diff --git a/CVE-2024/CVE-2024-20xx/CVE-2024-2098.json b/CVE-2024/CVE-2024-20xx/CVE-2024-2098.json new file mode 100644 index 00000000000..13d91fe9875 --- /dev/null +++ b/CVE-2024/CVE-2024-20xx/CVE-2024-2098.json @@ -0,0 +1,47 @@ +{ + "id": "CVE-2024-2098", + "sourceIdentifier": "security@wordfence.com", + "published": "2024-06-13T06:15:09.453", + "lastModified": "2024-06-13T06:15:09.453", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "The Download Manager plugin for WordPress is vulnerable to unauthorized access of data due to an improper authorization check on the 'protectMediaLibrary' function in all versions up to, and including, 3.2.89. This makes it possible for unauthenticated attackers to download password-protected files." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security@wordfence.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "references": [ + { + "url": "https://plugins.trac.wordpress.org/changeset/3072712/download-manager", + "source": "security@wordfence.com" + }, + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/1301c8af-d81a-40f1-96fa-e8252309d8a4?source=cve", + "source": "security@wordfence.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-27xx/CVE-2024-2762.json b/CVE-2024/CVE-2024-27xx/CVE-2024-2762.json new file mode 100644 index 00000000000..c41cae2cc37 --- /dev/null +++ b/CVE-2024/CVE-2024-27xx/CVE-2024-2762.json @@ -0,0 +1,20 @@ +{ + "id": "CVE-2024-2762", + "sourceIdentifier": "contact@wpscan.com", + "published": "2024-06-13T06:15:11.003", + "lastModified": "2024-06-13T06:15:11.003", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "The FooGallery WordPress plugin before 2.4.15, foogallery-premium WordPress plugin before 2.4.15 does not validate and escape some of its Gallery settings before outputting them back in the page, which could allow users with a role as low as Author to perform Stored Cross-Site Scripting attacks which could be used against high privilege users such as admin" + } + ], + "metrics": {}, + "references": [ + { + "url": "https://wpscan.com/vulnerability/92e0f5ca-0184-4e9c-b01a-7656e05dce69/", + "source": "contact@wpscan.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-30xx/CVE-2024-3032.json b/CVE-2024/CVE-2024-30xx/CVE-2024-3032.json new file mode 100644 index 00000000000..a67b1e426e4 --- /dev/null +++ b/CVE-2024/CVE-2024-30xx/CVE-2024-3032.json @@ -0,0 +1,20 @@ +{ + "id": "CVE-2024-3032", + "sourceIdentifier": "contact@wpscan.com", + "published": "2024-06-13T06:15:11.333", + "lastModified": "2024-06-13T06:15:11.333", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Themify Builder WordPress plugin before 7.5.8 does not validate a parameter before redirecting the user to its value, leading to an Open Redirect issue" + } + ], + "metrics": {}, + "references": [ + { + "url": "https://wpscan.com/vulnerability/d130a60c-c36b-4994-9b0e-e52cd7f99387/", + "source": "contact@wpscan.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-35xx/CVE-2024-3552.json b/CVE-2024/CVE-2024-35xx/CVE-2024-3552.json new file mode 100644 index 00000000000..d770ab279c2 --- /dev/null +++ b/CVE-2024/CVE-2024-35xx/CVE-2024-3552.json @@ -0,0 +1,20 @@ +{ + "id": "CVE-2024-3552", + "sourceIdentifier": "contact@wpscan.com", + "published": "2024-06-13T06:15:11.633", + "lastModified": "2024-06-13T06:15:11.633", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "The Web Directory Free WordPress plugin before 1.7.0 does not sanitise and escape a parameter before using it in a SQL statement via an AJAX action available to unauthenticated users, leading to a SQL injection with different techniques like UNION, Time-Based and Error-Based." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://wpscan.com/vulnerability/34b03ee4-de81-4fec-9f3d-e1bd5b94d136/", + "source": "contact@wpscan.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-41xx/CVE-2024-4145.json b/CVE-2024/CVE-2024-41xx/CVE-2024-4145.json new file mode 100644 index 00000000000..f4372964763 --- /dev/null +++ b/CVE-2024/CVE-2024-41xx/CVE-2024-4145.json @@ -0,0 +1,20 @@ +{ + "id": "CVE-2024-4145", + "sourceIdentifier": "contact@wpscan.com", + "published": "2024-06-13T06:15:11.920", + "lastModified": "2024-06-13T06:15:11.920", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "The Search & Replace WordPress plugin before 3.2.2 does not sanitize and escape a parameter before using it in a SQL statement, allowing admins to perform SQL injection attacks (such as within a multi-site network)." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://wpscan.com/vulnerability/7d5b8764-c82d-4969-a707-f38b63bcadca/", + "source": "contact@wpscan.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-41xx/CVE-2024-4149.json b/CVE-2024/CVE-2024-41xx/CVE-2024-4149.json new file mode 100644 index 00000000000..792a2480099 --- /dev/null +++ b/CVE-2024/CVE-2024-41xx/CVE-2024-4149.json @@ -0,0 +1,20 @@ +{ + "id": "CVE-2024-4149", + "sourceIdentifier": "contact@wpscan.com", + "published": "2024-06-13T06:15:12.203", + "lastModified": "2024-06-13T06:15:12.203", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "The Floating Chat Widget: Contact Chat Icons, WhatsApp, Telegram Chat, Line Messenger, WeChat, Email, SMS, Call Button WordPress plugin before 3.2.3 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup)." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://wpscan.com/vulnerability/0256ec2a-f1a9-4110-9978-ee88f9e24237/", + "source": "contact@wpscan.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-45xx/CVE-2024-4576.json b/CVE-2024/CVE-2024-45xx/CVE-2024-4576.json new file mode 100644 index 00000000000..5ad7aff057f --- /dev/null +++ b/CVE-2024/CVE-2024-45xx/CVE-2024-4576.json @@ -0,0 +1,20 @@ +{ + "id": "CVE-2024-4576", + "sourceIdentifier": "security@tibco.com", + "published": "2024-06-13T07:15:42.493", + "lastModified": "2024-06-13T07:15:42.493", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "The component listed above contains a vulnerability that allows an attacker to traverse directories and access sensitive files, leading to unauthorized disclosure of system configuration and potentially sensitive information." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://community.tibco.com/advisories/tibco-security-advisory-june-11-2024-tibco-ebx-cve-2024-4576-r215/", + "source": "security@tibco.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-52xx/CVE-2024-5265.json b/CVE-2024/CVE-2024-52xx/CVE-2024-5265.json new file mode 100644 index 00000000000..7401370cdd0 --- /dev/null +++ b/CVE-2024/CVE-2024-52xx/CVE-2024-5265.json @@ -0,0 +1,47 @@ +{ + "id": "CVE-2024-5265", + "sourceIdentifier": "security@wordfence.com", + "published": "2024-06-13T07:15:42.700", + "lastModified": "2024-06-13T07:15:42.700", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "The WPBakery Visual Composer plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the link attribute within the vc_single_image shortcode in all versions up to, and including, 7.6 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security@wordfence.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 6.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 3.1, + "impactScore": 2.7 + } + ] + }, + "references": [ + { + "url": "https://kb.wpbakery.com/docs/preface/release-notes/", + "source": "security@wordfence.com" + }, + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/35a5114e-5c5f-4003-8bb3-77243ffbac1a?source=cve", + "source": "security@wordfence.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-56xx/CVE-2024-5661.json b/CVE-2024/CVE-2024-56xx/CVE-2024-5661.json new file mode 100644 index 00000000000..57ceae4b4cf --- /dev/null +++ b/CVE-2024/CVE-2024-56xx/CVE-2024-5661.json @@ -0,0 +1,20 @@ +{ + "id": "CVE-2024-5661", + "sourceIdentifier": "secure@citrix.com", + "published": "2024-06-13T06:15:12.487", + "lastModified": "2024-06-13T06:15:12.487", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "An issue has been identified in both XenServer 8 and Citrix Hypervisor 8.2 CU1 LTSR which may allow a malicious administrator of a guest VM to cause the host to become slow and/or unresponsive." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://support.citrix.com/article/CTX677100/xenserver-and-citrix-hypervisor-security-update-for-cve20245661", + "source": "secure@citrix.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-57xx/CVE-2024-5757.json b/CVE-2024/CVE-2024-57xx/CVE-2024-5757.json new file mode 100644 index 00000000000..7dc79eb8b78 --- /dev/null +++ b/CVE-2024/CVE-2024-57xx/CVE-2024-5757.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2024-5757", + "sourceIdentifier": "security@wordfence.com", + "published": "2024-06-13T06:15:12.827", + "lastModified": "2024-06-13T06:15:12.827", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "The Elementor Header & Footer Builder plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the url attribute within the plugin's Site Title widget in all versions up to, and including, 1.6.35 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security@wordfence.