:23:34.197`) -- [CVE-2024-4746](CVE-2024/CVE-2024-47xx/CVE-2024-4746.json) (`2024-06-12T16:17:42.223`) -- [CVE-2024-5389](CVE-2024/CVE-2024-53xx/CVE-2024-5389.json) (`2024-06-12T16:31:30.577`) -- [CVE-2024-5585](CVE-2024/CVE-2024-55xx/CVE-2024-5585.json) (`2024-06-12T17:15:04.083`) +- [CVE-2022-48578](CVE-2022/CVE-2022-485xx/CVE-2022-48578.json) (`2024-06-12T18:07:41.117`) +- [CVE-2022-48683](CVE-2022/CVE-2022-486xx/CVE-2022-48683.json) (`2024-06-12T18:05:40.943`) +- [CVE-2023-40389](CVE-2023/CVE-2023-403xx/CVE-2023-40389.json) (`2024-06-12T18:05:20.887`) +- [CVE-2024-22279](CVE-2024/CVE-2024-222xx/CVE-2024-22279.json) (`2024-06-12T18:04:20.147`) +- [CVE-2024-2230](CVE-2024/CVE-2024-22xx/CVE-2024-2230.json) (`2024-06-12T18:15:11.593`) +- [CVE-2024-23299](CVE-2024/CVE-2024-232xx/CVE-2024-23299.json) (`2024-06-12T18:03:36.960`) +- [CVE-2024-27792](CVE-2024/CVE-2024-277xx/CVE-2024-27792.json) (`2024-06-12T18:02:45.480`) +- [CVE-2024-31612](CVE-2024/CVE-2024-316xx/CVE-2024-31612.json) (`2024-06-12T18:10:30.587`) +- [CVE-2024-32167](CVE-2024/CVE-2024-321xx/CVE-2024-32167.json) (`2024-06-12T18:00:30.120`) +- [CVE-2024-35742](CVE-2024/CVE-2024-357xx/CVE-2024-35742.json) (`2024-06-12T19:32:19.827`) +- [CVE-2024-35749](CVE-2024/CVE-2024-357xx/CVE-2024-35749.json) (`2024-06-12T18:19:55.050`) +- [CVE-2024-35754](CVE-2024/CVE-2024-357xx/CVE-2024-35754.json) (`2024-06-12T18:19:06.043`) +- [CVE-2024-36407](CVE-2024/CVE-2024-364xx/CVE-2024-36407.json) (`2024-06-12T18:17:38.777`) +- [CVE-2024-36408](CVE-2024/CVE-2024-364xx/CVE-2024-36408.json) (`2024-06-12T18:13:58.627`) +- [CVE-2024-36409](CVE-2024/CVE-2024-364xx/CVE-2024-36409.json) (`2024-06-12T18:09:19.450`) +- [CVE-2024-36410](CVE-2024/CVE-2024-364xx/CVE-2024-36410.json) (`2024-06-12T18:09:04.930`) +- [CVE-2024-36411](CVE-2024/CVE-2024-364xx/CVE-2024-36411.json) (`2024-06-12T18:00:13.937`) +- [CVE-2024-3850](CVE-2024/CVE-2024-38xx/CVE-2024-3850.json) (`2024-06-12T18:12:56.413`) +- [CVE-2024-4328](CVE-2024/CVE-2024-43xx/CVE-2024-4328.json) (`2024-06-12T19:33:00.527`) +- [CVE-2024-5102](CVE-2024/CVE-2024-51xx/CVE-2024-5102.json) (`2024-06-12T18:12:01.453`) +- [CVE-2024-5597](CVE-2024/CVE-2024-55xx/CVE-2024-5597.json) (`2024-06-12T18:10:47.080`) +- [CVE-2024-5893](CVE-2024/CVE-2024-58xx/CVE-2024-5893.json) (`2024-06-12T19:15:51.630`) +- [CVE-2024-5894](CVE-2024/CVE-2024-58xx/CVE-2024-5894.json) (`2024-06-12T19:15:51.733`) +- [CVE-2024-5895](CVE-2024/CVE-2024-58xx/CVE-2024-5895.json) (`2024-06-12T18:15:12.850`) +- [CVE-2024-5896](CVE-2024/CVE-2024-58xx/CVE-2024-5896.json) (`2024-06-12T19:15:51.847`) ## Download and Usage diff --git a/_state.csv b/_state.csv index abf3d6ed522..76445c85498 100644 --- a/_state.csv +++ b/_state.csv @@ -200379,7 +200379,7 @@ CVE-2022-32893,0,0,161d6fd84dbdb4a87bb5e4ac023d648e449b6c5e4d831863311dfb7b40ce9 CVE-2022-32894,0,0,258579e09971ddea3b4815a13f4b228f09b463853438998782e99d4d4a74b2e8,2022-12-07T03:02:55.287000 CVE-2022-32895,0,0,a866a4ecd54090d59826e47060c2fe31da4fd60afa522dd3d88fdd6339a97c2f,2022-11-03T14:38:33.867000 CVE-2022-32896,0,0,17fd28355dac713cc35d13c78c58dc3e1c8b430c0015f022b283eda11acef2f1,2023-08-08T14:22:24.967000 -CVE-2022-32897,0,0,48db8f055f8661448f1c41e1ab91769e27b9ae62f41e7cf89869272a1f89eec2,2024-06-10T20:54:18.443000 +CVE-2022-32897,0,1,ad1349fe5eaed63ccba0146dc0974a0d84416447755751e4c227e8c842cc303f,2024-06-12T18:08:05.860000 CVE-2022-32898,0,0,dc4c5dc9a5f3f10252df3b48ee72cd91d41244a4d9e1d63ef2e7b84b757e902a,2023-01-09T16:41:59.350000 CVE-2022-32899,0,0,afe99f73cfd08bcbacadec410d0fe2bcc62f7d2c73f75e55f14d8746d172f152,2023-01-09T16:41:59.350000 CVE-2022-3290,0,0,2598192fd9d11269a3309ca73acf9adcc0a3e7182df9deebc35808ec4cc8523b,2022-09-28T13:54:11.263000 @@ -200419,7 +200419,7 @@ CVE-2022-3293,0,0,208cfce2b7ac354931f31ba8ea1e649c7f7a231f08e040e01e241d29aeb0fd CVE-2022-32930,0,0,6501f43eaef797598ee4ea282914eb15c1d9750dfe72ba94881d039525715665,2023-11-07T03:48:16.257000 CVE-2022-32931,0,0,b2251f5ad956fc927b536b3edee597d7793373efa2a8dd080f2c08cca5dc1379,2024-01-17T18:10:19.543000 CVE-2022-32932,0,0,1102c22e0851c3c424b28e7faaf3ff8745362f1417acc4f535a4ba257afb88f6,2023-01-09T16:44:23.987000 -CVE-2022-32933,0,0,ba6b70c60e891771d5d7c3b6512527b24ded69541010144e676f4b6f6804ccf6,2024-06-10T20:54:18.443000 +CVE-2022-32933,0,1,daa9b33dae16c49c1712cbaa019d4a1c6803394a17d9727f584a4c99692fb414,2024-06-12T18:07:08.790000 CVE-2022-32934,0,0,ae7a364db30ef26af0d462dba138265a2bbe9c4ff428ec3d06f101a71957f722,2022-11-02T17:22:05.340000 CVE-2022-32935,0,0,fcbe24cdd5e1de76f7985c93ff5640c642de4bc9cd70af024775d480ee0ec42e,2023-01-09T16:44:23.987000 CVE-2022-32936,0,0,827192a61577f10a55507a90c27c1195c504d60d2f40870f66ce48b9e1468487,2022-11-02T17:21:19.290000 @@ -211906,7 +211906,7 @@ CVE-2022-4857,0,0,0e5a9df166a6eb7599c22f7c627a657c342565b8697f901467ea9955281c8d CVE-2022-48570,0,0,a91d2cb19cd784e6a11ff6550eb2743f29999f59e85a364a5102b2983792442e,2023-08-26T02:21:54.680000 CVE-2022-48571,0,0,ae3b3af5bbcfecab9b669dd32fc253aeba667281f87e0ebbda13e170727190e2,2023-09-08T01:15:07.393000 CVE-2022-48577,0,0,77e1543c35f1ee06c24e8e2e11a8c7c83f489e8b77e54c3bff4963e766ab9a70,2024-01-17T17:59:46.343000 -CVE-2022-48578,0,0,c45dcd91ec674b8483c6ae373271fa1f7aaf30516772a0aef2bfceebdcb6e376,2024-06-10T20:54:18.443000 +CVE-2022-48578,0,1,399afee58cb1e4b9287588770d7eae8c93875e19f24711d9d13327076529da38,2024-06-12T18:07:41.117000 CVE-2022-48579,0,0,3f957510457b8c9d6b8e34337fb22ab5e2a1209fd6d659c23c825189fcc68a6f,2023-08-17T19:15:09.937000 CVE-2022-4858,0,0,7cbd4a78421d8f6168ed44172d43a8ab3e262629f6948b0a13b370cce3410e79,2023-01-06T20:37:55.853000 CVE-2022-48580,0,0,261d9c5a3bcaba84f16de37444029b1303b556b114bd7507c2e162886d8b9278,2023-08-11T17:39:26.760000 @@ -212012,7 +212012,7 @@ CVE-2022-48675,0,0,ffdc7ff07043ff8d904f74a8a1b71fad7bff2a559dea9c5bb178531131fc3 CVE-2022-4868,0,0,49bc3762269009af54870f2860cabd5c2f0372571503d002526079fe993a74bc,2023-01-06T21:20:41.477000 CVE-2022-48681,0,0,87ea3536a125ead12bc84931d58f6cdc8b01f80a07f5daca9e8b795750274574,2024-05-28T12:39:28.377000 CVE-2022-48682,0,0,a9e8566df4d423615eab0842eba8f88c67d4de5de15c1876586d34ed294d4bbf,2024-04-26T12:58:17.720000 -CVE-2022-48683,0,0,336a3d9bbc084f5aa551c45c5ba0fbe2c70ee2785073a11630635b5b6ccc9518,2024-06-10T20:54:18.443000 +CVE-2022-48683,0,1,231318f64008f2f3695ffe0b49c56b82eb9076a10e27c878281bb8e00293e71f,2024-06-12T18:05:40.943000 CVE-2022-48684,0,0,183793e4ba2f09101fce115e434fee8cb8ff9c6a4ec46d5771edf2b59c69d11d,2024-04-29T12:42:03.667000 CVE-2022-48685,0,0,ffa3e1d85b1e2d4bd3c19f046cb04890a395016777f2401ecc051ad5f33c92b4,2024-04-29T12:42:03.667000 CVE-2022-48686,0,0,ee162749a361db1a0b6a353b0eb61f9a34a852517c7d84ecd41264480ae7864b,2024-05-23T20:33:45.640000 @@ -221678,6 +221678,7 @@ CVE-2023-29259,0,0,b86e126bd91cd2fc20c170d4f39f31827fd202b01354ff37791ad5ad49481 CVE-2023-2926,0,0,10860d33149a75b831927a885d3ab775fd881867d8c964f302679da502e6d89c,2024-05-17T02:23:22.407000 CVE-2023-29260,0,0,5a5f942789887b0f00e6d89e31eb06b1ed453ac44ac5fb54eed356da6e5c5bd8,2023-07-28T15:59:39.313000 CVE-2023-29261,0,0,4d3b9821bc373c399912471c4b813ae9ccb7003d9bd9e446133385ea0c68b84f,2023-09-08T17:10:21.577000 +CVE-2023-29267,1,1,b34415562c5d4a4d3c2254caa52c76bdde1ef499dd6288e35af142d321098d81,2024-06-12T19:15:50.020000 CVE-2023-29268,0,0,5fe2469b2003acd64e34ff0465d8f32ca97075c18139a460519bfe903d98eaba,2023-05-09T01:31:28.760000 CVE-2023-2927,0,0,1ef4bcc434ab7cd7f2eb4bc31df3dba4427c9caeaa1a3b69dd65ea29252b330a,2024-05-17T02:23:22.513000 CVE-2023-29273,0,0,62ec26a776677e38edd34e5cfa86acb0290941f7f08123c59bbfd0438413920e,2023-05-17T12:50:17.923000 @@ -229893,7 +229894,7 @@ CVE-2023-40384,0,0,b43d991ba538e8f493daab5fb3410f6f256194586a5e5378eafe23521539b CVE-2023-40385,0,0,d87186e65fbe11c963d9f2ac49a37bea6de8f4a87feb525e072522d577fee61f,2024-01-18T14:32:30.730000 CVE-2023-40386,0,0,98b5b9164e51a67fec2b119151c92fd2d9bb1d8d51de82443b681e79ce2c9a34,2023-10-12T01:59:56.563000 CVE-2023-40388,0,0,0669c38434b1494ed261fd2860ebba321deabd42233fd11611759d0565888e20,2023-10-12T01:59:05.793000 -CVE-2023-40389,0,0,0e5d597fd284ef871235fda779b9f0d46c10ac1ec6ce6f60f41ff8dad9aef6c3,2024-06-10T20:54:18.443000 +CVE-2023-40389,0,1,b193787b70f32e4c09ae93f27d418d82b25a00d1d832a208e6e4bfa799ec5d30,2024-06-12T18:05:20.887000 CVE-2023-4039,0,0,0accd3adc8756cc7a927b7c908e91237d32e08c68f471a1067012290c829eea2,2024-02-19T23:15:07.680000 CVE-2023-40390,0,0,dcc08f1579a2804bdfa75d3a1e4b64bbe4a6a3affb5757b1219cc9eb8124a134,2024-04-08T22:42:58.650000 CVE-2023-40391,0,0,674710606efc5e20f3b4d034fd6151d2f994f0410f8a773be4faafb0e10f357d,2023-11-07T04:20:12.943000 @@ -241062,6 +241063,7 @@ CVE-2024-0860,0,0,084e48b2c8a82b5fc9ff07cd8cf26129d61baf73b83c11537e5ca2016cdef4 CVE-2024-0861,0,0,896e71725cbfb614341352655e0b66e7def84c2617b58556401d4278cc8b74b9,2024-03-04T20:26:41.663000 CVE-2024-0862,0,0,8d5bc8312d1d93cf3fbc9bc4464ee1ea50ba5434e84839c1491be95817a91a77,2024-05-14T19:17:55.627000 CVE-2024-0864,0,0,d89dcae43b5200797b81bcd0ad7b3b6e3cba6f54866805aee9a386996fe0fcfc,2024-02-29T13:49:29.390000 +CVE-2024-0865,1,1,370365c7ed475e058b0d9ad0f5915d4aa0796c5015b2d90186d4112b32287694,2024-06-12T18:15:10.620000 CVE-2024-0866,0,0,2315ea7233a9f152b45c2f2db1db04866f3fbf8a4d5b6e4bad65f402d240f082,2024-03-26T12:55:05.010000 CVE-2024-0867,0,0,bff6dce5de81ae7891647493682c1a4a2fb7bb408cce62ce65d5462da59ac834,2024-05-24T13:03:11.993000 CVE-2024-0868,0,0,50dc470faec27f67202fe3c6b32f6e0e6b35686ae887e56f6aa6e0525b6a38ff,2024-04-17T12:48:07.510000 @@ -241392,7 +241394,7 @@ CVE-2024-1224,0,0,6671b720f58aa0150d14676a615208ff783ead72a8a766227d501b4f2f840d CVE-2024-1225,0,0,0b68eae0ee984524ebb2df359b44e58b9ba84a615ada907a65e017a24d65ff7a,2024-05-17T02:35:19.560000 CVE-2024-1226,0,0,14a580d4b3eab4674d6ae40acd0cb53f118cafa2e8004e611e071913cd041fe6,2024-03-12T16:02:33.900000 CVE-2024-1227,0,0,94dce1bd607b6903e23d54a7d6b05a85e9dc37b645ba64935d33bd38f11890aa,2024-03-12T16:02:33.900000 -CVE-2024-1228,0,1,32605b1907163ad08b6f7354355ad82a69536fce794750addc55c0f4867cda18,2024-06-12T17:54:10.157000 +CVE-2024-1228,0,0,32605b1907163ad08b6f7354355ad82a69536fce794750addc55c0f4867cda18,2024-06-12T17:54:10.157000 CVE-2024-1229,0,0,2de2ced35127929201da3cc9dd41aa7d4097d2d61f9931ef1592526b3e0b7dfa,2024-05-14T16:13:02.773000 CVE-2024-1230,0,0,8bd1dd7f8fd55f9189a6ea53392185485a1a6386a5bf97397fc7d3598cb5fb14,2024-05-14T16:13:02.773000 CVE-2024-1231,0,0,3fff2a2694f3a2890eda32488c438fe0ab80785883b0aefb67199c2eabc0d967,2024-03-25T13:47:14.087000 @@ -241972,7 +241974,7 @@ CVE-2024-1887,0,0,c4ea1f30b4ee64401ec471c46007c0919b3d087c3cc77ec486ec75f252891a CVE-2024-1888,0,0,5c48c7ef8072bebc640799142c34dfeb37124cccb7d60f3f8c8d95bce0e2f85b,2024-02-29T13:49:29.390000 CVE-2024-1889,0,0,34f0990ceccd75a569863a77fd268eb539c7d5ec488f2446cd3288ee4234f41c,2024-05-17T02:35:40.333000 CVE-2024-1890,0,0,7900533f7cd4681e9cd51c85aaf38899f8710ddf980029322947b07f23ce149a,2024-05-17T02:35:40.430000 -CVE-2024-1891,1,1,9802320e49bf94f684ebc24df2bdd7287205d192242bfac06185b4199b96884b,2024-06-12T16:15:10.887000 +CVE-2024-1891,0,0,9802320e49bf94f684ebc24df2bdd7287205d192242bfac06185b4199b96884b,2024-06-12T16:15:10.887000 CVE-2024-1892,0,0,496f86c779f360256e1e190fecff75b396ebefe831fecdca264ec166e984ab7e,2024-04-16T12:15:10.050000 CVE-2024-1893,0,0,678e936c89e4c4b6fa8874f1c864b24cc93a2715a395ba59ed61dfe9d57d4f11,2024-04-10T13:23:38.787000 CVE-2024-1894,0,0,9ac2447d78b1be48d8de07fcf9beac6b1c3a9f0af4ea5741b3b2d6e9b7f97eab,2024-03-13T18:15:58.530000 @@ -243433,7 +243435,7 @@ CVE-2024-22270,0,0,6ddec6950380375d517eada92585a48899328ef96a9cd5eb66f2637f566ac CVE-2024-22273,0,0,16868e6e004c6ea2c682b722d1af123cd0ac6fcfe5ea535614be88cbaef5ca1b,2024-05-22T12:46:53.887000 CVE-2024-22274,0,0,da89bea76d6b538861a6666c1640acb76ac100e4dc1f77b4f4f466724f6cc406,2024-05-22T12:46:53.887000 CVE-2024-22275,0,0,d091ffc8d821e68d75dc2e136f38c753791a1420e1604ca18001c3ee3e374585,2024-05-22T12:46:53.887000 -CVE-2024-22279,0,0,bac65a965c7743587c4ba47458bb580df11725b735e8b42e4c63142bb5a95e31,2024-06-10T20:54:18.443000 +CVE-2024-22279,0,1,ff0edd9c060816dc238726f665fb413b790bba614b84113a6241bd5b06ac695f,2024-06-12T18:04:20.147000 CVE-2024-2228,0,0,9da409d4c88fb5c41c04e34c5096b8810f55668a8720e19e0dcad976dea69ce5,2024-03-22T19:02:10.300000 CVE-2024-22282,0,0,53d62e993d25bddde67f64a9b7b05dfd45a21e7eb7c9bf0be8fb90ec2911d888,2024-02-06T16:55:19.983000 CVE-2024-22283,0,0,f9f0bb31955cdc5efe0fe68bd93a1968461b937d4826bd6ada9de29ff0f15691,2024-02-01T04:13:41.033000 @@ -243454,7 +243456,7 @@ CVE-2024-22296,0,0,26497821bdd6523c6ffa82c8932df21c7375a0b75c6b4829fe7611d85fa93 CVE-2024-22297,0,0,577fc11ad5b0d749376591ad16a375dfa540e32ffa2e1012a2392bbaefc0287d,2024-02-06T15:38:07.050000 CVE-2024-22298,0,0,eb4e5161d1233abda8028026a5fd3bc810ac81a8912963670187ebce3b0787a2,2024-06-10T12:40:41.360000 CVE-2024-22299,0,0,80a4882f4c9ab5eec2fd5d8b16ede08da3f188bafea457394bae184bfdc470b7,2024-03-27T12:29:30.307000 -CVE-2024-2230,1,1,e82ed198b5ea9197ae8c82fa57588e9a9ab058667665b30035da7ff4601497f5,2024-06-12T17:15:50.140000 +CVE-2024-2230,0,1,e699fdb43b6adb8abf534c5ade2071cb0bd60e369ba4e4e395321daf7afb33f9,2024-06-12T18:15:11.593000 CVE-2024-22300,0,0,6a2ac22ff64061be14a64819ed6b0717dea7f94ee6239bf636e871d8862b7a4e,2024-03-27T12:29:30.307000 CVE-2024-22301,0,0,5c83b0c07edb476e78cc7de384bddf72fcd86e319684689177ab1f8ee28c611d,2024-01-30T17:44:59.847000 CVE-2024-22302,0,0,18ed1122bd0976f0a4301ea9eae7070b9d3278277ba02d3b706dc015d0fd056d,2024-02-06T15:03:44.550000 @@ -243736,7 +243738,7 @@ CVE-2024-22851,0,0,e3b3a4173f66bde18bcde8b4d6e07ed058612b81ace293aa36efd8837ff83 CVE-2024-22852,0,0,fba9226bfac500a19dd8b91a9788eed1682675a652e0b6dd1f0ee08e7df876f5,2024-02-13T18:16:51.790000 CVE-2024-22853,0,0,ec6a06bd931391a16658f5323e2bffe5ddc884df4aacc34598a685bd3979b258,2024-02-12T17:50:31.950000 CVE-2024-22854,0,0,8b8b90cd6c1c9786e2fb5396ca19284ddab9c4ff42eae4bf034495afa4860075,2024-02-16T13:37:51.433000 -CVE-2024-22855,1,1,cfcf005f31b5547d2fa8c00cc5f7f6b8e097a82610a7ccea6c31a0a094af8224,2024-06-12T17:15:49.913000 +CVE-2024-22855,0,0,cfcf005f31b5547d2fa8c00cc5f7f6b8e097a82610a7ccea6c31a0a094af8224,2024-06-12T17:15:49.913000 CVE-2024-22856,0,0,1db436dd1cb2a23310320ff23e9771e20af5e9762fcab5bed6358a83124247e2,2024-04-22T13:28:34.007000 CVE-2024-22857,0,0,dc8c498662e053f2e9a39f301d349f3ad8950912cf2843180c278fecc58efab5,2024-04-19T01:15:06.297000 CVE-2024-22859,0,0,b948ee8fe798cbf01c18cac852f304ecb9e81e6d367124ad19db38465396c137,2024-05-17T02:36:25.953000 @@ -243993,7 +243995,7 @@ CVE-2024-23295,0,0,743f5eabb2b6d4f98b7103afe617defce53a2964c31cc5fb435d1e716a86d CVE-2024-23296,0,0,f2d241411bbf170ca53882111e52dbdb186cee03e035f81f8ca923817c8ecb80,2024-06-10T18:15:26.090000 CVE-2024-23297,0,0,11090791f72ea9d35b8fb354b91b4b823c54cb3e7511d3c9883ee2b46d74ae89,2024-03-13T22:15:11.520000 CVE-2024-23298,0,0,0db74819ed2b222cfa97f4a2ff3293f59c3a4c8235378608525d7e46421fc5d7,2024-03-17T22:38:29.433000 -CVE-2024-23299,0,0,1c88330fb8522b94766109d1dd2397174dba448896d7bc71434e322a1473fa49,2024-06-10T20:54:18.443000 +CVE-2024-23299,0,1,9cbedc1b6c106d21c23b83013b85bcc3f46b28eda4f03d0872450db614ec5b11,2024-06-12T18:03:36.960000 CVE-2024-2330,0,0,89039a53a73072e3c8dbbafcac630d622765f67693433d6946597b6c23ca98bb,2024-05-17T02:38:10.540000 CVE-2024-23300,0,0,9e732c262847100dbcf579b4c37b4c875c53e2f23045a19a85b558ff38956aa4,2024-03-13T22:15:11.643000 CVE-2024-23301,0,0,95f1c4c0d3c3f56beb5ca2f43c481bd416943d89ac106cdf8ea6bddea7fc220a,2024-02-21T03:15:08.950000 @@ -244490,12 +244492,13 @@ CVE-2024-24042,0,0,4a4e7ea160d5d0244b906cb4642841160ba9374fd30aaa87521360ed2e8ec CVE-2024-24043,0,0,8fe33813863354c4eead332dc6243b19fd5b77f5e3a94ddd813814cf68659374,2024-03-19T13:26:46 CVE-2024-2405,0,0,6fadbb3a08e48e4daaf715605940677b2a23272062986f3b1cf2a8081644718f,2024-05-02T13:27:25.103000 CVE-2024-24050,0,0,ccdf8a4463bf6582ad99a29c76e6e3640436eaa4075881cd577d9e7450feacb8,2024-03-21T12:58:51.093000 +CVE-2024-24051,1,1,346a02fadb0538e24f23dd10c7092da8c40a788203ea517636d36f00d4f890d5,2024-06-12T18:15:10.920000 CVE-2024-24059,0,0,3da8cffbcfd869f14b04835347f156c5cf1a6025fa9627a3ec1ec79a41a9d0be,2024-02-03T00:40:43.793000 