diff --git a/CVE-2023/CVE-2023-516xx/CVE-2023-51636.json b/CVE-2023/CVE-2023-516xx/CVE-2023-51636.json new file mode 100644 index 00000000000..e5da47d5a49 --- /dev/null +++ b/CVE-2023/CVE-2023-516xx/CVE-2023-51636.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2023-51636", + "sourceIdentifier": "zdi-disclosures@trendmicro.com", + "published": "2024-05-22T20:15:08.407", + "lastModified": "2024-05-22T20:15:08.407", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Avira Prime Link Following Local Privilege Escalation Vulnerability. This vulnerability allows local attackers to escalate privileges on affected installations of Avira Prime. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.\n\nThe specific flaw exists within the Avira Spotlight Service. By creating a symbolic link, an attacker can abuse the service to delete a file. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of SYSTEM. Was ZDI-CAN-21600." + } + ], + "metrics": { + "cvssMetricV30": [ + { + "source": "zdi-disclosures@trendmicro.com", + "type": "Secondary", + "cvssData": { + "version": "3.0", + "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "zdi-disclosures@trendmicro.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-59" + } + ] + } + ], + "references": [ + { + "url": "https://www.zerodayinitiative.com/advisories/ZDI-24-469/", + "source": "zdi-disclosures@trendmicro.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-516xx/CVE-2023-51637.json b/CVE-2023/CVE-2023-516xx/CVE-2023-51637.json new file mode 100644 index 00000000000..9cc4e8c85b9 --- /dev/null +++ b/CVE-2023/CVE-2023-516xx/CVE-2023-51637.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2023-51637", + "sourceIdentifier": "zdi-disclosures@trendmicro.com", + "published": "2024-05-22T20:15:08.713", + "lastModified": "2024-05-22T20:15:08.713", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Sante PACS Server PG Patient Query SQL Injection Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Sante PACS Server PG. Authentication is not required to exploit this vulnerability.\n\nThe specific flaw exists within the implementation of the DICOM service, which listens on TCP port 11122 by default. When parsing the NAME element of the PATIENT record, the process does not properly validate a user-supplied string before using it to construct SQL queries. An attacker can leverage this vulnerability to execute code in the context of NETWORK SERVICE. Was ZDI-CAN-21579." + } + ], + "metrics": { + "cvssMetricV30": [ + { + "source": "zdi-disclosures@trendmicro.com", + "type": "Secondary", + "cvssData": { + "version": "3.0", + "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "zdi-disclosures@trendmicro.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "references": [ + { + "url": "https://www.zerodayinitiative.com/advisories/ZDI-24-468/", + "source": "zdi-disclosures@trendmicro.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-272xx/CVE-2024-27264.json b/CVE-2024/CVE-2024-272xx/CVE-2024-27264.json new file mode 100644 index 00000000000..2d243a96a36 --- /dev/null +++ b/CVE-2024/CVE-2024-272xx/CVE-2024-27264.json @@ -0,0 +1,47 @@ +{ + "id": "CVE-2024-27264", + "sourceIdentifier": "psirt@us.ibm.com", + "published": "2024-05-22T20:15:09.047", + "lastModified": "2024-05-22T20:15:09.047", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "IBM Performance Tools for i 7.2, 7.3, 7.4, and 7.5 could allow a local user to gain elevated privileges due to an unqualified library call. A malicious actor could cause user-controlled code to run with administrator privilege. IBM X-Force ID: 284563." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@us.ibm.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.4, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.4, + "impactScore": 5.9 + } + ] + }, + "references": [ + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/284563", + "source": "psirt@us.ibm.com" + }, + { + "url": "https://www.ibm.com/support/pages/node/7154595", + "source": "psirt@us.ibm.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-318xx/CVE-2024-31894.json b/CVE-2024/CVE-2024-318xx/CVE-2024-31894.json new file mode 100644 index 00000000000..ab9feea31bf --- /dev/null +++ b/CVE-2024/CVE-2024-318xx/CVE-2024-31894.json @@ -0,0 +1,59 @@ +{ + "id": "CVE-2024-31894", + "sourceIdentifier": "psirt@us.ibm.com", + "published": "2024-05-22T20:15:09.260", + "lastModified": "2024-05-22T20:15:09.260", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "IBM App Connect Enterprise 12.0.1.0 through 12.0.12.1 could allow an authenticated user to obtain sensitive user information using an expired access token. IBM X-Force ID: 288175." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@us.ibm.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 4.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@us.ibm.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-324" + } + ] + } + ], + "references": [ + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/288175", + "source": "psirt@us.ibm.com" + }, + { + "url": "https://www.ibm.com/support/pages/node/7154606", + "source": "psirt@us.ibm.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-318xx/CVE-2024-31895.json b/CVE-2024/CVE-2024-318xx/CVE-2024-31895.json new file mode 100644 index 00000000000..6faf4cd53ec --- /dev/null +++ b/CVE-2024/CVE-2024-318xx/CVE-2024-31895.json @@ -0,0 +1,59 @@ +{ + "id": "CVE-2024-31895", + "sourceIdentifier": "psirt@us.ibm.com", + "published": "2024-05-22T20:15:09.480", + "lastModified": "2024-05-22T20:15:09.480", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "IBM App Connect Enterprise 12.0.1.0 through 12.0.12.1 could allow an authenticated user to obtain sensitive user information using an expired access token. IBM X-Force ID: 288176." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@us.ibm.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 4.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@us.ibm.