From c4d1c0d49308f056bf00b73feecc0f7c67b2338e Mon Sep 17 00:00:00 2001 From: cad-safe-bot Date: Fri, 14 Jun 2024 10:03:11 +0000 Subject: [PATCH] Auto-Update: 2024-06-14T10:00:19.166132+00:00 --- CVE-2024/CVE-2024-251xx/CVE-2024-25142.json | 36 ++++++ CVE-2024/CVE-2024-329xx/CVE-2024-32989.json | 6 +- CVE-2024/CVE-2024-329xx/CVE-2024-32990.json | 6 +- CVE-2024/CVE-2024-362xx/CVE-2024-36287.json | 55 +++++++++ CVE-2024/CVE-2024-364xx/CVE-2024-36499.json | 55 +++++++++ CVE-2024/CVE-2024-365xx/CVE-2024-36500.json | 55 +++++++++ CVE-2024/CVE-2024-365xx/CVE-2024-36501.json | 55 +++++++++ CVE-2024/CVE-2024-365xx/CVE-2024-36502.json | 55 +++++++++ CVE-2024/CVE-2024-365xx/CVE-2024-36503.json | 55 +++++++++ CVE-2024/CVE-2024-371xx/CVE-2024-37182.json | 55 +++++++++ CVE-2024/CVE-2024-48xx/CVE-2024-4863.json | 51 +++++++++ CVE-2024/CVE-2024-54xx/CVE-2024-5464.json | 55 +++++++++ CVE-2024/CVE-2024-54xx/CVE-2024-5465.json | 55 +++++++++ CVE-2024/CVE-2024-55xx/CVE-2024-5577.json | 47 ++++++++ CVE-2024/CVE-2024-59xx/CVE-2024-5961.json | 40 +++++++ CVE-2024/CVE-2024-59xx/CVE-2024-5983.json | 22 ++-- CVE-2024/CVE-2024-59xx/CVE-2024-5984.json | 22 ++-- CVE-2024/CVE-2024-59xx/CVE-2024-5994.json | 4 + CVE-2024/CVE-2024-59xx/CVE-2024-5995.json | 59 ++++++++++ CVE-2024/CVE-2024-59xx/CVE-2024-5996.json | 59 ++++++++++ README.md | 74 +++++-------- _state.csv | 117 +++++++++++--------- 22 files changed, 914 insertions(+), 124 deletions(-) create mode 100644 CVE-2024/CVE-2024-251xx/CVE-2024-25142.json create mode 100644 CVE-2024/CVE-2024-362xx/CVE-2024-36287.json create mode 100644 CVE-2024/CVE-2024-364xx/CVE-2024-36499.json create mode 100644 CVE-2024/CVE-2024-365xx/CVE-2024-36500.json create mode 100644 CVE-2024/CVE-2024-365xx/CVE-2024-36501.json create mode 100644 CVE-2024/CVE-2024-365xx/CVE-2024-36502.json create mode 100644 CVE-2024/CVE-2024-365xx/CVE-2024-36503.json create mode 100644 CVE-2024/CVE-2024-371xx/CVE-2024-37182.json create mode 100644 CVE-2024/CVE-2024-48xx/CVE-2024-4863.json create mode 100644 CVE-2024/CVE-2024-54xx/CVE-2024-5464.json create mode 100644 CVE-2024/CVE-2024-54xx/CVE-2024-5465.json create mode 100644 CVE-2024/CVE-2024-55xx/CVE-2024-5577.json create mode 100644 CVE-2024/CVE-2024-59xx/CVE-2024-5961.json create mode 100644 CVE-2024/CVE-2024-59xx/CVE-2024-5995.json create mode 100644 CVE-2024/CVE-2024-59xx/CVE-2024-5996.json diff --git a/CVE-2024/CVE-2024-251xx/CVE-2024-25142.json b/CVE-2024/CVE-2024-251xx/CVE-2024-25142.json new file mode 100644 index 00000000000..7177aabca62 --- /dev/null +++ b/CVE-2024/CVE-2024-251xx/CVE-2024-25142.json @@ -0,0 +1,36 @@ +{ + "id": "CVE-2024-25142", + "sourceIdentifier": "security@apache.org", + "published": "2024-06-14T09:15:09.103", + "lastModified": "2024-06-14T09:15:09.103", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Use of Web Browser Cache Containing Sensitive Information vulnerability in Apache Airflow.\u00a0\n\nAirflow did not return \"Cache-Control\" header for dynamic content, which in case of some browsers could result in potentially storing sensitive data in local cache of the browser.\n\nThis issue affects Apache Airflow: before 2.9.2.\n\nUsers are recommended to upgrade to version 2.9.2, which fixes the issue.\n\n" + } + ], + "metrics": {}, + "weaknesses": [ + { + "source": "security@apache.org", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-525" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/apache/airflow/pull/39550", + "source": "security@apache.org" + }, + { + "url": "https://lists.apache.org/thread/cg1j28lk0fhzthk0of1g7vy7p2n1j7nr", + "source": "security@apache.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-329xx/CVE-2024-32989.json b/CVE-2024/CVE-2024-329xx/CVE-2024-32989.json index f401a84ca12..07a4e2134c7 100644 --- a/CVE-2024/CVE-2024-329xx/CVE-2024-32989.json +++ b/CVE-2024/CVE-2024-329xx/CVE-2024-32989.json @@ -2,7 +2,7 @@ "id": "CVE-2024-32989", "sourceIdentifier": "psirt@huawei.com", "published": "2024-05-14T15:37:21.000", - "lastModified": "2024-05-14T16:12:23.490", + "lastModified": "2024-06-14T08:15:40.147", "vulnStatus": "Awaiting Analysis", "descriptions": [ { @@ -55,6 +55,10 @@ "url": "https://consumer.huawei.com/en/support/bulletin/2024/5/", "source": "psirt@huawei.com" }, + { + "url": "https://consumer.huawei.com/en/support/bulletin/2024/6/", + "source": "psirt@huawei.com" + }, { "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-phones-202405-0000001902628049", "source": "psirt@huawei.com" diff --git a/CVE-2024/CVE-2024-329xx/CVE-2024-32990.json b/CVE-2024/CVE-2024-329xx/CVE-2024-32990.json index 96057113970..e4250b3cf62 100644 --- a/CVE-2024/CVE-2024-329xx/CVE-2024-32990.json +++ b/CVE-2024/CVE-2024-329xx/CVE-2024-32990.json @@ -2,7 +2,7 @@ "id": "CVE-2024-32990", "sourceIdentifier": "psirt@huawei.com", "published": "2024-05-14T15:37:21.587", - "lastModified": "2024-05-14T16:12:23.490", + "lastModified": "2024-06-14T08:15:40.410", "vulnStatus": "Awaiting Analysis", "descriptions": [ { @@ -55,6 +55,10 @@ "url": "https://consumer.huawei.com/en/support/bulletin/2024/5/", "source": "psirt@huawei.com" }, + { + "url": "https://consumer.huawei.com/en/support/bulletin/2024/6/", + "source": "psirt@huawei.com" + }, { "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-phones-202405-0000001902628049", "source": "psirt@huawei.com" diff --git a/CVE-2024/CVE-2024-362xx/CVE-2024-36287.json b/CVE-2024/CVE-2024-362xx/CVE-2024-36287.json new file mode 100644 index 00000000000..3ac4515c59b --- /dev/null +++ b/CVE-2024/CVE-2024-362xx/CVE-2024-36287.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2024-36287", + "sourceIdentifier": "responsibledisclosure@mattermost.com", + "published": "2024-06-14T09:15:09.450", + "lastModified": "2024-06-14T09:15:09.450", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Mattermost Desktop App versions <=5.7.0 fail to disable certain Electron debug flags which allows for bypassing\u00a0TCC restrictions on macOS." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "responsibledisclosure@mattermost.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 3.8, + "baseSeverity": "LOW" + }, + "exploitabilityScore": 2.0, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "responsibledisclosure@mattermost.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-693" + } + ] + } + ], + "references": [ + { + "url": "https://mattermost.com/security-updates", + "source": "responsibledisclosure@mattermost.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-364xx/CVE-2024-36499.json b/CVE-2024/CVE-2024-364xx/CVE-2024-36499.json new file mode 100644 index 00000000000..bf74ef2877b --- /dev/null +++ b/CVE-2024/CVE-2024-364xx/CVE-2024-36499.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2024-36499", + "sourceIdentifier": "psirt@huawei.com", + "published": "2024-06-14T08:15:40.523", + "lastModified": "2024-06-14T08:15:40.523", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Vulnerability of unauthorized screenshot capturing in the WMS module\nImpact: Successful exploitation of this vulnerability may affect service confidentiality." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@huawei.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:L", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "LOW", + "baseScore": 6.8, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.5, + "impactScore": 4.2 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@huawei.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-269" + } + ] + } + ], + "references": [ + { + "url": "https://consumer.huawei.com/en/support/bulletin/2024/6/", + "source": "psirt@huawei.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-365xx/CVE-2024-36500.json b/CVE-2024/CVE-2024-365xx/CVE-2024-36500.json new file mode 100644 index 00000000000..79962375c6e --- /dev/null +++ b/CVE-2024/CVE-2024-365xx/CVE-2024-36500.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2024-36500", + "sourceIdentifier": "psirt@huawei.com", + "published": "2024-06-14T08:15:40.783", + "lastModified": "2024-06-14T08:15:40.783", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Privilege escalation vulnerability in the AMS module\nImpact: Successful exploitation of this vulnerability may affect service confidentiality." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@huawei.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@huawei.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-269" + } + ] + } + ], + "references": [ + { + "url": "https://consumer.huawei.com/en/support/bulletin/2024/6/", + "source": "psirt@huawei.