diff --git a/CVE-2017/CVE-2017-162xx/CVE-2017-16231.json b/CVE-2017/CVE-2017-162xx/CVE-2017-16231.json index c039241cffe..d4932f856c0 100644 --- a/CVE-2017/CVE-2017-162xx/CVE-2017-16231.json +++ b/CVE-2017/CVE-2017-162xx/CVE-2017-16231.json @@ -2,7 +2,7 @@ "id": "CVE-2017-16231", "sourceIdentifier": "cve@mitre.org", "published": "2019-03-21T15:59:56.217", - "lastModified": "2024-07-03T18:15:03.970", + "lastModified": "2024-07-08T14:16:08.107", "vulnStatus": "Modified", "cveTags": [ { @@ -23,6 +23,28 @@ } ], "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ], "cvssMetricV30": [ { "source": "nvd@nist.gov", @@ -81,6 +103,16 @@ "value": "CWE-119" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-119" + } + ] } ], "configurations": [ diff --git a/CVE-2021/CVE-2021-471xx/CVE-2021-47186.json b/CVE-2021/CVE-2021-471xx/CVE-2021-47186.json index ffeb09a4492..042400efe7b 100644 --- a/CVE-2021/CVE-2021-471xx/CVE-2021-47186.json +++ b/CVE-2021/CVE-2021-471xx/CVE-2021-47186.json @@ -2,15 +2,51 @@ "id": "CVE-2021-47186", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-04-10T19:15:47.430", - "lastModified": "2024-04-10T19:49:51.183", + "lastModified": "2024-07-08T14:16:15.150", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\ntipc: check for null after calling kmemdup\n\nkmemdup can return a null pointer so need to check for it, otherwise\nthe null key will be dereferenced later in tipc_crypto_key_xmit as\ncan be seen in the trace [1].\n\n\n[1] https://syzkaller.appspot.com/bug?id=bca180abb29567b189efdbdb34cbf7ba851c2a58" } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-690" + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/3e6db079751afd527bf3db32314ae938dc571916", diff --git a/CVE-2021/CVE-2021-472xx/CVE-2021-47242.json b/CVE-2021/CVE-2021-472xx/CVE-2021-47242.json index f090be7d10e..6f5716bb39b 100644 --- a/CVE-2021/CVE-2021-472xx/CVE-2021-47242.json +++ b/CVE-2021/CVE-2021-472xx/CVE-2021-47242.json @@ -2,7 +2,7 @@ "id": "CVE-2021-47242", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-05-21T15:15:13.327", - "lastModified": "2024-07-03T01:37:28.667", + "lastModified": "2024-07-08T14:16:16.353", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -46,7 +46,7 @@ "description": [ { "lang": "en", - "value": "CWE-1281" + "value": "CWE-667" } ] } diff --git a/CVE-2022/CVE-2022-28xx/CVE-2022-2856.json b/CVE-2022/CVE-2022-28xx/CVE-2022-2856.json index f1790e8c51e..d03013bc614 100644 --- a/CVE-2022/CVE-2022-28xx/CVE-2022-2856.json +++ b/CVE-2022/CVE-2022-28xx/CVE-2022-2856.json @@ -2,8 +2,8 @@ "id": "CVE-2022-2856", "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2022-09-26T16:15:11.207", - "lastModified": "2024-06-28T14:12:35.147", - "vulnStatus": "Analyzed", + "lastModified": "2024-07-08T14:16:18.783", + "vulnStatus": "Modified", "cveTags": [], "cisaExploitAdd": "2022-08-18", "cisaActionDue": "2022-09-08", @@ -40,6 +40,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 6.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 } ] }, @@ -53,6 +73,16 @@ "value": "CWE-20" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-20" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-212xx/CVE-2023-21237.json b/CVE-2023/CVE-2023-212xx/CVE-2023-21237.json index 59e0194b789..011e7bd4cb6 100644 --- a/CVE-2023/CVE-2023-212xx/CVE-2023-21237.json +++ b/CVE-2023/CVE-2023-212xx/CVE-2023-21237.json @@ -2,8 +2,9 @@ "id": "CVE-2023-21237", "sourceIdentifier": "security@android.com", "published": "2023-06-28T18:15:16.560", - "lastModified": "2024-03-06T02:00:02.080", - "vulnStatus": "Analyzed", + "lastModified": "2024-07-08T14:16:24.090", + "vulnStatus": "Modified", + "cveTags": [], "cisaExploitAdd": "2024-03-05", "cisaActionDue": "2024-03-26", "cisaRequiredAction": "Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.", @@ -35,6 +36,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 6.2, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.5, + "impactScore": 3.6 } ] }, @@ -48,6 +69,16 @@ "value": "NVD-CWE-noinfo" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-200" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-283xx/CVE-2023-28334.json b/CVE-2023/CVE-2023-283xx/CVE-2023-28334.json index fb4bd6d4d70..429ae0fc55b 100644 --- a/CVE-2023/CVE-2023-283xx/CVE-2023-28334.json +++ b/CVE-2023/CVE-2023-283xx/CVE-2023-28334.json @@ -2,7 +2,7 @@ "id": "CVE-2023-28334", "sourceIdentifier": "patrick@puiterwijk.org", "published": "2023-03-23T21:15:20.193", - "lastModified": "2024-07-03T01:39:50.350", + "lastModified": "2024-07-08T14:16:28.753", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -38,20 +38,20 @@ "type": "Secondary", "cvssData": { "version": "3.1", - "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", "attackVector": "NETWORK", "attackComplexity": "LOW", - "privilegesRequired": "NONE", + "privilegesRequired": "LOW", "userInteraction": "NONE", "scope": "UNCHANGED", - "confidentialityImpact": "NONE", + "confidentialityImpact": "LOW", "integrityImpact": "NONE", "availabilityImpact": "NONE", - "baseScore": 0.0, - "baseSeverity": "NONE" + "baseScore": 4.3, + "baseSeverity": "MEDIUM" }, - "exploitabilityScore": 3.9, - "impactScore": 0.0 + "exploitabilityScore": 2.8, + "impactScore": 1.4 } ] }, diff --git a/CVE-2023/CVE-2023-358xx/CVE-2023-35854.json b/CVE-2023/CVE-2023-358xx/CVE-2023-35854.json index 5cb4b97ee1f..19ca1a8f524 100644 --- a/CVE-2023/CVE-2023-358xx/CVE-2023-35854.json +++ b/CVE-2023/CVE-2023-358xx/CVE-2023-35854.json @@ -2,8 +2,16 @@ "id": "CVE-2023-35854", "sourceIdentifier": "cve@mitre.org", "published": "2023-06-20T12:15:09.690", - "lastModified": "2024-05-17T02:25:30.363", + "lastModified": "2024-07-08T15:15:21.063", "vulnStatus": "Modified", + "cveTags": [ + { + "sourceIdentifier": "cve@mitre.org", + "tags": [ + "disputed" + ] + } + ], "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-472xx/CVE-2023-47246.json b/CVE-2023/CVE-2023-472xx/CVE-2023-47246.json index d3c008a9ef6..835520846d8 100644 --- a/CVE-2023/CVE-2023-472xx/CVE-2023-47246.json +++ b/CVE-2023/CVE-2023-472xx/CVE-2023-47246.json @@ -2,8 +2,9 @@ "id": "CVE-2023-47246", "sourceIdentifier": "cve@mitre.org", "published": "2023-11-10T06:15:30.510", - "lastModified": "2023-11-13T17:28:37.350", - "vulnStatus": "Analyzed", + "lastModified": "2024-07-08T14:16:40.760", + "vulnStatus": "Modified", + "cveTags": [], "cisaExploitAdd": "2023-11-13", "cisaActionDue": "2023-12-04", "cisaRequiredAction": "Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.", @@ -39,6 +40,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ] }, @@ -52,6 +73,16 @@ "value": "CWE-22" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-22" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-508xx/CVE-2023-50872.json b/CVE-2023/CVE-2023-508xx/CVE-2023-50872.json index 1826c86b474..9697538faca 100644 --- a/CVE-2023/CVE-2023-508xx/CVE-2023-50872.json +++ b/CVE-2023/CVE-2023-508xx/CVE-2023-50872.json @@ -2,7 +2,7 @@ "id": "CVE-2023-50872", "sourceIdentifier": "cve@mitre.org", "published": "2024-04-16T16:15:08.150", - "lastModified": "2024-07-05T16:15:03.870", + "lastModified": "2024-07-08T14:16:44.317", "vulnStatus": "Awaiting Analysis", "cveTags": [ { @@ -22,7 +22,42 @@ "value": "La API en Accredible Credential.net del 6 de diciembre de 2023 permite un ataque de referencia directa a objetos inseguros que revela informaci\u00f3n parcial sobre los certificados y sus respectivos titulares. NOTA: la p\u00e1gina web excellium-services.com sobre este problema menciona \"El proveedor dice que no es un problema de seguridad\"." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-200" + } + ] + } + ], "references": [ { "url": "https://excellium-services.com/cert-xlm-advisory/CVE-2023-50872", diff --git a/CVE-2023/CVE-2023-511xx/CVE-2023-51142.json b/CVE-2023/CVE-2023-511xx/CVE-2023-51142.json index de6ed36ae4d..5390727bc62 100644 --- a/CVE-2023/CVE-2023-511xx/CVE-2023-51142.json +++ b/CVE-2023/CVE-2023-511xx/CVE-2023-51142.json @@ -2,8 +2,9 @@ "id": "CVE-2023-51142", "sourceIdentifier": "cve@mitre.org", "published": "2024-04-11T01:22:43.563", - "lastModified": "2024-04-11T12:47:44.137", + "lastModified": "2024-07-08T14:16:45.710", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "Un problema en ZKTeco BioTime v.8.5.4 y anteriores permite a un atacante remoto obtener informaci\u00f3n confidencial." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-200" + } + ] + } + ], "references": [ { "url": "http://biotime.com", diff --git a/CVE-2024/CVE-2024-00xx/CVE-2024-0042.json b/CVE-2024/CVE-2024-00xx/CVE-2024-0042.json index 4aa6b4563cc..57295a6c53c 100644 --- a/CVE-2024/CVE-2024-00xx/CVE-2024-0042.json +++ b/CVE-2024/CVE-2024-00xx/CVE-2024-0042.json @@ -2,7 +2,7 @@ "id": "CVE-2024-0042", "sourceIdentifier": "security@android.com", "published": "2024-05-07T21:15:08.540", - "lastModified": "2024-07-03T01:44:33.743", + "lastModified": "2024-07-08T14:16:55.973", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -46,7 +46,7 @@ "description": [ { "lang": "en", - "value": "CWE-843" + "value": "CWE-295" } ] } diff --git a/CVE-2024/CVE-2024-09xx/CVE-2024-0905.json b/CVE-2024/CVE-2024-09xx/CVE-2024-0905.json index 8c3aa3d3ccf..264b99d69d3 100644 --- a/CVE-2024/CVE-2024-09xx/CVE-2024-0905.json +++ b/CVE-2024/CVE-2024-09xx/CVE-2024-0905.json @@ -2,8 +2,9 @@ "id": "CVE-2024-0905", "sourceIdentifier": "contact@wpscan.com", "published": "2024-04-26T05:15:49.907", - "lastModified": "2024-04-26T12:58:17.720", + "lastModified": "2024-07-08T14:17:00.580", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,30 @@ "value": "El complemento Fancy Product Designer de WordPress anterior a 6.1.8 no sanitiza ni escapa un par\u00e1metro antes de devolverlo a la p\u00e1gina, lo que genera un Cross-Site Scripting Reflejado que podr\u00eda usarse contra usuarios no autenticados y de nivel administrador." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 6.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.4 + } + ] + }, "references": [ { "url": "https://wpscan.com/vulnerability/3b9eba0d-29aa-47e4-b17f-4cf4bbf8b690/", diff --git a/CVE-2024/CVE-2024-17xx/CVE-2024-1755.json b/CVE-2024/CVE-2024-17xx/CVE-2024-1755.json index 1f971fcbbd6..9199e76ced1 100644 --- a/CVE-2024/CVE-2024-17xx/CVE-2024-1755.json +++ b/CVE-2024/CVE-2024-17xx/CVE-2024-1755.json @@ -2,8 +2,9 @@ "id": "CVE-2024-1755", "sourceIdentifier": "contact@wpscan.com", "published": "2024-04-15T05:15:15.083", - "lastModified": "2024-04-15T13:15:31.997", + "lastModified": "2024-07-08T14:17:11.257", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "El complemento NPS computy WordPress hasta la versi\u00f3n 2.7.5 no tiene comprobaciones CSRF en algunos lugares, lo que podr\u00eda permitir a los atacantes hacer que los usuarios que han iniciado sesi\u00f3n realicen acciones no deseadas a trav\u00e9s de ataques CSRF." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-120" + } + ] + } + ], "references": [ { "url": "https://wpscan.com/vulnerability/481a376b-55be-4afa-94f5-c3cf8a88b8d1/", diff --git a/CVE-2024/CVE-2024-20xx/CVE-2024-2040.json b/CVE-2024/CVE-2024-20xx/CVE-2024-2040.json index 4f0e3dd3ccc..0ba4590edcb 100644 --- a/CVE-2024/CVE-2024-20xx/CVE-2024-2040.json +++ b/CVE-2024/CVE-2024-20xx/CVE-2024-2040.json @@ -2,8 +2,8 @@ "id": "CVE-2024-2040", "sourceIdentifier": "contact@wpscan.com", "published": "2024-07-03T06:15:02.843", - "lastModified": "2024-07-03T18:23:41.487", - "vulnStatus": "Analyzed", + "lastModified": "2024-07-08T14:18:10.367", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 1.4 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 6.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.4 } ] }, diff --git a/CVE-2024/CVE-2024-210xx/CVE-2024-21074.json b/CVE-2024/CVE-2024-210xx/CVE-2024-21074.json index d30ac281550..5130d39b848 100644 --- a/CVE-2024/CVE-2024-210xx/CVE-2024-21074.json +++ b/CVE-2024/CVE-2024-210xx/CVE-2024-21074.json @@ -2,8 +2,9 @@ "id": "CVE-2024-21074", "sourceIdentifier": "secalert_us@oracle.com", "published": "2024-04-16T22:15:26.370", - "lastModified": "2024-04-17T12:48:31.863", + "lastModified": "2024-07-08T14:17:20.423", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -38,6 +39,18 @@ } ] }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-284" + } + ] + } + ], "references": [ { "url": "https://www.oracle.com/security-alerts/cpuapr2024.html", diff --git a/CVE-2024/CVE-2024-210xx/CVE-2024-21076.json b/CVE-2024/CVE-2024-210xx/CVE-2024-21076.json index a25396bb993..7c8f67f7a96 100644 --- a/CVE-2024/CVE-2024-210xx/CVE-2024-21076.json +++ b/CVE-2024/CVE-2024-210xx/CVE-2024-21076.json @@ -2,8 +2,9 @@ "id": "CVE-2024-21076", "sourceIdentifier": "secalert_us@oracle.com", "published": "2024-04-16T22:15:26.720", - "lastModified": "2024-04-17T12:48:31.863", + "lastModified": "2024-07-08T14:17:21.220", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -38,6 +39,18 @@ } ] }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-284" + } + ] + } + ], "references": [ { "url": "https://www.oracle.com/security-alerts/cpuapr2024.html", diff --git a/CVE-2024/CVE-2024-221xx/CVE-2024-22104.json b/CVE-2024/CVE-2024-221xx/CVE-2024-22104.json index 0859e5ef8a4..16081ffd4da 100644 --- a/CVE-2024/CVE-2024-221xx/CVE-2024-22104.json +++ b/CVE-2024/CVE-2024-221xx/CVE-2024-22104.json @@ -2,8 +2,8 @@ "id": "CVE-2024-22104", "sourceIdentifier": "cve@mitre.org", "published": "2024-07-02T15:15:11.227", - "lastModified": "2024-07-05T17:03:41.903", - "vulnStatus": "Analyzed", + "lastModified": "2024-07-08T14:17:26.540", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-787" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-400" + } + ] } ], "configurations": [ diff --git a/CVE-2024/CVE-2024-227xx/CVE-2024-22734.json b/CVE-2024/CVE-2024-227xx/CVE-2024-22734.json index 0cc80c2a384..71aae8358c9 100644 --- a/CVE-2024/CVE-2024-227xx/CVE-2024-22734.json +++ b/CVE-2024/CVE-2024-227xx/CVE-2024-22734.json @@ -2,8 +2,9 @@ "id": "CVE-2024-22734", "sourceIdentifier": "cve@mitre.org", "published": "2024-04-12T06:15:06.697", - "lastModified": "2024-04-12T12:43:46.210", + "lastModified": "2024-07-08T14:17:29.360", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "Se descubri\u00f3 un problema en AMCS Group Trux Waste Management Software anterior a la versi\u00f3n 7.19.0018.26912, que permite a atacantes locales obtener informaci\u00f3n confidencial a trav\u00e9s de un par AES Key-IV est\u00e1tico y codificado en los componentes TxUtilities.dll y TruxUser.cfg." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 6.2, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.5, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-200" + } + ] + } + ], "references": [ { "url": "https://www.redlinecybersecurity.com/blog/cve-2024-22734", diff --git a/CVE-2024/CVE-2024-22xx/CVE-2024-2233.json b/CVE-2024/CVE-2024-22xx/CVE-2024-2233.json index c9ffa4fc5a9..a810c2152e2 100644 --- a/CVE-2024/CVE-2024-22xx/CVE-2024-2233.json +++ b/CVE-2024/CVE-2024-22xx/CVE-2024-2233.json @@ -2,8 +2,8 @@ "id": "CVE-2024-2233", "sourceIdentifier": "contact@wpscan.com", "published": "2024-07-03T06:15:03.227", - "lastModified": "2024-07-03T18:23:28.183", - "vulnStatus": "Analyzed", + "lastModified": "2024-07-08T14:18:11.917", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 1.4 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 6.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.4 } ] }, diff --git a/CVE-2024/CVE-2024-22xx/CVE-2024-2234.json b/CVE-2024/CVE-2024-22xx/CVE-2024-2234.json index 1face14593c..d8e7355d7f7 100644 --- a/CVE-2024/CVE-2024-22xx/CVE-2024-2234.json +++ b/CVE-2024/CVE-2024-22xx/CVE-2024-2234.json @@ -2,8 +2,8 @@ "id": "CVE-2024-2234", "sourceIdentifier": "contact@wpscan.com", "published": "2024-07-03T06:15:03.307", - "lastModified": "2024-07-03T18:17:13.110", - "vulnStatus": "Analyzed", + "lastModified": "2024-07-08T14:18:12.157", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.3, "impactScore": 2.7 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 6.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.4 } ] }, diff --git a/CVE-2024/CVE-2024-22xx/CVE-2024-2235.json b/CVE-2024/CVE-2024-22xx/CVE-2024-2235.json index 3a99081ea53..2e8f058c8d6 100644 --- a/CVE-2024/CVE-2024-22xx/CVE-2024-2235.json +++ b/CVE-2024/CVE-2024-22xx/CVE-2024-2235.json @@ -2,8 +2,8 @@ "id": "CVE-2024-2235", "sourceIdentifier": "contact@wpscan.com", "published": "2024-07-03T06:15:03.387", - "lastModified": "2024-07-03T18:27:18.097", - "vulnStatus": "Analyzed", + "lastModified": "2024-07-08T14:18:12.410", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 1.4 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 6.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.4 } ] }, diff --git a/CVE-2024/CVE-2024-234xx/CVE-2024-23486.json b/CVE-2024/CVE-2024-234xx/CVE-2024-23486.json index 2cb188f5f0a..90648fc57bd 100644 --- a/CVE-2024/CVE-2024-234xx/CVE-2024-23486.json +++ b/CVE-2024/CVE-2024-234xx/CVE-2024-23486.json @@ -2,8 +2,9 @@ "id": "CVE-2024-23486", "sourceIdentifier": "vultures@jpcert.or.jp", "published": "2024-04-15T11:15:07.820", - "lastModified": "2024-04-15T13:15:31.997", + "lastModified": "2024-07-08T14:17:34.250", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,30 @@ "value": "Existe un problema de almacenamiento de texto plano de contrase\u00f1a en los routers LAN inal\u00e1mbricos BUFFALO, lo que puede permitir que un atacante no autenticado adyacente a la red con acceso a la p\u00e1gina de inicio de sesi\u00f3n del producto pueda obtener las credenciales configuradas." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, "references": [ { "url": "https://jvn.jp/en/jp/JVN58236836/", diff --git a/CVE-2024/CVE-2024-235xx/CVE-2024-23588.json b/CVE-2024/CVE-2024-235xx/CVE-2024-23588.json index 4aba3d6cf1a..6fd74f67733 100644 --- a/CVE-2024/CVE-2024-235xx/CVE-2024-23588.json +++ b/CVE-2024/CVE-2024-235xx/CVE-2024-23588.json @@ -2,17 +2,41 @@ "id": "CVE-2024-23588", "sourceIdentifier": "psirt@hcl.com", "published": "2024-07-05T14:15:02.633", - "lastModified": "2024-07-05T17:10:58.210", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-07-08T15:28:10.993", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "HCL Nomad server on Domino fails to properly handle users configured with limited Domino access resulting in a possible denial of service vulnerability." + }, + { + "lang": "es", + "value": " El servidor HCL Nomad en Domino no maneja adecuadamente a los usuarios configurados con acceso limitado a Domino, lo que genera una posible vulnerabilidad de denegaci\u00f3n de servicio." } ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 6.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 + }, { "source": "psirt@hcl.com", "type": "Secondary", @@ -35,10 +59,43 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:hcltech:nomad_server_on_domino:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.0.12", + "matchCriteriaId": "FCA48540-10B6-4BF6-AC2C-A0A28299DB33" + } + ] + } + ] + } + ], "references": [ { "url": "https://support.hcltechsw.com/csm?id=kb_article&sysparm_article=KB0114193", - "source": "psirt@hcl.com" + "source": "psirt@hcl.com", + "tags": [ + "Not Applicable" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-23xx/CVE-2024-2376.json b/CVE-2024/CVE-2024-23xx/CVE-2024-2376.json index bc443526390..5d883c1b4b9 100644 --- a/CVE-2024/CVE-2024-23xx/CVE-2024-2376.json +++ b/CVE-2024/CVE-2024-23xx/CVE-2024-2376.json @@ -2,8 +2,8 @@ "id": "CVE-2024-2376", "sourceIdentifier": "contact@wpscan.com", "published": "2024-07-03T06:15:03.550", - "lastModified": "2024-07-03T18:26:55.777", - "vulnStatus": "Analyzed", + "lastModified": "2024-07-08T14:18:14.030", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ] }, diff --git a/CVE-2024/CVE-2024-244xx/CVE-2024-24486.json b/CVE-2024/CVE-2024-244xx/CVE-2024-24486.json index 03e2b638828..588f3c6492c 100644 --- a/CVE-2024/CVE-2024-244xx/CVE-2024-24486.json +++ b/CVE-2024/CVE-2024-244xx/CVE-2024-24486.json @@ -2,8 +2,9 @@ "id": "CVE-2024-24486", "sourceIdentifier": "cve@mitre.org", "published": "2024-04-15T19:15:09.787", - "lastModified": "2024-04-16T13:24:07.103", + "lastModified": "2024-07-08T14:17:37.030", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "Un problema descubierto en silex technology DS-600 Firmware v.1.4.1, permite a un atacante remoto editar la configuraci\u00f3n del dispositivo mediante el comando SAVE EEP_DATA." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.1, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.2 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-94" + } + ] + } + ], "references": [ { "url": "https://raw.githubusercontent.com/MostafaSoliman/Security-Advisories/master/CVE-2024-24486", diff --git a/CVE-2024/CVE-2024-247xx/CVE-2024-24791.json b/CVE-2024/CVE-2024-247xx/CVE-2024-24791.json index 2224d944037..f2149688640 100644 --- a/CVE-2024/CVE-2024-247xx/CVE-2024-24791.json +++ b/CVE-2024/CVE-2024-247xx/CVE-2024-24791.json @@ -2,7 +2,7 @@ "id": "CVE-2024-24791", "sourceIdentifier": "security@golang.org", "published": "2024-07-02T22:15:04.833", - "lastModified": "2024-07-03T12:53:24.977", + "lastModified": "2024-07-08T14:17:39.083", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,30 @@ "value": "El cliente net/http HTTP/1.1 manej\u00f3 mal el caso en el que un servidor responde a una solicitud con un encabezado \"Expect: 100-continue\" con un estado no informativo (200 o superior). Este mal manejo podr\u00eda dejar una conexi\u00f3n de cliente en un estado no v\u00e1lido, donde la siguiente solicitud enviada a la conexi\u00f3n fallar\u00e1. Un atacante que env\u00eda una solicitud a un proxy net/http/httputil.ReverseProxy puede aprovechar este mal manejo para provocar una denegaci\u00f3n de servicio enviando solicitudes \"Esperar: 100-continuar\" que provocan una respuesta no informativa del backend. Cada una de estas solicitudes deja al proxy con una conexi\u00f3n no v\u00e1lida y provoca que falle una solicitud posterior que utiliza esa conexi\u00f3n." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, "references": [ { "url": "https://go.dev/cl/591255", diff --git a/CVE-2024/CVE-2024-249xx/CVE-2024-24974.json b/CVE-2024/CVE-2024-249xx/CVE-2024-24974.json index b5ee0dc6324..058dc526c3e 100644 --- a/CVE-2024/CVE-2024-249xx/CVE-2024-24974.json +++ b/CVE-2024/CVE-2024-249xx/CVE-2024-24974.json @@ -2,13 +2,17 @@ "id": "CVE-2024-24974", "sourceIdentifier": "security@openvpn.net", "published": "2024-07-08T11:15:10.103", - "lastModified": "2024-07-08T11:15:10.103", - "vulnStatus": "Received", + "lastModified": "2024-07-08T15:49:22.437", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The interactive service in OpenVPN 2.6.9 and earlier allows the OpenVPN service pipe to be accessed remotely, which allows a remote attacker to interact with the privileged OpenVPN interactive service." + }, + { + "lang": "es", + "value": "El servicio interactivo en OpenVPN 2.6.9 y versiones anteriores permite acceder remotamente al canal del servicio OpenVPN, lo que permite a un atacante remoto interactuar con el servicio interactivo privilegiado OpenVPN." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-250xx/CVE-2024-25086.json b/CVE-2024/CVE-2024-250xx/CVE-2024-25086.json index 80a383dfeb9..a3ae90bc1da 100644 --- a/CVE-2024/CVE-2024-250xx/CVE-2024-25086.json +++ b/CVE-2024/CVE-2024-250xx/CVE-2024-25086.json @@ -2,8 +2,8 @@ "id": "CVE-2024-25086", "sourceIdentifier": "cve@mitre.org", "published": "2024-07-02T16:15:04.070", - "lastModified": "2024-07-05T17:04:31.943", - "vulnStatus": "Analyzed", + "lastModified": "2024-07-08T14:17:42.020", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 } ] }, @@ -49,6 +69,20 @@ "value": "NVD-CWE-noinfo" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-269" + }, + { + "lang": "en", + "value": "CWE-94" + } + ] } ], "configurations": [ diff --git a/CVE-2024/CVE-2024-253xx/CVE-2024-25343.json b/CVE-2024/CVE-2024-253xx/CVE-2024-25343.json index 268f7280c59..905b108565e 100644 --- a/CVE-2024/CVE-2024-253xx/CVE-2024-25343.json +++ b/CVE-2024/CVE-2024-253xx/CVE-2024-25343.json @@ -2,8 +2,9 @@ "id": "CVE-2024-25343", "sourceIdentifier": "cve@mitre.org", "published": "2024-04-26T20:15:07.427", - "lastModified": "2024-04-29T12:42:03.667", + "lastModified": "2024-07-08T14:17:43.447", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "La vulnerabilidad del router Tenda N300 F3 permite a los usuarios eludir la pol\u00edtica de seguridad prevista y crear contrase\u00f1as d\u00e9biles." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 9.1, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.2 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-269" + } + ] + } + ], "references": [ { "url": "http://tenda.com", diff --git a/CVE-2024/CVE-2024-253xx/CVE-2024-25376.json b/CVE-2024/CVE-2024-253xx/CVE-2024-25376.json index 90b0976801f..86271fc9e6d 100644 --- a/CVE-2024/CVE-2024-253xx/CVE-2024-25376.json +++ b/CVE-2024/CVE-2024-253xx/CVE-2024-25376.json @@ -2,8 +2,9 @@ "id": "CVE-2024-25376", "sourceIdentifier": "cve@mitre.org", "published": "2024-04-11T21:15:07.937", - "lastModified": "2024-04-12T12:43:57.400", + "lastModified": "2024-07-08T14:17:44.317", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "Un problema descubierto en los instaladores basados en MSI de Thesycon Software Solutions Gmbh & Co. KG TUSBAudio anteriores a 5.68.0 permite a un atacante local ejecutar c\u00f3digo arbitrario a trav\u00e9s del modo de reparaci\u00f3n msiexec.exe." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-94" + } + ] + } + ], "references": [ { "url": "https://www.thesycon.de/eng/usb_audiodriver.shtml#SecurityAdvisory", diff --git a/CVE-2024/CVE-2024-256xx/CVE-2024-25639.json b/CVE-2024/CVE-2024-256xx/CVE-2024-25639.json new file mode 100644 index 00000000000..73dadfd16f6 --- /dev/null +++ b/CVE-2024/CVE-2024-256xx/CVE-2024-25639.json @@ -0,0 +1,60 @@ +{ + "id": "CVE-2024-25639", + "sourceIdentifier": "security-advisories@github.com", + "published": "2024-07-08T15:15:21.423", + "lastModified": "2024-07-08T15:49:22.437", + "vulnStatus": "Undergoing Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Khoj is an application that creates personal AI agents. The Khoj Obsidian, Desktop and Web clients inadequately sanitize the AI model's response and user inputs. This can trigger Cross Site Scripting (XSS) via Prompt Injection from untrusted documents either indexed by the user on Khoj or read by Khoj from the internet when the user invokes the /online command. This vulnerability is fixed in 1.13.0." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:L", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "LOW", + "baseScore": 5.9, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.6, + "impactScore": 4.2 + } + ] + }, + "weaknesses": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-80" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/khoj-ai/khoj/commit/1dfd6d7391862d3564db7f4875216880b73cb6cc", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/khoj-ai/khoj/security/advisories/GHSA-h2q2-vch3-72qm", + "source": "security-advisories@github.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-274xx/CVE-2024-27459.json b/CVE-2024/CVE-2024-274xx/CVE-2024-27459.json index e39be4aedc8..70b47ddb663 100644 --- a/CVE-2024/CVE-2024-274xx/CVE-2024-27459.json +++ b/CVE-2024/CVE-2024-274xx/CVE-2024-27459.json @@ -2,13 +2,17 @@ "id": "CVE-2024-27459", "sourceIdentifier": "security@openvpn.net", "published": "2024-07-08T11:15:10.303", - "lastModified": "2024-07-08T11:15:10.303", - "vulnStatus": "Received", + "lastModified": "2024-07-08T15:49:22.437", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The interactive service in OpenVPN 2.6.9 and earlier allows an attacker to send data causing a stack overflow which can be used to execute arbitrary code with more privileges." + }, + { + "lang": "es", + "value": "El servicio interactivo en OpenVPN 2.6.9 y versiones anteriores permite a un atacante enviar datos provocando un desbordamiento de pila que puede usarse para ejecutar c\u00f3digo arbitrario con m\u00e1s privilegios." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-277xx/CVE-2024-27709.json b/CVE-2024/CVE-2024-277xx/CVE-2024-27709.json index 09df1c1fbe3..e4c442dcadb 100644 --- a/CVE-2024/CVE-2024-277xx/CVE-2024-27709.json +++ b/CVE-2024/CVE-2024-277xx/CVE-2024-27709.json @@ -2,13 +2,17 @@ "id": "CVE-2024-27709", "sourceIdentifier": "cve@mitre.org", "published": "2024-07-05T17:15:10.853", - "lastModified": "2024-07-05T17:15:10.853", - "vulnStatus": "Received", + "lastModified": "2024-07-08T15:49:22.437", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "SQL Injection vulnerability in Eskooly Web Product v.3.0 allows a remote attacker to execute arbitrary code via the searchby parameter of the allstudents.php component and the id parameter of the requestmanager.php component." + }, + { + "lang": "es", + "value": "Vulnerabilidad de inyecci\u00f3n SQL en Eskooly Web Product v.3.0 permite a un atacante remoto ejecutar c\u00f3digo de su elecci\u00f3n mediante el par\u00e1metro searchby del componente allstudents.php y el par\u00e1metro id del componente requestmanager.php." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-277xx/CVE-2024-27710.json b/CVE-2024/CVE-2024-277xx/CVE-2024-27710.json index 31193c3b08e..dd762e3d544 100644 --- a/CVE-2024/CVE-2024-277xx/CVE-2024-27710.json +++ b/CVE-2024/CVE-2024-277xx/CVE-2024-27710.json @@ -2,13 +2,17 @@ "id": "CVE-2024-27710", "sourceIdentifier": "cve@mitre.org", "published": "2024-07-05T17:15:10.940", - "lastModified": "2024-07-05T17:15:10.940", - "vulnStatus": "Received", + "lastModified": "2024-07-08T15:49:22.437", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "An issue in Eskooly Free Online School management Software v.3.0 and before allows a remote attacker to escalate privileges via the authentication mechanism." + }, + { + "lang": "es", + "value": " Un problema en Eskooly Free Online School Management Software v.3.0 y anteriores permite a un atacante remoto escalar privilegios a trav\u00e9s del mecanismo de autenticaci\u00f3n." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-277xx/CVE-2024-27711.json b/CVE-2024/CVE-2024-277xx/CVE-2024-27711.json index 3e364557053..310e7de50e4 100644 --- a/CVE-2024/CVE-2024-277xx/CVE-2024-27711.json +++ b/CVE-2024/CVE-2024-277xx/CVE-2024-27711.json @@ -2,13 +2,17 @@ "id": "CVE-2024-27711", "sourceIdentifier": "cve@mitre.org", "published": "2024-07-05T17:15:11.030", - "lastModified": "2024-07-05T17:15:11.030", - "vulnStatus": "Received", + "lastModified": "2024-07-08T15:49:22.437", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "An issue in Eskooly Free Online School management Software v.3.0 and before allows a remote attacker to escalate privileges via the Sin-up process function in the account settings." + }, + { + "lang": "es", + "value": " Un problema en Eskooly Free Online School Management Software v.3.0 y anteriores permite a un atacante remoto escalar privilegios a trav\u00e9s de la funci\u00f3n de proceso Sin-up en la configuraci\u00f3n de la cuenta." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-277xx/CVE-2024-27712.json b/CVE-2024/CVE-2024-277xx/CVE-2024-27712.json index 97e97a44bad..f96dbe5c459 100644 --- a/CVE-2024/CVE-2024-277xx/CVE-2024-27712.json +++ b/CVE-2024/CVE-2024-277xx/CVE-2024-27712.json @@ -2,13 +2,17 @@ "id": "CVE-2024-27712", "sourceIdentifier": "cve@mitre.org", "published": "2024-07-05T17:15:11.107", - "lastModified": "2024-07-05T17:15:11.107", - "vulnStatus": "Received", + "lastModified": "2024-07-08T15:49:22.437", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "An issue in Eskooly Free Online School management Software v.3.0 and before allows a remote attacker to escalate privileges via the User Account Mangemnt component in the authentication mechanism." + }, + { + "lang": "es", + "value": " Un problema en Eskooly Free Online School Management Software v.3.0 y anteriores permite a un atacante remoto escalar privilegios a trav\u00e9s del componente User Account Mangement en el mecanismo de autenticaci\u00f3n." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-277xx/CVE-2024-27713.json b/CVE-2024/CVE-2024-277xx/CVE-2024-27713.json index 94aa02fd286..6e1656dfea0 100644 --- a/CVE-2024/CVE-2024-277xx/CVE-2024-27713.json +++ b/CVE-2024/CVE-2024-277xx/CVE-2024-27713.json @@ -2,13 +2,17 @@ "id": "CVE-2024-27713", "sourceIdentifier": "cve@mitre.org", "published": "2024-07-05T17:15:11.183", - "lastModified": "2024-07-05T17:15:11.183", - "vulnStatus": "Received", + "lastModified": "2024-07-08T15:49:22.437", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "An issue in Eskooly Free Online School management Software v.3.0 and before allows a remote attacker to escalate privileges via the HTTP Response Header Settings component." + }, + { + "lang": "es", + "value": " Un problema en Eskooly Free Online School Management Software v.3.0 y anteriores permite a un atacante remoto escalar privilegios a trav\u00e9s del componente HTTP Response Header Settings." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-277xx/CVE-2024-27715.json b/CVE-2024/CVE-2024-277xx/CVE-2024-27715.json index 3d0ca501d01..8c2770e3169 100644 --- a/CVE-2024/CVE-2024-277xx/CVE-2024-27715.json +++ b/CVE-2024/CVE-2024-277xx/CVE-2024-27715.json @@ -2,16 +2,55 @@ "id": "CVE-2024-27715", "sourceIdentifier": "cve@mitre.org", "published": "2024-07-05T17:15:11.270", - "lastModified": "2024-07-05T17:15:11.270", - "vulnStatus": "Received", + "lastModified": "2024-07-08T15:49:22.437", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "An issue in Eskooly Free Online School management Software v.3.0 and before allows a remote attacker to escalate privileges via a crafted request to the Password Change mechanism." + }, + { + "lang": "es", + "value": "Un problema en Eskooly Free Online School Management Software v.3.0 y anteriores permite a un atacante remoto escalar privilegios mediante una solicitud manipulada al mecanismo de cambio de contrase\u00f1a." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 8.2, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 4.2 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-620" + } + ] } ], - "metrics": {}, "references": [ { "url": "https://blog.be-hacktive.com/eskooly-cve/cve-2024-27715-inadequate-password-update-verification-in-eskooly-web-product-less-than-v3.0", diff --git a/CVE-2024/CVE-2024-277xx/CVE-2024-27716.json b/CVE-2024/CVE-2024-277xx/CVE-2024-27716.json index fe887628e90..60541d06149 100644 --- a/CVE-2024/CVE-2024-277xx/CVE-2024-27716.json +++ b/CVE-2024/CVE-2024-277xx/CVE-2024-27716.json @@ -2,16 +2,55 @@ "id": "CVE-2024-27716", "sourceIdentifier": "cve@mitre.org", "published": "2024-07-05T17:15:11.350", - "lastModified": "2024-07-05T17:15:11.350", - "vulnStatus": "Received", + "lastModified": "2024-07-08T15:49:22.437", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Cross Site Scripting vulnerability in Eskooly Web Product v.3.0 and before allows a remote attacker to execute arbitrary code via the message sending and user input fields." + }, + { + "lang": "es", + "value": " Vulnerabilidad de Cross Site Scripting en Eskooly Web Product v.3.0 y anteriores permite a un atacante remoto ejecutar c\u00f3digo arbitrario a trav\u00e9s de los campos de env\u00edo de mensajes y de entrada del usuario." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.5 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-80" + } + ] } ], - "metrics": {}, "references": [ { "url": "https://blog.be-hacktive.com/eskooly-cve/cve-2024-27716-cross-site-scripting-xss-in-eskooly-web-product-less-than-v3.0", diff --git a/CVE-2024/CVE-2024-277xx/CVE-2024-27717.json b/CVE-2024/CVE-2024-277xx/CVE-2024-27717.json index e5b4a35a807..843619f6261 100644 --- a/CVE-2024/CVE-2024-277xx/CVE-2024-27717.json +++ b/CVE-2024/CVE-2024-277xx/CVE-2024-27717.json @@ -2,16 +2,55 @@ "id": "CVE-2024-27717", "sourceIdentifier": "cve@mitre.org", "published": "2024-07-05T17:15:11.423", - "lastModified": "2024-07-05T17:15:11.423", - "vulnStatus": "Received", + "lastModified": "2024-07-08T15:49:22.437", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Cross Site Request Forgery vulnerability in Eskooly Free Online School Management Software v.3.0 and before allows a remote attacker to escalate privileges via the Token Handling component." + }, + { + "lang": "es", + "value": " Vulnerabilidad de Cross Site Request Forgery en Eskooly Free Online School Management Software v.3.0 y anteriores permite a un atacante remoto escalar privilegios a trav\u00e9s del componente Token Handling." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 6.