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-324" + } + ] + } + ], + "references": [ + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/288176", + "source": "psirt@us.ibm.com" + }, + { + "url": "https://www.ibm.com/support/pages/node/7154606", + "source": "psirt@us.ibm.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-352xx/CVE-2024-35204.json b/CVE-2024/CVE-2024-352xx/CVE-2024-35204.json index d882f6b6217..bbe5101e281 100644 --- a/CVE-2024/CVE-2024-352xx/CVE-2024-35204.json +++ b/CVE-2024/CVE-2024-352xx/CVE-2024-35204.json @@ -2,7 +2,7 @@ "id": "CVE-2024-35204", "sourceIdentifier": "cve@mitre.org", "published": "2024-05-14T15:39:42.917", - "lastModified": "2024-05-16T20:15:09.910", + "lastModified": "2024-05-22T21:15:08.100", "vulnStatus": "Awaiting Analysis", "descriptions": [ { @@ -16,10 +16,6 @@ ], "metrics": {}, "references": [ - { - "url": "https://www.veritas.com/content/support/en_US/article.100065391", - "source": "cve@mitre.org" - }, { "url": "https://www.veritas.com/support/en_US/security/VTS24-005", "source": "cve@mitre.org" diff --git a/CVE-2024/CVE-2024-42xx/CVE-2024-4267.json b/CVE-2024/CVE-2024-42xx/CVE-2024-4267.json new file mode 100644 index 00000000000..d396580d119 --- /dev/null +++ b/CVE-2024/CVE-2024-42xx/CVE-2024-4267.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2024-4267", + "sourceIdentifier": "security@huntr.dev", + "published": "2024-05-22T20:15:09.700", + "lastModified": "2024-05-22T20:15:09.700", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "A remote code execution (RCE) vulnerability exists in the parisneo/lollms-webui, specifically within the 'open_file' module, version 9.5. The vulnerability arises due to improper neutralization of special elements used in a command within the 'open_file' function. An attacker can exploit this vulnerability by crafting a malicious file path that, when processed by the 'open_file' function, executes arbitrary system commands or reads sensitive file content. This issue is present in the code where subprocess.Popen is used unsafely to open files based on user-supplied paths without adequate validation, leading to potential command injection." + } + ], + "metrics": { + "cvssMetricV30": [ + { + "source": "security@huntr.dev", + "type": "Secondary", + "cvssData": { + "version": "3.0", + "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.4, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.5, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "security@huntr.dev", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-77" + } + ] + } + ], + "references": [ + { + "url": "https://huntr.com/bounties/5a127724-cc13-4ea6-b81f-41546a7fff81", + "source": "security@huntr.dev" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-44xx/CVE-2024-4453.json b/CVE-2024/CVE-2024-44xx/CVE-2024-4453.json new file mode 100644 index 00000000000..5aa75042a43 --- /dev/null +++ b/CVE-2024/CVE-2024-44xx/CVE-2024-4453.json @@ -0,0 +1,59 @@ +{ + "id": "CVE-2024-4453", + "sourceIdentifier": "zdi-disclosures@trendmicro.com", + "published": "2024-05-22T20:15:09.923", + "lastModified": "2024-05-22T20:15:09.923", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "GStreamer EXIF Metadata Parsing Integer Overflow Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of GStreamer. Interaction with this library is required to exploit this vulnerability but attack vectors may vary depending on the implementation.\n\nThe specific flaw exists within the parsing of EXIF metadata. The issue results from the lack of proper validation of user-supplied data, which can result in an integer overflow before allocating a buffer. An attacker can leverage this vulnerability to execute code in the context of the current process.\n. Was ZDI-CAN-23896." + } + ], + "metrics": { + "cvssMetricV30": [ + { + "source": "zdi-disclosures@trendmicro.com", + "type": "Secondary", + "cvssData": { + "version": "3.0", + "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "zdi-disclosures@trendmicro.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-190" + } + ] + } + ], + "references": [ + { + "url": "https://gitlab.freedesktop.org/tpm/gstreamer/-/commit/e68eccff103ab0e91e6d77a892f57131b33902f5", + "source": "zdi-disclosures@trendmicro.com" + }, + { + "url": "https://www.zerodayinitiative.com/advisories/ZDI-24-467/", + "source": "zdi-disclosures@trendmicro.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-44xx/CVE-2024-4454.json b/CVE-2024/CVE-2024-44xx/CVE-2024-4454.json new file mode 100644 index 00000000000..70c2fcaddab --- /dev/null +++ b/CVE-2024/CVE-2024-44xx/CVE-2024-4454.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2024-4454", + "sourceIdentifier": "zdi-disclosures@trendmicro.com", + "published": "2024-05-22T20:15:10.130", + "lastModified": "2024-05-22T20:15:10.130", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "WithSecure Elements Endpoint Protection Link Following Local Privilege Escalation Vulnerability. This vulnerability allows local attackers to escalate privileges on affected installations of WithSecure Elements Endpoint Protection. User interaction on the part of an administrator is required to exploit this vulnerability.\n\nThe specific flaw exists within the WithSecure plugin hosting service. By creating a symbolic link, an attacker can abuse the service to create a file. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of SYSTEM. Was ZDI-CAN-23035." + } + ], + "metrics": { + "cvssMetricV30": [ + { + "source": "zdi-disclosures@trendmicro.com", + "type": "Secondary", + "cvssData": { + "version": "3.0", + "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.3, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.3, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "zdi-disclosures@trendmicro.