diff --git a/CVE-2019/CVE-2019-205xx/CVE-2019-20503.json b/CVE-2019/CVE-2019-205xx/CVE-2019-20503.json index ae818cc59de..b0df85bf8ef 100644 --- a/CVE-2019/CVE-2019-205xx/CVE-2019-20503.json +++ b/CVE-2019/CVE-2019-205xx/CVE-2019-20503.json @@ -2,8 +2,8 @@ "id": "CVE-2019-20503", "sourceIdentifier": "cve@mitre.org", "published": "2020-03-06T20:15:12.470", - "lastModified": "2023-11-07T03:09:10.540", - "vulnStatus": "Modified", + "lastModified": "2024-06-27T12:46:37.940", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -85,8 +85,58 @@ { "vulnerable": true, "criteria": "cpe:2.3:a:usrsctp_project:usrsctp:*:*:*:*:*:*:*:*", - "versionEndExcluding": "2019-12-20", - "matchCriteriaId": "1DE09463-9EA6-49EF-BCBF-568BE6E965B8" + "versionEndExcluding": "0.9.4.0", + "matchCriteriaId": "AC7C5C51-883B-42D1-929B-322963CD728F" + } + ] + } + ] + }, + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", + "matchCriteriaId": "C11E6FB0-C8C0-4527-9AA0-CB9B316F8F43" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", + "matchCriteriaId": "DEECE5FC-CACF-4496-A3E7-164736409252" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*", + "matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73" + } + ] + } + ] + }, + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*", + "matchCriteriaId": "7A5301BF-1402-4BE0-A0F8-69FBE79BC6D6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:esm:*:*:*", + "matchCriteriaId": "B3293E55-5506-4587-A318-D1734F781C09" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*", + "matchCriteriaId": "A31C8344-3E02-4EB8-8BD8-4C84B7959624" } ] } @@ -96,51 +146,95 @@ "references": [ { "url": "http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00022.html", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00028.html", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00030.html", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00037.html", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "http://seclists.org/fulldisclosure/2020/May/49", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "http://seclists.org/fulldisclosure/2020/May/52", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "http://seclists.org/fulldisclosure/2020/May/55", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "http://seclists.org/fulldisclosure/2020/May/59", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "https://access.redhat.com/errata/RHSA-2020:0815", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://access.redhat.com/errata/RHSA-2020:0816", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://access.redhat.com/errata/RHSA-2020:0819", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://access.redhat.com/errata/RHSA-2020:0820", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://bugs.chromium.org/p/project-zero/issues/detail?id=1992", @@ -153,11 +247,17 @@ }, { "url": "https://chromereleases.googleblog.com/2020/03/stable-channel-update-for-desktop_18.html", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://crbug.com/1059349", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://github.com/sctplab/usrsctp/commit/790a7a2555aefb392a5a69923f1e9d17b4968467", @@ -169,91 +269,163 @@ }, { "url": "https://lists.debian.org/debian-lts-announce/2020/03/msg00013.html", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "https://lists.debian.org/debian-lts-announce/2020/03/msg00023.html", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "https://lists.debian.org/debian-lts-announce/2023/07/msg00003.html", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2DDNOAGIX5D77TTHT6YPMVJ5WTXTCQEI/", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6IOHSO6BUKC6I66J5PZOMAGFVJ66ZS57/", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JWANFIR3PYAL5RJQ4AO3ZS2DYMSF2ZGZ/", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "https://security.gentoo.org/glsa/202003-02", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://security.gentoo.org/glsa/202003-10", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://support.apple.com/HT211168", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://support.apple.com/HT211171", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://support.apple.com/HT211175", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://support.apple.com/HT211177", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://support.apple.com/kb/HT211168", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://support.apple.com/kb/HT211171", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://support.apple.com/kb/HT211175", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://support.apple.com/kb/HT211177", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://usn.ubuntu.com/4299-1/", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://usn.ubuntu.com/4328-1/", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://usn.ubuntu.com/4335-1/", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://www.debian.org/security/2020/dsa-4639", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://www.debian.org/security/2020/dsa-4642", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://www.debian.org/security/2020/dsa-4645", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2020/CVE-2020-144xx/CVE-2020-14409.json b/CVE-2020/CVE-2020-144xx/CVE-2020-14409.json index d649a150078..ec4e64cb1db 100644 --- a/CVE-2020/CVE-2020-144xx/CVE-2020-14409.json +++ b/CVE-2020/CVE-2020-144xx/CVE-2020-14409.json @@ -2,8 +2,8 @@ "id": "CVE-2020-14409", "sourceIdentifier": "cve@mitre.org", "published": "2021-01-19T20:15:12.207", - "lastModified": "2023-11-07T03:17:13.753", - "vulnStatus": "Modified", + "lastModified": "2024-06-27T12:46:22.753", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -89,8 +89,9 @@ { "vulnerable": true, "criteria": "cpe:2.3:a:libsdl:simple_directmedia_layer:*:*:*:*:*:*:*:*", - "versionEndIncluding": "2.0.12", - "matchCriteriaId": "A3D235A6-6725-4740-AF5C-761502DFB557" + "versionStartIncluding": "2.0.12", + "versionEndIncluding": "2.0.20", + "matchCriteriaId": "9E31AF92-F370-4233-9A36-40CB5DA3D1CA" } ] } @@ -194,11 +195,19 @@ }, { "url": "https://lists.debian.org/debian-lts-announce/2023/02/msg00008.html", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5FS32YCEJLQ2FYUWSWYI2ZMQWQEAWJNR/", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "https://security.gentoo.org/glsa/202107-55", diff --git a/CVE-2020/CVE-2020-144xx/CVE-2020-14410.json b/CVE-2020/CVE-2020-144xx/CVE-2020-14410.json index fd06c00b82b..0060a52b334 100644 --- a/CVE-2020/CVE-2020-144xx/CVE-2020-14410.json +++ b/CVE-2020/CVE-2020-144xx/CVE-2020-14410.json @@ -2,8 +2,8 @@ "id": "CVE-2020-14410", "sourceIdentifier": "cve@mitre.org", "published": "2021-01-19T20:15:12.287", - "lastModified": "2023-11-07T03:17:13.840", - "vulnStatus": "Modified", + "lastModified": "2024-06-27T12:46:48.873", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -85,8 +85,9 @@ { "vulnerable": true, "criteria": "cpe:2.3:a:libsdl:simple_directmedia_layer:*:*:*:*:*:*:*:*", - "versionEndIncluding": "2.0.12", - "matchCriteriaId": "A3D235A6-6725-4740-AF5C-761502DFB557" + "versionStartIncluding": "2.0.12", + "versionEndIncluding": "2.0.20", + "matchCriteriaId": "9E31AF92-F370-4233-9A36-40CB5DA3D1CA" } ] } @@ -150,11 +151,19 @@ }, { "url": "https://lists.debian.org/debian-lts-announce/2023/02/msg00008.html", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5FS32YCEJLQ2FYUWSWYI2ZMQWQEAWJNR/", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "https://security.gentoo.org/glsa/202107-55", diff --git a/CVE-2021/CVE-2021-336xx/CVE-2021-33630.json b/CVE-2021/CVE-2021-336xx/CVE-2021-33630.json index 6525c81c8f2..2fa53f46282 100644 --- a/CVE-2021/CVE-2021-336xx/CVE-2021-33630.json +++ b/CVE-2021/CVE-2021-336xx/CVE-2021-33630.json @@ -2,7 +2,7 @@ "id": "CVE-2021-33630", "sourceIdentifier": "securities@openeuler.org", "published": "2024-01-18T15:15:08.653", - "lastModified": "2024-02-03T03:15:07.753", + "lastModified": "2024-06-27T12:15:13.147", "vulnStatus": "Modified", "descriptions": [ { @@ -151,6 +151,10 @@ "Release Notes" ] }, + { + "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html", + "source": "securities@openeuler.org" + }, { "url": "https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2024-1030", "source": "securities@openeuler.org", diff --git a/CVE-2022/CVE-2022-486xx/CVE-2022-48627.json b/CVE-2022/CVE-2022-486xx/CVE-2022-48627.json index ae923739a47..5c3a81349f3 100644 --- a/CVE-2022/CVE-2022-486xx/CVE-2022-48627.json +++ b/CVE-2022/CVE-2022-486xx/CVE-2022-48627.json @@ -2,7 +2,7 @@ "id": "CVE-2022-48627", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-03-02T22:15:46.930", - "lastModified": "2024-04-13T12:15:10.870", + "lastModified": "2024-06-27T12:15:13.380", "vulnStatus": "Awaiting Analysis", "descriptions": [ { @@ -39,6 +39,10 @@ { "url": "https://git.kernel.org/stable/c/c8686c014b5e872ba7e334f33ca553f14446fc29", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-03xx/CVE-2023-0386.json b/CVE-2023/CVE-2023-03xx/CVE-2023-0386.json index 200b112b550..d8ff696a68e 100644 --- a/CVE-2023/CVE-2023-03xx/CVE-2023-0386.json +++ b/CVE-2023/CVE-2023-03xx/CVE-2023-0386.json @@ -2,8 +2,8 @@ "id": "CVE-2023-0386", "sourceIdentifier": "secalert@redhat.com", "published": "2023-03-22T21:15:18.090", - "lastModified": "2023-06-26T16:56:54.607", - "vulnStatus": "Analyzed", + "lastModified": "2024-06-27T12:15:13.477", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -132,6 +132,10 @@ "Third Party Advisory" ] }, + { + "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html", + "source": "secalert@redhat.com" + }, { "url": "https://security.netapp.com/advisory/ntap-20230420-0004/", "source": "secalert@redhat.com", diff --git a/CVE-2023/CVE-2023-268xx/CVE-2023-26877.json b/CVE-2023/CVE-2023-268xx/CVE-2023-26877.json index 4e924002da6..d5b28744d02 100644 --- a/CVE-2023/CVE-2023-268xx/CVE-2023-26877.json +++ b/CVE-2023/CVE-2023-268xx/CVE-2023-26877.json @@ -2,12 +2,16 @@ "id": "CVE-2023-26877", "sourceIdentifier": "cve@mitre.org", "published": "2024-06-26T20:15:14.777", - "lastModified": "2024-06-26T20:15:14.777", - "vulnStatus": "Received", + "lastModified": "2024-06-27T12:47:19.847", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", "value": "File upload vulnerability found in Softexpert Excellence Suite v.2.1 allows attackers to execute arbitrary code via a .php file upload to the form/efms_exec_html/file_upload_parser.php endpoint." + }, + { + "lang": "es", + "value": "Vulnerabilidad de carga de archivos encontrada en Softexpert Excellence Suite v.2.1 permite a atacantes ejecutar c\u00f3digo arbitrario mediante la carga de un archivo .php al endpoint form/efms_exec_html/file_upload_parser.php." } ], "metrics": {}, diff --git a/CVE-2023/CVE-2023-468xx/CVE-2023-46838.json b/CVE-2023/CVE-2023-468xx/CVE-2023-46838.json index 52c52b58aa1..96cb23d6645 100644 --- a/CVE-2023/CVE-2023-468xx/CVE-2023-46838.json +++ b/CVE-2023/CVE-2023-468xx/CVE-2023-46838.json @@ -2,7 +2,7 @@ "id": "CVE-2023-46838", "sourceIdentifier": "security@xen.org", "published": "2024-01-29T11:15:07.933", - "lastModified": "2024-06-25T21:15:51.243", + "lastModified": "2024-06-27T12:15:13.670", "vulnStatus": "Modified", "descriptions": [ { @@ -94,6 +94,10 @@ "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00016.html", "source": "security@xen.org" }, + { + "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html", + "source": "security@xen.org" + }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RGEKT4DKSDXDS34EL7M4UVJMMPH7Z3ZZ/", "source": "security@xen.org", diff --git a/CVE-2023/CVE-2023-472xx/CVE-2023-47233.json b/CVE-2023/CVE-2023-472xx/CVE-2023-47233.json index 5cf073f224e..a858e28f118 100644 --- a/CVE-2023/CVE-2023-472xx/CVE-2023-47233.json +++ b/CVE-2023/CVE-2023-472xx/CVE-2023-47233.json @@ -2,7 +2,7 @@ "id": "CVE-2023-47233", "sourceIdentifier": "cve@mitre.org", "published": "2023-11-03T21:15:17.360", - "lastModified": "2024-06-25T22:15:14.267", + "lastModified": "2024-06-27T13:15:52.623", "vulnStatus": "Modified", "descriptions": [ { @@ -85,6 +85,10 @@ "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html", "source": "cve@mitre.org" }, + { + "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html", + "source": "cve@mitre.org" + }, { "url": "https://lore.kernel.org/all/20231104054709.716585-1-zyytlz.wz%40163.com/", "source": "cve@mitre.org", diff --git a/CVE-2023/CVE-2023-524xx/CVE-2023-52429.json b/CVE-2023/CVE-2023-524xx/CVE-2023-52429.json index 657e20bd940..19cf533ce02 100644 --- a/CVE-2023/CVE-2023-524xx/CVE-2023-52429.json +++ b/CVE-2023/CVE-2023-524xx/CVE-2023-52429.json @@ -2,7 +2,7 @@ "id": "CVE-2023-52429", "sourceIdentifier": "cve@mitre.org", "published": "2024-02-12T03:15:32.573", - "lastModified": "2024-06-25T22:15:14.433", + "lastModified": "2024-06-27T12:15:13.797", "vulnStatus": "Modified", "descriptions": [ { @@ -129,6 +129,10 @@ "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html", "source": "cve@mitre.org" }, + { + "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html", + "source": "cve@mitre.org" + }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3LZROQAX7Q7LEP4F7WQ3KUZKWCZGFFP2/", "source": "cve@mitre.org", diff --git a/CVE-2023/CVE-2023-524xx/CVE-2023-52436.json b/CVE-2023/CVE-2023-524xx/CVE-2023-52436.json index 7c20df07ceb..315505a94c6 100644 --- a/CVE-2023/CVE-2023-524xx/CVE-2023-52436.json +++ b/CVE-2023/CVE-2023-524xx/CVE-2023-52436.json @@ -2,7 +2,7 @@ "id": "CVE-2023-52436", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-02-20T21:15:08.060", - "lastModified": "2024-06-25T21:15:51.747", + "lastModified": "2024-06-27T12:15:14.000", "vulnStatus": "Modified", "descriptions": [ { @@ -170,6 +170,10 @@ { "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00016.html", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-524xx/CVE-2023-52439.json b/CVE-2023/CVE-2023-524xx/CVE-2023-52439.json index 213045d3fb4..e91963094db 100644 --- a/CVE-2023/CVE-2023-524xx/CVE-2023-52439.json +++ b/CVE-2023/CVE-2023-524xx/CVE-2023-52439.json @@ -2,7 +2,7 @@ "id": "CVE-2023-52439", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-02-20T21:15:08.213", - "lastModified": "2024-06-25T21:15:51.947", + "lastModified": "2024-06-27T12:15:14.160", "vulnStatus": "Modified", "descriptions": [ { @@ -196,6 +196,10 @@ { "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00016.html", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-524xx/CVE-2023-52443.json b/CVE-2023/CVE-2023-524xx/CVE-2023-52443.json index b15f78e886a..a3faf72e259 100644 --- a/CVE-2023/CVE-2023-524xx/CVE-2023-52443.json +++ b/CVE-2023/CVE-2023-524xx/CVE-2023-52443.json @@ -2,7 +2,7 @@ "id": "CVE-2023-52443", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-02-22T17:15:08.377", - "lastModified": "2024-06-25T21:15:52.040", + "lastModified": "2024-06-27T12:15:14.257", "vulnStatus": "Modified", "descriptions": [ { @@ -170,6 +170,10 @@ { "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00016.html", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-524xx/CVE-2023-52444.json b/CVE-2023/CVE-2023-524xx/CVE-2023-52444.json index 84f04f12cc8..936c2817b8d 100644 --- a/CVE-2023/CVE-2023-524xx/CVE-2023-52444.json +++ b/CVE-2023/CVE-2023-524xx/CVE-2023-52444.json @@ -2,7 +2,7 @@ "id": "CVE-2023-52444", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-02-22T17:15:08.430", - "lastModified": "2024-06-25T21:15:52.147", + "lastModified": "2024-06-27T12:15:14.353", "vulnStatus": "Modified", "descriptions": [ { @@ -171,6 +171,10 @@ { "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00016.html", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-524xx/CVE-2023-52445.json b/CVE-2023/CVE-2023-524xx/CVE-2023-52445.json index d619550f500..27c14f26972 100644 --- a/CVE-2023/CVE-2023-524xx/CVE-2023-52445.json +++ b/CVE-2023/CVE-2023-524xx/CVE-2023-52445.json @@ -2,7 +2,7 @@ "id": "CVE-2023-52445", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-02-22T17:15:08.477", - "lastModified": "2024-06-25T21:15:52.267", + "lastModified": "2024-06-27T12:15:14.443", "vulnStatus": "Modified", "descriptions": [ { @@ -170,6 +170,10 @@ { "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00016.html", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-524xx/CVE-2023-52449.json b/CVE-2023/CVE-2023-524xx/CVE-2023-52449.json index 3e2ca3c8b59..6213344bb7d 100644 --- a/CVE-2023/CVE-2023-524xx/CVE-2023-52449.json +++ b/CVE-2023/CVE-2023-524xx/CVE-2023-52449.json @@ -2,7 +2,7 @@ "id": "CVE-2023-52449", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-02-22T17:15:08.677", - "lastModified": "2024-06-25T21:15:52.493", + "lastModified": "2024-06-27T12:15:14.537", "vulnStatus": "Modified", "descriptions": [ { @@ -171,6 +171,10 @@ { "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00016.html", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-524xx/CVE-2023-52464.json b/CVE-2023/CVE-2023-524xx/CVE-2023-52464.json index a4849fb3100..d0cf2cd7ebf 100644 --- a/CVE-2023/CVE-2023-524xx/CVE-2023-52464.json +++ b/CVE-2023/CVE-2023-524xx/CVE-2023-52464.json @@ -2,7 +2,7 @@ "id": "CVE-2023-52464", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-02-23T15:15:08.647", - "lastModified": "2024-06-25T21:15:53.253", + "lastModified": "2024-06-27T13:15:52.907", "vulnStatus": "Modified", "descriptions": [ { @@ -171,6 +171,10 @@ { "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00016.html", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-524xx/CVE-2023-52469.json b/CVE-2023/CVE-2023-524xx/CVE-2023-52469.json index c0d8e10f257..a31e1028080 100644 --- a/CVE-2023/CVE-2023-524xx/CVE-2023-52469.json +++ b/CVE-2023/CVE-2023-524xx/CVE-2023-52469.json @@ -2,7 +2,7 @@ "id": "CVE-2023-52469", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-02-26T16:27:48.767", - "lastModified": "2024-06-25T21:15:53.473", + "lastModified": "2024-06-27T13:15:53.007", "vulnStatus": "Modified", "descriptions": [ { @@ -171,6 +171,10 @@ { "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00016.html", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-524xx/CVE-2023-52470.json b/CVE-2023/CVE-2023-524xx/CVE-2023-52470.json index cfce5def61c..4e29905734e 100644 --- a/CVE-2023/CVE-2023-524xx/CVE-2023-52470.json +++ b/CVE-2023/CVE-2023-524xx/CVE-2023-52470.json @@ -2,7 +2,7 @@ "id": "CVE-2023-52470", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-02-26T16:27:48.820", - "lastModified": "2024-06-25T21:15:53.603", + "lastModified": "2024-06-27T13:15:53.093", "vulnStatus": "Modified", "descriptions": [ { @@ -171,6 +171,10 @@ { "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00016.html", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-524xx/CVE-2023-52486.json b/CVE-2023/CVE-2023-524xx/CVE-2023-52486.json index 1c3e0dd8c78..b2d9b75888a 100644 --- a/CVE-2023/CVE-2023-524xx/CVE-2023-52486.json +++ b/CVE-2023/CVE-2023-524xx/CVE-2023-52486.json @@ -2,7 +2,7 @@ "id": "CVE-2023-52486", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-03-11T18:15:16.427", - "lastModified": "2024-06-25T23:15:22.230", + "lastModified": "2024-06-27T13:15:53.220", "vulnStatus": "Awaiting Analysis", "descriptions": [ { @@ -51,6 +51,10 @@ { "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-525xx/CVE-2023-52583.json b/CVE-2023/CVE-2023-525xx/CVE-2023-52583.json index 833aaa615fd..05ddab37dd0 100644 --- a/CVE-2023/CVE-2023-525xx/CVE-2023-52583.json +++ b/CVE-2023/CVE-2023-525xx/CVE-2023-52583.json @@ -2,7 +2,7 @@ "id": "CVE-2023-52583", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-03-06T07:15:06.553", - "lastModified": "2024-06-25T23:15:22.357", + "lastModified": "2024-06-27T13:15:53.290", "vulnStatus": "Awaiting Analysis", "descriptions": [ { @@ -51,6 +51,10 @@ { "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-525xx/CVE-2023-52587.json b/CVE-2023/CVE-2023-525xx/CVE-2023-52587.json index bf14ddc128d..8a65f4b2888 100644 --- a/CVE-2023/CVE-2023-525xx/CVE-2023-52587.json +++ b/CVE-2023/CVE-2023-525xx/CVE-2023-52587.json @@ -2,7 +2,7 @@ "id": "CVE-2023-52587", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-03-06T07:15:07.633", - "lastModified": "2024-06-25T23:15:22.417", + "lastModified": "2024-06-27T12:15:14.760", "vulnStatus": "Awaiting Analysis", "descriptions": [ { @@ -51,6 +51,10 @@ { "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-525xx/CVE-2023-52594.json b/CVE-2023/CVE-2023-525xx/CVE-2023-52594.json index 2cfedbbfa61..de246d9c5cc 100644 --- a/CVE-2023/CVE-2023-525xx/CVE-2023-52594.json +++ b/CVE-2023/CVE-2023-525xx/CVE-2023-52594.json @@ -2,7 +2,7 @@ "id": "CVE-2023-52594", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-03-06T07:15:09.200", - "lastModified": "2024-06-25T23:15:22.490", + "lastModified": "2024-06-27T12:15:14.887", "vulnStatus": "Awaiting Analysis", "descriptions": [ { @@ -51,6 +51,10 @@ { "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-525xx/CVE-2023-52599.json b/CVE-2023/CVE-2023-525xx/CVE-2023-52599.json index a33cd43622c..eeb9457b814 100644 --- a/CVE-2023/CVE-2023-525xx/CVE-2023-52599.json +++ b/CVE-2023/CVE-2023-525xx/CVE-2023-52599.json @@ -2,7 +2,7 @@ "id": "CVE-2023-52599", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-03-06T07:15:10.210", - "lastModified": "2024-06-25T21:15:53.783", + "lastModified": "2024-06-27T12:15:14.960", "vulnStatus": "Awaiting Analysis", "descriptions": [ { @@ -51,6 +51,10 @@ { "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-526xx/CVE-2023-52600.json b/CVE-2023/CVE-2023-526xx/CVE-2023-52600.json index 8bf43859aeb..1d2920fee75 100644 --- a/CVE-2023/CVE-2023-526xx/CVE-2023-52600.json +++ b/CVE-2023/CVE-2023-526xx/CVE-2023-52600.json @@ -2,7 +2,7 @@ "id": "CVE-2023-52600", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-03-06T07:15:10.497", - "lastModified": "2024-06-25T23:15:22.747", + "lastModified": "2024-06-27T12:15:15.037", "vulnStatus": "Awaiting Analysis", "descriptions": [ { @@ -51,6 +51,10 @@ { "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-526xx/CVE-2023-52601.json b/CVE-2023/CVE-2023-526xx/CVE-2023-52601.json index bdd7e9404b5..ab9f3fb8f63 100644 --- a/CVE-2023/CVE-2023-526xx/CVE-2023-52601.json +++ b/CVE-2023/CVE-2023-526xx/CVE-2023-52601.json @@ -2,7 +2,7 @@ "id": "CVE-2023-52601", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-03-06T07:15:10.680", - "lastModified": "2024-06-25T22:15:15.490", + "lastModified": "2024-06-27T12:15:15.180", "vulnStatus": "Awaiting Analysis", "descriptions": [ { @@ -51,6 +51,10 @@ { "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-526xx/CVE-2023-52602.json b/CVE-2023/CVE-2023-526xx/CVE-2023-52602.json index d5595b18417..baee3df8ffa 100644 --- a/CVE-2023/CVE-2023-526xx/CVE-2023-52602.json +++ b/CVE-2023/CVE-2023-526xx/CVE-2023-52602.json @@ -2,7 +2,7 @@ "id": "CVE-2023-52602", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-03-06T07:15:10.883", - "lastModified": "2024-06-25T22:15:15.563", + "lastModified": "2024-06-27T12:15:15.283", "vulnStatus": "Awaiting Analysis", "descriptions": [ { @@ -51,6 +51,10 @@ { "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-526xx/CVE-2023-52603.json b/CVE-2023/CVE-2023-526xx/CVE-2023-52603.json index 5cab3eb2aeb..3146db26b4e 100644 --- a/CVE-2023/CVE-2023-526xx/CVE-2023-52603.json +++ b/CVE-2023/CVE-2023-526xx/CVE-2023-52603.json @@ -2,7 +2,7 @@ "id": "CVE-2023-52603", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-03-06T07:15:11.120", - "lastModified": "2024-06-25T22:15:15.640", + "lastModified": "2024-06-27T13:15:53.370", "vulnStatus": "Awaiting Analysis", "descriptions": [ { @@ -51,6 +51,10 @@ { "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-526xx/CVE-2023-52604.json b/CVE-2023/CVE-2023-526xx/CVE-2023-52604.json index f64f7eb4599..28a3ed5a411 100644 --- a/CVE-2023/CVE-2023-526xx/CVE-2023-52604.json +++ b/CVE-2023/CVE-2023-526xx/CVE-2023-52604.json @@ -2,7 +2,7 @@ "id": "CVE-2023-52604", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-03-06T07:15:11.347", - "lastModified": "2024-06-25T22:15:15.713", + "lastModified": "2024-06-27T12:15:15.360", "vulnStatus": "Awaiting Analysis", "descriptions": [ { @@ -51,6 +51,10 @@ { "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-526xx/CVE-2023-52609.json b/CVE-2023/CVE-2023-526xx/CVE-2023-52609.json index a5983500f20..388778c8d6b 100644 --- a/CVE-2023/CVE-2023-526xx/CVE-2023-52609.json +++ b/CVE-2023/CVE-2023-526xx/CVE-2023-52609.json @@ -2,7 +2,7 @@ "id": "CVE-2023-52609", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-03-18T11:15:07.743", - "lastModified": "2024-06-25T21:15:53.910", + "lastModified": "2024-06-27T12:15:15.430", "vulnStatus": "Awaiting Analysis", "descriptions": [ { @@ -51,6 +51,10 @@ { "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00016.html", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-526xx/CVE-2023-52612.json b/CVE-2023/CVE-2023-526xx/CVE-2023-52612.json index 4d82d34d85b..75a9d6db807 100644 --- a/CVE-2023/CVE-2023-526xx/CVE-2023-52612.json +++ b/CVE-2023/CVE-2023-526xx/CVE-2023-52612.json @@ -2,7 +2,7 @@ "id": "CVE-2023-52612", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-03-18T11:15:08.317", - "lastModified": "2024-06-25T21:15:54.010", + "lastModified": "2024-06-27T13:15:53.470", "vulnStatus": "Awaiting Analysis", "descriptions": [ { @@ -51,6 +51,10 @@ { "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00016.html", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-526xx/CVE-2023-52615.json b/CVE-2023/CVE-2023-526xx/CVE-2023-52615.json index 0421d28b7a5..7d7e01c0dbf 100644 --- a/CVE-2023/CVE-2023-526xx/CVE-2023-52615.json +++ b/CVE-2023/CVE-2023-526xx/CVE-2023-52615.json @@ -2,7 +2,7 @@ "id": "CVE-2023-52615", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-03-18T11:15:08.797", - "lastModified": "2024-06-25T22:15:15.897", + "lastModified": "2024-06-27T12:15:15.583", "vulnStatus": "Awaiting Analysis", "descriptions": [ { @@ -51,6 +51,10 @@ { "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-526xx/CVE-2023-52619.json b/CVE-2023/CVE-2023-526xx/CVE-2023-52619.json index 645eba7b9f2..fe9aa2ac1bf 100644 --- a/CVE-2023/CVE-2023-526xx/CVE-2023-52619.json +++ b/CVE-2023/CVE-2023-526xx/CVE-2023-52619.json @@ -2,7 +2,7 @@ "id": "CVE-2023-52619", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-03-18T11:15:09.170", - "lastModified": "2024-06-25T22:15:16.180", + "lastModified": "2024-06-27T12:15:15.680", "vulnStatus": "Awaiting Analysis", "descriptions": [ { @@ -51,6 +51,10 @@ { "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-526xx/CVE-2023-52620.json b/CVE-2023/CVE-2023-526xx/CVE-2023-52620.json index f49753ba35e..b958d980c23 100644 --- a/CVE-2023/CVE-2023-526xx/CVE-2023-52620.json +++ b/CVE-2023/CVE-2023-526xx/CVE-2023-52620.json @@ -2,7 +2,7 @@ "id": "CVE-2023-52620", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-03-21T11:15:28.230", - "lastModified": "2024-06-25T22:15:16.247", + "lastModified": "2024-06-27T12:15:15.823", "vulnStatus": "Awaiting Analysis", "descriptions": [ { @@ -43,6 +43,10 @@ { "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-526xx/CVE-2023-52622.json b/CVE-2023/CVE-2023-526xx/CVE-2023-52622.json index a6e36251bef..cb2996407b8 100644 --- a/CVE-2023/CVE-2023-526xx/CVE-2023-52622.json +++ b/CVE-2023/CVE-2023-526xx/CVE-2023-52622.json @@ -2,7 +2,7 @@ "id": "CVE-2023-52622", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-03-26T18:15:08.873", - "lastModified": "2024-06-25T22:15:16.363", + "lastModified": "2024-06-27T13:15:53.560", "vulnStatus": "Awaiting Analysis", "descriptions": [ { @@ -51,6 +51,10 @@ { "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-526xx/CVE-2023-52623.json b/CVE-2023/CVE-2023-526xx/CVE-2023-52623.json index b8fb3eba525..6117f21f187 100644 --- a/CVE-2023/CVE-2023-526xx/CVE-2023-52623.json +++ b/CVE-2023/CVE-2023-526xx/CVE-2023-52623.json @@ -2,7 +2,7 @@ "id": "CVE-2023-52623", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-03-26T18:15:08.930", - "lastModified": "2024-06-25T21:15:54.097", + "lastModified": "2024-06-27T13:15:53.653", "vulnStatus": "Awaiting Analysis", "descriptions": [ { @@ -51,6 +51,10 @@ { "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-526xx/CVE-2023-52628.json b/CVE-2023/CVE-2023-526xx/CVE-2023-52628.json index 7d0d47cfa4d..99bbed1f932 100644 --- a/CVE-2023/CVE-2023-526xx/CVE-2023-52628.json +++ b/CVE-2023/CVE-2023-526xx/CVE-2023-52628.json @@ -2,7 +2,7 @@ "id": "CVE-2023-52628", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-03-28T08:15:25.980", - "lastModified": "2024-06-16T13:15:51.227", + "lastModified": "2024-06-27T12:15:15.893", "vulnStatus": "Awaiting Analysis", "descriptions": [ { @@ -39,6 +39,10 @@ { "url": "https://git.kernel.org/stable/c/fd94d9dadee58e09b49075240fe83423eb1dcd36", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-526xx/CVE-2023-52644.json b/CVE-2023/CVE-2023-526xx/CVE-2023-52644.json index 4058a822bae..7a9a06187ff 100644 --- a/CVE-2023/CVE-2023-526xx/CVE-2023-52644.json +++ b/CVE-2023/CVE-2023-526xx/CVE-2023-52644.json @@ -2,7 +2,7 @@ "id": "CVE-2023-52644", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-04-17T11:15:08.210", - "lastModified": "2024-06-25T21:15:54.213", + "lastModified": "2024-06-27T12:15:15.970", "vulnStatus": "Awaiting Analysis", "descriptions": [ { @@ -55,6 +55,10 @@ { "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-526xx/CVE-2023-52650.json b/CVE-2023/CVE-2023-526xx/CVE-2023-52650.json index 646d01c69e8..ab7df7e7abb 100644 --- a/CVE-2023/CVE-2023-526xx/CVE-2023-52650.json +++ b/CVE-2023/CVE-2023-526xx/CVE-2023-52650.json @@ -2,7 +2,7 @@ "id": "CVE-2023-52650", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-05-01T13:15:48.323", - "lastModified": "2024-06-25T23:15:23.023", + "lastModified": "2024-06-27T13:15:53.750", "vulnStatus": "Awaiting Analysis", "descriptions": [ { @@ -55,6 +55,10 @@ { "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-526xx/CVE-2023-52670.json b/CVE-2023/CVE-2023-526xx/CVE-2023-52670.json index 6b978e7247e..ab02eaa112f 100644 --- a/CVE-2023/CVE-2023-526xx/CVE-2023-52670.json +++ b/CVE-2023/CVE-2023-526xx/CVE-2023-52670.json @@ -2,7 +2,7 @@ "id": "CVE-2023-52670", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-05-17T14:15:10.057", - "lastModified": "2024-06-25T22:15:16.820", + "lastModified": "2024-06-27T13:15:53.823", "vulnStatus": "Awaiting Analysis", "descriptions": [ { @@ -51,6 +51,10 @@ { "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-526xx/CVE-2023-52679.json b/CVE-2023/CVE-2023-526xx/CVE-2023-52679.json index 8fa9a797fcc..d0d49ed60c3 100644 --- a/CVE-2023/CVE-2023-526xx/CVE-2023-52679.json +++ b/CVE-2023/CVE-2023-526xx/CVE-2023-52679.json @@ -2,7 +2,7 @@ "id": "CVE-2023-52679", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-05-17T15:15:19.207", - "lastModified": "2024-06-25T21:15:54.403", + "lastModified": "2024-06-27T12:15:16.100", "vulnStatus": "Awaiting Analysis", "descriptions": [ { @@ -51,6 +51,10 @@ { "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00016.html", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-526xx/CVE-2023-52683.json b/CVE-2023/CVE-2023-526xx/CVE-2023-52683.json index 9b3b359d6e1..519575eab5e 100644 --- a/CVE-2023/CVE-2023-526xx/CVE-2023-52683.json +++ b/CVE-2023/CVE-2023-526xx/CVE-2023-52683.json @@ -2,7 +2,7 @@ "id": "CVE-2023-52683", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-05-17T15:15:19.503", - "lastModified": "2024-06-25T21:15:54.480", + "lastModified": "2024-06-27T12:15:16.183", "vulnStatus": "Awaiting Analysis", "descriptions": [ { @@ -51,6 +51,10 @@ { "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00016.html", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-526xx/CVE-2023-52691.json b/CVE-2023/CVE-2023-526xx/CVE-2023-52691.json index 924d9eac85a..e0879d78c79 100644 --- a/CVE-2023/CVE-2023-526xx/CVE-2023-52691.json +++ b/CVE-2023/CVE-2023-526xx/CVE-2023-52691.json @@ -2,7 +2,7 @@ "id": "CVE-2023-52691", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-05-17T15:15:20.120", - "lastModified": "2024-06-25T21:15:54.753", + "lastModified": "2024-06-27T13:15:53.900", "vulnStatus": "Awaiting Analysis", "descriptions": [ { @@ -51,6 +51,10 @@ { "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00016.html", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-526xx/CVE-2023-52693.json b/CVE-2023/CVE-2023-526xx/CVE-2023-52693.json index 8af558308fb..4ce17a016e1 100644 --- a/CVE-2023/CVE-2023-526xx/CVE-2023-52693.json +++ b/CVE-2023/CVE-2023-526xx/CVE-2023-52693.json @@ -2,7 +2,7 @@ "id": "CVE-2023-52693", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-05-17T15:15:20.273", - "lastModified": "2024-06-25T21:15:54.840", + "lastModified": "2024-06-27T12:15:16.257", "vulnStatus": "Awaiting Analysis", "descriptions": [ { @@ -51,6 +51,10 @@ { "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00016.html", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-526xx/CVE-2023-52698.json b/CVE-2023/CVE-2023-526xx/CVE-2023-52698.json index b7499569671..adfe2ddedb3 100644 --- a/CVE-2023/CVE-2023-526xx/CVE-2023-52698.json +++ b/CVE-2023/CVE-2023-526xx/CVE-2023-52698.json @@ -2,7 +2,7 @@ "id": "CVE-2023-52698", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-05-17T15:15:20.693", - "lastModified": "2024-06-25T21:15:55.190", + "lastModified": "2024-06-27T12:15:16.323", "vulnStatus": "Awaiting Analysis", "descriptions": [ { @@ -51,6 +51,10 @@ { "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00016.html", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-526xx/CVE-2023-52699.json b/CVE-2023/CVE-2023-526xx/CVE-2023-52699.json index 8114d53e772..d462358be48 100644 --- a/CVE-2023/CVE-2023-526xx/CVE-2023-52699.json +++ b/CVE-2023/CVE-2023-526xx/CVE-2023-52699.json @@ -2,7 +2,7 @@ "id": "CVE-2023-52699", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-05-19T11:15:47.507", - "lastModified": "2024-06-25T22:15:16.963", + "lastModified": "2024-06-27T13:15:53.990", "vulnStatus": "Awaiting Analysis", "descriptions": [ { @@ -51,6 +51,10 @@ { "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-528xx/CVE-2023-52880.json b/CVE-2023/CVE-2023-528xx/CVE-2023-52880.json index 676c4cc25b0..c15d6899183 100644 --- a/CVE-2023/CVE-2023-528xx/CVE-2023-52880.json +++ b/CVE-2023/CVE-2023-528xx/CVE-2023-52880.json @@ -2,7 +2,7 @@ "id": "CVE-2023-52880", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-05-24T16:15:10.033", - "lastModified": "2024-06-25T22:15:17.027", + "lastModified": "2024-06-27T12:15:16.400", "vulnStatus": "Awaiting Analysis", "descriptions": [ { @@ -43,6 +43,10 @@ { "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-59xx/CVE-2023-5981.json b/CVE-2023/CVE-2023-59xx/CVE-2023-5981.json index f82820733c5..a6ad1f017d7 100644 --- a/CVE-2023/CVE-2023-59xx/CVE-2023-5981.json +++ b/CVE-2023/CVE-2023-59xx/CVE-2023-5981.json @@ -2,7 +2,7 @@ "id": "CVE-2023-5981", "sourceIdentifier": "secalert@redhat.com", "published": "2023-11-28T12:15:07.040", - "lastModified": "2024-02-09T03:15:09.133", + "lastModified": "2024-06-27T12:15:16.477", "vulnStatus": "Modified", "descriptions": [ { @@ -162,6 +162,10 @@ "url": "https://access.redhat.com/errata/RHSA-2024:0533", "source": "secalert@redhat.com" }, + { + "url": "https://access.redhat.com/errata/RHSA-2024:1383", + "source": "secalert@redhat.com" + }, { "url": "https://access.redhat.com/security/cve/CVE-2023-5981", "source": "secalert@redhat.com", diff --git a/CVE-2023/CVE-2023-60xx/CVE-2023-6040.json b/CVE-2023/CVE-2023-60xx/CVE-2023-6040.json index d73f71c76be..16cb7cd6877 100644 --- a/CVE-2023/CVE-2023-60xx/CVE-2023-6040.json +++ b/CVE-2023/CVE-2023-60xx/CVE-2023-6040.json @@ -2,7 +2,7 @@ "id": "CVE-2023-6040", "sourceIdentifier": "security@ubuntu.com", "published": "2024-01-12T02:15:44.683", - "lastModified": "2024-06-25T21:15:55.370", + "lastModified": "2024-06-27T13:15:54.080", "vulnStatus": "Modified", "descriptions": [ { @@ -123,6 +123,10 @@ "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00016.html", "source": "security@ubuntu.com" }, + { + "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html", + "source": "security@ubuntu.com" + }, { "url": "https://www.openwall.com/lists/oss-security/2024/01/12/1", "source": "security@ubuntu.com", diff --git a/CVE-2023/CVE-2023-62xx/CVE-2023-6270.json b/CVE-2023/CVE-2023-62xx/CVE-2023-6270.json index ba6e60bad91..265a58017ee 100644 --- a/CVE-2023/CVE-2023-62xx/CVE-2023-6270.json +++ b/CVE-2023/CVE-2023-62xx/CVE-2023-6270.json @@ -2,7 +2,7 @@ "id": "CVE-2023-6270", "sourceIdentifier": "secalert@redhat.com", "published": "2024-01-04T17:15:08.803", - "lastModified": "2024-06-25T22:15:17.100", + "lastModified": "2024-06-27T13:15:54.233", "vulnStatus": "Modified", "descriptions": [ { @@ -131,6 +131,10 @@ { "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html", "source": "secalert@redhat.com" + }, + { + "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html", + "source": "secalert@redhat.com" } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-70xx/CVE-2023-7042.json b/CVE-2023/CVE-2023-70xx/CVE-2023-7042.json index c5d0ec887af..d50e2759e4e 100644 --- a/CVE-2023/CVE-2023-70xx/CVE-2023-7042.json +++ b/CVE-2023/CVE-2023-70xx/CVE-2023-7042.json @@ -2,7 +2,7 @@ "id": "CVE-2023-7042", "sourceIdentifier": "secalert@redhat.com", "published": "2023-12-21T20:15:09.267", - "lastModified": "2024-06-25T22:15:17.243", + "lastModified": "2024-06-27T12:15:16.857", "vulnStatus": "Modified", "descriptions": [ { @@ -118,6 +118,10 @@ "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html", "source": "secalert@redhat.com" }, + { + "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html", + "source": "secalert@redhat.com" + }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/54PLF5J33IRSLSR4UU6LQSMXX6FI5AOQ/", "source": "secalert@redhat.com" diff --git a/CVE-2023/CVE-2023-72xx/CVE-2023-7270.json b/CVE-2023/CVE-2023-72xx/CVE-2023-7270.json index c3601df6bff..62367bedb34 100644 --- a/CVE-2023/CVE-2023-72xx/CVE-2023-7270.json +++ b/CVE-2023/CVE-2023-72xx/CVE-2023-7270.json @@ -2,8 +2,8 @@ "id": "CVE-2023-7270", "sourceIdentifier": "551230f0-3615-47bd-b7cc-93e92e730bbf", "published": "2024-06-27T10:15:10.240", - "lastModified": "2024-06-27T10:15:10.240", - "vulnStatus": "Received", + "lastModified": "2024-06-27T12:47:19.847", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-03xx/CVE-2024-0340.json b/CVE-2024/CVE-2024-03xx/CVE-2024-0340.json index c334b8a4828..e6eb98159a5 100644 --- a/CVE-2024/CVE-2024-03xx/CVE-2024-0340.json +++ b/CVE-2024/CVE-2024-03xx/CVE-2024-0340.json @@ -2,7 +2,7 @@ "id": "CVE-2024-0340", "sourceIdentifier": "secalert@redhat.com", "published": "2024-01-09T18:15:47.503", - "lastModified": "2024-06-25T23:15:23.220", + "lastModified": "2024-06-27T13:15:54.380", "vulnStatus": "Modified", "descriptions": [ { @@ -152,6 +152,10 @@ "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html", "source": "secalert@redhat.com" }, + { + "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html", + "source": "secalert@redhat.com" + }, { "url": "https://lore.kernel.org/lkml/5kn47peabxjrptkqa6dwtyus35ahf4pcj4qm4pumse33kxqpjw@mec4se5relrc/T/", "source": "secalert@redhat.com", diff --git a/CVE-2024/CVE-2024-05xx/CVE-2024-0553.json b/CVE-2024/CVE-2024-05xx/CVE-2024-0553.json index 637ad5cf933..e0e52fea3a8 100644 --- a/CVE-2024/CVE-2024-05xx/CVE-2024-0553.json +++ b/CVE-2024/CVE-2024-05xx/CVE-2024-0553.json @@ -2,7 +2,7 @@ "id": "CVE-2024-0553", "sourceIdentifier": "secalert@redhat.com", "published": "2024-01-16T12:15:45.557", - "lastModified": "2024-03-25T18:15:08.443", + "lastModified": "2024-06-27T12:15:17.037", "vulnStatus": "Modified", "descriptions": [ { @@ -162,6 +162,10 @@ "url": "https://access.redhat.com/errata/RHSA-2024:1108", "source": "secalert@redhat.com" }, + { + "url": "https://access.redhat.com/errata/RHSA-2024:1383", + "source": "secalert@redhat.com" + }, { "url": "https://access.redhat.com/security/cve/CVE-2024-0553", "source": "secalert@redhat.com", diff --git a/CVE-2024/CVE-2024-05xx/CVE-2024-0567.json b/CVE-2024/CVE-2024-05xx/CVE-2024-0567.json index 91b4fb5c9c1..5972a362a68 100644 --- a/CVE-2024/CVE-2024-05xx/CVE-2024-0567.json +++ b/CVE-2024/CVE-2024-05xx/CVE-2024-0567.json @@ -2,8 +2,8 @@ "id": "CVE-2024-0567", "sourceIdentifier": "secalert@redhat.com", "published": "2024-01-16T14:15:48.527", - "lastModified": "2024-06-10T19:18:32.897", - "vulnStatus": "Analyzed", + "lastModified": "2024-06-27T12:15:17.343", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -172,6 +172,10 @@ "Third Party Advisory" ] }, + { + "url": "https://access.redhat.com/errata/RHSA-2024:1383", + "source": "secalert@redhat.com" + }, { "url": "https://access.redhat.com/security/cve/CVE-2024-0567", "source": "secalert@redhat.com", diff --git a/CVE-2024/CVE-2024-06xx/CVE-2024-0607.json b/CVE-2024/CVE-2024-06xx/CVE-2024-0607.json index a3a65b9845c..911bea078c5 100644 --- a/CVE-2024/CVE-2024-06xx/CVE-2024-0607.json +++ b/CVE-2024/CVE-2024-06xx/CVE-2024-0607.json @@ -2,7 +2,7 @@ "id": "CVE-2024-0607", "sourceIdentifier": "secalert@redhat.com", "published": "2024-01-18T16:15:08.690", - "lastModified": "2024-06-25T22:15:17.643", + "lastModified": "2024-06-27T12:15:17.570", "vulnStatus": "Modified", "descriptions": [ { @@ -165,6 +165,10 @@ { "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html", "source": "secalert@redhat.com" + }, + { + "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html", + "source": "secalert@redhat.com" } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-09xx/CVE-2024-0947.json b/CVE-2024/CVE-2024-09xx/CVE-2024-0947.json index c18ab44c470..1877702eecb 100644 --- a/CVE-2024/CVE-2024-09xx/CVE-2024-0947.json +++ b/CVE-2024/CVE-2024-09xx/CVE-2024-0947.json @@ -2,8 +2,8 @@ "id": "CVE-2024-0947", "sourceIdentifier": "iletisim@usom.gov.tr", "published": "2024-06-27T10:15:11.563", - "lastModified": "2024-06-27T10:15:11.563", - "vulnStatus": "Received", + "lastModified": "2024-06-27T12:47:19.847", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-09xx/CVE-2024-0949.json b/CVE-2024/CVE-2024-09xx/CVE-2024-0949.json index ea9dabc60e7..7928144f4ea 100644 --- a/CVE-2024/CVE-2024-09xx/CVE-2024-0949.json +++ b/CVE-2024/CVE-2024-09xx/CVE-2024-0949.json @@ -2,8 +2,8 @@ "id": "CVE-2024-0949", "sourceIdentifier": "iletisim@usom.gov.tr", "published": "2024-06-27T10:15:13.013", - "lastModified": "2024-06-27T10:15:13.013", - "vulnStatus": "Received", + "lastModified": "2024-06-27T12:47:19.847", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-10xx/CVE-2024-1086.json b/CVE-2024/CVE-2024-10xx/CVE-2024-1086.json index f7f15165b54..18bb6ada452 100644 --- a/CVE-2024/CVE-2024-10xx/CVE-2024-1086.json +++ b/CVE-2024/CVE-2024-10xx/CVE-2024-1086.json @@ -2,7 +2,7 @@ "id": "CVE-2024-1086", "sourceIdentifier": "cve-coordination@google.com", "published": "2024-01-31T13:15:10.827", - "lastModified": "2024-06-25T21:15:56.793", + "lastModified": "2024-06-27T12:15:17.713", "vulnStatus": "Modified", "cisaExploitAdd": "2024-05-30", "cisaActionDue": "2024-06-20", @@ -251,6 +251,10 @@ "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00016.html", "source": "cve-coordination@google.com" }, + { + "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html", + "source": "cve-coordination@google.com" + }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7LSPIOMIJYTLZB6QKPQVVAYSUETUWKPF/", "source": "cve-coordination@google.com", diff --git a/CVE-2024/CVE-2024-11xx/CVE-2024-1107.json b/CVE-2024/CVE-2024-11xx/CVE-2024-1107.json new file mode 100644 index 00000000000..b7c2c6a52eb --- /dev/null +++ b/CVE-2024/CVE-2024-11xx/CVE-2024-1107.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2024-1107", + "sourceIdentifier": "iletisim@usom.gov.tr", + "published": "2024-06-27T13:15:54.560", + "lastModified": "2024-06-27T13:15:54.560", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Authorization Bypass Through User-Controlled Key vulnerability in Talya Informatics Travel APPS allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Travel APPS: before v17.0.68." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "iletisim@usom.gov.tr", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "iletisim@usom.gov.tr", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-639" + } + ] + } + ], + "references": [ + { + "url": "https://www.usom.gov.tr/bildirim/tr-24-0809", + "source": "iletisim@usom.gov.tr" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-13xx/CVE-2024-1330.json b/CVE-2024/CVE-2024-13xx/CVE-2024-1330.json index 7cc3882109d..1d2c10b62d0 100644 --- a/CVE-2024/CVE-2024-13xx/CVE-2024-1330.json +++ b/CVE-2024/CVE-2024-13xx/CVE-2024-1330.json @@ -2,12 +2,16 @@ "id": "CVE-2024-1330", "sourceIdentifier": "contact@wpscan.com", "published": "2024-06-27T06:15:09.800", - "lastModified": "2024-06-27T06:15:09.800", - "vulnStatus": "Received", + "lastModified": "2024-06-27T12:47:19.847", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", "value": "The kadence-blocks-pro WordPress plugin before 2.3.8 does not prevent users with at least the contributor role using some of its shortcode's functionalities to leak arbitrary options from the database." + }, + { + "lang": "es", + "value": " El complemento de WordPress kadence-blocks-pro anterior a 2.3.8 no impide que los usuarios con al menos el rol de colaborador utilicen algunas de las funcionalidades de su c\u00f3digo corto para filtrar opciones arbitrarias de la base de datos." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-14xx/CVE-2024-1493.json b/CVE-2024/CVE-2024-14xx/CVE-2024-1493.json index 8e620d6f4f4..d26524a966d 100644 --- a/CVE-2024/CVE-2024-14xx/CVE-2024-1493.json +++ b/CVE-2024/CVE-2024-14xx/CVE-2024-1493.json @@ -2,12 +2,16 @@ "id": "CVE-2024-1493", "sourceIdentifier": "cve@gitlab.com", "published": "2024-06-27T00:15:10.283", - "lastModified": "2024-06-27T00:15:10.283", - "vulnStatus": "Received", + "lastModified": "2024-06-27T12:47:19.847", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", "value": "An issue was discovered in GitLab CE/EE affecting all versions starting from 9.2 prior to 16.11.5, starting from 17.0 prior to 17.0.3, and starting from 17.1 prior to 17.1.1, with the processing logic for generating link in dependency files can lead to a regular expression DoS attack on the server" + }, + { + "lang": "es", + "value": " Se descubri\u00f3 un problema en GitLab CE/EE que afecta a todas las versiones desde la 9.2 anterior a la 16.11.5, desde la 17.0 anterior a la 17.0.3 y desde la 17.1 anterior a la 17.1.1, con la l\u00f3gica de procesamiento para generar enlaces en archivos de dependencia puede provocar un ataque DoS de expresi\u00f3n regular en el servidor" } ], "metrics": { diff --git a/CVE-2024/CVE-2024-18xx/CVE-2024-1816.json b/CVE-2024/CVE-2024-18xx/CVE-2024-1816.json index b44cb00e5dd..bb1fd092fa1 100644 --- a/CVE-2024/CVE-2024-18xx/CVE-2024-1816.json +++ b/CVE-2024/CVE-2024-18xx/CVE-2024-1816.json @@ -2,12 +2,16 @@ "id": "CVE-2024-1816", "sourceIdentifier": "cve@gitlab.com", "published": "2024-06-27T00:15:10.523", - "lastModified": "2024-06-27T00:15:10.523", - "vulnStatus": "Received", + "lastModified": "2024-06-27T12:47:19.847", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", "value": "An issue was discovered in GitLab CE/EE affecting all versions starting from 12.0 prior to 16.11.5, starting from 17.0 prior to 17.0.3, and starting from 17.1 prior to 17.1.1, which allows for an attacker to cause a denial of service using a crafted OpenAPI file." + }, + { + "lang": "es", + "value": " Se descubri\u00f3 un problema en GitLab CE/EE que afecta a todas las versiones desde 12.0 anterior a 16.11.5, desde 17.0 anterior a 17.0.3 y desde 17.1 anterior a 17.1.1, lo que permite que un atacante provoque una denegaci\u00f3n de servicio utilizando un archivo OpenAPI manipulado." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-18xx/CVE-2024-1839.json b/CVE-2024/CVE-2024-18xx/CVE-2024-1839.json index d37803286eb..1dea28f4b22 100644 --- a/CVE-2024/CVE-2024-18xx/CVE-2024-1839.json +++ b/CVE-2024/CVE-2024-18xx/CVE-2024-1839.json @@ -2,12 +2,16 @@ "id": "CVE-2024-1839", "sourceIdentifier": "9119a7d8-5eab-497f-8521-727c672e3725", "published": "2024-06-26T21:15:12.597", - "lastModified": "2024-06-26T21:15:12.597", - "vulnStatus": "Received", + "lastModified": "2024-06-27T12:47:19.847", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", "value": "Intrado 911 Emergency Gateway login form is vulnerable to an unauthenticated blind time-based SQL injection, which may allow an unauthenticated remote attacker to execute malicious code, exfiltrate data, or manipulate the database." + }, + { + "lang": "es", + "value": " El formulario de inicio de sesi\u00f3n de Intrado 911 Emergency Gateway es vulnerable a una inyecci\u00f3n SQL blind basada en tiempo no autenticada, que puede permitir que un atacante remoto no autenticado ejecute c\u00f3digo malicioso, extraiga datos o manipule la base de datos." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-215xx/CVE-2024-21519.json b/CVE-2024/CVE-2024-215xx/CVE-2024-21519.json index e19c7ddc7a4..c9c7817c846 100644 --- a/CVE-2024/CVE-2024-215xx/CVE-2024-21519.json +++ b/CVE-2024/CVE-2024-215xx/CVE-2024-21519.json @@ -2,8 +2,8 @@ "id": "CVE-2024-21519", "sourceIdentifier": "report@snyk.io", "published": "2024-06-22T05:15:11.620", - "lastModified": "2024-06-24T19:55:07.760", - "vulnStatus": "Analyzed", + "lastModified": "2024-06-27T13:15:55.027", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -100,11 +100,8 @@ ], "references": [ { - "url": "https://github.com/opencart/opencart/blob/master/upload/admin/controller/tool/upload.php%23L353", - "source": "report@snyk.io", - "tags": [ - "Broken Link" - ] + "url": "https://github.com/opencart/opencart/blob/4.0.2.3/upload/admin/controller/tool/upload.php%23L353", + "source": "report@snyk.io" }, { "url": "https://security.snyk.io/vuln/SNYK-PHP-OPENCARTOPENCART-7266579", diff --git a/CVE-2024/CVE-2024-21xx/CVE-2024-2191.json b/CVE-2024/CVE-2024-21xx/CVE-2024-2191.json index b90a9b09e35..b6eb24bbffe 100644 --- a/CVE-2024/CVE-2024-21xx/CVE-2024-2191.json +++ b/CVE-2024/CVE-2024-21xx/CVE-2024-2191.json @@ -2,12 +2,16 @@ "id": "CVE-2024-2191", "sourceIdentifier": "cve@gitlab.com", "published": "2024-06-27T00:15:10.790", - "lastModified": "2024-06-27T00:15:10.790", - "vulnStatus": "Received", + "lastModified": "2024-06-27T12:47:19.847", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", "value": "An issue was discovered in GitLab CE/EE affecting all versions starting from 16.9 prior to 16.11.5, starting from 17.0 prior to 17.0.3, and starting from 17.1 prior to 17.1.1, which allows merge request title to be visible publicly despite being set as project members only." + }, + { + "lang": "es", + "value": "Se descubri\u00f3 un problema en GitLab CE/EE que afecta a todas las versiones desde la 16.9 anterior a la 16.11.5, desde la 17.0 anterior a la 17.0.3 y desde la 17.1 anterior a la 17.1.1, lo que permite que el t\u00edtulo de la solicitud de fusi\u00f3n sea visible p\u00fablicamente a pesar de estar establecido solo para miembros del proyecto." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-220xx/CVE-2024-22099.json b/CVE-2024/CVE-2024-220xx/CVE-2024-22099.json index 75213a13ec1..b748c1ebbd6 100644 --- a/CVE-2024/CVE-2024-220xx/CVE-2024-22099.json +++ b/CVE-2024/CVE-2024-220xx/CVE-2024-22099.json @@ -2,7 +2,7 @@ "id": "CVE-2024-22099", "sourceIdentifier": "security@openanolis.org", "published": "2024-01-25T07:15:08.697", - "lastModified": "2024-06-25T22:15:17.797", + "lastModified": "2024-06-27T12:15:17.870", "vulnStatus": "Modified", "descriptions": [ { @@ -110,6 +110,10 @@ "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html", "source": "security@openanolis.org" }, + { + "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html", + "source": "security@openanolis.org" + }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IVVYSTEVMPYGF6GDSOD44MUXZXAZHOHB/", "source": "security@openanolis.org" diff --git a/CVE-2024/CVE-2024-222xx/CVE-2024-22231.json b/CVE-2024/CVE-2024-222xx/CVE-2024-22231.json index 6779eca3b37..5d320973e42 100644 --- a/CVE-2024/CVE-2024-222xx/CVE-2024-22231.json +++ b/CVE-2024/CVE-2024-222xx/CVE-2024-22231.json @@ -2,12 +2,16 @@ "id": "CVE-2024-22231", "sourceIdentifier": "security@vmware.com", "published": "2024-06-27T07:15:52.623", - "lastModified": "2024-06-27T07:15:52.623", - "vulnStatus": "Received", + "lastModified": "2024-06-27T12:47:19.847", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", "value": "Syndic cache directory creation is vulnerable to a directory traversal attack in salt project which can lead\u00a0a malicious attacker to create an arbitrary directory on a Salt master." + }, + { + "lang": "es", + "value": " La creaci\u00f3n de un directorio de cach\u00e9 s\u00edndico es vulnerable a un ataque de directory transversal en un proyecto Salt que puede llevar a un atacante malintencionado a crear un directorio arbitrario en un maestro Salt." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-222xx/CVE-2024-22232.json b/CVE-2024/CVE-2024-222xx/CVE-2024-22232.json index d98e8da5c9c..1d97b450d32 100644 --- a/CVE-2024/CVE-2024-222xx/CVE-2024-22232.json +++ b/CVE-2024/CVE-2024-222xx/CVE-2024-22232.json @@ -2,12 +2,16 @@ "id": "CVE-2024-22232", "sourceIdentifier": "security@vmware.com", "published": "2024-06-27T07:15:54.227", - "lastModified": "2024-06-27T07:15:54.227", - "vulnStatus": "Received", + "lastModified": "2024-06-27T12:47:19.847", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", "value": "A specially crafted url can be created which leads to a directory traversal in the salt file server.\nA malicious user can read an arbitrary file from a Salt master\u2019s filesystem." + }, + { + "lang": "es", + "value": "Se puede crear una URL especialmente manipulada que conduzca a directory traversal en el servidor de archivos salt. Un usuario malintencionado puede leer un archivo arbitrario del sistema de archivos de un maestro Salt." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-237xx/CVE-2024-23765.json b/CVE-2024/CVE-2024-237xx/CVE-2024-23765.json index 9b2b4bae23a..bc7d6f5cfa0 100644 --- a/CVE-2024/CVE-2024-237xx/CVE-2024-23765.json +++ b/CVE-2024/CVE-2024-237xx/CVE-2024-23765.json @@ -2,12 +2,16 @@ "id": "CVE-2024-23765", "sourceIdentifier": "cve@mitre.org", "published": "2024-06-26T21:15:12.897", - "lastModified": "2024-06-26T21:15:12.897", - "vulnStatus": "Received", + "lastModified": "2024-06-27T12:47:19.847", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", "value": "An issue was discovered on HMS Anybus X-Gateway AB7832-F 3 devices. The gateway exposes an unidentified service on port 7412 on the network. All the network services of the gateway become unresponsive after sending 85 requests to this port. The content and length of the frame does not matter. The device needs to be restarted to resume operations." + }, + { + "lang": "es", + "value": "Se descubri\u00f3 un problema en los dispositivos HMS Anybus X-Gateway AB7832-F 3. La puerta de enlace expone un servicio no identificado en el puerto 7412 de la red. Todos los servicios de red de la puerta de enlace dejan de responder despu\u00e9s de enviar 85 solicitudes a este puerto. El contenido y la longitud del fotograma no importan. Es necesario reiniciar el dispositivo para reanudar las operaciones." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-237xx/CVE-2024-23766.json b/CVE-2024/CVE-2024-237xx/CVE-2024-23766.json index cabc47f3f4b..d01027358be 100644 --- a/CVE-2024/CVE-2024-237xx/CVE-2024-23766.json +++ b/CVE-2024/CVE-2024-237xx/CVE-2024-23766.json @@ -2,12 +2,16 @@ "id": "CVE-2024-23766", "sourceIdentifier": "cve@mitre.org", "published": "2024-06-26T21:15:12.977", - "lastModified": "2024-06-26T21:15:12.977", - "vulnStatus": "Received", + "lastModified": "2024-06-27T12:47:19.847", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", "value": "An issue was discovered on HMS Anybus X-Gateway AB7832-F 3 devices. The gateway exposes a web interface on port 80. An unauthenticated GET request to a specific URL triggers the reboot of the Anybus gateway (or at least most of its modules). An attacker can use this feature to carry out a denial of service attack by continuously sending GET requests to that URL." + }, + { + "lang": "es", + "value": " Se descubri\u00f3 un problema en los dispositivos HMS Anybus X-Gateway AB7832-F 3. La puerta de enlace expone una interfaz web en el puerto 80. Una solicitud GET no autenticada a una URL espec\u00edfica desencadena el reinicio de la puerta de enlace Anybus (o al menos de la mayor\u00eda de sus m\u00f3dulos). Un atacante puede utilizar esta funci\u00f3n para llevar a cabo un ataque de denegaci\u00f3n de servicio enviando continuamente solicitudes GET a esa URL." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-237xx/CVE-2024-23767.json b/CVE-2024/CVE-2024-237xx/CVE-2024-23767.json index 3d2d6765002..cab12a44d76 100644 --- a/CVE-2024/CVE-2024-237xx/CVE-2024-23767.json +++ b/CVE-2024/CVE-2024-237xx/CVE-2024-23767.json @@ -2,12 +2,16 @@ "id": "CVE-2024-23767", "sourceIdentifier": "cve@mitre.org", "published": "2024-06-26T21:15:13.057", - "lastModified": "2024-06-26T21:15:13.057", - "vulnStatus": "Received", + "lastModified": "2024-06-27T12:47:19.847", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", "value": "An issue was discovered on HMS Anybus X-Gateway AB7832-F firmware version 3. The HICP protocol allows unauthenticated changes to a device's network configurations." + }, + { + "lang": "es", + "value": "Se descubri\u00f3 un problema en la versi\u00f3n 3 del firmware HMS Anybus X-Gateway AB7832-F. El protocolo HICP permite cambios no autenticados en las configuraciones de red de un dispositivo." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-238xx/CVE-2024-23849.json b/CVE-2024/CVE-2024-238xx/CVE-2024-23849.json index 76c3472f49c..ca1fc69b032 100644 --- a/CVE-2024/CVE-2024-238xx/CVE-2024-23849.json +++ b/CVE-2024/CVE-2024-238xx/CVE-2024-23849.json @@ -2,7 +2,7 @@ "id": "CVE-2024-23849", "sourceIdentifier": "cve@mitre.org", "published": "2024-01-23T09:15:36.050", - "lastModified": "2024-06-25T23:15:23.770", + "lastModified": "2024-06-27T13:15:55.160", "vulnStatus": "Modified", "descriptions": [ { @@ -81,6 +81,10 @@ "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html", "source": "cve@mitre.org" }, + { + "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html", + "source": "cve@mitre.org" + }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7LSPIOMIJYTLZB6QKPQVVAYSUETUWKPF/", "source": "cve@mitre.org" diff --git a/CVE-2024/CVE-2024-238xx/CVE-2024-23851.json b/CVE-2024/CVE-2024-238xx/CVE-2024-23851.json index e7f3d839ad2..e7259de0cbf 100644 --- a/CVE-2024/CVE-2024-238xx/CVE-2024-23851.json +++ b/CVE-2024/CVE-2024-238xx/CVE-2024-23851.json @@ -2,7 +2,7 @@ "id": "CVE-2024-23851", "sourceIdentifier": "cve@mitre.org", "published": "2024-01-23T09:15:36.180", - "lastModified": "2024-06-25T22:15:18.110", + "lastModified": "2024-06-27T13:15:55.290", "vulnStatus": "Modified", "descriptions": [ { @@ -73,6 +73,10 @@ "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html", "source": "cve@mitre.org" }, + { + "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html", + "source": "cve@mitre.org" + }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/EZOU3745CWCDZ7EMKMXB2OEEIB5Q3IWM/", "source": "cve@mitre.org" diff --git a/CVE-2024/CVE-2024-248xx/CVE-2024-24857.json b/CVE-2024/CVE-2024-248xx/CVE-2024-24857.json index b8e9465b621..4b9d7793fce 100644 --- a/CVE-2024/CVE-2024-248xx/CVE-2024-24857.json +++ b/CVE-2024/CVE-2024-248xx/CVE-2024-24857.json @@ -2,7 +2,7 @@ "id": "CVE-2024-24857", "sourceIdentifier": "security@openanolis.org", "published": "2024-02-05T08:15:44.533", - "lastModified": "2024-06-25T22:15:18.220", + "lastModified": "2024-06-27T12:15:17.990", "vulnStatus": "Modified", "descriptions": [ { @@ -125,6 +125,10 @@ { "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html", "source": "security@openanolis.org" + }, + { + "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html", + "source": "security@openanolis.org" } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-248xx/CVE-2024-24858.json b/CVE-2024/CVE-2024-248xx/CVE-2024-24858.json index e44af229dfb..66b7a97aeb8 100644 --- a/CVE-2024/CVE-2024-248xx/CVE-2024-24858.json +++ b/CVE-2024/CVE-2024-248xx/CVE-2024-24858.json @@ -2,7 +2,7 @@ "id": "CVE-2024-24858", "sourceIdentifier": "security@openanolis.org", "published": "2024-02-05T08:15:44.713", - "lastModified": "2024-06-25T22:15:18.333", + "lastModified": "2024-06-27T12:15:18.103", "vulnStatus": "Modified", "descriptions": [ { @@ -121,6 +121,10 @@ { "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html", "source": "security@openanolis.org" + }, + { + "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html", + "source": "security@openanolis.org" } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-248xx/CVE-2024-24861.json b/CVE-2024/CVE-2024-248xx/CVE-2024-24861.json index eec35c78dff..c0f99f4844c 100644 --- a/CVE-2024/CVE-2024-248xx/CVE-2024-24861.json +++ b/CVE-2024/CVE-2024-248xx/CVE-2024-24861.json @@ -2,7 +2,7 @@ "id": "CVE-2024-24861", "sourceIdentifier": "security@openanolis.org", "published": "2024-02-05T08:15:45.253", - "lastModified": "2024-06-25T22:15:18.440", + "lastModified": "2024-06-27T13:15:55.407", "vulnStatus": "Modified", "descriptions": [ { @@ -126,6 +126,10 @@ { "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html", "source": "security@openanolis.org" + }, + { + "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html", + "source": "security@openanolis.org" } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-256xx/CVE-2024-25637.json b/CVE-2024/CVE-2024-256xx/CVE-2024-25637.json index 1da8565f769..618d0f2ff3c 100644 --- a/CVE-2024/CVE-2024-256xx/CVE-2024-25637.json +++ b/CVE-2024/CVE-2024-256xx/CVE-2024-25637.json @@ -2,12 +2,16 @@ "id": "CVE-2024-25637", "sourceIdentifier": "security-advisories@github.com", "published": "2024-06-26T16:15:10.910", - "lastModified": "2024-06-26T16:15:10.910", - "vulnStatus": "Received", + "lastModified": "2024-06-27T12:47:19.847", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", "value": "October is a self-hosted CMS platform based on the Laravel PHP Framework. The X-October-Request-Handler Header does not sanitize the AJAX handler name and allows unescaped HTML to be reflected back. There is no impact since this vulnerability cannot be exploited through normal browser interactions. This unescaped value is only detectable when using a proxy interception tool. This issue has been patched in version 3.5.15.\n" + }, + { + "lang": "es", + "value": "October es una plataforma CMS autohospedada basada en Laravel PHP Framework. El encabezado X-October-Request-Handler no sanitiza el nombre del controlador AJAX y permite que se refleje HTML sin escape. No hay ning\u00fan impacto ya que esta vulnerabilidad no se puede explotar mediante interacciones normales del navegador. Este valor sin escape solo es detectable cuando se utiliza una herramienta de interceptaci\u00f3n de proxy. Este problema se solucion\u00f3 en la versi\u00f3n 3.5.15." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-257xx/CVE-2024-25739.json b/CVE-2024/CVE-2024-257xx/CVE-2024-25739.json index 164568d69f3..76124264b4a 100644 --- a/CVE-2024/CVE-2024-257xx/CVE-2024-25739.json +++ b/CVE-2024/CVE-2024-257xx/CVE-2024-25739.json @@ -2,7 +2,7 @@ "id": "CVE-2024-25739", "sourceIdentifier": "cve@mitre.org", "published": "2024-02-12T03:15:32.770", - "lastModified": "2024-06-25T23:15:23.967", + "lastModified": "2024-06-27T13:15:55.520", "vulnStatus": "Modified", "descriptions": [ { @@ -84,6 +84,10 @@ "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html", "source": "cve@mitre.org" }, + { + "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html", + "source": "cve@mitre.org" + }, { "url": "https://www.spinics.net/lists/kernel/msg5074816.html", "source": "cve@mitre.org", diff --git a/CVE-2024/CVE-2024-265xx/CVE-2024-26597.json b/CVE-2024/CVE-2024-265xx/CVE-2024-26597.json index e2b642a0349..4ddc7e9520f 100644 --- a/CVE-2024/CVE-2024-265xx/CVE-2024-26597.json +++ b/CVE-2024/CVE-2024-265xx/CVE-2024-26597.json @@ -2,7 +2,7 @@ "id": "CVE-2024-26597", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-02-23T15:15:09.557", - "lastModified": "2024-06-25T21:15:57.720", + "lastModified": "2024-06-27T12:15:18.200", "vulnStatus": "Modified", "descriptions": [ { @@ -171,6 +171,10 @@ { "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00016.html", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-266xx/CVE-2024-26600.json b/CVE-2024/CVE-2024-266xx/CVE-2024-26600.json index d028ce9a171..b2a4f930a5d 100644 --- a/CVE-2024/CVE-2024-266xx/CVE-2024-26600.json +++ b/CVE-2024/CVE-2024-266xx/CVE-2024-26600.json @@ -2,7 +2,7 @@ "id": "CVE-2024-26600", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-02-26T16:27:59.927", - "lastModified": "2024-06-25T23:15:24.390", + "lastModified": "2024-06-27T12:15:18.347", "vulnStatus": "Modified", "descriptions": [ { @@ -171,6 +171,10 @@ { "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-266xx/CVE-2024-26602.json b/CVE-2024/CVE-2024-266xx/CVE-2024-26602.json index b25510649c0..95c505e7040 100644 --- a/CVE-2024/CVE-2024-266xx/CVE-2024-26602.json +++ b/CVE-2024/CVE-2024-266xx/CVE-2024-26602.json @@ -2,7 +2,7 @@ "id": "CVE-2024-26602", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-02-26T16:28:00.043", - "lastModified": "2024-06-25T22:15:18.703", + "lastModified": "2024-06-27T12:15:18.543", "vulnStatus": "Modified", "descriptions": [ { @@ -171,6 +171,10 @@ { "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-266xx/CVE-2024-26606.json b/CVE-2024/CVE-2024-266xx/CVE-2024-26606.json index 8b282974080..002e1d3136b 100644 --- a/CVE-2024/CVE-2024-266xx/CVE-2024-26606.json +++ b/CVE-2024/CVE-2024-266xx/CVE-2024-26606.json @@ -2,7 +2,7 @@ "id": "CVE-2024-26606", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-02-26T16:28:00.260", - "lastModified": "2024-06-25T22:15:18.807", + "lastModified": "2024-06-27T12:15:18.720", "vulnStatus": "Modified", "descriptions": [ { @@ -171,6 +171,10 @@ { "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-266xx/CVE-2024-26615.json b/CVE-2024/CVE-2024-266xx/CVE-2024-26615.json index 2ce75fb3780..f0af8f991bd 100644 --- a/CVE-2024/CVE-2024-266xx/CVE-2024-26615.json +++ b/CVE-2024/CVE-2024-266xx/CVE-2024-26615.json @@ -2,7 +2,7 @@ "id": "CVE-2024-26615", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-03-11T18:15:19.337", - "lastModified": "2024-06-25T22:15:19.150", + "lastModified": "2024-06-27T12:15:18.830", "vulnStatus": "Awaiting Analysis", "descriptions": [ { @@ -51,6 +51,10 @@ { "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-266xx/CVE-2024-26625.json b/CVE-2024/CVE-2024-266xx/CVE-2024-26625.json index 75715b3f900..367fc94b354 100644 --- a/CVE-2024/CVE-2024-266xx/CVE-2024-26625.json +++ b/CVE-2024/CVE-2024-266xx/CVE-2024-26625.json @@ -2,7 +2,7 @@ "id": "CVE-2024-26625", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-03-06T07:15:12.587", - "lastModified": "2024-06-25T22:15:19.353", + "lastModified": "2024-06-27T13:15:55.670", "vulnStatus": "Awaiting Analysis", "descriptions": [ { @@ -51,6 +51,10 @@ { "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-266xx/CVE-2024-26633.json b/CVE-2024/CVE-2024-266xx/CVE-2024-26633.json index 4930f5dcaaa..77ee164838d 100644 --- a/CVE-2024/CVE-2024-266xx/CVE-2024-26633.json +++ b/CVE-2024/CVE-2024-266xx/CVE-2024-26633.json @@ -2,7 +2,7 @@ "id": "CVE-2024-26633", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-03-18T11:15:09.867", - "lastModified": "2024-06-25T21:15:57.977", + "lastModified": "2024-06-27T12:15:18.950", "vulnStatus": "Awaiting Analysis", "descriptions": [ { @@ -51,6 +51,10 @@ { "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00016.html", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-266xx/CVE-2024-26635.json b/CVE-2024/CVE-2024-266xx/CVE-2024-26635.json index 38d30695931..65598df3117 100644 --- a/CVE-2024/CVE-2024-266xx/CVE-2024-26635.json +++ b/CVE-2024/CVE-2024-266xx/CVE-2024-26635.json @@ -2,7 +2,7 @@ "id": "CVE-2024-26635", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-03-18T11:15:10.203", - "lastModified": "2024-06-25T22:15:19.540", + "lastModified": "2024-06-27T12:15:19.117", "vulnStatus": "Awaiting Analysis", "descriptions": [ { @@ -51,6 +51,10 @@ { "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-266xx/CVE-2024-26636.json b/CVE-2024/CVE-2024-266xx/CVE-2024-26636.json index a1dee933dcc..e8e956d57fe 100644 --- a/CVE-2024/CVE-2024-266xx/CVE-2024-26636.json +++ b/CVE-2024/CVE-2024-266xx/CVE-2024-26636.json @@ -2,7 +2,7 @@ "id": "CVE-2024-26636", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-03-18T11:15:10.363", - "lastModified": "2024-06-25T22:15:19.627", + "lastModified": "2024-06-27T12:15:19.263", "vulnStatus": "Awaiting Analysis", "descriptions": [ { @@ -51,6 +51,10 @@ { "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-266xx/CVE-2024-26642.json b/CVE-2024/CVE-2024-266xx/CVE-2024-26642.json index 21ef9220828..9a9ba26c008 100644 --- a/CVE-2024/CVE-2024-266xx/CVE-2024-26642.json +++ b/CVE-2024/CVE-2024-266xx/CVE-2024-26642.json @@ -2,7 +2,7 @@ "id": "CVE-2024-26642", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-03-21T11:15:28.293", - "lastModified": "2024-06-25T22:15:19.867", + "lastModified": "2024-06-27T12:15:19.380", "vulnStatus": "Awaiting Analysis", "descriptions": [ { @@ -51,6 +51,10 @@ { "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-266xx/CVE-2024-26645.json b/CVE-2024/CVE-2024-266xx/CVE-2024-26645.json index d581d5f9808..f45f82d5567 100644 --- a/CVE-2024/CVE-2024-266xx/CVE-2024-26645.json +++ b/CVE-2024/CVE-2024-266xx/CVE-2024-26645.json @@ -2,7 +2,7 @@ "id": "CVE-2024-26645", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-03-26T16:15:12.207", - "lastModified": "2024-06-25T21:15:58.100", + "lastModified": "2024-06-27T12:15:19.470", "vulnStatus": "Awaiting Analysis", "descriptions": [ { @@ -51,6 +51,10 @@ { "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-266xx/CVE-2024-26651.json b/CVE-2024/CVE-2024-266xx/CVE-2024-26651.json index b179acff6bb..32d6f475603 100644 --- a/CVE-2024/CVE-2024-266xx/CVE-2024-26651.json +++ b/CVE-2024/CVE-2024-266xx/CVE-2024-26651.json @@ -2,7 +2,7 @@ "id": "CVE-2024-26651", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-03-27T14:15:10.243", - "lastModified": "2024-06-25T22:15:20.093", + "lastModified": "2024-06-27T13:15:55.767", "vulnStatus": "Awaiting Analysis", "descriptions": [ { @@ -55,6 +55,10 @@ { "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-266xx/CVE-2024-26663.json b/CVE-2024/CVE-2024-266xx/CVE-2024-26663.json index 3f42d47be5a..a45fcaff957 100644 --- a/CVE-2024/CVE-2024-266xx/CVE-2024-26663.json +++ b/CVE-2024/CVE-2024-266xx/CVE-2024-26663.json @@ -2,7 +2,7 @@ "id": "CVE-2024-26663", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-04-02T07:15:43.287", - "lastModified": "2024-06-25T23:15:24.550", + "lastModified": "2024-06-27T12:15:19.617", "vulnStatus": "Awaiting Analysis", "descriptions": [ { @@ -51,6 +51,10 @@ { "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-266xx/CVE-2024-26664.json b/CVE-2024/CVE-2024-266xx/CVE-2024-26664.json index 36867d3d052..ecaa32980f4 100644 --- a/CVE-2024/CVE-2024-266xx/CVE-2024-26664.json +++ b/CVE-2024/CVE-2024-266xx/CVE-2024-26664.json @@ -2,7 +2,7 @@ "id": "CVE-2024-26664", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-04-02T07:15:43.360", - "lastModified": "2024-06-25T22:15:20.287", + "lastModified": "2024-06-27T12:15:19.777", "vulnStatus": "Awaiting Analysis", "descriptions": [ { @@ -51,6 +51,10 @@ { "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-266xx/CVE-2024-26671.json b/CVE-2024/CVE-2024-266xx/CVE-2024-26671.json index a1ddf4a64a0..53d09a754ea 100644 --- a/CVE-2024/CVE-2024-266xx/CVE-2024-26671.json +++ b/CVE-2024/CVE-2024-266xx/CVE-2024-26671.json @@ -2,7 +2,7 @@ "id": "CVE-2024-26671", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-04-02T07:15:43.830", - "lastModified": "2024-06-25T22:15:20.417", + "lastModified": "2024-06-27T13:15:55.847", "vulnStatus": "Awaiting Analysis", "descriptions": [ { @@ -51,6 +51,10 @@ { "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-266xx/CVE-2024-26675.json b/CVE-2024/CVE-2024-266xx/CVE-2024-26675.json index 6a647ef279c..bcf8992a62a 100644 --- a/CVE-2024/CVE-2024-266xx/CVE-2024-26675.json +++ b/CVE-2024/CVE-2024-266xx/CVE-2024-26675.json @@ -2,7 +2,7 @@ "id": "CVE-2024-26675", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-04-02T07:15:44.100", - "lastModified": "2024-06-25T22:15:20.577", + "lastModified": "2024-06-27T13:15:55.923", "vulnStatus": "Awaiting Analysis", "descriptions": [ { @@ -51,6 +51,10 @@ { "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-266xx/CVE-2024-26679.json b/CVE-2024/CVE-2024-266xx/CVE-2024-26679.json index 67dbdc4a568..0018af59a05 100644 --- a/CVE-2024/CVE-2024-266xx/CVE-2024-26679.json +++ b/CVE-2024/CVE-2024-266xx/CVE-2024-26679.json @@ -2,7 +2,7 @@ "id": "CVE-2024-26679", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-04-02T07:15:44.400", - "lastModified": "2024-06-25T22:15:20.657", + "lastModified": "2024-06-27T12:15:19.853", "vulnStatus": "Awaiting Analysis", "descriptions": [ { @@ -51,6 +51,10 @@ { "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-266xx/CVE-2024-26685.json b/CVE-2024/CVE-2024-266xx/CVE-2024-26685.json index 2600265e610..ef96938d402 100644 --- a/CVE-2024/CVE-2024-266xx/CVE-2024-26685.json +++ b/CVE-2024/CVE-2024-266xx/CVE-2024-26685.json @@ -2,7 +2,7 @@ "id": "CVE-2024-26685", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-04-03T15:15:52.210", - "lastModified": "2024-06-25T22:15:20.823", + "lastModified": "2024-06-27T12:15:19.930", "vulnStatus": "Awaiting Analysis", "descriptions": [ { @@ -51,6 +51,10 @@ { "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-266xx/CVE-2024-26696.json b/CVE-2024/CVE-2024-266xx/CVE-2024-26696.json index 1f332bbb57f..1e089cf7705 100644 --- a/CVE-2024/CVE-2024-266xx/CVE-2024-26696.json +++ b/CVE-2024/CVE-2024-266xx/CVE-2024-26696.json @@ -2,7 +2,7 @@ "id": "CVE-2024-26696", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-04-03T15:15:52.830", - "lastModified": "2024-06-25T23:15:24.740", + "lastModified": "2024-06-27T13:15:56.000", "vulnStatus": "Awaiting Analysis", "descriptions": [ { @@ -51,6 +51,10 @@ { "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-266xx/CVE-2024-26697.json b/CVE-2024/CVE-2024-266xx/CVE-2024-26697.json index 35d2329d838..33a3e887b64 100644 --- a/CVE-2024/CVE-2024-266xx/CVE-2024-26697.json +++ b/CVE-2024/CVE-2024-266xx/CVE-2024-26697.json @@ -2,7 +2,7 @@ "id": "CVE-2024-26697", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-04-03T15:15:52.880", - "lastModified": "2024-06-25T22:15:21.173", + "lastModified": "2024-06-27T12:15:20.090", "vulnStatus": "Awaiting Analysis", "descriptions": [ { @@ -51,6 +51,10 @@ { "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-267xx/CVE-2024-26704.json b/CVE-2024/CVE-2024-267xx/CVE-2024-26704.json index 890da5c1522..aa3a6ac8e84 100644 --- a/CVE-2024/CVE-2024-267xx/CVE-2024-26704.json +++ b/CVE-2024/CVE-2024-267xx/CVE-2024-26704.json @@ -2,7 +2,7 @@ "id": "CVE-2024-26704", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-04-03T15:15:53.193", - "lastModified": "2024-06-25T23:15:24.850", + "lastModified": "2024-06-27T12:15:20.167", "vulnStatus": "Awaiting Analysis", "descriptions": [ { @@ -51,6 +51,10 @@ { "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-267xx/CVE-2024-26720.json b/CVE-2024/CVE-2024-267xx/CVE-2024-26720.json index d3f7e136c1d..3a4495177bb 100644 --- a/CVE-2024/CVE-2024-267xx/CVE-2024-26720.json +++ b/CVE-2024/CVE-2024-267xx/CVE-2024-26720.json @@ -2,7 +2,7 @@ "id": "CVE-2024-26720", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-04-03T15:15:53.993", - "lastModified": "2024-06-25T21:15:58.290", + "lastModified": "2024-06-27T12:15:20.240", "vulnStatus": "Awaiting Analysis", "descriptions": [ { @@ -51,6 +51,10 @@ { "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-267xx/CVE-2024-26722.json b/CVE-2024/CVE-2024-267xx/CVE-2024-26722.json index 04e7c26629a..827075cd5d6 100644 --- a/CVE-2024/CVE-2024-267xx/CVE-2024-26722.json +++ b/CVE-2024/CVE-2024-267xx/CVE-2024-26722.json @@ -2,7 +2,7 @@ "id": "CVE-2024-26722", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-04-03T15:15:54.090", - "lastModified": "2024-06-25T22:15:21.423", + "lastModified": "2024-06-27T13:15:56.110", "vulnStatus": "Awaiting Analysis", "descriptions": [ { @@ -51,6 +51,10 @@ { "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-267xx/CVE-2024-26735.json b/CVE-2024/CVE-2024-267xx/CVE-2024-26735.json index ccf8270a4ea..5d7a00062d2 100644 --- a/CVE-2024/CVE-2024-267xx/CVE-2024-26735.json +++ b/CVE-2024/CVE-2024-267xx/CVE-2024-26735.json @@ -2,7 +2,7 @@ "id": "CVE-2024-26735", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-04-03T17:15:51.147", - "lastModified": "2024-06-25T22:15:21.483", + "lastModified": "2024-06-27T12:15:20.317", "vulnStatus": "Awaiting Analysis", "descriptions": [ { @@ -51,6 +51,10 @@ { "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-267xx/CVE-2024-26744.json b/CVE-2024/CVE-2024-267xx/CVE-2024-26744.json index 04c433e96cb..4632661151e 100644 --- a/CVE-2024/CVE-2024-267xx/CVE-2024-26744.json +++ b/CVE-2024/CVE-2024-267xx/CVE-2024-26744.json @@ -2,7 +2,7 @@ "id": "CVE-2024-26744", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-04-03T17:15:51.627", - "lastModified": "2024-06-25T22:15:21.667", + "lastModified": "2024-06-27T12:15:20.400", "vulnStatus": "Awaiting Analysis", "descriptions": [ { @@ -47,6 +47,10 @@ { "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-267xx/CVE-2024-26752.json b/CVE-2024/CVE-2024-267xx/CVE-2024-26752.json index 626502b4aee..51ef92fb4fc 100644 --- a/CVE-2024/CVE-2024-267xx/CVE-2024-26752.json +++ b/CVE-2024/CVE-2024-267xx/CVE-2024-26752.json @@ -2,7 +2,7 @@ "id": "CVE-2024-26752", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-04-03T17:15:51.910", - "lastModified": "2024-06-25T22:15:21.907", + "lastModified": "2024-06-27T12:15:20.473", "vulnStatus": "Awaiting Analysis", "descriptions": [ { @@ -51,6 +51,10 @@ { "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-267xx/CVE-2024-26754.json b/CVE-2024/CVE-2024-267xx/CVE-2024-26754.json index 054284c9084..0f2541b291f 100644 --- a/CVE-2024/CVE-2024-267xx/CVE-2024-26754.json +++ b/CVE-2024/CVE-2024-267xx/CVE-2024-26754.json @@ -2,7 +2,7 @@ "id": "CVE-2024-26754", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-04-03T17:15:52.050", - "lastModified": "2024-06-25T22:15:22.040", + "lastModified": "2024-06-27T13:15:56.187", "vulnStatus": "Awaiting Analysis", "descriptions": [ { @@ -51,6 +51,10 @@ { "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-267xx/CVE-2024-26763.json b/CVE-2024/CVE-2024-267xx/CVE-2024-26763.json index 09a0a1a4765..37b8b2b4ab1 100644 --- a/CVE-2024/CVE-2024-267xx/CVE-2024-26763.json +++ b/CVE-2024/CVE-2024-267xx/CVE-2024-26763.json @@ -2,7 +2,7 @@ "id": "CVE-2024-26763", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-04-03T17:15:52.520", - "lastModified": "2024-06-25T23:15:25.163", + "lastModified": "2024-06-27T12:15:20.560", "vulnStatus": "Awaiting Analysis", "descriptions": [ { @@ -51,6 +51,10 @@ { "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-267xx/CVE-2024-26764.json b/CVE-2024/CVE-2024-267xx/CVE-2024-26764.json index 0bc0c0ed7ae..5aff0faef29 100644 --- a/CVE-2024/CVE-2024-267xx/CVE-2024-26764.json +++ b/CVE-2024/CVE-2024-267xx/CVE-2024-26764.json @@ -2,7 +2,7 @@ "id": "CVE-2024-26764", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-04-03T17:15:52.580", - "lastModified": "2024-06-25T22:15:22.103", + "lastModified": "2024-06-27T12:15:20.647", "vulnStatus": "Awaiting Analysis", "descriptions": [ { @@ -51,6 +51,10 @@ { "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-267xx/CVE-2024-26766.json b/CVE-2024/CVE-2024-267xx/CVE-2024-26766.json index 535d911aa7e..64b038ba7de 100644 --- a/CVE-2024/CVE-2024-267xx/CVE-2024-26766.json +++ b/CVE-2024/CVE-2024-267xx/CVE-2024-26766.json @@ -2,7 +2,7 @@ "id": "CVE-2024-26766", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-04-03T17:15:52.683", - "lastModified": "2024-06-25T23:15:25.253", + "lastModified": "2024-06-27T12:15:20.720", "vulnStatus": "Awaiting Analysis", "descriptions": [ { @@ -51,6 +51,10 @@ { "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-267xx/CVE-2024-26772.json b/CVE-2024/CVE-2024-267xx/CVE-2024-26772.json index ade1522dad6..e8f5e8f1ae0 100644 --- a/CVE-2024/CVE-2024-267xx/CVE-2024-26772.json +++ b/CVE-2024/CVE-2024-267xx/CVE-2024-26772.json @@ -2,7 +2,7 @@ "id": "CVE-2024-26772", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-04-03T17:15:53.023", - "lastModified": "2024-06-25T22:15:22.240", + "lastModified": "2024-06-27T13:15:56.257", "vulnStatus": "Awaiting Analysis", "descriptions": [ { @@ -51,6 +51,10 @@ { "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-267xx/CVE-2024-26773.json b/CVE-2024/CVE-2024-267xx/CVE-2024-26773.json index f5512aeeb9d..bdaf6c01977 100644 --- a/CVE-2024/CVE-2024-267xx/CVE-2024-26773.json +++ b/CVE-2024/CVE-2024-267xx/CVE-2024-26773.json @@ -2,7 +2,7 @@ "id": "CVE-2024-26773", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-04-03T17:15:53.080", - "lastModified": "2024-06-25T22:15:22.300", + "lastModified": "2024-06-27T13:15:56.330", "vulnStatus": "Awaiting Analysis", "descriptions": [ { @@ -51,6 +51,10 @@ { "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-267xx/CVE-2024-26777.json b/CVE-2024/CVE-2024-267xx/CVE-2024-26777.json index 8ae3ef0814c..31541262455 100644 --- a/CVE-2024/CVE-2024-267xx/CVE-2024-26777.json +++ b/CVE-2024/CVE-2024-267xx/CVE-2024-26777.json @@ -2,7 +2,7 @@ "id": "CVE-2024-26777", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-04-03T17:15:53.303", - "lastModified": "2024-06-25T22:15:22.423", + "lastModified": "2024-06-27T13:15:56.407", "vulnStatus": "Awaiting Analysis", "descriptions": [ { @@ -51,6 +51,10 @@ { "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-267xx/CVE-2024-26778.json b/CVE-2024/CVE-2024-267xx/CVE-2024-26778.json index 72a2bee83fe..9914c36b329 100644 --- a/CVE-2024/CVE-2024-267xx/CVE-2024-26778.json +++ b/CVE-2024/CVE-2024-267xx/CVE-2024-26778.json @@ -2,7 +2,7 @@ "id": "CVE-2024-26778", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-04-03T17:15:53.370", - "lastModified": "2024-06-25T23:15:25.357", + "lastModified": "2024-06-27T12:15:20.790", "vulnStatus": "Awaiting Analysis", "descriptions": [ { @@ -51,6 +51,10 @@ { "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-267xx/CVE-2024-26779.json b/CVE-2024/CVE-2024-267xx/CVE-2024-26779.json index 63b08b6c334..6b406ff406d 100644 --- a/CVE-2024/CVE-2024-267xx/CVE-2024-26779.json +++ b/CVE-2024/CVE-2024-267xx/CVE-2024-26779.json @@ -2,7 +2,7 @@ "id": "CVE-2024-26779", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-04-03T17:15:53.423", - "lastModified": "2024-06-25T23:15:25.450", + "lastModified": "2024-06-27T13:15:56.473", "vulnStatus": "Awaiting Analysis", "descriptions": [ { @@ -51,6 +51,10 @@ { "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-267xx/CVE-2024-26791.json b/CVE-2024/CVE-2024-267xx/CVE-2024-26791.json index 85ad6517fd1..69080ad304a 100644 --- a/CVE-2024/CVE-2024-267xx/CVE-2024-26791.json +++ b/CVE-2024/CVE-2024-267xx/CVE-2024-26791.json @@ -2,7 +2,7 @@ "id": "CVE-2024-26791", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-04-04T09:15:08.510", - "lastModified": "2024-06-25T23:15:25.660", + "lastModified": "2024-06-27T13:15:56.533", "vulnStatus": "Awaiting Analysis", "descriptions": [ { @@ -51,6 +51,10 @@ { "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-267xx/CVE-2024-26793.json b/CVE-2024/CVE-2024-267xx/CVE-2024-26793.json index fc0cd5abe05..b7136e7ff8d 100644 --- a/CVE-2024/CVE-2024-267xx/CVE-2024-26793.json +++ b/CVE-2024/CVE-2024-267xx/CVE-2024-26793.json @@ -2,7 +2,7 @@ "id": "CVE-2024-26793", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-04-04T09:15:08.620", - "lastModified": "2024-06-25T22:15:22.770", + "lastModified": "2024-06-27T12:15:20.877", "vulnStatus": "Awaiting Analysis", "descriptions": [ { @@ -51,6 +51,10 @@ { "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-268xx/CVE-2024-26801.json b/CVE-2024/CVE-2024-268xx/CVE-2024-26801.json index d8672868714..b203aa2edbd 100644 --- a/CVE-2024/CVE-2024-268xx/CVE-2024-26801.json +++ b/CVE-2024/CVE-2024-268xx/CVE-2024-26801.json @@ -2,7 +2,7 @@ "id": "CVE-2024-26801", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-04-04T09:15:09.050", - "lastModified": "2024-06-25T22:15:22.927", + "lastModified": "2024-06-27T13:15:56.607", "vulnStatus": "Awaiting Analysis", "descriptions": [ { @@ -51,6 +51,10 @@ { "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-268xx/CVE-2024-26805.json b/CVE-2024/CVE-2024-268xx/CVE-2024-26805.json index 1bb207001ec..67e94b5ac5e 100644 --- a/CVE-2024/CVE-2024-268xx/CVE-2024-26805.json +++ b/CVE-2024/CVE-2024-268xx/CVE-2024-26805.json @@ -2,7 +2,7 @@ "id": "CVE-2024-26805", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-04-04T09:15:09.277", - "lastModified": "2024-06-25T23:15:25.770", + "lastModified": "2024-06-27T12:15:20.960", "vulnStatus": "Awaiting Analysis", "descriptions": [ { @@ -51,6 +51,10 @@ { "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-268xx/CVE-2024-26816.json b/CVE-2024/CVE-2024-268xx/CVE-2024-26816.json index 9bc7b60d17c..3d7cc3fd912 100644 --- a/CVE-2024/CVE-2024-268xx/CVE-2024-26816.json +++ b/CVE-2024/CVE-2024-268xx/CVE-2024-26816.json @@ -2,7 +2,7 @@ "id": "CVE-2024-26816", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-04-10T14:15:07.490", - "lastModified": "2024-06-25T22:15:23.477", + "lastModified": "2024-06-27T12:15:21.060", "vulnStatus": "Awaiting Analysis", "descriptions": [ { @@ -55,6 +55,10 @@ { "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-268xx/CVE-2024-26817.json b/CVE-2024/CVE-2024-268xx/CVE-2024-26817.json index 95ec571a024..d5a946c5794 100644 --- a/CVE-2024/CVE-2024-268xx/CVE-2024-26817.json +++ b/CVE-2024/CVE-2024-268xx/CVE-2024-26817.json @@ -2,7 +2,7 @@ "id": "CVE-2024-26817", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-04-13T12:15:11.730", - "lastModified": "2024-06-25T22:15:23.553", + "lastModified": "2024-06-27T12:15:21.143", "vulnStatus": "Awaiting Analysis", "descriptions": [ { @@ -51,6 +51,10 @@ { "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-268xx/CVE-2024-26820.json b/CVE-2024/CVE-2024-268xx/CVE-2024-26820.json index 7da7dc6daae..2aa174fba3c 100644 --- a/CVE-2024/CVE-2024-268xx/CVE-2024-26820.json +++ b/CVE-2024/CVE-2024-268xx/CVE-2024-26820.json @@ -2,7 +2,7 @@ "id": "CVE-2024-26820", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-04-17T10:15:08.867", - "lastModified": "2024-06-25T22:15:23.623", + "lastModified": "2024-06-27T12:15:21.217", "vulnStatus": "Awaiting Analysis", "descriptions": [ { @@ -51,6 +51,10 @@ { "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-268xx/CVE-2024-26825.json b/CVE-2024/CVE-2024-268xx/CVE-2024-26825.json index e5cdfaf57ce..a511781d83c 100644 --- a/CVE-2024/CVE-2024-268xx/CVE-2024-26825.json +++ b/CVE-2024/CVE-2024-268xx/CVE-2024-26825.json @@ -2,7 +2,7 @@ "id": "CVE-2024-26825", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-04-17T10:15:09.130", - "lastModified": "2024-06-25T23:15:26.067", + "lastModified": "2024-06-27T12:15:21.290", "vulnStatus": "Awaiting Analysis", "descriptions": [ { @@ -51,6 +51,10 @@ { "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-268xx/CVE-2024-26839.json b/CVE-2024/CVE-2024-268xx/CVE-2024-26839.json index fef60005257..37eecdcfcc6 100644 --- a/CVE-2024/CVE-2024-268xx/CVE-2024-26839.json +++ b/CVE-2024/CVE-2024-268xx/CVE-2024-26839.json @@ -2,7 +2,7 @@ "id": "CVE-2024-26839", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-04-17T10:15:09.860", - "lastModified": "2024-06-25T22:15:23.693", + "lastModified": "2024-06-27T12:15:21.357", "vulnStatus": "Awaiting Analysis", "descriptions": [ { @@ -51,6 +51,10 @@ { "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-268xx/CVE-2024-26840.json b/CVE-2024/CVE-2024-268xx/CVE-2024-26840.json index 1bcbdccd683..113e2108d09 100644 --- a/CVE-2024/CVE-2024-268xx/CVE-2024-26840.json +++ b/CVE-2024/CVE-2024-268xx/CVE-2024-26840.json @@ -2,7 +2,7 @@ "id": "CVE-2024-26840", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-04-17T10:15:09.910", - "lastModified": "2024-06-25T23:15:26.453", + "lastModified": "2024-06-27T13:15:56.713", "vulnStatus": "Awaiting Analysis", "descriptions": [ { @@ -51,6 +51,10 @@ { "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-268xx/CVE-2024-26845.json b/CVE-2024/CVE-2024-268xx/CVE-2024-26845.json index 2265dd56290..d8ecdbf1fab 100644 --- a/CVE-2024/CVE-2024-268xx/CVE-2024-26845.json +++ b/CVE-2024/CVE-2024-268xx/CVE-2024-26845.json @@ -2,7 +2,7 @@ "id": "CVE-2024-26845", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-04-17T10:15:10.137", - "lastModified": "2024-06-25T23:15:26.553", + "lastModified": "2024-06-27T12:15:21.423", "vulnStatus": "Awaiting Analysis", "descriptions": [ { @@ -51,6 +51,10 @@ { "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-268xx/CVE-2024-26851.json b/CVE-2024/CVE-2024-268xx/CVE-2024-26851.json index f1f0a441c96..3d8592c42d9 100644 --- a/CVE-2024/CVE-2024-268xx/CVE-2024-26851.json +++ b/CVE-2024/CVE-2024-268xx/CVE-2024-26851.json @@ -2,7 +2,7 @@ "id": "CVE-2024-26851", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-04-17T11:15:08.473", - "lastModified": "2024-06-25T22:15:23.967", + "lastModified": "2024-06-27T13:15:56.800", "vulnStatus": "Awaiting Analysis", "descriptions": [ { @@ -51,6 +51,10 @@ { "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-268xx/CVE-2024-26852.json b/CVE-2024/CVE-2024-268xx/CVE-2024-26852.json index 43b1ea83a71..16cf48e9b8c 100644 --- a/CVE-2024/CVE-2024-268xx/CVE-2024-26852.json +++ b/CVE-2024/CVE-2024-268xx/CVE-2024-26852.json @@ -2,7 +2,7 @@ "id": "CVE-2024-26852", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-04-17T11:15:08.530", - "lastModified": "2024-06-25T22:15:24.040", + "lastModified": "2024-06-27T12:15:21.490", "vulnStatus": "Awaiting Analysis", "descriptions": [ { @@ -51,6 +51,10 @@ { "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-268xx/CVE-2024-26857.json b/CVE-2024/CVE-2024-268xx/CVE-2024-26857.json index e63788086e5..87ac18a2e2e 100644 --- a/CVE-2024/CVE-2024-268xx/CVE-2024-26857.json +++ b/CVE-2024/CVE-2024-268xx/CVE-2024-26857.json @@ -2,7 +2,7 @@ "id": "CVE-2024-26857", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-04-17T11:15:08.787", - "lastModified": "2024-06-25T22:15:24.170", + "lastModified": "2024-06-27T13:15:56.880", "vulnStatus": "Awaiting Analysis", "descriptions": [ { @@ -51,6 +51,10 @@ { "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-268xx/CVE-2024-26859.json b/CVE-2024/CVE-2024-268xx/CVE-2024-26859.json index eb6b3469b68..ed802089bfe 100644 --- a/CVE-2024/CVE-2024-268xx/CVE-2024-26859.json +++ b/CVE-2024/CVE-2024-268xx/CVE-2024-26859.json @@ -2,7 +2,7 @@ "id": "CVE-2024-26859", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-04-17T11:15:08.893", - "lastModified": "2024-06-25T22:15:24.240", + "lastModified": "2024-06-27T12:15:21.563", "vulnStatus": "Awaiting Analysis", "descriptions": [ { @@ -55,6 +55,10 @@ { "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-268xx/CVE-2024-26863.json b/CVE-2024/CVE-2024-268xx/CVE-2024-26863.json index bbfdbb33be2..dad23093e35 100644 --- a/CVE-2024/CVE-2024-268xx/CVE-2024-26863.json +++ b/CVE-2024/CVE-2024-268xx/CVE-2024-26863.json @@ -2,7 +2,7 @@ "id": "CVE-2024-26863", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-04-17T11:15:09.100", - "lastModified": "2024-06-25T23:15:26.670", + "lastModified": "2024-06-27T12:15:21.633", "vulnStatus": "Awaiting Analysis", "descriptions": [ { @@ -55,6 +55,10 @@ { "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-268xx/CVE-2024-26874.json b/CVE-2024/CVE-2024-268xx/CVE-2024-26874.json index a31d5046834..25ae5b95905 100644 --- a/CVE-2024/CVE-2024-268xx/CVE-2024-26874.json +++ b/CVE-2024/CVE-2024-268xx/CVE-2024-26874.json @@ -2,7 +2,7 @@ "id": "CVE-2024-26874", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-04-17T11:15:09.670", - "lastModified": "2024-06-25T22:15:24.520", + "lastModified": "2024-06-27T13:15:56.957", "vulnStatus": "Awaiting Analysis", "descriptions": [ { @@ -55,6 +55,10 @@ { "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-268xx/CVE-2024-26875.json b/CVE-2024/CVE-2024-268xx/CVE-2024-26875.json index 53360197cd3..8eadc5eb6a3 100644 --- a/CVE-2024/CVE-2024-268xx/CVE-2024-26875.json +++ b/CVE-2024/CVE-2024-268xx/CVE-2024-26875.json @@ -2,7 +2,7 @@ "id": "CVE-2024-26875", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-04-17T11:15:09.723", - "lastModified": "2024-06-25T22:15:24.587", + "lastModified": "2024-06-27T12:15:21.710", "vulnStatus": "Awaiting Analysis", "descriptions": [ { @@ -55,6 +55,10 @@ { "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-268xx/CVE-2024-26878.json b/CVE-2024/CVE-2024-268xx/CVE-2024-26878.json index c8c771c10fb..146e205aab2 100644 --- a/CVE-2024/CVE-2024-268xx/CVE-2024-26878.json +++ b/CVE-2024/CVE-2024-268xx/CVE-2024-26878.json @@ -2,7 +2,7 @@ "id": "CVE-2024-26878", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-04-17T11:15:09.870", - "lastModified": "2024-06-25T22:15:24.657", + "lastModified": "2024-06-27T12:15:21.783", "vulnStatus": "Awaiting Analysis", "descriptions": [ { @@ -55,6 +55,10 @@ { "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-268xx/CVE-2024-26880.json b/CVE-2024/CVE-2024-268xx/CVE-2024-26880.json index 15e04ce77ae..3da29332cfd 100644 --- a/CVE-2024/CVE-2024-268xx/CVE-2024-26880.json +++ b/CVE-2024/CVE-2024-268xx/CVE-2024-26880.json @@ -2,7 +2,7 @@ "id": "CVE-2024-26880", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-04-17T11:15:09.963", - "lastModified": "2024-06-25T22:15:24.737", + "lastModified": "2024-06-27T12:15:21.847", "vulnStatus": "Awaiting Analysis", "descriptions": [ { @@ -55,6 +55,10 @@ { "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-268xx/CVE-2024-26883.json b/CVE-2024/CVE-2024-268xx/CVE-2024-26883.json index c4df679f919..d5bfce9124f 100644 --- a/CVE-2024/CVE-2024-268xx/CVE-2024-26883.json +++ b/CVE-2024/CVE-2024-268xx/CVE-2024-26883.json @@ -2,7 +2,7 @@ "id": "CVE-2024-26883", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-04-17T11:15:10.113", - "lastModified": "2024-06-25T22:15:24.943", + "lastModified": "2024-06-27T12:15:21.913", "vulnStatus": "Modified", "descriptions": [ { @@ -184,6 +184,10 @@ { "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-268xx/CVE-2024-26884.json b/CVE-2024/CVE-2024-268xx/CVE-2024-26884.json index 5205ce66024..b6f95e075c7 100644 --- a/CVE-2024/CVE-2024-268xx/CVE-2024-26884.json +++ b/CVE-2024/CVE-2024-268xx/CVE-2024-26884.json @@ -2,7 +2,7 @@ "id": "CVE-2024-26884", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-04-17T11:15:10.163", - "lastModified": "2024-06-25T22:15:25.060", + "lastModified": "2024-06-27T12:15:22.003", "vulnStatus": "Modified", "descriptions": [ { @@ -185,6 +185,10 @@ { "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-268xx/CVE-2024-26889.json b/CVE-2024/CVE-2024-268xx/CVE-2024-26889.json index 4455a2d5133..816700ca139 100644 --- a/CVE-2024/CVE-2024-268xx/CVE-2024-26889.json +++ b/CVE-2024/CVE-2024-268xx/CVE-2024-26889.json @@ -2,7 +2,7 @@ "id": "CVE-2024-26889", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-04-17T11:15:10.380", - "lastModified": "2024-06-25T23:15:26.987", + "lastModified": "2024-06-27T12:15:22.100", "vulnStatus": "Awaiting Analysis", "descriptions": [ { @@ -55,6 +55,10 @@ { "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-268xx/CVE-2024-26894.json b/CVE-2024/CVE-2024-268xx/CVE-2024-26894.json index 7909a7323a2..02ba13eb448 100644 --- a/CVE-2024/CVE-2024-268xx/CVE-2024-26894.json +++ b/CVE-2024/CVE-2024-268xx/CVE-2024-26894.json @@ -2,7 +2,7 @@ "id": "CVE-2024-26894", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-04-17T11:15:10.630", - "lastModified": "2024-06-25T22:15:25.447", + "lastModified": "2024-06-27T12:15:22.177", "vulnStatus": "Awaiting Analysis", "descriptions": [ { @@ -55,6 +55,10 @@ { "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-268xx/CVE-2024-26898.json b/CVE-2024/CVE-2024-268xx/CVE-2024-26898.json index 00202a078be..8ce9c98778e 100644 --- a/CVE-2024/CVE-2024-268xx/CVE-2024-26898.json +++ b/CVE-2024/CVE-2024-268xx/CVE-2024-26898.json @@ -2,7 +2,7 @@ "id": "CVE-2024-26898", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-04-17T11:15:10.820", - "lastModified": "2024-06-25T22:15:25.527", + "lastModified": "2024-06-27T12:15:22.257", "vulnStatus": "Modified", "descriptions": [ { @@ -185,6 +185,10 @@ { "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-269xx/CVE-2024-26901.json b/CVE-2024/CVE-2024-269xx/CVE-2024-26901.json index 4824a82f44a..5d229fcb916 100644 --- a/CVE-2024/CVE-2024-269xx/CVE-2024-26901.json +++ b/CVE-2024/CVE-2024-269xx/CVE-2024-26901.json @@ -2,7 +2,7 @@ "id": "CVE-2024-26901", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-04-17T11:15:10.960", - "lastModified": "2024-06-25T22:15:25.633", + "lastModified": "2024-06-27T12:15:22.490", "vulnStatus": "Modified", "descriptions": [ { @@ -185,6 +185,10 @@ { "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-269xx/CVE-2024-26903.json b/CVE-2024/CVE-2024-269xx/CVE-2024-26903.json index 58deb7b0ea0..ae45e147ee9 100644 --- a/CVE-2024/CVE-2024-269xx/CVE-2024-26903.json +++ b/CVE-2024/CVE-2024-269xx/CVE-2024-26903.json @@ -2,7 +2,7 @@ "id": "CVE-2024-26903", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-04-17T11:15:11.060", - "lastModified": "2024-06-25T22:15:25.773", + "lastModified": "2024-06-27T12:15:22.637", "vulnStatus": "Modified", "descriptions": [ { @@ -170,6 +170,10 @@ { "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-269xx/CVE-2024-26917.json b/CVE-2024/CVE-2024-269xx/CVE-2024-26917.json index 1746fb354ab..8efc1a0bdeb 100644 --- a/CVE-2024/CVE-2024-269xx/CVE-2024-26917.json +++ b/CVE-2024/CVE-2024-269xx/CVE-2024-26917.json @@ -2,7 +2,7 @@ "id": "CVE-2024-26917", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-04-17T16:15:08.247", - "lastModified": "2024-06-25T22:15:26.190", + "lastModified": "2024-06-27T12:15:22.740", "vulnStatus": "Awaiting Analysis", "descriptions": [ { @@ -51,6 +51,10 @@ { "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-269xx/CVE-2024-26922.json b/CVE-2024/CVE-2024-269xx/CVE-2024-26922.json index c99ae8c4abc..658cc33c2a1 100644 --- a/CVE-2024/CVE-2024-269xx/CVE-2024-26922.json +++ b/CVE-2024/CVE-2024-269xx/CVE-2024-26922.json @@ -2,7 +2,7 @@ "id": "CVE-2024-26922", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-04-23T13:15:46.643", - "lastModified": "2024-06-25T23:15:27.263", + "lastModified": "2024-06-27T12:15:22.813", "vulnStatus": "Awaiting Analysis", "descriptions": [ { @@ -51,6 +51,10 @@ { "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-269xx/CVE-2024-26923.json b/CVE-2024/CVE-2024-269xx/CVE-2024-26923.json index 7b0583524a5..f1dff2234ef 100644 --- a/CVE-2024/CVE-2024-269xx/CVE-2024-26923.json +++ b/CVE-2024/CVE-2024-269xx/CVE-2024-26923.json @@ -2,7 +2,7 @@ "id": "CVE-2024-26923", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-04-25T06:15:57.160", - "lastModified": "2024-06-25T23:15:27.803", + "lastModified": "2024-06-27T12:15:22.923", "vulnStatus": "Awaiting Analysis", "descriptions": [ { @@ -51,6 +51,10 @@ { "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-269xx/CVE-2024-26931.json b/CVE-2024/CVE-2024-269xx/CVE-2024-26931.json index eaaa1e8f61d..652c113eeca 100644 --- a/CVE-2024/CVE-2024-269xx/CVE-2024-26931.json +++ b/CVE-2024/CVE-2024-269xx/CVE-2024-26931.json @@ -2,7 +2,7 @@ "id": "CVE-2024-26931", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-05-01T06:15:07.673", - "lastModified": "2024-06-25T22:15:26.337", + "lastModified": "2024-06-27T13:15:57.053", "vulnStatus": "Awaiting Analysis", "descriptions": [ { @@ -55,6 +55,10 @@ { "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-269xx/CVE-2024-26934.json b/CVE-2024/CVE-2024-269xx/CVE-2024-26934.json index c36a6058183..70ab83e0d88 100644 --- a/CVE-2024/CVE-2024-269xx/CVE-2024-26934.json +++ b/CVE-2024/CVE-2024-269xx/CVE-2024-26934.json @@ -2,7 +2,7 @@ "id": "CVE-2024-26934", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-05-01T06:15:08.090", - "lastModified": "2024-06-25T23:15:27.970", + "lastModified": "2024-06-27T13:15:57.133", "vulnStatus": "Modified", "descriptions": [ { @@ -190,6 +190,10 @@ { "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-269xx/CVE-2024-26955.json b/CVE-2024/CVE-2024-269xx/CVE-2024-26955.json index 53e352da8cd..b99446a2612 100644 --- a/CVE-2024/CVE-2024-269xx/CVE-2024-26955.json +++ b/CVE-2024/CVE-2024-269xx/CVE-2024-26955.json @@ -2,7 +2,7 @@ "id": "CVE-2024-26955", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-05-01T06:15:11.730", - "lastModified": "2024-06-25T22:15:26.650", + "lastModified": "2024-06-27T13:15:57.220", "vulnStatus": "Awaiting Analysis", "descriptions": [ { @@ -55,6 +55,10 @@ { "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-269xx/CVE-2024-26956.json b/CVE-2024/CVE-2024-269xx/CVE-2024-26956.json index d6d925f87a2..2c649d1bc46 100644 --- a/CVE-2024/CVE-2024-269xx/CVE-2024-26956.json +++ b/CVE-2024/CVE-2024-269xx/CVE-2024-26956.json @@ -2,7 +2,7 @@ "id": "CVE-2024-26956", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-05-01T06:15:11.837", - "lastModified": "2024-06-25T22:15:26.773", + "lastModified": "2024-06-27T13:15:57.290", "vulnStatus": "Awaiting Analysis", "descriptions": [ { @@ -55,6 +55,10 @@ { "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-269xx/CVE-2024-26965.json b/CVE-2024/CVE-2024-269xx/CVE-2024-26965.json index 8ba919855cd..982a83521e6 100644 --- a/CVE-2024/CVE-2024-269xx/CVE-2024-26965.json +++ b/CVE-2024/CVE-2024-269xx/CVE-2024-26965.json @@ -2,7 +2,7 @@ "id": "CVE-2024-26965", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-05-01T06:15:12.783", - "lastModified": "2024-06-25T22:15:27.120", + "lastModified": "2024-06-27T12:15:23.043", "vulnStatus": "Awaiting Analysis", "descriptions": [ { @@ -55,6 +55,10 @@ { "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-269xx/CVE-2024-26966.json b/CVE-2024/CVE-2024-269xx/CVE-2024-26966.json index 2d57ff934a1..60b5b34c0c8 100644 --- a/CVE-2024/CVE-2024-269xx/CVE-2024-26966.json +++ b/CVE-2024/CVE-2024-269xx/CVE-2024-26966.json @@ -2,7 +2,7 @@ "id": "CVE-2024-26966", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-05-01T06:15:12.913", - "lastModified": "2024-06-25T22:15:27.230", + "lastModified": "2024-06-27T12:15:23.127", "vulnStatus": "Awaiting Analysis", "descriptions": [ { @@ -55,6 +55,10 @@ { "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-269xx/CVE-2024-26969.json b/CVE-2024/CVE-2024-269xx/CVE-2024-26969.json index 2e210d79e3d..ec8f0f1ac22 100644 --- a/CVE-2024/CVE-2024-269xx/CVE-2024-26969.json +++ b/CVE-2024/CVE-2024-269xx/CVE-2024-26969.json @@ -2,7 +2,7 @@ "id": "CVE-2024-26969", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-05-01T06:15:13.220", - "lastModified": "2024-06-25T23:15:28.200", + "lastModified": "2024-06-27T13:15:57.397", "vulnStatus": "Awaiting Analysis", "descriptions": [ { @@ -55,6 +55,10 @@ { "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-269xx/CVE-2024-26973.json b/CVE-2024/CVE-2024-269xx/CVE-2024-26973.json index 8dc6279dfbc..c3abc0c84fd 100644 --- a/CVE-2024/CVE-2024-269xx/CVE-2024-26973.json +++ b/CVE-2024/CVE-2024-269xx/CVE-2024-26973.json @@ -2,7 +2,7 @@ "id": "CVE-2024-26973", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-05-01T06:15:13.920", - "lastModified": "2024-06-25T22:15:27.373", + "lastModified": "2024-06-27T12:15:23.210", "vulnStatus": "Awaiting Analysis", "descriptions": [ { @@ -55,6 +55,10 @@ { "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-269xx/CVE-2024-26974.json b/CVE-2024/CVE-2024-269xx/CVE-2024-26974.json index 600d4ff0f07..bf46bd01f6e 100644 --- a/CVE-2024/CVE-2024-269xx/CVE-2024-26974.json +++ b/CVE-2024/CVE-2024-269xx/CVE-2024-26974.json @@ -2,7 +2,7 @@ "id": "CVE-2024-26974", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-05-01T06:15:14.313", - "lastModified": "2024-06-25T23:15:28.300", + "lastModified": "2024-06-27T12:15:23.293", "vulnStatus": "Awaiting Analysis", "descriptions": [ { @@ -55,6 +55,10 @@ { "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-269xx/CVE-2024-26976.json b/CVE-2024/CVE-2024-269xx/CVE-2024-26976.json index ccc7ad7e0e4..921faa8bd0e 100644 --- a/CVE-2024/CVE-2024-269xx/CVE-2024-26976.json +++ b/CVE-2024/CVE-2024-269xx/CVE-2024-26976.json @@ -2,7 +2,7 @@ "id": "CVE-2024-26976", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-05-01T06:15:14.667", - "lastModified": "2024-06-25T23:15:28.413", + "lastModified": "2024-06-27T12:15:23.370", "vulnStatus": "Awaiting Analysis", "descriptions": [ { @@ -55,6 +55,10 @@ { "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-269xx/CVE-2024-26981.json b/CVE-2024/CVE-2024-269xx/CVE-2024-26981.json index 5bc7f748e17..58080760813 100644 --- a/CVE-2024/CVE-2024-269xx/CVE-2024-26981.json +++ b/CVE-2024/CVE-2024-269xx/CVE-2024-26981.json @@ -2,7 +2,7 @@ "id": "CVE-2024-26981", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-05-01T06:15:15.517", - "lastModified": "2024-06-25T23:15:28.517", + "lastModified": "2024-06-27T12:15:23.460", "vulnStatus": "Awaiting Analysis", "descriptions": [ { @@ -51,6 +51,10 @@ { "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-269xx/CVE-2024-26984.json b/CVE-2024/CVE-2024-269xx/CVE-2024-26984.json index 904776bff8d..5f68dd4008e 100644 --- a/CVE-2024/CVE-2024-269xx/CVE-2024-26984.json +++ b/CVE-2024/CVE-2024-269xx/CVE-2024-26984.json @@ -2,7 +2,7 @@ "id": "CVE-2024-26984", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-05-01T06:15:15.880", - "lastModified": "2024-06-25T23:15:28.603", + "lastModified": "2024-06-27T13:15:57.467", "vulnStatus": "Awaiting Analysis", "descriptions": [ { @@ -51,6 +51,10 @@ { "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-269xx/CVE-2024-26993.json b/CVE-2024/CVE-2024-269xx/CVE-2024-26993.json index 5469b4040a8..49103f84a1b 100644 --- a/CVE-2024/CVE-2024-269xx/CVE-2024-26993.json +++ b/CVE-2024/CVE-2024-269xx/CVE-2024-26993.json @@ -2,7 +2,7 @@ "id": "CVE-2024-26993", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-05-01T06:15:17.110", - "lastModified": "2024-06-25T22:15:27.710", + "lastModified": "2024-06-27T13:15:57.563", "vulnStatus": "Awaiting Analysis", "descriptions": [ { @@ -51,6 +51,10 @@ { "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-269xx/CVE-2024-26994.json b/CVE-2024/CVE-2024-269xx/CVE-2024-26994.json index cd7af34063d..c0c93d353a7 100644 --- a/CVE-2024/CVE-2024-269xx/CVE-2024-26994.json +++ b/CVE-2024/CVE-2024-269xx/CVE-2024-26994.json @@ -2,7 +2,7 @@ "id": "CVE-2024-26994", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-05-01T06:15:17.207", - "lastModified": "2024-06-25T23:15:28.800", + "lastModified": "2024-06-27T12:15:23.573", "vulnStatus": "Awaiting Analysis", "descriptions": [ { @@ -51,6 +51,10 @@ { "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-269xx/CVE-2024-26997.json b/CVE-2024/CVE-2024-269xx/CVE-2024-26997.json index c74dc1a42a1..828b15d823e 100644 --- a/CVE-2024/CVE-2024-269xx/CVE-2024-26997.json +++ b/CVE-2024/CVE-2024-269xx/CVE-2024-26997.json @@ -2,7 +2,7 @@ "id": "CVE-2024-26997", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-05-01T06:15:17.637", - "lastModified": "2024-06-25T22:15:27.780", + "lastModified": "2024-06-27T13:15:57.663", "vulnStatus": "Awaiting Analysis", "descriptions": [ { @@ -51,6 +51,10 @@ { "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-270xx/CVE-2024-27001.json b/CVE-2024/CVE-2024-270xx/CVE-2024-27001.json index 7382e70864a..e117329e655 100644 --- a/CVE-2024/CVE-2024-270xx/CVE-2024-27001.json +++ b/CVE-2024/CVE-2024-270xx/CVE-2024-27001.json @@ -2,7 +2,7 @@ "id": "CVE-2024-27001", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-05-01T06:15:18.330", - "lastModified": "2024-06-25T23:15:29.090", + "lastModified": "2024-06-27T12:15:23.673", "vulnStatus": "Awaiting Analysis", "descriptions": [ { @@ -51,6 +51,10 @@ { "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-270xx/CVE-2024-27008.json b/CVE-2024/CVE-2024-270xx/CVE-2024-27008.json index bcc64cef4a1..71bddf22582 100644 --- a/CVE-2024/CVE-2024-270xx/CVE-2024-27008.json +++ b/CVE-2024/CVE-2024-270xx/CVE-2024-27008.json @@ -2,7 +2,7 @@ "id": "CVE-2024-27008", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-05-01T06:15:19.240", - "lastModified": "2024-06-25T22:15:28.000", + "lastModified": "2024-06-27T13:15:57.753", "vulnStatus": "Awaiting Analysis", "descriptions": [ { @@ -51,6 +51,10 @@ { "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-270xx/CVE-2024-27013.json b/CVE-2024/CVE-2024-270xx/CVE-2024-27013.json index b033ca30607..c09b9bcedb9 100644 --- a/CVE-2024/CVE-2024-270xx/CVE-2024-27013.json +++ b/CVE-2024/CVE-2024-270xx/CVE-2024-27013.json @@ -2,7 +2,7 @@ "id": "CVE-2024-27013", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-05-01T06:15:19.857", - "lastModified": "2024-06-25T23:15:29.180", + "lastModified": "2024-06-27T12:15:23.747", "vulnStatus": "Modified", "descriptions": [ { @@ -216,6 +216,10 @@ { "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-270xx/CVE-2024-27020.json b/CVE-2024/CVE-2024-270xx/CVE-2024-27020.json index ae10d932bd0..32eb2bddecd 100644 --- a/CVE-2024/CVE-2024-270xx/CVE-2024-27020.json +++ b/CVE-2024/CVE-2024-270xx/CVE-2024-27020.json @@ -2,7 +2,7 @@ "id": "CVE-2024-27020", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-05-01T06:15:20.840", - "lastModified": "2024-06-25T22:15:28.077", + "lastModified": "2024-06-27T12:15:23.853", "vulnStatus": "Modified", "descriptions": [ { @@ -191,6 +191,10 @@ { "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-270xx/CVE-2024-27024.json b/CVE-2024/CVE-2024-270xx/CVE-2024-27024.json index ca2f55d1673..43fd6484c35 100644 --- a/CVE-2024/CVE-2024-270xx/CVE-2024-27024.json +++ b/CVE-2024/CVE-2024-270xx/CVE-2024-27024.json @@ -2,7 +2,7 @@ "id": "CVE-2024-27024", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-05-01T13:15:48.847", - "lastModified": "2024-06-25T22:15:28.170", + "lastModified": "2024-06-27T12:15:23.943", "vulnStatus": "Awaiting Analysis", "descriptions": [ { @@ -51,6 +51,10 @@ { "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-270xx/CVE-2024-27028.json b/CVE-2024/CVE-2024-270xx/CVE-2024-27028.json index 04cb65f9333..bc0fadd14ff 100644 --- a/CVE-2024/CVE-2024-270xx/CVE-2024-27028.json +++ b/CVE-2024/CVE-2024-270xx/CVE-2024-27028.json @@ -2,7 +2,7 @@ "id": "CVE-2024-27028", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-05-01T13:15:49.030", - "lastModified": "2024-06-25T23:15:29.310", + "lastModified": "2024-06-27T12:15:24.013", "vulnStatus": "Awaiting Analysis", "descriptions": [ { @@ -55,6 +55,10 @@ { "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-270xx/CVE-2024-27043.json b/CVE-2024/CVE-2024-270xx/CVE-2024-27043.json index b0695831a36..82b043babdc 100644 --- a/CVE-2024/CVE-2024-270xx/CVE-2024-27043.json +++ b/CVE-2024/CVE-2024-270xx/CVE-2024-27043.json @@ -2,7 +2,7 @@ "id": "CVE-2024-27043", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-05-01T13:15:49.740", - "lastModified": "2024-06-25T22:15:28.387", + "lastModified": "2024-06-27T12:15:24.107", "vulnStatus": "Awaiting Analysis", "descriptions": [ { @@ -55,6 +55,10 @@ { "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-270xx/CVE-2024-27046.json b/CVE-2024/CVE-2024-270xx/CVE-2024-27046.json index 915f3cc8971..2cfd76cc3a5 100644 --- a/CVE-2024/CVE-2024-270xx/CVE-2024-27046.json +++ b/CVE-2024/CVE-2024-270xx/CVE-2024-27046.json @@ -2,7 +2,7 @@ "id": "CVE-2024-27046", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-05-01T13:15:49.880", - "lastModified": "2024-06-25T22:15:28.983", + "lastModified": "2024-06-27T12:15:24.180", "vulnStatus": "Awaiting Analysis", "descriptions": [ { @@ -55,6 +55,10 @@ { "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-270xx/CVE-2024-27059.json b/CVE-2024/CVE-2024-270xx/CVE-2024-27059.json index 732b9d9d197..4d1fffb242c 100644 --- a/CVE-2024/CVE-2024-270xx/CVE-2024-27059.json +++ b/CVE-2024/CVE-2024-270xx/CVE-2024-27059.json @@ -2,7 +2,7 @@ "id": "CVE-2024-27059", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-05-01T13:15:50.493", - "lastModified": "2024-06-25T22:15:29.300", + "lastModified": "2024-06-27T12:15:24.257", "vulnStatus": "Awaiting Analysis", "descriptions": [ { @@ -51,6 +51,10 @@ { "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-270xx/CVE-2024-27074.json b/CVE-2024/CVE-2024-270xx/CVE-2024-27074.json index 2530549a764..2689bdd75bb 100644 --- a/CVE-2024/CVE-2024-270xx/CVE-2024-27074.json +++ b/CVE-2024/CVE-2024-270xx/CVE-2024-27074.json @@ -2,7 +2,7 @@ "id": "CVE-2024-27074", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-05-01T13:15:51.207", - "lastModified": "2024-06-25T23:15:29.483", + "lastModified": "2024-06-27T12:15:24.360", "vulnStatus": "Awaiting Analysis", "descriptions": [ { @@ -55,6 +55,10 @@ { "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-270xx/CVE-2024-27075.json b/CVE-2024/CVE-2024-270xx/CVE-2024-27075.json index 78425f44c2b..e5477397535 100644 --- a/CVE-2024/CVE-2024-270xx/CVE-2024-27075.json +++ b/CVE-2024/CVE-2024-270xx/CVE-2024-27075.json @@ -2,7 +2,7 @@ "id": "CVE-2024-27075", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-05-01T13:15:51.257", - "lastModified": "2024-06-25T22:15:29.430", + "lastModified": "2024-06-27T12:15:24.443", "vulnStatus": "Awaiting Analysis", "descriptions": [ { @@ -55,6 +55,10 @@ { "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-270xx/CVE-2024-27077.json b/CVE-2024/CVE-2024-270xx/CVE-2024-27077.json index 54d9c47ec12..1cb4707b453 100644 --- a/CVE-2024/CVE-2024-270xx/CVE-2024-27077.json +++ b/CVE-2024/CVE-2024-270xx/CVE-2024-27077.json @@ -2,7 +2,7 @@ "id": "CVE-2024-27077", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-05-01T13:15:51.350", - "lastModified": "2024-06-25T23:15:29.637", + "lastModified": "2024-06-27T12:15:24.510", "vulnStatus": "Awaiting Analysis", "descriptions": [ { @@ -55,6 +55,10 @@ { "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-270xx/CVE-2024-27078.json b/CVE-2024/CVE-2024-270xx/CVE-2024-27078.json index 8429ff352b3..a8d70b09775 100644 --- a/CVE-2024/CVE-2024-270xx/CVE-2024-27078.json +++ b/CVE-2024/CVE-2024-270xx/CVE-2024-27078.json @@ -2,7 +2,7 @@ "id": "CVE-2024-27078", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-05-01T13:15:51.393", - "lastModified": "2024-06-25T23:15:29.727", + "lastModified": "2024-06-27T13:15:57.853", "vulnStatus": "Awaiting Analysis", "descriptions": [ { @@ -55,6 +55,10 @@ { "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-273xx/CVE-2024-27388.json b/CVE-2024/CVE-2024-273xx/CVE-2024-27388.json index 27cffd3e5e8..7305dd7cc2e 100644 --- a/CVE-2024/CVE-2024-273xx/CVE-2024-27388.json +++ b/CVE-2024/CVE-2024-273xx/CVE-2024-27388.json @@ -2,7 +2,7 @@ "id": "CVE-2024-27388", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-05-01T13:15:51.550", - "lastModified": "2024-06-25T23:15:29.817", + "lastModified": "2024-06-27T13:15:57.940", "vulnStatus": "Awaiting Analysis", "descriptions": [ { @@ -55,6 +55,10 @@ { "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-273xx/CVE-2024-27395.json b/CVE-2024/CVE-2024-273xx/CVE-2024-27395.json index 3acddd44ac2..100c2039ebe 100644 --- a/CVE-2024/CVE-2024-273xx/CVE-2024-27395.json +++ b/CVE-2024/CVE-2024-273xx/CVE-2024-27395.json @@ -2,7 +2,7 @@ "id": "CVE-2024-27395", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-05-14T15:12:27.683", - "lastModified": "2024-06-25T23:15:29.903", + "lastModified": "2024-06-27T12:15:24.577", "vulnStatus": "Awaiting Analysis", "descriptions": [ { @@ -51,6 +51,10 @@ { "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-273xx/CVE-2024-27396.json b/CVE-2024/CVE-2024-273xx/CVE-2024-27396.json index dd5e04dc498..aec60369ff5 100644 --- a/CVE-2024/CVE-2024-273xx/CVE-2024-27396.json +++ b/CVE-2024/CVE-2024-273xx/CVE-2024-27396.json @@ -2,7 +2,7 @@ "id": "CVE-2024-27396", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-05-14T15:12:27.983", - "lastModified": "2024-06-25T22:15:29.503", + "lastModified": "2024-06-27T12:15:24.647", "vulnStatus": "Awaiting Analysis", "descriptions": [ { @@ -51,6 +51,10 @@ { "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-273xx/CVE-2024-27398.json b/CVE-2024/CVE-2024-273xx/CVE-2024-27398.json index 628ae62a7de..12f2e86fff0 100644 --- a/CVE-2024/CVE-2024-273xx/CVE-2024-27398.json +++ b/CVE-2024/CVE-2024-273xx/CVE-2024-27398.json @@ -2,7 +2,7 @@ "id": "CVE-2024-27398", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-05-14T15:12:28.623", - "lastModified": "2024-06-10T18:15:28.193", + "lastModified": "2024-06-27T12:15:24.713", "vulnStatus": "Awaiting Analysis", "descriptions": [ { @@ -48,6 +48,10 @@ "url": "https://git.kernel.org/stable/c/bfab2c1f7940a232cd519e82fff137e308abfd93", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" }, + { + "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DW2MIOIMOFUSNLHLRYX23AFR36BMKD65/", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" diff --git a/CVE-2024/CVE-2024-273xx/CVE-2024-27399.json b/CVE-2024/CVE-2024-273xx/CVE-2024-27399.json index eb6261254fb..a1113219b4a 100644 --- a/CVE-2024/CVE-2024-273xx/CVE-2024-27399.json +++ b/CVE-2024/CVE-2024-273xx/CVE-2024-27399.json @@ -2,7 +2,7 @@ "id": "CVE-2024-27399", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-05-14T15:12:28.977", - "lastModified": "2024-06-10T18:15:28.267", + "lastModified": "2024-06-27T13:15:58.017", "vulnStatus": "Awaiting Analysis", "descriptions": [ { @@ -48,6 +48,10 @@ "url": "https://git.kernel.org/stable/c/eb86f955488c39526534211f2610e48a5cf8ead4", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" }, + { + "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DW2MIOIMOFUSNLHLRYX23AFR36BMKD65/", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" diff --git a/CVE-2024/CVE-2024-274xx/CVE-2024-27401.json b/CVE-2024/CVE-2024-274xx/CVE-2024-27401.json index 3f4e15a2012..0c162c95c6f 100644 --- a/CVE-2024/CVE-2024-274xx/CVE-2024-27401.json +++ b/CVE-2024/CVE-2024-274xx/CVE-2024-27401.json @@ -2,7 +2,7 @@ "id": "CVE-2024-27401", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-05-14T15:12:29.623", - "lastModified": "2024-06-10T18:15:28.393", + "lastModified": "2024-06-27T12:15:24.870", "vulnStatus": "Awaiting Analysis", "descriptions": [ { @@ -48,6 +48,10 @@ "url": "https://git.kernel.org/stable/c/cca330c59c54207567a648357835f59df9a286bb", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" }, + { + "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DW2MIOIMOFUSNLHLRYX23AFR36BMKD65/", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" diff --git a/CVE-2024/CVE-2024-274xx/CVE-2024-27405.json b/CVE-2024/CVE-2024-274xx/CVE-2024-27405.json index 6a11b9d63fa..615920dcaf5 100644 --- a/CVE-2024/CVE-2024-274xx/CVE-2024-27405.json +++ b/CVE-2024/CVE-2024-274xx/CVE-2024-27405.json @@ -2,7 +2,7 @@ "id": "CVE-2024-27405", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-05-17T12:15:10.500", - "lastModified": "2024-06-25T22:15:29.580", + "lastModified": "2024-06-27T13:15:58.107", "vulnStatus": "Awaiting Analysis", "descriptions": [ { @@ -51,6 +51,10 @@ { "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-274xx/CVE-2024-27410.json b/CVE-2024/CVE-2024-274xx/CVE-2024-27410.json index 81e54234a4f..161781af11f 100644 --- a/CVE-2024/CVE-2024-274xx/CVE-2024-27410.json +++ b/CVE-2024/CVE-2024-274xx/CVE-2024-27410.json @@ -2,7 +2,7 @@ "id": "CVE-2024-27410", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-05-17T12:15:11.690", - "lastModified": "2024-06-25T22:15:29.670", + "lastModified": "2024-06-27T13:15:58.197", "vulnStatus": "Awaiting Analysis", "descriptions": [ { @@ -51,6 +51,10 @@ { "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-274xx/CVE-2024-27412.json b/CVE-2024/CVE-2024-274xx/CVE-2024-27412.json index 40add642a46..1e4a3475a98 100644 --- a/CVE-2024/CVE-2024-274xx/CVE-2024-27412.json +++ b/CVE-2024/CVE-2024-274xx/CVE-2024-27412.json @@ -2,7 +2,7 @@ "id": "CVE-2024-27412", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-05-17T12:15:12.130", - "lastModified": "2024-06-25T22:15:29.737", + "lastModified": "2024-06-27T13:15:58.263", "vulnStatus": "Awaiting Analysis", "descriptions": [ { @@ -51,6 +51,10 @@ { "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-274xx/CVE-2024-27413.json b/CVE-2024/CVE-2024-274xx/CVE-2024-27413.json index 7599b2cbeb3..618161090af 100644 --- a/CVE-2024/CVE-2024-274xx/CVE-2024-27413.json +++ b/CVE-2024/CVE-2024-274xx/CVE-2024-27413.json @@ -2,7 +2,7 @@ "id": "CVE-2024-27413", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-05-17T12:15:12.403", - "lastModified": "2024-06-25T23:15:29.980", + "lastModified": "2024-06-27T13:15:58.340", "vulnStatus": "Awaiting Analysis", "descriptions": [ { @@ -51,6 +51,10 @@ { "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-274xx/CVE-2024-27416.json b/CVE-2024/CVE-2024-274xx/CVE-2024-27416.json index 7f6c365fc13..1152561e933 100644 --- a/CVE-2024/CVE-2024-274xx/CVE-2024-27416.json +++ b/CVE-2024/CVE-2024-274xx/CVE-2024-27416.json @@ -2,7 +2,7 @@ "id": "CVE-2024-27416", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-05-17T12:15:13.070", - "lastModified": "2024-06-25T23:15:30.070", + "lastModified": "2024-06-27T12:15:24.940", "vulnStatus": "Awaiting Analysis", "descriptions": [ { @@ -51,6 +51,10 @@ { "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-274xx/CVE-2024-27419.json b/CVE-2024/CVE-2024-274xx/CVE-2024-27419.json index 1b7bece75c0..b4fb9595d6c 100644 --- a/CVE-2024/CVE-2024-274xx/CVE-2024-27419.json +++ b/CVE-2024/CVE-2024-274xx/CVE-2024-27419.json @@ -2,7 +2,7 @@ "id": "CVE-2024-27419", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-05-17T12:15:13.763", - "lastModified": "2024-06-25T22:15:29.923", + "lastModified": "2024-06-27T12:15:25.033", "vulnStatus": "Awaiting Analysis", "descriptions": [ { @@ -51,6 +51,10 @@ { "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-274xx/CVE-2024-27436.json b/CVE-2024/CVE-2024-274xx/CVE-2024-27436.json index 43a43767932..2c728313743 100644 --- a/CVE-2024/CVE-2024-274xx/CVE-2024-27436.json +++ b/CVE-2024/CVE-2024-274xx/CVE-2024-27436.json @@ -2,7 +2,7 @@ "id": "CVE-2024-27436", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-05-17T13:15:58.147", - "lastModified": "2024-06-25T22:15:30.053", + "lastModified": "2024-06-27T13:15:58.410", "vulnStatus": "Awaiting Analysis", "descriptions": [ { @@ -55,6 +55,10 @@ { "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-289xx/CVE-2024-28982.json b/CVE-2024/CVE-2024-289xx/CVE-2024-28982.json index b1e326742d1..4d43e6309dc 100644 --- a/CVE-2024/CVE-2024-289xx/CVE-2024-28982.json +++ b/CVE-2024/CVE-2024-289xx/CVE-2024-28982.json @@ -2,12 +2,16 @@ "id": "CVE-2024-28982", "sourceIdentifier": "security.vulnerabilities@hitachivantara.com", "published": "2024-06-26T23:15:19.287", - "lastModified": "2024-06-26T23:15:19.287", - "vulnStatus": "Received", + "lastModified": "2024-06-27T12:47:19.847", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", "value": "Hitachi Vantara Pentaho Business Analytics Server versions before 10.1.0.0 and 9.3.0.7, including 8.3.x do not correctly protect the ACL service endpoint of the Pentaho User Console against XML External Entity Reference." + }, + { + "lang": "es", + "value": " Las versiones de Hitachi Vantara Pentaho Business Analytics Server anteriores a 10.1.0.0 y 9.3.0.7, incluida 8.3.x, no protegen correctamente el endpoint del servicio ACL de Pentaho User Console contra la referencia de entidad externa XML." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-289xx/CVE-2024-28983.json b/CVE-2024/CVE-2024-289xx/CVE-2024-28983.json index b9c788e42a8..c4a077fbbfc 100644 --- a/CVE-2024/CVE-2024-289xx/CVE-2024-28983.json +++ b/CVE-2024/CVE-2024-289xx/CVE-2024-28983.json @@ -2,12 +2,16 @@ "id": "CVE-2024-28983", "sourceIdentifier": "security.vulnerabilities@hitachivantara.com", "published": "2024-06-26T23:15:19.597", - "lastModified": "2024-06-26T23:15:19.597", - "vulnStatus": "Received", + "lastModified": "2024-06-27T12:47:19.847", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", "value": "Hitachi Vantara Pentaho Business Analytics Server prior to versions 10.1.0.0 and 9.3.0.7, including 8.3.x allow a malicious URL to inject content into the Analyzer plugin interface." + }, + { + "lang": "es", + "value": "Hitachi Vantara Pentaho Business Analytics Server anterior a las versiones 10.1.0.0 y 9.3.0.7, incluida la 8.3.x, permite que una URL maliciosa inyecte contenido en la interfaz del complemento del analizador." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-289xx/CVE-2024-28984.json b/CVE-2024/CVE-2024-289xx/CVE-2024-28984.json index 475b1cc6e64..0c06cbb3339 100644 --- a/CVE-2024/CVE-2024-289xx/CVE-2024-28984.json +++ b/CVE-2024/CVE-2024-289xx/CVE-2024-28984.json @@ -2,12 +2,16 @@ "id": "CVE-2024-28984", "sourceIdentifier": "security.vulnerabilities@hitachivantara.com", "published": "2024-06-26T23:15:19.800", - "lastModified": "2024-06-26T23:15:19.800", - "vulnStatus": "Received", + "lastModified": "2024-06-27T12:47:19.847", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", "value": "Hitachi Vantara Pentaho Business Analytics Server prior to versions 10.1.0.0 and 9.3.0.7, including 8.3.x allow a malicious URL to inject content into the Analyzer plugin interface." + }, + { + "lang": "es", + "value": "Hitachi Vantara Pentaho Business Analytics Server anterior a las versiones 10.1.0.0 y 9.3.0.7, incluida la 8.3.x, permite que una URL maliciosa inyecte contenido en la interfaz del complemento del analizador." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-310xx/CVE-2024-31076.json b/CVE-2024/CVE-2024-310xx/CVE-2024-31076.json index d2217ad3378..2bcfc176a0f 100644 --- a/CVE-2024/CVE-2024-310xx/CVE-2024-31076.json +++ b/CVE-2024/CVE-2024-310xx/CVE-2024-31076.json @@ -2,12 +2,16 @@ "id": "CVE-2024-31076", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-06-21T11:15:09.673", - "lastModified": "2024-06-21T11:22:01.687", + "lastModified": "2024-06-27T13:15:58.480", "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\ngenirq/cpuhotplug, x86/vector: Prevent vector leak during CPU offline\n\nThe absence of IRQD_MOVE_PCNTXT prevents immediate effectiveness of\ninterrupt affinity reconfiguration via procfs. Instead, the change is\ndeferred until the next instance of the interrupt being triggered on the\noriginal CPU.\n\nWhen the interrupt next triggers on the original CPU, the new affinity is\nenforced within __irq_move_irq(). A vector is allocated from the new CPU,\nbut the old vector on the original CPU remains and is not immediately\nreclaimed. Instead, apicd->move_in_progress is flagged, and the reclaiming\nprocess is delayed until the next trigger of the interrupt on the new CPU.\n\nUpon the subsequent triggering of the interrupt on the new CPU,\nirq_complete_move() adds a task to the old CPU's vector_cleanup list if it\nremains online. Subsequently, the timer on the old CPU iterates over its\nvector_cleanup list, reclaiming old vectors.\n\nHowever, a rare scenario arises if the old CPU is outgoing before the\ninterrupt triggers again on the new CPU.\n\nIn that case irq_force_complete_move() is not invoked on the outgoing CPU\nto reclaim the old apicd->prev_vector because the interrupt isn't currently\naffine to the outgoing CPU, and irq_needs_fixup() returns false. Even\nthough __vector_schedule_cleanup() is later called on the new CPU, it\ndoesn't reclaim apicd->prev_vector; instead, it simply resets both\napicd->move_in_progress and apicd->prev_vector to 0.\n\nAs a result, the vector remains unreclaimed in vector_matrix, leading to a\nCPU vector leak.\n\nTo address this issue, move the invocation of irq_force_complete_move()\nbefore the irq_needs_fixup() call to reclaim apicd->prev_vector, if the\ninterrupt is currently or used to be affine to the outgoing CPU.