CVE-2024-2406,0,0,bce1950aa0ba3247257e0f9798cc049e12ff07a8e21e9064eb763cce3e8229ea,2024-05-17T02:38:12.963000 CVE-2024-24060,0,0,3a6250076b98d97024da5e52a26f1f0c29807ef38de327e60f431783e4f1deaa,2024-02-03T00:40:48.600000 CVE-2024-24061,0,0,3ae0e78c2ecb0941fa62f48d1dc7792d4436b76ec841f1dbf3bf2317943894c3,2024-02-03T00:40:50.623000 CVE-2024-24062,0,0,ce51fb5fa7f08b3262a47fca149a06dc25ea5ca7c584b3ae7210563fa9fd54c1,2024-02-03T00:40:52.877000 -CVE-2024-2408,0,1,79608ac2b73485aa622d02d7fd2cdce295f0e378608808ccee920b0119f98fdd,2024-06-12T17:07:00.770000 +CVE-2024-2408,0,0,79608ac2b73485aa622d02d7fd2cdce295f0e378608808ccee920b0119f98fdd,2024-06-12T17:07:00.770000 CVE-2024-2409,0,0,ba586e1c6181b06c3ede339eac17164a8a25d5149e65ad7809000b9e6c808051,2024-03-29T12:45:02.937000 CVE-2024-24091,0,0,6258a73a312c8c072d234b916137958d60ec77d8bc24aab7428a6677fc85f73a,2024-02-08T13:44:21.670000 CVE-2024-24092,0,0,d4ab4cc918de723ea385c13013f3b5223c8222e6f58b4c0135bd83322e27d646,2024-03-13T12:33:51.697000 @@ -246393,7 +246396,7 @@ CVE-2024-26975,0,0,8f19cd721adbc3dd7c661f9a8d550ab97e4f94e7a1b3b7e5ff34954db774d CVE-2024-26976,0,0,7f3160fd993055d2d086205203ac721ed6cf29a59d28518fd22c6db2c5d69b1f,2024-05-01T13:02:20.750000 CVE-2024-26977,0,0,7f4303ba7265fe68f47a9d9801d011f3d78c2b9c80b2b80c869116171921f0d6,2024-05-01T13:02:20.750000 CVE-2024-26978,0,0,8d561a460191ee18f3c0a08c6e5356905628e7e52b101255033d5d975d400ae1,2024-05-23T19:14:12.637000 -CVE-2024-26979,0,1,54694270d008c20297a5341208d33ae44a9e8eec55dc5d4e396d03aaba5d47ac,2024-06-12T16:15:11.147000 +CVE-2024-26979,0,0,54694270d008c20297a5341208d33ae44a9e8eec55dc5d4e396d03aaba5d47ac,2024-06-12T16:15:11.147000 CVE-2024-2698,0,0,a1683e28c7d60c58b4273f4c288780d16aef9c7ec236a8f1e9da79ec4d3513a9,2024-06-12T08:15:50.250000 CVE-2024-26980,0,0,ec5b812a8dbedf3c6e27cceb9a929403fd6e62291ad747f9f2a67748a6189d95,2024-05-17T11:15:08.357000 CVE-2024-26981,0,0,3038c3174fa5069e42a0db4274374d74c2b5066ad475e921f47c4589915379cd,2024-05-03T06:15:10.663000 @@ -246793,6 +246796,7 @@ CVE-2024-27456,0,0,3292722b93148b4ab52923fa8e4498babe5b306f79794afb1b6b9f9d803c4 CVE-2024-2746,0,0,1b5368899c557a576ffe86c7e7b79d4b6baeb106e8e490e5cd11b765b982c384,2024-05-08T13:15:00.690000 CVE-2024-27460,0,0,df535e4d58c862090dbd04ef172ea8290b582d97a5936fdd9d6a3f9c58e5f496,2024-05-14T16:13:02.773000 CVE-2024-27462,0,0,ffc1613a8162349f9e85ee9ce86cbdc5073a2092a76bc9fd14c2d891290e403c,2024-04-14T23:15:45.830000 +CVE-2024-2747,1,1,d231d87af296adb45ba5b75984d43826bc5440ff69aaeceb9a13932d550f539a,2024-06-12T18:15:11.680000 CVE-2024-27474,0,0,eedd7f52a8e754286d0994212e940bbab5a78ce0f631ba173f8be2320f55c67f,2024-04-10T19:49:51.183000 CVE-2024-27476,0,0,8cccfbd88a289b73ae2a82f1969e7e11b3256be620bf6a323e970ad5fee54963,2024-04-10T19:49:51.183000 CVE-2024-27477,0,0,475b0780b17016d259d91214e57785f69e50a4f85e3c7b3b34cb0c00dc852aa4,2024-04-10T19:49:51.183000 @@ -246920,7 +246924,7 @@ CVE-2024-27789,0,0,e8af3b8395ebfe2a50ae6a05a1719125fcf49e2fa7ab9962ec195038f09bf CVE-2024-2779,0,0,7d93945d439dc1c56122930b3da6852f346b5a9c5c7e988befb1c7629d43acd9,2024-05-17T02:38:30.057000 CVE-2024-27790,0,0,bcfd5001fb1cf915dabaeb0b530ecc91785155cc1894eb908f37345e8fae816d,2024-05-14T16:13:02.773000 CVE-2024-27791,0,0,44e295d56ae82c935e7837aa163b1c182c6b8efd5ceb84b892de3324ac96937b,2024-04-24T17:16:50.397000 -CVE-2024-27792,0,0,f4c93ffbcf0fa2b69a394e4f8043e5a055ca57351625146acb468cc524a0cb16,2024-06-10T20:54:18.443000 +CVE-2024-27792,0,1,b95a839f6d92f70e579e6fb1f69e78add1d64a83552f4a2c177f2ea0f9d25269,2024-06-12T18:02:45.480000 CVE-2024-27793,0,0,353572505ffd41c49c8a655c8653c3aeaf93e2259f3ba926c49eca056984adca,2024-06-10T18:15:28.523000 CVE-2024-27794,0,0,f83311c8ff012592a70730809fe5cac1d0e670b37674538bd8092c8ae8d69027,2024-04-16T13:24:07.103000 CVE-2024-27796,0,0,0f6294260561edcbf030914cbfc2e2f9112190409fca9765281ce7a127290cce,2024-06-11T08:15:48.723000 @@ -247501,6 +247505,7 @@ CVE-2024-28759,0,0,9f826e767eccb501c83d9e0b4aea57892e4b6d1fc39ae786236211b2b03c1 CVE-2024-2876,0,0,ca929cd772004ee45ba4bf2b2f3e651133fec067e1337478e97408d02da509b9,2024-05-02T18:00:37.360000 CVE-2024-28760,0,0,f13dfa1f12a43504927ac2719a8e853cfb1151dffa495fbc407992956485e6d1,2024-05-14T16:13:02.773000 CVE-2024-28761,0,0,7d0ebbc762dcfe4cf5ec12d421c004fe6c0994634dae34cb15afa5ced3227b1e,2024-05-14T16:13:02.773000 +CVE-2024-28762,1,1,58b7c410be5d6b16aaff58116b8227723446494cec6adb1809ab2e56d458285d,2024-06-12T18:15:11.267000 CVE-2024-28764,0,0,1ff18eb0d7a0a34d2666a7ea9874b7a9f6fab70460b6927de1a30c6bfac1d347,2024-05-01T19:50:25.633000 CVE-2024-2877,0,0,4ebb9fffce04288aa8e0eb4ee39122211107975df336085ff4049d2ca6b5d666,2024-04-30T17:52:35.057000 CVE-2024-28775,0,0,d8ae5eae8edfcef0453722d74b23437224b101c661ce9b595bcef1d2255b4529,2024-05-01T19:50:25.633000 @@ -247518,7 +247523,7 @@ CVE-2024-28824,0,0,5a9476ae0fdb0520e3a986c832f5f9e27a50da5cb3aa11e06910544296f0e CVE-2024-28825,0,0,9e6f2228e06896e59bb560ffc81c60a9a09c25eeaded2122eaaaf9d670949d13,2024-04-24T13:39:42.883000 CVE-2024-28826,0,0,af714d67b245e2002324726263b60e676423e9fa16954adb4190fa57b660a93f,2024-05-29T13:02:09.280000 CVE-2024-2883,0,0,e66be81816608580e2e81ffcb02cca4ae9a2aa5cbea60907cc2e1d80cffbaf4a,2024-03-29T04:15:08.743000 -CVE-2024-28833,0,1,c28d0621123671b94853f5763fc92ce8098ea4f6621d0443f950677dd9d3b57a,2024-06-12T17:53:57.103000 +CVE-2024-28833,0,0,c28d0621123671b94853f5763fc92ce8098ea4f6621d0443f950677dd9d3b57a,2024-06-12T17:53:57.103000 CVE-2024-28834,0,0,af4d9c1dfe16b4591e02664fd7ad00b6706b6af449eca3208820bfc8e9b376f7,2024-06-10T17:16:24.560000 CVE-2024-28835,0,0,7ffb3867ffb469cae5c61eed57191c292b3344e17f215833454f077170fed24a,2024-05-16T23:15:47.883000 CVE-2024-28836,0,0,ef9665bb9a0895616f82c07b3b8f93ecbb9dcd318a88906096e3fd29af01d6df,2024-04-03T12:38:04.840000 @@ -249340,8 +249345,8 @@ CVE-2024-31601,0,0,77cac7e969e7044d11a270a83972e4e2e2dc079687b9a26234b27560790da CVE-2024-31609,0,0,a5493714821f0e0bdf3fb4b62cbe59dc9498aefc0ac9439c259bc304a5043f24,2024-04-26T12:58:17.720000 CVE-2024-3161,0,0,fb0275ae00c4597a14b8da67383742a33ef20f00a5c359deab992b83c03fa869,2024-05-02T18:00:37.360000 CVE-2024-31610,0,0,25f0fe7dce01b290d07505f210ca0196ceaddb3229e43445c402c10f0654acf3,2024-04-26T12:58:17.720000 -CVE-2024-31611,0,1,5f9e3922a5a892423d1bcf4416bca54c649670eb4a86ab19022e098b2dd1541f,2024-06-12T17:44:20.730000 -CVE-2024-31612,0,0,49b396f89a743014e777c696cbe0e8a08f9d50db5428a29b14912920ed331742,2024-06-10T20:54:18.443000 +CVE-2024-31611,0,0,5f9e3922a5a892423d1bcf4416bca54c649670eb4a86ab19022e098b2dd1541f,2024-06-12T17:44:20.730000 +CVE-2024-31612,0,1,113b62286ae368abe151f1276422ede5a17bbddf3e1084cf1b1f49c898ddb8c7,2024-06-12T18:10:30.587000 CVE-2024-31613,0,0,b22e0ead922262609ccd5adc643348b5359bd4a3d7fad40a103e18586e9e197b,2024-06-10T18:06:22.600000 CVE-2024-31615,0,0,fec656de044fff01992f2ac4c2d789e80286f56b4ff6f28fca891fbe026d80d2,2024-04-26T12:58:17.720000 CVE-2024-31616,0,0,0d01710e8c157f0d32189692d849b27951e2db80c68fce9b88dd89c45379117e,2024-04-24T13:39:42.883000 @@ -249455,6 +249460,7 @@ CVE-2024-31874,0,0,1770e58d0ae5591eb931a8cdfdb054fb4d854f81849d14af250c71db6caf5 CVE-2024-31878,0,0,7b937c0e504c94aa96f40006d95fdcb5515eaac5bd841ea5891290c2bc5b3971,2024-06-11T18:23:27.153000 CVE-2024-31879,0,0,9e400de08d7e3b57ea9b7110f44ae1b22a7e387f9dc2f33f777f519f045dfc82,2024-05-20T13:00:34.807000 CVE-2024-3188,0,0,5d70d4884e37e1862c5503e8662fdd8be316d1df7ecad77f44114699c1426b8a,2024-04-26T12:58:17.720000 +CVE-2024-31881,1,1,e82b7acd09518d9c4f6495f1056ca401dd472b764741964d8e891eecafa9c574,2024-06-12T19:15:50.710000 CVE-2024-31887,0,0,e951c215b0e12b882bcc7244c98d7631ee4f4b7a3271b5f24e369f1a635cd3e5,2024-04-17T12:48:07.510000 CVE-2024-31889,0,0,ed866bc797e966623ecbd3af70c76d899ae08cc5d44be77f88a15f5367e891f4,2024-05-31T19:14:47.793000 CVE-2024-3189,0,0,1214acc8d4ffdbc5da1a7913ab352a27b53d04d94b5a178d0c09d285be9bf460,2024-05-15T16:40:19.330000 @@ -249659,7 +249665,7 @@ CVE-2024-32161,0,0,60a9978d35673eb48d5015a016115c1964e22e158d92ca4de7447769c2bc7 