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-59" + } + ] + } + ], + "references": [ + { + "url": "https://www.zerodayinitiative.com/advisories/ZDI-24-491/", + "source": "zdi-disclosures@trendmicro.com" + } + ] +} \ No newline at end of file diff --git a/README.md b/README.md index 11e506f11c1..c381a405757 100644 --- a/README.md +++ b/README.md @@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2024-05-22T20:00:38.352184+00:00 +2024-05-22T22:00:38.025313+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2024-05-22T19:15:09.453000+00:00 +2024-05-22T21:15:08.100000+00:00 ``` ### Last Data Feed Release @@ -33,53 +33,28 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### Total Number of included CVEs ```plain -251499 +251507 ``` ### CVEs added in the last Commit -Recently added CVEs: `9` +Recently added CVEs: `8` -- [CVE-2024-20360](CVE-2024/CVE-2024-203xx/CVE-2024-20360.json) (`2024-05-22T18:15:09.493`) -- [CVE-2024-21791](CVE-2024/CVE-2024-217xx/CVE-2024-21791.json) (`2024-05-22T18:15:09.740`) -- [CVE-2024-25737](CVE-2024/CVE-2024-257xx/CVE-2024-25737.json) (`2024-05-22T19:15:08.657`) -- [CVE-2024-25738](CVE-2024/CVE-2024-257xx/CVE-2024-25738.json) (`2024-05-22T19:15:08.807`) -- [CVE-2024-29421](CVE-2024/CVE-2024-294xx/CVE-2024-29421.json) (`2024-05-22T18:15:09.937`) -- [CVE-2024-31617](CVE-2024/CVE-2024-316xx/CVE-2024-31617.json) (`2024-05-22T18:15:10.040`) -- [CVE-2024-31893](CVE-2024/CVE-2024-318xx/CVE-2024-31893.json) (`2024-05-22T19:15:08.893`) -- [CVE-2024-31904](CVE-2024/CVE-2024-319xx/CVE-2024-31904.json) (`2024-05-22T19:15:09.153`) -- [CVE-2024-35627](CVE-2024/CVE-2024-356xx/CVE-2024-35627.json) (`2024-05-22T19:15:09.453`) +- [CVE-2023-51636](CVE-2023/CVE-2023-516xx/CVE-2023-51636.json) (`2024-05-22T20:15:08.407`) +- [CVE-2023-51637](CVE-2023/CVE-2023-516xx/CVE-2023-51637.json) (`2024-05-22T20:15:08.713`) +- [CVE-2024-27264](CVE-2024/CVE-2024-272xx/CVE-2024-27264.json) (`2024-05-22T20:15:09.047`) +- [CVE-2024-31894](CVE-2024/CVE-2024-318xx/CVE-2024-31894.json) (`2024-05-22T20:15:09.260`) +- [CVE-2024-31895](CVE-2024/CVE-2024-318xx/CVE-2024-31895.json) (`2024-05-22T20:15:09.480`) +- [CVE-2024-4267](CVE-2024/CVE-2024-42xx/CVE-2024-4267.json) (`2024-05-22T20:15:09.700`) +- [CVE-2024-4453](CVE-2024/CVE-2024-44xx/CVE-2024-4453.json) (`2024-05-22T20:15:09.923`) +- [CVE-2024-4454](CVE-2024/CVE-2024-44xx/CVE-2024-4454.json) (`2024-05-22T20:15:10.130`) ### CVEs modified in the last Commit -Recently modified CVEs: `31` +Recently modified CVEs: `1` -- [CVE-2024-20363](CVE-2024/CVE-2024-203xx/CVE-2024-20363.json) (`2024-05-22T18:59:20.240`) -- [CVE-2024-29392](CVE-2024/CVE-2024-293xx/CVE-2024-29392.json) (`2024-05-22T18:59:20.240`) -- [CVE-2024-33218](CVE-2024/CVE-2024-332xx/CVE-2024-33218.json) (`2024-05-22T18:59:20.240`) -- [CVE-2024-33219](CVE-2024/CVE-2024-332xx/CVE-2024-33219.json) (`2024-05-22T18:59:20.240`) -- [CVE-2024-33220](CVE-2024/CVE-2024-332xx/CVE-2024-33220.json) (`2024-05-22T18:59:20.240`) -- [CVE-2024-33221](CVE-2024/CVE-2024-332xx/CVE-2024-33221.json) (`2024-05-22T18:59:20.240`) -- [CVE-2024-33222](CVE-2024/CVE-2024-332xx/CVE-2024-33222.json) (`2024-05-22T18:59:20.240`) -- [CVE-2024-33223](CVE-2024/CVE-2024-332xx/CVE-2024-33223.json) (`2024-05-22T18:59:20.240`) -- [CVE-2024-33224](CVE-2024/CVE-2024-332xx/CVE-2024-33224.json) (`2024-05-22T18:59:20.240`) -- [CVE-2024-33225](CVE-2024/CVE-2024-332xx/CVE-2024-33225.json) (`2024-05-22T18:59:20.240`) -- [CVE-2024-33226](CVE-2024/CVE-2024-332xx/CVE-2024-33226.json) (`2024-05-22T18:59:20.240`) -- [CVE-2024-33227](CVE-2024/CVE-2024-332xx/CVE-2024-33227.json) (`2024-05-22T18:59:20.240`) -- [CVE-2024-33228](CVE-2024/CVE-2024-332xx/CVE-2024-33228.json) (`2024-05-22T18:59:20.240`) -- [CVE-2024-34448](CVE-2024/CVE-2024-344xx/CVE-2024-34448.json) (`2024-05-22T18:59:20.240`) -- [CVE-2024-35061](CVE-2024/CVE-2024-350xx/CVE-2024-35061.json) (`2024-05-22T18:15:10.133`) -- [CVE-2024-35362](CVE-2024/CVE-2024-353xx/CVE-2024-35362.json) (`2024-05-22T18:59:20.240`) -- [CVE-2024-35475](CVE-2024/CVE-2024-354xx/CVE-2024-35475.json) (`2024-05-22T19:15:09.373`) -- [CVE-2024-36077](CVE-2024/CVE-2024-360xx/CVE-2024-36077.json) (`2024-05-22T18:59:20.240`) -- [CVE-2024-3926](CVE-2024/CVE-2024-39xx/CVE-2024-3926.json) (`2024-05-22T18:59:20.240`) -- [CVE-2024-4563](CVE-2024/CVE-2024-45xx/CVE-2024-4563.json) (`2024-05-22T18:59:20.240`) -- [CVE-2024-5157](CVE-2024/CVE-2024-51xx/CVE-2024-5157.json) (`2024-05-22T18:59:20.240`) -- [CVE-2024-5158](CVE-2024/CVE-2024-51xx/CVE-2024-5158.json) (`2024-05-22T18:59:20.240`) -- [CVE-2024-5159](CVE-2024/CVE-2024-51xx/CVE-2024-5159.json) (`2024-05-22T18:59:20.240`) -- [CVE-2024-5160](CVE-2024/CVE-2024-51xx/CVE-2024-5160.json) (`2024-05-22T18:59:20.240`) -- [CVE-2024-5166](CVE-2024/CVE-2024-51xx/CVE-2024-5166.json) (`2024-05-22T18:59:20.240`) +- [CVE-2024-35204](CVE-2024/CVE-2024-352xx/CVE-2024-35204.json) (`2024-05-22T21:15:08.100`) ## Download and Usage diff --git a/_state.csv b/_state.csv index a096f3e41bc..b5daf8aaf6d 100644 --- a/_state.csv +++ b/_state.csv @@ -214169,7 +214169,7 @@ CVE-2023-20235,0,0,5dba974f1c210cf2a03787c3d3e9c441feee75819526969b64e2f4a80cd00 CVE-2023-20236,0,0,c6a29bb276fa53045a1d5dbdcd5f535a774cb8c2b4a2da6d6d6378ae41d08dd7,2024-01-25T17:15:39.850000 CVE-2023-20237,0,0,f975d459d3015a3f408e596ac215a6d75cfb23fa7b1171a2fa054590faa43dfe,2024-01-25T17:15:39.970000 CVE-2023-20238,0,0,79a23b4efc590566cd58d4cbff45d13d4f3db09516083d401270e6b9d775efcf,2024-01-25T17:15:40.067000 -CVE-2023-20239,0,1,826e38211d328eeacf8b74ba34a8ec7e417b358bc8709bf7d61605481ebb92e6,2024-05-22T18:59:20.240000 +CVE-2023-20239,0,0,826e38211d328eeacf8b74ba34a8ec7e417b358bc8709bf7d61605481ebb92e6,2024-05-22T18:59:20.240000 CVE-2023-2024,0,0,a3df09772ebf731a0c1b5b6db5674d9bb51b9794a600088bf32d2d3c6a061d68,2023-05-25T18:10:24.590000 CVE-2023-20240,0,0,015a0e0281847d8e48d2582559aafcb4c3d1269bf49b1b0162dcef443724c650,2024-01-25T17:15:40.187000 CVE-2023-20241,0,0,96357ec1544a3578befd4c4e9e8f2d0182f6d55009c374e33215ccb07ff2801f,2024-01-25T17:15:40.280000 @@ -227555,7 +227555,7 @@ CVE-2023-37576,0,0,b3086c097e8f97ccae74b878d2a502ec848400a667c99182b03cba4819265 CVE-2023-37577,0,0,3d47904e6714d7a055f1c3c55b7d81ffcc7991c99e251b7d10413eaa6b52422a,2024-04-09T21:15:12.807000 CVE-2023-37578,0,0,ba12ca5aa2e270904d2e8b59157d3f65b05f5a4d93e555484e17817f5052ca06,2024-04-09T21:15:12.900000 CVE-2023-37579,0,0,162475d9c10c03bb62253b4c06df5b03f8c0200b6108cb5a121856967edaa5b2,2023-07-20T17:37:20.790000 -CVE-2023-3758,0,1,3e07e863d680b10fa68e2f8537fd472f06496ebbe1e5985cc387edc1131de9e7,2024-05-22T18:15:09.053000 +CVE-2023-3758,0,0,3e07e863d680b10fa68e2f8537fd472f06496ebbe1e5985cc387edc1131de9e7,2024-05-22T18:15:09.053000 CVE-2023-37580,0,0,bae9f92d653d361aeb909d5e42dce31c2da6a6bba3b212aa2530c8274e5b606d,2023-12-22T15:16:27.810000 CVE-2023-37581,0,0,98103a9a7ec0c92020dfa9a697e6c5df21ed2d932a7d784c6317de2f609cd32a,2023-11-07T04:17:00.163000 CVE-2023-37582,0,0,32e5b7f8ae6b98ea7fa4c9ee1081e939ae14653ee66f31f201bc834b4e2b62d2,2023-07-20T02:11:34.330000 @@ -237313,6 +237313,8 @@ CVE-2023-5163,0,0,dcb773ab2d6fe9431102c7737c1a9ab1410c0276847172a178a17b93819afb CVE-2023-51630,0,0,e9c56408d552b149daee5fe15432377ab22c6d1afc3ccc27406f3f891f5d5f7f,2024-02-15T17:15:20.487000 CVE-2023-51631,0,0,7ca00593c4263cd6a331ad27b48650ba2b0364d4a177ea286bc8bf674e135a9a,2024-05-02T13:27:25.103000 CVE-2023-51633,0,0,55125673d01a37395fc498a22f6f19d44160c863d8a90af77443ed2f4b8cde75,2024-05-03T12:48:41.067000 +CVE-2023-51636,1,1,459ee9f881bc02c599b6caf3d90fe0c26bbc6eb475f5f293e4037219de8bb9d9,2024-05-22T20:15:08.407000 +CVE-2023-51637,1,1,4c83b2813d25d9f23540a0aeecf204c9c27435721f68aec380c3e3459bb5fb27,2024-05-22T20:15:08.713000 CVE-2023-5164,0,0,eb58535c78bf4b607f05ff8e1f903241064df3ad7b0f4d3f1636df61307fb477,2023-11-07T20:09:50.093000 CVE-2023-51649,0,0,11e105f951d553e940608590efdc1e572e1718a59f6fe7f415e90e2b5b510151,2024-01-03T20:05:01.863000 CVE-2023-5165,0,0,a5831e8b47bcc2e026ef3c692d9374429299bcbb82887bff8c322b1d5bf13c3b,2023-09-26T15:50:49.217000 @@ -241793,7 +241795,7 @@ CVE-2024-20257,0,0,76ffe9a92c93a06325edca86ddf0d31564fbc213598c5ddb9861c39151597 CVE-2024-20258,0,0,86668eb2a14f93ae58cca9d4779b12b7223791a7316a5480eeeb82e1669b4fc2,2024-05-15T18:35:11.453000 CVE-2024-20259,0,0,73ab78da8d0a510423d7dde4580b3cd86ea36933046212658a9baf6cc1c10b54,2024-03-27T17:48:21.140000 CVE-2024-2026,0,0,5071705b646dd74094af5cbedc0c8f83ed6481f03743c4a8c8e638254d8625b5,2024-04-10T13:23:38.787000 -CVE-2024-20261,0,1,84ba603bb30f32056cb206d69a0481949924f2891efd22ec363c6ac71f6066a7,2024-05-22T18:59:20.240000 +CVE-2024-20261,0,0,84ba603bb30f32056cb206d69a0481949924f2891efd22ec363c6ac71f6066a7,2024-05-22T18:59:20.240000 CVE-2024-20262,0,0,0f454f18496ee5ef2600ffeec90b1f623047ba774ff76b9352de48c47d8ed167,2024-03-13T18:15:58.530000 CVE-2024-20263,0,0,e2b898d887c646815ae9f81fc2d94bb44bf5048bae0bf50a4ca3ec5baeb42436,2024-02-06T19:23:20.600000 CVE-2024-20265,0,0,fbaf861e98006a5b6737fd0e8bab7fd09d0628199afba5baf3a37aa186d05d2d,2024-03-27T17:48:21.140000 @@ -241815,7 +241817,7 @@ CVE-2024-2029,0,0,8373bec1763a4514bbbcb69ac2f237a035a9f03f21660a36f059b41030fd51 CVE-2024-20290,0,0,057d5dfa7ca9ea45e2cb423f9faaf6e87f8f428206a3f34ecdd5587406e21147,2024-02-15T15:43:27.240000 CVE-2024-20291,0,0,8b3a799684ad77921390bf93ffe13565898bd7b11a64255da0ed7a22936da619,2024-02-29T13:49:29.390000 CVE-2024-20292,0,0,487f367f547f807e9f94987f5696131d7f2dbcf85eef97db7117ebc922f8f0a8,2024-03-07T13:52:27.110000 -CVE-2024-20293,0,1,495a98f3e3e0e3cd31895f684ca2fc37b30d97b2245a74db35ac76d217f3e66e,2024-05-22T18:59:20.240000 +CVE-2024-20293,0,0,495a98f3e3e0e3cd31895f684ca2fc37b30d97b2245a74db35ac76d217f3e66e,2024-05-22T18:59:20.240000 CVE-2024-20294,0,0,4fadb13db160be71a050b8cad86cc6a11a54187dbc8f5c1f128a04f8688febd3,2024-02-29T13:49:29.390000 CVE-2024-20295,0,0,15daf48dd7dc82ddbbc6711ac40fe791a25c5cf42c57f7cb10c68c2d97bee3a8,2024-04-25T13:18:20.370000 CVE-2024-2030,0,0,d28975d328a4fff677c165e5077b942b01b9ea45f41d0c27e4794a5e9083ea52,2024-03-13T18:15:58.530000 @@ -241861,16 +241863,16 @@ CVE-2024-20348,0,0,0302f1e9485b44e49fee557bce04f55ca5d1a83abb8a531d325f6a707ff9d CVE-2024-20352,0,0,0a21aaf855f5e2dfa6cf8a0de7df15d8d9ce0063ea679dcbc607b17583312064,2024-04-03T17:24:18.150000 CVE-2024-20353,0,0,0ad32ee557f52a7b8ada270f35945efb8e6756e485c22be736fc9eb0d9c4e4e0,2024-04-26T15:22:27.803000 CVE-2024-20354,0,0,77dad3524fb09cfda3488dd6cb6801d1cbef489cb4a9c5ad1ce0cd080b146730,2024-03-27T17:48:21.140000 -CVE-2024-20355,0,1,c4f95324f9b6cdd52e49820505eddf1968bd3351033ec9f4fa0576272fc73a3f,2024-05-22T18:59:20.240000 +CVE-2024-20355,0,0,c4f95324f9b6cdd52e49820505eddf1968bd3351033ec9f4fa0576272fc73a3f,2024-05-22T18:59:20.240000 CVE-2024-20356,0,0,520a5229b5523a4caebc12a2a13fabbd3ee32baa429880796f24d4f599838cb8,2024-04-25T13:18:20.370000 CVE-2024-20357,0,0,3a1d2757f67674d091902d27d845115a7046a8d266fe0b3daa6615e60c820655,2024-05-01T19:50:25.633000 CVE-2024-20358,0,0,a08433ecd9375b9385be343adba44e1b907ae2f57b9c630ccf362a5c87517062,2024-04-30T14:47:57.753000 CVE-2024-20359,0,0,103c2bc1c6783d5aa055ed80504c27ea24cb5bf5556deb17c85950666ec17e99,2024-04-26T15:25:02.773000 CVE-2024-2036,0,0,bcfdbdd174510ba0864b0e6171969e1a6500d4f97dc7bcf3ab34f7b2bf61efef,2024-05-22T12:46:53.887000 -CVE-2024-20360,1,1,8593db5efd7cd7cc0e7d4dda7b815cc5e515029148091d8ec1b70cd602086d0a,2024-05-22T18:59:20.240000 -CVE-2024-20361,0,1,010573f025bd50b12b661eed80644cddec43cc580c114c562abec7e911fb7432,2024-05-22T18:59:20.240000 +CVE-2024-20360,0,0,8593db5efd7cd7cc0e7d4dda7b815cc5e515029148091d8ec1b70cd602086d0a,2024-05-22T18:59:20.240000 +CVE-2024-20361,0,0,010573f025bd50b12b661eed80644cddec43cc580c114c562abec7e911fb7432,2024-05-22T18:59:20.240000 CVE-2024-20362,0,0,0e125a5f57daca09b3a31c24c5285918bb46201f033defe636102ce0379b9ecc,2024-04-03T17:24:18.150000 -CVE-2024-20363,0,1,97f3be2a752993dbc3b74ffb2d3f91bcdf34f1a982632e9bb3c311830dd7d57b,2024-05-22T18:59:20.240000 +CVE-2024-20363,0,0,97f3be2a752993dbc3b74ffb2d3f91bcdf34f1a982632e9bb3c311830dd7d57b,2024-05-22T18:59:20.240000 