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 3.9, + "impactScore": 2.5 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] } ], - "metrics": {}, "references": [ { "url": "https://blog.be-hacktive.com/eskooly-cve/cve-2024-27717-cross-site-request-forgery-csrf-in-eskooly-web-product-less-than-v3.0", diff --git a/CVE-2024/CVE-2024-279xx/CVE-2024-27903.json b/CVE-2024/CVE-2024-279xx/CVE-2024-27903.json index 25dd20f409f..a0c16ee7ce9 100644 --- a/CVE-2024/CVE-2024-279xx/CVE-2024-27903.json +++ b/CVE-2024/CVE-2024-279xx/CVE-2024-27903.json @@ -2,13 +2,17 @@ "id": "CVE-2024-27903", "sourceIdentifier": "security@openvpn.net", "published": "2024-07-08T11:15:10.390", - "lastModified": "2024-07-08T11:15:10.390", - "vulnStatus": "Received", + "lastModified": "2024-07-08T15:49:22.437", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "OpenVPN plug-ins on Windows with OpenVPN 2.6.9 and earlier could be loaded from any directory, which allows an attacker to load an arbitrary plug-in which can be used to interact with the privileged OpenVPN interactive service." + }, + { + "lang": "es", + "value": "Los complementos de OpenVPN en Windows con OpenVPN 2.6.9 y versiones anteriores se pueden cargar desde cualquier directorio, lo que permite a un atacante cargar un complemento arbitrario que puede usarse para interactuar con el servicio interactivo privilegiado OpenVPN." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-295xx/CVE-2024-29500.json b/CVE-2024/CVE-2024-295xx/CVE-2024-29500.json index 78cf9e08fe1..d61459e8eb0 100644 --- a/CVE-2024/CVE-2024-295xx/CVE-2024-29500.json +++ b/CVE-2024/CVE-2024-295xx/CVE-2024-29500.json @@ -2,8 +2,9 @@ "id": "CVE-2024-29500", "sourceIdentifier": "cve@mitre.org", "published": "2024-04-10T20:15:07.510", - "lastModified": "2024-04-11T12:47:44.137", + "lastModified": "2024-07-08T14:18:05.667", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "Un problema en el modo quiosco de Secure Lockdown Multi Application Edition v2.00.219 permite a los atacantes ejecutar c\u00f3digo arbitrario ejecutando una instancia de aplicaci\u00f3n ClickOnce." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-94" + } + ] + } + ], "references": [ { "url": "https://www.drive-byte.de/en/blog/inteset-bugs-and-hardening", diff --git a/CVE-2024/CVE-2024-295xx/CVE-2024-29510.json b/CVE-2024/CVE-2024-295xx/CVE-2024-29510.json index c9ae1856e38..d623037e2d7 100644 --- a/CVE-2024/CVE-2024-295xx/CVE-2024-29510.json +++ b/CVE-2024/CVE-2024-295xx/CVE-2024-29510.json @@ -2,7 +2,7 @@ "id": "CVE-2024-29510", "sourceIdentifier": "cve@mitre.org", "published": "2024-07-03T19:15:03.320", - "lastModified": "2024-07-05T12:55:51.367", + "lastModified": "2024-07-08T14:18:07.743", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Artifex Ghostscript anterior a 10.03.1 permite la corrupci\u00f3n de la memoria y una omisi\u00f3n M\u00c1S SEGURA de la sandbox mediante la inyecci\u00f3n de cadena de formato con un dispositivo uniprint." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 6.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 4.0 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-693" + } + ] + } + ], "references": [ { "url": "https://bugs.ghostscript.com/show_bug.cgi?id=707662", diff --git a/CVE-2024/CVE-2024-295xx/CVE-2024-29511.json b/CVE-2024/CVE-2024-295xx/CVE-2024-29511.json index ea0d00ecd0f..4572b26ade5 100644 --- a/CVE-2024/CVE-2024-295xx/CVE-2024-29511.json +++ b/CVE-2024/CVE-2024-295xx/CVE-2024-29511.json @@ -2,7 +2,7 @@ "id": "CVE-2024-29511", "sourceIdentifier": "cve@mitre.org", "published": "2024-07-03T19:15:03.430", - "lastModified": "2024-07-05T12:55:51.367", + "lastModified": "2024-07-08T14:18:08.567", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Artifex Ghostscript anterior a 10.03.1, cuando se usa Tesseract para OCR, tiene un problema de directory traversal que permite la lectura de archivos arbitrarios (y la escritura de mensajes de error en archivos arbitrarios) a trav\u00e9s de OCRLanguage. Por ejemplo, la explotaci\u00f3n puede utilizar debug_file /tmp/out y user_patterns_file /etc/passwd." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-489" + } + ] + } + ], "references": [ { "url": "https://bugs.ghostscript.com/show_bug.cgi?id=707510", diff --git a/CVE-2024/CVE-2024-305xx/CVE-2024-30595.json b/CVE-2024/CVE-2024-305xx/CVE-2024-30595.json index ae139b264d8..368c73556ce 100644 --- a/CVE-2024/CVE-2024-305xx/CVE-2024-30595.json +++ b/CVE-2024/CVE-2024-305xx/CVE-2024-30595.json @@ -2,8 +2,9 @@ "id": "CVE-2024-30595", "sourceIdentifier": "cve@mitre.org", "published": "2024-03-28T12:15:53.593", - "lastModified": "2024-03-28T12:42:56.150", + "lastModified": "2024-07-08T14:18:21.630", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "Tenda FH1202 v1.2.0.14(408) tiene una vulnerabilidad de desbordamiento de la regi\u00f3n stack de la memoria en el par\u00e1metro deviceId de la funci\u00f3n addWifiMacFilter." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-121" + } + ] + } + ], "references": [ { "url": "https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/FH/FH1202/addWifiMacFilter_deviceId.md", diff --git a/CVE-2024/CVE-2024-314xx/CVE-2024-31406.json b/CVE-2024/CVE-2024-314xx/CVE-2024-31406.json index 1e60b9bfecb..c9cbfca1e1d 100644 --- a/CVE-2024/CVE-2024-314xx/CVE-2024-31406.json +++ b/CVE-2024/CVE-2024-314xx/CVE-2024-31406.json @@ -2,8 +2,9 @@ "id": "CVE-2024-31406", "sourceIdentifier": "vultures@jpcert.or.jp", "published": "2024-04-24T06:15:13.443", - "lastModified": "2024-04-24T13:39:42.883", + "lastModified": "2024-07-08T14:18:24.767", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "Existe una vulnerabilidad de c\u00f3digo de depuraci\u00f3n activa en RoamWiFi R10 anterior a 4.8.45. Si se explota esta vulnerabilidad, un atacante no autenticado adyacente a la red con acceso al dispositivo puede realizar operaciones no autorizadas." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-489" + } + ] + } + ], "references": [ { "url": "https://jvn.jp/en/jp/JVN62737544/", diff --git a/CVE-2024/CVE-2024-318xx/CVE-2024-31839.json b/CVE-2024/CVE-2024-318xx/CVE-2024-31839.json index af5c54cbd44..80bfb3db11c 100644 --- a/CVE-2024/CVE-2024-318xx/CVE-2024-31839.json +++ b/CVE-2024/CVE-2024-318xx/CVE-2024-31839.json @@ -2,8 +2,9 @@ "id": "CVE-2024-31839", "sourceIdentifier": "cve@mitre.org", "published": "2024-04-12T14:15:07.947", - "lastModified": "2024-04-15T13:15:51.577", + "lastModified": "2024-07-08T14:18:26.223", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "Vulnerabilidad de cross-site scripting en tiagorlampert CHAOS v.5.0.1 permite a un atacante remoto escalar privilegios a trav\u00e9s de la funci\u00f3n sendCommandHandler en el componente handler.go." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 4.8, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.2, + "impactScore": 2.5 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], "references": [ { "url": "https://blog.chebuya.com/posts/remote-code-execution-on-chaos-rat-via-spoofed-agents/", diff --git a/CVE-2024/CVE-2024-318xx/CVE-2024-31897.json b/CVE-2024/CVE-2024-318xx/CVE-2024-31897.json index 563e584a4ce..b38502e429e 100644 --- a/CVE-2024/CVE-2024-318xx/CVE-2024-31897.json +++ b/CVE-2024/CVE-2024-318xx/CVE-2024-31897.json @@ -2,13 +2,17 @@ "id": "CVE-2024-31897", "sourceIdentifier": "psirt@us.ibm.com", "published": "2024-07-08T03:15:02.200", - "lastModified": "2024-07-08T03:15:02.200", - "vulnStatus": "Received", + "lastModified": "2024-07-08T15:49:22.437", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "IBM Cloud Pak for Business Automation 18.0.0, 18.0.1, 18.0.2, 19.0.1, 19.0.2, 19.0.3, 20.0.1, 20.0.2, 20.0.3, 21.0.1, 21.0.2, 21.0.3, 22.0.1, 22.0.2, 23.0.1, and 23.0.2 vulnerable to server-side request forgery (SSRF). This may allow an authenticated attacker to send unauthorized requests from the system, potentially leading to network enumeration or facilitating other attacks. IBM X-Force ID: 288178." + }, + { + "lang": "es", + "value": " IBM Cloud Pak for Business Automation 18.0.0, 18.0.1, 18.0.2, 19.0.1, 19.0.2, 19.0.3, 20.0.1, 20.0.2, 20.0.3, 21.0.1, 21.0.2, 21.0.3, 22.0.1, 22.0.2, 23.0.1 y 23.0.2 vulnerables a Server Side Request Forgery (SSRF). Esto puede permitir que un atacante autenticado env\u00ede solicitudes no autorizadas desde el sistema, lo que podr\u00eda provocar la enumeraci\u00f3n de la red o facilitar otros ataques. ID de IBM X-Force: 288178." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-31xx/CVE-2024-3188.json b/CVE-2024/CVE-2024-31xx/CVE-2024-3188.json index 1aafeabe668..8206bfd4a86 100644 --- a/CVE-2024/CVE-2024-31xx/CVE-2024-3188.json +++ b/CVE-2024/CVE-2024-31xx/CVE-2024-3188.json @@ -2,8 +2,9 @@ "id": "CVE-2024-3188", "sourceIdentifier": "contact@wpscan.com", "published": "2024-04-26T05:15:50.477", - "lastModified": "2024-04-26T12:58:17.720", + "lastModified": "2024-07-08T14:19:01.160", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,30 @@ "value": "El complemento WP Shortcodes Plugin \u2014 Shortcodes Ultimate para WordPress anterior a 7.1.0 no valida ni escapa algunos de sus atributos de c\u00f3digo corto antes de devolverlos a una p\u00e1gina/publicaci\u00f3n donde est\u00e1 incrustado el c\u00f3digo corto, lo que podr\u00eda permitir a los usuarios con el rol de colaborador y superior realizar ataques de Cross-Site Scripting Almacenado." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 6.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.4 + } + ] + }, "references": [ { "url": "https://wpscan.com/vulnerability/bc273e75-7faf-4eaf-8ebd-efc5d6e9261f/", diff --git a/CVE-2024/CVE-2024-322xx/CVE-2024-32229.json b/CVE-2024/CVE-2024-322xx/CVE-2024-32229.json index 269c1aac708..65b105ebd3d 100644 --- a/CVE-2024/CVE-2024-322xx/CVE-2024-32229.json +++ b/CVE-2024/CVE-2024-322xx/CVE-2024-32229.json @@ -2,7 +2,7 @@ "id": "CVE-2024-32229", "sourceIdentifier": "cve@mitre.org", "published": "2024-07-01T21:15:03.553", - "lastModified": "2024-07-02T12:09:16.907", + "lastModified": "2024-07-08T14:18:28.213", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "FFmpeg 7.0 contiene un desbordamiento del b\u00fafer de mont\u00f3n en libavfilter/vf_tiltandshift.c:189:5 en copy_column." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.4, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.5, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-122" + } + ] + } + ], "references": [ { "url": "https://trac.ffmpeg.org/ticket/10950", diff --git a/CVE-2024/CVE-2024-324xx/CVE-2024-32487.json b/CVE-2024/CVE-2024-324xx/CVE-2024-32487.json index c40ecc5f40a..66410eb6701 100644 --- a/CVE-2024/CVE-2024-324xx/CVE-2024-32487.json +++ b/CVE-2024/CVE-2024-324xx/CVE-2024-32487.json @@ -2,8 +2,9 @@ "id": "CVE-2024-32487", "sourceIdentifier": "cve@mitre.org", "published": "2024-04-13T15:15:52.683", - "lastModified": "2024-06-10T18:15:33.640", + "lastModified": "2024-07-08T14:18:29.363", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "less hasta 653 permite la ejecuci\u00f3n de comandos del sistema operativo mediante un car\u00e1cter de nueva l\u00ednea en el nombre de un archivo, porque las comillas se manejan mal en filename.c. La explotaci\u00f3n normalmente requiere el uso de nombres de archivos controlados por el atacante, como los archivos extra\u00eddos de un archivo que no es de confianza. La explotaci\u00f3n tambi\u00e9n requiere la variable de entorno LESSOPEN, pero est\u00e1 configurada de forma predeterminada en muchos casos comunes." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.6, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 6.0 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-96" + } + ] + } + ], "references": [ { "url": "http://www.openwall.com/lists/oss-security/2024/04/15/1", diff --git a/CVE-2024/CVE-2024-32xx/CVE-2024-3276.json b/CVE-2024/CVE-2024-32xx/CVE-2024-3276.json index a65a0d3588c..e40f32af9ed 100644 --- a/CVE-2024/CVE-2024-32xx/CVE-2024-3276.json +++ b/CVE-2024/CVE-2024-32xx/CVE-2024-3276.json @@ -2,8 +2,8 @@ "id": "CVE-2024-3276", "sourceIdentifier": "contact@wpscan.com", "published": "2024-06-18T06:15:12.270", - "lastModified": "2024-07-05T13:39:52.460", - "vulnStatus": "Analyzed", + "lastModified": "2024-07-08T14:19:01.997", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.7, "impactScore": 2.7 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 6.1, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 } ] }, diff --git a/CVE-2024/CVE-2024-338xx/CVE-2024-33862.json b/CVE-2024/CVE-2024-338xx/CVE-2024-33862.json index 2db17cbbb1b..7f6c65ad72a 100644 --- a/CVE-2024/CVE-2024-338xx/CVE-2024-33862.json +++ b/CVE-2024/CVE-2024-338xx/CVE-2024-33862.json @@ -2,13 +2,17 @@ "id": "CVE-2024-33862", "sourceIdentifier": "cve@mitre.org", "published": "2024-07-05T23:15:10.050", - "lastModified": "2024-07-05T23:15:10.050", - "vulnStatus": "Received", + "lastModified": "2024-07-08T15:49:22.437", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A buffer-management vulnerability in OPC Foundation OPCFoundation.NetStandard.Opc.Ua.Core before 1.05.374.54 could allow remote attackers to exhaust memory resources. It is triggered when the system receives an excessive number of messages from a remote source. This could potentially lead to a denial of service (DoS) condition, disrupting the normal operation of the system." + }, + { + "lang": "es", + "value": " Una vulnerabilidad de gesti\u00f3n del b\u00fafer en OPC Foundation OPCFoundation.NetStandard.Opc.Ua.Core anterior a 1.05.374.54 podr\u00eda permitir a atacantes remotos agotar los recursos de memoria. Se activa cuando el sistema recibe una cantidad excesiva de mensajes de una fuente remota. Esto podr\u00eda conducir potencialmente a una condici\u00f3n de denegaci\u00f3n de servicio (DoS), interrumpiendo el funcionamiento normal del sistema." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-338xx/CVE-2024-33871.json b/CVE-2024/CVE-2024-338xx/CVE-2024-33871.json index cf6bc08165c..c0d55ab7640 100644 --- a/CVE-2024/CVE-2024-338xx/CVE-2024-33871.json +++ b/CVE-2024/CVE-2024-338xx/CVE-2024-33871.json @@ -2,7 +2,7 @@ "id": "CVE-2024-33871", "sourceIdentifier": "cve@mitre.org", "published": "2024-07-03T19:15:03.943", - "lastModified": "2024-07-05T12:55:51.367", + "lastModified": "2024-07-08T14:18:32.130", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Se descubri\u00f3 un problema en Artifex Ghostscript antes de la versi\u00f3n 10.03.1. contrib/opvp/gdevopvp.c permite la ejecuci\u00f3n de c\u00f3digo arbitrario a trav\u00e9s de una librer\u00eda de controladores personalizada, explotable a trav\u00e9s de un documento PostScript manipulado. Esto ocurre porque el par\u00e1metro Controlador para dispositivos opvp (y oprp) puede tener un nombre arbitrario para una librer\u00eda din\u00e1mica; luego se carga esta librer\u00eda. " } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-94" + } + ] + } + ], "references": [ { "url": "https://bugs.ghostscript.com/show_bug.cgi?id=707754", diff --git a/CVE-2024/CVE-2024-343xx/CVE-2024-34361.json b/CVE-2024/CVE-2024-343xx/CVE-2024-34361.json index 853ddc985f9..87c472b6a2e 100644 --- a/CVE-2024/CVE-2024-343xx/CVE-2024-34361.json +++ b/CVE-2024/CVE-2024-343xx/CVE-2024-34361.json @@ -2,13 +2,17 @@ "id": "CVE-2024-34361", "sourceIdentifier": "security-advisories@github.com", "published": "2024-07-05T19:15:09.610", - "lastModified": "2024-07-05T19:15:09.610", - "vulnStatus": "Received", + "lastModified": "2024-07-08T15:49:22.437", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Pi-hole is a DNS sinkhole that protects devices from unwanted content without installing any client-side software. A vulnerability in versions prior to 5.18.3 allows an authenticated user to make internal requests to the server via the `gravity_DownloadBlocklistFromUrl()` function. Depending on some circumstances, the vulnerability could lead to remote command execution. Version 5.18.3 contains a patch for this issue." + }, + { + "lang": "es", + "value": " Pi-hole es un sumidero de DNS que protege los dispositivos de contenido no deseado sin instalar ning\u00fan software del lado del cliente. Una vulnerabilidad en versiones anteriores a la 5.18.3 permite a un usuario autenticado realizar solicitudes internas al servidor a trav\u00e9s de la funci\u00f3n `gravity_DownloadBlocklistFromUrl()`. Dependiendo de algunas circunstancias, la vulnerabilidad podr\u00eda provocar la ejecuci\u00f3n remota de comandos. La versi\u00f3n 5.18.3 contiene un parche para este problema." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-344xx/CVE-2024-34452.json b/CVE-2024/CVE-2024-344xx/CVE-2024-34452.json index c1f89bf2db3..9a3b1c7a8a7 100644 --- a/CVE-2024/CVE-2024-344xx/CVE-2024-34452.json +++ b/CVE-2024/CVE-2024-344xx/CVE-2024-34452.json @@ -2,8 +2,9 @@ "id": "CVE-2024-34452", "sourceIdentifier": "cve@mitre.org", "published": "2024-06-21T22:15:10.877", - "lastModified": "2024-06-24T12:57:36.513", + "lastModified": "2024-07-08T14:18:33.547", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "CMSimple_XH 1.7.6 permite XSS cargando un documento SVG manipulado." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:N/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "LOW", + "baseScore": 6.1, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], "references": [ { "url": "https://github.com/surajhacx/CVE-2024-34452/", diff --git a/CVE-2024/CVE-2024-346xx/CVE-2024-34602.json b/CVE-2024/CVE-2024-346xx/CVE-2024-34602.json index bc8c4336081..8828f5659a9 100644 --- a/CVE-2024/CVE-2024-346xx/CVE-2024-34602.json +++ b/CVE-2024/CVE-2024-346xx/CVE-2024-34602.json @@ -2,13 +2,17 @@ "id": "CVE-2024-34602", "sourceIdentifier": "mobile.security@samsung.com", "published": "2024-07-08T07:15:02.663", - "lastModified": "2024-07-08T07:15:02.663", - "vulnStatus": "Received", + "lastModified": "2024-07-08T15:49:22.437", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Use of implicit intent for sensitive communication in Samsung Messages prior to SMR Jul-2024 Release 1 allows local attackers to get sensitive information. User interaction is required for triggering this vulnerability." + }, + { + "lang": "es", + "value": "El uso de intenci\u00f3n impl\u00edcita para comunicaciones confidenciales en Samsung Messages antes de la versi\u00f3n 1 de SMR de julio de 2024 permite a los atacantes locales obtener informaci\u00f3n confidencial. Se requiere la interacci\u00f3n del usuario para activar esta vulnerabilidad." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-346xx/CVE-2024-34603.json b/CVE-2024/CVE-2024-346xx/CVE-2024-34603.json index afb6960fef1..406a7419ed4 100644 --- a/CVE-2024/CVE-2024-346xx/CVE-2024-34603.json +++ b/CVE-2024/CVE-2024-346xx/CVE-2024-34603.json @@ -2,8 +2,8 @@ "id": "CVE-2024-34603", "sourceIdentifier": "mobile.security@samsung.com", "published": "2024-07-08T07:15:04.100", - "lastModified": "2024-07-08T07:15:04.100", - "vulnStatus": "Received", + "lastModified": "2024-07-08T15:49:22.437", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-361xx/CVE-2024-36103.json b/CVE-2024/CVE-2024-361xx/CVE-2024-36103.json index d8477deaf7f..22a9555cb90 100644 --- a/CVE-2024/CVE-2024-361xx/CVE-2024-36103.json +++ b/CVE-2024/CVE-2024-361xx/CVE-2024-36103.json @@ -2,8 +2,9 @@ "id": "CVE-2024-36103", "sourceIdentifier": "vultures@jpcert.or.jp", "published": "2024-06-12T01:15:49.220", - "lastModified": "2024-06-13T18:36:09.013", + "lastModified": "2024-07-08T14:18:36.887", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "Vulnerabilidad de inyecci\u00f3n de comandos del sistema operativo en WRC-X5400GS-B v1.0.10 y anteriores, y WRC-X5400GSA-B v1.0.10 y anteriores permite a un atacante adyacente a la red con privilegios administrativos ejecutar comandos arbitrarios del sistema operativo enviando una solicitud especialmente manipulada al producto." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 6.8, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 0.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-78" + } + ] + } + ], "references": [ { "url": "https://jvn.jp/en/vu/JVNVU97214223/", diff --git a/CVE-2024/CVE-2024-364xx/CVE-2024-36495.json b/CVE-2024/CVE-2024-364xx/CVE-2024-36495.json index dfd9853bba2..632c57063f5 100644 --- a/CVE-2024/CVE-2024-364xx/CVE-2024-36495.json +++ b/CVE-2024/CVE-2024-364xx/CVE-2024-36495.json @@ -2,15 +2,43 @@ "id": "CVE-2024-36495", "sourceIdentifier": "551230f0-3615-47bd-b7cc-93e92e730bbf", "published": "2024-06-24T09:15:09.730", - "lastModified": "2024-06-25T06:15:10.057", + "lastModified": "2024-07-08T14:18:38.843", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", "value": "The application Faronics WINSelect (Standard + Enterprise)\u00a0saves its configuration in an encrypted file on the file system\u00a0which \"Everyone\" has read and write access to, path to file:\n\n\n\nC:\\ProgramData\\WINSelect\\WINSelect.wsd\n\nThe path for\u00a0the affected WINSelect Enterprise\u00a0configuration file is:\n\nC:\\ProgramData\\Faronics\\StorageSpace\\WS\\WINSelect.wsd" + }, + { + "lang": "es", + "value": "La aplicaci\u00f3n Faronics WINSelect (Standard + Enterprise) guarda su configuraci\u00f3n en un archivo cifrado en el sistema de archivos al que \"Todos\" tiene acceso de lectura y escritura, ruta al archivo: C:\\ProgramData\\WINSelect\\WINSelect.wsd La ruta del archivo afectado El archivo de configuraci\u00f3n de WINSelect Enterprise es: C:\\ProgramData\\Faronics\\StorageSpace\\WS\\WINSelect.wsd" } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 7.7, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.5, + "impactScore": 5.2 + } + ] + }, "weaknesses": [ { "source": "551230f0-3615-47bd-b7cc-93e92e730bbf", diff --git a/CVE-2024/CVE-2024-369xx/CVE-2024-36983.json b/CVE-2024/CVE-2024-369xx/CVE-2024-36983.json index 5af81b6bfb9..a6a2fc55382 100644 --- a/CVE-2024/CVE-2024-369xx/CVE-2024-36983.json +++ b/CVE-2024/CVE-2024-369xx/CVE-2024-36983.json @@ -2,7 +2,7 @@ "id": "CVE-2024-36983", "sourceIdentifier": "prodsec@splunk.com", "published": "2024-07-01T17:15:06.257", - "lastModified": "2024-07-02T12:09:16.907", + "lastModified": "2024-07-08T14:18:39.520", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -49,6 +49,16 @@ "value": "CWE-77" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-75" + } + ] } ], "references": [ diff --git a/CVE-2024/CVE-2024-369xx/CVE-2024-36985.json b/CVE-2024/CVE-2024-369xx/CVE-2024-36985.json index 005dc4bdbd0..1777bd7aea2 100644 --- a/CVE-2024/CVE-2024-369xx/CVE-2024-36985.json +++ b/CVE-2024/CVE-2024-369xx/CVE-2024-36985.json @@ -2,7 +2,7 @@ "id": "CVE-2024-36985", "sourceIdentifier": "prodsec@splunk.com", "published": "2024-07-01T17:15:06.703", - "lastModified": "2024-07-02T12:09:16.907", + "lastModified": "2024-07-08T14:18:40.360", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -49,6 +49,16 @@ "value": "CWE-687" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-253" + } + ] } ], "references": [ diff --git a/CVE-2024/CVE-2024-369xx/CVE-2024-36997.json b/CVE-2024/CVE-2024-369xx/CVE-2024-36997.json index 6fef10bb237..262fa45fad4 100644 --- a/CVE-2024/CVE-2024-369xx/CVE-2024-36997.json +++ b/CVE-2024/CVE-2024-369xx/CVE-2024-36997.json @@ -2,7 +2,7 @@ "id": "CVE-2024-36997", "sourceIdentifier": "prodsec@splunk.com", "published": "2024-07-01T17:15:09.143", - "lastModified": "2024-07-02T12:09:16.907", + "lastModified": "2024-07-08T14:18:42.053", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -49,6 +49,16 @@ "value": "CWE-79" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-75" + } + ] } ], "references": [ diff --git a/CVE-2024/CVE-2024-36xx/CVE-2024-3651.json b/CVE-2024/CVE-2024-36xx/CVE-2024-3651.json index 495c171132a..5ca29a9e322 100644 --- a/CVE-2024/CVE-2024-36xx/CVE-2024-3651.json +++ b/CVE-2024/CVE-2024-36xx/CVE-2024-3651.json @@ -2,13 +2,17 @@ "id": "CVE-2024-3651", "sourceIdentifier": "security@huntr.dev", "published": "2024-07-07T18:15:09.827", - "lastModified": "2024-07-07T18:15:09.827", - "vulnStatus": "Received", + "lastModified": "2024-07-08T15:49:22.437", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability was identified in the kjd/idna library, specifically within the `idna.encode()` function, affecting version 3.6. The issue arises from the function's handling of crafted input strings, which can lead to quadratic complexity and consequently, a denial of service condition. This vulnerability is triggered by a crafted input that causes the `idna.encode()` function to process the input with considerable computational load, significantly increasing the processing time in a quadratic manner relative to the input size." + }, + { + "lang": "es", + "value": "Se identific\u00f3 una vulnerabilidad en la librer\u00eda kjd/idna, espec\u00edficamente dentro de la funci\u00f3n `idna.encode()`, afectando a la versi\u00f3n 3.6. El problema surge del manejo por parte de la funci\u00f3n de cadenas de entrada manipuladas, lo que puede generar complejidad cuadr\u00e1tica y, en consecuencia, una condici\u00f3n de denegaci\u00f3n de servicio. Esta vulnerabilidad se activa por una entrada manipulada que hace que la funci\u00f3n `idna.encode()` procese la entrada con una carga computacional considerable, aumentando significativamente el tiempo de procesamiento de manera cuadr\u00e1tica en relaci\u00f3n con el tama\u00f1o de la entrada." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-372xx/CVE-2024-37208.json b/CVE-2024/CVE-2024-372xx/CVE-2024-37208.json index 41d668bcfc4..ca3f1352068 100644 --- a/CVE-2024/CVE-2024-372xx/CVE-2024-37208.json +++ b/CVE-2024/CVE-2024-372xx/CVE-2024-37208.json @@ -2,13 +2,17 @@ "id": "CVE-2024-37208", "sourceIdentifier": "audit@patchstack.com", "published": "2024-07-06T10:15:01.907", - "lastModified": "2024-07-06T10:15:01.907", - "vulnStatus": "Received", + "lastModified": "2024-07-08T15:49:22.437", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Server-Side Request Forgery (SSRF) vulnerability in Robert Macchi WP Scraper.This issue affects WP Scraper: from n/a through 5.7." + }, + { + "lang": "es", + "value": " Vulnerabilidad de Server Side Request Forgery (SSRF) en Robert Macchi WP Scraper. Este problema afecta a WP Scraper: desde n/a hasta 5.7." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-372xx/CVE-2024-37234.json b/CVE-2024/CVE-2024-372xx/CVE-2024-37234.json index 68873f127e7..4935b18459c 100644 --- a/CVE-2024/CVE-2024-372xx/CVE-2024-37234.json +++ b/CVE-2024/CVE-2024-372xx/CVE-2024-37234.json @@ -2,13 +2,17 @@ "id": "CVE-2024-37234", "sourceIdentifier": "audit@patchstack.com", "published": "2024-07-06T10:15:02.913", - "lastModified": "2024-07-06T10:15:02.913", - "vulnStatus": "Received", + "lastModified": "2024-07-08T15:49:22.437", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "URL Redirection to Untrusted Site ('Open Redirect') vulnerability in Kodezen Limited Academy LMS.This issue affects Academy LMS: from n/a through 2.0.4." + }, + { + "lang": "es", + "value": " Vulnerabilidad de redirecci\u00f3n de URL a un sitio que no es de confianza (\"Open Redirect\") en Kodezen Limited Academy LMS. Este problema afecta a Academy LMS: desde n/a hasta 2.0.4." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-372xx/CVE-2024-37260.json b/CVE-2024/CVE-2024-372xx/CVE-2024-37260.json index d43cefd42cb..6950b4464f6 100644 --- a/CVE-2024/CVE-2024-372xx/CVE-2024-37260.json +++ b/CVE-2024/CVE-2024-372xx/CVE-2024-37260.json @@ -2,13 +2,17 @@ "id": "CVE-2024-37260", "sourceIdentifier": "audit@patchstack.com", "published": "2024-07-06T10:15:03.190", - "lastModified": "2024-07-06T10:15:03.190", - "vulnStatus": "Received", + "lastModified": "2024-07-08T15:49:22.437", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Server-Side Request Forgery (SSRF) vulnerability in Theme-Ruby Foxiz.This issue affects Foxiz: from n/a through 2.3.5." + }, + { + "lang": "es", + "value": " Vulnerabilidad de Server Side Request Forgery (SSRF) en Theme-Ruby Foxiz. Este problema afecta a Foxiz: desde n/a hasta 2.3.5." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-373xx/CVE-2024-37389.json b/CVE-2024/CVE-2024-373xx/CVE-2024-37389.json index b4dcf6b3c47..68f7960de68 100644 --- a/CVE-2024/CVE-2024-373xx/CVE-2024-37389.json +++ b/CVE-2024/CVE-2024-373xx/CVE-2024-37389.json @@ -2,8 +2,8 @@ "id": "CVE-2024-37389", "sourceIdentifier": "security@apache.org", "published": "2024-07-08T08:15:10.847", - "lastModified": "2024-07-08T08:15:10.847", - "vulnStatus": "Received", + "lastModified": "2024-07-08T15:49:22.437", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-375xx/CVE-2024-37528.json b/CVE-2024/CVE-2024-375xx/CVE-2024-37528.json index b16efa2084d..092c37e0b12 100644 --- a/CVE-2024/CVE-2024-375xx/CVE-2024-37528.json +++ b/CVE-2024/CVE-2024-375xx/CVE-2024-37528.json @@ -2,13 +2,17 @@ "id": "CVE-2024-37528", "sourceIdentifier": "psirt@us.ibm.com", "published": "2024-07-08T03:15:02.450", - "lastModified": "2024-07-08T03:15:02.450", - "vulnStatus": "Received", + "lastModified": "2024-07-08T15:49:22.437", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "IBM Cloud Pak for Business Automation 18.0.0, 18.0.1, 18.0.2, 19.0.1, 19.0.2, 19.0.3, 20.0.1, 20.0.2, 20.0.3, 21.0.1, 21.0.2, 21.0.3, 22.0.1, 22.0.2, 23.0.1, and 23.0.2 is vulnerable to cross-site scripting. This vulnerability allows a privileged user to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 294293." + }, + { + "lang": "es", + "value": "IBM Cloud Pak for Business Automation 18.0.0, 18.0.1, 18.0.2, 19.0.1, 19.0.2, 19.0.3, 20.0.1, 20.0.2, 20.0.3, 21.0.1, 21.0.2, 21.0.3, 22.0.1, 22.0.2, 23.0.1 y 23.0.2 son vulnerables a Cross Site Scripting. Esta vulnerabilidad permite a un usuario privilegiado incrustar c\u00f3digo JavaScript arbitrario en la interfaz de usuario web, alterando as\u00ed la funcionalidad prevista, lo que podr\u00eda conducir a la divulgaci\u00f3n de credenciales dentro de una sesi\u00f3n confiable. ID de IBM X-Force: 294293." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-375xx/CVE-2024-37539.json b/CVE-2024/CVE-2024-375xx/CVE-2024-37539.json index bc3530436ef..b9fd70c451f 100644 --- a/CVE-2024/CVE-2024-375xx/CVE-2024-37539.json +++ b/CVE-2024/CVE-2024-375xx/CVE-2024-37539.json @@ -2,13 +2,17 @@ "id": "CVE-2024-37539", "sourceIdentifier": "audit@patchstack.com", "published": "2024-07-06T13:15:10.190", - "lastModified": "2024-07-06T13:15:10.190", - "vulnStatus": "Received", + "lastModified": "2024-07-08T15:49:22.437", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Delower WP To Do allows Stored XSS.This issue affects WP To Do: from n/a through 1.3.0." + }, + { + "lang": "es", + "value": "Vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web (XSS o 'Cross-site Scripting') en Delower WP To Do permite XSS almacenado. Este problema afecta a WP To Do: desde n/a hasta 1.3.0." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-375xx/CVE-2024-37541.json b/CVE-2024/CVE-2024-375xx/CVE-2024-37541.json index ad62dd11fbe..b84fdacba96 100644 --- a/CVE-2024/CVE-2024-375xx/CVE-2024-37541.json +++ b/CVE-2024/CVE-2024-375xx/CVE-2024-37541.json @@ -2,13 +2,17 @@ "id": "CVE-2024-37541", "sourceIdentifier": "audit@patchstack.com", "published": "2024-07-06T13:15:10.437", - "lastModified": "2024-07-06T13:15:10.437", - "vulnStatus": "Received", + "lastModified": "2024-07-08T15:49:22.437", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in StaxWP Elementor Addons, Widgets and Enhancements \u2013 Stax allows Stored XSS.This issue affects Elementor Addons, Widgets and Enhancements \u2013 Stax: from n/a through 1.4.4.1." + }, + { + "lang": "es", + "value": "Vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web (XSS o 'Cross-site Scripting') en complementos, widgets y mejoras de Elementor de StaxWP: Stax permite XSS almacenado. Este problema afecta a Elementor Addons, Widgets and Enhancements \u2013 Stax: desde n/a hasta 1.4.4.1." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-375xx/CVE-2024-37542.json b/CVE-2024/CVE-2024-375xx/CVE-2024-37542.json index a6f4b62a492..2597a542e3f 100644 --- a/CVE-2024/CVE-2024-375xx/CVE-2024-37542.json +++ b/CVE-2024/CVE-2024-375xx/CVE-2024-37542.json @@ -2,13 +2,17 @@ "id": "CVE-2024-37542", "sourceIdentifier": "audit@patchstack.com", "published": "2024-07-06T13:15:10.640", - "lastModified": "2024-07-06T13:15:10.640", - "vulnStatus": "Received", + "lastModified": "2024-07-08T15:49:22.437", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Missing Authorization vulnerability in WpDevArt Responsive Image Gallery, Gallery Album.This issue affects Responsive Image Gallery, Gallery Album: from n/a through 2.0.3." + }, + { + "lang": "es", + "value": " Vulnerabilidad de autorizaci\u00f3n faltante en WpDevArt Responsive Image Gallery, Gallery Album. Este problema afecta a Responsive Image Gallery, Gallery Album: desde n/a hasta 2.0.3." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-375xx/CVE-2024-37546.json b/CVE-2024/CVE-2024-375xx/CVE-2024-37546.json index 1a435da2a95..4f04ba55fa1 100644 --- a/CVE-2024/CVE-2024-375xx/CVE-2024-37546.json +++ b/CVE-2024/CVE-2024-375xx/CVE-2024-37546.json @@ -2,13 +2,17 @@ "id": "CVE-2024-37546", "sourceIdentifier": "audit@patchstack.com", "published": "2024-07-06T15:15:10.283", - "lastModified": "2024-07-06T15:15:10.283", - "vulnStatus": "Received", + "lastModified": "2024-07-08T15:49:22.437", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in biplob018 Image Hover Effects - Caption Hover with Carousel allows Stored XSS.This issue affects Image Hover Effects - Caption Hover with Carousel: from n/a through 3.0.2." + }, + { + "lang": "es", + "value": " Vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web (XSS o 'Cross-site Scripting') en biplob018 Image Hover Effects - Caption Hover with Carousel permite XSS almacenado. Este problema afecta a Image Hover Effects - Caption Hover with Carousel: desde n/a hasta 3.0.2." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-375xx/CVE-2024-37547.json b/CVE-2024/CVE-2024-375xx/CVE-2024-37547.json index e21f26e0a63..0369ac3d8b5 100644 --- a/CVE-2024/CVE-2024-375xx/CVE-2024-37547.json +++ b/CVE-2024/CVE-2024-375xx/CVE-2024-37547.json @@ -2,13 +2,17 @@ "id": "CVE-2024-37547", "sourceIdentifier": "audit@patchstack.com", "published": "2024-07-06T15:15:10.500", - "lastModified": "2024-07-06T15:15:10.500", - "vulnStatus": "Received", + "lastModified": "2024-07-08T15:49:22.437", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in Livemesh Livemesh Addons for Elementor.This issue affects Livemesh Addons for Elementor: from n/a through 8.3.7." + }, + { + "lang": "es", + "value": "Vulnerabilidad de limitaci\u00f3n inadecuada de un nombre de ruta a un directorio restringido (\"Path Traversal\") en Livemesh Livemesh Addons para Elementor. Este problema afecta a Livemesh Addons para Elementor: desde n/a hasta 8.3.7." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-375xx/CVE-2024-37553.json b/CVE-2024/CVE-2024-375xx/CVE-2024-37553.json index 2a73719bc40..6bea5e932ce 100644 --- a/CVE-2024/CVE-2024-375xx/CVE-2024-37553.json +++ b/CVE-2024/CVE-2024-375xx/CVE-2024-37553.json @@ -2,13 +2,17 @@ "id": "CVE-2024-37553", "sourceIdentifier": "audit@patchstack.com", "published": "2024-07-06T16:15:02.023", - "lastModified": "2024-07-06T16:15:02.023", - "vulnStatus": "Received", + "lastModified": "2024-07-08T15:49:22.437", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Axelerant Testimonials Widget allows Stored XSS.This issue affects Testimonials Widget: from n/a through 4.0.4." + }, + { + "lang": "es", + "value": "Vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web (XSS o 'Cross-site Scripting') en Axelerant Testimonials Widget permite el XSS almacenado. Este problema afecta el widget de testimonios: desde n/a hasta 4.0.4." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-375xx/CVE-2024-37554.json b/CVE-2024/CVE-2024-375xx/CVE-2024-37554.json index 54770cb5103..853e070d59e 100644 --- a/CVE-2024/CVE-2024-375xx/CVE-2024-37554.json +++ b/CVE-2024/CVE-2024-375xx/CVE-2024-37554.json @@ -2,13 +2,17 @@ "id": "CVE-2024-37554", "sourceIdentifier": "audit@patchstack.com", "published": "2024-07-06T17:15:09.890", - "lastModified": "2024-07-06T17:15:09.890", - "vulnStatus": "Received", + "lastModified": "2024-07-08T15:49:22.437", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in CodeAstrology Team UltraAddons Elementor Lite (Header & Footer Builder, Menu Builder, Cart Icon, Shortcode).This issue affects UltraAddons Elementor Lite (Header & Footer Builder, Menu Builder, Cart Icon, Shortcode): from n/a through 1.1.6." + }, + { + "lang": "es", + "value": "Vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web (XSS o 'Cross-site Scripting') en CodeAstrology Team UltraAddons Elementor Lite (Header & Footer Builder, Menu Builder, Cart Icon, Shortcode). Este problema afecta a UltraAddons Elementor Lite (Header & Footer Builder, Menu Builder, Cart Icon, Shortcode): desde n/a hasta 1.1.6." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-377xx/CVE-2024-37767.json b/CVE-2024/CVE-2024-377xx/CVE-2024-37767.json index 3514cb6668b..d0d178b18ad 100644 --- a/CVE-2024/CVE-2024-377xx/CVE-2024-37767.json +++ b/CVE-2024/CVE-2024-377xx/CVE-2024-37767.json @@ -2,13 +2,17 @@ "id": "CVE-2024-37767", "sourceIdentifier": "cve@mitre.org", "published": "2024-07-05T17:15:11.533", - "lastModified": "2024-07-05T17:15:11.533", - "vulnStatus": "Received", + "lastModified": "2024-07-08T15:49:22.437", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Insecure permissions in the component /api/admin/user of 14Finger v1.1 allows attackers to access all user information via a crafted GET request." + }, + { + "lang": "es", + "value": " Los permisos inseguros en el componente /api/admin/user de 14Finger v1.1 permiten a los atacantes acceder a toda la informaci\u00f3n del usuario a trav\u00e9s de una solicitud GET manipulada." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-379xx/CVE-2024-37903.json b/CVE-2024/CVE-2024-379xx/CVE-2024-37903.json index 1205c56530d..fce7e0d76a3 100644 --- a/CVE-2024/CVE-2024-379xx/CVE-2024-37903.json +++ b/CVE-2024/CVE-2024-379xx/CVE-2024-37903.json @@ -2,13 +2,17 @@ "id": "CVE-2024-37903", "sourceIdentifier": "security-advisories@github.com", "published": "2024-07-05T18:15:32.093", - "lastModified": "2024-07-05T18:15:32.093", - "vulnStatus": "Received", + "lastModified": "2024-07-08T15:49:22.437", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Mastodon is a self-hosted, federated microblogging platform. Starting in version 2.6.0 and prior to versions 4.1.18 and 4.2.10, by crafting specific activities, an attacker can extend the audience of a post they do not own to other Mastodon users on a target server, thus gaining access to the contents of a post not intended for them. Versions 4.1.18 and 4.2.10 contain a patch for this issue." + }, + { + "lang": "es", + "value": " Mastodon es una plataforma de microblogging federada y autohospedada. A partir de la versi\u00f3n 2.6.0 y antes de las versiones 4.1.18 y 4.2.10, al crear actividades espec\u00edficas, un atacante puede ampliar la audiencia de una publicaci\u00f3n que no es de su propiedad a otros usuarios de Mastodon en un servidor de destino, obteniendo as\u00ed acceso al contenido de una publicaci\u00f3n no destinada a ellos. Las versiones 4.1.18 y 4.2.10 contienen un parche para este problema." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-379xx/CVE-2024-37999.json b/CVE-2024/CVE-2024-379xx/CVE-2024-37999.json index 3ab455730c2..e507090f670 100644 --- a/CVE-2024/CVE-2024-379xx/CVE-2024-37999.json +++ b/CVE-2024/CVE-2024-379xx/CVE-2024-37999.json @@ -2,13 +2,17 @@ "id": "CVE-2024-37999", "sourceIdentifier": "productcert@siemens.com", "published": "2024-07-08T11:15:10.487", - "lastModified": "2024-07-08T11:15:10.487", - "vulnStatus": "Received", + "lastModified": "2024-07-08T15:49:22.437", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability has been identified in Medicalis Workflow Orchestrator (All versions). The affected application executes as a trusted account with high privileges and network access. This could allow an authenticated local attacker to escalate privileges." + }, + { + "lang": "es", + "value": "Se ha identificado una vulnerabilidad en Medicalis Workflow Orchestrator (todas las versiones). La aplicaci\u00f3n afectada se ejecuta como una cuenta confiable con altos privilegios y acceso a la red. Esto podr\u00eda permitir que un atacante local autenticado escale privilegios." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-383xx/CVE-2024-38330.json b/CVE-2024/CVE-2024-383xx/CVE-2024-38330.json index 171b2e3fbdf..9b387f12fd1 100644 --- a/CVE-2024/CVE-2024-383xx/CVE-2024-38330.json +++ b/CVE-2024/CVE-2024-383xx/CVE-2024-38330.json @@ -2,13 +2,17 @@ "id": "CVE-2024-38330", "sourceIdentifier": "psirt@us.ibm.com", "published": "2024-07-08T02:15:01.963", - "lastModified": "2024-07-08T02:15:01.963", - "vulnStatus": "Received", + "lastModified": "2024-07-08T15:49:22.437", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "IBM System Management for i 7.2, 7.3, and 7.4 could allow a local user to gain elevated privileges due to an unqualified library program call. A malicious actor could cause user-controlled code to run with administrator privilege. IBM X-Force ID: 295227." + }, + { + "lang": "es", + "value": "IBM System Management para i 7.2, 7.3 y 7.4 podr\u00eda permitir que un usuario local obtenga privilegios elevados debido a una llamada no calificada a un programa de librer\u00eda. Un actor malintencionado podr\u00eda provocar que el c\u00f3digo controlado por el usuario se ejecute con privilegios de administrador. ID de IBM X-Force: 295227." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-383xx/CVE-2024-38346.json b/CVE-2024/CVE-2024-383xx/CVE-2024-38346.json index eaaf5007a00..cb9dc15e6e4 100644 --- a/CVE-2024/CVE-2024-383xx/CVE-2024-38346.json +++ b/CVE-2024/CVE-2024-383xx/CVE-2024-38346.json @@ -2,16 +2,63 @@ "id": "CVE-2024-38346", "sourceIdentifier": "security@apache.org", "published": "2024-07-05T14:15:02.867", - "lastModified": "2024-07-05T17:10:58.210", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-07-08T15:48:17.710", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The CloudStack cluster service runs on unauthenticated port (default 9090) that can be misused to run arbitrary commands on targeted hypervisors and CloudStack management server hosts. Some of these commands were found to have command injection vulnerabilities that can result in arbitrary code execution via agents on the hosts that may run as a privileged user.\u00a0An attacker that can reach the cluster service on the unauthenticated\u00a0port (default 9090), can exploit this to perform remote code execution on CloudStack managed hosts and result in complete\u00a0compromise of the confidentiality, integrity, and availability of CloudStack managed infrastructure.\n\nUsers are recommended to restrict the network access to the cluster service port (default 9090) on a CloudStack management server host to only its peer CloudStack management server hosts.\u00a0Users are recommended to upgrade to version 4.18.2.1, 4.19.0.2 or later, which addresses this issue.\n\n" + }, + { + "lang": "es", + "value": "El servicio de cl\u00faster de CloudStack se ejecuta en un puerto no autenticado (9090 predeterminado) que puede usarse indebidamente para ejecutar comandos arbitrarios en hipervisores espec\u00edficos y hosts de servidores de administraci\u00f3n de CloudStack. Se descubri\u00f3 que algunos de estos comandos ten\u00edan vulnerabilidades de inyecci\u00f3n de comandos que pueden resultar en la ejecuci\u00f3n de c\u00f3digo arbitrario a trav\u00e9s de agentes en los hosts que pueden ejecutarse como un usuario privilegiado. Un atacante que pueda acceder al servicio de cl\u00faster en el puerto no autenticado (9090 predeterminado) puede aprovechar esto para realizar la ejecuci\u00f3n remota de c\u00f3digo en hosts administrados por CloudStack y comprometer completamente la confidencialidad, integridad y disponibilidad de la infraestructura administrada por CloudStack. Se recomienda a los usuarios restringir el acceso a la red al puerto de servicio de cl\u00faster (9090 predeterminado) en un host del servidor de administraci\u00f3n de CloudStack solo a sus hosts del servidor de administraci\u00f3n de CloudStack pares. Se recomienda a los usuarios actualizar a la versi\u00f3n 4.18.2.1, 4.19.0.2 o posterior, que soluciona este problema." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, "weaknesses": [ { "source": "security@apache.org", @@ -24,22 +71,60 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:apache:cloudstack:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.0.0", + "versionEndExcluding": "4.18.2.1", + "matchCriteriaId": "3838B737-9231-4333-9777-8B49CBACC754" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:apache:cloudstack:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.19.0.0", + "versionEndExcluding": "4.19.0.2", + "matchCriteriaId": "1155DE75-1275-454F-9461-6DF70C73D1E2" + } + ] + } + ] + } + ], "references": [ { "url": "http://www.openwall.com/lists/oss-security/2024/07/05/1", - "source": "security@apache.org" + "source": "security@apache.org", + "tags": [ + "Mailing List" + ] }, { "url": "https://cloudstack.apache.org/blog/security-release-advisory-4.19.0.2-4.18.2.1", - "source": "security@apache.org" + "source": "security@apache.org", + "tags": [ + "Release Notes" + ] }, { "url": "https://lists.apache.org/thread/6l51r00csrct61plkyd3qg3fj99215d1", - "source": "security@apache.org" + "source": "security@apache.org", + "tags": [ + "Mailing List" + ] }, { "url": "https://www.shapeblue.com/shapeblue-security-advisory-apache-cloudstack-security-releases-4-18-2-1-and-4-19-0-2/", - "source": "security@apache.org" + "source": "security@apache.org", + "tags": [ + "Release Notes" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-384xx/CVE-2024-38471.json b/CVE-2024/CVE-2024-384xx/CVE-2024-38471.json index dfbd4d5f39b..19638794879 100644 --- a/CVE-2024/CVE-2024-384xx/CVE-2024-38471.json +++ b/CVE-2024/CVE-2024-384xx/CVE-2024-38471.json @@ -2,7 +2,7 @@ "id": "CVE-2024-38471", "sourceIdentifier": "vultures@jpcert.or.jp", "published": "2024-07-04T01:15:02.400", - "lastModified": "2024-07-05T12:55:51.367", + "lastModified": "2024-07-08T14:18:45.747", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,30 @@ "value": "M\u00faltiples productos TP-LINK permiten a un atacante adyacente a la red con privilegios administrativos ejecutar comandos arbitrarios del sistema operativo mediante la restauraci\u00f3n de un archivo de copia de seguridad manipulado. El dispositivo afectado, con la configuraci\u00f3n inicial, permite iniciar sesi\u00f3n \u00fanicamente desde el puerto LAN o Wi-Fi." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 6.8, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 0.9, + "impactScore": 5.9 + } + ] + }, "references": [ { "url": "https://jvn.jp/en/vu/JVNVU99784493/", diff --git a/CVE-2024/CVE-2024-384xx/CVE-2024-38475.json b/CVE-2024/CVE-2024-384xx/CVE-2024-38475.json index 3aedf7b4a7b..c9ba9afb748 100644 --- a/CVE-2024/CVE-2024-384xx/CVE-2024-38475.json +++ b/CVE-2024/CVE-2024-384xx/CVE-2024-38475.json @@ -2,7 +2,7 @@ "id": "CVE-2024-38475", "sourceIdentifier": "security@apache.org", "published": "2024-07-01T19:15:04.883", - "lastModified": "2024-07-02T12:09:16.907", + "lastModified": "2024-07-08T14:18:45.973", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,30 @@ "value": "El escape inadecuado de la salida en mod_rewrite en Apache HTTP Server 2.4.59 y versiones anteriores permite a un atacante asignar URL a ubicaciones del sistema de archivos que el servidor permite servir, pero a las que no se puede acceder intencional o directamente mediante ninguna URL, dando como resultado la ejecuci\u00f3n del c\u00f3digo o la divulgaci\u00f3n del c\u00f3digo fuente. Las sustituciones en el contexto del servidor que utilizan referencias inversas o variables como primer segmento de la sustituci\u00f3n se ven afectadas. Este cambio romper\u00e1 algunas RewiteRules inseguras y el indicador de reescritura \"UnsafePrefixStat\" se puede usar para volver a participar una vez que se garantice que la sustituci\u00f3n est\u00e9 restringida adecuadamente." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 9.1, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.2 + } + ] + }, "weaknesses": [ { "source": "security@apache.org", diff --git a/CVE-2024/CVE-2024-389xx/CVE-2024-38949.json b/CVE-2024/CVE-2024-389xx/CVE-2024-38949.json index cf068934971..0895a330ba0 100644 --- a/CVE-2024/CVE-2024-389xx/CVE-2024-38949.json +++ b/CVE-2024/CVE-2024-389xx/CVE-2024-38949.json @@ -2,8 +2,9 @@ "id": "CVE-2024-38949", "sourceIdentifier": "cve@mitre.org", "published": "2024-06-26T20:15:16.263", - "lastModified": "2024-06-27T12:47:19.847", + "lastModified": "2024-07-08T14:18:46.730", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": " La vulnerabilidad de desbordamiento de b\u00fafer de mont\u00f3n en Libde265 v1.0.15 permite a los atacantes bloquear la aplicaci\u00f3n mediante un payload manipulado para mostrar la funci\u00f3n 444as420 en sdl.cc" } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 6.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-122" + } + ] + } + ], "references": [ { "url": "https://github.com/strukturag/libde265/issues/460", diff --git a/CVE-2024/CVE-2024-390xx/CVE-2024-39019.json b/CVE-2024/CVE-2024-390xx/CVE-2024-39019.json index 032640081ce..03d955fff54 100644 --- a/CVE-2024/CVE-2024-390xx/CVE-2024-39019.json +++ b/CVE-2024/CVE-2024-390xx/CVE-2024-39019.json @@ -2,13 +2,17 @@ "id": "CVE-2024-39019", "sourceIdentifier": "cve@mitre.org", "published": "2024-07-05T19:15:09.840", - "lastModified": "2024-07-05T19:15:09.840", - "vulnStatus": "Received", + "lastModified": "2024-07-08T15:49:22.437", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "idccms v1.35 was discovered to contain a Cross-Site Request Forgery (CSRF) vulnerability via /admin/idcProData_deal.php?mudi=del" + }, + { + "lang": "es", + "value": " Se descubri\u00f3 que idccms v1.35 contiene una vulnerabilidad de Cross Site Request Forgery (CSRF) a trav\u00e9s de /admin/idcProData_deal.php?mudi=del" } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-390xx/CVE-2024-39020.json b/CVE-2024/CVE-2024-390xx/CVE-2024-39020.json index 6d3f6923f02..a35c84b820b 100644 --- a/CVE-2024/CVE-2024-390xx/CVE-2024-39020.json +++ b/CVE-2024/CVE-2024-390xx/CVE-2024-39020.json @@ -2,13 +2,17 @@ "id": "CVE-2024-39020", "sourceIdentifier": "cve@mitre.org", "published": "2024-07-05T19:15:09.920", - "lastModified": "2024-07-05T19:15:09.920", - "vulnStatus": "Received", + "lastModified": "2024-07-08T15:49:22.437", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "idccms v1.35 was discovered to contain a Cross-Site Request Forgery (CSRF) vulnerability via /admin/vpsApiData_deal.php?mudi=rev&nohrefStr=close" + }, + { + "lang": "es", + "value": " Se descubri\u00f3 que idccms v1.35 contiene una vulnerabilidad de Cross Site Request Forgery (CSRF) a trav\u00e9s de /admin/vpsApiData_deal.php?mudi=rev&nohrefStr=close" } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-390xx/CVE-2024-39021.json b/CVE-2024/CVE-2024-390xx/CVE-2024-39021.json index 37c2cd90032..ea96a14be52 100644 --- a/CVE-2024/CVE-2024-390xx/CVE-2024-39021.json +++ b/CVE-2024/CVE-2024-390xx/CVE-2024-39021.json @@ -2,13 +2,17 @@ "id": "CVE-2024-39021", "sourceIdentifier": "cve@mitre.org", "published": "2024-07-05T19:15:10.000", - "lastModified": "2024-07-05T19:15:10.000", - "vulnStatus": "Received", + "lastModified": "2024-07-08T15:49:22.437", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "idccms v1.35 was discovered to contain a Cross-Site Request Forgery (CSRF) via the component http://127.0.0.1:80/admin/vpsApiData_deal.php?mudi=del" + }, + { + "lang": "es", + "value": "Se descubri\u00f3 que idccms v1.35 conten\u00eda una falsificaci\u00f3n de solicitud entre sitios (CSRF) a trav\u00e9s del componente http://127.0.0.1:80/admin/vpsApiData_deal.php?mudi=del" } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-390xx/CVE-2024-39022.json b/CVE-2024/CVE-2024-390xx/CVE-2024-39022.json index ac4f1b09226..eb05b4123d6 100644 --- a/CVE-2024/CVE-2024-390xx/CVE-2024-39022.json +++ b/CVE-2024/CVE-2024-390xx/CVE-2024-39022.json @@ -2,13 +2,17 @@ "id": "CVE-2024-39022", "sourceIdentifier": "cve@mitre.org", "published": "2024-07-05T19:15:10.087", - "lastModified": "2024-07-05T19:15:10.087", - "vulnStatus": "Received", + "lastModified": "2024-07-08T15:49:22.437", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "idccms v1.35 was discovered to contain a Cross-Site Request Forgery (CSRF) vulnerability via /admin/infoSys_deal.php?mudi=deal" + }, + { + "lang": "es", + "value": " Se descubri\u00f3 que idccms v1.35 conten\u00eda una vulnerabilidad de Cross Site Request Forgery (CSRF) a trav\u00e9s de /admin/infoSys_deal.php?mudi=deal" } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-390xx/CVE-2024-39023.json b/CVE-2024/CVE-2024-390xx/CVE-2024-39023.json index f8dc988c4ae..4bd70ec4366 100644 --- a/CVE-2024/CVE-2024-390xx/CVE-2024-39023.json +++ b/CVE-2024/CVE-2024-390xx/CVE-2024-39023.json @@ -2,13 +2,17 @@ "id": "CVE-2024-39023", "sourceIdentifier": "cve@mitre.org", "published": "2024-07-05T19:15:10.167", - "lastModified": "2024-07-05T19:15:10.167", - "vulnStatus": "Received", + "lastModified": "2024-07-08T15:49:22.437", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "idccms v1.35 was discovered to contain a Cross-Site Request Forgery (CSRF) vulnerability via admin/info_deal.php?mudi=add&nohrefStr=close" + }, + { + "lang": "es", + "value": " Se descubri\u00f3 que idccms v1.35 contiene una vulnerabilidad de Cross Site Request Forgery (CSRF) a trav\u00e9s de admin/info_deal.php?mudi=add&nohrefStr=close" } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-390xx/CVE-2024-39027.json b/CVE-2024/CVE-2024-390xx/CVE-2024-39027.json index fc8d2393c47..6a7d5e322ca 100644 --- a/CVE-2024/CVE-2024-390xx/CVE-2024-39027.json +++ b/CVE-2024/CVE-2024-390xx/CVE-2024-39027.json @@ -2,20 +2,80 @@ "id": "CVE-2024-39027", "sourceIdentifier": "cve@mitre.org", "published": "2024-07-05T14:15:02.997", - "lastModified": "2024-07-05T17:10:58.210", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-07-08T15:48:01.000", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "SeaCMS v12.9 has an unauthorized SQL injection vulnerability. The vulnerability is caused by the SQL injection through the cid parameter at /js/player/dmplayer/dmku/index.php?ac=edit, which can cause sensitive database information to be leaked." + }, + { + "lang": "es", + "value": "SeaCMS v12.9 tiene una vulnerabilidad de inyecci\u00f3n SQL no autorizada. La vulnerabilidad es causada por la inyecci\u00f3n SQL a trav\u00e9s del par\u00e1metro cid en /js/player/dmplayer/dmku/index.php?ac=edit, lo que puede causar que se filtre informaci\u00f3n confidencial de la base de datos." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:seacms:seacms:12.9:*:*:*:*:*:*:*", + "matchCriteriaId": "5A52C0BF-703A-4BF0-A5A9-E3995C30FE0D" + } + ] + } + ] } ], - "metrics": {}, "references": [ { "url": "https://github.com/seacms-net/CMS/issues/17", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Issue Tracking" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-390xx/CVE-2024-39028.json b/CVE-2024/CVE-2024-390xx/CVE-2024-39028.json index 6f0f1a41a47..4e9503e309b 100644 --- a/CVE-2024/CVE-2024-390xx/CVE-2024-39028.json +++ b/CVE-2024/CVE-2024-390xx/CVE-2024-39028.json @@ -2,20 +2,80 @@ "id": "CVE-2024-39028", "sourceIdentifier": "cve@mitre.org", "published": "2024-07-05T14:15:03.100", - "lastModified": "2024-07-05T17:10:58.210", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-07-08T15:47:26.720", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "An issue was discovered in SeaCMS <=12.9 which allows remote attackers to execute arbitrary code via admin_ping.php." + }, + { + "lang": "es", + "value": " Se descubri\u00f3 un problema en SeaCMS <=12.9 que permite a atacantes remotos ejecutar c\u00f3digo arbitrario a trav\u00e9s de admin_ping.php." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:seacms:seacms:*:*:*:*:*:*:*:*", + "versionEndIncluding": "12.9", + "matchCriteriaId": "4B114546-6AB3-471D-BB71-4AE0B0443265" + } + ] + } + ] } ], - "metrics": {}, "references": [ { "url": "https://github.com/pysnow1/vul_discovery/blob/main/SeaCMS/SeaCMS%20v12.9%20admin_ping.php%20RCE.md", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-391xx/CVE-2024-39150.json b/CVE-2024/CVE-2024-391xx/CVE-2024-39150.json index b00af69fa33..1fd1d30e72a 100644 --- a/CVE-2024/CVE-2024-391xx/CVE-2024-39150.json +++ b/CVE-2024/CVE-2024-391xx/CVE-2024-39150.json @@ -2,13 +2,17 @@ "id": "CVE-2024-39150", "sourceIdentifier": "cve@mitre.org", "published": "2024-07-05T17:15:11.610", - "lastModified": "2024-07-05T17:15:11.610", - "vulnStatus": "Received", + "lastModified": "2024-07-08T15:49:22.437", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "vditor v.3.9.8 and before is vulnerable to Arbitrary file read via a crafted data packet." + }, + { + "lang": "es", + "value": " vditor v.3.9.8 y anteriores es vulnerable a la lectura arbitraria de archivos a trav\u00e9s de un paquete de datos manipulado." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-391xx/CVE-2024-39154.json b/CVE-2024/CVE-2024-391xx/CVE-2024-39154.json index 99051e841bd..833dc4a68d0 100644 --- a/CVE-2024/CVE-2024-391xx/CVE-2024-39154.json +++ b/CVE-2024/CVE-2024-391xx/CVE-2024-39154.json @@ -2,15 +2,55 @@ "id": "CVE-2024-39154", "sourceIdentifier": "cve@mitre.org", "published": "2024-06-27T14:15:15.817", - "lastModified": "2024-06-27T17:11:52.390", + "lastModified": "2024-07-08T14:18:48.860", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", "value": "idccms v1.35 was discovered to contain a Cross-Site Request Forgery (CSRF) via the component /admin/keyWord_deal.php?mudi=del&dataType=word&dataTypeCN." + }, + { + "lang": "es", + "value": "Se descubri\u00f3 que idccms v1.35 conten\u00eda Cross-Site Request Forgery (CSRF) a trav\u00e9s del componente /admin/keyWord_deal.php?mudi=del&dataType=word&dataTypeCN." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] } ], - "metrics": {}, "references": [ { "url": "https://github.com/Thirtypenny77/cms2/blob/main/54/csrf.md", diff --git a/CVE-2024/CVE-2024-391xx/CVE-2024-39174.json b/CVE-2024/CVE-2024-391xx/CVE-2024-39174.json index 655b787e903..7db59e84170 100644 --- a/CVE-2024/CVE-2024-391xx/CVE-2024-39174.json +++ b/CVE-2024/CVE-2024-391xx/CVE-2024-39174.json @@ -2,16 +2,55 @@ "id": "CVE-2024-39174", "sourceIdentifier": "cve@mitre.org", "published": "2024-07-05T18:15:32.350", - "lastModified": "2024-07-05T18:15:32.350", - "vulnStatus": "Received", + "lastModified": "2024-07-08T15:49:22.437", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A cross-site scripting (XSS) vulnerability in the Publish Article function of yzmcms v7.1 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into a published article." + }, + { + "lang": "es", + "value": " Una vulnerabilidad de Cross Site Scripting (XSS) en la funci\u00f3n Publicar art\u00edculo de yzmcms v7.1 permite a los atacantes ejecutar scripts web o HTML arbitrarios a trav\u00e9s de un payload manipulado inyectado en un art\u00edculo publicado." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 6.1, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] } ], - "metrics": {}, "references": [ { "url": "https://github.com/0x1ang/cvepbulic/issues/1", diff --git a/CVE-2024/CVE-2024-391xx/CVE-2024-39178.json b/CVE-2024/CVE-2024-391xx/CVE-2024-39178.json index e2475f4788a..c771083cbb0 100644 --- a/CVE-2024/CVE-2024-391xx/CVE-2024-39178.json +++ b/CVE-2024/CVE-2024-391xx/CVE-2024-39178.json @@ -2,13 +2,17 @@ "id": "CVE-2024-39178", "sourceIdentifier": "cve@mitre.org", "published": "2024-07-05T17:15:11.690", - "lastModified": "2024-07-05T17:15:11.690", - "vulnStatus": "Received", + "lastModified": "2024-07-08T15:49:22.437", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "MyPower vc8100 V100R001C00B030 was discovered to contain an arbitrary file read vulnerability via the component /tcpdump/tcpdump.php?menu_uuid." + }, + { + "lang": "es", + "value": " Se descubri\u00f3 que MyPower vc8100 V100R001C00B030 conten\u00eda una vulnerabilidad de lectura de archivos arbitraria a trav\u00e9s del componente /tcpdump/tcpdump.php?menu_uuid." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-391xx/CVE-2024-39182.json b/CVE-2024/CVE-2024-391xx/CVE-2024-39182.json index 6832bef7fca..6f8a3630982 100644 --- a/CVE-2024/CVE-2024-391xx/CVE-2024-39182.json +++ b/CVE-2024/CVE-2024-391xx/CVE-2024-39182.json @@ -2,13 +2,17 @@ "id": "CVE-2024-39182", "sourceIdentifier": "cve@mitre.org", "published": "2024-07-05T23:15:10.137", - "lastModified": "2024-07-05T23:15:10.137", - "vulnStatus": "Received", + "lastModified": "2024-07-08T15:49:22.437", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "An information disclosure vulnerability in ISPmanager v6.98.0 allows attackers to access sensitive details of the root user's session via an arbitrary command (ISP6-1779)." + }, + { + "lang": "es", + "value": " Una vulnerabilidad de divulgaci\u00f3n de informaci\u00f3n en ISPmanager v6.98.0 permite a los atacantes acceder a detalles confidenciales de la sesi\u00f3n del usuario root mediante un comando arbitrario (ISP6-1779)." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-392xx/CVE-2024-39206.json b/CVE-2024/CVE-2024-392xx/CVE-2024-39206.json index 6354c0ba7f4..7ac2eb95c79 100644 --- a/CVE-2024/CVE-2024-392xx/CVE-2024-39206.json +++ b/CVE-2024/CVE-2024-392xx/CVE-2024-39206.json @@ -2,7 +2,7 @@ "id": "CVE-2024-39206", "sourceIdentifier": "cve@mitre.org", "published": "2024-07-02T18:15:03.290", - "lastModified": "2024-07-03T12:53:24.977", + "lastModified": "2024-07-08T14:18:50.487", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Un problema descubierto en MSP360 Backup Agent v7.8.5.15 y v7.9.4.84 permite a los atacantes obtener credenciales de recursos compartidos de red utilizadas en una copia de seguridad debido a que Enginesettings.list est\u00e1 cifrado con una clave codificada." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-269" + } + ] + } + ], "references": [ { "url": "https://www.proactivelabs.com.au/2024/06/19/cloudberry.html", diff --git a/CVE-2024/CVE-2024-393xx/CVE-2024-39308.json b/CVE-2024/CVE-2024-393xx/CVE-2024-39308.json new file mode 100644 index 00000000000..15b9aaab0f9 --- /dev/null +++ b/CVE-2024/CVE-2024-393xx/CVE-2024-39308.json @@ -0,0 +1,76 @@ +{ + "id": "CVE-2024-39308", + "sourceIdentifier": "security-advisories@github.com", + "published": "2024-07-08T15:15:22.080", + "lastModified": "2024-07-08T15:49:22.437", + "vulnStatus": "Undergoing Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "RailsAdmin is a Rails engine that provides an interface for managing data. RailsAdmin list view has the XSS vulnerability, caused by improperly-escaped HTML title attribute. Upgrade to 3.1.3 or 2.2.2 (to be released)." + } + ], + "metrics": { + "cvssMetricV30": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "cvssData": { + "version": "3.0", + "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 6.8, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.3, + "impactScore": 4.0 + } + ] + }, + "weaknesses": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/railsadminteam/rails_admin/commit/b5a287d82e2cbd1737a1a01e11ede2911cce7fef", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/railsadminteam/rails_admin/commit/d84b39884059c4ed50197cec8522cca029a17673", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/railsadminteam/rails_admin/issues/3686", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/railsadminteam/rails_admin/security/advisories/GHSA-8qgm-g2vv-vwvc", + "source": "security-advisories@github.com" + }, + { + "url": "https://rubygems.org/gems/rails_admin/versions/2.3.0", + "source": "security-advisories@github.com" + }, + { + "url": "https://rubygems.org/gems/rails_admin/versions/3.1.3", + "source": "security-advisories@github.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-393xx/CVE-2024-39321.json b/CVE-2024/CVE-2024-393xx/CVE-2024-39321.json index c76dc349064..56ff3dd6af4 100644 --- a/CVE-2024/CVE-2024-393xx/CVE-2024-39321.json +++ b/CVE-2024/CVE-2024-393xx/CVE-2024-39321.json @@ -2,13 +2,17 @@ "id": "CVE-2024-39321", "sourceIdentifier": "security-advisories@github.com", "published": "2024-07-05T18:15:32.430", - "lastModified": "2024-07-05T18:15:32.430", - "vulnStatus": "Received", + "lastModified": "2024-07-08T15:49:22.437", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Traefik is an HTTP reverse proxy and load balancer. Versions prior to 2.11.6, 3.0.4, and 3.1.0-rc3 have a vulnerability that allows bypassing IP allow-lists via HTTP/3 early data requests in QUIC 0-RTT handshakes sent with spoofed IP addresses. Versions 2.11.6, 3.0.4, and 3.1.0-rc3 contain a patch for this issue. No known workarounds are available." + }, + { + "lang": "es", + "value": "Traefik es un proxy inverso HTTP y un equilibrador de carga. Las versiones anteriores a 2.11.6, 3.0.4 y 3.1.0-rc3 tienen una vulnerabilidad que permite eludir las listas de direcciones IP permitidas a trav\u00e9s de solicitudes de datos tempranas HTTP/3 en protocolos de enlace QUIC 0-RTT enviados con direcciones IP falsificadas. Las versiones 2.11.6, 3.0.4 y 3.1.0-rc3 contienen un parche para este problema. No hay soluciones conocidas disponibles." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-394xx/CVE-2024-39479.json b/CVE-2024/CVE-2024-394xx/CVE-2024-39479.json index c59f6b37341..af7cdf58f2d 100644 --- a/CVE-2024/CVE-2024-394xx/CVE-2024-39479.json +++ b/CVE-2024/CVE-2024-394xx/CVE-2024-39479.json @@ -2,8 +2,8 @@ "id": "CVE-2024-39479", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-07-05T07:15:10.530", - "lastModified": "2024-07-05T12:55:51.367", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-07-08T14:18:53.007", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { @@ -15,7 +15,42 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: drm/i915/hwmon: deshacerse de devm Cuando tanto hwmon como hwmon drvdata (del cual depende hwmon) son recursos administrados por el dispositivo, la expectativa, al desvincular el dispositivo, es que hwmon publicarse antes que drvdata. Sin embargo, en i915 hay dos rutas de c\u00f3digo independientes, que liberan drvdata o hwmon y cualquiera de ellas puede publicarse antes que la otra. Estas rutas de c\u00f3digo (para desvincular el dispositivo) son las siguientes (consulte tambi\u00e9n el error al que se hace referencia a continuaci\u00f3n): Seguimiento de llamadas: release_nodes+0x11/0x70 devres_release_group+0xb2/0x110 componente_unbind_all+0x8d/0xa0 componente_del+0xa5/0x140 intel_pxp_tee_component_fini+0x29/0x40 [i915 ] intel_pxp_fini+0x33/0x80 [i915] i915_driver_remove+0x4c/0x120 [i915] i915_pci_remove+0x19/0x30 [i915] pci_device_remove+0x32/0xa0 dispositivo_release_driver_internal+0x19c/0x200 store+0x9c/0xb0 y seguimiento de llamadas: release_nodes+0x11/0x70 devres_release_all +0x8a/0xc0 device_unbind_cleanup+0x9/0x70 device_release_driver_internal+0x1c1/0x200 unbind_store+0x9c/0xb0 Esto significa que en i915, si usa devm, no podemos garantizar que hwmon siempre se publicar\u00e1 antes que drvdata. Lo que significa que tenemos un uaf si se accede a hwmon sysfs cuando drvdata se lanz\u00f3 pero hwmon no. La \u00fanica forma de solucionar esto parece ser deshacerse de devm_ y liberar/liberar todo expl\u00edcitamente durante la desvinculaci\u00f3n del dispositivo. v2: Cambiar mensaje de confirmaci\u00f3n y otros cambios menores de c\u00f3digo v3: Limpieza de i915_hwmon_register en caso de error (Armin Wolf) v4: Eliminar posible advertencia del analizador est\u00e1tico (Rodrigo) Eliminar fetch_and_zero (Jani) v5: Restaurar la l\u00f3gica anterior para el retorno de error ddat_gt->hwmon_dev (Andi )" } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-400" + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/5bc9de065b8bb9b8dd8799ecb4592d0403b54281", diff --git a/CVE-2024/CVE-2024-394xx/CVE-2024-39485.json b/CVE-2024/CVE-2024-394xx/CVE-2024-39485.json index e5fc28e8f07..b0405f8d5b4 100644 --- a/CVE-2024/CVE-2024-394xx/CVE-2024-39485.json +++ b/CVE-2024/CVE-2024-394xx/CVE-2024-39485.json @@ -2,8 +2,8 @@ "id": "CVE-2024-39485", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-07-05T07:15:10.890", - "lastModified": "2024-07-05T12:55:51.367", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-07-08T15:36:56.127", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,19 +15,96 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: medios: v4l: async: Reinicializar correctamente la entrada del notificador al cancelar el registro Notifier_entry de un notificador no se reinicializa despu\u00e9s de cancelar el registro del notificador. Esto lleva a que se dejen punteros colgando all\u00ed, as\u00ed que use list_del_init() para devolver notifier_entry una lista vac\u00eda." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-665" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionEndExcluding": "6.6.34", + "matchCriteriaId": "C7071BF4-1719-4EB3-A730-D16A4E66C60F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.9", + "versionEndExcluding": "6.9.5", + "matchCriteriaId": "54EDFD02-25E6-4BC8-9AD0-0A59881F400A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.10.0:rc1:*:*:*:*:*:*", + "matchCriteriaId": "C40DD2D9-90E3-4E95-9F1A-E7C680F11F2A" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/1aa6cd4adfc0380fa1ccc2f146848940ff882a66", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Mailing List", + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/87100b09246202a91fce4a1562955c32229173bb", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Mailing List", + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/9537a8425a7a0222999d5839a0b394b1e8834b4a", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Mailing List", + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-394xx/CVE-2024-39486.json b/CVE-2024/CVE-2024-394xx/CVE-2024-39486.json index f2177861fac..2e79c67c13b 100644 --- a/CVE-2024/CVE-2024-394xx/CVE-2024-39486.json +++ b/CVE-2024/CVE-2024-394xx/CVE-2024-39486.json @@ -2,13 +2,17 @@ "id": "CVE-2024-39486", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-07-06T10:15:03.393", - "lastModified": "2024-07-06T10:15:03.393", - "vulnStatus": "Received", + "lastModified": "2024-07-08T15:49:22.437", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/drm_file: Fix pid refcounting race\n\n\nfilp->pid is supposed to be a refcounted pointer; however, before this\npatch, drm_file_update_pid() only increments the refcount of a struct\npid after storing a pointer to it in filp->pid and dropping the\ndev->filelist_mutex, making the following race possible:\n\nprocess A process B\n========= =========\n begin drm_file_update_pid\n mutex_lock(&dev->filelist_mutex)\n rcu_replace_pointer(filp->pid, , 1)\n mutex_unlock(&dev->filelist_mutex)\nbegin drm_file_update_pid\nmutex_lock(&dev->filelist_mutex)\nrcu_replace_pointer(filp->pid, , 1)\nmutex_unlock(&dev->filelist_mutex)\nget_pid()\nsynchronize_rcu()\nput_pid() *** pid B reaches refcount 0 and is freed here ***\n get_pid() *** UAF ***\n synchronize_rcu()\n put_pid()\n\nAs far as I know, this race can only occur with CONFIG_PREEMPT_RCU=y\nbecause it requires RCU to detect a quiescent state in code that is not\nexplicitly calling into the scheduler.\n\nThis race leads to use-after-free of a \"struct pid\".\nIt is probably somewhat hard to hit because process A has to pass\nthrough a synchronize_rcu() operation while process B is between\nmutex_unlock() and get_pid().\n\nFix it by ensuring that by the time a pointer to the current task's pid\nis stored in the file, an extra reference to the pid has been taken.\n\nThis fix also removes the condition for synchronize_rcu(); I think\nthat optimization is unnecessary complexity, since in that case we\nwould usually have bailed out on the lockless check above." + }, + { + "lang": "es", + "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: drm/drm_file: corrige la carrera de recuento de pid filp->pid se supone que es un puntero recontado; sin embargo, antes de este parche, drm_file_update_pid() solo incrementa el recuento de una estructura pid despu\u00e9s de almacenar un puntero a ella en filp->pid y eliminar dev->filelist_mutex, haciendo posible la siguiente carrera: proceso A proceso B ==== ===== ========= comenzar drm_file_update_pid mutex_lock(&dev->filelist_mutex) rcu_replace_pointer(filp->pid, , 1) mutex_unlock(&dev->filelist_mutex) begin drm_file_update_pid mutex_lock(&dev- >filelist_mutex) rcu_replace_pointer(filp->pid, , 1) mutex_unlock(&dev->filelist_mutex) get_pid() synchronize_rcu() put_pid() *** pid B alcanza refcount 0 y se libera aqu\u00ed *** get_pid() *** UAF *** synchronize_rcu() put_pid() Hasta donde yo s\u00e9, esta carrera solo puede ocurrir con CONFIG_PREEMPT_RCU=y porque requiere que RCU detecte un estado inactivo en el c\u00f3digo que no llame expl\u00edcitamente al programador. Esta ejecuc\u00f3n conduce al use after free de una \"estructura pid\". Probablemente sea algo dif\u00edcil de lograr porque el proceso A tiene que pasar por una operaci\u00f3n synchronize_rcu() mientras que el proceso B est\u00e1 entre mutex_unlock() y get_pid(). Solucionelo asegur\u00e1ndose de que cuando se almacene en el archivo un puntero al pid de la tarea actual, se haya tomado una referencia adicional al pid. Esta soluci\u00f3n tambi\u00e9n elimina la condici\u00f3n de synchronize_rcu(); Creo que la optimizaci\u00f3n es una complejidad innecesaria, ya que en ese caso normalmente habr\u00edamos abandonado la verificaci\u00f3n sin bloqueo anterior." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-396xx/CVE-2024-39677.json b/CVE-2024/CVE-2024-396xx/CVE-2024-39677.json new file mode 100644 index 00000000000..d75630b73fa --- /dev/null +++ b/CVE-2024/CVE-2024-396xx/CVE-2024-39677.json @@ -0,0 +1,72 @@ +{ + "id": "CVE-2024-39677", + "sourceIdentifier": "security-advisories@github.com", + "published": "2024-07-08T15:15:22.450", + "lastModified": "2024-07-08T15:49:22.437", + "vulnStatus": "Undergoing Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "NHibernate is an object-relational mapper for the .NET framework. A SQL injection vulnerability exists in some types implementing ILiteralType.ObjectToSQLString. Callers of these methods are exposed to the vulnerability, which includes mappings using inheritance with discriminator values; HQL queries referencing a static field of the application; users of the SqlInsertBuilder and SqlUpdateBuilder utilities, calling their AddColumn overload taking a literal value; and any direct use of the ObjectToSQLString methods for building SQL queries on the user side. This vulnerability is fixed in 5.4.9 and 5.5.2." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 5.9, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.2, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/nhibernate/nhibernate-core/commit/b4a69d1a5ff5744312478d70308329af496e4ba9", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/nhibernate/nhibernate-core/issues/3516", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/nhibernate/nhibernate-core/pull/3517", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/nhibernate/nhibernate-core/pull/3547", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/nhibernate/nhibernate-core/security/advisories/GHSA-fg4q-ccq8-3r5q", + "source": "security-advisories@github.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-396xx/CVE-2024-39687.json b/CVE-2024/CVE-2024-396xx/CVE-2024-39687.json index 05cd949d95c..69a4b7188ab 100644 --- a/CVE-2024/CVE-2024-396xx/CVE-2024-39687.json +++ b/CVE-2024/CVE-2024-396xx/CVE-2024-39687.json @@ -2,13 +2,17 @@ "id": "CVE-2024-39687", "sourceIdentifier": "security-advisories@github.com", "published": "2024-07-05T18:15:32.663", - "lastModified": "2024-07-05T18:15:32.663", - "vulnStatus": "Received", + "lastModified": "2024-07-08T15:49:22.437", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Fedify is a TypeScript library for building federated server apps powered by ActivityPub and other standards. At present, when Fedify needs to retrieve an object or activity from a remote activitypub server, it makes a HTTP request to the `@id` or other resources present within the activity it has received from the web. This activity could reference an `@id` that points to an internal IP address, allowing an attacker to send request to resources internal to the fedify server's network. This applies to not just resolution of documents containing activities or objects, but also to media URLs as well. Specifically this is a Server Side Request Forgery attack. Users should upgrade to Fedify version 0.9.2, 0.10.1, or 0.11.1 to receive a patch for this issue." + }, + { + "lang": "es", + "value": "Fedify es una biblioteca de TypeScript para crear aplicaciones de servidor federado impulsadas por ActivityPub y otros est\u00e1ndares. En la actualidad, cuando Fedify necesita recuperar un objeto o actividad de un servidor de actividad remoto, realiza una solicitud HTTP al `@id` u otros recursos presentes dentro de la actividad que ha recibido de la web. Esta actividad podr\u00eda hacer referencia a un `@id` que apunta a una direcci\u00f3n IP interna, permitiendo a un atacante enviar solicitudes a recursos internos de la red del servidor de Fedify. Esto se aplica no s\u00f3lo a la resoluci\u00f3n de documentos que contienen actividades u objetos, sino tambi\u00e9n a las URL de medios. Espec\u00edficamente, se trata de un ataque de Server Side Request Forgery. Los usuarios deben actualizar a Fedify versi\u00f3n 0.9.2, 0.10.1 o 0.11.1 para recibir un parche para este problema." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-396xx/CVE-2024-39689.json b/CVE-2024/CVE-2024-396xx/CVE-2024-39689.json index eea20fe8c8b..532d3da7198 100644 --- a/CVE-2024/CVE-2024-396xx/CVE-2024-39689.json +++ b/CVE-2024/CVE-2024-396xx/CVE-2024-39689.json @@ -2,13 +2,17 @@ "id": "CVE-2024-39689", "sourceIdentifier": "security-advisories@github.com", "published": "2024-07-05T19:15:10.247", - "lastModified": "2024-07-05T19:15:10.247", - "vulnStatus": "Received", + "lastModified": "2024-07-08T15:49:22.437", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Certifi is a curated collection of Root Certificates for validating the trustworthiness of SSL certificates while verifying the identity of TLS hosts. Certifi starting in 2021.05.30 and prior to 2024.07.4 recognized root certificates from `GLOBALTRUST`. Certifi 2024.07.04 removes root certificates from `GLOBALTRUST` from the root store. These are in the process of being removed from Mozilla's trust store. `GLOBALTRUST`'s root certificates are being removed pursuant to an investigation which identified \"long-running and unresolved compliance issues.\"" + }, + { + "lang": "es", + "value": " Certifi es una colecci\u00f3n seleccionada de certificados ra\u00edz para validar la confiabilidad de los certificados SSL mientras se verifica la identidad de los hosts TLS. Certifi a partir de 2021.05.30 y antes de 2024.07.4 reconoci\u00f3 los certificados ra\u00edz de `GLOBALTRUST`. Certifi 2024.07.04 elimina los certificados ra\u00edz de `GLOBALTRUST` del almac\u00e9n ra\u00edz. Estos est\u00e1n en proceso de ser eliminados del almac\u00e9n de confianza de Mozilla. Los certificados ra\u00edz de \"GLOBALTRUST\" se est\u00e1n eliminando tras una investigaci\u00f3n que identific\u00f3 \"problemas de cumplimiento de larga duraci\u00f3n y no resueltos\"." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-396xx/CVE-2024-39691.json b/CVE-2024/CVE-2024-396xx/CVE-2024-39691.json index aeac396fa21..ea531e06f38 100644 --- a/CVE-2024/CVE-2024-396xx/CVE-2024-39691.json +++ b/CVE-2024/CVE-2024-396xx/CVE-2024-39691.json @@ -2,13 +2,17 @@ "id": "CVE-2024-39691", "sourceIdentifier": "security-advisories@github.com", "published": "2024-07-05T19:15:10.460", - "lastModified": "2024-07-05T19:15:10.460", - "vulnStatus": "Received", + "lastModified": "2024-07-08T15:49:22.437", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "matrix-appservice-irc is a Node.js IRC bridge for the Matrix messaging protocol. The fix for GHSA-wm4w-7h2q-3pf7 / CVE-2024-32000 included in matrix-appservice-irc 2.0.0 relied on the Matrix homeserver-provided timestamp to determine whether a user has access to the event they're replying to when determining whether or not to include a truncated version of the original event in the IRC message. Since this value is controlled by external entities, a malicious Matrix homeserver joined to a room in which a matrix-appservice-irc bridge instance (before version 2.0.1) is present can fabricate the timestamp with the intent of tricking the bridge into leaking room messages the homeserver should not have access to. matrix-appservice-irc 2.0.1 drops the reliance on `origin_server_ts` when determining whether or not an event should be visible to a user, instead tracking the event timestamps internally. As a workaround, it's possible to limit the amount of information leaked by setting a reply template that doesn't contain the original message." + }, + { + "lang": "es", + "value": "Matrix-appservice-irc es un puente IRC de Node.js para el protocolo de mensajer\u00eda Matrix. La soluci\u00f3n para GHSA-wm4w-7h2q-3pf7/CVE-2024-32000 incluida en Matrix-appservice-irc 2.0.0 se basaba en la marca de tiempo proporcionada por el servidor dom\u00e9stico de Matrix para determinar si un usuario tiene acceso al evento al que est\u00e1 respondiendo cuando determina si se incluye o no una versi\u00f3n truncada del evento original en el mensaje IRC. Dado que este valor est\u00e1 controlado por entidades externas, un servidor dom\u00e9stico Matrix malicioso unido a una sala en la que est\u00e1 presente una instancia de puente Matrix-appservice-irc (anterior a la versi\u00f3n 2.0.1) puede fabricar la marca de tiempo con la intenci\u00f3n de enga\u00f1ar al puente para fugar mensajes de la sala, mensajes a los que el servidor dom\u00e9stico no deber\u00eda tener acceso. Matrix-appservice-irc 2.0.1 elimina la dependencia de `origin_server_ts` al determinar si un evento debe ser visible o no para un usuario, en lugar de realizar un seguimiento interno de las marcas de tiempo del evento. Como soluci\u00f3n alternativa, es posible limitar la cantidad de informaci\u00f3n filtrada configurando una plantilla de respuesta que no contenga el mensaje original." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-396xx/CVE-2024-39696.json b/CVE-2024/CVE-2024-396xx/CVE-2024-39696.json index 1ae5daadfc3..5d22a64af22 100644 --- a/CVE-2024/CVE-2024-396xx/CVE-2024-39696.json +++ b/CVE-2024/CVE-2024-396xx/CVE-2024-39696.json @@ -2,13 +2,17 @@ "id": "CVE-2024-39696", "sourceIdentifier": "security-advisories@github.com", "published": "2024-07-05T19:15:10.673", - "lastModified": "2024-07-05T19:15:10.673", - "vulnStatus": "Received", + "lastModified": "2024-07-08T15:49:22.437", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Evmos is a decentralized Ethereum Virtual Machine chain on the Cosmos Network. Prior to version 19.0.0, a user can create a vesting account with a 3rd party account (EOA or contract) as funder. Then, this user can create an authorization for the contract.CallerAddress, this is the authorization checked in the code. But the funds are taken from the funder address provided in the message. Consequently, the user can fund a vesting account with a 3rd party account without its permission. The funder address can be any address, so this vulnerability can be used to drain all the accounts in the chain. The issue has been patched in version 19.0.0." + }, + { + "lang": "es", + "value": "Evmos es una cadena descentralizada de m\u00e1quinas virtuales Ethereum en Cosmos Network. Antes de la versi\u00f3n 19.0.0, un usuario puede crear una cuenta de adquisici\u00f3n de derechos con una cuenta de un tercero (EOA o contrato) como financiador. Luego, este usuario puede crear una autorizaci\u00f3n para el contrato.CallerAddress, esta es la autorizaci\u00f3n marcada en el c\u00f3digo. Pero los fondos se toman de la direcci\u00f3n del financiador proporcionada en el mensaje. En consecuencia, el usuario puede depositar fondos en una cuenta de adquisici\u00f3n de derechos con una cuenta de terceros sin su permiso. La direcci\u00f3n del financiador puede ser cualquier direcci\u00f3n, por lo que esta vulnerabilidad se puede utilizar para vaciar todas las cuentas de la cadena. El problema se solucion\u00f3 en la versi\u00f3n 19.0.0." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-397xx/CVE-2024-39723.json b/CVE-2024/CVE-2024-397xx/CVE-2024-39723.json index f0e88f13b56..8deddc7e438 100644 --- a/CVE-2024/CVE-2024-397xx/CVE-2024-39723.json +++ b/CVE-2024/CVE-2024-397xx/CVE-2024-39723.json @@ -2,13 +2,17 @@ "id": "CVE-2024-39723", "sourceIdentifier": "psirt@us.ibm.com", "published": "2024-07-08T01:15:12.283", - "lastModified": "2024-07-08T01:15:12.283", - "vulnStatus": "Received", + "lastModified": "2024-07-08T15:49:22.437", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "IBM FlashSystem 5300 USB ports may be usable even if the port has been disabled by the administrator. A user with physical access to the system could use the USB port to cause loss of access to data. IBM X-Force ID: 295935." + }, + { + "lang": "es", + "value": " Los puertos USB de IBM FlashSystem 5300 se pueden utilizar incluso si el administrador ha desactivado el puerto. Un usuario con acceso f\u00edsico al sistema podr\u00eda utilizar el puerto USB para provocar la p\u00e9rdida de acceso a los datos. ID de IBM X-Force: 295935." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-397xx/CVE-2024-39742.json b/CVE-2024/CVE-2024-397xx/CVE-2024-39742.json new file mode 100644 index 00000000000..5ac7d53a2ed --- /dev/null +++ b/CVE-2024/CVE-2024-397xx/CVE-2024-39742.json @@ -0,0 +1,60 @@ +{ + "id": "CVE-2024-39742", + "sourceIdentifier": "psirt@us.ibm.com", + "published": "2024-07-08T14:15:02.550", + "lastModified": "2024-07-08T15:49:22.437", + "vulnStatus": "Undergoing Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "IBM MQ Operator 3.2.2 and IBM MQ Operator 2.0.24 could allow a user to bypass authentication under certain configurations due to a partial string comparison vulnerability. IBM X-Force ID: 297169." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@us.ibm.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.1, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.2, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@us.ibm.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-187" + } + ] + } + ], + "references": [ + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/297169", + "source": "psirt@us.ibm.com" + }, + { + "url": "https://www.ibm.com/support/pages/node/7159714", + "source": "psirt@us.ibm.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-397xx/CVE-2024-39743.json b/CVE-2024/CVE-2024-397xx/CVE-2024-39743.json new file mode 100644 index 00000000000..ca67bda23b1 --- /dev/null +++ b/CVE-2024/CVE-2024-397xx/CVE-2024-39743.json @@ -0,0 +1,60 @@ +{ + "id": "CVE-2024-39743", + "sourceIdentifier": "psirt@us.ibm.com", + "published": "2024-07-08T14:15:02.823", + "lastModified": "2024-07-08T15:49:22.437", + "vulnStatus": "Undergoing Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "IBM MQ Operator 3.2.2 and IBM MQ Operator 2.0.24 could allow a user to cause a denial of service under certain configurations due to a partial string comparison vulnerability. IBM X-Force ID: 297172." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@us.ibm.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 5.9, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.2, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@us.ibm.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-187" + } + ] + } + ], + "references": [ + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/297172", + "source": "psirt@us.ibm.com" + }, + { + "url": "https://www.ibm.com/support/pages/node/7159714", + "source": "psirt@us.ibm.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-398xx/CVE-2024-39844.json b/CVE-2024/CVE-2024-398xx/CVE-2024-39844.json index 3ae157e9474..681308de176 100644 --- a/CVE-2024/CVE-2024-398xx/CVE-2024-39844.json +++ b/CVE-2024/CVE-2024-398xx/CVE-2024-39844.json @@ -2,7 +2,7 @@ "id": "CVE-2024-39844", "sourceIdentifier": "cve@mitre.org", "published": "2024-07-03T17:15:04.403", - "lastModified": "2024-07-05T12:55:51.367", + "lastModified": "2024-07-08T14:18:55.147", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "En ZNC anterior a 1.9.1, la ejecuci\u00f3n remota de c\u00f3digo puede ocurrir en modtcl mediante un KICK." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-94" + } + ] + } + ], "references": [ { "url": "http://www.openwall.com/lists/oss-security/2024/07/03/9", diff --git a/CVE-2024/CVE-2024-398xx/CVE-2024-39864.json b/CVE-2024/CVE-2024-398xx/CVE-2024-39864.json index 4a7869eae6b..850838d5533 100644 --- a/CVE-2024/CVE-2024-398xx/CVE-2024-39864.json +++ b/CVE-2024/CVE-2024-398xx/CVE-2024-39864.json @@ -2,16 +2,63 @@ "id": "CVE-2024-39864", "sourceIdentifier": "security@apache.org", "published": "2024-07-05T14:15:03.203", - "lastModified": "2024-07-05T17:10:58.210", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-07-08T15:47:10.990", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The CloudStack integration API service allows running its unauthenticated API server (usually on port 8096 when configured and enabled via integration.api.port global setting) for internal portal integrations and for testing purposes. By default, the integration API service port is disabled and is considered disabled when integration.api.port is set to 0 or negative. Due to an improper initialisation logic, the integration API service would listen on a random port when its port value is set to 0 (default value).\u00a0An attacker that can access the CloudStack management network could scan and find the randomised integration API service port and exploit it to perform unauthorised administrative actions and perform remote code execution on CloudStack managed hosts and result in complete\u00a0compromise of the confidentiality, integrity, and availability of CloudStack managed infrastructure.\n\nUsers are recommended to restrict the network access on the CloudStack management server hosts to only essential ports. Users are recommended to upgrade to version 4.18.2.1, 4.19.0.2 or later, which addresses this issue.\n\n" + }, + { + "lang": "es", + "value": "El servicio API de integraci\u00f3n de CloudStack permite ejecutar su servidor API no autenticado (generalmente en el puerto 8096 cuando se configura y habilita a trav\u00e9s de la configuraci\u00f3n global Integration.api.port) para integraciones de portales internos y con fines de prueba. De forma predeterminada, el puerto del servicio API de integraci\u00f3n est\u00e1 deshabilitado y se considera deshabilitado cuando Integration.api.port se establece en 0 o negativo. Debido a una l\u00f3gica de inicializaci\u00f3n incorrecta, el servicio API de integraci\u00f3n escuchar\u00eda en un puerto aleatorio cuando su valor de puerto se establece en 0 (valor predeterminado). Un atacante que pueda acceder a la red de administraci\u00f3n de CloudStack podr\u00eda escanear y encontrar el puerto de servicio API de integraci\u00f3n aleatoria y explotarlo para realizar acciones administrativas no autorizadas y ejecutar c\u00f3digo remoto en hosts administrados de CloudStack y comprometer completamente la confidencialidad, integridad y disponibilidad de Infraestructura gestionada por CloudStack. Se recomienda a los usuarios restringir el acceso a la red en los hosts del servidor de administraci\u00f3n de CloudStack solo a los puertos esenciales. Se recomienda a los usuarios actualizar a la versi\u00f3n 4.18.2.1, 4.19.0.2 o posterior, que soluciona este problema." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, "weaknesses": [ { "source": "security@apache.org", @@ -28,22 +75,60 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:apache:cloudstack:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.0.0", + "versionEndExcluding": "4.18.2.1", + "matchCriteriaId": "3838B737-9231-4333-9777-8B49CBACC754" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:apache:cloudstack:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.19.0.0", + "versionEndExcluding": "4.19.0.2", + "matchCriteriaId": "1155DE75-1275-454F-9461-6DF70C73D1E2" + } + ] + } + ] + } + ], "references": [ { "url": "http://www.openwall.com/lists/oss-security/2024/07/05/1", - "source": "security@apache.org" + "source": "security@apache.org", + "tags": [ + "Mailing List" + ] }, { "url": "https://cloudstack.apache.org/blog/security-release-advisory-4.19.0.2-4.18.2.1", - "source": "security@apache.org" + "source": "security@apache.org", + "tags": [ + "Release Notes" + ] }, { "url": "https://lists.apache.org/thread/6l51r00csrct61plkyd3qg3fj99215d1", - "source": "security@apache.org" + "source": "security@apache.org", + "tags": [ + "Mailing List" + ] }, { "url": "https://www.shapeblue.com/shapeblue-security-advisory-apache-cloudstack-security-releases-4-18-2-1-and-4-19-0-2/", - "source": "security@apache.org" + "source": "security@apache.org", + "tags": [ + "Release Notes" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-398xx/CVE-2024-39894.json b/CVE-2024/CVE-2024-398xx/CVE-2024-39894.json index 9ea5f9d355a..1412d9ae143 100644 --- a/CVE-2024/CVE-2024-398xx/CVE-2024-39894.json +++ b/CVE-2024/CVE-2024-398xx/CVE-2024-39894.json @@ -2,7 +2,7 @@ "id": "CVE-2024-39894", "sourceIdentifier": "cve@mitre.org", "published": "2024-07-02T18:15:03.710", - "lastModified": "2024-07-03T13:15:02.890", + "lastModified": "2024-07-08T14:18:56.393", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "OpenSSH 9.5 a 9.7 anterior a 9.8 a veces permite ataques de sincronizaci\u00f3n contra la entrada de contrase\u00f1a sin eco (por ejemplo, para su y Sudo) debido a un error l\u00f3gico de ObscureKeystrokeTiming. De manera similar, podr\u00edan ocurrir otros ataques de sincronizaci\u00f3n contra la entrada de teclas." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.6, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-367" + } + ] + } + ], "references": [ { "url": "http://www.openwall.com/lists/oss-security/2024/07/03/6", diff --git a/CVE-2024/CVE-2024-399xx/CVE-2024-39932.json b/CVE-2024/CVE-2024-399xx/CVE-2024-39932.json index f408d8d9bd9..d49b96edf76 100644 --- a/CVE-2024/CVE-2024-399xx/CVE-2024-39932.json +++ b/CVE-2024/CVE-2024-399xx/CVE-2024-39932.json @@ -2,7 +2,7 @@ "id": "CVE-2024-39932", "sourceIdentifier": "cve@mitre.org", "published": "2024-07-04T16:15:02.707", - "lastModified": "2024-07-05T12:55:51.367", + "lastModified": "2024-07-08T14:18:57.240", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -39,6 +39,18 @@ } ] }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-94" + } + ] + } + ], "references": [ { "url": "https://github.com/gogs/gogs/releases", diff --git a/CVE-2024/CVE-2024-399xx/CVE-2024-39934.json b/CVE-2024/CVE-2024-399xx/CVE-2024-39934.json index 82b489f49f6..6be05aa9ee9 100644 --- a/CVE-2024/CVE-2024-399xx/CVE-2024-39934.json +++ b/CVE-2024/CVE-2024-399xx/CVE-2024-39934.json @@ -2,7 +2,7 @@ "id": "CVE-2024-39934", "sourceIdentifier": "cve@mitre.org", "published": "2024-07-04T19:15:10.967", - "lastModified": "2024-07-05T12:55:51.367", + "lastModified": "2024-07-08T14:18:57.977", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -39,6 +39,18 @@ } ] }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-284" + } + ] + } + ], "references": [ { "url": "https://checkmk.com/werk/16434", diff --git a/CVE-2024/CVE-2024-399xx/CVE-2024-39943.json b/CVE-2024/CVE-2024-399xx/CVE-2024-39943.json index 7db0d0b3dbc..b046e4ccaef 100644 --- a/CVE-2024/CVE-2024-399xx/CVE-2024-39943.json +++ b/CVE-2024/CVE-2024-399xx/CVE-2024-39943.json @@ -2,8 +2,8 @@ "id": "CVE-2024-39943", "sourceIdentifier": "cve@mitre.org", "published": "2024-07-04T23:15:09.940", - "lastModified": "2024-07-05T12:55:51.367", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-07-08T14:18:58.710", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { @@ -39,6 +39,18 @@ } ] }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-284" + } + ] + } + ], "references": [ { "url": "https://github.com/rejetto/hfs/commit/305381bd36eee074fb238b64302a252668daad1d", diff --git a/CVE-2024/CVE-2024-405xx/CVE-2024-40594.json b/CVE-2024/CVE-2024-405xx/CVE-2024-40594.json index 4f9c1005822..e68ff31e475 100644 --- a/CVE-2024/CVE-2024-405xx/CVE-2024-40594.json +++ b/CVE-2024/CVE-2024-405xx/CVE-2024-40594.json @@ -2,13 +2,17 @@ "id": "CVE-2024-40594", "sourceIdentifier": "cve@mitre.org", "published": "2024-07-06T05:15:09.670", - "lastModified": "2024-07-06T05:15:09.670", - "vulnStatus": "Received", + "lastModified": "2024-07-08T15:49:22.437", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The OpenAI ChatGPT app before 2024-07-05 for macOS opts out of the sandbox, and stores conversations in cleartext in a location accessible to other apps." + }, + { + "lang": "es", + "value": "La aplicaci\u00f3n OpenAI ChatGPT anterior al 5 de julio de 2024 para macOS excluye la sandbox y almacena las conversaciones en texto plano en una ubicaci\u00f3n accesible para otras aplicaciones." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-405xx/CVE-2024-40596.json b/CVE-2024/CVE-2024-405xx/CVE-2024-40596.json index 259c0938e42..e94d3208af0 100644 --- a/CVE-2024/CVE-2024-405xx/CVE-2024-40596.json +++ b/CVE-2024/CVE-2024-405xx/CVE-2024-40596.json @@ -2,13 +2,17 @@ "id": "CVE-2024-40596", "sourceIdentifier": "cve@mitre.org", "published": "2024-07-07T00:15:10.067", - "lastModified": "2024-07-07T00:15:10.067", - "vulnStatus": "Received", + "lastModified": "2024-07-08T15:49:22.437", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "An issue was discovered in the CheckUser extension for MediaWiki through 1.42.1. The Special:Investigate feature can expose suppressed information for log events. (TimelineService does not support properly suppressing.)" + }, + { + "lang": "es", + "value": " Se descubri\u00f3 un problema en la extensi\u00f3n CheckUser para MediaWiki hasta 1.42.1. La funci\u00f3n Special:Investigate puede exponer informaci\u00f3n suprimida para eventos de registro. (TimelineService no admite la supresi\u00f3n adecuada)." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-405xx/CVE-2024-40597.json b/CVE-2024/CVE-2024-405xx/CVE-2024-40597.json index 759aafb440f..bed6d5c88a8 100644 --- a/CVE-2024/CVE-2024-405xx/CVE-2024-40597.json +++ b/CVE-2024/CVE-2024-405xx/CVE-2024-40597.json @@ -2,16 +2,55 @@ "id": "CVE-2024-40597", "sourceIdentifier": "cve@mitre.org", "published": "2024-07-07T00:15:10.160", - "lastModified": "2024-07-07T00:15:10.160", - "vulnStatus": "Received", + "lastModified": "2024-07-08T15:49:22.437", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "An issue was discovered in the CheckUser extension for MediaWiki through 1.42.1. It can expose suppressed information for log events. (The log_deleted attribute is not respected.)" + }, + { + "lang": "es", + "value": " Se descubri\u00f3 un problema en la extensi\u00f3n CheckUser para MediaWiki hasta 1.42.1. Puede exponer informaci\u00f3n suprimida para eventos de registro. (No se respeta el atributo log_deleted)." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-200" + } + ] } ], - "metrics": {}, "references": [ { "url": "https://phabricator.wikimedia.org/T326865", diff --git a/CVE-2024/CVE-2024-405xx/CVE-2024-40598.json b/CVE-2024/CVE-2024-405xx/CVE-2024-40598.json index f6f114ecb35..9482a14673a 100644 --- a/CVE-2024/CVE-2024-405xx/CVE-2024-40598.json +++ b/CVE-2024/CVE-2024-405xx/CVE-2024-40598.json @@ -2,13 +2,17 @@ "id": "CVE-2024-40598", "sourceIdentifier": "cve@mitre.org", "published": "2024-07-07T00:15:10.240", - "lastModified": "2024-07-07T00:15:10.240", - "vulnStatus": "Received", + "lastModified": "2024-07-08T15:49:22.437", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "An issue was discovered in the CheckUser extension for MediaWiki through 1.42.1. The API can expose suppressed information for log events. (The log_deleted attribute is not applied to entries.)" + }, + { + "lang": "es", + "value": " Se descubri\u00f3 un problema en la extensi\u00f3n CheckUser para MediaWiki hasta 1.42.1. La API puede exponer informaci\u00f3n suprimida para eventos de registro. (El atributo log_deleted no se aplica a las entradas)." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-405xx/CVE-2024-40599.json b/CVE-2024/CVE-2024-405xx/CVE-2024-40599.json index 6c3e449fdd3..4dbd0d286d3 100644 --- a/CVE-2024/CVE-2024-405xx/CVE-2024-40599.json +++ b/CVE-2024/CVE-2024-405xx/CVE-2024-40599.json @@ -2,13 +2,17 @@ "id": "CVE-2024-40599", "sourceIdentifier": "cve@mitre.org", "published": "2024-07-07T00:15:10.313", - "lastModified": "2024-07-07T00:15:10.313", - "vulnStatus": "Received", + "lastModified": "2024-07-08T15:49:22.437", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "An issue was discovered in the GuMaxDD skin for MediaWiki through 1.42.1. There is stored XSS via MediaWiki:Sidebar top-level menu entries." + }, + { + "lang": "es", + "value": " Se descubri\u00f3 un problema en el aspecto GuMaxDD para MediaWiki hasta 1.42.1. Hay XSS almacenado a trav\u00e9s de MediaWiki: entradas del men\u00fa de nivel superior de la barra lateral." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-406xx/CVE-2024-40600.json b/CVE-2024/CVE-2024-406xx/CVE-2024-40600.json index ea5c8671325..df1bc1b762c 100644 --- a/CVE-2024/CVE-2024-406xx/CVE-2024-40600.json +++ b/CVE-2024/CVE-2024-406xx/CVE-2024-40600.json @@ -2,13 +2,17 @@ "id": "CVE-2024-40600", "sourceIdentifier": "cve@mitre.org", "published": "2024-07-07T00:15:10.397", - "lastModified": "2024-07-07T00:15:10.397", - "vulnStatus": "Received", + "lastModified": "2024-07-08T15:49:22.437", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "An issue was discovered in the Metrolook skin for MediaWiki through 1.42.1. There is stored XSS via MediaWiki:Sidebar top-level menu entries." + }, + { + "lang": "es", + "value": "Se descubri\u00f3 un problema en el aspecto Metrolook para MediaWiki hasta la versi\u00f3n 1.42.1. Hay XSS almacenado a trav\u00e9s de MediaWiki: entradas del men\u00fa de nivel superior de la barra lateral." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-406xx/CVE-2024-40601.json b/CVE-2024/CVE-2024-406xx/CVE-2024-40601.json index 326a2698f12..0db27006c67 100644 --- a/CVE-2024/CVE-2024-406xx/CVE-2024-40601.json +++ b/CVE-2024/CVE-2024-406xx/CVE-2024-40601.json @@ -2,13 +2,17 @@ "id": "CVE-2024-40601", "sourceIdentifier": "cve@mitre.org", "published": "2024-07-07T00:15:10.470", - "lastModified": "2024-07-07T00:15:10.470", - "vulnStatus": "Received", + "lastModified": "2024-07-08T15:49:22.437", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "An issue was discovered in the MediaWikiChat extension for MediaWiki through 1.42.1. CSRF can occur in API modules." + }, + { + "lang": "es", + "value": " Se descubri\u00f3 un problema en la extensi\u00f3n MediaWikiChat para MediaWiki hasta 1.42.1. Puede ocurrir CSRF en m\u00f3dulos API." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-406xx/CVE-2024-40602.json b/CVE-2024/CVE-2024-406xx/CVE-2024-40602.json index 885f323ad51..459da9fcf11 100644 --- a/CVE-2024/CVE-2024-406xx/CVE-2024-40602.json +++ b/CVE-2024/CVE-2024-406xx/CVE-2024-40602.json @@ -2,13 +2,17 @@ "id": "CVE-2024-40602", "sourceIdentifier": "cve@mitre.org", "published": "2024-07-07T00:15:10.543", - "lastModified": "2024-07-07T00:15:10.543", - "vulnStatus": "Received", + "lastModified": "2024-07-08T15:49:22.437", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "An issue was discovered in the Tempo skin for MediaWiki through 1.42.1. There is stored XSS via MediaWiki:Sidebar top-level menu entries." + }, + { + "lang": "es", + "value": " Se descubri\u00f3 un problema en el aspecto Tempo de MediaWiki hasta la versi\u00f3n 1.42.1. Hay XSS almacenado a trav\u00e9s de MediaWiki: entradas del men\u00fa de nivel superior de la barra lateral." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-406xx/CVE-2024-40603.json b/CVE-2024/CVE-2024-406xx/CVE-2024-40603.json index 87d97fb902b..8f02bd28c2d 100644 --- a/CVE-2024/CVE-2024-406xx/CVE-2024-40603.json +++ b/CVE-2024/CVE-2024-406xx/CVE-2024-40603.json @@ -2,13 +2,17 @@ "id": "CVE-2024-40603", "sourceIdentifier": "cve@mitre.org", "published": "2024-07-07T00:15:10.617", - "lastModified": "2024-07-07T00:15:10.617", - "vulnStatus": "Received", + "lastModified": "2024-07-08T15:49:22.437", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "An issue was discovered in the ArticleRatings extension for MediaWiki through 1.42.1. Special:ChangeRating allows CSRF to alter data via a GET request." + }, + { + "lang": "es", + "value": " Se descubri\u00f3 un problema en la extensi\u00f3n ArticleRatings para MediaWiki hasta la versi\u00f3n 1.42.1. Especial: ChangeRating permite a CSRF modificar datos mediante una solicitud GET." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-406xx/CVE-2024-40604.json b/CVE-2024/CVE-2024-406xx/CVE-2024-40604.json index 56500937e96..d4f0a67a559 100644 --- a/CVE-2024/CVE-2024-406xx/CVE-2024-40604.json +++ b/CVE-2024/CVE-2024-406xx/CVE-2024-40604.json @@ -2,13 +2,17 @@ "id": "CVE-2024-40604", "sourceIdentifier": "cve@mitre.org", "published": "2024-07-07T00:15:10.690", - "lastModified": "2024-07-07T00:15:10.690", - "vulnStatus": "Received", + "lastModified": "2024-07-08T15:49:22.437", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "An issue was discovered in the Nimbus skin for MediaWiki through 1.42.1. There is Stored XSS via MediaWiki:Nimbus-sidebar menu and submenu entries." + }, + { + "lang": "es", + "value": " Se descubri\u00f3 un problema en el aspecto Nimbus para MediaWiki hasta la versi\u00f3n 1.42.1. Hay XSS almacenado a trav\u00e9s de MediaWiki: men\u00fa de la barra lateral de Nimbus y entradas del submen\u00fa." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-406xx/CVE-2024-40605.json b/CVE-2024/CVE-2024-406xx/CVE-2024-40605.json index 739a0ffb21f..8b320dcce44 100644 --- a/CVE-2024/CVE-2024-406xx/CVE-2024-40605.json +++ b/CVE-2024/CVE-2024-406xx/CVE-2024-40605.json @@ -2,13 +2,17 @@ "id": "CVE-2024-40605", "sourceIdentifier": "cve@mitre.org", "published": "2024-07-07T00:15:10.770", - "lastModified": "2024-07-07T00:15:10.770", - "vulnStatus": "Received", + "lastModified": "2024-07-08T15:49:22.437", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "An issue was discovered in the Foreground skin for MediaWiki through 1.42.1. There is stored XSS via MediaWiki:Sidebar top-level menu entries." + }, + { + "lang": "es", + "value": "Se descubri\u00f3 un problema en el aspecto Foreground de MediaWiki hasta la versi\u00f3n 1.42.1. Hay XSS almacenado a trav\u00e9s de MediaWiki: entradas del men\u00fa de nivel superior de la barra lateral." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-406xx/CVE-2024-40614.json b/CVE-2024/CVE-2024-406xx/CVE-2024-40614.json index b0e2ce6b418..59f511ef1c9 100644 --- a/CVE-2024/CVE-2024-406xx/CVE-2024-40614.json +++ b/CVE-2024/CVE-2024-406xx/CVE-2024-40614.json @@ -2,13 +2,17 @@ "id": "CVE-2024-40614", "sourceIdentifier": "cve@mitre.org", "published": "2024-07-07T15:15:09.923", - "lastModified": "2024-07-07T15:15:09.923", - "vulnStatus": "Received", + "lastModified": "2024-07-08T15:49:22.437", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "EGroupware before 23.1.20240624 mishandles an ORDER BY clause." + }, + { + "lang": "es", + "value": "EGroupware anterior al 23.1.20240624 maneja mal una cl\u00e1usula ORDER BY." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-43xx/CVE-2024-4341.json b/CVE-2024/CVE-2024-43xx/CVE-2024-4341.json new file mode 100644 index 00000000000..9b02e40cc56 --- /dev/null +++ b/CVE-2024/CVE-2024-43xx/CVE-2024-4341.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-4341", + "sourceIdentifier": "iletisim@usom.gov.tr", + "published": "2024-07-08T14:15:03.167", + "lastModified": "2024-07-08T15:49:22.437", + "vulnStatus": "Undergoing Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Privilege Management vulnerability in Ekstrem Bir Bilgisayar Danismanlik Ic Ve Dis Ticaret Ltd. Sti. Extreme XDS allows Collect Data as Provided by Users.This issue affects Extreme XDS: before 3928." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "iletisim@usom.gov.tr", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 7.2, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "iletisim@usom.gov.tr", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-269" + } + ] + } + ], + "references": [ + { + "url": "https://www.usom.gov.tr/bildirim/tr-24-0893", + "source": "iletisim@usom.gov.tr" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-43xx/CVE-2024-4384.json b/CVE-2024/CVE-2024-43xx/CVE-2024-4384.json index 8fa9dfa7732..ad265536d50 100644 --- a/CVE-2024/CVE-2024-43xx/CVE-2024-4384.json +++ b/CVE-2024/CVE-2024-43xx/CVE-2024-4384.json @@ -2,15 +2,43 @@ "id": "CVE-2024-4384", "sourceIdentifier": "contact@wpscan.com", "published": "2024-06-21T06:15:12.103", - "lastModified": "2024-06-21T11:22:01.687", + "lastModified": "2024-07-08T14:19:12.827", "vulnStatus": "Undergoing Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", "value": "The CSSable Countdown WordPress plugin through 1.5 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup)" + }, + { + "lang": "es", + "value": "El complemento CSSable Countdown WordPress hasta la versi\u00f3n 1.5 no sanitiza ni escapa a algunas de sus configuraciones, lo que podr\u00eda permitir a usuarios con privilegios elevados, como el administrador, realizar ataques de Cross-Site Scripting Almacenado incluso cuando la capacidad unfiltered_html no est\u00e1 permitida (por ejemplo, en una configuraci\u00f3n multisitio)." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 6.1, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 + } + ] + }, "references": [ { "url": "https://wpscan.com/vulnerability/ad714196-2590-4dc9-b5b9-50808e9e0d26/", diff --git a/CVE-2024/CVE-2024-49xx/CVE-2024-4969.json b/CVE-2024/CVE-2024-49xx/CVE-2024-4969.json index 3661599eaff..833775adc58 100644 --- a/CVE-2024/CVE-2024-49xx/CVE-2024-4969.json +++ b/CVE-2024/CVE-2024-49xx/CVE-2024-4969.json @@ -2,8 +2,9 @@ "id": "CVE-2024-4969", "sourceIdentifier": "contact@wpscan.com", "published": "2024-06-21T06:15:12.587", - "lastModified": "2024-06-24T19:30:53.110", - "vulnStatus": "Analyzed", + "lastModified": "2024-07-08T14:19:14.173", + "vulnStatus": "Modified", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -35,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 1.4 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 4.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 } ] }, diff --git a/CVE-2024/CVE-2024-56xx/CVE-2024-5606.json b/CVE-2024/CVE-2024-56xx/CVE-2024-5606.json index 536ea644dbb..257886dee2e 100644 --- a/CVE-2024/CVE-2024-56xx/CVE-2024-5606.json +++ b/CVE-2024/CVE-2024-56xx/CVE-2024-5606.json @@ -2,8 +2,8 @@ "id": "CVE-2024-5606", "sourceIdentifier": "contact@wpscan.com", "published": "2024-07-02T06:15:04.760", - "lastModified": "2024-07-03T15:45:19.513", - "vulnStatus": "Analyzed", + "lastModified": "2024-07-08T14:19:15.450", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ] }, diff --git a/CVE-2024/CVE-2024-56xx/CVE-2024-5616.json b/CVE-2024/CVE-2024-56xx/CVE-2024-5616.json index f2dee2c596d..8f3a4f0df60 100644 --- a/CVE-2024/CVE-2024-56xx/CVE-2024-5616.json +++ b/CVE-2024/CVE-2024-56xx/CVE-2024-5616.json @@ -2,13 +2,17 @@ "id": "CVE-2024-5616", "sourceIdentifier": "security@huntr.dev", "published": "2024-07-06T09:15:02.050", - "lastModified": "2024-07-06T09:15:02.050", - "vulnStatus": "Received", + "lastModified": "2024-07-08T15:49:22.437", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A Cross-Site Request Forgery (CSRF) vulnerability exists in mudler/LocalAI versions up to and including 2.15.0, which allows attackers to trick victims into deleting installed models. By crafting a malicious HTML page, an attacker can cause the deletion of a model, such as 'gpt-4-vision-preview', without the victim's consent. The vulnerability is due to insufficient CSRF protection mechanisms on the model deletion functionality." + }, + { + "lang": "es", + "value": " Existe una vulnerabilidad de Cross Site Request Forgery (CSRF) en las versiones de mudler/LocalAI hasta la 2.15.0 incluida, que permite a los atacantes enga\u00f1ar a las v\u00edctimas para que eliminen los modelos instalados. Al crear una p\u00e1gina HTML maliciosa, un atacante puede provocar la eliminaci\u00f3n de un modelo, como 'gpt-4-vision-preview', sin el consentimiento de la v\u00edctima. La vulnerabilidad se debe a mecanismos de protecci\u00f3n CSRF insuficientes en la funcionalidad de eliminaci\u00f3n del modelo." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-57xx/CVE-2024-5711.json b/CVE-2024/CVE-2024-57xx/CVE-2024-5711.json index 64fa8c54673..a415e7da440 100644 --- a/CVE-2024/CVE-2024-57xx/CVE-2024-5711.json +++ b/CVE-2024/CVE-2024-57xx/CVE-2024-5711.json @@ -2,13 +2,17 @@ "id": "CVE-2024-5711", "sourceIdentifier": "security@huntr.dev", "published": "2024-07-08T00:15:01.940", - "lastModified": "2024-07-08T00:15:01.940", - "vulnStatus": "Received", + "lastModified": "2024-07-08T15:49:22.437", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Cross-site Scripting (XSS) - Stored in GitHub repository stitionai/devika prior to -." + }, + { + "lang": "es", + "value": " Cross-site Scripting (XSS) almacenado en el repositorio de GitHub stitionai/devika antes de -." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-57xx/CVE-2024-5728.json b/CVE-2024/CVE-2024-57xx/CVE-2024-5728.json index 375921f0f2c..8fe8e7e4a17 100644 --- a/CVE-2024/CVE-2024-57xx/CVE-2024-5728.json +++ b/CVE-2024/CVE-2024-57xx/CVE-2024-5728.json @@ -2,16 +2,43 @@ "id": "CVE-2024-5728", "sourceIdentifier": "contact@wpscan.com", "published": "2024-06-28T06:15:06.737", - "lastModified": "2024-06-28T10:27:00.920", + "lastModified": "2024-07-08T14:19:16.400", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Animated AL List WordPress plugin through 1.0.6 does not sanitise and escape a parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting which could be used against high privilege users such as admin" + }, + { + "lang": "es", + "value": "El complemento Animated AL List de WordPress hasta la versi\u00f3n 1.0.6 no sanitiza ni escapa un par\u00e1metro antes de devolverlo a la p\u00e1gina, lo que genera Cross-Site Scripting Reflejado que podr\u00eda usarse contra usuarios con altos privilegios, como el administrador." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.5 + } + ] + }, "references": [ { "url": "https://wpscan.com/vulnerability/287c4e8c-9092-4cb9-9642-e4f3d10f46fa/", diff --git a/CVE-2024/CVE-2024-57xx/CVE-2024-5753.json b/CVE-2024/CVE-2024-57xx/CVE-2024-5753.json index 88a1351755e..bd93acb966f 100644 --- a/CVE-2024/CVE-2024-57xx/CVE-2024-5753.json +++ b/CVE-2024/CVE-2024-57xx/CVE-2024-5753.json @@ -2,13 +2,17 @@ "id": "CVE-2024-5753", "sourceIdentifier": "security@huntr.dev", "published": "2024-07-05T20:15:02.343", - "lastModified": "2024-07-05T20:15:02.343", - "vulnStatus": "Received", + "lastModified": "2024-07-08T15:49:22.437", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "vanna-ai/vanna version v0.3.4 is vulnerable to SQL injection in some file-critical functions such as `pg_read_file()`. This vulnerability allows unauthenticated remote users to read arbitrary local files on the victim server, including sensitive files like `/etc/passwd`, by exploiting the exposed SQL queries via a Python Flask API." + }, + { + "lang": "es", + "value": " La versi\u00f3n v0.3.4 de vanna-ai/vanna es vulnerable a la inyecci\u00f3n de SQL en algunas funciones cr\u00edticas de archivos como `pg_read_file()`. Esta vulnerabilidad permite a usuarios remotos no autenticados leer archivos locales arbitrarios en el servidor v\u00edctima, incluidos archivos confidenciales como `/etc/passwd`, explotando las consultas SQL expuestas a trav\u00e9s de una API Python Flask." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-60xx/CVE-2024-6095.json b/CVE-2024/CVE-2024-60xx/CVE-2024-6095.json index 58b432fca2c..d699c614321 100644 --- a/CVE-2024/CVE-2024-60xx/CVE-2024-6095.json +++ b/CVE-2024/CVE-2024-60xx/CVE-2024-6095.json @@ -2,13 +2,17 @@ "id": "CVE-2024-6095", "sourceIdentifier": "security@huntr.dev", "published": "2024-07-06T18:15:02.277", - "lastModified": "2024-07-06T18:15:02.277", - "vulnStatus": "Received", + "lastModified": "2024-07-08T15:49:22.437", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability in the /models/apply endpoint of mudler/localai versions 2.15.0 allows for Server-Side Request Forgery (SSRF) and partial Local File Inclusion (LFI). The endpoint supports both http(s):// and file:// schemes, where the latter can lead to LFI. However, the output is limited due to the length of the error message. This vulnerability can be exploited by an attacker with network access to the LocalAI instance, potentially allowing unauthorized access to internal HTTP(s) servers and partial reading of local files. The issue is fixed in version 2.17." + }, + { + "lang": "es", + "value": "Una vulnerabilidad en el endpoint /models/apply de mudler/localai versiones 2.15.0 permite Server Side Request Forgery (SSRF) y la inclusi\u00f3n parcial de archivos locales (LFI). El endpoint admite los esquemas http(s):// y file://, donde este \u00faltimo puede conducir a LFI. Sin embargo, el resultado es limitado debido a la longitud del mensaje de error. Esta vulnerabilidad puede ser aprovechada por un atacante con acceso de red a la instancia de LocalAI, lo que podr\u00eda permitir el acceso no autorizado a servidores HTTP internos y la lectura parcial de archivos locales. El problema se solucion\u00f3 en la versi\u00f3n 2.17." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-61xx/CVE-2024-6163.json b/CVE-2024/CVE-2024-61xx/CVE-2024-6163.json index bae649ee31b..32294e56910 100644 --- a/CVE-2024/CVE-2024-61xx/CVE-2024-6163.json +++ b/CVE-2024/CVE-2024-61xx/CVE-2024-6163.json @@ -2,8 +2,8 @@ "id": "CVE-2024-6163", "sourceIdentifier": "security@checkmk.com", "published": "2024-07-08T13:15:10.593", - "lastModified": "2024-07-08T13:15:10.593", - "vulnStatus": "Received", + "lastModified": "2024-07-08T15:49:22.437", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-62xx/CVE-2024-6209.json b/CVE-2024/CVE-2024-62xx/CVE-2024-6209.json index 6af6069096f..541dd189c0e 100644 --- a/CVE-2024/CVE-2024-62xx/CVE-2024-6209.json +++ b/CVE-2024/CVE-2024-62xx/CVE-2024-6209.json @@ -2,8 +2,8 @@ "id": "CVE-2024-6209", "sourceIdentifier": "cybersecurity@ch.abb.com", "published": "2024-07-05T11:15:10.080", - "lastModified": "2024-07-05T12:55:51.367", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-07-08T15:35:25.837", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -59,6 +59,28 @@ "baseSeverity": "CRITICAL" } } + ], + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } ] }, "weaknesses": [ @@ -73,10 +95,547 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:abb:aspect-ent-12_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "3.08.01", + "matchCriteriaId": "657304E9-2877-46DC-A119-EDBB493746DA" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:abb:aspect-ent-12:-:*:*:*:*:*:*:*", + "matchCriteriaId": "7D3FE8A0-B7B1-496F-918B-83AECEC80486" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:abb:aspect-ent-2_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "3.08.01", + "matchCriteriaId": "E063E70E-D02D-4E62-B42F-BA8E3B462D09" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:abb:aspect-ent-2:-:*:*:*:*:*:*:*", + "matchCriteriaId": "4C6351DE-8170-4023-B815-536030F9236E" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:abb:aspect-ent-256_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "3.08.01", + "matchCriteriaId": "E6BDCAA2-594F-48C4-BEF5-4361EC4945A1" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:abb:aspect-ent-256:-:*:*:*:*:*:*:*", + "matchCriteriaId": "125AAF0E-3CB2-4F5A-BA04-742918422422" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:abb:aspect-ent-96_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "3.08.01", + "matchCriteriaId": "FEECC7F5-C8E3-425A-9B41-4B298D29BE6B" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:abb:aspect-ent-96:-:*:*:*:*:*:*:*", + "matchCriteriaId": "9CC1901E-7476-4070-B649-E2EAE52A38A6" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:abb:nexus-2128_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "3.08.01", + "matchCriteriaId": "BAF660DF-C231-46AD-825E-8C446EC24A3E" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:abb:nexus-2128:-:*:*:*:*:*:*:*", + "matchCriteriaId": "697D73AC-8567-4D25-B42F-FB584DAFF05F" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:abb:nexus-2128-a_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "3.08.01", + "matchCriteriaId": "21DD67BB-85EF-4DD9-8256-F52E7DAADEE3" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:abb:nexus-2128-a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A1C4B551-EC7D-4D96-9B44-5238B2671F38" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:abb:nexus-2128-f_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "3.08.01", + "matchCriteriaId": "62654DD7-8BE1-4268-8571-D7B7AA750323" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:abb:nexus-2128-f:-:*:*:*:*:*:*:*", + "matchCriteriaId": "DC1B0FAC-EE50-41E7-8C6A-63E28649A539" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:abb:nexus-2128-g_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "3.08.01", + "matchCriteriaId": "0E7E46A6-9B6A-4D35-9B36-8C056E0D1B49" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:abb:nexus-2128-g:-:*:*:*:*:*:*:*", + "matchCriteriaId": "86993CA6-E80C-464D-A208-EB119F41E106" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:abb:nexus-264_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "3.08.01", + "matchCriteriaId": "139ED7CD-AA56-478A-9339-18E4C61D86B3" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:abb:nexus-264:-:*:*:*:*:*:*:*", + "matchCriteriaId": "979B2BF4-885C-46B4-9093-E7CC35EBB397" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:abb:nexus-264-a_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "3.08.01", + "matchCriteriaId": "60F1E134-26D9-45B7-87A4-7E4FF31BAEDC" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:abb:nexus-264-a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F3961881-0563-443D-8381-428058A008DF" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:abb:nexus-264-f_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "3.08.01", + "matchCriteriaId": "7D527ECD-7921-4810-8C45-B81C7B51137F" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:abb:nexus-264-f:-:*:*:*:*:*:*:*", + "matchCriteriaId": "43EB9B15-B1DF-49DC-B69C-00D0342E0592" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:abb:nexus-264-g_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "3.08.01", + "matchCriteriaId": "3854E84E-7331-428C-AA8B-6E6CCA91F51F" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:abb:nexus-264-g:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2E7E5C1B-CFA0-4584-89F5-BE9190DC7DB7" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:abb:nexus-3-2128_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "3.08.01", + "matchCriteriaId": "34A0EB12-D46B-4FA2-B00B-9A64D1FF759B" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:abb:nexus-3-2128:-:*:*:*:*:*:*:*", + "matchCriteriaId": "66A14E33-5416-45D9-BBE4-61EFEC246E20" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:abb:nexus-3-264_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "3.08.01", + "matchCriteriaId": "C00B19E2-21B3-419E-B773-8E4AEF295EB4" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:abb:nexus-3-264:-:*:*:*:*:*:*:*", + "matchCriteriaId": "96BF51C6-E220-4347-9505-48DAE2BB26B7" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:abb:matrix-11_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "3.08.01", + "matchCriteriaId": "A307B225-C3FA-4DEE-8577-D43411214BD2" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:abb:matrix-11:-:*:*:*:*:*:*:*", + "matchCriteriaId": "7CC44F95-4AE8-48B3-AC2C-6A4EB20F62DD" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:abb:matrix-216_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "3.08.01", + "matchCriteriaId": "57C13FD3-7824-4B60-82A8-16B44670BB9D" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:abb:matrix-216:-:*:*:*:*:*:*:*", + "matchCriteriaId": "653A6815-9BC7-4BD4-BB67-DBCC666ED860" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:abb:matrix-232_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "3.08.01", + "matchCriteriaId": "CF32B164-71B5-41A3-9D0C-3AB1D8EC7336" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:abb:matrix-232:-:*:*:*:*:*:*:*", + "matchCriteriaId": "40C07D72-CA89-40A1-8EE8-F48A06DB7992" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:abb:matrix-264_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "3.08.01", + "matchCriteriaId": "7D92B482-D5D1-422D-B667-A3C3534563C7" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:abb:matrix-264:-:*:*:*:*:*:*:*", + "matchCriteriaId": "80E8A1A8-8476-4C36-A6F6-258C2DC60388" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:abb:matrix-296_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "3.08.01", + "matchCriteriaId": "F8ABD8E5-E9F9-46BE-BD01-635FD035279B" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:abb:matrix-296:-:*:*:*:*:*:*:*", + "matchCriteriaId": "699E0759-590A-4362-9B5B-F876C1A020D1" + } + ] + } + ] + } + ], "references": [ { "url": "https://search.abb.com/library/Download.aspx?DocumentID=9AKK108469A7497&LanguageCode=en&DocumentPartId=&Action=Launch&_ga=2.39956449.23035250.1719878527-141379670.1701144964", - "source": "cybersecurity@ch.abb.com" + "source": "cybersecurity@ch.abb.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-62xx/CVE-2024-6229.json b/CVE-2024/CVE-2024-62xx/CVE-2024-6229.json index 7bf02545dad..e5f634e7505 100644 --- a/CVE-2024/CVE-2024-62xx/CVE-2024-6229.json +++ b/CVE-2024/CVE-2024-62xx/CVE-2024-6229.json @@ -2,13 +2,17 @@ "id": "CVE-2024-6229", "sourceIdentifier": "security@huntr.dev", "published": "2024-07-07T16:15:02.013", - "lastModified": "2024-07-07T16:15:02.013", - "vulnStatus": "Received", + "lastModified": "2024-07-08T15:49:22.437", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A stored cross-site scripting (XSS) vulnerability exists in the 'Upload Knowledge' feature of stangirard/quivr, affecting the latest version. Users can upload files via URL, which allows the insertion of malicious JavaScript payloads. These payloads are stored on the server and executed whenever any user clicks on a link containing the payload, leading to potential data theft, session hijacking, and reputation damage." + }, + { + "lang": "es", + "value": " Existe una vulnerabilidad de Cross Site Scripting (XSS) almacenado en la funci\u00f3n 'Upload Knowledge' de stangirard/quivr, que afecta a la \u00faltima versi\u00f3n. Los usuarios pueden cargar archivos a trav\u00e9s de URL, lo que permite la inserci\u00f3n de payloads de JavaScript maliciosos. Estos payloads se almacenan en el servidor y se ejecutan cada vez que un usuario hace clic en un enlace que contiene el payload, lo que genera un posible robo de datos, secuestro de sesiones y da\u00f1os a la reputaci\u00f3n." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-62xx/CVE-2024-6298.json b/CVE-2024/CVE-2024-62xx/CVE-2024-6298.json index 9f9e494cdff..1ec0574bfba 100644 --- a/CVE-2024/CVE-2024-62xx/CVE-2024-6298.json +++ b/CVE-2024/CVE-2024-62xx/CVE-2024-6298.json @@ -2,8 +2,8 @@ "id": "CVE-2024-6298", "sourceIdentifier": "cybersecurity@ch.abb.com", "published": "2024-07-05T11:15:10.617", - "lastModified": "2024-07-05T12:55:51.367", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-07-08T15:35:16.450", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -59,12 +59,44 @@ "baseSeverity": "CRITICAL" } } + ], + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } ] }, "weaknesses": [ { - "source": "cybersecurity@ch.abb.com", + "source": "nvd@nist.gov", "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + }, + { + "source": "cybersecurity@ch.abb.com", + "type": "Secondary", "description": [ { "lang": "en", @@ -73,10 +105,547 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:abb:aspect-ent-12_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "3.08.01", + "matchCriteriaId": "657304E9-2877-46DC-A119-EDBB493746DA" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:abb:aspect-ent-12:-:*:*:*:*:*:*:*", + "matchCriteriaId": "7D3FE8A0-B7B1-496F-918B-83AECEC80486" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:abb:aspect-ent-2_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "3.08.01", + "matchCriteriaId": "E063E70E-D02D-4E62-B42F-BA8E3B462D09" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:abb:aspect-ent-2:-:*:*:*:*:*:*:*", + "matchCriteriaId": "4C6351DE-8170-4023-B815-536030F9236E" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:abb:aspect-ent-256_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "3.08.01", + "matchCriteriaId": "E6BDCAA2-594F-48C4-BEF5-4361EC4945A1" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:abb:aspect-ent-256:-:*:*:*:*:*:*:*", + "matchCriteriaId": "125AAF0E-3CB2-4F5A-BA04-742918422422" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:abb:aspect-ent-96_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "3.08.01", + "matchCriteriaId": "FEECC7F5-C8E3-425A-9B41-4B298D29BE6B" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:abb:aspect-ent-96:-:*:*:*:*:*:*:*", + "matchCriteriaId": "9CC1901E-7476-4070-B649-E2EAE52A38A6" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:abb:nexus-2128_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "3.08.01", + "matchCriteriaId": "BAF660DF-C231-46AD-825E-8C446EC24A3E" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:abb:nexus-2128:-:*:*:*:*:*:*:*", + "matchCriteriaId": "697D73AC-8567-4D25-B42F-FB584DAFF05F" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:abb:nexus-2128-a_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "3.08.01", + "matchCriteriaId": "21DD67BB-85EF-4DD9-8256-F52E7DAADEE3" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:abb:nexus-2128-a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A1C4B551-EC7D-4D96-9B44-5238B2671F38" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:abb:nexus-2128-f_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "3.08.01", + "matchCriteriaId": "62654DD7-8BE1-4268-8571-D7B7AA750323" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:abb:nexus-2128-f:-:*:*:*:*:*:*:*", + "matchCriteriaId": "DC1B0FAC-EE50-41E7-8C6A-63E28649A539" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:abb:nexus-2128-g_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "3.08.01", + "matchCriteriaId": "0E7E46A6-9B6A-4D35-9B36-8C056E0D1B49" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:abb:nexus-2128-g:-:*:*:*:*:*:*:*", + "matchCriteriaId": "86993CA6-E80C-464D-A208-EB119F41E106" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:abb:nexus-264_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "3.08.01", + "matchCriteriaId": "139ED7CD-AA56-478A-9339-18E4C61D86B3" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:abb:nexus-264:-:*:*:*:*:*:*:*", + "matchCriteriaId": "979B2BF4-885C-46B4-9093-E7CC35EBB397" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:abb:nexus-264-a_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "3.08.01", + "matchCriteriaId": "60F1E134-26D9-45B7-87A4-7E4FF31BAEDC" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:abb:nexus-264-a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F3961881-0563-443D-8381-428058A008DF" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:abb:nexus-264-f_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "3.08.01", + "matchCriteriaId": "7D527ECD-7921-4810-8C45-B81C7B51137F" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:abb:nexus-264-f:-:*:*:*:*:*:*:*", + "matchCriteriaId": "43EB9B15-B1DF-49DC-B69C-00D0342E0592" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:abb:nexus-264-g_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "3.08.01", + "matchCriteriaId": "3854E84E-7331-428C-AA8B-6E6CCA91F51F" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:abb:nexus-264-g:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2E7E5C1B-CFA0-4584-89F5-BE9190DC7DB7" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:abb:nexus-3-2128_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "3.08.01", + "matchCriteriaId": "34A0EB12-D46B-4FA2-B00B-9A64D1FF759B" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:abb:nexus-3-2128:-:*:*:*:*:*:*:*", + "matchCriteriaId": "66A14E33-5416-45D9-BBE4-61EFEC246E20" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:abb:nexus-3-264_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "3.08.01", + "matchCriteriaId": "C00B19E2-21B3-419E-B773-8E4AEF295EB4" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:abb:nexus-3-264:-:*:*:*:*:*:*:*", + "matchCriteriaId": "96BF51C6-E220-4347-9505-48DAE2BB26B7" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:abb:matrix-11_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "3.08.01", + "matchCriteriaId": "A307B225-C3FA-4DEE-8577-D43411214BD2" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:abb:matrix-11:-:*:*:*:*:*:*:*", + "matchCriteriaId": "7CC44F95-4AE8-48B3-AC2C-6A4EB20F62DD" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:abb:matrix-216_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "3.08.01", + "matchCriteriaId": "57C13FD3-7824-4B60-82A8-16B44670BB9D" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:abb:matrix-216:-:*:*:*:*:*:*:*", + "matchCriteriaId": "653A6815-9BC7-4BD4-BB67-DBCC666ED860" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:abb:matrix-232_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "3.08.01", + "matchCriteriaId": "CF32B164-71B5-41A3-9D0C-3AB1D8EC7336" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:abb:matrix-232:-:*:*:*:*:*:*:*", + "matchCriteriaId": "40C07D72-CA89-40A1-8EE8-F48A06DB7992" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:abb:matrix-264_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "3.08.01", + "matchCriteriaId": "7D92B482-D5D1-422D-B667-A3C3534563C7" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:abb:matrix-264:-:*:*:*:*:*:*:*", + "matchCriteriaId": "80E8A1A8-8476-4C36-A6F6-258C2DC60388" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:abb:matrix-296_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "3.08.01", + "matchCriteriaId": "F8ABD8E5-E9F9-46BE-BD01-635FD035279B" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:abb:matrix-296:-:*:*:*:*:*:*:*", + "matchCriteriaId": "699E0759-590A-4362-9B5B-F876C1A020D1" + } + ] + } + ] + } + ], "references": [ { "url": "https://search.abb.com/library/Download.aspx?DocumentID=9AKK108469A7497&LanguageCode=en&DocumentPartId=&Action=Launch&_ga=2.39956449.23035250.1719878527-141379670.1701144964", - "source": "cybersecurity@ch.abb.com" + "source": "cybersecurity@ch.abb.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-65xx/CVE-2024-6505.json b/CVE-2024/CVE-2024-65xx/CVE-2024-6505.json index 1c56c1e2c7d..e90466c7fa1 100644 --- a/CVE-2024/CVE-2024-65xx/CVE-2024-6505.json +++ b/CVE-2024/CVE-2024-65xx/CVE-2024-6505.json @@ -2,17 +2,41 @@ "id": "CVE-2024-6505", "sourceIdentifier": "secalert@redhat.com", "published": "2024-07-05T14:15:03.420", - "lastModified": "2024-07-05T17:10:58.210", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-07-08T15:41:17.883", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A flaw was found in the virtio-net device in QEMU. When enabling the RSS feature on the virtio-net network card, the indirections_table data within RSS becomes controllable. Setting excessively large values may cause an index out-of-bounds issue, potentially resulting in heap overflow access. This flaw allows a privileged user in the guest to crash the QEMU process on the host." + }, + { + "lang": "es", + "value": " Se encontr\u00f3 un fallo en el dispositivo virtio-net en QEMU. Al habilitar la funci\u00f3n RSS en la tarjeta de red virtio-net, los datos de indirections_table dentro de RSS se vuelven controlables. Establecer valores excesivamente grandes puede provocar un problema de \u00edndice fuera de los l\u00edmites, lo que podr\u00eda provocar un acceso de desbordamiento del mont\u00f3n. Esta falla permite que un usuario privilegiado del invitado bloquee el proceso QEMU en el host." } ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 6.8, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.3, + "impactScore": 4.0 + }, { "source": "secalert@redhat.com", "type": "Secondary", @@ -47,14 +71,62 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:qemu:qemu:-:*:*:*:*:*:*:*", + "matchCriteriaId": "6D9E0C78-9678-4CEE-9389-962CF618A51F" + } + ] + } + ] + }, + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:-:*:*:*", + "matchCriteriaId": "053C1B35-3869-41C2-9551-044182DE0A64" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:advanced_virtualization:*:*:*", + "matchCriteriaId": "3AA08768-75AF-4791-B229-AE938C780959" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:redhat:enterprise_linux:9.0:*:*:*:*:*:*:*", + "matchCriteriaId": "7F6FB57C-2BC7-487C-96DD-132683AEB35D" + } + ] + } + ] + } + ], "references": [ { "url": "https://access.redhat.com/security/cve/CVE-2024-6505", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2295760", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Issue Tracking" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-65xx/CVE-2024-6507.json b/CVE-2024/CVE-2024-65xx/CVE-2024-6507.json index 4a4c0211fe3..cf011108c32 100644 --- a/CVE-2024/CVE-2024-65xx/CVE-2024-6507.json +++ b/CVE-2024/CVE-2024-65xx/CVE-2024-6507.json @@ -2,7 +2,7 @@ "id": "CVE-2024-6507", "sourceIdentifier": "reefs@jfrog.com", "published": "2024-07-04T12:15:03.963", - "lastModified": "2024-07-05T12:55:51.367", + "lastModified": "2024-07-08T14:19:21.610", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -39,6 +39,18 @@ } ] }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-94" + } + ] + } + ], "references": [ { "url": "https://github.com/activeloopai/deeplake/pull/2876", diff --git a/CVE-2024/CVE-2024-65xx/CVE-2024-6524.json b/CVE-2024/CVE-2024-65xx/CVE-2024-6524.json index ff6e54c019c..b85f53fe2d2 100644 --- a/CVE-2024/CVE-2024-65xx/CVE-2024-6524.json +++ b/CVE-2024/CVE-2024-65xx/CVE-2024-6524.json @@ -2,8 +2,8 @@ "id": "CVE-2024-6524", "sourceIdentifier": "cna@vuldb.com", "published": "2024-07-05T12:15:02.090", - "lastModified": "2024-07-05T12:55:51.367", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-07-08T15:33:01.377", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -57,6 +57,26 @@ } ], "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + }, { "source": "cna@vuldb.com", "type": "Secondary", @@ -106,7 +126,7 @@ }, "weaknesses": [ { - "source": "cna@vuldb.com", + "source": "nvd@nist.gov", "type": "Primary", "description": [ { @@ -114,24 +134,67 @@ "value": "CWE-918" } ] + }, + { + "source": "cna@vuldb.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-918" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:shopxo:shopxo:*:*:*:*:*:*:*:*", + "versionEndIncluding": "6.1.0", + "matchCriteriaId": "62DB4CD4-F61C-4F22-A492-E3030C04E96D" + } + ] + } + ] } ], "references": [ { "url": "https://github.com/J1rrY-learn/learn/blob/main/shopxo_ssrf.md", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit" + ] }, { "url": "https://vuldb.com/?ctiid.270367", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.270367", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.365173", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-65xx/CVE-2024-6525.json b/CVE-2024/CVE-2024-65xx/CVE-2024-6525.json index b3b0ae433ab..d738f67e347 100644 --- a/CVE-2024/CVE-2024-65xx/CVE-2024-6525.json +++ b/CVE-2024/CVE-2024-65xx/CVE-2024-6525.json @@ -2,8 +2,8 @@ "id": "CVE-2024-6525", "sourceIdentifier": "cna@vuldb.com", "published": "2024-07-05T13:15:11.170", - "lastModified": "2024-07-05T17:10:58.210", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-07-08T15:30:11.133", + "vulnStatus": "Analyzed", "cveTags": [ { "sourceIdentifier": "cna@vuldb.com", @@ -16,6 +16,10 @@ { "lang": "en", "value": "** UNSUPPORTED WHEN ASSIGNED ** A vulnerability was found in D-Link DAR-7000 up to 20230922. It has been rated as problematic. Affected by this issue is some unknown functionality of the file /log/decodmail.php. The manipulation of the argument file leads to deserialization. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-270368. NOTE: This vulnerability only affects products that are no longer supported by the maintainer." + }, + { + "lang": "es", + "value": " ** NO SOPORTADO CUANDO SE ASIGN\u00d3 ** Se encontr\u00f3 una vulnerabilidad en D-Link DAR-7000 hasta 20230922. Se calific\u00f3 como problem\u00e1tica. Una funci\u00f3n desconocida del archivo /log/decodmail.php es afectada por esta vulnerabilidad. La manipulaci\u00f3n del argumento file conduce a la deserializaci\u00f3n. El ataque puede lanzarse de forma remota. El exploit ha sido divulgado al p\u00fablico y puede utilizarse. El identificador de esta vulnerabilidad es VDB-270368. NOTA: Esta vulnerabilidad solo afecta a productos que ya no son compatibles con el mantenedor." } ], "metrics": { @@ -64,6 +68,26 @@ } ], "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + }, { "source": "cna@vuldb.com", "type": "Secondary", @@ -123,26 +147,74 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dlink:dar-7000_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "2023-09-22", + "matchCriteriaId": "375207D3-4659-4EEA-8EA1-AEBE6113C73E" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dlink:dar-7000:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1500AB3C-D11B-4683-86AC-FEB6AF6AD69F" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/flyyue2001/cve/blob/main/D-LINK%20-DAR-7000_rce_%20decodmail.md", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit" + ] }, { "url": "https://supportannouncement.us.dlink.com/security/publication.aspx?name=SAP10354", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://vuldb.com/?ctiid.270368", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.270368", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.368099", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-65xx/CVE-2024-6526.json b/CVE-2024/CVE-2024-65xx/CVE-2024-6526.json index 9bfb5f5a445..f18dc83419f 100644 --- a/CVE-2024/CVE-2024-65xx/CVE-2024-6526.json +++ b/CVE-2024/CVE-2024-65xx/CVE-2024-6526.json @@ -2,13 +2,17 @@ "id": "CVE-2024-6526", "sourceIdentifier": "cna@vuldb.com", "published": "2024-07-05T14:15:03.910", - "lastModified": "2024-07-05T17:10:58.210", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-07-08T15:39:08.840", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability classified as problematic has been found in CodeIgniter Ecommerce-CodeIgniter-Bootstrap up to 1998845073cf433bc6c250b0354461fbd84d0e03. This affects an unknown part. The manipulation of the argument search_title/catName/sub/name/categorie leads to cross site scripting. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of the patch is 1b3da45308bb6c3f55247d0e99620b600bd85277. It is recommended to apply a patch to fix this issue. The identifier VDB-270369 was assigned to this vulnerability." + }, + { + "lang": "es", + "value": "Una vulnerabilidad ha sido encontrada en CodeIgniter Ecommerce-CodeIgniter-Bootstrap hasta 1998845073cf433bc6c250b0354461fbd84d0e03 y clasificada como problem\u00e1tica. Esto afecta a una parte desconocida. La manipulaci\u00f3n del argumento search_title/catName/sub/name/categorie conduce a Cross Site Scripting. Es posible iniciar el ataque de forma remota. El exploit ha sido divulgado al p\u00fablico y puede utilizarse. El identificador del parche es 1b3da45308bb6c3f55247d0e99620b600bd85277. Se recomienda aplicar un parche para solucionar este problema. A esta vulnerabilidad se le asign\u00f3 el identificador VDB-270369." } ], "metrics": { @@ -57,6 +61,26 @@ } ], "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 6.1, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 + }, { "source": "cna@vuldb.com", "type": "Secondary", @@ -116,30 +140,72 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ecommerce-codeigniter-bootstrap_project:ecommerce-codeigniter-bootstrap:*:*:*:*:*:*:*:*", + "versionEndExcluding": "2024-07-03", + "matchCriteriaId": "D503CE1E-D0C7-40A2-B201-DD0A72728AC7" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/kirilkirkov/Ecommerce-CodeIgniter-Bootstrap/commit/1b3da45308bb6c3f55247d0e99620b600bd85277", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Patch" + ] }, { "url": "https://github.com/kirilkirkov/Ecommerce-CodeIgniter-Bootstrap/issues/263", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Issue Tracking" + ] }, { "url": "https://github.com/kirilkirkov/Ecommerce-CodeIgniter-Bootstrap/issues/263#issuecomment-2199387443", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Issue Tracking" + ] }, { "url": "https://vuldb.com/?ctiid.270369", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.270369", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.368472", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-65xx/CVE-2024-6539.json b/CVE-2024/CVE-2024-65xx/CVE-2024-6539.json index fc29b720bc1..399264b9429 100644 --- a/CVE-2024/CVE-2024-65xx/CVE-2024-6539.json +++ b/CVE-2024/CVE-2024-65xx/CVE-2024-6539.json @@ -2,13 +2,17 @@ "id": "CVE-2024-6539", "sourceIdentifier": "cna@vuldb.com", "published": "2024-07-07T23:15:10.003", - "lastModified": "2024-07-07T23:15:10.003", - "vulnStatus": "Received", + "lastModified": "2024-07-08T15:49:22.437", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability classified as problematic has been found in heyewei SpringBootCMS up to 2024-05-28. Affected is an unknown function of the file /guestbook of the component Guestbook Handler. The manipulation of the argument Content leads to cross site scripting. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. VDB-270450 is the identifier assigned to this vulnerability." + }, + { + "lang": "es", + "value": "Una vulnerabilidad fue encontrada en heyewei SpringBootCMS hasta el 2024-05-28 y clasificada como problem\u00e1tica. Una funci\u00f3n desconocida del archivo /guestbook del componente Guestbook Handler es afectada por esta vulnerabilidad. La manipulaci\u00f3n del argumento Content conduce a Cross Site Scripting. Es posible lanzar el ataque de forma remota. El exploit ha sido divulgado al p\u00fablico y puede utilizarse. VDB-270450 es el identificador asignado a esta vulnerabilidad." } ], "metrics": { diff --git a/README.md b/README.md index d0d09b7ad8a..48b90d5217c 100644 --- a/README.md +++ b/README.md @@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2024-07-08T14:00:56.018888+00:00 +2024-07-08T16:00:19.189158+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2024-07-08T13:15:10.593000+00:00 +2024-07-08T15:49:22.437000+00:00 ``` ### Last Data Feed Release @@ -33,22 +33,50 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### Total Number of included CVEs ```plain -255993 +255999 ``` ### CVEs added in the last Commit -Recently added CVEs: `1` +Recently added CVEs: `6` -- [CVE-2024-6163](CVE-2024/CVE-2024-61xx/CVE-2024-6163.json) (`2024-07-08T13:15:10.593`) +- [CVE-2024-25639](CVE-2024/CVE-2024-256xx/CVE-2024-25639.json) (`2024-07-08T15:15:21.423`) +- [CVE-2024-39308](CVE-2024/CVE-2024-393xx/CVE-2024-39308.json) (`2024-07-08T15:15:22.080`) +- [CVE-2024-39677](CVE-2024/CVE-2024-396xx/CVE-2024-39677.json) (`2024-07-08T15:15:22.450`) +- [CVE-2024-39742](CVE-2024/CVE-2024-397xx/CVE-2024-39742.json) (`2024-07-08T14:15:02.550`) +- [CVE-2024-39743](CVE-2024/CVE-2024-397xx/CVE-2024-39743.json) (`2024-07-08T14:15:02.823`) +- [CVE-2024-4341](CVE-2024/CVE-2024-43xx/CVE-2024-4341.json) (`2024-07-08T14:15:03.167`) ### CVEs modified in the last Commit -Recently modified CVEs: `2` +Recently modified CVEs: `141` -- [CVE-2019-8761](CVE-2019/CVE-2019-87xx/CVE-2019-8761.json) (`2024-07-08T12:15:02.033`) -- [CVE-2024-34349](CVE-2024/CVE-2024-343xx/CVE-2024-34349.json) (`2024-07-08T13:15:10.280`) +- [CVE-2024-40600](CVE-2024/CVE-2024-406xx/CVE-2024-40600.json) (`2024-07-08T15:49:22.437`) +- [CVE-2024-40601](CVE-2024/CVE-2024-406xx/CVE-2024-40601.json) (`2024-07-08T15:49:22.437`) +- [CVE-2024-40602](CVE-2024/CVE-2024-406xx/CVE-2024-40602.json) (`2024-07-08T15:49:22.437`) +- [CVE-2024-40603](CVE-2024/CVE-2024-406xx/CVE-2024-40603.json) (`2024-07-08T15:49:22.437`) +- [CVE-2024-40604](CVE-2024/CVE-2024-406xx/CVE-2024-40604.json) (`2024-07-08T15:49:22.437`) +- [CVE-2024-40605](CVE-2024/CVE-2024-406xx/CVE-2024-40605.json) (`2024-07-08T15:49:22.437`) +- [CVE-2024-40614](CVE-2024/CVE-2024-406xx/CVE-2024-40614.json) (`2024-07-08T15:49:22.437`) +- [CVE-2024-4384](CVE-2024/CVE-2024-43xx/CVE-2024-4384.json) (`2024-07-08T14:19:12.827`) +- [CVE-2024-4969](CVE-2024/CVE-2024-49xx/CVE-2024-4969.json) (`2024-07-08T14:19:14.173`) +- [CVE-2024-5606](CVE-2024/CVE-2024-56xx/CVE-2024-5606.json) (`2024-07-08T14:19:15.450`) +- [CVE-2024-5616](CVE-2024/CVE-2024-56xx/CVE-2024-5616.json) (`2024-07-08T15:49:22.437`) +- [CVE-2024-5711](CVE-2024/CVE-2024-57xx/CVE-2024-5711.json) (`2024-07-08T15:49:22.437`) +- [CVE-2024-5728](CVE-2024/CVE-2024-57xx/CVE-2024-5728.json) (`2024-07-08T14:19:16.400`) +- [CVE-2024-5753](CVE-2024/CVE-2024-57xx/CVE-2024-5753.json) (`2024-07-08T15:49:22.437`) +- [CVE-2024-6095](CVE-2024/CVE-2024-60xx/CVE-2024-6095.json) (`2024-07-08T15:49:22.437`) +- [CVE-2024-6163](CVE-2024/CVE-2024-61xx/CVE-2024-6163.json) (`2024-07-08T15:49:22.437`) +- [CVE-2024-6209](CVE-2024/CVE-2024-62xx/CVE-2024-6209.json) (`2024-07-08T15:35:25.837`) +- [CVE-2024-6229](CVE-2024/CVE-2024-62xx/CVE-2024-6229.json) (`2024-07-08T15:49:22.437`) +- [CVE-2024-6298](CVE-2024/CVE-2024-62xx/CVE-2024-6298.json) (`2024-07-08T15:35:16.450`) +- [CVE-2024-6505](CVE-2024/CVE-2024-65xx/CVE-2024-6505.json) (`2024-07-08T15:41:17.883`) +- [CVE-2024-6507](CVE-2024/CVE-2024-65xx/CVE-2024-6507.json) (`2024-07-08T14:19:21.610`) +- [CVE-2024-6524](CVE-2024/CVE-2024-65xx/CVE-2024-6524.json) (`2024-07-08T15:33:01.377`) +- [CVE-2024-6525](CVE-2024/CVE-2024-65xx/CVE-2024-6525.json) (`2024-07-08T15:30:11.133`) +- [CVE-2024-6526](CVE-2024/CVE-2024-65xx/CVE-2024-6526.json) (`2024-07-08T15:39:08.840`) +- [CVE-2024-6539](CVE-2024/CVE-2024-65xx/CVE-2024-6539.json) (`2024-07-08T15:49:22.437`) ## Download and Usage diff --git a/_state.csv b/_state.csv index 277243b8a43..dad44f35b9e 100644 --- a/_state.csv +++ b/_state.csv @@ -99609,7 +99609,7 @@ CVE-2017-16228,0,0,a6d85aa2ba3efc1992e08530f50806492c225c1da0aade7013f9455c94a90 CVE-2017-16229,0,0,5ca388e98d24443ab9e7bf7b958f47e601c304dbd10de50dfa03cca42ef13986,2019-10-03T00:03:26.223000 CVE-2017-1623,0,0,88a14bb6ebadef7cfed86fbcf6d1b2a9de015e23fb75165f75fce895d2af522e,2018-01-24T19:43:08.537000 CVE-2017-16230,0,0,25b722e55810dc6517be8e7497c0827c02aab34179f49bf7fae29a1c2a358d65,2017-11-17T18:21:17.420000 -CVE-2017-16231,0,0,5bcce36e7f3fa067801ce0d5f5d296da7622552cc23ed522d8e62f215a09724a,2024-07-03T18:15:03.970000 +CVE-2017-16231,0,1,df63eed296fb2303a23341c01d880fb9c2698a229e0469e941069912e4bcc93d,2024-07-08T14:16:08.107000 CVE-2017-16232,0,0,5230f8a00bbd2340599989cab1f9c050441275546dd82ab222962f7f0f52523b,2024-05-17T01:15:34.220000 CVE-2017-16237,0,0,a725fb4ef8a8bd07b9ecfb34cc3ab831ed80b1946c3b722837ca2a1a3efe91a7,2017-11-22T20:13:26.833000 CVE-2017-16239,0,0,5320aa2b7fbd7a9c85d56deb3e115c4773c046dcbd4be3aa45cad309a242fc50,2019-10-03T00:03:26.223000 @@ -143008,7 +143008,7 @@ CVE-2019-8757,0,0,12c7413ce4d21de405aae90c6e9c8f2fad3dfd7f1c87c9617a2c20f09cb4bd CVE-2019-8758,0,0,481a1c954cc3e75d326a74520312e788fe7c1455912390c63a87b79a295b33cb,2020-08-24T17:37:01.140000 CVE-2019-8759,0,0,67a07d034ea72a9746cd7d211c6d1fb9cf8ec2be168cb0108a91624c2cf2291b,2020-10-29T17:43:49.443000 CVE-2019-8760,0,0,93c5bc0476d263a60040ce6a42f359d30744314ab024068713a0773cf5e20757,2020-08-24T17:37:01.140000 -CVE-2019-8761,0,1,95f98b1f0133ddd3923058e2af4ea66f90ac69f665a207661db285732e7b00db,2024-07-08T12:15:02.033000 +CVE-2019-8761,0,0,95f98b1f0133ddd3923058e2af4ea66f90ac69f665a207661db285732e7b00db,2024-07-08T12:15:02.033000 CVE-2019-8762,0,0,14ea3f2dc5091826dc7df7a62a73f54830acb9362c7533eb0ec5cd1abd4d0216,2020-10-30T00:56:08.800000 CVE-2019-8763,0,0,d8578b49c3b035f7d3dc9f5ca0ec1f47be5d996c2cc259d8f104a1afcd0008b0,2021-11-30T21:06:38.577000 CVE-2019-8764,0,0,4b392bc34d4bf1bff34be7204d9ffde6e54183482a70764254244990b6607802,2022-10-14T01:54:38.897000 @@ -187002,7 +187002,7 @@ CVE-2021-47182,0,0,d8638aeb7f3d070c315cd0d20f041c0708393c20163ab8ebe6e1d8ea36062 CVE-2021-47183,0,0,729c74bcf531cbf13d3a8d0b3ebed4af1d53bb85b37ee3a89ec273a2030d53f7,2024-04-10T19:49:51.183000 CVE-2021-47184,0,0,42ed410ab408c3953438a7b5d39d557e3bcd49f633a3b8668671cce03c8f1e77,2024-04-10T19:49:51.183000 CVE-2021-47185,0,0,96d130eb2d29fafe17fb425d9b79c0ea8ab6208e1929c9e63cd65dec64c83e87,2024-04-10T19:49:51.183000 -CVE-2021-47186,0,0,4badd03c6b06c49592b3526605c467557d8f42c7f8cd126f26d292402a4ed131,2024-04-10T19:49:51.183000 +CVE-2021-47186,0,1,32e88e8a4994e952337c950e93d75747419ab40591075f3a50a4e438df5dccad,2024-07-08T14:16:15.150000 CVE-2021-47187,0,0,23d3a5c2f0a01ae6b1096c427c1f0a891af2f272141d9f776fd786911bc8fbaf,2024-04-10T19:49:51.183000 CVE-2021-47188,0,0,19c9989864780fe125fb5c66c547214b93e2458ebc79a8389552181805de3c22,2024-04-10T19:49:51.183000 CVE-2021-47189,0,0,ff3cc76e7479417b6bd2fb2862f9fe573670f5eb5972edf86571a3e60ce51b96,2024-04-10T19:49:51.183000 @@ -187058,7 +187058,7 @@ CVE-2021-47238,0,0,3b5749e66c4a66ce2e47c8ef5276271531a3af5b310ad862877c7f81486d1 CVE-2021-47239,0,0,ce84c18ea31d0ab0a744f18fa6468b5c275a6126c345de40ea10bc0c9ef1512f,2024-05-21T16:54:26.047000 CVE-2021-47240,0,0,c908e42d41ddb74ebfabf665149eeda7ad5350206d9381261030bbec24bb393a,2024-05-21T16:54:26.047000 CVE-2021-47241,0,0,2764d87dbbdd945bdac610894ac6ec0ada98f0ab6455df88dafa8f522308ff27,2024-07-03T01:37:27.850000 -CVE-2021-47242,0,0,60a4600e7db813cddf859854f1e469858cbbdfee61f04b28efff60c5ccb535c8,2024-07-03T01:37:28.667000 +CVE-2021-47242,0,1,ec4631126e177267f3d94869b2ae40a651d3da7b1a82098d39cfa9c3d8f95393,2024-07-08T14:16:16.353000 CVE-2021-47243,0,0,d8ccb729b2c6d36fa70626aac46a95b79fb678f1a0becdc51ea04f82d34d9c39,2024-05-21T16:54:26.047000 CVE-2021-47244,0,0,862a44f59bca0b52c8ba78c02a97b1e91d96611d758b9d59455d6ffc3702b8ba,2024-05-21T16:54:26.047000 CVE-2021-47245,0,0,5afc4c1705ee784bd6d51252482d4d6e4343e98d07c4ba22248c5016340461e1,2024-05-21T16:54:26.047000 @@ -196778,7 +196778,7 @@ CVE-2022-28550,0,0,35acc23ce6a792e5e5b5aaac3eb04ef20f77b862a9fdd3d1d688e22d68c50 CVE-2022-28552,0,0,ce7412e2cbebcad23b6d5f8aee41f404093c0ef9456d5a64188a8b9a178a84d2,2022-05-12T14:22:46.940000 CVE-2022-28556,0,0,e6919561c53a29592bb473797040e71f76b6fc6a354b3e0728c53d29ab25e88f,2023-08-08T14:21:49.707000 CVE-2022-28557,0,0,14c37d4eb6faca376ae5724b2d225a206c86c764702a84399a7ba58e7d315068,2023-08-08T14:21:49.707000 -CVE-2022-2856,0,0,0f981b4648086d15039ed0e59bc2af356ea490e00ad4fbaf30b93bdc269eec6c,2024-06-28T14:12:35.147000 +CVE-2022-2856,0,1,896c8c84185b160147e459a5721b9c2ebb71fb64270cc727b4c50f6dfc499780,2024-07-08T14:16:18.783000 CVE-2022-28560,0,0,1281bdf707d5ebde484bec41497bd326577af9e0f24539beb33e7560d51103b4,2022-05-11T20:23:12.943000 CVE-2022-28561,0,0,30aec4d3bcb7a7b4315448f00aeb976a7e57c2c6ff373047940959f50fba2292,2022-05-09T19:12:30.380000 CVE-2022-28568,0,0,c727ea4350f3a22822ee6162ec6accb5336e24cdb2d788dda577511d06872071,2022-05-12T14:24:19.900000 @@ -215204,7 +215204,7 @@ CVE-2023-21233,0,0,f83e60f079d8f41c0cf0e4dfdf869daea71cf8b825d9d89062f4953269232 CVE-2023-21234,0,0,d376210f03f75bfd5d2cd6bc24feec4aa67c3d62d744f6e8b458712ac5735c40,2023-08-18T19:33:31.687000 CVE-2023-21235,0,0,a625b2cfe3b2fee73f801c841cb816b4d18a3011e8d179f5e4106684f150df63,2023-10-13T01:00:32.633000 CVE-2023-21236,0,0,4448df8ceb97e9e73874dad77b6c6e62fa278d9731a453716ef0830bbf919c17,2023-07-06T13:06:36.347000 -CVE-2023-21237,0,0,aa7fa1a5c9c95883cc07ba94a4d198cfb216ebe85d137ad7ea72384eec3f4be1,2024-03-06T02:00:02.080000 +CVE-2023-21237,0,1,5e9e83d3c527d7da41817756ef21631b05c76d8f8b570c86ff0b19621675c5f1,2024-07-08T14:16:24.090000 CVE-2023-21238,0,0,fcd04f3d8454b135d29cbb28637c61fd6e004fe256d4d8f862c15d79970af58c,2023-07-25T18:01:59.637000 CVE-2023-21239,0,0,6cf0c5492d372a4c9336714bb451fa1e622da760edbd856b1ae3d15e4ad5b4d6,2023-07-25T18:02:14.360000 CVE-2023-2124,0,0,736f21a8e5e23505859893b537af481340be2d21e9296db1a1182df04429dbf5,2024-02-01T01:35:35.037000 @@ -221008,7 +221008,7 @@ CVE-2023-28330,0,0,485bb14092005ab577833121758bce3d161c59a95731b9926f9cccad1c6a7 CVE-2023-28331,0,0,26c0ff3ccaabba628aef9726dfdb1352af4a09f863b0a657a20c78cd65328211,2024-04-19T14:15:09.107000 CVE-2023-28332,0,0,3a089716c48f0f690ccc5e4bbceaa12486294da2ed19b74c2d5b1b003b856915,2024-04-19T14:15:09.180000 CVE-2023-28333,0,0,cdd263ba73d39d67e43868153b27be67dc38b67123627c36c2edd1ed5a4ea9ea,2024-07-03T01:39:50.127000 -CVE-2023-28334,0,0,b8e2746a8d95ae9d870b8bd6563ee5705d5f350051dfd63dfa2b03f76983c976,2024-07-03T01:39:50.350000 +CVE-2023-28334,0,1,020bbf287cbf678ce94e82c216d690573f97fb53753548627acac36cd9828c68,2024-07-08T14:16:28.753000 CVE-2023-28335,0,0,a76a647c3a844572ec79d08d95cbc1bd15a530ae1464b638c819080c2b8c0361,2024-04-19T14:15:09.407000 CVE-2023-28336,0,0,a90e3c55e85603912f0d313aa52a80a12b40919a15337b020741ea87b001c767,2024-04-19T14:15:09.473000 CVE-2023-28337,0,0,ce6cf9b0f4b2f263d82dfa1955780cbb836c45f4e38b6cc688b91539c97068ca,2023-03-21T17:40:15.477000 @@ -226549,7 +226549,7 @@ CVE-2023-35850,0,0,16552d593667910c0cc3f4c007d69d693e2de6ac6f4e775a9e1514f5ced0e CVE-2023-35851,0,0,53dc52a60589c166a9fc999af036f833c0bf61a37f71c05522f8248e392d5287,2023-09-20T20:47:12.903000 CVE-2023-35852,0,0,5164099deb574b1ff695ac458dedbe195003f8d07f3fd8f45b959adb7f9b2ace,2023-06-28T18:44:55.743000 CVE-2023-35853,0,0,1d5543cff7caef934caabe271120dbfec98b5262a0ae313cf8f93f40799ea812,2023-06-28T18:45:02.593000 -CVE-2023-35854,0,0,1c39d442015db1a5acfa66cd5fb6d5559cb80e73215bad6a8c25d21a5feb64c3,2024-05-17T02:25:30.363000 +CVE-2023-35854,0,1,4c3ba685561aeeb42a319432c3cd231fb40eedac2f53e474c5dc1900f8b05221,2024-07-08T15:15:21.063000 CVE-2023-35855,0,0,1e9be71693fad7cf56d0318b0ba20d6035d9a725b2abbea2fe9539b815203b24,2023-06-30T17:15:06.973000 CVE-2023-35856,0,0,b854da7ee9c64545491e837f868263a8a8f96959c6af9d42f3060318b930132d,2023-06-30T17:08:42.590000 CVE-2023-35857,0,0,0ba70612435f4711dc24f371837dd94c4de0819880c87119106823057668b992,2023-06-27T18:37:38.063000 @@ -234918,7 +234918,7 @@ CVE-2023-47242,0,0,c3138888903cd8fcb2754b0791d88071c3cfc13dd82e34a134b61c7af7855 CVE-2023-47243,0,0,4ebdb0aecbd2469e0beccafd3673b31d5ed944cae98504ff13a8ceff8401ba94,2024-02-29T01:41:26.767000 CVE-2023-47244,0,0,595191fb3792f5f82a02495fc7b5f5e575a93b7222d04626fbc2e7246ab9ef97,2023-11-30T16:43:06.887000 CVE-2023-47245,0,0,3dc97c03a3ae06085e062ef4c281e9bafcbfd5f61e825a25debc9b6120ab09cf,2023-11-22T00:08:17.730000 -CVE-2023-47246,0,0,9162720d9bd428e77fd27094b08e876c13c3710160bedd8008fc4b72a8833c4f,2023-11-13T17:28:37.350000 +CVE-2023-47246,0,1,cc962cfee35e0f13b4a656dc3163334faa492503a9b2ba3675107e39876e9f48,2024-07-08T14:16:40.760000 CVE-2023-47247,0,0,966c9d0d782ca97be0178c785d554d88a7b720fbeb5b9216137dbdc74566eed8,2024-01-04T01:07:38.967000 CVE-2023-47248,0,0,c1faf85c0ed8c0ef232f3848ffe6326104885641832faacb486c49139e0c567e,2023-11-29T03:15:42.547000 CVE-2023-47249,0,0,588609ccc6bec02a404ce20559ef14e4186adae4632c04e95b8afe3f76e9fe1a,2023-11-14T14:43:52.597000 @@ -237318,7 +237318,7 @@ CVE-2023-50868,0,0,441162ca589ac69b8deae54bfa7fd19da46b4409f57def735182968a28a2a CVE-2023-5087,0,0,cb83bb80de48780d6ddfd511869f6feaba7211f246baaaa49f1e770f0a9c1488,2023-11-07T04:23:26.693000 CVE-2023-50870,0,0,5b8837a6e60e4203ba051628b99db23d2e092916c152f0e1a5a22594cfa2f839,2023-12-19T18:48:01.647000 CVE-2023-50871,0,0,4ddf269f53c856e0f2588f2eb354c7028d0f2397d2615866b6215dfdb27c4698,2023-12-19T18:50:30.227000 -CVE-2023-50872,0,0,a021604325aa3456721c7a25c0f6446029305a7e6cc4ff74bfaa1ed3cfb1801b,2024-07-05T16:15:03.870000 +CVE-2023-50872,0,1,df200b7a5bbfe8dcefeb05dbb22908af8faad2fd8685e1cdad008291fc0eac4b,2024-07-08T14:16:44.317000 CVE-2023-50873,0,0,e87fa567670fdb26487260b713fbb41babff8438b4b2db11ec3660a0b120d778,2024-01-04T19:20:51.227000 CVE-2023-50874,0,0,bcacd6fc18a6a7384f9e3410fc219a27fd51425023bb3ea76f15234acd5bd7fe,2024-01-04T20:03:30.020000 CVE-2023-50875,0,0,1106938097fb18960ed1f89813982d05ff2f39c25d4530bc17f1d69fd9b36d68,2024-02-16T19:28:59.943000 @@ -237501,7 +237501,7 @@ CVE-2023-51135,0,0,d5dfa726f5577ba7508ce233e276424bad2252ba782866f323d5eaf18aca1 CVE-2023-51136,0,0,2ca511da0623e4727922981a3a33dc85c47c0550d43a47bc34e3bca00a268bc6,2024-01-05T18:30:58.837000 CVE-2023-5114,0,0,4dc648ab97c5eb644a86e5f721a5758a4aff62f3c04184e8d35bd31381edc6f3,2023-11-13T17:48:55.993000 CVE-2023-51141,0,0,5d45f73c71d1490425eef55b3ca8f3c06a7ecd925e6da594cd37ea399f1ad53b,2024-04-11T12:47:44.137000 -CVE-2023-51142,0,0,dcf1a5c90f22ca3d39c95551d91bb38a596f7cbbf5ce8aec1650eb1f514703d4,2024-04-11T12:47:44.137000 +CVE-2023-51142,0,1,3cc421719bb627f399e2e569c0e2f084a8d2b6a78a2b82bf6a4efa03230e2ce3,2024-07-08T14:16:45.710000 CVE-2023-51146,0,0,c58742c2814329910a19c5e3b015ce075befe979ed58f3b8c72f13d36a7fff54,2024-03-27T12:29:30.307000 CVE-2023-51147,0,0,7959080fe69511978e5e745d51270188bb516ecb7fc9c53b5f9b0898f069f955,2024-03-27T12:29:30.307000 CVE-2023-51148,0,0,6df59fa91f23309ba6580e9ebafb2f3287fbdb32f0892c17ffc390e1fd55ca77,2024-03-27T12:29:30.307000 @@ -240660,7 +240660,7 @@ CVE-2024-0038,0,0,8798af074e75acf30506472783c98fe3ca6f9989b456036fb13460ce3a0660 CVE-2024-0039,0,0,eef2053d277ee92cf2426457ee1c3166f51184d93b11850784119e4a32b8f532,2024-03-12T12:40:13.500000 CVE-2024-0040,0,0,4afedb45d19d9a2df9a3ecdcf577c422a3b0751bcf061eb077253f060c2e8e31,2024-02-16T13:37:51.433000 CVE-2024-0041,0,0,4dc5cf8202a81389ba1711e9ab4229bb6c315c100ad135fbbcb3e9e75477a4a9,2024-02-16T13:37:51.433000 -CVE-2024-0042,0,0,f86d339d4113b5a4769bf21105f85dafb8e05e2676c67a9485f2ba2585631706,2024-07-03T01:44:33.743000 +CVE-2024-0042,0,1,34dd3c01d1963f1fea072b87cd9587b8d1a38074bff497ca57638675955e85e5,2024-07-08T14:16:55.973000 CVE-2024-0043,0,0,f3099d06b40cffee02572b8511d5ab7fd4ed425254fa8e65e2f8173e0b0fad0e,2024-07-03T01:44:34.530000 CVE-2024-0044,0,0,1b47d31ca0f3ca49c0b5dc05a9176417e6a0ac469a146bb9b6eda355db8c477c,2024-07-03T01:44:34.730000 CVE-2024-0045,0,0,74be948ede2409dd1fced42dd7b971d5edcab5dd8de9a50e019ab3d0529aa80e,2024-03-12T12:40:13.500000 @@ -241403,7 +241403,7 @@ CVE-2024-0901,0,0,8395d055c39a2ded7a6676d9f91e364a6c601b11f066a458c7ff4909044d58 CVE-2024-0902,0,0,c022af4b73cd366b52a576af13eecfefbd72fc877962e0376aba015f72537ab5,2024-04-15T13:15:31.997000 CVE-2024-0903,0,0,4e5a944405938a6def0adf008001af709d311e38e0572265081d65abf85ff9fb,2024-02-22T19:07:27.197000 CVE-2024-0904,0,0,fab3a61cdba4923764cb3ae55d74177de35d6261954d7436309469f8426d3232,2024-05-06T12:44:56.377000 -CVE-2024-0905,0,0,b09c0148d010492e0c5e8dbd61aa5f1ad2339578863cbfd2ea25aae7129ad665,2024-04-26T12:58:17.720000 +CVE-2024-0905,0,1,d52900a984e4bdf43bb45af187fbba5de373b101ee9f35013fe0e6ae7cbcf229,2024-07-08T14:17:00.580000 CVE-2024-0906,0,0,2cb73c39a2e6fe8ef5222442ed25db55924374576f26540dbc47cb2f830bdc5d,2024-03-12T12:40:13.500000 CVE-2024-0907,0,0,736d9a373e93547114922fac343df53c487c280e59648bef9a3cecc6379f908e,2024-02-29T13:49:29.390000 CVE-2024-0908,0,0,a7a4198c8ea4948ff50baff5b198d47526d6c715136e7f4dee3e5232dedc1252,2024-05-02T18:00:37.360000 @@ -242178,7 +242178,7 @@ CVE-2024-1751,0,0,7aa616bef5e27ed13b371ce9dacd4080fc5ffa6154b1e45a0ce11f0de1f1df CVE-2024-1752,0,0,3b691eb63c202be2eb926d4c3601a8229a1e699fd5812dcaec474adfd9c6bd05,2024-04-08T18:48:40.217000 CVE-2024-1753,0,0,a6a07480e2c1fe61fb766a5b2a1962c917335220514174d8d1bc7db746c6b784,2024-05-24T00:15:08.397000 CVE-2024-1754,0,0,bb1af71458eba5bdfb6b90e382cbcddd60b96fb9bcb7aef4fa5483aa2a532c8d,2024-04-15T13:15:31.997000 -CVE-2024-1755,0,0,c4c00c2e9213cda2dc6708362bc52ae20ba1dfc3c894f2897c9375b229ad840b,2024-04-15T13:15:31.997000 +CVE-2024-1755,0,1,3d3eb53461864a2d0b6846883348dbee673cb6d9a59185cf31292954d770d20b,2024-07-08T14:17:11.257000 CVE-2024-1756,0,0,62e52d79aae78b309e4cd5e4ccf86fb8ee93e230c568d1d0b7a63a1cf36aba4f,2024-04-24T13:39:42.883000 CVE-2024-1758,0,0,ec8762d154074e4ab58ddeb13f4d095ad000df3cc9355e1ac29cd6bfbf89fabc,2024-02-26T16:32:25.577000 CVE-2024-1759,0,0,d11de5d4487572ad8bc38ab0b5a974e026a76188a119d5a32ecf52b8afd1c4a6,2024-05-02T18:00:37.360000 @@ -242610,7 +242610,7 @@ CVE-2024-20391,0,0,f91eada0700f8cd9f2eaea2b871ba7d3969d87e51919a0eb478edbaaab6f3 CVE-2024-20392,0,0,ace66ba4c79c3f433832bd6cfa0988701f79a2b5d6c0fbe5016f71bba33a0a9b,2024-05-15T18:35:11.453000 CVE-2024-20394,0,0,d0e5fc3a79dfeb923dc3f02320ce7649899cba8340301b836f168cfe3139baa9,2024-05-15T18:35:11.453000 CVE-2024-20399,0,0,40162d3d58c44619359063d12b3450c60237a60b95e0ce2c02a9d7dd539d8ffd,2024-07-03T12:42:39.597000 -CVE-2024-2040,0,0,df808021087d3f6a2e44d65a8044fb74a01896447243a557a16d975f04570119,2024-07-03T18:23:41.487000 +CVE-2024-2040,0,1,84818b4f00c676396e69702449b7daec96ba4021835b05a5adb074a919ab8480,2024-07-08T14:18:10.367000 CVE-2024-20404,0,0,679bbd668c3128b9d2c298395d952eaf5fd76470dbc9bd0e765678566e0d175f,2024-06-13T20:25:46.837000 CVE-2024-20405,0,0,e5acdd821474e29805e089211fec2d1d30a76e0d4d4635efbeb215040858791b,2024-06-18T18:04:04.497000 CVE-2024-2041,0,0,f285d116ebee20fb02fc2c7de4f69fe8567e76fe9eda446fb7969801431b3d7d,2024-05-06T14:15:07.747000 @@ -243063,9 +243063,9 @@ CVE-2024-21070,0,0,e8030e5c2290cb4930c1b97772fc5cd61f6499852535f41c7c876dacccf80 CVE-2024-21071,0,0,03289049dae9db581ba288f8404b2ec6bffda8d448aa4ca077c7b01898c361e5,2024-04-17T12:48:31.863000 CVE-2024-21072,0,0,ce9c18c2018de5a843e261ad002d5993f0ef337de7ee9186d80c4ebf4b6aa9c4,2024-04-17T12:48:31.863000 CVE-2024-21073,0,0,fe115e70b52ad31927d6472876ddfbdaca8735a212deb1a232b2d9074bc4b1e1,2024-04-17T12:48:31.863000 -CVE-2024-21074,0,0,e06fcaa946227d65b34309ee41ab70ce63c30d30364915864f5924dbf6f4fc07,2024-04-17T12:48:31.863000 +CVE-2024-21074,0,1,051e1574ad44e9fc134434d9fc9291336fdac976a78056659b667cad82103ed4,2024-07-08T14:17:20.423000 CVE-2024-21075,0,0,cc7a1b452aabf2c5ba5be2bf197f726766390484fa39b3173c57c158d7db1520,2024-04-17T12:48:31.863000 -CVE-2024-21076,0,0,de2f9ffc37175b721b3a72d1db942b2eb835c46e430692e9a7c17dad77f65722,2024-04-17T12:48:31.863000 +CVE-2024-21076,0,1,cdb3cc254612d1752c3cffca87777e374b4c26fcac1665448f74861effaad989,2024-07-08T14:17:21.220000 CVE-2024-21077,0,0,7d54f962fd329410a2de9cf3e3be674abbf89ccf22e3243716f40918071b6077,2024-04-17T12:48:31.863000 CVE-2024-21078,0,0,f9bfccaa6eb825543f5768c39362b7a618eb3696380078751ce4b1ae799ced0c,2024-04-17T12:48:31.863000 CVE-2024-21079,0,0,9f653adcd001d570b8e4c09d0ffa19cb5ecf76d40d796eee507d123a582ce247,2024-04-17T12:48:31.863000 @@ -243682,7 +243682,7 @@ CVE-2024-2210,0,0,5a03f758877779e9677ec1f83746a6fce63214add6c369b78804c38534e8d8 CVE-2024-22100,0,0,a6ff3a70b4f3071cb6edf59573e0a019914b2e075d17d6c1c64c20010521b0fb,2024-03-01T14:04:26.010000 CVE-2024-22102,0,0,ee912b26c5f7cee5f9eb859546c190fdb98e830544dee57d01c3888ba8630d97,2024-07-05T17:03:19.087000 CVE-2024-22103,0,0,c8cca3af00da48367ef48bbedd18587bf8b3429750474a031b56e74c1ca1eee6,2024-07-05T17:03:27.443000 -CVE-2024-22104,0,0,f47280027bb9d11795a37e77637d497d8defc91ea75d3e4a26a27d40ce666840,2024-07-05T17:03:41.903000 +CVE-2024-22104,0,1,46f7c14be53e7da77ec7952334802c5317eb32a02297b2565c92e14405615a15,2024-07-08T14:17:26.540000 CVE-2024-22105,0,0,85df55a9066bb053c302f07c9b18f29241a4312ce2bda90b82d2854172ae61fc,2024-07-05T17:03:50.940000 CVE-2024-22106,0,0,f122ebe1c50607a0115cf3d0b091929cd936ab081af02de4de0ee8a1c0fdaeaf,2024-07-05T17:04:07.103000 CVE-2024-22107,0,0,e3cca6041ab5ebaddd7412e3f1116f94d2eef4d2646eefe8a425a6cd027599ec,2024-02-09T19:44:32.497000 @@ -243880,7 +243880,7 @@ CVE-2024-22320,0,0,b7e6bc5c871bb2a076b1c4d217e351ebb443d568b1fdbb86f9513f16f0da1 CVE-2024-22326,0,0,611aa89f02e2c1b3e79c0d2da37798e3e77fccc4ee223e6b80d6313dd22973d4,2024-06-07T14:56:05.647000 CVE-2024-22328,0,0,1d3eba54d3dcb9850fbd9a86e1475d83621830be3d74777232b85acf89e88234,2024-04-08T18:48:40.217000 CVE-2024-22329,0,0,6b484ef8d82a649c0162bc9be85600528b13c1a759ed8ec79e69e3b10b67e2d3,2024-04-17T12:48:07.510000 -CVE-2024-2233,0,0,a6d6229d7d908e0b7921c949af0256f2aaaf4d3f324c4ab3360e5aa299ab9b2d,2024-07-03T18:23:28.183000 +CVE-2024-2233,0,1,64d5f0d00597a950fc292ee037f4f02af319aec097e9756db9a22b729db28750,2024-07-08T14:18:11.917000 CVE-2024-22331,0,0,79325856c8baa9082651d9383783f7a4198ba299d30e2c67010ba88c7f1776a4,2024-02-13T20:26:23.780000 CVE-2024-22332,0,0,a27f7ab666232b70f986037d449131d6bde483413718019674022f07be0d9b9e,2024-04-03T02:15:07.973000 CVE-2024-22333,0,0,dc6ffe95ff5a7403a67c60cf469ac371d4effee2bd0a4db051204dcf972f9e7e,2024-06-13T18:35:19.777000 @@ -243890,12 +243890,12 @@ CVE-2024-22336,0,0,92b17f3ddf77b7c8a53a41f903603d0d36207de06fae8bd71fc2469777bc3 CVE-2024-22337,0,0,9a674fac9bc4716d61a028d3be9473027552f3c1c11335efca4b4ddefd1e14f0,2024-02-20T19:50:53.960000 CVE-2024-22338,0,0,6e079f32e725c30ab50d30a352b744d0c760c6659785a2e99ec5f98e6f27b645,2024-05-31T13:01:46.727000 CVE-2024-22339,0,0,7da5694b93905b7c6d93ed93108dac6dab6202238259984860ef1d6e1bec9ec9,2024-04-15T13:15:31.997000 -CVE-2024-2234,0,0,d7c9b289e82b0bdbbdbfa575ed935c11dcc5b73b9b78998a1f5c6c7c99b74afd,2024-07-03T18:17:13.110000 +CVE-2024-2234,0,1,27f5f37b33daca2ec1fe8c2ff22db2eb02885beed0da54584837757cda834bae,2024-07-08T14:18:12.157000 CVE-2024-22343,0,0,98c7840ac2eb50dcfa88f4141a657f976aab7d39f92de1ccb97b49719a76ede0,2024-05-14T16:13:02.773000 CVE-2024-22344,0,0,dd931266b7e962044b40a6567c41617f6ff2ceb50100fcd1ed62bcdaadd651ee,2024-05-14T16:13:02.773000 CVE-2024-22345,0,0,a53b92e2f5ec18ca2cba51b0a304f5cdd6926e00d82cbe49f8f763399c2a3daf,2024-05-14T16:13:02.773000 CVE-2024-22346,0,0,638ee4e9687c7c28032b432c317662713c057110b08b4b27024e81eb8453bf9e,2024-03-19T16:50:10.570000 -CVE-2024-2235,0,0,ae7a1690ace0a92dde8549437b29b60f096066700d39b7ce597be7e3bc66f6bc,2024-07-03T18:27:18.097000 +CVE-2024-2235,0,1,d52e615f0725508611b58f032197b373f446ce89f72ec24e49221b49da38e21e,2024-07-08T14:18:12.410000 CVE-2024-22352,0,0,8ad74f9c108b142191e10d9f1af5800c7055fc5b8e79f7a9a2cf40171c06b8cd,2024-04-01T15:23:54.530000 CVE-2024-22353,0,0,ad692a077e5b804e1764ffb4f197bc72c54e38388ae47b5f805ac59827db6799,2024-05-16T00:15:08.057000 CVE-2024-22354,0,0,68792703b2560a4c3917a12fc2257c1fa0af627e17204b8c7ed6a62e6c56f559,2024-05-21T19:15:09.413000 @@ -244103,7 +244103,7 @@ CVE-2024-22725,0,0,386223ddf5bd359b392565f888fa17c656c4159abf859639a21b41119e3cd CVE-2024-22727,0,0,552f053e0e1c0024595d8b9c36096b73d98357dde818cb308f879c4f292f67ab,2024-02-20T19:50:53.960000 CVE-2024-22729,0,0,57c8e9cec7b5acfd3e659a660e85c84e7c6a8dee54d39c1d317d497e3590bfe9,2024-02-01T15:15:34.173000 CVE-2024-2273,0,0,226f716b8c94cc5b12531d84d0c8be8d682e8d950fddeda86193a54bf8ddc163,2024-05-02T18:00:37.360000 -CVE-2024-22734,0,0,5b29ead2fec2266be0511a439a526227ce73f41cf38156b43e55fa7f8f801313,2024-04-12T12:43:46.210000 +CVE-2024-22734,0,1,a3491dcc3c7b5d449a7e86cb6408877457dffcd3f57d3503ef629f53a0b65b58,2024-07-08T14:17:29.360000 CVE-2024-2274,0,0,40ed7058799586f85ed9cf7974708d9e89325007289b5a5c8b24e22328c5a455,2024-05-17T02:38:08.363000 CVE-2024-22749,0,0,28b47196f940e010ff68d16ae17a176c2008b3f3d80a9a233b85dddceddd9f34,2024-01-31T18:01:59.017000 CVE-2024-2275,0,0,0ecb27f09bb04a3b8636913f7da1e214b00320dabdb6b0046a31b352959e985b,2024-05-17T02:38:08.460000 @@ -244519,7 +244519,7 @@ CVE-2024-23479,0,0,347fa1fab90846375f3cbda9f21578cf079b96a3697a975655102d71cb94c CVE-2024-2348,0,0,1b2471f8551c69b217b1850b52d1bf1e7f9aea8e8dfc43b59c7bf2992281c35f,2024-04-10T13:23:38.787000 CVE-2024-23480,0,0,746423a9c0519d4cd61a53767c7c801bf960cd35765efe9e634ac2b6a706568b,2024-05-01T19:50:25.633000 CVE-2024-23482,0,0,9bbfaddb28c8d4f40fa7310b24a63cdb6abbe6ffffa800b3d9da686c071e8fa5,2024-03-26T17:09:53.043000 -CVE-2024-23486,0,0,84628b24191ecd8d97cad40624d059dda6678dd017cf385c75eef18a5c2f1b3a,2024-04-15T13:15:31.997000 +CVE-2024-23486,0,1,19778667fd58f188ebd5dce67e80ee87824728dd11d9e77fe76b5575568144f6,2024-07-08T14:17:34.250000 CVE-2024-23487,0,0,a175e3c04cbc36aafa8849dd45382b7985448c7b7394b27b709a0973fe2c1d2f,2024-05-17T18:36:05.263000 CVE-2024-23488,0,0,57450458303c48f58f7accf28de637666e8c4b38b2ec58f4dc15eb09b92be21a,2024-02-29T13:49:29.390000 CVE-2024-2349,0,0,1cc77de493fe0b03afe48fbb7506c201e2aa75f56de015399faaa6e014b8cef0,2024-05-02T18:00:37.360000 @@ -244588,7 +244588,7 @@ CVE-2024-2358,0,0,a1b0ff86c10dcc0cc90254078c2507c7f215f808024299c95ae7b33a0c1059 CVE-2024-23580,0,0,5718ea9f66086a41a59f079246d02ed41858f86711210914df45620e8d73526f,2024-07-03T01:47:56.403000 CVE-2024-23583,0,0,8045b8b55a9fb922e451a3cdb9c3e44b27bb0ff91f2a1c66c35720ad6820d03a,2024-05-20T13:00:34.807000 CVE-2024-23584,0,0,0a74df816091d3b0eb89fda75cd2dbdfa4a27fc3d1fc7171d6cfed2608adfd53,2024-04-11T01:24:48.327000 -CVE-2024-23588,0,0,4ffc2acf9effe90187e9b25eccec34de3a5019ee70bec840f9cec28b006e05fc,2024-07-05T17:10:58.210000 +CVE-2024-23588,0,1,616193c58804c0df33f02bbe918628fdff6c0cb92f6852ea08810ac3765e566c,2024-07-08T15:28:10.993000 CVE-2024-2359,0,0,33fa70e58cb138f001f137996158cf53baff2fc647d26dc120be368c2b10ed74,2024-06-07T14:56:05.647000 CVE-2024-23591,0,0,f4c08614f6a162f49ecc99f020c088036b0b565e06b57796e1304b45ae78e59d,2024-02-20T22:15:08.353000 CVE-2024-23592,0,0,8410729adf8ea2140a95009744b2dfc023c8f0c5b5843d18404a4118ed1b693b,2024-04-08T18:49:25.863000 @@ -244731,7 +244731,7 @@ CVE-2024-23755,0,0,20f404ef06f0de4002ad00bfcb3ecba797133c7898cd26c253955293bcb6e CVE-2024-23756,0,0,ad98c26cac3e251d6e147a06061ab8f37933ff482c3e1fc10e9847ddd0a56975,2024-02-15T16:01:08.870000 CVE-2024-23758,0,0,0b90af0eb87a8b48149c5b2c24a267ebd8f5a25fb833966d160033fff9e77828,2024-02-22T19:07:37.840000 CVE-2024-23759,0,0,73fe4ef6829a19943e815065d62e01eb8bcfa2b42e847a75f95d5c33c8cd1503,2024-02-15T04:49:02.133000 -CVE-2024-2376,0,0,35e26d01d22693955a060e3d7e1c4e65f3ceb910b08778c63cf5693a5ed6703d,2024-07-03T18:26:55.777000 +CVE-2024-2376,0,1,9e2099f4b58a69061afc220ef5842f9c8951cb095f07ed94c7b9c40dacf75e0b,2024-07-08T14:18:14.030000 CVE-2024-23760,0,0,bb86044c0a5dcc35ef326482cd22c362ff5c354c2c47549b45272f40e914b5cf,2024-02-15T04:49:31.847000 CVE-2024-23761,0,0,91423f3fc0ae4a6c135e3093d5ba2f92b18f0705b43e8497a65147830ffb84f4,2024-02-15T04:49:36.837000 CVE-2024-23762,0,0,1fc25d58731097f8aad4c8f7676cdc9a123654581fd6c8477b826714cd9e330b,2024-02-15T04:49:42.123000 @@ -245110,7 +245110,7 @@ CVE-2024-24479,0,0,01b1e2a4cff6671c0c34223ca9adc073cb5eb3c2fe135c28b7bdceeff1896 CVE-2024-2448,0,0,9e30ccfd39b87812540a13d959f2aae1c5a415e25ce2c2852e72d5c6bc3b6d43,2024-03-22T15:34:43.663000 CVE-2024-24482,0,0,d0c5de64fed42524f00b63fd5c9fd6582210b6f756383f7c85fd22e6463f36a5,2024-02-12T17:46:35.760000 CVE-2024-24485,0,0,c7e8c403d6357c5922b5d47216b7ffdcf22e376618ae35637f5f2b9e30ec0927,2024-04-16T13:24:07.103000 -CVE-2024-24486,0,0,d7ed2c16e5601f75e195b3cac3961ea438d1470aa390add1505048749d707e17,2024-04-16T13:24:07.103000 +CVE-2024-24486,0,1,afebaf61f3b75669fd0b18862267b3612427e15b853da36136f90ed281f72919,2024-07-08T14:17:37.030000 CVE-2024-24487,0,0,61850b43e58031befd51f24dca0d71cabb99802e7eb8c3674186f5ae5bc1c9ee,2024-07-03T01:48:18.013000 CVE-2024-24488,0,0,1834d834c06b744231a786a072c029583b1651fcc4f266317ba3be41edb13e03,2024-02-15T02:23:45.887000 CVE-2024-2449,0,0,81af4b04300933867744fde84b6165c2710bb3d8c358245e7272e559a8ae0dec,2024-03-22T15:34:43.663000 @@ -245284,7 +245284,7 @@ CVE-2024-24788,0,0,ec3a0e2bb85b04f6091132ce0b358d8c88079508c68a38db8ec47a1c1ba68 CVE-2024-24789,0,0,fd6a5b95d991b0dab3309c11b164e4c1e60de61b7d4a99fed36d8b88b927fd59,2024-07-03T01:48:25.510000 CVE-2024-2479,0,0,62ab2572f43d54e062a6ec9f07869b63a0bdfad1924b8c09404f39717bdfbd77,2024-05-17T02:38:14.640000 CVE-2024-24790,0,0,eea6958e81d73afbece6bae935d256b81d43a28af6bfcc689fa474522b0325d6,2024-06-18T17:59:12.547000 -CVE-2024-24791,0,0,d6750c1bff921be3db20c9661706ae6a1028345b03fca5380ec164ecc9b52e93,2024-07-03T12:53:24.977000 +CVE-2024-24791,0,1,47d95c50753471e151a6eea3dba3db3a2ed137995344fbfddcc8757be9c73f89,2024-07-08T14:17:39.083000 CVE-2024-24792,0,0,856277335b0a65941c91908e89bfe8db9fa7dd817204d99e1f16a0e92b8015e5,2024-06-27T19:25:12.067000 CVE-2024-24793,0,0,c02d48f5d574325816298b4b1d2848ca92f5dc7aa67a2fd30978e3885630bc1b,2024-02-20T19:50:53.960000 CVE-2024-24794,0,0,0d491c54da3b197a1321ac69102f9de79d058e3462ee7572209ea583555d837a,2024-02-20T19:50:53.960000 @@ -245451,7 +245451,7 @@ CVE-2024-24963,0,0,f7ac6d9beae69472289af258cfa7df94f3fb587efc26344b96102b05f5639 CVE-2024-24964,0,0,6aeb3e68bcce4e30c320efc8bbc0ba8ea40b022ead3c928aca7667e8626ff2cf,2024-03-12T12:40:13.500000 CVE-2024-24966,0,0,a6e715310d1619966fe5747d39679f64ae1b61eb46bb4d8fceaf05df6847efb8,2024-02-14T18:04:45.380000 CVE-2024-2497,0,0,a2f60841ac4494781cdcd08b43982a34617e8b0f51f90f443479a810b923dd8b,2024-05-17T02:38:15.830000 -CVE-2024-24974,0,0,f43a480522cbc61c35b9a75bdd6c9532ee59e8cdae93bb2aa498d949ececb731,2024-07-08T11:15:10.103000 +CVE-2024-24974,0,1,2a6f71d2cc8c0eb432e23bd3ddcb827a064b2ef1986a3563594a668bc7ee1e7d,2024-07-08T15:49:22.437000 CVE-2024-24975,0,0,375565038c24fc327fc2c0a3c714946ca9e1c626fbb524a69b78744e6d3eab6c,2024-03-15T12:53:06.423000 CVE-2024-24976,0,0,c9c1564bfde752c9f650b4df6eb66a2a9d3a9d0c2cc93ccf26aa30039f28a3d8,2024-04-03T17:24:18.150000 CVE-2024-24978,0,0,c5ed5bc9ba8c7757cb570e2c66a5838ec85d55ef0ed0e79605098288eb1bfdda,2024-05-01T19:50:25.633000 @@ -245509,7 +245509,7 @@ CVE-2024-25080,0,0,b71676650e0fe980740d0ba2f09b4ab96eab09f2522aeb1c79a8cba30e06c CVE-2024-25081,0,0,37094cd80b0e02ee04bd4b4ad310191b35edfe5b1b26bd730c126ade0890fc6e,2024-05-01T19:15:22.183000 CVE-2024-25082,0,0,73cee04ee797f69b5a7d548ce52642d4be8f4f30b151a272c43f273d4c926f75,2024-05-01T19:15:22.237000 CVE-2024-25083,0,0,ecc895ce722780048524674e78ace2df40ec2c99910e00911749a5ffd9d0dca3,2024-02-16T21:39:50.223000 -CVE-2024-25086,0,0,a5eeb05c946c7445bfc820febb6a9af9baf52a4b97d949f4c3c84d84a5dd921c,2024-07-05T17:04:31.943000 +CVE-2024-25086,0,1,d7f7d87d6cdc4c934f4645f409f9d6ad95bc0b43a7473acdcf85c7b382132abe,2024-07-08T14:17:42.020000 CVE-2024-25087,0,0,c72ecbfe33bc1bedb424c3a8db8ed1e75d362fa6fbd3c127b6373b38910f773d,2024-07-05T17:04:43.917000 CVE-2024-25088,0,0,9b1375c3c781149325c14c39fa835c2c88a69323c212b1013c4ad4d387aa77de,2024-07-05T17:04:50.340000 CVE-2024-25089,0,0,5efabd2c26974f37d1846cb1668b5b36df31dff51c549d5b8d4c512bfb0c7d05,2024-02-13T00:38:12.137000 @@ -245675,7 +245675,7 @@ CVE-2024-25327,0,0,ed53fcf930246e366b75ca3dbc41603185b262291cf82ff3e550f2ed4e97b CVE-2024-2533,0,0,6bfad491a93c285e3e448ce861cd92dc464a5d4992debf478aaf75554c70219c,2024-05-17T02:38:17.843000 CVE-2024-25331,0,0,60a22b9e40d224a5f3b5e272a457dd70292f6aef15fb2558c273ff847702ea0c,2024-03-12T12:40:13.500000 CVE-2024-2534,0,0,7cd66cf4d0ef220f3a3a617f1ab195a4ad71ecb54fc3bda3b710a3f0905cfcf8,2024-05-17T02:38:17.933000 -CVE-2024-25343,0,0,6b6e874e828c537565b9a5fbd327623e557ad16f3688aa2d66fd5c1b213f6f0c,2024-04-29T12:42:03.667000 +CVE-2024-25343,0,1,cfac06f9939fe5d18570b1e92d9f42a290b261eb4527d5cc619e721907c7fb78,2024-07-08T14:17:43.447000 CVE-2024-25344,0,0,af08989cf380f6e278fd692845297ea5605f46af513902cda38a18d17b6f3747,2024-02-26T16:32:25.577000 CVE-2024-2535,0,0,5003a806af9fd722d81a3ae38c9ab95ad0fd8018f3974e8238a7f92af2686e56,2024-05-17T02:38:18.023000 CVE-2024-25350,0,0,4025b81199a224e7878ebb894cfce4cd4a7613ab77d81e491781294f349534f6,2024-02-29T13:49:47.277000 @@ -245689,7 +245689,7 @@ CVE-2024-25366,0,0,42444ea7163dcf216e98149de6c852e3a522cf0916fcfc86ec3c2f68f59c5 CVE-2024-25369,0,0,6b635a0ec16a5aff0496a1a96852f7939fcabc08a5bea78c4a18bfb5071718c0,2024-02-23T02:42:54.547000 CVE-2024-2537,0,0,1f41062d9c569d097a1f83b6423e6bd4af390e61aefb651d81529a99d006de10,2024-03-17T22:38:29.433000 CVE-2024-25373,0,0,e0ff1a506e264205f05ff5dfb08ca8606bed2dcd288daabe6cb7d0672a79c3dc,2024-02-15T19:55:09.230000 -CVE-2024-25376,0,0,cad390cf26489dc42abe8482cfc0336f9f959e67d6db90164cc870ea4315eb3f,2024-04-12T12:43:57.400000 +CVE-2024-25376,0,1,6a816dff6e980af2ce9830b28c1e10df0bab9ab3e8e9a695c06849f72c23c21a,2024-07-08T14:17:44.317000 CVE-2024-2538,0,0,76b93ae224a24367b46e8c1c7174e817658d44516f37f153afebf9ab41a3e820,2024-03-20T13:00:16.367000 CVE-2024-25381,0,0,2fbf6a4c7caf83717eb116c843eb9d06446ef20fab32ebaa59c38b740fd20318,2024-02-22T19:07:27.197000 CVE-2024-25385,0,0,3d2189f37c69e02ce7f2d6f668e9f0e15554305edf58754347a8471b02d03f2f,2024-02-23T02:42:54.547000 @@ -245848,6 +245848,7 @@ CVE-2024-25634,0,0,c1510e3ab0b733f2989d621c241e546f656e3e790b7a0232e637470ddb569 CVE-2024-25635,0,0,a4a1398f401e935ab32cbd396026a9007e03a9f1dbbfebcc101e2a33975e9674,2024-02-20T19:50:53.960000 CVE-2024-25636,0,0,25ca08d2d7942010a89cee168f33ec13089ab5d688be0f620a303dd1bdaf78e7,2024-02-20T19:50:53.960000 CVE-2024-25637,0,0,bed3eb3cbd9201a59663cf94695821f16dff27d5f1d34ca085375a6f38d3b013,2024-06-27T12:47:19.847000 +CVE-2024-25639,1,1,8ce501f38b8b45bba5bf78b934ede07cf26f740f025fcf0f944bf3a23841562c,2024-07-08T15:49:22.437000 CVE-2024-2564,0,0,06f131cdbceb269732c61d2fa80714aae66d7510c20454358bb409674d65f586,2024-05-17T02:38:19.517000 CVE-2024-25640,0,0,e7a5a66e06481c463ef3267e2ad9b6391b00223315aeb71281eb8d63b041ce79,2024-02-20T19:50:53.960000 CVE-2024-25641,0,0,01882f7d04c2dc87c7d221824ff0834c6cbd589debd5a7b4cc399662a920b788,2024-06-10T17:16:21.837000 @@ -247353,7 +247354,7 @@ CVE-2024-27453,0,0,4fa62fb0431b68f90533abee1343406b0149f9efe637bd75fc3a77179a8be CVE-2024-27454,0,0,6d3a09532b89ef204254e66da503964dcbafd450b5bdda0990f449d144c8e54b,2024-02-26T16:32:25.577000 CVE-2024-27455,0,0,2d941179924c9f77cb732b35f1b7b9f5792b70ca51de1e84f09167eb77852176,2024-03-26T16:15:12.263000 CVE-2024-27456,0,0,3292722b93148b4ab52923fa8e4498babe5b306f79794afb1b6b9f9d803c4911,2024-02-26T16:32:25.577000 -CVE-2024-27459,0,0,68d9baa047ec8829992cd91c7aa9539644df9d2f9a98e79ebd79c967be77040f,2024-07-08T11:15:10.303000 +CVE-2024-27459,0,1,10440232796ebc5df7d034a2fbebe753437849e50adba619ca90618ce892c085,2024-07-08T15:49:22.437000 CVE-2024-2746,0,0,1b5368899c557a576ffe86c7e7b79d4b6baeb106e8e490e5cd11b765b982c384,2024-05-08T13:15:00.690000 CVE-2024-27460,0,0,df535e4d58c862090dbd04ef172ea8290b582d97a5936fdd9d6a3f9c58e5f496,2024-05-14T16:13:02.773000 CVE-2024-27462,0,0,ffc1613a8162349f9e85ee9ce86cbdc5073a2092a76bc9fd14c2d891290e403c,2024-04-14T23:15:45.830000 @@ -247452,15 +247453,15 @@ CVE-2024-27703,0,0,2b79380c63baf4bc3c9abfadfdc13a8325f8dae30b340951dc89a1b9f1e8f CVE-2024-27705,0,0,3d747f0757e381b42c2775f784e825713efa67635f4ff8b104a1a16be5b625e5,2024-04-04T12:48:41.700000 CVE-2024-27706,0,0,c91aee23aaa0ed501da15123d608c9d5855bcbcff43faab8a1a227af822acd84,2024-04-04T12:48:41.700000 CVE-2024-27707,0,0,bd4780ccfe95d75b10e00a8c73b93480b3348a16006d364b38b5efca7ebc67cb,2024-03-08T14:02:57.420000 -CVE-2024-27709,0,0,fbb538aec14e5ef92cd0cf258282c3964f55578b5cbd2f67329a97a2ebea8717,2024-07-05T17:15:10.853000 +CVE-2024-27709,0,1,ee8fc45778b8c709fe5c5ed77e847b66f1df618941fa273b2c110a9f50b82fda,2024-07-08T15:49:22.437000 CVE-2024-2771,0,0,01f06fef9237148af046435fd2b082ea403ae03287612b14625abf4c1ff71e2f,2024-05-20T13:00:34.807000 -CVE-2024-27710,0,0,01214918463ae4f368fc4a65868db013c5267c78cde3dcd3d5422721d0cf2912,2024-07-05T17:15:10.940000 -CVE-2024-27711,0,0,aa4b5cc3d927ca9f334597665bd23c789aa87e0ba44ddbea6e5b882c68b3e55b,2024-07-05T17:15:11.030000 -CVE-2024-27712,0,0,1a4bf21c6d08fabfbc52d711fe4d16e00e01d7874414074937b9bfc66a61d444,2024-07-05T17:15:11.107000 -CVE-2024-27713,0,0,c1e38ca141bcc88e723de6d3759394e061f934701235bd95202e27884a95c028,2024-07-05T17:15:11.183000 -CVE-2024-27715,0,0,598f394f329431a25c4a7a1b8261d44f727b2cd1dfd6b2d686da359eae90f655,2024-07-05T17:15:11.270000 -CVE-2024-27716,0,0,5e5638806646c8d6494466c45baaadc2575c086c5c6f7a780fc85288c8e8b907,2024-07-05T17:15:11.350000 -CVE-2024-27717,0,0,fc69ad567eebad8fcc2976100aa1f83924455418b0b56cd970635033032240bc,2024-07-05T17:15:11.423000 +CVE-2024-27710,0,1,f7b9063ce4fabf701a4881c5af09e4fe90fa60637f8a4d3f548d5b0340ec03b5,2024-07-08T15:49:22.437000 +CVE-2024-27711,0,1,f805b380d9d7b3579fe240a41d85003817c32a10af1921c104d28f1f2076e639,2024-07-08T15:49:22.437000 +CVE-2024-27712,0,1,6fc8ed0d101e6ceb7706c955c931abbe7938537802eb95845288301d0849d779,2024-07-08T15:49:22.437000 +CVE-2024-27713,0,1,6bded3f2b072fdb80883950a5aa313abcb3c7f9ee9eb2d135daf4689b55e8c7e,2024-07-08T15:49:22.437000 +CVE-2024-27715,0,1,b53060ac5f161ba9f8c11867640af89e771d5c1bd0a1ca5106a6746844ca160a,2024-07-08T15:49:22.437000 +CVE-2024-27716,0,1,b641573cb295179e8a45c3c6f4e5e6326128a1395653bab45519462f6e6492de,2024-07-08T15:49:22.437000 +CVE-2024-27717,0,1,24b56efd365305b6bc14b31a5e0ebd3ded5b43adf71ab9f369b01e76538e669f,2024-07-08T15:49:22.437000 CVE-2024-27718,0,0,55b4fe5eceb765847e8b5fde530c7383b01c4bd9d6322c23b03086464d536a04,2024-03-05T13:41:01.900000 CVE-2024-27719,0,0,af4ad9f7aa618fdf95594199c2170305427044874004c69062178d9da2af7882,2024-03-28T20:53:20.813000 CVE-2024-2772,0,0,7952e7318d90ae3553f7b0ed2f93ec584159cd3f5ac8b432440065d789c26d1b,2024-05-20T13:00:34.807000 @@ -247575,7 +247576,7 @@ CVE-2024-2790,0,0,beedd0090f34846cee86bfcc16559ecd216425fdfa14e63be8297a23ca53ac CVE-2024-27900,0,0,00f9885d5a06fec36b56a14fdc3be21ddc255c1561a408e91e09aee1b7ac8b37,2024-03-12T12:40:13.500000 CVE-2024-27901,0,0,33f662da706d18e25398216ac4597066ca6291840a4b4a018e8418ada4f9c7bb,2024-04-09T12:48:04.090000 CVE-2024-27902,0,0,7aa835c5c3cccf2434107e43a6dd21c3ee48d8e6664a62d49734964bcc016141,2024-03-12T12:40:13.500000 -CVE-2024-27903,0,0,d11a0b2c96f23704bf63864c34d48a5cf70337102c518f45009f46af63078823,2024-07-08T11:15:10.390000 +CVE-2024-27903,0,1,99738712494a73928bd41873364971d42e51f6f6cb72a583211588949df85d19,2024-07-08T15:49:22.437000 CVE-2024-27905,0,0,11f71bd2f04a983e03ffa738540da2ab3b19fd866be937104a685343c8bfc7f6,2024-05-17T02:37:34.130000 CVE-2024-27906,0,0,e279155c32f0030358ce7d189e782f3e54d78a6a202b13937f95f2706818bee5,2024-02-29T13:49:29.390000 CVE-2024-27907,0,0,aac379adb09823074865cdaa760b5a9ed07a3326e17caf800106b9008671180a,2024-03-12T12:40:13.500000 @@ -248552,7 +248553,7 @@ CVE-2024-29489,0,0,281c97da696e2014734e05639dd64d47354e5c2b4bcf9f1b7827a4a4899ee CVE-2024-2949,0,0,fe05e354f0ebdb867f0f2833560dc840c15ef92daf8a56e7a3e31b95f453d065,2024-04-08T18:48:40.217000 CVE-2024-29499,0,0,0df4c342550eca93c20715245870721539a608c42f67ae6ae86966560d5e9723,2024-07-03T01:52:28.783000 CVE-2024-2950,0,0,e07028f6204e1653615da40fab9edc1b22f1b4a28f65125bfe5341d4aac985fa,2024-04-08T18:49:25.863000 -CVE-2024-29500,0,0,e867a892b6feea61da09f4d0f3774bdfb045763ae21492d0ad387c1de2b2b650,2024-04-11T12:47:44.137000 +CVE-2024-29500,0,1,2b9af0d3cdf9b55a92126bde2520cf6cbecb1bd416352c1f95dc67e322137065,2024-07-08T14:18:05.667000 CVE-2024-29502,0,0,1cedf8999be6431ee5260cbb2cb95e7cf3e534192a33d0246363cb8fb473dca1,2024-04-11T12:47:44.137000 CVE-2024-29504,0,0,0d65a25fe5a416a240505601ef6342ac18259cd3d27cbe77fe65455a306d4953,2024-04-11T12:47:44.137000 CVE-2024-29506,0,0,60e00d73c671824caa0cae2a03b034d0d2cb942f1e8e81f8df66b1d98e8dec1a,2024-07-05T12:55:51.367000 @@ -248560,8 +248561,8 @@ CVE-2024-29507,0,0,e3739316b26d2c3b5d54a382ce803d308c0d38eaebe2a9099cd38065884f3 CVE-2024-29508,0,0,ae1678ccee0cf1669cdc1de9a02bfa39768665583ff9e71e0e95bb9078c4e20e,2024-07-05T12:55:51.367000 CVE-2024-29509,0,0,898bf234668cb0ecee1b5d473207d1898c7811ec73cf85862123e4a9e7876626,2024-07-05T12:55:51.367000 CVE-2024-2951,0,0,7025f71f619ebfb5f00b29e3d72fe62bb5f0ea0dbfe92a58b33e63352aa0779c,2024-03-27T12:29:41.530000 -CVE-2024-29510,0,0,7bab7543d0f8732ecce0d1219e3382859c178dc7c725439a67b36a045c2cdde2,2024-07-05T12:55:51.367000 -CVE-2024-29511,0,0,0ca8ef0defd87be1b77afc9380c6726ff60a7df7d501d6bb57359754dc257089,2024-07-05T12:55:51.367000 +CVE-2024-29510,0,1,51d0625dfaf62c75da9e9bb8fd0fc5d3519f674d47bd05e2a65a6c09ad7cf0da,2024-07-08T14:18:07.743000 +CVE-2024-29511,0,1,71f40c07ffc6ddcd2ad428aa635a90b1b076d74d8bc5a2a3a20f87b7f6b658a4,2024-07-08T14:18:08.567000 CVE-2024-29513,0,0,7d0b5456a65d7516bcebc1ccf632ccaa62f9b5d79d097eacfc825f81358c4fdc,2024-05-14T16:13:02.773000 CVE-2024-29514,0,0,2d6d3d0a4ae4b5ae40dadfbf4537d707f35bed7e85002b6d4e3d8180d6408f0b,2024-04-02T18:12:16.283000 CVE-2024-29515,0,0,79c9f65757e49bdb19c4dcff88d6ba2d524b1951e790ac90d5ffb4f302abcf45,2024-03-26T12:55:05.010000 @@ -249402,7 +249403,7 @@ CVE-2024-30591,0,0,fccd0ace4239a30fa0ef4b9ee775d5e196ef1d9d76c1e5f2b5d345c8f64fa CVE-2024-30592,0,0,a707460e8e70159424b4543df18a9eb4f29ee9778a40f23b0bd8a216605d05a0,2024-03-28T16:07:30.893000 CVE-2024-30593,0,0,b2f8cd2c54b2ad1b57ddb1e81cc62d71af489403717acf0499c9a5658551af66,2024-03-28T16:07:30.893000 CVE-2024-30594,0,0,bffd55966f70f84e0bc830429077c6d89f65d6982bc558e5837df20fba8353a5,2024-03-28T16:07:30.893000 -CVE-2024-30595,0,0,85030027273e43fb4787e299c9d67c0b01816ce7b371ee93564401107b4c729b,2024-03-28T12:42:56.150000 +CVE-2024-30595,0,1,4cbe3a1903ff2e8fa29d74cbfe2f90b968c54e4378a49a8e7a552056ca416818,2024-07-08T14:18:21.630000 CVE-2024-30596,0,0,7cd0dbe59c07e524347269d6ad600edbf2ce3681f61fcb58b1ea4be53950c71b,2024-03-28T16:07:30.893000 CVE-2024-30597,0,0,c2c4d6014cd4a690dc2be3f521581455ed497747d3319329dc997bfbd14251ff,2024-03-28T16:07:30.893000 CVE-2024-30598,0,0,3455a65bcba40de15b293f4cbe7609b01a090d4c25ed20ab971f6a106299dc77,2024-03-28T16:07:30.893000 @@ -249896,7 +249897,7 @@ CVE-2024-31401,0,0,b1f392d5797fcb52bdd41fd8d97bc9543b30afce53bb15f494cac005207df CVE-2024-31402,0,0,15c2c63d18fd59b2bc62b5b289f6f1bfb7ed1e8bf0268fa2dc26f85aee60cfce,2024-06-11T13:54:12.057000 CVE-2024-31403,0,0,0224148112c12b7ed3a671555d8cb853847c387c0a01fd25254394bf7f9de8b8,2024-07-03T01:54:49.817000 CVE-2024-31404,0,0,4bba1ccfe7dcf77b15da6db9def5060dd2e699b70ed8f7304a7c07ee5eeb14e4,2024-06-11T13:54:12.057000 -CVE-2024-31406,0,0,21585692d302884cf3150faa716f097a2673ce3764bdf3b78bdfd36f438a0484,2024-04-24T13:39:42.883000 +CVE-2024-31406,0,1,50456975bcaa7f8217ed5d32434dc8fe15a49c6e53ad431c822a1405fa86be01,2024-07-08T14:18:24.767000 CVE-2024-31409,0,0,2c3474e7adf2dfd4ffe107e0f21a962b12ec9583a2a32f1b573e427bba6ce25c,2024-05-16T13:03:05.353000 CVE-2024-3141,0,0,dfabbf3d0507d341626b2bd4d6e1dada0feb9b8a54e2d19fc7727779054508ab,2024-05-17T02:39:44.593000 CVE-2024-31410,0,0,d8bf6820d8f5d6884591de8f3ef108bfc6b4975173a66f374f2676ccab21cc0b,2024-05-16T13:03:05.353000 @@ -250099,7 +250100,7 @@ CVE-2024-31823,0,0,9d12c900b5aea261a617c0c45db69af06e76753d660b696289c6db95f54b5 CVE-2024-31828,0,0,abbd4faafd1830e19da09ba99cc549c95f576d3b26460d61eb3b11d4f3cf3073,2024-07-03T01:55:26.250000 CVE-2024-3183,0,0,f0a6251088cfd845783fa83089c4f66e5c1b4119e3b7eebeacea72fa8d6daced,2024-06-27T03:15:50.447000 CVE-2024-31837,0,0,9051d48b22c0cd39a45116204b9c51e9a92d936bee66589e1aa86bb8c892b824,2024-04-30T13:11:16.690000 -CVE-2024-31839,0,0,25a7daa33bac03a27a09e1621adb92d9361c02bf4ef6c11d27831735c896c138,2024-04-15T13:15:51.577000 +CVE-2024-31839,0,1,245f03de749181e8cafb68397f015c580f5b17ce16f6f34c9de9bdd347018299,2024-07-08T14:18:26.223000 CVE-2024-31840,0,0,c5fc04e6fe2d5125db2057551f9a02458bb6ea8f5da45a1b3c46ba278c1be8c1,2024-05-21T16:53:56.550000 CVE-2024-31841,0,0,122a5c411034bfc4d48419a4ff14723715ac5ca83b5477dbeb8228548b367d99,2024-07-03T01:55:27.077000 CVE-2024-31843,0,0,563abc77f9f757ff9b0691e6959d65798aa32245974217a00a4a26256c9469c9,2024-07-03T01:55:27.880000 @@ -250133,7 +250134,7 @@ CVE-2024-31873,0,0,30397559953deb34a9ae192149473632dc6b2334245e920787a4c5e14fc76 CVE-2024-31874,0,0,1770e58d0ae5591eb931a8cdfdb054fb4d854f81849d14af250c71db6caf553c,2024-04-10T19:49:51.183000 CVE-2024-31878,0,0,7b937c0e504c94aa96f40006d95fdcb5515eaac5bd841ea5891290c2bc5b3971,2024-06-11T18:23:27.153000 CVE-2024-31879,0,0,9e400de08d7e3b57ea9b7110f44ae1b22a7e387f9dc2f33f777f519f045dfc82,2024-05-20T13:00:34.807000 -CVE-2024-3188,0,0,5d70d4884e37e1862c5503e8662fdd8be316d1df7ecad77f44114699c1426b8a,2024-04-26T12:58:17.720000 +CVE-2024-3188,0,1,0566f9bb8e826930c137ba20908e573874a3f34d7900cbdeff699f1e3434f595,2024-07-08T14:19:01.160000 CVE-2024-31881,0,0,31dd3c2386fc9566d64aae6517e2912c77bccd2694e8b97048ad22111728f93f,2024-06-13T18:36:09.010000 CVE-2024-31883,0,0,7d901fbd975230dd30edc1bd392759757b14dd3f1e1009237c253ed76b1830b3,2024-06-27T17:11:52.390000 CVE-2024-31887,0,0,e951c215b0e12b882bcc7244c98d7631ee4f4b7a3271b5f24e369f1a635cd3e5,2024-04-17T12:48:07.510000 @@ -250143,7 +250144,7 @@ CVE-2024-31890,0,0,eda850bb7869648d895763435641ab97f0cfe4aeba8f677c829b9f47f4e39 CVE-2024-31893,0,0,12d01c628fd750c0cbf441575efefbf394d1654280d687a3cb134821594970b6,2024-05-24T01:15:30.977000 CVE-2024-31894,0,0,5d58af989adc88e1f21decb4e4b73370061e14ed54479d7579f2f2b5b7332e1e,2024-05-24T01:15:30.977000 CVE-2024-31895,0,0,38db7df97417d61bcac3e1b48b52fd0d409c4088497b5231955dcf460bac575b,2024-05-24T01:15:30.977000 -CVE-2024-31897,0,0,182a4efe962bd0dda6fe8374c6f347433cb7182e6d81b169ce8637e886650c5d,2024-07-08T03:15:02.200000 +CVE-2024-31897,0,1,2d8eec36cb7be2c8aef11633916897f01ca7ba5fac50856c9112223f7996357d,2024-07-08T15:49:22.437000 CVE-2024-31898,0,0,fe11d56c38d536e9464d27f478b4e4ead8cc2f4ae21f96cd1641416bd47ac1cc,2024-07-01T12:37:24.220000 CVE-2024-3190,0,0,c17e9142af04bd9f9561cc561aacffdced5eb94e572636fb91c22838cccaf428,2024-05-30T13:15:41.297000 CVE-2024-31902,0,0,691e6ecfd39ef5647a37266bd43ffa72513315c6d9b9212e3f86fe6033112d46,2024-07-01T12:37:24.220000 @@ -250362,7 +250363,7 @@ CVE-2024-32212,0,0,f6aba6b5a0388dc6cc8b07b61804546c09da8a05399de65b74351bf95fbbb CVE-2024-32213,0,0,41eb62ef3b9a2dab94a557aba3b39a317eb9e5981c9ad6e215d6c756107a42bd,2024-07-03T01:55:53.503000 CVE-2024-3222,0,0,799b361ab23aa76993ebff58db38db1a2ff6bbfd18c67fd1f278e8a3ffabcc98,2024-05-17T02:39:47.540000 CVE-2024-32228,0,0,62135ad7292b6c8516771101f61c85ec84993fd54c5e6a300cda88351ea85c2e,2024-07-03T01:55:54.267000 -CVE-2024-32229,0,0,00a4557f8564c10576c097d87b562b837eaa839b191212b0107c34b3bddfdec9,2024-07-02T12:09:16.907000 +CVE-2024-32229,0,1,46cfde26330a35dd5af3aef05c7164d23baa98664713e164e4ba017a64475da0,2024-07-08T14:18:28.213000 CVE-2024-3223,0,0,6cc36c470525be0fd4b2414cec5a9a6177e43b11e75a26205c33328451f02d8a,2024-05-17T02:39:47.627000 CVE-2024-32230,0,0,bba137e1373cb1ea88f9e5c5bc97b3dfc8dcee41432f2e75a6da02a5c1a71891,2024-07-02T12:09:16.907000 CVE-2024-32236,0,0,d5871b893c68bbd3751dce630253c79d1c30665f824c9666c275163dd9ec41ce,2024-07-03T01:55:55.017000 @@ -250511,7 +250512,7 @@ CVE-2024-3248,0,0,65f6d4ddfc43ae235edf2e59fc9daa1f1d020439a4fa197a41a6ddd58e1060 CVE-2024-32480,0,0,f740881091f1f05e0445ba97b5de61d4d063547c57ff7478943e1cd018db3728,2024-04-23T12:52:26.253000 CVE-2024-32481,0,0,7ae2ee49e3ac8b044ccf324d066a6f399682c0b774746f683b6c46ceaaab1d0f,2024-04-25T17:24:59.967000 CVE-2024-32482,0,0,e0309808bf3b2543b39750b9d9b0b794ac723e1476b62ac8f4870801d35fc928,2024-04-24T13:39:42.883000 -CVE-2024-32487,0,0,3964df55462d4b69b3a47831a0425ebab17556f2b889b4db15caceabcb50c1e8,2024-06-10T18:15:33.640000 +CVE-2024-32487,0,1,9b75323b8c9e4bc0024b685cf9b8c4f1bcf527dbb8fcae997b90b5ab98a4af95,2024-07-08T14:18:29.363000 CVE-2024-32488,0,0,6ce6bcee8af0a677e98d2bf7a3efd66cf8a3e580423515387116f39d710ba974,2024-04-15T13:15:31.997000 CVE-2024-32489,0,0,cbc8895e7f5e99c09f7bd505220fcc5514b4573939580e3f381a933acf3c9ef0,2024-04-15T13:15:31.997000 CVE-2024-3249,0,0,76c646e2435d001bf01037ff3fd93961dd050fc46c496185359532e97ed741fe,2024-06-25T12:24:17.873000 @@ -250771,7 +250772,7 @@ CVE-2024-32754,0,0,607be943cbec19ebc26898f36a5e33ae0135cc060ad9e54e1f721e2b27b87 CVE-2024-32755,0,0,b3528b194ab6699a4c0497b49f6b23d52c2b5f75510289aa8a21b02eac9ad3f2,2024-07-02T17:44:45.700000 CVE-2024-32756,0,0,7fa05cf39c6d3a5e903ec1a0f9f35b8a778ea0981647bd11b5e6e512e0af0b8a,2024-07-02T17:44:45.700000 CVE-2024-32757,0,0,324c62945352fac9f5590a80aa452fac7e1848c97df1fe1af0c1554b075a0f46,2024-07-02T17:44:45.700000 -CVE-2024-3276,0,0,070a5ac6e509f173077f0e1ccd4a9030c44b0c498cd937eceab22e40ee09af7e,2024-07-05T13:39:52.460000 +CVE-2024-3276,0,1,954e640f132b9cefdd02d650fab115252b37920b2c727ceb9c716e480c00b1fe,2024-07-08T14:19:01.997000 CVE-2024-32760,0,0,67074d2cb149a548f5ca201a895261189c469e9d7c384fe074a8d7f159cb359a,2024-06-10T18:15:34.203000 CVE-2024-32761,0,0,ce6e18957362490cfabf91767930741349195476d374863f1eaf0c6108afcfd0,2024-05-08T17:05:24.083000 CVE-2024-32764,0,0,bc3d072b957e003e653de0b420ab306da82665736b4d7b512b364e6134049d7c,2024-04-26T15:32:22.523000 @@ -251402,7 +251403,7 @@ CVE-2024-33858,0,0,908335cb5f6f9fce545a8d8e396c240343dfa0c627880c76928e0dfd92f71 CVE-2024-33859,0,0,c39c79672554484e65368e295f5b8216c172323c2ed38b2ef6778fbe14be0853,2024-05-07T20:07:58.737000 CVE-2024-3386,0,0,d08d523d066834a85bfe06023f05a033d8631a6197479f66bfb86438af143c6d,2024-04-10T19:49:51.183000 CVE-2024-33860,0,0,4edc8dec2f427c2816a0216d7c9e23f7b50c2414633de446e641048438fa012d,2024-07-03T01:59:01.367000 -CVE-2024-33862,0,0,dee61b31fd7dd03d3f420136a15a02826a26b1df25c3b4c68651ff6f11a9df0e,2024-07-05T23:15:10.050000 +CVE-2024-33862,0,1,ed42f0ba46ea5a33ac107d767062216a196b535bf21fc259324e086a3579c3ca,2024-07-08T15:49:22.437000 CVE-2024-33863,0,0,c260069bf74562524b59f29e5ae47ab85abe94da31d2a1859218017be058cb0f,2024-07-03T01:59:02.140000 CVE-2024-33864,0,0,61b38f0dc43ac9d0068f6da9de00a6e65ddc35f21838a32f075823f961986d6b,2024-07-03T01:59:02.930000 CVE-2024-33865,0,0,9f1dd99cceb321d30e7627b12a8d7830d5875309e5d742338b8087f86b779deb,2024-05-14T19:17:55.627000 @@ -251412,7 +251413,7 @@ CVE-2024-33868,0,0,4fc50ed4e32f87e9ba3d697ac3c0b062acf2b7d48dd2fe49590aadfcab9eb CVE-2024-33869,0,0,4f0b8e6cca6f9d32a51fb68c703d08999317fde4e1158f2e4b634052839b13af,2024-07-05T12:55:51.367000 CVE-2024-3387,0,0,59a783d7f5a632f1312dc02ccd745e7c758f93e478c4554a0dbc9aba27d256c0,2024-04-10T19:49:51.183000 CVE-2024-33870,0,0,6aab1c2dce9666081caef7bc83c709784103f6ae03f40bf6f9b61a08ab839221,2024-07-05T12:55:51.367000 -CVE-2024-33871,0,0,a4f090ce07266aeee3a430461bf664c274591156aa2a6fd59370694fddaff534,2024-07-05T12:55:51.367000 +CVE-2024-33871,0,1,6ef1078e0ab851992d6f76ec41fcc0f1160d67fe72b7159cf03aaec7c63364be,2024-07-08T14:18:32.130000 CVE-2024-33873,0,0,6ea1274dbe138465702444faa4e98a829d2dcf26c68796f03309e9049cdfe9b0,2024-07-03T01:59:05.293000 CVE-2024-33874,0,0,d26fda7bcde0c687055ecb7e8a711b7b405c2f58134eb500396c86a8ce6f97a1,2024-07-03T01:59:06.100000 CVE-2024-33875,0,0,d56411f6b08dc38a7f7767c8da240cc0d8e5f0e9cd402439404e4aab3eaa845c,2024-05-14T16:12:23.490000 @@ -251677,7 +251678,7 @@ CVE-2024-34342,0,0,10785b25841f76a30a78df1c5e36f814f1b5672860108b4695b7edbca14f1 CVE-2024-34345,0,0,52c7dd08bf02633d38dedd5f8de6c5e19775d97bc72da5e7c1985bf30b50d004,2024-05-14T16:12:23.490000 CVE-2024-34346,0,0,f52097ade7b5e4599f6ef6850f0ed1a9b313d490e9105e7facad506e728d0b5f,2024-05-08T13:15:00.690000 CVE-2024-34347,0,0,b22bdf1911ccdb7a910b449ec61ee1d039df1c1ee42b8aae7edaca22aca3f542,2024-05-08T17:05:24.083000 -CVE-2024-34349,0,1,4a59bc6ef32e7e206fc4bad9fc8f148b017bc442c47f8fd346545ca74a2d165c,2024-07-08T13:15:10.280000 +CVE-2024-34349,0,0,4a59bc6ef32e7e206fc4bad9fc8f148b017bc442c47f8fd346545ca74a2d165c,2024-07-08T13:15:10.280000 CVE-2024-3435,0,0,1849e952e8da18df234e8f2ddaa04f2d3afd1aa32d3a0d62aedeee7f62d2b942,2024-05-16T13:03:05.353000 CVE-2024-34350,0,0,f95a0fba4b1aaac06385c6eede4647c97421274f77910c8ed59b01008c291960,2024-05-14T16:12:23.490000 CVE-2024-34351,0,0,4bbc1c44803a75b4c3f3504c4acab2abf5f78e300960206db8ac19e41fa00344,2024-05-14T16:12:23.490000 @@ -251691,7 +251692,7 @@ CVE-2024-34358,0,0,751426ef9b4fc5b6aeba977e724e328b4dec3348b5998df62c4ac89704576 CVE-2024-34359,0,0,8124540499a05b0ae56417d92c95f2c1092a142d066f0a2c88754c29bb36d6af,2024-05-14T16:12:23.490000 CVE-2024-3436,0,0,47938f028efbd5a916031b117de2f518314782f5c4fcf16b7aa7adbb5fd17b59,2024-05-17T02:39:56.003000 CVE-2024-34360,0,0,0ad44819f037cf6808a009e3ee50b0cc9c0e6bc33d51dc0f0dc5cede981b49a2,2024-05-14T16:12:23.490000 -CVE-2024-34361,0,0,8f9a40c1fcd561f3851d301cab153c7db6cc23bdf7388b1499e516e91412d199,2024-07-05T19:15:09.610000 +CVE-2024-34361,0,1,5168cc961b7acd32b3151096d37c0368d10fe552c02e8547e9bea1142d18855d,2024-07-08T15:49:22.437000 CVE-2024-34362,0,0,9e891a2ad1e6316b8f0935929d67c3181274a9ba30097c0251075fb916220bb3,2024-06-12T13:29:07.643000 CVE-2024-34363,0,0,e424d02198ba81afecdf7473d64fd90fdca7a84cb332545f43974e5deb2cea51,2024-06-11T17:44:14.347000 CVE-2024-34364,0,0,a28d726279ae5238a51ba6bff74af368e2bacccb011592d49886d31f372fa74b,2024-06-11T17:20:27.203000 @@ -251782,7 +251783,7 @@ CVE-2024-34448,0,0,2ee47d576d9de678e8b37edc8c4fb672f63b76bc5fc5740404718a42f40a4 CVE-2024-34449,0,0,97d09fdadfd613905dbfd9871f1d974c32ae8fd0c469e4b64fe2252427eb7288,2024-06-04T19:20:00.563000 CVE-2024-3445,0,0,2031eee497e177f244890449ab10d2f196dd08d103f846fc9b20779b1f74d465,2024-05-17T02:39:56.830000 CVE-2024-34451,0,0,e70710b537fe2eeb930751f9cb9f8206f6cd9179f5b8e341e64ba4d6bec23b04,2024-06-17T12:42:04.623000 -CVE-2024-34452,0,0,1539d23d88439359c8056a55b62128368abc940cc3fe41e5eb768680fb4e9509,2024-06-24T12:57:36.513000 +CVE-2024-34452,0,1,0601c8beed111acadaba988be3618d3e8a2a7b19905fce659ac719cace1be690,2024-07-08T14:18:33.547000 CVE-2024-34453,0,0,47a7edffe635099f1bf55d077c40113fc9f5ba8dcdeec8da8790d14933d9ceb1,2024-07-03T02:00:06.540000 CVE-2024-34454,0,0,9c41ced14bcda502a6d91e8242ee544d71d5283ff3511493207ec7805cdb48e7,2024-07-03T02:00:07.617000 CVE-2024-34455,0,0,c191f5457e9d706ca3323355b6cb28301bf69c793f902f33757952929305bbe5,2024-07-03T02:00:08.547000 @@ -251892,8 +251893,8 @@ CVE-2024-34599,0,0,a6a02ad306f0c667d9b45f855de943b1e86d6818ea503b59522cbea821b71 CVE-2024-3460,0,0,5d753d09cd0688d7cf59cbd53a149eb7d45b8f22859b402f63de2cfaab817466,2024-05-14T16:11:39.510000 CVE-2024-34600,0,0,35051d817085423dbdeb6ae129690762237334bf5ea735f991f5984e5199c534,2024-07-02T18:05:54.487000 CVE-2024-34601,0,0,ba64108f851deae844e8486d0d241f7b45e96c9b76d20a149cd00653a5152768,2024-07-02T18:07:05.737000 -CVE-2024-34602,0,0,a092ec376b20b5bae003e3af1b412b2662656f4989316a07694f2689d75bbbb4,2024-07-08T07:15:02.663000 -CVE-2024-34603,0,0,09eef9607bb516b8f931b0fb1ca16807a9027d1191d223bb4f866dff768ab3be,2024-07-08T07:15:04.100000 +CVE-2024-34602,0,1,f351caede943efd7324bd45f876ac04d9b65bcd105b5e13de85fcc84acb087bc,2024-07-08T15:49:22.437000 +CVE-2024-34603,0,1,c01a64457a3bee42af7c5f1633273296c0f21e3d83c542aad0881238f7c8d114,2024-07-08T15:49:22.437000 CVE-2024-3461,0,0,2a4b7c0e1a8d6b06d86abf0c486b3a9f2d1fa6266081d4aec9284221b4574ee3,2024-05-14T16:11:39.510000 CVE-2024-3462,0,0,42d76b75905cddaca7c4512a98c3e5490f6eba6d1a37db8a52d4bde8c84e9ded,2024-05-14T16:11:39.510000 CVE-2024-3463,0,0,ec14f43c3b7b14f535006ee59b80bf351769520d95be8808071caf75bd274960,2024-05-17T02:39:57.447000 @@ -252822,7 +252823,7 @@ CVE-2024-36081,0,0,d4f0cf242ca757b4f303ae5368ae2b4579e3452ad04759648a40396f5d2c3 CVE-2024-36082,0,0,ec05e6fee429e8ce759a7c1458dcc4d6897daf721318becd9b0e86af84bd511f,2024-06-07T14:56:05.647000 CVE-2024-3609,0,0,ed7edf68142e8387ad834c19a7338682e57310d52666dd6c703556dcd2e4f649,2024-05-17T18:36:05.263000 CVE-2024-3610,0,0,e939d3b347c73608d9b0843823e2e742d3881baea226b5e82a29cc17c49af3a2,2024-06-21T11:22:01.687000 -CVE-2024-36103,0,0,12bbcb4ded1b753fd9b95b190619b55ba667c988679a86063c42f2146efcb4c8,2024-06-13T18:36:09.013000 +CVE-2024-36103,0,1,fcc35d49dc45666e220585dc55b1ab5f98eb767c9d2a7ebae31a9f259d616b20,2024-07-08T14:18:36.887000 CVE-2024-36104,0,0,646bc4ec6c51fdc169ab260c72f97091bede68a1a0bee7cde56c81392b0a1b2f,2024-07-03T02:02:48.717000 CVE-2024-36105,0,0,4b0fed9ed2485549411fb1c0dd5b530df11ef2b63c1b154f3cb43f2c66dea72a,2024-05-28T12:39:28.377000 CVE-2024-36106,0,0,c68c312ee2bc6ec7a30477c97b5c82d947d4a1b2653da093413e96421d465f20,2024-06-07T14:56:05.647000 @@ -253079,7 +253080,7 @@ CVE-2024-36481,0,0,6ec2572e4978fa540ba8e430693df93c6d8e466561b6c8823bd56108e65c4 CVE-2024-36484,0,0,d8980b6175f97dcbe3120732bdd3f5c4554f0bf6402d98cdd4a7efe1e2dc7659,2024-06-21T11:22:01.687000 CVE-2024-36489,0,0,706602251538409bdd6d4f26c7d5b5f5da3d2d56202958896118ef2720f4e680,2024-06-21T11:22:01.687000 CVE-2024-3649,0,0,969867829e20da4acc88ade671a27808c021dddbe3e27e051d2004e683670e61,2024-05-02T18:00:37.360000 -CVE-2024-36495,0,0,8c9396310106fc0ed472fdfac70b04def80f0697a214373feab7064d38e55057,2024-06-25T06:15:10.057000 +CVE-2024-36495,0,1,10404a83be52d267985f87debff962346c26dcdc9e1b293bd8df22829bd96214,2024-07-08T14:18:38.843000 CVE-2024-36496,0,0,9b0852e2079a2b8f81e66f1c652acdc8b58764ac010cd86aadd442eb8de70d88,2024-07-03T02:03:14.090000 CVE-2024-36497,0,0,55716469f26311eaa7b551ebbfe7eab2676d8944c191b597609bbd8dff1f73b6,2024-07-03T02:03:14.280000 CVE-2024-36499,0,0,077c5caf8d301ff2d1947e18a01670bc02e5c0dd9fda48352816e5be2251d0eb,2024-06-17T12:42:04.623000 @@ -253088,7 +253089,7 @@ CVE-2024-36500,0,0,257fd399a14a7141c50c9e2046f94aaac781c0de172f7af5b46d8dab39ba2 CVE-2024-36501,0,0,31cf8d7c71722235c9f044b51d6c28f28965439d43fd3f0fcf21214d656b125f,2024-06-17T12:42:04.623000 CVE-2024-36502,0,0,af0ea55ba6dbd08cf23c5f8732d2aeb0cf79fdfab13bdf5e07cadc44342549d0,2024-06-17T12:42:04.623000 CVE-2024-36503,0,0,3aef981902bcd0cfa43896ed1ada7c9ec64d59690838f1ba35c268bf26e5218a,2024-06-17T12:42:04.623000 -CVE-2024-3651,0,0,be30455c34a2654395eb4a44c80e2f772b86721c620f12a6b7595d8d6eb72c8b,2024-07-07T18:15:09.827000 +CVE-2024-3651,0,1,8821f4cdcd404e8a3949e21d008cf13cf8482c495df0667a422ca05edf2db665,2024-07-08T15:49:22.437000 CVE-2024-3652,0,0,455dabb71414a7592172807b25da69c5818ecc78456d9f87c63904d4c0988a33,2024-05-01T17:15:37.793000 CVE-2024-36523,0,0,779ff20f3e54c54b68fa38cf8a73a6874fca821f18024ef38fb974b398395dd0,2024-06-13T18:36:09.010000 CVE-2024-36527,0,0,5a4da781a91464af6910d804126691f30125cf5f5ae9e52379cc70e43ae0f627,2024-07-03T02:03:14.827000 @@ -253322,9 +253323,9 @@ CVE-2024-36978,0,0,42713a090d0173893ff722ea78059b8a1abb8cde743a141579d4b887d3c6f CVE-2024-36979,0,0,b5c86fe1e151f03cc7911f2db726f75e908559d8b3402d6614d6fdbd11ceb079,2024-06-20T12:44:01.637000 CVE-2024-3698,0,0,13b4029eb6179dbe788598788e16556a1995d850ddfc4af1ee0c4e86961a3a21,2024-05-17T02:40:04.800000 CVE-2024-36982,0,0,4dbd1530815d909f7b8a20adc74abe9eb6b389d94d646bfeec79ddd1688357b5,2024-07-02T12:09:16.907000 -CVE-2024-36983,0,0,963311d20d060d062b4f0f3d3b8e4f7386ac835084d2059618aaedd67b3a2701,2024-07-02T12:09:16.907000 +CVE-2024-36983,0,1,e2f2eb32ae3cfffdff5d7dfbfdef5f12a2b42788ca5c6f7f7a02f6e1986f58cd,2024-07-08T14:18:39.520000 CVE-2024-36984,0,0,e0e9241900a224e3ad6fe1ba063f84bef1aef3bc909574846a1878b8e10e5d08,2024-07-03T02:03:57.773000 -CVE-2024-36985,0,0,71e873d4320bbc49c043e780ddb08eea3bec2039b2afa0729a9979634a3d4853,2024-07-02T12:09:16.907000 +CVE-2024-36985,0,1,79ad0407ff845adba2267085ae08be5487982d62becef69388cf8c25525fe83e,2024-07-08T14:18:40.360000 CVE-2024-36986,0,0,d77959baa043d26a8556e64500677a30bbeafbe22f29b2b02d1fbd4cca9bc429,2024-07-02T12:09:16.907000 CVE-2024-36987,0,0,b172218ebeacc9820cde42e9dd02bf646a7c40748351537292bbd58793d81f40,2024-07-02T12:09:16.907000 CVE-2024-36989,0,0,367789c208d0ee3303eb46fd1a7a117326cfb2aa0c405856d9692b0f7a7613a8,2024-07-02T12:09:16.907000 @@ -253336,7 +253337,7 @@ CVE-2024-36993,0,0,0bf69cc687b9984786a898e5e3bdec70b83ac19c6b025b29f234d81abd1b0 CVE-2024-36994,0,0,41b4a7bf18016496aa0ffc64b6de03767318f5816798a9b5cf2ee34ebedfeeea,2024-07-02T12:09:16.907000 CVE-2024-36995,0,0,48f90593111cc04ea178c4e656d9a82f3e628ccad1b92a7f93b8a54e4eeda513,2024-07-02T12:09:16.907000 CVE-2024-36996,0,0,31e362903c36afc041aebda059381ab0aabf7dcc26b2083cfbc7e435169bd342,2024-07-02T12:09:16.907000 -CVE-2024-36997,0,0,1cc73090777f044df0fe8b995e16d0bef22068c2f0f6088f6573489503bd8171,2024-07-02T12:09:16.907000 +CVE-2024-36997,0,1,63b805e1c52b85e32c39913d47be0e81c2a81088ce95f6ee3da9b8a1cc881d60,2024-07-08T14:18:42.053000 CVE-2024-36999,0,0,734e0568d2623f6b7394de1b2c703cca096721b07c4ba47885bcabdc0e4abb78,2024-07-03T02:03:59.553000 CVE-2024-3700,0,0,f1913b84964a9a87ca4f78bbad55a262819a35385e2c066c91eaa7c4a1891262,2024-06-12T17:51:52.710000 CVE-2024-37000,0,0,eb7342d14f34edf9127b95014f2d19d18d4dda29c980fd9452975dec05564bca,2024-07-03T02:03:59.763000 @@ -253448,7 +253449,7 @@ CVE-2024-37185,0,0,ce3a2eeaa366e0078438541c31768228f57c06809ab185bd78a5053ce3cc0 CVE-2024-3719,0,0,d2320674d04cefde56a0b36b463f74328d6f18494803030bdfe9b0b1b4374afd,2024-06-04T19:20:23.553000 CVE-2024-37198,0,0,8919c8b8db43ac2a9639793fec092e2666b55422ab58e48ee04c39b0bd19361a,2024-06-24T18:55:25.417000 CVE-2024-3720,0,0,f4e69514093cc630aeda39d0a41fe705e0d9916a1077cef429b7dcf05a404308,2024-06-04T19:20:23.660000 -CVE-2024-37208,0,0,7e1627d018918fbe5105fc4fb5063772f37500b3dc14dafb28c1ef266db79c05,2024-07-06T10:15:01.907000 +CVE-2024-37208,0,1,88780676ffe1ae9fd897090b91bc042de66f491603ea11b382a3765c84e6e5c8,2024-07-08T15:49:22.437000 CVE-2024-3721,0,0,ec8dc4b0ad5d1d9ba11acb18015142f7d1715fd653f7ca2987e266e9c9e8ef01,2024-05-17T02:40:05.290000 CVE-2024-37212,0,0,cb0e3003beb0d778b1e3e4d8f1145799c285874f36dc8f863bd0c5bf6222df34,2024-06-24T18:55:34.983000 CVE-2024-3722,0,0,7c1b4fae7e86bf4c1bc76a0d39819ffc592a7b598c7675ac0628daa278671c4c,2024-05-14T16:11:39.510000 @@ -253459,14 +253460,14 @@ CVE-2024-3723,0,0,21c397ab5e875f2652ba15d9001cdd8ef5c5941ff996881e18084aebeaee89 CVE-2024-37230,0,0,c056784fe1461835022ae4387a349a1e9e9676537a6bd83c972fd23b962299aa,2024-06-24T18:55:55.037000 CVE-2024-37231,0,0,2975c060fd817766775d3e3ec5265250dfcb406eb3856b3f2d8635478d7fc4db,2024-06-24T19:26:47.037000 CVE-2024-37233,0,0,dcdb23af544a8046a4ecb68f34b48a3a15207d5a73bdc6182df1b28a0bb5e19c,2024-06-24T19:26:47.037000 -CVE-2024-37234,0,0,3d8acf0212e714e21ca36535ed076b048335a1b2240ff0a6d0aa50a33b661aee,2024-07-06T10:15:02.913000 +CVE-2024-37234,0,1,fea6d0a90424156a06bdb00d769e0d960a6f376259af6537661bd5a3b2a1e166,2024-07-08T15:49:22.437000 CVE-2024-3724,0,0,a2f08bb0a2e36a5c374b862fb3e4beff315b3d6672953c5eeabe10290b435e2c,2024-05-02T18:00:37.360000 CVE-2024-37247,0,0,038744b78f2f2634865ad1661e2c97961d5a301727139375431f6d0656bf9981,2024-06-27T12:47:19.847000 CVE-2024-37248,0,0,99c2cd4652890a37e2628f89e3ffdbcb4a9642bb6a6f401aec3aa06f83017ab1,2024-06-27T12:47:19.847000 CVE-2024-3725,0,0,dd194c190207038aca40dcc17eaac7bd7c6f9f34e04d00c016e0de6cd9837da0,2024-05-02T18:00:37.360000 CVE-2024-37252,0,0,faf33ef7b8f72660b3f71af61d55db3b928cbbfdda8d6a6c03b3fcf0d979da09,2024-06-26T12:44:29.693000 CVE-2024-3726,0,0,5d13f10d5b73efb7ab7c6448eee56ee5b7f1a739226807fb6eef2a4ab850d2f7,2024-05-30T13:15:41.297000 -CVE-2024-37260,0,0,e7a861e832b89ec4413096ab8d21c1e7d48eb0a1e56b026be187a844069b343b,2024-07-06T10:15:03.190000 +CVE-2024-37260,0,1,110e504e18e87ee0a4674715145b6f74e17f5c2f3f4404db3ec1f7a185bdfb74,2024-07-08T15:49:22.437000 CVE-2024-3727,0,0,8e07517a9dca0048f3a5546e14ea5eaec2b195c195e356a5ec35a7e996ce9012,2024-07-03T17:15:04.780000 CVE-2024-37273,0,0,8e9dee449ebc3c902c8a48603bfb19c8ba061254dd865164dc4adc81e57806ef,2024-06-11T14:12:23.210000 CVE-2024-37279,0,0,23b5ab6d6e7d20abbef93be4c8b8a6f2f980c082bdec809528b549006da1d24b,2024-06-13T18:35:19.777000 @@ -253529,7 +253530,7 @@ CVE-2024-37384,0,0,4ede7c4b4e1e1de259445d49ca3b43a6d0a75b7dcaf1ea245b8f6306c1e67 CVE-2024-37385,0,0,ab67b8a0f073ce7f5c28ca11584627dbf70b59e11b1337a1068ce1887aeb0943,2024-06-07T14:56:05.647000 CVE-2024-37387,0,0,fe2e0e702592a3b950e5c7ffa6cd887e6a1ea8123fb6a269a45db83eafdcfbbc,2024-07-03T02:04:17.790000 CVE-2024-37388,0,0,78091082c96da1cca6d1b3a881a45160af8428a4ada3a4ba554597b78ade9a76,2024-06-07T19:24:09.243000 -CVE-2024-37389,0,0,eb49ab026d347a0f0672e015074c79d1b9639f4e450caaa9b01e59a990b09593,2024-07-08T08:15:10.847000 +CVE-2024-37389,0,1,c0a13b8fa894cb8d08fa22bae9dc75d31042a18f1b408b7fc213f507ef92c08d,2024-07-08T15:49:22.437000 CVE-2024-3739,0,0,18ca969c974b63c6d16494fbcc2d63756747cacc5947332fefb20d9c592537e4,2024-05-17T02:40:06.067000 CVE-2024-37393,0,0,b93d796f3c4283b87dfd22c20f36a8116f582a381c44650f39c5ea43e6b806f2,2024-07-03T02:04:18.707000 CVE-2024-3740,0,0,1025f598f3437296a5a18526d2723c88eb3b5b46ea06c50b765dc694c6a0bd1a,2024-05-17T02:40:06.170000 @@ -253551,18 +253552,18 @@ CVE-2024-3748,0,0,130f91484f33c46b6a8a1b827c41c8bedf887e9f91a42beeaa1df38ecf15e9 CVE-2024-3749,0,0,b3391f40e1bcbcef1a08d3c4874bc14a907340ab4c3bf6aac04f7b2d59e58359,2024-07-03T02:06:31.950000 CVE-2024-3750,0,0,803f7e301e80982b4e00371ccc1f410724a29d03fdd424fb4c54aeb0b034ff94,2024-05-16T13:03:05.353000 CVE-2024-3752,0,0,06a3522f543993aef42f352f0c011207c560c2e5a1d63c9d8ccc34a87adab0ce,2024-05-06T12:44:56.377000 -CVE-2024-37528,0,0,466e44ca3d67cf0bd2554ddb994b6a482df15c519fa37763028d9eaa54c0db71,2024-07-08T03:15:02.450000 +CVE-2024-37528,0,1,dcc35f546d6b7f143e08b2e796afc57ba01587f3b3341db2d2f1e11d1d9405d8,2024-07-08T15:49:22.437000 CVE-2024-37532,0,0,e146e982646d7ada5c23ac27c75ae644abb706f6257f2f96ca13a6820b942f27,2024-06-20T16:07:50.417000 CVE-2024-37535,0,0,062f7ebb43bb6d2a8ccb3332e5242404947b076c7894d1777e030e1c8e622113,2024-07-03T02:04:19.710000 -CVE-2024-37539,0,0,cf8215e427c44405b85d45864072ac95523da6695b14f5bb6424adeb6f0f0b13,2024-07-06T13:15:10.190000 +CVE-2024-37539,0,1,f635a2aa2c7e712aeb60fa0cbc24a843473d50653030a9c821e2bfe549e6f338,2024-07-08T15:49:22.437000 CVE-2024-3754,0,0,01f193c84b52f462bda07bbe4a51fb49e63cd8bf2361f6b49c817e3a59b81e5a,2024-06-17T12:42:04.623000 -CVE-2024-37541,0,0,054ee614eca4712ea5f7ee4bc9a10b961510b93b5b1df2d19cbb7cc7698c28bf,2024-07-06T13:15:10.437000 -CVE-2024-37542,0,0,4fe3d4441aa7c099e29bb17e8ffb2ecb9f308fdf61610b5fb27b2b1be934e917,2024-07-06T13:15:10.640000 -CVE-2024-37546,0,0,28bf9031831c38832d66f08161b34f29480383f2e217a097b7d1b944c9f2d9e4,2024-07-06T15:15:10.283000 -CVE-2024-37547,0,0,ff73b5f373de7a59fb8571562654a9c204aebdb8fe84dcb4ec1242432fc243d6,2024-07-06T15:15:10.500000 +CVE-2024-37541,0,1,798e03349b267a2f8082a0ec152ec1b0f94afac4c92ce77a1c90ad41248cba88,2024-07-08T15:49:22.437000 +CVE-2024-37542,0,1,6d89e302c059e61e6dee79263ba1d9b292db94b7349a74f25580291f658a0ce4,2024-07-08T15:49:22.437000 +CVE-2024-37546,0,1,95bca18091533d24779b9d9541af789d17a54cddb8f47507626120eab0314784,2024-07-08T15:49:22.437000 +CVE-2024-37547,0,1,da07cdaafbcdf5f6f48dcc010bdacf6feb2c6627ede1b87455a66a3564df588f,2024-07-08T15:49:22.437000 CVE-2024-3755,0,0,255cc63bdc34aca663119fb8f6757a7da5a9acef7ecda034d88dc05babf4b05b,2024-05-06T12:44:56.377000 -CVE-2024-37553,0,0,dff09ec8ffbbe3c15d12ac442ae3b54163de8550a8bfd86b9f7e08389ead4b78,2024-07-06T16:15:02.023000 -CVE-2024-37554,0,0,55949a40344c29fa7b17d10dbedefbec81aecf8ee322ee4a91b1650ffb55cb55,2024-07-06T17:15:09.890000 +CVE-2024-37553,0,1,2c2a00ab257e5ea7ff19599b29cc2a5e0646dd67b7caab870443507e76e52a3e,2024-07-08T15:49:22.437000 +CVE-2024-37554,0,1,e1a6b47d51956c437547356dbc2d3d6d948b498c5d648044ffbed144c9e5226c,2024-07-08T15:49:22.437000 CVE-2024-3756,0,0,9f6325e6bf8bb208b4e2ee6674c7d5cde657d33007cb72c8f23cf7232b49431b,2024-07-03T02:06:32.530000 CVE-2024-37568,0,0,e54134c743ff1c9089094584276cdc79416cb675a0fc4a7177e49bc6dbf3bbc8,2024-06-20T09:15:12.253000 CVE-2024-37569,0,0,d72ceb83b037eeec35f3e81abfdf503a49618e4aba004fb3f45e6970df347f2e,2024-07-03T02:04:20.517000 @@ -253638,7 +253639,7 @@ CVE-2024-37762,0,0,667891b1f6e91618bbf6567a824c9723bfd8cc578e754c146d99da3298523 CVE-2024-37763,0,0,75542f98a1a2f20544c469cfb3e348386a1de1558c9804033733b99d26509708,2024-07-02T12:09:16.907000 CVE-2024-37764,0,0,bfe8048822739aebe754250a3774cdfd451761171493fc8c02a0e45a49f5a4e6,2024-07-03T02:04:42.317000 CVE-2024-37765,0,0,f31f1f7818ee7f8090baf8e373c09fbd5bca9e31a6ae9c032a065c1fa2b18c1b,2024-07-02T12:09:16.907000 -CVE-2024-37767,0,0,a9de1cc746801aa407d01b59bf388eaea4ab36cd31732c37db23e00e28420466,2024-07-05T17:15:11.533000 +CVE-2024-37767,0,1,7877c2515670214a904346d470123e251242a9f2784362e3de48ee06ec75e5c5,2024-07-08T15:49:22.437000 CVE-2024-37768,0,0,dedf10091e8e58ebb44fd6c06e9e87dae745e88af707e4ad5ba9f39637141fef,2024-07-05T17:10:58.210000 CVE-2024-37769,0,0,e4b575a53d305b6a257a3932151a158bf0c337a91abc93d84e6d3a383141ad47,2024-07-05T17:10:58.210000 CVE-2024-3777,0,0,2d62b43478a2af7b370a2abe8fef4e62ecbb9b40c3be97e2e0fc1ef910b6e9d4,2024-04-15T13:15:31.997000 @@ -253695,7 +253696,7 @@ CVE-2024-37897,0,0,3a7634088b08b658ef87115cec5dc022a51bdd9e986e2e6685e19db69e7cb CVE-2024-37899,0,0,d1ca9681182b91f088e5f797405e7825c7152f645c96ca832bd3fa971ed689b8,2024-06-21T11:22:01.687000 CVE-2024-3790,0,0,ea62135e66a6e7a74daddc8d443b8b9750f000d596c0e5f30e202f53e21ec40b,2024-05-14T16:11:39.510000 CVE-2024-37902,0,0,64cca10e7e3ace20e9d59c9293b434dbb2c9acda55554e640303530aeeaef0aa,2024-06-20T12:44:22.977000 -CVE-2024-37903,0,0,7e6f9cd4dd6a8113b69067a74396c0a4d6c03c0365d4ed7e74c20513a321e316,2024-07-05T18:15:32.093000 +CVE-2024-37903,0,1,886576036d4d085b682af52548aacb4c341112369e14bf61e8ca80c2c202d58c,2024-07-08T15:49:22.437000 CVE-2024-37904,0,0,7359ae18b288eca288056e2ff119b59a0b9c9bbf3f0e5a23aea1f27fd550dd3f,2024-06-20T12:44:01.637000 CVE-2024-37905,0,0,76667799c8b41a4c84b1440977b5297bf4074f7f71d64c5e6ed0abc93aad04a6,2024-07-01T12:37:24.220000 CVE-2024-3791,0,0,9bc6cec70e672f5f7f9ccdb1c0603c19b269c41965293930113b85d0de980142,2024-05-14T16:11:39.510000 @@ -253705,7 +253706,7 @@ CVE-2024-3794,0,0,153385e096cd7f2ece15b2458b2e9fc3a616d4e8c794288f506409f055c027 CVE-2024-3795,0,0,394c789f966243db6d7a4bfee356db0989703de57fa4252b7833b38d6036f026,2024-05-14T16:11:39.510000 CVE-2024-3796,0,0,8b56f1ae3498f70c780deb392dd70e4b0e2eb55d8dc491cebdead02f06bb596a,2024-05-14T16:11:39.510000 CVE-2024-3797,0,0,ee6a5db4c86b7a1cb7dddd0f923d514d4da716af84fa2cbea88db014d700ce37,2024-05-17T02:40:08.123000 -CVE-2024-37999,0,0,97f06bd07832c67fa474c988dae9f15fb92130b11c561bcd5a9960264b2750f3,2024-07-08T11:15:10.487000 +CVE-2024-37999,0,1,2d39b716db03797e18d7479260305690f3ed6e27f89fd5f1e73a83d3c2ff359b,2024-07-08T15:49:22.437000 CVE-2024-3800,0,0,f8f57ef4bdedf9e336bba69e6db949ed7a578f3b2a10988d7c69ed3685de0000,2024-07-03T14:36:22.273000 CVE-2024-3801,0,0,59de265ce1af1c02a0bfcf9801db717e0400c3bfeeedabcf1fa6b682733a5570,2024-07-03T14:36:52.797000 CVE-2024-3802,0,0,aaa997a68afe711762ac8536c5d0fad15740edaa6785e851a1495f0cf1f43e75,2024-06-04T02:15:49.290000 @@ -253763,11 +253764,11 @@ CVE-2024-3832,0,0,1075b96952121645fbb81b228e0c3813e39db7e21c4c9aa1fc24c30b61618c CVE-2024-38322,0,0,2ad94da74065acba3b226c62072e2f5047b092e831ca2ac4223b96f7198e87ca,2024-07-01T12:37:24.220000 CVE-2024-38329,0,0,6a4543a55a7780ada6e17c79a82dd0a8355d271b676150df85f00b992a580a6b,2024-06-20T12:44:01.637000 CVE-2024-3833,0,0,ba630503495cf2aaf1fce7ce704a30930ed35eb1665a53e19102e8c18f607a36,2024-05-03T03:16:28.940000 -CVE-2024-38330,0,0,afd0aa77c5cf4ac189f407ee8c2028f9b8b0c930533e7b174cdca01535213723,2024-07-08T02:15:01.963000 +CVE-2024-38330,0,1,653d6c4746fe821775fa6c90764cf2d57a108aecec5cc44075995b1cad35b0dd,2024-07-08T15:49:22.437000 CVE-2024-3834,0,0,a26b5bbbf7ca8a185b9797b4c7859f6535301f1ab4b8908e1c720ae8be2c469e,2024-07-03T02:06:36.447000 CVE-2024-38344,0,0,9ab5a9367a4478293ac2379112f78ca200a2cb316c550e5b0a6b06a397872c02,2024-07-05T12:55:51.367000 CVE-2024-38345,0,0,1774bc0880f4df20bde976d92e0bffb0cb942e8f3f0d5a48fcaa1b81b6829fd6,2024-07-05T12:55:51.367000 -CVE-2024-38346,0,0,95f44693ce6e699c03782451ae94c39d43f1032332bef5eccf3c714ce25c45f2,2024-07-05T17:10:58.210000 +CVE-2024-38346,0,1,689d401df5aa75c70def7483ddda9de7aa5563e129adce9d2b51b58b0f05d227,2024-07-08T15:48:17.710000 CVE-2024-38347,0,0,4d613454dc1780690a10a13a7c4d0d38fa70bfa9e6afa8cdcbdd33d7a9b439c3,2024-06-20T12:44:01.637000 CVE-2024-38348,0,0,6e5ce391b6cb124e038ae8273d56ab90f89cf43a2075c68d341d5350c665dadb,2024-07-03T02:04:55.710000 CVE-2024-38351,0,0,fc316049b1243ceecf4f16bb932622b3d32a9ec242887e0258f3f20fe77446f1,2024-06-20T12:44:01.637000 @@ -253829,11 +253830,11 @@ CVE-2024-38468,0,0,d4c6d48d530a65ce7d90662f3fd07d6f0801b061b80f57001958e3c05da71 CVE-2024-38469,0,0,511cfa020ce0415f6c58505919037fce87bd20a70c430acbe541f3249cbfb3a1,2024-07-03T02:05:06.670000 CVE-2024-3847,0,0,95f9ad8fbf5c3c80550e0a325ff7f48c02be2f78865a75992b282f70c630bcf1,2024-07-03T02:06:43.977000 CVE-2024-38470,0,0,e532fc2610ce0ba05d395b2565b3921da00db5c8c8ee1a62b50a319ed8de746e,2024-07-03T02:05:07.477000 -CVE-2024-38471,0,0,9ada7bade8fdd86f3459605d32323f554e3032c9a6e19f7d6043d23ff21bde89,2024-07-05T12:55:51.367000 +CVE-2024-38471,0,1,3da065067273e795c22a9430ea2650425c29da7d06ad6ab18b550114c797a95a,2024-07-08T14:18:45.747000 CVE-2024-38472,0,0,0ebe93ad3c585976e2f0467fbf3c32b4ae2c8392df9a3628aca18fe0cea5ebf4,2024-07-02T12:09:16.907000 CVE-2024-38473,0,0,4a52332d99fe848743528bbabba861df2f74ad2accfcf888abc7220000504fe8,2024-07-02T12:09:16.907000 CVE-2024-38474,0,0,d9563f48d3829949fd43481a10c11343a9dd1b93362516af40fb11af0189d44b,2024-07-02T12:09:16.907000 -CVE-2024-38475,0,0,872c13aafce26c521d8b51a3e919d609215981deacd1c6bba4735b38b50b7a32,2024-07-02T12:09:16.907000 +CVE-2024-38475,0,1,a35882af8549de31719dfb044d0026ec782ef0f7c68b1f3c7e2c6bf51a72fff7,2024-07-08T14:18:45.973000 CVE-2024-38476,0,0,46bc53cfddf3e233ea77062d07dd41304e3870288ed097ef039059d82cf67ddd,2024-07-02T12:09:16.907000 CVE-2024-38477,0,0,eb0332a2b53c3e5586dd1247a7159fcc1f059464374911861a40723e97a36d4c,2024-07-02T12:09:16.907000 