From df8a9c1304d2ae79c3f616b5a798082f5ab938fc Mon Sep 17 00:00:00 2001 From: cad-safe-bot Date: Mon, 17 Jun 2024 20:03:11 +0000 Subject: [PATCH] Auto-Update: 2024-06-17T20:00:19.113866+00:00 --- CVE-2018/CVE-2018-251xx/CVE-2018-25103.json | 36 ++++ CVE-2024/CVE-2024-03xx/CVE-2024-0397.json | 6 +- CVE-2024/CVE-2024-333xx/CVE-2024-33373.json | 6 +- CVE-2024/CVE-2024-333xx/CVE-2024-33374.json | 6 +- CVE-2024/CVE-2024-333xx/CVE-2024-33375.json | 6 +- CVE-2024/CVE-2024-333xx/CVE-2024-33377.json | 6 +- CVE-2024/CVE-2024-361xx/CVE-2024-36165.json | 33 +++- CVE-2024/CVE-2024-361xx/CVE-2024-36166.json | 43 ++++- CVE-2024/CVE-2024-361xx/CVE-2024-36167.json | 33 +++- CVE-2024/CVE-2024-361xx/CVE-2024-36181.json | 33 +++- CVE-2024/CVE-2024-361xx/CVE-2024-36182.json | 33 +++- CVE-2024/CVE-2024-361xx/CVE-2024-36183.json | 33 +++- CVE-2024/CVE-2024-361xx/CVE-2024-36184.json | 33 +++- CVE-2024/CVE-2024-361xx/CVE-2024-36190.json | 33 +++- CVE-2024/CVE-2024-361xx/CVE-2024-36191.json | 33 +++- CVE-2024/CVE-2024-361xx/CVE-2024-36192.json | 33 +++- CVE-2024/CVE-2024-361xx/CVE-2024-36193.json | 33 +++- CVE-2024/CVE-2024-361xx/CVE-2024-36194.json | 33 +++- CVE-2024/CVE-2024-361xx/CVE-2024-36195.json | 33 +++- CVE-2024/CVE-2024-361xx/CVE-2024-36196.json | 33 +++- CVE-2024/CVE-2024-361xx/CVE-2024-36197.json | 43 ++++- CVE-2024/CVE-2024-361xx/CVE-2024-36198.json | 33 +++- CVE-2024/CVE-2024-361xx/CVE-2024-36199.json | 33 +++- CVE-2024/CVE-2024-362xx/CVE-2024-36200.json | 33 +++- CVE-2024/CVE-2024-362xx/CVE-2024-36201.json | 33 +++- CVE-2024/CVE-2024-362xx/CVE-2024-36202.json | 53 +++++- CVE-2024/CVE-2024-362xx/CVE-2024-36203.json | 33 +++- CVE-2024/CVE-2024-362xx/CVE-2024-36204.json | 53 +++++- CVE-2024/CVE-2024-362xx/CVE-2024-36205.json | 33 +++- CVE-2024/CVE-2024-362xx/CVE-2024-36206.json | 33 +++- CVE-2024/CVE-2024-362xx/CVE-2024-36207.json | 33 +++- CVE-2024/CVE-2024-362xx/CVE-2024-36208.json | 33 +++- CVE-2024/CVE-2024-362xx/CVE-2024-36209.json | 33 +++- CVE-2024/CVE-2024-362xx/CVE-2024-36210.json | 43 ++++- CVE-2024/CVE-2024-362xx/CVE-2024-36211.json | 33 +++- CVE-2024/CVE-2024-362xx/CVE-2024-36212.json | 33 +++- CVE-2024/CVE-2024-362xx/CVE-2024-36213.json | 33 +++- CVE-2024/CVE-2024-362xx/CVE-2024-36214.json | 33 +++- CVE-2024/CVE-2024-362xx/CVE-2024-36215.json | 33 +++- CVE-2024/CVE-2024-362xx/CVE-2024-36216.json | 55 +++++- CVE-2024/CVE-2024-362xx/CVE-2024-36217.json | 43 ++++- CVE-2024/CVE-2024-362xx/CVE-2024-36218.json | 33 +++- CVE-2024/CVE-2024-362xx/CVE-2024-36219.json | 33 +++- CVE-2024/CVE-2024-362xx/CVE-2024-36220.json | 33 +++- CVE-2024/CVE-2024-362xx/CVE-2024-36221.json | 33 +++- CVE-2024/CVE-2024-362xx/CVE-2024-36222.json | 53 +++++- CVE-2024/CVE-2024-362xx/CVE-2024-36224.json | 33 +++- CVE-2024/CVE-2024-362xx/CVE-2024-36225.json | 33 +++- CVE-2024/CVE-2024-362xx/CVE-2024-36231.json | 33 +++- CVE-2024/CVE-2024-362xx/CVE-2024-36232.json | 33 +++- CVE-2024/CVE-2024-365xx/CVE-2024-36527.json | 20 +++ CVE-2024/CVE-2024-365xx/CVE-2024-36543.json | 24 +++ CVE-2024/CVE-2024-369xx/CVE-2024-36973.json | 20 +++ CVE-2024/CVE-2024-376xx/CVE-2024-37661.json | 20 +++ CVE-2024/CVE-2024-376xx/CVE-2024-37662.json | 20 +++ CVE-2024/CVE-2024-376xx/CVE-2024-37663.json | 20 +++ CVE-2024/CVE-2024-376xx/CVE-2024-37664.json | 20 +++ CVE-2024/CVE-2024-377xx/CVE-2024-37794.json | 20 +++ CVE-2024/CVE-2024-377xx/CVE-2024-37795.json | 20 +++ CVE-2024/CVE-2024-378xx/CVE-2024-37840.json | 20 +++ CVE-2024/CVE-2024-384xx/CVE-2024-38449.json | 28 +++ CVE-2024/CVE-2024-38xx/CVE-2024-3876.json | 2 +- CVE-2024/CVE-2024-40xx/CVE-2024-4032.json | 6 +- CVE-2024/CVE-2024-45xx/CVE-2024-4584.json | 2 +- CVE-2024/CVE-2024-45xx/CVE-2024-4595.json | 2 +- CVE-2024/CVE-2024-52xx/CVE-2024-5206.json | 10 +- CVE-2024/CVE-2024-60xx/CVE-2024-6056.json | 92 ++++++++++ CVE-2024/CVE-2024-60xx/CVE-2024-6058.json | 92 ++++++++++ CVE-2024/CVE-2024-60xx/CVE-2024-6059.json | 92 ++++++++++ README.md | 81 +++++---- _state.csv | 181 +++++++++++--------- 71 files changed, 2166 insertions(+), 266 deletions(-) create mode 100644 CVE-2018/CVE-2018-251xx/CVE-2018-25103.json create mode 100644 CVE-2024/CVE-2024-365xx/CVE-2024-36527.json create mode 100644 CVE-2024/CVE-2024-365xx/CVE-2024-36543.json create mode 100644 CVE-2024/CVE-2024-369xx/CVE-2024-36973.json create mode 100644 CVE-2024/CVE-2024-376xx/CVE-2024-37661.json create mode 100644 CVE-2024/CVE-2024-376xx/CVE-2024-37662.json create mode 100644 CVE-2024/CVE-2024-376xx/CVE-2024-37663.json create mode 100644 CVE-2024/CVE-2024-376xx/CVE-2024-37664.json create mode 100644 CVE-2024/CVE-2024-377xx/CVE-2024-37794.json create mode 100644 CVE-2024/CVE-2024-377xx/CVE-2024-37795.json create mode 100644 CVE-2024/CVE-2024-378xx/CVE-2024-37840.json create mode 100644 CVE-2024/CVE-2024-384xx/CVE-2024-38449.json create mode 100644 CVE-2024/CVE-2024-60xx/CVE-2024-6056.json create mode 100644 CVE-2024/CVE-2024-60xx/CVE-2024-6058.json create mode 100644 CVE-2024/CVE-2024-60xx/CVE-2024-6059.json diff --git a/CVE-2018/CVE-2018-251xx/CVE-2018-25103.json b/CVE-2018/CVE-2018-251xx/CVE-2018-25103.json new file mode 100644 index 00000000000..7de2b94f2b7 --- /dev/null +++ b/CVE-2018/CVE-2018-251xx/CVE-2018-25103.json @@ -0,0 +1,36 @@ +{ + "id": "CVE-2018-25103", + "sourceIdentifier": "cret@cert.org", + "published": "2024-06-17T18:15:12.650", + "lastModified": "2024-06-17T18:15:12.650", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "There exists a use-after-free-vulnerability in lighttpd <= 1.4.50 that can allow access to do a case-insensitive comparison against the reused pointer." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://9443417.fs1.hubspotusercontent-na1.net/hubfs/9443417/Security%20Advisories/2024/AMI-SA-2024002.pdf", + "source": "cret@cert.org" + }, + { + "url": "https://blogvdoo.wordpress.com/2018/11/06/giving-back-securing-open-source-iot-projects/#more-736", + "source": "cret@cert.org" + }, + { + "url": "https://github.com/lighttpd/lighttpd1.4/commit/df8e4f95614e476276a55e34da2aa8b00b1148e9", + "source": "cret@cert.org" + }, + { + "url": "https://www.binarly.io/blog/lighttpd-gains-new-life", + "source": "cret@cert.org" + }, + { + "url": "https://www.runzero.com/blog/lighttpd/", + "source": "cret@cert.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-03xx/CVE-2024-0397.json b/CVE-2024/CVE-2024-03xx/CVE-2024-0397.json index 52ae74e3b13..e2175b7b53d 100644 --- a/CVE-2024/CVE-2024-03xx/CVE-2024-0397.json +++ b/CVE-2024/CVE-2024-03xx/CVE-2024-0397.json @@ -2,7 +2,7 @@ "id": "CVE-2024-0397", "sourceIdentifier": "cna@python.org", "published": "2024-06-17T16:15:10.217", - "lastModified": "2024-06-17T16:15:10.217", + "lastModified": "2024-06-17T18:15:14.767", "vulnStatus": "Received", "descriptions": [ { @@ -12,6 +12,10 @@ ], "metrics": {}, "references": [ + { + "url": "http://www.openwall.com/lists/oss-security/2024/06/17/2", + "source": "cna@python.org" + }, { "url": "https://github.com/python/cpython/commit/01c37f1d0714f5822d34063ca7180b595abf589d", "source": "cna@python.org" diff --git a/CVE-2024/CVE-2024-333xx/CVE-2024-33373.json b/CVE-2024/CVE-2024-333xx/CVE-2024-33373.json index 946f66a593e..340067bf615 100644 --- a/CVE-2024/CVE-2024-333xx/CVE-2024-33373.json +++ b/CVE-2024/CVE-2024-333xx/CVE-2024-33373.json @@ -2,7 +2,7 @@ "id": "CVE-2024-33373", "sourceIdentifier": "cve@mitre.org", "published": "2024-06-14T16:15:11.223", - "lastModified": "2024-06-17T12:42:04.623", + "lastModified": "2024-06-17T18:15:15.920", "vulnStatus": "Awaiting Analysis", "descriptions": [ { @@ -16,6 +16,10 @@ ], "metrics": {}, "references": [ + { + "url": "https://github.com/ShravanSinghRathore/Security-Advisory-Multiple-Vulnerabilities-in-LB-link-BL-W1210M-Router/wiki/Password-Policy-Bypass--%7C--Inconsistent-Password-Policy-%28CVE%E2%80%902024%E2%80%9033373%29", + "source": "cve@mitre.org" + }, { "url": "https://redfoxsec.com/blog/security-advisory-multiple-vulnerabilities-in-lb-link-bl-w1210m-router/", "source": "cve@mitre.org" diff --git a/CVE-2024/CVE-2024-333xx/CVE-2024-33374.json b/CVE-2024/CVE-2024-333xx/CVE-2024-33374.json index 8c62e2f87b6..054f19b3b6b 100644 --- a/CVE-2024/CVE-2024-333xx/CVE-2024-33374.json +++ b/CVE-2024/CVE-2024-333xx/CVE-2024-33374.json @@ -2,7 +2,7 @@ "id": "CVE-2024-33374", "sourceIdentifier": "cve@mitre.org", "published": "2024-06-14T15:15:50.073", - "lastModified": "2024-06-17T12:42:04.623", + "lastModified": "2024-06-17T18:15:16.017", "vulnStatus": "Awaiting Analysis", "descriptions": [ { @@ -16,6 +16,10 @@ ], "metrics": {}, "references": [ + { + "url": "https://github.com/ShravanSinghRathore/Security-Advisory-Multiple-Vulnerabilities-in-LB-link-BL-W1210M-Router/wiki/Incorrect-Access-Control-%28CVE%E2%80%902024%E2%80%9033374%29", + "source": "cve@mitre.org" + }, { "url": "https://redfoxsec.com/blog/security-advisory-multiple-vulnerabilities-in-lb-link-bl-w1210m-router/", "source": "cve@mitre.org" diff --git a/CVE-2024/CVE-2024-333xx/CVE-2024-33375.json b/CVE-2024/CVE-2024-333xx/CVE-2024-33375.json index daf8ff12a5b..bf115c6ad2b 100644 --- a/CVE-2024/CVE-2024-333xx/CVE-2024-33375.json +++ b/CVE-2024/CVE-2024-333xx/CVE-2024-33375.json @@ -2,7 +2,7 @@ "id": "CVE-2024-33375", "sourceIdentifier": "cve@mitre.org", "published": "2024-06-14T15:15:50.170", - "lastModified": "2024-06-17T12:42:04.623", + "lastModified": "2024-06-17T19:15:58.107", "vulnStatus": "Awaiting Analysis", "descriptions": [ { @@ -16,6 +16,10 @@ ], "metrics": {}, "references": [ + { + "url": "https://github.com/ShravanSinghRathore/Security-Advisory-Multiple-Vulnerabilities-in-LB-link-BL-W1210M-Router/wiki/Credentials-Stored-in-Cleartext--%7C--Unencrypted-Credentials-%28CVE%E2%80%902024%E2%80%9033375%29", + "source": "cve@mitre.org" + }, { "url": "https://redfoxsec.com/blog/security-advisory-multiple-vulnerabilities-in-lb-link-bl-w1210m-router/", "source": "cve@mitre.org" diff --git a/CVE-2024/CVE-2024-333xx/CVE-2024-33377.json b/CVE-2024/CVE-2024-333xx/CVE-2024-33377.json index 13520a60823..3d74bb9fa37 100644 --- a/CVE-2024/CVE-2024-333xx/CVE-2024-33377.json +++ b/CVE-2024/CVE-2024-333xx/CVE-2024-33377.json @@ -2,7 +2,7 @@ "id": "CVE-2024-33377", "sourceIdentifier": "cve@mitre.org", "published": "2024-06-14T15:15:50.270", - "lastModified": "2024-06-17T12:42:04.623", + "lastModified": "2024-06-17T18:15:16.107", "vulnStatus": "Awaiting Analysis", "descriptions": [ { @@ -16,6 +16,10 @@ ], "metrics": {}, "references": [ + { + "url": "https://github.com/ShravanSinghRathore/Security-Advisory-Multiple-Vulnerabilities-in-LB-link-BL-W1210M-Router/wiki/Clickjacking-%28CVE%E2%80%902024%E2%80%9033377%29", + "source": "cve@mitre.org" + }, { "url": "https://redfoxsec.com/blog/security-advisory-multiple-vulnerabilities-in-lb-link-bl-w1210m-router/", "source": "cve@mitre.org" diff --git a/CVE-2024/CVE-2024-361xx/CVE-2024-36165.json b/CVE-2024/CVE-2024-361xx/CVE-2024-36165.json index 2529ec46ab3..86b3f6898b7 100644 --- a/CVE-2024/CVE-2024-361xx/CVE-2024-36165.json +++ b/CVE-2024/CVE-2024-361xx/CVE-2024-36165.json @@ -2,8 +2,8 @@ "id": "CVE-2024-36165", "sourceIdentifier": "psirt@adobe.com", "published": "2024-06-13T08:16:06.513", - "lastModified": "2024-06-13T18:35:19.777", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-06-17T19:38:08.973", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -50,10 +50,37 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:*:*:*:*", + "versionEndExcluding": "6.5.21", + "matchCriteriaId": "33F20D83-E0D3-4504-B15F-C3240F8CFB90" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:aem_cloud_service:*:*:*", + "versionEndExcluding": "2024.5", + "matchCriteriaId": "8A667B96-AB3F-48AB-9980-11AB79AA7BD7" + } + ] + } + ] + } + ], "references": [ { "url": "https://helpx.adobe.com/security/products/experience-manager/apsb24-28.html", - "source": "psirt@adobe.com" + "source": "psirt@adobe.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-361xx/CVE-2024-36166.json b/CVE-2024/CVE-2024-361xx/CVE-2024-36166.json index 9bcecc38a15..d35ac51ba86 100644 --- a/CVE-2024/CVE-2024-361xx/CVE-2024-36166.json +++ b/CVE-2024/CVE-2024-361xx/CVE-2024-36166.json @@ -2,8 +2,8 @@ "id": "CVE-2024-36166", "sourceIdentifier": "psirt@adobe.com", "published": "2024-06-13T08:16:06.737", - "lastModified": "2024-06-13T18:35:19.777", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-06-17T19:38:19.783", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -39,6 +39,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + }, { "source": "psirt@adobe.com", "type": "Secondary", @@ -50,10 +60,37 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:*:*:*:*", + "versionEndExcluding": "6.5.21", + "matchCriteriaId": "33F20D83-E0D3-4504-B15F-C3240F8CFB90" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:aem_cloud_service:*:*:*", + "versionEndExcluding": "2024.5", + "matchCriteriaId": "8A667B96-AB3F-48AB-9980-11AB79AA7BD7" + } + ] + } + ] + } + ], "references": [ { "url": "https://helpx.adobe.com/security/products/experience-manager/apsb24-28.html", - "source": "psirt@adobe.com" + "source": "psirt@adobe.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-361xx/CVE-2024-36167.json b/CVE-2024/CVE-2024-361xx/CVE-2024-36167.json index c89aef2a8a2..c023ca9ee3f 100644 --- a/CVE-2024/CVE-2024-361xx/CVE-2024-36167.json +++ b/CVE-2024/CVE-2024-361xx/CVE-2024-36167.json @@ -2,8 +2,8 @@ "id": "CVE-2024-36167", "sourceIdentifier": "psirt@adobe.com", "published": "2024-06-13T08:16:06.953", - "lastModified": "2024-06-13T18:35:19.777", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-06-17T19:38:29.453", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -50,10 +50,37 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:*:*:*:*", + "versionEndExcluding": "6.5.21", + "matchCriteriaId": "33F20D83-E0D3-4504-B15F-C3240F8CFB90" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:aem_cloud_service:*:*:*", + "versionEndExcluding": "2024.5", + "matchCriteriaId": "8A667B96-AB3F-48AB-9980-11AB79AA7BD7" + } + ] + } + ] + } + ], "references": [ { "url": "https://helpx.adobe.com/security/products/experience-manager/apsb24-28.html", - "source": "psirt@adobe.com" + "source": "psirt@adobe.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-361xx/CVE-2024-36181.json b/CVE-2024/CVE-2024-361xx/CVE-2024-36181.json index 1dfd7c7ac18..d331d4e3034 100644 --- a/CVE-2024/CVE-2024-361xx/CVE-2024-36181.json +++ b/CVE-2024/CVE-2024-361xx/CVE-2024-36181.json @@ -2,8 +2,8 @@ "id": "CVE-2024-36181", "sourceIdentifier": "psirt@adobe.com", "published": "2024-06-13T08:16:10.143", - "lastModified": "2024-06-13T18:35:19.777", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-06-17T19:50:13.523", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -50,10 +50,37 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:*:*:*:*", + "versionEndExcluding": "6.5.21", + "matchCriteriaId": "33F20D83-E0D3-4504-B15F-C3240F8CFB90" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:aem_cloud_service:*:*:*", + "versionEndExcluding": "2024.5", + "matchCriteriaId": "8A667B96-AB3F-48AB-9980-11AB79AA7BD7" + } + ] + } + ] + } + ], "references": [ { "url": "https://helpx.adobe.com/security/products/experience-manager/apsb24-28.html", - "source": "psirt@adobe.com" + "source": "psirt@adobe.