CVE-2024-20366,0,0,847482c81cd89b351ccec66c9f3c8d8074954a0de68a5d98d408eebff09cee32,2024-05-15T18:35:11.453000 CVE-2024-20367,0,0,e44fa9dcd83189ac4bb0284b57ce6be9f7d161e3fd46e74e477fe5fd623ca1b7,2024-04-03T17:24:18.150000 CVE-2024-20368,0,0,4814a8127430faf4ae61ecb30b9f4c874f54598057d22bcc8b2ca14f1fefa88a,2024-04-03T17:24:18.150000 @@ -242702,7 +242704,7 @@ CVE-2024-21782,0,0,a54768f93a9b07a30680122b1877fb41eae0f01a5d667d71a8861ee6fcf71 CVE-2024-21788,0,0,011ec43adc40c18dff4c187fc9ede9290a7392209b10791d513a3b1975ca41d3,2024-05-17T18:36:05.263000 CVE-2024-21789,0,0,065592bcd8c720a7bd60596f25729aa5b68a77a3a9f40afcc7521d9d3e39931f,2024-02-14T18:04:45.380000 CVE-2024-2179,0,0,ae7ec0d777d4f092532ca994d6b0860fc5ecc6f92bb84e39b0499b0a5cdf3be6,2024-03-06T15:18:08.093000 -CVE-2024-21791,1,1,a201a04287ac020777851f80d18fed7d8766b0534240c9365fcb81ba04a82feb,2024-05-22T18:59:20.240000 +CVE-2024-21791,0,0,a201a04287ac020777851f80d18fed7d8766b0534240c9365fcb81ba04a82feb,2024-05-22T18:59:20.240000 CVE-2024-21792,0,0,4f2e745dad8ee3d557b1b87e6abfc7e76c60e788eeca6c7fa6f04385472fc8b2,2024-05-17T18:36:05.263000 CVE-2024-21793,0,0,b55902d470d37a2479e376b66a185ed8b4afdd3b18a61089b937f4c3059f5d26,2024-05-08T17:05:24.083000 CVE-2024-21794,0,0,5140601c591fc7e01c922f6b4426d49907b4278c42a623419c59c4c96fa7afa6,2024-02-07T17:15:44.653000 @@ -244917,8 +244919,8 @@ CVE-2024-25731,0,0,1c6fee5c0654e277c807db3f6bf19838ebb53eed65f09ea7e40b4e9895105 CVE-2024-25734,0,0,06c269125a132df3ae043bc4b207969136d4cdb2e71e0ceac2732c8d46a3f2d8,2024-03-27T12:29:30.307000 CVE-2024-25735,0,0,b2ec3248064181eabfaf9fbb0d3d8ff31c37e79eaaaaefb0325854c3d0f3829f,2024-03-27T12:29:30.307000 CVE-2024-25736,0,0,7371e824af142b51c9574b5ab47b3c1757c3b280bf74f832655082514c5a65ba,2024-03-27T12:29:30.307000 -CVE-2024-25737,1,1,337f150770f937be1ed9019edce6ea96718a360ca913ea334c5539648332c20c,2024-05-22T19:15:08.657000 -CVE-2024-25738,1,1,21d639555861c488c595cf74246f77da9e58963bd45531a88726a1b343d0b0c6,2024-05-22T19:15:08.807000 +CVE-2024-25737,0,0,337f150770f937be1ed9019edce6ea96718a360ca913ea334c5539648332c20c,2024-05-22T19:15:08.657000 +CVE-2024-25738,0,0,21d639555861c488c595cf74246f77da9e58963bd45531a88726a1b343d0b0c6,2024-05-22T19:15:08.807000 CVE-2024-25739,0,0,3f77808e2a48c50aab928b0c96b70686e724f3302ff450f04c0ab77d04e27e26,2024-03-25T01:15:55.230000 CVE-2024-2574,0,0,b5441c1b84575547e924314a12527464107de86e7e6ade40cf449ff7ac8309a8,2024-05-17T02:38:20.537000 CVE-2024-25740,0,0,e49082457da2ca822066645fd01741e2b46dee6a85b6e915fd169e8229594e99,2024-02-26T21:11:27.837000 @@ -246079,6 +246081,7 @@ CVE-2024-27255,0,0,1a87ed865e33969bd25e1a85296cce48c9cd6a59a0cfe097079e825c89c05 CVE-2024-2726,0,0,86fe8b0d397a8074a2c940021570750a55036cbee3d4d8f0a542dcc682e4af2c,2024-03-22T15:34:43.663000 CVE-2024-27260,0,0,35cc3a1e9cc20863b87027e674db993404964801c204d20b0f5a987c39a4b80a,2024-05-17T18:36:31.297000 CVE-2024-27261,0,0,bbed66d7d6087a4518d3eea41ca0d4f2f5d3d3e2b2ec24c87084c9ef60c5b4e2,2024-04-15T13:15:51.577000 +CVE-2024-27264,1,1,0e666d8a771fa2ff39790ac131ea6d651444c828144a06eca82ba04c7cb6ed11,2024-05-22T20:15:09.047000 CVE-2024-27265,0,0,a52bbd360a6e47490ba11a2331048d18c2ebad63cb5bd9c43f26e021577a44df,2024-03-19T16:52:02.767000 CVE-2024-27266,0,0,f3ab0f27c5fbbc81843b4329fa53134d5b91174cad9bacbbc5dbf01cfacc3864,2024-03-19T16:52:35.400000 CVE-2024-27268,0,0,3c687588a19276e5b44431496d7af7239b9640f9b0218bde7d09fb0845bffcbc,2024-05-16T01:15:07.370000 @@ -247255,7 +247258,7 @@ CVE-2024-29385,0,0,8759a5732499ce248301d7321fb10ac2a0ff45ccfb82ec638dc2ec07b2660 CVE-2024-29386,0,0,46150b3636ce7f0c25cb166967d8e2ffb59b578767fa72331e04f23b7ba93e5f,2024-04-05T12:40:52.763000 CVE-2024-29387,0,0,64dc77a900c3b36a10f003711c44947a360d31708081f08c65915c82f4e2f15d,2024-04-05T12:40:52.763000 CVE-2024-2939,0,0,8d288c5421907c18561d6a467f0e78e7e78afcae942dcb9d7c160f3050babf32,2024-05-17T02:38:38.230000 -CVE-2024-29392,0,1,72d0a4c145ef9aaa49fe0433036c3df25c882a17843cbfa9ce310dee3d3fa569,2024-05-22T18:59:20.240000 +CVE-2024-29392,0,0,72d0a4c145ef9aaa49fe0433036c3df25c882a17843cbfa9ce310dee3d3fa569,2024-05-22T18:59:20.240000 CVE-2024-29399,0,0,1f0a560642c5bcb6053c3eb35cf9c158aa499897c937eeb4d73efac983ff0857,2024-04-11T12:47:44.137000 CVE-2024-2940,0,0,bdac3de755ddba1fc10ba9f0b54c2d288bf5bbaaa5fc7e8b4cdd60093fb3f65d,2024-05-17T02:38:38.323000 CVE-2024-29400,0,0,7c7ba10951f85314b8517e4af19bc97a8e02a4fb9c2ebd30adadcdfaed825d5b,2024-04-12T12:43:46.210000 @@ -247266,7 +247269,7 @@ CVE-2024-29413,0,0,a58c13bdf67afd8b98d238166eefb90262a9870531d3d5f182e9810c30b45 CVE-2024-29417,0,0,89d07e3eb8e147d93c431f357bf92973ead1b3854c21888d1e99630fdc9218d4,2024-05-03T15:32:19.637000 CVE-2024-29419,0,0,2f1c2a30167616ce2f7264d13a2e39c4e307caf2a0fab8a1d39f77c0f2b7d31b,2024-03-20T17:18:21.343000 CVE-2024-2942,0,0,441f0a67703a8db7af5d599581bb10078cc400b1f49682a90a1d996555281551,2024-05-17T02:38:38.500000 -CVE-2024-29421,1,1,ff3ad7251b21dafb322409c42e64e6ec1c1301abb92556eb2edc51c78671f85b,2024-05-22T18:59:20.240000 +CVE-2024-29421,0,0,ff3ad7251b21dafb322409c42e64e6ec1c1301abb92556eb2edc51c78671f85b,2024-05-22T18:59:20.240000 CVE-2024-2943,0,0,41d4a5ff66d7393263508db872dcddf7cbc0209f3571cc9b14085d559f28aa35,2024-05-17T02:38:38.790000 CVE-2024-29432,0,0,935ce59b23319f15478ff1d005b1786853efcea9f20ed5b78b83dcf1879a3c65,2024-04-03T12:38:04.840000 CVE-2024-29433,0,0,b10a666a979afbf6ffc25b1ef458e1d0fb9c766493f3b32e8a3cbc2c3e4a9e2b,2024-04-02T12:50:42.233000 @@ -248566,7 +248569,7 @@ CVE-2024-3161,0,0,fb0275ae00c4597a14b8da67383742a33ef20f00a5c359deab992b83c03fa8 CVE-2024-31610,0,0,25f0fe7dce01b290d07505f210ca0196ceaddb3229e43445c402c10f0654acf3,2024-04-26T12:58:17.720000 CVE-2024-31615,0,0,fec656de044fff01992f2ac4c2d789e80286f56b4ff6f28fca891fbe026d80d2,2024-04-26T12:58:17.720000 CVE-2024-31616,0,0,0d01710e8c157f0d32189692d849b27951e2db80c68fce9b88dd89c45379117e,2024-04-24T13:39:42.883000 -CVE-2024-31617,1,1,a4e6a3b34f5557cc7d6c502ef325f8ba64e8dc64b1797d06a080919acbbeffe5,2024-05-22T18:59:20.240000 +CVE-2024-31617,0,0,a4e6a3b34f5557cc7d6c502ef325f8ba64e8dc64b1797d06a080919acbbeffe5,2024-05-22T18:59:20.240000 CVE-2024-3162,0,0,7209bf9b1b4a4f41543ae01bfd19e9aec1dd355164cd1434a8cb5548ea161c65,2024-04-03T12:38:04.840000 CVE-2024-31621,0,0,5859f84ce615fd32361b282eb85819f2850e262c3652d6c11e3c0f262c84e82a,2024-04-30T13:11:16.690000 CVE-2024-31634,0,0,4aa9be86cd809cace2c7d458fd82ce0e6e4c21e7757f642f911286874e9406fe,2024-04-16T13:24:07.103000 @@ -248661,8 +248664,10 @@ CVE-2024-31879,0,0,d6826c6d26ac58467ab81c8e96dbee0010f578f9857bc48f2d302234b6393 CVE-2024-3188,0,0,5d70d4884e37e1862c5503e8662fdd8be316d1df7ecad77f44114699c1426b8a,2024-04-26T12:58:17.720000 CVE-2024-31887,0,0,e951c215b0e12b882bcc7244c98d7631ee4f4b7a3271b5f24e369f1a635cd3e5,2024-04-17T12:48:07.510000 CVE-2024-3189,0,0,1214acc8d4ffdbc5da1a7913ab352a27b53d04d94b5a178d0c09d285be9bf460,2024-05-15T16:40:19.330000 -CVE-2024-31893,1,1,38832e07ea9705065b713afbef90a53d598b0ed52a0e87dc548f70516d21e0fd,2024-05-22T19:15:08.893000 -CVE-2024-31904,1,1,a5c1afc73930c75c0e4f0cca7e598ebd551c1a4c257da0dd95c5279861133025,2024-05-22T19:15:09.153000 +CVE-2024-31893,0,0,38832e07ea9705065b713afbef90a53d598b0ed52a0e87dc548f70516d21e0fd,2024-05-22T19:15:08.893000 +CVE-2024-31894,1,1,80b6826b80410f0e513614f16c31b482f4dec10ee253620eee5cb32449d4f744,2024-05-22T20:15:09.260000 +CVE-2024-31895,1,1,3ca1235030db0f2e699b4e4dab09eb5487de7f0d2b9bfacafb9b9bb6f2aee7cf,2024-05-22T20:15:09.480000 +CVE-2024-31904,0,0,a5c1afc73930c75c0e4f0cca7e598ebd551c1a4c257da0dd95c5279861133025,2024-05-22T19:15:09.153000 CVE-2024-3191,0,0,8cf962bd9b56831bd79ade84a34de9b023bb925809cd58e4b9fc80c44fe6835a,2024-05-17T02:39:45.973000 CVE-2024-3192,0,0,e3aebeb6cd86739531dd732871b7a29e3a45f5c2393a43be256648b47f7f7a36,2024-05-17T02:39:46.077000 CVE-2024-31920,0,0,3c0045dbbecad7d78d5b9eb044589c2fc290e421e2d5accb9391890092efc90f,2024-04-15T13:15:31.997000 @@ -249411,17 +249416,17 @@ CVE-2024-33213,0,0,b148497f8be1950a6fa46d58723de7904955cc78b66d2d908246ba324bd2f CVE-2024-33214,0,0,e8bb1a89ed9a6fe57462cf7839328d6243261c99698249abe128719bc3054c5f,2024-04-24T13:39:42.883000 CVE-2024-33215,0,0,c8be43358325b8e905d28304a9339956d17f1418e85498fcb8a7134416d3977f,2024-04-24T13:39:42.883000 CVE-2024-33217,0,0,4e1e2d2adceccdbe12f057aebeef0a19faff919f64d3f29d52997e302777a311,2024-04-24T13:39:42.883000 -CVE-2024-33218,0,1,f5f61d355ae007d63ba9b6e336b8d9d37d932507cc676b5850d265d780d3861c,2024-05-22T18:59:20.240000 -CVE-2024-33219,0,1,2412fa0aa8b2d948daa8a7fcfe3f65e09eacf161c3b540ed0b7f509c419fa64e,2024-05-22T18:59:20.240000 -CVE-2024-33220,0,1,5b878885ce476729110a5de870db12fce52559f4154c6583f6debfc62f1a29c0,2024-05-22T18:59:20.240000 -CVE-2024-33221,0,1,55586c2a9a771d94bb89b755dddaede396e73997ea980849f19d91b29868e9f6,2024-05-22T18:59:20.240000 -CVE-2024-33222,0,1,a20d4c7838a56afb9285d4dddf7f31890b2257db20af4ec16ce732d7b84a8a7d,2024-05-22T18:59:20.240000 -CVE-2024-33223,0,1,7038d3bd45fd62a5567bf519d79a2563fa66d83f3d6e4dd2846ce342e93d1782,2024-05-22T18:59:20.240000 -CVE-2024-33224,0,1,d1cdf64e326181335af8c27f1813d093585d18fadc90ffdcca1a5704d9ae201b,2024-05-22T18:59:20.240000 -CVE-2024-33225,0,1,8204b329ff4e3cc8b847d0466ca6f2a8dfa2f83f445affd44161b46ee9471f23,2024-05-22T18:59:20.240000 -CVE-2024-33226,0,1,59a7d5eccb70eed84f77b01f6f6e9015231bce2c086988caee288bfbdcef61f0,2024-05-22T18:59:20.240000 -CVE-2024-33227,0,1,6491ebf8cfa47899856f9019e8f7bdebed77c891be554c5be0930a0e08a054e7,2024-05-22T18:59:20.240000 -CVE-2024-33228,0,1,fa7b2b70ce70b0cb12be62e8252be309d8b5a48957c1c7cb7090628330dcda4c,2024-05-22T18:59:20.240000 +CVE-2024-33218,0,0,f5f61d355ae007d63ba9b6e336b8d9d37d932507cc676b5850d265d780d3861c,2024-05-22T18:59:20.240000 +CVE-2024-33219,0,0,2412fa0aa8b2d948daa8a7fcfe3f65e09eacf161c3b540ed0b7f509c419fa64e,2024-05-22T18:59:20.240000 +CVE-2024-33220,0,0,5b878885ce476729110a5de870db12fce52559f4154c6583f6debfc62f1a29c0,2024-05-22T18:59:20.240000 +CVE-2024-33221,0,0,55586c2a9a771d94bb89b755dddaede396e73997ea980849f19d91b29868e9f6,2024-05-22T18:59:20.240000 +CVE-2024-33222,0,0,a20d4c7838a56afb9285d4dddf7f31890b2257db20af4ec16ce732d7b84a8a7d,2024-05-22T18:59:20.240000 +CVE-2024-33223,0,0,7038d3bd45fd62a5567bf519d79a2563fa66d83f3d6e4dd2846ce342e93d1782,2024-05-22T18:59:20.240000 +CVE-2024-33224,0,0,d1cdf64e326181335af8c27f1813d093585d18fadc90ffdcca1a5704d9ae201b,2024-05-22T18:59:20.240000 +CVE-2024-33225,0,0,8204b329ff4e3cc8b847d0466ca6f2a8dfa2f83f445affd44161b46ee9471f23,2024-05-22T18:59:20.240000 +CVE-2024-33226,0,0,59a7d5eccb70eed84f77b01f6f6e9015231bce2c086988caee288bfbdcef61f0,2024-05-22T18:59:20.240000 +CVE-2024-33227,0,0,6491ebf8cfa47899856f9019e8f7bdebed77c891be554c5be0930a0e08a054e7,2024-05-22T18:59:20.240000 +CVE-2024-33228,0,0,fa7b2b70ce70b0cb12be62e8252be309d8b5a48957c1c7cb7090628330dcda4c,2024-05-22T18:59:20.240000 CVE-2024-3323,0,0,5322a19626f9d41fbc85f0f073b4efac313efc9902bda6b2387f115ed4ea09c7,2024-04-17T20:08:21.887000 CVE-2024-33247,0,0,66af889d7e6ada10bf314bd53454c582a1455dd661c7cb5b07f6d9cd6d1d400f,2024-04-25T13:18:02.660000 CVE-2024-33250,0,0,80f5075a1ccdf0bbe31bc42b408e98f86c2ee0faa43a99a4e3de76f2fa1f2732,2024-05-14T16:12:23.490000 @@ -250020,7 +250025,7 @@ CVE-2024-34441,0,0,30a4318e62907426b3ab700c3b20e4f834f59441ac7ba3bdfe737a2f99871 CVE-2024-34445,0,0,5ae9c8efe1aaf47848c5b15a6687968aa01604c93efb870985c96be2737d2fc7,2024-05-14T16:12:23.490000 CVE-2024-34446,0,0,b445bdbcee2357cb0b4db1ab10e64a435c89bc8ae1d2fa2a306f3117c07625d0,2024-05-03T15:32:19.637000 CVE-2024-34447,0,0,7d0c1160e9ad74b2f0d138c65d27109e83600e38ed8d60bf74a510fb61e6f980,2024-05-14T15:39:08.297000 -CVE-2024-34448,0,1,27009ee2a57fc3bbb1d7cdf9f4be1f45ed8a4e2e385420d85256cf0e02c842dc,2024-05-22T18:59:20.240000 +CVE-2024-34448,0,0,27009ee2a57fc3bbb1d7cdf9f4be1f45ed8a4e2e385420d85256cf0e02c842dc,2024-05-22T18:59:20.240000 CVE-2024-34449,0,0,28da5cfb8215143a3847fc37f7163047e3e2e183b8d6abcf511553c3cec5bb16,2024-05-17T02:39:35.457000 