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-365xx/CVE-2024-36501.json b/CVE-2024/CVE-2024-365xx/CVE-2024-36501.json new file mode 100644 index 00000000000..7f60167e0cc --- /dev/null +++ b/CVE-2024/CVE-2024-365xx/CVE-2024-36501.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2024-36501", + "sourceIdentifier": "psirt@huawei.com", + "published": "2024-06-14T08:15:41.007", + "lastModified": "2024-06-14T08:15:41.007", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Memory management vulnerability in the boottime module\nImpact: Successful exploitation of this vulnerability can affect integrity." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@huawei.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "HIGH", + "baseScore": 5.6, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 0.8, + "impactScore": 4.7 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@huawei.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + } + ], + "references": [ + { + "url": "https://consumer.huawei.com/en/support/bulletin/2024/6/", + "source": "psirt@huawei.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-365xx/CVE-2024-36502.json b/CVE-2024/CVE-2024-365xx/CVE-2024-36502.json new file mode 100644 index 00000000000..d8c50e94c73 --- /dev/null +++ b/CVE-2024/CVE-2024-365xx/CVE-2024-36502.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2024-36502", + "sourceIdentifier": "psirt@huawei.com", + "published": "2024-06-14T08:15:41.240", + "lastModified": "2024-06-14T08:15:41.240", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Out-of-bounds read vulnerability in the audio module\nImpact: Successful exploitation of this vulnerability will affect availability." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@huawei.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 7.9, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.5, + "impactScore": 5.8 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@huawei.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-125" + } + ] + } + ], + "references": [ + { + "url": "https://consumer.huawei.com/en/support/bulletin/2024/6/", + "source": "psirt@huawei.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-365xx/CVE-2024-36503.json b/CVE-2024/CVE-2024-365xx/CVE-2024-36503.json new file mode 100644 index 00000000000..2608e6175d6 --- /dev/null +++ b/CVE-2024/CVE-2024-365xx/CVE-2024-36503.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2024-36503", + "sourceIdentifier": "psirt@huawei.com", + "published": "2024-06-14T08:15:41.463", + "lastModified": "2024-06-14T08:15:41.463", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Memory management vulnerability in the Gralloc module\nImpact: Successful exploitation of this vulnerability will affect availability." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@huawei.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "HIGH", + "baseScore": 7.3, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.5, + "impactScore": 4.7 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@huawei.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-908" + } + ] + } + ], + "references": [ + { + "url": "https://consumer.huawei.com/en/support/bulletin/2024/6/", + "source": "psirt@huawei.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-371xx/CVE-2024-37182.json b/CVE-2024/CVE-2024-371xx/CVE-2024-37182.json new file mode 100644 index 00000000000..b389097a2dd --- /dev/null +++ b/CVE-2024/CVE-2024-371xx/CVE-2024-37182.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2024-37182", + "sourceIdentifier": "responsibledisclosure@mattermost.com", + "published": "2024-06-14T09:15:10.013", + "lastModified": "2024-06-14T09:15:10.013", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Mattermost Desktop App versions <=5.7.0 fail to correctly prompt for permission when opening external URLs which allows\u00a0a remote attacker to force a victim over the Internet to run arbitrary programs on the victim's system\u00a0via custom URI schemes." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "responsibledisclosure@mattermost.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 4.7, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.6, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "responsibledisclosure@mattermost.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-693" + } + ] + } + ], + "references": [ + { + "url": "https://mattermost.com/security-updates", + "source": "responsibledisclosure@mattermost.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-48xx/CVE-2024-4863.json b/CVE-2024/CVE-2024-48xx/CVE-2024-4863.json new file mode 100644 index 00000000000..c9b8bb2853c --- /dev/null +++ b/CVE-2024/CVE-2024-48xx/CVE-2024-4863.json @@ -0,0 +1,51 @@ +{ + "id": "CVE-2024-4863", + "sourceIdentifier": "security@wordfence.com", + "published": "2024-06-14T09:15:10.613", + "lastModified": "2024-06-14T09:15:10.613", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "The Gutenberg Blocks with AI by Kadence WP \u2013 Page Builder Features plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the \u2018titleFont\u2019 parameter in all versions up to, and including, 3.2.38 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security@wordfence.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 6.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 3.1, + "impactScore": 2.7 + } + ] + }, + "references": [ + { + "url": "https://plugins.trac.wordpress.org/browser/kadence-blocks/trunk/includes/blocks/class-kadence-blocks-testimonial-block.php#L276", + "source": "security@wordfence.com" + }, + { + "url": "https://plugins.trac.wordpress.org/changeset/3091170/kadence-blocks/trunk/includes/blocks/class-kadence-blocks-testimonial-block.php", + "source": "security@wordfence.com" + }, + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/2e0cde65-f75c-4602-bffe-97b391a428b4?source=cve", + "source": "security@wordfence.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-54xx/CVE-2024-5464.json b/CVE-2024/CVE-2024-54xx/CVE-2024-5464.json new file mode 100644 index 00000000000..bc448ff63cd --- /dev/null +++ b/CVE-2024/CVE-2024-54xx/CVE-2024-5464.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2024-5464", + "sourceIdentifier": "psirt@huawei.com", + "published": "2024-06-14T08:15:41.710", + "lastModified": "2024-06-14T08:15:41.710", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Vulnerability of insufficient permission verification in the NearLink module\nImpact: Successful exploitation of this vulnerability may affect service confidentiality." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@huawei.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 4.0, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.5, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@huawei.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-200" + } + ] + } + ], + "references": [ + { + "url": "https://consumer.huawei.com/en/support/bulletin/2024/6/", + "source": "psirt@huawei.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-54xx/CVE-2024-5465.json b/CVE-2024/CVE-2024-54xx/CVE-2024-5465.json new file mode 100644 index 00000000000..cd9eb5dec72 --- /dev/null +++ b/CVE-2024/CVE-2024-54xx/CVE-2024-5465.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2024-5465", + "sourceIdentifier": "psirt@huawei.com", + "published": "2024-06-14T08:15:41.930", + "lastModified": "2024-06-14T08:15:41.930", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Function vulnerabilities in the Calendar module\nImpact: Successful exploitation of this vulnerability will affect availability." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@huawei.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 5.9, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.5, + "impactScore": 3.4 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@huawei.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-264" + } + ] + } + ], + "references": [ + { + "url": "https://consumer.huawei.com/en/support/bulletin/2024/6/", + "source": "psirt@huawei.