CVE-2024-32162,0,0,118ad76854c7f44c6eff111c13a9015a5b3feb6620bf58d40eff2d6cbdaa766c,2024-04-17T20:08:21.887000 CVE-2024-32163,0,0,2a0e3e31a356cd8bdaedc62aa40103c9838a070e53ea091fe0aa567b9d0934a1,2024-04-17T20:08:21.887000 CVE-2024-32166,0,0,8c8680ec923ae3bed8a58326054c7f7280f0a44a3f507a43055bc183eecf3164,2024-04-19T16:19:49.043000 -CVE-2024-32167,0,0,05e1cbd308ff706078b16b665b5965a1c0bcfad89648107c18560821495d1800,2024-06-10T20:54:18.443000 +CVE-2024-32167,0,1,e1b908973391122461e7829a2d79d03ca6868b1699a22ea149cc482b5749c2dc,2024-06-12T18:00:30.120000 CVE-2024-3217,0,0,3ac42247ba2d685c0a6f4de738ef771d2778cce367312f144d0326551965dbb5,2024-04-05T12:40:52.763000 CVE-2024-3218,0,0,15d13fdbdfb7c920bd4937754941efbbf6a0874233b44e802f3c54e2e1e5f44b,2024-05-17T02:39:47.357000 CVE-2024-32205,0,0,3b6122f4454c6189a285ee435770c5e0b5d0cb175cbe04dd262a3757da1f87c2,2024-04-22T20:15:07.210000 @@ -251494,14 +251500,14 @@ CVE-2024-35646,0,0,0e09ad267a508b8a536900d74395f7d6fd0b87a4648f067a40bf0167f0c61 CVE-2024-35647,0,0,dd07a9e9a3804b0b3fdbbe9e6cdd58e439fe4bcd9c7b53cb07e789eae1ef1bd7,2024-06-03T14:46:24.250000 CVE-2024-35649,0,0,d2b425bcfde98a2966defe9ae6862e0c80d81675a5706c35a1abbc9f35d7c710,2024-06-06T13:26:46.537000 CVE-2024-3565,0,0,a4b6a30a1c15667775d02efa34a8d23be7f17c664853400b6c8d4dfd523ae02d,2024-06-03T14:46:24.250000 -CVE-2024-35650,0,1,88f71076c8da2d896db64a869bec9bd7a99a8aa038f8111659743d5eada46f6e,2024-06-12T17:51:20.710000 +CVE-2024-35650,0,0,88f71076c8da2d896db64a869bec9bd7a99a8aa038f8111659743d5eada46f6e,2024-06-12T17:51:20.710000 CVE-2024-35651,0,0,c7cb64a650c120e950c2ebdd125d00702e2f5a45bd11dc5dcd4c353649900947,2024-06-06T13:31:03.307000 CVE-2024-35652,0,0,9510ec3ad0224331e475c18e35d7d417da7a9c92aa8f4cfe1b6338dfa113c106,2024-06-06T13:36:05.853000 CVE-2024-35653,0,0,4b4970e5c1ab1eb20df6ebb598ecfea858a4722a1a783fe88469bdbb9ecad5dd,2024-06-06T13:37:21.420000 CVE-2024-35654,0,0,403af0bf2fa4d57830f12a96c5ed9dd1e0545db0132e87e50cac0f148d9af859,2024-06-10T20:24:17.467000 CVE-2024-35655,0,0,1a8db850dc208775392ef9c5c3a34b4b09a3268c6e51da6a685217112000f91b,2024-06-12T10:15:30.750000 CVE-2024-35657,0,0,ec3d4a59ee1d38b4a1682b94b858ea40acc94a4e2de21f7ce8d2cd2eed427722,2024-06-10T02:52:08.267000 -CVE-2024-35658,0,1,3cb3bd435b1fac14fe5eaac53d9db5d29070b97d8c6a9cdf7abd4efbfc625cc2,2024-06-12T17:50:55.227000 +CVE-2024-35658,0,0,3cb3bd435b1fac14fe5eaac53d9db5d29070b97d8c6a9cdf7abd4efbfc625cc2,2024-06-12T17:50:55.227000 CVE-2024-35659,0,0,f212e44ec6c22c0baf538b4517ba7b487235e2fde0f9df0b7a9af518af224687,2024-06-10T02:52:08.267000 CVE-2024-3566,0,0,e417ef1ceca67d3a9a8ba800520d4a9974bcf4eba2e3e6325dafdfbfe6af8d6b,2024-04-10T19:49:51.183000 CVE-2024-35660,0,0,2144517a38c7b64dced7262d27a94b4362008ce987204b48e77a7c0e29f52214,2024-06-10T02:52:08.267000 @@ -251522,11 +251528,11 @@ CVE-2024-35673,0,0,b2fbe24f0db2be82a21d56e6af9fa939a75372c8c56128cfd1a449a3505ad CVE-2024-35674,0,0,61cb77c7b559c0aea326b97e0a24dca407c217fd649698447cd12a1a2e660866,2024-06-06T14:17:35.017000 CVE-2024-35675,0,0,d7aba91d6e03b6f23f94998b1bbf8b95344e8e8bd8d66158e67ae8b5f0f9b824,2024-06-10T02:52:08.267000 CVE-2024-35676,0,0,166eba80edb14795a5db8d246b6f75a63e949d50aa6c3420d82832ddae687bce,2024-06-10T02:52:08.267000 -CVE-2024-35677,0,1,a3d618a3c7c44c9a2d5f73466c7858c8d9d95222181b688c0b22353d99594014,2024-06-12T17:50:33.367000 +CVE-2024-35677,0,0,a3d618a3c7c44c9a2d5f73466c7858c8d9d95222181b688c0b22353d99594014,2024-06-12T17:50:33.367000 CVE-2024-35678,0,0,6bc2c5c60f113bbad24188332113cc6602fdbe13d58e8cdb7dadac89ed3cab7f,2024-06-10T02:52:08.267000 CVE-2024-35679,0,0,dc8fe3cbba8d2dc64f92808386423d05749489681fc72acff538a223b0a0ce77,2024-06-10T02:52:08.267000 CVE-2024-3568,0,0,573133d2a7191a46b0975280ef7162f7787321191e0ad33f2c4c70c7e8d9c3f5,2024-04-10T19:49:51.183000 -CVE-2024-35680,0,1,abcc5f0eeb10e717c7a703c1bfe0ea4283e28aa8c32eb264f3894dee0391af2a,2024-06-12T17:49:56.670000 +CVE-2024-35680,0,0,abcc5f0eeb10e717c7a703c1bfe0ea4283e28aa8c32eb264f3894dee0391af2a,2024-06-12T17:49:56.670000 CVE-2024-35681,0,0,525bdaafae75f5bf5cf51a1834d939c20d16bf8cdef623f1824a094f964d2f1e,2024-06-10T02:52:08.267000 CVE-2024-35682,0,0,d5d2707642803696da8586799f5705a4682d89a42a48773cd9ba1156a6a65a23,2024-06-10T02:52:08.267000 CVE-2024-35683,0,0,543ee45c55cfe4df71023cbc2ca445f0891a26383910f017400d4b92d415a6a8,2024-06-11T14:15:12.453000 @@ -251559,7 +251565,7 @@ CVE-2024-35709,0,0,6e0a619a531b0e86e830f3c2f5f94e3f83db0d1d14cf3f0af71428a6ad96e CVE-2024-3571,0,0,69cf6aaba9ed550ce2e1f492d0ecd149e8d5cd4d3ef343f36ac06a714698dced,2024-04-16T13:24:07.103000 CVE-2024-35710,0,0,2821683de41fa3eeb51b9282bc176211774b4c3042581edf1e5d173ac55f1b1a,2024-06-10T02:52:08.267000 CVE-2024-35711,0,0,abde08774d127ad0db34965655a4de5b5dad73c102e868a4d0f8c3582ef01c98,2024-06-10T02:52:08.267000 -CVE-2024-35712,0,1,8f4bb9399a50a51194e79d6df3895aca303c8f418f373df47beb5d65f20c7133,2024-06-12T17:49:29.547000 +CVE-2024-35712,0,0,8f4bb9399a50a51194e79d6df3895aca303c8f418f373df47beb5d65f20c7133,2024-06-12T17:49:29.547000 CVE-2024-35713,0,0,67f12030ef9ae03f21eeefc61a2db714e1cd54b5976a2138aaa81f95299ca1f4,2024-06-10T02:52:08.267000 CVE-2024-35714,0,0,fda77c484f1be31559583b8ce420a09ac05ec40a4cbe01b6366029636befebbf,2024-06-10T02:52:08.267000 CVE-2024-35715,0,0,a8feb3a0e36b1ed746ea7b8db0d283a4e527ecef045188b4e311eb2de1d8e60b,2024-06-10T02:52:08.267000 @@ -251569,43 +251575,43 @@ CVE-2024-35718,0,0,88ba8367c19f7a9dbc9e6ec292607ddba06c8c0ffe199e953febc26814251 CVE-2024-35719,0,0,dd1d7bca8ae8cde9f9e3f2600aa39b26178c0f1f411f5a0803d6eedab9a3d37c,2024-06-10T02:52:08.267000 CVE-2024-3572,0,0,fac7085e464e1d98d017bfc9635e53b969d9f55d28ae04030a557f0ab1b04301,2024-04-16T13:24:07.103000 CVE-2024-35720,0,0,0f164f8f9b670114152a0f88625e47d291e06bcc76a25b980fca9f1df0718e97,2024-06-10T12:40:41.360000 -CVE-2024-35721,0,1,1807f30f29f0ac6b48d19063b461698322580402ce67e1233fa1480e571b35ca,2024-06-12T16:29:34.530000 -CVE-2024-35722,0,1,2e6d40e808b87f9cc3afd3fe92f67b7f9b679f9fc483d9a2a452a3933a833b76,2024-06-12T16:29:22.497000 -CVE-2024-35723,0,1,d21aa2ceb958c34983036417b55927b69725a1c80082efddfb006619febf87fb,2024-06-12T16:28:51.920000 -CVE-2024-35724,0,1,3dcf56a5238fff86e0902a51c35aa1bbf1d6e4243c4c748bcdbe9328ad3cb3d6,2024-06-12T16:28:10.463000 -CVE-2024-35725,0,1,276f09c680172cbb9c625bbd562e9e55d8cb15c0ae19e5da74ceb507e318f9d8,2024-06-12T16:27:55.390000 -CVE-2024-35726,0,1,923fc98f297ebc14a7cd4aa382f37d2dbb48b57a67365e8f6804065b2625ca49,2024-06-12T16:27:05.920000 -CVE-2024-35727,0,1,cd1bc1c7642d589d608eb5fbc76d5f9982b1e35e7746c63331eae50d9790b9bc,2024-06-12T16:26:55.247000 -CVE-2024-35728,0,1,306fd0fcb80558a8a58d3e182d1bc6fcb13b5e686d98a23fefefa9b2415e6d65,2024-06-12T17:43:24.173000 -CVE-2024-35729,0,1,0ea27869f1ce9b6503e333de597369ca39c33950492540d653a43ac76950edcb,2024-06-12T16:26:45.633000 +CVE-2024-35721,0,0,1807f30f29f0ac6b48d19063b461698322580402ce67e1233fa1480e571b35ca,2024-06-12T16:29:34.530000 +CVE-2024-35722,0,0,2e6d40e808b87f9cc3afd3fe92f67b7f9b679f9fc483d9a2a452a3933a833b76,2024-06-12T16:29:22.497000 +CVE-2024-35723,0,0,d21aa2ceb958c34983036417b55927b69725a1c80082efddfb006619febf87fb,2024-06-12T16:28:51.920000 +CVE-2024-35724,0,0,3dcf56a5238fff86e0902a51c35aa1bbf1d6e4243c4c748bcdbe9328ad3cb3d6,2024-06-12T16:28:10.463000 +CVE-2024-35725,0,0,276f09c680172cbb9c625bbd562e9e55d8cb15c0ae19e5da74ceb507e318f9d8,2024-06-12T16:27:55.390000 +CVE-2024-35726,0,0,923fc98f297ebc14a7cd4aa382f37d2dbb48b57a67365e8f6804065b2625ca49,2024-06-12T16:27:05.920000 +CVE-2024-35727,0,0,cd1bc1c7642d589d608eb5fbc76d5f9982b1e35e7746c63331eae50d9790b9bc,2024-06-12T16:26:55.247000 +CVE-2024-35728,0,0,306fd0fcb80558a8a58d3e182d1bc6fcb13b5e686d98a23fefefa9b2415e6d65,2024-06-12T17:43:24.173000 +CVE-2024-35729,0,0,0ea27869f1ce9b6503e333de597369ca39c33950492540d653a43ac76950edcb,2024-06-12T16:26:45.633000 CVE-2024-3573,0,0,f978306925f93ca64332932b6f5a09fb648fa8e8ad9d4b00bd427fd81ec82478,2024-04-16T13:24:07.103000 CVE-2024-35730,0,0,49335cae17539a2ff75d573d2c355a9e96d242f541f9939e3a5e291d5780cbb8,2024-06-10T02:52:08.267000 