CVE-2024-3445,0,0,2031eee497e177f244890449ab10d2f196dd08d103f846fc9b20779b1f74d465,2024-05-17T02:39:56.830000 CVE-2024-34453,0,0,9363deaf6a5ec68194d671cadb0973a2ba23402d3e2800c4f9eea6dbd677c5cd,2024-05-06T12:44:56.377000 @@ -250221,7 +250226,7 @@ CVE-2024-35057,0,0,6f8128beecce8bfea31f3c320500042c6cf6bf8be0c0072f7e558b39d7735 CVE-2024-35058,0,0,16c869cef11e1d38634183c19e67a6ae1a15991a1b1c852f5e6eb56cc744ffc2,2024-05-22T12:46:53.887000 CVE-2024-35059,0,0,bd64074b0906c1c54ef17d2e14ef72d6e07f1a69861632fbcb25eee7085311c4,2024-05-22T12:46:53.887000 CVE-2024-35060,0,0,62446a6780b8c8e1187040238ecfc349f6eb1b933015bf43bbb359906b5391dc,2024-05-22T12:46:53.887000 -CVE-2024-35061,0,1,34e811b322aae61856581c9d11d0a6300ec0d542883626f03b8561ef5119041c,2024-05-22T18:15:10.133000 +CVE-2024-35061,0,0,34e811b322aae61856581c9d11d0a6300ec0d542883626f03b8561ef5119041c,2024-05-22T18:15:10.133000 CVE-2024-3507,0,0,4311efcb171543ec92e46563bc97a34308842d5cb27d2460f854a987393d053f,2024-05-09T09:15:09.623000 CVE-2024-3508,0,0,c82390a1238326cf6817e875dca33757792126eb5098bd44b5a908dea5e7149a,2024-04-26T12:58:17.720000 CVE-2024-35099,0,0,8c0b69879ab1111cf063e500789278f969d059f38759acadb58167d526b5b96f,2024-05-14T16:11:39.510000 @@ -250260,7 +250265,7 @@ CVE-2024-35192,0,0,23cd729e19fbc1d14c67ebc44010f4e0066ae84ba866902513e5881072f82 CVE-2024-35194,0,0,48af49ad15298b97e4182e649aa9ff3b175135c022e246334d8184050eb47ce3,2024-05-21T12:37:59.687000 CVE-2024-35195,0,0,9af34c5ee8ad1c1fa6450f4ca43e0ba18410a0c881b480e1c9b625168aec2e65,2024-05-21T12:37:59.687000 CVE-2024-3520,0,0,f6428e86e9ec472cba9c3c5754043cb34202461d79bcb1fa1b6a365d8347f93e,2024-05-02T18:00:37.360000 -CVE-2024-35204,0,0,e1a61e5fa740b8d773028d5010a8e42a433a924bdea5e26108812aad66d1c249,2024-05-16T20:15:09.910000 +CVE-2024-35204,0,1,426b422871683d1b16b6e67a7918f8f9959a907fcff966c6f5833a5066df0ead,2024-05-22T21:15:08.100000 CVE-2024-35205,0,0,e759b9359595ebaf333ccada053519f187d3d1cfddc6ef72f21bfd74e59fe204,2024-05-14T16:11:39.510000 CVE-2024-3521,0,0,6a912375551b2b833dbf10976aa7a2942ee5411f45e7dcbcfe8caeaca7c22d09,2024-05-17T02:39:58.603000 CVE-2024-35218,0,0,b14fa11104b3be270b2ec1bc371bb22cdbf5b58f56cbde41365d0ab9a810855b,2024-05-21T16:54:26.047000 @@ -250286,7 +250291,7 @@ CVE-2024-3534,0,0,3f1920931444a20406a7f610b0b64ebb830986df38b69b0c0bee94b2ffa95f CVE-2024-3535,0,0,f574fcdaa266eb8da2fb53308d734bd66c33a13c49e8b4335f6bdaf83f11e9c6,2024-05-17T02:39:59.803000 CVE-2024-3536,0,0,b63dbc7abf49c7babee61877e5b2a8e70e35b7a32ec432c7d29371fbe78ff8a5,2024-05-17T02:39:59.897000 CVE-2024-35361,0,0,981fcbfd9f4303bd43de5df85c3e320402b0db2b2b55c36fbcead39aa2c6a55b,2024-05-21T16:54:35.880000 -CVE-2024-35362,0,1,bc6cc73ae2c385c72fa8e171de6f5e48fe251acb5a307d4b68c4eadfbc25ba42,2024-05-22T18:59:20.240000 +CVE-2024-35362,0,0,bc6cc73ae2c385c72fa8e171de6f5e48fe251acb5a307d4b68c4eadfbc25ba42,2024-05-22T18:59:20.240000 CVE-2024-3537,0,0,a991188dca9ef4640adf7a802695a0fa207bb0c024fcd7aac535d47c4720436f,2024-05-17T02:39:59.987000 CVE-2024-3538,0,0,f8cabe6328eaf87ba6d9a024b15cf0edff2e3f1ab108489ec3ba849f1bf7e980,2024-05-17T02:40:00.087000 CVE-2024-35384,0,0,d21dcb965b72196df94f0bb7eb7aa18a6c33135d9d1348ad106df5e9cb4ecf63,2024-05-21T16:54:26.047000 @@ -250302,7 +250307,7 @@ CVE-2024-3544,0,0,9c89c629785658109b56b96c611d48bc2c812cfaf631fdfc3e653cecb7fc80 CVE-2024-3545,0,0,5bce2ec2b9cfe5866e6246067691b4f478da11354be249c7fe197f29a14875e8,2024-04-10T13:23:38.787000 CVE-2024-3546,0,0,b7d401512e71f405610f26682a516af89f926e43ff4e75a0c9aadb49aa034713,2024-05-02T18:00:37.360000 CVE-2024-3547,0,0,fedd03df736ec1706076663d75a5df99f3108b401b2cf8280bfcd344106c9920,2024-05-14T16:11:39.510000 -CVE-2024-35475,0,1,5816d1afd9b95c043f9282d7a6bef2fcd68d76f771d9c9884120cd3e210b25c9,2024-05-22T19:15:09.373000 +CVE-2024-35475,0,0,5816d1afd9b95c043f9282d7a6bef2fcd68d76f771d9c9884120cd3e210b25c9,2024-05-22T19:15:09.373000 CVE-2024-3548,0,0,e23424ba819983ac2599fe48852cbfc904a10db222c55ccac010f7ec55b39028,2024-05-15T16:40:19.330000 CVE-2024-3550,0,0,be0f7ed1cc8c69e2fefc881c953115f1247b844866a37cfd3935f1cbe0fa2b81,2024-05-02T18:00:37.360000 CVE-2024-3551,0,0,707951f769b10080ccfb0e7ec01d2b664cd8f0bbbe9c53d60fa858f7750b27d7,2024-05-17T18:36:05.263000 @@ -250327,7 +250332,7 @@ CVE-2024-35578,0,0,9b6af24900c97b8c8fceb2460e2cf2035a5639481f86d7f4da562c9cc2c39 CVE-2024-35579,0,0,35e0d175e0e9e6f14f0d45dddb8c13590c00e75308c5741698784264cbe34649,2024-05-20T19:34:58.277000 CVE-2024-35580,0,0,3ff50f60cbbc817960af0184f316d686462c05674ee197a8c685fbbdf03fad16,2024-05-20T19:34:58.277000 CVE-2024-3560,0,0,66c1a96b1f1d19ab8c2a91f30bb939a8ccde028ecd6951f27029cb1628de4d35,2024-04-19T13:10:25.637000 -CVE-2024-35627,1,1,396203157a928e850e02e588c78cfe171fc70964e4e113c9cfc0ea70e0e14606,2024-05-22T19:15:09.453000 +CVE-2024-35627,0,0,396203157a928e850e02e588c78cfe171fc70964e4e113c9cfc0ea70e0e14606,2024-05-22T19:15:09.453000 CVE-2024-3566,0,0,e417ef1ceca67d3a9a8ba800520d4a9974bcf4eba2e3e6325dafdfbfe6af8d6b,2024-04-10T19:49:51.183000 CVE-2024-3567,0,0,95d4f85888c7c90830bdb6bbe6ab9e66d33c542ba2d85efb396aaa8b077bff79,2024-04-10T19:49:51.183000 CVE-2024-3568,0,0,573133d2a7191a46b0975280ef7162f7787321191e0ad33f2c4c70c7e8d9c3f5,2024-04-10T19:49:51.183000 @@ -250589,7 +250594,7 @@ CVE-2024-3606,0,0,aad549bdf5ff1831d91b9701456650bb1ccc1938c3f938f0c7eb426394ab83 CVE-2024-3607,0,0,af4721086df8378a380a0243b924575fce7196863af6b8319186a0a7c6039e9f,2024-05-02T18:00:37.360000 CVE-2024-36070,0,0,19c2fc8fdc41593f53c176f18e743efa8020d50d8ffdbcbf1475257d2bfa8428,2024-05-20T13:00:04.957000 CVE-2024-36076,0,0,7bd178b56b4ea91c0d10da16861cc8958caaaa1d0561d3821785629a0cb379df,2024-05-21T20:15:08.970000 -CVE-2024-36077,0,1,84ea3304d7a7ffaa84d954db4af07a9c774a90c5eb501916ba471dc7e3d1f499,2024-05-22T18:59:20.240000 +CVE-2024-36077,0,0,84ea3304d7a7ffaa84d954db4af07a9c774a90c5eb501916ba471dc7e3d1f499,2024-05-22T18:59:20.240000 CVE-2024-36078,0,0,033f7985523b33a9cd47ae7b39c65b68fc3ef0710dcf434d451eae182ed35127,2024-05-20T13:00:04.957000 