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-361xx/CVE-2024-36182.json b/CVE-2024/CVE-2024-361xx/CVE-2024-36182.json index 451b80e0a2b..ed2c825b3a6 100644 --- a/CVE-2024/CVE-2024-361xx/CVE-2024-36182.json +++ b/CVE-2024/CVE-2024-361xx/CVE-2024-36182.json @@ -2,8 +2,8 @@ "id": "CVE-2024-36182", "sourceIdentifier": "psirt@adobe.com", "published": "2024-06-13T08:16:10.387", - "lastModified": "2024-06-13T18:35:19.777", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-06-17T19:36:00.387", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -50,10 +50,37 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:*:*:*:*", + "versionEndExcluding": "6.5.21", + "matchCriteriaId": "33F20D83-E0D3-4504-B15F-C3240F8CFB90" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:aem_cloud_service:*:*:*", + "versionEndExcluding": "2024.5", + "matchCriteriaId": "8A667B96-AB3F-48AB-9980-11AB79AA7BD7" + } + ] + } + ] + } + ], "references": [ { "url": "https://helpx.adobe.com/security/products/experience-manager/apsb24-28.html", - "source": "psirt@adobe.com" + "source": "psirt@adobe.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-361xx/CVE-2024-36183.json b/CVE-2024/CVE-2024-361xx/CVE-2024-36183.json index 181bdd79fea..991c7485987 100644 --- a/CVE-2024/CVE-2024-361xx/CVE-2024-36183.json +++ b/CVE-2024/CVE-2024-361xx/CVE-2024-36183.json @@ -2,8 +2,8 @@ "id": "CVE-2024-36183", "sourceIdentifier": "psirt@adobe.com", "published": "2024-06-13T08:16:10.613", - "lastModified": "2024-06-13T18:35:19.777", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-06-17T19:49:53.943", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -50,10 +50,37 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:*:*:*:*", + "versionEndExcluding": "6.5.21", + "matchCriteriaId": "33F20D83-E0D3-4504-B15F-C3240F8CFB90" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:aem_cloud_service:*:*:*", + "versionEndExcluding": "2024.5", + "matchCriteriaId": "8A667B96-AB3F-48AB-9980-11AB79AA7BD7" + } + ] + } + ] + } + ], "references": [ { "url": "https://helpx.adobe.com/security/products/experience-manager/apsb24-28.html", - "source": "psirt@adobe.com" + "source": "psirt@adobe.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-361xx/CVE-2024-36184.json b/CVE-2024/CVE-2024-361xx/CVE-2024-36184.json index 56493871dbc..ce0da411f34 100644 --- a/CVE-2024/CVE-2024-361xx/CVE-2024-36184.json +++ b/CVE-2024/CVE-2024-361xx/CVE-2024-36184.json @@ -2,8 +2,8 @@ "id": "CVE-2024-36184", "sourceIdentifier": "psirt@adobe.com", "published": "2024-06-13T08:16:10.843", - "lastModified": "2024-06-13T18:35:19.777", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-06-17T19:49:42.257", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -50,10 +50,37 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:*:*:*:*", + "versionEndExcluding": "6.5.21", + "matchCriteriaId": "33F20D83-E0D3-4504-B15F-C3240F8CFB90" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:aem_cloud_service:*:*:*", + "versionEndExcluding": "2024.5", + "matchCriteriaId": "8A667B96-AB3F-48AB-9980-11AB79AA7BD7" + } + ] + } + ] + } + ], "references": [ { "url": "https://helpx.adobe.com/security/products/experience-manager/apsb24-28.html", - "source": "psirt@adobe.com" + "source": "psirt@adobe.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-361xx/CVE-2024-36190.json b/CVE-2024/CVE-2024-361xx/CVE-2024-36190.json index b6700805ff7..b9f1ad17a74 100644 --- a/CVE-2024/CVE-2024-361xx/CVE-2024-36190.json +++ b/CVE-2024/CVE-2024-361xx/CVE-2024-36190.json @@ -2,8 +2,8 @@ "id": "CVE-2024-36190", "sourceIdentifier": "psirt@adobe.com", "published": "2024-06-13T08:16:12.257", - "lastModified": "2024-06-13T18:35:19.777", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-06-17T19:49:13.337", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -50,10 +50,37 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:*:*:*:*", + "versionEndExcluding": "6.5.21", + "matchCriteriaId": "33F20D83-E0D3-4504-B15F-C3240F8CFB90" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:aem_cloud_service:*:*:*", + "versionEndExcluding": "2024.5", + "matchCriteriaId": "8A667B96-AB3F-48AB-9980-11AB79AA7BD7" + } + ] + } + ] + } + ], "references": [ { "url": "https://helpx.adobe.com/security/products/experience-manager/apsb24-28.html", - "source": "psirt@adobe.com" + "source": "psirt@adobe.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-361xx/CVE-2024-36191.json b/CVE-2024/CVE-2024-361xx/CVE-2024-36191.json index 1dc41fb783f..bf699064a5f 100644 --- a/CVE-2024/CVE-2024-361xx/CVE-2024-36191.json +++ b/CVE-2024/CVE-2024-361xx/CVE-2024-36191.json @@ -2,8 +2,8 @@ "id": "CVE-2024-36191", "sourceIdentifier": "psirt@adobe.com", "published": "2024-06-13T08:16:12.480", - "lastModified": "2024-06-13T18:35:19.777", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-06-17T19:06:28.207", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -50,10 +50,37 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:*:*:*:*", + "versionEndExcluding": "6.5.21", + "matchCriteriaId": "33F20D83-E0D3-4504-B15F-C3240F8CFB90" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:aem_cloud_service:*:*:*", + "versionEndExcluding": "2024.5", + "matchCriteriaId": "8A667B96-AB3F-48AB-9980-11AB79AA7BD7" + } + ] + } + ] + } + ], "references": [ { "url": "https://helpx.adobe.com/security/products/experience-manager/apsb24-28.html", - "source": "psirt@adobe.com" + "source": "psirt@adobe.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-361xx/CVE-2024-36192.json b/CVE-2024/CVE-2024-361xx/CVE-2024-36192.json index 20760628b8e..616f74025bc 100644 --- a/CVE-2024/CVE-2024-361xx/CVE-2024-36192.json +++ b/CVE-2024/CVE-2024-361xx/CVE-2024-36192.json @@ -2,8 +2,8 @@ "id": "CVE-2024-36192", "sourceIdentifier": "psirt@adobe.com", "published": "2024-06-13T08:16:12.703", - "lastModified": "2024-06-13T18:35:19.777", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-06-17T19:01:16.820", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -50,10 +50,37 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:*:*:*:*", + "versionEndExcluding": "6.5.21", + "matchCriteriaId": "33F20D83-E0D3-4504-B15F-C3240F8CFB90" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:aem_cloud_service:*:*:*", + "versionEndExcluding": "2024.5", + "matchCriteriaId": "8A667B96-AB3F-48AB-9980-11AB79AA7BD7" + } + ] + } + ] + } + ], "references": [ { "url": "https://helpx.adobe.com/security/products/experience-manager/apsb24-28.html", - "source": "psirt@adobe.com" + "source": "psirt@adobe.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-361xx/CVE-2024-36193.json b/CVE-2024/CVE-2024-361xx/CVE-2024-36193.json index 4c2ee0ab686..4af4918162a 100644 --- a/CVE-2024/CVE-2024-361xx/CVE-2024-36193.json +++ b/CVE-2024/CVE-2024-361xx/CVE-2024-36193.json @@ -2,8 +2,8 @@ "id": "CVE-2024-36193", "sourceIdentifier": "psirt@adobe.com", "published": "2024-06-13T08:16:12.930", - "lastModified": "2024-06-13T18:35:19.777", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-06-17T18:57:12.537", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -50,10 +50,37 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:*:*:*:*", + "versionEndExcluding": "6.5.21", + "matchCriteriaId": "33F20D83-E0D3-4504-B15F-C3240F8CFB90" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:aem_cloud_service:*:*:*", + "versionEndExcluding": "2024.5", + "matchCriteriaId": "8A667B96-AB3F-48AB-9980-11AB79AA7BD7" + } + ] + } + ] + } + ], "references": [ { "url": "https://helpx.adobe.com/security/products/experience-manager/apsb24-28.html", - "source": "psirt@adobe.com" + "source": "psirt@adobe.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-361xx/CVE-2024-36194.json b/CVE-2024/CVE-2024-361xx/CVE-2024-36194.json index e5c413e95aa..46a781ce0c0 100644 --- a/CVE-2024/CVE-2024-361xx/CVE-2024-36194.json +++ b/CVE-2024/CVE-2024-361xx/CVE-2024-36194.json @@ -2,8 +2,8 @@ "id": "CVE-2024-36194", "sourceIdentifier": "psirt@adobe.com", "published": "2024-06-13T08:16:13.210", - "lastModified": "2024-06-13T18:35:19.777", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-06-17T18:56:57.933", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -50,10 +50,37 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:*:*:*:*", + "versionEndExcluding": "6.5.21", + "matchCriteriaId": "33F20D83-E0D3-4504-B15F-C3240F8CFB90" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:aem_cloud_service:*:*:*", + "versionEndExcluding": "2024.5", + "matchCriteriaId": "8A667B96-AB3F-48AB-9980-11AB79AA7BD7" + } + ] + } + ] + } + ], "references": [ { "url": "https://helpx.adobe.com/security/products/experience-manager/apsb24-28.html", - "source": "psirt@adobe.com" + "source": "psirt@adobe.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-361xx/CVE-2024-36195.json b/CVE-2024/CVE-2024-361xx/CVE-2024-36195.json index 2c8fcf09e96..e1c27eaa31d 100644 --- a/CVE-2024/CVE-2024-361xx/CVE-2024-36195.json +++ b/CVE-2024/CVE-2024-361xx/CVE-2024-36195.json @@ -2,8 +2,8 @@ "id": "CVE-2024-36195", "sourceIdentifier": "psirt@adobe.com", "published": "2024-06-13T08:16:13.443", - "lastModified": "2024-06-13T18:35:19.777", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-06-17T18:56:48.090", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -50,10 +50,37 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:*:*:*:*", + "versionEndExcluding": "6.5.21", + "matchCriteriaId": "33F20D83-E0D3-4504-B15F-C3240F8CFB90" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:aem_cloud_service:*:*:*", + "versionEndExcluding": "2024.5", + "matchCriteriaId": "8A667B96-AB3F-48AB-9980-11AB79AA7BD7" + } + ] + } + ] + } + ], "references": [ { "url": "https://helpx.adobe.com/security/products/experience-manager/apsb24-28.html", - "source": "psirt@adobe.com" + "source": "psirt@adobe.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-361xx/CVE-2024-36196.json b/CVE-2024/CVE-2024-361xx/CVE-2024-36196.json index ec56d2253b6..71988f94a04 100644 --- a/CVE-2024/CVE-2024-361xx/CVE-2024-36196.json +++ b/CVE-2024/CVE-2024-361xx/CVE-2024-36196.json @@ -2,8 +2,8 @@ "id": "CVE-2024-36196", "sourceIdentifier": "psirt@adobe.com", "published": "2024-06-13T08:16:13.680", - "lastModified": "2024-06-13T18:35:19.777", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-06-17T18:56:33.480", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -50,10 +50,37 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:*:*:*:*", + "versionEndExcluding": "6.5.21", + "matchCriteriaId": "33F20D83-E0D3-4504-B15F-C3240F8CFB90" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:aem_cloud_service:*:*:*", + "versionEndExcluding": "2024.5", + "matchCriteriaId": "8A667B96-AB3F-48AB-9980-11AB79AA7BD7" + } + ] + } + ] + } + ], "references": [ { "url": "https://helpx.adobe.com/security/products/experience-manager/apsb24-28.html", - "source": "psirt@adobe.com" + "source": "psirt@adobe.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-361xx/CVE-2024-36197.json b/CVE-2024/CVE-2024-361xx/CVE-2024-36197.json index c3ce703d1fb..68603ef88e6 100644 --- a/CVE-2024/CVE-2024-361xx/CVE-2024-36197.json +++ b/CVE-2024/CVE-2024-361xx/CVE-2024-36197.json @@ -2,8 +2,8 @@ "id": "CVE-2024-36197", "sourceIdentifier": "psirt@adobe.com", "published": "2024-06-13T08:16:13.920", - "lastModified": "2024-06-13T18:35:19.777", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-06-17T19:48:57.047", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -39,6 +39,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + }, { "source": "psirt@adobe.com", "type": "Secondary", @@ -50,10 +60,37 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:*:*:*:*", + "versionEndExcluding": "6.5.21", + "matchCriteriaId": "33F20D83-E0D3-4504-B15F-C3240F8CFB90" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:aem_cloud_service:*:*:*", + "versionEndExcluding": "2024.5", + "matchCriteriaId": "8A667B96-AB3F-48AB-9980-11AB79AA7BD7" + } + ] + } + ] + } + ], "references": [ { "url": "https://helpx.adobe.com/security/products/experience-manager/apsb24-28.html", - "source": "psirt@adobe.com" + "source": "psirt@adobe.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-361xx/CVE-2024-36198.json b/CVE-2024/CVE-2024-361xx/CVE-2024-36198.json index eeacf63c881..cbdea20b7f7 100644 --- a/CVE-2024/CVE-2024-361xx/CVE-2024-36198.json +++ b/CVE-2024/CVE-2024-361xx/CVE-2024-36198.json @@ -2,8 +2,8 @@ "id": "CVE-2024-36198", "sourceIdentifier": "psirt@adobe.com", "published": "2024-06-13T08:16:14.147", - "lastModified": "2024-06-13T18:35:19.777", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-06-17T18:56:20.607", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -50,10 +50,37 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:*:*:*:*", + "versionEndExcluding": "6.5.21", + "matchCriteriaId": "33F20D83-E0D3-4504-B15F-C3240F8CFB90" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:aem_cloud_service:*:*:*", + "versionEndExcluding": "2024.5", + "matchCriteriaId": "8A667B96-AB3F-48AB-9980-11AB79AA7BD7" + } + ] + } + ] + } + ], "references": [ { "url": "https://helpx.adobe.com/security/products/experience-manager/apsb24-28.html", - "source": "psirt@adobe.com" + "source": "psirt@adobe.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-361xx/CVE-2024-36199.json b/CVE-2024/CVE-2024-361xx/CVE-2024-36199.json index 5719a787df9..5b4d0963c4b 100644 --- a/CVE-2024/CVE-2024-361xx/CVE-2024-36199.json +++ b/CVE-2024/CVE-2024-361xx/CVE-2024-36199.json @@ -2,8 +2,8 @@ "id": "CVE-2024-36199", "sourceIdentifier": "psirt@adobe.com", "published": "2024-06-13T08:16:14.367", - "lastModified": "2024-06-13T18:35:19.777", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-06-17T18:56:07.053", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -50,10 +50,37 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:*:*:*:*", + "versionEndExcluding": "6.5.21", + "matchCriteriaId": "33F20D83-E0D3-4504-B15F-C3240F8CFB90" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:aem_cloud_service:*:*:*", + "versionEndExcluding": "2024.5", + "matchCriteriaId": "8A667B96-AB3F-48AB-9980-11AB79AA7BD7" + } + ] + } + ] + } + ], "references": [ { "url": "https://helpx.adobe.com/security/products/experience-manager/apsb24-28.html", - "source": "psirt@adobe.com" + "source": "psirt@adobe.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-362xx/CVE-2024-36200.json b/CVE-2024/CVE-2024-362xx/CVE-2024-36200.json index 760e0aa9869..5bf9309ab9c 100644 --- a/CVE-2024/CVE-2024-362xx/CVE-2024-36200.json +++ b/CVE-2024/CVE-2024-362xx/CVE-2024-36200.json @@ -2,8 +2,8 @@ "id": "CVE-2024-36200", "sourceIdentifier": "psirt@adobe.com", "published": "2024-06-13T08:16:14.597", - "lastModified": "2024-06-13T18:35:19.777", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-06-17T18:55:53.703", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -50,10 +50,37 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:*:*:*:*", + "versionEndExcluding": "6.5.21", + "matchCriteriaId": "33F20D83-E0D3-4504-B15F-C3240F8CFB90" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:aem_cloud_service:*:*:*", + "versionEndExcluding": "2024.5", + "matchCriteriaId": "8A667B96-AB3F-48AB-9980-11AB79AA7BD7" + } + ] + } + ] + } + ], "references": [ { "url": "https://helpx.adobe.com/security/products/experience-manager/apsb24-28.html", - "source": "psirt@adobe.com" + "source": "psirt@adobe.