CVE-2024-3848,0,0,cff2d1cd97f0b1f2183f9bb4edcf4fc45d9e2b8ab251b9953f6af6105249c0ec,2024-05-16T13:03:05.353000 @@ -254020,7 +254021,7 @@ CVE-2024-3891,0,0,8daff08d10085680eb7790a9a2c0ef842bf636f7de8dcdfbf7cd60ad81535e CVE-2024-3892,0,0,fd27f7808afa94cc2c75f61cd235edb0c08399fa20b15f6c79b02a7674d8055a,2024-05-15T18:35:11.453000 CVE-2024-3893,0,0,8eb90c61219540666d23479f74a65575eaf5c1a0dbea88b697d9ac7cb634e024,2024-07-03T02:06:50.403000 CVE-2024-3894,0,0,edf80459282b8df89b54e83306b1e3308990b8425170b8aae8ee5dd50d193a39,2024-06-20T12:44:01.637000 -CVE-2024-38949,0,0,a43dbf328281300509f5ac31ad8a17523caf140bc030a3178261346b56882d3d,2024-06-27T12:47:19.847000 +CVE-2024-38949,0,1,f1b76a5b198d8cd8e7622b115a8855a4de307f59cefd5215d45fde9cfa0e8235,2024-07-08T14:18:46.730000 CVE-2024-3895,0,0,e17d122bfb4ca0c486d0790093f87ef90da21ea7556181e7099c23bc52ef24ea,2024-05-02T18:00:37.360000 CVE-2024-38950,0,0,fa51116204c8dd85f77aaa29c376757e8a69dd65423c416717d298ef0c99923c,2024-06-27T12:47:19.847000 CVE-2024-38951,0,0,2fe865287281e18bfc8391e5fdd7f9b2e7ca4d1df39a0017b43b5090b5aae2cc,2024-06-25T18:50:42.040000 @@ -254049,13 +254050,13 @@ CVE-2024-39015,0,0,b9306c4366608a9bdba82a3b5fe9ddf19f9ad98b5ed41b597c0d6fd48fb1b CVE-2024-39016,0,0,44b10b31c2dcb3d5902acc74499e6688219a0202af7dbd3ffd5adca56db398f0,2024-07-03T02:05:36.777000 CVE-2024-39017,0,0,cad5c73885b78ec41e9e1236a7a0070e7449eef74b63e32b190c59476e544a2f,2024-07-03T02:05:37.560000 CVE-2024-39018,0,0,16dc342eb9c9ddff4509558cd4678a205ae33f272029e49d96df9e8a311347f8,2024-07-01T16:37:39.040000 -CVE-2024-39019,0,0,f6cf323b351d2ad92c0986bb041b295cb9d6313cf3c97893631fe8297b8d1055,2024-07-05T19:15:09.840000 -CVE-2024-39020,0,0,1c828596b4f8852822a6289efcec4b638cfb555e05bd86b76a171d9e6ad0d7cb,2024-07-05T19:15:09.920000 -CVE-2024-39021,0,0,ce00f5b7b8e79bcad243bd3d1327fb05a0a5fbac03a134724e0bd768c6a9d2c2,2024-07-05T19:15:10 -CVE-2024-39022,0,0,9cad0ada3b932a3e6fa60d4257ecce5c02ee22daa7e71fac64e8b7a33b09c33c,2024-07-05T19:15:10.087000 -CVE-2024-39023,0,0,b7b30dc71c04044804148ec0c18f1ba1453a018a2336039ea85a2b057ca30b6c,2024-07-05T19:15:10.167000 -CVE-2024-39027,0,0,7ec78c9c9f206d94981e797223c75ea90d6c324e0e45523a3676ef45bd29bdaf,2024-07-05T17:10:58.210000 -CVE-2024-39028,0,0,0061d393e49f48ececaf5e3a2d1648bc386875e00d9bacd02b054ebcfb38a745,2024-07-05T17:10:58.210000 +CVE-2024-39019,0,1,8f12690d76e92cb6b5dc2a12629bf19a0eea41ad72c5728094ae386008a6af57,2024-07-08T15:49:22.437000 +CVE-2024-39020,0,1,779f80966dcab7c5c87a9b53b8f5de209f6eff235619da698cacc6589630c05e,2024-07-08T15:49:22.437000 +CVE-2024-39021,0,1,ede8c0817e5f19611747e9041a5fbebac6b86f206d12ed263e609d4c284730bf,2024-07-08T15:49:22.437000 +CVE-2024-39022,0,1,afaf748649b1db169d83f7a69696dd09c6197d4b5b460917351e14e19d519efa,2024-07-08T15:49:22.437000 +CVE-2024-39023,0,1,077c40f6e7dee2f3e75cb1e6b590b948c4fa008d6a0950c1441286b18a7f5e2e,2024-07-08T15:49:22.437000 +CVE-2024-39027,0,1,9f73e18bd924a22ea308a0e3f3aba42dd8cadda957e02d96adc8536dc59ded1c,2024-07-08T15:48:01 +CVE-2024-39028,0,1,a2641222edcef12e310d06c15f66d85419ac0430d888fa7eecd56f4af8dd2579,2024-07-08T15:47:26.720000 CVE-2024-3903,0,0,b17bb4ec6e0e391a38b8cd510c422de68900922cf0bf4c2e4e48aa68680d6339,2024-05-14T16:11:39.510000 CVE-2024-3904,0,0,e776b30b1479be2ac2ba614a0e013b808dadbdf28dffb2a6f17cc6a76062926f,2024-07-05T12:55:51.367000 CVE-2024-3905,0,0,a951c486be8869bf12976255205bd7b845c8a04b7efadd3f2b0fe1349880c5bb,2024-06-04T19:20:26.357000 @@ -254075,9 +254076,9 @@ CVE-2024-39134,0,0,65225663759c93144bdb2cf9e576b89d8259bcce47718e35bf97379e5e971 CVE-2024-3914,0,0,a336378eac9d576aedbefe608da8eebcdb9fa109fd46220d159a3f8481da3f90,2024-07-03T02:06:52.980000 CVE-2024-39143,0,0,c964da687febdbf74b6ed8ad562fd259a092724ca0f51990f8c94c7fdf2f4555,2024-07-03T18:16:55.010000 CVE-2024-3915,0,0,a29a2abe3549638b7baa29d25d43b9e7f1e9b70435ac870f9f426e12fb2f2812,2024-05-14T16:11:39.510000 -CVE-2024-39150,0,0,869285642af0eb2a374385ec384ded1a3be1e975843bcb23af95ec165867bee1,2024-07-05T17:15:11.610000 +CVE-2024-39150,0,1,2aeb3a72d2298607936219fe132279dd91c043749dc32cd079c86ae8b7e55687,2024-07-08T15:49:22.437000 CVE-2024-39153,0,0,dcec1c4ae1798ea788d66ec52e054244cacc5771986472ce6b18b0b79017ed7c,2024-07-03T02:05:40.930000 -CVE-2024-39154,0,0,e9267e643c64c5fe4f5e9c26e884ce63a143ad4aff34e62518725c8c14557f85,2024-06-27T17:11:52.390000 +CVE-2024-39154,0,1,b379ceff4c24890e9b9644f02b7f59c0c9376ca4640a0cf8d94011517a86b7ea,2024-07-08T14:18:48.860000 CVE-2024-39155,0,0,c6b84759d94f9b861804190816183b6d43aa3ec2ad9c97bfc30bd05f3ff2a41a,2024-06-27T17:11:52.390000 CVE-2024-39156,0,0,77ee55fa44e5b5a1aee8c345b1d4424c08513568738373a9ed7a7016b20f5f6b,2024-07-03T02:05:41.750000 CVE-2024-39157,0,0,7034c13893105630c126aaeda1d41a6cc977f264ae0a5560b4322987c45914a9,2024-07-03T02:05:42.557000 @@ -254085,12 +254086,12 @@ CVE-2024-39158,0,0,cce9aef03924ed944acf28cea35a7f6e5bd4872826f71e46c93899a9929f6 CVE-2024-3916,0,0,67c028ed5cffa81651cfdb7590d8583ba32a4964953feede869ed8c9f6426eef,2024-05-14T16:11:39.510000 CVE-2024-39165,0,0,73505f78c1b9aaeee94abeacaf375a0ada22d254c42d8c2b004bd82562025a88,2024-07-05T12:55:51.367000 CVE-2024-3917,0,0,87493362103f61e3758851588aca1cc3facb0cf1f97ad5b068e06e988e9b2161,2024-07-03T02:06:53.877000 -CVE-2024-39174,0,0,1ff9954f99ecdb3cfdb540c74f441a0f82cb14c3d787e06d5d6c9ec2200a817f,2024-07-05T18:15:32.350000 -CVE-2024-39178,0,0,08598a42cef2b9f6b9b1d244ed8816c182a3ab7609e9b24b6d34bb193af89718,2024-07-05T17:15:11.690000 +CVE-2024-39174,0,1,e23d16c301dd77bcbf0c998cdb1fd9e2250ff32896205d07ec7d2fbcb29c498f,2024-07-08T15:49:22.437000 +CVE-2024-39178,0,1,af0941cffdb9159525d95cf15fcd9b6f91846822ec433c6cd30b278133963aae,2024-07-08T15:49:22.437000 CVE-2024-3918,0,0,f0312710b8f2207cc4daf3e960aa8906c7e8839f8babda55f2853fd4763a97f9,2024-05-24T01:15:30.977000 -CVE-2024-39182,0,0,85ad8476ab8f4086eaae833ae8149df64e15bc103142dbd7b44bdca9a20b475a,2024-07-05T23:15:10.137000 +CVE-2024-39182,0,1,c4d16c6176ca0269b7678f6ff1967039bace8922a5879d34ffe12e1dd73c8773,2024-07-08T15:49:22.437000 CVE-2024-3920,0,0,5dbee28fbacc5f4bbc65481ff7f645499d60469b501d304207882ca441f74491,2024-05-24T01:15:30.977000 -CVE-2024-39206,0,0,f9fb00f1e181a34e546a4d02526b8d7182abaed8338954851ed4beadabf72272,2024-07-03T12:53:24.977000 +CVE-2024-39206,0,1,ff238c7a799bd8156023ed396579b78ee6764c0b74ea4e700d568262004d102c,2024-07-08T14:18:50.487000 CVE-2024-39207,0,0,d8e667b43b76095c528f5867a8617c4177e3d9ac8aefab820b7b82f9e44a4991,2024-06-28T10:27:00.920000 CVE-2024-39208,0,0,bfca919135cb16c924d14a3e46a90c36fb45e8d6f50651e543c7c3b74462722a,2024-07-03T02:05:43.393000 CVE-2024-39209,0,0,846eb9e93730bd8a4e0e342a01db126b493a0877c61de0d40de722388e34129c,2024-06-28T10:27:00.920000 @@ -254126,6 +254127,7 @@ CVE-2024-39302,0,0,946c3f23cfe199dda1010c0ea47b1d5e32454ef20b5307dfd8e2dc92485c1 CVE-2024-39303,0,0,70d65068e9512d87b66cc2903befaf347937dcdadf3b230d5ace50b05fcec8ee,2024-07-02T12:09:16.907000 CVE-2024-39305,0,0,63f56317b3a65afc1e2039e772edc429176693e571707c38de2e052250926788,2024-07-02T12:09:16.907000 CVE-2024-39307,0,0,c6ba32c8ba3cfcd15570f781df2bcad3fc5cb61b722485741dcbdce4f9e733a2,2024-07-01T12:37:24.220000 +CVE-2024-39308,1,1,8dcaf739af0b20dee29866248860e3daca2a379f27a513aaf403e8e0b0c2b066,2024-07-08T15:49:22.437000 CVE-2024-39309,0,0,136c09ae402132cc087ad5758d406eac21c47491362259de052db9baf065bd3e,2024-07-02T12:09:16.907000 CVE-2024-3931,0,0,ff26b5a8728d6a7f3e1f8095f9d431d98f0c624577950ceaf4dc1cf9ad688034,2024-06-06T20:15:13.933000 CVE-2024-39310,0,0,187be4dc945171a7657d1459e6c80fed53aa1f7d448ef02205a5dc997f08bebc,2024-07-02T12:09:16.907000 @@ -254134,7 +254136,7 @@ CVE-2024-39314,0,0,f08a68c1585aac53ed3340b30b7ca1fee7f99b287e34df66dd62620bc6eee CVE-2024-39315,0,0,a63beff0a6cc21a12673e8ba65716d45b6c52abc54b22460a729ebfe04cdda63,2024-07-03T12:53:24.977000 CVE-2024-39316,0,0,d47aca3c5197170fc8f05033ffa682fd40e1aa1436fadb43bcca23faeaecd5c8,2024-07-02T17:44:45.700000 CVE-2024-3932,0,0,371291a71f9c99e371f96e7d7b61e3e11967567047c07fae80310c4772d1c0c7,2024-06-06T20:15:14.030000 -CVE-2024-39321,0,0,3c0e57a1b04cf90aac20fa3441f85b270a71102902ee21a32fa0589f7fc5111c,2024-07-05T18:15:32.430000 +CVE-2024-39321,0,1,25b62962ce26575b135148ce4bc78df297e90148993ee6065a33a42f83d7ebff,2024-07-08T15:49:22.437000 CVE-2024-39322,0,0,708cd5de8c07f904d1ba83d6367c23eacb2b2cf3f907adf630b27179cc7d25d8,2024-07-03T12:53:24.977000 CVE-2024-39323,0,0,8b592e233643a568789a282215e3d651e9257e7274946ce7dfcbad9339346353,2024-07-02T17:44:45.700000 CVE-2024-39324,0,0,75a65563a1468710cdae5af44a5e63fb7b35b0a6c50055f03af94f2ccbf33c01,2024-07-03T12:53:24.977000 @@ -254193,15 +254195,15 @@ CVE-2024-39475,0,0,731f6b5f60ebfd57f873370a12aac7f810978760a76e1569359d5fe756be8 CVE-2024-39476,0,0,91943d73dcc021464f2b5c9690e832bbea4b4aab628187b93b532a3e6d7e613d,2024-07-05T12:55:51.367000 CVE-2024-39477,0,0,93150af0d1e67605f3dadbc9611f96a26a1b8e40b7b147dc4394fb217e20a1b5,2024-07-05T12:55:51.367000 CVE-2024-39478,0,0,c6fb492be9b62a0dd4aa1d3866999214cff83981f78a6588ad9996b3d0e5de08,2024-07-05T12:55:51.367000 -CVE-2024-39479,0,0,fd4d0f1ff159ce69c9ae1271a737acca39f288fb4c22ede51b4e2f5dc50b90bb,2024-07-05T12:55:51.367000 +CVE-2024-39479,0,1,88a2aaacf35657f33c4e53b00087022c0869ebd9459e7d0530ab74fef1faebca,2024-07-08T14:18:53.007000 CVE-2024-3948,0,0,376ea8906f03fda3c144927b149cbacf34b84dec1b654121329bc158cfe1d518,2024-05-17T02:40:12.107000 CVE-2024-39480,0,0,37b68b71ae8fdaa158e92179f30fb1f992df87d62928c81cdcf76eaddbb60af1,2024-07-05T12:55:51.367000 CVE-2024-39481,0,0,7dce187b2b17e4611e39e4ac64f5092144df76edc4126013a615f1040469f544,2024-07-05T12:55:51.367000 CVE-2024-39482,0,0,b5ca1dd95768db032dce80c55c6258ec99ccbde63e8f741757c09d5b0797c6da,2024-07-05T12:55:51.367000 CVE-2024-39483,0,0,eadec7028a472ed93e8a5dff095927eb733e9a05f36586ae19cb293f76cb70c1,2024-07-05T12:55:51.367000 CVE-2024-39484,0,0,b31f852aa24f56cfe148c1d4b3e8b85592312114fff33022a4ab6f2336cd9ae1,2024-07-05T12:55:51.367000 -CVE-2024-39485,0,0,9b3768f03e1707409b88b5bf989b1fa63f75e320d3314c45846159b435aec509,2024-07-05T12:55:51.367000 -CVE-2024-39486,0,0,6a96f68c896ee3f5f62aaf7d0c2f5a9013ed4783a42c5e75fa700ffefa70ff24,2024-07-06T10:15:03.393000 +CVE-2024-39485,0,1,eeb489cc81d629e25edf2846d080f2d16c82c1a5d4e00cda1329db48257433c1,2024-07-08T15:36:56.127000 +CVE-2024-39486,0,1,77cff8922a497e9f5f3a2c54a76728f0d6b7e7d5f3ffc0649161a58f4b404b51,2024-07-08T15:49:22.437000 CVE-2024-3951,0,0,d1eb572088193a792816003caae4c8900ea1808fb70b3f34eb162771a0d73b1e,2024-05-08T17:05:24.083000 CVE-2024-3952,0,0,92f1da274771947c3cb4a43546670c1af8a997980dc361a71cd2fb07f162ad15,2024-05-14T16:11:39.510000 CVE-2024-3954,0,0,45f1b348fcace6f84e3157e2d0f8a54fc4228bb396d26e03c9556cd235947f43,2024-05-14T16:11:39.510000 @@ -254216,21 +254218,24 @@ CVE-2024-3965,0,0,ca98c8c8f38859cd31112b30cbcab1577d0379601171e9b943854dcc0ce8c1 CVE-2024-3966,0,0,93926d7a5d68b811d92befd5d93f81a42e21603cd050116175f80a72afb025d8,2024-06-17T12:42:04.623000 CVE-2024-39669,0,0,56d6b274e749be30b1ff4d12ff6c858882279f47b773d710e8ac61d1e37bcfa3,2024-07-03T02:05:50.580000 CVE-2024-3967,0,0,b2af76e65b0ac2fff588b8ab332f0978e5b083cdcdd41f3fd643403fe236fa29,2024-05-15T18:35:11.453000 +CVE-2024-39677,1,1,964d42b7e6f6658ef106b3a61b4dac74f8cf60cf8f733007f303b8eb8080b02d,2024-07-08T15:49:22.437000 CVE-2024-3968,0,0,cdd73cfcec56ac4302e4eb4a932f862086b9a3ed46ed5ff92d17197e11553e8f,2024-05-15T18:35:11.453000 CVE-2024-39683,0,0,50045bf714bd4fe128b5e5cfcc599ff1064b3297e6cc6d531afb9c370803dce0,2024-07-05T12:55:51.367000 -CVE-2024-39687,0,0,4dfa456c519c9defeff3f03432131cdd0203621f91fea3206d53aeafac4c74b6,2024-07-05T18:15:32.663000 -CVE-2024-39689,0,0,b0acf7d3942e2512f781a143b4f1f052444857694ec74d73a53d095261d7d756,2024-07-05T19:15:10.247000 +CVE-2024-39687,0,1,1f0dde45c697bd142eb547e4c25395e40bc6f58804b4b24f10fa4126a251ad78,2024-07-08T15:49:22.437000 +CVE-2024-39689,0,1,86295f6760848f0b510226e65028fed1b62502a931685ba6acf948103d5d29cb,2024-07-08T15:49:22.437000 CVE-2024-3969,0,0,793622b6641cb8c2dc34802adf1ab9ece645cce7d321b9faf1a6b76d5e28ec78,2024-05-28T17:11:55.903000 -CVE-2024-39691,0,0,fe36286233055efa27410e20a937791b46a119b9e3290d29143fb2afef9b6297,2024-07-05T19:15:10.460000 -CVE-2024-39696,0,0,d289da53b0e09a798a36f605df768448c147063a3f6646ab1a75f896cc4d72e8,2024-07-05T19:15:10.673000 +CVE-2024-39691,0,1,5b1b13e200d826d3f40f75a75371b183af197da1146b1c1721e666feddcea9c6,2024-07-08T15:49:22.437000 +CVE-2024-39696,0,1,48bfab7e50339e1ca25125b7d36bfdf66ca4035d9f4c1ba7b967c71b544827af,2024-07-08T15:49:22.437000 CVE-2024-3970,0,0,a6d2ad116e736372d8ee0cd28cd0cbfef25f3ce953ea92bdb2b1ac922e65eedf,2024-05-15T18:35:11.453000 CVE-2024-39704,0,0,1d59c065d69d465eb86bf6114b5299aaf44c728f69d6748df6b6bd65077d4590,2024-07-03T14:32:56.510000 CVE-2024-39705,0,0,91d39f33d5bd2d9618d124407e406b5aefb3921b0f0d526c128476a4653583c8,2024-07-03T02:05:51.507000 CVE-2024-39708,0,0,111516979aea28b8e657aa098e90e19a44667358e9b94bc0cc0d55aace553cee,2024-06-28T10:27:00.920000 CVE-2024-3971,0,0,1320cc801330d2d12e5c1ffdfdf6be7f25a4100ca447a2f7a5815c90f2431f60,2024-06-17T12:42:04.623000 CVE-2024-3972,0,0,336c66699a431faa29a5282b5eb6832d488e7d167b3d03dca5d4b3950fce0bec,2024-06-17T12:42:04.623000 -CVE-2024-39723,0,0,d96f5452a9111c88cf72e549ad59361cff4c806be10625ef83db1c7ab2520662,2024-07-08T01:15:12.283000 +CVE-2024-39723,0,1,5c9ac9247f202b4e44d018c1bf563c3c99fab88966852c141d2958342a6492f2,2024-07-08T15:49:22.437000 CVE-2024-3974,0,0,30b94b89b01dd2c6057362330f67dc78937f3f3edffa0c5a57e7602f711f919a,2024-05-14T16:11:39.510000 +CVE-2024-39742,1,1,96ea1b8cccc8beabe35a1ae1bd29920440299002d9bdd07983b0f871a337ec60,2024-07-08T15:49:22.437000 +CVE-2024-39743,1,1,20ff608aae9e81ed05e5df9fc95082741cc897036de0c408e1e444e17ba2e42f,2024-07-08T15:49:22.437000 CVE-2024-3977,0,0,e9f44416847592725fc2cd47ffed9c743bca75989a5c2d940c73903d22d68b79,2024-06-17T12:42:04.623000 CVE-2024-3978,0,0,338ec55d360d0ecf1dfe595690a2d37e24aa4129fa5a75aae324bfa31cd2fe9a,2024-06-17T12:42:04.623000 CVE-2024-3979,0,0,4ac2126fe63098861061c1ed3772b0712449f42e64a5481492de94fd61a5b947,2024-06-06T20:15:14.127000 @@ -254239,12 +254244,12 @@ CVE-2024-39828,0,0,a076e079a0d15f60c3c4a55d02ae6ed731ea38682b9215046585ce79ae4cf CVE-2024-39830,0,0,fa16449dc31377b10db0f6c8fa3cd2e73175dcab5134adbfb18592dc79a4a80c,2024-07-05T17:08:50.197000 CVE-2024-3984,0,0,bee410e9bf0342c5ecf3886d76050e2314329db97e17f53f9285ff32a0d9ee8f,2024-06-20T12:44:01.637000 CVE-2024-39840,0,0,5d7e4142131887a411bdbeea93ed887c2e0abb0654faa364c29fef4ac994d185,2024-07-03T02:05:52.307000 -CVE-2024-39844,0,0,0ede0d9c66b87c5a921253826d45a9f6e3ef2d7a0f7ddc23d2d17561818dc676,2024-07-05T12:55:51.367000 +CVE-2024-39844,0,1,24513dbab8cf2462c08846394521d45521a891f52f216d702fb8431100a32c1f,2024-07-08T14:18:55.147000 CVE-2024-39846,0,0,cc3d14fb15e20c985bb7fdeb359e7a12ea1918f79b7c4c3ac03373ad528c69cf,2024-07-01T12:37:24.220000 CVE-2024-39848,0,0,8178bbb2814e5fa60c3351f00827b86e4d6b7b334f71560f5ea323ec84986fcf,2024-07-03T02:05:53.147000 CVE-2024-3985,0,0,73586f1cedc99952324792e19f078c055584e6e606f6222ac3907090ad395ced,2024-05-02T18:00:37.360000 CVE-2024-39853,0,0,0a0a7ef09f69a0d0504c74e5034409e9f17837e69e722a4f1f3c2adcfb998667,2024-07-03T02:05:53.353000 -CVE-2024-39864,0,0,0323ed8cb8148454c892e4c713d5cb6a2a29579203228349744b0541b248014e,2024-07-05T17:10:58.210000 +CVE-2024-39864,0,1,d53cf864986adcf58f762cd7c857169d0cf77d7c01b84f977b101e751257847c,2024-07-08T15:47:10.990000 CVE-2024-3987,0,0,05499205f937534ee026fd5a41dcafd44deae059117eea743b5e3e3c53eaee01,2024-06-07T14:56:05.647000 CVE-2024-39878,0,0,038c252a5df59aef0ff494dd466e8c23160164cb5ac894aeb1a33e06001b79d4,2024-07-02T12:09:16.907000 CVE-2024-39879,0,0,1b030ce3798bca0bad33a3937cca95b776786d7918bf02f25bff668e667acaa0,2024-07-02T12:09:16.907000 @@ -254252,7 +254257,7 @@ CVE-2024-3988,0,0,ed49ad0e503298ba2fe40c90a665a86dcb918b5087ac61c1edfd746c2ca95d CVE-2024-39884,0,0,0d647612824271b037e4243e01d89c11015b35b838940d0c376081ca2e2ed0c1,2024-07-05T12:55:51.367000 CVE-2024-3989,0,0,41a6b1dcae0354fb8cba40366dc7ed1eeb84d6a6a33689c35123198fe63c8f01,2024-05-14T16:11:39.510000 CVE-2024-39891,0,0,f05a058a4cf741da51f47b19ea162b25ce262cdb61fb36618eb53dc7411c00e3,2024-07-03T22:15:02.923000 -CVE-2024-39894,0,0,c61bb2661100853548279e349e76a635cba102e2f9a2c3076410b71ec944a6f0,2024-07-03T13:15:02.890000 +CVE-2024-39894,0,1,374900c11a12dc50ea15b6655eaae44b2fde3969c29fbbba5a961315eede48a8,2024-07-08T14:18:56.393000 CVE-2024-3990,0,0,7879115af68e1891db08bd2dafc44fb55db15680f59885de2ed87fd5c16d9492,2024-05-14T16:11:39.510000 CVE-2024-3991,0,0,f4b27e31b2ebe06401478accd9d85264142bf207d27ef139c240399354705c4f,2024-05-02T18:00:37.360000 CVE-2024-3992,0,0,ff644523dcb07d662c2bf53b9e125872cf5c9b9df16e03b5f8dec25363b303ae,2024-06-17T12:42:04.623000 @@ -254261,14 +254266,14 @@ CVE-2024-39929,0,0,2c568954aae2609411a1a30c612d526ea9676ac6001fbebf7bc07b55ae54c CVE-2024-3993,0,0,a2f94f13d02cfe8603a71433706e6cc2c5ad0c0e3e2fd5d51c299cf3fc301a73,2024-07-03T02:06:58.160000 CVE-2024-39930,0,0,17eb00e73f46631dbd6316a3ab19a74b1e7ba74e9179cfe94efb0d39751660c6,2024-07-05T12:55:51.367000 CVE-2024-39931,0,0,0eba9a8f82e3318a9f9550e7e78c86ea17aa3985199f56792b4c58f3d5e8d086,2024-07-05T12:55:51.367000 -CVE-2024-39932,0,0,b857c228c0f6438a4b894b15ce799e44e72c60577f9fdfe7cf29bfe600639ad6,2024-07-05T12:55:51.367000 +CVE-2024-39932,0,1,f66805c87f9aab2044f816b4446ff24a7e25b5aa6328c8b5e2e33ad89efc57a8,2024-07-08T14:18:57.240000 CVE-2024-39933,0,0,13c72a35064c61fb9ee61ba353f0f85f361d4c4f25db4328ec414ee24921b939,2024-07-05T12:55:51.367000 -CVE-2024-39934,0,0,0e71956077a4ecf4390bee3ea83f9c535eb711dbfa99935e368f043d617406a0,2024-07-05T12:55:51.367000 +CVE-2024-39934,0,1,db75b4b985c877d9f527aebcde7fbafa2671883095bbdb7782b7d9d53f40af75,2024-07-08T14:18:57.977000 CVE-2024-39935,0,0,a2d51b89263bdfbcdf956035d3cd1bb233e969c6f34b441f16701e42eb0dd332,2024-07-05T12:55:51.367000 CVE-2024-39936,0,0,96a292f95eff145da3c75d9d081cb40bc8de6357d85860fd3c02c3176b3ecece,2024-07-05T12:55:51.367000 CVE-2024-39937,0,0,5f408cd7acd61adcb639fbd43eaddf6af5896fd47eb6ae130e98a6fae5672493,2024-07-05T12:55:51.367000 CVE-2024-3994,0,0,292539249e741e7003c555a5d4fa2182b15a01b393fb04fa15e675750c01906e,2024-04-25T13:18:02.660000 -CVE-2024-39943,0,0,0dd35c7e61e817fe93b8731ca206b2c442a4db50ed25bac0a0778fffe3738b8a,2024-07-05T12:55:51.367000 +CVE-2024-39943,0,1,f694b2aac8f906f35152132e0f024b0c19a3da55f7a316781a87adedb1ceb692,2024-07-08T14:18:58.710000 CVE-2024-3995,0,0,a7fe690817691037765b680c602849c2a36e767bb2849159693fe5a7864f46cb,2024-07-01T14:15:05.680000 CVE-2024-3997,0,0,507ae8762d75f9d68eda75aa3a6fbbaf1b3579404dfa0ecd9f2978d2aa87a55f,2024-05-24T01:15:30.977000 CVE-2024-3999,0,0,4248dd2372447004bc43614b1896e27a040049c0dba411de9512ee0e6f816fb7,2024-07-03T15:44:56.130000 @@ -254314,20 +254319,20 @@ CVE-2024-4056,0,0,8d2872a63b61af99b314442fa34c585e616ec707e8d3b58da8a6d93a2f4a48 CVE-2024-4057,0,0,26b46aa52b04f4ef8890033772544e5e99ad730f84e9e0e97b479cd36cf89ace,2024-07-03T02:07:02.197000 CVE-2024-4058,0,0,c4c95455d6e76cbbdb3e2ad2bd6d39a0a74b9da8ef4ac622e44ffc5e8b4fb2cc,2024-06-07T15:40:49.707000 CVE-2024-4059,0,0,f7356d83fe5fccf2c54f421bb90f2c15bd9bf33edb756392f4236a5836d7af45,2024-05-03T03:16:29.430000 -CVE-2024-40594,0,0,597f8dc65950340ecc007d3a49a39dace07c61b6a108a7836ee9c56ff74539a8,2024-07-06T05:15:09.670000 -CVE-2024-40596,0,0,92f45a0b47d0eb8ff67705cb2c5b78b99d10c5cad9a8dbbc2a281950c490492b,2024-07-07T00:15:10.067000 -CVE-2024-40597,0,0,7b54b0b58b1a58bd74481a20b44ada02c51203e6548479656c16307c36609df7,2024-07-07T00:15:10.160000 -CVE-2024-40598,0,0,d7ced54fa9e615f4b6400884df376e8072d40d475b2c252a3aa3027e3edf3f37,2024-07-07T00:15:10.240000 -CVE-2024-40599,0,0,e1b9a64637e884acb6880ef8c51dc77072c4a433f4b4d347a15357f2fa599ec7,2024-07-07T00:15:10.313000 +CVE-2024-40594,0,1,5f8b4e7b3001e206c4db42bfb10b66a5767bd1e5041c1bca9998a882526a992d,2024-07-08T15:49:22.437000 +CVE-2024-40596,0,1,1c70018ce95a199a5579f955d28f92ef6d49860f153c31fa331d8b8ed76994ff,2024-07-08T15:49:22.437000 +CVE-2024-40597,0,1,9253bd3e0343b7becb6fbf27eb19f59c2b782f333d3980529c893721abdb7002,2024-07-08T15:49:22.437000 +CVE-2024-40598,0,1,e3ab56e64d25ed55d8f5522b34aecd3f79eefa9126a4528135ae8417b3336e03,2024-07-08T15:49:22.437000 +CVE-2024-40599,0,1,8282ebc391d08f1a3d1a65fac1b5508e9ed13d111e0eceafc57927143da15c87,2024-07-08T15:49:22.437000 CVE-2024-4060,0,0,c4df35b4ba03f25ce9e66ccd2a0f6342dcbc5f1e886657ca582640ee8747c7ed,2024-07-03T02:07:02.533000 -CVE-2024-40600,0,0,5a6f28a6001b234955d3d2063c8c860d96691db682efed30e244330cc730bd57,2024-07-07T00:15:10.397000 -CVE-2024-40601,0,0,b2c775d4c85abc6a23bcb27bf4299df822455b2625ae9c2afbf85e041b1913bb,2024-07-07T00:15:10.470000 -CVE-2024-40602,0,0,31d212d5ee0bbadb99aa587ddae3be36af26e3e592bc85d2309d1ccc6d661a05,2024-07-07T00:15:10.543000 -CVE-2024-40603,0,0,a59eb09c112c52f2f41fff991543251e420e8ed1adcc447fe75b7105e7759065,2024-07-07T00:15:10.617000 -CVE-2024-40604,0,0,06c9fcfeda33a92aaaf0864f242969e9767dfcef607901c977ee31765ab64188,2024-07-07T00:15:10.690000 -CVE-2024-40605,0,0,63f2796aa96da63d2a64510dcc3ffc1fba4cca74f8258df71034a13d64b69abc,2024-07-07T00:15:10.770000 +CVE-2024-40600,0,1,d9f59c2a73e8a8a6a3b8288992660191e0bd39d64cedd7f069aa1ce51da05db3,2024-07-08T15:49:22.437000 +CVE-2024-40601,0,1,883461e92533385217aca9705c70bfcf1f5299bd2c7b6dbaa39298d49533daac,2024-07-08T15:49:22.437000 +CVE-2024-40602,0,1,5d00c75fad4b05194110397f252a659f863df5d1bc2cdd99dab45e3ffb8ceacc,2024-07-08T15:49:22.437000 +CVE-2024-40603,0,1,a045a3d7a0f305110a2b25747ee3de855101cbf2e80360a5bd308c715f607d03,2024-07-08T15:49:22.437000 +CVE-2024-40604,0,1,aee5ac669ed3be967fc184e84b55b5e7cec3926585521a1237a3086e96ff76e7,2024-07-08T15:49:22.437000 +CVE-2024-40605,0,1,49cea9ce02dd6feccfed7e985f8111ea6578a190500fbfaa90aba1f6b745269c,2024-07-08T15:49:22.437000 CVE-2024-4061,0,0,731822e6f24cd811e7f06812f39ade81c9a66c6b1046f4d45903066a1f181f99,2024-05-21T12:37:59.687000 -CVE-2024-40614,0,0,a58e68ff975dc388908772a166ffcb41c50e83a7ba383078526a5a88e8f6baf7,2024-07-07T15:15:09.923000 +CVE-2024-40614,0,1,ea0180b1c0cb737304c9d14432cf5b9bc822e1cb1c969e58af0e9fdbc8f236d5,2024-07-08T15:49:22.437000 CVE-2024-4062,0,0,7fcbe6e50148b9b5e05d3025a893191a4aca3bb309243ec182c3df8f6e2a0587,2024-06-04T19:20:29.007000 CVE-2024-4063,0,0,10c24a204d439c4cd3340a486d9bc67fc982c548c71c2d3a385738d7e6499dc1,2024-06-04T19:20:29.120000 CVE-2024-4064,0,0,0a357968458dd966b7a4969f86556627b0af0220edbb91249e767e6972ab2a17,2024-05-17T02:40:14.223000 @@ -254557,6 +254562,7 @@ CVE-2024-4336,0,0,bea5a7f53013b694022e2bd0018a4064fb0ebf2c6ec290178b3a567f091ff4 CVE-2024-4337,0,0,08997cb0f3d0ed65aebc3b58ae13b7e381ac12042dd4375a545df1f240dc7b83,2024-04-30T13:11:16.690000 CVE-2024-4339,0,0,bea5b1829080bc48e0dd548941045de99c983236691a3af86422b1ab8f30d243,2024-05-14T16:11:39.510000 CVE-2024-4340,0,0,cc413663d0b28645506d2728a6df6437d317b717b85c09519211319a2c38a0e2,2024-04-30T17:52:35.057000 +CVE-2024-4341,1,1,3211913a621999304817fd6c2d3e75cd7092ce692cf6060a7df7094ed8f8b09d,2024-07-08T15:49:22.437000 CVE-2024-4342,0,0,1d254042ed7598f085daf52aac1163682633368ed2cfee0004a63bcce54ce5fa,2024-06-03T14:46:24.250000 CVE-2024-4344,0,0,04b422ffcdf205ebb39a6c7b54a03c3a26bf9363ea1e057608bf9722355aeb6b,2024-06-03T14:46:24.250000 CVE-2024-4345,0,0,f00f50139993a52fd7c5e9953c5559186f91d77a99990283e2fa9024cdbc8333,2024-05-07T13:39:32.710000 @@ -254593,7 +254599,7 @@ CVE-2024-4379,0,0,4d59152fb4b73c11db800a656f5856d441c43de1bb0066c24dea588b8283a5 CVE-2024-4381,0,0,78c8dc21f81c8275b3ac1d657cf1f7f442b36120298b1f2464d84fb626ca5c0d,2024-06-21T11:22:01.687000 CVE-2024-4382,0,0,3bb1661f32fbe95d47bcaf07bc877c52dca49c6dc2eee10098631fc3744a2e9d,2024-06-21T11:22:01.687000 CVE-2024-4383,0,0,71e35b2278aca455b2ce46e7157369face569e9a329ff0e3436aa90a5b256792,2024-05-14T16:11:39.510000 -CVE-2024-4384,0,0,ebc1c84b90844c3f97a8b9e82daa6480f405d72df77e0fb864b9730ee8f9fb53,2024-06-21T11:22:01.687000 +CVE-2024-4384,0,1,a8b606ff469dab64985b21ba5165f50c3563ed143e07883ecb84e0e5ec9ca081,2024-07-08T14:19:12.827000 CVE-2024-4385,0,0,ca3b527b38ef117a25bd1a563993108f86670c5409f332b50d53521ab7d618e2,2024-05-16T13:03:05.353000 CVE-2024-4386,0,0,57810600ce2cb57e3b791eb883cd1cf3cd600b48831c08c0c6ff5f338408f5ca,2024-05-14T16:11:39.510000 CVE-2024-4387,0,0,9ee50ad7bc6299cf393d49fb5522fa18479c94f2c9950e2c45d0cf70a824aaad,2024-06-11T10:15:13.637000 @@ -255085,7 +255091,7 @@ CVE-2024-4965,0,0,3d00a08740d2244556f47445c99bbeb000f5d6192227040c620e87d8d9dddc CVE-2024-4966,0,0,52e1e815e9fa405512275de8e9159c8daf1cfe44ce8f64f68ab6b5bbba30d77b,2024-05-17T02:40:44.507000 CVE-2024-4967,0,0,0c5c8069dd02e21380835b9a4ddf6713b7dae3a58f2cc13195bcbd7481a27599,2024-06-04T19:20:55.777000 CVE-2024-4968,0,0,a8b3a46895471e6381e218aab215b363e497d1d9d3834af2bbdade07964fb159,2024-06-04T19:20:55.910000 -CVE-2024-4969,0,0,69268049b5288947fc9b837758c4bc5bb5ae8c54cc002a6d1da68f47f610c034,2024-06-24T19:30:53.110000 +CVE-2024-4969,0,1,ab0804889b5a888b9b65e9fe2bbd8691478393df4e0fc992e2c82c7a1daa3f54,2024-07-08T14:19:14.173000 CVE-2024-4970,0,0,633e4fcad7be794223ce0ce219c6d7f108940763ca88fdbbaf2e78bd01f37c77,2024-06-24T19:30:39.397000 CVE-2024-4971,0,0,3230e5c2f3ddc54e361e4816b50a6ff202c537d8025c5f5a0c94a60c36731178,2024-05-22T12:46:53.887000 CVE-2024-4972,0,0,c7657747111247fd4d4ee2ae195245187344baf573f3e1b0b50d5604f52c9658,2024-06-04T19:20:56.040000 @@ -255548,14 +255554,14 @@ CVE-2024-5598,0,0,dea97cf43130ffc7ec8c1e0439cc4a1d595d430c970e2a6bb452f71273924c CVE-2024-5599,0,0,e4d8d3217ca804a33354b51b54e1f3f41ce0e1fc1f554dedfe90ad1a46a87370,2024-06-11T18:24:39.057000 CVE-2024-5601,0,0,e22064ef868b7763ab6a035a66dc94fbf47f776f059b7b471d5873c49e582f7a,2024-06-28T13:25:40.677000 CVE-2024-5605,0,0,4bb70fac398eb5e1fc6a3b8761dcfee9993510711b196c5d9f90dc1e34c785a3,2024-06-20T12:43:25.663000 -CVE-2024-5606,0,0,77ca044404d627b5230fd0abf899745b4715aa4e19e52966299c5c3e2cb213db,2024-07-03T15:45:19.513000 +CVE-2024-5606,0,1,954b2855130670426569975aef75e63a345bb5d86a76ecc86734db71e762262f,2024-07-08T14:19:15.450000 CVE-2024-5607,0,0,9601597658129a089207c1a0e7e7267aceda952302ad39754d738e7307549543,2024-06-07T14:56:05.647000 CVE-2024-5609,0,0,f28c83e3e9d04345913d36de3bfdbd0d644d73b3d20045d9399b3368319c8d47,2024-06-06T19:16:09.920000 CVE-2024-5611,0,0,7f38716b1ccbe035f7f86ea6c7617ab6f4cac8651e00e7906bbdbf77091ab5a1,2024-06-17T12:42:04.623000 CVE-2024-5612,0,0,24bfbb6efa391db3014703335fcf10e8f670f2b2b154031d8b7a312f92d36720,2024-06-07T14:56:05.647000 CVE-2024-5613,0,0,7e758f60ff4a249ae3d985d91b4f3417dc42ff70d8507f5e072b9cf0ad6144fd,2024-06-10T02:52:08.267000 CVE-2024-5615,0,0,d715351de069ee256cfd127ce22346136f76094dbd1f6f173b336f3c2cdc9c0f,2024-06-11T17:55:16.103000 -CVE-2024-5616,0,0,dc636e3941ecbef30c76d8756c4e51d3b0104af0c561655eb861ad296b553f3c,2024-07-06T09:15:02.050000 +CVE-2024-5616,0,1,5078c1aa917db98652cc6ffd2b310b244194da0fcbabfd9d4ed8ccf7b99de509,2024-07-08T15:49:22.437000 CVE-2024-5629,0,0,20478b62dd0cd666624f11f2e5a11c22a9915feb481805651583fe7db0518c7b,2024-06-18T18:31:05.663000 CVE-2024-5635,0,0,2463dd00def60296c968660a2ba7a3c25845ea097c4cd305a7e3f2bd55658946,2024-06-11T16:47:04.413000 CVE-2024-5636,0,0,82666e4630526d7fc8211dab0f89e7e17d4e982c91e038f44b209ae67bb471f3,2024-06-11T17:23:29.670000 @@ -255608,12 +255614,12 @@ CVE-2024-5700,0,0,75281b3d92ab48138fa84376c62cf06e3b235ecbf0492685b83c4b5de8ec65 CVE-2024-5701,0,0,c0b77ae9f34889006ada566ff239d80e91c1e1e51e6239a509f45a6d387ce8ce,2024-06-11T13:54:12.057000 CVE-2024-5702,0,0,050114b692a9d22e1a3779ff238583d9efc9d6e8072ff7c077a659f94eb85b8c,2024-06-19T10:15:11.583000 CVE-2024-5710,0,0,bbba5caf4cb4f465fb2a1f44424b7af778bd56d5f1b17eb3b38248b8a0397322,2024-07-01T10:15:30.183000 -CVE-2024-5711,0,0,d9db03d6362abb942f4ac27229f074628c924324fa288e57eb21704281f10e54,2024-07-08T00:15:01.940000 +CVE-2024-5711,0,1,36900df12a60df985efa67ab5ec7170d3f5b9e7d88be290fdaf1be32dc6cea47,2024-07-08T15:49:22.437000 CVE-2024-5712,0,0,782e6f09ec4801a2090922da0634157b6b0760d6d2ff619b99db06cdc44198b4,2024-07-01T12:37:24.220000 CVE-2024-5714,0,0,d09606fe85d7a014a058870c51f9ff79e6af54534c316b686a2562e2d0e92e3e,2024-06-27T19:25:12.067000 CVE-2024-5724,0,0,03384c71395c84af225b0ffa60ba9818c028df2b73c4ae064cd0a263a53e8317,2024-06-20T12:44:01.637000 CVE-2024-5727,0,0,040bfa497be860fd1871f63cb27032a120406323d19a196c7488cb84bed8cd86,2024-07-03T02:09:13.520000 -CVE-2024-5728,0,0,5a889a67227481274c819df95431051019a211516033d5f988b49d47d8c66f3e,2024-06-28T10:27:00.920000 +CVE-2024-5728,0,1,970711b5fa2959720f2da02dc0abb41a56789d3063753f984448aaa0fb048438,2024-07-08T14:19:16.400000 CVE-2024-5729,0,0,e1aca1388a2cf611974ab50f0f578b9dc91c2e7eff3688e112f84f2c4fd97db9,2024-06-28T10:27:00.920000 CVE-2024-5730,0,0,b1e3b523ff3fe033a4627e600289f9d47a0ec4c88ed24f5361108bdf9adc4b02,2024-07-03T02:09:14.303000 CVE-2024-5731,0,0,f8f18711dc1e7684e37f428b0d6e39ca275690790dad9599ea32c8e89b131e02,2024-06-17T12:42:04.623000 @@ -255630,7 +255636,7 @@ CVE-2024-5745,0,0,e6d6a2ad17b4c76965d8e06659a07345c55e76c97ae26acd6c0df2c3c7c9c9 CVE-2024-5746,0,0,19c03e2378053068498e84f7ded06c9ed9f7f605893d4e6e1e00c733dd0cc75e,2024-06-21T11:22:01.687000 CVE-2024-5750,0,0,03159524f0152f136fbf677dd96b04f6ea701d7a55e178491af9632e52209686,2024-06-18T14:15:11.383000 CVE-2024-5751,0,0,ca61b23591712a8cff5f4d60dc25f9af29a80e50dd51936dc41b0c0c08f825ad,2024-06-27T19:25:12.067000 -CVE-2024-5753,0,0,ab9dcce1cef9a763992c4d110fc140783a61eac99b0ea41eca91e21619cd9db4,2024-07-05T20:15:02.343000 +CVE-2024-5753,0,1,43c94f3dac782081ffe06f7a7f44ffc012545fd59744b1529ccc7aa1117863e3,2024-07-08T15:49:22.437000 CVE-2024-5755,0,0,b75b82993304e8d2e2f0a897bb014b8925b1bcd9c9ad3c9ceeb5f909bfddc6d2,2024-06-27T19:25:12.067000 CVE-2024-5756,0,0,932863b7175086c01d8c5c65a4beadccfd018caa98aec2852a5c281821078bb5,2024-06-21T11:22:01.687000 CVE-2024-5757,0,0,5cb8c18a619114307d2634441346064118b79a7aeac4723897e195eaa5132dad,2024-07-02T14:42:05.977000 @@ -255813,7 +255819,7 @@ CVE-2024-6085,0,0,9ec0c5a378f12acda708e36f1fd937b6a37e47da0cf78939f5184a1970e8c2 CVE-2024-6086,0,0,14860ec6fbd88099fa44eea5d54e4e6e3888339b61c575153074e11ddcd05154,2024-06-27T19:25:12.067000 CVE-2024-6088,0,0,a9d7c0ac6c95b2bd9561bfed56970b72620e229b5cd314eccacff68acf7494cb,2024-07-02T18:08:38.550000 CVE-2024-6090,0,0,bdfb03b5dff367089b0030453781624b3aa54f3ea84f8c38b9ecc3c69b89e51c,2024-06-27T19:25:12.067000 -CVE-2024-6095,0,0,59aad99247ec3736081af1b90f269de40d6f80252e4d9c35f7de2e7a5354a737,2024-07-06T18:15:02.277000 +CVE-2024-6095,0,1,f33171449ed2bbf8b979c46b974076e8cc89eb89f7a3cf4ef10062e82b443e96,2024-07-08T15:49:22.437000 CVE-2024-6099,0,0,08d6fd232c5f13b0914a67a7bc8e701fe1f9a81567c563142a725dcdef9d6a6d,2024-07-02T18:08:53.233000 CVE-2024-6100,0,0,22a1633b125d31ae1c260507b63f1a44d0021fa11eedbf918d3886af2f39e630,2024-07-03T02:09:40.497000 CVE-2024-6101,0,0,aeaca54f07e7b493faae55d17ed3267b0a1d9b8a80e43a682711cd93d1a2da27,2024-07-03T02:09:41.493000 @@ -255848,7 +255854,7 @@ CVE-2024-6153,0,0,a3cbabebaa196b7fc704a5b9ef76e592e68ec6c4195aa6f7531f701a27a837 CVE-2024-6154,0,0,14c261dad2c658f3f85287831ecf663ba772d4a017166d6d5d3cda8ce8388677,2024-06-21T11:22:01.687000 CVE-2024-6160,0,0,e0e9df11502e0f78d6d764c03981bde61fa7fdce13ce5e8e72c2edbfe567293b,2024-06-24T12:57:36.513000 CVE-2024-6162,0,0,bd502c2e3c0167c78ca1c8188e0261103b8f8aa5eaa8e4a394c72d49dddda11b,2024-06-20T16:07:50.417000 -CVE-2024-6163,1,1,d820ebe9a5c42f4bb3a76931a99cbeb9a0f20dc7e06710ad360e1ccafc5cf8dc,2024-07-08T13:15:10.593000 +CVE-2024-6163,0,1,fd093a646484e49cdcba7f0d5c73f035da9d8dc2d3299e73ed2192cb6789df3d,2024-07-08T15:49:22.437000 CVE-2024-6172,0,0,772bb913ed7f683b9ada9dc0ecd54a374149383f55e758d624c0fb5be0b0bf4c,2024-07-03T18:00:01.770000 CVE-2024-6176,0,0,855875508d6019a3b7cc5455db83c0ed155c5813092b253896702a30576b2ecb,2024-06-20T12:43:25.663000 CVE-2024-6177,0,0,a0175799dd5324c2ac4fd3e8bb126589ce94cff0760703c070fdf39975a6cb07,2024-06-20T15:17:06.493000 @@ -255871,7 +255877,7 @@ CVE-2024-6194,0,0,8fba52ae1e26593e8f532ec1813c89aa27500e4749964486d15ce611179907 CVE-2024-6195,0,0,880630f7e59fe96c68db9446cad414c3056228167cb15e9eb7f8a5b897e9683e,2024-06-21T11:22:01.687000 CVE-2024-6196,0,0,8d29dbc22f191f0a2e6f5022705b8c2127b1c89230e4a1900a70835df0ab8ad4,2024-06-21T17:15:11.350000 CVE-2024-6206,0,0,a239648c07eb93ed8775dc2c6fd68864bae94b397314d858106207781c570047,2024-06-26T12:44:29.693000 -CVE-2024-6209,0,0,c30866d82757ddf9cb2e92966529c399efa27327532b941513c7ab3ad9c5781f,2024-07-05T12:55:51.367000 +CVE-2024-6209,0,1,dde817e69ddab612402867a39af366fc36713e43c4758f0a34432256fd885f93,2024-07-08T15:35:25.837000 CVE-2024-6212,0,0,c1e9ad93b654311e54f23eb8816b7040c4009f7be4b90d449446bdaf277f7228,2024-06-21T15:15:16.313000 CVE-2024-6213,0,0,875f788502e9039ff5cde644917f38d937eec3d1fa9cda735bda62057b13f974,2024-06-21T11:22:01.687000 CVE-2024-6214,0,0,f04922fee1928885a13a6b9135dd29d8f0bc0dcf3373a5ce58e6bf8d17734328,2024-06-21T15:15:16.430000 @@ -255880,7 +255886,7 @@ CVE-2024-6216,0,0,163aaa10da8fbd3f1a722ddf5828825abea50c90fd2d9b89c4bf2c73ab93f6 CVE-2024-6217,0,0,3711ed31aaa9f7586428ac093ba9118453625e92a316540d8e0c90d5655ba292,2024-06-21T11:22:01.687000 CVE-2024-6218,0,0,080145c08c5ffaf1b0f4fe61601c30772836ccbea26d111bc22bd57681c581e7,2024-06-21T15:15:16.547000 CVE-2024-6225,0,0,05da1495d7d116987721ea4d8dad783669e833db8afd42c6e9b9d7b36358250e,2024-06-24T19:21:28.450000 -CVE-2024-6229,0,0,f1f054c8daa5ac2c46672d5a0f53c7a9d2a940a35470133039aaba3576e253b3,2024-07-07T16:15:02.013000 +CVE-2024-6229,0,1,8c75c4089f9bb2b690871cceb6de9502d8662dbaa4dc8109053b9a0e9bdfb643,2024-07-08T15:49:22.437000 CVE-2024-6238,0,0,01bce4fcd5bf21099e3fa29fb7e34bf0d2a461d152d0ae3d9b913c1fb46d1451,2024-06-25T18:50:42.040000 CVE-2024-6239,0,0,4d98a21d53ef2e5917897cadc254a12ee654ff1e3575a82a15151981272f61b5,2024-06-24T19:06:27.537000 CVE-2024-6240,0,0,3ba60659d5977ed2c81ae70dc02c754f9eebbd14309190bebb86d2a019bd47a8,2024-06-24T19:10:38.983000 @@ -255919,7 +255925,7 @@ CVE-2024-6294,0,0,6e157447a380471b4e672432441b0d5dbba0fc67bea6ec1145ba68325fae73 CVE-2024-6295,0,0,34be56c45a4536c17926fc9c9d678ef84cff2fe2a1e2b1e6898c4c1a47aa2e9c,2024-06-25T12:24:17.873000 CVE-2024-6296,0,0,2f0e4a66c60611de0f983e9680e76a35c142eccc5d0956d3219c5a0abd09b7d4,2024-06-28T10:27:00.920000 CVE-2024-6297,0,0,4335adc3c6f03845409551a993bf84e337f4db092e95dafe9b538168f2fdbc65,2024-06-25T12:24:17.873000 -CVE-2024-6298,0,0,026aeaa8fd285069e00967410a00b8345dcdd4c74eaf24b7620ff2adaf47aeb5,2024-07-05T12:55:51.367000 +CVE-2024-6298,0,1,0564e4dbae222a072a34ea639ec0741c70bbb18f77d457629ad6e21b9d2f5dae,2024-07-08T15:35:16.450000 CVE-2024-6299,0,0,ac4cc3be959136c111a6e6496906d360cd16590e9a56c52981ced1e389248607,2024-06-25T18:50:42.040000 CVE-2024-6300,0,0,ec8648b9a85313a0c3f6eb7f52e874de04a3c55f1d2e9864914ad1a09eaa76e2,2024-06-25T18:50:42.040000 CVE-2024-6301,0,0,d11b98362ddb4fd17686b1f86000698d753c2949faf10241a2f5915cd2adc235,2024-06-25T18:50:42.040000 @@ -255982,13 +255988,13 @@ CVE-2024-6469,0,0,8a9cc14cdc15687cebe1f067587bd279bfc289daac6283040462018576c0d5 CVE-2024-6470,0,0,c9a33c23ec7370c50b4df58ad71ec5e181cf8d29947a984c43804e0a58dc7723,2024-07-05T12:55:51.367000 CVE-2024-6471,0,0,f732e100289c893532526b33b46541a39ba52ce518f7e90d2f97ec4bb67cf877,2024-07-05T12:55:51.367000 CVE-2024-6488,0,0,0c5ecb49d7296b409f5d61bd70a5d017ad6f69068345855a00f0bd7c78566faa,2024-07-04T21:15:10.403000 -CVE-2024-6505,0,0,f681ac783b86ae87a9626efe31c92a382501fe4b0be5563a7ccd009556a013f0,2024-07-05T17:10:58.210000 +CVE-2024-6505,0,1,b8708084cd092b6ca88acb18ad5e80f748f8e2829ec040b8958bfe3c1fee2cd6,2024-07-08T15:41:17.883000 CVE-2024-6506,0,0,58310ca3e68e3dacb16dafd9b32db187bdf111a88d3da008267c8c84bbec48d6,2024-07-05T12:55:51.367000 -CVE-2024-6507,0,0,7605525131d303c9cb8857ed13187172375fbe2a72f3cea4052ece547d415827,2024-07-05T12:55:51.367000 +CVE-2024-6507,0,1,4e3b24fd61e25de66a6840473e4d19109a713188592b0f05efa1cbb9de33936e,2024-07-08T14:19:21.610000 CVE-2024-6511,0,0,053f3089b06a0cd915df79eb3301836b5db5c9fe4d3ed571ee6923d36f4d1832,2024-07-05T12:55:51.367000 CVE-2024-6513,0,0,bb977a38eaef5aa918756b3907c97d9805111d3bc118dcf2b0096d1bbd202aea,2024-07-04T16:15:03.103000 CVE-2024-6523,0,0,8e944d33060f893d0f8a5de05c5d1f404dc8cc2a3646a4fb123baa591362f973,2024-07-05T12:55:51.367000 -CVE-2024-6524,0,0,b1cd113fe7421214b7ce9e86517f29da32cdcabbd73db24dd5b2998b8692a1c5,2024-07-05T12:55:51.367000 -CVE-2024-6525,0,0,922b367a62eb2afd73317643050f220b58a9c00fbadb87dd5d5b3387d891b6e8,2024-07-05T17:10:58.210000 -CVE-2024-6526,0,0,2b85d297bcc6f1e6404a772fb46286a7ad08c157624b810fd8629aa6ecff0f52,2024-07-05T17:10:58.210000 -CVE-2024-6539,0,0,a07c31d1044b80d70124f466f6a8a84ff7e79693e8866eb368f2a7f4d8611c7a,2024-07-07T23:15:10.003000 +CVE-2024-6524,0,1,a7a803cd0c4b163adf24a214658dd36dbf3d93b3905b2171e3d08048b915cbe3,2024-07-08T15:33:01.377000 +CVE-2024-6525,0,1,2f0f70f02d7062f0146f492a65f00de0208bb8c01fafafd0c2d5a6e3d243b927,2024-07-08T15:30:11.133000 +CVE-2024-6526,0,1,0395771cb83da3c31d3258df800a7adc493a41c6b23cd6248bbb973fb8ab4b56,2024-07-08T15:39:08.840000 +CVE-2024-6539,0,1,af7a9107d7b462a59e1314d81ee0ea249c00edb3c899ac73079834fee3e5a982,2024-07-08T15:49:22.437000