diff --git a/CVE-2023/CVE-2023-69xx/CVE-2023-6966.json b/CVE-2023/CVE-2023-69xx/CVE-2023-6966.json index 1ca356274a5..7747f908b66 100644 --- a/CVE-2023/CVE-2023-69xx/CVE-2023-6966.json +++ b/CVE-2023/CVE-2023-69xx/CVE-2023-6966.json @@ -2,8 +2,8 @@ "id": "CVE-2023-6966", "sourceIdentifier": "security@wordfence.com", "published": "2024-06-06T02:15:52.607", - "lastModified": "2024-06-06T14:17:35.017", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-07-15T18:55:57.513", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -39,14 +39,50 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:themoneytizer:the_moneytizer:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "10.0.1", + "matchCriteriaId": "80061CEE-BA8D-4D0D-9105-80A52D957F76" + } + ] + } + ] + } + ], "references": [ { "url": "https://plugins.trac.wordpress.org/browser/the-moneytizer/trunk/core/core_ajax.php", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Patch" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/71823e36-3899-4253-a1d2-c6f8921d18dc?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-272xx/CVE-2024-27238.json b/CVE-2024/CVE-2024-272xx/CVE-2024-27238.json new file mode 100644 index 00000000000..24ee35d6861 --- /dev/null +++ b/CVE-2024/CVE-2024-272xx/CVE-2024-27238.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-27238", + "sourceIdentifier": "security@zoom.us", + "published": "2024-07-15T18:15:03.633", + "lastModified": "2024-07-15T18:15:03.633", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Race condition in the installer for some Zoom Apps and SDKs for Windows before version 6.0.0 may allow an authenticated user to conduct a privilege escalation via local access." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security@zoom.us", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 7.1, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.2 + } + ] + }, + "weaknesses": [ + { + "source": "security@zoom.us", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-367" + } + ] + } + ], + "references": [ + { + "url": "https://www.zoom.com/en/trust/security-bulletin/zsb-24021", + "source": "security@zoom.us" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-272xx/CVE-2024-27240.json b/CVE-2024/CVE-2024-272xx/CVE-2024-27240.json new file mode 100644 index 00000000000..10b79c22424 --- /dev/null +++ b/CVE-2024/CVE-2024-272xx/CVE-2024-27240.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-27240", + "sourceIdentifier": "security@zoom.us", + "published": "2024-07-15T18:15:03.873", + "lastModified": "2024-07-15T18:15:03.873", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper input validation in the installer for some Zoom Apps for Windows may allow an authenticated user to conduct a privilege escalation via local access." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security@zoom.us", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 7.1, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.2 + } + ] + }, + "weaknesses": [ + { + "source": "security@zoom.us", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-20" + } + ] + } + ], + "references": [ + { + "url": "https://www.zoom.com/en/trust/security-bulletin/zsb-24019", + "source": "security@zoom.us" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-272xx/CVE-2024-27241.json b/CVE-2024/CVE-2024-272xx/CVE-2024-27241.json new file mode 100644 index 00000000000..acb1c0330ca --- /dev/null +++ b/CVE-2024/CVE-2024-272xx/CVE-2024-27241.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-27241", + "sourceIdentifier": "security@zoom.us", + "published": "2024-07-15T18:15:04.087", + "lastModified": "2024-07-15T18:15:04.087", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper input validation in some Zoom Apps and SDKs may allow an authenticated user to conduct a denial of service via network access." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security@zoom.us", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "LOW", + "baseScore": 5.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "security@zoom.us", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-20" + } + ] + } + ], + "references": [ + { + "url": "https://www.zoom.com/en/trust/security-bulletin/zsb-24020", + "source": "security@zoom.us" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-319xx/CVE-2024-31946.json b/CVE-2024/CVE-2024-319xx/CVE-2024-31946.json new file mode 100644 index 00000000000..3ae42490354 --- /dev/null +++ b/CVE-2024/CVE-2024-319xx/CVE-2024-31946.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2024-31946", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-07-15T19:15:02.503", + "lastModified": "2024-07-15T19:15:02.503", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "An issue was discovered in Stormshield Network Security (SNS) 3.7.0 through 3.7.41, 3.10.0 through 3.11.29, 4.0 through 4.3.24, and 4.4.0 through 4.7.4. A user who has access to the SNS with write access on the email alerts page has the ability to create alert email containing malicious JavaScript, executed by the template preview. The following versions fix this: 3.7.42, 3.11.30, 4.3.25, and 4.7.5." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://advisories.stormshield.eu/2024-007", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-364xx/CVE-2024-36432.json b/CVE-2024/CVE-2024-364xx/CVE-2024-36432.json new file mode 100644 index 00000000000..6e65a228ee2 --- /dev/null +++ b/CVE-2024/CVE-2024-364xx/CVE-2024-36432.json @@ -0,0 +1,48 @@ +{ + "id": "CVE-2024-36432", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-07-15T19:15:02.593", + "lastModified": "2024-07-15T19:15:02.593", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "An arbitrary memory write vulnerability was discovered in Supermicro X11DPG-HGX2, X11PDG-QT, X11PDG-OT, and X11PDG-SN motherboards with BIOS firmware before 4.4." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "cve@mitre.org", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "HIGH", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 0.8, + "impactScore": 6.0 + } + ] + }, + "references": [ + { + "url": "https://www.supermicro.com/en/support/security_center#%21advisories", + "source": "cve@mitre.org" + }, + { + "url": "https://www.supermicro.com/zh_tw/support/security_BIOS_Jul_2024", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-364xx/CVE-2024-36433.json b/CVE-2024/CVE-2024-364xx/CVE-2024-36433.json new file mode 100644 index 00000000000..41a73e47d20 --- /dev/null +++ b/CVE-2024/CVE-2024-364xx/CVE-2024-36433.json @@ -0,0 +1,48 @@ +{ + "id": "CVE-2024-36433", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-07-15T19:15:02.837", + "lastModified": "2024-07-15T19:15:02.837", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "An arbitrary memory write vulnerability was discovered in Supermicro X11DPH-T, X11DPH-Tq, and X11DPH-i motherboards with BIOS firmware before 4.4." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "cve@mitre.org", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "HIGH", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 0.8, + "impactScore": 6.0 + } + ] + }, + "references": [ + { + "url": "https://www.supermicro.com/en/support/security_BIOS_Jul_2024", + "source": "cve@mitre.org" + }, + { + "url": "https://www.supermicro.com/en/support/security_center#%21advisories", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-364xx/CVE-2024-36434.json b/CVE-2024/CVE-2024-364xx/CVE-2024-36434.json new file mode 100644 index 00000000000..7591b64b324 --- /dev/null +++ b/CVE-2024/CVE-2024-364xx/CVE-2024-36434.json @@ -0,0 +1,48 @@ +{ + "id": "CVE-2024-36434", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-07-15T19:15:03.053", + "lastModified": "2024-07-15T19:15:03.053", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "An SMM callout vulnerability was discovered in Supermicro X11DPH-T, X11DPH-Tq, and X11DPH-i motherboards with BIOS firmware before 4.4." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "cve@mitre.org", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "HIGH", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 0.8, + "impactScore": 6.0 + } + ] + }, + "references": [ + { + "url": "https://www.supermicro.com/en/support/security_BIOS_Jul_2024", + "source": "cve@mitre.org" + }, + { + "url": "https://www.supermicro.com/en/support/security_center#%21advisories", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-364xx/CVE-2024-36438.json b/CVE-2024/CVE-2024-364xx/CVE-2024-36438.json new file mode 100644 index 00000000000..f753a7f5935 --- /dev/null +++ b/CVE-2024/CVE-2024-364xx/CVE-2024-36438.json @@ -0,0 +1,25 @@ +{ + "id": "CVE-2024-36438", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-07-15T19:15:03.320", + "lastModified": "2024-07-15T19:15:03.320", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "eLinkSmart Hidden Smart Cabinet Lock 2024-05-22 has Incorrect Access Control and fails to perform an authorization check which can lead to card duplication and other attacks." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2024-044.txt", + "source": "cve@mitre.org" + }, + { + "url": "https://www.syss.de/pentest-blog/", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-370xx/CVE-2024-37016.json b/CVE-2024/CVE-2024-370xx/CVE-2024-37016.json new file mode 100644 index 00000000000..0f0fd6d566c --- /dev/null +++ b/CVE-2024/CVE-2024-370xx/CVE-2024-37016.json @@ -0,0 +1,25 @@ +{ + "id": "CVE-2024-37016", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-07-15T18:15:04.337", + "lastModified": "2024-07-15T18:15:04.337", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Mengshen Wireless Door Alarm M70 2024-05-24 allows Authentication Bypass via a Capture-Replay approach." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2024-045.txt", + "source": "cve@mitre.org" + }, + { + "url": "https://www.syss.de/pentest-blog/", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-373xx/CVE-2024-37386.json b/CVE-2024/CVE-2024-373xx/CVE-2024-37386.json new file mode 100644 index 00000000000..3414767ebaa --- /dev/null +++ b/CVE-2024/CVE-2024-373xx/CVE-2024-37386.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2024-37386", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-07-15T19:15:03.430", + "lastModified": "2024-07-15T19:15:03.430", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "An issue was discovered in Stormshield Network Security (SNS) 4.0.0 through 4.3.25, 4.4.0 through 4.7.5, and 4.8.0. Certain manipulations allow restarting in single-user mode despite the activation of secure boot. The following versions fix this: 4.3.27, 4.7.6, and 4.8.1." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://advisories.stormshield.eu/2024-017", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-384xx/CVE-2024-38433.json b/CVE-2024/CVE-2024-384xx/CVE-2024-38433.json index 6221261f144..0245baabfd8 100644 --- a/CVE-2024/CVE-2024-384xx/CVE-2024-38433.json +++ b/CVE-2024/CVE-2024-384xx/CVE-2024-38433.json @@ -2,8 +2,8 @@ "id": "CVE-2024-38433", "sourceIdentifier": "cna@cyber.gov.il", "published": "2024-07-11T08:15:10.623", - "lastModified": "2024-07-11T13:05:54.930", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-07-15T18:26:30.693", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 6.7, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 0.8, + "impactScore": 5.9 + }, { "source": "cna@cyber.gov.il", "type": "Secondary", @@ -41,8 +61,18 @@ }, "weaknesses": [ { - "source": "cna@cyber.gov.il", + "source": "nvd@nist.gov", "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-287" + } + ] + }, + { + "source": "cna@cyber.gov.il", + "type": "Secondary", "description": [ { "lang": "en", @@ -51,10 +81,127 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:nuvoton:npcm750r_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.10.19", + "matchCriteriaId": "D59B4482-20BA-49E5-AF90-2A4E47E2E960" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:nuvoton:npcm750r:-:*:*:*:*:*:*:*", + "matchCriteriaId": "52605376-B227-4E94-A652-5209DE575E48" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:nuvoton:npcm710r_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.10.19", + "matchCriteriaId": "935BB578-5585-4272-9285-6EFA358E3B4B" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:nuvoton:npcm710r:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F907249A-2671-4301-89BC-44E2303C2C6B" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:nuvoton:npcm730r_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.10.19", + "matchCriteriaId": "F08B3B70-F6A9-4B12-9499-92BA3F010367" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:nuvoton:npcm730r:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C5804365-723A-46E4-BB3C-84ACBD2B1EF0" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:nuvoton:npcm705r_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.10.19", + "matchCriteriaId": "596757E5-A4B2-4F9F-9FE6-DFA5508A62F2" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:nuvoton:npcm705r:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2C504A29-378C-499A-9F9F-7184FBC96B0E" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.gov.il/en/Departments/faq/cve_advisories", - "source": "cna@cyber.gov.il" + "source": "cna@cyber.gov.il", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-398xx/CVE-2024-39819.json b/CVE-2024/CVE-2024-398xx/CVE-2024-39819.json new file mode 100644 index 00000000000..2005700ce63 --- /dev/null +++ b/CVE-2024/CVE-2024-398xx/CVE-2024-39819.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-39819", + "sourceIdentifier": "security@zoom.us", + "published": "2024-07-15T18:15:04.407", + "lastModified": "2024-07-15T18:15:04.407", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper privilege management in the installer for some Zoom Workplace Apps and SDKs for Windows may allow an authenticated user to conduct a privilege escalation via local access." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security@zoom.us", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "HIGH", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 6.7, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 0.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "security@zoom.us", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-269" + } + ] + } + ], + "references": [ + { + "url": "https://www.zoom.com/en/trust/security-bulletin/zsb-24026", + "source": "security@zoom.us" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-398xx/CVE-2024-39820.json b/CVE-2024/CVE-2024-398xx/CVE-2024-39820.json new file mode 100644 index 00000000000..eaf7ab3bd13 --- /dev/null +++ b/CVE-2024/CVE-2024-398xx/CVE-2024-39820.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-39820", + "sourceIdentifier": "security@zoom.us", + "published": "2024-07-15T18:15:04.620", + "lastModified": "2024-07-15T18:15:04.620", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Uncontrolled search path element in the installer for Zoom Workplace Desktop App for macOS before version 6.0.10 may allow an authenticated user to conduct a denial of service via local access." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security@zoom.us", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 6.6, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.3, + "impactScore": 5.2 + } + ] + }, + "weaknesses": [ + { + "source": "security@zoom.us", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-427" + } + ] + } + ], + "references": [ + { + "url": "https://www.zoom.com/en/trust/security-bulletin/zsb-24027", + "source": "security@zoom.us" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-398xx/CVE-2024-39821.json b/CVE-2024/CVE-2024-398xx/CVE-2024-39821.json new file mode 100644 index 00000000000..bce701133a8 --- /dev/null +++ b/CVE-2024/CVE-2024-398xx/CVE-2024-39821.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-39821", + "sourceIdentifier": "security@zoom.us", + "published": "2024-07-15T18:15:04.827", + "lastModified": "2024-07-15T18:15:04.827", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Race condition in the installer for Zoom Workplace App for Windows and Zoom Rooms App for Windows may allow an authenticated user to conduct a denial of service via local access." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security@zoom.us", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 6.6, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.3, + "impactScore": 5.2 + } + ] + }, + "weaknesses": [ + { + "source": "security@zoom.us", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-367" + } + ] + } + ], + "references": [ + { + "url": "https://www.zoom.com/en/trust/security-bulletin/zsb-24028", + "source": "security@zoom.us" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-398xx/CVE-2024-39826.json b/CVE-2024/CVE-2024-398xx/CVE-2024-39826.json new file mode 100644 index 00000000000..adeefa10726 --- /dev/null +++ b/CVE-2024/CVE-2024-398xx/CVE-2024-39826.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-39826", + "sourceIdentifier": "security@zoom.us", + "published": "2024-07-15T18:15:05.033", + "lastModified": "2024-07-15T18:15:05.033", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Path traversal in Team Chat for some Zoom Workplace Apps and SDKs for Windows may allow an authenticated user to conduct information disclosure via network access." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security@zoom.us", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 6.8, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.3, + "impactScore": 4.0 + } + ] + }, + "weaknesses": [ + { + "source": "security@zoom.us", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-367" + } + ] + } + ], + "references": [ + { + "url": "https://www.zoom.com/en/trust/security-bulletin/zsb-24023", + "source": "security@zoom.us" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-398xx/CVE-2024-39827.json b/CVE-2024/CVE-2024-398xx/CVE-2024-39827.json new file mode 100644 index 00000000000..a739c194709 --- /dev/null +++ b/CVE-2024/CVE-2024-398xx/CVE-2024-39827.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-39827", + "sourceIdentifier": "security@zoom.us", + "published": "2024-07-15T18:15:05.237", + "lastModified": "2024-07-15T18:15:05.237", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper input validation in the installer for Zoom Workplace Desktop App for Windows before version 6.0.10 may allow an authenticated user to conduct a denial of service via local access." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security@zoom.us", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "security@zoom.us", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-20" + } + ] + } + ], + "references": [ + { + "url": "https://www.zoom.com/en/trust/security-bulletin/zsb-24024", + "source": "security@zoom.us" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-404xx/CVE-2024-40415.json b/CVE-2024/CVE-2024-404xx/CVE-2024-40415.json new file mode 100644 index 00000000000..33a6d4a2b47 --- /dev/null +++ b/CVE-2024/CVE-2024-404xx/CVE-2024-40415.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2024-40415", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-07-15T18:15:05.490", + "lastModified": "2024-07-15T18:15:05.490", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability in /goform/SetStaticRouteCfg in the sub_519F4 function in Tenda AX1806 1.0.0.1 firmware leads to stack-based buffer overflow." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/Feng-ZZ-pwn/IOT/blob/main/Tenda%20AX_1806/4/SetStaticRouteCfg.md", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-404xx/CVE-2024-40416.json b/CVE-2024/CVE-2024-404xx/CVE-2024-40416.json new file mode 100644 index 00000000000..f7e4e61ef83 --- /dev/null +++ b/CVE-2024/CVE-2024-404xx/CVE-2024-40416.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2024-40416", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-07-15T18:15:05.543", + "lastModified": "2024-07-15T18:15:05.543", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability in /goform/SetVirtualServerCfg in the sub_6320C function in Tenda AX1806 1.0.0.1 firmware leads to stack-based buffer overflow." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/Feng-ZZ-pwn/IOT/blob/main/Tenda%20AX_1806/3/SetVirtualServerCfg.md", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-406xx/CVE-2024-40631.json b/CVE-2024/CVE-2024-406xx/CVE-2024-40631.json new file mode 100644 index 00000000000..6cbbefa3416 --- /dev/null +++ b/CVE-2024/CVE-2024-406xx/CVE-2024-40631.json @@ -0,0 +1,64 @@ +{ + "id": "CVE-2024-40631", + "sourceIdentifier": "security-advisories@github.com", + "published": "2024-07-15T19:15:03.700", + "lastModified": "2024-07-15T19:15:03.700", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Plate media is an open source, rich-text editor for React. Editors that use `MediaEmbedElement` and pass custom `urlParsers` to the `useMediaState` hook may be vulnerable to XSS if a custom parser allows `javascript:`, `data:` or `vbscript:` URLs to be embedded. Editors that do not use `urlParsers` and consume the `url` property directly may also be vulnerable if the URL is not sanitised. The default parsers `parseTwitterUrl` and `parseVideoUrl` are not affected. `@udecode/plate-media` 36.0.10 resolves this issue by only allowing HTTP and HTTPS URLs during parsing. This affects only the `embed` property returned from `useMediaState`. In addition, the `url` property returned from `useMediaState` has been renamed to `unsafeUrl` to indicate that it has not been sanitised. The `url` property on `element` is also unsafe, but has not been renamed. If you're using either of these properties directly, you will still need to validate the URL yourself. Users are advised to upgrade. Users unable to upgrade should ensure that any custom `urlParsers` do not allow `javascript:`, `data:` or `vbscript:` URLs to be returned in the `url` property of their return values. If `url` is consumed directly, validate the URL protocol before passing it to the `iframe` element.\n\n" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 8.1, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.2 + } + ] + }, + "weaknesses": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/udecode/plate/commit/1bc0971774fbfb770780c9bdb94746a6f0f196a0", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/udecode/plate/security/advisories/GHSA-h3pq-667x-r789", + "source": "security-advisories@github.com" + }, + { + "url": "https://stackoverflow.com/a/43467144", + "source": "security-advisories@github.