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-362xx/CVE-2024-36201.json b/CVE-2024/CVE-2024-362xx/CVE-2024-36201.json index 8b1385c4896..9f69f58e6f5 100644 --- a/CVE-2024/CVE-2024-362xx/CVE-2024-36201.json +++ b/CVE-2024/CVE-2024-362xx/CVE-2024-36201.json @@ -2,8 +2,8 @@ "id": "CVE-2024-36201", "sourceIdentifier": "psirt@adobe.com", "published": "2024-06-13T08:16:14.817", - "lastModified": "2024-06-13T18:35:19.777", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-06-17T18:55:34.580", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -50,10 +50,37 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:*:*:*:*", + "versionEndExcluding": "6.5.21", + "matchCriteriaId": "33F20D83-E0D3-4504-B15F-C3240F8CFB90" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:aem_cloud_service:*:*:*", + "versionEndExcluding": "2024.5", + "matchCriteriaId": "8A667B96-AB3F-48AB-9980-11AB79AA7BD7" + } + ] + } + ] + } + ], "references": [ { "url": "https://helpx.adobe.com/security/products/experience-manager/apsb24-28.html", - "source": "psirt@adobe.com" + "source": "psirt@adobe.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-362xx/CVE-2024-36202.json b/CVE-2024/CVE-2024-362xx/CVE-2024-36202.json index 462ce7ec866..c44f606c8e4 100644 --- a/CVE-2024/CVE-2024-362xx/CVE-2024-36202.json +++ b/CVE-2024/CVE-2024-362xx/CVE-2024-36202.json @@ -2,8 +2,8 @@ "id": "CVE-2024-36202", "sourceIdentifier": "psirt@adobe.com", "published": "2024-06-13T08:16:15.090", - "lastModified": "2024-06-13T18:35:19.777", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-06-17T18:55:21.577", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -16,6 +16,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 + }, { "source": "psirt@adobe.com", "type": "Secondary", @@ -50,10 +70,37 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:*:*:*:*", + "versionEndExcluding": "6.5.21", + "matchCriteriaId": "33F20D83-E0D3-4504-B15F-C3240F8CFB90" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:aem_cloud_service:*:*:*", + "versionEndExcluding": "2024.5", + "matchCriteriaId": "8A667B96-AB3F-48AB-9980-11AB79AA7BD7" + } + ] + } + ] + } + ], "references": [ { "url": "https://helpx.adobe.com/security/products/experience-manager/apsb24-28.html", - "source": "psirt@adobe.com" + "source": "psirt@adobe.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-362xx/CVE-2024-36203.json b/CVE-2024/CVE-2024-362xx/CVE-2024-36203.json index 5974f8c17cc..7604817328d 100644 --- a/CVE-2024/CVE-2024-362xx/CVE-2024-36203.json +++ b/CVE-2024/CVE-2024-362xx/CVE-2024-36203.json @@ -2,8 +2,8 @@ "id": "CVE-2024-36203", "sourceIdentifier": "psirt@adobe.com", "published": "2024-06-13T08:16:15.337", - "lastModified": "2024-06-13T18:35:19.777", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-06-17T19:23:59.480", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -50,10 +50,37 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:*:*:*:*", + "versionEndExcluding": "6.5.21", + "matchCriteriaId": "33F20D83-E0D3-4504-B15F-C3240F8CFB90" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:aem_cloud_service:*:*:*", + "versionEndExcluding": "2024.5", + "matchCriteriaId": "8A667B96-AB3F-48AB-9980-11AB79AA7BD7" + } + ] + } + ] + } + ], "references": [ { "url": "https://helpx.adobe.com/security/products/experience-manager/apsb24-28.html", - "source": "psirt@adobe.com" + "source": "psirt@adobe.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-362xx/CVE-2024-36204.json b/CVE-2024/CVE-2024-362xx/CVE-2024-36204.json index 94d4717a720..db21e911a56 100644 --- a/CVE-2024/CVE-2024-362xx/CVE-2024-36204.json +++ b/CVE-2024/CVE-2024-362xx/CVE-2024-36204.json @@ -2,8 +2,8 @@ "id": "CVE-2024-36204", "sourceIdentifier": "psirt@adobe.com", "published": "2024-06-13T08:16:15.643", - "lastModified": "2024-06-13T18:35:19.777", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-06-17T19:23:45.870", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -16,6 +16,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 + }, { "source": "psirt@adobe.com", "type": "Secondary", @@ -50,10 +70,37 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:*:*:*:*", + "versionEndExcluding": "6.5.21", + "matchCriteriaId": "33F20D83-E0D3-4504-B15F-C3240F8CFB90" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:aem_cloud_service:*:*:*", + "versionEndExcluding": "2024.5", + "matchCriteriaId": "8A667B96-AB3F-48AB-9980-11AB79AA7BD7" + } + ] + } + ] + } + ], "references": [ { "url": "https://helpx.adobe.com/security/products/experience-manager/apsb24-28.html", - "source": "psirt@adobe.com" + "source": "psirt@adobe.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-362xx/CVE-2024-36205.json b/CVE-2024/CVE-2024-362xx/CVE-2024-36205.json index 19158d3b3f6..0277e07067c 100644 --- a/CVE-2024/CVE-2024-362xx/CVE-2024-36205.json +++ b/CVE-2024/CVE-2024-362xx/CVE-2024-36205.json @@ -2,8 +2,8 @@ "id": "CVE-2024-36205", "sourceIdentifier": "psirt@adobe.com", "published": "2024-06-13T08:16:15.890", - "lastModified": "2024-06-13T18:35:19.777", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-06-17T19:23:22.583", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -50,10 +50,37 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:*:*:*:*", + "versionEndExcluding": "6.5.21", + "matchCriteriaId": "33F20D83-E0D3-4504-B15F-C3240F8CFB90" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:aem_cloud_service:*:*:*", + "versionEndExcluding": "2024.5", + "matchCriteriaId": "8A667B96-AB3F-48AB-9980-11AB79AA7BD7" + } + ] + } + ] + } + ], "references": [ { "url": "https://helpx.adobe.com/security/products/experience-manager/apsb24-28.html", - "source": "psirt@adobe.com" + "source": "psirt@adobe.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-362xx/CVE-2024-36206.json b/CVE-2024/CVE-2024-362xx/CVE-2024-36206.json index cd42da29b9a..790cfca236c 100644 --- a/CVE-2024/CVE-2024-362xx/CVE-2024-36206.json +++ b/CVE-2024/CVE-2024-362xx/CVE-2024-36206.json @@ -2,8 +2,8 @@ "id": "CVE-2024-36206", "sourceIdentifier": "psirt@adobe.com", "published": "2024-06-13T08:16:16.110", - "lastModified": "2024-06-13T18:35:19.777", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-06-17T19:23:04.890", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -50,10 +50,37 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:*:*:*:*", + "versionEndExcluding": "6.5.21", + "matchCriteriaId": "33F20D83-E0D3-4504-B15F-C3240F8CFB90" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:aem_cloud_service:*:*:*", + "versionEndExcluding": "2024.5", + "matchCriteriaId": "8A667B96-AB3F-48AB-9980-11AB79AA7BD7" + } + ] + } + ] + } + ], "references": [ { "url": "https://helpx.adobe.com/security/products/experience-manager/apsb24-28.html", - "source": "psirt@adobe.com" + "source": "psirt@adobe.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-362xx/CVE-2024-36207.json b/CVE-2024/CVE-2024-362xx/CVE-2024-36207.json index ff28bff0643..a9fec5b2011 100644 --- a/CVE-2024/CVE-2024-362xx/CVE-2024-36207.json +++ b/CVE-2024/CVE-2024-362xx/CVE-2024-36207.json @@ -2,8 +2,8 @@ "id": "CVE-2024-36207", "sourceIdentifier": "psirt@adobe.com", "published": "2024-06-13T08:16:16.333", - "lastModified": "2024-06-13T18:35:19.777", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-06-17T19:22:41.023", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -50,10 +50,37 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:*:*:*:*", + "versionEndExcluding": "6.5.21", + "matchCriteriaId": "33F20D83-E0D3-4504-B15F-C3240F8CFB90" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:aem_cloud_service:*:*:*", + "versionEndExcluding": "2024.5", + "matchCriteriaId": "8A667B96-AB3F-48AB-9980-11AB79AA7BD7" + } + ] + } + ] + } + ], "references": [ { "url": "https://helpx.adobe.com/security/products/experience-manager/apsb24-28.html", - "source": "psirt@adobe.com" + "source": "psirt@adobe.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-362xx/CVE-2024-36208.json b/CVE-2024/CVE-2024-362xx/CVE-2024-36208.json index a1e166218f9..39b48dcd1f5 100644 --- a/CVE-2024/CVE-2024-362xx/CVE-2024-36208.json +++ b/CVE-2024/CVE-2024-362xx/CVE-2024-36208.json @@ -2,8 +2,8 @@ "id": "CVE-2024-36208", "sourceIdentifier": "psirt@adobe.com", "published": "2024-06-13T08:16:16.560", - "lastModified": "2024-06-13T18:35:19.777", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-06-17T19:22:29.990", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -50,10 +50,37 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:*:*:*:*", + "versionEndExcluding": "6.5.21", + "matchCriteriaId": "33F20D83-E0D3-4504-B15F-C3240F8CFB90" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:aem_cloud_service:*:*:*", + "versionEndExcluding": "2024.5", + "matchCriteriaId": "8A667B96-AB3F-48AB-9980-11AB79AA7BD7" + } + ] + } + ] + } + ], "references": [ { "url": "https://helpx.adobe.com/security/products/experience-manager/apsb24-28.html", - "source": "psirt@adobe.com" + "source": "psirt@adobe.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-362xx/CVE-2024-36209.json b/CVE-2024/CVE-2024-362xx/CVE-2024-36209.json index c10605321a0..0dde1987abd 100644 --- a/CVE-2024/CVE-2024-362xx/CVE-2024-36209.json +++ b/CVE-2024/CVE-2024-362xx/CVE-2024-36209.json @@ -2,8 +2,8 @@ "id": "CVE-2024-36209", "sourceIdentifier": "psirt@adobe.com", "published": "2024-06-13T08:16:16.790", - "lastModified": "2024-06-13T18:35:19.777", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-06-17T19:22:21.057", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -50,10 +50,37 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:*:*:*:*", + "versionEndExcluding": "6.5.21", + "matchCriteriaId": "33F20D83-E0D3-4504-B15F-C3240F8CFB90" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:aem_cloud_service:*:*:*", + "versionEndExcluding": "2024.5", + "matchCriteriaId": "8A667B96-AB3F-48AB-9980-11AB79AA7BD7" + } + ] + } + ] + } + ], "references": [ { "url": "https://helpx.adobe.com/security/products/experience-manager/apsb24-28.html", - "source": "psirt@adobe.com" + "source": "psirt@adobe.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-362xx/CVE-2024-36210.json b/CVE-2024/CVE-2024-362xx/CVE-2024-36210.json index aabda5e0393..0d648d4d5d3 100644 --- a/CVE-2024/CVE-2024-362xx/CVE-2024-36210.json +++ b/CVE-2024/CVE-2024-362xx/CVE-2024-36210.json @@ -2,8 +2,8 @@ "id": "CVE-2024-36210", "sourceIdentifier": "psirt@adobe.com", "published": "2024-06-13T08:16:17.027", - "lastModified": "2024-06-13T18:35:19.777", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-06-17T19:22:07.157", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -39,6 +39,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + }, { "source": "psirt@adobe.com", "type": "Secondary", @@ -50,10 +60,37 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:*:*:*:*", + "versionEndExcluding": "6.5.21", + "matchCriteriaId": "33F20D83-E0D3-4504-B15F-C3240F8CFB90" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:aem_cloud_service:*:*:*", + "versionEndExcluding": "2024.5", + "matchCriteriaId": "8A667B96-AB3F-48AB-9980-11AB79AA7BD7" + } + ] + } + ] + } + ], "references": [ { "url": "https://helpx.adobe.com/security/products/experience-manager/apsb24-28.html", - "source": "psirt@adobe.com" + "source": "psirt@adobe.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-362xx/CVE-2024-36211.json b/CVE-2024/CVE-2024-362xx/CVE-2024-36211.json index 53b5b355679..36063f29cb6 100644 --- a/CVE-2024/CVE-2024-362xx/CVE-2024-36211.json +++ b/CVE-2024/CVE-2024-362xx/CVE-2024-36211.json @@ -2,8 +2,8 @@ "id": "CVE-2024-36211", "sourceIdentifier": "psirt@adobe.com", "published": "2024-06-13T08:16:17.247", - "lastModified": "2024-06-13T18:35:19.777", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-06-17T19:21:53.777", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -50,10 +50,37 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:*:*:*:*", + "versionEndExcluding": "6.5.21", + "matchCriteriaId": "33F20D83-E0D3-4504-B15F-C3240F8CFB90" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:aem_cloud_service:*:*:*", + "versionEndExcluding": "2024.5", + "matchCriteriaId": "8A667B96-AB3F-48AB-9980-11AB79AA7BD7" + } + ] + } + ] + } + ], "references": [ { "url": "https://helpx.adobe.com/security/products/experience-manager/apsb24-28.html", - "source": "psirt@adobe.com" + "source": "psirt@adobe.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-362xx/CVE-2024-36212.json b/CVE-2024/CVE-2024-362xx/CVE-2024-36212.json index 66444a5418f..c3a642949d2 100644 --- a/CVE-2024/CVE-2024-362xx/CVE-2024-36212.json +++ b/CVE-2024/CVE-2024-362xx/CVE-2024-36212.json @@ -2,8 +2,8 @@ "id": "CVE-2024-36212", "sourceIdentifier": "psirt@adobe.com", "published": "2024-06-13T08:16:17.470", - "lastModified": "2024-06-13T18:35:19.777", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-06-17T19:21:43.703", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -50,10 +50,37 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:*:*:*:*", + "versionEndExcluding": "6.5.21", + "matchCriteriaId": "33F20D83-E0D3-4504-B15F-C3240F8CFB90" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:aem_cloud_service:*:*:*", + "versionEndExcluding": "2024.5", + "matchCriteriaId": "8A667B96-AB3F-48AB-9980-11AB79AA7BD7" + } + ] + } + ] + } + ], "references": [ { "url": "https://helpx.adobe.com/security/products/experience-manager/apsb24-28.html", - "source": "psirt@adobe.com" + "source": "psirt@adobe.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-362xx/CVE-2024-36213.json b/CVE-2024/CVE-2024-362xx/CVE-2024-36213.json index 69d8923c592..fbdf46e79bb 100644 --- a/CVE-2024/CVE-2024-362xx/CVE-2024-36213.json +++ b/CVE-2024/CVE-2024-362xx/CVE-2024-36213.json @@ -2,8 +2,8 @@ "id": "CVE-2024-36213", "sourceIdentifier": "psirt@adobe.com", "published": "2024-06-13T08:16:17.693", - "lastModified": "2024-06-13T18:35:19.777", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-06-17T19:09:24.977", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -50,10 +50,37 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:*:*:*:*", + "versionEndExcluding": "6.5.21", + "matchCriteriaId": "33F20D83-E0D3-4504-B15F-C3240F8CFB90" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:aem_cloud_service:*:*:*", + "versionEndExcluding": "2024.5", + "matchCriteriaId": "8A667B96-AB3F-48AB-9980-11AB79AA7BD7" + } + ] + } + ] + } + ], "references": [ { "url": "https://helpx.adobe.com/security/products/experience-manager/apsb24-28.html", - "source": "psirt@adobe.com" + "source": "psirt@adobe.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-362xx/CVE-2024-36214.json b/CVE-2024/CVE-2024-362xx/CVE-2024-36214.json index 1133475769e..b829cf48797 100644 --- a/CVE-2024/CVE-2024-362xx/CVE-2024-36214.json +++ b/CVE-2024/CVE-2024-362xx/CVE-2024-36214.json @@ -2,8 +2,8 @@ "id": "CVE-2024-36214", "sourceIdentifier": "psirt@adobe.com", "published": "2024-06-13T08:16:17.917", - "lastModified": "2024-06-13T18:35:19.777", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-06-17T19:35:49.083", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -50,10 +50,37 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:*:*:*:*", + "versionEndExcluding": "6.5.21", + "matchCriteriaId": "33F20D83-E0D3-4504-B15F-C3240F8CFB90" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:aem_cloud_service:*:*:*", + "versionEndExcluding": "2024.5", + "matchCriteriaId": "8A667B96-AB3F-48AB-9980-11AB79AA7BD7" + } + ] + } + ] + } + ], "references": [ { "url": "https://helpx.adobe.com/security/products/experience-manager/apsb24-28.html", - "source": "psirt@adobe.com" + "source": "psirt@adobe.