From a65cab13d30c8543538bea95a6844d6f5a5dce89 Mon Sep 17 00:00:00 2001 From: cad-safe-bot Date: Thu, 13 Jun 2024 23:58:10 +0000 Subject: [PATCH] Auto-Update: 2024-06-13T23:55:17.979785+00:00 --- CVE-2023/CVE-2023-40xx/CVE-2023-4039.json | 2 +- CVE-2024/CVE-2024-00xx/CVE-2024-0084.json | 55 +++++++ CVE-2024/CVE-2024-00xx/CVE-2024-0085.json | 55 +++++++ CVE-2024/CVE-2024-00xx/CVE-2024-0086.json | 55 +++++++ CVE-2024/CVE-2024-00xx/CVE-2024-0089.json | 55 +++++++ CVE-2024/CVE-2024-00xx/CVE-2024-0090.json | 55 +++++++ CVE-2024/CVE-2024-00xx/CVE-2024-0091.json | 55 +++++++ CVE-2024/CVE-2024-00xx/CVE-2024-0092.json | 55 +++++++ CVE-2024/CVE-2024-00xx/CVE-2024-0093.json | 55 +++++++ CVE-2024/CVE-2024-00xx/CVE-2024-0094.json | 55 +++++++ CVE-2024/CVE-2024-00xx/CVE-2024-0095.json | 55 +++++++ CVE-2024/CVE-2024-00xx/CVE-2024-0099.json | 55 +++++++ CVE-2024/CVE-2024-01xx/CVE-2024-0103.json | 43 ++++++ CVE-2024/CVE-2024-300xx/CVE-2024-30037.json | 14 +- CVE-2024/CVE-2024-317xx/CVE-2024-31777.json | 20 +++ CVE-2024/CVE-2024-332xx/CVE-2024-33253.json | 20 +++ CVE-2024/CVE-2024-374xx/CVE-2024-37408.json | 16 +- CVE-2024/CVE-2024-56xx/CVE-2024-5688.json | 8 +- CVE-2024/CVE-2024-56xx/CVE-2024-5690.json | 8 +- CVE-2024/CVE-2024-56xx/CVE-2024-5691.json | 8 +- CVE-2024/CVE-2024-56xx/CVE-2024-5692.json | 16 +- CVE-2024/CVE-2024-56xx/CVE-2024-5693.json | 8 +- CVE-2024/CVE-2024-56xx/CVE-2024-5696.json | 8 +- CVE-2024/CVE-2024-57xx/CVE-2024-5700.json | 8 +- CVE-2024/CVE-2024-57xx/CVE-2024-5702.json | 8 +- README.md | 64 ++++---- _state.csv | 162 +++++++++++--------- 27 files changed, 880 insertions(+), 138 deletions(-) create mode 100644 CVE-2024/CVE-2024-00xx/CVE-2024-0084.json create mode 100644 CVE-2024/CVE-2024-00xx/CVE-2024-0085.json create mode 100644 CVE-2024/CVE-2024-00xx/CVE-2024-0086.json create mode 100644 CVE-2024/CVE-2024-00xx/CVE-2024-0089.json create mode 100644 CVE-2024/CVE-2024-00xx/CVE-2024-0090.json create mode 100644 CVE-2024/CVE-2024-00xx/CVE-2024-0091.json create mode 100644 CVE-2024/CVE-2024-00xx/CVE-2024-0092.json create mode 100644 CVE-2024/CVE-2024-00xx/CVE-2024-0093.json create mode 100644 CVE-2024/CVE-2024-00xx/CVE-2024-0094.json create mode 100644 CVE-2024/CVE-2024-00xx/CVE-2024-0095.json create mode 100644 CVE-2024/CVE-2024-00xx/CVE-2024-0099.json create mode 100644 CVE-2024/CVE-2024-01xx/CVE-2024-0103.json create mode 100644 CVE-2024/CVE-2024-317xx/CVE-2024-31777.json create mode 100644 CVE-2024/CVE-2024-332xx/CVE-2024-33253.json diff --git a/CVE-2023/CVE-2023-40xx/CVE-2023-4039.json b/CVE-2023/CVE-2023-40xx/CVE-2023-4039.json index 2fa85b015b9..3919d0e1b6a 100644 --- a/CVE-2023/CVE-2023-40xx/CVE-2023-4039.json +++ b/CVE-2023/CVE-2023-40xx/CVE-2023-4039.json @@ -2,7 +2,7 @@ "id": "CVE-2023-4039", "sourceIdentifier": "arm-security@arm.com", "published": "2023-09-13T09:15:15.690", - "lastModified": "2024-02-19T23:15:07.680", + "lastModified": "2024-06-13T23:15:50.137", "vulnStatus": "Modified", "descriptions": [ { diff --git a/CVE-2024/CVE-2024-00xx/CVE-2024-0084.json b/CVE-2024/CVE-2024-00xx/CVE-2024-0084.json new file mode 100644 index 00000000000..cd0193e22ff --- /dev/null +++ b/CVE-2024/CVE-2024-00xx/CVE-2024-0084.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2024-0084", + "sourceIdentifier": "psirt@nvidia.com", + "published": "2024-06-13T22:15:11.220", + "lastModified": "2024-06-13T22:15:11.220", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "NVIDIA vGPU software for Linux contains a vulnerability in the Virtual GPU Manager, where the guest OS could execute privileged operations. A successful exploit of this vulnerability might lead to information disclosure, data tampering, escalation of privileges, and denial of service." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@nvidia.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@nvidia.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-250" + } + ] + } + ], + "references": [ + { + "url": "https://nvidia.custhelp.com/app/answers/detail/a_id/5551", + "source": "psirt@nvidia.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-00xx/CVE-2024-0085.json b/CVE-2024/CVE-2024-00xx/CVE-2024-0085.json new file mode 100644 index 00000000000..f3be5357954 --- /dev/null +++ b/CVE-2024/CVE-2024-00xx/CVE-2024-0085.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2024-0085", + "sourceIdentifier": "psirt@nvidia.com", + "published": "2024-06-13T22:15:11.483", + "lastModified": "2024-06-13T22:15:11.483", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "NVIDIA vGPU software for Windows and Linux contains a vulnerability where unprivileged users could execute privileged operations on the host. A successful exploit of this vulnerability might lead to data tampering, escalation of privileges, and denial of service." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@nvidia.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "HIGH", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 6.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.0, + "impactScore": 5.2 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@nvidia.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-266" + } + ] + } + ], + "references": [ + { + "url": "https://nvidia.custhelp.com/app/answers/detail/a_id/5551", + "source": "psirt@nvidia.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-00xx/CVE-2024-0086.json b/CVE-2024/CVE-2024-00xx/CVE-2024-0086.json new file mode 100644 index 00000000000..7ac53cc8087 --- /dev/null +++ b/CVE-2024/CVE-2024-00xx/CVE-2024-0086.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2024-0086", + "sourceIdentifier": "psirt@nvidia.com", + "published": "2024-06-13T22:15:11.717", + "lastModified": "2024-06-13T22:15:11.717", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "NVIDIA vGPU software for Linux contains a vulnerability where the software can dereference a NULL pointer. A successful exploit of this vulnerability might lead to denial of service and undefined behavior in the vGPU plugin." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@nvidia.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@nvidia.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-476" + } + ] + } + ], + "references": [ + { + "url": "https://nvidia.custhelp.com/app/answers/detail/a_id/5551", + "source": "psirt@nvidia.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-00xx/CVE-2024-0089.json b/CVE-2024/CVE-2024-00xx/CVE-2024-0089.json new file mode 100644 index 00000000000..df77b3761b6 --- /dev/null +++ b/CVE-2024/CVE-2024-00xx/CVE-2024-0089.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2024-0089", + "sourceIdentifier": "psirt@nvidia.com", + "published": "2024-06-13T22:15:11.940", + "lastModified": "2024-06-13T22:15:11.940", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "NVIDIA GPU Display Driver for Windows contains a vulnerability where the information from a previous client or another process could be disclosed. A successful exploit of this vulnerability might lead to code execution, information disclosure, or data tampering." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@nvidia.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@nvidia.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-665" + } + ] + } + ], + "references": [ + { + "url": "https://nvidia.custhelp.com/app/answers/detail/a_id/5551", + "source": "psirt@nvidia.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-00xx/CVE-2024-0090.json b/CVE-2024/CVE-2024-00xx/CVE-2024-0090.json new file mode 100644 index 00000000000..9db37f2f259 --- /dev/null +++ b/CVE-2024/CVE-2024-00xx/CVE-2024-0090.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2024-0090", + "sourceIdentifier": "psirt@nvidia.com", + "published": "2024-06-13T22:15:12.170", + "lastModified": "2024-06-13T22:15:12.170", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "NVIDIA GPU driver for Windows and Linux contains a vulnerability where a user can cause an out-of-bounds write. A successful exploit of this vulnerability might lead to code execution, denial of service, escalation of privileges, information disclosure, and data tampering." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@nvidia.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@nvidia.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + } + ], + "references": [ + { + "url": "https://nvidia.custhelp.com/app/answers/detail/a_id/5551", + "source": "psirt@nvidia.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-00xx/CVE-2024-0091.json b/CVE-2024/CVE-2024-00xx/CVE-2024-0091.json new file mode 100644 index 00000000000..29034e2af42 --- /dev/null +++ b/CVE-2024/CVE-2024-00xx/CVE-2024-0091.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2024-0091", + "sourceIdentifier": "psirt@nvidia.com", + "published": "2024-06-13T22:15:12.430", + "lastModified": "2024-06-13T22:15:12.430", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "NVIDIA GPU Display Driver for Windows and Linux contains a vulnerability where a user can cause an untrusted pointer dereference by executing a driver API. A successful exploit of this vulnerability might lead to denial of service, information disclosure, and data tampering." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@nvidia.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@nvidia.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-822" + } + ] + } + ], + "references": [ + { + "url": "https://nvidia.custhelp.com/app/answers/detail/a_id/5551", + "source": "psirt@nvidia.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-00xx/CVE-2024-0092.json b/CVE-2024/CVE-2024-00xx/CVE-2024-0092.json new file mode 100644 index 00000000000..9f845a4c56a --- /dev/null +++ b/CVE-2024/CVE-2024-00xx/CVE-2024-0092.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2024-0092", + "sourceIdentifier": "psirt@nvidia.com", + "published": "2024-06-13T22:15:12.647", + "lastModified": "2024-06-13T22:15:12.647", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "NVIDIA GPU Driver for Windows and Linux contains a vulnerability where an improper check or improper handling of exception conditions might lead to denial of service." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@nvidia.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@nvidia.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-703" + } + ] + } + ], + "references": [ + { + "url": "https://nvidia.custhelp.com/app/answers/detail/a_id/5551", + "source": "psirt@nvidia.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-00xx/CVE-2024-0093.json b/CVE-2024/CVE-2024-00xx/CVE-2024-0093.json new file mode 100644 index 00000000000..60f512c140c --- /dev/null +++ b/CVE-2024/CVE-2024-00xx/CVE-2024-0093.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2024-0093", + "sourceIdentifier": "psirt@nvidia.com", + "published": "2024-06-13T22:15:12.863", + "lastModified": "2024-06-13T22:15:12.863", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "NVIDIA GPU software for Linux contains a vulnerability where it can expose sensitive information to an actor that is not explicitly authorized to have access to that information. A successful exploit of this vulnerability might lead to information disclosure." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@nvidia.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 6.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.0, + "impactScore": 4.0 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@nvidia.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-200" + } + ] + } + ], + "references": [ + { + "url": "https://nvidia.custhelp.com/app/answers/detail/a_id/5551", + "source": "psirt@nvidia.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-00xx/CVE-2024-0094.json b/CVE-2024/CVE-2024-00xx/CVE-2024-0094.json new file mode 100644 index 00000000000..77b157ce8d7 --- /dev/null +++ b/CVE-2024/CVE-2024-00xx/CVE-2024-0094.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2024-0094", + "sourceIdentifier": "psirt@nvidia.com", + "published": "2024-06-13T22:15:13.080", + "lastModified": "2024-06-13T22:15:13.080", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "NVIDIA vGPU software for Linux contains a vulnerability in the Virtual GPU Manager, where an untrusted guest VM can cause improper control of the interaction frequency in the host. A successful exploit of this vulnerability might lead to denial of service." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@nvidia.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@nvidia.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-799" + } + ] + } + ], + "references": [ + { + "url": "https://nvidia.custhelp.com/app/answers/detail/a_id/5551", + "source": "psirt@nvidia.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-00xx/CVE-2024-0095.json b/CVE-2024/CVE-2024-00xx/CVE-2024-0095.json new file mode 100644 index 00000000000..e898dcfce41 --- /dev/null +++ b/CVE-2024/CVE-2024-00xx/CVE-2024-0095.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2024-0095", + "sourceIdentifier": "psirt@nvidia.com", + "published": "2024-06-13T22:15:13.347", + "lastModified": "2024-06-13T22:15:13.347", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "NVIDIA Triton Inference Server for Linux and Windows contains a vulnerability where a user can inject forged logs and executable commands by injecting arbitrary data as a new log entry. A successful exploit of this vulnerability might lead to code execution, denial of service, escalation of privileges, information disclosure, and data tampering." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@nvidia.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:L/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "LOW", + "availabilityImpact": "HIGH", + "baseScore": 9.0, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 2.3, + "impactScore": 6.0 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@nvidia.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-117" + } + ] + } + ], + "references": [ + { + "url": "https://nvidia.custhelp.com/app/answers/detail/a_id/5546", + "source": "psirt@nvidia.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-00xx/CVE-2024-0099.json b/CVE-2024/CVE-2024-00xx/CVE-2024-0099.json new file mode 100644 index 00000000000..898afcee3c9 --- /dev/null +++ b/CVE-2024/CVE-2024-00xx/CVE-2024-0099.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2024-0099", + "sourceIdentifier": "psirt@nvidia.com", + "published": "2024-06-13T22:15:13.573", + "lastModified": "2024-06-13T22:15:13.573", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "NVIDIA vGPU software for Linux contains a vulnerability in the Virtual GPU Manager, where the guest OS could cause buffer overrun in the host. A successful exploit of this vulnerability might lead to information disclosure, data tampering, escalation of privileges, and denial of service." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@nvidia.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@nvidia.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-120" + } + ] + } + ], + "references": [ + { + "url": "https://nvidia.custhelp.com/app/answers/detail/a_id/5551", + "source": "psirt@nvidia.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-01xx/CVE-2024-0103.json b/CVE-2024/CVE-2024-01xx/CVE-2024-0103.json new file mode 100644 index 00000000000..dc116d0bf5d --- /dev/null +++ b/CVE-2024/CVE-2024-01xx/CVE-2024-0103.json @@ -0,0 +1,43 @@ +{ + "id": "CVE-2024-0103", + "sourceIdentifier": "psirt@nvidia.com", + "published": "2024-06-13T22:15:13.787", + "lastModified": "2024-06-13T22:15:13.787", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "NVIDIA Triton Inference Server for Linux contains a vulnerability where a user may cause an incorrect Initialization of resource by network issue. A successful exploit of this vulnerability may lead to information disclosure." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@nvidia.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.5 + } + ] + }, + "references": [ + { + "url": "https://nvidia.custhelp.com/app/answers/detail/a_id/5546", + "source": "psirt@nvidia.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-300xx/CVE-2024-30037.json b/CVE-2024/CVE-2024-300xx/CVE-2024-30037.json index fdf1400d1a6..56e1a1e667e 100644 --- a/CVE-2024/CVE-2024-300xx/CVE-2024-30037.json +++ b/CVE-2024/CVE-2024-300xx/CVE-2024-30037.json @@ -2,7 +2,7 @@ "id": "CVE-2024-30037", "sourceIdentifier": "secure@microsoft.com", "published": "2024-05-14T17:17:09.230", - "lastModified": "2024-05-14T19:17:55.627", + "lastModified": "2024-06-13T22:15:15.457", "vulnStatus": "Awaiting Analysis", "descriptions": [ { @@ -21,19 +21,19 @@ "type": "Primary", "cvssData": { "version": "3.1", - "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", - "attackVector": "NETWORK", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "LOCAL", "attackComplexity": "LOW", - "privilegesRequired": "NONE", + "privilegesRequired": "LOW", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "availabilityImpact": "HIGH", - "baseScore": 7.5, - "baseSeverity": "HIGH" + "baseScore": 5.5, + "baseSeverity": "MEDIUM" }, - "exploitabilityScore": 3.9, + "exploitabilityScore": 1.8, "impactScore": 3.6 } ] diff --git a/CVE-2024/CVE-2024-317xx/CVE-2024-31777.json b/CVE-2024/CVE-2024-317xx/CVE-2024-31777.json new file mode 100644 index 00000000000..b2bf2b5aaa3 --- /dev/null +++ b/CVE-2024/CVE-2024-317xx/CVE-2024-31777.json @@ -0,0 +1,20 @@ +{ + "id": "CVE-2024-31777", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-06-13T23:15:50.293", + "lastModified": "2024-06-13T23:15:50.293", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "File Upload vulnerability in openeclass v.3.15 and before allows an attacker to execute arbitrary code via a crafted file to the certbadge.php endpoint." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/FreySolarEye/Exploit-CVE-2024-31777", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-332xx/CVE-2024-33253.json b/CVE-2024/CVE-2024-332xx/CVE-2024-33253.json new file mode 100644 index 00000000000..532d6b148e2 --- /dev/null +++ b/CVE-2024/CVE-2024-332xx/CVE-2024-33253.json @@ -0,0 +1,20 @@ +{ + "id": "CVE-2024-33253", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-06-13T23:15:50.403", + "lastModified": "2024-06-13T23:15:50.403", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Cross-site scripting (XSS) vulnerability in GUnet OpenEclass E-learning Platform version 3.15 and before allows a authenticated privileged attacker to execute arbitrary code via the title and description fields of the badge template editing function." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/FreySolarEye/CVE/blob/master/GUnet%20OpenEclass%20E-learning%20platform%203.15%20-%20%27certbadge.php%27%20Stored%20Cross%20Site%20Scripting", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-374xx/CVE-2024-37408.json b/CVE-2024/CVE-2024-374xx/CVE-2024-37408.json index d367eb8680e..a1cc9facf83 100644 --- a/CVE-2024/CVE-2024-374xx/CVE-2024-37408.json +++ b/CVE-2024/CVE-2024-374xx/CVE-2024-37408.json @@ -2,16 +2,24 @@ "id": "CVE-2024-37408", "sourceIdentifier": "cve@mitre.org", "published": "2024-06-08T14:15:11.307", - "lastModified": "2024-06-10T02:52:08.267", + "lastModified": "2024-06-13T22:15:16.383", "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", - "value": "fprintd through 1.94.3 lacks a security attention mechanism, and thus unexpected actions might be authorized by \"auth sufficient pam_fprintd.so\" for Sudo." + "value": "fprintd through 1.94.3 lacks a security attention mechanism, and thus unexpected actions might be authorized by \"auth sufficient pam_fprintd.so\" for Sudo. NOTE: the supplier disputes this because they believe issue resolution would involve modifying the PAM configuration to restrict pam_fprintd.so to front-ends that implement a proper attention mechanism, not modifying pam_fprintd.so or fprintd." + }, + { + "lang": "es", + "value": "fprintd hasta 1.94.3 carece de un mecanismo de atenci\u00f3n de seguridad y, por lo tanto, es posible que se autoricen acciones inesperadas mediante \"auth suficiente pam_fprintd.so\" para Sudo." } ], "metrics": {}, "references": [ + { + "url": "http://www.openwall.com/lists/oss-security/2024/06/13/3", + "source": "cve@mitre.org" + }, { "url": "https://gitlab.freedesktop.org/libfprint/fprintd/-/releases", "source": "cve@mitre.org" @@ -23,6 +31,10 @@ { "url": "https://www.openwall.com/lists/oss-security/2024/05/30/3", "source": "cve@mitre.org" + }, + { + "url": "https://www.openwall.com/lists/oss-security/2024/06/13/2", + "source": "cve@mitre.org" } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-56xx/CVE-2024-5688.json b/CVE-2024/CVE-2024-56xx/CVE-2024-5688.json index cebb0604115..081770ab492 100644 --- a/CVE-2024/CVE-2024-56xx/CVE-2024-5688.json +++ b/CVE-2024/CVE-2024-56xx/CVE-2024-5688.json @@ -2,12 +2,12 @@ "id": "CVE-2024-5688", "sourceIdentifier": "security@mozilla.org", "published": "2024-06-11T13:15:50.347", - "lastModified": "2024-06-13T12:15:12.277", + "lastModified": "2024-06-13T23:15:50.490", "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", - "value": "If a garbage collection was triggered at the right time, a use-after-free could have occurred during object transplant. This vulnerability affects Firefox < 127 and Firefox ESR < 115.12." + "value": "If a garbage collection was triggered at the right time, a use-after-free could have occurred during object transplant. This vulnerability affects Firefox < 127, Firefox ESR < 115.12, and Thunderbird < 115.12." }, { "lang": "es", @@ -31,6 +31,10 @@ { "url": "https://www.mozilla.org/security/advisories/mfsa2024-26/", "source": "security@mozilla.org" + }, + { + "url": "https://www.mozilla.org/security/advisories/mfsa2024-28/", + "source": "security@mozilla.org" } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-56xx/CVE-2024-5690.json b/CVE-2024/CVE-2024-56xx/CVE-2024-5690.json index a054703ffae..ec3f6ac8b49 100644 --- a/CVE-2024/CVE-2024-56xx/CVE-2024-5690.json +++ b/CVE-2024/CVE-2024-56xx/CVE-2024-5690.json @@ -2,12 +2,12 @@ "id": "CVE-2024-5690", "sourceIdentifier": "security@mozilla.org", "published": "2024-06-11T13:15:50.553", - "lastModified": "2024-06-13T12:15:12.427", + "lastModified": "2024-06-13T23:15:50.570", "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", - "value": "By monitoring the time certain operations take, an attacker could have guessed which external protocol handlers were functional on a user's system. This vulnerability affects Firefox < 127 and Firefox ESR < 115.12." + "value": "By monitoring the time certain operations take, an attacker could have guessed which external protocol handlers were functional on a user's system. This vulnerability affects Firefox < 127, Firefox ESR < 115.12, and Thunderbird < 115.12." }, { "lang": "es", @@ -31,6 +31,10 @@ { "url": "https://www.mozilla.org/security/advisories/mfsa2024-26/", "source": "security@mozilla.org" + }, + { + "url": "https://www.mozilla.org/security/advisories/mfsa2024-28/", + "source": "security@mozilla.org" } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-56xx/CVE-2024-5691.json b/CVE-2024/CVE-2024-56xx/CVE-2024-5691.json index 4df001838e7..606f949bb29 100644 --- a/CVE-2024/CVE-2024-56xx/CVE-2024-5691.json +++ b/CVE-2024/CVE-2024-56xx/CVE-2024-5691.json @@ -2,12 +2,12 @@ "id": "CVE-2024-5691", "sourceIdentifier": "security@mozilla.org", "published": "2024-06-11T13:15:50.690", - "lastModified": "2024-06-13T12:15:12.500", + "lastModified": "2024-06-13T23:15:50.640", "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", - "value": "By tricking the browser with a `X-Frame-Options` header, a sandboxed iframe could have presented a button that, if clicked by a user, would bypass restrictions to open a new window. This vulnerability affects Firefox < 127 and Firefox ESR < 115.12." + "value": "By tricking the browser with a `X-Frame-Options` header, a sandboxed iframe could have presented a button that, if clicked by a user, would bypass restrictions to open a new window. This vulnerability affects Firefox < 127, Firefox ESR < 115.12, and Thunderbird < 115.12." }, { "lang": "es", @@ -31,6 +31,10 @@ { "url": "https://www.mozilla.org/security/advisories/mfsa2024-26/", "source": "security@mozilla.org" + }, + { + "url": "https://www.mozilla.org/security/advisories/mfsa2024-28/", + "source": "security@mozilla.org" } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-56xx/CVE-2024-5692.json b/CVE-2024/CVE-2024-56xx/CVE-2024-5692.json index 7583cb49584..2f294330194 100644 --- a/CVE-2024/CVE-2024-56xx/CVE-2024-5692.json +++ b/CVE-2024/CVE-2024-56xx/CVE-2024-5692.json @@ -2,20 +2,20 @@ "id": "CVE-2024-5692", "sourceIdentifier": "security@mozilla.org", "published": "2024-06-11T13:15:50.770", - "lastModified": "2024-06-11T13:54:12.057", + "lastModified": "2024-06-13T23:15:50.707", "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", - "value": "On Windows, when using the 'Save As' functionality, an attacker could have tricked the browser into saving the file with a disallowed extension such as `.url` by including an invalid character in the extension. *Note:* This issue only affected Windows operating systems. Other operating systems are unaffected. This vulnerability affects Firefox < 127 and Firefox ESR < 115.12." + "value": "On Windows 10, when using the 'Save As' functionality, an attacker could have tricked the browser into saving the file with a disallowed extension such as `.url` by including an invalid character in the extension. *Note:* This issue only affected Windows operating systems. Other operating systems are unaffected. This vulnerability affects Firefox < 127, Firefox ESR < 115.12, and Thunderbird < 115.12." + }, + { + "lang": "es", + "value": "En Windows, al utilizar la funci\u00f3n \"Guardar como\", un atacante podr\u00eda haber enga\u00f1ado al navegador para que guardara el archivo con una extensi\u00f3n no permitida como \".url\" al incluir un car\u00e1cter no v\u00e1lido en la extensi\u00f3n. *Nota:* Este problema solo afectaba a los sistemas operativos Windows. Otros sistemas operativos no se ven afectados. Esta vulnerabilidad afecta a Firefox < 127 y Firefox ESR < 115.12." } ], "metrics": {}, "references": [ - { - "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1837514", - "source": "security@mozilla.org" - }, { "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1891234", "source": "security@mozilla.org" @@ -27,6 +27,10 @@ { "url": "https://www.mozilla.org/security/advisories/mfsa2024-26/", "source": "security@mozilla.org" + }, + { + "url": "https://www.mozilla.org/security/advisories/mfsa2024-28/", + "source": "security@mozilla.org" } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-56xx/CVE-2024-5693.json