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 6.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 3.1, + "impactScore": 2.7 + } + ] + }, + "references": [ + { + "url": "https://plugins.trac.wordpress.org/browser/header-footer-elementor/tags/1.6.35/inc/widgets-manager/widgets/class-site-title.php#L461", + "source": "security@wordfence.com" + }, + { + "url": "https://plugins.trac.wordpress.org/changeset/3101672/#file3", + "source": "security@wordfence.com" + }, + { + "url": "https://wordpress.org/plugins/header-footer-elementor/#developers", + "source": "security@wordfence.com" + }, + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/b5ab022c-c16c-488b-b004-a7351f8fa3d3?source=cve", + "source": "security@wordfence.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-57xx/CVE-2024-5787.json b/CVE-2024/CVE-2024-57xx/CVE-2024-5787.json new file mode 100644 index 00000000000..23985fb868a --- /dev/null +++ b/CVE-2024/CVE-2024-57xx/CVE-2024-5787.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2024-5787", + "sourceIdentifier": "security@wordfence.com", + "published": "2024-06-13T06:15:13.430", + "lastModified": "2024-06-13T06:15:13.430", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "The PowerPack Addons for Elementor (Free Widgets, Extensions and Templates) plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'url' attribute within the plugin's Link Effects widget in all versions up to, and including, 2.7.20 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security@wordfence.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 6.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 3.1, + "impactScore": 2.7 + } + ] + }, + "references": [ + { + "url": "https://plugins.trac.wordpress.org/browser/powerpack-lite-for-elementor/tags/2.7.20/modules/link-effects/widgets/link-effects.php#L482", + "source": "security@wordfence.com" + }, + { + "url": "https://plugins.trac.wordpress.org/changeset/3101651/#file331", + "source": "security@wordfence.com" + }, + { + "url": "https://wordpress.org/plugins/powerpack-lite-for-elementor/#developers", + "source": "security@wordfence.com" + }, + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/ce55230e-8c9e-41aa-b107-16c5988d1feb?source=cve", + "source": "security@wordfence.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-58xx/CVE-2024-5894.json b/CVE-2024/CVE-2024-58xx/CVE-2024-5894.json index f42467a8a4b..8ebc1089959 100644 --- a/CVE-2024/CVE-2024-58xx/CVE-2024-5894.json +++ b/CVE-2024/CVE-2024-58xx/CVE-2024-5894.json @@ -2,7 +2,7 @@ "id": "CVE-2024-5894", "sourceIdentifier": "cna@vuldb.com", "published": "2024-06-12T15:15:53.693", - "lastModified": "2024-06-12T19:15:51.733", + "lastModified": "2024-06-13T06:15:14.033", "vulnStatus": "Received", "descriptions": [ { @@ -17,19 +17,19 @@ "type": "Secondary", "cvssData": { "version": "3.1", - "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", "attackVector": "NETWORK", "attackComplexity": "LOW", - "privilegesRequired": "LOW", + "privilegesRequired": "NONE", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "availabilityImpact": "LOW", - "baseScore": 6.3, - "baseSeverity": "MEDIUM" + "baseScore": 7.3, + "baseSeverity": "HIGH" }, - "exploitabilityScore": 2.8, + "exploitabilityScore": 3.9, "impactScore": 3.4 } ], @@ -39,17 +39,17 @@ "type": "Secondary", "cvssData": { "version": "2.0", - "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", + "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "accessVector": "NETWORK", "accessComplexity": "LOW", - "authentication": "SINGLE", + "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", - "baseScore": 6.5 + "baseScore": 7.5 }, - "baseSeverity": "MEDIUM", - "exploitabilityScore": 8.0, + "baseSeverity": "HIGH", + "exploitabilityScore": 10.0, "impactScore": 6.4, "acInsufInfo": false, "obtainAllPrivilege": false, diff --git a/README.md b/README.md index 8d3216da4ab..1309bb6d3d0 100644 --- a/README.md +++ b/README.md @@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2024-06-13T06:00:18.885652+00:00 +2024-06-13T08:00:18.877660+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2024-06-13T05:15:50.760000+00:00 +2024-06-13T07:15:42.700000+00:00 ``` ### Last Data Feed Release @@ -33,31 +33,31 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### Total