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-60xx/CVE-2024-6035.json b/CVE-2024/CVE-2024-60xx/CVE-2024-6035.json index c0112657166..a5b59a39ba3 100644 --- a/CVE-2024/CVE-2024-60xx/CVE-2024-6035.json +++ b/CVE-2024/CVE-2024-60xx/CVE-2024-6035.json @@ -2,8 +2,8 @@ "id": "CVE-2024-6035", "sourceIdentifier": "security@huntr.dev", "published": "2024-07-11T11:15:09.920", - "lastModified": "2024-07-12T18:49:07.067", - "vulnStatus": "Analyzed", + "lastModified": "2024-07-15T18:15:05.840", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -44,20 +44,20 @@ "type": "Secondary", "cvssData": { "version": "3.0", - "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:N", + "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "REQUIRED", "scope": "CHANGED", "confidentialityImpact": "HIGH", - "integrityImpact": "HIGH", + "integrityImpact": "NONE", "availabilityImpact": "NONE", - "baseScore": 9.3, - "baseSeverity": "CRITICAL" + "baseScore": 7.4, + "baseSeverity": "HIGH" }, "exploitabilityScore": 2.8, - "impactScore": 5.8 + "impactScore": 4.0 } ] }, diff --git a/CVE-2024/CVE-2024-67xx/CVE-2024-6716.json b/CVE-2024/CVE-2024-67xx/CVE-2024-6716.json index ca816be7a80..9646559f76e 100644 --- a/CVE-2024/CVE-2024-67xx/CVE-2024-6716.json +++ b/CVE-2024/CVE-2024-67xx/CVE-2024-6716.json @@ -2,7 +2,7 @@ "id": "CVE-2024-6716", "sourceIdentifier": "secalert@redhat.com", "published": "2024-07-15T15:15:10.900", - "lastModified": "2024-07-15T15:15:10.900", + "lastModified": "2024-07-15T18:15:06.107", "vulnStatus": "Received", "cveTags": [], "descriptions": [ @@ -55,6 +55,10 @@ { "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2297636", "source": "secalert@redhat.com" + }, + { + "url": "https://gitlab.com/libtiff/libtiff/-/issues/620", + "source": "secalert@redhat.com" } ] } \ No newline at end of file diff --git a/README.md b/README.md index a45626cb225..2f37eecea31 100644 --- a/README.md +++ b/README.md @@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2024-07-15T18:00:18.973254+00:00 +2024-07-15T20:00:18.531240+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2024-07-15T17:37:09.007000+00:00 +2024-07-15T19:15:03.700000+00:00 ``` ### Last Data Feed Release @@ -33,43 +33,41 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### Total Number of included CVEs ```plain -257045 +257063 ``` ### CVEs added in the last Commit -Recently added CVEs: `5` +Recently added CVEs: `18` -- [CVE-2024-40414](CVE-2024/CVE-2024-404xx/CVE-2024-40414.json) (`2024-07-15T17:15:02.783`) -- [CVE-2024-40553](CVE-2024/CVE-2024-405xx/CVE-2024-40553.json) (`2024-07-15T16:15:03.147`) -- [CVE-2024-40554](CVE-2024/CVE-2024-405xx/CVE-2024-40554.json) (`2024-07-15T16:15:03.223`) -- [CVE-2024-40555](CVE-2024/CVE-2024-405xx/CVE-2024-40555.json) (`2024-07-15T16:15:03.283`) -- [CVE-2024-40560](CVE-2024/CVE-2024-405xx/CVE-2024-40560.json) (`2024-07-15T16:15:03.347`) +- [CVE-2024-27238](CVE-2024/CVE-2024-272xx/CVE-2024-27238.json) (`2024-07-15T18:15:03.633`) +- [CVE-2024-27240](CVE-2024/CVE-2024-272xx/CVE-2024-27240.json) (`2024-07-15T18:15:03.873`) +- [CVE-2024-27241](CVE-2024/CVE-2024-272xx/CVE-2024-27241.json) (`2024-07-15T18:15:04.087`) +- [CVE-2024-31946](CVE-2024/CVE-2024-319xx/CVE-2024-31946.json) (`2024-07-15T19:15:02.503`) +- [CVE-2024-36432](CVE-2024/CVE-2024-364xx/CVE-2024-36432.json) (`2024-07-15T19:15:02.593`) +- [CVE-2024-36433](CVE-2024/CVE-2024-364xx/CVE-2024-36433.json) (`2024-07-15T19:15:02.837`) +- [CVE-2024-36434](CVE-2024/CVE-2024-364xx/CVE-2024-36434.json) (`2024-07-15T19:15:03.053`) +- [CVE-2024-36438](CVE-2024/CVE-2024-364xx/CVE-2024-36438.json) (`2024-07-15T19:15:03.320`) +- [CVE-2024-37016](CVE-2024/CVE-2024-370xx/CVE-2024-37016.json) (`2024-07-15T18:15:04.337`) +- [CVE-2024-37386](CVE-2024/CVE-2024-373xx/CVE-2024-37386.json) (`2024-07-15T19:15:03.430`) +- [CVE-2024-39819](CVE-2024/CVE-2024-398xx/CVE-2024-39819.json) (`2024-07-15T18:15:04.407`) +- [CVE-2024-39820](CVE-2024/CVE-2024-398xx/CVE-2024-39820.json) (`2024-07-15T18:15:04.620`) +- [CVE-2024-39821](CVE-2024/CVE-2024-398xx/CVE-2024-39821.json) (`2024-07-15T18:15:04.827`) +- [CVE-2024-39826](CVE-2024/CVE-2024-398xx/CVE-2024-39826.json) (`2024-07-15T18:15:05.033`) +- [CVE-2024-39827](CVE-2024/CVE-2024-398xx/CVE-2024-39827.json) (`2024-07-15T18:15:05.237`) +- [CVE-2024-40415](CVE-2024/CVE-2024-404xx/CVE-2024-40415.json) (`2024-07-15T18:15:05.490`) +- [CVE-2024-40416](CVE-2024/CVE-2024-404xx/CVE-2024-40416.json) (`2024-07-15T18:15:05.543`) +- [CVE-2024-40631](CVE-2024/CVE-2024-406xx/CVE-2024-40631.json) (`2024-07-15T19:15:03.700`) ### CVEs modified in the last Commit -Recently modified CVEs: `19` +Recently modified CVEs: `4` -- [CVE-2023-3204](CVE-2023/CVE-2023-32xx/CVE-2023-3204.json) (`2024-07-15T16:46:09.057`) -- [CVE-2024-30278](CVE-2024/CVE-2024-302xx/CVE-2024-30278.json) (`2024-07-15T16:15:37.093`) -- [CVE-2024-30299](CVE-2024/CVE-2024-302xx/CVE-2024-30299.json) (`2024-07-15T17:37:09.007`) -- [CVE-2024-30300](CVE-2024/CVE-2024-303xx/CVE-2024-30300.json) (`2024-07-15T17:37:06.847`) -- [CVE-2024-3073](CVE-2024/CVE-2024-30xx/CVE-2024-3073.json) (`2024-07-15T17:31:24.570`) -- [CVE-2024-3561](CVE-2024/CVE-2024-35xx/CVE-2024-3561.json) (`2024-07-15T16:45:18.173`) -- [CVE-2024-3562](CVE-2024/CVE-2024-35xx/CVE-2024-3562.json) (`2024-07-15T16:49:47.490`) -- [CVE-2024-3597](CVE-2024/CVE-2024-35xx/CVE-2024-3597.json) (`2024-07-15T16:51:05.940`) -- [CVE-2024-3602](CVE-2024/CVE-2024-36xx/CVE-2024-3602.json) (`2024-07-15T16:50:36.190`) -- [CVE-2024-3605](CVE-2024/CVE-2024-36xx/CVE-2024-3605.json) (`2024-07-15T17:12:36.967`) -- [CVE-2024-3627](CVE-2024/CVE-2024-36xx/CVE-2024-3627.json) (`2024-07-15T17:12:17.763`) -- [CVE-2024-37803](CVE-2024/CVE-2024-378xx/CVE-2024-37803.json) (`2024-07-15T16:46:21.273`) -- [CVE-2024-40412](CVE-2024/CVE-2024-404xx/CVE-2024-40412.json) (`2024-07-15T17:15:02.723`) -- [CVE-2024-4176](CVE-2024/CVE-2024-41xx/CVE-2024-4176.json) (`2024-07-15T16:43:04.163`) -- [CVE-2024-4371](CVE-2024/CVE-2024-43xx/CVE-2024-4371.json) (`2024-07-15T16:42:39.107`) -- [CVE-2024-4626](CVE-2024/CVE-2024-46xx/CVE-2024-4626.json) (`2024-07-15T17:10:52.563`) -- [CVE-2024-4742](CVE-2024/CVE-2024-47xx/CVE-2024-4742.json) (`2024-07-15T17:10:34.403`) -- [CVE-2024-5432](CVE-2024/CVE-2024-54xx/CVE-2024-5432.json) (`2024-07-15T16:53:35.600`) -- [CVE-2024-6721](CVE-2024/CVE-2024-67xx/CVE-2024-6721.json) (`2024-07-15T16:15:03.467`) +- [CVE-2023-6966](CVE-2023/CVE-2023-69xx/CVE-2023-6966.json) (`2024-07-15T18:55:57.513`) +- [CVE-2024-38433](CVE-2024/CVE-2024-384xx/CVE-2024-38433.json) (`2024-07-15T18:26:30.693`) +- [CVE-2024-6035](CVE-2024/CVE-2024-60xx/CVE-2024-6035.json) (`2024-07-15T18:15:05.840`) +- [CVE-2024-6716](CVE-2024/CVE-2024-67xx/CVE-2024-6716.json) (`2024-07-15T18:15:06.107`) ## Download and Usage diff --git a/_state.csv b/_state.csv index c327c5ba798..947509a54eb 100644 --- a/_state.csv +++ b/_state.csv @@ -223722,7 +223722,7 @@ CVE-2023-32035,0,0,b6b3376a399e2f18ad0d237c44a7b487a2be739a6756dc716ee136aedc7f6 CVE-2023-32037,0,0,e6fbf656596b0f12e8a816d2fe3bb7f8172423cd51fc1dcef0179303935b19e0,2024-05-29T03:15:40.027000 CVE-2023-32038,0,0,5f30b4088982dd039555017eaf1b23d675891ea4a9027ce83009d91020a6f522,2024-05-29T03:15:40.210000 CVE-2023-32039,0,0,332044a322083261920224f8561b7ce85fb9667002581b0794eb5836ca3383b5,2024-05-29T03:15:40.413000 -CVE-2023-3204,0,1,8cd0009773c1a45c783ea81dffe8ff200cde4afc0a022752c71de700c5ab0b9a,2024-07-15T16:46:09.057000 +CVE-2023-3204,0,0,8cd0009773c1a45c783ea81dffe8ff200cde4afc0a022752c71de700c5ab0b9a,2024-07-15T16:46:09.057000 CVE-2023-32040,0,0,f966fb2cd44d93d5d40086bb2c7587bff9964f18dd5da7188a4b6e3b65982d89,2024-05-29T03:15:40.580000 CVE-2023-32041,0,0,064ebf8cb18c8d2bb906d6b21f2c079e074488207e7b90d11ce25ae0d5eda28d,2024-05-29T03:15:40.770000 CVE-2023-32042,0,0,299c72ce4b35604d96a5e619fa292e348d07b9ed8f1d93782e38a7ecf2e70305,2024-05-29T03:15:41.073000 @@ -240444,7 +240444,7 @@ CVE-2023-6962,0,0,986479cdf0104030985cc73b8c5cd922aed26e09aac7f4f0ca21a4d53b3d66 CVE-2023-6963,0,0,5d78e338c4f8af8931aea1f2dde5afb8bbdfc8f31ec8fab4d6db3d80bfcdecf2,2024-02-14T17:05:16.533000 CVE-2023-6964,0,0,6b353abfee4e0f60ba07ed53b519d8cdcc5c6e3e583c876cd6af699df966c5a5,2024-04-10T13:24:00.070000 CVE-2023-6965,0,0,f49ac78940fe244c72647e51516e80a6e573f5fa400fc7065d825c4c692cabcd,2024-04-10T13:24:00.070000 -CVE-2023-6966,0,0,eee17306b1d6ecf0ac8d17fe9db7245fd618122fd910b73bf69d1270bf7f9f8e,2024-06-06T14:17:35.017000 +CVE-2023-6966,0,1,9a012b06da86b8f395f403fc3c8f5013317bd371eadeddb21759c85700f73992,2024-07-15T18:55:57.513000 CVE-2023-6967,0,0,7fa49a7c16574cbfe3664c75658ac16ae96710a4d17734528b42e15e81f0ce19,2024-04-10T13:24:00.070000 CVE-2023-6968,0,0,a4751c3d52b515d1d942809757ebd5c330a2b3fb28572a1d55882f3452313b5b,2024-06-06T14:17:35.017000 CVE-2023-6969,0,0,28305747d8b707ea006f2410a4d39a2af33e21a9599b2601ee1414912a46183e,2024-03-13T18:16:18.563000 @@ -247312,7 +247312,10 @@ CVE-2024-27234,0,0,7f9c430bb757ad526adb7918516acd55f167ec46b27604bd9833832e0b615 CVE-2024-27235,0,0,ca7df1b3186edf63083ffa451556ee8cef5481ef83fd54ad47ed09114ed183d0,2024-03-15T20:15:09.253000 CVE-2024-27236,0,0,87315156a485dcd5ca2e4a3368db0027f412517fa717d3f5ab5df1cc6bb866c2,2024-03-12T12:40:13.500000 CVE-2024-27237,0,0,229917a4428117370a5145466e677b0c72a40fdcb37122ac8c08e36ef5d19033,2024-03-12T12:40:13.500000 +CVE-2024-27238,1,1,462fc8e1860e98147c320e26d17ba5fee5ca1a60367d56c5f1c4f7059819041b,2024-07-15T18:15:03.633000 CVE-2024-2724,0,0,660610afdb28f5976ed634f2a472d2022e02ebb5bc503c73eac1e0b96d741829,2024-03-22T15:34:43.663000 +CVE-2024-27240,1,1,58daf2f38d2758083d41f48f956c68649d1d8c824a7b219db5babb7ed75e0346,2024-07-15T18:15:03.873000 +CVE-2024-27241,1,1,9e0fff38b263ebe0899e33f34b14266c4594aab0a80e4165f430f66221530bad,2024-07-15T18:15:04.087000 CVE-2024-27242,0,0,aa3d00d8440b9711083704a859c18c29ae2a7d4e0687131a6877ff32cc440bb5,2024-04-10T13:24:00.070000 CVE-2024-27243,0,0,7506fdb7727ab984462fc64398555eb3450f805c7f6a3944e9822e85e93cca4e,2024-05-16T13:03:05.353000 CVE-2024-27244,0,0,481637fe3fc7930848fab67c20215a504ece49e65656eb0a28bda5cc7f4c687a,2024-05-16T13:03:05.353000 @@ -249281,7 +249284,7 @@ CVE-2024-30273,0,0,6b1d238c9e12ea2ba8fc60efb1a6f102260f96c472f5f331b760d3af4a0ce CVE-2024-30274,0,0,e625b227f4c1edcd8894c6840804c74e62ead535c97f2e8fc44830cae7c48db1,2024-05-16T13:03:05.353000 CVE-2024-30275,0,0,1e933441e483f4fad62bd9e8a6a258edd1aaca4d5bb09d395e2677a6a5bd3120,2024-05-16T13:03:05.353000 CVE-2024-30276,0,0,0bd4be9c7f10ca7d4fd2dfa1716549a7092cbd7f9a2adabf7913546d4cdfeadd,2024-07-09T15:50:56.480000 -CVE-2024-30278,0,1,61f4d7e9a9587a3224ab5f7ebbd333eb1034f085c631558b85be2564db298806,2024-07-15T16:15:37.093000 +CVE-2024-30278,0,0,61f4d7e9a9587a3224ab5f7ebbd333eb1034f085c631558b85be2564db298806,2024-07-15T16:15:37.093000 CVE-2024-30279,0,0,e8959302b2a7f4b2f979d5a292d479144519886e3c4ec1eda991b8640940de58,2024-05-24T01:15:30.977000 CVE-2024-3028,0,0,9e4bef210fc19099d68fdbe2ca58f9c70793f50703ba240559787e18524fd766,2024-04-16T13:24:07.103000 CVE-2024-30280,0,0,7232cea83e4b5e67f9a2b634eb562bbb13f45b745f6ead8e9f7f82040938f49a,2024-05-24T01:15:30.977000 @@ -249304,9 +249307,9 @@ CVE-2024-30295,0,0,7acbb1c4868f13b65f181cea277a794fc009caf9cee062ee7f161860d6c96 CVE-2024-30296,0,0,be0909c296e6e8e43038b5643a1a0c28c6682fe163ca23c3edf171e922ae6f6e,2024-05-16T13:03:05.353000 CVE-2024-30297,0,0,55a6b9a1f93e14e98892ac8ad42e4742b35b926da37b4c4e027266ed3205e993,2024-05-16T13:03:05.353000 CVE-2024-30298,0,0,92bbe49d33f9c926bdca52a1a92f14b21413490e1bf1dd65bcaf24fbb0fe1407,2024-05-16T13:03:05.353000 -CVE-2024-30299,0,1,1654b592ab1dce50a91f0ff3960d214faa43e082d949db6429602b9ab8066e0e,2024-07-15T17:37:09.007000 +CVE-2024-30299,0,0,1654b592ab1dce50a91f0ff3960d214faa43e082d949db6429602b9ab8066e0e,2024-07-15T17:37:09.007000 CVE-2024-3030,0,0,5eafba8e87a04804f0ee37eb44b2a0db0456e0dcfce765e75341d9edfec2815f,2024-04-04T12:48:41.700000 -CVE-2024-30300,0,1,cb30fb32a49ef545078d6cb3d0e2c9d2976845dda248b7c3086e68c50460cc41,2024-07-15T17:37:06.847000 +CVE-2024-30300,0,0,cb30fb32a49ef545078d6cb3d0e2c9d2976845dda248b7c3086e68c50460cc41,2024-07-15T17:37:06.847000 CVE-2024-30301,0,0,9b74ed05354c1aa1aaf7222bb27897d0894fcbdf51bd0565f77bbad0338cfc5f,2024-05-03T12:50:34.250000 CVE-2024-30302,0,0,dbae568de5b2417e966678cb186a0766d0a1270a494653512196e489399925de,2024-05-03T12:50:34.250000 CVE-2024-30303,0,0,29beefe281b7361c70e3d46cb1e8ccb19d06aa60b2190adf964c9790227b9a7c,2024-05-03T12:50:34.250000 @@ -249684,7 +249687,7 @@ CVE-2024-30726,0,0,efb4446cd4d96112b24cdc2d4f9ffad31c723de0b805c2ec83882b225609f CVE-2024-30727,0,0,94492425a665761069039b2945e50fcfafedef52ebacc29c5716b28a4a0bbac3,2024-05-27T01:15:19.710000 CVE-2024-30728,0,0,3bc4c37b3682468f392a00e20efc19006244f15206b4a691e5cf95f83eded5a0,2024-05-27T01:15:19.790000 CVE-2024-30729,0,0,7c764f79b0cf9ef9638397b0c7f17f9af70530d76ceffd0ab159e6bf8fc29954,2024-05-27T01:15:19.870000 -CVE-2024-3073,0,1,45e6a22c22eb312115de50cc590e036ba6ec5593843fdd7bc8c65ba79b3446fa,2024-07-15T17:31:24.570000 +CVE-2024-3073,0,0,45e6a22c22eb312115de50cc590e036ba6ec5593843fdd7bc8c65ba79b3446fa,2024-07-15T17:31:24.570000 CVE-2024-30730,0,0,d4716f28d51e81409f5051905cf4ab5726344a2915708c552fcb346edd08860e,2024-05-27T01:15:19.953000 CVE-2024-30733,0,0,6f8110d48dd6a51bb95f34d95d1f66cca8866d7553b9830c6a166aaa001b5992,2024-05-27T01:15:20.033000 CVE-2024-30735,0,0,753441d7803dcc475ebaf2cfa2a11fe542629a9d58de825feb7b68625b12455d,2024-05-27T01:15:20.110000 @@ -250387,6 +250390,7 @@ CVE-2024-31941,0,0,afb95f4bebc84bd64697d4f74d4565720846f17ff4a035556242f3c05ce58 CVE-2024-31942,0,0,3d122d20f9462572618ef3940be00c9131d19d68aedd2b72ba341efc50cfe360,2024-04-15T13:15:31.997000 CVE-2024-31943,0,0,a3c3177de375490a3bcbe7c4dc869c6dc98de8408de3c26e8167121dc5553a55,2024-04-10T19:49:51.183000 CVE-2024-31944,0,0,9b7df1c1d68c7ba82d2a7e14fc250e4409e7410da01d69528d57b3dba1022b40,2024-04-10T19:49:51.183000 +CVE-2024-31946,1,1,7a838df436f8b1519c8cddad23e2362b3257c2383bd9af684a9638bf2e00480c,2024-07-15T19:15:02.503000 CVE-2024-31947,0,0,53a07a96d235761473c51b6658ac88c324f970e3729e396995a521d5b07b0a35,2024-07-15T13:00:34.853000 CVE-2024-31948,0,0,2545f6a13668ac7d71382ed97228591f14df9b7003f52f431839a3cf2cbd6d68,2024-07-03T01:55:34.387000 CVE-2024-31949,0,0,6e39badd21c22fae949ff94d85aeafc847ebfb0900888b28cfa176432c58fd9e,2024-04-28T07:15:08.917000 @@ -252597,9 +252601,9 @@ CVE-2024-35592,0,0,72c678ca31e4ec93bf22d8a1535979b48daec0d6d17d31e168e052fbb6727 CVE-2024-35593,0,0,5a7a9fd646183a9cfe0e8b357ffc98e8641fa2decf7b0d864f537dba3ee77a7b,2024-05-24T18:09:20.027000 CVE-2024-35595,0,0,1c0caac8b66ea50c55b6a38567b8221cce1fb5534ed6ea6fa786e54a9487b678,2024-07-03T02:01:55.937000 CVE-2024-3560,0,0,db76ccbf181e1e5da7ff674678a92955a50aac899b842cbcce7ee4c6ed92892a,2024-04-19T13:10:25.637000 -CVE-2024-3561,0,1,5370e9e1ff8bffbf4ad8d0059e83fd31e423cd49fc364fad03b1f8cc26f5277c,2024-07-15T16:45:18.173000 +CVE-2024-3561,0,0,5370e9e1ff8bffbf4ad8d0059e83fd31e423cd49fc364fad03b1f8cc26f5277c,2024-07-15T16:45:18.173000 CVE-2024-35618,0,0,909b98d4f6bab57eebe322fcd0fa9e4a02c096346d6899a3aecfb54429751f2f,2024-07-03T02:01:56.717000 -CVE-2024-3562,0,1,e0decdba1b4d9f0742f62650b9f4ede7206e97be478294222e880f87c4662eac,2024-07-15T16:49:47.490000 +CVE-2024-3562,0,0,e0decdba1b4d9f0742f62650b9f4ede7206e97be478294222e880f87c4662eac,2024-07-15T16:49:47.490000 CVE-2024-35621,0,0,685edeb645450da75895f43badb747e81d0e1f2d5ca055304f12a369effa59ec,2024-05-28T17:11:47.007000 CVE-2024-35627,0,0,4a039665766224ab2309171105fbc890963796bdfb66945f84a5ba2663f6bfff,2024-07-03T02:01:57.493000 CVE-2024-35628,0,0,612e797ff0e8cb8cedb262bed6040ae0abe44f1ee9b3f6c53c48f04c0f951c42,2024-06-27T13:15:58.550000 @@ -252966,7 +252970,7 @@ CVE-2024-35966,0,0,a92d4fb089889747475857cdf0af029c240ab8f6fb105e68fbd72992fec50 CVE-2024-35967,0,0,e3e23303b3dc5d4a65fe66a5f540e6a1db2b9194c0c160b04b3c6d8794f3528f,2024-06-25T22:15:33.880000 CVE-2024-35968,0,0,439ccc18325908cd4ef3a9bd891d3376dacc1d470b882c7bccea812445a8152e,2024-05-20T13:00:04.957000 CVE-2024-35969,0,0,c7e6b7ae441187279ecf5e21ff7ea13c1669f067e7c32158b493f5f3f86ee309,2024-06-27T12:15:26.887000 -CVE-2024-3597,0,1,75a7819de93664529fde26d6546c7502e2875af3213925a87bf3c85f5cec0e00,2024-07-15T16:51:05.940000 +CVE-2024-3597,0,0,75a7819de93664529fde26d6546c7502e2875af3213925a87bf3c85f5cec0e00,2024-07-15T16:51:05.940000 CVE-2024-35970,0,0,f412b0fc32058b1c3254455ca20439b7bcea99cc8d63c3a4fb8f474b7a6fa77d,2024-05-20T13:00:04.957000 CVE-2024-35971,0,0,f6116ac7ec424eec70e9f8f9696fd8cc3c252a3be88ce23a3aea15911b12a4d8,2024-06-10T18:15:35.383000 CVE-2024-35972,0,0,f2192d50ea420577056b9a7c4e781e3b14a7a9d14514af3e2b89df5bf9f73d9b,2024-05-23T21:04:02.433000 @@ -253021,7 +253025,7 @@ CVE-2024-36016,0,0,af6275dcadc896490bdfa8d75a24c446a65c13d4e371df7dc6e294e458cd8 CVE-2024-36017,0,0,418307aa110a364a6cbe46a7da7e8978367fb58331214a4b84a378b5a1a0f1e8,2024-06-27T14:15:13.943000 CVE-2024-36018,0,0,76c3ace216b452f4aa37c9643b2598864907335dde3ccb46fa666d2ecb42a8eb,2024-05-30T18:19:11.743000 CVE-2024-36019,0,0,6822b62368d372d6fe4bd8bbf9ad5e4c841c271eb7f80877f1beeef1e2b58d2e,2024-05-30T18:19:11.743000 -CVE-2024-3602,0,1,406ce829351e213c6af7e0a3b9d0c99f237e3ef837f86ddf7e5919696f488a4b,2024-07-15T16:50:36.190000 +CVE-2024-3602,0,0,406ce829351e213c6af7e0a3b9d0c99f237e3ef837f86ddf7e5919696f488a4b,2024-07-15T16:50:36.190000 CVE-2024-36020,0,0,38e2918ca9889dee369a741d0ef9bc41660c53e9227b9a4d7bb1cfbb3f8bc3e7,2024-06-27T12:15:27.717000 CVE-2024-36021,0,0,02495fe00f66da6dfdc76e114cbfe299166f38a54b1d2a44f261ac9e32a86975,2024-05-30T18:19:11.743000 CVE-2024-36022,0,0,c64d6f85f36bbf65cea0343ca81b6ba47092415a3c5024bf18c749096420184e,2024-05-30T18:19:11.743000 @@ -253047,7 +253051,7 @@ CVE-2024-36042,0,0,5e54aecb20c44082aa92fd61c0f8a58aa5121675b55d97309cf9a5aaaf11a CVE-2024-36043,0,0,3bd225f8561cef578aaa027f6bceef70b4450bc22a2e5dc039a9b76782f71691,2024-05-20T13:00:04.957000 CVE-2024-36048,0,0,b406f72981a8542eaabbe2b057df03d1e7a595145b2ccc619b5d1fde4d2e90e3,2024-06-10T17:16:32.167000 CVE-2024-36049,0,0,51d271179b773ae975431c0c021fa3b0015024baa0aaf9431319b88ebb604829,2024-05-24T18:09:20.027000 -CVE-2024-3605,0,1,905473bba2f4b1f833e3696e0eb3a1556acdfbc79f67c22a9c6f82f499950cc7,2024-07-15T17:12:36.967000 +CVE-2024-3605,0,0,905473bba2f4b1f833e3696e0eb3a1556acdfbc79f67c22a9c6f82f499950cc7,2024-07-15T17:12:36.967000 CVE-2024-36050,0,0,c50ac6e5d9529aacb1e334d114a2f6f4418d441c20a736ae9e48551abc3029b2,2024-05-22T16:15:10.777000 CVE-2024-36052,0,0,022010471f20b33cdbb9c0f6e926c1a4caaff0d72570a4d1a2abd38ceffab587,2024-05-22T12:46:53.887000 CVE-2024-36053,0,0,2b26adadb1e10190c0e2e5708c64683c631febead0f4dd9529189a0425d50810,2024-07-03T02:02:43.043000 @@ -253222,7 +253226,7 @@ CVE-2024-36264,0,0,107a5f8ad4937c0982cb9f4a5a08127014ca42eef2ebad76477f1e3a073f5 CVE-2024-36265,0,0,013f12438cdeab94e645b2217e59635e5ee118c048a6c6d7490b497e97a99b2a,2024-06-13T21:15:57.170000 CVE-2024-36266,0,0,9d2961d489b0fce568e04e4c1c269f16c8c57dd6d267e14663bd78f27bc7e154,2024-06-11T13:54:12.057000 CVE-2024-36267,0,0,66b127f77fa5a54e7fcd6fbeddc446c0aeca670a52e22fd99c771e136e0935f8,2024-07-03T02:03:00.383000 -CVE-2024-3627,0,1,b89e9f2ca530f3e52199f8e236751735781433429621317f8b9fc4faa8df3d5f,2024-07-15T17:12:17.763000 +CVE-2024-3627,0,0,b89e9f2ca530f3e52199f8e236751735781433429621317f8b9fc4faa8df3d5f,2024-07-15T17:12:17.763000 CVE-2024-36270,0,0,d3b5ce010e9d2d0e421a800ff03990b2f8e8f91530ab5a32d5bddc378cffae67,2024-06-21T11:22:01.687000 CVE-2024-36277,0,0,af400d33a698814e148533e62eceb8aef6909a879b47a7e44b0b7cad3c452635,2024-07-03T02:03:01.187000 CVE-2024-36278,0,0,6b8ecb24f3100b2f1c21910812aabc2ecc5850755f17ecb30c413be0914d5cf2,2024-07-03T18:02:26.597000 @@ -253312,7 +253316,11 @@ CVE-2024-36426,0,0,081cbabfe1f165d2e60c6bf5434c4cea5a1c1465246b1d9713d429b0a41c1 CVE-2024-36427,0,0,10c5dade9c11af5e52239a7a8c18438909a8ea6a201617061be6b7626f49e18c,2024-07-03T02:03:12.033000 CVE-2024-36428,0,0,73719b2d94fccf2eff624fbf36dc51c2fc48c0dc66be598a72cd1ff64aaf434d,2024-05-28T12:39:28.377000 CVE-2024-3643,0,0,af0c2404bd4ab34bcd75932174ab1b00c5ac556e20d57f0445020a0c94c96fe2,2024-05-16T13:03:05.353000 +CVE-2024-36432,1,1,bc7dcc54c0accd9d08a7eb50f3ad4572241465881609f579fc341e21961b7c58,2024-07-15T19:15:02.593000 +CVE-2024-36433,1,1,27ef33775c72c0fd42ed9b3c63df51a99b759c2ebef0c22d29deb86a1eac9de9,2024-07-15T19:15:02.837000 +CVE-2024-36434,1,1,0dfd2c56938439fb6a894bd775b9cbf740e7ded5bc9d49218fae9b783d279f33,2024-07-15T19:15:03.053000 CVE-2024-36435,0,0,d5db9c80751c95bdb9d7c8677b360e81635e7c29402d5e581205685bb84d0c00,2024-07-12T12:49:11.340000 +CVE-2024-36438,1,1,774be27f24fca724c25c385bb341460342aa8691fc1a30d28ca76b1c9d53b8e7,2024-07-15T19:15:03.320000 CVE-2024-3644,0,0,e904dffa636a621d1f1644a68a8bb26342dbf717ae684f12b60a37d102e4d87d,2024-05-16T13:03:05.353000 CVE-2024-3645,0,0,ea45063aa3cff8d7bb517959f0685ad339f1e48c249e10e3851af9fbba289420,2024-04-22T19:24:12.920000 CVE-2024-36450,0,0,32d48285c32086a3f09c628c1971379077a46741ecaad7df002b03827ae59ffc,2024-07-11T13:05:54.930000 @@ -253614,6 +253622,7 @@ CVE-2024-37006,0,0,ce197589ee3e9b9abc62e5ee278117c11ae961db1cdfe5fd87c2da96a0f55 CVE-2024-37007,0,0,0fc601714096f5d925a9dbadf52718e2d07645aad03229b4044d058f28f4c32f,2024-07-03T02:04:01.303000 CVE-2024-3701,0,0,b97bf02f501ce8bb46bbbea962bd508392417999afee815d0c2fcfb239983cc7,2024-04-15T13:15:31.997000 CVE-2024-37014,0,0,4d8eebb55f92fd637819ddb88e1adc8dcc510ce2876a7f33ecffd1498dc89404,2024-07-03T02:04:01.523000 +CVE-2024-37016,1,1,a5541b3a7f0a84fa31ec51dc66cb973b2ac5e7f89d07e0348ce7d14438de273a,2024-07-15T18:15:04.337000 CVE-2024-37017,0,0,bcf42a4afa4161d494ebe5be7e7f4777ee139dad62148a87a3f3aec02cb4dc1b,2024-07-03T02:04:02.337000 CVE-2024-37018,0,0,702b0048025811920f5478aca500fdf16e8badcce077fd8d6d40cb1d8cc37861,2024-05-31T13:01:46.727000 CVE-2024-37019,0,0,c34529539f4c6ff793225ec64e29909e2614ce1bc964c3c63810b9219791c5ca,2024-07-03T02:04:03.153000 @@ -253836,6 +253845,7 @@ CVE-2024-3738,0,0,cebdf6c67207ccd8240919e9596b8485c51e6607a12a8dcdfff13f6ddbdbfe CVE-2024-37383,0,0,3a9597c771ab199850aaeee94068cbc0182ff2bfcefd23d631ce0d7808f3745f,2024-07-03T02:04:16.250000 CVE-2024-37384,0,0,4ede7c4b4e1e1de259445d49ca3b43a6d0a75b7dcaf1ea245b8f6306c1e67bb9,2024-07-03T02:04:17.060000 CVE-2024-37385,0,0,1af5dbf4fe496116fcfe8797458a2e9292fd2ddec99a563e5137c9d207fb12bc,2024-06-07T14:56:05.647000 +CVE-2024-37386,1,1,3fc6f12821cdac1c4892854bf660c25bf1a1ca57761e368d4200b885ae7dc344,2024-07-15T19:15:03.430000 