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-362xx/CVE-2024-36215.json b/CVE-2024/CVE-2024-362xx/CVE-2024-36215.json index ccef2cc705b..44d96002b95 100644 --- a/CVE-2024/CVE-2024-362xx/CVE-2024-36215.json +++ b/CVE-2024/CVE-2024-362xx/CVE-2024-36215.json @@ -2,8 +2,8 @@ "id": "CVE-2024-36215", "sourceIdentifier": "psirt@adobe.com", "published": "2024-06-13T08:16:18.140", - "lastModified": "2024-06-13T18:35:19.777", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-06-17T19:33:11.697", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -50,10 +50,37 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:*:*:*:*", + "versionEndExcluding": "6.5.21", + "matchCriteriaId": "33F20D83-E0D3-4504-B15F-C3240F8CFB90" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:aem_cloud_service:*:*:*", + "versionEndExcluding": "2024.5", + "matchCriteriaId": "8A667B96-AB3F-48AB-9980-11AB79AA7BD7" + } + ] + } + ] + } + ], "references": [ { "url": "https://helpx.adobe.com/security/products/experience-manager/apsb24-28.html", - "source": "psirt@adobe.com" + "source": "psirt@adobe.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-362xx/CVE-2024-36216.json b/CVE-2024/CVE-2024-362xx/CVE-2024-36216.json index 71054c6dcb5..9ae276cad8a 100644 --- a/CVE-2024/CVE-2024-362xx/CVE-2024-36216.json +++ b/CVE-2024/CVE-2024-362xx/CVE-2024-36216.json @@ -2,8 +2,8 @@ "id": "CVE-2024-36216", "sourceIdentifier": "psirt@adobe.com", "published": "2024-06-13T08:16:18.387", - "lastModified": "2024-06-13T18:35:19.777", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-06-17T19:42:09.377", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -17,8 +17,28 @@ "metrics": { "cvssMetricV31": [ { - "source": "psirt@adobe.com", + "source": "nvd@nist.gov", "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 6.1, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 + }, + { + "source": "psirt@adobe.com", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", @@ -50,10 +70,37 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:*:*:*:*", + "versionEndExcluding": "6.5.21", + "matchCriteriaId": "33F20D83-E0D3-4504-B15F-C3240F8CFB90" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:aem_cloud_service:*:*:*", + "versionEndExcluding": "2024.5", + "matchCriteriaId": "8A667B96-AB3F-48AB-9980-11AB79AA7BD7" + } + ] + } + ] + } + ], "references": [ { "url": "https://helpx.adobe.com/security/products/experience-manager/apsb24-28.html", - "source": "psirt@adobe.com" + "source": "psirt@adobe.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-362xx/CVE-2024-36217.json b/CVE-2024/CVE-2024-362xx/CVE-2024-36217.json index 0bc7f05eb25..c5dffd7fd09 100644 --- a/CVE-2024/CVE-2024-362xx/CVE-2024-36217.json +++ b/CVE-2024/CVE-2024-362xx/CVE-2024-36217.json @@ -2,8 +2,8 @@ "id": "CVE-2024-36217", "sourceIdentifier": "psirt@adobe.com", "published": "2024-06-13T08:16:18.647", - "lastModified": "2024-06-13T18:35:19.777", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-06-17T19:33:01.643", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -39,6 +39,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + }, { "source": "psirt@adobe.com", "type": "Secondary", @@ -50,10 +60,37 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:*:*:*:*", + "versionEndExcluding": "6.5.21", + "matchCriteriaId": "33F20D83-E0D3-4504-B15F-C3240F8CFB90" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:aem_cloud_service:*:*:*", + "versionEndExcluding": "2024.5", + "matchCriteriaId": "8A667B96-AB3F-48AB-9980-11AB79AA7BD7" + } + ] + } + ] + } + ], "references": [ { "url": "https://helpx.adobe.com/security/products/experience-manager/apsb24-28.html", - "source": "psirt@adobe.com" + "source": "psirt@adobe.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-362xx/CVE-2024-36218.json b/CVE-2024/CVE-2024-362xx/CVE-2024-36218.json index 4d331732716..4b08e7e3084 100644 --- a/CVE-2024/CVE-2024-362xx/CVE-2024-36218.json +++ b/CVE-2024/CVE-2024-362xx/CVE-2024-36218.json @@ -2,8 +2,8 @@ "id": "CVE-2024-36218", "sourceIdentifier": "psirt@adobe.com", "published": "2024-06-13T08:16:18.880", - "lastModified": "2024-06-13T18:35:19.777", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-06-17T19:32:51.723", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -50,10 +50,37 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:*:*:*:*", + "versionEndExcluding": "6.5.21", + "matchCriteriaId": "33F20D83-E0D3-4504-B15F-C3240F8CFB90" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:aem_cloud_service:*:*:*", + "versionEndExcluding": "2024.5", + "matchCriteriaId": "8A667B96-AB3F-48AB-9980-11AB79AA7BD7" + } + ] + } + ] + } + ], "references": [ { "url": "https://helpx.adobe.com/security/products/experience-manager/apsb24-28.html", - "source": "psirt@adobe.com" + "source": "psirt@adobe.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-362xx/CVE-2024-36219.json b/CVE-2024/CVE-2024-362xx/CVE-2024-36219.json index 4b4b4d3e686..7c602170cbc 100644 --- a/CVE-2024/CVE-2024-362xx/CVE-2024-36219.json +++ b/CVE-2024/CVE-2024-362xx/CVE-2024-36219.json @@ -2,8 +2,8 @@ "id": "CVE-2024-36219", "sourceIdentifier": "psirt@adobe.com", "published": "2024-06-13T08:16:19.113", - "lastModified": "2024-06-13T18:35:19.777", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-06-17T19:32:42.640", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -50,10 +50,37 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:*:*:*:*", + "versionEndExcluding": "6.5.21", + "matchCriteriaId": "33F20D83-E0D3-4504-B15F-C3240F8CFB90" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:aem_cloud_service:*:*:*", + "versionEndExcluding": "2024.5", + "matchCriteriaId": "8A667B96-AB3F-48AB-9980-11AB79AA7BD7" + } + ] + } + ] + } + ], "references": [ { "url": "https://helpx.adobe.com/security/products/experience-manager/apsb24-28.html", - "source": "psirt@adobe.com" + "source": "psirt@adobe.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-362xx/CVE-2024-36220.json b/CVE-2024/CVE-2024-362xx/CVE-2024-36220.json index 27174eeb8bd..92c9c582b14 100644 --- a/CVE-2024/CVE-2024-362xx/CVE-2024-36220.json +++ b/CVE-2024/CVE-2024-362xx/CVE-2024-36220.json @@ -2,8 +2,8 @@ "id": "CVE-2024-36220", "sourceIdentifier": "psirt@adobe.com", "published": "2024-06-13T08:16:19.350", - "lastModified": "2024-06-13T18:35:19.777", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-06-17T19:48:35.573", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -50,10 +50,37 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:*:*:*:*", + "versionEndExcluding": "6.5.21", + "matchCriteriaId": "33F20D83-E0D3-4504-B15F-C3240F8CFB90" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:aem_cloud_service:*:*:*", + "versionEndExcluding": "2024.5", + "matchCriteriaId": "8A667B96-AB3F-48AB-9980-11AB79AA7BD7" + } + ] + } + ] + } + ], "references": [ { "url": "https://helpx.adobe.com/security/products/experience-manager/apsb24-28.html", - "source": "psirt@adobe.com" + "source": "psirt@adobe.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-362xx/CVE-2024-36221.json b/CVE-2024/CVE-2024-362xx/CVE-2024-36221.json index c57ff9d36e9..8753beae20b 100644 --- a/CVE-2024/CVE-2024-362xx/CVE-2024-36221.json +++ b/CVE-2024/CVE-2024-362xx/CVE-2024-36221.json @@ -2,8 +2,8 @@ "id": "CVE-2024-36221", "sourceIdentifier": "psirt@adobe.com", "published": "2024-06-13T08:16:19.567", - "lastModified": "2024-06-13T18:35:19.777", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-06-17T19:48:20.473", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -50,10 +50,37 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:*:*:*:*", + "versionEndExcluding": "6.5.21", + "matchCriteriaId": "33F20D83-E0D3-4504-B15F-C3240F8CFB90" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:aem_cloud_service:*:*:*", + "versionEndExcluding": "2024.5", + "matchCriteriaId": "8A667B96-AB3F-48AB-9980-11AB79AA7BD7" + } + ] + } + ] + } + ], "references": [ { "url": "https://helpx.adobe.com/security/products/experience-manager/apsb24-28.html", - "source": "psirt@adobe.com" + "source": "psirt@adobe.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-362xx/CVE-2024-36222.json b/CVE-2024/CVE-2024-362xx/CVE-2024-36222.json index 49ddd2be7ba..63b0c1b845f 100644 --- a/CVE-2024/CVE-2024-362xx/CVE-2024-36222.json +++ b/CVE-2024/CVE-2024-362xx/CVE-2024-36222.json @@ -2,8 +2,8 @@ "id": "CVE-2024-36222", "sourceIdentifier": "psirt@adobe.com", "published": "2024-06-13T08:16:19.790", - "lastModified": "2024-06-13T18:35:19.777", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-06-17T19:45:39.257", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -16,6 +16,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 + }, { "source": "psirt@adobe.com", "type": "Secondary", @@ -50,10 +70,37 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:*:*:*:*", + "versionEndExcluding": "6.5.21", + "matchCriteriaId": "33F20D83-E0D3-4504-B15F-C3240F8CFB90" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:aem_cloud_service:*:*:*", + "versionEndExcluding": "2024.5", + "matchCriteriaId": "8A667B96-AB3F-48AB-9980-11AB79AA7BD7" + } + ] + } + ] + } + ], "references": [ { "url": "https://helpx.adobe.com/security/products/experience-manager/apsb24-28.html", - "source": "psirt@adobe.com" + "source": "psirt@adobe.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-362xx/CVE-2024-36224.json b/CVE-2024/CVE-2024-362xx/CVE-2024-36224.json index 09f302bf481..5c510ed2bd2 100644 --- a/CVE-2024/CVE-2024-362xx/CVE-2024-36224.json +++ b/CVE-2024/CVE-2024-362xx/CVE-2024-36224.json @@ -2,8 +2,8 @@ "id": "CVE-2024-36224", "sourceIdentifier": "psirt@adobe.com", "published": "2024-06-13T08:16:20.007", - "lastModified": "2024-06-13T18:35:19.777", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-06-17T19:45:13.547", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -50,10 +50,37 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:*:*:*:*", + "versionEndExcluding": "6.5.21", + "matchCriteriaId": "33F20D83-E0D3-4504-B15F-C3240F8CFB90" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:aem_cloud_service:*:*:*", + "versionEndExcluding": "2024.5", + "matchCriteriaId": "8A667B96-AB3F-48AB-9980-11AB79AA7BD7" + } + ] + } + ] + } + ], "references": [ { "url": "https://helpx.adobe.com/security/products/experience-manager/apsb24-28.html", - "source": "psirt@adobe.com" + "source": "psirt@adobe.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-362xx/CVE-2024-36225.json b/CVE-2024/CVE-2024-362xx/CVE-2024-36225.json index e62b1033031..3a802de0111 100644 --- a/CVE-2024/CVE-2024-362xx/CVE-2024-36225.json +++ b/CVE-2024/CVE-2024-362xx/CVE-2024-36225.json @@ -2,8 +2,8 @@ "id": "CVE-2024-36225", "sourceIdentifier": "psirt@adobe.com", "published": "2024-06-13T08:16:20.233", - "lastModified": "2024-06-13T18:35:19.777", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-06-17T19:37:58.810", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -50,10 +50,37 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:*:*:*:*", + "versionEndExcluding": "6.5.21", + "matchCriteriaId": "33F20D83-E0D3-4504-B15F-C3240F8CFB90" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:aem_cloud_service:*:*:*", + "versionEndExcluding": "2024.5", + "matchCriteriaId": "8A667B96-AB3F-48AB-9980-11AB79AA7BD7" + } + ] + } + ] + } + ], "references": [ { "url": "https://helpx.adobe.com/security/products/experience-manager/apsb24-28.html", - "source": "psirt@adobe.com" + "source": "psirt@adobe.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-362xx/CVE-2024-36231.json b/CVE-2024/CVE-2024-362xx/CVE-2024-36231.json index c47720fa265..f378806f9d2 100644 --- a/CVE-2024/CVE-2024-362xx/CVE-2024-36231.json +++ b/CVE-2024/CVE-2024-362xx/CVE-2024-36231.json @@ -2,8 +2,8 @@ "id": "CVE-2024-36231", "sourceIdentifier": "psirt@adobe.com", "published": "2024-06-13T08:16:21.587", - "lastModified": "2024-06-13T18:35:19.777", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-06-17T19:52:06.717", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -50,10 +50,37 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:*:*:*:*", + "versionEndExcluding": "6.5.21", + "matchCriteriaId": "33F20D83-E0D3-4504-B15F-C3240F8CFB90" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:aem_cloud_service:*:*:*", + "versionEndExcluding": "2024.5", + "matchCriteriaId": "8A667B96-AB3F-48AB-9980-11AB79AA7BD7" + } + ] + } + ] + } + ], "references": [ { "url": "https://helpx.adobe.com/security/products/experience-manager/apsb24-28.html", - "source": "psirt@adobe.com" + "source": "psirt@adobe.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-362xx/CVE-2024-36232.json b/CVE-2024/CVE-2024-362xx/CVE-2024-36232.json index bb318ff49b1..5013a9d645e 100644 --- a/CVE-2024/CVE-2024-362xx/CVE-2024-36232.json +++ b/CVE-2024/CVE-2024-362xx/CVE-2024-36232.json @@ -2,8 +2,8 @@ "id": "CVE-2024-36232", "sourceIdentifier": "psirt@adobe.com", "published": "2024-06-13T08:16:21.850", - "lastModified": "2024-06-13T18:35:19.777", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-06-17T19:51:25.503", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -50,10 +50,37 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:*:*:*:*", + "versionEndExcluding": "6.5.21", + "matchCriteriaId": "33F20D83-E0D3-4504-B15F-C3240F8CFB90" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:aem_cloud_service:*:*:*", + "versionEndExcluding": "2024.5", + "matchCriteriaId": "8A667B96-AB3F-48AB-9980-11AB79AA7BD7" + } + ] + } + ] + } + ], "references": [ { "url": "https://helpx.adobe.com/security/products/experience-manager/apsb24-28.html", - "source": "psirt@adobe.com" + "source": "psirt@adobe.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-365xx/CVE-2024-36527.json b/CVE-2024/CVE-2024-365xx/CVE-2024-36527.json new file mode 100644 index 00000000000..874defe46b9 --- /dev/null +++ b/CVE-2024/CVE-2024-365xx/CVE-2024-36527.json @@ -0,0 +1,20 @@ +{ + "id": "CVE-2024-36527", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-06-17T18:15:16.767", + "lastModified": "2024-06-17T18:15:16.767", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "puppeteer-renderer v.3.2.0 and before is vulnerable to Directory Traversal. Attackers can exploit the URL parameter using the file protocol to read sensitive information from the server." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://gist.github.com/7a6163/25fef08f75eed219c8ca21e332d6e911", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-365xx/CVE-2024-36543.json b/CVE-2024/CVE-2024-365xx/CVE-2024-36543.json new file mode 100644 index 00000000000..c87feb0ad12 --- /dev/null +++ b/CVE-2024/CVE-2024-365xx/CVE-2024-36543.json @@ -0,0 +1,24 @@ +{ + "id": "CVE-2024-36543", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-06-17T19:15:58.353", + "lastModified": "2024-06-17T19:15:58.353", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Incorrect access control in the Kafka Connect REST API in the STRIMZI Project 0.41.0 and earlier allows an attacker to deny the service for Kafka Mirroring, potentially mirror the topics' content to his Kafka cluster via a malicious connector (bypassing Kafka ACL if it exists), and potentially steal Kafka SASL credentials, by querying the MirrorMaker Kafka REST API." + } + ], + "metrics": {}, + "references": [ + { + "url": "http://strimzi.com", + "source": "cve@mitre.org" + }, + { + "url": "https://github.com/almounah/vulnerability-research/tree/main/CVE-2024-36543", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-369xx/CVE-2024-36973.json b/CVE-2024/CVE-2024-369xx/CVE-2024-36973.json new file mode 100644 index 00000000000..0d012b4bad0 --- /dev/null +++ b/CVE-2024/CVE-2024-369xx/CVE-2024-36973.json @@ -0,0 +1,20 @@ +{ + "id": "CVE-2024-36973", + "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "published": "2024-06-17T18:15:17.043", + "lastModified": "2024-06-17T18:15:17.043", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nmisc: microchip: pci1xxxx: fix double free in the error handling of gp_aux_bus_probe()\n\nWhen auxiliary_device_add() returns error and then calls\nauxiliary_device_uninit(), callback function\ngp_auxiliary_device_release() calls ida_free() and\nkfree(aux_device_wrapper) to free memory. We should't\ncall them again in the error handling path.