CVE-2024-35731,0,0,143fbc50e8cef612366366b66d67424075ebe4c9c1a8d543f78a4729c1a58e2a,2024-06-10T02:52:08.267000 CVE-2024-35732,0,0,7fdcba0fd7fddef85feb7e6673a8f96d3154b7974fa22b232cf3fd801d3f54de,2024-06-10T02:52:08.267000 CVE-2024-35733,0,0,a1ae2286f7bc76a6978fa6bf1b5fce5a756320de3c88f0e64dedfe42b522a5d8,2024-06-10T02:52:08.267000 CVE-2024-35734,0,0,4db4068d084716e23e2c716612575cf1c31577ae6452883821d760d3b2973e48,2024-06-10T02:52:08.267000 -CVE-2024-35735,0,1,255e899388da84f45c210958c5d8702fbaa1352b1af6a25a9e4c37e262562a2e,2024-06-12T16:26:08.450000 +CVE-2024-35735,0,0,255e899388da84f45c210958c5d8702fbaa1352b1af6a25a9e4c37e262562a2e,2024-06-12T16:26:08.450000 CVE-2024-35736,0,0,ce53c5603569b56b066418efe2441dcc3ec4daf52569cea931f378aa336fd127,2024-06-10T02:52:08.267000 CVE-2024-35737,0,0,68b854bcf8f4224101727c49f7d231c73d532ff04fc75a01e1d9fe383907d041,2024-06-10T02:52:08.267000 CVE-2024-35738,0,0,b35b0370c2dd956489606373203db0f27e1293b12d9ab83c9b53ee18df600402,2024-06-10T02:52:08.267000 CVE-2024-35739,0,0,b4f70001f5f669ef8233f6bfef832af600079b2d34c768ea99133be9875bdb3d,2024-06-10T02:52:08.267000 CVE-2024-3574,0,0,a6cc99c8a389ea7db1c37fe05b40106752b73810cdac85caab18aeb26d6bc576,2024-04-16T13:24:07.103000 CVE-2024-35740,0,0,cd3c4df653c403e3da38132e6a2e32e99932f9e5ed5f1383de768204108321b2,2024-06-10T02:52:08.267000 -CVE-2024-35741,0,1,2398aa682188cccc3380c9f03f79a94b0e61bedb784ddc6bf6525e6c832a8362,2024-06-12T17:54:46.150000 -CVE-2024-35742,0,0,fe154a3e8fa530687ef00116cc4be8a04e7fc1ca3143f50ff0ea0f84f7dba929,2024-06-10T12:40:41.360000 -CVE-2024-35743,0,1,cdf57129513ee1ed4c8cf3c1eadcafc386204e60f908e5a57b98299bfc433ed5,2024-06-12T17:42:56.900000 -CVE-2024-35744,0,1,9e54541e70135d5f75d1822350da3a752ee91afb0b56b1661f0c8acd6c0af81b,2024-06-12T17:42:12.707000 -CVE-2024-35745,0,1,07997091a8cd648631b3f4b65df28a3ac2b2bc0c62bc29345dc307bf6450bbbe,2024-06-12T17:36:32.763000 -CVE-2024-35746,0,1,6bfd0656dae71d387fa12929060a524c27e2e27454d60b936c90b1042e33379d,2024-06-12T17:36:02.087000 -CVE-2024-35747,0,1,ccfdca49cb01bd94b0d2ef1d42ed69046774e7d23d14b1ca7e95e0cc185aa883,2024-06-12T17:32:52.343000 +CVE-2024-35741,0,0,2398aa682188cccc3380c9f03f79a94b0e61bedb784ddc6bf6525e6c832a8362,2024-06-12T17:54:46.150000 +CVE-2024-35742,0,1,109cb5c630ede3bd19739135ead54896a05f10954ba59141c5c759e7d1be0f38,2024-06-12T19:32:19.827000 +CVE-2024-35743,0,0,cdf57129513ee1ed4c8cf3c1eadcafc386204e60f908e5a57b98299bfc433ed5,2024-06-12T17:42:56.900000 +CVE-2024-35744,0,0,9e54541e70135d5f75d1822350da3a752ee91afb0b56b1661f0c8acd6c0af81b,2024-06-12T17:42:12.707000 +CVE-2024-35745,0,0,07997091a8cd648631b3f4b65df28a3ac2b2bc0c62bc29345dc307bf6450bbbe,2024-06-12T17:36:32.763000 +CVE-2024-35746,0,0,6bfd0656dae71d387fa12929060a524c27e2e27454d60b936c90b1042e33379d,2024-06-12T17:36:02.087000 +CVE-2024-35747,0,0,ccfdca49cb01bd94b0d2ef1d42ed69046774e7d23d14b1ca7e95e0cc185aa883,2024-06-12T17:32:52.343000 CVE-2024-35748,0,0,ab07387e8cbceeb936ade78e834c5c15ec3b5a2cc852cd848f3fc4076b8b7a4e,2024-06-12T13:30:18.963000 -CVE-2024-35749,0,0,1d4109865cdef92c2876bf85af6a2839448c5bccd0ef1b4a023a36e807df8057,2024-06-10T18:06:22.600000 +CVE-2024-35749,0,1,b90dff04274c0424523c1c1e2079a645a94a67dc6ef398d3ad98a0d07ae5ab2d,2024-06-12T18:19:55.050000 CVE-2024-3575,0,0,59be73eca5c53cbbcf99414bd65c6b74b4dff22ff5983c2d091439c46f610b22,2024-04-16T13:24:07.103000 CVE-2024-35750,0,0,a560006c880afd12dcbd61cea07fe78f3a899ebabbef8546711e97bace611fe5,2024-06-10T02:52:08.267000 CVE-2024-35751,0,0,ae55742e6cee89fc362370a5e03b369783af57035c3e4ca39074ba46844c49ff,2024-06-10T02:52:08.267000 CVE-2024-35752,0,0,667b82b619d6af887c0f82748c01ea49704108d98bd8dc42d16eeda994071a5d,2024-06-10T02:52:08.267000 CVE-2024-35753,0,0,e87a673ccbe7b6c1f7094568180d993726bbfee58647b46671132ae9e6160269,2024-06-10T02:52:08.267000 -CVE-2024-35754,0,0,80aafb73d69d6f935233e8c3d3cbc1c30cfff9933d76149cad332b8773d950d1,2024-06-10T18:06:22.600000 +CVE-2024-35754,0,1,aa65be108fb30993f3885ae8163c97598c773dba7e2b2fc6fa84875158e744b3,2024-06-12T18:19:06.043000 CVE-2024-35755,0,0,7d42522fcd02f3fe60a2c6974d4d632d3f98569d74d8e6608400a19743cd1c98,2024-06-10T02:52:08.267000 CVE-2024-35756,0,0,f38d018d09d60bf027caad7794c192ca3356d81e050aa30cf2a44d5b7e716fda,2024-06-10T02:52:08.267000 CVE-2024-3576,0,0,da3479f65547a923ac9b6fc5d4e01aab352d357f2ab0f89f14bd434e8562f642,2024-05-07T09:15:38.747000 @@ -251939,9 +251945,9 @@ CVE-2024-36246,0,0,50338f85842e71924c1397e2b0a309f647146226696bf59a5411ba0e6e468 CVE-2024-3625,0,0,bb7fa72c43d725aef9f66641f31c3359a614ed8ba414acf9f05b8e44148cef81,2024-04-26T12:58:17.720000 CVE-2024-36255,0,0,22b21684452ad4563618ad5cee66dc719af723b04c8a1647fe9cf6d970347f9a,2024-05-28T12:39:28.377000 CVE-2024-3626,0,0,668faec6d18ac8a7c33197af94901aaf7ddac1dec4c77c1d646fba224d5f8541,2024-05-24T01:15:30.977000 -CVE-2024-36263,0,1,04ea6f141e5e9883d4c0410a515e19097ad4d5fc98cc6380d6fe8513b8b1aa09,2024-06-12T17:15:50.363000 -CVE-2024-36264,0,1,9ef31114da021eb9789083f1ed78ae2fc93afdf41a8bb695140a634b5b37f930,2024-06-12T17:15:50.447000 -CVE-2024-36265,0,1,0079a3aa5b78f3732cbbe3adb7417ca40923c1032ca8fa54976ab501576b0297,2024-06-12T17:15:50.520000 +CVE-2024-36263,0,0,04ea6f141e5e9883d4c0410a515e19097ad4d5fc98cc6380d6fe8513b8b1aa09,2024-06-12T17:15:50.363000 +CVE-2024-36264,0,0,9ef31114da021eb9789083f1ed78ae2fc93afdf41a8bb695140a634b5b37f930,2024-06-12T17:15:50.447000 +CVE-2024-36265,0,0,0079a3aa5b78f3732cbbe3adb7417ca40923c1032ca8fa54976ab501576b0297,2024-06-12T17:15:50.520000 CVE-2024-36266,0,0,83df454a9d264cabc9c075046ae12e249cd453c24f6de612ee1d9f73df0ef774,2024-06-11T13:54:12.057000 CVE-2024-36267,0,0,5b402628b4c430b8eab614a5b3330f6f2d186537f83ff9a60bb1a91e4b3c3cac,2024-05-30T13:15:41.297000 CVE-2024-3628,0,0,ad2a38a3d431944b5239dd67ace3bcd2603e3057c8d0a04d847db45516b0c9ea,2024-05-07T13:39:32.710000 @@ -251991,18 +251997,18 @@ CVE-2024-3640,0,0,abbf5a33cbca708fe19710dda7a796491ae1d1614e9cd03f43d6cddef8b095 CVE-2024-36400,0,0,6b10ab1f058055da0b7f6513936a46e66d6922b94171c5e956b85881f675cf7c,2024-06-10T19:39:21.660000 CVE-2024-36405,0,0,4b4347959a84cfd87daa4c611c67a41c72e3e0c399bcb3b81e58f7587d8de794,2024-06-10T18:06:22.600000 CVE-2024-36406,0,0,ae1e0beb0e761fd5661143be47855f0b61a65c6cc86fd6099339034686f4a643,2024-06-10T18:06:22.600000 -CVE-2024-36407,0,0,741ad29a7cdcbf05bfc2cd2a875d09c28750ff4396926bb53d2fe2a5df4158bd,2024-06-10T18:06:22.600000 -CVE-2024-36408,0,0,5cd8a75ba24079c1009c3729ba7de6130c049fa9b19c282e27fad279a2949b25,2024-06-10T18:06:22.600000 -CVE-2024-36409,0,0,9cd16a7e24bd8394d1f0c2721003efcbffc242645298d2d4538f59e84a64ede5,2024-06-10T20:54:18.443000 +CVE-2024-36407,0,1,3fa9b8688b87bb89923ff6af2953ac9e3c3d75823a9915954eac5e78dc625b42,2024-06-12T18:17:38.777000 +CVE-2024-36408,0,1,11f21869c76c432e26407d306c96488f7ba971b6993fdb685c1f024c80c342a3,2024-06-12T18:13:58.627000 +CVE-2024-36409,0,1,2c3b215af6bbe6fa84592adf67b9957ea251df2e6964e1fe5d6f74050de42541,2024-06-12T18:09:19.450000 CVE-2024-3641,0,0,c281de95cce057acff2793609e8f843aad579a2f0257c0c2e0b6442733e87b14,2024-05-16T13:03:05.353000 -CVE-2024-36410,0,0,fac35f9377acbd5e62bae482d6b26ac497ea92f83ead8605ae0a4d55fc9e3cbf,2024-06-10T20:54:18.443000 -CVE-2024-36411,0,0,aa7544310bc332364ee37edb0f84d400824d961008ffebd8db7c1ce2dc3e5b05,2024-06-10T20:54:18.443000 -CVE-2024-36412,0,1,548544c4ffb106ae4459efe54787516f7a8b91038e9bd99db46c682309c7b7b1,2024-06-12T18:00:00.317000 -CVE-2024-36413,0,1,4069f61c28f83942cd6f32b01d400d2c9b955950d9c25442379f797d94d57edc,2024-06-12T17:59:44.673000 -CVE-2024-36414,0,1,0b668116227fd5781118170b1cdfe9c95e50c019e2f7cf5a2f38009ed0ae2db9,2024-06-12T17:59:14.353000 -CVE-2024-36415,0,1,97f30d08c26bffa9b2c4d6a7a9001234ed7c9da30e93e3ea400c7ad232ab473d,2024-06-12T17:58:53.497000 -CVE-2024-36416,0,1,9328a3d2121fa2da1a29b5be1b12cf7cf7ba857605f6afc42d167fd6f6079815,2024-06-12T17:58:19.570000 -CVE-2024-36417,0,1,7f72be2da88bd03f2618a97d909b76dab66b1196af11257e6aa2fac632513220,2024-06-12T17:58:04.477000 +CVE-2024-36410,0,1,8d9a5395f64acdec4b478c9c3580ee593a1a452bf5e57093379f25fe695ba0ad,2024-06-12T18:09:04.930000 +CVE-2024-36411,0,1,dfdbb970f60ea0bdf492b35e05557ba185c5648db47b8910ef4842a663e7c71b,2024-06-12T18:00:13.937000 +CVE-2024-36412,0,0,548544c4ffb106ae4459efe54787516f7a8b91038e9bd99db46c682309c7b7b1,2024-06-12T18:00:00.317000 +CVE-2024-36413,0,0,4069f61c28f83942cd6f32b01d400d2c9b955950d9c25442379f797d94d57edc,2024-06-12T17:59:44.673000 +CVE-2024-36414,0,0,0b668116227fd5781118170b1cdfe9c95e50c019e2f7cf5a2f38009ed0ae2db9,2024-06-12T17:59:14.353000 +CVE-2024-36415,0,0,97f30d08c26bffa9b2c4d6a7a9001234ed7c9da30e93e3ea400c7ad232ab473d,2024-06-12T17:58:53.497000 +CVE-2024-36416,0,0,9328a3d2121fa2da1a29b5be1b12cf7cf7ba857605f6afc42d167fd6f6079815,2024-06-12T17:58:19.570000 +CVE-2024-36417,0,0,7f72be2da88bd03f2618a97d909b76dab66b1196af11257e6aa2fac632513220,2024-06-12T17:58:04.477000 CVE-2024-36418,0,0,52272dc570f5081df6975298e5712cf123b760ef720bb4951287c4366378282e,2024-06-11T13:54:12.057000 CVE-2024-36419,0,0,e561cf6fec966fa1d9dbaeadf6c1b7f0c1186aebf1fa6c9a3ce263fb312ad74d,2024-06-11T13:54:12.057000 CVE-2024-3642,0,0,bbed1ee941355da6f32a6eba37e95a843dd7913c7dd227d8da7f65dcb683674b,2024-05-16T13:03:05.353000 @@ -252073,7 +252079,7 @@ CVE-2024-36743,0,0,947029ef079964db2f975300f543b502c98bef02b4c5f9f3d5de943b90d77 CVE-2024-36745,0,0,c21f6d498139c367702b2a5b310b830e45905feb661fd13e2ada12120c92ab59,2024-06-07T14:56:05.647000 CVE-2024-3675,0,0,00d1234baac079cf413c516618dd0fc3e7ad5eadaec0ab200df9e28f23d3ebe2,2024-05-02T18:00:37.360000 CVE-2024-3676,0,0,afffaa433a0219105ab8db2fc3cac72e262ac997e8b5329e1239c5388df90382,2024-05-14T19:17:55.627000 -CVE-2024-36761,1,1,45e68de3caa2edbd8ec7e3d9314dfa2a85dcb79f20010465ff7c3f4953532c02,2024-06-12T16:15:11.983000 +CVE-2024-36761,0,0,45e68de3caa2edbd8ec7e3d9314dfa2a85dcb79f20010465ff7c3f4953532c02,2024-06-12T16:15:11.983000 CVE-2024-3677,0,0,822256c91d31044a13b27ee319c8c0a4bbd148e7653d3ef44cb1c97299aa9fe7,2024-05-02T18:00:37.360000 CVE-2024-36773,0,0,be07270490997748ed5042323acf595cf65a4ec0fdf18429a47f38918783b6b9,2024-06-07T19:24:09.243000 CVE-2024-36774,0,0,2df072beaff79bc30583e2884ff43f38048f215ce893570cbe619b2c4b3ea848,2024-06-07T14:56:05.647000 @@ -252211,24 +252217,24 @@ CVE-2024-36970,0,0,50083cf534f5df621aa7bead6ce71043c6360c6ed1cf8d6bd9cf7a1a7b652 CVE-2024-36971,0,0,82b8b9fbabc6d1a263f871b2e3cf77e6c0d2c9b2290e695c225e46a96ddc8130,2024-06-12T15:43:28.280000 CVE-2024-36972,0,0,639469afbfc3c8e61ad1446aeb28d8bbb041cd80eb7cb8c17f6c32ebdf799618,2024-06-12T10:15:31.347000 CVE-2024-3698,0,0,13b4029eb6179dbe788598788e16556a1995d850ddfc4af1ee0c4e86961a3a21,2024-05-17T02:40:04.800000 -CVE-2024-3699,0,1,6e64dedcb1ec83e842b9c3ed18b374381a62ef4f7982a43d9405eeb95e55d0fc,2024-06-12T17:53:09.130000 -CVE-2024-3700,0,1,f1913b84964a9a87ca4f78bbad55a262819a35385e2c066c91eaa7c4a1891262,2024-06-12T17:51:52.710000 +CVE-2024-3699,0,0,6e64dedcb1ec83e842b9c3ed18b374381a62ef4f7982a43d9405eeb95e55d0fc,2024-06-12T17:53:09.130000 +CVE-2024-3700,0,0,f1913b84964a9a87ca4f78bbad55a262819a35385e2c066c91eaa7c4a1891262,2024-06-12T17:51:52.710000 CVE-2024-3701,0,0,d78f52a76181001272debccb095fb5971bb478ebc111313d9ff2994f4ec0598f,2024-04-15T13:15:31.997000 -CVE-2024-37014,0,1,c47c2b09802b94267a83a7981860e8f6f71032b8440b3dd55d1a2f768ec7199d,2024-06-12T17:57:01.660000 +CVE-2024-37014,0,0,c47c2b09802b94267a83a7981860e8f6f71032b8440b3dd55d1a2f768ec7199d,2024-06-12T17:57:01.660000 CVE-2024-37017,0,0,fd4284c5a2195342d9622b5d20527d4d58db85192e227730c5a741287dc835e4,2024-05-31T13:01:46.727000 CVE-2024-37018,0,0,92b8b0fbc5eb3b3ff9e996cdb38184b7cd381c3e78fdf37e960ede7860319106,2024-05-31T13:01:46.727000 CVE-2024-37019,0,0,c7b7779ae7837bd324c73dde7cb1a43454b31469d3554588beff0fd2aed9bc3d,2024-06-03T19:23:17.807000 CVE-2024-3703,0,0,46d289814974ee20b6160fe56cc828277066d832a1c60ccf5d9c1a62d06c47e2,2024-05-03T12:48:41.067000 CVE-2024-37031,0,0,967b2a62510a1f35de5969f18efe9a7e1918d9bc4c74d0011148e6a904de3800,2024-06-03T14:46:24.250000 CVE-2024-37032,0,0,2fd16d835b1a2cd56c97d409a29d6a495e6793f4206084713a4efe57de2f2107,2024-05-31T13:01:46.727000 -CVE-2024-37036,1,1,419b32893b7c15b1ad5886eee490ad49f9f76afce4dc71f5feadde311f406369,2024-06-12T17:15:50.637000 -CVE-2024-37037,1,1,9717fa38c618eabcfe1f3f2a1df3fd72894a992126d0ee2e1290f2219868f934,2024-06-12T17:15:50.853000 -CVE-2024-37038,1,1,2adaf850c80e6bddd36fbdba564518a6090262b1b15eac3d2f8554f70811ee8b,2024-06-12T17:15:51.080000 -CVE-2024-37039,1,1,871fbad7e4cd60608e22285ba1036c660d58782590c4808c122d51a46c8029de,2024-06-12T17:15:51.313000 +CVE-2024-37036,0,0,419b32893b7c15b1ad5886eee490ad49f9f76afce4dc71f5feadde311f406369,2024-06-12T17:15:50.637000 +CVE-2024-37037,0,0,9717fa38c618eabcfe1f3f2a1df3fd72894a992126d0ee2e1290f2219868f934,2024-06-12T17:15:50.853000 +CVE-2024-37038,0,0,2adaf850c80e6bddd36fbdba564518a6090262b1b15eac3d2f8554f70811ee8b,2024-06-12T17:15:51.080000 +CVE-2024-37039,0,0,871fbad7e4cd60608e22285ba1036c660d58782590c4808c122d51a46c8029de,2024-06-12T17:15:51.313000 CVE-2024-3704,0,0,ad7f205e31bc442943bbd584692b194a3485d815654eeb83e4eefef6a6eff393,2024-04-15T13:15:51.577000 -CVE-2024-37040,1,1,2e4e3e051164ccd059ed47f35e3875e946b2ab9f4ffaa3045c5f164c197e72b8,2024-06-12T17:15:51.540000 +CVE-2024-37040,0,0,2e4e3e051164ccd059ed47f35e3875e946b2ab9f4ffaa3045c5f164c197e72b8,2024-06-12T17:15:51.540000 CVE-2024-3705,0,0,44f1c76d2f6cd8dab882ddfdbdbe908a4e3a8f22d6a90f31f0279b7faf87a669,2024-04-15T13:15:51.577000 -CVE-2024-37051,0,1,0d2e5970f87c8d9c22ba6507f170a3b81c5f970d2e6b258a94c4dded4fd0590b,2024-06-12T17:49:04.017000 +CVE-2024-37051,0,0,0d2e5970f87c8d9c22ba6507f170a3b81c5f970d2e6b258a94c4dded4fd0590b,2024-06-12T17:49:04.017000 CVE-2024-37052,0,0,b5eb259457f95c1e8621c6844ccb575aa5920121a474c1c74037900643b492aa,2024-06-04T16:57:41.053000 CVE-2024-37053,0,0,1081c2339448dc4a976b760458c506e7c94aa413116003d5e0e73d2124757682,2024-06-04T16:57:41.053000 CVE-2024-37054,0,0,dd5e5c1cbe28a100cc6cbec6281d65acc5f0b582cd904acdbac1ca15040981ec,2024-06-04T16:57:41.053000 @@ -252287,7 +252293,7 @@ CVE-2024-37295,0,0,489b7cf64c9161735dcc4e60b77f6320915669d39993b442952b536afb71d CVE-2024-37296,0,0,2aaf9d94ef056cce09e0b5724aee7c4e629647a09dbe0d79a994991f97a3ce49,2024-06-11T15:16:09.963000 CVE-2024-37297,0,0,577a76783d232067279e3b65b1d0e5486f1ee5085aad4d7376d7ace51c240070,2024-06-12T15:15:52.677000 CVE-2024-3730,0,0,a30960de1676c855ee35b61976bc4581959cd1a98a7ba3127a461fb7fc955146,2024-04-25T13:18:02.660000 -CVE-2024-37300,1,1,e695bf813c4b2c9ac897c60297973f24cdf1699ac80492d5b5ef8d3561eea312,2024-06-12T16:15:12.097000 +CVE-2024-37300,0,0,e695bf813c4b2c9ac897c60297973f24cdf1699ac80492d5b5ef8d3561eea312,2024-06-12T16:15:12.097000 CVE-2024-37301,0,0,1426a850b241ee3963e992e98f12d9875eb125b26184e9013bd9eaf89532808e,2024-06-11T19:16:07.890000 CVE-2024-37304,0,0,a0d53a238603c7b00022def6bac211f79e2e4865ec26e30c72b3c7b78c9449ba,2024-06-12T15:15:52.910000 CVE-2024-3731,0,0,bdcc8f677627b7b108ec8e839a01e7cc6ba34354d6004394dff79046d7838f40,2024-04-19T13:10:25.637000 @@ -252305,7 +252311,7 @@ CVE-2024-37384,0,0,60b664762f9333df5975c65ab9b722a03bcb9e931609f92fdae7cd1cf2f9f CVE-2024-37385,0,0,ab67b8a0f073ce7f5c28ca11584627dbf70b59e11b1337a1068ce1887aeb0943,2024-06-07T14:56:05.647000 CVE-2024-37388,0,0,4bb786bca42a11ef8edd07a6799bb4caedfa95038e4371ae55f637f2792eab26,2024-06-07T19:24:09.243000 CVE-2024-3739,0,0,18ca969c974b63c6d16494fbcc2d63756747cacc5947332fefb20d9c592537e4,2024-05-17T02:40:06.067000 -CVE-2024-37393,0,1,adb4710ef8d4e8e5b898aa80bff6a41a92b599e232f1db44a8b62c91938837ef,2024-06-12T17:56:23.390000 +CVE-2024-37393,0,0,adb4710ef8d4e8e5b898aa80bff6a41a92b599e232f1db44a8b62c91938837ef,2024-06-12T17:56:23.390000 CVE-2024-3740,0,0,1025f598f3437296a5a18526d2723c88eb3b5b46ea06c50b765dc694c6a0bd1a,2024-05-17T02:40:06.170000 CVE-2024-37407,0,0,aec5c198a3463e3996afdb2b87dcd156119620da199d8e9853297e329cd2e74b,2024-06-10T02:52:08.267000 CVE-2024-37408,0,0,43de84338ac833cd78092ec836ae8beffbac830f1aa1a52e6c8ca816bfb77c27,2024-06-10T02:52:08.267000 @@ -252324,13 +252330,14 @@ CVE-2024-37535,0,0,07f7d930de9d2427116ed26f9657c7962aa8122c29cd0ba965c2b1ee75b9b