b/CVE-2024/CVE-2024-56xx/CVE-2024-5693.json index 8ba8f41e0e2..ea6b34c5acf 100644 --- a/CVE-2024/CVE-2024-56xx/CVE-2024-5693.json +++ b/CVE-2024/CVE-2024-56xx/CVE-2024-5693.json @@ -2,12 +2,12 @@ "id": "CVE-2024-5693", "sourceIdentifier": "security@mozilla.org", "published": "2024-06-11T13:15:50.850", - "lastModified": "2024-06-13T12:15:12.563", + "lastModified": "2024-06-13T23:15:50.787", "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", - "value": "Offscreen Canvas did not properly track cross-origin tainting, which could be used to access image data from another site in violation of same-origin policy. This vulnerability affects Firefox < 127 and Firefox ESR < 115.12." + "value": "Offscreen Canvas did not properly track cross-origin tainting, which could be used to access image data from another site in violation of same-origin policy. This vulnerability affects Firefox < 127, Firefox ESR < 115.12, and Thunderbird < 115.12." }, { "lang": "es", @@ -31,6 +31,10 @@ { "url": "https://www.mozilla.org/security/advisories/mfsa2024-26/", "source": "security@mozilla.org" + }, + { + "url": "https://www.mozilla.org/security/advisories/mfsa2024-28/", + "source": "security@mozilla.org" } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-56xx/CVE-2024-5696.json b/CVE-2024/CVE-2024-56xx/CVE-2024-5696.json index a9b4b6e2bc3..da4020b0f04 100644 --- a/CVE-2024/CVE-2024-56xx/CVE-2024-5696.json +++ b/CVE-2024/CVE-2024-56xx/CVE-2024-5696.json @@ -2,12 +2,12 @@ "id": "CVE-2024-5696", "sourceIdentifier": "security@mozilla.org", "published": "2024-06-11T13:15:51.100", - "lastModified": "2024-06-13T12:15:12.630", + "lastModified": "2024-06-13T23:15:50.863", "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", - "value": "By manipulating the text in an `<input>` tag, an attacker could have caused corrupt memory leading to a potentially exploitable crash. This vulnerability affects Firefox < 127 and Firefox ESR < 115.12." + "value": "By manipulating the text in an `<input>` tag, an attacker could have caused corrupt memory leading to a potentially exploitable crash. This vulnerability affects Firefox < 127, Firefox ESR < 115.12, and Thunderbird < 115.12." }, { "lang": "es", @@ -31,6 +31,10 @@ { "url": "https://www.mozilla.org/security/advisories/mfsa2024-26/", "source": "security@mozilla.org" + }, + { + "url": "https://www.mozilla.org/security/advisories/mfsa2024-28/", + "source": "security@mozilla.org" } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-57xx/CVE-2024-5700.json b/CVE-2024/CVE-2024-57xx/CVE-2024-5700.json index c90204d1269..3d84235bd54 100644 --- a/CVE-2024/CVE-2024-57xx/CVE-2024-5700.json +++ b/CVE-2024/CVE-2024-57xx/CVE-2024-5700.json @@ -2,12 +2,12 @@ "id": "CVE-2024-5700", "sourceIdentifier": "security@mozilla.org", "published": "2024-06-11T13:15:51.417", - "lastModified": "2024-06-13T12:15:12.687", + "lastModified": "2024-06-13T23:15:50.943", "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", - "value": "Memory safety bugs present in Firefox 126, Firefox ESR 115.11, and Thunderbird 115.11. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox < 127 and Firefox ESR < 115.12." + "value": "Memory safety bugs present in Firefox 126, Firefox ESR 115.11, and Thunderbird 115.11. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox < 127, Firefox ESR < 115.12, and Thunderbird < 115.12." }, { "lang": "es", @@ -31,6 +31,10 @@ { "url": "https://www.mozilla.org/security/advisories/mfsa2024-26/", "source": "security@mozilla.org" + }, + { + "url": "https://www.mozilla.org/security/advisories/mfsa2024-28/", + "source": "security@mozilla.org" } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-57xx/CVE-2024-5702.json b/CVE-2024/CVE-2024-57xx/CVE-2024-5702.json index 8f33222204c..6713c46d66a 100644 --- a/CVE-2024/CVE-2024-57xx/CVE-2024-5702.json +++ b/CVE-2024/CVE-2024-57xx/CVE-2024-5702.json @@ -2,12 +2,12 @@ "id": "CVE-2024-5702", "sourceIdentifier": "security@mozilla.org", "published": "2024-06-11T13:15:51.573", - "lastModified": "2024-06-13T12:15:12.750", + "lastModified": "2024-06-13T23:15:51.020", "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", - "value": "Memory corruption in the networking stack could have led to a potentially exploitable crash. This vulnerability affects Firefox < 125 and Firefox ESR < 115.12." + "value": "Memory corruption in the networking stack could have led to a potentially exploitable crash. This vulnerability affects Firefox < 125, Firefox ESR < 115.12, and Thunderbird < 115.12." }, { "lang": "es", @@ -31,6 +31,10 @@ { "url": "https://www.mozilla.org/security/advisories/mfsa2024-26/", "source": "security@mozilla.org" + }, + { + "url": "https://www.mozilla.org/security/advisories/mfsa2024-28/", + "source": "security@mozilla.org" } ] } \ No newline at end of file diff --git a/README.md b/README.md index 5dae932f752..9676675b0d2 100644 --- a/README.md +++ b/README.md @@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2024-06-13T22:00:18.562370+00:00 +2024-06-13T23:55:17.979785+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2024-06-13T21:15:57.683000+00:00 +2024-06-13T23:15:51.020000+00:00 ``` ### Last Data Feed Release @@ -33,48 +33,44 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### Total Number of included CVEs ```plain -254010 +254024 ``` ### CVEs added in the last Commit -Recently added CVEs: `59` +Recently added CVEs: `14` -- [CVE-2024-32916](CVE-2024/CVE-2024-329xx/CVE-2024-32916.json) (`2024-06-13T21:15:55.533`) -- [CVE-2024-32917](CVE-2024/CVE-2024-329xx/CVE-2024-32917.json) (`2024-06-13T21:15:55.603`) -- [CVE-2024-32918](CVE-2024/CVE-2024-329xx/CVE-2024-32918.json) (`2024-06-13T21:15:55.683`) -- [CVE-2024-32919](CVE-2024/CVE-2024-329xx/CVE-2024-32919.json) (`2024-06-13T21:15:55.757`) -- [CVE-2024-32920](CVE-2024/CVE-2024-329xx/CVE-2024-32920.json) (`2024-06-13T21:15:55.830`) -- [CVE-2024-32921](CVE-2024/CVE-2024-329xx/CVE-2024-32921.json) (`2024-06-13T21:15:55.900`) -- [CVE-2024-32922](CVE-2024/CVE-2024-329xx/CVE-2024-32922.json) (`2024-06-13T21:15:55.970`) -- [CVE-2024-32923](CVE-2024/CVE-2024-329xx/CVE-2024-32923.json) (`2024-06-13T21:15:56.040`) -- [CVE-2024-32924](CVE-2024/CVE-2024-329xx/CVE-2024-32924.json) (`2024-06-13T21:15:56.113`) -- [CVE-2024-32925](CVE-2024/CVE-2024-329xx/CVE-2024-32925.json) (`2024-06-13T21:15:56.187`) -- [CVE-2024-32926](CVE-2024/CVE-2024-329xx/CVE-2024-32926.json) (`2024-06-13T21:15:56.253`) -- [CVE-2024-32929](CVE-2024/CVE-2024-329xx/CVE-2024-32929.json) (`2024-06-13T21:15:56.320`) -- [CVE-2024-32930](CVE-2024/CVE-2024-329xx/CVE-2024-32930.json) (`2024-06-13T21:15:56.390`) -- [CVE-2024-38083](CVE-2024/CVE-2024-380xx/CVE-2024-38083.json) (`2024-06-13T20:15:15.157`) -- [CVE-2024-38312](CVE-2024/CVE-2024-383xx/CVE-2024-38312.json) (`2024-06-13T20:15:15.370`) -- [CVE-2024-38313](CVE-2024/CVE-2024-383xx/CVE-2024-38313.json) (`2024-06-13T20:15:15.450`) -- [CVE-2024-4696](CVE-2024/CVE-2024-46xx/CVE-2024-4696.json) (`2024-06-13T20:15:15.697`) -- [CVE-2024-5924](CVE-2024/CVE-2024-59xx/CVE-2024-5924.json) (`2024-06-13T20:15:16.000`) -- [CVE-2024-5947](CVE-2024/CVE-2024-59xx/CVE-2024-5947.json) (`2024-06-13T20:15:16.277`) -- [CVE-2024-5948](CVE-2024/CVE-2024-59xx/CVE-2024-5948.json) (`2024-06-13T20:15:16.497`) -- [CVE-2024-5949](CVE-2024/CVE-2024-59xx/CVE-2024-5949.json) (`2024-06-13T20:15:16.710`) -- [CVE-2024-5950](CVE-2024/CVE-2024-59xx/CVE-2024-5950.json) (`2024-06-13T20:15:16.923`) -- [CVE-2024-5951](CVE-2024/CVE-2024-59xx/CVE-2024-5951.json) (`2024-06-13T20:15:17.140`) -- [CVE-2024-5952](CVE-2024/CVE-2024-59xx/CVE-2024-5952.json) (`2024-06-13T20:15:17.350`) -- [CVE-2024-5976](CVE-2024/CVE-2024-59xx/CVE-2024-5976.json) (`2024-06-13T21:15:57.683`) +- [CVE-2024-0084](CVE-2024/CVE-2024-00xx/CVE-2024-0084.json) (`2024-06-13T22:15:11.220`) +- [CVE-2024-0085](CVE-2024/CVE-2024-00xx/CVE-2024-0085.json) (`2024-06-13T22:15:11.483`) +- [CVE-2024-0086](CVE-2024/CVE-2024-00xx/CVE-2024-0086.json) (`2024-06-13T22:15:11.717`) +- [CVE-2024-0089](CVE-2024/CVE-2024-00xx/CVE-2024-0089.json) (`2024-06-13T22:15:11.940`) +- [CVE-2024-0090](CVE-2024/CVE-2024-00xx/CVE-2024-0090.json) (`2024-06-13T22:15:12.170`) +- [CVE-2024-0091](CVE-2024/CVE-2024-00xx/CVE-2024-0091.json) (`2024-06-13T22:15:12.430`) +- [CVE-2024-0092](CVE-2024/CVE-2024-00xx/CVE-2024-0092.json) (`2024-06-13T22:15:12.647`) +- [CVE-2024-0093](CVE-2024/CVE-2024-00xx/CVE-2024-0093.json) (`2024-06-13T22:15:12.863`) +- [CVE-2024-0094](CVE-2024/CVE-2024-00xx/CVE-2024-0094.json) (`2024-06-13T22:15:13.080`) +- [CVE-2024-0095](CVE-2024/CVE-2024-00xx/CVE-2024-0095.json) (`2024-06-13T22:15:13.347`) +- [CVE-2024-0099](CVE-2024/CVE-2024-00xx/CVE-2024-0099.json) (`2024-06-13T22:15:13.573`) +- [CVE-2024-0103](CVE-2024/CVE-2024-01xx/CVE-2024-0103.json) (`2024-06-13T22:15:13.787`) +- [CVE-2024-31777](CVE-2024/CVE-2024-317xx/CVE-2024-31777.json) (`2024-06-13T23:15:50.293`) +- [CVE-2024-33253](CVE-2024/CVE-2024-332xx/CVE-2024-33253.json) (`2024-06-13T23:15:50.403`) ### CVEs