diff --git a/CVE-2024/CVE-2024-246xx/CVE-2024-24621.json b/CVE-2024/CVE-2024-246xx/CVE-2024-24621.json new file mode 100644 index 00000000000..46eddfa409d --- /dev/null +++ b/CVE-2024/CVE-2024-246xx/CVE-2024-24621.json @@ -0,0 +1,81 @@ +{ + "id": "CVE-2024-24621", + "sourceIdentifier": "disclosures@exodusintel.com", + "published": "2024-07-25T22:15:05.230", + "lastModified": "2024-07-25T22:15:05.230", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Softaculous Webuzo contains an authentication bypass vulnerability through the password reset functionality. Remote, anonymous attackers can exploit this vulnerability to gain full server access as the root user." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "disclosures@exodusintel.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ], + "cvssMetricV2": [ + { + "source": "disclosures@exodusintel.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "NONE", + "confidentialityImpact": "COMPLETE", + "integrityImpact": "COMPLETE", + "availabilityImpact": "COMPLETE", + "baseScore": 10.0 + }, + "baseSeverity": "HIGH", + "exploitabilityScore": 10.0, + "impactScore": 10.0, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "disclosures@exodusintel.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-697" + } + ] + } + ], + "references": [ + { + "url": "https://blog.exodusintel.com/2024/07/25/softaculous-webuzo-authentication-bypass/", + "source": "disclosures@exodusintel.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-246xx/CVE-2024-24622.json b/CVE-2024/CVE-2024-246xx/CVE-2024-24622.json new file mode 100644 index 00000000000..f538d689121 --- /dev/null +++ b/CVE-2024/CVE-2024-246xx/CVE-2024-24622.json @@ -0,0 +1,81 @@ +{ + "id": "CVE-2024-24622", + "sourceIdentifier": "disclosures@exodusintel.com", + "published": "2024-07-25T22:15:05.497", + "lastModified": "2024-07-25T22:15:05.497", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Softaculous Webuzo contains a command injection in the password reset functionality. A remote, authenticated attacker can exploit this vulnerability to gain code execution on the system." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "disclosures@exodusintel.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ], + "cvssMetricV2": [ + { + "source": "disclosures@exodusintel.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C", + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "SINGLE", + "confidentialityImpact": "COMPLETE", + "integrityImpact": "COMPLETE", + "availabilityImpact": "COMPLETE", + "baseScore": 9.0 + }, + "baseSeverity": "HIGH", + "exploitabilityScore": 8.0, + "impactScore": 10.0, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "disclosures@exodusintel.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-78" + } + ] + } + ], + "references": [ + { + "url": "https://blog.exodusintel.com/2024/07/24/softaculous-webuzo-password-reset-command-injection/", + "source": "disclosures@exodusintel.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-246xx/CVE-2024-24623.json b/CVE-2024/CVE-2024-246xx/CVE-2024-24623.json new file mode 100644 index 00000000000..3c7e852326a --- /dev/null +++ b/CVE-2024/CVE-2024-246xx/CVE-2024-24623.json @@ -0,0 +1,88 @@ +{ + "id": "CVE-2024-24623", + "sourceIdentifier": "disclosures@exodusintel.com", + "published": "2024-07-25T22:15:05.767", + "lastModified": "2024-07-25T22:15:05.767", + "vulnStatus": "Received", + "cveTags": [ + { + "sourceIdentifier": "disclosures@exodusintel.com", + "tags": [ + "unsupported-when-assigned" + ] + } + ], + "descriptions": [ + { + "lang": "en", + "value": "Softaculous Webuzo contains a command injection vulnerability in the FTP management functionality. A remote, authenticated attacker can exploit this vulnerability to gain code execution on the system." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "disclosures@exodusintel.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ], + "cvssMetricV2": [ + { + "source": "disclosures@exodusintel.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C", + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "SINGLE", + "confidentialityImpact": "COMPLETE", + "integrityImpact": "COMPLETE", + "availabilityImpact": "COMPLETE", + "baseScore": 9.0 + }, + "baseSeverity": "HIGH", + "exploitabilityScore": 8.0, + "impactScore": 10.0, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "disclosures@exodusintel.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-78" + } + ] + } + ], + "references": [ + { + "url": "https://blog.exodusintel.com/2024/07/25/softaculous-webuzo-ftp-management-command-injection/", + "source": "disclosures@exodusintel.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-381xx/CVE-2024-38103.json b/CVE-2024/CVE-2024-381xx/CVE-2024-38103.json new file mode 100644 index 00000000000..0baa29ee580 --- /dev/null +++ b/CVE-2024/CVE-2024-381xx/CVE-2024-38103.