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-55xx/CVE-2024-5577.json b/CVE-2024/CVE-2024-55xx/CVE-2024-5577.json new file mode 100644 index 00000000000..be396911b0e --- /dev/null +++ b/CVE-2024/CVE-2024-55xx/CVE-2024-5577.json @@ -0,0 +1,47 @@ +{ + "id": "CVE-2024-5577", + "sourceIdentifier": "security@wordfence.com", + "published": "2024-06-14T08:15:42.157", + "lastModified": "2024-06-14T08:15:42.157", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "The Where I Was, Where I Will Be plugin for WordPress is vulnerable to Remote File Inclusion in version <= 1.1.1 via the WIW_HEADER parameter of the /system/include/include_user.php file. This makes it possible for unauthenticated attackers to include and execute arbitrary files hosted on external servers, allowing the execution of any PHP code in those files. This can be used to bypass access controls, obtain sensitive data, or achieve code execution. This requires allow_url_include to be set to true in order to exploit, which is not commonly enabled." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security@wordfence.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "references": [ + { + "url": "https://plugins.trac.wordpress.org/browser/where-i-was-where-i-will-be/trunk/system/include/include_user.php", + "source": "security@wordfence.com" + }, + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/68e0f54d-08ec-4e41-ac9b-d72cdde5a724?source=cve", + "source": "security@wordfence.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-59xx/CVE-2024-5961.json b/CVE-2024/CVE-2024-59xx/CVE-2024-5961.json new file mode 100644 index 00000000000..7778ca60b86 --- /dev/null +++ b/CVE-2024/CVE-2024-59xx/CVE-2024-5961.json @@ -0,0 +1,40 @@ +{ + "id": "CVE-2024-5961", + "sourceIdentifier": "cvd@cert.pl", + "published": "2024-06-14T08:15:42.377", + "lastModified": "2024-06-14T08:15:42.377", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Improper neutralization of input during web page generation vulnerability in 2ClickPortal software allows reflected cross-site scripting\u00a0(XSS).\u00a0An attacker might trick somebody into using a crafted URL, which will cause a script to be run in user's browser.\u00a0This issue affects 2ClickPortal software versions from 7.2.31 through 7.6.4." + } + ], + "metrics": {}, + "weaknesses": [ + { + "source": "cvd@cert.pl", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://2clickportal.pl/", + "source": "cvd@cert.pl" + }, + { + "url": "https://cert.pl/en/posts/2024/06/CVE-2024-5961/", + "source": "cvd@cert.pl" + }, + { + "url": "https://cert.pl/posts/2024/06/CVE-2024-5961/", + "source": "cvd@cert.pl" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-59xx/CVE-2024-5983.json b/CVE-2024/CVE-2024-59xx/CVE-2024-5983.json index afa235b1507..6d057687dc7 100644 --- a/CVE-2024/CVE-2024-59xx/CVE-2024-5983.json +++ b/CVE-2024/CVE-2024-59xx/CVE-2024-5983.json @@ -2,7 +2,7 @@ "id": "CVE-2024-5983", "sourceIdentifier": "cna@vuldb.com", "published": "2024-06-14T02:15:10.173", - "lastModified": "2024-06-14T02:15:10.173", + "lastModified": "2024-06-14T08:15:42.550", "vulnStatus": "Received", "descriptions": [ { @@ -17,19 +17,19 @@ "type": "Secondary", "cvssData": { "version": "3.1", - "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", "attackVector": "NETWORK", "attackComplexity": "LOW", - "privilegesRequired": "LOW", + "privilegesRequired": "NONE", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "availabilityImpact": "LOW", - "baseScore": 6.3, - "baseSeverity": "MEDIUM" + "baseScore": 7.3, + "baseSeverity": "HIGH" }, - "exploitabilityScore": 2.8, + "exploitabilityScore": 3.9, "impactScore": 3.4 } ], @@ -39,17 +39,17 @@ "type": "Secondary", "cvssData": { "version": "2.0", - "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", + "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "accessVector": "NETWORK", "accessComplexity": "LOW", - "authentication": "SINGLE", + "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", - "baseScore": 6.5 + "baseScore": 7.5 }, - "baseSeverity": "MEDIUM", - "exploitabilityScore": 8.0, + "baseSeverity": "HIGH", + "exploitabilityScore": 10.0, "impactScore": 6.4, "acInsufInfo": false, "obtainAllPrivilege": false, diff --git a/CVE-2024/CVE-2024-59xx/CVE-2024-5984.json b/CVE-2024/CVE-2024-59xx/CVE-2024-5984.json index a31ee563c98..aafa6805981 100644 --- a/CVE-2024/CVE-2024-59xx/CVE-2024-5984.json +++ b/CVE-2024/CVE-2024-59xx/CVE-2024-5984.json @@ -2,7 +2,7 @@ "id": "CVE-2024-5984", "sourceIdentifier": "cna@vuldb.com", "published": "2024-06-14T02:15:10.443", - "lastModified": "2024-06-14T02:15:10.443", + "lastModified": "2024-06-14T08:15:42.843", "vulnStatus": "Received", "descriptions": [ { @@ -17,19 +17,19 @@ "type": "Secondary", "cvssData": { "version": "3.1", - "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", "attackVector": "NETWORK", "attackComplexity": "LOW", - "privilegesRequired": "LOW", + "privilegesRequired": "NONE", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "availabilityImpact": "LOW", - "baseScore": 6.3, - "baseSeverity": "MEDIUM" + "baseScore": 7.3, + "baseSeverity": "HIGH" }, - "exploitabilityScore": 2.8, + "exploitabilityScore": 3.9, "impactScore": 3.4 } ], @@ -39,17 +39,17 @@ "type": "Secondary", "cvssData": { "version": "2.0", - "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", + "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "accessVector": "NETWORK", "accessComplexity": "LOW", - "authentication": "SINGLE", + "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", - "baseScore": 6.5 + "baseScore": 7.5 }, - "baseSeverity": "MEDIUM", - "exploitabilityScore": 8.0, + "baseSeverity": "HIGH", + "exploitabilityScore": 10.0, "impactScore": 6.4, "acInsufInfo": false, "obtainAllPrivilege": false, diff --git a/CVE-2024/CVE-2024-59xx/CVE-2024-5994.json b/CVE-2024/CVE-2024-59xx/CVE-2024-5994.json index ff2385faf8d..b7b38b9bcf7 100644 --- a/CVE-2024/CVE-2024-59xx/CVE-2024-5994.json +++ b/CVE-2024/CVE-2024-59xx/CVE-2024-5994.json @@ -8,6 +8,10 @@ { "lang": "en", "value": "The WP Go Maps (formerly WP Google Maps) plugin for WordPress is vulnerable to Stored Cross-Site Scripting via Custom JS option in versions up to, and including, 9.0.38. This makes it possible for authenticated attackers that have been explicitly granted permissions by an administrator, with contributor-level permissions and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. Version 9.0.39 adds a caution to make administrators aware of the possibility for abuse if permissions are granted to lower-level users." + }, + { + "lang": "es", + "value": "El complemento WP Go Maps (anteriormente WP Google Maps) para WordPress es vulnerable a Cross-Site Scripting Almacenado a trav\u00e9s de la opci\u00f3n Custom JS en versiones hasta la 9.0.38 incluida. Esto hace posible que los atacantes autenticados a los que un administrador les ha otorgado permisos expl\u00edcitamente, con permisos de nivel de colaborador y superiores, inyecten scripts web arbitrarios en p\u00e1ginas que se ejecutar\u00e1n cada vez que un usuario acceda a una p\u00e1gina inyectada. La versi\u00f3n 9.0.39 agrega una advertencia para que los administradores sean conscientes de la posibilidad de abuso si se otorgan permisos a usuarios de nivel inferior." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-59xx/CVE-2024-5995.json b/CVE-2024/CVE-2024-59xx/CVE-2024-5995.json new file mode 100644 index 00000000000..a3201ab67df --- /dev/null +++ b/CVE-2024/CVE-2024-59xx/CVE-2024-5995.json @@ -0,0 +1,59 @@ +{ + "id": "CVE-2024-5995", + "sourceIdentifier": "twcert@cert.org.tw", + "published": "2024-06-14T08:15:43.097", + "lastModified": "2024-06-14T08:15:43.097", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "The notification emails sent by Soar Cloud HR Portal contain a link with a embedded session. The expiration of the session is not properly configured, remaining valid for more than 7 days and can be reused." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "twcert@cert.org.tw", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "twcert@cert.org.tw", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-613" + } + ] + } + ], + "references": [ + { + "url": "https://www.twcert.org.tw/en/cp-139-7872-1c8b4-2.html", + "source": "twcert@cert.org.tw" + }, + { + "url": "https://www.twcert.org.tw/tw/cp-132-7871-fecf1-1.html", + "source": "twcert@cert.org.tw" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-59xx/CVE-2024-5996.json b/CVE-2024/CVE-2024-59xx/CVE-2024-5996.json new file mode 100644 index 00000000000..200e6e1d6fc --- /dev/null +++ b/CVE-2024/CVE-2024-59xx/CVE-2024-5996.json @@ -0,0 +1,59 @@ +{ + "id": "CVE-2024-5996", + "sourceIdentifier": "twcert@cert.org.tw", + "published": "2024-06-14T09:15:11.010", + "lastModified": "2024-06-14T09:15:11.010", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "The notification emails sent by Soar Cloud HR Portal contain a link with a embedded session. These emails are sent without using an encrypted transmission protocol. If an attacker intercepts the packets, they can obtain the plaintext session information and use it to log into the system." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "twcert@cert.org.tw", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "twcert@cert.org.tw", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-319" + } + ] + } + ], + "references": [ + { + "url": "https://www.twcert.org.tw/en/cp-139-7874-b6727-2.html", + "source": "twcert@cert.org.tw" + }, + { + "url": "https://www.twcert.org.tw/tw/cp-132-7873-5ba4c-1.html", + "source": "twcert@cert.org.tw" + } + ] +} \ No newline at end of file diff --git a/README.md b/README.md index ba0cc6fccaf..841088b1d1f 100644 --- a/README.md +++ b/README.md @@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2024-06-14T08:00:19.274263+00:00 +2024-06-14T10:00:19.166132+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2024-06-14T07:15:51.130000+00:00 +2024-06-14T09:15:11.010000+00:00 ``` ### Last Data Feed Release @@ -33,63 +33,39 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### Total Number of included CVEs ```plain -254119 +254134 ``` ### CVEs added in the last Commit -Recently added CVEs: `28` +Recently added CVEs: `15` -- [CVE-2023-51497](CVE-2023/CVE-2023-514xx/CVE-2023-51497.json) (`2024-06-14T06:15:10.673`) -- [CVE-2024-1295](CVE-2024/CVE-2024-12xx/CVE-2024-1295.json) (`2024-06-14T06:15:10.937`) -- [CVE-2024-2122](CVE-2024/CVE-2024-21xx/CVE-2024-2122.json) (`2024-06-14T06:15:11.320`) -- [CVE-2024-2218](CVE-2024/CVE-2024-22xx/CVE-2024-2218.json) (`2024-06-14T06:15:11.570`) -- [CVE-2024-23504](CVE-2024/CVE-2024-235xx/CVE-2024-23504.json) (`2024-06-14T06:15:11.023`) -- [CVE-2024-31162](CVE-2024/CVE-2024-311xx/CVE-2024-31162.json) (`2024-06-14T07:15:50.153`) -- [CVE-2024-31163](CVE-2024/CVE-2024-311xx/CVE-2024-31163.json) (`2024-06-14T07:15:50.713`) -- [CVE-2024-3754](CVE-2024/CVE-2024-37xx/CVE-2024-3754.json) (`2024-06-14T06:15:11.950`) -- [CVE-2024-3965](CVE-2024/CVE-2024-39xx/CVE-2024-3965.json) (`2024-06-14T06:15:12.060`) -- [CVE-2024-3966](CVE-2024/CVE-2024-39xx/CVE-2024-3966.json) (`2024-06-14T06:15:12.170`) -- [CVE-2024-3971](CVE-2024/CVE-2024-39xx/CVE-2024-3971.json) (`2024-06-14T06:15:12.250`) -- [CVE-2024-3972](CVE-2024/CVE-2024-39xx/CVE-2024-3972.json) (`2024-06-14T06:15:12.330`) -- [CVE-2024-3977](CVE-2024/CVE-2024-39xx/CVE-2024-3977.json) (`2024-06-14T06:15:12.427`) -- [CVE-2024-3978](CVE-2024/CVE-2024-39xx/CVE-2024-3978.json) (`2024-06-14T06:15:12.520`) -- [CVE-2024-3992](CVE-2024/CVE-2024-39xx/CVE-2024-3992.json) (`2024-06-14T06:15:12.607`) -- [CVE-2024-3993](CVE-2024/CVE-2024-39xx/CVE-2024-3993.json) (`2024-06-14T06:15:12.680`) -- [CVE-2024-4005](CVE-2024/CVE-2024-40xx/CVE-2024-4005.json) (`2024-06-14T06:15:12.753`) -- [CVE-2024-4270](CVE-2024/CVE-2024-42xx/CVE-2024-4270.json) (`2024-06-14T06:15:12.827`) -- [CVE-2024-4271](CVE-2024/CVE-2024-42xx/CVE-2024-4271.json) (`2024-06-14T06:15:12.907`) -- [CVE-2024-4404](CVE-2024/CVE-2024-44xx/CVE-2024-4404.json) (`2024-06-14T06:15:12.987`) -- [CVE-2024-4480](CVE-2024/CVE-2024-44xx/CVE-2024-4480.json) (`2024-06-14T06:15:13.220`) -- [CVE-2024-4751](CVE-2024/CVE-2024-47xx/CVE-2024-4751.json) (`2024-06-14T06:15:13.297`) -- [CVE-2024-5155](CVE-2024/CVE-2024-51xx/CVE-2024-5155.json) (`2024-06-14T06:15:13.373`) -- [CVE-2024-5551](CVE-2024/CVE-2024-55xx/CVE-2024-5551.json) (`2024-06-14T06:15:13.443`) -- [CVE-2024-5994](CVE-2024/CVE-2024-59xx/CVE-2024-5994.json) (`2024-06-14T07:15:51.130`) +- [CVE-2024-25142](CVE-2024/CVE-2024-251xx/CVE-2024-25142.json) (`2024-06-14T09:15:09.103`) +- [CVE-2024-36287](CVE-2024/CVE-2024-362xx/CVE-2024-36287.json) (`2024-06-14T09:15:09.450`) +- [CVE-2024-36499](CVE-2024/CVE-2024-364xx/CVE-2024-36499.json) (`2024-06-14T08:15:40.523`) +- [CVE-2024-36500](CVE-2024/CVE-2024-365xx/CVE-2024-36500.json) (`2024-06-14T08:15:40.783`) +- [CVE-2024-36501](CVE-2024/CVE-2024-365xx/CVE-2024-36501.json) (`2024-06-14T08:15:41.007`) +- [CVE-2024-36502](CVE-2024/CVE-2024-365xx/CVE-2024-36502.json) (`2024-06-14T08:15:41.240`) +- [CVE-2024-36503](CVE-2024/CVE-2024-365xx/CVE-2024-36503.json) (`2024-06-14T08:15:41.463`) +- [CVE-2024-37182](CVE-2024/CVE-2024-371xx/CVE-2024-37182.json) (`2024-06-14T09:15:10.013`) +- [CVE-2024-4863](CVE-2024/CVE-2024-48xx/CVE-2024-4863.json) (`2024-06-14T09:15:10.613`) +- [CVE-2024-5464](CVE-2024/CVE-2024-54xx/CVE-2024-5464.json) (`2024-06-14T08:15:41.710`) +- [CVE-2024-5465](CVE-2024/CVE-2024-54xx/CVE-2024-5465.json) (`2024-06-14T08:15:41.930`) +- [CVE-2024-5577](CVE-2024/CVE-2024-55xx/CVE-2024-5577.json) (`2024-06-14T08:15:42.157`) +- [CVE-2024-5961](CVE-2024/CVE-2024-59xx/CVE-2024-5961.json) (`2024-06-14T08:15:42.377`) +- [CVE-2024-5995](CVE-2024/CVE-2024-59xx/CVE-2024-5995.json) (`2024-06-14T08:15:43.097`) +- [CVE-2024-5996](CVE-2024/CVE-2024-59xx/CVE-2024-5996.json) (`2024-06-14T09:15:11.010`) ### CVEs modified in the last Commit -Recently modified CVEs: `19` +Recently modified CVEs: `5` -- [CVE-2024-34055](CVE-2024/CVE-2024-340xx/CVE-2024-34055.json) (`2024-06-14T06:15:11.650`) -- [CVE-2024-5830](CVE-2024/CVE-2024-58xx/CVE-2024-5830.json) (`2024-06-14T06:15:13.690`) -- [CVE-2024-5831](CVE-2024/CVE-2024-58xx/CVE-2024-5831.json) (`2024-06-14T06:15:14.000`) -- [CVE-2024-5832](CVE-2024/CVE-2024-58xx/CVE-2024-5832.json) (`2024-06-14T06:15:14.293`) -- [CVE-2024-5833](CVE-2024/CVE-2024-58xx/CVE-2024-5833.json) (`2024-06-14T06:15:14.547`) -- [CVE-2024-5834](CVE-2024/CVE-2024-58xx/CVE-2024-5834.json) (`2024-06-14T06:15:14.953`) -- [CVE-2024-5835](CVE-2024/CVE-2024-58xx/CVE-2024-5835.json) (`2024-06-14T06:15:15.090`) -- [CVE-2024-5836](CVE-2024/CVE-2024-58xx/CVE-2024-5836.json) (`2024-06-14T06:15:15.463`) -- [CVE-2024-5837](CVE-2024/CVE-2024-58xx/CVE-2024-5837.json) (`2024-06-14T06:15:15.683`) -- [CVE-2024-5838](CVE-2024/CVE-2024-58xx/CVE-2024-5838.json) (`2024-06-14T06:15:15.887`) -- [CVE-2024-5839](CVE-2024/CVE-2024-58xx/CVE-2024-5839.json) (`2024-06-14T06:15:16.180`) -- [CVE-2024-5840](CVE-2024/CVE-2024-58xx/CVE-2024-5840.json) (`2024-06-14T06:15:16.280`) -- [CVE-2024-5841](CVE-2024/CVE-2024-58xx/CVE-2024-5841.json) (`2024-06-14T06:15:16.640`) -- [CVE-2024-5842](CVE-2024/CVE-2024-58xx/CVE-2024-5842.json) (`2024-06-14T06:15:16.913`) -- [CVE-2024-5843](CVE-2024/CVE-2024-58xx/CVE-2024-5843.json) (`2024-06-14T06:15:17.170`) -- [CVE-2024-5844](CVE-2024/CVE-2024-58xx/CVE-2024-5844.json) (`2024-06-14T06:15:17.517`) -- [CVE-2024-5845](CVE-2024/CVE-2024-58xx/CVE-2024-5845.json) (`2024-06-14T06:15:17.790`) -- [CVE-2024-5846](CVE-2024/CVE-2024-58xx/CVE-2024-5846.json) (`2024-06-14T06:15:18.070`) -- [CVE-2024-5847](CVE-2024/CVE-2024-58xx/CVE-2024-5847.json) (`2024-06-14T06:15:18.340`) +- [CVE-2024-32989](CVE-2024/CVE-2024-329xx/CVE-2024-32989.json) (`2024-06-14T08:15:40.147`) +- [CVE-2024-32990](CVE-2024/CVE-2024-329xx/CVE-2024-32990.json) (`2024-06-14T08:15:40.410`) +- [CVE-2024-5983](CVE-2024/CVE-2024-59xx/CVE-2024-5983.json) (`2024-06-14T08:15:42.550`) +- [CVE-2024-5984](CVE-2024/CVE-2024-59xx/CVE-2024-5984.json) (`2024-06-14T08:15:42.843`) +- [CVE-2024-5994](CVE-2024/CVE-2024-59xx/CVE-2024-5994.json) (`2024-06-14T07:15:51.130`) ## Download and Usage diff --git a/_state.csv b/_state.csv index 7af4b3abc19..7eff0449b53 100644 --- a/_state.csv +++ b/_state.csv @@ -237315,7 +237315,7 @@ CVE-2023-51371,0,0,3aedbdd2ebcefdee1d4ecc7e34ad4946769243f5b6156bf507da0f1e10c7a CVE-2023-51372,0,0,faf10f39d38879b1877c2b4b79fccfffa8ba55d0f2c230b96325f105b3943945,2024-01-05T04:53:29.053000 CVE-2023-51373,0,0,ec933750877dd764c811f2f21965ce53a21d0bcaec72c86a5800d7678bae3291,2024-01-05T04:53:36.090000 CVE-2023-51374,0,0,5cfd079eb630f7378776bd71d950f89ec6bc9672899c475804bfa5be25959bf1,2024-01-05T04:53:45.327000 -CVE-2023-51377,1,1,6736aa5d948f3cfcc9a13df1cf3d75a26277f1f33f8d0318acabe066b930f8ee,2024-06-14T06:15:09.687000 +CVE-2023-51377,0,0,6736aa5d948f3cfcc9a13df1cf3d75a26277f1f33f8d0318acabe066b930f8ee,2024-06-14T06:15:09.687000 CVE-2023-51378,0,0,cfb34f8c0413f5c8c80707e698b878e1dfc35501d7b8ccfdcfa56ee80ec9005e,2024-01-05T16:20:35.933000 CVE-2023-51379,0,0,16f24987d2353ca790b085f58095f212ea8af481563ccadbbfff7530ad2081cc,2023-12-29T15:30:21.787000 CVE-2023-5138,0,0,c9d3f5e8397e5d65043919751a1cd49595d1a257d57175d1bac5336e75f36521,2024-01-10T16:37:55.867000 @@ -237440,9 +237440,9 @@ CVE-2023-51491,0,0,9a630e61b90ae68231ccba63898cc12e25e82adc34d74019316f737ba08d8 