\n\nAdditionally, reclaim the vector in __vector_schedule_cleanup() as well,\nfollowing a warning message, although theoretically it should never see\napicd->move_in_progress with apicd->prev_cpu pointing to an offline CPU." + }, + { + "lang": "es", + "value": "En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: genirq/cpuhotplug, x86/vector: evita la fuga de vectores durante la CPU fuera de l\u00ednea. La ausencia de IRQD_MOVE_PCNTXT impide la efectividad inmediata de la reconfiguraci\u00f3n de la afinidad de interrupci\u00f3n a trav\u00e9s de procfs. En cambio, el cambio se difiere hasta la siguiente instancia de interrupci\u00f3n que se activa en la CPU original. La siguiente vez que se activa la interrupci\u00f3n en la CPU original, la nueva afinidad se aplica dentro de __irq_move_irq(). Se asigna un vector desde la nueva CPU, pero el vector antiguo en la CPU original permanece y no se recupera inmediatamente. En su lugar, se marca apicd->move_in_progress y el proceso de recuperaci\u00f3n se retrasa hasta el siguiente desencadenante de la interrupci\u00f3n en la nueva CPU. Tras la activaci\u00f3n posterior de la interrupci\u00f3n en la nueva CPU, irq_complete_move() agrega una tarea a la lista vector_cleanup de la CPU anterior si permanece en l\u00ednea. Posteriormente, el temporizador de la CPU antigua itera sobre su lista vector_cleanup, recuperando vectores antiguos. Sin embargo, surge un escenario poco com\u00fan si la CPU antigua sale antes de que la interrupci\u00f3n se active nuevamente en la nueva CPU. En ese caso, irq_force_complete_move() no se invoca en la CPU saliente para recuperar el antiguo apicd->prev_vector porque la interrupci\u00f3n no es actualmente af\u00edn a la CPU saliente, e irq_needs_fixup() devuelve false. Aunque m\u00e1s tarde se llama a __vector_schedule_cleanup() en la nueva CPU, no reclama apicd->prev_vector; en su lugar, simplemente restablece apicd->move_in_progress y apicd->prev_vector a 0. Como resultado, el vector permanece sin reclamar en vector_matrix, lo que provoca una fuga de vector de CPU. Para solucionar este problema, mueva la invocaci\u00f3n de irq_force_complete_move() antes de la llamada irq_needs_fixup() para recuperar apicd->prev_vector, si la interrupci\u00f3n es actualmente o sol\u00eda ser af\u00edn a la CPU saliente. Adem\u00e1s, recupere tambi\u00e9n el vector en __vector_schedule_cleanup(), despu\u00e9s de un mensaje de advertencia, aunque en teor\u00eda nunca deber\u00eda ver apicd->move_in_progress con apicd->prev_cpu apuntando a una CPU fuera de l\u00ednea." } ], "metrics": {}, @@ -43,6 +47,10 @@ { "url": "https://git.kernel.org/stable/c/f5f4675960609d8c5ee95f027fbf6ce380f98372", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-31xx/CVE-2024-3111.json b/CVE-2024/CVE-2024-31xx/CVE-2024-3111.json index 9adebefb801..554eb085c83 100644 --- a/CVE-2024/CVE-2024-31xx/CVE-2024-3111.json +++ b/CVE-2024/CVE-2024-31xx/CVE-2024-3111.json @@ -2,12 +2,16 @@ "id": "CVE-2024-3111", "sourceIdentifier": "contact@wpscan.com", "published": "2024-06-27T06:15:11.643", - "lastModified": "2024-06-27T06:15:11.643", - "vulnStatus": "Received", + "lastModified": "2024-06-27T12:47:19.847", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", "value": "The Interactive Content WordPress plugin before 1.15.8 does not validate uploads which could allow a Contributors and above to update malicious SVG files, leading to Stored Cross-Site Scripting issues" + }, + { + "lang": "es", + "value": "El complemento de WordPress Interactive Content anterior a la versi\u00f3n 1.15.8 no valida las cargas, lo que podr\u00eda permitir a los contribuyentes y superiores actualizar archivos SVG maliciosos, lo que genera problemas de Cross-Site Scripting Almacenado." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-31xx/CVE-2024-3115.json b/CVE-2024/CVE-2024-31xx/CVE-2024-3115.json index c97cd105c0c..2268c527d66 100644 --- a/CVE-2024/CVE-2024-31xx/CVE-2024-3115.json +++ b/CVE-2024/CVE-2024-31xx/CVE-2024-3115.json @@ -2,12 +2,16 @@ "id": "CVE-2024-3115", "sourceIdentifier": "cve@gitlab.com", "published": "2024-06-27T00:15:11.190", - "lastModified": "2024-06-27T00:15:11.190", - "vulnStatus": "Received", + "lastModified": "2024-06-27T12:47:19.847", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", "value": "An issue was discovered in GitLab EE affecting all versions starting from 16.0 prior to 16.11.5, starting from 17.0 prior to 17.0.3, and starting from 17.1 prior to 17.1.1, which allows an attacker to access issues and epics without having an SSO session using Duo Chat." + }, + { + "lang": "es", + "value": " Se descubri\u00f3 un problema en GitLab EE que afecta a todas las versiones desde 16.0 anterior a 16.11.5, desde 17.0 anterior a 17.0.3 y desde 17.1 anterior a 17.1.1, lo que permite a un atacante acceder a problemas y epics sin tener una Sesi\u00f3n SSO mediante Duo Chat." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-333xx/CVE-2024-33326.json b/CVE-2024/CVE-2024-333xx/CVE-2024-33326.json index 17d3a37ab90..9eab0976eaf 100644 --- a/CVE-2024/CVE-2024-333xx/CVE-2024-33326.json +++ b/CVE-2024/CVE-2024-333xx/CVE-2024-33326.json @@ -2,12 +2,16 @@ "id": "CVE-2024-33326", "sourceIdentifier": "cve@mitre.org", "published": "2024-06-26T19:15:13.210", - "lastModified": "2024-06-26T19:15:13.210", - "vulnStatus": "Received", + "lastModified": "2024-06-27T12:47:19.847", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", "value": "A cross-site scripting (XSS) vulnerability in the component XsltResultControllerHtml.jsp of Lumisxp v15.0.x to v16.1.x allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the lumPageID parameter." + }, + { + "lang": "es", + "value": " Una vulnerabilidad de Cross Site Scripting (XSS) en el componente XsltResultControllerHtml.jsp de Lumisxp v15.0.xa v16.1.x permite a los atacantes ejecutar scripts web o HTML de su elecci\u00f3n a trav\u00e9s de un payload manipulado inyectado en el par\u00e1metro lumPageID." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-333xx/CVE-2024-33327.json b/CVE-2024/CVE-2024-333xx/CVE-2024-33327.json index 8751689c17f..7bf74c85f72 100644 --- a/CVE-2024/CVE-2024-333xx/CVE-2024-33327.json +++ b/CVE-2024/CVE-2024-333xx/CVE-2024-33327.json @@ -2,12 +2,16 @@ "id": "CVE-2024-33327", "sourceIdentifier": "cve@mitre.org", "published": "2024-06-26T19:15:13.290", - "lastModified": "2024-06-26T19:15:13.290", - "vulnStatus": "Received", + "lastModified": "2024-06-27T12:47:19.847", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", "value": "A cross-site scripting (XSS) vulnerability in the component UrlAccessibilityEvaluation.jsp of Lumisxp v15.0.x to v16.1.x allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the contentHtml parameter." + }, + { + "lang": "es", + "value": "Una vulnerabilidad de Cross Site Scripting (XSS) en el componente UrlAccessibilityEvaluaci\u00f3n.jsp de Lumisxp v15.0.x a v16.1.x permite a los atacantes ejecutar scripts web o HTML de su elecci\u00f3n a trav\u00e9s de un payload manipulado inyectado en el par\u00e1metro contentHtml." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-333xx/CVE-2024-33328.json b/CVE-2024/CVE-2024-333xx/CVE-2024-33328.json index 2e0e137d19a..25b4dea78a5 100644 --- a/CVE-2024/CVE-2024-333xx/CVE-2024-33328.json +++ b/CVE-2024/CVE-2024-333xx/CVE-2024-33328.json @@ -2,12 +2,16 @@ "id": "CVE-2024-33328", "sourceIdentifier": "cve@mitre.org", "published": "2024-06-26T19:15:13.373", - "lastModified": "2024-06-26T19:15:13.373", - "vulnStatus": "Received", + "lastModified": "2024-06-27T12:47:19.847", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", "value": "A cross-site scripting (XSS) vulnerability in the component main.jsp of Lumisxp v15.0.x to v16.1.x allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the pageId parameter." + }, + { + "lang": "es", + "value": " Una vulnerabilidad de Cross Site Scripting (XSS) en el componente main.jsp de Lumisxp v15.0.xa v16.1.x permite a los atacantes ejecutar scripts web o HTML de su elecci\u00f3n a trav\u00e9s de un payload manipulado inyectado en el par\u00e1metro pageId." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-333xx/CVE-2024-33329.json b/CVE-2024/CVE-2024-333xx/CVE-2024-33329.json index b13b392a35f..025d1caf2f0 100644 --- a/CVE-2024/CVE-2024-333xx/CVE-2024-33329.json +++ b/CVE-2024/CVE-2024-333xx/CVE-2024-33329.json @@ -2,12 +2,16 @@ "id": "CVE-2024-33329", "sourceIdentifier": "cve@mitre.org", "published": "2024-06-26T19:15:13.453", - "lastModified": "2024-06-26T19:15:13.453", - "vulnStatus": "Received", + "lastModified": "2024-06-27T12:47:19.847", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", "value": "A hardcoded privileged ID within Lumisxp v15.0.x to v16.1.x allows attackers to bypass authentication and access internal pages and other sensitive information." + }, + { + "lang": "es", + "value": " Una identificaci\u00f3n privilegiada codificada dentro de Lumisxp v15.0.x a v16.1.x permite a los atacantes omitir la autenticaci\u00f3n y acceder a p\u00e1ginas internas y otra informaci\u00f3n confidencial." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-336xx/CVE-2024-33621.json b/CVE-2024/CVE-2024-336xx/CVE-2024-33621.json index ec41e5f4b62..205f96809bb 100644 --- a/CVE-2024/CVE-2024-336xx/CVE-2024-33621.json +++ b/CVE-2024/CVE-2024-336xx/CVE-2024-33621.json @@ -2,12 +2,16 @@ "id": "CVE-2024-33621", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-06-21T11:15:09.860", - "lastModified": "2024-06-21T11:22:01.687", + "lastModified": "2024-06-27T12:15:25.120", "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nipvlan: Dont Use skb->sk in ipvlan_process_v{4,6}_outbound\n\nRaw packet from PF_PACKET socket ontop of an IPv6-backed ipvlan device will\nhit WARN_ON_ONCE() in sk_mc_loop() through sch_direct_xmit() path.\n\nWARNING: CPU: 2 PID: 0 at net/core/sock.c:775 sk_mc_loop+0x2d/0x70\nModules linked in: sch_netem ipvlan rfkill cirrus drm_shmem_helper sg drm_kms_helper\nCPU: 2 PID: 0 Comm: swapper/2 Kdump: loaded Not tainted 6.9.0+ #279\nHardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.15.0-1 04/01/2014\nRIP: 0010:sk_mc_loop+0x2d/0x70\nCode: fa 0f 1f 44 00 00 65 0f b7 15 f7 96 a3 4f 31 c0 66 85 d2 75 26 48 85 ff 74 1c\nRSP: 0018:ffffa9584015cd78 EFLAGS: 00010212\nRAX: 0000000000000011 RBX: ffff91e585793e00 RCX: 0000000002c6a001\nRDX: 0000000000000000 RSI: 0000000000000040 RDI: ffff91e589c0f000\nRBP: ffff91e5855bd100 R08: 0000000000000000 R09: 3d00545216f43d00\nR10: ffff91e584fdcc50 R11: 00000060dd8616f4 R12: ffff91e58132d000\nR13: ffff91e584fdcc68 R14: ffff91e5869ce800 R15: ffff91e589c0f000\nFS: 0000000000000000(0000) GS:ffff91e898100000(0000) knlGS:0000000000000000\nCS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\nCR2: 00007f788f7c44c0 CR3: 0000000008e1a000 CR4: 00000000000006f0\nDR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000\nDR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400\nCall Trace:\n\n ? __warn (kernel/panic.c:693)\n ? sk_mc_loop (net/core/sock.c:760)\n ? report_bug (lib/bug.c:201 lib/bug.c:219)\n ? handle_bug (arch/x86/kernel/traps.c:239)\n ? exc_invalid_op (arch/x86/kernel/traps.c:260 (discriminator 1))\n ? asm_exc_invalid_op (./arch/x86/include/asm/idtentry.h:621)\n ? sk_mc_loop (net/core/sock.c:760)\n ip6_finish_output2 (net/ipv6/ip6_output.c:83 (discriminator 1))\n ? nf_hook_slow (net/netfilter/core.c:626)\n ip6_finish_output (net/ipv6/ip6_output.c:222)\n ? __pfx_ip6_finish_output (net/ipv6/ip6_output.c:215)\n ipvlan_xmit_mode_l3 (drivers/net/ipvlan/ipvlan_core.c:602) ipvlan\n ipvlan_start_xmit (drivers/net/ipvlan/ipvlan_main.c:226) ipvlan\n dev_hard_start_xmit (net/core/dev.c:3594)\n sch_direct_xmit (net/sched/sch_generic.c:343)\n __qdisc_run (net/sched/sch_generic.c:416)\n net_tx_action (net/core/dev.c:5286)\n handle_softirqs (kernel/softirq.c:555)\n __irq_exit_rcu (kernel/softirq.c:589)\n sysvec_apic_timer_interrupt (arch/x86/kernel/apic/apic.c:1043)\n\nThe warning triggers as this:\npacket_sendmsg\n packet_snd //skb->sk is packet sk\n __dev_queue_xmit\n __dev_xmit_skb //q->enqueue is not NULL\n __qdisc_run\n sch_direct_xmit\n dev_hard_start_xmit\n ipvlan_start_xmit\n ipvlan_xmit_mode_l3 //l3 mode\n ipvlan_process_outbound //vepa flag\n ipvlan_process_v6_outbound\n ip6_local_out\n __ip6_finish_output\n ip6_finish_output2 //multicast packet\n sk_mc_loop //sk->sk_family is AF_PACKET\n\nCall ip{6}_local_out() with NULL sk in ipvlan as other tunnels to fix this." + }, + { + "lang": "es", + "value": "En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: ipvlan: no use skb->sk en ipvlan_process_v{4,6}_outbound El paquete sin procesar del socket PF_PACKET en la parte superior de un dispositivo ipvlan respaldado por IPv6 alcanzar\u00e1 WARN_ON_ONCE() en sk_mc_loop() a trav\u00e9s de la ruta sch_direct_xmit(). ADVERTENCIA: CPU: 2 PID: 0 en net/core/sock.c:775 sk_mc_loop+0x2d/0x70 M\u00f3dulos vinculados en: sch_netem ipvlan rfkill cirrus drm_shmem_helper sg drm_kms_helper CPU: 2 PID: 0 Comm: swapper/2 Kdump: cargado No contaminado 6.9.0+ #279 Nombre de hardware: PC est\u00e1ndar QEMU (i440FX + PIIX, 1996), BIOS 1.15.0-1 01/04/2014 RIP: 0010:sk_mc_loop+0x2d/0x70 C\u00f3digo: fa 0f 1f 44 00 00 65 0f b7 15 f7 96 a3 4f 31 c0 66 85 d2 75 26 48 85 ff 74 1c RSP: 0018:ffffa9584015cd78 EFLAGS: 00010212 RAX: 0000000000000011 RBX: ffff91e585793e00 RCX: 0000000002c6a001 RDX: 0000000000000000 RSI: 0000000000000040 RDI: ffff91e589c0f000 RBP: ffff91e5855bd100 R08: 0000000000000000 R09: 3d00545216f43d00 R10: ffff91e584fdcc50 R11: 00000060dd8616f4 R12: ffff91e58132d000 R13: ffff91e584fdcc68 R14: ffff91e5869ce800 R15: e589c0f000 FS: 0000000000000000(0000) GS:ffff91e898100000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 00007f788f7c44c0 CR3: 0000000008e1a000 CR4: 00000000000006f0 DR0: 0000000000000000 DR1: 00000000000000000 DR2: 0000000000000000 DR3: 00000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 Seguimiento de llamadas: ? __advertir (kernel/panic.c:693)? sk_mc_loop (net/core/sock.c:760)? report_bug (lib/bug.c:201 lib/bug.c:219)? handle_bug (arch/x86/kernel/traps.c:239)? exc_invalid_op (arch/x86/kernel/traps.c:260 (discriminador 1))? asm_exc_invalid_op (./arch/x86/include/asm/idtentry.h:621)? sk_mc_loop (net/core/sock.c:760) ip6_finish_output2 (net/ipv6/ip6_output.c:83 (discriminador 1))? nf_hook_slow (net/netfilter/core.c:626) ip6_finish_output (net/ipv6/ip6_output.c:222)? __pfx_ip6_finish_output (net/ipv6/ip6_output.c:215) ipvlan_xmit_mode_l3 (drivers/net/ipvlan/ipvlan_core.c:602) ipvlan ipvlan_start_xmit (drivers/net/ipvlan/ipvlan_main.c:226) ipvlan dev_hard_start_xmit (net/core/dev . c:3594) sch_direct_xmit (net/sched/sch_generic.c:343) __qdisc_run (net/sched/sch_generic.c:416) net_tx_action (net/core/dev.c:5286) handle_softirqs (kernel/softirq.c:555) __irq_exit_rcu (kernel/softirq.c:589) sysvec_apic_timer_interrupt (arch/x86/kernel/apic/apic.c:1043) La advertencia se activa de la siguiente manera: paquete_sendmsg paquete_snd //skb->sk es el paquete sk __dev_queue_xmit __dev_xmit_skb //q-> la cola no es NULL __qdisc_run sch_direct_xmit dev_hard_start_xmit ipvlan_start_xmit ipvlan_xmit_mode_l3 //modo l3 ipvlan_process_outbound //vepa flag ipvlan_process_v6_outbound ip6_local_out __ip6_finish_output ip6_finish_output2 //paquete de multidifusi\u00f3n sk_mc_loop //sk-> sk_family es AF_PACKET Llame a ip{6}_local_out() con NULL sk en ipvlan como otro t\u00faneles para solucionar este problema." } ], "metrics": {}, @@ -43,6 +47,10 @@ { "url": "https://git.kernel.org/stable/c/cb53706a3403ba67f4040b2a82d9cf79e11b1a48", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-355xx/CVE-2024-35545.json b/CVE-2024/CVE-2024-355xx/CVE-2024-35545.json index e9cbd49f309..62d76fd17b7 100644 --- a/CVE-2024/CVE-2024-355xx/CVE-2024-35545.json +++ b/CVE-2024/CVE-2024-355xx/CVE-2024-35545.json @@ -2,12 +2,16 @@ "id": "CVE-2024-35545", "sourceIdentifier": "cve@mitre.org", "published": "2024-06-26T18:15:14.940", - "lastModified": "2024-06-26T18:15:14.940", - "vulnStatus": "Received", + "lastModified": "2024-06-27T12:47:19.847", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", "value": "MAP-OS v4.45.0 and earlier was discovered to contain a cross-site scripting (XSS) vulnerability." + }, + { + "lang": "es", + "value": " Se descubri\u00f3 que MAP-OS v4.45.0 y anteriores contienen una vulnerabilidad de Cross Site Scripting (XSS)." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-356xx/CVE-2024-35628.json b/CVE-2024/CVE-2024-356xx/CVE-2024-35628.json index e069a130c26..63cc9eca915 100644 --- a/CVE-2024/CVE-2024-356xx/CVE-2024-35628.json +++ b/CVE-2024/CVE-2024-356xx/CVE-2024-35628.json @@ -2,12 +2,12 @@ "id": "CVE-2024-35628", "sourceIdentifier": "audit@patchstack.com", "published": "2024-06-11T15:16:07.840", - "lastModified": "2024-06-13T18:36:45.417", + "lastModified": "2024-06-27T13:15:58.550", "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", - "value": "Missing Authorization vulnerability in Photo Gallery Team Photo Gallery by 10Web.This issue affects Photo Gallery by 10Web: from n/a through 1.8.24." + "value": "Missing Authorization vulnerability in Photo Gallery Team Photo Gallery by 10Web.This issue affects Photo Gallery by 10Web: from n/a through 1.8.25." }, { "lang": "es", diff --git a/CVE-2024/CVE-2024-357xx/CVE-2024-35789.json b/CVE-2024/CVE-2024-357xx/CVE-2024-35789.json index 80733b73bb1..9e378447779 100644 --- a/CVE-2024/CVE-2024-357xx/CVE-2024-35789.json +++ b/CVE-2024/CVE-2024-357xx/CVE-2024-35789.json @@ -2,7 +2,7 @@ "id": "CVE-2024-35789", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-05-17T13:15:58.717", - "lastModified": "2024-06-25T22:15:30.493", + "lastModified": "2024-06-27T12:15:25.220", "vulnStatus": "Awaiting Analysis", "descriptions": [ { @@ -55,6 +55,10 @@ { "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-358xx/CVE-2024-35806.json b/CVE-2024/CVE-2024-358xx/CVE-2024-35806.json index c1def6518fb..edc2c51366a 100644 --- a/CVE-2024/CVE-2024-358xx/CVE-2024-35806.json +++ b/CVE-2024/CVE-2024-358xx/CVE-2024-35806.json @@ -2,7 +2,7 @@ "id": "CVE-2024-35806", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-05-17T14:15:14.003", - "lastModified": "2024-06-25T23:15:30.253", + "lastModified": "2024-06-27T12:15:25.303", "vulnStatus": "Awaiting Analysis", "descriptions": [ { @@ -55,6 +55,10 @@ { "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-358xx/CVE-2024-35807.json b/CVE-2024/CVE-2024-358xx/CVE-2024-35807.json index 1465449c985..7346953352a 100644 --- a/CVE-2024/CVE-2024-358xx/CVE-2024-35807.json +++ b/CVE-2024/CVE-2024-358xx/CVE-2024-35807.json @@ -2,7 +2,7 @@ "id": "CVE-2024-35807", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-05-17T14:15:14.213", - "lastModified": "2024-06-25T22:15:30.780", + "lastModified": "2024-06-27T13:15:58.810", "vulnStatus": "Awaiting Analysis", "descriptions": [ { @@ -55,6 +55,10 @@ { "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-358xx/CVE-2024-35809.json b/CVE-2024/CVE-2024-358xx/CVE-2024-35809.json index e7d5f984237..5b25bc38fbd 100644 --- a/CVE-2024/CVE-2024-358xx/CVE-2024-35809.json +++ b/CVE-2024/CVE-2024-358xx/CVE-2024-35809.json @@ -2,7 +2,7 @@ "id": "CVE-2024-35809", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-05-17T14:15:14.730", - "lastModified": "2024-06-25T23:15:30.337", + "lastModified": "2024-06-27T13:15:58.890", "vulnStatus": "Awaiting Analysis", "descriptions": [ { @@ -55,6 +55,10 @@ { "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-358xx/CVE-2024-35811.json b/CVE-2024/CVE-2024-358xx/CVE-2024-35811.json index 7eac0d79eba..905c107b33f 100644 --- a/CVE-2024/CVE-2024-358xx/CVE-2024-35811.json +++ b/CVE-2024/CVE-2024-358xx/CVE-2024-35811.json @@ -2,7 +2,7 @@ "id": "CVE-2024-35811", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-05-17T14:15:15.177", - "lastModified": "2024-06-25T23:15:30.433", + "lastModified": "2024-06-27T13:15:58.970", "vulnStatus": "Awaiting Analysis", "descriptions": [ { @@ -55,6 +55,10 @@ { "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-358xx/CVE-2024-35815.json b/CVE-2024/CVE-2024-358xx/CVE-2024-35815.json index 93bbb3151ad..9cc2708da73 100644 --- a/CVE-2024/CVE-2024-358xx/CVE-2024-35815.json +++ b/CVE-2024/CVE-2024-358xx/CVE-2024-35815.json @@ -2,7 +2,7 @@ "id": "CVE-2024-35815", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-05-17T14:15:16.077", - "lastModified": "2024-06-25T22:15:30.953", + "lastModified": "2024-06-27T13:15:59.050", "vulnStatus": "Awaiting Analysis", "descriptions": [ { @@ -51,6 +51,10 @@ { "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-358xx/CVE-2024-35819.json b/CVE-2024/CVE-2024-358xx/CVE-2024-35819.json index a059ad9f7cb..6bd2efc6faa 100644 --- a/CVE-2024/CVE-2024-358xx/CVE-2024-35819.json +++ b/CVE-2024/CVE-2024-358xx/CVE-2024-35819.json @@ -2,7 +2,7 @@ "id": "CVE-2024-35819", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-05-17T14:15:16.907", - "lastModified": "2024-06-25T21:15:59.257", + "lastModified": "2024-06-27T13:15:59.133", "vulnStatus": "Awaiting Analysis", "descriptions": [ { @@ -55,6 +55,10 @@ { "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-358xx/CVE-2024-35821.json b/CVE-2024/CVE-2024-358xx/CVE-2024-35821.json index 40de7e14ffd..f0c8c0a972c 100644 --- a/CVE-2024/CVE-2024-358xx/CVE-2024-35821.json +++ b/CVE-2024/CVE-2024-358xx/CVE-2024-35821.json @@ -2,7 +2,7 @@ "id": "CVE-2024-35821", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-05-17T14:15:17.373", - "lastModified": "2024-06-25T22:15:31.030", + "lastModified": "2024-06-27T13:15:59.203", "vulnStatus": "Awaiting Analysis", "descriptions": [ { @@ -55,6 +55,10 @@ { "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-358xx/CVE-2024-35822.json b/CVE-2024/CVE-2024-358xx/CVE-2024-35822.json index f149fa25c95..fd74af474e3 100644 --- a/CVE-2024/CVE-2024-358xx/CVE-2024-35822.json +++ b/CVE-2024/CVE-2024-358xx/CVE-2024-35822.json @@ -2,7 +2,7 @@ "id": "CVE-2024-35822", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-05-17T14:15:17.590", - "lastModified": "2024-06-25T22:15:31.120", + "lastModified": "2024-06-27T13:15:59.277", "vulnStatus": "Awaiting Analysis", "descriptions": [ { @@ -55,6 +55,10 @@ { "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-358xx/CVE-2024-35823.json b/CVE-2024/CVE-2024-358xx/CVE-2024-35823.json index 44f84408f3e..893a842825a 100644 --- a/CVE-2024/CVE-2024-358xx/CVE-2024-35823.json +++ b/CVE-2024/CVE-2024-358xx/CVE-2024-35823.json @@ -2,7 +2,7 @@ "id": "CVE-2024-35823", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-05-17T14:15:17.820", - "lastModified": "2024-06-25T23:15:30.503", + "lastModified": "2024-06-27T13:15:59.343", "vulnStatus": "Awaiting Analysis", "descriptions": [ { @@ -51,6 +51,10 @@ { "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-358xx/CVE-2024-35825.json b/CVE-2024/CVE-2024-358xx/CVE-2024-35825.json index c925dd60e3a..9f19d06e05c 100644 --- a/CVE-2024/CVE-2024-358xx/CVE-2024-35825.json +++ b/CVE-2024/CVE-2024-358xx/CVE-2024-35825.json @@ -2,7 +2,7 @@ "id": "CVE-2024-35825", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-05-17T14:15:18.227", - "lastModified": "2024-06-25T22:15:31.197", + "lastModified": "2024-06-27T12:15:25.373", "vulnStatus": "Awaiting Analysis", "descriptions": [ { @@ -51,6 +51,10 @@ { "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-358xx/CVE-2024-35828.json b/CVE-2024/CVE-2024-358xx/CVE-2024-35828.json index 92abca77321..fe2bc3f364b 100644 --- a/CVE-2024/CVE-2024-358xx/CVE-2024-35828.json +++ b/CVE-2024/CVE-2024-358xx/CVE-2024-35828.json @@ -2,7 +2,7 @@ "id": "CVE-2024-35828", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-05-17T14:15:18.887", - "lastModified": "2024-06-25T22:15:31.287", + "lastModified": "2024-06-27T13:15:59.403", "vulnStatus": "Awaiting Analysis", "descriptions": [ { @@ -55,6 +55,10 @@ { "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-358xx/CVE-2024-35830.json b/CVE-2024/CVE-2024-358xx/CVE-2024-35830.json index eee620c524b..41518784baa 100644 --- a/CVE-2024/CVE-2024-358xx/CVE-2024-35830.json +++ b/CVE-2024/CVE-2024-358xx/CVE-2024-35830.json @@ -2,7 +2,7 @@ "id": "CVE-2024-35830", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-05-17T14:15:19.330", - "lastModified": "2024-06-25T23:15:30.677", + "lastModified": "2024-06-27T12:15:25.440", "vulnStatus": "Awaiting Analysis", "descriptions": [ { @@ -55,6 +55,10 @@ { "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-358xx/CVE-2024-35835.json b/CVE-2024/CVE-2024-358xx/CVE-2024-35835.json index ee5ef0d5032..b6e68dca2db 100644 --- a/CVE-2024/CVE-2024-358xx/CVE-2024-35835.json +++ b/CVE-2024/CVE-2024-358xx/CVE-2024-35835.json @@ -2,7 +2,7 @@ "id": "CVE-2024-35835", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-05-17T14:15:20.387", - "lastModified": "2024-06-25T22:15:31.370", + "lastModified": "2024-06-27T12:15:25.503", "vulnStatus": "Awaiting Analysis", "descriptions": [ { @@ -51,6 +51,10 @@ { "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-358xx/CVE-2024-35847.json b/CVE-2024/CVE-2024-358xx/CVE-2024-35847.json index 76432e46798..72b70cda76f 100644 --- a/CVE-2024/CVE-2024-358xx/CVE-2024-35847.json +++ b/CVE-2024/CVE-2024-358xx/CVE-2024-35847.json @@ -2,7 +2,7 @@ "id": "CVE-2024-35847", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-05-17T15:15:21.620", - "lastModified": "2024-06-25T22:15:31.587", + "lastModified": "2024-06-27T12:15:25.567", "vulnStatus": "Awaiting Analysis", "descriptions": [ { @@ -51,6 +51,10 @@ { "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-358xx/CVE-2024-35849.json b/CVE-2024/CVE-2024-358xx/CVE-2024-35849.json index 7ab2eb4e7f9..5b2cdccc32f 100644 --- a/CVE-2024/CVE-2024-358xx/CVE-2024-35849.json +++ b/CVE-2024/CVE-2024-358xx/CVE-2024-35849.json @@ -2,7 +2,7 @@ "id": "CVE-2024-35849", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-05-17T15:15:21.777", - "lastModified": "2024-06-25T22:15:31.650", + "lastModified": "2024-06-27T12:15:25.643", "vulnStatus": "Awaiting Analysis", "descriptions": [ { @@ -51,6 +51,10 @@ { "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-358xx/CVE-2024-35877.json b/CVE-2024/CVE-2024-358xx/CVE-2024-35877.json index 31bf21044d6..4deed64e463 100644 --- a/CVE-2024/CVE-2024-358xx/CVE-2024-35877.json +++ b/CVE-2024/CVE-2024-358xx/CVE-2024-35877.json @@ -2,7 +2,7 @@ "id": "CVE-2024-35877", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-05-19T09:15:08.990", - "lastModified": "2024-06-25T22:15:31.973", + "lastModified": "2024-06-27T12:15:25.717", "vulnStatus": "Awaiting Analysis", "descriptions": [ { @@ -51,6 +51,10 @@ { "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-358xx/CVE-2024-35886.json b/CVE-2024/CVE-2024-358xx/CVE-2024-35886.json index 816c2fd39bc..b721b37ba95 100644 --- a/CVE-2024/CVE-2024-358xx/CVE-2024-35886.json +++ b/CVE-2024/CVE-2024-358xx/CVE-2024-35886.json @@ -2,7 +2,7 @@ "id": "CVE-2024-35886", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-05-19T09:15:09.757", - "lastModified": "2024-06-25T22:15:32.210", + "lastModified": "2024-06-27T12:15:25.800", "vulnStatus": "Awaiting Analysis", "descriptions": [ { @@ -51,6 +51,10 @@ { "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-358xx/CVE-2024-35888.json b/CVE-2024/CVE-2024-358xx/CVE-2024-35888.json index b950b266268..b6978fc0c85 100644 --- a/CVE-2024/CVE-2024-358xx/CVE-2024-35888.json +++ b/CVE-2024/CVE-2024-358xx/CVE-2024-35888.json @@ -2,7 +2,7 @@ "id": "CVE-2024-35888", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-05-19T09:15:09.910", - "lastModified": "2024-06-25T22:15:32.300", + "lastModified": "2024-06-27T12:15:25.870", "vulnStatus": "Awaiting Analysis", "descriptions": [ { @@ -51,6 +51,10 @@ { "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-358xx/CVE-2024-35893.json b/CVE-2024/CVE-2024-358xx/CVE-2024-35893.json index 8fee9bca49c..674a62d1815 100644 --- a/CVE-2024/CVE-2024-358xx/CVE-2024-35893.json +++ b/CVE-2024/CVE-2024-358xx/CVE-2024-35893.json @@ -2,7 +2,7 @@ "id": "CVE-2024-35893", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-05-19T09:15:10.307", - "lastModified": "2024-06-25T21:15:59.407", + "lastModified": "2024-06-27T12:15:25.943", "vulnStatus": "Awaiting Analysis", "descriptions": [ { @@ -51,6 +51,10 @@ { "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-358xx/CVE-2024-35898.json b/CVE-2024/CVE-2024-358xx/CVE-2024-35898.json index bef4a87c4b2..09739bc4886 100644 --- a/CVE-2024/CVE-2024-358xx/CVE-2024-35898.json +++ b/CVE-2024/CVE-2024-358xx/CVE-2024-35898.json @@ -2,7 +2,7 @@ "id": "CVE-2024-35898", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-05-19T09:15:10.723", - "lastModified": "2024-06-25T22:15:32.580", + "lastModified": "2024-06-27T12:15:26.020", "vulnStatus": "Awaiting Analysis", "descriptions": [ { @@ -51,6 +51,10 @@ { "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-359xx/CVE-2024-35902.json b/CVE-2024/CVE-2024-359xx/CVE-2024-35902.json index ddef31b29a8..f7e853b16fd 100644 --- a/CVE-2024/CVE-2024-359xx/CVE-2024-35902.json +++ b/CVE-2024/CVE-2024-359xx/CVE-2024-35902.json @@ -2,7 +2,7 @@ "id": "CVE-2024-35902", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-05-19T09:15:11.037", - "lastModified": "2024-06-25T22:15:32.893", + "lastModified": "2024-06-27T12:15:26.087", "vulnStatus": "Awaiting Analysis", "descriptions": [ { @@ -51,6 +51,10 @@ { "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-359xx/CVE-2024-35910.json b/CVE-2024/CVE-2024-359xx/CVE-2024-35910.json index 89a6f5c3e4e..fb356847232 100644 --- a/CVE-2024/CVE-2024-359xx/CVE-2024-35910.json +++ b/CVE-2024/CVE-2024-359xx/CVE-2024-35910.json @@ -2,7 +2,7 @@ "id": "CVE-2024-35910", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-05-19T09:15:11.617", - "lastModified": "2024-06-25T23:15:30.963", + "lastModified": "2024-06-27T12:15:26.153", "vulnStatus": "Awaiting Analysis", "descriptions": [ { @@ -51,6 +51,10 @@ { "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-359xx/CVE-2024-35915.json b/CVE-2024/CVE-2024-359xx/CVE-2024-35915.json index 41914d7e9a3..d163066ce07 100644 --- a/CVE-2024/CVE-2024-359xx/CVE-2024-35915.json +++ b/CVE-2024/CVE-2024-359xx/CVE-2024-35915.json @@ -2,7 +2,7 @@ "id": "CVE-2024-35915", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-05-19T09:15:11.987", - "lastModified": "2024-06-25T22:15:33.023", + "lastModified": "2024-06-27T12:15:26.230", "vulnStatus": "Awaiting Analysis", "descriptions": [ { @@ -51,6 +51,10 @@ { "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-359xx/CVE-2024-35922.json b/CVE-2024/CVE-2024-359xx/CVE-2024-35922.json index 05651c2d788..97a82d572da 100644 --- a/CVE-2024/CVE-2024-359xx/CVE-2024-35922.json +++ b/CVE-2024/CVE-2024-359xx/CVE-2024-35922.json @@ -2,7 +2,7 @@ "id": "CVE-2024-35922", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-05-19T11:15:48.513", - "lastModified": "2024-06-25T21:15:59.483", + "lastModified": "2024-06-27T12:15:26.323", "vulnStatus": "Awaiting Analysis", "descriptions": [ { @@ -51,6 +51,10 @@ { "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-359xx/CVE-2024-35925.json b/CVE-2024/CVE-2024-359xx/CVE-2024-35925.json index f71acb536b4..c825264b2d5 100644 --- a/CVE-2024/CVE-2024-359xx/CVE-2024-35925.json +++ b/CVE-2024/CVE-2024-359xx/CVE-2024-35925.json @@ -2,7 +2,7 @@ "id": "CVE-2024-35925", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-05-19T11:15:48.720", - "lastModified": "2024-06-25T22:15:33.090", + "lastModified": "2024-06-27T13:15:59.470", "vulnStatus": "Awaiting Analysis", "descriptions": [ { @@ -51,6 +51,10 @@ { "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-359xx/CVE-2024-35930.json b/CVE-2024/CVE-2024-359xx/CVE-2024-35930.json index 9f0868b1760..80d03d5c01e 100644 --- a/CVE-2024/CVE-2024-359xx/CVE-2024-35930.json +++ b/CVE-2024/CVE-2024-359xx/CVE-2024-35930.json @@ -2,7 +2,7 @@ "id": "CVE-2024-35930", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-05-19T11:15:49.057", - "lastModified": "2024-06-25T23:15:31.067", + "lastModified": "2024-06-27T12:15:26.397", "vulnStatus": "Awaiting Analysis", "descriptions": [ { @@ -51,6 +51,10 @@ { "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-359xx/CVE-2024-35933.json b/CVE-2024/CVE-2024-359xx/CVE-2024-35933.json index 2836e3770b8..6bb9f3b39c8 100644 --- a/CVE-2024/CVE-2024-359xx/CVE-2024-35933.json +++ b/CVE-2024/CVE-2024-359xx/CVE-2024-35933.json @@ -2,7 +2,7 @@ "id": "CVE-2024-35933", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-05-19T11:15:49.270", - "lastModified": "2024-06-25T22:15:33.153", + "lastModified": "2024-06-27T13:15:59.540", "vulnStatus": "Awaiting Analysis", "descriptions": [ { @@ -51,6 +51,10 @@ { "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-359xx/CVE-2024-35935.json b/CVE-2024/CVE-2024-359xx/CVE-2024-35935.json index 50915b79b63..80f653dceb9 100644 --- a/CVE-2024/CVE-2024-359xx/CVE-2024-35935.json +++ b/CVE-2024/CVE-2024-359xx/CVE-2024-35935.json @@ -2,7 +2,7 @@ "id": "CVE-2024-35935", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-05-19T11:15:49.413", - "lastModified": "2024-06-25T22:15:33.360", + "lastModified": "2024-06-27T12:15:26.480", "vulnStatus": "Awaiting Analysis", "descriptions": [ { @@ -51,6 +51,10 @@ { "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-359xx/CVE-2024-35936.json b/CVE-2024/CVE-2024-359xx/CVE-2024-35936.json index 95c180d55ab..2e7ea625f15 100644 --- a/CVE-2024/CVE-2024-359xx/CVE-2024-35936.json +++ b/CVE-2024/CVE-2024-359xx/CVE-2024-35936.json @@ -2,7 +2,7 @@ "id": "CVE-2024-35936", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-05-19T11:15:49.480", - "lastModified": "2024-06-25T22:15:33.420", + "lastModified": "2024-06-27T12:15:26.557", "vulnStatus": "Awaiting Analysis", "descriptions": [ { @@ -51,6 +51,10 @@ { "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-359xx/CVE-2024-35944.json b/CVE-2024/CVE-2024-359xx/CVE-2024-35944.json index 202f8cb3633..89e9f7b78e3 100644 --- a/CVE-2024/CVE-2024-359xx/CVE-2024-35944.json +++ b/CVE-2024/CVE-2024-359xx/CVE-2024-35944.json @@ -2,7 +2,7 @@ "id": "CVE-2024-35944", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-05-19T11:15:50.017", - "lastModified": "2024-06-25T22:15:33.550", + "lastModified": "2024-06-27T12:15:26.637", "vulnStatus": "Awaiting Analysis", "descriptions": [ { @@ -51,6 +51,10 @@ { "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-359xx/CVE-2024-35947.json b/CVE-2024/CVE-2024-359xx/CVE-2024-35947.json index 64c92ff8677..b17b42d3e6f 100644 --- a/CVE-2024/CVE-2024-359xx/CVE-2024-35947.json +++ b/CVE-2024/CVE-2024-359xx/CVE-2024-35947.json @@ -2,7 +2,7 @@ "id": "CVE-2024-35947", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-05-19T12:15:08.220", - "lastModified": "2024-06-10T16:15:16.447", + "lastModified": "2024-06-27T12:15:26.713", "vulnStatus": "Awaiting Analysis", "descriptions": [ { @@ -48,6 +48,10 @@ "url": "https://git.kernel.org/stable/c/ba3c118cff7bcb0fe6aa84ae1f9080d50e31c561", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" }, + { + "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OTB4HWU2PTVW5NEYHHLOCXDKG3PYA534/", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" diff --git a/CVE-2024/CVE-2024-359xx/CVE-2024-35955.json b/CVE-2024/CVE-2024-359xx/CVE-2024-35955.json index 4f973252588..21b0dce8383 100644 --- a/CVE-2024/CVE-2024-359xx/CVE-2024-35955.json +++ b/CVE-2024/CVE-2024-359xx/CVE-2024-35955.json @@ -2,7 +2,7 @@ "id": "CVE-2024-35955", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-05-20T10:15:10.850", - "lastModified": "2024-06-25T22:15:33.687", + "lastModified": "2024-06-27T13:15:59.610", "vulnStatus": "Awaiting Analysis", "descriptions": [ { @@ -51,6 +51,10 @@ { "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-359xx/CVE-2024-35960.json b/CVE-2024/CVE-2024-359xx/CVE-2024-35960.json index 24102d4587f..31a6d9c875d 100644 --- a/CVE-2024/CVE-2024-359xx/CVE-2024-35960.json +++ b/CVE-2024/CVE-2024-359xx/CVE-2024-35960.json @@ -2,7 +2,7 @@ "id": "CVE-2024-35960", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-05-20T10:15:11.190", - "lastModified": "2024-06-25T22:15:33.753", + "lastModified": "2024-06-27T12:15:26.787", "vulnStatus": "Awaiting Analysis", "descriptions": [ { @@ -51,6 +51,10 @@ { "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-359xx/CVE-2024-35969.json b/CVE-2024/CVE-2024-359xx/CVE-2024-35969.json index f4f139e3b62..32e1519dba3 100644 --- a/CVE-2024/CVE-2024-359xx/CVE-2024-35969.json +++ b/CVE-2024/CVE-2024-359xx/CVE-2024-35969.json @@ -2,7 +2,7 @@ "id": "CVE-2024-35969", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-05-20T10:15:11.780", - "lastModified": "2024-06-25T22:15:33.940", + "lastModified": "2024-06-27T12:15:26.887", "vulnStatus": "Awaiting Analysis", "descriptions": [ { @@ -51,6 +51,10 @@ { "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-359xx/CVE-2024-35973.json b/CVE-2024/CVE-2024-359xx/CVE-2024-35973.json index 29c4ee5c1fb..49c9d91b809 100644 --- a/CVE-2024/CVE-2024-359xx/CVE-2024-35973.json +++ b/CVE-2024/CVE-2024-359xx/CVE-2024-35973.json @@ -2,7 +2,7 @@ "id": "CVE-2024-35973", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-05-20T10:15:12.077", - "lastModified": "2024-06-25T23:15:31.150", + "lastModified": "2024-06-27T12:15:26.977", "vulnStatus": "Awaiting Analysis", "descriptions": [ { @@ -51,6 +51,10 @@ { "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-359xx/CVE-2024-35978.json b/CVE-2024/CVE-2024-359xx/CVE-2024-35978.json index c0c3a01af26..275a3fecfc9 100644 --- a/CVE-2024/CVE-2024-359xx/CVE-2024-35978.json +++ b/CVE-2024/CVE-2024-359xx/CVE-2024-35978.json @@ -2,7 +2,7 @@ "id": "CVE-2024-35978", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-05-20T10:15:12.407", - "lastModified": "2024-06-25T22:15:34.133", + "lastModified": "2024-06-27T12:15:27.050", "vulnStatus": "Modified", "descriptions": [ { @@ -171,6 +171,10 @@ { "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-359xx/CVE-2024-35982.json b/CVE-2024/CVE-2024-359xx/CVE-2024-35982.json index b1fd1595b81..f2c19ed6d43 100644 --- a/CVE-2024/CVE-2024-359xx/CVE-2024-35982.json +++ b/CVE-2024/CVE-2024-359xx/CVE-2024-35982.json @@ -2,7 +2,7 @@ "id": "CVE-2024-35982", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-05-20T10:15:12.687", - "lastModified": "2024-06-25T23:15:31.253", + "lastModified": "2024-06-27T13:15:59.693", "vulnStatus": "Modified", "descriptions": [ { @@ -171,6 +171,10 @@ { "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-359xx/CVE-2024-35984.json b/CVE-2024/CVE-2024-359xx/CVE-2024-35984.json index 660e347061f..6d22d166be9 100644 --- a/CVE-2024/CVE-2024-359xx/CVE-2024-35984.json +++ b/CVE-2024/CVE-2024-359xx/CVE-2024-35984.json @@ -2,7 +2,7 @@ "id": "CVE-2024-35984", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-05-20T10:15:12.830", - "lastModified": "2024-06-25T22:15:34.233", + "lastModified": "2024-06-27T12:15:27.137", "vulnStatus": "Modified", "descriptions": [ { @@ -171,6 +171,10 @@ { "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-359xx/CVE-2024-35997.json b/CVE-2024/CVE-2024-359xx/CVE-2024-35997.json index 8b45d4bb487..ed55874372e 100644 --- a/CVE-2024/CVE-2024-359xx/CVE-2024-35997.json +++ b/CVE-2024/CVE-2024-359xx/CVE-2024-35997.json @@ -2,7 +2,7 @@ "id": "CVE-2024-35997", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-05-20T10:15:13.960", - "lastModified": "2024-06-25T23:15:31.750", + "lastModified": "2024-06-27T12:15:27.237", "vulnStatus": "Modified", "descriptions": [ { @@ -171,6 +171,10 @@ { "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-360xx/CVE-2024-36004.json b/CVE-2024/CVE-2024-360xx/CVE-2024-36004.json index 2df08ba8cf5..cf4acd5c0db 100644 --- a/CVE-2024/CVE-2024-360xx/CVE-2024-36004.json +++ b/CVE-2024/CVE-2024-360xx/CVE-2024-36004.json @@ -2,7 +2,7 @@ "id": "CVE-2024-36004", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-05-20T10:15:14.427", - "lastModified": "2024-06-25T22:15:34.870", + "lastModified": "2024-06-27T12:15:27.360", "vulnStatus": "Awaiting Analysis", "descriptions": [ { @@ -51,6 +51,10 @@ { "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-360xx/CVE-2024-36014.json b/CVE-2024/CVE-2024-360xx/CVE-2024-36014.json index 9a8de040e3e..c3fd0d9c773 100644 --- a/CVE-2024/CVE-2024-360xx/CVE-2024-36014.json +++ b/CVE-2024/CVE-2024-360xx/CVE-2024-36014.json @@ -2,7 +2,7 @@ "id": "CVE-2024-36014", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-05-29T07:15:10.177", - "lastModified": "2024-06-16T13:15:52.430", + "lastModified": "2024-06-27T13:15:59.797", "vulnStatus": "Awaiting Analysis", "descriptions": [ { @@ -51,6 +51,10 @@ { "url": "https://git.kernel.org/stable/c/e4b52d49383306ef73fd1bd9102538beebb0fe07", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-360xx/CVE-2024-36015.json b/CVE-2024/CVE-2024-360xx/CVE-2024-36015.json index bd02fb083dc..a5962e0b7b1 100644 --- a/CVE-2024/CVE-2024-360xx/CVE-2024-36015.json +++ b/CVE-2024/CVE-2024-360xx/CVE-2024-36015.json @@ -2,7 +2,7 @@ "id": "CVE-2024-36015", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-05-29T08:15:33.880", - "lastModified": "2024-06-16T13:15:52.533", + "lastModified": "2024-06-27T12:15:27.443", "vulnStatus": "Awaiting Analysis", "descriptions": [ { @@ -47,6 +47,10 @@ { "url": "https://git.kernel.org/stable/c/fbf740aeb86a4fe82ad158d26d711f2f3be79b3e", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-360xx/CVE-2024-36016.json b/CVE-2024/CVE-2024-360xx/CVE-2024-36016.json index 21e1acc7d06..546a3d062e8 100644 --- a/CVE-2024/CVE-2024-360xx/CVE-2024-36016.json +++ b/CVE-2024/CVE-2024-360xx/CVE-2024-36016.json @@ -2,7 +2,7 @@ "id": "CVE-2024-36016", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-05-29T19:15:48.297", - "lastModified": "2024-06-16T13:15:52.623", + "lastModified": "2024-06-27T12:15:27.533", "vulnStatus": "Awaiting Analysis", "descriptions": [ { @@ -51,6 +51,10 @@ { "url": "https://git.kernel.org/stable/c/f126ce7305fe88f49cdabc6db4168b9318898ea3", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-360xx/CVE-2024-36017.json b/CVE-2024/CVE-2024-360xx/CVE-2024-36017.json index 76b808a552e..233c2e37683 100644 --- a/CVE-2024/CVE-2024-360xx/CVE-2024-36017.json +++ b/CVE-2024/CVE-2024-360xx/CVE-2024-36017.json @@ -2,7 +2,7 @@ "id": "CVE-2024-36017", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-05-30T13:15:49.830", - "lastModified": "2024-05-30T13:40:12.593", + "lastModified": "2024-06-27T12:15:27.647", "vulnStatus": "Awaiting Analysis", "descriptions": [ { @@ -47,6 +47,10 @@ { "url": "https://git.kernel.org/stable/c/f3c1bf3054f96ddeab0621d920445bada769b40e", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-360xx/CVE-2024-36020.json b/CVE-2024/CVE-2024-360xx/CVE-2024-36020.json index 3b381c40e29..f1993482d35 100644 --- a/CVE-2024/CVE-2024-360xx/CVE-2024-36020.json +++ b/CVE-2024/CVE-2024-360xx/CVE-2024-36020.json @@ -2,7 +2,7 @@ "id": "CVE-2024-36020", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-05-30T15:15:49.107", - "lastModified": "2024-06-25T23:15:31.923", + "lastModified": "2024-06-27T12:15:27.717", "vulnStatus": "Awaiting Analysis", "descriptions": [ { @@ -51,6 +51,10 @@ { "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-362xx/CVE-2024-36286.json b/CVE-2024/CVE-2024-362xx/CVE-2024-36286.json index 4c0423b5d08..768c3d4c327 100644 --- a/CVE-2024/CVE-2024-362xx/CVE-2024-36286.json +++ b/CVE-2024/CVE-2024-362xx/CVE-2024-36286.json @@ -2,12 +2,16 @@ "id": "CVE-2024-36286", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-06-21T11:15:10.277", - "lastModified": "2024-06-21T11:22:01.687", + "lastModified": "2024-06-27T12:15:27.810", "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nnetfilter: nfnetlink_queue: acquire rcu_read_lock() in instance_destroy_rcu()\n\nsyzbot reported that nf_reinject() could be called without rcu_read_lock() :\n\nWARNING: suspicious RCU usage\n6.9.0-rc7-syzkaller-02060-g5c1672705a1a #0 Not tainted\n\nnet/netfilter/nfnetlink_queue.c:263 suspicious rcu_dereference_check() usage!\n\nother info that might help us debug this:\n\nrcu_scheduler_active = 2, debug_locks = 1\n2 locks held by syz-executor.4/13427:\n #0: ffffffff8e334f60 (rcu_callback){....}-{0:0}, at: rcu_lock_acquire include/linux/rcupdate.h:329 [inline]\n #0: ffffffff8e334f60 (rcu_callback){....}-{0:0}, at: rcu_do_batch kernel/rcu/tree.c:2190 [inline]\n #0: ffffffff8e334f60 (rcu_callback){....}-{0:0}, at: rcu_core+0xa86/0x1830 kernel/rcu/tree.c:2471\n #1: ffff88801ca92958 (&inst->lock){+.-.}-{2:2}, at: spin_lock_bh include/linux/spinlock.h:356 [inline]\n #1: ffff88801ca92958 (&inst->lock){+.-.}-{2:2}, at: nfqnl_flush net/netfilter/nfnetlink_queue.c:405 [inline]\n #1: ffff88801ca92958 (&inst->lock){+.-.}-{2:2}, at: instance_destroy_rcu+0x30/0x220 net/netfilter/nfnetlink_queue.c:172\n\nstack backtrace:\nCPU: 0 PID: 13427 Comm: syz-executor.4 Not tainted 6.9.0-rc7-syzkaller-02060-g5c1672705a1a #0\nHardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/02/2024\nCall Trace:\n \n __dump_stack lib/dump_stack.c:88 [inline]\n dump_stack_lvl+0x241/0x360 lib/dump_stack.c:114\n lockdep_rcu_suspicious+0x221/0x340 kernel/locking/lockdep.c:6712\n nf_reinject net/netfilter/nfnetlink_queue.c:323 [inline]\n nfqnl_reinject+0x6ec/0x1120 net/netfilter/nfnetlink_queue.c:397\n nfqnl_flush net/netfilter/nfnetlink_queue.c:410 [inline]\n instance_destroy_rcu+0x1ae/0x220 net/netfilter/nfnetlink_queue.c:172\n rcu_do_batch kernel/rcu/tree.c:2196 [inline]\n rcu_core+0xafd/0x1830 kernel/rcu/tree.c:2471\n handle_softirqs+0x2d6/0x990 kernel/softirq.c:554\n __do_softirq kernel/softirq.c:588 [inline]\n invoke_softirq kernel/softirq.c:428 [inline]\n __irq_exit_rcu+0xf4/0x1c0 kernel/softirq.c:637\n irq_exit_rcu+0x9/0x30 kernel/softirq.c:649\n instr_sysvec_apic_timer_interrupt arch/x86/kernel/apic/apic.c:1043 [inline]\n sysvec_apic_timer_interrupt+0xa6/0xc0 arch/x86/kernel/apic/apic.c:1043\n \n " + }, + { + "lang": "es", + "value": "En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: netfilter: nfnetlink_queue: adquirir rcu_read_lock() en instancia_destroy_rcu() syzbot inform\u00f3 que se pod\u00eda llamar a nf_reinject() sin rcu_read_lock() : ADVERTENCIA: uso sospechoso de RCU 6.9.0-rc7-syzkaller -02060-g5c1672705a1a #0 \u00a1No est\u00e1 contaminado net/netfilter/nfnetlink_queue.c:263 uso sospechoso de rcu_dereference_check()! otra informaci\u00f3n que podr\u00eda ayudarnos a depurar esto: rcu_scheduler_active = 2, debug_locks = 1 2 bloqueos mantenidos por syz-executor.4/13427: #0: ffffffff8e334f60 (rcu_callback){....}-{0:0}, en: rcu_lock_acquire include/linux/rcupdate.h:329 [en l\u00ednea] #0: ffffffff8e334f60 (rcu_callback){....}-{0:0}, en: rcu_do_batch kernel/rcu/tree.c:2190 [en l\u00ednea] #0 : ffffffff8e334f60 (rcu_callback){....}-{0:0}, en: rcu_core+0xa86/0x1830 kernel/rcu/tree.c:2471 #1: ffff88801ca92958 (&inst->lock){+.-.} -{2:2}, en: spin_lock_bh include/linux/spinlock.h:356 [en l\u00ednea] #1: ffff88801ca92958 (&inst->lock){+.-.}-{2:2}, en: nfqnl_flush net/ netfilter/nfnetlink_queue.c:405 [en l\u00ednea] #1: ffff88801ca92958 (&inst->lock){+.-.}-{2:2}, en: instancia_destroy_rcu+0x30/0x220 net/netfilter/nfnetlink_queue.c:172 pila backtrace: CPU: 0 PID: 13427 Comm: syz-executor.4 No contaminado 6.9.0-rc7-syzkaller-02060-g5c1672705a1a #0 Nombre del hardware: Google Google Compute Engine/Google Compute Engine, BIOS Llamada de Google 02/04/2024 Trace: __dump_stack lib/dump_stack.c: 88 [en l\u00ednea] dump_stack_lvl+0x241/0x360 lib/dump_stack.c: 114 Lockdep_rcu_suspicious+0x221/0x340 kernel/locking/lockdep.c: 6712 nf_filt. C :323 [en l\u00ednea] nfqnl_reinject+0x6ec/0x1120 net/netfilter/nfnetlink_queue.c:397 nfqnl_flush net/netfilter/nfnetlink_queue.c:410 [en l\u00ednea] instancia_destroy_rcu+0x1ae/0x220 net/netfilter/nfnetlink_queue.c:172 do_batch kernel/rcu /tree.c:2196 [en l\u00ednea] rcu_core+0xafd/0x1830 kernel/rcu/tree.c:2471 handle_softirqs+0x2d6/0x990 kernel/softirq.c:554 __do_softirq kernel/softirq.c:588 [en l\u00ednea] invoke_softirq kernel/softirq .c:428 [en l\u00ednea] __irq_exit_rcu+0xf4/0x1c0 kernel/softirq.c:637 irq_exit_rcu+0x9/0x30 kernel/softirq.c:649 instr_sysvec_apic_timer_interrupt arch/x86/kernel/apic/apic.c:1043 [en l\u00ednea] r_interrupci\u00f3n+ 0xa6/0xc0 arch/x86/kernel/apic/apic.c:1043 " } ], "metrics": {}, @@ -43,6 +47,10 @@ { "url": "https://git.kernel.org/stable/c/e01065b339e323b3dfa1be217fd89e9b3208b0ab", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-362xx/CVE-2024-36288.json b/CVE-2024/CVE-2024-362xx/CVE-2024-36288.json index ba72af4b06a..c266eca9510 100644 --- a/CVE-2024/CVE-2024-362xx/CVE-2024-36288.json +++ b/CVE-2024/CVE-2024-362xx/CVE-2024-36288.json @@ -2,8 +2,8 @@ "id": "CVE-2024-36288", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-06-21T12:15:10.967", - "lastModified": "2024-06-24T18:39:00.683", - "vulnStatus": "Analyzed", + "lastModified": "2024-06-27T13:15:59.863", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -137,6 +137,10 @@ "Mailing List", "Patch" ] + }, + { + "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-368xx/CVE-2024-36829.json b/CVE-2024/CVE-2024-368xx/CVE-2024-36829.json index 8edf14c80f0..1dfd1b5ea1b 100644 --- a/CVE-2024/CVE-2024-368xx/CVE-2024-36829.json +++ b/CVE-2024/CVE-2024-368xx/CVE-2024-36829.json @@ -2,12 +2,16 @@ "id": "CVE-2024-36829", "sourceIdentifier": "cve@mitre.org", "published": "2024-06-26T21:15:13.387", - "lastModified": "2024-06-26T21:15:13.387", - "vulnStatus": "Received", + "lastModified": "2024-06-27T12:47:19.847", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", "value": "Incorrect access control in Teldat M1 v11.00.05.50.01 allows attackers to obtain sensitive information via a crafted query string." + }, + { + "lang": "es", + "value": " El control de acceso incorrecto en Teldat M1 v11.00.05.50.01 permite a los atacantes obtener informaci\u00f3n confidencial a trav\u00e9s de una cadena de consulta manipulada." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-368xx/CVE-2024-36883.json b/CVE-2024/CVE-2024-368xx/CVE-2024-36883.json index ffcf5fa3b63..9f93efd5151 100644 --- a/CVE-2024/CVE-2024-368xx/CVE-2024-36883.json +++ b/CVE-2024/CVE-2024-368xx/CVE-2024-36883.json @@ -2,7 +2,7 @@ "id": "CVE-2024-36883", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-05-30T16:15:11.900", - "lastModified": "2024-05-30T18:18:58.870", + "lastModified": "2024-06-27T13:15:59.953", "vulnStatus": "Awaiting Analysis", "descriptions": [ { @@ -47,6 +47,14 @@ { "url": "https://git.kernel.org/stable/c/f4f94587e1bf87cb40ec33955a9d90148dd026ab", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00019.html", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-368xx/CVE-2024-36886.json b/CVE-2024/CVE-2024-368xx/CVE-2024-36886.json index 27f626b0577..6993a354771 100644 --- a/CVE-2024/CVE-2024-368xx/CVE-2024-36886.json +++ b/CVE-2024/CVE-2024-368xx/CVE-2024-36886.json @@ -2,7 +2,7 @@ "id": "CVE-2024-36886", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-05-30T16:15:12.150", - "lastModified": "2024-05-30T18:18:58.870", + "lastModified": "2024-06-27T12:15:27.880", "vulnStatus": "Awaiting Analysis", "descriptions": [ { @@ -47,6 +47,10 @@ { "url": "https://git.kernel.org/stable/c/ffd4917c1edb3c3ff334fce3704fbe9c39f35682", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-369xx/CVE-2024-36902.json b/CVE-2024/CVE-2024-369xx/CVE-2024-36902.json index 0f1cc161553..c2ba117d575 100644 --- a/CVE-2024/CVE-2024-369xx/CVE-2024-36902.json +++ b/CVE-2024/CVE-2024-369xx/CVE-2024-36902.json @@ -2,8 +2,8 @@ "id": "CVE-2024-36902", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-05-30T16:15:13.770", - "lastModified": "2024-06-10T19:21:09.643", - "vulnStatus": "Analyzed", + "lastModified": "2024-06-27T12:15:27.953", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -160,6 +160,10 @@ "tags": [ "Patch" ] + }, + { + "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-369xx/CVE-2024-36904.json b/CVE-2024/CVE-2024-369xx/CVE-2024-36904.json index 6738c12554a..e1e0e00e8b0 100644 --- a/CVE-2024/CVE-2024-369xx/CVE-2024-36904.json +++ b/CVE-2024/CVE-2024-369xx/CVE-2024-36904.json @@ -2,7 +2,7 @@ "id": "CVE-2024-36904", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-05-30T16:15:13.947", - "lastModified": "2024-05-30T18:18:58.870", + "lastModified": "2024-06-27T13:16:00.043", "vulnStatus": "Awaiting Analysis", "descriptions": [ { @@ -47,6 +47,14 @@ { "url": "https://git.kernel.org/stable/c/f2db7230f73a80dbb179deab78f88a7947f0ab7e", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00019.html", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-369xx/CVE-2024-36905.json b/CVE-2024/CVE-2024-369xx/CVE-2024-36905.json index de158249668..5db3f0da31f 100644 --- a/CVE-2024/CVE-2024-369xx/CVE-2024-36905.json +++ b/CVE-2024/CVE-2024-369xx/CVE-2024-36905.json @@ -2,7 +2,7 @@ "id": "CVE-2024-36905", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-05-30T16:15:14.030", - "lastModified": "2024-05-30T18:18:58.870", + "lastModified": "2024-06-27T13:16:00.133", "vulnStatus": "Awaiting Analysis", "descriptions": [ { @@ -47,6 +47,10 @@ { "url": "https://git.kernel.org/stable/c/f47d0d32fa94e815fdd78b8b88684873e67939f4", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-369xx/CVE-2024-36919.json b/CVE-2024/CVE-2024-369xx/CVE-2024-36919.json index 321f65e2a44..847a01da0ef 100644 --- a/CVE-2024/CVE-2024-369xx/CVE-2024-36919.json +++ b/CVE-2024/CVE-2024-369xx/CVE-2024-36919.json @@ -2,7 +2,7 @@ "id": "CVE-2024-36919", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-05-30T16:15:15.210", - "lastModified": "2024-05-30T18:18:58.870", + "lastModified": "2024-06-27T12:15:28.107", "vulnStatus": "Awaiting Analysis", "descriptions": [ { @@ -47,6 +47,10 @@ { "url": "https://git.kernel.org/stable/c/ea50941cd8c9f0b12f38b73d3b1bfeca660dd342", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-369xx/CVE-2024-36933.json b/CVE-2024/CVE-2024-369xx/CVE-2024-36933.json index d6a879a631d..0611da7d4e0 100644 --- a/CVE-2024/CVE-2024-369xx/CVE-2024-36933.json +++ b/CVE-2024/CVE-2024-369xx/CVE-2024-36933.json @@ -2,7 +2,7 @@ "id": "CVE-2024-36933", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-05-30T16:15:16.463", - "lastModified": "2024-05-30T18:18:58.870", + "lastModified": "2024-06-27T12:15:28.180", "vulnStatus": "Awaiting Analysis", "descriptions": [ { @@ -47,6 +47,10 @@ { "url": "https://git.kernel.org/stable/c/bbccf0caef2fa917d6d0692385a06ce3c262a216", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-369xx/CVE-2024-36934.json b/CVE-2024/CVE-2024-369xx/CVE-2024-36934.json index 4bbd404dcdf..deebd488b7c 100644 --- a/CVE-2024/CVE-2024-369xx/CVE-2024-36934.json +++ b/CVE-2024/CVE-2024-369xx/CVE-2024-36934.json @@ -2,7 +2,7 @@ "id": "CVE-2024-36934", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-05-30T16:15:16.553", - "lastModified": "2024-05-30T18:18:58.870", + "lastModified": "2024-06-27T13:16:00.213", "vulnStatus": "Awaiting Analysis", "descriptions": [ { @@ -47,6 +47,14 @@ { "url": "https://git.kernel.org/stable/c/e19478763154674c084defc62ae0d64d79657f91", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00019.html", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-369xx/CVE-2024-36940.json b/CVE-2024/CVE-2024-369xx/CVE-2024-36940.json index 453cd5aa923..d3d725c8b84 100644 --- a/CVE-2024/CVE-2024-369xx/CVE-2024-36940.json +++ b/CVE-2024/CVE-2024-369xx/CVE-2024-36940.json @@ -2,7 +2,7 @@ "id": "CVE-2024-36940", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-05-30T16:15:17.063", - "lastModified": "2024-05-30T18:18:58.870", + "lastModified": "2024-06-27T12:15:28.243", "vulnStatus": "Awaiting Analysis", "descriptions": [ { @@ -47,6 +47,10 @@ { "url": "https://git.kernel.org/stable/c/f9f1e321d53e4c5b666b66e5b43da29841fb55ba", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-369xx/CVE-2024-36941.json b/CVE-2024/CVE-2024-369xx/CVE-2024-36941.json index 82f3e2c0f80..7bb049597d4 100644 --- a/CVE-2024/CVE-2024-369xx/CVE-2024-36941.json +++ b/CVE-2024/CVE-2024-369xx/CVE-2024-36941.json @@ -2,7 +2,7 @@ "id": "CVE-2024-36941", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-05-30T16:15:17.147", - "lastModified": "2024-05-30T18:18:58.870", + "lastModified": "2024-06-27T13:16:00.280", "vulnStatus": "Awaiting Analysis", "descriptions": [ { @@ -47,6 +47,10 @@ { "url": "https://git.kernel.org/stable/c/f92772a642485394db5c9a17bd0ee73fc6902383", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-369xx/CVE-2024-36946.json b/CVE-2024/CVE-2024-369xx/CVE-2024-36946.json index d046fc3eeff..ebb3d582a94 100644 --- a/CVE-2024/CVE-2024-369xx/CVE-2024-36946.json +++ b/CVE-2024/CVE-2024-369xx/CVE-2024-36946.json @@ -2,7 +2,7 @@ "id": "CVE-2024-36946", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-05-30T16:15:17.570", - "lastModified": "2024-05-30T18:18:58.870", + "lastModified": "2024-06-27T13:16:00.343", "vulnStatus": "Awaiting Analysis", "descriptions": [ { @@ -47,6 +47,10 @@ { "url": "https://git.kernel.org/stable/c/f085e02f0a32f6dfcfabc6535c9c4a1707cef86b", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-369xx/CVE-2024-36950.json b/CVE-2024/CVE-2024-369xx/CVE-2024-36950.json index a31c11c9d87..6bbcd6f1154 100644 --- a/CVE-2024/CVE-2024-369xx/CVE-2024-36950.json +++ b/CVE-2024/CVE-2024-369xx/CVE-2024-36950.json @@ -2,7 +2,7 @@ "id": "CVE-2024-36950", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-05-30T16:15:18.000", - "lastModified": "2024-05-30T18:18:58.870", + "lastModified": "2024-06-27T13:16:00.427", "vulnStatus": "Awaiting Analysis", "descriptions": [ { @@ -47,6 +47,10 @@ { "url": "https://git.kernel.org/stable/c/fa273f312334246c909475c5868e6daab889cc8c", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-369xx/CVE-2024-36954.json b/CVE-2024/CVE-2024-369xx/CVE-2024-36954.json index 14afdf545ad..b852c08e75c 100644 --- a/CVE-2024/CVE-2024-369xx/CVE-2024-36954.json +++ b/CVE-2024/CVE-2024-369xx/CVE-2024-36954.json @@ -2,7 +2,7 @@ "id": "CVE-2024-36954", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-05-30T16:15:18.313", - "lastModified": "2024-05-30T18:18:58.870", + "lastModified": "2024-06-27T12:15:28.340", "vulnStatus": "Awaiting Analysis", "descriptions": [ { @@ -47,6 +47,10 @@ { "url": "https://git.kernel.org/stable/c/d03a82f4f8144befdc10518e732e2a60b34c870e", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-369xx/CVE-2024-36959.json b/CVE-2024/CVE-2024-369xx/CVE-2024-36959.json index e1b0f84751e..4b0ebaaacf1 100644 --- a/CVE-2024/CVE-2024-369xx/CVE-2024-36959.json +++ b/CVE-2024/CVE-2024-369xx/CVE-2024-36959.json @@ -2,7 +2,7 @@ "id": "CVE-2024-36959", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-05-30T16:15:18.747", - "lastModified": "2024-05-30T18:18:58.870", + "lastModified": "2024-06-27T13:16:00.510", "vulnStatus": "Awaiting Analysis", "descriptions": [ { @@ -47,6 +47,10 @@ { "url": "https://git.kernel.org/stable/c/c7e02ccc9fdc496fe51e440e3e66ac36509ca049", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-369xx/CVE-2024-36960.json b/CVE-2024/CVE-2024-369xx/CVE-2024-36960.json index 580daaa2d8c..fdd68f60a25 100644 --- a/CVE-2024/CVE-2024-369xx/CVE-2024-36960.json +++ b/CVE-2024/CVE-2024-369xx/CVE-2024-36960.json @@ -2,7 +2,7 @@ "id": "CVE-2024-36960", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-06-03T08:15:09.557", - "lastModified": "2024-06-03T14:46:24.250", + "lastModified": "2024-06-27T12:15:28.407", "vulnStatus": "Awaiting Analysis", "descriptions": [ { @@ -47,6 +47,10 @@ { "url": "https://git.kernel.org/stable/c/deab66596dfad14f1c54eeefdb72428340d72a77", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-369xx/CVE-2024-36964.json b/CVE-2024/CVE-2024-369xx/CVE-2024-36964.json index 0afa1a7e45c..0784ec0f791 100644 --- a/CVE-2024/CVE-2024-369xx/CVE-2024-36964.json +++ b/CVE-2024/CVE-2024-369xx/CVE-2024-36964.json @@ -2,7 +2,7 @@ "id": "CVE-2024-36964", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-06-03T08:15:09.903", - "lastModified": "2024-06-03T14:46:24.250", + "lastModified": "2024-06-27T12:15:28.493", "vulnStatus": "Awaiting Analysis", "descriptions": [ { @@ -47,6 +47,10 @@ { "url": "https://git.kernel.org/stable/c/e90bc596a74bb905e0a45bf346038c3f9d1e868d", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-369xx/CVE-2024-36971.json b/CVE-2024/CVE-2024-369xx/CVE-2024-36971.json index 94a22683101..8171eebf758 100644 --- a/CVE-2024/CVE-2024-369xx/CVE-2024-36971.json +++ b/CVE-2024/CVE-2024-369xx/CVE-2024-36971.json @@ -2,7 +2,7 @@ "id": "CVE-2024-36971", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-06-10T09:15:09.127", - "lastModified": "2024-06-16T13:15:52.820", + "lastModified": "2024-06-27T12:15:28.553", "vulnStatus": "Modified", "descriptions": [ { @@ -112,6 +112,10 @@ { "url": "https://git.kernel.org/stable/c/eacb8b195579c174a6d3e12a9690b206eb7f28cf", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-372xx/CVE-2024-37247.json b/CVE-2024/CVE-2024-372xx/CVE-2024-37247.json index 7b381d52bf9..1c2129650b7 100644 --- a/CVE-2024/CVE-2024-372xx/CVE-2024-37247.json +++ b/CVE-2024/CVE-2024-372xx/CVE-2024-37247.json @@ -2,12 +2,16 @@ "id": "CVE-2024-37247", "sourceIdentifier": "audit@patchstack.com", "published": "2024-06-26T22:15:10.000", - "lastModified": "2024-06-26T22:15:10.000", - "vulnStatus": "Received", + "lastModified": "2024-06-27T12:47:19.847", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in twinpictures, baden03 jQuery T(-) Countdown Widget allows Stored XSS.This issue affects jQuery T(-) Countdown Widget: from n/a through 2.3.25." + }, + { + "lang": "es", + "value": "La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web (XSS o 'Cross-site Scripting') en twinpictures, baden03 jQuery T(-) Countdown Widget permite XSS Almacenado. Este problema afecta al jQuery T(-) Countdown Widget: desde n/a hasta 2.3.25." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-372xx/CVE-2024-37248.json b/CVE-2024/CVE-2024-372xx/CVE-2024-37248.json index dd68eee63dd..f74060e317d 100644 --- a/CVE-2024/CVE-2024-372xx/CVE-2024-37248.json +++ b/CVE-2024/CVE-2024-372xx/CVE-2024-37248.json @@ -2,12 +2,16 @@ "id": "CVE-2024-37248", "sourceIdentifier": "audit@patchstack.com", "published": "2024-06-26T22:15:10.223", - "lastModified": "2024-06-26T22:15:10.223", - "vulnStatus": "Received", + "lastModified": "2024-06-27T12:47:19.847", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in CryoutCreations Anima allows Stored XSS.This issue affects Anima: from n/a through 1.4.1." + }, + { + "lang": "es", + "value": "La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web (XSS o 'Cross-site Scripting') en CryoutCreations Anima permite XSS Almacenado. Este problema afecta a Anima: desde n/a hasta 1.4.1." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-373xx/CVE-2024-37353.json b/CVE-2024/CVE-2024-373xx/CVE-2024-37353.json index 7c06a407c7d..98335d4946a 100644 --- a/CVE-2024/CVE-2024-373xx/CVE-2024-37353.json +++ b/CVE-2024/CVE-2024-373xx/CVE-2024-37353.json @@ -2,12 +2,16 @@ "id": "CVE-2024-37353", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-06-21T11:15:10.590", - "lastModified": "2024-06-21T11:22:01.687", + "lastModified": "2024-06-27T13:16:00.580", "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nvirtio: delete vq in vp_find_vqs_msix() when request_irq() fails\n\nWhen request_irq() fails, error path calls vp_del_vqs(). There, as vq is\npresent in the list, free_irq() is called for the same vector. That\ncauses following splat:\n\n[ 0.414355] Trying to free already-free IRQ 27\n[ 0.414403] WARNING: CPU: 1 PID: 1 at kernel/irq/manage.c:1899 free_irq+0x1a1/0x2d0\n[ 0.414510] Modules linked in:\n[ 0.414540] CPU: 1 PID: 1 Comm: swapper/0 Not tainted 6.9.0-rc4+ #27\n[ 0.414540] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.16.3-1.fc39 04/01/2014\n[ 0.414540] RIP: 0010:free_irq+0x1a1/0x2d0\n[ 0.414540] Code: 1e 00 48 83 c4 08 48 89 e8 5b 5d 41 5c 41 5d 41 5e 41 5f c3 cc cc cc cc 90 8b 74 24 04 48 c7 c7 98 80 6c b1 e8 00 c9 f7 ff 90 <0f> 0b 90 90 48 89 ee 4c 89 ef e8 e0 20 b8 00 49 8b 47 40 48 8b 40\n[ 0.414540] RSP: 0000:ffffb71480013ae0 EFLAGS: 00010086\n[ 0.414540] RAX: 0000000000000000 RBX: ffffa099c2722000 RCX: 0000000000000000\n[ 0.414540] RDX: 0000000000000000 RSI: ffffb71480013998 RDI: 0000000000000001\n[ 0.414540] RBP: 0000000000000246 R08: 00000000ffffdfff R09: 0000000000000001\n[ 0.414540] R10: 00000000ffffdfff R11: ffffffffb18729c0 R12: ffffa099c1c91760\n[ 0.414540] R13: ffffa099c1c916a4 R14: ffffa099c1d2f200 R15: ffffa099c1c91600\n[ 0.414540] FS: 0000000000000000(0000) GS:ffffa099fec40000(0000) knlGS:0000000000000000\n[ 0.414540] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n[ 0.414540] CR2: 0000000000000000 CR3: 0000000008e3e001 CR4: 0000000000370ef0\n[ 0.414540] Call Trace:\n[ 0.414540] \n[ 0.414540] ? __warn+0x80/0x120\n[ 0.414540] ? free_irq+0x1a1/0x2d0\n[ 0.414540] ? report_bug+0x164/0x190\n[ 0.414540] ? handle_bug+0x3b/0x70\n[ 0.414540] ? exc_invalid_op+0x17/0x70\n[ 0.414540] ? asm_exc_invalid_op+0x1a/0x20\n[ 0.414540] ? free_irq+0x1a1/0x2d0\n[ 0.414540] vp_del_vqs+0xc1/0x220\n[ 0.414540] vp_find_vqs_msix+0x305/0x470\n[ 0.414540] vp_find_vqs+0x3e/0x1a0\n[ 0.414540] vp_modern_find_vqs+0x1b/0x70\n[ 0.414540] init_vqs+0x387/0x600\n[ 0.414540] virtnet_probe+0x50a/0xc80\n[ 0.414540] virtio_dev_probe+0x1e0/0x2b0\n[ 0.414540] really_probe+0xc0/0x2c0\n[ 0.414540] ? __pfx___driver_attach+0x10/0x10\n[ 0.414540] __driver_probe_device+0x73/0x120\n[ 0.414540] driver_probe_device+0x1f/0xe0\n[ 0.414540] __driver_attach+0x88/0x180\n[ 0.414540] bus_for_each_dev+0x85/0xd0\n[ 0.414540] bus_add_driver+0xec/0x1f0\n[ 0.414540] driver_register+0x59/0x100\n[ 0.414540] ? __pfx_virtio_net_driver_init+0x10/0x10\n[ 0.414540] virtio_net_driver_init+0x90/0xb0\n[ 0.414540] do_one_initcall+0x58/0x230\n[ 0.414540] kernel_init_freeable+0x1a3/0x2d0\n[ 0.414540] ? __pfx_kernel_init+0x10/0x10\n[ 0.414540] kernel_init+0x1a/0x1c0\n[ 0.414540] ret_from_fork+0x31/0x50\n[ 0.414540] ? __pfx_kernel_init+0x10/0x10\n[ 0.414540] ret_from_fork_asm+0x1a/0x30\n[ 0.414540] \n\nFix this by calling deleting the current vq when request_irq() fails." + }, + { + "lang": "es", + "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: virtio: eliminar vq en vp_find_vqs_msix() cuando request_irq() falla Cuando request_irq() falla, la ruta de error llama a vp_del_vqs(). All\u00ed, como vq est\u00e1 presente en la lista, se llama a free_irq() para el mismo vector. Eso provoca el siguiente s\u00edmbolo: [0.414355] Intentando liberar IRQ 27 que ya est\u00e1 libre [0.414403] ADVERTENCIA: CPU: 1 PID: 1 en kernel/irq/manage.c:1899 free_irq+0x1a1/0x2d0 [0.414510] M\u00f3dulos vinculados en: [ 0.414540] CPU: 1 PID: 1 Comunicaciones: swapper/0 No contaminado 6.9.0-rc4+ #27 [ 0.414540] Nombre de hardware: PC est\u00e1ndar QEMU (i440FX + PIIX, 1996), BIOS 1.16.3-1.fc39 04/01 /2014 [0.414540] RIP: 0010:free_irq+0x1a1/0x2d0 [0.414540] C\u00f3digo: 1e 00 48 83 c4 08 48 89 e8 5b 5d 41 5c 41 5d 41 5e 41 5f c3 cc cc cc 90 8b 74 24 04 48 c7 c7 98 80 6c b1 e8 00 c9 f7 ff 90 <0f> 0b 90 90 48 89 ee 4c 89 ef e8 e0 20 b8 00 49 8b 47 40 48 8b 40 [ 0.414540] RSP: 0000:ffffb71480013ae0 EFLAGS: 00010086 [0,414540] RAX : 0000000000000000 RBX: ffffa099c2722000 RCX: 0000000000000000 [ 0.414540] RDX: 0000000000000000 RSI: ffffb71480013998 RDI: 0000000000000 001 [ 0.414540] RBP: 0000000000000246 R08: 00000000ffffdfff R09: 0000000000000001 [ 0.414540] R10: 00000000ffffdfff R11: fffffffb18729c0 fffa099c1c91760 [ 0.414540] R13: fffa099c1c916a4 R14: ffffa099c1d2f200 R15: ffffa099c1c91600 [ 0.414540] FS: 0000000000000000(0000) GS:ffffa099fec40000(0000) knlGS:0000000000000000 [ 0.41454 0] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 0.414540] CR2: 0000000000000000 CR3: 0000000008e3e001 CR4: 0000000000370ef0 [0.414540] Seguimiento de llamadas: [0.414540] [0.414540]? __advertir+0x80/0x120 [0.414540]? free_irq+0x1a1/0x2d0 [0.414540]? report_bug+0x164/0x190 [0.414540]? handle_bug+0x3b/0x70 [0.414540]? exc_invalid_op+0x17/0x70 [0.414540]? asm_exc_invalid_op+0x1a/0x20 [0.414540]? free_irq+0x1a1/0x2d0 [ 0.414540] vp_del_vqs+0xc1/0x220 [ 0.414540] vp_find_vqs_msix+0x305/0x470 [ 0.414540] vp_find_vqs+0x3e/0x1a0 [ 0.414540 ] vp_modern_find_vqs+0x1b/0x70 [ 0.414540] init_vqs+0x387/0x600 [ 0.414540] virtnet_probe+ 0x50a/0xc80 [0.414540] virtio_dev_probe+0x1e0/0x2b0 [0.414540]realmente_probe+0xc0/0x2c0 [0.414540]? __pfx___driver_attach+0x10/0x10 [ 0.414540] __driver_probe_device+0x73/0x120 [ 0.414540] driver_probe_device+0x1f/0xe0 [ 0.414540] __driver_attach+0x88/0x180 [ 0.414540] _for_each_dev+0x85/0xd0 [ 0.414540] bus_add_driver+0xec/0x1f0 [ 0.414540] driver_register+ 0x59/0x100 [0,414540]? __pfx_virtio_net_driver_init+0x10/0x10 [ 0.414540] virtio_net_driver_init+0x90/0xb0 [ 0.414540] do_one_initcall+0x58/0x230 [ 0.414540] kernel_init_freeable+0x1a3/0x2d0 [ 0.41 4540] ? __pfx_kernel_init+0x10/0x10 [0.414540] kernel_init+0x1a/0x1c0 [0.414540] ret_from_fork+0x31/0x50 [0.414540]? __pfx_kernel_init+0x10/0x10 [ 0.414540] ret_from_fork_asm+0x1a/0x30 [ 0.414540] Solucione este problema llamando a eliminar el vq actual cuando request_irq() falla." } ], "metrics": {}, @@ -43,6 +47,10 @@ { "url": "https://git.kernel.org/stable/c/cb7a7c8144b434e06aba99b13b045a7efe859587", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-373xx/CVE-2024-37356.json b/CVE-2024/CVE-2024-373xx/CVE-2024-37356.json index 75470675370..13f956cb266 100644 --- a/CVE-2024/CVE-2024-373xx/CVE-2024-37356.json +++ b/CVE-2024/CVE-2024-373xx/CVE-2024-37356.json @@ -2,12 +2,16 @@ "id": "CVE-2024-37356", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-06-21T11:15:10.677", - "lastModified": "2024-06-21T11:22:01.687", + "lastModified": "2024-06-27T12:15:28.643", "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\ntcp: Fix shift-out-of-bounds in dctcp_update_alpha().