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-38103", + "sourceIdentifier": "secure@microsoft.com", + "published": "2024-07-25T22:15:08.280", + "lastModified": "2024-07-25T22:15:08.280", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Microsoft Edge (Chromium-based) Information Disclosure Vulnerability" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.9, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.6, + "impactScore": 4.2 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-359" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38103", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-381xx/CVE-2024-38164.json b/CVE-2024/CVE-2024-381xx/CVE-2024-38164.json index 7515c761b4e..ff5d899cb7c 100644 --- a/CVE-2024/CVE-2024-381xx/CVE-2024-38164.json +++ b/CVE-2024/CVE-2024-381xx/CVE-2024-38164.json @@ -2,7 +2,7 @@ "id": "CVE-2024-38164", "sourceIdentifier": "secure@microsoft.com", "published": "2024-07-23T22:15:08.420", - "lastModified": "2024-07-25T04:15:05.433", + "lastModified": "2024-07-25T22:15:08.627", "vulnStatus": "Awaiting Analysis", "cveTags": [ { @@ -15,7 +15,7 @@ "descriptions": [ { "lang": "en", - "value": "An improper access control vulnerability in GroupMe allows an a unauthenticated attacker to elevate privileges over a network by convincing a user to click on a malicious link.\n" + "value": "An improper access control vulnerability in GroupMe allows an a unauthenticated attacker to elevate privileges over a network by convincing a user to click on a malicious link." }, { "lang": "es", diff --git a/CVE-2024/CVE-2024-381xx/CVE-2024-38176.json b/CVE-2024/CVE-2024-381xx/CVE-2024-38176.json index f802ef5a8d2..8f2a404560d 100644 --- a/CVE-2024/CVE-2024-381xx/CVE-2024-38176.json +++ b/CVE-2024/CVE-2024-381xx/CVE-2024-38176.json @@ -2,7 +2,7 @@ "id": "CVE-2024-38176", "sourceIdentifier": "secure@microsoft.com", "published": "2024-07-23T22:15:08.660", - "lastModified": "2024-07-25T04:15:05.560", + "lastModified": "2024-07-25T22:15:08.733", "vulnStatus": "Awaiting Analysis", "cveTags": [ { @@ -15,7 +15,7 @@ "descriptions": [ { "lang": "en", - "value": "An improper restriction of excessive authentication attempts in GroupMe allows a unauthenticated attacker to elevate privileges over a network.\n" + "value": "An improper restriction of excessive authentication attempts in GroupMe allows a unauthenticated attacker to elevate privileges over a network." }, { "lang": "es", diff --git a/CVE-2024/CVE-2024-390xx/CVE-2024-39031.json b/CVE-2024/CVE-2024-390xx/CVE-2024-39031.json index b209e882069..6fd9cd2b324 100644 --- a/CVE-2024/CVE-2024-390xx/CVE-2024-39031.json +++ b/CVE-2024/CVE-2024-390xx/CVE-2024-39031.json @@ -2,13 +2,13 @@ "id": "CVE-2024-39031", "sourceIdentifier": "cve@mitre.org", "published": "2024-07-09T21:15:15.147", - "lastModified": "2024-07-12T16:11:49.347", + "lastModified": "2024-07-25T22:15:08.837", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", - "value": "In Silverpeas Core <= 6.3.5, inside of mes agendas a user can create a new event and add it to his calendar. The user can also add other users to the event from the same domain, including administrator. A normal user can create an event with XSS payload inside \u201cTitre\u201d and \u201cDescription\u201d parameters and add the administrator or any user to the event. When the other user (victim) visits his own profile (even without clicking on the event) the payload will be executed on the victim side." + "value": "In Silverpeas Core <= 6.3.5, in Mes Agendas, a user can create new events and add them to their calendar. Additionally, users can invite others from the same domain, including administrators, to these events. A standard user can inject an XSS payload into the \"Titre\" and \"Description\" fields when creating an event and then add the administrator or any user to the event. When the invited user (victim) views their own profile, the payload will be executed on their side, even if they do not click on the event." }, { "lang": "es", diff --git a/CVE-2024/CVE-2024-39xx/CVE-2024-3938.json b/CVE-2024/CVE-2024-39xx/CVE-2024-3938.json new file mode 100644 index 00000000000..18cd979c1dd --- /dev/null +++ b/CVE-2024/CVE-2024-39xx/CVE-2024-3938.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-3938", + "sourceIdentifier": "security@dotcms.com", + "published": "2024-07-25T22:15:08.903", + "lastModified": "2024-07-25T22:15:08.903", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "The \"reset password\" login page accepted an HTML injection via URL parameters.\n\nThis has already been rectified via patch, and as such it cannot be demonstrated via Demo site link. Those interested to see the vulnerability may spin up a http://localhost:8082/dotAdmin/#/public/login?resetEmailSent=true&resetEmail=%3Ch1%3E%3Ca%20href%3D%22https:%2F%2Fgoogle.com%22%3ECLICK%20ME%3C%2Fa%3E%3C%2Fh1%3E \n\nThis will result in a view along these lines:\n\n\n\n\n\n * OWASP Top 10 - A03: Injection\n * CVSS Score: 5.4\n * AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N https://nvd.nist.gov/vuln-metrics/cvss/v3-calculator \n * https://nvd.nist.gov/vuln-metrics/cvss/v3-calculator?vector=AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N&... https://nvd.nist.gov/vuln-metrics/cvss/v3-calculator" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security@dotcms.