CVE-2023-51492,0,0,0d58b27a14611c109e89a3494fa756a640689ff79517444f7259a888456dbe6f,2024-02-15T06:26:42.423000 CVE-2023-51493,0,0,f83cd3e9ef3ea1708a4f0f0755e074e9ad1d27d8d5ae20aecf4ecfd903ab0733,2024-02-15T06:26:48.450000 CVE-2023-51494,0,0,cdbe694111a067a670940f1f6937175f6a61a9c39ae4f116bd5e17bad447b32c,2024-06-10T02:52:08.267000 -CVE-2023-51495,1,1,16cb2cf6bd8adcc04924ca948a6a322c0a89bca458aad1dc5c7aa3715ad97a1d,2024-06-14T06:15:10.103000 -CVE-2023-51496,1,1,6e2c7ba18f5724f1a9f7dae7f52ccb642f0aeac4a1517a159272a83dd3994abf,2024-06-14T06:15:10.407000 -CVE-2023-51497,1,1,06332a05fd4ac3a075738e64fa946ef6f28695940ce2a827137f627290b76c0a,2024-06-14T06:15:10.673000 +CVE-2023-51495,0,0,16cb2cf6bd8adcc04924ca948a6a322c0a89bca458aad1dc5c7aa3715ad97a1d,2024-06-14T06:15:10.103000 +CVE-2023-51496,0,0,6e2c7ba18f5724f1a9f7dae7f52ccb642f0aeac4a1517a159272a83dd3994abf,2024-06-14T06:15:10.407000 +CVE-2023-51497,0,0,06332a05fd4ac3a075738e64fa946ef6f28695940ce2a827137f627290b76c0a,2024-06-14T06:15:10.673000 CVE-2023-51498,0,0,ab8c2beb319a6c51ec29052d217c30e93f2503597d7d0b7932e01b0c25bc46aa,2024-06-13T18:36:45.417000 CVE-2023-51499,0,0,b9b7f0cb79987f6473d87d127fe53323a00f8ae64e5778981713c6a91fb94ca1,2024-04-15T13:15:51.577000 CVE-2023-5150,0,0,2f5e1e90547bd29c8e7cd2b67cb1157d0145916e107fb086f39413bd0ac1897a,2024-05-17T02:32:51.870000 @@ -241487,7 +241487,7 @@ CVE-2024-1291,0,0,fe166acb5d95f395c2c2fc690290a718609fcb00811b1e4c9c8ca50b4e3f8d CVE-2024-1292,0,0,907fd2224f3cc98f6ddba430073b9fe125cb0f29dd99769274d8a3062533485a,2024-04-08T18:48:40.217000 CVE-2024-1293,0,0,51959b2d10b4ca1210a0917015b6e0ba4809214d01553289260d6a92beabc64d,2024-03-13T18:16:18.563000 CVE-2024-1294,0,0,1a6fde55ee17952393d258a28e1938bfe41cafec05fa305cc82057814b7c2b7d,2024-02-29T13:49:29.390000 -CVE-2024-1295,1,1,419aabd6237846c43090fedd4dce57ae3cb2efcc987065738ea727076fd19f81,2024-06-14T06:15:10.937000 +CVE-2024-1295,0,0,419aabd6237846c43090fedd4dce57ae3cb2efcc987065738ea727076fd19f81,2024-06-14T06:15:10.937000 CVE-2024-1296,0,0,ab648d9dba58ca530bb990b50d92c4f5ce9f591faa8fbeeb49385095b8425c33,2024-03-13T18:16:18.563000 CVE-2024-1297,0,0,1fc219bb038ab422185a999365115aff94759fe3e5ff94e3dc4180f1d6bc82d0,2024-02-20T19:50:53.960000 CVE-2024-1298,0,0,b14e73b9f89ef2bb5f90efe91191494dc122a0d6eae045ea12354e4504b4ff5a,2024-06-11T04:15:12.513000 @@ -242808,7 +242808,7 @@ CVE-2024-2118,0,0,cc7239e1911b2fedd7efefc2bcf43293737a1c458586fdac470d8d5bcdb87f CVE-2024-2119,0,0,fddfb28891aa483f76592c7c27b82101a08176e818c0033898539a16e1ac7da1,2024-05-22T12:46:53.887000 CVE-2024-2120,0,0,d869e2d6a05f40fd099ef5d11b57f9e00d7f0b266e38148b71c8a447ce60ab1d,2024-03-27T12:29:30.307000 CVE-2024-2121,0,0,4e86b6ec3433d288b50b9e9c9587d6707962f4c2d7ff92215a6366c5fd16dc6b,2024-03-27T12:29:30.307000 -CVE-2024-2122,1,1,52d18fec0f04835d210ed85787b4868efd0165fb881bb53971d6814f1744b58f,2024-06-14T06:15:11.320000 +CVE-2024-2122,0,0,52d18fec0f04835d210ed85787b4868efd0165fb881bb53971d6814f1744b58f,2024-06-14T06:15:11.320000 CVE-2024-2123,0,0,50093ae27aa67e742757e304ff2f215cc4cf255fadb869543328103242423601,2024-03-13T12:33:51.697000 CVE-2024-2124,0,0,6c05438396435f5a71d022df467bc26ef0c83811ea38fc903b63d8ae9658d2c8,2024-03-20T13:00:16.367000 CVE-2024-2125,0,0,21907277d02e81dabf0303aac375ec9a544529904f2ff625079487b0f36ac4ce,2024-04-10T13:23:38.787000 @@ -243396,7 +243396,7 @@ CVE-2024-2217,0,0,07b67ca85e13a2c6962db1475a9d0f8a931b674f51497121f9a33c8078bd4b CVE-2024-22177,0,0,1ff2297e612a95969b8693bc6a53ecafa7223eba267b1cfe298d3bc1fedfbe99,2024-04-02T12:50:42.233000 CVE-2024-22178,0,0,894383da751aaa1046c611146ada59662a01e512644efee9e31c744bf34674c7,2024-04-03T17:24:18.150000 CVE-2024-22179,0,0,077a89cd90d357917ee36a8e199f939ad2a69cb604b53e3f5f34bba5fb27b47b,2024-05-28T17:15:09.547000 -CVE-2024-2218,1,1,9f3d01c1fbe6399526a0d4f69d8959ee16170a7f2d67fa62f7126d66bae09824,2024-06-14T06:15:11.570000 +CVE-2024-2218,0,0,9f3d01c1fbe6399526a0d4f69d8959ee16170a7f2d67fa62f7126d66bae09824,2024-06-14T06:15:11.570000 CVE-2024-22180,0,0,19e9318ece70bb0e88968bad696b07798db0b84c54153f426e33acb6b2d89f93,2024-04-02T12:50:42.233000 CVE-2024-22181,0,0,aa4f7fc8e8236ce5a2a5625d560e720bca0124d088633712af3a8c63643e6bd8,2024-06-10T17:16:18.890000 CVE-2024-22182,0,0,33412ce4ff69d7e4ec2fcd049c27451f4c9a424792b679659080bdcd047dcd32,2024-05-17T02:36:15.670000 @@ -244146,7 +244146,7 @@ CVE-2024-23500,0,0,b6642b73aef2e4cdba157839c8fde9771818b399a7f64cf89ea1ee42a68c8 CVE-2024-23501,0,0,b3e85809586c989dd0a69f1f88e280acf334973e6408d57bc052ae66513752bd,2024-02-29T13:49:29.390000 CVE-2024-23502,0,0,8f894ed7c8e8f8359294a01d255055a873ed16e9a79e2948ed3ac6f5d8f8da9f,2024-02-09T14:46:17.743000 CVE-2024-23503,0,0,31f4279f0042279b1e83884b504dbd77ff571f8da819058d434170bb0112db1f,2024-06-13T18:36:45.417000 -CVE-2024-23504,1,1,e2f1708a0f0629eafb5c37fbc341131c55215c47e54a596367257ea2808f745f,2024-06-14T06:15:11.023000 +CVE-2024-23504,0,0,e2f1708a0f0629eafb5c37fbc341131c55215c47e54a596367257ea2808f745f,2024-06-14T06:15:11.023000 CVE-2024-23505,0,0,1c1e95102de07fb5891297ba209ce274fdd1b187d013f9d2d61a7cdf81f20a18,2024-02-05T20:27:44.793000 CVE-2024-23506,0,0,1374ac637ee795ef76e472829586ea10162cf799e7f8facdf1ae775daa957ca7,2024-02-01T04:14:07.073000 CVE-2024-23507,0,0,5e40ce7b11a8b26bc0a529a8393436247da9b21902b7ceeec2a950c934f8cd05,2024-02-05T20:42:09.590000 @@ -245142,6 +245142,7 @@ CVE-2024-25139,0,0,74a1a5b7a626d7e1a0de61a1ac7f86e47d772626c4f0df2c72c44f9b9fe45 CVE-2024-2514,0,0,40bdac6fedbbfa3e45ec5e41e61e2794b1635576a9ed9aa904ae5ed7facdbc24,2024-05-17T02:38:16.170000 CVE-2024-25140,0,0,531f7b5bf7af89134534b93bfbbb303a3e40e0ca6401d81bdacee6ed36c47e67,2024-05-17T02:36:54.770000 CVE-2024-25141,0,0,48f7b04af2e96f1eec8716e65032c2fb66196d4c47edca9d45198681efaeed74,2024-02-20T22:15:08.670000 +CVE-2024-25142,1,1,bb1a72d1814cdd545fe6ac941ec4e08d84573e61642ffeefd16be919783437e5,2024-06-14T09:15:09.103000 CVE-2024-25143,0,0,1e8c832f1a9dadf4942cad4aead6d2b651b3644cad4a347f966955fac6cc114d,2024-02-07T17:04:54.407000 CVE-2024-25144,0,0,a6c13ad7167848c49a5d40b01da68d21d9e0c28e7dcf9021386119f5261fbaa8,2024-02-15T04:36:24.350000 CVE-2024-25145,0,0,4d151fe37dc24069dd8110580bdd4f039d66d4f3402218ddef43cec9606e51ad,2024-02-15T15:10:35.503000 @@ -249204,8 +249205,8 @@ CVE-2024-31159,0,0,2a53ec66414fdd93c519f60e7c23e0f68e7f66b7565c7e21e39cbd5903166 CVE-2024-3116,0,0,398207d2760952c7d30e8a692022e3a890986df7c49b38076f15d6ef6a9e4edb,2024-04-23T02:15:48.310000 CVE-2024-31160,0,0,d32a6d0d2c234144b1d8fb8d66e1ff1ce69ab40a7c1a5b84e40b1964a63bfaab,2024-06-14T04:15:42.083000 CVE-2024-31161,0,0,421418feb6f0ed4c933a9ddfd416c9ca3be473d9866b6501ff145e0ba88fb5a3,2024-06-14T04:15:42.323000 -CVE-2024-31162,1,1,c0044cb909f773cafb533a3f0d8a0edf3110fff813af552f2592b97d8fd26513,2024-06-14T07:15:50.153000 -CVE-2024-31163,1,1,0346351befc7fffc5039a693faec68928a266b9975796b750e7252f0df71991e,2024-06-14T07:15:50.713000 +CVE-2024-31162,0,0,c0044cb909f773cafb533a3f0d8a0edf3110fff813af552f2592b97d8fd26513,2024-06-14T07:15:50.153000 +CVE-2024-31163,0,0,0346351befc7fffc5039a693faec68928a266b9975796b750e7252f0df71991e,2024-06-14T07:15:50.713000 CVE-2024-3117,0,0,36e4fb078204cafbff3c0bf42c3651ee711cc6ce8c13ce5342e84f5d6a7e20c5,2024-05-17T02:39:43.503000 CVE-2024-3118,0,0,15f27d451e8e705fa26218ddfa2c270e5eeb49ba056f64a8eb948a9d6ebbfc1c,2024-05-17T02:39:43.597000 CVE-2024-3119,0,0,c9ebed2773ddbf745c504aabd30f479f39fcc6099045c2c447aecf409439659a,2024-04-10T13:23:38.787000 @@ -250429,9 +250430,9 @@ CVE-2024-32984,0,0,c1781ab02b497f7ad9edbf8a8951c53661ebdb78ecb66c7cf14dd96168971 CVE-2024-32985,0,0,551603a9d573917dc6e8180e1c86e20de47d20027e99828156dce46dac42a764,2024-05-14T16:12:23.490000 CVE-2024-32986,0,0,e1deb5dce0a20a0acf4a8da9213d1a6d597cdffb3cc6f869414020bdcaf43631,2024-05-03T12:48:41.067000 CVE-2024-32988,0,0,bc48c608e9b42d070b551acc6687d58b1535377e62e996f0e4be09d902452e5d,2024-05-22T12:46:53.887000 -CVE-2024-32989,0,0,506acdc6a7a5fbf0f74597c19aaae856579758431c921ae0bd29de5689f13f54,2024-05-14T16:12:23.490000 +CVE-2024-32989,0,1,87c157b1e3d25527b7d1928b44314ff5515bc68d28ca4b835a710f703915d021,2024-06-14T08:15:40.147000 CVE-2024-3299,0,0,f60f2a80accdd6f345a6a9cd66637eda180121596f90c2e7d75707c9fce20eb6,2024-04-04T16:33:06.610000 -CVE-2024-32990,0,0,c28c0547bf1581c48cf9bb50b0cf7281764b07f259abad0cc919458ee7c1bf3e,2024-05-14T16:12:23.490000 +CVE-2024-32990,0,1,f517fd83eeb745717387dc59840882f5435aeb995e5118d634e1729423fc341a,2024-06-14T08:15:40.410000 CVE-2024-32991,0,0,c30900c9c6007d9bd3f64bac9e942540cb2d3d2cd2e3fe2c3033e1ff0fa6a2e9,2024-05-14T16:12:23.490000 