\n\nIn dctcp_update_alpha(), we use a module parameter dctcp_shift_g\nas follows:\n\n alpha -= min_not_zero(alpha, alpha >> dctcp_shift_g);\n ...\n delivered_ce <<= (10 - dctcp_shift_g);\n\nIt seems syzkaller started fuzzing module parameters and triggered\nshift-out-of-bounds [0] by setting 100 to dctcp_shift_g:\n\n memcpy((void*)0x20000080,\n \"/sys/module/tcp_dctcp/parameters/dctcp_shift_g\\000\", 47);\n res = syscall(__NR_openat, /*fd=*/0xffffffffffffff9cul, /*file=*/0x20000080ul,\n /*flags=*/2ul, /*mode=*/0ul);\n memcpy((void*)0x20000000, \"100\\000\", 4);\n syscall(__NR_write, /*fd=*/r[0], /*val=*/0x20000000ul, /*len=*/4ul);\n\nLet's limit the max value of dctcp_shift_g by param_set_uint_minmax().\n\nWith this patch:\n\n # echo 10 > /sys/module/tcp_dctcp/parameters/dctcp_shift_g\n # cat /sys/module/tcp_dctcp/parameters/dctcp_shift_g\n 10\n # echo 11 > /sys/module/tcp_dctcp/parameters/dctcp_shift_g\n -bash: echo: write error: Invalid argument\n\n[0]:\nUBSAN: shift-out-of-bounds in net/ipv4/tcp_dctcp.c:143:12\nshift exponent 100 is too large for 32-bit type 'u32' (aka 'unsigned int')\nCPU: 0 PID: 8083 Comm: syz-executor345 Not tainted 6.9.0-05151-g1b294a1f3561 #2\nHardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS\n1.13.0-1ubuntu1.1 04/01/2014\nCall Trace:\n \n __dump_stack lib/dump_stack.c:88 [inline]\n dump_stack_lvl+0x201/0x300 lib/dump_stack.c:114\n ubsan_epilogue lib/ubsan.c:231 [inline]\n __ubsan_handle_shift_out_of_bounds+0x346/0x3a0 lib/ubsan.c:468\n dctcp_update_alpha+0x540/0x570 net/ipv4/tcp_dctcp.c:143\n tcp_in_ack_event net/ipv4/tcp_input.c:3802 [inline]\n tcp_ack+0x17b1/0x3bc0 net/ipv4/tcp_input.c:3948\n tcp_rcv_state_process+0x57a/0x2290 net/ipv4/tcp_input.c:6711\n tcp_v4_do_rcv+0x764/0xc40 net/ipv4/tcp_ipv4.c:1937\n sk_backlog_rcv include/net/sock.h:1106 [inline]\n __release_sock+0x20f/0x350 net/core/sock.c:2983\n release_sock+0x61/0x1f0 net/core/sock.c:3549\n mptcp_subflow_shutdown+0x3d0/0x620 net/mptcp/protocol.c:2907\n mptcp_check_send_data_fin+0x225/0x410 net/mptcp/protocol.c:2976\n __mptcp_close+0x238/0xad0 net/mptcp/protocol.c:3072\n mptcp_close+0x2a/0x1a0 net/mptcp/protocol.c:3127\n inet_release+0x190/0x1f0 net/ipv4/af_inet.c:437\n __sock_release net/socket.c:659 [inline]\n sock_close+0xc0/0x240 net/socket.c:1421\n __fput+0x41b/0x890 fs/file_table.c:422\n task_work_run+0x23b/0x300 kernel/task_work.c:180\n exit_task_work include/linux/task_work.h:38 [inline]\n do_exit+0x9c8/0x2540 kernel/exit.c:878\n do_group_exit+0x201/0x2b0 kernel/exit.c:1027\n __do_sys_exit_group kernel/exit.c:1038 [inline]\n __se_sys_exit_group kernel/exit.c:1036 [inline]\n __x64_sys_exit_group+0x3f/0x40 kernel/exit.c:1036\n do_syscall_x64 arch/x86/entry/common.c:52 [inline]\n do_syscall_64+0xe4/0x240 arch/x86/entry/common.c:83\n entry_SYSCALL_64_after_hwframe+0x67/0x6f\nRIP: 0033:0x7f6c2b5005b6\nCode: Unable to access opcode bytes at 0x7f6c2b50058c.\nRSP: 002b:00007ffe883eb948 EFLAGS: 00000246 ORIG_RAX: 00000000000000e7\nRAX: ffffffffffffffda RBX: 00007f6c2b5862f0 RCX: 00007f6c2b5005b6\nRDX: 0000000000000001 RSI: 000000000000003c RDI: 0000000000000001\nRBP: 0000000000000001 R08: 00000000000000e7 R09: ffffffffffffffc0\nR10: 0000000000000006 R11: 0000000000000246 R12: 00007f6c2b5862f0\nR13: 0000000000000001 R14: 0000000000000000 R15: 0000000000000001\n " + }, + { + "lang": "es", + "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: tcp: corrige el desplazamiento fuera de los l\u00edmites en dctcp_update_alpha(). En dctcp_update_alpha(), utilizamos un par\u00e1metro de m\u00f3dulo dctcp_shift_g de la siguiente manera: alpha -= min_not_zero(alpha, alpha >> dctcp_shift_g); ... entregado_ce <<= (10 - dctcp_shift_g); Parece que syzkaller comenz\u00f3 a modificar los par\u00e1metros del m\u00f3dulo y activ\u00f3 el desplazamiento fuera de los l\u00edmites [0] estableciendo 100 en dctcp_shift_g: memcpy((void*)0x20000080, \"/sys/module/tcp_dctcp/parameters/dctcp_shift_g\\000\", 47) ; res = syscall(__NR_openat, /*fd=*/0xffffffffffffff9cul, /*file=*/0x20000080ul, /*flags=*/2ul, /*mode=*/0ul); memcpy((void*)0x20000000, \"100\\000\", 4); syscall(__NR_write, /*fd=*/r[0], /*val=*/0x20000000ul, /*len=*/4ul); Limitemos el valor m\u00e1ximo de dctcp_shift_g mediante param_set_uint_minmax(). Con este parche: # echo 10 > /sys/module/tcp_dctcp/parameters/dctcp_shift_g # cat /sys/module/tcp_dctcp/parameters/dctcp_shift_g 10 # echo 11 > /sys/module/tcp_dctcp/parameters/dctcp_shift_g -bash: echo: error de escritura: argumento no v\u00e1lido [0]: UBSAN: desplazamiento fuera de los l\u00edmites en net/ipv4/tcp_dctcp.c:143:12 el exponente de desplazamiento 100 es demasiado grande para el tipo 'u32' de 32 bits (tambi\u00e9n conocido como 'int sin signo' ) CPU: 0 PID: 8083 Comm: syz-executor345 No contaminado 6.9.0-05151-g1b294a1f3561 #2 Nombre del hardware: PC est\u00e1ndar QEMU (i440FX + PIIX, 1996), BIOS 1.13.0-1ubuntu1.1 01/04/2014 Seguimiento de llamadas: __dump_stack lib/dump_stack.c:88 [en l\u00ednea] dump_stack_lvl+0x201/0x300 lib/dump_stack.c:114 ubsan_epilogue lib/ubsan.c:231 [en l\u00ednea] __ubsan_handle_shift_out_of_bounds+0x346/0x3a0 lib/ubsan.c :468 dctcp_update_alpha+0x540/0x570 net/ipv4/tcp_dctcp.c:143 tcp_in_ack_event net/ipv4/tcp_input.c:3802 [en l\u00ednea] tcp_ack+0x17b1/0x3bc0 net/ipv4/tcp_input.c:3948 v_state_process+0x57a/0x2290 neto/ ipv4/tcp_input.c:6711 tcp_v4_do_rcv+0x764/0xc40 net/ipv4/tcp_ipv4.c:1937 sk_backlog_rcv include/net/sock.h:1106 [en l\u00ednea] __release_sock+0x20f/0x350 net/core/sock.c:2983 release_sock+ 0x61/0x1f0 net/core/sock.c:3549 mptcp_subflow_shutdown+0x3d0/0x620 net/mptcp/protocol.c:2907 mptcp_check_send_data_fin+0x225/0x410 net/mptcp/protocol.c:2976 __mptcp_close+0x238/0x ad0 net/mptcp/protocolo .c:3072 mptcp_close+0x2a/0x1a0 net/mptcp/protocol.c:3127 inet_release+0x190/0x1f0 net/ipv4/af_inet.c:437 __sock_release net/socket.c:659 [en l\u00ednea] sock_close+0xc0/0x240 net/ socket.c:1421 __fput+0x41b/0x890 fs/file_table.c:422 task_work_run+0x23b/0x300 kernel/task_work.c:180 exit_task_work include/linux/task_work.h:38 [en l\u00ednea] do_exit+0x9c8/0x2540 kernel/exit .c:878 do_group_exit+0x201/0x2b0 kernel/exit.c:1027 __do_sys_exit_group kernel/exit.c:1038 [en l\u00ednea] __se_sys_exit_group kernel/exit.c:1036 [en l\u00ednea] __x64_sys_exit_group+0x3f/0x40 kernel/exit.c:10 36 do_syscall_x64 arch/x86/entry/common.c:52 [inline] do_syscall_64+0xe4/0x240 arch/x86/entry/common.c:83 Entry_SYSCALL_64_after_hwframe+0x67/0x6f RIP: 0033:0x7f6c2b5005b6 C\u00f3digo: no se puede acceder a los bytes del c\u00f3digo de operaci\u00f3n en 0x7f6c2b50058c . RSP: 002b:00007ffe883eb948 EFLAGS: 00000246 ORIG_RAX: 00000000000000e7 RAX: ffffffffffffffda RBX: 00007f6c2b5862f0 RCX: 00007f6c2b5005b6 RDX: 0000000001 RSI: 000000000000003c RDI: 0000000000000001 RBP: 0000000000000001 R08: 00000000000000e7 R09: ffffffffffffffc0 R10: 06 R11: 0000000000000246 R12: 00007f6c2b5862f0 R13: 0000000000000001 R14: 0000000000000000 R15: 0000000000000001 " } ], "metrics": {}, @@ -43,6 +47,10 @@ { "url": "https://git.kernel.org/stable/c/e9b2f60636d18dfd0dd4965b3316f88dfd6a2b31", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-375xx/CVE-2024-37571.json b/CVE-2024/CVE-2024-375xx/CVE-2024-37571.json index 154bd8374fc..d43ff15e4ec 100644 --- a/CVE-2024/CVE-2024-375xx/CVE-2024-37571.json +++ b/CVE-2024/CVE-2024-375xx/CVE-2024-37571.json @@ -2,12 +2,16 @@ "id": "CVE-2024-37571", "sourceIdentifier": "cve@mitre.org", "published": "2024-06-26T22:15:10.450", - "lastModified": "2024-06-26T22:15:10.450", - "vulnStatus": "Received", + "lastModified": "2024-06-27T12:47:19.847", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", "value": "Buffer Overflow vulnerability in SAS Broker 9.2 build 1495 allows attackers to cause denial of service or obtain sensitive information via crafted payload to the '_debug' parameter." + }, + { + "lang": "es", + "value": "Una vulnerabilidad de desbordamiento del b\u00fafer en SAS Broker 9.2 build 1495 permite a los atacantes provocar denegaci\u00f3n de servicio u obtener informaci\u00f3n confidencial a trav\u00e9s de un payload manipulado en el par\u00e1metro '_debug'." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-377xx/CVE-2024-37734.json b/CVE-2024/CVE-2024-377xx/CVE-2024-37734.json index 144f8df7936..f1039612e30 100644 --- a/CVE-2024/CVE-2024-377xx/CVE-2024-37734.json +++ b/CVE-2024/CVE-2024-377xx/CVE-2024-37734.json @@ -2,12 +2,16 @@ "id": "CVE-2024-37734", "sourceIdentifier": "cve@mitre.org", "published": "2024-06-26T22:15:10.533", - "lastModified": "2024-06-26T22:15:10.533", - "vulnStatus": "Received", + "lastModified": "2024-06-27T12:47:19.847", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", "value": "An issue in OpenEMR 7.0.2 allows a remote attacker to escalate privileges viaa crafted POST request using the noteid parameter." + }, + { + "lang": "es", + "value": " Un problema en OpenEMR 7.0.2 permite a un atacante remoto escalar privilegios mediante una solicitud POST manipulada utilizando el par\u00e1metro noteid." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-382xx/CVE-2024-38271.json b/CVE-2024/CVE-2024-382xx/CVE-2024-38271.json index 95f33b8acbc..303b6f4e700 100644 --- a/CVE-2024/CVE-2024-382xx/CVE-2024-38271.json +++ b/CVE-2024/CVE-2024-382xx/CVE-2024-38271.json @@ -2,12 +2,16 @@ "id": "CVE-2024-38271", "sourceIdentifier": "cve-coordination@google.com", "published": "2024-06-26T16:15:11.560", - "lastModified": "2024-06-26T16:15:11.560", - "vulnStatus": "Received", + "lastModified": "2024-06-27T12:47:19.847", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", "value": "There exists a vulnerability in Quickshare/Nearby where an attacker can force the a victim to stay connected to a temporary hotspot created for the share. As part of the sequence of packets in a QuickShare connection over Bluetooth, the attacker forces the victim to connect to the attacker\u2019s WiFi network and then sends an OfflineFrame that crashes Quick Share.\nThis makes the Wifi connection to the attacker\u2019s network last instead of returning to the old network when the Quick Share session is done allowing the attacker to be a MiTM. We recommend upgrading to version\u00a01.0.1724.0 of Quickshare or above" + }, + { + "lang": "es", + "value": "Existe una vulnerabilidad en Quickshare/Nearby donde un atacante puede obligar a la v\u00edctima a permanecer conectada a un punto de acceso temporal creado para el recurso compartido. Como parte de la secuencia de paquetes en una conexi\u00f3n QuickShare a trav\u00e9s de Bluetooth, el atacante obliga a la v\u00edctima a conectarse a la red WiFi del atacante y luego env\u00eda un OfflineFrame que bloquea Quick Share. Esto hace que la conexi\u00f3n Wifi a la red del atacante dure en lugar de regresar a la red anterior cuando finaliza la sesi\u00f3n de Quick Share, lo que permite que el atacante sea un MiTM. Recomendamos actualizar a la versi\u00f3n 1.0.1724.0 de Quickshare o superior" } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-382xx/CVE-2024-38272.json b/CVE-2024/CVE-2024-382xx/CVE-2024-38272.json index 63080f4f8f8..64d01a1f112 100644 --- a/CVE-2024/CVE-2024-382xx/CVE-2024-38272.json +++ b/CVE-2024/CVE-2024-382xx/CVE-2024-38272.json @@ -2,12 +2,16 @@ "id": "CVE-2024-38272", "sourceIdentifier": "cve-coordination@google.com", "published": "2024-06-26T16:15:11.733", - "lastModified": "2024-06-26T16:15:11.733", - "vulnStatus": "Received", + "lastModified": "2024-06-27T12:47:19.847", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", "value": "There exists a vulnerability in Quickshare/Nearby where an attacker can bypass the accept file dialog on QuickShare Windows.\u00a0Normally in QuickShare Windows app we can't send a file without the user accept from the receiving device if the visibility is set to everyone mode or contacts mode.\u00a0We recommend upgrading to version 1.0.1724.0 of Quickshare or above" + }, + { + "lang": "es", + "value": " Existe una vulnerabilidad en Quickshare/Nearby donde un atacante puede omitir el cuadro de di\u00e1logo de aceptaci\u00f3n de archivos en QuickShare Windows. Normalmente, en la aplicaci\u00f3n QuickShare para Windows no podemos enviar un archivo sin que el usuario lo acepte desde el dispositivo receptor si la visibilidad est\u00e1 configurada en el modo todos o el modo contactos. Recomendamos actualizar a la versi\u00f3n 1.0.1724.0 de Quickshare o superior" } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-383xx/CVE-2024-38375.json b/CVE-2024/CVE-2024-383xx/CVE-2024-38375.json index 083ffcf67f7..afad20e8e96 100644 --- a/CVE-2024/CVE-2024-383xx/CVE-2024-38375.json +++ b/CVE-2024/CVE-2024-383xx/CVE-2024-38375.json @@ -2,12 +2,16 @@ "id": "CVE-2024-38375", "sourceIdentifier": "security-advisories@github.com", "published": "2024-06-26T19:15:13.677", - "lastModified": "2024-06-26T19:15:13.677", - "vulnStatus": "Received", + "lastModified": "2024-06-27T12:47:19.847", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", "value": "@fastly/js-compute is a JavaScript SDK and runtime for building Fastly Compute applications. The implementation of several functions were determined to include a use-after-free bug. This bug could allow for unintended data loss if the result of the preceding functions were sent anywhere else, and often results in a guest trap causing services to return a 500. This bug has been fixed in version 3.16.0 of the `@fastly/js-compute` package." + }, + { + "lang": "es", + "value": "@fastly/js-compute es un SDK de JavaScript y un tiempo de ejecuci\u00f3n para crear aplicaciones Fastly Compute. Se determin\u00f3 que la implementaci\u00f3n de varias funciones inclu\u00eda un error de use after free. Este error podr\u00eda permitir la p\u00e9rdida de datos no intencionada si el resultado de las funciones anteriores se enviara a cualquier otro lugar y, a menudo, resulta en una trampa de invitados que hace que los servicios devuelvan un 500. Este error se solucion\u00f3 en la versi\u00f3n 3.16.0 de `@fastly/ Paquete js-compute`.F2937" } ], "metrics": { diff --git a/CVE-2024/CVE-2024-383xx/CVE-2024-38381.json b/CVE-2024/CVE-2024-383xx/CVE-2024-38381.json index f04a948e7c3..1f046cc254d 100644 --- a/CVE-2024/CVE-2024-383xx/CVE-2024-38381.json +++ b/CVE-2024/CVE-2024-383xx/CVE-2024-38381.json @@ -2,12 +2,16 @@ "id": "CVE-2024-38381", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-06-21T11:15:10.757", - "lastModified": "2024-06-21T11:22:01.687", + "lastModified": "2024-06-27T13:16:00.650", "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nnfc: nci: Fix uninit-value in nci_rx_work\n\nsyzbot reported the following uninit-value access issue [1]\n\nnci_rx_work() parses received packet from ndev->rx_q. It should be\nvalidated header size, payload size and total packet size before\nprocessing the packet. If an invalid packet is detected, it should be\nsilently discarded." + }, + { + "lang": "es", + "value": "En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: nfc: nci: corrigi\u00f3 el valor uninit en nci_rx_work syzbot inform\u00f3 el siguiente problema de acceso al valor uninit [1] nci_rx_work() analiza el paquete recibido de ndev->rx_q. Se debe validar el tama\u00f1o del encabezado, el tama\u00f1o del payload y el tama\u00f1o total del paquete antes de procesar el paquete. Si se detecta un paquete no v\u00e1lido, se debe descartar silenciosamente." } ], "metrics": {}, @@ -43,6 +47,10 @@ { "url": "https://git.kernel.org/stable/c/f80b786ab0550d0020191a59077b2c7e069db2d1", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-385xx/CVE-2024-38515.json b/CVE-2024/CVE-2024-385xx/CVE-2024-38515.json new file mode 100644 index 00000000000..2b18c014af3 --- /dev/null +++ b/CVE-2024/CVE-2024-385xx/CVE-2024-38515.json @@ -0,0 +1,15 @@ +{ + "id": "CVE-2024-38515", + "sourceIdentifier": "security-advisories@github.com", + "published": "2024-06-27T13:16:00.717", + "lastModified": "2024-06-27T13:16:00.717", + "vulnStatus": "Rejected", + "descriptions": [ + { + "lang": "en", + "value": "Rejected reason: This CVE is a duplicate of CVE-2024-38374." + } + ], + "metrics": {}, + "references": [] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-385xx/CVE-2024-38520.json b/CVE-2024/CVE-2024-385xx/CVE-2024-38520.json index 0b43c1c1737..7a7b03e8e05 100644 --- a/CVE-2024/CVE-2024-385xx/CVE-2024-38520.json +++ b/CVE-2024/CVE-2024-385xx/CVE-2024-38520.json @@ -2,12 +2,16 @@ "id": "CVE-2024-38520", "sourceIdentifier": "security-advisories@github.com", "published": "2024-06-26T19:15:13.890", - "lastModified": "2024-06-26T19:15:13.890", - "vulnStatus": "Received", + "lastModified": "2024-06-27T12:47:19.847", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", "value": "SoftEtherVPN is a an open-source cross-platform multi-protocol VPN Program. When SoftEtherVPN is deployed with L2TP enabled on a device, it introduces the possibility of the host being used for amplification/reflection traffic generation because it will respond to every packet with two response packets that are larger than the request packet size. These sorts of techniques are used by external actors who generate spoofed source IPs to target a destination on the internet. This vulnerability has been patched in version 5.02.5185.\n" + }, + { + "lang": "es", + "value": " SoftEtherVPN es un programa VPN multiprotocolo, multiplataforma y de c\u00f3digo abierto. Cuando SoftEtherVPN se implementa con L2TP habilitado en un dispositivo, presenta la posibilidad de que el host se utilice para la generaci\u00f3n de tr\u00e1fico de amplificaci\u00f3n/reflexi\u00f3n porque responder\u00e1 a cada paquete con dos paquetes de respuesta que son m\u00e1s grandes que el tama\u00f1o del paquete de solicitud. Este tipo de t\u00e9cnicas son utilizadas por actores externos que generan IP de origen falsificadas para apuntar a un destino en Internet. Esta vulnerabilidad ha sido parcheada en la versi\u00f3n 5.02.5185." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-385xx/CVE-2024-38527.json b/CVE-2024/CVE-2024-385xx/CVE-2024-38527.json index dd20a5a429d..c1ceb40c81e 100644 --- a/CVE-2024/CVE-2024-385xx/CVE-2024-38527.json +++ b/CVE-2024/CVE-2024-385xx/CVE-2024-38527.json @@ -2,12 +2,16 @@ "id": "CVE-2024-38527", "sourceIdentifier": "security-advisories@github.com", "published": "2024-06-26T20:15:16.020", - "lastModified": "2024-06-26T20:15:16.020", - "vulnStatus": "Received", + "lastModified": "2024-06-27T12:47:19.847", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", "value": "ZenUML is JavaScript-based diagramming tool that requires no server, using Markdown-inspired text definitions and a renderer to create and modify sequence diagrams. Markdown-based comments in the ZenUML diagram syntax are susceptible to Cross-site Scripting (XSS). The comment feature allows the user to attach small notes for reference. This feature allows the user to enter in their comment in markdown comment, allowing them to use common markdown features, such as `**` for bolded text. However, the markdown text is currently not sanitized before rendering, allowing an attacker to enter a malicious payload for the comment which leads to XSS. This puts existing applications that use ZenUML unsandboxed at risk of arbitrary JavaScript execution when rendering user-controlled diagrams. This vulnerability was patched in version 3.23.25," + }, + { + "lang": "es", + "value": "ZenUML es una herramienta de diagramaci\u00f3n basada en JavaScript que no requiere servidor y utiliza definiciones de texto inspiradas en Markdown y un renderizador para crear y modificar diagramas de secuencia. Los comentarios basados en Markdown en la sintaxis del diagrama ZenUML son susceptibles a Cross-site Scripting (XSS). La funci\u00f3n de comentarios permite al usuario adjuntar peque\u00f1as notas como referencia. Esta funci\u00f3n permite al usuario ingresar su comentario en un comentario de markdown, lo que le permite utilizar funciones de markdown comunes, como `**` para texto en negrita. Sin embargo, el texto de markdown actualmente no se sanitiza antes de renderizarlo, lo que permite a un atacante ingresar un payload malicioso para el comentario que conduce a XSS. Esto pone a las aplicaciones existentes que usan ZenUML sin sandbox en riesgo de ejecuci\u00f3n arbitraria de JavaScript al representar diagramas controlados por el usuario. Esta vulnerabilidad fue parcheada en la versi\u00f3n 3.23.25," } ], "metrics": { diff --git a/CVE-2024/CVE-2024-385xx/CVE-2024-38549.json b/CVE-2024/CVE-2024-385xx/CVE-2024-38549.json index 2cbe7ee3843..6e2f8df57dc 100644 --- a/CVE-2024/CVE-2024-385xx/CVE-2024-38549.json +++ b/CVE-2024/CVE-2024-385xx/CVE-2024-38549.json @@ -2,7 +2,7 @@ "id": "CVE-2024-38549", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-06-19T14:15:15.163", - "lastModified": "2024-06-20T12:44:01.637", + "lastModified": "2024-06-27T13:16:00.840", "vulnStatus": "Awaiting Analysis", "descriptions": [ { @@ -51,6 +51,10 @@ { "url": "https://git.kernel.org/stable/c/fb4aabdb1b48c25d9e1ee28f89440fd2ce556405", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-385xx/CVE-2024-38552.json b/CVE-2024/CVE-2024-385xx/CVE-2024-38552.json index 4165c8ff9a1..92bcd14320c 100644 --- a/CVE-2024/CVE-2024-385xx/CVE-2024-38552.json +++ b/CVE-2024/CVE-2024-385xx/CVE-2024-38552.json @@ -2,7 +2,7 @@ "id": "CVE-2024-38552", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-06-19T14:15:15.450", - "lastModified": "2024-06-20T12:44:01.637", + "lastModified": "2024-06-27T13:16:00.903", "vulnStatus": "Awaiting Analysis", "descriptions": [ { @@ -51,6 +51,10 @@ { "url": "https://git.kernel.org/stable/c/e280ab978c81443103d7c61bdd1d8d708cf6ed6d", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-385xx/CVE-2024-38558.json b/CVE-2024/CVE-2024-385xx/CVE-2024-38558.json index a3ca8980869..381b9127213 100644 --- a/CVE-2024/CVE-2024-385xx/CVE-2024-38558.json +++ b/CVE-2024/CVE-2024-385xx/CVE-2024-38558.json @@ -2,7 +2,7 @@ "id": "CVE-2024-38558", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-06-19T14:15:15.983", - "lastModified": "2024-06-20T12:44:01.637", + "lastModified": "2024-06-27T12:15:28.720", "vulnStatus": "Awaiting Analysis", "descriptions": [ { @@ -51,6 +51,10 @@ { "url": "https://git.kernel.org/stable/c/d73fb8bddf89503c9fae7c42e50d44c89909aad6", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-385xx/CVE-2024-38559.json b/CVE-2024/CVE-2024-385xx/CVE-2024-38559.json index b8026f715ba..6f968f17234 100644 --- a/CVE-2024/CVE-2024-385xx/CVE-2024-38559.json +++ b/CVE-2024/CVE-2024-385xx/CVE-2024-38559.json @@ -2,7 +2,7 @@ "id": "CVE-2024-38559", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-06-19T14:15:16.077", - "lastModified": "2024-06-20T12:44:01.637", + "lastModified": "2024-06-27T13:16:00.980", "vulnStatus": "Awaiting Analysis", "descriptions": [ { @@ -51,6 +51,10 @@ { "url": "https://git.kernel.org/stable/c/dccd97b39ab2f2b1b9a47a1394647a4d65815255", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-385xx/CVE-2024-38560.json b/CVE-2024/CVE-2024-385xx/CVE-2024-38560.json index a50a5cb7bf6..072b3cda751 100644 --- a/CVE-2024/CVE-2024-385xx/CVE-2024-38560.json +++ b/CVE-2024/CVE-2024-385xx/CVE-2024-38560.json @@ -2,7 +2,7 @@ "id": "CVE-2024-38560", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-06-19T14:15:16.187", - "lastModified": "2024-06-20T12:44:01.637", + "lastModified": "2024-06-27T13:16:01.047", "vulnStatus": "Awaiting Analysis", "descriptions": [ { @@ -51,6 +51,10 @@ { "url": "https://git.kernel.org/stable/c/ecb76200f5557a2886888aaa53702da1ab9e6cdf", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-385xx/CVE-2024-38565.json b/CVE-2024/CVE-2024-385xx/CVE-2024-38565.json index f712cfaafd6..c5e05b85433 100644 --- a/CVE-2024/CVE-2024-385xx/CVE-2024-38565.json +++ b/CVE-2024/CVE-2024-385xx/CVE-2024-38565.json @@ -2,7 +2,7 @@ "id": "CVE-2024-38565", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-06-19T14:15:16.667", - "lastModified": "2024-06-20T12:44:01.637", + "lastModified": "2024-06-27T13:16:01.110", "vulnStatus": "Awaiting Analysis", "descriptions": [ { @@ -51,6 +51,10 @@ { "url": "https://git.kernel.org/stable/c/ee25389df80138907bc9dcdf4a2be2067cde9a81", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-385xx/CVE-2024-38567.json b/CVE-2024/CVE-2024-385xx/CVE-2024-38567.json index b03df25560f..b1cf14bfc8e 100644 --- a/CVE-2024/CVE-2024-385xx/CVE-2024-38567.json +++ b/CVE-2024/CVE-2024-385xx/CVE-2024-38567.json @@ -2,7 +2,7 @@ "id": "CVE-2024-38567", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-06-19T14:15:16.850", - "lastModified": "2024-06-20T12:44:01.637", + "lastModified": "2024-06-27T12:15:28.800", "vulnStatus": "Awaiting Analysis", "descriptions": [ { @@ -51,6 +51,10 @@ { "url": "https://git.kernel.org/stable/c/eb0f2fc3ff5806cc572cd9055ce7c52a01e97645", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-385xx/CVE-2024-38578.json b/CVE-2024/CVE-2024-385xx/CVE-2024-38578.json index 733c5f28d8c..30059dcf406 100644 --- a/CVE-2024/CVE-2024-385xx/CVE-2024-38578.json +++ b/CVE-2024/CVE-2024-385xx/CVE-2024-38578.json @@ -2,7 +2,7 @@ "id": "CVE-2024-38578", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-06-19T14:15:17.870", - "lastModified": "2024-06-20T12:44:01.637", + "lastModified": "2024-06-27T12:15:28.887", "vulnStatus": "Awaiting Analysis", "descriptions": [ { @@ -51,6 +51,10 @@ { "url": "https://git.kernel.org/stable/c/f6008487f1eeb8693f8d2a36a89c87d9122ddf74", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-385xx/CVE-2024-38579.json b/CVE-2024/CVE-2024-385xx/CVE-2024-38579.json index 3ce7c3b27fa..038f1a12e35 100644 --- a/CVE-2024/CVE-2024-385xx/CVE-2024-38579.json +++ b/CVE-2024/CVE-2024-385xx/CVE-2024-38579.json @@ -2,7 +2,7 @@ "id": "CVE-2024-38579", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-06-19T14:15:17.960", - "lastModified": "2024-06-20T12:44:01.637", + "lastModified": "2024-06-27T12:15:28.957", "vulnStatus": "Awaiting Analysis", "descriptions": [ { @@ -51,6 +51,10 @@ { "url": "https://git.kernel.org/stable/c/ebed0d666fa709bae9e8cafa8ec6e7ebd1d318c6", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-385xx/CVE-2024-38582.json b/CVE-2024/CVE-2024-385xx/CVE-2024-38582.json index 9644defe790..76e84b7ddc7 100644 --- a/CVE-2024/CVE-2024-385xx/CVE-2024-38582.json +++ b/CVE-2024/CVE-2024-385xx/CVE-2024-38582.json @@ -2,7 +2,7 @@ "id": "CVE-2024-38582", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-06-19T14:15:18.273", - "lastModified": "2024-06-20T12:44:01.637", + "lastModified": "2024-06-27T13:16:01.187", "vulnStatus": "Awaiting Analysis", "descriptions": [ { @@ -51,6 +51,10 @@ { "url": "https://git.kernel.org/stable/c/eff7cdf890b02596b8d73e910bdbdd489175dbdb", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-385xx/CVE-2024-38583.json b/CVE-2024/CVE-2024-385xx/CVE-2024-38583.json index b9a15ebdbfd..00c4b065c59 100644 --- a/CVE-2024/CVE-2024-385xx/CVE-2024-38583.json +++ b/CVE-2024/CVE-2024-385xx/CVE-2024-38583.json @@ -2,7 +2,7 @@ "id": "CVE-2024-38583", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-06-19T14:15:18.397", - "lastModified": "2024-06-20T12:44:01.637", + "lastModified": "2024-06-27T13:16:01.260", "vulnStatus": "Awaiting Analysis", "descriptions": [ { @@ -51,6 +51,10 @@ { "url": "https://git.kernel.org/stable/c/f9186bba4ea282b07293c1c892441df3a5441cb0", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-385xx/CVE-2024-38587.json b/CVE-2024/CVE-2024-385xx/CVE-2024-38587.json index 6a115aaa93c..5d8ce54fab5 100644 --- a/CVE-2024/CVE-2024-385xx/CVE-2024-38587.json +++ b/CVE-2024/CVE-2024-385xx/CVE-2024-38587.json @@ -2,7 +2,7 @@ "id": "CVE-2024-38587", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-06-19T14:15:18.800", - "lastModified": "2024-06-20T12:44:01.637", + "lastModified": "2024-06-27T13:16:01.323", "vulnStatus": "Awaiting Analysis", "descriptions": [ { @@ -51,6 +51,10 @@ { "url": "https://git.kernel.org/stable/c/eb1ea64328d4cc7d7a912c563f8523d5259716ef", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-385xx/CVE-2024-38589.json b/CVE-2024/CVE-2024-385xx/CVE-2024-38589.json index f0a1334558f..3463e8b5214 100644 --- a/CVE-2024/CVE-2024-385xx/CVE-2024-38589.json +++ b/CVE-2024/CVE-2024-385xx/CVE-2024-38589.json @@ -2,7 +2,7 @@ "id": "CVE-2024-38589", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-06-19T14:15:19.000", - "lastModified": "2024-06-20T12:44:01.637", + "lastModified": "2024-06-27T12:15:29.020", "vulnStatus": "Awaiting Analysis", "descriptions": [ { @@ -51,6 +51,10 @@ { "url": "https://git.kernel.org/stable/c/f28bdc2ee5d9300cc77bd3d97b5b3cdd14960fd8", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-385xx/CVE-2024-38596.json b/CVE-2024/CVE-2024-385xx/CVE-2024-38596.json index b6112e64998..451bc8b58b9 100644 --- a/CVE-2024/CVE-2024-385xx/CVE-2024-38596.json +++ b/CVE-2024/CVE-2024-385xx/CVE-2024-38596.json @@ -2,7 +2,7 @@ "id": "CVE-2024-38596", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-06-19T14:15:19.640", - "lastModified": "2024-06-20T12:43:25.663", + "lastModified": "2024-06-27T12:15:29.087", "vulnStatus": "Awaiting Analysis", "descriptions": [ { @@ -51,6 +51,10 @@ { "url": "https://git.kernel.org/stable/c/fca6072e1a7b1e709ada5604b951513b89b4bd0a", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-385xx/CVE-2024-38598.json b/CVE-2024/CVE-2024-385xx/CVE-2024-38598.json index 3d0365a27be..97a17fc8b9d 100644 --- a/CVE-2024/CVE-2024-385xx/CVE-2024-38598.json +++ b/CVE-2024/CVE-2024-385xx/CVE-2024-38598.json @@ -2,7 +2,7 @@ "id": "CVE-2024-38598", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-06-19T14:15:19.813", - "lastModified": "2024-06-20T12:43:25.663", + "lastModified": "2024-06-27T12:15:29.153", "vulnStatus": "Awaiting Analysis", "descriptions": [ { @@ -51,6 +51,10 @@ { "url": "https://git.kernel.org/stable/c/f0e729af2eb6bee9eb58c4df1087f14ebaefe26b", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-385xx/CVE-2024-38599.json b/CVE-2024/CVE-2024-385xx/CVE-2024-38599.json index 5d9b51c7af6..46401b0498a 100644 --- a/CVE-2024/CVE-2024-385xx/CVE-2024-38599.json +++ b/CVE-2024/CVE-2024-385xx/CVE-2024-38599.json @@ -2,7 +2,7 @@ "id": "CVE-2024-38599", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-06-19T14:15:19.903", - "lastModified": "2024-06-20T12:43:25.663", + "lastModified": "2024-06-27T13:16:01.390", "vulnStatus": "Awaiting Analysis", "descriptions": [ { @@ -51,6 +51,10 @@ { "url": "https://git.kernel.org/stable/c/f0eea095ce8c959b86e1e57fe36ca4fea5ae54f8", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-386xx/CVE-2024-38601.json b/CVE-2024/CVE-2024-386xx/CVE-2024-38601.json index 307334920a0..e2da0ee6047 100644 --- a/CVE-2024/CVE-2024-386xx/CVE-2024-38601.json +++ b/CVE-2024/CVE-2024-386xx/CVE-2024-38601.json @@ -2,7 +2,7 @@ "id": "CVE-2024-38601", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-06-19T14:15:20.087", - "lastModified": "2024-06-20T12:43:25.663", + "lastModified": "2024-06-27T13:16:01.453", "vulnStatus": "Awaiting Analysis", "descriptions": [ { @@ -51,6 +51,10 @@ { "url": "https://git.kernel.org/stable/c/c68b7a442ee61d04ca58b2b5cb5ea7cb8230f84a", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-386xx/CVE-2024-38612.json b/CVE-2024/CVE-2024-386xx/CVE-2024-38612.json index 8210ac748ab..bf77be28870 100644 --- a/CVE-2024/CVE-2024-386xx/CVE-2024-38612.json +++ b/CVE-2024/CVE-2024-386xx/CVE-2024-38612.json @@ -2,7 +2,7 @@ "id": "CVE-2024-38612", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-06-19T14:15:21.060", - "lastModified": "2024-06-20T12:43:25.663", + "lastModified": "2024-06-27T13:16:01.530", "vulnStatus": "Awaiting Analysis", "descriptions": [ { @@ -51,6 +51,10 @@ { "url": "https://git.kernel.org/stable/c/e77a3ec7ada84543e75722a1283785a6544de925", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-386xx/CVE-2024-38618.json b/CVE-2024/CVE-2024-386xx/CVE-2024-38618.json index ca52d407620..ab2154a9fe0 100644 --- a/CVE-2024/CVE-2024-386xx/CVE-2024-38618.json +++ b/CVE-2024/CVE-2024-386xx/CVE-2024-38618.json @@ -2,7 +2,7 @@ "id": "CVE-2024-38618", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-06-19T14:15:21.567", - "lastModified": "2024-06-20T12:43:25.663", + "lastModified": "2024-06-27T12:15:29.227", "vulnStatus": "Awaiting Analysis", "descriptions": [ { @@ -47,6 +47,10 @@ { "url": "https://git.kernel.org/stable/c/ceab795a67dd28dd942d0d8bba648c6c0f7a044b", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-386xx/CVE-2024-38621.json b/CVE-2024/CVE-2024-386xx/CVE-2024-38621.json index 83a1cfa119b..731fdd8cda9 100644 --- a/CVE-2024/CVE-2024-386xx/CVE-2024-38621.json +++ b/CVE-2024/CVE-2024-386xx/CVE-2024-38621.json @@ -2,12 +2,16 @@ "id": "CVE-2024-38621", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-06-21T11:15:11.103", - "lastModified": "2024-06-21T11:22:01.687", + "lastModified": "2024-06-27T13:16:01.607", "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nmedia: stk1160: fix bounds checking in stk1160_copy_video()\n\nThe subtract in this condition is reversed. The ->length is the length\nof the buffer. The ->bytesused is how many bytes we have copied thus\nfar. When the condition is reversed that means the result of the\nsubtraction is always negative but since it's unsigned then the result\nis a very high positive value. That means the overflow check is never\ntrue.\n\nAdditionally, the ->bytesused doesn't actually work for this purpose\nbecause we're not writing to \"buf->mem + buf->bytesused\". Instead, the\nmath to calculate the destination where we are writing is a bit\ninvolved. You calculate the number of full lines already written,\nmultiply by two, skip a line if necessary so that we start on an odd\nnumbered line, and add the offset into the line.\n\nTo fix this buffer overflow, just take the actual destination where we\nare writing, if the offset is already out of bounds print an error and\nreturn. Otherwise, write up to buf->length bytes." + }, + { + "lang": "es", + "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: medios: stk1160: revisi\u00f3n de los l\u00edmites fijos en stk1160_copy_video() La resta en esta condici\u00f3n se invierte. La ->longitud es la longitud del b\u00fafer. El ->byteused es cu\u00e1ntos bytes hemos copiado hasta ahora. Cuando la condici\u00f3n se invierte, eso significa que el resultado de la resta siempre es negativo, pero como no tiene signo, el resultado es un valor positivo muy alto. Eso significa que la verificaci\u00f3n de desbordamiento nunca es cierta. Adem\u00e1s, ->bytesused en realidad no funciona para este prop\u00f3sito porque no estamos escribiendo en \"buf->mem + buf->bytesused\". En cambio, las matem\u00e1ticas para calcular el destino donde estamos escribiendo son un poco complicadas. Calcula el n\u00famero de l\u00edneas completas ya escritas, multiplica por dos, omite una l\u00ednea si es necesario para comenzar en una l\u00ednea impar y agrega el desplazamiento a la l\u00ednea. Para solucionar este desbordamiento del b\u00fafer, simplemente tome el destino real donde estamos escribiendo, si el desplazamiento ya est\u00e1 fuera de los l\u00edmites imprima un error y regrese. De lo contrario, escriba hasta buf->bytes de longitud." } ], "metrics": {}, @@ -43,6 +47,10 @@ { "url": "https://git.kernel.org/stable/c/faa4364bef2ec0060de381ff028d1d836600a381", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-386xx/CVE-2024-38627.json b/CVE-2024/CVE-2024-386xx/CVE-2024-38627.json index b08ae209133..ac7a43572b6 100644 --- a/CVE-2024/CVE-2024-386xx/CVE-2024-38627.json +++ b/CVE-2024/CVE-2024-386xx/CVE-2024-38627.json @@ -2,12 +2,16 @@ "id": "CVE-2024-38627", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-06-21T11:15:11.583", - "lastModified": "2024-06-21T11:22:01.687", + "lastModified": "2024-06-27T12:15:29.297", "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nstm class: Fix a double free in stm_register_device()\n\nThe put_device(&stm->dev) call will trigger stm_device_release() which\nfrees \"stm\" so the vfree(stm) on the next line is a double free." + }, + { + "lang": "es", + "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: clase stm: corrige un doble free en stm_register_device() La llamada put_device(&stm->dev) activar\u00e1 stm_device_release() que libera \"stm\" para que vfree(stm) en el La siguiente l\u00ednea es un doble libre." } ], "metrics": {}, @@ -43,6 +47,10 @@ { "url": "https://git.kernel.org/stable/c/d782a2db8f7ac49c33b9ca3e835500a28667d1be", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-386xx/CVE-2024-38633.json b/CVE-2024/CVE-2024-386xx/CVE-2024-38633.json index 3821e7dd570..3aab7d48055 100644 --- a/CVE-2024/CVE-2024-386xx/CVE-2024-38633.json +++ b/CVE-2024/CVE-2024-386xx/CVE-2024-38633.json @@ -2,12 +2,16 @@ "id": "CVE-2024-38633", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-06-21T11:15:12.053", - "lastModified": "2024-06-21T11:22:01.687", + "lastModified": "2024-06-27T12:15:29.363", "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nserial: max3100: Update uart_driver_registered on driver removal\n\nThe removal of the last MAX3100 device triggers the removal of\nthe driver. However, code doesn't update the respective global\nvariable and after insmod \u2014 rmmod \u2014 insmod cycle the kernel\noopses:\n\n max3100 spi-PRP0001:01: max3100_probe: adding port 0\n BUG: kernel NULL pointer dereference, address: 0000000000000408\n ...\n RIP: 0010:serial_core_register_port+0xa0/0x840\n ...\n max3100_probe+0x1b6/0x280 [max3100]\n spi_probe+0x8d/0xb0\n\nUpdate the actual state so next time UART driver will be registered\nagain.\n\nHugo also noticed, that the error path in the probe also affected\nby having the variable set, and not cleared. Instead of clearing it\nmove the assignment after the successfull uart_register_driver() call." + }, + { + "lang": "es", + "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: serial: max3100: actualizaci\u00f3n uart_driver_registered al eliminar el controlador La eliminaci\u00f3n del \u00faltimo dispositivo MAX3100 desencadena la eliminaci\u00f3n del controlador. Sin embargo, el c\u00f3digo no actualiza la variable global respectiva y despu\u00e9s del ciclo insmod \u2014 rmmod \u2014 insmod, el kernel falla: max3100 spi-PRP0001:01: max3100_probe: agregando el puerto 0 ERROR: desreferencia del puntero NULL del kernel, direcci\u00f3n: 0000000000000408... RIP: 0010:serial_core_register_port+0xa0/0x840 ... max3100_probe+0x1b6/0x280 [max3100] spi_probe+0x8d/0xb0 Actualice el estado actual para que la pr\u00f3xima vez el controlador UART se registre nuevamente. Hugo tambi\u00e9n not\u00f3 que la ruta de error en la sonda tambi\u00e9n se ve\u00eda afectada por tener la variable configurada y no borrada. En lugar de borrarlo, mueva la asignaci\u00f3n despu\u00e9s de la llamada exitosa a uart_register_driver()." } ], "metrics": {}, @@ -43,6 +47,10 @@ { "url": "https://git.kernel.org/stable/c/fa84ca78b048dfb00df0ef446f5c35e0a98ca6a0", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-386xx/CVE-2024-38634.json b/CVE-2024/CVE-2024-386xx/CVE-2024-38634.json index f1a5a07518f..6b991d335fd 100644 --- a/CVE-2024/CVE-2024-386xx/CVE-2024-38634.json +++ b/CVE-2024/CVE-2024-386xx/CVE-2024-38634.json @@ -2,12 +2,16 @@ "id": "CVE-2024-38634", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-06-21T11:15:12.160", - "lastModified": "2024-06-21T11:22:01.687", + "lastModified": "2024-06-27T13:16:01.670", "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nserial: max3100: Lock port->lock when calling uart_handle_cts_change()\n\nuart_handle_cts_change() has to be called with port lock taken,\nSince we run it in a separate work, the lock may not be taken at\nthe time of running. Make sure that it's taken by explicitly doing\nthat. Without it we got a splat:\n\n WARNING: CPU: 0 PID: 10 at drivers/tty/serial/serial_core.c:3491 uart_handle_cts_change+0xa6/0xb0\n ...\n Workqueue: max3100-0 max3100_work [max3100]\n RIP: 0010:uart_handle_cts_change+0xa6/0xb0\n ...\n max3100_handlerx+0xc5/0x110 [max3100]\n max3100_work+0x12a/0x340 [max3100]" + }, + { + "lang": "es", + "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: serial: max3100: Bloquear puerto->bloquear al llamar a uart_handle_cts_change() uart_handle_cts_change() debe llamarse con el bloqueo de puerto tomado. Dado que lo ejecutamos en un trabajo separado, el bloqueo puede No se tomar\u00e1 en el momento de correr. Aseg\u00farese de que se tome haci\u00e9ndolo expl\u00edcitamente. Sin \u00e9l, tenemos un s\u00edmbolo: ADVERTENCIA: CPU: 0 PID: 10 en drivers/tty/serial/serial_core.c:3491 uart_handle_cts_change+0xa6/0xb0 ... Workqueue: max3100-0 max3100_work [max3100] RIP: 0010:uart_handle_cts_change+ 0xa6/0xb0 ... max3100_handlerx+0xc5/0x110 [max3100] max3100_work+0x12a/0x340 [max3100]" } ], "metrics": {}, @@ -43,6 +47,10 @@ { "url": "https://git.kernel.org/stable/c/ea9b35372b58ac2931bfc1d5bc25e839d1221e30", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-386xx/CVE-2024-38637.json b/CVE-2024/CVE-2024-386xx/CVE-2024-38637.json index 89737ddd834..ef515ea9269 100644 --- a/CVE-2024/CVE-2024-386xx/CVE-2024-38637.json +++ b/CVE-2024/CVE-2024-386xx/CVE-2024-38637.json @@ -2,12 +2,16 @@ "id": "CVE-2024-38637", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-06-21T11:15:12.400", - "lastModified": "2024-06-21T11:22:01.687", + "lastModified": "2024-06-27T13:16:01.743", "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\ngreybus: lights: check return of get_channel_from_mode\n\nIf channel for the given node is not found we return null from\nget_channel_from_mode. Make sure we validate the return pointer\nbefore using it in two of the missing places.\n\nThis was originally reported in [0]:\nFound by Linux Verification Center (linuxtesting.org) with SVACE.\n\n[0] https://lore.kernel.org/all/20240301190425.120605-1-m.lobanov@rosalinux.ru" + }, + { + "lang": "es", + "value": "En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: greybus: luces: verificar el retorno de get_channel_from_mode Si no se encuentra el canal para el nodo dado, devolvemos nulo de get_channel_from_mode. Aseg\u00farese de validar el puntero de retorno antes de usarlo en dos de los lugares que faltan. Esto se inform\u00f3 originalmente en [0]: Encontrado por el Centro de verificaci\u00f3n de Linux (linuxtesting.org) con SVACE. [0] https://lore.kernel.org/all/20240301190425.120605-1-m.lobanov@rosalinux.ru" } ], "metrics": {}, @@ -43,6 +47,10 @@ { "url": "https://git.kernel.org/stable/c/eac10cf3a97ffd4b4deb0a29f57c118225a42850", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-386xx/CVE-2024-38659.json b/CVE-2024/CVE-2024-386xx/CVE-2024-38659.json index da63392ad80..91c0b1d80af 100644 --- a/CVE-2024/CVE-2024-386xx/CVE-2024-38659.json +++ b/CVE-2024/CVE-2024-386xx/CVE-2024-38659.json @@ -2,12 +2,16 @@ "id": "CVE-2024-38659", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-06-21T11:15:12.480", - "lastModified": "2024-06-21T11:22:01.687", + "lastModified": "2024-06-27T13:16:01.810", "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nenic: Validate length of nl attributes in enic_set_vf_port\n\nenic_set_vf_port assumes that the nl attribute IFLA_PORT_PROFILE\nis of length PORT_PROFILE_MAX and that the nl attributes\nIFLA_PORT_INSTANCE_UUID, IFLA_PORT_HOST_UUID are of length PORT_UUID_MAX.\nThese attributes are validated (in the function do_setlink in rtnetlink.c)\nusing the nla_policy ifla_port_policy. The policy defines IFLA_PORT_PROFILE\nas NLA_STRING, IFLA_PORT_INSTANCE_UUID as NLA_BINARY and\nIFLA_PORT_HOST_UUID as NLA_STRING. That means that the length validation\nusing the policy is for the max size of the attributes and not on exact\nsize so the length of these attributes might be less than the sizes that\nenic_set_vf_port expects. This might cause an out of bands\nread access in the memcpys of the data of these\nattributes in enic_set_vf_port." + }, + { + "lang": "es", + "value": "En el kernel de Linux se ha resuelto la siguiente vulnerabilidad: enic: Validar la longitud de los atributos nl en enic_set_vf_port enic_set_vf_port supone que el atributo nl IFLA_PORT_PROFILE tiene una longitud PORT_PROFILE_MAX y que los atributos nl IFLA_PORT_INSTANCE_UUID, IFLA_PORT_HOST_UUID tienen una longitud PORT_UUID_MAX. Estos atributos se validan (en la funci\u00f3n do_setlink en rtnetlink.c) usando nla_policy ifla_port_policy. La pol\u00edtica define IFLA_PORT_PROFILE como NLA_STRING, IFLA_PORT_INSTANCE_UUID como NLA_BINARY e IFLA_PORT_HOST_UUID como NLA_STRING. Eso significa que la validaci\u00f3n de longitud que utiliza la pol\u00edtica es para el tama\u00f1o m\u00e1ximo de los atributos y no para el tama\u00f1o exacto, por lo que la longitud de estos atributos puede ser menor que los tama\u00f1os que espera enic_set_vf_port. Esto podr\u00eda causar un acceso de lectura fuera de banda en los memcpys de los datos de estos atributos en enic_set_vf_port." } ], "metrics": {}, @@ -43,6 +47,10 @@ { "url": "https://git.kernel.org/stable/c/f6638e955ca00c489894789492776842e102af9c", "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-387xx/CVE-2024-38780.json b/CVE-2024/CVE-2024-387xx/CVE-2024-38780.json index fb571bcc9d9..e075b8f9183 100644 --- a/CVE-2024/CVE-2024-387xx/CVE-2024-38780.json +++ b/CVE-2024/CVE-2024-387xx/CVE-2024-38780.json @@ -2,8 +2,8 @@ "id": "CVE-2024-38780", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-06-21T12:15:11.253", - "lastModified": "2024-06-24T19:17:28.313", - "vulnStatus": "Analyzed", + "lastModified": "2024-06-27T12:15:29.443", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -186,6 +186,10 @@ "Mailing List", "Patch" ] + }, + { + "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-389xx/CVE-2024-38949.json b/CVE-2024/CVE-2024-389xx/CVE-2024-38949.json index 3ef3b13246f..cf068934971 100644 --- a/CVE-2024/CVE-2024-389xx/CVE-2024-38949.json +++ b/CVE-2024/CVE-2024-389xx/CVE-2024-38949.json @@ -2,12 +2,16 @@ "id": "CVE-2024-38949", "sourceIdentifier": "cve@mitre.org", "published": "2024-06-26T20:15:16.263", - "lastModified": "2024-06-26T20:15:16.263", - "vulnStatus": "Received", + "lastModified": "2024-06-27T12:47:19.847", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", "value": "Heap Buffer Overflow vulnerability in Libde265 v1.0.15 allows attackers to crash the application via crafted payload to display444as420 function at sdl.cc" + }, + { + "lang": "es", + "value": " La vulnerabilidad de desbordamiento de b\u00fafer de mont\u00f3n en Libde265 v1.0.15 permite a los atacantes bloquear la aplicaci\u00f3n mediante un payload manipulado para mostrar la funci\u00f3n 444as420 en sdl.cc" } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-389xx/CVE-2024-38950.json b/CVE-2024/CVE-2024-389xx/CVE-2024-38950.json index 1273e3e42bc..1b33cbf571f 100644 --- a/CVE-2024/CVE-2024-389xx/CVE-2024-38950.json +++ b/CVE-2024/CVE-2024-389xx/CVE-2024-38950.json @@ -2,12 +2,16 @@ "id": "CVE-2024-38950", "sourceIdentifier": "cve@mitre.org", "published": "2024-06-26T20:15:16.367", - "lastModified": "2024-06-26T20:15:16.367", - "vulnStatus": "Received", + "lastModified": "2024-06-27T12:47:19.847", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", "value": "Heap Buffer Overflow vulnerability in Libde265 v1.0.15 allows attackers to crash the application via crafted payload to __interceptor_memcpy function." + }, + { + "lang": "es", + "value": " La vulnerabilidad de desbordamiento de b\u00fafer de almacenamiento din\u00e1mico en Libde265 v1.0.15 permite a los atacantes bloquear la aplicaci\u00f3n mediante un payload manipulado para la funci\u00f3n __interceptor_memcpy." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-392xx/CVE-2024-39241.json b/CVE-2024/CVE-2024-392xx/CVE-2024-39241.json index c690e159aef..1ac7eb414f2 100644 --- a/CVE-2024/CVE-2024-392xx/CVE-2024-39241.json +++ b/CVE-2024/CVE-2024-392xx/CVE-2024-39241.json @@ -2,12 +2,16 @@ "id": "CVE-2024-39241", "sourceIdentifier": "cve@mitre.org", "published": "2024-06-26T20:15:16.447", - "lastModified": "2024-06-26T20:15:16.447", - "vulnStatus": "Received", + "lastModified": "2024-06-27T12:47:19.847", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", "value": "Cross Site Scripting (XSS) vulnerability in skycaiji 2.8 allows attackers to run arbitrary code via /admin/tool/preview." + }, + { + "lang": "es", + "value": "Una vulnerabilidad de Cross Site Scripting (XSS) en skycaiji 2.8 permite a los atacantes ejecutar c\u00f3digo arbitrario a trav\u00e9s de /admin/tool/preview." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-392xx/CVE-2024-39242.json b/CVE-2024/CVE-2024-392xx/CVE-2024-39242.json index 5f46d10a649..56653dd06df 100644 --- a/CVE-2024/CVE-2024-392xx/CVE-2024-39242.json +++ b/CVE-2024/CVE-2024-392xx/CVE-2024-39242.json @@ -2,12 +2,16 @@ "id": "CVE-2024-39242", "sourceIdentifier": "cve@mitre.org", "published": "2024-06-26T20:15:16.527", - "lastModified": "2024-06-26T20:15:16.527", - "vulnStatus": "Received", + "lastModified": "2024-06-27T12:47:19.847", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", "value": "A cross-site scripting (XSS) vulnerability in skycaiji v2.8 allows attackers to execute arbitrary web scripts or HTML via a crafted payload using eval(String.fromCharCode())." + }, + { + "lang": "es", + "value": " Una vulnerabilidad de Cross Site Scripting (XSS) en skycaiji v2.8 permite a los atacantes ejecutar scripts web o HTML de su elecci\u00f3n a trav\u00e9s de un payload manipulado utilizando eval(String.fromCharCode())." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-392xx/CVE-2024-39243.json b/CVE-2024/CVE-2024-392xx/CVE-2024-39243.json index a6c7c86f373..3aada3e1e7b 100644 --- a/CVE-2024/CVE-2024-392xx/CVE-2024-39243.json +++ b/CVE-2024/CVE-2024-392xx/CVE-2024-39243.json @@ -2,12 +2,16 @@ "id": "CVE-2024-39243", "sourceIdentifier": "cve@mitre.org", "published": "2024-06-26T20:15:16.610", - "lastModified": "2024-06-26T20:15:16.610", - "vulnStatus": "Received", + "lastModified": "2024-06-27T12:47:19.847", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", "value": "An issue discovered in skycaiji 2.8 allows attackers to run arbitrary code via crafted POST request to /index.php?s=/admin/develop/editor_save." + }, + { + "lang": "es", + "value": " Un problema descubierto en skycaiji 2.8 permite a los atacantes ejecutar c\u00f3digo arbitrario a trav\u00e9s de una solicitud POST manipulada para /index.php?s=/admin/develop/editor_save." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-392xx/CVE-2024-39292.json b/CVE-2024/CVE-2024-392xx/CVE-2024-39292.json index 888bb4d4c7f..9b5d13fc88a 100644 --- a/CVE-2024/CVE-2024-392xx/CVE-2024-39292.json +++ b/CVE-2024/CVE-2024-392xx/CVE-2024-39292.json @@ -2,8 +2,8 @@ "id": "CVE-2024-39292", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-06-24T14:15:12.943", - "lastModified": "2024-06-26T14:05:24.507", - "vulnStatus": "Analyzed", + "lastModified": "2024-06-27T12:15:29.553", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -186,6 +186,10 @@ "Mailing List", "Patch" ] + }, + { + "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-394xx/CVE-2024-39458.json b/CVE-2024/CVE-2024-394xx/CVE-2024-39458.json index ab58e773481..3a41fc54973 100644 --- a/CVE-2024/CVE-2024-394xx/CVE-2024-39458.json +++ b/CVE-2024/CVE-2024-394xx/CVE-2024-39458.json @@ -2,12 +2,16 @@ "id": "CVE-2024-39458", "sourceIdentifier": "jenkinsci-cert@googlegroups.com", "published": "2024-06-26T17:15:27.020", - "lastModified": "2024-06-26T18:15:15.410", - "vulnStatus": "Received", + "lastModified": "2024-06-27T12:47:19.847", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", "value": "When Jenkins Structs Plugin 337.v1b_04ea_4df7c8 and earlier fails to configure a build step, it logs a warning message containing diagnostic information that may contain secrets passed as step parameters, potentially resulting in accidental exposure of secrets through the default system log." + }, + { + "lang": "es", + "value": " Cuando el complemento Jenkins Structs 337.v1b_04ea_4df7c8 y versiones anteriores no logra configurar un paso de compilaci\u00f3n, registra un mensaje de advertencia que contiene informaci\u00f3n de diagn\u00f3stico que puede contener secretos pasados como par\u00e1metros de paso, lo que podr\u00eda provocar la exposici\u00f3n accidental de secretos a trav\u00e9s del registro predeterminado del sistema." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-394xx/CVE-2024-39459.json b/CVE-2024/CVE-2024-394xx/CVE-2024-39459.json index d71f9b7c5d3..b430e025981 100644 --- a/CVE-2024/CVE-2024-394xx/CVE-2024-39459.json +++ b/CVE-2024/CVE-2024-394xx/CVE-2024-39459.json @@ -2,12 +2,16 @@ "id": "CVE-2024-39459", "sourceIdentifier": "jenkinsci-cert@googlegroups.com", "published": "2024-06-26T17:15:27.110", - "lastModified": "2024-06-26T18:15:15.457", - "vulnStatus": "Received", + "lastModified": "2024-06-27T12:47:19.847", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", "value": "In rare cases Jenkins Plain Credentials Plugin 182.v468b_97b_9dcb_8 and earlier stores secret file credentials unencrypted (only Base64 encoded) on the Jenkins controller file system, where they can be viewed by users with access to the Jenkins controller file system (global credentials) or with Item/Extended Read permission (folder-scoped credentials)." + }, + { + "lang": "es", + "value": "En casos excepcionales, el complemento Jenkins Plain Credentials 182.v468b_97b_9dcb_8 y versiones anteriores almacena las credenciales de archivos secretos sin cifrar (solo codificados en Base64) en el sistema de archivos del controlador Jenkins, donde pueden ser vistos por usuarios con acceso al sistema de archivos del controlador Jenkins (credenciales globales) o con Permiso de objeto/lectura extendida (credenciales con \u00e1mbito de carpeta)." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-394xx/CVE-2024-39460.json b/CVE-2024/CVE-2024-394xx/CVE-2024-39460.json index 5df2d711d96..dba5cc58343 100644 --- a/CVE-2024/CVE-2024-394xx/CVE-2024-39460.json +++ b/CVE-2024/CVE-2024-394xx/CVE-2024-39460.json @@ -2,12 +2,16 @@ "id": "CVE-2024-39460", "sourceIdentifier": "jenkinsci-cert@googlegroups.com", "published": "2024-06-26T17:15:27.180", - "lastModified": "2024-06-26T18:15:15.500", - "vulnStatus": "Received", + "lastModified": "2024-06-27T12:47:19.847", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", "value": "Jenkins Bitbucket Branch Source Plugin 886.v44cf5e4ecec5 and earlier prints the Bitbucket OAuth access token as part of the Bitbucket URL in the build log in some cases." + }, + { + "lang": "es", + "value": " El complemento Jenkins Bitbucket Branch Source 886.v44cf5e4ecec5 y anteriores imprime el token de acceso Bitbucket OAuth como parte de la URL de Bitbucket en el registro de compilaci\u00f3n en algunos casos." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-39xx/CVE-2024-3959.json b/CVE-2024/CVE-2024-39xx/CVE-2024-3959.json index 408ba155fa9..5133ae77352 100644 --- a/CVE-2024/CVE-2024-39xx/CVE-2024-3959.json +++ b/CVE-2024/CVE-2024-39xx/CVE-2024-3959.json @@ -2,12 +2,16 @@ "id": "CVE-2024-3959", "sourceIdentifier": "cve@gitlab.com", "published": "2024-06-27T00:15:11.420", - "lastModified": "2024-06-27T00:15:11.420", - "vulnStatus": "Received", + "lastModified": "2024-06-27T12:47:19.847", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", "value": "An issue was discovered in GitLab CE/EE affecting all versions starting from 16.7 prior to 16.11.5, starting from 17.0 prior to 17.0.3, and starting from 17.1 prior to 17.1.1, which allows private job artifacts can be accessed by any user." + }, + { + "lang": "es", + "value": " Se descubri\u00f3 un problema en GitLab CE/EE que afecta a todas las versiones desde 16.7 anterior a 16.11.5, desde 17.0 anterior a 17.0.3 y desde 17.1 anterior a 17.1.1, lo que permite que cualquier usuario pueda acceder a artefactos de trabajo privados." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-40xx/CVE-2024-4011.json b/CVE-2024/CVE-2024-40xx/CVE-2024-4011.json index 7b805afd4e4..d70dfbe889c 100644 --- a/CVE-2024/CVE-2024-40xx/CVE-2024-4011.json +++ b/CVE-2024/CVE-2024-40xx/CVE-2024-4011.json @@ -2,12 +2,16 @@ "id": "CVE-2024-4011", "sourceIdentifier": "cve@gitlab.com", "published": "2024-06-27T00:15:11.643", - "lastModified": "2024-06-27T00:15:11.643", - "vulnStatus": "Received", + "lastModified": "2024-06-27T12:47:19.847", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", "value": "An issue was discovered in GitLab CE/EE affecting all versions starting from 16.1 prior to 16.11.5, starting from 17.0 prior to 17.0.3, and starting from 17.1 prior to 17.1.1, which allows non-project member to promote key results to objectives." + }, + { + "lang": "es", + "value": "Se descubri\u00f3 un problema en GitLab CE/EE que afecta a todas las versiones desde 16.1 anterior a 16.11.5, desde 17.0 anterior a 17.0.3 y desde 17.1 anterior a 17.1.1, lo que permite que quienes no son miembros del proyecto promuevan resultados clave a los objetivos." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-42xx/CVE-2024-4228.json b/CVE-2024/CVE-2024-42xx/CVE-2024-4228.json index 1538726d782..9f94e2ba304 100644 --- a/CVE-2024/CVE-2024-42xx/CVE-2024-4228.json +++ b/CVE-2024/CVE-2024-42xx/CVE-2024-4228.json @@ -2,12 +2,16 @@ "id": "CVE-2024-4228", "sourceIdentifier": "iletisim@usom.gov.tr", "published": "2024-06-26T15:15:19.977", - "lastModified": "2024-06-26T15:15:19.977", - "vulnStatus": "Received", + "lastModified": "2024-06-27T12:47:19.847", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection'), CWE - 200 - Exposure of Sensitive Information to an Unauthorized Actor, CWE - 522 - Insufficiently Protected Credentials vulnerability in Magarsus Consultancy SSO (Single Sign On) allows SQL Injection.This issue affects SSO (Single Sign On): from 1.0 before 1.1." + }, + { + "lang": "es", + "value": "Neutralizaci\u00f3n incorrecta de elementos especiales utilizados en un comando SQL (\"Inyecci\u00f3n SQL\"), CWE - 200 - Exposici\u00f3n de informaci\u00f3n confidencial a un actor no autorizado, CWE - 522 - Vulnerabilidad de credenciales insuficientemente protegidas en Magarsus Consultancy SSO (inicio de sesi\u00f3n \u00fanico) permite la inyecci\u00f3n SQL .Este problema afecta al SSO (Inicio de sesi\u00f3n \u00fanico): desde la versi\u00f3n 1.0 anterior a la 1.1." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-45xx/CVE-2024-4557.json b/CVE-2024/CVE-2024-45xx/CVE-2024-4557.json index cd2d63ee6de..5f08c4367c6 100644 --- a/CVE-2024/CVE-2024-45xx/CVE-2024-4557.json +++ b/CVE-2024/CVE-2024-45xx/CVE-2024-4557.json @@ -2,12 +2,16 @@ "id": "CVE-2024-4557", "sourceIdentifier": "cve@gitlab.com", "published": "2024-06-27T00:15:11.863", - "lastModified": "2024-06-27T00:15:11.863", - "vulnStatus": "Received", + "lastModified": "2024-06-27T12:47:19.847", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", "value": "Multiple Denial of Service (DoS) conditions has been discovered in GitLab CE/EE affecting all versions starting from 1.0 prior to 16.11.5, starting from 17.0 prior to 17.0.3, and starting from 17.1 prior to 17.1.1 which allowed an attacker to cause resource exhaustion via banzai pipeline." + }, + { + "lang": "es", + "value": " Se han descubierto m\u00faltiples condiciones de denegaci\u00f3n de servicio (DoS) en GitLab CE/EE que afectan a todas las versiones desde 1.0 anterior a 16.11.5, desde 17.0 anterior a 17.0.3 y desde 17.1 anterior a 17.1.1, lo que permiti\u00f3 a un atacante para causar el agotamiento de los recursos a trav\u00e9s de la canalizaci\u00f3n banzai." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-45xx/CVE-2024-4569.json b/CVE-2024/CVE-2024-45xx/CVE-2024-4569.json index 8300c25394e..330aeda0ae2 100644 --- a/CVE-2024/CVE-2024-45xx/CVE-2024-4569.json +++ b/CVE-2024/CVE-2024-45xx/CVE-2024-4569.json @@ -2,12 +2,16 @@ "id": "CVE-2024-4569", "sourceIdentifier": "security@wordfence.com", "published": "2024-06-27T04:15:11.537", - "lastModified": "2024-06-27T04:15:11.537", - "vulnStatus": "Received", + "lastModified": "2024-06-27T12:47:19.847", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", "value": "The Elementor Addon Elements plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the \u2018url\u2019 parameter in versions up to, and including, 1.13.5 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with contributor-level permissions and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page." + }, + { + "lang": "es", + "value": "El complemento Elementor Addon Elements para WordPress es vulnerable a Cross Site Scripting Almacenado a trav\u00e9s del par\u00e1metro 'url' en versiones hasta la 1.13.5 incluida debido a una sanitizaci\u00f3n de entrada y un escape de salida insuficientes. Esto hace posible que atacantes autenticados, con permisos de nivel de colaborador y superiores, inyecten scripts web arbitrarios en p\u00e1ginas que se ejecutar\u00e1n cada vez que un usuario acceda a una p\u00e1gina inyectada." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-45xx/CVE-2024-4570.json b/CVE-2024/CVE-2024-45xx/CVE-2024-4570.json index f5d11f808ea..2c4f39cbd53 100644 --- a/CVE-2024/CVE-2024-45xx/CVE-2024-4570.json +++ b/CVE-2024/CVE-2024-45xx/CVE-2024-4570.json @@ -2,12 +2,16 @@ "id": "CVE-2024-4570", "sourceIdentifier": "security@wordfence.com", "published": "2024-06-27T04:15:12.553", - "lastModified": "2024-06-27T04:15:12.553", - "vulnStatus": "Received", + "lastModified": "2024-06-27T12:47:19.847", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", "value": "The Elementor Addon Elements plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the \u2018url\u2019 parameter in versions up to, and including, 1.13.5 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with contributor-level permissions and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page." + }, + { + "lang": "es", + "value": "El complemento Elementor Addon Elements para WordPress es vulnerable a Cross Site Scripting Almacenado a trav\u00e9s del par\u00e1metro 'url' en versiones hasta la 1.13.5 incluida debido a una sanitizaci\u00f3n de entrada y un escape de salida insuficientes. Esto hace posible que atacantes autenticados, con permisos de nivel de colaborador y superiores, inyecten scripts web arbitrarios en p\u00e1ginas que se ejecutar\u00e1n cada vez que un usuario acceda a una p\u00e1gina inyectada." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-46xx/CVE-2024-4604.json b/CVE-2024/CVE-2024-46xx/CVE-2024-4604.json index b8bd79d824b..e8a343043b6 100644 --- a/CVE-2024/CVE-2024-46xx/CVE-2024-4604.json +++ b/CVE-2024/CVE-2024-46xx/CVE-2024-4604.json @@ -2,12 +2,16 @@ "id": "CVE-2024-4604", "sourceIdentifier": "iletisim@usom.gov.tr", "published": "2024-06-26T15:15:20.257", - "lastModified": "2024-06-26T15:15:20.257", - "vulnStatus": "Received", + "lastModified": "2024-06-27T12:47:19.847", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", "value": "URL Redirection to Untrusted Site ('Open Redirect') vulnerability in Magarsus Consultancy SSO (Single Sign On) allows Manipulating Hidden Fields.This issue affects SSO (Single Sign On): from 1.0 before 1.1." + }, + { + "lang": "es", + "value": " La vulnerabilidad de redirecci\u00f3n de URL a un sitio que no es de confianza (\"Open Redirect\") en Magarsus Consultancy SSO (inicio de sesi\u00f3n \u00fanico) permite manipular campos ocultos. Este problema afecta al SSO (inicio de sesi\u00f3n \u00fanico): desde 1.0 antes de 1.1." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-46xx/CVE-2024-4664.json b/CVE-2024/CVE-2024-46xx/CVE-2024-4664.json index 37e49848013..0f119fc418e 100644 --- a/CVE-2024/CVE-2024-46xx/CVE-2024-4664.json +++ b/CVE-2024/CVE-2024-46xx/CVE-2024-4664.json @@ -2,12 +2,16 @@ "id": "CVE-2024-4664", "sourceIdentifier": "contact@wpscan.com", "published": "2024-06-27T06:15:13.627", - "lastModified": "2024-06-27T06:15:13.627", - "vulnStatus": "Received", + "lastModified": "2024-06-27T12:47:19.847", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", "value": "The WP Chat App WordPress plugin before 3.6.5 does not sanitise and escape some of its settings, which could allow high privilege users such as admins to perform Cross-Site Scripting attacks even when unfiltered_html is disallowed." + }, + { + "lang": "es", + "value": " El complemento de WordPress de WP Chat App anterior a 3.6.5 no sanitiza ni escapa a algunas de sus configuraciones, lo que podr\u00eda permitir a usuarios con altos privilegios, como administradores, realizar ataques de Cross Site Scripting incluso cuando unfiltered_html no est\u00e1 permitido." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-47xx/CVE-2024-4704.json b/CVE-2024/CVE-2024-47xx/CVE-2024-4704.json index e068844520e..ba374c872e2 100644 --- a/CVE-2024/CVE-2024-47xx/CVE-2024-4704.json +++ b/CVE-2024/CVE-2024-47xx/CVE-2024-4704.json @@ -2,12 +2,16 @@ "id": "CVE-2024-4704", "sourceIdentifier": "contact@wpscan.com", "published": "2024-06-27T06:15:14.697", - "lastModified": "2024-06-27T06:15:14.697", - "vulnStatus": "Received", + "lastModified": "2024-06-27T12:47:19.847", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", "value": "The Contact Form 7 WordPress plugin before 5.9.5 has an open redirect that allows an attacker to utilize a false URL and redirect to the URL of their choosing." + }, + { + "lang": "es", + "value": " El complemento de WordPress Contact Form 7 anterior a 5.9.5 tiene una redirecci\u00f3n abierta que permite a un atacante utilizar una URL falsa y redirigir a la URL de su elecci\u00f3n." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-49xx/CVE-2024-4901.json b/CVE-2024/CVE-2024-49xx/CVE-2024-4901.json index 430b4981fad..dfa80c19d39 100644 --- a/CVE-2024/CVE-2024-49xx/CVE-2024-4901.json +++ b/CVE-2024/CVE-2024-49xx/CVE-2024-4901.json @@ -2,12 +2,16 @@ "id": "CVE-2024-4901", "sourceIdentifier": "cve@gitlab.com", "published": "2024-06-27T00:15:12.263", - "lastModified": "2024-06-27T00:15:12.263", - "vulnStatus": "Received", + "lastModified": "2024-06-27T12:47:19.847", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", "value": "An issue was discovered in GitLab CE/EE affecting all versions starting from 16.9 prior to 16.11.5, starting from 17.0 prior to 17.0.3, and starting from 17.1 prior to 17.1.1, where a stored XSS vulnerability could be imported from a project with malicious commit notes." + }, + { + "lang": "es", + "value": " Se descubri\u00f3 un problema en GitLab CE/EE que afecta a todas las versiones desde la 16.9 anterior a la 16.11.5, desde la 17.0 anterior a la 17.0.3 y desde la 17.1 anterior a la 17.1.1, donde una vulnerabilidad de XSS almacenado se pod\u00eda importar desde un proyecto con notas de confirmaci\u00f3n maliciosas." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-49xx/CVE-2024-4983.json b/CVE-2024/CVE-2024-49xx/CVE-2024-4983.json index d00e31a07f8..6b1e8849005 100644 --- a/CVE-2024/CVE-2024-49xx/CVE-2024-4983.json +++ b/CVE-2024/CVE-2024-49xx/CVE-2024-4983.json @@ -2,8 +2,8 @@ "id": "CVE-2024-4983", "sourceIdentifier": "security@wordfence.com", "published": "2024-06-27T09:15:09.840", - "lastModified": "2024-06-27T09:15:09.840", - "vulnStatus": "Received", + "lastModified": "2024-06-27T12:47:19.847", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-52xx/CVE-2024-5289.json b/CVE-2024/CVE-2024-52xx/CVE-2024-5289.json index ef71194af68..aeedd10816d 100644 --- a/CVE-2024/CVE-2024-52xx/CVE-2024-5289.json +++ b/CVE-2024/CVE-2024-52xx/CVE-2024-5289.json @@ -2,12 +2,16 @@ "id": "CVE-2024-5289", "sourceIdentifier": "security@wordfence.com", "published": "2024-06-27T03:15:50.593", - "lastModified": "2024-06-27T03:15:50.593", - "vulnStatus": "Received", + "lastModified": "2024-06-27T12:47:19.847", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", "value": "The Gutenberg Blocks with AI by Kadence WP \u2013 Page Builder Features plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the Google Maps widget parameters in all versions up to, and including, 3.2.42 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page." + }, + { + "lang": "es", + "value": "El complemento Gutenberg Blocks with AI de Kadence WP \u2013 Page Builder Features para WordPress es vulnerable a Cross Site Scripting Almacenado a trav\u00e9s de los par\u00e1metros del widget de Google Maps en todas las versiones hasta la 3.2.42 incluida debido a una sanitizaci\u00f3n de entrada y un escape de salida insuficientes. Esto hace posible que atacantes autenticados, con acceso de nivel de Colaborador y superior, inyecten scripts web arbitrarios en p\u00e1ginas que se ejecutar\u00e1n cada vez que un usuario acceda a una p\u00e1gina inyectada." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-54xx/CVE-2024-5430.json b/CVE-2024/CVE-2024-54xx/CVE-2024-5430.json index c9d53fa8af7..eb00f7a031e 100644 --- a/CVE-2024/CVE-2024-54xx/CVE-2024-5430.json +++ b/CVE-2024/CVE-2024-54xx/CVE-2024-5430.json @@ -2,12 +2,16 @@ "id": "CVE-2024-5430", "sourceIdentifier": "cve@gitlab.com", "published": "2024-06-27T00:15:12.650", - "lastModified": "2024-06-27T00:15:12.650", - "vulnStatus": "Received", + "lastModified": "2024-06-27T12:47:19.847", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", "value": "An issue was discovered in GitLab CE/EE affecting all versions starting from 16.10 prior to 16.11.5, starting from 17.0 prior to 17.0.3, and starting from 17.1 prior to 17.1.1, which allows a project maintainer can delete the merge request approval policy via graphQL." + }, + { + "lang": "es", + "value": " Se descubri\u00f3 un problema en GitLab CE/EE que afecta a todas las versiones desde la 16.10 anterior a la 16.11.5, desde la 17.0 anterior a la 17.0.3 y desde la 17.1 anterior a la 17.1.1, lo que permite que el mantenedor del proyecto pueda eliminar la pol\u00edtica de aprobaci\u00f3n de solicitud de fusi\u00f3n a trav\u00e9s de GraphQL." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-55xx/CVE-2024-5535.json b/CVE-2024/CVE-2024-55xx/CVE-2024-5535.json index 1bee299ed97..4064258a6c9 100644 --- a/CVE-2024/CVE-2024-55xx/CVE-2024-5535.json +++ b/CVE-2024/CVE-2024-55xx/CVE-2024-5535.json @@ -2,8 +2,8 @@ "id": "CVE-2024-5535", "sourceIdentifier": "openssl-security@openssl.org", "published": "2024-06-27T11:15:24.447", - "lastModified": "2024-06-27T11:15:24.447", - "vulnStatus": "Received", + "lastModified": "2024-06-27T12:47:19.847", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-56xx/CVE-2024-5601.json b/CVE-2024/CVE-2024-56xx/CVE-2024-5601.json index 5c591fc14e8..e534dbeb10d 100644 --- a/CVE-2024/CVE-2024-56xx/CVE-2024-5601.json +++ b/CVE-2024/CVE-2024-56xx/CVE-2024-5601.json @@ -2,8 +2,8 @@ "id": "CVE-2024-5601", "sourceIdentifier": "security@wordfence.com", "published": "2024-06-27T08:15:09.703", - "lastModified": "2024-06-27T08:15:09.703", - "vulnStatus": "Received", + "lastModified": "2024-06-27T12:47:19.847", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-56xx/CVE-2024-5655.json b/CVE-2024/CVE-2024-56xx/CVE-2024-5655.json index 1f87d78568b..9ab3dce53cf 100644 --- a/CVE-2024/CVE-2024-56xx/CVE-2024-5655.json +++ b/CVE-2024/CVE-2024-56xx/CVE-2024-5655.json @@ -2,12 +2,16 @@ "id": "CVE-2024-5655", "sourceIdentifier": "cve@gitlab.com", "published": "2024-06-27T00:15:12.887", - "lastModified": "2024-06-27T00:15:12.887", - "vulnStatus": "Received", + "lastModified": "2024-06-27T12:47:19.847", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", "value": "An issue was discovered in GitLab CE/EE affecting all versions starting from 15.8 prior to 16.11.5, starting from 17.0 prior to 17.0.3, and starting from 17.1 prior to 17.1.1, which allows an attacker to trigger a pipeline as another user under certain circumstances." + }, + { + "lang": "es", + "value": " Se descubri\u00f3 un problema en GitLab CE/EE que afecta a todas las versiones desde la 15.8 anterior a la 16.11.5, desde la 17.0 anterior a la 17.0.3 y desde la 17.1 anterior a la 17.1.1, lo que permite a un atacante activar una canalizaci\u00f3n como otro usuario en determinadas circunstancias." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-60xx/CVE-2024-6054.json b/CVE-2024/CVE-2024-60xx/CVE-2024-6054.json index ea47e719854..f3cbbb55d40 100644 --- a/CVE-2024/CVE-2024-60xx/CVE-2024-6054.json +++ b/CVE-2024/CVE-2024-60xx/CVE-2024-6054.json @@ -2,12 +2,16 @@ "id": "CVE-2024-6054", "sourceIdentifier": "security@wordfence.com", "published": "2024-06-27T03:15:50.890", - "lastModified": "2024-06-27T03:15:50.890", - "vulnStatus": "Received", + "lastModified": "2024-06-27T12:47:19.847", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", "value": "The Auto Featured Image plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the 'create_post_attachment_from_url' function in all versions up to, and including, 1.2. This makes it possible for authenticated attackers, with contributor-level and above permissions, to upload arbitrary files on the affected site's server which may make remote code execution possible." + }, + { + "lang": "es", + "value": " El complemento Auto Featured Image para WordPress es vulnerable a cargas de archivos arbitrarias debido a la falta de validaci\u00f3n del tipo de archivo en la funci\u00f3n 'create_post_attachment_from_url' en todas las versiones hasta la 1.2 incluida. Esto hace posible que atacantes autenticados, con permisos de nivel de colaborador y superiores, carguen archivos arbitrarios en el servidor del sitio afectado, lo que puede hacer posible la ejecuci\u00f3n remota de c\u00f3digo." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-62xx/CVE-2024-6262.json b/CVE-2024/CVE-2024-62xx/CVE-2024-6262.json index 37f39b3957c..5067ba188e4 100644 --- a/CVE-2024/CVE-2024-62xx/CVE-2024-6262.json +++ b/CVE-2024/CVE-2024-62xx/CVE-2024-6262.json @@ -2,12 +2,16 @@ "id": "CVE-2024-6262", "sourceIdentifier": "security@wordfence.com", "published": "2024-06-27T11:15:25.193", - "lastModified": "2024-06-27T11:15:25.193", - "vulnStatus": "Received", + "lastModified": "2024-06-27T12:47:19.847", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", "value": "The Portfolio Gallery \u2013 Image Gallery Plugin plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'PFG' shortcode in all versions up to, and including, 1.6.4 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page." + }, + { + "lang": "es", + "value": "El complemento Portfolio Gallery \u2013 Image Gallery Plugin para WordPress es vulnerable a Cross Site Scripting Almacenado a trav\u00e9s del c\u00f3digo abreviado 'PFG' del complemento en todas las versiones hasta la 1.6.4 inclusive debido a una sanitizaci\u00f3n de entrada y a un escape de salida insuficiente en los atributos proporcionados por el usuario. Esto hace posible que atacantes autenticados, con acceso de nivel de colaborador y superior, inyecten scripts web arbitrarios en p\u00e1ginas que se ejecutar\u00e1n cada vez que un usuario acceda a una p\u00e1gina inyectada." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-62xx/CVE-2024-6283.json b/CVE-2024/CVE-2024-62xx/CVE-2024-6283.json index 3e034746cfa..7d29483c037 100644 --- a/CVE-2024/CVE-2024-62xx/CVE-2024-6283.json +++ b/CVE-2024/CVE-2024-62xx/CVE-2024-6283.json @@ -2,12 +2,16 @@ "id": "CVE-2024-6283", "sourceIdentifier": "security@wordfence.com", "published": "2024-06-27T05:15:51.700", - "lastModified": "2024-06-27T05:15:51.700", - "vulnStatus": "Received", + "lastModified": "2024-06-27T12:47:19.847", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", "value": "The DethemeKit For Elementor plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the URL parameter of the De Gallery widget in all versions up to and including 2.1.5 due to insufficient input sanitization and output escaping on user-supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user clicks on the injected link." + }, + { + "lang": "es", + "value": " El complemento DethemeKit For Elementor para WordPress es vulnerable a Cross Site Scripting Almacenado a trav\u00e9s del par\u00e1metro URL del widget De Gallery en todas las versiones hasta la 2.1.5 incluida debido a una sanitizaci\u00f3n de entrada y a un escape de salida insuficiente en los atributos proporcionados por el usuario. Esto hace posible que atacantes autenticados, con acceso de nivel de colaborador y superior, inyecten scripts web arbitrarios en p\u00e1ginas que se ejecutar\u00e1n cada vez que un usuario haga clic en el enlace inyectado." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-63xx/CVE-2024-6323.json b/CVE-2024/CVE-2024-63xx/CVE-2024-6323.json index 69fbcc036ce..442ccb5430d 100644 --- a/CVE-2024/CVE-2024-63xx/CVE-2024-6323.json +++ b/CVE-2024/CVE-2024-63xx/CVE-2024-6323.json @@ -2,12 +2,16 @@ "id": "CVE-2024-6323", "sourceIdentifier": "cve@gitlab.com", "published": "2024-06-27T00:15:13.130", - "lastModified": "2024-06-27T00:15:13.130", - "vulnStatus": "Received", + "lastModified": "2024-06-27T12:47:19.847", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", "value": "Improper authorization in global search in GitLab EE affecting all versions from 16.11 prior to 16.11.5 and 17.0 prior to 17.0.3 and 17.1 prior to 17.1.1 allows an attacker leak content of a private repository in a public project." + }, + { + "lang": "es", + "value": " La autorizaci\u00f3n inadecuada en la b\u00fasqueda global en GitLab EE que afecta a todas las versiones desde 16.11 anteriores a 16.11.5 y 17.0 anteriores a 17.0.3 y 17.1 anteriores a 17.1.1 permite que un atacante filtre el contenido de un repositorio privado en un proyecto p\u00fablico." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-63xx/CVE-2024-6354.json b/CVE-2024/CVE-2024-63xx/CVE-2024-6354.json index e35a1e3453f..d3748dd7720 100644 --- a/CVE-2024/CVE-2024-63xx/CVE-2024-6354.json +++ b/CVE-2024/CVE-2024-63xx/CVE-2024-6354.json @@ -2,12 +2,16 @@ "id": "CVE-2024-6354", "sourceIdentifier": "security@devolutions.net", "published": "2024-06-26T17:15:27.497", - "lastModified": "2024-06-26T17:15:27.497", - "vulnStatus": "Received", + "lastModified": "2024-06-27T12:47:19.847", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", "value": "Improper access control in PAM dashboard in Devolutions Remote Desktop Manager 2024.2.11 and earlier on Windows allows an authenticated user to bypass the execute permission via the use of the PAM dashboard." + }, + { + "lang": "es", + "value": "El control de acceso inadecuado en el panel de PAM en Devolutions Remote Desktop Manager 2024.2.11 y versiones anteriores en Windows permite a un usuario autenticado omitir el permiso de ejecuci\u00f3n mediante el uso del panel de PAM." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-63xx/CVE-2024-6355.json b/CVE-2024/CVE-2024-63xx/CVE-2024-6355.json index 2c9a2fada54..db0e600fade 100644 --- a/CVE-2024/CVE-2024-63xx/CVE-2024-6355.json +++ b/CVE-2024/CVE-2024-63xx/CVE-2024-6355.json @@ -2,12 +2,16 @@ "id": "CVE-2024-6355", "sourceIdentifier": "cna@vuldb.com", "published": "2024-06-26T21:15:13.533", - "lastModified": "2024-06-26T21:15:13.533", - "vulnStatus": "Received", + "lastModified": "2024-06-27T12:47:19.847", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", "value": "A vulnerability was found in Genexis Tilgin Fiber Home Gateway HG1522 CSx000-01_09_01_12. It has been declared as problematic. Affected by this vulnerability is an unknown functionality of the file /status/product_info/. The manipulation of the argument product_info leads to cross site scripting. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-269755. NOTE: The vendor was contacted early about this disclosure but did not respond in any way." + }, + { + "lang": "es", + "value": " Se encontr\u00f3 una vulnerabilidad en Genexis Tilgin Fiber Home Gateway HG1522 CSx000-01_09_01_12. Ha sido declarada problem\u00e1tica. Una funcionalidad desconocida del archivo /status/product_info/ es afectada por esta vulnerabilidad. La manipulaci\u00f3n del argumento product_info conduce a Cross Site Scripting. El ataque se puede lanzar de forma remota. El exploit ha sido divulgado al p\u00fablico y puede utilizarse. El identificador asociado de esta vulnerabilidad es VDB-269755. NOTA: Se contact\u00f3 primeramente con el proveedor sobre esta divulgaci\u00f3n, pero no respondi\u00f3 de ninguna manera." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-63xx/CVE-2024-6367.json b/CVE-2024/CVE-2024-63xx/CVE-2024-6367.json new file mode 100644 index 00000000000..6f0d956ec8b --- /dev/null +++ b/CVE-2024/CVE-2024-63xx/CVE-2024-6367.json @@ -0,0 +1,96 @@ +{ + "id": "CVE-2024-6367", + "sourceIdentifier": "cna@vuldb.com", + "published": "2024-06-27T12:15:29.653", + "lastModified": "2024-06-27T12:47:19.847", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability was found in LabVantage LIMS 2017. It has been declared as problematic. This vulnerability affects unknown code of the file /labvantage/rc?command=file&file=WEB-CORE/elements/files/filesembedded.jsp of the component POST Request Handler. The manipulation of the argument sdcid/keyid1/keyid2/keyid3 leads to cross site scripting. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-269800. NOTE: The vendor was contacted early about this disclosure but did not respond in any way." + }, + { + "lang": "es", + "value": "Una vulnerabilidad fue encontrada en LabVantage LIMS 2017 y ha sido declarada problem\u00e1tica. Esta vulnerabilidad afecta a un c\u00f3digo desconocido del archivo /labvantage/rc?command=file&file=WEB-CORE/elements/files/filesembedded.jsp del componente POST Request Handler. La manipulaci\u00f3n del argumento sdcid/keyid1/keyid2/keyid3 conduce a Cross Site Scripting. El ataque se puede iniciar de forma remota. El exploit ha sido divulgado al p\u00fablico y puede utilizarse. El identificador de esta vulnerabilidad es VDB-269800. NOTA: Se contact\u00f3 primeramente con el proveedor sobre esta divulgaci\u00f3n, pero no respondi\u00f3 de ninguna manera." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 3.5, + "baseSeverity": "LOW" + }, + "exploitabilityScore": 2.1, + "impactScore": 1.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:S/C:N/I:P/A:N", + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "SINGLE", + "confidentialityImpact": "NONE", + "integrityImpact": "PARTIAL", + "availabilityImpact": "NONE", + "baseScore": 4.0 + }, + "baseSeverity": "MEDIUM", + "exploitabilityScore": 8.0, + "impactScore": 2.9, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://gentle-khaan-c53.notion.site/Reflected-XSS-in-Labvantage-LIMS-c9aa0641d1464816832bb8b98958626f?pvs=4", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.269800", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.269800", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.359344", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-63xx/CVE-2024-6368.json b/CVE-2024/CVE-2024-63xx/CVE-2024-6368.json new file mode 100644 index 00000000000..4fbe8fd5bee --- /dev/null +++ b/CVE-2024/CVE-2024-63xx/CVE-2024-6368.json @@ -0,0 +1,96 @@ +{ + "id": "CVE-2024-6368", + "sourceIdentifier": "cna@vuldb.com", + "published": "2024-06-27T12:15:30.240", + "lastModified": "2024-06-27T12:47:19.847", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability was found in LabVantage LIMS 2017. It has been rated as problematic. This issue affects some unknown processing of the file /labvantage/rc?command=page of the component POST Request Handler. The manipulation of the argument param1 leads to cross site scripting. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-269801 was assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way." + }, + { + "lang": "es", + "value": "Se encontr\u00f3 una vulnerabilidad en LabVantage LIMS 2017. Se calific\u00f3 como problem\u00e1tica. Este problema afecta un procesamiento desconocido del archivo /labvantage/rc?command=page del componente POST Request Handler. La manipulaci\u00f3n del argumento param1 conduce a Cross Site Scripting. El ataque puede iniciarse de forma remota. El exploit ha sido divulgado al p\u00fablico y puede utilizarse. A esta vulnerabilidad se le asign\u00f3 el identificador VDB-269801. NOTA: Se contact\u00f3 primeramente con el proveedor sobre esta divulgaci\u00f3n, pero no respondi\u00f3 de ninguna manera." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 3.5, + "baseSeverity": "LOW" + }, + "exploitabilityScore": 2.1, + "impactScore": 1.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:S/C:N/I:P/A:N", + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "SINGLE", + "confidentialityImpact": "NONE", + "integrityImpact": "PARTIAL", + "availabilityImpact": "NONE", + "baseScore": 4.0 + }, + "baseSeverity": "MEDIUM", + "exploitabilityScore": 8.0, + "impactScore": 2.9, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://gentle-khaan-c53.notion.site/Reflected-XSS-in-Labvantage-LIMS-53b90219d193451aa81f28dea480d5f2?pvs=4", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.269801", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.269801", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.359372", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-63xx/CVE-2024-6369.json b/CVE-2024/CVE-2024-63xx/CVE-2024-6369.json new file mode 100644 index 00000000000..65c27a8043e --- /dev/null +++ b/CVE-2024/CVE-2024-63xx/CVE-2024-6369.json @@ -0,0 +1,96 @@ +{ + "id": "CVE-2024-6369", + "sourceIdentifier": "cna@vuldb.com", + "published": "2024-06-27T12:15:30.750", + "lastModified": "2024-06-27T12:47:19.847", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability classified as problematic has been found in LabVantage LIMS 2017. Affected is an unknown function of the file /labvantage/rc?command=page&sdcid=LV_ReagentLot of the component POST Request Handler. The manipulation of the argument mode leads to cross site scripting. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. VDB-269802 is the identifier assigned to this vulnerability." + }, + { + "lang": "es", + "value": "Una vulnerabilidad ha sido encontrada en LabVantage LIMS 2017 y clasificada como problem\u00e1tica. Una funci\u00f3n desconocida del archivo /labvantage/rc?command=page&sdcid=LV_ReagentLot del componente POST Request Handler es afectada por esta vulnerabilidad. La manipulaci\u00f3n del argumento mode conduce a Cross Site Scripting. Es posible lanzar el ataque de forma remota. El exploit ha sido divulgado al p\u00fablico y puede utilizarse. VDB-269802 es el identificador asignado a esta vulnerabilidad." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 3.5, + "baseSeverity": "LOW" + }, + "exploitabilityScore": 2.1, + "impactScore": 1.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:S/C:N/I:P/A:N", + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "SINGLE", + "confidentialityImpact": "NONE", + "integrityImpact": "PARTIAL", + "availabilityImpact": "NONE", + "baseScore": 4.0 + }, + "baseSeverity": "MEDIUM", + "exploitabilityScore": 8.0, + "impactScore": 2.9, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://gentle-khaan-c53.notion.site/Reflected-XSS-in-Labvantage-LIMS-960bf61d35124c858e3360785cfe40b3?pvs=4", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.269802", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.269802", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.359373", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-63xx/CVE-2024-6370.json b/CVE-2024/CVE-2024-63xx/CVE-2024-6370.json new file mode 100644 index 00000000000..9d62114bc29 --- /dev/null +++ b/CVE-2024/CVE-2024-63xx/CVE-2024-6370.json @@ -0,0 +1,96 @@ +{ + "id": "CVE-2024-6370", + "sourceIdentifier": "cna@vuldb.com", + "published": "2024-06-27T12:15:31.207", + "lastModified": "2024-06-27T12:47:19.847", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability classified as problematic was found in LabVantage LIMS 2017. Affected by this vulnerability is an unknown functionality of the file /labvantage/rc?command=file&file=WEB-OPAL/pagetypes/bulletins/sendbulletin.jsp of the component POST Request Handler. The manipulation of the argument bulletinbody leads to cross site scripting. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-269803." + }, + { + "lang": "es", + "value": "Una vulnerabilidad fue encontrada en LabVantage LIMS 2017 y clasificada como problem\u00e1tica. Una funci\u00f3n desconocida del archivo /labvantage/rc?command=file&file=WEB-OPAL/pagetypes/bulletins/sendbulletin.jsp del componente POST Request Handler es afectada por esta vulnerabilidad. La manipulaci\u00f3n del argumento bulletinbody conduce a Cross Site Scripting. El ataque se puede lanzar de forma remota. El exploit ha sido divulgado al p\u00fablico y puede utilizarse. El identificador asociado de esta vulnerabilidad es VDB-269803." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 3.5, + "baseSeverity": "LOW" + }, + "exploitabilityScore": 2.1, + "impactScore": 1.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:S/C:N/I:P/A:N", + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "SINGLE", + "confidentialityImpact": "NONE", + "integrityImpact": "PARTIAL", + "availabilityImpact": "NONE", + "baseScore": 4.0 + }, + "baseSeverity": "MEDIUM", + "exploitabilityScore": 8.0, + "impactScore": 2.9, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://gentle-khaan-c53.notion.site/HTML-Injection-in-Labvantage-LIMS-a229aae13fa14977a677921e7a442619?pvs=4", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.269803", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.269803", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.359374", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-63xx/CVE-2024-6371.json b/CVE-2024/CVE-2024-63xx/CVE-2024-6371.json new file mode 100644 index 00000000000..8788c6fec9a --- /dev/null +++ b/CVE-2024/CVE-2024-63xx/CVE-2024-6371.json @@ -0,0 +1,92 @@ +{ + "id": "CVE-2024-6371", + "sourceIdentifier": "cna@vuldb.com", + "published": "2024-06-27T13:16:01.923", + "lastModified": "2024-06-27T13:16:01.923", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability, which was classified as critical, has been found in itsourcecode Pool of Bethesda Online Reservation System 1.0. Affected by this issue is some unknown functionality of the file controller.php. The manipulation of the argument rmtype_id leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-269804." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 7.3, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "NONE", + "confidentialityImpact": "PARTIAL", + "integrityImpact": "PARTIAL", + "availabilityImpact": "PARTIAL", + "baseScore": 7.5 + }, + "baseSeverity": "HIGH", + "exploitabilityScore": 10.0, + "impactScore": 6.4, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/L1OudFd8cl09/CVE/blob/main/25_06_2024_b.md", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.269804", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.269804", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.364101", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-63xx/CVE-2024-6372.json b/CVE-2024/CVE-2024-63xx/CVE-2024-6372.json new file mode 100644 index 00000000000..c70f675c220 --- /dev/null +++ b/CVE-2024/CVE-2024-63xx/CVE-2024-6372.json @@ -0,0 +1,92 @@ +{ + "id": "CVE-2024-6372", + "sourceIdentifier": "cna@vuldb.com", + "published": "2024-06-27T13:16:02.440", + "lastModified": "2024-06-27T13:16:02.440", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability, which was classified as critical, was found in itsourcecode Tailoring Management System 1.0. This affects an unknown part of the file customeradd.php. The manipulation of the argument fullname/address/phonenumber/sex/email/city/comment leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-269805 was assigned to this vulnerability." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 6.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "SINGLE", + "confidentialityImpact": "PARTIAL", + "integrityImpact": "PARTIAL", + "availabilityImpact": "PARTIAL", + "baseScore": 6.5 + }, + "baseSeverity": "MEDIUM", + "exploitabilityScore": 8.0, + "impactScore": 6.4, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/Galaxy-lrc/cve/issues/1", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.269805", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.269805", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.364752", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-63xx/CVE-2024-6373.json b/CVE-2024/CVE-2024-63xx/CVE-2024-6373.json new file mode 100644 index 00000000000..c7bfc7b99ab --- /dev/null +++ b/CVE-2024/CVE-2024-63xx/CVE-2024-6373.json @@ -0,0 +1,92 @@ +{ + "id": "CVE-2024-6373", + "sourceIdentifier": "cna@vuldb.com", + "published": "2024-06-27T13:16:02.893", + "lastModified": "2024-06-27T13:16:02.893", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability has been found in itsourcecode Online Food Ordering System up to 1.0 and classified as critical. This vulnerability affects unknown code of the file /addproduct.php. The manipulation of the argument photo leads to unrestricted upload. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. VDB-269806 is the identifier assigned to this vulnerability." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 7.3, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "NONE", + "confidentialityImpact": "PARTIAL", + "integrityImpact": "PARTIAL", + "availabilityImpact": "PARTIAL", + "baseScore": 7.5 + }, + "baseSeverity": "HIGH", + "exploitabilityScore": 10.0, + "impactScore": 6.4, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-434" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/Abyssun/abyssun-/issues/1", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.269806", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.269806", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.364646", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/README.md b/README.md index 62865cf7346..acb3d651f60 100644 --- a/README.md +++ b/README.md @@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2024-06-27T12:00:18.766990+00:00 +2024-06-27T14:00:19.731170+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2024-06-27T11:15:25.193000+00:00 +2024-06-27T13:16:02.893000+00:00 ``` ### Last Data Feed Release @@ -33,25 +33,53 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### Total Number of included CVEs ```plain -255307 +255316 ``` ### CVEs added in the last Commit -Recently added CVEs: `5` +Recently added CVEs: `9` -- [CVE-2023-7270](CVE-2023/CVE-2023-72xx/CVE-2023-7270.json) (`2024-06-27T10:15:10.240`) -- [CVE-2024-0947](CVE-2024/CVE-2024-09xx/CVE-2024-0947.json) (`2024-06-27T10:15:11.563`) -- [CVE-2024-0949](CVE-2024/CVE-2024-09xx/CVE-2024-0949.json) (`2024-06-27T10:15:13.013`) -- [CVE-2024-5535](CVE-2024/CVE-2024-55xx/CVE-2024-5535.json) (`2024-06-27T11:15:24.447`) -- [CVE-2024-6262](CVE-2024/CVE-2024-62xx/CVE-2024-6262.json) (`2024-06-27T11:15:25.193`) +- [CVE-2024-1107](CVE-2024/CVE-2024-11xx/CVE-2024-1107.json) (`2024-06-27T13:15:54.560`) +- [CVE-2024-38515](CVE-2024/CVE-2024-385xx/CVE-2024-38515.json) (`2024-06-27T13:16:00.717`) +- [CVE-2024-6367](CVE-2024/CVE-2024-63xx/CVE-2024-6367.json) (`2024-06-27T12:15:29.653`) +- [CVE-2024-6368](CVE-2024/CVE-2024-63xx/CVE-2024-6368.json) (`2024-06-27T12:15:30.240`) +- [CVE-2024-6369](CVE-2024/CVE-2024-63xx/CVE-2024-6369.json) (`2024-06-27T12:15:30.750`) +- [CVE-2024-6370](CVE-2024/CVE-2024-63xx/CVE-2024-6370.json) (`2024-06-27T12:15:31.207`) +- [CVE-2024-6371](CVE-2024/CVE-2024-63xx/CVE-2024-6371.json) (`2024-06-27T13:16:01.923`) +- [CVE-2024-6372](CVE-2024/CVE-2024-63xx/CVE-2024-6372.json) (`2024-06-27T13:16:02.440`) +- [CVE-2024-6373](CVE-2024/CVE-2024-63xx/CVE-2024-6373.json) (`2024-06-27T13:16:02.893`) ### CVEs modified in the last Commit -Recently modified CVEs: `1` +Recently modified CVEs: `332` -- [CVE-2024-4983](CVE-2024/CVE-2024-49xx/CVE-2024-4983.json) (`2024-06-27T09:15:09.840`) +- [CVE-2024-39458](CVE-2024/CVE-2024-394xx/CVE-2024-39458.json) (`2024-06-27T12:47:19.847`) +- [CVE-2024-39459](CVE-2024/CVE-2024-394xx/CVE-2024-39459.json) (`2024-06-27T12:47:19.847`) +- [CVE-2024-39460](CVE-2024/CVE-2024-394xx/CVE-2024-39460.json) (`2024-06-27T12:47:19.847`) +- [CVE-2024-3959](CVE-2024/CVE-2024-39xx/CVE-2024-3959.json) (`2024-06-27T12:47:19.847`) +- [CVE-2024-4011](CVE-2024/CVE-2024-40xx/CVE-2024-4011.json) (`2024-06-27T12:47:19.847`) +- [CVE-2024-4228](CVE-2024/CVE-2024-42xx/CVE-2024-4228.json) (`2024-06-27T12:47:19.847`) +- [CVE-2024-4557](CVE-2024/CVE-2024-45xx/CVE-2024-4557.json) (`2024-06-27T12:47:19.847`) +- [CVE-2024-4569](CVE-2024/CVE-2024-45xx/CVE-2024-4569.json) (`2024-06-27T12:47:19.847`) +- [CVE-2024-4570](CVE-2024/CVE-2024-45xx/CVE-2024-4570.json) (`2024-06-27T12:47:19.847`) +- [CVE-2024-4604](CVE-2024/CVE-2024-46xx/CVE-2024-4604.json) (`2024-06-27T12:47:19.847`) +- [CVE-2024-4664](CVE-2024/CVE-2024-46xx/CVE-2024-4664.json) (`2024-06-27T12:47:19.847`) +- [CVE-2024-4704](CVE-2024/CVE-2024-47xx/CVE-2024-4704.json) (`2024-06-27T12:47:19.847`) +- [CVE-2024-4901](CVE-2024/CVE-2024-49xx/CVE-2024-4901.json) (`2024-06-27T12:47:19.847`) +- [CVE-2024-4983](CVE-2024/CVE-2024-49xx/CVE-2024-4983.json) (`2024-06-27T12:47:19.847`) +- [CVE-2024-5289](CVE-2024/CVE-2024-52xx/CVE-2024-5289.json) (`2024-06-27T12:47:19.847`) +- [CVE-2024-5430](CVE-2024/CVE-2024-54xx/CVE-2024-5430.json) (`2024-06-27T12:47:19.847`) +- [CVE-2024-5535](CVE-2024/CVE-2024-55xx/CVE-2024-5535.json) (`2024-06-27T12:47:19.847`) +- [CVE-2024-5601](CVE-2024/CVE-2024-56xx/CVE-2024-5601.json) (`2024-06-27T12:47:19.847`) +- [CVE-2024-5655](CVE-2024/CVE-2024-56xx/CVE-2024-5655.json) (`2024-06-27T12:47:19.847`) +- [CVE-2024-6054](CVE-2024/CVE-2024-60xx/CVE-2024-6054.json) (`2024-06-27T12:47:19.847`) +- [CVE-2024-6262](CVE-2024/CVE-2024-62xx/CVE-2024-6262.json) (`2024-06-27T12:47:19.847`) +- [CVE-2024-6283](CVE-2024/CVE-2024-62xx/CVE-2024-6283.json) (`2024-06-27T12:47:19.847`) +- [CVE-2024-6323](CVE-2024/CVE-2024-63xx/CVE-2024-6323.json) (`2024-06-27T12:47:19.847`) +- [CVE-2024-6354](CVE-2024/CVE-2024-63xx/CVE-2024-6354.json) (`2024-06-27T12:47:19.847`) +- [CVE-2024-6355](CVE-2024/CVE-2024-63xx/CVE-2024-6355.json) (`2024-06-27T12:47:19.847`) ## Download and Usage diff --git a/_state.csv b/_state.csv index 49a7c35c7e3..26f2d314cf5 100644 --- a/_state.csv +++ b/_state.csv @@ -137379,7 +137379,7 @@ CVE-2019-2050,0,0,419f51a7b9b454a746ca24d4fe999ec5c56d85eb7466b4a58770ff816c6a5f CVE-2019-20500,0,0,2282d6072ca4c5bc292e51d06f7c321a750bad7853e993efa5c4232a30419276,2023-04-26T19:27:52.350000 CVE-2019-20501,0,0,29fad07d0a1bf8d61d01a84ccceaf21752ff7e9ba1543beaa0b4f81f30e35791,2023-04-26T19:27:52.350000 CVE-2019-20502,0,0,901d6e4c750bb26161adfca814da204af89885e380b30132ba4faceeffbf6b0a,2020-03-06T15:17:49.887000 -CVE-2019-20503,0,0,e096abff477e808585735bb823bcd29a057ee299bc6c6e2c1d5e3d9a63459d77,2023-11-07T03:09:10.540000 +CVE-2019-20503,0,1,5bd204585c102dfea1e4c8094cca12b2252b9c0d2fd8a3ef0c9abae9372c4398,2024-06-27T12:46:37.940000 CVE-2019-20504,0,0,dfc9654a7d36d095c3009ff956a1e22448ace80b1b63d543db4960fa98ac42f5,2020-08-24T17:37:01.140000 CVE-2019-20509,0,0,b5a7efd74dd728e92453c8c55f2f5a3727ef01acefc4596af4a36001d7a074b4,2023-11-07T03:09:10.650000 CVE-2019-2051,0,0,32aaf9dbad4bfcaa26fbd35d2dcbbdad36f72847e24358d7c4ddb5a954b7e3d2,2021-07-21T11:39:23.747000 @@ -149124,8 +149124,8 @@ CVE-2020-14403,0,0,f508db7addc4a5042c64d547d7e97a214a036d5eb06ef226676df19aac1a5 CVE-2020-14404,0,0,ef8f8b21c46944aeb4a13dbd67d36f341ac0ee1cf4f7587c14a29acc13006444,2022-03-09T22:18:50.803000 CVE-2020-14405,0,0,1ba74a0de0b3b62cd79ae951e2aefb9323e01b720676e4e689d840cd35dbc94d,2022-03-09T22:18:37.957000 CVE-2020-14408,0,0,696aad9c2e8ce910625aaa56aa1d84a5b440d5af30b9c2bc2c583daca5ead407,2020-06-23T18:20:00.507000 -CVE-2020-14409,0,0,3030025ae304a63edd19689dbbbbe2b1f224f77f59dbba60854decd6bb220091,2023-11-07T03:17:13.753000 -CVE-2020-14410,0,0,016250a6ea8a9297ddb83bc8867ff93c25cbdefaafde33af4a45aa1ad032bbe8,2023-11-07T03:17:13.840000 +CVE-2020-14409,0,1,f2ccafa13c40224b73ad64d4a3fd02eef5ae80c929dc10ba1d092600fd44d2b1,2024-06-27T12:46:22.753000 +CVE-2020-14410,0,1,bc921d511c0036a6541c4b08d6d75dd6c7b0cc54fb21b7a714b58cc0cfcf275b,2024-06-27T12:46:48.873000 CVE-2020-14412,0,0,491bbfc484b64316c8c052252b8e64ccd0295d5c9f03e2a72a8ced6943565a57,2020-07-06T18:02:56.157000 CVE-2020-14413,0,0,679a7623cbbc0932dc1845cc12a53ae5d76a108306493eed0210222e55e7cd30,2020-07-06T17:54:20.170000 CVE-2020-14414,0,0,bd3d0e105a0d66a4bad5777729befab11cf0893638923300803688f244b95de8,2020-07-06T18:07:17.917000 @@ -177039,7 +177039,7 @@ CVE-2021-33625,0,0,be9fbdfe5707eb8c6dbd3bb9e73b4decac0191f3774bfe947f69629ad7031 CVE-2021-33626,0,0,d503a5b14d9eb0f80d72459e3ec556b5f2a35d8a8d0a4bde44c910050a4dd9cf,2022-04-24T02:03:42.070000 CVE-2021-33627,0,0,2f1c68e1ae6cdf2d5cf31d09db669cef9cdbbfac8c0f0c389d704588f46ba504,2022-03-01T19:53:33.707000 CVE-2021-33629,0,0,e319aecfc02ad238ce49f5abe4d506bb741abff00a1e3b15c2a21c892a0d8967,2021-09-20T12:22:18.847000 -CVE-2021-33630,0,0,c843ad8cf406751a737c42a14131c43598f545deb9cf4265c9101e558c19f33e,2024-02-03T03:15:07.753000 +CVE-2021-33630,0,1,8806f00586be96092b94b48f7dea24a506ba7a5a9dccd38f39a85e28d0032737,2024-06-27T12:15:13.147000 CVE-2021-33631,0,0,8ab6aa4210a1ecf2c08088a7e0801d08fcbf957a3be31ac7e5134e5c5a7f2898,2024-02-03T03:15:08.760000 CVE-2021-33632,0,0,4bfb6f1ffc8b527aa6e58a3e676aaee0dc39850a9085dc1165e55c09204c5af3,2024-03-25T13:47:14.087000 CVE-2021-33633,0,0,59b8667ed94071d801dbdefb5e54aeb0e30ad68184f302c3336ae972cd4f3f86,2024-03-25T01:51:01.223000 @@ -212032,7 +212032,7 @@ CVE-2022-48623,0,0,35796016b2974df38876f788a8262118276143c1be8b81a53a3c19ad98585 CVE-2022-48624,0,0,49c76b44b5a7b6a050d929bff34fd40a8559d10542dbdfbbc862cce315a1441e,2024-06-10T18:15:19.857000 CVE-2022-48625,0,0,7bc403b36bf8fdca3e98a9856c6ae990f3da4d13f0f27b5e9dd4164789f34420,2024-02-20T19:50:53.960000 CVE-2022-48626,0,0,fe9ecc659da3a3680a7b1ff34d0eba00cc9cf4e4a95ca902684bc881fe5e286f,2024-04-17T19:28:53.540000 -CVE-2022-48627,0,0,22229bbcfc221c1a66d57361893659703193a672850e59d004737cb18434f698,2024-04-13T12:15:10.870000 +CVE-2022-48627,0,1,e0fd7868d67acccc02071313e930b8f278713cbfb228ece8da2504916e8c72e6,2024-06-27T12:15:13.380000 CVE-2022-48628,0,0,53833f4c493a0dc2eadce20e074749d0beda4aee81d045b4d048c848f17d5c49,2024-03-04T13:58:23.447000 CVE-2022-48629,0,0,fa048196d2bfc6b10ff3d7f516159c362398b51507f15ab4e218ad5e1ec3c673,2024-03-21T02:44:43.813000 CVE-2022-4863,0,0,5b47f8c32121fc9ba1e1299b8649a0bce6cf67f9d99ee5110f7455ebd1e4dead,2023-01-10T15:19:48.147000 @@ -212651,7 +212651,7 @@ CVE-2023-0382,0,0,6c39c721e041b8796454962cc0f98b0f1bbf32d35c7bede2daaddd2c42db24 CVE-2023-0383,0,0,94ad65063d295218fd6468c7871f3fc97eab5bd939a439e67a2b6b351f6355b1,2023-04-29T02:55:28.667000 CVE-2023-0384,0,0,b062e4a2753c5e0a28988a67055fc692397169acfb625427a9ee75ab8fd1f9e6,2023-04-29T02:58:48.810000 CVE-2023-0385,0,0,b4803af44d0effde342329862534c87cec952eb4ba95624c461062065f2b9bfe,2023-11-07T04:00:22.740000 -CVE-2023-0386,0,0,5f4d8f8baf3a5e89d3a60b50ea14fe19464d1d70a6a16d4a61cd31d003ad059d,2023-06-26T16:56:54.607000 +CVE-2023-0386,0,1,faff430d1db7c5186d0e5b7323f0e1633589b2d356410735a3b81d105176b3e0,2024-06-27T12:15:13.477000 CVE-2023-0387,0,0,5214faec1d7654d3d108ecb18d728acf637b584506f79fe8c7bdab884a6623c4,2023-11-07T04:00:22.913000 CVE-2023-0388,0,0,177501338e4bb2809f5a7c4f61e562916ee8c0cf8b08cf9fa5589c2312825894,2023-11-07T04:00:23.300000 CVE-2023-0389,0,0,43106f48777604a84fda49f5c2481ad607fd937199acd566e3927fbfc8a600b5,2024-01-22T19:51:39.840000 @@ -219796,7 +219796,7 @@ CVE-2023-26865,0,0,cbacd4fe69c0136728979e2ae2fe702ff46f7f7d669f4feea46923bb4ee48 CVE-2023-26866,0,0,151be8a97651a0e548c74820760a29774479cb3d646e42557c1aaab3358f7f3d,2023-04-11T15:36:22.103000 CVE-2023-2687,0,0,0a001eebc53069fe0bd4b690bf9df222372f659249c69713a16cd3f68cc536ed,2023-06-09T17:45:05.567000 CVE-2023-26876,0,0,1827cbd2e88cd42a44ca3f228cbfd5dd6f65e45c53ec69ac524e19cf8b4aa490,2023-04-28T16:15:09.780000 -CVE-2023-26877,0,0,5de650ba8bedeba2124ee9f028e990d718a289ae3b8d5844145259c1ac9be203,2024-06-26T20:15:14.777000 +CVE-2023-26877,0,1,f3ca8cb9139dea455127946f8e796e3a76ca97fd1df0d7d0c89fa85369c5c0dc,2024-06-27T12:47:19.847000 CVE-2023-2688,0,0,aedb75c63d7452cfc6b8a2a87a95fd37474120ed26cc68e8e9e135a369e6a445,2023-11-07T04:13:08.290000 CVE-2023-2689,0,0,1bc801e942af236f0425c115b19aa0aeefaf373687262bf85be2dde118c3c041,2024-05-17T02:23:11.003000 CVE-2023-2690,0,0,120a9631cbdfc5bb488dbbccddce7dab8fd0c9fcfac74176ff13adba89a427fc,2024-05-17T02:23:11.117000 @@ -234587,7 +234587,7 @@ CVE-2023-4683,0,0,06c338d26ebd0cec14ebc6acb83522e458e5100b500f1098e1caf91bbc2253 CVE-2023-46835,0,0,5e3a8a2c88b8606742d81aa6a20dbd63da635051f9ec40570a12a1d743a6c658,2024-01-11T15:56:04.093000 CVE-2023-46836,0,0,b3296f4cf295f877e595ec4c4eedc90c101f12cac558d93d6646627258bdf3e0,2024-01-11T17:09:02.020000 CVE-2023-46837,0,0,b1eee882ee936ba08f6b0d04248c20b91307505e55e856163faa63f2057b71f3,2024-02-15T03:15:34.683000 -CVE-2023-46838,0,0,23aed31d873cbef4286c7f57799a30d60b5a052c8cbb44fe7edf5e00c717072a,2024-06-25T21:15:51.243000 +CVE-2023-46838,0,1,04be885a06ae154a923b95281acf2889c3972bb97e3adff9ee594e474dbf6526,2024-06-27T12:15:13.670000 CVE-2023-46839,0,0,e482c60e69d38847cd595c6dfba2410a4c23f94682c9dbafa4bceba5a3f810cf,2024-03-20T13:00:16.367000 CVE-2023-46840,0,0,dc38a2db61d42c3f8c3cd5afe75ec2863f15a3b013cf6a84bd38f19d0365f094,2024-03-20T13:00:16.367000 CVE-2023-46841,0,0,9b643cdb2d59cb17cbeb63d95546812e546159f6fd4a4cb7111a236b20021663,2024-03-23T03:15:09.740000 @@ -234865,7 +234865,7 @@ CVE-2023-47229,0,0,a093be6d3d49e928a8f5065f8eb662d353d0c040a82e02fb7e5ef67068bf2 CVE-2023-4723,0,0,f6c1ffe60bbd1c1916dfe81b644532f2801b498c64cbf9c5b540830e9916a420,2023-11-21T02:30:52.053000 CVE-2023-47230,0,0,98e54ec85149eb5b7a886246e70faa9789424eff695d2b80f1f18594563dc7f2,2023-11-16T23:42:46.737000 CVE-2023-47231,0,0,52a0fc4892df54cf36480ba4cd483981c6f7b112e09729fb822f624c1979cdea,2023-11-15T16:21:11.800000 -CVE-2023-47233,0,0,0bd2baea011ead6717a80c68b6fea1f98c99e99090df023aa2fddb89a46ed3e4,2024-06-25T22:15:14.267000 +CVE-2023-47233,0,1,f218de1aa213737abb82ac9db8f945feef1a2acc74d030ea2fa8cb512c6ec493,2024-06-27T13:15:52.623000 CVE-2023-47234,0,0,2789fb6053c1e8a11522a688aee6f2a244ebebed599b2e822033da845b9ed62d,2024-04-28T07:15:08.703000 CVE-2023-47235,0,0,15f2454b87d18384661fef3e851716f49203fc6cf99784f467ee56364a4d98f7,2024-04-28T07:15:08.770000 CVE-2023-47236,0,0,b0b312089de1fa4b30acc4988ffca55daee03fe17197415e08738b0e7d2a16c8,2023-12-28T20:07:16.600000 @@ -238326,7 +238326,7 @@ CVE-2023-52425,0,0,19f5f1f610e7e506c4d778c82164ba7030bd5106da3f5feccd7ca382e29d4 CVE-2023-52426,0,0,a83b975d267204be7bc0424d16dfb1a6cdd5c043e3c113cb1f287aa4ec1048f1,2024-03-07T17:15:11.893000 CVE-2023-52427,0,0,be2b46c98a20c5335cfed98aebda5a04703080b31668e3b67cb2b068780743a6,2024-05-17T02:32:38.427000 CVE-2023-52428,0,0,6c437fe0d4e52614ea6a8237c22aa4d5c302e30a559af83b04f853a4d891470f,2024-02-11T22:29:15.837000 -CVE-2023-52429,0,0,54a6b5719ba13e0f25d34a54c658c124a9c39f8417bc6d171ff9e3d7d02ecb78,2024-06-25T22:15:14.433000 +CVE-2023-52429,0,1,831e914c897b063195f4f171c5ac1286d38af94a18bbb0e4acc18781a3cf1217,2024-06-27T12:15:13.797000 CVE-2023-5243,0,0,c84c98bc662840372bb3f6eda1ad149cb2f2941942ba96750d72e9684f09cfbb,2023-11-08T18:40:41.847000 CVE-2023-52430,0,0,d42ac76eff7e870ccd425430baec924966d37450b40a663564ae4a320330fe89,2024-02-13T14:01:49.147000 CVE-2023-52431,0,0,c693cbe76127faa54716f414936fa58bc8929839973e4bd5352d442ea2d0fbba,2024-02-13T14:01:07.747000 @@ -238334,21 +238334,21 @@ CVE-2023-52432,0,0,d9e628cd1ba368f63ce7d4aa2f3fa1ad3ace9f6cbad32032b51f0e38a1c9e CVE-2023-52433,0,0,7cbe0daa6cd2574175b01642206fde2c25b2224b5e2b47f57352f5e6362706c3,2024-06-16T13:15:50.413000 CVE-2023-52434,0,0,99ca7be41dc43b24354814f299b0c9ac1a7eaa15ea8eab51383104109e760ab7,2024-06-25T22:15:14.567000 CVE-2023-52435,0,0,56015d7f3b2b6067db65d56efe3201e159838795b79756249de9b64decff2668,2024-06-25T22:15:14.763000 -CVE-2023-52436,0,0,b9c8f2916ba7ed8f3c6548ceed60f4beab117b7d4226f6f894b1d4de0abee260,2024-06-25T21:15:51.747000 +CVE-2023-52436,0,1,32225e9f6bd30e092ae00feeeb78c0b2a62e197d64fbe83552a0bad41313730b,2024-06-27T12:15:14 CVE-2023-52437,0,0,91d3cc3a51673e754e25f139cf45e627b67188a0988727604c925b81f4f0227e,2024-02-22T13:15:08.020000 CVE-2023-52438,0,0,28f95aed5d48c861ae6cee73849923965072995e1d4fbd0f24ffc97bccaae30d,2024-06-25T21:15:51.867000 -CVE-2023-52439,0,0,6123fcdf72beb976bb7deedd6ae7f66767a3f9b2ac45335175ccf37c4cc7aa53,2024-06-25T21:15:51.947000 +CVE-2023-52439,0,1,8ea6960b14b188e90b70c6687fa0e425a24645a49bd81b050d457ceccc1e4964,2024-06-27T12:15:14.160000 CVE-2023-5244,0,0,2d7ccf46570f7a789336019a996859f3eea1c41d32a5a30c878bc5f986cf3b6e,2023-09-29T17:53:12.883000 CVE-2023-52440,0,0,be5a48e7a5c889281f6feebfe9cdcc6dc5f042cb75f2a778c2f88b11434663af,2024-05-28T20:16:22.187000 CVE-2023-52441,0,0,fe60630a2ec97a42f918bdf6fa0c1e7320471c603e532b595aa78f165e1ddb69,2024-05-28T20:16:22.480000 CVE-2023-52442,0,0,65bcd6aef482b89bcfdca242c964e11f579299ba3e7dbce5d86d6b43aa1dccd8,2024-05-28T20:16:22.830000 -CVE-2023-52443,0,0,cd2c0741c81edb6be80408985cfdddbe62b08f61a43620b0d2fcb7ab1e642bc6,2024-06-25T21:15:52.040000 -CVE-2023-52444,0,0,a9aa28ce6c3676307a746b818e9e239bfe66015ef29bb8120e03f477403ff317,2024-06-25T21:15:52.147000 -CVE-2023-52445,0,0,32ef1e3249f6cfbd2856da065a3a94f9d69442d0888f1ae6f7fd18c77701a12d,2024-06-25T21:15:52.267000 +CVE-2023-52443,0,1,cd9a877f80c269bca529fa6d88555cdcd5f584351185e2799784eb24a1e040b2,2024-06-27T12:15:14.257000 +CVE-2023-52444,0,1,838ae74e4a6240281e615c4782fe74b0a65ec9be69626a844dd709afa5499f57,2024-06-27T12:15:14.353000 +CVE-2023-52445,0,1,281f0f7ccfbb7da0910c9098cdd8bd951ea86af2765ac4e97cce6fcb8ae09701,2024-06-27T12:15:14.443000 CVE-2023-52446,0,0,14bc79a6a49f12d7cdafb16072e7c790691dec958b76a4059d44e85538fb1528,2024-03-14T19:47:14.733000 CVE-2023-52447,0,0,2253f6aa96e7c6ef80d7ea72a1b6696f10bbb7abccc033c6a5e96d8fd4dfa5b5,2024-06-25T22:15:14.960000 CVE-2023-52448,0,0,66e4e3f07759335466dfd76eda407af84f0c819ab73a89bede560c5ac8a68d11,2024-06-25T21:15:52.380000 -CVE-2023-52449,0,0,b3f8486651831ad098f0ae3f9a9dcbe7b86a6fc40eeebe46c82874578263d02e,2024-06-25T21:15:52.493000 +CVE-2023-52449,0,1,7fc5a5a68ae64266a974c3015be99250503a3f64fa13802028588bc56fb1332d,2024-06-27T12:15:14.537000 CVE-2023-5245,0,0,e4b08d166fa624efe0905252122b9076873a0aaf2d4a309ee2e9db34327ff065,2023-11-22T22:39:07.763000 CVE-2023-52450,0,0,2bab0519c8c73ad4475ba6c1040107cc3bb5f758499ce6a9019d700dd0c9b8a4,2024-03-18T18:34:16.497000 CVE-2023-52451,0,0,e49626a626b220e58e44244bf91cb41b8e43677ee9f47fd4c9a0c3a0fc51ebae,2024-06-25T21:15:52.593000 @@ -238365,14 +238365,14 @@ CVE-2023-52460,0,0,9a9871abd62065b1bc8617900676e231f93474bdcf509de618a4f0a8c85c3 CVE-2023-52461,0,0,719a65925f951c681f50c05e9ce85d8b5d8fa1d42253944e773762e89d82d323,2024-02-23T16:14:43.447000 CVE-2023-52462,0,0,7af2cbaa1864dbd24a9f1622f9b3673cf2c4626c71e8fac7bf6f6469a582810a,2024-06-25T21:15:53.060000 CVE-2023-52463,0,0,7f36b2762247f19ec7e679953737a054693970995b6093eef7d28738e23ac4b4,2024-06-25T21:15:53.157000 -CVE-2023-52464,0,0,c3e8dedb510f481d87a838a4e1b2cc8712a84cc5335eabc381ed38f7ab05c244,2024-06-25T21:15:53.253000 +CVE-2023-52464,0,1,d5ff7a1e0a1dec3b521809e545332604d4643a4735e99d38c742058adbb34c51,2024-06-27T13:15:52.907000 CVE-2023-52465,0,0,6a5dcf0470f7260e5fd224572c4161bebbfa4c6574c6970c9035eff59a929169,2024-04-17T19:16:10.137000 CVE-2023-52466,0,0,56f8cc53f82884aedbecde370c65172b4b8e71564d7391aaf8319e40e8aedfea,2024-03-03T08:15:07.860000 CVE-2023-52467,0,0,9c22e7977ad98c7e0e4372efb2febdb56e42a83f8b5c2aca4c0a76795ba37725,2024-06-25T21:15:53.350000 CVE-2023-52468,0,0,fe3f595a9e32527f64ad43de3bd7face21975d6f52b454b14553492f7129b561,2024-04-17T19:00:42.287000 -CVE-2023-52469,0,0,180346149c42e5594c9917e36cdbb6ace53540c72d7ba95eda5bc012c54e5436,2024-06-25T21:15:53.473000 +CVE-2023-52469,0,1,8e24fdc345839f3fec7ebbd0efd68cae56853e1c19d4e78ff007439a385f2bf1,2024-06-27T13:15:53.007000 CVE-2023-5247,0,0,1476fd60cd067d05ec1c6bec9fda463c4aea196d092298e87bdb01efe1f6d4ee,2023-12-05T18:28:03.620000 -CVE-2023-52470,0,0,6ac4443d327718190ea8cb063d17c535dad09460e4cc6f6f16e731eb75539458,2024-06-25T21:15:53.603000 +CVE-2023-52470,0,1,254c27198c6ce4c719a2f5cf66dbf7fc9a2ae7585f862828307e4927b906374b,2024-06-27T13:15:53.093000 CVE-2023-52471,0,0,e6a09c3263f5ee25f272c7210d9c40fff45789f95839246ac1f5db8c7fdf7f3d,2024-04-17T18:59:17.447000 CVE-2023-52472,0,0,edc4f7e5d10bf4a89ae0187405990e8427761603a834ab938210e497cc202d0d,2024-04-17T18:47:08.097000 CVE-2023-52473,0,0,d09aff827319bc04f5ef644dc78ee7877cac2a37a8095f47a84a2bc16cbbedcc,2024-04-17T18:30:15.123000 @@ -238388,7 +238388,7 @@ CVE-2023-52482,0,0,dc8d8899818cda57155c186d2b2497214dcb1176a70555fa6840963077b5f CVE-2023-52483,0,0,2a4ebb0c9b1f8206c0612e11bb23dd9226ede2d27e2d0d82dac525d0a27fbaad,2024-02-29T13:49:29.390000 CVE-2023-52484,0,0,d5ee2bf5164023741424c58784b9debb4274eef9f1dfe6d2acf7ec42fe245e94,2024-02-29T13:49:29.390000 CVE-2023-52485,0,0,22360ef1db3deb325545b1fee92ee4427b382b34368b25bc35165fa19272ea40,2024-02-29T18:06:42.010000 -CVE-2023-52486,0,0,6a4e5dbe6a033658e5264954445e61381c6a289eb9380bf737f81ff149cdece2,2024-06-25T23:15:22.230000 +CVE-2023-52486,0,1,9fdf2be55de582f7905e210dff16a1cdee55082a0519ced31c129176372c1a0a,2024-06-27T13:15:53.220000 CVE-2023-52487,0,0,3a3e78ea084186adb0371544efb8f82f408d5369c2752062166753139b8af6aa,2024-03-12T12:40:13.500000 CVE-2023-52488,0,0,36d1bcdd5eea0c015d4ea7995b92de787572d11131cea5de38143fd765fb8b1f,2024-06-25T22:15:15.140000 CVE-2023-52489,0,0,4f90b8e08c302884e41cdc6c08a1a5c753a54199d0a445e09422e43dc2c21cdc,2024-06-25T23:15:22.287000 @@ -238495,11 +238495,11 @@ CVE-2023-5258,0,0,8c838a39897675f7ab9b96c019dec0448aa9d1dd663feb7e4cb4edcf9efeb0 CVE-2023-52580,0,0,38e39d54b289b1d49bc482c0da82d43253808df5c467ad8b75029fb59c58f447,2024-03-04T13:58:23.447000 CVE-2023-52581,0,0,2b212fcda1253195d9357bd98ea8377286e246d1ad4fab3425c532a420475317,2024-06-16T13:15:51.120000 CVE-2023-52582,0,0,af72e59c52b97139ded26cd2d75f3c2f4c5f30802b950ea3345cee3766393993,2024-03-04T13:58:23.447000 -CVE-2023-52583,0,0,be57d3d01c30ff6af83113fc7150d8554a2d564655373f5cdb0432e0b9ca94ac,2024-06-25T23:15:22.357000 +CVE-2023-52583,0,1,4c3aef56f23ebdf699d655953f293186263cfa2a23947a39f509adddfa28ff50,2024-06-27T13:15:53.290000 CVE-2023-52584,0,0,294fd6cdb995cc1ce891fb09ba4fe5675061ff59f0b22f574ca6870ee520db80,2024-03-06T15:18:08.093000 CVE-2023-52585,0,0,e3c90b6844fbbec3158204b41d669e3e864244fecfce923284a114b6a90d14e4,2024-05-25T15:15:08.607000 CVE-2023-52586,0,0,8e65ea7716873e2221da12e8eb2b0f2ae0fd71da3242e0f481a3cde4357c6304,2024-03-06T15:18:08.093000 -CVE-2023-52587,0,0,c07b4421e5d7124080d318ae6aa8266b3f891c5d1e7292f02b54bbe6234d75ff,2024-06-25T23:15:22.417000 +CVE-2023-52587,0,1,01941424f9eb501f20b19ea9f4e0e776145893df9e6d624fee27f86356f61d85,2024-06-27T12:15:14.760000 CVE-2023-52588,0,0,e70c44839baafdcc20e51cbf2dfc77df48c28605a1eba7f685512a034ccad0e9,2024-03-06T15:18:08.093000 CVE-2023-52589,0,0,a0879396144b65262a4cfa8147d14827e0a4c1539b8b79fc02e4cbd189f9a3db,2024-03-06T15:18:08.093000 CVE-2023-5259,0,0,280b7f0792f5c950d45d1c0f0d54835fd1a632496711027b23de9ab77107a44c,2024-05-17T02:32:55.617000 @@ -238507,44 +238507,44 @@ CVE-2023-52590,0,0,2d17ce374923cbdfe1ed7071ea15705eab56de62c6b6b76b613782023c442 CVE-2023-52591,0,0,1d4b43aa07b7c1c707c535b464b499a18046af9f1354b3c9e2289a62e8c4141b,2024-03-06T15:18:08.093000 CVE-2023-52592,0,0,3b18a77fd085b3335ad56a2bb41913138946069a78339379db0880097f8a992e,2024-03-07T21:15:07.620000 CVE-2023-52593,0,0,6db2b5b0b31d0c6eaea89baf4de13444b83585d8ab985fb8d4f95ea2c21b1baf,2024-03-06T15:18:08.093000 -CVE-2023-52594,0,0,1b49b0efbbf59e990cb7f80db1e093aec6c94e52764b65e84b6133e45ac28d83,2024-06-25T23:15:22.490000 +CVE-2023-52594,0,1,5306c9dcdcaa5670eb533bb4444518f5ad5b04b842dcd044b9e2e6321f974eaa,2024-06-27T12:15:14.887000 CVE-2023-52595,0,0,f27c7c67b71b3c5db3c7ddaf85cb83cf4356ed509ccc3884676352b5be7c1035,2024-06-25T23:15:22.550000 CVE-2023-52596,0,0,f1f1f4aa7372ac69c74f400c7595db6907a4f37000ab70c8a1c34e2360e30ecf,2024-03-06T15:18:08.093000 CVE-2023-52597,0,0,44ce3df61f64f81c3f470a2c23e5f00e058fd941dab007d08ba09f391297e2fc,2024-06-25T23:15:22.610000 CVE-2023-52598,0,0,ea479b497e4a5e1034f836943bd90feafc2cd4fbe03a11251a825ee6c286f4b7,2024-06-25T23:15:22.680000 -CVE-2023-52599,0,0,a5e2729e26761c22f3a2aa28d80ca9b66690b5596d813909ac0dfef86294d078,2024-06-25T21:15:53.783000 +CVE-2023-52599,0,1,2afedab494a1850f2d47139613f17e15d45a1918aaaf431122b63c668f716614,2024-06-27T12:15:14.960000 CVE-2023-5260,0,0,5f85ceca2ad7617e6b323faeac4104c87a017016a62ea4ac3563b58e42b8d56b,2024-05-17T02:32:55.730000 -CVE-2023-52600,0,0,f109a2f484ce6abb4fea94a740fa89595cb1cdeb41fc0adca41993f14e51a14b,2024-06-25T23:15:22.747000 -CVE-2023-52601,0,0,6f94a774395aec3a6c8ce0fef83c6e10d2f2d913eedaeb5f802f5d102ae5c6fb,2024-06-25T22:15:15.490000 -CVE-2023-52602,0,0,5f644765e3a47a7b6f78acc13a68c8c239bbec140e6f0c285b243e56fa09ebb9,2024-06-25T22:15:15.563000 -CVE-2023-52603,0,0,51900ec70c563c4194e83bfce893a3c29a5280711a642ddd3ffb7bfadbf47759,2024-06-25T22:15:15.640000 -CVE-2023-52604,0,0,fcc45c23d9d58adfe4d15dff03828b3d8ea38a89f333f95fd8565064463ccd38,2024-06-25T22:15:15.713000 +CVE-2023-52600,0,1,d9d226f48933472cd39d79e94a20ff1a2054acc93d0d83021f3b008bf97214b1,2024-06-27T12:15:15.037000 +CVE-2023-52601,0,1,36d7eae2d9faed7af9b07bc967cd4eff54c9f58250e47cd6a1985d0ac772a347,2024-06-27T12:15:15.180000 +CVE-2023-52602,0,1,6df756d897ad38ea033fd28a8ebadf0d4b49168ceb728b6a6a935b5153acde57,2024-06-27T12:15:15.283000 +CVE-2023-52603,0,1,6bc2c634467975bba3c3b37d097d8bb1ce08ad0bd660c227efcffc723a47e5e8,2024-06-27T13:15:53.370000 +CVE-2023-52604,0,1,a388e511de2aa9d9f7baf0793a9f68f8125d5cdd2177023827bb62988d1cf546,2024-06-27T12:15:15.360000 CVE-2023-52605,0,0,1b37f3d575cc6fccdf3f2b9baf5dd90683d0ab63d10c2f813ddefc64e14a5b63,2024-03-18T15:15:41.097000 CVE-2023-52606,0,0,fc7b7a00a2b1abe600c5f8d3139b13b784891db20eb74fc6a6d46bdfa6427482,2024-06-25T23:15:22.830000 CVE-2023-52607,0,0,605082c096a113526887dfe480cc63a53e9d1a2d8bdbc266117cc2aa6687fab0,2024-06-25T23:15:22.933000 CVE-2023-52608,0,0,1be16f71a5b739d924a573278e93a2864180b755e33191112a908195e6568a35,2024-03-13T14:28:45.217000 -CVE-2023-52609,0,0,abacd0dcd82691424cc49e2b3e65ddeaadf1ba4d1444a6c15eb8e3ce6c7a3ed0,2024-06-25T21:15:53.910000 +CVE-2023-52609,0,1,6775e97606e8513e9353bae3b6a133f5242c33883ca13cd22b99d19a415e1044,2024-06-27T12:15:15.430000 CVE-2023-5261,0,0,383557a7848c07724ff68e308d86650d4c650e1d7981fbacfd052a726c01b63f,2024-05-17T02:32:55.890000 CVE-2023-52610,0,0,ebaaf65a540d2d00c4af03f0e9706e60a1009d9da7920c40e2c8ec7ab71ca2b6,2024-03-18T12:38:25.490000 CVE-2023-52611,0,0,adfea1110379d41eef258374943e124ecab67c2f114c78e000c2827978075fff,2024-03-18T12:38:25.490000 -CVE-2023-52612,0,0,14688f1ee8330def4fd01a43be8d80b0001969c49232dbd5a6131b11d0471d33,2024-06-25T21:15:54.010000 +CVE-2023-52612,0,1,9d4b7424297089ffce208a4b252191069758797e9f35a897ab114f3637211779,2024-06-27T13:15:53.470000 CVE-2023-52613,0,0,2a6a775fa4fd80939ff842c405dbd6a4a567d8e153ce0381397d1e3184eb21ad,2024-03-18T12:38:25.490000 CVE-2023-52614,0,0,78f669d99763283fd4d530e796ab6f0d0b0274ded4a48157dada3743890fd213,2024-06-25T22:15:15.793000 -CVE-2023-52615,0,0,0eaf68cd3153f610482724bcbc701d01b4c64934386849ebc4e07de0a2fbccee,2024-06-25T22:15:15.897000 +CVE-2023-52615,0,1,bb0cf4556bb9b578595d4d096162aa9efb6169afb00609e2799771b16a631903,2024-06-27T12:15:15.583000 CVE-2023-52616,0,0,f243113e0f3800ab7e310eeb2c0ab470334e967f91310874745c96ec71a9b372,2024-06-25T22:15:15.973000 CVE-2023-52617,0,0,be5b4a36bb265801a3379e1a7a552ebdcaa2c9ccd132b24943528860c34895f0,2024-06-25T22:15:16.043000 CVE-2023-52618,0,0,7e75c697f94698997f645d1479e662cd990361cc45dc5b51afd6a72632979faf,2024-06-25T22:15:16.113000 -CVE-2023-52619,0,0,b27787ca3d109c28cc9b1956c2909a093c8c8c0b019fb58e9d11735ddc05fa3b,2024-06-25T22:15:16.180000 +CVE-2023-52619,0,1,105e31d8fa4f82c7225814aed57959e778d588de6d5f125f20f0b549dbb79179,2024-06-27T12:15:15.680000 CVE-2023-5262,0,0,1701b78f54ae39104fd01799dfc50c23c06b2d9fecefe0d587b912bde50d0ef3,2024-05-17T02:32:56.017000 -CVE-2023-52620,0,0,bd9e6aa64d5e6757e6eafeb86f1f3ae57151e6d53d9734f5db325e194bbc1b26,2024-06-25T22:15:16.247000 +CVE-2023-52620,0,1,052994742d7b383e44eaa53a06208bb00848156bbb7c499727eb2b369b4807b5,2024-06-27T12:15:15.823000 CVE-2023-52621,0,0,ee5b542ece925ad3f74b71dba6e811ed8d9ebeb5c23794b8204db003b8fe3ee6,2024-03-27T12:29:41.530000 -CVE-2023-52622,0,0,961996a20090b45cb592c855c9491d78db307e6d0611d106d4c19fc575701082,2024-06-25T22:15:16.363000 -CVE-2023-52623,0,0,700969857b9a9beb93c45eab0b4ef7e42222c4d41ce50305f962cbea5ea88a63,2024-06-25T21:15:54.097000 +CVE-2023-52622,0,1,fb3aaed85b23fc4b182868280759b6ffcf6210764df0c6006574fc42b5b91150,2024-06-27T13:15:53.560000 +CVE-2023-52623,0,1,4edffff3cc0fca5c866cbc4571e2fb7e565dd2ee1e79aa1ea832d45c1ed7ab01,2024-06-27T13:15:53.653000 CVE-2023-52624,0,0,b16dce29ed9c63cade8c1b6af9307f28b1224cd2e8984efbcf548c3c0652d087,2024-03-27T12:29:41.530000 CVE-2023-52625,0,0,49b56bc49c9271b8c1df5bd3c99737ee59c9add393768bce674e06114532904f,2024-03-27T12:29:41.530000 CVE-2023-52626,0,0,d8d3ee68ba62d1ed21932baaaaa8f32a3ee412eb32ae4f625f9f67077f56874b,2024-03-27T12:29:41.530000 CVE-2023-52627,0,0,7a77e4612c9e57577a05f2d3e287ee6acab851a90b631b66243ec92d6c73c1ff,2024-06-25T22:15:16.457000 -CVE-2023-52628,0,0,f5033cabdb266e06e4bb388ebf5413593776a1b6b2f946ccd475f9d2ab32442c,2024-06-16T13:15:51.227000 +CVE-2023-52628,0,1,6899123d8efd48054dd100b610323cb94be888e4892059647fdbe17c6fc85435,2024-06-27T12:15:15.893000 CVE-2023-52629,0,0,c2b47813411406ce2764ee3e378a85b7d3bc040a958f3c0591cdbe8559412c56,2024-03-29T12:45:02.937000 CVE-2023-5263,0,0,a93a4314a3c33b27f6375d887061b92dc4ada275e8c66e1e296dcbaf528ee76e,2024-05-17T02:32:56.130000 CVE-2023-52630,0,0,5775dd46232bc5a0625a4a9f601f3671c4246a60e28369ff24e80a7e2f52040e,2024-04-30T09:15:06.730000 @@ -238562,14 +238562,14 @@ CVE-2023-52640,0,0,4cfb468b53d62ebcf2597bdf4be539e0512b8a8f11859b92121e281fe920b CVE-2023-52641,0,0,dd5ecd1abefc6e9370c1cba71ae98a952c1263dba3b6557ad136a5809b689e8c,2024-04-03T17:24:18.150000 CVE-2023-52642,0,0,d06494f12bd8870a675dc9a023c804d9ee6c2376188f7b2dae48d937dbea1bea,2024-06-25T22:15:16.690000 CVE-2023-52643,0,0,5efc9d9f9dec4b2c7c66597dacba29c72ae2d167455c13a17fba02f62b3763aa,2024-04-17T12:48:07.510000 -CVE-2023-52644,0,0,8dc82552b624a58e7c41a4738392097087180e5e66d5237d578cd49c4bdb6e20,2024-06-25T21:15:54.213000 +CVE-2023-52644,0,1,5b69b781fff3f3019f4fe19539e7e4fb199fd906bcb553bfff4466726642dd9f,2024-06-27T12:15:15.970000 CVE-2023-52645,0,0,3a76cd116c9d4904026e6b226311e0241ce11d7da09124ef735f392892370794,2024-04-29T19:13:16.693000 CVE-2023-52646,0,0,747f99cb12691d995449e3e99d9f156e3fec4384642e19c0454b8b3281e9988b,2024-04-26T15:32:22.523000 CVE-2023-52647,0,0,982119fa786c4bb1c1118c986d2c80a44b84d4ce608f8caf47cfde9b6c5b94fa,2024-05-01T13:02:20.750000 CVE-2023-52648,0,0,7cb045e092ae009e65afc59d39ef7c274d57457ff2f471de47b88b81f30a4619,2024-05-01T13:02:20.750000 CVE-2023-52649,0,0,ecfb3f94b4c0376f2c6406da651b4a6d02b0d28835bf98d9bb9657cf9a943d0b,2024-05-01T19:50:25.633000 CVE-2023-5265,0,0,fad2fadd720305b4a1f0532469440d64cc6eaf77b46cb6f27cc6f43e304f4e5d,2024-05-17T02:32:56.350000 -CVE-2023-52650,0,0,8a1d6b3550aa6d1ce0d87bc6c4e6112e84375f2e3ba0b27aeb78861033d9615c,2024-06-25T23:15:23.023000 +CVE-2023-52650,0,1,57cef90715fb05ff97a5a4ca399ee1a8a57964577d8698ac7346a40931509b2e,2024-06-27T13:15:53.750000 CVE-2023-52651,0,0,b4f3a0cd669ba420fce4a6d4537b1eeb00fca2d8899e3172188c84b869ede5da,2024-05-02T10:15:07.500000 CVE-2023-52652,0,0,ed03963bdef12b852fe6af3857f553344579f66b34ec0a7fe56b0c4bc4c55816,2024-05-01T19:50:25.633000 CVE-2023-52653,0,0,7229f3f01c830ab44bfdb842a01e7ef5c67953cbcae8c7257136f273e959a27d,2024-05-01T19:50:25.633000 @@ -238591,7 +238591,7 @@ CVE-2023-52667,0,0,787093db68bf1b9b20596d7ef1261e24adc5e62f6348f729d5ba8574fb3fc CVE-2023-52668,0,0,4d2d993ac1d820e293c0f61b8f61d3d9a89e72171c702092ea81b4ccfb9f39e8,2024-05-17T18:35:35.070000 CVE-2023-52669,0,0,59e6faaa43234715ba02f44d3e31f6bf98121f38bfe4efd79b3ef2ea8b6d5160,2024-06-25T22:15:16.753000 CVE-2023-5267,0,0,d6c1d8912f5615c4494ff19c986e1371086f07b976cd294e8cd11dfb02e20e2c,2024-05-17T02:32:56.563000 -CVE-2023-52670,0,0,357f9486aa7af6feb22b300dbb1c0bab2b033824f7ca01e2a05a5b75c758e36a,2024-06-25T22:15:16.820000 +CVE-2023-52670,0,1,683aaa78a260dcf278cfa508fdd5a3be2e98e9383964502173c6de9a2d6d97f0,2024-06-27T13:15:53.823000 CVE-2023-52671,0,0,9b568b898eb29ec8b1b8f319ccba72ec86f17e8b65b1e7de39ab1acd73bbdc8a,2024-05-17T18:35:35.070000 CVE-2023-52672,0,0,502abf3b745535c9298e77a6e9d82ce20c690f2409f96c79c24c6d39e1ed5d26,2024-06-25T22:15:16.900000 CVE-2023-52673,0,0,112daaa1adde346922d18f1d4baa30002304d5f2de45f82bd50028313b13376a,2024-05-17T18:35:35.070000 @@ -238600,12 +238600,12 @@ CVE-2023-52675,0,0,cdd5cda7925b03e3f4f0a647d7269340dcdc034443ae92fca395a3371a973 CVE-2023-52676,0,0,358cbc583287e59edba2e8b9d34e0f4d0bd1e02930bd0bc4b3f79786a0e559d3,2024-05-17T18:35:35.070000 CVE-2023-52677,0,0,a301fda97f2358f13c0e9764b5ed55a55ffb30840c3179773950628375f57fd1,2024-05-17T18:35:35.070000 CVE-2023-52678,0,0,438ff43496c94e6fba2e2e019ef71f91be764c0d8415deaed8b520b9553b89dd,2024-05-17T18:35:35.070000 -CVE-2023-52679,0,0,8b6b51fb165d69632c45c63fdb24b129c9b7e522c49132751310b50614bd846c,2024-06-25T21:15:54.403000 +CVE-2023-52679,0,1,2009cd9f372936ffce5ee4b86a4834a05113f97a33c0ce5c2359ff329f4d9ddb,2024-06-27T12:15:16.100000 CVE-2023-5268,0,0,7f2d0f2ad411c236f436dcabd9d1bf82622c851e494dc715e9dbb4e3bb1ad161,2024-06-04T19:18:09.923000 CVE-2023-52680,0,0,2c827017053449b027362f3dba0a3c962643fd02ffc04680823dd3a5627492e6,2024-05-17T18:35:35.070000 CVE-2023-52681,0,0,509f45c2847d2260859f6ecad2b21e663945a88e3157b276da7898249775df7d,2024-05-17T18:35:35.070000 CVE-2023-52682,0,0,1fbf2e403d5cf76d28d0dadba77f6a33927da880c816f4db1175b9ba33cef465,2024-05-17T18:35:35.070000 -CVE-2023-52683,0,0,35cd096df4d0a025653b167c0cbd6204f2701a336eac669737f49c08d86b9265,2024-06-25T21:15:54.480000 +CVE-2023-52683,0,1,6bd72756029e4acda31b10bb4435b715056da877c90b65f2e599b6be62a893c1,2024-06-27T12:15:16.183000 CVE-2023-52684,0,0,07a09c1a8df932af204f32eebc29b7ace339bf81055f4f0d3696fcdc198be3c6,2024-05-17T18:35:35.070000 CVE-2023-52685,0,0,47e5ad6bb0418b1c76808b60c6f2122f54dd28457f9424eccb9bffefa631630a,2024-06-18T14:15:10.603000 CVE-2023-52686,0,0,5e891a4a819cec4e43c745fac34dd2da73b2848c123249301ced64614651e5a8,2024-06-25T21:15:54.547000 @@ -238614,15 +238614,15 @@ CVE-2023-52688,0,0,bad57e985d74d38535bd2e4688483262734901d07b2e2f52a89461916ab4e