modified in the last Commit -Recently modified CVEs: `4` +Recently modified CVEs: `11` -- [CVE-2024-20404](CVE-2024/CVE-2024-204xx/CVE-2024-20404.json) (`2024-06-13T20:25:46.837`) -- [CVE-2024-36265](CVE-2024/CVE-2024-362xx/CVE-2024-36265.json) (`2024-06-13T21:15:57.170`) -- [CVE-2024-4030](CVE-2024/CVE-2024-40xx/CVE-2024-4030.json) (`2024-06-13T20:15:15.570`) -- [CVE-2024-5758](CVE-2024/CVE-2024-57xx/CVE-2024-5758.json) (`2024-06-13T21:15:57.543`) +- [CVE-2023-4039](CVE-2023/CVE-2023-40xx/CVE-2023-4039.json) (`2024-06-13T23:15:50.137`) +- [CVE-2024-30037](CVE-2024/CVE-2024-300xx/CVE-2024-30037.json) (`2024-06-13T22:15:15.457`) +- [CVE-2024-37408](CVE-2024/CVE-2024-374xx/CVE-2024-37408.json) (`2024-06-13T22:15:16.383`) +- [CVE-2024-5688](CVE-2024/CVE-2024-56xx/CVE-2024-5688.json) (`2024-06-13T23:15:50.490`) +- [CVE-2024-5690](CVE-2024/CVE-2024-56xx/CVE-2024-5690.json) (`2024-06-13T23:15:50.570`) +- [CVE-2024-5691](CVE-2024/CVE-2024-56xx/CVE-2024-5691.json) (`2024-06-13T23:15:50.640`) +- [CVE-2024-5692](CVE-2024/CVE-2024-56xx/CVE-2024-5692.json) (`2024-06-13T23:15:50.707`) +- [CVE-2024-5693](CVE-2024/CVE-2024-56xx/CVE-2024-5693.json) (`2024-06-13T23:15:50.787`) +- [CVE-2024-5696](CVE-2024/CVE-2024-56xx/CVE-2024-5696.json) (`2024-06-13T23:15:50.863`) +- [CVE-2024-5700](CVE-2024/CVE-2024-57xx/CVE-2024-5700.json) (`2024-06-13T23:15:50.943`) +- [CVE-2024-5702](CVE-2024/CVE-2024-57xx/CVE-2024-5702.json) (`2024-06-13T23:15:51.020`) ## Download and Usage diff --git a/_state.csv b/_state.csv index 54d11a7d6af..902f5676988 100644 --- a/_state.csv +++ b/_state.csv @@ -229899,7 +229899,7 @@ CVE-2023-40385,0,0,d87186e65fbe11c963d9f2ac49a37bea6de8f4a87feb525e072522d577fee CVE-2023-40386,0,0,98b5b9164e51a67fec2b119151c92fd2d9bb1d8d51de82443b681e79ce2c9a34,2023-10-12T01:59:56.563000 CVE-2023-40388,0,0,0669c38434b1494ed261fd2860ebba321deabd42233fd11611759d0565888e20,2023-10-12T01:59:05.793000 CVE-2023-40389,0,0,b193787b70f32e4c09ae93f27d418d82b25a00d1d832a208e6e4bfa799ec5d30,2024-06-12T18:05:20.887000 -CVE-2023-4039,0,0,0accd3adc8756cc7a927b7c908e91237d32e08c68f471a1067012290c829eea2,2024-02-19T23:15:07.680000 +CVE-2023-4039,0,1,8a91b063ac38fd90ed7bed4b3e92c53ba9e066c93e42a3299a924abadc9f3537,2024-06-13T23:15:50.137000 CVE-2023-40390,0,0,dcc08f1579a2804bdfa75d3a1e4b64bbe4a6a3affb5757b1219cc9eb8124a134,2024-04-08T22:42:58.650000 CVE-2023-40391,0,0,674710606efc5e20f3b4d034fd6151d2f994f0410f8a773be4faafb0e10f357d,2023-11-07T04:20:12.943000 CVE-2023-40392,0,0,84bd7104c6189c2c6e9b4ab3e6ad9d972f95c392c1e5bd1a44d7d7f201861784,2023-12-22T15:18:01.370000 @@ -240413,12 +240413,24 @@ CVE-2024-0080,0,0,6c0d206dd91620b9eed7dc804b37cabf92e6b94b99ac768289c8d5abe0e718 CVE-2024-0081,0,0,7224cfd553042ae01e2abfd02f661fee4ab9e15edf612773f3a2b6523001079f,2024-04-08T18:49:25.863000 CVE-2024-0082,0,0,2f8bf036b6ccf9a376740e76b27024fe830e6e0ae585ea5b083515d36ff830e7,2024-04-09T12:48:04.090000 CVE-2024-0083,0,0,ab832b2e89667613797d661d736b6cac31cc3f4854c5fe470b78e46bd7a9f856,2024-04-09T12:48:04.090000 +CVE-2024-0084,1,1,cddea74d28673a42c18fb8eb053052c28a8ea2c6607c73a307e73eb37219f680,2024-06-13T22:15:11.220000 +CVE-2024-0085,1,1,e6cc6b3c38c7ae8b941a130c98b75e6116f675295bcf978498eb5001aef1da82,2024-06-13T22:15:11.483000 +CVE-2024-0086,1,1,bc10c5aaf4c689b85426f7ca796e829e2e5b9eb1e0a42b3098fb4577943e3908,2024-06-13T22:15:11.717000 CVE-2024-0087,0,0,25406cc87c9f090863257773a589a6b71e65ad8d1a37691c9902bbbbb218b668,2024-05-14T16:13:02.773000 CVE-2024-0088,0,0,2bbc671241d85e5f91b28bf53a37285169148e904d0098d3839e6b13627a109f,2024-05-14T16:13:02.773000 +CVE-2024-0089,1,1,b978dd92d85bb7adda9e352f196d83a9fc71b62bedf725b09170694ff4d03a06,2024-06-13T22:15:11.940000 +CVE-2024-0090,1,1,dd3c726d8d2e08d823624fe2323a674a39110cc04b2cbd20d41e3ab6c24bb344,2024-06-13T22:15:12.170000 +CVE-2024-0091,1,1,abc5c30185bed4c257270ecc558db148cc3c475fbc215c8a2a77167cedf7a724,2024-06-13T22:15:12.430000 +CVE-2024-0092,1,1,5715c15c31bed55fbc69626a155df4d8ad4965761f22eb93ea1f4a1967e95320,2024-06-13T22:15:12.647000 +CVE-2024-0093,1,1,c6baf0498fabbfae66796f92183d09a667efcf96e05a1de81b52177d6f484d0d,2024-06-13T22:15:12.863000 +CVE-2024-0094,1,1,e9cb9b2e3122fbc36ead63fa66c995f4b78ce52ff7624939121215ebd4ee7120,2024-06-13T22:15:13.080000 +CVE-2024-0095,1,1,22fd4fc84caaaf43a44a21fec1846fdbca9fab0f7c70d56e53e76c3837e2e26c,2024-06-13T22:15:13.347000 CVE-2024-0096,0,0,b12c0b431c02ab9c95cbcff726f23352217766123b79fde967af76821617a93b,2024-05-14T16:13:02.773000 CVE-2024-0097,0,0,c6a65b776deeff11a3f5e884cbd77bfe0346e61623b4473c291407c9481a4930,2024-05-14T16:13:02.773000 CVE-2024-0098,0,0,b4cace3870399ecb99979eca71b219c7793c8ef31a1671c9ccd0779d01666e9a,2024-05-14T16:13:02.773000 +CVE-2024-0099,1,1,4aad329fa39aa534c071c489bf2ca8685022bc50bbcafffbc8fa35f8ac9f8084,2024-06-13T22:15:13.573000 CVE-2024-0100,0,0,bbf51d2ce3c3a951e3f6f4fb5d57dd8d1c73fdd75ab0ade8734c57fcf29d357b,2024-05-14T16:13:02.773000 +CVE-2024-0103,1,1,3be51ec9527a25e98d1a6ce953f8391d318794be6f19847c24d3744a59bdab90,2024-06-13T22:15:13.787000 CVE-2024-0151,0,0,aafc841cfb528b9ef4d150e11c8565679b9331c9ad5bf3569e38f74d72962c86,2024-04-25T08:15:07.420000 CVE-2024-0154,0,0,fee6d0edd38400fe9a2f331d67a355be9bc81701717352554939ef10dafbbf73,2024-03-13T18:15:58.530000 CVE-2024-0155,0,0,56d3003aea28bbff1e776f33de697fc847d720d7a8270931f6c22f264f5611eb,2024-03-04T13:58:23.447000 @@ -242279,7 +242291,7 @@ CVE-2024-2039,0,0,4f1e5a8a814f51edc0234cc5670da2107cc2a93a2ef1eadc628898e3eec44b CVE-2024-20391,0,0,f91eada0700f8cd9f2eaea2b871ba7d3969d87e51919a0eb478edbaaab6f3a9d,2024-05-15T18:35:11.453000 CVE-2024-20392,0,0,ace66ba4c79c3f433832bd6cfa0988701f79a2b5d6c0fbe5016f71bba33a0a9b,2024-05-15T18:35:11.453000 CVE-2024-20394,0,0,d0e5fc3a79dfeb923dc3f02320ce7649899cba8340301b836f168cfe3139baa9,2024-05-15T18:35:11.453000 -CVE-2024-20404,0,1,679bbd668c3128b9d2c298395d952eaf5fd76470dbc9bd0e765678566e0d175f,2024-06-13T20:25:46.837000 +CVE-2024-20404,0,0,679bbd668c3128b9d2c298395d952eaf5fd76470dbc9bd0e765678566e0d175f,2024-06-13T20:25:46.837000 CVE-2024-20405,0,0,149a9c8a606eeeb959182d0091d0a52736f4f99f39d68f4aa5b3e1cc0e82374e,2024-06-06T14:17:35.017000 CVE-2024-2041,0,0,f285d116ebee20fb02fc2c7de4f69fe8567e76fe9eda446fb7969801431b3d7d,2024-05-06T14:15:07.747000 CVE-2024-2042,0,0,67e98a9ddaa62c913ab5a6b6d5de4b0b93571e9b9955fcfed7d86ddfd42889ed,2024-03-17T22:38:29.433000 @@ -248094,16 +248106,16 @@ CVE-2024-29774,0,0,b6d746daf0a9f89389e69183d03895d6675922cbbb66d6ef5358d6a524251 CVE-2024-29775,0,0,4a09499ff17702a2e8ef2c1074beadb2ac9279eca85d85bf4c2322207b72a707,2024-03-27T15:49:41.437000 CVE-2024-29776,0,0,67fe7261841358aada487500133b48b2c1e7affe235fb97f4d75fa453ac843e5,2024-03-27T15:49:41.437000 CVE-2024-29777,0,0,54aa494ecd6d70eaf7fdbabe1fe6006b3d5e55e70d9a8bd4bbd26e15abfe4f5c,2024-03-27T15:49:41.437000 -CVE-2024-29778,1,1,8a718641436ca470f3420eb13edf31309b5ebcfc6400e0e0ddc424075c92115f,2024-06-13T21:15:51.857000 +CVE-2024-29778,0,0,8a718641436ca470f3420eb13edf31309b5ebcfc6400e0e0ddc424075c92115f,2024-06-13T21:15:51.857000 CVE-2024-2978,0,0,10402db073fcc83eb9c3960e5a0172007bd5a71eeec44391bbdfbccc34dc921e,2024-05-17T02:38:40.007000 -CVE-2024-29780,1,1,7802345143c1619102c67c551a62c310bd5fc69bd720130093ed8c9bb372aa59,2024-06-13T21:15:51.950000 -CVE-2024-29781,1,1,bed393c098e2681374eac2c9288454d19f596a9774c7555c8eebfe834ab95203,2024-06-13T21:15:52.027000 +CVE-2024-29780,0,0,7802345143c1619102c67c551a62c310bd5fc69bd720130093ed8c9bb372aa59,2024-06-13T21:15:51.950000 +CVE-2024-29781,0,0,bed393c098e2681374eac2c9288454d19f596a9774c7555c8eebfe834ab95203,2024-06-13T21:15:52.027000 CVE-2024-29782,0,0,b3ef752bb36677cb2cb857b2f5c52a9011917aac03b1bfb7c687eea310dd8059,2024-04-08T18:49:25.863000 CVE-2024-29783,0,0,cd9af9ff3159d1cd0b45408995f42f2ac24497312e47148a7866abe02669b66b,2024-04-08T18:49:25.863000 -CVE-2024-29784,1,1,fc0d729986474cadde2d53e992ff7f51485e2d06c64fd9547c226d773e334fdb,2024-06-13T21:15:52.110000 -CVE-2024-29785,1,1,95648056c6a9eb834d3af9ec1f16ee22c4b651a39fd284e8b0edeb47168bf276,2024-06-13T21:15:52.180000 -CVE-2024-29786,1,1,b6192be3fe5733eace50426231d6f96b4d98a023f430826742b8d3127e2d60a3,2024-06-13T21:15:52.257000 -CVE-2024-29787,1,1,2a6d0688478393ca28f01d5ffb5ff8d7c3ff8300a1fc0d86ee9f71072e4e1726,2024-06-13T21:15:52.340000 +CVE-2024-29784,0,0,fc0d729986474cadde2d53e992ff7f51485e2d06c64fd9547c226d773e334fdb,2024-06-13T21:15:52.110000 +CVE-2024-29785,0,0,95648056c6a9eb834d3af9ec1f16ee22c4b651a39fd284e8b0edeb47168bf276,2024-06-13T21:15:52.180000 +CVE-2024-29786,0,0,b6192be3fe5733eace50426231d6f96b4d98a023f430826742b8d3127e2d60a3,2024-06-13T21:15:52.257000 +CVE-2024-29787,0,0,2a6d0688478393ca28f01d5ffb5ff8d7c3ff8300a1fc0d86ee9f71072e4e1726,2024-06-13T21:15:52.340000 CVE-2024-29788,0,0,8cc2af0c2b669256f5779a8a4a350af2b3525bc2e92357d3051a10e492c80e6c,2024-03-27T15:49:41.437000 