CVE-2024-37387,0,0,fe2e0e702592a3b950e5c7ffa6cd887e6a1ea8123fb6a269a45db83eafdcfbbc,2024-07-03T02:04:17.790000 CVE-2024-37388,0,0,3169d306b45a011b46c4d3fe95463302fc94255a3e5bff07d58cd00bed7bba75,2024-06-07T19:24:09.243000 CVE-2024-37389,0,0,27f7927000cd6a2429ab617761c45ffb27c2f3c3199f49f01b1eda02927e348e,2024-07-11T14:48:32.300000 @@ -253992,7 +254002,7 @@ CVE-2024-37799,0,0,7daf228a97dd80358d70cc4a662e5369bebd266eafdf0efd1951071a509a7 CVE-2024-3780,0,0,83484fb5b744efc24cdea9908844170c52624d067b8e01e5b8f34f841ba67ba1,2024-04-15T13:15:31.997000 CVE-2024-37800,0,0,3aebd2faaeb84484cc68215ff2c27d755488c237f64ba208bea923e908662dd8,2024-07-05T14:11:13.163000 CVE-2024-37802,0,0,acc621703310da7f355403e50706b571175d412f17efb19e135e56be65b914ac,2024-07-03T02:04:46.857000 -CVE-2024-37803,0,1,e775e15ae57e6d87a1c3eae9b2633b6fb5e2150047d8db37ba8a0df6bf917fcb,2024-07-15T16:46:21.273000 +CVE-2024-37803,0,0,e775e15ae57e6d87a1c3eae9b2633b6fb5e2150047d8db37ba8a0df6bf917fcb,2024-07-15T16:46:21.273000 CVE-2024-3781,0,0,0166ef6fe2c7d229a771ed8a3459c0974e3bc1428bfcd1abf209c8c2e778a8e5,2024-04-15T19:12:25.887000 CVE-2024-37818,0,0,5cb7934ffaf0f9273124a6e156c7f80c8bbf67e7edc77dc4c583d4fc2d7c2bcb,2024-06-21T11:22:01.687000 CVE-2024-3782,0,0,b45b8920e0157c6199f5ffbbbc446d8fb5e1a40daf0ca4b703a9dc70f6839c9b,2024-04-15T19:12:25.887000 @@ -254259,7 +254269,7 @@ CVE-2024-3841,0,0,8802855d3bfa5a1c81bb3b1500254989e91bb5a660a45184fb94e49c6e6b50 CVE-2024-38427,0,0,8994acf8b0d2e9fdb11baea3df5edeec421ed8fa1c8aac7108ecf0d2784c04de,2024-07-03T02:05:00.507000 CVE-2024-38428,0,0,88ab77f65d2de763959b3536063d69fbc2444cb9d53c4b7dcba71cfc1a022537,2024-06-17T12:42:04.623000 CVE-2024-3843,0,0,f8304581ad62be18ba48d40e0abaf62c4d0e638c53e769e55d87254b71de405d,2024-07-03T02:06:41.770000 -CVE-2024-38433,0,0,5b15c173757827b04b6aec390e8d6227c4be5fb08c0ff2d2703cb9d9bc7b7755,2024-07-11T13:05:54.930000 +CVE-2024-38433,0,1,f67092b0476b56495430d5a0a2004ef9f8edcc22248756a4bc924265edccd9ea,2024-07-15T18:26:30.693000 CVE-2024-38439,0,0,8231c3155c8c2b9187a625bff6a8697fe632a7e4deddc7a4e816a03d1932df66,2024-06-30T12:15:02.293000 CVE-2024-3844,0,0,13c07c552898deff764ecc147d4cf01f9d640dbd85df9d011bb4595782c8d93e,2024-07-03T02:06:42.643000 CVE-2024-38440,0,0,6eeed0e96f15416f894572035c480d139cdee0086e466e03019ce412c35c715a,2024-06-30T12:15:02.377000 @@ -254844,6 +254854,11 @@ CVE-2024-3977,0,0,87f55f2983faa9489e3ab65e96b4cea8a0d04681e4c4541cf69108c85d144a CVE-2024-3978,0,0,e25d25f011ecf86a9a7629ea5449d530d107458e873c97f796fe325b70200d63,2024-06-17T12:42:04.623000 CVE-2024-3979,0,0,e9e7991f3b86f818ec400b9ec60245e440b2d51744d0b7d3598ed5add4c2b631,2024-06-06T20:15:14.127000 CVE-2024-39807,0,0,ba2c368fe4cdf413290b5bff8a949eddf35bb4de98ed47f43e524e6cb747e010,2024-07-05T17:07:47.090000 +CVE-2024-39819,1,1,3ed27297e5dbf2b5db195ab7e433cf48cdd2011e8378ab27c539a83818e800c8,2024-07-15T18:15:04.407000 +CVE-2024-39820,1,1,0a370c1960af31a93093357600b0ed4111feec64382be841777decf985639317,2024-07-15T18:15:04.620000 +CVE-2024-39821,1,1,ffecc1cca9d0647f6a473cf37bb2fa90bd231ab7475e8f7e70a655aa741bd08f,2024-07-15T18:15:04.827000 +CVE-2024-39826,1,1,f422588b30ad994068eda47537984282c3659d647a20e3872a22edb1bb332311,2024-07-15T18:15:05.033000 +CVE-2024-39827,1,1,157c0f61a4c15fdb2ab6aa4ba54f2d4d0e2783cc207c0189f8175c7ce923d0ac,2024-07-15T18:15:05.237000 CVE-2024-39828,0,0,37815ac0cb1d59603d10017e1de409a6a7cef6f58ba5d0ea15f1cc9c3c9f34b5,2024-07-11T15:06:13.953000 CVE-2024-39830,0,0,fa16449dc31377b10db0f6c8fa3cd2e73175dcab5134adbfb18592dc79a4a80c,2024-07-05T17:08:50.197000 CVE-2024-3984,0,0,9fd51fca8e9cb62e411ab69c310516342152a8240e3126272f1618181a2d89aa,2024-06-20T12:44:01.637000 @@ -254960,8 +254975,10 @@ CVE-2024-4038,0,0,9199a5f679fdf6d4f05942a1d329990ffc0905f3bf6de7561a7af327688cda CVE-2024-4039,0,0,b18b8aac4336f296c5655f645710463e48a4544089b8c4c20638e847b5c74634,2024-05-14T16:11:39.510000 CVE-2024-4040,0,0,4c2ad1f11d479d0071ddbaeb3523edde6a0cd9c4e74c065c69d4bb5c9b1ac029,2024-04-26T15:25:47.270000 CVE-2024-4041,0,0,bd71d95aba274d30d448ad146bc23c848b8a3b9576dc252f709372f143cb7780,2024-05-14T16:11:39.510000 -CVE-2024-40412,0,1,ee1648a619ace402a2695f357644480cca061a0b71a8c8619f0a343e150121f2,2024-07-15T17:15:02.723000 -CVE-2024-40414,1,1,42ab5d9f1543bbb2a7588474b7f0390046f7ff960997e9ce164549f423d304ae,2024-07-15T17:15:02.783000 +CVE-2024-40412,0,0,ee1648a619ace402a2695f357644480cca061a0b71a8c8619f0a343e150121f2,2024-07-15T17:15:02.723000 +CVE-2024-40414,0,0,42ab5d9f1543bbb2a7588474b7f0390046f7ff960997e9ce164549f423d304ae,2024-07-15T17:15:02.783000 +CVE-2024-40415,1,1,dd6b4b157d36739047024ef312bcdbc2974a75c7371ac4228d566a23bdd925f6,2024-07-15T18:15:05.490000 +CVE-2024-40416,1,1,2541f9169745ccf44b3c6aaf80029bc6951ce4931a6336d52713caa5691ef3bf,2024-07-15T18:15:05.543000 CVE-2024-40417,0,0,298c0304c38ce2a49f170de68fce3e8c26e10c42ce4acaa74e6360f44eab21ad,2024-07-11T13:05:54.930000 CVE-2024-4042,0,0,f41d19a896222ab39f54d4d516c2364bd25fe65dca5e9c4b7ccc9d626f82d5ed,2024-06-07T14:56:05.647000 CVE-2024-4043,0,0,50e67cd87d2761034ee2e0514a61b1574f18a654fe271a8568be1eaa53e96b2e,2024-05-24T01:15:30.977000 @@ -254987,11 +255004,11 @@ CVE-2024-40549,0,0,a0d01bcdf34afa23eab8ec4dd5d94b148230dc582c59a04f8f6da50444d2d CVE-2024-40550,0,0,7a6954c6d53bfb86477e868f3f394991be55b1202e4ee13b62edae8e166cd83b,2024-07-12T18:40:22.040000 CVE-2024-40551,0,0,9e323c706374e77ed8fc1ea45acdfd1b484476c375557653052fb7c996a0649b,2024-07-12T18:40:13.010000 CVE-2024-40552,0,0,02ebf6fbf2ff31ad3f4bfa8a44c3c4b56d8ff7dfc506f01b4ada9a52c8671521,2024-07-12T18:39:59.150000 -CVE-2024-40553,1,1,736e85c145e1c137af7fcb5ec3a7383a0d64e02e558a3942773186cb8f8c71ec,2024-07-15T16:15:03.147000 -CVE-2024-40554,1,1,b82b913aff85d1115e78c21ed19913cda5f1ecdd2c218fadcdfa2f716f128c18,2024-07-15T16:15:03.223000 -CVE-2024-40555,1,1,bca9188bfd5b610602fe283496cfd8eb9c467078430023fc400effb5eeac8b1b,2024-07-15T16:15:03.283000 +CVE-2024-40553,0,0,736e85c145e1c137af7fcb5ec3a7383a0d64e02e558a3942773186cb8f8c71ec,2024-07-15T16:15:03.147000 +CVE-2024-40554,0,0,b82b913aff85d1115e78c21ed19913cda5f1ecdd2c218fadcdfa2f716f128c18,2024-07-15T16:15:03.223000 +CVE-2024-40555,0,0,bca9188bfd5b610602fe283496cfd8eb9c467078430023fc400effb5eeac8b1b,2024-07-15T16:15:03.283000 CVE-2024-4056,0,0,b8d993c32e0d1df4fc3c3b0df01e5b9a4366d92d1a2ad184a020d404aa44587a,2024-04-26T12:58:17.720000 -CVE-2024-40560,1,1,fa9cfb7935924b2a220812353cf8c14602c5ee557d8f6e80e21d065266761652,2024-07-15T16:15:03.347000 +CVE-2024-40560,0,0,fa9cfb7935924b2a220812353cf8c14602c5ee557d8f6e80e21d065266761652,2024-07-15T16:15:03.347000 CVE-2024-4057,0,0,26b46aa52b04f4ef8890033772544e5e99ad730f84e9e0e97b479cd36cf89ace,2024-07-03T02:07:02.197000 CVE-2024-4058,0,0,e20d454336ea887bbb54d47433e5560889db558189699560ce98773941e9b99e,2024-06-07T15:40:49.707000 CVE-2024-4059,0,0,c49986e07be30ca2c850f4613369c1702dff21e7018832f61c83284c95e0cc00,2024-05-03T03:16:29.430000 @@ -255012,6 +255029,7 @@ CVE-2024-40614,0,0,5a8c90c94f1b0dc56355424420ebae65c618d536c580acb4e248f7802de21 CVE-2024-40618,0,0,339cc634a42e8a7db54f4bb39e56482affa65b57dfd2765250a61f2e694456da,2024-07-12T16:12:00.597000 CVE-2024-4062,0,0,695b7b6d53140e91ee1c447f6f5acafad0b73fbbd2558cb89ae9d4c0c7616ec0,2024-06-04T19:20:29.007000 CVE-2024-4063,0,0,a86a41867bbd8268c01f6e42ab82f3f97444cd9242de57f43e4b9e5669394e5f,2024-06-04T19:20:29.120000 +CVE-2024-40631,1,1,02afd974607c209ba61a932b05cbea74ea58f5af3cb05e9df016ee708037da70,2024-07-15T19:15:03.700000 