CVE-2024-32992,0,0,b43328c2e6b8e0aa396ab88fa7084326904c6a88cce5a778fe9e2c03ce7fc50f,2024-05-14T16:12:23.490000 CVE-2024-32993,0,0,d47ae0a7d792b622ff9b78d95f872069c2c525b6c7d9e748b8613faefcfe18f2,2024-05-14T16:12:23.490000 @@ -250948,7 +250949,7 @@ CVE-2024-34049,0,0,659b6c20c375fc6a98cdfe826f7b991bd781b69ca08f703cc4572e5c76f88 CVE-2024-3405,0,0,168ec7f9b410ce208cd59ad1ea840c83def6fd83f8512f3bb62051f5ec3a0bc0,2024-05-15T16:40:19.330000 CVE-2024-34050,0,0,12266ec53b888a39d080cf759ea4efcf86e297f4b6422a5e48e41cdfdabd201f,2024-04-30T13:11:16.690000 CVE-2024-34051,0,0,ac84f2fd7dd43d4574139c8cf26e6f74ad2fa41e2254272b15b5513f0e198e55,2024-06-04T16:57:41.057000 -CVE-2024-34055,0,1,748778fa7056cb22d8c756b4b872bd19417a23dfc74d45fea46f818df71b0835,2024-06-14T06:15:11.650000 +CVE-2024-34055,0,0,748778fa7056cb22d8c756b4b872bd19417a23dfc74d45fea46f818df71b0835,2024-06-14T06:15:11.650000 CVE-2024-34058,0,0,859a5867c3261cbc3116f378e08c5280a9474e2ad72a0c908fe3c9d61944df2b,2024-06-10T17:16:28.297000 CVE-2024-3406,0,0,b05755db76fca4314b8e99a4179a31010371036c16427145226d1ec275309899,2024-05-15T16:40:19.330000 CVE-2024-34060,0,0,3a924f7009b7e35c5ed89c1ddd4a1ea338a526dc659a3f0f832e02177cf8d5cd,2024-05-24T01:15:30.977000 @@ -252286,6 +252287,7 @@ CVE-2024-36265,0,0,00a9e362e8a489eb7027d68fd71b14b08824e37d9652a79a38b01c7bc61ba CVE-2024-36266,0,0,83df454a9d264cabc9c075046ae12e249cd453c24f6de612ee1d9f73df0ef774,2024-06-11T13:54:12.057000 CVE-2024-36267,0,0,5b402628b4c430b8eab614a5b3330f6f2d186537f83ff9a60bb1a91e4b3c3cac,2024-05-30T13:15:41.297000 CVE-2024-3628,0,0,ad2a38a3d431944b5239dd67ace3bcd2603e3057c8d0a04d847db45516b0c9ea,2024-05-07T13:39:32.710000 +CVE-2024-36287,1,1,d92323da669a2d07e04781562897424b811ea0fdb934c66465fa9ff2dd2acccb,2024-06-14T09:15:09.450000 CVE-2024-3629,0,0,ed67d1a2dc82a6f7d8e47e5534a14b4493dd33c5e11e4c564b2ef763c111a4ba,2024-05-15T16:40:19.330000 CVE-2024-3630,0,0,1b4d82e848787accdc20ad3d430430e1a1fa399ad678a3e5fbc87f1ba9867411,2024-05-15T16:40:19.330000 CVE-2024-36302,0,0,e1f4931beacda377102258578e84cb72b47284751be4a5dc324f70f76b3c6500,2024-06-11T13:54:12.057000 @@ -252364,7 +252366,12 @@ CVE-2024-36472,0,0,9bfd7afc4b2e800059c7e7a1cc84b36bb079950920b1605d92cfb4dcf501f CVE-2024-36473,0,0,fdab9cfd1652fb2a67390d3a8e49efbc4911425ddf31224888be2ea2f102443c,2024-06-11T13:54:12.057000 CVE-2024-3648,0,0,347cd63bf86e6b194279224a49f79f49cff1705e1f9b364650443227c716e8b1,2024-05-24T01:15:30.977000 CVE-2024-3649,0,0,969867829e20da4acc88ade671a27808c021dddbe3e27e051d2004e683670e61,2024-05-02T18:00:37.360000 +CVE-2024-36499,1,1,ebf262fa149ccfe4c71c1e515426092516fc43c35d2cd3763e261e9ea3d4e384,2024-06-14T08:15:40.523000 CVE-2024-3650,0,0,e078ac649d7d0d133fe9598e10336739bc9d365236ed72d408805e3868c3d439,2024-05-02T18:00:37.360000 +CVE-2024-36500,1,1,8c7a876ea9e5ea40d0848f4ca260a73783408bb9b02b946dcda4cbb7a9c588f7,2024-06-14T08:15:40.783000 +CVE-2024-36501,1,1,0ea4783c50477771b13cccbcde2481d7e81c490d8359529a55d560561ca46edc,2024-06-14T08:15:41.007000 +CVE-2024-36502,1,1,f31221a8addecfaa33b2b4eaf8279a5f28bfeb9176075985d7208179bef5f639,2024-06-14T08:15:41.240000 +CVE-2024-36503,1,1,959f6cc7fb5920822b2bd7c48ceb489ab01422592afbd92039308e89ffc64c99,2024-06-14T08:15:41.463000 CVE-2024-3652,0,0,455dabb71414a7592172807b25da69c5818ecc78456d9f87c63904d4c0988a33,2024-05-01T17:15:37.793000 CVE-2024-36523,0,0,779ff20f3e54c54b68fa38cf8a73a6874fca821f18024ef38fb974b398395dd0,2024-06-13T18:36:09.010000 CVE-2024-36528,0,0,1afcf266a14ff33b672f0cab5c8ebdb326a94f75a49ab0339cbb24c3b53942e4,2024-06-10T18:06:22.600000 @@ -252622,6 +252629,7 @@ CVE-2024-37176,0,0,d1a35fccbf9345cac8b07991c8d6b2cc7ed3bc253ab49e3211031359d59ab CVE-2024-37177,0,0,0421ff7903314276b7c17b8917958f0d79116e678cb0fb3c4c323480013ea020,2024-06-11T13:54:12.057000 CVE-2024-37178,0,0,09d4f25c1f8a3d05343115dea3f64d1198524e716da67f7a6714a382347c3c9a,2024-06-11T13:54:12.057000 CVE-2024-3718,0,0,a740a1633905d284711162c33f52150d8f35c5a9e41e141a82d07851d64c55d1,2024-05-24T13:03:05.093000 +CVE-2024-37182,1,1,23465e2a3b7c742194a4e503dd941502be69262a5ed711ae5f2aa306fa3cdc57,2024-06-14T09:15:10.013000 CVE-2024-3719,0,0,d2320674d04cefde56a0b36b463f74328d6f18494803030bdfe9b0b1b4374afd,2024-06-04T19:20:23.553000 CVE-2024-3720,0,0,f4e69514093cc630aeda39d0a41fe705e0d9916a1077cef429b7dcf05a404308,2024-06-04T19:20:23.660000 CVE-2024-3721,0,0,ec8dc4b0ad5d1d9ba11acb18015142f7d1715fd653f7ca2987e266e9c9e8ef01,2024-05-17T02:40:05.290000 @@ -252681,7 +252689,7 @@ CVE-2024-3749,0,0,e5012183af13abb8287d9f7e2369a778a614f06e1c5ed11cd73c4e040e4a12 CVE-2024-3750,0,0,803f7e301e80982b4e00371ccc1f410724a29d03fdd424fb4c54aeb0b034ff94,2024-05-16T13:03:05.353000 CVE-2024-3752,0,0,06a3522f543993aef42f352f0c011207c560c2e5a1d63c9d8ccc34a87adab0ce,2024-05-06T12:44:56.377000 CVE-2024-37535,0,0,07f7d930de9d2427116ed26f9657c7962aa8122c29cd0ba965c2b1ee75b9b36e,2024-06-10T17:16:32.753000 -CVE-2024-3754,1,1,5faeb6509ed30be92f241bea3d91c29cdb6175d667e84326f2240d59e13cd592,2024-06-14T06:15:11.950000 +CVE-2024-3754,0,0,5faeb6509ed30be92f241bea3d91c29cdb6175d667e84326f2240d59e13cd592,2024-06-14T06:15:11.950000 CVE-2024-3755,0,0,255cc63bdc34aca663119fb8f6757a7da5a9acef7ecda034d88dc05babf4b05b,2024-05-06T12:44:56.377000 CVE-2024-3756,0,0,978b8204ea279199334a4c8c549150dc6420f24480b5effb717e8509749d66aa,2024-05-06T12:44:56.377000 CVE-2024-37568,0,0,c31dda2ce4e2cf1c14da8896dd1ff7847e88710326c3ff8a35f20f8d9a2e2a98,2024-06-12T13:29:13.877000 @@ -252875,17 +252883,17 @@ CVE-2024-3955,0,0,bba90f25cff74c274e08a67a3936bf55505a38180fc074269167b54bd09035 CVE-2024-3956,0,0,84c84e343f731479baad188521c68e2e10d428da5ee4bd61443cf640ccedc17a,2024-05-14T16:11:39.510000 CVE-2024-3957,0,0,6e4e327328ad5c18e880466a103b162c10591051d90490bf0a67f6889d728425,2024-05-02T18:00:37.360000 CVE-2024-3962,0,0,9de964d29f43823164300439a0e71453bbca4a5c1f5767eca51db600267798cd,2024-04-26T12:58:17.720000 -CVE-2024-3965,1,1,d3cc73c01ab764bf8b8a8a1089e415cce11f6be3e746514f9b3266f70cb7922b,2024-06-14T06:15:12.060000 -CVE-2024-3966,1,1,acdc21ce162ac9bf599365d9657ca1e26c0b9e574eccdcf8c4b567b9d8b6efcf,2024-06-14T06:15:12.170000 +CVE-2024-3965,0,0,d3cc73c01ab764bf8b8a8a1089e415cce11f6be3e746514f9b3266f70cb7922b,2024-06-14T06:15:12.060000 +CVE-2024-3966,0,0,acdc21ce162ac9bf599365d9657ca1e26c0b9e574eccdcf8c4b567b9d8b6efcf,2024-06-14T06:15:12.170000 CVE-2024-3967,0,0,b2af76e65b0ac2fff588b8ab332f0978e5b083cdcdd41f3fd643403fe236fa29,2024-05-15T18:35:11.453000 CVE-2024-3968,0,0,cdd73cfcec56ac4302e4eb4a932f862086b9a3ed46ed5ff92d17197e11553e8f,2024-05-15T18:35:11.453000 CVE-2024-3969,0,0,793622b6641cb8c2dc34802adf1ab9ece645cce7d321b9faf1a6b76d5e28ec78,2024-05-28T17:11:55.903000 CVE-2024-3970,0,0,a6d2ad116e736372d8ee0cd28cd0cbfef25f3ce953ea92bdb2b1ac922e65eedf,2024-05-15T18:35:11.453000 -CVE-2024-3971,1,1,137aa1e674b21ade99d6733c2104b04ff84ac40c79412060bbfc1a9928b2c0ad,2024-06-14T06:15:12.250000 -CVE-2024-3972,1,1,98031c6637d18ba8ee682a8ce3a7afef41b4c6087b87a09e33631b6451b470fe,2024-06-14T06:15:12.330000 +CVE-2024-3971,0,0,137aa1e674b21ade99d6733c2104b04ff84ac40c79412060bbfc1a9928b2c0ad,2024-06-14T06:15:12.250000 +CVE-2024-3972,0,0,98031c6637d18ba8ee682a8ce3a7afef41b4c6087b87a09e33631b6451b470fe,2024-06-14T06:15:12.330000 CVE-2024-3974,0,0,30b94b89b01dd2c6057362330f67dc78937f3f3edffa0c5a57e7602f711f919a,2024-05-14T16:11:39.510000 -CVE-2024-3977,1,1,d72bf2865564ac51ed035648bdffeda91801e455c00b7fc6aa36d6f895c70e76,2024-06-14T06:15:12.427000 -CVE-2024-3978,1,1,7a090226b8ac6815aa754092194a22dc6edd4ea87964f6d9d3fbbdabbbb10d81,2024-06-14T06:15:12.520000 +CVE-2024-3977,0,0,d72bf2865564ac51ed035648bdffeda91801e455c00b7fc6aa36d6f895c70e76,2024-06-14T06:15:12.427000 +CVE-2024-3978,0,0,7a090226b8ac6815aa754092194a22dc6edd4ea87964f6d9d3fbbdabbbb10d81,2024-06-14T06:15:12.520000 CVE-2024-3979,0,0,4ac2126fe63098861061c1ed3772b0712449f42e64a5481492de94fd61a5b947,2024-06-06T20:15:14.127000 CVE-2024-3985,0,0,73586f1cedc99952324792e19f078c055584e6e606f6222ac3907090ad395ced,2024-05-02T18:00:37.360000 CVE-2024-3987,0,0,05499205f937534ee026fd5a41dcafd44deae059117eea743b5e3e3c53eaee01,2024-06-07T14:56:05.647000 @@ -252893,14 +252901,14 @@ CVE-2024-3988,0,0,ed49ad0e503298ba2fe40c90a665a86dcb918b5087ac61c1edfd746c2ca95d CVE-2024-3989,0,0,41a6b1dcae0354fb8cba40366dc7ed1eeb84d6a6a33689c35123198fe63c8f01,2024-05-14T16:11:39.510000 CVE-2024-3990,0,0,7879115af68e1891db08bd2dafc44fb55db15680f59885de2ed87fd5c16d9492,2024-05-14T16:11:39.510000 CVE-2024-3991,0,0,f4b27e31b2ebe06401478accd9d85264142bf207d27ef139c240399354705c4f,2024-05-02T18:00:37.360000 -CVE-2024-3992,1,1,9f6f9ed6b9f2419611b40da6c6729d5a683e31642eae913cbd1604058245c143,2024-06-14T06:15:12.607000 -CVE-2024-3993,1,1,c7c2575cefdc9f7b915324e0a619f9bbd6e44eec78cadaafe315061601b735dc,2024-06-14T06:15:12.680000 +CVE-2024-3992,0,0,9f6f9ed6b9f2419611b40da6c6729d5a683e31642eae913cbd1604058245c143,2024-06-14T06:15:12.607000 +CVE-2024-3993,0,0,c7c2575cefdc9f7b915324e0a619f9bbd6e44eec78cadaafe315061601b735dc,2024-06-14T06:15:12.680000 CVE-2024-3994,0,0,292539249e741e7003c555a5d4fa2182b15a01b393fb04fa15e675750c01906e,2024-04-25T13:18:02.660000 CVE-2024-3997,0,0,507ae8762d75f9d68eda75aa3a6fbbaf1b3579404dfa0ecd9f2978d2aa87a55f,2024-05-24T01:15:30.977000 CVE-2024-4000,0,0,63e68b686bb1abbdcd2ddeab613f2e83d1883c904c164f21a1076ada49583fc9,2024-05-02T18:00:37.360000 CVE-2024-4001,0,0,01ff67c0d3df1be38408b913fb09a0fa8e839c64a815c3de41b48a61aa2ae8cb,2024-06-11T17:27:53.637000 CVE-2024-4003,0,0,9b9be828f15a04db891b79e7c6ebf75d000360176e249e61f2acbb014741196d,2024-05-02T18:00:37.360000 -CVE-2024-4005,1,1,2f2292ddc9d91b15e0e334df7230c36516581b7812eb752ae8ed46619154cba1,2024-06-14T06:15:12.753000 +CVE-2024-4005,0,0,2f2292ddc9d91b15e0e334df7230c36516581b7812eb752ae8ed46619154cba1,2024-06-14T06:15:12.753000 CVE-2024-4006,0,0,cea97555ee62217aaca46943155964ba917aa17a210befae3806ab46c6606005,2024-04-25T17:25:05.903000 CVE-2024-4008,0,0,ab88da5f03295a5c82b2b02d767da89d9d5f6b64be017927f79b2a477f07ce81,2024-06-06T14:17:35.017000 CVE-2024-4009,0,0,1efc6fffaaf5a87d264faa44168af33f94d0754350a147286e05077495885670,2024-06-06T14:17:35.017000 @@ -253094,8 +253102,8 @@ CVE-2024-4264,0,0,fb86e94ce42096b29068bc1af12f8df8e421d67d4a541250a03ae9bd98f162 CVE-2024-4265,0,0,91d38fbd7b9c4ea0cd26c0f2028b5e1f8ee8c7d7e1c2c632d6b17cd2b7b69603,2024-05-02T18:00:37.360000 CVE-2024-4266,0,0,116b52a29fd0a6039b308734c72b0d2ae8aa871f2547c292da7232e2003a6f6b,2024-06-11T13:54:12.057000 CVE-2024-4267,0,0,ce2653255d43ae5f4599b240b7efe5c0da7fc5b70a5363cdc03dcce3fe58b4ed,2024-05-24T01:15:30.977000 -CVE-2024-4270,1,1,37cc37c1193f3880eaeb558cbb01c0dd570faa0689ff6012af6124e657242867,2024-06-14T06:15:12.827000 -CVE-2024-4271,1,1,58cd7d287d8fb8afde6f1b9fa45bc15975e70876b5571e9b3ac04d71b9bf945d,2024-06-14T06:15:12.907000 +CVE-2024-4270,0,0,37cc37c1193f3880eaeb558cbb01c0dd570faa0689ff6012af6124e657242867,2024-06-14T06:15:12.827000 +CVE-2024-4271,0,0,58cd7d287d8fb8afde6f1b9fa45bc15975e70876b5571e9b3ac04d71b9bf945d,2024-06-14T06:15:12.907000 CVE-2024-4273,0,0,136233599d68a0536ba99c3313767218f535edf424c12fad350903aa42bf81fa,2024-06-04T16:57:41.053000 CVE-2024-4274,0,0,f007ffa253f631296ec9b2caed7d1faf5b31c76fe42ca7e92fd5b40ffb00a28e,2024-06-04T16:57:41.053000 CVE-2024-4275,0,0,70e1a00c60419d92634d3a56b566530d560ae59bb86d2c5a8041fd963d9db39d,2024-05-14T16:11:39.510000 @@ -253199,7 +253207,7 @@ CVE-2024-4398,0,0,4b7d20498f56e38cff1d1c0b655156a2b3f15862c52a314f7c4c607a40427b CVE-2024-4399,0,0,3d19e4ab740018443fd6f7e134fb90cb1dbd4ba6681853dbea09ee003df9e238,2024-05-24T01:15:30.977000 CVE-2024-4400,0,0,620572dcee5d436c42b3994ee0aa67743b2a3990e6a672a60de9f72d6796092e,2024-05-16T13:03:05.353000 CVE-2024-4403,0,0,3581c625bf880c956b4215171ed64bae0b186e6c05d44521b4c86bf430fcf85e,2024-06-10T18:06:22.600000 -CVE-2024-4404,1,1,d285ed2c4c0d400743afd71328b120554c420ec459916094a4a847b34772eba9,2024-06-14T06:15:12.987000 +CVE-2024-4404,0,0,d285ed2c4c0d400743afd71328b120554c420ec459916094a4a847b34772eba9,2024-06-14T06:15:12.987000 CVE-2024-4405,0,0,c1f36263ba5841514dcf823ce87455ea826983b04201750caf275a7578687d86,2024-05-02T18:00:37.360000 CVE-2024-4406,0,0,24efbd07edfc7f89a7b1e694cb4faff02b108244486a9e17a0ab6aa554d1cf0e,2024-05-02T18:00:37.360000 CVE-2024-4409,0,0,7dd623ac9467a0484d209647a6b8fb064b225334d3e5c23c1ee095e63ba20831,2024-05-24T13:03:11.993000 @@ -253253,7 +253261,7 @@ CVE-2024-4470,0,0,a1486a2c35813e6b458e62c6cab3ba58a94b094bc9cbcdae130972a477a7e8 CVE-2024-4471,0,0,9792233119a62c3ea240ba8e0af602c011f72a48705fdc1ef6f6e423f04dac09,2024-05-24T01:15:30.977000 CVE-2024-4473,0,0,be8deb42c9d1905b301c3bfbae608b1551ce9395ac2fbbb337038c3a7eb347fa,2024-05-14T19:17:55.627000 CVE-2024-4478,0,0,31a4a4c48861c0c170c939e3aa0b10661ec97e9653465707919926dbd3595183,2024-05-16T13:03:05.353000 -CVE-2024-4480,1,1,7ba9472d0ba78ec30048cdbee9f7035ee304e104c01056d42a23ef04c9c59a93,2024-06-14T06:15:13.220000 +CVE-2024-4480,0,0,7ba9472d0ba78ec30048cdbee9f7035ee304e104c01056d42a23ef04c9c59a93,2024-06-14T06:15:13.220000 CVE-2024-4481,0,0,7ecf88f2a22a659849266bdc0bd40c464d195e3dafdf490c58869a301c87572b,2024-05-14T16:11:39.510000 CVE-2024-4484,0,0,72c4859b8727b60eeb9f8012483883c0571b4cb8b1cb2ce9a8b1f5e495641e3c,2024-05-24T13:03:05.093000 CVE-2024-4485,0,0,856a7368e5f121163f839e4b6c92a8e77de213c5eccf98592455e970e028d37d,2024-05-24T13:03:05.093000 @@ -253466,7 +253474,7 @@ CVE-2024-4746,0,0,f4f2ac85907c7b5b329cbda786b397a3fc954bb6f671df10eda8148346b3a1 CVE-2024-4747,0,0,99152f6494a1192f3bae59b436abcc51d11f811ed1e0a72c2e65c8381fda6054,2024-05-14T16:11:39.510000 CVE-2024-4749,0,0,676e331864bc41907c4c80c44886e7dac480ef6dea2c29bc22838d992753d4da,2024-06-04T16:57:41.053000 CVE-2024-4750,0,0,423585a3e250903ac62d761ecb0e0e6dc6b4649ccd4411b90275a4e6d2f87495,2024-06-04T16:57:41.053000 -CVE-2024-4751,1,1,c2897383d6378078de4b0f176845caa6860afdf70554ca836e449365df477d65,2024-06-14T06:15:13.297000 +CVE-2024-4751,0,0,c2897383d6378078de4b0f176845caa6860afdf70554ca836e449365df477d65,2024-06-14T06:15:13.297000 CVE-2024-4756,0,0,b303493fc627eee25a3b39c986ea25472e7aab1866612b83c9a7c14522d2c360,2024-06-07T14:56:05.647000 CVE-2024-4760,0,0,8b9593f0d88cbd24a061db082c8cd5c20f19b8a61431542d1ce576639ef3bdc0,2024-05-16T15:44:44.683000 CVE-2024-4761,0,0,1a5c101148c08794fbcc9293bdcf48ea45ef131413b853bd53bee7bfdc7d1522,2024-06-10T18:15:36.997000 @@ -253544,6 +253552,7 @@ CVE-2024-4857,0,0,23edc16ac7d8115e8f5dde6cd82a4022bcfda577b01ff7d148fca6e240fbd4 CVE-2024-4858,0,0,7e6f62031377207832745d7baec775cb8f5592ecc9e1490c12da872c1b62dd11,2024-05-28T12:39:42.673000 CVE-2024-4859,0,0,3de5434b35db9344c6a8c9ff1c0891dd93d801d8510e1a23be87da56d66078a2,2024-05-14T19:17:55.627000 CVE-2024-4860,0,0,078ece1acb5f59d15050f08de42942705925d025d9ef9dfb969c99e0b62152d4,2024-05-14T19:17:55.627000 +CVE-2024-4863,1,1,47adbc3719234f8d683d2303089ae82681accdb995ea43b1edcb178646950414,2024-06-14T09:15:10.613000 CVE-2024-4865,0,0,034a7c12f3d6f4bd5ac54ee1f34abd70a559c5b9a18ae852351f79db6d61b9c9,2024-05-20T13:00:34.807000 CVE-2024-4870,0,0,789ccad79b53f3162faaa4d0c14e00ab550e7e413c46a4332529e5d35d1d0423,2024-06-04T16:57:41.053000 CVE-2024-4871,0,0,089a89f3309c27433f20e3be4ef9a00379f9f19601c1c8029649846113aed43a,2024-05-14T19:17:55.627000 @@ -253733,7 +253742,7 @@ CVE-2024-5150,0,0,b6666c6d6ac9830dd3015f5fc02fd79f0a3b63d41ee2e14f8cd76da933186c CVE-2024-5152,0,0,897a950e1a56cf66b3762a0b7d02348f108b131c1556072d1a2c46cab20012e4,2024-06-06T14:17:35.017000 CVE-2024-5153,0,0,828bf0d922f71aaeb9a620d2a28fca02e54e4a39590cf3792a194a4a5970d881,2024-06-06T14:17:35.017000 CVE-2024-5154,0,0,1ba58da557e7753fe147db1d89f118e44764c86c1e3799ad99b07e3033b5f30f,2024-06-13T18:36:09.010000 -CVE-2024-5155,1,1,ba5a62125168808d608462e382a769fb49330a759db720b9808830628a850442,2024-06-14T06:15:13.373000 +CVE-2024-5155,0,0,ba5a62125168808d608462e382a769fb49330a759db720b9808830628a850442,2024-06-14T06:15:13.373000 CVE-2024-5157,0,0,968c06835e3febdba747d4dd49e60507daf1a01e5377b117ee6e566931506abf,2024-06-10T18:15:37.893000 CVE-2024-5158,0,0,76369e6e46f6c34bbc5a354a762f99c1a790d22381b6a166821eb73e4f6cf9b3,2024-06-10T18:15:37.953000 CVE-2024-5159,0,0,21e48f9c116346beacd1ff1b36dcd3eeb5d22159bc679bcf4bc325526369218a,2024-06-10T18:15:38.010000 @@ -253936,6 +253945,8 @@ CVE-2024-5453,0,0,f53a0f7c14e91f56fc73f4b75f7a3c7cc751f83b7f0078edb3a1d42587e454 CVE-2024-5458,0,0,280c02138e919e94dbbf1601703ec46acfb6deb4d1cb320c03863f40e695d8a3,2024-06-13T04:15:17.220000 CVE-2024-5459,0,0,81bd5d1a4ebf239ba65f5777fb4bfb17f71fa270ff31c5f59fd635927a6c453f,2024-06-13T19:35:55.083000 CVE-2024-5463,0,0,a83ead02d534db419d64d9a246adc999062f3a690f2d2cbba14bffeb9debf0f5,2024-06-04T16:57:41.053000 +CVE-2024-5464,1,1,8058c4737be1e926d32509cb2e10b7a4562f56d527275616126536a3a8ae00b3,2024-06-14T08:15:41.710000 +CVE-2024-5465,1,1,73f4626242a1d0966ebfc2cf1625d18e8d4f0535b49484a9cd09227629f4936d,2024-06-14T08:15:41.930000 CVE-2024-5468,0,0,2bc9c38a1a2994a4c4ceddf0376e8b3ff5412f95fe840378ab4577710a81e066,2024-06-13T18:36:09.010000 CVE-2024-5469,0,0,fb182133b6a592c90497a67ce9f1bf7105e8da3781285628adb3e682051474e6,2024-06-14T04:15:43.120000 