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.5 + } + ] + }, + "weaknesses": [ + { + "source": "security@dotcms.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-20" + } + ] + } + ], + "references": [ + { + "url": "https://auth.dotcms.com/security/SI-71", + "source": "security@dotcms.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-414xx/CVE-2024-41468.json b/CVE-2024/CVE-2024-414xx/CVE-2024-41468.json new file mode 100644 index 00000000000..5c9576907d4 --- /dev/null +++ b/CVE-2024/CVE-2024-414xx/CVE-2024-41468.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2024-41468", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-07-25T22:15:09.113", + "lastModified": "2024-07-25T22:15:09.113", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Tenda FH1201 v1.2.0.14 was discovered to contain a command injection vulnerability via the cmdinput parameter at /goform/exeCommand" + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/iotresearch/iot-vuln/blob/main/Tenda/FH1201/exeCommand/README.md", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-414xx/CVE-2024-41473.json b/CVE-2024/CVE-2024-414xx/CVE-2024-41473.json new file mode 100644 index 00000000000..652704d502a --- /dev/null +++ b/CVE-2024/CVE-2024-414xx/CVE-2024-41473.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2024-41473", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-07-25T22:15:09.177", + "lastModified": "2024-07-25T22:15:09.177", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Tenda FH1201 v1.2.0.14 was discovered to contain a command injection vulnerability via the mac parameter at ip/goform/WriteFacMac" + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/iotresearch/iot-vuln/tree/main/Tenda/FH1201/WriteFacMac", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/README.md b/README.md index 5154b41ed63..b4b579ee44b 100644 --- a/README.md +++ b/README.md @@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2024-07-25T22:00:17.296729+00:00 +2024-07-25T23:55:17.014307+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2024-07-25T21:15:12.090000+00:00 +2024-07-25T22:15:09.177000+00:00 ``` ### Last Data Feed Release @@ -33,45 +33,29 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### Total Number of included CVEs ```plain -257979 +257986 ``` ### CVEs added in the last Commit -Recently added CVEs: `11` +Recently added CVEs: `7` -- [CVE-2024-29068](CVE-2024/CVE-2024-290xx/CVE-2024-29068.json) (`2024-07-25T20:15:04.280`) -- [CVE-2024-29069](CVE-2024/CVE-2024-290xx/CVE-2024-29069.json) (`2024-07-25T20:15:04.483`) -- [CVE-2024-38287](CVE-2024/CVE-2024-382xx/CVE-2024-38287.json) (`2024-07-25T20:15:04.887`) -- [CVE-2024-38288](CVE-2024/CVE-2024-382xx/CVE-2024-38288.json) (`2024-07-25T20:15:04.953`) -- [CVE-2024-38289](CVE-2024/CVE-2024-382xx/CVE-2024-38289.json) (`2024-07-25T20:15:05.017`) -- [CVE-2024-40324](CVE-2024/CVE-2024-403xx/CVE-2024-40324.json) (`2024-07-25T20:15:05.077`) -- [CVE-2024-41808](CVE-2024/CVE-2024-418xx/CVE-2024-41808.json) (`2024-07-25T20:15:05.153`) -- [CVE-2024-41809](CVE-2024/CVE-2024-418xx/CVE-2024-41809.json) (`2024-07-25T21:15:11.310`) -- [CVE-2024-6558](CVE-2024/CVE-2024-65xx/CVE-2024-6558.json) (`2024-07-25T20:15:05.360`) -- [CVE-2024-7105](CVE-2024/CVE-2024-71xx/CVE-2024-7105.json) (`2024-07-25T21:15:11.790`) -- [CVE-2024-7106](CVE-2024/CVE-2024-71xx/CVE-2024-7106.json) (`2024-07-25T21:15:12.090`) +- [CVE-2024-24621](CVE-2024/CVE-2024-246xx/CVE-2024-24621.json) (`2024-07-25T22:15:05.230`) +- [CVE-2024-24622](CVE-2024/CVE-2024-246xx/CVE-2024-24622.json) (`2024-07-25T22:15:05.497`) +- [CVE-2024-24623](CVE-2024/CVE-2024-246xx/CVE-2024-24623.json) (`2024-07-25T22:15:05.767`) +- [CVE-2024-38103](CVE-2024/CVE-2024-381xx/CVE-2024-38103.json) (`2024-07-25T22:15:08.280`) +- [CVE-2024-3938](CVE-2024/CVE-2024-39xx/CVE-2024-3938.json) (`2024-07-25T22:15:08.903`) +- [CVE-2024-41468](CVE-2024/CVE-2024-414xx/CVE-2024-41468.json) (`2024-07-25T22:15:09.113`) +- [CVE-2024-41473](CVE-2024/CVE-2024-414xx/CVE-2024-41473.json) (`2024-07-25T22:15:09.177`) ### CVEs modified in the last Commit -Recently modified CVEs: `15` +Recently modified CVEs: `3` -- [CVE-2024-1023](CVE-2024/CVE-2024-10xx/CVE-2024-1023.json) (`2024-07-25T21:15:10.280`) -- [CVE-2024-1300](CVE-2024/CVE-2024-13xx/CVE-2024-1300.json) (`2024-07-25T21:15:10.487`) -- [CVE-2024-1724](CVE-2024/CVE-2024-17xx/CVE-2024-1724.json) (`2024-07-25T20:15:03.800`) -- [CVE-2024-2700](CVE-2024/CVE-2024-27xx/CVE-2024-2700.json) (`2024-07-25T21:15:10.930`) -- [CVE-2024-3164](CVE-2024/CVE-2024-31xx/CVE-2024-3164.json) (`2024-07-25T21:15:11.093`) -- [CVE-2024-3165](CVE-2024/CVE-2024-31xx/CVE-2024-3165.json) (`2024-07-25T21:15:11.210`) -- [CVE-2024-37037](CVE-2024/CVE-2024-370xx/CVE-2024-37037.json) (`2024-07-25T20:25:41.760`) -- [CVE-2024-37038](CVE-2024/CVE-2024-370xx/CVE-2024-37038.json) (`2024-07-25T20:25:10.287`) -- [CVE-2024-37039](CVE-2024/CVE-2024-370xx/CVE-2024-37039.json) (`2024-07-25T20