Number of included CVEs ```plain -253711 +253722 ``` ### CVEs added in the last Commit -Recently added CVEs: `4` +Recently added CVEs: `11` -- [CVE-2023-52890](CVE-2023/CVE-2023-528xx/CVE-2023-52890.json) (`2024-06-13T04:15:15.920`) -- [CVE-2024-38293](CVE-2024/CVE-2024-382xx/CVE-2024-38293.json) (`2024-06-13T05:15:50.517`) -- [CVE-2024-38294](CVE-2024/CVE-2024-382xx/CVE-2024-38294.json) (`2024-06-13T05:15:50.667`) -- [CVE-2024-38295](CVE-2024/CVE-2024-382xx/CVE-2024-38295.json) (`2024-06-13T05:15:50.760`) +- [CVE-2024-2098](CVE-2024/CVE-2024-20xx/CVE-2024-2098.json) (`2024-06-13T06:15:09.453`) +- [CVE-2024-2762](CVE-2024/CVE-2024-27xx/CVE-2024-2762.json) (`2024-06-13T06:15:11.003`) +- [CVE-2024-3032](CVE-2024/CVE-2024-30xx/CVE-2024-3032.json) (`2024-06-13T06:15:11.333`) +- [CVE-2024-3552](CVE-2024/CVE-2024-35xx/CVE-2024-3552.json) (`2024-06-13T06:15:11.633`) +- [CVE-2024-4145](CVE-2024/CVE-2024-41xx/CVE-2024-4145.json) (`2024-06-13T06:15:11.920`) +- [CVE-2024-4149](CVE-2024/CVE-2024-41xx/CVE-2024-4149.json) (`2024-06-13T06:15:12.203`) +- [CVE-2024-4576](CVE-2024/CVE-2024-45xx/CVE-2024-4576.json) (`2024-06-13T07:15:42.493`) +- [CVE-2024-5265](CVE-2024/CVE-2024-52xx/CVE-2024-5265.json) (`2024-06-13T07:15:42.700`) +- [CVE-2024-5661](CVE-2024/CVE-2024-56xx/CVE-2024-5661.json) (`2024-06-13T06:15:12.487`) +- [CVE-2024-5757](CVE-2024/CVE-2024-57xx/CVE-2024-5757.json) (`2024-06-13T06:15:12.827`) +- [CVE-2024-5787](CVE-2024/CVE-2024-57xx/CVE-2024-5787.json) (`2024-06-13T06:15:13.430`) ### CVEs modified in the last Commit -Recently modified CVEs: `8` +Recently modified CVEs: `1` -- [CVE-2012-1823](CVE-2012/CVE-2012-18xx/CVE-2012-1823.json) (`2024-06-13T04:15:15.370`) -- [CVE-2024-1874](CVE-2024/CVE-2024-18xx/CVE-2024-1874.json) (`2024-06-13T04:15:16.157`) -- [CVE-2024-23672](CVE-2024/CVE-2024-236xx/CVE-2024-23672.json) (`2024-06-13T04:15:16.380`) -- [CVE-2024-2408](CVE-2024/CVE-2024-24xx/CVE-2024-2408.json) (`2024-06-13T04:15:16.783`) -- [CVE-2024-24549](CVE-2024/CVE-2024-245xx/CVE-2024-24549.json) (`2024-06-13T04:15:16.537`) -- [CVE-2024-4577](CVE-2024/CVE-2024-45xx/CVE-2024-4577.json) (`2024-06-13T04:15:16.930`) -- [CVE-2024-5458](CVE-2024/CVE-2024-54xx/CVE-2024-5458.json) (`2024-06-13T04:15:17.220`) -- [CVE-2024-5585](CVE-2024/CVE-2024-55xx/CVE-2024-5585.json) (`2024-06-13T04:15:17.407`) +- [CVE-2024-5894](CVE-2024/CVE-2024-58xx/CVE-2024-5894.json) (`2024-06-13T06:15:14.033`) ## Download and Usage diff --git a/_state.csv b/_state.csv index f2ccfd88acd..d1b7b070be0 100644 --- a/_state.csv +++ b/_state.csv @@ -53464,7 +53464,7 @@ CVE-2012-1818,0,0,bc7e510e1c84d94b9487120647c0529a79e44e72823e54b62cb8f7df99fbb0 CVE-2012-1819,0,0,184b30253b1491801bbcd6d01d599685eb79f2b13aa47eb0cb49dfabfd5306f4,2017-12-14T02:29:01.590000 CVE-2012-1820,0,0,17deca30243bc14daca9411e90d44d453bfd97e8bf3cae1992c61bbdb88929cf,2013-03-02T04:40:49.207000 CVE-2012-1821,0,0,db00ed603eb893b360e4ea9f689ff9422841a008b7a560bba36f876e9e7c748b,2018-01-05T02:29:29.227000 -CVE-2012-1823,0,1,55272219aea043d022d1e3028bdd33d11df39a47d4366fe4c13a70f1ef6e2888,2024-06-13T04:15:15.370000 +CVE-2012-1823,0,0,55272219aea043d022d1e3028bdd33d11df39a47d4366fe4c13a70f1ef6e2888,2024-06-13T04:15:15.370000 CVE-2012-1824,0,0,203a5a0bb51d11346f07c30d5be795241036c4f1188673f9827185f720723a27,2012-05-28T04:00:00 CVE-2012-1825,0,0,4d0bc50e34dcfa88d007d7137caa7a88b32fca33784d0cdaf2729155bc3a291e,2012-06-12T04:00:00 CVE-2012-1826,0,0,7ae3f8c8d78bfe95053cf0d654e3770c2740a7cec9e762a5e06afcb2a6bc3ef1,2012-11-27T04:41:22.567000 @@ -238603,7 +238603,7 @@ CVE-2023-52880,0,0,482c2c5065430f7d7892683cda8d1764232771aae78850c90bbe4e8ec7777 CVE-2023-52881,0,0,6f27b572b3e64428644bdda7520544f8cd90fee86a13f8f6a714c131a849a56d,2024-05-29T13:02:09.280000 CVE-2023-52882,0,0,798470a64b56f744c8b04faf053b4d16c03d86b55db554772e204dd8af8cb938,2024-05-30T18:19:11.743000 CVE-2023-5289,0,0,e99a2312fffac7e548d9067401ea1735cab5340b5825bd2426e3171dd9b0909d,2023-10-02T18:13:04.227000 -CVE-2023-52890,1,1,ba3f9407fe80793e8b809d5dd33980881cfd4235e4c130bec5ff9177c8b8664f,2024-06-13T04:15:15.920000 +CVE-2023-52890,0,0,ba3f9407fe80793e8b809d5dd33980881cfd4235e4c130bec5ff9177c8b8664f,2024-06-13T04:15:15.920000 CVE-2023-5290,0,0,755547461c1ffe140ccfa395ab853f280b1d991be6ac36b66243260a063192cc,2023-11-07T04:23:48.727000 CVE-2023-5291,0,0,883b747bfd1d6788133af6b41df2a1418b2cdede81e8f6778f889cd9ac7f0a65,2023-11-07T04:23:48.757000 