CVE-2024-5478,0,0,cbce39d40f4102e26dfaf35e6a6b20bf349245ad3d94d864b4543f6f43a9d245,2024-06-07T14:56:05.647000 @@ -253979,7 +253990,7 @@ CVE-2024-5538,0,0,183cea799fa9410e329e72f326a10b8369aedcea9a5b7583a44bf33ecc3050 CVE-2024-5542,0,0,77ae3f3a7c4ffc662d4e5625f82b1efcc56a12c39abbd3546ebc6e9e7e619033,2024-06-11T18:25:51.200000 CVE-2024-5543,0,0,8e93e3d42337fd51f8d8d19b50b3f68377ba39e905a95b2594b9c3824c59b9ee,2024-06-13T18:36:09.013000 CVE-2024-5550,0,0,e4fc13aea5b719d7c555043aa9a8be47a59e2f4d5eac2e9fa0d5ff8a8edb892f,2024-06-07T14:56:05.647000 -CVE-2024-5551,1,1,7fd2c74ca03d76faa8444afc79e362b5f954f3fe72c0353b145fced7fb4c3dd7,2024-06-14T06:15:13.443000 +CVE-2024-5551,0,0,7fd2c74ca03d76faa8444afc79e362b5f954f3fe72c0353b145fced7fb4c3dd7,2024-06-14T06:15:13.443000 CVE-2024-5552,0,0,12abaaddd513e722275738643d6cd32f6bb9e257da98294dd5bedf4ad4cbf55d,2024-06-07T14:56:05.647000 CVE-2024-5553,0,0,c64ee567a06c549ac68fcb5d897f8979386bb1ca79793b5b6b7b17be3abbece0,2024-06-13T18:36:09.013000 CVE-2024-5557,0,0,d46453be6b66f76046381e0db014eed7a6e7aed2ef0e3daec4893bcd8fb5d27d,2024-06-13T18:36:09.010000 @@ -253989,6 +254000,7 @@ CVE-2024-5560,0,0,f1a6e79f857dcb0da00298e85540b2901c155f3f4e8e842ef291f9f993b61e CVE-2024-5564,0,0,cd961630c6982ea90916e9cc290067a2c4a02a79292d87af6b0ec76760478ca9,2024-06-03T14:46:24.250000 CVE-2024-5565,0,0,830316f5c713618fdad4a0eda5b7296c22d5d93c87a8813197db3ff9cf28c4ee,2024-05-31T19:14:47.793000 CVE-2024-5571,0,0,105c4e644019eeccf72c6e63813cdc36601b1b9a7e3cba5bc172df86631261e6,2024-06-11T17:29:03.277000 +CVE-2024-5577,1,1,58d8d7b8d912382b89611f62f9a6dc49044796f134783d6f97a0a142f7209241,2024-06-14T08:15:42.157000 CVE-2024-5584,0,0,612eacfcf6c3fd3d6fdd0ff2c66e496cc817b02568ea9f69c40277bbc0300578,2024-06-11T13:54:12.057000 CVE-2024-5585,0,0,7ca8acd7f48a83dc2f9c7f2dbf799bd4542c4abbbf9453c8a4fa401160a3a849,2024-06-13T04:15:17.407000 CVE-2024-5587,0,0,9180b0762a5a5a7a17ce70cd861bdf25e955d88caf903bee442f7c48a0a2a218,2024-06-03T14:46:24.250000 @@ -254071,24 +254083,24 @@ CVE-2024-5812,0,0,b231b6b4b2edc3b100956cc90803ec880aa99de51e5a0f50bc4b9e381c5722 CVE-2024-5813,0,0,d695683c807a1777a11ef158e495934f31ab7056ebdb25d58f5f11112f2d1965,2024-06-13T18:36:45.417000 CVE-2024-5825,0,0,800930249192b4fb36871d2a50a6622621c6dfa5eae6376e2c2995741b4630b2,2024-06-11T10:15:13.960000 CVE-2024-5829,0,0,ece2333b3f7675cb0340d51c6d538163a9e25ac5d3d71e718ed0157d499370ee,2024-06-11T14:15:13.150000 -CVE-2024-5830,0,1,25b30fd6a57f8dadfda81ce3fb510d579f1e215006a2c351624b51e1f8f5cb63,2024-06-14T06:15:13.690000 -CVE-2024-5831,0,1,bab2c3dec91029a2d8f120c0ea657c710c868b8acc11906580db2573b29ce25a,2024-06-14T06:15:14 -CVE-2024-5832,0,1,0a4578bcc0208791e029236e4a087666b73ecc267c8469678218068ccaf06f86,2024-06-14T06:15:14.293000 -CVE-2024-5833,0,1,35ed52785f12cb93d4a2f93f598a29d22779685fb371c11cb9ebd648b1b3f2e1,2024-06-14T06:15:14.547000 -CVE-2024-5834,0,1,2a6e308224634c23f806d9b1045e368f2b7b1ef5ecb688147237d305e2607289,2024-06-14T06:15:14.953000 -CVE-2024-5835,0,1,0f73e9e934e8bbe8893daf9e3f67daf1afd0978e3d150ceeec57a2e80aa8382c,2024-06-14T06:15:15.090000 -CVE-2024-5836,0,1,3a5558248327549226b6cc6135824e0344e9cec92ee964b1f734cfa18f5aeab5,2024-06-14T06:15:15.463000 -CVE-2024-5837,0,1,2e89ce3964ce151afe063dca1e64c5ae6e4d4381ef9c873cb8b30e7dc3f2830d,2024-06-14T06:15:15.683000 -CVE-2024-5838,0,1,ed59e1a65bb4129da9b71e3f50927c18e71724dbe6fa5f13c07ad14372b0fac0,2024-06-14T06:15:15.887000 -CVE-2024-5839,0,1,8f034c510a7fd0e0745bd30b404393daf7037ac09470f44def1786be54068041,2024-06-14T06:15:16.180000 -CVE-2024-5840,0,1,c526d5256b038fff7afa444b028c33817d0c13b5b161b9652cb13c250696c2a7,2024-06-14T06:15:16.280000 -CVE-2024-5841,0,1,a7a170eb2414a99bd9910abfc7f708acbc3c4b92192ba0f04dadd7b46dac3399,2024-06-14T06:15:16.640000 -CVE-2024-5842,0,1,4eb87bac0c50e1f717e5710274414381670e8c18a9c6f1b04f400ac18981dd9a,2024-06-14T06:15:16.913000 -CVE-2024-5843,0,1,2be4b00ab957673a25b135ebb64fcc6e3b51903ce8774e77938fc9dc297acd9c,2024-06-14T06:15:17.170000 -CVE-2024-5844,0,1,bdfdfc1f02e824433f5edcf6ca843d62bd4b218e96cc2df29214d0c6275327db,2024-06-14T06:15:17.517000 -CVE-2024-5845,0,1,109c5cd760bc6bcfea448de275120469251e47b6c5f10dfa49429d52e7e14565,2024-06-14T06:15:17.790000 -CVE-2024-5846,0,1,74cdfbc72d0ccccfb4960f8d9f050011c9367ff3a9087fe2085d5d3a9a567ba2,2024-06-14T06:15:18.070000 -CVE-2024-5847,0,1,fb0db0442787e77827fbf12115b06f51612cc2a1c9a9d0bc9a8c9faefc3d9705,2024-06-14T06:15:18.340000 +CVE-2024-5830,0,0,25b30fd6a57f8dadfda81ce3fb510d579f1e215006a2c351624b51e1f8f5cb63,2024-06-14T06:15:13.690000 +CVE-2024-5831,0,0,bab2c3dec91029a2d8f120c0ea657c710c868b8acc11906580db2573b29ce25a,2024-06-14T06:15:14 +CVE-2024-5832,0,0,0a4578bcc0208791e029236e4a087666b73ecc267c8469678218068ccaf06f86,2024-06-14T06:15:14.293000 +CVE-2024-5833,0,0,35ed52785f12cb93d4a2f93f598a29d22779685fb371c11cb9ebd648b1b3f2e1,2024-06-14T06:15:14.547000 +CVE-2024-5834,0,0,2a6e308224634c23f806d9b1045e368f2b7b1ef5ecb688147237d305e2607289,2024-06-14T06:15:14.953000 +CVE-2024-5835,0,0,0f73e9e934e8bbe8893daf9e3f67daf1afd0978e3d150ceeec57a2e80aa8382c,2024-06-14T06:15:15.090000 +CVE-2024-5836,0,0,3a5558248327549226b6cc6135824e0344e9cec92ee964b1f734cfa18f5aeab5,2024-06-14T06:15:15.463000 +CVE-2024-5837,0,0,2e89ce3964ce151afe063dca1e64c5ae6e4d4381ef9c873cb8b30e7dc3f2830d,2024-06-14T06:15:15.683000 +CVE-2024-5838,0,0,ed59e1a65bb4129da9b71e3f50927c18e71724dbe6fa5f13c07ad14372b0fac0,2024-06-14T06:15:15.887000 +CVE-2024-5839,0,0,8f034c510a7fd0e0745bd30b404393daf7037ac09470f44def1786be54068041,2024-06-14T06:15:16.180000 +CVE-2024-5840,0,0,c526d5256b038fff7afa444b028c33817d0c13b5b161b9652cb13c250696c2a7,2024-06-14T06:15:16.280000 +CVE-2024-5841,0,0,a7a170eb2414a99bd9910abfc7f708acbc3c4b92192ba0f04dadd7b46dac3399,2024-06-14T06:15:16.640000 +CVE-2024-5842,0,0,4eb87bac0c50e1f717e5710274414381670e8c18a9c6f1b04f400ac18981dd9a,2024-06-14T06:15:16.913000 +CVE-2024-5843,0,0,2be4b00ab957673a25b135ebb64fcc6e3b51903ce8774e77938fc9dc297acd9c,2024-06-14T06:15:17.170000 +CVE-2024-5844,0,0,bdfdfc1f02e824433f5edcf6ca843d62bd4b218e96cc2df29214d0c6275327db,2024-06-14T06:15:17.517000 +CVE-2024-5845,0,0,109c5cd760bc6bcfea448de275120469251e47b6c5f10dfa49429d52e7e14565,2024-06-14T06:15:17.790000 +CVE-2024-5846,0,0,74cdfbc72d0ccccfb4960f8d9f050011c9367ff3a9087fe2085d5d3a9a567ba2,2024-06-14T06:15:18.070000 +CVE-2024-5847,0,0,fb0db0442787e77827fbf12115b06f51612cc2a1c9a9d0bc9a8c9faefc3d9705,2024-06-14T06:15:18.340000 CVE-2024-5851,0,0,1ff86bf427427298fe5dc39bbfedb897b9870fd2315cf065507e70165fb41d41,2024-06-13T18:36:09.013000 CVE-2024-5873,0,0,4affe4b1f71505ca05298a33c7e23c3ae147869580237755bed2d180fbea1b8e,2024-06-12T08:15:51.550000 CVE-2024-5891,0,0,da4ba5748ecb097f5befd86d4787f2c76143132bf594110b21f16b774e08e15d,2024-06-13T18:36:09.010000 @@ -254112,9 +254124,12 @@ CVE-2024-5949,0,0,b3986a8edb1512233064a5da51557c0fa4f711ec9b142a106f76745321d3ce CVE-2024-5950,0,0,1f86aa27bca5269525cdd401ce251fe2cb91fad6e36bea2e480bcbcdf6032a6e,2024-06-13T20:15:16.923000 CVE-2024-5951,0,0,fff68899d3009d75df7027ceba73ebc8730458ee33bb67011fd27dc83f85a1f2,2024-06-13T20:15:17.140000 CVE-2024-5952,0,0,417f3877151c0966e5133a5fd225fe602bd3ee4917b6bc769756fb14d3a30c86,2024-06-13T20:15:17.350000 +CVE-2024-5961,1,1,b440137329b976f0b8c78f9e98dd35a3c37762ea79a4b3f62bdc8ead42b28d8b,2024-06-14T08:15:42.377000 CVE-2024-5976,0,0,8ad4fe84c9006c6743ccdbedb7ac649699be956a4b5f416470a5b939bc8dbac3,2024-06-14T03:15:15.327000 CVE-2024-5981,0,0,c021f0e87e8a9bc67184ae54917b7538b0a7383b265f005413cc498575c90f46,2024-06-14T02:15:09.897000 -CVE-2024-5983,0,0,d45671faa415b160e1a63cc5e7f78ea7860e778a55f924cf86d97430e4149871,2024-06-14T02:15:10.173000 -CVE-2024-5984,0,0,03fca76e26072017e4ea4f49f9638244fcc95d14d8a7905b4ba1013839a62ab1,2024-06-14T02:15:10.443000 +CVE-2024-5983,0,1,6b0960283f56bbd0c8fee7719d1537cd30e374b70cf4ff8a30b52cbdba8f3f5c,2024-06-14T08:15:42.550000 +CVE-2024-5984,0,1,0f63f0c126f74e56b7604626b4132713a42849cc9023a033be10da98fdb3d993,2024-06-14T08:15:42.843000 CVE-2024-5985,0,0,49a38267a9ce797f1b9e3a5a1b0820a2bd8e915256f564f2f744e9be24bef4de,2024-06-14T02:15:10.713000 -CVE-2024-5994,1,1,4b417b2409adf1cfb062272ddf9dab639d715406e66503c860b838a6da714a73,2024-06-14T07:15:51.130000 +CVE-2024-5994,0,1,b678ba7844dbb9440c0118c55fb917843e6316e30468d41dd4d372cdc7eeb766,2024-06-14T07:15:51.130000 +CVE-2024-5995,1,1,ede0470f9d86fed4f618bc468676b26641d05d4bd4a249ad161aea8b2cec90ce,2024-06-14T08:15:43.097000 +CVE-2024-5996,1,1,39e608463feedd3b2c4692002beac62fb7b065fa02bb74368f2c8f4d20db9740,2024-06-14T09:15:11.010000