CVE-2023-52689,0,0,3e73aac395fcc16d3abdd2504c6d2a6d7fbb93b0e2f224d55623aa3f7fab2f92,2024-05-17T18:35:35.070000 CVE-2023-5269,0,0,b55c455e472d9a3180854614a9bd8b77bc4dbfc31bda209f17ec61e655cade44,2024-05-17T02:32:56.787000 CVE-2023-52690,0,0,47f27e72b514880876b1da55da3108d82db2ae99692d5f3d56b745fafb0c07e0,2024-06-25T21:15:54.670000 -CVE-2023-52691,0,0,0a3fd4530a126d55dcf6a69a8d4bc28b6ee0f3662f225a03d0468a84bc244ee1,2024-06-25T21:15:54.753000 +CVE-2023-52691,0,1,fb00d78d0b95ba74a48238a152131a69723a5e43e2a4a7d421b5918fd8c3e44a,2024-06-27T13:15:53.900000 CVE-2023-52692,0,0,d3a824fff4206452ad3a8c5733a1eefca805babf20e86b0ca829f9c0513bddd4,2024-05-17T18:35:35.070000 -CVE-2023-52693,0,0,019b7775d854d0a4cbab685171701c286d76e08a9853165310aa4926ec2a0c36,2024-06-25T21:15:54.840000 +CVE-2023-52693,0,1,9a4a796f270a85042e718ff10e0b6447ba65a8fec990240bd06d3517c4ea5337,2024-06-27T12:15:16.257000 CVE-2023-52694,0,0,644dbdd18363a3d8dbfc62c48e89109b201700bf5492906c071e0227e8e224a7,2024-06-25T21:15:54.917000 CVE-2023-52695,0,0,314ead98f71d5b192704698752c6f3077c829550a93116d660f4795acf61243e,2024-05-17T18:35:35.070000 CVE-2023-52696,0,0,280f298a684bb98e30133689d3b90949f8b86e0a7a643bfaa1bcc17be2c50f8b,2024-06-25T21:15:54.993000 CVE-2023-52697,0,0,2d1eba29fe37a6cc489e274028ede887898bb9ba133424d9e0f857e7dca7dc53,2024-05-17T18:35:35.070000 -CVE-2023-52698,0,0,cb99b5f193b4dff5d99aee4b4f23cd60e6e097d13e81aab76fdd70cb23867989,2024-06-25T21:15:55.190000 -CVE-2023-52699,0,0,f774c8d117f9ca3836f78e14c9e44bccaea336cc02317265535bf262e3687955,2024-06-25T22:15:16.963000 +CVE-2023-52698,0,1,4b851be2c7d3c21992795e6492c16e4e8c32b224aaa5ac4f846d5a363eca8782,2024-06-27T12:15:16.323000 +CVE-2023-52699,0,1,7a5287478c931e704f68856082fc996aa72e6f6c685dd11a5c560b10b7729e4b,2024-06-27T13:15:53.990000 CVE-2023-5270,0,0,9b54c609aa4795f3d38d8b049b5d33c1f3d0edac48551eed46850d566af05f23,2024-05-17T02:32:56.900000 CVE-2023-52700,0,0,aa633dbd364e1d8593b068b84b8782f7daac6083c8bd0a3dbc196659ffc6e6a7,2024-05-21T16:53:56.550000 CVE-2023-52701,0,0,74c4381741c69a8ee624cb165a93446f0182f87c19d9aa00da542e6a4815e300,2024-05-21T16:53:56.550000 @@ -238820,7 +238820,7 @@ CVE-2023-52877,0,0,115b7fa76f23832a95c0fffcda0fe73a6558a22fa95d6a3ed7a4ec7fbbbc6 CVE-2023-52878,0,0,8fd06867d4b0d4d358616ea8174a83b0183f646764163b3e2e9ca433e2d9ea22,2024-05-21T16:53:56.550000 CVE-2023-52879,0,0,f4b453572f24e47ccd23af7ac2862d33ce87a7b0f20c77813d33e70536043136,2024-05-21T16:53:56.550000 CVE-2023-5288,0,0,0738994bddf6db9f0b825ffb89279f9130371f293c5b8f6550deac482c5ff789,2023-10-02T19:40:35.707000 -CVE-2023-52880,0,0,f0f1adee1e8b8f706c8e1a87d426e4160316d95d9f09cfd37ffcee9511966bd1,2024-06-25T22:15:17.027000 +CVE-2023-52880,0,1,db47fbb82270b913ed21d04b3703922bf0b547a598dbaa8991147465e5956b2f,2024-06-27T12:15:16.400000 CVE-2023-52881,0,0,6f27b572b3e64428644bdda7520544f8cd90fee86a13f8f6a714c131a849a56d,2024-05-29T13:02:09.280000 CVE-2023-52882,0,0,798470a64b56f744c8b04faf053b4d16c03d86b55db554772e204dd8af8cb938,2024-05-30T18:19:11.743000 CVE-2023-52883,0,0,60288e6afd3acdd5078c57ea111f332b080b703e7c9ae57294260ecafe90f4c1,2024-06-20T12:43:25.663000 @@ -239473,7 +239473,7 @@ CVE-2023-5977,0,0,051d445dba7a63fbdfd4cb3d71c919480b095ca34185b956a2dd9418561434 CVE-2023-5978,0,0,f619d9b48f605b1096d987f92dcf4151098795542311f08d410e93de5ecd0e3a,2023-12-14T10:15:08.727000 CVE-2023-5979,0,0,a454d2621ea31afc04d64b3e814990bc14af663b448f2639209c32b443e83691,2023-12-08T14:20:45.807000 CVE-2023-5980,0,0,9be20bf56b4146e5dcc96afa5179c8d45d6ac808880da64390c6c61d603473ca,2024-01-02T20:45:48.277000 -CVE-2023-5981,0,0,6c2c70d92850d4ad8caba2fb9a97eb6d03c6d0704b68c2efccae4c0f885b86ff,2024-02-09T03:15:09.133000 +CVE-2023-5981,0,1,3f6a00f95b0bf382869a975747a543d20cbbc60b868198fa18563c3d4e6ad032,2024-06-27T12:15:16.477000 CVE-2023-5982,0,0,b118ced7f6d9b539390261d89e5ca0653eebe5e015c98df7bcd31e2cb1cae15d,2023-11-15T15:37:28.153000 CVE-2023-5983,0,0,0136573c08a2744f659ec80b223b545daeab308770cb48e9afd4b361cfc56fa6,2023-12-05T07:15:10.020000 CVE-2023-5984,0,0,ae7de107ec88fd5b8423e54040ea7677eb3fdedeacd67df2f45081d5230b8098,2023-12-14T05:15:14 @@ -239526,7 +239526,7 @@ CVE-2023-6036,0,0,377d1951c712c44402e0fb4a4d3bf0b5dc6e021ccc04a9002babfefc0b3d43 CVE-2023-6037,0,0,9ad67aeb9ce80222dd0e1c0dda89b29a9b700cafc97e94472829da8bfe1775a6,2024-01-08T15:06:29.210000 CVE-2023-6038,0,0,3b2e7c0ee82b5b76f2800397f8eafd4e505a4dff525a1418c91b64a879bf4775,2024-04-16T12:15:08.780000 CVE-2023-6039,0,0,b215edb2a36ba791315cad08416e505994ddd28bde33357245442ca89eb29a3c,2023-11-16T17:59:48.420000 -CVE-2023-6040,0,0,9e9e8af1464ce23704fe4cbaea0be552e875614b9a57757891e058f1fa9a5fb4,2024-06-25T21:15:55.370000 +CVE-2023-6040,0,1,430d38a6c7937ab79432810bbedc5af750dab53193c6ad2e99dd05041067a4f1,2024-06-27T13:15:54.080000 CVE-2023-6042,0,0,875c2be9809d61d15b7e95eaa15e65feced880e3c081ed58decdf5ccf4455443,2024-01-11T19:57:29.590000 CVE-2023-6043,0,0,defe2da6457833f64f7308e758efe31ab0806a32067fb3a4e9663407fe8acf72,2024-01-26T16:03:21.607000 CVE-2023-6044,0,0,7475ded4d04590556f71418f02e0a1f7201062f945e3a5d24fdbcfa7330a1f9c,2024-01-26T15:56:47.883000 @@ -239726,7 +239726,7 @@ CVE-2023-6266,0,0,4d5d6e854d7627b378878ba6778fd9127281bff4a2177b7819b5b5065606a8 CVE-2023-6267,0,0,52058a3e22bf924415ad4fabb27bf67aface148f4c13424417c6d994365042d1,2024-02-17T10:15:07.890000 CVE-2023-6268,0,0,95f07e1927f5a2b7bd2b3c70e32d348fc39cd72dcb70ea3a368e77442825701c,2024-01-04T03:14:37.020000 CVE-2023-6269,0,0,547999b6cafe7f86155b5ab13f5b21c2fb819b3d92569c09fe20d0c5d5d47d1c,2023-12-13T17:15:07.400000 -CVE-2023-6270,0,0,376645200646ad55b721ccf1e6953ed345d10bf2e33c8c0ffd5fbb2eea1842b2,2024-06-25T22:15:17.100000 +CVE-2023-6270,0,1,29a8ab8168a25b90559bfbb04e097790226a04f9583c66417cfe803474587374,2024-06-27T13:15:54.233000 CVE-2023-6271,0,0,e3db81eabd1388d11b3fe12930c309bb590caa695071512c3d4398d2a8af2974,2024-01-08T17:31:37.350000 CVE-2023-6272,0,0,c5c0c4f29d648339e86b26d1465b675425e62072f59a8f148104e3d22d68f53b,2023-12-22T18:34:10.253000 CVE-2023-6273,0,0,ef175637f161ddfc2370ca4acfb899e7f9f9566e0c986e95708aa3b8ea4f0e95,2023-12-12T18:36:55.433000 @@ -240387,7 +240387,7 @@ CVE-2023-7038,0,0,a532457d4e129585c6fd59edde75c8602cdbba860a1b2ed6bf97dfa3cfebc0 CVE-2023-7039,0,0,0287f0fd6ff9cb2cd738a6888f1b7f5338d8c1cf9781cede748d7294471385b8,2024-05-17T02:34:04.860000 CVE-2023-7040,0,0,7d9343f6130fadb737a4a8b3d1252bd2dca7e46a6a11fa400a5d0b5e88047b69,2024-05-17T02:34:04.983000 CVE-2023-7041,0,0,c5438649c9b54b5ea93e5dbc542c2560e074afcdfe5f15cafbc46db47d95c7c0,2024-05-17T02:34:05.090000 -CVE-2023-7042,0,0,303ea1be2f3c28a4e77af4d453f64e9bccabe9edbca03d071275856966984932,2024-06-25T22:15:17.243000 +CVE-2023-7042,0,1,20ac3743ce888c171d9e56c758c7a312563d41c2bb5093041f9104ecbc6acb87,2024-06-27T12:15:16.857000 CVE-2023-7043,0,0,4e0d13314b235582b2eee5346938647b725841413b0cf7dcdcd97fb8c388d5ac,2024-02-09T01:00:15.637000 CVE-2023-7044,0,0,e5885ac0038b67788ac2339019a4789c312787e8319dea36168ca85cc31f3eb5,2024-01-10T16:12:34.983000 CVE-2023-7045,0,0,023a96a72595626635c7c989544e73ba2b2d6af30f29cbabdb31119d39587717,2024-05-24T01:15:30.977000 @@ -240574,7 +240574,7 @@ CVE-2023-7258,0,0,5ff9fbb18c87cd79eeba5bdac9e20b834be684e2899fd63fb3e107422ede55 CVE-2023-7259,0,0,291fdf96791c66804d1f0d3fb86a244e544f8112f70bc253658c7b47edf99960,2024-06-04T19:18:14.193000 CVE-2023-7261,0,0,439b4de2c23e80354c01018ba2c6192a50a53aad78a67156eae3ceb151c83469,2024-06-10T02:52:08.267000 CVE-2023-7264,0,0,1c4cfb34070a7ce4966884df1379f77375459d76b20ac1f3cbf195ee6437fa6a,2024-06-11T13:54:12.057000 -CVE-2023-7270,1,1,f4fdce5b2ae5d586b38ac918662ac379f9f93a324e165605a47fef20e6a8f4fb,2024-06-27T10:15:10.240000 +CVE-2023-7270,0,1,94669c63f2ade4ddfb25257f684257783c88dfab1050378b21b0aca26b8fce28,2024-06-27T12:47:19.847000 CVE-2024-0007,0,0,3bebeca11ed66b29340ad5b2f4a6fdda381d640f217ed7214dda7d3a471e9da1,2024-02-15T06:23:39.303000 CVE-2024-0008,0,0,db70626ccf03b2491d218a1d6d38cb10870a351e02a617fba1e6e23a0ac8502b,2024-02-15T06:23:39.303000 CVE-2024-0009,0,0,a481cbe6336f9e8c7286d10d3efcc3169667e3db231d83fec3fad506beda4652,2024-02-15T06:23:39.303000 @@ -240821,7 +240821,7 @@ CVE-2024-0335,0,0,e01d60ef0e5a8a1ca9ff9e08ad549de1079ec643489c6df6d371055ae978e1 CVE-2024-0336,0,0,3ff5e39cf73c8f8626f61c1d434302d9a867014e21df2e28211947a70ae1849e,2024-06-03T14:46:24.250000 CVE-2024-0337,0,0,669347fc2574064a01ba98d7b6e13ae994791356ab8f183f3ab4aeb768c02d3a,2024-03-20T13:00:16.367000 CVE-2024-0338,0,0,92ebcd39fdf784ffd65dac214cbee1488e55baa90d10e33cf90090e1ac97448b,2024-02-09T19:28:45.703000 -CVE-2024-0340,0,0,f38f5fc257e3b4410f27ef40d1c2299898458adc6b35b1f5e40305848a246971,2024-06-25T23:15:23.220000 +CVE-2024-0340,0,1,d8ccd9f54aff9b6e64d57f9354118073d5187f42e25d56caaf999f1653276a5c,2024-06-27T13:15:54.380000 CVE-2024-0341,0,0,baf87121be8c1c7f7d75083fbfa2879297b9384c5a12a27716c7ba837025787a,2024-05-17T02:34:31.867000 CVE-2024-0342,0,0,b640e865f6605d643892d278319c7b90718fb985e3f032e99f507ead1601f4f7,2024-05-17T02:34:31.980000 CVE-2024-0343,0,0,fff4f9346a9e2c831e474b44ebe3909585335f7c7c84d63d006f3aee09b8e889,2024-05-17T02:34:32.080000 @@ -241025,7 +241025,7 @@ CVE-2024-0549,0,0,488f5582d963dac043702fa5017f9c33f84ef6603e836b233edcf553f66f03 CVE-2024-0550,0,0,8d977de657073865c788c3a2c5f9e4e3f64456f8b73b63da114e244f4c4b442e,2024-02-28T14:06:45.783000 CVE-2024-0551,0,0,2b91cbbed6a2082f9e57a9fec5e442f0a040393a6b881ae515635ac2821da912,2024-02-27T14:19:41.650000 CVE-2024-0552,0,0,3d2e4be296a940defb8952115896502aa478e8253c84bb7f2cf40b7150f7ba9d,2024-01-23T19:34:05.483000 -CVE-2024-0553,0,0,e2cbe1c8429d5f6f433e77535bc93ac8931da8c66b87ddc1723c2726c8e27f4e,2024-03-25T18:15:08.443000 +CVE-2024-0553,0,1,1fe4e5d437340eb28132593c67b8f58e870c91cb0ee7bf65a5b3a39868851a7e,2024-06-27T12:15:17.037000 CVE-2024-0554,0,0,c587d882bb90cc8a790d9405a76226eece938e548c8d6d0dfa16bb5ef9afac58,2024-01-23T19:37:17.313000 CVE-2024-0555,0,0,e27068c658ab2fe0ade46b360f75382aad49de171a45cc11ac1210a06742603e,2024-01-23T19:57:48.237000 CVE-2024-0556,0,0,58e51148ac56dc3dc5f63a5ecb0eb821e6a1130d50e3147308ecd24775c94ea7,2024-01-23T19:44:47.387000 @@ -241039,7 +241039,7 @@ CVE-2024-0563,0,0,0bf4472860925ed3661b4122ec1942a93e652e3291878b51071ea3e4cbbc7e CVE-2024-0564,0,0,2ea7d9789fe2bf2c5202f04a8796f5e81286b91703a6d170c1fa28f2224224c4,2024-02-08T16:36:48.837000 CVE-2024-0565,0,0,a0def9e6b5607dc2f77cb37cd8a91f0a2e5308f5a3b914613d1c115c2edfe4af,2024-06-25T22:15:17.417000 CVE-2024-0566,0,0,f8107fe8a2fc77834b036d4572e367b8281b39b817bc15b2a6e1011abfda8c03,2024-02-12T17:31:21.670000 -CVE-2024-0567,0,0,ce6269b29c71c4b439a81edabcded1234fbec8688220f445d60fe34366ae0a1c,2024-06-10T19:18:32.897000 +CVE-2024-0567,0,1,b1b32b667ccc75223c71683ec694f4b3147abb79aa17e81d56ff5d679a1d5494,2024-06-27T12:15:17.343000 CVE-2024-0568,0,0,d070da7d1a857e6b1d56c4fd13ea4081c8fab29f674e6572cdd113a3095522cd,2024-02-14T18:04:50.373000 CVE-2024-0569,0,0,ca265484291ad2089dca994102bd0a030fb990ef8e33cdc51d460d98e59ab566,2024-06-18T13:21:16.393000 CVE-2024-0570,0,0,98c6183854a59fe564eedd2f51571740271a3a8a9a1439468989a2d343a8ead8,2024-06-18T13:21:42.383000 @@ -241077,7 +241077,7 @@ CVE-2024-0603,0,0,6c2f1715a51822f3565f585171e87c3ef1cd79d2a5d50a455ff1c67f3a599c CVE-2024-0604,0,0,de42be00918821764b285344b41de332f26b8089fae3da1eded8b25ff92036a8,2024-02-29T13:49:29.390000 CVE-2024-0605,0,0,ff3b800ebe97681c0837382f08f457f2c5e05d6a056b457698a70067fa49375d,2024-01-30T15:19:19.787000 CVE-2024-0606,0,0,7492a33aee188bc5bc2f32df81e2efc5b772527c654aca745d2290d67a0a983d,2024-01-30T15:18:57.190000 -CVE-2024-0607,0,0,8d3116d441e08ab5da4b2dd1570870b3e8e43e06fb5948fa69c75de7eecea01d,2024-06-25T22:15:17.643000 +CVE-2024-0607,0,1,3f03212774221ccd255c56befd4b0711d06ede0f4e45496f9ef91af858bfb56a,2024-06-27T12:15:17.570000 CVE-2024-0608,0,0,15185dc9800853a2ddea33bf0eae13009015485690ab4259b824b98a877597a5,2024-03-29T12:45:02.937000 CVE-2024-0609,0,0,5964d54cdb567cd95d99139a179c002e68e5a5c5eb0837761e17636de63e88c5,2024-03-29T12:45:02.937000 CVE-2024-0610,0,0,96d45759cb80d01da210013921cb551bcc13d13875b46a62058200811ceeb121,2024-02-20T19:50:53.960000 @@ -241387,9 +241387,9 @@ CVE-2024-0943,0,0,f9430923a649c71b87f0a10743fa9401503ff1a839e3bd113668aab7a5a5c8 CVE-2024-0944,0,0,7015c37bdd072582728b81de0824816115caa297c1ac6ca31e874abab9e617bf,2024-05-17T02:35:05.563000 CVE-2024-0945,0,0,a916c6f74c4e082e3916ec5df37bfe91da8f232c9037f1c08be2c4499532b1fc,2024-05-17T02:35:05.677000 CVE-2024-0946,0,0,d4e71274dc2217e7a2eb9b835fa9596c6bc5cc26ef92edaeb83973a901bedbef,2024-05-17T02:35:05.790000 -CVE-2024-0947,1,1,2bd4ccc688b3a90a80d414df9d0d06ebbd24768102412eff43d5c7458cf75e45,2024-06-27T10:15:11.563000 +CVE-2024-0947,0,1,5856a5a5350785dd3612f78e88a9f6618b121719246a0f397522ca53761dca03,2024-06-27T12:47:19.847000 CVE-2024-0948,0,0,662289eaea02d77e2f26730b0e755055220bb42f6ce193c1f21cf04351957fb3,2024-06-11T18:15:12.897000 -CVE-2024-0949,1,1,43a1decc95daf81833e0aec87f78c80bd2a5add9444bb4b0bf965c3a5526a498,2024-06-27T10:15:13.013000 +CVE-2024-0949,0,1,74aecbf4ac88355ec554094a42d23a28d3484de43a9ab618bced97f2c8af9ffb,2024-06-27T12:47:19.847000 CVE-2024-0951,0,0,943e60a265ecc53992d941a81b6f313c111cfeda921581030b0003b8c39af369,2024-03-18T19:40:00.173000 CVE-2024-0952,0,0,6f32644ab0ef2315b1a9443b0a1a75ad72efcd18f9832ac32457ec11d58a6f70,2024-04-10T13:24:00.070000 CVE-2024-0953,0,0,56fda260ffe976a7ef0af83f343a5276bf8287ea78e25bf62da55b0bd2fa66b4,2024-02-09T16:38:45.380000 @@ -241518,7 +241518,7 @@ CVE-2024-1082,0,0,5d2917cbc0ebe1d44667869da021a3fe152a9311cc75cb6f51732f94daecc6 CVE-2024-1083,0,0,12f71ff8092607030cf18bf8a64ce08dcbfadccd528aaaf70c8824b0476991c9,2024-03-13T18:16:18.563000 CVE-2024-1084,0,0,034d85bf39978c9573e4dbc412f1867f9df271e85d3cd30f25c6648ff5a9703b,2024-02-13T19:45:42.327000 CVE-2024-1085,0,0,649a4a278db01305790c1d25d5fb8d26a8b328f3c410af99f7747f493230845c,2024-02-05T20:41:40.513000 -CVE-2024-1086,0,0,5a8acc32578be961e6cd5aa9e84e4a2c2d63a12aef07e0d1277968535213f629,2024-06-25T21:15:56.793000 +CVE-2024-1086,0,1,952aa41b7cff120057d09f99130bb512af3a764d891318d5764d1d50dcd6bdf1,2024-06-27T12:15:17.713000 CVE-2024-1087,0,0,bfb73beeec450e6da5995b5f21712b59848b559e03cbbae3eab10a626379de00,2024-01-31T13:15:11.030000 CVE-2024-1088,0,0,9e4fcd4d80be5fd2d14ec6d1eed4646f24ed688d5f028fb9bbb59da4f601b1b1,2024-03-05T13:41:01.900000 CVE-2024-1089,0,0,c420c84f1c9ea1e3f949226f3064a7cb757fb25c8f460e9f69a5f8ab62483f91,2024-02-29T13:49:29.390000 @@ -241536,6 +241536,7 @@ CVE-2024-1102,0,0,e674666daf854d1ea3c1366c0490a136435911016ce15135405e45a0296c59 CVE-2024-1103,0,0,32c2403b3235f3d51f16a9c0f1555e66ef01d8c80920f98db19da2d6af331543,2024-05-17T02:35:14.273000 CVE-2024-1104,0,0,4986f7d9d93ce17dfdb3c18d1dbdea210136d53ee2c0a156b2b261fba310efd6,2024-02-22T19:07:27.197000 CVE-2024-1106,0,0,704e011d119ecc0a0a6c94048139401779c5b0cce30a694f65f63b54706d619d,2024-02-27T14:20:06.637000 +CVE-2024-1107,1,1,ca817b7af20bb5143a9bbb400a9dd89165008289c2eb323e66be598ca7f926c8,2024-06-27T13:15:54.560000 CVE-2024-1108,0,0,6d2808493eb7f348aaef522bf8d4baa946236b7a1d3ae8251689f513aead9e5a,2024-02-22T19:07:37.840000 CVE-2024-1109,0,0,0260b34d6042b9001ffb60b9c6709398d8b7d0edef10cebc243e03f22921802c,2024-02-10T04:13:21.610000 CVE-2024-1110,0,0,84a78172f620bdb7520bc7e6c7925a0cb134b827f5de61b46bf42942d938d595,2024-02-10T04:13:13.260000 @@ -241740,7 +241741,7 @@ CVE-2024-1326,0,0,f742b2e1b0f964f5a5861c38f5d4ab056095ec8f5957f404653a524040bbf1 CVE-2024-1327,0,0,1b6e3f0296467e9f6b424925712e479dea0088dc2698e1adadd7f96bd6f1e88d,2024-04-03T12:38:04.840000 CVE-2024-1328,0,0,1e360ec5f794b47c3c1949d058d4dcab1ca058a0302ffe54a63801cf38181f90,2024-03-12T12:40:13.500000 CVE-2024-1329,0,0,c251ab89131ed5db620ce7b9371daf5508a26377e3f0f0d0996003e3074e8cd1,2024-02-15T18:27:28.837000 -CVE-2024-1330,0,0,a740093dca39e13810ec35c068f9ffe0efbcf6132f835d103eff2dd191f136ab,2024-06-27T06:15:09.800000 +CVE-2024-1330,0,1,934b35c1d869ec3ed054e547fed219a236f4edf5dda0e83c87ab97880b7f7b2d,2024-06-27T12:47:19.847000 CVE-2024-1331,0,0,1deb1e21efa47891bffcfc0f7c5a5a4e56a2cce5d50551f8ec8837f30ffffb10,2024-03-18T19:40:00.173000 CVE-2024-1332,0,0,ce91a247ee20b5086ffc922000a1236f0f0a17c39483df8ffb3ea515e6b84e26,2024-05-24T13:03:05.093000 CVE-2024-1333,0,0,258128469d54cc44538629ab13a661542f0353cc3076e7f49f79a63a3b1847c4,2024-03-18T19:40:00.173000 @@ -241897,7 +241898,7 @@ CVE-2024-1488,0,0,03e683b77c18e258ada6411156a13c686c4496eec0687a6c9cafd2107fba5d CVE-2024-1489,0,0,601abc5a034fbcf389e475f712bdb62e609e01342eb7a5cc6cdf4f20f6ce0143,2024-03-13T18:15:58.530000 CVE-2024-1491,0,0,5bd5c8d4823c76c59f53c9f7559e7fec7b518fd1a891195d4c1b847086d33147,2024-05-28T17:15:09.103000 CVE-2024-1492,0,0,ac491e1ac05085ffca5a01bc169673ef656902c869bec5c48f97ccc7785388e6,2024-02-29T13:49:29.390000 -CVE-2024-1493,0,0,ed503cc06ad939a1d9dbb6375b9daa56d6b2d30c68a9894a25193f62712566c4,2024-06-27T00:15:10.283000 +CVE-2024-1493,0,1,7ccbaf932ab8e6585cab4eff5ae23acc60967ae45a6fca5c3ff89f8d09fcaa87,2024-06-27T12:47:19.847000 CVE-2024-1495,0,0,fb62d81a04863e1feb1aaf54e194ce1d2be35e43a2717c4349592d976859a74a,2024-06-13T18:36:09.010000 CVE-2024-1496,0,0,cb4e1e2b66486c1532bf5fd9642c761fbe286057f303a98e25c71b95ed8fd1ee,2024-02-29T13:49:29.390000 CVE-2024-1497,0,0,84c0cad6cfa5eb0a51311cf784383979e7b18f97e3410e261be2597241b19a2b,2024-03-13T18:15:58.530000 @@ -242175,7 +242176,7 @@ CVE-2024-1812,0,0,1a6f9eeab96c73268af7052134c8cf1c44932ad69fbc301edf8d35b130e7f4 CVE-2024-1813,0,0,7221461b551b49805924c88f7a02ee625bae550432e647062e4543b6083025c7,2024-04-10T13:23:38.787000 CVE-2024-1814,0,0,0b1e2db7106be181c074b53f672647c26a1befc789f8a090beaccc8e7ce1a1ab,2024-05-24T01:15:30.977000 CVE-2024-1815,0,0,9977db768a350aa8d7588584513fe0dfb6e464418c1beb6188f5eecf3642f719,2024-05-24T01:15:30.977000 -CVE-2024-1816,0,0,c9ca140216970a839889bf1f648f550a96ab8fc5d68c8e2439834c69ab1e3f2f,2024-06-27T00:15:10.523000 +CVE-2024-1816,0,1,b1ed5baa2b5a7916f5841f4e90729eed84c85a9866209ff58997cf068079260a,2024-06-27T12:47:19.847000 CVE-2024-1817,0,0,d22678ba5046366220ff2f5ee22240282d315c7945fb2fd131031a18112a5a4a,2024-05-17T02:35:37.207000 CVE-2024-1818,0,0,160ee525d5ff48a751a727de0287a62c274d8c7c0090e0c76c9649776d3b8ac7,2024-05-17T02:35:37.310000 CVE-2024-1819,0,0,200100b2029b16af7aba6a64011b8f852960cff67c1c8b594d8a140448c1f883,2024-05-17T02:35:37.403000 @@ -242194,7 +242195,7 @@ CVE-2024-1831,0,0,ba7d6038f2f163901931380e41f7aad55946aa8f613be9b0ad1d9ad7d98bbd CVE-2024-1832,0,0,d352d6d3abc123a85e80394f4c8ea6445406e703eb2c8ae70e3da7abb6dc0a2e,2024-05-17T02:35:38.633000 CVE-2024-1833,0,0,6d5a91dffc6f653068e85d29b9a1b23b341e66532a9d2b38d241de0f0039c1d4,2024-05-17T02:35:38.727000 CVE-2024-1834,0,0,cccbccffbdbd36db0f6b109cf472ec076ffc611765060874a9fd5e4336a2d897,2024-05-17T02:35:38.827000 -CVE-2024-1839,0,0,b9f8ab5343f1cc6bfd64e70111692b0f6bf0c4b35b824de54a929e5e53780918,2024-06-26T21:15:12.597000 +CVE-2024-1839,0,1,47599bf88817e1dc96d40d049623a7f506fd7872c190764dcb358f92e90f1108,2024-06-27T12:47:19.847000 CVE-2024-1840,0,0,60577279fb1c24997acb33ed338e2e3d22a04208a2594bca8f9677624f2bc644,2024-05-02T18:00:37.360000 CVE-2024-1841,0,0,39b2aee15bd218c5f0ab2f7c5cc3fd949f7c8705e3573f0315e5f3107f7c80a6,2024-05-02T18:00:37.360000 CVE-2024-1842,0,0,0e20681dfde5286f0a06faaec929b1d3b2d16095090d24a3b41be5a6d299e939,2024-05-02T18:00:37.360000 @@ -243248,7 +243249,7 @@ CVE-2024-21515,0,0,0328aa4c891cdd4af83806c0833511fbd9428103cda9e00c6fd9a5ee4d968 CVE-2024-21516,0,0,e92a521ad5aff100399165764c49274a0077f590f2572735a3a35e0256794ca8,2024-06-24T19:57:38.197000 CVE-2024-21517,0,0,186f90d2088e8e33683da894eb00f6f13b8f4ae5479bdad5267ce001807a583a,2024-06-24T19:56:45.167000 CVE-2024-21518,0,0,83a4ac5f480325e602a67a8a1958abd8c4414c62288c5217c40c0680b80ab4b9,2024-06-24T19:56:14.723000 -CVE-2024-21519,0,0,99cb820000050c4a8347abec593294f82b25bdfbd4e4a3b0cc4286db32ec2098,2024-06-24T19:55:07.760000 +CVE-2024-21519,0,1,bf9643fa21c9312ad7f9de95a92dae918c8943fd492bc976b0551db532a526a1,2024-06-27T13:15:55.027000 CVE-2024-2152,0,0,3cc97618eb3606d7138054800fe4c9dd1b810706cf75a720e72d22a25acc79fd,2024-05-17T02:38:04.770000 CVE-2024-21520,0,0,719b2dc3254f707e72c103bbdbbe58152dcb2f4bbbb92f02a73b99a9ae3141f8,2024-06-26T12:44:29.693000 CVE-2024-2153,0,0,32d949763a8c44673b751742c2df9fc58704fdbb602a296b8827b8bcaaa1ed2f,2024-05-17T02:38:04.867000 @@ -243483,7 +243484,7 @@ CVE-2024-21905,0,0,adf99f19af2fd4f47febc9f1430872cfbd6f08389bdadd5f441acb45fc9c4 CVE-2024-21907,0,0,e97acedaa5fff8f35a2639917d8b0e8affd6b5d126dc549f4b2d35936c62833b,2024-01-17T15:24:07.360000 CVE-2024-21908,0,0,329abb805b48ea46c40d9625a0e5a18857ae42d6b89a82f5c3cf797095821263,2024-01-08T19:46:41.157000 CVE-2024-21909,0,0,1862a33cb8cb7c096543042cface003ed2658c185ec7603674a262510a57f13e,2024-02-08T02:15:40.883000 -CVE-2024-2191,0,0,8d9a95569a5fa799cfa236e5e6b2d19c45440bfa63ce92c49a633517743d1edb,2024-06-27T00:15:10.790000 +CVE-2024-2191,0,1,2460421a7ffdf167d08d45c29ac9e110bbd65ff27eb0890bc81c0eeeb0fd9c1f,2024-06-27T12:47:19.847000 CVE-2024-21910,0,0,43ca7fc1e52b2bce376dbad269237609f1115a9e3e85611002acd3d35f8eee88,2024-01-08T19:46:25.757000 CVE-2024-21911,0,0,30b0952621022b198f37c9fc7c47e2aaa3233be56e7cd5684ca7f588e4860d48,2024-01-08T19:46:14.513000 CVE-2024-21912,0,0,e55852665e09c5ab48cbae6c65a3f0dbff3703123b8a6aa762360ad6e81dcd4e,2024-03-26T17:09:53.043000 @@ -243583,7 +243584,7 @@ CVE-2024-22095,0,0,561ad02a49117b109fa7a66b65f1a5418b980c4c5cc6beee5100d8033f26f CVE-2024-22096,0,0,330d7fb3350f034a1e0c8805b47a2db6dbe2ceb88846f9ddfaaa7c652ddde766,2024-02-07T17:33:26.800000 CVE-2024-22097,0,0,dc5034d6090bb42f5640214b5fe568fb1a52ad7dbb7e8b0261ed05bfcaebecb1,2024-04-02T15:15:52.733000 CVE-2024-22098,0,0,143b86afbf5a983f03c2f584969195c0ed3a1e44177534377f9bd3d74e39f2b3,2024-04-02T12:50:42.233000 -CVE-2024-22099,0,0,030fd89b20e93ecb4d95c04ad9905345823bd77455eec1dfb4b2072d86fc3ff4,2024-06-25T22:15:17.797000 +CVE-2024-22099,0,1,1ca221f767509ed389320bf6e17bb08d430c1bb802873593e5ee88df116cfcce,2024-06-27T12:15:17.870000 CVE-2024-2210,0,0,5a03f758877779e9677ec1f83746a6fce63214add6c369b78804c38534e8d822,2024-03-27T12:29:30.307000 CVE-2024-22100,0,0,a6ff3a70b4f3071cb6edf59573e0a019914b2e075d17d6c1c64c20010521b0fb,2024-03-01T14:04:26.010000 CVE-2024-22107,0,0,e3cca6041ab5ebaddd7412e3f1116f94d2eef4d2646eefe8a425a6cd027599ec,2024-02-09T19:44:32.497000 @@ -243692,8 +243693,8 @@ CVE-2024-22228,0,0,78d2b6e91237b41440665215c9b4e77ccc8811641b8c3516a01f9391d6778 CVE-2024-22229,0,0,942079f7535239209609b5cbc34a85ff0a40c69533135771fdb6410ce1778e0c,2024-01-30T23:01:36.513000 CVE-2024-2223,0,0,1b410a9ed5d5a5d32a9a4408c4dbc25d2dfc4cd58665c0d802a4cb2c5e3cd9dc,2024-04-10T13:24:22.187000 CVE-2024-22230,0,0,1dba8e437bacd8d1f2a5a22c03d0799f6c41b12fb7346ebf5256856880ee3b1a,2024-02-15T06:25:53.660000 -CVE-2024-22231,0,0,6298a3ca64f578a8f1720ebd2ab9b15c71121a26361fca74842f3ff377e614ad,2024-06-27T07:15:52.623000 -CVE-2024-22232,0,0,bca65f55698eb2209bcae54188205b4e34fadb7a2ddf6dee37dc10cd8196a28a,2024-06-27T07:15:54.227000 +CVE-2024-22231,0,1,4d0bb5b894187b1365194fe55a72cf08254d915c4694199b5042134f98ce79d6,2024-06-27T12:47:19.847000 +CVE-2024-22232,0,1,78a139218c646fb35994b754d6d5878e02f9eb12eb7ab60f4dd1c78b87196a74,2024-06-27T12:47:19.847000 CVE-2024-22233,0,0,bff21a41ba975275ac98e274ec31aa2a57df5ec476a78347e5182122669daf71,2024-06-14T13:15:50.443000 CVE-2024-22234,0,0,ed66ea75d4f91bd4cf760a873ffa711eec74e184d0ed1b507bd27dedbdd28669,2024-03-15T11:15:08.857000 CVE-2024-22235,0,0,94dcf649455ce66e40f15519944aa08c6281ad01f157b931cb45eb28dc8bde92,2024-02-22T19:07:37.840000 @@ -244621,9 +244622,9 @@ CVE-2024-23761,0,0,91423f3fc0ae4a6c135e3093d5ba2f92b18f0705b43e8497a65147830ffb8 CVE-2024-23762,0,0,1fc25d58731097f8aad4c8f7676cdc9a123654581fd6c8477b826714cd9e330b,2024-02-15T04:49:42.123000 CVE-2024-23763,0,0,94cc309a27a6f19d801354e2361325aae58be01ed476b8fc22a2371a8d35f8dd,2024-02-15T04:49:47.153000 CVE-2024-23764,0,0,b3135c7b86d92abe0ba829866971e25bead6def6664dd24257c259d94b7c1186,2024-02-15T17:57:25.633000 -CVE-2024-23765,0,0,2531b49d429fd035b165d3f960ddd3bc6becb302a1c0017b5520840949da710c,2024-06-26T21:15:12.897000 -CVE-2024-23766,0,0,e627ed36fd9d35193be8cce06cb0b93539988571b0dc29e9331c7345d8515de8,2024-06-26T21:15:12.977000 -CVE-2024-23767,0,0,fbd7fce2fa18d20f6927327e436b8c0145e8a97612a8e724e3b0b158b32ee796,2024-06-26T21:15:13.057000 +CVE-2024-23765,0,1,a9bf9ddaf0ea53521841e4a7d5249d26363bad2b049c64b95ac86a5fafa6d151,2024-06-27T12:47:19.847000 +CVE-2024-23766,0,1,54ae780967bd9b6ca5368925e3ab14431b4d613d4ab8eb2ca8c3cafb1be0bc79,2024-06-27T12:47:19.847000 +CVE-2024-23767,0,1,c123c2989650a70e6c7d5f568469b1c99b3cb5d77a8ff0fadade34b74ac4b8d2,2024-06-27T12:47:19.847000 CVE-2024-23768,0,0,926e611d1088d9f1f309e3cf68eaddf916ef7d0caac52f28b5ab1d1ea7b5269d,2024-01-26T19:15:05.400000 CVE-2024-23769,0,0,8006533b03738d14f12e88159dd00f6815ea0cfbfbe8531d0a76387b0244675f,2024-02-15T15:40:20.690000 CVE-2024-2377,0,0,3193bacb38964a76865be4cdd2e9adb774f62e3213cbbc5f66850373a4fcad8d,2024-04-30T17:52:35.057000 @@ -244700,9 +244701,9 @@ CVE-2024-23841,0,0,d2a4da220caebcf45780e1057f515ab58990e805115b7734955f48097838c CVE-2024-23842,0,0,2212211bdbb2ca579a147070da65a7a620c66f0c76761387864aa64e079f8f56,2024-01-29T15:51:53.207000 CVE-2024-23847,0,0,23d093bdecee27ec637b5bb871cf6ad4a373509326000c1ec54f137e07713fd6,2024-05-31T13:01:46.727000 CVE-2024-23848,0,0,bfa0c8d83f377f5a3a9e67c8800cd93c20c12a8637d3ee4ee062b72b7591a36a,2024-01-30T02:04:25.450000 -CVE-2024-23849,0,0,54a95ca37a01e8da6b28f13e659734b9c1cecbddacfe64f640b630ab127eefca,2024-06-25T23:15:23.770000 +CVE-2024-23849,0,1,2320aa21cc353546d7dbbd1a8bfdde2281063ba155249762ef0c9618e3748031,2024-06-27T13:15:55.160000 CVE-2024-23850,0,0,eaee80c6a4df06415b75844b5854d1fb017cf0a71c38adc88e28ca7730fea568,2024-06-25T22:15:17.963000 -CVE-2024-23851,0,0,969eeacea3c194331b42e3e1f30a2665f600ff74dab98ad82bc75a914982a1bd,2024-06-25T22:15:18.110000 +CVE-2024-23851,0,1,a05f912419e5bd4855ec7f8f2de3c3c3a6ed17650fc66a4559c991fe83e7dc5d,2024-06-27T13:15:55.290000 CVE-2024-23854,0,0,e12e97693d6a1adb9d778d4a3ad1f5e4e6c8196b80d701634408ca7432c7042f,2024-01-23T16:15:49.770000 CVE-2024-23855,0,0,b9fe267aaa77b7c9c29b41064b4026f38255b0ddadfbc4c66e9b6bb04515f9ee,2024-02-15T10:15:09.167000 CVE-2024-23856,0,0,7a070de7fdd5d74cea0874cc007ef2bf0f323d01fd662c9716c69691cbccda1f,2024-02-15T10:15:09.493000 @@ -245229,12 +245230,12 @@ CVE-2024-24850,0,0,652490ba0ed83980506bcf4c7e3a9ad65010ac8cd59cdee6424f69f7b08c4 CVE-2024-24851,0,0,2e5d4b63cd4a5c163d90f2eb6782e82921987e323bb72c98ba07057a0c30a99c,2024-06-10T17:16:20.610000 CVE-2024-24855,0,0,53926eea6176e5ec7dac755182b92f74698401115acbca0c88724948db080e51,2024-02-10T04:06:40.840000 CVE-2024-24856,0,0,897c9d51329abb27267fec6558272306b15cef7c8a7ba7af0923ea3fa5117d63,2024-05-29T08:15:33.740000 -CVE-2024-24857,0,0,70c6d5ece6678886a7797bdfc28bd5a67c447db55f3c212ea24ab2852133207d,2024-06-25T22:15:18.220000 -CVE-2024-24858,0,0,1006d984be478f6c2d31afe298559e7c9ee4ee5a1d2e28ac6c51a282a0877560,2024-06-25T22:15:18.333000 +CVE-2024-24857,0,1,7f835fe288548a96925b4c6ecf151a73d5fa920cebb87bf866cdf1ebb3086956,2024-06-27T12:15:17.990000 +CVE-2024-24858,0,1,c6cc042c69cb366d36d56d18091d354ed883f7055b1a0b2f93b2517cec213519,2024-06-27T12:15:18.103000 CVE-2024-24859,0,0,e679ba08f49ce2259e6fae9f7247bb624101b65d866a2698d5f41c0ab1e599e7,2024-02-10T04:06:05.623000 CVE-2024-2486,0,0,20b275da7efa694e75834bad35ce25afdc0896f4e8ec89b73dff1adc38044be1,2024-05-17T02:38:15.227000 CVE-2024-24860,0,0,930ad3dcd07596735c34926e3ff264e688219576d27633e4b6607c22eafba6a9,2024-06-25T21:15:57.470000 -CVE-2024-24861,0,0,4c5781f18547f50b727480c35b9feb3db09b57940abf8488dc06b77335eb3f5a,2024-06-25T22:15:18.440000 +CVE-2024-24861,0,1,693c0dd124357ba2e90240acb2617704271a189c8c282268f2df4262881fe583,2024-06-27T13:15:55.407000 CVE-2024-24862,0,0,af2c1a0f3aae6b0c803a668ceffe7824bd607ed8e7ed1abf8aab616f56b37272,2024-05-29T07:15:09.833000 CVE-2024-24863,0,0,f9060e23f685b87313f1b9f83084cfae7fe30cbfff18bd587fbc4f8a4d5d1745,2024-05-29T07:15:09.983000 CVE-2024-24864,0,0,cb2feb3346fb11cc5b4be9ff84c56cdf4de4a5045cdc4255bc9349b2b8259736,2024-02-10T04:05:22.843000 @@ -245717,7 +245718,7 @@ CVE-2024-25631,0,0,762b89556b501c655b7561ea12ef304be15c2e928b2e552489636c84deba3 CVE-2024-25634,0,0,c1510e3ab0b733f2989d621c241e546f656e3e790b7a0232e637470ddb569500,2024-02-20T19:50:53.960000 CVE-2024-25635,0,0,a4a1398f401e935ab32cbd396026a9007e03a9f1dbbfebcc101e2a33975e9674,2024-02-20T19:50:53.960000 CVE-2024-25636,0,0,25ca08d2d7942010a89cee168f33ec13089ab5d688be0f620a303dd1bdaf78e7,2024-02-20T19:50:53.960000 -CVE-2024-25637,0,0,595fac7fc765ac8a51102cff8c756dc931e0afeedb6e7b464df3e6411f6cbb1c,2024-06-26T16:15:10.910000 +CVE-2024-25637,0,1,bed3eb3cbd9201a59663cf94695821f16dff27d5f1d34ca085375a6f38d3b013,2024-06-27T12:47:19.847000 CVE-2024-2564,0,0,06f131cdbceb269732c61d2fa80714aae66d7510c20454358bb409674d65f586,2024-05-17T02:38:19.517000 CVE-2024-25640,0,0,e7a5a66e06481c463ef3267e2ad9b6391b00223315aeb71281eb8d63b041ce79,2024-02-20T19:50:53.960000 CVE-2024-25641,0,0,01882f7d04c2dc87c7d221824ff0834c6cbd589debd5a7b4cc399662a920b788,2024-06-10T17:16:21.837000 @@ -245786,7 +245787,7 @@ CVE-2024-25735,0,0,b2ec3248064181eabfaf9fbb0d3d8ff31c37e79eaaaaefb0325854c3d0f38 CVE-2024-25736,0,0,7371e824af142b51c9574b5ab47b3c1757c3b280bf74f832655082514c5a65ba,2024-03-27T12:29:30.307000 CVE-2024-25737,0,0,c21522be4d57ae2d60b6f116d957a8aa7f3600ed2f42835d5255171799955352,2024-05-24T01:15:30.977000 CVE-2024-25738,0,0,5b0933edd0a9b4e3edda858629a766ea8650120fbc34a2eac700e3c0f36b7b50,2024-05-24T01:15:30.977000 -CVE-2024-25739,0,0,57ac8a2b2f9751d02e4a7b769208a0b0104f6ebd9263a0e03218cca0e595907e,2024-06-25T23:15:23.967000 +CVE-2024-25739,0,1,b92e2f016d3d77630a44e1950fdfe7bd99c18458b180a1f99fef1db543e306f1,2024-06-27T13:15:55.520000 CVE-2024-2574,0,0,b5441c1b84575547e924314a12527464107de86e7e6ade40cf449ff7ac8309a8,2024-05-17T02:38:20.537000 CVE-2024-25740,0,0,e49082457da2ca822066645fd01741e2b46dee6a85b6e915fd169e8229594e99,2024-02-26T21:11:27.837000 CVE-2024-25741,0,0,f1234f859d02ff2a7aa2753dc2a1e43b929acf864167d8c3c5522f3098d24837,2024-02-12T14:20:03.287000 @@ -246365,17 +246366,17 @@ CVE-2024-26593,0,0,473a251edfbebb3ce4b4b87e3355eb1d1696e13705b77d310b603559273e1 CVE-2024-26594,0,0,ef8231d71a2530f1046a07ef738b3a2c0e18ee0b67c23c787cb250bae5aa2076,2024-05-29T06:16:36.423000 CVE-2024-26595,0,0,4aab14a348ba85d767a05d71533f3a3f5d4b6347adf8eb4cca8cbcf592f0a830,2024-04-17T19:55:31.323000 CVE-2024-26596,0,0,ec7de6cfd89ff8a670c626a8cfceb80cf8d6a85a0db935f1a22cdd71fbe71243,2024-04-17T19:54:59.240000 -CVE-2024-26597,0,0,b4aec42ce6b65368344443d5f4b5ce9a1bed2aa7f8226ccd839af7d4b6a78fc5,2024-06-25T21:15:57.720000 +CVE-2024-26597,0,1,d2e09a95eca9702312ccda664454b2120cf820fe8c781d1b1e7af45c2ee5647d,2024-06-27T12:15:18.200000 CVE-2024-26598,0,0,ceb42dd6eb8c7f994fb632ac182ba0ef701c50315ff3b4176b7f06bb05e69520,2024-06-25T21:15:57.833000 CVE-2024-26599,0,0,dda6c0811ddef448093e42d12d857e594768c4ec8a914fb75b8d540daf2fa62a,2024-04-17T19:34:01.837000 CVE-2024-2660,0,0,843944eae1c6c40885689b5097e342b8e4c211b44309cad2223d4f45ec2fe606,2024-06-10T17:16:25.443000 -CVE-2024-26600,0,0,8f7041099430b3fa2f76c24c3ae3ac603626b78a49d9f44217fd6ef7b357ad11,2024-06-25T23:15:24.390000 +CVE-2024-26600,0,1,c412374bb4da1ff140598c828a442673171c2fe17a75ebc474ae5725bf7123cd,2024-06-27T12:15:18.347000 CVE-2024-26601,0,0,7f3ad1f6f3ebf98a9bd2c9b6575d1c5213c503e592e9ec5e481d162cdc202c38,2024-06-25T22:15:18.583000 -CVE-2024-26602,0,0,05046c929ab3f3810003ae7a84d461ab7cb252fbd3ab26f00f34a65a4926144b,2024-06-25T22:15:18.703000 +CVE-2024-26602,0,1,b407d0fd8b6c800c72e1ea89ea9c9c1dd4369c8b60472c9e7695a876dc9fa874,2024-06-27T12:15:18.543000 CVE-2024-26603,0,0,ea875115abb5a013b43aabc1c8e80523fdf49c8e0a84f2554de163f8ad2e5b2f,2024-04-17T18:00:07.600000 CVE-2024-26604,0,0,3af54300b651d19d656a5097d70c7e0dbb5923d92e6dfc43928a15db003f16f1,2024-04-17T17:55:23.003000 CVE-2024-26605,0,0,21a2f4f8a64c6ad503f7877dcf796b66ec78707bc2832cb2fd27454941c8959a,2024-04-28T12:15:19.740000 -CVE-2024-26606,0,0,0a6b01c41cbe49ecd623e64dc4c5076396e47b0106db09b6ef9f544ff351923c,2024-06-25T22:15:18.807000 +CVE-2024-26606,0,1,8a7b5e45bfa13df8381de4d13ccccfb4cfce60ae395c03e9bdc2a1f1c007cf95,2024-06-27T12:15:18.720000 CVE-2024-26607,0,0,10f708b618964c31a16152436a6b5d9b9b34324402ac957d6db7b57f6219ed49,2024-02-29T13:49:29.390000 CVE-2024-26608,0,0,9db678542933ad0e36202af80b187252a408347bbb9057cd73da20b3710cb095,2024-03-12T12:40:13.500000 CVE-2024-26609,0,0,eba52c1ed17b7c8e6fdbc8e74f6dcae3f10c0a54b31264558f9d09c22050a68b,2024-03-12T14:15:07.133000 @@ -246385,7 +246386,7 @@ CVE-2024-26611,0,0,f5f8014c0e69bcecfc82fb6ddb784269feb2e65f820ec263e9cce416d0ed9 CVE-2024-26612,0,0,46aa35ea5f61fa1a244316c415a151e36b3b6ed36e5fbae9508957981ff52a6f,2024-03-12T12:40:13.500000 CVE-2024-26613,0,0,9c21d59a031359f7ae8bda7d354e38c722398af816f84698954e197439d47726,2024-03-12T14:15:07.310000 CVE-2024-26614,0,0,136a2bce087c912066b76af6e4f8876fc431f75af04205578b350bbe2e217a8a,2024-06-25T22:15:19.037000 -CVE-2024-26615,0,0,5afcdc3964585caa7fd1004eb6455ae1c77d07c98dbcf7adeb5ae475a84a1f9a,2024-06-25T22:15:19.150000 +CVE-2024-26615,0,1,1fff5907e3ecff8ba714d3d4f81372f1ea4ab33944fdab4c69ea82d6e055bca3,2024-06-27T12:15:18.830000 CVE-2024-26616,0,0,67c4d26cc1e75c57181d9255c85436a4c3af8284f9039d254bef26a25c8790ef,2024-03-12T12:40:13.500000 CVE-2024-26617,0,0,98f25d07957e43a68ce783dc66385cb1d945d9b9e46d62254cc9fb65f4260d30,2024-03-12T12:40:13.500000 CVE-2024-26618,0,0,b4ee02e43411773445d9502213c0c8ee13dbb28e9adadb6062e2443b8f28756e,2024-03-12T12:40:13.500000 @@ -246396,7 +246397,7 @@ CVE-2024-26621,0,0,eba0c21ed3ef4cfa6360555e22a44f48e6f6b17a1f446df92f554dd254f62 CVE-2024-26622,0,0,429b8c79ac7bc8a6f352b05f3ec787ee7dce1baf63c22803c7866fe6ab98869f,2024-06-25T22:15:19.240000 CVE-2024-26623,0,0,5692b1c30d07fd10d73a2d8d099143935e519ebf33db10f9328fbf12228012a8,2024-03-06T15:18:08.093000 CVE-2024-26624,0,0,9575e38401ed951dd513d0e1852942215c7c9e9bc3c5371fd0da3ac3a0eac967,2024-03-27T14:15:10.163000 -CVE-2024-26625,0,0,eeb202ce34aee51b37827eb103ec23e9310d65b79c8c63fe1316a9409b935ba9,2024-06-25T22:15:19.353000 +CVE-2024-26625,0,1,a82be919faf4eaa450ddb72797fb45315cc5e46b8a4d3287a243d50d06c8184d,2024-06-27T13:15:55.670000 CVE-2024-26626,0,0,144b70a967c255a0ac33e20cfa403c3f12d2b0b80c4b891f29c37c572ce370a3,2024-04-04T14:15:09.390000 CVE-2024-26627,0,0,36ed23316e1f936896e15de1487d608cf27887d4d4b8db1095727cfd5ae873aa,2024-06-25T22:15:19.457000 CVE-2024-26628,0,0,c81fd3a5ad105931eb915543b147e48cdc3d2e1a2a90d930b948d12a8b8ed86c,2024-03-20T17:15:07.367000 @@ -246405,27 +246406,27 @@ CVE-2024-2663,0,0,55ee1956c2d7bbc50de3eb9279213def71c6addfab3803b129fe79cf9c6fa6 CVE-2024-26630,0,0,5c24e6549a4bf437d13995c2ff418c1a6446686ddbb1e2b096648761881da114,2024-03-13T18:15:58.530000 CVE-2024-26631,0,0,222d3f04973ef7b8bd710a7add62de2fd6653eb660b6c5918d7c02d522dbc80b,2024-03-18T12:38:25.490000 CVE-2024-26632,0,0,8b51b67583fc3a4cc3512b8291c6146d1acb8da0ef47e543de910809f49bab97,2024-03-18T12:38:25.490000 -CVE-2024-26633,0,0,df5188576cdd0dd57bf59125113c63f3dd8a8063a50c97df109f7656c05c84ad,2024-06-25T21:15:57.977000 +CVE-2024-26633,0,1,110c097ecfad9781d42741caa0957d6d94074fc6b0502ae6bc4f35f96c0cdf83,2024-06-27T12:15:18.950000 CVE-2024-26634,0,0,9c4a9c8724f91e01af3e835e6f235a5672cbc706f5f1109ef855feafd532f134,2024-03-18T12:38:25.490000 -CVE-2024-26635,0,0,4581da28ec9e3b4445c982363dad56fa609c0dac2e630787c600583af28f7e77,2024-06-25T22:15:19.540000 -CVE-2024-26636,0,0,b1637c152f443469a914cd40b793e1655abef4cdc741384255cb02da952cffba,2024-06-25T22:15:19.627000 +CVE-2024-26635,0,1,7284e3f4b6fb3b852818ebb1ceaefcf3d0ef95d01cec9d130b6bba5a2dac00c4,2024-06-27T12:15:19.117000 +CVE-2024-26636,0,1,15f69b713af4c0dab0dcfd89145519e6ece7ad4a9ebb533ecc1469ecfa454e22,2024-06-27T12:15:19.263000 CVE-2024-26637,0,0,fc892e24bd1b7e8206ffae07359f5a6f79726dc219d9822d731828992a4ead1a,2024-03-18T12:38:25.490000 CVE-2024-26638,0,0,810693405d991f7ccd7a2a1a0260a34b1a9402f77c9d945d74efd33b7925ef28,2024-03-18T12:38:25.490000 CVE-2024-26639,0,0,9b6fa0232c66c8cf8fd9bbe39562770943151be50075f97d78497bc85fbca0f5,2024-06-20T09:15:11.183000 CVE-2024-2664,0,0,c0b832041353c8a6cfaeb7e198e87ee27cc866ec20501fb216f1e10cc4fe5ced,2024-04-10T13:23:38.787000 CVE-2024-26640,0,0,709d572ef2e53410bc73c6d936457013e4ed592d140aea24b807c64926a2f31b,2024-06-25T22:15:19.727000 CVE-2024-26641,0,0,5f985d6bde2b6e0794eb77bd6d286d532ffddf1ae495276773baf6a9e835f505,2024-06-25T22:15:19.803000 -CVE-2024-26642,0,0,08f332aabe0b636f197d3559028a2855c8427878c15cc7922239e2e85e6d6c4c,2024-06-25T22:15:19.867000 +CVE-2024-26642,0,1,ea895558f9ce938f68be00782dd2658dfcb8a5411b8a67041de676e17a7fbb0d,2024-06-27T12:15:19.380000 CVE-2024-26643,0,0,eb153b84e6cc2708279dd9e3b05be5ba8b289c1575e56efb84c80318bc7fe08b,2024-06-25T22:15:19.927000 CVE-2024-26644,0,0,d7e8cc08b3c6351289354da5b29b7b769d35615f96d244dd5885c6183535aa43,2024-06-25T22:15:19.993000 -CVE-2024-26645,0,0,130f31e7446b4395151bff00faffd3c0448c3f5db3ac3d0bd076390a735ad1dc,2024-06-25T21:15:58.100000 +CVE-2024-26645,0,1,4df5ac13ed947c18185b508260d0f3c4a9c33f77b960a3e3dc9bd21ac9fbe4b0,2024-06-27T12:15:19.470000 CVE-2024-26646,0,0,dccd3fb042f624b294392888bd78f3cb643c796b96f3f1a01e194aa7fd56d552,2024-03-27T12:29:41.530000 CVE-2024-26647,0,0,29bdc4340bafd301bcad34511ccc4699e791a96b6f9c94e00888fcdf9deccf2c,2024-03-27T12:29:41.530000 CVE-2024-26648,0,0,28db65aa9bed6961e64f3164f5e2671ea79deb15b882dd8229f6c9a5965d8f38,2024-03-27T12:29:41.530000 CVE-2024-26649,0,0,86aeb2fae965a4a5332ed6f99e853d97c707f8eddf2b6cb0afb03f1458efaad0,2024-03-27T12:29:41.530000 CVE-2024-2665,0,0,599614c9554c62a1cfca8ae9827c37fab37a372d5dc9c8c042123c0e72c6c04e,2024-04-10T13:23:38.787000 CVE-2024-26650,0,0,cef3f26a25f8b61771b4d2b56efb4054bd556fe5148a98c16b7fb8500a431ca1,2024-05-23T14:15:09.293000 -CVE-2024-26651,0,0,b683895aef8099fec1f83e08d659e6bdd797fcb0e71396e5b8430fb41ec8a989,2024-06-25T22:15:20.093000 +CVE-2024-26651,0,1,fe50b19b15a780af354b7402e68ef23ea594e35f5ce1e1866ec7ede854439f6f,2024-06-27T13:15:55.767000 CVE-2024-26652,0,0,83433335e001013ce7fac31bffa4d9f6c5d9ac03e3150fd567d8288efd087e28,2024-03-27T15:49:41.437000 CVE-2024-26653,0,0,d049a2565dfb8e2d40a03bd3cfe4e1ae5290c810bf6ab13cfbe1970fbbfbb37e,2024-04-03T14:15:16.520000 CVE-2024-26654,0,0,4235235d2f8be7cd75a4458ae17eee9e9b2bd1baf176e95cfe5f47fe4d2b8945,2024-06-25T21:15:58.207000 @@ -246438,8 +246439,8 @@ CVE-2024-2666,0,0,ffba1198f94465a43012b1f89eeaeac60b5b7fef826803818be3a7145aba73 CVE-2024-26660,0,0,b1951297ec8036559699923c7fc2f6a4b545d195c3084904d1128a08b214c072,2024-04-02T12:50:42.233000 CVE-2024-26661,0,0,a20c8f17e2fdf6f97b076b112a4d67d7d684b0b99a9a03f3b46ed343b76fe75e,2024-04-02T12:50:42.233000 CVE-2024-26662,0,0,5478b81863bcc7c7fcff764c891ce6afaadb8c53ea3ff8fbccd3df211f951a10,2024-04-02T12:50:42.233000 -CVE-2024-26663,0,0,28bea60c19ef7aadfacf925be11971a958ba6f5be52a63d3689306079a1ce9ff,2024-06-25T23:15:24.550000 -CVE-2024-26664,0,0,02c4ca5946b18ceb0ddb8fd261b303eaf7164df38f217c5ecf7412423aad3a5c,2024-06-25T22:15:20.287000 +CVE-2024-26663,0,1,e823359242bddfc75e25d2d65cbba3de1d66636aafabbfcda49fe07324928ed7,2024-06-27T12:15:19.617000 +CVE-2024-26664,0,1,f4244a2369688d2a0f4e2081c25ba018631535044efbf4edd9149bd944b196d8,2024-06-27T12:15:19.777000 CVE-2024-26665,0,0,ee0f9e0fcc71e5f476e01c016556db845cb658f5acccc75c0d629c5bf1534edb,2024-06-25T22:15:20.357000 CVE-2024-26666,0,0,847c69593144a186f04713e763e1701cd30416402b2ec969fd7a7fe8113f9ff4,2024-04-02T12:50:42.233000 CVE-2024-26667,0,0,94c4393d94bf8ffafa0795ef14bbbfeef0fc95e89ba2815e394b4ffe1a710f42,2024-04-02T12:50:42.233000 @@ -246447,22 +246448,22 @@ CVE-2024-26668,0,0,403e2f0dc2479c11d19be04dc46feab87702706f888cb8639771e4d482c0e CVE-2024-26669,0,0,d408d9f159224fac5caae195ab41b8f7c3e073399b1e1f160025cf5dcd4d1448,2024-04-02T12:50:42.233000 CVE-2024-2667,0,0,04ce755d64ab1c34b3f96cefb09ddfc6e0cb21025751344741537d8ac01cd02b,2024-05-02T18:00:37.360000 CVE-2024-26670,0,0,380d2c37ea7845582838d7dbc0eabfd5e74c9ab739dcf04a03021ed632f54672,2024-04-02T12:50:42.233000 -CVE-2024-26671,0,0,9282ca8b10b67c54fc4b806e0d3d1303b8a7659d2bfad01165bdde6bdce37858,2024-06-25T22:15:20.417000 +CVE-2024-26671,0,1,170d8b58ea54df035f342c1a8457d78ec180da8e14acf29fd3e83cbf4125b576,2024-06-27T13:15:55.847000 CVE-2024-26672,0,0,d42d6d58453c553d5b730197f2b0353d3aef5e191723afd6b4fd7229f61a90d1,2024-04-02T12:50:42.233000 CVE-2024-26673,0,0,0c8bd72677032634b917d9385fcbf16d223a7f2a977f787a4ae419aa9736670c,2024-06-25T22:15:20.487000 CVE-2024-26674,0,0,f1d8576ca0aa47350de64417aeef31f1b238573e2983d0df225d9682a3d84a0f,2024-04-02T12:50:42.233000 -CVE-2024-26675,0,0,37c53baab4a4c731192a965e833f0377e9969e5509e69c7b11a4cd47a048db9e,2024-06-25T22:15:20.577000 +CVE-2024-26675,0,1,8b36dd3d34a0ce6f828ffd705d6e033758ef3b9f0bd686a3cc45a220e110dbf2,2024-06-27T13:15:55.923000 CVE-2024-26676,0,0,1d6462abc387a07745aa4cbe7883c8d5a9e7ba60d572c150c39ead906ad157a1,2024-04-02T12:50:42.233000 CVE-2024-26677,0,0,6b321906db4a8761a068972f50c35aaee56cfe9a508eaeb0f87a01adffdeee4c,2024-04-02T12:50:42.233000 CVE-2024-26678,0,0,64bb303dae4cf9ca5eb7c0f51b50259620ff4e12c1339c5a90eab449566d6e8c,2024-04-28T12:15:20.717000 -CVE-2024-26679,0,0,c79320adabadd0454fb85e0083906856eedad83beea518bdabc197ac44072783,2024-06-25T22:15:20.657000 +CVE-2024-26679,0,1,3a4bb19cb8853c9d2143d3574fcb0c274a8ace14ebcde4cbce2ef2e9f28a06bf,2024-06-27T12:15:19.853000 CVE-2024-2668,0,0,a0072f6a4c94b0df552bd2795c1d5b1a5f1d4b56bb17972636e06c15c3fab36f,2024-05-17T02:38:23.770000 CVE-2024-26680,0,0,7cba00bff493eedad4949f635084d20f9b62c12fbba2060341caa87d798b6aa5,2024-04-02T12:50:42.233000 CVE-2024-26681,0,0,d0888cf223e3ff781851ac3c49fc20b7e9eb990bff5eb716a081ef52bec7a9f4,2024-04-02T12:50:42.233000 CVE-2024-26682,0,0,815bda0c2dbd75c0be714f55d4f47783146c4072cae1e67684474359c73535d9,2024-04-02T12:50:42.233000 CVE-2024-26683,0,0,6c5f44f4e0a996eee17bab8d16a07d09ac59770d962422611b733c6dc302bcad,2024-04-02T12:50:42.233000 CVE-2024-26684,0,0,b25ebd607caaed834f2e283b45884b0ce41fc2f6a51e25fe476a6262ea52278a,2024-06-25T22:15:20.743000 -CVE-2024-26685,0,0,bf9ac85fcb5efd9df89949caaebb7947b9eb665813216982ee734e2aa1d00ea8,2024-06-25T22:15:20.823000 +CVE-2024-26685,0,1,f7de74b87d6f7649315a011d523296e624197272419b053912cf7329da66dc4d,2024-06-27T12:15:19.930000 CVE-2024-26686,0,0,0734bd058534992a65fc91e2031545067c67a938d385e2881322919d7c691c5a,2024-04-03T17:24:18.150000 CVE-2024-26687,0,0,fdcc9ad91c281b8718ef51b1377e99bafd8b3ea8cba13d518f94b5c2026dbabe,2024-06-25T22:15:20.917000 CVE-2024-26688,0,0,ed12f79fd6104a235cbdc560a1156da9abf3871749cdfd72abb57a21005d1489,2024-06-25T22:15:20.987000 @@ -246474,8 +246475,8 @@ CVE-2024-26692,0,0,b02f9b02f80faf5e8740d67d2e737aa07c6c6299064f594711d3e5675e569 CVE-2024-26693,0,0,06a7551611799da22af7c9fc636dbc95a93359734e0effbee40348428613115d,2024-04-03T17:24:18.150000 CVE-2024-26694,0,0,07dbd54caf247ddd704e26470ea5f00ea5044cec9ddc5bc1a7c23b306d2a4394,2024-04-03T17:24:18.150000 CVE-2024-26695,0,0,2f6a9400af136bdd87161a0120b66e0a3cf5b2c12f3157ad0ca089764dc04913,2024-06-25T22:15:21.107000 -CVE-2024-26696,0,0,c55a8deaf4042272961f04c66586d01bf41c8e7850928d03dc772d09c572b5a5,2024-06-25T23:15:24.740000 -CVE-2024-26697,0,0,0bf31ebd118ce05141d54d8a99a3b64c8bbcabf963625b32ddfc13131856440e,2024-06-25T22:15:21.173000 +CVE-2024-26696,0,1,3d17d97db19c76c7a9f720b1cc7cd4fb45f01f7d6cc2037631692449e4fe1d3b,2024-06-27T13:15:56 +CVE-2024-26697,0,1,56f4aa296dd31481a76b81b365f5d3e166f7a15b60c996231a75dd020ac621d9,2024-06-27T12:15:20.090000 CVE-2024-26698,0,0,7418cc46da8c4be7d7ba0a1e5737ec926cbdae08cb7ae7d7bd1dc970c14678a9,2024-06-25T22:15:21.233000 CVE-2024-26699,0,0,893e2566b79b4339e0de5dc826485972a25f64a86894d66476e9aa50b261cebd,2024-04-03T17:24:18.150000 CVE-2024-2670,0,0,6df2fccccda4625380f0d77208784463503e52e144c4f375ff93731127306d5d,2024-05-17T02:38:23.970000 @@ -246483,7 +246484,7 @@ CVE-2024-26700,0,0,c7f7efb0fc67c79ba41a3cf79c22cbc18bb5083f56afba1e521870cfb2b95 CVE-2024-26701,0,0,54fae0440f48d8146334d9fe143fef326beefc4d419b36d98c541549a8b51c01,2024-04-03T17:15:50.720000 CVE-2024-26702,0,0,b39a5c376292daaca2036af79898ec6650c540077261ec8aeda9b40b6d851aa0,2024-06-25T22:15:21.297000 CVE-2024-26703,0,0,b344d31b02693857347a21e590c5c4d363537121a8f2a575a8c32b8732b6372d,2024-04-03T17:24:18.150000 -CVE-2024-26704,0,0,886c75fc21c32ea075003facc8a474a955999391fcad04de524203a1955dc70b,2024-06-25T23:15:24.850000 +CVE-2024-26704,0,1,3db84130b4ea5280f93e68f404c01f7134d7f2180aa98a24db3a141f99601dc6,2024-06-27T12:15:20.167000 CVE-2024-26705,0,0,4bc01c28be144268d0ce8911fb34b9966e75caf55cc3a0b46c7d99230e92a50c,2024-04-03T17:24:18.150000 CVE-2024-26706,0,0,a2023a45518e51eb54b212d1797e258abbe5e58612d773245400c9143a7ec522,2024-04-03T17:24:18.150000 CVE-2024-26707,0,0,077c5ee026e6719cea720b3e28711d29812ccbd96968ca1a33ed4019e8f056dd,2024-06-25T22:15:21.363000 @@ -246501,9 +246502,9 @@ CVE-2024-26717,0,0,59dc38f4ca0fac7761a10b6ba841b401c9794a183a7d37c9f133e8aa06829 CVE-2024-26718,0,0,dc3587dcbcf53ad899013c72aaa174686830cf4221013d300970c9b7a2f2dfa1,2024-04-03T17:24:18.150000 CVE-2024-26719,0,0,1fb6d263de4a65a41ef221cabefe4652686a788a317274677801f4ddb7da2daf,2024-04-03T17:24:18.150000 CVE-2024-2672,0,0,f064469630b047aeb7ceff051aaff6df6be345f7f506e23f1a82d6dd9e65ebc4,2024-06-05T20:15:12.810000 -CVE-2024-26720,0,0,97359b81033cf7c752775eb8cdb53839401ff05aa1343cf994b1b634b2e86297,2024-06-25T21:15:58.290000 +CVE-2024-26720,0,1,79533c7099e562296ee998d22049a0e97d7b20510fb175ac86edd10734962c54,2024-06-27T12:15:20.240000 CVE-2024-26721,0,0,1aa1efd903abf096ad1290c7c10d400fc8a97adfaf022fc1c266431a51be82bf,2024-04-03T17:24:18.150000 -CVE-2024-26722,0,0,dc42ab47dedaca955b3f6d42da3e36c5a23cb6d81cc47cb1fb6fa86b4b91af0a,2024-06-25T22:15:21.423000 +CVE-2024-26722,0,1,e74361f6541094649b1dca61d8daa0325711303ca851796eeabe34a04b015ddd,2024-06-27T13:15:56.110000 CVE-2024-26723,0,0,0949751941687d82a6dacb9159811c840e87ba7d294a53503c53406edf1cbf15,2024-04-03T17:24:18.150000 CVE-2024-26724,0,0,d2ceef0f21f4a0a12c80f233bae20a6e1c4d359e0369bb61193e4b0877c05297,2024-04-03T17:24:18.150000 CVE-2024-26725,0,0,2be6e1c9d624be7946db879f352cea13d16e25a3b066c74bf24048f77f2691f1,2024-04-03T17:24:18.150000 @@ -246517,7 +246518,7 @@ CVE-2024-26731,0,0,ffd0547fa4f7adde2913e3edfc16057fe1d5c3c7f9a97582af8eb87eb11f2 CVE-2024-26732,0,0,c79b44560393d9b6fe0b9e8f2bc00a229b58c9ebdfe9cedd1f5a163d96d5134f,2024-04-03T17:24:18.150000 CVE-2024-26733,0,0,bb5c48640643499d895dcc73914c4708f47feeb6bf59db78d1eb9de48377553a,2024-06-25T23:15:25.030000 CVE-2024-26734,0,0,5eb9213c098a3e755eb225866accfd313e5e9824a77625ad0370f2a7a22526ae,2024-04-03T17:24:18.150000 -CVE-2024-26735,0,0,74405f56060bc1a255addb2b914818fe2bfe28f660e97284b3f78afbdabbf851,2024-06-25T22:15:21.483000 +CVE-2024-26735,0,1,e7f2cc4d3dc89ae749bb72ef33680ad429d849e5b21f62cb63f90c5b00c1ab4e,2024-06-27T12:15:20.317000 CVE-2024-26736,0,0,d297f6992f8537d5fe1e94c5d0b96873efcde57c34767fb119a58347af2f08f1,2024-06-25T22:15:21.543000 CVE-2024-26737,0,0,1dd558e5f1e9dba81bdafd74b0392d9bce041c19483372b4b200af34ecaa112e,2024-04-03T17:24:18.150000 CVE-2024-26738,0,0,0da71a5df1c934efac30bc800f4ac3eb667b91e38957e2b5099eae79d093cfd3,2024-04-03T17:24:18.150000 @@ -246527,7 +246528,7 @@ CVE-2024-26740,0,0,a9173891a93fe00eea479c084fefa526c89960d019df00147a9bacfb9aeed CVE-2024-26741,0,0,050138134af3f88be99a69480ba64d68e091dbd294f57be475066f8d031ece8a,2024-04-03T17:24:18.150000 CVE-2024-26742,0,0,06fdd43949cb6e9f1f6414a72375fea7c6b9f1a901edadb8175d5b281b69a545,2024-04-03T17:24:18.150000 CVE-2024-26743,0,0,f3385f45f87281eaab25c5350f155535510092b2436559fefcf0fd9529936753,2024-06-25T22:15:21.600000 -CVE-2024-26744,0,0,66e370be2b971b331e49e5c7df4602425b7943f946cc0d455dc46a85987597fd,2024-06-25T22:15:21.667000 +CVE-2024-26744,0,1,57405882a5e016e430548713366c169726179ec397a01ab9991e7c64fe51ec15,2024-06-27T12:15:20.400000 CVE-2024-26745,0,0,e007dc569e97f1bdab85f4f0be08bc105301d990bc30e55831411f297cbd325d,2024-04-04T12:48:41.700000 CVE-2024-26746,0,0,b6823567fc4725561bc1a3297918ddc40afdf89b58466fd2d5d8a14a2b7b7894,2024-04-04T12:48:41.700000 CVE-2024-26747,0,0,dfa72fb8d87c7f57149745aaca752d3058eafca2f73e537169225644b34af291,2024-06-25T22:15:21.727000 @@ -246536,9 +246537,9 @@ CVE-2024-26749,0,0,2edfe1f330afb894fa2b33115bfab929a702c660e0ec352173d906aebd2d0 CVE-2024-2675,0,0,357c27042cb9f8711589e0de3ea88a89973a8f009a9f3c2f960579cc3b396563,2024-05-17T02:38:24.437000 CVE-2024-26750,0,0,62a2e73c89527619216347cc3fed9789f9a1e22a1bb04646957d70426c630f51,2024-04-04T14:15:09.620000 CVE-2024-26751,0,0,d7ae96a87ea8c523a4065008cdde118b0fc3f0aa922ebb5b66981f620593bc20,2024-06-25T22:15:21.843000 -CVE-2024-26752,0,0,7b97495c4fa7e484b87d81f13cd594dbaa49c9a5a308a0c7a536f93849bde499,2024-06-25T22:15:21.907000 +CVE-2024-26752,0,1,7511c24689a3be87358294385315248289a2ce412c7f1f02d9b3cd2d5fdd3857,2024-06-27T12:15:20.473000 CVE-2024-26753,0,0,6cafb87d574089f084bd23f0f155ee52c27c72015a0071b0f53380e23ecd68bc,2024-06-25T22:15:21.980000 -CVE-2024-26754,0,0,881335605def0a1935b2ae277f91a0110ca2f80e7aab2d21c6052473d87bea73,2024-06-25T22:15:22.040000 +CVE-2024-26754,0,1,bc2f5823c900c02ebf33e7cddcd9218ee8f6912e8698def5d2e12eb91d7b7f99,2024-06-27T13:15:56.187000 CVE-2024-26755,0,0,8fe56c22e43ba301f730149b88a86d66d12f8cd51d72c56dab301d87c30412d6,2024-04-03T17:24:18.150000 CVE-2024-26756,0,0,0d69d830e1e357748097adbd333f0d3c2f63e19662e704826e0509fb21189b82,2024-04-03T17:24:18.150000 CVE-2024-26757,0,0,f61474907aabc62d0a96a3eda184905054eb143f2c269778dd0dac11ed03f8ae,2024-04-03T17:24:18.150000 @@ -246548,24 +246549,24 @@ CVE-2024-2676,0,0,f6dc87060d438d9af897254c45edf1a6a2cf325467217af12df27cc287d2c2 CVE-2024-26760,0,0,a5f5cc6e062aeae61fbfc34111b786bec610fce2a1395ca78113f38c56b742f5,2024-04-03T17:24:18.150000 CVE-2024-26761,0,0,231b61561260207d152cab47962d3a3336457ed35b6564bc6e0245e55d72869a,2024-04-03T17:24:18.150000 CVE-2024-26762,0,0,6566dcbd7e9762a4d119ede49a9f633286da88188332c96ab79924574839005e,2024-04-03T17:24:18.150000 -CVE-2024-26763,0,0,35caf00914b9c9b14850ce785fd9ee4e372bd01480d3e6d5161a0c46f2c450f7,2024-06-25T23:15:25.163000 -CVE-2024-26764,0,0,e68f91aa695bb8d57e11ec0edc185a0a125902a6c08911ae6b7afdf6bc97090a,2024-06-25T22:15:22.103000 +CVE-2024-26763,0,1,e10c8a25719a48930b236fa71a101d46fb119a30a6a2096fa2eab3b1b636ae44,2024-06-27T12:15:20.560000 +CVE-2024-26764,0,1,d47e921abb863995070c5c90d026e578dee4476d57d838582119b84b9082c794,2024-06-27T12:15:20.647000 CVE-2024-26765,0,0,13205d3c0e934c16a6179b816df8374c4ab5114e71c5034e6c6260af61f32ed3,2024-04-03T17:24:18.150000 -CVE-2024-26766,0,0,92d41ff46477f6b458370430297a73b0d2cf041e1b7f272ba550f699350bbd83,2024-06-25T23:15:25.253000 +CVE-2024-26766,0,1,31d850e4b80501d3adc12f1b06d3bc7c307a7365e80ea2ae184c344bbf12e931,2024-06-27T12:15:20.720000 CVE-2024-26767,0,0,58f7b8da3d1bda10136785f78a9971633cbcc71697e53a05d90ca7684147e25d,2024-04-03T17:24:18.150000 CVE-2024-26768,0,0,8be62141d55536b00cc0a9b4f1306aacd21cd6d0ff895c8ef172b1da1ef5374f,2024-04-03T17:24:18.150000 CVE-2024-26769,0,0,c1677a1069e710d6e8098b700fa800068f98d5066f1c5a13644559998ee185a3,2024-04-03T17:24:18.150000 CVE-2024-2677,0,0,4fa8ca49b2f05c5d0eaffd0da98bb253ba5f2a40ac37260bc9c705d727d57604,2024-05-17T02:38:24.630000 CVE-2024-26770,0,0,3413d37c42bddb8f187b9e0d182ec67933416c911051f0467f03c0aa39a1d2aa,2024-04-03T17:24:18.150000 CVE-2024-26771,0,0,8d441762f7cf967bcabde8e41563216ca4833a817d16dac878e570a7005152c2,2024-06-25T22:15:22.180000 -CVE-2024-26772,0,0,4cf93ba13273fcf6c9088cac13a9e2275608bbc9d7096ba3c2351656afcaef0e,2024-06-25T22:15:22.240000 -CVE-2024-26773,0,0,782337334ba2805fa48a465a906f11ba1379ff4e7a451d25fb612f19823ab7e4,2024-06-25T22:15:22.300000 +CVE-2024-26772,0,1,4c3ab850600dbd765edd8bab91a7e1703b5e7b49a453bed8412dfc5d89fd9cce,2024-06-27T13:15:56.257000 +CVE-2024-26773,0,1,cff24d1dc0c7b2fa21556243818eb7a43d01e6c28265a38b9bc6728ff68e2e43,2024-06-27T13:15:56.330000 CVE-2024-26774,0,0,a0e25bae17d8c70f74db668f329643ad1e1ea21edc6a509d7c5dd5a982b23a68,2024-04-03T17:24:18.150000 CVE-2024-26775,0,0,872f2ce7cbc7534f5989e5a78c689fd259655312b8cdd7ab7c87e8d1b1688797,2024-04-03T17:24:18.150000 CVE-2024-26776,0,0,66293722ab85bfc5992a3c272e6e61ce2665682eb8fd2adbeee0d55a08f3541d,2024-06-25T22:15:22.367000 -CVE-2024-26777,0,0,7ba8a424d93e2c8538f58c5a9b03976f1a8c0cf2fdd0b4eab28e121b772cfb03,2024-06-25T22:15:22.423000 -CVE-2024-26778,0,0,aae8d47ac9844accaf99597df26d7f6270758d62221f9661b07f1f5ba467d91f,2024-06-25T23:15:25.357000 -CVE-2024-26779,0,0,fc663d1689cd2d88dceacd00161e9bc78f728baa3acb3574bebc58775fc9bc51,2024-06-25T23:15:25.450000 +CVE-2024-26777,0,1,5a65126554906849b47afdbd00c5b855e2048a590d96b4e81011ae12dc79a274,2024-06-27T13:15:56.407000 +CVE-2024-26778,0,1,7dd416e95397eadc5d265524734a768079c2dc0b7778f7dc3e42c45981bb5c3f,2024-06-27T12:15:20.790000 +CVE-2024-26779,0,1,a85a0f36b898a9a847a63919b6966e886ee79c681e3066a73e1d6406efcae2fa,2024-06-27T13:15:56.473000 CVE-2024-2678,0,0,cfc7f2fb97c89f494bdca9d174e5d626d7f338127e594d5f5a52c9c7c1cae9bc,2024-05-17T02:38:24.730000 CVE-2024-26780,0,0,223df34d62d2b84a402fad1702c4f61c68b8b136d2e35756298e7d635a8e21f6,2024-04-04T14:15:09.667000 CVE-2024-26781,0,0,8ab1c5e94e2f97049ead284bb9564ad19175ef7064b7fb35238bcc5f53e8e11e,2024-06-25T22:15:22.490000 @@ -246579,9 +246580,9 @@ CVE-2024-26788,0,0,a93a2cbd49db0d74ed1594f7fa9e01639e80eea4300fc6699f485942df3d0 CVE-2024-26789,0,0,9317e6e840de76b98259fe83c1edbaf2945894b83fc1cd4f41b722ed1fe855bd,2024-04-04T12:48:41.700000 CVE-2024-2679,0,0,a8c01ffd3dca4161dd2bbe27ff9317774bbfceee57e75146345ecc16ce1e9f5f,2024-05-17T02:38:24.823000 CVE-2024-26790,0,0,c514f6a0e436b7918d2ee2f9467cd163603630a678e098039ced28a3a1b0be44,2024-06-25T23:15:25.540000 -CVE-2024-26791,0,0,9a63b682971bb5966c4c925d441753ce55a44c1d9f5b326c574881e54babcd94,2024-06-25T23:15:25.660000 +CVE-2024-26791,0,1,a1543c70b3b65a6ea71cf2188adb72a4250c82c19fe0f6089ba7d29278c571bc,2024-06-27T13:15:56.533000 CVE-2024-26792,0,0,063704f95a3aee07cbca86039033d460296358cbed73ad83e6ff0a8f15977913,2024-04-04T14:15:09.783000 -CVE-2024-26793,0,0,8edbcdf8e53e1eef2814ab20fe8ddc17f04581a1a81711f59350f24fde9098be,2024-06-25T22:15:22.770000 +CVE-2024-26793,0,1,662e29dff08fea95907ccf6ce7415421b8505d49dc2b36fce285d1ba667af118,2024-06-27T12:15:20.877000 CVE-2024-26794,0,0,e0cff5908f3e2690d2f76817f6410948099a5c053840caa05f857ef9a15a8126,2024-04-04T14:15:09.843000 CVE-2024-26795,0,0,282f51048defb4068301b2b854050d96eb076fb847df72ea1333349cb09a8525,2024-06-25T22:15:22.850000 CVE-2024-26796,0,0,f7f4928ee73a0dfefe4a8803dadb943cecbec0ed7a682bffb09a6586428d6981,2024-04-04T12:48:22.650000 @@ -246590,11 +246591,11 @@ CVE-2024-26798,0,0,f4b8c2dcf3863c27c98bef60f68cdf80ea6eaca0f7c6ef993de56497ea20e CVE-2024-26799,0,0,315a1001ea2da0ce6a219725ef648950dcd8014da6950b87c48204c8a050c62c,2024-04-04T12:48:22.650000 CVE-2024-2680,0,0,1ef45fe01b59cf31758b3adcada9eb378617dec7a4bcf49ee4b5ddbb5707c384,2024-05-17T02:38:24.920000 CVE-2024-26800,0,0,521cffc31f41e48a9c3a091d93dded103576c4727b9d05337ca615c62ba50056,2024-04-04T14:15:09.897000 -CVE-2024-26801,0,0,eaba98ca89d835ce664cbf99a52ce65c998b2e09490367982b3ec7bdaa0d5eb5,2024-06-25T22:15:22.927000 +CVE-2024-26801,0,1,144108a6974d5f25989290a032797dfb12687a3a7caf3a62832e7be91922f7fc,2024-06-27T13:15:56.607000 CVE-2024-26802,0,0,d0917fd39e2cb6312d9aa9b92b3033b6907cb09ede904749cfa9d73b5ac588d8,2024-04-04T12:48:22.650000 CVE-2024-26803,0,0,bf4f15eac5d42d9d48acabce36c3d482be8797731b77e5ce1483231d6ff82d8a,2024-04-04T12:48:22.650000 CVE-2024-26804,0,0,8591043cb03906c75a22bdcbe978a27e4be8a837f4f99c1437e7a0efda32b844,2024-06-25T22:15:23.027000 -CVE-2024-26805,0,0,34179ea9a8ba09e8102ed47a7b50a08f5e05dbfd777265f65066fb7cb973914d,2024-06-25T23:15:25.770000 +CVE-2024-26805,0,1,8e8906d0a11ea1a1682295949b36aab1271ddc796ee3056987cb92f52d78a973,2024-06-27T12:15:20.960000 CVE-2024-26806,0,0,015091e390b260dd882093bed966879e94cc206771d1bfbc34aebfbaafa6ae89,2024-04-04T12:48:22.650000 CVE-2024-26807,0,0,66efaa56e935b770d7f99b196cd5f7a3f19f58a0e206f379b919ed6ff2ab6c69,2024-06-20T10:15:09.303000 CVE-2024-26808,0,0,91dc43dfc3b1f6aee098b5ceea661a62b3102c75da9c0cdb230c5c38494c89fe,2024-06-25T22:15:23.127000 @@ -246606,17 +246607,17 @@ CVE-2024-26812,0,0,56350a96b77ddac8b2bef0d6e178fb6194d2e535eeafc536c4f585d245c68 CVE-2024-26813,0,0,f1db5365a0d1172b2697527332c0e69f11713e6225940ab77488e14de15a196d,2024-06-25T22:15:23.350000 CVE-2024-26814,0,0,e4aca5f4b38a944c3940dfcb915333d6e6561f21764c5093064aaebbd8701359,2024-06-25T22:15:23.410000 CVE-2024-26815,0,0,ad84c918cc4b6959b9513350d04a4e06efb88cb36d856c286d02e439b1d59421,2024-04-10T13:23:38.787000 -CVE-2024-26816,0,0,6161c262d68e49016145e0545c1a0c8923cc07ee7206b4c1ce8194d65688e7f5,2024-06-25T22:15:23.477000 -CVE-2024-26817,0,0,af78e5c64ffd5bcc02daac343bc10f592bef12033a9b00bb5a4ea1effd07e501,2024-06-25T22:15:23.553000 +CVE-2024-26816,0,1,c4ca78f3b4e80644e3ce24df1e2761108463b6d354e2cb899e9cfb91476efb0b,2024-06-27T12:15:21.060000 +CVE-2024-26817,0,1,c3b2c5590249d0a5b4f08bd0289c3d39b5bbc9fda3a0544f5b849639aa338702,2024-06-27T12:15:21.143000 CVE-2024-26818,0,0,40d26d3276805e6255d3381973075daff640f2dd2a4dd14cbf39bd569614d2e8,2024-04-17T12:48:07.510000 CVE-2024-26819,0,0,06d730ad66f717e3ecec94095811f6f9ed240664c50d7732b1864909f513ae5d,2024-04-18T13:15:17.797000 CVE-2024-2682,0,0,3a11ba9af51cd65566aeedd809829b9366a58580da9332db801943fc2462e8a8,2024-06-05T20:15:12.920000 -CVE-2024-26820,0,0,144496f233b46e1c7bba661a27686c6498a6e650c276c45144e7af0dd580facf,2024-06-25T22:15:23.623000 +CVE-2024-26820,0,1,497693a810d39786766bc03cccaa37ca2dbb56c7819a131a9d3e9905740dde09,2024-06-27T12:15:21.217000 CVE-2024-26821,0,0,c635c148d41a7a372a1506ed5cbdf4e1a9777cfcab62a42f9f842c5ce3db560c,2024-05-16T13:15:47.693000 CVE-2024-26822,0,0,3373cd9df298397a50e6cc4662867b05a6afb8a025fccfd5e08e2ad618675584,2024-04-17T12:48:07.510000 CVE-2024-26823,0,0,5aafeba587448416d05e5a5a45c02f351c1873fc1ff3f22835930b6b7315f6cd,2024-04-17T12:48:07.510000 CVE-2024-26824,0,0,7b86d4671a489a33c0d3d97b50ccd27d8d19ed1c5836eca3fe2d38f7c1821f3c,2024-04-17T12:48:07.510000 -CVE-2024-26825,0,0,b963646603c720c0deec418eee61878d8592973bf8a02ee24797992a855300d6,2024-06-25T23:15:26.067000 +CVE-2024-26825,0,1,72913ffa98d1b21bc0dd94a084fcc96bb9846d3e76faa3a61740bea152a28b61,2024-06-27T12:15:21.290000 CVE-2024-26826,0,0,0023219e6fadc1471f325e5568c3ca5961f0e30337693db28ff92f4b92552659,2024-04-17T12:48:07.510000 CVE-2024-26827,0,0,fd591f90bc55bb191c313ddbba148ebdd8191264d560a6f24499e5366149fc98,2024-04-18T15:15:28.957000 CVE-2024-26828,0,0,0b253d18c2be1c728cbe408555a47f66d3d58f5c56914f662040ed322cf9a458,2024-04-17T12:48:07.510000 @@ -246631,34 +246632,34 @@ CVE-2024-26835,0,0,e77968f68e1e80575d64a0a1d73e7450c1686349e5916710c54f0e47c9a15 CVE-2024-26836,0,0,064d8b1318a89f0c00332e64b4914085e8de6a6aa9537c7e6a62a0e5e6a31daa,2024-04-17T12:48:07.510000 CVE-2024-26837,0,0,b2923edbfcfd990cb8c7c910fdb303a725e2c41942979a2a890e504b4ca329c5,2024-04-17T12:48:07.510000 CVE-2024-26838,0,0,ab3198c0f540ddb68d0650ae3e41d6c0b772da39a2f0a93355a48c070f2e4e03,2024-04-17T12:48:07.510000 -CVE-2024-26839,0,0,6a210d0a4c424277509a4e1ef1dab57e0b97bc33e103569e493ec0856002498a,2024-06-25T22:15:23.693000 +CVE-2024-26839,0,1,610a0cc8d0a4e64e37778366031378f41672909f88d1a06ebbf7e5731ced4d06,2024-06-27T12:15:21.357000 CVE-2024-2684,0,0,fca73544a00f285414bfd8e1ee788a1bf890b71efb58d6e6d9e76e5a089e991d,2024-05-17T02:38:25.297000 -CVE-2024-26840,0,0,c222c4fb8377bc01320242c277b276ab5a5f9acd5fe5622e27425233fd32f5fe,2024-06-25T23:15:26.453000 +CVE-2024-26840,0,1,9b75cbb39620cf6efccefaf1bef0664917e57f132ddc2dd72162f068b1c65db4,2024-06-27T13:15:56.713000 CVE-2024-26841,0,0,7b60548828061101cf079454579fb63958752c20a1498445c1c507afa6393e36,2024-04-17T12:48:07.510000 CVE-2024-26842,0,0,5cf562507ec36db8dc9722257fae9a8b73e08ee35a91216b4697fe7d398428b2,2024-04-17T12:48:07.510000 CVE-2024-26843,0,0,67ed39f953ef3e1e6d73e08f768e470a3704e17aefa59bb2f72fb31cf81b852c,2024-06-25T22:15:23.763000 CVE-2024-26844,0,0,945f7841fcef9d1ced415256be0fa73ff581ee594e28a60269bbaa43224bdb0f,2024-04-17T12:48:07.510000 -CVE-2024-26845,0,0,756a72aa1c090d2fc1dadd128e6b8a058b8bc442b8c9067ab0e9f449b83baf12,2024-06-25T23:15:26.553000 +CVE-2024-26845,0,1,11ea1b7220f2dc2d76a3902e9f12ea00e308ecf904da58d2dc0d843bcdc588a8,2024-06-27T12:15:21.423000 CVE-2024-26846,0,0,64fa1dadec6e9d196acfbf8eb3b292011e134a2e0374d0056a9abea7c37225fd,2024-06-25T22:15:23.830000 CVE-2024-26847,0,0,fddd5e3693a345196251fe99a2eeaed4a9338cbb1677b4de9af1af8f9a529275,2024-04-17T12:48:07.510000 CVE-2024-26848,0,0,94f632389401762ea5761753fc6511e1000da474cab126028775764675211121,2024-06-25T22:15:23.890000 CVE-2024-26849,0,0,e2291c6ff9ceb2e24619e3e061dfd4838be00a23cdfd68f8d4fcf85adf52b64b,2024-04-17T12:48:07.510000 CVE-2024-2685,0,0,e6b5b15a26a90a7ae7cec6bfe70fd3c76e959137ed19a8deca6933095154a94d,2024-05-17T02:38:25.380000 CVE-2024-26850,0,0,dab640da12df724b0a3e304a986a85e4251ea2bf463c19dbbcb16aaddef82fab,2024-04-17T12:48:07.510000 -CVE-2024-26851,0,0,97aa669e25e9c9d5ddb3afde4f30c6e635c935f60423d7b26c44c08c4ccf0e36,2024-06-25T22:15:23.967000 -CVE-2024-26852,0,0,3dd279cc0466bf24faf399b66c7029fe6e384492a67e3c494e237a1ea8244fbc,2024-06-25T22:15:24.040000 +CVE-2024-26851,0,1,17abdfa7553c9586287186cf7930189d90be563de8a21e88abcb269bc4ef19f5,2024-06-27T13:15:56.800000 +CVE-2024-26852,0,1,929805d418e0925118a949e72844d455001fdcb146e5b9be74c860c17b87c399,2024-06-27T12:15:21.490000 CVE-2024-26853,0,0,5c1d6d0e3fff92a472dae6bdc4a94a39e8c365023f2aa19dd97627908917e416,2024-04-17T12:48:07.510000 CVE-2024-26854,0,0,53a21f4c14becc0ad04525e83e52a874180b437662d139535b9813fc17df7d89,2024-04-17T12:48:07.510000 CVE-2024-26855,0,0,886ddc3721adf95f88b9bbfc2e5477192b0a984b817d6e8f089c87f8f71b32f9,2024-06-25T22:15:24.110000 CVE-2024-26856,0,0,d2ecc22abb6a286e1e94e314d6222b6a396e97380332e1141586776671c270c3,2024-04-17T12:48:07.510000 -CVE-2024-26857,0,0,c43b2a3d46f98706b79a4abb81fd8b85014c7ca51d316eff653e0720f5df50c6,2024-06-25T22:15:24.170000 +CVE-2024-26857,0,1,ce7325075365245fd95cf133db6fd5d7000c600dc3e76e7125131211de098e3d,2024-06-27T13:15:56.880000 CVE-2024-26858,0,0,a1595995fe6e7388f54b95e2f8e42a98b4c5abbf22f796ecf246cac4c7f687e0,2024-04-17T12:48:07.510000 -CVE-2024-26859,0,0,e09e0ff7d2c2022db6b7b1721728b5931ce3e7d262c0c62fae601dc40467e50f,2024-06-25T22:15:24.240000 +CVE-2024-26859,0,1,2465d71e33c9e1caca71eecea298f8ad6e95cb34baf85399034055458974d443,2024-06-27T12:15:21.563000 CVE-2024-2686,0,0,2a041975ccfc0cda55e582bbb1508b685671d43b9094a7df8431d15f95a272bc,2024-05-17T02:38:25.477000 CVE-2024-26860,0,0,955f045170883df7e16a3327bfda3dbef0b53bfbdc290182b2ade36cd0a20f7d,2024-04-17T12:48:07.510000 CVE-2024-26861,0,0,8f8500ff35b5ba7c52edf0020fa7734eb1cc56b05f96c4080397501db239088f,2024-06-25T22:15:24.310000 CVE-2024-26862,0,0,a4798f87cc3af6d50bb3d0861f8abe3759900dcd5c97bdebd3438bf13ad928fa,2024-06-25T22:15:24.387000 -CVE-2024-26863,0,0,2967ca9b335f7a3a76ca13212716f69899e51db9d05593f9f6b32422f014c8f2,2024-06-25T23:15:26.670000 +CVE-2024-26863,0,1,0209e47ff9cfcec7c1fe274a2511fb6024826a5951f1df017809b69e9034c675,2024-06-27T12:15:21.633000 CVE-2024-26864,0,0,2b55b561df842115720c0063a297afd9b7f4919f08124d6ea85ca055ed0d5ac6,2024-04-17T12:48:07.510000 CVE-2024-26865,0,0,d1702cc240e430cbb6f254e98b3323917b6e3e54d44bbaeb519424848b98254b,2024-04-17T12:48:07.510000 CVE-2024-26866,0,0,9cf2c6dd16558c41d4e9bc85a931c7250d9dd5f5522c8eca13890782afc35a08,2024-04-17T12:48:07.510000 @@ -246670,39 +246671,39 @@ CVE-2024-26870,0,0,457cb17097c666373390ad91056e5e8b8405a1f2c3cf6ef8963597b153fdf CVE-2024-26871,0,0,7b94723f819c3faa55f0090799e35ab1756607eeba047a136f921ab74cfd29a4,2024-04-17T12:48:07.510000 CVE-2024-26872,0,0,4edac2e076faf8f25651c96bb39f77a3cabb3b8e0ee9cd2c2a580900f3230b14,2024-06-25T22:15:24.450000 CVE-2024-26873,0,0,c7bd7f693234cec8d748d86cbce63e6ff87185dd2e6f29b99677ea49d52c9246,2024-04-17T12:48:07.510000 -CVE-2024-26874,0,0,eae56fee3316f2a71595995b1ceb56b8bb43b0b90d75d874a2bedc67520e53a4,2024-06-25T22:15:24.520000 -CVE-2024-26875,0,0,5c17778737390b5fabe75a7d7f4b4a8034b7a273f9f0cfc14eae6eb9587568f3,2024-06-25T22:15:24.587000 +CVE-2024-26874,0,1,3cd15ffcd01f74a168436a3a64517b6756a9e181b1c38d8b409bfa29d613d85f,2024-06-27T13:15:56.957000 +CVE-2024-26875,0,1,ea3ad3925daca9bbbee12f932c5e3c17783558ed236d9a2938a2bcb74b785a4d,2024-06-27T12:15:21.710000 CVE-2024-26876,0,0,98e8d12c98e4fba67b7304e61ada7bfb692323e324efa15e53086c842141eaf6,2024-04-17T12:48:07.510000 CVE-2024-26877,0,0,d44bdf5a4a9fe13e40520937d140b9778378a70ba0e992b1dfdc7d1c1c29ba12,2024-06-25T23:15:26.897000 -CVE-2024-26878,0,0,71014be308b5ca99f03417b8edd2d819e818adfe7d743b96a76650937ca6d11a,2024-06-25T22:15:24.657000 +CVE-2024-26878,0,1,fc4725b33ed57f5c9fdaddeb1edf360e21dea381e51ee171d2c7f1e93f5a99bf,2024-06-27T12:15:21.783000 CVE-2024-26879,0,0,5e173700db44d145cae4f3a41f46bd4b1582cef23f7c185e2548126f61be4319,2024-04-17T12:48:07.510000 CVE-2024-2688,0,0,4d2ee00fbdc8f698cfa2b48095538092c3008625057bbba0ed83fe0f8586af11,2024-03-25T01:51:01.223000 -CVE-2024-26880,0,0,8f355cf45473b1e46f12d2ddcd46ea973dc0507c3be2d980a7da94a3c7f36a1e,2024-06-25T22:15:24.737000 +CVE-2024-26880,0,1,a3fb0b43c1408b3f8509edc91a6ebff899cbf3e4d61174d6cef706e9bc570350,2024-06-27T12:15:21.847000 CVE-2024-26881,0,0,a9255a9243e4b2ff079457105663c188c5ad7084fd1e767080818a92ee5120e4,2024-04-30T14:37:30.477000 CVE-2024-26882,0,0,69cdf0c8d115834291718a1c4268c7b493ecba2086dc9d5a1c4f36149ffc4bf2,2024-06-25T22:15:24.827000 -CVE-2024-26883,0,0,3a2aef9d19b6e5ec722cd4bc1afe18c642ad984bc658ee625466735e4f217938,2024-06-25T22:15:24.943000 -CVE-2024-26884,0,0,2adb473f0e1799befc7b54fd24a8c0de29bd65d60a3f0cccaa2fd847f6847f24,2024-06-25T22:15:25.060000 +CVE-2024-26883,0,1,fedc2239cfd0bca392468bf9f042212766dfde841194fa6bf0eceb540dff1e43,2024-06-27T12:15:21.913000 +CVE-2024-26884,0,1,80f66f0aa7acd946077ca3aedb4a663d74482ad3eece6be468f4d95b2bf6b7e2,2024-06-27T12:15:22.003000 CVE-2024-26885,0,0,693094d4064919a0155f3aea1cb0ca83cacae0a57feebd7d3e0cdc5e896b328a,2024-06-25T22:15:25.173000 CVE-2024-26886,0,0,77769a316db88bc2d96850252aab0598ca088d70f07b3d2211b710eda4a28073,2024-04-17T12:48:07.510000 CVE-2024-26887,0,0,ac9946572551cbb67df733b069673c9f5e6e8c8406db06b67c3ff93580917161,2024-04-17T12:48:07.510000 CVE-2024-26888,0,0,290010afd627e2d426b888b404c90a262b5f70bde4d71c714271e5719fe1247d,2024-04-17T12:48:07.510000 -CVE-2024-26889,0,0,a06c6a73b3e05f8b9ccac7b136a4966655cbcbeb165f299f3a702a6ddd531c43,2024-06-25T23:15:26.987000 +CVE-2024-26889,0,1,7d7eff3e9e7cba0f1d9e0e176f647a6bd2db55da2d04fc66d07b3fc1faa7db18,2024-06-27T12:15:22.100000 CVE-2024-2689,0,0,ca3db738ee48a3133b58c96e06b69010b9eabf8a8a2da4363a993adb771d8842,2024-04-04T12:48:41.700000 CVE-2024-26890,0,0,874931de3addad6ea21f74c391ccd4d961219eb7e2eb15552b52e8d6f987b881,2024-04-17T12:48:07.510000 CVE-2024-26891,0,0,aed33ac5a03a3e9833f3e85be268ca96fc2bd33b1ca1b142569f13af82c7980f,2024-06-25T22:15:25.327000 CVE-2024-26892,0,0,688376c4324ea6e95054950a543b4e29e1ce33115f8cd0779143841c3bda16b2,2024-04-17T12:48:07.510000 CVE-2024-26893,0,0,1f6a9cc5570b4cc20166e056fbbe56ac59e2bccce9acb4ad6f8361f3f40f222e,2024-04-17T12:48:07.510000 -CVE-2024-26894,0,0,ff8c4ca18414a1741165e9d9e11cf2bd251bed08bc6ffb8cf5644bd3f69947ef,2024-06-25T22:15:25.447000 +CVE-2024-26894,0,1,511c8af8a1aae3705ce71f019d1e232a006324960f8d3d953c567e5a4353572d,2024-06-27T12:15:22.177000 CVE-2024-26895,0,0,db3f834083271c88a2daa1aa14eb5f61bf8f4edfa34b6bcb164297fe50ac444e,2024-06-25T23:15:27.080000 CVE-2024-26896,0,0,c7f67bd677ed32d8b4a7649e5d29a65fac6c5af022bd8a34212a71825017e7f6,2024-04-17T12:48:07.510000 CVE-2024-26897,0,0,6bcf13dce11b85f353022bbc8fc5f6986fcb0b78458e3fa86db5590c08c6f073,2024-06-25T23:15:27.180000 -CVE-2024-26898,0,0,35493697d184638212d63fa5147b3f03a904eed77fe70b601e051b3e87b1405f,2024-06-25T22:15:25.527000 +CVE-2024-26898,0,1,9e525eab1c9e8995de7e43db178036926cea6bb5d20e70c586b397918eaa4357,2024-06-27T12:15:22.257000 CVE-2024-26899,0,0,021eca8ea6a81120cb7c81a3d3bdb18e09f0d17f90de09091ca22a9d038b6b84,2024-04-29T19:34:10.080000 CVE-2024-2690,0,0,682e90950d5d23f9278f907fd1ed959e6c3f4066e498fda12d4576d9e1062ca4,2024-05-17T02:38:25.710000 CVE-2024-26900,0,0,7d396e2f9d436e2b737a24c012d00c80957fc0ed041765143888d895b983c8f2,2024-05-17T11:15:07.867000 -CVE-2024-26901,0,0,c23330487904f80e0f46fcb96cdaa2232bc21069f90fda6268b739ee8b7a536f,2024-06-25T22:15:25.633000 +CVE-2024-26901,0,1,774e30dd641b3d88ccd6469cef68d2d8728903a5f0736d1957a610774619f983,2024-06-27T12:15:22.490000 CVE-2024-26902,0,0,79dd09d64774289a294bba37c7616f62083466aaf39eb549f12f6f728e6a3fa4,2024-04-29T19:40:05.897000 -CVE-2024-26903,0,0,1165d58eb604c365713282ad62db377699d8b647be4e06baeab23cd4f24d8168,2024-06-25T22:15:25.773000 +CVE-2024-26903,0,1,3f0d567945be0d5012cea424dc52208808b8d15c3aa6840f237bc7cc184b5c0a,2024-06-27T12:15:22.637000 CVE-2024-26904,0,0,37626f6bc581b325e48f53fe8a5b21da44d9f414e15eb9fb0721d0de3e45a169,2024-05-21T07:15:08.260000 CVE-2024-26905,0,0,b2eb4233229c7ebf6d1f823188c91f6d5ec6f202c5b26a0cfddc918598c98c54,2024-04-17T12:48:07.510000 CVE-2024-26906,0,0,d75695ea8462edf6104f718d8a3f32224355f3e1dff878b6c18242d1b312d6fd,2024-06-25T22:15:25.877000 @@ -246716,14 +246717,14 @@ CVE-2024-26913,0,0,d6f1ccc6a2b3cf4e6635d81026e419bbe63c77760577a6ec2aaa84993242f CVE-2024-26914,0,0,737600aa199a20f07827db5f917874dc5de3e1365dcd6ff06c65d76a5bfb19db,2024-04-17T16:51:07.347000 CVE-2024-26915,0,0,112e868432c44a7e9f4f00a34b440c9887d74a8025acd19c134ac9b001ef49d8,2024-04-17T16:51:07.347000 CVE-2024-26916,0,0,2aadfef41fb15a7072adb3073b1957815485b1f408ba914e4e418f4d3edad79c,2024-04-17T16:51:07.347000 -CVE-2024-26917,0,0,6bd70342596a7a237f8d55a6198e750eddbac37679af56ebaaabc14fed75c3f7,2024-06-25T22:15:26.190000 +CVE-2024-26917,0,1,b5d35b21a37c1143525761fb96f162eaa4f4301481df535c7205535fcd39df6b,2024-06-27T12:15:22.740000 CVE-2024-26918,0,0,856369cd1dea2e2c11af16942fbef9a6c4bc54310e835905719eaafb6e04f03b,2024-04-17T16:51:07.347000 CVE-2024-26919,0,0,8ce229e6f304423499a3d2dbc331713eb1fbfa99e3cc0b71da0db8b8b65f091c,2024-04-17T16:51:07.347000 CVE-2024-2692,0,0,aefc05ddca23ffc90de039367cc7fed9a06f50bd32c460cfe2bbf1c8645c8f06,2024-04-04T12:48:41.700000 CVE-2024-26920,0,0,21e54f7cffce25f076f12e61f0ebb2408a05fa58f844d6d62f7a9b8a454f9f45,2024-05-03T06:15:09.207000 CVE-2024-26921,0,0,76d623900726b55efb66263c05dcf2e665a9ce9fb4f9ecc19bf3b35e90cf98c7,2024-04-18T13:04:28.900000 -CVE-2024-26922,0,0,1cdf6dab1b295deddc62249ea9900c2986f45c1324339d1ecb03215a7c28b666,2024-06-25T23:15:27.263000 -CVE-2024-26923,0,0,bc63c9a240316186e5066610ccd08454aaf62c24b76da6c919ce07bdf9c4caca,2024-06-25T23:15:27.803000 +CVE-2024-26922,0,1,ea9e0a3791a3b37f43c13160be5c02289544ce9e8ec20d8e53b5453592702b96,2024-06-27T12:15:22.813000 +CVE-2024-26923,0,1,b461fe01e06fb707cd15b897f191eea1bdccd90b00b363d7aa1c5f6a9f6a5876,2024-06-27T12:15:22.923000 CVE-2024-26924,0,0,aa51c2f7556b40f5a535c9d9d209d7eb48deb40b816b86d1979e69c1b929d0f3,2024-06-25T22:15:26.257000 CVE-2024-26925,0,0,c80e18dae334fcb4312a5252981fb94870f3e4932fef1f9fc7f6178d6b1fef71,2024-06-25T21:15:58.627000 CVE-2024-26926,0,0,efa4d9f5b99e592708f9a5ef1ea162339d7a56f0818c92044e9abb2fcb35c80c,2024-06-25T23:15:27.893000 @@ -246732,10 +246733,10 @@ CVE-2024-26928,0,0,356749b5efd3e51950b32012233c612b93e1c25f21b750fb61ffd2aaf8554 CVE-2024-26929,0,0,bbb851a79a93a363e352bb5d96ddf71c38e37b9f175f55319aa1039600b887ab,2024-05-23T19:07:27.803000 CVE-2024-2693,0,0,0523f248585c70810eb494560526f8a16efe419cf7f3014aa23838648b0d3e89,2024-04-10T13:23:38.787000 CVE-2024-26930,0,0,3885fe1fa73799da895810b44f93f3951c708b35b460f991f25484a478614d7a,2024-05-23T19:10:49.540000 -CVE-2024-26931,0,0,6fd90022376f3836f48c1c73d75b980fd576c498b647f65216978aac9c4bc61c,2024-06-25T22:15:26.337000 +CVE-2024-26931,0,1,2cdf8e04feaa44739b4bdcdd7f8ff95110c37b6b478bd37402a6a0b6da093d4f,2024-06-27T13:15:57.053000 CVE-2024-26932,0,0,f2d026e35f4b5233187abee7e42482ca04237021bc627080ec5bc9b0491b80e1,2024-05-23T19:12:39.257000 CVE-2024-26933,0,0,74ecb5d6388685ffacbea1351beb1f6d860ac3447041ba550ec0df60bf844fa0,2024-05-23T19:12:43.773000 -CVE-2024-26934,0,0,9c3107674ef2b15638544e37e031a4e955fc1b2a0ba05d4896a23938985ea601,2024-06-25T23:15:27.970000 +CVE-2024-26934,0,1,bf6e546596921728acfe319c516bea1e1abf8b1196f18535cded4e1ddbafaedf,2024-06-27T13:15:57.133000 CVE-2024-26935,0,0,e73d92e1aa9b37641485ddd30110986ec457a10279231ad37da824c924ed1239,2024-06-25T21:15:58.710000 CVE-2024-26936,0,0,ac3611a024cce1dc29fc377a7f2aca0292c14e6592911fdbd080f60f2117c044,2024-05-17T11:15:08.257000 CVE-2024-26937,0,0,13ddbdb7deacac9c8664659994e91c378253f75f957ac64f7f94e46370a06239,2024-06-25T22:15:26.440000 @@ -246757,8 +246758,8 @@ CVE-2024-26951,0,0,0f8ea3bcc3485368c7aaf5f7c1ab72347a950fda68c6016016f8dd78003a1 CVE-2024-26952,0,0,0c7c82bf8d86d0ae89c3b2237d651698f1432d7566849359fbaaee4955185c25,2024-05-25T15:15:08.950000 CVE-2024-26953,0,0,b1854779e5eec614f10783eb3e8416f5d1c68fe6686910e1a9dd6e7c25f031a2,2024-05-01T13:02:20.750000 CVE-2024-26954,0,0,3a105c87f2e28741d42d75481e9c6df77e80795742a4248ce96271c79efd9110,2024-05-01T13:02:20.750000 -CVE-2024-26955,0,0,4a6f73dde2e89ea09e92b7601a461d0b2a53893ad7898bc3855324bf16c74612,2024-06-25T22:15:26.650000 -CVE-2024-26956,0,0,6e84db4013432b159506e4aaba9ef8942adc46f6b960a42d000935601a6b5021,2024-06-25T22:15:26.773000 +CVE-2024-26955,0,1,f3682ec6a42ed9fad15d4ad94f0afc24f8f82991e5d90ea0d9ac427041d25652,2024-06-27T13:15:57.220000 +CVE-2024-26956,0,1,03b8b6d93122c87e1d6edb9acf0c32232fac7a1bfa20c866ade9468ab42e2937,2024-06-27T13:15:57.290000 CVE-2024-26957,0,0,89c95fb54a9473fd2f13dc8428ef5a0f623a46d47ab10b47c5e8ea9d9d785a77,2024-06-25T22:15:26.860000 CVE-2024-26958,0,0,14cf34198e5226cd9903fa4b7cd1b1356a627031f18c7d5956b5b6c2e6094b25,2024-06-25T22:15:26.937000 CVE-2024-26959,0,0,b20b713d07b74cf4ab31aefa115749077979ac722940c0353f278e6b20f8cce7,2024-05-01T13:02:20.750000 @@ -246767,28 +246768,28 @@ CVE-2024-26961,0,0,05af2764d15ac446009c797cc05088526f3e6471c70181e566519fae53a37 CVE-2024-26962,0,0,21615a88704d38867dbd9993e5fd2c885d58669c1484f879178b0965705ef667,2024-05-01T13:02:20.750000 CVE-2024-26963,0,0,889457b3fe1d29054f2c173859213556de5ffec87e40d507efafbf347da7e76d,2024-05-01T13:02:20.750000 CVE-2024-26964,0,0,041a844f79c5a2cbbd2f631a4589563a6cbf6b1d6921ae1b4aceed69cbf703a7,2024-05-01T13:02:20.750000 -CVE-2024-26965,0,0,7d0fd4298f9271ffe2a9f82c7765fe02af80c45aea0020cf6c171c8592688171,2024-06-25T22:15:27.120000 -CVE-2024-26966,0,0,7cb6958c626180250721ef48d20d0b09bbdf0e7f1766df160e42ef150b3b7c9c,2024-06-25T22:15:27.230000 +CVE-2024-26965,0,1,d45d540c308919daed02a6660a1cb603b2cb5cae9e3794f2beb61c0ef87fd542,2024-06-27T12:15:23.043000 +CVE-2024-26966,0,1,988d3836d88dc653d434c39d37ea05ba90773acadabefa49a68922d719606d0c,2024-06-27T12:15:23.127000 CVE-2024-26967,0,0,3f8ba2525e4f63fd5e4a12d535e0b4f15bc370694291b91bd2baa1315d6d7195,2024-05-01T13:02:20.750000 CVE-2024-26968,0,0,385865acf42afbe5d6d9407148d078a33fc4bbdf230b0f52e55a8fe947965732,2024-05-01T13:02:20.750000 -CVE-2024-26969,0,0,0ebd42110e2482f74dabe782a17993b8681187b87ea5e037dd479651833371db,2024-06-25T23:15:28.200000 +CVE-2024-26969,0,1,d00ce9b06a03c713518bd3eb23ecc51ac3ce412faa9cd03f86e60da072aa6f54,2024-06-27T13:15:57.397000 CVE-2024-2697,0,0,b7384cb6c757a6d68e4eb4a4e83d3c11493a757d33b49920dcbeecea6aacf51f,2024-05-17T18:36:05.263000 CVE-2024-26970,0,0,87a268cdb06f0936f321efcfeded1ea4b0f392fc80fd1889624d73b685c501d5,2024-06-25T22:15:27.303000 CVE-2024-26971,0,0,6b41071d6836bf413ec0d9a17a0b6d0e444914fad9b95723f69c2aeb1ca1ca5b,2024-05-01T13:02:20.750000 CVE-2024-26972,0,0,2ea7fa74cfe98c165c3e419a6f2631ccb110e153161fee98058a6b4579c8bf52,2024-05-01T13:02:20.750000 -CVE-2024-26973,0,0,a850b6f39ae9c09c7d0b87ec4e1fbea7c26c0be5f52337506dad85916cdd65b9,2024-06-25T22:15:27.373000 -CVE-2024-26974,0,0,65cb35ea15299a475a24be8d6f2da087c07163f41f0fec4edd22d8ae0f3d6afb,2024-06-25T23:15:28.300000 +CVE-2024-26973,0,1,ff95881471f628307c43018b0d4a9aaf4c18e0565bd184d6ab78743fbeb0040e,2024-06-27T12:15:23.210000 +CVE-2024-26974,0,1,40f15b142d902b780f0ed9a5e7d2b9362ae9f273032eec29fbfa853a02fb1645,2024-06-27T12:15:23.293000 CVE-2024-26975,0,0,8f19cd721adbc3dd7c661f9a8d550ab97e4f94e7a1b3b7e5ff34954db774d0ec,2024-05-01T13:02:20.750000 -CVE-2024-26976,0,0,3564f0b86102838839a737d1f0344714a7a8900de576e3403525b79ca9d97cc9,2024-06-25T23:15:28.413000 +CVE-2024-26976,0,1,54ddcc42ad3e9144ac97081490f710ad2737a213a0769374a3cbc23c2919efb8,2024-06-27T12:15:23.370000 CVE-2024-26977,0,0,7f4303ba7265fe68f47a9d9801d011f3d78c2b9c80b2b80c869116171921f0d6,2024-05-01T13:02:20.750000 CVE-2024-26978,0,0,483466422e03f75e7df98f91f4f0a342a075a28cd1a2811bba9ac8a642b730a7,2024-06-25T22:15:27.490000 CVE-2024-26979,0,0,54694270d008c20297a5341208d33ae44a9e8eec55dc5d4e396d03aaba5d47ac,2024-06-12T16:15:11.147000 CVE-2024-2698,0,0,758579b568a4887d746dcbadeb9e5d5dbe9c948ed21f398b8dd22a95a4fd3e38,2024-06-27T03:15:49.860000 CVE-2024-26980,0,0,ec5b812a8dbedf3c6e27cceb9a929403fd6e62291ad747f9f2a67748a6189d95,2024-05-17T11:15:08.357000 -CVE-2024-26981,0,0,fd2370eb398b9951be846f5bd4d33db1940adc0feb1e93f3595af8bb4f6f645e,2024-06-25T23:15:28.517000 +CVE-2024-26981,0,1,78b7e7c683bce4836c9547c018e0cc1c1614c35cf0899c3a1d961f61b36bdfc3,2024-06-27T12:15:23.460000 CVE-2024-26982,0,0,71a4b88e652ac72451ef2b1c06677d2a8721eacfd6194887bc3cbe1ed1aa0fda,2024-05-03T06:15:10.953000 CVE-2024-26983,0,0,d3d7f9f5caf4e079a71f70f8bc14c3d32922ad02f616d250213454d5ce4002ce,2024-05-13T08:15:10.750000 -CVE-2024-26984,0,0,c9067c1ebba8bb5d0c76f5c9134dd78c6cc83bcd092f413dac8950ecc95a6996,2024-06-25T23:15:28.603000 +CVE-2024-26984,0,1,7f6d074d92e883fac3f50ea56a6ad13c2ac13c934f88c96c2396a4e6624aa53c,2024-06-27T13:15:57.467000 CVE-2024-26985,0,0,7a740fe69951ccfc3b1e74b7db3fbfca448128a35ad090b49ba3486012aceb7d,2024-05-13T08:15:10.823000 CVE-2024-26986,0,0,3a04da6776d5b30be98a9a3456a9602e44e9b692af32172ae4d107260563fc81,2024-05-23T19:14:25.180000 CVE-2024-26987,0,0,8c26013d98bcf2e4e743c73d724873f3f29d66506454e1cf0da9933616dab821,2024-05-23T19:15:23.693000 @@ -246797,28 +246798,28 @@ CVE-2024-26989,0,0,d9a342892ddbaf318c01532935f9e563e8650474956ddaee4113e50ced053 CVE-2024-26990,0,0,cc83824df94cee6dd88244ef9564f0ad4caad22efc4fa52be18a57f4fd0bb8ab,2024-05-13T08:15:11.083000 CVE-2024-26991,0,0,c61f168e072bfa0509b6d7e43e602d97f91f464acc9b1fa57b921159a2401b0b,2024-05-13T08:15:11.137000 CVE-2024-26992,0,0,9e045693950818c52ebef37503127e1d7fe23e7d61d1bf57d76885fc33581c53,2024-05-13T08:15:11.193000 -CVE-2024-26993,0,0,62bc333447ad45b5cf81f483510ca8d2b09ad81741d074ac50c30b888c0035cf,2024-06-25T22:15:27.710000 -CVE-2024-26994,0,0,ff0911d801e677e243ff222a251ad05347b65fdbd0d7eeee88b3577baed6f58e,2024-06-25T23:15:28.800000 +CVE-2024-26993,0,1,1fa41dadb45f311d04c44973c5f96c131fb360c19492c6e4273e842092590637,2024-06-27T13:15:57.563000 +CVE-2024-26994,0,1,0843fcb4401f9dc03e0090ca5204c845080f9ad6eaabad7f1eda2b5396fb455a,2024-06-27T12:15:23.573000 CVE-2024-26995,0,0,e2368674c53a49e8d575c316cfce3b877cd4248b904c8e04624c84e2d45d4df9,2024-05-13T08:15:11.270000 CVE-2024-26996,0,0,cea553e0454def5a96fbfdf9d710c263c431f278cf804a7efd8ec8ff0107b6b7,2024-05-13T08:15:11.327000 -CVE-2024-26997,0,0,53eb3a0b4ada1af7b3d7e4d80234916c6d3db78e9b67970766808662b51fe9cf,2024-06-25T22:15:27.780000 +CVE-2024-26997,0,1,23fa3f4f0c60394369fd00cde50e7ed4ffb6238d372c1558292c796d8e6aa91f,2024-06-27T13:15:57.663000 CVE-2024-26998,0,0,822a5cfb35cd9e5868bbf4bda50d2331021edf4824c2d8385d4feca7d97a1dd2,2024-05-13T08:15:11.390000 CVE-2024-26999,0,0,d9977211bf2b41b7ac0a40d277f0735ff1dd325f8203ff331b8c0117d58c590c,2024-06-25T23:15:28.903000 CVE-2024-2700,0,0,8a91fa87f2e863b341eb07ce9755b5a44b31a2c626fc69e01187b114c8b0f143,2024-06-20T17:15:50.623000 CVE-2024-27000,0,0,395b7fb6c49a036e98c96b445224921bc0f58838cf88bbc7336596ba11fb1dd7,2024-06-25T23:15:29.003000 -CVE-2024-27001,0,0,169a7dfc4decb2008786fb6487ed62481b08445a51c829dbb01e30bd97fe8d33,2024-06-25T23:15:29.090000 +CVE-2024-27001,0,1,5f6632622098db8943cd6b4edbfb8833b989a6e488e67457dda49ee28d2c84b6,2024-06-27T12:15:23.673000 CVE-2024-27002,0,0,6190ad6afa26f7583c9a538caad37267ed161406911969a163db177bf76cd4a6,2024-05-13T08:15:11.473000 CVE-2024-27003,0,0,1a9ac40be60acb8cec89c5675301f18bf8a13b37a949922515ae2e80b2e77939,2024-05-13T08:15:11.597000 CVE-2024-27004,0,0,ba76e75783724ad9c5f39dab33d779062a24bcfc9fad1eefed9f582e4be08dda,2024-06-25T22:15:27.890000 CVE-2024-27005,0,0,5d6a7deb1f0572282067f28c72a83315edf56fec0d43ce8668639b5cbee5063a,2024-05-13T08:15:11.680000 CVE-2024-27006,0,0,d84b8430a2dbc21fe31ffaa43e431c4f732c5149c263619ab337b9fdb52622a2,2024-05-13T08:15:11.740000 CVE-2024-27007,0,0,700078703e7df1c12813f5debe8ab722eeea9a53a9a20fa26e32f51524e858c2,2024-05-13T08:15:11.790000 -CVE-2024-27008,0,0,1bab6d728e9ee9116df4c3f8e3d9f28d4fb7d974a9f49fa0ef529d0a13c30ea1,2024-06-25T22:15:28 +CVE-2024-27008,0,1,18ab030dbf9ff161ab064561cfe32de48dfea7393076b86f2e7cfc88c9606a4e,2024-06-27T13:15:57.753000 CVE-2024-27009,0,0,02166e6bb27bb1993eb76c46e36c36e549073075e0d4d18f7774ce41a7b2deb0,2024-05-13T08:15:11.870000 CVE-2024-27010,0,0,2c5d1e794d485d405ee68187fd0d8f4a18187ff3b81973fdf2d28d4503c757d5,2024-05-13T08:15:11.933000 CVE-2024-27011,0,0,d243ba33b7ac681a4bbc14151edb94ad3657e98bb70afc35d69edac5ca657ed6,2024-05-13T08:15:11.983000 CVE-2024-27012,0,0,03b5c0d4d54555019c56c0882fdfc247c2e63140628d08e2ca4233bf1d0f3421,2024-05-23T19:15:29.050000 -CVE-2024-27013,0,0,1d6cfa14615628ed65065eef8c488eb19085adcbe1f551bed3885ad01f93e614,2024-06-25T23:15:29.180000 +CVE-2024-27013,0,1,b57b2bb8ffb5149ccb9509a56baafedda5309d61d0d8e17d1281d0a16453d146,2024-06-27T12:15:23.747000 CVE-2024-27014,0,0,ce6b048da995e7d2e7b663a0bef4ae1e17ac6245997749e208d61bdcc3e09451,2024-05-23T19:15:45.993000 CVE-2024-27015,0,0,d298fda03fa9d24f754e9c1e7f74d5e3b34013df4efd47cdeb20f10a0b74b8ed,2024-05-23T19:15:51.047000 CVE-2024-27016,0,0,43697573ba40114bbff54175e410bfa036ad44417bbdc5134ab7087857a788b9,2024-05-23T19:33:33.040000 @@ -246826,15 +246827,15 @@ CVE-2024-27017,0,0,02732f54ff398442b7b4153676da0571ded79cca4c5f8df61e836f73cc067 CVE-2024-27018,0,0,911c480dab0dbe0bfae3e2c56e2a488f444057793b7d9a6c0055e9746b6c8f21,2024-05-23T19:36:55.347000 CVE-2024-27019,0,0,f5adc35c93bcab68ed31daab203d12363bbbd2ecef540583d1c4b4882bf8bf72,2024-06-16T13:15:51.747000 CVE-2024-2702,0,0,d714950951d2438da53d97b453b8470335efdb106b4a3aaafe4c816e98d263df,2024-03-20T13:00:16.367000 -CVE-2024-27020,0,0,ba11690b5b56d5a0e4cabf66398939fc516b910f39500f0d69ea2f419aa2f61d,2024-06-25T22:15:28.077000 +CVE-2024-27020,0,1,0e3af9aa730405898b51fbd90dda08cf1bbf00199605798710509a6158066bad,2024-06-27T12:15:23.853000 CVE-2024-27021,0,0,a67efe759afa1d6ea088b8eaf4c7f5fbf8a2904d502e3532052bf321b9abffde,2024-05-23T19:37:02.563000 CVE-2024-27022,0,0,403a7b5a85c19d12db5cd06df3e766785b028551881111ea4398fc1b6f5b749f,2024-06-21T14:15:11.743000 CVE-2024-27023,0,0,2c6de381c797e914bd2f2619ad1c4bedc5c20ae4269741b6694f80abe98917fc,2024-05-01T19:50:25.633000 -CVE-2024-27024,0,0,978143b4c89c9ff7215f085adfdbfce8ea3acb4ac22fd3d6739b54baa82bf430,2024-06-25T22:15:28.170000 +CVE-2024-27024,0,1,2fb4f43ac21d2c23430b7a5cd89c80638587471f333f747fb7432603d1d38604,2024-06-27T12:15:23.943000 CVE-2024-27025,0,0,1af74fba04a8492a629eb4ac1fde5dbcd517ac2b7fad59112c9d02e4c563e5bc,2024-06-25T22:15:28.240000 CVE-2024-27026,0,0,0a833052cc9e8ca79201ea69cbebca3756a0b8cc74c71e439910a53e2574f185,2024-05-01T19:50:25.633000 CVE-2024-27027,0,0,fc65fcf2804d7aa93142548eac2312a9c96f9778ffaf3e62bd4da9f80e67261e,2024-05-01T19:50:25.633000 -CVE-2024-27028,0,0,ccdba3dd041d5c56b425313ccb19e25bcd119b9fca180e405eb8eadc398ef5e7,2024-06-25T23:15:29.310000 +CVE-2024-27028,0,1,741ebd9a632a8d01300f12cc38a61d545ae2bcc8d4bb81732335686afd6e981b,2024-06-27T12:15:24.013000 CVE-2024-27029,0,0,13602331dd01fc2b4ef088b0d9db5a3dafe590970a273b10ca49f7feb4b369e5,2024-05-01T19:50:25.633000 CVE-2024-2703,0,0,cf454db3fb7e95983c8231dced01035ae1492b7b60c9dd83d26efb775787ecf3,2024-05-17T02:38:25.893000 CVE-2024-27030,0,0,4fcef5456c9706b60a7abfaa5df1c3afd225d5d99da8fe0dbd23d653816ed8ef,2024-06-25T22:15:28.320000 @@ -246851,10 +246852,10 @@ CVE-2024-2704,0,0,9d106e2a42025ec8fa45d69b5c0a0b5cdbec180ff9fcd6a29154d0957359da CVE-2024-27040,0,0,9a5c40755cec8e2ac68fcb53766d09679369f3bcf0252515943bd643d9774d43,2024-05-01T19:50:25.633000 CVE-2024-27041,0,0,3a35120b7288bb8c96b166dead486928b59027194993a7d37b79a8cf2d82f3c1,2024-05-01T19:50:25.633000 CVE-2024-27042,0,0,3f1f082cc99314e302a5aab23a7f2724c8b04dcbae5b39f0426393058ad70342,2024-05-01T19:50:25.633000 -CVE-2024-27043,0,0,802e014b97f9ac1b1604f127008177560dd620debf2076f3840552bcec7eea2e,2024-06-25T22:15:28.387000 +CVE-2024-27043,0,1,3eed0bf696321e852a3d0283897f5964f774d364e61d00facbdf3440f4ae81dc,2024-06-27T12:15:24.107000 CVE-2024-27044,0,0,92903e01ed01d97365c03d989d6fb27c89c133035e008903cd39c32535ade64b,2024-06-25T22:15:28.730000 CVE-2024-27045,0,0,22d8a8658c88844df8a5a29cbdbfe2b5788b31ca0df9733efbfddc9f5134c190,2024-06-25T22:15:28.880000 -CVE-2024-27046,0,0,6b319934dbe921bbba39f2865c27d24c28f2a08c86345e8b4c1e80a9004aef25,2024-06-25T22:15:28.983000 +CVE-2024-27046,0,1,fc1088ef2e59370fe315ff76645f829f88dbbb0f8567bde35f8c6738353d18ce,2024-06-27T12:15:24.180000 CVE-2024-27047,0,0,79816067c09291199a2b02cd8ce910c0433db186878f016a7a73a27b920c40e9,2024-06-25T22:15:29.050000 CVE-2024-27048,0,0,45eaaaa13fad0bf72d0089e8a3dfef271de46ff51485852bb2d39923a5177cb9,2024-05-01T19:50:25.633000 CVE-2024-27049,0,0,65cc558c22a88b2154202b4b806f620f51b51904f97b3aa60c73da128c7087c4,2024-05-01T19:50:25.633000 @@ -246868,7 +246869,7 @@ CVE-2024-27055,0,0,b139ffaada6869cacbe2977f7f53e69927c3cb7015f4f2f7e113c5331af58 CVE-2024-27056,0,0,07f62717c62a9735eb3c1bd93c9c65c098d48d4d06f9016f7ee847ea7bbf1fa9,2024-05-01T19:50:25.633000 CVE-2024-27057,0,0,d1897dcb933b7b013789945c744112a8c3cc4a3632c1f87f7052bfcd11fa258a,2024-05-01T19:50:25.633000 CVE-2024-27058,0,0,c46b65119a47085d060401ff0a0ec84fda405a566684c3e9063d34cb5bebbe2a,2024-05-01T19:50:25.633000 -CVE-2024-27059,0,0,96e6ce6a861215b88745fc80fe3c12f26f7fab6a6bbee89a00b9e1c446d264e5,2024-06-25T22:15:29.300000 +CVE-2024-27059,0,1,9217f83eca2e3a40b8fabef9c5590a6336d520e343b420b9f75f913b85cf8329,2024-06-27T12:15:24.257000 CVE-2024-2706,0,0,8bec992e4c1dd1cd0514eb1fea0600d0560c1082a6994e7d29cec95e9a34847c,2024-05-17T02:38:26.147000 CVE-2024-27060,0,0,111cffb9bfd1ddf721c877531e4183c558f48150eda26de6cc9ca092ad51b770,2024-05-01T19:50:25.633000 CVE-2024-27061,0,0,c1008cb46e83948487d4d7c54edf8cbd4f23344bc55b380bdb5571ea20e8f03c,2024-05-01T19:50:25.633000 @@ -246885,11 +246886,11 @@ CVE-2024-27070,0,0,50848de563fb41235be52570767f604c58fc37f70eaa02da05ae311649e9a CVE-2024-27071,0,0,a89b37fc9aa925be96dfb04755c3e475dae73e08009b12d9e2c5537bde3ac447,2024-05-01T19:50:25.633000 CVE-2024-27072,0,0,1fca72f59cbddc5ce2c1f129c70ab61f679469432ed2e8b044b683fa36e87666,2024-05-01T19:50:25.633000 CVE-2024-27073,0,0,712d439e2fed42d27591800ccda5bd1698b7bbf2873ec214bccafbe4347de831,2024-06-25T23:15:29.397000 -CVE-2024-27074,0,0,51387bb59cdfc73593e4ddbf9dbffd65e0f573ee779e4580327a33c6cc382639,2024-06-25T23:15:29.483000 -CVE-2024-27075,0,0,49b04b3bb12452f94ac0f7aa7221bdcf77db57d40302bce50b341c0e4873df8c,2024-06-25T22:15:29.430000 +CVE-2024-27074,0,1,1567029baff11c25edbd82a6b36b3c838da9c51c7fac0333e340605907c1ba0a,2024-06-27T12:15:24.360000 +CVE-2024-27075,0,1,24325e0a28605d247c2a485f7e517ef10637ac57e0d085e19853062c69ea7973,2024-06-27T12:15:24.443000 CVE-2024-27076,0,0,24d87b1b1a3868c69f13103cb01364db36a0403d0c3d6e4e6a4b8c840f0e271d,2024-06-25T23:15:29.557000 -CVE-2024-27077,0,0,47cc2b44949894e45594af34140b6b09462b499546407f943801246ed66c05e4,2024-06-25T23:15:29.637000 -CVE-2024-27078,0,0,51e67bafe82540d5487b113c6db90055849a010b83892f2c314386b2a8c5a577,2024-06-25T23:15:29.727000 +CVE-2024-27077,0,1,e8d09b42739433bade842a0d210d33785cdf1fe05c39e94195ccd6adc147e3da,2024-06-27T12:15:24.510000 +CVE-2024-27078,0,1,7e7e400c2a69e49eeb5b8bb8cc00fd82161759e15c849f38b0e9dc70a27e77c4,2024-06-27T13:15:57.853000 CVE-2024-27079,0,0,875403b17eebb247b59bed8aa8e846d63bed082aa5b8ae7ef929bf16d98ca7f7,2024-05-01T19:50:25.633000 CVE-2024-2708,0,0,d6726781655890c6b50995cdd80442335e26e4506765a03cdcd4793c0c03c31a,2024-05-17T02:38:26.317000 CVE-2024-27080,0,0,48b5a530ebcbdd6350482d658a71fd740eb83db8a14d34f3c53e4c1d9ea4f0c2,2024-05-01T19:50:25.633000 @@ -247154,7 +247155,7 @@ CVE-2024-2738,0,0,6819e123d1b9c89828d0cda96e445b3a2cfd159134a3eaf302a0f1f8d1cb62 CVE-2024-27380,0,0,0f5c7166b062235924c514c2f10a4ea421f2ac3964ff94a60de05b6b487de5df,2024-06-06T14:17:35.017000 CVE-2024-27381,0,0,c85d16414ef2ea0e17176a2e1387bffb23009c8dcc2120361575b6bb90e6ab3b,2024-06-06T14:17:35.017000 CVE-2024-27382,0,0,ce1cc6039d55f01e6903298af2c6b54d100d546e0b2e1fd040444f286306b368,2024-06-06T14:17:35.017000 -CVE-2024-27388,0,0,0461191c0a1f0b6c838773144e0da0bc4317160a97012aaccdf99f454121940d,2024-06-25T23:15:29.817000 +CVE-2024-27388,0,1,d19acc876d6bed76abe4867a16c703c3b3105cc5fd5265605b3dfe06a10deeb7,2024-06-27T13:15:57.940000 CVE-2024-27389,0,0,84e8f98d7373f585e11251f165e8a3d401d2ea257f6532e4408157e8a9f0a9ee,2024-05-01T19:50:25.633000 CVE-2024-2739,0,0,01f4358b131d63aa6c4b85d098b6d7ce2028f8434e497e05210c81006774d4d9,2024-04-15T13:15:31.997000 CVE-2024-27390,0,0,088d48d2e2c1bcbc528cc1356aa6950519935849f26ef96b1de44cf5559787e4,2024-05-01T19:50:25.633000 @@ -247162,33 +247163,33 @@ CVE-2024-27391,0,0,65e70f3aa31d54f10a2175246c716de3159fc241796a5925ea0202b5aca14 CVE-2024-27392,0,0,18daf9b92d6f4a5d902800f45a93c4399e05b57b0a6af86e6495b3c7c8276140,2024-05-01T19:50:25.633000 CVE-2024-27393,0,0,abff7d3b8b6a93c872388469215c515ae6242ed29551d606546cbdc1cadebd04,2024-06-10T17:16:23.223000 CVE-2024-27394,0,0,5f3b48017ab68ac2baf99659dbcc7502dca6d5bd073c58ee1148f9b029b4147b,2024-05-14T16:13:02.773000 -CVE-2024-27395,0,0,6626d7f8988cceaf78a16b6f32ed71812aa0f3f84246bfd8c7c60c5d034100e3,2024-06-25T23:15:29.903000 -CVE-2024-27396,0,0,1c93765b9580e8ec31169373264f02ee3f358a3ec71c32e3581c5495ffb24da6,2024-06-25T22:15:29.503000 +CVE-2024-27395,0,1,98f969ef2089a9bfd038e0010d850cce07aa0fbd924ac06a86915809550f6eb8,2024-06-27T12:15:24.577000 +CVE-2024-27396,0,1,42553a414ba04e25cb84edcc00ca276fdab11b8b6aa0359262c770174c4693f1,2024-06-27T12:15:24.647000 CVE-2024-27397,0,0,20cdabdacc1a91eb0fa4ef8f472950cd97f44c72e319ec51c8fec0dd6043366e,2024-05-14T16:13:02.773000 -CVE-2024-27398,0,0,e740998b4b49d49dff3bb25b709a329c7be915a21c6a7975e68c2ee7df3ed39f,2024-06-10T18:15:28.193000 -CVE-2024-27399,0,0,38bba3e3984c25752f7b239e199b9b086e1f3711ecbd401917732371ac2a2ea8,2024-06-10T18:15:28.267000 +CVE-2024-27398,0,1,8eadfa64497af15107b6a09dc0fb41122dc5b5100d013cbb1097c9766c36be3f,2024-06-27T12:15:24.713000 +CVE-2024-27399,0,1,278ef1c4500dfe304659a9bc6e61937e61f3138b1819c184da077d33919e0953,2024-06-27T13:15:58.017000 CVE-2024-2740,0,0,d811151885dcf4f2b77a4d174a11ca3affaa40577de972dcb33bdeeea321a401,2024-04-11T12:47:44.137000 CVE-2024-27400,0,0,f8967348f1c169b2e0ca9c292a51d827c6177019ddbee3c4cba9169a85c9c7d4,2024-06-10T18:15:28.337000 -CVE-2024-27401,0,0,d4af5c877b0fec22b2bb16a26a67df611ae60b54c4b7ea5bcacc787d1896c6c8,2024-06-10T18:15:28.393000 +CVE-2024-27401,0,1,b00449eb6f170e28be79635194ace4999ac0450dc49bbbbfe3f9686f2ad27daf,2024-06-27T12:15:24.870000 CVE-2024-27402,0,0,09147ae02a3a7a2264bac7d60094578346abbac731c3e7adfecab21418aafc37,2024-05-17T18:35:35.070000 CVE-2024-27403,0,0,6a5707a6f954b40be9e3b6c26d5507b4b7f1f5c9197cc64654509565a2ec7207,2024-05-17T18:35:35.070000 CVE-2024-27404,0,0,4237c01d8ab9cf8456ec0aa70f7e9a2f19875e407f4983ea57b89219830052cd,2024-05-17T18:35:35.070000 -CVE-2024-27405,0,0,5b0b8760e1f5407bb0214520ddb4e0b6c36b08ad63a5efe5194bcfd5eea66004,2024-06-25T22:15:29.580000 +CVE-2024-27405,0,1,e22ba9a2f2f16fa23a4dda3e9dfb96bd007c5d9723816c829a6f7c795f8f0d62,2024-06-27T13:15:58.107000 CVE-2024-27406,0,0,6435bcf8e953210d5be13edfe9d91f7384274892bbfe873bfe41e9b71332ec13,2024-05-17T18:35:35.070000 CVE-2024-27407,0,0,d4a85656bb9a3d2ab118803bb206b3ede2c953a34c749d63998c454190e577c0,2024-05-17T18:35:35.070000 CVE-2024-27408,0,0,0572afe7277c29f5abd1e0f4e403754ad27372e133b70e7aaa80e2448c5b5c7c,2024-05-17T18:35:35.070000 CVE-2024-27409,0,0,a88069aee368bf34a4979a9a3b6d9d7d28d6f70a563fbefdbfa8560ce32534ac,2024-05-17T18:35:35.070000 CVE-2024-2741,0,0,72a13180f65eaa34946651eb5c88084bf0e961149a90b72b29d8dddde47c3326,2024-04-11T12:47:44.137000 -CVE-2024-27410,0,0,c8bae1bee52fe43e8e2a7a9254b1a72bc65193ca761ad157754ca6e0fd312251,2024-06-25T22:15:29.670000 +CVE-2024-27410,0,1,beb4eb4ee1230fd7773a78efb488960ce85c6058e4ffb41487ef0d73fb75497b,2024-06-27T13:15:58.197000 CVE-2024-27411,0,0,d8e2f2df3aff9b6c5c9bf674320119b2b30a98de9a57d48883407586f60ed975,2024-05-17T18:35:35.070000 -CVE-2024-27412,0,0,3ece53dd3ebb1786a8ad442092ca9b9089d15dd289abe2c8d189b62ef9fa7997,2024-06-25T22:15:29.737000 -CVE-2024-27413,0,0,f92d4069f549f88f69bd94f448ab72aab6ec04e2b1d7995dc85ad4ed4703ad6c,2024-06-25T23:15:29.980000 +CVE-2024-27412,0,1,2ece3203e31bee56a2d9abb17272d16e8e32998710afcd588d0aa11948a1677b,2024-06-27T13:15:58.263000 +CVE-2024-27413,0,1,5bc8d15c9b1885aea2ad812c5cecd25d8d087118fa79294dac0710afd6808e6c,2024-06-27T13:15:58.340000 CVE-2024-27414,0,0,8382e424939102f3b4b714762341a767d789e05870213565af136b8fb6590336,2024-06-25T22:15:29.803000 CVE-2024-27415,0,0,c03e1592c9af77d63cc7803c3ab6360a52ff3d16f717f5e676fb5453a94992a4,2024-05-17T18:35:35.070000 -CVE-2024-27416,0,0,1eb17a5512ddf2a0a30ac600a322f2bee5b8652a8a181a4c274088c9fbba63fe,2024-06-25T23:15:30.070000 +CVE-2024-27416,0,1,3601a883bc9ad831d4090a8210d7eb94d14a0fdea629d8966c2710a4c6f30a19,2024-06-27T12:15:24.940000 CVE-2024-27417,0,0,3562566ec5e4b25707e886a607b3b80d59619d83fabff62421da5312118394d6,2024-06-25T22:15:29.863000 CVE-2024-27418,0,0,93176adc8e1f38ff8685ef333cda499f5e760555cc910f17c0d69e76a8c373ba,2024-05-17T18:35:35.070000 -CVE-2024-27419,0,0,b02db7a62d85deb8f3271926080d8c4033efc2d5ab0926933d99fedc6449b081,2024-06-25T22:15:29.923000 +CVE-2024-27419,0,1,5f86e1498c79f3157b9868065fe6225ddeba2c9f02782aaedba5d427b11c81d0,2024-06-27T12:15:25.033000 CVE-2024-2742,0,0,0e25f52f0731b3f58f04025755ec9a85b24de4601bb22e58141a1505898ffdb7,2024-04-11T12:47:44.137000 CVE-2024-27420,0,0,181bdc7540bc7698c88f0e235087c87857818089b7c468c56a4c1750b675fe97,2024-05-25T14:15:51.757000 CVE-2024-27421,0,0,3f5cb49ca23dfe67b37abe045ba080b6865eb0a621835198c7a6ca4ab5d107cd,2024-05-25T14:15:51.860000 @@ -247206,7 +247207,7 @@ CVE-2024-27432,0,0,bd5937e394f88597ffcbb76a366023ae78d17301b9b0df7b8cd54461933e8 CVE-2024-27433,0,0,748a157ff40623987a9ce9e7520b789e1e0da033650e1c52c5ba9d314e1f74bd,2024-05-17T18:35:35.070000 CVE-2024-27434,0,0,d841fd1dcd86a1f8018e08863074d3e441327d97f4f98a84814791f719b18dd7,2024-05-17T18:35:35.070000 CVE-2024-27435,0,0,01760f61e321f4ff0aa533cf157a1d5250354763f4174ff80e9dcca8a68a1b2a,2024-05-17T18:35:35.070000 -CVE-2024-27436,0,0,23ff9c0fac95ee13c298abde83168db0f26468548a7fedf2fc251f1642ed2ff3,2024-06-25T22:15:30.053000 +CVE-2024-27436,0,1,14e5156a39b164c4d7637da0c8950646ceb63501b3b477c97b379a35276bbf35,2024-06-27T13:15:58.410000 CVE-2024-27437,0,0,eeb7235309ee79a6c386f679aeb34521bd4fed464f41e5f7929ea2c89e636cad,2024-06-25T21:15:58.870000 CVE-2024-27438,0,0,55fb51253c970bef36e8307e9cd8e417b74dd87ceb6a058709dbf0edfe5e95c8,2024-05-01T19:15:22.450000 CVE-2024-27439,0,0,05d84171390fe8e5b74542349bf37aeb9a43a6a7347ea4056bd1238a48dfab8b,2024-05-01T18:15:16.380000 @@ -248077,9 +248078,9 @@ CVE-2024-28977,0,0,10444a4b4519bac5d968aeb163eaf3f249ecc5460e5b7c0067db957ce6a37 CVE-2024-28978,0,0,c1808ba5cc7d394021a34c4436b18922fdfd0f689f028622205841f891e3f4cf,2024-05-23T19:05:13.353000 CVE-2024-28979,0,0,1e8150fa51d059ee46f9ef1bfb23a0a517c44eb200b6531263fa54ebf9d48ec5,2024-05-23T19:05:51.923000 CVE-2024-2898,0,0,76a38588eeca70ecb25472849eb8998ee4d4f74eb5e3aa36fdb6d66de01eda42,2024-05-17T02:38:36.130000 -CVE-2024-28982,0,0,601804d1b7e1b4ed7885e7cf09bdfefb082dab0c0fd96f246e03d1c2e2012e1d,2024-06-26T23:15:19.287000 -CVE-2024-28983,0,0,4fbcf479ba5c237ec856893da16ba677568af179b571d3959c84a9f68c3f5066,2024-06-26T23:15:19.597000 -CVE-2024-28984,0,0,a41765e88d788d62f9df5822538642f7767edfb537e29409a710106dff33613d,2024-06-26T23:15:19.800000 +CVE-2024-28982,0,1,1ab71f63a04c38936bbac739c050f7502827552054bf896d2f75a20fbb0ae7ac,2024-06-27T12:47:19.847000 +CVE-2024-28983,0,1,b180bc96e8b14805e75fe4ffc5e1d0eff20b155da37d9699991d16a7cc53ec9f,2024-06-27T12:47:19.847000 +CVE-2024-28984,0,1,d457433c426c5a6b8451125890a2cae8ac1b9e388f699adc568728e7b960c88e,2024-06-27T12:47:19.847000 CVE-2024-2899,0,0,4aa5ec01ca1d3b835467a231d9836714c4e4cef27dea7210f2a97d49ae8b91f5,2024-05-17T02:38:36.220000 CVE-2024-28995,0,0,7f6bfacc6577e5540c3ea3c9fa39d7440addd0797be30b15d88a9d1a10d16e9d,2024-06-11T17:47:22.867000 CVE-2024-28996,0,0,5733b25206f61033b9bade6885819d3353d454454ea3290c2e7bb4df83194bba,2024-06-06T16:23:24.377000 @@ -249468,7 +249469,7 @@ CVE-2024-31064,0,0,f87fea954d6623f92ad98dc571744769b0a41ba2a8ecac509cf34a5bc1aaa CVE-2024-31065,0,0,36c2c4ddfef551b3df9316a574430562ba7ec0ea51f9e5ecbfa0af993c7946d3,2024-03-28T20:53:20.813000 CVE-2024-31069,0,0,d29f1e01bd410bc9e289e23142033a3c4695bcaf7cee5af8670edc7046e0bf75,2024-04-15T13:15:51.577000 CVE-2024-3107,0,0,8567b8b8d2bb62063ead5812f7765e864af3f68fdbb051cf4e93b652388b3114,2024-05-02T18:00:37.360000 -CVE-2024-31076,0,0,74b7e57cfba7d8c14cbb5b6dbf45501df35b5581e798ff0ce3504847d0aa6cd3,2024-06-21T11:22:01.687000 +CVE-2024-31076,0,1,94786ff014a244f3e9ba319b83d9624bbc33bea5fc0f1ef6152f98a455637992,2024-06-27T13:15:58.480000 CVE-2024-31077,0,0,cf1dae6bdc673263e7fd88f3fafa76996295a3cc4f001c878e21a09e0714f3a7,2024-04-23T12:52:09.397000 CVE-2024-31078,0,0,12059b4643db1f23db61cb234ce054c5e189af8320b848468c77237912b37117,2024-05-07T13:39:32.710000 CVE-2024-31079,0,0,1ce67aa5fdecfc97aac423708c06d859925e0061d18b7ef386120e1fd2eb104c,2024-06-10T18:15:31.023000 @@ -249504,7 +249505,7 @@ CVE-2024-31106,0,0,7cb1f35daa18e527942f97955d4cdc7012d7a5e8bc61668cb848c91352d21 CVE-2024-31107,0,0,b69b8308dca1c03345bc5c4ddd842b58a0a34c0913dd806068e33a5a7ea13d89,2024-04-01T01:12:59.077000 CVE-2024-31108,0,0,e198cb5e9a429619e29a035a74c1776abb842099061e8ee67790619ad5916e5b,2024-04-01T01:12:59.077000 CVE-2024-31109,0,0,3766de0285c03422fb77f1fd2a4106a3e09e42f3bd086e20e704d883507e7c67,2024-04-02T20:31:58.463000 -CVE-2024-3111,0,0,b8f1e3d57f83d08308894e03473c9e4b4f6ccc5a78fb1c4d7a4b443b63eeb58c,2024-06-27T06:15:11.643000 +CVE-2024-3111,0,1,c28dac10dfa00fbc13fa7cf4425b6881fad9ba358e5a487c3a5ffc0bb0a01267,2024-06-27T12:47:19.847000 CVE-2024-31110,0,0,cc696090cfd929541a1ca3b42d624a66dc89644b2049217890247603bee15f04,2024-04-01T01:12:59.077000 CVE-2024-31111,0,0,20d45ac72a8dd6f4bc57646746c10654f3c9393a1d038c4ffdb0368f82ed7ab9,2024-06-25T18:50:42.040000 CVE-2024-31112,0,0,4c0b6d124815c5fbc71413fa9db9ceb5adb5efe4d3f57754f8397ffa9f3c1ac9,2024-04-01T01:12:59.077000 @@ -249525,7 +249526,7 @@ CVE-2024-31138,0,0,80619d8b23ffb923a4bb521ee1877f29e2a086a5161850672cdc2424af6c6 CVE-2024-31139,0,0,6254efb24474a93bf19fb224a952376f20b94666e671b313ffb9fb5d6ba4e123,2024-03-28T16:07:30.893000 CVE-2024-31140,0,0,8ac72cdd6b5f7f56e71e87459ff46ad8714fcc8b963def523c845a786f9f62ca,2024-03-28T16:07:30.893000 CVE-2024-31142,0,0,1e729ac327535cc35260a14a69a0b20eeb370b6701c117105871d2595322a9f3,2024-05-16T15:44:44.683000 -CVE-2024-3115,0,0,66272355aec891e166d1da44d334e8e97f1c422ac3867b7e081440eebd9562af,2024-06-27T00:15:11.190000 +CVE-2024-3115,0,1,f88eaa86da1c954b20f1176cdc0a9fef787b2ed4041bd6d2f7695ac324a82475,2024-06-27T12:47:19.847000 CVE-2024-31156,0,0,da4c4994c24daaccd314311728d10a4342bd95e8cf67e2b87207a10f13558958,2024-05-08T17:05:24.083000 CVE-2024-31159,0,0,8f2140422377394a9df40aab7654ea68717fd5b1399ff91747ee6c2dd96f3205,2024-06-17T12:42:04.623000 CVE-2024-3116,0,0,398207d2760952c7d30e8a692022e3a890986df7c49b38076f15d6ef6a9e4edb,2024-04-23T02:15:48.310000 @@ -250880,10 +250881,10 @@ CVE-2024-33306,0,0,428bbc6a8b5a62ff998dea118b0c1a9bedf7e8da9bb5b3a1ca2dc047c805d CVE-2024-33307,0,0,685e6dd47a08dab94c9ba0e23fd24014f68fb2d510e871d193d497b88ce19585,2024-05-02T13:27:25.103000 CVE-2024-33308,0,0,c51602bb951dc504524489be700ba980c6849c038059ed7b24a552934a0ffdc4,2024-05-17T02:39:23.753000 CVE-2024-33309,0,0,0ca9c109e2576b4aca347e95c0818278979b0a538a6e9aff426b0e613a867601,2024-05-17T02:39:23.810000 -CVE-2024-33326,0,0,4629453be77170d0fc9e505ebadc40d2957b11ed03092164d5f8cd33521995d5,2024-06-26T19:15:13.210000 -CVE-2024-33327,0,0,86c05c4eae5fdb595cf99b39f87078718d91407c3f256a3cee2a3ccd4f0d806b,2024-06-26T19:15:13.290000 -CVE-2024-33328,0,0,114ad0ec7f1586b62217eddad2cd8a4d4d282c50ebbd7b8c0f293c64f79517a0,2024-06-26T19:15:13.373000 -CVE-2024-33329,0,0,2cf04ffe45edb5835912b554cbfbc7fb193711978ed4d0835a25e154e0087978,2024-06-26T19:15:13.453000 +CVE-2024-33326,0,1,e65d4ed2661b78b0d6d9d84492b487f78a682aca0337d12f880fe182d4410799,2024-06-27T12:47:19.847000 +CVE-2024-33327,0,1,bf6a97c43d87047b96aea11c47fe4e7fb0caab7564740b92071e6077bad26d8f,2024-06-27T12:47:19.847000 +CVE-2024-33328,0,1,90d28a35dd07b70524349882294f927c18c1bf26a735395d4ccf2ff290476545,2024-06-27T12:47:19.847000 +CVE-2024-33329,0,1,15728f7c043f3fdc61c44f99bb1dafd4965a9dafeb62ce67fee54eb02b498b0f,2024-06-27T12:47:19.847000 CVE-2024-3333,0,0,8caee5b26018a8a7a4f06ec5d64d35dd731cf8d2f43a25885f4e67db044a1bff,2024-04-17T12:48:07.510000 CVE-2024-33331,0,0,d376453cc8c649ab7a3cb33fa711c6bde798d37e4f57b1f2e9caeddda1eec751,2024-04-28T23:15:07.120000 CVE-2024-33332,0,0,5b09c1082da77b8d3e91442a2c29c8546356fbe25aeb87e6d3bdb2141a4c33bc,2024-05-01T13:02:20.750000 @@ -251063,7 +251064,7 @@ CVE-2024-33615,0,0,41b28b8b67e3206017b00ab76deab87329a0ebd842ccfa49e74f1fc56f1b8 CVE-2024-33619,0,0,9fe176c010db33fc5e929ff675df5279b552f25904b1062433730fd43c2272d6,2024-06-21T11:22:01.687000 CVE-2024-3362,0,0,e9a5faf7bef6a2614d0c56b437a13ad3b5f4daaa51a5a3fb10813056115fcca4,2024-05-17T02:39:52.720000 CVE-2024-33620,0,0,0ae5b4e98ac837c69d26781384b9c5cec226adf786c29c4574ab9d5cf7e0dfc4,2024-06-20T12:44:01.637000 -CVE-2024-33621,0,0,1e5dbb9c6e57d02d6a59a6f2607e2895f7745a36ec2ead9be7e74f5a4c2ac1a4,2024-06-21T11:22:01.687000 +CVE-2024-33621,0,1,9f1321c38f68e6a4f2b3cd36fa974002a3209fcf067a30b7311514f66fc84d2b,2024-06-27T12:15:25.120000 CVE-2024-33622,0,0,e421546b7fd8afb11c5a88c4ead6cba43a6425c1c0fd110949d5051c73c4260d,2024-06-20T12:44:01.637000 CVE-2024-33625,0,0,a7a653e26a738155ef4ac75e4b2ab045de169bb09a26b4098fd362fd9fccf1a6,2024-05-16T13:03:05.353000 CVE-2024-33627,0,0,46d1ca344f6adedbf698f1c5642ffd1e81c65d9ee122179e4726e5c233352e37,2024-04-29T12:42:03.667000 @@ -252077,7 +252078,7 @@ CVE-2024-35527,0,0,a44c745f43d9e9ab4b1f265a434cfd75cb0985cd6431373e28e04bd4dbaff CVE-2024-3553,0,0,35fab26edb78f51246dfea40a1da2d2c641df3766aad72a071763d4720020731,2024-05-02T18:00:37.360000 CVE-2024-35537,0,0,40b24ff825bd5479d6cda748f4b6fa0164be52128bb4d8df6dce48131ef1f731,2024-06-24T19:40:04.190000 CVE-2024-3554,0,0,b4c32859301bcc314e2dd2301d5e454826bca59cac4e6957d0f808d223349460,2024-05-02T18:00:37.360000 -CVE-2024-35545,0,0,f6b36b48667ba98a79a37f45f4fd2be878a6be8388ebbfdb996ee55ac9e5589e,2024-06-26T18:15:14.940000 +CVE-2024-35545,0,1,ebaceeb6f9fb1227eb7a838d45911ea1ddfb933eae518341305c5801c883b58d,2024-06-27T12:47:19.847000 CVE-2024-35548,0,0,d8ef06df5ce64125bab3cdde256f258e1c87cbfe4cc6bfbb1a4d7595969f62d9,2024-05-29T13:02:09.280000 CVE-2024-3555,0,0,7b5ade071f86d2f47a475842356f8c63a7b0fec9dcaebb74484d06286ab10108,2024-06-04T16:57:41.053000 CVE-2024-35550,0,0,b3c85fa0d88560018d8c46302ba1cba82a3adc9c9d9315f8092c405b1f662d91,2024-05-22T14:30:41.953000 @@ -252116,7 +252117,7 @@ CVE-2024-35618,0,0,fc2572e9e8823eb6313bf2bb54c527fc11c4117d0d0837dc8f8794515acd3 CVE-2024-3562,0,0,2c433f38634ac971df5298204e01a5cfcb61fa234d5652d870b5515296a5f914,2024-06-20T12:43:25.663000 CVE-2024-35621,0,0,eff37f6109cc46dfb019de6bac1c1e4ffe46087d96bb684a690c4e1a8342c7d1,2024-05-28T17:11:47.007000 CVE-2024-35627,0,0,152f6a140367536a1e62d9a33b0213a3c0edb39ccbba33db112f0915411e954b,2024-05-24T01:15:30.977000 -CVE-2024-35628,0,0,e05989fc65de82e8f7f616462cd9eeb8a5a0a479a9823d124fa71f478b90d503,2024-06-13T18:36:45.417000 +CVE-2024-35628,0,1,2c313b2d5cf1c891710a64b767f44ab49e131c2c45bfba95fd1cab6ac44d46a3,2024-06-27T13:15:58.550000 CVE-2024-35629,0,0,5e80f8e30b8e7ad09d457f272fe181427a56dad2c38472133e9c4c9c94534324,2024-06-10T21:06:02.157000 CVE-2024-35630,0,0,d2b99481e1d25785f899feae2f2b2deb084dac85df61f77063521999b38c24e3,2024-06-03T14:46:24.250000 CVE-2024-35631,0,0,76aaafff73e321cf015be139fbb8c4627ee4855e04e086f9bf89874f24967daa,2024-06-03T14:46:24.250000 @@ -252281,7 +252282,7 @@ CVE-2024-35785,0,0,34b80b08215b3d34133a9193fe0d04e9533f8d455488b48dfcb2268a2076d CVE-2024-35786,0,0,6ac4b9e82e454392f6dffeb00b6e5500dba40d5e3125e5ec1b3b17cdac9888d2,2024-05-17T18:35:35.070000 CVE-2024-35787,0,0,3efa8438309715a6b50e98cc629a3b04c80482df2546db2096b3ecade15d851e,2024-05-17T18:35:35.070000 CVE-2024-35788,0,0,b2881e6dddfbcf9673a03284279c64e322d4e53b4699089f9fd56a537db3265f,2024-05-17T18:35:35.070000 -CVE-2024-35789,0,0,8a106a7ca24d6ac1b761109f0a88586bf718c8b52c2db4713b1f1a8d05814b2e,2024-06-25T22:15:30.493000 +CVE-2024-35789,0,1,211503aac17f7b5db33d8d0eac3c7f6e7be4ae22b3b0f1fd062a45e765e4edf1,2024-06-27T12:15:25.220000 CVE-2024-3579,0,0,382095facbcb62f8766bdfdf3bce2813f1be8461475346b344d7436f67656894,2024-05-14T19:17:55.627000 CVE-2024-35790,0,0,6ac117fdc5275df1a8fd20824735d990fd5b4e8a2388d8acac0f2ff7e1b4aa24,2024-05-17T18:35:35.070000 CVE-2024-35791,0,0,5007c3488b31f13cb9d83fd61c73948d0fe842019eb289539adec0212b0c6462,2024-06-25T22:15:30.563000 @@ -252300,39 +252301,39 @@ CVE-2024-35802,0,0,28b959a1da70bd3ae8b9f426676798cdb2b0a03d135c79dbb46853b6fe636 CVE-2024-35803,0,0,32adc2443d8a9bf7440b2addc4d16d479aff19a5b4908b036e9a777bb38634d4,2024-05-17T18:35:35.070000 CVE-2024-35804,0,0,49fa6f90db0236fabad8bce1ef4b344742e977703bb897e11df51b8d7502c75d,2024-05-17T18:35:35.070000 CVE-2024-35805,0,0,6883b68229640ae702e6e612ec88954755af9a330eec2143311f0b3ba11b4332,2024-06-25T22:15:30.707000 -CVE-2024-35806,0,0,7139b488b616b29863f35ccfbaa710a48a983e2102e3456a9e6f26e0ffdf816d,2024-06-25T23:15:30.253000 -CVE-2024-35807,0,0,5a2b6afbe6381e5c5040dbe9d7c97e7f29a9985149013e92dcc9200715e0fe68,2024-06-25T22:15:30.780000 +CVE-2024-35806,0,1,da0f335d684c27b1bce83242b6114d38fdc95ed6eac14fdfd9bc09453c0ce994,2024-06-27T12:15:25.303000 +CVE-2024-35807,0,1,5e0b0bc7a1846062c07150825f9e5b84a785579d4214bdc8c9e311481de347a1,2024-06-27T13:15:58.810000 CVE-2024-35808,0,0,d2cf366f855fa3c6cbc66216fa131eef4541d765ea0cde71a27a25579c491880,2024-05-17T18:35:35.070000 -CVE-2024-35809,0,0,fb43fa77c0f6256facc8fe3c22456edf745249aed1eb8d1be375b2ef4c49bc5e,2024-06-25T23:15:30.337000 +CVE-2024-35809,0,1,bb1825a7076362ebe2d68fa4704f297f2500863b8d55bca35aed2f8a2b186b24,2024-06-27T13:15:58.890000 CVE-2024-3581,0,0,a1d8e06f506128ffd15dfdbfe16c45cbeda8736a3df4c463fa4b80646e4712e7,2024-05-02T18:00:37.360000 CVE-2024-35810,0,0,be2abeea367f182a6b1ad511a953cc5bc3876003e09c08bacbcea430ee5fe141,2024-05-17T18:35:35.070000 -CVE-2024-35811,0,0,34797d07a67402fe812687531a936e003a4f9fa696cf6255def2733840806569,2024-06-25T23:15:30.433000 +CVE-2024-35811,0,1,82b28547819adafd6ae135c048a0a8e8823910146f57c0635a5fe4ec0417e56e,2024-06-27T13:15:58.970000 CVE-2024-35812,0,0,7d0d1a60f242229a3825673001282d0446ce7ae166b119c0e506a39221a4e148,2024-06-04T13:15:52.390000 CVE-2024-35813,0,0,3076adac19ed647d8df7288bd92dee9a32b49c9380a9bc7bac1f1b9d8b809aaa,2024-06-25T22:15:30.860000 CVE-2024-35814,0,0,18619d6cf722935daa54c4a2017ed9cd3b4228dac5f23c34be01df98692cef75,2024-05-17T18:35:35.070000 -CVE-2024-35815,0,0,325aff20a62b43ab8843f1dd63da6378a7eb866efddba68172daac2aaf53496f,2024-06-25T22:15:30.953000 +CVE-2024-35815,0,1,14069055c1a239f655502725c48eddee2982b71d85d2a93cf7fbffe3bc6cb4ab,2024-06-27T13:15:59.050000 CVE-2024-35816,0,0,c8753974635e0f713ef177aeacfe64152c82ba064ae049a915578b4ef7e87597,2024-05-17T18:35:35.070000 CVE-2024-35817,0,0,63ca67d08e32d98e7ccdb92356199c835829a7188ca5cbda4f3851375cbd25ef,2024-05-17T18:35:35.070000 CVE-2024-35818,0,0,e794ec00e84b7891d510bcede44bb6aedd9b0e49c13ca4583395f2e4809dc9c7,2024-05-17T18:35:35.070000 -CVE-2024-35819,0,0,1662f789d453b2f3af6fb1fdc23c2622f80175c2d9570a222f7c44ee6e8b2397,2024-06-25T21:15:59.257000 +CVE-2024-35819,0,1,a30e000145bba003e959098cd80313e94b1898d9e8cac0c089961a5866bb8137,2024-06-27T13:15:59.133000 CVE-2024-3582,0,0,ccff8970706a85d3ee495e91ff392c6a7172ea5fbc74c301c7707e7f9af29a61,2024-05-14T16:11:39.510000 CVE-2024-35820,0,0,ef8937a48788ed835bd3f34798690b95d243eba50ca3caf796662dedc6c777fe,2024-05-25T14:15:52.920000 -CVE-2024-35821,0,0,9da71e7d79b6ffe6c57b3cf6c004c821af0ac7b683fb65d8fb330fbc553335ba,2024-06-25T22:15:31.030000 -CVE-2024-35822,0,0,913ef1905713d8d53f7b24fc1718045a71879c49d847978b83e64ac1f69bbd61,2024-06-25T22:15:31.120000 -CVE-2024-35823,0,0,a7e5992f49b1c75696d404689db66b35cb7d6609494c3b19e17e318e0fed7822,2024-06-25T23:15:30.503000 +CVE-2024-35821,0,1,234a6a6984c105e317d77f7902e6a33a0528f2c28b9514aaa81539ab4b21c442,2024-06-27T13:15:59.203000 +CVE-2024-35822,0,1,9ca065a0aebb28b27c91296d61007980e3e24b66a5f026619232573a30aa0734,2024-06-27T13:15:59.277000 +CVE-2024-35823,0,1,4ab2aea01c597dd3cb8fb54e114a247f78d86f7b0867075fdfd46799c52fefef,2024-06-27T13:15:59.343000 CVE-2024-35824,0,0,bc73fd2d083752568e54ae546c31c3d76b68fa9b2aabc1cbf60374ecd3be99a6,2024-05-17T18:35:35.070000 -CVE-2024-35825,0,0,71815c9590279121181b50b5470f10bd0e2e3513aca6b995448ded3ffe198bd8,2024-06-25T22:15:31.197000 +CVE-2024-35825,0,1,dfbd26eef1234d4dd6d0ba45f5af3e320a4a94667602c782d60f323999b46d5a,2024-06-27T12:15:25.373000 CVE-2024-35826,0,0,4c261153797f68de52fdcebcc39b483e62e8771137014b7942ef4517c0aad216,2024-05-17T18:35:35.070000 CVE-2024-35827,0,0,00fd5dbd49fdc15bfa820083a1ec906c035d4389cda7bf080f47e1390b623c3b,2024-05-17T18:35:35.070000 -CVE-2024-35828,0,0,c629ca2d56bedaff584b0284d234f70edb344821affe5c205a80a0c18b1067e3,2024-06-25T22:15:31.287000 +CVE-2024-35828,0,1,ec96bf2b7230c948f2b1c44eeef921c917b8205794a36bab9773bb7bb3a0e588,2024-06-27T13:15:59.403000 CVE-2024-35829,0,0,eb75d1dc60f74d7cf46b218d06c9d949161f253ff8d6e6a059c88083e556eb86,2024-06-25T23:15:30.593000 CVE-2024-3583,0,0,672cbcf5ff82e5a208e84c0cee63ea8e8060eeca51cba42e6a1f912a5acbe903,2024-05-30T13:15:41.297000 -CVE-2024-35830,0,0,28d178e6ef263b0d8539760c16dec2e917fcd9bcdbcf7a657f26b2c8bcf6c6b8,2024-06-25T23:15:30.677000 +CVE-2024-35830,0,1,9c97735592b2a7edff45c4f4980c7cbdb37a9d7632e679ab333252218bc638e8,2024-06-27T12:15:25.440000 CVE-2024-35831,0,0,e476f255cbb35863c228cc39c24f005e09dc45755deb9bdbd505cd7895bb3e9a,2024-05-17T18:35:35.070000 CVE-2024-35832,0,0,709a0d9725aa8f275cb6f1989d983aa9dd4d602053632c653ca286db26420caa,2024-05-17T18:35:35.070000 CVE-2024-35833,0,0,ac7c120dbad2f7a43f4a3f5e75a5fd93c76872f4723795e48fb97579ee7ef840,2024-06-25T23:15:30.767000 CVE-2024-35834,0,0,32e4118be015508ac6f4303c4232e28e5b8bb94a73db1d69ba593a92c834228e,2024-05-17T18:35:35.070000 -CVE-2024-35835,0,0,3a2c67940632b0a909443f1b340de9a2500ce93755bf0fd049df36c7fa05f2e7,2024-06-25T22:15:31.370000 +CVE-2024-35835,0,1,e5edca53598c4b09ad3372d158f8691c11d4406dfde98d992b0faa5d5a271c64,2024-06-27T12:15:25.503000 CVE-2024-35836,0,0,467e806a3eb2d88e896fde0b6f20fe19fedba15dce450cf499b32eff378b4f78,2024-05-17T18:35:35.070000 CVE-2024-35837,0,0,5e644d7f861a121c0f9be77f9f753a04ed8b4f03b3458eeb02b572988dd58b02,2024-06-25T22:15:31.440000 CVE-2024-35838,0,0,8b5eb34808efa29fc927c5380174554fe7f926f6cfbf799164ea23c633f7ccce,2024-05-17T18:35:35.070000 @@ -252345,9 +252346,9 @@ CVE-2024-35843,0,0,b99d2f9c3b57744053024620b791f7c00959bc5fa311b8c82aa0c2667af85 CVE-2024-35844,0,0,9977f38fd486a5904b7383c7eb6ad5360ac384d17108620b67113cfa1d34114f,2024-06-10T18:15:35.250000 CVE-2024-35845,0,0,b93c01b8117d526ed1b0fedd0a270e51f3d2851c20fd78dd3f91960a191ddea8,2024-06-25T22:15:31.510000 CVE-2024-35846,0,0,e3932a760cf7300d77b7b45d00a9c07b1b457001acb1af73cb3f5252ad7bdcb2,2024-05-17T18:35:35.070000 -CVE-2024-35847,0,0,e23787cb3201c6ea1ea51dcc998d077d5c6d0b988abc71e6665a923edd8fbf16,2024-06-25T22:15:31.587000 +CVE-2024-35847,0,1,01d3d6fd165a034f47f0b30603645c02bf752158e40694b7436e810fa02ddbd0,2024-06-27T12:15:25.567000 CVE-2024-35848,0,0,72c8d8ec7c66002248dd2aec09056d80d1948d68a31ee85b9e315e0faf2e4c13,2024-05-17T18:35:35.070000 -CVE-2024-35849,0,0,81f8b2290743ec3c1700696109c8e73700436fd3d00309167b37dbc14db45a9d,2024-06-25T22:15:31.650000 +CVE-2024-35849,0,1,870ea0f68e52ee90bbbfdaca509fcbd76304eea6cb9db9e6f204c92635b4bd0a,2024-06-27T12:15:25.643000 CVE-2024-3585,0,0,d56994adec844913daa064ad70bdc27c802c5df905040176ea6c6996b636c17e,2024-05-02T18:00:37.360000 CVE-2024-35850,0,0,1caaf651b5b8da65d25ea10206e70df56162a890740b4e5190ed48f0c08c3ab7,2024-05-17T18:35:35.070000 CVE-2024-35851,0,0,4376d6fe25d843738ede208de8b13dd1bc95b6282f1f031a18eeb382cef6f667,2024-05-17T18:35:35.070000 @@ -252376,7 +252377,7 @@ CVE-2024-35873,0,0,45f8a87afd9ca14f6251d19ed5a3f3679fbf7c06cb9c4f80b3fa720be1faf CVE-2024-35874,0,0,3520efb10316824840bdbd36897f5ca57027036534f76848dbe9c49312e8b525,2024-05-20T13:00:04.957000 CVE-2024-35875,0,0,ff5fb2106455aacdd7505f7a7d4443120e5c7a0eee9d6f0359376261b52aee17,2024-05-20T13:00:04.957000 CVE-2024-35876,0,0,2c1581049151470b56da2f00f42b4dcd071589dbe0f28b10e955436bbeb3c3ad,2024-05-23T14:15:09.830000 -CVE-2024-35877,0,0,5dbe9842c22886c2e24b4a1e4e5d557db8e7753326e8da0ac5d53c7c4dea3592,2024-06-25T22:15:31.973000 +CVE-2024-35877,0,1,ad3879f34763fa3380380e4ed690f1dfc07650ea9ade1f3f6e7760a66b412149,2024-06-27T12:15:25.717000 CVE-2024-35878,0,0,f4f90297ba95222218d9e4d0a5881c131fa2e06df3e682d89da5f03aceb55f6d,2024-05-20T13:00:04.957000 CVE-2024-35879,0,0,6c2068d8409dbff5e0fd9fa7946e436eafba875ec7e10c2f944cb0efa24f50e3,2024-06-25T22:15:32.057000 CVE-2024-3588,0,0,7b95de2e355405c38a968dfc1a6e09300abc5b7ca039337ea6955661cdcd8be3,2024-05-02T18:00:37.360000 @@ -252386,24 +252387,24 @@ CVE-2024-35882,0,0,6531d61c80ed90bb0cb7124c1d0384d35b607d812e3c3fde9e1bc0a707e8f CVE-2024-35883,0,0,1c712556c7576bc10fde1f4f812881436c427808fe012e2dbb69fdba712925bb,2024-05-20T13:00:04.957000 CVE-2024-35884,0,0,9cd3ac489e87004eace462d001d3512f4ecfe83a597d297e544476ae50217394,2024-06-25T22:15:32.130000 CVE-2024-35885,0,0,02af639c7c24a0857d06585927ad961c80873487f3c707bfd2db5c54cbba267a,2024-05-20T13:00:04.957000 -CVE-2024-35886,0,0,804a99e013d228d87fced3df95a641ee74ec0454da4718716cc8f72faf3def46,2024-06-25T22:15:32.210000 +CVE-2024-35886,0,1,01a4aefb5402adad224f777eb5efb1cc62c0a1fe5305a31640354c6b5d0bac90,2024-06-27T12:15:25.800000 CVE-2024-35887,0,0,12b3f020c2dfaa3e9d2a4a35c75c170d115a19ea6e27bb75a4059ae229531e34,2024-05-20T13:00:04.957000 -CVE-2024-35888,0,0,ebb0156485ea8fe83526bc3bee5dc9c0207aa4018700363f0270e772b6b65ee6,2024-06-25T22:15:32.300000 +CVE-2024-35888,0,1,23b2f86893acd6364109b5fb90deeaeee116c010d5a70fedcadf02447c6498d3,2024-06-27T12:15:25.870000 CVE-2024-35889,0,0,05af75820fa09c58eee829e23f517f7f5525fe535871cff8cf265ba08fc18cd0,2024-05-20T13:00:04.957000 CVE-2024-35890,0,0,6e4c25a5affda07d29f261f8df35f19c9b0bb4565fac7d0fbf43a8f40bb0d721,2024-05-20T13:00:04.957000 CVE-2024-35891,0,0,0e619907a3185c0f405a7f40e6342554b854b52b3f7893ec12fc05bfbd221b30,2024-05-20T13:00:04.957000 CVE-2024-35892,0,0,c0b8d0b988d919dca30d3f728ab2624ff56cf753409c30c26b7b5baad4a369ba,2024-05-20T13:00:04.957000 -CVE-2024-35893,0,0,1977281e9c61c0bd13cdaa58e08c1bfadabdc239a5adef0503fec58b6345d063,2024-06-25T21:15:59.407000 +CVE-2024-35893,0,1,dc2cdad76447c5df9c90dde35c5205c9e9da54d558327ea0c0ab48b72fa477b6,2024-06-27T12:15:25.943000 CVE-2024-35894,0,0,56b393cdb4b1bf082a49da27a755e50d33c53b0dce8f6badb7878e061bbd22c8,2024-05-20T13:00:04.957000 CVE-2024-35895,0,0,0c09b7c95528cfb66e574d7c132054cd453934cbdfe5121443b14b66fb476770,2024-06-25T22:15:32.367000 CVE-2024-35896,0,0,46275aaff8cee15975cf7e14dfa07faebe547458ecd4d049cb153c6731fac123,2024-06-25T22:15:32.433000 CVE-2024-35897,0,0,5162ed21f1af78a6b26ef54507972b700d793dc4b1bd215549fd38bee5d5b50a,2024-06-25T22:15:32.503000 -CVE-2024-35898,0,0,8d63cb2b3df7fdcab9b2c01577a7755aa638a749a8b2d404bdbbd562b62a6dae,2024-06-25T22:15:32.580000 +CVE-2024-35898,0,1,551566b5b26acbe9ea549c4068d3497eac661fa59690c1a1950a1abf29d5b22f,2024-06-27T12:15:26.020000 CVE-2024-35899,0,0,bcb906185f05a6675af34835846f417172bbc08b9f76eda26d257c96a7b41a6f,2024-06-25T22:15:32.740000 CVE-2024-3590,0,0,1b4d86409edc7cb85d4449ae4f816edfdac3be0a085a89d46eaa687645fc2ef1,2024-05-14T16:11:39.510000 CVE-2024-35900,0,0,6716018817c91a00a0cd1ba0a72f0d7195aabc7d01767762dbf111e94174c190,2024-06-25T22:15:32.823000 CVE-2024-35901,0,0,7877f157f39ffad861738fd4918c2c0a1821c59daecadcbea3a0179059ad1362,2024-05-20T13:00:04.957000 -CVE-2024-35902,0,0,47be728b19b8ed6723daa8acf754bc59d78a9206baeca8a51c923fb982d12e78,2024-06-25T22:15:32.893000 +CVE-2024-35902,0,1,86ddda5cb45000fd3aa5b81a74c6c92a5ee0a6cb4339c41910b0d6dbdef9baf2,2024-06-27T12:15:26.087000 CVE-2024-35903,0,0,153b2001095af8871c0e47c18cf47f0c9f6c1d0531ef18898cf52eaac2faf134,2024-05-20T13:00:04.957000 CVE-2024-35904,0,0,2282009bd20917934af9617f6b543e8fc9f0bf7c54efdd769489761c9d81fb38,2024-06-10T17:16:31.803000 CVE-2024-35905,0,0,8b9376ff8fcf0493eb242dd177159e7c5613c1cedaa73bdf9838624f8a07e514,2024-06-25T22:15:32.957000 @@ -252412,12 +252413,12 @@ CVE-2024-35907,0,0,85f5d6adfea06fa2a56a96f07669fd5b3a3150b8ab62bf7406cd5e32c77b5 CVE-2024-35908,0,0,1c87b1eb9a8ad55774dcf364441df6cc69e36801c339cf87a94691243de783d8,2024-05-20T13:00:04.957000 CVE-2024-35909,0,0,8762a89904b817025d6231a1e4dd849b55e320ba1c9f6a47d0d648de6f462c54,2024-05-20T13:00:04.957000 CVE-2024-3591,0,0,9877ebc0159829ab400f95864586bf30cc4e3bc9831fa204193468dc46d597ba,2024-05-01T13:01:51.263000 -CVE-2024-35910,0,0,579661d6d251e70e2ca3c58dba7102e19b397376dbda8114bb23bb4d757ef3e8,2024-06-25T23:15:30.963000 +CVE-2024-35910,0,1,94365645ff58df38a1b120ccc0facdf85c97644b390c57383cc9be1edea9a6be,2024-06-27T12:15:26.153000 CVE-2024-35911,0,0,65dfccc16926f73b7b215ac6777e53acce05145d7631dae2f348ac81a0e2144d,2024-05-20T13:00:04.957000 CVE-2024-35912,0,0,cbae508992521e1e11580f5eb71bc51a73550d3512845d64c56fd80d1dbad7bb,2024-05-20T13:00:04.957000 CVE-2024-35913,0,0,b526f6a37bc8bac31714c3c5788028eef8265f66d5489649cc2c86ffec169145,2024-05-20T13:00:04.957000 CVE-2024-35914,0,0,70cdcf225a1af8ab9ad8b8c8531bf2e07d41b68c7ba798415014938a62570924,2024-05-20T13:00:04.957000 -CVE-2024-35915,0,0,3b5f9342319ccd659a10b9f066b72b11db21dbd0559e83aa1ef5ad41e4085c32,2024-06-25T22:15:33.023000 +CVE-2024-35915,0,1,19b6c7c526945d0452150b88ffe76e3bf71384b9deef77fddeca0ce1ec5af752,2024-06-27T12:15:26.230000 CVE-2024-35916,0,0,eef0a98f14bc85cfcc41c2c9dbcad427449f316ed211b491f369093e02e70508,2024-05-20T13:00:04.957000 CVE-2024-35917,0,0,b89394b74c7a8c75aec1871ad444a1de3b356465b990a17e25fbca62313f01c7,2024-05-20T13:00:04.957000 CVE-2024-35918,0,0,b2be0a765e82477c2ac9db950f51995c31889c3002199373637759e7724e2e90,2024-05-20T13:00:04.957000 @@ -252425,22 +252426,22 @@ CVE-2024-35919,0,0,27d82e9c37f0ef8108c9a890221a4e4df4c581ae1c83c8f84d3878b062b56 CVE-2024-3592,0,0,5ddffb53103cba52c327a0e0a594969ceb3b00a08fcd0f03d03c6161b46a1bb5,2024-06-07T14:56:05.647000 CVE-2024-35920,0,0,8a2843ee95e70c40090dfa8d23a18e67b6b0ca26e4c73366bc47c210b89fb0f9,2024-05-20T13:00:04.957000 CVE-2024-35921,0,0,84ce50a3d1bc0a485a80ec84c27ac1436f96be4789b7f8d91c7dd5db63d60278,2024-05-20T13:00:04.957000 -CVE-2024-35922,0,0,1c84c8573ee3d3e8c1259876abdd48e21abee92a8a615efd62cd5d1b80b4a1be,2024-06-25T21:15:59.483000 +CVE-2024-35922,0,1,c6cc00dbc1b9a68ca7f1987ce84dfed4f610f957a3a5ef0c513b90c74b4739bf,2024-06-27T12:15:26.323000 CVE-2024-35923,0,0,83568754b2120c0dff38d3f5c97b39d0649d1b51c262a9dde7a7dfb26eda9e24,2024-05-25T14:15:53.013000 CVE-2024-35924,0,0,e6fed4d88783f6d9dfb8676bfcc70a8c8034399e4d8ccc94666de6069b5ef537,2024-05-20T13:00:04.957000 -CVE-2024-35925,0,0,d22da640d033c848e6e0a2577e301cda2d76fc04e2b5264fa9297f8e0fc16b70,2024-06-25T22:15:33.090000 +CVE-2024-35925,0,1,97355988b11e2e95e26c32c91b6a84151173f71630689d017cc38c91597af143,2024-06-27T13:15:59.470000 CVE-2024-35926,0,0,3d2ac2a243ca9048cff71d0540f9f97d2905350e3f238d4a33454ffd229eff63,2024-05-20T13:00:04.957000 CVE-2024-35927,0,0,2bcd735e32c2af1f7e79dd26901d4373a7c4ef8ed5e2d8dba0a02e14274fe96e,2024-06-16T13:15:52.210000 CVE-2024-35928,0,0,a8dd6c98251d56ea2212a0301bd7693ba0fba47583ce10689329bb703f6a5832,2024-05-20T13:00:04.957000 CVE-2024-35929,0,0,b0976c945734b786059cbe173ebcdddfdbb33c2a425bef7cc1a51cc621711858,2024-05-20T13:00:04.957000 CVE-2024-3593,0,0,50acbf7960e7625d05da9c7b7d3132eed4d98afbc22e4645d383611e54614202,2024-06-24T12:57:36.513000 -CVE-2024-35930,0,0,5f32661f99abfda1070b1b3d171f7a29d508cc43a76cf3c9372d2e26e624671d,2024-06-25T23:15:31.067000 +CVE-2024-35930,0,1,c9a706491410278f40f6865e792b8c8b2a9769f1ffb514523ae7e144ada6eee8,2024-06-27T12:15:26.397000 CVE-2024-35931,0,0,bbab3f0c9f0ef1064e0fe5e3a06458e22ca3658e43381297612e0f4a8c31dbf3,2024-05-20T13:00:04.957000 CVE-2024-35932,0,0,a2b9c7df497b22693711ec0433b1152b0c1e4b5c96252607b0317c8f6571001a,2024-05-20T13:00:04.957000 -CVE-2024-35933,0,0,ff23bd5cba954c779b7525dfb5aec9515963c11ac0f23003cc84d57729e3b5f9,2024-06-25T22:15:33.153000 +CVE-2024-35933,0,1,67a22d394df31be4484e403906e550f56d0e06284b4e55560d51e52c2a69aeb2,2024-06-27T13:15:59.540000 CVE-2024-35934,0,0,1c1ab6f3fff35aec3aed121345faee34d9a498238dee75f14a200db5605dbbf1,2024-06-25T22:15:33.297000 -CVE-2024-35935,0,0,7b15a7f4947329e0ad1c4caed2dcf635a458bf6c6633d5a75e4fca81b5fbe6d2,2024-06-25T22:15:33.360000 -CVE-2024-35936,0,0,d0fb920403cfd1355fd910ea057afe0cc2c752f307242aa75d92a1a06699d314,2024-06-25T22:15:33.420000 +CVE-2024-35935,0,1,1563869a65dc8c3ee23bae9210037c191bb90aa2150a9516228f42e89338979b,2024-06-27T12:15:26.480000 +CVE-2024-35936,0,1,5afcfeb86299ef0245d6f4348f896f67785782d3962ad47a4142ae7ebf576fce,2024-06-27T12:15:26.557000 CVE-2024-35937,0,0,be195fdfc5e61aceb05d0cc472e6d1dd6e917146cfd5792bd4c99ef6ff5cd42b,2024-05-20T13:00:04.957000 CVE-2024-35938,0,0,0a97241552b0a2279900378439f264fc85d4dadf028946adfbf927738a4e8be2,2024-05-20T13:00:04.957000 CVE-2024-35939,0,0,20c3dbeef818d9aa28443d6cf86dac7a5d6a50e673e76146dc31fd6948dfac55,2024-05-20T13:00:04.957000 @@ -252449,10 +252450,10 @@ CVE-2024-35940,0,0,eb1e93c9c31e11604c6084bbcef1660a4c1c476e13229f41a46efb586e67c CVE-2024-35941,0,0,cdd45b79cac38121859bfcfe5c975cf81ee19a43fc4a3c73b0bb3e31cf6dffb4,2024-06-04T13:15:52.613000 CVE-2024-35942,0,0,9db86445e57f0ae9bd7c5c221f0b1ea58d46a866af07a30b8b6df3d6360c4681,2024-05-20T13:00:04.957000 CVE-2024-35943,0,0,6d5a179a77a7d5fbfc1a09ae3c18a0804de9a0f865d9e440ccce732b214ab68b,2024-05-20T13:00:04.957000 -CVE-2024-35944,0,0,0bdc5d2147413769c5c91b67347bcd461c3bdc2bc0da062dd6087fa772ac7cd7,2024-06-25T22:15:33.550000 +CVE-2024-35944,0,1,1113513874495d39d00949a0d1ecc1b806659bc4a0eaed05b995e72ff408c789,2024-06-27T12:15:26.637000 CVE-2024-35945,0,0,a0c381e7a77d5ab4da0e7b3a771532d3cdd0e0f4250d66940a69897ddc946a18,2024-05-20T13:00:04.957000 CVE-2024-35946,0,0,9605756f2fc14e549761e5eb088152e2b2b47f9b4bbe8ca2411e81d4f89087b7,2024-05-20T13:00:04.957000 -CVE-2024-35947,0,0,3db138b6007606da35833d4193c6def708288c574ba1f20515609acbbd8b61bb,2024-06-10T16:15:16.447000 +CVE-2024-35947,0,1,65c934826152c9cb400878ab67cf0c4ef1cdfc22bf73ec1b76cb8e4cd0cac8a6,2024-06-27T12:15:26.713000 CVE-2024-35948,0,0,d865625963e02ac5adc8b78b5718b2a3f53bf1b40d251f28cf7f17fb9a418704,2024-05-20T13:00:04.957000 CVE-2024-35949,0,0,44764f2566878600b0d46ddd8d460e0c9c197ccadb6380d7626ca4e69a79bb50,2024-06-10T16:15:16.563000 CVE-2024-3595,0,0,042a1bf793010cd433ce5baf95b511b1a6d765b86915add8be092615dea72fbc,2024-05-14T16:11:39.510000 @@ -252461,12 +252462,12 @@ CVE-2024-35951,0,0,2c8984a07fac81bfd1b2c6d53e8af72e30543b6c53d7b63a8c9deff071a77 CVE-2024-35952,0,0,3ab929cd25145f7cc9f984f3696c92cc9a543b63d3411d731d512042ea185c9c,2024-05-20T13:00:04.957000 CVE-2024-35953,0,0,03fb4a05ed47e586e3ec39d8d36cd755173f341036c22ca12382aef9d7f118d2,2024-05-20T13:00:04.957000 CVE-2024-35954,0,0,95533d080699e98828adbeee447f52d56aadee566466f89532acc19a9eda0234,2024-05-20T13:00:04.957000 -CVE-2024-35955,0,0,fcac8b8dbf3a2ab02f3f21dee6ad6120efb959fe9caf2ccc47be138d27f2fb19,2024-06-25T22:15:33.687000 +CVE-2024-35955,0,1,7b36e4fa2d08477cd017136facac2ef5934c7e0e4f8279725f1fd0f6cfaccea2,2024-06-27T13:15:59.610000 CVE-2024-35956,0,0,55b12553a75f89f2d214b1fcd84fa80766bd8ee9d7a6cac0e7d21a623984e23b,2024-05-20T13:00:04.957000 CVE-2024-35957,0,0,5b6371b0c19cd391a7a5e835308f5b5bb079073e043d3490afb575881e4c64eb,2024-05-20T13:00:04.957000 CVE-2024-35958,0,0,8be8284087c38f65cf08babd3b4a780856c21e62456b0a04c726a0757437fcef,2024-06-25T21:15:59.560000 CVE-2024-35959,0,0,1aef1161e36451906f546e64f8cacd36636913bd21908d9216c1a205438ce199,2024-05-20T13:00:04.957000 -CVE-2024-35960,0,0,464c6e3a4b844cdf64ad45e2893573b647ace0247db78bea46f110118466375e,2024-06-25T22:15:33.753000 +CVE-2024-35960,0,1,f602139bce799159e6216c09664ef5bb37f2a44213abdedd5bff0f93788ed3e0,2024-06-27T12:15:26.787000 CVE-2024-35961,0,0,2504ac9445f08283dfd48dff6f73cd1bde27dcfc34a3af8b848c02cdfbc3b2d5,2024-05-20T13:00:04.957000 CVE-2024-35962,0,0,27ee2dc50d8c19cf92e1495d31ffca1c8c1cfb90509bc18e8192f2d623abe696,2024-06-25T22:15:33.823000 CVE-2024-35963,0,0,51ab4977108f8e6f85568d52a9443d4c2f5d55ef98e6e3329011d10407fea0cf,2024-05-20T13:00:04.957000 @@ -252475,24 +252476,24 @@ CVE-2024-35965,0,0,5e4c05ce637f47873d6ed2d62afa00f10bc5ebdec3b484022d90c37834f1b CVE-2024-35966,0,0,c5fe47d4bcd9271f5e602a237b487a254165526cb77cec4c5b3e9d6030961775,2024-05-20T13:00:04.957000 CVE-2024-35967,0,0,511f082f31fa620208b6d4602f2896af127649bed601cec33ed823eb9bd14a7c,2024-06-25T22:15:33.880000 CVE-2024-35968,0,0,a78badb5439f85aa8efb4a9cdf528d05f2c802d5a327056a2636c278abe68375,2024-05-20T13:00:04.957000 -CVE-2024-35969,0,0,22fb9b60e7f8b7d471c12ac6d7770c81cf8df57d9ea44e844b1df46f61fbbb09,2024-06-25T22:15:33.940000 +CVE-2024-35969,0,1,30203edcabcf4986c518118ea12f20568fa68c3ca091a532d0c408605eec7b06,2024-06-27T12:15:26.887000 CVE-2024-3597,0,0,61db435ecdadb6c970a4dc16fc28877bfa4b9d331964319c3be4ca6f562d7128,2024-06-20T12:43:25.663000 CVE-2024-35970,0,0,6dc1144434a50796750071e0c3d32f1adfe548b8c17aaa45ca8711be6b4aea01,2024-05-20T13:00:04.957000 CVE-2024-35971,0,0,789d8533d8a5b9480a46b5c467b61e45b7f385d5215ba9c26c6a1dfe1f86553e,2024-06-10T18:15:35.383000 CVE-2024-35972,0,0,8fcf39d4ace4f1fcc0a244e6329df0b275111c4ac22e4ce79dcba8599cd853de,2024-05-23T21:04:02.433000 -CVE-2024-35973,0,0,c8455a6bcae0d6ad8a8d05e951ff24c9a55e75969c9f6256cc553be64ae83af8,2024-06-25T23:15:31.150000 +CVE-2024-35973,0,1,e0ed319a3d37581b4b4648a07ad6f572a3fbd829a2a08c31ae8dd0876ffa933f,2024-06-27T12:15:26.977000 CVE-2024-35974,0,0,47c72410c2d5a202dc8786b8c640c5e3910321f990bcd69a5de3c3db6c5b0404,2024-05-20T13:00:04.957000 CVE-2024-35975,0,0,58cb8cb6e00a7a16562610fda13b300aa4edf229b20a25a14e22d431eeae77a5,2024-05-20T13:00:04.957000 CVE-2024-35976,0,0,7f23026b834551aba5065600072d51161bdf3b9c5f35a4bbe2c04b2943bc3142,2024-06-25T22:15:34.027000 CVE-2024-35977,0,0,768529df22e71f8b08da3992841c8bdc2f1a8892798da493cf372af21d02b3bd,2024-05-20T13:00:04.957000 -CVE-2024-35978,0,0,d1003993ca5bf21ccdd7f094895c64d5992433e54183e8b794a56409d3fded07,2024-06-25T22:15:34.133000 +CVE-2024-35978,0,1,e306734de8d8086da7300aba53de6d039ddfeaf5bd8bfbbf26ee007d6733a106,2024-06-27T12:15:27.050000 CVE-2024-35979,0,0,c9348d4dd7da6c2ba2ce8f4be23dc0b3f79b66ef76c44b7360b46e880f7eec21,2024-05-20T13:00:04.957000 CVE-2024-3598,0,0,885c48b686e5bb2258cc0c91f29020f7833d7484ea51a21d94da9f5d8904b730,2024-04-19T13:10:25.637000 CVE-2024-35980,0,0,4cd59bcc872e7014af4237a2d195b69413ffb03e15c70088fbefd933bd06c714,2024-05-20T13:00:04.957000 CVE-2024-35981,0,0,ad49c9f883390f754072cbd3dfba613a6a6097b8d716561943458e74e943f915,2024-05-20T13:00:04.957000 -CVE-2024-35982,0,0,6369af53296fb3c392cf1dd3cb34b444fff212368701617654d6f68fd765732d,2024-06-25T23:15:31.253000 +CVE-2024-35982,0,1,c6628edc5d2b12c1c5c04bad9201f9ab6e0a9fede2644f82f41cee3e39c91eea,2024-06-27T13:15:59.693000 CVE-2024-35983,0,0,1765e4d03d1ffce57f923d9337012e723cab392648fd549310316d43c9f62d3d,2024-06-25T23:15:31.383000 -CVE-2024-35984,0,0,a041af436b02865c2d5676e23e6e39e7a921f2a993dcde724033a8a574c332d0,2024-06-25T22:15:34.233000 +CVE-2024-35984,0,1,50b46e9f354a80e47908030e54742b0b16175af93682949b161602e4a922cf8a,2024-06-27T12:15:27.137000 CVE-2024-35985,0,0,f18895f8d229a047ba54c3045d03967427e9a1f0b5bcb5ae41678d1eb51ecb76,2024-05-20T13:00:04.957000 CVE-2024-35986,0,0,b1d8dac11c0d8ad3694d22837988cf388bad2683dc2720ce608e6dbe10cd18b3,2024-05-20T13:00:04.957000 CVE-2024-35987,0,0,360d3a1d9de1bd056323df1579c86381cb4c52aa5b428dbfc91af884d6f17b74,2024-05-20T13:00:04.957000 @@ -252506,7 +252507,7 @@ CVE-2024-35993,0,0,c023eeee539ee4e82ed89df4ac5f4a32af175b99fc2ae096d429636e6fbfc CVE-2024-35994,0,0,856ef9767d968b4ad4a1f22ac0d00754911c7c2181eda13b15ee1e72c7f602c4,2024-05-20T13:00:04.957000 CVE-2024-35995,0,0,2f07605c4dcc1143979a52d52639c01d2c531f39716486221527047248cd4b5d,2024-05-20T13:00:04.957000 CVE-2024-35996,0,0,afa42b223f008b4125fefcf452820b486f7bd80e59affe4b4a0715d2527a3e3c,2024-06-25T22:15:34.480000 -CVE-2024-35997,0,0,83f706593957e8e0c462e2ab623b5710fd16c480ac9c332100d5f8ac2947991e,2024-06-25T23:15:31.750000 +CVE-2024-35997,0,1,9feb5ad942ca3fd7678e073d27e6f3cef8ea97bb1ee04542d40307b604d523b0,2024-06-27T12:15:27.237000 CVE-2024-35998,0,0,317a6a19b81578697904777d4986a6fbd72f28f92be0cdb4cc7f9752a5589ce6,2024-05-20T13:00:04.957000 CVE-2024-35999,0,0,434a237d10f92e790b2b326825f4b7d101999dad0746276066e894e6dc73573a,2024-05-20T13:00:04.957000 CVE-2024-3600,0,0,2bcdab915f93b74478de5881653ccc603ff3b16953c5dedfa1e8f1a51494d9c9,2024-04-19T13:10:25.637000 @@ -252514,7 +252515,7 @@ CVE-2024-36000,0,0,26b1a90d49f2f7daf6667f81494e3d80bfc1dae7812241f709be08735e010 CVE-2024-36001,0,0,dcbe7c54d014f4452d228053a701092aa949095013a17d1b5dae53024fec1540,2024-05-20T13:00:04.957000 CVE-2024-36002,0,0,99ea2e06760de7fd64641fb1559041d030a234ef53007fbccab463e1fc5318f7,2024-05-20T13:00:04.957000 CVE-2024-36003,0,0,40e8f28e10bbf8974eda80c8c0a6a69b222f2ed7878236e62071aafd01e92bdf,2024-05-20T13:00:04.957000 -CVE-2024-36004,0,0,084e20629b17918a827478fb0ceb3fc3f545cdcab386b27aa761f49f542712ad,2024-06-25T22:15:34.870000 +CVE-2024-36004,0,1,df2f553958da8ae1507fa8944f8c0f2f26b35278a674d1b365ad5e3d9d422d9c,2024-06-27T12:15:27.360000 