CVE-2024-3755,0,0,255cc63bdc34aca663119fb8f6757a7da5a9acef7ecda034d88dc05babf4b05b,2024-05-06T12:44:56.377000 CVE-2024-3756,0,0,978b8204ea279199334a4c8c549150dc6420f24480b5effb717e8509749d66aa,2024-05-06T12:44:56.377000 CVE-2024-37568,0,0,c31dda2ce4e2cf1c14da8896dd1ff7847e88710326c3ff8a35f20f8d9a2e2a98,2024-06-12T13:29:13.877000 -CVE-2024-37569,0,1,748406cd7b0e731a2b9037b16c6d1dde7e8c81aa1003e1ce6c82275ceb288683,2024-06-12T16:32:56.203000 +CVE-2024-37569,0,0,748406cd7b0e731a2b9037b16c6d1dde7e8c81aa1003e1ce6c82275ceb288683,2024-06-12T16:32:56.203000 CVE-2024-3757,0,0,62301a2775fcbfb9e8b5b1aa90b79aa074cd639699f2863765d338333af4b798,2024-05-07T13:39:32.710000 -CVE-2024-37570,0,1,a374041c2622c9ba66d2048315fc9e015af6a8717cce4f8beb5b59800398626a,2024-06-12T16:32:34.513000 +CVE-2024-37570,0,0,a374041c2622c9ba66d2048315fc9e015af6a8717cce4f8beb5b59800398626a,2024-06-12T16:32:34.513000 CVE-2024-3758,0,0,3ea9ecbea279ca1eb1159e542db09b1cab2d2435be79c6a6a563dc4d73ca4285,2024-05-07T13:39:32.710000 CVE-2024-3759,0,0,20211226ea875c33805e71e9c0afa18c7ce1ad112702c8859afd48ee84347f62,2024-05-07T13:39:32.710000 CVE-2024-3761,0,0,c0af44e486388b5bef077e784125f415f33c54c3c3a8677d0ab80af1f3e8df6c,2024-05-20T13:00:04.957000 CVE-2024-3762,0,0,3a4d7121b46153c733feea020bbdc2b15c8dd6dac7706d18d5d6cc6fdd5731da,2024-05-17T02:40:06.647000 +CVE-2024-37629,1,1,3a410850af244f6f643a3d12a3e26aa1669009a9d1cb133440ab8e99ef0c8d27,2024-06-12T18:15:12.293000 CVE-2024-3763,0,0,d4a43b988d4f5ccf2146c95730aa308ab303229339c58dc3a72b2fdabbe91a36,2024-06-05T20:15:13.530000 CVE-2024-3764,0,0,33410633d9dadf088a16c40fe902a036322ce93eb40b27ebad26eee187e78727,2024-05-17T02:40:06.823000 CVE-2024-3765,0,0,4fdba2eb80818b350bc57cc64ca06a70a8e5d2cec5cc9e99a6b5fff1df632742,2024-05-17T02:40:06.923000 @@ -252354,9 +252361,9 @@ CVE-2024-3784,0,0,c3548262a5dd94ab612636409a3bf8cd74017da9deb24debb2f77536fe2746 CVE-2024-3785,0,0,fc93f2e321d044bf7a0ccc45f351722880d9f0bf94368b28b702ab59c5cb3144,2024-04-15T19:12:25.887000 CVE-2024-3786,0,0,e7dff42d10ea5f51aefb5b7728f1b7d65e7bf6f944a436f82b5cbbe6bdc82c9e,2024-04-15T19:12:25.887000 CVE-2024-3787,0,0,570870b6338590c353431fe2587b532b039679da85c30ab8bb196a257bca2d47,2024-05-14T16:11:39.510000 -CVE-2024-37878,1,1,8f7712233494afef3eb7225c90d712354063c6005f7fa9f8e86929491655b1bd,2024-06-12T17:15:51.803000 +CVE-2024-37878,0,0,8f7712233494afef3eb7225c90d712354063c6005f7fa9f8e86929491655b1bd,2024-06-12T17:15:51.803000 CVE-2024-3788,0,0,746d07fda684df68d3fb292ada95a2bfbbf82c49ef53e13b55d1c7f158f32ee7,2024-05-14T16:11:39.510000 -CVE-2024-37880,0,1,8fc2a7037c003cd05c8204143fd08c5c781310cbac1dbb1e80c2c17a0b28d4e3,2024-06-12T16:30:15.053000 +CVE-2024-37880,0,0,8fc2a7037c003cd05c8204143fd08c5c781310cbac1dbb1e80c2c17a0b28d4e3,2024-06-12T16:30:15.053000 CVE-2024-3789,0,0,63d455d46acf2815a86f3b9bf286e732f6c1d2d557d093772c64f0c37d315365,2024-05-14T16:11:39.510000 CVE-2024-3790,0,0,ea62135e66a6e7a74daddc8d443b8b9750f000d596c0e5f30e202f53e21ec40b,2024-05-14T16:11:39.510000 CVE-2024-3791,0,0,9bc6cec70e672f5f7f9ccdb1c0603c19b269c41965293930113b85d0de980142,2024-05-14T16:11:39.510000 @@ -252403,7 +252410,7 @@ CVE-2024-3846,0,0,c48e0a8a684c17ee6ebfa3dd6ef492735a7e1f61d2741ebafccef32d97787c CVE-2024-3847,0,0,a2146e655749d60cf9631f855db42a3d44cf07cd9a542fd1035e46bb9a6304c5,2024-05-03T03:16:29.293000 CVE-2024-3848,0,0,cff2d1cd97f0b1f2183f9bb4edcf4fc45d9e2b8ab251b9953f6af6105249c0ec,2024-05-16T13:03:05.353000 CVE-2024-3849,0,0,d4181d6192aab2f4a2b324451fbda7660fbd9621eb95f5f54a642a6a3d1e7d46,2024-05-02T18:00:37.360000 -CVE-2024-3850,0,0,6ff7a91bef5f9d4e3f286db4debdf969a93090e3db07661b7aac4ed36b3fcbe3,2024-06-10T18:06:22.600000 +CVE-2024-3850,0,1,bbe49076d39470df53cdf5186eea91a2b4a40256492f588a1ab86bd1ba5244b0,2024-06-12T18:12:56.413000 CVE-2024-3851,0,0,16bcb9f87255ebcf1aad2856af6894b1b0c36049b98621e173e693ad3a900330,2024-05-16T13:03:05.353000 CVE-2024-3852,0,0,3038e46972183e994310b2b410f139aaace8bd74e7e7e979d336a57b5feba459,2024-04-22T10:15:07.430000 CVE-2024-3853,0,0,da9bcb4a065926b49732a0dd79b2f07a12fd9777c9341906bc363e07df8725cf,2024-04-17T12:48:31.863000 @@ -252743,7 +252750,7 @@ CVE-2024-4324,0,0,7ffaeab065d0c9a1857569b7bf1dcf908cb9c5c673c6c887858b7e3bb59f5d CVE-2024-4325,0,0,9bdbfeadfcfe04a30cd4b788d23f4d3e0d4d7ac5ca53497b4f8e137c6cc841b9,2024-06-07T14:56:05.647000 CVE-2024-4326,0,0,8dbb64b51f21b806e292a7e05ea5c1051e35374391354831c3514fc08d15ec8e,2024-05-16T13:03:05.353000 CVE-2024-4327,0,0,4d82dd4709e731be065c0bf0ae9ef6780542dd816512537c908eaf4d566d4272,2024-05-17T02:40:22.673000 -CVE-2024-4328,0,0,5c54a81eaca7a66f4f49f745eade926cbd2e59d834d210577cf1a36d3512686b,2024-06-10T12:40:41.360000 +CVE-2024-4328,0,1,5c6dddabdbc801031ee77029aa4b0ff4de38533976485f2a04e98fdc9688c2d2,2024-06-12T19:33:00.527000 CVE-2024-4329,0,0,b4ac7e4961d4eb2bf8d3a768969ba81a7ecc8f8fe7d1f63dcc17b43bdf703463,2024-05-14T16:11:39.510000 CVE-2024-4330,0,0,27ed586df5d07858fa3cac91f5c86ff400dd30bbc2cec38947cbe22382636599,2024-05-30T18:19:11.743000 CVE-2024-4331,0,0,31d80071d9217fb084a6ad175ae7c8879003862f66041883ec06dc2da18f1116,2024-06-10T18:15:36.607000 @@ -253054,9 +253061,9 @@ CVE-2024-4736,0,0,35e0fe51ccd6e16c666173722ffd72f471827cead112caeaf869dd95515427 CVE-2024-4737,0,0,0d605ad76fcca9d9a8748ea1570213b2a20be8e7af59e1490aa0de37640ee426,2024-06-04T19:20:48.597000 CVE-2024-4738,0,0,703597dd680fa7def2747a141a4237503bd7e8917e070a49546a7e715e951f69,2024-06-04T19:20:48.783000 CVE-2024-4743,0,0,e42c9380fd03fa2e7e8dd1d108eb6ee48e234f06ee604011f8e8a51de81bb3cb,2024-06-11T17:32:50.367000 -CVE-2024-4744,0,1,00389d0f632a53abd6687abe1695ed0d94106b42a5446a5e1de91a20dcdffac8,2024-06-12T16:44:12.157000 -CVE-2024-4745,0,1,52090afb58a281a3371ee6c6ad54ec80b0aac7a7ded5dbbe0e95b57b1a9dc746,2024-06-12T16:23:34.197000 -CVE-2024-4746,0,1,f4f2ac85907c7b5b329cbda786b397a3fc954bb6f671df10eda8148346b3a114,2024-06-12T16:17:42.223000 +CVE-2024-4744,0,0,00389d0f632a53abd6687abe1695ed0d94106b42a5446a5e1de91a20dcdffac8,2024-06-12T16:44:12.157000 +CVE-2024-4745,0,0,52090afb58a281a3371ee6c6ad54ec80b0aac7a7ded5dbbe0e95b57b1a9dc746,2024-06-12T16:23:34.197000 +CVE-2024-4746,0,0,f4f2ac85907c7b5b329cbda786b397a3fc954bb6f671df10eda8148346b3a114,2024-06-12T16:17:42.223000 CVE-2024-4747,0,0,99152f6494a1192f3bae59b436abcc51d11f811ed1e0a72c2e65c8381fda6054,2024-05-14T16:11:39.510000 CVE-2024-4749,0,0,676e331864bc41907c4c80c44886e7dac480ef6dea2c29bc22838d992753d4da,2024-06-04T16:57:41.053000 CVE-2024-4750,0,0,423585a3e250903ac62d761ecb0e0e6dc6b4649ccd4411b90275a4e6d2f87495,2024-06-04T16:57:41.053000 @@ -253278,7 +253285,7 @@ CVE-2024-5098,0,0,4732d7cd15b56a86eb717df9a9d94eac42f29eaa5aa89b4d41ed392b988c2e CVE-2024-5099,0,0,0aeca64f34b67ee8973c6e2be6cc11249d255bf1165c776c1356aec8eda36b33,2024-06-04T19:20:58.993000 CVE-2024-5100,0,0,66e888ccf61e6da617c762c0d029f3eaeb85bf9704e37410d6b9e52a0787c1e4,2024-06-04T19:20:59.100000 CVE-2024-5101,0,0,0e72680ac39859889a062f1df5b7c7337ebf9e0746a308ddcc1931ba6bc62983,2024-06-04T19:20:59.200000 -CVE-2024-5102,0,0,76ad0693887b29a2fe187f5872893d8165cd04c179217103d68341726b466323,2024-06-10T18:06:22.600000 +CVE-2024-5102,0,1,b70c6853e4988b98f71737835d02eb41cd98846f25e1a8a4c171c276cc5efa87,2024-06-12T18:12:01.453000 CVE-2024-5103,0,0,f3c12fc9604fe811051dfda71a50d275beaf07af4d2a570d8bf6b2fcd28eddc5,2024-06-04T19:20:59.297000 CVE-2024-5104,0,0,0e7a76518082b571f50c4371ee49632a85481d60762022d051097d3bc69f00d0,2024-06-04T19:20:59.397000 CVE-2024-5105,0,0,9239348abf3201edf5ca18df8022d8d9a87e261704a9d80f6c607a666b08c4e2,2024-06-04T19:20:59.500000 @@ -253482,7 +253489,7 @@ CVE-2024-5384,0,0,fc8a760c5f8c6533d32783fcf44bb063e589b4e165b4e3e16391c3aeb9ec5e CVE-2024-5385,0,0,bc3c0d01b2051e708e659a5c3590b7dd8cb9dd588e93f64ca3944fc804f9c929,2024-05-28T12:39:28.377000 CVE-2024-5387,0,0,857b2af9507e1fb781392f9f45599eb9ea380f1e8b91dd3c69ea7be187de1f2a,2024-06-03T19:15:09.500000 CVE-2024-5388,0,0,0c90149987e278137050d2b65080c43dd31aa72e74992bde244a30e0d49fbf46,2024-06-03T19:15:09.557000 -CVE-2024-5389,0,1,b03364a2f4d6f0b56bedc45ec6b964cb0ed203a7d91090b995d6798f5653a980,2024-06-12T16:31:30.577000 +CVE-2024-5389,0,0,b03364a2f4d6f0b56bedc45ec6b964cb0ed203a7d91090b995d6798f5653a980,2024-06-12T16:31:30.577000 CVE-2024-5390,0,0,7bbbc0fbbf0080c37ea508796076f5055d10a83119ccd7fea3223bbf180b1d73,2024-06-04T19:21:08.020000 CVE-2024-5391,0,0,00f61420375c40b8d29b33273a9abb170480b355b8f71230d76cd6238a9db4ff,2024-06-07T20:15:12.687000 CVE-2024-5392,0,0,f7219b2013d34cef28a688dbd5b89c3b8013dcb24b8103dca8d259a586db6696,2024-06-04T19:21:08.117000 @@ -253570,19 +253577,20 @@ CVE-2024-5543,0,0,1f8dadf7ddfb1e1c1a8006df6622727e1de688b7f483cab717adee12c7f279 CVE-2024-5550,0,0,e4fc13aea5b719d7c555043aa9a8be47a59e2f4d5eac2e9fa0d5ff8a8edb892f,2024-06-07T14:56:05.647000 CVE-2024-5552,0,0,12abaaddd513e722275738643d6cd32f6bb9e257da98294dd5bedf4ad4cbf55d,2024-06-07T14:56:05.647000 CVE-2024-5553,0,0,3f2e6115738134af7d285604a77d6396ef9f781ed1953efa7c72f957ec883035,2024-06-12T04:15:13.127000 -CVE-2024-5557,1,1,846a1b5724880eee14b60af63bb003aea0869123c1e447b716eab3576476cae9,2024-06-12T17:15:51.943000 -CVE-2024-5558,1,1,8a2a6beaaea21cb5c7551abc76b759f246695b8ddd48af468f7d6b90b9bf0565,2024-06-12T17:15:52.160000 -CVE-2024-5560,1,1,ef0761cc09cb2a3b612bdc0fa8d549dbc116ec36d61e23df3cadcf2b2b11eaf9,2024-06-12T17:15:52.357000 +CVE-2024-5557,0,0,846a1b5724880eee14b60af63bb003aea0869123c1e447b716eab3576476cae9,2024-06-12T17:15:51.943000 +CVE-2024-5558,0,0,8a2a6beaaea21cb5c7551abc76b759f246695b8ddd48af468f7d6b90b9bf0565,2024-06-12T17:15:52.160000 +CVE-2024-5559,1,1,a64afea2412e0e18d1851d5510167a9f07c9d7e45028758f9ded45183719d465,2024-06-12T18:15:12.493000 +CVE-2024-5560,0,0,ef0761cc09cb2a3b612bdc0fa8d549dbc116ec36d61e23df3cadcf2b2b11eaf9,2024-06-12T17:15:52.357000 CVE-2024-5564,0,0,cd961630c6982ea90916e9cc290067a2c4a02a79292d87af6b0ec76760478ca9,2024-06-03T14:46:24.250000 CVE-2024-5565,0,0,830316f5c713618fdad4a0eda5b7296c22d5d93c87a8813197db3ff9cf28c4ee,2024-05-31T19:14:47.793000 CVE-2024-5571,0,0,105c4e644019eeccf72c6e63813cdc36601b1b9a7e3cba5bc172df86631261e6,2024-06-11T17:29:03.277000 CVE-2024-5584,0,0,612eacfcf6c3fd3d6fdd0ff2c66e496cc817b02568ea9f69c40277bbc0300578,2024-06-11T13:54:12.057000 -CVE-2024-5585,0,1,23f2e7b2ee30c2e56251fdffeaabd2833482d3483754dca28b1f5ab4921ddb38,2024-06-12T17:15:04.083000 +CVE-2024-5585,0,0,23f2e7b2ee30c2e56251fdffeaabd2833482d3483754dca28b1f5ab4921ddb38,2024-06-12T17:15:04.083000 CVE-2024-5587,0,0,9180b0762a5a5a7a17ce70cd861bdf25e955d88caf903bee442f7c48a0a2a218,2024-06-03T14:46:24.250000 CVE-2024-5588,0,0,21589c4423d1fee081cb695dd8009f3bd5a36bd74dae1713c28449f0da1cd8d1,2024-06-04T19:21:10.267000 CVE-2024-5589,0,0,dc63c38434ce5bb089af0d0f8aa09f6a46f1fae34dd45c15f4542741dea047b7,2024-06-03T14:46:24.250000 CVE-2024-5590,0,0,ca60332ff9933405c7b9b37e93d2404b53274b9ec741b4065c0c1eadbd60da94,2024-06-03T14:46:24.250000 -CVE-2024-5597,0,0,1a4662a4bad753ddfaeb71415fd7d7bbee7f1ef3c250c245871db0dcb1335584,2024-06-10T18:06:22.600000 +CVE-2024-5597,0,1,652827ff26b80eabae5b3eddf519a61b0da7de181ce61fd257911ec48c45cdb0,2024-06-12T18:10:47.080000 CVE-2024-5599,0,0,e4d8d3217ca804a33354b51b54e1f3f41ce0e1fc1f554dedfe90ad1a46a87370,2024-06-11T18:24:39.057000 CVE-2024-5607,0,0,9601597658129a089207c1a0e7e7267aceda952302ad39754d738e7307549543,2024-06-07T14:56:05.647000 CVE-2024-5609,0,0,f28c83e3e9d04345913d36de3bfdbd0d644d73b3d20045d9399b3368319c8d47,2024-06-06T19:16:09.920000 @@ -253631,7 +253639,7 @@ CVE-2024-5739,0,0,5773cc5124d6a6a0e954a481f5ce31fb721ea51c10912a509188eda9635d70 CVE-2024-5742,0,0,d09d1105fb5596a722b05fe43f0b05eb11b548e04093f54406c8e99009264b31,2024-06-12T09:15:23.037000 CVE-2024-5745,0,0,8788b99580d43fd9eb900afb700ee157c954d289b603d58451eabd57873852f0,2024-06-08T04:15:10.027000 CVE-2024-5758,0,0,60f3603833ce9f04e269788c1d2a3370191ec81ac34b615f7c4c140d7286ef3a,2024-06-10T02:52:08.267000 -CVE-2024-5759,1,1,826729e04d02664132e22a6c7cc2d0756738f94f6ebbdeb3f8b7aba1ab3ed272,2024-06-12T16:15:12.550000 +CVE-2024-5759,0,0,826729e04d02664132e22a6c7cc2d0756738f94f6ebbdeb3f8b7aba1ab3ed272,2024-06-12T16:15:12.550000 CVE-2024-5761,0,0,e0022a8d80317cd3941058bae14b514f68707790a5051038049a1d552ba8de69,2024-06-07T19:15:24.467000 CVE-2024-5766,0,0,86ed0bd8ec5f973a61dc526186a645f1ec84961008a0f608efabd599d39dbfeb,2024-06-10T02:52:08.267000 CVE-2024-5770,0,0,2161bc3bb7995521a02976cf67b0f5030935d13dcc8500f4bdfe07ad52c43c37,2024-06-10T02:52:08.267000 @@ -253650,6 +253658,7 @@ CVE-2024-5782,0,0,1a8a2620a565d05a1a6c2c4c72d75648296e70bf5f89433612bbf40ebc42c7 CVE-2024-5783,0,0,e65b469aba92209e135f01d801ec2e7ebd41770aa11624b30224f43d98aec806,2024-06-12T08:15:51.480000 CVE-2024-5785,0,0,9826b5aaa33b29bbb943547624c099322eebf243c8fefca7bc1b316af4cf2a62,2024-06-10T18:06:22.600000 CVE-2024-5786,0,0,1f75ee06acd19f83f11a6972076ed1b01909c541516fb3c8be9392bde53f67b2,2024-06-10T18:06:22.600000 +CVE-2024-5798,1,1,aa1945340d1a2bd8574699df8c7cfa4e55fa00a53bbb80a12adfe9c942c62599,2024-06-12T19:15:51.413000 CVE-2024-5812,0,0,d575f250532152186ae1730a95904983d1eeca8cedc4e48cf08c6f7cb36548d3,2024-06-11T16:15:29.207000 CVE-2024-5813,0,0,ce4a3354f5a4e16f73ac84191b89ae8910ac4de1cfa4c74cc4624e1e37872032,2024-06-11T16:15:29.480000 CVE-2024-5825,0,0,800930249192b4fb36871d2a50a6622621c6dfa5eae6376e2c2995741b4630b2,2024-06-11T10:15:13.960000 @@ -253676,14 +253685,14 @@ CVE-2024-5851,0,0,812870dd68f694f8cb7317d5a8b0b798b4c33892ccc0a6c22c4a632bb6af25 CVE-2024-5873,0,0,4affe4b1f71505ca05298a33c7e23c3ae147869580237755bed2d180fbea1b8e,2024-06-12T08:15:51.550000 CVE-2024-5891,0,0,81d9f8b71bacc11f5dc360efb1b0d50499697611b49f365c1b4a23895b7163be,2024-06-12T14:15:12.460000 CVE-2024-5892,0,0,aedbf3b6ff4f72315e0710a5e0053eef0159f2cd6280fed23810bd46e4afaad4,2024-06-12T06:15:09.473000 -CVE-2024-5893,0,0,75a17ab9c78de4e86da4ff51cb3473e6f5cc4487a936043b29cff71664107009,2024-06-12T15:15:53.393000 -CVE-2024-5894,0,0,7a3b9e35f82b06ba3832b29b7a4adfea2b9b21ad7b996e37db3c45efd09e4655,2024-06-12T15:15:53.693000 -CVE-2024-5895,0,0,ef4becbdaae8731d4c9d3f6a2de4c570b3a9c61f102e39b10564fa421edd1d54,2024-06-12T15:15:53.970000 -CVE-2024-5896,1,1,fcf5296c2788d50a4e3e3f6e2cb1498459d444e2a307e12bcb8876663fa70daa,2024-06-12T16:15:12.813000 -CVE-2024-5897,1,1,f9281e8cf1c734c32c576230787d605b9edc06b2bbd66417230ea66875c948d1,2024-06-12T16:15:13.100000 -CVE-2024-5898,1,1,a383de97f183d5da1095b93fb673284ec976562346d25b45514d64e83363d39b,2024-06-12T17:15:52.577000 -CVE-2024-5905,1,1,77997da49aa614d8a0b29e43ca0c737b0ef385d8943e3b4311ac9b2cbaa7e5d7,2024-06-12T17:15:52.847000 -CVE-2024-5906,1,1,8cc560f93bbe808a9ea853048fdaa00c673f479a1d2ddb7b71a9502e5a18ef3d,2024-06-12T17:15:53 -CVE-2024-5907,1,1,b53d98cdcb442fa876a10088ac4c90e01e6ec348ba1c48bed7649b88fa30b261,2024-06-12T17:15:53.127000 -CVE-2024-5908,1,1,d9b80954d4874d7eb96578d91cf708f9b239ec2d165443b371c1c3a363fdeeeb,2024-06-12T17:15:53.253000 -CVE-2024-5909,1,1,44931b98792dc6a4c493e85b21256417760100cc9456bc7c70bd1873ae28f015,2024-06-12T17:15:53.370000 +CVE-2024-5893,0,1,cd1f2f9d3efdbd0714e6b0dba5c49856728a754e5fed4715d568602a6cc603d6,2024-06-12T19:15:51.630000 +CVE-2024-5894,0,1,8f7ec1489337d411e2e28ce8b660f7843f4993f287b7fda9e6988c83d775a8d1,2024-06-12T19:15:51.733000 +CVE-2024-5895,0,1,c8c8d0a698456f581dc50ddcae3df40710f596b434923fc8cb2c1d15b642163e,2024-06-12T18:15:12.850000 +CVE-2024-5896,0,1,3ba518c4cbe886b53bc075aeb08f6187c1ef789e75ed11113a3676380d8f2841,2024-06-12T19:15:51.847000 +CVE-2024-5897,0,0,f9281e8cf1c734c32c576230787d605b9edc06b2bbd66417230ea66875c948d1,2024-06-12T16:15:13.100000 +CVE-2024-5898,0,0,a383de97f183d5da1095b93fb673284ec976562346d25b45514d64e83363d39b,2024-06-12T17:15:52.577000 +CVE-2024-5905,0,0,77997da49aa614d8a0b29e43ca0c737b0ef385d8943e3b4311ac9b2cbaa7e5d7,2024-06-12T17:15:52.847000 +CVE-2024-5906,0,0,8cc560f93bbe808a9ea853048fdaa00c673f479a1d2ddb7b71a9502e5a18ef3d,2024-06-12T17:15:53 +CVE-2024-5907,0,0,b53d98cdcb442fa876a10088ac4c90e01e6ec348ba1c48bed7649b88fa30b261,2024-06-12T17:15:53.127000 +CVE-2024-5908,0,0,d9b80954d4874d7eb96578d91cf708f9b239ec2d165443b371c1c3a363fdeeeb,2024-06-12T17:15:53.253000 +CVE-2024-5909,0,0,44931b98792dc6a4c493e85b21256417760100cc9456bc7c70bd1873ae28f015,2024-06-12T17:15:53.370000