:21:56.307`) -- [CVE-2024-37040](CVE-2024/CVE-2024-370xx/CVE-2024-37040.json) (`2024-07-25T20:17:38.113`) -- [CVE-2024-37878](CVE-2024/CVE-2024-378xx/CVE-2024-37878.json) (`2024-07-25T20:16:31.443`) -- [CVE-2024-5557](CVE-2024/CVE-2024-55xx/CVE-2024-5557.json) (`2024-07-25T20:00:46.653`) -- [CVE-2024-5558](CVE-2024/CVE-2024-55xx/CVE-2024-5558.json) (`2024-07-25T20:00:25.773`) -- [CVE-2024-5971](CVE-2024/CVE-2024-59xx/CVE-2024-5971.json) (`2024-07-25T21:15:11.560`) -- [CVE-2024-6162](CVE-2024/CVE-2024-61xx/CVE-2024-6162.json) (`2024-07-25T21:15:11.677`) +- [CVE-2024-38164](CVE-2024/CVE-2024-381xx/CVE-2024-38164.json) (`2024-07-25T22:15:08.627`) +- [CVE-2024-38176](CVE-2024/CVE-2024-381xx/CVE-2024-38176.json) (`2024-07-25T22:15:08.733`) +- [CVE-2024-39031](CVE-2024/CVE-2024-390xx/CVE-2024-39031.json) (`2024-07-25T22:15:08.837`) ## Download and Usage diff --git a/_state.csv b/_state.csv index ceb699184d2..2dcd0b3159e 100644 --- a/_state.csv +++ b/_state.csv @@ -241726,7 +241726,7 @@ CVE-2024-1019,0,0,9d34fb91efb6a448073ac765944da7eab7ec7fd07c6fef378639c859599f68 CVE-2024-1020,0,0,d848db5207b830f092dac5463c394c0f65f6423556f55d15e70d177c797c2de1,2024-05-17T02:35:10.867000 CVE-2024-1021,0,0,89180a6ed9705fc79d8d8a15633a1cfe9e27adac2a4a623501249d49427826d0,2024-05-17T02:35:10.970000 CVE-2024-1022,0,0,f42eaa1b302319f7e3148377e0522c31bf6c16d407215c446c1d3f1b55b4debd,2024-05-17T02:35:11.070000 -CVE-2024-1023,0,1,8d9bd157d13575cb2f7284ebb3a2797f2b531ebc1f530e248b6a4889677c4116,2024-07-25T21:15:10.280000 +CVE-2024-1023,0,0,8d9bd157d13575cb2f7284ebb3a2797f2b531ebc1f530e248b6a4889677c4116,2024-07-25T21:15:10.280000 CVE-2024-1024,0,0,d47b3d3840cd70db883d335219cea52b6b4fa0e3fdfc3f4d41efc4b833dff6a1,2024-05-17T02:35:11.210000 CVE-2024-1026,0,0,e127bb5d00442b36eed0e6ff6513a3a42c45706876a3a5f2167365447fb898e7,2024-05-17T02:35:11.320000 CVE-2024-1027,0,0,7cdd04f65f65ce162dee4b0e860b968e4c1a6b7f21d53e978519c8259363a858,2024-05-17T02:35:11.427000 @@ -241983,7 +241983,7 @@ CVE-2024-1296,0,0,cf8635aadac748620898188ca490946b2b5c75731feefb613195ade4e01744 CVE-2024-1297,0,0,99ab590c2d129ba188fde6f8a07a02c34afd396d53204b7be1878740241d5dfb,2024-02-20T19:50:53.960000 CVE-2024-1298,0,0,411af97e2820bfadb11b2eaf3380004504a4d88488591f09c66407ba8874f33d,2024-06-11T04:15:12.513000 CVE-2024-1299,0,0,47b1727e0acd46e63ac49556a737ccf9de95f19131e73e34450b5faaae9b9bfd,2024-03-07T13:52:27.110000 -CVE-2024-1300,0,1,d4f7e8e6b5ac6bd63760d8d777a219ba0fe706357403260381b501f5799316c3,2024-07-25T21:15:10.487000 +CVE-2024-1300,0,0,d4f7e8e6b5ac6bd63760d8d777a219ba0fe706357403260381b501f5799316c3,2024-07-25T21:15:10.487000 CVE-2024-1301,0,0,aa9dff2d1f94038a5640d7365d0f71bbab0e502e1b3edb9e0b65d34a36d4daa7,2024-03-12T17:46:17.273000 CVE-2024-1302,0,0,e9f787047b014f4b6f30daaa3fa30820f8e27de1e4755915987ac5c6f51ec22f,2024-03-12T17:46:17.273000 CVE-2024-1303,0,0,7938284658534aa4f8cce7112905f213924253ddbfc659d61385595a0a46a57b,2024-03-12T17:46:17.273000 @@ -242368,7 +242368,7 @@ CVE-2024-1720,0,0,5f5ab364680f73fe36cdeef9e6784cd2a2ccddac9910224dc8b02d12bed9bd CVE-2024-1721,0,0,eb5f51f53eea8230bc7c9cfdc8a49e9ff2dfc7003ac468e860d0250fb679c030,2024-05-21T16:53:56.550000 CVE-2024-1722,0,0,42b1784fafcdd32cd3de080a0db388e459b3fea8e17fa87d175294bba4e974fc,2024-02-29T13:49:29.390000 CVE-2024-1723,0,0,94af9097193d9313a869e27fb9b3b59f6506dae8c000210c296f13f3a745bbf6,2024-03-13T18:15:58.530000 -CVE-2024-1724,0,1,fa0a947287b9dc29fbda5db7ec6cdee88bf657d98e8214ff142d41554a8a99af,2024-07-25T20:15:03.800000 +CVE-2024-1724,0,0,fa0a947287b9dc29fbda5db7ec6cdee88bf657d98e8214ff142d41554a8a99af,2024-07-25T20:15:03.800000 CVE-2024-1725,0,0,0ee3e786fc3a6bde6a8ff18d77d971ec6a662811131e618f86487e4ea98156f8,2024-05-08T02:15:09.067000 CVE-2024-1726,0,0,bc2267887b9a57c4c91a15f093198e5713873bada3d866b94302e1c02f97e158,2024-04-25T17:24:59.967000 CVE-2024-1727,0,0,3ffad474a6b8688c8928b9908a66b725cdd6c054eaeb3d886c89c54b8393df58,2024-04-16T12:15:09.843000 @@ -245553,6 +245553,9 @@ CVE-2024-24595,0,0,60cbf43b4ffe16980edf9f066ee72877675697740095e8bc5fd2b97074fae CVE-2024-2460,0,0,ae8df8f819284d0f0ea1a2589261357f393234fec195be42118065d37d02123d,2024-03-20T13:00:16.367000 CVE-2024-2461,0,0,3675df79bf0e67837aabf4aba26445efc39c7438e724314f5cb2e5a06114ad47,2024-06-11T13:54:12.057000 CVE-2024-2462,0,0,c2850c2db0d510188371f385966a118a20022451062b0469e11f70aee3c15934,2024-06-11T13:54:12.057000 +CVE-2024-24621,1,1,025b1c8784b423fa54b9f8e0b3e122e89efb6ca01659b665506347f8882601be,2024-07-25T22:15:05.230000 +CVE-2024-24622,1,1,23f97dabe6bed621318bb16126e7b3485766f34df04c75b625744666017b2395,2024-07-25T22:15:05.497000 +CVE-2024-24623,1,1,74c00c3d98273ab2ac408fcf11a38b9046f70d78e27678130503176a38450c42,2024-07-25T22:15:05.767000 CVE-2024-2463,0,0,24deeeee766ad4a5a7424dba127cb4cbbe9e946086a31f7db9b5902aa6111178,2024-03-21T15:24:35.093000 CVE-2024-2464,0,0,5ff7c9aac18d394d4849e149117cdc80dedc6fee12e8baf9893132cc38ce131f,2024-03-21T15:24:35.093000 CVE-2024-2465,0,0,6230da2d3a7d355f9109bcbe86ce790145cd318aa89b33fca16121fe02380d5a,2024-03-21T15:24:35.093000 @@ -247323,7 +247326,7 @@ CVE-2024-26996,0,0,f13300a99169a38a9b0787aa8393009120551c7b98f04ab9b92ca6acb9849 CVE-2024-26997,0,0,454540311fe5335a43e8980f30eaa156ee7f28db2700fe42f0a36241f9986681,2024-06-27T13:15:57.663000 CVE-2024-26998,0,0,281e6eb4c5d981f1fcef4f88265ed667d32fc924df201ebf7684cb9f100b10a0,2024-05-13T08:15:11.390000 CVE-2024-26999,0,0,746a041d0b57a0dac118a92c96e95bc625975348006bc70154dba37cf11624b7,2024-06-25T23:15:28.903000 -CVE-2024-2700,0,1,82a9c51beca27476b54a2bd6859e19dcee4c316356467ebff59d9bbcce1bfea0,2024-07-25T21:15:10.930000 +CVE-2024-2700,0,0,82a9c51beca27476b54a2bd6859e19dcee4c316356467ebff59d9bbcce1bfea0,2024-07-25T21:15:10.930000 CVE-2024-27000,0,0,a188327baa92543e9233de18ad4a972a4d9ab817448115f3501854ba860d8fd9,2024-06-25T23:15:29.003000 CVE-2024-27001,0,0,183600c577d9122077ec4624ba5f391c6d325c24bd29b2ddb007399d500a2963,2024-06-27T12:15:23.673000 CVE-2024-27002,0,0,996c4b76277c18891f74138faebaa5ccbc6a3dccb26df3f871e3eed2ae04779f,2024-05-13T08:15:11.473000 @@ -248730,8 +248733,8 @@ CVE-2024-29062,0,0,fd7e4b3c77dd4d50570502e9a76290b7938f32ddd5cdd5d39cf2ed3ca2452 CVE-2024-29063,0,0,a8033ce9e699f35cb65dc8d63268bfdd99aa16f594ad08413d90e8003a22bf2e,2024-04-10T13:24:00.070000 CVE-2024-29064,0,0,88daf3a7de89b464600feb0ee044529e05b02bc2ba2ebf4683d236ef22e3a252,2024-04-10T13:24:00.070000 CVE-2024-29066,0,0,b57916d53c87b911e1996a4619a92f6e3a854e8931117c8efeb51360c73379e4,2024-04-10T13:24:00.070000 -CVE-2024-29068,1,1,9e125f91bac5a4be7be32d099461d1eb38ac8191a4502dfeedca5349a30bbf1f,2024-07-25T20:15:04.280000 -CVE-2024-29069,1,1,69616911bddd6cd929e9d8f7c1354809115585b17ed50dc9f1fd8b40d1ffbbe7,2024-07-25T20:15:04.483000 +CVE-2024-29068,0,0,9e125f91bac5a4be7be32d099461d1eb38ac8191a4502dfeedca5349a30bbf1f,2024-07-25T20:15:04.280000 +CVE-2024-29069,0,0,69616911bddd6cd929e9d8f7c1354809115585b17ed50dc9f1fd8b40d1ffbbe7,2024-07-25T20:15:04.483000 CVE-2024-2907,0,0,bd4e59455721fd47a3f3bf4cc54009a430bac090133efd0393d311456e4d173d,2024-04-25T13:18:13.537000 CVE-2024-29070,0,0,9bb8fc70fcc7f2f8368c3f24ea4c3b75c88f99fe4e019835c530d2dc358d46c3,2024-07-24T12:55:13.223000 CVE-2024-29071,0,0,06a4c013d7966a06671f5afa3de9f823a9a7634e70711b0ea0f16d92c424f917,2024-03-25T13:47:14.087000 @@ -250517,10 +250520,10 @@ CVE-2024-31630,0,0,2bd16e3fcef7bda0b7ed937f45148dde60c59ea9d09224ef4dc76dc8aeb1e CVE-2024-31631,0,0,189299e833a9bdec5625f34c9b7af7b60646f6c7b2cd4586dea999ec400d5e00,2024-06-05T17:15:13.130000 CVE-2024-31634,0,0,cd6336332928e139372eaeb7f2fa7bd12555d147721492304ddeef71595ef37a,2024-04-16T13:24:07.103000 CVE-2024-31636,0,0,5030ab945dd9e3d071b87a4da035a97defc5897507c6002a20e31f1008a32478,2024-07-03T01:55:16.580000 -CVE-2024-3164,0,1,78a15a52bf4f552a7d70fc64367124c5316febc749d2958d692ae8e41e90e236,2024-07-25T21:15:11.093000 +CVE-2024-3164,0,0,78a15a52bf4f552a7d70fc64367124c5316febc749d2958d692ae8e41e90e236,2024-07-25T21:15:11.093000 CVE-2024-31648,0,0,2922cc98178cad367ce9967a9bb0554e38b9bf3f7eeaabe3324ef2b9c342145f,2024-04-16T13:24:07.103000 CVE-2024-31649,0,0,4e97e11dec1d0224f80d5fc46b087ead4bd3503ddd935380e84b5c378f32db60,2024-04-16T13:24:07.103000 -CVE-2024-3165,0,1,5d4125192eb880f8e0f62f3292900a808b3e92403c0986cb3fe4084513fabf17,2024-07-25T21:15:11.210000 +CVE-2024-3165,0,0,5d4125192eb880f8e0f62f3292900a808b3e92403c0986cb3fe4084513fabf17,2024-07-25T21:15:11.210000 CVE-2024-31650,0,0,f91457293ffe9951d31a570db1b9cb5f0c4dfb9ffa5e388dc3d2c34a75979925,2024-07-03T01:55:17.350000 CVE-2024-31651,0,0,2f1b682345eecb1fdf8666f197b953cac229ba6b6b34d2f7c287258788c8508c,2024-04-16T13:24:07.103000 CVE-2024-31652,0,0,2f3d2336fbc8f42d1dec7a1682c8c016320ebabd666e8e526baaf0f45acfa966,2024-04-16T13:24:07.103000 @@ -253958,11 +253961,11 @@ CVE-2024-37030,0,0,229fd4bf632e5359976e983ea5a913e4683537817839ea114ee982b3925f6 CVE-2024-37031,0,0,82ddf62a2a657c3d311c62178fe12d95bbdde7904d2439de7382b7f0bb38049e,2024-06-03T14:46:24.250000 CVE-2024-37032,0,0,beeaa82ce4e7adb7aae5c7f769a38fdec94afd87f3fb4ab76e8b43cd58eb538b,2024-07-15T22:15:02.747000 CVE-2024-37036,0,0,2b54af7dc068612b23a8155f4d9bf9df74610908e0974df8f03646c9dd55441d,2024-06-13T18:36:09.010000 -CVE-2024-37037,0,1,2437fc027a38caf4d1fff40b3a10b943bdb8be9b58eab07857b1bc1c0eca008e,2024-07-25T20:25:41.760000 -CVE-2024-37038,0,1,b6a592cdbbef388e98cb8a181a98f43993dd04af5a29282f5a8621e285e63d4d,2024-07-25T20:25:10.287000 -CVE-2024-37039,0,1,427e29014ccfdee6c0a0efce1d2857c8c66aa8f2c91b25d4776461240ebe8e01,2024-07-25T20:21:56.307000 +CVE-2024-37037,0,0,2437fc027a38caf4d1fff40b3a10b943bdb8be9b58eab07857b1bc1c0eca008e,2024-07-25T20:25:41.760000 +CVE-2024-37038,0,0,b6a592cdbbef388e98cb8a181a98f43993dd04af5a29282f5a8621e285e63d4d,2024-07-25T20:25:10.287000 +CVE-2024-37039,0,0,427e29014ccfdee6c0a0efce1d2857c8c66aa8f2c91b25d4776461240ebe8e01,2024-07-25T20:21:56.307000 CVE-2024-3704,0,0,8d8edf31fe712d750bd16cd71638ddaccdd4a68add8e16c5c76ca7518cd53211,2024-07-05T13:15:10.640000 -CVE-2024-37040,0,1,1bbfae07a817bfde05104c14dbae87acc906b9fb8985fe0f6499e654b7c74082,2024-07-25T20:17:38.113000 +CVE-2024-37040,0,0,1bbfae07a817bfde05104c14dbae87acc906b9fb8985fe0f6499e654b7c74082,2024-07-25T20:17:38.113000 