CVE-2023-5292,0,0,4cc839ef69b87bcc6a5b374e7a356353ac58f85130526f66d9ff0dd59cb98e24,2023-11-07T04:23:48.910000 @@ -241961,7 +241961,7 @@ CVE-2024-1870,0,0,f4fb5b22985880167f6ef7e58ca026ed8b40cb096cd98407286dd4dcc1e6fa CVE-2024-1871,0,0,53466521d88a948aacc643bc41f4155f985a2f1b644fc39c2381029fe9759369,2024-05-17T02:35:39.620000 CVE-2024-1872,0,0,0e36724fd278d3b5ba1bf1780a959b96e873b9d84e6ffb5da1fec563cf60ff60,2024-03-29T12:45:02.937000 CVE-2024-1873,0,0,bedbe01f19b602d7cdf2e548fba4b990948268079925c584ccf0629e4ff1322b,2024-06-07T14:56:05.647000 -CVE-2024-1874,0,1,1624439b77063956de3265daa8f8be57262c685d9d3b2e28d96a207e6f740602,2024-06-13T04:15:16.157000 +CVE-2024-1874,0,0,1624439b77063956de3265daa8f8be57262c685d9d3b2e28d96a207e6f740602,2024-06-13T04:15:16.157000 CVE-2024-1875,0,0,4d3dd4a4b8c370f12680c169de0cf289ca26eb275c51e88da74196c390492423,2024-05-17T02:35:39.780000 CVE-2024-1876,0,0,5b215f1340b9ed6a783f4bc946ebecc40ae85a621beffc0ee7306f825a5ce99a,2024-05-17T02:35:39.867000 CVE-2024-1877,0,0,5b58ff06d31067b71d9b7b79ca992bd4ab9ee2c6c00dfbd7a45b3b55df28700a,2024-05-17T02:35:39.957000 @@ -242610,6 +242610,7 @@ CVE-2024-20976,0,0,3df652d9ab2d071dd921b6779fded152aa5f407ec82528f75e7b19b44768c CVE-2024-20977,0,0,fef5bbaae018d19a53c2f5d98ea9e733b037a36d3f69a381190d7cea0e6a35dc,2024-02-02T17:24:20.210000 CVE-2024-20978,0,0,80cf258a1ec0cc1905f8f5c7a241827725a4f65cf910168a5b58307b8036f81e,2024-03-01T23:19:21.650000 CVE-2024-20979,0,0,745b4e823ecb5e3e1bc54e7165cab343b4506f8bde364966cde11f20865f1196,2024-01-20T18:30:34.090000 +CVE-2024-2098,1,1,a3acc8390d1726f946cecf5e8c87af2937f30577daee32783f508b4f21f92059,2024-06-13T06:15:09.453000 CVE-2024-20980,0,0,45e811efcf4f9b344c63af98961d73b2599caa3dac802767c4fe6a67c5ae2849,2024-02-20T19:50:53.960000 CVE-2024-20981,0,0,fc6e0b79db016419e3eb83edeed8408c979661f844e9ffa674c001e4ab68cf36,2024-02-02T17:24:34.507000 CVE-2024-20982,0,0,dae544a32bd81f6ba42a4d0da36b3af5fd3388122cb05735f3e47e60780d5b7e,2024-02-20T19:50:53.960000 @@ -244234,7 +244235,7 @@ CVE-2024-23668,0,0,51d21722f600a8d7c6853c0f9ea388475489e90712fe45fa3fcf586695ca5 CVE-2024-23669,0,0,c56d067fc5952db5d2fb92a9d35150e47a4b10ceefda3afe1a73049170c1c1ae,2024-06-11T17:09:43.840000 CVE-2024-23670,0,0,4d8614a9f46c8880393dda5ce774ce29db3e4f2f75a2a9e9b14a9ec00baa1b4c,2024-06-03T14:46:24.250000 CVE-2024-23671,0,0,108c61a6aa74a9b71687a2e3aa153a422c4a0c3adcd258415c5b065e1ef21ae7,2024-04-10T13:24:22.187000 -CVE-2024-23672,0,1,b67628ceb14485dc3e272ef48d934c96d292af520ea6efa4d2bca35fab444289,2024-06-13T04:15:16.380000 +CVE-2024-23672,0,0,b67628ceb14485dc3e272ef48d934c96d292af520ea6efa4d2bca35fab444289,2024-06-13T04:15:16.380000 CVE-2024-23673,0,0,11a42dc617628e4138314e2a3d8d0f02b60cec9315a80bc3284ec5f1547fd09f,2024-02-14T00:26:41.517000 CVE-2024-23674,0,0,6ff4eec4bc6bf37404ee9cc16207f5af57bda7bc987c56668d0793a7a9ea14ad,2024-02-16T13:37:55.033000 CVE-2024-23675,0,0,5e36e400a6245dbdd0a91610d744d9dd0fbeb86579b43d26af0fd1a42a668fa2,2024-04-10T01:15:18.057000 @@ -244503,7 +244504,7 @@ CVE-2024-2406,0,0,bce1950aa0ba3247257e0f9798cc049e12ff07a8e21e9064eb763cce3e8229 CVE-2024-24060,0,0,3a6250076b98d97024da5e52a26f1f0c29807ef38de327e60f431783e4f1deaa,2024-02-03T00:40:48.600000 CVE-2024-24061,0,0,3ae0e78c2ecb0941fa62f48d1dc7792d4436b76ec841f1dbf3bf2317943894c3,2024-02-03T00:40:50.623000 CVE-2024-24062,0,0,ce51fb5fa7f08b3262a47fca149a06dc25ea5ca7c584b3ae7210563fa9fd54c1,2024-02-03T00:40:52.877000 -CVE-2024-2408,0,1,edea1c44b28339a4d2a6730fc2a7a2d7849bb436c7ecf783756fdfccec24601f,2024-06-13T04:15:16.783000 +CVE-2024-2408,0,0,edea1c44b28339a4d2a6730fc2a7a2d7849bb436c7ecf783756fdfccec24601f,2024-06-13T04:15:16.783000 CVE-2024-2409,0,0,ba586e1c6181b06c3ede339eac17164a8a25d5149e65ad7809000b9e6c808051,2024-03-29T12:45:02.937000 CVE-2024-24091,0,0,6258a73a312c8c072d234b916137958d60ec77d8bc24aab7428a6677fc85f73a,2024-02-08T13:44:21.670000 CVE-2024-24092,0,0,d4ab4cc918de723ea385c13013f3b5223c8222e6f58b4c0135bd83322e27d646,2024-03-13T12:33:51.697000 @@ -244690,7 +244691,7 @@ CVE-2024-24539,0,0,f93dd0b0f28d93142ebc045d2b13c802b69814cdafc34403acf2ae3cd6940 CVE-2024-2454,0,0,0b9f095d4355e2ae908fadafa529487790a4decf8d55ba7b4076087a41339237,2024-05-14T16:13:02.773000 CVE-2024-24543,0,0,f516e88d85199344e1e2c4ae69468b4de7248951f71da4710fc97171a286ff1a,2024-02-14T17:13:32.827000 CVE-2024-24548,0,0,9dbe1af5af4a9b865bf88b2a305b739ac231a7ce95c9c8ed04344b3144708c91,2024-02-08T18:53:14.107000 -CVE-2024-24549,0,1,78b6cc1b67aa7f02ad902f6a107ffca0b29f8b88e29895fc651bd300f56a49e3,2024-06-13T04:15:16.537000 +CVE-2024-24549,0,0,78b6cc1b67aa7f02ad902f6a107ffca0b29f8b88e29895fc651bd300f56a49e3,2024-06-13T04:15:16.537000 CVE-2024-24556,0,0,5eadc80f5e2b4d40f2247a29eb7c2aa8b2d9f2f191f8cfe4f491f2d184a6cbe7,2024-02-06T19:24:46.810000 CVE-2024-24557,0,0,803986686a1d77830cb33582e01547bf1b4ed013f71e8dbf2a84322efe6db933,2024-02-09T20:21:32.970000 CVE-2024-24558,0,0,26ffac7b2f9dc8041f02bc6fb374f1f9b0b06e69d8b3e191802aa68af28d0bbc,2024-04-23T19:52:49.107000 @@ -246853,6 +246854,7 @@ CVE-2024-2761,0,0,cf834841c5b211eef0e0519a3f2694713d2a65d6dd9e3a3ffa371f6cc81ff7 CVE-2024-27612,0,0,c510222cc98aeecd84a141efbf806cb4a31be0185bd980ef0ea0993f9e29a425,2024-03-08T14:02:57.420000 CVE-2024-27613,0,0,55e42cf2e4639a6096ea75af39dc974125f1048dbd4b80fc4aa61dc42e00d85d,2024-03-08T14:02:57.420000 CVE-2024-27619,0,0,ac27585ed59a6668049d75158e75afc441f45955e396bf2ead784d9f82b5977e,2024-04-01T01:12:59.077000 +CVE-2024-2762,1,1,982d754eb2ac65887a9a0166b8622dd2db0fa6bd021f85b0483cc48cb6ec6cd1,2024-06-13T06:15:11.003000 CVE-2024-27620,0,0,4bfc993d4e14e5106dd7a82c3dc44aa0baefcf2c7d47f57f47fe77723c791abe,2024-04-08T18:48:40.217000 CVE-2024-27622,0,0,1adfc2d7f6a7f9f516e2d479e9d3f31d51deca672bf1402aad4768d05a6f7121,2024-06-07T16:15:10.387000 CVE-2024-27623,0,0,2fddee8e74e15c6e7895f22777fd9ac33928389d1ff6851e7ceeb0e05ed9e8b4,2024-03-05T14:27:46.090000 @@ -248500,6 +248502,7 @@ CVE-2024-30310,0,0,83f49301bae9d9ce1f4f10baaa19cd19c5d8338561e896cd48c650144ecc0 CVE-2024-30311,0,0,9d217824227954911dd5a3bdb06324510e4c2d800d17c3d3d8e7c71eb2bd297d,2024-06-10T18:15:30.757000 CVE-2024-30312,0,0,07602b35ce17259a48da425f51ef913f48381cf49e65fcb7583eae5ee1007be0,2024-06-10T18:15:30.880000 CVE-2024-30314,0,0,1c6263a9ec0b1b4c544180b477adf01c0311e37fed95feb72da46c3babb52d01,2024-05-22T08:15:09.777000 +CVE-2024-3032,1,1,70952ff20a5882cf4df49e34e5554c611024e90696b171b881b66f816f3945c1,2024-06-13T06:15:11.333000 CVE-2024-30322,0,0,82127178dd2c4390457a625b1b802dc21960ed844c23f33ac3f61e8d8c162a4f,2024-04-03T17:24:18.150000 CVE-2024-30323,0,0,4ba71c995b9c718766f72cb8f425ef56f31d70d4141fb317ff1b84d1d4bea62f,2024-04-03T17:24:18.150000 CVE-2024-30324,0,0,b34850e80ab56aec12159793bc4cf321b46343aaa9dfe2615612dc24168ff93e,2024-04-03T17:24:18.150000 @@ -251448,6 +251451,7 @@ CVE-2024-3551,0,0,0b53eeac67d78da7f449ca2544acbc24b1d30e959723fbcf9808dc22d9b1d6 CVE-2024-35510,0,0,244a039d3e43a77d1e1c1bfa1c93465718af15f6d6ebd597960608d48e40fc7c,2024-05-29T13:02:09.280000 CVE-2024-35511,0,0,88c11e90f79a9ed0aca8c4301cc3b328c70f04cb419aacefe9fa82a87fbd22d6,2024-05-29T13:02:09.280000 CVE-2024-35512,0,0,c9d23c736120f04931cbbc7470489190e83340be8d46b2f2d0f2c886a0a46a7d,2024-05-29T19:50:25.303000 +CVE-2024-3552,1,1,7a15cbb3d46201db481a8e12fb162955b0b92a959155fa8d0458c2a6ddaaf44b,2024-06-13T06:15:11.633000 CVE-2024-3553,0,0,35fab26edb78f51246dfea40a1da2d2c641df3766aad72a071763d4720020731,2024-05-02T18:00:37.360000 CVE-2024-3554,0,0,b4c32859301bcc314e2dd2301d5e454826bca59cac4e6957d0f808d223349460,2024-05-02T18:00:37.360000 CVE-2024-35548,0,0,d8ef06df5ce64125bab3cdde256f258e1c87cbfe4cc6bfbb1a4d7595969f62d9,2024-05-29T13:02:09.280000 @@ -252403,9 +252407,9 @@ CVE-2024-3824,0,0,8545575d3e734e1433cd4d7c91c77cd29907e6f5ee87d4739239efdf13c20f CVE-2024-3825,0,0,f398f78dcc905612b8b1fff020bcc62d405b80ffdf3a9053d9f90f163c40baa7,2024-04-17T15:31:50.160000 CVE-2024-3828,0,0,57a9b409ca1cac39bc20af9eb7a4e7dcc3bae1882e9b3a8ca25cdf22dad097ef,2024-05-14T16:11:39.510000 CVE-2024-3829,0,0,3665a2ef01b9d2a532a67b6bd535e92cc829779e81e658e1b77983bbc06d00f6,2024-06-03T14:46:24.250000 -CVE-2024-38293,1,1,00dd0c51b325479d100e34f5f42d67de92948887fa29b424cfb34a3c8c5912da,2024-06-13T05:15:50.517000 -CVE-2024-38294,1,1,44bc77dffac12bc5dd7375baca2b9284e71d30107119d9703cdd4341f32433ae,2024-06-13T05:15:50.667000 -CVE-2024-38295,1,1,263b3ec7cb98cac243e736d4caaf9c074766d6e10ecf7db86d522f76fb2fe6d5,2024-06-13T05:15:50.760000 +CVE-2024-38293,0,0,00dd0c51b325479d100e34f5f42d67de92948887fa29b424cfb34a3c8c5912da,2024-06-13T05:15:50.517000 +CVE-2024-38294,0,0,44bc77dffac12bc5dd7375baca2b9284e71d30107119d9703cdd4341f32433ae,2024-06-13T05:15:50.667000 +CVE-2024-38295,0,0,263b3ec7cb98cac243e736d4caaf9c074766d6e10ecf7db86d522f76fb2fe6d5,2024-06-13T05:15:50.760000 CVE-2024-3831,0,0,28fa4e2fb2524144138a610966fa5501c7b19e1083bb04e4062bd6679bbd2a31,2024-05-14T16:11:39.510000 CVE-2024-3832,0,0,1075b96952121645fbb81b228e0c3813e39db7e21c4c9aa1fc24c30b61618c13,2024-04-23T18:15:15.187000 