CVE-2024-29789,0,0,28405d77cf9c690089caf44c730ea92c38ee335fb6ea974e0cc4c214ee7b123f,2024-03-27T15:49:41.437000 CVE-2024-2979,0,0,a292112e5c65c94cb7e5874aae33d26b8dd263e3daabe71788a5100e1cf8c075,2024-05-17T02:38:40.103000 @@ -248348,7 +248360,7 @@ CVE-2024-30033,0,0,b411a2278af43a886a8aa482d52ba3ed702c53132871079531ef850272463 CVE-2024-30034,0,0,69b281fa5aee5765aa125d534a8a079fce8123d2977fb1d95f599f58514bf564,2024-05-14T19:17:55.627000 CVE-2024-30035,0,0,947badd97d18e7f340082ceed97b210357a7664e632f5b5ee2005d39c0016518,2024-05-14T19:17:55.627000 CVE-2024-30036,0,0,b1782da56fbc83d6b8fbafbfc28caaaa78d453820e3c6685ec2688cfdeb8dcc6,2024-05-14T19:17:55.627000 -CVE-2024-30037,0,0,aee6371facd2d1d803a16e5888d4299f4b0dd2a517d910232d799943cc75ec90,2024-05-14T19:17:55.627000 +CVE-2024-30037,0,1,20048f18f5498b2c7feb887e7277573261a025ffd35c0bc921d6f1dee70daeb0,2024-06-13T22:15:15.457000 CVE-2024-30038,0,0,3b876f89e14b9888fa5b54633c0f997357340a4ca7f76cc36956a7e9d05bf185,2024-05-14T19:17:55.627000 CVE-2024-30039,0,0,f566a6095a4d4ae13391f05ffd28cab0d3652edc21e2084c844f84ab5713ba0d,2024-05-14T19:17:55.627000 CVE-2024-3004,0,0,71915e722368909e423f6605c1a39e80314174f154a05fc792029d08b4718587,2024-05-17T02:39:40.003000 @@ -248370,8 +248382,8 @@ CVE-2024-30053,0,0,de0d3887ecd8088140dfe95e3f9311cc6a39bee41667e1f60a9fd1f03b4a7 CVE-2024-30054,0,0,4bef1769b874d4ff9047765ac17cb428233424000152b0497aba8ed1ea3cade9,2024-05-14T19:17:55.627000 CVE-2024-30055,0,0,3c1bf54fd3fe6c5ab3703162f359c88c3cd7915d8f1fdb651cdd28bec89280a6,2024-05-15T20:15:11.047000 CVE-2024-30056,0,0,9eabc96ede995114869bb3aef4380d7f915e132e425ada2ef8ddea79edd8b89e,2024-05-28T12:39:42.673000 -CVE-2024-30057,1,1,d5e3adb37d1f3ad2da847fb50797f1b6f031b08de200c44b22c90d35d987b71d,2024-06-13T20:15:12.457000 -CVE-2024-30058,1,1,7766eefaf7fc95d86cd9d3256ef1da696e5213ada40115dc1e9b307bb0b64114,2024-06-13T20:15:12.670000 +CVE-2024-30057,0,0,d5e3adb37d1f3ad2da847fb50797f1b6f031b08de200c44b22c90d35d987b71d,2024-06-13T20:15:12.457000 +CVE-2024-30058,0,0,7766eefaf7fc95d86cd9d3256ef1da696e5213ada40115dc1e9b307bb0b64114,2024-06-13T20:15:12.670000 CVE-2024-30059,0,0,0e87263445f5c97fb9a9f1ad7d5045c3390ca52e934287a08ee2b0f2dd5a42eb,2024-05-14T19:17:55.627000 CVE-2024-3006,0,0,a3349f2fae283580197c9d70e5010e27f73c2425a5df8de3e4af5a848c49e4b6,2024-05-17T02:39:40.117000 CVE-2024-30060,0,0,2d2a2a35846e7a2325ed3d83fd6e93b127058a9b2ed174c7bcd985716e44cfaf,2024-05-17T18:36:05.263000 @@ -249480,6 +249492,7 @@ CVE-2024-31759,0,0,7081cd22df5b9e4148ecc914176fc1f6cc04366073f8b1e4eccd8dfe4f2b7 CVE-2024-31760,0,0,7b1e0b53a94a63e7f108110799c5f85524efc23136fc5608e680b8482e690959,2024-04-17T12:48:07.510000 CVE-2024-3177,0,0,2008ffebb66b0a61152f0f24ed9f05ce25f1281b7375beddcc0948be7704366a,2024-05-01T19:15:27.480000 CVE-2024-31771,0,0,ff8520be95214caa53c179db5203622a3ac8aab5fb79285b7e95c6c65d540f74,2024-05-14T16:12:23.490000 +CVE-2024-31777,1,1,224f0da87d959a08e36c1e4bce58e8f5e23291a0edcaaccc1c5b86a921d61a27,2024-06-13T23:15:50.293000 CVE-2024-3178,0,0,e1b2edc538f836ffb506a17d476e0f961db2588242ddd1b2358ad3487cd818bf,2024-04-04T12:48:41.700000 CVE-2024-31783,0,0,39c4df7f07fa9e66dc5d42dd16bc0981c0d6511a0c96852796a6de0ccb03c2ac,2024-04-16T13:24:07.103000 CVE-2024-31784,0,0,0055eda0e2e2e3cebbac3d895c086f3674073feab99e847bee4ca99f9495a801,2024-04-16T13:24:07.103000 @@ -250265,48 +250278,48 @@ CVE-2024-32887,0,0,9a0b5c279911d37e81f985d5cbe7f0510b3ecf67815d6d232314f8cb4e8f9 CVE-2024-32888,0,0,7a68ca18ce854868222b80336c9ae247321c1bc54ae858519ceac6d797dd7bd4,2024-05-15T16:40:19.330000 CVE-2024-3289,0,0,0a89519093f9cc15ad64192809f4f71759d5d5d9d17d2eddf005a9c4c6b81228,2024-05-17T18:35:35.070000 CVE-2024-32890,0,0,80b53d257dbc47827b967a6ec22fc70e9bb39dae5de4579c97bb47ad58884e95,2024-05-01T13:01:51.263000 -CVE-2024-32891,1,1,85b564811297ebec4f8663a58fa9364ac403718e5bf238a246f9d11fb3faf0d0,2024-06-13T21:15:53.690000 -CVE-2024-32892,1,1,e73b8a4820f61bd178e8629b09756f338bd616344ecd2856f97969dffc0f679b,2024-06-13T21:15:53.770000 -CVE-2024-32893,1,1,339c538e4788c458fdfb7aba0edb59af876f00fd3b910d1dd2b3d36ebf1fe5c2,2024-06-13T21:15:53.847000 -CVE-2024-32894,1,1,f91cedc5de6cd6d870da9ff0ae7296610b084efc3648b4238c32c359970437dd,2024-06-13T21:15:53.923000 -CVE-2024-32895,1,1,a0a4fee8c3aec54bb4ec7888ee8f1af92e0d465fb72b3299ecb14b1d2f20e2bb,2024-06-13T21:15:53.997000 -CVE-2024-32896,1,1,de529b91864e2fe98f3df7a3bb5319783bdcb2c0402eb656f4bcff344e51f0df,2024-06-13T21:15:54.080000 -CVE-2024-32897,1,1,28804992e3942abd3cefccf3bd29be764363b156432b85fbc5d5b2a87bf4b1b8,2024-06-13T21:15:54.150000 -CVE-2024-32898,1,1,25086db624d94ec865dc32501d0c7098aac9c8edc3828da3895f3f904fba3faa,2024-06-13T21:15:54.223000 -CVE-2024-32899,1,1,755df3b1fe5c9c27a6b24bcd95b015e0049ed15bb0e6ff4b663b012b4e0fe5db,2024-06-13T21:15:54.287000 +CVE-2024-32891,0,0,85b564811297ebec4f8663a58fa9364ac403718e5bf238a246f9d11fb3faf0d0,2024-06-13T21:15:53.690000 +CVE-2024-32892,0,0,e73b8a4820f61bd178e8629b09756f338bd616344ecd2856f97969dffc0f679b,2024-06-13T21:15:53.770000 +CVE-2024-32893,0,0,339c538e4788c458fdfb7aba0edb59af876f00fd3b910d1dd2b3d36ebf1fe5c2,2024-06-13T21:15:53.847000 +CVE-2024-32894,0,0,f91cedc5de6cd6d870da9ff0ae7296610b084efc3648b4238c32c359970437dd,2024-06-13T21:15:53.923000 +CVE-2024-32895,0,0,a0a4fee8c3aec54bb4ec7888ee8f1af92e0d465fb72b3299ecb14b1d2f20e2bb,2024-06-13T21:15:53.997000 +CVE-2024-32896,0,0,de529b91864e2fe98f3df7a3bb5319783bdcb2c0402eb656f4bcff344e51f0df,2024-06-13T21:15:54.080000 +CVE-2024-32897,0,0,28804992e3942abd3cefccf3bd29be764363b156432b85fbc5d5b2a87bf4b1b8,2024-06-13T21:15:54.150000 +CVE-2024-32898,0,0,25086db624d94ec865dc32501d0c7098aac9c8edc3828da3895f3f904fba3faa,2024-06-13T21:15:54.223000 +CVE-2024-32899,0,0,755df3b1fe5c9c27a6b24bcd95b015e0049ed15bb0e6ff4b663b012b4e0fe5db,2024-06-13T21:15:54.287000 CVE-2024-3290,0,0,0ad1b84ced42c9f8a7789dc01b4a01dc3eea4ac518ae7e87d453cc71fd0f450a,2024-05-17T18:35:35.070000 -CVE-2024-32900,1,1,277b4f982dcfacfa482a4d75978e486293edd2b447d1ac7b573afc1e47d52e59,2024-06-13T21:15:54.357000 -CVE-2024-32901,1,1,b0f4d8b3bcdd91b0f5134bb8e64609b9ecb7aabc85e6f1be896d71b89f6773bc,2024-06-13T21:15:54.430000 -CVE-2024-32902,1,1,eb30f23ccbbf2cf04e66ff15216f5746bd650f99b19ae2d32bb3d62c2d645ff4,2024-06-13T21:15:54.503000 -CVE-2024-32903,1,1,25987070399c9242a9ac4ebfb37a4b23fa32e69d6ae2807cbeadf6c5d235733b,2024-06-13T21:15:54.583000 -CVE-2024-32904,1,1,de2fa0318c46fc79646e6c8f708753cbe6aa522354a94e0381989e53c52c3ecb,2024-06-13T21:15:54.657000 -CVE-2024-32905,1,1,b17e9363d0117717c19a91f391a4b55cac4d51cb3c377c18afd82a5921c9cac1,2024-06-13T21:15:54.730000 -CVE-2024-32906,1,1,f52365aab62a8ed59d394f7d4d4407d57c818701629734daaaa2c835eac70fd4,2024-06-13T21:15:54.810000 -CVE-2024-32907,1,1,38db2bd69bab006cea8dc7366c264ebac8ece7afe445dd9f9acbee3714756e3e,2024-06-13T21:15:54.877000 -CVE-2024-32908,1,1,9a993047e6a504e808699944f01196b4054511324e77afe16101f58bfc40444a,2024-06-13T21:15:54.957000 -CVE-2024-32909,1,1,131b0130e81a1757e7fbd3318e5071bc192edda314835e7e2ab0ee23f2195e70,2024-06-13T21:15:55.027000 +CVE-2024-32900,0,0,277b4f982dcfacfa482a4d75978e486293edd2b447d1ac7b573afc1e47d52e59,2024-06-13T21:15:54.357000 +CVE-2024-32901,0,0,b0f4d8b3bcdd91b0f5134bb8e64609b9ecb7aabc85e6f1be896d71b89f6773bc,2024-06-13T21:15:54.430000 +CVE-2024-32902,0,0,eb30f23ccbbf2cf04e66ff15216f5746bd650f99b19ae2d32bb3d62c2d645ff4,2024-06-13T21:15:54.503000 +CVE-2024-32903,0,0,25987070399c9242a9ac4ebfb37a4b23fa32e69d6ae2807cbeadf6c5d235733b,2024-06-13T21:15:54.583000 +CVE-2024-32904,0,0,de2fa0318c46fc79646e6c8f708753cbe6aa522354a94e0381989e53c52c3ecb,2024-06-13T21:15:54.657000 +CVE-2024-32905,0,0,b17e9363d0117717c19a91f391a4b55cac4d51cb3c377c18afd82a5921c9cac1,2024-06-13T21:15:54.730000 +CVE-2024-32906,0,0,f52365aab62a8ed59d394f7d4d4407d57c818701629734daaaa2c835eac70fd4,2024-06-13T21:15:54.810000 +CVE-2024-32907,0,0,38db2bd69bab006cea8dc7366c264ebac8ece7afe445dd9f9acbee3714756e3e,2024-06-13T21:15:54.877000 +CVE-2024-32908,0,0,9a993047e6a504e808699944f01196b4054511324e77afe16101f58bfc40444a,2024-06-13T21:15:54.957000 +CVE-2024-32909,0,0,131b0130e81a1757e7fbd3318e5071bc192edda314835e7e2ab0ee23f2195e70,2024-06-13T21:15:55.027000 CVE-2024-3291,0,0,d6a19598f7e10a631d5bbcd1a2f750e23f4c80cd3459568e72df6ee3f204db32,2024-05-17T18:35:35.070000 -CVE-2024-32910,1,1,c6af37bd024580e75685c21d7f4e8f3907f49b5b02cae143cbcaad999157d92b,2024-06-13T21:15:55.103000 -CVE-2024-32911,1,1,b5fb20bb3c40facf053563c01555f6a64079b16a77de849095ad13c97aa8e29a,2024-06-13T21:15:55.173000 -CVE-2024-32912,1,1,634135885a509e4a36f045a3a779195f5688657db04a4f1d25901d799fea109d,2024-06-13T21:15:55.250000 -CVE-2024-32913,1,1,3a92d4db03d0e1c47d50821e644dd0568afc633181faaac212bfeb54e3fe52a0,2024-06-13T21:15:55.327000 -CVE-2024-32914,1,1,09469046ba0919481434190bd20c4494739c17132285ad72a41cac93a026a08b,2024-06-13T21:15:55.393000 -CVE-2024-32915,1,1,79a72f225ed03e5ed840c3187e9c5bd2f6e55904bdbe8be321127bf9f662f181,2024-06-13T21:15:55.467000 -CVE-2024-32916,1,1,c6d38e31c2d7ba0ea2ec2173b989a7a4fb42083089fbbf95bc4d07149201742d,2024-06-13T21:15:55.533000 -CVE-2024-32917,1,1,06d09fcd9d5781bb2443e5b7dd5e8b1d4dacee8be51c939ee27bccfe350d9570,2024-06-13T21:15:55.603000 -CVE-2024-32918,1,1,0c0d5094b3f81675ef9244e32cc3ddc21eaf6e4786d7655f08fbff5a341ead45,2024-06-13T21:15:55.683000 -CVE-2024-32919,1,1,c634cc79d645f0b257a982cfcb864d6dc70931fd2bcd1ce4f8207b26fdebf775,2024-06-13T21:15:55.757000 +CVE-2024-32910,0,0,c6af37bd024580e75685c21d7f4e8f3907f49b5b02cae143cbcaad999157d92b,2024-06-13T21:15:55.103000 +CVE-2024-32911,0,0,b5fb20bb3c40facf053563c01555f6a64079b16a77de849095ad13c97aa8e29a,2024-06-13T21:15:55.173000 +CVE-2024-32912,0,0,634135885a509e4a36f045a3a779195f5688657db04a4f1d25901d799fea109d,2024-06-13T21:15:55.250000 +CVE-2024-32913,0,0,3a92d4db03d0e1c47d50821e644dd0568afc633181faaac212bfeb54e3fe52a0,2024-06-13T21:15:55.327000 +CVE-2024-32914,0,0,09469046ba0919481434190bd20c4494739c17132285ad72a41cac93a026a08b,2024-06-13T21:15:55.393000 +CVE-2024-32915,0,0,79a72f225ed03e5ed840c3187e9c5bd2f6e55904bdbe8be321127bf9f662f181,2024-06-13T21:15:55.467000 +CVE-2024-32916,0,0,c6d38e31c2d7ba0ea2ec2173b989a7a4fb42083089fbbf95bc4d07149201742d,2024-06-13T21:15:55.533000 +CVE-2024-32917,0,0,06d09fcd9d5781bb2443e5b7dd5e8b1d4dacee8be51c939ee27bccfe350d9570,2024-06-13T21:15:55.603000 +CVE-2024-32918,0,0,0c0d5094b3f81675ef9244e32cc3ddc21eaf6e4786d7655f08fbff5a341ead45,2024-06-13T21:15:55.683000 +CVE-2024-32919,0,0,c634cc79d645f0b257a982cfcb864d6dc70931fd2bcd1ce4f8207b26fdebf775,2024-06-13T21:15:55.757000 CVE-2024-3292,0,0,43f6739e46180efa62ee88963aa9d9ac054bdf0e1bbbe57f2f9425d637d500e8,2024-05-17T18:35:35.070000 -CVE-2024-32920,1,1,c8432389271b281b5ccf18e0edf706b40f78e2f4e49aaffa2637063886c57c21,2024-06-13T21:15:55.830000 -CVE-2024-32921,1,1,6434ebe4ee194dd02b17a4784db476e1feaa8cfd811a09f572fbc7b48f12d32f,2024-06-13T21:15:55.900000 -CVE-2024-32922,1,1,430650bbbbc75aa89e2dd6c5dd9d974e8e40b0b9e2ad7e5e1d7962fb032a370a,2024-06-13T21:15:55.970000 -CVE-2024-32923,1,1,16a7432f1899ad0a70547087ee74d4317b8d33055e4a7b4bfbfb16f1a2d46e34,2024-06-13T21:15:56.040000 -CVE-2024-32924,1,1,f382d398018cffe1276d711482924dfd801192ea874e54c25f5233aa58c4823e,2024-06-13T21:15:56.113000 -CVE-2024-32925,1,1,57d6752b420e64440ab146f56d2f39ba5082666edac7e33470336ce01a179ed7,2024-06-13T21:15:56.187000 -CVE-2024-32926,1,1,b759c87f12d42f71c65baaeccec7bd569f331f9b7c69c54e01d7b328e7252ab8,2024-06-13T21:15:56.253000 -CVE-2024-32929,1,1,a76b7508102acd004ab9a23f5346aa9994deb585f17bb0d53ee2f8cf847fa475,2024-06-13T21:15:56.320000 +CVE-2024-32920,0,0,c8432389271b281b5ccf18e0edf706b40f78e2f4e49aaffa2637063886c57c21,2024-06-13T21:15:55.830000 +CVE-2024-32921,0,0,6434ebe4ee194dd02b17a4784db476e1feaa8cfd811a09f572fbc7b48f12d32f,2024-06-13T21:15:55.900000 +CVE-2024-32922,0,0,430650bbbbc75aa89e2dd6c5dd9d974e8e40b0b9e2ad7e5e1d7962fb032a370a,2024-06-13T21:15:55.970000 +CVE-2024-32923,0,0,16a7432f1899ad0a70547087ee74d4317b8d33055e4a7b4bfbfb16f1a2d46e34,2024-06-13T21:15:56.040000 +CVE-2024-32924,0,0,f382d398018cffe1276d711482924dfd801192ea874e54c25f5233aa58c4823e,2024-06-13T21:15:56.113000 +CVE-2024-32925,0,0,57d6752b420e64440ab146f56d2f39ba5082666edac7e33470336ce01a179ed7,2024-06-13T21:15:56.187000 +CVE-2024-32926,0,0,b759c87f12d42f71c65baaeccec7bd569f331f9b7c69c54e01d7b328e7252ab8,2024-06-13T21:15:56.253000 +CVE-2024-32929,0,0,a76b7508102acd004ab9a23f5346aa9994deb585f17bb0d53ee2f8cf847fa475,2024-06-13T21:15:56.320000 CVE-2024-3293,0,0,3552485a27a6b6c8b2cadd17fbdb3e630238722099a3e2d8d97b0f239cd2dc1a,2024-04-23T12:52:26.253000 -CVE-2024-32930,1,1,c9a3dad6bacf07a79351e96d07f8f4de90b7c4d08a67481c973c36f158c5884c,2024-06-13T21:15:56.390000 +CVE-2024-32930,0,0,c9a3dad6bacf07a79351e96d07f8f4de90b7c4d08a67481c973c36f158c5884c,2024-06-13T21:15:56.390000 CVE-2024-32944,0,0,357727703d6a86b0d608eb9af0488af030fe8a85e9a27818f7be4cd525bf7172,2024-05-28T12:39:28.377000 CVE-2024-32947,0,0,35287e8f28304ee9599f9712f94ac6e419772e1d66820555100faf85f8aeebf3,2024-04-24T17:16:50.397000 CVE-2024-32948,0,0,b7a98470b717d7f23ae7cba102d8685641e5b820f696ab6effba04fa32abb77f,2024-04-24T13:39:42.883000 @@ -250429,6 +250442,7 @@ CVE-2024-33228,0,0,f3448597a287250f65febdc50573b1814b9e5e5281e20e4e28a9c439a03cb CVE-2024-3323,0,0,5322a19626f9d41fbc85f0f073b4efac313efc9902bda6b2387f115ed4ea09c7,2024-04-17T20:08:21.887000 CVE-2024-33247,0,0,66af889d7e6ada10bf314bd53454c582a1455dd661c7cb5b07f6d9cd6d1d400f,2024-04-25T13:18:02.660000 CVE-2024-33250,0,0,80f5075a1ccdf0bbe31bc42b408e98f86c2ee0faa43a99a4e3de76f2fa1f2732,2024-05-14T16:12:23.490000 +CVE-2024-33253,1,1,8dbedfd6e95946805a7cb4e3afdd8986042b4f8223267a8c40771a7120245aa0,2024-06-13T23:15:50.403000 CVE-2024-33255,0,0,4441e8c613117278c3bbaacb9c21a29fddafcd2bd1cac93b64de97baf3c9b0be,2024-04-26T15:32:22.523000 CVE-2024-33258,0,0,41d7b4e3d9e09b0d296b620041fceccfb75290061ed11a54c972d58a06b97783,2024-04-26T15:32:22.523000 CVE-2024-33259,0,0,80423b2f2a5ed9315f035176a4b15dcc22cbb638669092343148bea0fa9d0be1,2024-04-26T15:32:22.523000 @@ -252197,7 +252211,7 @@ CVE-2024-36255,0,0,22b21684452ad4563618ad5cee66dc719af723b04c8a1647fe9cf6d970347 CVE-2024-3626,0,0,668faec6d18ac8a7c33197af94901aaf7ddac1dec4c77c1d646fba224d5f8541,2024-05-24T01:15:30.977000 CVE-2024-36263,0,0,8fc77ae12c809e003508687bca8ef69500efdb9e489f26efe8ffb68dd267fd3b,2024-06-13T18:36:09.010000 CVE-2024-36264,0,0,3852f3a1f0d8a2d4f62090f3b6254d16b37a584c2a4799814e318aea1f24146e,2024-06-13T18:36:09.010000 -CVE-2024-36265,0,1,00a9e362e8a489eb7027d68fd71b14b08824e37d9652a79a38b01c7bc61baef1,2024-06-13T21:15:57.170000 +CVE-2024-36265,0,0,00a9e362e8a489eb7027d68fd71b14b08824e37d9652a79a38b01c7bc61baef1,2024-06-13T21:15:57.170000 CVE-2024-36266,0,0,83df454a9d264cabc9c075046ae12e249cd453c24f6de612ee1d9f73df0ef774,2024-06-11T13:54:12.057000 CVE-2024-36267,0,0,5b402628b4c430b8eab614a5b3330f6f2d186537f83ff9a60bb1a91e4b3c3cac,2024-05-30T13:15:41.297000 CVE-2024-3628,0,0,ad2a38a3d431944b5239dd67ace3bcd2603e3057c8d0a04d847db45516b0c9ea,2024-05-07T13:39:32.710000 @@ -252583,7 +252597,7 @@ CVE-2024-3739,0,0,18ca969c974b63c6d16494fbcc2d63756747cacc5947332fefb20d9c592537 CVE-2024-37393,0,0,adb4710ef8d4e8e5b898aa80bff6a41a92b599e232f1db44a8b62c91938837ef,2024-06-12T17:56:23.390000 CVE-2024-3740,0,0,1025f598f3437296a5a18526d2723c88eb3b5b46ea06c50b765dc694c6a0bd1a,2024-05-17T02:40:06.170000 CVE-2024-37407,0,0,aec5c198a3463e3996afdb2b87dcd156119620da199d8e9853297e329cd2e74b,2024-06-10T02:52:08.267000 -CVE-2024-37408,0,0,43de84338ac833cd78092ec836ae8beffbac830f1aa1a52e6c8ca816bfb77c27,2024-06-10T02:52:08.267000 +CVE-2024-37408,0,1,0d464a9182b8796127fe76e81543c3cd0ff4f74d6140915de1bb8aefdfd33a67,2024-06-13T22:15:16.383000 CVE-2024-3741,0,0,a12bddc029cd8ca7f24831417695630babe629dc15b981c15e3d0a9ffa405fdc,2024-05-28T17:15:11.327000 CVE-2024-3742,0,0,78c61e704f37a9137f7f9be10f02b0ed07c0bef31d61c3d6452a359112382921,2024-05-28T17:15:11.450000 CVE-2024-3743,0,0,a066d49023268d129172d910e0990b3a457ebf914ca5a08a9f020fc0da48a3af,2024-05-02T18:00:37.360000 @@ -252657,7 +252671,7 @@ CVE-2024-3804,0,0,6cbbef68e2216a1b6714fc89ff2a16fd432ad36dd1cabadaff597df2e56ce6 CVE-2024-3806,0,0,de873f8585a077f47d9a3aa2ddc3d8a1a22e9124cbb6f60c98787e1f14a35570,2024-05-14T16:11:39.510000 CVE-2024-3807,0,0,0018248fbe5cd3ad3d19de6c834f7e1f73352b7bbd9c92aa03f6a65e0b3f3d96,2024-05-14T16:11:39.510000 CVE-2024-3808,0,0,39d88812c006142e5fcd1316bc5358a96100b3e812a4968772ff781eaaa6617c,2024-05-14T16:11:39.510000 -CVE-2024-38083,1,1,90c00a7e126d0ca34cbb6d6ad2c3a0aca252abe0bc479951447196a92586f216,2024-06-13T20:15:15.157000 +CVE-2024-38083,0,0,90c00a7e126d0ca34cbb6d6ad2c3a0aca252abe0bc479951447196a92586f216,2024-06-13T20:15:15.157000 CVE-2024-3809,0,0,a034925aa5fbdeb8d8f213935fba76e152f9c290a4a5d18c12398fefebad7ce4,2024-05-14T16:11:39.510000 CVE-2024-3810,0,0,915db751860884c5792da450ac833c5ebf7363681c09a171e26d38502a8840c3,2024-05-20T13:00:34.807000 CVE-2024-3811,0,0,06c7e681130e5c23fc15839cbcd4895e2d61ac5545ff467d39f3bf28a1e3b8cd,2024-05-20T13:00:34.807000 @@ -252684,8 +252698,8 @@ CVE-2024-38293,0,0,a9b1fe23a5b7aceb305df22b9e5e69d11cc40f1bf66bedc9fa76d7158e801 CVE-2024-38294,0,0,5ead4befff2b61ceb0efdd186e7234e4e666514924ffa35ab4e04f3aea639e9b,2024-06-13T18:36:09.010000 CVE-2024-38295,0,0,c0872c7c53c37c26d78f688a94fd2e7f57965fc18ec3a253d1cbc168692f708b,2024-06-13T18:36:09.010000 CVE-2024-3831,0,0,28fa4e2fb2524144138a610966fa5501c7b19e1083bb04e4062bd6679bbd2a31,2024-05-14T16:11:39.510000 -CVE-2024-38312,1,1,81465ae5bdee0fc9336a542d9a86c0bbc552d86e5cf73dddb2bfb97008d1e27a,2024-06-13T20:15:15.370000 -CVE-2024-38313,1,1,627d40d28ae10d38e3b284ae2e4544be4d3fd31da53264defcd3ebc8d60f359a,2024-06-13T20:15:15.450000 +CVE-2024-38312,0,0,81465ae5bdee0fc9336a542d9a86c0bbc552d86e5cf73dddb2bfb97008d1e27a,2024-06-13T20:15:15.370000 +CVE-2024-38313,0,0,627d40d28ae10d38e3b284ae2e4544be4d3fd31da53264defcd3ebc8d60f359a,2024-06-13T20:15:15.450000 