CVE-2024-36080,0,0,57481f5a54f68f6f7f09dded26dd0588b050980d38ac9c78940318892c2197a1,2024-05-20T13:00:04.957000 CVE-2024-36081,0,0,0aabc3d5ec0a35d1482a2ee38b1087a1798092236c6b1a2ef029f3cd7c35526c,2024-05-20T13:00:04.957000 @@ -250827,7 +250832,7 @@ CVE-2024-3914,0,0,4e5bf7e4bbf357662295118acaf46c6e90e6b4b9830d6a3e29a74e49dd1420 CVE-2024-3915,0,0,a29a2abe3549638b7baa29d25d43b9e7f1e9b70435ac870f9f426e12fb2f2812,2024-05-14T16:11:39.510000 CVE-2024-3916,0,0,67c028ed5cffa81651cfdb7590d8583ba32a4964953feede869ed8c9f6426eef,2024-05-14T16:11:39.510000 CVE-2024-3923,0,0,dcd7a979944a34edd9f4dd960691916feb4f3b194c37e215c41a761a1e13cac2,2024-05-14T16:11:39.510000 -CVE-2024-3926,0,1,1f0a5648758642b2163cf3c5029c914dfdfa53711699b12f09cb8592d01adc91,2024-05-22T18:59:20.240000 +CVE-2024-3926,0,0,1f0a5648758642b2163cf3c5029c914dfdfa53711699b12f09cb8592d01adc91,2024-05-22T18:59:20.240000 CVE-2024-3927,0,0,7829cb310d77178b7eeb75814db111ab7836f1cd335248ee93c84ada4720d633,2024-05-22T12:46:53.887000 CVE-2024-3928,0,0,537f117f8c3572d036e1aa43e9ee1a226723d4a5980268ff58c8876839ea31b2,2024-05-17T02:40:11.687000 CVE-2024-3929,0,0,31d0a734bfd88727a2a61deb7a29595ac9c8ac4a930ee35c31639990489d025d,2024-04-25T13:18:13.537000 @@ -251017,6 +251022,7 @@ CVE-2024-4262,0,0,48de03b038c3a9950f1b2d36329d9f6a6297e28f8023eb3afff323d082fd07 CVE-2024-4263,0,0,b1f2b30077721ef2ca6e11fb6bda0f0973b13bae19df9c4c6804c151ec0ef6fb,2024-05-16T13:03:05.353000 CVE-2024-4264,0,0,900b6e21a73808decad0bbd9ff6caa01ca608bdbd52b2ff79e0e58d7828f5894,2024-05-20T13:00:34.807000 CVE-2024-4265,0,0,91d38fbd7b9c4ea0cd26c0f2028b5e1f8ee8c7d7e1c2c632d6b17cd2b7b69603,2024-05-02T18:00:37.360000 +CVE-2024-4267,1,1,71e7feae8dfa8dd7f29e580e524e7cdeefc3ea2f2de0a7a38902725afdc0d3f1,2024-05-22T20:15:09.700000 CVE-2024-4275,0,0,70e1a00c60419d92634d3a56b566530d560ae59bb86d2c5a8041fd963d9db39d,2024-05-14T16:11:39.510000 CVE-2024-4277,0,0,0e2597ca58054c89bbcbec7f866e9744f2b63f46782c4e0a7d31ae57f9529329,2024-05-14T16:11:39.510000 CVE-2024-4279,0,0,d3b17e17d1b5650487c2ef2a762ae7d90400bd6e48ec29863d7d603500f64a36,2024-05-16T13:03:05.353000 @@ -251120,6 +251126,8 @@ CVE-2024-4446,0,0,c1a78a1d4c0d05d17b6cead174a683289ca018fac3b1c104ff2e5b23dbf06e CVE-2024-4448,0,0,c0706d1927abee0ebde095d1bd8c9375ae579980372e3f8e4e4c3b77a255c913,2024-05-14T16:11:39.510000 CVE-2024-4449,0,0,5f461a2e161ed0d547590d7983036c434e3239f67f76e9397bc8163418dcb335,2024-05-14T16:11:39.510000 CVE-2024-4452,0,0,e48f0cdf03196e20de5e5f5902dc7c7b1a1024a4dcd852e9c13b4253f638fd6a,2024-05-21T16:54:26.047000 +CVE-2024-4453,1,1,76de60ffe129cc0f8139ecfad6bc0720432aab5d18bbe4920a7b34d4385b0a5f,2024-05-22T20:15:09.923000 +CVE-2024-4454,1,1,c24879cf57a1c9399548f22aefb71f03f3beb75d43495f040ee325bb1fe20f1f,2024-05-22T20:15:10.130000 CVE-2024-4456,0,0,43bdd543de001702ca45614b4a3579c52bfa7b188e5cb3e6b81f25f610f74e45,2024-05-08T13:15:00.690000 CVE-2024-4461,0,0,ad05f4e37257e33f27f784f842f8dfa34f685ff06dd273bc6842a04c51c93bf6,2024-05-03T12:48:41.067000 CVE-2024-4463,0,0,aaa5b32073fcbc7160927d348961b4790302ca7b8c414e16cdb6cacefbfd98b3,2024-05-14T16:11:39.510000 @@ -251181,7 +251189,7 @@ CVE-2024-4559,0,0,04253977f1b3aac9c2c8228f67b55a5d97f0f228a3fd1b3fdffeaf9dbbc176 CVE-2024-4560,0,0,01330bc30e6abf90cd0e894076fd4822775b90946ecfbbe71c3855f1f2c00212,2024-05-14T16:11:39.510000 CVE-2024-4561,0,0,419f075cb470fc0bcbe1e02ad47a96fd3735721568a3ea0b27d92242ea08e526,2024-05-15T16:40:19.330000 CVE-2024-4562,0,0,4b41dac3b3dc0160472fa769fd66d4820687adcd6a603b6680aeb5866557430b,2024-05-15T16:40:19.330000 -CVE-2024-4563,0,1,87e0e5702a0d713b97ba970bb75b91d34e5ca24e40c3c9a05a3d6a9dbf34c79a,2024-05-22T18:59:20.240000 +CVE-2024-4563,0,0,87e0e5702a0d713b97ba970bb75b91d34e5ca24e40c3c9a05a3d6a9dbf34c79a,2024-05-22T18:59:20.240000 CVE-2024-4566,0,0,56d6dff8001ced0ac379df1540d8c705e1cb0415cd6a569faf0604bdd4ed8dc7,2024-05-21T12:37:59.687000 CVE-2024-4567,0,0,bff521ec958712c348010a89da0e0aec519b6a717613a798e9a8fee426de5e74,2024-05-14T16:11:39.510000 CVE-2024-4568,0,0,79c6e65478e2e86d702896e792fead76bbebdb118f8c0f66e6390a241a22321a,2024-05-07T13:39:32.710000 @@ -251488,11 +251496,11 @@ CVE-2024-5136,0,0,7e1453b58a6b8cdb889318a17e467bc4887e911147f2bbd5898eefe5c0fc0f CVE-2024-5137,0,0,9ef636c571a0277ac03884ccb19a37de0ac2ceab7c0195ff8a91e587e734c012,2024-05-20T13:00:04.957000 CVE-2024-5145,0,0,779a53179978014855de22e41604c12feef2bb6901d36d253a629d55b7b44ab6,2024-05-21T12:37:59.687000 CVE-2024-5147,0,0,f786cdd04c7e64ee05dc3a502a4fef5436dd8390bfdc70803ca93e4405d481a0,2024-05-22T12:46:53.887000 -CVE-2024-5157,0,1,c51a9f5f8f4c7b7f699f53e1f0267c61dca7dd3a3eb507f57f12d9966dbb6911,2024-05-22T18:59:20.240000 -CVE-2024-5158,0,1,a5d08847b775b0e52c1cc0488a7142e884df847d11032138a63ce6f2e4b97916,2024-05-22T18:59:20.240000 -CVE-2024-5159,0,1,8d2f157e476fe19d6e0ae9a9a20bdaf98d34094320eaa9b2d05fada23fb03d1f,2024-05-22T18:59:20.240000 -CVE-2024-5160,0,1,f35f5dea12c05d224f89549914a78b1ed3ed070b5209b38b5826791afe2dabc7,2024-05-22T18:59:20.240000 -CVE-2024-5166,0,1,b71cdf8c1359ba924d575db8e55e7723138c48dac3c0909946269d16930c9a96,2024-05-22T18:59:20.240000 +CVE-2024-5157,0,0,c51a9f5f8f4c7b7f699f53e1f0267c61dca7dd3a3eb507f57f12d9966dbb6911,2024-05-22T18:59:20.240000 +CVE-2024-5158,0,0,a5d08847b775b0e52c1cc0488a7142e884df847d11032138a63ce6f2e4b97916,2024-05-22T18:59:20.240000 +CVE-2024-5159,0,0,8d2f157e476fe19d6e0ae9a9a20bdaf98d34094320eaa9b2d05fada23fb03d1f,2024-05-22T18:59:20.240000 +CVE-2024-5160,0,0,f35f5dea12c05d224f89549914a78b1ed3ed070b5209b38b5826791afe2dabc7,2024-05-22T18:59:20.240000 +CVE-2024-5166,0,0,b71cdf8c1359ba924d575db8e55e7723138c48dac3c0909946269d16930c9a96,2024-05-22T18:59:20.240000 CVE-2024-5190,0,0,e11755e15485ad7d65ed59ac9abe5cac7f4b4c3e2591d1a6c69b4386ed9dea65,2024-05-22T03:15:08.273000 CVE-2024-5193,0,0,10c68e7444190b04603fe41121d5ca46f60a4a86754539b9aa3d12094e724599,2024-05-22T12:46:53.887000 CVE-2024-5194,0,0,449708a9669696a9d45dc12d62d0dd60618e438564c2c2163a0a40f19cb2695e,2024-05-22T12:46:53.887000