\n\nFix this by skipping the redundant cleanup functions." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://git.kernel.org/stable/c/086c6cbcc563c81d55257f9b27e14faf1d0963d3", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-376xx/CVE-2024-37661.json b/CVE-2024/CVE-2024-376xx/CVE-2024-37661.json new file mode 100644 index 00000000000..2c02c8d0942 --- /dev/null +++ b/CVE-2024/CVE-2024-376xx/CVE-2024-37661.json @@ -0,0 +1,20 @@ +{ + "id": "CVE-2024-37661", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-06-17T18:15:17.463", + "lastModified": "2024-06-17T18:15:17.463", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "TP-LINK TL-7DR5130 v1.0.23 is vulnerable to forged ICMP redirect message attacks. An attacker in the same WLAN as the victim can hijack the traffic between the victim and any remote server by sending out forged ICMP redirect messages." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/ouuan/router-vuln-report/blob/master/icmp-redirect/tl-7dr5130-redirect.md", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-376xx/CVE-2024-37662.json b/CVE-2024/CVE-2024-376xx/CVE-2024-37662.json new file mode 100644 index 00000000000..12e4bdd4a3a --- /dev/null +++ b/CVE-2024/CVE-2024-376xx/CVE-2024-37662.json @@ -0,0 +1,20 @@ +{ + "id": "CVE-2024-37662", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-06-17T18:15:17.560", + "lastModified": "2024-06-17T18:15:17.560", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "TP-LINK TL-7DR5130 v1.0.23 is vulnerable to TCP DoS or hijacking attacks. An attacker in the same WLAN as the victim can disconnect or hijack the traffic between the victim and any remote server by sending out forged TCP RST messages to evict NAT mappings in the router." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/ouuan/router-vuln-report/blob/master/nat-rst/tl-7dr5130-nat-rst.md", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-376xx/CVE-2024-37663.json b/CVE-2024/CVE-2024-376xx/CVE-2024-37663.json new file mode 100644 index 00000000000..50c6bb37eb3 --- /dev/null +++ b/CVE-2024/CVE-2024-376xx/CVE-2024-37663.json @@ -0,0 +1,20 @@ +{ + "id": "CVE-2024-37663", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-06-17T18:15:17.653", + "lastModified": "2024-06-17T18:15:17.653", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Redmi router RB03 v1.0.57 is vulnerable to forged ICMP redirect message attacks. An attacker in the same WLAN as the victim can hijack the traffic between the victim and any remote server by sending out forged ICMP redirect messages." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/ouuan/router-vuln-report/blob/master/icmp-redirect/redmi-rb03-redirect.md", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-376xx/CVE-2024-37664.json b/CVE-2024/CVE-2024-376xx/CVE-2024-37664.json new file mode 100644 index 00000000000..79bf4572f88 --- /dev/null +++ b/CVE-2024/CVE-2024-376xx/CVE-2024-37664.json @@ -0,0 +1,20 @@ +{ + "id": "CVE-2024-37664", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-06-17T18:15:17.743", + "lastModified": "2024-06-17T18:15:17.743", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Redmi router RB03 v1.0.57 is vulnerable to TCP DoS or hijacking attacks. An attacker in the same WLAN as the victim can disconnect or hijack the traffic between the victim and any remote server by sending out forged TCP RST messages to evict NAT mappings in the router." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/ouuan/router-vuln-report/blob/master/nat-rst/redmi-rb03-nat-rst.md", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-377xx/CVE-2024-37794.json b/CVE-2024/CVE-2024-377xx/CVE-2024-37794.json new file mode 100644 index 00000000000..93ff7a68ace --- /dev/null +++ b/CVE-2024/CVE-2024-377xx/CVE-2024-37794.json @@ -0,0 +1,20 @@ +{ + "id": "CVE-2024-37794", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-06-17T18:15:17.853", + "lastModified": "2024-06-17T18:15:17.853", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Improper input validation in CVC5 Solver v1.1.3 allows attackers to cause a Denial of Service (DoS) via a crafted SMT2 input file." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/cvc5/cvc5/issues/10813", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-377xx/CVE-2024-37795.json b/CVE-2024/CVE-2024-377xx/CVE-2024-37795.json new file mode 100644 index 00000000000..01fc2b9197e --- /dev/null +++ b/CVE-2024/CVE-2024-377xx/CVE-2024-37795.json @@ -0,0 +1,20 @@ +{ + "id": "CVE-2024-37795", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-06-17T18:15:17.953", + "lastModified": "2024-06-17T18:15:17.953", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "A segmentation fault in CVC5 Solver v1.1.3 allows attackers to cause a Denial of Service (DoS) via a crafted SMT-LIB input file containing the `set-logic` command with specific formatting errors." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/cvc5/cvc5/issues/10813", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-378xx/CVE-2024-37840.json b/CVE-2024/CVE-2024-378xx/CVE-2024-37840.json new file mode 100644 index 00000000000..e8abc0f1172 --- /dev/null +++ b/CVE-2024/CVE-2024-378xx/CVE-2024-37840.json @@ -0,0 +1,20 @@ +{ + "id": "CVE-2024-37840", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-06-17T19:15:58.470", + "lastModified": "2024-06-17T19:15:58.470", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "SQL injection vulnerability in processscore.php in Itsourcecode Learning Management System Project In PHP With Source Code v1.0 allows remote attackers to execute arbitrary SQL commands via the LessonID parameter." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/ganzhi-qcy/cve/issues/4", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-384xx/CVE-2024-38449.json b/CVE-2024/CVE-2024-384xx/CVE-2024-38449.json new file mode 100644 index 00000000000..f54564aae43 --- /dev/null +++ b/CVE-2024/CVE-2024-384xx/CVE-2024-38449.json @@ -0,0 +1,28 @@ +{ + "id": "CVE-2024-38449", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-06-17T19:15:58.567", + "lastModified": "2024-06-17T19:15:58.567", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "A Directory Traversal vulnerability in KasmVNC 1.3.1.230e50f7b89663316c70de7b0e3db6f6b9340489 and possibly earlier versions allows remote authenticated attackers to browse parent directories and read the content of files outside the scope of the application." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/kasmtech/KasmVNC/issues/254", + "source": "cve@mitre.org" + }, + { + "url": "https://kasmweb.atlassian.net/servicedesk/customer/portal/3/topic/30ffee7f-4b85-4783-b118-6ae4fd8b0c52", + "source": "cve@mitre.org" + }, + { + "url": "https://kasmweb.com/kasmvnc", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-38xx/CVE-2024-3876.json b/CVE-2024/CVE-2024-38xx/CVE-2024-3876.json index 0299a5413ba..0cace36d336 100644 --- a/CVE-2024/CVE-2024-38xx/CVE-2024-3876.json +++ b/CVE-2024/CVE-2024-38xx/CVE-2024-3876.json @@ -2,7 +2,7 @@ "id": "CVE-2024-3876", "sourceIdentifier": "cna@vuldb.com", "published": "2024-04-16T18:15:14.623", - "lastModified": "2024-05-17T02:40:09.910", + "lastModified": "2024-06-17T19:15:58.763", "vulnStatus": "Awaiting Analysis", "descriptions": [ { diff --git a/CVE-2024/CVE-2024-40xx/CVE-2024-4032.json b/CVE-2024/CVE-2024-40xx/CVE-2024-4032.json index fde98d6c2d3..b8e733b2fe8 100644 --- a/CVE-2024/CVE-2024-40xx/CVE-2024-4032.json +++ b/CVE-2024/CVE-2024-40xx/CVE-2024-4032.json @@ -2,7 +2,7 @@ "id": "CVE-2024-4032", "sourceIdentifier": "cna@python.org", "published": "2024-06-17T15:15:52.517", - "lastModified": "2024-06-17T16:15:15.923", + "lastModified": "2024-06-17T18:15:18.047", "vulnStatus": "Received", "descriptions": [ { @@ -12,6 +12,10 @@ ], "metrics": {}, "references": [ + { + "url": "http://www.openwall.com/lists/oss-security/2024/06/17/3", + "source": "cna@python.org" + }, { "url": "https://github.com/python/cpython/commit/22adf29da8d99933ffed8647d3e0726edd16f7f8", "source": "cna@python.org" diff --git a/CVE-2024/CVE-2024-45xx/CVE-2024-4584.json b/CVE-2024/CVE-2024-45xx/CVE-2024-4584.json index e37226a7653..57b67539f6d 100644 --- a/CVE-2024/CVE-2024-45xx/CVE-2024-4584.json +++ b/CVE-2024/CVE-2024-45xx/CVE-2024-4584.json @@ -2,7 +2,7 @@ "id": "CVE-2024-4584", "sourceIdentifier": "cna@vuldb.com", "published": "2024-05-07T12:15:10.223", - "lastModified": "2024-05-17T02:40:28.903", + "lastModified": "2024-06-17T19:15:58.903", "vulnStatus": "Awaiting Analysis", "descriptions": [ { diff --git a/CVE-2024/CVE-2024-45xx/CVE-2024-4595.json b/CVE-2024/CVE-2024-45xx/CVE-2024-4595.json index 2451143d804..47beb2db1e5 100644 --- a/CVE-2024/CVE-2024-45xx/CVE-2024-4595.json +++ b/CVE-2024/CVE-2024-45xx/CVE-2024-4595.json @@ -2,7 +2,7 @@ "id": "CVE-2024-4595", "sourceIdentifier": "cna@vuldb.com", "published": "2024-05-07T15:15:10.273", - "lastModified": "2024-05-17T02:40:29.900", + "lastModified": "2024-06-17T19:15:59.063", "vulnStatus": "Awaiting Analysis", "descriptions": [ { diff --git a/CVE-2024/CVE-2024-52xx/CVE-2024-5206.json b/CVE-2024/CVE-2024-52xx/CVE-2024-5206.json index f66fca9009d..554f7832a9c 100644 --- a/CVE-2024/CVE-2024-52xx/CVE-2024-5206.json +++ b/CVE-2024/CVE-2024-52xx/CVE-2024-5206.json @@ -2,7 +2,7 @@ "id": "CVE-2024-5206", "sourceIdentifier": "security@huntr.dev", "published": "2024-06-06T19:16:06.363", - "lastModified": "2024-06-07T14:56:05.647", + "lastModified": "2024-06-17T19:15:59.190", "vulnStatus": "Awaiting Analysis", "descriptions": [ { @@ -21,8 +21,8 @@ "type": "Secondary", "cvssData": { "version": "3.0", - "vectorString": "CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N", - "attackVector": "NETWORK", + "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "LOCAL", "attackComplexity": "HIGH", "privilegesRequired": "LOW", "userInteraction": "NONE", @@ -30,10 +30,10 @@ "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "availabilityImpact": "NONE", - "baseScore": 5.3, + "baseScore": 4.7, "baseSeverity": "MEDIUM" }, - "exploitabilityScore": 1.6, + "exploitabilityScore": 1.0, "impactScore": 3.6 } ] diff --git a/CVE-2024/CVE-2024-60xx/CVE-2024-6056.json b/CVE-2024/CVE-2024-60xx/CVE-2024-6056.json new file mode 100644 index 00000000000..79c6855453e --- /dev/null +++ b/CVE-2024/CVE-2024-60xx/CVE-2024-6056.json @@ -0,0 +1,92 @@ +{ + "id": "CVE-2024-6056", + "sourceIdentifier": "cna@vuldb.com", + "published": "2024-06-17T18:15:18.143", + "lastModified": "2024-06-17T18:15:18.143", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability was found in nasirkhan Laravel Starter up to 11.8.0. It has been rated as problematic. Affected by this issue is some unknown functionality of the file /forgot-password of the component Password Reset Handler. The manipulation of the argument Email leads to observable response discrepancy. The attack may be launched remotely. The complexity of an attack is rather high. The exploitation is known to be difficult. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-268784. NOTE: The vendor was contacted early about this disclosure but did not respond in any way." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 3.7, + "baseSeverity": "LOW" + }, + "exploitabilityScore": 2.2, + "impactScore": 1.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:H/Au:N/C:P/I:N/A:N", + "accessVector": "NETWORK", + "accessComplexity": "HIGH", + "authentication": "NONE", + "confidentialityImpact": "PARTIAL", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 2.6 + }, + "baseSeverity": "LOW", + "exploitabilityScore": 4.9, + "impactScore": 2.9, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-204" + } + ] + } + ], + "references": [ + { + "url": "https://powerful-bulb-c36.notion.site/idor-c6eb58e8fc40416ba53c7915ca0174c4?pvs=4", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.268784", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.268784", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.352978", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-60xx/CVE-2024-6058.json b/CVE-2024/CVE-2024-60xx/CVE-2024-6058.json new file mode 100644 index 00000000000..74d0e0c6176 --- /dev/null +++ b/CVE-2024/CVE-2024-60xx/CVE-2024-6058.json @@ -0,0 +1,92 @@ +{ + "id": "CVE-2024-6058", + "sourceIdentifier": "cna@vuldb.com", + "published": "2024-06-17T18:15:18.520", + "lastModified": "2024-06-17T18:15:18.520", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability classified as problematic has been found in LabVantage LIMS 2017. This affects an unknown part of the file /labvantage/rc?command=page&page=SampleHistoricalList&_iframename=list&__crc=crc_1701669816260. The manipulation of the argument height/width leads to cross site scripting. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-268785 was assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 3.5, + "baseSeverity": "LOW" + }, + "exploitabilityScore": 2.1, + "impactScore": 1.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:S/C:N/I:P/A:N", + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "SINGLE", + "confidentialityImpact": "NONE", + "integrityImpact": "PARTIAL", + "availabilityImpact": "NONE", + "baseScore": 4.0 + }, + "baseSeverity": "MEDIUM", + "exploitabilityScore": 8.0, + "impactScore": 2.9, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://gentle-khaan-c53.notion.site/Reflected-XSS-in-Labvantage-LIMS-cc960e84650a4df58ecabe82338e0272", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.268785", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.268785", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.353198", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-60xx/CVE-2024-6059.json b/CVE-2024/CVE-2024-60xx/CVE-2024-6059.json new file mode 100644 index 00000000000..47cb6bbdbd0 --- /dev/null +++ b/CVE-2024/CVE-2024-60xx/CVE-2024-6059.json @@ -0,0 +1,92 @@ +{ + "id": "CVE-2024-6059", + "sourceIdentifier": "cna@vuldb.com", + "published": "2024-06-17T19:15:59.467", + "lastModified": "2024-06-17T19:15:59.467", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability, which was classified as problematic, has been found in Ingenico Estate Manager 2023. This issue affects some unknown processing of the file /emgui/rest/ums/messages of the component News Feed. The manipulation of the argument message leads to cross site scripting. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-268787. NOTE: The vendor was contacted early about this disclosure but did not respond in any way." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:N/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 2.4, + "baseSeverity": "LOW" + }, + "exploitabilityScore": 0.9, + "impactScore": 1.