CVE-2024-4064,0,0,3a1a40467a64f04bfa80ae5c066454b06b4092014a9e47cc1a50eb6eb22d315c,2024-05-17T02:40:14.223000 CVE-2024-4065,0,0,e9243298c32ccba8ab1ac6d427150517ee98217790d2dec0b1b5ec685d8cbc83,2024-06-04T19:20:29.227000 CVE-2024-4066,0,0,5674d1317b0a03adb324e31f70d35a87031f26ca2ea2869349483359d081bdf7,2024-06-04T19:20:29.323000 @@ -255231,7 +255249,7 @@ CVE-2024-4172,0,0,ae5cefdd41ee745a5f3463347f20f3f77110439c81ed1ad285dedf4b40da1c CVE-2024-4173,0,0,47f39f3e8e603eac743ed4815cd724decf015716a2f0d9c17daf4d8fa3affc2d,2024-04-25T23:15:47.240000 CVE-2024-4174,0,0,e168dfb28a2573f66b3120de326c0954bda564c12e3831aed75de7f1338d3089,2024-04-25T13:18:02.660000 CVE-2024-4175,0,0,2f40401bb337bcc37138495e1928fb4d762f69fc829f768d707a278e8a423e1a,2024-04-25T13:18:02.660000 -CVE-2024-4176,0,1,2a1e283cc95c7d3d47b09f457f96512613ab4fb1878e9b333c02ce78f75d8385,2024-07-15T16:43:04.163000 +CVE-2024-4176,0,0,2a1e283cc95c7d3d47b09f457f96512613ab4fb1878e9b333c02ce78f75d8385,2024-07-15T16:43:04.163000 CVE-2024-4177,0,0,e1d6d87dc8ef62b0d8de94cfe98a875b1cbd39c3640e8e02d8d5a4e8bb3cca88,2024-06-11T17:53:13.710000 CVE-2024-4180,0,0,89f84993baa10ab5b41ed58678b5b9e31ff190980a67ee18130266156f7434fc,2024-06-04T16:57:41.053000 CVE-2024-4181,0,0,318f7b6282445099b873be7e9b6d90d9a8a899d8ebeb5f7676f33b80d9073c4d,2024-05-16T13:03:05.353000 @@ -255397,7 +255415,7 @@ CVE-2024-4367,0,0,53b2562feb1cef4dfbc75c878e502bbc54b7cf80f87613aa8d663f88e3c74c CVE-2024-4368,0,0,ebedd608e412600f3409256680729c82fcf5015495435afd7648389243e696e1,2024-07-03T02:07:28.557000 CVE-2024-4369,0,0,9bcc319f475d5802b53d6dedcfa6ead4761cbf7c42adde8daf6f3ff8c0c17af2,2024-06-19T18:15:11.820000 CVE-2024-4370,0,0,3c1f5b342c087fc6587c8bc9012541b58d80e50fdee9d14eea44daecdec82901,2024-05-15T16:40:19.330000 -CVE-2024-4371,0,1,a0b0e0fb8c98057b2328743d7da5c32e9a585001a67e08f1632ceab0df487dfa,2024-07-15T16:42:39.107000 +CVE-2024-4371,0,0,a0b0e0fb8c98057b2328743d7da5c32e9a585001a67e08f1632ceab0df487dfa,2024-07-15T16:42:39.107000 CVE-2024-4372,0,0,9ae4f43bf2d0d90214ce2e4715e0031799e31627a4319bb26ad2a73cf60988cf,2024-05-21T12:37:59.687000 CVE-2024-4373,0,0,95ffe3cd6afce20664a5281c9740358c7cd9b7c7a4c9be8031ba5b0e36cac33d,2024-05-15T16:40:19.330000 CVE-2024-4374,0,0,3d209a7da2a70008bba3efc6941e41bec948a9636ca11ef89a139bc015911837,2024-05-20T13:00:34.807000 @@ -255620,7 +255638,7 @@ CVE-2024-4621,0,0,2ba6d981e4d5b6f91910837209ceaa779e2d1828d6d78fc3d542c33aa86982 CVE-2024-4622,0,0,7ee7f5b0dbbae0efd9526a317b5150a2af537411986feb7d056b697fe5fc8d53,2024-05-15T18:35:11.453000 CVE-2024-4623,0,0,c53a127683caa8cc49c11a88cc217ef787af901116f1ba89c4741730eb1cc926,2024-06-20T12:44:01.637000 CVE-2024-4624,0,0,8d5df292e17ba086eddadcbafacc529f2ebc3c5e49d7b6ea9488db217d327898,2024-05-14T19:17:55.627000 -CVE-2024-4626,0,1,2c49c68b79a7a3d7626dfac7c1ab161b6d51a1a10b834d04b620fc9c15d7e475,2024-07-15T17:10:52.563000 +CVE-2024-4626,0,0,2c49c68b79a7a3d7626dfac7c1ab161b6d51a1a10b834d04b620fc9c15d7e475,2024-07-15T17:10:52.563000 CVE-2024-4627,0,0,a94951b310ac8fa22dfdfb5dfa1a6f0b0e4706e2176059eb33a39431470f56d3,2024-07-03T15:45:08.187000 CVE-2024-4630,0,0,a8734ce37050a74e4818d023dd3913b4f4405761deda282bae815154e00346af,2024-05-14T16:11:39.510000 CVE-2024-4631,0,0,d3c7ebdf5d9c31d124bc2c67e858e716a594cef6aa78ec49eddcc538ef63a67e,2024-05-14T15:44:13.487000 @@ -255720,7 +255738,7 @@ CVE-2024-4735,0,0,74f4fbd101bb46efdc880f338cfb70c8fd3a6ef365bd7732d2107c79fb3d78 CVE-2024-4736,0,0,d66d2cb2e0afad57d9d4fb0dd29db1ae480425b093ff5e46c35972ad67bf1599,2024-06-04T19:20:48.497000 CVE-2024-4737,0,0,bd8c1ff0c2bd0234c81e53807fa1f8ee5b80721a1ba19a06cab0ffcb77875865,2024-06-04T19:20:48.597000 CVE-2024-4738,0,0,fc42ba0968ce2d3cd6a759727e85c03dbbce46854db0b2e928b2a8457ade2245,2024-06-04T19:20:48.783000 -CVE-2024-4742,0,1,b62cb9a09c7db689b4e755ae70bed9b2375aafaa790f8e2b3ab80c930d94850e,2024-07-15T17:10:34.403000 +CVE-2024-4742,0,0,b62cb9a09c7db689b4e755ae70bed9b2375aafaa790f8e2b3ab80c930d94850e,2024-07-15T17:10:34.403000 CVE-2024-4743,0,0,213080d2ce7e290785906918b766d2dd6153d7beb42f4a36c418fabdb6096c44,2024-06-11T17:32:50.367000 CVE-2024-4744,0,0,f2a62275342fb4e02e31ad60fb7b37b3a8ac2b2376213a1fba752ece8166ef2e,2024-06-12T16:44:12.157000 CVE-2024-4745,0,0,54a19ac018881ab94cc09206a38557755449249c459a354d473ddea48bafd7eb,2024-06-12T16:23:34.197000 @@ -256299,7 +256317,7 @@ CVE-2024-5427,0,0,8f69f2258320069dff3e4ca54576ebef2bbd612c89873dcb7f321da375d5ba CVE-2024-5428,0,0,2246dbdf3f6f57b875e58f7afe2bbf25e943033499540bdd9e572873773785a4,2024-05-28T14:59:09.827000 CVE-2024-5430,0,0,7efa052e5c67b0f87e6df1de28f1712609827b19a2f0fa9870fd8d86a121a060,2024-06-28T13:17:34.380000 CVE-2024-5431,0,0,c05cafcca4db035c01a1ef8070f41d696cf1ed72d29d4b28e570debbe2ef62df,2024-06-25T12:24:17.873000 -CVE-2024-5432,0,1,ab16c13801145bb5eaae071d9c21b29aca78e7920ad4908920a2f03fb30ba995,2024-07-15T16:53:35.600000 +CVE-2024-5432,0,0,ab16c13801145bb5eaae071d9c21b29aca78e7920ad4908920a2f03fb30ba995,2024-07-15T16:53:35.600000 CVE-2024-5433,0,0,cf9a3f50aa3044d0d1df4fa80d5f9a0105faaa25fcb8a234110d2fd0fcff2ef0,2024-05-29T13:02:09.280000 CVE-2024-5434,0,0,bd01f6ae7a25122b4c9cfb7b6da0885ad33a7f141dec8df17c44747d924fac75,2024-05-29T13:02:09.280000 CVE-2024-5436,0,0,1f0ff22e526bae999a5752534900397469f10984712d6e1a281251b3244c7ffe,2024-05-31T13:01:46.727000 @@ -256691,7 +256709,7 @@ CVE-2024-6025,0,0,2653befc93f455636e57cde83404a5ff884ae434fc80abd19f04944c84a702 CVE-2024-6026,0,0,2970248e3866f379267d0cae7e3b9bb934f39b25cb3198f3dfbaa23423c08ff9,2024-07-12T16:55:44.240000 CVE-2024-6027,0,0,d36139a3f6402ad17d96a83c3d61f6ce213e515812c77112f328495c0bcd9928,2024-06-24T19:17:50.240000 CVE-2024-6028,0,0,a068f17d13f3176b06fe0181735235198b8a42900e26e5af12021baf09b50c20,2024-06-25T12:24:17.873000 -CVE-2024-6035,0,0,72b6aef12b103538a1673f781cff4e8e69794a7b8cc177c56631d30ef145bd70,2024-07-12T18:49:07.067000 +CVE-2024-6035,0,1,71705709079183c78c8ed383ff1dde0d9a61df1fcd0014b5485dcff6ce00c8bd,2024-07-15T18:15:05.840000 CVE-2024-6036,0,0,ec75d3b088377f3e157bda1807d973db13644b79a58ce7816702ab31b3d039ce,2024-07-11T13:05:54.930000 CVE-2024-6037,0,0,6693b31ec7c6312863697d20bd04a1bdff52b0f0104cd13eb0277621b822579c,2024-07-11T13:05:54.930000 CVE-2024-6038,0,0,4807c09415696120707d8114a37a205bc4f3b855697eebb2268af32cdef6d3c9,2024-06-27T19:25:12.067000 @@ -257023,8 +257041,8 @@ CVE-2024-6679,0,0,193698b3a519c2de1af0fd23f7e404e2d54c730e4704d97d0092b63ef1c812 CVE-2024-6680,0,0,131299d0989a76f846afb0c8ae15f4692f1a0fdd9931fad30c165660cd1232fc,2024-07-11T18:09:58.777000 CVE-2024-6681,0,0,fd87484dafd740c0f788720b14149eb40f6b6d8ce371416d0e039ce9acf82071,2024-07-11T18:09:58.777000 CVE-2024-6689,0,0,ec7131b60c617e40df7d8cd950219c4e232d1b7354523cf28a3e92438a8ddde2,2024-07-15T14:15:03.640000 -CVE-2024-6716,0,0,797c9ef3fcf086496b4d0cebe79397ae66fd082966b8503c8a462e84ae03c75f,2024-07-15T15:15:10.900000 -CVE-2024-6721,0,1,20bc3ac9fd25b0ef666ff8f606cfc8f742981337efa5a16bd2cfa701fac87a51,2024-07-15T16:15:03.467000 +CVE-2024-6716,0,1,e3306c105d7fd24ec7a1939e295c57fdf07bdb80aad35408cde8763b9316c0be,2024-07-15T18:15:06.107000 +CVE-2024-6721,0,0,20bc3ac9fd25b0ef666ff8f606cfc8f742981337efa5a16bd2cfa701fac87a51,2024-07-15T16:15:03.467000 CVE-2024-6728,0,0,9abe0a9570ded71226f4ac9c9c5189516c258bbe0afa1c3fa1605041ef7aae25,2024-07-15T13:00:34.853000 CVE-2024-6729,0,0,1a9a5aa4be1b6eedd35b675a6eb0b49764f594d7ab81dc654f200200596f44a5,2024-07-15T13:00:34.853000 CVE-2024-6730,0,0,ef30d2eb7f24b640da190afcbc16e385d73ab8dd33302ee9e560c4fd64a066a0,2024-07-15T13:00:34.853000