CVE-2024-3833,0,0,ba630503495cf2aaf1fce7ce704a30930ed35eb1665a53e19102e8c18f607a36,2024-05-03T03:16:28.940000 @@ -252620,8 +252624,10 @@ CVE-2024-4140,0,0,722eee4132feb9c9f6e2ce08731c2e9140964d3eba63910346dbf63a264f25 CVE-2024-4141,0,0,569cd2fcd9188d9eabeb08d432690880975d5549c17482aa7e239fef9c6bb2e6,2024-04-24T19:58:40.710000 CVE-2024-4142,0,0,6297707db3df670a282f3d4e6720e4836d7467220b5fcc108ef053e6a6308f68,2024-05-02T13:27:25.103000 CVE-2024-4144,0,0,804f070eb7c147c92dd9f6be5c3d4dba7563c2bc35d2c208518fc5d01b232644,2024-05-14T19:17:55.627000 +CVE-2024-4145,1,1,9af62466bb2d2260d3833274374a084a8798e64592baeb6f5de8497e71754a8c,2024-06-13T06:15:11.920000 CVE-2024-4146,0,0,f8f260875b4ff9ed1583adbf7ba70960954506f16d74baae5eb60152af635a23,2024-06-10T02:52:08.267000 CVE-2024-4148,0,0,99472767520f10bad17ca80099c5e2a59b64c04b882cb0fc99c8823f2860bd7b,2024-06-03T14:46:24.250000 +CVE-2024-4149,1,1,e3da1adfcfbfc5b345acae0b6990a9d6fa0a1d4d07005558136a31dba8b7485c,2024-06-13T06:15:12.203000 CVE-2024-4150,0,0,faed1039ecc56269b946edc3dde84ea0ad72d4967895c1be6d39f317de75f649,2024-05-14T16:11:39.510000 CVE-2024-4151,0,0,500903b4f0f30e11a0df3621c175651eac21ce51d803c0af0322e88c41c92b80,2024-05-20T15:17:54.513000 CVE-2024-4152,0,0,13d6846d5d8de8b62b05f9517615f61344c09651c47417acc47cbce42e9e3dd9,2024-06-07T17:15:51.580000 @@ -252951,7 +252957,8 @@ CVE-2024-4571,0,0,b379f15291a8a65b330c223bc6a31fd0a21b183a906c0a4077ca3cf5d38b8a CVE-2024-4572,0,0,f5ca5c1acec751c453949e3111f6be45773ff402d3c1d2b8e88127a059aa7b1b,2024-05-14T15:44:06.153000 CVE-2024-4574,0,0,313ec0d117ac92e67c29da349740abe9395db1d3208f8156cb88d417271721b1,2024-05-14T16:11:39.510000 CVE-2024-4575,0,0,6bded3a6c54fd2b7daead76b33ebe13f0b01e085cf3109c110abbf745910c26e,2024-05-24T01:15:30.977000 -CVE-2024-4577,0,1,ee0e462e52f20ce7c00b855e89905c35999748372fbdc5b1e876873916fd8077,2024-06-13T04:15:16.930000 +CVE-2024-4576,1,1,addc9cb761484b8b734274228582e88b764e477b8b8f402fd643cbf252c96540,2024-06-13T07:15:42.493000 +CVE-2024-4577,0,0,ee0e462e52f20ce7c00b855e89905c35999748372fbdc5b1e876873916fd8077,2024-06-13T04:15:16.930000 CVE-2024-4579,0,0,92215db7ae90e73ed5f9ed593ac042a14c345d9cfa9b9e96b650abf914d87abf,2024-05-14T15:44:07.607000 CVE-2024-4580,0,0,8eea2c6efcadf197a7eb186820cafc4d96f736bb0925ed6e0f257f524d44d971,2024-05-16T13:03:05.353000 CVE-2024-4581,0,0,76d80edc646ff1ece35896e94283319c4ca53356d1c75c256f7ea9adb85effeb,2024-06-04T16:57:41.053000 @@ -253414,6 +253421,7 @@ CVE-2024-5258,0,0,44dc29bb0ed4f47fbd56a17c4d4592048fc8f73fd8d93b1b1d7d82e5e8477e CVE-2024-5259,0,0,1133f2690684f5fa329a88cb6129c4f77126359850c2cd2c69369073dabe319e,2024-06-11T17:44:42.783000 CVE-2024-5262,0,0,9ac0e56dcac973bc4b8e5b6fa9933e9dd09a608d6b80fb71c1aa4404fea36f64,2024-06-11T17:18:50.600000 CVE-2024-5264,0,0,8231398a0715961af60c236587d7e9f037c5bc092ccd3f5680c73ce92c6726b7,2024-05-24T01:15:30.977000 +CVE-2024-5265,1,1,92a5deb76cc4b3b53750ab2f114d9628f893d38d5f57bd0e53bcf0c04fb42ba9,2024-06-13T07:15:42.700000 CVE-2024-5266,0,0,a73485b89a3550f54f49dc57546a4159224e3b808274771028cca2b826bd334b,2024-06-12T09:15:21.317000 CVE-2024-5267,0,0,56a46198c3e1065879dc87513ff3136ec5650c767fa2a117d737d28ecae53cf4,2024-06-07T14:56:05.647000 CVE-2024-5268,0,0,6c62d2c4f5ec7f076ad3a77daef4a605562ab9ff106410d5ae35773de78d45b5,2024-06-07T14:56:05.647000 @@ -253544,7 +253552,7 @@ CVE-2024-5439,0,0,d933d33f15def11b210f94c43e434fbcbcedf874aa4bf1c51db16a3b591b26 CVE-2024-5449,0,0,98f03fd41a859602711a787e6c6738ac5b4c6552335bab31c9f953ba2b79cc72,2024-06-06T14:17:35.017000 CVE-2024-5452,0,0,27a87c5d81b8c2c688ae4d039463a5b6ff5c5d7de26437cd334595b44d7597a4,2024-06-07T14:56:05.647000 CVE-2024-5453,0,0,f53a0f7c14e91f56fc73f4b75f7a3c7cc751f83b7f0078edb3a1d42587e45496,2024-06-11T17:34:52.263000 -CVE-2024-5458,0,1,280c02138e919e94dbbf1601703ec46acfb6deb4d1cb320c03863f40e695d8a3,2024-06-13T04:15:17.220000 +CVE-2024-5458,0,0,280c02138e919e94dbbf1601703ec46acfb6deb4d1cb320c03863f40e695d8a3,2024-06-13T04:15:17.220000 CVE-2024-5459,0,0,9ffec4e6ddf7de8eef808a13af7e4d67efb473b64a2ed4688c4272492e191c2e,2024-06-06T14:17:35.017000 CVE-2024-5463,0,0,a83ead02d534db419d64d9a246adc999062f3a690f2d2cbba14bffeb9debf0f5,2024-06-04T16:57:41.053000 CVE-2024-5468,0,0,1ddba53cba37dafe3b7dd317472a51e948d21f48a3101acc870c0cd6b5a97362,2024-06-12T09:15:21.910000 @@ -253599,7 +253607,7 @@ CVE-2024-5564,0,0,cd961630c6982ea90916e9cc290067a2c4a02a79292d87af6b0ec76760478c