CVE-2024-3705,0,0,7ec4cc9508fbe16d598471acb12ef9f10887cd89a6e60f8556987a083d32e53c,2024-07-05T13:15:10.820000 CVE-2024-37051,0,0,3268b708226eb5bd758bffa3ca599641a98a9df6a73ccfb261433e9cd20679e2,2024-07-05T16:15:04.777000 CVE-2024-37052,0,0,8c2ce45e1a917627156fb6f5798d593e2b2d38bf19b709592434b7d7f927dfe3,2024-06-04T16:57:41.053000 @@ -254447,7 +254450,7 @@ CVE-2024-37871,0,0,6e47b0e50b0d49ee0ab3ce3931de2ff879ddb6bce80a9c8a17ef14f992b7b CVE-2024-37872,0,0,55b4403e334cb9996013bbf0a392a1a97f30dd72376b633dd5dca32256bf5ac9,2024-07-12T16:11:44.030000 CVE-2024-37873,0,0,55d4998aa453b15b9f1f9084f8c693113fcb670dbe4b4a10f682ad8eb96cb8e0,2024-07-11T13:06:13.187000 CVE-2024-37877,0,0,98d87856290ef25573ad2760a197255731eca0e52a46652b56e8c7a7e059ade2,2024-06-13T18:35:19.777000 -CVE-2024-37878,0,1,fa121d6a32fa8cd93ec07420dccbfe683ad3a2717d3c26dc1f429f81b82f82de,2024-07-25T20:16:31.443000 +CVE-2024-37878,0,0,fa121d6a32fa8cd93ec07420dccbfe683ad3a2717d3c26dc1f429f81b82f82de,2024-07-25T20:16:31.443000 CVE-2024-3788,0,0,6b959b24977bfe93124701dc390076a86010e99d87dbe3186e4044d17a0dbe72,2024-05-14T16:11:39.510000 CVE-2024-37880,0,0,82eff4be44645b4491042424f1f050de41161f24ce7895f2d65362440f2e1175,2024-06-12T16:30:15.053000 CVE-2024-37881,0,0,fafe084cbebf486f837ec15aad94ff51628af0624cdbbaa015b3cc71821530aa,2024-06-20T12:44:01.637000 @@ -254616,6 +254619,7 @@ CVE-2024-3810,0,0,4b9c7ead6ab7332e33f083e2f6cd125d9bb6a7d7cb025550c9e1df7b290846 CVE-2024-38100,0,0,362baa65b60907783f71ef535888ecc651c6a6f88d46ab2740373fbba12147fc,2024-07-11T18:23:21.183000 CVE-2024-38101,0,0,3184ee552caeb588c360c81315ee0416a9266764a3a583623a630f5c0b87dc6d,2024-07-11T18:23:05.597000 CVE-2024-38102,0,0,b8f3bed70811e842b10b0e44e049aa13327d439097a470d245182f818341d462,2024-07-11T18:33:01.643000 +CVE-2024-38103,1,1,4ad136957cd72fb1c25365dbe2784f9fd1a2a0e75d8638769f81ec9e3770998e,2024-07-25T22:15:08.280000 CVE-2024-38104,0,0,934543cd72c92227418f82cc6731b22a50ac357f374ae5c93a97a0b40688cfaa,2024-07-11T18:32:06.187000 CVE-2024-38105,0,0,5ee7b6bcc3f23b6c027ef1e20204ab9e08d3961eefc81a59082038a3ba1cd79b,2024-07-11T18:31:05.480000 CVE-2024-3811,0,0,7753fbebaa8d958ade5ff525a0ab8fa28bb6d42c662f58346b2bf00c9a2b2418,2024-05-20T13:00:34.807000 @@ -254626,9 +254630,9 @@ CVE-2024-3814,0,0,af559420ce1e3044689136ce469515a498db3d8c3f527cd805c49729f88c5c CVE-2024-3815,0,0,b8c8a85ee4e0df355cab9e3d8b72a412d3d9d1a29cf1232bd66e69ecee9ede27,2024-06-17T12:42:04.623000 CVE-2024-38156,0,0,b24436c85d01ced9aa10bffdcc3048064061e2106e9f06caaac14532dc6e9f6d,2024-07-19T13:01:44.567000 CVE-2024-3816,0,0,ca9c8b3746ea2ebbbc383e9aa135dd99550dbafdbe5ff9c69dbe15b33a0feabf,2024-07-03T14:37:07.750000 -CVE-2024-38164,0,0,e7eb1a1db4412ff9b61d5b019cb40685089c40e6befcdf888fce1298b753ce47,2024-07-25T04:15:05.433000 +CVE-2024-38164,0,1,de24b1c2c8757d5ae4c896b258769cf2baacb10454b223d2f886551ad476cc25,2024-07-25T22:15:08.627000 CVE-2024-3817,0,0,4cefb34eb15d4ef81a2470a00ac0f43601ef6263c0fd4425e7542c27d02dfa54,2024-04-18T13:04:28.900000 -CVE-2024-38176,0,0,33e4cec8173ccc9dffc80b9137a6de8de96bd0ab42152d7128f7036cd96c1d3f,2024-07-25T04:15:05.560000 +CVE-2024-38176,0,1,e1638c5475998a4b11533da0fc145f86c6d27f8dcc8d9902805e782bb4392632,2024-07-25T22:15:08.733000 CVE-2024-3818,0,0,b4c982a18364880791124fa7ba25840b7eb37a53aa1551fa23324d948b6ddd3f,2024-04-19T13:10:25.637000 CVE-2024-3819,0,0,c25bdc543ba06fd05ac51b0b8912467c3fc6d8848be54d697bfdb5995b1a7e51,2024-05-02T18:00:37.360000 CVE-2024-3820,0,0,8985e7d1e7aecc5fe081b43705d723ec0ca067093ca4a65f30dd280cab84082f,2024-06-03T14:46:24.250000 @@ -254654,9 +254658,9 @@ CVE-2024-38282,0,0,0b84325e8423ee1d927b510486c46be47f1c2c84d1f4cca17c487d6f5ea39 CVE-2024-38283,0,0,797ece42e985c33b58c5d43ea734dda88927de464a1a03ca93cecae13e751b09,2024-06-13T18:35:19.777000 CVE-2024-38284,0,0,5cfc5feb3350954f13e8af96dc3b24da21459352d04588b83c72c59d0194580e,2024-06-13T18:35:19.777000 CVE-2024-38285,0,0,7e28442ebee8b34d71e5708e3d778f155bb5ea07375678fa14265f29cc1dda8d,2024-06-13T18:35:19.777000 -CVE-2024-38287,1,1,e498edc7b8c17a2517757a5d7a93fcb095282748653adcf2c4252e406413dbe1,2024-07-25T20:15:04.887000 -CVE-2024-38288,1,1,cccb88659ba5834bf9cab79657cfc8bde92c4fe28a17a5035c5d10ab16d5238e,2024-07-25T20:15:04.953000 -CVE-2024-38289,1,1,c8f52e710827514c48c73e5c4fb3c37e86d553703606858417f21ca21c4258d8,2024-07-25T20:15:05.017000 +CVE-2024-38287,0,0,e498edc7b8c17a2517757a5d7a93fcb095282748653adcf2c4252e406413dbe1,2024-07-25T20:15:04.887000 +CVE-2024-38288,0,0,cccb88659ba5834bf9cab79657cfc8bde92c4fe28a17a5035c5d10ab16d5238e,2024-07-25T20:15:04.953000 +CVE-2024-38289,0,0,c8f52e710827514c48c73e5c4fb3c37e86d553703606858417f21ca21c4258d8,2024-07-25T20:15:05.017000 CVE-2024-3829,0,0,bf09bfac220b5e30500c1e820d1b81945c22904d8e9c5dfde5faaff94c981597,2024-06-03T14:46:24.250000 CVE-2024-38293,0,0,db540509e2b09b1cf976c07d02eb5180e9ce221e532de6476381169b8943dd64,2024-07-03T02:04:54.487000 CVE-2024-38294,0,0,cfe666b9712fab71a124db5665eed08c4872b4737e6668b46d4396d88c0aebaa,2024-06-13T18:36:09.010000 @@ -255067,7 +255071,7 @@ CVE-2024-39023,0,0,973861fba318ff13a4dd340336454548bbd625a4637128153f1ed9fe03662 CVE-2024-39027,0,0,9f73e18bd924a22ea308a0e3f3aba42dd8cadda957e02d96adc8536dc59ded1c,2024-07-08T15:48:01 CVE-2024-39028,0,0,a2641222edcef12e310d06c15f66d85419ac0430d888fa7eecd56f4af8dd2579,2024-07-08T15:47:26.720000 CVE-2024-3903,0,0,e1c6da3858ae6e8352eea69425b877e7a9386bde1a277b8207c331dc00d06d7a,2024-05-14T16:11:39.510000 -CVE-2024-39031,0,0,e5520859a866921030fc1384c2ab2bf863abb5a11a15d9c4b232e5f035349aa7,2024-07-12T16:11:49.347000 +CVE-2024-39031,0,1,d24f6f8147beeb7e9c2d09f46b9b50d67c2b9ac54ebfd67e20353ba96152db2b,2024-07-25T22:15:08.837000 CVE-2024-39036,0,0,8b0e3b7a757c7630c97609bf5affb9bafa3162d1af04d1ccd31492e6e46f7c28,2024-07-17T13:34:20.520000 CVE-2024-3904,0,0,b47d95974559a4f3b756535a5502c34ce174362aa3e2f750b6b7a9a829cd5533,2024-07-23T01:15:09.063000 CVE-2024-3905,0,0,67966257112781442fc6e512d6c151edda862eaaff35815fcc6adec0f7a08ca4,2024-06-04T19:20:26.357000 @@ -255198,6 +255202,7 @@ CVE-2024-39373,0,0,e03c6c4e4265087cfa8c4bbe8fccd5576189838192e80bd89272e600b85fa CVE-2024-39374,0,0,ceb09b5bb4e8be416a15f13560d443b1e635d211ece43c085341bae7ef26131f,2024-06-27T17:11:52.390000 CVE-2024-39375,0,0,7f7f7a9309aed2a09a305dfdf1e1d93b0589de917a3b11ae3ae79eb9d410a9e7,2024-06-27T17:11:52.390000 CVE-2024-39376,0,0,ff38615940f53b46258a81c8b3ac7c33f4e18906965f9bf4f05657720710f5f6,2024-06-27T17:11:52.390000 +CVE-2024-3938,1,1,32eb792b51550aeec2f84baec0958d8a050675b486c5aec4a52780d824b72546,2024-07-25T22:15:08.903000 CVE-2024-3939,0,0,946bcd2da6cf8e6d3629d51459f4ff005d5f6fd111c61e8b42a0b8395ce78a5e,2024-05-28T12:39:28.377000 CVE-2024-3940,0,0,9b4f68dc6c260883aad4ea511cde5305f79b78a30a9cc16969c94330d4b864d9,2024-05-14T16:11:39.510000 CVE-2024-3941,0,0,35d6089b62c06226c8a1fbb42f6b4f7549cfd9ebea65fdddb79305777fa7b160,2024-05-14T16:11:39.510000 @@ -255529,7 +255534,7 @@ CVE-2024-4031,0,0,5f28e8c1b5067aec87f50d97cb32ada2d0e893cae64c0dbc730c44d567aac9 CVE-2024-40318,0,0,cb8d835da8ac747b72478a7f280452dd5fc676a31f007346bf8684ae861a8946,2024-07-25T19:15:10.230000 CVE-2024-4032,0,0,3888c98c0dc9113e1403e75c67bd485cc9805e1b1c4cbd087358208523feaf6e,2024-06-20T12:44:22.977000 CVE-2024-40322,0,0,9e0e5f7f0965d0ebc33e4a2793beba8c7539aefbe8b3463a17519c41c1cd56fe,2024-07-16T18:00:02.110000 -CVE-2024-40324,1,1,2cd0b5566e2c85a49c1bb07b2878ba68390f2e9997fcae23c936aaf1c12193f2,2024-07-25T20:15:05.077000 +CVE-2024-40324,0,0,2cd0b5566e2c85a49c1bb07b2878ba68390f2e9997fcae23c936aaf1c12193f2,2024-07-25T20:15:05.077000 CVE-2024-40328,0,0,1ecb3aeeb912c43ca654a9972851beb0d9eb6ba5a46f3041ea2c2c60432dd8b1,2024-07-11T15:06:20.507000 CVE-2024-40329,0,0,26b60d9602f8b52b720fff41651ef4092fad02f73b2a1ba0d8eaca9598e4c3e0,2024-07-12T16:11:58.887000 CVE-2024-4033,0,0,100a78a446daab2b380bdb2306f7e35c115de46018456d74b097346d037da090,2024-05-02T18:00:37.360000 @@ -255885,6 +255890,8 @@ CVE-2024-41463,0,0,bd01c30877b33f610aa36a40e0ea829fcf3c906cb5c49b0b716e6bdd4345e CVE-2024-41464,0,0,912b66e2d05b713f45914d4cd1fa3604e8464867c0f39c45c7d1525cacb1b691,2024-07-25T12:36:39.947000 CVE-2024-41465,0,0,e029cd8634fe3086d10430ea064b95ae8512deac6d3845daffbb574768625c7b,2024-07-25T12:36:39.947000 CVE-2024-41466,0,0,97aa02d971ce915f9cf78bd3459f554b45935900ee34841cc9fdabfe7a6874b8,2024-07-25T12:36:39.947000 +CVE-2024-41468,1,1,be49f6b381cc6734ca9939fc7aae65f7955765d2d2a7436114b81054c2a9c999,2024-07-25T22:15:09.113000 +CVE-2024-41473,1,1,91fc5ae31a8ce60c26cca52d8d1923b28b85b350cb7e0703df1545797f9dbcdd,2024-07-25T22:15:09.177000 CVE-2024-4148,0,0,71d4cc4cd9749254e9c2938609496cfae5673c1a094b971881b54b705d48028f,2024-06-03T14:46:24.250000 CVE-2024-4149,0,0,28fd6853c4bd2a7bfb26cdd043f9abfc9e17f0ae1c9764bac61fec52fa0d04ad,2024-07-02T14:44:29.993000 CVE-2024-41492,0,0,99c2077a213e0f65a294335ccdb0c65c6a250420405be03860c1fbd393c7f4a6,2024-07-22T13:00:53.287000 @@ -255945,8 +255952,8 @@ CVE-2024-4180,0,0,89f84993baa10ab5b41ed58678b5b9e31ff190980a67ee18130266156f7434 CVE-2024-41800,0,0,c9aa70b9eaf587ef09690849cfa26ea13534efc3690d1375ef8b5e938dedeaa9,2024-07-25T17:15:11.203000 CVE-2024-41801,0,0,f2a624c3a8302c960ea86b1d706f87c6e20f746155fba94a3068e7373f371bea,2024-07-25T17:15:11.423000 CVE-2024-41806,0,0,fada7d53e3e2199f0b078a325bbd8761b8dad871eaa56e934d7ea42fe2265469,2024-07-25T15:15:11.210000 -CVE-2024-41808,1,1,9027fae13f229b5c09a375ce00447e22b4b1cce2554b65768ce09d6e6df6ab50,2024-07-25T20:15:05.153000 -CVE-2024-41809,1,1,a775db40f5a4daad58b7afae1c9b7db997ff10e10527f601bde83f66eecd4170,2024-07-25T21:15:11.310000 +CVE-2024-41808,0,0,9027fae13f229b5c09a375ce00447e22b4b1cce2554b65768ce09d6e6df6ab50,2024-07-25T20:15:05.153000 +CVE-2024-41809,0,0,a775db40f5a4daad58b7afae1c9b7db997ff10e10527f601bde83f66eecd4170,2024-07-25T21:15:11.310000 CVE-2024-4181,0,0,318f7b6282445099b873be7e9b6d90d9a8a899d8ebeb5f7676f33b80d9073c4d,2024-05-16T13:03:05.353000 CVE-2024-4182,0,0,0d8f83951a03e7673897d4b6402c0de2918a0bc9490e2ea7f1f32823e0e2921f,2024-04-26T12:58:17.720000 CVE-2024-41824,0,0,47989ccb6404b62a8cb0e5c16e1a456b7d013ad0bd3667ac206b0f700dc33163,2024-07-24T12:55:13.223000 @@ -257131,8 +257138,8 @@ CVE-2024-5552,0,0,7f73b574dd8e83d52dd7f28ecc579b960fbf7de562da98c7e63b5b8e0fd54b CVE-2024-5553,0,0,c4739ca4bfc71591786473d36aff26ccf561ba778e4c902dca863cedff7bba13,2024-06-13T18:36:09.013000 CVE-2024-5554,0,0,74bc30aa41742477c70b24fe6a1325284ef507b86f8f58abff9cf8ec0fe1023d,2024-07-18T12:28:43.707000 CVE-2024-5555,0,0,04da76d03dc7341c8a138d42367dd78d50c3a88f001073e3ae48b09dec66a0e6,2024-07-18T12:28:43.707000 -CVE-2024-5557,0,1,71e19027344115370537e5e9f2ac729a9013865b6ffe7632f9b652113dae4753,2024-07-25T20:00:46.653000 -CVE-2024-5558,0,1,d7061155c6f430b38a1e769635e4eca1c24478e5beedfff7ff120ab1f85e7481,2024-07-25T20:00:25.773000 +CVE-2024-5557,0,0,71e19027344115370537e5e9f2ac729a9013865b6ffe7632f9b652113dae4753,2024-07-25T20:00:46.653000 +CVE-2024-5558,0,0,d7061155c6f430b38a1e769635e4eca1c24478e5beedfff7ff120ab1f85e7481,2024-07-25T20:00:25.773000 CVE-2024-5559,0,0,0c59604cbf219c2ba1c247f52c304752b12dd0f3c92c8b3c96e21ad233f99b0a,2024-06-13T18:36:09.010000 CVE-2024-5560,0,0,002123ffc16696131d663e9c06724d8fb4501ef3ca4bc4191b4229c106e3346c,2024-07-25T19:59:58.017000 CVE-2024-5564,0,0,582ae8d6e013444879054c957a9f974e1fbdab4bea18417275b8c53698226d12,2024-07-19T16:15:03.193000 @@ -257412,7 +257419,7 @@ CVE-2024-5965,0,0,9678cf2eb18ba50e506ac9918028ddeb3c443af1b219027dc9d98541cb8273 CVE-2024-5966,0,0,554ab96b833511e084a1ba15972a76a5727ada41d1caccbee2c2fb11ec3339d5,2024-06-24T20:00:23.970000 CVE-2024-5967,0,0,c675e381b6c54a17455bb64c66cffebfea8bdbd8774aa5359fba110937f85e27,2024-06-20T12:44:01.637000 CVE-2024-5970,0,0,e17a8b7d022fd70a35f0b32d2191e09c5597e5e1c83547c2cb361b6d17360bc1,2024-06-20T12:44:01.637000 -CVE-2024-5971,0,1,e4f98c6267afcbb4d9afd3329ec44a1a1f7f72e0048e7418d4a554bf5527a469,2024-07-25T21:15:11.560000 +CVE-2024-5971,0,0,e4f98c6267afcbb4d9afd3329ec44a1a1f7f72e0048e7418d4a554bf5527a469,2024-07-25T21:15:11.560000 CVE-2024-5972,0,0,3700c5b3eb4bcd1d3bafe18b568e7aab0a0471128c3ce92a2f73ba8aa9a9cb4f,2024-06-28T19:15:07.500000 CVE-2024-5973,0,0,2d8084cf190a1aabb2055b961565b9805ce6ba0f851f188224d67d99d834e8cf,2024-07-25T15:18:05.157000 CVE-2024-5974,0,0,7ccf1724194ada1507df11f624ca32c0386136cdfa7ae25f910321f76e1abc40,2024-07-09T18:19:14.047000 @@ -257545,7 +257552,7 @@ CVE-2024-6153,0,0,aefe9e23b8ed1d87e58382d973bdf0f329fa76bb8df894b701324ee041e253 CVE-2024-6154,0,0,35ebac2e0d0212d63c52f8322328795df9a4917e7e1439a1c42bcda24384133e,2024-06-21T11:22:01.687000 CVE-2024-6160,0,0,ef1a3b3e7f3366ded429b369db1d335204ba1e5aa345b7b6a0087f8051f2471a,2024-06-24T12:57:36.513000 CVE-2024-6161,0,0,4874ef369326f57ebaead3e865a12df6057ceb7ec30e698c3deb9b52e2b10028,2024-07-09T18:19:14.047000 -CVE-2024-6162,0,1,58e77c96a091e21bc4222c97fd6c9956f581d56d70327ff91056071a087926f0,2024-07-25T21:15:11.677000 +CVE-2024-6162,0,0,58e77c96a091e21bc4222c97fd6c9956f581d56d70327ff91056071a087926f0,2024-07-25T21:15:11.677000 CVE-2024-6163,0,0,a7111efd9bbca18864edd7eac6469f395d4eb81bc59fa76c3e42cc0c59bc6e2c,2024-07-08T15:49:22.437000 CVE-2024-6164,0,0,614f49d1e735bb6e3edae2e7504c9e172f5564ab53752d92c142ee3a46cadc2e,2024-07-18T12:28:43.707000 CVE-2024-6166,0,0,c93093bf8454afe95675994fb929c06931906789a59088dfba4992e2491ed4c6,2024-07-12T14:23:53.600000 @@ -257777,7 +257784,7 @@ CVE-2024-6554,0,0,c39b715167392909a130cc6479af2acca1cb23375ca0bdab5b0fb951f0bce6 CVE-2024-6555,0,0,bf68ef8f1bd3876021fc33b504457daba53832080530806ef27f797ea5536a0b,2024-07-12T12:49:07.030000 CVE-2024-6556,0,0,246920c1b32eb0a0369982110178f9a30464427865e75d42710950bf8d6bff6c,2024-07-11T13:05:54.930000 CVE-2024-6557,0,0,5f8a5c5bf162c69368d24395d90aef2e1a9fd156ec4a6d0f0e02ca54e1438d8b,2024-07-16T13:43:58.773000 -CVE-2024-6558,1,1,1c60057281bdb12625fceb4e9f76bf006d596617ef2c63102136f042d62dc6ca,2024-07-25T20:15:05.360000 +CVE-2024-6558,0,0,1c60057281bdb12625fceb4e9f76bf006d596617ef2c63102136f042d62dc6ca,2024-07-25T20:15:05.360000 CVE-2024-6559,0,0,2866b76c45bfa3fcb2a29d8b63ef335520f76c77ee94faa7443c1c34b010c185,2024-07-16T13:43:58.773000 CVE-2024-6560,0,0,131d869035ca470d33b727fd5e6c3ee539b49dab7fe493b3f3155c0a8f2eb339,2024-07-22T13:00:53.287000 CVE-2024-6563,0,0,1b4d88909a8afd884220e1df693026407578c717bcca7ba5cdd4e0bbbf29fb3c,2024-07-09T14:19:19.300000 @@ -257976,5 +257983,5 @@ CVE-2024-7080,0,0,0e8be1f5ff49b98f2e12f041d9740e0c98dcb4e55d2c6eaebafa31aadf939e CVE-2024-7081,0,0,4fe1e74e2e72cdc5207c5caa9565efa26fd09299ada94965c4896e36b361ec5f,2024-07-25T12:36:39.947000 CVE-2024-7091,0,0,e8d0dd8bb435701b961e03b8d58836a663b21eec4a32e53ec9bb349c72e7294b,2024-07-25T12:36:39.947000 CVE-2024-7101,0,0,e38bfce381af474fe5d83b2a017b3d9cde94994938f5c809ee169a4122de7c78,2024-07-25T16:15:04.720000 -CVE-2024-7105,1,1,79dd67af39650009390e7b476527237a1b12f53b9ae2bc840f7b6f81f68c2970,2024-07-25T21:15:11.790000 -CVE-2024-7106,1,1,5e68ef5aeb0a28231e715ea10bcf9bd287440c3361184536e65db5c8aef6e534,2024-07-25T21:15:12.090000 +CVE-2024-7105,0,0,79dd67af39650009390e7b476527237a1b12f53b9ae2bc840f7b6f81f68c2970,2024-07-25T21:15:11.790000 +CVE-2024-7106,0,0,5e68ef5aeb0a28231e715ea10bcf9bd287440c3361184536e65db5c8aef6e534,2024-07-25T21:15:12.090000