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:M/C:N/I:P/A:N", + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "MULTIPLE", + "confidentialityImpact": "NONE", + "integrityImpact": "PARTIAL", + "availabilityImpact": "NONE", + "baseScore": 3.3 + }, + "baseSeverity": "LOW", + "exploitabilityScore": 6.4, + "impactScore": 2.9, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://gentle-khaan-c53.notion.site/Stored-XSS-in-Ingenico-The-Estate-Manager-90089eaef5574b929fe019c3d0686b63", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.268787", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.268787", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.353237", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/README.md b/README.md index 9af42e6fdc3..b11f04cd95c 100644 --- a/README.md +++ b/README.md @@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2024-06-17T18:00:19.054255+00:00 +2024-06-17T20:00:19.113866+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2024-06-17T17:45:26.877000+00:00 +2024-06-17T19:52:06.717000+00:00 ``` ### Last Data Feed Release @@ -33,50 +33,59 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### Total Number of included CVEs ```plain -254286 +254301 ``` ### CVEs added in the last Commit -Recently added CVEs: `6` +Recently added CVEs: `15` -- [CVE-2024-0397](CVE-2024/CVE-2024-03xx/CVE-2024-0397.json) (`2024-06-17T16:15:10.217`) -- [CVE-2024-36573](CVE-2024/CVE-2024-365xx/CVE-2024-36573.json) (`2024-06-17T16:15:14.947`) -- [CVE-2024-36574](CVE-2024/CVE-2024-365xx/CVE-2024-36574.json) (`2024-06-17T16:15:15.040`) -- [CVE-2024-36575](CVE-2024/CVE-2024-365xx/CVE-2024-36575.json) (`2024-06-17T16:15:15.140`) -- [CVE-2024-36577](CVE-2024/CVE-2024-365xx/CVE-2024-36577.json) (`2024-06-17T16:15:15.233`) -- [CVE-2024-36578](CVE-2024/CVE-2024-365xx/CVE-2024-36578.json) (`2024-06-17T16:15:15.333`) +- [CVE-2018-25103](CVE-2018/CVE-2018-251xx/CVE-2018-25103.json) (`2024-06-17T18:15:12.650`) +- [CVE-2024-36527](CVE-2024/CVE-2024-365xx/CVE-2024-36527.json) (`2024-06-17T18:15:16.767`) +- [CVE-2024-36543](CVE-2024/CVE-2024-365xx/CVE-2024-36543.json) (`2024-06-17T19:15:58.353`) +- [CVE-2024-36973](CVE-2024/CVE-2024-369xx/CVE-2024-36973.json) (`2024-06-17T18:15:17.043`) +- [CVE-2024-37661](CVE-2024/CVE-2024-376xx/CVE-2024-37661.json) (`2024-06-17T18:15:17.463`) +- [CVE-2024-37662](CVE-2024/CVE-2024-376xx/CVE-2024-37662.json) (`2024-06-17T18:15:17.560`) +- [CVE-2024-37663](CVE-2024/CVE-2024-376xx/CVE-2024-37663.json) (`2024-06-17T18:15:17.653`) +- [CVE-2024-37664](CVE-2024/CVE-2024-376xx/CVE-2024-37664.json) (`2024-06-17T18:15:17.743`) +- [CVE-2024-37794](CVE-2024/CVE-2024-377xx/CVE-2024-37794.json) (`2024-06-17T18:15:17.853`) +- [CVE-2024-37795](CVE-2024/CVE-2024-377xx/CVE-2024-37795.json) (`2024-06-17T18:15:17.953`) +- [CVE-2024-37840](CVE-2024/CVE-2024-378xx/CVE-2024-37840.json) (`2024-06-17T19:15:58.470`) +- [CVE-2024-38449](CVE-2024/CVE-2024-384xx/CVE-2024-38449.json) (`2024-06-17T19:15:58.567`) +- [CVE-2024-6056](CVE-2024/CVE-2024-60xx/CVE-2024-6056.json) (`2024-06-17T18:15:18.143`) +- [CVE-2024-6058](CVE-2024/CVE-2024-60xx/CVE-2024-6058.json) (`2024-06-17T18:15:18.520`) +- [CVE-2024-6059](CVE-2024/CVE-2024-60xx/CVE-2024-6059.json) (`2024-06-17T19:15:59.467`) ### CVEs modified in the last Commit -Recently modified CVEs: `25` +Recently modified CVEs: `54` -- [CVE-2021-47472](CVE-2021/CVE-2021-474xx/CVE-2021-47472.json) (`2024-06-17T17:15:51.050`) -- [CVE-2024-23134](CVE-2024/CVE-2024-231xx/CVE-2024-23134.json) (`2024-06-17T17:15:51.443`) -- [CVE-2024-36168](CVE-2024/CVE-2024-361xx/CVE-2024-36168.json) (`2024-06-17T17:08:50.037`) -- [CVE-2024-36169](CVE-2024/CVE-2024-361xx/CVE-2024-36169.json) (`2024-06-17T17:04:09.503`) -- [CVE-2024-36170](CVE-2024/CVE-2024-361xx/CVE-2024-36170.json) (`2024-06-17T17:03:56.473`) -- [CVE-2024-36171](CVE-2024/CVE-2024-361xx/CVE-2024-36171.json) (`2024-06-17T16:47:24.110`) -- [CVE-2024-36172](CVE-2024/CVE-2024-361xx/CVE-2024-36172.json) (`2024-06-17T16:42:45.833`) -- [CVE-2024-36173](CVE-2024/CVE-2024-361xx/CVE-2024-36173.json) (`2024-06-17T16:39:09.777`) -- [CVE-2024-36174](CVE-2024/CVE-2024-361xx/CVE-2024-36174.json) (`2024-06-17T16:38:56.820`) -- [CVE-2024-36175](CVE-2024/CVE-2024-361xx/CVE-2024-36175.json) (`2024-06-17T16:30:11.217`) -- [CVE-2024-36176](CVE-2024/CVE-2024-361xx/CVE-2024-36176.json) (`2024-06-17T16:27:16.317`) -- [CVE-2024-36177](CVE-2024/CVE-2024-361xx/CVE-2024-36177.json) (`2024-06-17T16:25:21.467`) -- [CVE-2024-36178](CVE-2024/CVE-2024-361xx/CVE-2024-36178.json) (`2024-06-17T16:25:07.473`) -- [CVE-2024-36179](CVE-2024/CVE-2024-361xx/CVE-2024-36179.json) (`2024-06-17T16:24:58.080`) -- [CVE-2024-36180](CVE-2024/CVE-2024-361xx/CVE-2024-36180.json) (`2024-06-17T16:24:39.483`) -- [CVE-2024-36185](CVE-2024/CVE-2024-361xx/CVE-2024-36185.json) (`2024-06-17T17:45:26.877`) -- [CVE-2024-36186](CVE-2024/CVE-2024-361xx/CVE-2024-36186.json) (`2024-06-17T17:44:46.093`) -- [CVE-2024-36187](CVE-2024/CVE-2024-361xx/CVE-2024-36187.json) (`2024-06-17T17:40:33.583`) -- [CVE-2024-36188](CVE-2024/CVE-2024-361xx/CVE-2024-36188.json) (`2024-06-17T17:34:55.847`) -- [CVE-2024-36189](CVE-2024/CVE-2024-361xx/CVE-2024-36189.json) (`2024-06-17T17:09:25.477`) -- [CVE-2024-38394](CVE-2024/CVE-2024-383xx/CVE-2024-38394.json) (`2024-06-17T16:15:15.823`) -- [CVE-2024-4032](CVE-2024/CVE-2024-40xx/CVE-2024-4032.json) (`2024-06-17T16:15:15.923`) -- [CVE-2024-5685](CVE-2024/CVE-2024-56xx/CVE-2024-5685.json) (`2024-06-17T17:15:51.953`) -- [CVE-2024-6003](CVE-2024/CVE-2024-60xx/CVE-2024-6003.json) (`2024-06-17T16:15:16.027`) -- [CVE-2024-6008](CVE-2024/CVE-2024-60xx/CVE-2024-6008.json) (`2024-06-17T16:15:16.140`) +- [CVE-2024-36207](CVE-2024/CVE-2024-362xx/CVE-2024-36207.json) (`2024-06-17T19:22:41.023`) +- [CVE-2024-36208](CVE-2024/CVE-2024-362xx/CVE-2024-36208.json) (`2024-06-17T19:22:29.990`) +- [CVE-2024-36209](CVE-2024/CVE-2024-362xx/CVE-2024-36209.json) (`2024-06-17T19:22:21.057`) +- [CVE-2024-36210](CVE-2024/CVE-2024-362xx/CVE-2024-36210.json) (`2024-06-17T19:22:07.157`) +- [CVE-2024-36211](CVE-2024/CVE-2024-362xx/CVE-2024-36211.json) (`2024-06-17T19:21:53.777`) +- [CVE-2024-36212](CVE-2024/CVE-2024-362xx/CVE-2024-36212.json) (`2024-06-17T19:21:43.703`) +- [CVE-2024-36213](CVE-2024/CVE-2024-362xx/CVE-2024-36213.json) (`2024-06-17T19:09:24.977`) +- [CVE-2024-36214](CVE-2024/CVE-2024-362xx/CVE-2024-36214.json) (`2024-06-17T19:35:49.083`) +- [CVE-2024-36215](CVE-2024/CVE-2024-362xx/CVE-2024-36215.json) (`2024-06-17T19:33:11.697`) +- [CVE-2024-36216](CVE-2024/CVE-2024-362xx/CVE-2024-36216.json) (`2024-06-17T19:42:09.377`) +- [CVE-2024-36217](CVE-2024/CVE-2024-362xx/CVE-2024-36217.json) (`2024-06-17T19:33:01.643`) +- [CVE-2024-36218](CVE-2024/CVE-2024-362xx/CVE-2024-36218.json) (`2024-06-17T19:32:51.723`) +- [CVE-2024-36219](CVE-2024/CVE-2024-362xx/CVE-2024-36219.json) (`2024-06-17T19:32:42.640`) +- [CVE-2024-36220](CVE-2024/CVE-2024-362xx/CVE-2024-36220.json) (`2024-06-17T19:48:35.573`) +- [CVE-2024-36221](CVE-2024/CVE-2024-362xx/CVE-2024-36221.json) (`2024-06-17T19:48:20.473`) +- [CVE-2024-36222](CVE-2024/CVE-2024-362xx/CVE-2024-36222.json) (`2024-06-17T19:45:39.257`) +- [CVE-2024-36224](CVE-2024/CVE-2024-362xx/CVE-2024-36224.json) (`2024-06-17T19:45:13.547`) +- [CVE-2024-36225](CVE-2024/CVE-2024-362xx/CVE-2024-36225.json) (`2024-06-17T19:37:58.810`) +- [CVE-2024-36231](CVE-2024/CVE-2024-362xx/CVE-2024-36231.json) (`2024-06-17T19:52:06.717`) +- [CVE-2024-36232](CVE-2024/CVE-2024-362xx/CVE-2024-36232.json) (`2024-06-17T19:51:25.503`) +- [CVE-2024-3876](CVE-2024/CVE-2024-38xx/CVE-2024-3876.json) (`2024-06-17T19:15:58.763`) +- [CVE-2024-4032](CVE-2024/CVE-2024-40xx/CVE-2024-4032.json) (`2024-06-17T18:15:18.047`) +- [CVE-2024-4584](CVE-2024/CVE-2024-45xx/CVE-2024-4584.json) (`2024-06-17T19:15:58.903`) +- [CVE-2024-4595](CVE-2024/CVE-2024-45xx/CVE-2024-4595.json) (`2024-06-17T19:15:59.063`) +- [CVE-2024-5206](CVE-2024/CVE-2024-52xx/CVE-2024-5206.json) (`2024-06-17T19:15:59.190`) ## Download and Usage diff --git a/_state.csv b/_state.csv index 294d0666b8d..a324699199a 100644 --- a/_state.csv +++ b/_state.csv @@ -121379,6 +121379,7 @@ CVE-2018-25098,0,0,fcae82fd425e45c0b5170e1d16175026afcc4282c8c2d036ab7934ed74d6d CVE-2018-25099,0,0,4477c16cb5a3503e957873dbddbd3b50ffb7092ffd27acf2a352c93f686dfb7f,2024-03-18T12:38:25.490000 CVE-2018-25100,0,0,26375a09020100e722ed36e37b25c669512cdaa2d61a780ec73480ee78db5d6b,2024-03-25T01:51:01.223000 CVE-2018-25101,0,0,b04dde640afba29853f504e83596fe419f66817bb46aeb488be7718ce77d287c,2024-06-04T19:16:57.060000 +CVE-2018-25103,1,1,122206d0dffed87e661f65dbda0c75ede3d4cb0caf0ebcb77979d91738119961,2024-06-17T18:15:12.650000 CVE-2018-2515,0,0,158f882e4275a7485a2b9ce17e7e57c4ea22cf74c55a78a9900c73a4caa327c0,2023-11-07T02:57:57.887000 CVE-2018-2560,0,0,0bb1a26d6c05fddeb488697adb0bbe667a3dd77c1a5bc7af495c8721df5b1197,2020-08-24T17:37:01.140000 CVE-2018-2561,0,0,b76feaa260e2f54fc8eeb8d50d578ffdd22b603f486ac4f8f5b3bc42df22fa45,2018-01-25T13:53:15.120000 @@ -187269,7 +187270,7 @@ CVE-2021-47468,0,0,b58fcad515b90a658d1f8eb09772b6deadbab142893484848bfd4f0e6a5e8 CVE-2021-47469,0,0,27ed4ca714e333af908656c7f0d26dbc4e54e957cf91be05caddcc4168e639c1,2024-05-22T12:46:53.887000 CVE-2021-47470,0,0,c7a6cba2bc0b5c738140227ec594b9a0a83cbeace54488d607923103cad0f3cf,2024-05-22T12:46:53.887000 CVE-2021-47471,0,0,279140f208b843b6f923cb9d7379164abe2a6902c16231ebaa829337929258b5,2024-05-22T12:46:53.887000 -CVE-2021-47472,0,1,d7ffb60c1efa6aeedbeb6f5a045eedbe61f352602a4eba01f18d081b1113df22,2024-06-17T17:15:51.050000 +CVE-2021-47472,0,0,d7ffb60c1efa6aeedbeb6f5a045eedbe61f352602a4eba01f18d081b1113df22,2024-06-17T17:15:51.050000 CVE-2021-47473,0,0,a06d0b2b3fb2a56155409742cc763e481118233c333bae60fb67e17923573646,2024-05-22T12:46:53.887000 CVE-2021-47474,0,0,5aa7ee22ccceebf8afc658dcaeb529c380fd6398ba5a5b4aacbae80a3d788859,2024-05-22T12:46:53.887000 CVE-2021-47475,0,0,bda5bd6370629486bc328ef4919cd6bc566c5d10fcc12f7f374913a6b12c2f04,2024-05-22T12:46:53.887000 @@ -240663,7 +240664,7 @@ CVE-2024-0393,0,0,8881de5088bee2f43467b73941f684354c9bcdccfa7386a7827d4a78a7e8f3 CVE-2024-0394,0,0,132997f5a0f39575e52ab364803d29384d542a557e73a32dea0a249b2357dfb2,2024-04-03T17:24:18.150000 CVE-2024-0395,0,0,9697a8ac3bbf759d0c2ea19b7ab0aa903676619b1d5a607c85b8d090a4e44ee7,2024-01-10T14:15:44.970000 CVE-2024-0396,0,0,106628bcb832aae2e274e4e91fdb5add809827efe4c459066d3102ffe0249334,2024-01-29T15:22:40.317000 -CVE-2024-0397,1,1,4ce7ed96e8724eda679ad0a7861920e41577ccf8436b1e71272a906b64dd14cf,2024-06-17T16:15:10.217000 +CVE-2024-0397,0,1,fb8a60d96b18ded5a4df325ab5f16c2a3f8bca756e992bf0a8b459da554ad30b,2024-06-17T18:15:14.767000 CVE-2024-0399,0,0,f9efd00d0c28d2f5fd7844014ccf20e6de83c83ab3d0467105e159f94efa805f,2024-04-15T13:15:31.997000 CVE-2024-0400,0,0,18035b4484267a537c15645ebee53285fc55ae5559f980b5f9795ec2795f24dd,2024-03-27T12:29:30.307000 CVE-2024-0401,0,0,eb06da8d7bba1b4b23b9513633128fc89991a02e4c0b59d538b76f5796878a05,2024-05-20T19:34:58.277000 @@ -243920,7 +243921,7 @@ CVE-2024-23130,0,0,1e3e1092d31e482531a23d074c00b2201eef463d384cdf1e1935233d4885d CVE-2024-23131,0,0,c427ee94f7c61adaf0716529d63f7a538f863e445e4db249885a3e64e551be88,2024-03-18T00:15:07.247000 CVE-2024-23132,0,0,f22a2bdc1f997a36d13f6c22afab4983451c9373205a8ec6621cdd27061b8266,2024-03-18T00:15:07.297000 CVE-2024-23133,0,0,e86482bc439e59c6d3cf72bc6bb19d1a229eba94c9abdd88aed6d4ca00d35e18,2024-03-18T00:15:07.340000 -CVE-2024-23134,0,1,7bcfdd789809a85dcb3d8c1b9ffa0666d172be0747695b354e86aa69e00d8a04,2024-06-17T17:15:51.443000 +CVE-2024-23134,0,0,7bcfdd789809a85dcb3d8c1b9ffa0666d172be0747695b354e86aa69e00d8a04,2024-06-17T17:15:51.443000 CVE-2024-23135,0,0,4ba3ef7d8b86192f3be9f608d250b59255f9c0272b793b5a67accf11746a7c49,2024-03-18T00:15:07.437000 CVE-2024-23136,0,0,2b90dcbe6397ed8c7559581d051fafe64c4814ea200ea96c2ab2b35870ef1cba,2024-03-18T00:15:07.490000 CVE-2024-23137,0,0,b73ac1a3962b6dd849e09860e5fbdd306ad601f2f1d6396ea6c594ab1cd8349c,2024-03-18T00:15:07.537000 @@ -250572,10 +250573,10 @@ CVE-2024-33345,0,0,7e89e81b2d7685c6c34b1a9a15e1d945044ecd27f7013fb1d01c673b4d1ae CVE-2024-33350,0,0,144e795866532d4010724292bbdbe74a18701be22392e8071c46c27a5004fd5c,2024-04-30T13:11:16.690000 CVE-2024-3337,0,0,0e96a0de2c5ffbe4a9f2804ffa8c1140c4bee3e6e00979a6ee0758b1212b2f3c,2024-05-02T18:00:37.360000 CVE-2024-33371,0,0,ec7a79f056a06763ccfa7dcfdf94bdae70f29613e0b1d07abafaf338bff1ecb9,2024-05-01T13:02:20.750000 -CVE-2024-33373,0,0,b7c15c73d24825415a7d81cda68e19668f66965e6357f4d729eabce1e026c719,2024-06-17T12:42:04.623000 -CVE-2024-33374,0,0,040b16231a2030aa2589471ed193e002a1dbeaa763feb6bfa27302cab3e4a3ea,2024-06-17T12:42:04.623000 -CVE-2024-33375,0,0,62da4be2bcf5ab07083478b46125bb21a9bb85fa5fd4408a26373c40053da4bc,2024-06-17T12:42:04.623000 -CVE-2024-33377,0,0,a8f7812885f06227f9d067cdee6974d8f79b9aa6c625159576fd7db4c1844cd5,2024-06-17T12:42:04.623000 +CVE-2024-33373,0,1,99b7497bb078bdf83fb304129b21aa2798c901fd9ac60f4753875e9aeb70b3dc,2024-06-17T18:15:15.920000 +CVE-2024-33374,0,1,f31f8e198d692129975bcaf7b94a4f3569071cac52d0ba48bf94e9c4b2d859cb,2024-06-17T18:15:16.017000 +CVE-2024-33375,0,1,e0eba6392fdb7999a39fee885f67bacc2f50594b53677377ca106c2be6c0baba,2024-06-17T19:15:58.107000 +CVE-2024-33377,0,1,678ecca4c46ab739843520542d6cffa2a387a8e6dc22686e1f86a739b43e0ba3,2024-06-17T18:15:16.107000 CVE-2024-3338,0,0,9454a656764280ba43f4b4a832049a80a0f45e8c0d37939e326776fd301ff609,2024-05-02T18:00:37.360000 CVE-2024-33382,0,0,fdefbc91dd758eee79622e13a87ace7fd97404c7ba92ae8195304a5c3b9d8c61,2024-05-09T13:05:45.620000 CVE-2024-33383,0,0,70f21187cd92beebcc08c0b97ec4ff0e6f501ff7515be84dc12b959842f9d519,2024-05-01T13:02:20.750000 @@ -252224,80 +252225,80 @@ CVE-2024-36161,0,0,9884a64367104c734adb0953b296c8404da830f2c5510c8e40dcd82fcaa84 CVE-2024-36162,0,0,392e6d9c603b43b1c9eb59c0f484a66be936b68eb22bc1b540f11ffbd3063af3,2024-06-14T20:33:18.287000 CVE-2024-36163,0,0,5e46503b5d8f1b7c32c59130646e3f9d66f5fa0e435b048cce3490f0141e6e8d,2024-06-13T18:35:19.777000 CVE-2024-36164,0,0,f24c589d857b5e5a2b9d4256791e32b4fa7cdbb2ce305a445e9a9ffe9d1fd80a,2024-06-13T18:35:19.777000 -CVE-2024-36165,0,0,d2403d5a5d1a283e2c86dcc0bb4def26b48cf9a71e084367444d01607e25f0a0,2024-06-13T18:35:19.777000 -CVE-2024-36166,0,0,ead3dc226ae554bb2dfcf3482b8d6f93ea8911d937aa6f7b332fce59816e80d2,2024-06-13T18:35:19.777000 -CVE-2024-36167,0,0,91e0d72536b27941c64682cccce3b4e2e7dfd5a75b1fd0ca62da6225d7a73ac0,2024-06-13T18:35:19.777000 -CVE-2024-36168,0,1,d9e1fe51c8fbe7a0c171ea17ef6138e97ecfb927ae9efba2a521f5e73a1c2fa9,2024-06-17T17:08:50.037000 -CVE-2024-36169,0,1,a58aca443e054709df42bac621b16e63f601fbd9af04f2e770fa783666f8bbc2,2024-06-17T17:04:09.503000 +CVE-2024-36165,0,1,eed1ba919ba899785005f5312eff29d764f2585157603e023819a2df39c2ec7e,2024-06-17T19:38:08.973000 +CVE-2024-36166,0,1,060ccda354064e2490c0e77e3b3c596578f9ffa6d5181a1e60537e699f9643e4,2024-06-17T19:38:19.783000 +CVE-2024-36167,0,1,e005f8263e9f112763d854142f00274e989ddef0f13ef360174ce64e69ba5e59,2024-06-17T19:38:29.453000 +CVE-2024-36168,0,0,d9e1fe51c8fbe7a0c171ea17ef6138e97ecfb927ae9efba2a521f5e73a1c2fa9,2024-06-17T17:08:50.037000 +CVE-2024-36169,0,0,a58aca443e054709df42bac621b16e63f601fbd9af04f2e770fa783666f8bbc2,2024-06-17T17:04:09.503000 CVE-2024-3617,0,0,f567fe2d001aaca41d03c0a0366ef1e99b32bc6e27d43d00554123f9bc28d775,2024-06-04T19:20:22.087000 -CVE-2024-36170,0,1,55c054c5ccd0ed1b79e149145fad6587bca625b70e6e1677142d0e74aba34eaa,2024-06-17T17:03:56.473000 -CVE-2024-36171,0,1,5ae32dcb256374ac8c471fd7950e1045f67ef9da0229b2bfb53e944968cec7a7,2024-06-17T16:47:24.110000 -CVE-2024-36172,0,1,65f98fe2d8d2975bca5a731d70e2afdd2b77874c7d99a778c5b9756d40a87dfd,2024-06-17T16:42:45.833000 -CVE-2024-36173,0,1,609613d6da423f3481b043da61f09ece7535e3749189db36cdbd6d1dedb2ed2c,2024-06-17T16:39:09.777000 -CVE-2024-36174,0,1,612b3524e3bcbc509f8b54b48031e925b18ed3387c24a7c4349a785c129fa3d8,2024-06-17T16:38:56.820000 -CVE-2024-36175,0,1,cbedfbe0ad3671af78a976f49a40be29e1aed21e3115f629482d4401868e075e,2024-06-17T16:30:11.217000 -CVE-2024-36176,0,1,e8217e2419f6e849a46aa90642dc7b1ce15412be354328c878868bea9e40e9b8,2024-06-17T16:27:16.317000 -CVE-2024-36177,0,1,ff5febe8c09df3a91e398dffd50ff9388941b5445febd1c679119be209fb89c2,2024-06-17T16:25:21.467000 -CVE-2024-36178,0,1,8dcb946dfee7b963619ba7ba0e6a46a3dd96080f30f83f4807f7834e38fd2792,2024-06-17T16:25:07.473000 -CVE-2024-36179,0,1,118021cd24c6285797e8cd3829754e899301c1729807e50ed7aafcb1d134d848,2024-06-17T16:24:58.080000 +CVE-2024-36170,0,0,55c054c5ccd0ed1b79e149145fad6587bca625b70e6e1677142d0e74aba34eaa,2024-06-17T17:03:56.473000 +CVE-2024-36171,0,0,5ae32dcb256374ac8c471fd7950e1045f67ef9da0229b2bfb53e944968cec7a7,2024-06-17T16:47:24.110000 +CVE-2024-36172,0,0,65f98fe2d8d2975bca5a731d70e2afdd2b77874c7d99a778c5b9756d40a87dfd,2024-06-17T16:42:45.833000 +CVE-2024-36173,0,0,609613d6da423f3481b043da61f09ece7535e3749189db36cdbd6d1dedb2ed2c,2024-06-17T16:39:09.777000 +CVE-2024-36174,0,0,612b3524e3bcbc509f8b54b48031e925b18ed3387c24a7c4349a785c129fa3d8,2024-06-17T16:38:56.820000 +CVE-2024-36175,0,0,cbedfbe0ad3671af78a976f49a40be29e1aed21e3115f629482d4401868e075e,2024-06-17T16:30:11.217000 +CVE-2024-36176,0,0,e8217e2419f6e849a46aa90642dc7b1ce15412be354328c878868bea9e40e9b8,2024-06-17T16:27:16.317000 +CVE-2024-36177,0,0,ff5febe8c09df3a91e398dffd50ff9388941b5445febd1c679119be209fb89c2,2024-06-17T16:25:21.467000 +CVE-2024-36178,0,0,8dcb946dfee7b963619ba7ba0e6a46a3dd96080f30f83f4807f7834e38fd2792,2024-06-17T16:25:07.473000 +CVE-2024-36179,0,0,118021cd24c6285797e8cd3829754e899301c1729807e50ed7aafcb1d134d848,2024-06-17T16:24:58.080000 CVE-2024-3618,0,0,49acf1181a6848a16665fb73aec3d174ce097deba0c0b38747c9b85c5bffb2db,2024-06-04T19:20:22.213000 -CVE-2024-36180,0,1,33f0fbd8ed8da11dcc141ccb70d1a4c1ffe93db624930c800eda80f920d5effc,2024-06-17T16:24:39.483000 -CVE-2024-36181,0,0,b9c60fc14f35f74dc6621071407b577fa01522dbbba32652fc2bdaa9527d16f5,2024-06-13T18:35:19.777000 -CVE-2024-36182,0,0,52e41f6547ccf305a197ce4a3755e9e266aac6e3da17db97f98a19e1efbbe24a,2024-06-13T18:35:19.777000 -CVE-2024-36183,0,0,c551d8e4091d1bc3878639d8613802cc5fc92bee52d39bce0a1f0f7ba962ccb3,2024-06-13T18:35:19.777000 -CVE-2024-36184,0,0,8e30f8df2c1254b0af6aea9e9eeb32121c0b3da7ec5b7850d6e06bd8d0e2342b,2024-06-13T18:35:19.777000 -CVE-2024-36185,0,1,49b47a11e53b4dee718dabc2e1f0a06114ce49b2284b50acf0c2178814eef42c,2024-06-17T17:45:26.877000 -CVE-2024-36186,0,1,ff6dc51cf8bbb78a7249b14b3bf1da4bf203942ab188537cb35bc3d5d1088959,2024-06-17T17:44:46.093000 -CVE-2024-36187,0,1,22ece855690dce9348d2203aa872cc428d44e30d9de97df4eca43d487706dbdc,2024-06-17T17:40:33.583000 -CVE-2024-36188,0,1,0bec449cf01af5399cea99298ffcfc02e2e48310698ba7c78ddb8491b430eab0,2024-06-17T17:34:55.847000 -CVE-2024-36189,0,1,05b4c9026773415c49a51c07f2f0c992c1049b3f3d114f94fdda2f499829580e,2024-06-17T17:09:25.477000 +CVE-2024-36180,0,0,33f0fbd8ed8da11dcc141ccb70d1a4c1ffe93db624930c800eda80f920d5effc,2024-06-17T16:24:39.483000 +CVE-2024-36181,0,1,b25adc5fb8428c04946dc735dd26138aa798b914d2f6d21938070300dcd79553,2024-06-17T19:50:13.523000 +CVE-2024-36182,0,1,30104f16b7d8be6088012e5fe7b96486f044fe242cb0407c6c5c9c8799a3f0fd,2024-06-17T19:36:00.387000 +CVE-2024-36183,0,1,28363d66843c750b13d124e7278cb70f3b5989728785a6ec3cca95f972e56c82,2024-06-17T19:49:53.943000 +CVE-2024-36184,0,1,e50341690a3e7998dbe8821bd2ca41fda077846bc55664a7af784dd1e91b6bae,2024-06-17T19:49:42.257000 +CVE-2024-36185,0,0,49b47a11e53b4dee718dabc2e1f0a06114ce49b2284b50acf0c2178814eef42c,2024-06-17T17:45:26.877000 +CVE-2024-36186,0,0,ff6dc51cf8bbb78a7249b14b3bf1da4bf203942ab188537cb35bc3d5d1088959,2024-06-17T17:44:46.093000 +CVE-2024-36187,0,0,22ece855690dce9348d2203aa872cc428d44e30d9de97df4eca43d487706dbdc,2024-06-17T17:40:33.583000 +CVE-2024-36188,0,0,0bec449cf01af5399cea99298ffcfc02e2e48310698ba7c78ddb8491b430eab0,2024-06-17T17:34:55.847000 +CVE-2024-36189,0,0,05b4c9026773415c49a51c07f2f0c992c1049b3f3d114f94fdda2f499829580e,2024-06-17T17:09:25.477000 CVE-2024-3619,0,0,165314f79e4f722f622203e47502b9381ecf302926cb9ad2cdc2988542678367,2024-05-17T02:40:02.103000 -CVE-2024-36190,0,0,7a560eaa6ce211d28e10c0c6befeae5dc18f5e8729ba3bdb3d5f735f9fd50003,2024-06-13T18:35:19.777000 -CVE-2024-36191,0,0,268ffaf8e90fc90ff53ab226e8efac8444105ea810fb7215f5f7cc4b037b6ef9,2024-06-13T18:35:19.777000 -CVE-2024-36192,0,0,d29cab8d285a96c6360a95db41dbf11f4c245da9605b6015405a026cdcaa9d12,2024-06-13T18:35:19.777000 -CVE-2024-36193,0,0,85f1a5f176856d3d02baa4d23039f0575ed34f14366d375d269f8fe700f06154,2024-06-13T18:35:19.777000 -CVE-2024-36194,0,0,675f0a9e23051c96db02d496de718a783f246310901840d80b3f38a279719423,2024-06-13T18:35:19.777000 -CVE-2024-36195,0,0,279a90dbf7b356172083ad5df59e7420eddb6121e359f5d0c6ef515a00a4e4dd,2024-06-13T18:35:19.777000 -CVE-2024-36196,0,0,2218ecb4a7b9f1c330873b7bdc6f5497cb30ff18aa9f3e5935af025800915166,2024-06-13T18:35:19.777000 -CVE-2024-36197,0,0,1c714d97dd75e949030a87e356d277b5f52e49d26a0f21113bbc5ae08ddac962,2024-06-13T18:35:19.777000 -CVE-2024-36198,0,0,4158315c31674c0c800b8a22afda78c1584c90550e8a5299229c9687ac9fef10,2024-06-13T18:35:19.777000 -CVE-2024-36199,0,0,2ccbecfd88acf146da1e632d724c59df0ea43e7ad4a8cd0398b9b94644e2bf68,2024-06-13T18:35:19.777000 +CVE-2024-36190,0,1,f102d3248dea23ff17c2f1af127d93c77fab80b1a59af4dc7864259b2cfd12f4,2024-06-17T19:49:13.337000 +CVE-2024-36191,0,1,fe85c58b74cc97ce1e65b01374bb18e75a855e09e5b666b0ba4b35767b44f447,2024-06-17T19:06:28.207000 +CVE-2024-36192,0,1,45378a68a4d9289d7ad56c121aee6e8dcf0e78cf5ec1ba10c5f18d8bb70e5b6f,2024-06-17T19:01:16.820000 +CVE-2024-36193,0,1,e8bca4f25cc69c70749d579f0d7b91522abf8ce96c88ed7539372a4f8d0fc3fe,2024-06-17T18:57:12.537000 +CVE-2024-36194,0,1,746e7ad33fdcd7716caf7b1566199913629281052465454c19567c0420565f36,2024-06-17T18:56:57.933000 +CVE-2024-36195,0,1,8b82a04f66d75c39da71f704b3c4dc9196ab6e487165fc9dd951f356d9cd01e3,2024-06-17T18:56:48.090000 +CVE-2024-36196,0,1,f0d9cccd8dd511c63bd40a41d40c052123a1f7d18ff036da12edeecd5e16686c,2024-06-17T18:56:33.480000 +CVE-2024-36197,0,1,c50c78c6e8e5d6d63c9c4281068fbab3d5c028be55a3c1849ff121b49e8189ae,2024-06-17T19:48:57.047000 +CVE-2024-36198,0,1,0d9c29bc137953462a5eb222099f437d69e24443e59705a9d753655f95a921a6,2024-06-17T18:56:20.607000 +CVE-2024-36199,0,1,1b859104c5816ed1e6e90edef1833f0ee83575bbcd8a6c5f81d0159954f181ed,2024-06-17T18:56:07.053000 CVE-2024-3620,0,0,1df23a75dfa243d45dccfaf93a6d2abcd8205c1c1c6930bdb57d4f40b6f4c71f,2024-06-04T19:20:22.317000 -CVE-2024-36200,0,0,20ff178a3ca633e8cd0f8c1fc8dd6193671e007ad31a13e350d3d9d37d0b14d6,2024-06-13T18:35:19.777000 -CVE-2024-36201,0,0,74ad4222062912fec02a01465b090abe996dfdbe4893fe6629c63d25f8531679,2024-06-13T18:35:19.777000 -CVE-2024-36202,0,0,4e8294e8677ebbfa91aa992df6d32132513e3079206e4b587a024049fd6d584a,2024-06-13T18:35:19.777000 -CVE-2024-36203,0,0,a9bd501139f807495e95c86a6a6119a593ee7832e57377ee957b0ef6dec91577,2024-06-13T18:35:19.777000 -CVE-2024-36204,0,0,6b4e59e1442af4c51333977d482454fef6c9e367b5bccef386435dd98ef7d0a4,2024-06-13T18:35:19.777000 -CVE-2024-36205,0,0,f19d527b032c5396bd90c74b0ac5309a95ca72adbcfcb781c1dba10599ea9c07,2024-06-13T18:35:19.777000 -CVE-2024-36206,0,0,f6bc8615c9e722023c0747a3382d6201eb46042a239c2df7baba5c5b1c2e938a,2024-06-13T18:35:19.777000 -CVE-2024-36207,0,0,c56bf789cdb514911c0a885e8d6458e21497f44360a33e2eb8f90b58ea94413f,2024-06-13T18:35:19.777000 -CVE-2024-36208,0,0,1ebf5bd412c71785f1691a7a4291213dfe4aa02d865a66f83ab0539b61ee8ef8,2024-06-13T18:35:19.777000 -CVE-2024-36209,0,0,dea37790995da3911568f66379c1f523b56e0cc81daa36c39688e288f57079de,2024-06-13T18:35:19.777000 +CVE-2024-36200,0,1,ba51adf20b4158c68b5efdcb4267da858e066a19fd243ce67c4bb1a89b50150e,2024-06-17T18:55:53.703000 +CVE-2024-36201,0,1,4b10353c471272c3c9b752b5eda1fe2e8b3cac69d46f7babdbf7f5cf0a7de83d,2024-06-17T18:55:34.580000 +CVE-2024-36202,0,1,1ec8aa1cd75c69b6f68702c72cd5e0f86360ef843210f88dc82f3163650efd5c,2024-06-17T18:55:21.577000 +CVE-2024-36203,0,1,1cd86fd0b6e4aab3ff6325c4b1653c1ba7ed49d0b1d7e7f58c66e5fb5000af55,2024-06-17T19:23:59.480000 +CVE-2024-36204,0,1,9cc70bae1dd03ac6434c29c2277c27007d99686a8c8cc70166765b61748e966a,2024-06-17T19:23:45.870000 +CVE-2024-36205,0,1,7c0cda3b04bbafcc01234b2bb01ab1ceb07fa3909a0e0c4ab23a3419a8a29cbe,2024-06-17T19:23:22.583000 +CVE-2024-36206,0,1,3cea8e74002f9a30a97fe0c76f64fd66fbbe7a9ae97308068e460c74d0ec5ccc,2024-06-17T19:23:04.890000 +CVE-2024-36207,0,1,ed22eccaa0cf7c8241053e2bb61f588fecfc05bd5b5b383f300d716e384ebabf,2024-06-17T19:22:41.023000 +CVE-2024-36208,0,1,252425d2e22cb2dcb6d497267af45df418409b9dbb97b0a7027795208858d323,2024-06-17T19:22:29.990000 +CVE-2024-36209,0,1,94840f37d7c7dd27d7c8849dd943c251dd21254fc62356ad09274d8d1e7c25c8,2024-06-17T19:22:21.057000 CVE-2024-3621,0,0,3204ec8fd9c2678ba71c374fd9b3e44813b4dc6ba5c30c2d3c2f5f44c3098c61,2024-05-17T02:40:02.290000 -CVE-2024-36210,0,0,fdda925d088fe00a07c96ae703d0a6578b3f5e4994ba524e6025ef4020cdebc2,2024-06-13T18:35:19.777000 -CVE-2024-36211,0,0,cbfe6a48ebb1ca671e2019539bcc08a3e99c1646fee764e4973b5545fba35a07,2024-06-13T18:35:19.777000 -CVE-2024-36212,0,0,b1b81d9517eb80270d5f756b84865c45e7fdb052877e54362037df57295393b9,2024-06-13T18:35:19.777000 -CVE-2024-36213,0,0,da0a72bb1a43b582c4ad56e1bec8d2c0ad75fe144a737adcf90b1a482310c6cb,2024-06-13T18:35:19.777000 -CVE-2024-36214,0,0,e82a9a3b9d1c6e0ec25b16c803ee2210527a89dc49a5561b1eb5246ff01f8209,2024-06-13T18:35:19.777000 -CVE-2024-36215,0,0,8225ca42ec2f01e23bcbdc4c8c6ec4f98a0109257d3f6823ebf8f43d8bd0bc87,2024-06-13T18:35:19.777000 -CVE-2024-36216,0,0,dfeb6c24838871b642a3b7e1b63287c06e59f67ce70f42826fd7eb660abc39b1,2024-06-13T18:35:19.777000 -CVE-2024-36217,0,0,01353ce9fb6d0c91b46e64486d875590743c342ffc9e7a5764929a4c6463d1fc,2024-06-13T18:35:19.777000 -CVE-2024-36218,0,0,1785479d42ea5a20c4f7d3f0e1abfc75fc9bd30674b9b1d397ca568e2ec57b2e,2024-06-13T18:35:19.777000 -CVE-2024-36219,0,0,289096eb1d5e22b363c0fb6d9969b5875060b2166d123bb22a768da7968388f0,2024-06-13T18:35:19.777000 +CVE-2024-36210,0,1,17040d4d7950d9e36a83a5eb4c4e5c4bcb16cbf33e9de87fa3efabca07710cdd,2024-06-17T19:22:07.157000 +CVE-2024-36211,0,1,f922a627e23eb178e020fe41f9139a21eff9ca37a7f987126f1365e053257b67,2024-06-17T19:21:53.777000 +CVE-2024-36212,0,1,c75b3e5da223f38dd425e911d368fa69a7a47f2a07eb6db31accb3e0c8cfeeba,2024-06-17T19:21:43.703000 +CVE-2024-36213,0,1,59e16fb535d46710ac714874d7837c453b885e7c6e33483485e717e774d8fda2,2024-06-17T19:09:24.977000 +CVE-2024-36214,0,1,36f36a8528ad94584591b17fbeb9eab1b715b27066a5620f5304158fd1a9c25d,2024-06-17T19:35:49.083000 +CVE-2024-36215,0,1,de4859556ceb90bfc1859050c4dfb29e68a8ee5977c192482751432f8b122841,2024-06-17T19:33:11.697000 +CVE-2024-36216,0,1,a0032a650a0d532fc6a4de76ae7cf7172dfeb639074d0b6884203d5f27c5df50,2024-06-17T19:42:09.377000 +CVE-2024-36217,0,1,9c4bf583e2236f456d5fa634c4a935863bb71d6b4d7336d1c28afc52f096d2f4,2024-06-17T19:33:01.643000 +CVE-2024-36218,0,1,fae8eda30a3c40d9dbf03cc0c0067ca0c999dc54662a4af35d391a8bd51adae6,2024-06-17T19:32:51.723000 +CVE-2024-36219,0,1,42f49034b08f79f884ad088fe3528181533a38f85304259f704167900c9527c3,2024-06-17T19:32:42.640000 CVE-2024-3622,0,0,8a36012169667d948c0b90aa74b5439b232e5ac011c2df4d1ba7f1e8b3410d38,2024-04-26T12:58:17.720000 -CVE-2024-36220,0,0,705e02c8598739c00b0d841e0c87ecb6b5b1fe4bc0ab2ede902c2f1f65b4aed1,2024-06-13T18:35:19.777000 -CVE-2024-36221,0,0,95f168134c75fb371bf3697253c53c2937b5150830794fa75cc2782ab3def335,2024-06-13T18:35:19.777000 -CVE-2024-36222,0,0,7847f25e12bc8ca0c641762403f3534ff8e2b4c1d35ee58590ef33008c829fd0,2024-06-13T18:35:19.777000 -CVE-2024-36224,0,0,751f63817e25efe2248387dfe30dfb4d25e455494937daae13e88033900c39d5,2024-06-13T18:35:19.777000 -CVE-2024-36225,0,0,350ebbe8a902cc5ab3a4a08823756d33ebfa2151b85012969081e8cd244c832f,2024-06-13T18:35:19.777000 +CVE-2024-36220,0,1,24c655ce3f0526042bfd67880dc41106cdfb5f98dde6971f64873ae1cdc82ba8,2024-06-17T19:48:35.573000 +CVE-2024-36221,0,1,2c46cdd47e910a4fc18e0dd65366030bdc1eb4d14ec50fb4c46fb03d63f1288e,2024-06-17T19:48:20.473000 +CVE-2024-36222,0,1,a8ee0e561dcb5bfbba224cb0539031d96c298ae7a136bc37d3ec9a0970e67bf5,2024-06-17T19:45:39.257000 +CVE-2024-36224,0,1,5c74dec5f032580ca9e70dab38c4d47b808d869c78d9a9688f6eb49fd80615a0,2024-06-17T19:45:13.547000 +CVE-2024-36225,0,1,fd495a92f56159f6c10cf6177a32831d7edff99b61db5bcc3c4fb3be2c44c3a1,2024-06-17T19:37:58.810000 CVE-2024-36226,0,0,63c695833cfbf502974ddfcb1fc7381dd367553339b0d43ddd7cfc9350f4fc2c,2024-06-13T18:35:19.777000 CVE-2024-36227,0,0,4f9708c3e190c903e17a59c6a290567f989ac01fce90e87a2c00ee28ec01c013,2024-06-13T18:35:19.777000 CVE-2024-36228,0,0,b27204a0ec7d2e55ed95db2e3835454fae2ce9d3fe4668e0d18cc12694c7d39c,2024-06-13T18:35:19.777000 CVE-2024-36229,0,0,7ba720ab8600cdae47ab2dee552d75b23243a9a50066b699a976ff9b1225b75f,2024-06-13T18:35:19.777000 CVE-2024-3623,0,0,9044a03f32811b426f24d5347da98fbfdb67f97317f2e90baed487a2da0b464c,2024-04-26T12:58:17.720000 CVE-2024-36230,0,0,5c02798fd006be44a457f690229bdebc32d9d963ab482182bed6b100663fd10a,2024-06-13T18:35:19.777000 -CVE-2024-36231,0,0,0e6fa683ba2d2ca356064a41aab2f10af1673646258af23b86dc98d376ae3df2,2024-06-13T18:35:19.777000 -CVE-2024-36232,0,0,bc8a5d6193a9ed70125a4f507acd21423921b3a8aa32b9991b206d4731cc2f19,2024-06-13T18:35:19.777000 +CVE-2024-36231,0,1,b5045756b30dee287424d6013535cd996cf26bd55406c0e6e1bfd4736b6abb98,2024-06-17T19:52:06.717000 +CVE-2024-36232,0,1,a9c5138f5604d517108f300a12cde735a99ec64851c8a5b1080310f3d5b9ab49,2024-06-17T19:51:25.503000 CVE-2024-36233,0,0,627bd0904e137fe695666d197191485332a263290dfe45603e50f25003653152,2024-06-13T18:35:19.777000 CVE-2024-36234,0,0,645070bd989f5473e299da1272d252c4395fa62de0b3b9e3c6caa9b2dc88738e,2024-06-13T18:35:19.777000 CVE-2024-36235,0,0,2f797f9105c486e0a04f74b29529501e36b59dfee3beab0a343db507b136826b,2024-06-13T18:35:19.777000 @@ -252408,9 +252409,11 @@ CVE-2024-36502,0,0,af0ea55ba6dbd08cf23c5f8732d2aeb0cf79fdfab13bdf5e07cadc4434254 CVE-2024-36503,0,0,3aef981902bcd0cfa43896ed1ada7c9ec64d59690838f1ba35c268bf26e5218a,2024-06-17T12:42:04.623000 CVE-2024-3652,0,0,455dabb71414a7592172807b25da69c5818ecc78456d9f87c63904d4c0988a33,2024-05-01T17:15:37.793000 CVE-2024-36523,0,0,779ff20f3e54c54b68fa38cf8a73a6874fca821f18024ef38fb974b398395dd0,2024-06-13T18:36:09.010000 +CVE-2024-36527,1,1,2b0ce26462ddf4094a9f42ea54b908cbb2586dcbcfee6531e1c43b55113e0148,2024-06-17T18:15:16.767000 CVE-2024-36528,0,0,f25edd031c479e2eb08ab34031d71804f3bb9f2a7bd4f1a1d0b25d391d002135,2024-06-10T18:06:22.600000 CVE-2024-36531,0,0,991b1a5a568679e84b92f85516ddb5ed86f9e4a97046e45c71aa818ce6df4847,2024-06-10T18:06:22.600000 CVE-2024-3654,0,0,954800a828ed246c147def14a6599156bd18a3e2cc72072dd62b0ab02b4bbf53,2024-04-19T16:19:49.043000 +CVE-2024-36543,1,1,d296ac07647444738f564112c0fbd0f6cdc70c839f2aad61af43a607bcbd5052,2024-06-17T19:15:58.353000 CVE-2024-36547,0,0,6660ddee6e567c7988e43d4b24008e0896770307b9894b7b829c762e8a195005,2024-06-06T15:16:11.897000 CVE-2024-36548,0,0,9d28d8e8972db5bd27a8a65faaafcca56f3bdf2175ddc670e3a757d6c577d105,2024-06-06T15:24:02.577000 CVE-2024-36549,0,0,ede738893685493385854bf4f5b6680c7d976cf01bd2e0f64b85833020e8a996,2024-06-06T15:24:35.210000 @@ -252418,11 +252421,11 @@ CVE-2024-36550,0,0,affd201d52525b08fe9dc0ac43cf536ec50f780fc23bf861db62d86c798cf CVE-2024-36568,0,0,f6757785c01c43727d227a9340ded7869db334138c1e07644080e388c657d4de,2024-06-03T14:46:24.250000 CVE-2024-36569,0,0,cc62a3b4fb5fe5cf7891883c6e12ba14de517f9765eb42867751af3c3e50f0ad,2024-06-03T14:46:24.250000 CVE-2024-3657,0,0,e0e9aa98b4bfe8d4d80395efd4c4293865e72a7d88d35e61376b8312bdae8c3e,2024-06-12T10:15:31.447000 -CVE-2024-36573,1,1,750ebe45272a4f2bbd917f456a069d3e63271e35a219c08d85bf8093c0a0b6e5,2024-06-17T16:15:14.947000 -CVE-2024-36574,1,1,64bd9cd44e2422837b446ec1e39651bbbef09e30ab3a39b8f1b8b0361052792b,2024-06-17T16:15:15.040000 -CVE-2024-36575,1,1,ed36a3dda7699a6151615dd0f4a8ba608593c659559e706aa039085e6ab6425e,2024-06-17T16:15:15.140000 -CVE-2024-36577,1,1,701237de0aa421f725f50cae5349a1b7b236344f940da970bc8c4371b26d1374,2024-06-17T16:15:15.233000 -CVE-2024-36578,1,1,54d498d91b0b299bd1280e0e84877cbb031dddd415152caf68b05edc849f7e06,2024-06-17T16:15:15.333000 +CVE-2024-36573,0,0,750ebe45272a4f2bbd917f456a069d3e63271e35a219c08d85bf8093c0a0b6e5,2024-06-17T16:15:14.947000 +CVE-2024-36574,0,0,64bd9cd44e2422837b446ec1e39651bbbef09e30ab3a39b8f1b8b0361052792b,2024-06-17T16:15:15.040000 +CVE-2024-36575,0,0,ed36a3dda7699a6151615dd0f4a8ba608593c659559e706aa039085e6ab6425e,2024-06-17T16:15:15.140000 +CVE-2024-36577,0,0,701237de0aa421f725f50cae5349a1b7b236344f940da970bc8c4371b26d1374,2024-06-17T16:15:15.233000 +CVE-2024-36578,0,0,54d498d91b0b299bd1280e0e84877cbb031dddd415152caf68b05edc849f7e06,2024-06-17T16:15:15.333000 CVE-2024-3658,0,0,788a6c57a5cc1d17a8f73184ec3f2bfe6dae89c54b4197447e7e87a36bebe3cf,2024-05-28T15:15:09.703000 CVE-2024-36580,0,0,982f3c6e1a409feccad1e6cb4897a8a8d95dbec5c8d00651e139725a763f9359,2024-06-17T14:15:10.227000 CVE-2024-36581,0,0,b0b55ea5afa036e7fb18c148b1b9ee7a2c8d7dd817cbe56e30c27abf908e433f,2024-06-17T15:15:51.130000 @@ -252615,6 +252618,7 @@ CVE-2024-3697,0,0,600d9314ffac8217c56b5ddb9a6dd8f383edc3a52ae15aefe26cd04d9d92b6 CVE-2024-36970,0,0,7821872f33932cd23581e3f08933e1120512f95b8bffb9a221042f6e182c4c03,2024-06-10T02:52:08.267000 CVE-2024-36971,0,0,7baf68ba8d6177e5c800107eb44bfd99f2323f2978ed8bf3a29a9bc948d8cb2e,2024-06-16T13:15:52.820000 CVE-2024-36972,0,0,c8949e99c51cdd06e16d761976785fb3e8ba887f5070dbd12308139f2998e944,2024-06-16T13:15:52.947000 +CVE-2024-36973,1,1,aaf9d958c8593ac07f0f724040e3aeb13ad0df1753e4f68e9b0d677119862905,2024-06-17T18:15:17.043000 CVE-2024-3698,0,0,13b4029eb6179dbe788598788e16556a1995d850ddfc4af1ee0c4e86961a3a21,2024-05-17T02:40:04.800000 CVE-2024-3699,0,0,6e64dedcb1ec83e842b9c3ed18b374381a62ef4f7982a43d9405eeb95e55d0fc,2024-06-12T17:53:09.130000 CVE-2024-3700,0,0,f1913b84964a9a87ca4f78bbad55a262819a35385e2c066c91eaa7c4a1891262,2024-06-12T17:51:52.710000 @@ -252785,6 +252789,10 @@ CVE-2024-37644,0,0,5f7f97e28e218e3fb348230aa8347ee3b0354d72853f4d6c2591e151f0231 CVE-2024-37645,0,0,1f2d6a8f87fac13d3d11d6cbec3b695ad44ed6f32f14768d5b077122546347a3,2024-06-17T12:42:04.623000 CVE-2024-3765,0,0,4fdba2eb80818b350bc57cc64ca06a70a8e5d2cec5cc9e99a6b5fff1df632742,2024-05-17T02:40:06.923000 CVE-2024-3766,0,0,539824cbdfccc4276f1fd794b326f898c89140cb76877e5ae113fb2f5031330d,2024-05-17T02:40:07.027000 +CVE-2024-37661,1,1,8bc6987d1055de55d8b7876bf221b6ce9ec043a5b4bf1c22473fe955a3ac5ac2,2024-06-17T18:15:17.463000 +CVE-2024-37662,1,1,4ba16f654108e1192bd8fb8e8e02e50d6a91573173d812e9064b0a305d10e19b,2024-06-17T18:15:17.560000 +CVE-2024-37663,1,1,c85121604649b2156315c207a5ca6621b999521337716b02c686139e1ebe6456,2024-06-17T18:15:17.653000 +CVE-2024-37664,1,1,b106b1d8d5f840cb17425c36d7f75fda90045b9146be03e27cd1d2e215bc155f,2024-06-17T18:15:17.743000 CVE-2024-37665,0,0,65120387c81349907f7a4a053373f743b497b218da3e8528d2288dae639dbb17,2024-06-13T18:36:09.010000 CVE-2024-3767,0,0,8ba3fcd8961d67ee2d120eabc736772a73aa38bca02250a44c8bb4877d64b7d4,2024-06-05T20:15:13.643000 CVE-2024-3768,0,0,778d3eea8bf87c1f80239f04628ed71cfd577dabb0ce88459344c4cd4d61bb16,2024-05-17T02:40:07.203000 @@ -252797,12 +252805,15 @@ CVE-2024-3775,0,0,a79253f4f0c7633f40fa5e33903553d0137ff03b4a2d8425a028bb5ddf1c6b CVE-2024-3776,0,0,55056178a3d988ca6f5c349416a81e65818f1f748e962aa89ca62657bc61cdbb,2024-04-15T13:15:31.997000 CVE-2024-3777,0,0,2d62b43478a2af7b370a2abe8fef4e62ecbb9b40c3be97e2e0fc1ef910b6e9d4,2024-04-15T13:15:31.997000 CVE-2024-3778,0,0,c2c38fcb38179fdb87f4043dc10c922f64da16bb588bfaf10dd1fb23e229fcc9,2024-04-15T13:15:31.997000 +CVE-2024-37794,1,1,b0474f9a1e34d4ce4f5843135972ccb449b5684509f30c70025ad198d2cbac13,2024-06-17T18:15:17.853000 +CVE-2024-37795,1,1,b55a1de597f46e87ebb5846214283b41513b4351794622c586104759dffc0de0,2024-06-17T18:15:17.953000 CVE-2024-3780,0,0,d5287c65230cff026fcb8162b9ad15d2c7a6ec9085a2f226aaf7f4b5c5cee424,2024-04-15T13:15:31.997000 CVE-2024-3781,0,0,bf710215509c2fb5fefd67fb85930537c2ce3a67160738297841ece3c75d6fc6,2024-04-15T19:12:25.887000 CVE-2024-3782,0,0,c95ea596dccb3636dd3691321b5a7a48aa3ee2b08cd07f6f17f6b9ebb6c70325,2024-04-15T19:12:25.887000 CVE-2024-3783,0,0,f916980cd1e532a7d588efc898e3b89c6684234f9d5fc7d911dee2ee73ce3295,2024-04-15T19:12:25.887000 CVE-2024-37831,0,0,5e7eb1d81cbc03e5a6cb7a0c776550184a7e580655a65f67804199e93112edb2,2024-06-17T12:42:04.623000 CVE-2024-3784,0,0,c3548262a5dd94ab612636409a3bf8cd74017da9deb24debb2f77536fe274623,2024-04-15T19:12:25.887000 +CVE-2024-37840,1,1,8453d99efeccde0568a082a5c426e56d812bc51b13eebf910ea641df056335c3,2024-06-17T19:15:58.470000 CVE-2024-37848,0,0,88fe14869b9db882d345d58a87ca35c6cced9fdb08d49352f54bce8a27f6744a,2024-06-17T14:15:11.890000 CVE-2024-37849,0,0,1c3bd85b42f72006ddc00210dee95fa2aec60a18f1d79fbfdd90f35c19fff4ef,2024-06-13T18:35:19.777000 CVE-2024-3785,0,0,fc93f2e321d044bf7a0ccc45f351722880d9f0bf94368b28b702ab59c5cb3144,2024-04-15T19:12:25.887000 @@ -252873,7 +252884,7 @@ CVE-2024-3834,0,0,a6e69ceb5a64ba9dfba23cdfa4c02e2549bf746772815229f9a627159689f7 CVE-2024-3837,0,0,5046b04f6fff161407832d91f839d6c01f3dcf30bcf75f620bfd7221b5de1c27,2024-05-03T03:16:29.010000 CVE-2024-3838,0,0,bd55ca068ebe4472845bce1f3d037932d27279da54b129864c942318cbf6c399,2024-04-23T18:15:15.410000 CVE-2024-3839,0,0,5078cfd1c7c68c41b30fd8b0c9c6a095120ec81bc8166ccecb75ba3c8be530b5,2024-05-03T04:15:09.127000 -CVE-2024-38394,0,1,e137788f2ebaaff770e93d05b803eb38e4472ac7dca49b0dd757c03a760061e9,2024-06-17T16:15:15.823000 +CVE-2024-38394,0,0,e137788f2ebaaff770e93d05b803eb38e4472ac7dca49b0dd757c03a760061e9,2024-06-17T16:15:15.823000 CVE-2024-38395,0,0,d27ba93e3eeea55e9457aaa415d612188b65281d83702a0692924b8f50b6f403,2024-06-17T15:15:51.900000 CVE-2024-38396,0,0,bffab7577ddd6f3e534c9843cfe717401724eb3ef56d29d3dd43a2efef3ab79d,2024-06-17T15:15:52.007000 CVE-2024-3840,0,0,403182a28ab5f4c1d5b284d35c53f5335d4c6aac194c57fd7d723522380d6b0f,2024-05-03T03:16:29.067000 @@ -252887,6 +252898,7 @@ CVE-2024-38440,0,0,b919acbc92e9c9392e26fbdaceae56c4317599ffd0627bbda82f22f6097b7 CVE-2024-38441,0,0,bac1eab90c37fda11684866d06a4f57eec334e75a348551333a4b5d69541732d,2024-06-17T12:42:04.623000 CVE-2024-38443,0,0,1d75cfa177cf692b67a12f7bd5c673225dc4008379121d75b6d5d0686ab9a220,2024-06-17T12:42:04.623000 CVE-2024-38448,0,0,66ae408cb06bbe5b04615772f5468e0f5bb5c8f2d46df318fd238e60dfb550e8,2024-06-17T12:42:04.623000 +CVE-2024-38449,1,1,bfe3d44cc91ccbcb53fd85e23fea8d11b89236c24e32b2201e2a397ac6ed1755,2024-06-17T19:15:58.567000 CVE-2024-3845,0,0,0eb4004f99da1c2122444a8d1de5d3db39129e713bf386d7b60bb455af744c00,2024-05-03T03:16:29.210000 CVE-2024-38454,0,0,9e16cbeba5810d367094a131b56862641aa42d77b0ed4c90d4e4d7e92bb854dc,2024-06-17T12:42:04.623000 CVE-2024-38457,0,0,c77550a7e2a9252924a4646a20696a029639d1882dc30abb38808d48a175ba0c,2024-06-17T12:42:04.623000 @@ -252930,7 +252942,7 @@ CVE-2024-3872,0,0,1b0df76ddcb9ce5edde75b1c572a6253db6bd37bbe91d1899bdf2bd4ba86a6 CVE-2024-3873,0,0,6d513ad90fbcf7cf9dc14bccfe49c3692f3f8e6afa6f4dd6471e0cb11781355f,2024-05-17T02:40:09.627000 CVE-2024-3874,0,0,0b044f7635c5f6b9eeb150631f42de7f29fc07a4ea0b0fc3596a05b97253f25a,2024-06-04T19:20:25.697000 CVE-2024-3875,0,0,d86045281a0b2a48da23b56cded5d23c73cf1b0cfc400db0bc7b27c6cb21977e,2024-06-04T19:20:25.807000 -CVE-2024-3876,0,0,3ffb00498ec144bea36e257d072208e6ad89fa56264da7a2bc823c35d1e51c3e,2024-05-17T02:40:09.910000 +CVE-2024-3876,0,1,776837fb0cf9eeaf7d3ba120d8dcf4cad0f43e38d62b6ec13c079af103a4cf3c,2024-06-17T19:15:58.763000 CVE-2024-3877,0,0,f24faee79076d9955b33c716cc38fff1084b5ee3b430064cdc16beb5bbd9e5c2,2024-06-04T19:20:25.903000 CVE-2024-3878,0,0,fb95502da03faec460d17c9b1242297f4e8658270dcfc3f37876da58c73c1ed8,2024-05-17T02:40:10.087000 CVE-2024-3879,0,0,92774dc7ea0cffc72f06608ad0c5ab32112431972595f4ffa950315fc44f5141,2024-05-17T02:40:10.177000 @@ -253037,7 +253049,7 @@ CVE-2024-4026,0,0,9eff728af4fb17cd0b046ae2444303f230bc7685cadbda3feb2bd1007c7666 CVE-2024-4029,0,0,afc8def3dff015c790bb6f1fba36f8919ca09d0c14ec4f09004e6bb6d31f1058,2024-05-02T18:00:37.360000 CVE-2024-4030,0,0,c7e71f4aa9c8e1fed63372a5ecebe14dddf19d5400caf27393d092efafbf0f25,2024-06-13T20:15:15.570000 CVE-2024-4031,0,0,4baeaad68cf3411bf45d41e53c64aca0aa19dc8cf620cd2c5028b0d61a50ba2c,2024-04-23T12:52:09.397000 -CVE-2024-4032,0,1,d0d257207889b4eecfe2d9b86254c88f2507af7db1ab54d252a04dd631276d78,2024-06-17T16:15:15.923000 +CVE-2024-4032,0,1,03894ea0efe4adf33eae6b6c4a5d257a2cf4187fd23c9230c41cf9b02106eb41,2024-06-17T18:15:18.047000 CVE-2024-4033,0,0,9c08f15b4d3308634dd41e6afc3001fb3d24483554aaa58982323fa330ce651a,2024-05-02T18:00:37.360000 CVE-2024-4034,0,0,fbbc9986eba42f39f504e14d62a8f5aac7c2749ef90d02af8ad89eb5ef4d1cca,2024-05-02T18:00:37.360000 CVE-2024-4035,0,0,02906ca1b496a2e42ac8610e4dfcaad284409da5fa1faeb0fe6ebb26c1e7ae4c,2024-04-25T13:18:02.660000 @@ -253465,7 +253477,7 @@ CVE-2024-4580,0,0,8eea2c6efcadf197a7eb186820cafc4d96f736bb0925ed6e0f257f524d44d9 CVE-2024-4581,0,0,76d80edc646ff1ece35896e94283319c4ca53356d1c75c256f7ea9adb85effeb,2024-06-04T16:57:41.053000 CVE-2024-4582,0,0,57ac27f8923e8821e7b5fca55d7f50b9c8dfb5b34f58112cdd2a2c6b3dee9eda,2024-06-04T19:20:42.750000 CVE-2024-4583,0,0,af5c6d7dbc7d13aa7121157e641c0ae3611565803aa3301ac8e05cd3822a0f3f,2024-06-04T19:20:42.857000 -CVE-2024-4584,0,0,5cc4bd69de02a428a216cf477da396eed0ceee2068ee260705e0843596d3709b,2024-05-17T02:40:28.903000 +CVE-2024-4584,0,1,2c31e3bc8c7d2e9efeb129c1e82a2bc8338879f33d908a6721a12b1a62670c07,2024-06-17T19:15:58.903000 CVE-2024-4585,0,0,c1224862b2da0bb957015fb054dced4793091e8e3aa3caac8ee5575edd00f689,2024-05-17T02:40:28.993000 CVE-2024-4586,0,0,38a9d7726156e11be76063fc1f3a10ac00b9f19e5c3bba2254b1b06e6ca2fe78,2024-06-04T19:20:42.953000 CVE-2024-4587,0,0,fa4f2e1af7adbbcc9d9c59a2f010e851c5b64f5ba18ad37f1ca2351cf22dc751,2024-06-04T19:20:43.057000 @@ -253476,7 +253488,7 @@ CVE-2024-4591,0,0,5c6d761a32eee493d547c5d2d22181949ad1190c4454a55e9aa89efeef0df5 CVE-2024-4592,0,0,d8ebb8994c326e045a4e9c2becb1e92e01af61dca4ec82dd53c50e1797fca86a,2024-06-04T19:20:43.560000 CVE-2024-4593,0,0,6e92f7e409d392375aadb61ac84c9d714f33b7bdac01d896f8d5f1cdac91a9de,2024-05-17T02:40:29.730000 CVE-2024-4594,0,0,bcffb9fcfeaac22cc37f5dc48e830b7d71c5ce449d6ef0e481ff78f48d7fa487,2024-06-04T19:20:43.657000 -CVE-2024-4595,0,0,e1f0239e7c8c7d7f2d01d9453f16240c9ec1f7610773ad65617e8a00b9791f08,2024-05-17T02:40:29.900000 +CVE-2024-4595,0,1,5d35ea8ef48c2a80f961b57f311ad01654ad75218ac9d7f0e09b8afbb41ffd76,2024-06-17T19:15:59.063000 CVE-2024-4596,0,0,2294c5641ac537fa71a7ad1878bc97e3f6060d0b2f74841053ecc03b64d14796,2024-06-04T19:20:43.750000 CVE-2024-4597,0,0,49317a4ff12c60e573c38172dad46b390f6c4e67b3d1cb7027306fe91fd78a96,2024-05-14T16:11:39.510000 CVE-2024-4599,0,0,7a2dd9d366beb25d47b0c05043c7c832d7abfddbca078d457eae393ffc0c13b9,2024-05-07T13:39:32.710000 @@ -253891,7 +253903,7 @@ CVE-2024-5202,0,0,b978a5507939d8449bc120b0c8b4b839304f46efdad98898b1b0c13e65a259 CVE-2024-5203,0,0,c1cbddceebcc79a6f3361ec6d421c84f7c0d786eefdc42d89301f7f288b04ff8,2024-06-13T18:36:09.010000 CVE-2024-5204,0,0,f5f46d30f5f5fcefc4a351787eb0bfde8706d10be20e1d771d5abcd1008399a0,2024-05-29T13:02:09.280000 CVE-2024-5205,0,0,cb36ec671fed104039900e6835467ad487e54c052bb39844cd3bc6979a6fc551,2024-05-24T13:03:11.993000 -CVE-2024-5206,0,0,73dc1557678ce087f5c1e63776734ddb4d7a6705a0a233c56c02c986ee49a3f2,2024-06-07T14:56:05.647000 +CVE-2024-5206,0,1,dfdbb2d2210fa9604e6469b5345cbda30a0f0ae57d39e7dfc070825e6f931647,2024-06-17T19:15:59.190000 CVE-2024-5207,0,0,837facf8fac5843bbf7aea1ce36fa00287f1ba077f8fbca1302b0ab4087ec522,2024-05-30T13:15:41.297000 CVE-2024-5211,0,0,a4277f26aaa565cc417eac86a473b48ddc12386cf29490b9b3d30644e664c347,2024-06-13T18:36:09.010000 CVE-2024-5214,0,0,77a86526714522a20940695733fe46b4562089752d3c663cf289b583b7c6bbda,2024-06-03T19:15:09.360000 @@ -254157,7 +254169,7 @@ CVE-2024-5673,0,0,f6db27a8b7c99bb0a58922425d96edcb461eeb527f78adfd8d9aed9c993301 CVE-2024-5674,0,0,69b0f5cdcc6414c1b3093ac76e322fc42e17eb869b8f1b328084f458395232cf,2024-06-13T18:36:09.010000 CVE-2024-5675,0,0,c04fc1bf8ef6e3f232c30ddf0bd6a524958c9eab63fe205331e1fedef14ccf13,2024-06-11T18:14:02.017000 CVE-2024-5684,0,0,e183f6f3c944efddc1281bf86b4d20b3677f4c3ab127fc0c8f4bc522f6d9ba19,2024-06-11T18:13:30.163000 -CVE-2024-5685,0,1,257471c489e6c7ec6ff319f90eba7250ec0d4d2012a928dee23a25d060b8207a,2024-06-17T17:15:51.953000 +CVE-2024-5685,0,0,257471c489e6c7ec6ff319f90eba7250ec0d4d2012a928dee23a25d060b8207a,2024-06-17T17:15:51.953000 CVE-2024-5687,0,0,b3163ba80d711118288940f35942362f888184d516eedb8a121f43c8b6e99d13,2024-06-11T13:54:12.057000 CVE-2024-5688,0,0,69d8cc15e435db53520a0b374c51ddee2a4c9131e86d6c869cac04768cb98c0c,2024-06-13T23:15:50.490000 CVE-2024-5689,0,0,43d9e6c4643e481c8669e8de5c0cdbeeb708721474986d0f913b6c90e34aa5bd,2024-06-11T13:54:12.057000 @@ -254264,11 +254276,11 @@ CVE-2024-5994,0,0,4500c2f9d4ec1d929f4458a662d4e7cd25de0141c193b0c70f561f594ccb4e CVE-2024-5995,0,0,67a672f2d3fe90ec8a165b5b2ee31107e504c6b0bf47d01a6d89c94b17eb466b,2024-06-17T12:42:04.623000 CVE-2024-5996,0,0,ba461b354a3c080322d9eafe20058e5b8ad775b3a576a51cb3132f1460376b12,2024-06-17T12:42:04.623000 CVE-2024-6000,0,0,0ff462c0caa473d2d22369f17245008287579ea4d11142b6bd58096cee0f0a24,2024-06-17T12:42:04.623000 -CVE-2024-6003,0,1,b131c1a3ce53221548e1c2dcb514a1b9de3ce76a63a09d413211db357f68afbb,2024-06-17T16:15:16.027000 +CVE-2024-6003,0,0,b131c1a3ce53221548e1c2dcb514a1b9de3ce76a63a09d413211db357f68afbb,2024-06-17T16:15:16.027000 CVE-2024-6005,0,0,a7bc5c4f4cd88e8249073eafda5ed4e6ca28a19996b852f459661e5530c10396,2024-06-17T12:42:04.623000 CVE-2024-6006,0,0,9edb8ca4c0dd0d4558b143fb832fc42b328bff9f4b383b9f92efc4408ae0b0ca,2024-06-17T15:15:52.693000 CVE-2024-6007,0,0,10a5bf7c2814f8c45b29a7830a1e182f887cf45831b7092d81e48bb44ca9bf15,2024-06-17T12:42:04.623000 -CVE-2024-6008,0,1,c91774daf5e01f51e3ed230da10d811f428be9da4023af41a23643597eb98c00,2024-06-17T16:15:16.140000 +CVE-2024-6008,0,0,c91774daf5e01f51e3ed230da10d811f428be9da4023af41a23643597eb98c00,2024-06-17T16:15:16.140000 CVE-2024-6009,0,0,468577c4db742932e2254bcba365ac1e04c74b564538fb241a46994d66ec19d6,2024-06-17T12:42:04.623000 CVE-2024-6013,0,0,44159fdbcbcac2a689071de339f13c4fefa84302df10ce908aefe802918d324e,2024-06-17T12:42:04.623000 CVE-2024-6014,0,0,6f42b027c41cbc2bef7f3eccd4ed3d2b0646bd4a1028da377690698f14644291,2024-06-17T12:42:04.623000 @@ -254284,4 +254296,7 @@ CVE-2024-6046,0,0,a5ace0bbdf0f368d76efea99e17761b90d722a7f8fb2cd5b11d6c7027f5ee4 CVE-2024-6047,0,0,4cdf0f1acff12373f8f857c8d442b9de2221d44745323cc3f60bf66bccd7a239,2024-06-17T14:15:13.040000 CVE-2024-6048,0,0,03e9485ef23720c113f11fed6c539200d9a1624e025ca24798cddf9d0c1a9e3b,2024-06-17T12:42:04.623000 CVE-2024-6055,0,0,93ffb465c6acddf15e4142ae2e8b4bcae95c7241e5f24a2dedc05f862f5d2e79,2024-06-17T13:15:53.697000 +CVE-2024-6056,1,1,636228dd1a2c8f5c63676f25cc803d23af23082b986789068b58dd9fd2a57ea9,2024-06-17T18:15:18.143000 CVE-2024-6057,0,0,cfabce49b9db224e3720b6479e81ee1edcd2fcbaabb39bed0063a52236765ccd,2024-06-17T13:15:53.800000 +CVE-2024-6058,1,1,3ee08d4ad26cf88da329a5e1271ed474432fcbd63bb5792a008ded1da8686681,2024-06-17T18:15:18.520000 +CVE-2024-6059,1,1,8dc3785d03b4bbf495bb7b9e0db50afd358453b35356b7519dfcb40c8d9c6a71,2024-06-17T19:15:59.467000