CVE-2024-5565,0,0,830316f5c713618fdad4a0eda5b7296c22d5d93c87a8813197db3ff9cf28c4ee,2024-05-31T19:14:47.793000 CVE-2024-5571,0,0,105c4e644019eeccf72c6e63813cdc36601b1b9a7e3cba5bc172df86631261e6,2024-06-11T17:29:03.277000 CVE-2024-5584,0,0,612eacfcf6c3fd3d6fdd0ff2c66e496cc817b02568ea9f69c40277bbc0300578,2024-06-11T13:54:12.057000 -CVE-2024-5585,0,1,7ca8acd7f48a83dc2f9c7f2dbf799bd4542c4abbbf9453c8a4fa401160a3a849,2024-06-13T04:15:17.407000 +CVE-2024-5585,0,0,7ca8acd7f48a83dc2f9c7f2dbf799bd4542c4abbbf9453c8a4fa401160a3a849,2024-06-13T04:15:17.407000 CVE-2024-5587,0,0,9180b0762a5a5a7a17ce70cd861bdf25e955d88caf903bee442f7c48a0a2a218,2024-06-03T14:46:24.250000 CVE-2024-5588,0,0,21589c4423d1fee081cb695dd8009f3bd5a36bd74dae1713c28449f0da1cd8d1,2024-06-04T19:21:10.267000 CVE-2024-5589,0,0,dc63c38434ce5bb089af0d0f8aa09f6a46f1fae34dd45c15f4542741dea047b7,2024-06-03T14:46:24.250000 @@ -253624,6 +253632,7 @@ CVE-2024-5654,0,0,07028f57aa6f824ef41630c48d024ed50edc65108f484063deba6656af8c1b CVE-2024-5656,0,0,e083352e0dae5ffd1e0b85e17866af8879714e6bce96a19b052b700442d7f3a1,2024-06-11T17:54:54.870000 CVE-2024-5657,0,0,223911cca93e713dc15810800584c4abe481e0e2143d3e3f3795c2d130280eb3,2024-06-11T17:40:47.823000 CVE-2024-5658,0,0,e420aa15660fefecd013eab0de4dee690ff0f155b141d8b1d4392a16606c7ad5,2024-06-11T18:21:52.377000 +CVE-2024-5661,1,1,6a2dd45e8fc7d5b14b278fbcc8ec1a3085392970a87a1948492f23392f86b031,2024-06-13T06:15:12.487000 CVE-2024-5663,0,0,4219cddf3fa8452b2da186321633b0e4bfa4880ecae3dd0c2b13763943bd6e8e,2024-06-10T02:52:08.267000 CVE-2024-5665,0,0,cf98b8118d31a45b868938fcf4b0239a4be77d7cb3995f06e552251067a9cecd,2024-06-11T17:47:45.033000 CVE-2024-5673,0,0,f6db27a8b7c99bb0a58922425d96edcb461eeb527f78adfd8d9aed9c99330140,2024-06-11T18:17:10.037000 @@ -253652,6 +253661,7 @@ CVE-2024-5734,0,0,42e64867c1cdebe5031caec9548ec6393cd9bc290658f317ad4788de56fd15 CVE-2024-5739,0,0,5773cc5124d6a6a0e954a481f5ce31fb721ea51c10912a509188eda9635d70a1,2024-06-12T09:15:22.820000 CVE-2024-5742,0,0,d09d1105fb5596a722b05fe43f0b05eb11b548e04093f54406c8e99009264b31,2024-06-12T09:15:23.037000 CVE-2024-5745,0,0,8788b99580d43fd9eb900afb700ee157c954d289b603d58451eabd57873852f0,2024-06-08T04:15:10.027000 +CVE-2024-5757,1,1,09c0420d08818b9c3be57a993dcffd3bf1e4bf8677620352222386a358b02ab3,2024-06-13T06:15:12.827000 CVE-2024-5758,0,0,60f3603833ce9f04e269788c1d2a3370191ec81ac34b615f7c4c140d7286ef3a,2024-06-10T02:52:08.267000 CVE-2024-5759,0,0,826729e04d02664132e22a6c7cc2d0756738f94f6ebbdeb3f8b7aba1ab3ed272,2024-06-12T16:15:12.550000 CVE-2024-5761,0,0,e0022a8d80317cd3941058bae14b514f68707790a5051038049a1d552ba8de69,2024-06-07T19:15:24.467000 @@ -253672,6 +253682,7 @@ CVE-2024-5782,0,0,1a8a2620a565d05a1a6c2c4c72d75648296e70bf5f89433612bbf40ebc42c7 CVE-2024-5783,0,0,e65b469aba92209e135f01d801ec2e7ebd41770aa11624b30224f43d98aec806,2024-06-12T08:15:51.480000 CVE-2024-5785,0,0,9826b5aaa33b29bbb943547624c099322eebf243c8fefca7bc1b316af4cf2a62,2024-06-10T18:06:22.600000 CVE-2024-5786,0,0,1f75ee06acd19f83f11a6972076ed1b01909c541516fb3c8be9392bde53f67b2,2024-06-10T18:06:22.600000 +CVE-2024-5787,1,1,75806dad4a25c4cd83a2ec0b5015ddbbed399162dda2f6d6fc67fc7f8f46164b,2024-06-13T06:15:13.430000 CVE-2024-5798,0,0,aa1945340d1a2bd8574699df8c7cfa4e55fa00a53bbb80a12adfe9c942c62599,2024-06-12T19:15:51.413000 CVE-2024-5812,0,0,d575f250532152186ae1730a95904983d1eeca8cedc4e48cf08c6f7cb36548d3,2024-06-11T16:15:29.207000 CVE-2024-5813,0,0,ce4a3354f5a4e16f73ac84191b89ae8910ac4de1cfa4c74cc4624e1e37872032,2024-06-11T16:15:29.480000 @@ -253700,7 +253711,7 @@ CVE-2024-5873,0,0,4affe4b1f71505ca05298a33c7e23c3ae147869580237755bed2d180fbea1b CVE-2024-5891,0,0,81d9f8b71bacc11f5dc360efb1b0d50499697611b49f365c1b4a23895b7163be,2024-06-12T14:15:12.460000 CVE-2024-5892,0,0,aedbf3b6ff4f72315e0710a5e0053eef0159f2cd6280fed23810bd46e4afaad4,2024-06-12T06:15:09.473000 CVE-2024-5893,0,0,cd1f2f9d3efdbd0714e6b0dba5c49856728a754e5fed4715d568602a6cc603d6,2024-06-12T19:15:51.630000 -CVE-2024-5894,0,0,8f7ec1489337d411e2e28ce8b660f7843f4993f287b7fda9e6988c83d775a8d1,2024-06-12T19:15:51.733000 +CVE-2024-5894,0,1,efa9a4faac09a34ca483908dc3ca5ab3ad3800902605766268e64aa3ca3f88e5,2024-06-13T06:15:14.033000 CVE-2024-5895,0,0,c8c8d0a698456f581dc50ddcae3df40710f596b434923fc8cb2c1d15b642163e,2024-06-12T18:15:12.850000 CVE-2024-5896,0,0,3ba518c4cbe886b53bc075aeb08f6187c1ef789e75ed11113a3676380d8f2841,2024-06-12T19:15:51.847000 CVE-2024-5897,0,0,89b5975ab4766dbf2e185cf099fc514ab6f8ef9de31b04cc139816ba074ae454,2024-06-12T20:15:13.893000