CVE-2024-3832,0,0,1075b96952121645fbb81b228e0c3813e39db7e21c4c9aa1fc24c30b61618c13,2024-04-23T18:15:15.187000 CVE-2024-3833,0,0,ba630503495cf2aaf1fce7ce704a30930ed35eb1665a53e19102e8c18f607a36,2024-05-03T03:16:28.940000 CVE-2024-3834,0,0,a6e69ceb5a64ba9dfba23cdfa4c02e2549bf746772815229f9a627159689f77e,2024-05-03T04:15:09.043000 @@ -252821,7 +252835,7 @@ CVE-2024-4022,0,0,862692e09b9131698fdf2d078f1715a141df0663671065e383928a8148e4ca CVE-2024-4024,0,0,ef64ae76a72fe30f0382303f22cba197d841a5535eb50d7c4ad40f3e475d662a,2024-04-25T17:25:05.903000 CVE-2024-4026,0,0,9eff728af4fb17cd0b046ae2444303f230bc7685cadbda3feb2bd1007c766627,2024-04-22T13:28:34.007000 CVE-2024-4029,0,0,afc8def3dff015c790bb6f1fba36f8919ca09d0c14ec4f09004e6bb6d31f1058,2024-05-02T18:00:37.360000 -CVE-2024-4030,0,1,c7e71f4aa9c8e1fed63372a5ecebe14dddf19d5400caf27393d092efafbf0f25,2024-06-13T20:15:15.570000 +CVE-2024-4030,0,0,c7e71f4aa9c8e1fed63372a5ecebe14dddf19d5400caf27393d092efafbf0f25,2024-06-13T20:15:15.570000 CVE-2024-4031,0,0,4baeaad68cf3411bf45d41e53c64aca0aa19dc8cf620cd2c5028b0d61a50ba2c,2024-04-23T12:52:09.397000 CVE-2024-4033,0,0,9c08f15b4d3308634dd41e6afc3001fb3d24483554aaa58982323fa330ce651a,2024-05-02T18:00:37.360000 CVE-2024-4034,0,0,fbbc9986eba42f39f504e14d62a8f5aac7c2749ef90d02af8ad89eb5ef4d1cca,2024-05-02T18:00:37.360000 @@ -253319,7 +253333,7 @@ CVE-2024-4688,0,0,5209c8e598df4232c95422a32cff4b63e70cf2beafa2b8b363e44607e8b05d CVE-2024-4689,0,0,919eb1a71c5b4e5442293f605f96c1f22f0a9c83e181a6bfcbc236f37312a073,2024-05-14T16:11:39.510000 CVE-2024-4693,0,0,ae34b03d329f3bae3c71df865f5758cc1e5a9a82168c01009bca2e974c902cf9,2024-05-14T16:11:39.510000 CVE-2024-4695,0,0,bd371315886ce25f9ceb7120c3bda7e4abd083c2b0897636d7648a840eeb16f9,2024-05-21T12:37:59.687000 -CVE-2024-4696,1,1,c05c407b8c6d1f7e35233e01717b00a62ac3b16ce5963db71cc5207a001d8b5f,2024-06-13T20:15:15.697000 +CVE-2024-4696,0,0,c05c407b8c6d1f7e35233e01717b00a62ac3b16ce5963db71cc5207a001d8b5f,2024-06-13T20:15:15.697000 CVE-2024-4697,0,0,8891ab9488132612016991587a4c415cc1459909a9846fa15d7484f4bad4aa37,2024-06-04T16:57:41.053000 CVE-2024-4698,0,0,d639d98ee1104ee74d5714ee622c1edbac6965c7ee7b0c944d45cd1653d552a0,2024-05-20T13:00:34.807000 CVE-2024-4699,0,0,21634a770b960d22aa24dc1f0ea343763012f9507287610a68f5378061204954,2024-05-17T02:40:33.683000 @@ -253919,21 +253933,21 @@ CVE-2024-5674,0,0,69b0f5cdcc6414c1b3093ac76e322fc42e17eb869b8f1b328084f458395232 CVE-2024-5675,0,0,c04fc1bf8ef6e3f232c30ddf0bd6a524958c9eab63fe205331e1fedef14ccf13,2024-06-11T18:14:02.017000 CVE-2024-5684,0,0,e183f6f3c944efddc1281bf86b4d20b3677f4c3ab127fc0c8f4bc522f6d9ba19,2024-06-11T18:13:30.163000 CVE-2024-5687,0,0,462616a340299eb021f948595697457aa449bd723bf07de403e8f8269f269fde,2024-06-11T13:54:12.057000 -CVE-2024-5688,0,0,7f1fe1d84ca624d192d2fb724198baaca7302a86c4913eab68abedb621f4cb87,2024-06-13T12:15:12.277000 +CVE-2024-5688,0,1,69d8cc15e435db53520a0b374c51ddee2a4c9131e86d6c869cac04768cb98c0c,2024-06-13T23:15:50.490000 CVE-2024-5689,0,0,4f410d9266634bd986e744eb8559ec451615a52b8eea36ea4f8bf68fc3b850d4,2024-06-11T13:54:12.057000 -CVE-2024-5690,0,0,ac861dce12b31044b05f6f6fe6f0fe83eb571bd4ec888afac298fea3bac76a5d,2024-06-13T12:15:12.427000 -CVE-2024-5691,0,0,08bd0230eb38412c4b5db4facbdf003320f50cba032a39e29f9a6d609e371660,2024-06-13T12:15:12.500000 -CVE-2024-5692,0,0,e48bb3812c504721cd34d802f67ffdadf0dd6b742d5e6c0ed90ff8e5318d7f9d,2024-06-11T13:54:12.057000 -CVE-2024-5693,0,0,8a411418234ce7a07e19962e240c671d08a5b17209382e508d2d24c743f226ce,2024-06-13T12:15:12.563000 +CVE-2024-5690,0,1,36c0ae2d8383b751a0972d323a5b065578074989df953548b2f72b78625203a7,2024-06-13T23:15:50.570000 +CVE-2024-5691,0,1,f368f92ed51a77af03643c7b05c776066c8f4fe35b7e068f2ff38afba48c0c02,2024-06-13T23:15:50.640000 +CVE-2024-5692,0,1,f00746d9dda797bb603caee0812b8c6f417c037755c16115b1d8dd4aa72145d7,2024-06-13T23:15:50.707000 +CVE-2024-5693,0,1,a6c16354638b0f59d50987020fcaf72d228a4aa1603cb7727ea9f435429751b5,2024-06-13T23:15:50.787000 CVE-2024-5694,0,0,aa2834dbf06e3957cd7e5b06ce48b632b0b1bea9e8a5d243274c30e4d133705f,2024-06-11T13:54:12.057000 CVE-2024-5695,0,0,aa5f03052a11170426e7a0ce58f6d9ec709b2a215a696c67577cfc53bb4ece2b,2024-06-11T13:54:12.057000 -CVE-2024-5696,0,0,d46f89edff0dd38b34dcdfc7398c221fd567a487b158d0c53ae9d4ce347b9383,2024-06-13T12:15:12.630000 +CVE-2024-5696,0,1,65f4f3eef74782e757c951843cc9fa6c029eded1af443563efe5ecddc04c5eda,2024-06-13T23:15:50.863000 CVE-2024-5697,0,0,d6ef87bb44484c2fd3d787945424253f6517461558939753340cc9af175a3a63,2024-06-11T13:54:12.057000 CVE-2024-5698,0,0,c16a79fbd4c4b219827962a844d6045999c01de67ef2d1c4cdaafa604a433c0d,2024-06-11T13:54:12.057000 CVE-2024-5699,0,0,b949f850e4c4079b463e32e2cd58b076e8b8024713a9727b47244a67dc641bb3,2024-06-11T13:54:12.057000 -CVE-2024-5700,0,0,581d0ffaf02660f0d610d579ef5069c434090bd2b21e65b9fa319c5db313e1f8,2024-06-13T12:15:12.687000 +CVE-2024-5700,0,1,92d851a28dc6a0cf1e89dda1698a94af0728730fac9009e8ae23bc0d1685cbe9,2024-06-13T23:15:50.943000 CVE-2024-5701,0,0,d4e32e5841fb5c694dbc3b06ee89abb2a6307fcc124dd00bcd8ff23789ef2aca,2024-06-11T13:54:12.057000 -CVE-2024-5702,0,0,1f7a26a9a71e2b21845b213939501edb95629a21d46b5b00b90e42d7f9fd68ad,2024-06-13T12:15:12.750000 +CVE-2024-5702,0,1,132133584f2c8a8af63186716eb284a7e155bef1da08058dd33dd36afa50e8f2,2024-06-13T23:15:51.020000 CVE-2024-5732,0,0,2b69cb5542c2f91e3e2021ac007049b3634a9137bdf0c325241236594abc7cc6,2024-06-11T17:57:13.767000 CVE-2024-5733,0,0,78152e13cdabf162486c62849d39e4c95e26727ad5623fb603c3826108c4ab9b,2024-06-11T18:30:50.690000 CVE-2024-5734,0,0,42e64867c1cdebe5031caec9548ec6393cd9bc290658f317ad4788de56fd156c,2024-06-11T18:30:16.727000 @@ -253941,7 +253955,7 @@ CVE-2024-5739,0,0,4e4cf687173db1796e93002e6527d7eafacb6ad9e3e1f9441d82638a10b1e4 CVE-2024-5742,0,0,9a235010bf640cd00db18ec82f470058ad537b7f91954f8c3bb8d7def4b6bd02,2024-06-13T18:36:09.010000 CVE-2024-5745,0,0,8788b99580d43fd9eb900afb700ee157c954d289b603d58451eabd57873852f0,2024-06-08T04:15:10.027000 CVE-2024-5757,0,0,724eb4698fe887b377a8685a53f97d3ccede96ff2077bff16bf350d6fdc9c2ea,2024-06-13T18:36:09.010000 -CVE-2024-5758,0,1,250b274bfcefb72defbd26103c82d5c8ed585b7571d3785565c3013fdb6e4a03,2024-06-13T21:15:57.543000 +CVE-2024-5758,0,0,250b274bfcefb72defbd26103c82d5c8ed585b7571d3785565c3013fdb6e4a03,2024-06-13T21:15:57.543000 CVE-2024-5759,0,0,a8b20ed9df5a502bc1dbe4283a67eed19771ffb4a4f02a90724215ed5101a898,2024-06-13T18:36:09.010000 CVE-2024-5761,0,0,e0022a8d80317cd3941058bae14b514f68707790a5051038049a1d552ba8de69,2024-06-07T19:15:24.467000 CVE-2024-5766,0,0,86ed0bd8ec5f973a61dc526186a645f1ec84961008a0f608efabd599d39dbfeb,2024-06-10T02:52:08.267000 @@ -254000,12 +254014,12 @@ CVE-2024-5906,0,0,b7fc466b9931ce265a1ef81017e39098b5ad31bf494bc22103ede7f6c2cace CVE-2024-5907,0,0,17327a712757852c4b43c811f24252c9a6d5917388dc8b093882f86e14b7ae5b,2024-06-13T18:36:09.010000 CVE-2024-5908,0,0,626d4ee0c59c97ce53ee1de5871da8e08f754ec4c69aaf4477321803dc309ac6,2024-06-13T18:36:09.010000 CVE-2024-5909,0,0,135cc10869213a459dd71b8b5da7a5af9b37ed5f304a5a3bf425c78b00034c69,2024-06-13T18:36:09.010000 -CVE-2024-5924,1,1,438088c749c41e8a857bb4f65ff1d6cd1a3b8d6ce928b5f77def0d7840d9ba6b,2024-06-13T20:15:16 +CVE-2024-5924,0,0,438088c749c41e8a857bb4f65ff1d6cd1a3b8d6ce928b5f77def0d7840d9ba6b,2024-06-13T20:15:16 CVE-2024-5927,0,0,19c3cc8f6784d442d3026759cebf43551fd4d736175a291c91056bccb3b59092,2024-06-13T11:15:48.917000 -CVE-2024-5947,1,1,3c58f721b6b3c4fe37b30e11263f49bf54ef5cfb5080003f8ed6c78c3edecc35,2024-06-13T20:15:16.277000 -CVE-2024-5948,1,1,a41798016fce7632d913db1f1eefce6a935342934919a20855dd0790fd7ec26a,2024-06-13T20:15:16.497000 -CVE-2024-5949,1,1,b3986a8edb1512233064a5da51557c0fa4f711ec9b142a106f76745321d3cef5,2024-06-13T20:15:16.710000 -CVE-2024-5950,1,1,1f86aa27bca5269525cdd401ce251fe2cb91fad6e36bea2e480bcbcdf6032a6e,2024-06-13T20:15:16.923000 -CVE-2024-5951,1,1,fff68899d3009d75df7027ceba73ebc8730458ee33bb67011fd27dc83f85a1f2,2024-06-13T20:15:17.140000 -CVE-2024-5952,1,1,417f3877151c0966e5133a5fd225fe602bd3ee4917b6bc769756fb14d3a30c86,2024-06-13T20:15:17.350000 -CVE-2024-5976,1,1,ecb618f3a85b9ff189742506500564176d6ec763f555c7863213d109651f3a72,2024-06-13T21:15:57.683000 +CVE-2024-5947,0,0,3c58f721b6b3c4fe37b30e11263f49bf54ef5cfb5080003f8ed6c78c3edecc35,2024-06-13T20:15:16.277000 +CVE-2024-5948,0,0,a41798016fce7632d913db1f1eefce6a935342934919a20855dd0790fd7ec26a,2024-06-13T20:15:16.497000 +CVE-2024-5949,0,0,b3986a8edb1512233064a5da51557c0fa4f711ec9b142a106f76745321d3cef5,2024-06-13T20:15:16.710000 +CVE-2024-5950,0,0,1f86aa27bca5269525cdd401ce251fe2cb91fad6e36bea2e480bcbcdf6032a6e,2024-06-13T20:15:16.923000 +CVE-2024-5951,0,0,fff68899d3009d75df7027ceba73ebc8730458ee33bb67011fd27dc83f85a1f2,2024-06-13T20:15:17.140000 +CVE-2024-5952,0,0,417f3877151c0966e5133a5fd225fe602bd3ee4917b6bc769756fb14d3a30c86,2024-06-13T20:15:17.350000 +CVE-2024-5976,0,0,ecb618f3a85b9ff189742506500564176d6ec763f555c7863213d109651f3a72,2024-06-13T21:15:57.683000