CVE-2024-36005,0,0,21f3ff0442d870ee3ac9460767a20b6ced3d53db500158439ebc1ab597e02df3,2024-06-25T21:15:59.633000 CVE-2024-36006,0,0,0aa8633e925c28598251753270bd0d8c39e91629058130153d97a2edd567b1c6,2024-06-25T22:15:34.963000 CVE-2024-36007,0,0,a68c68a6b9ae37de10f9d60ad207716c8fb1c9af4df416a5403ef8fb9f819695,2024-06-25T22:15:35.027000 @@ -252525,14 +252526,14 @@ CVE-2024-36010,0,0,2843e205b9e9b17b5fb3357cdae71842164efb1f33700d0fc205102dad316 CVE-2024-36011,0,0,abd5638cc1cfdef36e14f7c96bf2fc845d42601d602cfe73690b22754ed47103,2024-05-24T01:15:30.977000 CVE-2024-36012,0,0,99a87dfc7b0fc5371c51d11442e2aebe0c642c881f6f8e57147716a4b47febdf,2024-05-24T01:15:30.977000 CVE-2024-36013,0,0,f0047bb10d2dce87d69aa970cfdfb12b997d410e2099a5ede8802f23ddaee47e,2024-06-10T17:16:32.087000 -CVE-2024-36014,0,0,61bab2a519e30ae7390986c51650c2083b70cfe1173f781dca05855531ab147d,2024-06-16T13:15:52.430000 -CVE-2024-36015,0,0,69c5cc02a1d218bc0bd9efda30191b11a8233735c056517402f9999a26e1feef,2024-06-16T13:15:52.533000 -CVE-2024-36016,0,0,4cba6e6a75f627dee0859835e4746e030cdfcba67d3294485222008ad5f511d8,2024-06-16T13:15:52.623000 -CVE-2024-36017,0,0,06b3fa4d5fc5124fbcb85f162223c7c3aac5c8e863443f7f4e826cb80c4f6854,2024-05-30T13:40:12.593000 +CVE-2024-36014,0,1,a3851da580406b2ea6442c183f0c259cc8e9f25ba8dbe6888379a9fe1c186353,2024-06-27T13:15:59.797000 +CVE-2024-36015,0,1,aace83336e9fe64463ed22489fcdadce07e3980d46687da2ead1183b8881d75c,2024-06-27T12:15:27.443000 +CVE-2024-36016,0,1,4196dec4e1b79d5a81d6f2ae199617b7e91ed786acfbaad6490015ecc39d50d5,2024-06-27T12:15:27.533000 +CVE-2024-36017,0,1,2747c7fd268a927fdab975e8c64b200424a71003ca64209cfb9ab1e9623f2393,2024-06-27T12:15:27.647000 CVE-2024-36018,0,0,3a8206a02c5adfc67a2a516b8b16f0711b57e1035b88218c63b323725b6cdf46,2024-05-30T18:19:11.743000 CVE-2024-36019,0,0,cbde2a6e185dae769cb5f8294d3446f38fd341f16f132fc23455025199fad60c,2024-05-30T18:19:11.743000 CVE-2024-3602,0,0,94acaf9dc68464912ead419350d2fd489a81a9c3c12dd5ae8393cf11facf309c,2024-06-20T12:43:25.663000 -CVE-2024-36020,0,0,9e635601cd9801d7b096570807f353c69c06a30b9aa388b13b7dce9ef4647b73,2024-06-25T23:15:31.923000 +CVE-2024-36020,0,1,5d2be721669cba0d24268aa469f8ff1e3ff773fc05792eade9301d0276787371,2024-06-27T12:15:27.717000 CVE-2024-36021,0,0,94f9365ed1db16f5cf54c6394739d97158e9ef58d8893123ecd517ca9b226174,2024-05-30T18:19:11.743000 CVE-2024-36022,0,0,20f730e70cbf9f258d0a4f7215eac5cd45435a01501c51da7968f945b5992211,2024-05-30T18:19:11.743000 CVE-2024-36023,0,0,5757aa230ee81bd81ce0332e1630db264d6734f6832d2e28b74d5d4c41bf2dc4,2024-06-10T19:21:58.157000 @@ -252724,9 +252725,9 @@ CVE-2024-36277,0,0,20d47326e280adb94d9059aa48d208d3f478f327ce890b8688aef81aa91e0 CVE-2024-36279,0,0,3325b8af913fac0d163d5be9a8802e9f76dc63912c8cffea0ae3040270976e9f,2024-06-17T12:42:04.623000 CVE-2024-3628,0,0,ad2a38a3d431944b5239dd67ace3bcd2603e3057c8d0a04d847db45516b0c9ea,2024-05-07T13:39:32.710000 CVE-2024-36281,0,0,479133ce06ac02edc62536071e8e7fed1efaa94d8e73a60aac6af353af480add,2024-06-21T11:22:01.687000 -CVE-2024-36286,0,0,ab9453fc7dccdd4845963ee510cadff6584d6dce7dd9a1751ca466f92e53e4a8,2024-06-21T11:22:01.687000 +CVE-2024-36286,0,1,c1f5baa24f55be1a5b224e41ed82b843041c1e11e92f844787bb0cf3b2b93308,2024-06-27T12:15:27.810000 CVE-2024-36287,0,0,e3d04d973f90b2170d68fde9a36c28c9c5e8a06631e57b0e5a27e5d94e0933ef,2024-06-17T12:42:04.623000 -CVE-2024-36288,0,0,828df8246a0f9031609a370a7b114a7c310a990762d597880430fc88ecc8fb92,2024-06-24T18:39:00.683000 +CVE-2024-36288,0,1,36d226ed1d21153f2b2ee3140ae73adbbee59f4715a40fb075ea6ee38c2ddcf8,2024-06-27T13:15:59.863000 CVE-2024-36289,0,0,dc1cbda549dffc5af4283892adb2dec0a95ed6a19c3c066db9d79fac2619eca1,2024-06-17T12:42:04.623000 CVE-2024-3629,0,0,ed67d1a2dc82a6f7d8e47e5534a14b4493dd33c5e11e4c564b2ef763c111a4ba,2024-05-15T16:40:19.330000 CVE-2024-3630,0,0,1b4d82e848787accdc20ad3d430430e1a1fa399ad678a3e5fbc87f1ba9867411,2024-05-15T16:40:19.330000 @@ -252934,7 +252935,7 @@ CVE-2024-3682,0,0,a140f5eb71acf183c1e80e0d2f5a14a5c7d8a92c7cf9dd3ea5250a20e3cb49 CVE-2024-36821,0,0,592e31c2ea7119b4c103b5ca67eefeb91773768141e1fc0daf62c86176d3afa7,2024-06-17T21:15:50.960000 CVE-2024-36823,0,0,aad699347c3b05ee3cd9abd97cd2dd91acd777507ac0def145495f15e3829674,2024-06-07T14:56:05.647000 CVE-2024-36827,0,0,122a045e95fe548424707b69a5d81cb1d2970259814d1c03f8e1b4b2c344d0e6,2024-06-07T19:24:09.243000 -CVE-2024-36829,0,0,57f7d9454fc2cc80a79f8a0648afba0300753f5c887ae9d72816dcc23a4766dc,2024-06-26T21:15:13.387000 +CVE-2024-36829,0,1,6eb0783f0584e9de50671adccbe8e7f0a1dc803b2458c66ec80ede8dad219d91,2024-06-27T12:47:19.847000 CVE-2024-36837,0,0,9837561b3eb4109cddbfeb72c7253bf6ec01f4922f80106622bd91fb8fbae4e9,2024-06-18T18:54:51.380000 CVE-2024-3684,0,0,e7edf7d6bce31b480b46d692afd4304c988268ba4618e87da8566dc118f2be92,2024-04-19T16:19:49.043000 CVE-2024-36840,0,0,4a6f09cefc62787a0fbedba2a44163b90d3503531e692316cb82598d8c83950c,2024-06-13T18:36:09.010000 @@ -252951,10 +252952,10 @@ CVE-2024-3688,0,0,b349be233f486be05eb488359e63176b80bab656f49706a0c8941ace2d96ea CVE-2024-36880,0,0,93b5997ff6bfcd6d106900fc8d6e48fba13c9fef4325f8de3c9234bb3f387308,2024-05-30T18:18:58.870000 CVE-2024-36881,0,0,d9933c8a777a627eb58d083da8a71cb328e66e73a48574877b27b958ab9622d8,2024-05-30T18:18:58.870000 CVE-2024-36882,0,0,6ac152d75b84c2df3f3d5795df4f9937e63b77f454cdcd851f35ef8e7b4a566a,2024-05-30T18:18:58.870000 -CVE-2024-36883,0,0,cc105815ed404af1d13fefca9e9d1b5ab43cd99f8dd92373568e73ae97c96cbe,2024-05-30T18:18:58.870000 +CVE-2024-36883,0,1,74c69c8edfb7ce26fc4d792167b7422268bb6708e4986009bd2bce645d02a637,2024-06-27T13:15:59.953000 CVE-2024-36884,0,0,cd36e9089cef290772209fcc4df998d16f55fbee0331c66875243c4b6218afff,2024-06-10T19:21:50.973000 CVE-2024-36885,0,0,04a352a08671e0d2d2658418cf7959b38ab0d79bf07127e7b7f7d2f1f5403f6f,2024-05-30T18:18:58.870000 -CVE-2024-36886,0,0,bbb6863694d6107b45afd29826aec9820fdc7c246b172605cb84926d3f1e1720,2024-05-30T18:18:58.870000 +CVE-2024-36886,0,1,5a40fc88d1f6576eb6a5044df2af1128e924d37b0fd8cfc1da2223157469765b,2024-06-27T12:15:27.880000 CVE-2024-36887,0,0,e6b7bfce672ceab96bb4af4b461eb80a380219490bb80688e6ea00d355066637,2024-05-30T18:18:58.870000 CVE-2024-36888,0,0,7d59857fd4e612a1991dd7c2d50d12b68bc72215fe0a786d2772936b46a86027,2024-05-30T18:18:58.870000 CVE-2024-36889,0,0,a3f41ba1ef54db84bd477acba2c45d0d655aef1e332c4f19b03501229fdc8707,2024-05-30T18:18:58.870000 @@ -252972,10 +252973,10 @@ CVE-2024-36899,0,0,aed6d669cad39777ad8d3f5ad5640da5cbc0de9fc5ebd87f7efca7905cd39 CVE-2024-3690,0,0,b4159f29e38837f138a04af86574673cb07d36e78588902798316a6803061f4f,2024-06-04T19:20:23.213000 CVE-2024-36900,0,0,8f9ce01f088bfd72ce72171201cf8b100cd41a20cb8a35673965f8ca0eff6843,2024-05-30T18:18:58.870000 CVE-2024-36901,0,0,85c092d93b837b14e5d35f604c3d2ca54f771ae885f4840c0490338e54dc0743,2024-06-10T19:21:15.517000 -CVE-2024-36902,0,0,9d1d96d2b33f8ed9cd502a1d8191c9526185a9c71bc11c1ed27c33bf2fa72953,2024-06-10T19:21:09.643000 +CVE-2024-36902,0,1,d2e7e7016977b3968896869d7e60d8ec3e6486e44b47b542fbf90029db69923f,2024-06-27T12:15:27.953000 CVE-2024-36903,0,0,c0bd9fae019dd75bd7cd109c0e7d1761df45f34c7182adf032cf81acf2921b9f,2024-05-30T18:18:58.870000 -CVE-2024-36904,0,0,66d8c87964fdd9b47ecdf787ac4a89f545de4107e52483fbd3edf9c3e24ec513,2024-05-30T18:18:58.870000 -CVE-2024-36905,0,0,15b8966f6baad8b2fe7956af22c6740eec19d86cbfcd46a9084c9a986cea1dd5,2024-05-30T18:18:58.870000 +CVE-2024-36904,0,1,06dc15ffda165116aeab59c67fdffb5dbda0b458dae14e14a6bdf796c4dbf9f6,2024-06-27T13:16:00.043000 +CVE-2024-36905,0,1,09887ba1d11cb4b2168a3107b7b9fb6f5ff1a5dcb8b6d84749395c87acc5304a,2024-06-27T13:16:00.133000 CVE-2024-36906,0,0,4a6f108012e4ea73c41f1aeb0e2c2a94d603ad421f99c24445dd1441f8a3e03f,2024-05-30T18:18:58.870000 CVE-2024-36907,0,0,19d37de24694e5b570ccefe348d369ee5239e9fda6fc2672c006b7669b49c668,2024-05-30T18:18:58.870000 CVE-2024-36908,0,0,5c7088253b542145b67ada77e543285e91c02f2d851260f875a687c93ebfb6ad,2024-05-30T18:18:58.870000 @@ -252990,7 +252991,7 @@ CVE-2024-36915,0,0,494ea3162f161ea96be446677722e626ce3842e9447f9c8787f0bc354c9a9 CVE-2024-36916,0,0,ea564557469d293fa059e6acfff93f5c6a0294aae9889bc208b452012fdc5df6,2024-05-30T18:18:58.870000 CVE-2024-36917,0,0,ecdfb582f1e0f726fa96d9ea1af4778ce70e10d7622d9f755001a70df23fac25,2024-05-30T18:18:58.870000 CVE-2024-36918,0,0,dfef5e2befca005cd4a2dc3a45d29607f28146b97b060e709d4c8cf080788d58,2024-05-30T18:18:58.870000 -CVE-2024-36919,0,0,23edfeb9fc20a6b823a295bf18035f0bd83ad1c060cf9480af65732c6a2ab1ed,2024-05-30T18:18:58.870000 +CVE-2024-36919,0,1,8585c4e799ee3840089b98156c258c713b789c5fc1b43c0d56a935acac03ee09,2024-06-27T12:15:28.107000 CVE-2024-3692,0,0,0265b209870bcf9c69aec4dd7d6f6acead3decbd2c7fe0897272b8b4c393499f,2024-05-03T12:48:41.067000 CVE-2024-36920,0,0,562118a4a1c5dabf06c189b1b49f8c8ed861aac24333f98990807a379856bfc1,2024-05-30T18:18:58.870000 CVE-2024-36921,0,0,d079cefde2daa73775d41e3627cd198bf9ff2ba5894e07fcd2cf577094fbab29,2024-05-30T18:18:58.870000 @@ -253005,40 +253006,40 @@ CVE-2024-36929,0,0,9eb38c7573fc9e4d3bdc200b48118f14a9538c48995653b0e85b46652ce52 CVE-2024-36930,0,0,77e15b8a26ea417804e32d012b2ff072739a2d5b8de9ec0c27c143869c28fecf,2024-06-10T19:20:48.797000 CVE-2024-36931,0,0,90ebd0be4dc9bdde377e30606d82571de67aa8e4ec765c3330b43d8adbb386c6,2024-05-30T18:18:58.870000 CVE-2024-36932,0,0,7168231925e44ec3384408ba0b60036fc47a805adc348bb0bd36944f638d61f8,2024-06-10T19:20:40.977000 -CVE-2024-36933,0,0,ae68f964a0b96a074ffee9a5d71d8c911deb2260662a608ffcfb0590ca938c26,2024-05-30T18:18:58.870000 -CVE-2024-36934,0,0,f827aef115358d56e85c5cc169752629dbafb009c8349930267581f3e2263698,2024-05-30T18:18:58.870000 +CVE-2024-36933,0,1,6dd3fbe6f2aaf148ae73869d9f669c734ff0e72147c59a444070883a9c5282bc,2024-06-27T12:15:28.180000 +CVE-2024-36934,0,1,bbaf41b7e654bc9c67ff85ad586c826426abcd2418b2381e446985f1da58ef0b,2024-06-27T13:16:00.213000 CVE-2024-36935,0,0,fca080e92321bb44b592745faf035cde8153a9d35a0f561153eea46f3f53467d,2024-05-30T18:18:58.870000 CVE-2024-36936,0,0,0e824a7cc7e310891214f6a1cd51f88333cfdc6296adcdae04ab4629b3dd74cf,2024-05-30T18:18:58.870000 CVE-2024-36937,0,0,3446b14981965a5012669919bd33b447461dd6c7495cde777aef90727badf861,2024-05-30T18:18:58.870000 CVE-2024-36938,0,0,348a2e70b0b66265f69652cad3ffa80b765683a37fb3673805cf185f6c89b2f3,2024-06-10T19:20:30.517000 CVE-2024-36939,0,0,b2e407a0884ab3128baa40584aeadaa0cf9f578f6e0da68c312c229f57420b27,2024-05-30T18:18:58.870000 -CVE-2024-36940,0,0,c4c7094c23900aebaeb2602a070d88dc8930189a574a1abe5f024158655d303b,2024-05-30T18:18:58.870000 -CVE-2024-36941,0,0,d869029390cbace24d5771d9de75331e583967cbc4189d7d98293cf9448efb1a,2024-05-30T18:18:58.870000 +CVE-2024-36940,0,1,d0e52bc222dd9cbec74b6c8b8b690c764424acbb938c94f17a9fdc1f15ab6806,2024-06-27T12:15:28.243000 +CVE-2024-36941,0,1,32dc5cdd1f48602848f8402a797b862e2caa733e163d4033c2e590fb7ef7c1e4,2024-06-27T13:16:00.280000 CVE-2024-36942,0,0,9cd59c40eab3b43814b5cf415342151d1e131ef3ed016775d4a12e6e1de84c9d,2024-05-30T18:18:58.870000 CVE-2024-36943,0,0,70bd3bafa0eebebeb7964463bb0480fdd71af0e009173135e435dc6cd1e43063,2024-05-30T18:18:58.870000 CVE-2024-36944,0,0,44f610c295e3ad13093385caaf1ab882e901e31fafe6628ff800671d28664ddb,2024-05-30T18:18:58.870000 CVE-2024-36945,0,0,210e5451d4107ed8eaff3e1463ab4bd15b96db04edbdd5e631e8cbf2855f8737,2024-05-30T18:18:58.870000 -CVE-2024-36946,0,0,c70348e6ffe990ab499ff61786bec56f050c2a3b9abea43659fe90048187bc81,2024-05-30T18:18:58.870000 +CVE-2024-36946,0,1,b4186285e146c669ff321b14d96a1fd56faea27bc879807a13ae66ec76c0358b,2024-06-27T13:16:00.343000 CVE-2024-36947,0,0,18ca2ea0357950d69f6e09797022ec1131475be0cf653da7170eeae150654f59,2024-05-30T18:18:58.870000 CVE-2024-36948,0,0,31cadc128270de68c9f851bb0a11ff317caeee90a1796d784c8d3e23b317398b,2024-05-30T18:18:58.870000 CVE-2024-36949,0,0,91430d7777d7d119019ddd2e7ae7b19128d5217861a0e2af4b238b6781804c5f,2024-05-30T18:18:58.870000 CVE-2024-3695,0,0,5b3d5c1ae4474db341edeacfee9e061ead071c2225de3890206e5278ac7974c6,2024-05-17T02:40:04.520000 -CVE-2024-36950,0,0,e0378b568a93dc5bb70ff1320530b380d9451af44381d0f5fe057f95be7cc032,2024-05-30T18:18:58.870000 +CVE-2024-36950,0,1,d4b6472516acd4860f8bf95ed4b3671e75b941fe1776fea1db9216baea844570,2024-06-27T13:16:00.427000 CVE-2024-36951,0,0,0c6ceea3423c1ce708b5d7427a8d4f211513446bf033c1a27f2c7ab6d1eaea62,2024-05-30T18:18:58.870000 CVE-2024-36952,0,0,837c928f0e88d0f128cc83fed5055987dd7ee03c54f8f5e8068e0c970b37f822,2024-05-30T18:18:58.870000 CVE-2024-36953,0,0,a9fc7343e5147689b6895eea931ae9cea67c96b79e53f688b3d4f97c7c461171,2024-05-30T18:18:58.870000 -CVE-2024-36954,0,0,7b81e7e3a6bb54b12004109fb68e6c908fc8692258b44101fe9cc3caea83a53f,2024-05-30T18:18:58.870000 +CVE-2024-36954,0,1,5f5249850856264a518b4e8efe6ed150dec538bbffff4efb5a9b8ea2db07422d,2024-06-27T12:15:28.340000 CVE-2024-36955,0,0,7987af910197d6959e63178604586394186f14a00b256d58872655a822f8fdd3,2024-05-30T18:18:58.870000 CVE-2024-36956,0,0,48ce9d3602153cee67ef3c807b8328c8128860792c92ba24ee1797ac8cebd024,2024-05-30T18:18:58.870000 CVE-2024-36957,0,0,14a25382151b1945f300cd0f690fdd6ed21995daebf481bf33bcbc3cfcf88a39,2024-05-30T18:18:58.870000 CVE-2024-36958,0,0,27ba702862686ffcbfc7435dcc4011c841c4be08d6d6bff774be51941829ca30,2024-05-30T18:18:58.870000 -CVE-2024-36959,0,0,d6bbacbe3376b8ea605862991764d4131cc35403035f548e6498def7a4bbd69c,2024-05-30T18:18:58.870000 +CVE-2024-36959,0,1,44815a619a2eeb06696917c2c00a92c6e635d832ccbe5ae6acf1e891392d75b3,2024-06-27T13:16:00.510000 CVE-2024-3696,0,0,54c8c42492f1c31e1d0d081b12ae9fb101d447905039b557dcc4372130239b90,2024-05-17T02:40:04.613000 -CVE-2024-36960,0,0,d71fb0dfe96a55b30dc290e36a70027346636bbd3e355f93054acb7154da0c92,2024-06-03T14:46:24.250000 +CVE-2024-36960,0,1,2bdeb202d1dbccb3e80fc8a468c2cc306cbfd2c51a90ed129b8ef533c44bbda4,2024-06-27T12:15:28.407000 CVE-2024-36961,0,0,23b0844a9529f3ecfd6285bf875a287ce67af9417a3eb4ff1001834e83635e53,2024-06-03T14:46:24.250000 CVE-2024-36962,0,0,5fce798c0bb35579e13c17bb9f54632747360d5004ae06492f537a1e1919292d,2024-06-03T14:46:24.250000 CVE-2024-36963,0,0,603c4aee8277db74a501815fd4789e2662e4b99b616454a415c4c767068ca598,2024-06-03T14:46:24.250000 -CVE-2024-36964,0,0,1e5a2c376d4fab926c22a070cc2c21ccc7f01422382c5ba38368e087bbce6bb0,2024-06-03T14:46:24.250000 +CVE-2024-36964,0,1,918c759bd3526b1086dec830f716aead200dc846665b8a8a1e1b89c5160bf1cf,2024-06-27T12:15:28.493000 CVE-2024-36965,0,0,10aa99fe4910d81e1d5bf42d5b2740114ce27ade956db9d06375468fbbf00d55,2024-06-10T02:52:08.267000 CVE-2024-36966,0,0,1735e82187212b5ddc4540c7da6a3262e1f4441e2704a55d85f68f33a676c361,2024-06-10T02:52:08.267000 CVE-2024-36967,0,0,e157470872eaea0a9600e0574f4eba9b9867cfac75928e1b6f4de5cece20dd56,2024-06-10T02:52:08.267000 @@ -253046,7 +253047,7 @@ CVE-2024-36968,0,0,f0f21aa6f4ea767dfafdd294c58686690201a864544403fb09f4a16273582 CVE-2024-36969,0,0,eafd7633c7400da81e33cfcbe9d23e638a72017a27f91eb9f3474fd90ada6a97,2024-06-10T02:52:08.267000 CVE-2024-3697,0,0,600d9314ffac8217c56b5ddb9a6dd8f383edc3a52ae15aefe26cd04d9d92b65a,2024-06-04T19:20:23.323000 CVE-2024-36970,0,0,7821872f33932cd23581e3f08933e1120512f95b8bffb9a221042f6e182c4c03,2024-06-10T02:52:08.267000 -CVE-2024-36971,0,0,7baf68ba8d6177e5c800107eb44bfd99f2323f2978ed8bf3a29a9bc948d8cb2e,2024-06-16T13:15:52.820000 +CVE-2024-36971,0,1,9283ec99226c893c0491ae4cd8a1a532104544816c180d7de15bc948a019a659,2024-06-27T12:15:28.553000 CVE-2024-36972,0,0,c8949e99c51cdd06e16d761976785fb3e8ba887f5070dbd12308139f2998e944,2024-06-16T13:15:52.947000 CVE-2024-36973,0,0,4ec4f1f7d5bf85141dbd06b8e7324cbd18de7d65efdb460540f386b5ac0ec3d0,2024-06-21T14:15:12.250000 CVE-2024-36974,0,0,52ef4cebb513bd6d0914cb592dbdf3bcb0b6feb9edc1daefcd29b34c26ab0f73,2024-06-21T14:15:12.330000 @@ -253167,8 +253168,8 @@ CVE-2024-37230,0,0,c056784fe1461835022ae4387a349a1e9e9676537a6bd83c972fd23b96229 CVE-2024-37231,0,0,2975c060fd817766775d3e3ec5265250dfcb406eb3856b3f2d8635478d7fc4db,2024-06-24T19:26:47.037000 CVE-2024-37233,0,0,dcdb23af544a8046a4ecb68f34b48a3a15207d5a73bdc6182df1b28a0bb5e19c,2024-06-24T19:26:47.037000 CVE-2024-3724,0,0,a2f08bb0a2e36a5c374b862fb3e4beff315b3d6672953c5eeabe10290b435e2c,2024-05-02T18:00:37.360000 -CVE-2024-37247,0,0,39799302f14a72cae7273eb39cf8a4da93a251d9d3251b7915227c3a8addfb7c,2024-06-26T22:15:10 -CVE-2024-37248,0,0,a514882bf58b655d6f3adffbf4a2946682aefbe8602430af2556e89235c968c3,2024-06-26T22:15:10.223000 +CVE-2024-37247,0,1,038744b78f2f2634865ad1661e2c97961d5a301727139375431f6d0656bf9981,2024-06-27T12:47:19.847000 +CVE-2024-37248,0,1,99c2cd4652890a37e2628f89e3ffdbcb4a9642bb6a6f401aec3aa06f83017ab1,2024-06-27T12:47:19.847000 CVE-2024-3725,0,0,dd194c190207038aca40dcc17eaac7bd7c6f9f34e04d00c016e0de6cd9837da0,2024-05-02T18:00:37.360000 CVE-2024-37252,0,0,faf33ef7b8f72660b3f71af61d55db3b928cbbfdda8d6a6c03b3fcf0d979da09,2024-06-26T12:44:29.693000 CVE-2024-3726,0,0,5d13f10d5b73efb7ab7c6448eee56ee5b7f1a739226807fb6eef2a4ab850d2f7,2024-05-30T13:15:41.297000 @@ -253215,9 +253216,9 @@ CVE-2024-3735,0,0,5ddf2e7f4a48d9adc915c53e5374d23792eebb62d6ec39c5c6eab645f0c5ac CVE-2024-37350,0,0,6f569f37031ea31b0ceea4b3d467eb77e14b3c8cee6ee77458cd2e0600338fd0,2024-06-21T11:22:01.687000 CVE-2024-37351,0,0,cdc3c0ef3ab09be219d92fdd9e1055808b1607ac62477549cb15639333a9968a,2024-06-21T11:22:01.687000 CVE-2024-37352,0,0,6443263682d93e12b4e835549dfa667a0a90916246faa316867370df7949047e,2024-06-21T11:22:01.687000 -CVE-2024-37353,0,0,3218e91db90d09d49e79b28603de0ae8faa69d3bdfc26cdc7998e6bbb477c22d,2024-06-21T11:22:01.687000 +CVE-2024-37353,0,1,e6f52a7a7027c04194c2427371bb2186ee89c5f7aa37cf34b91c891185fe38ce,2024-06-27T13:16:00.580000 CVE-2024-37354,0,0,608ee1378cfe9d7c58c071856c1e892d3428f43310e1f01035e1a9fe4c3b2cae,2024-06-25T18:50:42.040000 -CVE-2024-37356,0,0,b4435171622daced3e2b7e47c676acc1991dccc0bf8888cdf2ee310e8709075b,2024-06-21T11:22:01.687000 +CVE-2024-37356,0,1,94252885724322b6ee2853c68fc3047a798fb139795883a9a15edce39c0aa7fb,2024-06-27T12:15:28.643000 CVE-2024-3736,0,0,8212a13db4363d6279d1d8c19924659c1f0cf224cf46584ea7e82cad3d6da340,2024-06-04T19:20:23.987000 CVE-2024-37364,0,0,070f30cc4e6616b0f0ef3a023c4cee97eb2b6bdbb7bd742359fc5c6826335718,2024-06-07T14:56:05.647000 CVE-2024-37367,0,0,aac603db5bb919680e2cd819ce6cb6ca25ea592fb28f92a3759e9a2fd18ea95d,2024-06-17T12:42:04.623000 @@ -253255,7 +253256,7 @@ CVE-2024-37568,0,0,e54134c743ff1c9089094584276cdc79416cb675a0fc4a7177e49bc6dbf3b CVE-2024-37569,0,0,748406cd7b0e731a2b9037b16c6d1dde7e8c81aa1003e1ce6c82275ceb288683,2024-06-12T16:32:56.203000 CVE-2024-3757,0,0,62301a2775fcbfb9e8b5b1aa90b79aa074cd639699f2863765d338333af4b798,2024-05-07T13:39:32.710000 CVE-2024-37570,0,0,a374041c2622c9ba66d2048315fc9e015af6a8717cce4f8beb5b59800398626a,2024-06-12T16:32:34.513000 -CVE-2024-37571,0,0,40ce128b41b9e1b1159c87948720a9755b00a31509a7fa89c376c163b75d3a6d,2024-06-26T22:15:10.450000 +CVE-2024-37571,0,1,49d013a9c0dec0c40c039ac0b6cc010c02b60f0954bac18608dad027be12792e,2024-06-27T12:47:19.847000 CVE-2024-3758,0,0,3ea9ecbea279ca1eb1159e542db09b1cab2d2435be79c6a6a563dc4d73ca4285,2024-05-07T13:39:32.710000 CVE-2024-3759,0,0,20211226ea875c33805e71e9c0afa18c7ce1ad112702c8859afd48ee84347f62,2024-05-07T13:39:32.710000 CVE-2024-3761,0,0,c0af44e486388b5bef077e784125f415f33c54c3c3a8677d0ab80af1f3e8df6c,2024-05-20T13:00:04.957000 @@ -253313,7 +253314,7 @@ CVE-2024-3770,0,0,8954a3ad0db5fc9b48d9243a1de01e444d03084d0f8b5d5da9ebc562e8f0e6 CVE-2024-3771,0,0,1bf22922ed0657906343b6368a2362d22a78a1ff9d5272db064e582b3b0855d4,2024-05-17T02:40:07.477000 CVE-2024-3772,0,0,184d29c2faf230c27e7c42ad45c478e7862cbffdde795ec4220824e36861b510,2024-04-26T02:15:06.983000 CVE-2024-37732,0,0,c4e29c0f7175fe60ae396c5841d69538b22a36865a0b8a792362db7866454fcc,2024-06-26T17:49:36.837000 -CVE-2024-37734,0,0,14e40f6b7a0c3e90f8f320e0513e6c1e49b4c97e16cc04e3b13842f04dbbb369,2024-06-26T22:15:10.533000 +CVE-2024-37734,0,1,29ef61325a2a410f1ce167e31ddaa14dcadbade171729df78357519fd43864bd,2024-06-27T12:47:19.847000 CVE-2024-3774,0,0,430454733381ff5a96eb00158d8d932d4c087496720223836bce2968611b5152,2024-04-15T13:15:31.997000 CVE-2024-37742,0,0,82d0f7bd796b50c91f2398edb7b6a7a5b24c344e32d17491fc5d315bfb23b371,2024-06-26T20:15:15.917000 CVE-2024-3775,0,0,a79253f4f0c7633f40fa5e33903553d0137ff03b4a2d8425a028bb5ddf1c6b0a,2024-04-15T13:15:31.997000 @@ -253406,8 +253407,8 @@ CVE-2024-3822,0,0,fc2c97d17f172eec9f94cdc5060f4aab438cbcb9ae5ff2766add603f099f29 CVE-2024-3823,0,0,cd28ea160a68276fdd70271b0ec926d19fdc3598e922bafa9bf05d9fdd41ea0b,2024-05-15T16:40:19.330000 CVE-2024-3824,0,0,8545575d3e734e1433cd4d7c91c77cd29907e6f5ee87d4739239efdf13c20f26,2024-05-15T16:40:19.330000 CVE-2024-3825,0,0,f398f78dcc905612b8b1fff020bcc62d405b80ffdf3a9053d9f90f163c40baa7,2024-04-17T15:31:50.160000 -CVE-2024-38271,0,0,561e887a3abd1d6a0f8f42436d2bac2bdd24c0bd990f8adeea2333457a288cbf,2024-06-26T16:15:11.560000 -CVE-2024-38272,0,0,b79630b366ceb2532114bf5d54bebf0a6a561c63d2c22e0232bf10b528609045,2024-06-26T16:15:11.733000 +CVE-2024-38271,0,1,8e2b25e7088c2e4efa2d97ea33a18261f508acceb96bd53692012b5e2b16a935,2024-06-27T12:47:19.847000 +CVE-2024-38272,0,1,2795ed77f29b68791fe21d161abb3166a24d42cf0b3bc8a5427ac6bfbbc1e33b,2024-06-27T12:47:19.847000 CVE-2024-38273,0,0,aa930ae8c440a2647a011bf0695d4747b271b56264e48ff4863a5149d1b66b6e,2024-06-27T03:15:50.130000 CVE-2024-38274,0,0,695f4776bc9da0b749f4bd4e8e8830e4a621add514e667c392deb2445ea25c90,2024-06-27T03:15:50.233000 CVE-2024-38275,0,0,474fed95f690c9f90f55ff4b7ea783e35914740c4a353e11aabbb10d602de3d4,2024-06-20T12:44:01.637000 @@ -253448,10 +253449,10 @@ CVE-2024-38364,0,0,af41b56a7f2f7758c06f324097079d559fb0340d3186315d52e465f177fe0 CVE-2024-38369,0,0,fdff0768878da5d618998a51bbfecfa3dac560d76fa8e5e20682482a3b336371,2024-06-26T14:47:05.077000 CVE-2024-3837,0,0,5046b04f6fff161407832d91f839d6c01f3dcf30bcf75f620bfd7221b5de1c27,2024-05-03T03:16:29.010000 CVE-2024-38373,0,0,44bd01362bd05dfdecb2d241c2e4e4fe52c2264760c405bf6f3f48fb0d969aff,2024-06-26T15:02:05.100000 -CVE-2024-38375,0,0,d03b42c91131c1557b973d76209476fb529009ab848fbe68138b984b4edd0b3d,2024-06-26T19:15:13.677000 +CVE-2024-38375,0,1,ded65bab8580f207fa6313539998812618b08a20bbdd5d51ce7200bdf863d856,2024-06-27T12:47:19.847000 CVE-2024-38379,0,0,d0af2d7e81a6285c1c7099c958a4a50ce3d2f639bd068091599f2b1327853e0b,2024-06-24T12:57:36.513000 CVE-2024-3838,0,0,bd55ca068ebe4472845bce1f3d037932d27279da54b129864c942318cbf6c399,2024-04-23T18:15:15.410000 -CVE-2024-38381,0,0,57bad93cce191bbc955387dd0e3d9e6db94203bba2cb2542c0250ea811d81445,2024-06-21T11:22:01.687000 +CVE-2024-38381,0,1,c504d6ca70d74e43829158cac72275566ce3ec5e038bde15a54a40b986799f55,2024-06-27T13:16:00.650000 CVE-2024-38384,0,0,706997b8bd74b4e945fb4ea92c7b860b5f40f54233d054279ff0854095c4eca9,2024-06-24T19:26:47.037000 CVE-2024-38385,0,0,6ede95b10b5fd3bf97325d6d6e002e23e38a0e008a909e36d40ae711b1be808f,2024-06-25T18:50:42.040000 CVE-2024-38388,0,0,7c0bb01f9b9fb79d83dbd6e2c27fd6e239bc8d3e90d248b1b279840e35bf7176,2024-06-21T11:22:01.687000 @@ -253497,11 +253498,12 @@ CVE-2024-38505,0,0,be5aaa1dcdfd8c2aa334d5f57235bcc4cc51742ebd9414669481e2364aff4 CVE-2024-38506,0,0,f0cad7be1bf66b2843860132c4a1c6f7d61e84c638e965683ddee0cfb22e3838,2024-06-20T12:44:01.637000 CVE-2024-38507,0,0,a0f746b2efdaa14b7b3a19b053b62c389c989bd3db7005a96c00e53930c09585,2024-06-20T12:44:01.637000 CVE-2024-3851,0,0,16bcb9f87255ebcf1aad2856af6894b1b0c36049b98621e173e693ad3a900330,2024-05-16T13:03:05.353000 +CVE-2024-38515,1,1,a4e93bf008d994404518fb6f8f4cb2097325f0beeca2a32bbb087976322bd094,2024-06-27T13:16:00.717000 CVE-2024-38516,0,0,1e8a930f3bd7a4d706b02f40cc5af32d0943db58e97c615d4b2fd82bf154a7f3,2024-06-26T12:44:29.693000 CVE-2024-3852,0,0,3038e46972183e994310b2b410f139aaace8bd74e7e7e979d336a57b5feba459,2024-04-22T10:15:07.430000 -CVE-2024-38520,0,0,21561a059fa82a89b9e8a5c4e79cc372d0b5efa37491a7a59e1a0f7eb3efb02a,2024-06-26T19:15:13.890000 +CVE-2024-38520,0,1,41960473f376d2053670358f1b74b11612e5d6f0cfeae75c4ae0b80f5904ac0a,2024-06-27T12:47:19.847000 CVE-2024-38526,0,0,e120e388df8ce9f77a5f20e08030a40910a306bc162600677388d663f60ddcef,2024-06-26T12:44:29.693000 -CVE-2024-38527,0,0,8c6e400972f4a3906f5ee4e8ca794e714145d3896677f2a284b171b6599ff439,2024-06-26T20:15:16.020000 +CVE-2024-38527,0,1,9d30e9caf22ebe74cba027d0e20fbdb3b1d3bd82d6438824209935ed0cb0babb,2024-06-27T12:47:19.847000 CVE-2024-3853,0,0,da9bcb4a065926b49732a0dd79b2f07a12fd9777c9341906bc363e07df8725cf,2024-04-17T12:48:31.863000 CVE-2024-38538,0,0,fd8d0c414421b9d83404be9e58919f8d1c04c080d100c149e46c3a374cade8e2,2024-06-20T12:44:01.637000 CVE-2024-38539,0,0,bb07b10cb8e27f63a4ad4d8d9f4efc546da28e9a77992ff13895f8e8066ae4a7,2024-06-20T12:44:01.637000 @@ -253515,27 +253517,27 @@ CVE-2024-38545,0,0,e19534fd73a94af20a1fb344dbf36ffdeca4febea6b2756e17c399f613e5b CVE-2024-38546,0,0,06ab8e5395b6ea64dcfc3d0291c1a4cede82de3c6adf9a35f972579209480dff,2024-06-20T12:44:01.637000 CVE-2024-38547,0,0,6d094da35ceeec072de822b532aacf8e22808edceb46187f6ef18b7c87947a6c,2024-06-20T12:44:01.637000 CVE-2024-38548,0,0,226b2ec59cd0e8bc5ac9ab89d5a58dbce46f44f8de3bdb71de5c8cff8c4bd0b1,2024-06-20T12:44:01.637000 -CVE-2024-38549,0,0,bf11d8cbded1b174766f461f785ead27d74681fc4984905e8cbcc5a5dcfd77f9,2024-06-20T12:44:01.637000 +CVE-2024-38549,0,1,e3ac7fb55108dcee3c5f6a63655f34c149b9d0e44d20a19747f931d2341da19b,2024-06-27T13:16:00.840000 CVE-2024-3855,0,0,72f9965b46480d1ef50ed2a1799389235938182cc86dc8ecd73fd2cc29210cf3,2024-04-17T12:48:31.863000 CVE-2024-38550,0,0,12c1f7faf6d391bda45153650ece532f5927f00b8db4353fe4f9877957dc88b7,2024-06-20T12:44:01.637000 CVE-2024-38551,0,0,994bdc4b2bbd91b836307a9355447db2c53145ee9caa85e9ac226f8e6e77bac5,2024-06-20T12:44:01.637000 -CVE-2024-38552,0,0,01c171b993c98ea9691fcb9c0132239a0403ae52a92e72087b20089fe28a56aa,2024-06-20T12:44:01.637000 +CVE-2024-38552,0,1,919f2f11cb187e73d3fc69192846a885a7b56a8cd58353da92e0ee2036de4ee4,2024-06-27T13:16:00.903000 CVE-2024-38553,0,0,286ac07f37ead0233ff53087fe6bb725f02540170c59cfcee7e11483334cd294,2024-06-20T12:44:01.637000 CVE-2024-38554,0,0,5e74e3d53ddd7d96294d8c3ac43d22e24d94eb7441250ec59441112cd0cf92b5,2024-06-20T12:44:01.637000 CVE-2024-38555,0,0,1325a5873db06d0a5896cedfaafadbba06050b8903042fceca1b4e19fed51c2a,2024-06-20T12:44:01.637000 CVE-2024-38556,0,0,e0e81ab8190bcbd6bb796b6590adf60b73006915d9ddc86cfd7468742ef0c269,2024-06-20T12:44:01.637000 CVE-2024-38557,0,0,5d307d93744b50df3585e73b748fbc1dea70a105ccbf6e4e87a827fc2aa9e43d,2024-06-20T12:44:01.637000 -CVE-2024-38558,0,0,d215af1f9dc6f1871afb6785a3eacc6cbeb466c2538fba6d795011157de1355b,2024-06-20T12:44:01.637000 -CVE-2024-38559,0,0,43590e9bb6ef9bc4a860e0dbb4ea57c00d36c2723dfdefcc54f8e589b22ece61,2024-06-20T12:44:01.637000 +CVE-2024-38558,0,1,c03140c7ddf105197222bca55a65e1112f55176bb2f978078883b8e07a8312a3,2024-06-27T12:15:28.720000 +CVE-2024-38559,0,1,1960b0144bb269e8535b5e383c5369ce0b8b961774f55831d07a5305b4fa7ea4,2024-06-27T13:16:00.980000 CVE-2024-3856,0,0,b4145bd7b493b073ad7b7090cd52428765d0c24799c3bf5af1fe7594a342c2dd,2024-04-17T12:48:31.863000 -CVE-2024-38560,0,0,dd3d7759ae511a11426b1402e0e3263d5bd5a72be09156ff201562649ec75b00,2024-06-20T12:44:01.637000 +CVE-2024-38560,0,1,ffa0a77bdfa50e9b751e50325e5bab64bfd86f9ad64ebc5ccec833b908401202,2024-06-27T13:16:01.047000 CVE-2024-38561,0,0,93a736f54ad24f57f3b35f5e4686025c04c00aee6e32e522a0d99bae472a5b47,2024-06-20T12:44:01.637000 CVE-2024-38562,0,0,95e049daa82ebc8bb7fd09103982cb4b2704355000dbaf388cb8a15eba1e5c55,2024-06-20T12:44:01.637000 CVE-2024-38563,0,0,be99db486d5a22c61fa099cfd73d538d2c8a8ad8c800fa69baa108ab15267146,2024-06-20T12:44:01.637000 CVE-2024-38564,0,0,f30b6e5454fdc56fe2ed5cf62ff8068acbd0868113a623cceeac8c222d27e863,2024-06-20T12:44:01.637000 -CVE-2024-38565,0,0,255aa3d89cd8844b96cc6af713f9899010a19ca82da38a82497b82b9f85c00c8,2024-06-20T12:44:01.637000 +CVE-2024-38565,0,1,1c2e8e87267d91227d9d7011f77252cab6364fd90e7391013aff028fe4b34723,2024-06-27T13:16:01.110000 CVE-2024-38566,0,0,cbf9595bc7c6a3a8392b2f29aa06e360a055ceee2b59f6b396c4b12b30d6a84f,2024-06-20T12:44:01.637000 -CVE-2024-38567,0,0,747343b02008a17ee1415397b21e5405c1c0a77c4613a0f8f2d08ea83aec2fc0,2024-06-20T12:44:01.637000 +CVE-2024-38567,0,1,82f9375ae9ed5a064924c0405e04c68f48a4fe90e6e8c8d0940547e9c7724e9c,2024-06-27T12:15:28.800000 CVE-2024-38568,0,0,ebc26ecb554f4a117e56a2b7595b19c2bb6870e5fe6ec7da1db88f1843088b19,2024-06-20T12:44:01.637000 CVE-2024-38569,0,0,43b2e24bb95b5b0c5ed869e83948d4db63ec0f5a8a8fbb28319ca0915c7949cf,2024-06-20T12:44:01.637000 CVE-2024-3857,0,0,759e3e6356edbe4b757e6defb2865ff9079af79daa39f4b5313863a09852808f,2024-04-22T10:15:07.520000 @@ -253547,19 +253549,19 @@ CVE-2024-38574,0,0,c9bbb608bc0fb4fd78471e471f67157db9c46f296b9cebdbf2a9eaa112c2b CVE-2024-38575,0,0,706823464dd777ddf38fceba51b63345567e0ce58208e92b648866b8c461ddcf,2024-06-20T12:44:01.637000 CVE-2024-38576,0,0,5f2c362a1b20fb6644f41270cb49cdc5fa151e9181a4765c6f2c4b80f8fd5ce5,2024-06-20T12:44:01.637000 CVE-2024-38577,0,0,aab783e562369ba736289de53b41b9b9e9e5bce44bf13dc1d8e2f816a558ee31,2024-06-20T12:44:01.637000 -CVE-2024-38578,0,0,59a6f376e54bbaf5df61ec2e73020ae35b8f027f6cff8284302abd972222ea0c,2024-06-20T12:44:01.637000 -CVE-2024-38579,0,0,19bad89d8508334ab376a57e76d0349363cf011713f6d20c00dcae216a9c77bb,2024-06-20T12:44:01.637000 +CVE-2024-38578,0,1,7742b7e21a29430038b4a81674047631844b743cb39852e4e7b480ae5a3f6410,2024-06-27T12:15:28.887000 +CVE-2024-38579,0,1,b02c681d92cc0f763400e2ca8a8494d6eeb3fc790e71740f7deb9d4a819281a9,2024-06-27T12:15:28.957000 CVE-2024-3858,0,0,7909cba96f3e3d206ccbb308cd394c2dd55ea5480740c25fa8316d0bc5650abe,2024-04-17T12:48:31.863000 CVE-2024-38580,0,0,38a9a9672fdcd3a26951ddb1fa5b0b6a344f0f6809bbcc0c9be0b904caf7e8c4,2024-06-20T12:44:01.637000 CVE-2024-38581,0,0,d26f4100a5534742e5b1c060f48168274a9f8ba7a3a144ed1f5a68fa7a64c8c5,2024-06-20T12:44:01.637000 -CVE-2024-38582,0,0,41e3d47345cfc6f7a622b4174be023717be773cc77952929809d13f2b3e76a1f,2024-06-20T12:44:01.637000 -CVE-2024-38583,0,0,b155bb53501a56a625151deea2027414759fdeb68090c9c88843bd07655e6b56,2024-06-20T12:44:01.637000 +CVE-2024-38582,0,1,28fd4a4ce34257074ce885817393d8ddf7a6eb67c651c1b7f5916d9d7ed20d7a,2024-06-27T13:16:01.187000 +CVE-2024-38583,0,1,3508dc4b1b655a6cae933b951ae31b20fb82367c7117c8f587c40f9ade85652f,2024-06-27T13:16:01.260000 CVE-2024-38584,0,0,a86dd4bec97afdd294218b4d2cb90c2a2236e3f932e80b46504435534c4b8163,2024-06-20T12:44:01.637000 CVE-2024-38585,0,0,88b0887377392aa1b176806491a5ec82610e5a3bcc11262f1287e63162efa57d,2024-06-20T12:44:01.637000 CVE-2024-38586,0,0,44e39521bc8b7aff0d13b8bdb8eb57c475e755967082646c98b31056f074bddb,2024-06-20T12:44:01.637000 -CVE-2024-38587,0,0,fa7838f440b65e8fdfadad72d3e22feb5c6758bd575bc3d58bbdf3179ae6b561,2024-06-20T12:44:01.637000 +CVE-2024-38587,0,1,d682466aa99d6e2a621eb512420c2d64a18d009cd294bb427fb88ff70d8c2606,2024-06-27T13:16:01.323000 CVE-2024-38588,0,0,63377d15d615a89cc502e82cc0b4d98dd3570175273284e854a555b603cb2164,2024-06-20T12:44:01.637000 -CVE-2024-38589,0,0,c22349a35c5125a3c03e12aeb5f0a5d0cb90d1ff19f30f4f1e992cb88ffb9b6c,2024-06-20T12:44:01.637000 +CVE-2024-38589,0,1,3347353e7e4386941ef006cdf96b7e25e5fabe67bf143b1463e3d66e69c4c032,2024-06-27T12:15:29.020000 CVE-2024-3859,0,0,3065404677b844c907170ea43348d98daf159eda29192d0f8b013c98cba7e7cc,2024-04-22T10:15:07.573000 CVE-2024-38590,0,0,1fde351792af11094df547ca6039c92dd4040f95fbccbb26deb2074af9ba3491,2024-06-20T12:44:01.637000 CVE-2024-38591,0,0,a87a6cf3381321fae2571d6b3d74f06358c9ae85b011ec7304b3632eb3677c62,2024-06-20T12:44:01.637000 @@ -253567,13 +253569,13 @@ CVE-2024-38592,0,0,05588f2b7ced16b85036b6966bff690fa7126b1bbbd3653d3eefb89b41f1a CVE-2024-38593,0,0,9043806a5b5221b7873fc93aa5bedce151ab1ba872266f0d9498a3ee99ad8924,2024-06-20T12:44:01.637000 CVE-2024-38594,0,0,263312fa01f21f81aca9ad0b7081ef21ebd3d6736f9b7e154b2f81c32355a546,2024-06-20T12:44:01.637000 CVE-2024-38595,0,0,167986f4e289cbbc06db285514230af9b31fe84bc5e2e51a3cbba38552a9a3ef,2024-06-20T12:44:01.637000 -CVE-2024-38596,0,0,381521411c5fe0069bf95df12d280703f758562ab779941c7fd27f311301c84e,2024-06-20T12:43:25.663000 +CVE-2024-38596,0,1,9b5ed88801805298eab4177b9dbb5421e21298cd7f4efdf1a665fa8e97c29b43,2024-06-27T12:15:29.087000 CVE-2024-38597,0,0,dfd9b26fbd1f75c8aa3c1f19bb92c71363166efbbd82c3534172982ab0e709ac,2024-06-20T12:43:25.663000 -CVE-2024-38598,0,0,b948e5e2a96e4f2604c682eaf6a27616c9418ca539855cded9c5008fe055cbdd,2024-06-20T12:43:25.663000 -CVE-2024-38599,0,0,ead42b07c723488112c8a76d939471fabc0315640eef143c2046fde4b2486f9d,2024-06-20T12:43:25.663000 +CVE-2024-38598,0,1,e33d4b334afae03f4f49db94d6b2156162f6069ee2ba1ed9dc7feddac509ac7c,2024-06-27T12:15:29.153000 +CVE-2024-38599,0,1,2badbaa557fc499be16794a0e1ca862c9e8c18d1866c0a0470b16a3826ecf2ac,2024-06-27T13:16:01.390000 CVE-2024-3860,0,0,c33e8c657cfe3956cd70903ab7912357e9142226690438c85322ce7b941ed7f2,2024-04-17T12:48:31.863000 CVE-2024-38600,0,0,c9563c70f22652ebe1de7c7cc7f742e6fb8edc19caa32f1a7a6fa2c104c44ef8,2024-06-20T12:43:25.663000 -CVE-2024-38601,0,0,add858065c300b4dd3e338dbd2f12e07861bf7260b29505ec31ca100061842f6,2024-06-20T12:43:25.663000 +CVE-2024-38601,0,1,23968da6af6998bb7ebf678dab971842ce3e3f950336b8c45fbb6e76fee5911b,2024-06-27T13:16:01.453000 CVE-2024-38602,0,0,9a80355cc21e33c080d1b076281ffae3e2e5deed03254094e225183d4901578c,2024-06-20T12:43:25.663000 CVE-2024-38603,0,0,2e6ffe264b8f7d29692c9fa8910cbe9efc4c6ac4cd0660382cf13ff5b0949cfe,2024-06-20T12:43:25.663000 CVE-2024-38604,0,0,2774a468bb1e28e6ecd0cb6e8825f2bc4f300c9700b1b90f2627bc020f94a4ce,2024-06-20T12:43:25.663000 @@ -253585,37 +253587,37 @@ CVE-2024-38609,0,0,db774524e58ca6f0eefca9518e6396633842bb781a3277855e12f8fbba63d CVE-2024-3861,0,0,891d68faecae715fa9ed74917dcc8c6b8466167516a2b34c2f3aaf1667ff2bc5,2024-04-22T10:15:07.620000 CVE-2024-38610,0,0,29353cc675ddf7fdfb11ab2c2ee9e633c6e3a71d49824683ceb2244130fd130b,2024-06-20T12:43:25.663000 CVE-2024-38611,0,0,da00074115add864f490a027525486c8284afa31e189c50727dcb4c7424e8f65,2024-06-20T12:43:25.663000 -CVE-2024-38612,0,0,0456de92f77917b035ee8e47490618b5f4703713a4e1020b4b29858b592b081c,2024-06-20T12:43:25.663000 +CVE-2024-38612,0,1,ade01bf742f84598e9a5d4761b111183ca353d53b9bd8cf32eca1b7e675481c4,2024-06-27T13:16:01.530000 CVE-2024-38613,0,0,693b4c2b59c67cd93392d22cc43d2f41b73124550e270fd775740e2c797f5616,2024-06-20T12:43:25.663000 CVE-2024-38614,0,0,cf11629b661e0fdd3caf78fc8ad16f9623893b32e3f007f9cb07ed9675a254cf,2024-06-20T12:43:25.663000 CVE-2024-38615,0,0,6b2b30021c462b67b43c68a1b611bf4e256aef4b2202d2a4ffcd14a365f0996c,2024-06-20T12:43:25.663000 CVE-2024-38616,0,0,5973b89685927d01a2bc6739c9869c62b013e73534589bc0a28a6ca91ac6e344,2024-06-20T12:43:25.663000 CVE-2024-38617,0,0,9c97e58cf4d706f899e8162b3f89b78d980789c28dbd9a8d8811544e01702995,2024-06-20T12:43:25.663000 -CVE-2024-38618,0,0,5399a5e4fc905e343797fec50dc7ef2ceb4c0711d2428c49772522361284e789,2024-06-20T12:43:25.663000 +CVE-2024-38618,0,1,9f09a6969fb6a684b0f677beedf80b32b7ab8de364cc601497ff8efd6c478217,2024-06-27T12:15:29.227000 CVE-2024-38619,0,0,d53dbad3d74b4eba98dbae88a34c0ce40740499e8f393cdcbc0226a7781a417e,2024-06-21T14:15:13.613000 CVE-2024-3862,0,0,d892c55e37e2ad71ebd3e4aade996aff767de8739f62e2d71c93704431b2b09c,2024-04-17T12:48:31.863000 CVE-2024-38620,0,0,6148b861a5093fff5387ffdb934470362842871878e29323f4b878a27c1f924b,2024-06-20T12:43:25.663000 -CVE-2024-38621,0,0,4256e71999319364467d608bf7a692c35bb29295ae4966fab468de7bc2f3cffe,2024-06-21T11:22:01.687000 +CVE-2024-38621,0,1,e851e344092a58b93abfcdfc8e0c1cb200d4e0785daf3d71ef6eab3acb0ab050,2024-06-27T13:16:01.607000 CVE-2024-38622,0,0,ba6b4e5dd8ff5530bdf29e3219192ae1fec1559b400be83328cb0674a062fb29,2024-06-21T11:22:01.687000 CVE-2024-38623,0,0,df2061012368449118260b5f6365b16007b47af549796017c469b35189df012d,2024-06-21T11:22:01.687000 CVE-2024-38624,0,0,52e638e541a14b7bc9be2016e347e8fd4ab6d7a56f37cfd4a5debbff67c5f4e5,2024-06-21T11:22:01.687000 CVE-2024-38625,0,0,9d1784a1d9fd0409e2ba0ac3357fda848dfd81d83aa1f472c2816080c539e957,2024-06-21T11:22:01.687000 CVE-2024-38626,0,0,a2f4328bcc7ac370a10fd01c19217533d15da90b1102e9d2101497bdd675293e,2024-06-21T11:22:01.687000 -CVE-2024-38627,0,0,b94b3032b95246d1bf9128e8e71ad6c70307cb99d52f8d50f25b251b63849487,2024-06-21T11:22:01.687000 +CVE-2024-38627,0,1,7f8bd76455ac56291c34e79f7b022352c208db1f2d866c22280e666bd40ec1b8,2024-06-27T12:15:29.297000 CVE-2024-38628,0,0,8c1a38d1688d5ce6cc7f13d0db76f45e77deea3baaf5a2959c9dd25048eef37c,2024-06-21T11:22:01.687000 CVE-2024-38629,0,0,7fc0f6d2d55be78c6fbd68877069eaa693fee857e433fe8323fe2a50f6986c03,2024-06-21T11:22:01.687000 CVE-2024-3863,0,0,2bcd7aff2d943e7ab42e23b79c60d375ad9e243a307a827bee502e9df179514c,2024-04-19T17:15:55.333000 CVE-2024-38630,0,0,18ef739ed607f094835bc31ca16c0ec17a4e73a4ee500996a0e0a842ce5f80d3,2024-06-21T11:22:01.687000 CVE-2024-38631,0,0,56110c99cfc37fa0a22fc3ec2a762f45e7bf2f2f42e9bcc9762b6029b6b1ef9e,2024-06-21T11:22:01.687000 CVE-2024-38632,0,0,964933a3d92e8cd2fdc65d3da95a16e19bc3f28f2d2a801e58ce78819b6878c4,2024-06-21T11:22:01.687000 -CVE-2024-38633,0,0,a45d54f807b4dc9e21b098cc389ddf79571adc4397dd674a03c8e254fd7fb99f,2024-06-21T11:22:01.687000 -CVE-2024-38634,0,0,8bbc1b27123634e82e5a87cd632372e21355ec1a81e75b5f6366bc6aff6551f8,2024-06-21T11:22:01.687000 +CVE-2024-38633,0,1,5509bbeb8590b1b24f6286c98d92e5aea411198cbfd0c24acdba6a3fa3bf59bc,2024-06-27T12:15:29.363000 +CVE-2024-38634,0,1,94328b617aedba8c16923f17bfb319e677466fac3224650494a428123b3364e3,2024-06-27T13:16:01.670000 CVE-2024-38635,0,0,72155e32b6466cadb4f0ae2ee9b260c68dc3b723c68e11e9bf68beb16175cb0e,2024-06-21T11:22:01.687000 CVE-2024-38636,0,0,93303f02d97ec410d21d7e54323c62bb58708a729d5e9724fae110f07e773e45,2024-06-21T11:22:01.687000 -CVE-2024-38637,0,0,b24638a5f79654eb503a0ab5361d905066f0c21bc6fbaef24d4384d6188e49a7,2024-06-21T11:22:01.687000 +CVE-2024-38637,0,1,d0d9aad826ef7ee75b187b93844e5247aa30d3f2da3e776b03bd0d4ca08df5c0,2024-06-27T13:16:01.743000 CVE-2024-3864,0,0,19d7836c62228b8f626d6423c9bc9a43211c93bf4b17c3a151f2e9e764cbca42,2024-04-24T10:15:07.597000 CVE-2024-3865,0,0,8b230c3d643bf4def0090616d3b729148802c45f8b0915e5522b00babc710a03,2024-04-17T12:48:31.863000 -CVE-2024-38659,0,0,f28961b0676a5448bd17e73bb1a6deb01287f9c08ed62cfca5dcb9aaeb49ab7b,2024-06-21T11:22:01.687000 +CVE-2024-38659,0,1,de012bf6b0c8bcdf39edecb5194239a4b97c94a91ad3dfb253859d9dbb8b2ad8,2024-06-27T13:16:01.810000 CVE-2024-38661,0,0,d01292ccb88aa0fd584714c04388bf37fe037da4497467ec684003ebdeaece48,2024-06-25T18:50:42.040000 CVE-2024-38662,0,0,df490b2d1680f03df6de3bc588b5285cb29614d4f952810a45c332f43aef3cdd,2024-06-24T18:34:17.547000 CVE-2024-38663,0,0,3ea2d49b13b5a6417be2e2e46e01198d7a523f2e1f725a81c5446a7828b4f9eb,2024-06-24T19:26:47.037000 @@ -253633,7 +253635,7 @@ CVE-2024-3875,0,0,d86045281a0b2a48da23b56cded5d23c73cf1b0cfc400db0bc7b27c6cb2197 CVE-2024-3876,0,0,776837fb0cf9eeaf7d3ba120d8dcf4cad0f43e38d62b6ec13c079af103a4cf3c,2024-06-17T19:15:58.763000 CVE-2024-3877,0,0,f24faee79076d9955b33c716cc38fff1084b5ee3b430064cdc16beb5bbd9e5c2,2024-06-04T19:20:25.903000 CVE-2024-3878,0,0,fb95502da03faec460d17c9b1242297f4e8658270dcfc3f37876da58c73c1ed8,2024-05-17T02:40:10.087000 -CVE-2024-38780,0,0,530b48daa9fb45d87f7575c99389d6040a1625a22b7e121268d7db04c8eaf72a,2024-06-24T19:17:28.313000 +CVE-2024-38780,0,1,c1f2376a19ddc76bcb901cb449175204fc4f529dfde27084ade7d059bcdb6bdd,2024-06-27T12:15:29.443000 CVE-2024-3879,0,0,92774dc7ea0cffc72f06608ad0c5ab32112431972595f4ffa950315fc44f5141,2024-05-17T02:40:10.177000 CVE-2024-3880,0,0,61b243b8dab5be381c75f9d8b4a7598794aea603615d7bb3e86dc2bfd47b1c10,2024-06-04T19:20:26 CVE-2024-3881,0,0,75d6ff7939f1eb42f8c8e14b9aa2dfb06f2eebee5e37b0b47750b4ccbacea0e8,2024-05-17T02:40:10.360000 @@ -253657,9 +253659,9 @@ CVE-2024-3891,0,0,8daff08d10085680eb7790a9a2c0ef842bf636f7de8dcdfbf7cd60ad81535e CVE-2024-3892,0,0,fd27f7808afa94cc2c75f61cd235edb0c08399fa20b15f6c79b02a7674d8055a,2024-05-15T18:35:11.453000 CVE-2024-3893,0,0,44a15b07d473e504956c2fc6e9bdbbb981ef84a8f1b69c702ee1ea4228dd1195,2024-04-25T13:18:13.537000 CVE-2024-3894,0,0,edf80459282b8df89b54e83306b1e3308990b8425170b8aae8ee5dd50d193a39,2024-06-20T12:44:01.637000 -CVE-2024-38949,0,0,06b36bee237a2dd93540248596a527d722a58be0c57142b9f9b242d4020957d5,2024-06-26T20:15:16.263000 +CVE-2024-38949,0,1,a43dbf328281300509f5ac31ad8a17523caf140bc030a3178261346b56882d3d,2024-06-27T12:47:19.847000 CVE-2024-3895,0,0,e17d122bfb4ca0c486d0790093f87ef90da21ea7556181e7099c23bc52ef24ea,2024-05-02T18:00:37.360000 -CVE-2024-38950,0,0,e4a66b4992a1bc1e0adb8f68d67ee28d550cc378c872be99b21b152969cb4bea,2024-06-26T20:15:16.367000 +CVE-2024-38950,0,1,fa51116204c8dd85f77aaa29c376757e8a69dd65423c416717d298ef0c99923c,2024-06-27T12:47:19.847000 CVE-2024-38951,0,0,2fe865287281e18bfc8391e5fdd7f9b2e7ca4d1df39a0017b43b5090b5aae2cc,2024-06-25T18:50:42.040000 CVE-2024-38952,0,0,7a7903cf5c57a02ae11664bc1f5ff958307bfbaee7b207c7b69a2ab43d958a10,2024-06-25T18:50:42.040000 CVE-2024-3897,0,0,2e6547d98bffe49274878683fd846b0dea4d063f5cc123163d759ecec392b068,2024-05-02T18:00:37.360000 @@ -253683,9 +253685,9 @@ CVE-2024-3921,0,0,dc44586c5c7e1c74f5850e7b4d244cf53da902f950a29ac6c4f232f9664545 CVE-2024-3922,0,0,9c35bb7d9bca4b5559bb1a4dfea91676bf1d098f4dc5952b2a109bcc30a68d2c,2024-06-13T18:36:09.010000 CVE-2024-3923,0,0,dcd7a979944a34edd9f4dd960691916feb4f3b194c37e215c41a761a1e13cac2,2024-05-14T16:11:39.510000 CVE-2024-3924,0,0,396cfe762c72fbd5a1960b1ddaed612b95d18abd602e0e4dd151e2967ca06c2d,2024-05-30T18:19:11.743000 -CVE-2024-39241,0,0,33cb4f8f20ef3bc2d890d4ffa7d7d8e1a9d85edc7fb5addb1819658471ba379c,2024-06-26T20:15:16.447000 -CVE-2024-39242,0,0,d392bcd6994aacfe440b4b61c9426132fb2fb3f240b57ebb0469af22acacb7ee,2024-06-26T20:15:16.527000 -CVE-2024-39243,0,0,9ce8e693c1cd27f17c49c068fc69a9e57a8a6ec13a60097ca7601f121b864ae1,2024-06-26T20:15:16.610000 +CVE-2024-39241,0,1,afa83ae007b8cddb769c7423e9b1caee4c0fe8b440470f4e2aca6500f4f35cee,2024-06-27T12:47:19.847000 +CVE-2024-39242,0,1,e6a42d26f8742e08c6e87c2f9736f6a5d1c92d4e99728f3f16ba7aaa3565d9e9,2024-06-27T12:47:19.847000 +CVE-2024-39243,0,1,b8130c621cb0dfb964c1992defd80d667f6acc85382d7b6cd314c7c97d98e637,2024-06-27T12:47:19.847000 CVE-2024-3925,0,0,fcd3c5c763e8e19f599e796d0209af93ac6baa71961ded5ca72feb787efdbcae,2024-06-13T18:36:09.010000 CVE-2024-3926,0,0,95647e23a8e9831b3425be75c3a5409a951b8ebef070821e4342ccb8d8ffe085,2024-05-22T18:59:20.240000 CVE-2024-3927,0,0,b62a8fbb5cbf577eaf3c7a81b1c47c6d426f2a5dda5ebe7d2d0cc2ac17b12044,2024-05-22T12:46:53.887000 @@ -253694,7 +253696,7 @@ CVE-2024-39277,0,0,6e7801911264b763408b9f899358179fb95a98312e78f4ee1fc3e7073d7a1 CVE-2024-3928,0,0,43ee632eccbea17dded882a6bd84de69427d4224bfef339281c0d3b1909e8b06,2024-06-06T20:15:13.813000 CVE-2024-3929,0,0,31d0a734bfd88727a2a61deb7a29595ac9c8ac4a930ee35c31639990489d025d,2024-04-25T13:18:13.537000 CVE-2024-39291,0,0,29bd4b8e956946aa3501ab55ba129e9ce736b97068a6de9b7ac8d6eb2625e558,2024-06-26T14:03:13.437000 -CVE-2024-39292,0,0,7dfc5d5d390014ce6f10c5879981a9e5845439fb37578e36094450dc1afd7939,2024-06-26T14:05:24.507000 +CVE-2024-39292,0,1,712b45ec81861d550aa1ad91823e74f718afcd34779c0b7a986c388a1bcd5c7a,2024-06-27T12:15:29.553000 CVE-2024-39293,0,0,ba4d7546a3208d93eda31b60f338bfefc59f223d8a82bb5367fc84df5351bcb7,2024-06-25T18:50:42.040000 CVE-2024-39296,0,0,e260e24d75f61f9e507cbecbe3ae9f7cc9539275110e5bb8afeebe70ced8da66,2024-06-25T18:50:42.040000 CVE-2024-39298,0,0,62f081e1204433b72614003aee17d6ba0c526eacd01605580713226a64a6e578,2024-06-25T18:50:42.040000 @@ -253715,10 +253717,10 @@ CVE-2024-3941,0,0,3315566f834adaa65bc779c72609390662785ebcc4aac50a6cb30731cb96d9 CVE-2024-3942,0,0,e822d69f7c80cdc7914f6c6d228f749a2878411b19bb34f624a4ef0b72687edf,2024-05-02T18:00:37.360000 CVE-2024-3943,0,0,e07ef944084da93a178b1d893c19c63f640132688c11e19da99f30e04e5e47e2,2024-05-30T13:15:41.297000 CVE-2024-3945,0,0,87d1ab8fe16ba408f307c5379ed22b3c751c5d4b07b1a3f5bec08826673ff46f,2024-05-30T13:15:41.297000 -CVE-2024-39458,0,0,79cd006f828ddb42526671944d0f8be756edd5516f0bff79ae093ccb01c685a9,2024-06-26T18:15:15.410000 -CVE-2024-39459,0,0,89266a187bd252431c34bba3e47212ac19c13bed9b29b572d87e84e07c46e48a,2024-06-26T18:15:15.457000 +CVE-2024-39458,0,1,fddd464380a09267e09b57b66272561b89c59455a10d641fa61f771d4f530d41,2024-06-27T12:47:19.847000 +CVE-2024-39459,0,1,d1d8498393c450e178fa7bc147e75f870b75d424b183c32cba625d84c2757e63,2024-06-27T12:47:19.847000 CVE-2024-3946,0,0,af95d5e46eb992f74c75866328fad3ff861f42ea88ebd6ef22645eb1de333586,2024-05-30T13:15:41.297000 -CVE-2024-39460,0,0,e4426843f078d25f357f636fc5a476f6e518766fe88feec61e33c5fef5cc74e6,2024-06-26T18:15:15.500000 +CVE-2024-39460,0,1,64535d769b37f6b9c7eceaa56210e3ceeb3b449fc556c3bc5382087d1c24bdf6,2024-06-27T12:47:19.847000 CVE-2024-39461,0,0,72dccb75786f085395fcbdc3b0ca926fa6759a1127d3979166b2568685bbc213,2024-06-25T18:50:42.040000 CVE-2024-39462,0,0,32bc8f035f120344da7dce6fc99c7ebe73ac8830c3666aecdafa2afcce962161,2024-06-25T18:50:42.040000 CVE-2024-39463,0,0,7c98fe725d4e51d691cbffc619089d88cefeea1f9586f4294ebd84933dd8071c,2024-06-25T18:50:42.040000 @@ -253738,7 +253740,7 @@ CVE-2024-3954,0,0,45f1b348fcace6f84e3157e2d0f8a54fc4228bb396d26e03c9556cd235947f CVE-2024-3955,0,0,bba90f25cff74c274e08a67a3936bf55505a38180fc074269167b54bd0903537,2024-05-02T13:27:25.103000 CVE-2024-3956,0,0,84c84e343f731479baad188521c68e2e10d428da5ee4bd61443cf640ccedc17a,2024-05-14T16:11:39.510000 CVE-2024-3957,0,0,6e4e327328ad5c18e880466a103b162c10591051d90490bf0a67f6889d728425,2024-05-02T18:00:37.360000 -CVE-2024-3959,0,0,80a9d69e211db946a79ce1293fee1a985ceb27e08a867b47f88832b6cabd73ee,2024-06-27T00:15:11.420000 +CVE-2024-3959,0,1,a5fa2c21f84d5047f1cd572ea850c9f68cbff13b7329e2f2567c00de6ac88294,2024-06-27T12:47:19.847000 CVE-2024-3961,0,0,6646adb167e87c94860ebd5d8d983b1f971f6dc9fb8c86a5eaff8de194f86033,2024-06-21T11:22:01.687000 CVE-2024-3962,0,0,9de964d29f43823164300439a0e71453bbca4a5c1f5767eca51db600267798cd,2024-04-26T12:58:17.720000 CVE-2024-3965,0,0,6a2d24a56808a8dbb9160c44f3b8ea17e074c89928316addbe1fa0ca0aaeb11f,2024-06-17T12:42:04.623000 @@ -253772,7 +253774,7 @@ CVE-2024-4006,0,0,cea97555ee62217aaca46943155964ba917aa17a210befae3806ab46c66060 CVE-2024-4008,0,0,d029b79ac31ad712a3b682c30b4ebfe0bc85fbedb677b90d81d7c6af81a5600e,2024-06-18T17:00:01.570000 CVE-2024-4009,0,0,82f6778b19e61d18cb6bad03fb43730c90019cd4ed3dad3648b480d1adbe3427,2024-06-18T17:01:19.897000 CVE-2024-4010,0,0,b0efc140530d7080bd135b9c9b54b60a51a2a7dd68cfd5652cea86eef30822c4,2024-05-15T16:40:19.330000 -CVE-2024-4011,0,0,0928c50e2d80f152c9b9e77de4f093296246b7047a5b64859da921dea63c465f,2024-06-27T00:15:11.643000 +CVE-2024-4011,0,1,499d630b94fe2497caec58fed4a5b7c2e7052b19d213a5df9f287aa95af43a12,2024-06-27T12:47:19.847000 CVE-2024-4013,0,0,0bcb784021209931ac496a163310ba1a6e977841cc5a1bcc570cbfa4732ae6ef,2024-06-07T14:56:05.647000 CVE-2024-4014,0,0,321273114f78ac117c4f7a805b62a62926b23a5461c74b2705504b7b2e21d158,2024-04-22T13:28:43.747000 CVE-2024-4017,0,0,9cc899b07e49c20d1d42511c9c41a533c695fd74b1701843b26490566c6e33e3,2024-04-22T13:28:50.310000 @@ -253936,7 +253938,7 @@ CVE-2024-4222,0,0,baaf2be5207361c5cdba494834d7fd0e14922c0bb0c21401ff4dac917c12e3 CVE-2024-4223,0,0,7874da25b7633a9d0c04e6bbae5b506aa967cf75a9b041fe171571206fd80286,2024-05-16T13:03:05.353000 CVE-2024-4225,0,0,ac71ef092dab43c080586d967efe31f36fc3673c6a3103eaf0a29ff9fdbbfa8b,2024-04-30T13:11:16.690000 CVE-2024-4226,0,0,71c8bf7eb5a4d3d3ec7c43ac428cd4d409488f8f04217410fc871554bd101d4e,2024-04-30T13:11:16.690000 -CVE-2024-4228,0,0,4a3f798c68e6a517bb5b022e0a669e07be43186f3fa38e54b9eec3418adb9a49,2024-06-26T15:15:19.977000 +CVE-2024-4228,0,1,e830c13aa5a6f4c85f45d6eae1028a4dec8a8006f0e9403b46d88a9b6fcbb44a,2024-06-27T12:47:19.847000 CVE-2024-4231,0,0,b748cd0cba9f8ca987fa54497bf4f5e243fe33136b361691cb77cf6b95c81bb2,2024-06-05T13:15:12.980000 CVE-2024-4232,0,0,29a7149387c890d6a0d05202995edf38065cf1e9ded36e8c20e5c1fd1dd38377,2024-06-05T13:15:13.190000 CVE-2024-4233,0,0,ca4371c9e0f8794352ea7e9d8d1d33962fb848d5646d81ea1b681c81b408ae84,2024-05-08T17:05:24.083000 @@ -254215,7 +254217,7 @@ CVE-2024-4549,0,0,6f08cdb7bdf1bc14a6d26c3a39b799558e43e67fec9cb01e1f3b74f80a87ac CVE-2024-4551,0,0,bde23bacf66d6a3da20cc3762eb00d7dfd03b874f5885e9a67eebb6780ae65b6,2024-06-17T12:42:04.623000 CVE-2024-4552,0,0,e23892055f41d68c57f1d172e5ea3d0a2ee46019e9d286872c115b7aad205614,2024-06-04T16:57:41.053000 CVE-2024-4553,0,0,8b88b932112e5db46be28f06635e2ec7d2585d5bcb10d64401d792f4b888b1c3,2024-05-21T12:37:59.687000 -CVE-2024-4557,0,0,257513c35e60e7548e5e9147b496a724c69101b2430b3df3e7137e1c8201ea87,2024-06-27T00:15:11.863000 +CVE-2024-4557,0,1,e9c02b15ef137436b3668c0ffa8e71928fd1730ca7e88afab27790d52527ba2e,2024-06-27T12:47:19.847000 CVE-2024-4558,0,0,fcb727202a9f43a9bf70ed6e025c63a0fd8208e4c1e99d83d4aee5cebbd5fae2,2024-06-10T18:15:36.760000 CVE-2024-4559,0,0,8380b9787705277bd83d6c6288181f3738a86c645934830c7e5c61a4edd855f6,2024-06-10T18:15:36.837000 CVE-2024-4560,0,0,01330bc30e6abf90cd0e894076fd4822775b90946ecfbbe71c3855f1f2c00212,2024-05-14T16:11:39.510000 @@ -254227,8 +254229,8 @@ CVE-2024-4565,0,0,67d994d050778f99ebea00dffeedd75aa1729789c9eb9581753d556845ec5e CVE-2024-4566,0,0,5bf64390fca62ba0e88600d1f0954e23dea48d7610695fd2ef891697361d3217,2024-05-21T12:37:59.687000 CVE-2024-4567,0,0,bff521ec958712c348010a89da0e0aec519b6a717613a798e9a8fee426de5e74,2024-05-14T16:11:39.510000 CVE-2024-4568,0,0,79c6e65478e2e86d702896e792fead76bbebdb118f8c0f66e6390a241a22321a,2024-05-07T13:39:32.710000 -CVE-2024-4569,0,0,4d374bf4aa0a998cd8805faa062f30a5a01f5894ac3a808b5fdab21e616d67d4,2024-06-27T04:15:11.537000 -CVE-2024-4570,0,0,53d92a300b6097fbe44eced6ba98930a3d6ad73ffe866e69ac621c24e3b085fc,2024-06-27T04:15:12.553000 +CVE-2024-4569,0,1,b9942a680e02fb00eec7b62cc91255632af865eb60460677b854f563718f330a,2024-06-27T12:47:19.847000 +CVE-2024-4570,0,1,18ba4ab66d515e384d6c1d93d6f1a91dac1f70e83ef40a785d6725f84cd9973d,2024-06-27T12:47:19.847000 CVE-2024-4571,0,0,b379f15291a8a65b330c223bc6a31fd0a21b183a906c0a4077ca3cf5d38b8ad0,2024-05-14T15:44:05.750000 CVE-2024-4572,0,0,f5ca5c1acec751c453949e3111f6be45773ff402d3c1d2b8e88127a059aa7b1b,2024-05-14T15:44:06.153000 CVE-2024-4574,0,0,313ec0d117ac92e67c29da349740abe9395db1d3208f8156cb88d417271721b1,2024-05-14T16:11:39.510000 @@ -254258,7 +254260,7 @@ CVE-2024-4599,0,0,7a2dd9d366beb25d47b0c05043c7c832d7abfddbca078d457eae393ffc0c13 CVE-2024-4600,0,0,34514a912341a00b4dd13ba9bc66d0fe1a7a1cb8661452904cea5e1c3463f08f,2024-05-07T13:39:32.710000 CVE-2024-4601,0,0,9e1e1f008012e98662e601d1d10e65eeb89abb9d2b4ea828e06c076d042c7c66,2024-05-07T13:39:32.710000 CVE-2024-4603,0,0,27343e0fec6f30d71575f590e2630163b637ba40d0bef4ac0d18b49a23bf2313,2024-06-21T19:15:30.783000 -CVE-2024-4604,0,0,edb43caa5289c7d01152273e1c9164dcb136eadfd8b828bfeb197b12b3ffc0be,2024-06-26T15:15:20.257000 +CVE-2024-4604,0,1,460333a81166731e9c8a2645895ad13232c390b49b6668fbf47beefddf330f17,2024-06-27T12:47:19.847000 CVE-2024-4605,0,0,953638d724b858b3af29d2158adc8bf0b3f03be99b297e319002baf558be51c5,2024-05-14T16:11:39.510000 CVE-2024-4606,0,0,6a0f9aa1de71c84cf915c091fa2bebebead3ebb4c4bdbaf5b5bc091e1c955edc,2024-05-14T16:11:39.510000 CVE-2024-4608,0,0,66fd8dbc7b1c172bc789c4876374c82bfd54c48e5902295fa28145d061770319,2024-06-06T14:17:35.017000 @@ -254304,7 +254306,7 @@ CVE-2024-4656,0,0,23093c7ec18a8f42da4c8fc1c86b9aa6984d979cf63954576e1d3325484051 CVE-2024-4661,0,0,e86145aa3dfc1a1e846a3970af65d72463f2a51aba17ea6b9d5a34de37b2fc53,2024-06-10T02:52:08.267000 CVE-2024-4662,0,0,271820e0248036cdcfeea2da470b958f93caba3600263b2df375c674d931507f,2024-05-24T01:15:30.977000 CVE-2024-4663,0,0,ac32c04a2cae0071224eeefc80f9a000b8618e2f1af1abc8eb33d3a9321c7d70,2024-06-20T12:44:01.637000 -CVE-2024-4664,0,0,38cf0eebbebc442a207c38063fc526843b13e1f6da677c69de1b54e3af17491d,2024-06-27T06:15:13.627000 +CVE-2024-4664,0,1,3ff5098c150686569e1bc890176eceefc3c1cd5889aba764185eee9899f8cd60,2024-06-27T12:47:19.847000 CVE-2024-4666,0,0,dde8d66c76bdf850b898b9f95df0d92f0ac3da730c1f32826d61843a6ef06bf5,2024-05-15T16:40:19.330000 CVE-2024-4668,0,0,3c2f34d91ee8c9aacf0f125fe94ffbbe9a611b8f1a54ab65e0473cea71baad6f,2024-05-30T13:15:41.297000 CVE-2024-4669,0,0,cb3ea770e599714f2de5e50bc4195c130850e813b58882b88bfe234ded1dcd7f,2024-06-13T18:36:09.013000 @@ -254337,7 +254339,7 @@ CVE-2024-4700,0,0,fd7d4a078191a1c31b5f2cfdfc5bd65709b727d250ddf2b831fd6aa84ec620 CVE-2024-4701,0,0,31c0f40927cc6a1a9aece611ec4491a5435df4e5c3a9daffc9dfb7710658ca96,2024-05-14T16:11:39.510000 CVE-2024-4702,0,0,391d02c5718dd442c026ca8f3973c4fe10894f8eeb54175158dc44cd7ef50d4a,2024-05-15T16:40:19.330000 CVE-2024-4703,0,0,2d052263ca03efcceae6f1a9b5190b0e61a795b9eb986321f967eeb0b20da62b,2024-06-11T18:06:31.967000 -CVE-2024-4704,0,0,b35b347197593851ca07d1980ca3cbaa70b0cdac8bccfe11a0cb661c9fdff9b8,2024-06-27T06:15:14.697000 +CVE-2024-4704,0,1,a24a2b5651422d5e6d1cff31ea987cde737884d16a02e476634ac9d1f10878d2,2024-06-27T12:47:19.847000 CVE-2024-4705,0,0,b45f335ad46575e30510e82573f02b490faa16d9b6ee89b66a9844ff390b53aa,2024-06-06T14:17:35.017000 CVE-2024-4706,0,0,a959e13293b1a5966007eb60c79cb973f34e4d1d8bd1c12986cac54d81ac9a3d,2024-05-24T01:15:30.977000 CVE-2024-4707,0,0,d6a01a1a459dfd9ab21945d56af40919cce44b311e282118c993194b130db955,2024-06-06T14:17:35.017000 @@ -254494,7 +254496,7 @@ CVE-2024-4896,0,0,6456cc9b22aff68532bfeeb7637d5235216630d84771d1ec52d84fa467e4b7 CVE-2024-4898,0,0,4ea5d2aea02f0385cebab454e7d6b2e480bf3eab8470b7157c155067bed66344,2024-06-13T18:36:09.010000 CVE-2024-4899,0,0,67b323357bb49d8a98f8aef30f13d75a082b23ba24ff9269116bd3a4e859e8a6,2024-06-24T12:57:36.513000 CVE-2024-4900,0,0,bf21c014329db3bdc252e0dfea038d8cc3dd03e7972d5bd787db3fb8215cd9e5,2024-06-24T12:57:36.513000 -CVE-2024-4901,0,0,7238018e624eed5d4a711b08e413688112d7a37593f314d4993be0dcc7616867,2024-06-27T00:15:12.263000 +CVE-2024-4901,0,1,952ce87c1ffa85d1d49e52658886bdfd46cbbbbcb3602f8f4a628cd485f29dc6,2024-06-27T12:47:19.847000 CVE-2024-4902,0,0,190ae6556b466a5228ce6680f8d8f4ba4789cfafa6765b2e868dc7feb28ee1e3,2024-06-07T14:56:05.647000 CVE-2024-4903,0,0,74f6793baa838082db19325ded8d53157feab60a90892d7bb13ebdea205ed94c,2024-06-07T20:15:11.967000 CVE-2024-4904,0,0,44558a4b32290e2f940be10d0a83b859aa6fae2c01ef1c881d37a435bb46f91d,2024-06-04T19:20:52.380000 @@ -254562,7 +254564,7 @@ CVE-2024-4975,0,0,4fcd809ef3c247b89e3904878b1809671315d1a438027411bf1e1fc09d5e83 CVE-2024-4976,0,0,cec1c528b9c81bb2353d630af7aeaeed80f8c396bb33272f9e3c075fa645e3ec,2024-05-16T13:03:05.353000 CVE-2024-4978,0,0,da55fe81f202b0e5309a26be3ab7a8c7197ff6f40533e0aebba1988f8f75f5d4,2024-05-31T16:03:52.247000 CVE-2024-4980,0,0,b5b93d089fa3d245393b7cb268984100664e9544bf4ff7971c072bbdebb0992d,2024-05-22T12:46:53.887000 -CVE-2024-4983,0,1,72307be499c52c46551f37fde43633124fa1eb99001b06bf13a12e54b50e1320,2024-06-27T09:15:09.840000 +CVE-2024-4983,0,1,49f1cb0f5f1d6955f366dda654a5436de910210a329601fe7472776ed46f30ec,2024-06-27T12:47:19.847000 CVE-2024-4984,0,0,c181b2792419ab292757f17fa7ed54efe54e64b1f0d7a8e32f201040654607f4,2024-05-16T13:03:05.353000 CVE-2024-4985,0,0,8a1d7360ecb0b336e479fb881fdc484ef9fe33bf7265e6809734a732fb238e9f,2024-05-21T12:37:59.687000 CVE-2024-4988,0,0,e3e46f66e9019adcefc7fde3cb6b9482628a866ff50189a1fb9c695c9d061184,2024-05-21T12:37:59.687000 @@ -254788,7 +254790,7 @@ CVE-2024-5276,0,0,d26b15babe17aac13cc613675e4c4ad8d9ecb0a2798444e0b74aa892858078 CVE-2024-5277,0,0,08c2f56d5f9c6263336a67bd47c4fa52288bb09bcb2d8aeff245d6d39899edcf,2024-06-07T14:56:05.647000 CVE-2024-5278,0,0,ba4b6329b00a48ecb03cef9d2f0cd09adc7cfa79e9cd9e8eb891a1136335fb69,2024-06-07T14:56:05.647000 CVE-2024-5279,0,0,1f630d4d53c39cf2174e2a1edce8e1a5ead56a314739580d23644f8e4fedef07,2024-06-04T19:21:04.240000 -CVE-2024-5289,0,0,7df138904761c6b36c57517d0d3959585e48a93752cee47ea8cb64aafd7807b4,2024-06-27T03:15:50.593000 +CVE-2024-5289,0,1,4e6d12eadd1d7aec48d78f08721bbd9963ec3e4de3aa23cd9b0fca2a57a18c53,2024-06-27T12:47:19.847000 CVE-2024-5291,0,0,e2fc6f2196c0b027b818fde218df99cf43b38b5676cf49b77deeb1aa303d7e78,2024-05-24T01:15:30.977000 CVE-2024-5292,0,0,07f972c0f93c6f07c6e8e023cab22706ed8252620d55ba7ae2411117029231e5,2024-05-24T01:15:30.977000 CVE-2024-5293,0,0,16376ebd06367710256550351fe628f35dc79a25571582fd2686e7d66472cf44,2024-05-24T01:15:30.977000 @@ -254902,7 +254904,7 @@ CVE-2024-5425,0,0,198a56668ec12904be81f8cc7c88bdb7cf556c1b42bf2a53d8f10dc0d316d5 CVE-2024-5426,0,0,463afa72e5ec754a0d270917d456b87514b8458a939d0b61aeddc71dea0e191e,2024-06-11T18:03:58.213000 CVE-2024-5427,0,0,e86cc201b7d64d377c97e091606dc3804ebb54017d6aedd32a3c8a9e9f3ee33f,2024-05-31T13:01:46.727000 CVE-2024-5428,0,0,febfd9b4f977de4c3dc04e5fc8e71b9454e3ad809e74595cd325ad9561a295a7,2024-05-28T14:59:09.827000 -CVE-2024-5430,0,0,50d0358bd7a9dd3f7e75fbec60a9431ca513f04fff717ff8b392ca13bde9346f,2024-06-27T00:15:12.650000 +CVE-2024-5430,0,1,25f49a2988d968d6cde2c5fd2f15c3e4fdbe1025dcb88f0a4720e08f9ccb64e0,2024-06-27T12:47:19.847000 CVE-2024-5431,0,0,42e70412ed260a519e4eab6a93ce97c65de39fa732f015eeb2fa3ed75a13dc72,2024-06-25T12:24:17.873000 CVE-2024-5432,0,0,ab9a775fb9b6438a5280e4ab8778e43fe4811f4ee641a114adeb9e5317236c9d,2024-06-20T12:43:25.663000 CVE-2024-5433,0,0,d0946774ada383b4af0e78f23b9c449d05f83a7124810af4e383f90b0cdbda75,2024-05-29T13:02:09.280000 @@ -254967,7 +254969,7 @@ CVE-2024-5526,0,0,e88e82e62b5e4c5aebe68213504a5aa190a1c186279f7068714569f91c3de7 CVE-2024-5530,0,0,a1a0702e27e4a4e3934db43cd9ea561e00ac905016f120852abcc67a37fa7a55,2024-06-11T13:54:12.057000 CVE-2024-5531,0,0,aff596c4345d9e9649e4107c993c40fc7416a56fa205089ee8692b6e8ba6cecf,2024-06-11T13:54:12.057000 CVE-2024-5533,0,0,1994262e08a7071f611be7c6d84dc9ffdd2ad4dec717c16feb005eeb66301b8d,2024-06-20T12:44:01.637000 -CVE-2024-5535,1,1,823cf2d5901198dd3719a50bdb8cea43b8e1c881baf3cf0568544a8c86e6c466,2024-06-27T11:15:24.447000 +CVE-2024-5535,0,1,266feddbd46b40e355fb989871a4aa9b216c376b4abd6c93e4cb69d0d0258507,2024-06-27T12:47:19.847000 CVE-2024-5536,0,0,d892d63cd79e6d462fe4485ce154b4e3b14e14d416b8b4d67114661d27280a01,2024-06-11T17:28:37.343000 CVE-2024-5537,0,0,071475eb8c0f92cc8ea9522d658283ad0e8213ba6740ff46ee05e5b24c18c3d8,2024-05-30T17:15:34.583000 CVE-2024-5538,0,0,183cea799fa9410e329e72f326a10b8369aedcea9a5b7583a44bf33ecc305070,2024-05-31T11:15:09.923000 @@ -254997,7 +254999,7 @@ CVE-2024-5590,0,0,ca60332ff9933405c7b9b37e93d2404b53274b9ec741b4065c0c1eadbd60da CVE-2024-5596,0,0,c69cbcadf0a7f1e5940d842c2c9e90907cbda728581a745e7acd494576e03c9c,2024-06-24T12:57:36.513000 CVE-2024-5597,0,0,652827ff26b80eabae5b3eddf519a61b0da7de181ce61fd257911ec48c45cdb0,2024-06-12T18:10:47.080000 CVE-2024-5599,0,0,e4d8d3217ca804a33354b51b54e1f3f41ce0e1fc1f554dedfe90ad1a46a87370,2024-06-11T18:24:39.057000 -CVE-2024-5601,0,0,5e42e2333a3735579cc3b92f75384afe160719cf3fcd855e0cf5fd3cd744d22b,2024-06-27T08:15:09.703000 +CVE-2024-5601,0,1,608253de8aa693ac16539d1fe627e243a8de70528c0293750be066054dc903bf,2024-06-27T12:47:19.847000 CVE-2024-5605,0,0,4bb70fac398eb5e1fc6a3b8761dcfee9993510711b196c5d9f90dc1e34c785a3,2024-06-20T12:43:25.663000 CVE-2024-5607,0,0,9601597658129a089207c1a0e7e7267aceda952302ad39754d738e7307549543,2024-06-07T14:56:05.647000 CVE-2024-5609,0,0,f28c83e3e9d04345913d36de3bfdbd0d644d73b3d20045d9399b3368319c8d47,2024-06-06T19:16:09.920000 @@ -255018,7 +255020,7 @@ CVE-2024-5649,0,0,dc95f59c6efdf5cedf3d7e0f6c5bd262dc96a14a6be79337241ad862a08882 CVE-2024-5650,0,0,65f855892c82055621a01afe5dfbac2eeb37ab3d50eb12f09dc0d9a40779b9ee,2024-06-17T12:42:04.623000 CVE-2024-5653,0,0,283076b6ccce08ae3d1ddf9d7f5983a839d66c80929543a8a527d0bfdf86a2f9,2024-06-06T14:17:35.017000 CVE-2024-5654,0,0,e22a0b433d38e113ff7c2fe935a2ac4a2eac96ee27b605312aa4a4c8d50d69a0,2024-06-10T02:52:08.267000 -CVE-2024-5655,0,0,d8a71b5d30b695a6efc14d9f636905eb2f41126b608ee8f05fb5f6cde0bb90a1,2024-06-27T00:15:12.887000 +CVE-2024-5655,0,1,6cb4e700bce2da265b6f2c552a8a53291e39f2ac0487d3d6e8de28ff5d710b14,2024-06-27T12:47:19.847000 CVE-2024-5656,0,0,40c34e526e2032c59043b8834b1648291001d5e69a19326cbf74d918e6c8fbc1,2024-06-13T14:15:13.397000 CVE-2024-5657,0,0,223911cca93e713dc15810800584c4abe481e0e2143d3e3f3795c2d130280eb3,2024-06-11T17:40:47.823000 CVE-2024-5658,0,0,e420aa15660fefecd013eab0de4dee690ff0f155b141d8b1d4392a16606c7ad5,2024-06-11T18:21:52.377000 @@ -255185,7 +255187,7 @@ CVE-2024-6045,0,0,2dcda6a0cbff8cd9e195f4d3ab65f0210762794017ec56ef72ed3655d46b17 CVE-2024-6046,0,0,91371f2b9afd0a654dc4dc6a88ac5fb04a186cb82713804dda3cac2d7733c344,2024-06-18T11:15:52.513000 CVE-2024-6047,0,0,4cdf0f1acff12373f8f857c8d442b9de2221d44745323cc3f60bf66bccd7a239,2024-06-17T14:15:13.040000 CVE-2024-6048,0,0,03e9485ef23720c113f11fed6c539200d9a1624e025ca24798cddf9d0c1a9e3b,2024-06-17T12:42:04.623000 -CVE-2024-6054,0,0,99a0ac10de1313b6cf1feb6202998d8b2fe6e900cc2080d42212b58cfd297d57,2024-06-27T03:15:50.890000 +CVE-2024-6054,0,1,9f18323a2fbed2ef991deda5bef29ef43b30ded232406b18f163378de0779c3b,2024-06-27T12:47:19.847000 CVE-2024-6055,0,0,7490ef4c1367b62a13fc44ec964fb12263f9fa479e5bd4bbc3820296c19002e0,2024-06-20T12:44:22.977000 CVE-2024-6056,0,0,9210a6d5e69cda44c36495fe4964320c8f6a47f4e723a559827fc7a6d2ee595f,2024-06-20T12:44:22.977000 CVE-2024-6057,0,0,3fe0cc3f033e9735165b225d202aca1a708a694e0fe3a8863e85d03de2c16d7c,2024-06-20T12:44:22.977000 @@ -255269,7 +255271,7 @@ CVE-2024-6251,0,0,76d6a56e1b2f86f9d8f71f51691147da73df155a07e8f8a63cfd8ad441487e CVE-2024-6252,0,0,468e259f2025efbae92579ad89a45c9f2c8b2e33c6f209272de57a1e66debccf,2024-06-26T19:15:14.383000 CVE-2024-6253,0,0,a6e4514e5a27665a5cb6260b36ae56e5c2da14fd9a2d1da643a44ff2f3f2cb21,2024-06-25T18:15:12 CVE-2024-6257,0,0,2981da6c17c705bcf0d80e44b1fa14b0c6655b2077fb275b971c6bc5c7c2b720,2024-06-25T18:50:42.040000 -CVE-2024-6262,1,1,9a2b8b6e957e86f58b030bdd8aa4cb26541ecbea1f3fafbf8f16cb9ddb693c72,2024-06-27T11:15:25.193000 +CVE-2024-6262,0,1,f703f7a7fbd3e1fe9efa1e5946752e209a081bf36124182aca731e3f05a363a4,2024-06-27T12:47:19.847000 CVE-2024-6266,0,0,f14331da5cd861226d53e015f2a1f08c9e1d5e7f7b1b843a3feb7cb151cc145a,2024-06-24T12:57:36.513000 CVE-2024-6267,0,0,d0d81696a0fe56042eb20b9f0c7d606c3ec4ab44f43adaf7633e08749cae8d6a,2024-06-24T15:15:12.093000 CVE-2024-6268,0,0,f6b5ab227c5a0cba5e0d9764b3a65d1dea83e5d9d7e49ede9770a3daceae2872,2024-06-26T20:15:16.893000 @@ -255282,7 +255284,7 @@ CVE-2024-6277,0,0,82a7caef84f140d39367b293ce24c3b1ac7d5afca66e1b97bc6dda0940bca5 CVE-2024-6278,0,0,b7497a594f7128876befcfd03ef67851e16926a50d842e021e87a9cd67006c16,2024-06-24T14:15:13.293000 CVE-2024-6279,0,0,aff2444fd4ca8a3e713d1d2803a8314b319d4a725e3aef2a87ea3d2f62dd68bf,2024-06-26T20:15:17.003000 CVE-2024-6280,0,0,4e5bdd720fdc6d68a51312dcfd366ac88ed5daebd5ed348aefe6d5aa74c57712,2024-06-24T12:57:36.513000 -CVE-2024-6283,0,0,e5b8d9dcf06a6207ab42c26b08314df7b71607719a3c7d1c545ae2b0026a6c6b,2024-06-27T05:15:51.700000 +CVE-2024-6283,0,1,7679cdbc5a0795d424f817d9e78cc6434dd815448d811d36eaa84a53a985e5af,2024-06-27T12:47:19.847000 CVE-2024-6285,0,0,e2996efda4e983a3551e96b4c79fe85947d0c5facb8b6e94cf5ae2183076f6f4,2024-06-26T14:24:38.113000 CVE-2024-6287,0,0,91ea920d50ec75aef59aca2b29908a9542c1a59d5111a1068e10d538d24873e6,2024-06-26T14:36:08.507000 CVE-2024-6290,0,0,67d71c6eecc55d47dcb9d49fef6cb3eb904eb85c23231aa8b50f7ec84f4eca31,2024-06-27T03:15:51.093000 @@ -255301,8 +255303,15 @@ CVE-2024-6305,0,0,f99f0e2fe8305a118a77228b9078f8dc9ee1845d0c6e4aa828aaf18dadf372 CVE-2024-6306,0,0,711bff153bb36aca97259b9a58665f79686710d592de1aed3b99962d3c3067a2,2024-06-25T17:15:11.107000 CVE-2024-6307,0,0,8ab5a431e062520bb1ad7f310d46410dbbde3d3f7608d294c115bc975c016c27,2024-06-25T12:24:17.873000 CVE-2024-6308,0,0,483bab7c0040f40965fba497a0be9e45fef6974a263c54d39149185a218f4b43,2024-06-25T21:16:02.087000 -CVE-2024-6323,0,0,a13781b7b076a5a32737ff654fab9a311b721465dc2b074e3d948723fe795b77,2024-06-27T00:15:13.130000 +CVE-2024-6323,0,1,700f1a3366b819431f4d9e19f9e189cfc39e4c2b3586687b2317570c92195f74,2024-06-27T12:47:19.847000 CVE-2024-6344,0,0,f8fe072181ab91a453822e0b523eb31f74817bc4efb68c7d2134a2d41a8e3557,2024-06-27T00:15:13.360000 CVE-2024-6349,0,0,f01d61e3475192c945ec3639c2eda3b231a23d2f279c2f15b4719385fb2bd065,2024-06-26T15:15:20.690000 -CVE-2024-6354,0,0,7d18b67617b23c02d3a517e6ca456b4bc3978471ddff450d6c05c10b62c889de,2024-06-26T17:15:27.497000 -CVE-2024-6355,0,0,2a4505c0394d23db4b3d3539af3feab878a09a04e5d76bc801d2e38c9653479e,2024-06-26T21:15:13.533000 +CVE-2024-6354,0,1,b70a2915a44ee7e7e6c00925c9a92ab9e6b070beaff28ea6d89d1a4dcb2a10e6,2024-06-27T12:47:19.847000 +CVE-2024-6355,0,1,0ef533235229e5252344353901b990d2581932f11d31a5d470c390f00e4b3cbc,2024-06-27T12:47:19.847000 +CVE-2024-6367,1,1,7207995286cd77894417e443ceec13186f4617a3d835dc70f545e6022e4f6dc9,2024-06-27T12:47:19.847000 +CVE-2024-6368,1,1,c360e05136e1856612e57e486ef9ef23f168c99b71fe403f64ea3a52a5137ca7,2024-06-27T12:47:19.847000 +CVE-2024-6369,1,1,c793378edfea0b2a8c32a50d08899943167a983433e0948af5044c43e0a7ad33,2024-06-27T12:47:19.847000 +CVE-2024-6370,1,1,0f0f85fde4b73103800204f780290a437241475eadfffc10da714e066c078724,2024-06-27T12:47:19.847000 +CVE-2024-6371,1,1,08032907e49be41f2b7cd6d4844b7b27189e091dc30844e2b2c47c75dc5d02a9,2024-06-27T13:16:01.923000 +CVE-2024-6372,1,1,ef44fc8fefbb58074bca099c4fb7696edf2d286b13f49f6ec04f8edf213820e1,2024-06-27T13:16:02.440000 +CVE-2024-6373,1,1,c6664f97eabc742fe55dbee992183e470ecb63cc40483911c49573eb1fbd12cd,2024-06-27T13:16:02.893000